Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-27460 |
6.5 (3.1)
|
Tandoor Recipes Affected by Denial of Service via Reci… |
TandoorRecipes |
recipes |
2026-04-10T19:09:05.883Z | 2026-04-10T19:09:05.883Z |
| CVE-2026-33737 |
5.3 (3.1)
|
Chamilo LMS has an XML External Entity (XXE) Injection |
chamilo |
chamilo-lms |
2026-04-10T19:05:08.873Z | 2026-04-10T19:05:08.873Z |
| CVE-2026-33736 |
6.5 (3.1)
|
Chamilo LMS has an Insecure Direct Object Reference (I… |
chamilo |
chamilo-lms |
2026-04-10T19:03:18.638Z | 2026-04-10T19:03:18.638Z |
| CVE-2026-33710 |
7.5 (3.1)
|
Chamilo LMS has Weak REST API Key Generation (Predictable) |
chamilo |
chamilo-lms |
2026-04-10T18:59:24.111Z | 2026-04-10T18:59:24.111Z |
| CVE-2026-33708 |
6.5 (3.1)
|
Chamilo LMS has REST API PII Exposure via get_user_inf… |
chamilo |
chamilo-lms |
2026-04-10T18:54:35.034Z | 2026-04-10T18:54:35.034Z |
| CVE-2026-33707 |
9.4 (3.1)
|
Weak Password Recovery Mechanism for Forgotten Passwor… |
chamilo |
chamilo-lms |
2026-04-10T18:52:54.097Z | 2026-04-10T18:52:54.097Z |
| CVE-2026-33706 |
7.1 (3.1)
|
Chamilo LMS has a REST API Self-Privilege Escalation (… |
chamilo |
chamilo-lms |
2026-04-10T18:51:23.824Z | 2026-04-10T18:51:23.824Z |
| CVE-2026-33705 |
5.3 (3.1)
|
Chamilo LMS has unauthenticated access to Twig templat… |
chamilo |
chamilo-lms |
2026-04-10T18:32:45.193Z | 2026-04-10T18:33:44.062Z |
| CVE-2026-33704 |
7.1 (3.1)
|
Chamilo LMS Affected by Authenticated Arbitrary File W… |
chamilo |
chamilo-lms |
2026-04-10T18:30:48.478Z | 2026-04-10T18:30:48.478Z |
| CVE-2026-33703 |
7.1 (4.0)
|
Chamilo LMS Critical IDOR: Any Authenticated User Can … |
chamilo |
chamilo-lms |
2026-04-10T18:23:01.031Z | 2026-04-10T18:23:01.031Z |
| CVE-2026-3446 |
6 (4.0)
|
Base64 decoding stops at first padded quad by default |
Python Software Foundation |
CPython |
2026-04-10T18:17:35.045Z | 2026-04-10T18:26:41.904Z |
| CVE-2026-33702 |
7.1 (3.1)
|
Chamilo LMS has an Insecure Direct Object Reference (IDOR) |
chamilo |
chamilo-lms |
2026-04-10T18:15:49.964Z | 2026-04-10T18:15:49.964Z |
| CVE-2026-33698 |
9.3 (4.0)
|
Chamilo LMS affected by unauthenticated RCE in main/in… |
chamilo |
chamilo-lms |
2026-04-10T18:14:17.424Z | 2026-04-10T18:14:17.424Z |
| CVE-2026-33618 |
8.8 (3.1)
|
Chamilo LMS Affected by Remote Code Execution via eval… |
chamilo |
chamilo-lms |
2026-04-10T18:10:16.691Z | 2026-04-10T18:46:09.585Z |
| CVE-2026-33141 |
6.5 (3.1)
|
Chamilo LMS has an IDOR in REST API Stats Endpoint Exp… |
chamilo |
chamilo-lms |
2026-04-10T18:01:26.027Z | 2026-04-10T18:01:26.027Z |
| CVE-2026-32892 |
9.1 (3.1)
|
OS Command Injection in Chamilo LMS 1.11.36 |
chamilo |
chamilo-lms |
2026-04-10T17:56:57.695Z | 2026-04-10T17:56:57.695Z |
| CVE-2026-1502 |
5.7 (4.0)
|
HTTP client proxy tunnel headers not validated for CR/LF |
Python Software Foundation |
CPython |
2026-04-10T17:54:44.121Z | 2026-04-11T04:39:26.099Z |
| CVE-2026-32932 |
4.7 (3.1)
|
Chamilo LMS has an Open Redirect via Unvalidated 'page… |
chamilo |
chamilo-lms |
2026-04-10T17:51:58.480Z | 2026-04-10T17:51:58.480Z |
| CVE-2026-32931 |
7.5 (3.1)
|
Chamilo LMS has Arbitrary File Upload via MIME-Only Va… |
chamilo |
chamilo-lms |
2026-04-10T17:50:40.176Z | 2026-04-10T17:50:40.176Z |
| CVE-2026-32930 |
7.1 (3.1)
|
Chamilo LMS has an IDOR in Gradebook Allows Cross-Cour… |
chamilo |
chamilo-lms |
2026-04-10T17:48:51.774Z | 2026-04-10T18:32:13.726Z |
| CVE-2026-32894 |
7.1 (3.1)
|
Chamilo LMS has an IDOR in Gradebook Allows Cross-Cour… |
chamilo |
chamilo-lms |
2026-04-10T17:44:24.994Z | 2026-04-10T17:44:24.994Z |
| CVE-2026-32893 |
5.4 (3.1)
|
Chamilo LMS has Reflected XSS via Unsanitized http_bui… |
chamilo |
chamilo-lms |
2026-04-10T17:42:24.220Z | 2026-04-10T17:42:24.220Z |
| CVE-2026-31941 |
7.7 (3.1)
|
Server-Side Request Forgery (SSRF) in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:37:50.948Z | 2026-04-10T18:33:22.920Z |
| CVE-2026-31940 |
7.5 (3.1)
|
Session Fixation in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:35:10.661Z | 2026-04-10T17:35:10.661Z |
| CVE-2026-5483 |
8.5 (3.1)
|
Odh-dashboard: odh dashboard kubernetes service accoun… |
Red Hat |
Red Hat OpenShift AI 2.16 |
2026-04-10T17:33:25.055Z | 2026-04-10T21:07:45.000Z |
| CVE-2026-31939 |
8.3 (3.1)
|
Path Traversal (Arbitrary File Delete) in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:32:29.252Z | 2026-04-10T17:32:29.252Z |
| CVE-2025-66447 |
0 (3.1)
|
Chamilo LMS has validation-less redirect on login page |
chamilo |
chamilo-lms |
2026-04-10T17:22:32.443Z | 2026-04-10T17:22:32.443Z |
| CVE-2026-40163 |
8.2 (3.1)
|
Saltcorn has an Unauthenticated Path Traversal in sync… |
saltcorn |
saltcorn |
2026-04-10T17:07:49.067Z | 2026-04-10T17:07:49.067Z |
| CVE-2026-40162 |
7.1 (3.1)
|
Bugsink affected by authenticated arbitrary file write… |
bugsink |
bugsink |
2026-04-10T17:02:58.985Z | 2026-04-10T18:30:44.339Z |
| CVE-2026-22560 |
N/A
|
An open redirect vulnerability in Rocket.Chat ver… |
Rocket.Chat |
Rocket.Chat |
2026-04-10T17:00:11.746Z | 2026-04-10T17:00:11.746Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-3446 |
6 (4.0)
|
Base64 decoding stops at first padded quad by default |
Python Software Foundation |
CPython |
2026-04-10T18:17:35.045Z | 2026-04-10T18:26:41.904Z |
| CVE-2026-33737 |
5.3 (3.1)
|
Chamilo LMS has an XML External Entity (XXE) Injection |
chamilo |
chamilo-lms |
2026-04-10T19:05:08.873Z | 2026-04-10T19:05:08.873Z |
| CVE-2026-33736 |
6.5 (3.1)
|
Chamilo LMS has an Insecure Direct Object Reference (I… |
chamilo |
chamilo-lms |
2026-04-10T19:03:18.638Z | 2026-04-10T19:03:18.638Z |
| CVE-2026-33710 |
7.5 (3.1)
|
Chamilo LMS has Weak REST API Key Generation (Predictable) |
chamilo |
chamilo-lms |
2026-04-10T18:59:24.111Z | 2026-04-10T18:59:24.111Z |
| CVE-2026-33708 |
6.5 (3.1)
|
Chamilo LMS has REST API PII Exposure via get_user_inf… |
chamilo |
chamilo-lms |
2026-04-10T18:54:35.034Z | 2026-04-10T18:54:35.034Z |
| CVE-2026-33707 |
9.4 (3.1)
|
Weak Password Recovery Mechanism for Forgotten Passwor… |
chamilo |
chamilo-lms |
2026-04-10T18:52:54.097Z | 2026-04-10T18:52:54.097Z |
| CVE-2026-33706 |
7.1 (3.1)
|
Chamilo LMS has a REST API Self-Privilege Escalation (… |
chamilo |
chamilo-lms |
2026-04-10T18:51:23.824Z | 2026-04-10T18:51:23.824Z |
| CVE-2026-33705 |
5.3 (3.1)
|
Chamilo LMS has unauthenticated access to Twig templat… |
chamilo |
chamilo-lms |
2026-04-10T18:32:45.193Z | 2026-04-10T18:33:44.062Z |
| CVE-2026-33704 |
7.1 (3.1)
|
Chamilo LMS Affected by Authenticated Arbitrary File W… |
chamilo |
chamilo-lms |
2026-04-10T18:30:48.478Z | 2026-04-10T18:30:48.478Z |
| CVE-2026-33703 |
7.1 (4.0)
|
Chamilo LMS Critical IDOR: Any Authenticated User Can … |
chamilo |
chamilo-lms |
2026-04-10T18:23:01.031Z | 2026-04-10T18:23:01.031Z |
| CVE-2026-33702 |
7.1 (3.1)
|
Chamilo LMS has an Insecure Direct Object Reference (IDOR) |
chamilo |
chamilo-lms |
2026-04-10T18:15:49.964Z | 2026-04-10T18:15:49.964Z |
| CVE-2026-33698 |
9.3 (4.0)
|
Chamilo LMS affected by unauthenticated RCE in main/in… |
chamilo |
chamilo-lms |
2026-04-10T18:14:17.424Z | 2026-04-10T18:14:17.424Z |
| CVE-2026-33618 |
8.8 (3.1)
|
Chamilo LMS Affected by Remote Code Execution via eval… |
chamilo |
chamilo-lms |
2026-04-10T18:10:16.691Z | 2026-04-10T18:46:09.585Z |
| CVE-2026-27460 |
6.5 (3.1)
|
Tandoor Recipes Affected by Denial of Service via Reci… |
TandoorRecipes |
recipes |
2026-04-10T19:09:05.883Z | 2026-04-10T19:09:05.883Z |
| CVE-2026-5483 |
8.5 (3.1)
|
Odh-dashboard: odh dashboard kubernetes service accoun… |
Red Hat |
Red Hat OpenShift AI 2.16 |
2026-04-10T17:33:25.055Z | 2026-04-10T21:07:45.000Z |
| CVE-2026-40163 |
8.2 (3.1)
|
Saltcorn has an Unauthenticated Path Traversal in sync… |
saltcorn |
saltcorn |
2026-04-10T17:07:49.067Z | 2026-04-10T17:07:49.067Z |
| CVE-2026-40162 |
7.1 (3.1)
|
Bugsink affected by authenticated arbitrary file write… |
bugsink |
bugsink |
2026-04-10T17:02:58.985Z | 2026-04-10T18:30:44.339Z |
| CVE-2026-33141 |
6.5 (3.1)
|
Chamilo LMS has an IDOR in REST API Stats Endpoint Exp… |
chamilo |
chamilo-lms |
2026-04-10T18:01:26.027Z | 2026-04-10T18:01:26.027Z |
| CVE-2026-32932 |
4.7 (3.1)
|
Chamilo LMS has an Open Redirect via Unvalidated 'page… |
chamilo |
chamilo-lms |
2026-04-10T17:51:58.480Z | 2026-04-10T17:51:58.480Z |
| CVE-2026-32931 |
7.5 (3.1)
|
Chamilo LMS has Arbitrary File Upload via MIME-Only Va… |
chamilo |
chamilo-lms |
2026-04-10T17:50:40.176Z | 2026-04-10T17:50:40.176Z |
| CVE-2026-32930 |
7.1 (3.1)
|
Chamilo LMS has an IDOR in Gradebook Allows Cross-Cour… |
chamilo |
chamilo-lms |
2026-04-10T17:48:51.774Z | 2026-04-10T18:32:13.726Z |
| CVE-2026-32894 |
7.1 (3.1)
|
Chamilo LMS has an IDOR in Gradebook Allows Cross-Cour… |
chamilo |
chamilo-lms |
2026-04-10T17:44:24.994Z | 2026-04-10T17:44:24.994Z |
| CVE-2026-32893 |
5.4 (3.1)
|
Chamilo LMS has Reflected XSS via Unsanitized http_bui… |
chamilo |
chamilo-lms |
2026-04-10T17:42:24.220Z | 2026-04-10T17:42:24.220Z |
| CVE-2026-32892 |
9.1 (3.1)
|
OS Command Injection in Chamilo LMS 1.11.36 |
chamilo |
chamilo-lms |
2026-04-10T17:56:57.695Z | 2026-04-10T17:56:57.695Z |
| CVE-2026-31941 |
7.7 (3.1)
|
Server-Side Request Forgery (SSRF) in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:37:50.948Z | 2026-04-10T18:33:22.920Z |
| CVE-2026-31940 |
7.5 (3.1)
|
Session Fixation in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:35:10.661Z | 2026-04-10T17:35:10.661Z |
| CVE-2026-31939 |
8.3 (3.1)
|
Path Traversal (Arbitrary File Delete) in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:32:29.252Z | 2026-04-10T17:32:29.252Z |
| CVE-2026-1502 |
5.7 (4.0)
|
HTTP client proxy tunnel headers not validated for CR/LF |
Python Software Foundation |
CPython |
2026-04-10T17:54:44.121Z | 2026-04-11T04:39:26.099Z |
| CVE-2025-66447 |
0 (3.1)
|
Chamilo LMS has validation-less redirect on login page |
chamilo |
chamilo-lms |
2026-04-10T17:22:32.443Z | 2026-04-10T17:22:32.443Z |
| CVE-2026-40200 |
8.1 (3.1)
|
An issue was discovered in musl libc 0.7.10 throu… |
musl-libc |
musl |
2026-04-10T00:00:00.000Z | 2026-04-10T17:17:25.925Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-2577 | The WhatsApp bridge component in Nanobot binds the WebSocket server to all network interfaces (0.0.… | 2026-02-16T10:16:08.827 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2550 | A vulnerability was found in EFM iptime A6004MX 14.18.2. Affected is the function commit_vpncli_fil… | 2026-02-16T10:16:08.623 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2549 | A vulnerability has been found in zhanghuanhao LibrarySystem 图书馆管理系统 up to 1.1.1. This impacts an u… | 2026-02-16T10:16:08.403 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-0999 | Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 fail to properly validat… | 2026-02-16T10:16:08.140 | 2026-02-18T20:20:07.833 |
| fkie_cve-2026-0998 | Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 and Mattermost Plugin Zo… | 2026-02-16T10:16:07.983 | 2026-02-18T20:22:51.917 |
| fkie_cve-2026-0997 | Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 and Mattermost Plugin Zo… | 2026-02-16T10:16:07.793 | 2026-02-18T20:23:34.847 |
| fkie_cve-2025-59905 | Cross-Site Scripting (XSS) vulnerability reflected in Kubysoft, which occurs through multiple param… | 2026-02-16T10:16:07.390 | 2026-03-09T20:44:34.220 |
| fkie_cve-2025-59904 | Stored Cross-Site Scripting (XSS) vulnerability in Kubysoft, which is triggered through multiple pa… | 2026-02-16T10:16:07.240 | 2026-03-09T20:44:29.440 |
| fkie_cve-2025-59903 | Stored Cross-Site Scripting (XSS) vulnerability in Kubysoft, where uploaded SVG images are not prop… | 2026-02-16T10:16:06.980 | 2026-03-09T20:01:14.500 |
| fkie_cve-2026-2548 | A flaw has been found in WAYOS FBM-220G 24.10.19. This affects the function sub_40F820 of the file … | 2026-02-16T09:16:08.853 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2547 | A vulnerability was detected in LigeroSmart up to 6.1.26. The impacted element is the function Agen… | 2026-02-16T09:16:08.660 | 2026-02-18T21:45:21.910 |
| fkie_cve-2026-2546 | A security vulnerability has been detected in LigeroSmart up to 6.1.26. The affected element is an … | 2026-02-16T09:16:08.437 | 2026-02-19T19:39:34.103 |
| fkie_cve-2026-2545 | A weakness has been identified in LigeroSmart up to 6.1.26. Impacted is an unknown function of the … | 2026-02-16T08:16:05.587 | 2026-02-19T19:39:45.443 |
| fkie_cve-2026-2544 | A security flaw has been discovered in yued-fe LuLu UI up to 3.0.0. This issue affects the function… | 2026-02-16T08:16:05.287 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2543 | A vulnerability was identified in vichan-devel vichan up to 5.1.5. This vulnerability affects unkno… | 2026-02-16T07:17:01.007 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2542 | A weakness has been identified in Total VPN 0.5.29.0 on Windows. Affected by this vulnerability is … | 2026-02-16T07:17:00.803 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2538 | A security flaw has been discovered in Flos Freeware Notepad2 4.2.22/4.2.23/4.2.24/4.2.25. Affected… | 2026-02-16T07:17:00.537 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-0929 | The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capability checks, allo… | 2026-02-16T07:17:00.197 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2537 | A vulnerability was identified in Comfast CF-E4 2.6.0.1. This impacts an unknown function of the fi… | 2026-02-16T06:16:22.320 | 2026-02-25T15:29:36.473 |
| fkie_cve-2026-2536 | A vulnerability was determined in opencc JFlow up to 20260129. This affects the function Imp_Done o… | 2026-02-16T06:16:22.063 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2535 | A vulnerability was found in Comfast CF-N1 V2 2.6.0.2. The impacted element is the function sub_44A… | 2026-02-16T05:16:07.777 | 2026-02-19T19:40:56.853 |
| fkie_cve-2026-2534 | A vulnerability has been found in Comfast CF-N1 V2 2.6.0.2. The affected element is the function su… | 2026-02-16T04:15:52.470 | 2026-02-19T19:41:31.960 |
| fkie_cve-2026-2533 | A flaw has been found in Tosei Self-service Washing Machine 4.02. Impacted is an unknown function o… | 2026-02-16T04:15:52.283 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2532 | A vulnerability was detected in lintsinghua DeepAudit up to 3.0.3. This issue affects some unknown … | 2026-02-16T04:15:52.093 | 2026-02-28T00:38:08.223 |
| fkie_cve-2026-2531 | A security vulnerability has been detected in MindsDB up to 25.14.1. This vulnerability affects the… | 2026-02-16T04:15:51.897 | 2026-02-19T19:47:37.377 |
| fkie_cve-2026-2530 | A weakness has been identified in Wavlink WL-WN579A3 up to 20210219. This affects the function AddM… | 2026-02-16T04:15:51.677 | 2026-02-18T19:43:36.320 |
