Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-2784 |
9.8 (3.1)
|
Mitigation bypass in the DOM: Security component |
Mozilla |
Firefox |
2026-02-24T13:33:17.554Z | 2026-04-16T14:32:57.551Z |
| CVE-2026-2779 |
9.8 (3.1)
|
Incorrect boundary conditions in the Networking: JAR c… |
Mozilla |
Firefox |
2026-02-24T13:33:14.195Z | 2026-04-16T14:32:33.729Z |
| CVE-2026-2778 |
10 (3.1)
|
Sandbox escape due to incorrect boundary conditions in… |
Mozilla |
Firefox |
2026-02-24T13:33:13.564Z | 2026-04-16T14:32:14.511Z |
| CVE-2026-2776 |
10 (3.1)
|
Sandbox escape due to incorrect boundary conditions in… |
Mozilla |
Firefox |
2026-02-24T13:33:12.247Z | 2026-04-16T14:31:49.143Z |
| CVE-2026-2775 |
9.8 (3.1)
|
Mitigation bypass in the DOM: HTML Parser component |
Mozilla |
Firefox |
2026-02-24T13:33:11.553Z | 2026-04-16T14:31:30.683Z |
| CVE-2026-2773 |
9.8 (3.1)
|
Incorrect boundary conditions in the Web Audio component |
Mozilla |
Firefox |
2026-02-24T13:33:10.177Z | 2026-04-16T14:31:07.312Z |
| CVE-2026-2771 |
9.8 (3.1)
|
Undefined behavior in the DOM: Core & HTML component |
Mozilla |
Firefox |
2026-02-24T13:33:08.538Z | 2026-04-16T14:30:39.225Z |
| CVE-2026-2766 |
9.8 (3.1)
|
Use-after-free in the JavaScript Engine: JIT component |
Mozilla |
Firefox |
2026-02-24T13:33:04.946Z | 2026-04-16T14:28:29.474Z |
| CVE-2026-2765 |
9.8 (3.1)
|
Use-after-free in the JavaScript Engine component |
Mozilla |
Firefox |
2026-02-24T13:33:03.943Z | 2026-04-16T14:27:42.110Z |
| CVE-2026-2764 |
9.8 (3.1)
|
JIT miscompilation, use-after-free in the JavaScript E… |
Mozilla |
Firefox |
2026-02-24T13:33:03.207Z | 2026-04-16T14:27:18.103Z |
| CVE-2026-6388 |
9.1 (3.1)
|
Argocd-image-updater: argocd image updater: cross-name… |
Red Hat |
Red Hat OpenShift GitOps |
2026-04-15T21:34:07.022Z | 2026-04-16T14:26:23.879Z |
| CVE-2026-3355 |
6.1 (3.1)
|
Customer Reviews for WooCommerce <= 5.101.0 - Reflecte… |
ivole |
Customer Reviews for WooCommerce |
2026-04-16T06:44:53.276Z | 2026-04-16T14:25:11.362Z |
| CVE-2026-6270 |
9.1 (3.1)
|
@fastify/middie vulnerable to middleware authenticatio… |
@fastify/middie |
@fastify/middie |
2026-04-16T13:44:46.322Z | 2026-04-16T14:24:26.764Z |
| CVE-2026-40193 |
8.2 (3.1)
|
Maddy Mail Server: LDAP Filter Injection via Unsanitiz… |
foxcpp |
maddy |
2026-04-15T23:15:25.011Z | 2026-04-16T14:23:52.438Z |
| CVE-2026-40179 |
5.3 (4.0)
|
Prometheus: Stored XSS via metric names and label valu… |
prometheus |
prometheus |
2026-04-15T22:26:46.909Z | 2026-04-16T14:21:42.130Z |
| CVE-2026-40786 |
4.3 (3.1)
|
WordPress MyRewards plugin <= 5.7.3 - Broken Access Co… |
Long Watch Studio |
MyRewards |
2026-04-15T10:21:36.068Z | 2026-04-16T14:20:54.766Z |
| CVE-2026-4880 |
9.8 (3.1)
|
Barcode Scanner (+Mobile App) <= 1.11.0 - Unauthentica… |
ukrsolution |
Barcode Scanner (+Mobile App) – Inventory manager, Order fulfillment system, POS (Point of Sale) |
2026-04-15T23:25:49.596Z | 2026-04-16T14:20:50.654Z |
| CVE-2026-6410 |
5.3 (3.1)
|
@fastify/static vulnerable to path traversal in direct… |
@fastify/static |
@fastify/static |
2026-04-16T13:29:08.120Z | 2026-04-16T14:19:36.780Z |
| CVE-2026-40502 |
8.7 (4.0)
8.8 (3.1)
|
OpenHarness Remote Administrative Command Injection vi… |
HKUDS |
OpenHarness |
2026-04-16T00:08:34.463Z | 2026-04-16T14:19:24.128Z |
| CVE-2026-4949 |
4.3 (3.1)
|
ProfilePress <= 4.16.12 - Missing Authorization to Aut… |
properfraction |
Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress |
2026-04-15T22:26:05.515Z | 2026-04-16T14:19:21.197Z |
| CVE-2025-64669 |
7.8 (3.1)
|
Windows Admin Center Elevation of Privilege Vulnerability |
Microsoft |
Windows Admin Center |
2025-12-11T18:06:13.821Z | 2026-04-16T14:19:08.517Z |
| CVE-2025-65046 |
3.1 (3.1)
|
Microsoft Edge (Chromium-based) Spoofing Vulnerability |
Microsoft |
Microsoft Edge for Android |
2025-12-18T22:01:43.462Z | 2026-04-16T14:19:07.967Z |
| CVE-2025-62221 |
7.8 (3.1)
|
Windows Cloud Files Mini Filter Driver Elevation of Pr… |
Microsoft |
Windows 10 Version 1809 |
2025-12-09T17:56:10.169Z | 2026-04-16T14:19:07.492Z |
| CVE-2025-64677 |
8.2 (3.1)
|
Office Out-of-Box Experience Spoofing Vulnerability |
Microsoft |
Office Out-of-Box Experience |
2025-12-18T22:02:08.421Z | 2026-04-16T14:19:06.932Z |
| CVE-2025-64675 |
8.3 (3.1)
|
Azure Cosmos DB Spoofing Vulnerability |
Microsoft |
Azure Cosmos DB |
2025-12-18T23:15:31.241Z | 2026-04-16T14:19:06.437Z |
| CVE-2025-64676 |
7.2 (3.1)
|
Microsoft Purview eDiscovery Remote Code Execution Vul… |
Microsoft |
Microsoft Purview |
2025-12-18T22:02:07.323Z | 2026-04-16T14:19:05.887Z |
| CVE-2025-65037 |
10 (3.1)
|
Azure Container Apps Remote Code Execution Vulnerability |
Microsoft |
Azure Container Apps |
2025-12-18T22:02:06.737Z | 2026-04-16T14:19:05.350Z |
| CVE-2025-65041 |
10 (3.1)
|
Microsoft Partner Center Elevation of Privilege Vulner… |
Microsoft |
Microsoft Partner Center |
2025-12-18T22:02:06.021Z | 2026-04-16T14:19:04.744Z |
| CVE-2025-64663 |
9.9 (3.1)
|
Custom Question Answering Elevation of Privilege Vulne… |
Microsoft |
Azure Cognitive Service for Language |
2025-12-18T22:02:05.377Z | 2026-04-16T14:19:04.162Z |
| CVE-2025-54100 |
7.8 (3.1)
|
PowerShell Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:56:09.562Z | 2026-04-16T14:19:03.292Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-34720 |
2.3 (4.0)
|
Zammad has an origin validation error in SSO mechanism |
zammad |
zammad |
2026-04-08T18:11:23.538Z | 2026-04-09T16:17:34.878Z |
| CVE-2026-37589 |
2.7 (3.1)
|
SourceCodester Storage Unit Rental Management Sys… |
n/a |
n/a |
2026-04-14T00:00:00.000Z | 2026-04-14T15:33:11.824Z |
| CVE-2025-12453 |
5.1 (4.0)
|
Improper neutralization of input during web page gener… |
OpenText™ |
Vertica |
2026-03-13T18:30:53.495Z | 2026-03-13T19:34:21.690Z |
| CVE-2026-40315 |
7.2 (4.0)
|
PraisonAI: SQLiteConversationStore didn't validate tab… |
MervinPraison |
PraisonAI |
2026-04-14T02:45:33.880Z | 2026-04-14T13:25:13.165Z |
| CVE-2026-40313 |
9.1 (3.1)
|
PraisonAI: ArtiPACKED Vulnerability via GitHub Actions… |
MervinPraison |
PraisonAI |
2026-04-14T03:10:23.697Z | 2026-04-14T16:27:49.836Z |
| CVE-2026-40289 |
9.1 (3.1)
|
PraisonAI Browser Server allows unauthenticated WebSoc… |
MervinPraison |
PraisonAI |
2026-04-14T03:05:05.514Z | 2026-04-14T20:18:37.319Z |
| CVE-2026-40288 |
9.8 (3.1)
|
PraisonAI: Critical RCE via `type: job` workflow YAML |
MervinPraison |
PraisonAI |
2026-04-14T03:00:21.547Z | 2026-04-14T15:57:15.812Z |
| CVE-2026-40287 |
8.4 (3.1)
|
PraisonAI has RCE via Automatic tools.py Import |
MervinPraison |
PraisonAI |
2026-04-14T02:55:38.270Z | 2026-04-14T13:23:29.807Z |
| CVE-2026-33929 |
N/A
|
Apache PDFBox Examples: Path Traversal in PDFBox Extra… |
Apache Software Foundation |
Apache PDFBox Examples |
2026-04-14T08:09:39.517Z | 2026-04-14T19:50:07.000Z |
| CVE-2026-33892 |
7.1 (3.1)
5.1 (4.0)
|
A vulnerability has been identified in Industrial… |
Siemens |
Industrial Edge Management Pro V1 |
2026-04-14T08:40:46.807Z | 2026-04-14T13:46:34.636Z |
| CVE-2026-31049 |
9.8 (3.1)
|
An issue in Hostbill v.2025-11-24 and 2025-12-01 … |
n/a |
n/a |
2026-04-14T00:00:00.000Z | 2026-04-16T12:06:52.366Z |
| CVE-2026-30480 |
6.5 (3.1)
|
A Local File Inclusion (LFI) vulnerability in the… |
n/a |
n/a |
2026-04-14T00:00:00.000Z | 2026-04-16T12:06:38.149Z |
| CVE-2026-2450 |
7.4 (4.0)
|
.NET misconfiguration: use of impersonation vulne… |
upKeeper Solutions |
upKeeper Instant Privilege Access |
2026-04-14T12:07:44.265Z | 2026-04-14T13:14:16.443Z |
| CVE-2026-2449 |
9 (4.0)
|
Improper neutralization of argument delimiters in… |
upKeeper Solutions |
upKeeper Instant Privilege Access |
2026-04-14T11:56:04.741Z | 2026-04-14T13:14:16.593Z |
| CVE-2026-24069 |
5.4 (3.1)
|
Improper Enforcement of Disabled Accounts in WebUI SSO… |
Kiuwan |
SAST |
2026-04-14T11:26:55.274Z | 2026-04-14T18:24:36.801Z |
| CVE-2026-2332 |
7.4 (3.1)
|
HTTP Request Smuggling via Chunked Extension Quoted-St… |
Eclipse Foundation |
Eclipse Jetty |
2026-04-14T10:59:10.193Z | 2026-04-15T03:58:12.322Z |
| CVE-2025-8095 |
9.1 (4.0)
|
Recoverable obfuscation using the OECH1 prefix encodin… |
Progress Software Corporation |
OpenEdge |
2026-04-14T13:13:43.739Z | 2026-04-15T03:58:13.601Z |
| CVE-2025-7389 |
8.2 (4.0)
|
Unauthorized Arbitrary File Read via RMI in AdminServe… |
Progress Software Corporation |
OpenEdge |
2026-04-14T13:12:54.559Z | 2026-04-14T14:04:52.165Z |
| CVE-2025-69993 |
6.1 (3.1)
|
Leaflet versions up to and including 1.9.4 are vu… |
n/a |
n/a |
2026-04-14T00:00:00.000Z | 2026-04-14T17:45:26.763Z |
| CVE-2025-69893 |
4.6 (3.1)
|
A side-channel vulnerability exists in the implem… |
n/a |
n/a |
2026-04-14T00:00:00.000Z | 2026-04-16T12:06:31.722Z |
| CVE-2025-61260 |
9.8 (3.1)
|
A vulnerability was identified in OpenAI Codex CL… |
n/a |
n/a |
2026-04-14T00:00:00.000Z | 2026-04-16T12:06:45.207Z |
| CVE-2025-13822 |
5.3 (4.0)
|
Authentication bypass in MCPHub |
MCPHub |
MCPHub |
2026-04-14T10:23:49.910Z | 2026-04-14T13:14:16.888Z |
| CVE-2026-34721 |
5.9 (4.0)
|
Zammad has Cross-site request forgery (CSRF) in OAuth … |
zammad |
zammad |
2026-04-08T18:12:32.504Z | 2026-04-09T14:22:33.535Z |
| CVE-2025-12454 |
5.1 (4.0)
|
Improper neutralization of input during web page gener… |
OpenText™ |
Vertica |
2026-03-13T18:30:40.822Z | 2026-03-13T19:33:59.150Z |
| CVE-2025-12455 |
5.1 (4.0)
|
Username Enumeration Observable Response Discrepancy v… |
OpenText™ |
Vertica |
2026-03-13T18:30:27.903Z | 2026-03-13T19:33:40.096Z |
| CVE-2026-6231 |
5.3 (4.0)
4.3 (3.1)
|
bson_validate may skip validation when processing cert… |
MongoDB Inc. |
C Driver |
2026-04-13T15:31:55.735Z | 2026-04-13T19:23:42.752Z |
| CVE-2026-6100 |
9.1 (4.0)
|
Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decomp… |
Python Software Foundation |
CPython |
2026-04-13T17:15:47.606Z | 2026-04-14T14:30:25.622Z |
| CVE-2026-5086 |
7.5 (3.1)
|
Crypt::SecretBuffer versions before 0.019 for Perl is … |
NERDVANA |
Crypt::SecretBuffer |
2026-04-13T22:54:53.724Z | 2026-04-15T20:03:28.442Z |
| CVE-2026-4786 |
7 (4.0)
|
Incomplete mitigation of CVE-2026-4519, %action expans… |
Python Software Foundation |
CPython |
2026-04-13T21:52:19.036Z | 2026-04-14T14:30:19.762Z |
| CVE-2026-34264 |
6.5 (3.1)
|
Information Disclosure vulnerability in SAP Human Capi… |
SAP_SE |
SAP Human Capital Management for SAP S/4HANA |
2026-04-14T00:09:12.272Z | 2026-04-14T13:14:17.154Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-12453 | Improper neutralization of input during web page generation ('cross-site scripting') vulnerability … | 2026-03-13T19:53:47.427 | 2026-04-17T15:25:00.237 |
| fkie_cve-2026-40315 | PraisonAI is a multi-agent teams system. Prior to 4.5.133, there is an SQL identifier injection vul… | 2026-04-14T04:17:16.057 | 2026-04-17T15:24:57.753 |
| fkie_cve-2026-40313 | PraisonAI is a multi-agent teams system. In versions 4.5.139 and below, the GitHub Actions workflow… | 2026-04-14T04:17:13.890 | 2026-04-17T15:24:57.753 |
| fkie_cve-2026-40289 | PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of prai… | 2026-04-14T04:17:12.710 | 2026-04-17T15:24:57.753 |
| fkie_cve-2026-40288 | PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of prai… | 2026-04-14T04:17:12.210 | 2026-04-17T15:24:57.753 |
| fkie_cve-2026-40287 | PraisonAI is a multi-agent teams system. Versions 4.5.138 and below are vulnerable to arbitrary cod… | 2026-04-14T04:17:11.977 | 2026-04-17T15:24:57.753 |
| fkie_cve-2026-33929 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apa… | 2026-04-14T09:16:36.297 | 2026-04-17T15:24:57.753 |
| fkie_cve-2026-33892 | A vulnerability has been identified in Industrial Edge Management Pro V1 (All versions >= V1.7.6 < … | 2026-04-14T09:16:36.097 | 2026-04-17T15:24:57.753 |
| fkie_cve-2026-31049 | An issue in Hostbill v.2025-11-24 and 2025-12-01 allows a remote attacker to execute arbitrary code… | 2026-04-14T14:16:13.130 | 2026-04-17T15:24:57.753 |
| fkie_cve-2026-30480 | A Local File Inclusion (LFI) vulnerability in the NFSen module (nfsen.inc.php) of LibreNMS 22.11.0-… | 2026-04-14T15:16:27.337 | 2026-04-17T15:24:57.753 |
| fkie_cve-2026-2450 | .NET misconfiguration: use of impersonation vulnerability in upKeeper Solutions upKeeper Instant Pr… | 2026-04-14T13:16:22.333 | 2026-04-17T15:24:57.753 |
| fkie_cve-2026-2449 | Improper neutralization of argument delimiters in a command ('argument injection') vulnerability in… | 2026-04-14T12:16:21.590 | 2026-04-17T15:24:57.753 |
| fkie_cve-2026-24069 | Kiuwan SAST improperly authorizes SSO logins for locally disabled mapped user accounts, allowing di… | 2026-04-14T12:16:20.247 | 2026-04-17T15:24:57.753 |
| fkie_cve-2026-2332 | In Eclipse Jetty, the HTTP/1.1 parser is vulnerable to request smuggling when chunk extensions are … | 2026-04-14T12:16:21.333 | 2026-04-17T15:24:57.753 |
| fkie_cve-2025-8095 | The OECH1 prefix encoding is intended to obfuscate values across the OpenEdge platform. It has bee… | 2026-04-14T14:16:11.237 | 2026-04-17T15:24:57.753 |
| fkie_cve-2025-7389 | A vulnerability in the AdminServer component of OpenEdge on all supported platforms grants its auth… | 2026-04-14T14:16:10.263 | 2026-04-17T15:24:57.753 |
| fkie_cve-2025-69993 | Leaflet versions up to and including 1.9.4 are vulnerable to Cross-Site Scripting (XSS) via the bin… | 2026-04-14T15:16:25.477 | 2026-04-17T15:24:57.753 |
| fkie_cve-2025-69893 | A side-channel vulnerability exists in the implementation of BIP-39 mnemonic processing, as observe… | 2026-04-14T15:16:25.357 | 2026-04-17T15:24:57.753 |
