Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-5874 |
9.6 (3.1)
|
Use after free in PrivateAI in Google Chrome prio… |
Google |
Chrome |
2026-04-08T21:20:46.077Z | 2026-04-11T02:59:10.879Z |
| CVE-2026-34080 |
6.8 (4.0)
|
xdg-dbus-proxy has an eavesdrop filter bypass allowing… |
flatpak |
xdg-dbus-proxy |
2026-04-07T20:57:57.931Z | 2026-04-11T01:34:11.813Z |
| CVE-2026-3371 |
4.3 (3.1)
|
Tutor LMS <= 3.9.7 - Authenticated (Subscriber+) Insec… |
themeum |
Tutor LMS – eLearning and online course solution |
2026-04-11T01:25:01.083Z | 2026-04-11T01:25:01.083Z |
| CVE-2026-4979 |
5 (3.1)
|
UsersWP <= 1.2.58 - Authenticated (Subscriber+) Server… |
stiofansisland |
UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WP |
2026-04-11T01:25:00.447Z | 2026-04-11T01:25:00.447Z |
| CVE-2026-5144 |
8.8 (3.1)
|
BuddyPress Groupblog <= 1.9.3 - Authenticated (Subscri… |
boonebgorges |
BuddyPress Groupblog |
2026-04-11T01:24:59.754Z | 2026-04-11T01:24:59.754Z |
| CVE-2026-3498 |
6.4 (3.1)
|
BlockArt Blocks <= 2.2.15 - Authenticated (Author+) St… |
wpblockart |
BlockArt Blocks – Gutenberg Blocks, Page Builder Blocks ,WordPress Block Plugin, Sections & Template Library |
2026-04-11T01:24:59.386Z | 2026-04-11T01:24:59.386Z |
| CVE-2026-5217 |
7.2 (3.1)
|
Optimole <= 4.2.2 - Unauthenticated Stored Cross-Site … |
optimole |
Optimole – Optimize Images in Real Time |
2026-04-11T01:24:58.602Z | 2026-04-11T01:24:58.602Z |
| CVE-2026-5207 |
6.5 (3.1)
|
LifterLMS <= 9.2.1 - Authenticated (Custom+) SQL Injec… |
chrisbadgett |
LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes |
2026-04-11T01:24:58.163Z | 2026-04-11T01:24:58.163Z |
| CVE-2026-4895 |
6.4 (3.1)
|
Greenshift <= 12.8.9 - Authenticated (Contributor+) St… |
wpsoul |
Greenshift – animation and page builder blocks |
2026-04-11T01:24:58.983Z | 2026-04-11T01:24:58.983Z |
| CVE-2026-5226 |
6.1 (3.1)
|
Optimole <= 4.2.3 - Reflected Cross-Site Scripting via… |
optimole |
Optimole – Optimize Images in Real Time |
2026-04-11T01:24:57.542Z | 2026-04-11T01:24:57.542Z |
| CVE-2026-3358 |
5.4 (3.1)
|
Tutor LMS <= 3.9.7 - Missing Authorization to Authenti… |
themeum |
Tutor LMS – eLearning and online course solution |
2026-04-11T01:24:56.945Z | 2026-04-11T01:24:56.945Z |
| CVE-2026-40354 |
2.9 (3.1)
|
Flatpak xdg-desktop-portal before 1.20.4 and 1.21… |
Flatpak |
xdg-desktop-portal |
2026-04-11T00:29:03.467Z | 2026-04-11T00:29:03.467Z |
| CVE-2026-34078 |
9.3 (4.0)
|
Flatpak has a complete sandbox escape leading to host … |
flatpak |
flatpak |
2026-04-07T21:27:45.643Z | 2026-04-11T00:21:12.650Z |
| CVE-2026-3691 |
5.3 (3.0)
|
OpenClaw Client PKCE Verifier Information Disclosure V… |
OpenClaw |
OpenClaw |
2026-04-11T00:17:40.509Z | 2026-04-11T00:17:40.509Z |
| CVE-2026-3690 |
7.4 (3.0)
|
OpenClaw Canvas Authentication Bypass Vulnerability |
OpenClaw |
OpenClaw |
2026-04-11T00:17:32.474Z | 2026-04-11T00:17:32.474Z |
| CVE-2026-3689 |
6.5 (3.0)
|
OpenClaw Canvas Path Traversal Information Disclosure … |
OpenClaw |
OpenClaw |
2026-04-11T00:17:24.472Z | 2026-04-11T00:17:24.472Z |
| CVE-2026-4158 |
7.3 (3.0)
|
KeePassXC OpenSSL Configuration Uncontrolled Search Pa… |
KeePassXC |
KeePassXC |
2026-04-11T00:17:00.676Z | 2026-04-11T00:17:00.676Z |
| CVE-2026-4157 |
7.5 (3.0)
|
ChargePoint Home Flex revssh Service Command Injection… |
ChargePoint |
Home Flex |
2026-04-11T00:16:38.871Z | 2026-04-11T00:16:38.871Z |
| CVE-2026-4156 |
7.5 (3.0)
|
ChargePoint Home Flex OCPP getpreq Stack-based Buffer … |
ChargePoint |
Home Flex |
2026-04-11T00:16:32.094Z | 2026-04-11T00:16:32.094Z |
| CVE-2026-4155 |
7.5 (3.0)
|
ChargePoint Home Flex Inclusion of Sensitive Informati… |
ChargePoint |
Home Flex |
2026-04-11T00:16:25.621Z | 2026-04-11T00:16:25.621Z |
| CVE-2026-4154 |
7.8 (3.0)
|
GIMP XPM File Parsing Integer Overflow Remote Code Exe… |
GIMP |
GIMP |
2026-04-11T00:16:10.657Z | 2026-04-11T00:16:10.657Z |
| CVE-2026-4153 |
7.8 (3.0)
|
GIMP PSP File Parsing Heap-based Buffer Overflow Remot… |
GIMP |
GIMP |
2026-04-11T00:16:01.848Z | 2026-04-11T00:16:01.848Z |
| CVE-2026-4152 |
7.8 (3.0)
|
GIMP JP2 File Parsing Heap-based Buffer Overflow Remot… |
GIMP |
GIMP |
2026-04-11T00:15:54.200Z | 2026-04-11T00:15:54.200Z |
| CVE-2026-4151 |
7.8 (3.0)
|
GIMP ANI File Parsing Integer Overflow Remote Code Exe… |
GIMP |
GIMP |
2026-04-11T00:15:45.368Z | 2026-04-11T00:15:45.368Z |
| CVE-2026-4150 |
7.8 (3.0)
|
GIMP PSD File Parsing Integer Overflow Remote Code Exe… |
GIMP |
GIMP |
2026-04-11T00:15:36.377Z | 2026-04-11T00:15:36.377Z |
| CVE-2026-5059 |
9.8 (3.0)
|
aws-mcp-server AWS CLI Command Injection Remote Code E… |
aws-mcp-server |
aws-mcp-server |
2026-04-11T00:15:02.920Z | 2026-04-11T00:15:02.920Z |
| CVE-2026-5058 |
9.8 (3.0)
|
aws-mcp-server Command Injection Remote Code Execution… |
aws-mcp-server |
aws-mcp-server |
2026-04-11T00:14:52.192Z | 2026-04-11T00:14:52.192Z |
| CVE-2026-5055 |
7.8 (3.0)
|
NoMachine Uncontrolled Search Path Element Local Privi… |
NoMachine |
NoMachine |
2026-04-11T00:14:25.877Z | 2026-04-11T00:14:25.877Z |
| CVE-2026-5054 |
7.8 (3.0)
|
NoMachine External Control of File Path Local Privileg… |
NoMachine |
NoMachine |
2026-04-11T00:14:16.658Z | 2026-04-11T00:14:16.658Z |
| CVE-2026-5053 |
7.1 (3.0)
|
NoMachine External Control of File Path Arbitrary File… |
NoMachine |
NoMachine |
2026-04-11T00:14:07.656Z | 2026-04-11T00:14:07.656Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-5496 |
7.8 (3.0)
|
Labcenter Electronics Proteus PDSPRJ File Parsing Type… |
Labcenter Electronics |
Proteus |
2026-04-11T00:13:14.901Z | 2026-04-11T00:13:14.901Z |
| CVE-2026-5495 |
7.8 (3.0)
|
Labcenter Electronics Proteus PDSPRJ File Parsing Out-… |
Labcenter Electronics |
Proteus |
2026-04-11T00:13:26.901Z | 2026-04-11T00:13:26.901Z |
| CVE-2026-5494 |
7.8 (3.0)
|
Labcenter Electronics Proteus PDSPRJ File Parsing Out-… |
Labcenter Electronics |
Proteus |
2026-04-11T00:13:22.854Z | 2026-04-11T00:13:22.854Z |
| CVE-2026-5493 |
7.8 (3.0)
|
Labcenter Electronics Proteus PDSPRJ File Parsing Out-… |
Labcenter Electronics |
Proteus |
2026-04-11T00:13:18.336Z | 2026-04-11T00:13:18.336Z |
| CVE-2026-5059 |
9.8 (3.0)
|
aws-mcp-server AWS CLI Command Injection Remote Code E… |
aws-mcp-server |
aws-mcp-server |
2026-04-11T00:15:02.920Z | 2026-04-11T00:15:02.920Z |
| CVE-2026-5058 |
9.8 (3.0)
|
aws-mcp-server Command Injection Remote Code Execution… |
aws-mcp-server |
aws-mcp-server |
2026-04-11T00:14:52.192Z | 2026-04-11T00:14:52.192Z |
| CVE-2026-5055 |
7.8 (3.0)
|
NoMachine Uncontrolled Search Path Element Local Privi… |
NoMachine |
NoMachine |
2026-04-11T00:14:25.877Z | 2026-04-11T00:14:25.877Z |
| CVE-2026-5054 |
7.8 (3.0)
|
NoMachine External Control of File Path Local Privileg… |
NoMachine |
NoMachine |
2026-04-11T00:14:16.658Z | 2026-04-11T00:14:16.658Z |
| CVE-2026-5053 |
7.1 (3.0)
|
NoMachine External Control of File Path Arbitrary File… |
NoMachine |
NoMachine |
2026-04-11T00:14:07.656Z | 2026-04-11T00:14:07.656Z |
| CVE-2026-4158 |
7.3 (3.0)
|
KeePassXC OpenSSL Configuration Uncontrolled Search Pa… |
KeePassXC |
KeePassXC |
2026-04-11T00:17:00.676Z | 2026-04-11T00:17:00.676Z |
| CVE-2026-4157 |
7.5 (3.0)
|
ChargePoint Home Flex revssh Service Command Injection… |
ChargePoint |
Home Flex |
2026-04-11T00:16:38.871Z | 2026-04-11T00:16:38.871Z |
| CVE-2026-4156 |
7.5 (3.0)
|
ChargePoint Home Flex OCPP getpreq Stack-based Buffer … |
ChargePoint |
Home Flex |
2026-04-11T00:16:32.094Z | 2026-04-11T00:16:32.094Z |
| CVE-2026-4155 |
7.5 (3.0)
|
ChargePoint Home Flex Inclusion of Sensitive Informati… |
ChargePoint |
Home Flex |
2026-04-11T00:16:25.621Z | 2026-04-11T00:16:25.621Z |
| CVE-2026-4154 |
7.8 (3.0)
|
GIMP XPM File Parsing Integer Overflow Remote Code Exe… |
GIMP |
GIMP |
2026-04-11T00:16:10.657Z | 2026-04-11T00:16:10.657Z |
| CVE-2026-4153 |
7.8 (3.0)
|
GIMP PSP File Parsing Heap-based Buffer Overflow Remot… |
GIMP |
GIMP |
2026-04-11T00:16:01.848Z | 2026-04-11T00:16:01.848Z |
| CVE-2026-4152 |
7.8 (3.0)
|
GIMP JP2 File Parsing Heap-based Buffer Overflow Remot… |
GIMP |
GIMP |
2026-04-11T00:15:54.200Z | 2026-04-11T00:15:54.200Z |
| CVE-2026-4151 |
7.8 (3.0)
|
GIMP ANI File Parsing Integer Overflow Remote Code Exe… |
GIMP |
GIMP |
2026-04-11T00:15:45.368Z | 2026-04-11T00:15:45.368Z |
| CVE-2026-4150 |
7.8 (3.0)
|
GIMP PSD File Parsing Integer Overflow Remote Code Exe… |
GIMP |
GIMP |
2026-04-11T00:15:36.377Z | 2026-04-11T00:15:36.377Z |
| CVE-2026-4149 |
10 (3.0)
|
Sonos Era 300 SMB Response Out-Of-Bounds Access Remote… |
Sonos |
Era 300 |
2026-04-11T00:12:33.497Z | 2026-04-11T00:12:33.497Z |
| CVE-2026-40354 |
2.9 (3.1)
|
Flatpak xdg-desktop-portal before 1.20.4 and 1.21… |
Flatpak |
xdg-desktop-portal |
2026-04-11T00:29:03.467Z | 2026-04-11T00:29:03.467Z |
| CVE-2026-3691 |
5.3 (3.0)
|
OpenClaw Client PKCE Verifier Information Disclosure V… |
OpenClaw |
OpenClaw |
2026-04-11T00:17:40.509Z | 2026-04-11T00:17:40.509Z |
| CVE-2026-3690 |
7.4 (3.0)
|
OpenClaw Canvas Authentication Bypass Vulnerability |
OpenClaw |
OpenClaw |
2026-04-11T00:17:32.474Z | 2026-04-11T00:17:32.474Z |
| CVE-2026-3689 |
6.5 (3.0)
|
OpenClaw Canvas Path Traversal Information Disclosure … |
OpenClaw |
OpenClaw |
2026-04-11T00:17:24.472Z | 2026-04-11T00:17:24.472Z |
| CVE-2026-34078 |
9.3 (4.0)
|
Flatpak has a complete sandbox escape leading to host … |
flatpak |
flatpak |
2026-04-07T21:27:45.643Z | 2026-04-11T00:21:12.650Z |
| CVE-2026-40199 |
N/A
|
Net::CIDR::Lite versions before 0.23 for Perl mishandl… |
STIGTSP |
Net::CIDR::Lite |
2026-04-10T21:49:48.353Z | 2026-04-10T21:49:48.353Z |
| CVE-2026-40198 |
N/A
|
Net::CIDR::Lite versions before 0.23 for Perl does not… |
STIGTSP |
Net::CIDR::Lite |
2026-04-10T21:42:06.835Z | 2026-04-10T21:42:06.835Z |
| CVE-2026-33119 |
5.4 (3.1)
|
Microsoft Edge (Chromium-based) for Android Spoofing V… |
Microsoft |
Microsoft Edge for Android |
2026-04-10T21:20:37.767Z | 2026-04-10T21:20:37.767Z |
| CVE-2026-33118 |
4.3 (3.1)
|
Microsoft Edge (Chromium-based) Spoofing Vulnerability |
Microsoft |
Microsoft Edge (Chromium-based) |
2026-04-10T21:20:44.423Z | 2026-04-10T21:20:44.423Z |
| CVE-2026-35534 |
7.6 (3.1)
|
ChurchCRM has Stored XSS in PersonView.php via Faceboo… |
ChurchCRM |
CRM |
2026-04-07T15:47:44.342Z | 2026-04-09T16:19:01.737Z |
| CVE-2018-25248 |
5.1 (4.0)
7.2 (3.1)
|
MyBB Downloads Plugin 2.0.3 Persistent XSS via downloads.php |
MyBB |
MyBB Downloads Plugin |
2026-04-04T13:51:13.028Z | 2026-04-06T15:28:20.813Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-4664 | The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to authentication bypass in… | 2026-04-10T02:16:03.710 | 2026-04-10T02:16:03.710 |
| fkie_cve-2026-4351 | The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal i… | 2026-04-10T02:16:03.553 | 2026-04-10T02:16:03.553 |
| fkie_cve-2026-4305 | The Royal WordPress Backup & Restore Plugin plugin for WordPress is vulnerable to Reflected Cross-S… | 2026-04-10T02:16:03.397 | 2026-04-10T02:16:03.397 |
| fkie_cve-2026-4057 | The Download Manager plugin for WordPress is vulnerable to unauthorized modification of data due to… | 2026-04-10T02:16:03.240 | 2026-04-10T02:16:03.240 |
| fkie_cve-2026-3360 | The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to an Insec… | 2026-04-10T02:16:03.073 | 2026-04-10T02:16:03.073 |
| fkie_cve-2026-2712 | The WP-Optimize plugin for WordPress is vulnerable to unauthorized access of functionality due to m… | 2026-04-10T02:16:02.913 | 2026-04-10T02:16:02.913 |
| fkie_cve-2026-25203 | Samsung MagicINFO 9 Server Incorrect Default Permissions Local Privilege Escalation Vulnerability … | 2026-04-10T02:16:02.767 | 2026-04-10T02:16:02.767 |
| fkie_cve-2026-1924 | The Aruba HiSpeed Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in all ver… | 2026-04-10T02:16:02.607 | 2026-04-10T02:16:02.607 |
| fkie_cve-2026-1263 | The Webling plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to… | 2026-04-10T02:16:02.083 | 2026-04-10T02:16:02.083 |
| fkie_cve-2026-34584 | listmonk is a standalone, self-hosted, newsletter and mailing list manager. From version 4.1.0 to b… | 2026-04-02T18:16:30.510 | 2026-04-10T02:03:22.047 |
| fkie_cve-2026-35507 | Shynet before 0.14.0 allows Host header injection in the password reset flow. | 2026-04-03T02:16:15.170 | 2026-04-10T02:01:43.630 |
| fkie_cve-2026-33073 | Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, … | 2026-03-31T18:16:51.807 | 2026-04-10T01:51:54.033 |
| fkie_cve-2026-33415 | Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, … | 2026-03-31T18:16:52.410 | 2026-04-10T01:50:42.777 |
| fkie_cve-2026-34400 | Alerta is a monitoring tool. Prior to version 9.1.0, the Query string search API (q=) was vulnerabl… | 2026-03-31T22:16:18.287 | 2026-04-10T01:41:30.573 |
| fkie_cve-2026-34372 | Sulu is an open-source PHP content management system based on the Symfony framework. From versions … | 2026-03-31T21:16:29.840 | 2026-04-10T01:40:29.000 |
| fkie_cve-2026-3774 | The application allows PDF JavaScript and document/print actions (such as WillPrint/DidPrint) to up… | 2026-04-01T02:16:02.287 | 2026-04-10T01:36:58.587 |
| fkie_cve-2026-32294 | JetKVM prior to 0.5.4 does not verify the authenticity of downloaded firmware files. An attacker-in… | 2026-03-17T18:16:16.610 | 2026-04-10T01:29:42.367 |
| fkie_cve-2026-32295 | JetKVM before 0.5.4 does not rate limit login requests, enabling brute-force attempts to guess cred… | 2026-03-17T18:16:16.790 | 2026-04-10T01:28:56.830 |
| fkie_cve-2026-33204 | SimpleJWT is a simple JSON web token library written in PHP. Prior to version 1.1.1, an unauthentic… | 2026-03-20T23:16:45.677 | 2026-04-10T01:25:08.487 |
| fkie_cve-2019-25552 | CEWE PHOTO SHOW 6.4.3 contains a denial of service vulnerability that allows attackers to crash the… | 2026-03-21T13:16:17.507 | 2026-04-10T01:20:49.400 |
| fkie_cve-2019-25553 | CEWE PHOTO IMPORTER 6.4.3 contains a denial of service vulnerability that allows local attackers to… | 2026-03-21T13:16:17.680 | 2026-04-10T01:19:10.910 |
| fkie_cve-2026-4532 | A security vulnerability has been detected in code-projects Simple Food Ordering System up to 1.0. … | 2026-03-22T02:16:00.640 | 2026-04-10T01:16:58.983 |
| fkie_cve-2026-5995 | A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Impacted is the function s… | 2026-04-10T01:16:42.490 | 2026-04-10T01:16:42.490 |
| fkie_cve-2026-5994 | A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This issue affects th… | 2026-04-10T01:16:42.280 | 2026-04-10T01:16:42.280 |
| fkie_cve-2026-5993 | A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This vulnerability affects… | 2026-04-10T01:16:41.743 | 2026-04-10T01:16:41.743 |
| fkie_cve-2026-4568 | A vulnerability was found in SourceCodester Sales and Inventory System 1.0. This affects an unknown… | 2026-03-23T03:16:00.610 | 2026-04-10T01:13:11.690 |
| fkie_cve-2026-4569 | A vulnerability was determined in SourceCodester Sales and Inventory System 1.0. This impacts an un… | 2026-03-23T04:16:18.150 | 2026-04-10T01:10:55.577 |
