Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2023-3950 |
5.5 (3.1)
|
Cleartext Storage of Sensitive Information in GitLab |
GitLab |
GitLab |
2023-09-01T10:30:46.990Z | 2026-05-06T04:05:52.878Z |
| CVE-2026-41651 |
8.8 (3.1)
|
PackageKit vulnerable to TOCTOU Race on Transaction Fl… |
PackageKit |
PackageKit |
2026-04-22T13:11:40.174Z | 2026-05-06T03:56:11.620Z |
| CVE-2026-23479 |
7.7 (4.0)
|
redis-server use-after-free in unblock client flow may… |
redis |
redis |
2026-05-05T16:36:05.486Z | 2026-05-06T03:56:08.169Z |
| CVE-2026-7791 |
7.8 (3.1)
8.5 (4.0)
|
Improper privilege management in the log rotation… |
Amazon |
Workspaces |
2026-05-04T22:07:35.680Z | 2026-05-06T03:56:05.603Z |
| CVE-2022-24387 |
9.1 (3.1)
|
File upload and overwrite to app_data/Config in Smarte… |
SmarterTools |
SmarterTrack |
2022-03-14T12:15:59.000Z | 2026-05-05T21:08:45.102Z |
| CVE-2025-9820 |
4 (3.1)
|
Gnutls: stack-based buffer overflow in gnutls_pkcs11_t… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-01-26T19:58:32.886Z | 2026-05-05T20:38:01.286Z |
| CVE-2026-3118 |
6.5 (3.1)
|
Rhdh: graphql injection leading to platform-wide denia… |
Red Hat |
Red Hat Developer Hub 1.8 |
2026-02-25T11:25:55.016Z | 2026-05-05T20:37:00.910Z |
| CVE-2025-14831 |
5.3 (3.1)
|
Gnutls: gnutls: denial of service via excessive resour… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-02-09T14:51:32.447Z | 2026-05-05T20:33:31.392Z |
| CVE-2026-26158 |
7 (3.1)
|
Busybox: busybox: arbitrary file modification and priv… |
Red Hat |
Red Hat Hardened Images |
2026-02-11T20:27:06.979Z | 2026-05-05T20:32:18.509Z |
| CVE-2026-26157 |
7 (3.1)
|
Busybox: busybox: arbitrary file overwrite and potenti… |
Red Hat |
Red Hat Hardened Images |
2026-02-11T20:27:06.196Z | 2026-05-05T20:32:06.403Z |
| CVE-2026-7233 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
Artifex MuPDF CFF Index subset-cff.c fz_subset_cff_for… |
Artifex |
MuPDF |
2026-04-28T06:00:18.874Z | 2026-05-05T20:23:51.185Z |
| CVE-2026-29169 |
N/A
|
Apache HTTP Server: mod_dav_lock indirect lock crash |
Apache Software Foundation |
Apache HTTP Server |
2026-05-04T14:48:29.832Z | 2026-05-05T20:23:49.062Z |
| CVE-2026-7264 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
SourceCodester Pizzafy Ecommerce System ajax.php get_c… |
SourceCodester |
Pizzafy Ecommerce System |
2026-04-28T09:30:14.143Z | 2026-05-05T20:21:21.943Z |
| CVE-2025-61669 |
6.3 (4.0)
|
jupyter_server next parameter open redirect can redire… |
jupyter-server |
jupyter_server |
2026-05-05T15:28:43.833Z | 2026-05-05T20:16:59.332Z |
| CVE-2026-7585 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open5GS AMF nudm-handler.c amf_nudm_sdm_handle_provisi… |
n/a |
Open5GS |
2026-05-01T15:15:11.088Z | 2026-05-05T20:11:07.029Z |
| CVE-2026-7855 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
D-Link DI-8100 HTTP Request tggl.asp tggl_asp buffer o… |
D-Link |
DI-8100 |
2026-05-05T18:30:16.915Z | 2026-05-05T19:58:51.054Z |
| CVE-2026-7707 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open5GS UDR nudr-handler.c udr_nudr_dr_handle_subscrip… |
n/a |
Open5GS |
2026-05-03T22:30:12.651Z | 2026-05-05T19:56:53.348Z |
| CVE-2026-7701 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Telegram Desktop Bot API url_auth_box.cpp RequestButto… |
Telegram |
Desktop |
2026-05-03T15:30:12.491Z | 2026-05-05T19:53:51.230Z |
| CVE-2026-7695 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Acrel Electrical EEMS Enterprise Power Operation and M… |
Acrel Electrical |
EEMS Enterprise Power Operation and Maintenance Cloud Platform |
2026-05-03T12:15:36.951Z | 2026-05-05T19:50:27.440Z |
| CVE-2026-7688 |
2.3 (4.0)
5 (3.1)
5 (3.0)
|
Dolibarr ERP CRM Shipments API Endpoint expedition.cla… |
Dolibarr |
ERP CRM |
2026-05-03T09:15:11.998Z | 2026-05-05T19:48:37.202Z |
| CVE-2026-7597 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
mem0ai mem0 faiss.py pickle.dump deserialization |
mem0ai |
mem0 |
2026-05-01T21:15:11.399Z | 2026-05-05T19:45:33.404Z |
| CVE-2026-32699 |
5.3 (4.0)
|
FacturaScripts unauthorized modification of immutable … |
NeoRazorX |
facturascripts |
2026-05-05T19:00:19.957Z | 2026-05-05T19:44:45.408Z |
| CVE-2026-7603 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
JeecgBoot LoadFile Endpoint FileDownloadUtils.jav chec… |
n/a |
JeecgBoot |
2026-05-02T04:15:11.675Z | 2026-05-05T19:43:31.623Z |
| CVE-2026-33489 |
8.2 (4.0)
|
CoreDNS transfer plugin subzone ACL bypass via lexicog… |
coredns |
coredns |
2026-05-05T19:13:48.461Z | 2026-05-05T19:43:06.361Z |
| CVE-2026-7857 |
8.6 (4.0)
7.2 (3.1)
7.2 (3.0)
|
D-Link DI-8100 CGI user_group.asp sprintf buffer overflow |
D-Link |
DI-8100 |
2026-05-05T19:15:13.939Z | 2026-05-05T19:39:19.507Z |
| CVE-2026-33324 |
9.4 (4.0)
|
SQLBot prompt injection allows arbitrary SQL execution… |
dataease |
SQLBot |
2026-05-05T19:09:36.031Z | 2026-05-05T19:38:28.127Z |
| CVE-2026-31893 |
6.8 (4.0)
|
Tunnelblick arbitrary file read via symlink following … |
Tunnelblick |
Tunnelblick |
2026-05-05T18:55:41.737Z | 2026-05-05T19:37:47.926Z |
| CVE-2026-34084 |
9.2 (4.0)
|
PhpSpreadsheet SSRF and RCE via PHP stream wrappers in… |
PHPOffice |
PhpSpreadsheet |
2026-05-05T19:22:16.383Z | 2026-05-05T19:32:59.799Z |
| CVE-2026-32936 |
8.7 (4.0)
|
CoreDNS DoH GET path missing size validation causes CP… |
coredns |
coredns |
2026-05-05T19:07:51.926Z | 2026-05-05T19:32:25.341Z |
| CVE-2026-7856 |
8.6 (4.0)
7.2 (3.1)
7.2 (3.0)
|
D-Link DI-8100 Web Management url_member.asp buffer overflow |
D-Link |
DI-8100 |
2026-05-05T19:00:14.098Z | 2026-05-05T19:30:58.408Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2016-9966 |
N/A
|
Lack of appropriate exception handling in some re… |
n/a |
n/a |
2016-12-16T09:02:00.000Z | 2024-08-06T03:07:31.821Z |
| CVE-2016-9965 |
N/A
|
Lack of appropriate exception handling in some re… |
n/a |
n/a |
2016-12-16T09:02:00.000Z | 2024-08-06T03:07:31.655Z |
| CVE-2016-9964 |
N/A
|
redirect() in bottle.py in bottle 0.12.10 doesn't… |
n/a |
n/a |
2016-12-16T09:02:00.000Z | 2024-08-06T03:07:31.418Z |
| CVE-2016-9951 |
N/A
|
An issue was discovered in Apport before 2.20.4. … |
n/a |
n/a |
2016-12-17T03:34:00.000Z | 2024-08-06T03:07:32.111Z |
| CVE-2016-9950 |
N/A
|
An issue was discovered in Apport before 2.20.4. … |
n/a |
n/a |
2016-12-17T03:34:00.000Z | 2024-08-06T03:07:31.640Z |
| CVE-2016-9949 |
N/A
|
An issue was discovered in Apport before 2.20.4. … |
n/a |
n/a |
2016-12-17T03:34:00.000Z | 2024-08-06T03:07:31.413Z |
| CVE-2016-9942 |
N/A
|
Heap-based buffer overflow in ultra.c in LibVNCCl… |
n/a |
n/a |
2016-12-31T18:00:00.000Z | 2024-08-06T03:07:31.414Z |
| CVE-2016-9941 |
N/A
|
Heap-based buffer overflow in rfbproto.c in LibVN… |
n/a |
n/a |
2016-12-31T18:00:00.000Z | 2024-08-06T03:07:31.407Z |
| CVE-2016-9938 |
N/A
|
An issue was discovered in Asterisk Open Source 1… |
n/a |
n/a |
2016-12-12T21:00:00.000Z | 2024-08-06T03:07:31.471Z |
| CVE-2016-9937 |
N/A
|
An issue was discovered in Asterisk Open Source 1… |
n/a |
n/a |
2016-12-12T21:00:00.000Z | 2024-08-06T03:07:31.584Z |
| CVE-2016-9936 |
N/A
|
The unserialize implementation in ext/standard/va… |
n/a |
n/a |
2017-01-04T20:00:00.000Z | 2024-08-06T03:07:31.127Z |
| CVE-2016-9935 |
N/A
|
The php_wddx_push_element function in ext/wddx/wd… |
n/a |
n/a |
2017-01-04T20:00:00.000Z | 2024-08-06T03:07:31.375Z |
| CVE-2016-9934 |
N/A
|
ext/wddx/wddx.c in PHP before 5.6.28 and 7.x befo… |
n/a |
n/a |
2017-01-04T20:00:00.000Z | 2024-08-06T03:07:31.392Z |
| CVE-2016-9933 |
N/A
|
Stack consumption vulnerability in the gdImageFil… |
n/a |
n/a |
2017-01-04T20:00:00.000Z | 2024-08-06T03:07:31.422Z |
| CVE-2016-9923 |
N/A
|
Quick Emulator (Qemu) built with the 'chardev' ba… |
n/a |
n/a |
2016-12-23T22:00:00.000Z | 2024-08-06T03:07:31.921Z |
| CVE-2016-9921 |
N/A
|
Quick emulator (Qemu) built with the Cirrus CLGD … |
n/a |
n/a |
2016-12-23T22:00:00.000Z | 2024-08-06T03:07:31.373Z |
| CVE-2016-9920 |
N/A
|
steps/mail/sendmail.inc in Roundcube before 1.1.7… |
n/a |
n/a |
2016-12-08T18:00:00.000Z | 2024-08-06T03:07:31.413Z |
| CVE-2016-9919 |
N/A
|
The icmp6_send function in net/ipv6/icmp.c in the… |
n/a |
n/a |
2016-12-08T17:00:00.000Z | 2024-08-06T03:07:31.874Z |
| CVE-2016-9918 |
N/A
|
In BlueZ 5.42, an out-of-bounds read was identifi… |
n/a |
n/a |
2016-12-08T08:08:00.000Z | 2024-08-06T03:07:31.243Z |
| CVE-2016-9917 |
N/A
|
In BlueZ 5.42, a buffer overflow was observed in … |
n/a |
n/a |
2016-12-08T08:08:00.000Z | 2024-08-06T03:07:31.290Z |
| CVE-2016-9916 |
N/A
|
Memory leak in hw/9pfs/9p-proxy.c in QEMU (aka Qu… |
n/a |
n/a |
2016-12-29T22:00:00.000Z | 2024-08-06T03:07:31.919Z |
| CVE-2016-9915 |
N/A
|
Memory leak in hw/9pfs/9p-handle.c in QEMU (aka Q… |
n/a |
n/a |
2016-12-29T22:00:00.000Z | 2024-08-06T03:07:31.154Z |
| CVE-2016-9914 |
N/A
|
Memory leak in hw/9pfs/9p.c in QEMU (aka Quick Em… |
n/a |
n/a |
2016-12-29T22:00:00.000Z | 2024-08-06T03:07:31.309Z |
| CVE-2016-9913 |
N/A
|
Memory leak in the v9fs_device_unrealize_common f… |
n/a |
n/a |
2016-12-29T22:00:00.000Z | 2024-08-06T03:07:31.588Z |
| CVE-2016-9912 |
N/A
|
Quick Emulator (Qemu) built with the Virtio GPU D… |
n/a |
n/a |
2016-12-23T22:00:00.000Z | 2024-08-06T03:07:31.420Z |
| CVE-2016-9911 |
N/A
|
Quick Emulator (Qemu) built with the USB EHCI Emu… |
n/a |
n/a |
2016-12-23T22:00:00.000Z | 2024-08-06T03:07:31.451Z |
| CVE-2016-9908 |
N/A
|
Quick Emulator (Qemu) built with the Virtio GPU D… |
n/a |
n/a |
2016-12-23T22:00:00.000Z | 2024-08-06T03:07:31.376Z |
| CVE-2016-9907 |
N/A
|
Quick Emulator (Qemu) built with the USB redirect… |
n/a |
n/a |
2016-12-23T22:00:00.000Z | 2024-08-06T03:07:31.326Z |
| CVE-2016-9891 |
N/A
|
Cross-site scripting (XSS) vulnerability in admin… |
n/a |
n/a |
2016-12-29T18:00:00.000Z | 2024-08-06T03:07:32.084Z |
| CVE-2016-9889 |
N/A
|
Some forms with the parameter geo_zoomlevel_to_fo… |
n/a |
n/a |