| fkie_cve-2025-61260 | A vulnerability was identified in OpenAI Codex CLI v0.23.0 and before that enables code execution t… | 2026-04-14T15:16:24.487 | 2026-04-17T15:24:57.753 |
| fkie_cve-2025-13822 | MCPHub in versions below 0.11.0 is vulnerable to authentication bypass. Some endpoints are not prot… | 2026-04-14T11:16:24.300 | 2026-04-17T15:24:57.753 |
| fkie_cve-2026-34721 | Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the O… | 2026-04-08T19:25:22.290 | 2026-04-17T15:23:43.820 |
| fkie_cve-2025-12454 | Improper neutralization of input during web page generation ('cross-site scripting') vulnerability … | 2026-03-13T19:53:47.667 | 2026-04-17T15:23:25.733 |
| fkie_cve-2025-12455 | Observable response discrepancy vulnerability in OpenText™ Vertica allows Password Brute Forcing. … | 2026-03-13T19:53:47.873 | 2026-04-17T15:18:57.060 |
| fkie_cve-2026-6231 | The bson_validate function may return early on specific inputs and incorrectly report success. This… | 2026-04-13T16:16:36.570 | 2026-04-17T15:18:16.507 |
| fkie_cve-2026-6100 | Use-after-free (UAF) was possible in the `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.… | 2026-04-13T18:16:31.297 | 2026-04-17T15:18:16.507 |
| fkie_cve-2026-5086 | Crypt::SecretBuffer versions before 0.019 for Perl is suseceptible to timing attacks. For example,… | 2026-04-13T23:16:27.990 | 2026-04-17T15:18:16.507 |
| fkie_cve-2026-4786 | Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be b… | 2026-04-13T22:16:30.413 | 2026-04-17T15:18:16.507 |
| fkie_cve-2026-34264 | During authorization checks in SAP Human Capital Management for SAP S/4HANA, the system returns spe… | 2026-04-14T01:16:04.200 | 2026-04-17T15:18:16.507 |
| fkie_cve-2026-34262 | Information Disclosure Vulnerability in SAP HANA Cockpit and HANA Database Explorer | 2026-04-14T01:16:04.050 | 2026-04-17T15:18:16.507 |
| fkie_cve-2026-34261 | Due to a missing authorization check in SAP Business Analytics and SAP Content Management, an authe… | 2026-04-14T01:16:03.897 | 2026-04-17T15:18:16.507 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-4g9p-x8vm-f7qg |
5.3 (3.1)
|
The Riaxe Product Customizer plugin for WordPress is vulnerable to authorization bypass in all vers… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-45x5-433g-pc2h |
5.3 (3.1)
|
The Basic Google Maps Placemarks plugin for WordPress is vulnerable to authorization bypass in vers… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-3phr-p473-vc8q |
8.8 (3.1)
|
The AcyMailing plugin for WordPress is vulnerable to privilege escalation in all versions From 9.11… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-wxm2-x9x9-x5mj |
9.3 (3.1)
|
Luanti 5 before 5.15.2, when LuaJIT is used, allows a Lua sandbox escape via a crafted mod. | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-wc72-m63f-4pcv |
6.4 (3.1)
|
The WP YouTube Lyte plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugi… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-vmw6-xgxq-pw9v |
5.4 (4.0)
|
An Incorrect Permission Assignment for Critical Resource vulnerability in the ASUS DriverHub update… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-v352-gq4q-9qjf |
7.4 (3.1)
|
radare2 before 9236f44, when configured on UNIX without SSL, allows command injection via a PDB nam… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-ppm7-9255-8gmf |
8.8 (3.1)
9.3 (4.0)
|
WinMatrix agent developed by Simopro Technology has a Missing Authentication vulnerability, allowin… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-mgwx-w2xc-pjq7 |
7.5 (3.1)
8.7 (4.0)
|
MailGates/MailAudit developed by Openfind has a CRLF Injection vulnerability, allowing unauthentica… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-hx2j-xhcm-gv72 |
10.0 (4.0)
|
The iSherlock developed by HGiga has an OS Command Injection vulnerability, allowing unauthentica… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-hj44-m5xv-x75q |
3.3 (3.1)
4.8 (4.0)
|
MuPDF mutool does not sanitize PDF metadata fields before writing them to terminal output, allowing… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-fwhx-4vqr-m9gj |
6.5 (3.1)
7.1 (4.0)
|
OpenHarness prior to commit dd1d235 contains a path traversal vulnerability that allows remote gate… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-99qg-46r6-v9px |
6.4 (3.1)
|
The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-S… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-6v5j-prr3-phf9 |
9.8 (3.1)
9.3 (4.0)
|
MailGates/MailAudit developed by Openfind has a Stack-based Buffer Overflow vulnerability, allowing… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-6v58-5584-rv99 |
8.1 (3.1)
|
Luanti 5 before 5.15.2 sometimes allows unintended access to an insecure environment. If at least o… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-49h6-4qj3-4f42 |
5.4 (4.0)
|
A Download of Code Without Integrity Check vulnerability in the update modules in ASUS Member Cente… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-48wr-p98v-9w5h |
4.9 (3.1)
|
FFmpeg before 8.1 has an integer overflow and resultant out-of-bounds write via CENC (Common Encryp… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-3r49-76f3-pf2m |
9.8 (3.1)
9.3 (4.0)
|
Creolabs Gravity before 0.9.6 contains a heap buffer overflow vulnerability in the gravity_vm_exec … | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-x87c-g7pw-2xr5 |
6.3 (3.1)
5.3 (4.0)
|
GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side request forgery vulner… | 2026-04-10T21:31:15Z | 2026-04-16T03:31:05Z |
| ghsa-v8f7-cg9p-w5jx |
6.3 (3.1)
5.3 (4.0)
|
GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side request forgery vulner… | 2026-04-10T21:31:15Z | 2026-04-16T03:31:05Z |
| ghsa-9w66-jgph-vx6j |
8.8 (3.1)
8.7 (4.0)
|
OpenHarness prior to commit dd1d235 contains a command injection vulnerability that allows remote g… | 2026-04-16T03:31:05Z | 2026-04-16T03:31:05Z |
| ghsa-7rhq-9q45-5gm4 |
8.4 (4.0)
|
radare2 prior to version 6.1.4 contains a command injection vulnerability in the PDB parser's print… | 2026-04-16T03:31:05Z | 2026-04-16T03:31:05Z |
| ghsa-6f54-qjvm-wwq3 |
5.1 (4.0)
|
wger has Stored XSS via Unescaped License Attribution Fields | 2026-04-16T01:37:21Z | 2026-04-16T01:37:21Z |
| ghsa-xppv-4jrx-qf8m |
7.6 (3.1)
|
wger has Broken Access Control in Global Gym Configuration Update Endpoint | 2026-04-16T01:35:16Z | 2026-04-16T01:35:16Z |
| ghsa-m32f-8vh9-2hh3 |
6.9 (3.1)
|
Keycloak: Arbitrary code execution via Stored Cross-Site Scripting (XSS) in organization selection … | 2026-04-14T15:30:35Z | 2026-04-16T01:34:56Z |
| ghsa-5vjq-5jmg-39xq |
6.3 (3.1)
|
Renovate affected by remote code execution was possible using the bazel-module or bazelisk managers… | 2026-04-16T01:34:39Z | 2026-04-16T01:34:40Z |
| ghsa-3qcm-pj6q-w4c5 |
4.3 (3.1)
5.3 (4.0)
|
Nodcms contains a cross-site request forgery vulnerability | 2026-04-04T21:30:27Z | 2026-04-16T01:34:08Z |
| ghsa-fpx9-9hq8-w2xc |
8.5 (3.1)
|
Webkul Krayin CRM has Server-Side Request Forgery (SSRF) | 2026-04-14T18:30:35Z | 2026-04-16T01:32:29Z |
| ghsa-2xx8-j85v-j7wh |
8.1 (3.1)
|
Webkul Krayin CRM has Broken Object-Level Authorization (BOLA) in the /Contact/Persons/PersonContro… | 2026-04-14T18:30:35Z | 2026-04-16T01:32:19Z |
| ghsa-r8rp-5f55-5j9x |
8.8 (3.1)
|
Webkul Krayin CRM has Broken Object-Level Authorization (BOLA) in the /Settings/UserController.php | 2026-04-14T18:30:35Z | 2026-04-16T01:31:46Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2012-39 |
|
virt/disk/api.py in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), and Diablo … | nova | 2012-07-22T16:55:00Z | 2024-11-21T14:22:56.493974Z |
| pysec-2012-38 |
|
Directory traversal vulnerability in virt/disk/api.py in OpenStack Compute (Nova) Folsom … | nova | 2012-07-22T16:55:00Z | 2024-11-21T14:22:56.434839Z |
| pysec-2023-288 |
6.5 (3.1)
|
The Nautobot Device Onboarding plugin uses the netmiko and NAPALM libraries to simplify t… | nautobot-device-onboarding | 2023-11-21T23:15:00+00:00 | 2024-11-21T14:22:55.475794+00:00 |
| pysec-2023-287 |
4.3 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-12-22T17:15:00+00:00 | 2024-11-21T14:22:55.764934+00:00 |
| pysec-2023-286 |
5.3 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-12-12T23:15:00+00:00 | 2024-11-21T14:22:55.664554+00:00 |
| pysec-2023-285 |
5.4 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-11-22T16:15:00+00:00 | 2024-11-21T14:22:55.567982+00:00 |
| pysec-2023-284 |
6.5 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-23T14:15:00+00:00 | 2024-11-21T14:22:55.160710+00:00 |
| pysec-2023-283 |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-19T18:15:00+00:00 | 2024-11-21T14:22:55.105976+00:00 |
| pysec-2023-282 |
6.5 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-19T09:15:00+00:00 | 2024-11-21T14:22:55.051300+00:00 |
| pysec-2022-43141 |
7.5 (3.1)
|
MotionEye v0.42.1 and below allows attackers to access sensitive information via a GET re… | motioneye | 2022-03-24T17:15:00+00:00 | 2024-11-21T14:22:55.422153+00:00 |
| pysec-2012-37 |
|
The (1) EC2 and (2) OS APIs in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), … | nova | 2012-06-21T15:55:00Z | 2024-11-21T14:22:55.891133Z |
| pysec-2012-36 |
|
Openstack Compute (Nova) Folsom, 2012.1, and 2011.3 does not limit the number of security… | nova | 2012-06-07T19:55:00Z | 2024-11-21T14:22:55.825436Z |
| pysec-2023-281 |
8.8 (3.1)
|
Improper Neutralization of Special Elements Used in a Template Engine in GitHub repositor… | mlflow | 2023-12-12T04:15:00+00:00 | 2024-11-21T14:22:54.938745+00:00 |
| pysec-2023-280 |
7.8 (3.1)
|
OS Command Injection in GitHub repository mlflow/mlflow prior to 2.6.0. | mlflow | 2023-08-01T01:15:00+00:00 | 2024-11-21T14:22:54.880705+00:00 |
| pysec-2023-279 |
9.1 (3.1)
|
MindsDB is a SQL Server for artificial intelligence. Prior to version 23.11.4.1, the `put… | mindsdb | 2023-12-22T21:15:00+00:00 | 2024-11-21T14:22:54.549778+00:00 |
| pysec-2023-277 |
5.3 (3.1)
|
MindsDB connects artificial intelligence models to real time data. Versions prior to 23.1… | mindsdb | 2023-12-11T19:15:00+00:00 | 2024-11-21T14:22:54.391272+00:00 |
| pysec-2014-110 |
|
Multiple cross-site scripting (XSS) vulnerabilities in apps/common/templates/calculate_fo… | mayan-edms | 2014-05-27T13:55:00Z | 2024-11-21T14:22:54.240407Z |
| pysec-2024-128 |
6.1 (3.1)
|
Label Studio, an open source data labeling tool had a remote import feature allowed users… | label-studio | 2024-01-24T00:15:00+00:00 | 2024-11-21T14:22:53.406222+00:00 |
| pysec-2024-127 |
5.3 (3.1)
|
Label Studio is a popular open source data labeling tool. The vulnerability affects all v… | label-studio | 2024-01-31T17:15:00+00:00 | 2024-11-21T14:22:53.294472+00:00 |
| pysec-2024-126 |
5.4 (3.1)
|
Label Studio is an a popular open source data labeling tool. Versions prior to 1.9.2 have… | label-studio | 2024-01-23T23:15:00+00:00 | 2024-11-21T14:22:53.235341+00:00 |
| pysec-2023-275 |
7.5 (3.1)
|
Label Studio is an open source data labeling tool. In all current versions of Label Studi… | label-studio | 2023-11-13T21:15:00+00:00 | 2024-11-21T14:22:53.350760+00:00 |
| pysec-2023-274 |
8.8 (3.1)
|
Label Studio is a multi-type data labeling and annotation tool with standardized output f… | label-studio | 2023-11-09T15:15:00+00:00 | 2024-11-21T14:22:53.173192+00:00 |
| pysec-2023-273 |
8.8 (3.1)
|
Kiwi TCMS is an open source test management system. In kiwitcms/Kiwi v12.2 and prior and … | kiwitcms | 2023-04-24T22:15:00+00:00 | 2024-11-21T14:22:53.063160+00:00 |
| pysec-2022-43137 |
5.5 (3.1)
|
LIEF commit 365a16a was discovered to contain a reachable assertion abort via the compone… | lief | 2022-09-13T21:15:00+00:00 | 2024-11-21T14:22:53.842904+00:00 |
| pysec-2017-144 |
7.5 (3.1)
|
Koji 1.13.0 does not properly validate SCM paths, allowing an attacker to work around bla… | koji | 2017-10-06T17:29:00Z | 2024-11-21T14:22:53.117821Z |
| pysec-2023-272 |
4.3 (3.1)
|
The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints… | jupyter-server | 2023-12-04T21:15:00+00:00 | 2024-11-21T14:22:52.227754+00:00 |
| pysec-2018-151 |
8.8 (3.1)
|
An issue was discovered in Project Jupyter JupyterHub OAuthenticator 0.6.x before 0.6.2 a… | jupyterhub | 2018-02-18T03:29:00Z | 2024-11-21T14:22:52.286953Z |
| pysec-2018-150 |
7.5 (3.1)
|
Hyperledger Iroha versions v1.0_beta and v1.0.0_beta-1 are vulnerable to transaction and … | iroha | 2018-06-01T19:29:00Z | 2024-11-21T14:22:52.162008Z |
| pysec-2014-104 |
|
FreeIPA 4.0.x before 4.0.5 and 4.1.x before 4.1.1, when 2FA is enabled, allows remote att… | ipa | 2014-11-19T18:59:00Z | 2024-11-21T14:22:52.00819Z |
| pysec-2013-40 |
|
OpenStack Identity (Keystone) Grizzly 2013.1.1, when DEBUG mode logging is enabled, logs … | keystone | 2013-05-21T18:55:00Z | 2024-11-21T14:22:52.515884Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-4224 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.414154Z |
| gsd-2024-4223 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.423284Z |
| gsd-2024-4222 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.363699Z |
| gsd-2024-4221 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.433755Z |
| gsd-2024-4220 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.384898Z |
| gsd-2024-4219 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.359066Z |
| gsd-2024-4218 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.369587Z |
| gsd-2024-4217 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.397245Z |
| gsd-2024-4216 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.414356Z |
| gsd-2024-4215 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.378015Z |
