Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-13605 |
9.3 (4.0)
|
Shell command injection in 3onedata GW1101-1D(RS-485)-… |
3onedata |
GW1101-1D(RS-485)-TB-P |
2026-05-04T14:52:39.300Z | 2026-05-04T15:28:56.851Z |
| CVE-2025-70070 |
6.5 (3.1)
|
An issue in Assimp v.6.0.2 allows a remote attack… |
n/a |
n/a |
2026-05-04T00:00:00.000Z | 2026-05-04T15:26:04.832Z |
| CVE-2026-7668 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
MikroTik RouterOS SCEP Endpoint scep.p ASN1_STRING_dat… |
MikroTik |
RouterOS |
2026-05-02T20:00:15.044Z | 2026-05-04T15:25:36.742Z |
| CVE-2025-70072 |
6.5 (3.1)
|
An issue in Assimp v.6.0.2 allows a remote attack… |
n/a |
n/a |
2026-05-04T00:00:00.000Z | 2026-05-04T15:18:52.574Z |
| CVE-2026-7674 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Shenzhen Libituo Technology LBT-T300-HW1 Web Managemen… |
Shenzhen Libituo Technology |
LBT-T300-HW1 |
2026-05-03T01:30:14.156Z | 2026-05-04T15:06:40.875Z |
| CVE-2026-7686 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
eyeo Adblock Plus Legacy Premium Activation premium.pr… |
eyeo |
Adblock Plus |
2026-05-03T07:30:12.937Z | 2026-05-04T15:02:41.096Z |
| CVE-2026-6449 |
5.3 (3.1)
|
Booking for Appointments and Events Calendar – Amelia … |
ameliabooking |
Booking for Appointments and Events Calendar – Amelia |
2026-05-02T07:46:40.967Z | 2026-05-04T15:01:09.348Z |
| CVE-2026-6446 |
5.4 (3.1)
|
My Social Feeds <= 1.0.4 - Missing Authorization to Un… |
bplugins |
My Social Feeds – Social Feeds Embedder Plugin for WordPress |
2026-05-02T04:27:46.053Z | 2026-05-04T14:59:54.515Z |
| CVE-2026-6525 |
5.5 (3.1)
|
NULL Pointer Dereference in Wireshark |
Wireshark Foundation |
Wireshark |
2026-05-02T11:33:33.147Z | 2026-05-04T14:59:08.976Z |
| CVE-2026-7649 |
7.5 (3.1)
|
ARMember <= 4.0.60 - Unauthenticated SQL Injection via… |
reputeinfosystems |
ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup |
2026-05-02T06:44:06.753Z | 2026-05-04T14:58:57.847Z |
| CVE-2026-4061 |
7.5 (3.1)
|
Geo Mashup <= 1.13.18 - Unauthenticated Time-Based SQL… |
cyberhobo |
Geo Mashup |
2026-05-02T11:16:10.948Z | 2026-05-04T14:58:15.863Z |
| CVE-2026-7612 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
itsourcecode Courier Management System edit_user.php s… |
itsourcecode |
Courier Management System |
2026-05-02T10:00:14.181Z | 2026-05-04T14:57:28.664Z |
| CVE-2026-7638 |
5.3 (3.1)
|
App Builder <= 5.5.10 - Insecure Direct Object Referen… |
appcheap |
App Builder – Create Native Android & iOS Apps On The Flight |
2026-05-02T03:36:42.852Z | 2026-05-04T14:56:50.259Z |
| CVE-2026-7491 |
8.6 (4.0)
8.1 (3.1)
|
Zyosoft|School App - Insecure Direct Object Reference |
Zyosoft |
School App |
2026-05-02T09:14:25.760Z | 2026-05-04T14:56:44.399Z |
| CVE-2026-7490 |
8.6 (4.0)
7.2 (3.1)
|
Sunnet|CTMS and CPAS - Arbitrary File Upload |
Sunnet |
CTMS |
2026-05-02T09:06:25.153Z | 2026-05-04T14:56:10.986Z |
| CVE-2024-48962 |
8.9 (4.0)
|
Apache OFBiz: Bypass SameSite restrictions with target… |
Apache Software Foundation |
Apache OFBiz |
2024-11-18T08:41:30.545Z | 2026-05-04T14:55:28.249Z |
| CVE-2026-7679 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
YunaiV yudao-cloud OAuth2TokenServiceImpl.java getAcce… |
YunaiV |
yudao-cloud |
2026-05-03T04:15:10.929Z | 2026-05-04T14:55:27.068Z |
| CVE-2026-7458 |
9.8 (3.1)
|
User Verification by PickPlugins <= 2.0.46 - Unauthent… |
pickplugins |
User Verification by PickPlugins |
2026-05-02T04:27:43.795Z | 2026-05-04T14:54:08.894Z |
| CVE-2026-7673 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
crmeb_java Admin Upload UploadServiceImpl.java unrestr… |
n/a |
crmeb_java |
2026-05-03T01:15:37.395Z | 2026-05-04T14:54:04.987Z |
| CVE-2026-7685 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Edimax BR-6208AC setWAN buffer overflow |
Edimax |
BR-6208AC |
2026-05-03T07:00:12.291Z | 2026-05-04T14:52:55.937Z |
| CVE-2026-7653 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
r-huijts mcp-server-rijksmuseum MCP index.ts open_imag… |
r-huijts |
mcp-server-rijksmuseum |
2026-05-02T15:30:19.386Z | 2026-05-04T14:52:08.190Z |
| CVE-2026-5113 |
7.2 (3.1)
|
Gravity Forms <= 2.10.0 - Unauthenticated Stored Cross… |
Gravity Forms |
Gravity Forms |
2026-05-02T05:29:28.461Z | 2026-05-04T14:51:42.054Z |
| CVE-2026-4024 |
5.3 (3.1)
|
Royal Addons for Elementor <= 1.7.1056 - Missing Autho… |
wproyal |
Royal Addons for Elementor – Addons and Templates Kit for Elementor |
2026-05-02T08:27:04.649Z | 2026-05-04T14:49:17.791Z |
| CVE-2026-6499 |
2.4 (4.0)
|
Incorrect Permission Assignment for Critical Reso… |
ILM Informatique |
OpenConcerto |
2026-05-04T14:08:03.764Z | 2026-05-04T14:43:54.994Z |
| CVE-2026-4100 |
7.1 (3.1)
|
Paid Memberships Pro <= 3.6.5 - Missing Authorization … |
strangerstudios |
Paid Memberships Pro – Content Restriction, User Registration, & Paid Subscriptions |
2026-05-02T11:16:09.788Z | 2026-05-04T14:24:32.736Z |
| CVE-2026-31205 |
5.7 (3.1)
|
Cross Site Scripting vulnerability in Pluck CMS b… |
n/a |
n/a |
2026-05-04T00:00:00.000Z | 2026-05-04T14:24:01.940Z |
| CVE-2026-3504 |
5.3 (3.1)
|
Dokan: AI Powered WooCommerce Multivendor Marketplace … |
dokaninc |
Dokan: AI Powered WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy |
2026-05-02T13:26:09.111Z | 2026-05-04T14:18:51.266Z |
| CVE-2026-0875 |
7.8 (3.1)
|
MODEL File Parsing Out-of-Bounds Write |
Autodesk |
Shared Components |
2026-02-18T19:39:27.111Z | 2026-05-04T14:09:42.380Z |
| CVE-2026-0874 |
7.8 (3.1)
|
CATPART File Parsing Out-of-Bounds Write |
Autodesk |
Shared Components |
2026-02-18T19:38:32.639Z | 2026-05-04T14:09:11.001Z |
| CVE-2025-9460 |
7.8 (3.1)
|
SLDPRT File Parsing Out-of-Bounds Read Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:38:58.232Z | 2026-05-04T14:08:21.005Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2016-7959 |
N/A
|
Siemens SIMATIC STEP 7 (TIA Portal) before 14 imp… |
n/a |
n/a |
2016-10-13T10:00:00.000Z | 2024-08-06T02:13:21.506Z |
| CVE-2016-7954 |
N/A
|
Bundler 1.x might allow remote attackers to injec… |
n/a |
n/a |
2016-12-22T22:00:00.000Z | 2024-08-06T02:13:21.223Z |
| CVE-2016-7953 |
N/A
|
Buffer underflow in X.org libXvMC before 1.0.10 a… |
n/a |
n/a |
2016-12-13T20:00:00.000Z | 2024-08-06T02:13:21.136Z |
| CVE-2016-7952 |
N/A
|
X.org libXtst before 1.2.3 allows remote X server… |
n/a |
n/a |
2016-12-13T20:00:00.000Z | 2024-08-06T02:13:21.532Z |
| CVE-2016-7951 |
N/A
|
Multiple integer overflows in X.org libXtst befor… |
n/a |
n/a |
2016-12-13T20:00:00.000Z | 2024-08-06T02:13:21.552Z |
| CVE-2016-7950 |
N/A
|
The XRenderQueryFilters function in X.org libXren… |
n/a |
n/a |
2016-12-13T20:00:00.000Z | 2024-08-06T02:13:21.558Z |
| CVE-2016-7949 |
N/A
|
Multiple buffer overflows in the (1) XvQueryAdapt… |
n/a |
n/a |
2016-12-13T20:00:00.000Z | 2024-08-06T02:13:21.128Z |
| CVE-2016-7948 |
N/A
|
X.org libXrandr before 1.5.1 allows remote X serv… |
n/a |
n/a |
2016-12-13T20:00:00.000Z | 2024-08-06T02:13:21.319Z |
| CVE-2016-7947 |
N/A
|
Multiple integer overflows in X.org libXrandr bef… |
n/a |
n/a |
2016-12-13T20:00:00.000Z | 2024-08-06T02:13:21.789Z |
| CVE-2016-7946 |
N/A
|
X.org libXi before 1.7.7 allows remote X servers … |
n/a |
n/a |
2016-12-13T20:00:00.000Z | 2024-08-06T02:13:21.322Z |
| CVE-2016-7945 |
N/A
|
Multiple integer overflows in X.org libXi before … |
n/a |
n/a |
2016-12-13T20:00:00.000Z | 2024-08-06T02:13:21.529Z |
| CVE-2016-7944 |
N/A
|
Integer overflow in X.org libXfixes before 5.0.3 … |
n/a |
n/a |
2016-12-13T20:00:00.000Z | 2024-08-06T02:13:21.517Z |
| CVE-2016-7943 |
N/A
|
The XListFonts function in X.org libX11 before 1.… |
n/a |
n/a |
2016-12-13T20:00:00.000Z | 2024-08-06T02:13:21.110Z |
| CVE-2016-7942 |
N/A
|
The XGetImage function in X.org libX11 before 1.6… |
n/a |
n/a |
2016-12-13T20:00:00.000Z | 2024-08-06T02:13:21.749Z |
| CVE-2016-7919 |
7.5 (3.1)
|
Moodle 3.1.2 allows remote attackers to obtain se… |
n/a |
n/a |
2016-10-28T15:00:00.000Z | 2024-08-06T02:13:20.936Z |
| CVE-2016-7917 |
N/A
|
The nfnetlink_rcv_batch function in net/netfilter… |
n/a |
n/a |
2016-11-16T04:49:00.000Z | 2024-08-06T02:13:20.955Z |
| CVE-2016-7916 |
N/A
|
Race condition in the environ_read function in fs… |
n/a |
n/a |
2016-11-16T04:49:00.000Z | 2024-08-06T02:13:20.801Z |
| CVE-2016-7915 |
N/A
|
The hid_input_field function in drivers/hid/hid-c… |
n/a |
n/a |
2016-11-16T04:49:00.000Z | 2024-08-06T02:13:20.857Z |
| CVE-2016-7914 |
N/A
|
The assoc_array_insert_into_terminal_node functio… |
n/a |
n/a |
2016-11-16T04:49:00.000Z | 2024-08-06T02:13:20.798Z |
| CVE-2016-7913 |
N/A
|
The xc2028_set_config function in drivers/media/t… |
n/a |
n/a |
2016-11-16T04:49:00.000Z | 2024-08-06T02:13:20.821Z |
| CVE-2016-7912 |
N/A
|
Use-after-free vulnerability in the ffs_user_copy… |
n/a |
n/a |
2016-11-16T04:49:00.000Z | 2024-08-06T02:13:20.886Z |
| CVE-2016-7911 |
N/A
|
Race condition in the get_task_ioprio function in… |
n/a |
n/a |
2016-11-16T04:49:00.000Z | 2024-08-06T02:13:20.819Z |
| CVE-2016-7910 |
N/A
|
Use-after-free vulnerability in the disk_seqf_sto… |
n/a |
n/a |
2016-11-16T04:49:00.000Z | 2024-08-06T02:13:20.882Z |
| CVE-2016-7909 |
N/A
|
The pcnet_rdra_addr function in hw/net/pcnet.c in… |
n/a |
n/a |
2016-10-05T16:00:00.000Z | 2024-08-06T02:13:20.944Z |
| CVE-2016-7908 |
N/A
|
The mcf_fec_do_tx function in hw/net/mcf_fec.c in… |
n/a |
n/a |
2016-10-05T16:00:00.000Z | 2024-08-06T02:13:20.875Z |
| CVE-2016-7907 |
N/A
|
The imx_fec_do_tx function in hw/net/imx_fec.c in… |
n/a |
n/a |
2016-10-05T16:00:00.000Z | 2024-08-06T02:13:20.926Z |
| CVE-2016-7905 |
N/A
|
The read_gab2_sub function in libavformat/avidec.… |
n/a |
n/a |
2016-12-23T05:00:00.000Z | 2024-08-06T02:13:20.535Z |
| CVE-2016-7903 |
N/A
|
Dotclear before 2.10.3, when the Host header is n… |
n/a |
n/a |
2017-01-04T21:00:00.000Z | 2024-08-06T02:13:20.504Z |
| CVE-2016-7902 |
N/A
|
Unrestricted file upload vulnerability in the fil… |
n/a |
n/a |
2017-01-04T21:00:00.000Z | 2024-08-06T02:13:20.536Z |
| CVE-2016-7891 |
N/A
|
Adobe RoboHelp version 2015.0.3 and earlier, Robo… |
n/a |
Adobe RoboHelp 2015.0.3 and earlier, RoboHelp 11 and earlier |
