Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43163 |
N/A
|
md/bitmap: fix GPF in write_page caused by resize race |
Linux |
Linux |
2026-05-06T11:27:41.265Z | 2026-05-06T11:27:41.265Z |
| CVE-2026-43162 |
N/A
|
media: tegra-video: Fix memory leak in __tegra_channel… |
Linux |
Linux |
2026-05-06T11:27:40.580Z | 2026-05-06T11:27:40.580Z |
| CVE-2026-43161 |
N/A
|
iommu/vt-d: Skip dev-iotlb flush for inaccessible PCIe… |
Linux |
Linux |
2026-05-06T11:27:39.881Z | 2026-05-06T11:27:39.881Z |
| CVE-2026-43160 |
N/A
|
mfd: macsmc: Initialize mutex |
Linux |
Linux |
2026-05-06T11:27:39.223Z | 2026-05-06T11:27:39.223Z |
| CVE-2026-43159 |
N/A
|
staging: rtl8723bs: fix null dereference in find_network |
Linux |
Linux |
2026-05-06T11:27:38.541Z | 2026-05-06T11:27:38.541Z |
| CVE-2026-43157 |
N/A
|
octeontx2-af: CGX: fix bitmap leaks |
Linux |
Linux |
2026-05-06T11:27:37.185Z | 2026-05-06T11:27:37.185Z |
| CVE-2026-43156 |
N/A
|
net: usb: pegasus: enable basic endpoint checking |
Linux |
Linux |
2026-05-06T11:27:36.491Z | 2026-05-06T11:27:36.491Z |
| CVE-2026-43155 |
N/A
|
mux: mmio: fix regmap leak on probe failure |
Linux |
Linux |
2026-05-06T11:27:35.800Z | 2026-05-06T11:27:35.800Z |
| CVE-2026-43154 |
N/A
|
erofs: fix incorrect early exits in volume label handling |
Linux |
Linux |
2026-05-06T11:27:35.116Z | 2026-05-06T11:27:35.116Z |
| CVE-2026-43152 |
N/A
|
HID: hid-pl: handle probe errors |
Linux |
Linux |
2026-05-06T11:27:33.736Z | 2026-05-06T11:27:33.736Z |
| CVE-2026-43151 |
N/A
|
Revert "media: iris: Add sanity check for stop streaming" |
Linux |
Linux |
2026-05-06T11:27:33.084Z | 2026-05-06T11:27:33.084Z |
| CVE-2026-43149 |
N/A
|
net: wan/fsl_ucc_hdlc: Fix dma_free_coherent() in uhdl… |
Linux |
Linux |
2026-05-06T11:27:31.708Z | 2026-05-06T11:27:31.708Z |
| CVE-2026-43148 |
N/A
|
powerpc/smp: Add check for kcalloc() failure in parse_… |
Linux |
Linux |
2026-05-06T11:27:30.902Z | 2026-05-06T11:27:30.902Z |
| CVE-2026-43147 |
N/A
|
Revert "PCI/IOV: Add PCI rescan-remove locking when en… |
Linux |
Linux |
2026-05-06T11:27:30.235Z | 2026-05-06T11:27:30.235Z |
| CVE-2026-43146 |
N/A
|
media: iris: Add buffer to list only after successful … |
Linux |
Linux |
2026-05-06T11:27:29.562Z | 2026-05-06T11:27:29.562Z |
| CVE-2026-43145 |
N/A
|
remoteproc: imx_rproc: Fix invalid loaded resource tab… |
Linux |
Linux |
2026-05-06T11:27:28.911Z | 2026-05-06T11:27:28.911Z |
| CVE-2026-43144 |
N/A
|
wifi: brcmfmac: Fix potential kernel oops when probe fails |
Linux |
Linux |
2026-05-06T11:27:28.220Z | 2026-05-06T11:27:28.220Z |
| CVE-2026-43143 |
N/A
|
mfd: core: Add locking around 'mfd_of_node_list' |
Linux |
Linux |
2026-05-06T11:27:27.506Z | 2026-05-06T11:27:27.506Z |
| CVE-2026-43142 |
N/A
|
media: iris: gen1: Destroy internal buffers after FW r… |
Linux |
Linux |
2026-05-06T11:27:26.856Z | 2026-05-06T11:27:26.856Z |
| CVE-2026-43138 |
N/A
|
reset: gpio: suppress bind attributes in sysfs |
Linux |
Linux |
2026-05-06T11:27:24.232Z | 2026-05-06T11:27:24.232Z |
| CVE-2026-43135 |
N/A
|
media: cx23885: Add missing unmap in snd_cx23885_hw_params() |
Linux |
Linux |
2026-05-06T11:27:22.226Z | 2026-05-06T11:27:22.226Z |
| CVE-2026-43132 |
N/A
|
dm-verity: correctly handle dm_bufio_client_create() failure |
Linux |
Linux |
2026-05-06T11:27:20.213Z | 2026-05-06T11:27:20.213Z |
| CVE-2026-43130 |
N/A
|
iommu/vt-d: Flush dev-IOTLB only when PCIe device is a… |
Linux |
Linux |
2026-05-06T11:27:18.825Z | 2026-05-06T11:27:18.825Z |
| CVE-2026-43123 |
N/A
|
fbcon: check return value of con2fb_acquire_newinfo() |
Linux |
Linux |
2026-05-06T11:27:09.553Z | 2026-05-06T11:27:09.553Z |
| CVE-2026-43122 |
N/A
|
ACPI: processor: Update cpuidle driver check in __acpi… |
Linux |
Linux |
2026-05-06T11:27:08.893Z | 2026-05-06T11:27:08.893Z |
| CVE-2026-43121 |
N/A
|
io_uring/zcrx: fix user_ref race between scrub and ref… |
Linux |
Linux |
2026-05-06T11:27:08.216Z | 2026-05-06T11:27:08.216Z |
| CVE-2025-71274 |
N/A
|
rpmsg: core: fix race in driver_override_show() and us… |
Linux |
Linux |
2026-05-06T11:27:07.525Z | 2026-05-06T11:27:07.525Z |
| CVE-2025-71271 |
N/A
|
hfsplus: ensure sb->s_fs_info is always cleaned up |
Linux |
Linux |
2026-05-06T11:27:05.321Z | 2026-05-06T11:27:05.321Z |
| CVE-2026-3442 |
6.1 (3.1)
|
Binutils: gnu binutils: information disclosure or deni… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-15T00:19:02.700Z | 2026-05-06T10:13:23.332Z |
| CVE-2026-43108 |
N/A
|
soc: qcom: pd-mapper: Fix element length in servreg_lo… |
Linux |
Linux |
2026-05-06T07:40:35.854Z | 2026-05-06T07:40:35.854Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2017-2948 |
N/A
|
Adobe Acrobat Reader versions 15.020.20042 and ea… |
n/a |
Adobe Acrobat Reader 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.749Z |
| CVE-2017-2947 |
N/A
|
Adobe Acrobat Reader versions 15.020.20042 and ea… |
n/a |
Adobe Acrobat Reader 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.797Z |
| CVE-2017-2946 |
N/A
|
Adobe Acrobat Reader versions 15.020.20042 and ea… |
n/a |
Adobe Acrobat Reader 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.785Z |
| CVE-2017-2945 |
N/A
|
Adobe Acrobat Reader versions 15.020.20042 and ea… |
n/a |
Adobe Acrobat Reader 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.791Z |
| CVE-2017-2944 |
N/A
|
Adobe Acrobat Reader versions 15.020.20042 and ea… |
n/a |
Adobe Acrobat Reader 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.768Z |
| CVE-2017-2943 |
N/A
|
Adobe Acrobat Reader versions 15.020.20042 and ea… |
n/a |
Adobe Acrobat Reader 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.780Z |
| CVE-2017-2942 |
N/A
|
Adobe Acrobat Reader versions 15.020.20042 and ea… |
n/a |
Adobe Acrobat Reader 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.798Z |
| CVE-2017-2941 |
N/A
|
Adobe Acrobat Reader versions 15.020.20042 and ea… |
n/a |
Adobe Acrobat Reader 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.769Z |
| CVE-2017-2940 |
N/A
|
Adobe Acrobat Reader versions 15.020.20042 and ea… |
n/a |
Adobe Acrobat Reader 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.750Z |
| CVE-2017-2939 |
N/A
|
Adobe Acrobat Reader versions 15.020.20042 and ea… |
n/a |
Adobe Acrobat Reader 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.807Z |
| CVE-2017-2938 |
N/A
|
Adobe Flash Player versions 24.0.0.186 and earlie… |
n/a |
Adobe Flash Player 24.0.0.186 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.798Z |
| CVE-2017-2937 |
N/A
|
Adobe Flash Player versions 24.0.0.186 and earlie… |
n/a |
Adobe Flash Player 24.0.0.186 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.777Z |
| CVE-2017-2936 |
N/A
|
Adobe Flash Player versions 24.0.0.186 and earlie… |
n/a |
Adobe Flash Player 24.0.0.186 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.764Z |
| CVE-2017-2935 |
N/A
|
Adobe Flash Player versions 24.0.0.186 and earlie… |
n/a |
Adobe Flash Player 24.0.0.186 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.739Z |
| CVE-2017-2934 |
N/A
|
Adobe Flash Player versions 24.0.0.186 and earlie… |
n/a |
Adobe Flash Player 24.0.0.186 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.756Z |
| CVE-2017-2933 |
N/A
|
Adobe Flash Player versions 24.0.0.186 and earlie… |
n/a |
Adobe Flash Player 24.0.0.186 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.763Z |
| CVE-2017-2932 |
N/A
|
Adobe Flash Player versions 24.0.0.186 and earlie… |
n/a |
Adobe Flash Player 24.0.0.186 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.765Z |
| CVE-2017-2931 |
N/A
|
Adobe Flash Player versions 24.0.0.186 and earlie… |
n/a |
Adobe Flash Player 24.0.0.186 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.755Z |
| CVE-2017-2930 |
N/A
|
Adobe Flash Player versions 24.0.0.186 and earlie… |
n/a |
Adobe Flash Player 24.0.0.186 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.861Z |
| CVE-2017-2928 |
N/A
|
Adobe Flash Player versions 24.0.0.186 and earlie… |
n/a |
Adobe Flash Player 24.0.0.186 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.795Z |
| CVE-2017-2927 |
N/A
|
Adobe Flash Player versions 24.0.0.186 and earlie… |
n/a |
Adobe Flash Player 24.0.0.186 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.801Z |
| CVE-2017-2926 |
N/A
|
Adobe Flash Player versions 24.0.0.186 and earlie… |
n/a |
Adobe Flash Player 24.0.0.186 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.762Z |
| CVE-2017-2925 |
N/A
|
Adobe Flash Player versions 24.0.0.186 and earlie… |
n/a |
Adobe Flash Player 24.0.0.186 and earlier. |
2017-01-11T04:40:00.000Z | 2024-08-05T14:09:17.796Z |
| CVE-2017-0404 |
N/A
|
An elevation of privilege vulnerability in the ke… |
Google Inc. |
Android |
2017-01-12T20:00:00.000Z | 2024-08-05T13:03:57.099Z |
| CVE-2017-0403 |
N/A
|
An elevation of privilege vulnerability in the ke… |
Google Inc. |
Android |
2017-01-12T20:00:00.000Z | 2024-08-05T13:03:57.058Z |
| CVE-2017-0402 |
N/A
|
An information disclosure vulnerability in lvm/wr… |
Google Inc. |
Android |
2017-01-12T20:00:00.000Z | 2024-08-05T13:03:57.110Z |
| CVE-2017-0401 |
N/A
|
An information disclosure vulnerability in lvm/wr… |
Google Inc. |
Android |
2017-01-12T20:00:00.000Z | 2024-08-05T13:03:57.151Z |
| CVE-2017-0400 |
N/A
|
An information disclosure vulnerability in lvm/wr… |
Google Inc. |
Android |
2017-01-12T20:00:00.000Z | 2024-08-05T13:03:57.025Z |
| CVE-2017-0399 |
N/A
|
An information disclosure vulnerability in lvm/wr… |
Google Inc. |
Android |
2017-01-12T20:00:00.000Z | 2024-08-05T13:03:57.060Z |
| CVE-2017-0397 |
N/A
|
An information disclosure vulnerability in id3/ID… |
Google Inc. |
Android |
2017-01-12T20:00:00.000Z | 2024-08-05T13:03:57.083Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2017-0004 | The Local Security Authority Subsystem Service (LSASS) in Microsoft Windows Vista SP2, Windows Serv… | 2017-01-10T21:59:00.197 | 2026-05-06T22:30:45.220 |
| fkie_cve-2017-0003 | Microsoft Word 2016 and SharePoint Enterprise Server 2016 allow remote attackers to execute arbitra… | 2017-01-10T21:59:00.167 | 2026-05-06T22:30:45.220 |
