Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-68206 |
N/A
|
netfilter: nft_ct: add seqadj extension for natted con… |
Linux |
Linux |
2025-12-16T13:48:33.763Z | 2026-04-18T08:57:10.560Z |
| CVE-2025-40323 |
N/A
|
fbcon: Set fb_display[i]->mode to NULL when the mode i… |
Linux |
Linux |
2025-12-08T00:46:50.833Z | 2026-04-18T08:57:09.204Z |
| CVE-2025-40261 |
N/A
|
nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvm… |
Linux |
Linux |
2025-12-04T16:08:21.345Z | 2026-04-18T08:57:07.832Z |
| CVE-2025-40103 |
N/A
|
smb: client: Fix refcount leak for cifs_sb_tlink |
Linux |
Linux |
2025-10-30T09:48:08.421Z | 2026-04-18T08:57:06.416Z |
| CVE-2025-40016 |
N/A
|
media: uvcvideo: Mark invalid entities with id UVC_INV… |
Linux |
Linux |
2025-10-20T15:29:10.376Z | 2026-04-18T08:57:05.030Z |
| CVE-2025-39930 |
N/A
|
ASoC: simple-card-utils: Don't use __free(device_node)… |
Linux |
Linux |
2025-04-18T07:01:38.576Z | 2026-04-18T08:57:03.638Z |
| CVE-2025-39764 |
N/A
|
netfilter: ctnetlink: remove refcounting in expectatio… |
Linux |
Linux |
2025-09-11T16:52:32.060Z | 2026-04-18T08:57:02.272Z |
| CVE-2025-39748 |
N/A
|
bpf: Forget ranges when refining tnum after JSET |
Linux |
Linux |
2025-09-11T16:52:20.534Z | 2026-04-18T08:57:00.881Z |
| CVE-2025-38693 |
N/A
|
media: dvb-frontends: w7090p: fix null-ptr-deref in w7… |
Linux |
Linux |
2025-09-04T15:32:46.726Z | 2026-04-18T08:56:59.497Z |
| CVE-2025-38562 |
N/A
|
ksmbd: fix null pointer dereference error in generate_… |
Linux |
Linux |
2025-08-19T17:02:39.450Z | 2026-04-18T08:56:58.171Z |
| CVE-2025-38436 |
N/A
|
drm/scheduler: signal scheduled fence when kill job |
Linux |
Linux |
2025-07-25T14:32:09.945Z | 2026-04-18T08:56:56.830Z |
| CVE-2025-38006 |
N/A
|
net: mctp: Don't access ifa_index when missing |
Linux |
Linux |
2025-06-18T09:28:17.773Z | 2026-04-18T08:56:55.487Z |
| CVE-2025-37778 |
N/A
|
ksmbd: Fix dangling pointer in krb_authenticate |
Linux |
Linux |
2025-05-01T13:07:16.472Z | 2026-04-18T08:56:54.116Z |
| CVE-2025-21739 |
7.8 (3.1)
|
scsi: ufs: core: Fix use-after free in init error and … |
Linux |
Linux |
2025-02-27T02:12:14.581Z | 2026-04-18T08:56:52.762Z |
| CVE-2024-56584 |
N/A
|
io_uring/tctx: work around xa_store() allocation error issue |
Linux |
Linux |
2024-12-27T14:50:52.735Z | 2026-04-18T08:56:45.522Z |
| CVE-2024-56557 |
5.5 (3.1)
|
iio: adc: ad7923: Fix buffer overflow for tx_buf and r… |
Linux |
Linux |
2024-12-27T14:23:03.251Z | 2026-04-18T08:56:39.610Z |
| CVE-2024-46715 |
N/A
|
driver: iio: add missing checks on iio_info's callback… |
Linux |
Linux |
2024-09-18T06:32:15.466Z | 2026-04-18T08:56:38.256Z |
| CVE-2024-36898 |
N/A
|
gpiolib: cdev: fix uninitialised kfifo |
Linux |
Linux |
2024-05-30T15:29:02.011Z | 2026-04-18T08:56:36.639Z |
| CVE-2024-26849 |
N/A
|
netlink: add nla be16/32 types to minlen array |
Linux |
Linux |
2024-04-17T10:14:20.184Z | 2026-04-18T08:56:35.070Z |
| CVE-2022-49752 |
5.5 (3.1)
|
device property: fix of node refcount leak in fwnode_g… |
Linux |
Linux |
2025-03-27T16:43:00.584Z | 2026-04-18T08:56:33.591Z |
| CVE-2023-6680 |
7.4 (3.1)
|
Improper Certificate Validation in GitLab |
GitLab |
GitLab |
2023-12-15T16:02:40.371Z | 2026-04-18T04:06:06.413Z |
| CVE-2026-6482 |
8.5 (4.0)
|
Local Privilege Escalation via OpenSSL configuration f… |
Rapid7 |
Insight Agent |
2026-04-17T05:19:20.485Z | 2026-04-18T03:55:55.477Z |
| CVE-2026-33392 |
7.2 (3.1)
|
In JetBrains YouTrack before 2025.3.131383 high p… |
JetBrains |
YouTrack |
2026-04-17T07:46:11.710Z | 2026-04-18T03:55:54.262Z |
| CVE-2026-23853 |
8.4 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain |
2026-04-17T07:16:26.138Z | 2026-04-18T03:55:52.619Z |
| CVE-2025-36568 |
7.8 (3.1)
|
Dell PowerProtect Data Domain BoostFS for client … |
Dell |
PowerProtect Data Domain BoostFS |
2026-04-17T08:12:17.696Z | 2026-04-18T03:55:51.109Z |
| CVE-2026-23778 |
7.2 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain |
2026-04-17T08:33:21.569Z | 2026-04-18T03:55:49.150Z |
| CVE-2026-23779 |
6.7 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain |
2026-04-17T09:04:37.716Z | 2026-04-18T03:55:45.896Z |
| CVE-2026-35153 |
6.7 (3.1)
|
Dell PowerProtect Data Domain, versions 7.7.1.0 t… |
Dell |
PowerProtect Data Domain |
2026-04-17T10:38:18.357Z | 2026-04-18T03:55:43.881Z |
| CVE-2026-35074 |
6.7 (3.1)
|
Dell PowerProtect Data Domain, versions 7.7.1.0 t… |
Dell |
PowerProtect Data Domain |
2026-04-17T10:57:20.150Z | 2026-04-18T03:55:42.483Z |
| CVE-2026-35073 |
6.7 (3.1)
|
Dell PowerProtect Data Domain, versions 7.7.1.0 t… |
Dell |
PowerProtect Data Domain |
2026-04-17T11:05:38.442Z | 2026-04-18T03:55:40.665Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-6618 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
langgenius dify ApiBasedToolSchemaParser parser.py par… |
langgenius |
dify |
2026-04-20T07:45:16.985Z | 2026-04-20T16:21:30.799Z |
| CVE-2025-59089 |
5.9 (3.1)
|
Python-kdcproxy: remote dos via unbounded tcp upstream… |
latchset |
kdcproxy |
2025-11-12T16:40:50.725Z | 2026-04-20T08:28:22.249Z |
| CVE-2024-26009 |
7.9 (3.1)
|
An authentication bypass using an alternate path … |
Fortinet |
FortiProxy |
2025-08-12T18:59:47.462Z | 2026-04-20T07:54:41.800Z |
| CVE-2023-5966 |
4.7 (3.1)
|
Unrestricted Upload of File with Dangerous Type in EspoCRM |
EspoCRM |
EspoCRM |
2023-11-30T13:26:48.245Z | 2026-04-20T07:57:21.961Z |
| CVE-2023-5965 |
4.7 (3.1)
|
Unrestricted Upload of File with Dangerous Type in EspoCRM |
EspoCRM |
EspoCRM |
2023-11-30T13:26:15.451Z | 2026-04-20T08:00:54.382Z |
| CVE-2026-6617 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
langgenius dify ApiToolManageService api_tools_manage_… |
langgenius |
dify |
2026-04-20T07:30:12.357Z | 2026-04-20T11:12:15.089Z |
| CVE-2026-6616 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
TransformerOptimus SuperAGI WebScraperTool webpage_ext… |
TransformerOptimus |
SuperAGI |
2026-04-20T07:15:12.269Z | 2026-04-20T15:54:33.904Z |
| CVE-2026-6615 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
TransformerOptimus SuperAGI Multipart Upload resources… |
TransformerOptimus |
SuperAGI |
2026-04-20T07:00:16.486Z | 2026-04-20T15:56:36.960Z |
| CVE-2026-6614 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
TransformerOptimus SuperAGI project.py get_projects_or… |
TransformerOptimus |
SuperAGI |
2026-04-20T06:45:11.801Z | 2026-04-20T13:51:06.467Z |
| CVE-2026-6613 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
TransformerOptimus SuperAGI agent.py get_schedule_data… |
TransformerOptimus |
SuperAGI |
2026-04-20T06:30:14.889Z | 2026-04-20T14:57:19.410Z |
| CVE-2026-6612 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
TransformerOptimus SuperAGI Agent Execution Endpoint a… |
TransformerOptimus |
SuperAGI |
2026-04-20T06:15:10.393Z | 2026-04-20T11:24:09.255Z |
| CVE-2026-6611 |
2.3 (4.0)
3.1 (3.1)
3.1 (3.0)
|
liangliangyy DjangoBlog File Upload Endpoint settings.… |
liangliangyy |
DjangoBlog |
2026-04-20T06:00:18.066Z | 2026-04-20T16:00:23.582Z |
| CVE-2026-6610 |
6.3 (4.0)
3.7 (3.1)
3.7 (3.0)
|
liangliangyy DjangoBlog Setting settings.py hard-coded… |
liangliangyy |
DjangoBlog |
2026-04-20T05:45:18.671Z | 2026-04-20T16:03:06.598Z |
| CVE-2026-6609 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
liangliangyy DjangoBlog views.py form_valid improper a… |
liangliangyy |
DjangoBlog |
2026-04-20T05:30:16.620Z | 2026-04-20T13:51:42.600Z |
| CVE-2026-6608 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
lm-sys fastchat Arena Side-by-Side View add_text contr… |
lm-sys |
fastchat |
2026-04-20T05:15:12.337Z | 2026-04-20T14:57:55.071Z |
| CVE-2026-6607 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
lm-sys fastchat Worker API Endpoint api_generate resou… |
lm-sys |
fastchat |
2026-04-20T05:00:23.135Z | 2026-04-20T11:37:05.103Z |
| CVE-2026-6606 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
modelscope agentscope _agent_base.py _process_audio_bl… |
modelscope |
agentscope |
2026-04-20T04:45:11.806Z | 2026-04-20T16:07:08.458Z |
| CVE-2026-6605 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
modelscope agentscope Internal Service _common.py _get… |
modelscope |
agentscope |
2026-04-20T04:30:13.482Z | 2026-04-20T14:58:30.070Z |
| CVE-2026-6604 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
modelscope agentscope Cloud Metadata Endpoint _openai_… |
modelscope |
agentscope |
2026-04-20T04:15:11.588Z | 2026-04-20T13:53:04.341Z |
| CVE-2026-6603 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
modelscope agentscope _python.py execute_shell_command… |
modelscope |
agentscope |
2026-04-20T04:00:20.462Z | 2026-04-20T14:59:13.475Z |
| CVE-2026-6602 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
rickxy Hospital Management System his_admin_account.ph… |
rickxy |
Hospital Management System |
2026-04-20T03:45:12.100Z | 2026-04-20T11:38:41.514Z |
| CVE-2026-6601 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Lagom WHMCS Template Datatables resource consumption |
Lagom |
WHMCS Template |
2026-04-20T03:30:14.978Z | 2026-04-20T16:09:24.835Z |
| CVE-2026-6600 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
langflow-ai langflow Frontend React Component Renderin… |
langflow-ai |
langflow |
2026-04-20T03:15:12.169Z | 2026-04-20T14:54:42.453Z |
| CVE-2026-6599 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
langflow-ai langflow Model Context Protocol Configurat… |
langflow-ai |
langflow |
2026-04-20T03:00:15.645Z | 2026-04-20T14:24:36.870Z |
| CVE-2026-6598 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
langflow-ai langflow Project Creation Endpoint project… |
langflow-ai |
langflow |
2026-04-20T02:45:15.874Z | 2026-04-20T16:19:18.233Z |
| CVE-2026-4111 |
7.5 (3.1)
|
Libarchive: infinite loop denial of service in rar5 de… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-13T11:45:20.653Z | 2026-04-20T03:00:07.416Z |
| CVE-2026-6597 |
5.1 (4.0)
2.7 (3.1)
2.7 (3.0)
|
langflow-ai langflow Flow Using API core.py has_api_te… |
langflow-ai |
langflow |
2026-04-20T02:30:14.803Z | 2026-04-20T11:42:32.582Z |
| CVE-2026-6596 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
langflow-ai langflow API Endpoint endpoints.py create_… |
langflow-ai |
langflow |
2026-04-20T02:15:13.863Z | 2026-04-20T14:54:40.530Z |
| CVE-2026-6595 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
ProjectsAndPrograms School Management System HTTP GET … |
ProjectsAndPrograms |
School Management System |
2026-04-20T02:00:49.226Z | 2026-04-20T14:54:50.760Z |
| CVE-2026-6594 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
brikcss merge prototype pollution |
brikcss |
merge |
2026-04-20T01:45:12.099Z | 2026-04-20T14:53:13.499Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-6594 | A vulnerability was determined in brikcss merge up to 1.3.0. This affects an unknown part. Executin… | 2026-04-20T02:16:15.633 | 2026-04-20T02:16:15.633 |
| fkie_cve-2026-6593 | A vulnerability was found in ComfyUI up to 0.13.0. Affected by this issue is some unknown functiona… | 2026-04-20T02:16:15.437 | 2026-04-20T02:16:15.437 |
| fkie_cve-2026-6592 | A vulnerability has been found in ComfyUI up to 0.13.0. Affected by this vulnerability is the funct… | 2026-04-20T02:16:15.230 | 2026-04-20T02:16:15.230 |
| fkie_cve-2026-6591 | A flaw has been found in ComfyUI up to 0.13.0. Affected is the function folder_paths.get_annotated_… | 2026-04-20T01:16:31.870 | 2026-04-20T01:16:31.870 |
| fkie_cve-2026-6590 | A vulnerability was detected in ComfyUI up to 0.13.0. This impacts the function get_model_preview o… | 2026-04-20T01:16:31.673 | 2026-04-20T01:16:31.673 |
| fkie_cve-2026-6589 | A security vulnerability has been detected in ComfyUI up to 0.13.0. This affects the function creat… | 2026-04-20T01:16:31.477 | 2026-04-20T01:16:31.477 |
| fkie_cve-2026-6588 | A weakness has been identified in serge-chat serge up to 1.4TB. The impacted element is the functio… | 2026-04-20T01:16:30.867 | 2026-04-20T01:16:30.867 |
| fkie_cve-2025-54236 | Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2.4.5-p14, 2.4.4-p15 and earli… | 2025-09-09T14:15:46.563 | 2026-04-20T01:00:01.470 |
| fkie_cve-2026-6587 | A security flaw has been discovered in vibrantlabsai RAGAS up to 0.4.3. The affected element is the… | 2026-04-20T00:16:34.703 | 2026-04-20T00:16:34.703 |
| fkie_cve-2026-6586 | A vulnerability was identified in TransformerOptimus SuperAGI up to 0.0.14. Impacted is the functio… | 2026-04-20T00:16:34.507 | 2026-04-20T00:16:34.507 |
| fkie_cve-2026-6585 | A vulnerability was determined in TransformerOptimus SuperAGI up to 0.0.14. This issue affects the … | 2026-04-20T00:16:34.307 | 2026-04-20T00:16:34.307 |
| fkie_cve-2026-6584 | A vulnerability was found in TransformerOptimus SuperAGI up to 0.0.14. This vulnerability affects t… | 2026-04-20T00:16:34.093 | 2026-04-20T00:16:34.093 |
| fkie_cve-2026-6583 | A vulnerability has been found in TransformerOptimus SuperAGI up to 0.0.14. This affects the functi… | 2026-04-19T23:16:34.300 | 2026-04-19T23:16:34.300 |
| fkie_cve-2026-6582 | A flaw has been found in TransformerOptimus SuperAGI up to 0.0.14. Affected by this issue is the fu… | 2026-04-19T23:16:34.080 | 2026-04-19T23:16:34.080 |
| fkie_cve-2026-6581 | A vulnerability was detected in H3C Magic B1 up to 100R004. Affected by this vulnerability is the f… | 2026-04-19T23:16:33.893 | 2026-04-19T23:16:33.893 |