2016-12-15T06:31:00.000Z | 2024-08-06T02:13:20.511Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2016-7880 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable us… | 2016-12-15T06:59:44.313 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7879 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable us… | 2016-12-15T06:59:43.330 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7878 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable us… | 2016-12-15T06:59:42.237 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7877 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable us… | 2016-12-15T06:59:41.220 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7876 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable me… | 2016-12-15T06:59:40.250 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7875 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable in… | 2016-12-15T06:59:39.220 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7874 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable me… | 2016-12-15T06:59:38.220 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7873 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable me… | 2016-12-15T06:59:37.097 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7872 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable us… | 2016-12-15T06:59:36.157 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7871 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable me… | 2016-12-15T06:59:35.237 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7870 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable bu… | 2016-12-15T06:59:34.297 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7869 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable bu… | 2016-12-15T06:59:33.313 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7868 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable bu… | 2016-12-15T06:59:32.190 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7867 | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable bu… | 2016-12-15T06:59:30.940 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7866 | Adobe Animate versions 15.2.1.95 and earlier have an exploitable memory corruption vulnerability. S… | 2016-12-15T06:59:29.987 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7865 | Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable ty… | 2016-11-08T17:59:10.007 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7864 | Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable us… | 2016-11-08T17:59:08.960 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7863 | Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable us… | 2016-11-08T17:59:07.977 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7862 | Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable us… | 2016-11-08T17:59:06.960 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7861 | Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable ty… | 2016-11-08T17:59:05.803 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7860 | Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable ty… | 2016-11-08T17:59:04.617 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7859 | Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable us… | 2016-11-08T17:59:03.380 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7858 | Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable us… | 2016-11-08T17:59:02.397 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7857 | Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable us… | 2016-11-08T17:59:01.303 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7856 | Adobe DNG Converter versions 9.7 and earlier have an exploitable memory corruption vulnerability. S… | 2016-12-15T06:59:28.957 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7854 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243,… | 2016-10-21T17:59:04.310 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7853 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243,… | 2016-10-21T17:59:03.230 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7852 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243,… | 2016-10-21T17:59:01.637 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7851 | Adobe Connect version 9.5.6 and earlier does not adequately validate input in the events registrati… | 2016-11-08T17:59:00.177 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-7796 | The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service … | 2016-10-13T14:59:14.567 | 2026-05-06T22:30:45.220 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-8r88-6cj9-9fh5 |
2.7 (4.0)
|
auth-js Vulnerable to Insecure Path Routing from Malformed User Input | 2025-05-27T18:00:17Z | 2026-05-05T17:59:54Z |
| ghsa-4v9x-cqc5-j645 |
9.3 (4.0)
|
Codechecker has an authentication bypass for certain API calls | 2026-05-05T17:58:09Z | 2026-05-05T17:58:09Z |
| ghsa-64cv-vxpr-j6vc |
8.5 (3.1)
|
edx-enterprise has SSRF via SAML metadata URL in sync_provider_data endpoint | 2026-05-05T17:51:50Z | 2026-05-05T17:51:50Z |
| ghsa-fj4g-2p96-q6m3 |
8.7 (4.0)
|
Network-AI missing authentication on MCP HTTP endpoint, which allows unauthenticated privileged too… | 2026-05-05T17:25:37Z | 2026-05-05T17:25:37Z |
| ghsa-r7cg-qjjm-xhqq |
8.2 (3.1)
|
webonyx/graphql-php has unbounded recursion in parser that causes stack overflow on crafted nested input | 2026-05-05T17:24:57Z | 2026-05-05T17:24:57Z |
| ghsa-h5fq-653g-gxrm |
5.3 (3.1)
|
ots has a negative expire override that can bypass its secret retention policy | 2026-05-05T17:20:36Z | 2026-05-05T17:20:36Z |
| ghsa-9hmg-827w-9rhj |
4.4 (3.1)
|
nuts-node has JWT type confusion in v1 access token introspection that allows VP replay as access token | 2026-05-05T17:15:32Z | 2026-05-05T17:15:32Z |
| ghsa-5mrq-x3x5-8v8f |
6.8 (3.1)
|
Jupyter Server's Authentication Cookies Remain Valid After Password Reset and Server Restart | 2026-05-05T17:03:24Z | 2026-05-05T17:03:24Z |
| ghsa-24qx-w28j-9m6p |
7.6 (4.0)
|
Jupyter Server has a CORS Origin Validation Bypass via `re.match()` in `allow_origin_pat` (from huntr) | 2026-05-05T16:54:31Z | 2026-05-05T16:54:31Z |
| ghsa-5789-5fc7-67v3 |
7.1 (3.1)
|
Jupyter Server: Path Traversal via incorrect startswith() root directory check allows access to sib… | 2026-05-05T16:49:10Z | 2026-05-05T16:49:10Z |
| ghsa-ffh4-j6h5-pg66 |
9.8 (3.1)
|
VM2 Has a WASM Sandbox Escape (Node 25 only) | 2026-05-05T16:44:16Z | 2026-05-05T16:44:16Z |
| ghsa-55hx-c926-fr95 |
9.8 (3.1)
|
VM2 Has a Sandbox Escape Issue via SuppressedError | 2026-05-05T16:33:45Z | 2026-05-05T16:33:45Z |
| ghsa-v37h-5mfm-c47c |
9.8 (3.1)
|
VM2 Has Sandbox Breakout Through Inspect Function | 2026-05-05T16:33:14Z | 2026-05-05T16:33:15Z |
| ghsa-qh7q-6qm3-653w |
6.0 (4.0)
|
Jupyter Server has an open redirection vulnerability in `next` query parameter | 2026-05-05T16:32:48Z | 2026-05-05T16:32:48Z |
| ghsa-qvjj-29qf-hp7p |
9.8 (3.1)
|
VM2 Has Sandbox Breakout Through Promise Species | 2026-05-05T16:23:35Z | 2026-05-05T16:23:35Z |
| ghsa-x284-j5p8-9c5p |
6.5 (3.1)
6.8 (4.0)
|
pypdf: Manipulated FlateDecode image dimensions can exhaust RAM | 2026-04-16T21:30:25Z | 2026-05-05T15:44:27Z |
| ghsa-4pxv-j86v-mhcw |
6.5 (3.1)
6.8 (4.0)
|
pypdf: Possible long runtimes for wrong size values in incremental mode | 2026-04-16T21:30:12Z | 2026-05-05T15:44:20Z |
| ghsa-7gw9-cf7v-778f |
6.5 (3.1)
6.8 (4.0)
|
pypdf: Manipulated FlateDecode predictor parameters can exhaust RAM | 2026-04-16T21:30:00Z | 2026-05-05T15:44:12Z |
| ghsa-jcjw-58rv-c452 |
8.1 (3.1)
7.6 (4.0)
|
Kirby has Server-Side Template Injection (SSTI) via double template resolution in option rendering | 2026-04-23T21:24:00Z | 2026-05-05T15:43:54Z |
| ghsa-hv4r-mvr4-25vw |
8.2 (3.1)
8.8 (4.0)
|
MinIO has an Unauthenticated Object Write via Query-String Credential Signature Bypass in Unsigned-… | 2026-04-14T23:40:05Z | 2026-05-05T15:43:33Z |
| ghsa-9c4q-hq6p-c237 |
8.2 (3.1)
8.8 (4.0)
|
MinIO has an Unauthenticated Object Write via Missing Signature Verification in Unsigned-Trailer Uploads | 2026-04-14T00:04:45Z | 2026-05-05T15:43:25Z |
| ghsa-xphw-cqx3-667j |
7.3 (3.1)
|
thin-vec: Use-After-Free and Double Free in IntoIter::drop When Element Drop Panics | 2026-04-15T19:24:54Z | 2026-05-05T15:43:14Z |
| ghsa-mw35-8rx3-xf9r |
8.9 (4.0)
|
Ray: Remote Code Execution via Parquet Arrow Extension Type Deserialization | 2026-04-24T16:15:00Z | 2026-05-05T15:32:41Z |
| ghsa-v9q7-47h2-cg7c |
5.0 (3.1)
|
An issue that could allow a dashboard configuration to be viewed from outside of the authorized org… | 2026-05-05T15:31:36Z | 2026-05-05T15:31:36Z |
| ghsa-m3xj-gqh8-33xm |
7.2 (3.1)
7.3 (4.0)
|
A weakness has been identified in EFM ipTIME C200 up to 1.092. This vulnerability affects the funct… | 2026-05-05T15:31:36Z | 2026-05-05T15:31:36Z |
| ghsa-m27f-97wm-9gqr |
7.0 (3.1)
6.4 (4.0)
|
A security flaw has been discovered in IObit Advanced SystemCare 19. This affects an unknown part o… | 2026-05-05T15:31:36Z | 2026-05-05T15:31:36Z |
| ghsa-c384-mhv7-jvfr |
9.8 (3.1)
8.9 (4.0)
|
A security vulnerability has been detected in EFM ipTIME NAS1dual 1.5.24. This issue affects the fu… | 2026-05-05T15:31:36Z | 2026-05-05T15:31:36Z |
| ghsa-3p4f-gq85-7pv7 |
7.5 (3.1)
|
The WeePie Cookie Allow plugin for WordPress is vulnerable to SQL Injection via the 'consent' param… | 2026-05-05T15:31:36Z | 2026-05-05T15:31:36Z |
| ghsa-rw4g-vpc3-98p2 |
8.8 (3.1)
9.4 (4.0)
|
An insecure direct object reference (IDOR) vulnerability in MphRx's Minerva V3.6.0, specifically in… | 2026-04-28T15:30:50Z | 2026-05-05T15:31:35Z |
| ghsa-rm34-fg4m-39mw |
7.2 (3.1)
|
OpenSTAManager version 2.10 and earlier contains an arbitrary file upload vulnerability in the modu… | 2026-05-04T21:30:24Z | 2026-05-05T15:31:35Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-151 |
|
Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grapple… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:29.453433Z |
| pysec-2022-150 |
|
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a den… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:29.301352Z |
| pysec-2022-149 |
|
Tensorflow is an Open Source Machine Learning Framework. When decoding PNG images TensorF… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:29.163401Z |
| pysec-2022-148 |
|
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a use… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.987872Z |
| pysec-2022-147 |
|
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a den… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.843331Z |
| pysec-2022-146 |
|
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a den… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.710235Z |
| pysec-2022-145 |
|
Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in Tensor… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.561700Z |
| pysec-2022-144 |
|
Tensorflow is an Open Source Machine Learning Framework. During shape inference, TensorFl… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.435695Z |
| pysec-2022-143 |
|
Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in Tensor… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.283580Z |
| pysec-2022-142 |
|
Tensorflow is an Open Source Machine Learning Framework. If a graph node is invalid, Tens… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.101919Z |
| pysec-2022-141 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `GetInitOp… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.968735Z |
| pysec-2022-140 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCo… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.816300Z |
| pysec-2022-139 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCo… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.680857Z |
