Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-35619 |
5.3 (4.0)
4.3 (3.1)
|
OpenClaw < 2026.3.24 - Authorization Bypass via HTTP /… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:08.449Z | 2026-04-10T16:03:08.449Z |
| CVE-2026-35596 |
4.3 (3.1)
|
Vikunja has Broken Access Control on Label Read via SQ… |
go-vikunja |
vikunja |
2026-04-10T15:59:43.255Z | 2026-04-10T15:59:43.255Z |
| CVE-2026-35595 |
8.3 (3.1)
|
Vikunja Affected by Privilege Escalation via Project R… |
go-vikunja |
vikunja |
2026-04-10T15:58:32.658Z | 2026-04-10T18:16:18.230Z |
| CVE-2026-35594 |
6.5 (3.1)
|
Vikunja Link Share JWT tokens remain valid for 72 hour… |
go-vikunja |
vikunja |
2026-04-10T15:55:04.929Z | 2026-04-10T15:55:04.929Z |
| CVE-2026-40228 |
2.9 (3.1)
|
In systemd 259, systemd-journald can send ANSI es… |
systemd |
systemd |
2026-04-10T15:48:44.215Z | 2026-04-10T17:27:22.882Z |
| CVE-2026-40023 |
6.3 (4.0)
|
Apache Log4cxx, Apache Log4cxx (Conan), Apache Log4cxx… |
Apache Software Foundation |
Apache Log4cxx |
2026-04-10T15:45:52.895Z | 2026-04-10T17:29:20.009Z |
| CVE-2026-34727 |
7.4 (3.1)
|
Vikunja ahs a TOTP Two-Factor Authentication Bypass vi… |
go-vikunja |
vikunja |
2026-04-10T15:45:30.662Z | 2026-04-10T15:45:30.662Z |
| CVE-2026-40021 |
6.3 (4.0)
|
Apache Log4net: Silent log event loss in XmlLayout and… |
Apache Software Foundation |
Apache Log4net |
2026-04-10T15:44:17.451Z | 2026-04-10T17:35:01.228Z |
| CVE-2026-34481 |
6.3 (4.0)
|
Apache Log4j JSON Template Layout: Improper serializat… |
Apache Software Foundation |
Apache Log4j JSON Template Layout |
2026-04-10T15:43:00.100Z | 2026-04-10T17:41:38.229Z |
| CVE-2026-34480 |
6.9 (4.0)
|
Apache Log4j Core: Silent log event loss in XmlLayout … |
Apache Software Foundation |
Apache Log4j Core |
2026-04-10T15:42:03.843Z | 2026-04-10T17:45:07.434Z |
| CVE-2026-34479 |
6.9 (4.0)
|
Apache Log4j 1 to Log4j 2 bridge: Silent log event los… |
Apache Software Foundation |
Apache Log4j 1 to Log4j 2 bridge |
2026-04-10T15:41:07.888Z | 2026-04-10T17:47:34.402Z |
| CVE-2026-34478 |
6.9 (4.0)
|
Apache Log4j Core: Log injection in Rfc5424Layout due … |
Apache Software Foundation |
Apache Log4j Core |
2026-04-10T15:40:17.713Z | 2026-04-10T17:50:12.484Z |
| CVE-2026-34477 |
6.3 (4.0)
|
Apache Log4j Core: verifyHostName attribute silently i… |
Apache Software Foundation |
Apache Log4j Core |
2026-04-10T15:36:19.740Z | 2026-04-10T17:38:57.154Z |
| CVE-2026-29043 |
5.5 (3.1)
|
HDF5 H5T__ref_mem_setnull Heap Buffer Overflow |
HDFGroup |
hdf5 |
2026-04-10T15:35:51.682Z | 2026-04-10T15:35:51.682Z |
| CVE-2026-40227 |
6.2 (3.1)
|
In systemd 260 before 261, a local unprivileged u… |
systemd |
systemd |
2026-04-10T15:19:51.433Z | 2026-04-10T15:26:26.507Z |
| CVE-2026-40226 |
6.4 (3.1)
|
In nspawn in systemd 233 through 259 before 260, … |
systemd |
systemd |
2026-04-10T15:18:10.447Z | 2026-04-10T15:34:22.039Z |
| CVE-2026-40225 |
6.4 (3.1)
|
In udev in systemd before 260, local root executi… |
systemd |
systemd |
2026-04-10T15:16:19.827Z | 2026-04-10T15:33:39.797Z |
| CVE-2026-40224 |
6.7 (3.1)
|
In systemd 259 before 260, there is local privile… |
systemd |
systemd |
2026-04-10T15:14:21.904Z | 2026-04-10T18:13:05.818Z |
| CVE-2026-29002 |
8.6 (4.0)
7.2 (3.1)
|
CouchCMS Privilege Escalation via f_k_levels_list Parameter |
CouchCMS |
CouchCMS |
2026-04-10T15:11:43.411Z | 2026-04-10T16:20:02.847Z |
| CVE-2026-40223 |
4.7 (3.1)
|
In systemd 258 before 260, a local unprivileged u… |
systemd |
systemd |
2026-04-10T15:10:56.605Z | 2026-04-10T15:32:55.263Z |
| CVE-2026-40217 |
8.8 (3.1)
|
LiteLLM through 2026-04-08 allows remote attacker… |
BerriAI |
LiteLLM |
2026-04-10T13:43:23.147Z | 2026-04-10T13:43:23.147Z |
| CVE-2026-6069 |
7.5 (3.1)
|
CVE-2026-6069 |
NASM |
NASM |
2026-04-10T13:30:48.302Z | 2026-04-10T14:53:37.082Z |
| CVE-2026-6068 |
6.5 (3.1)
|
CVE-2026-6068 |
NASM |
NASM |
2026-04-10T13:30:38.420Z | 2026-04-10T14:56:52.908Z |
| CVE-2026-6067 |
7.5 (3.1)
|
CVE-2026-6067 |
NASM |
NASM |
2026-04-10T13:30:26.140Z | 2026-04-10T14:58:07.818Z |
| CVE-2025-58920 |
7.1 (3.1)
|
WordPress Cerato theme <= 2.2.18 - Reflected Cross Sit… |
Zootemplate |
Cerato |
2026-04-10T13:25:31.611Z | 2026-04-10T14:07:44.099Z |
| CVE-2025-58913 |
8.1 (3.1)
|
WordPress VideoPro theme <= 2.3.8.1 - Local File Inclu… |
CactusThemes |
VideoPro |
2026-04-10T13:21:05.820Z | 2026-04-10T13:21:05.820Z |
| CVE-2025-5804 |
7.5 (3.1)
|
WordPress Case Theme User < 1.0.4 - Local File Inclusi… |
Case Themes |
Case Theme User |
2026-04-10T13:19:43.457Z | 2026-04-10T13:19:43.457Z |
| CVE-2026-33092 |
7.8 (3.0)
|
Local privilege escalation due to improper handli… |
Acronis |
Acronis True Image OEM |
2026-04-10T13:17:45.275Z | 2026-04-10T14:02:46.538Z |
| CVE-2026-5412 |
9.9 (3.1)
|
Juju CloudSpec API could leak senstive information |
Canonical |
Juju |
2026-04-10T12:22:05.403Z | 2026-04-10T14:04:30.155Z |
| CVE-2026-5774 |
6.1 (4.0)
|
Juju API Server Denial of Service and Authentication R… |
Canonical |
Juju |
2026-04-10T12:10:55.634Z | 2026-04-10T12:41:28.720Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-35597 |
5.9 (3.1)
|
Vikunja Affected by TOTP Brute-Force Due to Non-Functi… |
go-vikunja |
vikunja |
2026-04-10T16:03:19.636Z | 2026-04-10T16:03:19.636Z |
| CVE-2026-35596 |
4.3 (3.1)
|
Vikunja has Broken Access Control on Label Read via SQ… |
go-vikunja |
vikunja |
2026-04-10T15:59:43.255Z | 2026-04-10T15:59:43.255Z |
| CVE-2026-35595 |
8.3 (3.1)
|
Vikunja Affected by Privilege Escalation via Project R… |
go-vikunja |
vikunja |
2026-04-10T15:58:32.658Z | 2026-04-10T18:16:18.230Z |
| CVE-2026-22560 |
N/A
|
An open redirect vulnerability in Rocket.Chat ver… |
Rocket.Chat |
Rocket.Chat |
2026-04-10T17:00:11.746Z | 2026-04-10T17:00:11.746Z |
| CVE-2026-40228 |
2.9 (3.1)
|
In systemd 259, systemd-journald can send ANSI es… |
systemd |
systemd |
2026-04-10T15:48:44.215Z | 2026-04-10T17:27:22.882Z |
| CVE-2026-40227 |
6.2 (3.1)
|
In systemd 260 before 261, a local unprivileged u… |
systemd |
systemd |
2026-04-10T15:19:51.433Z | 2026-04-10T15:26:26.507Z |
| CVE-2026-40226 |
6.4 (3.1)
|
In nspawn in systemd 233 through 259 before 260, … |
systemd |
systemd |
2026-04-10T15:18:10.447Z | 2026-04-10T15:34:22.039Z |
| CVE-2026-40225 |
6.4 (3.1)
|
In udev in systemd before 260, local root executi… |
systemd |
systemd |
2026-04-10T15:16:19.827Z | 2026-04-10T15:33:39.797Z |
| CVE-2026-40224 |
6.7 (3.1)
|
In systemd 259 before 260, there is local privile… |
systemd |
systemd |
2026-04-10T15:14:21.904Z | 2026-04-10T18:13:05.818Z |
| CVE-2026-40223 |
4.7 (3.1)
|
In systemd 258 before 260, a local unprivileged u… |
systemd |
systemd |
2026-04-10T15:10:56.605Z | 2026-04-10T15:32:55.263Z |
| CVE-2026-40023 |
6.3 (4.0)
|
Apache Log4cxx, Apache Log4cxx (Conan), Apache Log4cxx… |
Apache Software Foundation |
Apache Log4cxx |
2026-04-10T15:45:52.895Z | 2026-04-10T17:29:20.009Z |
| CVE-2026-40021 |
6.3 (4.0)
|
Apache Log4net: Silent log event loss in XmlLayout and… |
Apache Software Foundation |
Apache Log4net |
2026-04-10T15:44:17.451Z | 2026-04-10T17:35:01.228Z |
| CVE-2026-35594 |
6.5 (3.1)
|
Vikunja Link Share JWT tokens remain valid for 72 hour… |
go-vikunja |
vikunja |
2026-04-10T15:55:04.929Z | 2026-04-10T15:55:04.929Z |
| CVE-2026-34727 |
7.4 (3.1)
|
Vikunja ahs a TOTP Two-Factor Authentication Bypass vi… |
go-vikunja |
vikunja |
2026-04-10T15:45:30.662Z | 2026-04-10T15:45:30.662Z |
| CVE-2026-34481 |
6.3 (4.0)
|
Apache Log4j JSON Template Layout: Improper serializat… |
Apache Software Foundation |
Apache Log4j JSON Template Layout |
2026-04-10T15:43:00.100Z | 2026-04-10T17:41:38.229Z |
| CVE-2026-34480 |
6.9 (4.0)
|
Apache Log4j Core: Silent log event loss in XmlLayout … |
Apache Software Foundation |
Apache Log4j Core |
2026-04-10T15:42:03.843Z | 2026-04-10T17:45:07.434Z |
| CVE-2026-34479 |
6.9 (4.0)
|
Apache Log4j 1 to Log4j 2 bridge: Silent log event los… |
Apache Software Foundation |
Apache Log4j 1 to Log4j 2 bridge |
2026-04-10T15:41:07.888Z | 2026-04-10T17:47:34.402Z |
| CVE-2026-34478 |
6.9 (4.0)
|
Apache Log4j Core: Log injection in Rfc5424Layout due … |
Apache Software Foundation |
Apache Log4j Core |
2026-04-10T15:40:17.713Z | 2026-04-10T17:50:12.484Z |
| CVE-2026-34477 |
6.3 (4.0)
|
Apache Log4j Core: verifyHostName attribute silently i… |
Apache Software Foundation |
Apache Log4j Core |
2026-04-10T15:36:19.740Z | 2026-04-10T17:38:57.154Z |
| CVE-2026-29043 |
5.5 (3.1)
|
HDF5 H5T__ref_mem_setnull Heap Buffer Overflow |
HDFGroup |
hdf5 |
2026-04-10T15:35:51.682Z | 2026-04-10T15:35:51.682Z |
| CVE-2026-29002 |
8.6 (4.0)
7.2 (3.1)
|
CouchCMS Privilege Escalation via f_k_levels_list Parameter |
CouchCMS |
CouchCMS |
2026-04-10T15:11:43.411Z | 2026-04-10T16:20:02.847Z |
| CVE-2026-23781 |
N/A
|
An issue was discovered in BMC Control-M/MFT 9.0.… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T15:52:02.482Z |
| CVE-2026-36236 |
N/A
|
SourceCodester Engineers Online Portal v1.0 is vu… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:47:13.962Z |
| CVE-2026-36235 |
N/A
|
A SQL injection vulnerability was found in the sc… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:33:55.426Z |
| CVE-2026-36234 |
N/A
|
itsourcecode Online Student Enrollment System v1.… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:33:20.708Z |
| CVE-2026-36233 |
N/A
|
A SQL injection vulnerability was found in the as… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:36:00.955Z |
| CVE-2026-36232 |
N/A
|
A SQL injection vulnerability was found in the in… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:38:14.710Z |
| CVE-2026-31262 |
N/A
|
Cross Site Scripting vulnerability in Altenar Spo… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:35:33.823Z |
| CVE-2026-29861 |
N/A
|
PHP-MYSQL-User-Login-System v1.0 was discovered t… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:38:34.237Z |
| CVE-2026-23782 |
N/A
|
An issue was discovered in BMC Control-M/MFT 9.0.… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:16:21.821Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-15483 | The Link Hopper plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘hop_name… | 2026-02-14T07:16:07.067 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-14873 | The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnera… | 2026-02-14T07:16:06.887 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-14852 | The MDirector Newsletter plugin for WordPress is vulnerable to Cross-Site Request Forgery in all ve… | 2026-02-14T07:16:06.433 | 2026-04-08T18:24:17.660 |
| fkie_cve-2026-1932 | The Appointment Booking Calendar Plugin – Bookr plugin for WordPress is vulnerable to unauthorized … | 2026-02-14T06:16:06.007 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-2469 | Versions of the package directorytree/imapengine before 1.22.3 are vulnerable to Improper Neutraliz… | 2026-02-14T05:16:22.270 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-2144 | The Magic Login Mail or QR Code plugin for WordPress is vulnerable to Privilege Escalation in all v… | 2026-02-14T05:16:21.973 | 2026-04-08T18:25:53.707 |
| fkie_cve-2026-2027 | The AMP Enhancer – Compatibility Layer for Official AMP Plugin for WordPress is vulnerable to Store… | 2026-02-14T05:16:21.313 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1983 | The SEATT: Simple Event Attendance plugin for WordPress is vulnerable to Cross-Site Request Forgery… | 2026-02-14T05:16:20.140 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1912 | The Citations tools plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'code… | 2026-02-14T05:16:19.543 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1904 | The Simple Wp colorfull Accordion plugin for WordPress is vulnerable to Stored Cross-Site Scripting… | 2026-02-14T05:16:19.327 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1754 | The personal-authors-category plugin for WordPress is vulnerable to Reflected Cross-Site Scripting … | 2026-02-14T05:16:19.143 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1164 | The Easy Voice Mail plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘mess… | 2026-02-14T05:16:17.593 | 2026-04-08T19:24:56.753 |
| fkie_cve-2026-0692 | The BlueSnap Payment Gateway for WooCommerce plugin for WordPress is vulnerable to Missing Authoriz… | 2026-02-14T05:16:16.923 | 2026-04-08T19:24:51.403 |
| fkie_cve-2026-26303 | Rejected reason: Not used | 2026-02-14T04:15:57.600 | 2026-02-14T04:15:57.600 |
| fkie_cve-2026-26302 | Rejected reason: Not used | 2026-02-14T04:15:57.540 | 2026-02-14T04:15:57.540 |
| fkie_cve-2026-26301 | Rejected reason: Not used | 2026-02-14T04:15:57.487 | 2026-02-14T04:15:57.487 |
| fkie_cve-2026-26300 | Rejected reason: Not used | 2026-02-14T04:15:57.427 | 2026-02-14T04:15:57.427 |
| fkie_cve-2026-26299 | Rejected reason: Not used | 2026-02-14T04:15:57.363 | 2026-02-14T04:15:57.363 |
| fkie_cve-2026-26298 | Rejected reason: Not used | 2026-02-14T04:15:57.307 | 2026-02-14T04:15:57.307 |
| fkie_cve-2026-26297 | Rejected reason: Not used | 2026-02-14T04:15:57.247 | 2026-02-14T04:15:57.247 |
| fkie_cve-2026-26296 | Rejected reason: Not used | 2026-02-14T04:15:57.190 | 2026-02-14T04:15:57.190 |