| fkie_cve-2017-0002 | Microsoft Edge allows remote attackers to bypass the Same Origin Policy via vectors involving the a… | 2017-01-10T21:59:00.133 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9998 | SPIP 3.1.x suffer from a Reflected Cross Site Scripting Vulnerability in /ecrire/exec/info_plugin.p… | 2016-12-17T03:59:00.420 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9997 | SPIP 3.1.x suffers from a Reflected Cross Site Scripting Vulnerability in /ecrire/exec/puce_statut.… | 2016-12-17T03:59:00.407 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9967 | Lack of appropriate exception handling in some receivers of the Telecom application on Samsung Note… | 2016-12-16T09:59:00.450 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9966 | Lack of appropriate exception handling in some receivers of the Telecom application on Samsung Note… | 2016-12-16T09:59:00.420 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9965 | Lack of appropriate exception handling in some receivers of the Telecom application on Samsung Note… | 2016-12-16T09:59:00.403 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9964 | redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF a… | 2016-12-16T09:59:00.373 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9951 | An issue was discovered in Apport before 2.20.4. A malicious Apport crash file can contain a restar… | 2016-12-17T03:59:00.357 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9950 | An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport cras… | 2016-12-17T03:59:00.327 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9949 | An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field an… | 2016-12-17T03:59:00.297 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9942 | Heap-based buffer overflow in ultra.c in LibVNCClient in LibVNCServer before 0.9.11 allows remote s… | 2016-12-31T18:59:00.180 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9941 | Heap-based buffer overflow in rfbproto.c in LibVNCClient in LibVNCServer before 0.9.11 allows remot… | 2016-12-31T18:59:00.133 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9938 | An issue was discovered in Asterisk Open Source 11.x before 11.25.1, 13.x before 13.13.1, and 14.x … | 2016-12-12T21:59:01.617 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9937 | An issue was discovered in Asterisk Open Source 13.12.x and 13.13.x before 13.13.1 and 14.x before … | 2016-12-12T21:59:00.303 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9936 | The unserialize implementation in ext/standard/var.c in PHP 7.x before 7.0.14 allows remote attacke… | 2017-01-04T20:59:00.607 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9935 | The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 al… | 2017-01-04T20:59:00.573 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9934 | ext/wddx/wddx.c in PHP before 5.6.28 and 7.x before 7.0.13 allows remote attackers to cause a denia… | 2017-01-04T20:59:00.527 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9933 | Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Libr… | 2017-01-04T20:59:00.480 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9923 | Quick Emulator (Qemu) built with the 'chardev' backend support is vulnerable to a use after free is… | 2016-12-23T22:59:00.580 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9921 | Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divid… | 2016-12-23T22:59:00.550 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9920 | steps/mail/sendmail.inc in Roundcube before 1.1.7 and 1.2.x before 1.2.3, when no SMTP server is co… | 2016-12-08T18:59:00.200 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9919 | The icmp6_send function in net/ipv6/icmp.c in the Linux kernel through 4.8.12 omits a certain check… | 2016-12-08T17:59:03.867 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9918 | In BlueZ 5.42, an out-of-bounds read was identified in "packet_hexdump" function in "monitor/packet… | 2016-12-08T08:59:04.740 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9917 | In BlueZ 5.42, a buffer overflow was observed in "read_n" function in "tools/hcidump.c" source file… | 2016-12-08T08:59:03.617 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9916 | Memory leak in hw/9pfs/9p-proxy.c in QEMU (aka Quick Emulator) allows local privileged guest OS use… | 2016-12-29T22:59:00.700 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9915 | Memory leak in hw/9pfs/9p-handle.c in QEMU (aka Quick Emulator) allows local privileged guest OS us… | 2016-12-29T22:59:00.667 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9914 | Memory leak in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to … | 2016-12-29T22:59:00.637 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9913 | Memory leak in the v9fs_device_unrealize_common function in hw/9pfs/9p.c in QEMU (aka Quick Emulato… | 2016-12-29T22:59:00.620 | 2026-05-06T22:30:45.220 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-p63m-cmvw-gf7r |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: mm/kasan: fix double free for … | 2026-04-27T18:32:09Z | 2026-05-06T21:31:30Z |
| ghsa-gj33-f2q3-mjhg |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: sched: act_csum: validate… | 2026-04-25T09:30:28Z | 2026-05-06T21:31:30Z |
| ghsa-f822-mpgr-7cqx |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_multiport: valid… | 2026-04-25T09:30:28Z | 2026-05-06T21:31:30Z |
| ghsa-cxv6-chw7-mhrh |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: driver core: enforce device_lo… | 2026-04-27T18:32:09Z | 2026-05-06T21:31:30Z |
| ghsa-9qrw-cmg5-g8vq |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: EDAC/mc: Fix error path orderi… | 2026-04-27T18:32:09Z | 2026-05-06T21:31:30Z |
| ghsa-3mf8-6wc5-2f9c |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: igb: remove napi_synchronize()… | 2026-04-27T18:32:09Z | 2026-05-06T21:31:30Z |
| ghsa-3j3v-v8vh-9mw9 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: firmware: thead: Fix buffer ov… | 2026-04-27T18:32:09Z | 2026-05-06T21:31:30Z |
| ghsa-25g2-2jj3-xvxx |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - limit RX SG e… | 2026-04-25T09:30:28Z | 2026-05-06T21:31:30Z |
| ghsa-v758-4p42-wqcm |
7.5 (3.1)
8.7 (4.0)
|
This vulnerability exists in Quantum Networks router due to improper access control and insecure de… | 2026-04-21T12:30:24Z | 2026-05-06T21:31:29Z |
| ghsa-mqx2-c63m-7p93 |
8.8 (3.1)
7.6 (4.0)
|
This vulnerability exists in Quantum Networks router due to lack of enforcement of strong password … | 2026-04-21T12:30:24Z | 2026-05-06T21:31:29Z |
| ghsa-hmg2-5h4j-37m9 |
8.2 (3.1)
|
A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vu… | 2026-04-01T15:31:15Z | 2026-05-06T21:31:29Z |
| ghsa-g4g9-h6f9-v5x2 |
7.5 (3.1)
|
A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity v… | 2026-04-01T15:31:15Z | 2026-05-06T21:31:29Z |
| ghsa-g495-4jqx-cp59 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ext4: convert inline data to e… | 2026-04-22T15:31:41Z | 2026-05-06T21:31:29Z |
| ghsa-6c8g-q98p-w229 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: fix param_ctx … | 2026-04-22T15:31:41Z | 2026-05-06T21:31:29Z |
| ghsa-4jw8-cp5g-24j2 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ext4: replace BUG_ON with prop… | 2026-04-22T15:31:41Z | 2026-05-06T21:31:29Z |
| ghsa-29vm-h87p-hcp4 |
6.1 (3.1)
5.1 (4.0)
|
HTML injection vulnerability in PHP Point of Sale v19.4. This vulnerability allows an attacker to r… | 2026-04-21T18:31:57Z | 2026-05-06T21:31:29Z |
| ghsa-2hx3-vp6r-mg3f |
7.3 (4.0)
|
Kiota: Code Generation Literal Injection | 2026-04-14T23:39:41Z | 2026-05-06T21:24:58Z |
| ghsa-f5p7-9fr5-8jmj |
5.9 (3.1)
|
Granian vulnerable to DoS via WSGI response header panic | 2026-05-06T21:24:56Z | 2026-05-06T21:24:56Z |
| ghsa-6x2q-h3cr-8j2h |
3.7 (3.1)
6.3 (4.0)
|
Traefik: A timing side-channel vulnerability allows for valid username enumeration via BasicAuth mi… | 2026-04-24T20:36:41Z | 2026-05-06T21:24:51Z |
| ghsa-xhjw-95fp-8vgq |
6.4 (3.1)
4.8 (4.0)
|
Traefik Kubernetes CRD allows unauthorized cross-namespace middleware binding | 2026-04-24T20:12:10Z | 2026-05-06T21:24:47Z |
| ghsa-6jwx-7vp4-9847 |
8.2 (3.1)
7.8 (4.0)
|
Traefik has an StripPrefixRegex Middleware Authorization Bypass via Path/RawPath Desync | 2026-04-24T16:37:53Z | 2026-05-06T21:24:44Z |
| ghsa-5m6w-wvh7-57vm |
10.0 (3.1)
7.8 (4.0)
|
Traefik: Pre-authentication decision bypass due to forwarded alias spoofing | 2026-04-24T16:32:34Z | 2026-05-06T21:24:39Z |
| ghsa-6384-m2mw-rf54 |
10.0 (3.1)
7.8 (4.0)
|
Traefik's ForwardAuth trustForwardHeader=false allows spoofed X-Forwarded-Prefix to bypass authentication | 2026-04-24T16:31:24Z | 2026-05-06T21:24:33Z |
| ghsa-4g5x-2jfc-xm98 |
6.5 (3.1)
6.3 (4.0)
|
OpenClaw: Tlon media downloads can bypass core safety limits and exhaust disk | 2026-04-07T18:10:41Z | 2026-05-06T21:23:08Z |
| ghsa-p9fm-f462-ggrg |
6.5 (3.1)
2.3 (4.0)
|
Rails Active Storage has a possible DoS vulnerability in proxy mode via multi-range requests | 2026-03-25T21:04:50Z | 2026-05-06T21:23:02Z |
| ghsa-wpc6-37g7-8q4w |
7.3 (3.1)
6.3 (4.0)
|
OpenClaw: Shell init-file options could satisfy exec allowlist script matching | 2026-04-07T18:14:35Z | 2026-05-06T21:22:43Z |
| ghsa-cwf8-44x6-32c2 |
9.6 (3.1)
8.7 (4.0)
|
OpenClaw: OpenShell Mirror Sync — Sandbox Escape via Unrestricted File Sync + Symlink Traversal | 2026-04-03T02:49:14Z | 2026-05-06T21:22:37Z |
| ghsa-vrg7-482j-p6f6 |
7.5 (3.1)
|
Granian vulnerable to unauthenticated DoS via WebSocket subprotocol header panic | 2026-05-06T21:20:48Z | 2026-05-06T21:20:48Z |
| ghsa-6xx2-m8wv-756h |
8.7 (4.0)
|
Low-privileged Grav API users can create super-admin accounts via blueprint-upload | 2026-05-06T21:19:21Z | 2026-05-06T21:19:21Z |
| ghsa-x597-9fr4-5857 |
6.2 (4.0)
|
Hugo's Node tool execution allows file system access outside the project directory | 2026-05-06T20:59:23Z | 2026-05-06T20:59:23Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-58 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `MapStage`… | tensorflow-cpu | 2022-02-03T13:15:00Z | 2022-03-09T00:17:31.053811Z |
| pysec-2022-57 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `StringNGr… | tensorflow-cpu | 2022-02-03T12:15:00Z | 2022-03-09T00:17:30.939427Z |
| pysec-2022-56 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `ThreadPoo… | tensorflow-cpu | 2022-02-03T12:15:00Z | 2022-03-09T00:17:30.817713Z |
| pysec-2022-55 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of shape infe… | tensorflow-cpu | 2022-02-03T12:15:00Z | 2022-03-09T00:17:30.689879Z |
| pysec-2022-54 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Fractiona… | tensorflow-cpu | 2022-02-03T11:15:00Z | 2022-03-09T00:17:30.562457Z |
| pysec-2022-53 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `UnravelIn… | tensorflow-cpu | 2022-02-03T13:15:00Z | 2022-03-09T00:17:30.437565Z |
| pysec-2022-52 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of shape infe… | tensorflow-cpu | 2022-02-03T11:15:00Z | 2022-03-09T00:17:30.293594Z |
| pysec-2022-51 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of shape infe… | tensorflow-cpu | 2022-02-03T11:15:00Z | 2022-03-09T00:17:30.181517Z |
| pysec-2022-50 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Dequantiz… | tensorflow-cpu | 2022-02-03T11:15:00Z | 2022-03-09T00:17:30.059421Z |
| pysec-2022-49 |
|
Tensorflow is an Open Source Machine Learning Framework. The estimator for the cost of so… | tensorflow-cpu | 2022-02-03T13:15:00Z | 2022-03-09T00:17:29.922594Z |
| pysec-2022-48 |
|
Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed i… | protobuf | 2022-01-26T14:15:00Z | 2022-03-09T00:17:03.282830Z |
| pysec-2022-47 |
|
OnionShare is an open source tool that lets you securely and anonymously share files, hos… | onionshare-cli | 2022-01-18T20:15:00Z | 2022-03-09T00:16:43.504149Z |
| pysec-2022-46 |
|
OnionShare is an open source tool that lets you securely and anonymously share files, hos… | onionshare-cli | 2022-01-18T22:15:00Z | 2022-03-09T00:16:43.452903Z |
| pysec-2022-45 |
|
OnionShare is an open source tool that lets you securely and anonymously share files, hos… | onionshare-cli | 2022-01-18T23:15:00Z | 2022-03-09T00:16:43.398323Z |
| pysec-2022-44 |
|
OnionShare is an open source tool that lets you securely and anonymously share files, hos… | onionshare-cli | 2022-01-18T22:15:00Z | 2022-03-09T00:16:43.325615Z |
| pysec-2022-43 |
|
OnionShare is an open source tool that lets you securely and anonymously share files, hos… | onionshare-cli | 2022-01-18T23:15:00Z | 2022-03-09T00:16:43.273792Z |
| pysec-2022-42 |
|
OnionShare is an open source tool that lets you securely and anonymously share files, hos… | onionshare-cli | 2022-01-18T22:15:00Z | 2022-03-09T00:16:43.223227Z |
| pysec-2022-41 |
|
OnionShare is an open source tool that lets you securely and anonymously share files, hos… | onionshare-cli | 2022-01-18T23:15:00Z | 2022-03-09T00:16:43.171379Z |
| pysec-2022-40 |
|
OnionShare is an open source tool that lets you securely and anonymously share files, hos… | onionshare-cli | 2022-01-18T22:15:00Z | 2022-03-09T00:16:43.116991Z |
| pysec-2022-39 |
|
OnionShare is an open source tool that lets you securely and anonymously share files, hos… | onionshare-cli | 2022-01-18T22:15:00Z | 2022-03-09T00:16:43.060055Z |
| pysec-2021-870 |
|
Incomplete string comparison vulnerability exits in cvxopt.org cvxop <= 1.2.6 in APIs (cv… | cvxopt | 2021-12-17T21:15:00Z | 2022-03-09T00:15:59.735428Z |
| pysec-2022-38 |
|
An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable… | cobbler | 2022-02-20T18:15:00Z | 2022-03-09T00:15:58.984313Z |
| pysec-2022-37 |
|
An issue was discovered in Cobbler before 3.3.1. In the templar.py file, the function che… | cobbler | 2022-02-19T00:15:00Z | 2022-03-09T00:15:58.932039Z |
| pysec-2022-36 |
|
Apache Superset up to and including 1.3.2 allowed for registered database connections pas… | apache-superset | 2022-02-01T14:15:00Z | 2022-03-09T00:15:53.337058Z |
| pysec-2022-35 |
|
Weblate is a copyleft software web-based continuous localization system. Versions prior t… | weblate | 2022-02-25T21:15:00Z | 2022-03-08T17:35:37.351702Z |
| pysec-2022-34 |
|
HTTPie is a command-line HTTP client. HTTPie has the practical concept of sessions, which… | httpie | 2022-03-07T23:15:00Z | 2022-03-08T02:44:28.415437Z |
| pysec-2022-33 |
|
b2-sdk-python is a python library to access cloud storage provided by backblaze. Linux an… | b2sdk | 2022-02-23T23:15:00Z | 2022-03-07T17:33:46.032301Z |
| pysec-2022-32 |
|
B2 Command Line Tool is the official command line tool for the backblaze cloud storage se… | b2 | 2022-02-23T23:15:00Z | 2022-03-07T17:33:45.997096Z |
| pysec-2022-31 |
|
The package weblate from 0 and before 4.11.1 are vulnerable to Remote Code Execution (RCE… | weblate | 2022-03-04T20:15:00Z | 2022-03-04T21:31:07.631627Z |
| pysec-2022-30 |
|
In Apache Airflow, prior to version 2.2.4, some example DAGs did not properly sanitize us… | apache-airflow | 2022-02-25T09:15:00Z | 2022-03-04T21:27:14.083744Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32912 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.472406Z |
| gsd-2024-32911 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.233328Z |
| gsd-2024-32910 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.448423Z |
| gsd-2024-32909 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.308144Z |
| gsd-2024-32908 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.352519Z |
| gsd-2024-32907 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.396658Z |
| gsd-2024-32906 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.421619Z |
| gsd-2024-32905 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.364842Z |
| gsd-2024-32904 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.244379Z |
| gsd-2024-32903 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.473336Z |
| gsd-2024-32902 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.471532Z |
| gsd-2024-32901 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.363798Z |
| gsd-2024-32900 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.524250Z |
| gsd-2024-32899 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.462646Z |
| gsd-2024-32898 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.343049Z |
| gsd-2024-32897 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.501683Z |
| gsd-2024-32896 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.241389Z |
| gsd-2024-32895 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.313828Z |
| gsd-2024-32894 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.292073Z |
| gsd-2024-32893 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.287808Z |
| gsd-2024-32892 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.349313Z |
| gsd-2024-32891 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.415989Z |
| gsd-2024-32890 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.508098Z |
| gsd-2024-32889 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.306793Z |
| gsd-2024-32888 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.335293Z |
| gsd-2024-32887 | Sidekiq is simple, efficient background processing for Ruby. Sidekiq is reflected XSS vul… | 2024-04-20T05:02:00.269921Z |
| gsd-2024-32886 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.502340Z |
| gsd-2024-32885 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.303905Z |
| gsd-2024-32884 | gitoxide is a pure Rust implementation of Git. `gix-transport` does not check the usernam… | 2024-04-20T05:02:00.398503Z |
| gsd-2024-32883 | MCUboot is a secure bootloader for 32-bits microcontrollers. MCUboot uses a TLV (tag-leng… | 2024-04-20T05:02:00.245397Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2403 | Malicious code in polymarkets-sdk (PyPI) | 2026-04-01T15:30:14Z | 2026-04-01T16:27:32Z |
| mal-2026-870 | Malicious code in b10connoisseur (PyPI) | 2026-02-12T12:10:26Z | 2026-04-01T12:28:04Z |
| mal-2026-1407 | Malicious code in thief-utils (PyPI) | 2026-03-13T08:43:52Z | 2026-04-01T12:28:04Z |
| mal-2026-1406 | Malicious code in makenotion-ppetest (PyPI) | 2026-03-13T08:13:53Z | 2026-04-01T12:28:04Z |
| mal-2026-1365 | Malicious code in unibody (npm) | 2026-03-12T02:18:38Z | 2026-04-01T12:28:04Z |
| mal-2026-1274 | Malicious code in test-mal-npm-pkg-not-local (npm) | 2026-03-06T14:26:46Z | 2026-04-01T12:28:04Z |
| mal-2026-1273 | Malicious code in test-mal-npm-pkg-local (npm) | 2026-03-06T14:26:46Z | 2026-04-01T12:28:04Z |
| mal-2026-1163 | Malicious code in xpack-video-submission (npm) | 2026-03-03T04:08:35Z | 2026-04-01T12:28:04Z |
| mal-2026-1161 | Malicious code in xpack-sui (npm) | 2026-03-03T04:08:34Z | 2026-04-01T12:28:04Z |
| mal-2026-1160 | Malicious code in xpack-subscription (npm) | 2026-03-03T04:08:34Z | 2026-04-01T12:28:04Z |
| mal-2026-1159 | Malicious code in xpack-per-device (npm) | 2026-03-03T04:08:34Z | 2026-04-01T12:28:04Z |
| mal-2026-1158 | Malicious code in xpack-arc-gateway (npm) | 2026-03-03T04:08:35Z | 2026-04-01T12:28:04Z |
| mal-2026-1143 | Malicious code in wisecloudsecrets (PyPI) | 2026-03-02T18:48:25Z | 2026-04-01T12:28:04Z |
| mal-2026-1142 | Malicious code in wisecloudcyberark (PyPI) | 2026-03-02T18:48:31Z | 2026-04-01T12:28:04Z |
| mal-2026-1141 | Malicious code in identityapi (PyPI) | 2026-03-02T18:47:02Z | 2026-04-01T12:28:04Z |
| mal-2026-1140 | Malicious code in heimdal-credentials (PyPI) | 2026-03-02T18:48:28Z | 2026-04-01T12:28:04Z |
| mal-2026-1139 | Malicious code in fwk-amigapython-rest-server (PyPI) | 2026-03-02T18:48:10Z | 2026-04-01T12:28:04Z |
| mal-2026-1138 | Malicious code in fwk-amigapython-amigamlserver (PyPI) | 2026-03-02T18:48:18Z | 2026-04-01T12:28:04Z |
| mal-2026-1137 | Malicious code in fwk-amigapython (PyPI) | 2026-03-02T18:48:22Z | 2026-04-01T12:28:04Z |
| mal-2026-1136 | Malicious code in amigapythonupdater (PyPI) | 2026-03-02T18:49:05Z | 2026-04-01T12:28:04Z |
| mal-2025-2008 | Malicious code in usvr-agent (PyPI) | 2025-03-03T13:45:33Z | 2026-04-01T12:28:04Z |
| mal-2025-191807 | Malicious code in package-346234294 (PyPI) | 2025-07-13T17:51:22Z | 2026-04-01T12:28:04Z |
| mal-2024-12290 | Malicious code in ibmodules (PyPI) | 2024-08-23T22:55:41Z | 2026-04-01T12:28:04Z |
| mal-2026-784 | Malicious code in monkey-tags (npm) | 2026-02-06T02:07:02Z | 2026-04-01T12:28:03Z |
| mal-2026-1362 | Malicious code in praxis-scripts (npm) | 2026-03-12T02:18:38Z | 2026-04-01T12:28:03Z |
| mal-2026-1361 | Malicious code in pcl-build-docroot (npm) | 2026-03-12T02:18:38Z | 2026-04-01T12:28:03Z |
| mal-2026-1360 | Malicious code in npm-doc-build (npm) | 2026-03-12T02:07:51Z | 2026-04-01T12:28:03Z |
| mal-2026-1202 | Malicious code in mvn-runtime (npm) | 2026-03-03T06:48:16Z | 2026-04-01T12:28:03Z |
| mal-2026-1100 | Malicious code in ng-vzbootstrap (npm) | 2026-03-01T17:14:48Z | 2026-04-01T12:28:03Z |