| pysec-2022-138 |
|
Tensorflow is an Open Source Machine Learning Framework. There is a typo in TensorFlow's … | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.547711Z |
| pysec-2022-137 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `AssignOp`… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.416732Z |
| pysec-2022-136 |
|
Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, TensorF… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.267952Z |
| pysec-2022-135 |
|
Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from prot… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.136787Z |
| pysec-2022-134 |
|
Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from prot… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:26.999978Z |
| pysec-2022-133 |
|
Tensorflow is an Open Source Machine Learning Framework. Multiple operations in TensorFlo… | tensorflow-gpu | 2022-02-03T13:15:00Z | 2022-03-09T00:18:26.852426Z |
| pysec-2022-132 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `AddManySp… | tensorflow-gpu | 2022-02-03T12:15:00Z | 2022-03-09T00:18:26.728990Z |
| pysec-2022-131 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementations of `Sparse*C… | tensorflow-gpu | 2022-02-03T12:15:00Z | 2022-03-09T00:18:26.570322Z |
| pysec-2022-130 |
|
Tensorflow is an Open Source Machine Learning Framework. TensorFlow is vulnerable to a he… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:26.438942Z |
| pysec-2022-129 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can trigger denial o… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:26.310749Z |
| pysec-2022-128 |
|
Tensorflow is an Open Source Machine Learning Framework. When decoding a resource handle … | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:26.187094Z |
| pysec-2022-127 |
|
Tensorflow is an Open Source Machine Learning Framework. In multiple places, TensorFlow u… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:26.055433Z |
| pysec-2022-126 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Range` su… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:25.916972Z |
| pysec-2022-125 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:25.786755Z |
| pysec-2022-124 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:25.643457Z |
| pysec-2022-123 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:25.518342Z |
| pysec-2022-122 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:25.380350Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32950 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-23T05:02:10.453773Z |
| gsd-2024-32949 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.470315Z |
| gsd-2024-32948 | Missing Authorization vulnerability in Repute Infosystems ARMember.This issue affects ARM… | 2024-04-23T05:02:10.490887Z |
| gsd-2024-32947 | Cross-Site Request Forgery (CSRF) vulnerability in AlumniOnline Web Services LLC WP ADA C… | 2024-04-23T05:02:10.448626Z |
| gsd-2023-52721 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:01:35.589969Z |
| gsd-2023-52720 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:01:35.330143Z |
| gsd-2023-52719 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:01:35.384447Z |
| gsd-2024-4023 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-22T05:02:08.676402Z |
| gsd-2018-25101 | A vulnerability, which was classified as problematic, has been found in l2c2technologies … | 2024-04-21T05:02:45.593909Z |
| gsd-2024-4022 | A vulnerability was found in Keenetic KN-1010, KN-1410, KN-1711, KN-1810 and KN-1910 up t… | 2024-04-21T05:02:03.520941Z |
| gsd-2024-4021 | A vulnerability was found in Keenetic KN-1010, KN-1410, KN-1711, KN-1810 and KN-1910 up t… | 2024-04-21T05:02:03.524179Z |
| gsd-2024-4020 | A vulnerability was found in Tenda FH1206 1.2.0.8(8155) and classified as critical. This … | 2024-04-21T05:02:03.519205Z |
| gsd-2015-10132 | A vulnerability classified as problematic was found in Thimo Grauerholz WP-Spreadplugin u… | 2024-04-21T05:00:54.861505Z |
| gsd-2024-3998 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.160987Z |
| gsd-2024-3996 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.060075Z |
| gsd-2024-3994 | The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable t… | 2024-04-20T05:02:06.154525Z |
| gsd-2024-3993 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.066057Z |
| gsd-2024-3990 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.133590Z |
| gsd-2024-3985 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.139392Z |
| gsd-2024-3981 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.047097Z |
| gsd-2024-29223 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.608333Z |
| gsd-2024-29079 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.789437Z |
| gsd-2024-29077 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.706305Z |
| gsd-2024-27461 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.418108Z |
| gsd-2024-3999 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.798446Z |
| gsd-2024-3997 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.864650Z |
| gsd-2024-3995 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.859161Z |
| gsd-2024-3992 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.918291Z |
| gsd-2024-3991 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.870318Z |
| gsd-2024-3989 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.894049Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2359 | Malicious code in env-embed (npm) | 2026-03-24T15:44:11Z | 2026-04-07T14:41:21Z |
| mal-2026-2358 | Malicious code in env-cli-express (npm) | 2026-03-24T15:44:10Z | 2026-04-07T14:41:21Z |
| mal-2026-2357 | Malicious code in ectoplast-spirit (npm) | 2026-03-24T15:43:46Z | 2026-04-07T14:41:21Z |
| mal-2026-2356 | Malicious code in ecto-spirit-core (npm) | 2026-03-24T15:43:45Z | 2026-04-07T14:41:21Z |
| mal-2026-2355 | Malicious code in ecto-spirit (npm) | 2026-03-24T15:43:45Z | 2026-04-07T14:41:21Z |
| mal-2026-2354 | Malicious code in ecto-registry (npm) | 2026-03-24T15:43:44Z | 2026-04-07T14:41:21Z |
| mal-2026-2353 | Malicious code in ecto-engine (npm) | 2026-03-24T15:43:43Z | 2026-04-07T14:41:21Z |
| mal-2026-2352 | Malicious code in ecto-corsair-lwirz (npm) | 2026-03-24T15:43:43Z | 2026-04-07T14:41:21Z |
| mal-2026-2351 | Malicious code in dotenv-xtend (npm) | 2026-03-24T15:43:16Z | 2026-04-07T14:41:21Z |
| mal-2026-2350 | Malicious code in dotenv-express (npm) | 2026-03-24T15:43:15Z | 2026-04-07T14:41:21Z |
| mal-2026-2349 | Malicious code in deriv_ppetest (npm) | 2026-03-24T15:42:44Z | 2026-04-07T14:41:21Z |
| mal-2026-2348 | Malicious code in cursed-module (npm) | 2026-03-24T15:41:56Z | 2026-04-07T14:41:21Z |
| mal-2026-2347 | Malicious code in ctf-package-onetimeuseforctf (npm) | 2026-03-24T15:41:46Z | 2026-04-07T14:41:21Z |
| mal-2026-2346 | Malicious code in corsair-module (npm) | 2026-03-24T15:41:15Z | 2026-04-07T14:41:21Z |
| mal-2026-2345 | Malicious code in codecoverage-tools (npm) | 2026-03-24T15:40:45Z | 2026-04-07T14:41:21Z |
| mal-2026-2344 | Malicious code in codeanalysis-common (npm) | 2026-03-24T15:40:44Z | 2026-04-07T14:41:21Z |
| mal-2026-2323 | Malicious code in ethersproject-wallet (npm) | 2026-04-01T09:11:09Z | 2026-04-07T14:41:21Z |
| mal-2026-2447 | Malicious code in @toprank/partner (npm) | 2026-04-03T07:43:43Z | 2026-04-07T14:41:20Z |
| mal-2026-2413 | Malicious code in cclr-component-resources (npm) | 2026-03-24T09:03:35Z | 2026-04-07T14:41:20Z |
| mal-2026-2412 | Malicious code in @wame/ngx-frf-utilities (npm) | 2026-03-24T09:08:41Z | 2026-04-07T14:41:20Z |
| mal-2026-2411 | Malicious code in @wame/ngx-adfs (npm) | 2026-03-24T09:08:34Z | 2026-04-07T14:41:20Z |
| mal-2026-2409 | Malicious code in @phonos/types (npm) | 2026-03-24T09:07:37Z | 2026-04-07T14:41:20Z |
| mal-2026-2343 | Malicious code in chain-multer (npm) | 2026-03-24T15:40:17Z | 2026-04-07T14:41:20Z |
| mal-2026-2342 | Malicious code in chai-set (npm) | 2026-03-24T15:40:16Z | 2026-04-07T14:41:20Z |
| mal-2026-2341 | Malicious code in chai-chain-cognivault (npm) | 2026-03-24T15:40:13Z | 2026-04-07T14:41:20Z |
| mal-2026-2340 | Malicious code in chai-chain-argon (npm) | 2026-03-24T15:40:12Z | 2026-04-07T14:41:20Z |
| mal-2026-2339 | Malicious code in chai-as-chains (npm) | 2026-03-24T15:39:59Z | 2026-04-07T14:41:20Z |
| mal-2026-2338 | Malicious code in chai-as-attached (npm) | 2026-03-24T15:39:58Z | 2026-04-07T14:41:20Z |
| mal-2026-2337 | Malicious code in chai-as-aligned (npm) | 2026-03-24T15:39:57Z | 2026-04-07T14:41:20Z |
| mal-2026-2336 | Malicious code in cdnjavacss (npm) | 2026-03-24T15:39:45Z | 2026-04-07T14:41:20Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-3062 | PowerDNS: Schwachstelle ermöglicht Denial of Service | 2024-10-03T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2024-1955 | IBM Java SDK: Schwachstelle ermöglicht Denial of Service | 2024-08-29T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2024-1658 | Oracle Java SE: Mehrere Schwachstellen | 2024-07-16T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2024-1599 | Python: Mehrere Schwachstellen | 2019-03-24T23:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2024-1159 | libxml2: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-05-15T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2024-0913 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-04-16T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2024-0851 | Linux Kernel: Mehrere Schwachstellen | 2024-04-10T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2023-2723 | Red Hat Satellite: Mehrere Schwachstellen | 2023-10-22T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2023-2692 | Oracle Java SE: Mehrere Schwachstellen | 2023-10-17T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2023-2618 | http/2 Implementierungen: Schwachstelle ermöglicht Denial of Service | 2023-10-10T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2023-2338 | Red Hat OpenShift: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-09-12T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2023-1298 | Python: Schwachstelle ermöglicht Denial of Service | 2020-07-13T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2022-2338 | Red Hat Enterprise Linux (Advanced Cluster Management): Mehrere Schwachstellen | 2022-12-14T23:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2022-0069 | Red Hat OpenShift Logging Subsystem: Mehrere Schwachstellen | 2022-04-21T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1285 | Adobe Experience Manager: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2025-06-10T22:00:00.000+00:00 | 2025-07-24T22:00:00.000+00:00 |