| gsd-2024-4214 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.390841Z |
| gsd-2024-4213 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.379947Z |
| gsd-2024-4212 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.440122Z |
| gsd-2024-4211 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.414864Z |
| gsd-2024-4210 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.431459Z |
| gsd-2024-4209 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.403437Z |
| gsd-2024-4208 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.386660Z |
| gsd-2024-4207 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.376954Z |
| gsd-2024-4206 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.423074Z |
| gsd-2024-4205 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.362130Z |
| gsd-2024-4204 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.429356Z |
| gsd-2024-4203 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.393641Z |
| gsd-2024-4202 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.405198Z |
| gsd-2024-4201 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.401052Z |
| gsd-2024-4200 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.430960Z |
| gsd-2024-4199 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.422865Z |
| gsd-2024-4198 | Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully vali… | 2024-04-26T05:02:17.420758Z |
| gsd-2024-4197 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.437306Z |
| gsd-2024-4196 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.385450Z |
| gsd-2024-4195 | Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully vali… | 2024-04-26T05:02:17.392645Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2670 | Malicious code in 7miners (PyPI) | 2026-04-14T21:55:03Z | 2026-04-14T21:55:03Z |
| mal-2026-2669 | Malicious code in ant-mcp-proxy-for-test (PyPI) | 2026-04-14T21:19:11Z | 2026-04-14T21:19:23Z |
| mal-2026-2668 | Malicious code in pnpm-workspaces (npm) | 2026-04-14T19:36:06Z | 2026-04-14T19:36:06Z |
| mal-2026-2667 | Malicious code in ckeditor5-minimap (npm) | 2026-04-14T19:06:02Z | 2026-04-14T19:06:02Z |
| mal-2026-2666 | Malicious code in moooo (PyPI) | 2026-04-14T15:21:49Z | 2026-04-14T15:21:49Z |
| mal-2026-2664 | Malicious code in buildenv-telemetry (PyPI) | 2026-04-14T14:28:02Z | 2026-04-14T14:28:02Z |
| mal-2026-2665 | Malicious code in hive-os-settings (PyPI) | 2026-04-14T14:27:24Z | 2026-04-14T14:27:24Z |
| mal-2026-2662 | Malicious code in @automation-toolchain/f5-cloud-libs (npm) | 2026-04-14T13:05:55Z | 2026-04-14T13:40:00Z |
| mal-2026-2529 | Malicious code in use-form-builder-plugin (npm) | 2026-04-06T16:16:50Z | 2026-04-14T12:40:55Z |
| mal-2026-2429 | Malicious code in vv-ftend-core (npm) | 2026-04-02T12:10:43Z | 2026-04-14T12:40:55Z |
| mal-2026-2428 | Malicious code in vv-ftend-api (npm) | 2026-04-02T12:21:07Z | 2026-04-14T12:40:55Z |
| mal-2026-2568 | Malicious code in pt-sc-logger (npm) | 2026-04-12T21:36:18Z | 2026-04-14T12:40:54Z |
| mal-2026-2567 | Malicious code in pt-sc-demo-app (npm) | 2026-04-12T21:41:40Z | 2026-04-14T12:40:54Z |
| mal-2026-2427 | Malicious code in partner-tracker-api (npm) | 2026-04-02T12:10:47Z | 2026-04-14T12:40:54Z |
| mal-2026-2426 | Malicious code in partner-tracker (npm) | 2026-04-02T12:10:54Z | 2026-04-14T12:40:54Z |
| mal-2026-2513 | Malicious code in gprofiler (npm) | 2026-04-08T11:45:58Z | 2026-04-14T12:40:52Z |
| mal-2026-2425 | Malicious code in bytefrontier-tracker (npm) | 2026-04-02T12:10:59Z | 2026-04-14T12:40:51Z |
| mal-2026-2424 | Malicious code in bytefrontier-sdk (npm) | 2026-04-02T12:21:22Z | 2026-04-14T12:40:51Z |
| mal-2026-2423 | Malicious code in bytefrontier-partner (npm) | 2026-04-02T12:10:52Z | 2026-04-14T12:40:51Z |
| mal-2026-2422 | Malicious code in bytefrontier-api (npm) | 2026-04-02T12:10:50Z | 2026-04-14T12:40:51Z |
| mal-2026-2658 | Malicious code in tailwindcss-style-typography (npm) | 2026-04-14T12:12:36Z | 2026-04-14T12:12:37Z |
| mal-2026-2657 | Malicious code in tailwind-typ (npm) | 2026-04-14T12:01:40Z | 2026-04-14T12:01:41Z |
| mal-2026-2656 | Malicious code in tailwind-stylecss-typography (npm) | 2026-04-14T11:52:39Z | 2026-04-14T11:52:40Z |
| mal-2026-2644 | Malicious code in node-unpnotifyserv (npm) | 2026-04-14T11:47:49Z | 2026-04-14T11:47:50Z |
| mal-2026-2655 | Malicious code in tailwind-lines-clamp (npm) | 2026-04-14T11:38:14Z | 2026-04-14T11:38:15Z |
| mal-2026-2632 | Malicious code in magentaa11y (npm) | 2026-04-14T11:31:05Z | 2026-04-14T11:31:12Z |
| mal-2026-2634 | Malicious code in percy-cake-docker (npm) | 2026-04-14T11:31:04Z | 2026-04-14T11:31:05Z |
| mal-2026-2630 | Malicious code in gate-apis (PyPI) | 2026-04-14T10:23:40Z | 2026-04-14T10:23:40Z |
| mal-2026-2825 | Malicious code in centralogger (npm) | 2026-04-14T09:21:57Z | 2026-04-14T09:21:57Z |
| mal-2026-2826 | Malicious code in dom-utils-lite (npm) | 2026-04-14T09:21:35Z | 2026-04-14T09:21:35Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2584 | Red Hat Enterprise Linux Ceph Storage: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2518 | Red Hat Enterprise Linux (runc): Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-11-09T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2490 | Red Hat OpenShift Container Platform: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2019-11-20T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2242 | Wireshark: Schwachstelle ermöglicht Denial of Service | 2025-10-08T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2150 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-09-29T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2045 | expat: Schwachstelle ermöglicht Denial of Service | 2025-09-14T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1932 | Wireshark: Schwachstelle ermöglicht Denial of Service | 2025-08-28T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1883 | Apache Tika: Schwachstelle ermöglicht Infogewinn oder Manipulation | 2025-08-20T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1740 | Golang Go: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-08-06T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1665 | Linux Kernel: Mehrere Schwachstellen | 2025-07-28T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1596 | Linux Kernel: Schwachstelle ermöglicht Denial of Service und nicht spezifizierten Angriff | 2025-07-17T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1244 | Wireshark: Schwachstelle ermöglicht Denial of Service | 2025-06-04T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1114 | Linux Kernel: Mehrere Schwachstellen | 2025-05-20T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1098 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-05-18T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1034 | screen: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1001 | Intel Prozessoren: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-05-12T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0999 | Linux Kernel: Mehrere Schwachstellen | 2025-05-11T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0991 | Linux Kernel: Mehrere Schwachstellen | 2025-05-08T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0975 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-05-07T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0953 | Golang Go: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-05-06T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0945 | Linux Kernel: Mehrere Schwachstellen | 2025-05-05T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0932 | Linux Kernel: Mehrere Schwachstellen | 2025-05-04T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0922 | Linux Kernel: Mehrere Schwachstellen | 2025-05-01T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0904 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-04-29T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0831 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-04-15T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0732 | Linux Kernel: Mehrere Schwachstellen | 2025-04-07T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0698 | Linux Kernel: Mehrere Schwachstellen | 2025-04-02T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1422 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-06-20T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1418 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-06-19T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1322 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe | 2024-06-09T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-273-06 | National Instruments Circuit Design Suite | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-05 | OpenPLC_V3 | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-01 | MegaSys Enterprises Telenium Online Web Application | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-226-26 | Rockwell Automation FLEX 5000 I/O (Update A) | 2025-08-14T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-063-02 | Keysight Ixia Vision Product Family (Update A) | 2025-03-04T07:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-22-298-02 | HEIDENHAIN Controller TNC (Update A) | 2022-10-25T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-07 | LG Innotek Camera Multiple Models | 2025-09-30T05:00:00.000000Z | 2025-09-30T05:00:00.000000Z |
| va-25-273-01 | Microsoft Windows inconsistent driver blocking | 2025-09-30T00:00:00Z | 2025-09-30T00:00:00Z |
| va-25-272-01 | Medical Informatics Engineering Enterprise Health multiple vulnerabilities | 2025-09-29T00:00:00Z | 2025-09-29T00:00:00Z |
| icsa-25-268-01 | Dingtian DT-R002 | 2025-09-25T06:00:00.000000Z | 2025-09-25T06:00:00.000000Z |
| icsa-25-140-07 | Schneider Electric Galaxy VS, Galaxy VL, Galaxy VXL (Update A) | 2025-05-13T04:00:00.000000Z | 2025-09-24T04:00:00.000000Z |
| icsa-25-266-04 | Viessmann Vitogate 300 | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| icsa-25-266-02 | Mitsubishi Electric MELSEC-Q Series CPU Module | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| icsa-25-266-01 | AutomationDirect CLICK PLUS | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| va-25-265-01 | Airship AI MFA bypass and default credentials vulnerabilities | 2025-09-22T14:06:13Z | 2025-09-22T14:06:13Z |
| icsa-25-261-07 | Dover Fueling Solutions ProGauge MagLink LX4 Devices | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-06 | Cognex In-Sight Explorer and In-Sight Camera Firmware | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-03 | Schneider Electric Saitel DR & Saitel DP Remote Terminal Unit | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-02 | Westermo Network Technologies WeOS 5 | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-01 | Westermo Network Technologies WeOS 5 | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-254-10 | Daikin Europe N.V Security Gateway | 2025-09-11T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-191-10 | End-of-Train and Head-of-Train Remote Linking Protocol (Update C) | 2025-07-10T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-24-030-02 | Mitsubishi Electric FA Engineering Software Products (Update D) | 2024-01-30T07:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-259-07 | Delta Electronics DIALink | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-06 | Siemens Multiple Industrial Products | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-04 | Siemens RUGGEDCOM, SINEC NMS, and SINEMA | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-03 | Siemens SIMATIC NET CP, SINEMA and SCALANCE | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-02 | Hitachi Energy RTU500 series | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| va-25-259-01 | CISA Thorium multiple vulnerabilities | 2025-09-16T00:00:00Z | 2025-09-16T00:00:00Z |