| mal-2026-1050 | Malicious code in launch-darkly-js (npm) | 2026-02-26T20:10:47Z | 2026-04-01T12:28:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1361 | Cisco Meraki MX: Schwachstelle ermöglicht Denial of Service | 2025-06-19T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1360 | Ubiquiti UniFi Network Application: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-06-19T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1359 | IBM Security Guardium: Schwachstelle ermöglicht Offenlegung oder Manipulation von Informationen | 2025-06-19T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1358 | Grafana: Schwachstelle ermöglicht Denial of Service | 2025-06-19T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1357 | Kubernetes: Schwachstelle ermöglicht umgehen von Sicherheitsmechanismen. | 2025-06-19T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1353 | Moodle: Mehrere Schwachstellen | 2025-06-17T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1338 | Red Hat Enterprise Linux (freeIPA): Schwachstelle ermöglicht Privilegieneskalation | 2025-06-17T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1333 | Erlang/OTP: Schwachstelle ermöglicht Manipulation von Dateien | 2025-06-16T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1030 | Intel Prozessoren: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-0877 | Redis: Schwachstelle ermöglicht Denial of Service | 2025-04-23T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-0426 | libxml2: Mehrere Schwachstellen ermöglichen Denial of Service | 2017-05-18T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-0283 | Golang Go: Mehrere Schwachstellen | 2025-02-05T23:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-0111 | Golang Go: Mehrere Schwachstellen | 2025-01-16T23:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-0109 | Red Hat Enterprise Linux (IPA): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-01-15T23:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2024-3746 | libxml2: Schwachstelle ermöglicht XXE Angriffe | 2024-12-23T23:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2024-3397 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-11-10T23:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2024-1888 | Linux Kernel: Mehrere Schwachstellen | 2024-08-20T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2024-1737 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2024-07-30T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2024-1326 | Red Hat Enterprise Linux (FreeIPA): Mehrere Schwachstellen | 2024-06-10T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2024-1025 | Linux Kernel: Mehrere Schwachstellen | 2024-05-05T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2024-0561 | Linux Kernel: Mehrere Schwachstellen | 2024-03-05T23:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2024-0549 | Linux Kernel: Mehrere Schwachstellen | 2024-03-04T23:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2023-3223 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-12-27T23:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2023-2828 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-11-05T23:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2023-1842 | Samba: Mehrere Schwachstellen | 2023-07-19T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2023-1799 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-07-18T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2023-0962 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-04-13T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2023-0571 | systemd: Schwachstelle ermöglicht Privilegieneskalation | 2023-03-05T23:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2022-2384 | systemd: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-12-21T23:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2022-2365 | Samba: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2022-12-18T23:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-349-12 | Siemens Parasolid | 2022-12-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-349-10 | Siemens APOGEE/TALON Field Panels | 2022-12-15T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-349-08 | Siemens Polarion ALM | 2022-12-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-349-07 | Siemens Simcenter STAR-CCM+ | 2022-12-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-349-04 | Siemens SCALANCE Products | 2022-12-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-349-03 | Siemens Multiple Denial of Service Vulnerabilities in Industrial Products | 2022-12-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-314-09 | Siemens Teamcenter Visualization and JT2Go | 2022-11-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-314-06 | Siemens QMS Automotive | 2022-11-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-314-02 | Siemens Web Server Login Page of Industrial Controllers | 2022-11-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-286-09 | Siemens SICAM P850 and P855 Devices | 2022-10-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-286-08 | Siemens SCALANCE and RUGGEDCOM Devices | 2022-10-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-258-03 | Siemens RUGGEDCOM ROS | 2022-09-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-195-01 | Siemens SCALANCE X Switch Devices | 2022-07-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-167-11 | Siemens Xpedition Designer | 2022-06-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-132-15 | Siemens OpenV2G | 2022-05-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-132-14 | Siemens Simcenter Femap | 2022-05-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-132-12 | Siemens Industrial Products | 2022-05-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-132-11 | Siemens SIMATIC CP 44x-1 RNA | 2022-05-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-132-09 | Siemens JT2GO and Teamcenter Visualization | 2022-05-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-132-07 | Siemens SICAM P850 and SICAM P855 | 2022-05-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-17 | Siemens Mendix | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-15 | Siemens Simcenter Femap | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-14 | Siemens SIMATIC STEP 7 (TIA Portal) | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-11 | Siemens SIMATIC Energy Manager | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-10 | Siemens SICAM A8000 | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-09 | Siemens SCALANCE X-300 Switches | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-08 | Siemens SCALANCE W1700 | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-13 | Siemens Mendix | 2022-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-11 | Siemens SINUMERIK MC | 2022-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-10 | Siemens Simcenter Femap | 2022-02-17T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-nd-tlsvld-tbaqlp3n | Cisco Nexus Dashboard SSL Certificate Validation Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-nd-tlsvld-TbAQLp3N | Cisco Nexus Dashboard SSL Certificate Validation Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ise-lifetime-pwd-gpcs76mb | Cisco Identity Services Engine Administrator Password Lifetime Expiration Issue | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ise-lifetime-pwd-GpCs76mb | Cisco Identity Services Engine Administrator Password Lifetime Expiration Issue | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-iotcc-xss-wqrclrvd | Cisco IoT Control Center Cross-Site Scripting Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-iotcc-xss-WQrCLRVd | Cisco IoT Control Center Cross-Site Scripting Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ise-saml-nuukmpf9 | Cisco Identity Services Engine Authentication Bypass Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-07-13T14:42:14+00:00 |
| cisco-sa-ISE-SAML-nuukMPf9 | Cisco Identity Services Engine Authentication Bypass Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-07-13T14:42:14+00:00 |
| cisco-sa-ucm-timing-jvbhecok | Cisco Unified Communications Products Timing Attack Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-ucm-timing-JVbHECOK | Cisco Unified Communications Products Timing Attack Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-ucm-file-read-qgjhec3a | Cisco Unified Communications Manager Arbitrary File Read Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-ucm-file-read-qgjhEc3A | Cisco Unified Communications Manager Arbitrary File Read Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-ucm-access-dmkvv2dy | Cisco Unified Communications Products Access Control Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-ucm-access-dMKvV2DY | Cisco Unified Communications Products Access Control Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-roomos-infodisc-yotz9ct7 | Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-roomos-infodisc-YOTz9Ct7 | Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-onprem-privesc-tp6unzos | Cisco Smart Software Manager On-Prem Denial of Service Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-onprem-privesc-tP6uNZOS | Cisco Smart Software Manager On-Prem Denial of Service Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-cucm-xss-rgh7mpka | Cisco Unified Communications Products Cross-Site Scripting Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-cucm-xss-kskd5yfa | Cisco Unified Communications Products Cross-Site Scripting Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-cucm-xss-ksKd5yfA | Cisco Unified Communications Products Cross-Site Scripting Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-cucm-xss-RgH7MpKA | Cisco Unified Communications Products Cross-Site Scripting Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-cucm-imp-afr-ybflnyzd | Cisco Unified Communications Products Arbitrary File Read Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-cucm-imp-afr-YBFLNyzd | Cisco Unified Communications Products Arbitrary File Read Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-asdm-logging-jnloy422 | Cisco Adaptive Security Device Manager Information Disclosure Vulnerability | 2022-01-12T16:00:00+00:00 | 2022-06-29T21:50:47+00:00 |
| cisco-sa-asdm-logging-jnLOY422 | Cisco Adaptive Security Device Manager Information Disclosure Vulnerability | 2022-01-12T16:00:00+00:00 | 2022-06-29T21:50:47+00:00 |
| cisco-sa-cspc-multi-xss-tydfjhwb | Cisco Common Services Platform Collector Cross-Site Scripting Vulnerabilities | 2022-05-18T16:00:00+00:00 | 2022-06-28T14:43:56+00:00 |
| cisco-sa-cspc-multi-xss-tyDFjhwb | Cisco Common Services Platform Collector Cross-Site Scripting Vulnerabilities | 2022-05-18T16:00:00+00:00 | 2022-06-28T14:43:56+00:00 |
| cisco-sa-asasfr-cmd-inject-pe4gfdg | Cisco FirePOWER Software for ASA FirePOWER Module Command Injection Vulnerability | 2022-06-22T16:00:00+00:00 | 2022-06-22T16:00:00+00:00 |
| cisco-sa-asasfr-cmd-inject-PE4GfdG | Cisco FirePOWER Software for ASA FirePOWER Module Command Injection Vulnerability | 2022-06-22T16:00:00+00:00 | 2022-06-22T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2023-53248 | drm/amdgpu: install stub fence into potential unused fence pointers | 2025-09-02T00:00:00.000Z | 2026-03-31T15:11:19.000Z |
| msrc_cve-2024-58100 | bpf: check changes_pkt_data property for extension programs | 2025-05-02T00:00:00.000Z | 2026-03-31T15:11:12.000Z |
| msrc_cve-2022-50467 | scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID | 2025-10-02T00:00:00.000Z | 2026-03-31T15:11:04.000Z |
| msrc_cve-2024-50073 | tty: n_gsm: Fix use-after-free in gsm_cleanup_mux | 2024-10-01T07:00:00.000Z | 2026-03-31T15:10:59.000Z |
| msrc_cve-2024-35939 | dma-direct: Leak pages on dma_set_decrypted() failure | 2024-05-02T07:00:00.000Z | 2026-03-31T15:10:58.000Z |
| msrc_cve-2023-53247 | btrfs: set_page_extent_mapped after read_folio in btrfs_cont_expand | 2025-09-02T00:00:00.000Z | 2026-03-31T15:10:58.000Z |
| msrc_cve-2024-58098 | bpf: track changes_pkt_data property for global functions | 2025-05-02T00:00:00.000Z | 2026-03-31T15:10:48.000Z |
| msrc_cve-2026-0716 | Libsoup: out-of-bounds read in libsoup websocket frame processing | 2026-01-02T00:00:00.000Z | 2026-03-31T15:10:42.000Z |
| msrc_cve-2024-49897 | drm/amd/display: Check phantom_stream before it is used | 2024-10-01T07:00:00.000Z | 2026-03-31T15:10:36.000Z |
