Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-5495 |
7.8 (3.0)
|
Labcenter Electronics Proteus PDSPRJ File Parsing Out-… |
Labcenter Electronics |
Proteus |
2026-04-11T00:13:26.901Z | 2026-04-11T00:13:26.901Z |
| CVE-2026-5494 |
7.8 (3.0)
|
Labcenter Electronics Proteus PDSPRJ File Parsing Out-… |
Labcenter Electronics |
Proteus |
2026-04-11T00:13:22.854Z | 2026-04-11T00:13:22.854Z |
| CVE-2026-5493 |
7.8 (3.0)
|
Labcenter Electronics Proteus PDSPRJ File Parsing Out-… |
Labcenter Electronics |
Proteus |
2026-04-11T00:13:18.336Z | 2026-04-11T00:13:18.336Z |
| CVE-2026-5496 |
7.8 (3.0)
|
Labcenter Electronics Proteus PDSPRJ File Parsing Type… |
Labcenter Electronics |
Proteus |
2026-04-11T00:13:14.901Z | 2026-04-11T00:13:14.901Z |
| CVE-2026-4149 |
10 (3.0)
|
Sonos Era 300 SMB Response Out-Of-Bounds Access Remote… |
Sonos |
Era 300 |
2026-04-11T00:12:33.497Z | 2026-04-11T00:12:33.497Z |
| CVE-2026-40199 |
N/A
|
Net::CIDR::Lite versions before 0.23 for Perl mishandl… |
STIGTSP |
Net::CIDR::Lite |
2026-04-10T21:49:48.353Z | 2026-04-10T21:49:48.353Z |
| CVE-2026-40198 |
N/A
|
Net::CIDR::Lite versions before 0.23 for Perl does not… |
STIGTSP |
Net::CIDR::Lite |
2026-04-10T21:42:06.835Z | 2026-04-10T21:42:06.835Z |
| CVE-2026-5724 |
6.3 (4.0)
|
Missing Authentication on Streaming gRPC Replication E… |
Temporal Technologies, Inc. |
temporal |
2026-04-10T21:06:31.788Z | 2026-04-10T21:22:30.134Z |
| CVE-2026-32211 |
9.1 (3.1)
|
Azure MCP Server Information Disclosure Vulnerability |
Microsoft |
Azure Web Apps |
2026-04-02T23:27:01.785Z | 2026-04-10T21:20:55.009Z |
| CVE-2026-32173 |
8.6 (3.1)
|
Azure SRE Agent Information Disclosure Vulnerability |
Microsoft |
Azure SRE Agent Gateway - SignalR Hub |
2026-04-02T23:27:00.374Z | 2026-04-10T21:20:54.396Z |
| CVE-2026-33105 |
10 (3.1)
|
Microsoft Azure Kubernetes Service Elevation of Privil… |
Microsoft |
Azure Kubernetes Service |
2026-04-02T23:26:59.400Z | 2026-04-10T21:20:53.437Z |
| CVE-2026-26135 |
9.6 (3.1)
|
Azure Custom Locations Resource Provider (RP) Elevatio… |
Microsoft |
Azure Custom Locations Resource Provider |
2026-04-02T23:26:58.697Z | 2026-04-10T21:20:49.769Z |
| CVE-2026-33107 |
10 (3.1)
|
Azure Databricks Elevation of Privilege Vulnerability |
Microsoft |
Azure Databricks |
2026-04-02T23:26:57.956Z | 2026-04-10T21:20:48.970Z |
| CVE-2026-32186 |
10 (3.1)
|
Microsoft Bing Elevation of Privilege Vulnerability |
Microsoft |
Microsoft Bing |
2026-04-03T17:22:45.504Z | 2026-04-10T21:20:48.223Z |
| CVE-2026-33118 |
4.3 (3.1)
|
Microsoft Edge (Chromium-based) Spoofing Vulnerability |
Microsoft |
Microsoft Edge (Chromium-based) |
2026-04-10T21:20:44.423Z | 2026-04-10T21:20:44.423Z |
| CVE-2026-33119 |
5.4 (3.1)
|
Microsoft Edge (Chromium-based) for Android Spoofing V… |
Microsoft |
Microsoft Edge for Android |
2026-04-10T21:20:37.767Z | 2026-04-10T21:20:37.767Z |
| CVE-2026-32213 |
10 (3.1)
|
Azure AI Foundry Elevation of Privilege Vulnerability |
Microsoft |
Azure AI Foundry |
2026-04-02T23:26:56.002Z | 2026-04-10T21:20:30.982Z |
| CVE-2026-32590 |
7.1 (3.1)
|
Mirror-registry: remote code execution using pickle de… |
Red Hat |
mirror registry for Red Hat OpenShift |
2026-04-08T17:04:22.870Z | 2026-04-10T21:16:18.121Z |
| CVE-2026-5483 |
8.5 (3.1)
|
Odh-dashboard: odh dashboard kubernetes service accoun… |
Red Hat |
Red Hat OpenShift AI 2.16 |
2026-04-10T17:33:25.055Z | 2026-04-10T21:07:45.000Z |
| CVE-2026-4631 |
9.8 (3.1)
|
Cockpit: cockpit: unauthenticated remote code executio… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-04-07T16:30:28.069Z | 2026-04-10T21:05:16.830Z |
| CVE-2026-39901 |
5.7 (3.1)
|
monetr: Protected Transactions Deletable via PUT |
monetr |
monetr |
2026-04-08T21:02:56.280Z | 2026-04-10T20:55:42.904Z |
| CVE-2026-39889 |
7.5 (3.1)
|
PraisonAI has Unauthenticated SSE Event Stream Exposes… |
MervinPraison |
PraisonAI |
2026-04-08T20:44:24.276Z | 2026-04-10T20:54:03.584Z |
| CVE-2026-39883 |
7.3 (4.0)
|
OpenTelemetry-Go has an incomplete fix for CVE-2026-24… |
open-telemetry |
opentelemetry-go |
2026-04-08T20:26:41.731Z | 2026-04-10T20:52:54.819Z |
| CVE-2026-40252 |
5.3 (4.0)
|
Broken Access Control (IDOR) Leading to Cross-Tenant A… |
labring |
FastGPT |
2026-04-10T20:52:15.218Z | 2026-04-10T20:52:15.218Z |
| CVE-2026-5436 |
8.1 (3.1)
|
MW WP Form <= 5.1.1 - Unauthenticated Arbitrary File M… |
inc2734 |
MW WP Form |
2026-04-08T20:25:10.473Z | 2026-04-10T20:50:10.628Z |
| CVE-2026-39429 |
8.2 (3.1)
|
kcp's cache server is accessible without authenticatio… |
kcp-dev |
kcp |
2026-04-08T20:16:04.015Z | 2026-04-10T20:49:31.041Z |
| CVE-2026-39880 |
5 (3.1)
|
Remnawave Backend has a race condition in HWID device … |
remnawave |
backend |
2026-04-08T20:01:21.673Z | 2026-04-10T20:48:07.233Z |
| CVE-2026-5802 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
idachev mcp-javadc HTTP os command injection |
idachev |
mcp-javadc |
2026-04-08T20:00:24.876Z | 2026-04-10T20:47:03.503Z |
| CVE-2026-39859 |
6.3 (4.0)
|
LiquidJS has a renderFile() / parseFile() bypass confi… |
harttle |
liquidjs |
2026-04-08T19:45:21.747Z | 2026-04-10T20:45:55.071Z |
| CVE-2026-39362 |
5.3 (4.0)
|
InvenTree has SSRF via Remote Image Download — No IP/H… |
inventree |
InvenTree |
2026-04-08T19:32:46.744Z | 2026-04-10T20:44:13.278Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2018-25249 |
5.1 (4.0)
6.4 (3.1)
|
MyBB My Arcade Plugin 1.3 Persistent XSS via Comment |
MyBB |
MyBB My Arcade Plugin |
2026-04-04T13:51:14.111Z | 2026-04-06T13:27:13.858Z |
| CVE-2026-34166 |
3.7 (3.1)
|
LiquidJS has a Memory Limit Bypass via Quadratic Ampli… |
harttle |
liquidjs |
2026-04-08T17:52:05.849Z | 2026-04-10T20:37:03.164Z |
| CVE-2026-35525 |
8.2 (4.0)
|
LiquidJS has a root restriction bypass for partial and… |
harttle |
liquidjs |
2026-04-08T19:30:24.802Z | 2026-04-08T19:53:00.573Z |
| CVE-2026-39859 |
6.3 (4.0)
|
LiquidJS has a renderFile() / parseFile() bypass confi… |
harttle |
liquidjs |
2026-04-08T19:45:21.747Z | 2026-04-10T20:45:55.071Z |
| CVE-2026-6057 |
9.8 (3.1)
|
Unauthenticated Path Traversal in FalkorDB Browser Lea… |
FalkorDB |
FalkorDB Browser |
2026-04-10T09:16:30.338Z | 2026-04-10T20:25:53.551Z |
| CVE-2026-5724 |
6.3 (4.0)
|
Missing Authentication on Streaming gRPC Replication E… |
Temporal Technologies, Inc. |
temporal |
2026-04-10T21:06:31.788Z | 2026-04-10T21:22:30.134Z |
| CVE-2026-5483 |
8.5 (3.1)
|
Odh-dashboard: odh dashboard kubernetes service accoun… |
Red Hat |
Red Hat OpenShift AI 2.16 |
2026-04-10T17:33:25.055Z | 2026-04-10T21:07:45.000Z |
| CVE-2026-4631 |
9.8 (3.1)
|
Cockpit: cockpit: unauthenticated remote code executio… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-04-07T16:30:28.069Z | 2026-04-10T21:05:16.830Z |
| CVE-2026-40252 |
5.3 (4.0)
|
Broken Access Control (IDOR) Leading to Cross-Tenant A… |
labring |
FastGPT |
2026-04-10T20:52:15.218Z | 2026-04-10T20:52:15.218Z |
| CVE-2026-40242 |
7.2 (3.1)
|
Arcane Unauthenticated SSRF with Conditional Response … |
getarcaneapp |
arcane |
2026-04-10T20:34:12.777Z | 2026-04-10T20:34:12.777Z |
| CVE-2026-40194 |
3.7 (3.1)
|
phpseclib has a variable-time HMAC comparison in SSH2:… |
phpseclib |
phpseclib |
2026-04-10T20:24:06.696Z | 2026-04-10T20:24:06.696Z |
| CVE-2026-40191 |
6.8 (4.0)
|
ClearanceKit has a policy bypass via dual-path Endpoin… |
craigjbass |
clearancekit |
2026-04-10T20:19:35.909Z | 2026-04-10T20:19:35.909Z |
| CVE-2026-39883 |
7.3 (4.0)
|
OpenTelemetry-Go has an incomplete fix for CVE-2026-24… |
open-telemetry |
opentelemetry-go |
2026-04-08T20:26:41.731Z | 2026-04-10T20:52:54.819Z |
| CVE-2026-39408 |
5.9 (4.0)
|
Hono has a path traversal in toSSG() allows writing fi… |
honojs |
hono |
2026-04-08T14:42:25.357Z | 2026-04-10T20:31:47.508Z |
| CVE-2026-35407 |
5.9 (4.0)
|
Saleor has Cross-Account Email Change via Unbound Conf… |
saleor |
saleor |
2026-04-08T17:24:39.716Z | 2026-04-10T20:36:19.733Z |
| CVE-2026-34723 |
8.7 (4.0)
|
Zammad has incorrect access control in getting_started… |
zammad |
zammad |
2026-04-08T18:14:08.582Z | 2026-04-10T20:40:49.909Z |
| CVE-2026-34719 |
8.3 (4.0)
|
Zammad has a Server-side request forgery (SSRF) via webhooks |
zammad |
zammad |
2026-04-08T18:02:16.224Z | 2026-04-10T20:38:50.653Z |
| CVE-2026-34486 |
N/A
|
Apache Tomcat: Fix for CVE-2026-29146 allowed bypass o… |
Apache Software Foundation |
Apache Tomcat |
2026-04-09T19:35:35.994Z | 2026-04-10T20:20:56.605Z |
| CVE-2026-34483 |
N/A
|
Apache Tomcat: Incomplete escaping of JSON access logs |
Apache Software Foundation |
Apache Tomcat |
2026-04-09T19:30:28.874Z | 2026-04-10T20:17:38.858Z |
| CVE-2026-34079 |
8.7 (4.0)
|
Flatpak affected by arbitrary file deletion on the hos… |
flatpak |
flatpak |
2026-04-07T21:29:44.601Z | 2026-04-10T20:13:47.945Z |
| CVE-2026-34020 |
N/A
|
Apache OpenMeetings: Login Credentials Passed via GET … |
Apache Software Foundation |
Apache OpenMeetings |
2026-04-09T15:52:06.599Z | 2026-04-10T20:13:47.789Z |
| CVE-2026-33229 |
8.6 (4.0)
|
XWiki Platform affected by remote code execution with … |
xwiki |
xwiki-platform |
2026-04-08T14:53:35.977Z | 2026-04-10T20:33:15.897Z |
| CVE-2026-28390 |
N/A
|
Possible NULL Dereference When Processing CMS KeyTrans… |
OpenSSL |
OpenSSL |
2026-04-07T22:00:54.172Z | 2026-04-10T20:26:06.061Z |
| CVE-2026-28389 |
N/A
|
Possible NULL Dereference When Processing CMS KeyAgree… |
OpenSSL |
OpenSSL |
2026-04-07T22:00:53.364Z | 2026-04-10T20:20:45.506Z |
| CVE-2026-28388 |
N/A
|
NULL Pointer Dereference When Processing a Delta CRL |
OpenSSL |
OpenSSL |
2026-04-07T22:00:52.382Z | 2026-04-10T20:18:43.095Z |
| CVE-2026-28386 |
N/A
|
Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-5… |
OpenSSL |
OpenSSL |
2026-04-07T22:00:50.164Z | 2026-04-10T20:16:08.389Z |
| CVE-2025-45057 |
7.5 (3.1)
|
D-Link DI-8300 v16.07.26A1 was discovered to cont… |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-09T20:50:59.112Z |
| CVE-2025-45058 |
7.5 (3.1)
|
D-Link DI-8300 v16.07.26A1 was discovered to cont… |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-09T20:51:48.190Z |
| CVE-2025-45059 |
7.5 (3.1)
|
D-Link DI-8300 v16.07.26A1 was discovered to cont… |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:42:43.981Z |
| CVE-2025-50665 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:41:12.773Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-5991 | A vulnerability was found in Tenda F451 1.0.0.7. Affected by this issue is the function formWrlExtr… | 2026-04-10T00:16:36.557 | 2026-04-10T00:16:36.557 |
| fkie_cve-2026-5990 | A vulnerability has been found in Tenda F451 1.0.0.7. Affected by this vulnerability is the functio… | 2026-04-10T00:16:36.363 | 2026-04-10T00:16:36.363 |
| fkie_cve-2026-5989 | A flaw has been found in Tenda F451 1.0.0.7. Affected is the function fromRouteStatic of the file /… | 2026-04-10T00:16:36.170 | 2026-04-10T00:16:36.170 |
| fkie_cve-2026-5460 | A heap use-after-free exists in wolfSSL's TLS 1.3 post-quantum cryptography (PQC) hybrid KeyShare p… | 2026-04-10T00:16:36.033 | 2026-04-10T00:16:36.033 |
| fkie_cve-2026-5448 | X.509 date buffer overflow in wolfSSL_X509_notAfter / wolfSSL_X509_notBefore. A buffer overflow may… | 2026-04-10T00:16:35.890 | 2026-04-10T00:16:35.890 |
| fkie_cve-2026-5393 | Dual-Algorithm CertificateVerify out-of-bounds read. When processing a dual-algorithm CertificateVe… | 2026-04-10T00:16:35.750 | 2026-04-10T00:16:35.750 |
| fkie_cve-2026-5392 | Heap out-of-bounds read in PKCS7 parsing. A crafted PKCS7 message can trigger an OOB read on the he… | 2026-04-10T00:16:35.603 | 2026-04-10T00:16:35.603 |
| fkie_cve-2026-34500 | CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled … | 2026-04-09T20:16:25.330 | 2026-04-10T00:16:35.500 |
| fkie_cve-2026-34487 | Insertion of Sensitive Information into Log File vulnerability in the cloud membership for clusteri… | 2026-04-09T20:16:25.203 | 2026-04-10T00:16:35.390 |
| fkie_cve-2026-34483 | Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache… | 2026-04-09T20:16:24.937 | 2026-04-10T00:16:35.280 |
| fkie_cve-2026-29146 | Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration. Thi… | 2026-04-09T20:16:24.577 | 2026-04-10T00:16:34.913 |
| fkie_cve-2026-29145 | CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled … | 2026-04-09T20:16:24.447 | 2026-04-10T00:16:34.790 |
| fkie_cve-2026-29129 | Configured cipher preference order not preserved vulnerability in Apache Tomcat. This issue affect… | 2026-04-09T20:16:24.343 | 2026-04-10T00:16:34.673 |
| fkie_cve-2026-25854 | Occasional URL redirection to untrusted Site ('Open Redirect') vulnerability in Apache Tomcat via t… | 2026-04-09T20:16:24.207 | 2026-04-10T00:16:31.137 |
| fkie_cve-2026-24880 | Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in A… | 2026-04-09T20:16:24.060 | 2026-04-10T00:16:25.563 |
| fkie_cve-2026-5988 | A vulnerability was detected in Tenda F451 1.0.0.7. This impacts the function formWrlsafeset of the… | 2026-04-09T23:17:02.343 | 2026-04-09T23:17:02.343 |
| fkie_cve-2026-5987 | A security vulnerability has been detected in Sanluan PublicCMS up to 6.202506.d. This affects the … | 2026-04-09T23:17:02.133 | 2026-04-09T23:17:02.133 |
| fkie_cve-2026-5986 | A weakness has been identified in Zod jsVideoUrlParser up to 0.5.1. The impacted element is the fun… | 2026-04-09T23:17:01.920 | 2026-04-09T23:17:01.920 |
| fkie_cve-2026-5985 | A security flaw has been discovered in code-projects Simple IT Discussion Forum 1.0. The affected e… | 2026-04-09T23:17:01.710 | 2026-04-09T23:17:01.710 |
| fkie_cve-2026-5507 | When restoring a session from cache, a pointer from the serialized session data is used in a free o… | 2026-04-09T23:17:01.543 | 2026-04-09T23:17:01.543 |
| fkie_cve-2026-5504 | A padding oracle exists in wolfSSL's PKCS7 CBC decryption that could allow an attacker to recover p… | 2026-04-09T23:17:01.400 | 2026-04-09T23:17:01.400 |
| fkie_cve-2026-5503 | In TLSX_EchChangeSNI, the ctx->extensions branch set extensions unconditionally even when TLSX_Find… | 2026-04-09T23:17:01.257 | 2026-04-09T23:17:01.257 |