| fkie_cve-2026-2529 | A security flaw has been discovered in Wavlink WL-WN579A3 up to 20210219. Affected by this issue is… | 2026-02-16T02:16:07.000 | 2026-02-18T20:02:39.143 |
| fkie_cve-2026-2528 | A vulnerability was identified in Wavlink WL-WN579A3 up to 20210219. Affected by this vulnerability… | 2026-02-16T02:16:06.807 | 2026-02-18T20:04:38.627 |
| fkie_cve-2026-2527 | A vulnerability was determined in Wavlink WL-WN579A3 up to 20210219. Affected is an unknown functio… | 2026-02-16T02:16:06.620 | 2026-02-18T20:11:33.500 |
| fkie_cve-2026-2526 | A vulnerability was found in Wavlink WL-WN579A3 up to 20210219. This impacts the function multi_ssi… | 2026-02-16T02:16:06.423 | 2026-02-18T19:07:21.820 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-ffq7-898w-9jc4 |
8.0 (3.1)
|
DotNetNuke.Core has stored cross-site-scripting (XSS) via SVG upload | 2026-04-10T20:42:48Z | 2026-04-10T20:42:48Z |
| ghsa-6v7q-wjvx-w8wg |
8.2 (3.1)
|
basic-ftp: Incomplete CRLF Injection Protection Allows Arbitrary FTP Command Execution via Credenti… | 2026-04-10T20:18:23Z | 2026-04-10T20:18:23Z |
| ghsa-h9cx-xjg6-5v2w |
3.1 (3.1)
|
Flux notification-controller GCR Receiver missing email validation allows unauthorized reconciliati… | 2026-04-10T20:18:16Z | 2026-04-10T20:18:16Z |
| ghsa-9qq8-cgcv-qmc9 |
3.7 (3.1)
|
Step CA affected by an index out of bounds panic in TPM attestation EKU validation | 2026-04-10T20:18:08Z | 2026-04-10T20:18:08Z |
| ghsa-fw9q-39r9-c252 |
5.6 (3.1)
|
LangSmith Client SDKs has Prototype Pollution in langsmith-sdk via Incomplete `__proto__` Guard in … | 2026-04-10T20:18:02Z | 2026-04-10T21:37:36Z |
| ghsa-wvhv-qcqf-f3cx |
9.3 (4.0)
|
goshs has a file-based ACL authorization bypass in goshs state-changing routes | 2026-04-10T20:00:32Z | 2026-04-10T21:37:32Z |
| ghsa-2943-crp8-38xx |
7.7 (3.1)
|
goshs is Missing Write Protection for Parametric Data Values | 2026-04-10T20:00:28Z | 2026-04-10T21:37:27Z |
| ghsa-3wqj-33cg-xc48 |
5.3 (3.1)
|
Rembg has a Path Traversal via Custom Model Loading | 2026-04-10T20:00:12Z | 2026-04-10T20:00:12Z |
| ghsa-49xc-52mp-cc9j |
9.1 (3.1)
|
nimiq-blockchain is missing a wall-clock upper bound on block timestamps | 2026-04-10T19:55:04Z | 2026-04-10T19:55:04Z |
| ghsa-8647-755q-fw9p |
6.9 (4.0)
|
ajenti.plugin.core has race conditions in 2FA | 2026-04-10T19:54:41Z | 2026-04-10T21:37:21Z |
| ghsa-vj8v-p5vw-m6v5 |
5.3 (3.1)
|
xrootd has path traversal in directory listing that allows access to the parent directory via trail… | 2026-04-10T19:50:39Z | 2026-04-10T19:50:39Z |
| ghsa-69hx-63pv-f8f4 |
4.8 (3.1)
|
Ech0 has Stored XSS via SVG Upload and Content-Type Validation Bypass in File Upload | 2026-04-10T19:50:01Z | 2026-04-10T19:50:01Z |
| ghsa-r2x7-427f-rq69 |
5.5 (3.1)
|
Ech0 has SSRF via DNS Resolution Bypass in Webhook URL Validation | 2026-04-10T19:49:48Z | 2026-04-10T19:49:49Z |
| ghsa-w8jj-cwmc-wgq2 |
4.3 (3.1)
|
Ech0's Missing Authorization on System Logs Allows Non-Admin Information Disclosure | 2026-04-10T19:49:33Z | 2026-04-10T19:49:33Z |
| ghsa-fwg7-53p4-g33c |
5.5 (3.1)
|
Ech0 Comment Panel Endpoints Missing RequireScopes Middleware — Scoped Access Token Bypass | 2026-04-10T19:49:20Z | 2026-04-10T19:49:20Z |
| ghsa-hm2h-wwwh-g49x |
6.5 (3.1)
|
Ech0 Scope Bypass: profile:read Access Token Can Change Admin Password and Escalate to Unrestricted… | 2026-04-10T19:49:13Z | 2026-04-10T19:49:14Z |
| ghsa-3mcx-6wxm-qr8v |
9.1 (4.0)
|
ajenti.plugin.core has password bypass when 2FA is activated | 2026-04-10T19:47:31Z | 2026-04-10T21:37:11Z |
| ghsa-fvcv-3m26-pcqx |
10.0 (3.1)
|
Axios has Unrestricted Cloud Metadata Exfiltration via Header Injection Chain | 2026-04-10T19:47:16Z | 2026-04-10T21:37:07Z |
| ghsa-xq4j-g85q-wf97 |
2.1 (4.0)
|
REDAXO has reflected XSS backend packages API via function parameter (CSRF token required) | 2026-04-10T19:40:42Z | 2026-04-10T19:40:42Z |
| ghsa-m662-8jrj-cw6v |
2.1 (4.0)
|
REDAXO has reflected XSS in backend Metainfo API via type parameter (CSRF token required) | 2026-04-10T19:40:23Z | 2026-04-10T19:40:23Z |
| ghsa-cp79-9mwr-wr49 |
6.5 (3.1)
|
Ech0: Missing authorization on dashboard log endpoints allows low-privilege users to access sensiti… | 2026-04-10T19:40:02Z | 2026-04-10T19:40:02Z |
| ghsa-4h9q-p5j4-xvvh |
7.6 (3.1)
|
Ech0: Scoped admin access tokens can bypass least-privilege controls on privileged endpoints, inclu… | 2026-04-10T19:39:46Z | 2026-04-10T19:39:46Z |
| ghsa-pjjw-68hj-v9mw |
2.1 (4.0)
|
uv vulnerable to arbitrary file deletion through RECORD entries | 2026-04-10T19:39:15Z | 2026-04-10T19:39:15Z |
| ghsa-8x8f-54wf-vv92 |
9.1 (3.1)
|
PraisonAI Browser Server allows unauthenticated WebSocket clients to hijack connected extension sessions | 2026-04-10T19:32:59Z | 2026-04-10T19:32:59Z |
| ghsa-vc46-vw85-3wvm |
9.8 (3.1)
|
PraisonAI has critical RCE via `type: job` workflow YAML | 2026-04-10T19:32:48Z | 2026-04-10T19:32:48Z |
| ghsa-g985-wjh9-qxxc |
8.4 (3.1)
|
PraisonAI Vulnerable to RCE via Automatic tools.py Import | 2026-04-10T19:32:32Z | 2026-04-10T19:32:32Z |
| ghsa-vw86-c94w-v3x4 |
8.5 (3.1)
|
SiYuan: Publish Reader Path Traversal Delete via `removeUnusedAttributeView` | 2026-04-10T19:32:12Z | 2026-04-10T19:32:12Z |
| ghsa-7m5h-w69j-qggg |
8.1 (3.1)
|
SiYuan: Publish Reader Can Arbitrarily Delete Attribute View Files via `/api/av/removeUnusedAttribu… | 2026-04-10T19:32:07Z | 2026-04-10T21:32:45Z |
| ghsa-x783-xp3g-mqhp |
6.9 (4.0)
|
PraisonAI: SQLiteConversationStore didn't validate table_prefix when constructing SQL queries | 2026-04-10T19:32:00Z | 2026-04-10T19:32:00Z |
| ghsa-8hw4-fhww-273g |
7.1 (3.1)
|
Bugsink affected by authenticated arbitrary file write in artifactbundle/assemble | 2026-04-10T19:30:42Z | 2026-04-10T19:30:42Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2025-28 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.772920+00:00 |
| pysec-2025-27 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.711157+00:00 |
| pysec-2025-26 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.645758+00:00 |
| pysec-2025-58 |
8.8 (3.1)
|
vLLM is a library for LLM inference and serving. vllm/model_executor/weight_utils.py impl… | vllm | 2025-01-27T18:15:41+00:00 | 2025-06-27T21:22:36.583615+00:00 |
| pysec-2025-12 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2025-01-21T15:15:13+00:00 | 2025-04-08T10:23:23.899726+00:00 |
| pysec-2025-1 |
|
An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2… | django | 2025-01-14T19:15:32+00:00 | 2025-01-14T21:22:18.665005+00:00 |
| pysec-2025-33 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. When the Vyper Compiler uses the… | vyper | 2025-01-14T18:16:05+00:00 | 2025-04-23T21:23:01.322686+00:00 |
| pysec-2024-158 |
|
Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when … | djoser | 2024-12-13T05:15:07+00:00 | 2025-01-14T05:22:11.856636+00:00 |
| pysec-2024-159 |
|
Versions of the package luigi before 3.6.0 are vulnerable to Arbitrary File Write via Arc… | luigi | 2024-12-10T05:15:07+00:00 | 2025-01-14T05:22:17.204098+00:00 |
| pysec-2024-157 |
|
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2… | django | 2024-12-06T12:15:18+00:00 | 2025-01-14T05:22:11.817473+00:00 |
| pysec-2024-156 |
|
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2… | django | 2024-12-06T12:15:17+00:00 | 2025-01-14T05:22:11.736011+00:00 |
| pysec-2024-256 |
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2024-12-03T16:15:24+00:00 | 2025-06-27T17:22:53.325430+00:00 |
| pysec-2024-161 |
|
Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R packag… | pyarrow | 2024-11-28T17:15:48+00:00 | 2025-01-14T05:22:20.554292+00:00 |
| pysec-2024-224 |
7.0 (3.1)
|
Excessive directory permissions in MLflow leads to local privilege escalation when using … | mlflow | 2024-11-25T14:15:06+00:00 | 2025-02-03T16:23:40.409646+00:00 |
| pysec-2024-187 |
9.8 (3.1)
|
virtualenv before 20.26.6 allows command injection through the activation scripts for a v… | virtualenv | 2024-11-24T16:15:06+00:00 | 2025-01-19T04:23:01.784352+00:00 |
| pysec-2024-229 |
8.8 (3.1)
|
Hugging Face Transformers Trax Model Deserialization of Untrusted Data Remote Code Execut… | transformers | 2024-11-22T22:15:07+00:00 | 2025-02-10T23:22:41.499413+00:00 |
| pysec-2024-228 |
8.8 (3.1)
|
Hugging Face Transformers MaskFormer Model Deserialization of Untrusted Data Remote Code … | transformers | 2024-11-22T22:15:07+00:00 | 2025-02-10T23:22:41.449105+00:00 |
| pysec-2024-227 |
8.8 (3.1)
|
Hugging Face Transformers MobileViTV2 Deserialization of Untrusted Data Remote Code Execu… | transformers | 2024-11-22T22:15:06+00:00 | 2025-02-10T23:22:41.399021+00:00 |
| pysec-2024-178 |
7.5 (3.1)
|
Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to version 2… | litestar | 2024-11-20T21:15:08+00:00 | 2025-01-19T01:52:23.772726+00:00 |
| pysec-2024-160 |
6.1 (3.1)
|
lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.cle… | lxml-html-clean | 2024-11-19T22:15:21+00:00 | 2025-01-14T05:22:17.244267+00:00 |
| pysec-2024-124 |
4.8 (3.1)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting… | django-cms | 2024-11-18T12:15:00Z | 2024-11-20T16:23:43.554559Z |
| pysec-2024-123 |
6.1 (3.1)
|
An open redirection vulnerability exists in pyload/pyload version 0.5.0. The vulnerabilit… | pyload-ng | 2024-11-15T11:15:00+00:00 | 2024-11-19T22:22:34.280606+00:00 |
| pysec-2024-182 |
|
Apache Airflow versions before 2.10.3 contain a vulnerability that could expose sensitive… | apache-airflow | 2024-11-15T09:15:14+00:00 | 2025-01-19T04:22:59.398988+00:00 |
| pysec-2024-204 |
8.1 (3.1)
|
TorchGeo Remote Code Execution Vulnerability | torchgeo | 2024-11-12T18:15:45+00:00 | 2025-01-19T19:19:01.299352+00:00 |
| pysec-2024-231 |
8.1 (3.1)
|
LightGBM Remote Code Execution Vulnerability | lightgbm | 2024-11-12T18:15:28+00:00 | 2025-02-15T07:20:34.246161+00:00 |
| pysec-2024-238 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-11-06T15:15:11+00:00 | 2025-04-08T10:23:23.857960+00:00 |
| pysec-2024-183 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-11-06T15:15:11+00:00 | 2025-01-19T04:22:59.576907+00:00 |
| pysec-2024-202 |
6.5 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-11-05T19:15:07+00:00 | 2025-01-19T16:22:59.212853+00:00 |
| pysec-2024-201 |
6.1 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-11-05T19:15:05+00:00 | 2025-01-19T16:22:59.154645+00:00 |
| pysec-2024-115 |
9.8 (3.1)
|
A vulnerability in the GraphCypherQAChain class of langchain-ai/langchain-community versi… | langchain | 2024-11-05T16:04:14Z | 2024-11-12T19:19:57.535206Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2529 | Malicious code in use-form-builder-plugin (npm) | 2026-04-06T16:16:50Z | 2026-04-10T17:23:37Z |
| mal-2026-2524 | Malicious code in a2a-chat-canvas (npm) | 2026-04-06T16:13:05Z | 2026-04-10T17:23:32Z |
| mal-2026-2526 | Malicious code in request-js-validator (npm) | 2026-04-06T16:07:02Z | 2026-04-10T17:23:36Z |
| mal-2026-2499 | Malicious code in nerite-security-audit (npm) | 2026-04-06T09:23:07Z | 2026-04-07T14:41:23Z |
| mal-2026-2500 | Malicious code in totally-safe-util (npm) | 2026-04-06T09:20:39Z | 2026-04-07T14:41:25Z |
| mal-2026-2498 | Malicious code in df-sandbox-test (npm) | 2026-04-06T09:18:00Z | 2026-04-07T14:41:21Z |
| mal-2026-2497 | Malicious code in commerce-utils (npm) | 2026-04-06T09:11:24Z | 2026-04-07T14:41:21Z |
| mal-2026-2496 | Malicious code in chess-sec-ssrf1 (npm) | 2026-04-06T06:10:44Z | 2026-04-07T14:41:21Z |
| mal-2026-2495 | Malicious code in cloudera (npm) | 2026-04-05T20:05:37Z | 2026-04-07T14:41:21Z |
| mal-2026-2493 | Malicious code in cloudera-poc (npm) | 2026-04-05T19:40:31Z | 2026-04-07T14:41:21Z |
| mal-2026-2494 | Malicious code in databasetapes (PyPI) | 2026-04-05T19:35:23Z | 2026-04-10T21:49:20Z |
| mal-2026-2492 | Malicious code in admin0911 (npm) | 2026-04-05T15:30:57Z | 2026-04-08T18:35:00Z |
| mal-2026-2491 | Malicious code in @not-nemo/crypto-tracker (npm) | 2026-04-05T14:31:21Z | 2026-04-07T14:41:20Z |
| mal-2026-2489 | Malicious code in databaserobooms (PyPI) | 2026-04-04T22:24:16Z | 2026-04-10T21:49:20Z |
| mal-2026-2490 | Malicious code in databaserotacos (PyPI) | 2026-04-04T22:03:00Z | 2026-04-10T21:49:20Z |
| mal-2026-2488 | Malicious code in photo-extractor (PyPI) | 2026-04-04T16:41:48Z | 2026-04-04T16:41:48Z |
| mal-2026-2487 | Malicious code in discord-request (PyPI) | 2026-04-04T12:56:18Z | 2026-04-04T12:56:18Z |
| mal-2026-2486 | Malicious code in gangomodule (PyPI) | 2026-04-04T12:01:55Z | 2026-04-04T12:01:55Z |
| mal-2026-2452 | Malicious code in strapi-plugin-blurhash (npm) | 2026-04-03T19:10:29Z | 2026-04-07T16:38:18Z |
| mal-2026-2450 | Malicious code in strapi-plugin-advanced-uuid (npm) | 2026-04-03T19:10:26Z | 2026-04-07T16:38:18Z |
| mal-2026-2463 | Malicious code in strapi-plugin-guardarian-ext (npm) | 2026-04-03T19:10:23Z | 2026-04-07T16:38:18Z |
| mal-2026-2465 | Malicious code in strapi-plugin-health-check (npm) | 2026-04-03T19:10:19Z | 2026-04-07T16:38:18Z |
| mal-2026-2459 | Malicious code in strapi-plugin-debug-tools (npm) | 2026-04-03T19:10:16Z | 2026-04-07T16:38:18Z |
| mal-2026-2455 | Malicious code in strapi-plugin-content-sync (npm) | 2026-04-03T19:09:53Z | 2026-04-07T16:38:18Z |
| mal-2026-2453 | Malicious code in strapi-plugin-cms-tools (npm) | 2026-04-03T19:09:34Z | 2026-04-07T16:38:18Z |
| mal-2026-2466 | Malicious code in strapi-plugin-hextest (npm) | 2026-04-03T19:09:14Z | 2026-04-07T16:38:18Z |
| mal-2026-2461 | Malicious code in strapi-plugin-finseven (npm) | 2026-04-03T19:08:49Z | 2026-04-07T16:38:18Z |
| mal-2026-2471 | Malicious code in strapi-plugin-nordica (npm) | 2026-04-03T19:08:46Z | 2026-04-07T16:38:18Z |
| mal-2026-2474 | Malicious code in strapi-plugin-nordica-deep (npm) | 2026-04-03T19:06:00Z | 2026-04-07T16:38:18Z |
| mal-2026-2480 | Malicious code in strapi-plugin-nordica-vhost (npm) | 2026-04-03T19:05:57Z | 2026-04-07T16:38:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0790 | Linux Kernel: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0789 | Roundcube: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-04-06T22:00:00.000+00:00 |