| wid-sec-w-2025-1627 | GitLab: Mehrere Schwachstellen | 2025-07-22T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1525 | MediaWiki Extensions und Skins: Mehrere Schwachstellen | 2025-07-09T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1438 | MediaWiki: Mehrere Schwachstellen | 2025-06-30T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1420 | IBM App Connect Enterprise: Mehrere Schwachstellen | 2025-06-29T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1418 | IBM MQ Appliance/Client: Schwachstelle ermöglicht Denial of Service | 2025-06-29T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1379 | Red Hat Enterprise Linux (iputils): Schwachstelle ermöglicht Denial of Service | 2025-06-23T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1056 | IBM Semeru Runtime: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-05-14T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0967 | Mitel SIP Phone: Mehrere Schwachstellen | 2025-05-07T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0790 | MediaWiki Erweiterungen und -Komponenten: Mehrere Schwachstellen | 2025-04-13T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0788 | MediaWiki: Mehrere Schwachstellen | 2025-04-10T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0622 | Apache Commons: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-03-23T23:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0512 | Red Hat Advanced Cluster Security: Schwachstelle ermöglicht Denial of Service | 2025-03-10T23:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0469 | libarchive: Schwachstelle ermöglicht Denial of Service und weitere nicht spezifizierte Angriffe | 2025-03-02T23:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0394 | OpenSSH: Mehrere Schwachstellen | 2025-02-17T23:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0316 | OpenSSL: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-02-11T23:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-105-04 | Growatt Cloud Applications | 2025-04-15T06:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-100-08 | Subnet Solutions PowerSYSTEM Center | 2025-04-10T06:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-100-07 | Rockwell Automation Arena | 2025-04-10T06:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-100-04 | Siemens Industrial Edge Devices | 2025-04-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-100-03 | Siemens Solid Edge | 2025-04-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-100-02 | Siemens SIDIS Prime | 2025-04-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-100-01 | Siemens License Server (SLS) | 2025-04-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-079-03 | Siemens Simcenter Femap | 2025-03-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-072-08 | Siemens Tecnomatix Plant Simulation | 2025-03-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-072-06 | Siemens SCALANCE LPE9403 | 2025-03-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-072-04 | Siemens SiPass integrated AC5102/ACC-G2 and ACC-AP | 2025-03-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-072-01 | Siemens Teamcenter Visualization and Tecnomatix | 2025-03-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-051-04 | Siemens SiPass Integrated | 2025-02-17T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-044-14 | Siemens Opcenter Intelligence | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-044-13 | Siemens SIMATIC PCS neo, TIA Administrator, and TIA Portal | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-044-10 | Siemens Questa and ModelSim | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-044-09 | Siemens SCALANCE W700 IEEE 802.11ax | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-044-08 | Siemens OpenV2G | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-044-02 | Siemens SIMATIC | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-044-01 | Siemens SIMATIC S7-1200 CPU Family | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-021-02 | Siemens SIMATIC S7-1200 CPUs | 2025-01-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-016-03 | Siemens Siveillance Video Camera | 2025-01-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-016-01 | Siemens Mendix LDAP | 2025-01-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-347-09 | Siemens Teamcenter Visualization | 2024-12-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-347-08 | Siemens COMOS | 2024-12-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-347-04 | Siemens Parasolid | 2024-12-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-347-03 | Siemens RUGGEDCOM ROX II | 2024-12-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-347-01 | Siemens CPCI85 Central Processing/Communication | 2024-12-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-338-05 | Fuji Electric Monitouch V-SFT (Update A) | 2024-12-03T07:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-319-11 | Siemens SIMATIC CP | 2024-11-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-wsa-prv-esc-8PdRU8t8 | Cisco Secure Web Appliance Privilege Escalation Vulnerability | 2022-08-17T16:00:00+00:00 | 2022-10-03T18:13:53+00:00 |
| cisco-sa-sd-wan-priv-E6e8tEdF | Cisco SD-WAN Software Privilege Escalation Vulnerabilities | 2022-09-28T16:00:00+00:00 | 2026-02-25T20:29:00+00:00 |
| cisco-sa-duo-macos-bypass-ukznpxe6 | Cisco Duo for macOS Authentication Bypass Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-29T21:21:01+00:00 |
| cisco-sa-duo-macOS-bypass-uKZNpXE6 | Cisco Duo for macOS Authentication Bypass Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-29T21:21:01+00:00 |
| cisco-sa-wlc-udp-dos-xdyewhnz | Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst 9100 Series Access Points UDP Processing Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-wlc-udp-dos-XDyEwhNz | Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst 9100 Series Access Points UDP Processing Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-wlc-dos-mkgrrscb | Cisco Wireless LAN Controller AireOS Software FIPS Mode Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-wlc-dos-mKGRrsCB | Cisco Wireless LAN Controller AireOS Software FIPS Mode Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-wlc-dhcp-dos-76pcjpxk | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family DHCP Processing Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-wlc-dhcp-dos-76pCjPxK | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family DHCP Processing Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-webui-cmdinj-gje47emn | Cisco IOS XE Software Web UI Command Injection Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-webui-cmdinj-Gje47EMn | Cisco IOS XE Software Web UI Command Injection Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ssh-excpt-dos-fzobqtnk | Cisco IOS and IOS XE Software SSH Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ssh-excpt-dos-FzOBQTnk | Cisco IOS and IOS XE Software SSH Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-sdwan-avc-nddsgb8 | Cisco Software-Defined Application Visibility and Control on Cisco vManage Authentication Bypass Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-sdwan-avc-NddSGB8 | Cisco Software-Defined Application Visibility and Control on Cisco vManage Authentication Bypass Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-sdavc-za5fpxx2 | Cisco Software-Defined Application Visibility and Control on Cisco vManage Static Username and Password Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-sdavc-ZA5fpXX2 | Cisco Software-Defined Application Visibility and Control on Cisco vManage Static Username and Password Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-iosxe-mpls-dos-ab4oul3 | Cisco IOS XE Software for Catalyst Switches MPLS Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-iosxe-mpls-dos-Ab4OUL3 | Cisco IOS XE Software for Catalyst Switches MPLS Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-iosxe-cip-dos-9rtbklt9 | Cisco IOS and IOS XE Software Common Industrial Protocol Request Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-iosxe-cip-dos-9rTbKLt9 | Cisco IOS and IOS XE Software Common Industrial Protocol Request Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-iosxe-6vpe-dos-tjbtf5zv | Cisco IOS XE Software IPv6 VPN over MPLS Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-iosxe-6vpe-dos-tJBtf5Zv | Cisco IOS XE Software IPv6 VPN over MPLS Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ios-xe-cat-verify-d4neqa6q | Cisco IOS XE Software for Catalyst 9200 Series Switches Arbitrary Code Execution Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ios-xe-cat-verify-D4NEQA6q | Cisco IOS XE Software for Catalyst 9200 Series Switches Arbitrary Code Execution Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ewc-priv-esc-nderyltk | Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points Privilege Escalation Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ewc-priv-esc-nderYLtK | Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points Privilege Escalation Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-cwlc-snmpidv-rnyyqzuz | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Information Disclosure Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-cwlc-snmpidv-rnyyQzUZ | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Information Disclosure Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-26893 | firmware: arm_scmi: Fix double free in SMC transport cleanup path | 2024-04-02T07:00:00.000Z | 2026-03-31T15:17:57.000Z |
| msrc_cve-2024-36951 | drm/amdkfd: range check cp bad op exception interrupts | 2024-05-02T07:00:00.000Z | 2026-03-31T15:17:49.000Z |
| msrc_cve-2024-49925 | fbdev: efifb: Register sysfs groups through driver core | 2024-10-01T07:00:00.000Z | 2026-03-31T15:17:48.000Z |
| msrc_cve-2025-21658 | btrfs: avoid NULL pointer dereference if no valid extent tree | 2025-01-02T00:00:00.000Z | 2026-03-31T15:17:47.000Z |
| msrc_cve-2024-36949 | amd/amdkfd: sync all devices to wait all processes being evicted | 2024-05-02T07:00:00.000Z | 2026-03-31T15:17:37.000Z |
| msrc_cve-2024-50243 | fs/ntfs3: Fix general protection fault in run_is_mapped_full | 2024-11-02T00:00:00.000Z | 2026-03-31T15:17:36.000Z |
| msrc_cve-2024-57895 | ksmbd: set ATTR_CTIME flags when setting mtime | 2025-01-02T00:00:00.000Z | 2026-03-31T15:17:35.000Z |
| msrc_cve-2024-46860 | wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change | 2024-09-01T07:00:00.000Z | 2026-03-31T15:17:26.000Z |
| msrc_cve-2024-36922 | wifi: iwlwifi: read txq->read_ptr under lock | 2024-05-02T07:00:00.000Z | 2026-03-31T15:17:21.000Z |
| msrc_cve-2024-56692 | f2fs: fix to do sanity check on node blkaddr in truncate_node() | 2024-12-02T00:00:00.000Z | 2026-03-31T15:17:18.000Z |
| msrc_cve-2024-36244 | net/sched: taprio: extend minimum interval restriction to entire cycle too | 2024-06-02T07:00:00.000Z | 2026-03-31T15:17:07.000Z |
| msrc_cve-2023-52582 | netfs: Only call folio_start_fscache() one time for each folio | 2024-03-02T08:00:00.000Z | 2026-03-31T15:17:06.000Z |
| msrc_cve-2025-68223 | drm/radeon: delete radeon_fence_process in is_signaled, no deadlock | 2025-12-02T00:00:00.000Z | 2026-03-31T15:16:57.000Z |
