Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40289 |
9.1 (3.1)
|
PraisonAI Browser Server allows unauthenticated WebSoc… |
MervinPraison |
PraisonAI |
2026-04-14T03:05:05.514Z | 2026-04-14T03:05:05.514Z |
| CVE-2026-40288 |
9.8 (3.1)
|
PraisonAI: Critical RCE via `type: job` workflow YAML |
MervinPraison |
PraisonAI |
2026-04-14T03:00:21.547Z | 2026-04-14T03:01:53.412Z |
| CVE-2026-34984 |
7.1 (4.0)
|
External Secrets Operator has DNS exfiltration via get… |
external-secrets |
external-secrets |
2026-04-14T01:48:41.166Z | 2026-04-14T01:48:41.166Z |
| CVE-2026-34225 |
4.3 (3.1)
|
Open WebUI has Blind Server Side Request Forgery in it… |
open-webui |
open-webui |
2026-04-14T01:39:07.088Z | 2026-04-14T01:39:07.088Z |
| CVE-2026-5086 |
N/A
|
Crypt::SecretBuffer versions before 0.019 for Perl is … |
NERDVANA |
Crypt::SecretBuffer |
2026-04-13T22:54:53.724Z | 2026-04-14T01:34:38.681Z |
| CVE-2026-39426 |
5.1 (4.0)
|
MaxKB: Stored XSS via Unsanitized iframe_render Parsing |
1Panel-dev |
MaxKB |
2026-04-14T01:25:10.592Z | 2026-04-14T01:25:10.592Z |
| CVE-2026-39425 |
5.1 (4.0)
|
MaxKB: Stored XSS via Unsanitized html_rander Tags in … |
1Panel-dev |
MaxKB |
2026-04-14T01:18:42.895Z | 2026-04-14T01:18:42.895Z |
| CVE-2026-39424 |
5.3 (4.0)
|
MaxKB has CSV Injection in its Application Chat Export… |
1Panel-dev |
MaxKB |
2026-04-14T00:56:56.625Z | 2026-04-14T00:56:56.625Z |
| CVE-2026-39423 |
6.9 (4.0)
|
Stored XSS via Eval Injection in EchartsRander Component |
1Panel-dev |
MaxKB |
2026-04-14T00:28:47.572Z | 2026-04-14T00:28:47.572Z |
| CVE-2026-39421 |
6.3 (3.1)
|
MaxKB: Sandbox escape via ctypes and unhooked SYS_pkey… |
1Panel-dev |
MaxKB |
2026-04-14T00:17:10.279Z | 2026-04-14T00:17:10.279Z |
| CVE-2026-39420 |
6.3 (3.1)
|
MaxKB: Sandbox escape via LD_PRELOAD bypass |
1Panel-dev |
MaxKB |
2026-04-14T00:13:01.189Z | 2026-04-14T00:13:01.189Z |
| CVE-2026-39418 |
5 (3.1)
|
MaxKB: SSRF via sandbox network hook bypass |
1Panel-dev |
MaxKB |
2026-04-14T00:08:50.182Z | 2026-04-14T00:08:50.182Z |
| CVE-2026-34069 |
5.3 (3.1)
|
nimiq-consensus panics via RequestMacroChain micro-blo… |
nimiq |
core-rs-albatross |
2026-04-13T23:55:52.994Z | 2026-04-13T23:55:52.994Z |
| CVE-2026-33948 |
2.9 (4.0)
|
jq: Embedded-NUL Truncation in CLI JSON Input Path Cau… |
jqlang |
jq |
2026-04-13T23:51:04.144Z | 2026-04-13T23:51:04.144Z |
| CVE-2026-40164 |
7.5 (3.1)
|
jq: Algorithmic complexity DoS via hardcoded MurmurHas… |
jqlang |
jq |
2026-04-13T23:40:12.693Z | 2026-04-13T23:40:12.693Z |
| CVE-2026-26221 |
9.3 (4.0)
9.8 (3.1)
|
Hyland OnBase Timer Services Unauthenticated .NET Remo… |
Hyland |
OnBase Workflow Timer Service |
2026-02-13T15:21:48.928Z | 2026-04-13T23:37:31.178Z |
| CVE-2025-0921 |
6.5 (3.1)
|
Information Tampering Vulnerability in Multiple Servic… |
Mitsubishi Electric Corporation |
GENESIS64 |
2025-05-15T22:36:37.902Z | 2026-04-13T23:06:00.161Z |
| CVE-2024-1573 |
5.9 (3.1)
|
Missing Authentication for Critical Function vuln… |
Mitsubishi Electric Iconics Digital Solutions |
GENESIS64 |
2024-07-04T08:59:44.079Z | 2026-04-13T22:47:17.575Z |
| CVE-2020-9715 |
7.8 (3.1)
|
Adobe Acrobat and Reader versions 2020.009.20074 … |
Adobe |
Adobe Acrobat and Reader |
2020-08-19T00:00:00.000Z | 2026-04-13T22:20:25.649Z |
| CVE-2026-39956 |
6.1 (3.1)
|
jq: Missing runtime type checks for _strindices lead t… |
jqlang |
jq |
2026-04-13T22:10:18.817Z | 2026-04-13T22:10:18.817Z |
| CVE-2026-4519 |
7 (4.0)
|
webbrowser.open() allows leading dashes in URLs |
Python Software Foundation |
CPython |
2026-03-20T15:08:32.576Z | 2026-04-13T21:47:40.137Z |
| CVE-2026-40312 |
6.2 (3.1)
|
ImageMagick: Off-by-One in MSL decoder could result in crash |
ImageMagick |
ImageMagick |
2026-04-13T21:43:28.416Z | 2026-04-13T21:43:28.416Z |
| CVE-2026-40311 |
5.5 (3.1)
|
ImageMagick: Heap-use-after-free via XMP profile could… |
ImageMagick |
ImageMagick |
2026-04-13T21:36:44.262Z | 2026-04-13T21:36:44.262Z |
| CVE-2026-40310 |
5.5 (3.1)
|
ImageMagick: Heap out-of-bounds write in JP2 encoder |
ImageMagick |
ImageMagick |
2026-04-13T21:32:53.361Z | 2026-04-13T21:32:53.361Z |
| CVE-2026-40183 |
5.5 (3.1)
|
ImageMagick: Heap buffer overflow when encoding JXL im… |
ImageMagick |
ImageMagick |
2026-04-13T21:28:20.797Z | 2026-04-13T21:28:20.797Z |
| CVE-2026-22565 |
N/A
|
An Improper Input Validation vulnerability could … |
Ubiquiti Inc |
UniFi Play PowerAmp |
2026-04-13T21:28:10.916Z | 2026-04-13T21:28:10.916Z |
| CVE-2026-40169 |
6.2 (3.1)
|
ImageMagick: Heap buffer overflow (WRITE) in the YAML … |
ImageMagick |
ImageMagick |
2026-04-13T21:25:56.317Z | 2026-04-13T21:25:56.317Z |
| CVE-2025-30650 |
6.7 (3.1)
8.4 (4.0)
|
Junos OS: Privileged local user can gain access to a L… |
Juniper Networks |
Junos OS |
2026-04-08T17:26:35.685Z | 2026-04-13T21:17:19.185Z |
| CVE-2026-6224 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
nocobase plugin-workflow-javascript Vm.js createSafeCo… |
nocobase |
plugin-workflow-javascript |
2026-04-13T21:15:11.914Z | 2026-04-13T21:15:11.914Z |
| CVE-2026-33908 |
7.5 (3.1)
|
ImageMagick is vulnerable to Stack Overflow in Destroy… |
ImageMagick |
ImageMagick |
2026-04-13T21:06:42.682Z | 2026-04-13T21:06:42.682Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-35668 |
7.1 (4.0)
7.7 (3.1)
|
OpenClaw < 2026.3.24 - Sandbox Media Root Bypass via U… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:27.149Z | 2026-04-10T18:27:23.337Z |
| CVE-2026-35666 |
7.7 (4.0)
8.8 (3.1)
|
OpenClaw < 2026.3.22 - Allowlist Bypass via Unregister… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:25.748Z | 2026-04-13T17:39:14.162Z |
| CVE-2026-35665 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.3.24 - Denial of Service via Feishu We… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:25.047Z | 2026-04-10T16:58:15.053Z |
| CVE-2026-35664 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.3.25 - DM Pairing Bypass via Legacy Ca… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:24.375Z | 2026-04-14T14:57:59.515Z |
| CVE-2026-35663 |
8.7 (4.0)
8.8 (3.1)
|
OpenClaw < 2026.3.25 - Privilege Escalation via Backen… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:23.672Z | 2026-04-14T14:28:08.608Z |
| CVE-2026-35662 |
5.3 (4.0)
4.3 (3.1)
|
OpenClaw < 2026.3.22 - Missing controlScope Enforcemen… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:22.937Z | 2026-04-10T18:24:24.250Z |
| CVE-2026-35661 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.3.25 - Telegram DM-Scoped Inline Butto… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:22.250Z | 2026-04-10T20:18:04.127Z |
| CVE-2026-35660 |
7.2 (4.0)
8.1 (3.1)
|
OpenClaw < 2026.3.23 - Insufficient Access Control in … |
OpenClaw |
OpenClaw |
2026-04-10T16:03:21.568Z | 2026-04-13T17:41:32.978Z |
| CVE-2026-35658 |
6 (4.0)
6.5 (3.1)
|
OpenClaw < 2026.3.2 - Filesystem Boundary Bypass in Im… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:20.067Z | 2026-04-14T14:56:40.942Z |
| CVE-2026-40024 |
8.4 (4.0)
7.1 (3.1)
|
Sleuth Kit tsk_recover Path Traversal |
sleuthkit |
sleuthkit |
2026-04-08T21:35:20.662Z | 2026-04-09T18:13:37.338Z |
| CVE-2026-40025 |
4.8 (4.0)
4.4 (3.1)
|
Sleuth Kit APFS Keybag Parser Out-of-Bounds Read |
sleuthkit |
sleuthkit |
2026-04-08T21:35:21.537Z | 2026-04-09T16:16:39.403Z |
| CVE-2026-40029 |
8.5 (4.0)
7.8 (3.1)
|
parseusbs < 1.9 Command Injection via Crafted LNK Filename |
khyrenz |
parseusbs |
2026-04-08T21:35:24.801Z | 2026-04-09T14:48:31.844Z |
| CVE-2026-40030 |
8.4 (4.0)
7.8 (3.1)
|
parseusbs < 1.9 Command Injection via Volume Path Argument |
khyrenz |
parseusbs |
2026-04-08T21:35:25.533Z | 2026-04-09T18:10:49.070Z |
| CVE-2026-40037 |
7.1 (4.0)
6.5 (3.1)
|
OpenClaw < 2026.3.31 - Unsafe Request Body Replay via … |
OpenClaw |
OpenClaw |
2026-04-08T21:35:29.255Z | 2026-04-09T14:40:56.336Z |
| CVE-2026-35619 |
5.3 (4.0)
4.3 (3.1)
|
OpenClaw < 2026.3.24 - Authorization Bypass via HTTP /… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:08.449Z | 2026-04-13T18:06:28.539Z |
| CVE-2026-35620 |
5.3 (4.0)
5.4 (3.1)
|
OpenClaw < 2026.3.24 - Missing Authorization in /send … |
OpenClaw |
OpenClaw |
2026-04-10T16:03:09.127Z | 2026-04-13T15:37:24.593Z |
| CVE-2026-6215 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
DbGate REST/GraphQL openApiDriver.ts apiServerUrl1 ser… |
n/a |
DbGate |
2026-04-13T19:30:12.683Z | 2026-04-13T19:30:12.683Z |
| CVE-2026-6202 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Easy Blog Site post.php sql injection |
code-projects |
Easy Blog Site |
2026-04-13T19:15:19.523Z | 2026-04-13T20:49:14.823Z |
| CVE-2026-6201 |
5.3 (4.0)
5.4 (3.1)
5.4 (3.0)
|
CodeAstro Online Job Portal Delete Job Posting job-del… |
CodeAstro |
Online Job Portal |
2026-04-13T19:00:18.544Z | 2026-04-13T19:00:18.544Z |
| CVE-2026-6100 |
9.1 (4.0)
|
Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decomp… |
Python Software Foundation |
CPython |
2026-04-13T17:15:47.606Z | 2026-04-14T14:30:25.622Z |
| CVE-2026-39958 |
5.2 (4.0)
|
oma-topic: name Field in Topic Manifests (topic.json) … |
AOSC-Dev |
oma |
2026-04-09T16:28:18.758Z | 2026-04-13T20:08:17.849Z |
| CVE-2026-39703 |
6.5 (3.1)
|
WordPress WPBITS Addons For Elementor Page Builder plu… |
wpbits |
WPBITS Addons For Elementor Page Builder |
2026-04-08T08:30:47.201Z | 2026-04-13T18:53:44.432Z |
| CVE-2026-39695 |
5.4 (3.1)
|
WordPress Podigee plugin <= 1.4.0 - Server Side Reques… |
podigee |
Podigee |
2026-04-08T08:30:45.786Z | 2026-04-13T19:11:44.168Z |
| CVE-2026-39693 |
5.9 (3.1)
|
WordPress FSM Custom Featured Image Caption plugin <= … |
fesomia |
FSM Custom Featured Image Caption |
2026-04-08T08:30:45.404Z | 2026-04-13T18:54:00.514Z |
| CVE-2026-39689 |
N/A
|
WordPress eShipper Commerce plugin <= 2.16.12 - Broken… |
eshipper |
eShipper Commerce |
2026-04-08T08:30:44.317Z | 2026-04-13T19:23:53.027Z |
| CVE-2026-39683 |
5.9 (3.1)
|
WordPress Garden Gnome Package plugin <= 2.4.1 - Cross… |
Chief Gnome |
Garden Gnome Package |
2026-04-08T08:30:42.120Z | 2026-04-13T18:53:16.665Z |
| CVE-2026-39681 |
7.5 (3.1)
|
WordPress Homeo theme <= 1.2.59 - Local File Inclusion… |
ApusTheme |
Homeo |
2026-04-08T08:30:41.127Z | 2026-04-13T19:50:50.631Z |
| CVE-2026-39679 |
7.5 (3.1)
|
WordPress Freeio theme <= 1.3.21 - Local File Inclusio… |
ApusTheme |
Freeio |
2026-04-08T08:30:40.735Z | 2026-04-13T19:57:43.734Z |
| CVE-2026-39677 |
7.5 (3.1)
|
WordPress Emphires theme <= 3.9 - Local File Inclusion… |
Creatives_Planet |
Emphires |
2026-04-08T08:30:40.378Z | 2026-04-13T20:09:31.139Z |
| CVE-2026-39667 |
5.9 (3.1)
|
WordPress Korea SNS plugin <= 1.7.0 - Cross Site Scrip… |
Jongmyoung Kim |
Korea SNS |
2026-04-08T08:30:38.379Z | 2026-04-13T18:49:47.140Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-39482 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-04-08T09:16:22.830 | 2026-04-13T20:16:35.097 |
| fkie_cve-2026-35022 | Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in aut… | 2026-04-06T20:16:25.260 | 2026-04-13T20:16:34.777 |
| fkie_cve-2026-35021 | Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the… | 2026-04-06T20:16:25.067 | 2026-04-13T20:16:34.557 |
| fkie_cve-2026-35020 | Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the… | 2026-04-06T20:16:24.863 | 2026-04-13T20:16:34.313 |
| fkie_cve-2026-33534 | EspoCRM is an open source customer relationship management application. Versions 9.3.3 and below ha… | 2026-04-13T20:16:33.970 | 2026-04-13T20:16:33.970 |
| fkie_cve-2026-32605 | nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the … | 2026-04-13T20:16:33.787 | 2026-04-13T20:16:33.787 |
| fkie_cve-2026-32270 | Craft Commerce is an ecommerce platform for Craft CMS. In versions 4.0.0 through 4.10.2 and 5.0.0 t… | 2026-04-13T20:16:33.527 | 2026-04-13T20:16:33.527 |
| fkie_cve-2026-31048 | An issue in the <code>pickle</code> protocol of Pyro v3.x allows attackers to execute arbitrary cod… | 2026-04-13T20:16:33.410 | 2026-04-13T20:16:33.410 |
| fkie_cve-2026-30999 | A heap buffer overflow in the av_bprint_finalize() function of FFmpeg v8.0.1 allows attackers to ca… | 2026-04-13T15:17:32.827 | 2026-04-13T20:16:33.180 |
| fkie_cve-2026-30998 | An improper resource deallocation and closure vulnerability in the tools/zmqsend.c component of FFm… | 2026-04-13T15:17:32.697 | 2026-04-13T20:16:33.003 |
| fkie_cve-2026-30997 | An out-of-bounds read in the read_global_param() function (libavcodec/av1dec.c) of FFmpeg v8.0.1 al… | 2026-04-13T15:17:32.570 | 2026-04-13T20:16:32.827 |
| fkie_cve-2026-29628 | A stack overflow in the experimental/tinyobj_loader_opt.h file of tinyobjloader commit d56555b allo… | 2026-04-13T15:17:19.673 | 2026-04-13T20:16:32.477 |
| fkie_cve-2025-69624 | Nitro PDF Pro for Windows 14.41.1.4 contains a NULL pointer dereference vulnerability in the JavaSc… | 2026-04-13T16:16:24.740 | 2026-04-13T20:16:26.437 |
| fkie_cve-2025-66769 | A NULL pointer dereference in Nitro PDF Pro for Windows v14.41.1.4 allows attackers to cause a Deni… | 2026-04-13T16:16:24.620 | 2026-04-13T20:16:26.247 |
| fkie_cve-2022-27672 | When SMT is enabled, certain AMD processors may speculatively execute instructions using a target f… | 2023-03-01T08:15:10.343 | 2026-04-13T20:16:23.773 |
| fkie_cve-2026-0968 | A flaw was found in libssh in which a malicious SFTP (SSH File Transfer Protocol) server can exploi… | 2026-03-26T21:17:01.150 | 2026-04-13T20:15:09.527 |
| fkie_cve-2026-35621 | OpenClaw before 2026.3.24 contains a privilege escalation vulnerability where the /allowlist comman… | 2026-04-10T17:17:04.520 | 2026-04-13T20:14:25.677 |
| fkie_cve-2026-35641 | OpenClaw before 2026.3.24 contains an arbitrary code execution vulnerability in local plugin and ho… | 2026-04-10T17:17:04.697 | 2026-04-13T20:14:11.753 |
