Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-38006 |
N/A
|
net: mctp: Don't access ifa_index when missing |
Linux |
Linux |
2025-06-18T09:28:17.773Z | 2026-04-18T08:56:55.487Z |
| CVE-2025-37778 |
N/A
|
ksmbd: Fix dangling pointer in krb_authenticate |
Linux |
Linux |
2025-05-01T13:07:16.472Z | 2026-04-18T08:56:54.116Z |
| CVE-2025-21739 |
7.8 (3.1)
|
scsi: ufs: core: Fix use-after free in init error and … |
Linux |
Linux |
2025-02-27T02:12:14.581Z | 2026-04-18T08:56:52.762Z |
| CVE-2024-56584 |
N/A
|
io_uring/tctx: work around xa_store() allocation error issue |
Linux |
Linux |
2024-12-27T14:50:52.735Z | 2026-04-18T08:56:45.522Z |
| CVE-2024-56557 |
5.5 (3.1)
|
iio: adc: ad7923: Fix buffer overflow for tx_buf and r… |
Linux |
Linux |
2024-12-27T14:23:03.251Z | 2026-04-18T08:56:39.610Z |
| CVE-2024-46715 |
N/A
|
driver: iio: add missing checks on iio_info's callback… |
Linux |
Linux |
2024-09-18T06:32:15.466Z | 2026-04-18T08:56:38.256Z |
| CVE-2024-36898 |
N/A
|
gpiolib: cdev: fix uninitialised kfifo |
Linux |
Linux |
2024-05-30T15:29:02.011Z | 2026-04-18T08:56:36.639Z |
| CVE-2024-26849 |
N/A
|
netlink: add nla be16/32 types to minlen array |
Linux |
Linux |
2024-04-17T10:14:20.184Z | 2026-04-18T08:56:35.070Z |
| CVE-2022-49752 |
5.5 (3.1)
|
device property: fix of node refcount leak in fwnode_g… |
Linux |
Linux |
2025-03-27T16:43:00.584Z | 2026-04-18T08:56:33.591Z |
| CVE-2023-6680 |
7.4 (3.1)
|
Improper Certificate Validation in GitLab |
GitLab |
GitLab |
2023-12-15T16:02:40.371Z | 2026-04-18T04:06:06.413Z |
| CVE-2026-6482 |
8.5 (4.0)
|
Local Privilege Escalation via OpenSSL configuration f… |
Rapid7 |
Insight Agent |
2026-04-17T05:19:20.485Z | 2026-04-18T03:55:55.477Z |
| CVE-2026-33392 |
7.2 (3.1)
|
In JetBrains YouTrack before 2025.3.131383 high p… |
JetBrains |
YouTrack |
2026-04-17T07:46:11.710Z | 2026-04-18T03:55:54.262Z |
| CVE-2026-23853 |
8.4 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain |
2026-04-17T07:16:26.138Z | 2026-04-18T03:55:52.619Z |
| CVE-2025-36568 |
7.8 (3.1)
|
Dell PowerProtect Data Domain BoostFS for client … |
Dell |
PowerProtect Data Domain BoostFS |
2026-04-17T08:12:17.696Z | 2026-04-18T03:55:51.109Z |
| CVE-2026-23778 |
7.2 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain |
2026-04-17T08:33:21.569Z | 2026-04-18T03:55:49.150Z |
| CVE-2026-23779 |
6.7 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain |
2026-04-17T09:04:37.716Z | 2026-04-18T03:55:45.896Z |
| CVE-2026-35153 |
6.7 (3.1)
|
Dell PowerProtect Data Domain, versions 7.7.1.0 t… |
Dell |
PowerProtect Data Domain |
2026-04-17T10:38:18.357Z | 2026-04-18T03:55:43.881Z |
| CVE-2026-35074 |
6.7 (3.1)
|
Dell PowerProtect Data Domain, versions 7.7.1.0 t… |
Dell |
PowerProtect Data Domain |
2026-04-17T10:57:20.150Z | 2026-04-18T03:55:42.483Z |
| CVE-2026-35073 |
6.7 (3.1)
|
Dell PowerProtect Data Domain, versions 7.7.1.0 t… |
Dell |
PowerProtect Data Domain |
2026-04-17T11:05:38.442Z | 2026-04-18T03:55:40.665Z |
| CVE-2026-35072 |
6.7 (3.1)
|
Dell PowerProtect Data Domain, versions 7.7.1.0 t… |
Dell |
PowerProtect Data Domain |
2026-04-17T10:48:48.167Z | 2026-04-18T03:55:38.963Z |
| CVE-2025-46607 |
6.6 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain |
2026-04-17T11:13:08.869Z | 2026-04-18T03:55:37.071Z |
| CVE-2025-46641 |
6.6 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain |
2026-04-17T11:19:52.871Z | 2026-04-18T03:55:34.970Z |
| CVE-2025-46606 |
6.2 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain |
2026-04-17T11:36:54.469Z | 2026-04-18T03:55:33.318Z |
| CVE-2026-4541 |
2 (4.0)
2.5 (3.1)
2.5 (3.0)
|
janmojzis tinyssh Ed25519 Signature crypto_sign_ed2551… |
janmojzis |
tinyssh |
2026-03-22T08:35:03.623Z | 2026-04-18T03:39:33.191Z |
| CVE-2026-4542 |
5.3 (4.0)
5.4 (3.1)
5.4 (3.0)
|
SSCMS layerImage Endpoint LayerImageController.Submit.… |
n/a |
SSCMS |
2026-03-22T08:35:10.929Z | 2026-04-18T03:38:56.405Z |
| CVE-2026-4568 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
SourceCodester Sales and Inventory System HTTP GET Req… |
SourceCodester |
Sales and Inventory System |
2026-03-23T02:12:57.973Z | 2026-04-18T03:38:21.283Z |
| CVE-2026-4581 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Simple Laundry System Parameters checklo… |
code-projects |
Simple Laundry System |
2026-03-23T09:33:18.596Z | 2026-04-18T03:37:53.025Z |
| CVE-2026-4582 |
2.3 (4.0)
5 (3.1)
5 (3.0)
|
Shenzhen HCC Technology MPOS M6 PLUS Bluetooth missing… |
Shenzhen HCC Technology |
MPOS M6 PLUS |
2026-03-23T09:33:21.271Z | 2026-04-18T03:37:10.133Z |
| CVE-2026-4589 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
kalcaddle kodbox fileGet Endpoint editor.class.php Pat… |
kalcaddle |
kodbox |
2026-03-23T13:32:42.266Z | 2026-04-18T03:36:21.562Z |
| CVE-2026-4595 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
code-projects Exam Form Submission update_s6.php cross… |
code-projects |
Exam Form Submission |
2026-03-23T18:37:03.375Z | 2026-04-18T03:35:36.342Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-23253 |
7.8 (3.1)
|
media: dvb-core: fix wrong reinitialization of ringbuf… |
Linux |
Linux |
2026-03-18T17:01:44.126Z | 2026-04-18T08:57:26.705Z |
| CVE-2026-23245 |
7.8 (3.1)
|
net/sched: act_gate: snapshot parameters with RCU on replace |
Linux |
Linux |
2026-03-18T10:05:07.406Z | 2026-04-18T08:57:25.339Z |
| CVE-2026-23227 |
7.8 (3.1)
|
drm/exynos: vidi: use ctx->lock to protect struct vidi… |
Linux |
Linux |
2026-02-18T14:53:30.784Z | 2026-04-18T08:57:24.022Z |
| CVE-2026-23220 |
N/A
|
ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_o… |
Linux |
Linux |
2026-02-18T14:53:23.376Z | 2026-04-18T08:57:22.654Z |
| CVE-2026-23155 |
N/A
|
can: gs_usb: gs_usb_receive_bulk_callback(): fix error… |
Linux |
Linux |
2026-02-14T16:01:22.429Z | 2026-04-18T08:57:21.313Z |
| CVE-2026-23113 |
N/A
|
io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop |
Linux |
Linux |
2026-02-14T15:09:46.379Z | 2026-04-18T08:57:19.961Z |
| CVE-2026-23110 |
N/A
|
scsi: core: Wake up the error handler when final compl… |
Linux |
Linux |
2026-02-04T16:08:30.158Z | 2026-04-18T08:57:18.628Z |
| CVE-2026-23100 |
N/A
|
mm/hugetlb: fix hugetlb_pmd_shared() |
Linux |
Linux |
2026-02-04T16:08:22.592Z | 2026-04-18T08:57:17.289Z |
| CVE-2026-23082 |
N/A
|
can: gs_usb: gs_usb_receive_bulk_callback(): unanchor … |
Linux |
Linux |
2026-02-04T16:08:06.731Z | 2026-04-18T08:57:15.950Z |
| CVE-2026-23031 |
N/A
|
can: gs_usb: gs_usb_receive_bulk_callback(): fix URB m… |
Linux |
Linux |
2026-01-31T11:42:09.276Z | 2026-04-18T08:57:14.619Z |
| CVE-2025-71150 |
N/A
|
ksmbd: Fix refcount leak when invalid session is found… |
Linux |
Linux |
2026-01-23T14:15:16.898Z | 2026-04-18T08:57:13.286Z |
| CVE-2025-68256 |
N/A
|
staging: rtl8723bs: fix out-of-bounds read in rtw_get_… |
Linux |
Linux |
2025-12-16T14:44:58.829Z | 2026-04-18T08:57:11.909Z |
| CVE-2025-68206 |
N/A
|
netfilter: nft_ct: add seqadj extension for natted con… |
Linux |
Linux |
2025-12-16T13:48:33.763Z | 2026-04-18T08:57:10.560Z |
| CVE-2025-40323 |
N/A
|
fbcon: Set fb_display[i]->mode to NULL when the mode i… |
Linux |
Linux |
2025-12-08T00:46:50.833Z | 2026-04-18T08:57:09.204Z |
| CVE-2025-40261 |
N/A
|
nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvm… |
Linux |
Linux |
2025-12-04T16:08:21.345Z | 2026-04-18T08:57:07.832Z |
| CVE-2025-40103 |
N/A
|
smb: client: Fix refcount leak for cifs_sb_tlink |
Linux |
Linux |
2025-10-30T09:48:08.421Z | 2026-04-18T08:57:06.416Z |
| CVE-2025-40016 |
N/A
|
media: uvcvideo: Mark invalid entities with id UVC_INV… |
Linux |
Linux |
2025-10-20T15:29:10.376Z | 2026-04-18T08:57:05.030Z |
| CVE-2025-39930 |
N/A
|
ASoC: simple-card-utils: Don't use __free(device_node)… |
Linux |
Linux |
2025-04-18T07:01:38.576Z | 2026-04-18T08:57:03.638Z |
| CVE-2025-39764 |
N/A
|
netfilter: ctnetlink: remove refcounting in expectatio… |
Linux |
Linux |
2025-09-11T16:52:32.060Z | 2026-04-18T08:57:02.272Z |
| CVE-2025-39748 |
N/A
|
bpf: Forget ranges when refining tnum after JSET |
Linux |
Linux |
2025-09-11T16:52:20.534Z | 2026-04-18T08:57:00.881Z |
| CVE-2025-38693 |
N/A
|
media: dvb-frontends: w7090p: fix null-ptr-deref in w7… |
Linux |
Linux |
2025-09-04T15:32:46.726Z | 2026-04-18T08:56:59.497Z |
| CVE-2025-38562 |
N/A
|
ksmbd: fix null pointer dereference error in generate_… |
Linux |
Linux |
2025-08-19T17:02:39.450Z | 2026-04-18T08:56:58.171Z |
| CVE-2025-38436 |
N/A
|
drm/scheduler: signal scheduled fence when kill job |
Linux |
Linux |
2025-07-25T14:32:09.945Z | 2026-04-18T08:56:56.830Z |
| CVE-2025-38006 |
N/A
|
net: mctp: Don't access ifa_index when missing |
Linux |
Linux |
2025-06-18T09:28:17.773Z | 2026-04-18T08:56:55.487Z |
| CVE-2025-37778 |
N/A
|
ksmbd: Fix dangling pointer in krb_authenticate |
Linux |
Linux |
2025-05-01T13:07:16.472Z | 2026-04-18T08:56:54.116Z |
| CVE-2025-21739 |
7.8 (3.1)
|
scsi: ufs: core: Fix use-after free in init error and … |
Linux |
Linux |
2025-02-27T02:12:14.581Z | 2026-04-18T08:56:52.762Z |
| CVE-2024-56584 |
N/A
|
io_uring/tctx: work around xa_store() allocation error issue |
Linux |
Linux |
2024-12-27T14:50:52.735Z | 2026-04-18T08:56:45.522Z |
| CVE-2024-56557 |
5.5 (3.1)
|
iio: adc: ad7923: Fix buffer overflow for tx_buf and r… |
Linux |
Linux |
2024-12-27T14:23:03.251Z | 2026-04-18T08:56:39.610Z |
| CVE-2024-46715 |
N/A
|
driver: iio: add missing checks on iio_info's callback… |
Linux |
Linux |
2024-09-18T06:32:15.466Z | 2026-04-18T08:56:38.256Z |
| CVE-2024-36898 |
N/A
|
gpiolib: cdev: fix uninitialised kfifo |
Linux |
Linux |
2024-05-30T15:29:02.011Z | 2026-04-18T08:56:36.639Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-33618 | Chamilo LMS is a learning management system. Prior to .0.0-RC.3, the PlatformConfigurationControlle… | 2026-04-10T19:16:22.853 | 2026-04-17T22:03:07.113 |
| fkie_cve-2026-40226 | In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted o… | 2026-04-10T16:16:33.447 | 2026-04-17T22:02:15.393 |
| fkie_cve-2026-22560 | An open redirect vulnerability in Rocket.Chat versions prior to 8.4.0 allows users to be redirected… | 2026-04-10T17:17:01.980 | 2026-04-17T22:01:13.620 |
| fkie_cve-2026-40228 | In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users… | 2026-04-10T16:16:33.753 | 2026-04-17T22:00:53.883 |
| fkie_cve-2026-35595 | Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the CanUpdate check… | 2026-04-10T17:17:02.910 | 2026-04-17T22:00:13.683 |
| fkie_cve-2026-35596 | Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the hasAccessToLabe… | 2026-04-10T17:17:03.067 | 2026-04-17T22:00:03.637 |
| fkie_cve-2026-35597 | Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the TOTP failed-att… | 2026-04-10T17:17:03.217 | 2026-04-17T21:59:18.763 |
| fkie_cve-2026-35598 | Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the CalDAV GetResou… | 2026-04-10T17:17:03.370 | 2026-04-17T21:57:42.097 |
| fkie_cve-2026-35599 | Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the addRepeatInterv… | 2026-04-10T17:17:03.520 | 2026-04-17T21:57:24.390 |
| fkie_cve-2026-35600 | Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, task titles are emb… | 2026-04-10T17:17:03.680 | 2026-04-17T21:56:40.090 |
| fkie_cve-2026-35601 | Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the CalDAV output g… | 2026-04-10T17:17:03.837 | 2026-04-17T21:56:20.487 |
| fkie_cve-2026-35602 | Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the Vikunja file im… | 2026-04-10T17:17:03.993 | 2026-04-17T21:49:40.743 |
| fkie_cve-2026-29063 | Immutable.js provides many Persistent Immutable data structures. Prior to versions 3.8.3, 4.3.7, an… | 2026-03-06T19:16:21.557 | 2026-04-17T21:32:18.947 |
| fkie_cve-2026-31940 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, in main/lp/aicc_hacp.… | 2026-04-10T18:16:41.483 | 2026-04-17T21:31:36.710 |
| fkie_cve-2026-31941 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains … | 2026-04-10T18:16:41.640 | 2026-04-17T21:31:11.793 |
| fkie_cve-2026-32892 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains … | 2026-04-10T18:16:41.797 | 2026-04-17T21:30:50.533 |
| fkie_cve-2025-15602 | Snipe-IT versions prior to 8.3.7 contain sensitive user attributes related to account privileges th… | 2026-03-06T17:16:24.600 | 2026-04-17T21:30:32.877 |
| fkie_cve-2026-32893 | Chamilo LMS is a learning management system. Prior to 2.0.0-RC.3, a Reflected Cross-Site Scripting … | 2026-04-10T18:16:41.953 | 2026-04-17T21:30:03.257 |
| fkie_cve-2026-32894 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an Insecure Direct Ob… | 2026-04-10T18:16:42.117 | 2026-04-17T21:28:56.970 |
| fkie_cve-2026-32930 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an Insecure Direct Ob… | 2026-04-10T18:16:42.280 | 2026-04-17T21:28:36.707 |
| fkie_cve-2026-32931 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an unrestricted file … | 2026-04-10T18:16:42.430 | 2026-04-17T21:27:59.237 |
| fkie_cve-2026-32932 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an Open Redirect vuln… | 2026-04-10T18:16:42.590 | 2026-04-17T21:27:32.730 |
| fkie_cve-2026-33141 | Chamilo LMS is a learning management system. Prior to 2.0.0-RC.3, an Insecure Direct Object Referen… | 2026-04-10T18:16:42.743 | 2026-04-17T21:24:02.230 |
