Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-31410 |
N/A
|
ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION |
Linux |
Linux |
2026-04-06T07:38:21.876Z | 2026-04-11T09:53:42.652Z |
| CVE-2026-31409 |
N/A
|
ksmbd: unset conn->binding on failed binding request |
Linux |
Linux |
2026-04-06T07:38:21.223Z | 2026-04-11T09:53:40.522Z |
| CVE-2026-5809 |
7.1 (3.1)
|
wpForo Forum <= 3.0.2 - Authenticated (Subscriber+) Ar⦠|
tomdever |
wpForo Forum |
2026-04-11T07:40:15.574Z | 2026-04-11T07:40:15.574Z |
| CVE-2026-1502 |
5.7 (4.0)
|
HTTP client proxy tunnel headers not validated for CR/LF |
Python Software Foundation |
CPython |
2026-04-10T17:54:44.121Z | 2026-04-11T04:39:26.099Z |
| CVE-2026-40036 |
8.7 (4.0)
7.5 (3.1)
|
Unfurl < 2026.04 - Denial of Service via Unbounded zli⦠|
obsidianforensics |
unfurl |
2026-04-08T21:35:28.460Z | 2026-04-11T03:05:51.530Z |
| CVE-2026-40028 |
5.1 (4.0)
5.4 (3.1)
|
Hayabusa < 3.8.0 XSS via JSON Log Import |
Yamato-Security |
hayabusa |
2026-04-08T21:35:24.001Z | 2026-04-11T03:04:53.201Z |
| CVE-2026-5876 |
6.5 (3.1)
|
Side-channel information leakage in Navigation in⦠|
Google |
Chrome |
2026-04-08T21:20:47.387Z | 2026-04-11T03:03:31.034Z |
| CVE-2026-5875 |
4.3 (3.1)
|
Policy bypass in Blink in Google Chrome prior to ⦠|
Google |
Chrome |
2026-04-08T21:20:46.990Z | 2026-04-11T03:01:51.897Z |
| CVE-2026-5874 |
9.6 (3.1)
|
Use after free in PrivateAI in Google Chrome prio⦠|
Google |
Chrome |
2026-04-08T21:20:46.077Z | 2026-04-11T02:59:10.879Z |
| CVE-2026-34080 |
6.8 (4.0)
|
xdg-dbus-proxy has an eavesdrop filter bypass allowing⦠|
flatpak |
xdg-dbus-proxy |
2026-04-07T20:57:57.931Z | 2026-04-11T01:34:11.813Z |
| CVE-2026-3371 |
4.3 (3.1)
|
Tutor LMS <= 3.9.7 - Authenticated (Subscriber+) Insec⦠|
themeum |
Tutor LMS ā eLearning and online course solution |
2026-04-11T01:25:01.083Z | 2026-04-11T01:25:01.083Z |
| CVE-2026-4979 |
5 (3.1)
|
UsersWP <= 1.2.58 - Authenticated (Subscriber+) Server⦠|
stiofansisland |
UsersWP ā Front-end login form, User Registration, User Profile & Members Directory plugin for WP |
2026-04-11T01:25:00.447Z | 2026-04-11T01:25:00.447Z |
| CVE-2026-5144 |
8.8 (3.1)
|
BuddyPress Groupblog <= 1.9.3 - Authenticated (Subscri⦠|
boonebgorges |
BuddyPress Groupblog |
2026-04-11T01:24:59.754Z | 2026-04-11T01:24:59.754Z |
| CVE-2026-3498 |
6.4 (3.1)
|
BlockArt Blocks <= 2.2.15 - Authenticated (Author+) St⦠|
wpblockart |
BlockArt Blocks ā Gutenberg Blocks, Page Builder Blocks ,WordPress Block Plugin, Sections & Template Library |
2026-04-11T01:24:59.386Z | 2026-04-11T01:24:59.386Z |
| CVE-2026-5217 |
7.2 (3.1)
|
Optimole <= 4.2.2 - Unauthenticated Stored Cross-Site ⦠|
optimole |
Optimole ā Optimize Images in Real Time |
2026-04-11T01:24:58.602Z | 2026-04-11T01:24:58.602Z |
| CVE-2026-5207 |
6.5 (3.1)
|
LifterLMS <= 9.2.1 - Authenticated (Custom+) SQL Injec⦠|
chrisbadgett |
LifterLMS ā WP LMS for eLearning, Online Courses, & Quizzes |
2026-04-11T01:24:58.163Z | 2026-04-11T01:24:58.163Z |
| CVE-2026-4895 |
6.4 (3.1)
|
Greenshift <= 12.8.9 - Authenticated (Contributor+) St⦠|
wpsoul |
Greenshift ā animation and page builder blocks |
2026-04-11T01:24:58.983Z | 2026-04-11T01:24:58.983Z |
| CVE-2026-5226 |
6.1 (3.1)
|
Optimole <= 4.2.3 - Reflected Cross-Site Scripting via⦠|
optimole |
Optimole ā Optimize Images in Real Time |
2026-04-11T01:24:57.542Z | 2026-04-11T01:24:57.542Z |
| CVE-2026-3358 |
5.4 (3.1)
|
Tutor LMS <= 3.9.7 - Missing Authorization to Authenti⦠|
themeum |
Tutor LMS ā eLearning and online course solution |
2026-04-11T01:24:56.945Z | 2026-04-11T01:24:56.945Z |
| CVE-2026-40354 |
2.9 (3.1)
|
Flatpak xdg-desktop-portal before 1.20.4 and 1.21⦠|
Flatpak |
xdg-desktop-portal |
2026-04-11T00:29:03.467Z | 2026-04-11T00:29:03.467Z |
| CVE-2026-34078 |
9.3 (4.0)
|
Flatpak has a complete sandbox escape leading to host ⦠|
flatpak |
flatpak |
2026-04-07T21:27:45.643Z | 2026-04-11T00:21:12.650Z |
| CVE-2026-3691 |
5.3 (3.0)
|
OpenClaw Client PKCE Verifier Information Disclosure V⦠|
OpenClaw |
OpenClaw |
2026-04-11T00:17:40.509Z | 2026-04-11T00:17:40.509Z |
| CVE-2026-3690 |
7.4 (3.0)
|
OpenClaw Canvas Authentication Bypass Vulnerability |
OpenClaw |
OpenClaw |
2026-04-11T00:17:32.474Z | 2026-04-11T00:17:32.474Z |
| CVE-2026-3689 |
6.5 (3.0)
|
OpenClaw Canvas Path Traversal Information Disclosure ⦠|
OpenClaw |
OpenClaw |
2026-04-11T00:17:24.472Z | 2026-04-11T00:17:24.472Z |
| CVE-2026-4158 |
7.3 (3.0)
|
KeePassXC OpenSSL Configuration Uncontrolled Search Pa⦠|
KeePassXC |
KeePassXC |
2026-04-11T00:17:00.676Z | 2026-04-11T00:17:00.676Z |
| CVE-2026-4157 |
7.5 (3.0)
|
ChargePoint Home Flex revssh Service Command Injection⦠|
ChargePoint |
Home Flex |
2026-04-11T00:16:38.871Z | 2026-04-11T00:16:38.871Z |
| CVE-2026-4156 |
7.5 (3.0)
|
ChargePoint Home Flex OCPP getpreq Stack-based Buffer ⦠|
ChargePoint |
Home Flex |
2026-04-11T00:16:32.094Z | 2026-04-11T00:16:32.094Z |
| CVE-2026-4155 |
7.5 (3.0)
|
ChargePoint Home Flex Inclusion of Sensitive Informati⦠|
ChargePoint |
Home Flex |
2026-04-11T00:16:25.621Z | 2026-04-11T00:16:25.621Z |
| CVE-2026-4154 |
7.8 (3.0)
|
GIMP XPM File Parsing Integer Overflow Remote Code Exe⦠|
GIMP |
GIMP |
2026-04-11T00:16:10.657Z | 2026-04-11T00:16:10.657Z |
| CVE-2026-4153 |
7.8 (3.0)
|
GIMP PSP File Parsing Heap-based Buffer Overflow Remot⦠|
GIMP |
GIMP |
2026-04-11T00:16:01.848Z | 2026-04-11T00:16:01.848Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-5217 |
7.2 (3.1)
|
Optimole <= 4.2.2 - Unauthenticated Stored Cross-Site ⦠|
optimole |
Optimole ā Optimize Images in Real Time |
2026-04-11T01:24:58.602Z | 2026-04-11T01:24:58.602Z |
| CVE-2026-5207 |
6.5 (3.1)
|
LifterLMS <= 9.2.1 - Authenticated (Custom+) SQL Injec⦠|
chrisbadgett |
LifterLMS ā WP LMS for eLearning, Online Courses, & Quizzes |
2026-04-11T01:24:58.163Z | 2026-04-11T01:24:58.163Z |
| CVE-2026-5144 |
8.8 (3.1)
|
BuddyPress Groupblog <= 1.9.3 - Authenticated (Subscri⦠|
boonebgorges |
BuddyPress Groupblog |
2026-04-11T01:24:59.754Z | 2026-04-11T01:24:59.754Z |
| CVE-2026-4979 |
5 (3.1)
|
UsersWP <= 1.2.58 - Authenticated (Subscriber+) Server⦠|
stiofansisland |
UsersWP ā Front-end login form, User Registration, User Profile & Members Directory plugin for WP |
2026-04-11T01:25:00.447Z | 2026-04-11T01:25:00.447Z |
| CVE-2026-4895 |
6.4 (3.1)
|
Greenshift <= 12.8.9 - Authenticated (Contributor+) St⦠|
wpsoul |
Greenshift ā animation and page builder blocks |
2026-04-11T01:24:58.983Z | 2026-04-11T01:24:58.983Z |
| CVE-2026-3498 |
6.4 (3.1)
|
BlockArt Blocks <= 2.2.15 - Authenticated (Author+) St⦠|
wpblockart |
BlockArt Blocks ā Gutenberg Blocks, Page Builder Blocks ,WordPress Block Plugin, Sections & Template Library |
2026-04-11T01:24:59.386Z | 2026-04-11T01:24:59.386Z |
| CVE-2026-3371 |
4.3 (3.1)
|
Tutor LMS <= 3.9.7 - Authenticated (Subscriber+) Insec⦠|
themeum |
Tutor LMS ā eLearning and online course solution |
2026-04-11T01:25:01.083Z | 2026-04-11T01:25:01.083Z |
| CVE-2026-3358 |
5.4 (3.1)
|
Tutor LMS <= 3.9.7 - Missing Authorization to Authenti⦠|
themeum |
Tutor LMS ā eLearning and online course solution |
2026-04-11T01:24:56.945Z | 2026-04-11T01:24:56.945Z |
| CVE-2026-5496 |
7.8 (3.0)
|
Labcenter Electronics Proteus PDSPRJ File Parsing Type⦠|
Labcenter Electronics |
Proteus |
2026-04-11T00:13:14.901Z | 2026-04-11T00:13:14.901Z |
| CVE-2026-5495 |
7.8 (3.0)
|
Labcenter Electronics Proteus PDSPRJ File Parsing Out-⦠|
Labcenter Electronics |
Proteus |
2026-04-11T00:13:26.901Z | 2026-04-11T00:13:26.901Z |
| CVE-2026-5494 |
7.8 (3.0)
|
Labcenter Electronics Proteus PDSPRJ File Parsing Out-⦠|
Labcenter Electronics |
Proteus |
2026-04-11T00:13:22.854Z | 2026-04-11T00:13:22.854Z |
| CVE-2026-5493 |
7.8 (3.0)
|
Labcenter Electronics Proteus PDSPRJ File Parsing Out-⦠|
Labcenter Electronics |
Proteus |
2026-04-11T00:13:18.336Z | 2026-04-11T00:13:18.336Z |
| CVE-2026-5059 |
9.8 (3.0)
|
aws-mcp-server AWS CLI Command Injection Remote Code E⦠|
aws-mcp-server |
aws-mcp-server |
2026-04-11T00:15:02.920Z | 2026-04-11T00:15:02.920Z |
| CVE-2026-5058 |
9.8 (3.0)
|
aws-mcp-server Command Injection Remote Code Execution⦠|
aws-mcp-server |
aws-mcp-server |
2026-04-11T00:14:52.192Z | 2026-04-11T00:14:52.192Z |
| CVE-2026-5055 |
7.8 (3.0)
|
NoMachine Uncontrolled Search Path Element Local Privi⦠|
NoMachine |
NoMachine |
2026-04-11T00:14:25.877Z | 2026-04-11T00:14:25.877Z |
| CVE-2026-5054 |
7.8 (3.0)
|
NoMachine External Control of File Path Local Privileg⦠|
NoMachine |
NoMachine |
2026-04-11T00:14:16.658Z | 2026-04-11T00:14:16.658Z |
| CVE-2026-5053 |
7.1 (3.0)
|
NoMachine External Control of File Path Arbitrary File⦠|
NoMachine |
NoMachine |
2026-04-11T00:14:07.656Z | 2026-04-11T00:14:07.656Z |
| CVE-2026-4158 |
7.3 (3.0)
|
KeePassXC OpenSSL Configuration Uncontrolled Search Pa⦠|
KeePassXC |
KeePassXC |
2026-04-11T00:17:00.676Z | 2026-04-11T00:17:00.676Z |
| CVE-2026-4157 |
7.5 (3.0)
|
ChargePoint Home Flex revssh Service Command Injection⦠|
ChargePoint |
Home Flex |
2026-04-11T00:16:38.871Z | 2026-04-11T00:16:38.871Z |
| CVE-2026-4156 |
7.5 (3.0)
|
ChargePoint Home Flex OCPP getpreq Stack-based Buffer ⦠|
ChargePoint |
Home Flex |
2026-04-11T00:16:32.094Z | 2026-04-11T00:16:32.094Z |
| CVE-2026-4155 |
7.5 (3.0)
|
ChargePoint Home Flex Inclusion of Sensitive Informati⦠|
ChargePoint |
Home Flex |
2026-04-11T00:16:25.621Z | 2026-04-11T00:16:25.621Z |
| CVE-2026-4154 |
7.8 (3.0)
|
GIMP XPM File Parsing Integer Overflow Remote Code Exe⦠|
GIMP |
GIMP |
2026-04-11T00:16:10.657Z | 2026-04-11T00:16:10.657Z |
| CVE-2026-4153 |
7.8 (3.0)
|
GIMP PSP File Parsing Heap-based Buffer Overflow Remot⦠|
GIMP |
GIMP |
2026-04-11T00:16:01.848Z | 2026-04-11T00:16:01.848Z |
| CVE-2026-4152 |
7.8 (3.0)
|
GIMP JP2 File Parsing Heap-based Buffer Overflow Remot⦠|
GIMP |
GIMP |
2026-04-11T00:15:54.200Z | 2026-04-11T00:15:54.200Z |
| CVE-2026-4151 |
7.8 (3.0)
|
GIMP ANI File Parsing Integer Overflow Remote Code Exe⦠|
GIMP |
GIMP |
2026-04-11T00:15:45.368Z | 2026-04-11T00:15:45.368Z |
| CVE-2026-4150 |
7.8 (3.0)
|
GIMP PSD File Parsing Integer Overflow Remote Code Exe⦠|
GIMP |
GIMP |
2026-04-11T00:15:36.377Z | 2026-04-11T00:15:36.377Z |
| CVE-2026-4149 |
10 (3.0)
|
Sonos Era 300 SMB Response Out-Of-Bounds Access Remote⦠|
Sonos |
Era 300 |
2026-04-11T00:12:33.497Z | 2026-04-11T00:12:33.497Z |
| CVE-2026-40354 |
2.9 (3.1)
|
Flatpak xdg-desktop-portal before 1.20.4 and 1.21⦠|
Flatpak |
xdg-desktop-portal |
2026-04-11T00:29:03.467Z | 2026-04-11T00:29:03.467Z |
| CVE-2026-3691 |
5.3 (3.0)
|
OpenClaw Client PKCE Verifier Information Disclosure V⦠|
OpenClaw |
OpenClaw |
2026-04-11T00:17:40.509Z | 2026-04-11T00:17:40.509Z |
| CVE-2026-3690 |
7.4 (3.0)
|
OpenClaw Canvas Authentication Bypass Vulnerability |
OpenClaw |
OpenClaw |
2026-04-11T00:17:32.474Z | 2026-04-11T00:17:32.474Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-14545 | The YML for Yandex Market WordPress plugin before 5.0.26 is vulnerable to Remote Code Execution via⦠| 2026-04-10T07:16:19.607 | 2026-04-10T07:16:19.607 |
| fkie_cve-2026-6025 | A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function ⦠| 2026-04-10T06:16:07.203 | 2026-04-10T06:16:07.203 |
| fkie_cve-2026-6024 | A vulnerability was determined in Tenda i6 1.0.0.7(2204). Affected by this issue is the function R7⦠| 2026-04-10T06:16:06.993 | 2026-04-10T06:16:06.993 |
| fkie_cve-2026-6016 | A vulnerability was found in Tenda AC9 15.03.02.13. The affected element is the function decodePwd ⦠| 2026-04-10T06:16:06.780 | 2026-04-10T06:16:06.780 |
| fkie_cve-2026-6015 | A vulnerability has been found in Tenda AC9 15.03.02.13. Impacted is the function formQuickIndex of⦠| 2026-04-10T06:16:06.510 | 2026-04-10T06:16:06.510 |
| fkie_cve-2026-5477 | An integer overflow existed in the wolfCrypt CMAC implementation, that could be exploited to forge ⦠| 2026-04-10T06:16:05.243 | 2026-04-10T06:16:05.243 |
| fkie_cve-2026-6014 | A flaw has been found in D-Link DIR-513 1.10. This issue affects the function formAdvanceSetup of t⦠| 2026-04-10T05:16:07.510 | 2026-04-10T05:16:07.510 |
| fkie_cve-2026-6013 | A vulnerability was detected in D-Link DIR-513 1.10. This vulnerability affects the function formSe⦠| 2026-04-10T05:16:07.303 | 2026-04-10T05:16:07.303 |
| fkie_cve-2026-6012 | A security vulnerability has been detected in D-Link DIR-513 1.10. This affects the function formSe⦠| 2026-04-10T05:16:07.027 | 2026-04-10T05:16:07.027 |
| fkie_cve-2026-6011 | A weakness has been identified in OpenClaw up to 2026.1.26. Affected by this issue is some unknown ⦠| 2026-04-10T05:16:06.757 | 2026-04-10T05:16:06.757 |
| fkie_cve-2026-4482 | The installer certificate files in the ā¦/bootstrap/common/ssl folder do not seem to have restricted⦠| 2026-04-10T05:16:04.587 | 2026-04-10T05:16:04.587 |
| fkie_cve-2026-6010 | A security flaw has been discovered in CodeAstro Online Classroom 1.0/2.php. Affected by this vulne⦠| 2026-04-10T04:17:25.640 | 2026-04-10T04:17:25.640 |
| fkie_cve-2026-6007 | A vulnerability was found in itsourcecode Construction Management System 1.0. This affects an unkno⦠| 2026-04-10T04:17:23.643 | 2026-04-10T04:17:23.643 |
| fkie_cve-2026-6006 | A vulnerability has been found in code-projects Patient Record Management System 1.0. The impacted ⦠| 2026-04-10T04:17:23.420 | 2026-04-10T04:17:23.420 |
| fkie_cve-2026-6005 | A flaw has been found in code-projects Patient Record Management System 1.0. The affected element i⦠| 2026-04-10T04:17:17.657 | 2026-04-10T04:17:17.657 |
| fkie_cve-2026-5501 | wolfSSL_X509_verify_cert in the OpenSSL compatibility layer accepts a certificate chain in which th⦠| 2026-04-10T04:17:17.230 | 2026-04-10T04:17:17.230 |
| fkie_cve-2026-5500 | wolfSSL's wc_PKCS7_DecodeAuthEnvelopedData() does not properly sanitize the AES-GCM authentication ⦠| 2026-04-10T04:17:17.080 | 2026-04-10T04:17:17.080 |
| fkie_cve-2026-5479 | In wolfSSL's EVP layer, the ChaCha20-Poly1305 AEAD decryption path in wolfSSL_EVP_CipherFinal (and ⦠| 2026-04-10T04:17:16.930 | 2026-04-10T04:17:16.930 |
| fkie_cve-2026-5466 | wolfSSL's ECCSI signature verifier `wc_VerifyEccsiHash` decodes the `r` and `s` scalars from the si⦠| 2026-04-10T04:17:16.420 | 2026-04-10T04:17:16.420 |
| fkie_cve-2026-5188 | An integer underflow issue exists in wolfSSL when parsing the Subject Alternative Name (SAN) extens⦠| 2026-04-10T04:17:15.700 | 2026-04-10T04:17:15.700 |
| fkie_cve-2026-33551 | An issue was discovered in OpenStack Keystone 14 through 26 before 26.1.1, 27.0.0, 28.0.0, and 29.0⦠| 2026-04-10T03:16:02.723 | 2026-04-10T04:17:15.010 |
| fkie_cve-2026-2305 | The AddFunc Head & Footer Code plugin for WordPress is vulnerable to Stored Cross-Site Scripting vi⦠| 2026-04-10T04:16:59.690 | 2026-04-10T04:16:59.690 |
| fkie_cve-2026-6004 | A vulnerability was detected in code-projects Simple IT Discussion Forum 1.0. Impacted is an unknow⦠| 2026-04-10T03:16:04.700 | 2026-04-10T03:16:04.700 |
| fkie_cve-2026-6003 | A security vulnerability has been detected in code-projects Simple IT Discussion Forum 1.0. This is⦠| 2026-04-10T03:16:04.497 | 2026-04-10T03:16:04.497 |
| fkie_cve-2026-6000 | A vulnerability was found in code-projects Online Library Management System 1.0. Affected is an unk⦠| 2026-04-10T03:16:04.270 | 2026-04-10T03:16:04.270 |
| fkie_cve-2026-5999 | A vulnerability has been found in JeecgBoot up to 3.9.1. This impacts an unknown function of the co⦠| 2026-04-10T03:16:04.053 | 2026-04-10T03:16:04.053 |
| fkie_cve-2026-5998 | A flaw has been found in zhayujie chatgpt-on-wechat CowAgent up to 2.0.4. This affects the function⦠| 2026-04-10T02:16:04.460 | 2026-04-10T02:16:04.460 |
| fkie_cve-2026-5997 | A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the ⦠| 2026-04-10T02:16:04.247 | 2026-04-10T02:16:04.247 |
| fkie_cve-2026-5996 | A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected e⦠| 2026-04-10T02:16:04.043 | 2026-04-10T02:16:04.043 |
| fkie_cve-2026-4977 | The UsersWP ā Front-end login form, User Registration, User Profile & Members Directory plugin for ⦠| 2026-04-10T02:16:03.877 | 2026-04-10T02:16:03.877 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-mxm6-xwqw-p92f |
8.8 (3.1)
|
The BuddyPress Groupblog plugin for WordPress is vulnerable to Privilege Escalation in all versions⦠| 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-mf3h-x5xj-q2g5 |
5.4 (3.1)
|
The Tutor LMS ā eLearning and online course solution plugin for WordPress is vulnerable to unauthor⦠| 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-jf3r-4gcm-wq9g |
7.8 (3.1)
|
Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnera⦠| 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-h7gx-vxj4-mr6x |
7.3 (3.1)
|
KeePassXC OpenSSL Configuration Uncontrolled Search Path Element Local Privilege Escalation Vulnera⦠| 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-g495-hm74-5j37 |
4.3 (3.1)
|
The Tutor LMS ā eLearning and online course solution plugin for WordPress is vulnerable to Insecure⦠| 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-fjwc-hc62-p8h9 |
9.8 (3.1)
|
aws-mcp-server Command Injection Remote Code Execution Vulnerability. This vulnerability allows rem⦠| 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-fgmx-xfp3-w28p |
9.8 (3.1)
|
aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability. This vulnerability al⦠| 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-cfcr-ph9h-pgwq |
7.8 (3.1)
|
NoMachine Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerabi⦠| 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-cfc8-rw2h-jfg7 |
5.0 (3.1)
|
The UsersWP ā Front-end login form, User Registration, User Profile & Members Directory plugin for ⦠| 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-c63j-h6fc-c5w3 |