| fkie_cve-2026-26295 | Rejected reason: Not used | 2026-02-14T04:15:57.107 | 2026-02-14T04:15:57.107 |
| fkie_cve-2025-14608 | The WP Last Modified Info plugin for WordPress is vulnerable to Insecure Direct Object Reference in… | 2026-02-14T04:15:56.643 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-14067 | The Easy Form Builder plugin for WordPress is vulnerable to unauthorized access of data due to a mi… | 2026-02-14T04:15:56.480 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-13973 | The StickEasy Protected Contact Form plugin for WordPress is vulnerable to Sensitive Information Di… | 2026-02-14T04:15:56.313 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-13681 | The BFG Tools – Extension Zipper plugin for WordPress is vulnerable to Path Traversal in all versio… | 2026-02-14T04:15:56.123 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-24853 | Caido is a web security auditing toolkit. Prior to 0.55.0, Caido blocks non whitelisted domains to … | 2026-02-13T23:16:11.800 | 2026-02-24T20:32:18.710 |
| fkie_cve-2026-26273 | Known is a social publishing platform. Prior to 1.6.3, a Critical Broken Authentication vulnerabili… | 2026-02-13T22:16:11.330 | 2026-02-18T21:01:56.787 |
| fkie_cve-2026-1844 | The PixelYourSite PRO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'py… | 2026-02-13T22:16:11.007 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1841 | The PixelYourSite – Your smart PIXEL (TAG) & API Manager plugin for WordPress is vulnerable to Stor… | 2026-02-13T22:16:10.833 | 2026-04-08T18:25:50.063 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-6g6q-gcm9-395j |
7.2 (3.1)
8.6 (4.0)
|
CouchCMS contains a privilege escalation vulnerability that allows authenticated Admin-level users … | 2026-04-10T18:31:17Z | 2026-04-10T18:31:17Z |
| ghsa-445c-vh5m-36rj |
6.9 (4.0)
|
Apache Log4j Core's Rfc5424Layout https://logging.apache.org/log4j/2.x/manual/layouts.html#RFC5424… | 2026-04-10T18:31:17Z | 2026-04-10T18:31:18Z |
| ghsa-3pxv-7cmr-fjr4 |
6.9 (4.0)
|
Apache Log4j Core's XmlLayout fails to sanitize characters | 2026-04-10T18:31:17Z | 2026-04-10T21:16:41Z |
| ghsa-5f5r-95pg-xrpm |
3.5 (3.1)
|
Beszel has an IDOR in hub API endpoints that read system ID from URL parameter | 2026-04-10T17:32:05Z | 2026-04-10T17:32:05Z |
| ghsa-3f6h-2hrp-w5wx |
6.3 (4.0)
|
@sveltejs/kit: Unvalidated redirect in handle hook causes Denial-of-Service | 2026-04-10T17:32:00Z | 2026-04-10T19:46:47Z |
| ghsa-2crg-3p73-43xp |
8.2 (4.0)
|
@sveltejs/adapter-node has a BODY_SIZE_LIMIT bypass | 2026-04-10T17:24:31Z | 2026-04-10T19:46:38Z |
| ghsa-99j8-wv67-4c72 |
6.8 (3.1)
|
Aiven Operator has cross-namespace secret exfiltration via ClickhouseUser connInfoSecretSource | 2026-04-10T17:22:00Z | 2026-04-10T17:22:00Z |
| ghsa-v479-vf79-mg83 |
4.3 (3.1)
|
Vikunja: Scoped API tokens with projects.background permission can delete project backgrounds | 2026-04-10T15:36:47Z | 2026-04-10T19:47:00Z |
| ghsa-v457-wxvj-p9w9 |
7.5 (3.1)
|
@vitejs/plugin-rsc has a Denial of Service with React Server Components | 2026-04-10T15:36:00Z | 2026-04-10T15:36:00Z |
| ghsa-q4gf-8mx6-v5v3 |
7.5 (3.1)
|
Next.js has a Denial of Service with Server Components | 2026-04-10T15:35:47Z | 2026-04-10T15:35:47Z |
| ghsa-479c-33wc-g2pg |
7.5 (3.1)
|
React Server Components have a Denial of Service Vulnerability | 2026-04-10T15:35:37Z | 2026-04-10T15:35:38Z |
| ghsa-qh78-rvg3-cv54 |
5.4 (3.1)
|
Vikunja has File Size Limit Bypass via Vikunja Import | 2026-04-10T15:35:18Z | 2026-04-10T19:46:01Z |
| ghsa-2g7h-7rqr-9p4r |
4.1 (3.1)
|
Vikunja has iCalendar Property Injection via CRLF in CalDAV Task Output | 2026-04-10T15:35:05Z | 2026-04-10T19:45:55Z |
| ghsa-45q4-x4r9-8fqj |
5.4 (3.1)
|
Vikunja has HTML Injection via Task Titles in Overdue Email Notifications | 2026-04-10T15:34:53Z | 2026-04-10T19:45:50Z |
| ghsa-r4fg-73rc-hhh7 |
6.5 (3.1)
|
Vikunja has Algorithmic Complexity DoS in Repeating Task Handler | 2026-04-10T15:34:41Z | 2026-04-10T19:36:35Z |
| ghsa-48ch-p4gq-x46x |
4.3 (3.1)
|
Vikunja Missing Authorization on CalDAV Task Read | 2026-04-10T15:34:23Z | 2026-04-10T19:36:26Z |
| ghsa-fgfv-pv97-6cmj |
5.9 (3.1)
|
Vikunja Vulnerable to TOTP Brute-Force Due to Non-Functional Account Lockout | 2026-04-10T15:34:14Z | 2026-04-10T19:36:20Z |
| ghsa-hj5c-mhh2-g7jq |
4.3 (3.1)
|
Vikunja has Broken Access Control on Label Read via SQL Operator Precedence Bug | 2026-04-10T15:33:59Z | 2026-04-10T15:33:59Z |
| ghsa-2vq4-854f-5c72 |
8.3 (3.1)
|
Vikunja vulnerable to Privilege Escalation via Project Reparenting | 2026-04-10T15:33:50Z | 2026-04-10T19:36:15Z |
| ghsa-hr2v-4r36-88hr |
4.8 (4.0)
|
Helm Chart extraction output directory collapse via `Chart.yaml` name dot-segment | 2026-04-10T15:33:09Z | 2026-04-10T15:33:09Z |
| ghsa-q5jf-9vfq-h4h7 |
8.4 (4.0)
|
Helm's plugin verification fails open when .prov is missing, allowing unsigned plugin install | 2026-04-10T15:33:03Z | 2026-04-10T15:33:03Z |
| ghsa-vmx8-mqv2-9gmg |
8.4 (4.0)
|
Helm has a path traversal in plugin metadata version enables arbitrary file write outside Helm plug… | 2026-04-10T15:32:56Z | 2026-04-10T15:32:56Z |
| ghsa-f984-pcp8-v2p7 |
6.1 (4.0)
|
Wasmtime has improperly masked return value from `table.grow` with Winch compiler backend | 2026-04-10T15:32:49Z | 2026-04-10T15:32:49Z |
| ghsa-wvjf-23gc-c2fw |
7.5 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-04-10T15:31:58Z | 2026-04-10T15:31:58Z |
| ghsa-r9rh-xw3r-r4x2 |
|
A SQL injection vulnerability was found in the scheduleSubList.php file of itsourcecode Online Stud… | 2026-04-10T15:31:58Z | 2026-04-10T15:31:58Z |
| ghsa-pfc2-7mmr-x54w |
7.5 (3.1)
|
NASM’s disasm() function contains a stack based buffer overflow when formatting disassembly output,… | 2026-04-10T15:31:58Z | 2026-04-10T15:31:58Z |
| ghsa-mcv5-wpqg-r546 |
|
A SQL injection vulnerability was found in the assignInstructorSubjects.php file of itsourcecode On… | 2026-04-10T15:31:58Z | 2026-04-10T15:31:58Z |
| ghsa-h5j3-w5wp-rcr7 |
|
SourceCodester Engineers Online Portal v1.0 is vulnerable to SQL Injection in update_password.php v… | 2026-04-10T15:31:58Z | 2026-04-10T15:31:58Z |
| ghsa-g636-hw74-5gw3 |
|
Cross Site Scripting vulnerability in Altenar Sportsbook Software Platform (SB2) v.2.0 allows a rem… | 2026-04-10T15:31:58Z | 2026-04-10T15:31:58Z |
| ghsa-g288-xp64-f3j7 |
|
PHP-MYSQL-User-Login-System v1.0 was discovered to contain a SQL injection vulnerability via the us… | 2026-04-10T15:31:58Z | 2026-04-10T15:31:58Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-34 |
9.8 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6-server | 2024-01-30T16:15:00+00:00 | 2024-02-08T20:20:16.896186+00:00 |
| pysec-2024-33 |
9.8 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6-node | 2024-01-30T16:15:00+00:00 | 2024-02-08T20:20:16.842528+00:00 |
| pysec-2024-32 |
4.3 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6 | 2024-01-30T16:15:00+00:00 | 2024-02-08T18:22:28.342089+00:00 |
| pysec-2024-31 |
3.7 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6 | 2024-01-30T16:15:00+00:00 | 2024-02-08T18:22:28.276390+00:00 |
| pysec-2024-30 |
8.8 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6 | 2024-01-30T16:15:00+00:00 | 2024-02-08T18:22:28.210087+00:00 |
| pysec-2024-25 |
9.8 (3.1)
|
DuckDB <=0.9.2 and DuckDB extension-template <=0.9.2 are vulnerable to malicious extensio… | duckdb | 2024-01-30T01:16:00+00:00 | 2024-02-06T00:25:51.550516+00:00 |
| pysec-2024-27 |
9.8 (3.1)
|
CrateDB 5.5.1 is contains an authentication bypass vulnerability in the Admin UI componen… | crate | 2024-01-30T01:15:00Z | 2025-01-30T22:47:57.847403Z |
| pysec-2024-26 |
6.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-… | aiohttp | 2024-01-29T23:15:00+00:00 | 2024-02-06T20:20:18.162431+00:00 |
| pysec-2024-24 |
7.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When usin… | aiohttp | 2024-01-29T23:15:00+00:00 | 2024-02-05T20:20:47.716944+00:00 |
| pysec-2024-21 |
8.8 (3.1)
|
A vulnerability classified as critical was found in van_der_Schaar LAB TemporAI 0.0.3. Af… | temporai | 2024-01-26T17:15:00+00:00 | 2024-02-01T18:22:23.971296+00:00 |
| pysec-2024-14 |
|
Apache Airflow, versions before 2.8.1, have a vulnerability that allows an authenticated … | apache-airflow | 2024-01-24T13:15:00+00:00 | 2024-01-24T16:22:57.416385+00:00 |
| pysec-2024-13 |
|
Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attac… | apache-airflow | 2024-01-24T13:15:00+00:00 | 2024-01-24T16:22:57.352530+00:00 |
| pysec-2024-128 |
6.1 (3.1)
|
Label Studio, an open source data labeling tool had a remote import feature allowed users… | label-studio | 2024-01-24T00:15:00+00:00 | 2024-11-21T14:22:53.406222+00:00 |
| pysec-2024-126 |
5.4 (3.1)
|
Label Studio is an a popular open source data labeling tool. Versions prior to 1.9.2 have… | label-studio | 2024-01-23T23:15:00+00:00 | 2024-11-21T14:22:53.235341+00:00 |
| pysec-2024-23 |
5.3 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. Versions 0.8.3 and prior have a limite… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-02-02T07:18:33.382718+00:00 |
| pysec-2024-22 |
6.1 (3.1)
|
TuiTse-TsuSin is a package for organizing the comparative corpus of Taiwanese Chinese cha… | tuitse-tsusin | 2024-01-23T18:15:00+00:00 | 2024-02-01T22:21:01.486817+00:00 |
| pysec-2024-20 |
9.8 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. In versions prior to 0.8.4, the `eleme… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-01-30T18:22:32.803340+00:00 |
| pysec-2024-19 |
6.1 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. In versions 0.8.3 and prior, the `elem… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-01-29T22:21:01.226431+00:00 |
| pysec-2024-18 |
9.8 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. In versions 0.8.3 and prior, the `wind… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-01-29T22:21:01.170723+00:00 |
| pysec-2024-16 |
5.4 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2024-01-23T00:15:00+00:00 | 2024-01-29T20:20:58.065227+00:00 |
| pysec-2024-9 |
|
MetaGPT through 0.6.4 allows the QaEngineer role to execute arbitrary code because RunCod… | metagpt | 2024-01-22T01:15:00+00:00 | 2024-01-22T07:20:28.329958+00:00 |
| pysec-2024-12 |
|
LlamaIndex (aka llama_index) through 0.9.34 allows SQL injection via the Text-to-SQL feat… | llama-index | 2024-01-22T01:15:00Z | 2024-02-10T01:22:25.611009Z |
| pysec-2024-8 |
|
The JSON loader in Embedchain before 0.1.57 allows a ReDoS (regular expression denial of … | embedchain | 2024-01-21T17:15:00+00:00 | 2024-01-21T20:21:00.544327+00:00 |
| pysec-2024-7 |
|
The OpenAPI loader in Embedchain before 0.1.57 allows attackers to execute arbitrary code… | embedchain | 2024-01-21T17:15:00+00:00 | 2024-01-21T20:21:00.484037+00:00 |
| pysec-2024-15 |
3.7 (3.1)
|
changedetection.io is an open source tool designed to monitor websites for content chang… | changedetection-io | 2024-01-19T20:15:00+00:00 | 2024-01-26T22:21:10.756741+00:00 |
| pysec-2024-103 |
9.8 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. The `concat… | vyper | 2024-01-18T19:15:00+00:00 | 2024-10-09T23:22:49.818476+00:00 |
| pysec-2024-17 |
8.8 (3.1)
|
pyLoad is a free and open-source Download Manager written in pure Python. The `pyload` AP… | pyload-ng | 2024-01-18T00:15:00+00:00 | 2024-01-29T20:20:58.389168+00:00 |
| pysec-2024-11 |
9.8 (3.1)
|
Remote Code Execution vulnerability in Apache IoTDB.This issue affects Apache IoTDB: from… | apache-iotdb | 2024-01-15T11:15:00+00:00 | 2024-01-22T22:21:02.620877+00:00 |
| pysec-2024-10 |
9.8 (3.1)
|
In Gentoo Portage before 3.0.47, there is missing PGP validation of executed code: the st… | portage | 2024-01-12T03:15:00+00:00 | 2024-01-22T18:22:47.599296+00:00 |
| pysec-2024-6 |
2.8 (3.1)
|
cdo-local-uuid project provides a specialized UUID-generating function that can, on user … | cdo-local-uuid | 2024-01-11T03:15:00+00:00 | 2024-01-19T22:21:07.454006+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2211 | Malicious code in @opengov/form-renderer (npm) | 2026-03-26T00:33:27Z | 2026-04-07T23:28:28Z |
| mal-2026-2210 | Malicious code in @opengov/form-builder (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:12:00Z |
| mal-2026-2209 | Malicious code in @emilgroup/translation-sdk-node (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:12:00Z |
| mal-2026-2208 | Malicious code in @emilgroup/setting-sdk (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:12:00Z |
| mal-2026-2207 | Malicious code in @emilgroup/process-manager-sdk-node (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:12:00Z |
| mal-2026-2206 | Malicious code in @emilgroup/process-manager-sdk (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:12:00Z |
| mal-2026-2205 | Malicious code in @emilgroup/partner-sdk (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:11:59Z |
| mal-2026-2204 | Malicious code in @emilgroup/numbergenerator-sdk-node (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:11:59Z |
| mal-2026-2203 | Malicious code in @emilgroup/discount-sdk-node (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:11:59Z |
| mal-2026-2202 | Malicious code in @emilgroup/commission-sdk (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:11:59Z |