| fkie_cve-2026-35643 | OpenClaw before 2026.3.22 contains an unvalidated WebView JavascriptInterface vulnerability allowin… | 2026-04-10T17:17:04.887 | 2026-04-13T19:59:22.613 |
| fkie_cve-2026-1900 | The Link Whisper Free WordPress plugin before 0.9.1 has a publicly accessible REST endpoint that al… | 2026-04-07T07:16:23.803 | 2026-04-13T19:52:53.183 |
| fkie_cve-2026-35659 | OpenClaw before 2026.3.22 contains a service discovery vulnerability where TXT metadata from Bonjou… | 2026-04-10T17:17:07.277 | 2026-04-13T19:21:30.433 |
| fkie_cve-2026-6200 | A vulnerability was determined in Tenda F456 1.0.0.5. The affected element is the function formwebt… | 2026-04-13T19:16:58.240 | 2026-04-13T19:16:58.240 |
| fkie_cve-2026-6199 | A vulnerability was found in Tenda F456 1.0.0.5. Impacted is the function fromqossetting of the fil… | 2026-04-13T19:16:58.033 | 2026-04-13T19:16:58.033 |
| fkie_cve-2026-6198 | A vulnerability has been found in Tenda F456 1.0.0.5. This issue affects the function fromNatStatic… | 2026-04-13T19:16:57.817 | 2026-04-13T19:16:57.817 |
| fkie_cve-2026-5913 | Out of bounds read in Blink in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to pe… | 2026-04-08T22:16:31.220 | 2026-04-13T19:16:57.083 |
| fkie_cve-2026-5882 | Incorrect security UI in Fullscreen in Google Chrome prior to 147.0.7727.55 allowed a remote attack… | 2026-04-08T22:16:27.847 | 2026-04-13T19:16:54.813 |
| fkie_cve-2026-5881 | Policy bypass in LocalNetworkAccess in Google Chrome prior to 147.0.7727.55 allowed a remote attack… | 2026-04-08T22:16:27.753 | 2026-04-13T19:16:54.637 |
| fkie_cve-2026-5880 | Insufficient policy enforcement in browser UI in Google Chrome prior to 147.0.7727.55 allowed a rem… | 2026-04-08T22:16:27.650 | 2026-04-13T19:16:54.430 |
| fkie_cve-2026-5878 | Incorrect security UI in Blink in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to… | 2026-04-08T22:16:27.440 | 2026-04-13T19:16:54.257 |
| fkie_cve-2026-5877 | Use after free in Navigation in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to e… | 2026-04-08T22:16:27.323 | 2026-04-13T19:16:53.953 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-w9xg-4wh5-v94m |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability was detected in Tenda F456 1.0.0.5. This affects the function fromexeCommand of the… | 2026-04-13T18:30:42Z | 2026-04-13T18:30:42Z |
| ghsa-pjj5-xh8h-6xp3 |
9.8 (3.1)
8.9 (4.0)
|
A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by th… | 2026-04-13T18:30:42Z | 2026-04-13T18:30:42Z |
| ghsa-m6x7-6x59-cxc6 |
|
Sourcecodester Online Thesis Archiving System v1.0 is vulnerable to SQL injection in the file /otas… | 2026-04-13T18:30:41Z | 2026-04-13T18:30:42Z |
| ghsa-h84p-pw6f-c6p6 |
6.5 (3.1)
7.1 (4.0)
|
A vulnerability exists in the command handling of the IEC 61850 communication stack included in the… | 2026-04-13T18:30:42Z | 2026-04-13T18:30:42Z |
| ghsa-f7v4-47q7-f3fq |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability has been found in SourceCodester Pharmacy Sales and Inventory System 1.0. The affec… | 2026-04-13T18:30:42Z | 2026-04-13T18:30:42Z |
| ghsa-6jfp-5ggc-pgmx |
3.3 (3.1)
1.9 (4.0)
|
A vulnerability was identified in uclouvain openjpeg up to 2.5.4. This impacts the function opj_pi_… | 2026-04-13T18:30:42Z | 2026-04-13T18:30:42Z |
| ghsa-4qrv-q9xg-qj66 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in itsourcecode Construction Management System 1.0. This affects an … | 2026-04-13T18:30:42Z | 2026-04-13T18:30:42Z |
| ghsa-4pq4-q672-hqmr |
7.3 (3.1)
5.5 (4.0)
|
A security flaw has been discovered in PHPGurukul Daily Expense Tracking System 1.1. Affected is an… | 2026-04-13T18:30:42Z | 2026-04-13T18:30:42Z |
| ghsa-xqmq-m74q-gr4q |
7.5 (4.0)
|
Improper Neutralization of Special Elements used in an OS Command vulnerability allows OS Command I… | 2026-04-13T18:30:41Z | 2026-04-13T18:30:41Z |
| ghsa-xqc8-jwv2-x9c2 |
8.7 (4.0)
|
Improper Neutralization of Special Elements used in an OS Command vulnerability allows OS Command I… | 2026-04-13T18:30:41Z | 2026-04-13T18:30:41Z |
| ghsa-w6pw-7fv8-jw27 |
|
Sourcecodester Online Thesis Archiving System v1.0 is vulnerable to SQL injection in /otas/projects… | 2026-04-13T18:30:41Z | 2026-04-13T18:30:41Z |
| ghsa-qvcf-9h3q-2cwq |
8.6 (4.0)
|
Unrestricted Upload of File with Dangerous Type vulnerability allows Remote Code Execution via file… | 2026-04-13T18:30:40Z | 2026-04-13T18:30:41Z |
| ghsa-qprq-3xhq-p84p |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was detected in SourceCodester Pharmacy Sales and Inventory System 1.0. This issue … | 2026-04-13T18:30:41Z | 2026-04-13T18:30:41Z |
| ghsa-q869-m422-4qcv |
4.3 (3.1)
5.3 (4.0)
|
The bson_validate function may return early on specific inputs and incorrectly report success. This… | 2026-04-13T18:30:41Z | 2026-04-13T18:30:41Z |
| ghsa-phj3-hcm2-mjhc |
|
Nitro PDF Pro for Windows 14.41.1.4 contains a heap use-after-free vulnerability in the implementat… | 2026-04-13T18:30:40Z | 2026-04-13T18:30:41Z |
| ghsa-mf3r-jr4m-5wv2 |
|
Sourcecodester Online Thesis Archiving System v1.0 is vulnerale to SQL injection in the file /otas/… | 2026-04-13T18:30:41Z | 2026-04-13T18:30:41Z |
| ghsa-m9vq-hc45-mf4h |
8.4 (4.0)
|
Missing Authorization vulnerability allows Exposure of Sensitive Information via configuration endp… | 2026-04-13T18:30:41Z | 2026-04-13T18:30:41Z |
| ghsa-f5v3-ff4w-cjrp |
8.8 (3.1)
7.4 (4.0)
|
A security vulnerability has been detected in UTT HiPER 1200GW up to 2.5.3-170306. This vulnerabili… | 2026-04-13T18:30:41Z | 2026-04-13T18:30:41Z |
| ghsa-chf8-3p4x-rchj |
8.7 (4.0)
|
Improper Neutralization of Special Elements used in an SQL Command vulnerability allows SQL Injecti… | 2026-04-13T18:30:41Z | 2026-04-13T18:30:41Z |
| ghsa-c46f-5cvg-v8f7 |
7.3 (3.1)
5.5 (4.0)
|
A flaw has been found in SourceCodester Pharmacy Sales and Inventory System 1.0. Impacted is an unk… | 2026-04-13T18:30:41Z | 2026-04-13T18:30:41Z |
| ghsa-9w52-f5xp-pq4c |
8.7 (4.0)
|
Improper Neutralization of Special Elements used in an OS Command vulnerability allows OS Command I… | 2026-04-13T18:30:40Z | 2026-04-13T18:30:41Z |
| ghsa-65hr-68mj-9crm |
2.4 (3.1)
1.9 (4.0)
|
A weakness has been identified in code-projects Simple Content Management System 1.0. This affects … | 2026-04-13T18:30:41Z | 2026-04-13T18:30:41Z |
| ghsa-5mp8-rq5m-pj7m |
4.0 (3.1)
|
An issue was discovered in HAProxy before 3.3.6. The HTTP/3 parser does not check that the received… | 2026-04-13T18:30:41Z | 2026-04-13T18:30:41Z |
| ghsa-4hgf-5jwc-7v3g |
8.7 (4.0)
|
Improper Neutralization of Special Elements used in an SQL Command vulnerability allows SQL Injecti… | 2026-04-13T18:30:41Z | 2026-04-13T18:30:41Z |
| ghsa-4g9c-4vrc-qw29 |
2.1 (4.0)
|
Improper Neutralization of Input During Web Page Generation vulnerability allows Stored Cross-Site … | 2026-04-13T18:30:41Z | 2026-04-13T18:30:41Z |
| ghsa-mc4f-r875-v87w |
8.8 (3.1)
|
Dag Authors, who normally should not be able to execute code in the webserver context could craft X… | 2026-04-13T15:31:43Z | 2026-04-13T18:30:40Z |
| ghsa-j86x-fwp2-qh7v |
|
Before Airflow 3.2.0, it was unclear that secure Airflow deployments require the Deployment Manager… | 2026-04-13T15:31:42Z | 2026-04-13T18:30:40Z |
| ghsa-j6p7-6pjc-rwmh |
|
Cross-Site Scripting vulnerability in the Snipe-IT web-based asset management system v8.3.0 to up a… | 2026-04-13T18:30:40Z | 2026-04-13T18:30:40Z |
| ghsa-c4hg-6933-x62x |
7.1 (3.1)
|
Server-Side Request Forgery via SW-URL Header vulnerability in Apache SkyWalking MCP. This issue a… | 2026-04-13T15:31:41Z | 2026-04-13T18:30:40Z |
| ghsa-3gpw-5r2f-ch38 |
6.8 (3.1)
|
Rate Limiting for attempting a user login is not being properly enforced, making HCL DevOps Velocit… | 2026-04-13T18:30:40Z | 2026-04-13T18:30:40Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2009-12 |
|
The password_checker function in config/multiconfig.py in MoinMoin 1.6.1 uses the crackli… | moin | 2009-03-30T01:30:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2008-14 |
|
Multiple cross-site request forgery (CSRF) vulnerabilities in Plone CMS 3.0.5 and 3.0.6 a… | Plone | 2008-03-20T00:44:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2008-13 |
|
Multiple cross-site scripting (XSS) vulnerabilities in macro/AdvancedSearch.py in moin (a… | moin | 2008-07-30T18:41:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2008-12 |
|
The user form processing (userform.py) in MoinMoin before 1.6.3, when using ACLs or a non… | moin | 2008-04-25T06:05:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2007-4 |
|
Plone 2.5 through 2.5.4 and 3.0 through 3.0.2 allows remote attackers to execute arbitrar… | plone | 2007-11-07T21:46:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2006-6 |
|
Unspecified vulnerability in PlonePAS in Plone 2.5 and 2.5.1, when anonymous member regis… | Plone | 2006-12-07T23:28:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2006-5 |
|
Unspecified vulnerability in the Password Reset Tool before 0.4.1 on Plone 2.5 and 2.5.1 … | Plone | 2006-09-29T19:07:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2022-43072 |
7.5 (3.1)
|
An inflation issue was discovered in Chia Network CAT1 Standard 1.0.0. Previously minted … | chia-blockchain | 2022-07-29T21:15:00Z | 2024-11-25T18:33:04.123836Z |
| pysec-2022-43068 |
6.3 (3.1)
|
A race condition flaw was found in ansible-runner, where an attacker could watch for rapi… | ansible-runner | 2022-08-23T16:15:00Z | 2024-11-25T18:33:04.123836Z |
| pysec-2022-43067 |
6.6 (3.1)
|
A flaw was found in ansible-runner where the default temporary files configuration in ans… | ansible-runner | 2022-08-23T16:15:00Z | 2024-11-25T18:33:04.123836Z |
| pysec-2013-35 |
|
The clear_volume function in LVMVolumeDriver driver in OpenStack Cinder 2013.1.1 through … | cinder | 2013-09-16T19:14:00Z | 2024-11-25T18:33:04.123836Z |
| pysec-2022-43063 |
9.8 (3.1)
|
Code injection in paddle.audio.functional.get_window in PaddlePaddle 2.4.0-rc0 allows arb… | paddlepaddle | 2022-12-07T09:15:00+00:00 | 2024-11-22T12:27:25.862098+00:00 |
| pysec-2024-151 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. Vyper compi… | vyper | 2024-01-30T21:15:00+00:00 | 2024-11-21T14:23:03.091183+00:00 |
| pysec-2024-150 |
9.8 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. Arrays can … | vyper | 2024-02-07T17:15:00+00:00 | 2024-11-21T14:23:03.024978+00:00 |
| pysec-2022-43176 |
9.8 (3.1)
|
The Zibal package in PyPI v1.0.0 was discovered to contain a code execution backdoor. Thi… | zibal | 2022-06-24T21:15:00Z | 2024-11-21T14:23:03.404044Z |
| pysec-2022-43175 |
6.1 (3.1)
|
Drag and Drop XBlock v2 implements a drag-and-drop style problem, where a learner has to … | xblock-drag-and-drop-v2 | 2022-11-28T21:15:00+00:00 | 2024-11-21T14:23:03.352390+00:00 |
| pysec-2022-43173 |
9.8 (3.1)
|
The wikifaces package in PyPI v1.0 included a code execution backdoor inserted by a third… | wikifaces | 2022-07-22T15:15:00Z | 2024-11-21T14:23:03.244154Z |
| pysec-2022-43172 |
9.8 (3.1)
|
The Watertools package in PyPI v0.0.0 was discovered to contain a code execution backdoor… | watertools | 2022-06-24T21:15:00Z | 2024-11-21T14:23:03.143453Z |
| pysec-2019-256 |
7.5 (3.1)
|
In libwebp 0.5.1, there is a double free bug in libwebpmux. | webp | 2019-05-23T18:29:00Z | 2024-11-21T14:23:03.194401Z |
| pysec-2017-148 |
6.1 (3.1)
|
Cross-site scripting (XSS) vulnerability in ZMI pages that use the manage_tabs_message in… | zope | 2017-08-07T17:29:00Z | 2024-11-21T14:23:03.459792Z |
| pysec-2006-8 |
|
The docutils module in Zope (Zope2) 2.7.0 through 2.7.9 and 2.8.0 through 2.8.8 does not … | zope2 | 2006-09-19T18:07:00Z | 2024-11-21T14:23:03.63347Z |
| pysec-2006-7 |
|
Zope 2.7.0 to 2.7.8, 2.8.0 to 2.8.7, and 2.9.0 to 2.9.3 (Zope2) does not disable the "raw… | zope2 | 2006-07-07T23:05:00Z | 2024-11-21T14:23:03.576588Z |
| pysec-2024-149 |
9.8 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In versions… | vyper | 2024-02-01T17:15:00+00:00 | 2024-11-21T14:23:02.970591+00:00 |
| pysec-2024-148 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. When calls … | vyper | 2024-02-02T17:15:00+00:00 | 2024-11-21T14:23:02.917464+00:00 |
| pysec-2024-147 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. There is an error in the stack m… | vyper | 2024-02-05T21:15:00+00:00 | 2024-11-21T14:23:02.864019+00:00 |
| pysec-2023-307 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). Contr… | vyper | 2023-12-13T20:15:00+00:00 | 2024-11-21T14:23:02.808922+00:00 |
| pysec-2023-306 |
8.1 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). In ve… | vyper | 2023-09-18T21:16:00+00:00 | 2024-11-21T14:23:02.752932+00:00 |
| pysec-2023-305 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). Start… | vyper | 2023-09-18T21:16:00+00:00 | 2024-11-21T14:23:02.698147+00:00 |
| pysec-2023-304 |
8.8 (3.1)
|
vantage6 is a framework to manage and deploy privacy enhancing technologies like Federate… | vantage6-server | 2023-11-14T21:15:00+00:00 | 2024-11-21T14:23:02.641254+00:00 |
| pysec-2023-303 |
8.8 (3.1)
|
vantage6 is a framework to manage and deploy privacy enhancing technologies like Federate… | vantage6-node | 2023-11-14T21:15:00+00:00 | 2024-11-21T14:23:02.574095+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-4262 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.557062Z |
| gsd-2024-4261 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.534179Z |
| gsd-2024-4260 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.587447Z |
| gsd-2024-4259 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.580041Z |
| gsd-2024-4258 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.581681Z |