6.4 (3.1)
|
The BlockArt Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'clie⦠| 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-c2rf-g3vq-gg84 |
6.1 (3.1)
|
The Optimole ā Optimize Images in Real Time plugin for WordPress is vulnerable to Reflected Cross-S⦠| 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-9r43-wfq5-rv33 |
7.5 (3.1)
|
ChargePoint Home Flex revssh Service Command Injection Remote Code Execution Vulnerability. This vu⦠| 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-93fc-f6pw-cp83 |
7.5 (3.1)
|
ChargePoint Home Flex OCPP getpreq Stack-based Buffer Overflow Remote Code Execution Vulnerability.⦠| 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-8g9h-q4wq-r7gp |
7.2 (3.1)
|
The Optimole ā Optimize Images | Convert WebP & AVIF | CDN & Lazy Load | Image Optimization plugin ⦠| 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-7cp2-q9fg-jpv9 |
7.8 (3.1)
|
GIMP XPM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allo⦠| 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-75gg-gxqp-fq44 |
7.1 (3.1)
|
NoMachine External Control of File Path Arbitrary File Deletion Vulnerability. This vulnerability a⦠| 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-69j2-hc78-98c7 |
7.5 (3.1)
|
ChargePoint Home Flex Inclusion of Sensitive Information in Source Code Information Disclosure Vuln⦠| 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-4399-fg4g-454c |
7.8 (3.1)
|
NoMachine External Control of File Path Local Privilege Escalation Vulnerability. This vulnerabilit⦠| 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-xq39-5c6m-mcq7 |
6.5 (3.1)
|
OpenClaw Canvas Path Traversal Information Disclosure Vulnerability. This vulnerability allows remo⦠| 2026-04-11T03:30:29Z | 2026-04-11T03:30:29Z |
| ghsa-wgjm-63ch-mwj3 |
7.8 (3.1)
|
GIMP PSD File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allo⦠| 2026-04-11T03:30:29Z | 2026-04-11T03:30:29Z |
| ghsa-v5fw-rcv7-v6f3 |
2.9 (3.1)
|
Flatpak xdg-desktop-portal before 1.20.4 and 1.21.x before 1.21.1 allows any Flatpak app to trash a⦠| 2026-04-11T03:30:29Z | 2026-04-11T03:30:29Z |
| ghsa-fh28-mqr2-jxm7 |
7.8 (3.1)
|
GIMP ANI File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allo⦠| 2026-04-11T03:30:29Z | 2026-04-11T03:30:29Z |
| ghsa-93g8-mgqc-w7h9 |
7.4 (3.1)
|
OpenClaw Canvas Authentication Bypass Vulnerability. This vulnerability allows remote attackers to ⦠| 2026-04-11T03:30:29Z | 2026-04-11T03:30:29Z |
| ghsa-8v6v-j22p-w63g |
10.0 (3.1)
|
Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Execution Vulnerability. This vulnerabi⦠| 2026-04-11T03:30:29Z | 2026-04-11T03:30:29Z |
| ghsa-67qf-qf6p-xgv3 |
7.8 (3.1)
|
GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerab⦠| 2026-04-11T03:30:29Z | 2026-04-11T03:30:29Z |
| ghsa-4h5x-fjp7-jhq3 |
5.3 (3.1)
|
OpenClaw Client PKCE Verifier Information Disclosure Vulnerability. This vulnerability allows remot⦠| 2026-04-11T03:30:29Z | 2026-04-11T03:30:29Z |
| ghsa-c25q-mqx5-m6v8 |
|
Net::CIDR::Lite versions before 0.23 for Perl does not validate IPv6 group count, which may allow I⦠| 2026-04-11T00:31:19Z | 2026-04-11T00:31:19Z |
| ghsa-932w-96j4-j35v |
|
Net::CIDR::Lite versions before 0.23 for Perl mishandles IPv4 mapped IPv6 addresses, which may allo⦠| 2026-04-11T00:31:19Z | 2026-04-11T00:31:19Z |
| ghsa-4c9q-86fx-4cv8 |
4.3 (3.1)
|
Microsoft Edge (Chromium-based) Spoofing Vulnerability | 2026-04-11T00:31:19Z | 2026-04-11T00:31:19Z |
| ghsa-29q2-v59x-3mg8 |
5.4 (3.1)
|
User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) al⦠| 2026-04-11T00:31:19Z | 2026-04-11T00:31:19Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2025-56 |
4.3 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. In versions up t⦠| octoprint | 2025-04-22T18:15:59+00:00 | 2025-06-27T17:22:53.513680+00:00 |
| pysec-2024-256 |
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm⦠| mobsf | 2024-12-03T16:15:24+00:00 | 2025-06-27T17:22:53.325430+00:00 |
| pysec-2025-55 |
|
vLLM is an inference and serving engine for large language models (LLMs). Version 0.8.0 u⦠| vllm | 2025-05-30T19:15:30+00:00 | 2025-06-26T21:23:06.407481+00:00 |
| pysec-2025-54 |
|
vLLM is an inference and serving engine for large language models (LLMs). In versions 0.8⦠| vllm | 2025-05-30T19:15:30+00:00 | 2025-06-26T21:23:06.319321+00:00 |
| pysec-2025-53 |
|
vLLM is an inference and serving engine for large language models (LLMs). Prior to versio⦠| vllm | 2025-05-29T17:15:21+00:00 | 2025-06-26T21:23:06.231251+00:00 |
| pysec-2025-51 |
|
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) v⦠| apache-airflow-providers-snowflake | 2025-06-24T08:15:24+00:00 | 2025-06-26T21:23:03.132527+00:00 |
| pysec-2025-50 |
|
vLLM, an inference and serving engine for large language models (LLMs), has a Regular Exp⦠| vllm | 2025-05-30T18:15:32+00:00 | 2025-06-19T03:02:28.572160+00:00 |
| pysec-2024-255 |
|
Gradio before 4.20 allows credential leakage on Windows. | gradio | 2024-05-05T20:15:07+00:00 | 2025-06-17T19:21:48.983901+00:00 |
| pysec-2024-254 |
4.2 (3.1)
|
A session fixation vulnerability exists in the zenml-io/zenml application, where JWT toke⦠| zenml | 2024-04-16T00:15:11+00:00 | 2025-06-13T00:48:41.806476+00:00 |
| pysec-2025-49 |
8.8 (3.1)
|
setuptools is a package that allows users to download, build, install, upgrade, and unins⦠| setuptools | 2025-05-17T16:15:19+00:00 | 2025-06-12T22:23:11.115559+00:00 |
| pysec-2025-48 |
9.8 (3.1)
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm⦠| mobsf | 2025-03-31T17:15:42+00:00 | 2025-06-12T22:23:10.476087+00:00 |
| pysec-2024-253 |
|
pretix before 2024.1.1 mishandles file validation. | pretix | 2024-02-26T16:28:00+00:00 | 2025-06-11T15:23:51.683422+00:00 |
| pysec-2024-252 |
|
PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in t⦠| torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T19:22:08.948962+00:00 |
| pysec-2024-251 |
|
Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in⦠| torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T03:12:59.077932+00:00 |
| pysec-2025-47 |
|
An issue was discovered in Django 5.2 before 5.2.2, 5.1 before 5.1.10, and 4.2 before 4.2⦠| django | 2025-06-05T03:15:25+00:00 | 2025-06-05T05:23:28.296596+00:00 |
| pysec-2025-46 |
5.5 (3.1)
|
A vulnerability was found in erdogant pypickle up to 1.1.5. It has been classified as cri⦠| pypickle | 2025-05-26T08:15:19+00:00 | 2025-06-03T17:36:58.579358+00:00 |
| pysec-2025-45 |
7.8 (3.1)
|
A vulnerability was found in erdogant pypickle up to 1.1.5 and classified as problematic.⦠| pypickle | 2025-05-26T07:15:26+00:00 | 2025-06-03T17:36:58.528116+00:00 |
| pysec-2024-250 |
|
Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the component torch/csr⦠| torch | 2024-04-19T21:15:08+00:00 | 2025-06-03T15:23:56.072490+00:00 |
| pysec-2023-312 |
5.9 (3.1)
|
Redis before 6cbea7d allows a replica to cause an assertion failure in a primary server b⦠| redis | 2023-07-15T23:15:09Z | 2025-06-02T11:48:06.372423Z |
| pysec-2025-44 |
|
django-helpdesk before 1.0.0 allows Sensitive Data Exposure because of os.umask(0) in mod⦠| django-helpdesk | 2025-05-31T01:15:19+00:00 | 2025-05-31T03:09:35.357757+00:00 |
| pysec-2025-43 |
|
vLLM is an inference and serving engine for large language models (LLMs). In versions sta⦠| vllm | 2025-05-29T17:15:21+00:00 | 2025-05-29T19:21:01.611587+00:00 |
| pysec-2025-42 |
9.8 (3.1)
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Ver⦠| vllm | 2025-04-30T01:15:51+00:00 | 2025-05-28T21:23:12.396609+00:00 |
| pysec-2025-41 |
9.8 (3.1)
|
PyTorch is a Python package that provides tensor computation with strong GPU acceleration⦠| torch | 2025-04-18T16:15:23+00:00 | 2025-05-28T15:23:37.843138+00:00 |
| pysec-2025-40 |
7.5 (3.1)
|
A vulnerability in the `preprocess_string()` function of the `transformers.testing_utils`⦠| transformers | 2025-05-19T12:15:19+00:00 | 2025-05-21T19:22:10.801823+00:00 |
| pysec-2024-249 |
6.1 (3.1)
|
### Summary On all Label Studio versions prior to 1.11.0, data imported via file upload f⦠| label-studio | 2024-02-22T22:15:47+00:00 | 2025-05-19T11:22:35.312280+00:00 |
| pysec-2024-248 |
7.8 (3.1)
|
OpenCanary, a multi-protocol network honeypot, directly executed commands taken from its ⦠| opencanary | 2024-10-14T21:15:12+00:00 | 2025-05-16T14:23:05.150356+00:00 |
| pysec-2025-39 |
|
motionEye is an online interface for the software motion, a video surveillance program wi⦠| motioneye | 2025-05-14T16:15:29+00:00 | 2025-05-14T17:22:51.050788+00:00 |
| pysec-2025-38 |
|
OpenStack Ironic before 29.0.1 can write unintended files to a target node disk during im⦠| ironic | 2025-05-08T17:16:01Z | 2025-05-13T04:24:03.083929Z |
| pysec-2024-247 |
9.9 (3.1)
|
A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically⦠| zenml | 2024-04-16T00:15:11+00:00 | 2025-05-12T15:23:53.861001+00:00 |
| pysec-2025-37 |
|
An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2⦠| django | 2025-05-08T04:17:18+00:00 | 2025-05-08T05:23:16.210893+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33881 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.886591Z |
| gsd-2024-33880 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.882744Z |
| gsd-2024-33879 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.727068Z |
| gsd-2024-33878 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.850311Z |
| gsd-2024-33877 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.871220Z |
| gsd-2024-33876 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.990196Z |
| gsd-2024-33875 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.862083Z |
| gsd-2024-33874 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.959238Z |
| gsd-2024-33873 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.870402Z |
| gsd-2024-33872 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.839468Z |
| gsd-2024-33871 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.800751Z |
| gsd-2024-33870 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.943118Z |
| gsd-2024-33869 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.784255Z |
| gsd-2024-33868 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.896638Z |
| gsd-2024-33867 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.808129Z |
| gsd-2024-33866 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.819755Z |
| gsd-2024-33865 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.790923Z |
| gsd-2024-33864 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.792101Z |
| gsd-2024-33863 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.824810Z |
| gsd-2024-33862 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.799465Z |
| gsd-2024-33861 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.958057Z |
| gsd-2024-33860 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.777612Z |
| gsd-2024-33859 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.867340Z |
| gsd-2024-33858 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.848478Z |
| gsd-2024-33857 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.834866Z |
| gsd-2024-33856 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.944669Z |
| gsd-2024-33855 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.741239Z |
| gsd-2024-33854 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.916266Z |
| gsd-2024-33853 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.825026Z |
| gsd-2024-33852 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.824312Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2280 | Malicious code in roboat-additions (PyPI) | 2026-03-28T20:16:43Z | 2026-04-10T21:49:20Z |
| mal-2026-2279 | Malicious code in roboat-addition (PyPI) | 2026-03-28T20:15:46Z | 2026-04-10T21:49:20Z |
| mal-2026-2544 | Malicious code in roboat-utilities (PyPI) | 2026-04-10T21:23:20Z | 2026-04-10T21:23:20Z |
| mal-2026-2543 | Malicious code in robase (PyPI) | 2026-04-10T21:22:56Z | 2026-04-10T21:22:56Z |
| mal-2026-2542 | Malicious code in databasetrace (PyPI) | 2026-04-10T21:22:24Z | 2026-04-10T21:22:24Z |
| mal-2026-2538 | Malicious code in bogus-nydus-op (PyPI) | 2026-04-10T18:23:04Z | 2026-04-10T18:23:04Z |
| mal-2026-2540 | Malicious code in gd-auth (PyPI) | 2026-04-10T18:22:48Z | 2026-04-10T18:22:48Z |
| mal-2026-2541 | Malicious code in gd-auth-sso (PyPI) | 2026-04-10T18:22:28Z | 2026-04-10T18:22:28Z |
| mal-2026-2539 | Malicious code in customer-local-ops (PyPI) | 2026-04-10T18:22:06Z | 2026-04-10T18:22:06Z |
| mal-2026-2529 | Malicious code in use-form-builder-plugin (npm) | 2026-04-06T16:16:50Z | 2026-04-10T17:23:37Z |
| mal-2026-2518 | Malicious code in viewer-assets-generator (npm) | 2026-04-09T03:10:01Z | 2026-04-10T17:23:37Z |
| mal-2026-2528 | Malicious code in sjs-lint-build1 (npm) | 2026-04-09T14:04:30Z | 2026-04-10T17:23:36Z |
| mal-2026-2527 | Malicious code in sjs-biginteger (npm) | 2026-04-09T14:05:08Z | 2026-04-10T17:23:36Z |
| mal-2026-2526 | Malicious code in request-js-validator (npm) | 2026-04-06T16:07:02Z | 2026-04-10T17:23:36Z |
| mal-2026-2504 | Malicious code in strapi-plugin-cache (npm) | 2026-04-07T16:01:07Z | 2026-04-10T17:23:36Z |
| mal-2026-2525 | Malicious code in frontend-backoffice (npm) | 2026-04-06T16:24:27Z | 2026-04-10T17:23:34Z |
| mal-2026-2513 | Malicious code in gprofiler (npm) | 2026-04-08T11:45:58Z | 2026-04-10T17:23:34Z |
| mal-2026-2537 | Malicious code in @b2b-portal/form (npm) | 2026-04-10T16:43:07Z | 2026-04-10T17:23:32Z |
| mal-2026-2524 | Malicious code in a2a-chat-canvas (npm) | 2026-04-06T16:13:05Z | 2026-04-10T17:23:32Z |
| mal-2026-2523 | Malicious code in @telekom-wfa/auth-core (npm) | 2026-04-09T08:25:05Z | 2026-04-10T17:23:32Z |
| mal-2026-2520 | Malicious code in @signals-notebook/utils (npm) | 2026-04-09T11:05:56Z | 2026-04-10T17:23:32Z |
| mal-2026-2511 | Malicious code in argon2-napi (npm) | 2026-04-07T12:15:56Z | 2026-04-10T17:23:32Z |
| mal-2026-2510 | Malicious code in @velora-dex/sdk (npm) | 2026-04-08T04:29:51Z | 2026-04-10T17:23:32Z |
| mal-2026-2509 | Malicious code in @langgraphjs/toolkit (npm) | 2026-04-07T12:15:13Z | 2026-04-10T17:23:32Z |
| mal-2026-2508 | Malicious code in @fairwords/websocket (npm) | 2026-04-08T04:18:49Z | 2026-04-10T17:23:32Z |
| mal-2026-2507 | Malicious code in @fairwords/loopback-connector-es (npm) | 2026-04-08T04:19:03Z | 2026-04-10T17:23:32Z |
| mal-2026-2506 | Malicious code in @fairwords/encryption (npm) | 2026-04-08T04:19:17Z | 2026-04-10T17:23:32Z |
| mal-2026-2505 | Malicious code in @aspect-security/argon2 (npm) | 2026-04-07T12:16:51Z | 2026-04-10T17:23:32Z |
| mal-2026-2083 | Malicious code in anduril-sdk (PyPI) | 2026-03-23T08:06:29Z | 2026-04-10T15:51:21Z |
| mal-2026-1933 | Malicious code in libavcodec-extra (PyPI) | 2026-03-19T17:37:46Z | 2026-04-10T15:51:21Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| 3adr011432 | AC500 V2 Buffer overread on Modbus protocol | 2025-07-23T00:30:00.000Z | 2025-07-23T00:30:00.000Z |
| 9akk108471a4556 | Busch-WelcomeĀ® 2 wire Door opener actuator by default in compatibility mode. | 2025-07-21T00:30:00.000Z | 2025-07-21T00:30:00.000Z |
| 2crt000008 | Lite Panel Pro Vulnerability in Session Management | 2025-06-26T00:30:00.000Z | 2025-06-26T00:30:00.000Z |
| 9akk108470a8948 | ELSB/Home Solutions Outdated SW Components in ABB Welcome IP-Gateway. | 2025-05-29T00:30:00.000Z | 2025-06-05T00:30:00.000Z |
| 9akk108471a1621 | EIBPORT Session Management Fail | 2025-06-02T00:30:00.000Z | 2025-06-04T00:30:00.000Z |
| 9akk108471a0021 | ELSB/BLBA ASPECT advisory several CVEs | 2025-05-22T00:30:00.000Z | 2025-05-23T10:30:00.000Z |
| 2crt000006 | ANC ā ABB Network Card Multiple vulnerabilities in ANC | 2025-04-30T00:30:00.000Z | 2025-04-30T00:30:00.000Z |
| 2crt000007 | Ekip Com IEC61850 Vulnerability in 3rd Party Library | 2025-04-29T00:30:00.000Z | 2025-04-29T00:30:00.000Z |
| 9akk108470a9989 | ABB MV Drives Affected by CODESYS RTS (Runtime System) Vulnerabilities | 2025-04-10T08:30:00.000Z | 2025-04-10T08:30:00.000Z |
| 2nga002579 | ABB Arctic communication solution ARM600 Vulnerabilities | 2025-04-07T10:30:00.000Z | 2025-04-07T10:30:00.000Z |
| 2nga002427 | ABB Arctic ARG600, ARC600, ARR600, ARP600 Arctic Wireless Gateway Modem Module and OpenSSH vulnerabilities | 2025-04-07T10:30:00.000Z | 2025-04-07T10:30:00.000Z |
| 9akk108470a9494 | Low Voltage DC Drives and Power Controllers CODESYS RTS Vulnerabilities | 2025-03-26T00:30:00.000Z | 2025-03-27T00:30:00.000Z |
| 9akk108470a9491 | ABB ACS880 +N8010 Drives CODESYS RTS Vulnerabilities | 2025-03-26T00:30:00.000Z | 2025-03-27T00:30:00.000Z |
| sa24p015 | B&R APROL Potential Privilege Escalation and Information Disclosure | 2025-03-24T00:30:00.000Z | 2025-03-24T00:30:00.000Z |
| 9akk108470a8565 | RMC-100 Vulnerability in the Web UI (REST Interface) | 2025-03-11T00:30:00.000Z | 2025-03-11T00:30:00.000Z |
| 9akk108470a5684 | FLXeon Controllers Cyber Security Advisory | 2025-01-20T00:30:00.000Z | 2025-02-14T00:30:00.000Z |
| 7paa012159 | System 800xA 5.1.x, 6.0.3.x, 6.1.1.x, 6.2.x - VideONet Camera passwords stored in clear text | 2025-02-10T00:30:00.000Z | 2025-02-10T00:30:00.000Z |
| 9akk108470a6775 | Hardcoded credentials in ASPECT Energy Management System | 2025-02-05T00:30:00.000Z | 2025-02-06T00:30:00.000Z |
| sa25p001 | Automation Runtime and mapp View Use of insecure algorithm for self-signed certificates | 2025-01-15T00:30:00.000Z | 2025-01-16T00:30:00.000Z |
| 9akk108470a5466 | Drive Composer Path Traversal Vulnerability | 2025-02-05T00:30:00.000Z | 2025-01-10T00:30:00.000Z |