| va-25-258-01 | psPAS does not enforce TLS 1.2 within Get-PASSAMLResponse | 2025-09-15T18:41:08Z | 2025-09-15T18:41:08Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-asaftd-nsgacl-bypass-77xneasl | Cisco Adaptive Security Appliance and Firepower Threat Defense Software NSG Access Control List Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-nsgacl-bypass-77XnEAsL | Cisco Adaptive Security Appliance and Firepower Threat Defense Software NSG Access Control List Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-ikev2-dos-9fgeyhsf | Cisco Adaptive Security Appliance and Firepower Threat Defense Software IKEv2 VPN Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-ikev2-dos-9FgEyHsF | Cisco Adaptive Security Appliance and Firepower Threat Defense Software IKEv2 VPN Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-dap-dos-bhekp7n | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Dynamic Access Policies Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-dap-dos-bhEkP7n | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Dynamic Access Policies Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-bf-dos-vdzhlqrw | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access VPN Brute Force Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-bf-dos-vDZhLqrW | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access VPN Brute Force Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-nyh3fhp | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access SSL VPN Authentication Targeted Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-nyH3fhp | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access SSL VPN Authentication Targeted Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-czf8gt | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access VPN Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-cZf8gT | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access VPN Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-4gyewmkg | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access SSL VPN Authentication Targeted Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-4gYEWMKg | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access SSL VPN Authentication Targeted Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-tls-cwy6zxb | Cisco Adaptive Security Appliance and Firepower Threat Defense Software TLS Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-tls-CWY6zXB | Cisco Adaptive Security Appliance and Firepower Threat Defense Software TLS Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ssh-rce-graupeuf | Cisco Adaptive Security Appliance Software SSH Remote Command Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ssh-rce-gRAuPEUF | Cisco Adaptive Security Appliance Software SSH Remote Command Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ssh-dos-eedwu5rm | Cisco Adaptive Security Appliance Software SSH Server Resource Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ssh-dos-eEDWu5RM | Cisco Adaptive Security Appliance Software SSH Server Resource Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ftd-priv-esc-hbs9gnwq | Cisco Adaptive Security Appliance and Firepower Threat Defense Software FXOS CLI Root Privilege Escalation Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ftd-priv-esc-hBS9gnwq | Cisco Adaptive Security Appliance and Firepower Threat Defense Software FXOS CLI Root Privilege Escalation Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-fmc-code-inj-wshrgz8l | Cisco Firepower Threat Defense Software and Firepower Management Center Software Code Injection Vulnerability | 2023-11-01T16:00:00+00:00 | 2024-10-23T15:57:47+00:00 |
| cisco-sa-ftd-fmc-code-inj-wSHrgz8L | Cisco Firepower Threat Defense Software and Firepower Management Center Software Code Injection Vulnerability | 2023-11-01T16:00:00+00:00 | 2024-10-23T15:57:47+00:00 |
| cisco-sa-ucsc-bkpsky-tgj5f73j | Cisco UCS Central Software Configuration Backup Information Disclosure Vulnerability | 2024-10-16T16:00:00+00:00 | 2024-10-16T16:00:00+00:00 |
| cisco-sa-ucsc-bkpsky-TgJ5f73J | Cisco UCS Central Software Configuration Backup Information Disclosure Vulnerability | 2024-10-16T16:00:00+00:00 | 2024-10-16T16:00:00+00:00 |
| cisco-sa-ccmpdm-rxss-tax76u3k | Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability | 2024-10-16T16:00:00+00:00 | 2024-10-16T16:00:00+00:00 |
| cisco-sa-ccmpdm-rxss-tAX76U3k | Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability | 2024-10-16T16:00:00+00:00 | 2024-10-16T16:00:00+00:00 |
| cisco-sa-vlan-dos-27pur5rt | Cisco Catalyst 9000 Series Switches Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-10-04T21:53:25+00:00 |
| cisco-sa-vlan-dos-27Pur5RT | Cisco Catalyst 9000 Series Switches Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-10-04T21:53:25+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-21716 | CVE-2026-21716 | 2026-03-02T00:00:00.000Z | 2026-04-09T01:40:06.000Z |
| msrc_cve-2026-21714 | CVE-2026-21714 | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:59.000Z |
| msrc_cve-2026-21713 | CVE-2026-21713 | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:52.000Z |
| msrc_cve-2026-21717 | CVE-2026-21717 | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:45.000Z |
| msrc_cve-2025-66037 | OpenSC: Out of Bounds vulnerability | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:31.000Z |
| msrc_cve-2025-66215 | OpenSC: Stack-buffer-overflow WRITE in card-oberthur | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:25.000Z |
| msrc_cve-2026-21712 | CVE-2026-21712 | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:07.000Z |
| msrc_cve-2026-34445 | ONNX: Malicious ONNX models can crash servers by exploiting unprotected object settings. | 2026-04-02T00:00:00.000Z | 2026-04-09T01:02:56.000Z |
| msrc_cve-2026-34446 | ONNX: Arbitrary File Read via ExternalData Hardlink Bypass in ONNX load | 2026-04-02T00:00:00.000Z | 2026-04-09T01:02:48.000Z |
| msrc_cve-2026-35177 | Path traversal issue with zip.vim in Vim | 2026-04-02T00:00:00.000Z | 2026-04-09T01:02:39.000Z |
| msrc_cve-2026-34982 | Vim modeline bypass via various options affects Vim < 9.2.0276 | 2026-04-02T00:00:00.000Z | 2026-04-09T01:02:34.000Z |
| msrc_cve-2026-34990 | OpenPrinting CUPS: Local print admin token disclosure using temporary printers | 2026-04-02T00:00:00.000Z | 2026-04-09T01:01:45.000Z |
| msrc_cve-2026-34980 | OpenPrinting CUPS: Shared PostScript queue lets anonymous Print-Job requests reach `lp` code execution over the network | 2026-04-02T00:00:00.000Z | 2026-04-09T01:01:40.000Z |
| msrc_cve-2026-34979 | OpenPrinting CUPS: Heap overflow in `get_options()` | 2026-04-02T00:00:00.000Z | 2026-04-09T01:01:35.000Z |
| msrc_cve-2026-34978 | OpenPrinting CUPS: Path traversal in RSS notify-recipient-uri enables file write outside CacheDir/rss (and clobbering of job.cache) | 2026-04-02T00:00:00.000Z | 2026-04-09T01:01:30.000Z |
| msrc_cve-2026-4645 | Github.com/antchfx/xpath: xpath: denial of service via crafted boolean xpath expressions | 2026-03-02T00:00:00.000Z | 2026-04-08T01:41:42.000Z |
| msrc_cve-2006-10003 | XML::Parser versions through 2.47 for Perl has an off-by-one heap buffer overflow in st_serial_stack | 2026-03-02T00:00:00.000Z | 2026-04-08T01:40:48.000Z |
| msrc_cve-2026-29785 | NATS Server panic via malicious compression on leafnode port | 2026-03-02T00:00:00.000Z | 2026-04-08T01:38:58.000Z |
| msrc_cve-2026-33216 | NATS has MQTT plaintext password disclosure | 2026-03-02T00:00:00.000Z | 2026-04-08T01:38:51.000Z |
| msrc_cve-2026-5201 | Gdk-pixbuf: gdk-pixbuf: denial of service via heap-based buffer overflow when processing a specially crafted jpeg image | 2026-03-02T00:00:00.000Z | 2026-04-08T01:38:43.000Z |
| msrc_cve-2026-33554 | CVE-2026-33554 | 2026-03-02T00:00:00.000Z | 2026-04-08T01:38:36.000Z |
| msrc_cve-2026-34714 | CVE-2026-34714 | 2026-03-02T00:00:00.000Z | 2026-04-08T01:37:47.000Z |
| msrc_cve-2026-33936 | python-ecdsa: Denial of Service via improper DER length validation in crafted private keys | 2026-03-02T00:00:00.000Z | 2026-04-08T01:36:46.000Z |
| msrc_cve-2026-31394 | mac80211: fix crash in ieee80211_chan_bw_change for AP_VLAN stations | 2026-04-02T00:00:00.000Z | 2026-04-07T14:37:49.000Z |
| msrc_cve-2026-32186 | Microsoft Bing Elevation of Privilege Vulnerability | 2026-04-02T07:00:00.000Z | 2026-04-07T07:00:00.000Z |
| msrc_cve-2026-35414 | CVE-2026-35414 | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:35.000Z |
| msrc_cve-2026-23442 | ipv6: add NULL checks for idev in SRv6 paths | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:25.000Z |
| msrc_cve-2026-23468 | drm/amdgpu: Limit BO list entry count to prevent resource exhaustion | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:20.000Z |
| msrc_cve-2026-23444 | wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:15.000Z |
| msrc_cve-2026-23472 | serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:10.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0168 | Kwetsbaarheid verholpen in FortiVoice | 2025-05-14T13:50:54.001151Z | 2025-05-14T13:50:54.001151Z |
| ncsc-2025-0167 | Kwetsbaarheden verholpen in Zoho ManageEngine | 2025-05-14T13:19:58.768414Z | 2025-05-14T13:19:58.768414Z |
| ncsc-2025-0166 | Kwetsbaarheden verholpen in Fortinet producten | 2025-05-14T08:41:08.980708Z | 2025-05-14T08:41:08.980708Z |
| ncsc-2025-0165 | Kwetsbaarheid verholpen in Adobe Illustrator | 2025-05-14T08:25:17.869407Z | 2025-05-14T08:25:17.869407Z |
| ncsc-2025-0164 | Kwetsbaarheden verholpen in Adobe Photoshop | 2025-05-14T08:24:02.186984Z | 2025-05-14T08:24:02.186984Z |
| ncsc-2025-0163 | Kwetsbaarheden verholpen in Adobe Animate | 2025-05-14T08:21:49.917725Z | 2025-05-14T08:21:49.917725Z |
| ncsc-2025-0162 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2025-05-14T08:18:54.775740Z | 2025-05-14T08:18:54.775740Z |
| ncsc-2025-0161 | Kwetsbaarheid verholpen in Ivanti Neurons for ITSM | 2025-05-14T08:16:04.867590Z | 2025-05-14T08:16:04.867590Z |
| ncsc-2025-0160 | Kwetsbaarheden verholpen in Siemens producten | 2025-05-14T07:13:32.957900Z | 2025-05-14T07:13:32.957900Z |
| ncsc-2025-0159 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-05-13T19:47:12.555983Z | 2025-05-13T19:47:12.555983Z |
| ncsc-2025-0158 | Kwetsbaarheden verholpen in Microsoft Edge | 2025-05-13T19:17:52.478234Z | 2025-05-13T19:17:52.478234Z |
| ncsc-2025-0157 | Kwetsbaarheden verholpen in Microsoft Defender | 2025-05-13T19:14:25.545635Z | 2025-05-13T19:14:25.545635Z |
| ncsc-2025-0156 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-05-13T19:10:10.012472Z | 2025-05-13T19:10:10.012472Z |
| ncsc-2025-0155 | Kwetsbaarheden verholpen in Microsoft Office | 2025-05-13T18:58:56.989073Z | 2025-05-13T18:58:56.989073Z |
| ncsc-2025-0154 | Kwetsbaarheden verholpen in Microsoft Dynamics Dataverse | 2025-05-13T18:44:03.290810Z | 2025-05-13T18:44:03.290810Z |
| ncsc-2025-0153 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-05-13T18:35:28.760017Z | 2025-05-13T18:35:28.760017Z |
| ncsc-2025-0151 | Kwetsbaarheden verholpen in Apple macOS | 2025-05-13T09:19:37.094950Z | 2025-05-13T09:19:37.094950Z |
| ncsc-2025-0150 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-05-13T09:14:44.606584Z | 2025-05-13T09:14:44.606584Z |
| ncsc-2025-0149 | Kwetsbaarheden verholpen in SAP producten | 2025-05-13T09:05:38.110295Z | 2025-05-13T09:05:38.110295Z |
| ncsc-2025-0148 | Kwetsbaarheden verholpen in ASUS DriverHub | 2025-05-12T13:22:18.034442Z | 2025-05-12T13:22:18.034442Z |
| ncsc-2025-0147 | Kwetsbaarheden verholpen in F5 BIG-IP | 2025-05-09T08:07:32.002935Z | 2025-05-09T08:07:32.002935Z |
| ncsc-2025-0146 | Kwetsbaarheden verholpen in Cisco IOS XE Software | 2025-05-08T08:43:57.415709Z | 2025-05-08T08:43:57.415709Z |
| ncsc-2025-0145 | Kwetsbaarheden verholpen in SonicWall SMA100 | 2025-05-08T08:40:26.301646Z | 2025-05-08T08:40:26.301646Z |
| ncsc-2025-0144 | Kwetsbaarheden verholpen in SysAid On-Prem | 2025-05-08T06:56:21.378830Z | 2025-05-08T06:56:21.378830Z |
| ncsc-2025-0143 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-05-07T11:19:50.517092Z | 2025-05-07T11:19:50.517092Z |
| ncsc-2025-0142 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2025-05-06T08:01:05.582708Z | 2025-05-06T08:01:05.582708Z |
| ncsc-2025-0141 | Kwetsbaarheden verholpen in Keycloak | 2025-05-06T07:12:42.075830Z | 2025-05-06T07:12:42.075830Z |
| ncsc-2025-0138 | Kwetsbaarheid verholpen in Commvault Command Center | 2025-04-24T13:09:08.399556Z | 2025-05-06T06:55:31.232567Z |
| ncsc-2025-0119 | Kwetsbaarheden verholpen in SAP-producten | 2025-04-09T09:12:05.705017Z | 2025-04-30T13:12:27.070565Z |
| ncsc-2025-0140 | Kwetsbaarheden verholpen in Apple AirPlay zoals gebruikt door macOS, iOS en iPadOS | 2025-04-30T08:45:31.426155Z | 2025-04-30T08:45:31.426155Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10289-1 | freetype2-devel-2.14.2-1.1 on GA media | 2026-03-05T00:00:00Z | 2026-03-05T00:00:00Z |
| opensuse-su-2026:20320-1 | Security update for freerdp2 | 2026-03-04T17:52:31Z | 2026-03-04T17:52:31Z |
| opensuse-su-2026:20312-1 | Security update for libxml2, libxslt | 2026-03-04T10:51:24Z | 2026-03-04T10:51:24Z |
| opensuse-su-2026:10288-1 | libblkid-devel-2.41.3-4.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10287-1 | sdbootutil-1+git20260303.90d816d-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10286-1 | ruby4.0-rubygem-rack-2.2-2.2.22-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10285-1 | python311-pillow-heif-1.3.0-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10284-1 | python311-PyPDF2-2.11.1-5.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10283-1 | python313-Django6-6.0.3-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10282-1 | python311-Django4-4.2.29-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10281-1 | mchange-commons-0.4.0-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10280-1 | incus-6.22-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10279-1 | c3p0-0.12.0-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10278-1 | ImageMagick-7.1.2.15-2.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:20308-1 | Security update for go1.24-openssl | 2026-03-03T17:46:58Z | 2026-03-03T17:46:58Z |
| opensuse-su-2026:20306-1 | Security update for expat | 2026-03-03T16:13:34Z | 2026-03-03T16:13:34Z |
| opensuse-su-2026:20305-1 | Security update for podman | 2026-03-03T16:13:34Z | 2026-03-03T16:13:34Z |
| opensuse-su-2026:20318-1 | Security update for gitea-tea | 2026-03-03T14:44:11Z | 2026-03-03T14:44:11Z |
| opensuse-su-2026:20301-1 | Security update for go1.25-openssl | 2026-03-03T09:04:46Z | 2026-03-03T09:04:46Z |
| opensuse-su-2026:20298-1 | Security update for assertj-core | 2026-03-02T16:00:38Z | 2026-03-02T16:00:38Z |
| opensuse-su-2026:20297-1 | Security update for rhino | 2026-03-02T16:00:37Z | 2026-03-02T16:00:37Z |
| opensuse-su-2026:20295-1 | Security update for cpp-httplib | 2026-03-02T10:20:20Z | 2026-03-02T10:20:20Z |
| opensuse-su-2026:10277-1 | python311-pypdf-6.7.5-1.1 on GA media | 2026-03-02T00:00:00Z | 2026-03-02T00:00:00Z |
| opensuse-su-2026:20292-1 | Security update for python-azure-core | 2026-03-01T15:59:49Z | 2026-03-01T15:59:49Z |
| opensuse-su-2026:10276-1 | libsoup-3_0-0-3.6.6-2.1 on GA media | 2026-03-01T00:00:00Z | 2026-03-01T00:00:00Z |