2016-12-23T05:00:00.000Z | 2024-08-06T03:07:30.869Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2016-9964 | redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF a… | 2016-12-16T09:59:00.373 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9951 | An issue was discovered in Apport before 2.20.4. A malicious Apport crash file can contain a restar… | 2016-12-17T03:59:00.357 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9950 | An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport cras… | 2016-12-17T03:59:00.327 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9949 | An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field an… | 2016-12-17T03:59:00.297 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9942 | Heap-based buffer overflow in ultra.c in LibVNCClient in LibVNCServer before 0.9.11 allows remote s… | 2016-12-31T18:59:00.180 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9941 | Heap-based buffer overflow in rfbproto.c in LibVNCClient in LibVNCServer before 0.9.11 allows remot… | 2016-12-31T18:59:00.133 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9938 | An issue was discovered in Asterisk Open Source 11.x before 11.25.1, 13.x before 13.13.1, and 14.x … | 2016-12-12T21:59:01.617 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9937 | An issue was discovered in Asterisk Open Source 13.12.x and 13.13.x before 13.13.1 and 14.x before … | 2016-12-12T21:59:00.303 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9936 | The unserialize implementation in ext/standard/var.c in PHP 7.x before 7.0.14 allows remote attacke… | 2017-01-04T20:59:00.607 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9935 | The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 al… | 2017-01-04T20:59:00.573 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9934 | ext/wddx/wddx.c in PHP before 5.6.28 and 7.x before 7.0.13 allows remote attackers to cause a denia… | 2017-01-04T20:59:00.527 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9933 | Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Libr… | 2017-01-04T20:59:00.480 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9923 | Quick Emulator (Qemu) built with the 'chardev' backend support is vulnerable to a use after free is… | 2016-12-23T22:59:00.580 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9921 | Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divid… | 2016-12-23T22:59:00.550 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9920 | steps/mail/sendmail.inc in Roundcube before 1.1.7 and 1.2.x before 1.2.3, when no SMTP server is co… | 2016-12-08T18:59:00.200 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9919 | The icmp6_send function in net/ipv6/icmp.c in the Linux kernel through 4.8.12 omits a certain check… | 2016-12-08T17:59:03.867 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9918 | In BlueZ 5.42, an out-of-bounds read was identified in "packet_hexdump" function in "monitor/packet… | 2016-12-08T08:59:04.740 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9917 | In BlueZ 5.42, a buffer overflow was observed in "read_n" function in "tools/hcidump.c" source file… | 2016-12-08T08:59:03.617 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9916 | Memory leak in hw/9pfs/9p-proxy.c in QEMU (aka Quick Emulator) allows local privileged guest OS use… | 2016-12-29T22:59:00.700 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9915 | Memory leak in hw/9pfs/9p-handle.c in QEMU (aka Quick Emulator) allows local privileged guest OS us… | 2016-12-29T22:59:00.667 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9914 | Memory leak in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to … | 2016-12-29T22:59:00.637 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9913 | Memory leak in the v9fs_device_unrealize_common function in hw/9pfs/9p.c in QEMU (aka Quick Emulato… | 2016-12-29T22:59:00.620 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9912 | Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to a memory l… | 2016-12-23T22:59:00.517 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9911 | Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage i… | 2016-12-23T22:59:00.487 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9908 | Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to an informa… | 2016-12-23T22:59:00.440 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9907 | Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory lea… | 2016-12-23T22:59:00.410 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9891 | Cross-site scripting (XSS) vulnerability in admin/media.php and admin/media_item.php in Dotclear be… | 2016-12-29T18:59:00.257 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9889 | Some forms with the parameter geo_zoomlevel_to_found_location in Tiki Wiki CMS 12.x before 12.10 LT… | 2016-12-23T05:59:00.720 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9888 | An error within the "tar_directory_for_file()" function (gsf-infile-tar.c) in GNOME Structured File… | 2016-12-08T08:59:02.430 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9885 | An issue was discovered in Pivotal GemFire for PCF 1.6.x versions prior to 1.6.5 and 1.7.x versions… | 2017-01-06T22:59:00.390 | 2026-05-06T22:30:45.220 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-4rm2-28vj-fj39 |
9.4 (3.1)
|
Scramble vulnerable to remote code execution via evaluation of user-controlled input in validation rules | 2026-05-06T19:54:56Z | 2026-05-06T19:54:56Z |
| ghsa-v6x6-pjxw-3pv2 |
5.9 (3.1)
|
Spring AI's VectorStoreChatMemoryAdvisor conversation scoping can lead to cross-tenant memory exfil… | 2026-04-28T09:34:13Z | 2026-05-06T19:54:29Z |
| ghsa-63c8-m9m2-cvr3 |
8.8 (3.1)
|
Spring AI has SQL Injection in CosmosDBVectorStore.doDelete() | 2026-04-28T09:34:13Z | 2026-05-06T19:54:17Z |
| ghsa-r5hp-3cgj-j6xv |
6.1 (3.1)
|
Spring AI's ONNX model cache defaults to world-writable predictable /tmp directory | 2026-04-28T09:34:13Z | 2026-05-06T19:52:09Z |
| ghsa-26gg-9gv2-v27j |
6.5 (3.1)
|
Spring AI Vulnerable to OOM by attacker-controlled PDF | 2026-04-28T09:34:13Z | 2026-05-06T19:51:54Z |
| ghsa-qc4j-qjqx-vr58 |
8.6 (3.1)
|
Spring AI has a VectorStore FilterExpression Converter injection | 2026-04-28T09:34:12Z | 2026-05-06T19:51:33Z |
| ghsa-vqv8-j3mj-wjxj |
5.4 (3.1)
|
wger: trainer_login open redirect - ?next= parameter not validated against host | 2026-05-06T19:50:52Z | 2026-05-06T19:50:52Z |
| ghsa-mhc8-p3jx-84mm |
9.9 (3.1)
|
wger: cross-tenant password reset and plaintext disclosure via gym=None bypass | 2026-05-06T19:50:31Z | 2026-05-06T19:50:31Z |
| ghsa-xq9m-hmp9-fw87 |
7.4 (3.1)
|
wger: CSV/TSV formula injection in gym member export (first_name/last_name) | 2026-05-06T19:48:16Z | 2026-05-06T19:48:16Z |
| ghsa-r2jq-4h3x-rfj6 |
7.3 (3.1)
5.5 (4.0)
|
BigSweetPotatoStudio HyperChat has a Server-Side Request Forgery issue | 2026-04-28T06:30:29Z | 2026-05-06T19:44:30Z |
| ghsa-hjph-f4mc-wx4c |
7.7 (4.0)
|
Duplicate Advisory: Mistune has a ReDoS in LINK_TITLE_RE that allows denial of service via crafted … | 2026-05-06T16:56:26Z | 2026-05-06T19:41:14Z |
| ghsa-wqpv-c3pp-3m58 |
6.6 (3.1)
|
OpenStack Ironic is Vulnerable to Inclusion of Functionality from Untrusted Control Sphere | 2026-04-28T06:30:29Z | 2026-05-06T19:41:11Z |
| ghsa-8mp2-v27r-99xp |
8.7 (4.0)
|
Mistune has a ReDoS in LINK_TITLE_RE that allows denial of service via crafted Markdown input | 2026-05-06T16:52:43Z | 2026-05-06T19:35:51Z |
| ghsa-vjr5-c9qv-hgm3 |
9.9 (3.1)
9.4 (4.0)
|
Rucio has SQL Injection in FilterEngine Oracle JSON Path via DID Search API | 2026-05-06T16:42:49Z | 2026-05-06T19:26:31Z |
| ghsa-68j8-pq59-fqgm |
8.6 (3.1)
|
NLTK has a Path Traversal issue | 2026-03-04T21:32:45Z | 2026-05-06T19:18:16Z |
| ghsa-4j28-22qp-rjcf |
7.3 (3.1)
5.5 (4.0)
|
sqlite-mcp has an Injection issue | 2026-04-28T03:31:29Z | 2026-05-06T19:18:03Z |
| ghsa-vc5j-42hh-j3mr |
7.3 (3.1)
5.5 (4.0)
|
notes-mcp has a Path Traversal issue | 2026-04-28T03:31:29Z | 2026-05-06T19:17:13Z |
| ghsa-3r34-vq8m-39gh |
8.1 (3.1)
|
Lemur: LDAP Filter Injection enables post-authentication privilege escalation | 2026-05-06T19:16:59Z | 2026-05-06T19:16:59Z |
| ghsa-8pf2-vj79-4wxg |
5.4 (3.1)
5.3 (4.0)
|
Duplicate Advisory: OpenClaw: MSTeams thread history bypasses sender allowlist via Graph API | 2026-04-28T00:31:41Z | 2026-05-06T19:12:17Z |
| ghsa-cg7q-fg22-4g98 |
6.5 (3.1)
7.1 (4.0)
|
OpenClaw: Host exec environment sanitization misses package, registry, Docker, compiler, and TLS ov… | 2026-04-03T03:07:13Z | 2026-05-06T19:12:01Z |
| ghsa-5mh4-3rv3-fpcf |
6.5 (3.1)
7.1 (4.0)
|
Duplicate Advisory: OpenClaw: Host exec environment sanitization misses package, registry, Docker, … | 2026-04-28T00:31:41Z | 2026-05-06T19:11:41Z |
| ghsa-fv94-qvg8-xqpw |
8.1 (3.1)
7.2 (4.0)
|
OpenClaw: SSH sandbox tar upload follows symlinks, enabling arbitrary file write on remote host | 2026-04-02T21:23:32Z | 2026-05-06T19:11:31Z |
| ghsa-5799-3xg7-rfrv |
8.1 (3.1)
7.2 (4.0)
|
Duplicate Advisory: OpenClaw: SSH sandbox tar upload follows symlinks, enabling arbitrary file writ… | 2026-04-28T00:31:41Z | 2026-05-06T19:11:10Z |
| ghsa-5368-6h4h-gr29 |
4.7 (3.1)
|
Spring Boot's PID file write follows symlinks at predictable default path | 2026-04-28T00:31:41Z | 2026-05-06T19:05:35Z |
| ghsa-fh32-73r9-rgh5 |
5.8 (3.1)
6.9 (4.0)
|
OpenClaw: Trailing-dot localhost CDP hosts could bypass remote loopback protections | 2026-04-07T18:15:56Z | 2026-05-06T19:03:55Z |
| ghsa-f5fm-9jmp-c88r |
5.8 (3.1)
6.9 (4.0)
|
Duplicate Advisory: OpenClaw: Trailing-dot localhost CDP hosts could bypass remote loopback protections | 2026-04-28T00:31:41Z | 2026-05-06T19:03:41Z |
| ghsa-9vc8-qppq-wvxc |
5.0 (3.1)
|
Spring Boot's RabbitMQ auto-configuration doesn't perform hostname verification when connecting to … | 2026-04-28T00:31:40Z | 2026-05-06T19:02:59Z |
| ghsa-wfr3-hf93-qgg3 |
7.3 (3.1)
5.5 (4.0)
|
mkdocs-mcp-plugin has a Path Traversal issue | 2026-04-28T00:31:40Z | 2026-05-06T19:02:37Z |
| ghsa-56v8-86gj-66jp |
7.5 (3.1)
|
Spring Boot DevTools remote secret comparison is vulnerable to timing attacks | 2026-04-28T00:31:40Z | 2026-05-06T19:02:13Z |
| ghsa-mqvw-jfmh-93qq |
5.0 (3.1)
|
Spring Boot's Cassandra SSL auto-configuration disables TLS hostname verification | 2026-04-28T00:31:41Z | 2026-05-06T19:01:23Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-835 |
|
TensorFlow is an open source platform for machine learning. In affected versions TensorFl… | tensorflow-gpu | 2021-11-05T23:15:00Z | 2021-12-09T06:35:45.436106Z |
| pysec-2021-834 |
|
TensorFlow is an open source platform for machine learning. In affected versions the `Imm… | tensorflow-gpu | 2021-11-05T23:15:00Z | 2021-12-09T06:35:45.274918Z |
| pysec-2021-833 |
|
TensorFlow is an open source platform for machine learning. In affected versions the impl… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:45.112404Z |
| pysec-2021-832 |
|
TensorFlow is an open source platform for machine learning. In affected versions TensorFl… | tensorflow-gpu | 2021-11-05T23:15:00Z | 2021-12-09T06:35:44.943479Z |
| pysec-2021-831 |
|
TensorFlow is an open source platform for machine learning. In affected versions the impl… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:44.787766Z |
| pysec-2021-830 |
|
TensorFlow is an open source platform for machine learning. In affected versions the impl… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:44.623762Z |
| pysec-2021-829 |
|
TensorFlow is an open source platform for machine learning. In affected versions the impl… | tensorflow-gpu | 2021-11-05T23:15:00Z | 2021-12-09T06:35:44.467539Z |
| pysec-2021-828 |
|
TensorFlow is an open source platform for machine learning. In affected versions the shap… | tensorflow-gpu | 2021-11-05T23:15:00Z | 2021-12-09T06:35:44.302427Z |
| pysec-2021-827 |
|
TensorFlow is an open source platform for machine learning. In affected versions the asyn… | tensorflow-gpu | 2021-11-05T23:15:00Z | 2021-12-09T06:35:44.147623Z |
| pysec-2021-826 |
|
TensorFlow is an open source platform for machine learning. In affected versions the code… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:44.063409Z |
| pysec-2021-825 |
|
TensorFlow is an open source platform for machine learning. In affected versions the shap… | tensorflow-gpu | 2021-11-05T22:15:00Z | 2021-12-09T06:35:43.909633Z |
| pysec-2021-824 |
|