| fkie_cve-2026-5295 | A stack buffer overflow exists in wolfSSL's PKCS7 implementation in the wc_PKCS7_DecryptOri() funct… | 2026-04-09T23:17:01.093 | 2026-04-09T23:17:01.093 |
| fkie_cve-2026-34424 | Smart Slider 3 Pro version 3.5.1.35 for WordPress and Joomla contains a multi-stage remote access t… | 2026-04-09T23:17:00.540 | 2026-04-09T23:17:00.540 |
| fkie_cve-2026-5984 | A vulnerability was identified in D-Link DIR-605L 2.13B01. Impacted is the function formSetLog of t… | 2026-04-09T22:16:37.873 | 2026-04-09T22:16:37.873 |
| fkie_cve-2026-5983 | A vulnerability was determined in D-Link DIR-605L 2.13B01. This issue affects the function formSetD… | 2026-04-09T22:16:37.663 | 2026-04-09T22:16:37.663 |
| fkie_cve-2026-5982 | A vulnerability was found in D-Link DIR-605L 2.13B01. This vulnerability affects the function formA… | 2026-04-09T22:16:37.467 | 2026-04-09T22:16:37.467 |
| fkie_cve-2026-5981 | A vulnerability has been found in D-Link DIR-605L 2.13B01. This affects the function formAdvFirewal… | 2026-04-09T22:16:37.233 | 2026-04-09T22:16:37.233 |
| fkie_cve-2026-5778 | Integer underflow in wolfSSL packet sniffer <= 5.9.0 allows an attacker to cause a program crash in… | 2026-04-09T22:16:37.097 | 2026-04-09T22:16:37.097 |
| fkie_cve-2026-5772 | A 1-byte stack buffer over-read was identified in the MatchDomainName function (src/internal.c) dur… | 2026-04-09T22:16:36.937 | 2026-04-09T22:16:36.937 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-69r9-qgr7-g2wj |
7.5 (3.1)
|
Apache Tomcat Missing Encryption of Sensitive Data vulnerability | 2026-04-09T21:31:30Z | 2026-04-10T22:07:50Z |
| ghsa-8mc5-53m5-3qj2 |
5.3 (3.1)
6.9 (4.0)
|
Apache Tomcat has an Improper Input Validation vulnerability | 2026-04-09T21:31:29Z | 2026-04-10T22:07:39Z |
| ghsa-95jq-rwvf-vjx4 |
9.1 (3.1)
|
Apache Tomcat: CLIENT_CERT authentication does not fail as expected | 2026-04-09T21:31:29Z | 2026-04-10T22:07:25Z |
| ghsa-69cc-cv78-qc8g |
7.5 (3.1)
|
Apache Tomcat: Configured cipher preference order not preserved | 2026-04-09T21:31:29Z | 2026-04-10T22:07:11Z |
| ghsa-563x-q5rq-57qp |
7.5 (3.1)
|
Apache Tomcat has an HTTP Request/Response Smuggling vulnerability | 2026-04-09T21:31:29Z | 2026-04-10T22:07:01Z |
| ghsa-24j9-x2wg-9qv6 |
6.5 (3.1)
|
Apache Tomcat: CLIENT_CERT authentication does not fail as expected | 2026-04-09T21:31:30Z | 2026-04-10T21:38:56Z |
| ghsa-x4m4-345f-5h5g |
7.5 (3.1)
|
Apache Tomcat vulnerable to Insertion of Sensitive Information into Log File | 2026-04-09T21:31:30Z | 2026-04-10T21:38:41Z |
| ghsa-rv64-5gf8-9qq8 |
7.5 (3.1)
|
Apache Tomcat has an Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve | 2026-04-09T21:31:30Z | 2026-04-10T21:38:22Z |
| ghsa-ff24-4prj-gpmj |
7.2 (3.1)
|
Arcane has Unauthenticated SSRF with Conditional Response Reflection in Template Fetch Endpoint | 2026-04-10T20:59:27Z | 2026-04-10T21:37:59Z |
| ghsa-r854-jrxh-36qx |
3.7 (3.1)
|
phpseclib has a variable-time HMAC comparison in SSH2::get_binary_packet() using != instead of hash… | 2026-04-10T20:58:10Z | 2026-04-10T21:37:53Z |
| ghsa-fw9q-39r9-c252 |
5.6 (3.1)
|
LangSmith Client SDKs has Prototype Pollution in langsmith-sdk via Incomplete `__proto__` Guard in … | 2026-04-10T20:18:02Z | 2026-04-10T21:37:36Z |
| ghsa-wvhv-qcqf-f3cx |
9.3 (4.0)
|
goshs has a file-based ACL authorization bypass in goshs state-changing routes | 2026-04-10T20:00:32Z | 2026-04-10T21:37:32Z |
| ghsa-2943-crp8-38xx |
7.7 (3.1)
|
goshs is Missing Write Protection for Parametric Data Values | 2026-04-10T20:00:28Z | 2026-04-10T21:37:27Z |
| ghsa-8647-755q-fw9p |
6.9 (4.0)
|
ajenti.plugin.core has race conditions in 2FA | 2026-04-10T19:54:41Z | 2026-04-10T21:37:21Z |
| ghsa-3mcx-6wxm-qr8v |
9.1 (4.0)
|
ajenti.plugin.core has password bypass when 2FA is activated | 2026-04-10T19:47:31Z | 2026-04-10T21:37:11Z |
| ghsa-fvcv-3m26-pcqx |
10.0 (3.1)
|
Axios has Unrestricted Cloud Metadata Exfiltration via Header Injection Chain | 2026-04-10T19:47:16Z | 2026-04-10T21:37:07Z |
| ghsa-jx2w-vp7f-456q |
6.3 (4.0)
|
quarkus-openapi-generator extension has Zip Slip Path Traversal in ApicurioCodegenWrapper class | 2026-04-08T19:14:32Z | 2026-04-10T21:36:53Z |
| ghsa-9m3c-qcxr-9x87 |
6.1 (3.1)
6.9 (4.0)
|
Apache Tomcat has an Open Redirect vulnerability | 2026-04-09T21:31:29Z | 2026-04-10T21:36:30Z |
| ghsa-xvqc-pp94-fmpx |
5.4 (3.1)
|
Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT vulnerable to Integer Overflow or Wraparound | 2026-04-09T18:31:27Z | 2026-04-10T21:35:56Z |
| ghsa-gcvm-c75m-h4p4 |
7.5 (3.1)
8.7 (4.0)
|
Apache OpenMeetings Uses GET Request Method With Sensitive Query Strings | 2026-04-09T18:31:27Z | 2026-04-10T21:35:15Z |
| ghsa-78cg-fc6c-w44w |
4.3 (3.1)
5.3 (4.0)
|
Apache OpenMeetings has an Improper Handling of Insufficient Privileges vulnerability | 2026-04-09T18:31:26Z | 2026-04-10T21:35:08Z |
| ghsa-wqxq-w68r-wg85 |
7.5 (3.1)
8.7 (4.0)
|
Apache OpenMeetings Uses Hard-coded Cryptographic Key | 2026-04-09T18:31:26Z | 2026-04-10T21:34:59Z |
| ghsa-56p5-8mhr-2fph |
7.5 (3.1)
8.2 (4.0)
|
LiquidJS: Root restriction bypass for partial and layout loading through symlinked templates | 2026-04-08T15:03:47Z | 2026-04-10T21:34:31Z |
| ghsa-mx42-j6wv-px98 |
4.3 (3.1)
5.3 (4.0)
|
RustFS has an authorization bypass in multipart UploadPartCopy enables cross-bucket object exfiltration | 2026-04-08T00:15:50Z | 2026-04-10T21:33:31Z |
| ghsa-3crg-w4f6-42mx |
6.9 (4.0)
|
pypdf: Manipulated XMP metadata entity declarations can exhaust RAM | 2026-04-10T20:59:36Z | 2026-04-10T21:32:54Z |
| ghsa-7m5h-w69j-qggg |
8.1 (3.1)
|
SiYuan: Publish Reader Can Arbitrarily Delete Attribute View Files via `/api/av/removeUnusedAttribu… | 2026-04-10T19:32:07Z | 2026-04-10T21:32:45Z |
| ghsa-m5gr-86j6-99jp |
9.1 (3.1)
|
gramps-webapi: Zip Slip Path Traversal in Media Archive Import | 2026-04-10T21:00:09Z | 2026-04-10T21:32:40Z |
| ghsa-h468-7pvh-8vr8 |
7.5 (3.1)
8.7 (4.0)
|
Apache Tomcat: Padding Oracle vulnerability in EncryptInterceptor | 2026-04-09T21:31:29Z | 2026-04-10T21:32:09Z |
| ghsa-q98v-9f9w-f49q |
6.3 (4.0)
|
The frontend gRPC server's streaming interceptor chain did not include the authorization intercepto… | 2026-04-10T21:31:16Z | 2026-04-10T21:31:16Z |
| ghsa-x87c-g7pw-2xr5 |
5.3 (4.0)
|
GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side request forgery vulner… | 2026-04-10T21:31:15Z | 2026-04-10T21:31:15Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2025-15 |
5.3 (3.1)
|
Flask-AppBuilder is an application development framework. Prior to 4.5.3, Flask-AppBuilde… | flask-appbuilder | 2025-03-03T16:15:41+00:00 | 2025-04-09T17:27:25.227116+00:00 |
| pysec-2025-14 |
|
An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normal… | django | 2025-04-02T13:15:44+00:00 | 2025-04-09T17:27:25.169049+00:00 |
| pysec-2025-13 |
|
An issue was discovered in Django 5.1 before 5.1.7, 5.0 before 5.0.13, and 4.2 before 4.2… | django | 2025-03-06T19:15:27+00:00 | 2025-04-09T17:27:25.095679+00:00 |
| pysec-2022-43178 |
7.5 (3.1)
|
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the cleo … | cleo | 2022-11-09T20:15:10+00:00 | 2025-04-09T17:27:24.793038+00:00 |
| pysec-2022-43177 |
9.8 (3.1)
|
Azure CLI is the command-line interface for Microsoft Azure. In versions previous to 2.40… | azure-cli | 2022-10-25T17:15:56+00:00 | 2025-04-09T17:27:24.642962+00:00 |
| pysec-2024-244 |
7.5 (3.1)
|
A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a by… | mlflow | 2024-05-16T09:15:14+00:00 | 2025-04-08T10:23:25.092581+00:00 |
| pysec-2024-243 |
9.3 (3.1)
|
mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs… | mlflow | 2024-04-16T00:15:12+00:00 | 2025-04-08T10:23:25.044416+00:00 |
| pysec-2024-242 |
7.5 (3.1)
|
A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically … | mlflow | 2024-06-06T19:15:55+00:00 | 2025-04-08T10:23:24.995743+00:00 |
| pysec-2024-241 |
9.6 (3.1)
|
Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untru… | mlflow | 2024-02-23T22:15:55+00:00 | 2025-04-08T10:23:24.946136+00:00 |
| pysec-2024-240 |
9.6 (3.1)
|
Insufficient sanitization in MLflow leads to XSS when running an untrusted recipe. This … | mlflow | 2024-02-23T22:15:55+00:00 | 2025-04-08T10:23:24.900947+00:00 |
| pysec-2024-239 |
8.8 (3.1)
|
A vulnerability in mlflow/mlflow version 8.2.1 allows for remote code execution due to im… | mlflow | 2024-06-06T19:15:51+00:00 | 2025-04-08T10:23:24.852109+00:00 |
| pysec-2025-12 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2025-01-21T15:15:13+00:00 | 2025-04-08T10:23:23.899726+00:00 |
| pysec-2024-238 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-11-06T15:15:11+00:00 | 2025-04-08T10:23:23.857960+00:00 |
| pysec-2025-11 |
5.9 (3.1)
|
A vulnerability in the `KnowledgeBaseWebReader` class of the run-llama/llama_index reposi… | llama-index | 2025-03-20T10:15:31+00:00 | 2025-04-01T23:22:47.294256+00:00 |
| pysec-2025-10 |
9.1 (3.1)
|
A vulnerability in the `download_model` function of the onnx/onnx framework, before and i… | onnx | 2025-03-20T10:15:37+00:00 | 2025-03-26T19:21:38.843396+00:00 |
| pysec-2025-9 |
|
A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through… | invokeai | 2025-03-20T10:15:26+00:00 | 2025-03-20T11:21:37.872971+00:00 |
| pysec-2025-8 |
|
The `pygments-style-solarized` project was removed from PyPI by its owner on 2021-08-26. … | pygments-style-solarized | 2025-03-17T16:35:37+00:00 | |
| pysec-2024-237 |
9.4 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-05-14T16:17:12+00:00 | 2025-03-05T17:22:29.121263+00:00 |
| pysec-2024-236 |
6.1 (3.1)
|
Jupyter Server Proxy allows users to run arbitrary external processes alongside their not… | jupyter-server-proxy | 2024-06-11T22:15:09+00:00 | 2025-02-26T23:22:41.524251+00:00 |
| pysec-2025-7 |
|
Published in 2021, the imblog package is a Python library that scrapes data from a blog p… | imblog | 2025-02-26T21:19:19+00:00 | |
| pysec-2025-6 |
|
Published in 2021, the colabrun package is a Python library that exfiltrates user cookies… | colabrun | 2025-02-26T20:59:48+00:00 | |
| pysec-2025-5 |
|
Published in 2020, the autodzee package is a Python library that bypasses Deezer API rest… | browsercmdhbt2 | 2025-02-26T20:57:11+00:00 | |
| pysec-2025-3 |
|
Published in 2019, the autodzee package is a Python library that bypasses Deezer API rest… | autodzee | 2025-02-26T20:54:20+00:00 | |
| pysec-2025-4 |
|
Published in 2019, the automslc package is a Python library that bypasses Deezer API rest… | automslc | 2025-02-26T19:26:49+00:00 | |
| pysec-2024-235 |
8.1 (3.1)
|
With the following crawler configuration: ```python from bs4 import BeautifulSoup as Sou… | langchain-exa | 2024-02-26T16:27:49+00:00 | 2025-02-26T02:48:56.937312+00:00 |
| pysec-2023-194 |
9.8 (3.1)
|
langchain_experimental 0.0.14 allows an attacker to bypass the CVE-2023-36258 fix and exe… | langchain-experimental | 2023-10-09T20:15:00Z | 2025-02-23T07:46:11Z |
| pysec-2024-234 |
9.8 (3.1)
|
Jupyter Server Proxy allows users to run arbitrary external processes alongside their Jup… | jupyter-server-proxy | 2024-03-20T20:15:08+00:00 | 2025-02-21T18:23:35.992501+00:00 |
| pysec-2023-163 |
9.8 (3.1)
|
An issue in LanChain-ai Langchain v.0.0.245 allows a remote attacker to execute arbitrary… | numexpr | 2023-09-01T16:15:00Z | 2025-02-20T09:11:38.521949Z |
| pysec-2024-233 |
|
python-jose through 3.3.0 allows attackers to cause a denial of service (resource consump… | python-jose | 2024-04-26T00:15:09+00:00 | 2025-02-18T19:20:15.511369+00:00 |
| pysec-2024-232 |
|
python-jose through 3.3.0 has algorithm confusion with OpenSSH ECDSA keys and other key f… | python-jose | 2024-04-26T00:15:09+00:00 | 2025-02-18T19:20:15.468012+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33829 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.511177Z |
| gsd-2024-33828 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.373189Z |
| gsd-2024-33827 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.528643Z |
| gsd-2024-33826 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.371945Z |
| gsd-2024-33825 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.318128Z |
| gsd-2024-33824 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.385552Z |
| gsd-2024-33823 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.350433Z |
| gsd-2024-33822 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.561810Z |
| gsd-2024-33821 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.360168Z |
| gsd-2024-33820 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.334156Z |
| gsd-2024-33819 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.351158Z |
| gsd-2024-33818 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.556720Z |
| gsd-2024-33817 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.323149Z |
| gsd-2024-33816 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.388757Z |
| gsd-2024-33815 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.295529Z |
| gsd-2024-33814 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.590797Z |
| gsd-2024-33813 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.424031Z |
| gsd-2024-33812 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.367474Z |
| gsd-2024-33811 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.319336Z |
| gsd-2024-33810 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.527741Z |
| gsd-2024-33809 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.516352Z |
| gsd-2024-33808 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.458232Z |
| gsd-2024-33807 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.526483Z |
| gsd-2024-33806 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.291234Z |
| gsd-2024-33805 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.453392Z |
| gsd-2024-33804 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.298401Z |
| gsd-2024-33803 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.369211Z |
| gsd-2024-33802 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.336079Z |
| gsd-2024-33801 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.476298Z |