| opensuse-su-2026:10275-1 | gvfs-1.58.2-1.1 on GA media | 2026-03-01T00:00:00Z | 2026-03-01T00:00:00Z |
| opensuse-su-2026:20291-1 | Security update for fluidsynth | 2026-02-27T13:36:22Z | 2026-02-27T13:36:22Z |
| opensuse-su-2026:20290-1 | Security update for haproxy | 2026-02-27T13:15:21Z | 2026-02-27T13:15:21Z |
| opensuse-su-2026:20287-1 | Security update for the Linux Kernel | 2026-02-27T13:03:55Z | 2026-02-27T13:03:55Z |
| opensuse-su-2026:20283-1 | Security update for libsoup2 | 2026-02-27T08:52:33Z | 2026-02-27T08:52:33Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:23326 | Red Hat Security Advisory: skopeo security update | 2025-12-18T13:18:48+00:00 | 2026-04-17T15:17:04+00:00 |
| rhsa-2025:23325 | Red Hat Security Advisory: podman security update | 2025-12-18T13:20:27+00:00 | 2026-04-17T15:17:03+00:00 |
| rhsa-2025:23295 | Red Hat Security Advisory: podman security update | 2025-12-18T10:17:02+00:00 | 2026-04-17T15:17:03+00:00 |
| rhsa-2025:23002 | Red Hat Security Advisory: grafana security update | 2025-12-10T01:12:27+00:00 | 2026-04-17T15:17:03+00:00 |
| rhsa-2025:23294 | Red Hat Security Advisory: skopeo security update | 2025-12-18T10:13:42+00:00 | 2026-04-17T15:17:02+00:00 |
| rhsa-2025:23113 | Red Hat Security Advisory: OpenShift Container Platform 4.15.60 bug fix and security update | 2026-01-07T07:16:55+00:00 | 2026-04-17T15:17:02+00:00 |
| rhsa-2025:23088 | Red Hat Security Advisory: grafana security update | 2025-12-11T00:30:04+00:00 | 2026-04-17T15:17:00+00:00 |
| rhsa-2025:23087 | Red Hat Security Advisory: grafana security update | 2025-12-11T01:00:04+00:00 | 2026-04-17T15:17:00+00:00 |
| rhsa-2025:22759 | Red Hat Security Advisory: RHOAI 2.22.3 - Red Hat OpenShift AI | 2025-12-04T13:06:08+00:00 | 2026-04-17T15:17:00+00:00 |
| rhsa-2025:23001 | Red Hat Security Advisory: grafana security update | 2025-12-10T00:36:02+00:00 | 2026-04-17T15:16:58+00:00 |
| rhsa-2025:22899 | Red Hat Security Advisory: golang security update | 2025-12-09T08:03:20+00:00 | 2026-04-17T15:16:57+00:00 |
| rhsa-2025:22743 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.6.1 | 2025-12-04T09:52:50+00:00 | 2026-04-17T15:16:55+00:00 |
| rhsa-2025:22738 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.5.2 | 2025-12-04T08:53:28+00:00 | 2026-04-17T15:16:55+00:00 |
| rhsa-2025:22668 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2025-12-03T14:58:33+00:00 | 2026-04-17T15:16:53+00:00 |
| rhsa-2025:22345 | Red Hat Security Advisory: Red Hat OpenShift Developer Tools - Source-to-Image 1.5.2 | 2025-11-27T22:06:09+00:00 | 2026-04-17T15:16:52+00:00 |
| rhsa-2025:22275 | Red Hat Security Advisory: OpenShift Container Platform 4.13.62 bug fix and security update | 2025-12-05T13:28:34+00:00 | 2026-04-17T15:16:50+00:00 |
| rhsa-2025:22255 | Red Hat Security Advisory: OpenShift Container Platform 4.20.6 packages and security update | 2025-12-02T14:45:43+00:00 | 2026-04-17T15:16:49+00:00 |
| rhsa-2025:22181 | Red Hat Security Advisory: golang security update | 2025-11-26T15:05:54+00:00 | 2026-04-17T15:16:48+00:00 |
| rhsa-2025:22030 | Red Hat Security Advisory: podman security update | 2025-11-25T08:02:25+00:00 | 2026-04-17T15:16:47+00:00 |
| rhsa-2025:22012 | Red Hat Security Advisory: buildah security update | 2025-11-25T05:03:24+00:00 | 2026-04-17T15:16:46+00:00 |
| rhsa-2025:22011 | Red Hat Security Advisory: buildah security update | 2025-11-25T05:23:44+00:00 | 2026-04-17T15:16:45+00:00 |
| rhsa-2025:21964 | Red Hat Security Advisory: buildah security update | 2025-11-24T15:01:52+00:00 | 2026-04-17T15:16:44+00:00 |
| rhsa-2025:21856 | Red Hat Security Advisory: golang security update | 2025-11-20T15:48:22+00:00 | 2026-04-17T15:16:43+00:00 |
| rhsa-2025:21824 | Red Hat Security Advisory: OpenShift Container Platform 4.16.53 bug fix and security update | 2025-11-27T11:08:51+00:00 | 2026-04-17T15:16:42+00:00 |
| rhsa-2025:21816 | Red Hat Security Advisory: delve and golang security update | 2025-11-20T06:24:08+00:00 | 2026-04-17T15:16:41+00:00 |
| rhsa-2025:21815 | Red Hat Security Advisory: delve and golang security update | 2025-11-20T08:45:31+00:00 | 2026-04-17T15:16:40+00:00 |
| rhsa-2025:21795 | Red Hat Security Advisory: OpenShift Container Platform 4.18.29 bug fix and security update | 2025-11-27T04:24:21+00:00 | 2026-04-17T15:16:39+00:00 |
| rhsa-2025:21778 | Red Hat Security Advisory: golang security update | 2025-11-20T00:35:26+00:00 | 2026-04-17T15:16:38+00:00 |
| rhsa-2025:21779 | Red Hat Security Advisory: golang security update | 2025-11-20T00:22:25+00:00 | 2026-04-17T15:16:37+00:00 |
| rhsa-2025:21702 | Red Hat Security Advisory: podman security update | 2025-11-18T15:34:16+00:00 | 2026-04-17T15:16:34+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| SSA-599968 | SSA-599968: Denial of Service Vulnerability in Profinet Devices | 2021-07-13T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| SSA-566905 | SSA-566905: Multiple Denial of Service Vulnerabilities in the Webserver of Industrial Products | 2023-04-11T00:00:00Z | 2024-09-10T00:00:00Z |
| SSA-540640 | SSA-540640: Improper Privilege Management Vulnerability in Mendix Runtime | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-482757 | SSA-482757: Missing Immutable Root of Trust in S7-1500 CPU devices | 2023-01-10T00:00:00Z | 2025-01-14T00:00:00Z |
| SSA-481506 | SSA-481506: Information Disclosure Vulnerability in SIMATIC S7-200 SMART Devices | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-446448 | SSA-446448: Denial of Service Vulnerability in PROFINET Stack Integrated on Interniche Stack | 2022-04-12T00:00:00Z | 2025-01-14T00:00:00Z |
| SSA-407785 | SSA-407785: Multiple X_T File Parsing Vulnerabilities in Parasolid and Teamcenter Visualization | 2023-08-08T00:00:00Z | 2024-08-13T00:00:00Z |
| SSA-398330 | SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP >= V3.1.0 and < V3.1.5 | 2023-12-12T00:00:00Z | 2025-08-12T00:00:00Z |
| SSA-353002 | SSA-353002: Multiple Vulnerabilities in SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family | 2024-03-12T00:00:00Z | 2025-08-12T00:00:00Z |
| SSA-341067 | SSA-341067: Multiple vulnerabilities in third-party components in ST7 ScadaConnect before V1.1 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-337522 | SSA-337522: Multiple Vulnerabilities in TIM 1531 IRC before V2.4.8 | 2024-06-11T00:00:00Z | 2024-07-09T00:00:00Z |
| SSA-319319 | SSA-319319: Denial of Service Vulnerability in TIA Administrator | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-238730 | SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-196737 | SSA-196737: Multiple Vulnerabilities in SINEC Traffic Analyzer Before V1.2 | 2024-06-11T00:00:00Z | 2025-02-11T00:00:00Z |
| SSA-093430 | SSA-093430: Multiple Vulnerabilities in SIMATIC RTLS Locating Manager before V3.0 | 2024-05-14T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-035466 | SSA-035466: Incorrect Permission Assignment in SICAM PAS/PQS | 2023-10-10T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-024584 | SSA-024584: Authentication Bypass Vulnerability in PowerSys before V3.11 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-976324 | SSA-976324: Multiple IGS File Parsing Vulnerabilities in PS/IGES Parasolid Translator Component before V27.1.215 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-968170 | SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products | 2023-06-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-953710 | SSA-953710: Vulnerabilities in the Network Communication Stack in Desigo Fire Safety UL and Cerberus PRO UL Fire Protection Systems | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-925850 | SSA-925850: Improper Access Control in Polarion ALM | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-923361 | SSA-923361: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0011 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-916916 | SSA-916916: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.5 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-871717 | SSA-871717: Multiple Vulnerabilities in Polarion ALM | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-665034 | SSA-665034: Vulnerability in Nozomi Guardian/CMC before 23.3.0 on RUGGEDCOM APE1808 devices | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-661579 | SSA-661579: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-647455 | SSA-647455: Multiple Vulnerabilities in Nozomi Guardian/CMC before 22.6.2 on RUGGEDCOM APE1808 devices | 2023-10-10T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-592380 | SSA-592380: Denial of Service Vulnerability in SIMATIC S7-1500 CPUs and related products | 2023-12-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-589937 | SSA-589937: Multiple Memory Corruption Vulnerabilities in Solid Edge | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-489698 | SSA-489698: X_T File Parsing Vulnerability in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20879-1 | Security update for python-PyJWT | 2026-03-26T08:57:07Z | 2026-03-26T08:57:07Z |
| suse-su-2026:1048-1 | Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) | 2026-03-26T04:34:10Z | 2026-03-26T04:34:10Z |
| suse-su-2026:1049-1 | Security update for the Linux Kernel (Live Patch 25 for SUSE Linux Enterprise 15 SP5) | 2026-03-26T01:34:07Z | 2026-03-26T01:34:07Z |
| suse-su-2026:1046-1 | Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4) | 2026-03-25T19:34:09Z | 2026-03-25T19:34:09Z |
| suse-su-2026:20947-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-03-25T18:18:29Z | 2026-03-25T18:18:29Z |
| suse-su-2026:20842-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-03-25T18:18:29Z | 2026-03-25T18:18:29Z |
| suse-su-2026:20945-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-03-25T18:10:41Z | 2026-03-25T18:10:41Z |
| suse-su-2026:20840-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-03-25T18:10:41Z | 2026-03-25T18:10:41Z |
| suse-su-2026:20946-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-03-25T18:10:07Z | 2026-03-25T18:10:07Z |
| suse-su-2026:20841-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-03-25T18:10:07Z | 2026-03-25T18:10:07Z |
| suse-su-2026:20934-1 | Security update for python-PyJWT | 2026-03-25T18:08:28Z | 2026-03-25T18:08:28Z |
| suse-su-2026:20839-1 | Security update for python-PyJWT | 2026-03-25T18:08:28Z | 2026-03-25T18:08:28Z |
| suse-su-2026:1045-1 | Security update for the Linux Kernel (Live Patch 77 for SUSE Linux Enterprise 12 SP5) | 2026-03-25T18:04:47Z | 2026-03-25T18:04:47Z |
| suse-su-2026:1044-1 | Security update for the Linux Kernel (Live Patch 70 for SUSE Linux Enterprise 12 SP5) | 2026-03-25T17:54:43Z | 2026-03-25T17:54:43Z |
| suse-su-2026:1041-1 | Security update for the Linux Kernel | 2026-03-25T14:13:20Z | 2026-03-25T14:13:20Z |
| suse-su-2026:1040-1 | Security update for systemd | 2026-03-25T12:43:09Z | 2026-03-25T12:43:09Z |
| suse-su-2026:1039-1 | Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5) | 2026-03-25T12:34:25Z | 2026-03-25T12:34:25Z |
| suse-su-2026:20933-1 | Security update for python-ldap | 2026-03-25T10:48:13Z | 2026-03-25T10:48:13Z |
| suse-su-2026:1037-1 | Security update for grafana | 2026-03-25T10:31:04Z | 2026-03-25T10:31:04Z |
| suse-su-2026:1030-1 | Security update for salt | 2026-03-25T10:17:20Z | 2026-03-25T10:17:20Z |
| suse-su-2026:1029-1 | Security update for salt | 2026-03-25T10:16:49Z | 2026-03-25T10:16:49Z |
| suse-su-2026:1028-1 | Security update for salt | 2026-03-25T10:16:17Z | 2026-03-25T10:16:17Z |
| suse-su-2026:1027-1 | Security update for salt | 2026-03-25T10:15:43Z | 2026-03-25T10:15:43Z |
| suse-su-2026:1026-1 | Security update 5.0.7 for Multi-Linux Manager Salt Bundle | 2026-03-25T10:15:30Z | 2026-03-25T10:15:30Z |
| suse-su-2026:1014-1 | Security update 5.0.7 for Multi-Linux Manager Salt Bundle | 2026-03-25T10:12:32Z | 2026-03-25T10:12:32Z |
| suse-su-2026:1013-1 | Security update 5.0.7 for Multi-Linux Manager Client Tools | 2026-03-25T10:11:52Z | 2026-03-25T10:11:52Z |
| suse-su-2026:1012-1 | Security update 5.0.7 for Multi-Linux Manager Salt Bundle | 2026-03-25T10:10:54Z | 2026-03-25T10:10:54Z |
| suse-su-2026:1011-1 | Security update 5.0.7 for Multi-Linux Manager Client Tools | 2026-03-25T10:10:31Z | 2026-03-25T10:10:31Z |
| suse-su-2026:1010-1 | Security update 5.0.7 for Multi-Linux Manager Server | 2026-03-25T10:10:02Z | 2026-03-25T10:10:02Z |
| suse-su-2026:1008-1 | Security update for Prometheus | 2026-03-25T10:07:27Z | 2026-03-25T10:07:27Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:1086 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-26T13:16:32Z |
| alsa-2026:0928 | Important: java-21-openjdk security update | 2026-01-22T00:00:00Z | 2026-01-26T11:04:56Z |
| alsa-2026:0914 | Important: gimp security update | 2026-01-21T00:00:00Z | 2026-01-26T10:10:46Z |
| alsa-2026:0921 | Important: go-toolset:rhel8 security update | 2026-01-21T00:00:00Z | 2026-01-26T10:07:11Z |
| alsa-2026:0696 | Important: net-snmp security update | 2026-01-15T00:00:00Z | 2026-01-26T10:04:02Z |
| alsa-2026:0923 | Important: golang security update | 2026-01-21T00:00:00Z | 2026-01-24T01:54:58Z |
| alsa-2026:0927 | Important: java-17-openjdk security update | 2026-01-22T00:00:00Z | 2026-01-24T01:52:06Z |
| alsa-2026:0924 | Important: thunderbird security update | 2026-01-21T00:00:00Z | 2026-01-24T01:47:12Z |
| alsa-2026:0930 | Moderate: pcs security update | 2026-01-21T00:00:00Z | 2026-01-24T01:46:11Z |
| alsa-2026:0936 | Moderate: glib2 security update | 2026-01-21T00:00:00Z | 2026-01-24T01:44:09Z |