| fkie_cve-2026-31939 | Chamilo LMS is a learning management system. Prior to 1.11.38, there is a path traversal in main/ex… | 2026-04-10T18:16:41.313 | 2026-04-17T21:23:42.527 |
| fkie_cve-2026-34238 | ImageMagick is free and open-source software used for editing and manipulating digital images. In v… | 2026-04-13T22:16:29.310 | 2026-04-17T21:22:41.077 |
| fkie_cve-2026-33899 | ImageMagick is free and open-source software used for editing and manipulating digital images. In v… | 2026-04-13T21:16:25.170 | 2026-04-17T21:20:26.970 |
| fkie_cve-2026-28518 | OpenViking versions 0.2.1 and prior, fixed in commit 46b3e76, contain a path traversal vulnerabilit… | 2026-03-03T15:16:20.593 | 2026-04-17T21:19:50.927 |
| fkie_cve-2026-33900 | ImageMagick is free and open-source software used for editing and manipulating digital images. In v… | 2026-04-13T21:16:25.333 | 2026-04-17T21:19:44.483 |
| fkie_cve-2026-33894 | Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScri… | 2026-03-27T21:17:25.983 | 2026-04-17T21:16:42.030 |
| fkie_cve-2026-40527 | radare2 prior to commit bc5a890 contains a command injection vulnerability in the afsv/afsvj comman… | 2026-04-17T21:16:35.373 | 2026-04-17T21:16:35.373 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-qv7w-j9w9-35p3 |
5.3 (3.1)
1.9 (4.0)
|
A security vulnerability has been detected in libvips up to 8.18.2. The affected element is the fun… | 2026-04-17T15:31:18Z | 2026-04-17T15:31:18Z |
| ghsa-qc74-2r45-g2fp |
5.8 (3.1)
|
In JetBrains Junie before 252.549.29 command execution was possible via malicious project file | 2026-04-17T15:31:18Z | 2026-04-17T15:31:18Z |
| ghsa-mrmx-7hg5-pj7x |
4.3 (3.1)
2.1 (4.0)
|
A flaw has been found in Qihui jtbc5 CMS 5.0.3.6. Affected is an unknown function of the file /dev/… | 2026-04-17T15:31:17Z | 2026-04-17T15:31:18Z |
| ghsa-cv47-g53v-q848 |
3.5 (3.1)
2.0 (4.0)
|
A flaw has been found in lukevella rallly up to 4.7.4. This affects an unknown function of the file… | 2026-04-17T15:31:18Z | 2026-04-17T15:31:18Z |
| ghsa-c9vj-5wx9-69pj |
5.4 (3.1)
2.1 (4.0)
|
A vulnerability was found in prasathmani TinyFileManager up to 2.6. Affected is an unknown function… | 2026-04-17T15:31:18Z | 2026-04-17T15:31:18Z |
| ghsa-42p2-73mx-2pch |
5.5 (3.1)
|
STProcessMonitor 11.11.4.0, part of the Safetica Application suite, allows an admin-privileged user… | 2026-04-17T15:31:18Z | 2026-04-17T15:31:18Z |
| ghsa-3g88-37vp-qh92 |
5.3 (3.1)
5.5 (4.0)
|
A vulnerability was detected in arnobt78 Hotel Booking Management System up to f8922d0e0f6ac1cc7619… | 2026-04-17T15:31:18Z | 2026-04-17T15:31:18Z |
| ghsa-376w-pjjp-jrvj |
3.5 (3.1)
2.0 (4.0)
|
A vulnerability was detected in classroombookings up to 2.17.0. This impacts the function read of t… | 2026-04-17T15:31:17Z | 2026-04-17T15:31:18Z |
| ghsa-28hj-3gj2-63m5 |
7.5 (3.1)
|
A flaw was found in dnsmasq. A remote attacker could exploit an out-of-bounds write vulnerability b… | 2026-04-17T15:31:18Z | 2026-04-17T15:31:18Z |
| ghsa-wx9r-9hf2-wq9p |
7.8 (3.1)
|
It has been identified that a vulnerability (CWE-427) exists in the UPS (Uninterruptible Power Supp… | 2026-04-17T15:31:17Z | 2026-04-17T15:31:17Z |
| ghsa-mxxh-fmjq-j6x4 |
2.7 (3.1)
|
Mattermost versions 10.11.x <= 10.11.12 fail to validate whether users were correctly owned by the … | 2026-04-17T15:31:17Z | 2026-04-17T15:31:17Z |
| ghsa-mh4x-rmrx-3hp4 |
6.5 (3.1)
|
Mattermost versions 10.11.x <= 10.11.12, 11.5.x <= 11.5.0, 11.4.x <= 11.4.2, 11.3.x <= 11.3.2 fail … | 2026-04-17T15:31:17Z | 2026-04-17T15:31:17Z |
| ghsa-m7cf-4gh2-v4qg |
6.8 (3.1)
|
Mattermost versions 10.11.x <= 10.11.12, 11.5.x <= 11.5.0, 11.4.x <= 11.4.2, 11.3.x <= 11.3.2 fail … | 2026-04-17T15:31:17Z | 2026-04-17T15:31:17Z |
| ghsa-gcf8-4gjc-v7ff |
7.5 (3.1)
|
Uncontrolled Resource Consumption in Bosch VMS Central Server in Bosch VMS 12.0.1 allows attackers… | 2026-04-17T15:31:17Z | 2026-04-17T15:31:17Z |
| ghsa-5f43-3gvm-hhjm |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was identified in QueryMine sms up to 7ab5a9ea196209611134525ffc18de25c57d9593. Thi… | 2026-04-17T15:31:17Z | 2026-04-17T15:31:17Z |
| ghsa-phcr-v9ch-26r8 |
7.5 (3.1)
5.1 (4.0)
|
Observable response discrepancy vulnerability in OpenText™ Vertica allows Password Brute Forcing. … | 2026-03-13T21:31:45Z | 2026-04-17T15:31:06Z |
| ghsa-96v9-4pvw-w72p |
6.1 (3.1)
5.1 (4.0)
|
Improper neutralization of input during web page generation ('cross-site scripting') vulnerability … | 2026-03-13T21:31:45Z | 2026-04-17T15:31:06Z |
| ghsa-6frc-h2x4-jwq3 |
6.1 (3.1)
5.1 (4.0)
|
Improper neutralization of input during web page generation ('cross-site scripting') vulnerability … | 2026-03-13T21:31:45Z | 2026-04-17T15:31:06Z |
| ghsa-pm8w-jq9r-x5rp |
5.3 (3.1)
|
A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (C… | 2026-02-09T15:30:31Z | 2026-04-17T15:31:05Z |
| ghsa-cx8g-4cf5-cjv3 |
7.5 (3.1)
|
A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff … | 2024-01-25T21:32:14Z | 2026-04-17T15:31:05Z |
| ghsa-6r5v-hp32-fjqw |
|
Improper Access Control in Apache WSS4J | 2022-05-14T02:57:28Z | 2026-04-17T13:26:03Z |
| ghsa-2p5w-cvg5-gc5c |
8.3 (3.1)
|
Hibernate vulnerable to SQL Injection | 2026-01-23T09:30:28Z | 2026-04-17T13:23:49Z |
| ghsa-4h8f-2wvx-gg5w |
5.9 (3.1)
|
Bouncy Castle Java Cryptography API vulnerable to DNS poisoning | 2024-05-03T18:30:37Z | 2026-04-17T13:22:45Z |
| ghsa-w3x6-4m5h-cxqf |
7.5 (3.1)
|
Microsoft Security Advisory CVE-2026-26171 – .NET Denial of Service Vulnerability | 2026-04-14T23:31:08Z | 2026-04-17T13:20:49Z |
| ghsa-37gx-xxp4-5rgx |
7.5 (3.1)
|
Microsoft Security Advisory CVE-2026-33116 – .NET, .NET Framework, and Visual Studio Denial of Serv… | 2026-04-14T23:30:27Z | 2026-04-17T13:19:57Z |
| ghsa-xgpm-2v6j-vx8q |
6.7 (3.1)
|
Dell PowerProtect Data Domain, versions 7.7.1.0 through 8.7.0.0, LTS2025 release versions 8.3.1.0 t… | 2026-04-17T12:31:25Z | 2026-04-17T12:31:25Z |
| ghsa-x63q-987j-jrv7 |
4.3 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-17T12:31:25Z | 2026-04-17T12:31:25Z |
| ghsa-wx63-92xj-ggq5 |
6.2 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-17T12:31:25Z | 2026-04-17T12:31:25Z |
| ghsa-w6h6-qc6q-q65w |
6.6 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-17T12:31:25Z | 2026-04-17T12:31:25Z |
| ghsa-r9x4-2726-c64m |
6.2 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-17T12:31:25Z | 2026-04-17T12:31:25Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2017-140 |
5.5 (3.1)
|
There is a heap-based buffer over-read in the Exiv2::Internal::PngChunk::keyTXTChunk func… | exiv2 | 2017-12-13T22:29:00Z | 2024-11-21T14:22:47.521911Z |
| pysec-2017-139 |
5.5 (3.1)
|
There is a heap-based buffer overflow in the Exiv2::s2Data function of types.cpp in Exiv2… | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:47.458235Z |
| pysec-2017-138 |
5.5 (3.1)
|
There is a heap-based buffer overflow in the Exiv2::us2Data function of types.cpp in Exiv… | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:47.398419Z |
| pysec-2017-137 |
5.5 (3.1)
|
An Invalid memory address dereference was discovered in Exiv2::getULong in types.cpp in E… | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:47.340172Z |
| pysec-2017-136 |
5.5 (3.1)
|
A NULL pointer dereference was discovered in Exiv2::Image::printIFDStructure in image.cpp… | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:47.277896Z |
| pysec-2017-135 |
5.5 (3.1)
|
An Invalid memory address dereference was discovered in Exiv2::DataValue::read in value.c… | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:47.218172Z |
| pysec-2017-134 |
5.5 (3.1)
|
There is a stack consumption vulnerability in the Exiv2::Internal::stringFormat function … | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:47.157939Z |
| pysec-2017-133 |
5.5 (3.1)
|
There is a heap-based buffer over-read in the Exiv2::Jp2Image::readMetadata function of j… | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:47.10072Z |
| pysec-2017-132 |
5.5 (3.1)
|
An Invalid memory address dereference was discovered in Exiv2::StringValueBase::read in v… | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:47.041853Z |
| pysec-2017-131 |
5.5 (3.1)
|
There is a heap-based buffer overflow in the Exiv2::l2Data function of types.cpp in Exiv2… | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:46.982152Z |
| pysec-2017-130 |
5.5 (3.1)
|
In Exiv2 0.26, there is an invalid free in the Image class in image.cpp that leads to a S… | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:46.923551Z |
| pysec-2017-129 |
6.5 (3.1)
|
There is a heap-based buffer over-read in libexiv2 in Exiv2 0.26 that is triggered in the… | exiv2 | 2017-08-18T21:29:00Z | 2024-11-21T14:22:46.862068Z |
| pysec-2017-128 |
6.5 (3.1)
|
There is an illegal address access in Exiv2::FileIo::path[abi:cxx11]() in basicio.cpp of … | exiv2 | 2017-08-18T21:29:00Z | 2024-11-21T14:22:46.791764Z |
| pysec-2017-127 |
8.8 (3.1)
|
There is a heap-based buffer overflow in basicio.cpp of Exiv2 0.26. The vulnerability cau… | exiv2 | 2017-08-18T21:29:00Z | 2024-11-21T14:22:46.732582Z |
| pysec-2017-126 |
6.5 (3.1)
|
There is a reachable assertion in the Internal::TiffReader::visitDirectory function in ti… | exiv2 | 2017-07-27T06:29:00Z | 2024-11-21T14:22:46.672784Z |
| pysec-2017-125 |
7.5 (3.1)
|
There is a Mismatched Memory Management Routines vulnerability in the Exiv2::FileIo::seek… | exiv2 | 2017-07-24T01:29:00Z | 2024-11-21T14:22:46.598979Z |
| pysec-2017-124 |
7.5 (3.1)
|
There is a Floating point exception in the Exiv2::ValueType function in Exiv2 0.26 that w… | exiv2 | 2017-07-24T01:29:00Z | 2024-11-21T14:22:46.539614Z |
| pysec-2017-123 |
7.5 (3.1)
|
There is an illegal address access in the extend_alias_table function in localealias.c of… | exiv2 | 2017-07-23T03:29:00Z | 2024-11-21T14:22:46.480449Z |
| pysec-2017-122 |
6.5 (3.1)
|
There is a Segmentation fault in the XmpParser::terminate() function in Exiv2 0.26, relat… | exiv2 | 2017-07-17T13:18:00Z | 2024-11-21T14:22:46.411851Z |
| pysec-2017-121 |
6.5 (3.1)
|
There is a heap-based buffer overflow in the Image::printIFDStructure function of image.c… | exiv2 | 2017-07-17T13:18:00Z | 2024-11-21T14:22:46.352202Z |
| pysec-2017-120 |
6.5 (3.1)
|
There is an infinite loop in the Exiv2::Image::printIFDStructure function of image.cpp in… | exiv2 | 2017-07-17T13:18:00Z | 2024-11-21T14:22:46.291386Z |
| pysec-2017-119 |
6.5 (3.1)
|
There is an invalid free in the Action::TaskFactory::cleanup function of actions.cpp in E… | exiv2 | 2017-07-17T13:18:00Z | 2024-11-21T14:22:46.232444Z |
| pysec-2017-118 |
6.5 (3.1)
|
There is a heap-based buffer over-read in the Image::printIFDStructure function in image.… | exiv2 | 2017-07-17T13:18:00Z | 2024-11-21T14:22:46.174866Z |
| pysec-2017-117 |
5.5 (3.1)
|
Exiv2 0.26 contains a stack out of bounds read in JPEG2000 parser | exiv2 | 2017-11-17T22:29:00Z | 2024-11-21T14:22:46.115176Z |
| pysec-2017-116 |
5.5 (3.1)
|
Exiv2 0.26 contains a heap buffer overflow in tiff parser | exiv2 | 2017-11-17T22:29:00Z | 2024-11-21T14:22:46.052386Z |
| pysec-2024-125 |
7.5 (3.1)
|
DIRAC is a distributed resource framework. In affected versions any user could get a toke… | dirac | 2024-02-09T00:15:00+00:00 | 2024-11-21T14:22:45.495938+00:00 |
| pysec-2022-43133 |
9.8 (3.1)
|
The drxhello package in PyPI v0.0.1 was discovered to contain a code execution backdoor v… | drxhello | 2022-06-24T21:15:00Z | 2024-11-21T14:22:45.663614Z |
| pysec-2022-43132 |
9.8 (3.1)
|
The DR-Web-Engine package in PyPI v0.2.0b0 was discovered to contain a code execution bac… | dr-web-engine | 2022-06-24T21:15:00Z | 2024-11-21T14:22:45.610409Z |
| pysec-2022-43130 |
9.8 (3.1)
|
The d8s-timer for python, as distributed on PyPI, included a potential code-execution bac… | democritus-uuids | 2022-11-07T15:15:00Z | 2024-11-21T14:22:45.198186Z |
| pysec-2022-43129 |
9.8 (3.1)
|
The d8s-strings for python, as distributed on PyPI, included a potential code-execution b… | democritus-uuids | 2022-11-07T15:15:00Z | 2024-11-21T14:22:45.148199Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33585 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.675953Z |
| gsd-2024-33584 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.668914Z |
| gsd-2024-33583 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.523973Z |
| gsd-2024-33582 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.681866Z |
| gsd-2024-33581 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.528711Z |
| gsd-2024-33580 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.684958Z |
| gsd-2024-33579 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.669859Z |
| gsd-2024-33578 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.679697Z |
| gsd-2024-33577 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.555849Z |
| gsd-2024-33576 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.617959Z |
| gsd-2024-33575 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.519910Z |
| gsd-2024-33574 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.543325Z |
| gsd-2024-33573 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.641875Z |
| gsd-2024-33572 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.645876Z |
