Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-6447 |
4.4 (3.1)
|
Call for Price for WooCommerce <= 4.2.0 - Authenticate… |
tychesoftwares |
Call for Price for WooCommerce |
2026-05-02T05:29:29.556Z | 2026-05-04T17:52:04.371Z |
| CVE-2026-7605 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
JeecgBoot uploadImgByHttpEndpoint CommonController.jav… |
n/a |
JeecgBoot |
2026-05-02T06:15:12.060Z | 2026-05-04T17:51:57.020Z |
| CVE-2026-2052 |
8.8 (3.1)
|
Widget Options <= 4.2.2 - Authenticated (Contributor+)… |
marketingfire |
Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets |
2026-05-02T07:46:40.524Z | 2026-05-04T17:51:51.166Z |
| CVE-2026-5324 |
7.2 (3.1)
|
Brizy – Page Builder <= 2.8.11 - Unauthenticated Store… |
themefusecom |
Brizy – Page Builder |
2026-05-02T08:27:05.238Z | 2026-05-04T17:51:44.700Z |
| CVE-2026-7611 |
6.3 (4.0)
3.7 (3.1)
3.7 (3.0)
|
TRENDnet TEW-821DAP Firmware Update cameo_dev.sh platf… |
TRENDnet |
TEW-821DAP |
2026-05-02T09:30:12.219Z | 2026-05-04T17:51:38.567Z |
| CVE-2026-4790 |
5.4 (3.1)
|
Premium Addons for Elementor <= 4.11.70 - Authenticate… |
leap13 |
Premium Addons for Elementor – Powerful Elementor Templates & Widgets |
2026-05-02T11:16:10.577Z | 2026-05-04T17:51:32.840Z |
| CVE-2026-7631 |
5.3 (4.0)
5.4 (3.1)
5.4 (3.0)
|
code-projects Online Hospital Management System Regist… |
code-projects |
Online Hospital Management System |
2026-05-02T13:30:12.229Z | 2026-05-04T17:51:26.901Z |
| CVE-2026-7645 |
6.9 (4.0)
6.5 (3.1)
6.5 (3.0)
|
ruvnet sublinear-time-solver MCP server.js export_stat… |
ruvnet |
sublinear-time-solver |
2026-05-02T15:15:12.031Z | 2026-05-04T17:51:20.933Z |
| CVE-2026-7672 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
youlaitech youlai-boot Users Endpoint UserController.j… |
youlaitech |
youlai-boot |
2026-05-03T00:00:41.088Z | 2026-05-04T17:51:14.519Z |
| CVE-2026-7678 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
YunaiV yudao-cloud GoViewDataServiceImpl.java getDataB… |
YunaiV |
yudao-cloud |
2026-05-03T04:00:14.024Z | 2026-05-04T17:51:08.829Z |
| CVE-2026-5063 |
7.2 (3.1)
|
NEX-Forms <= 9.1.11 - Unauthenticated Stored Cross-Sit… |
webaways |
NEX-Forms – Ultimate Forms Plugin for WordPress |
2026-05-03T04:25:49.917Z | 2026-05-04T17:51:02.708Z |
| CVE-2026-7684 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Edimax BR-6428nC setWAN buffer overflow |
Edimax |
BR-6428nC |
2026-05-03T06:45:10.650Z | 2026-05-04T17:50:56.333Z |
| CVE-2025-47406 |
6.1 (3.1)
|
Buffer Over-read in DSP Service |
Qualcomm, Inc. |
Snapdragon |
2026-05-04T16:43:12.203Z | 2026-05-04T17:50:51.545Z |
| CVE-2026-7690 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Wavlink WL-WN570HA1 adm.cgi set_sys_adm command injection |
Wavlink |
WL-WN570HA1 |
2026-05-03T09:45:10.873Z | 2026-05-04T17:50:49.495Z |
| CVE-2026-7697 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
AMTT Hotel Broadband Operation System cardhand_submit.… |
AMTT |
Hotel Broadband Operation System |
2026-05-03T13:15:10.392Z | 2026-05-04T17:50:43.559Z |
| CVE-2026-7703 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
AV Stumpfl Pixera Two Media Server Websocket API code … |
AV Stumpfl |
Pixera Two Media Server |
2026-05-03T16:15:11.382Z | 2026-05-04T17:50:37.518Z |
| CVE-2026-7709 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
janeczku Calibre-Web Endpoint kobo_auth.py generate_au… |
janeczku |
Calibre-Web |
2026-05-03T23:00:16.240Z | 2026-05-04T17:50:31.376Z |
| CVE-2025-70069 |
7.5 (3.1)
|
An issue in Assimp v.6.0.2 allows a remote attack… |
n/a |
n/a |
2026-05-04T00:00:00.000Z | 2026-05-04T17:50:25.141Z |
| CVE-2026-7715 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
ravenwits mcp-server-arangodb MCP tools.ts arango_back… |
ravenwits |
mcp-server-arangodb |
2026-05-04T00:30:15.090Z | 2026-05-04T17:50:18.850Z |
| CVE-2026-7721 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Totolink WA300 cstecgi.cgi NTPSyncWithHost command injection |
Totolink |
WA300 |
2026-05-04T02:00:17.423Z | 2026-05-04T17:50:11.917Z |
| CVE-2026-7728 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
ryanjoachim mcp-rtfm MCP update_doc path traversal |
ryanjoachim |
mcp-rtfm |
2026-05-04T03:30:16.625Z | 2026-05-04T17:50:05.370Z |
| CVE-2026-7734 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
osrg GoBGP SRv6 L3 Service prefix_sid.go SRv6L3Service… |
osrg |
GoBGP |
2026-05-04T05:00:16.556Z | 2026-05-04T17:49:57.579Z |
| CVE-2026-7740 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
justdan96 tsMuxer vvc.cpp setFPS denial of service |
justdan96 |
tsMuxer |
2026-05-04T06:30:13.207Z | 2026-05-04T17:49:51.273Z |
| CVE-2026-7746 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
SourceCodester Web-based Pharmacy Product Management S… |
SourceCodester |
Web-based Pharmacy Product Management System |
2026-05-04T08:00:13.659Z | 2026-05-04T17:49:44.281Z |
| CVE-2026-7609 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
TRENDnet TEW-821DAP Firmware Udpate diagnostic tools_d… |
TRENDnet |
TEW-821DAP |
2026-05-02T09:00:18.863Z | 2026-05-04T17:45:34.007Z |
| CVE-2026-35352 |
7 (3.1)
|
uutils coreutils mkfifo Privilege Escalation via TOCTO… |
Uutils |
coreutils |
2026-04-22T16:08:07.422Z | 2026-05-04T17:32:54.701Z |
| CVE-2026-34059 |
N/A
|
Apache HTTP Server: mod_proxy_ajp: Heap Over-Read and … |
Apache Software Foundation |
Apache HTTP Server |
2026-05-04T12:39:42.273Z | 2026-05-04T17:32:52.565Z |
| CVE-2026-34032 |
N/A
|
Apache HTTP Server: mod_proxy_ajp: Heap Buffer Over-Re… |
Apache Software Foundation |
Apache HTTP Server |
2026-05-04T12:54:54.383Z | 2026-05-04T17:32:51.452Z |
| CVE-2026-33857 |
N/A
|
Apache HTTP Server: Off-by-one OOB reads in AJP getter… |
Apache Software Foundation |
Apache HTTP Server |
2026-05-04T13:07:30.753Z | 2026-05-04T17:32:50.362Z |
| CVE-2026-33523 |
N/A
|
Apache HTTP Server: multiple modules: HTTP response sp… |
Apache Software Foundation |
Apache HTTP Server |
2026-05-04T14:40:41.430Z | 2026-05-04T17:32:49.282Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2016-8429 |
N/A
|
An elevation of privilege vulnerability in the NV… |
Google Inc. |
Android |
2017-01-12T20:00:00.000Z | 2024-08-06T02:20:31.321Z |
| CVE-2016-8428 |
N/A
|
An elevation of privilege vulnerability in the NV… |
Google Inc. |
Android |
2017-01-12T20:00:00.000Z | 2024-08-06T02:20:31.335Z |
| CVE-2016-8427 |
N/A
|
An elevation of privilege vulnerability in the NV… |
Google Inc. |
Android |
2017-01-12T20:00:00.000Z | 2024-08-06T02:20:31.299Z |
| CVE-2016-8426 |
N/A
|
An elevation of privilege vulnerability in the NV… |
Google Inc. |
Android |
2017-01-12T20:00:00.000Z | 2024-08-06T02:20:31.339Z |
| CVE-2016-8425 |
N/A
|
An elevation of privilege vulnerability in the NV… |
Google Inc. |
Android |
2017-01-12T20:00:00.000Z | 2024-08-06T02:20:31.327Z |
| CVE-2016-8424 |
N/A
|
An elevation of privilege vulnerability in the NV… |
n/a |
Android Kernel-3.10 |
2017-01-12T20:00:00.000Z | 2024-08-06T02:20:31.296Z |
| CVE-2016-8423 |
N/A
|
An elevation of privilege vulnerability in the Qu… |
Google Inc. |
Android |
2017-01-12T20:00:00.000Z | 2024-08-06T02:20:31.338Z |
| CVE-2016-8422 |
N/A
|
An elevation of privilege vulnerability in the Qu… |
Google Inc. |
Android |
2017-01-12T20:00:00.000Z | 2024-08-06T02:20:31.300Z |
| CVE-2016-8415 |
N/A
|
An elevation of privilege vulnerability in the Qu… |
Google Inc. |
Android |
2017-01-12T20:00:00.000Z | 2024-08-06T02:20:31.335Z |
| CVE-2016-8412 |
N/A
|
An elevation of privilege vulnerability in the Qu… |
Google Inc. |
Android |
2017-01-12T20:00:00.000Z | 2024-08-06T02:20:31.320Z |
| CVE-2016-8410 |
N/A
|
An information disclosure vulnerability in the Qu… |
Google Inc. |
Android |
2017-01-12T15:00:00.000Z | 2024-08-06T02:20:31.285Z |
| CVE-2016-8409 |
N/A
|
An information disclosure vulnerability in the NV… |
Google Inc. |
Android |
2017-01-12T15:00:00.000Z | 2024-08-06T02:20:31.331Z |
| CVE-2016-8408 |
N/A
|
An information disclosure vulnerability in the NV… |
Google Inc. |
Android |
2017-01-12T15:00:00.000Z | 2024-08-06T02:20:31.436Z |
| CVE-2016-8407 |
N/A
|
An information disclosure vulnerability in kernel… |
Google Inc. |
Android |
2017-01-12T15:00:00.000Z | 2024-08-06T02:20:31.321Z |
| CVE-2016-8406 |
N/A
|
An information disclosure vulnerability in kernel… |
Google Inc. |
Android |
2017-01-12T15:00:00.000Z | 2024-08-06T02:20:31.307Z |
| CVE-2016-8405 |
N/A
|
An information disclosure vulnerability in kernel… |
Google Inc. |
Android |
2017-01-12T15:00:00.000Z | 2024-08-06T02:20:31.297Z |
| CVE-2016-8404 |
N/A
|
An information disclosure vulnerability in kernel… |
n/a |
Android Kernel-3.10 |
2017-01-12T15:00:00.000Z | 2024-08-06T02:20:31.300Z |
| CVE-2016-8403 |
N/A
|
An information disclosure vulnerability in kernel… |
Google Inc. |
Android |
2017-01-12T15:00:00.000Z | 2024-08-06T02:20:31.244Z |
| CVE-2016-8402 |
N/A
|
An information disclosure vulnerability in kernel… |
Google Inc. |
Android |
2017-01-12T15:00:00.000Z | 2024-08-06T02:20:31.213Z |
| CVE-2016-8401 |
N/A
|
An information disclosure vulnerability in kernel… |
Google Inc. |
Android |
2017-01-12T15:00:00.000Z | 2024-08-06T02:20:31.119Z |
| CVE-2016-8400 |
N/A
|
An information disclosure vulnerability in the NV… |
Google Inc. |
Android |
2017-01-12T15:00:00.000Z | 2024-08-06T02:20:31.297Z |
| CVE-2016-8399 |
N/A
|
An elevation of privilege vulnerability in the ke… |
Google Inc. |
Android |
2017-01-12T15:00:00.000Z | 2024-08-06T02:20:31.231Z |
| CVE-2016-8398 |
N/A
|
Unauthenticated messages processed by the UE. Cer… |
Google Inc. |
Android |
2017-01-12T20:00:00.000Z | 2024-08-06T02:20:31.286Z |
| CVE-2016-8397 |
N/A
|
An information disclosure vulnerability in the NV… |
Google Inc. |
Android |
2017-01-12T15:00:00.000Z | 2024-08-06T02:20:31.091Z |
| CVE-2016-8396 |
N/A
|
An information disclosure vulnerability in the Me… |
Google Inc. |
Android |
2017-01-12T15:00:00.000Z | 2024-08-06T02:20:31.172Z |
| CVE-2016-8395 |
N/A
|
A denial of service vulnerability in the NVIDIA c… |
Google Inc. |
Android |
2017-01-12T15:00:00.000Z | 2024-08-06T02:20:31.221Z |
| CVE-2016-8394 |
N/A
|
An elevation of privilege vulnerability in the Sy… |
Google Inc. |
Android |
2017-01-12T15:00:00.000Z | 2024-08-06T02:20:31.195Z |
| CVE-2016-8393 |
N/A
|
An elevation of privilege vulnerability in the Sy… |
Google Inc. |
Android |
2017-01-12T15:00:00.000Z | 2024-08-06T02:20:31.231Z |
| CVE-2016-8392 |
N/A
|
An elevation of privilege vulnerability in the Qu… |
Google Inc. |
Android |
2017-01-12T15:00:00.000Z | 2024-08-06T02:20:31.196Z |
| CVE-2016-8391 |
N/A
|
An elevation of privilege vulnerability in the Qu… |
Google Inc. |
Android |