| gsd-2024-33800 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.371673Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2484 | Malicious code in strapi-plugin-sitemap-gen (npm) | 2026-04-03T19:04:21Z | 2026-04-07T16:38:18Z |
| mal-2026-2482 | Malicious code in strapi-plugin-seed (npm) | 2026-04-03T17:24:36Z | 2026-04-07T16:38:18Z |
| mal-2026-2481 | Malicious code in strapi-plugin-notify (npm) | 2026-04-03T17:27:10Z | 2026-04-07T16:38:18Z |
| mal-2026-2480 | Malicious code in strapi-plugin-nordica-vhost (npm) | 2026-04-03T19:05:57Z | 2026-04-07T16:38:18Z |
| mal-2026-2479 | Malicious code in strapi-plugin-nordica-tools (npm) | 2026-04-03T19:04:28Z | 2026-04-07T16:38:18Z |
| mal-2026-2478 | Malicious code in strapi-plugin-nordica-sync (npm) | 2026-04-03T19:04:46Z | 2026-04-07T16:38:18Z |
| mal-2026-2477 | Malicious code in strapi-plugin-nordica-stage (npm) | 2026-04-03T19:05:39Z | 2026-04-07T16:38:18Z |
| mal-2026-2476 | Malicious code in strapi-plugin-nordica-recon (npm) | 2026-04-03T19:05:26Z | 2026-04-07T16:38:18Z |
| mal-2026-2475 | Malicious code in strapi-plugin-nordica-lite (npm) | 2026-04-03T19:04:32Z | 2026-04-07T16:38:18Z |
| mal-2026-2474 | Malicious code in strapi-plugin-nordica-deep (npm) | 2026-04-03T19:06:00Z | 2026-04-07T16:38:18Z |
| mal-2026-2473 | Malicious code in strapi-plugin-nordica-cms (npm) | 2026-04-03T19:04:49Z | 2026-04-07T16:38:18Z |
| mal-2026-2472 | Malicious code in strapi-plugin-nordica-api (npm) | 2026-04-03T19:05:08Z | 2026-04-07T16:38:18Z |
| mal-2026-2471 | Malicious code in strapi-plugin-nordica (npm) | 2026-04-03T19:08:46Z | 2026-04-07T16:38:18Z |
| mal-2026-2470 | Malicious code in strapi-plugin-monitor (npm) | 2026-04-03T16:13:14Z | 2026-04-07T16:38:18Z |
| mal-2026-2468 | Malicious code in strapi-plugin-locale (npm) | 2026-04-03T17:28:57Z | 2026-04-07T16:38:18Z |
| mal-2026-2466 | Malicious code in strapi-plugin-hextest (npm) | 2026-04-03T19:09:14Z | 2026-04-07T16:38:18Z |
| mal-2026-2465 | Malicious code in strapi-plugin-health-check (npm) | 2026-04-03T19:10:19Z | 2026-04-07T16:38:18Z |
| mal-2026-2463 | Malicious code in strapi-plugin-guardarian-ext (npm) | 2026-04-03T19:10:23Z | 2026-04-07T16:38:18Z |
| mal-2026-2462 | Malicious code in strapi-plugin-form (npm) | 2026-04-03T17:26:57Z | 2026-04-07T16:38:18Z |
| mal-2026-2461 | Malicious code in strapi-plugin-finseven (npm) | 2026-04-03T19:08:49Z | 2026-04-07T16:38:18Z |
| mal-2026-2459 | Malicious code in strapi-plugin-debug-tools (npm) | 2026-04-03T19:10:16Z | 2026-04-07T16:38:18Z |
| mal-2026-2455 | Malicious code in strapi-plugin-content-sync (npm) | 2026-04-03T19:09:53Z | 2026-04-07T16:38:18Z |
| mal-2026-2453 | Malicious code in strapi-plugin-cms-tools (npm) | 2026-04-03T19:09:34Z | 2026-04-07T16:38:18Z |
| mal-2026-2452 | Malicious code in strapi-plugin-blurhash (npm) | 2026-04-03T19:10:29Z | 2026-04-07T16:38:18Z |
| mal-2026-2451 | Malicious code in strapi-plugin-api (npm) | 2026-04-03T17:27:21Z | 2026-04-07T16:38:18Z |
| mal-2026-2450 | Malicious code in strapi-plugin-advanced-uuid (npm) | 2026-04-03T19:10:26Z | 2026-04-07T16:38:18Z |
| mal-2026-2485 | Malicious code in strapi-plugin-sync (npm) | 2026-04-03T17:24:04Z | 2026-04-07T15:47:31Z |
| mal-2026-2469 | Malicious code in strapi-plugin-logger (npm) | 2026-04-03T16:13:59Z | 2026-04-07T15:47:31Z |
| mal-2026-2467 | Malicious code in strapi-plugin-hooks (npm) | 2026-04-03T16:11:54Z | 2026-04-07T15:47:31Z |
| mal-2026-2464 | Malicious code in strapi-plugin-health (npm) | 2026-04-03T17:23:49Z | 2026-04-07T15:47:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2229 | Linux Kernel: Mehrere Schwachstellen | 2025-10-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2227 | Golang Go: Mehrere Schwachstellen | 2025-10-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2212 | OpenSSH: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-10-06T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2194 | Linux Kernel: Mehrere Schwachstellen | 2025-10-05T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2187 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-01T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2170 | Linux Kernel: Mehrere Schwachstellen | 2025-09-30T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2112 | DNSdist: Schwachstelle ermöglicht Denial of Service | 2025-09-23T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2107 | Linux Kernel: Mehrere Schwachstellen | 2025-09-22T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2099 | Linux Kernel: Mehrere Schwachstellen | 2025-09-21T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2092 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-18T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2077 | Linux Kernel: Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1988 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1976 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-04T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1898 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und Privilegieneskalation | 2025-08-24T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1869 | Linux Kernel: Mehrere Schwachstellen | 2025-08-19T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1858 | Linux Kernel: Mehrere Schwachstellen | 2025-08-17T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1653 | Linux Kernel: Mehrere Schwachstellen | 2025-07-27T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1517 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-08T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1481 | Linux Kernel: Mehrere Schwachstellen | 2025-07-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1465 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-06T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1452 | Linux Kernel: Mehrere Schwachstellen | 2025-07-02T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1350 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-06-17T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0861 | Linux Kernel: Mehrere Schwachstellen | 2025-04-21T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0844 | Linux Kernel: Mehrere Schwachstellen | 2025-04-16T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0837 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-04-15T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0545 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-03-11T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0499 | Linux Kernel: Mehrere Schwachstellen | 2025-03-06T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0453 | Linux Kernel: Mehrere Schwachstellen | 2025-02-26T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3762 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-12-29T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3575 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-12-02T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-226-15 | Siemens SINEC OS | 2025-08-12T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-25-226-07 | Siemens Third-Party Components in SINEC OS | 2025-08-12T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-25-203-04 | Schneider Electric EcoStruxure Power Operation (Update A) | 2025-07-22T06:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-26-055-02 | Schneider Electric EcoStruxure Building Operation Workstation | 2026-02-10T08:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-26-055-01 | InSAT MasterSCADA BUK-TS | 2026-02-24T07:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-25-070-01 | Schneider Electric Uni-Telway Driver (Update C) | 2025-02-11T05:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-24-296-01 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products (Update C) | 2024-10-22T06:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-22-202-04 | ICONICS Suite and Mitsubishi Electric MC Works64 Products (Update C) | 2022-07-26T06:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-26-020-01 | Schneider Electric EcoStruxure Foxboro DCS (Update A) | 2025-12-09T08:00:00.000000Z | 2026-02-24T06:00:00.000000Z |
| icsa-26-050-04 | Welker OdorEyes EcoSystem Pulse Bypass System with XL4 Controller | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-050-03 | Jinan USR IOT Technology Limited (PUSR) USR-W610 | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-050-02 | Valmet DNA Engineering Web Tools | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-050-01 | EnOcean SmartServer IoT | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-24-263-02 | IDEC Products (Update A) | 2024-09-19T06:00:00.000000Z | 2026-02-18T07:00:00.000000Z |
| icsa-26-048-03 | GE Vernova Enervista UR Setup | 2026-02-17T07:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-048-02 | Delta Electronics ASDA-Soft | 2026-02-17T07:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-048-01 | Siemens Simcenter Femap and Nastran | 2026-02-10T00:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-043-10 | Airleader Master | 2026-02-12T07:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-09 | Hitachi Energy SuprOS | 2026-01-27T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-07 | Siemens Siveillance Video Management Servers | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-05 | Siemens Solid Edge | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-04 | Siemens Desigo CC Product Family and SENTRON Powermanager | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-02 | Siemens Polarion | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-01 | Siemens SINEC NMS | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-015-04 | Siemens SIMATIC and SIPLUS products | 2026-01-13T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-289-06 | Siemens SiPass Integrated | 2025-10-14T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-135-01 | Siemens RUGGEDCOM APE1808 Devices | 2025-05-13T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-072-11 | Siemens SIMATIC IPC Family, ITP1000, and Field PGs | 2025-03-11T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-24-102-01 | Siemens SIMATIC S7-1500 | 2024-04-09T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-12-349-01 | Siemens Automation License Manager Uncontrolled Resource Consumption | 2012-12-12T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ios-tacacs-hdb7thjw | Cisco IOS and IOS XE Software TACACS+ Authentication Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-01T16:39:50+00:00 |
| cisco-sa-cv-xss-rwrakaj9 | Cisco Cyber Vision Center Stored Cross-Site Scripting Vulnerabilities | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-cucm-stored-xss-fnj66yly | Cisco Unified Communications Manager Stored Cross-Site Scripting Vulnerability | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-cat9k-ptmd7bgy | Cisco IOS XE Software for Catalyst 9000 Series Switches Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-30T14:26:46+00:00 |
| cisco-sa-ap-ipv6-gw-tuazpn9o | Cisco Access Point Software Intermittent IPv6 Gateway Change Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:51+00:00 |
| cisco-sa-webui-xss-vwydgjou | Cisco IOS XE Software Web Authentication Reflected Cross-Site Scripting Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:50+00:00 |
| cisco-sa-snmpwred-x3mjyf5m | Cisco IOS XE Software Simple Network Management Protocol Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-nbar-dos-lavwtmet | Cisco IOS XE Software Network-Based Application Recognition Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-arg-inject-eyddbh4e | Cisco IOS XE Software CLI Argument Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-xe-cmd-inject-rpjm8bgl | Cisco IOS XE Software HTTP API Command Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-invalid-url-dos-nvxszf6u | Cisco IOS Software Industrial Ethernet Switch Device Manager Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-cli-eb7cz6yo | Cisco IOS and IOS XE Software CLI Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-defaultacl-psjk9nvf | Cisco SD-WAN vEdge Software Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-cat9k-acl-l4k7vxgd | Cisco IOS XE Software on Cisco Catalyst 9500X and 9600X Series Switches Virtual Interface Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-action-frame-inj-qqcncz8h | Cisco Wireless Access Point Software Device Analytics Action Frame Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-9800cl-openscep-sb4xtxzp | Cisco IOS XE Software for Catalyst 9800 Series Wireless Controller for Cloud Unauthenticated Access to Certificate Enrollment Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-snmp-bypass-hhuvujdn | Cisco IOS XE SD-WAN Software Packet Filtering Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-09-22T14:12:28+00:00 |
| cisco-sa-xrsig-uy4zrucg | Cisco IOS XR Software Image Verification Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-iosxr-arp-storm-ejuu55ym | Cisco IOS XR ARP Broadcast Storm Denial of Service Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-acl-packetio-swjhhbtz | Cisco IOS XR Software Management Interface ACL Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-fp2k-ipsec-dos-tjwgdzco | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 2100 Series IPv6 over IPsec Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-09T21:22:34+00:00 |
| cisco-sa-webex-xss-55bv8hhm | Cisco Webex Meetings Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-webex-urlredirect-uk8ddjsz | Cisco Webex Meetings URL Redirection Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-phone-write-g3kcc5df | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-imp-xss-xqgu4hsg | Cisco Unified Communications Manager IM & Presence Service Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epnm-pi-stored-xss-xjqzsycp | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epnm-info-dis-zhppmfgz | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Information Disclosure Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epni-arb-file-upload-jjdm2p83 | Cisco Evolved Programmable Network Manager Arbitrary File Upload Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-cucm-csrf-w762pryd | Cisco Unified Communications Manager Cross-Site Request Forgery Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-3100_4200_tlsdos-2ynscd54 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 3100 and 4200 Series TLS 1.3 Cipher Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-03T13:37:50+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-23468 | drm/amdgpu: Limit BO list entry count to prevent resource exhaustion | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:20.000Z |