| gsd-2024-33571 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.606381Z |
| gsd-2024-33570 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.523531Z |
| gsd-2024-33569 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.689024Z |
| gsd-2024-33568 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.636473Z |
| gsd-2024-33567 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.658614Z |
| gsd-2024-33566 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.597677Z |
| gsd-2024-33565 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.652713Z |
| gsd-2024-33564 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.690855Z |
| gsd-2024-33563 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.622975Z |
| gsd-2024-33562 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.607449Z |
| gsd-2024-33561 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.606138Z |
| gsd-2024-33560 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.535115Z |
| gsd-2024-33559 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.554162Z |
| gsd-2024-33558 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.517690Z |
| gsd-2024-33557 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.567408Z |
| gsd-2024-33556 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.629813Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2678 | Malicious code in snitz-chief-cloud (npm) | 2026-04-15T03:12:05Z | 2026-04-15T03:12:05Z |
| mal-2026-2677 | Malicious code in pdf-linker (npm) | 2026-04-15T03:12:05Z | 2026-04-15T03:12:05Z |
| mal-2026-2673 | Malicious code in chief-documentation (npm) | 2026-04-15T03:12:05Z | 2026-04-15T03:12:05Z |
| mal-2026-2675 | Malicious code in mongoose-stamps (npm) | 2026-04-15T03:07:56Z | 2026-04-15T03:07:57Z |
| mal-2026-2672 | Malicious code in ahmed_salem_ph (npm) | 2026-04-15T03:02:45Z | 2026-04-15T03:02:45Z |
| mal-2026-2671 | Malicious code in kryptex-os (PyPI) | 2026-04-14T21:55:34Z | 2026-04-14T21:55:34Z |
| mal-2026-2670 | Malicious code in 7miners (PyPI) | 2026-04-14T21:55:03Z | 2026-04-14T21:55:03Z |
| mal-2026-2669 | Malicious code in ant-mcp-proxy-for-test (PyPI) | 2026-04-14T21:19:11Z | 2026-04-14T21:19:23Z |
| mal-2026-2668 | Malicious code in pnpm-workspaces (npm) | 2026-04-14T19:36:06Z | 2026-04-14T19:36:06Z |
| mal-2026-2667 | Malicious code in ckeditor5-minimap (npm) | 2026-04-14T19:06:02Z | 2026-04-14T19:06:02Z |
| mal-2026-2666 | Malicious code in moooo (PyPI) | 2026-04-14T15:21:49Z | 2026-04-14T15:21:49Z |
| mal-2026-2664 | Malicious code in buildenv-telemetry (PyPI) | 2026-04-14T14:28:02Z | 2026-04-14T14:28:02Z |
| mal-2026-2665 | Malicious code in hive-os-settings (PyPI) | 2026-04-14T14:27:24Z | 2026-04-14T14:27:24Z |
| mal-2026-2662 | Malicious code in @automation-toolchain/f5-cloud-libs (npm) | 2026-04-14T13:05:55Z | 2026-04-14T13:40:00Z |
| mal-2026-2529 | Malicious code in use-form-builder-plugin (npm) | 2026-04-06T16:16:50Z | 2026-04-14T12:40:55Z |
| mal-2026-2429 | Malicious code in vv-ftend-core (npm) | 2026-04-02T12:10:43Z | 2026-04-14T12:40:55Z |
| mal-2026-2428 | Malicious code in vv-ftend-api (npm) | 2026-04-02T12:21:07Z | 2026-04-14T12:40:55Z |
| mal-2026-2568 | Malicious code in pt-sc-logger (npm) | 2026-04-12T21:36:18Z | 2026-04-14T12:40:54Z |
| mal-2026-2567 | Malicious code in pt-sc-demo-app (npm) | 2026-04-12T21:41:40Z | 2026-04-14T12:40:54Z |
| mal-2026-2427 | Malicious code in partner-tracker-api (npm) | 2026-04-02T12:10:47Z | 2026-04-14T12:40:54Z |
| mal-2026-2426 | Malicious code in partner-tracker (npm) | 2026-04-02T12:10:54Z | 2026-04-14T12:40:54Z |
| mal-2026-2513 | Malicious code in gprofiler (npm) | 2026-04-08T11:45:58Z | 2026-04-14T12:40:52Z |
| mal-2026-2425 | Malicious code in bytefrontier-tracker (npm) | 2026-04-02T12:10:59Z | 2026-04-14T12:40:51Z |
| mal-2026-2424 | Malicious code in bytefrontier-sdk (npm) | 2026-04-02T12:21:22Z | 2026-04-14T12:40:51Z |
| mal-2026-2423 | Malicious code in bytefrontier-partner (npm) | 2026-04-02T12:10:52Z | 2026-04-14T12:40:51Z |
| mal-2026-2422 | Malicious code in bytefrontier-api (npm) | 2026-04-02T12:10:50Z | 2026-04-14T12:40:51Z |
| mal-2026-2883 | Malicious code in ts-lint-builds (npm) | 2026-04-14T12:36:00Z | 2026-04-14T12:36:00Z |
| mal-2026-2882 | Malicious code in cjs-biginteger (npm) | 2026-04-14T12:35:43Z | 2026-04-14T12:35:43Z |
| mal-2026-2881 | Malicious code in bjs-lint-builders (npm) | 2026-04-14T12:35:17Z | 2026-04-14T12:35:17Z |
| mal-2026-2880 | Malicious code in bjs-lint-builder (npm) | 2026-04-14T12:35:04Z | 2026-04-14T12:35:04Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2672 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-24T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2616 | libvirt: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-17T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2193 | QEMU: Schwachstelle ermöglicht Denial of Service | 2025-10-05T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2144 | binutils: Mehrere Schwachstellen | 2025-09-28T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2134 | Red Hat Enterprise Linux (Developer Hub): Schwachstelle ermöglicht Denial of Service | 2025-09-25T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2078 | Red Hat Enterprise Linux (Developer Hub): Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1948 | libxml2 (exsltDynMapFunction): Schwachstelle ermöglicht Denial of Service | 2025-09-02T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1928 | Linux UDisks Daemon: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-28T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1842 | PostgreSQL: Mehrere Schwachstellen | 2025-08-14T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1699 | Red Hat Enterprise Linux (requests): Schwachstelle ermöglicht das Ausspähen von Informationen | 2025-08-03T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1423 | libssh: Mehrere Schwachstellen | 2025-06-29T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1143 | Red Hat Enterprise Linux (python-tornado): Schwachstelle ermöglicht Denial of Service | 2025-05-25T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-0964 | Django: Schwachstelle ermöglicht Denial of Service | 2025-05-07T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-0353 | GNU Emacs: Schwachstelle ermöglicht Codeausführung | 2025-02-11T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2024-3558 | GNU Emacs und Red Hat Enterprise Linux: Schwachstelle ermöglicht Codeausführung | 2024-11-27T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2024-3542 | Red Hat OpenShift: Mehrere Schwachstellen | 2024-11-25T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2024-2067 | Golang Go: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-09-05T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2022-1538 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-09-26T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2022-0117 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-03-28T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2802 | Notepad++: Schwachstelle ermöglicht Codeausführung | 2025-12-09T23:00:00.000+00:00 | 2026-02-03T23:00:00.000+00:00 |
| wid-sec-w-2026-0271 | Keycloak (Admin API): Schwachstelle ermöglicht Offenlegung von Informationen | 2026-02-01T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0230 | Mozilla Thunderbird: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-27T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0202 | Logback: Schwachstelle ermöglicht Manipulation von Daten | 2026-01-22T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0179 | GNU libc: Schwachstelle ermöglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0132 | GNU libc: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-15T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2475 | Apple macOS: Mehrere Schwachstellen | 2025-11-03T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2473 | Apple iOS: Mehrere Schwachstellen | 2025-11-03T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| bsi-2026-0001 | Unauthorized access affects VibroLine and AvibiaLine devices | 2026-02-02T13:00:00.000Z | 2026-02-02T13:00:00.000Z |
| wid-sec-w-2023-2788 | GitLab: Mehrere Schwachstellen | 2023-10-31T23:00:00.000+00:00 | 2026-01-29T23:00:00.000+00:00 |
| wid-sec-w-2026-0235 | Nvidia Treiber: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-226-21 | Siemens BFCClient | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-20 | Siemens RUGGEDCOM ROX II | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-19 | Siemens SINUMERIK | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-17 | Siemens SINEC Traffic Analyzer | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-16 | Siemens SICAM Q100/Q200 | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-14 | Siemens RUGGEDCOM ROX II | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-13 | Siemens SIMATIC RTLS Locating Manager | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-12 | Siemens SIPROTEC 4 and SIPROTEC 4 Compact | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-10 | Siemens SIPROTEC 5 | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-08 | Siemens RUGGEDCOM CROSSBOW Station Access Controller | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-06 | Siemens Opcenter Quality | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-04 | Siemens Simcenter Femap | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-02 | Siemens COMOS | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-01 | Siemens SIMATIC RTLS Locating Manager | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-191-05 | Siemens TIA Project-Server and TIA Portal | 2025-07-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-135-07 | Siemens SIMATIC IPC RS-828A | 2025-05-13T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-044-05 | Siemens SIPROTEC 5 Devices | 2025-02-11T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-347-05 | Siemens Siemens Engineering Platforms | 2024-12-10T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-319-12 | Siemens Mendix Runtime | 2024-11-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-256-05 | Siemens Mendix Runtime | 2024-09-10T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-193-06 | Siemens RUGGEDCOM | 2024-07-09T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-074-08 | Siemens SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family | 2024-03-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-23-348-10 | Siemens SIMATIC S7-1500 | 2023-12-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-23-222-12 | Siemens RUGGEDCOM ROS | 2023-08-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-23-222-08 | Siemens RUGGEDCOM ROS Devices | 2023-08-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-22-314-05 | Siemens RUGGEDCOM ROS | 2022-11-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-22-195-18 | Siemens RUGGEDCOM ROS Code Injection | 2022-07-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-22-069-12 | Siemens RUGGEDCOM ROS | 2022-03-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-22-069-01 | Siemens RUGGEDCOM Devices | 2022-03-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-17-271-01b | Siemens Ruggedcom ROS, SCALANCE | 2017-09-28T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-pak-mem-exhst-3ke9FeFy | Cisco IOS XR Software UDP Packet Memory Exhaustion Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-l2services-2mvhdnuc | Cisco IOS XR Software Network Convergence System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-l2services-2mvHdNuC | Cisco IOS XR Software Network Convergence System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-isis-xehpbvne | Cisco IOS XR Software Segment Routing for Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-isis-xehpbVNe | Cisco IOS XR Software Segment Routing for Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-xml-tcpdos-zexvru2s | Cisco IOS XR Software Dedicated XML Agent TCP Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-xml-tcpdos-ZEXvrU2S | Cisco IOS XR Software Dedicated XML Agent TCP Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-shellutil-hcb278wd | Cisco IOS XR Software CLI Arbitrary File Read Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-shellutil-HCb278wD | Cisco IOS XR Software CLI Arbitrary File Read Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-priv-esc-crg5vhcq | Cisco IOS XR Software CLI Privilege Escalation Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-priv-esc-CrG5vhCq | Cisco IOS XR Software CLI Privilege Escalation Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-ponctlr-ci-ohchmsfl | Cisco Routed Passive Optical Network Controller Vulnerabilities | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-ponctlr-ci-OHcHmsFL | Cisco Routed Passive Optical Network Controller Vulnerabilities | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-ise-info-exp-vdf8jbyk | Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-09-05T13:14:02+00:00 |
| cisco-sa-ise-info-exp-vdF8Jbyk | Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-09-05T13:14:02+00:00 |