| msrc_cve-2023-52732 | ceph: blocklist the kclient when receiving corrupted snap trace | 2024-05-02T07:00:00.000Z | 2026-03-31T15:10:36.000Z |
| msrc_cve-2023-53240 | xsk: check IFF_UP earlier in Tx path | 2025-09-02T00:00:00.000Z | 2026-03-31T15:10:35.000Z |
| msrc_cve-2023-53105 | net/mlx5e: Fix cleanup null-ptr deref on encap lock | 2025-05-02T00:00:00.000Z | 2026-03-31T15:10:31.000Z |
| msrc_cve-2026-23100 | mm/hugetlb: fix hugetlb_pmd_shared() | 2026-02-02T00:00:00.000Z | 2026-03-31T15:10:18.000Z |
| msrc_cve-2024-50009 | cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value | 2024-10-01T07:00:00.000Z | 2026-03-31T15:10:15.000Z |
| msrc_cve-2023-52671 | drm/amd/display: Fix hang/underflow when transitioning to ODM4:1 | 2024-05-02T07:00:00.000Z | 2026-03-31T15:10:14.000Z |
| msrc_cve-2023-53221 | bpf: Fix memleak due to fentry attach failure | 2025-09-02T00:00:00.000Z | 2026-03-31T15:10:13.000Z |
| msrc_cve-2022-49833 | btrfs: zoned: clone zoned device info when cloning a device | 2025-05-02T00:00:00.000Z | 2026-03-31T15:10:06.000Z |
| msrc_cve-2024-36009 | ax25: Fix netdev refcount issue | 2024-05-02T07:00:00.000Z | 2026-03-31T15:09:53.000Z |
| msrc_cve-2023-53218 | rxrpc: Make it so that a waiting process can be aborted | 2025-09-02T00:00:00.000Z | 2026-03-31T15:09:51.000Z |
| msrc_cve-2024-56719 | net: stmmac: fix TSO DMA API usage causing oops | 2024-12-02T00:00:00.000Z | 2026-03-31T15:09:49.000Z |
| msrc_cve-2026-4438 | gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames | 2026-03-02T00:00:00.000Z | 2026-03-31T15:09:47.000Z |
| msrc_cve-2022-49829 | drm/scheduler: fix fence ref counting | 2025-05-02T00:00:00.000Z | 2026-03-31T15:09:42.000Z |
| msrc_cve-2024-36000 | mm/hugetlb: fix missing hugetlb_lock for resv uncharge | 2024-05-02T07:00:00.000Z | 2026-03-31T15:09:32.000Z |
| msrc_cve-2025-39829 | trace/fgraph: Fix the warning caused by missing unregister notifier | 2025-09-02T00:00:00.000Z | 2026-03-31T15:09:30.000Z |
| msrc_cve-2024-42122 | drm/amd/display: Add NULL pointer check for kzalloc | 2024-07-01T07:00:00.000Z | 2026-03-31T15:09:29.000Z |
| msrc_cve-2024-26607 | drm/bridge: sii902x: Fix probing race issue | 2024-02-02T08:00:00.000Z | 2026-03-31T15:09:28.000Z |
| msrc_cve-2026-4437 | gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response | 2026-03-02T00:00:00.000Z | 2026-03-31T15:09:24.000Z |
| msrc_cve-2024-38628 | usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind. | 2024-06-02T07:00:00.000Z | 2026-03-31T15:09:22.000Z |
| msrc_cve-2025-37822 | riscv: uprobes: Add missing fence.i after building the XOL buffer | 2025-05-02T00:00:00.000Z | 2026-03-31T15:09:18.000Z |
| msrc_cve-2024-35956 | btrfs: qgroup: fix qgroup prealloc rsv leak in subvolume operations | 2024-05-02T07:00:00.000Z | 2026-03-31T15:09:08.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15583-1 | cJSON-devel-1.7.19-1.1 on GA media | 2025-09-29T00:00:00Z | 2025-09-29T00:00:00Z |
| opensuse-su-2025:15582-1 | tree-sitter-ruby-0.23.1-2.1 on GA media | 2025-09-26T00:00:00Z | 2025-09-26T00:00:00Z |
| opensuse-su-2025:15581-1 | traefik2-2.11.29-2.1 on GA media | 2025-09-26T00:00:00Z | 2025-09-26T00:00:00Z |
| opensuse-su-2025:15580-1 | postgresql17-17.6-2.1 on GA media | 2025-09-26T00:00:00Z | 2025-09-26T00:00:00Z |
| opensuse-su-2025:15579-1 | openbao-2.4.1-1.1 on GA media | 2025-09-26T00:00:00Z | 2025-09-26T00:00:00Z |
| opensuse-su-2025:15578-1 | chromedriver-140.0.7339.207-1.1 on GA media | 2025-09-26T00:00:00Z | 2025-09-26T00:00:00Z |
| opensuse-su-2025:15577-1 | krita-5.2.13-1.1 on GA media | 2025-09-25T00:00:00Z | 2025-09-25T00:00:00Z |
| opensuse-su-2025:15576-1 | govulncheck-vulndb-0.0.20250924T192141-1.1 on GA media | 2025-09-25T00:00:00Z | 2025-09-25T00:00:00Z |
| opensuse-su-2025:15575-1 | avahi-0.8-40.1 on GA media | 2025-09-24T00:00:00Z | 2025-09-24T00:00:00Z |
| opensuse-su-2025:15574-1 | govulncheck-vulndb-0.0.20250922T204835-1.1 on GA media | 2025-09-23T00:00:00Z | 2025-09-23T00:00:00Z |
| opensuse-su-2025:15573-1 | expat-2.7.2-1.1 on GA media | 2025-09-23T00:00:00Z | 2025-09-23T00:00:00Z |
| opensuse-su-2025:15572-1 | bird3-3.1.4-1.1 on GA media | 2025-09-23T00:00:00Z | 2025-09-23T00:00:00Z |
| opensuse-su-2025:15571-1 | tor-0.4.8.18-1.1 on GA media | 2025-09-22T00:00:00Z | 2025-09-22T00:00:00Z |
| opensuse-su-2025:15570-1 | tcpreplay-4.5.1-2.1 on GA media | 2025-09-22T00:00:00Z | 2025-09-22T00:00:00Z |
| opensuse-su-2025:15569-1 | rke2-1.33-1.33.5+rke2r1-1.1 on GA media | 2025-09-20T00:00:00Z | 2025-09-20T00:00:00Z |
| opensuse-su-2025:15568-1 | ognl-3.4.7-1.1 on GA media | 2025-09-19T00:00:00Z | 2025-09-19T00:00:00Z |
| opensuse-su-2025:15567-1 | mybatis-3.5.19-1.1 on GA media | 2025-09-19T00:00:00Z | 2025-09-19T00:00:00Z |
| opensuse-su-2025:15566-1 | govulncheck-vulndb-0.0.20250918T182144-1.1 on GA media | 2025-09-19T00:00:00Z | 2025-09-19T00:00:00Z |
| opensuse-su-2025:15565-1 | MozillaFirefox-143.0-1.1 on GA media | 2025-09-19T00:00:00Z | 2025-09-19T00:00:00Z |
| opensuse-su-2025:15564-1 | govulncheck-vulndb-0.0.20250917T170349-1.1 on GA media | 2025-09-18T00:00:00Z | 2025-09-18T00:00:00Z |
| opensuse-su-2025:15563-1 | cups-filters-1.28.17-5.1 on GA media | 2025-09-18T00:00:00Z | 2025-09-18T00:00:00Z |
| opensuse-su-2025:15562-1 | cups-2.4.14-1.1 on GA media | 2025-09-18T00:00:00Z | 2025-09-18T00:00:00Z |
| opensuse-su-2025:15561-1 | coredns-1.12.4-2.1 on GA media | 2025-09-18T00:00:00Z | 2025-09-18T00:00:00Z |
| opensuse-su-2025:15560-1 | MozillaThunderbird-140.3.0-1.1 on GA media | 2025-09-18T00:00:00Z | 2025-09-18T00:00:00Z |
| opensuse-su-2025:15559-1 | element-web-1.11.112-1.1 on GA media | 2025-09-17T00:00:00Z | 2025-09-17T00:00:00Z |
| opensuse-su-2025:15558-1 | element-desktop-1.11.112-1.1 on GA media | 2025-09-17T00:00:00Z | 2025-09-17T00:00:00Z |
| opensuse-su-2025:15557-1 | autogen-5.18.16-8.1 on GA media | 2025-09-17T00:00:00Z | 2025-09-17T00:00:00Z |
| opensuse-su-2025:15556-1 | tkimg-2.1.0-1.1 on GA media | 2025-09-16T00:00:00Z | 2025-09-16T00:00:00Z |
| opensuse-su-2025:15555-1 | firefox-esr-140.3.0-1.1 on GA media | 2025-09-16T00:00:00Z | 2025-09-16T00:00:00Z |
| opensuse-su-2025:15554-1 | watchexec-2.3.2-2.1 on GA media | 2025-09-15T00:00:00Z | 2025-09-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:2800 | Red Hat Security Advisory: Red Hat Ceph Storage | 2026-02-17T09:23:04+00:00 | 2026-05-08T09:02:43+00:00 |
| rhsa-2026:2765 | Red Hat Security Advisory: Satellite 6.16.6.1 Async Update | 2026-02-16T21:33:28+00:00 | 2026-05-08T09:02:43+00:00 |
| rhsa-2026:2764 | Red Hat Security Advisory: Satellite 6.17.6.3 Async Update | 2026-02-16T19:06:28+00:00 | 2026-05-08T09:02:42+00:00 |
| rhsa-2026:2760 | Red Hat Security Advisory: Satellite 6.18.3 Async Update | 2026-02-16T16:52:18+00:00 | 2026-05-08T09:02:42+00:00 |
| rhsa-2026:2728 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-16T11:56:59+00:00 | 2026-05-08T09:02:41+00:00 |
| rhsa-2026:2723 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-16T11:26:37+00:00 | 2026-05-08T09:02:41+00:00 |
| rhsa-2026:2718 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-16T11:40:57+00:00 | 2026-05-08T09:02:41+00:00 |
| rhsa-2026:2717 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-16T11:34:12+00:00 | 2026-05-08T09:02:40+00:00 |
| rhsa-2026:2563 | Red Hat Security Advisory: Red Hat Update Infrastructure 5 security update | 2026-02-11T14:34:45+00:00 | 2026-05-08T09:02:36+00:00 |
| rhsa-2026:2500 | Red Hat Security Advisory: Red Hat multicluster global hub 1.4.4 security update | 2026-02-11T05:02:44+00:00 | 2026-05-08T09:02:34+00:00 |
| rhsa-2026:2279 | Red Hat Security Advisory: fence-agents security update | 2026-02-09T09:01:45+00:00 | 2026-05-08T09:02:33+00:00 |
| rhsa-2026:2256 | Red Hat Security Advisory: Red Hat multicluster global hub 1.5.3 security update | 2026-02-09T01:49:44+00:00 | 2026-05-08T09:02:32+00:00 |
| rhsa-2026:2137 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T15:26:20+00:00 | 2026-05-08T09:02:31+00:00 |
| rhsa-2026:2126 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T14:55:08+00:00 | 2026-05-08T09:02:29+00:00 |
| rhsa-2026:1803 | Red Hat Security Advisory: fence-agents security update | 2026-02-03T09:45:07+00:00 | 2026-05-08T09:02:29+00:00 |
| rhsa-2026:1957 | Red Hat Security Advisory: python3.12-urllib3 security update | 2026-02-04T19:16:17+00:00 | 2026-05-08T09:02:26+00:00 |
| rhsa-2026:1793 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T07:17:26+00:00 | 2026-05-08T09:02:26+00:00 |
| rhsa-2026:1805 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T10:17:28+00:00 | 2026-05-08T09:02:25+00:00 |
| rhsa-2026:1794 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T07:18:11+00:00 | 2026-05-08T09:02:24+00:00 |
| rhsa-2026:1792 | Red Hat Security Advisory: fence-agents security update | 2026-02-03T07:25:42+00:00 | 2026-05-08T09:02:23+00:00 |
| rhsa-2026:1791 | Red Hat Security Advisory: fence-agents security update | 2026-02-03T07:21:33+00:00 | 2026-05-08T09:02:23+00:00 |
| rhsa-2026:1736 | Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage | 2026-02-02T17:31:06+00:00 | 2026-05-08T09:02:22+00:00 |
| rhsa-2026:1735 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T17:50:59+00:00 | 2026-05-08T09:02:22+00:00 |
| rhsa-2026:1734 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T17:45:39+00:00 | 2026-05-08T09:02:22+00:00 |
| rhsa-2026:1729 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T15:49:34+00:00 | 2026-05-08T09:02:21+00:00 |
| rhsa-2026:1726 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T15:25:44+00:00 | 2026-05-08T09:02:21+00:00 |
| rhsa-2026:1717 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T14:17:19+00:00 | 2026-05-08T09:02:21+00:00 |
| rhsa-2026:1712 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-02-02T13:10:47+00:00 | 2026-05-08T09:02:20+00:00 |
| rhsa-2026:1706 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T12:38:43+00:00 | 2026-05-08T09:02:20+00:00 |
| rhsa-2026:1704 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-02-02T11:50:53+00:00 | 2026-05-08T09:02:19+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20551-1 | Security update for kubevirt | 2026-02-27T08:51:11Z | 2026-02-27T08:51:11Z |
| suse-su-2026:20610-1 | Security update for kubevirt | 2026-02-27T08:49:48Z | 2026-02-27T08:49:48Z |
| suse-su-2026:0674-1 | Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-02-27T07:04:14Z | 2026-02-27T07:04:14Z |
| suse-su-2026:20550-1 | Security update for containerized-data-importer | 2026-02-26T16:03:48Z | 2026-02-26T16:03:48Z |
| suse-su-2026:0670-1 | Security update for ucode-intel | 2026-02-26T15:21:41Z | 2026-02-26T15:21:41Z |
| suse-su-2026:0669-1 | Security update for ucode-intel | 2026-02-26T15:21:31Z | 2026-02-26T15:21:31Z |