| wid-sec-w-2026-0787 | Keycloak: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0785 | libarchive: Schwachstelle ermöglicht Denial of Service | 2026-03-18T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0784 | Ubiquiti UniFi Network Application: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2026-03-18T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0782 | WebKitGTK: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0781 | Drupal Automated Logout Extension: Schwachstelle ermöglicht Manipulation von Dateien | 2026-03-18T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0775 | nghttp2: Schwachstelle ermöglicht Denial of Service | 2026-03-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0769 | Red Hat Enterprise Linux (capstone) und OpenShift (rhcos): Mehrere Schwachstellen | 2026-03-17T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0764 | Grafana Tempo: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0761 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Denial of Service | 2026-03-17T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0760 | Xen und Citrix Systems XenServer: Mehrere Schwachstellen | 2026-03-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0758 | Canonical Snap: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2026-03-17T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0756 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Privilegieneskalation und Offenlegung von Informationen | 2026-03-16T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0744 | ImageMagick: Schwachstelle ermöglicht Denial of Service | 2026-03-16T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0743 | OpenClaw: Mehrere Schwachstellen | 2026-03-16T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0736 | NetBox: Schwachstelle ermöglicht Cross-Site Scripting | 2026-03-16T23:00:00.000+00:00 | 2026-03-17T23:00:00.000+00:00 |
| wid-sec-w-2026-0734 | GNU InetUtils: Mehrere Schwachstellen | 2026-03-15T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0733 | libexpat: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-03-15T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0729 | OpenSSL: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-15T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0727 | OpenClaw: Mehrere Schwachstellen | 2026-03-15T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0725 | FreeRDP: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0723 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0720 | systemd: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0716 | OpenSSH GSSAPI delta: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-03-12T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0714 | ImageMagick: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-03-12T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0711 | OpenClaw: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0705 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2026-03-11T23:00:00.000+00:00 | 2026-03-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0704 | Google Cloud Platform Envoy Proxy, Istio und Service Mesh: Mehrere Schwachstellen | 2026-03-11T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0702 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2026-03-11T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-050-02 | Valmet DNA Engineering Web Tools | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-050-01 | EnOcean SmartServer IoT | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-048-04 | Honeywell HIB2PI CCTV Camera (Update B) | 2026-02-17T07:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-048-03 | GE Vernova Enervista UR Setup | 2026-02-17T07:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-048-02 | Delta Electronics ASDA-Soft | 2026-02-17T07:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-043-10 | Airleader Master | 2026-02-12T07:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-076-02 | Schneider Electric SCADAPack and RemoteConnect | 2026-02-10T08:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-055-02 | Schneider Electric EcoStruxure Building Operation Workstation | 2026-02-10T08:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsma-26-041-01 | ZOLL ePCR IOS Mobile Application | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-04 | AVEVA PI to CONNECT Agent | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-03 | AVEVA PI Data Archive | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-02 | ZLAN Information Technology Co. ZLAN5143D | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-01 | Yokogawa FAST/TOOLS | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-048-01 | Siemens Simcenter Femap and Nastran | 2026-02-10T00:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-043-08 | Siemens NX | 2026-02-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-043-07 | Siemens Siveillance Video Management Servers | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-05 | Siemens Solid Edge | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-04 | Siemens Desigo CC Product Family and SENTRON Powermanager | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-02 | Siemens Polarion | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-01 | Siemens SINEC NMS | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-036-04 | Ilevia EVE X1 Server | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-03 | o6 Automation GmbH Open62541 | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-02 | Mitsubishi Electric MELSEC iQ-R Series | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-01 | TP-Link Systems Inc. VIGI Series IP Camera | 2026-02-05T06:00:00.000000Z | 2026-02-11T06:00:00.000000Z |
| icsa-26-034-04 | Synectix LAN 232 TRIO | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-03 | RISS SRL MOMA Seismic Station | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-02 | *Avation Light Engine Pro * | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-01 | Mitsubishi Electric FREQSHIP-mini for Windows | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-029-03 | Rockwell Automation ControlLogix | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-26-029-02 | Rockwell Automation ArmorStart LT | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-iec6400-pem5uq7v | Cisco IEC6400 Wireless Backhaul Edge Compute Software SSH Denial of Service Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-ise-xss-9tdh2kx | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-ise-xss-964cdxw5 | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-epnm-pi-stored-xss-gekx8ywk | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-snort3-dcerpc-vulns-j9hnf4th | Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities | 2026-01-07T16:00:00+00:00 | 2026-02-10T20:42:07+00:00 |
| cisco-sa-ise-xxe-jwsbsdkt | Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability | 2026-01-07T16:00:00+00:00 | 2026-01-07T16:00:00+00:00 |
| cisco-sa-sma-attack-n9bf4 | Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager | 2025-12-17T16:00:00+00:00 | 2026-01-15T16:01:43+00:00 |
| cisco-sa-react-flight-tyw32ddb | Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 | 2025-12-04T16:00:00+00:00 | 2025-12-17T22:37:17+00:00 |
| cisco-sa-privesc-catc-ryjreelu | Cisco Catalyst Center Privilege Escalation Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-dnac-xss-wextvz59 | Cisco Catalyst Center Cross-Site Scripting Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-dnac-ci-zwlqvswt | Cisco Catalyst Center REST API Command Injection Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-catc-priv-esc-vs8eecux | Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-catc-open-redirect-3w5bk3je | Cisco Catalyst Center Virtual Appliance HTTP Open Redirect Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-ise-radsupress-dos-8yf3jthh | Cisco Identity Services Engine RADIUS Suppression Denial of Service Vulnerability | 2025-11-05T16:00:00+00:00 | 2025-11-05T16:00:00+00:00 |
| cisco-sa-ise-multiple-vulns-o9beswjh | Cisco Identity Services Engine Reflected Cross-Site Scripting and Information Disclosure Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-12-04T14:23:54+00:00 |
| cisco-sa-cc-unauth-rce-qen8h7mq | Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-11-13T12:48:42+00:00 |
| cisco-sa-cc-mult-vuln-gk4tfxsn | Multiple Cisco Contact Center Products Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-11-18T14:49:09+00:00 |
| cisco-sa-snort3-mime-vulns-ttl8pgvh | Multiple Cisco Products Snort 3 MIME Denial of Service Vulnerabilities | 2025-10-15T16:00:00+00:00 | 2026-02-12T18:38:13+00:00 |
| cisco-sa-roomos-inf-disc-qggsbxam | Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-phone-dos-fpyjlv7a | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-cv-xss-rwrakaj9 | Cisco Cyber Vision Center Stored Cross-Site Scripting Vulnerabilities | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-cucm-stored-xss-fnj66yly | Cisco Unified Communications Manager Stored Cross-Site Scripting Vulnerability | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-http-code-exec-wmfp3h3o | Cisco Secure Firewall Adaptive Security Appliance Software, Secure Firewall Threat Defense Software, IOS Software, IOS XE Software, and IOS XR Software Web Services Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:51+00:00 |
| cisco-sa-asaftd-webvpn-z5xp8eub | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:54+00:00 |
| cisco-sa-asaftd-webvpn-yrootuw | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Unauthorized Access Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:55+00:00 |
| cisco-sa-webui-xss-vwydgjou | Cisco IOS XE Software Web Authentication Reflected Cross-Site Scripting Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:50+00:00 |
| cisco-sa-snmpwred-x3mjyf5m | Cisco IOS XE Software Simple Network Management Protocol Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-snmp-x4lphte | Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-06T18:27:02+00:00 |
| cisco-sa-secboot-uqfd8avc | Cisco IOS XE Software Secure Boot Bypass Vulnerabilities | 2025-09-24T16:00:00+00:00 | 2025-10-15T15:57:29+00:00 |
| cisco-sa-nbar-dos-lavwtmet | Cisco IOS XE Software Network-Based Application Recognition Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-27144 | Miscompilation allows memory corruption via CONVNOP-wrapped array copy in cmd/compile | 2026-04-02T00:00:00.000Z | 2026-04-11T01:08:48.000Z |
| msrc_cve-2026-27143 | Missing bound checks can lead to memory corruption in safe Go in cmd/compile | 2026-04-02T00:00:00.000Z | 2026-04-11T01:09:42.000Z |
| msrc_cve-2026-27140 | Code execution vulnerability in SWIG code generation in cmd/go | 2026-04-02T00:00:00.000Z | 2026-04-11T01:10:08.000Z |
| msrc_cve-2026-23473 | io_uring/poll: fix multishot recv missing EOF on wakeup race | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:05.000Z |
| msrc_cve-2026-23472 | serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:10.000Z |
| msrc_cve-2026-23468 | drm/amdgpu: Limit BO list entry count to prevent resource exhaustion | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:20.000Z |
| msrc_cve-2026-23444 | wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:15.000Z |
| msrc_cve-2026-23442 | ipv6: add NULL checks for idev in SRv6 paths | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:25.000Z |
| msrc_cve-2026-23411 | apparmor: fix race between freeing data and fs accessing it | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:58.000Z |
| msrc_cve-2026-23410 | apparmor: fix race on rawdata dereference | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:51.000Z |
| msrc_cve-2026-23409 | apparmor: fix differential encoding verification | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:45.000Z |
| msrc_cve-2026-23408 | apparmor: Fix double free of ns_name in aa_replace_profiles() | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:39.000Z |
| msrc_cve-2026-23407 | apparmor: fix missing bounds check on DEFAULT table in verify_dfa() | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:33.000Z |
| msrc_cve-2026-23406 | apparmor: fix side-effect bug in match_char() macro usage | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:27.000Z |
| msrc_cve-2026-23405 | apparmor: fix: limit the number of levels of policy namespaces | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:21.000Z |
| msrc_cve-2026-23404 | apparmor: replace recursive profile removal with iterative approach | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:14.000Z |
| msrc_cve-2026-23403 | apparmor: fix memory leak in verify_header | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:07.000Z |
| msrc_cve-2026-23401 | KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE | 2026-04-02T00:00:00.000Z | 2026-04-03T01:39:03.000Z |
| msrc_cve-2026-32194 | Microsoft Bing Images Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-19T07:00:00.000Z |
| msrc_cve-2026-32191 | Microsoft Bing Images Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-19T07:00:00.000Z |
| msrc_cve-2026-32187 | Microsoft Edge (Chromium-based) Defense in Depth Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-27T07:00:00.000Z |
| msrc_cve-2026-32169 | Azure Cloud Shell Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-19T07:00:00.000Z |
| msrc_cve-2026-26148 | Microsoft Azure AD SSH Login extension for Linux Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-11T07:00:00.000Z |
| msrc_cve-2026-26144 | Microsoft Excel Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26141 | Hybrid Worker Extension (Arc‑enabled Windows VMs) Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26139 | Microsoft Purview Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-19T07:00:00.000Z |
| msrc_cve-2026-26138 | Microsoft Purview Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-19T07:00:00.000Z |
| msrc_cve-2026-26137 | Microsoft Exchange Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-26T07:00:00.000Z |
| msrc_cve-2026-26136 | Microsoft Copilot Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-19T07:00:00.000Z |
| msrc_cve-2026-26134 | Microsoft Office Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0050 | Kwetsbaarheid verholpen in PEAR | 2026-02-09T10:41:43.856342Z | 2026-02-09T10:41:43.856342Z |
| ncsc-2026-0049 | Kwetsbaarheden verholpen in n8n | 2026-02-09T10:39:40.792744Z | 2026-02-09T10:39:40.792744Z |
| ncsc-2026-0048 | Kwetsbaarheid verholpen in BeyondTrust Remote Support | 2026-02-09T10:27:57.867529Z | 2026-02-13T12:54:32.614217Z |
| ncsc-2026-0047 | Kwetsbaarheid verholpen in Fortinet FortiClient EMS | 2026-02-09T10:16:18.048622Z | 2026-03-30T11:36:22.656910Z |
| ncsc-2026-0046 | Kwetsbaarheden verholpen in Samsung mobile | 2026-02-09T07:48:28.751473Z | 2026-02-09T07:48:28.751473Z |
| ncsc-2026-0045 | Kwetsbaarheid verholpen in Cisco Meeting Management | 2026-02-06T09:22:16.831778Z | 2026-02-06T09:22:16.831778Z |
| ncsc-2026-0044 | Kwetsbaarheid verholpen in Cisco TelePresence Collaboration Endpoint | 2026-02-06T09:20:11.629058Z | 2026-02-06T09:20:11.629058Z |
| ncsc-2026-0043 | Zeroday-kwetsbaarheden verholpen in Ivanti Endpoint Manager Mobile | 2026-01-29T19:15:04.575371Z | 2026-02-20T14:47:02.047999Z |