| cisco-sa-meraki-agent-dll-hj-ptn7ptke | Cisco Meraki Systems Manager Agent for Windows Privilege Escalation Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-meraki-agent-dll-hj-Ptn7PtKe | Cisco Meraki Systems Manager Agent for Windows Privilege Escalation Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-ise-injection-6kn9tsxm | Cisco Identity Services Engine Command Injection Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-ise-injection-6kn9tSxm | Cisco Identity Services Engine Command Injection Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-expressway-auth-kdfrcz2j | Cisco Expressway Edge Improper Authorization Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-expressway-auth-kdFrcZ2j | Cisco Expressway Edge Improper Authorization Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-duo-epic-info-sdlv6h8y | Cisco Duo Epic for Hyperdrive Information Disclosure Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-duo-epic-info-sdLv6h8y | Cisco Duo Epic for Hyperdrive Information Disclosure Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-cslu-7gHMzWmw | Cisco Smart Licensing Utility Vulnerabilities | 2024-09-04T16:00:00+00:00 | 2025-04-04T17:44:00+00:00 |
| cisco-sa-radius-spoofing-july-2024-87ccdwz3 | RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS): July 2024 | 2024-07-10T16:00:00+00:00 | 2024-09-03T14:10:25+00:00 |
| cisco-sa-radius-spoofing-july-2024-87cCDwZ3 | RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS): July 2024 | 2024-07-10T16:00:00+00:00 | 2024-09-03T14:10:25+00:00 |
| cisco-sa-multi-vuln-finesse-qp6gbuo2 | Multiple Cisco Products OpenSocial Gadget Editor Vulnerabilities | 2021-01-13T16:00:00+00:00 | 2024-09-03T13:04:54+00:00 |
| cisco-sa-multi-vuln-finesse-qp6gbUO2 | Multiple Cisco Products OpenSocial Gadget Editor Vulnerabilities | 2021-01-13T16:00:00+00:00 | 2024-09-03T13:04:54+00:00 |
| cisco-sa-nxos-psbe-ce-yvbtn5du | Cisco NX-OS Software Python Sandbox Escape Vulnerabilities | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-nxos-psbe-ce-YvbTn5du | Cisco NX-OS Software Python Sandbox Escape Vulnerabilities | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-55554 | pytorch v2.8.0 was discovered to contain an integer overflow in the component torch.nan_to_num-.long(). | 2025-09-02T00:00:00.000Z | 2026-03-31T15:18:27.000Z |
| msrc_cve-2026-4519 | webbrowser.open() allows leading dashes in URLs | 2026-03-02T00:00:00.000Z | 2026-03-31T15:18:21.000Z |
| msrc_cve-2025-55551 | An issue in the component torch.linalg.lu of pytorch v2.8.0 allows attackers to cause a Denial of Service (DoS) when performing a slice operation. | 2025-09-02T00:00:00.000Z | 2026-03-31T15:18:19.000Z |
| msrc_cve-2024-49937 | wifi: cfg80211: Set correct chandef when starting CAC | 2024-10-01T07:00:00.000Z | 2026-03-31T15:18:17.000Z |
| msrc_cve-2024-35808 | md/dm-raid: don't call md_reap_sync_thread() directly | 2024-05-02T07:00:00.000Z | 2026-03-31T15:18:17.000Z |
| msrc_cve-2025-69720 | CVE-2025-69720 | 2026-03-02T00:00:00.000Z | 2026-03-31T15:18:12.000Z |
| msrc_cve-2024-39508 | io_uring/io-wq: Use set_bit() and test_bit() at worker->flags | 2024-07-01T07:00:00.000Z | 2026-03-31T15:18:10.000Z |
| msrc_cve-2024-49939 | wifi: rtw89: avoid to add interface to list twice when SER | 2024-10-01T07:00:00.000Z | 2026-03-31T15:18:09.000Z |
| msrc_cve-2024-26866 | spi: lpspi: Avoid potential use-after-free in probe() | 2024-04-02T07:00:00.000Z | 2026-03-31T15:18:08.000Z |
| msrc_cve-2025-21976 | fbdev: hyperv_fb: Allow graceful removal of framebuffer | 2025-04-02T00:00:00.000Z | 2026-03-31T15:18:02.000Z |
| msrc_cve-2024-50248 | ntfs3: Add bounds checking to mi_enum_attr() | 2024-11-02T00:00:00.000Z | 2026-03-31T15:17:59.000Z |
| msrc_cve-2024-38620 | Bluetooth: HCI: Remove HCI_AMP support | 2024-06-02T07:00:00.000Z | 2026-03-31T15:17:59.000Z |
| msrc_cve-2024-26893 | firmware: arm_scmi: Fix double free in SMC transport cleanup path | 2024-04-02T07:00:00.000Z | 2026-03-31T15:17:57.000Z |
| msrc_cve-2024-36951 | drm/amdkfd: range check cp bad op exception interrupts | 2024-05-02T07:00:00.000Z | 2026-03-31T15:17:49.000Z |
| msrc_cve-2024-49925 | fbdev: efifb: Register sysfs groups through driver core | 2024-10-01T07:00:00.000Z | 2026-03-31T15:17:48.000Z |
| msrc_cve-2025-21658 | btrfs: avoid NULL pointer dereference if no valid extent tree | 2025-01-02T00:00:00.000Z | 2026-03-31T15:17:47.000Z |
| msrc_cve-2025-37907 | accel/ivpu: Fix locking order in ivpu_job_submit | 2025-05-02T00:00:00.000Z | 2026-03-31T15:17:45.000Z |
| msrc_cve-2024-36949 | amd/amdkfd: sync all devices to wait all processes being evicted | 2024-05-02T07:00:00.000Z | 2026-03-31T15:17:37.000Z |
| msrc_cve-2024-50243 | fs/ntfs3: Fix general protection fault in run_is_mapped_full | 2024-11-02T00:00:00.000Z | 2026-03-31T15:17:36.000Z |
| msrc_cve-2024-57895 | ksmbd: set ATTR_CTIME flags when setting mtime | 2025-01-02T00:00:00.000Z | 2026-03-31T15:17:35.000Z |
| msrc_cve-2024-36024 | drm/amd/display: Disable idle reallow as part of command/gpint execution | 2024-05-02T07:00:00.000Z | 2026-03-31T15:17:33.000Z |
| msrc_cve-2024-46860 | wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change | 2024-09-01T07:00:00.000Z | 2026-03-31T15:17:26.000Z |
| msrc_cve-2024-36922 | wifi: iwlwifi: read txq->read_ptr under lock | 2024-05-02T07:00:00.000Z | 2026-03-31T15:17:21.000Z |
| msrc_cve-2024-49885 | mm, slub: avoid zeroing kmalloc redzone | 2024-10-01T07:00:00.000Z | 2026-03-31T15:17:19.000Z |
| msrc_cve-2024-56692 | f2fs: fix to do sanity check on node blkaddr in truncate_node() | 2024-12-02T00:00:00.000Z | 2026-03-31T15:17:18.000Z |
| msrc_cve-2024-26914 | drm/amd/display: fix incorrect mpc_combine array size | 2024-04-02T07:00:00.000Z | 2026-03-31T15:17:17.000Z |
| msrc_cve-2024-36244 | net/sched: taprio: extend minimum interval restriction to entire cycle too | 2024-06-02T07:00:00.000Z | 2026-03-31T15:17:07.000Z |
| msrc_cve-2023-52582 | netfs: Only call folio_start_fscache() one time for each folio | 2024-03-02T08:00:00.000Z | 2026-03-31T15:17:06.000Z |
| msrc_cve-2024-49932 | btrfs: don't readahead the relocation inode on RST | 2024-10-01T07:00:00.000Z | 2026-03-31T15:17:05.000Z |
| msrc_cve-2025-23131 | dlm: prevent NPD when writing a positive value to event_done | 2025-04-02T00:00:00.000Z | 2026-03-31T15:17:03.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0077 | Kwetsbaarheden verholpen in Siemens producten | 2025-03-11T12:30:29.277759Z | 2025-03-11T12:30:29.277759Z |
| ncsc-2025-0076 | Kwetsbaarheden verholpen in SAP software | 2025-03-11T12:20:06.258896Z | 2025-03-11T12:20:06.258896Z |
| ncsc-2025-0075 | Kwetsbaarheid verholpen in Elastic Kibana | 2025-03-07T13:51:51.509917Z | 2025-03-07T13:51:51.509917Z |
| ncsc-2025-0074 | Kwetsbaarheden verholpen in IBM Storage producten | 2025-03-04T14:14:48.398751Z | 2025-03-04T14:14:48.398751Z |
| ncsc-2025-0073 | Kwetsbaarheden verholpen in VMware producten | 2025-03-04T14:11:56.959153Z | 2025-03-04T14:11:56.959153Z |
| ncsc-2025-0072 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-03-04T10:15:32.203439Z | 2025-03-04T10:15:32.203439Z |
| ncsc-2025-0071 | Kwetsbaarheid verholpen in Zohocorp ManageEngine ADSelfService Plus | 2025-03-03T14:11:46.709999Z | 2025-03-03T14:11:46.709999Z |
| ncsc-2025-0070 | Kwetsbaarheden verholpen in GitLab | 2025-03-03T14:10:30.120360Z | 2025-03-03T14:10:30.120360Z |
| ncsc-2025-0069 | Kwetsbaarheid verholpen in MITRE Caldera | 2025-02-25T07:42:48.535179Z | 2025-02-25T07:42:48.535179Z |
| ncsc-2025-0068 | Kwetsbaarheden verholpen in Mattermost | 2025-02-24T12:04:19.392654Z | 2025-02-24T12:04:19.392654Z |
| ncsc-2025-0067 | Kwetsbaarheid verholpen in Exim | 2025-02-21T12:54:32.376733Z | 2025-02-21T12:54:32.376733Z |
| ncsc-2025-0066 | Kwetsbaarheid verholpen in XWiki | 2025-02-21T12:33:24.503983Z | 2025-02-21T12:33:24.503983Z |
| ncsc-2025-0065 | Kwetsbaarheden verholpen in Nagios XI | 2025-02-21T12:32:41.120020Z | 2025-02-21T12:32:41.120020Z |
| ncsc-2025-0064 | Kwetsbaarheden verholpen in IBM Cognos Controller | 2025-02-21T08:40:26.849797Z | 2025-02-21T08:40:26.849797Z |
| ncsc-2025-0058 | Kwetsbaarheden verholpen in Palo Alto Networks PAN-OS | 2025-02-13T09:28:54.459828Z | 2025-02-21T08:08:58.513404Z |
| ncsc-2025-0063 | Kwetsbaarheid verholpen in PostgreSQL | 2025-02-19T09:11:55.511966Z | 2025-02-19T09:11:55.511966Z |
| ncsc-2025-0062 | Kwetsbaarheid verholpen in Juniper Session Smart Router | 2025-02-18T14:25:56.916762Z | 2025-02-18T14:25:56.916762Z |
| ncsc-2025-0053 | Kwetsbaarheden verholpen in Fortinet FortiSwitch, FortiManager, FortiAnalyzer, FortiOS en FortiProxy | 2025-02-12T12:39:02.366846Z | 2025-02-18T08:09:48.619964Z |
| ncsc-2025-0004 | Kwetsbaarheden verholpen in SonicWall SonicOS | 2025-01-08T09:57:24.409437Z | 2025-02-18T08:09:28.652034Z |
| ncsc-2025-0061 | Kwetsbaarheden verholpen in Siemens producten | 2025-02-14T08:46:28.240775Z | 2025-02-14T08:46:28.240775Z |
| ncsc-2025-0060 | Kwetsbaarheid verholpen in Veeam | 2025-02-13T09:48:03.729080Z | 2025-02-13T09:48:03.729080Z |
| ncsc-2025-0059 | Kwetsbaarheid verholpen in Fortinet FortiOS | 2025-02-13T09:29:35.625977Z | 2025-02-13T09:29:35.625977Z |
| ncsc-2025-0057 | Kwetsbaarheden verholpen in GitLab CE/EE | 2025-02-13T09:09:26.087113Z | 2025-02-13T09:09:26.087113Z |
| ncsc-2025-0056 | Kwetsbaarheden verholpen in Schneider Electric ASCO | 2025-02-13T09:07:55.191514Z | 2025-02-13T09:07:55.191514Z |
| ncsc-2025-0055 | Kwetsbaarheid verholpen in CrowdStrike Falcon sensor | 2025-02-13T08:22:07.880125Z | 2025-02-13T08:22:07.880125Z |
| ncsc-2025-0054 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2025-02-13T06:46:08.560650Z | 2025-02-13T06:46:08.560650Z |
| ncsc-2025-0052 | Kwetsbaarheden verholpen in Ivanti Connect Secure en Ivanti Policy Secure | 2025-02-12T09:35:30.260596Z | 2025-02-12T09:35:30.260596Z |
| ncsc-2025-0051 | Kwetsbaarheden verholpen in Siemens producten | 2025-02-11T19:40:34.993264Z | 2025-02-11T19:40:34.993264Z |
| ncsc-2025-0050 | Kwetsbaarheden verholpen in Microsoft Office | 2025-02-11T19:19:24.863294Z | 2025-02-11T19:19:24.863294Z |
| ncsc-2025-0049 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2025-02-11T19:17:58.768578Z | 2025-02-11T19:17:58.768578Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20266-1 | Security update for postgresql15 | 2026-02-20T16:18:08Z | 2026-02-20T16:18:08Z |
| opensuse-su-2026:20265-1 | Security update for postgresql14 | 2026-02-20T16:14:27Z | 2026-02-20T16:14:27Z |
| opensuse-su-2026:20262-1 | Security update for docker-stable | 2026-02-20T15:40:19Z | 2026-02-20T15:40:19Z |
| opensuse-su-2026:10233-1 | kyverno-1.17.1-1.1 on GA media | 2026-02-20T00:00:00Z | 2026-02-20T00:00:00Z |
| opensuse-su-2026:10232-1 | cosign-3.0.4-2.1 on GA media | 2026-02-20T00:00:00Z | 2026-02-20T00:00:00Z |
| opensuse-su-2026:10231-1 | busybox-1.37.0-9.1 on GA media | 2026-02-20T00:00:00Z | 2026-02-20T00:00:00Z |
| opensuse-su-2026:20257-1 | Security update for python-Authlib | 2026-02-19T13:21:50Z | 2026-02-19T13:21:50Z |
| opensuse-su-2026:20253-1 | Security update for MozillaFirefox | 2026-02-19T11:09:58Z | 2026-02-19T11:09:58Z |
| opensuse-su-2026:20254-1 | Security update for python313 | 2026-02-19T10:31:04Z | 2026-02-19T10:31:04Z |
| opensuse-su-2026:20248-1 | Security update for chromium | 2026-02-19T02:43:57Z | 2026-02-19T02:43:57Z |
| opensuse-su-2026:10230-1 | vexctl-0.4.1+git78.f951e3a-1.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| opensuse-su-2026:10229-1 | ucode-intel-20260210-1.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| opensuse-su-2026:10228-1 | syft-1.42.1-1.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| opensuse-su-2026:10227-1 | python311-py7zr-1.1.0-1.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| opensuse-su-2026:10226-1 | python311-nltk-3.9.1-3.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| opensuse-su-2026:10225-1 | MozillaFirefox-147.0.4-1.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| opensuse-su-2026:20252-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-02-18T16:14:15Z | 2026-02-18T16:14:15Z |
| opensuse-su-2026:20251-1 | Security update for cockpit-repos | 2026-02-18T11:22:31Z | 2026-02-18T11:22:31Z |
| opensuse-su-2026:20249-1 | Security update for docker | 2026-02-18T09:41:33Z | 2026-02-18T09:41:33Z |
| opensuse-su-2026:10224-1 | rclone-1.73.1-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10223-1 | python313-3.13.12-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10222-1 | python312-3.12.12-5.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10221-1 | python311-3.11.14-4.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10220-1 | istioctl-1.28.4-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10219-1 | dnsdist-2.0.2-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10218-1 | MozillaThunderbird-140.7.2-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:20244-1 | Security update for cockpit-machines, cockpit | 2026-02-17T14:20:44Z | 2026-02-17T14:20:44Z |
| opensuse-su-2026:20245-1 | Security update for wicked2nm | 2026-02-17T14:08:05Z | 2026-02-17T14:08:05Z |
| opensuse-su-2026:20239-1 | Security update for golang-github-prometheus-prometheus | 2026-02-17T09:54:15Z | 2026-02-17T09:54:15Z |