| msrc_cve-2023-52569 | btrfs: remove BUG() after failure to insert delayed dir index item | 2024-03-02T08:00:00.000Z | 2026-03-31T15:16:52.000Z |
| msrc_cve-2024-46806 | drm/amdgpu: Fix the warning division or modulo by zero | 2024-09-01T07:00:00.000Z | 2026-03-31T15:16:51.000Z |
| msrc_cve-2025-40251 | devlink: rate: Unset parent pointer in devl_rate_nodes_destroy | 2025-12-02T00:00:00.000Z | 2026-03-31T15:16:43.000Z |
| msrc_cve-2024-54683 | netfilter: IDLETIMER: Fix for possible ABBA deadlock | 2025-01-02T00:00:00.000Z | 2026-03-31T15:16:39.000Z |
| msrc_cve-2024-46835 | drm/amdgpu: Fix smatch static checker warning | 2024-09-01T07:00:00.000Z | 2026-03-31T15:16:36.000Z |
| msrc_cve-2025-40039 | ksmbd: Fix race condition in RPC handle list access | 2025-10-02T00:00:00.000Z | 2026-03-31T15:16:27.000Z |
| msrc_cve-2023-52532 | net: mana: Fix TX CQE error handling | 2024-03-02T08:00:00.000Z | 2026-03-31T15:16:23.000Z |
| msrc_cve-2024-46857 | net/mlx5: Fix bridge mode operations when there are no VFs | 2024-09-01T07:00:00.000Z | 2026-03-31T15:16:21.000Z |
| msrc_cve-2025-40005 | spi: cadence-quadspi: Implement refcount to handle unbind during busy | 2025-10-02T00:00:00.000Z | 2026-03-31T15:16:12.000Z |
| msrc_cve-2026-23000 | net/mlx5e: Fix crash on profile change rollback failure | 2026-01-02T00:00:00.000Z | 2026-03-31T15:15:57.000Z |
| msrc_cve-2024-49934 | fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name | 2024-10-01T07:00:00.000Z | 2026-03-31T15:15:54.000Z |
| msrc_cve-2024-36911 | hv_netvsc: Don't free decrypted memory | 2024-05-02T07:00:00.000Z | 2026-03-31T15:15:42.000Z |
| msrc_cve-2024-49926 | rcu-tasks: Fix access non-existent percpu rtpcp variable in rcu_tasks_need_gpcb() | 2024-10-01T07:00:00.000Z | 2026-03-31T15:15:39.000Z |
| msrc_cve-2024-26830 | i40e: Do not allow untrusted VF to remove administratively set MAC | 2024-04-02T07:00:00.000Z | 2026-03-31T15:15:26.000Z |
| msrc_cve-2024-36909 | Drivers: hv: vmbus: Don't free ring buffers that couldn't be re-encrypted | 2024-05-02T07:00:00.000Z | 2026-03-31T15:15:25.000Z |
| msrc_cve-2023-53543 | vdpa: Add max vqp attr to vdpa_nl_policy for nlattr length check | 2025-10-02T00:00:00.000Z | 2026-03-31T15:15:22.000Z |
| msrc_cve-2024-46728 | drm/amd/display: Check index for aux_rd_interval before using | 2024-09-01T07:00:00.000Z | 2026-03-31T15:15:18.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15669-1 | grafana-11.6.7-1.1 on GA media | 2025-10-27T00:00:00Z | 2025-10-27T00:00:00Z |
| opensuse-su-2025:15668-1 | libunbound8-1.24.1-1.1 on GA media | 2025-10-24T00:00:00Z | 2025-10-24T00:00:00Z |
| opensuse-su-2025:15667-1 | netty-4.1.128-1.1 on GA media | 2025-10-24T00:00:00Z | 2025-10-24T00:00:00Z |
| opensuse-su-2025:15666-1 | govulncheck-vulndb-0.0.20251023T162509-1.1 on GA media | 2025-10-24T00:00:00Z | 2025-10-24T00:00:00Z |
| opensuse-su-2025:15665-1 | chromedriver-141.0.7390.122-1.1 on GA media | 2025-10-24T00:00:00Z | 2025-10-24T00:00:00Z |
| opensuse-su-2025:15664-1 | python311-pypdf-6.1.3-1.1 on GA media | 2025-10-23T00:00:00Z | 2025-10-23T00:00:00Z |
| opensuse-su-2025:15663-1 | openbao-2.4.3-1.1 on GA media | 2025-10-23T00:00:00Z | 2025-10-23T00:00:00Z |
| opensuse-su-2025:15662-1 | micropython-1.26.0-2.1 on GA media | 2025-10-23T00:00:00Z | 2025-10-23T00:00:00Z |
| opensuse-su-2025:15661-1 | java-17-openjdk-17.0.17.0-1.1 on GA media | 2025-10-23T00:00:00Z | 2025-10-23T00:00:00Z |
| opensuse-su-2025:15660-1 | java-11-openjdk-11.0.29.0-1.1 on GA media | 2025-10-23T00:00:00Z | 2025-10-23T00:00:00Z |
| opensuse-su-2025:15659-1 | bind-9.20.15-1.1 on GA media | 2025-10-23T00:00:00Z | 2025-10-23T00:00:00Z |
| opensuse-su-2025:15658-1 | python311-uv-0.9.5-1.1 on GA media | 2025-10-22T00:00:00Z | 2025-10-22T00:00:00Z |
| opensuse-su-2025:15657-1 | bleachbit-5.0.0-1.1 on GA media | 2025-10-22T00:00:00Z | 2025-10-22T00:00:00Z |
| opensuse-su-2025:15656-1 | sccache-0.12.0~1-1.1 on GA media | 2025-10-21T00:00:00Z | 2025-10-21T00:00:00Z |
| opensuse-su-2025:15655-1 | istioctl-1.27.3-1.1 on GA media | 2025-10-21T00:00:00Z | 2025-10-21T00:00:00Z |
| opensuse-su-2025:15654-1 | git-bug-0.10.1-2.1 on GA media | 2025-10-21T00:00:00Z | 2025-10-21T00:00:00Z |
| opensuse-su-2025:15653-1 | fetchmail-6.5.6-1.1 on GA media | 2025-10-21T00:00:00Z | 2025-10-21T00:00:00Z |
| opensuse-su-2025:15652-1 | cargo-audit-advisory-db-20251021-1.1 on GA media | 2025-10-21T00:00:00Z | 2025-10-21T00:00:00Z |
| opensuse-su-2025:15651-1 | binutils-2.45-1.2 on GA media | 2025-10-21T00:00:00Z | 2025-10-21T00:00:00Z |
| opensuse-su-2025:15650-1 | ImageMagick-7.1.2.7-1.1 on GA media | 2025-10-21T00:00:00Z | 2025-10-21T00:00:00Z |
| opensuse-su-2025:15649-1 | ctdb-4.22.5+git.431.dc5a539f124-1.1 on GA media | 2025-10-18T00:00:00Z | 2025-10-18T00:00:00Z |
| opensuse-su-2025:15648-1 | libpoppler-cpp2-25.09.1-2.1 on GA media | 2025-10-18T00:00:00Z | 2025-10-18T00:00:00Z |
| opensuse-su-2025:15647-1 | ollama-0.12.6-1.1 on GA media | 2025-10-18T00:00:00Z | 2025-10-18T00:00:00Z |
| opensuse-su-2025:15646-1 | MozillaThunderbird-140.4.0-1.1 on GA media | 2025-10-18T00:00:00Z | 2025-10-18T00:00:00Z |
| opensuse-su-2025:15645-1 | MozillaFirefox-144.0-1.1 on GA media | 2025-10-18T00:00:00Z | 2025-10-18T00:00:00Z |
| opensuse-su-2025:15644-1 | icinga2-2.15.1-1.1 on GA media | 2025-10-17T00:00:00Z | 2025-10-17T00:00:00Z |
| opensuse-su-2025:15643-1 | git-lfs-3.7.1-1.1 on GA media | 2025-10-17T00:00:00Z | 2025-10-17T00:00:00Z |
| opensuse-su-2025:15642-1 | ruby3.4-rubygem-rack-2.2-2.2.20-1.1 on GA media | 2025-10-16T00:00:00Z | 2025-10-16T00:00:00Z |
| opensuse-su-2025:15641-1 | libexslt0-1.1.43-4.1 on GA media | 2025-10-16T00:00:00Z | 2025-10-16T00:00:00Z |
| opensuse-su-2025:15640-1 | ffmpeg-4-4.4.6-9.1 on GA media | 2025-10-16T00:00:00Z | 2025-10-16T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:6276 | Red Hat Security Advisory: OpenShift Container Platform 4.12.42 bug fix and security update | 2023-11-08T10:40:48+00:00 | 2026-05-07T14:37:43+00:00 |
| rhsa-2023:6275 | Red Hat Security Advisory: OpenShift Container Platform 4.12.42 security and extras update | 2023-11-08T10:25:29+00:00 | 2026-05-07T14:37:43+00:00 |
| rhsa-2023:6272 | Red Hat Security Advisory: OpenShift Container Platform 4.11.53 bug fix and security update | 2023-11-08T10:41:09+00:00 | 2026-05-07T14:37:43+00:00 |
| rhsa-2023:6271 | Red Hat Security Advisory: OpenShift Container Platform 4.11.53 security and extras update | 2023-11-08T09:43:47+00:00 | 2026-05-07T14:37:42+00:00 |
| rhsa-2023:6269 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.12.1 | 2023-11-15T03:12:52+00:00 | 2026-05-07T14:37:42+00:00 |
| rhsa-2023:6257 | Red Hat Security Advisory: OpenShift Container Platform 4.13.21 bug fix and security update | 2023-11-08T08:43:21+00:00 | 2026-05-07T14:37:42+00:00 |
| rhsa-2023:6256 | Red Hat Security Advisory: OpenShift Container Platform 4.13.21 security and extras update | 2023-11-08T08:40:09+00:00 | 2026-05-07T14:37:41+00:00 |
| rhsa-2023:6251 | Red Hat Security Advisory: OpenShift Virtualization 4.11.7 Images security and bug fix update | 2023-11-01T16:14:42+00:00 | 2026-05-07T14:37:40+00:00 |
| rhsa-2023:6248 | Red Hat Security Advisory: OpenShift Virtualization 4.12.8 Images security update | 2023-11-01T14:42:20+00:00 | 2026-05-07T14:37:40+00:00 |
| rhsa-2023:6243 | Red Hat Security Advisory: openshift-gitops-kam security update | 2023-11-01T14:08:03+00:00 | 2026-05-07T14:37:40+00:00 |
| rhsa-2023:6240 | Red Hat Security Advisory: OpenShift Container Platform 4.13 low-latency extras security update | 2023-11-01T13:41:55+00:00 | 2026-05-07T14:37:39+00:00 |
| rhsa-2023:6235 | Red Hat Security Advisory: OpenShift Virtualization 4.13.5 Images security update | 2023-11-01T12:04:35+00:00 | 2026-05-07T14:37:39+00:00 |
| rhsa-2023:6233 | Red Hat Security Advisory: Red Hat OpenShift Enterprise security update | 2023-11-01T11:34:35+00:00 | 2026-05-07T14:37:39+00:00 |
| rhsa-2023:6220 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.10.1 security update | 2023-10-31T18:22:09+00:00 | 2026-05-07T14:37:37+00:00 |
| rhsa-2023:6217 | Red Hat Security Advisory: Red Hat OpenShift Enterprise security update | 2023-10-31T14:40:40+00:00 | 2026-05-07T14:37:37+00:00 |
| rhsa-2023:6202 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.8 security and bug fix updates | 2023-10-30T20:13:48+00:00 | 2026-05-07T14:37:36+00:00 |
| rhsa-2023:6200 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1.9 security updates and bug fixes | 2023-10-30T18:15:21+00:00 | 2026-05-07T14:37:35+00:00 |
| rhsa-2023:6179 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.13 OpenShift Jenkins security update | 2023-10-30T13:03:06+00:00 | 2026-05-07T14:37:35+00:00 |
| rhsa-2023:6172 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.12 Openshift Jenkins security update | 2023-10-30T11:24:00+00:00 | 2026-05-07T14:37:35+00:00 |
| rhsa-2023:6165 | Red Hat Security Advisory: skupper-cli and skupper-router security update | 2023-10-30T08:22:15+00:00 | 2026-05-07T14:37:34+00:00 |
| rhsa-2023:6171 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.11 Openshift Jenkins security update | 2023-10-30T11:10:10+00:00 | 2026-05-07T14:37:33+00:00 |
| rhsa-2023:6126 | Red Hat Security Advisory: OpenShift Container Platform 4.12.41 bug fix and security update | 2023-11-01T11:07:20+00:00 | 2026-05-07T14:37:33+00:00 |
| rhsa-2023:6161 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.14 security and bug fix update | 2023-10-30T02:16:18+00:00 | 2026-05-07T14:37:32+00:00 |
| rhsa-2023:6156 | Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 8.1.0 security update | 2023-10-30T00:25:10+00:00 | 2026-05-07T14:37:31+00:00 |
| rhsa-2023:6154 | Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.2.0 | 2023-11-01T00:30:41+00:00 | 2026-05-07T14:37:31+00:00 |
| rhsa-2023:6143 | Red Hat Security Advisory: OpenShift Container Platform 4.14.0 CNF vRAN extras security update | 2023-10-26T16:29:51+00:00 | 2026-05-07T14:37:29+00:00 |
| rhsa-2023:6125 | Red Hat Security Advisory: OpenShift Container Platform 4.12.41 security and extras update | 2023-11-01T10:27:35+00:00 | 2026-05-07T14:37:29+00:00 |
| rhsa-2023:6130 | Red Hat Security Advisory: OpenShift Container Platform 4.13.19 bug fix and security update | 2023-10-30T13:49:24+00:00 | 2026-05-07T14:37:28+00:00 |
| rhsa-2023:6129 | Red Hat Security Advisory: OpenShift Container Platform 4.13.19 security and extras update | 2023-10-30T12:59:18+00:00 | 2026-05-07T14:37:28+00:00 |
| rhsa-2023:6118 | Red Hat Security Advisory: OpenShift API for Data Protection security update | 2023-10-25T14:23:36+00:00 | 2026-05-07T14:37:28+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20604-1 | Security update for assertj-core | 2026-03-02T16:00:39Z | 2026-03-02T16:00:39Z |
| suse-su-2026:20603-1 | Security update for rhino | 2026-03-02T16:00:39Z | 2026-03-02T16:00:39Z |