| ncsc-2026-0042 | Kwetsbaarheden verholpen in SolarWinds Web Help Desk | 2026-01-28T16:37:21.114054Z | 2026-02-02T09:47:54.857445Z |
| ncsc-2026-0041 | Kwetsbaarheid verholpen in Fortinet producten | 2026-01-28T09:32:41.752905Z | 2026-01-28T09:32:41.752905Z |
| ncsc-2026-0040 | Kwetsbaarheid verholpen in SmarterTools SmarterMail | 2026-01-27T10:51:39.476320Z | 2026-02-06T09:25:57.008166Z |
| ncsc-2026-0039 | ZeroDay kwetsbaarheid verholpen in Microsoft Office | 2026-01-27T07:27:52.867415Z | 2026-01-27T07:27:52.867415Z |
| ncsc-2026-0038 | Kwetsbaarheid verholpen in BIND 9 | 2026-01-23T08:54:43.506215Z | 2026-01-23T08:54:43.506215Z |
| ncsc-2026-0037 | Kwetsbaarheden verholpen in GitLab Community Edition en Enterprise Edition | 2026-01-22T12:35:30.505659Z | 2026-01-22T12:35:30.505659Z |
| ncsc-2026-0036 | Kwetsbaarheden verholpen in Cisco Unified Communications producten | 2026-01-22T09:49:39.156365Z | 2026-01-22T09:49:39.156365Z |
| ncsc-2026-0035 | Kwetsbaarheid verholpen in Palo Alto Networks PAN-OS | 2026-01-22T09:22:36.433609Z | 2026-01-22T09:22:36.433609Z |
| ncsc-2026-0034 | Kwetsbaarheden verholpen in Atlassian producten | 2026-01-22T09:03:42.667958Z | 2026-01-22T09:03:42.667958Z |
| ncsc-2026-0033 | Kwetsbaarheid verholpen in GNU Inetutils telnetd | 2026-01-21T14:15:46.424529Z | 2026-01-21T14:15:46.424529Z |
| ncsc-2026-0032 | Kwetsbaarheden verholpen in Oracle MySQL | 2026-01-21T10:12:24.844869Z | 2026-01-21T10:12:24.844869Z |
| ncsc-2026-0031 | Kwetsbaarheden verholpen in Oracle JD Edwards | 2026-01-21T10:12:00.674214Z | 2026-01-21T10:12:00.674214Z |
| ncsc-2026-0030 | Kwetsbaarheden verholpen in Oracle Java | 2026-01-21T10:11:39.759123Z | 2026-01-21T10:11:39.759123Z |
| ncsc-2026-0029 | Kwetsbaarheden verholpen in Oracle Hyperion | 2026-01-21T10:10:46.297433Z | 2026-01-21T10:10:46.297433Z |
| ncsc-2026-0028 | Kwetsbaarheden verholpen in Oracle Analytics | 2026-01-21T10:10:15.985753Z | 2026-01-21T10:10:15.985753Z |
| ncsc-2026-0027 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2026-01-21T10:08:59.379774Z | 2026-01-21T10:08:59.379774Z |
| ncsc-2026-0026 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2026-01-21T10:06:27.920991Z | 2026-01-21T10:06:27.920991Z |
| ncsc-2026-0025 | Kwetsbaarheden verholpen in Oracle Financial Services | 2026-01-21T09:55:33.889125Z | 2026-01-21T09:55:33.889125Z |
| ncsc-2026-0024 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2026-01-21T09:29:38.334428Z | 2026-01-21T09:29:38.334428Z |
| ncsc-2026-0023 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2026-01-21T09:27:58.715578Z | 2026-01-21T09:27:58.715578Z |
| ncsc-2026-0022 | Kwetsbaarheden verholpen in Oracle Communications producten | 2026-01-21T09:25:39.876330Z | 2026-01-21T09:25:39.876330Z |
| ncsc-2026-0021 | Kwetsbaarheden verholpen in Oracle Database Server producten | 2026-01-21T09:19:00.000449Z | 2026-01-21T09:19:00.000449Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2019:2-01 | CSV Injection on node label | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019:1-01 | Stored XSS in field name data model | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10479-1 | python312-3.12.13-4.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10478-1 | python311-3.11.15-4.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10477-1 | python310-3.10.20-3.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10476-1 | python311-Pygments-2.20.0-2.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10475-1 | opensc-0.27.1-1.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10474-1 | ignition-2.26.0-3.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10473-1 | dnsdist-2.0.3-1.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10472-1 | conftest-0.67.1-2.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:20451-1 | Security update for gnome-online-accounts, gvfs | 2026-03-31T09:11:58Z | 2026-03-31T09:11:58Z |
| opensuse-su-2026:10471-1 | tinyproxy-1.11.3-2.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10470-1 | libXvnc-devel-1.16.1-2.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10469-1 | python315-3.15.0~a7-3.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10468-1 | python311-ecdsa-0.19.2-1.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10467-1 | ovmf-202602-6.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10466-1 | expat-2.7.5-1.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10465-1 | ImageMagick-7.1.2.18-2.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:20449-1 | Security update for postgresql13 | 2026-03-30T15:14:07Z | 2026-03-30T15:14:07Z |
| opensuse-su-2026:20448-1 | Security update for expat | 2026-03-30T14:59:16Z | 2026-03-30T14:59:16Z |
| opensuse-su-2026:20446-1 | Security update for gnutls | 2026-03-30T14:36:07Z | 2026-03-30T14:36:07Z |
| opensuse-su-2026:20447-1 | Security update for postgresql16 | 2026-03-30T14:27:44Z | 2026-03-30T14:27:44Z |
| opensuse-su-2026:20444-1 | Security update for tomcat10 | 2026-03-30T08:13:22Z | 2026-03-30T08:13:22Z |
| opensuse-su-2026:10464-1 | python311-pypdf-6.9.2-1.1 on GA media | 2026-03-30T00:00:00Z | 2026-03-30T00:00:00Z |
| opensuse-su-2026:10463-1 | netty-4.1.132-1.1 on GA media | 2026-03-30T00:00:00Z | 2026-03-30T00:00:00Z |
| opensuse-su-2026:10462-1 | heroic-games-launcher-2.20.1-4.1 on GA media | 2026-03-30T00:00:00Z | 2026-03-30T00:00:00Z |
| opensuse-su-2026:10461-1 | python311-nltk-3.9.4-1.1 on GA media | 2026-03-29T00:00:00Z | 2026-03-29T00:00:00Z |
| opensuse-su-2026:10460-1 | gdk-pixbuf-loader-libheif-1.21.2-2.1 on GA media | 2026-03-29T00:00:00Z | 2026-03-29T00:00:00Z |
| opensuse-su-2026:10459-1 | freerdp2-2.11.7-6.1 on GA media | 2026-03-29T00:00:00Z | 2026-03-29T00:00:00Z |
| opensuse-su-2026:10458-1 | MozillaFirefox-149.0-1.1 on GA media | 2026-03-29T00:00:00Z | 2026-03-29T00:00:00Z |
| opensuse-su-2026:10457-1 | xen-4.21.1_02-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10456-1 | tailscale-1.96.4-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:6940 | Red Hat Security Advisory: kernel security update | 2026-04-08T01:16:31+00:00 | 2026-04-08T19:38:57+00:00 |
| rhsa-2026:6949 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-04-08T00:41:20+00:00 | 2026-04-10T21:16:56+00:00 |
| rhsa-2026:6948 | Red Hat Security Advisory: kernel-rt security update | 2026-04-08T00:16:20+00:00 | 2026-04-08T19:37:01+00:00 |
| rhsa-2026:6918 | Red Hat Security Advisory: freerdp security update | 2026-04-07T23:16:15+00:00 | 2026-04-08T13:34:39+00:00 |
| rhsa-2026:6915 | Red Hat Security Advisory: vim security update | 2026-04-07T22:55:41+00:00 | 2026-04-10T14:25:22+00:00 |
| rhsa-2026:6923 | Red Hat Security Advisory: nginx:1.24 security update | 2026-04-07T21:43:30+00:00 | 2026-04-10T01:26:13+00:00 |
| rhsa-2026:6917 | Red Hat Security Advisory: thunderbird security update | 2026-04-07T21:38:05+00:00 | 2026-04-07T22:30:13+00:00 |
| rhsa-2026:6926 | Red Hat Security Advisory: Red Hat Quay 3.9.20 | 2026-04-07T21:36:48+00:00 | 2026-04-10T16:29:21+00:00 |
| rhsa-2026:6907 | Red Hat Security Advisory: nginx:1.24 security update | 2026-04-07T20:50:40+00:00 | 2026-04-10T01:26:14+00:00 |
| rhsa-2026:6906 | Red Hat Security Advisory: nginx security update | 2026-04-07T18:43:59+00:00 | 2026-04-10T01:26:15+00:00 |
| rhsa-2026:6912 | Red Hat Security Advisory: Red Hat Quay 3.10.20 | 2026-04-07T17:36:52+00:00 | 2026-04-10T16:29:19+00:00 |
| rhsa-2026:6911 | Red Hat Security Advisory: OpenShift Container Platform 4.12 ztp-site-generate container | 2026-04-07T17:05:45+00:00 | 2026-04-10T21:19:44+00:00 |
| rhsa-2026:6825 | Red Hat Security Advisory: rsync security update | 2026-04-07T16:44:04+00:00 | 2026-04-09T14:38:01+00:00 |
| rhsa-2026:6817 | Red Hat Security Advisory: capstone security update | 2026-04-07T16:41:54+00:00 | 2026-04-08T14:07:16+00:00 |
| rhsa-2026:6888 | Red Hat Security Advisory: microcode_ctl security update | 2026-04-07T16:08:19+00:00 | 2026-04-07T22:30:18+00:00 |
| rhsa-2026:6802 | Red Hat Security Advisory: Red Hat Developer Hub 1.9.3 release. | 2026-04-07T13:22:11+00:00 | 2026-04-10T15:10:09+00:00 |
| rhsa-2026:6799 | Red Hat Security Advisory: freerdp security update | 2026-04-07T12:25:28+00:00 | 2026-04-08T13:34:41+00:00 |
| rhsa-2026:6766 | Red Hat Security Advisory: python3.9 security update | 2026-04-07T11:27:43+00:00 | 2026-04-11T01:47:21+00:00 |
| rhsa-2026:6764 | Red Hat Security Advisory: freerdp security update | 2026-04-07T09:50:18+00:00 | 2026-04-09T14:38:12+00:00 |
| rhsa-2026:6762 | Red Hat Security Advisory: Red Hat AI Inference Server 3.2.2 (ROCm) | 2026-04-07T08:45:04+00:00 | 2026-04-08T13:34:47+00:00 |
| rhsa-2026:6761 | Red Hat Security Advisory: Red Hat AI Inference Server Model Optimization Tools 3.2.2 (CUDA) | 2026-04-07T08:44:07+00:00 | 2026-04-08T13:34:49+00:00 |
| rhsa-2026:6750 | Red Hat Security Advisory: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update | 2026-04-07T08:25:32+00:00 | 2026-04-10T08:47:37+00:00 |
| rhsa-2026:6738 | Red Hat Security Advisory: gnutls security update | 2026-04-07T08:14:17+00:00 | 2026-04-09T20:36:56+00:00 |
| rhsa-2026:6737 | Red Hat Security Advisory: gnutls security update | 2026-04-07T08:03:13+00:00 | 2026-04-09T20:36:58+00:00 |
| rhsa-2026:6743 | Red Hat Security Advisory: freerdp security update | 2026-04-07T07:47:22+00:00 | 2026-04-08T13:34:42+00:00 |
| rhsa-2026:6736 | Red Hat Security Advisory: vim security update | 2026-04-07T07:05:02+00:00 | 2026-04-10T14:25:25+00:00 |
| rhsa-2026:6731 | Red Hat Security Advisory: vim security update | 2026-04-07T06:48:02+00:00 | 2026-04-10T14:25:25+00:00 |
| rhsa-2026:6729 | Red Hat Security Advisory: vim security update | 2026-04-07T06:25:37+00:00 | 2026-04-10T14:25:24+00:00 |
| rhsa-2026:6727 | Red Hat Security Advisory: freerdp security update | 2026-04-07T06:25:32+00:00 | 2026-04-08T13:34:42+00:00 |
| rhsa-2026:6730 | Red Hat Security Advisory: vim security update | 2026-04-07T06:20:17+00:00 | 2026-04-10T14:25:24+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2024-317-01 | PowerLogic PM5300 Series | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-282-05 | EcoStruxure™ Power Monitoring Expert (PME) | 2024-10-08T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2024-282-08 | EcoStruxure EV Charging Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-07 | System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-06 | Zelio Soft 2 | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-04 | EVlink Home Smart and Schneider Charge | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-03 | Easergy Studio | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-02 | Harmony iPC – HMIBSC IIoT Edge Box Core | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-01 | Data Center Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-254-02 | EcoStruxure™ Power Monitoring Expert and EcoStruxure™ Power Operation or EcoStruxure™ Power SCADA Operation with Advanced Reporting and Dashboards | 2024-09-10T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2024-254-01 | Vijeo Designer | 2024-09-10T00:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2024-226-02 | EcoStruxure™ Machine SCADA Expert / BLUE Open Studio | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2024-226-01 | Accutech Manager | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2024-191-04 | Modicon Controllers M241/ M251, M258 / LMC058 and M262 | 2024-07-09T00:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2024-191-03 | EcoStruxure Foxboro SCADA FoxRTU Station | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-191-02 | EcoStruxureTM Foxboro DCS Core Control Services | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-191-01 | Wiser Home Controller WHC-5918A | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-163-05 | SAGE RTU | 2024-06-11T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-163-04 | SpaceLogic AS-P and AS-B Automation Servers | 2024-06-11T00:00:00.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2024-163-03 | EVlink Home Smart | 2024-06-11T00:00:00.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2024-163-02 | PowerLogic P5 | 2024-06-11T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2024-163-01 | Modicon M340, Modbus/TCP Ethernet Modicon M340 module, and Modbus/TCP Ethernet Modicon M340 FactoryCast module | 2024-06-11T00:00:00.000Z | 2025-08-12T04:00:00.000Z |
| sevd-2024-100-01 | Easergy Studio | 2024-04-09T00:00:00.000Z | 2024-04-09T00:00:00.000Z |
| sevd-2024-072-01 | Easergy T200 Multiple Vulnerabilities | 2024-03-12T07:02:04.000Z | 2024-03-12T07:02:04.000Z |
| sevd-2024-072-02 | EcoStruxure Power Design - Ecodial | 2024-03-12T05:00:00.000Z | 2024-03-12T05:00:00.000Z |
| sevd-2024-044-01 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon M340, M580 and M580 Safety PLCs | 2024-02-13T12:41:43.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-044-03 | EcoStruxure IT Gateway | 2024-02-13T12:21:44.000Z | 2024-02-13T12:21:44.000Z |
| sevd-2024-044-02 | Harmony Relay NFC | 2024-02-13T04:05:07.000Z | 2024-02-13T04:05:07.000Z |
| sevd-2024-009-02 | Easergy Studio | 2024-01-09T14:51:40.000Z | 2024-01-09T14:51:40.000Z |
| sevd-2023-346-03 | Easy UPS Online Monitoring Software | 2023-12-12T00:00:00.000Z | 2023-12-12T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2020-0002 | Vulnerabilities in SICK Package Analytics | 2020-08-07T10:00:00.000Z | 2020-07-28T10:00:00.000Z |
| sca-2020-0001 | Security Information Regarding "Profile Programming" | 2020-05-31T10:00:00.000Z | 2020-05-31T10:00:00.000Z |
| sca-2019-0002 | Vulnerability in SICK FX0-GENT00000 and SICK FX0-GPNT00000 | 2019-09-20T10:00:00.000Z | 2019-09-20T10:00:00.000Z |
| sca-2019-0001 | MSC800 affected by hard-coded credentials vulnerability | 2019-06-21T10:00:00.000Z | 2019-06-21T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-894058 | SSA-894058: Improper Bandwidth Limitation of Network Packets Over Local USB Port Vulnerability in SIPROTEC 5 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-769791 | SSA-769791: Local Arbitrary Code Execution Vulnerability in COMOS Before V10.6 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-707630 | SSA-707630: Multiple Vulnerabilities in SIMATIC RTLS Locating Manager Before V3.3 | 2025-08-12T00:00:00Z | 2025-08-26T00:00:00Z |