| opensuse-su-2026:10217-1 | traefik-3.6.8-1.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:3831 | Red Hat Security Advisory: grafana security update | 2026-03-05T07:55:46+00:00 | 2026-04-20T14:13:08+00:00 |
| rhsa-2026:3827 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.20.3 | 2026-03-05T07:31:32+00:00 | 2026-04-20T14:13:08+00:00 |
| rhsa-2026:3825 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.20.3 | 2026-03-05T07:08:51+00:00 | 2026-04-20T14:13:07+00:00 |
| rhsa-2026:3822 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:53:01+00:00 | 2026-04-20T14:13:07+00:00 |
| rhsa-2026:3559 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.14 | 2026-03-02T17:03:40+00:00 | 2026-04-20T14:13:07+00:00 |
| rhsa-2026:3821 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:51:55+00:00 | 2026-04-20T14:13:06+00:00 |
| rhsa-2026:3818 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:11:00+00:00 | 2026-04-20T14:13:06+00:00 |
| rhsa-2026:3816 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T05:42:24+00:00 | 2026-04-20T14:13:06+00:00 |
| rhsa-2026:3752 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-04T15:29:36+00:00 | 2026-04-20T14:13:06+00:00 |
| rhsa-2026:3815 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T05:32:24+00:00 | 2026-04-20T14:13:05+00:00 |
| rhsa-2026:3812 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T04:13:33+00:00 | 2026-04-20T14:13:04+00:00 |
| rhsa-2026:3753 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-04T15:52:29+00:00 | 2026-04-20T14:13:04+00:00 |
| rhsa-2026:3723 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.15.4 | 2026-03-04T08:59:26+00:00 | 2026-04-20T14:13:04+00:00 |
| rhsa-2026:3718 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.15.4 | 2026-03-04T07:52:57+00:00 | 2026-04-20T14:13:04+00:00 |
| rhsa-2026:3712 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.15.4 | 2026-03-04T07:12:04+00:00 | 2026-04-20T14:13:04+00:00 |
| rhsa-2026:3710 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.15.3 | 2026-03-04T06:00:07+00:00 | 2026-04-20T14:13:03+00:00 |
| rhsa-2026:3556 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.14 | 2026-03-02T16:52:33+00:00 | 2026-04-20T14:13:03+00:00 |
| rhsa-2026:3506 | Red Hat Security Advisory: yggdrasil security update | 2026-03-02T06:45:32+00:00 | 2026-04-20T14:13:03+00:00 |
| rhsa-2026:3489 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T02:56:16+00:00 | 2026-04-20T14:13:02+00:00 |
| rhsa-2026:3473 | Red Hat Security Advisory: golang security update | 2026-03-02T01:23:25+00:00 | 2026-04-20T14:13:02+00:00 |
| rhsa-2026:3472 | Red Hat Security Advisory: golang security update | 2026-03-02T01:26:30+00:00 | 2026-04-20T14:13:02+00:00 |
| rhsa-2026:3471 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T01:35:05+00:00 | 2026-04-20T14:13:02+00:00 |
| rhsa-2026:3469 | Red Hat Security Advisory: golang security update | 2026-03-02T01:34:30+00:00 | 2026-04-20T14:13:01+00:00 |
| rhsa-2026:3459 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.9.0 release | 2026-02-26T19:58:40+00:00 | 2026-04-20T14:13:01+00:00 |
| rhsa-2026:3336 | Red Hat Security Advisory: podman security update | 2026-02-25T11:30:01+00:00 | 2026-04-20T14:13:01+00:00 |
| rhsa-2026:3188 | Red Hat Security Advisory: grafana security update | 2026-02-24T11:39:36+00:00 | 2026-04-20T14:13:01+00:00 |
| rhsa-2026:3297 | Red Hat Security Advisory: buildah security update | 2026-02-25T09:09:30+00:00 | 2026-04-20T14:13:00+00:00 |
| rhsa-2026:3428 | Red Hat Security Advisory: container-tools:rhel8 security update | 2026-02-26T14:36:45+00:00 | 2026-04-20T14:12:59+00:00 |
| rhsa-2026:3343 | Red Hat Security Advisory: skopeo security update | 2026-02-25T11:50:40+00:00 | 2026-04-20T14:12:59+00:00 |
| rhsa-2026:3341 | Red Hat Security Advisory: containernetworking-plugins security update | 2026-02-25T12:14:45+00:00 | 2026-04-20T14:12:59+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| SSA-128433 | SSA-128433: Multiple Vulnerabilities in SINEC NMS before V2.0 SP2 | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-943925 | SSA-943925: Multiple Vulnerabilities in SINEC NMS before V2.0 SP1 | 2024-02-13T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-918992 | SSA-918992: Unused HTTP Service on SENTRON 3KC ATC6 Ethernet Module | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-770721 | SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-699386 | SSA-699386: Multiple Vulnerabilities in SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family before V4.5 | 2023-11-14T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-693975 | SSA-693975: Denial-of-Service Vulnerability in the Web Server of Industrial Products | 2023-12-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-653855 | SSA-653855: Information Disclosure vulnerability in SINEMA Remote Connect Client before V3.1 SP1 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-576771 | SSA-576771: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-145196 | SSA-145196: Authorization Bypass Vulnerability in Siveillance Control | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-000072 | SSA-000072: Multiple File Parsing Vulnerabilities in Simcenter Femap | 2024-02-13T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-943925 | SSA-943925: Multiple Vulnerabilities in SINEC NMS before V2.0 SP1 | 2024-02-13T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-918992 | SSA-918992: Unused HTTP Service on SENTRON 3KC ATC6 Ethernet Module | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-792319 | SSA-792319: Missing Read Out Protection in SENTRON 7KM PAC3x20 Devices | 2024-03-12T00:00:00Z | 2024-09-10T00:00:00Z |
| SSA-770721 | SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-699386 | SSA-699386: Multiple Vulnerabilities in SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family before V4.5 | 2023-11-14T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-693975 | SSA-693975: Denial-of-Service Vulnerability in the Web Server of Industrial Products | 2023-12-12T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-653855 | SSA-653855: Information Disclosure vulnerability in SINEMA Remote Connect Client before V3.1 SP1 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-576771 | SSA-576771: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-366067 | SSA-366067: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.1 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| SSA-145196 | SSA-145196: Authorization Bypass Vulnerability in Siveillance Control | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-000072 | SSA-000072: Multiple File Parsing Vulnerabilities in Simcenter Femap | 2024-02-13T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-806742 | SSA-806742: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-797296 | SSA-797296: XT File Parsing Vulnerability in Parasolid | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-647068 | SSA-647068: Ripple20 in SIMATIC RTLS Gateways | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-602936 | SSA-602936: Multiple Vulnerabilities in SCALANCE SC-600 Family before V3.1 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-580228 | SSA-580228: Use of Hard-Coded Credentials Vulnerability in Location Intelligence before V4.3 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-543502 | SSA-543502: Local Privilege Escalation Vulnerability in Unicam FX | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-516818 | SSA-516818: TCP Sequence Number Validation Vulnerability in the TCP/IP Stack of CP343-1 Devices | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-309571 | SSA-309571: IPU 2021.1 Vulnerabilities in Siemens Industrial Products using Intel CPUs (June 2021) | 2021-08-10T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-108696 | SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20889-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:44Z | 2026-03-24T16:49:44Z |
| suse-su-2026:20888-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:44Z | 2026-03-24T16:49:44Z |
| suse-su-2026:20866-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:44Z | 2026-03-24T16:49:44Z |
| suse-su-2026:20865-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:44Z | 2026-03-24T16:49:44Z |
| suse-su-2026:20887-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:34Z | 2026-03-24T16:49:34Z |
| suse-su-2026:20886-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:34Z | 2026-03-24T16:49:34Z |
| suse-su-2026:20864-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:34Z | 2026-03-24T16:49:34Z |
| suse-su-2026:20863-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:34Z | 2026-03-24T16:49:34Z |
| suse-su-2026:20885-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:25Z | 2026-03-24T16:49:25Z |
| suse-su-2026:20884-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:25Z | 2026-03-24T16:49:25Z |
| suse-su-2026:20862-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:25Z | 2026-03-24T16:49:25Z |
| suse-su-2026:20861-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:25Z | 2026-03-24T16:49:25Z |
| suse-su-2026:20883-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:13Z | 2026-03-24T16:49:13Z |
| suse-su-2026:20882-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:13Z | 2026-03-24T16:49:13Z |
| suse-su-2026:20860-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:13Z | 2026-03-24T16:49:13Z |
| suse-su-2026:20859-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:13Z | 2026-03-24T16:49:13Z |
| suse-su-2026:20881-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:03Z | 2026-03-24T16:49:03Z |
| suse-su-2026:20880-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:03Z | 2026-03-24T16:49:03Z |
| suse-su-2026:20858-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:03Z | 2026-03-24T16:49:03Z |
| suse-su-2026:20857-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:03Z | 2026-03-24T16:49:03Z |
| suse-su-2026:20900-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:56Z | 2026-03-24T16:48:56Z |
| suse-su-2026:20899-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:56Z | 2026-03-24T16:48:56Z |
| suse-su-2026:20856-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:56Z | 2026-03-24T16:48:56Z |
| suse-su-2026:20855-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:56Z | 2026-03-24T16:48:56Z |
| suse-su-2026:20898-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:44Z | 2026-03-24T16:48:44Z |
| suse-su-2026:20897-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:44Z | 2026-03-24T16:48:44Z |
| suse-su-2026:20854-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:44Z | 2026-03-24T16:48:44Z |
| suse-su-2026:20853-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:44Z | 2026-03-24T16:48:44Z |
| suse-su-2026:20845-1 | Security update for the Linux Kernel | 2026-03-24T16:48:38Z | 2026-03-24T16:48:38Z |
| suse-su-2026:20896-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:35Z | 2026-03-24T16:48:35Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:23664 | Important: opentelemetry-collector security update | 2025-12-18T00:00:00Z | 2025-12-23T13:09:37Z |
| alsa-2025:23729 | Important: opentelemetry-collector security update | 2025-12-21T00:00:00Z | 2025-12-23T13:07:45Z |
| alsa-2025:23932 | Important: httpd security update | 2025-12-22T00:00:00Z | 2025-12-23T06:01:50Z |
| alsa-2025:23940 | Moderate: python3.12 security update | 2025-12-22T00:00:00Z | 2025-12-23T05:59:49Z |
| alsa-2025:23382 | Moderate: binutils security update | 2025-12-16T00:00:00Z | 2025-12-22T14:14:14Z |
| alsa-2025:23383 | Moderate: curl security update | 2025-12-16T00:00:00Z | 2025-12-22T14:12:06Z |
| alsa-2025:23530 | Important: python39:3.9 security update | 2025-12-17T00:00:00Z | 2025-12-22T14:10:23Z |
| alsa-2025:23663 | Important: webkit2gtk3 security update | 2025-12-18T00:00:00Z | 2025-12-22T14:04:48Z |
| alsa-2025:23732 | Important: httpd:2.4 security update | 2025-12-22T00:00:00Z | 2025-12-22T14:02:23Z |
| alsa-2025:23201 | Important: keylime security update | 2025-12-15T00:00:00Z | 2025-12-22T14:00:47Z |
| alsa-2025:23294 | Moderate: skopeo security update | 2025-12-16T00:00:00Z | 2025-12-22T13:59:22Z |
| alsa-2025:23306 | Moderate: binutils security update | 2025-12-16T00:00:00Z | 2025-12-22T13:58:22Z |
| alsa-2025:23295 | Moderate: podman security update | 2025-12-16T00:00:00Z | 2025-12-22T13:57:14Z |
| alsa-2025:23309 | Moderate: php:8.3 security update | 2025-12-16T00:00:00Z | 2025-12-22T13:55:21Z |
| alsa-2025:23323 | Moderate: python3.12 security update | 2025-12-16T00:00:00Z | 2025-12-22T13:52:25Z |
| alsa-2025:23325 | Moderate: podman security update | 2025-12-16T00:00:00Z | 2025-12-22T13:50:22Z |
| alsa-2025:23326 | Moderate: skopeo security update | 2025-12-16T00:00:00Z | 2025-12-22T13:49:03Z |
| alsa-2025:23343 | Moderate: binutils security update | 2025-12-16T00:00:00Z | 2025-12-22T13:47:22Z |
| alsa-2025:23342 | Moderate: python3.9 security update | 2025-12-16T00:00:00Z | 2025-12-22T13:45:25Z |
| alsa-2025:23336 | Moderate: gcc-toolset-13-binutils security update | 2025-12-16T00:00:00Z | 2025-12-22T13:43:11Z |
| alsa-2025:23667 | Important: git-lfs security update | 2025-12-18T00:00:00Z | 2025-12-22T13:42:09Z |
| alsa-2025:23700 | Important: webkit2gtk3 security update | 2025-12-18T00:00:00Z | 2025-12-22T13:39:46Z |