| alsa-2026:0991 | Moderate: glib2 security update | 2026-01-22T00:00:00Z | 2026-01-24T01:40:03Z |
| alsa-2026:0922 | Important: golang security update | 2026-01-21T00:00:00Z | 2026-01-23T23:39:55Z |
| alsa-2026:0975 | Moderate: glib2 security update | 2026-01-22T00:00:00Z | 2026-01-23T23:34:09Z |
| alsa-2026:0793 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-23T13:22:18Z |
| alsa-2026:0786 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-23T07:53:26Z |
| alsa-2026:0770 | Important: gpsd security update | 2026-01-19T00:00:00Z | 2026-01-21T10:46:37Z |
| alsa-2026:0845 | Important: brotli security update | 2026-01-20T00:00:00Z | 2026-01-21T10:45:25Z |
| alsa-2026:0753 | Important: container-tools:rhel8 security update | 2026-01-19T00:00:00Z | 2026-01-21T09:07:00Z |
| alsa-2026:0752 | Important: jmc security update | 2026-01-19T00:00:00Z | 2026-01-20T11:59:21Z |
| alsa-2026:0771 | Important: gpsd-minimal security update | 2026-01-19T00:00:00Z | 2026-01-20T11:54:05Z |
| alsa-2026:0760 | Important: kernel-rt security update | 2026-01-19T00:00:00Z | 2026-01-20T08:13:58Z |
| alsa-2026:0759 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-20T08:07:16Z |
| alsa-2026:0750 | Important: net-snmp security update | 2026-01-19T00:00:00Z | 2026-01-20T07:38:35Z |
| alsa-2026:0756 | Moderate: transfig security update | 2026-01-19T00:00:00Z | 2026-01-19T10:24:15Z |
| alsa-2026:0492 | Moderate: postgresql:15 security update | 2026-01-13T00:00:00Z | 2026-01-19T10:02:02Z |
| alsa-2026:0493 | Moderate: postgresql:16 security update | 2026-01-13T00:00:00Z | 2026-01-19T09:45:22Z |
| alsa-2026:0436 | Important: buildah security update | 2026-01-12T00:00:00Z | 2026-01-16T15:50:15Z |
| alsa-2026:0423 | Important: libsoup3 security update | 2026-01-12T00:00:00Z | 2026-01-16T15:49:08Z |
| alsa-2026:0422 | Important: libsoup security update | 2026-01-12T00:00:00Z | 2026-01-16T15:46:52Z |
| alsa-2026:0421 | Important: libsoup security update | 2026-01-12T00:00:00Z | 2026-01-16T15:44:34Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-584 | Heap-buffer-overflow in isvcd_mark_err_slice_skip | 2025-07-31T00:09:08.538145Z | 2025-07-31T00:09:08.538507Z |
| osv-2025-93 | Heap-buffer-overflow in lj_strfmt_pushvf | 2025-02-05T00:18:14.584575Z | 2025-07-23T14:24:29.384461Z |
| osv-2025-249 | Heap-use-after-free in lj_strfmt_pushvf | 2025-04-02T00:09:53.120387Z | 2025-07-23T14:23:01.826780Z |
| osv-2025-267 | Stack-buffer-overflow in snap_usedef | 2025-04-08T00:17:16.034122Z | 2025-07-23T14:22:40.655455Z |
| osv-2025-570 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-07-23T00:17:34.356115Z | 2025-07-23T00:17:34.356449Z |
| osv-2023-838 | Use-of-uninitialized-value in wabt::BinaryReaderIR::OnOpcode | 2023-09-12T14:01:08.316035Z | 2025-07-22T14:22:12.701561Z |
| osv-2025-564 | Heap-buffer-overflow in ndpi_match_host_subprotocol | 2025-07-21T00:03:40.000875Z | 2025-07-21T00:03:40.001170Z |
| osv-2025-550 | Use-of-uninitialized-value in CFF::cff2_cs_opset_t<cff2_cs_opset_subr_subset_t, CFF::subr_subset_param_t, CFF: | 2025-07-16T00:09:08.050994Z | 2025-07-16T00:09:08.051469Z |
| osv-2025-544 | Heap-buffer-overflow in N_BELE_RTP::LEPolicy::get32 | 2025-07-11T00:16:53.687776Z | 2025-07-11T00:16:53.688703Z |
| osv-2025-542 | Use-of-uninitialized-value in httpEncode64_3 | 2025-07-10T00:07:45.698070Z | 2025-07-10T00:07:45.698655Z |
| osv-2025-541 | Heap-buffer-overflow in js_create_function | 2025-07-09T00:20:09.455729Z | 2025-07-09T00:20:09.456170Z |
| osv-2025-534 | Heap-use-after-free in ih264_inter_pred_luma_horz_ssse3 | 2025-07-08T00:08:11.218515Z | 2025-07-08T00:08:11.218991Z |
| osv-2025-530 | Invalid-free in cli_pdf | 2025-07-07T00:17:21.884018Z | 2025-07-07T00:17:21.884367Z |
| osv-2025-528 | Heap-buffer-overflow in xmlnode_parser_structural_error_libxml | 2025-07-07T00:10:42.902465Z | 2025-07-07T00:10:42.902766Z |
| osv-2025-525 | UNKNOWN READ in std::__1::__function::__func<cv::PngDecoder::compose_frame | 2025-07-06T00:18:54.304371Z | 2025-07-06T00:18:54.304891Z |
| osv-2022-1276 | Stack-buffer-overflow in ntlm_phase_3 | 2023-06-15T14:01:52.594793Z | 2025-07-05T14:11:24.654963Z |
| osv-2025-524 | Heap-buffer-overflow in JS_CallInternal | 2025-07-05T00:19:21.758513Z | 2025-07-05T00:19:21.758880Z |
| osv-2025-515 | Use-of-uninitialized-value in JS_DefineProperty | 2025-07-03T00:16:17.481972Z | 2025-07-03T00:16:17.482410Z |
| osv-2025-512 | Invalid-free in pdf_decodestream | 2025-07-03T00:00:40.745577Z | 2025-07-03T00:00:40.746200Z |
| osv-2024-440 | UNKNOWN READ | 2024-05-07T00:06:11.033336Z | 2025-07-01T14:30:06.613574Z |
| osv-2024-396 | UNKNOWN READ in jvp_object_free | 2024-05-01T00:11:24.552935Z | 2025-07-01T14:29:52.935440Z |
| osv-2022-785 | Heap-buffer-overflow in resize_packet | 2022-08-27T00:00:14.614126Z | 2025-07-01T14:25:29.517657Z |
| osv-2022-572 | Heap-buffer-overflow in dhcp_reply | 2022-07-12T00:00:45.818288Z | 2025-07-01T14:24:05.029738Z |
| osv-2022-1101 | UNKNOWN READ in APFSBtreeNodeIterator<APFSJObjBtreeNode> APFSJObjBtreeNode::find<unsigned long, | 2022-10-28T00:00:27.714849Z | 2025-06-29T14:11:11.919343Z |
| osv-2025-500 | UNKNOWN READ in getUShort | 2025-06-29T00:08:49.553890Z | 2025-06-29T00:08:49.554520Z |
| osv-2023-225 | Heap-buffer-overflow in std::__1::enable_if<true, void>::type APFSBtreeNodeIterator<APFSBtreeNode<apfs_o | 2023-03-24T13:02:18.004510Z | 2025-06-28T14:26:09.281381Z |
| osv-2022-1106 | Heap-buffer-overflow in APFSJObject::add_entry | 2022-10-28T00:02:37.921684Z | 2025-06-28T14:21:48.859764Z |
| osv-2025-491 | Heap-buffer-overflow in libssl.soNUMBER | 2025-06-27T00:16:09.822144Z | 2025-06-27T00:16:09.822510Z |
| osv-2025-486 | Bad-cast to cv::PngDecoder from invalid vptr | 2025-06-24T00:16:24.786334Z | 2025-06-24T00:16:24.786690Z |
| osv-2025-485 | Use-of-uninitialized-value in pcpp::IDnsResource::decodeName | 2025-06-24T00:11:04.762139Z | 2025-06-24T00:11:04.762681Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0440 | Runtime crash when combining tail calls with stack traces | 2024-10-02T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0439 | Race condition could lead to WebAssembly control-flow integrity and type safety violations | 2024-10-03T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0438 | Wasmtime doesn't fully sandbox all the Windows device filenames | 2024-11-02T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2023-0093 | Miscompilation of `i8x16.select` with the same inputs on x86\_64 | 2023-03-03T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2023-0092 | Undefined Behavior in Rust runtime functions | 2023-04-21T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2023-0091 | Miscompilation of wasm `i64x2.shr_s` instruction with constant input on x86\_64 | 2023-09-05T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2023-0090 | Guest-controlled out-of-bounds read/write on x86\_64 | 2023-03-02T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0102 | Out of bounds read/write with zero-memory-pages configuration | 2022-11-05T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0100 | Use After Free with `externref`s in Wasmtime | 2022-07-12T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0099 | Use after free with `externref`s and epoch interruption in Wasmtime | 2022-03-28T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0098 | Data leakage between instances in the pooling allocator | 2022-11-05T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0097 | Out of bounds write in `wasmtime_trap_code` C API function | 2022-11-07T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0095 | Miscompilation of `i8x16.swizzle` and `select` with v128 inputs | 2022-06-27T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2023-0089 | atomic-polyfill is unmaintained | 2023-07-11T12:00:00Z | 2025-04-29T08:31:10Z |
| rustsec-2025-0026 | registry is unmaintained | 2025-01-13T12:00:00Z | 2025-04-29T08:11:21Z |
| rustsec-2025-0025 | rustc-serialize is unmaintained | 2025-04-28T12:00:00Z | 2025-04-28T13:38:14Z |
| rustsec-2022-0044 | `markdown` (1.0.0 and higher) is maintained | 2022-01-17T12:00:00Z | 2025-04-28T10:35:27Z |
| rustsec-2025-0021 | SHA-1 collision attacks are not detected | 2025-04-03T12:00:00Z | 2025-04-08T07:10:04Z |
| rustsec-2025-0017 | The `trust-dns` project has been rebranded to `hickory-dns` | 2025-03-23T12:00:00Z | 2025-03-23T07:00:21Z |
| rustsec-2025-0014 | humantime is unmaintained | 2025-03-08T12:00:00Z | 2025-03-13T00:41:50Z |
| rustsec-2025-0013 | resolve is unmaintained | 2025-02-21T12:00:00Z | 2025-03-07T15:52:15Z |
| rustsec-2025-0011 | `openpgp-card-sequoia` is unmaintained. | 2025-03-04T12:00:00Z | 2025-03-07T15:47:21Z |
| rustsec-2025-0010 | Versions of *ring* prior to 0.17 are unmaintained. | 2025-03-05T12:00:00Z | 2025-03-07T15:46:47Z |
| rustsec-2025-0007 | *ring* is unmaintained | 2025-02-20T12:00:00Z | 2025-03-06T21:16:59Z |
| rustsec-2021-0087 | columnar: `Read` on uninitialized buffer may cause UB (ColumnarReadExt::read_typed_vec()) | 2021-01-07T12:00:00Z | 2025-02-01T00:07:11Z |
| rustsec-2025-0001 | gix-worktree-state nonexclusive checkout sets executable files world-writable | 2025-01-18T12:00:00Z | 2025-01-22T17:11:51Z |
| rustsec-2024-0434 | Missing facility to signal rotation of a verified cryptographic identity | 2024-01-07T12:00:00Z | 2025-01-22T10:27:39Z |
| rustsec-2024-0359 | The kstring integration in gix-attributes is unsound | 2024-07-24T12:00:00Z | 2025-01-19T00:36:24Z |
| rustsec-2024-0433 | Malicious plugin names, recipients, or identities can cause arbitrary binary execution | 2024-12-18T12:00:00Z | 2025-01-03T18:23:54Z |
| rustsec-2024-0432 | Malicious plugin names, recipients, or identities can cause arbitrary binary execution | 2024-12-18T12:00:00Z | 2025-01-03T18:23:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-parse-2026-32242 | Parse Server OAuth2 adapter shares mutable state across providers via singleton instance | 2026-03-16T09:53:39.413Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-31828 | Parse Server has an LDAP injection via unsanitized user input in DN and group filter construction | 2026-03-12T14:48:18.251Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-31800 | Parse Server: Classes `_GraphQLConfig` and `_Audience` master key bypass via generic class routes | 2026-03-12T14:48:16.613Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30972 | Parse Server has a rate limit bypass via batch request endpoint | 2026-03-12T14:48:14.900Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30967 | Parse Server OAuth2 authentication adapter account takeover via identity spoofing | 2026-03-12T14:48:13.390Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30966 | Parse Server role escalation and CLP bypass via direct `_Join` table write | 2026-03-12T14:48:11.522Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30965 | Parse Server session token exfiltration via `redirectClassNameForKey` query parameter | 2026-03-12T14:48:09.696Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30962 | Parse Server has a protected fields bypass via logical query operators | 2026-03-12T14:48:07.977Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30949 | Parse Server is missing audience validation in Keycloak authentication adapter | 2026-03-12T14:48:06.075Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30948 | Parse Server has stored cross-site scripting (XSS) via SVG file upload | 2026-03-12T14:48:04.274Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30947 | Parse Server ha a bypass of class-level permissions in LiveQuery | 2026-03-12T14:48:02.496Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30946 | Parse Server affected by denial-of-service via unbounded query complexity in REST and GraphQL API | 2026-03-12T14:48:00.783Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30941 | Parse Server has a NoSQL injection via token type in password reset and email verification endpoints | 2026-03-12T14:47:58.977Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30939 | Parse Server has Denial of Service (DoS) and Cloud Function Dispatch Bypass via Prototype Chain Resolution | 2026-03-12T14:47:57.281Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30938 | Parse Server has denylist `requestKeywordDenylist` keyword scan bypass through nested object placement | 2026-03-12T14:47:55.401Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30925 | Parse Server affected by Regular Expression Denial of Service (ReDoS) via `$regex` query in LiveQuery | 2026-03-12T14:47:53.415Z | 2026-03-20T09:47:33.381Z |
| bit-nifi-2023-49145 | Apache NiFi: Improper Neutralization of Input in Advanced User Interface for Jolt | 2025-09-12T11:47:03.168Z | 2026-03-20T09:47:33.381Z |
| bit-mongodb-2020-7925 | Denial of Service when processing malformed Role names | 2024-03-06T10:58:54.976Z | 2026-03-20T09:47:33.381Z |
| bit-mongodb-2020-7923 | Specific GeoQuery can cause DoS against MongoDB Server | 2024-03-06T10:59:03.972Z | 2026-03-20T09:47:33.381Z |
| bit-mastodon-2025-67500 | Mastodon Error Handling Discrepancy Enables Private Status Existence Enumeration | 2025-12-11T11:41:16.693Z | 2026-03-20T09:47:33.381Z |
| bit-mastodon-2025-62605 | Mastodon quotes control can be bypassed | 2025-10-23T08:44:09.997Z | 2026-03-20T09:47:33.381Z |
| bit-mastodon-2023-42452 | Mastodon vulnerable to Stored XSS through the translation feature | 2024-03-06T10:55:46.292Z | 2026-03-20T09:47:33.381Z |
| bit-mastodon-2023-42451 | Mastodon Invalid Domain Name Normalization vulnerability | 2024-03-06T10:55:56.068Z | 2026-03-20T09:47:33.381Z |