| suse-su-2026:20536-1 | Security update for glibc | 2026-03-02T14:49:34Z | 2026-03-02T14:49:34Z |
| suse-su-2026:20535-1 | Security update for cups | 2026-03-02T14:17:19Z | 2026-03-02T14:17:19Z |
| suse-su-2026:20534-1 | Security update for rust-keylime | 2026-03-02T14:16:07Z | 2026-03-02T14:16:07Z |
| suse-su-2026:20529-1 | Security update for libsoup | 2026-03-02T13:19:17Z | 2026-03-02T13:19:17Z |
| suse-su-2026:20528-1 | Security update for cups | 2026-03-02T13:19:17Z | 2026-03-02T13:19:17Z |
| suse-su-2026:0748-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-03-02T12:04:07Z | 2026-03-02T12:04:07Z |
| suse-su-2026:20600-1 | Security update for cpp-httplib | 2026-03-02T10:16:12Z | 2026-03-02T10:16:12Z |
| suse-su-2026:20558-1 | Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-03-02T10:01:23Z | 2026-03-02T10:01:23Z |
| suse-su-2026:0745-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6) | 2026-03-02T09:34:17Z | 2026-03-02T09:34:17Z |
| suse-su-2026:0741-1 | Security update for shim | 2026-03-02T08:11:15Z | 2026-03-02T08:11:15Z |
| suse-su-2026:0740-1 | Security update for mozilla-nss | 2026-03-02T08:10:37Z | 2026-03-02T08:10:37Z |
| suse-su-2026:0736-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 2026-03-02T07:04:29Z | 2026-03-02T07:04:29Z |
| suse-su-2026:0734-1 | Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5) | 2026-03-01T19:33:48Z | 2026-03-01T19:33:48Z |
| suse-su-2026:0731-1 | Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) | 2026-03-01T16:35:28Z | 2026-03-01T16:35:28Z |
| suse-su-2026:20621-1 | Security update for python-azure-core | 2026-03-01T16:00:33Z | 2026-03-01T16:00:33Z |
| suse-su-2026:20617-1 | Security update for python-azure-core | 2026-03-01T15:59:58Z | 2026-03-01T15:59:58Z |
| suse-su-2026:0727-1 | Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) | 2026-03-01T12:04:27Z | 2026-03-01T12:04:27Z |
| suse-su-2026:0725-1 | Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5) | 2026-03-01T10:04:27Z | 2026-03-01T10:04:27Z |
| suse-su-2026:0713-1 | Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5) | 2026-03-01T07:33:38Z | 2026-03-01T07:33:38Z |
| suse-su-2026:0711-1 | Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4) | 2026-02-28T17:33:39Z | 2026-02-28T17:33:39Z |
| suse-su-2026:0710-1 | Security update for the Linux Kernel (Live Patch 76 for SUSE Linux Enterprise 12 SP5) | 2026-02-28T15:33:45Z | 2026-02-28T15:33:45Z |
| suse-su-2026:0707-1 | Security update for the Linux Kernel (Live Patch 73 for SUSE Linux Enterprise 12 SP5) | 2026-02-28T13:03:47Z | 2026-02-28T13:03:47Z |
| suse-su-2026:0703-1 | Security update for libsoup | 2026-02-28T10:01:49Z | 2026-02-28T10:01:49Z |
| suse-su-2026:0700-1 | Security update for the Linux Kernel (Live Patch 70 for SUSE Linux Enterprise 12 SP5) | 2026-02-28T08:04:45Z | 2026-02-28T08:04:45Z |
| suse-su-2026:0698-1 | Security update for the Linux Kernel (Live Patch 67 for SUSE Linux Enterprise 12 SP5) | 2026-02-28T05:33:34Z | 2026-02-28T05:33:34Z |
| suse-su-2026:0696-1 | Security update for the Linux Kernel (Live Patch 65 for SUSE Linux Enterprise 12 SP5) | 2026-02-27T19:33:27Z | 2026-02-27T19:33:27Z |
| suse-su-2026:0694-1 | Security update for gpg2 | 2026-02-27T15:14:36Z | 2026-02-27T15:14:36Z |
| suse-su-2026:0693-1 | Security update for python311 | 2026-02-27T15:14:09Z | 2026-02-27T15:14:09Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:7431 | Moderate: php security update | 2025-05-13T00:00:00Z | 2025-05-21T06:35:12Z |
| alsa-2025:7433 | Important: nodejs:22 security update | 2025-05-13T00:00:00Z | 2025-05-21T06:31:59Z |
| alsa-2025:7435 | Important: thunderbird security update | 2025-05-13T00:00:00Z | 2025-05-21T06:27:59Z |
| alsa-2025:7436 | Important: libsoup security update | 2025-05-13T00:00:00Z | 2025-05-21T06:26:09Z |
| alsa-2025:7437 | Moderate: avahi security update | 2025-05-13T00:00:00Z | 2025-05-21T06:23:58Z |
| alsa-2025:7438 | Important: redis security update | 2025-05-13T00:00:00Z | 2025-05-21T06:21:05Z |
| alsa-2025:7440 | Low: vim security update | 2025-05-13T00:00:00Z | 2025-05-21T06:19:10Z |
| alsa-2025:7444 | Moderate: expat security update | 2025-05-13T00:00:00Z | 2025-05-21T06:16:53Z |
| alsa-2025:7598 | Important: .NET 8.0 security update | 2025-05-14T00:00:00Z | 2025-05-21T06:14:37Z |
| alsa-2025:7387 | Important: webkit2gtk3 security update | 2025-05-13T00:00:00Z | 2025-05-21T06:12:52Z |
| alsa-2025:7389 | Moderate: buildah security update | 2025-05-13T00:00:00Z | 2025-05-21T06:11:39Z |
| alsa-2025:7397 | Moderate: skopeo security update | 2025-05-13T00:00:00Z | 2025-05-21T06:10:36Z |
| alsa-2025:7402 | Moderate: nginx security update | 2025-05-13T00:00:00Z | 2025-05-21T06:08:36Z |
| alsa-2025:7404 | Important: grafana security update | 2025-05-13T00:00:00Z | 2025-05-21T06:04:46Z |
| alsa-2025:7894 | Important: grafana security update | 2025-05-19T00:00:00Z | 2025-05-19T13:28:20Z |
| alsa-2025:7895 | Important: compat-openssl10 security update | 2025-05-19T00:00:00Z | 2025-05-19T13:26:42Z |
| alsa-2025:7967 | Important: osbuild-composer security update | 2025-05-19T00:00:00Z | 2025-05-19T13:24:36Z |
| alsa-2025:7531 | Important: kernel security update | 2025-05-14T00:00:00Z | 2025-05-16T09:56:19Z |
| alsa-2025:7532 | Important: kernel-rt security update | 2025-05-14T00:00:00Z | 2025-05-16T09:54:28Z |
| alsa-2025:7569 | Important: yelp and yelp-xsl security update | 2025-05-14T00:00:00Z | 2025-05-16T09:52:42Z |
| alsa-2025:7571 | Important: .NET 9.0 security update | 2025-05-14T00:00:00Z | 2025-05-16T09:46:42Z |
| alsa-2025:7589 | Important: .NET 8.0 security update | 2025-05-14T00:00:00Z | 2025-05-16T09:41:23Z |
| alsa-2025:7686 | Important: redis:6 security update | 2025-05-15T00:00:00Z | 2025-05-16T09:38:39Z |
| alsa-2025:4797 | Important: thunderbird security update | 2025-05-12T00:00:00Z | 2025-05-13T13:15:47Z |
| alsa-2025:4791 | Moderate: python39:3.9 security update | 2025-05-12T00:00:00Z | 2025-05-13T12:40:24Z |
| alsa-2025:4669 | Important: osbuild-composer security update | 2025-05-07T00:00:00Z | 2025-05-12T11:19:59Z |
| alsa-2025:4460 | Important: thunderbird security update | 2025-05-05T00:00:00Z | 2025-05-12T11:09:54Z |
| alsa-2025:4443 | Important: firefox security update | 2025-05-05T00:00:00Z | 2025-05-12T11:08:02Z |
| alsa-2025:4787 | Moderate: emacs security update | 2025-05-12T00:00:00Z | 2025-05-12T08:20:30Z |
| alsa-2025:3852 | Moderate: java-17-openjdk security update | 2025-04-16T00:00:00Z | 2025-05-08T18:59:49Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-385 | Bad-cast to Assimp::BaseImporter from invalid vptr | 2023-05-09T14:00:46.630999Z | 2023-05-09T14:00:46.631303Z |
| osv-2023-384 | Heap-use-after-free in mrb_str_hash_m | 2023-05-09T14:00:31.526197Z | 2023-05-09T14:00:31.526487Z |
| osv-2023-380 | UNKNOWN WRITE in bool OT::Layout::Common::Coverage::serialize<hb_map_iter_t<hb_map_iter_t<hb_filt | 2023-05-07T14:02:23.816056Z | 2023-05-07T14:02:23.816302Z |
| osv-2023-379 | Heap-buffer-overflow in void sort_r_simple<> | 2023-05-07T14:02:21.124794Z | 2023-05-07T14:02:21.125050Z |
| osv-2023-377 | UNKNOWN WRITE in bool OT::Layout::Common::CoverageFormat2_4<OT::Layout::MediumTypes>::serialize<h | 2023-05-07T14:00:31.978521Z | 2023-05-07T14:00:31.978773Z |
| osv-2023-376 | UNKNOWN WRITE in OT::Layout::GPOS_impl::CursivePosFormat1::subset | 2023-05-07T14:00:21.523030Z | 2023-05-07T14:00:21.523307Z |
| osv-2023-372 | UNKNOWN WRITE in hb_ot_layout_substitute_start | 2023-05-06T14:02:02.806574Z | 2023-05-06T14:02:02.806822Z |
| osv-2021-594 | Global-buffer-overflow in read_coding_unit | 2021-04-03T00:00:33.651641Z | 2023-05-05T14:02:59.779815Z |
| osv-2023-364 | Heap-double-free in HashMgr::~HashMgr | 2023-05-03T14:00:43.946257Z | 2023-05-04T14:11:43.526808Z |
| osv-2023-104 | Heap-buffer-overflow in H5FS__sect_link | 2023-02-24T13:02:14.199033Z | 2023-05-03T14:30:28.198633Z |
| osv-2023-353 | Stack-buffer-overflow in pdfi_read_cff_dict | 2023-04-29T14:02:16.888498Z | 2023-05-03T14:21:57.175421Z |
| osv-2023-361 | Heap-buffer-overflow in tok_get_normal_mode | 2023-05-02T14:00:14.863724Z | 2023-05-02T14:00:14.864013Z |
| osv-2023-357 | Heap-buffer-overflow in flac__analyze_frame | 2023-05-01T14:01:05.606039Z | 2023-05-01T14:01:05.606339Z |
| osv-2023-142 | Heap-buffer-overflow in pdf14_preserve_backdrop | 2023-03-03T13:02:19.918280Z | 2023-04-30T14:24:04.617671Z |
| osv-2023-350 | UNKNOWN READ in cli_html_normalise | 2023-04-29T14:01:02.900884Z | 2023-04-30T14:20:30.195844Z |
| osv-2022-802 | Heap-use-after-free in UA_Server_networkCallback | 2022-08-29T00:02:04.585826Z | 2023-04-29T14:17:55.891692Z |
| osv-2023-79 | Heap-buffer-overflow in H5O__fsinfo_decode | 2023-02-18T13:01:01.580923Z | 2023-04-27T14:30:07.165171Z |
| osv-2023-316 | Segv on unknown address in dwg_ref_get_object | 2023-04-15T14:02:19.562348Z | 2023-04-26T14:15:55.803644Z |
| osv-2023-344 | Heap-buffer-overflow in tok_get_normal_mode | 2023-04-25T14:01:18.715805Z | 2023-04-25T14:01:18.716085Z |
| osv-2023-56 | Heap-buffer-overflow in git_oid_raw_cmp | 2023-02-07T13:00:10.989656Z | 2023-04-24T14:22:48.200282Z |
| osv-2023-342 | Heap-use-after-free in ih264_inter_pred_luma_vert_ssse3 | 2023-04-24T14:02:30.818849Z | 2023-04-24T14:02:30.819120Z |
| osv-2023-321 | Heap-use-after-free in ucl_hash_func | 2023-04-17T14:02:19.313369Z | 2023-04-22T14:12:41.755116Z |
| osv-2022-1261 | UNKNOWN WRITE in void std::__1::allocator_traits<std::__1::allocator<wabt::interp::HandlerDesc> > | 2022-12-13T13:01:10.970571Z | 2023-04-22T14:12:13.057968Z |
| osv-2023-337 | Heap-buffer-overflow in PyBytes_FromStringAndSize | 2023-04-22T14:02:16.429774Z | 2023-04-22T14:02:16.430016Z |
| osv-2023-335 | Security exception in org.json.JSONArray.writeTo | 2023-04-22T14:00:41.470858Z | 2023-04-22T14:00:41.471103Z |
| osv-2023-334 | Heap-buffer-overflow in unicode_decode_utf8 | 2023-04-22T14:00:15.547819Z | 2023-04-22T14:00:15.548065Z |
| osv-2023-312 | UNKNOWN READ in udev_rule_parse_value | 2023-04-14T14:02:26.223630Z | 2023-04-22T05:58:14.572688Z |
| osv-2023-310 | UNKNOWN READ in memdup_suffix0 | 2023-04-13T14:02:21.435674Z | 2023-04-22T05:58:14.572688Z |
| osv-2023-309 | UNKNOWN READ in fmemopen_unlocked | 2023-04-13T14:02:20.584809Z | 2023-04-22T05:58:14.572688Z |
| osv-2023-308 | UNKNOWN READ in memdup | 2023-04-13T14:02:13.551148Z | 2023-04-22T05:58:14.572688Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-golang-2025-61727 | Improper application of excluded DNS name constraints when verifying wildcard names in crypto/x509 | 2025-12-06T11:41:09.464Z | 2025-12-06T12:06:23.267Z |
| bit-cilium-2025-64715 | Cilium with misconfigured toGroups in policies can lead to unrestricted egress traffic | 2025-12-02T11:35:57.032Z | 2025-12-06T12:06:23.267Z |
| bit-python-2025-8291 | ZIP64 End of Central Directory (EOCD) Locator record offset not checked | 2025-10-14T09:30:19.669Z | 2025-12-04T12:07:39.656Z |