| alsa-2025:23738 | Important: mod_md security update | 2025-12-22T00:00:00Z | 2025-12-22T13:38:35Z |
| alsa-2025:23739 | Important: mod_md security update | 2025-12-22T00:00:00Z | 2025-12-22T13:37:02Z |
| alsa-2025:23744 | Important: git-lfs security update | 2025-12-22T00:00:00Z | 2025-12-22T12:38:08Z |
| alsa-2025:23745 | Important: git-lfs security update | 2025-12-22T00:00:00Z | 2025-12-22T12:34:52Z |
| alsa-2025:23479 | Moderate: openssh security update | 2025-12-17T00:00:00Z | 2025-12-21T20:05:20Z |
| alsa-2025:23480 | Moderate: openssh security update | 2025-12-17T00:00:00Z | 2025-12-21T20:03:34Z |
| alsa-2025:23481 | Moderate: openssh security update | 2025-12-17T00:00:00Z | 2025-12-21T20:00:09Z |
| alsa-2025:23483 | Moderate: libssh security update | 2025-12-17T00:00:00Z | 2025-12-21T19:54:52Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-289 | Stack-buffer-overflow in ot::Cli::Utils::OutputLine | 2025-04-19T00:05:17.593162Z | 2025-04-19T00:05:17.593788Z |
| osv-2025-275 | UNKNOWN READ in void std::__1::vector<unsigned char, std::__1::allocator<unsigned char>>::__cons | 2025-04-14T00:02:37.519708Z | 2025-04-17T14:43:50.559313Z |
| osv-2024-1272 | Segv on unknown address in std::__1::ios_base::~ios_base | 2024-11-05T00:03:30.787980Z | 2025-04-17T14:38:30.981292Z |
| osv-2024-987 | Heap-buffer-overflow in pcpp::NDPNeighborAdvertisementLayer::toString | 2024-08-16T00:15:31.057826Z | 2025-04-16T14:29:47.716122Z |
| osv-2024-801 | UNKNOWN READ in PointerVector.h | 2024-08-16T00:02:10.140304Z | 2025-04-16T14:27:34.855775Z |
| osv-2025-271 | Use-of-uninitialized-value in luaS_new | 2025-04-11T00:04:20.869490Z | 2025-04-11T00:04:20.869967Z |
| osv-2024-1218 | UNKNOWN READ in Poco::UTF16Encoding::queryConvert | 2024-10-14T00:08:40.382545Z | 2025-04-10T14:48:52.198172Z |
| osv-2025-264 | Security exception in org.joni.Parser.parseCharClass | 2025-04-08T00:00:08.174777Z | 2025-04-08T00:00:08.175341Z |
| osv-2025-260 | Heap-buffer-overflow in bfd_getb16 | 2025-04-06T00:00:51.202273Z | 2025-04-06T00:00:51.202704Z |
| osv-2024-1164 | Use-of-uninitialized-value in format_message | 2024-10-02T00:13:05.449687Z | 2025-04-05T14:45:16.595433Z |
| osv-2025-258 | Global-buffer-overflow in parseExtraField | 2025-04-05T00:05:58.760780Z | 2025-04-05T00:05:58.761154Z |
| osv-2025-256 | Global-buffer-overflow in QByteArray::QByteArray | 2025-04-05T00:02:36.742745Z | 2025-04-05T00:02:36.743233Z |
| osv-2024-947 | Heap-buffer-overflow in pcpp::SomeIpSdEntry::SomeIpSdEntry | 2024-08-16T00:13:30.824621Z | 2025-04-03T14:42:12.138019Z |
| osv-2025-251 | Heap-buffer-overflow in icu_78::RegexMatcher::MatchChunkAt | 2025-04-02T00:16:00.337471Z | 2025-04-02T00:16:00.337850Z |
| osv-2025-248 | Heap-buffer-overflow in cli_bm_addpatt | 2025-04-02T00:00:13.427589Z | 2025-04-02T00:00:13.428120Z |
| osv-2025-240 | Security exception in com.powsybl.commons.xml.XmlUtil.lambda$skipSubElements$0 | 2025-03-28T00:05:50.145107Z | 2025-03-30T14:32:19.516483Z |
| osv-2023-1168 | Heap-buffer-overflow in pcpp::PPP_PPTPLayer::computeCalculateFields | 2023-11-16T13:00:57.037733Z | 2025-03-28T14:23:56.681348Z |
| osv-2025-230 | Heap-buffer-overflow in wasm_loader_prepare_bytecode | 2025-03-22T00:05:22.916187Z | 2025-03-22T00:05:22.916485Z |
| osv-2022-597 | Heap-use-after-free in .tmpgt0oOx | 2022-07-19T00:01:55.792573Z | 2025-03-21T14:13:26.227734Z |
| osv-2025-226 | UNKNOWN READ in extract_sess_version | 2025-03-21T00:19:10.852617Z | 2025-03-21T00:19:10.852969Z |
| osv-2024-867 | Use-of-uninitialized-value in std::__1::ostreambuf_iterator<char, std::__1::char_traits<char>> std::__1::__pad | 2024-08-16T00:05:38.614485Z | 2025-03-19T14:29:11.494602Z |
| osv-2024-352 | Heap-buffer-overflow in __parse_options | 2024-04-30T00:04:28.080620Z | 2025-03-19T14:25:45.717598Z |
| osv-2023-806 | Heap-buffer-overflow in H5F__accum_free | 2023-09-08T14:00:12.468140Z | 2025-03-18T00:47:11.270073Z |
| osv-2023-1223 | Heap-buffer-overflow in H5O__shared_decode | 2023-11-27T13:01:18.977198Z | 2025-03-18T00:47:06.884278Z |
| osv-2023-1091 | Heap-buffer-overflow in H5F_addr_decode | 2023-10-31T13:01:22.289748Z | 2025-03-18T00:45:36.194874Z |
| osv-2024-390 | Heap-buffer-overflow in H5O__cache_chk_serialize | 2024-04-30T00:14:19.116132Z | 2025-03-18T00:44:44.672358Z |
| osv-2023-754 | Heap-buffer-overflow in H5O__chunk_protect | 2023-08-28T14:00:10.026707Z | 2025-03-18T00:43:25.726885Z |
| osv-2023-471 | Heap-buffer-overflow in H5FS__sinfo_serialize_node_cb | 2023-06-09T14:00:54.620201Z | 2025-03-18T00:43:10.716259Z |
| osv-2023-722 | Heap-buffer-overflow in H5MM_memcpy | 2023-08-22T14:03:04.118428Z | 2025-03-18T00:42:21.984142Z |
| osv-2024-1427 | Heap-buffer-overflow in extract_mediaip | 2025-01-28T00:14:30.487391Z | 2025-03-18T00:41:33.426387Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0341 | Slow loris vulnerability with default configuration | 2024-03-15T12:00:00Z | 2024-05-21T02:12:32Z |
| rustsec-2024-0339 | Tor path lengths too short when "Vanguards lite" configured | 2024-05-15T12:00:00Z | 2024-05-21T02:12:32Z |
| rustsec-2024-0342 | Degraded secret zeroization capabilities | 2024-05-02T12:00:00Z | 2024-05-20T15:25:56Z |
| rustsec-2024-0337 | The crate `zip_next` has been renamed to `zip`. | 2024-04-20T12:00:00Z | 2024-04-24T14:13:51Z |
| rustsec-2024-0336 | `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network input | 2024-04-19T12:00:00Z | 2024-04-20T02:21:14Z |
| rustsec-2023-0079 | KyberSlash: division timings depending on secrets | 2023-12-01T12:00:00Z | 2024-04-12T21:07:31Z |
| rustsec-2024-0334 | `libp2p-tokio-socks5` is unmaintained | 2024-04-05T12:00:00Z | 2024-04-12T16:31:39Z |
| rustsec-2024-0333 | `rsa-export` is unmaintained | 2024-04-06T12:00:00Z | 2024-04-12T16:29:46Z |
| rustsec-2024-0332 | Degradation of service in h2 servers with CONTINUATION Flood | 2024-04-03T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2024-0021 | Parts of Report are dropped as the wrong type during downcast | 2024-03-05T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2024-0020 | Stack buffer overflow with whoami on several Unix platforms | 2024-02-28T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2024-0018 | ObjectPool creates uninitialized memory when freeing objects | 2024-02-27T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2024-0017 | Non-idiomatic use of iterators leads to use after free | 2024-02-28T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2024-0016 | dav1d AV1 decoder integer overflow | 2024-02-19T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2023-0085 | HPACK decoder panics on invalid input | 2023-09-15T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2024-0331 | Puccinier is unmainted. | 2024-03-31T12:00:00Z | 2024-03-31T14:44:37Z |
| rustsec-2023-0084 | `hpack` is unmaintained | 2023-09-15T12:00:00Z | 2024-03-06T14:01:14Z |
| rustsec-2023-0081 | safemem is unmaintained | 2023-02-14T12:00:00Z | 2024-03-04T18:47:07Z |
| rustsec-2024-0019 | Tokens for named pipes may be delivered after deregistration | 2024-03-04T12:00:00Z | 2024-03-04T17:51:31Z |
| rustsec-2024-0015 | filesystem-rs may be implicitly unmaintained | 2024-01-25T12:00:00Z | 2024-02-18T04:23:45Z |
| rustsec-2024-0014 | `generational-arena` is unmaintained | 2024-02-11T12:00:00Z | 2024-02-18T04:06:15Z |
| rustsec-2024-0013 | Memory corruption, denial of service, and arbitrary code execution in libgit2 | 2024-02-06T12:00:00Z | 2024-02-15T01:22:49Z |
| rustsec-2024-0010 | Improper comparison of different-length signatures | 2024-02-06T12:00:00Z | 2024-02-15T01:22:49Z |
| rustsec-2024-0007 | Use-after-free when setting the locale | 2024-01-19T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2024-0005 | Unsound sending of non-Send types across threads | 2024-01-07T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2024-0003 | Resource exhaustion vulnerability in h2 may lead to Denial of Service (DoS) | 2024-01-17T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2024-0001 | Unsound use of str::from_utf8_unchecked on bytes which are not UTF-8 | 2024-01-13T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0078 | Potential stack use-after-free in `Instrumented::into_inner` | 2023-10-19T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0075 | Unaligned write of u64 on 32-bit and 16-bit platforms | 2023-12-20T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0074 | Some Ref methods are unsound with some type parameters | 2023-12-14T12:00:00Z | 2024-02-10T15:57:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2026-1230 | Use of Incorrectly-Resolved Name or Reference in GitLab | 2026-03-13T09:35:23.537Z | 2026-03-18T09:23:06.258Z |
| bit-gitlab-2025-12704 | Missing Authorization in GitLab | 2026-03-13T09:30:55.187Z | 2026-03-18T09:23:06.258Z |
| bit-gitlab-2025-12697 | Improper Encoding or Escaping of Output in GitLab | 2026-03-13T09:30:53.383Z | 2026-03-18T09:23:06.258Z |
| bit-airflow-2026-30911 | Apache Airflow: Execution API HITL Endpoints Missing Per-Task Authorization | 2026-03-18T08:39:32.817Z | 2026-03-18T09:23:06.258Z |
| bit-airflow-2026-28779 | Apache Airflow: Path of session token in cookie does not consider base_url - session hijacking via co-hosted applications | 2026-03-18T08:39:31.052Z | 2026-03-18T09:23:06.258Z |
| bit-airflow-2026-28563 | Apache Airflow: DAG authorization bypass | 2026-03-18T08:39:29.066Z | 2026-03-18T09:23:06.258Z |
| bit-airflow-2026-26929 | Apache Airflow: Wildcard DagVersion Listing Bypasses Per‑DAG RBAC and Leaks Metadata | 2026-03-18T08:39:27.056Z | 2026-03-18T09:23:06.258Z |
| bit-mariadb-2026-3494 | MariaDB Server Audit Plugin Comment Handling Bypass | 2026-03-10T08:46:18.025Z | 2026-03-17T09:18:01.284Z |
| bit-golang-2026-27142 | URLs in meta content attribute actions are not escaped in html/template | 2026-03-10T08:44:16.859Z | 2026-03-17T09:18:01.284Z |
| bit-gitlab-2026-1182 | Improper Removal of Sensitive Information Before Storage or Transfer in GitLab | 2026-03-14T09:09:00.605Z | 2026-03-14T09:10:54.038Z |
| bit-gitlab-2026-1090 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-03-13T09:35:17.166Z | 2026-03-14T09:10:54.038Z |
| bit-parse-2026-32234 | Parse Server has a SQL injection via query field name when using PostgreSQL | 2026-03-13T12:28:58.177Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-32098 | Parse Server has a protected fields bypass via LiveQuery subscription WHERE clause | 2026-03-13T12:28:55.457Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31901 | Parse Server has user enumeration via email verification endpoint | 2026-03-13T12:28:52.748Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31875 | Parse Server MFA recovery codes not consumed after use | 2026-03-13T12:28:49.853Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31872 | Parse Server has a protected fields bypass via dot-notation in query and sort | 2026-03-13T12:28:47.303Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31871 | Parse Server has a SQL Injection via dot-notation sub-key name in `Increment` operation on PostgreSQL | 2026-03-13T12:28:44.452Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31868 | Parse Server has Stored XSS via file upload of HTML-renderable file types | 2026-03-13T12:28:41.729Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31856 | Parse Server has a SQL injection via `Increment` operation on nested object field in PostgreSQL | 2026-03-13T12:28:38.912Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31840 | Parse Server has a SQL injection via dot-notation field name in PostgreSQL | 2026-03-13T12:28:36.029Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2025-64430 | Parse Server Vulnerable to Server-Side Request Forgery (SSRF) in File Upload via URI Format | 2025-11-12T11:45:02.117Z | 2026-03-13T12:55:29.610Z |