| mal-2026-2220 | Malicious code in @universeorg/dotenv (npm) | 2026-03-26T00:31:20Z | 2026-03-31T03:12:00Z |
| mal-2026-2217 | Malicious code in @rexorg/config (npm) | 2026-03-26T00:31:20Z | 2026-03-31T03:12:00Z |
| mal-2026-2200 | Malicious code in json-lucide (npm) | 2026-03-25T16:45:38Z | 2026-03-31T03:12:02Z |
| mal-2026-2199 | Malicious code in omicnavigatorwebapp (npm) | 2026-03-25T15:03:25Z | 2026-03-31T03:12:03Z |
| mal-2026-2198 | Malicious code in omaronsec (npm) | 2026-03-25T15:03:25Z | 2026-03-31T03:12:03Z |
| mal-2026-2196 | Malicious code in tailwind-compile (npm) | 2026-03-25T14:20:59Z | 2026-03-31T03:12:05Z |
| mal-2026-2195 | Malicious code in super-alias (npm) | 2026-03-25T14:14:18Z | 2026-03-31T03:12:04Z |
| mal-2026-2194 | Malicious code in ffsixx (npm) | 2026-03-25T14:14:18Z | 2026-03-31T03:12:01Z |
| mal-2026-2193 | Malicious code in @sixcore/baileys (npm) | 2026-03-25T14:14:18Z | 2026-03-31T03:12:00Z |
| mal-2026-2192 | Malicious code in changelog-utils-wrapper (npm) | 2026-03-25T12:42:22Z | 2026-03-31T03:12:01Z |
| mal-2026-2191 | Malicious code in changelog-utils-logger (npm) | 2026-03-25T12:42:22Z | 2026-03-31T03:12:01Z |
| mal-2026-2190 | Malicious code in ts-bign (npm) | 2026-03-25T11:59:23Z | 2026-03-31T03:12:05Z |
| mal-2026-2188 | Malicious code in levex-refa (npm) | 2026-03-25T11:59:23Z | 2026-03-31T03:12:03Z |
| mal-2026-2189 | Malicious code in simple-util-kit (npm) | 2026-03-25T11:38:55Z | 2026-03-31T03:12:04Z |
| mal-2026-2187 | Malicious code in vision-service-python-client-internal (PyPI) | 2026-03-25T06:58:31Z | 2026-03-25T06:58:31Z |
| mal-2026-2186 | Malicious code in vision-service-python-client (PyPI) | 2026-03-25T06:56:22Z | 2026-03-25T06:56:22Z |
| mal-2026-2185 | Malicious code in hy-api-utilities (PyPI) | 2026-03-25T06:54:07Z | 2026-03-25T06:54:07Z |
| mal-2026-2184 | Malicious code in auth0-ai-ms-agent (PyPI) | 2026-03-25T06:52:53Z | 2026-03-25T06:52:53Z |
| mal-2026-2177 | Malicious code in linting (PyPI) | 2026-03-25T05:07:06Z | 2026-03-25T05:07:06Z |
| mal-2026-2183 | Malicious code in yeshsurya (PyPI) | 2026-03-25T05:06:58Z | 2026-03-25T05:06:58Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0119 | Linux Kernel: Mehrere Schwachstellen | 2026-01-14T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0118 | GNU libc: Schwachstelle ermöglicht Codeausführung | 2026-01-14T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0116 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-14T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0114 | Red Hat OpenShift (github.com/sirupsen/logrus): Schwachstelle ermöglicht Denial of Service | 2026-01-14T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0111 | FreeRDP: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0106 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0105 | Red Hat Developer Hub: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0098 | Node.js: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0096 | Google Android Pixel: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-01-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0090 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0088 | Fortinet FortiSandbox: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-01-13T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0086 | Linux Kernel: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0083 | Microsoft Windows : Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0081 | Microsoft Office Produkte: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-03-22T23:00:00.000+00:00 |
| wid-sec-w-2026-0080 | Microsoft Azure: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0068 | libpng (API-Funktionen): Mehrere Schwachstellen ermöglichen DoS und Offenlegung von Informationen | 2026-01-12T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0066 | avahi-daemon: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-12T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0062 | Red Hat Enterprise Linux (libsoup): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und Datenmanipulation | 2026-01-11T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0056 | MailPit: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-11T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0047 | CoreDNS: Schwachstelle ermöglicht Denial of Service | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0044 | libtasn1: Schwachstelle ermöglicht Denial of Service | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0043 | Trend Micro Apex Central: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0041 | Cisco Firewall Threat Defense, IOS XE und Meraki MX: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0040 | n8n: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0037 | GitLab CE und EE: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2026-0036 | OpenLDAP: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0035 | MediaWiki Erweiterungen: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2026-0034 | Keycloak: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-01-07T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2026-0030 | cURL: Mehrere Schwachstellen | 2026-01-06T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0026 | HCL BigFix: Mehrere Schwachstellen | 2026-01-06T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-259-04 | Siemens RUGGEDCOM, SINEC NMS, and SINEMA | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-03 | Siemens SIMATIC NET CP, SINEMA and SCALANCE | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-02 | Hitachi Energy RTU500 series | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| va-25-259-01 | CISA Thorium multiple vulnerabilities | 2025-09-16T00:00:00Z | 2025-09-16T00:00:00Z |
| va-25-258-01 | psPAS does not enforce TLS 1.2 within Get-PASSAMLResponse | 2025-09-15T18:41:08Z | 2025-09-15T18:41:08Z |
| icsa-25-254-10 | Daikin Europe N.V Security Gateway | 2025-09-11T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| va-25-252-01 | OPEXUS FOIAXpress Public Access Link (PAL) SQL injection | 2025-09-09T20:48:26Z | 2025-09-09T20:48:26Z |
| icsa-25-252-09 | Rockwell Automation 1783-NATR | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-08 | Rockwell Automation Analytics LogixAI | 2025-09-09T06:00:00.000000Z | 2025-10-10T06:00:00.000000Z |
| icsa-25-252-07 | Rockwell Automation ControlLogix 5580 | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-06 | Rockwell Automation CompactLogix® 5480 | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-05 | Rockwell Automation FactoryTalk Activation Manager | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-04 | Rockwell Automation FactoryTalk Optix | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-03 | Rockwell Automation Stratix IOS | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-01 | Rockwell Automation ThinManager | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-02 | ABB Cylon Aspect BMS/BAS | 2025-09-09T05:00:00.000000Z | 2025-09-09T05:00:00.000000Z |
| icsa-25-259-01 | Schneider Electric Altivar products ATVdPAC module ILC992 InterLink Converter (Update A) | 2025-09-09T04:00:00.000000Z | 2025-10-14T07:00:00.000000Z |
| icsa-25-254-07 | Siemens User Management Component (UMC) | 2025-09-09T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-254-06 | Siemens Industrial Edge Management | 2025-09-09T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| icsa-25-254-05 | Siemens Apogee PXC and Talon TC Devices | 2025-09-09T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| icsa-25-254-04 | Siemens SINEC OS | 2025-09-09T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| icsa-25-254-03 | Siemens SINAMICS Drives | 2025-09-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-254-02 | Siemens SIMATIC Virtualization as a Service (SIVaaS) | 2025-09-09T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| icsa-25-254-01 | Siemens SIMOTION Tools | 2025-09-09T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| icsa-25-245-03 | SunPower PVS6 | 2025-09-02T06:00:00.000000Z | 2025-09-02T06:00:00.000000Z |
| icsa-25-245-02 | Fuji Electric FRENIC-Loader 4 | 2025-09-02T06:00:00.000000Z | 2025-09-02T06:00:00.000000Z |
| icsa-25-245-01 | Delta Electronics EIP Builder | 2025-09-02T06:00:00.000000Z | 2025-09-02T06:00:00.000000Z |
| icsa-25-240-06 | GE Vernova CIMPLICITY | 2025-08-28T06:00:00.000000Z | 2025-08-28T06:00:00.000000Z |
| icsa-25-240-05 | Delta Electronics COMMGR | 2025-08-28T06:00:00.000000Z | 2025-08-28T06:00:00.000000Z |
| icsa-25-240-04 | Delta Electronics CNCSoft-G2 | 2025-08-28T06:00:00.000000Z | 2025-08-28T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ftd-tls-dos-qxye5ufy | Cisco Firepower Threat Defense Software for Firepower 2100 Series TLS Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-statcred-dfc8txt5 | Cisco Firepower Threat Defense Software for Firepower 1000, 2100, 3100, and 4200 Series Static Credential Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-geoip-bypass-mb4zrdu | Cisco Firepower Threat Defense Software Geolocation ACL Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-xss-infodisc-rl4mjfer | Cisco Secure Firewall Management Center Software Cross-Site Scripting and Information Disclosure Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-24T11:52:38+00:00 |
| cisco-sa-fmc-xss-dhjxqyzs | Cisco Secure Firewall Management Center Software Cross-Site Scripting Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-sql-inject-2enmtc8v | Cisco Secure Firewall Management Center Software SQL Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2026-03-04T16:11:01+00:00 |
| cisco-sa-fmc-sql-inj-loyafcfq | Cisco Secure Firewall Management Center Software SQL Injection Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-priv-esc-cmq4s6m7 | Cisco Secure Firewall Management Center Privilege Escalation Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-html-inj-nfjeyhxz | Cisco Secure Firewall Management Center Software HTML Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-file-read-5q4mqrn | Cisco Secure Firewall Management Center Software Arbitrary File Read Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-v3awdqn7 | Cisco Secure Firewall Management Center Software Command Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-g8aokndp | Cisco Secure Firewall Management Center Software Cluster Backup Command Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-2hbka97g | Cisco Secure Firewall Management Center Software Command Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-csc-dos-xvphm3bj | Cisco Secure Client Software Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftdvirtual-dos-muengnyr | Cisco Adaptive Security Virtual Appliance and Secure Firewall Threat Defense Virtual SSL VPN Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-xss-yjj7zjvq | Cisco Adaptive Security Appliance and Firepower Threat Defense Software VPN Web Client Services Cross-Site Scripting Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-webvpn-dos-honb9ph4 | Cisco Adaptive Security Appliance and Firepower Threat Defense Software SSL VPN Memory Management Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-snmp-dos-7tcnzxtu | Cisco Adaptive Security Appliance and Firepower Threat Defense Software SNMP Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-persist-lce-vu3ekmj3 | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-nsgacl-bypass-77xneasl | Cisco Adaptive Security Appliance and Firepower Threat Defense Software NSG Access Control List Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-ikev2-dos-9fgeyhsf | Cisco Adaptive Security Appliance and Firepower Threat Defense Software IKEv2 VPN Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-dap-dos-bhekp7n | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Dynamic Access Policies Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-bf-dos-vdzhlqrw | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access VPN Brute Force Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-acl-bypass-vvnlnkqf | Cisco Adaptive Security Appliance and Firepower Threat Defense Software AnyConnect Access Control List Bypass Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-24T21:19:17+00:00 |
| cisco-sa-asa-vpn-nyh3fhp | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access SSL VPN Authentication Targeted Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-czf8gt | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access VPN Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-4gyewmkg | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access SSL VPN Authentication Targeted Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-tls-cwy6zxb | Cisco Adaptive Security Appliance and Firepower Threat Defense Software TLS Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ssh-rce-graupeuf | Cisco Adaptive Security Appliance Software SSH Remote Command Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ssh-dos-eedwu5rm | Cisco Adaptive Security Appliance Software SSH Server Resource Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-32141 | flatted: Unbounded recursion DoS in parse() revive phase | 2026-03-02T00:00:00.000Z | 2026-03-27T01:42:47.000Z |