| gsd-2024-4257 | A vulnerability was found in BlueNet Technology Clinical Browsing System 1.2.1. It has be… | 2024-04-27T05:02:16.570113Z |
| gsd-2024-4256 | A vulnerability was found in Techkshetra Info Solutions Savsoft Quiz 6.0 and classified a… | 2024-04-27T05:02:16.544284Z |
| gsd-2024-4255 | A vulnerability, which was classified as critical, has been found in Ruijie RG-UAC up to … | 2024-04-27T05:02:16.623487Z |
| gsd-2024-4254 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.587642Z |
| gsd-2024-4253 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.562905Z |
| gsd-2024-4252 | A vulnerability classified as critical has been found in Tenda i22 1.0.0.3(4687). This af… | 2024-04-27T05:02:16.602334Z |
| gsd-2024-4251 | A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been rated as critical. Aff… | 2024-04-27T05:02:16.569517Z |
| gsd-2024-4250 | A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been declared as critical. … | 2024-04-27T05:02:16.555748Z |
| gsd-2024-4249 | A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been classified as critical… | 2024-04-27T05:02:16.524020Z |
| gsd-2024-4248 | A vulnerability was found in Tenda i21 1.0.0.14(4656) and classified as critical. This is… | 2024-04-27T05:02:16.569718Z |
| gsd-2024-4247 | A vulnerability has been found in Tenda i21 1.0.0.14(4656) and classified as critical. Th… | 2024-04-27T05:02:16.588079Z |
| gsd-2024-4246 | A vulnerability, which was classified as critical, was found in Tenda i21 1.0.0.14(4656).… | 2024-04-27T05:02:16.603900Z |
| gsd-2024-4245 | A vulnerability, which was classified as critical, has been found in Tenda i21 1.0.0.14(4… | 2024-04-27T05:02:16.558324Z |
| gsd-2024-4244 | A vulnerability classified as critical was found in Tenda W9 1.0.0.7(4456). Affected by t… | 2024-04-27T05:02:16.554860Z |
| gsd-2024-4243 | A vulnerability classified as critical has been found in Tenda W9 1.0.0.7(4456). Affected… | 2024-04-27T05:02:16.549231Z |
| gsd-2024-4242 | A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been rated as critical. This … | 2024-04-27T05:02:16.596328Z |
| gsd-2024-4241 | A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been declared as critical. Th… | 2024-04-27T05:02:16.531844Z |
| gsd-2024-4240 | A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been classified as critical. … | 2024-04-27T05:02:16.585061Z |
| gsd-2024-4239 | A vulnerability was found in Tenda AX1806 1.0.0.1 and classified as critical. Affected by… | 2024-04-27T05:02:16.575159Z |
| gsd-2024-4238 | A vulnerability has been found in Tenda AX1806 1.0.0.1 and classified as critical. Affect… | 2024-04-27T05:02:16.577033Z |
| gsd-2024-4237 | A vulnerability, which was classified as critical, was found in Tenda AX1806 1.0.0.1. Aff… | 2024-04-27T05:02:16.532589Z |
| gsd-2024-4236 | A vulnerability, which was classified as critical, has been found in Tenda AX1803 1.0.0.1… | 2024-04-27T05:02:16.536897Z |
| gsd-2024-4235 | A vulnerability classified as problematic was found in Netgear DG834Gv5 1.6.01.34. This v… | 2024-04-27T05:02:16.608439Z |
| gsd-2024-4234 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-27T05:02:16.558629Z |
| gsd-2024-4233 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.618656Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2370 | Malicious code in mcc-data (npm) | 2026-03-24T15:51:27Z | 2026-04-07T14:41:23Z |
| mal-2026-2369 | Malicious code in loadshh (npm) | 2026-03-24T15:50:45Z | 2026-04-07T14:41:23Z |
| mal-2026-2328 | Malicious code in mcp-server-todo (npm) | 2026-04-01T11:23:23Z | 2026-04-07T14:41:23Z |
| mal-2026-2414 | Malicious code in ftapi-core (npm) | 2026-03-24T09:05:38Z | 2026-04-07T14:41:22Z |
| mal-2026-2368 | Malicious code in json-mapping-token (npm) | 2026-03-24T15:49:41Z | 2026-04-07T14:41:22Z |
| mal-2026-2367 | Malicious code in json-mapping-fetch (npm) | 2026-03-24T15:49:40Z | 2026-04-07T14:41:22Z |
| mal-2026-2366 | Malicious code in ghost-module (npm) | 2026-03-24T15:47:13Z | 2026-04-07T14:41:22Z |
| mal-2026-2325 | Malicious code in jonas-prettier-logger (npm) | 2026-04-01T09:10:18Z | 2026-04-07T14:41:22Z |
| mal-2026-2324 | Malicious code in jellyfi-pino-pretty-logger (npm) | 2026-04-01T09:10:18Z | 2026-04-07T14:41:22Z |
| mal-2026-2498 | Malicious code in df-sandbox-test (npm) | 2026-04-06T09:18:00Z | 2026-04-07T14:41:21Z |
| mal-2026-2497 | Malicious code in commerce-utils (npm) | 2026-04-06T09:11:24Z | 2026-04-07T14:41:21Z |
| mal-2026-2496 | Malicious code in chess-sec-ssrf1 (npm) | 2026-04-06T06:10:44Z | 2026-04-07T14:41:21Z |
| mal-2026-2495 | Malicious code in cloudera (npm) | 2026-04-05T20:05:37Z | 2026-04-07T14:41:21Z |
| mal-2026-2493 | Malicious code in cloudera-poc (npm) | 2026-04-05T19:40:31Z | 2026-04-07T14:41:21Z |
| mal-2026-2444 | Malicious code in exszpe3szs (npm) | 2026-04-02T15:12:47Z | 2026-04-07T14:41:21Z |
| mal-2026-2443 | Malicious code in exprrrress (npm) | 2026-04-02T18:21:44Z | 2026-04-07T14:41:21Z |
| mal-2026-2442 | Malicious code in expreeeess (npm) | 2026-04-02T18:11:34Z | 2026-04-07T14:41:21Z |
| mal-2026-2441 | Malicious code in expirs (npm) | 2026-04-02T15:13:53Z | 2026-04-07T14:41:21Z |
| mal-2026-2440 | Malicious code in experedzss (npm) | 2026-04-02T15:11:56Z | 2026-04-07T14:41:21Z |
| mal-2026-2439 | Malicious code in expeewas (npm) | 2026-04-02T15:22:21Z | 2026-04-07T14:41:21Z |
| mal-2026-2438 | Malicious code in expeedsxs (npm) | 2026-04-02T15:12:22Z | 2026-04-07T14:41:21Z |
| mal-2026-2437 | Malicious code in exaprse (npm) | 2026-04-02T15:12:58Z | 2026-04-07T14:41:21Z |
| mal-2026-2436 | Malicious code in eixp4ressz (npm) | 2026-04-02T15:12:04Z | 2026-04-07T14:41:21Z |
| mal-2026-2419 | Malicious code in express-session-js (npm) | 2026-04-02T09:56:44Z | 2026-04-07T14:41:21Z |
| mal-2026-2365 | Malicious code in env-nodejs (npm) | 2026-03-24T15:44:15Z | 2026-04-07T14:41:21Z |
| mal-2026-2364 | Malicious code in env-node-cli (npm) | 2026-03-24T15:44:15Z | 2026-04-07T14:41:21Z |
| mal-2026-2363 | Malicious code in env-extend (npm) | 2026-03-24T15:44:14Z | 2026-04-07T14:41:21Z |
| mal-2026-2362 | Malicious code in env-express-cli (npm) | 2026-03-24T15:44:13Z | 2026-04-07T14:41:21Z |
| mal-2026-2361 | Malicious code in env-express (npm) | 2026-03-24T15:44:12Z | 2026-04-07T14:41:21Z |
| mal-2026-2360 | Malicious code in env-expanded (npm) | 2026-03-24T15:44:12Z | 2026-04-07T14:41:21Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0377 | Ivanti Endpoint Manager: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2026-02-10T23:00:00.000+00:00 | 2026-03-09T23:00:00.000+00:00 |
| wid-sec-w-2026-0629 | Zabbix: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0628 | Nextcloud: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0627 | CoreDNS: Mehrere Schwachstellen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0626 | Flowise: Mehrere Schwachstellen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0615 | Red Hat Enterprise Linux (nfs-utils): Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0612 | Google Chrome: Mehrere Schwachstellen | 2026-03-04T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0611 | Eclipse Jetty: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-04T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0579 | Django: Mehrere Schwachstellen | 2026-03-03T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0565 | FreeType: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-03-02T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0481 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0452 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2026-02-18T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0427 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2026-02-16T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0357 | Roundcube: Mehrere Schwachstellen | 2026-02-09T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0284 | libxml2 (xmllint): Schwachstelle ermöglicht Denial of Service | 2026-02-02T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0265 | expat: Schwachstelle ermöglicht Codeausführung | 2026-01-29T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0213 | expat: Schwachstelle ermöglicht Denial of Service | 2026-01-25T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0126 | libxml2: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-15T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2854 | Roundcube: Mehrere Schwachstellen | 2025-12-15T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2846 | strongSwan (NetworkManager-Plugin): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-12-14T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2750 | Apache HTTP Server: Mehrere Schwachstellen | 2025-12-04T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2741 | cPython: Schwachstelle ermöglicht Denial of Service | 2025-12-03T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2703 | Zabbix: Mehrere Schwachstellen | 2025-11-30T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2166 | OpenSSL und LibreSSL: Mehrere Schwachstellen | 2025-09-30T22:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2040 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-11T22:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-1974 | Podman: Schwachstelle ermöglicht Manipulation von Dateien | 2025-09-04T22:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-1620 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-07-21T22:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-1569 | Oracle Java SE: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-1389 | Podman: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-06-24T22:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0441 | OpenClaw: Mehrere Schwachstellen | 2026-02-17T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-224-03 | Schneider Electric EcoStruxure Power Monitoring Expert | 2025-08-12T04:00:00.000000Z | 2025-11-11T08:00:00.000000Z |
| icsa-25-317-17 | Siemens Software Center and Solid Edge | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-16 | Siemens Altair Grid Engine | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-15 | Siemens COMOS | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-14 | Siemens Solid Edge | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-13 | Siemens LOGO! 8 BM Devices | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-135-17 | Siemens RUGGEDCOM ROX II | 2025-05-13T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-135-15 | Siemens Mendix OIDC SSO | 2025-05-13T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-135-05 | Siemens SIPROTEC and SICAM | 2025-05-13T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-044-04 | Siemens SIPROTEC 5 | 2025-02-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-016-04 | Siemens SIPROTEC 5 Products | 2025-01-14T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-24-193-14 | Siemens SIPROTEC | 2024-07-09T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-23-257-01 | Siemens SIMATIC, SIPLUS Products | 2023-09-12T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-23-103-06 | Siemens SIPROTEC 5 Devices | 2023-04-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-22-349-11 | Siemens SIPROTEC 5 Devices | 2022-12-13T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-22-195-02 | Siemens SICAM GridEdge | 2022-07-12T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-22-167-08 | Siemens SICAM GridEdge | 2022-06-14T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-310-03 | ABB FLXeon Controllers | 2025-11-06T07:00:00.000000Z | 2025-11-06T07:00:00.000000Z |
| icsa-25-310-01 | Advantech DeviceOn/iEdge | 2025-11-06T07:00:00.000000Z | 2025-11-06T07:00:00.000000Z |
| icsa-25-308-05 | IDIS ICM Viewer | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-04 | Radiometrics VizAir | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-03 | Delta Electronics CNCSoft-G2 | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-02 | Survision License Plate Recognition Camera | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| va-25-304-02 | Restaurant Brands International assistant platform multiple vulnerabilities | 2025-10-31T17:02:13Z | 2025-10-31T17:02:13Z |
| va-25-304-01 | ELOG multiple vulnerabilities | 2025-10-31T16:57:24Z | 2025-10-31T16:57:24Z |
| icsa-25-303-02 | Hitachi Energy TropOS | 2025-10-30T06:00:00.000000Z | 2025-10-30T06:00:00.000000Z |
| icsa-25-282-01 | Hitachi Energy Asset Suite (Update A) | 2025-09-30T08:50:13.000000Z | 2025-10-28T09:50:00.000000Z |
| icsma-25-301-01 | Vertikal Systems Hospital Manager Backend Services | 2025-10-28T06:00:00.000000Z | 2025-10-28T06:00:00.000000Z |