| fkie_cve-2026-6580 | A security vulnerability has been detected in liangliangyy DjangoBlog up to 2.1.0.0. Affected is an… | 2026-04-19T23:16:33.697 | 2026-04-19T23:16:33.697 |
| fkie_cve-2026-6579 | A weakness has been identified in liangliangyy DjangoBlog up to 2.1.0.0. This impacts an unknown fu… | 2026-04-19T22:16:35.320 | 2026-04-19T22:16:35.320 |
| fkie_cve-2026-6578 | A security flaw has been discovered in liangliangyy DjangoBlog up to 2.1.0.0. This affects an unkno… | 2026-04-19T22:16:35.133 | 2026-04-19T22:16:35.133 |
| fkie_cve-2026-6577 | A vulnerability was identified in liangliangyy DjangoBlog up to 2.1.0.0. The impacted element is an… | 2026-04-19T20:16:28.837 | 2026-04-19T20:16:28.837 |
| fkie_cve-2025-9566 | There's a vulnerability in podman where an attacker may use the kube play command to overwrite host… | 2025-09-05T20:15:36.727 | 2026-04-19T20:16:23.020 |
| fkie_cve-2025-6170 | A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML fi… | 2025-06-16T16:15:20.430 | 2026-04-19T20:16:22.797 |
| fkie_cve-2025-6021 | A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calcul… | 2025-06-12T13:15:25.590 | 2026-04-19T20:16:22.280 |
| fkie_cve-2025-49796 | A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file … | 2025-06-16T16:15:19.370 | 2026-04-19T20:16:21.710 |
| fkie_cve-2025-49795 | A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions… | 2025-06-16T16:15:19.203 | 2026-04-19T20:16:21.540 |
| fkie_cve-2025-49794 | A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements … | 2025-06-16T16:15:18.997 | 2026-04-19T20:16:20.960 |
| fkie_cve-2025-14512 | A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (D… | 2025-12-11T07:16:00.463 | 2026-04-19T20:16:20.753 |
| fkie_cve-2025-14104 | A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 25… | 2025-12-05T17:16:03.117 | 2026-04-19T20:16:20.623 |
| fkie_cve-2025-14087 | A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap cor… | 2025-12-10T09:15:47.053 | 2026-04-19T20:16:20.380 |
| fkie_cve-2025-13601 | A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer s… | 2025-11-26T15:15:51.723 | 2026-04-19T20:16:19.257 |
| fkie_cve-2026-6576 | A vulnerability was determined in liangliangyy DjangoBlog up to 2.1.0.0. The affected element is th… | 2026-04-19T19:16:14.347 | 2026-04-19T19:16:14.347 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-9gpm-2v37-f3mp |
7.5 (3.1)
8.7 (4.0)
|
OpenHarness before commit bd4df81 contains a permission bypass vulnerability that allows attackers … | 2026-04-17T18:31:52Z | 2026-04-17T18:31:52Z |
| ghsa-9859-fqhx-279v |
8.8 (3.1)
|
The WP Customer Area plugin for WordPress is vulnerable to arbitrary file read and deletion due to … | 2026-04-17T18:31:52Z | 2026-04-17T18:31:52Z |
| ghsa-4h67-fm2h-4qrp |
7.3 (3.1)
|
Software installed and run as a non-privileged user may conduct improper GPU system calls to gain w… | 2026-04-17T18:31:52Z | 2026-04-17T18:31:52Z |
| ghsa-r9f4-h79v-5p47 |
9.1 (3.1)
9.3 (4.0)
|
An attacker with network access to the PLC is able to brute force discover passwords to gain unauth… | 2026-04-17T18:31:51Z | 2026-04-17T18:31:51Z |
| ghsa-h6m6-2qjp-9v82 |
9.8 (3.1)
|
A SQL injection vulnerability in CodeAstro Simple Attendance Management System v1.0 allows remote u… | 2026-04-17T15:31:18Z | 2026-04-17T18:31:51Z |
| ghsa-w2qc-5jvx-3g3v |
5.4 (3.1)
4.8 (4.0)
|
Stored cross-site scripting vulnerability exists in GROWI v7.4.6 and earlier. If this vulnerability… | 2026-04-17T18:31:50Z | 2026-04-17T18:31:50Z |
| ghsa-p93r-85wp-75v3 |
10.0 (4.0)
|
Covert timing channel vulnerability in Legion of the Bouncy Castle Inc. BC-JAVA core on all (core m… | 2026-04-17T18:31:50Z | 2026-04-17T18:31:50Z |
| ghsa-hj44-m5xv-x75q |
3.3 (3.1)
4.8 (4.0)
|
MuPDF mutool does not sanitize PDF metadata fields before writing them to terminal output, allowing… | 2026-04-16T03:31:06Z | 2026-04-17T18:31:50Z |
| ghsa-89j2-h6hv-gvhg |
8.3 (4.0)
|
Improper input validation, Improper verification of cryptographic signature vulnerability in XQUIC … | 2026-04-17T18:31:50Z | 2026-04-17T18:31:50Z |
| ghsa-57pr-fgr5-wqvx |
8.1 (3.1)
7.2 (4.0)
|
An access control vulnerability was discovered in the Threat Intelligence functionality due to a sp… | 2026-04-17T18:31:50Z | 2026-04-17T18:31:50Z |
| ghsa-574f-3g2m-x479 |
9.3 (4.0)
|
Use of a Broken or Risky Cryptographic Algorithm vulnerability in Legion of the Bouncy Castle Inc. … | 2026-04-17T18:31:50Z | 2026-04-17T18:31:50Z |
| ghsa-28p4-5j5m-924h |
8.9 (3.1)
7.1 (4.0)
|
A Stored Cross-Site Scripting vulnerability was discovered in the Assets and Nodes functionality du… | 2026-04-17T18:31:50Z | 2026-04-17T18:31:50Z |
| ghsa-cm99-m826-vgg7 |
7.8 (3.1)
|
A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow … | 2026-03-24T15:30:29Z | 2026-04-17T18:31:42Z |
| ghsa-64fw-jx9p-5j24 |
8.8 (3.1)
8.7 (4.0)
|
An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Se… | 2026-03-10T18:31:23Z | 2026-04-17T18:31:41Z |
| ghsa-x6mf-8rqw-rvhf |
6.3 (3.1)
2.1 (4.0)
|
A security flaw has been discovered in QueryMine sms up to 7ab5a9ea196209611134525ffc18de25c57d9593… | 2026-04-17T15:31:18Z | 2026-04-17T15:31:18Z |
| ghsa-w25c-m5vq-j5mh |
7.3 (3.1)
5.5 (4.0)
|
A weakness has been identified in QueryMine sms up to 7ab5a9ea196209611134525ffc18de25c57d9593. Imp… | 2026-04-17T15:31:18Z | 2026-04-17T15:31:18Z |
| ghsa-qv7w-j9w9-35p3 |
5.3 (3.1)
1.9 (4.0)
|
A security vulnerability has been detected in libvips up to 8.18.2. The affected element is the fun… | 2026-04-17T15:31:18Z | 2026-04-17T15:31:18Z |
| ghsa-qc74-2r45-g2fp |
5.8 (3.1)
|
In JetBrains Junie before 252.549.29 command execution was possible via malicious project file | 2026-04-17T15:31:18Z | 2026-04-17T15:31:18Z |
| ghsa-mrmx-7hg5-pj7x |
4.3 (3.1)
2.1 (4.0)
|
A flaw has been found in Qihui jtbc5 CMS 5.0.3.6. Affected is an unknown function of the file /dev/… | 2026-04-17T15:31:17Z | 2026-04-17T15:31:18Z |
| ghsa-cv47-g53v-q848 |
3.5 (3.1)
2.0 (4.0)
|
A flaw has been found in lukevella rallly up to 4.7.4. This affects an unknown function of the file… | 2026-04-17T15:31:18Z | 2026-04-17T15:31:18Z |
| ghsa-c9vj-5wx9-69pj |
5.4 (3.1)
2.1 (4.0)
|
A vulnerability was found in prasathmani TinyFileManager up to 2.6. Affected is an unknown function… | 2026-04-17T15:31:18Z | 2026-04-17T15:31:18Z |
| ghsa-42p2-73mx-2pch |
5.5 (3.1)
|
STProcessMonitor 11.11.4.0, part of the Safetica Application suite, allows an admin-privileged user… | 2026-04-17T15:31:18Z | 2026-04-17T15:31:18Z |
| ghsa-3g88-37vp-qh92 |
5.3 (3.1)
5.5 (4.0)
|
A vulnerability was detected in arnobt78 Hotel Booking Management System up to f8922d0e0f6ac1cc7619… | 2026-04-17T15:31:18Z | 2026-04-17T15:31:18Z |
| ghsa-376w-pjjp-jrvj |
3.5 (3.1)
2.0 (4.0)
|
A vulnerability was detected in classroombookings up to 2.17.0. This impacts the function read of t… | 2026-04-17T15:31:17Z | 2026-04-17T15:31:18Z |
| ghsa-28hj-3gj2-63m5 |
7.5 (3.1)
|
A flaw was found in dnsmasq. A remote attacker could exploit an out-of-bounds write vulnerability b… | 2026-04-17T15:31:18Z | 2026-04-17T15:31:18Z |
| ghsa-wx9r-9hf2-wq9p |
7.8 (3.1)
|
It has been identified that a vulnerability (CWE-427) exists in the UPS (Uninterruptible Power Supp… | 2026-04-17T15:31:17Z | 2026-04-17T15:31:17Z |
| ghsa-mxxh-fmjq-j6x4 |
2.7 (3.1)
|
Mattermost versions 10.11.x <= 10.11.12 fail to validate whether users were correctly owned by the … | 2026-04-17T15:31:17Z | 2026-04-17T15:31:17Z |
| ghsa-mh4x-rmrx-3hp4 |
6.5 (3.1)
|
Mattermost versions 10.11.x <= 10.11.12, 11.5.x <= 11.5.0, 11.4.x <= 11.4.2, 11.3.x <= 11.3.2 fail … | 2026-04-17T15:31:17Z | 2026-04-17T15:31:17Z |
| ghsa-m7cf-4gh2-v4qg |
6.8 (3.1)
|
Mattermost versions 10.11.x <= 10.11.12, 11.5.x <= 11.5.0, 11.4.x <= 11.4.2, 11.3.x <= 11.3.2 fail … | 2026-04-17T15:31:17Z | 2026-04-17T15:31:17Z |
| ghsa-gcf8-4gjc-v7ff |
7.5 (3.1)
|
Uncontrolled Resource Consumption in Bosch VMS Central Server in Bosch VMS 12.0.1 allows attackers… | 2026-04-17T15:31:17Z | 2026-04-17T15:31:17Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-43128 |
9.8 (3.1)
|
The d8s-xml for python, as distributed on PyPI, included a potential code-execution backd… | democritus-utility | 2022-11-07T15:15:00Z | 2024-11-21T14:22:45.091449Z |
| pysec-2022-43127 |
9.8 (3.1)
|
The d8s-networking for python, as distributed on PyPI, included a potential code-executio… | democritus-user-agents | 2022-11-07T15:15:00Z | 2024-11-21T14:22:45.041198Z |
| pysec-2021-881 |
7.5 (3.1)
|
The FTL Server (tibftlserver) and Docker images containing tibftlserver components of TIB… | eftl | 2021-10-05T18:15:00Z | 2024-11-21T14:22:45.803448Z |
| pysec-2017-115 |
5.5 (3.1)
|
exiv2 0.26 contains a Stack out of bounds read in webp parser | exiv2 | 2017-11-17T22:29:00Z | 2024-11-21T14:22:45.992477Z |
| pysec-2015-36 |
|
Buffer overflow in the RiffVideo::infoTagsHandler function in riffvideo.cpp in Exiv2 0.24… | exiv2 | 2015-01-02T20:59:00Z | 2024-11-21T14:22:45.931449Z |
| pysec-2008-11 |
|
Exiv2 0.16 allows user-assisted remote attackers to cause a denial of service (divide-by-… | exiv2 | 2008-06-13T19:41:00Z | 2024-11-21T14:22:45.866207Z |
| pysec-2022-43126 |
9.8 (3.1)
|
The d8s-dates for python, as distributed on PyPI, included a potential code-execution bac… | democritus-timezones | 2022-11-07T15:15:00Z | 2024-11-21T14:22:44.991216Z |
| pysec-2022-43125 |
9.8 (3.1)
|
The d8s-python for python, as distributed on PyPI, included a potential code-execution ba… | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.941258Z |
| pysec-2022-43124 |
9.8 (3.1)
|
The d8s-xml for python, as distributed on PyPI, included a potential code-execution backd… | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.889277Z |
| pysec-2022-43123 |
9.8 (3.1)
|
The d8s-netstrings for python, as distributed on PyPI, included a potential code-executio… | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.834592Z |
| pysec-2022-43122 |
9.8 (3.1)
|
The d8s-grammars for python, as distributed on PyPI, included a potential code-execution … | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.785522Z |
| pysec-2022-43121 |
9.8 (3.1)
|
The d8s-math for python, as distributed on PyPI, included a potential code-execution back… | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.735083Z |
| pysec-2022-43120 |
9.8 (3.1)
|
The d8s-json for python, as distributed on PyPI, included a potential code-execution back… | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.684065Z |
| pysec-2022-43119 |
9.8 (3.1)
|
The d8s-archives for python, as distributed on PyPI, included a potential code-execution … | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.633699Z |
| pysec-2022-43118 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | democritus-strings | 2022-09-19T14:15:00Z | 2024-11-21T14:22:44.584448Z |
| pysec-2022-43117 |
9.8 (3.1)
|
The d8s-pdfs for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.53409Z |
| pysec-2022-43116 |
9.8 (3.1)
|
The d8s-utility for python, as distributed on PyPI, included a potential code-execution b… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.483759Z |
| pysec-2022-43115 |
9.8 (3.1)
|
The d8s-ip-addresses for python, as distributed on PyPI, included a potential code-execut… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.428296Z |
| pysec-2022-43114 |
9.8 (3.1)
|
The d8s-mpeg for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.376649Z |
| pysec-2022-43113 |
9.8 (3.1)
|
The d8s-domains for python, as distributed on PyPI, included a potential code-execution b… | democritus-networking | 2022-09-19T15:15:00Z | 2024-11-21T14:22:44.327837Z |
| pysec-2022-43112 |
9.8 (3.1)
|
The d8s-asns for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.27716Z |
| pysec-2022-43111 |
9.8 (3.1)
|
The d8s-html for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.226888Z |
| pysec-2022-43110 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T15:15:00Z | 2024-11-21T14:22:44.173987Z |
| pysec-2022-43109 |
9.8 (3.1)
|
The d8s-stats for python, as distributed on PyPI, included a potential code-execution bac… | democritus-math | 2022-11-07T15:15:00Z | 2024-11-21T14:22:44.122837Z |
| pysec-2022-43108 |
9.8 (3.1)
|
The d8s-networking for python, as distributed on PyPI, included a potential code-executio… | democritus-json | 2022-11-07T15:15:00Z | 2024-11-21T14:22:44.072231Z |
| pysec-2022-43107 |
9.8 (3.1)
|
The d8s-ip-addresses for python, as distributed on PyPI, included a potential code-execut… | democritus-hypothesis | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.021497Z |
| pysec-2022-43106 |
9.8 (3.1)
|
The d8s-dicts for python, as distributed on PyPI, included a potential code-execution bac… | democritus-hypothesis | 2022-09-19T16:15:00Z | 2024-11-21T14:22:43.965654Z |
| pysec-2022-43105 |
9.8 (3.1)
|
The d8s-dates for python, as distributed on PyPI, included a potential code-execution bac… | democritus-hypothesis | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.915613Z |
| pysec-2022-43104 |
9.8 (3.1)
|
The d8s-domains for python, as distributed on PyPI, included a potential code-execution b… | democritus-hypothesis | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.865878Z |
| pysec-2022-43103 |
9.8 (3.1)
|
The d8s-uuids for python, as distributed on PyPI, included a potential code-execution bac… | democritus-hypothesis | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.817031Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33555 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.556591Z |