| 3adr011377 | AC500 V3 Multiple vulnerabilities | 2025-01-07T00:30:00.000Z | 2025-01-07T00:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0716 | OpenSSH GSSAPI delta: Schwachstelle ermƶglicht nicht spezifizierten Angriff | 2026-03-12T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0692 | Mattermost MS Teams plugin: Mehrere Schwachstellen ermƶglichen Denial of Service | 2026-03-10T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0614 | Linux Kernel: Mehrere Schwachstellen | 2026-03-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0548 | Golang Go: Mehrere Schwachstellen ermƶglichen nicht spezifizierten Angriff | 2026-02-26T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0542 | OpenClaw: Mehrere Schwachstellen | 2026-02-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0525 | GStreamer: Mehrere Schwachstellen | 2026-02-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0514 | FreeRDP: Mehrere Schwachstellen | 2026-02-24T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0443 | Apache Tomcat und Tomcat Native: Mehrere Schwachstellen | 2026-02-17T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0421 | Linux Kernel: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0409 | PostgreSQL: Mehrere Schwachstellen | 2026-02-12T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0378 | IBM WebSphere Application Server: Schwachstelle ermƶglicht nicht spezifizierten Angriff | 2026-02-10T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0359 | GnuTLS: Mehrere Schwachstellen ermƶglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0324 | Linux Kernel: Mehrere Schwachstellen | 2026-02-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0309 | NGINX OSS und NGINX Plus: Schwachstelle ermƶglicht Manipulation von Dateien | 2026-02-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0302 | Red Hat Enterprise Linux (python-wheel): Schwachstelle ermöglicht Privilegieneskalation und Codeausführung | 2026-02-03T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0280 | Linux Kernel: Mehrere Schwachstellen | 2026-02-01T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0244 | FreeRDP: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0215 | Linux Kernel: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0194 | Linux Kernel: Schwachstelle ermƶglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0184 | Linux Kernel: Schwachstelle ermƶglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0164 | Oracle Java SE: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0145 | FreeRDP: Mehrere Schwachstellen ermöglichen DoS und Codeausführung | 2026-01-19T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0129 | Golang Go: Mehrere Schwachstellen | 2026-01-15T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0119 | Linux Kernel: Mehrere Schwachstellen | 2026-01-14T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0111 | FreeRDP: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0086 | Linux Kernel: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0009 | Linux Kernel: Mehrere Schwachstellen ermƶglichen Denial of Service | 2026-01-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2941 | Linux Kernel: Mehrere Schwachstellen ermƶglichen Denial of Service | 2025-12-30T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2929 | Linux Kernel: Mehrere Schwachstellen | 2025-12-28T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2920 | Linux Kernel: Mehrere Schwachstellen | 2025-12-23T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-078-02 | Schneider Electric Modicon Controllers M241, M251, M258, and LMC058 | 2026-03-10T07:00:00.000000Z | 2026-03-19T06:00:00.000000Z |
| icsa-26-078-01 | Schneider Electric Modicon M241, M251, and M262 | 2026-03-10T07:00:00.000000Z | 2026-03-19T06:00:00.000000Z |
| icsa-26-078-07 | IGL-Technologies eParking.fi | 2026-03-19T05:00:00.000000Z | 2026-03-19T05:00:00.000000Z |
| icsa-26-078-06 | CTEK Chargeportal | 2026-03-19T05:00:00.000000Z | 2026-03-19T05:00:00.000000Z |
| icsa-26-076-04 | Siemens SICAM SIAPP SDK | 2026-03-10T00:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-076-03 | Schneider Electric EcoStruxure Data Center Expert | 2026-03-10T07:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-076-02 | Schneider Electric SCADAPack and RemoteConnect | 2026-02-10T08:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-076-01 | CODESYS in Festo Automation Suite | 2026-02-26T08:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-015-10 | Schneider Electric EcoStruxure Power Build Rapsody (Update A) | 2026-01-13T08:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-25-160-02 | Hitachi Energy Relion 670, 650, SAM600-IO Series (Update A) | 2023-06-27T00:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-25-303-01 | International Standards Organization ISO 15118-2 (Update A) | 2025-10-30T05:00:00.000000Z | 2026-03-17T05:00:00.000000Z |
| icsa-26-071-06 | Inductive Automation Ignition Software | 2026-03-12T06:00:00.000000Z | 2026-03-13T06:00:00.000000Z |
| icsa-26-071-05 | Siemens Heliox EV Chargers | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-04 | Siemens SIMATIC | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-03 | Siemens SIDIS Prime | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-02 | Siemens RUGGEDCOM APE1808 Devices | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-01 | Trane Tracer SC, Tracer SC+, and Tracer Concierge | 2026-03-12T06:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-048-04 | Honeywell HIB2PI CCTV Camera (Update B) | 2026-02-17T07:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-043-08 | Siemens NX | 2026-02-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-043-03 | Siemens COMOS | 2025-12-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-345-05 | Siemens Advanced Licensing (SALT) Toolkit | 2025-12-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-345-04 | Siemens IAM Client | 2025-12-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-254-03 | Siemens SINAMICS Drives | 2025-09-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-231-02 | Siemens Mendix SAML Module | 2025-08-14T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-226-22 | Siemens Web Installer | 2025-08-12T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-162-05 | Siemens SIMATIC S7-1500 CPU Family | 2025-06-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-162-02 | Siemens RUGGEDCOM APE1808 | 2025-06-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-044-06 | Siemens RUGGEDCOM APE1808 | 2025-02-11T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-24-284-06 | Siemens SINEC Security Monitor | 2024-10-08T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-069-03 | Honeywell IQ4x BMS Controller | 2026-03-10T06:00:00.000000Z | 2026-03-10T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-snort3-multi-dos-xfwkwswz | Multiple Cisco Products Snort 3 Denial of Service Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-onprem-fmc-authbypass-5jpp45v2 | Cisco Secure Firewall Management Center Software Authentication Bypass Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftdfmc-dir-trav-wergjhwq | Cisco Secure Firewall Management Center and Secure Firewall Threat Defense Software Path Traversal Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-tcp-dos-rhfqnwrg | Cisco Secure Firewall Threat Defense Software TLS with Snort 3 Detection Engine Denial of Service Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-snort-bypass-rlggkzvf | Cisco Secure Firewall Threat Defense Software Snort Deep Inspection Bypass Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-dnd-dos-bpecg7b7 | Cisco Secure Firewall Threat Defense Software SSL Decryption Policy Denial of Service Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-cmd-inj-mtzgzexf | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Authenticated Command Injection Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-fmc-sql-injection-2qh6ccjd | Cisco Secure Firewall Management Center Software SQL Injection Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-vpn-m9sx6mbc | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-saml-lkttrwzp | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software SAML Reflected Cross-Site Scripting Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-ospf-zh8phbsw | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software OSPF Protocol Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-luainject-vescqgms | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Lua Code Injection Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-ikev2-dos-ebuegdeg | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software IKEv2 Denial of Service Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-desync-n5avzeqw | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Services Client-Side Request Smuggling Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asa-ssh-keybypass-cr5xpusf | Cisco Secure Firewall Adaptive Security Appliance Software SSH Partial Private Key Authentication Bypass Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-sdwan-rpa-ehchtzk | Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-03-03T00:38:56+00:00 |
| cisco-sa-sd-wan-priv-e6e8tedf | Cisco SD-WAN Software Privilege Escalation Vulnerabilities | 2022-09-28T16:00:00+00:00 | 2026-02-25T20:29:00+00:00 |
| cisco-sa-ucsm-cmdinj-gvxlpesb | Cisco UCS Manager Software Command Injection Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsm-afwae-mogufyln | Cisco UCS Manager Software Privilege Escalation Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsfxosxss-7skve8zv | Cisco FXOS and UCS Manager Software Stored Cross-Site Scripting Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsciv-wgytc78q | Cisco FXOS and UCS Manager Software Command Injection Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-nxos-ether-dos-kv8ynwz4 | Cisco Nexus 3600 and 9500-R Series Switching Platforms Layer 2 Loop Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-nxos-dsnmp-cnn39uh | Cisco Nexus 9000 Series Fabric Switches in ACI Mode SNMP Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-nxos-cpdos-qlsv6pfd | Cisco Nexus 9000 Series Fabric Switches in ACI Mode Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-n3kn9k_aci_lldp_dos-ndgrrra3 | Cisco NX-OS Software Link Layer Discovery Protocol Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-apic-dos-rnus8efw | Cisco Application Policy Infrastructure Controller Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-wsa-archive-bypass-scx2e8zf | Cisco Secure Web Appliance Real-Time Scanning Archive File Bypass Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-20T21:08:47+00:00 |
| cisco-sa-voice-rce-morhqy4b | Cisco Unified Communications Products Remote Code Execution Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-02-13T15:21:01+00:00 |
| cisco-sa-snort3-mime-vulns-ttl8pgvh | Multiple Cisco Products Snort 3 MIME Denial of Service Vulnerabilities | 2025-10-15T16:00:00+00:00 | 2026-02-12T18:38:13+00:00 |
| cisco-sa-tce-roomos-dos-9v9jrc2q | Cisco TelePresence Collaboration Endpoint Software and RoomOS Software Denial of Service Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-12T17:37:39+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-39314 | CUPS has an integer underflow in `_ppdCreateFromIPP` causes root cupsd crash via negative `job-password-supported` | 2026-04-02T00:00:00.000Z | 2026-04-11T01:01:16.000Z |
| msrc_cve-2026-31790 | Incorrect Failure Handling in RSA KEM RSASVE Encapsulation | 2026-04-02T00:00:00.000Z | 2026-04-10T14:39:43.000Z |
| msrc_cve-2026-33119 | Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability | 2026-04-02T07:00:00.000Z | 2026-04-10T07:00:00.000Z |
| msrc_cve-2026-33118 | Microsoft Edge (Chromium-based) Spoofing Vulnerability | 2026-04-02T07:00:00.000Z | 2026-04-10T07:00:00.000Z |
| msrc_cve-2026-24302 | Azure Arc Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-04-10T07:00:00.000Z |
| msrc_cve-2026-23411 | apparmor: fix race between freeing data and fs accessing it | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:58.000Z |
| msrc_cve-2026-23410 | apparmor: fix race on rawdata dereference | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:51.000Z |
| msrc_cve-2026-23409 | apparmor: fix differential encoding verification | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:45.000Z |
| msrc_cve-2026-23408 | apparmor: Fix double free of ns_name in aa_replace_profiles() | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:39.000Z |
| msrc_cve-2026-23407 | apparmor: fix missing bounds check on DEFAULT table in verify_dfa() | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:33.000Z |
| msrc_cve-2026-23406 | apparmor: fix side-effect bug in match_char() macro usage | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:27.000Z |
| msrc_cve-2026-23405 | apparmor: fix: limit the number of levels of policy namespaces | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:21.000Z |
| msrc_cve-2026-23404 | apparmor: replace recursive profile removal with iterative approach | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:14.000Z |
| msrc_cve-2026-23403 | apparmor: fix memory leak in verify_header | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:07.000Z |
| msrc_cve-2026-32241 | Flannel vulnerable to cross-node remote code execution via extension backend BackendData injection | 2026-03-02T00:00:00.000Z | 2026-04-10T01:01:36.000Z |
| msrc_cve-2026-2436 | Libsoup: libsoup: denial of service via use-after-free in soupserver during tls handshake | 2026-03-02T00:00:00.000Z | 2026-04-09T14:38:04.000Z |
| msrc_cve-2026-5107 | FRRouting FRR EVPN Type-2 Route bgp_evpn.c process_type2_route access control | 2026-03-02T00:00:00.000Z | 2026-04-09T14:37:56.000Z |
| msrc_cve-2026-26133 | M365 Copilot Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-04-09T07:00:00.000Z |
| msrc_cve-2026-4897 | Polkit: polkit: denial of service via unbounded input processing through standard input | 2026-03-02T00:00:00.000Z | 2026-04-09T01:40:37.000Z |
| msrc_cve-2026-21715 | CVE-2026-21715 | 2026-03-02T00:00:00.000Z | 2026-04-09T01:40:20.000Z |
| msrc_cve-2026-21710 | CVE-2026-21710 | 2026-03-02T00:00:00.000Z | 2026-04-09T01:40:13.000Z |
| msrc_cve-2026-21716 | CVE-2026-21716 | 2026-03-02T00:00:00.000Z | 2026-04-09T01:40:06.000Z |
| msrc_cve-2026-21714 | CVE-2026-21714 | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:59.000Z |
| msrc_cve-2026-21713 | CVE-2026-21713 | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:52.000Z |
| msrc_cve-2026-21717 | CVE-2026-21717 | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:45.000Z |
| msrc_cve-2025-66038 | OpenSC: `sc_compacttlv_find_tag` can return out-of-bounds pointers | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:38.000Z |
| msrc_cve-2025-66037 | OpenSC: Out of Bounds vulnerability | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:31.000Z |
| msrc_cve-2025-66215 | OpenSC: Stack-buffer-overflow WRITE in card-oberthur | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:25.000Z |
| msrc_cve-2025-49010 | OpenSC: Stack-buffer-overflow WRITE in GET RESPONSE | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:18.000Z |
| msrc_cve-2026-21712 | CVE-2026-21712 | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:07.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0084 | Kwetsbaarheden verholpen in Microsoft Office | 2026-03-10T20:20:08.157658Z | 2026-03-10T20:20:08.157658Z |
| ncsc-2026-0083 | Kwetsbaarheid verholpen in Microsoft Authenticator app | 2026-03-10T20:18:35.792755Z | 2026-03-10T20:18:35.792755Z |
| ncsc-2026-0082 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-03-10T20:15:41.528951Z | 2026-03-10T20:15:41.528951Z |
| ncsc-2026-0081 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2026-03-10T20:12:56.032261Z | 2026-03-10T20:12:56.032261Z |
| ncsc-2026-0080 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-03-10T20:07:55.976638Z | 2026-03-10T20:07:55.976638Z |
| ncsc-2026-0059 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2026-02-11T08:16:27.583936Z | 2026-03-10T14:20:48.176282Z |
| ncsc-2026-0079 | Kwetsbaarheden verholpen in Siemens producten | 2026-03-10T12:39:14.474522Z | 2026-03-10T12:39:14.474522Z |
| ncsc-2026-0071 | Kwetsbaarheden verholpen in Cisco Catalyst SD-WAN Manager | 2026-02-25T17:11:09.013125Z | 2026-03-06T12:07:02.595940Z |
| ncsc-2026-0078 | Kwetsbaarheden verholpen in Kibana | 2026-03-05T09:36:49.056247Z | 2026-03-05T09:36:49.056247Z |
| ncsc-2026-0077 | Kwetsbaarheden verholpen in Cisco Secure Firewall systemen | 2026-03-05T09:05:21.646499Z | 2026-03-05T09:05:21.646499Z |
| ncsc-2026-0075 | Kwetsbaarheid verholpen in n8n Automation Platform | 2026-03-04T14:03:54.207583Z | 2026-03-04T14:03:54.207583Z |
| ncsc-2026-0070 | Kwetsbaarheden verholpen in VMware Aria Operations | 2026-02-25T11:24:46.807867Z | 2026-03-04T08:54:08.940512Z |
| ncsc-2026-0074 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2026-03-03T09:07:09.279353Z | 2026-03-03T09:07:09.279353Z |
| ncsc-2026-0073 | Kwetsbaarheid verholpen in Juniper Junos OS Evolved | 2026-02-27T09:48:51.845864Z | 2026-02-27T09:48:51.845864Z |
| ncsc-2026-0072 | Kwetsbaarheden verholpen in GitLab | 2026-02-27T07:15:18.318821Z | 2026-02-27T07:15:18.318821Z |
| ncsc-2026-0069 | Kwetsbaarheden verholpen in SolarWinds Serv-U | 2026-02-25T10:39:38.154815Z | 2026-02-25T10:39:38.154815Z |
| ncsc-2026-0068 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2026-02-23T14:27:28.865278Z | 2026-02-23T14:27:28.865278Z |