TensorFlow is an open source platform for machine learning. In affected versions the proc… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:43.751303Z |
| pysec-2021-823 |
|
TensorFlow is an open source platform for machine learning. In affected versions the shap… | tensorflow-gpu | 2021-11-05T23:15:00Z | 2021-12-09T06:35:43.595346Z |
| pysec-2021-822 |
|
TensorFlow is an open source platform for machine learning. In affected versions the shap… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:43.442119Z |
| pysec-2021-821 |
|
TensorFlow is an open source platform for machine learning. In affected versions the shap… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:43.281523Z |
| pysec-2021-820 |
|
TensorFlow is an open source platform for machine learning. In affected versions the code… | tensorflow-gpu | 2021-11-05T23:15:00Z | 2021-12-09T06:35:43.109542Z |
| pysec-2021-819 |
|
TensorFlow is an open source platform for machine learning. In affected versions the shap… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:42.944198Z |
| pysec-2021-818 |
|
TensorFlow is an open source platform for machine learning. In affected versions the shap… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:42.767652Z |
| pysec-2021-817 |
|
TensorFlow is an open source platform for machine learning. In affected versions the shap… | tensorflow-gpu | 2021-11-05T20:15:00Z | 2021-12-09T06:35:42.682170Z |
| pysec-2021-816 |
|
TensorFlow is an open source platform for machine learning. In affected versions the impl… | tensorflow-gpu | 2021-11-05T22:15:00Z | 2021-12-09T06:35:42.527822Z |
| pysec-2021-815 |
|
TensorFlow is an open source platform for machine learning. In affected versions the code… | tensorflow-gpu | 2021-11-05T22:15:00Z | 2021-12-09T06:35:42.346240Z |
| pysec-2021-814 |
|
TensorFlow is an open source platform for machine learning. In affected versions the impl… | tensorflow-gpu | 2021-11-05T22:15:00Z | 2021-12-09T06:35:42.190672Z |
| pysec-2021-813 |
|
TensorFlow is an open source platform for machine learning. In affected versions the shap… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:42.034732Z |
| pysec-2021-812 |
|
TensorFlow is an open source platform for machine learning. In affected versions during T… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:41.878388Z |
| pysec-2021-811 |
|
TensorFlow is an open source platform for machine learning. In affected versions an attac… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:41.718393Z |
| pysec-2021-810 |
|
TensorFlow is an open source platform for machine learning. In affected versions while ca… | tensorflow-gpu | 2021-11-05T22:15:00Z | 2021-12-09T06:35:41.560413Z |
| pysec-2021-809 |
|
TensorFlow is an open source platform for machine learning. In affeced versions during ex… | tensorflow-gpu | 2021-11-05T20:15:00Z | 2021-12-09T06:35:41.402625Z |
| pysec-2021-808 |
|
TensorFlow is an open source platform for machine learning. In affected versions if `tf.s… | tensorflow-gpu | 2021-11-05T20:15:00Z | 2021-12-09T06:35:41.245758Z |
| pysec-2021-807 |
|
TensorFlow is an open source platform for machine learning. In affected versions if `tf.i… | tensorflow-gpu | 2021-11-05T20:15:00Z | 2021-12-09T06:35:41.080668Z |
| pysec-2021-806 |
|
TensorFlow is an open source platform for machine learning. In affected versions if `tf.t… | tensorflow-gpu | 2021-11-05T20:15:00Z | 2021-12-09T06:35:40.903537Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32781 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ThemeHigh Ema… | 2024-04-19T05:01:58.065533Z |
| gsd-2024-32780 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in E4J s.R.L. Vi… | 2024-04-19T05:01:58.046836Z |
| gsd-2024-32776 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:58.070471Z |
| gsd-2024-32774 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:58.030630Z |
| gsd-2024-32773 | Cross-Site Request Forgery (CSRF) vulnerability in WP Royal Royal Elementor Kit.This issu… | 2024-04-19T05:01:58.024924Z |
| gsd-2024-32772 | Authorization Bypass Through User-Controlled Key vulnerability in Metagauss ProfileGrid.T… | 2024-04-19T05:01:58.098373Z |
| gsd-2024-32765 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:58.028866Z |
| gsd-2024-32849 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.970620Z |
| gsd-2024-32848 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.868014Z |
| gsd-2024-32847 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.971318Z |
| gsd-2024-32846 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.902863Z |
| gsd-2024-32845 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.842282Z |
| gsd-2024-32844 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.936882Z |
| gsd-2024-32843 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.947422Z |
| gsd-2024-32841 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.898617Z |
| gsd-2024-32840 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.947995Z |
| gsd-2024-32838 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.829960Z |
| gsd-2024-32837 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.983820Z |
| gsd-2024-32836 | Unrestricted Upload of File with Dangerous Type vulnerability in WP Lab WP-Lister Lite fo… | 2024-04-19T05:01:57.901892Z |
| gsd-2024-32835 | Deserialization of Untrusted Data vulnerability in WebToffee Import Export WordPress User… | 2024-04-19T05:01:57.831266Z |
| gsd-2024-32833 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-19T05:01:57.843038Z |
| gsd-2024-32832 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.815537Z |
| gsd-2024-32831 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.917683Z |
| gsd-2024-32830 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.907962Z |
| gsd-2024-32827 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.919798Z |
| gsd-2024-32826 | Missing Authorization vulnerability in Vektor,Inc. VK Block Patterns.This issue affects V… | 2024-04-19T05:01:57.959776Z |
| gsd-2024-32825 | Insertion of Sensitive Information into Log File vulnerability in Patrick Posner Simply S… | 2024-04-19T05:01:57.887255Z |
| gsd-2024-32824 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.825637Z |
| gsd-2024-32823 | Authorization Bypass Through User-Controlled Key vulnerability in FeedbackWP Rate my Post… | 2024-04-19T05:01:57.905393Z |
| gsd-2024-32822 | Missing Authorization vulnerability in impleCode Reviews Plus.This issue affects Reviews … | 2024-04-19T05:01:57.917168Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2228 | Malicious code in @zecho/baileys-mod (npm) | 2026-03-26T00:57:13Z | 2026-03-31T03:12:00Z |
| mal-2026-2221 | Malicious code in @validator-lut-sdk/v3 (npm) | 2026-03-26T00:52:20Z | 2026-03-31T03:12:00Z |
| mal-2026-2220 | Malicious code in @universeorg/dotenv (npm) | 2026-03-26T00:31:20Z | 2026-03-31T03:12:00Z |
| mal-2026-2219 | Malicious code in @solmasterv3/solana-metadata-sdk (npm) | 2026-03-26T00:52:19Z | 2026-03-31T03:12:00Z |
| mal-2026-2218 | Malicious code in @solana-ipfs/sdk (npm) | 2026-03-26T00:52:19Z | 2026-03-31T03:12:00Z |
| mal-2026-2216 | Malicious code in @pumpfun-ipfs/sdk (npm) | 2026-03-26T00:52:19Z | 2026-03-31T03:12:00Z |
| mal-2026-2213 | Malicious code in @virtahealth/substrate-root (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:12:00Z |
| mal-2026-2212 | Malicious code in @opengov/qa-record-types-api (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:12:00Z |
| mal-2026-2210 | Malicious code in @opengov/form-builder (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:12:00Z |
| mal-2026-2209 | Malicious code in @emilgroup/translation-sdk-node (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:12:00Z |
| mal-2026-2208 | Malicious code in @emilgroup/setting-sdk (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:12:00Z |
| mal-2026-2207 | Malicious code in @emilgroup/process-manager-sdk-node (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:12:00Z |
| mal-2026-2206 | Malicious code in @emilgroup/process-manager-sdk (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:12:00Z |
| mal-2026-2197 | Malicious code in allergan (npm) | 2026-03-25T02:40:45Z | 2026-03-31T03:12:00Z |
| mal-2026-2193 | Malicious code in @sixcore/baileys (npm) | 2026-03-25T14:14:18Z | 2026-03-31T03:12:00Z |
| mal-2026-2167 | Malicious code in @shennmine/libsignal-node (npm) | 2026-03-25T03:05:29Z | 2026-03-31T03:12:00Z |
| mal-2026-2166 | Malicious code in @shennmine/baileys (npm) | 2026-03-25T03:05:29Z | 2026-03-31T03:12:00Z |
| mal-2026-2165 | Malicious code in @rexxtheproject/keyed-db (npm) | 2026-03-25T01:54:00Z | 2026-03-31T03:12:00Z |
| mal-2026-2164 | Malicious code in @rexxtheproject/elaina-libsignal (npm) | 2026-03-25T01:54:00Z | 2026-03-31T03:12:00Z |
| mal-2026-2163 | Malicious code in @rexxtheproject/elaina-baileys (npm) | 2026-03-25T01:54:00Z | 2026-03-31T03:12:00Z |
| mal-2026-2159 | Malicious code in @eric-orderbuddyinfo/react-noval (npm) | 2026-03-25T01:50:59Z | 2026-03-31T03:12:00Z |
| mal-2026-2153 | Malicious code in @xvortexsockets/baileys (npm) | 2026-03-25T00:11:34Z | 2026-03-31T03:12:00Z |
| mal-2026-2137 | Malicious code in @one-site/europcar (npm) | 2026-03-24T13:40:41Z | 2026-03-31T03:12:00Z |
| mal-2026-2127 | Malicious code in agoda-test-poc (npm) | 2026-03-24T12:48:28Z | 2026-03-31T03:12:00Z |
| mal-2026-2126 | Malicious code in agoda-dep-confusion (npm) | 2026-03-24T12:48:28Z | 2026-03-31T03:12:00Z |
| mal-2026-2205 | Malicious code in @emilgroup/partner-sdk (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:11:59Z |
| mal-2026-2204 | Malicious code in @emilgroup/numbergenerator-sdk-node (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:11:59Z |
| mal-2026-2203 | Malicious code in @emilgroup/discount-sdk-node (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:11:59Z |
| mal-2026-2202 | Malicious code in @emilgroup/commission-sdk (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:11:59Z |