| gsd-2024-33554 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.667501Z |
| gsd-2024-33553 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.544840Z |
| gsd-2024-33552 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.667300Z |
| gsd-2024-33551 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.543061Z |
| gsd-2024-33550 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.534917Z |
| gsd-2024-33549 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.667701Z |
| gsd-2024-33548 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.564663Z |
| gsd-2024-33547 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.644934Z |
| gsd-2024-33546 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.560266Z |
| gsd-2024-33545 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.604410Z |
| gsd-2024-33544 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.631414Z |
| gsd-2024-33543 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.644262Z |
| gsd-2024-33542 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.688591Z |
| gsd-2024-33541 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.555650Z |
| gsd-2024-33540 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.562741Z |
| gsd-2024-33539 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.670372Z |
| gsd-2024-33538 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.588107Z |
| gsd-2024-33537 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.572272Z |
| gsd-2024-33536 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.665589Z |
| gsd-2024-33535 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.600803Z |
| gsd-2024-33534 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.522494Z |
| gsd-2024-33533 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.580672Z |
| gsd-2024-33532 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.683477Z |
| gsd-2024-33531 | cdbattags lua-resty-jwt 0.2.3 allows attackers to bypass all JWT-parsing signature checks… | 2024-04-25T05:02:10.682199Z |
| gsd-2024-33530 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.519432Z |
| gsd-2024-33529 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.547084Z |
| gsd-2024-33528 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.614150Z |
| gsd-2024-33527 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.684742Z |
| gsd-2024-33526 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.643822Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2879 | Malicious code in bjs-biginteger (npm) | 2026-04-14T12:34:46Z | 2026-04-14T12:34:46Z |
| mal-2026-2658 | Malicious code in tailwindcss-style-typography (npm) | 2026-04-14T12:12:36Z | 2026-04-14T12:12:37Z |
| mal-2026-2657 | Malicious code in tailwind-typ (npm) | 2026-04-14T12:01:40Z | 2026-04-14T12:01:41Z |
| mal-2026-2656 | Malicious code in tailwind-stylecss-typography (npm) | 2026-04-14T11:52:39Z | 2026-04-14T11:52:40Z |
| mal-2026-2644 | Malicious code in node-unpnotifyserv (npm) | 2026-04-14T11:47:49Z | 2026-04-14T11:47:50Z |
| mal-2026-2655 | Malicious code in tailwind-lines-clamp (npm) | 2026-04-14T11:38:14Z | 2026-04-14T11:38:15Z |
| mal-2026-2634 | Malicious code in percy-cake-docker (npm) | 2026-04-14T11:31:04Z | 2026-04-14T11:31:05Z |
| mal-2026-2630 | Malicious code in gate-apis (PyPI) | 2026-04-14T10:23:40Z | 2026-04-14T10:23:40Z |
| mal-2026-2920 | Malicious code in buffer-util-extend (npm) | 2026-04-14T10:22:11Z | 2026-04-14T10:22:11Z |
| mal-2026-2929 | Malicious code in path-extend (npm) | 2026-04-14T09:46:58Z | 2026-04-14T09:46:58Z |
| mal-2026-2825 | Malicious code in centralogger (npm) | 2026-04-14T09:21:57Z | 2026-04-14T09:21:57Z |
| mal-2026-2826 | Malicious code in dom-utils-lite (npm) | 2026-04-14T09:21:35Z | 2026-04-14T09:21:35Z |
| mal-2026-2629 | Malicious code in stacks-editor (npm) | 2026-04-14T08:55:57Z | 2026-04-14T08:55:57Z |
| mal-2026-2628 | Malicious code in svchost (PyPI) | 2026-04-14T05:42:26Z | 2026-04-14T05:42:26Z |
| mal-2026-2627 | Malicious code in pckg-sv (PyPI) | 2026-04-14T05:35:20Z | 2026-04-14T05:35:20Z |
| mal-2026-2492 | Malicious code in admin0911 (npm) | 2026-04-05T15:30:57Z | 2026-04-14T01:05:14Z |
| mal-2026-2282 | Malicious code in @adac-fahrzeugplattform/ui (npm) | 2026-03-29T04:43:26Z | 2026-04-14T01:05:13Z |
| mal-2026-2626 | Malicious code in getcardslib (npm) | 2026-04-14T00:07:56Z | 2026-04-14T00:07:56Z |
| mal-2026-2624 | Malicious code in asciitoart (PyPI) | 2026-04-13T21:26:29Z | 2026-04-13T22:22:34Z |
| mal-2026-2623 | Malicious code in hive-setting (PyPI) | 2026-04-13T16:27:32Z | 2026-04-13T16:27:32Z |
| mal-2026-2566 | Malicious code in wm-plugin-visions-recorder (npm) | 2026-04-12T06:09:38Z | 2026-04-13T15:48:08Z |
| mal-2026-2518 | Malicious code in viewer-assets-generator (npm) | 2026-04-09T03:10:01Z | 2026-04-13T15:48:07Z |
| mal-2026-2565 | Malicious code in portal-common-ui (npm) | 2026-04-12T04:15:46Z | 2026-04-13T15:48:06Z |
| mal-2026-2564 | Malicious code in gp-auth-lib (npm) | 2026-04-12T04:25:39Z | 2026-04-13T15:48:04Z |
| mal-2026-2560 | Malicious code in @b2b-portal/uch (npm) | 2026-04-11T17:55:17Z | 2026-04-13T15:48:02Z |
| mal-2026-2545 | Malicious code in @sap-px/pxapi (npm) | 2026-04-11T04:45:40Z | 2026-04-13T15:48:02Z |
| mal-2026-2537 | Malicious code in @b2b-portal/form (npm) | 2026-04-10T16:43:07Z | 2026-04-13T15:48:02Z |
| mal-2026-2621 | Malicious code in walmart-internal (npm) | 2026-04-13T15:33:47Z | 2026-04-13T15:33:47Z |
| mal-2026-2597 | Malicious code in @zgny/onboarding-consumer (npm) | 2026-04-13T15:25:22Z | 2026-04-13T15:25:30Z |
| mal-2026-2596 | Malicious code in @spreadjs/js-calc (npm) | 2026-04-13T15:25:22Z | 2026-04-13T15:25:30Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0233 | vllm: Schwachstelle ermöglicht Offenlegung von Informationen und DoS | 2026-01-27T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0229 | Citrix Systems XenServer und Xen: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-27T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0225 | Xen: Mehrere Schwachstellen | 2026-01-26T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0188 | Internet Systems Consortium BIND: Schwachstelle ermöglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0177 | Atlassian Bamboo, Bitbucket, Confluence und Jira: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0088 | Fortinet FortiSandbox: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-01-13T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0066 | avahi-daemon: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-12T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0041 | Cisco Firewall Threat Defense, IOS XE und Meraki MX: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2872 | Drupal HTTP Client Manager: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-17T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2823 | Drupal (Acquia Content Hub): Schwachstelle ermöglicht Darstellen falscher Informationen | 2025-12-10T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2733 | Drupal-Module: Mehrere Schwachstellen | 2025-12-03T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2694 | MariaDB: Schwachstelle ermöglicht Codeausführung | 2025-11-27T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2663 | libpng: Mehrere Schwachstellen | 2025-11-23T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2537 | BusyBox (wget): Schwachstelle ermöglicht Umgehung von Sicherheitsvorkehrungen | 2025-11-10T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2468 | CPython: Schwachstelle ermöglicht Denial of Service | 2025-11-02T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2409 | Xen: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-10-26T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2230 | Python (CPython Zipfile Module): Schwachstelle ermöglicht Manipulation von Dateien | 2025-10-07T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2098 | IBM SPSS: Mehrere Schwachstellen | 2025-09-21T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2060 | VMware Tanzu Spring Framework und Spring Security: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-09-15T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2053 | Linux Kernel: Mehrere Schwachstellen | 2025-09-15T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2049 | gdk-pixbuf: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-09-14T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2023 | cURL: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-09-09T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1978 | Red Hat OpenShift GitOps (Argo CD): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-09-04T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1832 | VMware Tanzu Spring Framework: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-08-13T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1810 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-08-12T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1718 | Red Hat Enterprise Linux (gdk-pixbuf): Schwachstelle ermöglicht Denial of Service | 2025-08-04T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1664 | Python: Schwachstelle ermöglicht Denial of Service | 2025-07-28T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1540 | Apache Commons Lang: Schwachstelle ermöglicht Denial of Service | 2025-07-13T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1522 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-09T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1470 | Python (CPython): Schwachstelle ermöglicht Denial of Service | 2025-07-07T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-219-08 | Yealink IP Phones and RPS (Redirect and Provisioning Service) | 2025-08-07T06:00:00.000000Z | 2025-08-07T06:00:00.000000Z |
| icsa-25-219-05 | Packet Power EMX and EG | 2025-08-07T06:00:00.000000Z | 2025-08-07T06:00:00.000000Z |
| icsa-25-219-04 | Rockwell Automation Arena | 2025-08-07T06:00:00.000000Z | 2025-08-07T06:00:00.000000Z |
| icsa-25-219-03 | Burk Technology ARC Solo | 2025-08-07T06:00:00.000000Z | 2025-08-07T06:00:00.000000Z |
| icsa-25-219-01 | Delta Electronics DIAView | 2025-08-07T06:00:00.000000Z | 2025-08-07T06:00:00.000000Z |
| icsa-25-148-04 | Instantel Micromate (Update A) | 2025-05-29T06:00:00.000000Z | 2025-08-07T06:00:00.000000Z |
| icsa-24-123-01 | CyberPower PowerPanel Business | 2024-05-02T06:00:00.000000Z | 2025-08-07T06:00:00.000000Z |
| icsa-24-032-01 | Gessler GmbH WEB-MASTER | 2024-02-01T07:00:00.000000Z | 2025-08-07T06:00:00.000000Z |
| icsa-25-219-06 | Dreame Technology iOS and Android Mobile Applications | 2025-08-07T04:00:00.000000Z | 2025-08-07T04:00:00.000000Z |
| va-25-219-01 | Tyler Technologies ERP Pro 9 | 2025-08-07T00:00:00Z | 2025-08-07T00:00:00Z |
| icsa-25-247-01 | Honeywell OneWireless Wireless Device Manager (WDM) | 2025-08-04T06:00:00.000000Z | 2025-08-04T06:00:00.000000Z |
| icsa-25-205-03 | Honeywell Experion PKS (Update A) | 2025-07-24T06:00:00.000000Z | 2025-08-04T06:00:00.000000Z |
| icsa-25-212-02 | Rockwell Automation Lifecycle Services with VMware | 2025-07-31T06:00:00.000000Z | 2025-07-31T06:00:00.000000Z |
| icsa-25-210-03 | Delta Electronics DTN Soft | 2025-07-29T06:00:00.000000Z | 2025-07-29T06:00:00.000000Z |
| icsa-25-210-02 | Samsung HVAC DMS | 2025-07-29T06:00:00.000000Z | 2025-07-29T06:00:00.000000Z |
| icsa-25-210-01 | National Instruments LabVIEW | 2025-07-29T06:00:00.000000Z | 2025-07-29T06:00:00.000000Z |
| icsa-24-338-06 | Fuji Electric Tellus Lite V-Simulator (Update A) | 2024-12-03T07:00:00.000000Z | 2025-07-29T06:00:00.000000Z |
| icsa-24-158-04 | Johnson Controls Software House iStar Door Controller (Update A) | 2024-06-06T06:00:00.000000Z | 2025-07-29T06:00:00.000000Z |
| icsa-25-273-03 | Festo CPX-CEC-C1 and CPX-CMXX | 2022-09-20T10:00:00.000000Z | 2025-07-28T10:00:00.000000Z |
| icsa-25-205-04 | LG Innotek Camera Model LNV5110R | 2025-07-25T05:00:00.000000Z | 2025-07-25T05:00:00.000000Z |
| icsma-25-205-01 | Medtronic MyCareLink Patient Monitor | 2025-07-24T06:00:00.000000Z | 2025-07-24T06:00:00.000000Z |
| icsa-25-205-02 | Network Thermostat X-Series WiFi Thermostats | 2025-07-24T06:00:00.000000Z | 2025-07-24T06:00:00.000000Z |
| icsa-25-203-02 | Lantronix Provisioning Manager | 2025-07-22T06:00:00.000000Z | 2025-07-22T06:00:00.000000Z |
| icsa-25-203-01 | DuraComm DP-10iN-100-MU | 2025-07-22T06:00:00.000000Z | 2025-07-22T06:00:00.000000Z |
| icsa-24-151-02 | Fuji Electric Monitouch V-SFT (Update A) | 2024-05-30T06:00:00.000000Z | 2025-07-18T06:00:00.000000Z |
| icsma-25-198-01 | Panoramic Corporation Digital Imaging Software | 2025-07-17T06:00:00.000000Z | 2025-07-17T06:00:00.000000Z |
| icsa-25-198-01 | Leviton AcquiSuite and Energy Monitoring Hub | 2025-07-17T06:00:00.000000Z | 2025-07-17T06:00:00.000000Z |
| icsa-24-191-05 | Johnson Controls Inc. Software House C●CURE 9000 (Update B) | 2024-07-09T06:00:00.000000Z | 2025-07-17T06:00:00.000000Z |
| icsa-25-196-03 | LITEON IC48A and IC80A EV Chargers | 2025-07-15T06:00:00.000000Z | 2025-07-15T06:00:00.000000Z |