| bit-magento-2022-42344 | [CVE-2021-36032] Magento IDOR Leads to Account Takeover | 2024-03-06T10:55:33.798Z | 2026-03-20T09:47:33.381Z |
| bit-magento-2021-36036 | Magento Commerce Media Gallery Upload Improper Access Control Could Lead To Remote Code Execution | 2024-03-06T10:57:23.602Z | 2026-03-20T09:47:33.381Z |
| bit-magento-2021-36023 | Magento Commerce Widgets Update Layout XML Injection Vulnerability Could Lead To Remote Code Execution | 2024-03-06T10:57:34.606Z | 2026-03-20T09:47:33.381Z |
| bit-magento-2021-36021 | Magento Commerce CMS Page Improper Input Validation Could Lead To Remote Code Execution | 2024-03-06T10:57:45.085Z | 2026-03-20T09:47:33.381Z |
| bit-magento-2021-28585 | Magento Commerce improper input validation in customer customer webapi | 2024-03-06T10:58:00.077Z | 2026-03-20T09:47:33.381Z |
| bit-magento-2021-28584 | Magento Commerce path traversal vulnerability in child theme store creation | 2024-03-06T10:58:13.389Z | 2026-03-20T09:47:33.381Z |
| bit-magento-2021-28583 | Magento Commerce insecure storage of sensitive documentation | 2024-03-06T10:58:23.464Z | 2026-03-20T09:47:33.381Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-yw12690 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-27T01:01:12.144914Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-xz04425 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-27T00:43:38.553069Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-wp10148 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-27T00:57:40.231450Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-qc30410 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-27T01:01:12.325618Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-ny12442 | node-tar is a full-featured Tar for Node | 2026-02-27T00:41:38.733387Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-ls98939 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-27T01:04:10.463954Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-jy06700 | vulnerability has been identified in Node | 2026-02-27T01:09:46.914639Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-id51598 | Cancelling a query (e | 2026-02-27T01:01:11.850782Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-hf45264 | filippo | 2026-02-27T01:03:40.135210Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-ff98917 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-27T00:51:38.790691Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-er93728 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-27T00:46:38.846728Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-dz05206 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-27T01:00:40.158214Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-aj16639 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-27T00:53:09.299313Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-ac12204 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-27T00:54:09.647466Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-vu62737 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-26T00:41:56.473097Z | 2026-02-25T07:34:17Z |
| cleanstart-2026-kk99760 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-26T00:41:27.004859Z | 2026-02-25T07:34:17Z |
| cleanstart-2026-dc63423 | Within HostnameError | 2026-02-26T00:40:26.756005Z | 2026-02-25T07:34:17Z |
| cleanstart-2026-zs11519 | Security fixes for GHSA-vc5p-v9hr-52mj applied in versions: 4.1.1-r0 | 2026-02-25T00:49:13.663387Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-xk29348 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 8.4.0-r0 | 2026-02-25T00:39:11.477214Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-wk32717 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-25T00:52:13.178542Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-vz85637 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-25T00:50:42.986205Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-vi85055 | Within HostnameError | 2026-02-25T00:51:12.873948Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-uq43569 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-25T00:44:12.116432Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-uk11127 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-25T00:52:43.391940Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-rh10099 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-02-25T00:43:12.068903Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-rd09851 | net/url package does not set a limit on the number of query parameters in a query | 2026-02-25T00:53:44.039015Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-pm90259 | Cancelling a query (e | 2026-02-25T00:50:43.010672Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-oo47906 | Security fixes for GHSA-VC5P-V9HR-52MJ applied in versions: 4.1.1-r0 | 2026-02-25T00:49:14.177631Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-oa82425 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-25T00:44:42.034173Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-lo42921 | Within HostnameError | 2026-02-25T00:42:42.699243Z | 2026-02-24T09:23:19Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2014-ale-011 | Vulnérabilité de l'implémentation Kerberos dans Microsoft Windows | 2014-11-18T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-010 | Vulnérabilité de l'implémentation des protocoles SSL/TLS dans Microsoft Windows | 2014-11-11T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-008 | Vulnérabilité dans Drupal | 2014-10-16T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2015-ALE-001 | Vulnérabilité dans Adobe Flash Player | 2015-01-22T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2014-ALE-011 | Vulnérabilité de l'implémentation Kerberos dans Microsoft Windows | 2014-11-18T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2014-ALE-010 | Vulnérabilité de l'implémentation des protocoles SSL/TLS dans Microsoft Windows | 2014-11-11T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2014-ALE-008 | Vulnérabilité dans Drupal | 2014-10-16T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-009 | Vulnérabilité dans Microsoft OLE | 2014-10-22T00:00:00.000000 | 2014-11-12T00:00:00.000000 |
| CERTFR-2014-ALE-009 | Vulnérabilité dans Microsoft OLE | 2014-10-22T00:00:00.000000 | 2014-11-12T00:00:00.000000 |
| certfr-2014-ale-007 | Vulnérabilité dans SSLv3 | 2014-10-15T00:00:00.000000 | 2014-10-15T00:00:00.000000 |
| CERTFR-2014-ALE-007 | Vulnérabilité dans SSLv3 | 2014-10-15T00:00:00.000000 | 2014-10-15T00:00:00.000000 |
| certfr-2014-ale-006 | Vulnérabilité dans GNU bash | 2014-09-25T00:00:00.000000 | 2014-09-30T00:00:00.000000 |
| CERTFR-2014-ALE-006 | Vulnérabilité dans GNU bash | 2014-09-25T00:00:00.000000 | 2014-09-30T00:00:00.000000 |
| certfr-2014-ale-003 | Vulnérabilité dans OpenSSL | 2014-04-08T00:00:00.000000 | 2014-07-30T00:00:00.000000 |
| CERTFR-2014-ALE-003 | Vulnérabilité dans OpenSSL | 2014-04-08T00:00:00.000000 | 2014-07-30T00:00:00.000000 |
| certfr-2014-ale-005 | Vulnérabilité dans Microsoft Internet Explorer | 2014-04-28T00:00:00.000000 | 2014-05-02T00:00:00.000000 |
| CERTFR-2014-ALE-005 | Vulnérabilité dans Microsoft Internet Explorer | 2014-04-28T00:00:00.000000 | 2014-05-02T00:00:00.000000 |
| certfr-2014-ale-004 | Vulnérabilité dans Apache Struts | 2014-04-25T00:00:00.000000 | 2014-04-29T00:00:00.000000 |
| CERTFR-2014-ALE-004 | Vulnérabilité dans Apache Struts | 2014-04-25T00:00:00.000000 | 2014-04-29T00:00:00.000000 |
| certfr-2014-ale-002 | Vulnérabilité dans Microsoft Word | 2014-03-25T00:00:00.000000 | 2014-04-09T00:00:00.000000 |
| CERTFR-2014-ALE-002 | Vulnérabilité dans Microsoft Word | 2014-03-25T00:00:00.000000 | 2014-04-09T00:00:00.000000 |
| certfr-2014-ale-001 | Vulnérabilité dans Microsoft Internet Explorer | 2014-02-21T00:00:00.000000 | 2014-03-12T00:00:00.000000 |
| CERTFR-2014-ALE-001 | Vulnérabilité dans Microsoft Internet Explorer | 2014-02-21T00:00:00.000000 | 2014-03-12T00:00:00.000000 |
| certa-2013-ale-008 | Vulnérabilité critique dans le noyau de Microsoft Windows | 2013-11-28T00:00:00.000000 | 2014-01-16T00:00:00.000000 |
| CERTA-2013-ALE-008 | Vulnérabilité critique dans le noyau de Microsoft Windows | 2013-11-28T00:00:00.000000 | 2014-01-16T00:00:00.000000 |
| certa-2013-ale-007 | Vulnérabilité dans un composant graphique de Microsoft | 2013-11-06T00:00:00.000000 | 2013-12-10T00:00:00.000000 |
| CERTA-2013-ALE-007 | Vulnérabilité dans un composant graphique de Microsoft | 2013-11-06T00:00:00.000000 | 2013-12-10T00:00:00.000000 |
| certa-2013-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2013-09-18T00:00:00.000000 | 2013-10-09T00:00:00.000000 |
| CERTA-2013-ALE-006 | Vulnérabilité dans Microsoft Internet Explorer | 2013-09-18T00:00:00.000000 | 2013-10-09T00:00:00.000000 |
| certa-2005-ale-013 | Vulnérabilité dans Citrix Metaframe Presentation | 2005-10-07T00:00:00.000000 | 2013-06-06T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2026-AVI-0138 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| CERTFR-2026-AVI-0137 | Multiples vulnérabilités dans GnuTLS | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| CERTFR-2026-AVI-0133 | Multiples vulnérabilités dans Roundcube | 2026-02-09T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0136 | Vulnérabilité dans Fortinet FortiClientEMS | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0135 | Vulnérabilité dans GitLab AI Gateway | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0134 | Vulnérabilité dans Microsoft Edge | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0132 | Multiples vulnérabilités dans VMware Tanzu Greenplum | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| CERTFR-2026-AVI-0136 | Vulnérabilité dans Fortinet FortiClientEMS | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| CERTFR-2026-AVI-0135 | Vulnérabilité dans GitLab AI Gateway | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| CERTFR-2026-AVI-0134 | Vulnérabilité dans Microsoft Edge | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| CERTFR-2026-AVI-0132 | Multiples vulnérabilités dans VMware Tanzu Greenplum | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0131 | Multiples vulnérabilités dans les produits IBM | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0130 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0129 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0128 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0127 | Vulnérabilité dans NetApp ONTAP 9 | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0126 | Vulnérabilité dans ESET Management Agent | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0125 | Multiples vulnérabilités dans les produits Moxa | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0124 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0123 | Multiples vulnérabilités dans Asterisk | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0122 | Multiples vulnérabilités dans Tenable Nessus | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0121 | Vulnérabilité dans les produits Juniper Networks | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0131 | Multiples vulnérabilités dans les produits IBM | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0130 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0129 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0128 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0127 | Vulnérabilité dans NetApp ONTAP 9 | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0126 | Vulnérabilité dans ESET Management Agent | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0125 | Multiples vulnérabilités dans les produits Moxa | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0124 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2020-007305 | Installer of Trend Micro Security 2020 (Consumer) may insecurely load Dynamic Link Libraries | 2024-08-22T11:33+09:00 | 2024-08-22T11:33+09:00 |
| jvndb-2017-009536 | Packetbeat vulnerable to denial-of-service (DoS) | 2024-08-21T17:54+09:00 | 2024-08-21T17:54+09:00 |
| jvndb-2018-009127 | Multiple vulnerabilities in LogonTracer | 2024-08-21T17:37+09:00 | 2024-08-21T17:37+09:00 |
| jvndb-2020-002957 | A vulnerability in TOYOTA MOTOR's DCU (Display Control Unit) | 2024-08-20T18:12+09:00 | 2024-08-20T18:12+09:00 |
| jvndb-2020-007306 | Trend Micro Security (Consumer) Driver vulnerable to Out-of-bounds Read | 2024-08-20T17:52+09:00 | 2024-08-20T17:52+09:00 |
| jvndb-2024-000085 | "Rakuten Ichiba App" fails to restrict custom URL schemes properly | 2024-08-20T16:56+09:00 | 2024-08-20T16:56+09:00 |
| jvndb-2024-005167 | EL Injection Vulnerability in Hitachi Tuning Manager | 2024-08-15T09:38+09:00 | 2024-08-15T09:38+09:00 |
| jvndb-2016-000124 | WAON service app for Android fails to verify SSL server certificates | 2024-08-15T09:36+09:00 | 2024-08-15T09:36+09:00 |
| jvndb-2024-000083 | Firmware update for RICOH JavaTM Platform resets the TLS configuration | 2024-08-06T15:13+09:00 | 2024-08-06T15:13+09:00 |
| jvndb-2024-000079 | Cybozu Office vulnerable to bypass browsing restrictions in Custom App | 2024-08-06T14:59+09:00 | 2024-08-06T14:59+09:00 |
| jvndb-2024-000082 | Pimax Play and PiTool accept WebSocket connections from unintended endpoints | 2024-08-05T13:58+09:00 | 2024-08-05T13:58+09:00 |
| jvndb-2024-000084 | Multiple vulnerabilities in ZEXELON ZWX-2000CSW2-HN | 2024-08-05T13:46+09:00 | 2024-08-05T13:46+09:00 |
| jvndb-2024-000074 | Multiple vulnerabilities in SKYSEA Client View | 2024-07-29T15:28+09:00 | 2024-07-31T14:12+09:00 |