| suse-su-2026:0668-1 | Security update for ucode-intel | 2026-02-26T15:21:13Z | 2026-02-26T15:21:13Z |
| suse-su-2026:0667-1 | Security update for redis7 | 2026-02-26T15:19:55Z | 2026-02-26T15:19:55Z |
| suse-su-2026:0666-1 | Security update for docker | 2026-02-26T15:17:25Z | 2026-02-26T15:17:25Z |
| suse-su-2026:0665-1 | Security update for frr | 2026-02-26T15:16:24Z | 2026-02-26T15:16:24Z |
| suse-su-2026:0664-1 | Security update for python3 | 2026-02-26T15:15:20Z | 2026-02-26T15:15:20Z |
| suse-su-2026:0663-1 | Security update for python | 2026-02-26T15:13:11Z | 2026-02-26T15:13:11Z |
| suse-su-2026:0662-1 | Security update for qemu | 2026-02-26T15:12:26Z | 2026-02-26T15:12:26Z |
| suse-su-2026:0661-1 | Security update for erlang | 2026-02-26T15:10:09Z | 2026-02-26T15:10:09Z |
| suse-su-2026:0659-1 | Security update for docker-stable | 2026-02-26T15:08:37Z | 2026-02-26T15:08:37Z |
| suse-su-2026:0658-1 | Security update for libsoup | 2026-02-26T15:07:42Z | 2026-02-26T15:07:42Z |
| suse-su-2026:0657-1 | Security update for libsoup2 | 2026-02-26T15:07:11Z | 2026-02-26T15:07:11Z |
| suse-su-2026:0656-1 | Security update for freerdp | 2026-02-26T15:06:36Z | 2026-02-26T15:06:36Z |
| suse-su-2026:20592-1 | Security update for 7zip | 2026-02-26T13:17:48Z | 2026-02-26T13:17:48Z |
| suse-su-2026:0642-1 | Security update for python313 | 2026-02-26T11:53:34Z | 2026-02-26T11:53:34Z |
| suse-su-2026:20527-1 | Security update for glibc | 2026-02-26T11:33:53Z | 2026-02-26T11:33:53Z |
| suse-su-2026:20531-1 | Security update for libssh | 2026-02-26T11:27:41Z | 2026-02-26T11:27:41Z |
| suse-su-2026:20530-1 | Security update for libpng16 | 2026-02-26T11:26:10Z | 2026-02-26T11:26:10Z |
| suse-su-2026:20526-1 | Security update for rust-keylime | 2026-02-26T11:08:16Z | 2026-02-26T11:08:16Z |
| suse-su-2026:20524-1 | Security update for libssh | 2026-02-26T11:08:16Z | 2026-02-26T11:08:16Z |
| suse-su-2026:20525-1 | Security update for avahi | 2026-02-26T10:54:54Z | 2026-02-26T10:54:54Z |
| suse-su-2026:20523-1 | Security update for libpng16 | 2026-02-26T10:51:48Z | 2026-02-26T10:51:48Z |
| suse-su-2026:20522-1 | Security update for ucode-intel | 2026-02-26T10:48:45Z | 2026-02-26T10:48:45Z |
| suse-su-2026:20591-1 | Security update for python-urllib3_1 | 2026-02-26T09:44:49Z | 2026-02-26T09:44:49Z |
| suse-su-2026:20590-1 | Security update for autogen | 2026-02-26T09:10:42Z | 2026-02-26T09:10:42Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:2864 | Important: webkit2gtk3 security update | 2025-03-17T00:00:00Z | 2025-03-17T22:37:00Z |
| alsa-2025:2863 | Important: webkit2gtk3 security update | 2025-03-17T00:00:00Z | 2025-03-17T22:35:22Z |
| alsa-2025:2722 | Moderate: krb5 security update | 2025-03-13T00:00:00Z | 2025-03-17T22:33:10Z |
| alsa-2025:2686 | Important: libxml2 security update | 2025-03-12T00:00:00Z | 2025-03-17T22:31:10Z |
| alsa-2025:2670 | Important: .NET 8.0 security, bug fix, and enhancement update | 2025-03-11T00:00:00Z | 2025-03-17T22:29:31Z |
| alsa-2025:2669 | Important: .NET 8.0 security, bug fix, and enhancement update | 2025-03-11T00:00:00Z | 2025-03-17T22:27:30Z |
| alsa-2025:2668 | Important: .NET 9.0 security, bug fix, and enhancement update | 2025-03-11T00:00:00Z | 2025-03-17T22:25:33Z |
| alsa-2025:2667 | Important: .NET 9.0 security, bug fix, and enhancement update | 2025-03-11T00:00:00Z | 2025-03-17T22:23:13Z |
| alsa-2025:2600 | Moderate: rsync security update | 2025-03-11T00:00:00Z | 2025-03-17T22:20:37Z |
| alsa-2025:2502 | Important: tigervnc security update | 2025-03-10T00:00:00Z | 2025-03-17T22:17:32Z |
| alsa-2025:2500 | Important: tigervnc security update | 2025-03-10T00:00:00Z | 2025-03-17T22:11:28Z |
| alsa-2025:2627 | Important: kernel security update | 2025-03-11T00:00:00Z | 2025-03-14T09:33:24Z |
| alsa-2025:2679 | Important: libxml2 security update | 2025-03-12T00:00:00Z | 2025-03-13T07:23:03Z |
| alsa-2025:2474 | Important: kernel-rt security update | 2025-03-10T00:00:00Z | 2025-03-11T12:11:16Z |
| alsa-2025:2473 | Important: kernel security update | 2025-03-10T00:00:00Z | 2025-03-11T12:09:37Z |
| alsa-2025:2452 | Important: firefox security update | 2025-03-06T00:00:00Z | 2025-03-11T12:07:11Z |
| alsa-2025:2035 | Important: webkit2gtk3 security update | 2025-03-03T00:00:00Z | 2025-03-11T12:06:01Z |
| alsa-2025:2034 | Important: webkit2gtk3 security update | 2025-03-03T00:00:00Z | 2025-03-11T12:02:58Z |
| alsa-2025:1659 | Moderate: kernel security update | 2025-02-19T00:00:00Z | 2025-03-04T08:50:23Z |
| alsa-2025:1670 | Important: bind9.18 security update | 2025-02-19T00:00:00Z | 2025-02-24T10:51:31Z |
| alsa-2025:1743 | Important: postgresql:16 security update | 2025-02-20T00:00:00Z | 2025-02-24T10:49:59Z |
| alsa-2025:1738 | Important: libpq security update | 2025-02-20T00:00:00Z | 2025-02-21T13:14:35Z |
| alsa-2025:1741 | Important: postgresql:15 security update | 2025-02-20T00:00:00Z | 2025-02-21T13:13:38Z |
| alsa-2025:1742 | Important: postgresql security update | 2025-02-20T00:00:00Z | 2025-02-21T13:11:16Z |
| alsa-2025:1736 | Important: postgresql:13 security update | 2025-02-20T00:00:00Z | 2025-02-21T13:09:04Z |
| alsa-2025:1737 | Important: libpq security update | 2025-02-20T00:00:00Z | 2025-02-21T13:07:02Z |
| alsa-2025:1739 | Important: postgresql:15 security update | 2025-02-20T00:00:00Z | 2025-02-21T13:05:30Z |
| alsa-2025:1740 | Important: postgresql:16 security update | 2025-02-20T00:00:00Z | 2025-02-21T13:00:40Z |
| alsa-2025:1671 | Important: mysql security update | 2025-02-19T00:00:00Z | 2025-02-20T14:55:32Z |
| alsa-2025:1675 | Important: bind security update | 2025-02-19T00:00:00Z | 2025-02-20T14:49:41Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-243 | UNKNOWN WRITE in processCertificateElements | 2023-03-27T13:00:39.112912Z | 2023-03-27T13:00:39.113130Z |
| osv-2023-242 | Use-of-uninitialized-value in xmlSwitchEncoding | 2023-03-27T13:00:27.197749Z | 2023-03-27T13:00:27.197986Z |
| osv-2023-240 | Invalid-free in fuzz_die_cu_attrs.c | 2023-03-27T13:00:21.287359Z | 2023-03-27T13:00:21.287635Z |
| osv-2023-229 | Heap-buffer-overflow in ndpi_workflow_process_packet | 2023-03-25T13:00:30.521932Z | 2023-03-25T13:00:30.522156Z |
| osv-2023-221 | Heap-use-after-free in flac__analyze_frame | 2023-03-24T13:00:26.024981Z | 2023-03-24T13:00:26.025239Z |
| osv-2023-219 | UNKNOWN WRITE in processCertificateElements | 2023-03-23T13:02:18.996765Z | 2023-03-23T13:02:18.996982Z |
| osv-2023-215 | Global-buffer-overflow in htmlParsePI | 2023-03-23T13:00:45.604359Z | 2023-03-23T13:00:45.604628Z |
| osv-2023-213 | Global-buffer-overflow in htmlParseDocument | 2023-03-22T13:01:53.257203Z | 2023-03-22T13:01:53.257458Z |
| osv-2023-212 | Global-buffer-overflow in xmlParseEntityDecl | 2023-03-22T13:01:34.391238Z | 2023-03-22T13:01:34.391485Z |
| osv-2023-211 | Global-buffer-overflow in xmlStrndup | 2023-03-22T13:00:29.358592Z | 2023-03-22T13:00:29.358840Z |
| osv-2023-184 | UNKNOWN READ in LibRaw::sget4 | 2023-03-17T13:00:06.635055Z | 2023-03-20T14:21:04.285680Z |
| osv-2023-206 | Global-buffer-overflow in xmlParseContentInternal | 2023-03-19T13:02:12.599313Z | 2023-03-19T13:02:12.599543Z |
| osv-2023-205 | Global-buffer-overflow in base_C_MessageSignFinal | 2023-03-19T13:02:10.709112Z | 2023-03-19T13:02:10.709360Z |
| osv-2023-204 | Global-buffer-overflow in htmlParseChunk | 2023-03-19T13:02:08.092138Z | 2023-03-19T13:02:08.092478Z |
| osv-2023-200 | Segv on unknown address in mrb_vm_find_method | 2023-03-18T13:02:09.375268Z | 2023-03-18T13:02:09.375493Z |
| osv-2023-199 | Global-buffer-overflow in xmlParseQName | 2023-03-18T13:02:06.280323Z | 2023-03-18T13:02:06.280552Z |
| osv-2023-196 | Global-buffer-overflow in xmlDictLookup | 2023-03-17T13:02:09.789411Z | 2023-03-17T13:02:09.789649Z |
| osv-2023-195 | Global-buffer-overflow in htmlParseDocument | 2023-03-17T13:01:21.931934Z | 2023-03-17T13:01:21.932172Z |
| osv-2023-193 | Global-buffer-overflow in xmlParseContentInternal | 2023-03-17T13:00:33.314698Z | 2023-03-17T13:00:33.314968Z |
| osv-2023-192 | Heap-use-after-free in mrb_str_hash_m | 2023-03-17T13:00:31.986869Z | 2023-03-17T13:00:31.987136Z |
| osv-2023-191 | Global-buffer-overflow in xmlSkipBlankChars | 2023-03-17T13:00:17.480046Z | 2023-03-17T13:00:17.480275Z |
| osv-2023-188 | Global-buffer-overflow in xmlParseQName | 2023-03-17T13:00:10.915642Z | 2023-03-17T13:00:10.915924Z |
| osv-2023-185 | Global-buffer-overflow in xmlNextChar | 2023-03-17T13:00:07.286019Z | 2023-03-17T13:00:07.286262Z |
| osv-2023-170 | Invalid-free in hb_free_impl | 2023-03-13T13:00:54.744253Z | 2023-03-16T14:25:44.765201Z |
| osv-2023-165 | Heap-buffer-overflow in array_container_to_uint32_array | 2023-03-12T13:00:29.802108Z | 2023-03-16T14:24:12.891209Z |
| osv-2023-155 | Heap-buffer-overflow in run_container_write | 2023-03-07T13:02:03.518078Z | 2023-03-16T14:24:07.289024Z |
| osv-2023-183 | UNKNOWN READ in mrb_exc_get_id | 2023-03-16T13:02:15.379877Z | 2023-03-16T13:02:15.380131Z |
| osv-2023-182 | Heap-buffer-overflow in FLAC__bitwriter_write_rice_signed_block | 2023-03-16T13:02:02.851218Z | 2023-03-16T13:02:02.851471Z |
| osv-2023-181 | Heap-double-free in xsltCompileStepPattern | 2023-03-16T13:00:52.122593Z | 2023-03-16T13:00:52.122921Z |
| osv-2023-180 | UNKNOWN READ in mrb_obj_iv_get | 2023-03-16T13:00:29.954403Z | 2023-03-16T13:00:29.954777Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-moodle-2025-32044 | Moodle: unauthenticated rest api user data exposure | 2026-01-26T14:49:29.093Z | 2026-01-26T15:09:56.435Z |
| bit-mastodon-2026-22246 | Local Mastodon users can enumerate and access severed relationships of every other local user | 2026-01-13T11:27:33.626Z | 2026-01-26T15:09:56.435Z |
| bit-libpython-2025-15367 | POP3 command injection in user-controlled commands | 2026-01-26T14:43:12.088Z | 2026-01-26T15:09:56.435Z |
| bit-libpython-2025-15366 | IMAP command injection in user-controlled commands | 2026-01-26T14:43:10.455Z | 2026-01-26T15:09:56.435Z |
| bit-libpython-2025-12781 | base64.b64decode() always accepts "+/" characters, despite setting altchars | 2026-01-26T14:43:03.724Z | 2026-01-26T15:09:56.435Z |
| bit-libphp-2025-14178 | Heap buffer overflow in array_merge() | 2026-01-08T11:43:28.412Z | 2026-01-26T15:09:56.435Z |
| bit-harbor-2024-22261 | SQL Injection in Harbor scan log API | 2026-01-26T14:40:06.365Z | 2026-01-26T15:09:56.435Z |
| bit-harbor-2022-31666 | Harbor fails to validate user permissions while Viewing, updating and deleting Webhook policies | 2026-01-26T14:39:52.521Z | 2026-01-26T15:09:56.435Z |
| bit-gitlab-2025-9222 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-01-13T09:09:30.025Z | 2026-01-26T15:09:56.435Z |
| bit-gitlab-2025-6454 | Server-Side Request Forgery (SSRF) in GitLab | 2025-09-16T09:08:45.357Z | 2026-01-26T15:09:56.435Z |