| fkie_cve-2026-4571 | A security flaw has been discovered in SourceCodester Sales and Inventory System 1.0. Affected by t… | 2026-03-23T05:16:07.193 | 2026-04-10T01:07:35.457 |
| fkie_cve-2026-4572 | A weakness has been identified in SourceCodester Sales and Inventory System 1.0. Affected by this i… | 2026-03-23T05:16:07.437 | 2026-04-10T01:04:50.290 |
| fkie_cve-2026-5992 | A vulnerability was determined in Tenda F451 1.0.0.7. This affects the function fromP2pListFilter o… | 2026-04-10T00:16:36.750 | 2026-04-10T00:16:36.750 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-cfc8-rw2h-jfg7 |
5.0 (3.1)
|
The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for … | 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-c63j-h6fc-c5w3 |
6.4 (3.1)
|
The BlockArt Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'clie… | 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-c2rf-g3vq-gg84 |
6.1 (3.1)
|
The Optimole – Optimize Images in Real Time plugin for WordPress is vulnerable to Reflected Cross-S… | 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-9r43-wfq5-rv33 |
7.5 (3.1)
|
ChargePoint Home Flex revssh Service Command Injection Remote Code Execution Vulnerability. This vu… | 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-93fc-f6pw-cp83 |
7.5 (3.1)
|
ChargePoint Home Flex OCPP getpreq Stack-based Buffer Overflow Remote Code Execution Vulnerability.… | 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-8g9h-q4wq-r7gp |
7.2 (3.1)
|
The Optimole – Optimize Images | Convert WebP & AVIF | CDN & Lazy Load | Image Optimization plugin … | 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-7cp2-q9fg-jpv9 |
7.8 (3.1)
|
GIMP XPM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allo… | 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-75gg-gxqp-fq44 |
7.1 (3.1)
|
NoMachine External Control of File Path Arbitrary File Deletion Vulnerability. This vulnerability a… | 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-69j2-hc78-98c7 |
7.5 (3.1)
|
ChargePoint Home Flex Inclusion of Sensitive Information in Source Code Information Disclosure Vuln… | 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-4399-fg4g-454c |
7.8 (3.1)
|
NoMachine External Control of File Path Local Privilege Escalation Vulnerability. This vulnerabilit… | 2026-04-11T03:30:30Z | 2026-04-11T03:30:30Z |
| ghsa-xq39-5c6m-mcq7 |
6.5 (3.1)
|
OpenClaw Canvas Path Traversal Information Disclosure Vulnerability. This vulnerability allows remo… | 2026-04-11T03:30:29Z | 2026-04-11T03:30:29Z |
| ghsa-wgjm-63ch-mwj3 |
7.8 (3.1)
|
GIMP PSD File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allo… | 2026-04-11T03:30:29Z | 2026-04-11T03:30:29Z |
| ghsa-v5fw-rcv7-v6f3 |
2.9 (3.1)
|
Flatpak xdg-desktop-portal before 1.20.4 and 1.21.x before 1.21.1 allows any Flatpak app to trash a… | 2026-04-11T03:30:29Z | 2026-04-11T03:30:29Z |
| ghsa-fh28-mqr2-jxm7 |
7.8 (3.1)
|
GIMP ANI File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allo… | 2026-04-11T03:30:29Z | 2026-04-11T03:30:29Z |
| ghsa-93g8-mgqc-w7h9 |
7.4 (3.1)
|
OpenClaw Canvas Authentication Bypass Vulnerability. This vulnerability allows remote attackers to … | 2026-04-11T03:30:29Z | 2026-04-11T03:30:29Z |
| ghsa-8v6v-j22p-w63g |
10.0 (3.1)
|
Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Execution Vulnerability. This vulnerabi… | 2026-04-11T03:30:29Z | 2026-04-11T03:30:29Z |
| ghsa-67qf-qf6p-xgv3 |
7.8 (3.1)
|
GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerab… | 2026-04-11T03:30:29Z | 2026-04-11T03:30:29Z |
| ghsa-4h5x-fjp7-jhq3 |
5.3 (3.1)
|
OpenClaw Client PKCE Verifier Information Disclosure Vulnerability. This vulnerability allows remot… | 2026-04-11T03:30:29Z | 2026-04-11T03:30:29Z |
| ghsa-c25q-mqx5-m6v8 |
|
Net::CIDR::Lite versions before 0.23 for Perl does not validate IPv6 group count, which may allow I… | 2026-04-11T00:31:19Z | 2026-04-11T00:31:19Z |
| ghsa-932w-96j4-j35v |
|
Net::CIDR::Lite versions before 0.23 for Perl mishandles IPv4 mapped IPv6 addresses, which may allo… | 2026-04-11T00:31:19Z | 2026-04-11T00:31:19Z |
| ghsa-4c9q-86fx-4cv8 |
4.3 (3.1)
|
Microsoft Edge (Chromium-based) Spoofing Vulnerability | 2026-04-11T00:31:19Z | 2026-04-11T00:31:19Z |
| ghsa-29q2-v59x-3mg8 |
5.4 (3.1)
|
User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) al… | 2026-04-11T00:31:19Z | 2026-04-11T00:31:19Z |
| ghsa-hwqh-2684-54fc |
7.5 (3.1)
|
Spring Cloud Gateway's SSL bundle configuration silently bypassed | 2026-04-10T09:31:15Z | 2026-04-10T22:11:21Z |
| ghsa-8wrq-fv5f-pfp2 |
9.6 (3.1)
|
parisneo/lollms vulnerable to stored XSS in the social feature | 2026-04-10T09:31:15Z | 2026-04-10T22:11:10Z |
| ghsa-9cp7-j3f8-p5jx |
10.0 (3.1)
|
Daptin has Unauthenticated Path Traversal and Zip Slip | 2026-04-10T22:11:04Z | 2026-04-10T22:11:04Z |
| ghsa-jvff-x2qm-6286 |
8.8 (3.1)
|
mathjs Allows Improperly Controlled Modification of Dynamically-Determined Object Attributes | 2026-04-10T22:10:49Z | 2026-04-10T22:10:49Z |
| ghsa-52vj-fvrv-7q82 |
5.6 (3.1)
2.9 (4.0)
|
OpenClaw vulnerable to SSRF in src/agents/tools/web-fetch.ts | 2026-04-10T06:31:38Z | 2026-04-10T22:10:22Z |
| ghsa-x7mm-9vvv-64w8 |
2.3 (4.0)
|
unhead: Streaming SSR `streamKey` injected into inline script without identifier validation | 2026-04-10T22:09:39Z | 2026-04-10T22:09:39Z |
| ghsa-4phw-6824-6cfp |
3.5 (3.1)
|
OpenStack Keystone: Restricted application credentials can create EC2 credentials | 2026-04-10T03:31:10Z | 2026-04-10T22:09:31Z |
| ghsa-55v6-g8pm-pw4c |
4.3 (3.1)
|
rembg server is vulnerable to Server-Side Request Forgery (SSRF) and a weak default CORS configuration | 2026-04-10T22:09:15Z | 2026-04-10T22:09:15Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2025-36 |
9.8 (3.1)
|
Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/valida… | langflow | 2025-04-07T15:15:44+00:00 | 2025-05-07T19:22:44.993642+00:00 |
| pysec-2024-246 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Starting in… | vyper | 2024-04-25T17:15:50+00:00 | 2025-05-05T19:21:20.899426+00:00 |
| pysec-2024-111 |
9.1 (3.1)
|
A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langcha… | langchain | 2024-10-29T13:15:00Z | 2025-05-02T18:39:47.588215Z |
| pysec-2024-245 |
|
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated user… | apache-airflow | 2024-02-29T11:15:08+00:00 | 2025-05-01T21:22:38.598048+00:00 |
| pysec-2025-35 |
7.5 (3.1)
|
Weblate is a web based localization tool. Prior to version 5.11, when creating a new comp… | weblate | 2025-04-15T21:16:04+00:00 | 2025-04-30T17:22:51.467257+00:00 |
| pysec-2025-34 |
|
The unsafe globals in Picklescan before 0.0.25 do not include ssl. Consequently, ssl.get_… | picklescan | 2025-04-24T01:15:49+00:00 | 2025-04-24T03:08:15.436691+00:00 |
| pysec-2025-33 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. When the Vyper Compiler uses the… | vyper | 2025-01-14T18:16:05+00:00 | 2025-04-23T21:23:01.322686+00:00 |
| pysec-2025-32 |
9.8 (3.1)
|
BentoML is a Python library for building online serving systems optimized for AI apps and… | bentoml | 2025-04-09T16:15:25+00:00 | 2025-04-22T19:21:34.073355+00:00 |
| pysec-2025-31 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper handles AugAssign statemen… | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.116292+00:00 |
| pysec-2025-30 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Multiple evaluation of a single … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.064106+00:00 |
| pysec-2025-29 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper `sqrt()` builtin uses the … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.005382+00:00 |
| pysec-2025-28 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.772920+00:00 |
| pysec-2025-27 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.711157+00:00 |
| pysec-2025-26 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.645758+00:00 |
| pysec-2025-25 |
6.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the CORS middle… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.532849+00:00 |
| pysec-2025-24 |
7.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the /api/remove… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.486485+00:00 |
| pysec-2025-23 |
|
Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Inform… | ray | 2025-03-06T05:15:16+00:00 | 2025-04-09T17:27:27.434099+00:00 |
| pysec-2025-22 |
9.8 (3.1)
|
A vulnerability, that could result in Remote Code Execution (RCE), has been found in Plot… | plotai | 2025-03-10T14:15:24+00:00 | 2025-04-09T17:27:27.203714+00:00 |
| pysec-2025-21 |
9.8 (3.1)
|
picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model arch… | picklescan | 2025-03-10T12:15:12+00:00 | 2025-04-09T17:27:27.016747+00:00 |
| pysec-2023-311 |
5.4 (3.1)
|
plone.namedfile allows users to handle `File` and `Image` fields targeting, but not depen… | plone-namedfile | 2023-09-21T15:15:10+00:00 | 2025-04-09T17:27:27.153848+00:00 |
| pysec-2022-43179 |
7.3 (3.1)
|
Poetry is a dependency manager for Python. To handle dependencies that come from a Git re… | poetry | 2022-09-07T19:15:08+00:00 | 2025-04-09T17:27:27.255151+00:00 |
| pysec-2021-891 |
7.8 (3.1)
|
CWE - CWE-287: Improper Authentication vulnerability in SUSE Linux Enterprise Server 15 S… | salt | 2021-03-03T10:15:13+00:00 | 2025-04-09T17:27:27.582884+00:00 |
| pysec-2025-20 |
6.5 (3.1)
|
picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes i… | picklescan | 2025-03-10T12:15:10+00:00 | 2025-04-09T17:27:26.966215+00:00 |
| pysec-2025-19 |
9.8 (3.1)
|
picklescan before 0.0.22 only considers standard pickle file extensions in the scope for … | picklescan | 2025-03-03T19:15:34+00:00 | 2025-04-09T17:27:26.916350+00:00 |
| pysec-2025-18 |
|
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craf… | picklescan | 2025-02-26T15:15:24+00:00 | 2025-04-09T17:27:26.867210+00:00 |
| pysec-2025-17 |
5.5 (3.1)
|
In mlflow/mlflow version 2.18, an admin is able to create a new user account without sett… | mlflow | 2025-03-20T10:15:54+00:00 | 2025-04-09T17:27:26.322333+00:00 |
| pysec-2023-310 |
7.5 (3.1)
|
Mobile Security Framework (MobSF) <=v3.7.8 Beta is vulnerable to Insecure Permissions. NO… | mobsf | 2023-09-21T22:15:11+00:00 | 2025-04-09T17:27:26.663665+00:00 |
| pysec-2023-309 |
8.8 (3.1)
|
Path Traversal in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-13T00:15:07+00:00 | 2025-04-09T17:27:26.271200+00:00 |
| pysec-2023-308 |
10.0 (3.1)
|
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0. | mlflow | 2023-07-19T01:15:10+00:00 | 2025-04-09T17:27:26.223213+00:00 |
| pysec-2025-16 |
7.5 (3.1)
|
LNbits is a Lightning wallet and accounts system. A Server-Side Request Forgery (SSRF) vu… | lnbits | 2025-04-06T20:15:15+00:00 | 2025-04-09T17:27:25.872691+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33851 | phpecc, as used in paragonie/phpecc before 2.0.1, has a branch-based timing leak in Point… | 2024-04-28T05:02:07.732559Z |
| gsd-2024-33850 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.952536Z |
| gsd-2024-33849 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.924449Z |
| gsd-2024-4295 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:06.068263Z |
| gsd-2024-4294 | A vulnerability, which was classified as critical, has been found in PHPGurukul Doctor Ap… | 2024-04-28T05:02:06.079201Z |
| gsd-2024-4293 | A vulnerability classified as problematic was found in PHPGurukul Doctor Appointment Mana… | 2024-04-28T05:02:06.052534Z |
| gsd-2024-4292 | A vulnerability classified as critical has been found in Contemporary Controls BASrouter … | 2024-04-28T05:02:06.073286Z |
| gsd-2024-4291 | A vulnerability was found in Tenda A301 15.13.08.12_multi_TDE01. It has been rated as cri… | 2024-04-28T05:02:06.058388Z |
| gsd-2023-52722 | An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER … | 2024-04-28T05:01:28.746814Z |
| gsd-2022-48685 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:00:27.870720Z |
| gsd-2022-48684 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:00:27.715598Z |
| gsd-2024-24777 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:24.547536Z |
| gsd-2024-28875 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:20.401696Z |
| gsd-2024-33846 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.353086Z |
| gsd-2024-33845 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.569462Z |
| gsd-2024-33844 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.384822Z |
| gsd-2024-33843 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.393431Z |
| gsd-2024-33842 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.286185Z |
| gsd-2024-33841 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.393169Z |
| gsd-2024-33840 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.586722Z |
| gsd-2024-33839 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.579161Z |
| gsd-2024-33838 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.585807Z |
| gsd-2024-33837 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.377806Z |
| gsd-2024-33836 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.309729Z |
| gsd-2024-33835 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.550838Z |
| gsd-2024-33834 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.333945Z |
| gsd-2024-33833 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.551960Z |
| gsd-2024-33832 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.298682Z |
| gsd-2024-33831 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.326184Z |
| gsd-2024-33830 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.395389Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2505 | Malicious code in @aspect-security/argon2 (npm) | 2026-04-07T12:16:51Z | 2026-04-10T17:23:32Z |
| mal-2026-2083 | Malicious code in anduril-sdk (PyPI) | 2026-03-23T08:06:29Z | 2026-04-10T15:51:21Z |
| mal-2026-1933 | Malicious code in libavcodec-extra (PyPI) | 2026-03-19T17:37:46Z | 2026-04-10T15:51:21Z |
| mal-2026-1351 | Malicious code in faaladorcli (PyPI) | 2026-03-11T23:31:55Z | 2026-04-10T15:51:21Z |
| mal-2026-1350 | Malicious code in falador (PyPI) | 2026-03-11T23:30:12Z | 2026-04-10T15:51:21Z |
| mal-2026-1296 | Malicious code in bpsm (PyPI) | 2026-03-09T17:31:34Z | 2026-04-10T15:51:21Z |
| mal-2026-1295 | Malicious code in tabformerlite (PyPI) | 2026-03-09T17:26:01Z | 2026-04-10T15:51:21Z |
| mal-2026-1294 | Malicious code in causal-canvas (PyPI) | 2026-03-09T17:28:14Z | 2026-04-10T15:51:21Z |
| mal-2026-1144 | Malicious code in roku-aihub (PyPI) | 2026-03-02T23:51:19Z | 2026-04-10T15:51:21Z |
| mal-2024-12219 | Malicious code in bitcommit (PyPI) | 2024-08-27T21:24:04Z | 2026-04-10T15:51:21Z |
| mal-2026-2532 | Malicious code in emd-ext (PyPI) | 2026-04-10T15:33:38Z | 2026-04-10T15:35:13Z |
| mal-2026-2536 | Malicious code in yhaplo1 (PyPI) | 2026-04-10T15:31:12Z | 2026-04-10T15:31:12Z |
| mal-2026-2531 | Malicious code in bonsaitree1 (PyPI) | 2026-04-10T15:30:19Z | 2026-04-10T15:30:19Z |
| mal-2026-2534 | Malicious code in siempyl-sumo (PyPI) | 2026-04-10T15:29:26Z | 2026-04-10T15:29:26Z |
| mal-2026-2535 | Malicious code in ttam (PyPI) | 2026-04-10T15:28:37Z | 2026-04-10T15:28:37Z |