| mal-2026-2304 | Malicious code in spanner-client (PyPI) | 2026-03-30T16:07:34Z | 2026-03-30T16:07:34Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-1750 | QT: Schwachstelle ermöglicht Denial of Service | 2023-07-13T22:00:00.000+00:00 | 2025-06-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1315 | GitLab: Mehrere Schwachstellen | 2025-06-11T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1314 | Apple Produkte: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-06-11T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1313 | PaloAlto Networks PAN-OS: Mehrere Schwachstellen | 2025-06-11T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1311 | QT: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-06-11T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1310 | PaloAlto Networks GlobalProtect: Mehrere Schwachstellen | 2025-06-11T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1309 | IBM Tivoli Netcool/OMNIbus: Schwachstelle ermöglicht Denial of Service | 2025-06-11T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1307 | Mitel OpenScape Accounting Management: Schwachstelle ermöglicht Codeausführung | 2025-06-11T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1306 | PaloAlto Networks Cortex XSOAR: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-11T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1305 | Microsoft 365 Copilot: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-11T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1304 | IBM Security Guardium: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-11T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1301 | Mozilla Thunderbird: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2025-06-10T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1300 | Insyde UEFI Firmware: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1062 | Mozilla Thunderbird: Mehrere Schwachstellen | 2025-05-14T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1006 | Mattermost: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-05-12T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-0931 | Red Hat Enterprise Linux (yelp): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-05-04T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-0905 | Mattermost: Mehrere Schwachstellen | 2025-04-29T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-0668 | Apple macOS: Mehrere Schwachstellen | 2025-03-31T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-0663 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2025-03-31T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-0430 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-02-23T23:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-0257 | AMD Prozessor: Schwachstelle ermöglicht das Umgehen von Sicherheitsmaßnahmen | 2025-02-03T23:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-3487 | wget: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und Offenlegung von Informationen | 2024-11-18T23:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-3436 | GNOME: Mehrere Schwachstellen | 2024-11-12T23:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-3124 | Microsoft Entwicklerwerkzeuge: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2024-10-08T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1171 | OpenSSL: Schwachstelle ermöglicht Denial of Service | 2024-05-16T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-0280 | libxml2: Schwachstelle ermöglicht Denial of Service | 2024-02-04T23:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2023-0690 | cURL: Mehrere Schwachstellen | 2023-03-19T23:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2022-0929 | zlib: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-08-04T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2022-0005 | zlib: Schwachstelle ermöglicht Codeausführung | 2022-04-03T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1303 | Perl (IBM AIX): Schwachstelle ermöglicht Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-21-131-09 | Siemens Mendix Excel Importer Module | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-08 | Siemens Tecnomatix Plant Simulation | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-07 | Siemens SIMATIC NET CP343-1 | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-06 | Siemens SNMP Implementation of WinCC Runtime | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-05 | Siemens Mendix Database Replication Module | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-04 | Siemens SINAMICS Medium Voltage Products Remote Access (Update B) | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-110-07 | Siemens Mendix | 2021-04-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-15 | Siemens and Milestone Siveillance Video Open Network Bridge | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-14 | Siemens Nucleus DNS (Update A) | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-13 | Siemens SIMOTICS CONNECT 400 (Update A) | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-12 | Siemens Tecnomatix RobotExpert | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-08 | Siemens SINEMA Remote Connect Server | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-07 | Siemens Web Server of SCALANCE X200 (Update A) | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-06 | Siemens Solid Edge File Parsing (Update A) | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-04 | Siemens Nucleus Products DNS Module (Update A) | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-068-09 | Siemens Solid Edge File Parsing | 2021-03-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-068-06 | Siemens TCP/IP Stack Vulnerabilities-AMNESIA:33 in SENTRON PAC / 3VA Devices (Update C) | 2021-03-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-068-03 | Siemens SCALANCE and RUGGEDCOM Devices (Update A) | 2021-03-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-068-02 | Siemens SCALANCE and RUGGEDCOM Devices SSH (Update A) | 2021-03-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-047-01 | Open Design Alliance Drawings SDK (Update A) | 2021-02-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-040-06 | ICSA-21-040-06_Siemens JT2Go and Teamcenter Visualization (Update A) | 2021-05-17T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-040-05 | Siemens TIA Administrator (Update A) | 2021-02-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-019-01 | dnsmasq by Simon Kelley (Update A) | 2021-01-19T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-012-05 | Siemens SCALANCE X Products (Update B) | 2021-01-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-343-08 | Siemens Products using TightVNC (Update A) | 2020-12-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-343-05 | Siemens Embedded TCP/IP Stack Vulnerabilities-AMNESIA:33 (Update C) | 2020-12-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-252-07 | Siemens Industrial Products (Update F) | 2020-09-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-252-06 | Siemens SIMATIC HMI Products (Update A) | 2020-09-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-161-05 | Siemens SIMATIC, SINAMICS (Update C) | 2020-06-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-105-07 | Siemens SCALANCE and SIMATIC (Update H) | 2020-04-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-java-spring-scf-rce-dqrhhjxh | Vulnerability in Spring Cloud Function Framework Affecting Cisco Products: March 2022 | 2022-04-01T23:45:00+00:00 | 2022-04-15T15:31:28+00:00 |
| cisco-sa-java-spring-scf-rce-DQrHhJxH | Vulnerability in Spring Cloud Function Framework Affecting Cisco Products: March 2022 | 2022-04-01T23:45:00+00:00 | 2022-04-15T15:31:28+00:00 |
| cisco-sa-wlc-auth-bypass-jrnhv4ff | Cisco Wireless LAN Controller Management Interface Authentication Bypass Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-wlc-auth-bypass-JRNhV4fF | Cisco Wireless LAN Controller Management Interface Authentication Bypass Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-webuiapi-inj-nyrq92od | Cisco IOS XE Software Web UI API Injection Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-webuiapi-inj-Nyrq92Od | Cisco IOS XE Software Web UI API Injection Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-sdwan-vmanage-csrf-rxql4txr | Cisco SD-WAN vManage Software Cross-Site Request Forgery Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-sdwan-vmanage-csrf-rxQL4tXR | Cisco SD-WAN vManage Software Cross-Site Request Forgery Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-sdwan-vman-infodis-73shjneq | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-sdwan-vman-infodis-73sHJNEq | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-sdwan-vedge-dos-jervm4bb | Cisco SD-WAN vEdge Routers Denial of Service Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-sdwan-vedge-dos-jerVm4bB | Cisco SD-WAN vEdge Routers Denial of Service Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-sdwan-privesc-vman-tejfpbsl | Cisco SD-WAN vManage Software Privilege Escalation Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-sdwan-privesc-vman-tEJFpBSL | Cisco SD-WAN vManage Software Privilege Escalation Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-qfp-ipsec-gqmqvtqv | Cisco IOS XE Software IPSec Denial of Service Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-qfp-ipsec-GQmqvtqV | Cisco IOS XE Software IPSec Denial of Service Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-ncossh-dos-zakfodq8 | Cisco IOS XE Software NETCONF Over SSH Denial of Service Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-ncossh-dos-ZAkfOdq8 | Cisco IOS XE Software NETCONF Over SSH Denial of Service Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-iosxe-rpki-dos-2egcneke | Cisco IOS XE Software Border Gateway Protocol Resource Public Key Infrastructure Denial of Service Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-iosxe-rpki-dos-2EgCNeKE | Cisco IOS XE Software Border Gateway Protocol Resource Public Key Infrastructure Denial of Service Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-iosxe-priv-esc-grbtubu | Cisco IOS XE Software Tool Command Language Privilege Escalation Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-iosxe-priv-esc-grbtubU | Cisco IOS XE Software Tool Command Language Privilege Escalation Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-http-dos-svodkdbs | Cisco IOS and IOS XE Software Web Services Denial of Service Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-http-dos-svOdkdBS | Cisco IOS and IOS XE Software Web Services Denial of Service Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-cgr1k-ap-dos-mszr4qvh | Cisco 1000 Series Connected Grid Router Integrated Wireless Access Point Denial of Service Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-cgr1k-ap-dos-mSZR4QVh | Cisco 1000 Series Connected Grid Router Integrated Wireless Access Point Denial of Service Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-cdb-cmicr-vulns-kjjftnb | Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches Vulnerabilities | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-cdb-cmicr-vulns-KJjFtNb | Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches Vulnerabilities | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-c9800-snmp-trap-dos-mjent3ey | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Trap Denial of Service Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| cisco-sa-c9800-snmp-trap-dos-mjent3Ey | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Trap Denial of Service Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-13T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-26740 | net/sched: act_mirred: use the backlog for mirred ingress | 2024-04-02T07:00:00.000Z | 2026-03-31T15:03:11.000Z |
| msrc_cve-2026-23208 | ALSA: usb-audio: Prevent excessive number of frames | 2026-02-02T00:00:00.000Z | 2026-03-31T15:03:03.000Z |
| msrc_cve-2024-42252 | closures: Change BUG_ON() to WARN_ON() | 2024-08-02T00:00:00.000Z | 2026-03-31T15:02:55.000Z |
| msrc_cve-2024-49901 | drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs | 2024-10-01T07:00:00.000Z | 2026-03-31T15:02:54.000Z |
| msrc_cve-2024-27408 | dmaengine: dw-edma: eDMA: Add sync read before starting the DMA transfer in remote setup | 2024-05-02T07:00:00.000Z | 2026-03-31T15:02:52.000Z |