| bit-python-2025-1795 | Mishandling of comma during folding and unicode-encoding of email headers | 2025-04-14T11:35:31.045Z | 2025-12-04T12:07:39.656Z |
| bit-libpython-2025-8291 | ZIP64 End of Central Directory (EOCD) Locator record offset not checked | 2025-10-14T09:25:48.465Z | 2025-12-04T12:07:39.656Z |
| bit-libpython-2025-1795 | Mishandling of comma during folding and unicode-encoding of email headers | 2025-08-11T13:53:05.339Z | 2025-12-04T12:07:39.656Z |
| bit-golang-2025-61729 | Excessive resource consumption when printing error string for host certificate validation in crypto/x509 | 2025-12-04T11:41:52.637Z | 2025-12-04T12:07:39.656Z |
| bit-activemq-2025-27533 | Apache ActiveMQ: Unchecked buffer length can cause excessive memory allocation | 2025-12-03T14:35:40.173Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2023-46604 | Apache ActiveMQ, Apache ActiveMQ Legacy OpenWire Module: Unbounded deserialization causes ActiveMQ to be vulnerable to a remote code execution (RCE) attack | 2025-12-03T14:35:38.733Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2022-41678 | Apache ActiveMQ: Insufficient API restrictions on Jolokia allow authenticated users to perform RCE | 2025-12-03T14:35:37.010Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-26117 | ActiveMQ: LDAP-Authentication does not verify passwords on servers with anonymous bind | 2025-12-03T14:35:35.296Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21351 | XStream is vulnerable to an Arbitrary Code Execution attack | 2025-12-03T14:35:33.786Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21350 | XStream is vulnerable to an Arbitrary Code Execution attack | 2025-12-03T14:35:32.295Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21349 | A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host | 2025-12-03T14:35:30.789Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21348 | XStream is vulnerable to an attack using Regular Expression for a Denial of Service (ReDos) | 2025-12-03T14:35:29.299Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21347 | XStream is vulnerable to an Arbitrary Code Execution attack | 2025-12-03T14:35:27.664Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21346 | XStream is vulnerable to an Arbitrary Code Execution attack | 2025-12-03T14:35:26.027Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21345 | XStream is vulnerable to a Remote Command Execution attack | 2025-12-03T14:35:24.382Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21344 | XStream is vulnerable to an Arbitrary Code Execution attack | 2025-12-03T14:35:22.678Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21343 | XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling as long as the executing process has sufficient rights | 2025-12-03T14:35:21.073Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21342 | A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host | 2025-12-03T14:35:19.481Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21341 | XStream can cause a Denial of Service | 2025-12-03T14:35:17.881Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2020-26217 | Remote Code Execution in XStream | 2025-12-03T14:35:16.352Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2020-1941 | 2025-12-03T14:35:14.779Z | 2025-12-03T15:08:24.036Z | |
| bit-activemq-2020-13947 | 2025-12-03T14:35:13.393Z | 2025-12-03T15:08:24.036Z | |
| bit-activemq-2020-13920 | 2025-12-03T14:35:12.171Z | 2025-12-03T15:08:24.036Z | |
| bit-activemq-2020-11998 | 2025-12-03T14:35:10.504Z | 2025-12-03T15:08:24.036Z | |
| bit-gitlab-2025-9825 | Missing Authorization in GitLab | 2025-11-25T18:25:02.547Z | 2025-12-03T12:08:06.927Z |
| bit-flux-2022-39272 | Flux2 vulnerable to Denial of Service due to Improper use of metav1.Duration | 2025-12-02T17:37:01.043Z | 2025-12-02T18:06:28.296Z |
| bit-flux-2022-36049 | Flux2 Helm Controller denial of service | 2025-12-02T17:36:59.799Z | 2025-12-02T18:06:28.296Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0893 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| certfr-2025-avi-0892 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| certfr-2025-avi-0891 | Vulnérabilité dans MongoDB Connector for BI pour Windows | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| certfr-2025-avi-0890 | Multiples vulnérabilités dans les produits Moxa | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| certfr-2025-avi-0889 | Vulnérabilité dans Squid | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| CERTFR-2025-AVI-0896 | Multiples vulnérabilités dans les produits IBM | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| CERTFR-2025-AVI-0895 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| CERTFR-2025-AVI-0894 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| CERTFR-2025-AVI-0893 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| CERTFR-2025-AVI-0892 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| CERTFR-2025-AVI-0891 | Vulnérabilité dans MongoDB Connector for BI pour Windows | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| CERTFR-2025-AVI-0890 | Multiples vulnérabilités dans les produits Moxa | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| CERTFR-2025-AVI-0889 | Vulnérabilité dans Squid | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| certfr-2025-avi-0887 | Vulnérabilité dans Synacor Zimbra Collaboration | 2025-10-16T00:00:00.000000 | 2025-10-16T00:00:00.000000 |
| certfr-2025-avi-0886 | Multiples vulnérabilités dans les produits F5 | 2025-10-16T00:00:00.000000 | 2025-10-16T00:00:00.000000 |
| certfr-2025-avi-0885 | Multiples vulnérabilités dans Samba | 2025-10-16T00:00:00.000000 | 2025-10-16T00:00:00.000000 |
| certfr-2025-avi-0884 | Multiples vulnérabilités dans les produits Cisco | 2025-10-16T00:00:00.000000 | 2025-10-16T00:00:00.000000 |
| certfr-2025-avi-0883 | Multiples vulnérabilités dans les produits Spring | 2025-10-16T00:00:00.000000 | 2025-10-16T00:00:00.000000 |
| certfr-2025-avi-0801 | Multiples vulnérabilités dans les produits Mattermost | 2025-09-17T00:00:00.000000 | 2025-10-16T00:00:00.000000 |
| CERTFR-2025-AVI-0887 | Vulnérabilité dans Synacor Zimbra Collaboration | 2025-10-16T00:00:00.000000 | 2025-10-16T00:00:00.000000 |
| CERTFR-2025-AVI-0886 | Multiples vulnérabilités dans les produits F5 | 2025-10-16T00:00:00.000000 | 2025-10-16T00:00:00.000000 |
| CERTFR-2025-AVI-0885 | Multiples vulnérabilités dans Samba | 2025-10-16T00:00:00.000000 | 2025-10-16T00:00:00.000000 |
| CERTFR-2025-AVI-0884 | Multiples vulnérabilités dans les produits Cisco | 2025-10-16T00:00:00.000000 | 2025-10-16T00:00:00.000000 |
| CERTFR-2025-AVI-0883 | Multiples vulnérabilités dans les produits Spring | 2025-10-16T00:00:00.000000 | 2025-10-16T00:00:00.000000 |
| CERTFR-2025-AVI-0801 | Multiples vulnérabilités dans les produits Mattermost | 2025-09-17T00:00:00.000000 | 2025-10-16T00:00:00.000000 |
| certfr-2025-avi-0882 | Multiples vulnérabilités dans les produits Microsoft | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| certfr-2025-avi-0881 | Multiples vulnérabilités dans Microsoft Azure | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| certfr-2025-avi-0880 | Multiples vulnérabilités dans Microsoft .Net | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| certfr-2025-avi-0879 | Multiples vulnérabilités dans Microsoft Windows | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| certfr-2025-avi-0878 | Multiples vulnérabilités dans Microsoft Office | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2019-008917 | Multiple Vulnerabilities in Hitachi Command Suite and Hitachi Infrastructure Analytics Advisor | 2019-09-09T15:58+09:00 | 2019-09-09T15:58+09:00 |
| jvndb-2019-000005 | The installers of UNLHA32.DLL, UNARJ32.DLL and LHMelting may insecurely load Dynamic Link Libraries | 2019-01-31T15:35+09:00 | 2019-08-28T12:08+09:00 |
| jvndb-2019-000007 | OpenAM (Open Source Edition) vulnerable to open redirect | 2019-02-06T15:45+09:00 | 2019-08-28T11:00+09:00 |
| jvndb-2018-000132 | Multiple vulnerabilities in Toshiba Lighting & Technology Corporation Home gateway | 2018-12-19T15:20+09:00 | 2019-08-28T10:45+09:00 |
| jvndb-2018-000133 | cordova-plugin-ionic-webview vulnerable to path traversal | 2018-12-21T14:17+09:00 | 2019-08-28T10:04+09:00 |
| jvndb-2018-000125 | The installer of MARKET SPEED may insecurely load Dynamic Link Libraries | 2018-11-28T17:27+09:00 | 2019-08-28T10:01+09:00 |
| jvndb-2019-000001 | WordPress plugin "spam-byebye" vulnerable to cross-site scripting | 2019-01-10T15:45+09:00 | 2019-08-28T09:54+09:00 |
| jvndb-2018-000092 | Multiple vulnerabilities in INplc | 2018-09-07T16:49+09:00 | 2019-08-28T09:51+09:00 |
| jvndb-2018-000127 | EC-CUBE vulnerable to open redirect | 2018-11-28T17:24+09:00 | 2019-08-28T09:42+09:00 |
| jvndb-2018-000118 | The installer of Windows10 Fall Creators Update Modify module for Security Measures tool may insecurely load Dynamic Link Libraries | 2018-11-09T16:13+09:00 | 2019-08-27T18:03+09:00 |
| jvndb-2018-000093 | Multiple script injection vulnerabilities in multiple Yamaha network devices | 2018-08-29T18:01+09:00 | 2019-08-27T17:53+09:00 |
| jvndb-2018-000122 | Multiple vulnerabilities in Panasonic BN-SDWBP3 | 2019-06-28T18:28+09:00 | 2019-08-27T17:46+09:00 |
| jvndb-2018-000134 | PgpoolAdmin fails to restrict access permissions | 2018-12-21T14:10+09:00 | 2019-08-27T17:41+09:00 |
| jvndb-2018-000100 | +Message App fails to verify SSL server certificates | 2018-09-27T16:52+09:00 | 2019-08-27T17:22+09:00 |
| jvndb-2018-000124 | Multiple vulnerabilities in RICOH Interactive Whiteboard | 2018-11-27T15:26+09:00 | 2019-08-27T17:01+09:00 |
| jvndb-2018-000076 | Multiple vulnerabilities in Aterm W300P | 2018-07-12T15:04+09:00 | 2019-08-27T16:56+09:00 |
| jvndb-2018-000130 | Cybozu Garoon access restriction bypass vulnerability | 2018-12-10T14:14+09:00 | 2019-08-27T16:54+09:00 |
| jvndb-2018-009387 | Mizuho Bank Mizuho Direct App for Android fails to verify SSL server certificates | 2018-11-19T15:44+09:00 | 2019-08-27T16:48+09:00 |
| jvndb-2018-000136 | Installer of Mapping Tool may insecurely load Dynamic Link Libraries | 2018-12-25T16:18+09:00 | 2019-08-27T16:36+09:00 |
| jvndb-2018-000115 | WordPress plugin "Event Calendar WD" vulnerable to cross-site scripting | 2018-11-02T14:56+09:00 | 2019-08-27T15:15+09:00 |
| jvndb-2018-000135 | WordPress plugin "Google XML Sitemaps" vulnerable to cross-site scripting | 2018-12-25T16:19+09:00 | 2019-08-27T15:12+09:00 |
| jvndb-2018-000137 | GROWI vulnerable to cross-site scripting | 2018-12-26T16:36+09:00 | 2019-08-27T15:07+09:00 |
| jvndb-2018-000077 | Multiple vulnerabilities in Aterm HC100RC | 2018-07-12T15:04+09:00 | 2019-08-27T13:52+09:00 |
| jvndb-2018-000075 | Multiple OS command injection vulnerabilities in Aterm WG1200HP | 2018-07-12T15:04+09:00 | 2019-08-27T13:44+09:00 |
| jvndb-2018-000119 | Cybozu Mailwise vulnerable to directory traversal | 2018-11-14T15:34+09:00 | 2019-08-27T13:37+09:00 |