| ssa-693808 | SSA-693808: Deserialization Vulnerability in Siemens Engineering Platforms | 2025-08-12T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-674084 | SSA-674084: File Parsing Vulnerabilities in Simcenter Femap Before V2506 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-665108 | SSA-665108: Arbitrary File Upload Vulnerability in RUGGEDCOM ROX II | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-613116 | SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1 | 2025-08-12T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-529291 | SSA-529291: Information Disclosure Vulnerabilities in SICAM Q100/Q200 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-517338 | SSA-517338: Multiple Vulnerabilities in SINEC Traffic Analyzer Before V3.0 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-493787 | SSA-493787: Arbitrary Code Execution Vulnerability in SIMATIC RTLS Locating Manager Before V3.2 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-493396 | SSA-493396: Deserialization Vulnerability in Siemens Engineering Platforms | 2025-08-12T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-400089 | SSA-400089: Denial of Service Vulnerability in SIPROTEC 4 and SIPROTEC 4 Compact | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-382999 | SSA-382999: Multiple Vulnerabilities in Opcenter Quality Before V2506 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-355557 | SSA-355557: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.2 | 2025-08-12T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-331739 | SSA-331739: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting Siemens Products | 2025-08-12T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-282044 | SSA-282044: DLL Hijacking Vulnerability in Siemens Web Installer used by the Online Software Delivery | 2025-08-12T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-186293 | SSA-186293: XML External Entity (XXE) Injection Vulnerability in SIMOTION SCOUT, SIMOTION SCOUT TIA and SINAMICS STARTER | 2025-08-12T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-177847 | SSA-177847: Improper VNC Password Check Vulnerability in SINUMERIK Controllers | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-094954 | SSA-094954: Authentication Bypass Vulnerability in BIST mode of RUGGEDCOM ROX II | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-028723 | SSA-028723: Multiple OpenSSL Vulnerabilities in BFCClient Before V2.17 | 2025-08-12T00:00:00Z | 2025-08-13T00:00:00Z |
| ssa-938066 | SSA-938066: Remote Code Execution Vulnerability in SENTRON Powermanager and Desigo CC | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-904646 | SSA-904646: Sensitive Data Exposure Vulnerability in SIPROTEC 5 Devices | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-626991 | SSA-626991: Denial of Service Vulnerability in SIMATIC CN 4100 before V4.0 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-573669 | SSA-573669: Multiple Vulnerabilities in TIA Administrator Before V3.0.6 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-460466 | SSA-460466: Denial of Service Vulnerability in TIA Project-Server and TIA Portal | 2025-07-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-183963 | SSA-183963: Certificate Validation Vulnerabilities in SICAM TOOLBOX II Before V07.11 | 2025-07-08T00:00:00Z | 2025-07-18T00:00:00Z |
| ssa-091753 | SSA-091753: Multiple Vulnerabilities in Solid Edge Before SE2025 Update 5 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-083019 | SSA-083019: Multiple Vulnerabilities in RUGGEDCOM ROS Devices | 2025-07-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-078892 | SSA-078892: Multiple Vulnerabilities in SINEC NMS Before V4.0 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-627195 | SSA-627195: Zip Path Traversal Vulnerability in Mendix Studio Pro's Module Installation Process | 2025-06-12T00:00:00Z | 2025-07-08T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20995-1 | Security update for dnsdist | 2026-04-02T09:16:22Z | 2026-04-02T09:16:22Z |
| suse-su-2026:1171-1 | Security update for python-tornado | 2026-04-02T08:56:19Z | 2026-04-02T08:56:19Z |
| suse-su-2026:1170-1 | Security update for perl-Crypt-URandom | 2026-04-02T08:42:05Z | 2026-04-02T08:42:05Z |
| suse-su-2026:1169-1 | Security update for wireshark | 2026-04-02T08:29:30Z | 2026-04-02T08:29:30Z |
| suse-su-2026:1166-1 | Security update for expat | 2026-04-02T01:08:26Z | 2026-04-02T01:08:26Z |
| suse-su-2026:20993-1 | Security update for perl-XML-Parser | 2026-04-01T16:24:24Z | 2026-04-01T16:24:24Z |
| suse-su-2026:20992-1 | Security update for python-Pillow | 2026-04-01T14:58:21Z | 2026-04-01T14:58:21Z |
| suse-su-2026:1165-1 | Security update for freerdp | 2026-04-01T13:40:57Z | 2026-04-01T13:40:57Z |
| suse-su-2026:1164-1 | Security update for freerdp2 | 2026-04-01T13:40:49Z | 2026-04-01T13:40:49Z |
| suse-su-2026:20960-1 | Security update for python-pyOpenSSL | 2026-04-01T10:05:58Z | 2026-04-01T10:05:58Z |
| suse-su-2026:20959-1 | Security update for tar | 2026-04-01T10:05:58Z | 2026-04-01T10:05:58Z |
| suse-su-2026:20955-1 | Security update for tar | 2026-04-01T09:39:25Z | 2026-04-01T09:39:25Z |
| suse-su-2026:20954-1 | Security update for python-pyOpenSSL | 2026-04-01T09:35:43Z | 2026-04-01T09:35:43Z |
| suse-su-2026:20989-1 | Security update for kea | 2026-04-01T09:22:53Z | 2026-04-01T09:22:53Z |
| suse-su-2026:1163-1 | Security update for MozillaThunderbird | 2026-04-01T08:49:11Z | 2026-04-01T08:49:11Z |
| suse-su-2026:1162-1 | Security update for python-tornado | 2026-03-31T22:02:18Z | 2026-03-31T22:02:18Z |
| suse-su-2026:1160-1 | Security update for freerdp | 2026-03-31T15:03:59Z | 2026-03-31T15:03:59Z |
| suse-su-2026:1159-1 | Security update for expat | 2026-03-31T15:03:48Z | 2026-03-31T15:03:48Z |
| suse-su-2026:1158-1 | Security update for python-pyasn1 | 2026-03-31T11:55:53Z | 2026-03-31T11:55:53Z |
| suse-su-2026:20951-1 | Security update for python311 | 2026-03-31T09:13:02Z | 2026-03-31T09:13:02Z |
| suse-su-2026:20988-1 | Security update for gnome-online-accounts, gvfs | 2026-03-31T09:08:21Z | 2026-03-31T09:08:21Z |
| suse-su-2026:20956-1 | Security update for python311 | 2026-03-31T09:07:43Z | 2026-03-31T09:07:43Z |
| suse-su-2026:1154-1 | Security update for libjxl | 2026-03-31T09:04:47Z | 2026-03-31T09:04:47Z |
| suse-su-2026:0227-2 | Security update for net-snmp | 2026-03-31T08:48:04Z | 2026-03-31T08:48:04Z |
| suse-su-2026:1153-1 | Security update for perl-XML-Parser | 2026-03-31T08:40:07Z | 2026-03-31T08:40:07Z |
| suse-su-2026:1152-1 | Security update for perl-XML-Parser | 2026-03-31T08:28:50Z | 2026-03-31T08:28:50Z |
| suse-su-2026:1150-1 | Security update for webkit2gtk3 | 2026-03-30T17:34:50Z | 2026-03-30T17:34:50Z |
| suse-su-2026:20986-1 | Security update for postgresql13 | 2026-03-30T15:24:20Z | 2026-03-30T15:24:20Z |
| suse-su-2026:20985-1 | Security update for expat | 2026-03-30T15:01:10Z | 2026-03-30T15:01:10Z |
| suse-su-2026:20963-1 | Security update for expat | 2026-03-30T15:01:10Z | 2026-03-30T15:01:10Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:4728 | Important: libpng security update | 2026-03-17T00:00:00Z | 2026-03-19T12:37:34Z |
| alsa-2026:4723 | Moderate: kernel security update | 2026-03-17T00:00:00Z | 2026-03-19T14:50:26Z |
| alsa-2026:4717 | Moderate: opencryptoki security update | 2026-03-17T00:00:00Z | 2026-03-19T15:03:25Z |
| alsa-2026:4715 | Moderate: vim security update | 2026-03-17T00:00:00Z | 2026-03-20T07:17:19Z |
| alsa-2026:4713 | Moderate: python3.12 security update | 2026-03-17T00:00:00Z | 2026-03-19T14:56:58Z |
| alsa-2026:4705 | Moderate: nginx security update | 2026-03-17T00:00:00Z | 2026-03-19T12:47:53Z |
| alsa-2026:4672 | Important: container-tools:rhel8 security update | 2026-03-17T00:00:00Z | 2026-03-17T10:17:22Z |
| alsa-2026:4649 | Moderate: grub2 security update | 2026-03-16T00:00:00Z | 2026-03-19T15:01:35Z |
| alsa-2026:4648 | Moderate: grub2 security update | 2026-03-16T00:00:00Z | 2026-03-17T10:24:06Z |
| alsa-2026:4629 | Important: libvpx security update | 2026-03-16T00:00:00Z | 2026-03-19T12:45:22Z |
| alsa-2026:4473 | Moderate: python3.11 security update | 2026-03-12T00:00:00Z | 2026-03-19T12:33:18Z |
| alsa-2026:4472 | Moderate: compat-openssl11 security update | 2026-03-12T00:00:00Z | 2026-03-16T16:49:36Z |
| alsa-2026:4463 | Moderate: python3.12 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:03:59Z |
| alsa-2026:4458 | Important: .NET 10.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:14:44Z |
| alsa-2026:4456 | Important: .NET 9.0 security update | 2026-03-12T00:00:00Z | 2026-03-16T16:41:08Z |
| alsa-2026:4455 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:11:49Z |
| alsa-2026:4454 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:17:27Z |
| alsa-2026:4453 | Important: .NET 10.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:32:40Z |
| alsa-2026:4451 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:34:29Z |
| alsa-2026:4450 | Important: .NET 9.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:36:54Z |
| alsa-2026:4447 | Important: libvpx security update | 2026-03-12T00:00:00Z | 2026-03-16T16:46:00Z |
| alsa-2026:4445 | Important: .NET 10.0 security update | 2026-03-12T00:00:00Z | 2026-03-16T16:52:17Z |
| alsa-2026:4443 | Important: .NET 9.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:01:07Z |
| alsa-2026:4442 | Moderate: vim security update | 2026-03-12T00:00:00Z | 2026-03-12T14:47:41Z |
| alsa-2026:4306 | Important: mingw-libpng security update | 2026-03-11T00:00:00Z | 2026-03-13T12:35:26Z |
| alsa-2026:4235 | Moderate: nginx:1.26 security update | 2026-03-10T00:00:00Z | 2026-03-11T11:13:12Z |
| alsa-2026:4216 | Moderate: python3.11 security update | 2026-03-10T00:00:00Z | 2026-03-13T09:19:57Z |
| alsa-2026:4188 | Moderate: gnutls security update | 2026-03-10T00:00:00Z | 2026-03-13T09:21:59Z |
| alsa-2026:4177 | Important: opentelemetry-collector security update | 2026-03-10T00:00:00Z | 2026-03-13T09:23:39Z |
| alsa-2026:4174 | Important: opentelemetry-collector security update | 2026-03-10T00:00:00Z | 2026-03-11T17:46:34Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2026-74 | Heap-buffer-overflow in ___interceptor_strtol | 2026-01-17T00:19:48.575833Z | 2026-01-17T00:19:48.576151Z |
| osv-2026-57 | Heap-buffer-overflow in mkv::matroska_segment_c::TrackInit | 2026-01-15T00:19:47.203374Z | 2026-01-15T00:19:47.203695Z |
| osv-2026-55 | Use-of-uninitialized-value in vp9_quantize_fp_avx2 | 2026-01-15T00:19:29.465463Z | 2026-01-15T00:19:29.465794Z |
| osv-2026-54 | Heap-use-after-free in _dwarf_exec_frame_instr | 2026-01-15T00:17:17.477757Z | 2026-01-15T00:17:17.478056Z |
| osv-2026-53 | Heap-use-after-free in graph::LigatureSubstFormat1::shrink | 2026-01-15T00:16:26.117926Z | 2026-01-15T00:16:26.118291Z |
| osv-2026-30 | Use-of-uninitialized-value in vp9_quantize_fp_avx2 | 2026-01-11T00:08:32.391680Z | 2026-01-11T00:08:32.392050Z |
| osv-2026-21 | Use-of-uninitialized-value in processTLSBlock | 2026-01-09T00:20:25.200679Z | 2026-01-09T00:20:25.201303Z |
| osv-2026-2 | Heap-buffer-overflow in cmt_mpack_consume_uint_tag | 2026-01-03T00:15:15.907754Z | 2026-01-03T00:15:15.908130Z |
| osv-2025-1049 | Heap-buffer-overflow in unsigned char* std::__1::vector<unsigned char, std::__1::allocator<unsigned char | 2025-12-31T00:18:06.669541Z | 2025-12-31T00:18:06.670109Z |
| osv-2025-1039 | UNKNOWN WRITE in fuzz_regexp | 2025-12-29T00:18:31.417791Z | 2025-12-29T00:18:31.418390Z |
| osv-2025-1020 | Heap-buffer-overflow in mmcall | 2025-12-25T00:17:49.020029Z | 2025-12-25T00:17:49.020471Z |
| osv-2025-1018 | Stack-buffer-overflow in lre_exec | 2025-12-25T00:02:56.807884Z | 2025-12-25T00:02:56.808867Z |
| osv-2025-1016 | Use-of-uninitialized-value in js_create_function | 2025-12-24T00:15:30.844439Z | 2025-12-24T00:15:30.844983Z |
| osv-2025-1004 | Security exception in com.code_intelligence.jazzer.sanitizers.RegexInjection.hookInternal | 2025-12-21T00:18:27.214786Z | 2025-12-21T00:18:27.215115Z |
| osv-2025-1001 | Dynamic-stack-buffer-overflow in _ox_err_set_with_location | 2025-12-21T00:04:56.743119Z | 2025-12-21T00:04:56.743638Z |
| osv-2025-994 | Heap-buffer-overflow in rx_icmp | 2025-12-18T00:00:43.710332Z | 2025-12-21T14:32:46.078182Z |
| osv-2025-989 | Bad-cast to UT_hash_bucket' (aka 'struct UT_hash_bucket')password_file__cleanup | 2025-12-17T00:01:12.806838Z | 2025-12-17T00:01:12.807184Z |
| osv-2025-983 | Dynamic-stack-buffer-overflow in _ox_err_set_with_location | 2025-12-14T00:14:21.963982Z | 2025-12-14T00:14:21.964726Z |
| osv-2025-970 | Heap-buffer-overflow in check_sync_pes | 2025-12-05T00:18:22.703657Z | 2025-12-05T00:18:22.704029Z |
| osv-2025-965 | Stack-use-after-scope in Assimp::FBX::FBXExportProperty::FBXExportProperty | 2025-12-04T00:10:11.975493Z | 2025-12-04T00:10:11.975920Z |
| osv-2025-959 | Heap-buffer-overflow in re_parse_term | 2025-11-29T00:18:54.036831Z | 2025-11-29T00:18:54.037236Z |
| osv-2025-955 | Use-of-uninitialized-value in decoder_context::construct_reference_picture_lists | 2025-11-29T00:15:46.812919Z | 2025-11-29T00:15:46.813402Z |
| osv-2025-938 | Use-of-uninitialized-value in comp_func_SourceOver_avx2 | 2025-11-23T00:03:38.943405Z | 2025-11-23T00:03:38.943780Z |
| osv-2025-932 | Heap-use-after-free in password_file__cleanup | 2025-11-22T00:01:32.642847Z | 2025-11-22T00:01:32.643269Z |
| osv-2025-926 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.statement | 2025-11-21T00:05:31.621567Z | 2025-11-21T00:05:31.621958Z |
| osv-2025-906 | Use-of-uninitialized-value in QImage::pixel | 2025-11-18T00:08:20.557059Z | 2025-11-18T00:08:20.557392Z |
| osv-2025-901 | Heap-use-after-free in apache::thrift::protocol::TCompactProtocolT<apache::thrift::transport::TMemoryBu | 2025-11-17T00:02:08.125421Z | 2025-11-17T00:02:08.125970Z |
| osv-2025-900 | Heap-buffer-overflow in DecodeFrame | 2025-11-15T00:18:33.800030Z | 2025-11-15T00:18:33.800379Z |
| osv-2025-890 | Heap-buffer-overflow in icalmemory_tmp_copy | 2025-11-10T00:03:23.954817Z | 2025-11-10T00:03:23.955223Z |
| osv-2025-884 | Heap-use-after-free in JS_DefineProperty | 2025-11-08T00:17:46.632315Z | 2025-11-08T00:17:46.633033Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0045 | Timing Side-Channel in AES-CCM Tag Verification in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0043 | Timing Side-Channel in AES-CCM Tag Verification in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0029 | Double-free and use-after-free for Hive | 2026-02-26T12:00:00Z | 2026-03-01T06:01:36Z |