| msrc_cve-2022-50256 | drm/meson: remove drm bridges at aggregate driver unbind time | 2025-09-02T00:00:00.000Z | 2026-03-31T15:02:52.000Z |
| msrc_cve-2025-37786 | net: dsa: free routing table on probe failure | 2025-05-02T00:00:00.000Z | 2026-03-31T15:02:50.000Z |
| msrc_cve-2026-23191 | ALSA: aloop: Fix racy access at PCM trigger | 2026-02-02T00:00:00.000Z | 2026-03-31T15:02:41.000Z |
| msrc_cve-2023-52751 | smb: client: fix use-after-free in smb2_query_info_compound() | 2024-05-02T07:00:00.000Z | 2026-03-31T15:02:38.000Z |
| msrc_cve-2024-49929 | wifi: iwlwifi: mvm: avoid NULL pointer dereference | 2024-10-01T07:00:00.000Z | 2026-03-31T15:02:32.000Z |
| msrc_cve-2024-27389 | pstore: inode: Only d_invalidate() is needed | 2024-05-02T07:00:00.000Z | 2026-03-31T15:02:25.000Z |
| msrc_cve-2025-39797 | xfrm: Duplicate SPI Handling | 2025-09-02T00:00:00.000Z | 2026-03-31T15:02:23.000Z |
| msrc_cve-2025-22090 | x86/mm/pat: Fix VM_PAT handling when fork() fails in copy_page_range() | 2025-04-02T00:00:00.000Z | 2026-03-31T15:02:22.000Z |
| msrc_cve-2026-23171 | bonding: fix use-after-free due to enslave fail after slave array update | 2026-02-02T00:00:00.000Z | 2026-03-31T15:02:13.000Z |
| msrc_cve-2024-26669 | net/sched: flower: Fix chain template offload | 2024-04-02T07:00:00.000Z | 2026-03-31T15:02:12.000Z |
| msrc_cve-2024-27056 | wifi: iwlwifi: mvm: ensure offloading TID queue exists | 2024-05-02T07:00:00.000Z | 2026-03-31T15:02:03.000Z |
| msrc_cve-2025-38704 | rcu/nocb: Fix possible invalid rdp's->nocb_cb_kthread pointer access | 2025-09-02T00:00:00.000Z | 2026-03-31T15:01:57.000Z |
| msrc_cve-2025-22057 | net: decrease cached dst counters in dst_release | 2025-04-02T00:00:00.000Z | 2026-03-31T15:01:56.000Z |
| msrc_cve-2022-49531 | loop: implement ->free_disk | 2025-02-02T00:00:00.000Z | 2026-03-31T15:01:52.000Z |
| msrc_cve-2026-23157 | btrfs: do not strictly require dirty metadata threshold for metadata writepages | 2026-02-02T00:00:00.000Z | 2026-03-31T15:01:50.000Z |
| msrc_cve-2024-26947 | ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses | 2024-05-02T07:00:00.000Z | 2026-03-31T15:01:37.000Z |
| msrc_cve-2025-21899 | tracing: Fix bad hist from corrupting named_triggers list | 2025-04-02T00:00:00.000Z | 2026-03-31T15:01:32.000Z |
| msrc_cve-2023-53152 | drm/amdgpu: fix calltrace warning in amddrm_buddy_fini | 2025-09-02T00:00:00.000Z | 2026-03-31T15:01:32.000Z |
| msrc_cve-2024-26680 | net: atlantic: Fix DMA mapping for PTP hwts ring | 2024-04-02T07:00:00.000Z | 2026-03-31T15:01:31.000Z |
| msrc_cve-2024-35887 | ax25: fix use-after-free bugs caused by ax25_ds_del_timer | 2024-05-02T07:00:00.000Z | 2026-03-31T15:01:30.000Z |
| msrc_cve-2026-23154 | net: fix segmentation of forwarding fraglist GRO | 2026-02-02T00:00:00.000Z | 2026-03-31T15:01:27.000Z |
| msrc_cve-2024-26938 | drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() | 2024-05-02T07:00:00.000Z | 2026-03-31T15:01:13.000Z |
| msrc_cve-2024-35868 | smb: client: fix potential UAF in cifs_stats_proc_write() | 2024-05-02T07:00:00.000Z | 2026-03-31T15:01:09.000Z |
| msrc_cve-2022-49177 | hwrng: cavium - fix NULL but dereferenced coccicheck error | 2025-02-02T00:00:00.000Z | 2026-03-31T15:01:09.000Z |
| msrc_cve-2024-38594 | net: stmmac: move the EST lock to struct stmmac_priv | 2024-06-02T07:00:00.000Z | 2026-03-31T15:01:08.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15484-1 | netty-4.1.124-1.1 on GA media | 2025-08-22T00:00:00Z | 2025-08-22T00:00:00Z |
| opensuse-su-2025:15483-1 | jetty-annotations-9.4.58-1.1 on GA media | 2025-08-22T00:00:00Z | 2025-08-22T00:00:00Z |
| opensuse-su-2025:15482-1 | chromedriver-139.0.7258.138-1.1 on GA media | 2025-08-22T00:00:00Z | 2025-08-22T00:00:00Z |
| opensuse-su-2025:15481-1 | chromedriver-139.0.7258.138-1.1 on GA media | 2025-08-22T00:00:00Z | 2025-08-22T00:00:00Z |
| opensuse-su-2025:15480-1 | keylime-ima-policy-0.2.8+12-1.1 on GA media | 2025-08-21T00:00:00Z | 2025-08-21T00:00:00Z |
| opensuse-su-2025:15479-1 | ruby3.4-rubygem-activerecord-8.0-8.0.1-2.1 on GA media | 2025-08-21T00:00:00Z | 2025-08-21T00:00:00Z |
| opensuse-su-2025:15478-1 | pdns-recursor-5.2.5-1.1 on GA media | 2025-08-21T00:00:00Z | 2025-08-21T00:00:00Z |
| opensuse-su-2025:15477-1 | pam-1.7.1-3.1 on GA media | 2025-08-21T00:00:00Z | 2025-08-21T00:00:00Z |
| opensuse-su-2025:15476-1 | gimp-3.0.4-2.1 on GA media | 2025-08-21T00:00:00Z | 2025-08-21T00:00:00Z |
| opensuse-su-2025:15475-1 | flake-pilot-3.1.21-1.1 on GA media | 2025-08-21T00:00:00Z | 2025-08-21T00:00:00Z |
| opensuse-su-2025:15474-1 | aide-0.19.2-1.1 on GA media | 2025-08-21T00:00:00Z | 2025-08-21T00:00:00Z |
| opensuse-su-2025:15473-1 | abseil-cpp-devel-20250814.0-2.1 on GA media | 2025-08-21T00:00:00Z | 2025-08-21T00:00:00Z |
| opensuse-su-2025:15472-1 | MozillaThunderbird-140.2.0-1.1 on GA media | 2025-08-21T00:00:00Z | 2025-08-21T00:00:00Z |
| opensuse-su-2025:15471-1 | ImageMagick-7.1.2.1-1.1 on GA media | 2025-08-21T00:00:00Z | 2025-08-21T00:00:00Z |
| opensuse-su-2025:15470-1 | govulncheck-vulndb-0.0.20250818T190335-1.1 on GA media | 2025-08-20T00:00:00Z | 2025-08-20T00:00:00Z |
| opensuse-su-2025:15469-1 | gdk-pixbuf-devel-2.42.12-5.1 on GA media | 2025-08-20T00:00:00Z | 2025-08-20T00:00:00Z |
| opensuse-su-2025:15468-1 | firefox-esr-140.2.0-1.1 on GA media | 2025-08-20T00:00:00Z | 2025-08-20T00:00:00Z |
| opensuse-su-2025:15467-1 | firefox-esr-140.2.0-1.1 on GA media | 2025-08-20T00:00:00Z | 2025-08-20T00:00:00Z |
| opensuse-su-2025:15466-1 | polaris-10.1.1-1.1 on GA media | 2025-08-19T00:00:00Z | 2025-08-19T00:00:00Z |
| opensuse-su-2025:15465-1 | pluto-5.22.5-1.1 on GA media | 2025-08-19T00:00:00Z | 2025-08-19T00:00:00Z |
| opensuse-su-2025:15464-1 | nova-3.11.8-1.1 on GA media | 2025-08-19T00:00:00Z | 2025-08-19T00:00:00Z |
| opensuse-su-2025:15463-1 | docker-machine-driver-kvm2-1.36.0-2.1 on GA media | 2025-08-19T00:00:00Z | 2025-08-19T00:00:00Z |
| opensuse-su-2025:15462-1 | go-sendxmpp-0.15.0-1.1 on GA media | 2025-08-19T00:00:00Z | 2025-08-19T00:00:00Z |
| opensuse-su-2025:15461-1 | aws-efs-utils-2.3.3-1.1 on GA media | 2025-08-19T00:00:00Z | 2025-08-19T00:00:00Z |
| opensuse-su-2025:15460-1 | glibc-2.42-1.1 on GA media | 2025-08-18T00:00:00Z | 2025-08-18T00:00:00Z |
| opensuse-su-2025:15459-1 | cflow-1.8-2.1 on GA media | 2025-08-18T00:00:00Z | 2025-08-18T00:00:00Z |
| opensuse-su-2025:15458-1 | cairo-devel-1.18.4-3.1 on GA media | 2025-08-18T00:00:00Z | 2025-08-18T00:00:00Z |
| opensuse-su-2025:15457-1 | apache2-mod_security2-2.9.12-1.1 on GA media | 2025-08-18T00:00:00Z | 2025-08-18T00:00:00Z |
| opensuse-su-2025:15456-1 | apache2-mod_security2-2.9.12-1.1 on GA media | 2025-08-18T00:00:00Z | 2025-08-18T00:00:00Z |
| opensuse-su-2025:15455-1 | libecpg6-17.6-1.1 on GA media | 2025-08-16T00:00:00Z | 2025-08-16T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:13643 | Red Hat Security Advisory: osbuild-composer security update | 2026-05-05T09:28:37+00:00 | 2026-05-08T14:59:18+00:00 |
| rhsa-2026:13642 | Red Hat Security Advisory: image-builder security update | 2026-05-05T09:23:22+00:00 | 2026-05-08T14:59:17+00:00 |
| rhsa-2026:13512 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2026-05-04T14:31:09+00:00 | 2026-05-08T14:59:17+00:00 |
| rhsa-2026:13508 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Product Security and Bug Fix Update | 2026-05-04T14:10:09+00:00 | 2026-05-08T14:59:17+00:00 |
| rhsa-2026:11800 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.2.10 | 2026-04-29T15:26:45+00:00 | 2026-05-08T14:59:15+00:00 |
| rhsa-2026:11686 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.15 | 2026-04-29T12:06:04+00:00 | 2026-05-08T14:59:14+00:00 |
| rhsa-2026:10141 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 3.3.1 | 2026-04-23T13:36:23+00:00 | 2026-05-08T14:59:14+00:00 |
| rhsa-2026:8838 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-17T23:15:06+00:00 | 2026-05-08T14:59:13+00:00 |
| rhsa-2026:10140 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 3.3.1 | 2026-04-23T13:34:50+00:00 | 2026-05-08T14:59:13+00:00 |
| rhsa-2026:7305 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-09T12:35:20+00:00 | 2026-05-08T14:59:12+00:00 |
| rhsa-2026:7307 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-09T12:37:08+00:00 | 2026-05-08T14:59:11+00:00 |
| rhsa-2026:6552 | Red Hat Security Advisory: OpenShift Container Platform 4.18.37 packages and security update | 2026-04-09T08:35:05+00:00 | 2026-05-08T14:58:59+00:00 |
| rhsa-2026:5971 | Red Hat Security Advisory: Satellite 6.16.7 Async Update | 2026-03-26T20:30:38+00:00 | 2026-05-08T14:58:59+00:00 |
| rhsa-2026:5970 | Red Hat Security Advisory: Satellite 6.17.7 Async Update | 2026-03-26T20:28:38+00:00 | 2026-05-08T14:58:59+00:00 |
| rhsa-2026:5878 | Red Hat Security Advisory: OpenShift Container Platform 4.19.27 bug fix and security update | 2026-04-01T09:48:10+00:00 | 2026-05-08T14:58:57+00:00 |
| rhsa-2026:3842 | Red Hat Security Advisory: delve security update | 2026-03-05T11:24:36+00:00 | 2026-05-08T14:58:57+00:00 |
| rhsa-2026:13545 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2026-05-04T17:14:54+00:00 | 2026-05-08T14:58:57+00:00 |
| rhsa-2026:14926 | Red Hat Security Advisory: kernel update | 2026-05-07T19:36:26+00:00 | 2026-05-08T14:55:36+00:00 |
| rhsa-2018:0583 | Red Hat Security Advisory: rh-ruby22-ruby security, bug fix, and enhancement update | 2018-03-26T09:39:32+00:00 | 2026-05-08T14:44:58+00:00 |
| rhsa-2012:0070 | Red Hat Security Advisory: ruby security update | 2012-01-30T18:23:00+00:00 | 2026-05-08T14:44:58+00:00 |
| rhsa-2011:1581 | Red Hat Security Advisory: ruby security, bug fix, and enhancement update | 2011-12-05T19:38:00+00:00 | 2026-05-08T14:44:57+00:00 |
| rhsa-2008:0562 | Red Hat Security Advisory: ruby security update | 2008-07-14T13:38:00+00:00 | 2026-05-08T12:52:39+00:00 |
| rhsa-2008:0561 | Red Hat Security Advisory: ruby security update | 2008-07-14T13:26:00+00:00 | 2026-05-08T12:52:39+00:00 |
| rhsa-2026:8291 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-15T10:20:34+00:00 | 2026-05-08T12:52:38+00:00 |
| rhsa-2011:0910 | Red Hat Security Advisory: ruby security update | 2011-06-28T17:30:00+00:00 | 2026-05-08T10:43:33+00:00 |
| rhsa-2011:0909 | Red Hat Security Advisory: ruby security update | 2011-06-28T17:27:00+00:00 | 2026-05-08T10:43:32+00:00 |
| rhsa-2011:0908 | Red Hat Security Advisory: ruby security update | 2011-06-28T17:21:00+00:00 | 2026-05-08T10:43:31+00:00 |
| rhsa-2026:9699 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.20.2 security update | 2026-04-22T12:35:53+00:00 | 2026-05-08T10:09:36+00:00 |
| rhsa-2026:9698 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.19.3 security update | 2026-04-22T12:29:18+00:00 | 2026-05-08T10:09:36+00:00 |