| bit-gitlab-2025-13772 | Missing Authorization in GitLab | 2026-01-13T09:07:21.509Z | 2026-01-26T15:09:56.435Z |
| bit-gitlab-2025-13761 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-01-13T09:07:19.725Z | 2026-01-26T15:09:56.435Z |
| bit-crossplane-2023-38495 | Crossplane vulnerable to possible image tampering from missing image validation for Packages | 2026-01-26T14:36:56.233Z | 2026-01-26T15:09:56.435Z |
| bit-crossplane-2023-37900 | Crossplane vulnerable to denial of service from large image | 2026-01-26T14:36:54.817Z | 2026-01-26T15:09:56.435Z |
| bit-gitlab-2025-11224 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-01-16T09:05:53.033Z | 2026-01-22T09:11:07.452Z |
| bit-appsmith-2026-22794 | Account Takeover Vulnerability in Appsmith | 2026-01-14T08:37:00.092Z | 2026-01-22T09:11:07.452Z |
| bit-gradle-2026-22865 | Gradle's failure to disable repositories failing to answer can expose builds to malicious artifacts | 2026-01-21T08:41:11.981Z | 2026-01-21T09:22:22.325Z |
| bit-gradle-2026-22816 | Gradle fails to disable repositories which can expose builds to malicious artifacts | 2026-01-21T08:41:10.153Z | 2026-01-21T09:22:22.325Z |
| bit-airflow-2025-68438 | Apache Airflow: Secrets in rendered templates could contain parts of sensitive values when truncated | 2026-01-21T08:39:22.633Z | 2026-01-21T09:22:22.325Z |
| bit-kibana-2026-0543 | Improper Input Validation in Kibana Email Connector Leading to Excessive Allocation | 2026-01-16T08:42:18.049Z | 2026-01-16T09:10:29.256Z |
| bit-kibana-2026-0532 | External Control of File Name or Path and Server-Side Request Forgery (SSRF) in Kibana Google Gemini Connector | 2026-01-16T08:42:16.599Z | 2026-01-16T09:10:29.256Z |
| bit-kibana-2026-0531 | Allocation of Resources Without Limits or Throttling in Kibana Fleet | 2026-01-16T08:42:14.963Z | 2026-01-16T09:10:29.256Z |
| bit-kibana-2026-0530 | Allocation of Resources Without Limits or Throttling in Kibana Leading to Excessive Allocation | 2026-01-16T08:42:13.351Z | 2026-01-16T09:10:29.256Z |
| bit-ghost-2026-22596 | Ghost has SQL Injection in Members Activity Feed | 2026-01-13T08:40:25.592Z | 2026-01-16T09:10:29.256Z |
| bit-elk-2026-0543 | Improper Input Validation in Kibana Email Connector Leading to Excessive Allocation | 2026-01-16T08:39:07.127Z | 2026-01-16T09:10:29.256Z |
| bit-elk-2026-0532 | External Control of File Name or Path and Server-Side Request Forgery (SSRF) in Kibana Google Gemini Connector | 2026-01-16T08:39:05.407Z | 2026-01-16T09:10:29.256Z |
| bit-elk-2026-0531 | Allocation of Resources Without Limits or Throttling in Kibana Fleet | 2026-01-16T08:39:03.612Z | 2026-01-16T09:10:29.256Z |
| bit-elk-2026-0530 | Allocation of Resources Without Limits or Throttling in Kibana Leading to Excessive Allocation | 2026-01-16T08:39:01.662Z | 2026-01-16T09:10:29.256Z |
| bit-mastodon-2026-22245 | Mastodon has SSRF Protection bypass | 2026-01-13T11:27:28.319Z | 2026-01-13T12:01:00.363Z |
| bit-virtualenv-2026-22702 | virtualenv Has TOCTOU Vulnerabilities in Directory Creation | 2026-01-13T08:53:06.703Z | 2026-01-13T09:11:00.781Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-0851 | Vulnérabilité dans Python | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| CERTFR-2025-AVI-0850 | Multiples vulnérabilités dans Google Chrome | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| CERTFR-2025-AVI-0847 | Vulnérabilité dans les produits Liferay | 2025-10-06T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0849 | Multiples vulnérabilités dans les produits Elastic | 2025-10-07T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| certfr-2025-avi-0848 | Vulnérabilité dans OpenSSH | 2025-10-06T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| CERTFR-2025-AVI-0849 | Multiples vulnérabilités dans les produits Elastic | 2025-10-07T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| CERTFR-2025-AVI-0848 | Vulnérabilité dans OpenSSH | 2025-10-06T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| certfr-2025-avi-0846 | Multiples vulnérabilités dans les produits Qnap | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-avi-0845 | Multiples vulnérabilités dans Zabbix | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| CERTFR-2025-AVI-0846 | Multiples vulnérabilités dans les produits Qnap | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| CERTFR-2025-AVI-0845 | Multiples vulnérabilités dans Zabbix | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-avi-0844 | Multiples vulnérabilités dans IBM Sterling Connect | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0843 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0842 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0841 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0840 | Multiples vulnérabilités dans Zabbix | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0839 | Multiples vulnérabilités dans Microsoft Edge | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| CERTFR-2025-AVI-0844 | Multiples vulnérabilités dans IBM Sterling Connect | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| CERTFR-2025-AVI-0843 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| CERTFR-2025-AVI-0842 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| CERTFR-2025-AVI-0841 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| CERTFR-2025-AVI-0840 | Multiples vulnérabilités dans Zabbix | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| CERTFR-2025-AVI-0839 | Multiples vulnérabilités dans Microsoft Edge | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0838 | Multiples vulnérabilités dans les produits Splunk | 2025-10-02T00:00:00.000000 | 2025-10-02T00:00:00.000000 |
| certfr-2025-avi-0837 | Multiples vulnérabilités dans Google Chrome | 2025-10-02T00:00:00.000000 | 2025-10-02T00:00:00.000000 |
| CERTFR-2025-AVI-0838 | Multiples vulnérabilités dans les produits Splunk | 2025-10-02T00:00:00.000000 | 2025-10-02T00:00:00.000000 |
| CERTFR-2025-AVI-0837 | Multiples vulnérabilités dans Google Chrome | 2025-10-02T00:00:00.000000 | 2025-10-02T00:00:00.000000 |
| certfr-2025-avi-0836 | Multiples vulnérabilités dans les produits Tenable | 2025-10-01T00:00:00.000000 | 2025-10-01T00:00:00.000000 |
| certfr-2025-avi-0835 | Multiples vulnérabilités dans OpenSSL | 2025-10-01T00:00:00.000000 | 2025-10-01T00:00:00.000000 |
| certfr-2025-avi-0834 | Multiples vulnérabilités dans Mozilla Firefox | 2025-10-01T00:00:00.000000 | 2025-10-01T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2018-010027 | Problem with directory permissions in JP1/Operations Analytics | 2018-12-04T16:53+09:00 | 2019-01-24T18:36+09:00 |
| jvndb-2018-010028 | Multiple Vulnerabilities in Hitachi Infrastructure Analytics Advisor | 2018-12-04T16:53+09:00 | 2019-01-24T18:35+09:00 |
| jvndb-2019-000003 | HOUSE GATE App for iOS vulnerable to directory traversal | 2019-01-24T15:37+09:00 | 2019-01-24T15:37+09:00 |
| jvndb-2018-009328 | Multiple Vulnerabilities in JP1/VERITAS | 2018-11-15T17:16+09:00 | 2018-11-20T18:16+09:00 |
| jvndb-2018-008573 | Multiple Vulnerabilities in Hitachi Infrastructure Analytics Advisor | 2018-10-23T15:15+09:00 | 2018-11-20T18:15+09:00 |
| jvndb-2018-008547 | Clickjacking Vulnerability in Hitachi Device Manager | 2018-10-23T13:53+09:00 | 2018-11-20T18:14+09:00 |
| jvndb-2018-000116 | Mail app for iOS vulnerable to denial-of-service (DoS) | 2018-11-02T14:42+09:00 | 2018-11-02T14:42+09:00 |
| jvndb-2018-000114 | Confluence Server vulnerable to script injection | 2018-10-29T13:36+09:00 | 2018-10-29T13:36+09:00 |
| jvndb-2018-000045 | Multiple vulnerabilities in WordPress plugin "Ultimate Member" | 2018-05-10T13:44+09:00 | 2018-08-30T18:11+09:00 |
| jvndb-2017-000171 | Installers of Mozilla Firefox and Thunderbird for Windows may insecurely load Dynamic Link Libraries | 2017-07-11T13:48+09:00 | 2018-08-30T18:03+09:00 |
| jvndb-2018-000054 | Multiple cross-site scripting vulnerabilities in Cybozu Mailwise | 2018-05-22T15:26+09:00 | 2018-08-30T17:47+09:00 |
| jvndb-2018-000053 | Multiple vulnerabilities in Cybozu Office | 2018-05-22T14:30+09:00 | 2018-08-30T16:03+09:00 |
| jvndb-2018-000048 | KINEPASS App fails to verify SSL server certificates | 2018-05-11T14:34+09:00 | 2018-08-30T15:01+09:00 |
| jvndb-2018-000041 | The installers of multiple CELSYS,Inc. software may insecurely load Dynamic Link Libraries | 2018-04-27T15:19+09:00 | 2018-08-30T14:12+09:00 |
| jvndb-2018-000036 | Joruri Gw vulnerable to arbitrary file upload | 2018-04-26T15:19+09:00 | 2018-08-30T14:02+09:00 |
| jvndb-2018-000040 | WordPress plugin "Open Graph for Facebook, Google+ and Twitter Card Tags" vulnerable to cross-site scripting | 2018-04-27T15:01+09:00 | 2018-08-30T13:54+09:00 |
| jvndb-2018-000052 | Nessus vulnerable to cross-site scripting | 2018-05-21T13:39+09:00 | 2018-08-30T13:47+09:00 |
| jvndb-2018-000042 | RT-AC87U vulnerable to cross-site scripting | 2018-05-09T15:37+09:00 | 2018-08-30T12:32+09:00 |
| jvndb-2018-000044 | RT-AC68U vulnerable to cross-site scripting | 2018-05-09T15:38+09:00 | 2018-08-30T12:20+09:00 |
| jvndb-2018-000043 | RT-AC1200HP vulnerable to cross-site scripting | 2018-05-09T15:37+09:00 | 2018-08-30T12:15+09:00 |
| jvndb-2018-000038 | WordPress plugin "WP Google Map Plugin" vulnerable to cross-site scripting | 2018-04-27T14:15+09:00 | 2018-08-30T12:00+09:00 |
| jvndb-2018-000039 | WordPress plugin "PixelYourSite" vulnerable to cross-site scripting | 2018-04-27T14:24+09:00 | 2018-08-30T11:55+09:00 |
| jvndb-2018-000037 | WordPress plugin "Events Manager" vulnerable to cross-site scripting | 2018-04-27T14:00+09:00 | 2018-08-30T11:48+09:00 |
| jvndb-2018-000035 | EC-CUBE vulnerable to session fixation | 2018-04-17T13:39+09:00 | 2018-08-22T17:42+09:00 |
| jvndb-2018-006460 | Path Traversal Vulnerability in Hitachi Automation Director | 2018-08-22T17:11+09:00 | 2018-08-22T17:11+09:00 |
| jvndb-2018-006459 | Path Traversal Vulnerability in JP1/Automatic Operation | 2018-08-22T17:11+09:00 | 2018-08-22T17:11+09:00 |
| jvndb-2018-000050 | Self-Extracting Archive files created by IExpress may insecurely load Dynamic Link Libraries | 2018-05-17T14:57+09:00 | 2018-08-21T16:40+09:00 |
| jvndb-2018-000086 | Multiple vulnerabilities in EC-CUBE Payment Module and GMO-PG Payment Module (PG Multi-Payment Service) for EC-CUBE | 2018-08-09T16:43+09:00 | 2018-08-09T16:43+09:00 |
| jvndb-2018-003553 | Information Disclosure Vulnerability in Hitachi Automation Director | 2018-05-28T12:13+09:00 | 2018-07-31T12:16+09:00 |