| rustsec-2026-0028 | `tracing_checks` was removed from crates.io for transitively including malicious code | 2026-02-26T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0027 | `tracings` was removed from crates.io for malicious code | 2026-02-26T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0022 | Panic when dropping a `[Typed]Func::call_async` future | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0021 | Panic adding excessive fields to a `wasi:http/types.fields` instance | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0020 | Guest-controlled resource exhaustion in WASI implementations | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0019 | `tracing-check` was removed from crates.io for malicious code | 2026-02-24T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0018 | `rpc-check` was removed from crates.io for malicious code | 2026-02-24T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0017 | `clob-sdk` was removed from crates.io for malicious code | 2026-02-20T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0016 | `polymarkets-rs-clob-client` was removed from crates.io for malicious code | 2026-02-20T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0015 | `polymarkets-client-sdk` was removed from crates.io for malicious code | 2026-02-19T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0014 | `rpc-check` was removed from crates.io for malicious code | 2026-02-19T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0013 | Type confusion when accessing data from sublasses of subclasses of native types with `abi3` feature targeting Python 3.12 and up | 2026-02-18T12:00:00Z | 2026-02-23T07:15:28Z |
| rustsec-2026-0011 | `polymarket-client-sdks` was removed from crates.io for malicious code | 2026-02-13T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0012 | Unsoundness in opt-in ARMv8 assembly backend for `keccak` | 2026-02-12T12:00:00Z | 2026-02-20T04:00:15Z |
| rustsec-2026-0070 | Panic When Opening or Sealing on Export-Only Context | 2026-02-11T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0069 | Incorrect Length Encoding on KDF Export | 2026-02-11T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0025 | Panic in `libcrux-psq` on decryption of malformed AES-GCM ciphertext | 2026-02-08T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0010 | `polymarket-clients-sdk` was removed from crates.io for malicious code | 2026-02-06T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0071 | Nonce Reuse in HPKE Context | 2026-02-05T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0026 | Unnecessary clamping of seed reduces seed entropy to 251 bits | 2026-02-05T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0009 | Denial of Service via Stack Exhaustion | 2026-02-05T12:00:00Z | 2026-02-06T09:12:16Z |
| rustsec-2026-0072 | Missing Check for All-Zero X25519 Shared Secret | 2026-02-04T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0007 | Integer overflow in `BytesMut::reserve` | 2026-02-03T12:00:00Z | 2026-02-04T06:56:11Z |
| rustsec-2026-0008 | Potential undefined behavior when dereferencing Buf struct | 2026-02-02T12:00:00Z | 2026-02-05T06:08:13Z |
| rustsec-2026-0024 | Incorrect X25519 clamping check rejects all secrets on import | 2026-01-26T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0023 | X25519 secret validation did not check buffer length or clamping | 2026-01-26T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0006 | Wasmtime segfault or unused out-of-sandbox load with `f64.copysign` operator on x86-64 | 2026-01-26T12:00:00Z | 2026-01-30T05:41:11Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-grafana-2026-27877 | Public dashboards discloses all direct mode datasources | 2026-04-01T08:41:09.536Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27876 | RCE on Grafana via sqlExpressions | 2026-04-01T08:41:07.673Z | 2026-04-08T09:14:18.943Z |
| bit-appsmith-2026-34411 | Appsmith < 1.98 Unauthenticated Instance Configuration Disclosure via Management APIs | 2026-04-01T08:35:37.595Z | 2026-04-01T09:11:42.692Z |
| bit-gitlab-2026-2370 | Improper Handling of Parameters in GitLab | 2026-03-31T09:12:36.844Z | 2026-03-31T09:14:23.567Z |
| bit-mastodon-2026-33869 | Mastodon has a denial of service for quote authorization | 2026-03-31T08:45:37.827Z | 2026-03-31T09:14:23.567Z |
| bit-mastodon-2026-33868 | Mastodon has a GET-Based Open Redirect via '/web/%2F<domain>' | 2026-03-31T08:45:35.531Z | 2026-03-31T09:14:23.567Z |
| bit-prestashop-2026-33674 | PrestaShop: Improper Use of Validation Framework | 2026-03-30T11:49:50.984Z | 2026-04-06T08:26:41.107Z |
| bit-prestashop-2026-33673 | PrestaShop has multiple stored XSS vulnerabilities via unprotected Template variables | 2026-03-30T11:49:49.224Z | 2026-04-06T08:26:41.107Z |
| bit-nats-2026-33249 | NATS: Message tracing can be redirected to arbitrary subject | 2026-03-30T11:45:25.356Z | 2026-03-30T12:13:12.971Z |
| bit-nats-2026-33248 | NATS has mTLS verify_and_map authentication bypass via incorrect Subject DN matching | 2026-03-27T17:45:26.680Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33247 | NATS credentials are exposed in monitoring port via command-line argv | 2026-03-27T17:45:24.871Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33246 | NATS: Leafnode connections allow spoofing of Nats-Request-Info identity headers | 2026-03-27T17:45:23.082Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33223 | NATS Server: Incomplete Stripping of Nats-Request-Info Header Allows Identity Spoofing | 2026-03-27T17:45:21.527Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33222 | NATS JetStream has an authorization bypass through its Management API | 2026-03-27T17:45:19.827Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33219 | NATS is vulnerable to pre-auth DoS through WebSockets client service | 2026-03-27T17:45:18.190Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33218 | NATS has pre-auth server panic via leafnode handling | 2026-03-27T17:45:16.655Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33217 | NATS allows MQTT clients to bypass ACL checks | 2026-03-27T17:45:15.042Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33216 | NATS has MQTT plaintext password disclosure | 2026-03-27T17:45:13.444Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-29785 | NATS Server panic via malicious compression on leafnode port | 2026-03-27T17:45:10.061Z | 2026-03-27T18:14:10.313Z |
| bit-gitlab-2026-4363 | Incorrect Authorization in GitLab | 2026-03-27T12:15:19.935Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-3988 | Inefficient Algorithmic Complexity in GitLab | 2026-03-27T12:15:17.809Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-3857 | Cross-Site Request Forgery (CSRF) in GitLab | 2026-03-27T12:15:15.885Z | 2026-03-31T09:14:23.567Z |
| bit-gitlab-2026-2995 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in GitLab | 2026-03-27T12:15:11.976Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2973 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-03-27T12:15:10.065Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2745 | Authentication Bypass Using an Alternate Path or Channel in GitLab | 2026-03-27T12:15:06.072Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2726 | Incorrect Authorization in GitLab | 2026-03-27T12:15:04.107Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-1724 | Missing Authentication for Critical Function in GitLab | 2026-03-27T12:14:54.117Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-14595 | Missing Authorization in GitLab | 2026-03-27T12:11:45.074Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-13436 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-27T12:11:11.989Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-13078 | Improper Validation of Specified Quantity in Input in GitLab | 2026-03-27T12:11:08.026Z | 2026-03-27T12:16:52.978Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-nd57973 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T02:45:57.693609Z | 2026-04-03T07:10:19Z |
| cleanstart-2026-ml41879 | Security fixes for CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-32287, CVE-2026-33186, CVE-2026-33762, CVE-2026-34165, ghsa-37cx-329c-33x3, ghsa-6g7g-w4f8-9c9x, ghsa-fw7p-63qq-7hpr applied in versions: 1.13.2-r0, 1.14.0-r0, 1.14.0-r1, 1.14.1-r0 | 2026-04-06T02:45:36.057138Z | 2026-04-03T07:11:16Z |
| cleanstart-2026-dq17669 | Security fixes for CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-32287, CVE-2026-33186, CVE-2026-33762, CVE-2026-34165, ghsa-37cx-329c-33x3, ghsa-6g7g-w4f8-9c9x, ghsa-fw7p-63qq-7hpr applied in versions: 1.13.2-r0, 1.14.1-r0, 1.14.1-r1 | 2026-04-06T02:45:34.659600Z | 2026-04-03T07:13:53Z |
| cleanstart-2026-kt25851 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-61732, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.87.0-r0, 0.87.0-r1, 0.88.0-r1 | 2026-04-06T02:44:54.790204Z | 2026-04-03T08:04:33Z |
| cleanstart-2026-kt07616 | Security fixes for CVE-2026-22735, CVE-2026-22737 applied in versions: 6.2.3-r0 | 2026-04-06T02:44:27.120329Z | 2026-04-03T13:09:27Z |
| cleanstart-2026-nu19941 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 5.19.3-r1 | 2026-04-06T02:44:20.354882Z | 2026-04-03T13:09:27Z |
| cleanstart-2026-qf85840 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61732, CVE-2025-68121, CVE-2026-1229, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2x5j-vhc8-9cwm, ghsa-2xsj-vh29-9cwm, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r, ghsa-r6j8-c6r2-37rr applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.0.22-r0, 3.0.22-r1, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4 | 2026-04-01T10:09:04.049698Z | 2026-03-02T11:48:00Z |
| cleanstart-2026-nr51277 | Security fixes for ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.8.4-r0 | 2026-04-01T10:07:57.467759Z | 2026-03-02T11:41:08Z |
| cleanstart-2026-ja70776 | Security fixes for CVE-2023-5870, CVE-2024-7348, CVE-2025-8713, CVE-2025-8714, CVE-2025-8715 applied in versions: 16.1-r0, 16.2-r0, 16.4-r0, 17.6-r0 | 2026-04-01T10:07:46.020645Z | 2026-03-03T12:09:34Z |
| cleanstart-2026-eq51133 | Security fixes for CVE-2023-5870, CVE-2024-7348, CVE-2025-8713, CVE-2025-8714, CVE-2025-8715 applied in versions: 16.1-r0, 16.2-r0, 16.4-r0, 17.6-r0 | 2026-04-01T10:07:46.021346Z | 2026-03-03T12:09:34Z |
| cleanstart-2026-pm79547 | Security fixes for CVE-2018-20969, CVE-2018-6952, CVE-2019-13636, CVE-2019-13638, CVE-2019-20633 applied in versions: 2.7.6-r2, 2.7.6-r4, 2.7.6-r5, 2.7.6-r6, 2.7.6-r7 | 2026-04-01T10:07:37.644781Z | 2026-03-03T12:11:07Z |
| cleanstart-2026-mk40719 | Security fixes for CVE-2025-0913, CVE-2025-4673, CVE-2025-47907, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-27141, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-p84v-gxvw-73pf applied in versions: 3.6.13-r0, 3.6.15-r1, 3.6.18 r0, 3.6.18-r0, 3.7.0-r0, 3.7.3-r0 | 2026-04-01T10:07:36.130294Z | 2026-03-05T10:29:59Z |
| cleanstart-2026-pf41398 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2025-61732, CVE-2025-68121 applied in versions: 3.19.0-r0, 3.19.5-r0, 4.0.1-r0 | 2026-04-01T10:07:15.004853Z | 2026-03-06T05:33:23Z |
| cleanstart-2026-fx27781 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-47914, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-27141, ghsa-37cx-329c-33x3, ghsa-9h8m-3fm2-qjrq, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p84v-gxvw-73pf applied in versions: 3.7.0-r0, 3.7.10-r0, 3.7.10-r1, 3.7.10-r2, 3.7.3-r0, 3.7.4-r0, 3.7.6-r0, 3.7.9-r0 | 2026-04-01T10:07:09.669593Z | 2026-03-06T06:49:13Z |
| cleanstart-2026-fq05951 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-27141, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-p436-gjf2-799p, ghsa-p84v-gxvw-73pf applied in versions: 3.6.13-r0, 3.6.15-r1, 3.6.18-r0, 3.6.19-r0, 3.6.19-r1, 3.7.0-r0, 3.7.3-r0 | 2026-04-01T10:07:02.415559Z | 2026-03-06T07:23:30Z |
| cleanstart-2026-eu58098 | Security fixes for CVE-2025-61732, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.8.4-r0, 0.8.7-r0 | 2026-04-01T10:06:48.673123Z | 2026-03-05T12:22:12Z |
| cleanstart-2026-cy45415 | Security fixes for CVE-2025-15558, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-fv92-fjc5-jj9h applied in versions: 3.6.16-r0, 3.7.4-r0, 3.7.7-r0 | 2026-04-01T10:06:30.444629Z | 2026-03-06T11:37:07Z |
| cleanstart-2026-hd58055 | Security fixes for CVE-2025-25285, CVE-2026-21637, ghsa-23c5-xmqv-rm74, ghsa-3ppc-4f35-3m26, ghsa-72xf-g2v4-qvf3, ghsa-7r86-cg39-jmmj, ghsa-pfrx-2q88-qq97, ghsa-rc47-6667-2j5j, ghsa-rmvr-2pp2-xj38 applied in versions: 2.6.0-r1, 2.6.0-r2 | 2026-04-01T10:06:17.030926Z | 2026-03-06T12:59:45Z |
| cleanstart-2026-ck64127 | Security fixes for ghsa-6rw7-vpxm-498p, ghsa-73rr-hh4g-fpgx, ghsa-8qq5-rm4j-mr97, ghsa-wqch-xfxh-vrr4 applied in versions: 4.2.1.1-r1 | 2026-04-01T10:06:15.177169Z | 2026-03-06T11:36:37Z |
| cleanstart-2026-fn55648 | Security fixes for CVE-2025-25285, CVE-2026-21637, ghsa-23c5-xmqv-rm74, ghsa-72xf-g2v4-qvf3, ghsa-7r86-cg39-jmmj, ghsa-fj3w-jwp8-x2g3, ghsa-pfrx-2q88-qq97, ghsa-rc47-6667-2j5j, ghsa-rmvr-2pp2-xj38 applied in versions: 2.6.0-r1, 2.7.0-r0 | 2026-04-01T10:06:10.961683Z | 2026-03-06T13:00:09Z |
| cleanstart-2026-qx99194 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:06:00.100216Z | 2026-03-07T09:08:53Z |
| cleanstart-2026-pr27884 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:52.407214Z | 2026-03-07T09:10:08Z |
| cleanstart-2026-lu31244 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:46.726872Z | 2026-03-07T09:10:59Z |
| cleanstart-2026-jr53141 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:46.660054Z | 2026-03-07T09:11:28Z |
| cleanstart-2026-ff20499 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0 | 2026-04-01T10:04:06.598747Z | 2026-03-09T11:52:12Z |
| cleanstart-2026-ar56257 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 1.0.16-r0 | 2026-04-01T10:03:58.074474Z | 2026-03-07T09:14:16Z |
| cleanstart-2026-bf73214 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 1.0.17-r0 | 2026-04-01T10:03:56.655073Z | 2026-03-07T09:14:49Z |
| cleanstart-2026-df22934 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, ghsa-6v2p-p543-phr9, ghsa-f6x5-jh6r-wrfv, ghsa-hcg3-q754-cr77, ghsa-j5w8-q4qc-rx2x, ghsa-qxp5-gwg8-xv66, ghsa-v778-237x-gjrc, ghsa-vvgc-356p-c3xw applied in versions: 0.28.0-r0, 0.28.0-r1 | 2026-04-01T10:03:39.072806Z | 2026-03-09T13:31:49Z |
| cleanstart-2026-ew27017 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.10.0-r0, 1.10.0-r1 | 2026-04-01T10:03:13.124366Z | 2026-03-09T13:26:38Z |
| cleanstart-2026-ds01292 | Security fixes for CVE-2025-47910, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2026-24051, CVE-2026-27141, ghsa-9h8m-3fm2-qjrq applied in versions: 1.19.1-r0, 1.19.2-r0, 1.19.2-r1 | 2026-04-01T10:03:13.135534Z | 2026-03-10T06:29:01Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2024-ALE-002 | [MàJ] Multiples Vulnérabilités dans GitLab | 2024-01-12T00:00:00.000000 | 2024-02-22T00:00:00.000000 |