| rhsa-2026:9697 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.18.5 security update | 2026-04-22T12:28:10+00:00 | 2026-05-08T10:09:36+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20505-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20504-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20503-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20502-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20501-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20500-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20499-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20469-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20468-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20467-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20466-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20465-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20464-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20463-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20462-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20461-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20460-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20459-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20458-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20457-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20456-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20511-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T06:32:11Z | 2026-02-19T06:32:11Z |
| suse-su-2026:20455-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T06:32:11Z | 2026-02-19T06:32:11Z |
| suse-su-2026:20607-1 | Security update for openssl-3-livepatches | 2026-02-18T16:23:27Z | 2026-02-18T16:23:27Z |
| suse-su-2026:20542-1 | Security update for openssl-3-livepatches | 2026-02-18T16:23:27Z | 2026-02-18T16:23:27Z |
| suse-su-2026:20606-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-02-18T16:14:15Z | 2026-02-18T16:14:15Z |
| suse-su-2026:20541-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-02-18T16:14:15Z | 2026-02-18T16:14:15Z |
| suse-su-2026:0577-1 | Security update for avahi | 2026-02-18T15:49:23Z | 2026-02-18T15:49:23Z |
| suse-su-2026:20580-1 | Security update for cockpit-repos | 2026-02-18T11:27:28Z | 2026-02-18T11:27:28Z |
| suse-su-2026:20540-1 | Security update for cockpit-repos | 2026-02-18T11:27:28Z | 2026-02-18T11:27:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:11242 | Moderate: mpg123:1.32.9 security update | 2024-12-17T00:00:00Z | 2024-12-23T08:21:50Z |
| alsa-2024:11216 | Moderate: containernetworking-plugins security update | 2024-12-17T00:00:00Z | 2024-12-23T08:20:47Z |
| alsa-2024:11123 | Important: gstreamer1-plugins-base security update | 2024-12-16T00:00:00Z | 2024-12-23T08:19:57Z |
| alsa-2024:11122 | Important: gstreamer1-plugins-good security update | 2024-12-16T00:00:00Z | 2024-12-23T08:18:58Z |
| alsa-2024:11111 | Moderate: python3.11 security update | 2024-12-16T00:00:00Z | 2024-12-23T08:17:01Z |
| alsa-2024:11154 | Moderate: bluez security update | 2024-12-17T00:00:00Z | 2024-12-18T12:54:00Z |
| alsa-2024:11161 | Moderate: tuned security update | 2024-12-17T00:00:00Z | 2024-12-18T12:52:15Z |
| alsa-2024:11185 | Moderate: edk2:20220126gitbb1bba3d77 security update | 2024-12-17T00:00:00Z | 2024-12-18T12:49:28Z |
| alsa-2024:11189 | Moderate: python3.11-urllib3 security update | 2024-12-17T00:00:00Z | 2024-12-18T12:47:55Z |
| alsa-2024:11192 | Moderate: libsndfile security update | 2024-12-17T00:00:00Z | 2024-12-18T12:44:46Z |
| alsa-2024:11193 | Moderate: mpg123 security update | 2024-12-17T00:00:00Z | 2024-12-18T12:42:45Z |
| alsa-2024:11299 | Important: gstreamer1-plugins-good security update | 2024-12-17T00:00:00Z | 2024-12-18T12:41:06Z |
| alsa-2024:11345 | Important: gstreamer1-plugins-base security update | 2024-12-18T00:00:00Z | 2024-12-18T12:39:10Z |
| alsa-2024:10939 | Moderate: kernel security update | 2024-12-11T00:00:00Z | 2024-12-16T15:05:28Z |
| alsa-2024:10943 | Moderate: kernel security update | 2024-12-11T00:00:00Z | 2024-12-16T15:02:24Z |
| alsa-2024:10944 | Moderate: kernel-rt security update | 2024-12-11T00:00:00Z | 2024-12-16T15:00:33Z |
| alsa-2024:10949 | Moderate: php:8.2 security update | 2024-12-11T00:00:00Z | 2024-12-16T14:59:31Z |
| alsa-2024:10950 | Moderate: php:8.1 security update | 2024-12-11T00:00:00Z | 2024-12-16T14:57:36Z |
| alsa-2024:10951 | Moderate: php:8.2 security update | 2024-12-11T00:00:00Z | 2024-12-16T14:55:04Z |
| alsa-2024:10952 | Moderate: php:7.4 security update | 2024-12-11T00:00:00Z | 2024-12-16T14:52:18Z |
| alsa-2024:10953 | Important: python36:3.6 security update | 2024-12-11T00:00:00Z | 2024-12-16T14:49:29Z |
| alsa-2024:10978 | Important: python3.12 security update | 2024-12-12T00:00:00Z | 2024-12-16T14:45:42Z |
| alsa-2024:10979 | Moderate: python3.11 security update | 2024-12-12T00:00:00Z | 2024-12-16T14:43:13Z |
| alsa-2024:10980 | Important: python3.12 security update | 2024-12-12T00:00:00Z | 2024-12-16T14:40:29Z |
| alsa-2024:10983 | Moderate: python3.9:3.9.21 security update | 2024-12-12T00:00:00Z | 2024-12-16T14:38:01Z |
| alsa-2024:10830 | Important: postgresql:15 security update | 2024-12-05T00:00:00Z | 2024-12-10T09:13:20Z |
| alsa-2024:10831 | Important: postgresql:16 security update | 2024-12-05T00:00:00Z | 2024-12-10T01:10:57Z |
| alsa-2024:10869 | Moderate: redis:7 security update | 2024-12-05T00:00:00Z | 2024-12-09T09:53:39Z |
| alsa-2024:10860 | Important: ruby:3.1 security update | 2024-12-05T00:00:00Z | 2024-12-09T09:52:36Z |
| alsa-2024:10834 | Important: ruby:3.1 security update | 2024-12-05T00:00:00Z | 2024-12-09T09:48:33Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2021-803 | Heap-buffer-overflow in sampled_data_finish | 2021-05-27T00:01:05.378775Z | 2023-02-24T01:39:10.148952Z |
| osv-2020-1507 | Index-out-of-bounds in MemoryRemoveTrailingZeros | 2020-07-28T00:00:34.623899Z | 2023-02-24T01:39:07.720489Z |
| osv-2020-1423 | Use-of-uninitialized-value in txt2sd | 2020-07-28T00:00:16.191970Z | 2023-02-24T01:38:47.975346Z |
| osv-2020-867 | Heap-buffer-overflow in icu_64::CollationIterator::appendCEsFromCE32 | 2020-07-14T22:13:50.339661Z | 2023-02-24T01:38:19.452338Z |
| osv-2020-376 | Heap-buffer-overflow in perfetto::trace_processor::fuchsia_trace_utils::ReadTimestamp | 2020-07-01T00:00:05.968178Z | 2023-02-24T01:37:02.630745Z |
| osv-2022-878 | Heap-double-free in flb_sds_destroy | 2022-09-10T00:02:19.362070Z | 2023-02-24T01:36:55.526867Z |
| osv-2018-301 | Use-of-uninitialized-value in fz_paint_triangle | 2021-01-15T00:00:28.806152Z | 2023-02-24T01:36:16.914202Z |
| osv-2021-1143 | UNKNOWN WRITE in QtPrivate::QPodArrayOps<QPainterPath::Element>::copyAppend | 2021-08-19T00:00:37.149406Z | 2023-02-24T01:34:15.652409Z |
| osv-2020-196 | Heap-use-after-free in Pe64_r_bin_pe_free | 2020-06-24T01:51:18.455623Z | 2023-02-24T01:33:55.035893Z |
| osv-2021-939 | Segv on unknown address in helper_uc_tracecode | 2021-07-09T00:01:18.848024Z | 2023-02-24T01:32:43.286841Z |
| osv-2017-76 | Use-of-uninitialized-value in Archive::ConvertFileHeader | 2021-01-13T21:57:34.703673Z | 2023-02-24T01:32:04.735184Z |
| osv-2020-1285 | Use-of-uninitialized-value in ihevc_deblk_luma_vert_ssse3 | 2020-07-22T21:50:02.950786Z | 2023-02-24T01:30:44.196020Z |
| osv-2020-674 | Heap-buffer-overflow in ihevcd_mv_merge | 2020-07-01T00:00:23.966789Z | 2023-02-24T01:29:47.316559Z |
| osv-2022-347 | Heap-buffer-overflow in cli_bcomp_freemeta | 2022-04-15T00:01:49.289095Z | 2023-02-24T01:29:44.509664Z |
| osv-2017-95 | Use-of-uninitialized-value in Archive::GetComment | 2021-01-13T21:57:40.487266Z | 2023-02-24T01:29:41.456907Z |
| osv-2022-667 | Uncaught exception in com.code_intelligence.jazzer.sanitizers.RegexInjection.hookInternal | 2022-08-02T00:01:42.264623Z | 2023-02-24T01:27:48.502253Z |
| osv-2021-1083 | Heap-buffer-overflow in flb_hash_get_by_id | 2021-08-01T00:00:59.162586Z | 2023-02-24T01:27:27.971126Z |
| osv-2020-2309 | UNKNOWN WRITE in flb_utils_proxy_url_split | 2021-02-25T00:02:39.501845Z | 2023-02-24T01:27:02.287251Z |
| osv-2022-288 | Segv on unknown address in flb_ra_translate | 2022-03-30T00:01:21.966556Z | 2023-02-24T01:26:04.553459Z |
| osv-2022-891 | Stack-buffer-overflow in flb_env_var_translate | 2022-09-14T00:00:07.226430Z | 2023-02-24T01:24:28.948286Z |
| osv-2021-1712 | Heap-buffer-overflow in ndlz8_decompress | 2021-12-18T00:00:41.642240Z | 2023-02-24T01:23:10.109516Z |
| osv-2020-1410 | Use-of-uninitialized-value in float64_squash_input_denormal_aarch64eb | 2020-07-28T00:00:12.342145Z | 2023-02-24T01:22:46.281541Z |
| osv-2020-792 | Use-of-uninitialized-value in ihevc_inter_pred_chroma_copy_ssse3 | 2020-07-14T05:37:35.331259Z | 2023-02-24T01:19:04.031600Z |
| osv-2023-98 | Heap-buffer-overflow in sc_hsm_write_ef | 2023-02-23T13:02:02.552905Z | 2023-02-23T13:02:02.553148Z |
| osv-2023-97 | Heap-buffer-overflow in isvcd_reflayer_construction_dyadic | 2023-02-23T13:00:38.916882Z | 2023-02-23T13:00:38.917134Z |
| osv-2023-95 | Use-of-uninitialized-value in isvcd_interpolate_residual_sse42 | 2023-02-22T13:02:05.514993Z | 2023-02-22T13:02:05.515242Z |
| osv-2022-837 | Heap-buffer-overflow in DetectGetLastSMFromMpmLists | 2022-09-04T00:01:56.921937Z | 2023-02-22T00:37:37.672605Z |
| osv-2021-732 | Heap-buffer-overflow in readstat_convert | 2021-05-06T00:00:30.987446Z | 2023-02-21T00:31:59.857368Z |
| osv-2023-86 | UNKNOWN READ in isvce_cabac_flush | 2023-02-20T13:00:28.631850Z | 2023-02-20T13:00:28.632115Z |
| osv-2023-75 | Heap-buffer-overflow in isvcd_interlyr_motion_mode_pred_dyadic | 2023-02-18T13:00:42.024313Z | 2023-02-18T13:00:42.024552Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-django-2025-64460 | Potential denial-of-service vulnerability in XML serializer text extraction | 2025-12-11T11:37:12.400Z | 2025-12-11T12:06:55.559Z |
| bit-golang-2025-61725 | Excessive CPU consumption in ParseAddress in net/mail | 2025-11-06T12:58:41.872Z | 2025-12-10T12:06:24.101Z |
| bit-pgbouncer-2025-2291 | PgBouncer default auth_query does not take Postgres password expiry into account | 2025-04-18T19:19:16.416Z | 2025-12-09T12:08:00.393Z |
| bit-envoy-2025-66220 | Envoy’s TLS certificate matcher for `match_typed_subject_alt_names` may incorrectly treat certificates containing an embedded null byte | 2025-12-06T11:38:21.122Z | 2025-12-09T12:08:00.393Z |
| bit-envoy-2025-64763 | Envoy forwards early CONNECT data in TCP proxy mode | 2025-12-06T11:38:19.488Z | 2025-12-09T12:08:00.393Z |
| bit-envoy-2025-64527 | Envoy crashes when JWT authentication is configured with the remote JWKS fetching | 2025-12-06T11:38:17.923Z | 2025-12-09T12:08:00.393Z |
| bit-apache-2025-66200 | Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo | 2025-12-09T11:38:20.150Z | 2025-12-09T12:08:00.393Z |
| bit-apache-2025-65082 | Apache HTTP Server: CGI environment variable override | 2025-12-09T11:38:18.501Z | 2025-12-09T12:08:00.393Z |
| bit-apache-2025-59775 | Apache HTTP Server: NTLM Leakage on Windows through UNC SSRF | 2025-12-09T11:38:16.754Z | 2025-12-09T12:08:00.393Z |
| bit-apache-2025-58098 | Apache HTTP Server: Server Side Includes adds query string to #exec cmd=... | 2025-12-09T11:38:15.033Z | 2025-12-09T12:08:00.393Z |
| bit-apache-2025-55753 | Apache HTTP Server: mod_md (ACME), unintended retry intervals | 2025-12-09T11:38:13.178Z | 2025-12-09T12:08:00.393Z |