| ncsc-2026-0043 | Zeroday-kwetsbaarheden verholpen in Ivanti Endpoint Manager Mobile | 2026-01-29T19:15:04.575371Z | 2026-02-20T14:47:02.047999Z |
| ncsc-2026-0067 | Kwetsbaarheden verholpen in GitHub Enterprise Server | 2026-02-20T10:13:39.540778Z | 2026-02-20T10:13:39.540778Z |
| ncsc-2026-0066 | Kwetsbaarheid verholpen in Google Chrome | 2026-02-19T08:29:30.712590Z | 2026-02-19T08:29:30.712590Z |
| ncsc-2026-0065 | Kwetsbaarheid verholpen in Dell RecoverPoint for Virtual Machines | 2026-02-18T13:18:23.815384Z | 2026-02-18T13:18:23.815384Z |
| ncsc-2026-0064 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2026-02-13T13:35:03.870920Z | 2026-02-13T13:35:03.870920Z |
| ncsc-2026-0063 | Kwetsbaarheden verholpen in Apple macOS | 2026-02-13T13:24:06.433550Z | 2026-02-13T13:24:06.433550Z |
| ncsc-2026-0048 | Kwetsbaarheid verholpen in BeyondTrust Remote Support | 2026-02-09T10:27:57.867529Z | 2026-02-13T12:54:32.614217Z |
| ncsc-2026-0062 | Kwetsbaarheden verholpen in GitLab CE/EE | 2026-02-11T11:45:05.986313Z | 2026-02-11T11:45:05.986313Z |
| ncsc-2026-0061 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2026-02-11T11:34:50.888067Z | 2026-02-11T11:34:50.888067Z |
| ncsc-2026-0060 | Kwetsbaarheden verholpen in Fortinet FortiSandbox, FortiAuthenticator en FortiClient | 2026-02-11T11:34:36.684955Z | 2026-02-11T11:34:36.684955Z |
| ncsc-2026-0058 | Kwetsbaarheden verholpen in Microsoft Office | 2026-02-10T19:11:42.825147Z | 2026-02-10T19:11:42.825147Z |
| ncsc-2026-0057 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-02-10T19:08:27.878305Z | 2026-02-10T19:08:27.878305Z |
| ncsc-2026-0056 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2026-02-10T19:07:16.028511Z | 2026-02-10T19:07:16.028511Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2023_3-01 | Authenticated Blind SQL Injection on alerts count in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_2-01 | Authenticated Blind SQL Injection on sorting in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_11-01 | SQL Injection on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_10-01 | DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_1-01 | Authenticated SQL Injection on Alerts in Guardian/CMC before 22.5.2 | 2023-05-03T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:9-01 | Authenticated SQL Injection on Query functionality in Guardian/CMC before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:8-01 | Session Fixation in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:7-01 | DoS via SAML configuration in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:6-01 | Partial DoS on Reports section due to null report name in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:5-01 | Information disclosure via the debug function in assertions in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:4-01 | Stored Cross-Site Scripting (XSS) in Threat Intelligence rules in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:3-01 | Authenticated Blind SQL Injection on alerts count in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:2-01 | Authenticated Blind SQL Injection on sorting in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:11-01 | SQL Injection on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:10-01 | DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:1-01 | Authenticated SQL Injection on Alerts in Guardian/CMC before 22.5.2 | 2023-05-03T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022_2-02 | Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022_2-01 | Authenticated RCE on logo report upload in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022:2-02 | Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022:2-01 | Authenticated RCE on logo report upload in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021_2-01 | Authenticated command path traversal on timezone settings in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021_1-01 | Authenticated command injection when changing date settings or hostname in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021:2-01 | Authenticated command path traversal on timezone settings in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021:1-01 | Authenticated command injection when changing date settings or hostname in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020_3-01 | Angular template injection on custom report name field | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020_2-01 | Cross-site request forgery attack on change password form | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020:3-01 | Angular template injection on custom report name field | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020:2-01 | Cross-site request forgery attack on change password form | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019_2-01 | CSV Injection on node label | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019_1-01 | Stored XSS in field name data model | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20468-1 | Security update for python-cbor2 | 2026-04-07T11:57:38Z | 2026-04-07T11:57:38Z |
| opensuse-su-2026:20466-1 | Security update for libpng16 | 2026-04-07T11:57:38Z | 2026-04-07T11:57:38Z |
| opensuse-su-2026:20473-1 | Security update for osslsigncode | 2026-04-07T07:50:40Z | 2026-04-07T07:50:40Z |
| opensuse-su-2026:10499-1 | python311-social-auth-app-django-5.7.0-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10498-1 | libeverest-3.6.6-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10497-1 | heroic-games-launcher-2.20.1-5.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10496-1 | git-cliff-2.12.0-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10495-1 | ckermit-9.0.302-20.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10494-1 | SDL2_image-devel-2.8.10-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:20464-1 | Security update for cockpit-repos | 2026-04-05T02:50:21Z | 2026-04-05T02:50:21Z |
| opensuse-su-2026:10493-1 | SDL3_image-devel-3.4.2-1.1 on GA media | 2026-04-05T00:00:00Z | 2026-04-05T00:00:00Z |
| opensuse-su-2026:10492-1 | liblzma5-32bit-5.8.3-1.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10491-1 | python311-scitokens-1.8.1-2.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10490-1 | python311-aiohttp-3.13.5-2.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10489-1 | libinput-devel-1.31.1-1.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10488-1 | corosync-3.1.10-4.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10487-1 | chromedriver-146.0.7680.177-1.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10486-1 | amazon-ssm-agent-3.3.4121.0-1.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:20460-1 | Security update for chromium | 2026-04-03T06:09:23Z | 2026-04-03T06:09:23Z |
| opensuse-su-2026:10485-1 | python311-Flask-Cors-6.0.2-1.1 on GA media | 2026-04-03T00:00:00Z | 2026-04-03T00:00:00Z |
| opensuse-su-2026:10484-1 | k6-1.7.1-1.1 on GA media | 2026-04-03T00:00:00Z | 2026-04-03T00:00:00Z |
| opensuse-su-2026:10483-1 | himmelblau-2.3.9+git0.a9fd29b-1.1 on GA media | 2026-04-03T00:00:00Z | 2026-04-03T00:00:00Z |
| opensuse-su-2026:20461-1 | Security update for dnsdist | 2026-04-02T09:11:51Z | 2026-04-02T09:11:51Z |
| opensuse-su-2026:10482-1 | osslsigncode-2.13-1.1 on GA media | 2026-04-02T00:00:00Z | 2026-04-02T00:00:00Z |
| opensuse-su-2026:20459-1 | Security update for perl-XML-Parser | 2026-04-01T16:23:38Z | 2026-04-01T16:23:38Z |
| opensuse-su-2026:20456-1 | Security update for tinyproxy | 2026-04-01T16:15:06Z | 2026-04-01T16:15:06Z |
| opensuse-su-2026:20458-1 | Security update for python-Pillow | 2026-04-01T14:57:29Z | 2026-04-01T14:57:29Z |
| opensuse-su-2026:20452-1 | Security update for kea | 2026-04-01T09:24:21Z | 2026-04-01T09:24:21Z |
| opensuse-su-2026:10481-1 | python314-3.14.3-4.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10480-1 | python313-3.13.12-3.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:8974 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.12.0 security and bug fixes | 2024-11-06T20:13:07+00:00 | 2026-04-11T19:44:30+00:00 |
| rhsa-2024:8704 | Red Hat Security Advisory: Kube Descheduler Operator for Red Hat OpenShift 5.0.2 for RHEL 9 | 2024-12-02T14:11:34+00:00 | 2026-04-11T19:44:30+00:00 |
| rhsa-2024:8677 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.12.6 security update | 2024-10-30T18:18:28+00:00 | 2026-04-11T19:44:28+00:00 |
| rhsa-2024:8235 | Red Hat Security Advisory: OpenShift Container Platform 4.14.39 security update | 2024-10-23T13:14:14+00:00 | 2026-04-11T19:44:28+00:00 |
| rhsa-2024:8676 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.17.0 Security, Enhancement, & Bug Fix Update | 2024-10-30T14:25:22+00:00 | 2026-04-11T19:44:27+00:00 |
| rhsa-2024:8434 | Red Hat Security Advisory: OpenShift Container Platform 4.17.3 security update | 2024-10-29T17:50:43+00:00 | 2026-04-11T19:44:26+00:00 |
| rhsa-2024:8425 | Red Hat Security Advisory: OpenShift Container Platform 4.15.37 bug fix and security update | 2024-10-31T03:37:09+00:00 | 2026-04-11T19:44:26+00:00 |
| rhsa-2024:8415 | Red Hat Security Advisory: OpenShift Container Platform 4.16.19 bug fix and security update | 2024-10-30T01:12:50+00:00 | 2026-04-11T19:44:25+00:00 |
| rhsa-2024:8260 | Red Hat Security Advisory: OpenShift Container Platform 4.16.18 bug fix and security update | 2024-10-24T10:44:45+00:00 | 2026-04-11T19:44:23+00:00 |
| rhsa-2024:8229 | Red Hat Security Advisory: OpenShift Container Platform 4.17.2 bug fix and security update | 2024-10-23T05:29:09+00:00 | 2026-04-11T19:44:22+00:00 |
| rhsa-2024:8040 | Red Hat Security Advisory: Cluster Observability Operator 0.4.1 | 2024-10-14T01:36:23+00:00 | 2026-04-11T19:44:21+00:00 |
| rhsa-2024:7922 | Red Hat Security Advisory: OpenShift Container Platform 4.17.1 bug fix and security update | 2024-10-16T02:39:40+00:00 | 2026-04-11T19:44:21+00:00 |
| rhsa-2024:6824 | Red Hat Security Advisory: OpenShift Container Platform 4.16.14 security update | 2024-09-24T15:28:01+00:00 | 2026-04-11T19:44:21+00:00 |
| rhsa-2024:7184 | Red Hat Security Advisory: OpenShift Container Platform 4.14.38 security update | 2024-10-03T11:01:15+00:00 | 2026-04-11T19:44:20+00:00 |
| rhsa-2024:7548 | Red Hat Security Advisory: Run Once Duration Override Operator for Red Hat OpenShift 1.2.0 for RHEL 9 | 2024-10-16T00:34:49+00:00 | 2026-04-11T19:44:19+00:00 |
| rhsa-2024:7179 | Red Hat Security Advisory: OpenShift Container Platform 4.15.35 bug fix and security update | 2024-10-02T05:49:45+00:00 | 2026-04-11T19:44:18+00:00 |
| rhsa-2024:7164 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.4 security and bug fix update | 2024-09-26T03:46:53+00:00 | 2026-04-11T19:44:17+00:00 |
| rhsa-2024:6755 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16.2 security and bug fix update | 2024-09-18T11:56:25+00:00 | 2026-04-11T19:44:16+00:00 |
| rhsa-2024:6209 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.10 security update | 2024-09-03T10:04:55+00:00 | 2026-04-11T19:44:16+00:00 |
| rhsa-2024:6687 | Red Hat Security Advisory: OpenShift Container Platform 4.16.13 bug fix and security update | 2024-09-19T05:38:53+00:00 | 2026-04-11T19:44:14+00:00 |
| rhsa-2024:6409 | Red Hat Security Advisory: OpenShift Container Platform 4.15.31 bug fix and security update | 2024-09-11T13:39:54+00:00 | 2026-04-11T19:44:14+00:00 |
| rhsa-2024:6221 | Red Hat Security Advisory: The Red Hat OpenShift Builds 1.1.0 General Availability | 2024-09-03T11:45:04+00:00 | 2026-04-11T19:44:14+00:00 |
| rhsa-2024:6122 | Red Hat Security Advisory: OpenShift Container Platform 4.18.1 bug fix and security update | 2025-02-25T04:38:13+00:00 | 2026-04-11T19:44:14+00:00 |
| rhsa-2024:6004 | Red Hat Security Advisory: OpenShift Container Platform 4.16.10 bug fix and security update | 2024-09-03T19:13:56+00:00 | 2026-04-11T19:44:13+00:00 |
| rhsa-2024:5422 | Red Hat Security Advisory: OpenShift Container Platform 4.16.8 bug fix and security update | 2024-08-20T15:21:42+00:00 | 2026-04-11T19:44:13+00:00 |
| rhsa-2024:5054 | Red Hat Security Advisory: OpenShift Virtualization 4.16.1 Images security update | 2024-08-06T16:21:05+00:00 | 2026-04-11T19:44:13+00:00 |
| rhsa-2024:5013 | Red Hat Security Advisory: The Red Hat OpenShift Builds Client 1.1.0 General Availability | 2024-08-05T15:40:28+00:00 | 2026-04-11T19:44:12+00:00 |
| rhsa-2024:4631 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.15.0 release | 2024-07-18T17:11:22+00:00 | 2026-04-11T19:44:12+00:00 |
| rhsa-2024:4626 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.11.6 security update | 2024-07-18T13:37:38+00:00 | 2026-04-11T19:44:11+00:00 |
| rhsa-2024:4597 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.15 OpenShift Jenkins security update | 2024-07-17T18:49:17+00:00 | 2026-04-11T19:44:11+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2024-191-04 | Modicon Controllers M241/ M251, M258 / LMC058 and M262 | 2024-07-09T00:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2025-133-05 | Galaxy VS, Galaxy VL, Galaxy VXL | 2025-05-13T04:00:00.000Z | 2025-09-24T04:00:00.000Z |
| sevd-2025-252-02 | Saitel DR & Saitel DP Remote Terminal Unit | 2025-09-09T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-224-04 | EcoStruxure⢠Building Operation Enterprise Server, EcoStruxure⢠Building Operation Enterprise Central, and EcoStruxure⢠Workstation | 2025-08-12T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-224-03 | Schneider Electric Software Update | 2025-08-12T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-014-02 | Pro-face GP-Pro EX and Remote HMI | 2025-01-14T00:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2021-313-05 | BadAlloc Vulnerabilities | 2021-11-09T05:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-224-05 | Modicon M340 Controller and Communication Modules | 2025-08-12T04:00:00.000Z | 2025-08-12T04:00:00.000Z |
| sevd-2025-014-05 | Web Server on Modicon M340, Modbus/TCP Ethernet Modicon M340 module, Modbus/TCP Ethernet Modicon M340 FactoryCast module and Ethernet / Serial RTU communication modules | 2025-01-14T00:00:00.000Z | 2025-08-12T04:00:00.000Z |
| sevd-2025-014-03 | Wind River VxWorks DHCP Server Vulnerability | 2025-01-14T05:00:00.000Z | 2025-08-12T04:00:00.000Z |
| sevd-2024-163-01 | Modicon M340, Modbus/TCP Ethernet Modicon M340 module, and Modbus/TCP Ethernet Modicon M340 FactoryCast module | 2024-06-11T00:00:00.000Z | 2025-08-12T04:00:00.000Z |
| sevd-2025-189-04 | EcoStruxure⢠Power Monitoring Expert (PME) and EcoStruxure⢠Power Operation (EPO) with Advanced Reporting and Dashboards | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-189-02 | System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-189-01 | EcoStruxure⢠IT Data Center Expert | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-03 | EVLink WallBox | 2025-06-10T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-02 | Modicon Controllers M241/M251/M258/LMC058/M262 | 2025-06-10T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2024-254-01 | Vijeo Designer | 2024-09-10T00:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-01 | Insight Home and Insight Facility | 2025-06-10T04:00:00.000Z | 2025-06-10T04:00:00.000Z |
| sevd-2020-287-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-10-13T00:00:00.000Z | 2025-06-10T04:00:00.000Z |
| sevd-2025-133-04 | Schneider Electric PrismaSeT Active - Wireless Panel Server | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-133-03 | EcoStruxure Power Build Rapsody | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-133-02 | Wiser Home Automation | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-098-01 | ConneXium Network Manager Software | 2025-04-08T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-014-09 | EcoStruxure⢠Power Build Rapsody | 2025-01-14T00:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2024-282-05 | EcoStruxure⢠Power Monitoring Expert (PME) | 2024-10-08T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-098-02 | Trio⢠Q Licensed Data Radios | 2025-04-08T04:00:00.000Z | 2025-04-08T04:00:00.000Z |
| sevd-2025-014-01 | Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC | 2025-01-14T05:00:00.000Z | 2025-04-08T04:00:00.000Z |
| sevd-2025-070-03 | WebHMI Component For EcoStruxure⢠Power Automation System User Interface and EcoStruxure⢠Microgrid Operation Large | 2025-03-11T04:00:00.000Z | 2025-03-11T04:00:00.000Z |
| sevd-2025-070-02 | EPAS-UI & EcoSUI | 2025-03-11T04:00:00.000Z | 2025-03-11T04:00:00.000Z |
| sevd-2025-070-01 | EcoStruxure⢠Panel Server | 2025-03-11T04:00:00.000Z | 2025-03-11T04:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| SCA-2023-0010 | Vulnerabilities in SICK Application Processing Unit | 2023-10-09T11:00:00.000Z | 2023-10-09T11:00:00.000Z |
| sca-2023-0008 | Vulnerability in SICK SIM1012 | 2023-09-29T13:00:00.000Z | 2023-09-29T13:00:00.000Z |
| SCA-2023-0008 | Vulnerability in SICK SIM1012 | 2023-09-29T13:00:00.000Z | 2023-09-29T13:00:00.000Z |
| sca-2023-0009 | Vulnerability in Wibu-Systems CodeMeter Runtime affects multiple SICK products | 2023-09-29T10:00:00.000Z | 2023-09-29T10:00:00.000Z |
| SCA-2023-0009 | Vulnerability in Wibu-Systems CodeMeter Runtime affects multiple SICK products | 2023-09-29T10:00:00.000Z | 2023-09-29T10:00:00.000Z |
| sca-2023-0007 | Vulnerabilities in SICK LMS5xx | 2023-08-25T11:00:00.000Z | 2023-08-25T11:00:00.000Z |
| SCA-2023-0007 | Vulnerabilities in SICK LMS5xx | 2023-08-25T11:00:00.000Z | 2023-08-25T11:00:00.000Z |
| sca-2023-0006 | Vulnerabilities in SICK ICR890-4 | 2023-07-10T13:00:00.000Z | 2023-07-10T13:00:00.000Z |