| icsa-25-196-02 | ABB RMC-100 | 2025-07-15T06:00:00.000000Z | 2025-07-15T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-nxos-dhcp6-relay-dos-zneaa6xn | Cisco NX-OS Software DHCPv6 Relay Agent Denial of Service Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-nxos-dhcp6-relay-dos-znEAA6xn | Cisco NX-OS Software DHCPv6 Relay Agent Denial of Service Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-nxos-cmdinj-lq6jszhh | Cisco NX-OS Software Command Injection Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-nxos-cmdinj-Lq6jsZhH | Cisco NX-OS Software Command Injection Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-nxos-bshacepe-bapehsx7 | Cisco NX-OS Software Bash Arbitrary Code Execution and Privilege Escalation Vulnerabilities | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-nxos-bshacepe-bApeHSx7 | Cisco NX-OS Software Bash Arbitrary Code Execution and Privilege Escalation Vulnerabilities | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-capic-priv-esc-uyqjjnuu | Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-capic-priv-esc-uYQJjnuU | Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-apic-cousmo-ubpbygbq | Cisco Application Policy Infrastructure Controller Unauthorized Policy Actions Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-apic-cousmo-uBpBYGbq | Cisco Application Policy Infrastructure Controller Unauthorized Policy Actions Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-curl-libcurl-d9ds39cv | cURL and libcurl Vulnerability Affecting Cisco Products: October 2023 | 2023-10-12T16:00:00+00:00 | 2024-08-27T18:06:16+00:00 |
| cisco-sa-curl-libcurl-D9ds39cV | cURL and libcurl Vulnerability Affecting Cisco Products: October 2023 | 2023-10-12T16:00:00+00:00 | 2024-08-27T18:06:16+00:00 |
| cisco-sa-ise-rest-5bpkrntz | Cisco Identity Services Engine REST API Blind SQL Injection Vulnerabilities | 2024-08-21T16:00:00+00:00 | 2024-08-22T15:15:53+00:00 |
| cisco-sa-ise-rest-5bPKrNtZ | Cisco Identity Services Engine REST API Blind SQL Injection Vulnerabilities | 2024-08-21T16:00:00+00:00 | 2024-08-22T15:15:53+00:00 |
| cisco-sa-ise-csrf-y4zuz5rj | Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-08-21T16:00:00+00:00 |
| cisco-sa-ise-csrf-y4ZUz5Rj | Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-08-21T16:00:00+00:00 |
| cisco-sa-cucm-dos-kkhq43we | Cisco Unified Communications Manager Denial of Service Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-08-21T16:00:00+00:00 |
| cisco-sa-cucm-dos-kkHq43We | Cisco Unified Communications Manager Denial of Service Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-08-21T16:00:00+00:00 |
| cisco-sa-wsa-bypass-vxvqwzsj | Cisco Secure Web Appliance Content Encoding Filter Bypass Vulnerability | 2023-08-02T16:00:00+00:00 | 2024-08-14T14:27:30+00:00 |
| cisco-sa-wsa-bypass-vXvqwzsj | Cisco Secure Web Appliance Content Encoding Filter Bypass Vulnerability | 2023-08-02T16:00:00+00:00 | 2024-08-14T14:27:30+00:00 |
| cisco-sa-spa-http-vulns-rjzmx2xz | Cisco Small Business SPA300 Series and SPA500 Series IP Phones Web UI Vulnerabilities | 2024-08-07T16:00:00+00:00 | 2024-08-07T16:00:00+00:00 |
| cisco-sa-spa-http-vulns-RJZmX2Xz | Cisco Small Business SPA300 Series and SPA500 Series IP Phones Web UI Vulnerabilities | 2024-08-07T16:00:00+00:00 | 2024-08-07T16:00:00+00:00 |
| cisco-sa-ise-xss-v2bm9jcy | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2024-08-07T16:00:00+00:00 | 2024-08-07T16:00:00+00:00 |
| cisco-sa-ise-xss-V2bm9JCY | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2024-08-07T16:00:00+00:00 | 2024-08-07T16:00:00+00:00 |
| cisco-sa-iosxr-ipxe-sigbypass-pymfyqgb | Cisco IOS XR Software iPXE Boot Signature Bypass Vulnerability | 2023-09-13T16:00:00+00:00 | 2024-08-07T15:55:33+00:00 |
| cisco-sa-iosxr-ipxe-sigbypass-pymfyqgB | Cisco IOS XR Software iPXE Boot Signature Bypass Vulnerability | 2023-09-13T16:00:00+00:00 | 2024-08-07T15:55:33+00:00 |
| cisco-sa-cssm-auth-slw3uhuy | Cisco Smart Software Manager On-Prem Password Change Vulnerability | 2024-07-17T16:00:00+00:00 | 2024-08-07T14:54:52+00:00 |
| cisco-sa-webex-app-zjnm8x8j | Cisco Webex App Vulnerabilities | 2024-07-17T16:00:00+00:00 | 2024-07-17T16:00:00+00:00 |
| cisco-sa-webex-app-ZjNm8X8j | Cisco Webex App Vulnerabilities | 2024-07-17T16:00:00+00:00 | 2024-07-17T16:00:00+00:00 |
| cisco-sa-sb-rv34x-rce-7pqfu2e | Cisco RV340 and RV345 Dual WAN Gigabit VPN Routers Authenticated Remote Code Execution Vulnerability | 2024-07-17T16:00:00+00:00 | 2024-07-17T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-68223 | drm/radeon: delete radeon_fence_process in is_signaled, no deadlock | 2025-12-02T00:00:00.000Z | 2026-03-31T15:16:57.000Z |
| msrc_cve-2025-39905 | net: phylink: add lock for serializing concurrent pl->phydev writes with resolver | 2025-10-02T00:00:00.000Z | 2026-03-31T15:16:52.000Z |
| msrc_cve-2023-52569 | btrfs: remove BUG() after failure to insert delayed dir index item | 2024-03-02T08:00:00.000Z | 2026-03-31T15:16:52.000Z |
| msrc_cve-2024-46806 | drm/amdgpu: Fix the warning division or modulo by zero | 2024-09-01T07:00:00.000Z | 2026-03-31T15:16:51.000Z |
| msrc_cve-2025-40251 | devlink: rate: Unset parent pointer in devl_rate_nodes_destroy | 2025-12-02T00:00:00.000Z | 2026-03-31T15:16:43.000Z |
| msrc_cve-2025-40325 | md/raid10: wait barrier before returning discard request with REQ_NOWAIT | 2025-04-02T00:00:00.000Z | 2026-03-31T15:16:42.000Z |
| msrc_cve-2024-49940 | l2tp: prevent possible tunnel refcount underflow | 2024-10-01T07:00:00.000Z | 2026-03-31T15:16:41.000Z |
| msrc_cve-2024-54683 | netfilter: IDLETIMER: Fix for possible ABBA deadlock | 2025-01-02T00:00:00.000Z | 2026-03-31T15:16:39.000Z |
| msrc_cve-2024-46835 | drm/amdgpu: Fix smatch static checker warning | 2024-09-01T07:00:00.000Z | 2026-03-31T15:16:36.000Z |
| msrc_cve-2025-39901 | i40e: remove read access to debugfs files | 2025-10-02T00:00:00.000Z | 2026-03-31T15:16:28.000Z |
| msrc_cve-2025-40039 | ksmbd: Fix race condition in RPC handle list access | 2025-10-02T00:00:00.000Z | 2026-03-31T15:16:27.000Z |
| msrc_cve-2023-52532 | net: mana: Fix TX CQE error handling | 2024-03-02T08:00:00.000Z | 2026-03-31T15:16:23.000Z |
| msrc_cve-2024-46857 | net/mlx5: Fix bridge mode operations when there are no VFs | 2024-09-01T07:00:00.000Z | 2026-03-31T15:16:21.000Z |
| msrc_cve-2024-58006 | PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar() | 2025-02-02T00:00:00.000Z | 2026-03-31T15:16:19.000Z |
| msrc_cve-2024-49888 | bpf: Fix a sdiv overflow issue | 2024-10-01T07:00:00.000Z | 2026-03-31T15:16:18.000Z |
| msrc_cve-2025-40005 | spi: cadence-quadspi: Implement refcount to handle unbind during busy | 2025-10-02T00:00:00.000Z | 2026-03-31T15:16:12.000Z |
| msrc_cve-2024-57872 | scsi: ufs: pltfrm: Dellocate HBA during ufshcd_pltfrm_remove() | 2025-01-02T00:00:00.000Z | 2026-03-31T15:16:07.000Z |
| msrc_cve-2024-46727 | drm/amd/display: Add otg_master NULL check within resource_log_pipe_topology_update | 2024-09-01T07:00:00.000Z | 2026-03-31T15:16:05.000Z |
| msrc_cve-2025-39927 | ceph: fix race condition validating r_parent before applying state | 2025-10-02T00:00:00.000Z | 2026-03-31T15:16:04.000Z |
| msrc_cve-2025-37882 | usb: xhci: Fix isochronous Ring Underrun/Overrun event handling | 2025-05-02T00:00:00.000Z | 2026-03-31T15:16:04.000Z |
| msrc_cve-2026-23000 | net/mlx5e: Fix crash on profile change rollback failure | 2026-01-02T00:00:00.000Z | 2026-03-31T15:15:57.000Z |
| msrc_cve-2024-49934 | fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name | 2024-10-01T07:00:00.000Z | 2026-03-31T15:15:54.000Z |
| msrc_cve-2026-3503 | Fault injection attack with ML-DSA and ML-KEM on ARM | 2026-03-02T00:00:00.000Z | 2026-03-31T15:15:51.000Z |
| msrc_cve-2026-21620 | TFTP Path Traversal | 2026-02-02T00:00:00.000Z | 2026-03-31T15:15:42.000Z |
| msrc_cve-2025-37856 | btrfs: harden block_group::bg_list against list_del() races | 2025-05-02T00:00:00.000Z | 2026-03-31T15:15:42.000Z |
| msrc_cve-2024-46730 | drm/amd/display: Ensure array index tg_inst won't be -1 | 2024-09-01T07:00:00.000Z | 2026-03-31T15:15:42.000Z |
| msrc_cve-2024-36911 | hv_netvsc: Don't free decrypted memory | 2024-05-02T07:00:00.000Z | 2026-03-31T15:15:42.000Z |
| msrc_cve-2024-49926 | rcu-tasks: Fix access non-existent percpu rtpcp variable in rcu_tasks_need_gpcb() | 2024-10-01T07:00:00.000Z | 2026-03-31T15:15:39.000Z |
| msrc_cve-2026-3230 | Improper key_share validation in TLS 1.3 HelloRetryRequest | 2026-03-02T00:00:00.000Z | 2026-03-31T15:15:35.000Z |
| msrc_cve-2024-26830 | i40e: Do not allow untrusted VF to remove administratively set MAC | 2024-04-02T07:00:00.000Z | 2026-03-31T15:15:26.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0048 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-02-11T19:17:03.555400Z | 2025-02-11T19:17:03.555400Z |
| ncsc-2025-0047 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-02-11T19:16:04.610648Z | 2025-02-11T19:16:04.610648Z |
| ncsc-2025-0046 | Kwetsbaarheid verholpen in Apple iOS en iPadOS | 2025-02-11T09:54:03.266145Z | 2025-02-11T09:54:03.266145Z |
| ncsc-2025-0045 | Kwetsbaarheden verholpen in SAP producten | 2025-02-11T09:08:48.427126Z | 2025-02-11T09:08:48.427126Z |
| ncsc-2025-0043 | Kwetsbaarheden verholpen in Cisco IOS, IOS XE en IOS XR Software | 2025-02-07T07:44:34.306225Z | 2025-02-11T06:53:00.177478Z |
| ncsc-2025-0041 | Kwetsbaarheden verholpen in F5 BIG-IP | 2025-02-07T07:38:11.981975Z | 2025-02-11T06:51:17.629249Z |
| ncsc-2025-0044 | Kwetsbaarheden verholpen in Cisco Identity Services Engine | 2025-02-07T07:50:13.796001Z | 2025-02-07T07:50:13.796001Z |
| ncsc-2025-0042 | Kwetsbaarheden verholpen in Cisco AsyncOS Software | 2025-02-07T07:41:10.612134Z | 2025-02-07T07:41:10.612134Z |
| ncsc-2025-0040 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2025-02-07T07:33:40.643635Z | 2025-02-07T07:33:40.643635Z |
| ncsc-2025-0039 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-02-04T09:13:08.342699Z | 2025-02-04T09:13:08.342699Z |
| ncsc-2025-0038 | Kwetsbaarheden verholpen in Zimbra Collaboration | 2025-02-04T09:10:55.525420Z | 2025-02-04T09:10:55.525420Z |
| ncsc-2025-0037 | Kwetsbaarheden verholpen in VMware Aria Operations | 2025-01-31T12:25:21.454904Z | 2025-01-31T12:25:21.454904Z |
| ncsc-2025-0036 | Kwetsbaarheden verholpen in Rockwell Automation FactoryTalk | 2025-01-29T10:35:51.164484Z | 2025-01-29T10:35:51.164484Z |
| ncsc-2025-0035 | Kwetsbaarheden verholpen in Rockwell Automation FactoryTalk | 2025-01-29T10:32:40.594073Z | 2025-01-29T10:32:40.594073Z |
| ncsc-2025-0034 | Kwetsbaarheden verholpen in Apple iPadOS en iOS | 2025-01-28T11:31:14.861619Z | 2025-01-28T11:31:14.861619Z |
| ncsc-2025-0033 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2025-01-28T10:43:20.128933Z | 2025-01-28T10:43:20.128933Z |
| ncsc-2025-0009 | Kwetsbaarheid verholpen in FortiNet FortiOS en FortiProxy | 2025-01-14T14:58:02.272504Z | 2025-01-28T10:42:03.747650Z |
| ncsc-2025-0032 | Kwetsbaarheden verholpen in Apple macOS | 2025-01-28T10:37:38.942515Z | 2025-01-28T10:37:38.942515Z |
| ncsc-2025-0031 | Kwetsbaarheid verholpen in Cisco Meeting Management | 2025-01-23T13:56:01.391387Z | 2025-01-23T13:56:01.391387Z |
| ncsc-2025-0030 | Kwetsbaarheid verholpen in Cisco BroadWorks | 2025-01-23T13:53:16.250734Z | 2025-01-23T13:53:16.250734Z |
| ncsc-2025-0029 | Kwetsbaarheid verholpen in SonicWall SMA1000 Appliance | 2025-01-23T13:50:32.719670Z | 2025-01-23T13:50:32.719670Z |
| ncsc-2025-0028 | Kwetsbaarheden verholpen in Oracle Analytics | 2025-01-22T13:36:58.196605Z | 2025-01-22T13:36:58.196605Z |
| ncsc-2025-0027 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2025-01-22T13:36:27.908718Z | 2025-01-22T13:36:27.908718Z |
| ncsc-2025-0026 | Kwetsbaarheden verholpen in Oracle JD Edwards | 2025-01-22T13:34:42.937250Z | 2025-01-22T13:34:42.937250Z |
| ncsc-2025-0025 | Kwetsbaarheden verholpen in Oracle Financial Services | 2025-01-22T13:33:00.723963Z | 2025-01-22T13:33:00.723963Z |
| ncsc-2025-0024 | Kwetsbaarheden verholpen in Oracle MySQL | 2025-01-22T13:32:27.142159Z | 2025-01-22T13:32:27.142159Z |
| ncsc-2025-0023 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2025-01-22T13:31:17.380797Z | 2025-01-22T13:31:17.380797Z |
| ncsc-2025-0022 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2025-01-22T13:31:16.019294Z | 2025-01-22T13:31:16.019294Z |
| ncsc-2025-0021 | Kwetsbaarheden verholpen in Oracle Communications | 2025-01-22T13:30:50.189632Z | 2025-01-22T13:30:50.189632Z |
| ncsc-2025-0020 | Kwetsbaarheden verholpen in Oracle Database producten | 2025-01-22T13:30:16.354373Z | 2025-01-22T13:30:16.354373Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10216-1 | python311-asgiref-3.11.1-1.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10215-1 | owntone-29.0-2.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10214-1 | mupdf-1.27.1-1.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10213-1 | libxml2-16-2.14.5-4.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10212-1 | firefox-esr-140.7.1-1.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10211-1 | azure-cli-core-2.83.0-2.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10210-1 | python311-pip-26.0.1-1.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10209-1 | libsoup-2_4-1-2.74.3-16.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10208-1 | libsoup-3_0-0-3.6.5-13.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10207-1 | frr-10.2.1-4.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:20236-1 | Security update for nodejs22 | 2026-02-15T09:26:17Z | 2026-02-15T09:26:17Z |
| opensuse-su-2026:20235-1 | Security update for fontforge | 2026-02-14T21:30:01Z | 2026-02-14T21:30:01Z |