2017-01-12T15:00:00.000Z | 2024-08-06T02:20:31.145Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2016-8426 | An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious app… | 2017-01-12T20:59:00.407 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8425 | An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious app… | 2017-01-12T20:59:00.390 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8424 | An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious app… | 2017-01-12T20:59:00.327 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8423 | An elevation of privilege vulnerability in the Qualcomm bootloader could enable a local malicious a… | 2017-01-12T20:59:00.297 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8422 | An elevation of privilege vulnerability in the Qualcomm bootloader could enable a local malicious a… | 2017-01-12T20:59:00.263 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8415 | An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious… | 2017-01-12T20:59:00.217 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8412 | An elevation of privilege vulnerability in the Qualcomm camera could enable a local malicious appli… | 2017-01-12T20:59:00.187 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8410 | An information disclosure vulnerability in the Qualcomm sound driver could enable a local malicious… | 2017-01-12T15:59:02.057 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8409 | An information disclosure vulnerability in the NVIDIA video driver could enable a local malicious a… | 2017-01-12T15:59:01.997 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8408 | An information disclosure vulnerability in the NVIDIA video driver could enable a local malicious a… | 2017-01-12T15:59:01.963 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8407 | An information disclosure vulnerability in kernel components including the ION subsystem, Binder, U… | 2017-01-12T15:59:01.933 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8406 | An information disclosure vulnerability in kernel components including the ION subsystem, Binder, U… | 2017-01-12T15:59:01.857 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8405 | An information disclosure vulnerability in kernel components including the ION subsystem, Binder, U… | 2017-01-12T15:59:01.793 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8404 | An information disclosure vulnerability in kernel components including the ION subsystem, Binder, U… | 2017-01-12T15:59:01.730 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8403 | An information disclosure vulnerability in kernel components including the ION subsystem, Binder, U… | 2017-01-12T15:59:01.667 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8402 | An information disclosure vulnerability in kernel components including the ION subsystem, Binder, U… | 2017-01-12T15:59:01.637 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8401 | An information disclosure vulnerability in kernel components including the ION subsystem, Binder, U… | 2017-01-12T15:59:01.607 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8400 | An information disclosure vulnerability in the NVIDIA librm library (libnvrm) could enable a local … | 2017-01-12T15:59:01.573 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8399 | An elevation of privilege vulnerability in the kernel networking subsystem could enable a local mal… | 2017-01-12T15:59:01.543 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8398 | Unauthenticated messages processed by the UE. Certain NAS messages are processed when no EPS securi… | 2017-01-12T20:59:00.140 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8397 | An information disclosure vulnerability in the NVIDIA video driver could enable a local malicious a… | 2017-01-12T15:59:01.510 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8396 | An information disclosure vulnerability in the MediaTek video driver could enable a local malicious… | 2017-01-12T15:59:01.480 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8395 | A denial of service vulnerability in the NVIDIA camera driver could enable an attacker to cause a l… | 2017-01-12T15:59:01.433 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8394 | An elevation of privilege vulnerability in the Synaptics touchscreen driver could enable a local ma… | 2017-01-12T15:59:01.403 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8393 | An elevation of privilege vulnerability in the Synaptics touchscreen driver could enable a local ma… | 2017-01-12T15:59:01.387 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8392 | An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious… | 2017-01-12T15:59:01.357 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8391 | An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious… | 2017-01-12T15:59:01.307 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8343 | Directory traversal vulnerability in INDAS Web SCADA before 3 allows remote attackers to read arbit… | 2016-10-05T10:59:21.690 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8339 | A buffer overflow in Redis 3.2.x prior to 3.2.4 causes arbitrary code execution when a crafted comm… | 2016-10-28T14:59:01.603 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-8335 | An exploitable stack based buffer overflow vulnerability exists in the ipNameAdd functionality of I… | 2016-10-28T20:59:03.707 | 2026-05-06T22:30:45.220 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-xm63-5pjx-vrhp |
7.0 (3.1)
|
A flaw was found in BusyBox. Incomplete path sanitization in its archive extraction utilities allow… | 2026-02-11T21:30:42Z | 2026-05-05T21:31:15Z |
| ghsa-r8f8-4pgh-4m8v |
7.0 (3.1)
|
A flaw was found in BusyBox. This vulnerability allows an attacker to modify files outside of the i… | 2026-02-11T21:30:42Z | 2026-05-05T21:31:15Z |
| ghsa-26xr-j83g-4fmm |
7.3 (3.1)
6.9 (4.0)
|
The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows m… | 2026-03-06T18:31:13Z | 2026-05-05T21:31:15Z |
| ghsa-rr73-568v-28f8 |
8.1 (3.1)
|
Grav Vulnerable to Administrative Account Disruption and Privilege De-escalation via User Overwrite Logic | 2026-05-05T21:29:53Z | 2026-05-05T21:29:54Z |
| ghsa-gwfr-jfjf-92vv |
7.4 (4.0)
|
Grav has Insecure Deserialization in File Cache | 2026-05-05T21:29:29Z | 2026-05-05T21:29:29Z |
| ghsa-vj3m-2g9h-vm4p |
|
Grav has multiple RCE vectors: unsafe unserialize (x3), command injection in git clone, SSTI blockl… | 2026-05-05T21:29:02Z | 2026-05-05T21:29:02Z |
| ghsa-9695-8fr9-hw5q |
8.5 (3.1)
|
Grav Vulnerable to Publisher-Level Stored XSS via Unquoted Event Attributes | 2026-05-05T21:27:15Z | 2026-05-05T21:27:15Z |
| ghsa-3f29-pqwf-v4j4 |
6.5 (3.1)
|
Grav Vulnerable to Sensitive Information Disclosure via Accounts Service Bypass | 2026-05-05T21:26:45Z | 2026-05-05T21:26:45Z |
| ghsa-pxm6-mhxr-q4mj |
9.4 (3.1)
|
Grav Vulnerable to Privilege Escalation via Missing Server-Side Validation of groups/access | 2026-05-05T21:26:06Z | 2026-05-05T21:26:06Z |
| ghsa-c2q3-p4jr-c55f |
5.4 (3.1)
|
Grav Vulnerable to XSS via Taxonomy Field Values in Admin Panel | 2026-05-05T21:24:45Z | 2026-05-05T21:24:45Z |
| ghsa-r7fx-8g49-7hhr |
6.9 (4.0)
|
Grav CMS vulnerable to stored XSS via Markdown media attribute() action | 2026-05-05T21:24:08Z | 2026-05-05T21:24:08Z |
| ghsa-w48r-jppp-rcfw |
9.1 (3.1)
|
Grav Vulnerable to Remote Code Execution (RCE) via Malicious Plugin ZIP Upload in Direct Install Feature | 2026-05-05T21:21:10Z | 2026-05-05T21:21:11Z |
| ghsa-r945-h4vm-h736 |
8.8 (3.1)
|
Grav API Privilege Escalation to Super Admin | 2026-05-05T21:20:03Z | 2026-05-05T21:20:03Z |
| ghsa-vpr3-2659-rw55 |
8.8 (3.1)
|
Camel-MINA Vulnerable to Deserialization of Untrusted Data | 2026-04-27T09:34:39Z | 2026-05-05T21:19:01Z |
| ghsa-v3vg-332r-mw99 |
7.8 (3.1)
|
Camel-PQC Vulnerable to Deserialization of Untrusted Data | 2026-04-27T09:34:38Z | 2026-05-05T21:18:38Z |
| ghsa-838g-gr43-qqg9 |
8.1 (3.1)
|
PyLoad vulnerable to Path Traversal via Package Folder Name in set_package_data | 2026-05-05T21:18:19Z | 2026-05-05T21:18:19Z |
| ghsa-3qpq-r242-jqj7 |
7.5 (3.1)
|
phpseclib has a CVE-2024-27355 mitigation bypass — OID amplification DoS in ASN1::decodeOID() | 2026-05-05T21:17:57Z | 2026-05-05T21:17:57Z |
| ghsa-pq7p-mc74-g65w |
6.1 (4.0)
|
PocketBase vulnerable to account pre-hijacking via OAuth2 unverfied->verified autolinking upgrade | 2026-05-05T21:17:19Z | 2026-05-05T21:17:19Z |
| ghsa-8757-69j2-hx56 |
7.5 (3.1)
|
changedetection.io has an Arbitrary Local File Read via a crafted backup restore | 2026-05-05T21:16:21Z | 2026-05-05T21:16:21Z |
| ghsa-jxh8-jh77-xh6g |
8.1 (3.1)
|
@evomap/evolver's validator sandbox allowlist permits `npm`/`npx`, yielding RCE from Hub-delivered … | 2026-05-05T21:15:55Z | 2026-05-05T21:15:55Z |
| ghsa-7xp7-m392-h92c |
6.2 (3.1)
|
@evomap/evolver has an unbounded request body in proxy /asset/submit that causes persistent disk-ex… | 2026-05-05T21:15:32Z | 2026-05-05T21:15:32Z |
| ghsa-cfcj-hqpf-hccf |
8.8 (3.1)
|
@evomap/evolver: Path Traversal in `evolver fetch` default-branch `safeId` allows Hub-controlled ov… | 2026-05-05T21:15:09Z | 2026-05-05T21:15:09Z |
| ghsa-9fw6-xgg2-mq9q |
8.8 (3.1)
|
Hysteria: A specially constructed quic package can crash the server OOM when the sniff is enabled | 2026-05-05T21:14:22Z | 2026-05-05T21:14:22Z |
| ghsa-6rmm-pg23-5f8q |
6.3 (3.1)
5.3 (4.0)
|
Dynamic-Datasource has an Injection vulnerability | 2026-04-27T00:30:27Z | 2026-05-05T21:13:27Z |
| ghsa-97r3-5w84-r4q8 |
6.5 (3.1)
|
PyLoad Vulnerable to Path Traversal via Package Folder Name | 2026-05-05T21:13:08Z | 2026-05-05T21:13:08Z |
| ghsa-grgv-6hw6-v9g4 |
7.5 (3.1)
|
Twisted has a Denial of Service (DoS) in twisted.names via Crafted DNS Compression Pointer Chains | 2026-05-05T21:12:37Z | 2026-05-05T21:12:37Z |
| ghsa-qx5f-ghc2-7g5c |
6.1 (4.0)
|
Ethyca Fides has a Privacy Request Identity Verification Bypass Vulnerability via Duplicate Detection | 2026-05-05T21:11:37Z | 2026-05-05T21:11:37Z |
| ghsa-2g9v-7mr5-fgjg |
9.3 (4.0)
|
DevGuard has an unauthenticated identity assertion via `X-Admin-Token` header | 2026-05-05T20:58:27Z | 2026-05-05T20:58:27Z |
| ghsa-p3w2-64xm-833j |
7.5 (3.1)
|
GoBGP has a panic in AdjRib.Update via malformed BGP Update message (Nil Pointer Dereference) | 2026-05-05T20:57:14Z | 2026-05-05T20:57:14Z |
| ghsa-ph6f-2cvq-79hq |
9.2 (4.0)
|
MagicMirror vulnerable to unauthenticated SSRF via /cors endpoint | 2026-05-05T20:53:59Z | 2026-05-05T20:53:59Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-88 |
|
Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in Tensor… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.776924Z |
| pysec-2022-87 |
|
Tensorflow is an Open Source Machine Learning Framework. If a graph node is invalid, Tens… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.646320Z |
| pysec-2022-86 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `GetInitOp… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.536542Z |
| pysec-2022-85 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCo… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.416658Z |
| pysec-2022-84 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCo… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.290009Z |
| pysec-2022-83 |