| SCA-2023-0006 | Vulnerabilities in SICK ICR890-4 | 2023-07-10T13:00:00.000Z | 2023-07-10T13:00:00.000Z |
| sca-2023-0005 | Vulnerabilities in SICK EventCam App | 2023-06-19T11:00:00.000Z | 2023-06-19T11:00:00.000Z |
| SCA-2023-0005 | Vulnerabilities in SICK EventCam App | 2023-06-19T11:00:00.000Z | 2023-06-19T11:00:00.000Z |
| sca-2023-0004 | Vulnerabilities in SICK FTMg | 2023-05-11T13:00:00.000Z | 2023-05-11T13:00:00.000Z |
| SCA-2023-0004 | Vulnerabilities in SICK FTMg | 2023-05-11T13:00:00.000Z | 2023-05-11T13:00:00.000Z |
| sca-2023-0003 | Vulnerability in SICK Flexi Soft and Flexi Classic Gateways | 2023-05-03T13:00:00.000Z | 2023-05-03T13:00:00.000Z |
| SCA-2023-0003 | Vulnerability in SICK Flexi Soft and Flexi Classic Gateways | 2023-05-03T13:00:00.000Z | 2023-05-03T13:00:00.000Z |
| sca-2023-0002 | Use of Telnet in multiple SICK Flexi Soft and Flexi Classic Gateways | 2023-04-11T10:00:00.000Z | 2023-04-11T10:00:00.000Z |
| sca-2023-0001 | Bootloader mode vulnerability in Flexi Soft Gateways v3 | 2023-02-20T14:00:00.000Z | 2023-02-20T14:00:00.000Z |
| sca-2022-0015 | Use of a Broken or Risky Cryptographic Algorithm in SICK RFU6xx RADIO FREQUEN. SENSOR | 2022-12-08T16:00:00.000Z | 2022-12-08T16:00:00.000Z |
| sca-2022-0013 | Password recovery vulnerability affects multiple SICK SIMs | 2022-10-21T13:00:00.000Z | 2022-11-04T14:00:00.000Z |
| sca-2022-0014 | SICK FlexiCompact affected by Denial of Service vulnerability | 2022-10-31T11:00:00.000Z | 2022-10-31T11:00:00.000Z |
| sca-2022-0012 | OpenSSL vulnerability affects multiple SICK SIMs | 2022-08-08T13:00:00.000Z | 2022-08-03T13:00:00.000Z |
| sca-2022-0010 | Vulnerability in SICK Flexi Soft Designer & Safety Designer | 2022-05-16T10:00:00.000Z | 2022-07-19T10:00:00.000Z |
| sca-2022-0011 | Vulnerabilities in SICK Package Analytics | 2022-06-08T15:00:00.000Z | 2022-06-08T15:00:00.000Z |
| sca-2022-0009 | Vulnerability in SICK Flexi Soft PROFINET IO Gateway FX0-GPNT and SICK microScan3 PROFINET | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
| sca-2022-0008 | Vulnerability in SICK Gateways for Flexi Soft, Flexi Compact, SICK EFI Gateway UE4740, SICK microScan3 and outdoorScan3 | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
| sca-2022-0007 | Vulnerabilities in SICK MARSIC300 | 2022-04-21T15:00:00.000Z | 2022-04-21T15:00:00.000Z |
| sca-2022-0006 | Vulnerability in SICK MSC800 | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
| sca-2022-0005 | Vulnerability in SICK Overall Equipment Effectiveness (OEE) | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
| sca-2022-0004 | Microsoft vulnerability affects multiple SICK IPCs with SICK MEAC | 2022-04-11T15:00:00.000Z | 2022-03-31T15:00:00.000Z |
| sca-2022-0003 | Vulnerabilities in SICK FTMg | 2022-03-31T15:00:00.000Z | 2022-03-31T15:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-216014 | SSA-216014: Vulnerabilities in EFI variable of SIMATIC IPCs, SIMATIC Tablet PCs, and SIMATIC Field PGs | 2025-03-11T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-130874 | SSA-130874: Buffer Overflow Vulnerability in SCALANCE X Switches | 2012-04-05T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-035571 | SSA-035571: Cross Site Scripting Vulnerability in Polarion Before V2506 | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-978177 | SSA-978177: Vulnerability in Nozomi Guardian/CMC Before 25.4.0 on RUGGEDCOM APE1808 Devices | 2025-08-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-928984 | SSA-928984: Heap-based Buffer Overflow Vulnerability in User Management Component (UMC) | 2024-12-16T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-912274 | SSA-912274: Multiple Vulnerabilities in RUGGEDCOM ROX Before V2.17 | 2025-12-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-858251 | SSA-858251: Authentication Bypass Vulnerabilities in OPC UA | 2025-03-11T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-832273 | SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-827968 | SSA-827968: Vulnerability in Nozomi Guardian/CMC on RUGGEDCOM APE1808 Devices | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-698820 | SSA-698820: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.4 on RUGGEDCOM APE1808 Devices | 2024-07-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-693776 | SSA-693776: Multiple Vulnerabilities in Industrial Communication Devices based on SINEC OS before V3.2 | 2025-06-10T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-366067 | SSA-366067: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.1 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-365200 | SSA-365200: Google Chrome Type Confusion Vulnerability in Siemens Products | 2025-10-14T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-364175 | SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 | 2024-07-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-192617 | SSA-192617: Local Privilege Escalation Vulnerability in TeleControl Server Basic Before V3.1.2.4 | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-014678 | SSA-014678: Authorization Bypass Vulnerability in Industrial Edge Device Kit | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-001536 | SSA-001536: Authorization Bypass Vulnerability in Siemens Industrial Edge Devices | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-512988 | SSA-512988: File Parsing Vulnerability in Simcenter Femap Before V2512 | 2025-12-12T00:00:00Z | 2025-12-12T00:00:00Z |
| ssa-915282 | SSA-915282: Denial of service Vulnerability in Interniche IP-Stack based Industrial Devices | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-882673 | SSA-882673: Multiple Vulnerabilities in SINEC Security Monitor before V4.10.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-800126 | SSA-800126: Deserialization Vulnerability in Siemens Engineering Platforms before V20 | 2024-12-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-763474 | SSA-763474: Denial of Service Vulnerability in Ruggedcom ROS devices before V5.10.1 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-734261 | SSA-734261: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-723487 | SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products | 2024-07-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-693808 | SSA-693808: Deserialization Vulnerability in Siemens Engineering Platforms | 2025-08-12T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-673996 | SSA-673996: Buffer Overflow Vulnerability in Third-Party Component in SICAM and SITIPE Products | 2024-09-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-626856 | SSA-626856: Multiple Vulnerabilities in SINEMA Remote Connect Sever Before V3.2 SP4 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-493396 | SSA-493396: Deserialization Vulnerability in Siemens Engineering Platforms | 2025-08-12T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-471761 | SSA-471761: Multiple Vulnerabilities in SICAM T Before V3.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-420375 | SSA-420375: Improper Integrity Check of Firmware Updates in Building X - Security Manager Edge Controller (ACC-AP) | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1209-1 | Security update for bind | 2026-04-08T07:12:41Z | 2026-04-08T07:12:41Z |
| suse-su-2026:1208-1 | Security update for ignition | 2026-04-08T07:12:23Z | 2026-04-08T07:12:23Z |
| suse-su-2026:1095-1 | Security update for vim | 2026-04-07T14:35:54Z | 2026-04-07T14:35:54Z |
| suse-su-2026:0910-1 | Security update for vim | 2026-04-07T14:35:08Z | 2026-04-07T14:35:08Z |
| suse-su-2026:1206-1 | Security update for python | 2026-04-07T14:18:48Z | 2026-04-07T14:18:48Z |
| suse-su-2026:1203-1 | Security update for ImageMagick | 2026-04-07T12:24:55Z | 2026-04-07T12:24:55Z |
| suse-su-2026:1202-1 | Security update for ImageMagick | 2026-04-07T12:24:42Z | 2026-04-07T12:24:42Z |
| suse-su-2026:1201-1 | Security update for ImageMagick | 2026-04-07T12:24:24Z | 2026-04-07T12:24:24Z |
| suse-su-2026:1200-1 | Security update for ignition | 2026-04-07T11:50:19Z | 2026-04-07T11:50:19Z |
| suse-su-2026:20969-1 | Security update for polkit | 2026-04-07T11:50:03Z | 2026-04-07T11:50:03Z |
| suse-su-2026:1199-1 | Security update for python-PyJWT | 2026-04-07T10:25:37Z | 2026-04-07T10:25:37Z |
| suse-su-2026:1198-1 | Security update for ignition | 2026-04-07T10:25:22Z | 2026-04-07T10:25:22Z |
| suse-su-2026:1197-1 | Security update for ignition | 2026-04-07T10:25:02Z | 2026-04-07T10:25:02Z |
| suse-su-2026:1195-1 | Security update for google-cloud-sap-agent | 2026-04-07T09:25:22Z | 2026-04-07T09:25:22Z |
| suse-su-2026:1194-1 | Security update for google-cloud-sap-agent | 2026-04-07T09:25:07Z | 2026-04-07T09:25:07Z |
| suse-su-2026:1193-1 | Security update for gimp | 2026-04-07T08:40:15Z | 2026-04-07T08:40:15Z |
| suse-su-2026:1192-1 | Security update for python-pyOpenSSL | 2026-04-07T08:39:34Z | 2026-04-07T08:39:34Z |
| suse-su-2026:1191-1 | Security update for avahi | 2026-04-06T10:53:58Z | 2026-04-06T10:53:58Z |
| suse-su-2026:1189-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise 15 SP7) | 2026-04-05T10:34:20Z | 2026-04-05T10:34:20Z |
| suse-su-2026:1188-1 | Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 2026-04-05T10:34:17Z | 2026-04-05T10:34:17Z |
| suse-su-2026:1187-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise 15 SP7) | 2026-04-05T10:04:24Z | 2026-04-05T10:04:24Z |
| suse-su-2026:20997-1 | Security update for cockpit-repos | 2026-04-05T03:01:00Z | 2026-04-05T03:01:00Z |
| suse-su-2026:20973-1 | Security update for cockpit-repos | 2026-04-05T03:01:00Z | 2026-04-05T03:01:00Z |
| suse-su-2026:20967-1 | Security update for cockpit-repos | 2026-04-05T03:01:00Z | 2026-04-05T03:01:00Z |
| suse-su-2026:1185-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise 15 SP7) | 2026-04-03T16:41:59Z | 2026-04-03T16:41:59Z |
| suse-su-2026:1180-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise 15 SP7) | 2026-04-03T16:41:43Z | 2026-04-03T16:41:43Z |
| suse-su-2026:1179-1 | Security update for libsoup2 | 2026-04-02T15:08:33Z | 2026-04-02T15:08:33Z |
| suse-su-2026:1177-1 | Security update for tar | 2026-04-02T15:00:45Z | 2026-04-02T15:00:45Z |
| suse-su-2026:1174-1 | Security update for LibVNCServer | 2026-04-02T12:43:24Z | 2026-04-02T12:43:24Z |
| suse-su-2026:1173-1 | Security update for LibVNCServer | 2026-04-02T12:43:10Z | 2026-04-02T12:43:10Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:5930 | Important: firefox security update | 2026-03-26T00:00:00Z | 2026-03-30T11:00:48Z |
| alsa-2026:6037 | Moderate: kernel security update | 2026-03-30T00:00:00Z | 2026-03-30T10:55:07Z |
| alsa-2026:6036 | Moderate: kernel-rt security update | 2026-03-30T00:00:00Z | 2026-03-30T10:51:16Z |
| alsa-2026:5932 | Important: firefox security update | 2026-03-26T00:00:00Z | 2026-03-30T10:46:04Z |
| alsa-2026:5931 | Important: firefox security update | 2026-03-26T00:00:00Z | 2026-03-30T10:43:43Z |
| alsa-2026:5913 | Moderate: ncurses security update | 2026-03-26T00:00:00Z | 2026-03-27T10:30:59Z |
| alsa-2026:5939 | Important: freerdp security update | 2026-03-26T00:00:00Z | 2026-03-27T10:28:32Z |
| alsa-2026:5941 | Important: golang security update | 2026-03-26T00:00:00Z | 2026-03-27T10:26:32Z |
| alsa-2026:5942 | Important: golang security update | 2026-03-26T00:00:00Z | 2026-03-27T10:17:44Z |
| alsa-2026:5599 | Moderate: nginx security update | 2026-03-24T00:00:00Z | 2026-03-26T13:22:57Z |
| alsa-2026:5581 | Moderate: nginx:1.24 security update | 2026-03-24T00:00:00Z | 2026-03-26T13:17:49Z |
| alsa-2026:5578 | Moderate: virt:rhel and virt-devel:rhel security update | 2026-03-24T00:00:00Z | 2026-03-26T13:09:57Z |
| alsa-2026:5640 | Moderate: mysql:8.4 security update | 2026-03-24T00:00:00Z | 2026-03-26T11:56:07Z |
| alsa-2026:5513 | Moderate: 389-ds:1.4 security update | 2026-03-24T00:00:00Z | 2026-03-26T11:22:25Z |
| alsa-2026:5580 | Moderate: mysql:8.0 security update | 2026-03-24T00:00:00Z | 2026-03-26T11:12:21Z |
| alsa-2026:5585 | Moderate: gnutls security update | 2026-03-24T00:00:00Z | 2026-03-26T11:01:10Z |
| alsa-2026:5587 | Moderate: opencryptoki security update | 2026-03-24T00:00:00Z | 2026-03-26T10:48:17Z |
| alsa-2026:5588 | Moderate: python3 security update | 2026-03-24T00:00:00Z | 2026-03-26T10:36:35Z |
| alsa-2026:5602 | Moderate: vim security update | 2026-03-24T00:00:00Z | 2026-03-26T10:18:47Z |
| alsa-2026:5603 | Moderate: opencryptoki security update | 2026-03-24T00:00:00Z | 2026-03-26T10:00:53Z |
| alsa-2026:5113 | Important: gimp:2.8 security update | 2026-03-19T00:00:00Z | 2026-03-20T13:31:59Z |
| alsa-2026:5145 | Important: yggdrasil-worker-package-manager security update | 2026-03-19T00:00:00Z | 2026-03-20T07:40:23Z |
| alsa-2026:5146 | Important: yggdrasil security update | 2026-03-19T00:00:00Z | 2026-03-20T07:36:24Z |
| alsa-2026:4759 | Moderate: kernel security update | 2026-03-17T00:00:00Z | 2026-03-20T07:32:09Z |
| alsa-2026:5063 | Important: libarchive security update | 2026-03-19T00:00:00Z | 2026-03-20T07:26:23Z |
| alsa-2026:5080 | Important: libarchive security update | 2026-03-19T00:00:00Z | 2026-03-20T07:21:56Z |
| alsa-2026:4715 | Moderate: vim security update | 2026-03-17T00:00:00Z | 2026-03-20T07:17:19Z |
| alsa-2026:4898 | Important: capstone security update | 2026-03-18T00:00:00Z | 2026-03-19T15:08:06Z |
| alsa-2026:4828 | Moderate: mysql security update | 2026-03-17T00:00:00Z | 2026-03-19T15:05:35Z |
| alsa-2026:4717 | Moderate: opencryptoki security update | 2026-03-17T00:00:00Z | 2026-03-19T15:03:25Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| hsec-2023-0003 | code injection in xmonad-contrib | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0002 | Improper Verification of Cryptographic Signature | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0001 | Hash flooding vulnerability in aeson | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-312 | Heap-buffer-overflow in dhcp_reply | 2022-04-07T00:00:40.457052Z | 2026-04-07T14:18:25.731015Z |
| osv-2021-1135 | Heap-use-after-free in prvTidyInsertedToken | 2021-08-16T00:01:09.422775Z | 2026-04-05T14:14:03.564509Z |
| osv-2026-532 | Heap-buffer-overflow in regsub | 2026-04-05T00:06:36.291055Z | 2026-04-05T00:06:36.291504Z |
| osv-2022-394 | Incorrect-function-pointer-type in cv::split | 2022-05-04T00:00:27.326853Z | 2026-04-04T14:23:39.520277Z |
| osv-2024-451 | Use-of-uninitialized-value in XpackDynamicTable::_make_space | 2024-05-08T00:14:48.544622Z | 2026-04-03T14:17:40.819969Z |
| osv-2026-518 | Use-of-uninitialized-value in ne_read_block | 2026-04-03T00:21:06.950773Z | 2026-04-03T00:21:06.951035Z |
| osv-2026-514 | Heap-buffer-overflow in format_expand1 | 2026-04-03T00:09:42.155641Z | 2026-04-03T00:09:42.155954Z |
| osv-2026-512 | Heap-buffer-overflow in g_utf8_get_char | 2026-04-03T00:07:59.707776Z | 2026-04-03T00:07:59.708039Z |
| osv-2022-679 | Heap-buffer-overflow in udiv | 2022-08-07T00:01:59.645310Z | 2026-04-02T14:16:23.664099Z |
| osv-2022-652 | Use-of-uninitialized-value in udiv | 2022-07-29T00:02:04.321859Z | 2026-04-02T14:15:47.876263Z |
| osv-2022-599 | Use-of-uninitialized-value in mrb_bint_as_int | 2022-07-20T00:00:11.865502Z | 2026-04-02T14:15:08.602041Z |
| osv-2026-504 | Heap-use-after-free in ObjectStream::getObject | 2026-04-02T00:16:28.228723Z | 2026-04-02T00:16:28.229037Z |
| osv-2022-834 | Heap-use-after-free in mk_event_timeout_destroy | 2022-09-04T00:00:31.605787Z | 2026-04-01T14:27:59.352404Z |
| osv-2022-937 | Use-after-poison in rx_ip | 2022-09-23T00:02:21.434097Z | 2026-04-01T14:27:42.367988Z |
| osv-2022-1277 | Heap-use-after-free in mk_event_timeout_destroy | 2023-06-26T14:01:01.876870Z | 2026-04-01T14:23:09.019013Z |
| osv-2022-1201 | Stack-buffer-overflow in msc_zero_object | 2022-11-24T13:00:10.344351Z | 2026-03-31T14:04:55.969741Z |
| osv-2022-1188 | Stack-buffer-overflow in authentic_get_tagged_data | 2022-11-20T13:01:57.719130Z | 2026-03-31T14:04:55.181202Z |
| osv-2023-395 | Stack-buffer-overflow in sc_path_print | 2023-05-14T14:00:57.078498Z | 2026-03-31T14:04:53.759303Z |
| osv-2024-696 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-07-31T00:03:10.056663Z | 2026-03-30T14:18:48.684167Z |
| osv-2024-400 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-05-02T00:03:16.309384Z | 2026-03-30T14:18:22.305458Z |
| osv-2024-641 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-07-14T00:06:37.034414Z | 2026-03-30T14:18:20.625772Z |
| osv-2024-278 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-04-19T00:12:11.684954Z | 2026-03-30T14:17:53.191446Z |
| osv-2024-245 | Security exception in com.github.javaparser.ast.validator.TreeVisitorValidator.accept | 2024-04-08T00:11:03.595756Z | 2026-03-28T14:18:46.703731Z |
| osv-2022-776 | Heap-buffer-overflow in do_job | 2022-08-24T00:00:48.440951Z | 2026-03-28T14:13:55.545096Z |
| osv-2025-312 | Heap-buffer-overflow in ZSTD_decompressMultiFrame | 2025-05-02T00:14:14.459388Z | 2026-03-27T14:26:26.446866Z |
| osv-2023-606 | Heap-buffer-overflow in ZSTD_decompressMultiFrame | 2023-07-23T14:01:02.159160Z | 2026-03-27T14:21:24.837066Z |
| osv-2023-319 | Heap-buffer-overflow in ZSTD_decompressSequencesLong_bmi2 | 2023-04-16T14:01:58.406534Z | 2026-03-27T14:20:54.241339Z |
| osv-2022-675 | Heap-buffer-overflow in void RDKit::ParseV3000AtomProps<std::__1::vector<std::__1::basic_string_view<cha | 2022-08-06T00:00:51.363676Z | 2026-03-27T14:20:04.040838Z |
| osv-2021-1672 | Heap-buffer-overflow in blosc_d | 2021-12-12T00:01:29.747137Z | 2026-03-27T14:18:17.523662Z |