| bit-wordpress-2026-3906 | WordPress 6.9 - 6.9.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Note Creation via REST API | 2026-03-13T09:17:59.157Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-3848 | Improper Neutralization of CRLF Sequences ('CRLF Injection') in GitLab | 2026-03-13T09:35:49.642Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-1732 | Improper Removal of Sensitive Information Before Storage or Transfer in GitLab | 2026-03-13T09:35:40.993Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-1663 | Missing Authorization in GitLab | 2026-03-13T09:35:36.922Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-1069 | Uncontrolled Recursion in GitLab | 2026-03-13T09:35:15.010Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-0602 | Authentication Bypass Using an Alternate Path or Channel in GitLab | 2026-03-13T09:35:05.636Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-14513 | Improper Validation of Specified Quantity in Input in GitLab | 2026-03-13T09:31:32.729Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-13929 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-13T09:31:23.093Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-13690 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-13T09:31:10.589Z | 2026-03-13T09:37:20.375Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-tc95380 | vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device | 2026-02-06T01:06:01.062694Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-sp51034 | Moby is an open-source project created by Docker for software containerization | 2026-02-06T00:52:59.619100Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-ps82605 | Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a ... | 2026-02-06T01:09:01.544353Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-xr99875 | Security fixes for GHSA-389x-839f-4rhx, GHSA-3p8m-j85q-pgmj, GHSA-5jpm-x58v-624v, GHSA-84h7-rjj3-6jx4, GHSA-fghv-69vj-qj49, GHSA-jq43-27x9-3v86, GHSA-qqpg-mvqg-649v applied in versions: 0.1.109-r0, 0.1.113-r1 | 2026-02-03T16:02:30.597873Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-qn16013 | Cancelling a query (e | 2026-02-03T16:02:29.512503Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-nb26505 | Security fixes for GHSA-F6X5-JH6R-WRFV, GHSA-J5W8-Q4QC-RX2X applied in versions: 4.5.1-r0 | 2026-02-03T16:02:27.744077Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-my73913 | Security fixes for GHSA-R6J8-C6R2-37RR applied in versions: 4.12.1-r0 | 2026-02-03T16:02:28.659120Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-fc21713 | Cancelling a query (e | 2026-02-03T16:02:29.570272Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-dg41269 | Cancelling a query (e | 2026-02-03T16:02:29.326704Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-cc08655 | Security fixes for GHSA-F6X5-JH6R-WRFV, GHSA-J5W8-Q4QC-RX2X applied in versions: 0.8.4-r0 | 2026-02-03T00:36:29.405423Z | 2026-02-02T12:32:10Z |
| cleanstart-2026-am95501 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-02-03T00:37:00.849369Z | 2026-02-02T12:32:10Z |
| cleanstart-2026-zz61324 | Hunspell 1 | 2026-01-30T17:14:26.562334Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zr62045 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-01-30T16:56:56.696859Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zp68963 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:47:54.288582Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zo91195 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:30:24.594235Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zm84646 | Within HostnameError | 2026-01-30T16:20:55.488130Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zm51114 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:08:25.157380Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zl24388 | Prometheus Blackbox Exporter through 0 | 2026-01-30T14:05:50.598465Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zd89666 | Within HostnameError | 2026-01-30T17:26:56.612763Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zc18474 | PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access | 2026-01-30T17:04:56.559720Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yu60015 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:08:53.316314Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yt18139 | issue was discovered in libexpat before 2 | 2026-01-30T17:26:57.202658Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ys66739 | Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3 | 2026-01-30T15:00:53.250874Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ym75307 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:34:22.430652Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ym28538 | Prometheus Blackbox Exporter through 0 | 2026-01-30T14:06:20.601766Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yl27116 | tar | 2026-01-30T14:08:51.064236Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yk82785 | Within HostnameError | 2026-01-30T14:01:20.108833Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yk54840 | Within HostnameError | 2026-01-30T16:30:55.324232Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yj61997 | Cancelling a query (e | 2026-01-30T14:59:52.788649Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yg94604 | Within HostnameError | 2026-01-30T17:24:56.864393Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2010-ALE-018 | Vulnérabilité dans Adobe Flash Player, Adobe Reader et Acrobat | 2010-10-28T00:00:00.000000 | 2010-11-18T00:00:00.000000 |
| certa-2010-ale-020 | Vulnérabilité dans Adobe Reader et Acrobat | 2010-11-05T00:00:00.000000 | 2010-11-17T00:00:00.000000 |
| CERTA-2010-ALE-020 | Vulnérabilité dans Adobe Reader et Acrobat | 2010-11-05T00:00:00.000000 | 2010-11-17T00:00:00.000000 |
| certa-2010-ale-016 | Vulnérabilité Adobe Shockwave Player | 2010-10-22T00:00:00.000000 | 2010-10-29T00:00:00.000000 |
| CERTA-2010-ALE-016 | Vulnérabilité Adobe Shockwave Player | 2010-10-22T00:00:00.000000 | 2010-10-29T00:00:00.000000 |
| certa-2010-ale-017 | Vulnérabilité dans Mozilla Firefox | 2010-10-27T00:00:00.000000 | 2010-10-28T00:00:00.000000 |
| CERTA-2010-ALE-017 | Vulnérabilité dans Mozilla Firefox | 2010-10-27T00:00:00.000000 | 2010-10-28T00:00:00.000000 |
| certa-2010-ale-014 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2010-09-09T00:00:00.000000 | 2010-10-06T00:00:00.000000 |
| CERTA-2010-ALE-014 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2010-09-09T00:00:00.000000 | 2010-10-06T00:00:00.000000 |
| certa-2010-ale-015 | Vulnérabilité dans Adobe Flash Player | 2010-09-14T00:00:00.000000 | 2010-09-21T00:00:00.000000 |
| CERTA-2010-ALE-015 | Vulnérabilité dans Adobe Flash Player | 2010-09-14T00:00:00.000000 | 2010-09-21T00:00:00.000000 |
| certa-2010-ale-013 | Vulnérabilité dans le contrôle ActiveX Apple QuickTime | 2010-08-31T00:00:00.000000 | 2010-09-17T00:00:00.000000 |
| CERTA-2010-ALE-013 | Vulnérabilité dans le contrôle ActiveX Apple QuickTime | 2010-08-31T00:00:00.000000 | 2010-09-17T00:00:00.000000 |
| certa-2010-ale-012 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2010-08-06T00:00:00.000000 | 2010-08-20T00:00:00.000000 |
| CERTA-2010-ALE-012 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2010-08-06T00:00:00.000000 | 2010-08-20T00:00:00.000000 |
| certa-2010-ale-011 | Vulnérabilités dans Apple iOS | 2010-08-04T00:00:00.000000 | 2010-08-12T00:00:00.000000 |
| CERTA-2010-ALE-011 | Vulnérabilités dans Apple iOS | 2010-08-04T00:00:00.000000 | 2010-08-12T00:00:00.000000 |
| certa-2010-ale-010 | Vulnérabilité dans le Shell de Microsoft Windows | 2010-07-19T00:00:00.000000 | 2010-08-03T00:00:00.000000 |
| certa-2010-ale-009 | Exploitation par un code malveillant d'une vulnérabilité Microsoft Windows non corrigée | 2010-07-16T00:00:00.000000 | 2010-08-03T00:00:00.000000 |
| CERTA-2010-ALE-010 | Vulnérabilité dans le Shell de Microsoft Windows | 2010-07-19T00:00:00.000000 | 2010-08-03T00:00:00.000000 |
| CERTA-2010-ALE-009 | Exploitation par un code malveillant d'une vulnérabilité Microsoft Windows non corrigée | 2010-07-16T00:00:00.000000 | 2010-08-03T00:00:00.000000 |
| certa-2010-ale-008 | Vulnérabilité dans le Centre d'aide et de support Windows | 2010-06-10T00:00:00.000000 | 2010-07-15T00:00:00.000000 |
| CERTA-2010-ALE-008 | Vulnérabilité dans le Centre d'aide et de support Windows | 2010-06-10T00:00:00.000000 | 2010-07-15T00:00:00.000000 |
| certa-2010-ale-007 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2010-06-05T00:00:00.000000 | 2010-06-30T00:00:00.000000 |
| CERTA-2010-ALE-007 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2010-06-05T00:00:00.000000 | 2010-06-30T00:00:00.000000 |
| certa-2009-ale-019 | Vulnérabilité dans Windows 7 et Windows Server 2008 R2 | 2009-11-16T00:00:00.000000 | 2010-06-10T00:00:00.000000 |
| certa-2008-ale-006 | Vulnérabilités dans HP OpenView NNM | 2008-04-18T00:00:00.000000 | 2010-06-10T00:00:00.000000 |
| CERTA-2009-ALE-019 | Vulnérabilité dans Windows 7 et Windows Server 2008 R2 | 2009-11-16T00:00:00.000000 | 2010-06-10T00:00:00.000000 |
| CERTA-2008-ALE-006 | Vulnérabilités dans HP OpenView NNM | 2008-04-18T00:00:00.000000 | 2010-06-10T00:00:00.000000 |
| certa-2010-ale-006 | Vulnérabilité de Safari | 2010-05-14T00:00:00.000000 | 2010-05-27T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0092 | Vulnérabilité dans Google Chrome | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2025-avi-0618 | Multiples vulnérabilités dans les produits Mitel | 2025-07-24T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| CERTFR-2026-AVI-0098 | Vulnérabilité dans les produits Symfony | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| CERTFR-2026-AVI-0097 | Vulnérabilité dans les produits Fortinet | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| CERTFR-2026-AVI-0096 | Multiples vulnérabilités dans OpenSSL | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| CERTFR-2026-AVI-0095 | Multiples vulnérabilités dans les produits Mozilla | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| CERTFR-2026-AVI-0094 | Multiples vulnérabilités dans HPE Aruba Networking Fabric Composer | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| CERTFR-2026-AVI-0093 | Multiples vulnérabilités dans Tenable Network Monitor | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| CERTFR-2026-AVI-0092 | Vulnérabilité dans Google Chrome | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| CERTFR-2025-AVI-0618 | Multiples vulnérabilités dans les produits Mitel | 2025-07-24T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0091 | Multiples vulnérabilités dans Xen | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| certfr-2026-avi-0090 | Multiples vulnérabilités dans Citrix XenServer | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| certfr-2026-avi-0089 | Vulnérabilité dans Microsoft Office | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| certfr-2026-avi-0088 | Vulnérabilité dans MariaDB | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| CERTFR-2026-AVI-0091 | Multiples vulnérabilités dans Xen | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| CERTFR-2026-AVI-0090 | Multiples vulnérabilités dans Citrix XenServer | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| CERTFR-2026-AVI-0089 | Vulnérabilité dans Microsoft Office | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| CERTFR-2026-AVI-0088 | Vulnérabilité dans MariaDB | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| certfr-2026-avi-0087 | Vulnérabilité dans les produits Belden | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| certfr-2026-avi-0086 | Vulnérabilité dans CPython | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| certfr-2026-avi-0085 | Multiples vulnérabilités dans NetApp Brocade SAN Navigator | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| certfr-2026-avi-0084 | Vulnérabilité dans Microsoft Edge | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| CERTFR-2026-AVI-0087 | Vulnérabilité dans les produits Belden | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| CERTFR-2026-AVI-0086 | Vulnérabilité dans CPython | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| CERTFR-2026-AVI-0085 | Multiples vulnérabilités dans NetApp Brocade SAN Navigator | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| CERTFR-2026-AVI-0084 | Vulnérabilité dans Microsoft Edge | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| certfr-2026-avi-0083 | Multiples vulnérabilités dans les produits IBM | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| certfr-2026-avi-0082 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| certfr-2026-avi-0081 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| certfr-2026-avi-0080 | Vulnérabilité dans Broadcom Web Security Services Agent | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2022-000035 | Multiple vulnerabilities in Cybozu Garoon | 2022-05-16T14:25+09:00 | 2024-06-17T16:34+09:00 |
| jvndb-2024-003539 | Multiple vulnerabilities in Toshiba Tec and Oki Electric Industry MFPs | 2024-06-17T15:21+09:00 | 2024-06-17T15:21+09:00 |
| jvndb-2022-000058 | Multiple vulnerabilities in untangle | 2022-07-25T14:18+09:00 | 2024-06-17T11:03+09:00 |
| jvndb-2022-000049 | HOME SPOT CUBE2 vulnerable to OS command injection | 2022-06-29T13:42+09:00 | 2024-06-17T10:45+09:00 |
| jvndb-2022-000050 | LiteCart vulnerable to cross-site scripting | 2022-07-04T14:12+09:00 | 2024-06-17T10:39+09:00 |
| jvndb-2022-002017 | U-Boot squashfs filesystem implementation vulnerable to heap-based buffer overflow | 2022-07-14T15:59+09:00 | 2024-06-14T17:53+09:00 |
| jvndb-2022-000052 | Passage Drive vulnerable to insufficient data verification | 2022-07-08T13:42+09:00 | 2024-06-14T17:48+09:00 |
| jvndb-2022-000055 | Booked vulnerable to open redirect | 2022-07-22T13:40+09:00 | 2024-06-14T17:43+09:00 |
| jvndb-2022-002265 | Trend Micro Endpoint security products for enterprises vulnerable to Link Following Local Privilege Escalation | 2022-08-18T15:45+09:00 | 2024-06-14T17:11+09:00 |
| jvndb-2022-000056 | Multiple vulnerabilities in Nintendo Wi-Fi Network Adaptor WAP-001 | 2022-07-29T13:43+09:00 | 2024-06-14T16:27+09:00 |
| jvndb-2023-001215 | Zuken Elmic KASAGO uses insufficient random values for TCP Initial Sequence Numbers | 2023-02-13T14:18+09:00 | 2024-06-14T15:45+09:00 |
| jvndb-2022-002112 | CONTEC SolarView Compact vulnerable to insufficient verification in uploading files | 2022-08-03T17:40+09:00 | 2024-06-14T15:21+09:00 |