| jvndb-2024-000077 | FFRI AMC vulnerable to OS command injection | 2024-07-30T16:40+09:00 | 2024-07-30T16:40+09:00 |
| jvndb-2024-000081 | EC-CUBE plugin (for EC-CUBE 4 series) "EC-CUBE Web API Plugin" vulnerable to stored cross-site scripting | 2024-07-30T14:06+09:00 | 2024-07-30T14:06+09:00 |
| jvndb-2024-000080 | EC-CUBE 4 Series improper input validation when installing plugins | 2024-07-30T13:56+09:00 | 2024-07-30T13:56+09:00 |
| jvndb-2024-000028 | Multiple vulnerabilities in SKYSEA Client View | 2024-03-07T16:09+09:00 | 2024-07-29T18:13+09:00 |
| jvndb-2024-000076 | SDoP contains a stack-based buffer overflow vulnerability. | 2024-07-29T17:24+09:00 | 2024-07-29T17:24+09:00 |
| jvndb-2024-003242 | OMRON NJ/NX series vulnerable to insufficient verification of data authenticity | 2024-05-28T12:28+09:00 | 2024-07-26T16:27+09:00 |
| jvndb-2021-000105 | PowerCMS XMLRPC API vulnerable to OS command injection | 2021-11-24T15:47+09:00 | 2024-07-26T15:22+09:00 |
| jvndb-2024-000075 | ORC vulnerable to stack-based buffer overflow | 2024-07-26T13:55+09:00 | 2024-07-26T13:55+09:00 |
| jvndb-2022-000030 | Multiple vulnerabilities in Operation management interface of FUJITSU Network IPCOM | 2022-05-09T15:02+09:00 | 2024-07-18T16:30+09:00 |
| jvndb-2024-000073 | Assimp vulnerable to heap-based buffer overflow | 2024-07-18T13:44+09:00 | 2024-07-18T13:44+09:00 |
| jvndb-2024-000072 | Cybozu Garoon vulnerable to cross-site scripting | 2024-07-16T16:14+09:00 | 2024-07-16T16:14+09:00 |
| jvndb-2024-000071 | FUJITSU Network Edgiot GW1500 vulnerable to path traversal | 2024-07-16T14:41+09:00 | 2024-07-16T14:41+09:00 |
| jvndb-2023-007150 | Multiple vulnerabilities in First Corporation's DVRs | 2023-11-17T17:31+09:00 | 2024-07-11T17:05+09:00 |
| jvndb-2023-000094 | Multiple vulnerabilities in WordPress plugin "Welcart e-Commerce" | 2023-09-22T13:51+09:00 | 2024-07-11T16:49+09:00 |
| jvndb-2024-000007 | Multiple Dahua Technology products vulnerable to authentication bypass | 2024-01-18T13:43+09:00 | 2024-07-11T16:10+09:00 |
| jvndb-2024-001882 | Sharp NEC Display Solutions' public displays vulnerable to local file inclusion | 2024-02-07T14:25+09:00 | 2024-07-11T14:27+09:00 |
| jvndb-2024-000070 | Out-of-bounds write vulnerability in Ricoh MFPs and printers | 2024-07-10T14:16+09:00 | 2024-07-10T14:16+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-13997 | Huawei EMUI和Huawei HarmonyOS系统服务框架权限绕过漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-13996 | Huawei HarmonyOS备忘录模块权限控制漏洞(CNVD-2026-13996) | 2026-01-19 | 2026-03-18 |
| cnvd-2026-13994 | Huawei HarmonyOS多模输入模块双重释放漏洞 | 2026-01-19 | 2026-03-18 |
| cnvd-2026-13993 | Huawei HarmonyOS视频框架模块多线程条件竞争漏洞 | 2026-01-19 | 2026-03-18 |
| cnvd-2026-13992 | Huawei HarmonyOS相机框架模块多线程条件竞争漏洞(CNVD-2026-13992) | 2026-01-19 | 2026-03-18 |
| cnvd-2026-13991 | Huawei HarmonyOS打印模块权限控制不当漏洞 | 2026-01-19 | 2026-03-18 |
| cnvd-2026-13990 | Huawei HarmonyOS相机框架模块多线程条件竞争漏洞 | 2026-01-19 | 2026-03-18 |
| cnvd-2026-13989 | Huawei HarmonyOS备忘录模块权限控制漏洞 | 2026-01-19 | 2026-03-18 |
| cnvd-2026-13988 | Huawei HarmonyOS热管理模块多线程条件竞争漏洞 | 2026-01-19 | 2026-03-18 |
| cnvd-2026-13987 | Huawei HarmonyOS卡片框架模块多线程条件竞争漏洞(CNVD-2026-13987) | 2026-01-19 | 2026-03-18 |
| cnvd-2026-13985 | Huawei HarmonyOS hiview模块缺少数据校验漏洞 | 2026-01-19 | 2026-03-18 |
| cnvd-2026-13984 | Huawei HarmonyOS卡片框架模块多线程条件竞争漏洞(CNVD-2026-13984) | 2026-01-19 | 2026-03-18 |
| cnvd-2026-13982 | Huawei HarmonyOS卡片框架模块多线程条件竞争漏洞 | 2026-01-19 | 2026-03-18 |
| cnvd-2026-14602 | Fortinet FortiWeb操作系统命令注入漏洞(CNVD-2026-14602) | 2026-03-17 | 2026-03-17 |
| cnvd-2026-14601 | Fortinet FortiSandbox跨站脚本漏洞(CNVD-2026-14601) | 2026-03-17 | 2026-03-17 |
| cnvd-2026-14600 | Fortinet FortiSandbox Cloud操作系统命令注入漏洞 | 2026-03-17 | 2026-03-17 |
| cnvd-2026-14120 | OpenAkita操作系统命令注入漏洞 | 2026-03-17 | 2026-03-17 |
| cnvd-2026-14119 | Siemens SICAM SIAPP SDK缓冲区溢出漏洞 | 2026-03-17 | 2026-03-17 |
| cnvd-2026-13976 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13976) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13975 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13975) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13974 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13974) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13973 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13973) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13972 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13972) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13971 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13971) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13970 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13970) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13969 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13969) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13968 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13968) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13967 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13967) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13966 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13966) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13965 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13965) | 2026-03-16 | 2026-03-17 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-12301 | Уязвимость библиотеки Perl для поиска файлов File::Find::Rule, позволяющая нарушителю пол… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12300 | Уязвимость ядра операционной системы Linux, связанная с выделением неограниченной памяти,… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12298 | Уязвимость компонента iwlwifi ядра операционной системы Linux, позволяющая нарушителю выз… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12294 | Уязвимость компонента powerpc/code-patching ядра операционной системы Linux, позволяющая … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12290 | Уязвимость компонента qibfs ядра операционной системы Linux, позволяющая нарушителю вызва… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12288 | Уязвимость компонента genirq/msi ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12285 | Уязвимость компонента umem_odp.c ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12283 | Уязвимость функции btrfs_dec_ref() ядра операционной системы Linux, позволяющая нарушител… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12282 | Уязвимость компонента net_sched ядра операционной системы Linux, позволяющая нарушителю в… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12281 | Уязвимость компонента x86/mm ядра операционной системы Linux, позволяющая нарушителю вызв… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12278 | Уязвимость ядра операционной системы Linux, связанная с некорректным вычислением, позволя… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12277 | Уязвимость функции __legitimize_mnt() компонента fs/namespace.c ядра операционной системы… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12276 | Уязвимость компонента acpi ядра операционной системы Linux, позволяющая нарушителю вызват… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12275 | Уязвимость компонента chip.c ядра операционной системы Linux, позволяющая нарушителю вызв… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12274 | Уязвимость функции demangle_const компонента libiberty/rust-demangle.c компилятора GCC, п… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12273 | Уязвимость компонента mtk_star_emac.c ядра операционной системы Linux, позволяющая наруши… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12272 | Уязвимость компонента filter.c ядра операционной системы Linux, позволяющая нарушителю вы… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12271 | Уязвимость компонента btrfs ядра операционной системы Linux, позволяющая нарушителю вызва… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12270 | Уязвимость компонента memcg ядра операционной системы Linux, позволяющая нарушителю вызва… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12261 | Уязвимость компонента f_midi ядра операционной системы Linux, позволяющая нарушителю вызв… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12260 | Уязвимость компонента mhi ядра операционной системы Linux, позволяющая нарушителю вызвать… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12257 | Уязвимость ядра операционной системы Linux, связанная с недостаточной блокировкой, позвол… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12256 | Уязвимость компонентов xenbus ядра операционной системы Linux, позволяющая нарушителю вы… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12255 | Уязвимость функции ReadRequestFromClient компонента os/io.c реализации протокола Wayland … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12254 | Уязвимость ядра операционной системы Linux, связанная с ошибками инициализации памяти, по… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12253 | Уязвимость ядра операционной системы Linux, связанная с ошибками инициализации памяти, по… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12252 | Уязвимость компонента mlxreg ядра операционной системы Linux, позволяющая нарушителю оказ… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12248 | Уязвимость компонента KVM ядра операционной системы Linux, позволяющая нарушителю вызвать… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12246 | Уязвимость компонента dispc.c ядра операционной системы Linux, позволяющая нарушителю пол… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12245 | Уязвимость компонента nfs4state.c ядра операционной системы Linux, позволяющая нарушителю… | 28.09.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200512-0299 | Heap-based buffer overflow in rsync in Mac OS X 10.4 through 10.4.5 allows remote authent… | 2024-07-23T21:40:52.289000Z |
| var-202212-2277 | An integer underflow in Organization Specific TLV was found in various versions of OpenvS… | 2024-07-23T21:40:51.741000Z |
| var-200912-0756 | The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Wind… | 2024-07-23T21:40:51.958000Z |
| var-201210-0456 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:40:50.864000Z |
| var-200712-0433 | Integer underflow in the asn1_get_string function in the SNMP back end (backend/snmp.c) f… | 2024-07-23T21:40:50.122000Z |
| var-201904-1460 | A cross-site scripting issue existed in Safari. This issue was addressed with improved UR… | 2024-07-23T21:40:45.159000Z |
| var-201806-1466 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T21:40:45.074000Z |
| var-201501-0436 | The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1… | 2024-07-23T21:40:45.003000Z |
| var-200704-0226 | Apple File Protocol (AFP) Client in Apple Mac OS X 10.3.9 through 10.4.9 does not properl… | 2024-07-23T21:40:44.831000Z |
| var-201605-0465 | The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple … | 2024-07-23T21:40:43.806000Z |
| var-202010-1510 | A type confusion issue was addressed with improved memory handling. This issue is fixed i… | 2024-07-23T21:40:40.672000Z |
| var-201103-0114 | The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x be… | 2024-07-23T21:40:40.823000Z |
| var-201302-0262 | Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.… | 2024-07-23T21:40:39.972000Z |
| var-201109-0201 | Use-after-free vulnerability in the document loader in Google Chrome before 14.0.835.163 … | 2024-07-23T21:40:39.355000Z |
| var-200505-1240 | The rsvp_print function in tcpdump 3.9.1 and earlier allows remote attackers to cause a d… | 2024-07-23T21:40:35.490000Z |
| var-201912-1857 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:39:57.528000Z |
| var-202104-0752 | A memory corruption issue was addressed with improved validation. This issue is fixed in … | 2024-07-23T21:39:56.465000Z |
| var-200902-0880 | International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in A… | 2024-07-23T21:39:24.164000Z |
| var-201908-1958 | The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently l… | 2024-07-23T21:39:23.746000Z |
| var-200102-0052 | Cisco Catalyst 6000, 5000, or 4000 switches allow remote attackers to cause a denial of s… | 2024-07-23T21:39:23.577000Z |
| var-201708-0038 | The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 al… | 2024-07-23T21:39:15.769000Z |
| var-200901-0706 | WebKit in Apple Safari before 4.0 does not prevent remote loading of local Java applets, … | 2024-07-23T21:39:10.742000Z |
| var-202112-1608 | A carefully crafted request body can cause a buffer overflow in the mod_lua multipart par… | 2024-07-23T21:38:29.659000Z |
| var-202301-1703 | The issue was addressed with improved memory handling. This issue is fixed in macOS Monte… | 2024-07-23T21:38:27.556000Z |
| var-202103-0287 | A flaw possibility of race condition and incorrect initialization of the process id was f… | 2024-07-23T21:38:27.231000Z |
| var-201011-0174 | ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute … | 2024-07-23T21:37:24.567000Z |
| var-202106-0343 | Improper isolation of shared resources in some Intel(R) Processors may allow an authentic… | 2024-07-23T21:37:23.721000Z |
| var-201506-0268 | The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before… | 2024-07-23T21:36:44.513000Z |
| var-201904-0744 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:36:28.176000Z |
| var-201606-0329 | Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/us… | 2024-07-23T21:36:28.630000Z |