| opensuse-su-2026:10206-1 | python314-3.14.3-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10205-1 | python311-cryptography-46.0.5-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10204-1 | openjfx-17.0.18.0-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10203-1 | libssh-config-0.11.4-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10202-1 | himmelblau-2.3.5+git0.9dd526c-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10201-1 | chromedriver-145.0.7632.45-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:20233-1 | Security update for openCryptoki | 2026-02-13T17:42:04Z | 2026-02-13T17:42:04Z |
| opensuse-su-2026:20227-1 | Security update for patch | 2026-02-13T16:41:43Z | 2026-02-13T16:41:43Z |
| opensuse-su-2026:20219-1 | Security update for htmldoc | 2026-02-13T16:07:48Z | 2026-02-13T16:07:48Z |
| opensuse-su-2026:20220-1 | Security update for go1.24 | 2026-02-13T11:53:30Z | 2026-02-13T11:53:30Z |
| opensuse-su-2026:20214-1 | Security update for go1.25 | 2026-02-13T10:08:14Z | 2026-02-13T10:08:14Z |
| opensuse-su-2026:20206-1 | Security update for kepler | 2026-02-13T08:53:10Z | 2026-02-13T08:53:10Z |
| opensuse-su-2026:10200-1 | python310-3.10.19-4.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10199-1 | python311-pymssql-2.3.12-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10198-1 | python311-Pillow-12.1.1-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10197-1 | libecpg6-18.2-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10196-1 | matrix-synapse-1.147.1-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10195-1 | gimp-3.0.8-2.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:1805 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T10:17:28+00:00 | 2026-04-20T18:53:04+00:00 |
| rhsa-2026:1803 | Red Hat Security Advisory: fence-agents security update | 2026-02-03T09:45:07+00:00 | 2026-04-20T18:53:02+00:00 |
| rhsa-2026:1794 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T07:18:11+00:00 | 2026-04-20T18:53:02+00:00 |
| rhsa-2026:1793 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T07:17:26+00:00 | 2026-04-20T18:53:02+00:00 |
| rhsa-2026:1792 | Red Hat Security Advisory: fence-agents security update | 2026-02-03T07:25:42+00:00 | 2026-04-20T18:53:02+00:00 |
| rhsa-2026:1791 | Red Hat Security Advisory: fence-agents security update | 2026-02-03T07:21:33+00:00 | 2026-04-20T18:53:01+00:00 |
| rhsa-2026:1736 | Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage | 2026-02-02T17:31:06+00:00 | 2026-04-20T18:53:00+00:00 |
| rhsa-2026:1735 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T17:50:59+00:00 | 2026-04-20T18:53:00+00:00 |
| rhsa-2026:1734 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T17:45:39+00:00 | 2026-04-20T18:53:00+00:00 |
| rhsa-2026:1730 | Red Hat Security Advisory: Red Hat Quay 3.12.13 | 2026-02-02T15:52:56+00:00 | 2026-04-20T18:53:00+00:00 |
| rhsa-2026:1729 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T15:49:34+00:00 | 2026-04-20T18:52:59+00:00 |
| rhsa-2026:1726 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T15:25:44+00:00 | 2026-04-20T18:52:59+00:00 |
| rhsa-2026:1717 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T14:17:19+00:00 | 2026-04-20T18:52:59+00:00 |
| rhsa-2026:1712 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-02-02T13:10:47+00:00 | 2026-04-20T18:52:59+00:00 |
| rhsa-2026:1706 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T12:38:43+00:00 | 2026-04-20T18:52:58+00:00 |
| rhsa-2026:1704 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-02-02T11:50:53+00:00 | 2026-04-20T18:52:58+00:00 |
| rhsa-2026:1693 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T10:02:03+00:00 | 2026-04-20T18:52:58+00:00 |
| rhsa-2026:1676 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-02-02T06:53:02+00:00 | 2026-04-20T18:52:58+00:00 |
| rhsa-2026:1674 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T06:47:53+00:00 | 2026-04-20T18:52:57+00:00 |
| rhsa-2026:1652 | Red Hat Security Advisory: Red Hat Ceph Storage | 2026-02-02T02:51:27+00:00 | 2026-04-20T18:52:56+00:00 |
| rhsa-2026:1619 | Red Hat Security Advisory: python3.12-urllib3 security update | 2026-02-02T01:58:41+00:00 | 2026-04-20T18:52:55+00:00 |
| rhsa-2026:1618 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T01:17:06+00:00 | 2026-04-20T18:52:55+00:00 |
| rhsa-2026:1609 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update | 2026-01-30T15:48:57+00:00 | 2026-04-20T18:52:55+00:00 |
| rhsa-2026:1599 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Container Release Update | 2026-01-29T19:16:21+00:00 | 2026-04-20T18:52:55+00:00 |
| rhsa-2026:1596 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2026-01-29T18:40:37+00:00 | 2026-04-20T18:52:55+00:00 |
| rhsa-2026:1546 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-01-29T09:08:25+00:00 | 2026-04-20T18:52:55+00:00 |
| rhsa-2026:1504 | Red Hat Security Advisory: satellite/foreman-mcp-server-rhel9 container image available as a Technology Preview | 2026-01-28T17:00:30+00:00 | 2026-04-20T18:52:54+00:00 |
| rhsa-2026:1485 | Red Hat Security Advisory: RHUI 4.11.3 security update - python-urllib3 | 2026-01-28T11:24:11+00:00 | 2026-04-20T18:52:53+00:00 |
| rhsa-2026:1254 | Red Hat Security Advisory: python-urllib3 security update | 2026-01-26T20:52:30+00:00 | 2026-04-20T18:52:53+00:00 |
| rhsa-2026:1241 | Red Hat Security Advisory: resource-agents security update | 2026-01-26T18:01:29+00:00 | 2026-04-20T18:52:53+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-017796 | SSA-017796: Multiple File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-806742 | SSA-806742: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-797296 | SSA-797296: XT File Parsing Vulnerability in Parasolid | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-647068 | SSA-647068: Ripple20 in SIMATIC RTLS Gateways | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-602936 | SSA-602936: Multiple Vulnerabilities in SCALANCE SC-600 Family before V3.1 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-580228 | SSA-580228: Use of Hard-Coded Credentials Vulnerability in Location Intelligence before V4.3 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-543502 | SSA-543502: Local Privilege Escalation Vulnerability in Unicam FX | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-516818 | SSA-516818: TCP Sequence Number Validation Vulnerability in the TCP/IP Stack of CP343-1 Devices | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-434032 | SSA-434032: Input Validation Vulnerability in the DHCP Client of Nucleus RTOS | 2019-11-12T00:00:00Z | 2025-03-11T00:00:00Z |
| SSA-309571 | SSA-309571: IPU 2021.1 Vulnerabilities in Siemens Industrial Products using Intel CPUs (June 2021) | 2021-08-10T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-248289 | SSA-248289: Denial of Service Vulnerabilities in the IPv6 Stack of Nucleus RTOS | 2021-04-13T00:00:00Z | 2025-03-11T00:00:00Z |
| SSA-108696 | SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-017796 | SSA-017796: Multiple File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-844761 | SSA-844761: Multiple Vulnerabilities in SiNVR/SiVMS Video Server | 2020-03-10T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-794653 | SSA-794653: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-786191 | SSA-786191: Local Privilege Escalation Vulnerability in Spectrum Power 7 | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-777015 | SSA-777015: Multiple Vulnerabilities in SIMATIC CN 4100 before V2.7 | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-772220 | SSA-772220: OpenSSL Vulnerabilities in Industrial Products | 2021-07-13T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-761844 | SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) | 2021-04-13T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-761617 | SSA-761617: Authentication Bypass and Information Disclosure Vulnerabilities in SiNVR/SiVMS Video Server | 2019-12-10T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-702935 | SSA-702935: Redfish Server Vulnerability in maxView Storage Manager | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-589891 | SSA-589891: Multiple PAR File Parsing Vulnerabilities in Solid Edge | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-583634 | SSA-583634: Command Injection Vulnerability in the CPCI85 Firmware of SICAM A8000 Devices | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-570294 | SSA-570294: Multiple Vulnerabilities in SICAM Q100 Before V2.50 | 2022-11-08T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-480095 | SSA-480095: Vulnerabilities in the Web Interface of SICAM Q100 Devices before V2.60 | 2023-12-12T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-844761 | SSA-844761: Multiple Vulnerabilities in SiNVR/SiVMS Video Server | 2020-03-10T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-794653 | SSA-794653: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-786191 | SSA-786191: Local Privilege Escalation Vulnerability in Spectrum Power 7 | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-777015 | SSA-777015: Multiple Vulnerabilities in SIMATIC CN 4100 before V2.7 | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-772220 | SSA-772220: OpenSSL Vulnerabilities in Industrial Products | 2021-07-13T00:00:00Z | 2024-01-09T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20895-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:35Z | 2026-03-24T16:48:35Z |
| suse-su-2026:20852-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:35Z | 2026-03-24T16:48:35Z |
| suse-su-2026:20851-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:35Z | 2026-03-24T16:48:35Z |
| suse-su-2026:20876-1 | Security update for the Linux Kernel | 2026-03-24T16:48:29Z | 2026-03-24T16:48:29Z |
| suse-su-2026:20894-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20893-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20892-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20891-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20850-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20849-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20848-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20847-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20926-1 | Security update for tomcat11 | 2026-03-24T16:09:46Z | 2026-03-24T16:09:46Z |
| suse-su-2026:0998-1 | Security update for gstreamer-plugins-ugly | 2026-03-24T14:56:39Z | 2026-03-24T14:56:39Z |
| suse-su-2026:0997-1 | Security update for the Linux Kernel (Live Patch 45 for SUSE Linux Enterprise 15 SP4) | 2026-03-24T14:34:37Z | 2026-03-24T14:34:37Z |
| suse-su-2026:20925-1 | Security update for nghttp2 | 2026-03-24T12:31:51Z | 2026-03-24T12:31:51Z |
| suse-su-2026:20833-1 | Security update for nghttp2 | 2026-03-24T12:31:51Z | 2026-03-24T12:31:51Z |
| suse-su-2026:20832-1 | Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-03-24T11:33:36Z | 2026-03-24T11:33:36Z |
| suse-su-2026:20826-1 | Security update for systemd | 2026-03-24T09:34:46Z | 2026-03-24T09:34:46Z |
| suse-su-2026:20822-1 | Security update for systemd | 2026-03-24T09:27:18Z | 2026-03-24T09:27:18Z |
| suse-su-2026:0992-1 | Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4) | 2026-03-24T09:11:21Z | 2026-03-24T09:11:21Z |
| suse-su-2026:20821-1 | Security update for python-pyasn1 | 2026-03-24T09:09:54Z | 2026-03-24T09:09:54Z |
| suse-su-2026:0993-1 | Security update for go1.26-openssl | 2026-03-24T08:54:50Z | 2026-03-24T08:54:50Z |
| suse-su-2026:0991-1 | Security update for systemd | 2026-03-24T07:23:00Z | 2026-03-24T07:23:00Z |
| suse-su-2026:0990-1 | Security update for systemd | 2026-03-24T07:22:51Z | 2026-03-24T07:22:51Z |
| suse-su-2026:20825-1 | Security update for salt | 2026-03-24T06:19:37Z | 2026-03-24T06:19:37Z |
| suse-su-2026:20820-1 | Security update for salt | 2026-03-24T05:49:23Z | 2026-03-24T05:49:23Z |
| suse-su-2026:20831-1 | Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-03-24T05:44:24Z | 2026-03-24T05:44:24Z |
| suse-su-2026:20830-1 | Security update for the Linux Kernel RT (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-03-24T05:43:06Z | 2026-03-24T05:43:06Z |
| suse-su-2026:20829-1 | Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-03-24T04:10:29Z | 2026-03-24T04:10:29Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:23484 | Moderate: libssh security update | 2025-12-17T00:00:00Z | 2025-12-21T19:50:15Z |
| alsa-2025:23210 | Important: keylime security update | 2025-12-15T00:00:00Z | 2025-12-17T13:58:57Z |
| alsa-2025:22865 | Moderate: kernel security update | 2025-12-08T00:00:00Z | 2025-12-17T11:46:25Z |
| alsa-2025:23049 | Important: tomcat security update | 2025-12-10T00:00:00Z | 2025-12-17T11:42:14Z |
| alsa-2025:23050 | Important: tomcat security update | 2025-12-10T00:00:00Z | 2025-12-17T11:40:04Z |
| alsa-2025:23052 | Important: tomcat9 security update | 2025-12-10T00:00:00Z | 2025-12-17T11:36:41Z |
| alsa-2025:23111 | Moderate: mysql:8.4 security update | 2025-12-11T00:00:00Z | 2025-12-17T11:32:52Z |
| alsa-2025:22395 | Moderate: kernel security update | 2025-12-01T00:00:00Z | 2025-12-15T12:44:56Z |
| alsa-2025:23087 | Moderate: grafana security update | 2025-12-11T00:00:00Z | 2025-12-15T12:37:43Z |
| alsa-2025:23134 | Moderate: mysql:8.0 security update | 2025-12-11T00:00:00Z | 2025-12-12T10:33:42Z |
| alsa-2025:23142 | Important: wireshark security update | 2025-12-11T00:00:00Z | 2025-12-12T10:27:48Z |
| alsa-2025:23139 | Moderate: libsoup3 security update | 2025-12-11T00:00:00Z | 2025-12-12T10:26:40Z |