| mal-2026-2533 | Malicious code in phasedibd (PyPI) | 2026-04-10T15:27:24Z | 2026-04-10T15:27:24Z |
| mal-2026-2530 | Malicious code in noonhelpers (PyPI) | 2026-04-10T12:02:29Z | 2026-04-10T12:02:29Z |
| mal-2026-2522 | Malicious code in st-payment (PyPI) | 2026-04-09T13:30:26Z | 2026-04-09T13:30:26Z |
| mal-2026-2521 | Malicious code in gc-grocery-api (PyPI) | 2026-04-09T13:29:38Z | 2026-04-09T13:29:38Z |
| mal-2026-2519 | Malicious code in just4testlm (PyPI) | 2026-04-09T07:28:17Z | 2026-04-09T08:40:08Z |
| mal-2026-2517 | Malicious code in kraken-trader (PyPI) | 2026-04-08T20:22:02Z | 2026-04-08T20:22:02Z |
| mal-2026-2244 | Malicious code in fluxhttp (PyPI) | 2026-03-26T20:49:03Z | 2026-04-08T20:19:39Z |
| mal-2026-2120 | Malicious code in logutilkit (PyPI) | 2026-03-23T22:53:57Z | 2026-04-08T20:19:39Z |
| mal-2026-2119 | Malicious code in apachelicense (PyPI) | 2026-03-23T20:41:45Z | 2026-04-08T20:19:39Z |
| mal-2026-2084 | Malicious code in license-utils-kit (PyPI) | 2026-03-23T09:41:24Z | 2026-04-08T20:19:39Z |
| mal-2026-2492 | Malicious code in admin0911 (npm) | 2026-04-05T15:30:57Z | 2026-04-08T18:35:00Z |
| mal-2026-2516 | Malicious code in sentinel-tool (PyPI) | 2026-04-08T16:31:08Z | 2026-04-08T16:31:08Z |
| mal-2026-2515 | Malicious code in granulate-utils (PyPI) | 2026-04-08T12:34:04Z | 2026-04-08T12:34:04Z |
| mal-2026-2514 | Malicious code in gprofiler-logging (PyPI) | 2026-04-08T12:33:58Z | 2026-04-08T12:33:58Z |
| mal-2026-2211 | Malicious code in @opengov/form-renderer (npm) | 2026-03-26T00:33:27Z | 2026-04-07T23:28:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2915 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-23T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2914 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-22T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2904 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-18T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2868 | Linux Kernel: Mehrere Schwachstellen | 2025-12-16T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2765 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-08T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2756 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-07T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2747 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2658 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-20T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2651 | GnuTLS: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-11-19T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2637 | Rsync: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-11-18T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2600 | PostgreSQL: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-13T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2595 | Linux Kernel: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2579 | Linux Kernel: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2568 | Red Hat Enterprise Linux (kea): Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-11T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2531 | Linux Kernel: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-11-09T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2483 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-11-03T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2450 | Linux Kernel: Mehrere Schwachstellen | 2025-10-29T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2441 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-29T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2431 | Linux Kernel: Mehrere Schwachstellen | 2025-10-28T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2430 | Linux Kernel: Mehrere Schwachstellen | 2025-10-27T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2420 | Apache Tomcat: Mehrere Schwachstellen | 2025-10-27T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2407 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-26T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2365 | Oracle Java SE: Mehrere Schwachstellen | 2025-10-21T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2350 | Linux Kernel: Mehrere Schwachstellen | 2025-10-20T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2340 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-19T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2329 | cPanel/WHM (PostgreSQL, Perl): Mehrere Schwachstellen | 2025-10-16T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2298 | Linux Kernel: Mehrere Schwachstellen | 2025-10-14T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2268 | Linux Kernel: Mehrere Schwachstellen | 2025-10-13T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2249 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-09T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2246 | Linux Kernel: Mehrere Schwachstellen | 2025-10-08T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-069-02 | Lantronix EDS3000PS and EDS5000 | 2026-03-10T06:00:00.000000Z | 2026-03-10T06:00:00.000000Z |
| icsa-26-069-01 | Apeman Cameras | 2026-03-10T06:00:00.000000Z | 2026-03-10T06:00:00.000000Z |
| icsa-26-069-04 | Ceragon Siklu MultiHaul and EtherHaul Series | 2026-03-10T05:00:00.000000Z | 2026-03-10T05:00:00.000000Z |
| icsa-26-064-01 | Delta Electronics CNCSoft-G2 | 2026-03-05T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| icsa-25-350-02 | Johnson Controls PowerG, IQPanel and IQHub (Update A) | 2025-12-16T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| icsa-25-343-01 | Universal Boot Loader (U-Boot) (Update A) | 2025-12-09T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| icsa-22-020-01 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric HMI SCADA (Update B) | 2022-01-20T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| va-25-297-01 | IBM DOORS Next Generation multiple vulnerabilities | 2025-10-22T18:45:47Z | 2026-03-04T00:00:00Z |
| icsa-26-062-05 | Labkotec LID-3300IP | 2026-03-03T07:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-04 | Portwell Engineering Toolkits | 2026-03-03T07:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-03 | Hitachi Energy RTU500 Product | 2026-02-24T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-02 | Hitachi Energy Relion REB500 Product | 2026-02-24T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-01 | Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module | 2026-03-03T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-25-023-02 | Hitachi Energy RTU500 Series Product (Update B) | 2024-04-30T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-08 | Everon OCPP Backends | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-062-07 | ePower epower.ie | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-062-06 | Mobiliti e-mobi.hu | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-057-10 | Copeland XWEB and XWEB Pro | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-09 | Yokogawa CENTUM VP R6, R7 | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-08 | Mobility46 mobility46.se | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-07 | EV Energy ev.energy | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-06 | SWITCH EV swtchenergy.com | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-05 | Chargemap chargemap.com | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-04 | EV2GO ev2go.io | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-03 | CloudCharge cloudcharge.se | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-02 | Pelco, Inc. Sarix Pro 3 Series IP Cameras | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-01 | Johnson Controls, Inc. Frick Controls Quantum HD | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-25-133-02 | Hitachi Energy Relion 670/650/SAM600-IO Series (Update C) | 2023-11-28T00:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-043-06 | Siemens SINEC OS | 2026-01-28T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-26-027-01 | iba Systems ibaPDA | 2026-01-27T07:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-snort3-dcerpc-vulns-j9hnf4th | Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities | 2026-01-07T16:00:00+00:00 | 2026-02-10T20:42:07+00:00 |
| cisco-sa-pi-xss-byevkcd | Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-epnm-pi-redirect-6sx82dn | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Open Redirect Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-cmm-file-up-ky47n8kk | Cisco Meeting Management Arbitrary File Upload Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-ucce-pcce-xss-2jvyg3ud | Cisco Packaged Contact Center Enterprise and Cisco Unified Contact Center Enterprise Cross-Site Scripting Vulnerabilities | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-intersight-privesc-p6tbm6jk | Cisco Intersight Virtual Appliance Privilege Escalation Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-iec6400-pem5uq7v | Cisco IEC6400 Wireless Backhaul Edge Compute Software SSH Denial of Service Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-sma-attack-n9bf4 | Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager | 2025-12-17T16:00:00+00:00 | 2026-01-15T16:01:43+00:00 |
| cisco-sa-ise-xss-9tdh2kx | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-ise-xss-964cdxw5 | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-epnm-pi-stored-xss-gekx8ywk | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-ise-xxe-jwsbsdkt | Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability | 2026-01-07T16:00:00+00:00 | 2026-01-07T16:00:00+00:00 |
| cisco-sa-react-flight-tyw32ddb | Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 | 2025-12-04T16:00:00+00:00 | 2025-12-17T22:37:17+00:00 |
| cisco-sa-ise-multiple-vulns-o9beswjh | Cisco Identity Services Engine Reflected Cross-Site Scripting and Information Disclosure Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-12-04T14:23:54+00:00 |
| cisco-sa-cc-mult-vuln-gk4tfxsn | Multiple Cisco Contact Center Products Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-11-18T14:49:09+00:00 |
| cisco-sa-privesc-catc-ryjreelu | Cisco Catalyst Center Privilege Escalation Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-dnac-xss-wextvz59 | Cisco Catalyst Center Cross-Site Scripting Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-dnac-ci-zwlqvswt | Cisco Catalyst Center REST API Command Injection Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-catc-priv-esc-vs8eecux | Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-catc-open-redirect-3w5bk3je | Cisco Catalyst Center Virtual Appliance HTTP Open Redirect Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-cc-unauth-rce-qen8h7mq | Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-11-13T12:48:42+00:00 |
| cisco-sa-asaftd-webvpn-yrootuw | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Unauthorized Access Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:55+00:00 |
| cisco-sa-asaftd-webvpn-z5xp8eub | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:54+00:00 |
| cisco-sa-http-code-exec-wmfp3h3o | Cisco Secure Firewall Adaptive Security Appliance Software, Secure Firewall Threat Defense Software, IOS Software, IOS XE Software, and IOS XR Software Web Services Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:51+00:00 |
| cisco-sa-ise-radsupress-dos-8yf3jthh | Cisco Identity Services Engine RADIUS Suppression Denial of Service Vulnerability | 2025-11-05T16:00:00+00:00 | 2025-11-05T16:00:00+00:00 |
| cisco-sa-broadworks-xss-o696ymra | Cisco BroadWorks CommPilot Application Software Cross-Site Scripting Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-10-21T15:13:31+00:00 |
| cisco-sa-roomos-inf-disc-qggsbxam | Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-phone-dos-fpyjlv7a | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-secboot-uqfd8avc | Cisco IOS XE Software Secure Boot Bypass Vulnerabilities | 2025-09-24T16:00:00+00:00 | 2025-10-15T15:57:29+00:00 |
| cisco-sa-snmp-x4lphte | Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-06T18:27:02+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-21717 | CVE-2026-21717 | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:45.000Z |
| msrc_cve-2025-66038 | OpenSC: `sc_compacttlv_find_tag` can return out-of-bounds pointers | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:38.000Z |
| msrc_cve-2025-66037 | OpenSC: Out of Bounds vulnerability | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:31.000Z |
| msrc_cve-2025-66215 | OpenSC: Stack-buffer-overflow WRITE in card-oberthur | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:25.000Z |
| msrc_cve-2025-49010 | OpenSC: Stack-buffer-overflow WRITE in GET RESPONSE | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:18.000Z |
| msrc_cve-2026-21712 | CVE-2026-21712 | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:07.000Z |
| msrc_cve-2026-2673 | OpenSSL TLS 1.3 server may choose unexpected key agreement group | 2026-03-02T00:00:00.000Z | 2026-04-09T01:38:04.000Z |
| msrc_cve-2026-34445 | ONNX: Malicious ONNX models can crash servers by exploiting unprotected object settings. | 2026-04-02T00:00:00.000Z | 2026-04-09T01:02:56.000Z |
| msrc_cve-2026-34446 | ONNX: Arbitrary File Read via ExternalData Hardlink Bypass in ONNX load | 2026-04-02T00:00:00.000Z | 2026-04-09T01:02:48.000Z |
| msrc_cve-2026-35177 | Path traversal issue with zip.vim in Vim | 2026-04-02T00:00:00.000Z | 2026-04-09T01:02:39.000Z |
| msrc_cve-2026-34982 | Vim modeline bypass via various options affects Vim < 9.2.0276 | 2026-04-02T00:00:00.000Z | 2026-04-09T01:02:34.000Z |
| msrc_cve-2026-35093 | Libinput: libinput: unauthorized code execution and information disclosure through lua bytecode plugins | 2026-04-02T00:00:00.000Z | 2026-04-09T01:02:29.000Z |
| msrc_cve-2026-34990 | OpenPrinting CUPS: Local print admin token disclosure using temporary printers | 2026-04-02T00:00:00.000Z | 2026-04-09T01:01:45.000Z |
| msrc_cve-2026-34980 | OpenPrinting CUPS: Shared PostScript queue lets anonymous Print-Job requests reach `lp` code execution over the network | 2026-04-02T00:00:00.000Z | 2026-04-09T01:01:40.000Z |
| msrc_cve-2026-34979 | OpenPrinting CUPS: Heap overflow in `get_options()` | 2026-04-02T00:00:00.000Z | 2026-04-09T01:01:35.000Z |
| msrc_cve-2026-34978 | OpenPrinting CUPS: Path traversal in RSS notify-recipient-uri enables file write outside CacheDir/rss (and clobbering of job.cache) | 2026-04-02T00:00:00.000Z | 2026-04-09T01:01:30.000Z |
| msrc_cve-2026-34933 | Avahi: Reachable assertion in `transport_flags_from_domain()` via conflicting publish flags crashes avahi-daemon | 2026-04-02T00:00:00.000Z | 2026-04-09T01:01:25.000Z |
| msrc_cve-2026-4645 | Github.com/antchfx/xpath: xpath: denial of service via crafted boolean xpath expressions | 2026-03-02T00:00:00.000Z | 2026-04-08T01:41:42.000Z |
| msrc_cve-2006-10003 | XML::Parser versions through 2.47 for Perl has an off-by-one heap buffer overflow in st_serial_stack | 2026-03-02T00:00:00.000Z | 2026-04-08T01:40:48.000Z |