| osv-2022-1288 | Stack-buffer-overflow in bool SmilesParseOps::parser::parse_atom_props<std::__1::__wrap_iter<char const*> | 2024-11-04T00:16:22.516312Z | 2026-03-27T14:17:53.064285Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0073 | Panic in Standalone MAC Operations | 2026-03-04T12:00:00Z | 2026-03-27T05:55:06Z |
| rustsec-2025-0155 | `rands` was removed from crates.io for malicious code | 2025-02-10T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0124 | `bit-flags` was removed from crates.io for malicious code | 2023-12-22T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0123 | `hann-rs-service` was removed from crates.io for malicious code | 2023-11-18T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0122 | `winx-rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0121 | `libusb1-main` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0120 | `windows-service-rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0119 | `openvpn-plugin-rs` was removed from crates.io for malicious code | 2023-11-18T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0118 | `win_run_rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0117 | `tauri-winrt-notifications` was removed from crates.io for malicious code | 2023-11-20T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0116 | `registry-win` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0115 | `acceptxmr-rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0114 | `tiny-server` was removed from crates.io for malicious code | 2023-11-06T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0113 | `win-base64-rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0112 | `monero-rpc-rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0111 | `monero-api` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0110 | `postgresderive` was removed from crates.io for malicious code | 2023-08-18T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0109 | `win-crypto` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0108 | `tauri-win-rt-notification` was removed from crates.io for malicious code | 2023-11-20T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0107 | `lasso-rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0106 | `lfest-main` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0105 | `windowsservice` was removed from crates.io for malicious code | 2023-11-18T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0104 | `littest` was removed from crates.io for malicious code | 2023-11-06T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2025-0154 | `replit_ruspty` was removed from crates.io for malicious code | 2025-11-04T12:00:00Z | 2026-03-25T08:37:19Z |
| rustsec-2026-0049 | CRLs not considered authoritative by Distribution Point due to faulty matching logic | 2026-03-20T12:00:00Z | 2026-03-24T08:22:29Z |
| rustsec-2026-0072 | Missing Check for All-Zero X25519 Shared Secret | 2026-02-04T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0071 | Nonce Reuse in HPKE Context | 2026-02-05T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0070 | Panic When Opening or Sealing on Export-Only Context | 2026-02-11T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0069 | Incorrect Length Encoding on KDF Export | 2026-02-11T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0068 | tar-rs incorrectly ignores PAX size headers if header size is nonzero | 2026-03-19T12:00:00Z | 2026-03-23T09:31:59Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-jupyterhub-2026-33709 | JupyterHub has an Open Redirect Vulnerability | 2026-04-08T08:40:42.508Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-33375 | Grafana MSSQL Data Source Plugin: Restriction Bypass Leading to OOM DoS | 2026-04-01T08:41:17.463Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-28375 | Grafana Testdata datasource can issue unbounded memory allocations | 2026-04-01T08:41:15.363Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27880 | OpenFeature evaluation API reads input data with no bounds | 2026-04-01T08:41:13.459Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27879 | Query resampling can cause unbounded memory allocations | 2026-04-01T08:41:11.477Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27877 | Public dashboards discloses all direct mode datasources | 2026-04-01T08:41:09.536Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27876 | RCE on Grafana via sqlExpressions | 2026-04-01T08:41:07.673Z | 2026-04-08T09:14:18.943Z |
| bit-discourse-2026-33415 | Discourse: Improper Access Control in discourse-ai Allows Unauthorized Category Content Exposure | 2026-04-07T08:44:29.473Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33300 | Discourse: Hidden group names and access metadata are exposed to moderators through the `category-chatables` endpoint | 2026-04-07T08:44:13.358Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33185 | Discourse: Group SMTP test endpoint susceptible to SSRF | 2026-04-07T08:44:07.641Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33074 | Discourse: Vulnerability in discourse-subscriptions plugin allowing users to self-grant to higher tier subscriptions | 2026-04-07T08:44:05.677Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33073 | discourse-subscriptions plugin leaking stripe API key in multisite environment | 2026-04-07T08:44:03.688Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32951 | Discourse: Authorization bypass in oneboxer via user-controlled category id | 2026-04-07T08:44:01.614Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32620 | Discourse: Missing post-level authorization allows whisper metadata disclosure | 2026-04-07T08:43:59.465Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32619 | Discourse: Insufficient topic visibility check allows unauthorized poll manipulation in private categories | 2026-04-07T08:43:57.232Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32618 | Discourse: Unauthorized channel membership inference via excluded_memberships_channel_id | 2026-04-07T08:43:55.159Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32615 | Discourse: Category group moderators can perform actions on topics in restricted categories without read access | 2026-04-07T08:43:53.093Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32607 | Discourse: Stored XSS via unescaped assignee name | 2026-04-07T08:43:50.897Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32273 | Discourse: XSS on category description update via API | 2026-04-07T08:43:48.997Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32243 | Discourse: Stored XSS in discourse-ai shared conversations onebox | 2026-04-07T08:43:46.857Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32143 | Discourse: Admin-only report can be exported by moderators | 2026-04-07T08:43:44.810Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32113 | Discourse: Open redirect via `sso_destination_url` cookie in `enter` | 2026-04-07T08:43:40.581Z | 2026-04-07T09:14:25.218Z |
| bit-parse-2026-34784 | Parse Server: Streaming file download bypasses afterFind file trigger authorization | 2026-04-06T14:49:38.726Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34595 | Parse Server: LiveQuery protected-field guard bypass via array-like logical operator value | 2026-04-06T14:49:36.710Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34574 | Parse Server: Session field immutability bypass via falsy-value guard | 2026-04-06T14:49:34.810Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34573 | Parse Server: GraphQL complexity validator exponential fragment traversal DoS | 2026-04-06T14:49:33.069Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34532 | Parse Server: Cloud function validator bypass via prototype chain traversal | 2026-04-06T14:49:31.298Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34373 | Parse Server: GraphQL API endpoint ignores CORS origin restriction | 2026-04-06T14:49:29.676Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34363 | Parse Server: LiveQuery protected field leak via shared mutable state across concurrent subscribers | 2026-04-06T14:49:27.983Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34224 | Parse Server: MFA single-use token bypass via concurrent authData login requests | 2026-04-06T14:49:26.245Z | 2026-04-06T15:13:09.641Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-bk17545 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-07T00:38:33.362093Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-aj47488 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-04-07T00:40:03.631106Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-fe32006 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-07T00:41:34.518345Z | 2026-04-06T06:37:58Z |
| cleanstart-2026-dp59378 | In libexpat before 2 | 2026-04-07T00:42:33.537935Z | 2026-04-06T06:37:58Z |
| cleanstart-2026-ob18608 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T06:19:25.639311Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-kf75900 | In libexpat before 2 | 2026-04-06T06:20:25.150640Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-jl41223 | In libexpat before 2 | 2026-04-06T06:19:55.229801Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-jg79570 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T06:19:24.747052Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-dz75075 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-06T06:19:24.775093Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-nu19941 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 5.19.3-r1 | 2026-04-06T02:44:20.354882Z | 2026-04-03T13:09:27Z |
| cleanstart-2026-kt07616 | Security fixes for CVE-2026-22735, CVE-2026-22737 applied in versions: 6.2.3-r0 | 2026-04-06T02:44:27.120329Z | 2026-04-03T13:09:27Z |
| cleanstart-2026-kt25851 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-61732, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.87.0-r0, 0.87.0-r1, 0.88.0-r1 | 2026-04-06T02:44:54.790204Z | 2026-04-03T08:04:33Z |
| cleanstart-2026-dq17669 | Security fixes for CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-32287, CVE-2026-33186, CVE-2026-33762, CVE-2026-34165, ghsa-37cx-329c-33x3, ghsa-6g7g-w4f8-9c9x, ghsa-fw7p-63qq-7hpr applied in versions: 1.13.2-r0, 1.14.1-r0, 1.14.1-r1 | 2026-04-06T02:45:34.659600Z | 2026-04-03T07:13:53Z |
| cleanstart-2026-ml41879 | Security fixes for CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-32287, CVE-2026-33186, CVE-2026-33762, CVE-2026-34165, ghsa-37cx-329c-33x3, ghsa-6g7g-w4f8-9c9x, ghsa-fw7p-63qq-7hpr applied in versions: 1.13.2-r0, 1.14.0-r0, 1.14.0-r1, 1.14.1-r0 | 2026-04-06T02:45:36.057138Z | 2026-04-03T07:11:16Z |
| cleanstart-2026-nd57973 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T02:45:57.693609Z | 2026-04-03T07:10:19Z |
| cleanstart-2026-lr09759 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-06T02:46:06.138686Z | 2026-04-03T07:10:19Z |
| cleanstart-2026-li54613 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T02:45:58.881296Z | 2026-04-03T07:10:19Z |
| cleanstart-2026-dm62512 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.35.0-r0 | 2026-04-06T02:48:21.440386Z | 2026-04-03T06:57:54Z |
| cleanstart-2026-lc01167 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-p77j-4mvh-x3m3 applied in versions: 8.4.0-r0, 8.4.0-r1, 8.4.0-r2 | 2026-04-06T02:48:42.431061Z | 2026-04-03T06:52:41Z |
| cleanstart-2026-gm09342 | Security fixes for CVE-2025-68121, CVE-2026-26958, ghsa-fw7p-63qq-7hpr, ghsa-mqqf-5wvp-8fh8 applied in versions: 0.29.0-r0, 0.29.0-r1 | 2026-04-06T02:48:25.848581Z | 2026-04-03T06:51:44Z |
| cleanstart-2026-hl08143 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-06T02:48:38.996528Z | 2026-04-03T06:50:37Z |
| cleanstart-2026-gn22652 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq applied in versions: 3.7.2-r4, 3.7.2-r5 | 2026-04-06T02:48:55.605608Z | 2026-04-03T06:50:37Z |
| cleanstart-2026-dm25112 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T02:48:32.316783Z | 2026-04-03T06:50:37Z |
| cleanstart-2026-ny32236 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T02:49:48.749661Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-io43826 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T02:49:47.698715Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-an95970 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-06T02:49:57.502118Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-ag21538 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-06T02:50:01.578746Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-ip72442 | Security fixes for CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1 | 2026-04-06T02:52:00.185166Z | 2026-04-01T14:41:16Z |
| cleanstart-2026-nb78893 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-64715, CVE-2025-68119, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, CVE-2026-33726 applied in versions: 0.13.3-r0, 0.13.3-r1 | 2026-04-06T02:52:24.792809Z | 2026-04-01T13:08:16Z |
| cleanstart-2026-mq18886 | Security fixes for CVE-2026-22735, CVE-2026-22737 applied in versions: 6.2.3-r0 | 2026-04-06T02:52:03.544300Z | 2026-04-01T11:39:45Z |
| ID | Description | Updated |
|---|---|---|
| ts-2023-001 | TS-2023-001 | 2023-01-17T00:00 |
| ts-2022-005 | TS-2022-005 | 2022-11-21T00:00 |
| ts-2022-004 | TS-2022-004 | 2022-11-21T00:00 |
| ts-2022-003 | TS-2022-003 | 2022-06-14T00:00 |
| ts-2022-002 | TS-2022-002 | 2022-05-11T00:00 |
| ts-2022-001 | TS-2022-001 | 2022-02-07T00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-ale-001 | [Mà J] Vulnérabilité dans les produits Ivanti | 2025-01-09T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| CERTFR-2025-ALE-002 | [Mà J] Vulnérabilité dans les produits Fortinet | 2025-05-07T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| CERTFR-2025-ALE-001 | [Mà J] Vulnérabilité dans les produits Ivanti | 2025-01-09T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| certfr-2024-ale-014 | [Mà J] Multiples vulnérabilités dans Fortinet FortiManager | 2024-10-30T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| certfr-2024-ale-013 | Exploitations de vulnƩrabilitƩs dans Ivanti Cloud Services Appliance (CSA) | 2025-03-31T00:00:00.000000 | 2024-10-25T00:00:00.000000 |
| CERTFR-2024-ALE-014 | [Mà J] Multiples vulnérabilités dans Fortinet FortiManager | 2024-10-30T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| CERTFR-2024-ALE-013 | Exploitations de vulnƩrabilitƩs dans Ivanti Cloud Services Appliance (CSA) | 2025-03-31T00:00:00.000000 | 2024-10-25T00:00:00.000000 |
| certfr-2024-ale-015 | [Mà J] Multiples vulnérabilités sur l'interface d'administration des équipements Palo Alto Networks | 2024-11-15T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| CERTFR-2024-ALE-015 | [Mà J] Multiples vulnérabilités sur l'interface d'administration des équipements Palo Alto Networks | 2024-11-15T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| certfr-2024-ale-012 | [Mà J] Vulnérabilités affectant OpenPrinting CUPS | 2024-09-27T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-011 | VulnƩrabilitƩ dans SonicWall | 2024-09-10T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| CERTFR-2024-ALE-012 | [Mà J] Vulnérabilités affectant OpenPrinting CUPS | 2024-09-27T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| CERTFR-2024-ALE-011 | VulnƩrabilitƩ dans SonicWall | 2024-09-10T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-010 | Multiples vulnƩrabilitƩs dans Roundcube | 2024-08-09T00:00:00.000000 | 2024-10-07T00:00:00.000000 |
| certfr-2024-ale-009 | VulnƩrabilitƩ dans OpenSSH | 2024-07-01T00:00:00.000000 | 2024-07-03T00:00:00.000000 |
| CERTFR-2024-ALE-010 | Multiples vulnƩrabilitƩs dans Roundcube | 2024-08-09T00:00:00.000000 | 2024-10-07T00:00:00.000000 |
| CERTFR-2024-ALE-009 | VulnƩrabilitƩ dans OpenSSH | 2024-07-01T00:00:00.000000 | 2024-07-03T00:00:00.000000 |