| jvndb-2018-003030 | Access Control Vulnerability in Hitachi Infrastructure Analytics Advisor | 2018-05-10T15:30+09:00 | 2018-07-31T12:12+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-10852 | Rockwell Automation ArmorStart LT拒绝服务漏洞(CNVD-2026-10852) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10851 | Rockwell Automation ArmorStart LT拒绝服务漏洞(CNVD-2026-10851) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10850 | Rockwell Automation ArmorStart LT拒绝服务漏洞(CNVD-2026-10850) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10849 | Rockwell Automation ArmorStart LT拒绝服务漏洞(CNVD-2026-10849) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10848 | Rockwell Automation ArmorStart LT拒绝服务漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10846 | Rockwell Automation FactoryTalk View Machine Edition路径遍历漏洞 | 2025-10-17 | 2026-02-10 |
| cnvd-2026-10664 | IBM Aspera Console日志信息泄露漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10663 | IBM Concert代码问题漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10662 | IBM Concert信息泄露漏洞(CNVD-2026-10662) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10661 | IBM Concert信息泄露漏洞(CNVD-2026-10661) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10660 | IBM ApplinX数据伪造问题漏洞 | 2026-01-26 | 2026-02-10 |
| cnvd-2026-10656 | IBM ApplinX跨站请求伪造漏洞(CNVD-2026-10656) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10655 | IBM ApplinX跨站脚本漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10654 | IBM ApplinX未授权访问漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10653 | IBM ApplinX信息泄露漏洞(CNVD-2026-10653) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10652 | Google Chrome代码执行漏洞(CNVD-2026-10652) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10651 | Google SentencePiece缓冲区溢出漏洞 | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10650 | Google Go代码执行漏洞(CNVD-2026-10650) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10649 | Google Go拒绝服务漏洞(CNVD-2026-10649) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10648 | Google Go代码执行漏洞 | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10647 | Google Go拒绝服务漏洞(CNVD-2026-10647) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10646 | Google Go信息泄露漏洞(CNVD-2026-10646) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10645 | Google Chrome信息泄露漏洞(CNVD-2026-10645) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10644 | Google Android权限提升漏洞(CNVD-2026-10644) | 2025-09-08 | 2026-02-09 |
| cnvd-2026-10643 | Google Android权限提升漏洞(CNVD-2026-10643) | 2025-09-04 | 2026-02-09 |
| cnvd-2026-10642 | Google Android权限提升漏洞(CNVD-2026-10642) | 2025-09-04 | 2026-02-09 |
| cnvd-2026-10641 | Google Android信息泄露漏洞(CNVD-2026-10641) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10640 | D-Link DNS-343 ShareCenter命令执行漏洞 | 2025-11-05 | 2026-02-09 |
| cnvd-2026-10639 | D-Link DI-8200G命令注入漏洞 | 2026-01-19 | 2026-02-09 |
| cnvd-2026-10638 | Tenda AX1803缓冲区溢出漏洞(CNVD-2026-10638) | 2026-01-30 | 2026-02-09 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01493 | Уязвимость функции sanity_check_curseg() ядра операционной системы Linux, позволяющая нар… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01492 | Уязвимость веб-интерфейса сервера для управления программами Fortinet FortiClient Enterpr… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01491 | Уязвимость функции fc_exch_abts_resp() ядра операционной системы Linux, позволяющая наруш… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01490 | Уязвимость функции ipc_msg_send_request() ядра операционной системы Linux, позволяющая на… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01489 | Уязвимость функции OnAssocReq() ядра операционной системы Linux, позволяющая нарушителю о… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01488 | Уязвимость функции ext4_truncate() модуля fs/ext4/inode.c файловой системы Ext4 ядра опер… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01487 | Уязвимость функции swap_inode_boot_loader() модуля fs/ext4/ioctl.c файловой системы Ext4 … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01486 | Уязвимость функции pci_device_is_present() модуля drivers/pci/pci.c драйвера устройств PC… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01485 | Уязвимость функции ath11k_dp_rx_mon_deliver() модуля drivers/net/wireless/ath/ath11k/dp_r… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01484 | Уязвимость функций raid0_run() (drivers/md/raid0.c) и raid10_run() (drivers/md/raid10.c) … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01483 | Уязвимость функции _regulator_do_enable() модуля drivers/regulator/core.c драйвера регуля… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01468 | Уязвимость библиотеки преобразования путей path-to-regexp, связанная с неэффективной вычи… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01467 | Уязвимость сервера для разработки Metro Development Server, связанная с непринятием мер п… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01466 | Уязвимость компонента Duo Workflow Service сервиса для взаимодействия с внешними LLM-пров… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01465 | Уязвимость функции lookup_ioctl() модуля drivers/md/dm-ioctl.c драйвера поддержки несколь… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01464 | Уязвимость функции __mcheck_cpu_apply_quirks() модуля arch/x86/kernel/cpu/mce/core.c подд… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01463 | Уязвимость функции nwl_dsi_bridge_mode_set() модуля drivers/gpu/drm/bridge/nwl-dsi.c драй… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01462 | Уязвимость функции status_resync() модуля drivers/md/md.c драйвера нескольких устройств (… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01461 | Уязвимость функции vb2ops_vdec_queue_setup() модуля drivers/media/platform/mediatek/vcode… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01460 | Уязвимость функции nilfs_evict_inode() модуля fs/nilfs2/inode.c файловой системы NILFS2 я… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01459 | Уязвимость функции mpi_cmp_ui() модуля lib/crypto/mpi/mpi-cmp.c ядра операционной системы… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01458 | Уязвимость функции f2fs_abort_atomic_write() модуля fs/f2fs/segment.c файловой системы F2… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01457 | Уязвимость функции nilfs_bmap_lookup_at_level() модуля fs/nilfs2/bmap.c файловой системы … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01456 | Уязвимость функции __hfs_bnode_create() модуля fs/hfs/bnode.c файловой системы ядра опера… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01455 | Уязвимость функции nilfs_prepare_segment_for_recovery() модуля fs/nilfs2/recovery.c подде… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01454 | Уязвимость функции rcu_tasks_rude_wait_gp() модуля kernel/rcu/tasks.h ядра операционной с… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01453 | Уязвимость функции gfs2_show_options() модуля fs/gfs2/super.c файловой системы GFS2 ядра … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01452 | Уязвимость функции show_ipi_list() модуля arch/loongarch/kernel/smp.c поддержки архитекту… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01451 | Уязвимость функции ucsi_read_message_in() модуля drivers/usb/typec/ucsi/ucsi.c драйвера п… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01450 | Уязвимость определения структуры imx8mp_blk_ctrl_domain_data{} модуля drivers/pmdomain/im… | 09.02.2026 | 09.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201009-0229 | Stack-based buffer overflow in the bgp_route_refresh_receive function in bgp_packet.c in … | 2024-07-23T19:31:01.518000Z |
| var-201912-0476 | An API issue existed in the handling of dictation requests. This issue was addressed with… | 2024-07-23T19:30:59.825000Z |
| var-202302-1097 | A type confusion issue was addressed with improved checks. This issue is fixed in iOS 15.… | 2024-07-23T19:30:52.604000Z |
| var-201203-0195 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2024-07-23T19:30:18.122000Z |
| var-200810-0395 | Weblog in Mac OS X Server 10.4.11 does not properly check an error condition when a weblo… | 2024-07-23T19:30:18.014000Z |
| var-201506-0266 | Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc… | 2024-07-23T19:30:13.501000Z |
| var-200809-0185 | Login Window in Apple Mac OS X 10.4.11 does not clear the current password when a user ma… | 2024-07-23T19:30:10.886000Z |
| var-202001-1433 | When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data sm… | 2024-07-23T19:29:34.490000Z |
| var-201912-0581 | An out-of-bounds read was addressed with improved input validation. This issue is fixed i… | 2024-07-23T19:29:33.011000Z |
| var-201302-0065 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T19:29:31.233000Z |
| var-202105-1461 | A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in fun… | 2024-07-23T19:28:54.681000Z |
| var-202006-1830 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2024-07-23T19:28:54.418000Z |
| var-201708-0039 | Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows re… | 2024-07-23T19:28:52.202000Z |
| var-202104-0334 | curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Info… | 2024-07-23T19:28:46.447000Z |
| var-201110-0450 | The OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to c… | 2024-07-23T19:28:46.203000Z |
| var-201806-1437 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T19:28:41.920000Z |
| var-200406-0158 | Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (sys… | 2024-07-23T19:28:41.684000Z |
| var-201408-0300 | Off-by-one error in the krb5_encode_krbsecretkey function in plugins/kdb/ldap/libkdb_ldap… | 2024-07-23T19:28:23.568000Z |
| var-200708-0612 | The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when us… | 2024-07-23T19:28:21.377000Z |
| var-202109-1804 | A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocate… | 2024-07-23T19:28:18.167000Z |
| var-201706-0272 | In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth… | 2024-07-23T19:28:16.122000Z |
| var-202107-1361 | fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly res… | 2024-07-23T19:28:07.610000Z |
| var-201006-1151 | The Cascading Style Sheets (CSS) implementation in WebKit in Apple Safari before 5.0 on M… | 2024-07-23T19:27:58.594000Z |
| var-200709-0497 | mm/mmap.c in the hugetlb kernel, when run on PowerPC systems, does not prevent stack expa… | 2024-07-23T19:27:58.514000Z |
| var-201907-0806 | SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typ… | 2024-07-23T19:27:57.849000Z |
| var-200911-0416 | The web interface in CUPS before 1.4.2, as used on Apple Mac OS X before 10.6.2 and other… | 2024-07-23T19:27:57.400000Z |
| var-202210-1530 | A logic issue was addressed with improved state management. This issue is fixed in tvOS 1… | 2024-07-23T19:27:53.046000Z |
| var-201912-0649 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T19:27:50.328000Z |
| var-202101-0119 | The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing… | 2024-07-23T19:27:48.072000Z |
| var-200102-0040 | Mac OS Runtime for Java (MRJ) 2.2.3 allows remote attackers to use malicious applets to r… | 2024-07-23T19:27:48.802000Z |