|
Tensorflow is an Open Source Machine Learning Framework. There is a typo in TensorFlow's … | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.161202Z |
| pysec-2022-82 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `AssignOp`… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.035553Z |
| pysec-2022-81 |
|
Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, TensorF… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:33.923211Z |
| pysec-2022-80 |
|
Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from prot… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:33.801262Z |
| pysec-2022-79 |
|
Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from prot… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:33.672987Z |
| pysec-2022-78 |
|
Tensorflow is an Open Source Machine Learning Framework. Multiple operations in TensorFlo… | tensorflow-cpu | 2022-02-03T13:15:00Z | 2022-03-09T00:17:33.554776Z |
| pysec-2022-77 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `AddManySp… | tensorflow-cpu | 2022-02-03T12:15:00Z | 2022-03-09T00:17:33.439630Z |
| pysec-2022-76 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementations of `Sparse*C… | tensorflow-cpu | 2022-02-03T12:15:00Z | 2022-03-09T00:17:33.310692Z |
| pysec-2022-75 |
|
Tensorflow is an Open Source Machine Learning Framework. TensorFlow is vulnerable to a he… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:33.179728Z |
| pysec-2022-74 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can trigger denial o… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:33.047887Z |
| pysec-2022-73 |
|
Tensorflow is an Open Source Machine Learning Framework. When decoding a resource handle … | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.923545Z |
| pysec-2022-72 |
|
Tensorflow is an Open Source Machine Learning Framework. In multiple places, TensorFlow u… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.797622Z |
| pysec-2022-71 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Range` su… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.679005Z |
| pysec-2022-70 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.561735Z |
| pysec-2022-69 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.438434Z |
| pysec-2022-68 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.298949Z |
| pysec-2022-67 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.167293Z |
| pysec-2022-66 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.048410Z |
| pysec-2022-65 |
|
Tensorflow is an Open Source Machine Learning Framework. ### Impact An attacker can craft… | tensorflow-cpu | 2022-02-03T15:15:00Z | 2022-03-09T00:17:31.924375Z |
| pysec-2022-64 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCou… | tensorflow-cpu | 2022-02-03T15:15:00Z | 2022-03-09T00:17:31.800762Z |
| pysec-2022-63 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Quantized… | tensorflow-cpu | 2022-02-03T14:15:00Z | 2022-03-09T00:17:31.682282Z |
| pysec-2022-62 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCou… | tensorflow-cpu | 2022-02-03T14:15:00Z | 2022-03-09T00:17:31.553710Z |
| pysec-2022-61 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `*Bincount… | tensorflow-cpu | 2022-02-03T14:15:00Z | 2022-03-09T00:17:31.433747Z |
| pysec-2022-60 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseTen… | tensorflow-cpu | 2022-02-03T12:15:00Z | 2022-03-09T00:17:31.305252Z |
| pysec-2022-59 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Fractiona… | tensorflow-cpu | 2022-02-03T13:15:00Z | 2022-03-09T00:17:31.174803Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-4002 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.107469Z |
| gsd-2024-4001 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.110677Z |
| gsd-2024-4000 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.108433Z |
| gsd-2024-31858 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.878898Z |
| gsd-2024-31407 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.828498Z |
| gsd-2024-32942 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.398724Z |
| gsd-2024-32937 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.480785Z |
| gsd-2024-32935 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.375699Z |
| gsd-2024-32934 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.288016Z |
| gsd-2024-32933 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.482670Z |
| gsd-2024-32932 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.318667Z |
| gsd-2024-32931 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.319159Z |
| gsd-2024-32930 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.498740Z |
| gsd-2024-32929 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.226119Z |
| gsd-2024-32928 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.430140Z |
| gsd-2024-32927 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.229438Z |
| gsd-2024-32926 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.298996Z |
| gsd-2024-32925 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.270804Z |
| gsd-2024-32924 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.490789Z |
| gsd-2024-32923 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.483420Z |
| gsd-2024-32922 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.228664Z |
| gsd-2024-32921 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.358991Z |
| gsd-2024-32920 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.450518Z |
| gsd-2024-32919 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.445455Z |
| gsd-2024-32918 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.335515Z |
| gsd-2024-32917 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.364253Z |
| gsd-2024-32916 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.255400Z |
| gsd-2024-32915 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.431999Z |
| gsd-2024-32914 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.390240Z |
| gsd-2024-32913 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.240681Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2320 | Malicious code in base-x-64 (npm) | 2026-04-01T09:11:08Z | 2026-04-07T14:41:20Z |
| mal-2026-2319 | Malicious code in base-or-engine (npm) | 2026-04-01T09:10:18Z | 2026-04-07T14:41:20Z |
| mal-2026-2307 | Malicious code in axios (npm) | 2026-03-31T03:15:49Z | 2026-04-07T14:41:20Z |
| mal-2026-2446 | Malicious code in @corpweb-ui/wmkt-library (npm) | 2026-04-03T08:18:07Z | 2026-04-07T14:41:19Z |
| mal-2026-2435 | Malicious code in 4xperss (npm) | 2026-04-02T15:12:23Z | 2026-04-07T14:41:19Z |
| mal-2026-2434 | Malicious code in 4exepreds (npm) | 2026-04-02T15:12:19Z | 2026-04-07T14:41:19Z |
| mal-2026-2420 | Malicious code in @_wnpm/wnpm-cli (npm) | 2026-04-02T09:53:07Z | 2026-04-07T14:41:19Z |
| mal-2026-2408 | Malicious code in @cloudsop/hmoment (npm) | 2026-03-24T09:03:56Z | 2026-04-07T14:41:19Z |
| mal-2026-2407 | Malicious code in @ceeferenderer/itg-renderer-sdk (npm) | 2026-03-24T09:03:48Z | 2026-04-07T14:41:19Z |
| mal-2026-2406 | Malicious code in @ceeferenderer/fe-renderer-sdk (npm) | 2026-03-24T09:03:41Z | 2026-04-07T14:41:19Z |
| mal-2026-2332 | Malicious code in @hsbc-mfe/host (npm) | 2026-03-24T15:28:47Z | 2026-04-07T14:41:19Z |
| mal-2026-2330 | Malicious code in @fyxer-ai/shared (npm) | 2026-03-24T15:28:28Z | 2026-04-07T14:41:19Z |
| mal-2026-2329 | Malicious code in @abi-labs-frontend/standards (npm) | 2026-03-24T15:23:58Z | 2026-04-07T14:41:19Z |
| mal-2026-2318 | Malicious code in @logcore/pino-pretty-logger (npm) | 2026-04-01T09:10:18Z | 2026-04-07T14:41:19Z |
| mal-2026-2314 | Malicious code in @c8o/nimbus-core (npm) | 2026-03-31T18:13:08Z | 2026-04-07T14:41:19Z |
| mal-2026-2503 | Malicious code in genesis-1p-tools-rpm-bundle (PyPI) | 2026-04-07T09:41:03Z | 2026-04-07T09:41:03Z |
| mal-2026-2488 | Malicious code in photo-extractor (PyPI) | 2026-04-04T16:41:48Z | 2026-04-04T16:41:48Z |
| mal-2026-2487 | Malicious code in discord-request (PyPI) | 2026-04-04T12:56:18Z | 2026-04-04T12:56:18Z |
| mal-2026-2486 | Malicious code in gangomodule (PyPI) | 2026-04-04T12:01:55Z | 2026-04-04T12:01:55Z |
| mal-2026-2448 | Malicious code in supervisors (PyPI) | 2026-04-03T11:40:59Z | 2026-04-03T11:40:59Z |
| mal-2026-2432 | Malicious code in nwin64tls (PyPI) | 2026-04-02T20:28:37Z | 2026-04-02T20:28:37Z |
| mal-2026-2431 | Malicious code in nwin32tls (PyPI) | 2026-04-02T20:26:19Z | 2026-04-02T20:26:19Z |
| mal-2026-2405 | Malicious code in eht-account (PyPI) | 2026-04-01T17:49:00Z | 2026-04-01T17:49:00Z |
| mal-2026-2404 | Malicious code in ether-account (PyPI) | 2026-04-01T16:32:11Z | 2026-04-01T16:32:11Z |
| mal-2026-2403 | Malicious code in polymarkets-sdk (PyPI) | 2026-04-01T15:30:14Z | 2026-04-01T16:27:32Z |
| mal-2026-870 | Malicious code in b10connoisseur (PyPI) | 2026-02-12T12:10:26Z | 2026-04-01T12:28:04Z |
| mal-2026-1407 | Malicious code in thief-utils (PyPI) | 2026-03-13T08:43:52Z | 2026-04-01T12:28:04Z |
| mal-2026-1406 | Malicious code in makenotion-ppetest (PyPI) | 2026-03-13T08:13:53Z | 2026-04-01T12:28:04Z |
| mal-2026-1365 | Malicious code in unibody (npm) | 2026-03-12T02:18:38Z | 2026-04-01T12:28:04Z |
| mal-2026-1274 | Malicious code in test-mal-npm-pkg-not-local (npm) | 2026-03-06T14:26:46Z | 2026-04-01T12:28:04Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-1754 | Roundcube: Mehrere Schwachstellen | 2024-08-04T22:00:00.000+00:00 | 2025-07-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1451 | Drupal: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-07-02T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1430 | Linux Kernel: Mehrere Schwachstellen | 2025-06-30T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1413 | Red Hat OpenShift Container Platform: Schwachstelle ermöglicht Denial of Service und Offenlegung | 2025-06-26T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1371 | FreeRDP: Schwachstelle ermöglicht Denial of Service | 2025-06-22T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1279 | Broadcom Fabric OS: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1467 | Ruby on Rails: Mehrere Schwachstellen | 2019-03-13T23:00:00.000+00:00 | 2025-07-07T22:00:00.000+00:00 |
| wid-sec-w-2023-1042 | Ruby: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-04-19T22:00:00.000+00:00 | 2025-07-06T22:00:00.000+00:00 |
| wid-sec-w-2025-1455 | F5 BIG-IP: Mehrere Schwachstellen | 2019-05-23T22:00:00.000+00:00 | 2025-07-03T22:00:00.000+00:00 |
| wid-sec-w-2025-1130 | Microsoft Edge: Schwachstelle ermöglicht Privilegieneskalation | 2025-05-22T22:00:00.000+00:00 | 2025-06-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1407 | McAfee Agent: Mehrere Schwachstellen | 2022-04-13T22:00:00.000+00:00 | 2025-06-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1378 | Red Hat Enterprise Linux (mod_proxy_cluster): Schwachstelle ermöglicht Manipulation von Daten | 2025-06-23T22:00:00.000+00:00 | 2025-06-25T22:00:00.000+00:00 |