| icsma-25-296-01 | NIHON KOHDEN Central Monitor CNS-6201 | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-04 | Delta Electronics ASDA-Soft | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-phone-infodisc-sbyqqvbg | Cisco 7800, 8800, and 9800 Series Phones Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-phone-infodisc-sbyqQVbG | Cisco 7800, 8800, and 9800 Series Phones Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ndfc-sqli-cyppaxrl | Cisco Nexus Dashboard Fabric Controller SQL Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ndfc-sqli-CyPPAxrL | Cisco Nexus Dashboard Fabric Controller SQL Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-mpp-xss-8tav2tvf | Cisco 6800, 7800, 8800, and 9800 Series Phones with Multiplatform Firmware Stored Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-mpp-xss-8tAV2TvF | Cisco 6800, 7800, 8800, and 9800 Series Phones with Multiplatform Firmware Stored Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vulns-af544ed5 | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vulns-AF544ED5 | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vuln-dbqdwry | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vuln-DBQdWRy | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-auth-bypass-bbrf7mke | Cisco Identity Services Engine Authorization Bypass and Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-auth-bypass-BBRf7mkE | Cisco Identity Services Engine Authorization Bypass and Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-imp-inf-disc-cupkua5n | Cisco Unified Communications Manager IM & Presence Service Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-imp-inf-disc-cUPKuA5n | Cisco Unified Communications Manager IM & Presence Service Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-esa-wsa-sma-xss-zym3f49n | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-esa-wsa-sma-xss-zYm3f49n | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-epnmpi-sxss-yyf2zkxs | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-epnmpi-sxss-yyf2zkXs | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ece-dos-oqb9ufev | Cisco Enterprise Chat and Email Denial of Service Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ece-dos-Oqb9uFEv | Cisco Enterprise Chat and Email Denial of Service Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-cucm-xss-svckmmw | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-cucm-xss-SVCkMMW | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-cmm-info-disc-9zemahga | Cisco Meeting Management Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-cmm-info-disc-9ZEMAhGA | Cisco Meeting Management Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ccmp-sxss-qbtdbzdd | Cisco Unified Contact Center Management Portal Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ccmp-sxss-qBTDBZDD | Cisco Unified Contact Center Management Portal Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-backhaul-ap-cmdinj-r7e28ecs | Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point Command Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-backhaul-ap-cmdinj-R7E28Ecs | Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point Command Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-3550-acl-bypass-mhskzc2q | Cisco Nexus 3550-F Switches Access Control List Programming Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-3550-acl-bypass-mhskZc2q | Cisco Nexus 3550-F Switches Access Control List Programming Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-46765 | ice: protect XDP configuration with a mutex | 2024-09-01T07:00:00.000Z | 2026-03-31T15:14:57.000Z |
| msrc_cve-2021-47432 | lib/generic-radix-tree.c: Don't overflow in peek() | 2024-05-02T07:00:00.000Z | 2026-03-31T15:14:48.000Z |
| msrc_cve-2024-42317 | mm/huge_memory: avoid PMD-size page cache if needed | 2024-08-02T00:00:00.000Z | 2026-03-31T15:14:47.000Z |
| msrc_cve-2024-57945 | riscv: mm: Fix the out of bound issue of vmemmap address | 2025-01-02T00:00:00.000Z | 2026-03-31T15:14:46.000Z |
| msrc_cve-2025-61727 | Improper application of excluded DNS name constraints when verifying wildcard names in crypto/x509 | 2025-12-02T00:00:00.000Z | 2026-03-31T15:14:43.000Z |
| msrc_cve-2024-56604 | Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() | 2024-12-02T00:00:00.000Z | 2026-03-31T15:14:42.000Z |
| msrc_cve-2026-3579 | Non-constant time multiplication subroutine __muldi3 on RISC-V RV32I | 2026-03-02T00:00:00.000Z | 2026-03-31T15:14:40.000Z |
| msrc_cve-2026-1703 | Limited path traversal when installing wheel archives | 2026-02-02T00:00:00.000Z | 2026-03-31T15:14:40.000Z |
| msrc_cve-2024-46772 | drm/amd/display: Check denominator crb_pipes before used | 2024-09-01T07:00:00.000Z | 2026-03-31T15:14:38.000Z |
| msrc_cve-2025-2915 | HDF5 H5Faccum.c H5F__accum_free heap-based overflow | 2025-03-02T00:00:00.000Z | 2026-03-31T15:14:30.000Z |
| msrc_cve-2024-57924 | fs: relax assertions on failure to encode file handles | 2025-01-02T00:00:00.000Z | 2026-03-31T15:14:28.000Z |
| msrc_cve-2024-47794 | bpf: Prevent tailcall infinite loop caused by freplace | 2025-01-02T00:00:00.000Z | 2026-03-31T15:14:28.000Z |
| msrc_cve-2026-3849 | Buffer Overflow in HPKE via Oversized ECH Config | 2026-03-02T00:00:00.000Z | 2026-03-31T15:14:23.000Z |
| msrc_cve-2026-2443 | Libsoup: out-of-bounds read in libsoup handle_partial_get() leading to heap information disclosure | 2026-02-02T00:00:00.000Z | 2026-03-31T15:14:17.000Z |
| msrc_cve-2024-46678 | bonding: change ipsec_lock from spin lock to mutex | 2024-09-01T07:00:00.000Z | 2026-03-31T15:14:17.000Z |
| msrc_cve-2023-53209 | wifi: mac80211_hwsim: Fix possible NULL dereference | 2025-09-02T00:00:00.000Z | 2026-03-31T15:14:13.000Z |
| msrc_cve-2024-57893 | ALSA: seq: oss: Fix races at processing SysEx messages | 2025-01-02T00:00:00.000Z | 2026-03-31T15:14:09.000Z |
| msrc_cve-2024-50098 | scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down | 2024-11-02T00:00:00.000Z | 2026-03-31T15:14:04.000Z |
| msrc_cve-2026-4395 | Heap-based buffer overflow in wc_ecc_import_x963_ex KCAPI path | 2026-03-02T00:00:00.000Z | 2026-03-31T15:14:03.000Z |
| msrc_cve-2024-24856 | NULL pointer deference in acpi_db_convert_to_package of Linux acpi module | 2024-04-02T07:00:00.000Z | 2026-03-31T15:14:00.000Z |
| msrc_cve-2025-40158 | ipv6: use RCU in ip6_output() | 2025-11-02T00:00:00.000Z | 2026-03-31T15:13:57.000Z |
| msrc_cve-2025-29923 | go-redis allows potential out of order responses when `CLIENT SETINFO` times out during connection establishment | 2025-03-02T00:00:00.000Z | 2026-03-31T15:13:52.000Z |
| msrc_cve-2024-46762 | xen: privcmd: Fix possible access to a freed kirqfd instance | 2024-09-01T07:00:00.000Z | 2026-03-31T15:13:52.000Z |
| msrc_cve-2022-50304 | mtd: core: fix possible resource leak in init_mtd() | 2025-09-02T00:00:00.000Z | 2026-03-31T15:13:50.000Z |
| msrc_cve-2024-46733 | btrfs: fix qgroup reserve leaks in cow_file_range | 2024-09-01T07:00:00.000Z | 2026-03-31T15:13:46.000Z |
| msrc_cve-2025-71227 | wifi: mac80211: don't WARN for connections on invalid channels | 2026-02-02T00:00:00.000Z | 2026-03-31T15:13:44.000Z |
| msrc_cve-2026-3580 | Compiler-induced timing leak in sp_256_get_entry_256_9 on RISC-V | 2026-03-02T00:00:00.000Z | 2026-03-31T15:13:42.000Z |
| msrc_cve-2024-50111 | LoongArch: Enable IRQ if do_ale() triggered in irq-enabled context | 2024-11-02T00:00:00.000Z | 2026-03-31T15:13:42.000Z |
| msrc_cve-2024-57898 | wifi: cfg80211: clear link ID from bitmap during link delete after clean up | 2025-01-02T00:00:00.000Z | 2026-03-31T15:13:37.000Z |
| msrc_cve-2025-40170 | net: use dst_dev_rcu() in sk_setup_caps() | 2025-11-02T00:00:00.000Z | 2026-03-31T15:13:34.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0251 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-08-13T07:25:08.789693Z | 2025-08-13T07:25:08.789693Z |
| ncsc-2025-0250 | Kwetsbaarheden verholpen in Microsoft Office | 2025-08-13T07:23:56.395786Z | 2025-08-13T07:23:56.395786Z |
| ncsc-2025-0249 | Kwetsbaarheden verholpen in Azure-producten | 2025-08-13T07:22:17.432067Z | 2025-08-13T07:22:17.432067Z |
| ncsc-2025-0248 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-08-13T07:21:52.836899Z | 2025-08-13T07:21:52.836899Z |
| ncsc-2025-0247 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2025-08-13T07:19:19.911308Z | 2025-08-13T07:19:19.911308Z |
| ncsc-2025-0246 | Kwetsbaarheden verholpen in Siemens producten | 2025-08-12T13:03:08.211775Z | 2025-08-12T13:03:08.211775Z |
| ncsc-2025-0244 | Kwetsbaarheid verholpen in WinRAR | 2025-08-11T07:36:12.848669Z | 2025-08-11T07:36:12.848669Z |
| ncsc-2025-0243 | Kwetsbaarheid verholpen in Microsoft Exchange | 2025-08-07T09:15:22.461434Z | 2025-08-07T09:15:22.461434Z |
| ncsc-2025-0242 | Kwetsbaarheden verholpen in Trend Micro Apex One | 2025-08-06T13:21:03.156432Z | 2025-08-06T13:21:03.156432Z |
| ncsc-2025-0240 | Kwetsbaarheden verholpen in Rockwell Automation Arena | 2025-08-06T07:55:23.705278Z | 2025-08-06T07:55:23.705278Z |
| ncsc-2025-0239 | Kwetsbaarheid verholpen in SonicWall SonicOS | 2025-07-31T11:12:42.653547Z | 2025-07-31T11:12:42.653547Z |
| ncsc-2025-0238 | Kwetsbaarheden verholpen in Apple macOS, iOS en iPadOS | 2025-07-30T13:02:51.663320Z | 2025-07-30T13:02:51.663320Z |
| ncsc-2025-0237 | Kwetsbaarheden verholpen in Autodesk AutoCAD | 2025-07-30T08:04:31.603165Z | 2025-07-30T08:04:31.603165Z |
| ncsc-2025-0236 | Kwetsbaarheden verholpen in Salesforce Tableau Server | 2025-07-28T07:52:42.872259Z | 2025-07-28T07:52:42.872259Z |
| ncsc-2025-0233 | Zeroday-kwetsbaarheden ontdekt in Microsoft SharePoint Server | 2025-07-20T08:34:22.645952Z | 2025-07-23T15:31:20.529389Z |
| ncsc-2025-0235 | Kwetsbaarheden verholpen in Firefox en Thunderbird | 2025-07-23T13:01:45.118883Z | 2025-07-23T13:01:45.118883Z |
| ncsc-2025-0204 | Kwetsbaarheden verholpen in Cisco ISE en ISE-PIC | 2025-06-26T09:02:07.224036Z | 2025-07-23T07:46:25.364521Z |
| ncsc-2025-0215 | Kwetsbaarheden verholpen in Microsoft Office | 2025-07-08T18:24:48.517158Z | 2025-07-19T11:40:27.812820Z |
| ncsc-2025-0232 | Kwetsbaarheid verholpen in Keycloak | 2025-07-18T13:12:14.074394Z | 2025-07-18T13:12:14.074394Z |
| ncsc-2025-0196 | Kwetsbaarheden verholpen in Citrix NetScaler ADC en NetScaler Gateway | 2025-06-18T08:32:32.792202Z | 2025-07-18T09:51:52.738778Z |
| ncsc-2025-0231 | Kwetsbaarheden verholpen in XWiki | 2025-07-17T12:35:48.998487Z | 2025-07-17T12:35:48.998487Z |
| ncsc-2025-0230 | Kwetsbaarheid verholpen in Wing FTP Server | 2025-07-14T06:06:24.154078Z | 2025-07-14T06:06:24.154078Z |
| ncsc-2025-0226 | Kwetsbaarheid verholpen in FortiWeb | 2025-07-11T09:57:23.588152Z | 2025-07-11T13:20:55.101692Z |
| ncsc-2025-0229 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2025-07-11T10:01:48.229418Z | 2025-07-11T10:01:48.229418Z |
| ncsc-2025-0228 | Kwetsbaarheden verholpen in Zoom Clients | 2025-07-11T09:58:21.871103Z | 2025-07-11T09:58:21.871103Z |
| ncsc-2025-0227 | Kwetsbaarheid verholpen in Juniper SRX300 Series | 2025-07-11T09:57:40.476096Z | 2025-07-11T09:57:40.476096Z |
| ncsc-2025-0225 | Kwetsbaarheid verholpen in Juniper Networks Security Director | 2025-07-11T09:55:46.934253Z | 2025-07-11T09:55:46.934253Z |
| ncsc-2025-0224 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-07-09T08:57:08.548822Z | 2025-07-09T08:57:08.548822Z |
| ncsc-2025-0223 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-07-09T08:47:38.891072Z | 2025-07-09T08:47:38.891072Z |
| ncsc-2025-0222 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2025-07-09T08:41:53.656736Z | 2025-07-09T08:41:53.656736Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10339-1 | ruby4.0-rubygem-actiontext-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10338-1 | ruby4.0-rubygem-actionpack-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10337-1 | ruby4.0-rubygem-actionmailer-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10336-1 | ruby4.0-rubygem-actionmailbox-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10335-1 | ruby4.0-rubygem-actioncable-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10334-1 | python311-pypdf-6.8.0-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10333-1 | python311-multipart-1.3.1-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10332-1 | python311-PyPDF2-2.11.1-7.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10331-1 | mingw64-binutils-2.45.1-2.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10330-1 | mingw32-binutils-2.45.1-2.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10329-1 | kubelogin-0.2.16-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10328-1 | himmelblau-2.3.8+git0.dec3693-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10327-1 | heroic-games-launcher-2.20.1-3.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10326-1 | giflib-devel-32bit-5.2.2-3.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10325-1 | clamav-1.5.2-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10324-1 | MozillaFirefox-148.0.2-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:20361-1 | Security update for osc, obs-scm-bridge | 2026-03-12T20:54:40Z | 2026-03-12T20:54:40Z |
| opensuse-su-2026:20351-1 | Security update for amazon-ssm-agent | 2026-03-12T13:46:52Z | 2026-03-12T13:46:52Z |
| opensuse-su-2026:20350-1 | Security update for tomcat | 2026-03-12T13:46:00Z | 2026-03-12T13:46:00Z |
| opensuse-su-2026:20348-1 | Security update for python-PyPDF2 | 2026-03-11T20:15:02Z | 2026-03-11T20:15:02Z |
| opensuse-su-2026:20345-1 | Security update for python-lxml_html_clean | 2026-03-11T18:05:18Z | 2026-03-11T18:05:18Z |
| opensuse-su-2026:20342-1 | Security update for go1.26 | 2026-03-11T09:09:25Z | 2026-03-11T09:09:25Z |
| opensuse-su-2026:20341-1 | Security update for kea | 2026-03-11T08:51:21Z | 2026-03-11T08:51:21Z |
| opensuse-su-2026:20340-1 | Security update for cJSON | 2026-03-11T08:21:26Z | 2026-03-11T08:21:26Z |
| opensuse-su-2026:20339-1 | Security update for freerdp | 2026-03-10T12:34:56Z | 2026-03-10T12:34:56Z |
| opensuse-su-2026:10323-1 | traefik-3.6.10-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10322-1 | python311-lxml_html_clean-0.4.4-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10321-1 | python311-PyPDF2-2.11.1-6.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10320-1 | perl-Compress-Raw-Zlib-2.222-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10319-1 | helm3-3.20.0-2.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:2572 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.14.2 security update | 2026-02-11T16:14:44+00:00 | 2026-04-14T14:35:01+00:00 |
| rhsa-2026:2711 | Red Hat Security Advisory: Red Hat Ceph Storage 8.1 security and bug fix update | 2026-02-16T10:49:01+00:00 | 2026-04-14T14:34:58+00:00 |