| msrc_cve-2026-29785 | NATS Server panic via malicious compression on leafnode port | 2026-03-02T00:00:00.000Z | 2026-04-08T01:38:58.000Z |
| msrc_cve-2026-33216 | NATS has MQTT plaintext password disclosure | 2026-03-02T00:00:00.000Z | 2026-04-08T01:38:51.000Z |
| msrc_cve-2026-5201 | Gdk-pixbuf: gdk-pixbuf: denial of service via heap-based buffer overflow when processing a specially crafted jpeg image | 2026-03-02T00:00:00.000Z | 2026-04-08T01:38:43.000Z |
| msrc_cve-2026-33554 | CVE-2026-33554 | 2026-03-02T00:00:00.000Z | 2026-04-08T01:38:36.000Z |
| msrc_cve-2026-34714 | CVE-2026-34714 | 2026-03-02T00:00:00.000Z | 2026-04-08T01:37:47.000Z |
| msrc_cve-2026-33936 | python-ecdsa: Denial of Service via improper DER length validation in crafted private keys | 2026-03-02T00:00:00.000Z | 2026-04-08T01:36:46.000Z |
| msrc_cve-2026-31394 | mac80211: fix crash in ieee80211_chan_bw_change for AP_VLAN stations | 2026-04-02T00:00:00.000Z | 2026-04-07T14:37:49.000Z |
| msrc_cve-2026-32186 | Microsoft Bing Elevation of Privilege Vulnerability | 2026-04-02T07:00:00.000Z | 2026-04-07T07:00:00.000Z |
| msrc_cve-2026-35414 | CVE-2026-35414 | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:35.000Z |
| msrc_cve-2026-27456 | util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:30.000Z |
| msrc_cve-2026-23442 | ipv6: add NULL checks for idev in SRv6 paths | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:25.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0056 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2026-02-10T19:07:16.028511Z | 2026-02-10T19:07:16.028511Z |
| ncsc-2026-0055 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-02-10T19:05:45.729972Z | 2026-02-10T19:05:45.729972Z |
| ncsc-2026-0054 | Kwetsbaarheid verholpen in Microsoft Exchange | 2026-02-10T19:04:51.366294Z | 2026-02-10T19:04:51.366294Z |
| ncsc-2026-0053 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-02-10T19:01:45.561771Z | 2026-02-10T19:01:45.561771Z |
| ncsc-2026-0052 | Kwetsbaarheden verholpen in SAP producten | 2026-02-10T12:28:40.531069Z | 2026-02-10T12:28:40.531069Z |
| ncsc-2026-0051 | Kwetsbaarheden verholpen in Siemens producten | 2026-02-10T12:27:40.637581Z | 2026-02-10T12:27:40.637581Z |
| ncsc-2026-0050 | Kwetsbaarheid verholpen in PEAR | 2026-02-09T10:41:43.856342Z | 2026-02-09T10:41:43.856342Z |
| ncsc-2026-0049 | Kwetsbaarheden verholpen in n8n | 2026-02-09T10:39:40.792744Z | 2026-02-09T10:39:40.792744Z |
| ncsc-2026-0046 | Kwetsbaarheden verholpen in Samsung mobile | 2026-02-09T07:48:28.751473Z | 2026-02-09T07:48:28.751473Z |
| ncsc-2026-0040 | Kwetsbaarheid verholpen in SmarterTools SmarterMail | 2026-01-27T10:51:39.476320Z | 2026-02-06T09:25:57.008166Z |
| ncsc-2026-0045 | Kwetsbaarheid verholpen in Cisco Meeting Management | 2026-02-06T09:22:16.831778Z | 2026-02-06T09:22:16.831778Z |
| ncsc-2026-0044 | Kwetsbaarheid verholpen in Cisco TelePresence Collaboration Endpoint | 2026-02-06T09:20:11.629058Z | 2026-02-06T09:20:11.629058Z |
| ncsc-2026-0042 | Kwetsbaarheden verholpen in SolarWinds Web Help Desk | 2026-01-28T16:37:21.114054Z | 2026-02-02T09:47:54.857445Z |
| ncsc-2025-0386 | Kwetsbaarheden verholpen in Fortinet producten | 2025-12-10T09:51:34.918202Z | 2026-01-28T15:46:10.814803Z |
| ncsc-2026-0041 | Kwetsbaarheid verholpen in Fortinet producten | 2026-01-28T09:32:41.752905Z | 2026-01-28T09:32:41.752905Z |
| ncsc-2026-0039 | ZeroDay kwetsbaarheid verholpen in Microsoft Office | 2026-01-27T07:27:52.867415Z | 2026-01-27T07:27:52.867415Z |
| ncsc-2026-0038 | Kwetsbaarheid verholpen in BIND 9 | 2026-01-23T08:54:43.506215Z | 2026-01-23T08:54:43.506215Z |
| ncsc-2026-0037 | Kwetsbaarheden verholpen in GitLab Community Edition en Enterprise Edition | 2026-01-22T12:35:30.505659Z | 2026-01-22T12:35:30.505659Z |
| ncsc-2026-0036 | Kwetsbaarheden verholpen in Cisco Unified Communications producten | 2026-01-22T09:49:39.156365Z | 2026-01-22T09:49:39.156365Z |
| ncsc-2026-0035 | Kwetsbaarheid verholpen in Palo Alto Networks PAN-OS | 2026-01-22T09:22:36.433609Z | 2026-01-22T09:22:36.433609Z |
| ncsc-2026-0034 | Kwetsbaarheden verholpen in Atlassian producten | 2026-01-22T09:03:42.667958Z | 2026-01-22T09:03:42.667958Z |
| ncsc-2026-0033 | Kwetsbaarheid verholpen in GNU Inetutils telnetd | 2026-01-21T14:15:46.424529Z | 2026-01-21T14:15:46.424529Z |
| ncsc-2026-0032 | Kwetsbaarheden verholpen in Oracle MySQL | 2026-01-21T10:12:24.844869Z | 2026-01-21T10:12:24.844869Z |
| ncsc-2026-0031 | Kwetsbaarheden verholpen in Oracle JD Edwards | 2026-01-21T10:12:00.674214Z | 2026-01-21T10:12:00.674214Z |
| ncsc-2026-0030 | Kwetsbaarheden verholpen in Oracle Java | 2026-01-21T10:11:39.759123Z | 2026-01-21T10:11:39.759123Z |
| ncsc-2026-0029 | Kwetsbaarheden verholpen in Oracle Hyperion | 2026-01-21T10:10:46.297433Z | 2026-01-21T10:10:46.297433Z |
| ncsc-2026-0028 | Kwetsbaarheden verholpen in Oracle Analytics | 2026-01-21T10:10:15.985753Z | 2026-01-21T10:10:15.985753Z |
| ncsc-2026-0027 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2026-01-21T10:08:59.379774Z | 2026-01-21T10:08:59.379774Z |
| ncsc-2026-0026 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2026-01-21T10:06:27.920991Z | 2026-01-21T10:06:27.920991Z |
| ncsc-2026-0025 | Kwetsbaarheden verholpen in Oracle Financial Services | 2026-01-21T09:55:33.889125Z | 2026-01-21T09:55:33.889125Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2019:2-01 | CSV Injection on node label | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019:1-01 | Stored XSS in field name data model | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10479-1 | python312-3.12.13-4.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10478-1 | python311-3.11.15-4.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10477-1 | python310-3.10.20-3.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10476-1 | python311-Pygments-2.20.0-2.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10475-1 | opensc-0.27.1-1.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10474-1 | ignition-2.26.0-3.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10473-1 | dnsdist-2.0.3-1.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10472-1 | conftest-0.67.1-2.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:20451-1 | Security update for gnome-online-accounts, gvfs | 2026-03-31T09:11:58Z | 2026-03-31T09:11:58Z |
| opensuse-su-2026:10471-1 | tinyproxy-1.11.3-2.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10470-1 | libXvnc-devel-1.16.1-2.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10469-1 | python315-3.15.0~a7-3.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10468-1 | python311-ecdsa-0.19.2-1.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10467-1 | ovmf-202602-6.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10466-1 | expat-2.7.5-1.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10465-1 | ImageMagick-7.1.2.18-2.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:20449-1 | Security update for postgresql13 | 2026-03-30T15:14:07Z | 2026-03-30T15:14:07Z |
| opensuse-su-2026:20448-1 | Security update for expat | 2026-03-30T14:59:16Z | 2026-03-30T14:59:16Z |
| opensuse-su-2026:20446-1 | Security update for gnutls | 2026-03-30T14:36:07Z | 2026-03-30T14:36:07Z |
| opensuse-su-2026:20447-1 | Security update for postgresql16 | 2026-03-30T14:27:44Z | 2026-03-30T14:27:44Z |
| opensuse-su-2026:20444-1 | Security update for tomcat10 | 2026-03-30T08:13:22Z | 2026-03-30T08:13:22Z |
| opensuse-su-2026:10464-1 | python311-pypdf-6.9.2-1.1 on GA media | 2026-03-30T00:00:00Z | 2026-03-30T00:00:00Z |
| opensuse-su-2026:10463-1 | netty-4.1.132-1.1 on GA media | 2026-03-30T00:00:00Z | 2026-03-30T00:00:00Z |
| opensuse-su-2026:10462-1 | heroic-games-launcher-2.20.1-4.1 on GA media | 2026-03-30T00:00:00Z | 2026-03-30T00:00:00Z |
| opensuse-su-2026:10461-1 | python311-nltk-3.9.4-1.1 on GA media | 2026-03-29T00:00:00Z | 2026-03-29T00:00:00Z |
| opensuse-su-2026:10460-1 | gdk-pixbuf-loader-libheif-1.21.2-2.1 on GA media | 2026-03-29T00:00:00Z | 2026-03-29T00:00:00Z |
| opensuse-su-2026:10459-1 | freerdp2-2.11.7-6.1 on GA media | 2026-03-29T00:00:00Z | 2026-03-29T00:00:00Z |
| opensuse-su-2026:10458-1 | MozillaFirefox-149.0-1.1 on GA media | 2026-03-29T00:00:00Z | 2026-03-29T00:00:00Z |
| opensuse-su-2026:10457-1 | xen-4.21.1_02-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10456-1 | tailscale-1.96.4-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:2071 | Red Hat Security Advisory: OpenShift Container Platform 4.18.33 packages and security update | 2026-02-11T04:55:25+00:00 | 2026-04-12T08:02:51+00:00 |
| rhsa-2026:1942 | Red Hat Security Advisory: Red Hat Quay 3.15.3 | 2026-02-04T15:43:51+00:00 | 2026-04-12T08:02:50+00:00 |
| rhsa-2026:1837 | Red Hat Security Advisory: osbuild-composer security update | 2026-02-05T16:03:01+00:00 | 2026-04-12T08:02:49+00:00 |
| rhsa-2026:1730 | Red Hat Security Advisory: Red Hat Quay 3.12.13 | 2026-02-02T15:52:56+00:00 | 2026-04-12T08:02:49+00:00 |
| rhsa-2026:1552 | Red Hat Security Advisory: OpenShift Container Platform 4.19.23 bug fix and security update | 2026-02-04T10:50:17+00:00 | 2026-04-12T08:02:49+00:00 |
| rhsa-2026:1540 | Red Hat Security Advisory: OpenShift Container Platform 4.15.61 packages and security update | 2026-02-05T16:39:36+00:00 | 2026-04-12T08:02:49+00:00 |
| rhsa-2026:1536 | Red Hat Security Advisory: Red Hat Ceph Storage 9.0 Security and Enhancement update | 2026-01-29T07:02:14+00:00 | 2026-04-12T08:02:49+00:00 |
| rhsa-2026:1520 | Red Hat Security Advisory: Red Hat multicluster global hub 1.6.1 security update | 2026-01-29T01:14:38+00:00 | 2026-04-12T08:02:48+00:00 |
| rhsa-2026:1517 | Red Hat Security Advisory: RHACS 4.8.8 security and bug fix update | 2026-01-28T22:40:02+00:00 | 2026-04-12T08:02:48+00:00 |
| rhsa-2026:1488 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.19.1 security update | 2026-01-28T12:24:36+00:00 | 2026-04-12T08:02:47+00:00 |
| rhsa-2026:1381 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-27T16:31:53+00:00 | 2026-04-12T08:02:47+00:00 |
| rhsa-2026:1380 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-27T16:02:11+00:00 | 2026-04-12T08:02:47+00:00 |
| rhsa-2026:1379 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-27T16:11:53+00:00 | 2026-04-12T08:02:46+00:00 |
| rhsa-2026:1378 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-27T15:37:28+00:00 | 2026-04-12T08:02:45+00:00 |
| rhsa-2026:1377 | Red Hat Security Advisory: image-builder security update | 2026-01-27T16:34:13+00:00 | 2026-04-12T08:02:45+00:00 |
| rhsa-2026:1072 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.15.1 security update | 2026-01-25T22:43:46+00:00 | 2026-04-12T08:02:45+00:00 |
| rhsa-2026:1071 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.10.1 security update | 2026-01-25T22:31:05+00:00 | 2026-04-12T08:02:45+00:00 |
| rhsa-2026:1025 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-22T16:47:34+00:00 | 2026-04-12T08:02:45+00:00 |
| rhsa-2026:0701 | Red Hat Security Advisory: OpenShift Container Platform 4.17.47 packages and security update | 2026-01-22T18:53:43+00:00 | 2026-04-12T08:02:45+00:00 |
| rhsa-2026:1067 | Red Hat Security Advisory: Assisted Installer RHEL 9 components for Multicluster Engine for Kubernetes 2.10.1 | 2026-01-23T16:45:25+00:00 | 2026-04-12T08:02:44+00:00 |
| rhsa-2026:1018 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.17.4 security update | 2026-01-22T15:52:24+00:00 | 2026-04-12T08:02:42+00:00 |
| rhsa-2026:1017 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.18.3 security update | 2026-01-22T15:47:03+00:00 | 2026-04-12T08:02:42+00:00 |
| rhsa-2026:0995 | Red Hat Security Advisory: OpenShift Container Platform 4.14.61 packages and security update | 2026-01-30T15:14:34+00:00 | 2026-04-12T08:02:42+00:00 |
| rhsa-2026:0987 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-22T11:30:22+00:00 | 2026-04-12T08:02:42+00:00 |
| rhsa-2026:0973 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-22T05:34:26+00:00 | 2026-04-12T08:02:40+00:00 |
| rhsa-2026:0722 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.8.4 security update | 2026-01-15T17:23:06+00:00 | 2026-04-12T08:02:40+00:00 |
| rhsa-2026:0718 | Red Hat Security Advisory: Moderate: Red Hat Advanced Cluster Management for Kubernetes v2.13.5 security update | 2026-01-15T15:59:28+00:00 | 2026-04-12T08:02:40+00:00 |
| rhsa-2026:0676 | Red Hat Security Advisory: OpenShift Container Platform 4.13.63 packages and security update | 2026-01-22T19:53:23+00:00 | 2026-04-12T08:02:39+00:00 |
| rhsa-2026:0671 | Red Hat Security Advisory: Assisted Installer RHEL 9 components for Multicluster Engine for Kubernetes 2.8.4 | 2026-01-15T08:34:14+00:00 | 2026-04-12T08:02:39+00:00 |
| rhsa-2026:0663 | Red Hat Security Advisory: OpenShift Container Platform 4.20.11 bug fix and security update | 2026-01-22T03:28:29+00:00 | 2026-04-12T08:02:38+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2025-042-04 | Enerlin'X IFE and eIFE | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-042-03 | EcoStruxure™ Process Expert, EcoStruxure™ Process Expert for AVEVA System Platform | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-042-01 | ASCO 5310 / 5350 Remote Annunciator | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2019-134-11 | Modicon Controllers | 2019-05-14T08:31:22.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-014-08 | Power Logic HDPM6000 High-Density Metering System | 2025-01-14T00:00:00.000Z | 2025-01-14T00:00:00.000Z |
| sevd-2025-014-04 | Web Designer for Modicon Communication Modules | 2025-01-14T00:00:00.000Z | 2025-01-14T00:00:00.000Z |
| sevd-2024-345-02 | Harmony HMI and Pro-face HMI products | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| sevd-2024-345-01 | PowerChute Serial Shutdown | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| sevd-2024-317-04 | EcoStruxure™ IT Gateway | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-317-02 | Modicon Controllers M340 / Momentum / MC80 | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-317-01 | PowerLogic PM5300 Series | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2021-159-02 | PowerLogic PM5500 and PowerLogic PM8ECC | 2021-06-08T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-282-08 | EcoStruxure EV Charging Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-07 | System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-06 | Zelio Soft 2 | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-04 | EVlink Home Smart and Schneider Charge | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-03 | Easergy Studio | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-02 | Harmony iPC – HMIBSC IIoT Edge Box Core | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-01 | Data Center Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2022-102-02 | Modicon M340 Controller and Communication Modules | 2022-04-12T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-254-02 | EcoStruxure™ Power Monitoring Expert and EcoStruxure™ Power Operation or EcoStruxure™ Power SCADA Operation with Advanced Reporting and Dashboards | 2024-09-10T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2024-163-02 | PowerLogic P5 | 2024-06-11T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2023-073-01 | EcoStruxure™ Power Monitoring Expert | 2023-03-14T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2023-192-02 | EcoStruxure™ OPC UA Server Expert | 2023-07-11T07:01:56.000Z | 2024-08-13T07:00:00.000Z |