| msrc_cve-2026-23444 | wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:15.000Z |
| msrc_cve-2026-23472 | serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:10.000Z |
| msrc_cve-2026-23473 | io_uring/poll: fix multishot recv missing EOF on wakeup race | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:05.000Z |
| msrc_cve-2026-27447 | OpenPrinting CUPS: Authorization bypass via case-insensitive group-member lookup | 2026-04-02T00:00:00.000Z | 2026-04-07T01:40:54.000Z |
| msrc_cve-2026-34591 | Poetry Has Wheel Path Traversal Which Can Lead to Arbitrary File Write | 2026-04-02T00:00:00.000Z | 2026-04-07T01:02:30.000Z |
| msrc_cve-2026-3184 | Util-linux: util-linux: access control bypass due to improper hostname canonicalization | 2026-04-02T00:00:00.000Z | 2026-04-07T01:02:25.000Z |
| msrc_cve-2026-35387 | CVE-2026-35387 | 2026-04-02T00:00:00.000Z | 2026-04-07T01:02:00.000Z |
| msrc_cve-2026-31408 | Bluetooth: SCO: Fix use-after-free in sco_recv_frame() due to missing sock_hold | 2026-04-02T00:00:00.000Z | 2026-04-07T01:01:28.000Z |
| msrc_cve-2026-31407 | netfilter: conntrack: add missing netlink policy validations | 2026-04-02T00:00:00.000Z | 2026-04-07T01:01:22.000Z |
| msrc_cve-2026-31410 | ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION | 2026-04-02T00:00:00.000Z | 2026-04-07T01:01:16.000Z |
| msrc_cve-2026-0968 | Libssh: libssh: denial of service due to malformed sftp message | 2026-03-02T00:00:00.000Z | 2026-04-06T14:38:18.000Z |
| msrc_cve-2026-35549 | CVE-2026-35549 | 2026-04-02T00:00:00.000Z | 2026-04-04T01:02:53.000Z |
| msrc_cve-2026-34601 | xmldom: XML injection via unsafe CDATA serialization allows attacker-controlled markup insertion | 2026-04-02T00:00:00.000Z | 2026-04-04T01:02:47.000Z |
| msrc_cve-2026-2100 | P11-kit: p11-kit: null dereference via c_derivekey with specific null parameters | 2026-03-02T00:00:00.000Z | 2026-04-03T01:39:20.000Z |
| msrc_cve-2026-23401 | KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE | 2026-04-02T00:00:00.000Z | 2026-04-03T01:39:03.000Z |
| msrc_cve-2026-34073 | cryptography has incomplete DNS name constraint enforcement on peer names | 2026-03-02T00:00:00.000Z | 2026-04-03T01:01:25.000Z |
| msrc_cve-2026-32287 | Infinite loop in github.com/antchfx/xpath | 2026-03-02T00:00:00.000Z | 2026-04-02T14:39:36.000Z |
| msrc_cve-2026-4732 | Out-of-bounds Read Overflow in tildearrow/furnace | 2026-03-02T00:00:00.000Z | 2026-04-02T14:38:55.000Z |
| msrc_cve-2026-5119 | Libsoup: libsoup: information disclosure via cleartext transmission of cookies during https tunnel establishment | 2026-03-02T00:00:00.000Z | 2026-04-02T14:38:47.000Z |
| msrc_cve-2026-33107 | Azure Databricks Elevation of Privilege Vulnerability | 2026-04-02T07:00:00.000Z | 2026-04-02T07:00:00.000Z |
| msrc_cve-2026-33105 | Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability | 2026-04-02T07:00:00.000Z | 2026-04-02T07:00:00.000Z |
| msrc_cve-2026-32213 | Azure AI Foundry Elevation of Privilege Vulnerability | 2026-04-02T07:00:00.000Z | 2026-04-02T07:00:00.000Z |
| msrc_cve-2026-32211 | Azure MCP Server Information Disclosure Vulnerability | 2026-04-02T07:00:00.000Z | 2026-04-02T07:00:00.000Z |
| msrc_cve-2026-32173 | Azure SRE Agent Information Disclosure Vulnerability | 2026-04-02T07:00:00.000Z | 2026-04-02T07:00:00.000Z |
| msrc_cve-2026-26135 | Azure Custom Locations Resource Provider (RP) Elevation of Privilege Vulnerability | 2026-04-02T07:00:00.000Z | 2026-04-02T07:00:00.000Z |
| msrc_cve-2026-34043 | Serialize JavaScript has CPU Exhaustion Denial of Service via crafted array-like objects | 2026-03-02T00:00:00.000Z | 2026-04-02T01:40:32.000Z |
| msrc_cve-2026-33542 | Incus does not verify combined fingerprint when downloading images from simplestreams servers | 2026-03-02T00:00:00.000Z | 2026-04-02T01:40:07.000Z |
| msrc_cve-2026-33750 | brace-expansion: Zero-step sequence causes process hang and memory exhaustion | 2026-03-02T00:00:00.000Z | 2026-04-02T01:39:52.000Z |
| msrc_cve-2026-0964 | Libssh: improper sanitation of paths received from scp servers | 2026-03-02T00:00:00.000Z | 2026-04-02T01:39:41.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0024 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2026-01-21T09:29:38.334428Z | 2026-01-21T09:29:38.334428Z |
| ncsc-2026-0023 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2026-01-21T09:27:58.715578Z | 2026-01-21T09:27:58.715578Z |
| ncsc-2026-0022 | Kwetsbaarheden verholpen in Oracle Communications producten | 2026-01-21T09:25:39.876330Z | 2026-01-21T09:25:39.876330Z |
| ncsc-2026-0021 | Kwetsbaarheden verholpen in Oracle Database Server producten | 2026-01-21T09:19:00.000449Z | 2026-01-21T09:19:00.000449Z |
| ncsc-2026-0020 | Kwetsbaarheden verholpen in Oracle Commerce | 2026-01-21T09:18:16.268788Z | 2026-01-21T09:18:16.268788Z |
| ncsc-2026-0019 | Kwetsbaarheid verholpen in Fortinet FortiSIEM | 2026-01-16T13:34:34.467426Z | 2026-01-16T13:34:34.467426Z |
| ncsc-2026-0018 | Kwetsbaarheden verholpen in TYPO3 CMS | 2026-01-16T10:11:37.524826Z | 2026-01-16T10:11:37.524826Z |
| ncsc-2026-0017 | Kwetsbaarheden verholpen in Juniper Networks JunOS | 2026-01-16T10:07:39.310560Z | 2026-01-16T10:07:39.310560Z |
| ncsc-2026-0016 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS | 2026-01-16T09:44:20.575860Z | 2026-01-16T09:44:20.575860Z |
| ncsc-2026-0015 | Kwetsbaarheid verholpen in Fortinet FortiOS | 2026-01-15T12:31:57.265723Z | 2026-01-15T12:31:57.265723Z |
| ncsc-2026-0014 | Kwetsbaarheden verholpen in Adobe Illustrator | 2026-01-15T12:16:05.427141Z | 2026-01-15T12:16:05.427141Z |
| ncsc-2026-0013 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2026-01-14T13:45:48.530782Z | 2026-01-14T13:45:48.530782Z |
| ncsc-2026-0012 | Kwetsbaarheden verholpen in Adobe Dreamweaver Desktop | 2026-01-14T13:41:56.261778Z | 2026-01-14T13:41:56.261778Z |
| ncsc-2026-0011 | Kwetsbaarheid verholpen in Microsoft Developer Tools | 2026-01-13T19:19:27.690900Z | 2026-01-13T19:19:27.690900Z |
| ncsc-2026-0009 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-01-13T19:17:59.629364Z | 2026-01-13T19:17:59.629364Z |
| ncsc-2026-0008 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-01-13T19:17:18.848673Z | 2026-01-13T19:17:18.848673Z |
| ncsc-2026-0007 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-01-13T19:16:30.720079Z | 2026-01-13T19:16:30.720079Z |
| ncsc-2026-0006 | Kwetsbaarheden verholpen in SAP producten | 2026-01-13T14:42:24.621603Z | 2026-01-13T14:42:24.621603Z |
| ncsc-2026-0005 | Kwetsbaarheden verholpen in Siemens producten | 2026-01-13T12:05:57.353070Z | 2026-01-13T12:05:57.353070Z |
| ncsc-2026-0004 | Kwetsbaarheden verholpen in Trend Micro Apex Central | 2026-01-09T11:14:58.910197Z | 2026-01-09T11:14:58.910197Z |
| ncsc-2026-0003 | Kwetsbaarheden verholpen in GitLab | 2026-01-09T11:11:48.308357Z | 2026-01-09T11:11:48.308357Z |
| ncsc-2026-0002 | Kwetsbaarheid verholpen in n8n | 2026-01-08T12:34:29.315681Z | 2026-01-08T12:34:29.315681Z |
| ncsc-2026-0001 | Kwetsbaarheden verholpen in Hanwha camera systemen | 2026-01-08T12:28:21.446188Z | 2026-01-08T12:28:21.446188Z |
| ncsc-2025-0405 | Kwetsbaarheid verholpen in Roundcube Webmail | 2025-12-31T14:29:26.821576Z | 2025-12-31T14:29:26.821576Z |
| ncsc-2025-0404 | Kwetsbaarheid verholpen in SmarterMail | 2025-12-31T14:19:01.847364Z | 2025-12-31T14:19:01.847364Z |
| ncsc-2025-0403 | Kwetsbaarheden verholpen in QNAP besturingssystemen | 2025-12-29T09:17:28.385450Z | 2025-12-29T09:17:28.385450Z |
| ncsc-2025-0402 | Kwetsbaarheid verholpen in MongoDB | 2025-12-27T11:38:11.514349Z | 2025-12-27T11:38:11.514349Z |
| ncsc-2025-0399 | Kwetsbaarheid verholpen in HPE OneView Software | 2025-12-18T18:38:20.794784Z | 2025-12-24T11:29:46.123674Z |
| ncsc-2025-0401 | Kwetsbaarheden verholpen in Foxit PDF Reader | 2025-12-24T09:14:56.590353Z | 2025-12-24T09:14:56.590353Z |
| ncsc-2025-0400 | Kwetsbaarheid verholpen in WatchGuard Firebox | 2025-12-19T11:16:01.438518Z | 2025-12-19T11:16:01.438518Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10455-1 | python311-requests-2.33.0-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10454-1 | python311-cryptography-46.0.6-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10453-1 | libpolkit-agent-1-0-127-3.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10452-1 | libjavamapscript-8.6.1-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10451-1 | libpng16-16-1.6.56-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10450-1 | incus-6.23-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10449-1 | gsl-2.8-5.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10448-1 | bind-9.20.21-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10447-1 | MozillaThunderbird-140.9.0-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10446-1 | ImageMagick-7.1.2.18-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:20439-1 | Security update for MozillaFirefox | 2026-03-27T12:32:55Z | 2026-03-27T12:32:55Z |
| opensuse-su-2026:20441-1 | Security update for GraphicsMagick | 2026-03-27T12:17:58Z | 2026-03-27T12:17:58Z |
| opensuse-su-2026:20438-1 | Security update for docker-compose | 2026-03-27T10:04:45Z | 2026-03-27T10:04:45Z |
| opensuse-su-2026:10445-1 | traefik2-2.11.42-1.1 on GA media | 2026-03-27T00:00:00Z | 2026-03-27T00:00:00Z |
| opensuse-su-2026:10444-1 | traefik-3.6.12-1.1 on GA media | 2026-03-27T00:00:00Z | 2026-03-27T00:00:00Z |
| opensuse-su-2026:10443-1 | libsuricata8_0_4-8.0.4-1.1 on GA media | 2026-03-27T00:00:00Z | 2026-03-27T00:00:00Z |
| opensuse-su-2026:10442-1 | dovecot24-2.4.3-1.1 on GA media | 2026-03-27T00:00:00Z | 2026-03-27T00:00:00Z |
| opensuse-su-2026:20437-1 | Security update for net-tools | 2026-03-26T15:12:43Z | 2026-03-26T15:12:43Z |
| opensuse-su-2026:20433-1 | Security update for openexr | 2026-03-26T10:03:06Z | 2026-03-26T10:03:06Z |
| opensuse-su-2026:20432-1 | Security update for fetchmail | 2026-03-26T09:57:56Z | 2026-03-26T09:57:56Z |
| opensuse-su-2026:20427-1 | Security update for chromium | 2026-03-26T06:02:22Z | 2026-03-26T06:02:22Z |
| opensuse-su-2026:10441-1 | strongswan-6.0.5-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10440-1 | jupyter-nbclassic-1.3.3-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10439-1 | plexus-utils-4.0.2-2.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10438-1 | openbao-2.5.2-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10437-1 | libnghttp2-14-1.68.1-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10436-1 | freeipmi-1.6.17-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10435-1 | cpp-httplib-devel-0.38.0-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10434-1 | chromedriver-146.0.7680.164-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10433-1 | LibVNCServer-devel-0.9.15-2.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:0627 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.13.5 security update | 2026-01-14T18:37:52+00:00 | 2026-04-12T08:02:38+00:00 |
| rhsa-2026:0530 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.12 | 2026-01-13T20:48:49+00:00 | 2026-04-12T08:02:38+00:00 |
| rhsa-2026:0527 | Red Hat Security Advisory: VolSync v0.14 security fixes and container updates | 2026-01-13T16:52:50+00:00 | 2026-04-12T08:02:37+00:00 |
| rhsa-2026:0477 | Red Hat Security Advisory: skopeo security update | 2026-01-12T20:03:23+00:00 | 2026-04-12T08:02:37+00:00 |
| rhsa-2026:0426 | Red Hat Security Advisory: buildah security update | 2026-01-12T03:32:03+00:00 | 2026-04-12T08:02:36+00:00 |
| rhsa-2026:0425 | Red Hat Security Advisory: runc security update | 2026-01-12T03:43:04+00:00 | 2026-04-12T08:02:36+00:00 |
| rhsa-2026:0424 | Red Hat Security Advisory: podman security update | 2026-01-12T02:26:08+00:00 | 2026-04-12T08:02:35+00:00 |
| rhsa-2026:0418 | Red Hat Security Advisory: OpenShift Container Platform 4.16.55 packages and security update | 2026-01-15T19:15:31+00:00 | 2026-04-12T08:02:35+00:00 |
| rhsa-2026:0331 | Red Hat Security Advisory: OpenShift Container Platform 4.18.31 packages and security update | 2026-01-15T19:11:50+00:00 | 2026-04-12T08:02:35+00:00 |
| rhsa-2026:0316 | Red Hat Security Advisory: OpenShift Container Platform 4.12.84 bug fix and security update | 2026-01-15T05:12:28+00:00 | 2026-04-12T08:02:34+00:00 |
| rhsa-2026:0315 | Red Hat Security Advisory: OpenShift Container Platform 4.12.84 packages and security update | 2026-01-15T00:25:18+00:00 | 2026-04-12T08:02:34+00:00 |
| rhsa-2026:0314 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-08T11:35:59+00:00 | 2026-04-12T08:02:33+00:00 |
| rhsa-2026:0246 | Red Hat Security Advisory: grafana security update | 2026-01-07T14:46:41+00:00 | 2026-04-12T08:02:33+00:00 |
| rhsa-2026:0245 | Red Hat Security Advisory: grafana security update | 2026-01-07T14:45:51+00:00 | 2026-04-12T08:02:33+00:00 |
| rhsa-2026:0244 | Red Hat Security Advisory: grafana security update | 2026-01-07T14:38:56+00:00 | 2026-04-12T08:02:32+00:00 |
| rhsa-2026:0243 | Red Hat Security Advisory: grafana security update | 2026-01-07T14:43:26+00:00 | 2026-04-12T08:02:31+00:00 |
| rhsa-2026:0227 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-07T11:32:40+00:00 | 2026-04-12T08:02:31+00:00 |
| rhsa-2026:0226 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-07T12:46:50+00:00 | 2026-04-12T08:02:31+00:00 |
| rhsa-2026:0050 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.6.2 | 2026-01-05T08:04:03+00:00 | 2026-04-12T08:02:30+00:00 |