| bit-mongodb-2025-13507 | Time-series operations may cause internal BSON size limit to be exceed | 2025-12-06T11:42:49.537Z | 2025-12-06T12:06:23.267Z |
| bit-mongodb-2025-12893 | Improper Certificate Validation May Allow Successful TLS Handshaking Despite Invalid Extended Key Usage Fields in MongoDB Server | 2025-12-06T11:42:47.994Z | 2025-12-06T12:06:23.267Z |
| bit-mongodb-2025-11979 | Use-after-free in the MongoDB server query planner may lead to crash or undefined behavior | 2025-12-06T11:42:46.232Z | 2025-12-06T12:06:23.267Z |
| bit-golang-2025-61727 | Improper application of excluded DNS name constraints when verifying wildcard names in crypto/x509 | 2025-12-06T11:41:09.464Z | 2025-12-06T12:06:23.267Z |
| bit-cilium-2025-64715 | Cilium with misconfigured toGroups in policies can lead to unrestricted egress traffic | 2025-12-02T11:35:57.032Z | 2025-12-06T12:06:23.267Z |
| bit-python-2025-8291 | ZIP64 End of Central Directory (EOCD) Locator record offset not checked | 2025-10-14T09:30:19.669Z | 2025-12-04T12:07:39.656Z |
| bit-python-2025-1795 | Mishandling of comma during folding and unicode-encoding of email headers | 2025-04-14T11:35:31.045Z | 2025-12-04T12:07:39.656Z |
| bit-libpython-2025-8291 | ZIP64 End of Central Directory (EOCD) Locator record offset not checked | 2025-10-14T09:25:48.465Z | 2025-12-04T12:07:39.656Z |
| bit-libpython-2025-1795 | Mishandling of comma during folding and unicode-encoding of email headers | 2025-08-11T13:53:05.339Z | 2025-12-04T12:07:39.656Z |
| bit-golang-2025-61729 | Excessive resource consumption when printing error string for host certificate validation in crypto/x509 | 2025-12-04T11:41:52.637Z | 2025-12-04T12:07:39.656Z |
| bit-activemq-2025-27533 | Apache ActiveMQ: Unchecked buffer length can cause excessive memory allocation | 2025-12-03T14:35:40.173Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2023-46604 | Apache ActiveMQ, Apache ActiveMQ Legacy OpenWire Module: Unbounded deserialization causes ActiveMQ to be vulnerable to a remote code execution (RCE) attack | 2025-12-03T14:35:38.733Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2022-41678 | Apache ActiveMQ: Insufficient API restrictions on Jolokia allow authenticated users to perform RCE | 2025-12-03T14:35:37.010Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-26117 | ActiveMQ: LDAP-Authentication does not verify passwords on servers with anonymous bind | 2025-12-03T14:35:35.296Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21351 | XStream is vulnerable to an Arbitrary Code Execution attack | 2025-12-03T14:35:33.786Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21350 | XStream is vulnerable to an Arbitrary Code Execution attack | 2025-12-03T14:35:32.295Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21349 | A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host | 2025-12-03T14:35:30.789Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21348 | XStream is vulnerable to an attack using Regular Expression for a Denial of Service (ReDos) | 2025-12-03T14:35:29.299Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21347 | XStream is vulnerable to an Arbitrary Code Execution attack | 2025-12-03T14:35:27.664Z | 2025-12-03T15:08:24.036Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-0707 | Multiples vulnérabilités dans Mattermost Server | 2025-08-18T00:00:00.000000 | 2025-09-16T00:00:00.000000 |
| certfr-2025-avi-0790 | Multiples vulnérabilités dans Liferay | 2025-09-15T00:00:00.000000 | 2025-09-15T00:00:00.000000 |
| CERTFR-2025-AVI-0790 | Multiples vulnérabilités dans Liferay | 2025-09-15T00:00:00.000000 | 2025-09-15T00:00:00.000000 |
| certfr-2025-avi-0789 | Multiples vulnérabilités dans les produits IBM | 2025-09-12T00:00:00.000000 | 2025-09-12T00:00:00.000000 |
| certfr-2025-avi-0788 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-09-12T00:00:00.000000 | 2025-09-12T00:00:00.000000 |
| certfr-2025-avi-0787 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-09-12T00:00:00.000000 | 2025-09-12T00:00:00.000000 |
| certfr-2025-avi-0786 | Multiples vulnérabilités dans Zabbix | 2025-09-12T00:00:00.000000 | 2025-09-12T00:00:00.000000 |
| certfr-2025-avi-0785 | Multiples vulnérabilités dans Liferay | 2025-09-12T00:00:00.000000 | 2025-09-12T00:00:00.000000 |
| certfr-2025-avi-0784 | Vulnérabilité dans Microsoft Visual Studio Code | 2025-09-12T00:00:00.000000 | 2025-09-12T00:00:00.000000 |
| certfr-2025-avi-0783 | Multiples vulnérabilités dans Microsoft Edge | 2025-09-12T00:00:00.000000 | 2025-09-12T00:00:00.000000 |
| CERTFR-2025-AVI-0789 | Multiples vulnérabilités dans les produits IBM | 2025-09-12T00:00:00.000000 | 2025-09-12T00:00:00.000000 |
| CERTFR-2025-AVI-0788 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-09-12T00:00:00.000000 | 2025-09-12T00:00:00.000000 |
| CERTFR-2025-AVI-0787 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-09-12T00:00:00.000000 | 2025-09-12T00:00:00.000000 |
| CERTFR-2025-AVI-0786 | Multiples vulnérabilités dans Zabbix | 2025-09-12T00:00:00.000000 | 2025-09-12T00:00:00.000000 |
| CERTFR-2025-AVI-0785 | Multiples vulnérabilités dans Liferay | 2025-09-12T00:00:00.000000 | 2025-09-12T00:00:00.000000 |
| CERTFR-2025-AVI-0784 | Vulnérabilité dans Microsoft Visual Studio Code | 2025-09-12T00:00:00.000000 | 2025-09-12T00:00:00.000000 |
| CERTFR-2025-AVI-0783 | Multiples vulnérabilités dans Microsoft Edge | 2025-09-12T00:00:00.000000 | 2025-09-12T00:00:00.000000 |
| certfr-2025-avi-0782 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-09-11T00:00:00.000000 | 2025-09-11T00:00:00.000000 |
| certfr-2025-avi-0781 | Multiples vulnérabilités dans Cisco IOS XR | 2025-09-11T00:00:00.000000 | 2025-09-11T00:00:00.000000 |
| CERTFR-2025-AVI-0782 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-09-11T00:00:00.000000 | 2025-09-11T00:00:00.000000 |
| CERTFR-2025-AVI-0781 | Multiples vulnérabilités dans Cisco IOS XR | 2025-09-11T00:00:00.000000 | 2025-09-11T00:00:00.000000 |
| certfr-2025-avi-0780 | Multiples vulnérabilités dans les produits Microsoft | 2025-09-10T00:00:00.000000 | 2025-09-10T00:00:00.000000 |
| certfr-2025-avi-0779 | Multiples vulnérabilités dans Microsoft Azure | 2025-09-10T00:00:00.000000 | 2025-09-10T00:00:00.000000 |
| certfr-2025-avi-0778 | Multiples vulnérabilités dans Microsoft Windows | 2025-09-10T00:00:00.000000 | 2025-09-10T00:00:00.000000 |
| certfr-2025-avi-0777 | Multiples vulnérabilités dans Microsoft Office | 2025-09-10T00:00:00.000000 | 2025-09-10T00:00:00.000000 |
| certfr-2025-avi-0776 | Multiples vulnérabilités dans GitLab | 2025-09-10T00:00:00.000000 | 2025-09-10T00:00:00.000000 |
| certfr-2025-avi-0775 | Multiples vulnérabilités dans Curl | 2025-09-10T00:00:00.000000 | 2025-09-10T00:00:00.000000 |
| certfr-2025-avi-0774 | Vulnérabilité dans Liferay | 2025-09-10T00:00:00.000000 | 2025-09-10T00:00:00.000000 |
| certfr-2025-avi-0773 | Multiples vulnérabilités dans les produits Fortinet | 2025-09-10T00:00:00.000000 | 2025-09-10T00:00:00.000000 |
| certfr-2025-avi-0772 | Vulnérabilité dans les points d'accès Sophos AP6 | 2025-09-10T00:00:00.000000 | 2025-09-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2017-000227 | HIBUN Confidential File Decryption program may insecurely load Dynamic Link Libraries | 2017-10-11T16:43+09:00 | 2018-03-07T12:06+09:00 |
| jvndb-2018-001389 | XXE Vulnerability in Hitachi Device Manager | 2018-02-14T14:59+09:00 | 2018-03-01T15:20+09:00 |
| jvndb-2018-001388 | Multiple Vulnerabilities in Hitachi Command Suite | 2018-02-14T14:58+09:00 | 2018-03-01T15:20+09:00 |
| jvndb-2015-000065 | "Honda Moto LINC" App for Android fails to verify SSL server certificates | 2015-05-15T12:23+09:00 | 2018-02-28T14:36+09:00 |
| jvndb-2017-000215 | Installer and self-extracting archive containing the installer of "Security Setup Tool" may insecurely load Dynamic Link Libraries | 2017-08-25T14:50+09:00 | 2018-02-28T14:28+09:00 |
| jvndb-2017-000204 | Multiple vulnerabilities in "Dokodemo eye Smart HD" SCR02HD | 2017-08-23T15:36+09:00 | 2018-02-28T14:28+09:00 |
| jvndb-2017-000222 | SEIL Series routers vulnerable to denial-of-service (DoS) | 2017-09-11T15:19+09:00 | 2018-02-28T14:12+09:00 |
| jvndb-2017-000217 | Backdoor access issue in Wi-Fi STATION L-02F | 2017-09-12T14:34+09:00 | 2018-02-28T14:11+09:00 |
| jvndb-2017-000218 | Wi-Fi STATION L-02F fails to restrict access permissions | 2017-09-12T14:35+09:00 | 2018-02-28T14:09+09:00 |
| jvndb-2017-000214 | Installer of "Flets Install Tool" may insecurely load Dynamic Link Libraries | 2017-08-25T15:02+09:00 | 2018-02-28T14:07+09:00 |
| jvndb-2017-000212 | Installer of "Flets Azukeru for Windows Auto Backup Tool" may insecurely load Dynamic Link Libraries | 2017-08-25T15:02+09:00 | 2018-02-28T14:07+09:00 |
| jvndb-2017-000210 | Installer of "Security Kinou Mihariban" may insecurely load Dynamic Link Libraries | 2017-08-25T14:50+09:00 | 2018-02-28T14:04+09:00 |
| jvndb-2017-000205 | The installer of the Ministry of Justice [The electronic authentication system based on the commercial registration system "The CRCA user's Software"] may insecurely load Dynamic Link Libraries | 2017-08-23T15:24+09:00 | 2018-02-28T14:04+09:00 |
| jvndb-2017-000221 | Installer of FENCE-Explorer may insecurely load Dynamic Link Libraries and invoke executable files | 2017-09-11T14:55+09:00 | 2018-02-28T13:58+09:00 |
| jvndb-2017-000208 | WordPress plugin "BackupGuard" vulnerable to cross-site scripting | 2017-08-24T14:03+09:00 | 2018-02-28T12:26+09:00 |
| jvndb-2017-000209 | Installer of Optimal Guard may insecurely load Dynamic Link Libraries | 2017-08-25T14:50+09:00 | 2018-02-28T12:23+09:00 |
| jvndb-2017-000220 | Multiple vulnerabilities in CG-WLR300NM | 2017-09-08T14:14+09:00 | 2018-02-28T12:21+09:00 |
| jvndb-2017-000207 | Multiple vulnerabilities in SEO Panel | 2017-08-24T14:03+09:00 | 2018-02-28T12:19+09:00 |
| jvndb-2017-000197 | Installer of Photo Collection PC Software provided by NTT DOCOMO, INC. may insecurely load Dynamic Link Libraries and invoke executable files | 2017-08-22T12:34+09:00 | 2018-02-28T12:13+09:00 |
| jvndb-2017-000206 | Multiple vulnerabilities in WebCalendar | 2017-08-24T14:03+09:00 | 2018-02-28T12:07+09:00 |
| jvndb-2016-006114 | The Bank of Tokyo-Mitsubishi UFJ for Android vulnerable to SSL/TLS downgrade attack | 2016-12-08T11:33+09:00 | 2018-02-28T11:47+09:00 |
| jvndb-2017-000203 | Multiple vulnerabilities in baserCMS | 2017-08-25T14:50+09:00 | 2018-02-28T11:45+09:00 |
| jvndb-2017-000216 | Installer of "Flets Setsuzoku Tool" may insecurely load Dynamic Link Libraries | 2017-08-25T14:52+09:00 | 2018-02-28T11:39+09:00 |
| jvndb-2017-001053 | Mis-configuration of Apache Velocity template engine used to send emails in GigaCC OFFICE | 2017-01-23T17:57+09:00 | 2018-02-28T11:35+09:00 |
| jvndb-2017-001054 | Arbitrary file upload vulnerability in GigaCC OFFICE | 2017-01-23T17:57+09:00 | 2018-02-28T11:25+09:00 |
| jvndb-2016-000251 | WinSparkle issue where registry value is not validated | 2016-12-26T14:45+09:00 | 2018-02-16T16:00+09:00 |
| jvndb-2016-000250 | Wireshark for Windows issue where an arbitrary file may be deleted | 2016-12-26T14:45+09:00 | 2018-02-16T16:00+09:00 |