| msrc_cve-2026-31802 | node-tar Symlink Path Traversal via Drive-Relative Linkpath | 2026-03-02T00:00:00.000Z | 2026-03-14T01:01:17.000Z |
| msrc_cve-2026-3119 | Authenticated query containing a TKEY record may cause named to terminate unexpectedly | 2026-03-02T00:00:00.000Z | 2026-03-31T14:59:03.000Z |
| msrc_cve-2026-3104 | Memory leak in code preparing DNSSEC proofs of non-existence | 2026-03-02T00:00:00.000Z | 2026-03-31T14:58:37.000Z |
| msrc_cve-2026-3099 | Libsoup: libsoup: authentication bypass via digest authentication replay attack | 2026-03-02T00:00:00.000Z | 2026-03-31T15:12:03.000Z |
| msrc_cve-2026-30922 | pyasn1 Vulnerable to Denial of Service via Unbounded Recursion | 2026-03-02T00:00:00.000Z | 2026-03-31T15:08:36.000Z |
| msrc_cve-2026-29786 | node-tar: Hardlink Path Traversal via Drive-Relative Linkpath | 2026-03-02T00:00:00.000Z | 2026-03-11T01:02:00.000Z |
| msrc_cve-2026-29785 | NATS Server panic via malicious compression on leafnode port | 2026-03-02T00:00:00.000Z | 2026-04-08T01:38:58.000Z |
| msrc_cve-2026-29111 | systemd: Local unprivileged user can trigger an assert | 2026-03-02T00:00:00.000Z | 2026-04-02T01:38:20.000Z |
| msrc_cve-2026-28755 | NGINX ngx_stream_ssl_module vulnerability | 2026-03-02T00:00:00.000Z | 2026-03-28T14:38:55.000Z |
| msrc_cve-2026-28753 | NGINX ngx_mail_proxy_module vulnerability | 2026-03-02T00:00:00.000Z | 2026-03-28T14:38:41.000Z |
| msrc_cve-2026-27784 | NGINX ngx_http_mp4_module vulnerability | 2026-03-02T00:00:00.000Z | 2026-03-28T14:38:34.000Z |
| msrc_cve-2026-27654 | NGINX ngx_http_dav_module vulnerability | 2026-03-02T00:00:00.000Z | 2026-03-28T14:38:27.000Z |
| msrc_cve-2026-27651 | NGINX ngx_mail_auth_http_module vulnerability | 2026-03-02T00:00:00.000Z | 2026-03-28T14:38:21.000Z |
| msrc_cve-2026-27601 | Underscore.js has unlimited recursion in _.flatten and _.isEqual, potential for DoS attack | 2026-03-02T00:00:00.000Z | 2026-03-17T14:38:08.000Z |
| msrc_cve-2026-27459 | pyOpenSSL DTLS cookie callback buffer overflow | 2026-03-02T00:00:00.000Z | 2026-03-21T01:37:02.000Z |
| msrc_cve-2026-27448 | pyOpenSSL allows TLS connection bypass via unhandled callback exception in set_tlsext_servername_callback | 2026-03-02T00:00:00.000Z | 2026-03-21T01:36:53.000Z |
| msrc_cve-2026-27142 | URLs in meta content attribute actions are not escaped in html/template | 2026-03-02T00:00:00.000Z | 2026-03-31T14:44:03.000Z |
| msrc_cve-2026-27139 | FileInfo can escape from a Root in os | 2026-03-02T00:00:00.000Z | 2026-03-31T14:42:35.000Z |
| msrc_cve-2026-27138 | Panic in name constraint checking for malformed certificates in crypto/x509 | 2026-03-02T00:00:00.000Z | 2026-03-14T01:37:26.000Z |
| msrc_cve-2026-27137 | Incorrect enforcement of email constraints in crypto/x509 | 2026-03-02T00:00:00.000Z | 2026-03-14T01:37:36.000Z |
| msrc_cve-2026-27135 | nghttp2 Denial of service: Assertion failure due to the missing state validation | 2026-03-02T00:00:00.000Z | 2026-03-27T01:41:20.000Z |
| msrc_cve-2026-2673 | OpenSSL TLS 1.3 server may choose unexpected key agreement group | 2026-03-02T00:00:00.000Z | 2026-04-09T01:38:04.000Z |
| msrc_cve-2026-2646 | Heap buffer overflow in session parsing with wolfSSL_d2i_SSL_SESSION() function | 2026-03-02T00:00:00.000Z | 2026-03-31T15:16:19.000Z |
| msrc_cve-2026-2645 | Acceptance of CertificateVerify Message before ClientKeyExchange in TLS 1.2 | 2026-03-02T00:00:00.000Z | 2026-03-31T15:16:05.000Z |
| msrc_cve-2026-26018 | CoreDNS Loop Detection Denial of Service Vulnerability | 2026-03-02T00:00:00.000Z | 2026-03-14T01:37:01.000Z |
| msrc_cve-2026-26017 | CoreDNS ACL Bypass | 2026-03-02T00:00:00.000Z | 2026-03-14T01:36:50.000Z |
| msrc_cve-2026-25679 | Incorrect parsing of IPv6 host literals in net/url | 2026-03-02T00:00:00.000Z | 2026-03-27T01:38:09.000Z |
| msrc_cve-2026-25645 | Requests has Insecure Temp File Reuse in its extract_zipped_paths() utility function | 2026-03-02T00:00:00.000Z | 2026-03-31T15:01:09.000Z |
| msrc_cve-2026-25075 | strongSwan 4.5.0 < 6.0.5 EAP-TTLS AVP Parsing Integer Underflow | 2026-03-02T00:00:00.000Z | 2026-03-27T01:42:01.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0246 | Kwetsbaarheden verholpen in Siemens producten | 2025-08-12T13:03:08.211775Z | 2025-08-12T13:03:08.211775Z |
| ncsc-2025-0245 | Kwetsbaarheden verholpen in SAP producten | 2025-08-12T11:10:21.111816Z | 2025-09-05T11:12:05.722381Z |
| ncsc-2025-0244 | Kwetsbaarheid verholpen in WinRAR | 2025-08-11T07:36:12.848669Z | 2025-08-11T07:36:12.848669Z |
| ncsc-2025-0243 | Kwetsbaarheid verholpen in Microsoft Exchange | 2025-08-07T09:15:22.461434Z | 2025-08-07T09:15:22.461434Z |
| ncsc-2025-0242 | Kwetsbaarheden verholpen in Trend Micro Apex One | 2025-08-06T13:21:03.156432Z | 2025-08-06T13:21:03.156432Z |
| ncsc-2025-0241 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-08-06T12:11:46.234849Z | 2025-10-17T10:44:55.312550Z |
| ncsc-2025-0240 | Kwetsbaarheden verholpen in Rockwell Automation Arena | 2025-08-06T07:55:23.705278Z | 2025-08-06T07:55:23.705278Z |
| ncsc-2025-0239 | Kwetsbaarheid verholpen in SonicWall SonicOS | 2025-07-31T11:12:42.653547Z | 2025-07-31T11:12:42.653547Z |
| ncsc-2025-0238 | Kwetsbaarheden verholpen in Apple macOS, iOS en iPadOS | 2025-07-30T13:02:51.663320Z | 2025-07-30T13:02:51.663320Z |
| ncsc-2025-0237 | Kwetsbaarheden verholpen in Autodesk AutoCAD | 2025-07-30T08:04:31.603165Z | 2025-07-30T08:04:31.603165Z |
| ncsc-2025-0236 | Kwetsbaarheden verholpen in Salesforce Tableau Server | 2025-07-28T07:52:42.872259Z | 2025-07-28T07:52:42.872259Z |
| ncsc-2025-0235 | Kwetsbaarheden verholpen in Firefox en Thunderbird | 2025-07-23T13:01:45.118883Z | 2025-07-23T13:01:45.118883Z |
| ncsc-2025-0234 | Kwetsbaarheid verholpen in CrushFTP | 2025-07-21T08:34:35.304610Z | 2025-08-28T07:59:34.275023Z |
| ncsc-2025-0233 | Zeroday-kwetsbaarheden ontdekt in Microsoft SharePoint Server | 2025-07-20T08:34:22.645952Z | 2025-07-23T15:31:20.529389Z |
| ncsc-2025-0232 | Kwetsbaarheid verholpen in Keycloak | 2025-07-18T13:12:14.074394Z | 2025-07-18T13:12:14.074394Z |
| ncsc-2025-0231 | Kwetsbaarheden verholpen in XWiki | 2025-07-17T12:35:48.998487Z | 2025-07-17T12:35:48.998487Z |
| ncsc-2025-0230 | Kwetsbaarheid verholpen in Wing FTP Server | 2025-07-14T06:06:24.154078Z | 2025-07-14T06:06:24.154078Z |
| ncsc-2025-0229 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2025-07-11T10:01:48.229418Z | 2025-07-11T10:01:48.229418Z |
| ncsc-2025-0228 | Kwetsbaarheden verholpen in Zoom Clients | 2025-07-11T09:58:21.871103Z | 2025-07-11T09:58:21.871103Z |
| ncsc-2025-0227 | Kwetsbaarheid verholpen in Juniper SRX300 Series | 2025-07-11T09:57:40.476096Z | 2025-07-11T09:57:40.476096Z |
| ncsc-2025-0226 | Kwetsbaarheid verholpen in FortiWeb | 2025-07-11T09:57:23.588152Z | 2025-07-11T13:20:55.101692Z |
| ncsc-2025-0225 | Kwetsbaarheid verholpen in Juniper Networks Security Director | 2025-07-11T09:55:46.934253Z | 2025-07-11T09:55:46.934253Z |
| ncsc-2025-0224 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-07-09T08:57:08.548822Z | 2025-07-09T08:57:08.548822Z |
| ncsc-2025-0223 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-07-09T08:47:38.891072Z | 2025-07-09T08:47:38.891072Z |
| ncsc-2025-0222 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2025-07-09T08:41:53.656736Z | 2025-07-09T08:41:53.656736Z |
| ncsc-2025-0221 | Kwetsbaarheden verholpen in Schneider Electric EcoStruxture IT Datacenter Expert | 2025-07-09T08:38:05.336146Z | 2025-07-09T08:38:05.336146Z |
| ncsc-2025-0220 | Kwetsbaarheden verholpen in Palo Alto PAN-OS | 2025-07-09T08:33:14.284978Z | 2025-07-09T08:33:14.284978Z |
| ncsc-2025-0219 | Kwetsbaarheden verholpen in SAP producten | 2025-07-09T08:29:00.474865Z | 2025-07-09T08:29:00.474865Z |
| ncsc-2025-0218 | Kwetsbaarheden verholpen in Microsoft Edge (Chromium based) | 2025-07-08T18:26:55.812717Z | 2025-07-08T18:26:55.812717Z |
| ncsc-2025-0217 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2025-07-08T18:26:14.881161Z | 2025-07-08T18:26:14.881161Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10339-1 | ruby4.0-rubygem-actiontext-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10338-1 | ruby4.0-rubygem-actionpack-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10337-1 | ruby4.0-rubygem-actionmailer-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10336-1 | ruby4.0-rubygem-actionmailbox-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10335-1 | ruby4.0-rubygem-actioncable-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10334-1 | python311-pypdf-6.8.0-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10333-1 | python311-multipart-1.3.1-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10332-1 | python311-PyPDF2-2.11.1-7.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10331-1 | mingw64-binutils-2.45.1-2.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10330-1 | mingw32-binutils-2.45.1-2.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10329-1 | kubelogin-0.2.16-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10328-1 | himmelblau-2.3.8+git0.dec3693-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10327-1 | heroic-games-launcher-2.20.1-3.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10326-1 | giflib-devel-32bit-5.2.2-3.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10325-1 | clamav-1.5.2-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10324-1 | MozillaFirefox-148.0.2-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:20361-1 | Security update for osc, obs-scm-bridge | 2026-03-12T20:54:40Z | 2026-03-12T20:54:40Z |
| opensuse-su-2026:20351-1 | Security update for amazon-ssm-agent | 2026-03-12T13:46:52Z | 2026-03-12T13:46:52Z |
| opensuse-su-2026:20350-1 | Security update for tomcat | 2026-03-12T13:46:00Z | 2026-03-12T13:46:00Z |
| opensuse-su-2026:20348-1 | Security update for python-PyPDF2 | 2026-03-11T20:15:02Z | 2026-03-11T20:15:02Z |
| opensuse-su-2026:20345-1 | Security update for python-lxml_html_clean | 2026-03-11T18:05:18Z | 2026-03-11T18:05:18Z |
| opensuse-su-2026:20342-1 | Security update for go1.26 | 2026-03-11T09:09:25Z | 2026-03-11T09:09:25Z |
| opensuse-su-2026:20341-1 | Security update for kea | 2026-03-11T08:51:21Z | 2026-03-11T08:51:21Z |
| opensuse-su-2026:20340-1 | Security update for cJSON | 2026-03-11T08:21:26Z | 2026-03-11T08:21:26Z |
| opensuse-su-2026:20339-1 | Security update for freerdp | 2026-03-10T12:34:56Z | 2026-03-10T12:34:56Z |
| opensuse-su-2026:10323-1 | traefik-3.6.10-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10322-1 | python311-lxml_html_clean-0.4.4-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10321-1 | python311-PyPDF2-2.11.1-6.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10320-1 | perl-Compress-Raw-Zlib-2.222-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10319-1 | helm3-3.20.0-2.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:5133 | Red Hat Security Advisory: OpenShift Container Platform 4.18.36 bug fix and security update | 2026-03-25T04:30:22+00:00 | 2026-04-13T08:35:29+00:00 |
| rhsa-2026:5727 | Red Hat Security Advisory: kernel security update | 2026-03-25T04:12:26+00:00 | 2026-04-12T16:35:25+00:00 |
| rhsa-2026:5692 | Red Hat Security Advisory: kernel security update | 2026-03-25T01:02:55+00:00 | 2026-04-13T06:22:40+00:00 |
| rhsa-2026:5691 | Red Hat Security Advisory: kernel security update | 2026-03-25T00:45:50+00:00 | 2026-04-12T16:35:25+00:00 |
| rhsa-2026:5689 | Red Hat Security Advisory: kernel security update | 2026-03-25T00:38:16+00:00 | 2026-04-08T13:33:48+00:00 |
| rhsa-2026:5693 | Red Hat Security Advisory: kernel security update | 2026-03-25T00:32:45+00:00 | 2026-04-08T13:33:49+00:00 |
| rhsa-2026:5690 | Red Hat Security Advisory: kernel-rt security update | 2026-03-25T00:24:00+00:00 | 2026-04-13T08:42:32+00:00 |
| rhsa-2026:5665 | Red Hat Security Advisory: Red Hat Quay 3.10.19 | 2026-03-24T18:02:58+00:00 | 2026-04-13T09:29:01+00:00 |
| rhsa-2026:5649 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-03-24T16:17:51+00:00 | 2026-04-13T08:44:16+00:00 |
| rhsa-2026:5645 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.17.1 | 2026-03-24T15:38:55+00:00 | 2026-04-13T09:31:28+00:00 |
| rhsa-2026:5640 | Red Hat Security Advisory: mysql:8.4 security update | 2026-03-24T15:07:28+00:00 | 2026-04-02T16:36:36+00:00 |
| rhsa-2026:5636 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.7.9 security update | 2026-03-24T14:23:47+00:00 | 2026-04-13T09:31:27+00:00 |
| rhsa-2026:5174 | Red Hat Security Advisory: OpenShift Container Platform 4.21.7 bug fix and security update | 2026-03-24T14:21:18+00:00 | 2026-04-07T13:25:34+00:00 |
| rhsa-2026:5633 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.12.8 security update | 2026-03-24T14:07:27+00:00 | 2026-04-13T08:42:28+00:00 |
| rhsa-2026:5578 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update | 2026-03-24T10:56:42+00:00 | 2026-03-24T13:02:45+00:00 |
| rhsa-2026:5602 | Red Hat Security Advisory: vim security update | 2026-03-24T10:45:32+00:00 | 2026-04-10T14:25:21+00:00 |
| rhsa-2026:5603 | Red Hat Security Advisory: opencryptoki security update | 2026-03-24T10:44:47+00:00 | 2026-03-30T11:10:27+00:00 |