| rhsa-2025:9759 | Red Hat Security Advisory: OpenShift Container Platform 4.14.53 bug fix and security update | 2025-07-02T17:25:30+00:00 | 2026-04-12T08:02:30+00:00 |
| rhsa-2025:9646 | Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.3.7 security and bug fix update | 2025-06-25T14:06:29+00:00 | 2026-04-12T08:02:29+00:00 |
| rhsa-2025:9562 | Red Hat Security Advisory: OpenShift Container Platform 4.20.0 bug fix and security update | 2025-10-21T04:13:27+00:00 | 2026-04-12T08:02:29+00:00 |
| rhsa-2025:9541 | Red Hat Security Advisory: Submariner 0.17.6 bug fixes and container updates | 2025-06-24T14:31:21+00:00 | 2026-04-12T08:02:29+00:00 |
| rhsa-2025:8704 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 10.17.1 product release | 2025-06-09T16:42:07+00:00 | 2026-04-12T08:02:29+00:00 |
| rhsa-2025:9388 | Red Hat Security Advisory: Red Hat Multicluster GlobalHub 1.2.3 bug fixes and container updates | 2025-06-23T15:10:48+00:00 | 2026-04-12T08:02:28+00:00 |
| rhsa-2025:9259 | Red Hat Security Advisory: OpenShift Container Platform 4.15.53 bug fix and security update | 2025-06-26T01:50:03+00:00 | 2026-04-12T08:02:27+00:00 |
| rhsa-2025:9167 | Red Hat Security Advisory: Red Hat build of OpenTelemetry 3.6.0 release | 2025-06-17T09:27:34+00:00 | 2026-04-12T08:02:27+00:00 |
| rhsa-2025:9136 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 10.16.2 product release | 2025-06-16T18:32:02+00:00 | 2026-04-12T08:02:26+00:00 |
| rhsa-2025:8691 | Red Hat Security Advisory: RHSA: Submariner 0.20.1 - bug fix and enhancement update | 2025-06-09T14:26:17+00:00 | 2026-04-12T08:02:26+00:00 |
| rhsa-2025:8560 | Red Hat Security Advisory: OpenShift Container Platform 4.18.17 bug fix and security update | 2025-06-10T06:26:36+00:00 | 2026-04-12T08:02:24+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2022-221-02 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, and Modicon Controllers M580 and M340 | 2022-08-09T10:58:35.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-222-04 | Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert | 2021-08-10T02:27:39.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-194-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ x70, and Modicon Controllers M580 and M340 | 2021-07-13T08:22:02.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2019-281-02 | Modicon Controllers | 2019-09-26T12:53:28.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2018-081-01 | Embedded FTP Servers for Modicon PAC Controllers | 2018-03-22T03:39:21.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2024-191-03 | EcoStruxure Foxboro SCADA FoxRTU Station | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-191-02 | EcoStruxureTM Foxboro DCS Core Control Services | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-191-01 | Wiser Home Controller WHC-5918A | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-163-05 | SAGE RTU | 2024-06-11T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-044-01 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon M340, M580 and M580 Safety PLCs | 2024-02-13T12:41:43.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-163-04 | SpaceLogic AS-P and AS-B Automation Servers | 2024-06-11T00:00:00.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2024-163-03 | EVlink Home Smart | 2024-06-11T00:00:00.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2023-101-04 | Easy UPS Online Monitoring Software | 2023-04-11T14:09:13.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2024-100-01 | Easergy Studio | 2024-04-09T00:00:00.000Z | 2024-04-09T00:00:00.000Z |
| sevd-2023-346-01 | Trio™ Licensed and License-free Data Radios | 2023-12-12T00:00:00.000Z | 2024-04-09T00:00:00.000Z |
| sevd-2023-318-03 | Galaxy VS and Galaxy VL | 2023-11-14T08:28:19.000Z | 2024-04-09T00:00:00.000Z |
| sevd-2024-072-01 | Easergy T200 Multiple Vulnerabilities | 2024-03-12T07:02:04.000Z | 2024-03-12T07:02:04.000Z |
| sevd-2024-072-02 | EcoStruxure Power Design - Ecodial | 2024-03-12T05:00:00.000Z | 2024-03-12T05:00:00.000Z |
| sevd-2024-044-03 | EcoStruxure IT Gateway | 2024-02-13T12:21:44.000Z | 2024-02-13T12:21:44.000Z |
| sevd-2024-044-02 | Harmony Relay NFC | 2024-02-13T04:05:07.000Z | 2024-02-13T04:05:07.000Z |
| sevd-2024-009-02 | Easergy Studio | 2024-01-09T14:51:40.000Z | 2024-01-09T14:51:40.000Z |
| sevd-2023-101-01 | CODESYS Runtime Vulnerabilities | 2023-04-11T13:31:49.000Z | 2024-01-09T13:31:00.000Z |
| sevd-2023-101-03 | EcoStruxure™ Control Expert | 2023-04-11T10:14:15.000Z | 2024-01-09T10:14:00.000Z |
| sevd-2019-225-01 | Harmony (formerly known as Magelis) HMI Panels | 2019-08-13T09:59:02.000Z | 2024-01-09T09:59:02.000Z |
| sevd-2023-346-03 | Easy UPS Online Monitoring Software | 2023-12-12T00:00:00.000Z | 2023-12-12T00:00:00.000Z |
| sevd-2023-346-02 | ProLeiT Plant iT/Brewmaxx | 2023-12-12T00:00:00.000Z | 2023-12-12T00:00:00.000Z |
| sevd-2023-318-01 | PowerLogic ION8650, PowerLogic ION8800 | 2023-11-14T00:00:00.000Z | 2023-12-12T00:00:00.000Z |
| sevd-2023-318-02 | EcoStruxure Power Monitoring Expert and EcoStruxure™ Power Operation with Advanced Reporting and Dashboards Module | 2023-11-14T00:00:00.000Z | 2023-11-14T00:00:00.000Z |
| sevd-2023-283-02 | EcoStruxure Power Monitoring Expert and EcoStruxure™ Power | 2023-10-10T12:17:45.000Z | 2023-10-10T12:17:45.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-486936 | SSA-486936: Authentication Vulnerability in SIMATIC ET 200SP Communication Processors | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-373591 | SSA-373591: Buffer Overflow Vulnerability in RUGGEDCOM ROS Devices | 2021-07-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-367714 | SSA-367714: Improper Integrity Check of Firmware Updates in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2025-05-23T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-318832 | SSA-318832: SQL Injection Vulnerability in SINEC NMS | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-279823 | SSA-279823: Cross-Site Scripting Vulnerability in SIMATIC S7-1200 CPU V2/V3 Before V3.0.2 | 2012-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-240718 | SSA-240718: Insecure Storage of HTTPS CA Certificate in SIMATIC S7-1200 CPU V2 | 2012-09-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-186293 | SSA-186293: XML External Entity (XXE) Injection Vulnerability in SIMOTION SCOUT, SIMOTION SCOUT TIA and SINAMICS STARTER | 2025-08-12T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-083019 | SSA-083019: Multiple Vulnerabilities in RUGGEDCOM ROS Devices | 2025-07-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-062309 | SSA-062309: Information Disclosure Vulnerability in TeleControl Server Basic V3.1 | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-054046 | SSA-054046: Unauthenticated Information Disclosure in Web Server of SIMATIC S7-1500 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-039007 | SSA-039007: Heap-based Buffer Overflow Vulnerability in User Management Component (UMC) | 2024-09-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-916339 | SSA-916339: Information Disclosure Vulnerability in Apogee PXC and Talon TC Devices | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-712929 | SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products | 2022-06-14T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-691715 | SSA-691715: Vulnerability in OPC Foundation Local Discovery Server Affecting Siemens Products | 2023-04-11T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-640476 | SSA-640476: Denial of Service Vulnerability in Industrial Edge Management | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-563922 | SSA-563922: Local Privilege Escalation Vulnerability in SIMOTION Tools | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-534283 | SSA-534283: Insecure File Share Vulnerability in SIMATIC Virtualization as a Service (SIVaaS) | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-503939 | SSA-503939: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP | 2025-03-11T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-494539 | SSA-494539: Multiple Vulnerabilities in SINEC OS | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-331739 | SSA-331739: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting Siemens Products | 2025-08-12T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-707630 | SSA-707630: Multiple Vulnerabilities in SIMATIC RTLS Locating Manager Before V3.3 | 2025-08-12T00:00:00Z | 2025-08-26T00:00:00Z |
| ssa-395458 | SSA-395458: Account Hijacking Vulnerability in Mendix SAML Module | 2025-08-14T00:00:00Z | 2025-08-14T00:00:00Z |
| ssa-028723 | SSA-028723: Multiple OpenSSL Vulnerabilities in BFCClient Before V2.17 | 2025-08-12T00:00:00Z | 2025-08-13T00:00:00Z |
| ssa-994087 | SSA-994087: Multiple SQLite Vulnerabilities in RUGGEDCOM CROSSBOW Station Access Controller Before V5.7 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-914892 | SSA-914892: Race Condition Vulnerability in Basic Authentication Implementation of Mendix Runtime | 2024-11-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-908185 | SSA-908185: Mirror Port Isolation Vulnerability in RUGGEDCOM ROS Devices | 2023-08-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-894058 | SSA-894058: Improper Bandwidth Limitation of Network Packets Over Local USB Port Vulnerability in SIPROTEC 5 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-856721 | SSA-856721: Vulnerability in RUGGEDCOM Discovery Protocol (RCDP) of Industrial Communication Devices | 2017-09-28T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-840800 | SSA-840800: Code Injection Vulnerability in RUGGEDCOM ROS | 2022-07-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-787941 | SSA-787941: Denial of Service Vulnerability in RUGGEDCOM ROS devices | 2022-11-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20985-1 | Security update for expat | 2026-03-30T15:01:10Z | 2026-03-30T15:01:10Z |
| suse-su-2026:20963-1 | Security update for expat | 2026-03-30T15:01:10Z | 2026-03-30T15:01:10Z |
| suse-su-2026:20984-1 | Security update for gnutls | 2026-03-30T14:36:26Z | 2026-03-30T14:36:26Z |
| suse-su-2026:20968-1 | Security update for gnutls | 2026-03-30T14:36:26Z | 2026-03-30T14:36:26Z |
| suse-su-2026:20962-1 | Security update for gnutls | 2026-03-30T14:36:26Z | 2026-03-30T14:36:26Z |
| suse-su-2026:20983-1 | Security update for postgresql16 | 2026-03-30T14:26:12Z | 2026-03-30T14:26:12Z |
| suse-su-2026:1149-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T13:44:05Z | 2026-03-30T13:44:05Z |
| suse-su-2026:1148-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T11:21:20Z | 2026-03-30T11:21:20Z |
| suse-su-2026:1146-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:17:48Z | 2026-03-30T09:17:48Z |
| suse-su-2026:1142-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:16:26Z | 2026-03-30T09:16:26Z |
| suse-su-2026:1141-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:16:08Z | 2026-03-30T09:16:08Z |
| suse-su-2026:1140-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:15:49Z | 2026-03-30T09:15:49Z |
| suse-su-2026:1139-1 | Security update for webkit2gtk3 | 2026-03-30T09:13:58Z | 2026-03-30T09:13:58Z |
| suse-su-2026:20982-1 | Security update for tomcat10 | 2026-03-30T08:17:19Z | 2026-03-30T08:17:19Z |
| suse-su-2026:1137-1 | Security update for expat | 2026-03-28T02:34:02Z | 2026-03-28T02:34:02Z |
| suse-su-2026:1136-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T18:04:04Z | 2026-03-27T18:04:04Z |
| suse-su-2026:20978-1 | Security update for MozillaFirefox | 2026-03-27T17:19:44Z | 2026-03-27T17:19:44Z |
| suse-su-2026:1132-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T16:04:11Z | 2026-03-27T16:04:11Z |
| suse-su-2026:1131-1 | Security update for the Linux Kernel | 2026-03-27T16:02:21Z | 2026-03-27T16:02:21Z |
| suse-su-2026:1130-1 | Security update for the Linux Kernel | 2026-03-27T15:47:44Z | 2026-03-27T15:47:44Z |
| suse-su-2026:1129-1 | Security update for freerdp | 2026-03-27T15:05:09Z | 2026-03-27T15:05:09Z |
| suse-su-2026:1127-1 | Security update for MozillaFirefox | 2026-03-27T14:43:04Z | 2026-03-27T14:43:04Z |
| suse-su-2026:1126-1 | Security update for MozillaFirefox | 2026-03-27T14:42:09Z | 2026-03-27T14:42:09Z |
| suse-su-2026:1124-1 | Security update for LibVNCServer | 2026-03-27T14:22:08Z | 2026-03-27T14:22:08Z |
| suse-su-2026:1125-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T14:04:13Z | 2026-03-27T14:04:13Z |
| suse-su-2026:1118-1 | Security update for docker-stable | 2026-03-27T12:26:18Z | 2026-03-27T12:26:18Z |
| suse-su-2026:1117-1 | Security update for python311 | 2026-03-27T11:34:35Z | 2026-03-27T11:34:35Z |
| suse-su-2026:20976-1 | Security update for docker-compose | 2026-03-27T10:09:30Z | 2026-03-27T10:09:30Z |
| suse-su-2026:20949-1 | Security update for docker-compose | 2026-03-27T10:09:30Z | 2026-03-27T10:09:30Z |
| suse-su-2026:20950-1 | Security update for nghttp2 | 2026-03-27T09:43:31Z | 2026-03-27T09:43:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:4463 | Moderate: python3.12 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:03:59Z |
| alsa-2026:4443 | Important: .NET 9.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:01:07Z |
| alsa-2026:4442 | Moderate: vim security update | 2026-03-12T00:00:00Z | 2026-03-12T14:47:41Z |
| alsa-2026:4174 | Important: opentelemetry-collector security update | 2026-03-10T00:00:00Z | 2026-03-11T17:46:34Z |
| alsa-2026:4235 | Moderate: nginx:1.26 security update | 2026-03-10T00:00:00Z | 2026-03-11T11:13:12Z |
| alsa-2026:3966 | Moderate: kernel security update | 2026-03-09T00:00:00Z | 2026-03-11T10:10:37Z |
| alsa-2026:3730 | Important: postgresql security update | 2026-03-04T00:00:00Z | 2026-03-11T10:01:08Z |
| alsa-2026:3752 | Important: osbuild-composer security update | 2026-03-04T00:00:00Z | 2026-03-11T09:57:01Z |
| alsa-2026:3898 | Important: osbuild-composer security update | 2026-03-05T00:00:00Z | 2026-03-11T09:54:32Z |