| sevd-2024-226-02 | EcoStruxure™ Machine SCADA Expert / BLUE Open Studio | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2024-226-01 | Accutech Manager | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-101-05 | Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-04-11T09:46:26.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-06 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon M340, M580 and M580 CPU Safety | 2023-01-10T15:17:09.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-05 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-01-10T15:41:57.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-04 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2022-0002 | PwnKit vulnerability affects multiple SICK IPCs | 2022-02-23T16:00:00.000Z | 2022-02-23T16:00:00.000Z |
| sca-2022-0001 | Vulnerability in SICK FieldEcho | 2022-02-17T16:00:00.000Z | 2022-02-17T16:00:00.000Z |
| sca-2021-0003 | SICK Security Advisory for Apache Log4j (CVE-2021-44228) | 2021-12-14T17:00:00.000Z | 2021-12-17T12:00:00.000Z |
| sca-2021-0004 | Vulnerabilities in SICK SOPAS ET | 2021-12-16T08:00:00.000Z | 2021-12-17T08:00:00.000Z |
| sca-2021-0002 | MEAC affected by Windows SMBv1 vulnerability | 2021-08-04T10:00:00.000Z | 2021-08-04T10:00:00.000Z |
| sca-2021-0001 | Inadequate SSH configuration in SICK Visionary-S CX | 2021-06-25T10:00:00.000Z | 2021-06-25T10:00:00.000Z |
| sca-2020-0005 | Package Analytics affected by Windows TCP/IP vulnerability | 2020-10-29T11:00:00.000Z | 2020-10-29T11:00:00.000Z |
| sca-2020-0004 | Vulnerability in Platform Mechanism AutoIP | 2020-08-31T10:00:00.000Z | 2020-08-31T10:00:00.000Z |
| sca-2020-0003 | MEAC affected by Windows SMBv3 vulnerability | 2020-08-07T10:00:00.000Z | 2020-08-07T10:00:00.000Z |
| sca-2020-0002 | Vulnerabilities in SICK Package Analytics | 2020-08-07T10:00:00.000Z | 2020-07-28T10:00:00.000Z |
| sca-2020-0001 | Security Information Regarding "Profile Programming" | 2020-05-31T10:00:00.000Z | 2020-05-31T10:00:00.000Z |
| sca-2019-0002 | Vulnerability in SICK FX0-GENT00000 and SICK FX0-GPNT00000 | 2019-09-20T10:00:00.000Z | 2019-09-20T10:00:00.000Z |
| sca-2019-0001 | MSC800 affected by hard-coded credentials vulnerability | 2019-06-21T10:00:00.000Z | 2019-06-21T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-416652 | SSA-416652: Multiple Vulnerabilities in SIMATIC CN 4100 Before V4.0.1 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-408105 | SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products | 2022-12-13T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-392859 | SSA-392859: Local Arbitrary Code Execution Vulnerability in Siemens Engineering Platforms before V20 | 2024-12-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-356310 | SSA-356310: Multiple Vulnerabilities in Gridscale X Prepay | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-202008 | SSA-202008: Multiple Vulnerabilities in Ruggedcom Rox Before V2.17.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-241605 | SSA-241605: Out of Bounds Read in PS/IGES Parasolid Translator Component Before V29.0.258 | 2025-11-17T00:00:00Z | 2025-11-17T00:00:00Z |
| ssa-190588 | SSA-190588: Cross-Site Scripting Vulnerability in Mendix Rich Text Widget | 2025-11-17T00:00:00Z | 2025-11-17T00:00:00Z |
| ssa-794185 | SSA-794185: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SIPROTEC, SICAM and Related Products | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-750499 | SSA-750499: Weak Encryption Vulnerability in SIPROTEC 5 Devices | 2024-07-09T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-726617 | SSA-726617: Incorrect Privilege Assignment Vulnerability in Mendix OIDC SSO Module | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-711309 | SSA-711309: Denial of Service Vulnerability in the OPC UA Implementations of SIMATIC Products | 2023-09-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-687955 | SSA-687955: Accessible Development Shell via Physical Interface in SIPROTEC 5 | 2025-02-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-682326 | SSA-682326: Multiple Vulnerabilities in COMOS before V10.4.5 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-631336 | SSA-631336: Multiple Web Server Vulnerabilities in SICAM GridEdge Before V2.6.6 | 2022-06-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-552874 | SSA-552874: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2022-12-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-522291 | SSA-522291: Improper Certificate Validation Vulnerability in Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-514895 | SSA-514895: Multiple Vulnerabilities in Altair Grid Engine V2025.1.0 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-365596 | SSA-365596: DLL Hijacking Vulnerability in Siemens Software Center and Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-339694 | SSA-339694: Multiple Vulnerabilities in Spectrum Power 4 Before v4.70 SP12 Security Patch 2 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-322980 | SSA-322980: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2023-04-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-301229 | SSA-301229: Client-Side Enforcement of Server-Side Security Vulnerabilities in RUGGEDCOM ROX II | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-267056 | SSA-267056: Multiple Vulnerabilities in LOGO! 8 BM Devices | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-225578 | SSA-225578: Improper Access Control Vulnerability in SICAM GridEdge Before V2.7.3 | 2022-07-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-201498 | SSA-201498: Multiple Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices Before V3.11 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-194557 | SSA-194557: Improper Limitation of Filesystem Access through Web Server Vulnerability in SIPROTEC 5 | 2025-01-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-876787 | SSA-876787: Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-722410 | SSA-722410: Multiple Vulnerabilities in User Management Component (UMC) | 2025-09-09T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-625789 | SSA-625789: Multiple Vulnerabilities in SIMATIC S7-1200 CPU V1/V2 Devices | 2011-06-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-614723 | SSA-614723: Denial of Service Vulnerabilities in User Management Component (UMC) | 2025-05-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-541582 | SSA-541582: Multiple File Parsing Vulnerabilities in Solid Edge | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1173-1 | Security update for LibVNCServer | 2026-04-02T12:43:10Z | 2026-04-02T12:43:10Z |
| suse-su-2026:20995-1 | Security update for dnsdist | 2026-04-02T09:16:22Z | 2026-04-02T09:16:22Z |
| suse-su-2026:1171-1 | Security update for python-tornado | 2026-04-02T08:56:19Z | 2026-04-02T08:56:19Z |
| suse-su-2026:1170-1 | Security update for perl-Crypt-URandom | 2026-04-02T08:42:05Z | 2026-04-02T08:42:05Z |
| suse-su-2026:1169-1 | Security update for wireshark | 2026-04-02T08:29:30Z | 2026-04-02T08:29:30Z |
| suse-su-2026:1166-1 | Security update for expat | 2026-04-02T01:08:26Z | 2026-04-02T01:08:26Z |
| suse-su-2026:20993-1 | Security update for perl-XML-Parser | 2026-04-01T16:24:24Z | 2026-04-01T16:24:24Z |
| suse-su-2026:20992-1 | Security update for python-Pillow | 2026-04-01T14:58:21Z | 2026-04-01T14:58:21Z |
| suse-su-2026:1165-1 | Security update for freerdp | 2026-04-01T13:40:57Z | 2026-04-01T13:40:57Z |
| suse-su-2026:1164-1 | Security update for freerdp2 | 2026-04-01T13:40:49Z | 2026-04-01T13:40:49Z |
| suse-su-2026:20960-1 | Security update for python-pyOpenSSL | 2026-04-01T10:05:58Z | 2026-04-01T10:05:58Z |
| suse-su-2026:20959-1 | Security update for tar | 2026-04-01T10:05:58Z | 2026-04-01T10:05:58Z |
| suse-su-2026:20955-1 | Security update for tar | 2026-04-01T09:39:25Z | 2026-04-01T09:39:25Z |
| suse-su-2026:20954-1 | Security update for python-pyOpenSSL | 2026-04-01T09:35:43Z | 2026-04-01T09:35:43Z |
| suse-su-2026:20989-1 | Security update for kea | 2026-04-01T09:22:53Z | 2026-04-01T09:22:53Z |
| suse-fu-2026:20990-1 | Feature update for himmelblau | 2026-04-01T09:19:25Z | 2026-04-01T09:19:25Z |
| suse-su-2026:1163-1 | Security update for MozillaThunderbird | 2026-04-01T08:49:11Z | 2026-04-01T08:49:11Z |
| suse-su-2026:1162-1 | Security update for python-tornado | 2026-03-31T22:02:18Z | 2026-03-31T22:02:18Z |
| suse-su-2026:1160-1 | Security update for freerdp | 2026-03-31T15:03:59Z | 2026-03-31T15:03:59Z |
| suse-su-2026:1159-1 | Security update for expat | 2026-03-31T15:03:48Z | 2026-03-31T15:03:48Z |
| suse-su-2026:1158-1 | Security update for python-pyasn1 | 2026-03-31T11:55:53Z | 2026-03-31T11:55:53Z |
| suse-su-2026:20951-1 | Security update for python311 | 2026-03-31T09:13:02Z | 2026-03-31T09:13:02Z |
| suse-su-2026:20988-1 | Security update for gnome-online-accounts, gvfs | 2026-03-31T09:08:21Z | 2026-03-31T09:08:21Z |
| suse-su-2026:20956-1 | Security update for python311 | 2026-03-31T09:07:43Z | 2026-03-31T09:07:43Z |
| suse-su-2026:1154-1 | Security update for libjxl | 2026-03-31T09:04:47Z | 2026-03-31T09:04:47Z |
| suse-su-2026:0227-2 | Security update for net-snmp | 2026-03-31T08:48:04Z | 2026-03-31T08:48:04Z |
| suse-su-2026:1153-1 | Security update for perl-XML-Parser | 2026-03-31T08:40:07Z | 2026-03-31T08:40:07Z |
| suse-su-2026:1152-1 | Security update for perl-XML-Parser | 2026-03-31T08:28:50Z | 2026-03-31T08:28:50Z |
| suse-su-2026:1150-1 | Security update for webkit2gtk3 | 2026-03-30T17:34:50Z | 2026-03-30T17:34:50Z |
| suse-su-2026:20986-1 | Security update for postgresql13 | 2026-03-30T15:24:20Z | 2026-03-30T15:24:20Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:4649 | Moderate: grub2 security update | 2026-03-16T00:00:00Z | 2026-03-19T15:01:35Z |
| alsa-2026:4713 | Moderate: python3.12 security update | 2026-03-17T00:00:00Z | 2026-03-19T14:56:58Z |
| alsa-2026:4723 | Moderate: kernel security update | 2026-03-17T00:00:00Z | 2026-03-19T14:50:26Z |
| alsa-2026:4760 | Moderate: grub2 security update | 2026-03-17T00:00:00Z | 2026-03-19T14:40:59Z |
| alsa-2026:4705 | Moderate: nginx security update | 2026-03-17T00:00:00Z | 2026-03-19T12:47:53Z |
| alsa-2026:4629 | Important: libvpx security update | 2026-03-16T00:00:00Z | 2026-03-19T12:45:22Z |
| alsa-2026:4772 | Moderate: glibc security update | 2026-03-17T00:00:00Z | 2026-03-19T12:43:04Z |
| alsa-2026:4728 | Important: libpng security update | 2026-03-17T00:00:00Z | 2026-03-19T12:37:34Z |
| alsa-2026:4473 | Moderate: python3.11 security update | 2026-03-12T00:00:00Z | 2026-03-19T12:33:18Z |
| alsa-2026:4648 | Moderate: grub2 security update | 2026-03-16T00:00:00Z | 2026-03-17T10:24:06Z |
| alsa-2026:4672 | Important: container-tools:rhel8 security update | 2026-03-17T00:00:00Z | 2026-03-17T10:17:22Z |
| alsa-2026:4445 | Important: .NET 10.0 security update | 2026-03-12T00:00:00Z | 2026-03-16T16:52:17Z |
| alsa-2026:4472 | Moderate: compat-openssl11 security update | 2026-03-12T00:00:00Z | 2026-03-16T16:49:36Z |
| alsa-2026:4447 | Important: libvpx security update | 2026-03-12T00:00:00Z | 2026-03-16T16:46:00Z |
| alsa-2026:4456 | Important: .NET 9.0 security update | 2026-03-12T00:00:00Z | 2026-03-16T16:41:08Z |
| alsa-2026:3985 | Important: git-lfs security update | 2026-03-09T00:00:00Z | 2026-03-13T12:38:07Z |
| alsa-2026:4306 | Important: mingw-libpng security update | 2026-03-11T00:00:00Z | 2026-03-13T12:35:26Z |
| alsa-2026:4012 | Moderate: kernel security update | 2026-03-09T00:00:00Z | 2026-03-13T09:42:02Z |
| alsa-2026:4450 | Important: .NET 9.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:36:54Z |
| alsa-2026:4451 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:34:29Z |
| alsa-2026:4453 | Important: .NET 10.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:32:40Z |
| alsa-2026:3940 | Moderate: nfs-utils security update | 2026-03-05T00:00:00Z | 2026-03-13T09:30:09Z |
| alsa-2026:3842 | Moderate: delve security update | 2026-03-05T00:00:00Z | 2026-03-13T09:28:13Z |
| alsa-2026:4168 | Moderate: python3.9 security update | 2026-03-10T00:00:00Z | 2026-03-13T09:26:02Z |
| alsa-2026:4177 | Important: opentelemetry-collector security update | 2026-03-10T00:00:00Z | 2026-03-13T09:23:39Z |
| alsa-2026:4188 | Moderate: gnutls security update | 2026-03-10T00:00:00Z | 2026-03-13T09:21:59Z |
| alsa-2026:4216 | Moderate: python3.11 security update | 2026-03-10T00:00:00Z | 2026-03-13T09:19:57Z |
| alsa-2026:4454 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:17:27Z |
| alsa-2026:4458 | Important: .NET 10.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:14:44Z |
| alsa-2026:4455 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:11:49Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-1350 | Heap-buffer-overflow in inflate | 2023-12-23T00:12:38.562149Z | 2026-03-27T14:16:43.884162Z |
| osv-2022-1134 | Heap-buffer-overflow in ndlz8_decompress | 2022-11-04T00:02:11.463429Z | 2026-03-27T14:15:56.573716Z |
| osv-2021-1070 | Heap-buffer-overflow in ZSTD_decompressBlock_internal | 2021-07-29T00:01:10.187569Z | 2026-03-27T14:15:27.197578Z |
| osv-2026-461 | UNKNOWN READ in XRef::constructObjectEntry | 2026-03-26T00:17:47.551046Z | 2026-03-26T00:17:47.551361Z |
| osv-2026-455 | UNKNOWN READ in mkv::matroska_segment_c::TrackInit | 2026-03-25T00:20:51.448743Z | 2026-03-25T00:20:51.449185Z |
| osv-2023-216 | Heap-buffer-overflow in H5G__node_cmp3 | 2023-03-23T13:00:48.081705Z | 2026-03-24T16:17:49.377032Z |
| osv-2023-76 | Heap-buffer-overflow in H5SM_delete | 2023-02-18T13:00:50.471845Z | 2026-03-24T15:56:21.323480Z |
| osv-2023-359 | Heap-buffer-overflow in H5MM_memcpy | 2023-05-01T14:02:33.841821Z | 2026-03-24T15:52:15.056909Z |
| osv-2023-392 | Negative-size-param in H5MM_memcpy | 2023-05-13T14:00:26.093088Z | 2026-03-24T15:13:27.688997Z |
| osv-2023-370 | Heap-buffer-overflow in H5FS__sect_link | 2023-05-06T14:01:04.165113Z | 2026-03-24T15:11:55.539963Z |
| osv-2024-387 | Heap-buffer-overflow in H5F_addr_encode | 2024-04-30T00:13:39.184262Z | 2026-03-24T15:11:37.246096Z |
| osv-2023-381 | UNKNOWN READ in H5FL__blk_gc_list | 2023-05-08T14:02:04.934252Z | 2026-03-24T15:11:28.111319Z |
| osv-2023-133 | Heap-buffer-overflow in H5L__extern_traverse | 2023-03-02T13:02:08.499899Z | 2026-03-24T15:07:47.335644Z |
| osv-2023-89 | Heap-buffer-overflow in H5O__mtime_new_encode | 2023-02-21T13:00:30.347876Z | 2026-03-24T14:48:44.199364Z |
| osv-2023-430 | Heap-buffer-overflow in H5MM_xstrdup | 2023-05-26T14:00:26.078002Z | 2026-03-24T14:48:04.919113Z |