| rhsa-2026:2571 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.9.2 security update | 2026-02-11T15:58:30+00:00 | 2026-04-14T14:34:55+00:00 |
| rhsa-2026:2568 | Red Hat Security Advisory: RHACS 4.9.3 security and bug fix update | 2026-02-11T15:09:41+00:00 | 2026-04-14T14:34:52+00:00 |
| rhsa-2026:2351 | Red Hat Security Advisory: VolSync v0.13 security fixes and container updates | 2026-02-09T15:55:39+00:00 | 2026-04-14T14:34:50+00:00 |
| rhsa-2026:2343 | Red Hat Security Advisory: Red Hat OpenShift API for Data Protection | 2026-02-09T14:20:06+00:00 | 2026-04-14T14:34:39+00:00 |
| rhsa-2026:2129 | Red Hat Security Advisory: OpenShift Container Platform 4.21.1 bug fix and security update | 2026-02-10T09:39:14+00:00 | 2026-04-14T14:34:37+00:00 |
| rhsa-2026:2082 | Red Hat Security Advisory: OpenShift Container Platform 4.21.1 packages and security update | 2026-02-10T11:30:56+00:00 | 2026-04-14T14:34:36+00:00 |
| rhsa-2026:2071 | Red Hat Security Advisory: OpenShift Container Platform 4.18.33 packages and security update | 2026-02-11T04:55:25+00:00 | 2026-04-14T14:34:34+00:00 |
| rhsa-2026:1942 | Red Hat Security Advisory: Red Hat Quay 3.15.3 | 2026-02-04T15:43:51+00:00 | 2026-04-14T14:34:34+00:00 |
| rhsa-2026:1838 | Red Hat Security Advisory: image-builder security update | 2026-02-05T16:02:26+00:00 | 2026-04-14T14:34:32+00:00 |
| rhsa-2026:1837 | Red Hat Security Advisory: osbuild-composer security update | 2026-02-05T16:03:01+00:00 | 2026-04-14T14:34:22+00:00 |
| rhsa-2026:1552 | Red Hat Security Advisory: OpenShift Container Platform 4.19.23 bug fix and security update | 2026-02-04T10:50:17+00:00 | 2026-04-14T14:34:20+00:00 |
| rhsa-2026:1520 | Red Hat Security Advisory: Red Hat multicluster global hub 1.6.1 security update | 2026-01-29T01:14:38+00:00 | 2026-04-14T14:34:19+00:00 |
| rhsa-2026:1488 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.19.1 security update | 2026-01-28T12:24:36+00:00 | 2026-04-14T14:34:17+00:00 |
| rhsa-2026:1380 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-27T16:02:11+00:00 | 2026-04-14T14:34:17+00:00 |
| rhsa-2026:1379 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-27T16:11:53+00:00 | 2026-04-14T14:34:15+00:00 |
| rhsa-2026:1378 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-27T15:37:28+00:00 | 2026-04-14T14:34:15+00:00 |
| rhsa-2026:1377 | Red Hat Security Advisory: image-builder security update | 2026-01-27T16:34:13+00:00 | 2026-04-14T14:34:12+00:00 |
| rhsa-2026:1072 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.15.1 security update | 2026-01-25T22:43:46+00:00 | 2026-04-14T14:34:10+00:00 |
| rhsa-2026:1071 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.10.1 security update | 2026-01-25T22:31:05+00:00 | 2026-04-14T14:34:09+00:00 |
| rhsa-2026:1067 | Red Hat Security Advisory: Assisted Installer RHEL 9 components for Multicluster Engine for Kubernetes 2.10.1 | 2026-01-23T16:45:25+00:00 | 2026-04-14T14:34:08+00:00 |
| rhsa-2026:1025 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-22T16:47:34+00:00 | 2026-04-14T14:34:06+00:00 |
| rhsa-2026:1018 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.17.4 security update | 2026-01-22T15:52:24+00:00 | 2026-04-14T14:34:05+00:00 |
| rhsa-2026:0987 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-22T11:30:22+00:00 | 2026-04-14T14:34:04+00:00 |
| rhsa-2026:1017 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.18.3 security update | 2026-01-22T15:47:03+00:00 | 2026-04-14T14:34:02+00:00 |
| rhsa-2026:0722 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.8.4 security update | 2026-01-15T17:23:06+00:00 | 2026-04-14T14:33:58+00:00 |
| rhsa-2026:0718 | Red Hat Security Advisory: Moderate: Red Hat Advanced Cluster Management for Kubernetes v2.13.5 security update | 2026-01-15T15:59:28+00:00 | 2026-04-14T14:33:58+00:00 |
| rhsa-2026:0671 | Red Hat Security Advisory: Assisted Installer RHEL 9 components for Multicluster Engine for Kubernetes 2.8.4 | 2026-01-15T08:34:14+00:00 | 2026-04-14T14:33:46+00:00 |
| rhsa-2026:0627 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.13.5 security update | 2026-01-14T18:37:52+00:00 | 2026-04-14T14:33:42+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2020-070-03 | ZigBee Installation Toolkit | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-070-02 | Modicon Quantum Ethernet Network module and Quantum / Premium COPRO | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-070-01 | IGSS (Interactive Graphical SCADA System) | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-042-01 | ProSoft Configurator for Modicon PMEPXM0100 (H) | 2020-02-11T00:00:00.000Z | 2020-02-11T00:00:00.000Z |
| sevd-2018-095-01 | Security Notification - U.motion Builder software | 2018-04-05T00:00:00.000Z | 2020-02-11T00:00:00.000Z |
| sevd-2020-014-01 | MSX Configurator | 2020-01-14T00:00:00.000Z | 2020-01-14T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-000297 | SSA-000297: Multiple SQLite Vulnerabilities in RUGGEDCOM CROSSBOW Station Access Controller Before V5.6 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-333468 | SSA-333468: Multiple Vulnerabilities in InterMesh Subscriber Devices | 2024-10-23T00:00:00Z | 2024-10-23T00:00:00Z |
| ssa-438590 | SSA-438590: Buffer Overflow Vulnerability in Siveillance Video Camera Drivers | 2024-10-10T00:00:00Z | 2024-10-10T00:00:00Z |
| ssa-959281 | SSA-959281: XML File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-955858 | SSA-955858: Multiple Vulnerabilities in LOGO! 8 BM Devices | 2022-10-11T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-921449 | SSA-921449: Plaintext Storage of a Password Vulnerability in LOGO! V8.3 BM Devices | 2024-08-13T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-852501 | SSA-852501: Multiple Memory Corruption Vulnerabilities in Simcenter Nastran Before 2406.5000 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-850560 | SSA-850560: Use of 4-Digit PIN in SENTRON PAC3200 Devices | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-844582 | SSA-844582: Electromagnetic Fault Injection in LOGO! V8.3 BM Devices Results in Broken LOGO! V8.3 Product CA | 2023-12-12T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-783481 | SSA-783481: Denial-of-Service Vulnerability in LOGO! 8 BM | 2021-03-09T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-626178 | SSA-626178: Stack-Based Buffer Overflow Vulnerability in JT2Go Before V2406.0003 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-540493 | SSA-540493: Kiosk Mode Escape Vulnerability in HiMed Cockpit Devices Before V11.6.2 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-368868 | SSA-368868: Multiple Vulnerabilities in WibuKey for Windows | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-321292 | SSA-321292: Denial of Service in the OPC Foundation Local Discovery Server (LDS) in Industrial Products | 2022-05-10T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-254396 | SSA-254396: Vulnerability in Nozomi Guardian/CMC Before 24.3.1 on RUGGEDCOM APE1808 Devices | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-148641 | SSA-148641: XPath Constraint Vulnerability in Mendix Runtime | 2022-03-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-969738 | SSA-969738: Denial of Service Vulnerability in SIMATIC S7-200 SMART Devices | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-869574 | SSA-869574: Multiple Vulnerabilities in SINEMA Remote Connect Server Before V3.2 SP2 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-792319 | SSA-792319: Missing Read Out Protection in SENTRON 7KM PAC3x20 Devices | 2024-03-12T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-765405 | SSA-765405: Multiple Vulnerabilities in SIMATIC RFID Readers | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-753746 | SSA-753746: Denial of Service Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products | 2024-02-13T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-721642 | SSA-721642: Injection Vulnerability in SCALANCE W700 802.11 AX Family Before V2.4 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-566905 | SSA-566905: Multiple Denial of Service Vulnerabilities in the Webserver of Industrial Products | 2023-04-11T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-427715 | SSA-427715: Stack-Based Buffer Overflow Vulnerability in Tecnomatix Plant Simulation | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-423808 | SSA-423808: Multiple NULL Pointer Dereference Vulnerabilities in Industrial Products | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-417159 | SSA-417159: Multiple Vulnerabilities in SINEMA Remote Connect Client Before V3.2 SP2 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-359713 | SSA-359713: Authorization Bypass Vulnerability in Industrial Edge Management | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-342438 | SSA-342438: Privilege Escalation Vulnerability in SINUMERIK ONE, SINUMERIK 840D and SINUMERIK 828D | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-293562 | SSA-293562: Denial of Service Vulnerabilities in PROFINET DCP Implementation of Industrial Products | 2017-05-08T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-280603 | SSA-280603: Denial of Service Vulnerability in SINUMERIK ONE and SINUMERIK MC | 2023-12-12T00:00:00Z | 2024-09-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1056-1 | Security update for nghttp2 | 2026-03-26T08:57:39Z | 2026-03-26T08:57:39Z |
| suse-su-2026:20879-1 | Security update for python-PyJWT | 2026-03-26T08:57:07Z | 2026-03-26T08:57:07Z |
| suse-su-2026:1048-1 | Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) | 2026-03-26T04:34:10Z | 2026-03-26T04:34:10Z |
| suse-su-2026:1049-1 | Security update for the Linux Kernel (Live Patch 25 for SUSE Linux Enterprise 15 SP5) | 2026-03-26T01:34:07Z | 2026-03-26T01:34:07Z |
| suse-su-2026:1046-1 | Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4) | 2026-03-25T19:34:09Z | 2026-03-25T19:34:09Z |
| suse-su-2026:20947-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-03-25T18:18:29Z | 2026-03-25T18:18:29Z |
| suse-su-2026:20842-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-03-25T18:18:29Z | 2026-03-25T18:18:29Z |
| suse-su-2026:20945-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-03-25T18:10:41Z | 2026-03-25T18:10:41Z |
| suse-su-2026:20840-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-03-25T18:10:41Z | 2026-03-25T18:10:41Z |
| suse-su-2026:20946-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-03-25T18:10:07Z | 2026-03-25T18:10:07Z |
| suse-su-2026:20841-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-03-25T18:10:07Z | 2026-03-25T18:10:07Z |
| suse-su-2026:20934-1 | Security update for python-PyJWT | 2026-03-25T18:08:28Z | 2026-03-25T18:08:28Z |
| suse-su-2026:20839-1 | Security update for python-PyJWT | 2026-03-25T18:08:28Z | 2026-03-25T18:08:28Z |
| suse-su-2026:1045-1 | Security update for the Linux Kernel (Live Patch 77 for SUSE Linux Enterprise 12 SP5) | 2026-03-25T18:04:47Z | 2026-03-25T18:04:47Z |
| suse-su-2026:1044-1 | Security update for the Linux Kernel (Live Patch 70 for SUSE Linux Enterprise 12 SP5) | 2026-03-25T17:54:43Z | 2026-03-25T17:54:43Z |
| suse-su-2026:1041-1 | Security update for the Linux Kernel | 2026-03-25T14:13:20Z | 2026-03-25T14:13:20Z |
| suse-su-2026:1040-1 | Security update for systemd | 2026-03-25T12:43:09Z | 2026-03-25T12:43:09Z |
| suse-su-2026:1039-1 | Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5) | 2026-03-25T12:34:25Z | 2026-03-25T12:34:25Z |
| suse-su-2026:20933-1 | Security update for python-ldap | 2026-03-25T10:48:13Z | 2026-03-25T10:48:13Z |
| suse-su-2026:1037-1 | Security update for grafana | 2026-03-25T10:31:04Z | 2026-03-25T10:31:04Z |
| suse-su-2026:1030-1 | Security update for salt | 2026-03-25T10:17:20Z | 2026-03-25T10:17:20Z |
| suse-su-2026:1029-1 | Security update for salt | 2026-03-25T10:16:49Z | 2026-03-25T10:16:49Z |
| suse-su-2026:1028-1 | Security update for salt | 2026-03-25T10:16:17Z | 2026-03-25T10:16:17Z |
| suse-su-2026:1027-1 | Security update for salt | 2026-03-25T10:15:43Z | 2026-03-25T10:15:43Z |
| suse-su-2026:1026-1 | Security update 5.0.7 for Multi-Linux Manager Salt Bundle | 2026-03-25T10:15:30Z | 2026-03-25T10:15:30Z |
| suse-su-2026:1014-1 | Security update 5.0.7 for Multi-Linux Manager Salt Bundle | 2026-03-25T10:12:32Z | 2026-03-25T10:12:32Z |
| suse-su-2026:1013-1 | Security update 5.0.7 for Multi-Linux Manager Client Tools | 2026-03-25T10:11:52Z | 2026-03-25T10:11:52Z |
| suse-su-2026:1012-1 | Security update 5.0.7 for Multi-Linux Manager Salt Bundle | 2026-03-25T10:10:54Z | 2026-03-25T10:10:54Z |
| suse-su-2026:1011-1 | Security update 5.0.7 for Multi-Linux Manager Client Tools | 2026-03-25T10:10:31Z | 2026-03-25T10:10:31Z |
| suse-su-2026:1010-1 | Security update 5.0.7 for Multi-Linux Manager Server | 2026-03-25T10:10:02Z | 2026-03-25T10:10:02Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:1478 | Moderate: python3.9 security update | 2026-01-28T00:00:00Z | 2026-01-28T19:56:37Z |
| alsa-2026:0933 | Important: java-25-openjdk security update | 2026-01-26T00:00:00Z | 2026-01-28T14:35:03Z |
| alsa-2026:1224 | Important: python3.11-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:28:50Z |
| alsa-2026:1226 | Important: python3.12-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:21:23Z |
| alsa-2026:1087 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:19:22Z |
| alsa-2026:1088 | Important: python3.12-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:17:27Z |
| alsa-2026:1089 | Important: python3.11-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:15:08Z |