| jvndb-2018-000120 | Multiple directory traversal vulnerabilities in Cybozu Office | 2018-11-14T15:38+09:00 | 2019-08-27T12:28+09:00 |
| jvndb-2018-000121 | Cybozu Dezie vulnerable to directory traversal | 2018-11-14T15:42+09:00 | 2019-08-27T12:25+09:00 |
| jvndb-2018-000126 | Multiple vulnerabilities in Cybozu Remote Service | 2018-12-10T14:26+09:00 | 2019-08-27T11:48+09:00 |
| jvndb-2018-000129 | Multiple vulnerabilities in i-FILTER | 2018-12-07T14:30+09:00 | 2019-08-27T11:45+09:00 |
| jvndb-2018-000117 | Multiple vulnerabilities in WordPress plugin "LearnPress" | 2018-11-09T16:13+09:00 | 2019-08-27T11:35+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-11768 | Adobe Substance 3D Modeler空指针取消引用漏洞(CNVD-2026-11768) | 2026-01-19 | 2026-02-26 |
| cnvd-2026-11767 | Adobe InDesign越界读取漏洞(CNVD-2026-11767) | 2026-01-19 | 2026-02-26 |
| cnvd-2026-11766 | Wondershare Driver Install Service代码问题漏洞 | 2026-02-05 | 2026-02-26 |
| cnvd-2026-11765 | Huawei HarmonyOS相机模块越界写入漏洞 | 2026-02-11 | 2026-02-26 |
| cnvd-2026-11764 | Huawei HarmonyOS图像模块缓冲区溢出漏洞 | 2026-02-11 | 2026-02-26 |
| cnvd-2026-11763 | Huawei HarmonyOS媒体子系统越界读取漏洞 | 2026-02-11 | 2026-02-26 |
| cnvd-2026-11762 | Huawei HarmonyOS相机模块类型混淆漏洞 | 2026-02-11 | 2026-02-26 |
| cnvd-2026-11761 | Huawei HarmonyOS HDC模块权限控制漏洞 | 2026-02-11 | 2026-02-26 |
| cnvd-2026-11760 | Huawei HarmonyOS窗口模块身份认证绕过漏洞 | 2026-02-11 | 2026-02-26 |
| cnvd-2026-11759 | Google Android越界读取漏洞(CNVD-2026-11759) | 2024-03-01 | 2026-02-25 |
| cnvd-2026-11758 | Google Android越界读取漏洞(CNVD-2026-11758) | 2024-03-01 | 2026-02-25 |
| cnvd-2026-11757 | Google Android权限提升漏洞(CNVD-2026-11757) | 2024-03-01 | 2026-02-25 |
| cnvd-2026-11756 | Google Android存在未明漏洞(CNVD-2026-11756) | 2024-11-15 | 2026-02-25 |
| cnvd-2026-11755 | Google Chrome安全绕过漏洞(CNVD-2026-11755) | 2026-01-30 | 2026-02-25 |
| cnvd-2026-11754 | Google Chrome安全绕过漏洞(CNVD-2026-11754) | 2026-01-30 | 2026-02-25 |
| cnvd-2026-11753 | Google Chrome安全绕过漏洞(CNVD-2026-11753) | 2026-01-30 | 2026-02-25 |
| cnvd-2026-11752 | Google Chrome安全绕过漏洞(CNVD-2026-11752) | 2026-01-30 | 2026-02-25 |
| cnvd-2026-11751 | Google Chrome代码执行漏洞(CNVD-2026-11751) | 2026-01-30 | 2026-02-25 |
| cnvd-2026-11750 | Google Chrome安全绕过漏洞(CNVD-2026-11750) | 2026-01-30 | 2026-02-25 |
| cnvd-2026-11749 | Tenda TX9 goform/SetStaticRouteCfg文件缓冲区溢出漏洞 | 2026-02-11 | 2026-02-25 |
| cnvd-2026-11748 | WeKan存在未明漏洞(CNVD-2026-11748) | 2026-02-11 | 2026-02-25 |
| cnvd-2026-11747 | WeKan存在未明漏洞 | 2026-02-11 | 2026-02-25 |
| cnvd-2026-11746 | Google Android存在未明漏洞(CNVD-2026-11746) | 2024-11-15 | 2026-02-24 |
| cnvd-2026-11745 | Google Android代码注入漏洞(CNVD-2026-11745) | 2024-11-15 | 2026-02-24 |
| cnvd-2026-11744 | Google Android代码注入漏洞 | 2024-11-15 | 2026-02-24 |
| cnvd-2026-11743 | MedDream PACS Premium cecho.php功能服务器端请求伪造漏洞 | 2025-07-30 | 2026-02-24 |
| cnvd-2026-11742 | MedDream PACS Premium安全绕过漏洞 | 2025-07-30 | 2026-02-24 |
| cnvd-2026-11741 | MedDream PACS Premium访问控制错误漏洞 | 2025-07-30 | 2026-02-24 |
| cnvd-2026-11740 | Google Android权限提升漏洞(CNVD-2026-11740) | 2025-09-04 | 2026-02-24 |
| cnvd-2026-11739 | Google Android权限提升漏洞(CNVD-2026-11739) | 2025-09-04 | 2026-02-24 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-11468 | Уязвимость функции ff_aac_search_for_tns компонента libavcodec/aacenc_tns.c мультимедийно… | 22.09.2025 | 10.02.2026 |
| bdu:2025-11250 | Уязвимость методов addElement и addAttribute библиотеки для работы с XML, XPath и XSLT do… | 17.09.2025 | 10.02.2026 |
| bdu:2025-10993 | Уязвимость реализации протокола HTTP/2 сетевого программного средства Netty, позволяющая … | 12.09.2025 | 10.02.2026 |
| bdu:2025-08956 | Уязвимость функции ClassUtils.getClass() библиотеки Apache Commons Lang для языка програм… | 24.07.2025 | 10.02.2026 |
| bdu:2025-08601 | Уязвимость контейнера сервлетов Eclipse Jetty, связанная с некорректной зачисткой или осв… | 17.07.2025 | 10.02.2026 |
| bdu:2025-06783 | Уязвимость сессионного агента диспетчера подключений виртуальных рабочих мест Termidesk, … | 16.06.2025 | 10.02.2026 |
| bdu:2025-06782 | Уязвимость агента виртуального рабочего места диспетчера подключений виртуальных рабочих … | 16.06.2025 | 10.02.2026 |
| bdu:2025-06781 | Уязвимость сервера диспетчера подключений виртуальных рабочих мест Termidesk, связанная с… | 16.06.2025 | 10.02.2026 |
| bdu:2025-06780 | Уязвимость агента виртуального рабочего места диспетчера подключений виртуальных рабочих … | 16.06.2025 | 10.02.2026 |
| bdu:2025-06779 | Уязвимость агента виртуального рабочего места диспетчера подключений виртуальных рабочих … | 16.06.2025 | 10.02.2026 |
| bdu:2025-06778 | Уязвимость агента виртуального рабочего места диспетчера подключений виртуальных рабочих … | 16.06.2025 | 10.02.2026 |
| bdu:2025-06777 | Уязвимость агента виртуального рабочего места диспетчера подключений виртуальных рабочих … | 16.06.2025 | 10.02.2026 |
| bdu:2025-06776 | Уязвимость агента виртуального рабочего места диспетчера подключений виртуальных рабочих … | 16.06.2025 | 10.02.2026 |
| bdu:2025-06775 | Уязвимость сервера диспетчера подключений виртуальных рабочих мест Termidesk, связанная с… | 16.06.2025 | 10.02.2026 |
| bdu:2025-06774 | Уязвимость сервера диспетчера подключений виртуальных рабочих мест Termidesk, связанная с… | 16.06.2025 | 10.02.2026 |
| bdu:2025-06773 | Уязвимость сервера диспетчера подключений виртуальных рабочих мест Termidesk, связанная с… | 16.06.2025 | 10.02.2026 |
| bdu:2025-06772 | Уязвимость сервера диспетчера подключений виртуальных рабочих мест Termidesk, связанная с… | 16.06.2025 | 10.02.2026 |
| bdu:2025-06770 | Уязвимость сервера диспетчера подключений виртуальных рабочих мест Termidesk, связанная с… | 16.06.2025 | 10.02.2026 |
| bdu:2025-03454 | Уязвимость контейнера сервлетов Eclipse Jetty, связанная с неконтролируемым потреблением … | 27.03.2025 | 10.02.2026 |
| bdu:2025-03389 | Уязвимость сетевого программного средства Netty, связанная с неправильной проверкой входн… | 27.03.2025 | 10.02.2026 |
| bdu:2025-03306 | Уязвимость библиотеки Apache Commons IO, связанная с неконтролируемым расходом ресурсов, … | 27.03.2025 | 10.02.2026 |
| bdu:2025-02529 | Уязвимость функции BufferedReader.readLine() сетевого программного средства Netty, позвол… | 11.03.2025 | 10.02.2026 |
| bdu:2025-02149 | Уязвимость библиотеки для кодирования и декодирования аудио и видео файлов libavcodec мул… | 28.02.2025 | 10.02.2026 |
| bdu:2025-02148 | Уязвимость библиотеки утилит libavutil мультимедийной библиотеки FFmpeg, позволяющая нару… | 28.02.2025 | 10.02.2026 |
| bdu:2025-02147 | Уязвимость библиотеки утилит libavutil мультимедийной библиотеки FFmpeg, позволяющая нару… | 28.02.2025 | 10.02.2026 |
| bdu:2024-11495 | Уязвимость пакета cross-spawn программной платформы Node.js, позволяющая нарушителю вызва… | 25.12.2024 | 10.02.2026 |
| bdu:2024-10117 | Уязвимость класса HttpURI контейнера сервлетов Eclipse Jetty, позволяющая нарушителю осущ… | 22.11.2024 | 10.02.2026 |
| bdu:2024-07527 | Уязвимость библиотеки среды выполнения Java Protocol Buffers protobuf-java, связанная с н… | 27.09.2024 | 10.02.2026 |
| bdu:2024-05843 | Уязвимость модуля package_index библиотеки упрощения упаковки проектов setuptools, связан… | 31.07.2024 | 10.02.2026 |
| bdu:2024-01744 | Уязвимость Java-библиотеки анализа, извлечения и управления данными в документах HTML jso… | 05.03.2024 | 10.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201404-0288 | Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Str… | 2024-07-23T19:41:23.375000Z |
| var-200702-0109 | The Bonjour functionality in iChat in Apple Mac OS X 10.3.9 allows remote attackers to ca… | 2024-07-23T19:41:23.897000Z |
| var-201302-0247 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T19:41:17.213000Z |
| var-201804-1149 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T19:40:26.377000Z |
| var-201302-0302 | Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on … | 2024-07-23T19:40:26.237000Z |
| var-200608-0028 | AFP Server in Apple Mac OS X 10.3.9 and 10.4.7 stores reconnect keys in a world-readable … | 2024-07-23T19:40:26.826000Z |
| var-200809-0188 | Integer overflow in Apple QuickTime before 7.5.5 on Windows allows remote attackers to ex… | 2024-07-23T19:40:25.118000Z |
| var-200604-0209 | Unspecified vulnerability in Microsoft Internet Explorer 5.01 through 6 allows remote att… | 2024-07-23T19:40:25.577000Z |
| var-202003-1777 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T19:40:07.001000Z |
| var-201905-0095 | A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execut… | 2024-07-23T19:40:01.950000Z |
| var-200904-0824 | Heap-based buffer overflow in Xpdf 3.02pl2 and earlier, CUPS 1.3.9, and probably other pr… | 2024-07-23T19:39:31.753000Z |
| var-201904-1394 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T19:39:25.754000Z |
| var-200810-0138 | The Hewlett-Packard Graphics Language (HPGL) filter in CUPS before 1.3.9 allows remote at… | 2024-07-23T19:39:25.606000Z |
| var-200503-0010 | Windows Server 2003 and XP SP2, with Windows Firewall turned off, allows remote attackers… | 2024-07-23T19:39:25.692000Z |
| var-202010-1296 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T19:39:24.802000Z |
| var-201003-1114 | The _cupsGetlang function, as used by lppasswd.c in lppasswd in CUPS 1.2.2, 1.3.7, 1.3.9,… | 2024-07-23T19:39:23.837000Z |
| var-200810-0139 | Buffer overflow in ColorSync in Mac OS X 10.4.11 and 10.5.5 allows remote attackers to ca… | 2024-07-23T19:39:23.927000Z |
| var-200712-0599 | Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in M… | 2024-07-23T19:39:21.599000Z |
| var-201006-0308 | The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1… | 2024-07-23T19:39:20.960000Z |
| var-201109-0211 | Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers… | 2024-07-23T19:39:18.314000Z |
| var-201702-0466 | An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari be… | 2024-07-23T19:38:47.804000Z |
| var-201907-1547 | undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps… | 2024-07-23T19:38:13.489000Z |
| var-200904-0808 | Multiple buffer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 an… | 2024-07-23T19:38:13.575000Z |
| var-201509-0438 | Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C L… | 2024-07-23T19:37:44Z |
| var-201507-0348 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b… | 2024-07-23T19:37:42.535000Z |
| var-200705-0688 | The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module i… | 2024-07-23T19:37:40.957000Z |
| var-202012-1279 | curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation … | 2024-07-23T19:37:06.068000Z |
| var-202108-2222 | libcurl keeps previously used connections in a connection pool for subsequenttransfers to… | 2024-07-23T19:37:05.808000Z |
| var-201606-0477 | The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not p… | 2024-07-23T19:37:05.973000Z |
| var-201105-0095 | lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 d… | 2024-07-23T19:37:05.868000Z |