| certfr-2024-ale-008 | [Mà J] Vulnérabilité dans les produits Check Point | 2024-05-30T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-007 | Multiples vulnƩrabilitƩs dans les produits Cisco | 2024-04-25T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-006 | [Mà J] Vulnérabilité dans Palo Alto Networks GlobalProtect | 2024-04-12T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-004 | [Mà J] Vulnérabilité dans Fortinet FortiOS | 2024-02-09T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-008 | [Mà J] Vulnérabilité dans les produits Check Point | 2024-05-30T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-007 | Multiples vulnƩrabilitƩs dans les produits Cisco | 2024-04-25T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-006 | [Mà J] Vulnérabilité dans Palo Alto Networks GlobalProtect | 2024-04-12T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-004 | [Mà J] Vulnérabilité dans Fortinet FortiOS | 2024-02-09T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-005 | [Mà J] Vulnérabilité dans Microsoft Outlook | 2024-02-15T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-003 | [MĆ J] Incident affectant les solutions AnyDesk | 2024-02-05T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-001 | [Mà J] Multiples vulnérabilités dans Ivanti Connect Secure et Policy Secure Gateways | 2024-01-11T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| CERTFR-2024-ALE-005 | [Mà J] Vulnérabilité dans Microsoft Outlook | 2024-02-15T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| CERTFR-2024-ALE-003 | [MĆ J] Incident affectant les solutions AnyDesk | 2024-02-05T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0395 | Multiples vulnƩrabilitƩs dans les produits IBM | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0394 | Multiples vulnƩrabilitƩs dans VMware Tanzu | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0393 | VulnƩrabilitƩ dans Synology Mail Station | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0392 | Multiples vulnƩrabilitƩs dans Microsoft Edge | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0391 | Multiples vulnƩrabilitƩs dans OpenSSH | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0390 | Multiples vulnƩrabilitƩs dans Belden NetModule Router Software | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0389 | VulnƩrabilitƩ dans Microsoft Azure Linux | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0388 | Multiples vulnƩrabilitƩs dans les produits Cisco | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0387 | Multiples vulnƩrabilitƩs dans les produits Netgate | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0386 | Multiples vulnƩrabilitƩs dans les produits Microsoft | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| certfr-2026-avi-0385 | Multiples vulnƩrabilitƩs dans Google Chrome | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| certfr-2026-avi-0384 | Multiples vulnƩrabilitƩs dans Joomla! | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| certfr-2026-avi-0383 | Multiples vulnƩrabilitƩs dans Sonicwall Email Security | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| certfr-2026-avi-0382 | Multiples vulnƩrabilitƩs dans les produits FoxIT | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0381 | Multiples vulnƩrabilitƩs dans les produits Microsoft | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0380 | Multiples vulnƩrabilitƩs dans Microsoft Edge | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0379 | VulnƩrabilitƩ dans Elastic OpenTelemetry Java | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0378 | VulnƩrabilitƩ dans Symantec Data Loss Prevention (DLP) | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0377 | Multiples vulnƩrabilitƩs dans Papercut | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0376 | Multiples vulnƩrabilitƩs dans les produits Microsoft | 2026-03-30T00:00:00.000000 | 2026-03-30T00:00:00.000000 |
| certfr-2026-avi-0375 | Multiples vulnƩrabilitƩs dans Microsoft Edge | 2026-03-30T00:00:00.000000 | 2026-03-30T00:00:00.000000 |
| certfr-2026-avi-0374 | VulnƩrabilitƩ dans Docker Desktop | 2026-03-30T00:00:00.000000 | 2026-03-30T00:00:00.000000 |
| certfr-2026-avi-0372 | Multiples vulnƩrabilitƩs dans les produits IBM | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0371 | Multiples vulnƩrabilitƩs dans le noyau Linux d'Ubuntu | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0370 | Multiples vulnƩrabilitƩs dans le noyau Linux de Red Hat | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0369 | Multiples vulnƩrabilitƩs dans le noyau Linux de SUSE | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0368 | VulnƩrabilitƩ dans les produits Microsoft | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0367 | Multiples vulnƩrabilitƩs dans Zabbix | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0366 | Multiples vulnƩrabilitƩs dans Traefik | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0365 | Multiples vulnƩrabilitƩs dans Spring AI | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-000036 | Improper file access permission settings in multiple Digital Arts products | 2026-03-09T14:57+09:00 | 2026-03-09T16:23+09:00 |
| jvndb-2026-000035 | Installer for Qsee Client may insecurely load Dynamic Link Libraries | 2026-03-09T14:57+09:00 | 2026-03-09T14:57+09:00 |
| jvndb-2026-006102 | Security issues in ESC/POS | 2026-03-06T10:31+09:00 | 2026-03-06T10:31+09:00 |
| jvndb-2026-000034 | django-allauth vulnerable to open redirect | 2026-03-05T12:36+09:00 | 2026-03-05T12:36+09:00 |
| jvndb-2026-000033 | EC-CUBE vulnerable to multi-factor authentication bypass | 2026-03-05T12:36+09:00 | 2026-03-05T12:36+09:00 |
| jvndb-2026-000032 | Multiple vulnerabilities in Dell UPS Multi-UPS Management Console (MUMC) | 2026-03-04T12:20+09:00 | 2026-03-04T12:20+09:00 |
| jvndb-2026-005746 | Multiple vulnerabilities in Trend Micro Endpoint security products for enterprises (February 2026) | 2026-03-04T10:40+09:00 | 2026-03-04T10:40+09:00 |
| jvndb-2026-005744 | Canon IJ Scan Utility registers Windows services with unquoted file paths | 2026-03-04T10:40+09:00 | 2026-03-04T10:40+09:00 |
| jvndb-2026-000030 | IM-LogicDesigner module of intra-mart Accel Platform vulnerable to untrusted data deserialization | 2026-02-27T15:41+09:00 | 2026-03-03T10:06+09:00 |
| jvndb-2026-005259 | Out-of-bounds write vulnerability in Fujitsu BIOS Driver (fbiosdrv.sys) | 2026-03-02T11:46+09:00 | 2026-03-02T11:46+09:00 |
| jvndb-2026-000031 | Improper file access permission settings in the installers for multiple Soliton Systems products | 2026-02-27T15:41+09:00 | 2026-02-27T15:41+09:00 |
| jvndb-2026-000029 | Multiple vulnerabilities in the installer of FinalCode Client | 2026-02-26T14:24+09:00 | 2026-02-26T14:24+09:00 |
| jvndb-2026-004811 | Vulnerability in Hitachi Configuration Manager and Hitachi Ops Center API Configuration Manager | 2026-02-26T11:02+09:00 | 2026-02-26T11:02+09:00 |
| jvndb-2026-004810 | Vulnerability in Hitachi Configuration Manager and Hitachi Ops Center API Configuration Manager | 2026-02-26T11:02+09:00 | 2026-02-26T11:02+09:00 |
| jvndb-2026-000026 | Lanscope Endpoint Manager (On-Premises) vulnerable to path traversal | 2026-02-25T15:14+09:00 | 2026-02-25T15:14+09:00 |
| jvndb-2026-004359 | Security information for Hitachi Disk Array Systems | 2026-02-20T18:35+09:00 | 2026-02-20T18:35+09:00 |
| jvndb-2026-000027 | WordPress Plugin "Survey Maker" vulnerable to cross-site scripting | 2026-02-20T12:32+09:00 | 2026-02-20T12:32+09:00 |
| jvndb-2026-000028 | Installer for Job log aggregation/analysis software RICOH Job Log Aggregation Tool may insecurely load Dynamic Link Libraries | 2026-02-20T12:31+09:00 | 2026-02-20T12:31+09:00 |
| jvndb-2026-003912 | Vulnerability in Cosminexus HTTP Server and Hitachi Web Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003911 | Vulnerability in Cosminexus HTTP Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003910 | Multiple Vulnerabilities in Cosminexus HTTP Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003909 | Multiple Vulnerabilities in Hitachi Command Suite products | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003908 | Multiple Vulnerabilities in Hitachi Command Suite, Hitachi Automation Director, Hitachi Configuration Manager, Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003907 | Multiple Vulnerabilities in JP1 | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003906 | Multiple Vulnerabilities in Cosminexus | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003905 | Multiple Vulnerabilities in Cosminexus HTTP Server and Hitachi Web Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-000025 | Joomla! CMS vulnerable to cross-site scripting | 2026-02-17T12:46+09:00 | 2026-02-17T12:46+09:00 |
| jvndb-2026-000023 | FileZen vulnerable to OS command injection | 2026-02-13T16:51+09:00 | 2026-02-13T17:08+09:00 |
| jvndb-2026-000024 | Installer of M-Audio M-Track Duo HD may insecurely load Dynamic Link Libraries | 2026-02-12T13:32+09:00 | 2026-02-12T13:32+09:00 |
| jvndb-2026-000022 | Oki Electric Industry products and OEM products register Windows services with unquoted file paths | 2026-02-09T15:21+09:00 | 2026-02-09T15:21+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-16049 | OpenClawååØęŖęę¼ę“ļ¼CNVD-2026-16049ļ¼ | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16048 | OpenClawååØęŖęę¼ę“ļ¼CNVD-2026-16048ļ¼ | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16047 | OpenClaw代ē ę§č”ę¼ę“ļ¼CNVD-2026-16047ļ¼ | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16046 | OpenClawå½ä»¤ę§č”ę¼ę“ļ¼CNVD-2026-16046ļ¼ | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16045 | OpenClawå®å Øē»čæę¼ę“ļ¼CNVD-2026-16045ļ¼ | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16044 | OpenClawęä½ē³»ē»å½ä»¤ę³Øå „ę¼ę“ļ¼CNVD-2026-16044ļ¼ | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16043 | OpenClawęä½ē³»ē»å½ä»¤ę³Øå „ę¼ę“ļ¼CNVD-2026-16043ļ¼ | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16042 | OpenClawč·Æå¾éåę¼ę“ļ¼CNVD-2026-16042ļ¼ | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16041 | OpenClaw访é®ę§å¶é误ę¼ę“ļ¼CNVD-2026-16041ļ¼ | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16040 | OpenClawč·Æå¾éåę¼ę“ļ¼CNVD-2026-16040ļ¼ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16039 | WordPressęä»¶Addon Jobsearch Chatč·Øē«čę¬ę¼ę“ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16038 | Linux kernelå åé误å¼ēØę¼ę“ļ¼CNVD-2026-16038ļ¼ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16037 | FreeBSDē¼å²åŗęŗ¢åŗę¼ę“ļ¼CNVD-2026-16037ļ¼ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16036 | Linux kernelåééę¾ę¼ę“ļ¼CNVD-2026-16036ļ¼ | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16035 | FreeRDPęē»ęå”ę¼ę“ļ¼CNVD-2026-16035ļ¼ | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16034 | FreeRDPč¶ē读åę¼ę“ļ¼CNVD-2026-16034ļ¼ | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16033 | FreeRDPå ē¼å²åŗęŗ¢åŗę¼ę“ļ¼CNVD-2026-16033ļ¼ | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16032 | FreeRDPåééę¾ę¼ę“ļ¼CNVD-2026-16032ļ¼ | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16031 | OpenBaoęęé®é¢ę¼ę“ | 2026-04-02 | 2026-04-03 |
| cnvd-2026-15865 | Delta Electronics COMMGR2å ę ē¼å²åŗęŗ¢åŗę¼ę“ | 2026-03-16 | 2026-04-02 |
| cnvd-2026-15864 | Delta Electronics COMMGR2ęē»ęå”ę¼ę“ | 2026-03-16 | 2026-04-02 |
| cnvd-2026-15863 | Advantech WISE-6610ęä½ē³»ē»å½ä»¤ę³Øå „ę¼ę“ | 2026-02-25 | 2026-04-02 |
| cnvd-2026-15862 | ZTE ZXCDN StrutsčæēØä»£ē ę§č”ę¼ę“ | 2025-10-17 | 2026-04-02 |
| cnvd-2026-15861 | ZTE ElasticNet UME R32 on Linuxęéē®”ēäøå½ę¼ę“ | 2025-11-28 | 2026-04-02 |
| cnvd-2026-15860 | Canva Affinityč¶ē读åę¼ę“ļ¼CNVD-2026-15860ļ¼ | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15859 | Canva Affinityč¶ē读åę¼ę“ļ¼CNVD-2026-15859ļ¼ | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15858 | Canva Affinityč¶ē读åę¼ę“ļ¼CNVD-2026-15858ļ¼ | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15857 | Canva Affinityē±»åę··ę·ę¼ę“ | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15856 | Canva Affinityč¶ē读åę¼ę“ļ¼CNVD-2026-15856ļ¼ | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15855 | Canva Affinityč¶ē读åę¼ę“ļ¼CNVD-2026-15855ļ¼ | 2026-03-26 | 2026-04-02 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01814 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммного Š¾Š±ŠµŃŠæŠµŃŠµŠ½ŠøŃ Microsoft ACI Confidential Containers, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń Ń Ń⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01813 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммного Š¾Š±ŠµŃŠæŠµŃŠµŠ½ŠøŃ Azure IoT Explorer, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń ŠæŃŠøŠ²Ńзкой Šŗ Š¾ŃŠŗŃŃŃŃŠ¼ ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01812 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŠ¾ŃŃŠ¾Š²Š¾Š³Š¾ ŃŠµŃŠ²ŠµŃŠ° Microsoft Exchange Server, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń Š¾ŃŠøŠ±ŠŗŠ°Š¼Šø ŠæŃŠµŠ“ŃŃŠ°Š²Š»ŠµŠ½Šøā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01811 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ»ŃŠ¶Š±Ń Š°Š½Š°Š»ŠøŃŠøŠŗŠø ГаннŃŃ Azure HDInsights, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń Š½ŠµŠæŃŠøŠ½ŃŃŠøŠµŠ¼ Š¼ŠµŃ ŠæŠ¾ Š·Š°ŃŠøŃ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01810 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠµŠ“Š°ŠŗŃŠ¾Ńа ŃŠ»ŠµŠŗŃŃŠ¾Š½Š½ŃŃ ŃŠ°Š±Š»ŠøŃ Microsoft Excel ŠæŠ°ŠŗŠµŃŠ¾Š² ŠæŃŠ¾Š³Ńамм Microsoft Office⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01809 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ»ŃŠ¶Š±Ń Ń ŃŠ°Š½ŠøŠ»ŠøŃа ГаннŃŃ Windows Storage Services Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01808 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠµŠ°Š»ŠøŠ·Š°ŃŠøŠø ŠæŃŠ¾Ńокола NTLM Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01807 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠøŃŃŠµŠ¼Ń Š°ŠæŠæŠ°ŃŠ°Ńной виŃŃŃŠ°Š»ŠøŠ·Š°ŃŠøŠø Hyper-V Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Windows, позволŃ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01806 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¼ŠµŃ Š°Š½ŠøŠ·Š¼Š° CCF (Cluster Client Failover) Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01805 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š“ŃŠ°Š¹Š²ŠµŃа HTTP.sys Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŠæŠ¾Š²ŃŃŠøŃŃ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01804 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ“ŃŠ° Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŠæŠ¾Š²ŃŃŠøŃŃ ŃŠ²Š¾Šø ŠæŃŠøŠ²ŠøŠ»ŠµŠ³ŠøŠø | 16.02.2026 | 16.02.2026 |
| bdu:2026-01803 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š“ŃŠ°Š¹Š²ŠµŃа WinSock Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŠæŠ¾Š²ŃŃŠøŃŃ ā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01802 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ“ŃŠ° Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŠæŠ¾Š²ŃŃŠøŃŃ ŃŠ²Š¾Šø ŠæŃŠøŠ²ŠøŠ»ŠµŠ³ŠøŠø | 16.02.2026 | 16.02.2026 |
| bdu:2026-01801 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š“ŃŠ°Š¹Š²ŠµŃа HTTP.sys Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŠæŠ¾Š²ŃŃŠøŃŃ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01800 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ“ŃŠ° Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŠæŠ¾Š²ŃŃŠøŃŃ ŃŠ²Š¾Šø ŠæŃŠøŠ²ŠøŠ»ŠµŠ³ŠøŠø | 16.02.2026 | 16.02.2026 |
| bdu:2026-01799 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ“ŃŠ° Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŃŠ°ŃŠŗŃŃŃŃ Š·Š°ŃŠøŃаемŃŃ Šøā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01798 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³ŃŠ°Š¼Š¼Ń Š“Š»Ń ŃŠøŃŃŠ¾Š²Š°Š½ŠøŃ ŠøŠ½ŃŠ¾ŃŠ¼Š°ŃŠøŠø Šø ŃŠ¾Š·Š“Š°Š½ŠøŃ ŃŠ»ŠµŠŗŃŃŠ¾Š½Š½ŃŃ ŃŠøŃŃŠ¾Š²ŃŃ ŠæŠ¾Š“ŠæŠøŃŠµŠ¹ G⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01797 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŃŠ½ŠŗŃŠøŠø _bfd_elf_slurp_version_tables() ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° bfd/elf.c ŠæŃŠ¾Š³Ńаммного ŃŃŠµŠ“⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01796 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° libbfd.c ŠæŃŠ¾Š³Ńаммного ŃŃŠµŠ“ŃŃŠ²Š° ŃŠ°Š·ŃŠ°Š±Š¾ŃŠŗŠø GNU Binutils, позволŃŃŃŠ°Ń⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01795 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммного ŃŃŠµŠ“ŃŃŠ²Š° ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ ŠŗŠ¾Š½ŠµŃŠ½Ńми ŃŠ¾Ńками Ivanti Endpoint Manager, ŃŠ²ā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01794 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŃŠ½ŠŗŃŠøŠø usbg_make_tpg() Š¼Š¾Š“ŃŠ»Ń drivers/usb/gadget/function/f_tcm.c Š“ŃŠ°Š¹Š²ŠµŃа га⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01792 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммного ŃŃŠµŠ“ŃŃŠ²Š° Š»Š¾ŠŗŠ°Š»ŃŠ½Š¾Š¹ инŃŃŠ°ŃŃŃŃŠŗŃŃŃŃ Azure Local, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń Š¾ŃŠøŠ±ŠŗŠ°ā¦ | 13.02.2026 | 16.02.2026 |
| bdu:2026-01727 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŃŠ½ŠŗŃŠøŠø Š¾ŃŠµŠ½ŠŗŠø ŠøŠ·Š±ŠøŃŠ°ŃŠµŠ»ŃŠ½Š¾ŃŃŠø ŃŠ°ŃŃŠøŃŠµŠ½ŠøŃ Intarray ŃŠøŃŃŠµŠ¼Ń ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ Š±Š°Š·Š°Š¼Šø Г⦠| 11.02.2026 | 16.02.2026 |
| bdu:2026-01726 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŃŠ½ŠŗŃŠøŠø Š¾Š±ŃŠ°Š±Š¾ŃŠŗŠø ŃŠøŠæŠ¾Š² ГаннŃŃ oidvector ŃŠøŃŃŠµŠ¼Ń ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ Š±Š°Š·Š°Š¼Šø ГаннŃŃ Post⦠| 11.02.2026 | 16.02.2026 |
| bdu:2026-01724 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° pg_trgm ŃŠøŃŃŠµŠ¼Ń ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ Š±Š°Š·Š°Š¼Šø ГаннŃŃ PostgreSQL, позволŃŃŃŠ°Ń на⦠| 11.02.2026 | 16.02.2026 |
| bdu:2026-01723 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠøŃŃŠµŠ¼Ń ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ Š±Š°Š·Š°Š¼Šø ГаннŃŃ PostgreSQL, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń Š½ŠµŠ²ŠµŃŠ½Ńм ŠøŠ½Š“ŠµŠŗŃŠøŃован⦠| 11.02.2026 | 16.02.2026 |
| bdu:2026-01722 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° pgcrypto ŃŠøŃŃŠµŠ¼Ń ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ Š±Š°Š·Š°Š¼Šø ГаннŃŃ PostgreSQL, позволŃŃŃŠ°Ń н⦠| 11.02.2026 | 16.02.2026 |
| bdu:2026-01017 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ“ŃŠ° Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Linux, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń Š²ŃŠæŠ¾Š»Š½ŠøŃŃ ŠæŃŠ¾ŠøŠ·Š²Š¾Š»ŃŠ½ŃŠ¹ коГ | 30.01.2026 | 16.02.2026 |
| bdu:2025-15831 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммного Š¾Š±ŠµŃŠæŠµŃŠµŠ½ŠøŃ Š“Š»Ń Š½Š°ŃŃŃŠ¾Š¹ŠŗŠø Š±ŠµŠ·Š¾ŠæŠ°ŃŠ½Š¾ŃŃŠø astra-safepolicy, ŃŠ²Ńзанна⦠| 15.12.2025 | 16.02.2026 |
| bdu:2025-15830 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° net ŃŠ“ŃŠ° Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Linux, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń Š²ŃŠ·Š²Š°ŃŃ⦠| 15.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202001-0832 | A Buffer Overflow vulnerability exists in the Message Server service _MsJ2EE_AddStatistic⦠| 2024-07-23T22:37:43.319000Z |
| var-201208-0222 | Multiple stack-based buffer overflows in msg_server.exe in SAP NetWeaver ABAP 7.x allow r⦠| 2024-07-23T22:37:43.393000Z |
| var-202108-1148 | An access issue was addressed with improved access restrictions. This issue is fixed in m⦠| 2024-07-23T22:36:01.656000Z |
| var-200202-0006 | Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause⦠| 2024-07-23T22:34:48.127000Z |