| rhsa-2026:5587 | Red Hat Security Advisory: opencryptoki security update | 2026-03-24T10:40:27+00:00 | 2026-03-30T11:10:27+00:00 |
| rhsa-2026:5585 | Red Hat Security Advisory: gnutls security update | 2026-03-24T10:39:38+00:00 | 2026-04-09T20:26:34+00:00 |
| rhsa-2026:5599 | Red Hat Security Advisory: nginx security update | 2026-03-24T10:39:27+00:00 | 2026-04-08T14:07:01+00:00 |
| rhsa-2026:5588 | Red Hat Security Advisory: python3 security update | 2026-03-24T10:39:22+00:00 | 2026-03-26T23:10:13+00:00 |
| rhsa-2026:5580 | Red Hat Security Advisory: mysql:8.0 security update | 2026-03-24T10:36:57+00:00 | 2026-04-02T16:36:36+00:00 |
| rhsa-2026:5581 | Red Hat Security Advisory: nginx:1.24 security update | 2026-03-24T10:36:22+00:00 | 2026-04-08T14:07:01+00:00 |
| rhsa-2026:5598 | Red Hat Security Advisory: 389-ds-base security update | 2026-03-24T10:16:47+00:00 | 2026-03-31T17:28:46+00:00 |
| rhsa-2026:5597 | Red Hat Security Advisory: 389-ds-base security update | 2026-03-24T10:03:12+00:00 | 2026-03-31T17:28:46+00:00 |
| rhsa-2026:5606 | Red Hat Security Advisory: Red Hat Ceph Storage | 2026-03-24T10:00:07+00:00 | 2026-04-09T23:06:54+00:00 |
| rhsa-2026:5576 | Red Hat Security Advisory: 389-ds:1.4 security update | 2026-03-24T09:51:12+00:00 | 2026-03-31T17:31:21+00:00 |
| rhsa-2026:5573 | Red Hat Security Advisory: ImageMagick security update | 2026-03-24T09:39:47+00:00 | 2026-03-24T18:09:02+00:00 |
| rhsa-2026:5569 | Red Hat Security Advisory: redhat-ds:12 security update | 2026-03-24T08:48:47+00:00 | 2026-03-31T17:31:21+00:00 |
| rhsa-2026:5568 | Red Hat Security Advisory: redhat-ds:11 security update | 2026-03-24T08:48:12+00:00 | 2026-03-31T17:31:22+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2018-095-01 | Security Notification - U.motion Builder software | 2018-04-05T00:00:00.000Z | 2020-02-11T00:00:00.000Z |
| sevd-2018-081-01 | Embedded FTP Servers for Modicon PAC Controllers | 2018-03-22T03:39:21.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2015-344-01 | GoAhead Web Server vulnerability | 2015-12-15T00:00:00.000Z | 2020-06-09T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-292022 | SSA-292022: Vulnerability in Nozomi Guardian/CMC before 23.4.1 on RUGGEDCOM APE1808 devices | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-273900 | SSA-273900: Multiple Vulnerabilities in SIMATIC CN 4100 before V3.0 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-258494 | SSA-258494: Stack Overflow Vulnerability in Simcenter Nastran before 2406.90 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-093430 | SSA-093430: Multiple Vulnerabilities in SIMATIC RTLS Locating Manager before V3.0 | 2024-05-14T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-046364 | SSA-046364: X_T File Parsing Vulnerabilities in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-750274 | SSA-750274: Impact of CVE-2024-3400 on RUGGEDCOM APE1808 devices configured with Palo Alto Networks Virtual NGFW | 2024-04-19T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-885980 | SSA-885980: Multiple Vulnerabilities in Scalance W1750D | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-822518 | SSA-822518: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW Before V11.0.1 on RUGGEDCOM APE1808 Devices | 2024-04-09T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-730482 | SSA-730482: Denial of Service Vulnerability in SIMATIC WinCC | 2024-04-09T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-556635 | SSA-556635: Multiple Vulnerabilities in Telecontrol Server Basic before V3.1.2.0 | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-455250 | SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.2-h3 | 2024-04-09T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-265688 | SSA-265688: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1 | 2024-04-09T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-222019 | SSA-222019: X_T File Parsing Vulnerabilities in Parasolid | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-128433 | SSA-128433: Multiple Vulnerabilities in SINEC NMS before V2.0 SP2 | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-918992 | SSA-918992: Unused HTTP Service on SENTRON 3KC ATC6 Ethernet Module | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-832273 | SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-792319 | SSA-792319: Missing Read Out Protection in SENTRON 7KM PAC3x20 Devices | 2024-03-12T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-770721 | SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-653855 | SSA-653855: Information Disclosure vulnerability in SINEMA Remote Connect Client before V3.1 SP1 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-576771 | SSA-576771: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-382651 | SSA-382651: File Parsing Vulnerability in Solid Edge | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-366067 | SSA-366067: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.1 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-353002 | SSA-353002: Multiple Vulnerabilities in SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family | 2024-03-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-225840 | SSA-225840: Vulnerabilities in the Network Communication Stack in Sinteso EN and Cerberus PRO EN Fire Protection Systems | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-145196 | SSA-145196: Authorization Bypass Vulnerability in Siveillance Control | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-943925 | SSA-943925: Multiple Vulnerabilities in SINEC NMS before V2.0 SP1 | 2024-02-13T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-871717 | SSA-871717: Multiple Vulnerabilities in Polarion ALM | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-806742 | SSA-806742: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-797296 | SSA-797296: XT File Parsing Vulnerability in Parasolid | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-753746 | SSA-753746: Denial of Service Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products | 2024-02-13T00:00:00Z | 2024-09-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20825-1 | Security update for salt | 2026-03-24T06:19:37Z | 2026-03-24T06:19:37Z |
| suse-su-2026:20820-1 | Security update for salt | 2026-03-24T05:49:23Z | 2026-03-24T05:49:23Z |
| suse-su-2026:20831-1 | Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-03-24T05:44:24Z | 2026-03-24T05:44:24Z |
| suse-su-2026:20830-1 | Security update for the Linux Kernel RT (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-03-24T05:43:06Z | 2026-03-24T05:43:06Z |
| suse-su-2026:20829-1 | Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-03-24T04:10:29Z | 2026-03-24T04:10:29Z |
| suse-su-2026:20828-1 | Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 16) | 2026-03-24T03:38:51Z | 2026-03-24T03:38:51Z |
| suse-su-2026:0987-1 | Security update for util-linux | 2026-03-24T03:11:26Z | 2026-03-24T03:11:26Z |
| suse-su-2026:0985-1 | Security update for the Linux Kernel (Live Patch 38 for SUSE Linux Enterprise 15 SP4) | 2026-03-23T23:24:41Z | 2026-03-23T23:24:41Z |
| suse-su-2026:0984-1 | Security update for the Linux Kernel | 2026-03-23T22:20:47Z | 2026-03-23T22:20:47Z |
| suse-su-2026:0983-1 | Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4) | 2026-03-23T17:08:57Z | 2026-03-23T17:08:57Z |
| suse-su-2026:0982-1 | Security update for util-linux | 2026-03-23T16:48:30Z | 2026-03-23T16:48:30Z |
| suse-su-2026:0981-1 | Security update for strongswan | 2026-03-23T16:47:22Z | 2026-03-23T16:47:22Z |
| suse-su-2026:0980-1 | Security update for strongswan | 2026-03-23T16:46:54Z | 2026-03-23T16:46:54Z |
| suse-su-2026:0979-1 | Security update for strongswan | 2026-03-23T16:46:31Z | 2026-03-23T16:46:31Z |
| suse-su-2026:0978-1 | Security update for strongswan | 2026-03-23T16:46:24Z | 2026-03-23T16:46:24Z |
| suse-su-2026:0977-1 | Security update for go1.25-openssl | 2026-03-23T16:35:10Z | 2026-03-23T16:35:10Z |
| suse-su-2026:0976-1 | Security update for go1.26-openssl | 2026-03-23T16:34:53Z | 2026-03-23T16:34:53Z |
| suse-su-2026:0975-1 | Security update for python-Authlib | 2026-03-23T16:34:37Z | 2026-03-23T16:34:37Z |
| suse-su-2026:0972-1 | Security update for docker-stable | 2026-03-23T15:21:42Z | 2026-03-23T15:21:42Z |
| suse-su-2026:0971-1 | Security update for python39 | 2026-03-23T14:35:04Z | 2026-03-23T14:35:04Z |
| suse-su-2026:0970-1 | Security update for the Linux Kernel (Live Patch 73 for SUSE Linux Enterprise 12 SP5) | 2026-03-23T14:34:54Z | 2026-03-23T14:34:54Z |
| suse-su-2026:0969-1 | Security update for freerdp | 2026-03-23T14:18:11Z | 2026-03-23T14:18:11Z |
| suse-su-2026:0968-1 | Security update for freerdp2 | 2026-03-23T14:18:05Z | 2026-03-23T14:18:05Z |
| suse-su-2026:0967-1 | Security update for the Linux Kernel (Live Patch 76 for SUSE Linux Enterprise 12 SP5) | 2026-03-23T14:04:34Z | 2026-03-23T14:04:34Z |
| suse-su-2026:0964-1 | Security update for the Linux Kernel (Live Patch 75 for SUSE Linux Enterprise 12 SP5) | 2026-03-23T13:05:59Z | 2026-03-23T13:05:59Z |
| suse-su-2026:20771-1 | Security update for sqlite3 | 2026-03-23T09:46:42Z | 2026-03-23T09:46:42Z |
| suse-su-2026:20923-1 | Security update for exiv2 | 2026-03-23T09:43:19Z | 2026-03-23T09:43:19Z |
| suse-su-2026:20770-1 | Security update for python-tornado6 | 2026-03-23T09:36:33Z | 2026-03-23T09:36:33Z |
| suse-su-2026:20797-1 | Security update for python-tornado6 | 2026-03-23T09:16:44Z | 2026-03-23T09:16:44Z |
| suse-su-2026:0962-1 | Security update for the Linux Kernel | 2026-03-23T09:09:02Z | 2026-03-23T09:09:02Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:1148 | Important: kernel-rt security update | 2026-01-26T00:00:00Z | 2026-01-26T13:52:56Z |
| alsa-2026:1143 | Important: kernel security update | 2026-01-26T00:00:00Z | 2026-01-30T09:51:59Z |
| alsa-2026:1142 | Important: kernel security update | 2026-01-26T00:00:00Z | 2026-01-26T13:49:21Z |
| alsa-2026:1089 | Important: python3.11-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:15:08Z |
| alsa-2026:1088 | Important: python3.12-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:17:27Z |
| alsa-2026:1087 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:19:22Z |
| alsa-2026:1086 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-26T13:16:32Z |
| alsa-2026:0933 | Important: java-25-openjdk security update | 2026-01-26T00:00:00Z | 2026-01-28T14:35:03Z |
| alsa-2026:0932 | Important: java-1.8.0-openjdk security update | 2026-01-26T00:00:00Z | 2026-01-29T13:07:43Z |
| alsa-2026:0991 | Moderate: glib2 security update | 2026-01-22T00:00:00Z | 2026-01-24T01:40:03Z |
| alsa-2026:0975 | Moderate: glib2 security update | 2026-01-22T00:00:00Z | 2026-01-23T23:34:09Z |
| alsa-2026:0928 | Important: java-21-openjdk security update | 2026-01-22T00:00:00Z | 2026-01-26T11:04:56Z |
| alsa-2026:0927 | Important: java-17-openjdk security update | 2026-01-22T00:00:00Z | 2026-01-24T01:52:06Z |
| alsa-2026:0936 | Moderate: glib2 security update | 2026-01-21T00:00:00Z | 2026-01-24T01:44:09Z |
| alsa-2026:0930 | Moderate: pcs security update | 2026-01-21T00:00:00Z | 2026-01-24T01:46:11Z |
| alsa-2026:0924 | Important: thunderbird security update | 2026-01-21T00:00:00Z | 2026-01-24T01:47:12Z |
| alsa-2026:0923 | Important: golang security update | 2026-01-21T00:00:00Z | 2026-01-24T01:54:58Z |
| alsa-2026:0922 | Important: golang security update | 2026-01-21T00:00:00Z | 2026-01-23T23:39:55Z |
| alsa-2026:0921 | Important: go-toolset:rhel8 security update | 2026-01-21T00:00:00Z | 2026-01-26T10:07:11Z |
| alsa-2026:0914 | Important: gimp security update | 2026-01-21T00:00:00Z | 2026-01-26T10:10:46Z |
| alsa-2026:0845 | Important: brotli security update | 2026-01-20T00:00:00Z | 2026-01-21T10:45:25Z |
| alsa-2026:0793 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-23T13:22:18Z |
| alsa-2026:0786 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-23T07:53:26Z |
| alsa-2026:0771 | Important: gpsd-minimal security update | 2026-01-19T00:00:00Z | 2026-01-20T11:54:05Z |
| alsa-2026:0770 | Important: gpsd security update | 2026-01-19T00:00:00Z | 2026-01-21T10:46:37Z |
| alsa-2026:0760 | Important: kernel-rt security update | 2026-01-19T00:00:00Z | 2026-01-20T08:13:58Z |
| alsa-2026:0759 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-20T08:07:16Z |
| alsa-2026:0756 | Moderate: transfig security update | 2026-01-19T00:00:00Z | 2026-01-19T10:24:15Z |
| alsa-2026:0753 | Important: container-tools:rhel8 security update | 2026-01-19T00:00:00Z | 2026-01-21T09:07:00Z |
| alsa-2026:0752 | Important: jmc security update | 2026-01-19T00:00:00Z | 2026-01-20T11:59:21Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-88 | Segv on unknown address in ___interceptor_free | 2025-02-02T00:16:16.201801Z | 2025-02-02T00:16:16.202130Z |
| osv-2025-85 | Segv on unknown address in ndpi_free_flow_data | 2025-02-02T00:13:42.076001Z | 2025-02-02T00:13:42.076373Z |
| osv-2025-84 | Segv on unknown address in Flow::processExtraDissectedInformation | 2025-02-02T00:12:09.563391Z | 2025-02-02T00:12:09.563778Z |