| alsa-2026:4024 | Important: postgresql:13 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:52:09Z |
| alsa-2026:4059 | Important: postgresql:15 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:49:31Z |
| alsa-2026:4063 | Important: postgresql:16 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:46:43Z |
| alsa-2026:4162 | Moderate: mysql8.4 security update | 2026-03-10T00:00:00Z | 2026-03-11T09:43:31Z |
| alsa-2026:3939 | Moderate: nfs-utils security update | 2026-03-05T00:00:00Z | 2026-03-11T09:35:33Z |
| alsa-2026:4164 | Important: git-lfs security update | 2026-03-10T00:00:00Z | 2026-03-11T09:33:00Z |
| alsa-2026:4064 | Important: postgresql:12 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:29:57Z |
| alsa-2026:3040 | Important: grafana-pcp security update | 2026-02-23T00:00:00Z | 2026-03-10T20:11:50Z |
| alsa-2026:4165 | Moderate: python3.12 security update | 2026-03-10T00:00:00Z | 2026-03-10T20:09:00Z |
| alsa-2026:4173 | Important: gimp security update | 2026-03-10T00:00:00Z | 2026-03-10T19:59:39Z |
| alsa-2026:4110 | Important: postgresql:16 security update | 2026-03-09T00:00:00Z | 2026-03-10T19:55:53Z |
| alsa-2026:3896 | Important: postgresql:15 security update | 2026-03-05T00:00:00Z | 2026-03-10T19:52:06Z |
| alsa-2026:3753 | Important: osbuild-composer security update | 2026-03-04T00:00:00Z | 2026-03-10T19:47:08Z |
| alsa-2026:4146 | Important: python-pyasn1 security update | 2026-03-10T00:00:00Z | 2026-03-10T08:51:50Z |
| alsa-2026:3964 | Moderate: kernel-rt security update | 2026-03-09T00:00:00Z | 2026-03-10T02:07:14Z |
| alsa-2026:3963 | Moderate: kernel security update | 2026-03-09T00:00:00Z | 2026-03-10T02:04:41Z |
| alsa-2026:3938 | Moderate: nfs-utils security update | 2026-03-05T00:00:00Z | 2026-03-10T01:58:47Z |
| alsa-2026:3967 | Important: libvpx security update | 2026-03-09T00:00:00Z | 2026-03-10T01:53:59Z |
| alsa-2026:3887 | Important: postgresql16 security update | 2026-03-05T00:00:00Z | 2026-03-06T13:21:51Z |
| alsa-2026:3864 | Important: delve security update | 2026-03-05T00:00:00Z | 2026-03-06T13:19:09Z |
| alsa-2026:3928 | Important: git-lfs security update | 2026-03-05T00:00:00Z | 2026-03-06T13:16:21Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-73 | Heap-use-after-free in pdfi_cspace_free_callback | 2022-01-22T00:00:41.413569Z | 2026-03-18T14:24:03.137574Z |
| osv-2022-524 | Heap-buffer-overflow in Ins_JROF | 2022-07-01T00:01:43.353257Z | 2026-03-18T14:22:41.236746Z |
| osv-2026-417 | Segv on unknown address in arrow::Array::IsNull | 2026-03-18T00:18:35.139866Z | 2026-03-18T00:18:35.140154Z |
| osv-2023-1307 | UNKNOWN READ in init_struct_ops_maps | 2023-12-15T00:12:51.528155Z | 2026-03-17T14:24:53.158428Z |
| osv-2023-1267 | Heap-buffer-overflow in dwg_free_object | 2023-12-08T00:11:02.971903Z | 2026-03-16T14:18:18.473266Z |
| osv-2026-350 | UNKNOWN READ in bfd_getl32 | 2026-03-04T00:14:56.651284Z | 2026-03-14T18:43:19.427139Z |
| osv-2022-1235 | Heap-buffer-overflow in _rrparse | 2022-12-04T13:00:30.303410Z | 2026-03-13T14:16:08.108628Z |
| osv-2024-914 | UNKNOWN READ in boost::re_detail_500::basic_regex_formatter<std::__1::ostream_iterator<char, cha | 2024-08-16T00:08:20.277708Z | 2026-03-11T14:30:35.738187Z |
| osv-2024-398 | Use-of-uninitialized-value in wabt::BinaryReaderObjdump::PrintInitExpr | 2024-05-01T00:11:38.602555Z | 2026-03-11T14:28:35.396657Z |
| osv-2024-112 | Stack-overflow in boost::read_graphviz_detail::parser::parse_subgraph | 2024-02-16T00:05:47.896843Z | 2026-03-11T14:26:22.626694Z |
| osv-2023-346 | UNKNOWN WRITE in void std::__1::allocator_traits<std::__1::allocator<wabt::interp::HandlerDesc> > | 2023-04-27T14:02:25.286668Z | 2026-03-11T14:24:45.211720Z |
| osv-2022-916 | Container-overflow in wabt::interp::BinaryReaderInterp::BeginFunctionBody | 2022-09-20T00:00:42.122902Z | 2026-03-11T14:23:47.282795Z |
| osv-2022-1263 | Null-dereference READ | 2022-12-20T13:01:53.219707Z | 2026-03-11T14:20:54.166339Z |
| osv-2026-371 | Heap-buffer-overflow in tinyobj::tryParseDouble | 2026-03-09T00:09:41.689616Z | 2026-03-09T00:09:41.689926Z |
| osv-2024-838 | Bad-cast to RDKit::AtomRDKit::ROMol::initFromOther | 2024-08-16T00:03:32.029853Z | 2026-03-07T14:34:10.603763Z |
| osv-2026-359 | Segv on unknown address in gpsd_vlog | 2026-03-07T00:03:40.062221Z | 2026-03-07T00:03:40.062505Z |
| osv-2025-62 | UNKNOWN READ in RDKit::Dict::reset | 2025-01-27T00:01:51.692636Z | 2026-03-06T14:31:24.229549Z |
| osv-2025-266 | Heap-buffer-overflow in lj_buf_ruleb128 | 2025-04-08T00:17:06.279554Z | 2026-03-05T14:36:27.176471Z |
| osv-2022-94 | Heap-buffer-overflow in cli_strlcat | 2022-01-27T00:02:12.465969Z | 2026-03-05T14:29:46.831320Z |
| osv-2022-636 | UNKNOWN READ in fp_cmp_mag | 2022-07-27T00:00:35.300337Z | 2026-03-05T14:28:12.890689Z |
| osv-2022-1068 | UNKNOWN READ in fp_cmp_mag | 2022-10-21T00:00:11.246872Z | 2026-03-05T14:25:24.236211Z |
| osv-2024-698 | Heap-use-after-free in xmlCharEncCloseFunc | 2024-07-31T00:12:19.254629Z | 2026-03-04T14:22:14.763970Z |
| osv-2021-777 | Heap-use-after-free in xmlAddNextSibling | 2021-05-20T00:00:30.166614Z | 2026-03-04T14:12:36.851074Z |
| osv-2026-338 | Use-of-uninitialized-value in pjsip_auth_clt_init_req | 2026-03-03T00:09:55.520965Z | 2026-03-03T00:09:55.521245Z |
| osv-2024-340 | Heap-buffer-overflow in Exiv2::AsfVideo::GUIDTag::GUIDTag | 2024-04-30T00:01:53.406015Z | 2026-03-01T14:15:15.992512Z |
| osv-2025-253 | Security exception in org.apache.lucene.analysis.ckb.SoraniNormalizer.normalize | 2025-04-03T00:17:24.000398Z | 2026-02-26T15:05:21.477837Z |
| osv-2022-867 | Heap-buffer-overflow in get_utf_8_string | 2022-09-09T00:01:54.157712Z | 2026-02-26T15:03:06.284832Z |
| osv-2024-1254 | Security exception in org.apache.lucene.util.ArrayUtil.growExact | 2024-11-01T00:07:39.301298Z | 2026-02-26T14:30:06.734190Z |
| osv-2022-763 | Heap-buffer-overflow in sqlite3VdbeExec | 2022-08-21T00:00:23.656015Z | 2026-02-26T14:12:24.701998Z |
| osv-2026-311 | UNKNOWN READ in strncasecmp | 2026-02-26T00:16:50.091819Z | 2026-02-26T00:16:50.092121Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2023-0098 | `if-cfg` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0097 | `lazystatic` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2026-0040 | `tracing-ethers` was removed from crates.io due to malicious code | 2026-03-14T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0039 | `chrono_anchor` was removed from crates.io due to malicious code | 2026-03-10T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0036 | `time-sync` was removed from crates.io due to malicious code | 2026-03-04T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0032 | `dnp3times` was removed from crates.io due to malicious code | 2026-03-04T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0031 | `time_calibrators` was removed from crates.io due to malicious code | 2026-03-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0030 | `time_calibrator` was removed from crates.io due to malicious code | 2026-03-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0028 | `tracing_checks` was removed from crates.io for transitively including malicious code | 2026-02-26T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0027 | `tracings` was removed from crates.io for malicious code | 2026-02-26T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0019 | `tracing-check` was removed from crates.io for malicious code | 2026-02-24T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0018 | `rpc-check` was removed from crates.io for malicious code | 2026-02-24T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0017 | `clob-sdk` was removed from crates.io for malicious code | 2026-02-20T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0016 | `polymarkets-rs-clob-client` was removed from crates.io for malicious code | 2026-02-20T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0015 | `polymarkets-client-sdk` was removed from crates.io for malicious code | 2026-02-19T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0014 | `rpc-check` was removed from crates.io for malicious code | 2026-02-19T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0011 | `polymarket-client-sdks` was removed from crates.io for malicious code | 2026-02-13T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0010 | `polymarket-clients-sdk` was removed from crates.io for malicious code | 2026-02-06T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0152 | `finch_cli_rust` was removed from crates.io for malicious code | 2025-12-09T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0151 | `sha-rst` was removed from crates.io for malicious code | 2025-12-09T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0150 | `finch-rst` was removed from crates.io for malicious code | 2025-12-09T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0148 | `finch-rust` was removed from crates.io for malicious code | 2025-12-05T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0147 | `evm-units` was removed from crates.io for malicious code | 2025-12-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0146 | `sha-rust` was removed from crates.io for malicious code | 2025-12-05T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0145 | `uniswap-utils` was removed from crates.io for malicious code | 2025-12-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2022-0042 | malicious crate `rustdecimal` | 2022-05-10T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0041 | Decompressing invalid data can leak information from uninitialized memory or reused output buffer | 2026-03-17T12:00:00Z | 2026-03-17T16:08:45Z |
| rustsec-2026-0037 | Denial of service in Quinn endpoints | 2026-03-09T12:00:00Z | 2026-03-14T07:21:57Z |
| rustsec-2023-0083 | blurhash: panic on parsing crafted blurhash inputs | 2023-09-19T12:00:00Z | 2026-03-11T10:51:38Z |
| rustsec-2023-0082 | phonenumber: panic on parsing crafted RF3966 phonenumber inputs | 2023-09-19T12:00:00Z | 2026-03-11T10:37:17Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2026-3857 | Cross-Site Request Forgery (CSRF) in GitLab | 2026-03-27T12:15:15.885Z | 2026-03-31T09:14:23.567Z |
| bit-gitlab-2026-2370 | Improper Handling of Parameters in GitLab | 2026-03-31T09:12:36.844Z | 2026-03-31T09:14:23.567Z |
| bit-nats-2026-33249 | NATS: Message tracing can be redirected to arbitrary subject | 2026-03-30T11:45:25.356Z | 2026-03-30T12:13:12.971Z |
| bit-nats-2026-33248 | NATS has mTLS verify_and_map authentication bypass via incorrect Subject DN matching | 2026-03-27T17:45:26.680Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33247 | NATS credentials are exposed in monitoring port via command-line argv | 2026-03-27T17:45:24.871Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33246 | NATS: Leafnode connections allow spoofing of Nats-Request-Info identity headers | 2026-03-27T17:45:23.082Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33223 | NATS Server: Incomplete Stripping of Nats-Request-Info Header Allows Identity Spoofing | 2026-03-27T17:45:21.527Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33222 | NATS JetStream has an authorization bypass through its Management API | 2026-03-27T17:45:19.827Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33219 | NATS is vulnerable to pre-auth DoS through WebSockets client service | 2026-03-27T17:45:18.190Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33218 | NATS has pre-auth server panic via leafnode handling | 2026-03-27T17:45:16.655Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33217 | NATS allows MQTT clients to bypass ACL checks | 2026-03-27T17:45:15.042Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33216 | NATS has MQTT plaintext password disclosure | 2026-03-27T17:45:13.444Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-29785 | NATS Server panic via malicious compression on leafnode port | 2026-03-27T17:45:10.061Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33215 | NATS is vulnerable to MQTT hijacking via Client ID | 2026-03-27T07:08:53.339Z | 2026-03-27T12:16:52.978Z |
| bit-nats-2026-27889 | NATS: Pre-auth remote server crash via WebSocket frame length overflow in wsRead | 2026-03-27T11:47:22.988Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-4363 | Incorrect Authorization in GitLab | 2026-03-27T12:15:19.935Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-3988 | Inefficient Algorithmic Complexity in GitLab | 2026-03-27T12:15:17.809Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2995 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in GitLab | 2026-03-27T12:15:11.976Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2973 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-03-27T12:15:10.065Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2745 | Authentication Bypass Using an Alternate Path or Channel in GitLab | 2026-03-27T12:15:06.072Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2726 | Incorrect Authorization in GitLab | 2026-03-27T12:15:04.107Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-1724 | Missing Authentication for Critical Function in GitLab | 2026-03-27T12:14:54.117Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-14595 | Missing Authorization in GitLab | 2026-03-27T12:11:45.074Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-13436 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-27T12:11:11.989Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-13078 | Improper Validation of Specified Quantity in Input in GitLab | 2026-03-27T12:11:08.026Z | 2026-03-27T12:16:52.978Z |
| bit-etcd-2026-33413 | etcd: Authorization bypasses in multiple APIs | 2026-03-27T11:39:27.916Z | 2026-03-27T12:16:52.978Z |
| bit-etcd-2026-33343 | etcd: Nested etcd transactions bypass RBAC authorization checks | 2026-03-27T11:39:26.076Z | 2026-03-27T12:16:52.978Z |