| osv-2024-719 | Heap-buffer-overflow in hevc_ref_pic_lists_modification | 2024-08-07T00:05:22.699506Z | 2026-03-23T14:31:33.332438Z |
| osv-2024-695 | Stack-buffer-overflow in gf_vvc_parse_nalu_bs | 2024-07-31T00:02:35.217594Z | 2026-03-23T14:31:09.829004Z |
| osv-2024-664 | Heap-buffer-overflow in gf_dash_group_get_template | 2024-07-18T00:13:55.576218Z | 2026-03-23T14:30:21.644486Z |
| osv-2024-659 | Index-out-of-bounds in gf_vvc_parse_nalu_bs | 2024-07-18T00:01:18.765548Z | 2026-03-23T14:30:01.343679Z |
| osv-2026-437 | Heap-use-after-free in tf::Executor::_invoke | 2026-03-23T00:02:28.277984Z | 2026-03-23T14:25:41.819255Z |
| osv-2025-169 | Stack-buffer-overflow in utf8_in2 | 2025-02-27T00:07:08.029075Z | 2026-03-21T14:18:54.197384Z |
| osv-2023-96 | Heap-buffer-overflow in load_buffer | 2023-02-23T13:00:28.515290Z | 2026-03-19T14:18:07.139122Z |
| osv-2023-35 | Heap-buffer-overflow in parse_classes_64 | 2023-01-29T13:01:45.762871Z | 2026-03-19T14:17:03.762927Z |
| osv-2022-993 | Stack-use-after-return in check_buffer | 2022-09-29T00:02:10.256639Z | 2026-03-19T14:16:25.708146Z |
| osv-2022-1137 | Heap-buffer-overflow in io_memory_read | 2022-11-05T00:00:44.243862Z | 2026-03-19T14:12:36.662336Z |
| osv-2023-1328 | Stack-buffer-overflow in icu_75::TZDBTimeZoneNames::getMetaZoneNames | 2023-12-18T00:13:09.643640Z | 2026-03-18T19:49:20.841276Z |
| osv-2024-728 | Negative-size-param in pdf_resize_resource_arrays | 2024-08-08T00:09:33.935595Z | 2026-03-18T14:32:58.071449Z |
| osv-2024-677 | Segv on unknown address in gs_gc_reclaim | 2024-07-25T00:06:43.762625Z | 2026-03-18T14:32:20.684770Z |
| osv-2025-202 | UNKNOWN READ in _blit_xrgb32_lerp_spans | 2025-03-15T00:01:51.127135Z | 2026-03-18T14:26:56.370221Z |
| osv-2023-34 | Heap-use-after-free in gc_trace | 2023-01-29T13:00:17.773387Z | 2026-03-18T14:25:32.218330Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0067 | `unpack_in` can chmod arbitrary directories by following symlinks | 2026-03-19T12:00:00Z | 2026-03-23T09:31:59Z |
| rustsec-2026-0066 | Insufficient validation of PAX extensions during extraction | 2026-03-17T12:00:00Z | 2026-03-23T09:31:59Z |
| rustsec-2026-0047 | PKCS7_verify Signature Validation Bypass in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0046 | PKCS7_verify Certificate Chain Validation Bypass in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0045 | Timing Side-Channel in AES-CCM Tag Verification in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0043 | Timing Side-Channel in AES-CCM Tag Verification in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0065 | `tokio-signal` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0064 | `tokio-udp` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0063 | `tokio-executor` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0062 | `tokio-compat` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0061 | `tokio-fs` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0060 | `tokio-timer` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0059 | `tokio-tcp` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0058 | `tokio-io` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0057 | `tokio-reactor` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0056 | `tokio-codec` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0055 | `tokio-process` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0054 | `tokio-current-thread` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0053 | `tokio-tls` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0052 | `tokio-sync` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0051 | `tokio-threadpool` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0050 | `tokio-uds` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0048 | CRL Distribution Point Scope Check Logic Error in AWS-LC | 2026-03-19T12:00:00Z | 2026-03-20T17:11:58Z |
| rustsec-2026-0044 | AWS-LC X.509 Name Constraints Bypass via Wildcard/Unicode CN | 2026-03-19T12:00:00Z | 2026-03-20T17:11:58Z |
| rustsec-2026-0042 | CRL Distribution Point Scope Check Logic Error in AWS-LC | 2026-03-19T12:00:00Z | 2026-03-20T17:11:58Z |
| rustsec-2023-0103 | `postgress` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0102 | `serd` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0101 | `oncecell` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0100 | `xrvrv` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0099 | `envlogger` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-parse-2026-34215 | Parse Server: Auth data exposed via verify password endpoint | 2026-04-06T14:49:24.609Z | 2026-04-06T15:13:09.641Z |
| bit-minio-2026-34204 | MinIO is Vulnerable to SSE Metadata Injection via Replication Headers | 2026-04-06T09:26:13.602Z | 2026-04-06T11:34:08.453Z |
| bit-prestashop-2026-33674 | PrestaShop: Improper Use of Validation Framework | 2026-03-30T11:49:50.984Z | 2026-04-06T08:26:41.107Z |
| bit-prestashop-2026-33673 | PrestaShop has multiple stored XSS vulnerabilities via unprotected Template variables | 2026-03-30T11:49:49.224Z | 2026-04-06T08:26:41.107Z |
| bit-node-2026-21717 | 2026-04-06T07:58:47.295Z | 2026-04-06T08:26:41.107Z | |
| bit-node-2026-21716 | 2026-04-06T07:58:44.008Z | 2026-04-06T08:26:41.107Z | |
| bit-node-2026-21715 | 2026-04-06T07:58:41.424Z | 2026-04-06T08:26:41.107Z | |
| bit-node-2026-21714 | 2026-04-06T07:58:38.953Z | 2026-04-06T08:26:41.107Z | |
| bit-node-2026-21713 | 2026-04-06T07:58:36.353Z | 2026-04-06T08:26:41.107Z | |
| bit-node-2026-21712 | 2026-04-06T07:58:33.472Z | 2026-04-06T08:26:41.107Z | |
| bit-node-2026-21711 | 2026-04-06T07:58:30.648Z | 2026-04-06T08:26:41.107Z | |
| bit-node-2026-21710 | 2026-04-06T07:58:28.068Z | 2026-04-06T08:26:41.107Z | |
| bit-mongodb-2026-5170 | Users could trigger a crash of mongod primaries during promotion to sharded | 2026-04-06T07:54:20.562Z | 2026-04-06T08:26:41.107Z |
| bit-mongodb-2026-4358 | Memory safety issues in slot-based execution hash table spill | 2026-04-06T07:54:17.803Z | 2026-04-06T08:26:41.107Z |
| bit-kyverno-2026-4789 | CVE-2026-4789 | 2026-04-06T07:49:20.364Z | 2026-04-06T08:26:41.107Z |
| bit-grafana-2026-21724 | Missing Protected-field Authorization in Provisioning Contact Points API | 2026-04-06T07:50:18.770Z | 2026-04-06T08:26:41.107Z |
| bit-drupal-2025-31675 | Drupal core - Moderately critical - Cross Site Scripting - SA-CORE-2025-004 | 2025-06-03T14:41:48.563Z | 2026-04-06T08:26:41.107Z |
| bit-dotnet-2026-26131 | .NET Elevation of Privilege Vulnerability | 2026-04-06T07:48:26.731Z | 2026-04-06T08:26:41.107Z |
| bit-dotnet-2026-26127 | .NET Denial of Service Vulnerability | 2026-04-06T07:48:23.759Z | 2026-04-06T08:26:41.107Z |
| bit-cilium-2026-33726 | Cilium L7 proxy may bypass Kubernetes NetworkPolicy for same-node traffic | 2026-04-06T07:45:24.262Z | 2026-04-06T08:26:41.107Z |
| bit-mariadb-2026-32710 | Heap-based Buffer Overflow in MariaDB | 2026-03-25T08:46:04.911Z | 2026-04-01T09:11:42.692Z |
| bit-gitlab-2025-13611 | Insertion of Sensitive Information into Log File in GitLab | 2025-12-02T12:03:48.649Z | 2026-04-01T09:11:42.692Z |
| bit-appsmith-2026-34411 | Appsmith < 1.98 Unauthenticated Instance Configuration Disclosure via Management APIs | 2026-04-01T08:35:37.595Z | 2026-04-01T09:11:42.692Z |
| bit-discourse-2026-29072 | Discourse missing permission check for policy creation in discourse-policy | 2026-03-27T07:10:21.008Z | 2026-03-31T21:15:21.591Z |
| bit-discourse-2026-28282 | Discourse vulnerable to group membership addition permission bypass via discourse-policy plugin | 2026-03-27T07:10:17.839Z | 2026-03-31T21:15:21.591Z |
| bit-discourse-2026-27936 | Discourse discloses restricted post-action counts to non-privileged users | 2026-03-27T07:10:06.332Z | 2026-03-31T21:15:21.591Z |
| bit-discourse-2026-27935 | Discourse leaks private topic metadata to non-authorized users | 2026-03-27T07:10:03.445Z | 2026-03-31T21:15:21.591Z |
| bit-jenkins-2026-33002 | 2026-03-20T09:15:13.235Z | 2026-03-31T18:23:47.490Z | |
| bit-mastodon-2026-33869 | Mastodon has a denial of service for quote authorization | 2026-03-31T08:45:37.827Z | 2026-03-31T09:14:23.567Z |
| bit-mastodon-2026-33868 | Mastodon has a GET-Based Open Redirect via '/web/%2F<domain>' | 2026-03-31T08:45:35.531Z | 2026-03-31T09:14:23.567Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ly39171 | Security fixes for CVE-2026-33186 applied in versions: 3.1.4-r0 | 2026-04-06T02:51:58.911697Z | 2026-04-01T11:39:45Z |
| cleanstart-2026-kc06018 | Security fixes for CVE-2017-12158, CVE-2017-12159, ghsa-3p8m-j85q-pgmj, ghsa-45p5-v273-3qqr, ghsa-4cx2-fc23-5wg6, ghsa-5rfx-cp42-p624, ghsa-72hv-8253-57qq, ghsa-84h7-rjj3-6jx4, ghsa-9342-92gg-6v29, ghsa-cbdj-484d-3x9q, ghsa-fghv-69vj-qj49, ghsa-h5fg-jpgr-rv9c, ghsa-hq9p-pm7w-8p54, ghsa-j288-q9x7-2f5v, ghsa-pwqr-wmgm-9rr8, ghsa-w9fj-cfpg-grvv applied in versions: 26.1.4-r1, 26.5.0-r0, 26.5.0-r1, 26.5.0-r2, 26.5.6-r3 | 2026-04-06T02:52:37.677608Z | 2026-04-01T11:37:49Z |
| cleanstart-2026-po55014 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-06T02:53:00.589014Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-mu54962 | Security fixes for ghsa-527x-5wrf-22m2, ghsa-g754-hx8w-x2g6, ghsa-jgfp-53c3-624w, ghsa-px8v-pp82-rcvr, ghsa-vv39-3w5q-974q applied in versions: 1.25.0-r0, 1.26.7-r0 | 2026-04-06T02:54:48.662994Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-hj96712 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq applied in versions: 3.7.2-r4, 3.7.2-r5 | 2026-04-06T02:53:02.079256Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-bl95928 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T02:52:47.736498Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-eb74978 | Security fixes for CVE-2020-8912, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1 | 2026-04-01T09:05:49.917651Z | 2026-03-31T15:18:53Z |
| cleanstart-2026-bk28579 | Security fixes for CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1 | 2026-04-01T09:05:31.827204Z | 2026-03-31T15:16:59Z |
| cleanstart-2026-is43446 | Security fixes for ghsa-25qh-j22f-pwp8, ghsa-389x-839f-4rhx, ghsa-3p8m-j85q-pgmj, ghsa-4g8c-wm8x-jfhw, ghsa-5jpm-x58v-624v, ghsa-72hv-8253-57qq, ghsa-84h7-rjj3-6jx4, ghsa-fghv-69vj-qj49, ghsa-jq43-27x9-3v86, ghsa-pwqr-wmgm-9rr8, ghsa-qqpg-mvqg-649v, ghsa-w9fj-cfpg-grvv, ghsa-xq3w-v528-46rv applied in versions: 0.1.109-r0, 0.1.109-r1, 0.1.111-r2 | 2026-04-01T09:05:58.458627Z | 2026-03-31T07:55:31Z |
| cleanstart-2026-ch77232 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 18.7.1-r0 | 2026-04-01T09:06:04.906254Z | 2026-03-31T07:29:33Z |
| cleanstart-2026-is74202 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:09:55.185988Z | 2026-03-31T04:38:08Z |
| cleanstart-2026-ls30652 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-47914, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-33186, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-p84v-gxvw-73pf applied in versions: 3.7.0-r0, 3.7.11-r0, 3.7.3-r0, 3.7.4-r0, 3.7.6-r0, 3.7.9-r0, 3.7.9-r1, 3.7.9-r2, 4.0.2-r0 | 2026-04-01T09:07:01.631355Z | 2026-03-30T12:04:05Z |
| cleanstart-2026-hk71313 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw applied in versions: 0.12.0-r0, 0.12.0-r1, 0.12.0-r2 | 2026-04-01T09:06:39.410428Z | 2026-03-30T06:53:15Z |
| cleanstart-2026-li04631 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.79.0-r0, 1.79.0-r2, 1.79.0-r3 | 2026-04-01T09:08:44.082129Z | 2026-03-28T10:16:19Z |
| cleanstart-2026-bk44511 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.78.0-r0, 1.78.0-r2, 1.78.0-r3 | 2026-04-01T09:08:47.105116Z | 2026-03-28T10:16:01Z |
| cleanstart-2026-ld15132 | Security fixes for CVE-2020-8912, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-6g7g-w4f8-9c9x, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 0.142.0-r0, 0.144.0-r0, 0.144.0-r1, 0.144.0-r2, 0.144.0-r3 | 2026-04-01T09:09:25.500286Z | 2026-03-28T10:14:28Z |
| cleanstart-2026-jk84667 | Security fixes for CVE-2025-0913, CVE-2025-4673, CVE-2025-47907, CVE-2025-47911, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-58190, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.7.0-r7, 2.7.0-r8 | 2026-04-01T09:10:09.429544Z | 2026-03-28T10:13:46Z |
| cleanstart-2026-cb01846 | Security fixes for CVE-2025-0913, CVE-2025-4673, CVE-2025-47907, CVE-2025-47911, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-58190, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.6.1-r0, 2.6.1-r1, 2.6.1-r7 | 2026-04-01T09:10:27.866703Z | 2026-03-28T10:13:21Z |
| cleanstart-2026-dg06447 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.12.2-r0, 2.12.2-r1 | 2026-04-01T09:10:38.729051Z | 2026-03-28T10:04:36Z |
| cleanstart-2026-gq31133 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-527x-5wrf-22m2, ghsa-9h8m-3fm2-qjrq, ghsa-c9v3-4pv7-87pr, ghsa-h75p-j8xm-m278, ghsa-p77j-4mvh-x3m3 applied in versions: 1.26.7-r0, 1.26.7-r1, 1.26.7-r2 | 2026-04-01T09:10:41.066012Z | 2026-03-28T10:03:10Z |
| cleanstart-2026-mj07404 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-527x-5wrf-22m2, ghsa-9h8m-3fm2-qjrq, ghsa-c9v3-4pv7-87pr, ghsa-h75p-j8xm-m278, ghsa-p77j-4mvh-x3m3 applied in versions: 1.26.7-r0, 1.26.7-r1, 1.26.7-r2 | 2026-04-01T09:10:45.280620Z | 2026-03-28T10:02:34Z |
| cleanstart-2026-kj02127 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.8.6-r0, 1.8.6-r1 | 2026-04-01T09:11:01.446923Z | 2026-03-28T10:00:21Z |
| cleanstart-2026-cg86499 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 3.6.5-r0 | 2026-04-01T09:11:07.076579Z | 2026-03-28T09:58:50Z |
| cleanstart-2026-gz72045 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 3.51.2-r0 | 2026-04-01T09:11:42.310345Z | 2026-03-28T09:54:58Z |
| cleanstart-2026-oj21550 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2026-24051, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 1.34.2-r0, 1.35.0-r0, 1.35.3-r0 | 2026-04-01T09:12:23.484446Z | 2026-03-28T09:40:45Z |
| cleanstart-2026-cf63743 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2026-24051, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 1.34.2-r0, 1.34.6-r0 | 2026-04-01T09:12:16.516536Z | 2026-03-28T09:39:54Z |
| cleanstart-2026-jf28061 | Security fixes for CVE-2026-24051, CVE-2026-26958, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 2.19.0-r0, 2.19.0-r1 | 2026-04-01T09:12:22.444974Z | 2026-03-27T12:52:14Z |
| cleanstart-2026-ac65885 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25518, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 1.18.0-r0, 1.18.0-r1, 1.18.0-r2, 1.18.0-r3 | 2026-04-01T09:13:17.231184Z | 2026-03-27T06:25:28Z |
| cleanstart-2026-kz45320 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:16:45.727713Z | 2026-03-26T18:22:34Z |
| cleanstart-2026-bd71263 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:17:26.065920Z | 2026-03-26T17:04:08Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2024-ALE-001 | [MàJ] Multiples vulnérabilités dans Ivanti Connect Secure et Policy Secure Gateways | 2024-01-11T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-002 | [MàJ] Multiples Vulnérabilités dans GitLab | 2024-01-12T00:00:00.000000 | 2024-02-22T00:00:00.000000 |