| wid-sec-w-2025-1308 | Mitel MiCollab: Schwachstelle ermöglicht Offenlegung von Informationen und Administrative Zugriffe | 2025-06-11T22:00:00.000+00:00 | 2025-06-24T22:00:00.000+00:00 |
| wid-sec-w-2025-1369 | Red Hat Enterprise Linux (mpfr): Schwachstelle ermöglicht Denial of Service | 2025-06-22T22:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1368 | IBM Spectrum Protect: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-06-22T22:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1367 | IBM InfoSphere Information Server: Mehrere Schwachstellen | 2025-06-22T22:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1366 | F5 BIG-IP: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-06-22T22:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1362 | ClamAV: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-06-19T22:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1280 | Intel Firmware: Schwachstelle ermöglicht Denial of Service | 2025-06-10T22:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1050 | Microsoft Windows Server: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2025-05-13T22:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2025-0638 | IBM WebSphere Application Server Liberty: Schwachstelle ermöglicht Denial of Service | 2025-03-25T23:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2025-0460 | Red Hat Enterprise Linux (Quarkus): Mehrere Schwachstellen | 2025-02-27T23:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2025-0221 | IBM WebSphere Application Server Liberty: Schwachstelle ermöglicht Denial of Service | 2025-01-29T23:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2024-3582 | Red Hat OpenStack (python-werkzeug): Schwachstelle ermöglicht Codeausführung | 2024-12-02T23:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2024-3365 | IBM WebSphere Application Server Liberty: Schwachstelle ermöglicht Denial of Service | 2024-11-06T23:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2024-3237 | VMware Tanzu Spring Framework: Mehrere Schwachstellen | 2024-10-17T22:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2024-3189 | Oracle Java SE: Mehrere Schwachstellen | 2024-10-15T22:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2024-0272 | docker: Mehrere Schwachstellen | 2024-01-31T23:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2023-0917 | Apache Commons Beanutils: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2019-08-28T22:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1364 | Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-06-19T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-23-222-09 | Siemens SIMATIC | 2023-08-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-222-07 | Siemens SIMATIC | 2023-08-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-222-05 | Siemens RUGGEDCOM CROSSBOW | 2023-08-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-222-04 | ​Siemens Software Center | 2023-08-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-222-03 | ​Siemens JT Open, JT Utilities, and Parasolid | 2023-08-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-222-01 | Siemens Solid Edge, JT2Go, and Teamcenter Visualization | 2023-08-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-194-04 | Siemens SIMATIC MV500 Devices | 2023-07-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-194-03 | Siemens SIMATIC CN 4100 | 2023-07-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-194-02 | Siemens SiPass Integrated | 2023-07-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-194-01 | Siemens RUGGEDCOM ROX | 2023-07-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-166-14 | Siemens Teamcenter Visualization and JT2Go | 2023-06-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-166-07 | Siemens SIMATIC WinCC V7 | 2023-06-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-166-04 | Siemens SIMOTION | 2023-06-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-166-03 | Siemens SICAM Q200 Devices | 2023-06-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-131-06 | Siemens SCALANCE LPE9403 | 2023-05-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-131-05 | Siemens SINEC NMS Third-Party | 2023-05-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-131-04 | Siemens SIMATIC Cloud Connect 7 | 2023-05-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-103-12 | Siemens Polarion ALM | 2023-04-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-103-11 | Siemens Teamcenter Visualization and JT2Go | 2023-04-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-103-10 | Siemens Industrial Products | 2023-04-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-103-09 | Siemens SCALANCE XCM332 | 2023-04-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-103-08 | Siemens Mendix Forgot Password Module | 2023-04-18T19:27:35.031502Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-103-05 | Siemens SCALANCE X-200IRT Devices | 2023-04-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-103-03 | Siemens in OPC Foundation Local Discovery Server | 2023-04-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-103-02 | Siemens JT Open and JT Utilities | 2023-04-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-075-05 | Siemens Mendix SAML Module | 2023-03-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-047-09 | Siemens SIMATIC Industrial Products | 2023-02-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-349-20 | Siemens Teamcenter Visualization and JT2Go | 2022-12-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-349-16 | Siemens APOGEE and TALON | 2022-12-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-349-14 | Siemens SISCO MMS-EASE Third Party Component | 2022-12-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-mso-prvesc-bpfp9czs | Cisco ACI Multi-Site Orchestrator Privilege Escalation Vulnerability | 2022-08-24T16:00:00+00:00 | 2022-08-24T16:00:00+00:00 |
| cisco-sa-mso-prvesc-BPFp9cZs | Cisco ACI Multi-Site Orchestrator Privilege Escalation Vulnerability | 2022-08-24T16:00:00+00:00 | 2022-08-24T16:00:00+00:00 |
| cisco-sa-fxos-cmdinj-txclnznh | Cisco FXOS Software Command Injection Vulnerability | 2022-08-24T16:00:00+00:00 | 2022-08-24T16:00:00+00:00 |
| cisco-sa-fxos-cmdinj-TxcLNZNH | Cisco FXOS Software Command Injection Vulnerability | 2022-08-24T16:00:00+00:00 | 2022-08-24T16:00:00+00:00 |
| cisco-sa-asa-asdm-sig-npkvwdjm | Cisco Adaptive Security Device Manager and Adaptive Security Appliance Software Client-side Arbitrary Code Execution Vulnerability | 2022-06-22T16:00:00+00:00 | 2022-08-17T12:48:01+00:00 |
| cisco-sa-asa-asdm-sig-NPKvwDjm | Cisco Adaptive Security Device Manager and Adaptive Security Appliance Software Client-side Arbitrary Code Execution Vulnerability | 2022-06-22T16:00:00+00:00 | 2022-08-17T12:48:01+00:00 |
| cisco-sa-asa-dos-tl4ua4aa | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-08-10T19:07:55+00:00 |
| cisco-sa-asa-dos-tL4uA4AA | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-08-10T19:07:55+00:00 |
| cisco-sa-asaftd-rsa-key-leak-ms7uefzz | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software RSA Private Key Leak Vulnerability | 2022-08-10T16:00:00+00:00 | 2022-08-10T16:00:00+00:00 |
| cisco-sa-asaftd-rsa-key-leak-Ms7UEfZz | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software RSA Private Key Leak Vulnerability | 2022-08-10T16:00:00+00:00 | 2022-08-10T16:00:00+00:00 |
| cisco-sa-webex-xss-frmhijck-ko3wmkus | Cisco Webex Meetings Web Interface Vulnerabilities | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-webex-xss-frmhijck-kO3wmkuS | Cisco Webex Meetings Web Interface Vulnerabilities | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-sb-mult-vuln-cbvp4sur | Cisco Small Business RV Series Routers Vulnerabilities | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-sb-mult-vuln-CbVp4SUR | Cisco Small Business RV Series Routers Vulnerabilities | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-ise-pwd-wh64ahqf | Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-ise-pwd-WH64AhQF | Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-cucm-file-delete-n2vpmone | Cisco Unified Communications Manager Arbitrary File Deletion Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-cucm-file-delete-N2VPmOnE | Cisco Unified Communications Manager Arbitrary File Deletion Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-broadworks-xss-xbhfr4cd | Cisco BroadWorks Application Delivery Platform Software Cross-Site Scripting Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-broadworks-xss-xbhfr4cD | Cisco BroadWorks Application Delivery Platform Software Cross-Site Scripting Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-sma-esa-auth-bypass-66kecxqd | Cisco Email Security Appliance and Cisco Secure Email and Web Manager External Authentication Bypass Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-08-02T13:07:47+00:00 |
| cisco-sa-sma-esa-auth-bypass-66kEcxQD | Cisco Email Security Appliance and Cisco Secure Email and Web Manager External Authentication Bypass Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-08-02T13:07:47+00:00 |
| cisco-sa-sb-rv-rce-overflow-yghbyak | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-sb-rv-rce-overflow-ygHByAK | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-mprvesc-emhdgxe5 | Cisco Nexus Dashboard Privilege Escalation Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-mprvesc-EMhDgXe5 | Cisco Nexus Dashboard Privilege Escalation Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-mhcvuln-vpsbpj9y | Cisco Nexus Dashboard Unauthorized Access Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-mhcvuln-vpsBPJ9y | Cisco Nexus Dashboard Unauthorized Access Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-afw-2mt9tb99 | Cisco Nexus Dashboard Arbitrary File Write Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-afw-2MT9tb99 | Cisco Nexus Dashboard Arbitrary File Write Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-50111 | LoongArch: Enable IRQ if do_ale() triggered in irq-enabled context | 2024-11-02T00:00:00.000Z | 2026-03-31T15:13:42.000Z |
| msrc_cve-2022-50303 | drm/amdkfd: Fix double release compute pasid | 2025-09-02T00:00:00.000Z | 2026-03-31T15:13:30.000Z |
| msrc_cve-2024-46770 | ice: Add netif_device_attach/detach into PF reset flow | 2024-09-01T07:00:00.000Z | 2026-03-31T15:13:29.000Z |
| msrc_cve-2024-41069 | ASoC: topology: Fix references to freed memory | 2024-07-01T07:00:00.000Z | 2026-03-31T15:13:25.000Z |
| msrc_cve-2024-50108 | drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too | 2024-11-02T00:00:00.000Z | 2026-03-31T15:13:22.000Z |
| msrc_cve-2023-52737 | btrfs: lock the inode in shared mode before starting fiemap | 2024-05-02T07:00:00.000Z | 2026-03-31T15:13:19.000Z |
| msrc_cve-2024-46760 | wifi: rtw88: usb: schedule rx work after everything is set up | 2024-09-01T07:00:00.000Z | 2026-03-31T15:13:07.000Z |