| jvndb-2017-000170 | Self-Extracting Archives created by File Compact may insecurely load Dynamic Link Libraries | 2017-07-10T13:57+09:00 | 2018-02-16T13:26+09:00 |
| jvndb-2017-000101 | Installers of the screensavers provided by JAPAN AIR SELF DEFENSE FORCE, MINISTRY OF DEFENSE may insecurely load Dynamic Link Libraries | 2017-05-25T14:14+09:00 | 2018-02-15T15:30+09:00 |
| jvndb-2017-000126 | Installer of Denshinouhin Check System (for Ministry of Agriculture, Forestry and Fisheries Nouson Seibi Jigyou) may insecurely load Dynamic Link Libraries | 2017-06-09T15:48+09:00 | 2018-02-14T14:00+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-08352 | Google Android权限提升漏洞(CNVD-2026-08352) | 2025-09-04 | 2026-01-29 |
| cnvd-2026-08351 | Google Android信息泄露漏洞(CNVD-2026-08351) | 2025-09-08 | 2026-01-29 |
| cnvd-2026-08350 | Google Android权限提升漏洞(CNVD-2026-08350) | 2025-09-08 | 2026-01-29 |
| cnvd-2026-08349 | Google Android权限提升漏洞(CNVD-2026-08349) | 2025-09-08 | 2026-01-29 |
| cnvd-2026-08348 | Google Android权限提升漏洞(CNVD-2026-08348) | 2025-09-08 | 2026-01-29 |
| cnvd-2026-08347 | Google Android权限提升漏洞(CNVD-2026-08347) | 2025-09-08 | 2026-01-29 |
| cnvd-2026-08346 | Google Android权限提升漏洞(CNVD-2026-08346) | 2025-09-08 | 2026-01-29 |
| cnvd-2026-08345 | Google Android权限提升漏洞(CNVD-2026-08345) | 2025-09-08 | 2026-01-29 |
| cnvd-2026-08343 | Juniper Networks Junos Space跨站脚本漏洞(CNVD-2026-08343) | 2025-10-15 | 2026-01-29 |
| cnvd-2026-08328 | Tenda AX1806堆栈溢出漏洞(CNVD-2026-08328) | 2026-01-26 | 2026-01-29 |
| cnvd-2026-08327 | Tenda AX1803堆栈溢出漏洞 | 2026-01-26 | 2026-01-29 |
| cnvd-2026-08326 | Tenda AX1806堆栈溢出漏洞 | 2026-01-26 | 2026-01-29 |
| cnvd-2026-07575 | Google Android权限提升漏洞(CNVD-2026-07575) | 2025-09-08 | 2026-01-29 |
| cnvd-2026-08531 | Job Portal /login.php跨站脚本漏洞 | 2024-09-10 | 2026-01-28 |
| cnvd-2026-08530 | Job Portal index.php跨站脚本漏洞 | 2024-09-10 | 2026-01-28 |
| cnvd-2026-08529 | Job Portal SQL注入漏洞 | 2024-09-10 | 2026-01-28 |
| cnvd-2026-08528 | Job Portal index.php文件SQL注入漏洞 | 2024-09-10 | 2026-01-28 |
| cnvd-2026-08527 | Job Portal /process.php跨站脚本漏洞 | 2024-09-10 | 2026-01-28 |
| cnvd-2026-08342 | Juniper Networks Junos Space跨站脚本漏洞(CNVD-2026-08342) | 2025-10-15 | 2026-01-28 |
| cnvd-2026-08341 | Juniper Networks Junos Space跨站脚本漏洞(CNVD-2026-08341) | 2025-10-15 | 2026-01-28 |
| cnvd-2026-08269 | 新华三技术有限公司H3C Magic AX3001存在信息泄露漏洞 | 2025-09-02 | 2026-01-28 |
| cnvd-2026-08240 | 上海居亦科技发展有限公司vigor 3900和vigor 2960存在命令执行漏洞 | 2025-10-22 | 2026-01-28 |
| cnvd-2026-08212 | 湖南强智科技发展有限公司强智科技教务系统存在SQL注入漏洞 | 2025-10-23 | 2026-01-28 |
| cnvd-2026-08206 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-2026-08206) | 2025-10-23 | 2026-01-28 |
| cnvd-2026-08197 | 北京凯特伟业科技有限公司JEPasS云平台存在SQL注入漏洞 | 2025-10-23 | 2026-01-28 |
| cnvd-2026-07580 | Google Android权限提升漏洞(CNVD-2026-07580) | 2025-09-08 | 2026-01-28 |
| cnvd-2026-07579 | Google Android权限提升漏洞(CNVD-2026-07579) | 2025-09-08 | 2026-01-28 |
| cnvd-2026-07578 | Google Android越界读取漏洞(CNVD-2026-07578) | 2025-09-08 | 2026-01-28 |
| cnvd-2026-07577 | Google Android权限提升漏洞(CNVD-2026-07577) | 2025-09-08 | 2026-01-28 |
| cnvd-2026-07576 | Google Android权限提升漏洞(CNVD-2026-07576) | 2025-09-08 | 2026-01-28 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01403 | Уязвимость функции get_pat_info() модуля arch/x86/mm/pat/memtype.c платформы x86 ядра опе… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01402 | Уязвимость функции old_deviceless() модуля net/bridge/br_ioctl.c реализации сетевых функц… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01401 | Уязвимость функции ath12k_dp_mon_rx_parse_status_tlv() модуля drivers/net/wireless/ath/at… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01400 | Уязвимость функции hibernate_compressor_param_set() модуля kernel/power/hibernate.c ядра … | 08.02.2026 | 08.02.2026 |
| bdu:2026-01399 | Уязвимость функции dwc_pcie_register_dev() модуля drivers/perf/dwc_pcie_pmu.c драйвера по… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01398 | Уязвимость функции xgene_hwmon_probe() модуля drivers/hwmon/xgene-hwmon.c драйвера монито… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01397 | Уязвимость функции gfs2_dinode_in() модуля fs/gfs2/dir.c файловой системы GFS2 ядра опера… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01396 | Уязвимость функций hfs_find_init() (fs/hfs/bfind.c) и hfs_btree_open() (fs/hfs/btree.c) ф… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01395 | Уязвимость функции tpm2_init_space() модуля drivers/char/tpm/tpm2-space.c драйвера поддер… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01394 | Уязвимость функции nbd_alloc_config() модуля drivers/block/nbd.c драйвера поддержки блочн… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01393 | Уязвимость функции posix_timer_by_id() модуля kernel/time/posix-timers.c подсистемы тайме… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01392 | Уязвимость функции shrink_folio_list() модуля mm/vmscan.c подсистемы управления памятью я… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01391 | Уязвимость функции btrfs_finish_extent_commit() модуля fs/btrfs/extent-tree.c файловой с… | 07.02.2026 | 07.02.2026 |
| bdu:2026-01390 | Уязвимость функции iommu_deinit_device() модуля drivers/iommu/iommu.c драйвера IOMMU ядра… | 07.02.2026 | 07.02.2026 |
| bdu:2026-01389 | Уязвимость функции inherit_event() модуля kernel/events/core.c управления событиями ядра… | 07.02.2026 | 07.02.2026 |
| bdu:2026-01388 | Уязвимость функции handle_syscall() модуля arch/um/kernel/skas/syscall.c ядра операционно… | 07.02.2026 | 07.02.2026 |
| bdu:2026-01387 | Уязвимость функции find_or_create_cached_dir() модуля fs/smb/client/cached_dir.c поддержк… | 07.02.2026 | 07.02.2026 |
| bdu:2026-01386 | Уязвимость функции amdgpu_cs_pass1() модуля drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c драйве… | 07.02.2026 | 07.02.2026 |
| bdu:2026-01385 | Уязвимость функции smb2_get_name() модуля fs/smb/server/smb2pdu.c поддержки сервера SMB я… | 07.02.2026 | 07.02.2026 |
| bdu:2026-01384 | Уязвимость функции virtio_irq_get_affinity() модуля drivers/virtio/virtio.c поддержки шин… | 07.02.2026 | 07.02.2026 |
| bdu:2026-01383 | Уязвимость функции sma1307_setting_loaded() модуля sound/soc/codecs/sma1307.c поддержки … | 07.02.2026 | 07.02.2026 |
| bdu:2026-01382 | Уязвимость функции st_sensors_power_enable() модуля drivers/iio/accel/st_accel_core.c ядр… | 07.02.2026 | 07.02.2026 |
| bdu:2026-01381 | Уязвимость функций drm_gem_shmem_vmap_locked() и drm_gem_shmem_vunmap_locked() модуля dri… | 07.02.2026 | 07.02.2026 |
| bdu:2026-01380 | Уязвимость функций amdgpu_set_pp_power_profile_mode() и parse_input_od_command_lines() мо… | 07.02.2026 | 07.02.2026 |
| bdu:2026-01379 | Уязвимость функции loop_set_block_size() модуля drivers/block/loop.c драйвера блочных уст… | 07.02.2026 | 07.02.2026 |
| bdu:2026-01378 | Уязвимость функции rcutorture_one_extend_check() модуля kernel/rcu/rcutorture.c ядра опер… | 07.02.2026 | 07.02.2026 |
| bdu:2026-01377 | Уязвимость функции lpi_device_get_constraints_amd() модуля drivers/acpi/x86/s2idle.c драй… | 07.02.2026 | 07.02.2026 |
| bdu:2026-01376 | Уязвимость функции ath10k_core_start_recovery() модуля drivers/net/wireless/ath/ath10k/co… | 07.02.2026 | 07.02.2026 |
| bdu:2026-01375 | Уязвимость функции regs_refine_cond_op() модуля kernel/bpf/verifier.c поддержки интерпрет… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01374 | Уязвимость функции gfs2_fill_super() модуля fs/gfs2/ops_fstype.c файловой системы GFS2 яд… | 06.02.2026 | 06.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201702-0868 | An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari … | 2024-07-23T19:17:47.519000Z |
| var-201712-0264 | An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari be… | 2024-07-23T19:17:46.273000Z |
| var-201912-0545 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T19:17:45.685000Z |
| var-201804-1161 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T19:16:42.868000Z |
| var-202407-0160 | A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 … | 2024-07-22T23:22:50.520000Z |
| var-202406-2036 | Buffer Overflow vulnerability in ASUS router RT-AX88U with firmware versions v3.0.0.4.388… | 2024-07-22T23:19:17.146000Z |
| var-201109-0081 | Buffer overflow in the gopherToHTML function in gopher.cc in the Gopher reply parser in S… | 2024-07-22T23:14:00.068000Z |
| var-202001-0784 | Multiple vulnerabilities in the REST and SOAP API endpoints of Cisco Data Center Network … | 2024-07-22T23:13:34.284000Z |
| var-202406-1413 | H3C Magic R230 V100R002 was discovered to contain a hardcoded password vulnerability in /… | 2024-07-22T23:08:36.163000Z |
| var-201508-0620 | The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not … | 2024-07-22T22:56:58.009000Z |
| var-201210-0145 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-22T22:56:05.154000Z |
| var-201412-0614 | util/ntp-keygen.c in ntp-keygen in NTP before 4.2.7p230 uses a weak RNG seed, which makes… | 2024-07-22T22:55:20.564000Z |
| var-201302-0184 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-22T22:53:53.931000Z |
| var-201210-0274 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-22T22:52:35.757000Z |
| var-201102-0280 | The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Jav… | 2024-07-22T22:50:51.905000Z |
| var-200609-1055 | The Installer application in Apple Mac OS X 10.4.8 and earlier, when used by a user with … | 2024-07-22T22:48:24.188000Z |
| var-201202-0071 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-22T22:44:32.744000Z |
| var-200609-1258 | The Online Certificate Status Protocol (OCSP) service in the Security Framework in Apple … | 2024-07-22T22:43:28.665000Z |
| var-200609-0939 | Heap-based buffer overflow in the Finder in Apple Mac OS X 10.4.8 and earlier allows user… | 2024-07-22T22:42:44.561000Z |
| var-201605-0077 | The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consi… | 2024-07-22T22:40:18.127000Z |
| var-201204-0112 | The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before … | 2024-07-22T22:34:14.384000Z |
| var-201512-0483 | crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remo… | 2024-07-22T22:33:37.136000Z |
| var-201304-0372 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-22T22:31:58.092000Z |
| var-201206-0060 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-22T22:31:05.374000Z |
| var-200609-0700 | The Security Framework in Apple Mac OS X 10.4 through 10.4.8 allows remote attackers to c… | 2024-07-22T22:27:56.834000Z |
| var-201110-0444 | Heap-based buffer overflow in the ecommunity_ecom2str function in bgp_ecommunity.c in bgp… | 2024-07-22T22:27:20.815000Z |
| var-201202-0069 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-22T22:24:47.131000Z |
| var-201401-0010 | The get_free_port function in Xen allows local authenticated DomU users to cause a denial… | 2024-07-22T22:15:03.360000Z |
| var-201408-0092 | The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, … | 2024-07-22T22:08:01.982000Z |
| var-201308-0259 | The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not prop… | 2024-07-22T22:04:38.466000Z |