| CERTFR-2024-ALE-002 | [MàJ] Multiples Vulnérabilités dans GitLab | 2024-01-12T00:00:00.000000 | 2024-02-22T00:00:00.000000 |
| certfr-2023-ale-013 | Vulnérabilité dans Apache Struts 2 | 2023-12-13T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-012 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-10-23T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-011 | [MàJ] Multiples vulnérabilités dans Cisco IOS XE | 2023-10-17T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-010 | Multiples vulnérabilités dans Exim | 2023-10-02T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-013 | Vulnérabilité dans Apache Struts 2 | 2023-12-13T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-012 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-10-23T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-011 | [MàJ] Multiples vulnérabilités dans Cisco IOS XE | 2023-10-17T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-010 | Multiples vulnérabilités dans Exim | 2023-10-02T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-008 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-07-19T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-007 | [MàJ] Vulnérabilité dans Zimbra Collaboration Suite | 2023-07-17T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| CERTFR-2023-ALE-008 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-07-19T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| CERTFR-2023-ALE-007 | [MàJ] Vulnérabilité dans Zimbra Collaboration Suite | 2023-07-17T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-006 | Vulnérabilité dans les produits Microsoft | 2023-12-12T00:00:00.000000 | 2023-07-12T00:00:00.000000 |
| CERTFR-2023-ALE-006 | Vulnérabilité dans les produits Microsoft | 2023-12-12T00:00:00.000000 | 2023-07-12T00:00:00.000000 |
| certfr-2023-ale-009 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2023-07-26T00:00:00.000000 | 2023-09-15T00:00:00.000000 |
| CERTFR-2023-ALE-009 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2023-07-26T00:00:00.000000 | 2023-09-15T00:00:00.000000 |
| certfr-2023-ale-005 | Synthèse sur l'exploitation d'une vulnérabilité dans MOVEit Transfer | 2023-07-05T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-004 | Vulnérabilité dans les produits Fortinet | 2023-06-13T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2022-ale-014 | Multiples vulnérabilités dans AMI MegaRAC | 2022-12-16T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2023-ALE-005 | Synthèse sur l'exploitation d'une vulnérabilité dans MOVEit Transfer | 2023-07-05T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2023-ALE-004 | Vulnérabilité dans les produits Fortinet | 2023-06-13T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2022-ALE-014 | Multiples vulnérabilités dans AMI MegaRAC | 2022-12-16T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-002 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2023-03-15T00:00:00.000000 | 2023-05-11T00:00:00.000000 |
| CERTFR-2023-ALE-002 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2023-03-15T00:00:00.000000 | 2023-05-11T00:00:00.000000 |
| certfr-2023-ale-003 | [MàJ] Compromission de l'application 3CX Desktop App | 2023-03-31T00:00:00.000000 | 2023-04-12T00:00:00.000000 |
| CERTFR-2023-ALE-003 | [MàJ] Compromission de l'application 3CX Desktop App | 2023-03-31T00:00:00.000000 | 2023-04-12T00:00:00.000000 |
| certfr-2023-ale-015 | [MàJ] Campagne d'exploitation d'une vulnérabilité affectant VMware ESXi | 2023-02-03T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0364 | Multiples vulnérabilités dans les produits Siemens | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0363 | Multiples vulnérabilités dans les produits NetApp | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0300 | Multiples vulnérabilités dans Mattermost Server | 2026-03-17T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0133 | Multiples vulnérabilités dans Roundcube | 2026-02-09T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0362 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0361 | Multiples vulnérabilités dans Cisco IOS et IOS XE | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0360 | Multiples vulnérabilités dans ISC BIND | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0359 | Multiples vulnérabilités dans Grafana | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0201 | Multiples vulnérabilités dans Mattermost Server | 2026-02-24T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0358 | Vulnérabilité dans Citrix XenServer | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0357 | Multiples vulnérabilités dans GitLab | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0356 | Vulnérabilité dans ISC Kea | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0355 | Multiples vulnérabilités dans les produits Apple | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0354 | Multiples vulnérabilités dans les produits Mozilla | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0353 | Multiples vulnérabilités dans Zabbix | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0352 | Multiples vulnérabilités dans les produits F5 | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0351 | Vulnérabilité dans Tenable OT Platform | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0350 | Multiples vulnérabilités dans Squid | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0349 | Multiples vulnérabilités dans Ruby on Rails | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0348 | Vulnérabilité dans Trend Micro Deep Discovery Inspector | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0347 | Vulnérabilité dans Xen | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0346 | Vulnérabilité dans VMware Tanzu pour Postgres | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0345 | Vulnérabilité dans LibreNMS | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0344 | Vulnérabilité dans strongSwan | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0343 | Vulnérabilité dans Spring Cloud Config | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0342 | Multiples vulnérabilités dans Google Chrome | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0341 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0340 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0339 | Multiples vulnérabilités dans les produits VMware | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0338 | Vulnérabilité dans les produits Synology | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-000021 | web2py vulnerable to open redirect | 2026-02-05T15:01+09:00 | 2026-02-05T15:01+09:00 |
| jvndb-2026-000017 | Improper file access permission settings in Mitsubishi Small-Capacity UPS Shutdown Software FREQSHIP-mini for Windows | 2026-02-03T14:57+09:00 | 2026-02-05T14:41+09:00 |
| jvndb-2026-000020 | Multiple vulnerabilities in Movable Type | 2026-02-04T16:15+09:00 | 2026-02-04T16:15+09:00 |
| jvndb-2026-000016 | Installer for Roland Cloud Manager may insecurely load Dynamic Link Libraries | 2026-02-03T14:57+09:00 | 2026-02-04T12:39+09:00 |
| jvndb-2024-002831 | ELECOM wireless LAN routers vulnerable to OS command injection | 2024-02-22T08:15+09:00 | 2026-02-04T12:02+09:00 |
| jvndb-2025-000041 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2025-06-24T14:50+09:00 | 2026-02-03T15:35+09:00 |
| jvndb-2024-000078 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2024-07-30T15:34+09:00 | 2026-02-03T15:35+09:00 |
| jvndb-2026-000019 | Multiple vulnerabilities in ELECOM wireless LAN products | 2026-02-03T14:57+09:00 | 2026-02-03T14:57+09:00 |
| jvndb-2026-000015 | Sonatype Nexus Repository vulnerable to server-side request forgery | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000014 | OS command injection in raspap-webgui | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000013 | Multiple Microsoft Office products vulnerable to untrusted search path | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000012 | Multiple vulnerabilities in Cybozu Garoon | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000018 | Undocumented "TelnetEnable" functionality of End of Service NETGEAR products | 2026-01-30T14:23+09:00 | 2026-01-30T14:23+09:00 |
| jvndb-2026-002119 | Multiple vulnerabilities in BROTHER MFPs (multifunction printers) | 2026-01-30T11:26+09:00 | 2026-01-30T11:26+09:00 |
| jvndb-2026-002030 | Multiple Vulnerabilities in Cosminexus | 2026-01-29T10:32+09:00 | 2026-01-29T10:32+09:00 |
| jvndb-2026-001972 | Archer MR600 vulnerable to OS command injection | 2026-01-28T10:41+09:00 | 2026-01-28T10:41+09:00 |
| jvndb-2026-000011 | beat-access for Windows may insecurely load Dynamic Link Libraries | 2026-01-27T18:22+09:00 | 2026-01-27T18:22+09:00 |
| jvndb-2026-001732 | Multiple Brother software installers may insecurely load Dynamic Link Libraries | 2026-01-26T16:04+09:00 | 2026-01-26T16:04+09:00 |
| jvndb-2026-000010 | Command injection vulnerability in ASUS routers | 2026-01-23T15:22+09:00 | 2026-01-23T15:22+09:00 |
| jvndb-2026-001663 | "iRMC S5/S6" implemented in PRIMERGY vulnerable to incorrect authorization | 2026-01-23T11:29+09:00 | 2026-01-23T11:29+09:00 |
| jvndb-2026-001662 | Multiple vulnerabilities in Trend Micro Apex Central (January 2026) | 2026-01-23T11:29+09:00 | 2026-01-23T11:29+09:00 |
| jvndb-2026-000009 | Installer of Fujitsu ServerView Agents for Windows may insecurely load Dynamic Link Libraries | 2026-01-21T15:17+09:00 | 2026-01-21T15:17+09:00 |
| jvndb-2026-000008 | Ruijie Networks AP180 series vulnerable to OS command injection | 2026-01-21T15:17+09:00 | 2026-01-21T15:17+09:00 |
| jvndb-2026-001582 | Security information for Hitachi Disk Array Systems | 2026-01-21T12:11+09:00 | 2026-01-21T12:11+09:00 |
| jvndb-2026-001578 | ETERNUS SF vulnerable to insertion of sensitive information into maintenance data | 2026-01-20T20:00+09:00 | 2026-01-20T20:00+09:00 |
| jvndb-2026-001380 | Multiple vulnerabilities in Canon Small Office Multifunction Printers and Laser Printers | 2026-01-19T10:08+09:00 | 2026-01-19T10:08+09:00 |
| jvndb-2026-000007 | Multiple Vulnerabilities in TOA Network Cameras TRIFORA 3 series | 2026-01-16T15:06+09:00 | 2026-01-16T15:06+09:00 |
| jvndb-2025-022878 | Media Player MP-01 vulnerable to Missing Authentication for Critical Function | 2025-12-24T11:10+09:00 | 2026-01-15T11:10+09:00 |
| jvndb-2026-000006 | Chainlit vulnerable to improper access restriction | 2026-01-14T17:03+09:00 | 2026-01-14T17:03+09:00 |
| jvndb-2026-000002 | Multiple vulnerabilities in multiple NEC branded projectors manufactured by Sharp Display Solutions, Ltd. | 2026-01-07T14:10+09:00 | 2026-01-14T16:54+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-15854 | Canva Affinity越界读取漏洞(CNVD-2026-15854) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15853 | Canva Affinity越界读取漏洞(CNVD-2026-15853) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15852 | Canva Affinity越界写入漏洞 | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15851 | Canva Affinity越界读取漏洞(CNVD-2026-15851) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15850 | Canva Affinity越界读取漏洞(CNVD-2026-15850) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15849 | Canva Affinity越界读取漏洞(CNVD-2026-15849) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15848 | Canva Affinity越界读取漏洞(CNVD-2026-15848) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15847 | Canva Affinity越界读取漏洞(CNVD-2026-15847) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15846 | Canva Affinity越界读取漏洞(CNVD-2026-15846) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15845 | Canva Affinity越界读取漏洞(CNVD-2026-15845) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15844 | Canva Affinity越界读取漏洞 | 2026-03-26 | 2026-04-01 |
| cnvd-2026-15843 | WordPress插件Abandoned Cart Recovery for WooCommerce跨站脚本漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15842 | HCL Traveler存在未明漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15841 | HCL Aftermarket DPC硬编码漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15840 | HCL Aftermarket DPC文件上传漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15839 | HCL Aftermarket DPC跨站脚本漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15838 | HCL Aftermarket DPC访问控制错误漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15837 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15837) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15836 | HCL Aftermarket DPC输入验证错误漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15835 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15835) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15834 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15834) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15833 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15833) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15832 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15832) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15831 | HCL Aftermarket DPC会话固定漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15830 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15830) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15829 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15829) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15828 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15828) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15827 | HCL Aftermarket DPC存在未明漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15826 | HCL Aftermarket DPC跨源资源共享漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15825 | HCL Aftermarket DPC SQL注入漏洞 | 2026-03-31 | 2026-04-01 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15829 | Уязвимость системы управления базами данных MySQL и MariaDB, связанная с раскрытием инфор… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15825 | Уязвимость компонентов mm ядра операционной системы Linux, позволяющая нарушителю получит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15824 | Уязвимость компонента hugetlb.c ядра операционной системы Linux, позволяющая нарушителю п… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15822 | Уязвимость ядра операционной системы Linux, связанная с неправильной проверкой возвращаем… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15821 | Уязвимость компонента drm/sched ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15820 | Уязвимость компонента pinctrl-msm ядра операционной системы Linux, позволяющая нарушителю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15816 | Уязвимость компонента smb ядра операционной системы Linux, позволяющая нарушителю нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15815 | Уязвимость ядра операционной системы Linux, связанная с чтением за допустимыми границами … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15814 | Уязвимость ядра операционной системы Linux, связанная с чтением за границами буфера данны… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15811 | Уязвимость компонента xusb ядра операционной