| osv-2025-81 | Segv on unknown address in ndpi_serialize_string_string | 2025-02-02T00:02:52.946833Z | 2025-02-02T00:02:52.947083Z |
| osv-2025-80 | Segv on unknown address in ndpi_snprintf | 2025-02-02T00:00:58.798346Z | 2025-02-02T00:00:58.798951Z |
| osv-2025-74 | Stack-buffer-overflow in xmlValidateElementContent | 2025-01-29T00:13:55.386256Z | 2025-01-29T00:13:55.386629Z |
| osv-2024-1427 | Heap-buffer-overflow in extract_mediaip | 2025-01-28T00:14:30.487391Z | 2025-03-18T00:41:33.426387Z |
| osv-2025-68 | UNKNOWN READ in std::__1::__function::__func<cv::PngDecoder::compose_frame | 2025-01-28T00:00:46.845996Z | 2025-02-05T14:25:02.989469Z |
| osv-2025-63 | Stack-buffer-underflow in gs_type1_interpret | 2025-01-27T00:10:00.833706Z | 2025-01-27T00:10:00.834151Z |
| osv-2025-62 | UNKNOWN READ in RDKit::Dict::reset | 2025-01-27T00:01:51.692636Z | 2026-03-06T14:31:24.229549Z |
| osv-2025-61 | Heap-buffer-overflow in oatpp::json::Utils::escapeString | 2025-01-27T00:00:09.905879Z | 2025-01-27T00:00:09.906561Z |
| osv-2024-1424 | Heap-buffer-overflow in extract_candidate | 2025-01-25T00:17:13.787335Z | 2025-01-25T14:25:05.188301Z |
| osv-2024-1423 | Security exception in java.base/java.util.Arrays.copyOfRange | 2025-01-25T00:03:24.362190Z | 2025-01-25T00:03:24.362579Z |
| osv-2025-54 | UNKNOWN READ in Assimp::SceneCombiner::CopyScene | 2025-01-22T00:15:23.827419Z | 2025-03-18T00:29:47.108675Z |
| osv-2025-52 | Use-of-uninitialized-value in icalmemory_strdup | 2025-01-22T00:07:34.573371Z | 2025-01-22T00:07:34.573823Z |
| osv-2025-51 | Heap-buffer-overflow in std::__1::__function::__func<cv::PngDecoder::compose_frame | 2025-01-22T00:03:50.355443Z | 2025-01-24T14:26:07.849301Z |
| osv-2025-50 | Heap-double-free in r_crbtree_free | 2025-01-20T00:16:43.389094Z | 2025-01-20T00:16:43.389604Z |
| osv-2025-45 | Security exception in POIHDGFFuzzer | 2025-01-19T00:14:10.746839Z | 2025-01-19T00:14:10.747322Z |
| osv-2025-42 | Heap-use-after-free in r_list_free | 2025-01-19T00:06:58.533546Z | 2025-01-19T00:06:58.534017Z |
| osv-2025-33 | UNKNOWN READ in pcpp::RawPacket::insertData | 2025-01-16T00:01:14.786268Z | 2025-10-22T18:25:08.281167Z |
| osv-2025-32 | UNKNOWN READ in std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<ch | 2025-01-16T00:01:09.535772Z | 2025-01-16T00:01:09.536403Z |
| osv-2025-31 | Heap-buffer-overflow in Assimp::FBXExporter::WriteObjects | 2025-01-15T00:14:05.357161Z | 2025-05-17T14:21:13.704657Z |
| osv-2025-17 | Heap-buffer-overflow in cv::PngDecoder::readHeader | 2025-01-08T00:14:02.009521Z | 2025-01-08T00:14:02.009997Z |
| osv-2025-16 | UNKNOWN READ in png_free_data | 2025-01-08T00:13:45.160139Z | 2025-01-08T00:13:45.160518Z |
| osv-2025-13 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-01-07T00:15:11.722974Z | 2025-01-07T00:15:11.723402Z |
| osv-2025-7 | Heap-buffer-overflow in oatpp::json::Utils::escapeUtf8Char | 2025-01-07T00:03:42.053605Z | 2025-01-07T00:03:42.054132Z |
| osv-2025-6 | Heap-buffer-overflow in next_marker | 2025-01-06T00:16:10.036783Z | 2025-01-06T00:16:10.037219Z |
| osv-2025-4 | Heap-buffer-overflow in ___interceptor_pthread_create | 2025-01-05T00:17:02.263743Z | 2025-01-05T00:17:02.264158Z |
| osv-2025-3 | Heap-buffer-overflow in avifImageAddUUIDProperty | 2025-01-05T00:10:22.871565Z | 2025-01-05T00:10:22.872062Z |
| osv-2025-1 | Segv on unknown address in avif_fuzztest_properties@PropertiesAvifFuzzTest.PropsValid | 2025-01-04T00:00:30.888504Z | 2025-01-04T00:00:30.889140Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0428 | Undefined behaviour in `kvm_ioctls::ioctls::vm::VmFd::create_device` | 2024-12-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0409 | Build corruption when using `PYO3_CONFIG_FILE` environment variable | 2024-12-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0408 | Unsound usages of `std::slice::from_raw_parts` | 2024-12-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0400 | `ruzstd` uninit and out-of-bounds memory reads | 2024-11-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0399 | rustls network-reachable panic in `Acceptor::accept` | 2024-11-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0398 | Bias of Polynomial Coefficients in Secret Sharing | 2024-11-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0401 | Denial of service because of stack overflow with malicious decompression input | 2024-11-14T12:00:00Z | 2024-12-04T12:13:35Z |
| rustsec-2024-0445 | cap-primitives doesn't fully sandbox all the Windows device filenames | 2024-11-05T12:00:00Z | 2025-12-19T21:01:24Z |
| rustsec-2024-0438 | Wasmtime doesn't fully sandbox all the Windows device filenames | 2024-11-02T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0379 | Multiple soundness issues | 2024-10-31T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0381 | Replaced by `pqcrypto-mlkem` | 2024-10-24T12:00:00Z | 2024-11-10T12:05:32Z |
| rustsec-2024-0380 | Replaced by `pqcrypto-mldsa` | 2024-10-24T12:00:00Z | 2024-11-10T12:05:32Z |
| rustsec-2024-0378 | Risk of use-after-free in `borrowed` reads from Python weak references | 2024-10-12T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0402 | Borsh serialization of HashMap is non-canonical | 2024-10-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0436 | paste - no longer maintained | 2024-10-07T12:00:00Z | 2026-01-27T21:51:15Z |
| rustsec-2024-0377 | Heap Buffer overflow using c_chars_to_str function | 2024-10-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0439 | Race condition could lead to WebAssembly control-flow integrity and type safety violations | 2024-10-03T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0440 | Runtime crash when combining tail calls with stack traces | 2024-10-02T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0376 | Remotely exploitable Denial of Service in Tonic | 2024-10-01T12:00:00Z | 2025-09-11T07:02:22Z |
| rustsec-2024-0375 | `atty` is unmaintained | 2024-09-25T12:00:00Z | 2024-09-26T12:26:22Z |
| rustsec-2024-0374 | Segmentation fault due to use of uninitialized memory | 2024-09-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0427 | get-size-derive is unmaintained | 2024-09-15T12:00:00Z | 2024-12-22T09:01:06Z |
| rustsec-2024-0425 | get-size is unmaintained | 2024-09-15T12:00:00Z | 2024-12-22T09:01:06Z |
| rustsec-2024-0404 | Unsoundness in anstream | 2024-09-08T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0443 | webp crate may expose memory contents when encoding an image | 2024-09-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0371 | gix-path improperly resolves configuration path reported by Git | 2024-09-06T12:00:00Z | 2024-09-07T01:48:33Z |
| rustsec-2024-0372 | Memory leak when calling a canister method via `ic_cdk::call` | 2024-09-05T12:00:00Z | 2024-09-07T18:23:36Z |
| rustsec-2024-0386 | strason is unmaintained | 2024-09-04T12:00:00Z | 2024-11-10T13:16:48Z |
| rustsec-2024-0383 | bcc is unmaintained | 2024-09-04T12:00:00Z | 2024-11-10T12:53:21Z |
| rustsec-2024-0382 | hwloc is unmaintained | 2024-09-04T12:00:00Z | 2024-11-10T12:52:40Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-envoy-2026-26311 | Envoy HTTP: filter chain execution on reset streams causing UAF crash | 2026-03-12T08:39:46.109Z | 2026-03-12T09:10:07.191Z |
| bit-envoy-2026-26310 | Crash for scoped ip address in Envoy during DNS | 2026-03-12T08:39:44.551Z | 2026-03-12T09:10:07.191Z |
| bit-envoy-2026-26309 | Envoy has an off-by-one write in JsonEscaper::escapeString() | 2026-03-12T08:39:42.871Z | 2026-03-12T09:10:07.191Z |
| bit-envoy-2026-26308 | Envoy has an RBAC Header Validation Bypass via Multi-Value Header Concatenation | 2026-03-12T08:39:41.078Z | 2026-03-12T09:10:07.191Z |
| bit-appsmith-2026-30862 | Critical Stored XSS & Privilege Escalation in Appsmith | 2026-03-12T08:36:03.908Z | 2026-03-12T09:10:07.191Z |
| bit-parse-2026-30863 | Parse Server: JWT audience validation bypass in Google, Apple, and Facebook authentication adapters | 2026-03-11T15:49:05.551Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30854 | Parse Server: GraphQL `__type` introspection bypass via inline fragments when public introspection is disabled | 2026-03-11T15:49:02.829Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30850 | Parse Server: File metadata endpoint bypasses `beforeFind` / `afterFind` trigger authorization | 2026-03-11T15:48:59.848Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30848 | Parse Server: `PagesRouter` path traversal allows reading files outside configured pages directory | 2026-03-11T15:48:57.194Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30835 | Parse Server: Malformed `$regex` query leaks database error details in API response | 2026-03-11T15:48:54.398Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30229 | Parse Server: Endpoint `/loginAs` allows `readOnlyMasterKey` to gain full read and write access as any user | 2026-03-11T15:48:51.922Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30228 | Parse Server: File creation and deletion bypasses `readOnlyMasterKey` write restriction | 2026-03-11T15:48:49.330Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-29182 | Parse Server: Cloud Hooks and Cloud Jobs bypass `readOnlyMasterKey` write restriction | 2026-03-11T15:48:46.637Z | 2026-03-11T18:56:50.865Z |
| bit-zookeeper-2026-24308 | Apache ZooKeeper: Sensitive information disclosure in client configuration handling | 2026-03-10T08:52:17.946Z | 2026-03-11T09:11:40.352Z |
| bit-zookeeper-2026-24281 | Apache ZooKeeper: Reverse-DNS fallback enables hostname verification bypass in ZooKeeper ZKTrustManager | 2026-03-10T08:52:16.699Z | 2026-03-11T09:11:40.352Z |
| bit-mariadb-2026-3494 | MariaDB Server Audit Plugin Comment Handling Bypass | 2026-03-10T08:46:18.025Z | 2026-03-17T09:18:01.284Z |
| bit-golang-2026-27142 | URLs in meta content attribute actions are not escaped in html/template | 2026-03-10T08:44:16.859Z | 2026-03-17T09:18:01.284Z |
| bit-golang-2026-27139 | FileInfo can escape from a Root in os | 2026-03-10T08:44:14.844Z | 2026-03-10T09:11:39.609Z |
| bit-golang-2026-27138 | Panic in name constraint checking for malformed certificates in crypto/x509 | 2026-03-10T08:44:12.992Z | 2026-03-11T09:11:40.352Z |
| bit-golang-2026-27137 | Incorrect enforcement of email constraints in crypto/x509 | 2026-03-10T08:44:11.145Z | 2026-03-11T09:11:40.352Z |
| bit-golang-2026-25679 | Incorrect parsing of IPv6 host literals in net/url | 2026-03-10T08:44:09.300Z | 2026-03-11T09:11:40.352Z |
| bit-maven-2021-26291 | block repositories using http by default | 2026-03-10T08:44:08.742Z | 2026-03-10T09:11:39.609Z |
| bit-ghost-2026-29784 | Ghost: Incomplete CSRF protections around OTC use | 2026-03-10T08:40:17.691Z | 2026-03-10T09:11:39.609Z |
| bit-ghost-2026-29053 | Ghost Vulnerable to Remote Code Execution via Malicious Themes | 2026-03-07T08:42:59.400Z | 2026-03-10T09:11:39.609Z |
| bit-moodle-2025-67847 | Moodle: moodle: remote code execution via insufficient restore input validation | 2026-03-06T08:50:20.446Z | 2026-03-06T09:10:26.160Z |
| bit-python-2026-2297 | SourcelessFileLoader does not use io.open_code() | 2026-03-06T08:50:18.397Z | 2026-03-06T09:10:26.160Z |
| bit-moodle-2021-47857 | Moodle 3.10.3 - 'label' Persistent Cross Site Scripting | 2026-03-06T08:46:28.845Z | 2026-03-06T09:10:26.160Z |
| bit-libpython-2026-2297 | SourcelessFileLoader does not use io.open_code() | 2026-03-06T08:43:26.501Z | 2026-03-06T09:10:26.160Z |
| bit-django-2026-25674 | Potential incorrect permissions on newly created file system objects | 2026-03-06T08:38:51.644Z | 2026-03-06T09:10:26.160Z |
| bit-django-2026-25673 | Potential denial-of-service vulnerability in URLField via Unicode normalization on Windows | 2026-03-06T08:38:49.880Z | 2026-03-06T09:10:26.160Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-mj07404 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-527x-5wrf-22m2, ghsa-9h8m-3fm2-qjrq, ghsa-c9v3-4pv7-87pr, ghsa-h75p-j8xm-m278, ghsa-p77j-4mvh-x3m3 applied in versions: 1.26.7-r0, 1.26.7-r1, 1.26.7-r2 | 2026-04-01T09:10:45.280620Z | 2026-03-28T10:02:34Z |
| cleanstart-2026-gq31133 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-527x-5wrf-22m2, ghsa-9h8m-3fm2-qjrq, ghsa-c9v3-4pv7-87pr, ghsa-h75p-j8xm-m278, ghsa-p77j-4mvh-x3m3 applied in versions: 1.26.7-r0, 1.26.7-r1, 1.26.7-r2 | 2026-04-01T09:10:41.066012Z | 2026-03-28T10:03:10Z |
| cleanstart-2026-dg06447 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.12.2-r0, 2.12.2-r1 | 2026-04-01T09:10:38.729051Z | 2026-03-28T10:04:36Z |
| cleanstart-2026-cb01846 | Security fixes for CVE-2025-0913, CVE-2025-4673, CVE-2025-47907, CVE-2025-47911, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-58190, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.6.1-r0, 2.6.1-r1, 2.6.1-r7 | 2026-04-01T09:10:27.866703Z | 2026-03-28T10:13:21Z |
| cleanstart-2026-jk84667 | Security fixes for CVE-2025-0913, CVE-2025-4673, CVE-2025-47907, CVE-2025-47911, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-58190, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.7.0-r7, 2.7.0-r8 | 2026-04-01T09:10:09.429544Z | 2026-03-28T10:13:46Z |
| cleanstart-2026-is74202 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:09:55.185988Z | 2026-03-31T04:38:08Z |