| alsa-2025:23137 | Moderate: mysql:8.4 security update | 2025-12-11T00:00:00Z | 2025-12-12T10:24:42Z |
| alsa-2025:23109 | Moderate: mysql security update | 2025-12-11T00:00:00Z | 2025-12-12T10:21:57Z |
| alsa-2025:23128 | Important: firefox security update | 2025-12-11T00:00:00Z | 2025-12-12T10:19:27Z |
| alsa-2025:23088 | Moderate: grafana security update | 2025-12-11T00:00:00Z | 2025-12-12T10:18:20Z |
| alsa-2025:23083 | Important: wireshark security update | 2025-12-10T00:00:00Z | 2025-12-12T10:17:19Z |
| alsa-2025:23035 | Important: firefox security update | 2025-12-10T00:00:00Z | 2025-12-12T10:16:15Z |
| alsa-2025:23034 | Important: firefox security update | 2025-12-10T00:00:00Z | 2025-12-12T10:14:54Z |
| alsa-2025:23008 | Moderate: mysql8.4 security update | 2025-12-10T00:00:00Z | 2025-12-12T10:13:50Z |
| alsa-2025:23048 | Important: tomcat security update | 2025-12-10T00:00:00Z | 2025-12-11T14:01:21Z |
| alsa-2025:23086 | Moderate: luksmeta security update | 2025-12-11T00:00:00Z | 2025-12-11T13:43:22Z |
| alsa-2025:22760 | Important: abrt security update | 2025-12-04T00:00:00Z | 2025-12-10T10:40:28Z |
| alsa-2025:22854 | Moderate: kernel security update | 2025-12-08T00:00:00Z | 2025-12-10T08:12:35Z |
| alsa-2025:22790 | Important: webkit2gtk3 security update | 2025-12-08T00:00:00Z | 2025-12-08T14:01:28Z |
| alsa-2025:22789 | Important: webkit2gtk3 security update | 2025-12-08T00:00:00Z | 2025-12-08T13:59:43Z |
| alsa-2025:22800 | Moderate: kernel-rt security update | 2025-12-08T00:00:00Z | 2025-12-08T13:58:04Z |
| alsa-2025:22801 | Moderate: kernel security update | 2025-12-08T00:00:00Z | 2025-12-08T13:53:19Z |
| alsa-2025:22405 | Moderate: kernel security update | 2025-12-01T00:00:00Z | 2025-12-08T12:22:10Z |
| alsa-2025:20994 | Important: ipa security update | 2025-11-11T00:00:00Z | 2025-12-05T09:05:25Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-1249 | Heap-buffer-overflow in extract_ice_option | 2024-10-30T00:15:55.709182Z | 2025-03-18T00:40:00.171776Z |
| osv-2025-119 | Heap-buffer-overflow in snmp_config_when | 2025-02-14T00:15:08.375253Z | 2025-03-18T00:37:43.437021Z |
| osv-2025-161 | Heap-buffer-overflow in se_add_pair | 2025-02-24T00:15:33.662895Z | 2025-03-18T00:37:12.676515Z |
| osv-2025-113 | Heap-buffer-overflow in snmp_log_options | 2025-02-14T00:01:45.812592Z | 2025-03-18T00:35:43.690001Z |
| osv-2023-1161 | Heap-buffer-overflow in std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<ch | 2023-11-14T13:03:13.962614Z | 2025-03-18T00:34:06.623648Z |
| osv-2025-132 | Heap-use-after-free in netsnmp_hex_to_binary | 2025-02-17T00:01:01.920904Z | 2025-03-18T00:33:26.648884Z |
| osv-2024-1216 | Use-of-uninitialized-value in Poco::Net::NTLMCredentials::parseChallengeMessage | 2024-10-13T00:11:43.323181Z | 2025-03-18T00:32:42.736858Z |
| osv-2025-131 | Heap-buffer-overflow in vips_foreign_save_heif_write_block | 2025-02-16T00:13:44.282887Z | 2025-03-18T00:32:21.245932Z |
| osv-2025-162 | Heap-buffer-overflow in snmp_in_options | 2025-02-24T00:15:40.967551Z | 2025-03-18T00:30:24.116747Z |
| osv-2024-1209 | Heap-use-after-free in xmlValidateOneElement | 2024-10-11T00:15:43.610812Z | 2025-03-18T00:30:11.577855Z |
| osv-2025-54 | UNKNOWN READ in Assimp::SceneCombiner::CopyScene | 2025-01-22T00:15:23.827419Z | 2025-03-18T00:29:47.108675Z |
| osv-2025-133 | Stack-buffer-overflow in se_read_conf | 2025-02-17T00:02:18.986364Z | 2025-03-18T00:27:33.917908Z |
| osv-2024-1071 | Use-of-uninitialized-value in Poco::Dynamic::Var::~Var | 2024-09-15T00:06:58.342742Z | 2025-03-18T00:25:32.915201Z |
| osv-2024-1322 | Security exception in com.alibaba.fastjson2.JSONReader.readObject | 2024-11-18T00:00:16.618504Z | 2025-03-18T00:24:17.881614Z |
| osv-2025-148 | Heap-buffer-overflow in setup_engineID | 2025-02-23T00:00:36.951152Z | 2025-03-18T00:22:22.817245Z |
| osv-2025-215 | Security exception in graphql.parser.GraphqlAntlrToLanguage.createType | 2025-03-18T00:09:36.655072Z | 2025-03-18T00:09:36.655425Z |
| osv-2022-573 | Heap-buffer-overflow in zim_ReflectionEnumBackedCase_getBackingValue | 2022-07-13T00:00:07.763765Z | 2025-03-12T17:15:50.141849Z |
| osv-2025-190 | Heap-buffer-overflow in std::__1::__function::__func<cv::PngDecoder::compose_frame | 2025-03-11T00:04:32.361664Z | 2025-03-11T00:04:32.362119Z |
| osv-2024-831 | Heap-buffer-overflow in jv_parse | 2024-08-16T00:03:12.871175Z | 2025-03-07T14:24:40.166702Z |
| osv-2024-919 | Heap-buffer-overflow in validate_relpath | 2024-08-16T00:09:34.461792Z | 2025-03-06T14:20:56.754046Z |
| osv-2024-1312 | Heap-buffer-overflow in jv_string_vfmt | 2024-11-15T00:16:08.928897Z | 2025-03-05T14:20:12.622041Z |
| osv-2023-1344 | Heap-buffer-overflow in jv_string_vfmt | 2023-12-22T00:11:40.065456Z | 2025-03-05T14:16:07.938645Z |
| osv-2025-178 | Heap-buffer-overflow in usm_set_user_password | 2025-02-28T00:16:54.655227Z | 2025-02-28T00:16:54.655745Z |
| osv-2025-177 | Segv on unknown address in chunk_free_object | 2025-02-28T00:16:24.018716Z | 2025-02-28T00:16:24.019131Z |
| osv-2025-175 | UNKNOWN READ in insert_free | 2025-02-28T00:12:26.919208Z | 2025-02-28T00:12:26.919553Z |
| osv-2025-174 | Heap-use-after-free in gc_trace | 2025-02-28T00:12:25.140274Z | 2025-02-28T00:12:25.140618Z |
| osv-2025-173 | UNKNOWN READ in chunk_obj_alloc | 2025-02-28T00:11:40.566459Z | 2025-02-28T00:11:40.566797Z |
| osv-2025-165 | Index-out-of-bounds in dwg_decode_eed | 2025-02-26T00:17:27.930225Z | 2025-02-26T00:17:27.930707Z |
| osv-2025-160 | UNKNOWN WRITE in ndpi_free_flow_data | 2025-02-24T00:07:49.495615Z | 2025-02-24T00:07:49.495976Z |
| osv-2025-156 | Check failed in CheckUnwind | 2025-02-23T00:16:50.073196Z | 2025-02-23T00:16:50.073520Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2023-0072 | `openssl` `X509StoreRef::objects` is unsound | 2023-11-23T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0070 | Insufficient covariance check makes self_cell unsound | 2023-11-10T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0066 | Vulnerable to privilege escalation using ioctls TIOCSTI and TIOCLINUX | 2023-04-29T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0063 | Denial of service in Quinn servers | 2023-09-21T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0062 | BER/CER/DER decoder panics on invalid input | 2023-09-13T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0061 | libwebp: OOB write in BuildHuffmanTable | 2023-09-12T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0060 | libwebp: OOB write in BuildHuffmanTable | 2023-09-12T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0059 | Unaligned read of `*const *const c_char` pointer | 2023-09-10T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0058 | Exposes reference to non-Sync data to an arbitrary thread | 2023-09-10T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0057 | Fails to prohibit standard library access prior to initialization of Rust standard library runtime | 2023-09-10T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2020-0079 | `socket2` invalidly assumes the memory layout of std::net::SocketAddr | 2020-11-06T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2020-0036 | failure is officially deprecated/unmaintained | 2020-05-02T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2018-0020 | Possible use-after-free with `proplist::Iterator` | 2018-12-22T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2024-0009 | Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') | 2024-01-23T12:00:00Z | 2024-01-24T17:00:49Z |
| rustsec-2024-0008 | Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') | 2024-01-23T12:00:00Z | 2024-01-24T17:00:49Z |
| rustsec-2024-0004 | `cosmwasm` is unmaintained | 2024-01-20T12:00:00Z | 2024-01-21T14:51:38Z |
| rustsec-2024-0002 | `serde` deserialization for `FamStructWrapper` lacks bound checks that could potentially lead to out-of-bounds memory access | 2024-01-02T12:00:00Z | 2024-01-14T03:39:46Z |
| rustsec-2023-0076 | `cpython` is unmaintained | 2023-11-14T12:00:00Z | 2023-12-20T22:34:55Z |
| rustsec-2023-0071 | Marvin Attack: potential key recovery through timing sidechannels | 2023-11-22T12:00:00Z | 2023-12-15T14:57:06Z |
| rustsec-2023-0073 | Infinite decoding loop through specially crafted payload | 2023-12-08T12:00:00Z | 2023-12-09T10:05:32Z |
| rustsec-2023-0029 | TLS certificate common name validation bypass | 2023-03-24T12:00:00Z | 2023-11-08T09:57:41Z |
| rustsec-2023-0069 | sudo-rs: Path Traversal vulnerability | 2023-11-01T12:00:00Z | 2023-11-06T12:48:19Z |
| rustsec-2019-0030 | Incorrect implementation of the Streebog hash functions | 2019-10-06T12:00:00Z | 2023-11-02T13:03:48Z |
| rustsec-2022-0040 | Multiple soundness issues in `owning_ref` | 2022-01-26T12:00:00Z | 2023-10-14T21:21:18Z |
| rustsec-2023-0067 | `fehler` is unmaintained; use `culpa` instead | 2023-10-12T12:00:00Z | 2023-10-14T15:01:02Z |
| rustsec-2023-0052 | webpki: CPU denial of service in certificate path building | 2023-08-22T12:00:00Z | 2023-09-30T20:13:23Z |
| rustsec-2023-0065 | Tungstenite allows remote attackers to cause a denial of service | 2023-09-25T12:00:00Z | 2023-09-29T12:03:03Z |
| rustsec-2021-0139 | ansi_term is Unmaintained | 2021-08-18T12:00:00Z | 2023-09-06T22:52:31Z |
| rustsec-2023-0056 | Default functions in VolatileMemory trait lack bounds checks, potentially leading to out-of-bounds memory accesses | 2023-09-01T12:00:00Z | 2023-09-06T17:18:09Z |
| rustsec-2023-0054 | Use-after-free in `vec_insert_bytes` | 2023-08-07T12:00:00Z | 2023-08-27T15:52:52Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2025-12576 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-13T09:30:49.795Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-12555 | Incorrect Authorization in GitLab | 2026-03-13T09:30:40.688Z | 2026-03-13T09:37:20.375Z |
| bit-consul-2026-2808 | Consul vulnerable to arbitrary file reads through the vault kubernetes authentication provider | 2026-03-13T09:02:37.072Z | 2026-03-13T09:37:20.375Z |
| bit-envoy-2026-26330 | Envoy global rate limit may crash when the response phase limit is enabled and the response phase request is failed directly | 2026-03-12T08:39:47.564Z | 2026-03-12T09:10:07.191Z |
| bit-envoy-2026-26311 | Envoy HTTP: filter chain execution on reset streams causing UAF crash | 2026-03-12T08:39:46.109Z | 2026-03-12T09:10:07.191Z |
| bit-envoy-2026-26310 | Crash for scoped ip address in Envoy during DNS | 2026-03-12T08:39:44.551Z | 2026-03-12T09:10:07.191Z |
| bit-envoy-2026-26309 | Envoy has an off-by-one write in JsonEscaper::escapeString() | 2026-03-12T08:39:42.871Z | 2026-03-12T09:10:07.191Z |
| bit-envoy-2026-26308 | Envoy has an RBAC Header Validation Bypass via Multi-Value Header Concatenation | 2026-03-12T08:39:41.078Z | 2026-03-12T09:10:07.191Z |
| bit-appsmith-2026-30862 | Critical Stored XSS & Privilege Escalation in Appsmith | 2026-03-12T08:36:03.908Z | 2026-03-12T09:10:07.191Z |
| bit-parse-2026-30863 | Parse Server: JWT audience validation bypass in Google, Apple, and Facebook authentication adapters | 2026-03-11T15:49:05.551Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30854 | Parse Server: GraphQL `__type` introspection bypass via inline fragments when public introspection is disabled | 2026-03-11T15:49:02.829Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30850 | Parse Server: File metadata endpoint bypasses `beforeFind` / `afterFind` trigger authorization | 2026-03-11T15:48:59.848Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30848 | Parse Server: `PagesRouter` path traversal allows reading files outside configured pages directory | 2026-03-11T15:48:57.194Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30835 | Parse Server: Malformed `$regex` query leaks database error details in API response | 2026-03-11T15:48:54.398Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30229 | Parse Server: Endpoint `/loginAs` allows `readOnlyMasterKey` to gain full read and write access as any user | 2026-03-11T15:48:51.922Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30228 | Parse Server: File creation and deletion bypasses `readOnlyMasterKey` write restriction | 2026-03-11T15:48:49.330Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-29182 | Parse Server: Cloud Hooks and Cloud Jobs bypass `readOnlyMasterKey` write restriction | 2026-03-11T15:48:46.637Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-27804 | Parse Server: Account takeover via JWT algorithm confusion in Google auth adapter | 2026-03-02T11:46:50.810Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2024-29027 | Parse Server crash and RCE via invalid Cloud Function or Cloud Job name | 2024-03-21T07:25:25.649Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2024-27298 | Parse Server literalizeRegexPart SQL Injection | 2024-03-31T18:25:01.637Z | 2026-03-11T18:56:50.865Z |
| bit-zookeeper-2026-24308 | Apache ZooKeeper: Sensitive information disclosure in client configuration handling | 2026-03-10T08:52:17.946Z | 2026-03-11T09:11:40.352Z |
| bit-zookeeper-2026-24281 | Apache ZooKeeper: Reverse-DNS fallback enables hostname verification bypass in ZooKeeper ZKTrustManager | 2026-03-10T08:52:16.699Z | 2026-03-11T09:11:40.352Z |
| bit-golang-2026-27138 | Panic in name constraint checking for malformed certificates in crypto/x509 | 2026-03-10T08:44:12.992Z | 2026-03-11T09:11:40.352Z |