| msrc_cve-2024-35826 | block: Fix page refcounts for unaligned buffers in __bio_release_pages() | 2024-05-02T07:00:00.000Z | 2026-03-31T15:13:05.000Z |
| msrc_cve-2025-13837 | Out-of-memory when loading Plist | 2025-12-02T00:00:00.000Z | 2026-03-31T15:13:04.000Z |
| msrc_cve-2024-50138 | bpf: Use raw_spinlock_t in ringbuf | 2024-11-02T00:00:00.000Z | 2026-03-31T15:13:02.000Z |
| msrc_cve-2024-35784 | btrfs: fix deadlock with fiemap and extent locking | 2024-05-02T07:00:00.000Z | 2026-03-31T15:12:59.000Z |
| msrc_cve-2024-46773 | drm/amd/display: Check denominator pbn_div before used | 2024-09-01T07:00:00.000Z | 2026-03-31T15:12:47.000Z |
| msrc_cve-2024-57843 | virtio-net: fix overflow inside virtnet_rq_alloc | 2025-01-02T00:00:00.000Z | 2026-03-31T15:12:45.000Z |
| msrc_cve-2024-50135 | nvme-pci: fix race condition between reset and nvme_dev_disable() | 2024-11-02T00:00:00.000Z | 2026-03-31T15:12:38.000Z |
| msrc_cve-2024-36924 | scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() | 2024-05-02T07:00:00.000Z | 2026-03-31T15:12:37.000Z |
| msrc_cve-2025-38709 | loop: Avoid updating block size under exclusive owner | 2025-09-02T00:00:00.000Z | 2026-03-31T15:12:35.000Z |
| msrc_cve-2024-40998 | ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() | 2024-07-01T07:00:00.000Z | 2026-03-31T15:12:30.000Z |
| msrc_cve-2024-46720 | drm/amdgpu: fix dereference after null check | 2024-09-01T07:00:00.000Z | 2026-03-31T15:12:22.000Z |
| msrc_cve-2024-56718 | net/smc: protect link down work from execute after lgr freed | 2024-12-02T00:00:00.000Z | 2026-03-31T15:12:15.000Z |
| msrc_cve-2024-35995 | ACPI: CPPC: Use access_width over bit_width for system memory accesses | 2024-05-02T07:00:00.000Z | 2026-03-31T15:12:06.000Z |
| msrc_cve-2024-46749 | Bluetooth: btnxpuart: Fix Null pointer dereference in btnxpuart_flush() | 2024-09-01T07:00:00.000Z | 2026-03-31T15:11:57.000Z |
| msrc_cve-2025-37920 | xsk: Fix race condition in AF_XDP generic RX path | 2025-05-02T00:00:00.000Z | 2026-03-31T15:11:55.000Z |
| msrc_cve-2024-35971 | net: ks8851: Handle softirqs at the end of IRQ thread to fix hang | 2024-05-02T07:00:00.000Z | 2026-03-31T15:11:43.000Z |
| msrc_cve-2023-53254 | cacheinfo: Fix shared_cpu_map to handle shared caches at different levels | 2025-09-02T00:00:00.000Z | 2026-03-31T15:11:40.000Z |
| msrc_cve-2023-52920 | bpf: support non-r10 register spill/fill to/from stack in precision tracking | 2024-11-02T00:00:00.000Z | 2026-03-31T15:11:40.000Z |
| msrc_cve-2024-46726 | drm/amd/display: Ensure index calculation will not overflow | 2024-09-01T07:00:00.000Z | 2026-03-31T15:11:33.000Z |
| msrc_cve-2024-58237 | bpf: consider that tail calls invalidate packet pointers | 2025-05-02T00:00:00.000Z | 2026-03-31T15:11:32.000Z |
| msrc_cve-2025-39770 | net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM | 2025-09-02T00:00:00.000Z | 2026-03-31T15:11:27.000Z |
| msrc_cve-2024-35951 | drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() | 2024-05-02T07:00:00.000Z | 2026-03-31T15:11:21.000Z |
| msrc_cve-2024-49968 | ext4: filesystems without casefold feature cannot be mounted with siphash | 2024-10-01T07:00:00.000Z | 2026-03-31T15:11:19.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15613-1 | python311-python-socketio-5.14.1-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15612-1 | pgadmin4-9.8-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15611-1 | libexslt0-1.1.43-3.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15610-1 | grafana-11.6.6-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15609-1 | go1.25-1.25.2-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15608-1 | go1.24-1.24.8-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15607-1 | glow-2.1.1-2.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15606-1 | digger-cli-0.6.127-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15605-1 | ansible-11-11.11.0-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15604-1 | valkey-8.1.4-1.1 on GA media | 2025-10-07T00:00:00Z | 2025-10-07T00:00:00Z |
| opensuse-su-2025:15603-1 | matrix-synapse-1.139.1-1.1 on GA media | 2025-10-07T00:00:00Z | 2025-10-07T00:00:00Z |
| opensuse-su-2025:15602-1 | gimp-3.0.4-4.1 on GA media | 2025-10-06T00:00:00Z | 2025-10-06T00:00:00Z |
| opensuse-su-2025:15601-1 | chromedriver-141.0.7390.54-1.1 on GA media | 2025-10-05T00:00:00Z | 2025-10-05T00:00:00Z |
| opensuse-su-2025:15600-1 | redis-8.2.2-1.1 on GA media | 2025-10-04T00:00:00Z | 2025-10-04T00:00:00Z |
| opensuse-su-2025:15599-1 | haproxy-3.2.6+git0.81568b2d1-1.1 on GA media | 2025-10-04T00:00:00Z | 2025-10-04T00:00:00Z |
| opensuse-su-2025:15598-1 | python311-Django-5.2.7-1.1 on GA media | 2025-10-03T00:00:00Z | 2025-10-03T00:00:00Z |
| opensuse-su-2025:15597-1 | logback-1.2.13-1.1 on GA media | 2025-10-03T00:00:00Z | 2025-10-03T00:00:00Z |
| opensuse-su-2025:15596-1 | python311-Django4-4.2.25-1.1 on GA media | 2025-10-02T00:00:00Z | 2025-10-02T00:00:00Z |
| opensuse-su-2025:15595-1 | libvmtools-devel-13.0.5-1.1 on GA media | 2025-10-02T00:00:00Z | 2025-10-02T00:00:00Z |
| opensuse-su-2025:15594-1 | azure-storage-azcopy-10.30.1-1.1 on GA media | 2025-10-02T00:00:00Z | 2025-10-02T00:00:00Z |
| opensuse-su-2025:15593-1 | MozillaFirefox-143.0.3-1.1 on GA media | 2025-10-02T00:00:00Z | 2025-10-02T00:00:00Z |
| opensuse-su-2025:15592-1 | libsuricata8_0_1-8.0.1-1.1 on GA media | 2025-10-01T00:00:00Z | 2025-10-01T00:00:00Z |
| opensuse-su-2025:15591-1 | jupyter-jupyterlab-4.4.9-1.1 on GA media | 2025-10-01T00:00:00Z | 2025-10-01T00:00:00Z |
| opensuse-su-2025:15590-1 | curl-8.16.0-1.1 on GA media | 2025-10-01T00:00:00Z | 2025-10-01T00:00:00Z |
| opensuse-su-2025:15589-1 | docker-stable-24.0.9_ce-15.1 on GA media | 2025-09-30T00:00:00Z | 2025-09-30T00:00:00Z |
| opensuse-su-2025:15588-1 | afterburn-5.9.0.git21.a73f509-2.1 on GA media | 2025-09-30T00:00:00Z | 2025-09-30T00:00:00Z |
| opensuse-su-2025:15587-1 | ruby3.4-rubygem-rack-2.2-2.2.18-1.1 on GA media | 2025-09-29T00:00:00Z | 2025-09-29T00:00:00Z |
| opensuse-su-2025:15586-1 | kubecolor-0.5.2-1.1 on GA media | 2025-09-29T00:00:00Z | 2025-09-29T00:00:00Z |
| opensuse-su-2025:15585-1 | kernel-devel-6.16.9-1.1 on GA media | 2025-09-29T00:00:00Z | 2025-09-29T00:00:00Z |
| opensuse-su-2025:15584-1 | gimp-3.0.4-3.1 on GA media | 2025-09-29T00:00:00Z | 2025-09-29T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:6474 | Red Hat Security Advisory: podman security, bug fix, and enhancement update | 2023-11-07T08:52:01+00:00 | 2026-05-08T02:39:07+00:00 |
| rhsa-2023:6473 | Red Hat Security Advisory: buildah security update | 2023-11-07T08:39:45+00:00 | 2026-05-08T02:39:06+00:00 |
| rhsa-2023:6402 | Red Hat Security Advisory: containernetworking-plugins security and bug fix update | 2023-11-07T09:01:07+00:00 | 2026-05-08T02:39:06+00:00 |
| rhsa-2023:6380 | Red Hat Security Advisory: runc security update | 2023-11-07T08:47:52+00:00 | 2026-05-08T02:39:05+00:00 |
| rhsa-2023:6363 | Red Hat Security Advisory: skopeo security update | 2023-11-07T08:33:26+00:00 | 2026-05-08T02:39:05+00:00 |
| rhsa-2023:4627 | Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update | 2023-08-14T01:02:25+00:00 | 2026-05-08T02:37:13+00:00 |
| rhsa-2023:4470 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.3 Product Security and Bug Fix Update | 2023-08-03T14:15:32+00:00 | 2026-05-08T02:37:12+00:00 |
| rhsa-2023:4003 | Red Hat Security Advisory: Red Hat Service Interconnect 1.4 Release security update | 2023-07-10T09:56:57+00:00 | 2026-05-08T02:37:10+00:00 |
| rhsa-2023:3742 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.0 security and bug fix update | 2023-06-21T15:22:11+00:00 | 2026-05-08T02:37:10+00:00 |
| rhsa-2023:3612 | Red Hat Security Advisory: OpenShift Container Platform 4.13.4 packages and security update | 2023-06-23T04:43:23+00:00 | 2026-05-08T02:37:06+00:00 |
| rhsa-2023:3455 | Red Hat Security Advisory: Release of OpenShift Serverless 1.29.0 | 2023-06-05T23:42:42+00:00 | 2026-05-08T02:37:06+00:00 |
| rhsa-2023:3450 | Red Hat Security Advisory: OpenShift Serverless Client kn 1.29.0 release | 2023-06-05T16:47:21+00:00 | 2026-05-08T02:37:04+00:00 |
| rhsa-2023:3445 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update | 2023-06-05T18:55:04+00:00 | 2026-05-08T02:37:04+00:00 |
| rhsa-2023:3366 | Red Hat Security Advisory: OpenShift Container Platform 4.13.2 packages and security update | 2023-06-07T02:08:03+00:00 | 2026-05-08T02:37:03+00:00 |
| rhsa-2023:3303 | Red Hat Security Advisory: OpenShift Container Platform 4.13.1 packages and security update | 2023-05-30T20:28:17+00:00 | 2026-05-08T02:37:02+00:00 |
| rhsa-2023:3167 | Red Hat Security Advisory: Red Hat build of Cryostat 2.3.0: new RHEL 8 container images | 2023-05-18T12:12:25+00:00 | 2026-05-08T02:37:01+00:00 |
| rhsa-2023:3083 | Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update | 2023-05-16T10:08:17+00:00 | 2026-05-08T02:36:59+00:00 |
| rhsa-2023:2107 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.9 security and bug fix update | 2023-05-04T01:50:06+00:00 | 2026-05-08T02:36:54+00:00 |
| rhsa-2023:1817 | Red Hat Security Advisory: Network observability 1.2.0 for Openshift | 2023-04-18T01:01:18+00:00 | 2026-05-08T02:36:51+00:00 |
| rhsa-2023:1639 | Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.3 security and bug fix update | 2023-04-05T01:15:00+00:00 | 2026-05-08T02:36:49+00:00 |
| rhsa-2023:1329 | Red Hat Security Advisory: OpenShift Container Platform 4.13.0 bug fix and security update | 2023-05-18T00:39:29+00:00 | 2026-05-08T02:36:45+00:00 |
| rhsa-2023:1325 | Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update | 2023-05-18T00:14:06+00:00 | 2026-05-08T02:36:42+00:00 |
| rhsa-2023:0584 | Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.1 security update | 2023-05-18T14:27:34+00:00 | 2026-05-08T02:36:39+00:00 |
| rhba-2023:2181 | Red Hat Bug Fix Advisory: delve, golang, and go-toolset bug fix and enhancement update | 2023-05-09T09:51:23+00:00 | 2026-05-08T02:35:36+00:00 |
| rhsa-2026:14929 | Red Hat Security Advisory: mingw-libtiff security update | 2026-05-07T21:01:11+00:00 | 2026-05-08T02:25:52+00:00 |
| rhsa-2026:13812 | Red Hat Security Advisory: updated RHEL-8 based Middleware Containers container images | 2026-05-05T17:47:50+00:00 | 2026-05-08T02:25:51+00:00 |
| rhsa-2026:14926 | Red Hat Security Advisory: kernel update | 2026-05-07T19:36:26+00:00 | 2026-05-08T02:25:50+00:00 |
| rhsa-2026:12265 | Red Hat Security Advisory: libtiff security update | 2026-04-30T12:26:28+00:00 | 2026-05-08T02:25:50+00:00 |
| rhsa-2026:14339 | Red Hat Security Advisory: kernel security update | 2026-05-06T21:19:48+00:00 | 2026-05-08T02:25:48+00:00 |
| rhsa-2026:14230 | Red Hat Security Advisory: kernel security update | 2026-05-06T17:34:12+00:00 | 2026-05-08T02:25:47+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20617-1 | Security update for python-azure-core | 2026-03-01T15:59:58Z | 2026-03-01T15:59:58Z |
| suse-su-2026:0727-1 | Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) | 2026-03-01T12:04:27Z | 2026-03-01T12:04:27Z |