| alsa-2026:1148 | Important: kernel-rt security update | 2026-01-26T00:00:00Z | 2026-01-26T13:52:56Z |
| alsa-2026:1142 | Important: kernel security update | 2026-01-26T00:00:00Z | 2026-01-26T13:49:21Z |
| alsa-2026:1086 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-26T13:16:32Z |
| alsa-2026:0928 | Important: java-21-openjdk security update | 2026-01-22T00:00:00Z | 2026-01-26T11:04:56Z |
| alsa-2026:0914 | Important: gimp security update | 2026-01-21T00:00:00Z | 2026-01-26T10:10:46Z |
| alsa-2026:0921 | Important: go-toolset:rhel8 security update | 2026-01-21T00:00:00Z | 2026-01-26T10:07:11Z |
| alsa-2026:0696 | Important: net-snmp security update | 2026-01-15T00:00:00Z | 2026-01-26T10:04:02Z |
| alsa-2026:0923 | Important: golang security update | 2026-01-21T00:00:00Z | 2026-01-24T01:54:58Z |
| alsa-2026:0927 | Important: java-17-openjdk security update | 2026-01-22T00:00:00Z | 2026-01-24T01:52:06Z |
| alsa-2026:0924 | Important: thunderbird security update | 2026-01-21T00:00:00Z | 2026-01-24T01:47:12Z |
| alsa-2026:0930 | Moderate: pcs security update | 2026-01-21T00:00:00Z | 2026-01-24T01:46:11Z |
| alsa-2026:0936 | Moderate: glib2 security update | 2026-01-21T00:00:00Z | 2026-01-24T01:44:09Z |
| alsa-2026:0991 | Moderate: glib2 security update | 2026-01-22T00:00:00Z | 2026-01-24T01:40:03Z |
| alsa-2026:0922 | Important: golang security update | 2026-01-21T00:00:00Z | 2026-01-23T23:39:55Z |
| alsa-2026:0975 | Moderate: glib2 security update | 2026-01-22T00:00:00Z | 2026-01-23T23:34:09Z |
| alsa-2026:0793 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-23T13:22:18Z |
| alsa-2026:0786 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-23T07:53:26Z |
| alsa-2026:0770 | Important: gpsd security update | 2026-01-19T00:00:00Z | 2026-01-21T10:46:37Z |
| alsa-2026:0845 | Important: brotli security update | 2026-01-20T00:00:00Z | 2026-01-21T10:45:25Z |
| alsa-2026:0753 | Important: container-tools:rhel8 security update | 2026-01-19T00:00:00Z | 2026-01-21T09:07:00Z |
| alsa-2026:0752 | Important: jmc security update | 2026-01-19T00:00:00Z | 2026-01-20T11:59:21Z |
| alsa-2026:0771 | Important: gpsd-minimal security update | 2026-01-19T00:00:00Z | 2026-01-20T11:54:05Z |
| alsa-2026:0760 | Important: kernel-rt security update | 2026-01-19T00:00:00Z | 2026-01-20T08:13:58Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-871 | UNKNOWN READ in ojph::local::param_cod::~param_cod | 2025-11-03T00:01:55.461376Z | 2025-11-16T14:04:09.695272Z |
| osv-2025-900 | Heap-buffer-overflow in DecodeFrame | 2025-11-15T00:18:33.800030Z | 2025-11-15T00:18:33.800379Z |
| osv-2025-890 | Heap-buffer-overflow in icalmemory_tmp_copy | 2025-11-10T00:03:23.954817Z | 2025-11-10T00:03:23.955223Z |
| osv-2025-884 | Heap-use-after-free in JS_DefineProperty | 2025-11-08T00:17:46.632315Z | 2025-11-08T00:17:46.633033Z |
| osv-2025-879 | Use-of-uninitialized-value in JS_DefineProperty | 2025-11-06T00:00:41.075031Z | 2025-11-06T00:00:41.075637Z |
| osv-2025-865 | Heap-buffer-overflow in generic_unpack | 2025-10-31T00:01:02.631036Z | 2025-11-05T14:31:24.646623Z |
| osv-2025-876 | Stack-buffer-overflow in snmp_input | 2025-11-04T00:06:41.671822Z | 2025-11-04T00:06:41.672467Z |
| osv-2025-858 | Use-of-uninitialized-value in pcpp::byteArrayToHexString | 2025-10-26T00:13:16.483999Z | 2025-10-26T00:13:16.484559Z |
| osv-2025-857 | Global-buffer-overflow in void jxl::N_AVX2::WriteToOutputStage::StoreUnsignedRow<unsigned char> | 2025-10-25T00:05:52.218420Z | 2025-10-25T00:05:52.218807Z |
| osv-2025-852 | Heap-buffer-overflow in std::__1::pair<int, arrow::util::RleBitPackedParser::ControlFlow> arrow::util::R | 2025-10-23T00:13:16.148747Z | 2025-10-24T14:23:38.843951Z |
| osv-2025-834 | Heap-buffer-overflow in std::__1::pair<int, arrow::util::RleBitPackedParser::ControlFlow> arrow::util::R | 2025-10-14T00:10:52.861723Z | 2025-10-24T14:22:07.938287Z |
| osv-2025-855 | Use-of-uninitialized-value in AlphaReplace_SSE2 | 2025-10-24T00:16:50.919877Z | 2025-10-24T00:16:50.920218Z |
| osv-2025-33 | UNKNOWN READ in pcpp::RawPacket::insertData | 2025-01-16T00:01:14.786268Z | 2025-10-22T18:25:08.281167Z |
| osv-2024-957 | Heap-buffer-overflow in pcpp::computeChecksum | 2024-08-16T00:13:51.457458Z | 2025-10-22T18:24:27.257255Z |
| osv-2024-967 | Heap-buffer-overflow in pcpp::byteArrayToHexString | 2024-08-16T00:14:27.813459Z | 2025-10-22T18:24:09.671012Z |
| osv-2024-393 | Heap-buffer-overflow in pcpp::BgpLayer::getHeaderLen | 2024-04-30T00:15:10.223298Z | 2025-10-22T18:24:01.160234Z |
| osv-2024-1009 | Heap-buffer-overflow in pcpp::Layer::shortenLayer | 2024-08-16T00:16:31.167287Z | 2025-10-21T14:37:47.186948Z |
| osv-2025-846 | Use-of-uninitialized-value in js_create_function | 2025-10-20T00:03:40.943765Z | 2025-10-20T00:03:40.944363Z |
| osv-2025-845 | Global-buffer-overflow in icaltime_day_of_year | 2025-10-19T00:19:40.541109Z | 2025-10-19T00:19:40.541746Z |
| osv-2025-835 | Heap-use-after-free in JS_DefineProperty | 2025-10-14T00:11:08.472824Z | 2025-10-14T00:11:08.473391Z |
| osv-2024-351 | UNKNOWN READ in H5SL__release_common | 2024-04-30T00:03:47.754456Z | 2025-10-11T15:15:24.788105Z |
| osv-2025-298 | Heap-buffer-overflow in i18n::phonenumbers::UnicodeText::const_iterator::operator-- | 2025-04-26T00:02:46.771719Z | 2025-10-11T14:20:31.062038Z |
| osv-2024-381 | Heap-buffer-overflow in H5F__accum_free | 2024-04-30T00:12:14.936195Z | 2025-10-10T16:22:08.455396Z |
| osv-2025-818 | Heap-buffer-overflow in std::__1::pair<int, arrow::util::RleBitPackedParser::ControlFlow> arrow::util::R | 2025-10-07T00:03:45.262747Z | 2025-10-10T14:38:33.479652Z |
| osv-2025-788 | Heap-buffer-overflow in int arrow::bit_util::BitReader::GetBatch<int> | 2025-09-28T00:00:36.076414Z | 2025-10-10T14:35:28.235525Z |
| osv-2025-827 | Global-buffer-overflow in void jxl::N_SSE4::WriteToOutputStage::StoreUnsignedRow<unsigned char> | 2025-10-10T00:09:16.816189Z | 2025-10-10T00:09:16.816846Z |
| osv-2025-825 | UNKNOWN WRITE in RescalerImportRowExpand_SSE2 | 2025-10-09T00:14:42.650822Z | 2025-10-09T00:14:42.651395Z |
| osv-2025-824 | Use-of-uninitialized-value in JS_DefineProperty | 2025-10-08T00:04:16.630040Z | 2025-10-08T00:04:16.630688Z |
| osv-2025-819 | Use-of-uninitialized-value in HasAlpha32b_SSE2 | 2025-10-07T00:04:07.544365Z | 2025-10-07T00:04:07.544831Z |
| osv-2025-809 | Use-of-uninitialized-value in WebPCleanupTransparentArea | 2025-10-05T00:04:29.576718Z | 2025-10-05T00:04:29.577250Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0345 | Low severity (DoS) vulnerability in sequoia-openpgp | 2024-06-26T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0344 | Timing variability in `curve25519-dalek`'s `Scalar29::sub`/`Scalar52::sub` | 2024-06-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0340 | Tor path lengths too short when "full Vanguards" configured | 2024-05-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0338 | Arithmetic overflows in cosmwasm-std | 2024-04-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0012 | Stack overflow during recursive JSON parsing | 2024-01-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0011 | Unauthenticated Nonce Increment in snow | 2024-01-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0006 | Multiple issues involving quote API | 2024-01-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0087 | `MaybeUninit` misuse in `simd-json-derive` | 2023-10-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0086 | Multiple soundness issues | 2023-09-03T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0080 | Buffer overflow due to integer overflow in `transpose` | 2023-12-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0077 | Remotely exploitable DoS condition in Rosenpass <=0.2.0 | 2023-11-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0068 | Sequential calls of encryption API (`encrypt`, `wrap`, and `dump`) result in nonce reuse | 2023-10-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0064 | gix-transport code execution vulnerability | 2023-09-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0044 | `openssl` `X509VerifyParamRef::set_host` buffer over-read | 2023-06-20T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0039 | Out-of-bounds array access leads to panic | 2023-05-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0038 | Out-of-bounds array access leads to panic | 2023-05-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2022-0101 | Miscompilation of constant values in division on AArch64 | 2022-07-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2022-0096 | Invalid drop of VMExternRef from partially-initialized instances in the pooling instance allocator | 2022-02-17T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2022-0094 | Mimalloc Can Allocate Memory with Bad Alignment | 2022-11-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2022-0093 | Double Public Key Signing Function Oracle Attack on `ed25519-dalek` | 2022-06-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2021-0154 | Uninitalized memory read & leak caused by fuser crate | 2021-09-10T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2021-0132 | Integer overflow in the bundled Brotli C library | 2021-12-20T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0112 | Possible host crash with host-to-wasm component intrinsics | 2025-07-18T12:00:00Z | 2025-10-25T11:20:30Z |
| rustsec-2025-0110 | astral-tokio-tar Vulnerable to PAX Header Desynchronization | 2025-10-21T12:00:00Z | 2025-10-25T11:18:52Z |
| rustsec-2025-0075 | `unic-char-range` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-22T14:41:04Z |
| rustsec-2025-0104 | `unic-ucd-segment` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0103 | `unic-ucd-core` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0102 | `unic-ucd-age` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0101 | `unic-ucd-common` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0100 | `unic-ucd-ident` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-tomcat-2023-34981 | Apache Tomcat: AJP response header mix-up | 2024-03-06T11:08:35.200Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2022-45143 | Apache Tomcat: JsonErrorReportValve escaping | 2024-03-06T11:09:02.789Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2022-42252 | Apache Tomcat request smuggling via malformed content-length | 2024-03-06T11:09:09.680Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2022-34305 | XSS in examples web application | 2024-03-06T11:09:17.789Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2022-29885 | EncryptInterceptor does not provide complete protection on insecure networks | 2024-03-06T11:09:24.492Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2022-23181 | Local privilege escalation with FileStore | 2024-03-06T11:09:36.902Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-43980 | Apache Tomcat: Information disclosure | 2024-03-06T11:09:43.693Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-42340 | DoS via memory leak with WebSocket connections | 2024-03-06T11:09:50.280Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-41079 | Apache Tomcat DoS with unexpected TLS packet | 2024-03-06T11:09:56.377Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-33037 | Incorrect Transfer-Encoding handling with HTTP/1.0 | 2024-03-06T11:10:01.262Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-30640 | Auth weakness in JNDIRealm | 2024-03-06T11:10:06.381Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-25329 | Incomplete fix for CVE-2020-9484 | 2024-03-06T11:10:17.511Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-25122 | Apache Tomcat h2c request mix-up | 2024-03-06T11:10:22.561Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-24122 | Apache Tomcat information disclosure | 2024-03-06T11:10:27.482Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2020-9484 | 2024-03-06T11:10:32.165Z | 2026-03-20T09:47:33.381Z | |
| bit-tomcat-2020-17527 | Apache Tomcat: Request header mix-up between HTTP/2 streams | 2024-03-06T11:11:37.082Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2020-13943 | 2024-03-06T11:11:40.396Z | 2026-03-20T09:47:33.381Z | |
| bit-tomcat-2020-13935 | 2024-03-06T11:11:44.067Z | 2026-03-20T09:47:33.381Z | |
| bit-tomcat-2020-13934 | 2024-03-06T11:11:47.794Z | 2026-03-20T09:47:33.381Z | |
| bit-tomcat-2020-11996 | 2024-03-06T11:11:51.472Z | 2026-03-20T09:47:33.381Z | |
| bit-thrift-2020-13949 | 2026-03-20T09:20:15.378Z | 2026-03-20T09:47:33.381Z | |
| bit-spark-2025-54920 | Apache Spark: Spark History Server Code Execution Vulnerability | 2026-03-18T08:54:07.780Z | 2026-03-20T09:47:33.381Z |
| bit-solr-2020-9492 | 2024-03-06T11:07:01.582Z | 2026-03-20T09:47:33.381Z | |
| bit-redis-2023-45145 | Redis Unix-domain socket may have be exposed with the wrong permissions for a short time window. | 2024-03-06T11:03:25.305Z | 2026-03-20T09:47:33.381Z |
| bit-python-2026-3479 | pkgutil.get_data() does not enforce documented restrictions | 2026-03-20T09:21:01.169Z | 2026-03-20T09:47:33.381Z |