| bit-parse-2026-33627 | Parse Server: Auth data exposed via /users/me endpoint | 2026-03-27T07:14:47.660Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33624 | Parse Server: MFA recovery code single-use bypass via concurrent requests | 2026-03-27T07:14:44.950Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33539 | Parse Server: SQL injection via aggregate and distinct field names in PostgreSQL adapter | 2026-03-27T07:14:42.086Z | 2026-03-27T07:40:55.991Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-jr35772 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:17:37.864227Z | 2026-03-26T15:01:29Z |
| cleanstart-2026-ow78143 | Security fixes for CVE-2025-68156, CVE-2026-24051, CVE-2026-26958, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 2.18.3-r0, 2.18.3-r1 | 2026-04-01T09:14:00.541150Z | 2026-03-26T14:38:42Z |
| cleanstart-2026-eq25508 | Security fixes for CVE-2025-11082, CVE-2025-11083 applied in versions: 2.46.0-r0 | 2026-04-01T09:16:21.124779Z | 2026-03-26T13:10:59Z |
| cleanstart-2026-em10970 | Security fixes for CVE-2017-9233, CVE-2019-15903, CVE-2021-45960, CVE-2021-46143, CVE-2022-22822, CVE-2022-22823, CVE-2022-22824, CVE-2022-22825, CVE-2022-22826, CVE-2022-22827, CVE-2022-23852, CVE-2022-23990, CVE-2022-25235, CVE-2022-25236, CVE-2022-25313, CVE-2022-25314, CVE-2022-25315, CVE-2022-40674, CVE-2022-43680, CVE-2023-52425, CVE-2023-52426, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-50602, CVE-2026-24515, CVE-2026-25210, CVE-2026-32767 applied in versions: 2.2.0-r1, 2.2.7-r0, 2.2.7-r1, 2.4.3-r0, 2.4.4-r0, 2.4.5-r0, 2.4.9-r0, 2.5.0-r0, 2.6.0-r0, 2.6.2-r0, 2.6.3-r0, 2.6.4-r0, 2.7.2-r0, 2.7.5-r0 | 2026-04-01T09:16:01.861201Z | 2026-03-26T13:10:59Z |
| cleanstart-2026-ma32024 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, CVE-2026-33186, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.2-r1, 3.3.3-r0, 3.3.4-r0 | 2026-04-01T09:19:21.169476Z | 2026-03-26T07:01:17Z |
| cleanstart-2026-gi40937 | Security fixes for CVE-2023-5870, CVE-2024-7348, CVE-2025-8713, CVE-2025-8714, CVE-2025-8715 applied in versions: 16.1-r0, 16.2-r0, 16.4-r0, 17.6-r0 | 2026-04-01T09:18:12.444694Z | 2026-03-26T07:01:17Z |
| cleanstart-2026-mx45462 | Security fixes for CVE-2025-61729 applied in versions: 1.1.0-r0 | 2026-04-01T09:18:16.445023Z | 2026-03-25T14:24:33Z |
| cleanstart-2026-ae87452 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.20.12-r0, 1.20.12-r1, 1.20.12-r2 | 2026-04-01T09:19:15.219275Z | 2026-03-25T14:22:43Z |
| cleanstart-2026-ha09227 | Security fixes for CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.18.0-r0, 0.18.0-r1 | 2026-04-01T09:19:28.951475Z | 2026-03-25T14:21:54Z |
| cleanstart-2026-gm63718 | Security fixes for CVE-2025-15558, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-25934, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-q9hv-hpm4-hj6x applied in versions: 1.39.0-r0, 1.39.0-r1, 1.39.0-r2, 1.39.0-r3 | 2026-04-01T09:19:09.281060Z | 2026-03-25T14:21:09Z |
| cleanstart-2026-ls12576 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 1.16.2-r2, 1.17.2-r0, 1.17.2-r1, 1.18.0-r0 | 2026-04-01T09:19:50.661957Z | 2026-03-25T14:09:04Z |
| cleanstart-2026-pn56882 | Security fixes for CVE-2026-24051 applied in versions: 1.65.0-r0 | 2026-04-01T09:19:27.916186Z | 2026-03-25T14:07:29Z |
| cleanstart-2026-jg61689 | Security fixes for CVE-2025-15558, CVE-2026-33186, ghsa-p436-gjf2-799p applied in versions: 1.29.0-r0, 1.29.0-r1 | 2026-04-01T09:19:48.393428Z | 2026-03-25T13:59:35Z |
| cleanstart-2026-ic68874 | Security fixes for CVE-2025-15558, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.13.4-r0, 2.13.4-r1 | 2026-04-01T09:20:18.599218Z | 2026-03-25T11:32:52Z |
| cleanstart-2026-gm18965 | Security fixes for CVE-2025-15558, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.14.2-r2 | 2026-04-01T09:20:25.238160Z | 2026-03-25T11:27:12Z |
| cleanstart-2026-at91215 | Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2x5j-vhc8-9cwm, ghsa-6m8w-jc87-6cr7, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-vvgc-356p-c3xw applied in versions: 1.14.4-r1, 1.14.4-r2, 1.15.3-r1, 1.15.3-r2 | 2026-04-01T09:20:36.013002Z | 2026-03-25T11:15:10Z |
| cleanstart-2026-gk29346 | Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2025-66564, CVE-2026-1229, CVE-2026-22039, CVE-2026-22703, CVE-2026-22772, CVE-2026-23831, CVE-2026-23881, CVE-2026-24051, CVE-2026-24117, CVE-2026-24137, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-29wx-vh33-7x7r, ghsa-2x5j-vhc8-9cwm, ghsa-459x-q9hg-4gpq, ghsa-4qg8-fj49-pxjh, ghsa-4vq8-7jfc-9cvp, ghsa-6m8w-jc87-6cr7, ghsa-88jx-383q-w4qc, ghsa-95pr-fxf5-86gv, ghsa-c5q2-7r4c-mv6g, ghsa-c6gw-w398-hv78, ghsa-c77r-fh37-x2px, ghsa-f83f-xpx7-ffpw, ghsa-fv92-fjc5-jj9h, ghsa-jrr2-x33p-6hvc, ghsa-mh63-6h87-95cp, ghsa-mqqf-5wvp-8fh8, ghsa-p77j-4mvh-x3m3, ghsa-qjvc-p88j-j9rm, ghsa-r5p3-955p-5ggq, ghsa-v23v-6jw2-98fq, ghsa-v6v8-xj6m-xwqh, ghsa-xw73-rw38-6vjc applied in versions: 1.4.2-r2, 1.4.2-r4, 1.4.2-r6, 1.4.2-r7 | 2026-04-01T09:22:17.389111Z | 2026-03-25T11:02:44Z |
| cleanstart-2026-ce02533 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2025-62820, CVE-2026-30836, CVE-2026-33186, ghsa-p77j-4mvh-x3m3, ghsa-q4r8-xm5f-56gw applied in versions: 0.10.1-r0, 0.9.10-r0, 0.9.9-r0, 0.9.9-r1 | 2026-04-01T09:21:33.459909Z | 2026-03-25T10:51:25Z |
| cleanstart-2026-pw57640 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, CVE-2026-4427, ghsa-37cx-329c-33x3, ghsa-6g7g-w4f8-9c9x, ghsa-9h8m-3fm2-qjrq, ghsa-9mj6-hxhv-w67j, ghsa-cfpf-hrx2-8rv6, ghsa-f6x5-jh6r-wrfv, ghsa-fw7p-63qq-7hpr, ghsa-j5w8-q4qc-rx2x, ghsa-jqcq-xjh3-6g23, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x, ghsa-x6gf-mpr2-68h6 applied in versions: 1.12.1-r0, 1.12.1-r1, 1.12.1-r2 | 2026-04-01T09:22:37.368205Z | 2026-03-25T05:32:13Z |
| cleanstart-2026-lk63891 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.29.0-r0, 1.29.1-r0 | 2026-04-01T09:22:08.586608Z | 2026-03-25T05:12:36Z |
| cleanstart-2026-ej96468 | Security fixes for ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0, 1.28.4-r1, 1.28.5-r0 | 2026-04-01T09:22:08.656529Z | 2026-03-25T05:09:00Z |
| cleanstart-2026-jm60128 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0, 1.28.4-r1 | 2026-04-01T09:22:08.268986Z | 2026-03-25T05:05:50Z |
| cleanstart-2026-kw90815 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0, 1.27.6-r1, 1.27.8-r0 | 2026-04-01T09:22:32.438088Z | 2026-03-25T05:02:40Z |
| cleanstart-2026-ev91316 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0, 1.27.6-r1 | 2026-04-01T09:22:33.462978Z | 2026-03-25T04:58:46Z |
| cleanstart-2026-hh87643 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.26.8-r0, 1.26.8-r1 | 2026-04-01T09:22:32.645637Z | 2026-03-25T04:50:32Z |
| cleanstart-2026-zw86166 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-p77j-4mvh-x3m3 applied in versions: 0.8.10-r0, 0.8.4-r0 | 2026-04-01T09:22:53.735679Z | 2026-03-25T04:41:41Z |
| cleanstart-2026-ol17158 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-m6hq-p25p-ffr2, ghsa-p77j-4mvh-x3m3, ghsa-pwhc-rpq9-4c8w applied in versions: 0.7.0-r2, 0.7.0-r3, 0.7.0-r4 | 2026-04-01T09:23:46.993269Z | 2026-03-25T04:38:39Z |
| cleanstart-2026-pv98664 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-m6hq-p25p-ffr2, ghsa-p77j-4mvh-x3m3, ghsa-pwhc-rpq9-4c8w applied in versions: 0.6.4-r5, 0.6.4-r6, 0.7.0-r4 | 2026-04-01T09:23:47.321714Z | 2026-03-25T04:34:22Z |
| cleanstart-2026-ot07577 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2026-1229 applied in versions: 3.19.0-r0, 4.0.1-r0, 4.1.0-r0 | 2026-04-01T09:24:34.526263Z | 2026-03-24T13:01:13Z |
| cleanstart-2026-mf20926 | Security fixes for CVE-2021-38561, CVE-2022-27191, CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-58190, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 3.1.2-r3, 3.1.2-r4, 3.7.0-r0, 3.7.0-r2 | 2026-04-01T09:24:07.163057Z | 2026-03-24T13:01:13Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2023-ale-001 | Vulnérabilité dans Fortinet FortiOS | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-013 | [MàJ] Vulnérabilité dans Citrix ADC et Gateway | 2022-12-13T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-010 | Multiples vulnérabilités dans GLPI | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-009 | [MaJ] Vulnérabilité dans Zimbra Collaboration | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-008 | [MaJ] Multiples vulnérabilités dans Microsoft Exchange | 2022-09-30T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-007 | Multiples vulnérabilités dans Microsoft Windows | 2022-09-16T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2023-ALE-015 | [MàJ] Campagne d'exploitation d'une vulnérabilité affectant VMware ESXi | 2023-02-03T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2023-ALE-001 | Vulnérabilité dans Fortinet FortiOS | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-013 | [MàJ] Vulnérabilité dans Citrix ADC et Gateway | 2022-12-13T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-010 | Multiples vulnérabilités dans GLPI | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-009 | [MaJ] Vulnérabilité dans Zimbra Collaboration | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-008 | [MaJ] Multiples vulnérabilités dans Microsoft Exchange | 2022-09-30T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-007 | Multiples vulnérabilités dans Microsoft Windows | 2022-09-16T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-012 | [MàJ] Vulnérabilité dans FortiOS SSL-VPN | 2022-12-13T00:00:00.000000 | 2022-12-20T00:00:00.000000 |
| CERTFR-2022-ALE-012 | [MàJ] Vulnérabilité dans FortiOS SSL-VPN | 2022-12-13T00:00:00.000000 | 2022-12-20T00:00:00.000000 |
| certfr-2022-ale-011 | Vulnérabilité dans les produits Fortinet | 2022-10-14T00:00:00.000000 | 2022-10-14T00:00:00.000000 |
| CERTFR-2022-ALE-011 | Vulnérabilité dans les produits Fortinet | 2022-10-14T00:00:00.000000 | 2022-10-14T00:00:00.000000 |
| certfr-2022-ale-006 | [MàJ] Vulnérabilité dans Atlassian Confluence | 2022-06-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| certfr-2022-ale-002 | Vulnérabilité dans VMware Spring Cloud Gateway | 2022-03-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| CERTFR-2022-ALE-006 | [MàJ] Vulnérabilité dans Atlassian Confluence | 2022-06-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| CERTFR-2022-ALE-002 | Vulnérabilité dans VMware Spring Cloud Gateway | 2022-03-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| certfr-2022-ale-005 | [MàJ] Vulnérabilité dans Microsoft Windows | 2022-05-31T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| certfr-2022-ale-004 | Vulnérabilité dans F5 BIG-IP | 2022-05-11T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| CERTFR-2022-ALE-005 | [MàJ] Vulnérabilité dans Microsoft Windows | 2022-05-31T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| CERTFR-2022-ALE-004 | Vulnérabilité dans F5 BIG-IP | 2022-05-11T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| certfr-2022-ale-003 | [MàJ] Vulnérabilité dans l'implémentation du protocole RPC par Microsoft | 2022-04-13T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2022-ale-001 | [MaJ] Vulnérabilité dans Microsoft Windows | 2022-01-12T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-022 | [MaJ] Vulnérabilité dans Apache Log4j | 2021-12-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-021 | Vulnérabilité dans Microsoft Exchange | 2021-11-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-019 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-09-08T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0337 | Multiples vulnérabilités dans les produits Citrix | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0336 | Multiples vulnérabilités dans les produits Qnap | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0335 | Vulnérabilité dans CPython | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0334 | Vulnérabilité dans les produits Microsoft | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0333 | Multiples vulnérabilités dans Traefik | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0332 | Vulnérabilité dans Oracle Identity Manager et Web Services Manager | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0331 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0330 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0329 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0328 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0327 | Multiples vulnérabilités dans les produits IBM | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0326 | Multiples vulnérabilités dans les produits VMware | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0325 | Multiples vulnérabilités dans les produits Elastic | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0324 | Multiples vulnérabilités dans Google Chrome | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0323 | Multiples vulnérabilités dans les produits Spring | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0322 | Multiples vulnérabilités dans les produits VMware | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0321 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0320 | Multiples vulnérabilités dans Roundcube | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0319 | Vulnérabilité dans les produits Mitel | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0318 | Multiples vulnérabilités dans Splunk Universal Forwarder | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0317 | Vulnérabilité dans Python | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0316 | Multiples vulnérabilités dans les produits VMware | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0315 | Multiples vulnérabilités dans les produits VMware | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0314 | Multiples vulnérabilités dans les produits Atlassian | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0313 | Vulnérabilité dans les produits Apple | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0312 | Multiples vulnérabilités dans GLPI | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0311 | Vulnérabilité dans Citrix XenServer | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0310 | Multiples vulnérabilités dans MongoDB | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0309 | Multiples vulnérabilités dans Suricata | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0308 | Multiples vulnérabilités dans Node.js | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-000005 | Multiple vulnerabilities in EATON UPS Companion | 2026-01-13T19:01+09:00 | 2026-01-13T19:01+09:00 |