| certfr-2024-ale-001 | [MàJ] Multiples vulnérabilités dans Ivanti Connect Secure et Policy Secure Gateways | 2024-01-11T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| CERTFR-2024-ALE-001 | [MàJ] Multiples vulnérabilités dans Ivanti Connect Secure et Policy Secure Gateways | 2024-01-11T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2023-ale-013 | Vulnérabilité dans Apache Struts 2 | 2023-12-13T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-013 | Vulnérabilité dans Apache Struts 2 | 2023-12-13T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-006 | Vulnérabilité dans les produits Microsoft | 2023-12-12T00:00:00.000000 | 2023-07-12T00:00:00.000000 |
| CERTFR-2023-ALE-006 | Vulnérabilité dans les produits Microsoft | 2023-12-12T00:00:00.000000 | 2023-07-12T00:00:00.000000 |
| certfr-2023-ale-012 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-10-23T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-012 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-10-23T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-011 | [MàJ] Multiples vulnérabilités dans Cisco IOS XE | 2023-10-17T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-011 | [MàJ] Multiples vulnérabilités dans Cisco IOS XE | 2023-10-17T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-010 | Multiples vulnérabilités dans Exim | 2023-10-02T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-010 | Multiples vulnérabilités dans Exim | 2023-10-02T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-009 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2023-07-26T00:00:00.000000 | 2023-09-15T00:00:00.000000 |
| CERTFR-2023-ALE-009 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2023-07-26T00:00:00.000000 | 2023-09-15T00:00:00.000000 |
| certfr-2023-ale-008 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-07-19T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| CERTFR-2023-ALE-008 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-07-19T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-007 | [MàJ] Vulnérabilité dans Zimbra Collaboration Suite | 2023-07-17T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| CERTFR-2023-ALE-007 | [MàJ] Vulnérabilité dans Zimbra Collaboration Suite | 2023-07-17T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-005 | Synthèse sur l'exploitation d'une vulnérabilité dans MOVEit Transfer | 2023-07-05T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2023-ALE-005 | Synthèse sur l'exploitation d'une vulnérabilité dans MOVEit Transfer | 2023-07-05T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-004 | Vulnérabilité dans les produits Fortinet | 2023-06-13T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2023-ALE-004 | Vulnérabilité dans les produits Fortinet | 2023-06-13T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-003 | [MàJ] Compromission de l'application 3CX Desktop App | 2023-03-31T00:00:00.000000 | 2023-04-12T00:00:00.000000 |
| CERTFR-2023-ALE-003 | [MàJ] Compromission de l'application 3CX Desktop App | 2023-03-31T00:00:00.000000 | 2023-04-12T00:00:00.000000 |
| certfr-2023-ale-002 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2023-03-15T00:00:00.000000 | 2023-05-11T00:00:00.000000 |
| CERTFR-2023-ALE-002 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2023-03-15T00:00:00.000000 | 2023-05-11T00:00:00.000000 |
| certfr-2023-ale-001 | Vulnérabilité dans Fortinet FortiOS | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2023-ALE-001 | Vulnérabilité dans Fortinet FortiOS | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2023-ale-015 | [MàJ] Campagne d'exploitation d'une vulnérabilité affectant VMware ESXi | 2023-02-03T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0364 | Multiples vulnérabilités dans les produits Siemens | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0363 | Multiples vulnérabilités dans les produits NetApp | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0362 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0361 | Multiples vulnérabilités dans Cisco IOS et IOS XE | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0360 | Multiples vulnérabilités dans ISC BIND | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0359 | Multiples vulnérabilités dans Grafana | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0358 | Vulnérabilité dans Citrix XenServer | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0357 | Multiples vulnérabilités dans GitLab | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0356 | Vulnérabilité dans ISC Kea | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0355 | Multiples vulnérabilités dans les produits Apple | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0354 | Multiples vulnérabilités dans les produits Mozilla | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0353 | Multiples vulnérabilités dans Zabbix | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0352 | Multiples vulnérabilités dans les produits F5 | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0351 | Vulnérabilité dans Tenable OT Platform | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0350 | Multiples vulnérabilités dans Squid | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0349 | Multiples vulnérabilités dans Ruby on Rails | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0348 | Vulnérabilité dans Trend Micro Deep Discovery Inspector | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0347 | Vulnérabilité dans Xen | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0346 | Vulnérabilité dans VMware Tanzu pour Postgres | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0345 | Vulnérabilité dans LibreNMS | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0344 | Vulnérabilité dans strongSwan | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0343 | Vulnérabilité dans Spring Cloud Config | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0342 | Multiples vulnérabilités dans Google Chrome | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0341 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0340 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0339 | Multiples vulnérabilités dans les produits VMware | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0338 | Vulnérabilité dans les produits Synology | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0337 | Multiples vulnérabilités dans les produits Citrix | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0336 | Multiples vulnérabilités dans les produits Qnap | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0335 | Vulnérabilité dans CPython | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-000021 | web2py vulnerable to open redirect | 2026-02-05T15:01+09:00 | 2026-02-05T15:01+09:00 |
| jvndb-2026-000020 | Multiple vulnerabilities in Movable Type | 2026-02-04T16:15+09:00 | 2026-02-04T16:15+09:00 |
| jvndb-2026-000019 | Multiple vulnerabilities in ELECOM wireless LAN products | 2026-02-03T14:57+09:00 | 2026-02-03T14:57+09:00 |
| jvndb-2026-000017 | Improper file access permission settings in Mitsubishi Small-Capacity UPS Shutdown Software FREQSHIP-mini for Windows | 2026-02-03T14:57+09:00 | 2026-02-05T14:41+09:00 |
| jvndb-2026-000016 | Installer for Roland Cloud Manager may insecurely load Dynamic Link Libraries | 2026-02-03T14:57+09:00 | 2026-02-04T12:39+09:00 |
| jvndb-2026-000015 | Sonatype Nexus Repository vulnerable to server-side request forgery | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000014 | OS command injection in raspap-webgui | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000013 | Multiple Microsoft Office products vulnerable to untrusted search path | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000012 | Multiple vulnerabilities in Cybozu Garoon | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000018 | Undocumented "TelnetEnable" functionality of End of Service NETGEAR products | 2026-01-30T14:23+09:00 | 2026-01-30T14:23+09:00 |
| jvndb-2026-002119 | Multiple vulnerabilities in BROTHER MFPs (multifunction printers) | 2026-01-30T11:26+09:00 | 2026-01-30T11:26+09:00 |
| jvndb-2026-002030 | Multiple Vulnerabilities in Cosminexus | 2026-01-29T10:32+09:00 | 2026-01-29T10:32+09:00 |
| jvndb-2026-001972 | Archer MR600 vulnerable to OS command injection | 2026-01-28T10:41+09:00 | 2026-01-28T10:41+09:00 |
| jvndb-2026-000011 | beat-access for Windows may insecurely load Dynamic Link Libraries | 2026-01-27T18:22+09:00 | 2026-01-27T18:22+09:00 |
| jvndb-2026-001732 | Multiple Brother software installers may insecurely load Dynamic Link Libraries | 2026-01-26T16:04+09:00 | 2026-01-26T16:04+09:00 |
| jvndb-2026-000010 | Command injection vulnerability in ASUS routers | 2026-01-23T15:22+09:00 | 2026-01-23T15:22+09:00 |
| jvndb-2026-001663 | "iRMC S5/S6" implemented in PRIMERGY vulnerable to incorrect authorization | 2026-01-23T11:29+09:00 | 2026-01-23T11:29+09:00 |
| jvndb-2026-001662 | Multiple vulnerabilities in Trend Micro Apex Central (January 2026) | 2026-01-23T11:29+09:00 | 2026-01-23T11:29+09:00 |
| jvndb-2026-000009 | Installer of Fujitsu ServerView Agents for Windows may insecurely load Dynamic Link Libraries | 2026-01-21T15:17+09:00 | 2026-01-21T15:17+09:00 |
| jvndb-2026-000008 | Ruijie Networks AP180 series vulnerable to OS command injection | 2026-01-21T15:17+09:00 | 2026-01-21T15:17+09:00 |
| jvndb-2026-001582 | Security information for Hitachi Disk Array Systems | 2026-01-21T12:11+09:00 | 2026-01-21T12:11+09:00 |
| jvndb-2026-001578 | ETERNUS SF vulnerable to insertion of sensitive information into maintenance data | 2026-01-20T20:00+09:00 | 2026-01-20T20:00+09:00 |
| jvndb-2026-001380 | Multiple vulnerabilities in Canon Small Office Multifunction Printers and Laser Printers | 2026-01-19T10:08+09:00 | 2026-01-19T10:08+09:00 |
| jvndb-2026-000007 | Multiple Vulnerabilities in TOA Network Cameras TRIFORA 3 series | 2026-01-16T15:06+09:00 | 2026-01-16T15:06+09:00 |
| jvndb-2026-000006 | Chainlit vulnerable to improper access restriction | 2026-01-14T17:03+09:00 | 2026-01-14T17:03+09:00 |
| jvndb-2026-000005 | Multiple vulnerabilities in EATON UPS Companion | 2026-01-13T19:01+09:00 | 2026-01-13T19:01+09:00 |
| jvndb-2026-000003 | RICOH Streamline NX vulnerable to improper authorization | 2026-01-09T18:17+09:00 | 2026-01-09T18:17+09:00 |
| jvndb-2026-000004 | The installers for multiple PIONEER products may insecurely load Dynamic Link Libraries | 2026-01-08T13:47+09:00 | 2026-01-08T13:47+09:00 |
| jvndb-2026-000001 | Origin validation error vulnerability in Fujitsu Security Solution AuthConductor Client Basic V2 | 2026-01-07T14:19+09:00 | 2026-01-07T14:19+09:00 |
| jvndb-2026-000002 | Multiple vulnerabilities in multiple NEC branded projectors manufactured by Sharp Display Solutions, Ltd. | 2026-01-07T14:10+09:00 | 2026-01-14T16:54+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-16041 | OpenClaw访问控制错误漏洞(CNVD-2026-16041) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-15860 | Canva Affinity越界读取漏洞(CNVD-2026-15860) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15859 | Canva Affinity越界读取漏洞(CNVD-2026-15859) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15858 | Canva Affinity越界读取漏洞(CNVD-2026-15858) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15857 | Canva Affinity类型混淆漏洞 | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15856 | Canva Affinity越界读取漏洞(CNVD-2026-15856) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15855 | Canva Affinity越界读取漏洞(CNVD-2026-15855) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15854 | Canva Affinity越界读取漏洞(CNVD-2026-15854) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15853 | Canva Affinity越界读取漏洞(CNVD-2026-15853) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15852 | Canva Affinity越界写入漏洞 | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15851 | Canva Affinity越界读取漏洞(CNVD-2026-15851) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15850 | Canva Affinity越界读取漏洞(CNVD-2026-15850) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15849 | Canva Affinity越界读取漏洞(CNVD-2026-15849) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15848 | Canva Affinity越界读取漏洞(CNVD-2026-15848) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15847 | Canva Affinity越界读取漏洞(CNVD-2026-15847) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15846 | Canva Affinity越界读取漏洞(CNVD-2026-15846) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15845 | Canva Affinity越界读取漏洞(CNVD-2026-15845) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15844 | Canva Affinity越界读取漏洞 | 2026-03-26 | 2026-04-01 |
| cnvd-2026-15407 | Google Chrome存在未明漏洞(CNVD-2026-15407) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15406 | Google Chrome堆缓冲区溢出漏洞(CNVD-2026-15406) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15405 | Google Chrome整数溢出漏洞(CNVD-2026-15405) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15404 | Google Chrome内存错误引用漏洞(CNVD-2026-15404) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15403 | Google Chrome堆缓冲区溢出漏洞(CNVD-2026-15403) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15402 | Google Chrome越界读取漏洞(CNVD-2026-15402) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15401 | Google Chrome越界读取漏洞(CNVD-2026-15401) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15400 | Google Chrome FedCM内存错误引用漏洞 | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15395 | Google Chrome资源管理错误漏洞(CNVD-2026-15395) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15152 | OpenClaw拒绝服务漏洞(CNVD-2026-15152) | 2026-03-26 | 2026-03-27 |
| cnvd-2026-15058 | OpenClaw命令注入漏洞(CNVD-2026-15058) | 2026-03-26 | 2026-03-26 |
| cnvd-2026-15057 | OpenClaw加密问题漏洞(CNVD-2026-15057) | 2026-03-26 | 2026-03-26 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01783 | Уязвимость почтового клиента Microsoft Outlook, пакетов программ Microsoft Office, Excel … | 13.02.2026 | 13.02.2026 |
| bdu:2026-01782 | Уязвимость пакетов программ Microsoft Office, Excel и 365 Apps for Enterprise, связанная … | 13.02.2026 | 13.02.2026 |
| bdu:2026-01781 | Уязвимость пакетов программ Microsoft Office, Excel и 365 Apps for Enterprise, связанная … | 13.02.2026 | 13.02.2026 |