| jvndb-2022-000059 | "Hulu" App for Android uses a hard-coded API key for an external service | 2022-07-28T09:14+09:00 | 2024-06-14T14:42+09:00 |
| jvndb-2022-002338 | PLANEX MZK-DP150N contains hidden administrative functionality | 2022-08-23T15:02+09:00 | 2024-06-14T14:06+09:00 |
| jvndb-2022-000054 | Multiple vulnerabilities in Cybozu Office | 2022-07-20T17:28+09:00 | 2024-06-14T14:02+09:00 |
| jvndb-2022-000060 | "Hulu" App for iOS vulnerable to improper server certificate verification | 2022-07-28T09:51+09:00 | 2024-06-14T12:25+09:00 |
| jvndb-2022-000063 | PukiWiki vulnerable to cross-site scripting | 2022-08-23T14:40+09:00 | 2024-06-14T12:00+09:00 |
| jvndb-2022-002339 | Multiple vulnerabilities in PukiWiki | 2022-08-24T14:17+09:00 | 2024-06-14T11:55+09:00 |
| jvndb-2022-000065 | Multiple vulnerabilities in Exment | 2022-08-24T14:23+09:00 | 2024-06-14T11:09+09:00 |
| jvndb-2022-002337 | UNIMO Technology digital video recorders vulnerable to missing authentication for critical functions | 2022-08-23T14:31+09:00 | 2024-06-14T10:24+09:00 |
| jvndb-2022-000064 | Movable Type XMLRPC API vulnerable to command injection | 2022-08-24T15:58+09:00 | 2024-06-13T18:11+09:00 |
| jvndb-2023-001291 | Multiple vulnerabilities in Trend Micro Maximum Security | 2023-03-03T11:10+09:00 | 2024-06-13T17:06+09:00 |
| jvndb-2022-000045 | FreeBSD vulnerable to denial-of-service (DoS) | 2022-06-15T12:28+09:00 | 2024-06-13T16:31+09:00 |
| jvndb-2022-000066 | Multiple vulnerabilities in CentreCOM AR260S V2 | 2022-08-29T17:37+09:00 | 2024-06-13T16:21+09:00 |
| jvndb-2023-000044 | JINS MEME CORE uses a hard-coded cryptographic key | 2023-05-08T15:13+09:00 | 2024-06-13T16:19+09:00 |
| jvndb-2023-000042 | WordPress Plugin "Newsletter" vulnerable to cross-site scripting | 2023-05-09T14:42+09:00 | 2024-06-13T16:14+09:00 |
| jvndb-2022-000068 | SYNCK GRAPHICA Mailform Pro CGI vulnerable to information disclosure | 2022-09-05T15:22+09:00 | 2024-06-13T16:00+09:00 |
| jvndb-2022-002448 | Multiple vulnerabilities in Trend Micro Deep Security and Cloud One - Workload Security agents for Windows | 2022-10-11T17:02+09:00 | 2024-06-13T14:30+09:00 |
| jvndb-2022-002544 | Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service | 2022-10-20T16:18+09:00 | 2024-06-13T13:58+09:00 |
| jvndb-2022-000067 | Installer of Ricoh Device Software Manager may insecurely load Dynamic Link Libraries | 2022-08-29T15:57+09:00 | 2024-06-13T13:53+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14400 | MailEnable不安全DLL加载漏洞(CNVD-2026-14400) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14399 | MailEnable不安全DLL加载漏洞(CNVD-2026-14399) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14398 | MailEnable不安全DLL加载漏洞 | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14397 | OpenClaw安全绕过漏洞 | 2026-03-12 | 2026-03-20 |
| cnvd-2026-14396 | OpenClaw文件包含漏洞 | 2026-03-12 | 2026-03-20 |
| cnvd-2026-14395 | OpenClaw访问控制错误漏洞(CNVD-2026-14395) | 2026-03-12 | 2026-03-20 |
| cnvd-2026-14394 | OpenClaw目录遍历漏洞(CNVD-2026-14394) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14393 | OpenClaw远程代码执行漏洞(CNVD-2026-14393) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14392 | OpenClaw目录遍历漏洞(CNVD-2026-14392) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14391 | OpenClaw代码注入漏洞(CNVD-2026-14391) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14390 | OpenClaw访问控制错误漏洞(CNVD-2026-14390) | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14389 | OpenClaw信息泄露漏洞(CNVD-2026-14389) | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14388 | OpenClaw目录遍历漏洞 | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14387 | WordPress插件Calculated Fields Form跨站脚本漏洞 | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14386 | WordPress插件Avada Core跨站脚本漏洞 | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14385 | WordPress插件Astra Bulk Edit跨站脚本漏洞 | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14384 | WordPress插件Active Products Tables for WooCommerce跨站脚本漏洞 | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14383 | WordPress插件Aardvark跨站脚本漏洞 | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14380 | WordPress插件Aardvark跨站脚本漏洞 | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14374 | Smoothwall Express跨站脚本漏洞(CNVD-2026-14374) | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14367 | Smoothwall Express跨站脚本漏洞(CNVD-2026-14367) | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14354 | Smoothwall Express跨站脚本漏洞(CNVD-2026-14354) | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14349 | Smoothwall Express跨站脚本漏洞( CNVD-2026-14349) | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14345 | Smoothwall Express跨站脚本漏洞(CNVD-2026-14345) | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14338 | Smoothwall Express跨站脚本漏洞(CNVD-2026-14338) | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14290 | Smoothwall Express跨站脚本漏洞(CNVD-2026-14290) | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14289 | Smoothwall Express跨站脚本漏洞(CNVD-2026-14289) | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14288 | Smoothwall Express跨站脚本漏洞(CNVD-2026-14288) | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14287 | Smoothwall Express跨站脚本漏洞(CNVD-2026-14287) | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14286 | Smoothwall Express跨站脚本漏洞(CNVD-2026-14286) | 2026-03-02 | 2026-03-20 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-12109 | Уязвимость ядра операционной системы Linux, связанная с возможностью использования памяти… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12108 | Уязвимость ядра операционной системы Linux, связанная с использованием памяти после её ос… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12107 | Уязвимость функции find_cifs_entry() в модуле fs/smb/client/readdir.c поддержки клиента S… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12105 | Уязвимость ядра операционной системы Linux, связанная с использованием памяти после её ос… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12101 | Уязвимость компонента drivers/usb/gadget/udc/core.c ядра операционной системы Linux, позв… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12096 | Уязвимость функции ksmbd_sessions_deregister() компонента user_session.c ядра операционно… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12093 | Уязвимость функции erdma_accept_newconn() компонента drivers/infiniband/hw/erdma/erdma_cm… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12092 | Уязвимость компонента drivers/gpu/drm/vkms ядра операционной системы Linux, позволяющая н… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12091 | Уязвимость компонента sctp ядра операционной системы Linux, позволяющая нарушителю вызват… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12089 | Уязвимость функции ext4_xattr_inode_dec_ref_all() компонента fs/ext4/xattr.c ядра операци… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12087 | Уязвимость компонента sch_hfsc.c ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12086 | Уязвимость компонента irq-gic-v2m.c ядра операционной системы Linux, позволяющая нарушите… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12085 | Уязвимость компонента sch_hfsc.c ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12077 | Уязвимость функции rtsx_usb_ms_drv_remove() компонента drivers/memstick/host/rtsx_usb_ms.… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12076 | Уязвимость компонента kernel/trace ядра операционной системы Linux, позволяющая нарушител… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12075 | Уязвимость компонента ksmbd ядра операционной системы Linux, позволяющая нарушителю получ… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12074 | Уязвимость компонента drivers/hsi/clients/ssi_protocol.c ядра операционной системы Linux,… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12072 | Уязвимость компонента arm.c ядра операционной системы Linux, позволяющая нарушителю получ… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12071 | Уязвимость компонента kfd_process.c ядра операционной системы Linux, позволяющая нарушите… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12069 | Уязвимость компонента avic.c ядра операционной системы Linux, позволяющая нарушителю вызв… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12068 | Уязвимость компонента auth.c ядра операционной системы Linux, позволяющая нарушителю полу… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12066 | Уязвимость функции hfsc_enqueue() компонента net/sched/sch_hfsc.c ядра операционной систе… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12065 | Уязвимость компонента net/can/bcm.c ядра операционной системы Linux, позволяющая нарушите… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12063 | Уязвимость функции ksmbd_crypt_message() в модуле fs/smb/server/auth.c поддержки сервера … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12062 | Уязвимость функции chameleon_parse_gdd() ядра операционной системы Linux, позволяющая нар… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12061 | Уязвимость функции pci_register_host_bridge() ядра операционной системы Linux, позволяюща… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12058 | Уязвимость функции hash_accept() компонента crypto/algif_hash.c ядра операционной системы… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12053 | Уязвимость компонента backlight ядра операционной системы Linux, позволяющая нарушителю в… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12052 | Уязвимость ASN.1 библиотеки Libtasn1, связанная с алгоритмической сложностью, позволяющая… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12051 | Уязвимость библиотеки безопасности транспортного уровня GnuTLS, связанная с алгоритмическ… | 28.09.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201406-0445 | OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly re… | 2024-07-23T21:30:24.345000Z |
| var-200809-0013 | Network Preferences in Apple Mac OS X 10.4.11 stores PPP passwords in cleartext in a worl… | 2024-07-23T21:30:24.177000Z |
| var-201104-0082 | dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and … | 2024-07-23T21:30:23.564000Z |
| var-201804-1179 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T21:29:57.987000Z |
| var-201110-0388 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2024-07-23T21:29:27.159000Z |
| var-201806-1460 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T21:29:26.304000Z |
| var-200904-0811 | Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier… | 2024-07-23T21:29:26.736000Z |
| var-200809-0402 | Heap-based buffer overflow in Apple Type Services (ATS) in Apple Mac OS X 10.4.11 and 10.… | 2024-07-23T21:29:26.389000Z |
| var-200906-0591 | The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util befor… | 2024-07-23T21:29:05.332000Z |
| var-200806-0425 | Unspecified vulnerability in WebKit in Apple Safari before 3.1.2, as distributed in Mac O… | 2024-07-23T21:29:05.522000Z |
| var-201411-0410 | cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain nam… | 2024-07-23T21:29:03.698000Z |
| var-201912-0635 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:28:59.002000Z |
| var-201912-0648 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:28:49.167000Z |
| var-200711-0538 | Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header fro… | 2024-07-23T21:28:49.905000Z |
| var-201904-1444 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:28:46.398000Z |
| var-201706-0271 | In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NU… | 2024-07-23T21:28:45.678000Z |
| var-202105-1431 | The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired… | 2024-07-23T21:28:26.944000Z |
| var-200704-0221 | The WebFoundation framework in Apple Mac OS X 10.3.9 and earlier allows subdomain cookies… | 2024-07-23T21:28:26.644000Z |
| var-200511-0018 | The Internet Key Exchange version 1 (IKEv1) implementation in Stonesoft StoneGate Firewal… | 2024-07-23T21:28:25.870000Z |
| var-200703-0028 | Server Manager (servermgrd) in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 does not suf… | 2024-07-23T21:28:21.532000Z |
| var-200503-0071 | The Sun Java Plugin capability in Java 2 Runtime Environment (JRE) 1.4.2_01, 1.4.2_04, an… | 2024-07-23T21:28:20.494000Z |
| var-200609-0312 | Buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to … | 2024-07-23T21:27:23.266000Z |
| var-201912-0582 | A logic issue was addressed with improved state management. This issue is fixed in iOS 12… | 2024-07-23T21:27:22.850000Z |
| var-202203-0145 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed … | 2024-07-23T21:26:46.093000Z |
| var-201912-1847 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:26:10.950000Z |
| var-201806-1441 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2024-07-23T21:26:10.287000Z |
| var-200802-0651 | modules/libpr0n/decoders/bmp/nsBMPDecoder.cpp in Mozilla Firefox before 2.0.0.12, Thunder… | 2024-07-23T21:26:10.434000Z |
| var-201310-0596 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, a… | 2024-07-23T21:26:09.527000Z |
| var-201202-0070 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:26:09.744000Z |
| var-201904-0985 | SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remot… | 2024-07-23T21:26:06.321000Z |