| bit-golang-2026-27137 | Incorrect enforcement of email constraints in crypto/x509 | 2026-03-10T08:44:11.145Z | 2026-03-11T09:11:40.352Z |
| bit-golang-2026-25679 | Incorrect parsing of IPv6 host literals in net/url | 2026-03-10T08:44:09.300Z | 2026-03-11T09:11:40.352Z |
| bit-airflow-2026-24098 | Apache Airflow: Assigning single DAG permission leaked all DAGs Import Errors | 2026-02-12T08:39:03.920Z | 2026-03-11T09:11:40.352Z |
| bit-maven-2021-26291 | block repositories using http by default | 2026-03-10T08:44:08.742Z | 2026-03-10T09:11:39.609Z |
| bit-golang-2026-27139 | FileInfo can escape from a Root in os | 2026-03-10T08:44:14.844Z | 2026-03-10T09:11:39.609Z |
| bit-ghost-2026-29784 | Ghost: Incomplete CSRF protections around OTC use | 2026-03-10T08:40:17.691Z | 2026-03-10T09:11:39.609Z |
| bit-ghost-2026-29053 | Ghost Vulnerable to Remote Code Execution via Malicious Themes | 2026-03-07T08:42:59.400Z | 2026-03-10T09:11:39.609Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-yd87381 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:22:55.178631Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yd51202 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:09:23.124967Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yc48827 | Within HostnameError | 2026-01-30T15:56:24.532632Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yb44027 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T17:04:26.396860Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xz45798 | Within HostnameError | 2026-01-30T14:05:20.961893Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xx70537 | Cancelling a query (e | 2026-01-30T15:32:24.053481Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xs24366 | Cancelling a query (e | 2026-01-30T15:00:52.862887Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xr85161 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:02:54.934169Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xr17407 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:11:25.270681Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xp58111 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:18:55.480183Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xp03839 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:14:55.099611Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xo66167 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:49:52.662006Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xo49545 | Within HostnameError | 2026-01-30T16:21:25.500719Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xl45869 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T16:57:56.432971Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xi02879 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:18:55.578686Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xd92996 | Cancelling a query (e | 2026-01-30T15:46:24.650971Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xb70091 | Within HostnameError | 2026-01-30T14:03:50.560679Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xb16901 | When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers | 2026-01-30T17:13:56.781902Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wq07901 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:01:54.911193Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wp20592 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:05:24.814830Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wi75198 | vulnerability has been identified in Node | 2026-01-30T17:34:27.754206Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wi17406 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T17:35:28.375848Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wg18689 | attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests | 2026-01-30T16:29:25.690410Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-we92783 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:05:24.753007Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wa03785 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:05:24.799763Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vv68546 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:35:55.883570Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vs64679 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T16:35:25.680295Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vl83369 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:53.758258Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vf66781 | Within HostnameError | 2026-01-30T14:57:22.763452Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vc16841 | Within HostnameError | 2026-01-30T15:02:22.944744Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2010-ALE-006 | Vulnérabilité de Safari | 2010-05-14T00:00:00.000000 | 2010-05-27T00:00:00.000000 |
| certa-2010-ale-005 | Vulnérabilité dans Java Deployment Toolkit | 2010-04-09T00:00:00.000000 | 2010-04-16T00:00:00.000000 |
| CERTA-2010-ALE-005 | Vulnérabilité dans Java Deployment Toolkit | 2010-04-09T00:00:00.000000 | 2010-04-16T00:00:00.000000 |
| certa-2010-ale-003 | Vulnérabilité dans Microsoft VBScript | 2010-03-02T00:00:00.000000 | 2010-04-13T00:00:00.000000 |
| CERTA-2010-ALE-003 | Vulnérabilité dans Microsoft VBScript | 2010-03-02T00:00:00.000000 | 2010-04-13T00:00:00.000000 |
| certa-2010-ale-004 | Vulnérabilité dans Microsoft Internet Explorer | 2010-03-10T00:00:00.000000 | 2010-03-31T00:00:00.000000 |
| CERTA-2010-ALE-004 | Vulnérabilité dans Microsoft Internet Explorer | 2010-03-10T00:00:00.000000 | 2010-03-31T00:00:00.000000 |
| certa-2010-ale-002 | Vulnérabilité dans le sous-système MS-DOS de Microsoft Windows | 2010-01-21T00:00:00.000000 | 2010-02-10T00:00:00.000000 |
| CERTA-2010-ALE-002 | Vulnérabilité dans le sous-système MS-DOS de Microsoft Windows | 2010-01-21T00:00:00.000000 | 2010-02-10T00:00:00.000000 |
| certa-2010-ale-001 | Vulnérabilité dans Microsoft Internet Explorer | 2010-01-15T00:00:00.000000 | 2010-01-22T00:00:00.000000 |
| CERTA-2010-ALE-001 | Vulnérabilité dans Microsoft Internet Explorer | 2010-01-15T00:00:00.000000 | 2010-01-22T00:00:00.000000 |
| certa-2009-ale-023 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-12-15T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| CERTA-2009-ALE-023 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-12-15T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2009-ale-021 | Vulnérabilité dans Adobe Illustrator | 2009-12-10T00:00:00.000000 | 2010-01-08T00:00:00.000000 |
| CERTA-2009-ALE-021 | Vulnérabilité dans Adobe Illustrator | 2009-12-10T00:00:00.000000 | 2010-01-08T00:00:00.000000 |
| certa-2009-ale-022 | Vulnérabilité dans TANDBERG MXP | 2009-12-11T00:00:00.000000 | 2009-12-11T00:00:00.000000 |
| CERTA-2009-ALE-022 | Vulnérabilité dans TANDBERG MXP | 2009-12-11T00:00:00.000000 | 2009-12-11T00:00:00.000000 |
| certa-2009-ale-020 | Vulnérabilité dans Internet Explorer | 2009-11-21T00:00:00.000000 | 2009-12-09T00:00:00.000000 |
| CERTA-2009-ALE-020 | Vulnérabilité dans Internet Explorer | 2009-11-21T00:00:00.000000 | 2009-12-09T00:00:00.000000 |
| certa-2009-ale-018 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-10-09T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| certa-2009-ale-015 | Vulnérabilités du serveur FTP de Microsoft IIS | 2009-09-01T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| CERTA-2009-ALE-018 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-10-09T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| CERTA-2009-ALE-015 | Vulnérabilités du serveur FTP de Microsoft IIS | 2009-09-01T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| certa-2009-ale-016 | Vulnérabilité de SMBv2 dans Microsoft Windows | 2009-09-09T00:00:00.000000 | 2009-10-13T00:00:00.000000 |
| CERTA-2009-ALE-016 | Vulnérabilité de SMBv2 dans Microsoft Windows | 2009-09-09T00:00:00.000000 | 2009-10-13T00:00:00.000000 |
| certa-2009-ale-011 | Vulnérabilité dans Microsoft Office Web Components Control | 2009-07-13T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| CERTA-2009-ALE-011 | Vulnérabilité dans Microsoft Office Web Components Control | 2009-07-13T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| certa-2009-ale-013 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2009-07-23T00:00:00.000000 | 2009-07-31T00:00:00.000000 |
| CERTA-2009-ALE-013 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2009-07-23T00:00:00.000000 | 2009-07-31T00:00:00.000000 |
| certa-2009-ale-012 | Vulnérabilité dans Mozilla Firefox | 2009-07-15T00:00:00.000000 | 2009-07-17T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0970 | Multiples vulnérabilités dans Synacor Zimbra Collaboration | 2025-11-06T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| CERTFR-2026-AVI-0083 | Multiples vulnérabilités dans les produits IBM | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| CERTFR-2026-AVI-0082 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| CERTFR-2026-AVI-0081 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| CERTFR-2026-AVI-0080 | Vulnérabilité dans Broadcom Web Security Services Agent | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| CERTFR-2025-AVI-0970 | Multiples vulnérabilités dans Synacor Zimbra Collaboration | 2025-11-06T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| certfr-2026-avi-0079 | Vulnérabilité dans Python | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0078 | Vulnérabilité dans Ceph | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0077 | Multiples vulnérabilités dans les produits Symantec | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0076 | Vulnérabilité dans les produits Cisco | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| CERTFR-2026-AVI-0079 | Vulnérabilité dans Python | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| CERTFR-2026-AVI-0078 | Vulnérabilité dans Ceph | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| CERTFR-2026-AVI-0077 | Multiples vulnérabilités dans les produits Symantec | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| CERTFR-2026-AVI-0076 | Vulnérabilité dans les produits Cisco | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0075 | Multiples vulnérabilités dans GitLab | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0074 | Multiples vulnérabilités dans Oracle Weblogic | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0073 | Multiples vulnérabilités dans Oracle Virtualization | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0072 | Multiples vulnérabilités dans Oracle Systems | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0071 | Multiples vulnérabilités dans Oracle PeopleSoft | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0070 | Multiples vulnérabilités dans Oracle MySQL | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0069 | Multiples vulnérabilités dans Oracle Java SE | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0068 | Multiples vulnérabilités dans Oracle Database Server | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0067 | Multiples vulnérabilités dans Python | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0066 | Vulnérabilité dans Google Chrome | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0065 | Multiples vulnérabilités dans les produits Atlassian | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| CERTFR-2026-AVI-0075 | Multiples vulnérabilités dans GitLab | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| CERTFR-2026-AVI-0074 | Multiples vulnérabilités dans Oracle Weblogic | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| CERTFR-2026-AVI-0073 | Multiples vulnérabilités dans Oracle Virtualization | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| CERTFR-2026-AVI-0072 | Multiples vulnérabilités dans Oracle Systems | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| CERTFR-2026-AVI-0071 | Multiples vulnérabilités dans Oracle PeopleSoft | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2022-000070 | Movable Type plugin A-Form vulnerable to cross-site scripting | 2022-09-09T15:01+09:00 | 2024-06-13T13:49+09:00 |
| jvndb-2022-000069 | PowerCMS XMLRPC API vulnerable to command injection | 2022-09-02T15:49+09:00 | 2024-06-13T11:44+09:00 |
| jvndb-2022-002367 | OpenAM (OpenAM Consortium Edition) vulnerable to open redirect | 2022-09-16T15:30+09:00 | 2024-06-13T11:39+09:00 |
| jvndb-2022-000071 | Multiple vulnerabilities in Trend Micro Apex One and Trend Micro Apex One as a Service | 2022-09-14T18:15+09:00 | 2024-06-13T11:34+09:00 |
| jvndb-2022-000073 | Multiple vulnerabilities in EC-CUBE | 2022-09-15T16:30+09:00 | 2024-06-13T11:09+09:00 |
| jvndb-2022-000072 | EC-CUBE plugin "Product Image Bulk Upload Plugin" vulnerable to insufficient verification in uploading files | 2022-09-15T16:13+09:00 | 2024-06-13T11:03+09:00 |
| jvndb-2023-000015 | Multiple vulnerabilities in PLANEX COMMUNICATIONS Network Camera CS-WMV02G | 2023-02-13T14:48+09:00 | 2024-06-12T17:03+09:00 |
| jvndb-2022-002537 | Stack-based buffer overflow vulnerability in Yokogawa Test & Measurement WTViewerE | 2022-10-19T16:23+09:00 | 2024-06-12T16:54+09:00 |
| jvndb-2022-000081 | Lemon8 App fails to restrict access permissions | 2022-10-19T14:08+09:00 | 2024-06-12T16:39+09:00 |
| jvndb-2024-000062 | Denial-of-service (DoS) vulnerability in IPCOM WAF function | 2024-06-12T15:03+09:00 | 2024-06-12T15:03+09:00 |
| jvndb-2022-000075 | IPFire WebUI vulnerable to cross-site scripting | 2022-10-06T13:05+09:00 | 2024-06-12T14:28+09:00 |