| var-202007-0395 | Advantech iView, versions 5.6 and prior, contains multiple SQL injection vulnerabilities ⦠| 2024-07-23T22:33:57.481000Z |
| var-201805-1147 | WPLSoft in Delta Electronics versions 2.45.0 and prior utilizes a fixed length heap buffe⦠| 2024-07-23T22:32:10.966000Z |
| var-201902-0647 | LCDS Laquis SCADA prior to version 4.1.0.4150 allows execution of script code by opening ⦠| 2024-07-23T22:32:09.990000Z |
| var-201908-0863 | Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain a USE⦠| 2024-07-23T22:30:33.144000Z |
| var-201912-0120 | A memory corruption issue was addressed with improved validation. This issue is fixed in ⦠| 2024-07-23T22:30:32.761000Z |
| var-201912-0114 | A memory corruption issue was addressed with improved validation. This issue is fixed in ⦠| 2024-07-23T22:30:32.792000Z |
| var-202305-1589 | D-Link DIR-2150 SetSysEmailSettings EmailTo Command Injection Remote Code Execution Vulne⦠| 2024-07-23T22:30:26.856000Z |
| var-202407-0235 | Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can res⦠| 2024-07-23T22:30:24.825000Z |
| var-202407-0234 | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data ⦠| 2024-07-23T22:30:24.699000Z |
| var-202407-0233 | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data ⦠| 2024-07-23T22:30:24.731000Z |
| var-202407-0232 | Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can res⦠| 2024-07-23T22:30:24.657000Z |
| var-201112-0097 | Stack-based buffer overflow in the CmpWebServer component in 3S CoDeSys 3.4 SP4 Patch 2 a⦠| 2024-07-23T22:29:05.132000Z |
| var-201801-0152 | An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions pri⦠| 2024-07-23T22:28:30.754000Z |
| var-201801-0151 | A Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior ⦠| 2024-07-23T22:28:30.640000Z |
| var-201807-0341 | ABB Panel Builder 800 all versions has an improper input validation vulnerability which m⦠| 2024-07-23T22:28:27.949000Z |
| var-201806-1058 | Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices befo⦠| 2024-07-23T22:28:27.641000Z |
| var-201906-1029 | In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulne⦠| 2024-07-23T22:28:26.009000Z |
| var-202004-0077 | There are multiple ways an unauthenticated attacker could perform SQL injection on WebAcc⦠| 2024-07-23T22:28:24.545000Z |
| var-202206-2050 | The affected product is vulnerable to multiple SQL injections, which may allow an unautho⦠| 2024-07-23T22:27:49.515000Z |
| var-202305-1981 | D-Link DIR-2150 SetSysEmailSettings AccountName Command Injection Remote Code Execution V⦠| 2024-07-23T22:27:44.287000Z |
| var-202305-0214 | D-Link DIR-2640 HNAP LoginPassword Authentication Bypass Vulnerability. This vulnerabilit⦠| 2024-07-23T22:27:44.496000Z |
| var-202305-0130 | D-Link DIR-2640 EmailFrom Command Injection Remote Code Execution Vulnerability. This vul⦠| 2024-07-23T22:27:44.522000Z |
| var-202407-0441 | A vulnerability has been identified in SIMATIC PCS 7 V9.1 (All versions), SIMATIC WinCC R⦠| 2024-07-23T22:27:41.577000Z |
| var-201105-0156 | Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 30⦠| 2024-07-23T22:25:52.955000Z |
| var-201402-0028 | The process_rs function in the router advertisement daemon (radvd) before 1.8.2, when Uni⦠| 2024-07-23T22:25:48.624000Z |
| var-201402-0027 | The process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows re⦠| 2024-07-23T22:25:48.742000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2022-046 | PHOENIX CONTACT: Multiple Linux component vulnerabilities in PLCnext Firmware | 2022-11-10T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-026 | PHOENIX CONTACT: Vulnerability in ProConOS/ProConOS eCLR SDK and MULTIPROG Engineering tool | 2022-06-21T05:16:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-025 | PHOENIX CONTACT: Vulnerability in classic line industrial controllers | 2022-06-21T05:15:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-014 | PHOENIX CONTACT: mGuard Device Manager affected by HTTP Request Smuggling of Apache Webserver | 2022-04-12T06:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-010 | PHOENIX CONTACT: Multiple Linux component vulnerabilities fixed in latest AXC F x152 LTS release | 2022-04-12T06:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-007 | PHOENIX CONTACT: Path Traversal in Library of PLCnext Technology Toolchain and FL Network Manager | 2022-03-22T07:43:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-005 | PHOENIX CONTACT: Vulnerabilities in XML parser library Expat (libexpat) | 2022-03-30T07:30:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-059 | PHOENIX CONTACT: BLUEMARK X1 / LED / CLED printers utilizing the Siemens Nucleus RTOS TCP/IP Stack | 2022-01-11T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-056 | WAGO: Multiple Vulnerabilities in CODESYS Runtime 2.3 and WebVisualisation | 2021-11-16T14:11:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-052 | PHOENIX CONTACT: PC Worx/-Express prone to improper input validation vulnerability | 2021-11-03T09:45:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-035 | PHOENIX CONTACT: FL MGUARD DM version 1.12.0 and 1.13.0 Improper Privilege Management | 2021-08-11T07:59:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-032 | PHOENIX CONTACT: Niche Ethernet Stack for ILC1x0, ILC1x1 and AXC 1050 Industrial controllers and CHARX control DC | 2021-08-04T07:57:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-026 | PHOENIX CONTACT: Denial-of-Service vulnerabilty in Emalytics, ILC 2050 BI and ILC 2050 BI-L | 2020-08-20T07:11:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-012 | PHOENIX CONTACT: Local Privilege Escalation in PC WORX SRT | 2020-03-27T09:47:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-001 | PHOENIX CONTACT: Emalytics Controller ILC 2050 BI(L) allows unauthorised read and write access to the configuration file | 2020-02-17T08:10:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2019-020 | PHOENIX CONTACT: improper access control exists on FL NAT devices when using MAC-based port security | 2019-10-29T10:56:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2019-009 | PHOENIX CONTACT: Multiple Vulnerabilities in AXC F 2152 | 2019-06-04T10:22:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2018-007 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series - Stack-based Buffer Overflow in shared object file | 2018-05-16T10:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2017-002 | PHOENIX CONTACT: mGuard device manager (mdm) multiple vulnerabilities in Java SE | 2017-09-07T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2017-001 | PHOENIX CONTACT: mGuard IKE daemon remote denial of service | 2017-03-07T11:05:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-003 | PHOENIX CONTACT: Multiple vulnerabilities in ENERGY AXC PU | 2023-03-14T09:14:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-058 | PHOENIX CONTACT: Profinet SDK libexpat vulnerabilities | 2022-12-13T07:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-053 | PHOENIX CONTACT: Advisory for TC ROUTER and CLOUD CLIENT | 2023-03-07T07:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-048 | PHOENIX CONTACT: Automationworx BCP File Parsing Vulnerabilities | 2022-11-15T09:25:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-028 | PHOENIX CONTACT: Missing Authentication in ProConOS/ProConOS eCLR SDK and MULTIPROG Engineering tool | 2022-06-21T05:18:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-013 | PHOENIX CONTACT: Multiple products affected by possible infinite loop within OpenSSL library | 2022-04-12T06:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2019-001 | PHOENIX CONTACT: Multiple Vulnerabilities in FL SWITCH 3xxx, 4xxx and 48xx | 2019-01-23T12:02:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2018-006 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series through 1.33 has a Stack-based Buffer Overflow | 2018-05-16T10:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2025-005 | Phoenix Contact: Security Advisory for ESL Stick USB-A | 2025-01-14T11:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2024-070 | Phoenix Contact: Security Advisory for CHARX-SEC3xxx Charge controllers | 2025-01-14T11:00:00.000Z | 2025-05-14T13:00:14.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2018-009 | Pepperl+Fuchs: Security advisory for MELTDOWN and SPECTRE attacks in ecom mobile Devices | 2018-07-06T14:47:00.000Z | 2018-10-23T10:00:00.000Z |
| vde-2017-005 | Pepperl+Fuchs / ecom instruments: WLAN enabled products utilizing WPA2 encryption | 2017-12-11T13:26:00.000Z | 2018-10-23T10:00:00.000Z |
| vde-2018-008 | Pepperl+Fuchs: Remote Code Execution Vulnerability in HMI Devices | 2018-07-06T13:37:00.000Z | 2018-07-06T13:37:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2020-036 | WAGO: Multiple Vulnerabilities in I/O-Check Service | 2021-06-29T10:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2020-044 | WAGO: Web-Based Management Authentication Vulnerability in WAGO 750-36X and WAGO 750-8XX | 2021-08-31T07:01:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-042 | WAGO: PLC families 750-88x and 750-352 prone to DoS attack, versions < FW10 (Update A) | 2020-10-27T10:28:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-029 | WAGO: XSS vulnerability in Web-UI in WAGO 750-88X and WAGO 750-89X | 2020-09-30T11:11:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-028 | WAGO: Authentication Bypass Vulnerability in WAGO 750-36X and WAGO 750-8XX Version <= FW03 | 2020-09-30T11:08:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-004 | WAGO: e!Cockpit cleartext communication and hardcoded key | 2020-03-09T09:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-038 | WAGO: OpenSSL DoS Vulnerability in PLCs | 2021-08-31T07:00:00.000Z | 2025-05-14T12:53:43.000Z |
| vde-2020-045 | WAGO: Command Injection Vulnerability in I/O-Check Service of multiple products | 2020-12-17T09:02:00.000Z | 2025-05-14T12:53:43.000Z |
| vde-2020-008 | WAGO: Cloud Connectivity Multiple Vulnerabilities | 2020-03-09T09:15:00.000Z | 2025-05-14T12:53:43.000Z |
| vde-2025-009 | WAGO: Vulnerabilities in CODESYS Control V3 - OPC UA Stack | 2025-02-04T11:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-043 | WAGO: Vulnerable WIBU-SYSTEMS Codemeter installed through e!COCKPIT and WAGO-I/O-Pro | 2021-08-31T07:02:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-013 | WAGO: Multiple Vulnerabilities in the Web-Based Management Interface | 2021-05-05T08:54:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-032 | WAGO: Vulnerable WIBU-SYSTEMS Codemeter installed through e!COCKPIT | 2020-09-09T06:23:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-027 | WAGO: Vulnerability in web-based authentication in WAGO 750-8XX Version <= FW07 | 2020-09-30T11:06:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-020 | WAGO: PPPD in PFC100 and PFC200 Series is vulnerable to CVE-2020-8597 | 2020-06-10T10:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-006 | WAGO: Web-Based Management Authentication Vulnerabilities | 2020-03-09T11:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-017 | WAGO: Series PFC100/PFC200 Information Disclosure | 2019-09-18T11:25:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2023-046 | WAGO: Multiple products vulnerable to local file inclusion | 2023-10-23T10:00:00.000Z | 2025-04-28T10:00:00.000Z |
| vde-2025-007 | WAGO: Year 2038 problem | 2025-04-15T10:00:00.000Z | 2025-04-15T10:00:00.000Z |
| vde-2025-004 | Wago: Vulnerability in libwagosnmp | 2025-03-05T11:00:00.000Z | 2025-04-10T13:00:00.000Z |
| vde-2024-072 | WAGO: Vulnerabilities in CODESYS Control | 2024-12-03T11:00:00.000Z | 2024-12-03T11:00:00.000Z |
| vde-2023-042 | Wago: Vulnerable WIBU-SYSTEMS Codemeter installed through e!COCKPIT and WAGO-I/O-Pro (UPDATE B) | 2023-09-25T10:00:00.000Z | 2024-11-20T11:00:00.000Z |
| vde-2023-006 | WAGO: Controller with CODESYS 2.3 Runtime Denial-of-Service | 2023-06-25T06:00:00.000Z | 2024-07-08T10:00:00.000Z |
| vde-2024-021 | WAGO: Vulnerability in WAGO Navigator | 2024-05-21T06:00:00.000Z | 2024-05-21T06:00:00.000Z |
| vde-2023-068 | WAGO: Multiple Vulnerabilities in e!Cockpit and e!Runtime / CODESYS Runtime | 2024-05-21T06:00:00.000Z | 2024-05-21T06:00:00.000Z |
| vde-2023-039 | Wago: Multiple vulnerabilities in web-based management of multiple products | 2024-03-13T08:30:00.000Z | 2024-03-13T08:30:00.000Z |
| vde-2024-007 | WAGO: WIBU-SYSTEMS CodeMeter Runtime vulnerabilities in multiple products | 2024-01-22T07:00:00.000Z | 2024-01-22T07:00:00.000Z |
| vde-2023-045 | Wago: Vulnerability in Smart Designer Web-Application | 2023-12-05T07:00:00.000Z | 2023-12-05T07:00:00.000Z |
| vde-2023-044 | Wago: Vulnerabilities in IEC61850 Server / Telecontrol | 2023-12-05T07:00:00.000Z | 2023-12-05T07:00:00.000Z |
| vde-2023-037 | WAGO: Remote Code execution vulnerability in managed Switches | 2023-11-21T07:00:00.000Z | 2023-11-21T07:00:00.000Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| GCVE-1-2025-0036 |
8.3 (4.0)
|
A reflected cross-site scripting (XSS) vulnerability w⦠|
misp |
misp |
2025-12-10T13:46:07.170083Z | 2025-12-10T13:46:07.170083Z |
| GCVE-1-2025-0035 |
8.3 (4.0)
|
Insufficient sanitization of bundle metadata (availabl⦠|
CIRCL |
vulnerability-lookup |
2025-12-08T10:25:00.000Z | 2025-12-08T12:14:06.307298Z |
| GCVE-1-2025-0034 |
7 (4.0)
|
Missing CSRF protection on state-changing endpoints in⦠|
CIRCL |
vulnerability-lookup |
2025-12-08T10:19:00.000Z | 2025-12-08T12:13:24.197294Z |
| GCVE-1-2025-0033 |
8.1 (4.0)
|
Vulnerability-lookup did not track or limit failed One⦠|
CIRCL |
vulnerability-lookup |
2025-12-08T10:11:00.000Z | 2025-12-08T12:12:53.235996Z |
| GCVE-1-2025-0032 |
10 (4.0)
|
The default configuration of WatchGuard Firebox device⦠|
watchguard |
firebox |
2025-12-03T16:25:00.000Z | 2025-12-19T13:48:34.570799Z |
| GCVE-1-2025-0030 |
6.2 (4.0)
|
A cross-site scripting (XSS) vulnerability in the MISP⦠|
misp |
misp |
2025-12-03T10:53:00.000Z | 2025-12-03T10:58:55.845341Z |
| GCVE-1-2025-0019 |
4 (4.0)
|
Path traversal vulnerability in EventReport for site-admin |
misp |
misp |
2025-11-26T14:47:00.000Z | 2025-11-28T07:27:42.721350Z |
| GCVE-1-2025-0017 |
9.4 (4.0)
|
Privilege escalation in Cerebrate allows an authentica⦠|
cerebrate |
cerebrate |
2025-11-12T08:15:00.000Z | 2025-11-28T07:22:08.205835Z |
| GCVE-1-2025-0029 |
6.3 (4.0)
|
Reflected cross-site scripting (XSS) vulnerabilities i⦠|
misp |
misp |
2025-11-27T12:41:00.000Z | 2025-11-27T12:48:51.085860Z |
| GCVE-1-2025-0027 |
9.4 (4.0)
|
Reflected cross-site scripting (XSS) vulnerability in ⦠|
misp |
misp |
2025-11-27T07:17:00.000Z | 2025-12-02T08:51:04.323899Z |
| GCVE-1-2025-0028 |
8.5 (4.0)
|
Information leakage vulnerability in the MISP Feed con⦠|
misp |
misp |
2025-11-27T07:23:00.000Z | 2025-12-02T08:51:35.429494Z |
| GCVE-1-2025-0026 |
9.4 (4.0)
|
Reflected cross-site scripting (XSS) vulnerability in ⦠|
misp |
misp |
2025-11-26T16:35:00.000Z | 2025-12-02T08:50:46.381572Z |
| GCVE-1-2025-0025 |
9.4 (4.0)
|
Reflected cross-site scripting (XSS) vulnerability in ⦠|
misp |
misp |
2025-11-26T16:27:00.000Z | 2025-12-02T08:50:18.897756Z |
| GCVE-1-2025-0024 |
9.4 (4.0)
|
cross-site scripting (XSS) vulnerability in the MISP s⦠|
misp |
misp |
2025-11-26T16:14:00.000Z | 2025-12-02T08:50:01.482327Z |
| GCVE-1-2025-0023 |
9.4 (4.0)
|
XSS in MISP server comparison tool |
misp |
misp |
2025-11-26T16:10:00.000Z | 2025-12-02T08:49:24.626168Z |
| GCVE-1-2025-0022 |
9.4 (4.0)
|
Clarified setting's impact on download_attachments_on_load |
misp |
misp |
2025-11-26T16:04:00.000Z | 2025-12-02T08:49:04.510294Z |
| GCVE-1-2025-0021 |
9.4 (4.0)
|
XSS in MISP ReST client in HTML view |
misp |
misp |
2025-11-26T15:55:00.000Z | 2025-12-02T08:48:41.869838Z |
| GCVE-1-2025-0020 |
9.4 (4.0)
|
cross-site scripting (XSS) in Galaxy element JSON view |
misp |
misp |
2025-11-26T15:49:00.000Z | 2025-12-02T08:47:41.151429Z |
| GCVE-1-2025-0018 |
9.4 (4.0)
|
HTML injection issue was identified in Lookylooās web ⦠|
lookyloo |
lookyloo |
2025-11-18T15:33:00.000Z | 2025-11-18T20:39:45.579295Z |
| GCVE-1-2025-0016 |
6 (4.0)
|
Local file inclusion in [ImportFromUrl() URL hand⦠|
misp |
misp |
2025-11-04T09:20:00.000Z | 2025-11-04T09:56:38.383646Z |
| GCVE-1-2025-0015 |
9 (4.0)
|
Potential XSS in decaying simulation tool |
misp |
misp |
2025-11-04T09:06:00.000Z | 2025-11-04T09:06:59.216121Z |
| GCVE-1-2025-0014 |
9.4 (4.0)
|
XSS in event report via Mermaid diagram |
misp |
misp |
2025-11-04T08:58:00.024516Z | 2025-11-04T08:58:00.024516Z |
| GCVE-1-2025-0013 |
9.4 (4.0)
|
Vulnerability in sharing group blueprints allowing sha⦠|
misp |
misp |
2025-11-04T08:49:21.558087Z | 2025-11-04T08:49:21.558087Z |
| GCVE-1-2025-0012 |
N/A
|
Potential vulnerability in file check upload but non-e⦠|
misp |
misp |
2025-11-04T07:20:00.000Z | 2025-11-28T07:16:21.589449Z |
| GCVE-1-2025-0011 |
9.4 (4.0)
|
Arbitrary file inclusion / deletion via import modules⦠|
misp |
misp |
2025-11-04T07:01:25.464225Z | 2025-11-04T07:01:25.464225Z |
| GCVE-1-2025-0010 |
6.3 (4.0)
|
Arbitrary file hash inclusion via templates accessible⦠|
misp |
misp |
2025-11-04T06:25:11.108987Z | 2025-11-04T06:25:11.108987Z |
| GCVE-1-2025-0009 |
6.4 (4.0)
|
A pre-auth user could self-assign a reporter without b⦠|
CIRCL |
vulnerability-lookup |
2025-10-13T09:20:24.800890Z | 2025-10-13T09:20:24.800890Z |
| GCVE-1-2025-0008 |
7 (4.0)
|
Logged users can view vulnerability disclosure comment⦠|
CIRCL |
vulnerability-lookup |
2025-10-13T09:10:00.000Z | 2025-10-13T09:15:31.637686Z |