системы Linux, позволяющая нарушителю вызват… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15810 | Уязвимость ядра операционной системы Linux, связанная с одновременным выполнением с испол… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15809 | Уязвимость компонента appletalk ядра операционной системы Linux, позволяющая нарушителю н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15808 | Уязвимость компонента drm/tegra ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15806 | Уязвимость компонента atm ядра операционной системы Linux, позволяющая нарушителю вызвать… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15804 | Уязвимость компонента mcast ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15803 | Уязвимость компонентов tmptcp ядра операционной системы Linux, позволяющая нарушителю пол… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15802 | Уязвимость компонента perf/core ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15800 | Уязвимость компонента mm/vmalloc.c ядра операционной системы Linux, позволяющая нарушител… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15799 | Уязвимость модуля powerpc/eeh ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15798 | Уязвимость компонента crypto ядра операционной системы Linux, позволяющая нарушителю вызв… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15797 | Уязвимость компонента xilinx ядра операционной системы Linux, позволяющая нарушителю вызв… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15796 | Уязвимость компонента iwlwifi ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15795 | Уязвимость ядра операционной системы Linux, связанная с ошибками разыменования указателя,… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15794 | Уязвимость компонента dtpm_cpu ядра операционной системы Linux, позволяющая нарушителю вы… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15793 | Уязвимость компонента fbtft ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15792 | Уязвимость компонента net/tls ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15791 | Уязвимость компонента net/packet/af_packet.c ядра операционной системы Linux, позволяющая… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15790 | Уязвимость компонента net ядра операционной системы Linux, позволяющая нарушителю вызвать… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15789 | Уязвимость компонента pnv_php операционной системы Linux, позволяющая нарушителю вызвать … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15788 | Уязвимость компонента pnv_php ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201402-0026 | Buffer overflow in the process_ra function in the router advertisement daemon (radvd) bef… | 2024-07-23T22:25:48.682000Z |
| var-201805-1144 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2024-07-23T22:25:33.529000Z |
| var-201805-1143 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2024-07-23T22:25:33.635000Z |
| var-202005-0008 | Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buf… | 2024-07-23T22:25:28.455000Z |
| var-202407-0704 | A vulnerability has been identified in CPCI85 Central Processing/Communication (All versi… | 2024-07-23T22:25:01.735000Z |
| var-200107-0035 | slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cau… | 2024-07-23T22:24:58.858000Z |
| var-200512-0643 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2024-07-23T22:24:53.371000Z |
| var-200512-0611 | Multiple heap-based buffer overflows in QuickTime.qts in Apple QuickTime Player 7.0.3 and… | 2024-07-23T22:24:53.455000Z |
| var-200512-0300 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2024-07-23T22:24:53.297000Z |
| var-200512-0297 | Integer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbit… | 2024-07-23T22:24:53.525000Z |
| var-200512-0294 | Buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbitr… | 2024-07-23T22:24:53.234000Z |
| var-201407-0233 | Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote atta… | 2024-07-23T22:22:21.013000Z |
| var-201601-0038 | Multiple stack-based buffer overflows in Advantech WebAccess before 8.1 allow remote atta… | 2024-07-23T22:22:04.421000Z |
| var-201801-0394 | TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbi… | 2024-07-23T22:21:46.499000Z |
| var-201904-0181 | Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow… | 2024-07-23T22:21:36.530000Z |
| var-202108-1160 | Description: A permissions issue was addressed with improved validation. This issue is fi… | 2024-07-23T22:20:46.081000Z |
| var-202305-0218 | D-Link DAP-1360 webproc WEB_DisplayPage Stack-based Buffer Overflow Remote Code Execution… | 2024-07-23T22:20:18.349000Z |
| var-202305-0217 | D-Link DAP-1360 Hardcoded Credentials Authentication Bypass Vulnerability. This vulnerabi… | 2024-07-23T22:20:18.369000Z |
| var-202305-0216 | D-Link DAP-1360 Multiple Parameters Stack-Based Buffer Overflow Remote Code Execution Vul… | 2024-07-23T22:20:18.413000Z |
| var-202305-0177 | D-Link DAP-1360 webproc Stack-based Buffer Overflow Remote Code Execution Vulnerability. … | 2024-07-23T22:20:18.434000Z |
| var-202305-0176 | D-Link DAP-1360 webproc var:sys_Token Heap-based Buffer Overflow Remote Code Execution Vu… | 2024-07-23T22:20:18.458000Z |
| var-202305-0166 | D-Link DAP-1360 webproc var:menu Stack-based Buffer Overflow Remote Code Execution Vulner… | 2024-07-23T22:20:18.326000Z |
| var-202305-0154 | D-Link DAP-1360 webproc var:page Stack-based Buffer Overflow Remote Code Execution Vulner… | 2024-07-23T22:20:18.503000Z |
| var-202305-0153 | D-Link DAP-1360 webupg UPGCGI_CheckAuth Numeric Truncation Remote Code Execution Vulnerab… | 2024-07-23T22:20:18.392000Z |
| var-202305-0071 | D-Link DAP-1360 webproc Heap-based Buffer Overflow Remote Code Execution Vulnerability. T… | 2024-07-23T22:20:18.481000Z |
| var-202305-0070 | D-Link DAP-1360 webproc COMM_MakeCustomMsg Stack-based Buffer Overflow Remote Code Execut… | 2024-07-23T22:20:18.303000Z |
| var-202308-3323 | D-Link DAP-2622 DDP Change ID Password Auth Username Stack-based Buffer Overflow Remote C… | 2024-07-23T22:20:12.387000Z |
| var-202308-3185 | D-Link DAP-2622 DDP Configuration Backup Filename Stack-based Buffer Overflow Remote Code… | 2024-07-23T22:20:12.455000Z |
| var-202308-3131 | D-Link DAP-2622 DDP Reset Factory Auth Password Stack-based Buffer Overflow Remote Code E… | 2024-07-23T22:20:12.487000Z |
| var-202308-3130 | D-Link DAP-2622 DDP Configuration Restore Auth Username Stack-based Buffer Overflow Remot… | 2024-07-23T22:20:12.431000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2024-067 | Phoenix Contact: Multiple Vulnerabilities in PLCnext Engineer | 2024-10-08T12:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2024-052 | Phoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptors. | 2024-09-10T10:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2024-051 | Phoenix Contact: Multiple mGuard devices are vulnerable to a remote code injection due to SSH | 2024-09-10T10:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2023-010 | PHOENIX CONTACT: FL MGUARD affected by two vulnerabilities | 2023-06-13T06:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2022-001 | PHOENIX CONTACT: FL SWITCH 2xxx series incorrect privilege assignment | 2022-01-25T08:05:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-019 | PHOENIX CONTACT: Security Advisory for ILC1x1 Industrial controllers | 2021-06-23T12:16:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2019-003 | PHOENIX CONTACT: Multiple Vulnerabilities in MEVIEW3 | 2019-03-05T10:35:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2017-006 | PHOENIX CONTACT: FL SWITCH 3xxx/4xxx/48xx series web-service authentication bypass | 2018-01-10T09:36:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2025-029 | Phoenix Contact: Security Advisory for AXL F BK and IL BK bus couplers | 2025-05-13T09:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-036 | PHOENIX CONTACT: Products utilizing WIBU SYSTEMS CodeMeter components in versions prior to V7.21a | 2021-08-04T07:56:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-029 | PHOENIX CONTACT: DoS for PLCnext Control devices in versions <2021.0.5 LTS | 2021-08-04T07:58:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-025 | PHOENIX CONTACT: Security Advisory for PLCNext, ILC 2050 BI, FL MGUARD DM UNLIMITED, TC ROUTER und CLOUD CLIENT products | 2021-06-23T12:19:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-024 | PHOENIX CONTACT: Security Advisory for PLCNext, SMARTRTU AXC, CHARX control modular and EEM-SB37x | 2021-05-04T08:17:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-023 | PHOENIX CONTACT: Security Advisory for FL SWITCH SMCS series | 2021-06-23T12:17:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-022 | PHOENIX CONTACT: Security Advisory for FL COMSERVER UNI | 2021-06-23T12:16:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-021 | PHOENIX CONTACT: Security Advisory for AXL F BK and IL BK products | 2021-06-23T12:15:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-020 | PHOENIX CONTACT: Security Advisory for Automation Worx Software Suite | 2021-06-23T11:10:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-047 | PHOENIX CONTACT: BTP Touch Panels uncontrolled resource consumption | 2020-12-02T09:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-046 | PHOENIX CONTACT: mGuard <8.8.3 products missing initialization of resource | 2020-12-17T09:01:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-025 | PHOENIX CONTACT: Improper path sanitation on import of project files in PLCnext Engineer | 2020-07-21T09:38:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-023 | PHOENIX CONTACT: Two Vulnerabilities in Automation Worx Suite | 2020-07-01T08:25:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-003 | PHOENIX CONTACT: TC Router and TC Cloud Client multiple vulnerabilities | 2020-03-05T15:58:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-016 | PHOENIX CONTACT: Security Advisory for Automation Worx Software Suite | 2019-10-15T06:17:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-014 | PHOENIX CONTACT: Multiple Vulnerabilities in Automation Worx Software Suite | 2019-06-19T12:41:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-007 | PHOENIX CONTACT: command injection on RAD-80211-XD(/HP-BUS) | 2019-03-25T11:45:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-006 | PHOENIX CONTACT: unauthorized access to WEB-UI on FL NAT SMx | 2019-03-25T11:40:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2018-004 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series through 1.33 allows Command Injection | 2018-05-16T05:35:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2018-001 | PHOENIX CONTACT: Advisory for mGuard products | 2018-01-30T09:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2017-004 | PHOENIX CONTACT: FL COMSERVER cross-site scripting (XSS) vulnerability | 2017-12-05T08:50:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2017-003 | PHOENIX CONTACT: WLAN enabled devices utilising WPA2 encryption | 2017-11-09T16:20:00.000Z | 2025-05-14T12:28:19.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2023-015 | WAGO: Improper privilege management in web-based management | 2023-11-20T07:00:00.000Z | 2023-11-20T07:00:00.000Z |
| vde-2022-040 | WAGO: Multiple Vulnerabilities in Controller with WAGO I/O-Pro / CODESYS 2.3 Runtime | 2022-10-17T08:00:00.000Z | 2023-09-22T12:39:00.000Z |
| vde-2023-014 | WAGO: Bluetooth LE vulnerability in WLAN-ETHERNET-Gateway | 2023-07-31T07:00:00.000Z | 2023-07-31T07:00:00.000Z |
| vde-2023-005 | WAGO: Series 750-3x/-8x prone to MODBUS server DoS | 2023-06-25T06:00:00.000Z | 2023-06-25T06:00:00.000Z |
| vde-2022-060 | WAGO: Multiple vulnerabilities in web-based management of multiple products | 2023-02-27T11:00:00.000Z | 2023-02-27T11:00:00.000Z |
| vde-2022-055 | WAGO: Exposure of configuration interface in unmanaged switches | 2023-02-16T13:43:00.000Z | 2023-02-16T13:43:00.000Z |
| vde-2022-054 | WAGO: Unauthenticated Configuration Export in web-based management in multiple devices | 2023-01-12T07:52:00.000Z | 2023-01-12T07:52:00.000Z |
| vde-2022-042 | WAGO: Multiple products - Loss of MAC-Address-Filtering after reboot | 2022-10-17T08:00:00.000Z | 2022-10-17T08:00:00.000Z |
| vde-2022-047 | WAGO: FTP-Server - Denial-of-Service | 2022-10-12T08:00:00.000Z | 2022-10-12T08:00:00.000Z |
| vde-2022-035 | WAGO: Multiple product series affected by multiple CODESYS vulnerabilities | 2022-08-17T08:00:00.000Z | 2022-08-17T08:00:00.000Z |
| vde-2022-031 | WAGO: Multiple Products Series affected by multiple CODESYS vulnerabilities | 2022-08-17T08:00:00.000Z | 2022-08-17T08:00:00.000Z |
| vde-2022-004 | WAGO: Web-Based Management Cross-Site Scripting | 2022-03-09T07:00:00.000Z | 2022-03-09T07:00:00.000Z |
| vde-2021-050 | WAGO: Multiple devices affected by Vulnerabilities in NUCLEUS TCP Stack. | 2021-11-16T11:02:00.000Z | 2021-11-16T11:02:00.000Z |
| vde-2020-048 | M&M Software (WAGO): Deserialisation of untrusted data in fdtContainer | 2021-01-14T14:57:00.000Z | 2021-01-14T14:57:00.000Z |
| vde-2020-015 | WAGO: Web Based Management - Code Execution Vulnerability | 2020-06-10T08:00:00.000Z | 2020-06-10T08:00:00.000Z |
| vde-2020-010 | WAGO: Cloud Connectivity Remote Code Execution Vulnerability | 2020-03-09T09:25:00.000Z | 2020-03-09T09:25:00.000Z |
| vde-2020-007 | WAGO: Web-Based Management Denial of Service | 2020-03-09T09:10:00.000Z | 2020-03-09T09:10:00.000Z |
| vde-2019-022 | WAGO: Multiple Vulnerabilities in I/O-Check Service in Multiple Devices | 2019-12-16T09:00:00.000Z | 2019-12-16T09:00:00.000Z |
| vde-2019-013 | WAGO: Multiple Vulnerabilities in industrial managed switches | 2019-06-12T10:25:00.000Z | 2019-06-12T10:25:00.000Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| GCVE-1-2025-0007 |
4.5 (4.0)
|
Missing email validation on user management |
CIRCL |
vulnerability-lookup |
2025-10-13T08:37:00.000Z | 2025-10-13T08:51:37.408861Z |
| GCVE-1-2025-0006 |
9.3 (4.0)
|
Potential XSS in admin CPE in organization model |
CIRCL |
vulnerability-lookup |
2025-10-13T08:29:00.000Z | 2025-10-13T08:52:23.411325Z |
| GCVE-1-2025-0005 |
9.4 (4.0)
|
Reflected XSS due to insecure use of Markup |
CIRCL |
vulnerability-lookup |
2025-10-13T08:23:29.812914Z | 2025-10-13T08:23:29.812914Z |
| GCVE-1-2025-0004 |
10 (4.0)
|
XSS in Comments, Bundles, and Sightings component of v… |
CIRCL |
vulnerability-lookup |
2025-09-25T14:10:00.000Z | 2025-11-19T10:16:47.656802Z |
| GCVE-1-2025-0003 |
9.3 (4.0)
|
Incorrect ACL for user settings edit, which previ… |
cerebrate |
cerebrate |
2025-08-22T12:33:00.000Z | 2025-08-23T07:55:10.950332Z |
| GCVE-1-2025-0002 |
8.9 (4.0)
|
Command Injection in Cl0p Exfiltration Python Script |
Cl0p ransomware |
exfiltration |
2025-07-01T08:19:00.000Z | 2025-07-01T10:58:58.443468Z |
| GCVE-1-2025-0001 |
5.3 (4.0)
|
The absence of a password confirmation step when deact… |
CIRCL |
Vulnerability-Lookup |
2025-05-27T08:58:00.000Z | 2025-05-30T14:27:56.273945Z |