| suse-su-2026:0725-1 | Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5) | 2026-03-01T10:04:27Z | 2026-03-01T10:04:27Z |
| suse-su-2026:0713-1 | Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5) | 2026-03-01T07:33:38Z | 2026-03-01T07:33:38Z |
| suse-su-2026:0711-1 | Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4) | 2026-02-28T17:33:39Z | 2026-02-28T17:33:39Z |
| suse-su-2026:0710-1 | Security update for the Linux Kernel (Live Patch 76 for SUSE Linux Enterprise 12 SP5) | 2026-02-28T15:33:45Z | 2026-02-28T15:33:45Z |
| suse-su-2026:0707-1 | Security update for the Linux Kernel (Live Patch 73 for SUSE Linux Enterprise 12 SP5) | 2026-02-28T13:03:47Z | 2026-02-28T13:03:47Z |
| suse-su-2026:0703-1 | Security update for libsoup | 2026-02-28T10:01:49Z | 2026-02-28T10:01:49Z |
| suse-su-2026:0700-1 | Security update for the Linux Kernel (Live Patch 70 for SUSE Linux Enterprise 12 SP5) | 2026-02-28T08:04:45Z | 2026-02-28T08:04:45Z |
| suse-su-2026:0698-1 | Security update for the Linux Kernel (Live Patch 67 for SUSE Linux Enterprise 12 SP5) | 2026-02-28T05:33:34Z | 2026-02-28T05:33:34Z |
| suse-su-2026:0696-1 | Security update for the Linux Kernel (Live Patch 65 for SUSE Linux Enterprise 12 SP5) | 2026-02-27T19:33:27Z | 2026-02-27T19:33:27Z |
| suse-su-2026:0694-1 | Security update for gpg2 | 2026-02-27T15:14:36Z | 2026-02-27T15:14:36Z |
| suse-su-2026:0693-1 | Security update for python311 | 2026-02-27T15:14:09Z | 2026-02-27T15:14:09Z |
| suse-su-2026:0692-1 | Security update for MozillaThunderbird | 2026-02-27T15:12:00Z | 2026-02-27T15:12:00Z |
| suse-su-2026:0690-1 | Security update for libsoup | 2026-02-27T15:11:03Z | 2026-02-27T15:11:03Z |
| suse-su-2026:0689-1 | Security update for libsoup | 2026-02-27T15:10:48Z | 2026-02-27T15:10:48Z |
| suse-su-2026:0688-1 | Security update for the Linux Kernel | 2026-02-27T15:09:04Z | 2026-02-27T15:09:04Z |
| suse-su-2026:0687-1 | Security update for go1 | 2026-02-27T15:08:16Z | 2026-02-27T15:08:16Z |
| suse-su-2026:20616-1 | Security update for haproxy | 2026-02-27T13:16:38Z | 2026-02-27T13:16:38Z |
| suse-su-2026:20620-1 | Security update for haproxy | 2026-02-27T13:15:05Z | 2026-02-27T13:15:05Z |
| suse-su-2026:20557-1 | Security update for haproxy | 2026-02-27T13:15:05Z | 2026-02-27T13:15:05Z |
| suse-su-2026:0685-1 | Security update for valkey | 2026-02-27T11:53:26Z | 2026-02-27T11:53:26Z |
| suse-su-2026:20599-1 | Security update for the Linux Kernel | 2026-02-27T11:51:02Z | 2026-02-27T11:51:02Z |
| suse-su-2026:20555-1 | Security update for the Linux Kernel | 2026-02-27T11:51:02Z | 2026-02-27T11:51:02Z |
| suse-su-2026:20611-1 | Security update for the initial kernel livepatch | 2026-02-27T11:50:22Z | 2026-02-27T11:50:22Z |
| suse-su-2026:20556-1 | Security update for the initial kernel livepatch | 2026-02-27T11:50:22Z | 2026-02-27T11:50:22Z |
| suse-su-2026:20615-1 | Security update for the Linux Kernel | 2026-02-27T11:32:45Z | 2026-02-27T11:32:45Z |
| suse-su-2026:0684-1 | Security update for gimp | 2026-02-27T10:43:59Z | 2026-02-27T10:43:59Z |
| suse-su-2026:0683-1 | Security update for freerdp2 | 2026-02-27T10:42:32Z | 2026-02-27T10:42:32Z |
| suse-su-2026:0680-1 | Security update for glibc | 2026-02-27T10:17:05Z | 2026-02-27T10:17:05Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:3828 | Moderate: glibc security update | 2025-04-14T00:00:00Z | 2025-04-14T14:26:30Z |
| alsa-2025:3772 | Moderate: go-toolset:rhel8 security update | 2025-04-10T00:00:00Z | 2025-04-10T14:51:51Z |
| alsa-2025:3773 | Important: delve and golang security update | 2025-04-10T00:00:00Z | 2025-04-10T08:20:05Z |
| alsa-2025:3683 | Moderate: tomcat security update | 2025-04-08T00:00:00Z | 2025-04-09T08:27:17Z |
| alsa-2025:3713 | Important: webkit2gtk3 security update | 2025-04-08T00:00:00Z | 2025-04-09T08:21:19Z |
| alsa-2025:3645 | Moderate: tomcat security update | 2025-04-07T00:00:00Z | 2025-04-08T10:29:52Z |
| alsa-2025:3634 | Low: python3.11 security update | 2025-04-07T00:00:00Z | 2025-04-08T09:24:19Z |
| alsa-2025:3631 | Low: python3.12 security update | 2025-04-07T00:00:00Z | 2025-04-08T09:22:03Z |
| alsa-2025:3617 | Important: gimp security update | 2025-04-07T00:00:00Z | 2025-04-07T14:05:08Z |
| alsa-2025:3615 | Important: libxslt security update | 2025-04-07T00:00:00Z | 2025-04-07T12:05:03Z |
| alsa-2025:3582 | Important: firefox security update | 2025-04-03T00:00:00Z | 2025-04-04T06:37:51Z |
| alsa-2025:3556 | Important: firefox security update | 2025-04-03T00:00:00Z | 2025-04-04T06:36:06Z |
| alsa-2025:3531 | Moderate: expat security update | 2025-04-02T00:00:00Z | 2025-04-02T22:20:59Z |
| alsa-2025:3406 | Important: python-jinja2 security update | 2025-03-31T00:00:00Z | 2025-04-01T07:14:20Z |
| alsa-2025:3421 | Important: freetype security update | 2025-03-31T00:00:00Z | 2025-04-01T07:12:12Z |
| alsa-2025:3367 | Important: grub2 security update | 2025-03-27T00:00:00Z | 2025-03-31T22:37:41Z |
| alsa-2025:3344 | Important: grafana security update | 2025-03-27T00:00:00Z | 2025-03-31T12:20:53Z |
| alsa-2025:3264 | Important: kernel-rt security update | 2025-03-26T00:00:00Z | 2025-03-30T09:29:38Z |
| alsa-2025:3261 | Moderate: nginx:1.22 security update | 2025-03-26T00:00:00Z | 2025-03-30T09:27:33Z |
| alsa-2025:3260 | Important: kernel security update | 2025-03-26T00:00:00Z | 2025-03-30T09:24:36Z |
| alsa-2025:3107 | Important: libxslt security update | 2025-03-24T00:00:00Z | 2025-03-25T12:04:43Z |
| alsa-2025:2359 | Important: firefox security update | 2025-03-05T00:00:00Z | 2025-03-21T12:18:58Z |
| alsa-2025:2867 | Important: grub2 security update | 2025-03-17T00:00:00Z | 2025-03-21T12:17:16Z |
| alsa-2025:2899 | Important: thunderbird security update | 2025-03-17T00:00:00Z | 2025-03-21T12:13:42Z |
| alsa-2025:1917 | Important: emacs security update | 2025-02-27T00:00:00Z | 2025-03-18T07:08:51Z |
| alsa-2025:1915 | Important: emacs security update | 2025-02-27T00:00:00Z | 2025-03-18T07:05:20Z |
| alsa-2025:2900 | Important: thunderbird security update | 2025-03-17T00:00:00Z | 2025-03-17T22:51:46Z |
| alsa-2025:2868 | Important: libreoffice security update | 2025-03-17T00:00:00Z | 2025-03-17T22:46:15Z |
| alsa-2025:2864 | Important: webkit2gtk3 security update | 2025-03-17T00:00:00Z | 2025-03-17T22:37:00Z |
| alsa-2025:2863 | Important: webkit2gtk3 security update | 2025-03-17T00:00:00Z | 2025-03-17T22:35:22Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-364 | Stack-use-after-return in ihevcd_process_thread | 2020-07-01T00:00:05.352256Z | 2023-04-20T22:35:28.979054Z |
| osv-2023-330 | Heap-buffer-overflow in RegionItem::parse | 2023-04-20T14:02:21.336788Z | 2023-04-20T14:02:21.337046Z |
| osv-2023-328 | Heap-buffer-overflow in RegionItem::parse | 2023-04-20T14:00:08.128442Z | 2023-04-20T14:00:08.128764Z |
| osv-2023-326 | Heap-use-after-free in dynsec_clients__find | 2023-04-19T14:00:15.499723Z | 2023-04-19T14:00:15.499983Z |
| osv-2023-323 | Heap-buffer-overflow in OT::glyf_impl::SubsetGlyph::serialize | 2023-04-17T14:02:31.782283Z | 2023-04-17T14:02:31.782535Z |
| osv-2023-322 | Use-after-poison in str_new_frozen_buffer | 2023-04-17T14:02:30.767106Z | 2023-04-17T14:02:30.767357Z |
| osv-2023-311 | Heap-double-free in cache_bclose | 2023-04-14T14:00:06.429916Z | 2023-04-14T14:00:06.430169Z |
| osv-2023-297 | UNKNOWN READ in pdfi_read_cff_font | 2023-04-12T14:01:05.168220Z | 2023-04-13T14:23:41.374262Z |
| osv-2023-303 | Heap-use-after-free in picture_copy_props | 2023-04-13T14:01:21.388989Z | 2023-04-13T14:01:21.389231Z |
| osv-2023-302 | UNKNOWN READ in google_myanmar_tools::ZawgyiDetector::ZawgyiDetector | 2023-04-13T14:00:50.880825Z | 2023-04-13T14:00:50.881075Z |
| osv-2023-285 | Stack-buffer-overflow in fn_ElIn_evaluate | 2023-04-07T14:02:29.265601Z | 2023-04-08T14:27:35.919762Z |
| osv-2023-286 | Heap-buffer-overflow in _dwarf_memcpy_noswap_bytes | 2023-04-08T14:00:55.104592Z | 2023-04-08T14:00:55.104860Z |
| osv-2023-284 | Global-buffer-overflow in dwg_codepage_dxfstr | 2023-04-07T14:00:08.323496Z | 2023-04-07T14:00:08.323744Z |
| osv-2023-282 | Heap-use-after-free in mrb_gc_mark | 2023-04-06T14:00:33.294122Z | 2023-04-06T14:00:33.294356Z |
| osv-2023-281 | Heap-buffer-overflow in unsigned long simdutf::haswell::convert_masked_utf8_to_utf16< | 2023-04-05T14:01:50.220529Z | 2023-04-05T14:01:50.220752Z |
| osv-2023-280 | Heap-use-after-free in mrb_str_hash_m | 2023-04-05T14:01:11.848863Z | 2023-04-05T14:01:11.849139Z |
| osv-2023-279 | Heap-use-after-free in filename_cmp | 2023-04-05T14:00:58.581945Z | 2023-04-05T14:00:58.582171Z |
| osv-2023-278 | Heap-buffer-overflow in simdutf::haswell::implementation::convert_utf8_to_utf32 | 2023-04-05T14:00:45.731081Z | 2023-04-05T14:00:45.731310Z |
| osv-2023-272 | Heap-buffer-overflow in unsigned long simdutf::haswell::convert_masked_utf8_to_utf16< | 2023-04-03T14:00:08.697953Z | 2023-04-04T14:10:41.334668Z |
| osv-2023-273 | Heap-buffer-overflow in add_complete_typeobj | 2023-04-03T14:02:08.154670Z | 2023-04-03T14:02:08.154918Z |
| osv-2023-271 | Heap-buffer-overflow in bit_utf8_to_TU | 2023-04-02T14:01:58.656302Z | 2023-04-02T14:01:58.656539Z |
| osv-2023-270 | Heap-buffer-overflow in bit_utf8_to_TU | 2023-04-02T14:01:04.734545Z | 2023-04-02T14:01:04.734833Z |
| osv-2023-269 | Heap-buffer-overflow in bit_utf8_to_TU | 2023-04-02T14:01:01.834337Z | 2023-04-02T14:01:01.834603Z |
| osv-2023-265 | Heap-double-free in xmlHashDefaultDeallocator | 2023-04-01T13:02:22.848837Z | 2023-04-01T13:02:22.849084Z |
| osv-2023-252 | UNKNOWN READ in iv_put | 2023-03-30T13:00:35.046945Z | 2023-03-30T13:00:35.047201Z |
| osv-2023-251 | Stack-buffer-overflow in ext11_work_out_bundles | 2023-03-30T13:00:33.543215Z | 2023-03-30T13:00:33.543462Z |
| osv-2023-249 | Global-buffer-overflow in xmlStrndup | 2023-03-28T13:00:29.942556Z | 2023-03-28T13:00:29.942832Z |
| osv-2023-222 | Heap-buffer-overflow in hb_subset_plan_t::hb_subset_plan_t | 2023-03-24T13:00:38.968605Z | 2023-03-27T14:20:39.491568Z |
| osv-2023-248 | Heap-double-free in _dwarf_read_line_table_header | 2023-03-27T13:01:51.351691Z | 2023-03-27T13:01:51.351903Z |
| osv-2023-246 | Heap-double-free in _dwarf_read_line_table_header | 2023-03-27T13:00:51.152187Z | 2023-03-27T13:00:51.152441Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2026-1102 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-01-27T09:13:24.685Z | 2026-01-27T09:14:53.416Z |
| bit-gitlab-2026-0723 | Unchecked Return Value in GitLab | 2026-01-27T09:13:22.812Z | 2026-01-27T09:14:53.416Z |
| bit-gitlab-2025-13928 | Incorrect Authorization in GitLab | 2026-01-27T09:10:58.706Z | 2026-01-27T09:14:53.416Z |
| bit-gitlab-2025-13927 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-01-27T09:10:56.771Z | 2026-01-27T09:14:53.416Z |
| bit-gitlab-2025-13335 | Loop with Unreachable Exit Condition ('Infinite Loop') in GitLab | 2026-01-27T09:10:47.144Z | 2026-01-27T09:14:53.416Z |