| bit-python-2025-13462 | tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling | 2026-03-14T08:49:56.012Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-32594 | Parse Server GraphQL WebSocket endpoint bypasses security middleware | 2026-03-20T09:19:20.642Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-32269 | Parse Server OAuth2 adapter app ID validation sends wrong token to introspection endpoint | 2026-03-16T09:53:45.375Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-32248 | Parse Server: Account takeover via operator injection in authentication data identifier | 2026-03-16T09:53:42.464Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-32242 | Parse Server OAuth2 adapter shares mutable state across providers via singleton instance | 2026-03-16T09:53:39.413Z | 2026-03-20T09:47:33.381Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-mo83449 | Within HostnameError | 2026-03-10T00:59:35.550450Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-jz91219 | Within HostnameError | 2026-03-10T00:59:35.590693Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-ir62391 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:48:33.059735Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-gj95666 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T01:04:41.222114Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-dt66006 | Within HostnameError | 2026-03-10T00:58:35.493841Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-av02020 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:58:05.928030Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-af35851 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T01:02:37.708854Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-ab04032 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-03-10T00:58:35.570783Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-ff20499 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0 | 2026-04-01T10:04:06.598747Z | 2026-03-09T11:52:12Z |
| cleanstart-2026-bf73214 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 1.0.17-r0 | 2026-04-01T10:03:56.655073Z | 2026-03-07T09:14:49Z |
| cleanstart-2026-ar56257 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 1.0.16-r0 | 2026-04-01T10:03:58.074474Z | 2026-03-07T09:14:16Z |
| cleanstart-2026-jr53141 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:46.660054Z | 2026-03-07T09:11:28Z |
| cleanstart-2026-lu31244 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:46.726872Z | 2026-03-07T09:10:59Z |
| cleanstart-2026-pr27884 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:52.407214Z | 2026-03-07T09:10:08Z |
| cleanstart-2026-qx99194 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:06:00.100216Z | 2026-03-07T09:08:53Z |
| cleanstart-2026-qy24299 | @octokit/endpoint turns REST API endpoints into generic request options | 2026-03-07T00:39:47.646997Z | 2026-03-06T13:08:41Z |
| cleanstart-2026-pp62083 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-03-07T00:39:46.558367Z | 2026-03-06T13:08:41Z |
| cleanstart-2026-gi57625 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-03-07T00:39:46.578400Z | 2026-03-06T13:08:41Z |
| cleanstart-2026-fn55648 | Security fixes for CVE-2025-25285, CVE-2026-21637, ghsa-23c5-xmqv-rm74, ghsa-72xf-g2v4-qvf3, ghsa-7r86-cg39-jmmj, ghsa-fj3w-jwp8-x2g3, ghsa-pfrx-2q88-qq97, ghsa-rc47-6667-2j5j, ghsa-rmvr-2pp2-xj38 applied in versions: 2.6.0-r1, 2.7.0-r0 | 2026-04-01T10:06:10.961683Z | 2026-03-06T13:00:09Z |
| cleanstart-2026-hd58055 | Security fixes for CVE-2025-25285, CVE-2026-21637, ghsa-23c5-xmqv-rm74, ghsa-3ppc-4f35-3m26, ghsa-72xf-g2v4-qvf3, ghsa-7r86-cg39-jmmj, ghsa-pfrx-2q88-qq97, ghsa-rc47-6667-2j5j, ghsa-rmvr-2pp2-xj38 applied in versions: 2.6.0-r1, 2.6.0-r2 | 2026-04-01T10:06:17.030926Z | 2026-03-06T12:59:45Z |
| cleanstart-2026-cy45415 | Security fixes for CVE-2025-15558, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-fv92-fjc5-jj9h applied in versions: 3.6.16-r0, 3.7.4-r0, 3.7.7-r0 | 2026-04-01T10:06:30.444629Z | 2026-03-06T11:37:07Z |
| cleanstart-2026-ck64127 | Security fixes for ghsa-6rw7-vpxm-498p, ghsa-73rr-hh4g-fpgx, ghsa-8qq5-rm4j-mr97, ghsa-wqch-xfxh-vrr4 applied in versions: 4.2.1.1-r1 | 2026-04-01T10:06:15.177169Z | 2026-03-06T11:36:37Z |
| cleanstart-2026-fq05951 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-27141, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-p436-gjf2-799p, ghsa-p84v-gxvw-73pf applied in versions: 3.6.13-r0, 3.6.15-r1, 3.6.18-r0, 3.6.19-r0, 3.6.19-r1, 3.7.0-r0, 3.7.3-r0 | 2026-04-01T10:07:02.415559Z | 2026-03-06T07:23:30Z |
| cleanstart-2026-fx27781 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-47914, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-27141, ghsa-37cx-329c-33x3, ghsa-9h8m-3fm2-qjrq, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p84v-gxvw-73pf applied in versions: 3.7.0-r0, 3.7.10-r0, 3.7.10-r1, 3.7.10-r2, 3.7.3-r0, 3.7.4-r0, 3.7.6-r0, 3.7.9-r0 | 2026-04-01T10:07:09.669593Z | 2026-03-06T06:49:13Z |
| cleanstart-2026-pf41398 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2025-61732, CVE-2025-68121 applied in versions: 3.19.0-r0, 3.19.5-r0, 4.0.1-r0 | 2026-04-01T10:07:15.004853Z | 2026-03-06T05:33:23Z |
| cleanstart-2026-eu58098 | Security fixes for CVE-2025-61732, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.8.4-r0, 0.8.7-r0 | 2026-04-01T10:06:48.673123Z | 2026-03-05T12:22:12Z |
| cleanstart-2026-mk40719 | Security fixes for CVE-2025-0913, CVE-2025-4673, CVE-2025-47907, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-27141, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-p84v-gxvw-73pf applied in versions: 3.6.13-r0, 3.6.15-r1, 3.6.18 r0, 3.6.18-r0, 3.7.0-r0, 3.7.3-r0 | 2026-04-01T10:07:36.130294Z | 2026-03-05T10:29:59Z |
| cleanstart-2026-yp32652 | Redis is an open source, in-memory database that persists on disk | 2026-03-04T00:42:01.150900Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-xj84245 | Rack is a modular Ruby web server interface | 2026-03-04T00:43:02.364521Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-wy43835 | PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access | 2026-03-04T00:41:31.079681Z | 2026-03-03T12:59:01Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2017-ALE-020 | Vulnérabilité dans des implémentations de TLS | 2017-12-13T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| certfr-2017-ale-019 | Vulnérabilité d'usurpation d'identité dans plusieurs clients de messagerie | 2017-12-05T00:00:00.000000 | 2018-03-07T00:00:00.000000 |
| CERTFR-2017-ALE-019 | Vulnérabilité d'usurpation d'identité dans plusieurs clients de messagerie | 2017-12-05T00:00:00.000000 | 2018-03-07T00:00:00.000000 |
| certfr-2018-ale-003 | Vulnérabilité dans Adobe Flash Player | 2018-02-02T00:00:00.000000 | 2018-02-07T00:00:00.000000 |
| CERTFR-2018-ALE-003 | Vulnérabilité dans Adobe Flash Player | 2018-02-02T00:00:00.000000 | 2018-02-07T00:00:00.000000 |
| certfr-2017-ale-017 | Vulnérabilité dans le serveur de messagerie Exim | 2017-11-27T00:00:00.000000 | 2018-02-01T00:00:00.000000 |
| CERTFR-2017-ALE-017 | Vulnérabilité dans le serveur de messagerie Exim | 2017-11-27T00:00:00.000000 | 2018-02-01T00:00:00.000000 |
| certfr-2017-ale-018 | Vulnérabilité dans Apple MacOS High Sierra | 2017-11-29T00:00:00.000000 | 2017-11-30T00:00:00.000000 |
| CERTFR-2017-ALE-018 | Vulnérabilité dans Apple MacOS High Sierra | 2017-11-29T00:00:00.000000 | 2017-11-30T00:00:00.000000 |
| certfr-2017-ale-016 | Campagne de rançongiciel Bad Rabbit | 2017-10-25T00:00:00.000000 | 2017-10-27T00:00:00.000000 |
| CERTFR-2017-ALE-016 | Campagne de rançongiciel Bad Rabbit | 2017-10-25T00:00:00.000000 | 2017-10-27T00:00:00.000000 |
| certfr-2017-ale-014 | Vulnérabilité dans le protocole WPA/WPA2 | 2017-10-18T00:00:00.000000 | 2017-10-19T00:00:00.000000 |
| CERTFR-2017-ALE-014 | Vulnérabilité dans le protocole WPA/WPA2 | 2017-10-18T00:00:00.000000 | 2017-10-19T00:00:00.000000 |
| certfr-2017-ale-015 | Vulnérabilités dans la bibliothèque Infineon RSA | 2017-10-16T00:00:00.000000 | 2017-10-17T00:00:00.000000 |
| CERTFR-2017-ALE-015 | Vulnérabilités dans la bibliothèque Infineon RSA | 2017-10-16T00:00:00.000000 | 2017-10-17T00:00:00.000000 |
| certfr-2017-ale-013 | Présence de code malveillant dans Piriform CCleaner | 2017-09-18T00:00:00.000000 | 2017-10-09T00:00:00.000000 |
| CERTFR-2017-ALE-013 | Présence de code malveillant dans Piriform CCleaner | 2017-09-18T00:00:00.000000 | 2017-10-09T00:00:00.000000 |
| certfr-2017-ale-008 | Multiples vulnérabilités dans Microsoft Windows XP et Windows Server 2003 | 2017-04-14T00:00:00.000000 | 2017-09-06T00:00:00.000000 |
| CERTFR-2017-ALE-008 | Multiples vulnérabilités dans Microsoft Windows XP et Windows Server 2003 | 2017-04-14T00:00:00.000000 | 2017-09-06T00:00:00.000000 |
| certfr-2017-ale-012 | Campagne de maliciels prenant l'apparence d'un rançongiciel à multiples capacités de propagation | 2017-06-27T00:00:00.000000 | 2017-08-03T00:00:00.000000 |
| CERTFR-2017-ALE-012 | Campagne de maliciels prenant l'apparence d'un rançongiciel à multiples capacités de propagation | 2017-06-27T00:00:00.000000 | 2017-08-03T00:00:00.000000 |
| certfr-2017-ale-011 | Campagne de messages électroniques non sollicités de type Jaff | 2017-05-14T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| certfr-2017-ale-010 | Propagation d'un rançongiciel exploitant les vulnérabilités MS17-010 | 2017-05-12T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| CERTFR-2017-ALE-011 | Campagne de messages électroniques non sollicités de type Jaff | 2017-05-14T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| CERTFR-2017-ALE-010 | Propagation d'un rançongiciel exploitant les vulnérabilités MS17-010 | 2017-05-12T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| certfr-2017-ale-009 | Vulnérabilité dans Microsoft Malware Protection Engine | 2017-05-09T00:00:00.000000 | 2017-05-15T00:00:00.000000 |
| CERTFR-2017-ALE-009 | Vulnérabilité dans Microsoft Malware Protection Engine | 2017-05-09T00:00:00.000000 | 2017-05-15T00:00:00.000000 |
| certfr-2017-ale-005 | Vulnérabilité dans les commutateurs Cisco | 2017-03-20T00:00:00.000000 | 2017-05-10T00:00:00.000000 |
| certfr-2017-ale-004 | Vulnérabilité dans Apache Struts | 2017-03-10T00:00:00.000000 | 2017-05-10T00:00:00.000000 |
| CERTFR-2017-ALE-005 | Vulnérabilité dans les commutateurs Cisco | 2017-03-20T00:00:00.000000 | 2017-05-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2026-AVI-0172 | Vulnérabilité dans Google Chrome | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| CERTFR-2026-AVI-0052 | Multiples vulnérabilités dans Mattermost Server | 2026-01-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0171 | Multiples vulnérabilités dans les produits IBM | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0170 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0169 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0168 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0167 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0166 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0165 | Vulnérabilité dans Mattermost Server | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0164 | Multiples vulnérabilités dans PostgreSQL | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0163 | Multiples vulnérabilités dans HAProxy | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0162 | Multiples vulnérabilités dans Juniper Networks Secure Analytics | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0161 | Vulnérabilité dans Tenable Nessus Agent | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0144 | Multiples vulnérabilités dans Ivanti Endpoint Manager | 2026-02-11T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0171 | Multiples vulnérabilités dans les produits IBM | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0170 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0169 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0168 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0167 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0166 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0165 | Vulnérabilité dans Mattermost Server | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0164 | Multiples vulnérabilités dans PostgreSQL | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0163 | Multiples vulnérabilités dans HAProxy | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0162 | Multiples vulnérabilités dans Juniper Networks Secure Analytics | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0161 | Vulnérabilité dans Tenable Nessus Agent | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0144 | Multiples vulnérabilités dans Ivanti Endpoint Manager | 2026-02-11T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0160 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0159 | Multiples vulnérabilités dans Keycloak | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0158 | Multiples vulnérabilités dans les produits Apple | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0157 | Multiples vulnérabilités dans les produits Qnap | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-001017 | Multiple vulnerabilities in STEALTHONE D220/D340/D440 | 2025-02-06T18:27+09:00 | 2025-02-06T18:27+09:00 |
| jvndb-2025-001018 | Improper restriction of XML external entity reference (XXE) vulnerability in OMRON NB-Designer | 2025-02-06T18:26+09:00 | 2025-02-06T18:26+09:00 |
| jvndb-2025-000008 | Multiple vulnerabilities in Defense Platform Home Edition | 2025-02-05T14:06+09:00 | 2025-02-05T14:06+09:00 |
| jvndb-2025-000009 | WordPress Plugin "Activity Log WinterLock" vulnerable to cross-site request forgery | 2025-02-04T13:58+09:00 | 2025-02-04T13:58+09:00 |
| jvndb-2025-001244 | Clickjacking Vulnerability in JP1/ServerConductor/Deployment Manager | 2025-01-30T18:19+09:00 | 2025-01-30T18:19+09:00 |
| jvndb-2025-000007 | SXF Common Library vulnerable to improper input data handling | 2025-01-29T14:57+09:00 | 2025-01-29T14:57+09:00 |
| jvndb-2025-000006 | WordPress Plugin "Simple Image Sizes" vulnerable to cross-site scripting | 2025-01-28T13:44+09:00 | 2025-01-28T13:44+09:00 |
| jvndb-2025-000005 | EXIF Viewer Classic vulnerable to cross-site scripting | 2025-01-27T14:25+09:00 | 2025-01-27T14:25+09:00 |
| jvndb-2025-000003 | FortiWeb vulnerable to SQL injection | 2025-01-21T15:59+09:00 | 2025-01-21T15:59+09:00 |