| cleanstart-2026-ld15132 | Security fixes for CVE-2020-8912, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-6g7g-w4f8-9c9x, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 0.142.0-r0, 0.144.0-r0, 0.144.0-r1, 0.144.0-r2, 0.144.0-r3 | 2026-04-01T09:09:25.500286Z | 2026-03-28T10:14:28Z |
| cleanstart-2026-bk44511 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.78.0-r0, 1.78.0-r2, 1.78.0-r3 | 2026-04-01T09:08:47.105116Z | 2026-03-28T10:16:01Z |
| cleanstart-2026-li04631 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.79.0-r0, 1.79.0-r2, 1.79.0-r3 | 2026-04-01T09:08:44.082129Z | 2026-03-28T10:16:19Z |
| cleanstart-2026-ls30652 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-47914, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-33186, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-p84v-gxvw-73pf applied in versions: 3.7.0-r0, 3.7.11-r0, 3.7.3-r0, 3.7.4-r0, 3.7.6-r0, 3.7.9-r0, 3.7.9-r1, 3.7.9-r2, 4.0.2-r0 | 2026-04-01T09:07:01.631355Z | 2026-03-30T12:04:05Z |
| cleanstart-2026-hk71313 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw applied in versions: 0.12.0-r0, 0.12.0-r1, 0.12.0-r2 | 2026-04-01T09:06:39.410428Z | 2026-03-30T06:53:15Z |
| cleanstart-2026-ch77232 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 18.7.1-r0 | 2026-04-01T09:06:04.906254Z | 2026-03-31T07:29:33Z |
| cleanstart-2026-is43446 | Security fixes for ghsa-25qh-j22f-pwp8, ghsa-389x-839f-4rhx, ghsa-3p8m-j85q-pgmj, ghsa-4g8c-wm8x-jfhw, ghsa-5jpm-x58v-624v, ghsa-72hv-8253-57qq, ghsa-84h7-rjj3-6jx4, ghsa-fghv-69vj-qj49, ghsa-jq43-27x9-3v86, ghsa-pwqr-wmgm-9rr8, ghsa-qqpg-mvqg-649v, ghsa-w9fj-cfpg-grvv, ghsa-xq3w-v528-46rv applied in versions: 0.1.109-r0, 0.1.109-r1, 0.1.111-r2 | 2026-04-01T09:05:58.458627Z | 2026-03-31T07:55:31Z |
| cleanstart-2026-eb74978 | Security fixes for CVE-2020-8912, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1 | 2026-04-01T09:05:49.917651Z | 2026-03-31T15:18:53Z |
| cleanstart-2026-bk28579 | Security fixes for CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1 | 2026-04-01T09:05:31.827204Z | 2026-03-31T15:16:59Z |
| cleanstart-2026-gj95666 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T01:04:41.222114Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-af35851 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T01:02:37.708854Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-qk48981 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T01:00:35.988532Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-zv38826 | Within HostnameError | 2026-03-10T01:00:05.764793Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-mo83449 | Within HostnameError | 2026-03-10T00:59:35.550450Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-jz91219 | Within HostnameError | 2026-03-10T00:59:35.590693Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-od98869 | Within HostnameError | 2026-03-10T00:59:05.580952Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-dt66006 | Within HostnameError | 2026-03-10T00:58:35.493841Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-ab04032 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-03-10T00:58:35.570783Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-oh74241 | Security fixes for GHSA-MQQF-5WVP-8FH8 applied in versions: 0.122-r0 | 2026-03-10T00:58:07.551022Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-xh31600 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:58:05.974960Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-av02020 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:58:05.928030Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-ra63757 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:56:05.142237Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-ir62391 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:48:33.059735Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-qy24299 | @octokit/endpoint turns REST API endpoints into generic request options | 2026-03-07T00:39:47.646997Z | 2026-03-06T13:08:41Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2018-ALE-001 | Multiples vulnérabilités de fuite d'informations dans des processeurs | 2018-01-04T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2017-ale-020 | Vulnérabilité dans des implémentations de TLS | 2017-12-13T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| CERTFR-2017-ALE-020 | Vulnérabilité dans des implémentations de TLS | 2017-12-13T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| certfr-2017-ale-019 | Vulnérabilité d'usurpation d'identité dans plusieurs clients de messagerie | 2017-12-05T00:00:00.000000 | 2018-03-07T00:00:00.000000 |
| CERTFR-2017-ALE-019 | Vulnérabilité d'usurpation d'identité dans plusieurs clients de messagerie | 2017-12-05T00:00:00.000000 | 2018-03-07T00:00:00.000000 |
| certfr-2017-ale-018 | Vulnérabilité dans Apple MacOS High Sierra | 2017-11-29T00:00:00.000000 | 2017-11-30T00:00:00.000000 |
| CERTFR-2017-ALE-018 | Vulnérabilité dans Apple MacOS High Sierra | 2017-11-29T00:00:00.000000 | 2017-11-30T00:00:00.000000 |
| certfr-2017-ale-017 | Vulnérabilité dans le serveur de messagerie Exim | 2017-11-27T00:00:00.000000 | 2018-02-01T00:00:00.000000 |
| CERTFR-2017-ALE-017 | Vulnérabilité dans le serveur de messagerie Exim | 2017-11-27T00:00:00.000000 | 2018-02-01T00:00:00.000000 |
| certfr-2017-ale-016 | Campagne de rançongiciel Bad Rabbit | 2017-10-25T00:00:00.000000 | 2017-10-27T00:00:00.000000 |
| CERTFR-2017-ALE-016 | Campagne de rançongiciel Bad Rabbit | 2017-10-25T00:00:00.000000 | 2017-10-27T00:00:00.000000 |
| certfr-2017-ale-014 | Vulnérabilité dans le protocole WPA/WPA2 | 2017-10-18T00:00:00.000000 | 2017-10-19T00:00:00.000000 |
| CERTFR-2017-ALE-014 | Vulnérabilité dans le protocole WPA/WPA2 | 2017-10-18T00:00:00.000000 | 2017-10-19T00:00:00.000000 |
| certfr-2017-ale-015 | Vulnérabilités dans la bibliothèque Infineon RSA | 2017-10-16T00:00:00.000000 | 2017-10-17T00:00:00.000000 |
| CERTFR-2017-ALE-015 | Vulnérabilités dans la bibliothèque Infineon RSA | 2017-10-16T00:00:00.000000 | 2017-10-17T00:00:00.000000 |
| certfr-2017-ale-013 | Présence de code malveillant dans Piriform CCleaner | 2017-09-18T00:00:00.000000 | 2017-10-09T00:00:00.000000 |
| CERTFR-2017-ALE-013 | Présence de code malveillant dans Piriform CCleaner | 2017-09-18T00:00:00.000000 | 2017-10-09T00:00:00.000000 |
| certfr-2017-ale-012 | Campagne de maliciels prenant l'apparence d'un rançongiciel à multiples capacités de propagation | 2017-06-27T00:00:00.000000 | 2017-08-03T00:00:00.000000 |
| CERTFR-2017-ALE-012 | Campagne de maliciels prenant l'apparence d'un rançongiciel à multiples capacités de propagation | 2017-06-27T00:00:00.000000 | 2017-08-03T00:00:00.000000 |
| certfr-2017-ale-011 | Campagne de messages électroniques non sollicités de type Jaff | 2017-05-14T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| CERTFR-2017-ALE-011 | Campagne de messages électroniques non sollicités de type Jaff | 2017-05-14T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| certfr-2017-ale-010 | Propagation d'un rançongiciel exploitant les vulnérabilités MS17-010 | 2017-05-12T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| CERTFR-2017-ALE-010 | Propagation d'un rançongiciel exploitant les vulnérabilités MS17-010 | 2017-05-12T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| certfr-2017-ale-009 | Vulnérabilité dans Microsoft Malware Protection Engine | 2017-05-09T00:00:00.000000 | 2017-05-15T00:00:00.000000 |
| CERTFR-2017-ALE-009 | Vulnérabilité dans Microsoft Malware Protection Engine | 2017-05-09T00:00:00.000000 | 2017-05-15T00:00:00.000000 |
| certfr-2017-ale-008 | Multiples vulnérabilités dans Microsoft Windows XP et Windows Server 2003 | 2017-04-14T00:00:00.000000 | 2017-09-06T00:00:00.000000 |
| CERTFR-2017-ALE-008 | Multiples vulnérabilités dans Microsoft Windows XP et Windows Server 2003 | 2017-04-14T00:00:00.000000 | 2017-09-06T00:00:00.000000 |
| certfr-2017-ale-007 | Vulnérabilité dans Microsoft Office | 2017-04-10T00:00:00.000000 | 2017-04-12T00:00:00.000000 |
| CERTFR-2017-ALE-007 | Vulnérabilité dans Microsoft Office | 2017-04-10T00:00:00.000000 | 2017-04-12T00:00:00.000000 |
| certfr-2017-ale-006 | Multiples vulnérabilités dans SCADA Siemens RUGGEDCOM ROX I | 2017-03-29T00:00:00.000000 | 2017-03-29T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2026-AVI-0167 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0166 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0165 | Vulnérabilité dans Mattermost Server | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0164 | Multiples vulnérabilités dans PostgreSQL | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0163 | Multiples vulnérabilités dans HAProxy | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0162 | Multiples vulnérabilités dans Juniper Networks Secure Analytics | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0161 | Vulnérabilité dans Tenable Nessus Agent | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0160 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0159 | Multiples vulnérabilités dans Keycloak | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0158 | Multiples vulnérabilités dans les produits Apple | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0157 | Multiples vulnérabilités dans les produits Qnap | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0156 | Multiples vulnérabilités dans Google Chrome | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0155 | Multiples vulnérabilités dans SPIP | 2026-02-12T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0154 | Vulnérabilité dans Traefik | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0160 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0159 | Multiples vulnérabilités dans Keycloak | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0158 | Multiples vulnérabilités dans les produits Apple | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0157 | Multiples vulnérabilités dans les produits Qnap | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0156 | Multiples vulnérabilités dans Google Chrome | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0155 | Multiples vulnérabilités dans SPIP | 2026-02-12T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| CERTFR-2026-AVI-0154 | Vulnérabilité dans Traefik | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0153 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0152 | Multiples vulnérabilités dans Microsoft Azure | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0151 | Vulnérabilité dans Microsoft .Net | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0150 | Multiples vulnérabilités dans Microsoft Windows | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0149 | Multiples vulnérabilités dans Microsoft Office | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0148 | Multiples vulnérabilités dans les produits Intel | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0147 | Multiples vulnérabilités dans les produits Fortinet | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0146 | Multiples vulnérabilités dans GitLab | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0145 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-015471 | Trend Micro Deep Security 20.0 Agent (for Windows) vulnerable to uncontrolled search path element | 2024-12-25T11:28+09:00 | 2024-12-25T11:28+09:00 |
| jvndb-2024-015393 | Multiple security updates for Trend Micro Apex One and Apex One as a Service (December 2024) | 2024-12-23T12:52+09:00 | 2024-12-23T12:52+09:00 |
| jvndb-2024-014918 | Authentication Bypass Vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2024-12-17T15:23+09:00 | 2024-12-17T15:23+09:00 |
| jvndb-2024-000128 | Multiple vulnerabilities in SHARP routers | 2024-12-17T07:54+09:00 | 2024-12-17T07:54+09:00 |
| jvndb-2024-000127 | "Shonen Jump+" App for Android fails to restrict custom URL schemes properly | 2024-12-16T15:07+09:00 | 2024-12-16T15:07+09:00 |
| jvndb-2024-014825 | WordPress Plugin "My WP Customize Admin/Frontend" vulnerable to cross-site scripting | 2024-12-16T13:57+09:00 | 2024-12-16T13:57+09:00 |
| jvndb-2024-014793 | Multiple vulnerabilities in FXC AE1021 and AE1021PE | 2024-12-16T11:51+09:00 | 2024-12-16T11:51+09:00 |
| jvndb-2024-014079 | Trend Micro Deep Security Agent for Windows and Deep Security Notifier on DSVA vulnerable to OS command injection | 2024-12-06T12:11+09:00 | 2024-12-06T12:11+09:00 |
| jvndb-2024-000125 | Multiple vulnerabilities in I-O DATA routers UD-LT1 and UD-LT1/EX | 2024-12-04T15:22+09:00 | 2024-12-18T15:20+09:00 |
| jvndb-2024-000124 | Multiple vulnerabilities in UNIVERGE IX/IX-R/IX-V series routers | 2024-12-02T16:38+09:00 | 2024-12-02T16:38+09:00 |
| jvndb-2024-000123 | Multiple FCNT Android devices vulnerable to authentication bypass | 2024-11-29T15:30+09:00 | 2024-11-29T15:30+09:00 |
| jvndb-2024-013702 | Multiple vulnerabilities in FUJI ELECTRIC products | 2024-11-29T14:42+09:00 | 2024-11-29T14:42+09:00 |
| jvndb-2024-000122 | HAProxy vulnerable to HTTP request/response smuggling | 2024-11-27T14:36+09:00 | 2024-11-27T14:36+09:00 |