| bit-tensorflow-2022-29204 | Missing validation causes denial of service in TensorFlow via `Conv3DBackpropFilterV2` | 2024-03-06T11:14:25.120Z | 2026-01-26T15:09:56.435Z |
| bit-solr-2026-22444 | Apache Solr: Insufficient file-access checking in standalone core-creation requests | 2026-01-26T14:49:58.661Z | 2026-01-26T15:09:56.435Z |
| bit-solr-2026-22022 | Apache Solr: Unauthorized bypass of certain "predefined permission" rules in the RuleBasedAuthorizationPlugin | 2026-01-26T14:49:57.084Z | 2026-01-26T15:09:56.435Z |
| bit-solr-2025-24814 | Apache Solr: Core-creation with "trusted" configset can use arbitrary untrusted files | 2025-01-29T07:20:22.315Z | 2026-01-26T15:09:56.435Z |
| bit-python-2025-15367 | POP3 command injection in user-controlled commands | 2026-01-26T14:49:43.697Z | 2026-01-26T15:09:56.435Z |
| bit-python-2025-15366 | IMAP command injection in user-controlled commands | 2026-01-26T14:49:42.105Z | 2026-01-26T15:09:56.435Z |
| bit-python-2025-12781 | base64.b64decode() always accepts "+/" characters, despite setting altchars | 2026-01-26T14:49:35.455Z | 2026-01-26T15:09:56.435Z |
| bit-php-2025-14178 | Heap buffer overflow in array_merge() | 2026-01-08T11:48:32.142Z | 2026-01-26T15:09:56.435Z |
| bit-node-2025-59465 | 2026-01-26T14:47:56.981Z | 2026-01-26T15:09:56.435Z | |
| bit-node-2025-55131 | 2026-01-26T14:47:51.686Z | 2026-01-26T15:09:56.435Z | |
| bit-moodle-2025-3647 | Moodle: idor when accessing the cohorts report | 2026-01-26T14:49:52.208Z | 2026-01-26T15:09:56.435Z |
| bit-moodle-2025-3645 | Moodle: idor in messaging web service allows access to some user details | 2026-01-26T14:49:50.806Z | 2026-01-26T15:09:56.435Z |
| bit-moodle-2025-3644 | Moodle: ajax section delete does not respect course_can_delete_section() | 2026-01-26T14:49:49.408Z | 2026-01-26T15:09:56.435Z |
| bit-moodle-2025-3643 | Moodle: reflected xss risk in policy tool | 2026-01-26T14:49:47.987Z | 2026-01-26T15:09:56.435Z |
| bit-moodle-2025-3642 | Moodle: authenticated remote code execution risk in the moodle lms equella repository | 2026-01-26T14:49:46.287Z | 2026-01-26T15:09:56.435Z |
| bit-moodle-2025-3641 | Moodle: authenticated remote code execution risk in the moodle lms dropbox repository | 2026-01-26T14:49:44.921Z | 2026-01-26T15:09:56.435Z |
| bit-moodle-2025-3640 | Moodle: idor in web service allows users enrolled in a course to access some details of other users | 2026-01-26T14:49:43.349Z | 2026-01-26T15:09:56.435Z |
| bit-moodle-2025-3637 | Moodle: csrf token exposure via url in moodle mod_data module | 2026-01-26T14:49:40.549Z | 2026-01-26T15:09:56.435Z |
| bit-moodle-2025-3636 | Moodle: idor in moodle rss block allows unauthorized access to rss feeds | 2026-01-26T14:49:39.118Z | 2026-01-26T15:09:56.435Z |
| bit-moodle-2025-3635 | Moodle: csrf risk in moodle user tours manager allows tour duplication | 2026-01-26T14:49:37.686Z | 2026-01-26T15:09:56.435Z |
| bit-moodle-2025-3634 | Moodle: moodle allows course self-enrolment before completing mfa | 2026-01-26T14:49:36.271Z | 2026-01-26T15:09:56.435Z |
| bit-moodle-2025-3628 | Moodle: moodle assignment submission search leaks anonymous student identities | 2026-01-26T14:49:34.772Z | 2026-01-26T15:09:56.435Z |
| bit-moodle-2025-3627 | Moodle: partial data exposure in moodle before completing multi-factor authentication | 2026-01-26T14:49:33.343Z | 2026-01-26T15:09:56.435Z |
| bit-moodle-2025-3625 | Moodle: user dos and name disclosure via idor in moodle mfa email factor revoke action | 2026-01-26T14:49:31.897Z | 2026-01-26T15:09:56.435Z |
| bit-moodle-2025-32045 | Moodle: hidden grades shown to users without permission on some grade reports | 2026-01-26T14:49:30.385Z | 2026-01-26T15:09:56.435Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0864 | Multiples vulnérabilités dans VMware Tanzu | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| certfr-2025-avi-0863 | Vulnérabilité dans Belden HiOS Switch Platform | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| CERTFR-2025-AVI-0865 | Vulnérabilité dans Oracle E-Business Suite | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| CERTFR-2025-AVI-0864 | Multiples vulnérabilités dans VMware Tanzu | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| CERTFR-2025-AVI-0863 | Vulnérabilité dans Belden HiOS Switch Platform | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| certfr-2025-avi-0862 | Multiples vulnérabilités dans Microsoft Edge | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0861 | Multiples vulnérabilités dans les produits IBM | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0860 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0859 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0858 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0862 | Multiples vulnérabilités dans Microsoft Edge | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0861 | Multiples vulnérabilités dans les produits IBM | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0860 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0859 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0858 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0857 | Vulnérabilité dans Wireshark | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0856 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0855 | Multiples vulnérabilités dans les produits Juniper Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0854 | Vulnérabilité dans les produits Moxa | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0853 | Multiples vulnérabilités dans GitLab | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0852 | Vulnérabilité dans Tenable Security Center | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0857 | Vulnérabilité dans Wireshark | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0856 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0855 | Multiples vulnérabilités dans les produits Juniper Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0854 | Vulnérabilité dans les produits Moxa | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0853 | Multiples vulnérabilités dans GitLab | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0852 | Vulnérabilité dans Tenable Security Center | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0851 | Vulnérabilité dans Python | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0850 | Multiples vulnérabilités dans Google Chrome | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0847 | Vulnérabilité dans les produits Liferay | 2025-10-06T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2018-006236 | Information Disclosure Vulnerability in Hitachi Command Suite | 2018-08-14T10:04+09:00 | 2019-07-24T17:02+09:00 |
| jvndb-2018-000067 | Mailman vulnerable to cross-site scripting | 2018-06-28T12:30+09:00 | 2019-07-24T15:21+09:00 |
| jvndb-2018-000068 | Multiple vulnerabilities in Calsos CSDX and CSDJ series products | 2018-07-02T15:22+09:00 | 2019-07-24T14:31+09:00 |
| jvndb-2018-000106 | User-friendly SVN vulnerable to cross-site scripting | 2018-10-09T16:27+09:00 | 2019-07-11T18:00+09:00 |
| jvndb-2018-000102 | Multiple vulnerabilities in Denbun | 2018-10-04T16:11+09:00 | 2019-07-11T16:02+09:00 |
| jvndb-2019-000046 | Intel Dual Band Wireless-AC 8260 vulnerable to denial-of-service (DoS) | 2019-07-10T14:07+09:00 | 2019-07-10T14:07+09:00 |
| jvndb-2018-000066 | MemoCGI vulnerable to directory traversal | 2018-06-27T14:44+09:00 | 2019-07-05T17:58+09:00 |
| jvndb-2018-000069 | Cybozu Garoon vulnerable to SQL injection | 2018-07-02T15:22+09:00 | 2019-07-05T17:55+09:00 |
| jvndb-2018-000070 | Installer of Glary Utilities may insecurely load Dynamic Link Libraries | 2018-07-03T13:42+09:00 | 2019-07-05T17:52+09:00 |
| jvndb-2018-000072 | The installers of multiple Logicool software programs may insecurely load Dynamic Link Libraries | 2018-07-06T14:36+09:00 | 2019-07-05T17:38+09:00 |
| jvndb-2018-000071 | DHC Online Shop App for Android fails to verify SSL server certificates | 2018-07-06T14:36+09:00 | 2019-07-05T17:35+09:00 |
| jvndb-2018-000085 | Multiple cross-site scripting vulnerabilities in GROWI | 2018-08-03T15:04+09:00 | 2019-07-05T17:13+09:00 |
| jvndb-2018-000051 | The installer of Visual C++ Redistributable may insecurely load Dynamic Link Libraries | 2018-05-17T14:57+09:00 | 2019-07-05T16:41+09:00 |
| jvndb-2018-000049 | Multiple Microsoft Windows applications and installers may insecurely load Dynamic Link Libraries | 2018-05-17T15:18+09:00 | 2019-07-05T16:40+09:00 |
| jvndb-2019-000045 | Multiple vulnerabilities in Access analysis CGI An-Analyzer | 2019-07-05T15:28+09:00 | 2019-07-05T15:28+09:00 |
| jvndb-2018-000056 | Susie plug-in "axpdfium" may insecurely load Dynamic Link Libraries | 2018-05-24T15:15+09:00 | 2019-07-02T14:53+09:00 |
| jvndb-2018-000058 | WordPress plugin "Email Subscribers & Newsletters" vulnerable to cross-site scripting | 2018-05-28T14:11+09:00 | 2019-07-02T14:50+09:00 |
| jvndb-2018-000046 | The installer of PlayMemories Home for Windows may insecurely load Dynamic Link Libraries | 2018-05-24T15:25+09:00 | 2019-07-02T14:31+09:00 |
| jvndb-2018-000059 | WordPress plugin "Site Reviews" vulnerable to cross-site scripting | 2018-05-28T14:11+09:00 | 2019-07-02T14:25+09:00 |
| jvndb-2019-004441 | Vulnerability in Cosminexus HTTP Server and Hitachi Web Server | 2019-06-03T13:55+09:00 | 2019-06-03T13:55+09:00 |
| jvndb-2019-003539 | DoS Vulnerability in Hitachi IT Operations Director, JP1/IT Desktop Management - Manager and JP1/IT Desktop Management 2 - Manager | 2019-05-20T15:38+09:00 | 2019-05-20T15:38+09:00 |
| jvndb-2019-003194 | Multiple Vulnerabilities in Hitachi Command Suite and Hitachi Infrastructure Analytics Advisor | 2019-05-13T15:25+09:00 | 2019-05-13T15:25+09:00 |
| jvndb-2019-002892 | Multiple Vulnerabilities in Cosminexus | 2019-04-25T15:13+09:00 | 2019-04-25T15:13+09:00 |
| jvndb-2019-000021 | API server used by JR East Japan train operation information push notification App for Android fails to restrict access permissions | 2019-04-01T15:42+09:00 | 2019-04-01T15:42+09:00 |
| jvndb-2019-001285 | DoS Vulnerability in JP1/Base | 2019-02-25T17:13+09:00 | 2019-02-25T17:13+09:00 |
| jvndb-2019-000010 | azure-umqtt-c vulnerable to denial-of-service (DoS) | 2019-02-20T16:59+09:00 | 2019-02-20T16:59+09:00 |
| jvndb-2019-000008 | A vulnerability in V20 PRO L-01J that may cause a crash | 2019-02-12T17:23+09:00 | 2019-02-12T17:23+09:00 |
| jvndb-2019-001094 | Information Disclosure Vulnerability in Hitachi Command Suite and Hitachi Infrastructure Analytics Advisor | 2019-01-22T11:47+09:00 | 2019-01-24T18:39+09:00 |
| jvndb-2019-001095 | Cross-site Scripting Vulnerability in Hitachi Device Manager | 2019-01-22T11:47+09:00 | 2019-01-24T18:38+09:00 |
| jvndb-2018-010851 | Clickjacking Vulnerability in Hitachi Automation Director | 2018-12-26T12:09+09:00 | 2019-01-24T18:37+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-10873 | Huawei HarmonyOS和EMUI媒体库模块权限验证绕过漏洞(CNVD-2026-10873) | 2026-01-19 | 2026-02-13 |