| bdu:2026-01780 | Уязвимость компонента Graphics операционных систем Windows, позволяющая нарушителю повыси… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01779 | Уязвимость подсистемы совместимости для запуска Linux-приложений Windows Subsystem for Li… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01778 | Уязвимость драйвера Windows Ancillary Function Driver for WinSock операционных систем Win… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01777 | Уязвимость компонента Graphics операционных систем Windows, позволяющая нарушителю повыси… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01776 | Уязвимость сервера отчетов Power BI Report Server, связанная с недостаточной проверкой вв… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01775 | Уязвимость программной платформы .NET, связанная с некорректной обработкой отсутствующего… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01774 | Уязвимость функции png_set_quantize() библиотеки для работы с растровой графикой в формат… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01773 | Уязвимость системы автоматизации технологических процессов EcoStruxure Process Expert и E… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01772 | Уязвимость программного обеспечения Gridscale X Prepay, связанная с несоответствием ответ… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01771 | Уязвимость сетевого программного обеспечения Siemens, связанная с неконтролируемым элемен… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01770 | Уязвимость программного обеспечения контроля лицензий CodeMeter, связанная с недостатками… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01769 | Уязвимость системного демона chassisd операционной системы Juniper Networks Junos маршрут… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01768 | Уязвимость веб-интерфейса управления системы обработки вызовов Cisco Unified Communicatio… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01767 | Уязвимость веб-интерфейса управления системы мониторинга и управления сетевым оборудовани… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01766 | Уязвимость микропрограммного обеспечения Cisco SIP IP-телефонов Cisco Video Phone 8875, D… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01765 | Уязвимость микропрограммного обеспечения Cisco SIP IP-телефонов Cisco Video Phone 8875, D… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01764 | Уязвимость веб-интерфейса средства унифицированного управления Cisco Unified Computing Sy… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01763 | Уязвимость программных продуктов Cisco Unified Contact Center Enterprise и Cisco Packaged… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01762 | Уязвимость SSH службы технологии Cisco Ultra-Reliable Wireless Backhaul (URWB) сетевых ус… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01761 | Уязвимость оболочки обслуживания программного средства управления облачными системами Cis… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01760 | Уязвимость программных продуктов Cisco Unified Contact Center Enterprise и Cisco Packaged… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01759 | Уязвимость веб-интерфейса управления системы мониторинга и управления сетевым оборудовани… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01758 | Уязвимость веб-интерфейса платформы управления политиками соединений Cisco Identity Servi… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01757 | Уязвимость веб-интерфейса платформы управления политиками соединений Cisco Identity Servi… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01756 | Уязвимость механизма обнаружения Snort программного межсетевого экрана Cisco Secure Firew… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01755 | Уязвимость механизма обнаружения Snort программного межсетевого экрана Cisco Secure Firew… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01754 | Уязвимость ядра подсистемы совместимости для запуска Linux-приложений Windows Subsystem f… | 13.02.2026 | 13.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201402-0026 | Buffer overflow in the process_ra function in the router advertisement daemon (radvd) bef… | 2024-07-23T22:25:48.682000Z |
| var-201805-1144 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2024-07-23T22:25:33.529000Z |
| var-201805-1143 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2024-07-23T22:25:33.635000Z |
| var-202005-0008 | Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buf… | 2024-07-23T22:25:28.455000Z |
| var-202407-0704 | A vulnerability has been identified in CPCI85 Central Processing/Communication (All versi… | 2024-07-23T22:25:01.735000Z |
| var-200107-0035 | slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cau… | 2024-07-23T22:24:58.858000Z |
| var-200512-0643 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2024-07-23T22:24:53.371000Z |
| var-200512-0611 | Multiple heap-based buffer overflows in QuickTime.qts in Apple QuickTime Player 7.0.3 and… | 2024-07-23T22:24:53.455000Z |
| var-200512-0300 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2024-07-23T22:24:53.297000Z |
| var-200512-0297 | Integer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbit… | 2024-07-23T22:24:53.525000Z |
| var-200512-0294 | Buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbitr… | 2024-07-23T22:24:53.234000Z |
| var-201407-0233 | Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote atta… | 2024-07-23T22:22:21.013000Z |
| var-201601-0038 | Multiple stack-based buffer overflows in Advantech WebAccess before 8.1 allow remote atta… | 2024-07-23T22:22:04.421000Z |
| var-201801-0394 | TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbi… | 2024-07-23T22:21:46.499000Z |
| var-201904-0181 | Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow… | 2024-07-23T22:21:36.530000Z |
| var-202108-1160 | Description: A permissions issue was addressed with improved validation. This issue is fi… | 2024-07-23T22:20:46.081000Z |
| var-202305-0218 | D-Link DAP-1360 webproc WEB_DisplayPage Stack-based Buffer Overflow Remote Code Execution… | 2024-07-23T22:20:18.349000Z |
| var-202305-0217 | D-Link DAP-1360 Hardcoded Credentials Authentication Bypass Vulnerability. This vulnerabi… | 2024-07-23T22:20:18.369000Z |
| var-202305-0216 | D-Link DAP-1360 Multiple Parameters Stack-Based Buffer Overflow Remote Code Execution Vul… | 2024-07-23T22:20:18.413000Z |
| var-202305-0177 | D-Link DAP-1360 webproc Stack-based Buffer Overflow Remote Code Execution Vulnerability. … | 2024-07-23T22:20:18.434000Z |
| var-202305-0176 | D-Link DAP-1360 webproc var:sys_Token Heap-based Buffer Overflow Remote Code Execution Vu… | 2024-07-23T22:20:18.458000Z |
| var-202305-0166 | D-Link DAP-1360 webproc var:menu Stack-based Buffer Overflow Remote Code Execution Vulner… | 2024-07-23T22:20:18.326000Z |
| var-202305-0154 | D-Link DAP-1360 webproc var:page Stack-based Buffer Overflow Remote Code Execution Vulner… | 2024-07-23T22:20:18.503000Z |
| var-202305-0153 | D-Link DAP-1360 webupg UPGCGI_CheckAuth Numeric Truncation Remote Code Execution Vulnerab… | 2024-07-23T22:20:18.392000Z |
| var-202305-0071 | D-Link DAP-1360 webproc Heap-based Buffer Overflow Remote Code Execution Vulnerability. T… | 2024-07-23T22:20:18.481000Z |
| var-202305-0070 | D-Link DAP-1360 webproc COMM_MakeCustomMsg Stack-based Buffer Overflow Remote Code Execut… | 2024-07-23T22:20:18.303000Z |
| var-202308-3323 | D-Link DAP-2622 DDP Change ID Password Auth Username Stack-based Buffer Overflow Remote C… | 2024-07-23T22:20:12.387000Z |
| var-202308-3185 | D-Link DAP-2622 DDP Configuration Backup Filename Stack-based Buffer Overflow Remote Code… | 2024-07-23T22:20:12.455000Z |
| var-202308-3131 | D-Link DAP-2622 DDP Reset Factory Auth Password Stack-based Buffer Overflow Remote Code E… | 2024-07-23T22:20:12.487000Z |
| var-202308-3130 | D-Link DAP-2622 DDP Configuration Restore Auth Username Stack-based Buffer Overflow Remot… | 2024-07-23T22:20:12.431000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2021-035 | PHOENIX CONTACT: FL MGUARD DM version 1.12.0 and 1.13.0 Improper Privilege Management | 2021-08-11T07:59:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-029 | PHOENIX CONTACT: DoS for PLCnext Control devices in versions <2021.0.5 LTS | 2021-08-04T07:58:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-032 | PHOENIX CONTACT: Niche Ethernet Stack for ILC1x0, ILC1x1 and AXC 1050 Industrial controllers and CHARX control DC | 2021-08-04T07:57:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-036 | PHOENIX CONTACT: Products utilizing WIBU SYSTEMS CodeMeter components in versions prior to V7.21a | 2021-08-04T07:56:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-025 | PHOENIX CONTACT: Security Advisory for PLCNext, ILC 2050 BI, FL MGUARD DM UNLIMITED, TC ROUTER und CLOUD CLIENT products | 2021-06-23T12:19:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-023 | PHOENIX CONTACT: Security Advisory for FL SWITCH SMCS series | 2021-06-23T12:17:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-022 | PHOENIX CONTACT: Security Advisory for FL COMSERVER UNI | 2021-06-23T12:16:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-019 | PHOENIX CONTACT: Security Advisory for ILC1x1 Industrial controllers | 2021-06-23T12:16:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-021 | PHOENIX CONTACT: Security Advisory for AXL F BK and IL BK products | 2021-06-23T12:15:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-020 | PHOENIX CONTACT: Security Advisory for Automation Worx Software Suite | 2021-06-23T11:10:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-024 | PHOENIX CONTACT: Security Advisory for PLCNext, SMARTRTU AXC, CHARX control modular and EEM-SB37x | 2021-05-04T08:17:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-046 | PHOENIX CONTACT: mGuard <8.8.3 products missing initialization of resource | 2020-12-17T09:01:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-049 | Phoenix Contact: Multiple vulnerabilities in PLCnext Control devices < 2021.0 LTS | 2020-12-17T09:00:00.000Z | 2020-12-17T09:00:00.000Z |
| vde-2020-047 | PHOENIX CONTACT: BTP Touch Panels uncontrolled resource consumption | 2020-12-02T09:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-030 | PHOENIX CONTACT: Products utilizing WIBU-SYSTEMS CodeMeter components | 2020-09-09T06:22:00.000Z | 2020-09-09T06:22:00.000Z |
| vde-2020-026 | PHOENIX CONTACT: Denial-of-Service vulnerabilty in Emalytics, ILC 2050 BI and ILC 2050 BI-L | 2020-08-20T07:11:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-025 | PHOENIX CONTACT: Improper path sanitation on import of project files in PLCnext Engineer | 2020-07-21T09:38:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-023 | PHOENIX CONTACT: Two Vulnerabilities in Automation Worx Suite | 2020-07-01T08:25:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-018 | PHOENIX CONTACT: FL MGUARD, TC MGUARD, TC ROUTER and TC CLOUD CLIENT: PPPD vulnerable to CVE-2020-8597 | 2020-06-02T08:42:00.000Z | 2020-06-02T08:42:00.000Z |
| vde-2020-013 | PHOENIX CONTACT: Local Privilege Escalation in Portico Remote desktop control software | 2020-03-27T09:48:00.000Z | 2020-03-27T09:48:00.000Z |
| vde-2020-012 | PHOENIX CONTACT: Local Privilege Escalation in PC WORX SRT | 2020-03-27T09:47:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-003 | PHOENIX CONTACT: TC Router and TC Cloud Client multiple vulnerabilities | 2020-03-05T15:58:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-002 | PHOENIX CONTACT: Advisory for multiple FL Switch GHS utilising VxWorks | 2020-02-25T09:07:00.000Z | 2025-06-05T13:28:12.000Z |
| vde-2020-001 | PHOENIX CONTACT: Emalytics Controller ILC 2050 BI(L) allows unauthorised read and write access to the configuration file | 2020-02-17T08:10:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2019-020 | PHOENIX CONTACT: improper access control exists on FL NAT devices when using MAC-based port security | 2019-10-29T10:56:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2019-016 | PHOENIX CONTACT: Security Advisory for Automation Worx Software Suite | 2019-10-15T06:17:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-015 | PHOENIX CONTACT: Security Advisory for multiple Industrial Controllers | 2019-08-07T00:00:00.000Z | 2025-07-11T07:00:00.000Z |
| vde-2019-014 | PHOENIX CONTACT: Multiple Vulnerabilities in Automation Worx Software Suite | 2019-06-19T12:41:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-009 | PHOENIX CONTACT: Multiple Vulnerabilities in AXC F 2152 | 2019-06-04T10:22:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2019-007 | PHOENIX CONTACT: command injection on RAD-80211-XD(/HP-BUS) | 2019-03-25T11:45:00.000Z | 2025-05-14T12:28:19.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2020-042 | WAGO: PLC families 750-88x and 750-352 prone to DoS attack, versions < FW10 (Update A) | 2020-10-27T10:28:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-029 | WAGO: XSS vulnerability in Web-UI in WAGO 750-88X and WAGO 750-89X | 2020-09-30T11:11:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-028 | WAGO: Authentication Bypass Vulnerability in WAGO 750-36X and WAGO 750-8XX Version <= FW03 | 2020-09-30T11:08:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-027 | WAGO: Vulnerability in web-based authentication in WAGO 750-8XX Version <= FW07 | 2020-09-30T11:06:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-032 | WAGO: Vulnerable WIBU-SYSTEMS Codemeter installed through e!COCKPIT | 2020-09-09T06:23:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-020 | WAGO: PPPD in PFC100 and PFC200 Series is vulnerable to CVE-2020-8597 | 2020-06-10T10:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-015 | WAGO: Web Based Management - Code Execution Vulnerability | 2020-06-10T08:00:00.000Z | 2020-06-10T08:00:00.000Z |
| vde-2020-006 | WAGO: Web-Based Management Authentication Vulnerabilities | 2020-03-09T11:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-011 | WAGO: Multiple Vulnerabilities in I/O-Check Service | 2020-03-09T09:30:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-010 | WAGO: Cloud Connectivity Remote Code Execution Vulnerability | 2020-03-09T09:25:00.000Z | 2020-03-09T09:25:00.000Z |
| vde-2020-009 | WAGO: e!Cockpit Two Update Package Vulnerabilities | 2020-03-09T09:18:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-008 | WAGO: Cloud Connectivity Multiple Vulnerabilities | 2020-03-09T09:15:00.000Z | 2025-05-14T12:53:43.000Z |
| vde-2020-007 | WAGO: Web-Based Management Denial of Service | 2020-03-09T09:10:00.000Z | 2020-03-09T09:10:00.000Z |
| vde-2020-004 | WAGO: e!Cockpit cleartext communication and hardcoded key | 2020-03-09T09:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2019-022 | WAGO: Multiple Vulnerabilities in I/O-Check Service in Multiple Devices | 2019-12-16T09:00:00.000Z | 2019-12-16T09:00:00.000Z |
| vde-2019-017 | WAGO: Series PFC100/PFC200 Information Disclosure | 2019-09-18T11:25:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-013 | WAGO: Multiple Vulnerabilities in industrial managed switches | 2019-06-12T10:25:00.000Z | 2019-06-12T10:25:00.000Z |
| vde-2018-013 | WAGO: 750-8xx Controller Denial of Service | 2018-08-17T09:45:00.000Z | 2025-09-22T10:00:00.000Z |
| vde-2018-010 | WAGO: Multiple vulnerabilities in e!DISPLAY products | 2018-07-10T09:50:00.000Z | 2025-05-22T13:03:10.000Z |