| jvndb-2024-000121 | WordPress Plugin "WP Admin UI Customize" vulnerable to cross-site scripting | 2024-11-26T13:57+09:00 | 2024-11-26T13:57+09:00 |
| jvndb-2024-013260 | Multiple vulnerabilities in Edgecross Basic Software for Windows | 2024-11-22T10:59+09:00 | 2025-11-04T16:41+09:00 |
| jvndb-2024-000120 | "Kura Sushi Official App Produced by EPARK" for Android uses a hard-coded cryptographic key | 2024-11-20T13:56+09:00 | 2024-11-20T13:56+09:00 |
| jvndb-2024-012941 | Multiple vulnerabilities in Rakuten Turbo 5G | 2024-11-19T10:41+09:00 | 2024-11-19T10:41+09:00 |
| jvndb-2024-000119 | Multiple vulnerabilities in FitNesse | 2024-11-15T13:37+09:00 | 2024-11-20T11:18+09:00 |
| jvndb-2024-012461 | Multiple vulnerabilities in SoftBank Mesh Wi-Fi router RP562B | 2024-11-13T14:26+09:00 | 2024-11-26T16:11+09:00 |
| jvndb-2024-000118 | WordPress Plugin "VK All in One Expansion Unit" vulnerable to cross-site scripting | 2024-11-13T13:50+09:00 | 2024-11-13T13:50+09:00 |
| jvndb-2024-012017 | Trend Micro Deep Security 20 Agent for Windows vulnerable to improper access control | 2024-11-06T11:00+09:00 | 2024-11-06T11:00+09:00 |
| jvndb-2024-011833 | Incorrect authorization vulnerability in OMRON Sysmac Studio | 2024-11-05T15:29+09:00 | 2024-11-05T15:29+09:00 |
| jvndb-2024-011747 | Command injection vulnerability in Trend Micro Cloud Edge | 2024-11-01T14:28+09:00 | 2024-11-01T14:28+09:00 |
| jvndb-2024-011744 | REST-APIs unintentionally enabled in Century Systems FutureNet NXR series routers | 2024-11-01T13:49+09:00 | 2024-11-01T13:49+09:00 |
| jvndb-2024-000117 | Stack-based buffer overflow vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor | 2024-10-31T16:44+09:00 | 2025-05-19T17:59+09:00 |
| jvndb-2024-000116 | Hikvision network camera security enhancement to prevent cleartext transmission of Dynamic DNS credentials | 2024-10-30T15:07+09:00 | 2024-10-30T15:07+09:00 |
| jvndb-2024-011256 | Multiple vulnerabilities in Sharp and Toshiba Tec MFPs | 2024-10-28T17:33+09:00 | 2024-10-28T17:33+09:00 |
| jvndb-2024-000115 | Chatwork Desktop Application (Windows) uses a potentially dangerous function | 2024-10-28T14:29+09:00 | 2024-10-28T14:29+09:00 |
| jvndb-2024-000114 | Multiple vulnerabilities in baserCMS | 2024-10-25T15:07+09:00 | 2025-02-18T15:35+09:00 |
| jvndb-2024-010802 | Multiple SQL injection vulnerabilities in Trend Micro Deep Discovery Inspector | 2024-10-22T13:02+09:00 | 2024-10-22T13:02+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14143 | WordPress插件wpForo Forum信息泄露漏洞 | 2026-03-11 | 2026-03-18 |
| cnvd-2026-13835 | SonicWALL SonicOS缓冲区溢出漏洞 | 2026-03-11 | 2026-03-16 |
| cnvd-2026-13834 | SPIP SQL注入漏洞 | 2026-03-11 | 2026-03-11 |
| cnvd-2026-13833 | SPIP interface_traduction_objets SQL注入漏洞 | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13536 | Tenda AC15 goform/formSetIptv文件命令注入漏洞 | 2026-03-11 | 2026-03-11 |
| cnvd-2026-13450 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-13450) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13449 | 多款Mozilla产品权限提升漏洞(CNVD-2026-13449) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13448 | 多款Mozilla产品权限提升漏洞(CNVD-2026-13448) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13447 | 多款Mozilla产品权限提升漏洞(CNVD-2026-13447) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13446 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-13446) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13445 | 多款Mozilla产品代码执行漏洞(CNVD-2026-13445) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13444 | 多款Mozilla产品代码执行漏洞(CNVD-2026-13444) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13443 | 多款Mozilla产品信息泄露漏洞(CNVD-2026-13443) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13442 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-13442) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13441 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-13441) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13440 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-13440) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13409 | Apache Tomcat客户端证书验证缺陷漏洞 | 2026-03-11 | 2026-03-11 |
| cnvd-2026-14136 | Siemens RUGGEDCOM APE1808设备Fortigate NGFW V7.4.7之前版本存在多个漏洞 | 2026-03-10 | 2026-03-19 |
| cnvd-2026-13836 | NocoDB访问控制错误漏洞 | 2026-03-10 | 2026-03-16 |
| cnvd-2026-13831 | Siemens SINEC Security Monitor信息泄露漏洞 | 2026-03-10 | 2026-03-17 |
| cnvd-2026-13802 | Siemens COMOS存在多个漏洞 | 2026-03-10 | 2026-03-17 |
| cnvd-2026-13781 | Siemens SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP附加GNU/Linux子系统存在多个漏洞 | 2026-03-10 | 2026-03-17 |
| cnvd-2026-13776 | Siemens SICAM SIAPP SDK存在多个漏洞 | 2026-03-10 | 2026-03-17 |
| cnvd-2026-13775 | Siemens RUGGEDCOM APE1808设备Fortigate NGFW存在多个漏洞 | 2026-03-10 | 2026-03-17 |
| cnvd-2026-13537 | D-Link DIR-513 goform/formAdvFirewall文件缓冲区溢出漏洞 | 2026-03-10 | 2026-03-12 |
| cnvd-2026-13387 | Siemens Heliox EV Chargers访问控制漏洞 | 2026-03-10 | 2026-03-12 |
| cnvd-2026-13386 | Siemens SIMATIC S7-1500设备存储型跨站脚本漏洞 | 2026-03-10 | 2026-03-12 |
| cnvd-2026-13385 | Siemens SIDIS Prime存在多个漏洞 | 2026-03-10 | 2026-03-12 |
| cnvd-2026-13384 | Siemens Mendix应用程序授权配置错误漏洞 | 2026-03-10 | 2026-03-12 |
| cnvd-2026-14972 | Chamilo import.php文件操作系统命令注入漏洞 | 2026-03-09 | 2026-03-26 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01424 | Уязвимость DNS-сервера Dnsmasq, связанная с ошибками реализации проверки безопасности для… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01423 | Уязвимость функции hci_conn_del() модуля net/bluetooth/hci_conn.c подсистемы Bluetooth яд… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01422 | Уязвимость функции DestroyImage компонента MagickCore/image.c консольного графического ре… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01421 | Уязвимость функции ReadMVGImage компонента coders/mvg.c консольного графического редактор… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01420 | Уязвимость функции WriteMPCImage() компонента coders/mpc.c консольного графического редак… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01419 | Уязвимость функции lite_font_map() компонента coders/wmf.c консольного графического редак… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01418 | Уязвимость функции mpi3mr_process_cfg_req() модуля drivers/scsi/mpi3mr/mpi3mr_fw.c драйве… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01417 | Уязвимость функции usb_shark_probe() модуля drivers/media/radio/radio-shark.c драйвера му… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01416 | Уязвимость функции imx_pcie_suspend_noirq() модуля drivers/pci/controller/dwc/pci-imx6.c … | 08.02.2026 | 08.02.2026 |
| bdu:2026-01415 | Уязвимость функции virtnet_rq_alloc() модуля drivers/net/virtio_net.c драйвера поддержки … | 08.02.2026 | 08.02.2026 |
| bdu:2026-01414 | Уязвимость функции disk_destroy_zone_wplugs_hash_table() модуля block/blk-zoned.c поддерж… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01413 | Уязвимость функции can_nocow_file_extent() модуля fs/btrfs/inode.c поддержки файловой сис… | 08.02.2026 | 10.02.2026 |
| bdu:2026-01412 | Уязвимость функции ksmbd_conn_init_server_callbacks() модуля fs/smb/server/connection.c п… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01411 | Уязвимость функции cow_file_range() модуля fs/btrfs/inode.c поддержки файловой системы bt… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01410 | Уязвимость функции sdw_hda_dai_hw_params() модуля sound/soc/sof/intel/hda-dai.c поддержки… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01409 | Уязвимость функции lookup_inline_extent_backref() модуля fs/btrfs/extent-tree.c файловой … | 08.02.2026 | 08.02.2026 |
| bdu:2026-01408 | Уязвимость функции nfsd_net_init() модуля fs/nfsd/nfsctl.c поддержки сетевой файловой сис… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01407 | Уязвимость функции vimc_streamer_pipeline_terminate() модуля drivers/media/test-drivers/v… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01406 | Уязвимость функции parse_durable_handle_context() модуля fs/smb/server/smb2pdu.c поддержк… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01405 | Уязвимость функции veth_pool_store() модуля drivers/net/ethernet/ibm/ibmveth.c драйвера п… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01404 | Уязвимость функции v9fs_vfs_mkdir_dotl() модуля fs/9p/vfs_inode_dotl.c файловой системы я… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01403 | Уязвимость функции get_pat_info() модуля arch/x86/mm/pat/memtype.c платформы x86 ядра опе… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01402 | Уязвимость функции old_deviceless() модуля net/bridge/br_ioctl.c реализации сетевых функц… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01401 | Уязвимость функции ath12k_dp_mon_rx_parse_status_tlv() модуля drivers/net/wireless/ath/at… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01400 | Уязвимость функции hibernate_compressor_param_set() модуля kernel/power/hibernate.c ядра … | 08.02.2026 | 08.02.2026 |
| bdu:2026-01399 | Уязвимость функции dwc_pcie_register_dev() модуля drivers/perf/dwc_pcie_pmu.c драйвера по… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01398 | Уязвимость функции xgene_hwmon_probe() модуля drivers/hwmon/xgene-hwmon.c драйвера монито… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01397 | Уязвимость функции gfs2_dinode_in() модуля fs/gfs2/dir.c файловой системы GFS2 ядра опера… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01396 | Уязвимость функций hfs_find_init() (fs/hfs/bfind.c) и hfs_btree_open() (fs/hfs/btree.c) ф… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01395 | Уязвимость функции tpm2_init_space() модуля drivers/char/tpm/tpm2-space.c драйвера поддер… | 08.02.2026 | 08.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200106-0170 | Buffer overflow in ntpd ntp daemon 4.0.99k and earlier (aka xntpd and xntp3) allows remot… | 2024-07-23T21:52:30.595000Z |
| var-201403-0508 | The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.… | 2024-07-23T21:52:28.560000Z |
| var-202205-1319 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:52:24.897000Z |
| var-201804-1186 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T21:52:24.271000Z |
| var-201102-0095 | Google Chrome before 9.0.597.94 does not properly perform event handling for animations, … | 2024-07-23T21:52:24.603000Z |
| var-200107-0019 | Cisco routers and switches running IOS 12.0 through 12.2.1 allows a remote attacker to ca… | 2024-07-23T21:51:49.898000Z |
| var-202002-1480 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:51:05.518000Z |
| var-201503-0389 | The build_tablename function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP th… | 2024-07-23T21:51:05.137000Z |
| var-202109-1805 | Malformed requests may cause the server to dereference a NULL pointer. This issue affects… | 2024-07-23T21:51:04.963000Z |
| var-201803-0086 | LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) … | 2024-07-23T21:51:04.545000Z |
| var-202206-1186 | Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may all… | 2024-07-23T21:51:00.840000Z |
| var-201912-1853 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:50:27.591000Z |
| var-201912-0123 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:50:27.004000Z |
| var-201904-0756 | A memory corruption issue was addressed with improved memory handling. This issue affecte… | 2024-07-23T21:50:26.406000Z |
| var-200907-0717 | WebKit in Apple Safari before 4.0.2, as used on iPhone OS before 3.1, iPhone OS before 3.… | 2024-07-23T21:50:25.062000Z |
| var-202205-1304 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:50:24.904000Z |
| var-200810-0142 | The Postfix configuration file in Mac OS X 10.5.5 causes Postfix to be network-accessible… | 2024-07-23T21:50:24.464000Z |
| var-201107-0125 | The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, a… | 2024-07-23T21:50:23.993000Z |
| var-202006-1651 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 a… | 2024-07-23T21:50:22.831000Z |
| var-200809-0008 | Finder in Apple Mac OS X 10.5 through 10.5.4 does not properly update permission data in … | 2024-07-23T21:50:10.607000Z |
| var-201203-0191 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2024-07-23T21:50:08.937000Z |
| var-201206-0064 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:49:37.613000Z |
| var-202004-2202 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T21:49:25.052000Z |
| var-202207-1485 | An out-of-bounds write issue was addressed with improved input validation. This issue is … | 2024-07-23T21:49:20.877000Z |
| var-201007-0321 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 thro… | 2024-07-23T21:49:20.293000Z |
| var-201803-0099 | The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, whic… | 2024-07-23T21:49:16.122000Z |
| var-200505-0359 | Apple Terminal 1.4.4 allows attackers to execute arbitrary commands via terminal escape s… | 2024-07-23T21:49:11.998000Z |
| var-202003-1782 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:48:40.941000Z |
| var-201806-1486 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T21:48:39.044000Z |
| var-200705-0670 | The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.1… | 2024-07-23T21:48:39.239000Z |