| cnvd-2026-10872 | Huawei HarmonyOS和EMUI媒体库模块权限验证绕过漏洞 | 2026-01-19 | 2026-02-13 |
| cnvd-2026-10871 | WordPress插件metasync存在未明漏洞 | 2026-02-04 | 2026-02-12 |
| cnvd-2026-10870 | WordPress插件Simple User Registration访问控制错误漏洞 | 2026-02-04 | 2026-02-12 |
| cnvd-2026-10859 | Adobe Substance 3D Modeler越界写入漏洞(CNVD-2026-10859) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10858 | Adobe Substance 3D Modeler越界写入漏洞(CNVD-2026-10858) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10857 | Rockwell Automation FactoryTalk Linx权限提升漏洞(CNVD-2026-10857) | 2025-10-17 | 2026-02-12 |
| cnvd-2026-10856 | Rockwell Automation FactoryTalk Linx权限提升漏洞 | 2025-10-17 | 2026-02-12 |
| cnvd-2026-10682 | Microsoft Windows SMB Server拒绝服务漏洞 | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10681 | Microsoft Windows SMB Server权限提升漏洞(CNVD-2026-10681) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10680 | Microsoft Windows SMB Server权限提升漏洞(CNVD-2026-10680) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10679 | Microsoft Windows SMB Server权限提升漏洞(CNVD-2026-10679) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10678 | Microsoft Windows SMB Server权限提升漏洞(CNVD-2026-10678) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10677 | Microsoft Windows SMB Server权限提升漏洞(CNVD-2026-10677) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-06390 | 北京星网锐捷网络技术有限公司RG-EST350 V2存在命令执行漏洞 | 2025-12-30 | 2026-02-12 |
| cnvd-2026-10676 | Microsoft Windows File Explorer欺骗漏洞(CNVD-2026-10676) | 2025-10-17 | 2026-02-11 |
| cnvd-2026-10675 | Microsoft Windows File Explorer信息泄露漏洞(CNVD-2026-10675) | 2026-01-19 | 2026-02-11 |
| cnvd-2026-10674 | Microsoft Windows File Explorer信息泄露漏洞(CNVD-2026-10674) | 2026-01-19 | 2026-02-11 |
| cnvd-2026-10673 | Microsoft Windows File Explorer信息泄露漏洞(CNVD-2026-10673) | 2026-01-19 | 2026-02-11 |
| cnvd-2026-10672 | Microsoft Windows File Explorer信息泄露漏洞 | 2026-01-19 | 2026-02-11 |
| cnvd-2026-10671 | MedDream PACS Premium跨站脚本漏洞(CNVD-2026-10671) | 2025-07-30 | 2026-02-11 |
| cnvd-2026-10670 | MedDream PACS Premium跨站脚本漏洞(CNVD-2026-10670) | 2026-01-26 | 2026-02-11 |
| cnvd-2026-10669 | MedDream PACS Premium跨站脚本漏洞(CNVD-2026-10669) | 2026-01-26 | 2026-02-11 |
| cnvd-2026-10668 | MedDream PACS Premium跨站脚本漏洞(CNVD-2026-10668) | 2026-01-26 | 2026-02-11 |
| cnvd-2026-10667 | MedDream PACS Premium跨站脚本漏洞(CNVD-2026-10667) | 2026-01-29 | 2026-02-11 |
| cnvd-2026-10666 | MedDream PACS Premium任意文件读取漏洞 | 2026-01-30 | 2026-02-11 |
| cnvd-2026-10665 | MedDream PACS Premium跨站脚本漏洞 | 2026-01-30 | 2026-02-11 |
| cnvd-2026-10898 | Adobe Creative Cloud Desktop Application拒绝服务漏洞(CNVD-2026-10898) | 2025-12-15 | 2026-02-10 |
| cnvd-2026-10855 | Rockwell Automation CompactLogix 5370拒绝服务漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10854 | Rockwell Automation ArmorStart LT拒绝服务漏洞(CNVD-2026-10854) | 2026-01-30 | 2026-02-10 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2020-04038 | Уязвимость реализации функции new org.dom4j.io.SAXReader() библиотеки для работы с XML, X… | 26.08.2020 | 10.02.2026 |
| bdu:2020-03317 | Уязвимость набора Java-библиотек Google Guava, связанная с неограниченным выделением памя… | 15.07.2020 | 10.02.2026 |
| bdu:2020-02355 | Уязвимость библиотеки журналирования Java-программ Log4j, связанная с восстановлением в п… | 26.05.2020 | 10.02.2026 |
| bdu:2020-01729 | Уязвимость плагина rustdoc языка программирования Rust, позволяющая нарушителю выполнить … | 23.04.2020 | 10.02.2026 |
| bdu:2019-02509 | Уязвимость функции _asn1_expand_object_id (p_tree) библиотеки Libtasn1 операционной систе… | 16.07.2019 | 10.02.2026 |
| bdu:2019-01880 | Уязвимость средства криптографической защиты Bouncy Castle, связанная с восстановлением в… | 31.05.2019 | 10.02.2026 |
| bdu:2018-00147 | Уязвимость анализатора XML-файлов Xerces2 Java, связанная с ошибками управления ресурсом,… | 02.02.2018 | 10.02.2026 |
| bdu:2015-04033 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 10.02.2026 |
| bdu:2015-04032 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 10.02.2026 |
| bdu:2015-04031 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 10.02.2026 |
| bdu:2026-01516 | Уязвимость функции convert___skb_to_skb() ядра операционной системы Linux, позволяющая на… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01515 | Уязвимость операционной системы HPE Alletra, системы хранения данных HPE Nimble Storage A… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01514 | Уязвимость функции optc1_enable_optc_clock() ядра операционной системы Linux, позволяющая… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01510 | Уязвимость функции __ieee80211_scan_completed() ядра операционной системы Linux, позволяю… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01509 | Уязвимость функций nilfs_relax_pressure_in_lock() и nilfs_construct_segment() ядра операц… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01508 | Уязвимость функции cpe_mime_handlers() микропрограммного обеспечения маршрутизаторов Link… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01507 | Уязвимость функции ntfs_read_inode_mount() ядра операционной системы Linux, позволяющая н… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01506 | Уязвимость функции formSetWanDiag() микропрограммного обеспечения маршрутизаторов Tenda G… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01505 | Уязвимость функции null_init_tag_set() модуля drivers/block/null_blk/main.c драйвера блоч… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01504 | Уязвимость функции pot_hole() ядра операционной системы Linux, позволяющая нарушителю ока… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01503 | Уязвимость функции usbnet_probe () модуля drivers/net/usb/usbnet.c драйвера сетевых адапт… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01502 | Уязвимость функции bcmgenet_desc_rx() модуля drivers/net/ethernet/broadcom/genet/bcmgenet… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01501 | Уязвимость функции snd_pcm_oss_period_size() ядра операционной системы Linux, позволяющая… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01500 | Уязвимость функции sja1105_table_delete_entry() модуля drivers/net/dsa/sja1105/sja1105_st… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01499 | Уязвимость функции jfs_link() модуля fs/jfs/namei.c файловой системы JFS ядра операционно… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01498 | Уязвимость функции si_parse_power_table() ядра операционной системы Linux, позволяющая на… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01497 | Уязвимость плагина Rule Based Authorization Plugin поискового сервера Apache Solr, позвол… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01496 | Уязвимость функции radeon_atombios_fini() модуля drivers/gpu/drm/radeon/radeon_device.c д… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01495 | Уязвимость функции fromSetWifiGusetBasic() микропрограммного обеспечения маршрутизаторов … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01494 | Уязвимость функции type_show() ядра операционной системы Linux, позволяющая нарушителю ок… | 09.02.2026 | 09.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201706-0361 | The error page mechanism of the Java Servlet Specification requires that, when an error o… | 2024-07-23T19:33:25.866000Z |
| var-201203-0193 | Google Chrome before 17.0.963.65 does not properly perform casts of unspecified variables… | 2024-07-23T19:33:19.436000Z |
| var-200901-0742 | WebKit in Apple Safari before 4.0 does not properly initialize memory for Attr DOM object… | 2024-07-23T19:33:19.956000Z |
| var-202206-1961 | When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification fa… | 2024-07-23T19:33:18.254000Z |
| var-202010-1295 | An out-of-bounds read was addressed with improved input validation. This issue is fixed i… | 2024-07-23T19:33:18.082000Z |
| var-201110-0476 | Use-after-free vulnerability in Google Chrome before 15.0.874.102 allows remote attackers… | 2024-07-23T19:33:14.074000Z |
| var-201911-1410 | Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/mar… | 2024-07-23T19:33:13.621000Z |
| var-202301-0598 | Unproper laxist permissions on the temporary files used by MIME4J TempFileStorageProvider… | 2024-07-23T19:32:41.408000Z |
| var-202301-1527 | A carefully crafted If: request header can cause a memory read, or write of a single zero… | 2024-07-23T19:32:40.354000Z |
| var-202108-1268 | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in… | 2024-07-23T19:32:39.770000Z |
| var-201908-0260 | Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, poten… | 2024-07-23T19:32:07.732000Z |
| var-201203-0188 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2024-07-23T19:32:07.187000Z |
| var-201106-0131 | The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion be… | 2024-07-23T19:32:07.409000Z |
| var-201912-0594 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T19:32:03.577000Z |
| var-200107-0160 | Cisco VPN 3000 series concentrators before 2.5.2(F) allow remote attackers to cause a den… | 2024-07-23T19:32:03.511000Z |
| var-200608-0039 | Integer overflow in AFP Server for Apple Mac OS X 10.3.9 and 10.4.7 allows remote attacke… | 2024-07-23T19:32:02.215000Z |
| var-202205-1953 | A logic issue was addressed with improved state management. This issue is fixed in Securi… | 2024-07-23T19:32:01.924000Z |
| var-201904-1409 | A use after free issue was addressed with improved memory management. This issue affected… | 2024-07-23T19:31:57.625000Z |
| var-201503-0206 | Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP … | 2024-07-23T19:31:57.226000Z |
| var-201007-0943 | WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before… | 2024-07-23T19:31:56.966000Z |
| var-202109-0277 | A logic issue was addressed with improved state management. This issue is fixed in iTunes… | 2024-07-23T19:31:55.560000Z |
| var-201506-0464 | Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h i… | 2024-07-23T19:31:55.698000Z |
| var-201911-1627 | Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, … | 2024-07-23T19:31:48.093000Z |
| var-201503-0055 | The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 befor… | 2024-07-23T19:31:48.325000Z |
| var-200310-0072 | The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code… | 2024-07-23T19:31:47.530000Z |
| var-201901-1006 | In Safari before 11.1.2, iTunes before 12.8 for Windows, iOS before 11.4.1, tvOS before 1… | 2024-07-23T19:31:09.960000Z |
| var-201707-1195 | An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari … | 2024-07-23T19:31:09.882000Z |
| var-202010-1236 | An access issue existed in Content Security Policy. This issue was addressed with improve… | 2024-07-23T19:31:07.854000Z |
| var-201108-0130 | The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not proper… | 2024-07-23T19:31:05.644000Z |
| var-202112-2539 | vim is vulnerable to Out-of-bounds Read. SourceCoster Online Covid Vaccination Scheduler … | 2024-07-23T19:31:04.059000Z |