| jvndb-2023-000013 | Ichiran App vulnerable to improper server certificate verification | 2023-02-06T14:31+09:00 | 2024-06-12T14:25+09:00 |
| jvndb-2022-000074 | BookStack vulnerable to cross-site scripting | 2022-09-30T14:48+09:00 | 2024-06-12T14:07+09:00 |
| jvndb-2022-000077 | The installer of Sony Content Transfer may insecurely load Dynamic Link Libraries | 2022-10-11T15:08+09:00 | 2024-06-12T12:12+09:00 |
| jvndb-2022-000076 | Growi vulnerable to improper access control | 2022-10-07T14:30+09:00 | 2024-06-12T12:04+09:00 |
| jvndb-2023-000017 | Improper restriction of XML external entity reference (XXE) vulnerability in tsClinical Define.xml Generator and tsClinical Metadata Desktop Tools | 2023-02-14T17:00+09:00 | 2024-06-12T11:15+09:00 |
| jvndb-2023-000012 | Vulnerability in Driver Distributor where passwords are stored in a recoverable format | 2023-01-31T14:14+09:00 | 2024-06-12T11:07+09:00 |
| jvndb-2023-000011 | SUSHIRO App for Android outputs sensitive information to the log file | 2023-01-31T14:10+09:00 | 2024-06-11T17:35+09:00 |
| jvndb-2023-001269 | File and Directory Permissions Vulnerability in Hitachi Automation Director, Hitachi Infrastructure Analytics Advisor, Hitachi Ops Center | 2023-03-01T16:59+09:00 | 2024-06-11T16:42+09:00 |
| jvndb-2023-000014 | NEC PC Settings Tool vulnerable to missing authentication for critical function | 2023-02-10T14:43+09:00 | 2024-06-10T18:13+09:00 |
| jvndb-2023-000019 | Multiple cross-site scripting vulnerabilities in EC-CUBE | 2023-02-28T16:38+09:00 | 2024-06-10T17:28+09:00 |
| jvndb-2023-001212 | Multiple vulnerabilities in JTEKT ELECTRONICS Screen Creator Advance 2 | 2023-02-08T12:46+09:00 | 2024-06-10T17:25+09:00 |
| jvndb-2023-000018 | Multiple cross-site scripting vulnerabilities in SHIRASAGI | 2023-02-22T15:16+09:00 | 2024-06-10T17:18+09:00 |
| jvndb-2024-000058 | WordPress Plugin "Music Store - WordPress eCommerce" vulnerable to SQL injection | 2024-06-07T15:24+09:00 | 2024-06-10T17:08+09:00 |
| jvndb-2023-000023 | Multiple vulnerabilities in PostgreSQL extension module pg_ivm | 2023-03-06T15:22+09:00 | 2024-06-10T16:41+09:00 |
| jvndb-2023-001292 | Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service | 2023-03-02T17:33+09:00 | 2024-06-07T16:59+09:00 |
| jvndb-2023-001304 | Multiple vulnerabilities in JTEKT ELECTRONICS Kostac PLC Programming Software | 2023-03-06T15:31+09:00 | 2024-06-07T16:39+09:00 |
| jvndb-2023-000020 | web2py development tool vulnerable to open redirect | 2023-02-28T15:00+09:00 | 2024-06-07T16:31+09:00 |
| jvndb-2024-000060 | Multiple vulnerabilities in "FreeFrom - the nostr client" App | 2024-06-07T14:51+09:00 | 2024-06-07T14:51+09:00 |
| jvndb-2023-000021 | Multiple vulnerabilities in SS1 and Rakuraku PC Cloud | 2023-03-01T15:57+09:00 | 2024-06-06T18:02+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14285 | Smoothwall Express跨站脚本漏洞(CNVD-2026-14285) | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14284 | Smoothwall Express跨站脚本漏洞(CNVD-2026-14284) | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14283 | Smoothwall Express跨站脚本漏洞(CNVD-2026-14283) | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14282 | Smoothwall Express跨站脚本漏洞 | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14281 | Smoothwall Express proxy.cgi端点跨站脚本漏洞 | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14280 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14280) | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14279 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14279) | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14278 | 多款Apple产品安全绕过漏洞 | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14277 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14277) | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14276 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14276) | 2026-03-02 | 2026-03-20 |
| cnvd-2026-11482 | 上海百胜软件股份有限公司E3全渠道中台存在信息泄露漏洞 | 2026-02-03 | 2026-03-20 |
| cnvd-2026-11388 | 用友网络科技股份有限公司U8 Cloud存在SQL注入漏洞(CNVD-C-2026-69427) | 2026-02-03 | 2026-03-20 |
| cnvd-2026-11387 | 用友网络科技股份有限公司U8 Cloud存在SQL注入漏洞(CNVD-C-2026-69425) | 2026-02-03 | 2026-03-20 |
| cnvd-2026-11363 | 杭州飞致云信息科技有限公司SQLBot存在SQL注入漏洞 | 2026-02-03 | 2026-03-20 |
| cnvd-2026-14598 | Google Chrome Web Speech越界读漏洞 | 2026-03-17 | 2026-03-19 |
| cnvd-2026-14275 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14275) | 2026-03-02 | 2026-03-19 |
| cnvd-2026-14274 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14274) | 2026-03-02 | 2026-03-19 |
| cnvd-2026-14273 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14273) | 2026-03-02 | 2026-03-19 |
| cnvd-2026-14272 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14272) | 2026-03-02 | 2026-03-19 |
| cnvd-2026-14271 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14271) | 2026-03-02 | 2026-03-19 |
| cnvd-2026-14252 | Apache Spark反序列化漏洞 | 2026-03-19 | 2026-03-19 |
| cnvd-2026-14251 | Apache Livy输入验证错误漏洞 | 2026-03-19 | 2026-03-19 |
| cnvd-2026-14250 | Zephyr缓冲区溢出漏洞 | 2026-03-19 | 2026-03-19 |
| cnvd-2026-14249 | Open5GS拒绝服务漏洞(CNVD-2026-14249) | 2026-03-19 | 2026-03-19 |
| cnvd-2026-14136 | Siemens RUGGEDCOM APE1808设备Fortigate NGFW V7.4.7之前版本存在多个漏洞 | 2026-03-10 | 2026-03-19 |
| cnvd-2026-14599 | Google Chrome WebView资源管理错误漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14597 | Google Chrome Agents资源管理错误漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14596 | Google Chrome WebMCP资源管理错误漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14595 | Google Chrome Extensions资源管理错误漏洞(CNVD-2026-14595) | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14594 | Google Chrome TextEncoding资源管理错误漏洞 | 2026-03-17 | 2026-03-18 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-12050 | Уязвимость компонента drivers/media/i2c/et8ek8/et8ek8 ядра операционной системы Linux, по… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12043 | Уязвимость компонента hsm ядра операционной системы Linux, позволяющая нарушителю вызвать… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12040 | Уязвимость функции spufs_create_context() ядра операционной системы Linux, позволяющая на… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12039 | Уязвимость компонента spufs ядра операционной системы Linux, позволяющая нарушителю вызва… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12038 | Уязвимость функции spufs_rmdir() ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12036 | Уязвимость компонента link.c ядра операционной системы Linux, позволяющая нарушителю вызв… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12034 | Уязвимость компонента cxgb4_ethtool.c ядра операционной системы Linux, позволяющая наруши… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12033 | Уязвимость компонентов microchip ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12032 | Уязвимость компонента v3d_sched.c ядра операционной системы Linux, позволяющая нарушителю… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12030 | Уязвимость компонента oplock.c ядра операционной системы Linux, позволяющая нарушителю вы… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12029 | Уязвимость функции wl1251_tx_work компонента wl1251/tx.c модуля wifi ядра операционной си… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12028 | Уязвимость компонента phy_led_triggers.c ядра операционной системы Linux, позволяющая нар… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12023 | Уязвимость компонента hugetlbpage.c ядра операционной системы Linux, позволяющая нарушите… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12020 | Уязвимость компонента arch/x86/mm/tlb.c ядра операционной системы Linux, позволяющая нару… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12014 | Уязвимость компонента drivers/dma/ti/k3-udma.c ядра операционной системы Linux, позволяющ… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12012 | Уязвимость компонента drm/amd/pm ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12011 | Уязвимость компонента drm/amd/pm ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12010 | Уязвимость компонента drm/amd/pm ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12009 | Уязвимость компонента drm/amd/pm ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12008 | Уязвимость компонента drm/amd/pm ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12004 | Уязвимость компонента jfs ядра операционной системы Linux, позволяющая нарушителю вызвать… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12003 | Уязвимость компонента drm/amd/pm/smu11 ядра операционной системы Linux, позволяющая наруш… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12002 | Уязвимость компонента pwm-mediatek.c ядра операционной системы Linux, позволяющая нарушит… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12001 | Уязвимость компонента dib8000.c ядра операционной системы Linux, позволяющая нарушителю в… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12000 | Уязвимость функции nd_label_data_init() компонента drivers/nvdimm/label.c ядра операционн… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11999 | Уязвимость компонента net/sched/sch_qfq.c ядра операционной системы Linux, позволяющая на… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11998 | Уязвимость компонента sch_drr.c ядра операционной системы Linux, позволяющая нарушителю о… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11997 | Уязвимость ядра операционной системы Linux, связанная с ошибками синхронизации при исполь… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11996 | Уязвимость компонентов ipv4 ядра операционной системы Linux, позволяющая нарушителю вызва… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11991 | Уязвимость компонента streamzap.c ядра операционной системы Linux, позволяющая нарушителю… | 28.09.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201912-0636 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:24:52.133000Z |
| var-200102-0077 | Memory leak in Cisco Catalyst 4000, 5000, and 6000 series switches allows remote attacker… | 2024-07-23T21:24:52.601000Z |
| var-200504-0293 | Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allo… | 2024-07-23T21:24:51.414000Z |
| var-202006-1831 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2024-07-23T21:24:50.411000Z |
| var-202106-0349 | Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to pote… | 2024-07-23T21:24:47.280000Z |
| var-201410-1144 | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0… | 2024-07-23T21:24:46.357000Z |
| var-200809-0190 | Multiple integer overflows in the SearchKit API in Apple Mac OS X 10.4.11 and 10.5 throug… | 2024-07-23T21:24:45.643000Z |
| var-200701-0295 | The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML … | 2024-07-23T21:24:06.215000Z |
| var-202003-1779 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:23:59.719000Z |
| var-201304-0317 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:23:59.799000Z |
| var-200110-0170 | The Legion of the Bouncy Castle Java Cryptography API before release 1.38, as used in Cry… | 2024-07-23T21:23:39.977000Z |
| var-201504-0150 | cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate con… | 2024-07-23T21:23:08.257000Z |
| var-202108-2123 | A memory corruption vulnerability was addressed with improved locking. This issue is fixe… | 2024-07-23T21:23:07.966000Z |
| var-201503-0388 | Use-after-free vulnerability in the _zend_shared_memdup function in zend_shared_alloc.c i… | 2024-07-23T21:23:07.716000Z |
| var-201003-1075 | Use-after-free vulnerability in the abstract file-descriptor handling interface in the cu… | 2024-07-23T21:23:07.044000Z |
| var-200801-0561 | Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 th… | 2024-07-23T21:23:07.143000Z |
| var-201711-0454 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T21:23:03.598000Z |
| var-201506-0264 | The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.… | 2024-07-23T21:23:02.233000Z |
| var-202004-0812 | In ksh version 20120801, a flaw was found in the way it evaluates certain environment var… | 2024-07-23T21:22:46.394000Z |
| var-200506-0133 | Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow r… | 2024-07-23T21:22:45.018000Z |
| var-202001-0472 | Insufficient control flow in certain data structures for some Intel(R) Processors with In… | 2024-07-23T21:22:25.122000Z |
| var-201710-1406 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari befo… | 2024-07-23T21:22:23.796000Z |
| var-201302-0233 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:21:52.515000Z |
| var-201105-0197 | Unspecified vulnerability in the Java Embedding Plugin (JEP) in Mozilla Firefox before 3.… | 2024-07-23T21:21:47.763000Z |
| var-200803-0028 | The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unu… | 2024-07-23T21:21:47.664000Z |
| var-201311-0106 | Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1… | 2024-07-23T21:21:38.043000Z |
| var-201904-1401 | A cross-site scripting issue existed in Safari. This issue was addressed with improved UR… | 2024-07-23T21:21:37.851000Z |
| var-202004-2200 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T21:21:06.954000Z |
| var-201912-0525 | A logic issue was addressed with improved state management. This issue is fixed in tvOS 1… | 2024-07-23T21:21:06.108000Z |
| var-200312-0218 | OpenSSL 0.9.6k allows remote attackers to cause a denial of service (crash via large recu… | 2024-07-23T21:21:01.334000Z |