| jvndb-2025-001027 | Linux Ratfor vulnerable to stack-based buffer overflow | 2025-01-16T13:27+09:00 | 2025-01-16T13:27+09:00 |
| jvndb-2025-000001 | PLANEX COMMUNICATIONS MZK-DP300N vulnerable to cross-site scripting | 2025-01-08T17:08+09:00 | 2025-01-08T17:08+09:00 |
| jvndb-2024-015471 | Trend Micro Deep Security 20.0 Agent (for Windows) vulnerable to uncontrolled search path element | 2024-12-25T11:28+09:00 | 2024-12-25T11:28+09:00 |
| jvndb-2024-015393 | Multiple security updates for Trend Micro Apex One and Apex One as a Service (December 2024) | 2024-12-23T12:52+09:00 | 2024-12-23T12:52+09:00 |
| jvndb-2024-000125 | Multiple vulnerabilities in I-O DATA routers UD-LT1 and UD-LT1/EX | 2024-12-04T15:22+09:00 | 2024-12-18T15:20+09:00 |
| jvndb-2024-014918 | Authentication Bypass Vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2024-12-17T15:23+09:00 | 2024-12-17T15:23+09:00 |
| jvndb-2024-000128 | Multiple vulnerabilities in SHARP routers | 2024-12-17T07:54+09:00 | 2024-12-17T07:54+09:00 |
| jvndb-2024-000127 | "Shonen Jump+" App for Android fails to restrict custom URL schemes properly | 2024-12-16T15:07+09:00 | 2024-12-16T15:07+09:00 |
| jvndb-2024-014825 | WordPress Plugin "My WP Customize Admin/Frontend" vulnerable to cross-site scripting | 2024-12-16T13:57+09:00 | 2024-12-16T13:57+09:00 |
| jvndb-2024-014793 | Multiple vulnerabilities in FXC AE1021 and AE1021PE | 2024-12-16T11:51+09:00 | 2024-12-16T11:51+09:00 |
| jvndb-2024-014079 | Trend Micro Deep Security Agent for Windows and Deep Security Notifier on DSVA vulnerable to OS command injection | 2024-12-06T12:11+09:00 | 2024-12-06T12:11+09:00 |
| jvndb-2023-000085 | "Skylark" App fails to restrict custom URL schemes properly | 2023-08-24T13:34+09:00 | 2024-12-03T15:51+09:00 |
| jvndb-2024-000124 | Multiple vulnerabilities in UNIVERGE IX/IX-R/IX-V series routers | 2024-12-02T16:38+09:00 | 2024-12-02T16:38+09:00 |
| jvndb-2024-000123 | Multiple FCNT Android devices vulnerable to authentication bypass | 2024-11-29T15:30+09:00 | 2024-11-29T15:30+09:00 |
| jvndb-2024-013702 | Multiple vulnerabilities in FUJI ELECTRIC products | 2024-11-29T14:42+09:00 | 2024-11-29T14:42+09:00 |
| jvndb-2024-000122 | HAProxy vulnerable to HTTP request/response smuggling | 2024-11-27T14:36+09:00 | 2024-11-27T14:36+09:00 |
| jvndb-2024-003025 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2024-03-27T14:26+09:00 | 2024-11-27T14:34+09:00 |
| jvndb-2024-012461 | Multiple vulnerabilities in SoftBank Mesh Wi-Fi router RP562B | 2024-11-13T14:26+09:00 | 2024-11-26T16:11+09:00 |
| jvndb-2024-000020 | Multiple vulnerabilities in ELECOM wireless LAN routers and wireless LAN repeater | 2024-02-20T14:14+09:00 | 2024-11-26T15:26+09:00 |
| jvndb-2024-000088 | Multiple vulnerabilities in ELECOM wireless LAN routers and access points | 2024-08-27T14:40+09:00 | 2024-11-26T15:17+09:00 |
| jvndb-2024-000121 | WordPress Plugin "WP Admin UI Customize" vulnerable to cross-site scripting | 2024-11-26T13:57+09:00 | 2024-11-26T13:57+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14477 | 多款Apple产品存在未明漏洞(CNVD-2026-14477) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14476 | 多款Apple产品权限提升漏洞(CNVD-2026-14476) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14475 | 多款Apple产品权限提升漏洞(CNVD-2026-14475) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-11369 | 厦门熵基科技有限公司人证魔方身份认证管理系统存在SQL注入漏洞 | 2026-02-05 | 2026-03-22 |
| cnvd-2026-11389 | 用友网络科技股份有限公司U8 Cloud存在SQL注入漏洞(CNVD-C-2026-72551) | 2026-02-04 | 2026-03-21 |
| cnvd-2026-14410 | Microsoft Exchange Server欺骗漏洞(CNVD-2026-14410) | 2025-12-12 | 2026-03-20 |
| cnvd-2026-14409 | UTT 520W goform/formIpGroupConfig文件缓冲区溢出漏洞 | 2026-02-11 | 2026-03-20 |
| cnvd-2026-14408 | Microsoft Excel代码执行漏洞(CNVD-2026-14408) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14407 | TeamViewer DEX Client权限提升漏洞 | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14406 | MailEnable不安全DLL加载漏洞(CNVD-2026-14406) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14405 | MailEnableMailEnableMailEnable不安全DLL加载漏洞(CNVD-2026-14405) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14404 | MailEnableMailEnable不安全DLL加载漏洞(CNVD-2026-14404) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14403 | MailEnableMailEnable不安全DLL加载漏洞(CNVD-2026-14403) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14402 | MailEnable不安全DLL加载漏洞(CNVD-2026-14402) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14401 | MailEnable不安全DLL加载漏洞(CNVD-2026-14401) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14400 | MailEnable不安全DLL加载漏洞(CNVD-2026-14400) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14399 | MailEnable不安全DLL加载漏洞(CNVD-2026-14399) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14398 | MailEnable不安全DLL加载漏洞 | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14397 | OpenClaw安全绕过漏洞 | 2026-03-12 | 2026-03-20 |
| cnvd-2026-14396 | OpenClaw文件包含漏洞 | 2026-03-12 | 2026-03-20 |
| cnvd-2026-14395 | OpenClaw访问控制错误漏洞(CNVD-2026-14395) | 2026-03-12 | 2026-03-20 |
| cnvd-2026-14394 | OpenClaw目录遍历漏洞(CNVD-2026-14394) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14393 | OpenClaw远程代码执行漏洞(CNVD-2026-14393) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14392 | OpenClaw目录遍历漏洞(CNVD-2026-14392) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14391 | OpenClaw代码注入漏洞(CNVD-2026-14391) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14390 | OpenClaw访问控制错误漏洞(CNVD-2026-14390) | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14389 | OpenClaw信息泄露漏洞(CNVD-2026-14389) | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14388 | OpenClaw目录遍历漏洞 | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14387 | WordPress插件Calculated Fields Form跨站脚本漏洞 | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14386 | WordPress插件Avada Core跨站脚本漏洞 | 2026-03-19 | 2026-03-20 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-14098 | Уязвимость функции hdr_first_de() компонента ntfs3 ядра операционной системы Linux, позво… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14095 | Уязвимость функции cm_chan_msg_send() модуля drivers/rapidio/rio_cm.c ядра операционной с… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14090 | Уязвимость функции vsock_find_cid() ядра операционной системы Linux, позволяющая нарушите… | 14.11.2025 | 16.02.2026 |
| bdu:2025-13924 | Уязвимость библиотеки LibTIFF, связанная с выходом операции за границы буфера в памяти, п… | 10.11.2025 | 16.02.2026 |
| bdu:2025-13921 | Уязвимость библиотеки LibTIFF, связанная с выходом операции за границы буфера в памяти, п… | 10.11.2025 | 16.02.2026 |
| bdu:2025-13888 | Уязвимость функции ax25_kiss_rcv() модуля ax25_kiss_rcv ядра операционной системы Linux, … | 07.11.2025 | 16.02.2026 |
| bdu:2025-13881 | Уязвимость функции SSID в __cfg80211_connect_result() модуля net/wireless/sme.c ядра опер… | 07.11.2025 | 16.02.2026 |
| bdu:2025-13880 | Уязвимость функции pad_compress_skb() модуля drivers/net/ppp/ppp_generic.c ядра операцион… | 07.11.2025 | 16.02.2026 |
| bdu:2025-13687 | Уязвимость функции __mark_inode_dirty() ядра операционной системы Linux, позволяющая нару… | 05.11.2025 | 16.02.2026 |
| bdu:2025-13684 | Уязвимость функции cmp_bss() ядра операционной системы Linux, позволяющая нарушителю вызв… | 05.11.2025 | 16.02.2026 |
| bdu:2025-13682 | Уязвимость функции l2cap_sock_cleanup_listen() ядра операционной системы Linux, позволяющ… | 05.11.2025 | 16.02.2026 |
| bdu:2025-13679 | Уязвимость функции list_first_entry() ядра операционной системы Linux, позволяющая наруши… | 05.11.2025 | 16.02.2026 |
| bdu:2025-13565 | Уязвимость функции cache_set_flush() ядра операционной системы Linux, позволяющая нарушит… | 29.10.2025 | 16.02.2026 |
| bdu:2025-13564 | Уязвимость функции automount_fullpath() ядра операционной системы Linux, позволяющая нару… | 29.10.2025 | 16.02.2026 |
| bdu:2025-13563 | Уязвимость функции do_register_framebuffer() ядра операционной системы Linux, позволяющая… | 29.10.2025 | 16.02.2026 |
| bdu:2025-13522 | Уязвимость функции hid_hw_raw_request() драйвера Low Level Transport ядра операционной си… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13520 | Уязвимость функции __mptcp_do_fallback() компонента mptcp ядра операционной системы Linux… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13517 | Уязвимость драйвера Low Level Transport ядра операционной системы Linux, позволяющая нару… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13514 | Уязвимость функции misc_deregister() компонента soc ядра операционной системы Linux, позв… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13513 | Уязвимость функции fxls8962af_fifo_flush() компонента iio ядра операционной системы Linux… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13512 | Уязвимость функции rose_rt_device_down() ядра операционной системы Linux, позволяющая нар… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13511 | Уязвимость функции rpl_do_srh_inline() компонента rpl ядра операционной системы Linux, по… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13498 | Уязвимость функции __kmem_cache_shutdown ядра операционной системы Linux, позволяющая нар… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13494 | Уязвимость компонента ath6kl ядра операционной системы Linux, позволяющая нарушителю вызв… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13493 | Уязвимость функции msdc_prepare_data() компонента mtk-sd ядра операционной системы Linux,… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13486 | Уязвимость функции dbMount операционной системы Linux, позволяющая нарушителю оказать воз… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13485 | Уязвимость компонента media операционной системы Linux, позволяющая нарушителю вызвать от… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13484 | Уязвимость функции v4l2_rect_map_inside операционной системы Linux, позволяющая нарушител… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13482 | Уязвимость ядра операционной системы Linux, связанная с недостаточной проверкой входных д… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13479 | Уязвимость операционной системы Linux, связанная с ошибкой разыменования указателей, позв… | 28.10.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200106-0170 | Buffer overflow in ntpd ntp daemon 4.0.99k and earlier (aka xntpd and xntp3) allows remot… | 2024-07-23T21:52:30.595000Z |
| var-201403-0508 | The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.… | 2024-07-23T21:52:28.560000Z |
| var-202205-1319 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:52:24.897000Z |
| var-201804-1186 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T21:52:24.271000Z |
| var-201102-0095 | Google Chrome before 9.0.597.94 does not properly perform event handling for animations, … | 2024-07-23T21:52:24.603000Z |
| var-200107-0019 | Cisco routers and switches running IOS 12.0 through 12.2.1 allows a remote attacker to ca… | 2024-07-23T21:51:49.898000Z |
| var-202002-1480 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:51:05.518000Z |
| var-201503-0389 | The build_tablename function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP th… | 2024-07-23T21:51:05.137000Z |
| var-202109-1805 | Malformed requests may cause the server to dereference a NULL pointer. This issue affects… | 2024-07-23T21:51:04.963000Z |
| var-201803-0086 | LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) … | 2024-07-23T21:51:04.545000Z |
| var-202206-1186 | Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may all… | 2024-07-23T21:51:00.840000Z |
| var-201912-1853 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:50:27.591000Z |
| var-201912-0123 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:50:27.004000Z |
| var-201904-0756 | A memory corruption issue was addressed with improved memory handling. This issue affecte… | 2024-07-23T21:50:26.406000Z |
| var-200907-0717 | WebKit in Apple Safari before 4.0.2, as used on iPhone OS before 3.1, iPhone OS before 3.… | 2024-07-23T21:50:25.062000Z |
| var-202205-1304 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:50:24.904000Z |
| var-200810-0142 | The Postfix configuration file in Mac OS X 10.5.5 causes Postfix to be network-accessible… | 2024-07-23T21:50:24.464000Z |
| var-201107-0125 | The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, a… | 2024-07-23T21:50:23.993000Z |
| var-202006-1651 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 a… | 2024-07-23T21:50:22.831000Z |
| var-200809-0008 | Finder in Apple Mac OS X 10.5 through 10.5.4 does not properly update permission data in … | 2024-07-23T21:50:10.607000Z |
| var-201203-0191 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2024-07-23T21:50:08.937000Z |
| var-201206-0064 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:49:37.613000Z |
| var-202004-2202 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T21:49:25.052000Z |
| var-202207-1485 | An out-of-bounds write issue was addressed with improved input validation. This issue is … | 2024-07-23T21:49:20.877000Z |
| var-201007-0321 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 thro… | 2024-07-23T21:49:20.293000Z |
| var-201803-0099 | The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, whic… | 2024-07-23T21:49:16.122000Z |
| var-200505-0359 | Apple Terminal 1.4.4 allows attackers to execute arbitrary commands via terminal escape s… | 2024-07-23T21:49:11.998000Z |
| var-202003-1782 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:48:40.941000Z |
| var-201806-1486 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T21:48:39.044000Z |
| var-200705-0670 | The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.1… | 2024-07-23T21:48:39.239000Z |