| jvndb-2026-000003 | RICOH Streamline NX vulnerable to improper authorization | 2026-01-09T18:17+09:00 | 2026-01-09T18:17+09:00 |
| jvndb-2026-000004 | The installers for multiple PIONEER products may insecurely load Dynamic Link Libraries | 2026-01-08T13:47+09:00 | 2026-01-08T13:47+09:00 |
| jvndb-2026-000001 | Origin validation error vulnerability in Fujitsu Security Solution AuthConductor Client Basic V2 | 2026-01-07T14:19+09:00 | 2026-01-07T14:19+09:00 |
| jvndb-2026-001001 | Authentication bypass vulnerability in OpenBlocks series | 2026-01-07T10:46+09:00 | 2026-01-07T10:46+09:00 |
| jvndb-2025-019621 | EPSON WebConfig / Epson Web Control for SEIKO EPSON Projector Products do not restrict excessive authentication attempts | 2025-11-21T15:31+09:00 | 2025-12-24T10:54+09:00 |
| jvndb-2025-014967 | Multiple vulnerabilities in multiple Keyence products | 2025-10-03T11:19+09:00 | 2025-12-23T14:36+09:00 |
| jvndb-2025-000117 | SEIKO EPSON printer Web Config vulnerable to stack-based buffer overflow | 2025-12-16T15:31+09:00 | 2025-12-23T11:57+09:00 |
| jvndb-2025-022400 | Ruijie Networks AP180 Series vulnerable to OS command injection | 2025-12-19T12:33+09:00 | 2025-12-19T12:33+09:00 |
| jvndb-2025-000118 | GROWI vulnerable to cross-site request forgery | 2025-12-17T13:04+09:00 | 2025-12-17T13:04+09:00 |
| jvndb-2025-022062 | Multiple vulnerabilities in CHOCO TEI WATCHER mini | 2025-12-17T11:28+09:00 | 2025-12-17T11:28+09:00 |
| jvndb-2025-000115 | QND vulnerable to privilege escalation | 2025-12-11T14:33+09:00 | 2025-12-11T14:33+09:00 |
| jvndb-2025-000113 | Multiple vulnerabilities in GroupSession | 2025-12-08T17:48+09:00 | 2025-12-11T11:30+09:00 |
| jvndb-2025-000091 | Multiple I-O DATA NAS management applications register Windows services with unquoted file paths | 2025-10-22T15:04+09:00 | 2025-12-10T16:20+09:00 |
| jvndb-2021-000081 | Multiple vulnerabilities in Sharp NEC Display Solutions' public displays | 2021-09-17T15:13+09:00 | 2025-12-10T10:24+09:00 |
| jvndb-2025-021305 | Android App "Brother iPrint&Scan" improper use of an external cache directory | 2025-12-09T17:25+09:00 | 2025-12-09T17:25+09:00 |
| jvndb-2025-000114 | ELECOM Clone for Windows registers a Windows service with an unquoted file path | 2025-12-09T17:16+09:00 | 2025-12-09T17:16+09:00 |
| jvndb-2025-000116 | GS Yuasa FULLBACK Manager Pro registers Windows services with unquoted file paths | 2025-12-08T14:06+09:00 | 2025-12-08T14:06+09:00 |
| jvndb-2025-000094 | Multiple vulnerabilities in ABB Terra AC Wallbox | 2025-12-05T14:12+09:00 | 2025-12-05T14:12+09:00 |
| jvndb-2025-000112 | Installer of INZONE Hub may insecurely load Dynamic Link Libraries | 2025-11-28T13:36+09:00 | 2025-11-28T13:36+09:00 |
| jvndb-2025-000111 | SwitchBot Smart Video Doorbell vulnerable to active debug code | 2025-11-26T14:35+09:00 | 2025-11-26T14:35+09:00 |
| jvndb-2025-000110 | Multiple vulnerabilities in Security Point (Windows) of MaLion | 2025-11-25T17:17+09:00 | 2025-11-25T17:17+09:00 |
| jvndb-2025-000109 | Multiple vulnerabilities in SNC-CX600W | 2025-11-25T14:59+09:00 | 2025-11-25T14:59+09:00 |
| jvndb-2025-000108 | "FOD" App uses hard-coded cryptographic keys | 2025-11-25T14:15+09:00 | 2025-11-25T14:15+09:00 |
| jvndb-2025-000106 | Multiple vulnerabilities in LogStare Collector | 2025-11-21T16:27+09:00 | 2025-11-21T16:27+09:00 |
| jvndb-2025-000107 | Installer of RakurakuMusen Start EX for Windows may insecurely load Dynamic Link Libraries | 2025-11-19T16:22+09:00 | 2025-11-19T16:22+09:00 |
| jvndb-2025-000097 | "Dejira" App for iOS vulnerable to improper server certificate verification | 2025-11-17T14:09+09:00 | 2025-11-17T14:09+09:00 |
| jvndb-2025-000105 | NCP-HG100 vulnerable to OS command injection | 2025-11-14T15:26+09:00 | 2025-11-14T15:26+09:00 |
| jvndb-2025-000104 | Multiple vulnerabilities in GNU Libmicrohttpd | 2025-11-10T15:07+09:00 | 2025-11-10T15:07+09:00 |
| jvndb-2025-000103 | Use of password hash with insufficient computational effort vulnerability in BUFFALO Wi-Fi router "WSR-1800AX4 series" | 2025-11-07T15:39+09:00 | 2025-11-07T15:39+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-15411 | Google Chrome安全绕过漏洞(CNVD-2026-15411) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15410 | Google Chrome安全绕过漏洞(CNVD-2026-15410) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15409 | Google Chrome安全绕过漏洞(CNVD-2026-15409) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15408 | Google Chrome安全绕过漏洞(CNVD-2026-15408) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15407 | Google Chrome存在未明漏洞(CNVD-2026-15407) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15406 | Google Chrome堆缓冲区溢出漏洞(CNVD-2026-15406) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15405 | Google Chrome整数溢出漏洞(CNVD-2026-15405) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15404 | Google Chrome内存错误引用漏洞(CNVD-2026-15404) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15403 | Google Chrome堆缓冲区溢出漏洞(CNVD-2026-15403) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15402 | Google Chrome越界读取漏洞(CNVD-2026-15402) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15401 | Google Chrome越界读取漏洞(CNVD-2026-15401) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15400 | Google Chrome FedCM内存错误引用漏洞 | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15399 | Google Chrome安全绕过漏洞(CNVD-2026-15399) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15398 | Google Chrome安全绕过漏洞(CNVD-2026-15398) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15397 | Google Chrome安全绕过漏洞(CNVD-2026-15397) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15396 | Google Chrome安全绕过漏洞(CNVD-2026-15396) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15395 | Google Chrome资源管理错误漏洞(CNVD-2026-15395) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15394 | Faad2缓冲区溢出漏洞(CNVD-2026-15394) | 2023-08-17 | 2026-03-31 |
| cnvd-2026-15393 | Faad2缓冲区溢出漏洞 | 2023-08-17 | 2026-03-31 |
| cnvd-2026-15392 | Bento4拒绝服务漏洞(CNVD-2026-15392) | 2025-08-11 | 2026-03-31 |
| cnvd-2026-15391 | TinyFileManager跨站脚本漏洞 | 2025-06-06 | 2026-03-31 |
| cnvd-2026-15390 | Mozilla Firefox和Mozilla Thunderbird代码执行漏洞 | 2026-03-11 | 2026-03-31 |
| cnvd-2026-15389 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15389) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15388 | 多款Mozilla产品代码执行漏洞(CNVD-2026-15388) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15387 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15387) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15386 | 多款Mozilla产品代码执行漏洞(CNVD-2026-15386) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15385 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15385) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15384 | 多款Mozilla产品整数溢出漏洞(CNVD-2026-15384) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15383 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15383) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15381 | Huawei HarmonyOS cellular_data模块权限控制漏洞 | 2026-03-12 | 2026-03-30 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15785 | Уязвимость компонента imxfb ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15782 | Уязвимость компонента cpcap-charger ядра операционной системы Linux, позволяющая нарушите… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15781 | Уязвимость компонента davinci ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15780 | Уязвимость компонента net/netfilter/xt_nfacct.c ядра операционной системы Linux, позволяю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15779 | Уязвимость компонента net/mac80211/tdls.c ядра операционной системы Linux, позволяющая на… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15778 | Уязвимость компонента net/mlx5 ядра операционной системы Linux, позволяющая нарушителю вы… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15776 | Уязвимость компонента fs/f2fs/f2fs.h ядра операционной системы Linux, позволяющая нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15773 | Уязвимость компонента ice/ice_ddp.c ядра операционной системы Linux, позволяющая нарушите… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15772 | Уязвимость компонента netlink ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15771 | Уязвимость компонента drivers/regulator/core.c ядра операционной системы Linux, позволяющ… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15770 | Уязвимость компонента arm64/entry ядра операционной системы Linux, позволяющая нарушителю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15769 | Уязвимость компонента drivers/i2c/busses/i2c-qup.c ядра операционной системы Linux, позво… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15767 | Уязвимость ядра операционной системы Linux, связанная с чтением за границами буфера памят… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15766 | Уязвимость компонента venus ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15765 | Уязвимость компонента uvcvideo ядра операционной системы Linux, позволяющая нарушителю вы… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15764 | Уязвимость компонента mm/ptdump ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15763 | Уязвимость компонента hv_netvsc ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15762 | Уязвимость компонента net/sched ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15761 | Уязвимость компонента media ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15760 | Уязвимость компонента media/dvb-frontends/dib7000p.c ядра операционной системы Linux, поз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15759 | Уязвимость компонента lpfc/lpfc_scsi.c ядра операционной системы Linux, позволяющая наруш… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15758 | Уязвимость компонента mips/kernel/process.c ядра операционной системы Linux, позволяющая … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15757 | Уязвимость компонента jfs/jfs_dmap.c ядра операционной системы Linux, позволяющая нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15756 | Уязвимость компонента scsi/bfa/bfad_im.c ядра операционной системы Linux, позволяющая нар… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15755 | Уязвимость компонента scsi/libiscsi.c ядра операционной системы Linux, позволяющая наруши… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15753 | Уязвимость компонента sound/soc/soc-core.c ядра операционной системы Linux, позволяющая н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15752 | Уязвимость компонента fs/hfsplus/xattr.c ядра операционной системы Linux, позволяющая нар… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15751 | Уязвимость компонента fs/hfs/bnode.c ядра операционной системы Linux, позволяющая нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15750 | Уязвимость компонента nf_conntrack_netlink.c ядра операционной системы Linux, позволяющая… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15749 | Уязвимость компонента fs/nfsd/nfs4state.c ядра операционной системы Linux, позволяющая на… | 15.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202308-3129 | D-Link DAP-2622 DDP Set AG Profile Auth Username Stack-based Buffer Overflow Remote Code … | 2024-07-23T22:20:12.344000Z |
| var-202308-3114 | D-Link DAP-2622 DDP Reset Auth Password Stack-based Buffer Overflow Remote Code Execution… | 2024-07-23T22:20:12.516000Z |
| var-202308-3113 | D-Link DAP-2622 DDP Configuration Backup Server Address Stack-based Buffer Overflow Remot… | 2024-07-23T22:20:12.318000Z |
| var-202308-3105 | D-Link DAP-2622 DDP Reset Factory Auth Username Stack-based Buffer Overflow Remote Code E… | 2024-07-23T22:20:12.284000Z |
| var-202008-1238 | In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.… | 2024-07-23T22:19:51.232000Z |
| var-201302-0307 | Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on … | 2024-07-23T22:19:51.408000Z |
| var-201804-1162 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T22:19:50.233000Z |
| var-201912-0592 | An input validation issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:19:49.641000Z |
| var-201302-0224 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:19:19.153000Z |
| var-201711-0476 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T22:19:18.201000Z |
| var-202108-1141 | An access issue was addressed with improved access restrictions. This issue is fixed in m… | 2024-07-23T22:19:17.980000Z |
| var-200609-0314 | Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to… | 2024-07-23T22:19:17.031000Z |
| var-202005-0222 | ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related … | 2024-07-23T22:19:16.422000Z |
| var-202006-1653 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 a… | 2024-07-23T22:19:15.782000Z |
| var-201205-0312 | sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI… | 2024-07-23T22:18:38.885000Z |
| var-201903-0424 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:18:36.709000Z |
| var-201401-0254 | The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.… | 2024-07-23T22:18:17.213000Z |
| var-201806-1449 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T22:18:16.692000Z |
| var-202201-0405 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. vim/vim Exists in a… | 2024-07-23T22:17:38.807000Z |
| var-201711-0450 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T22:17:38.652000Z |
| var-200701-0510 | The Adobe PDF specification 1.3, as implemented by Apple Mac OS X Preview, allows remote … | 2024-07-23T22:17:06.694000Z |
| var-201904-1360 | A cookie management issue was addressed with improved checks. This issue affected version… | 2024-07-23T22:16:09.056000Z |
| var-201108-0236 | The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF de… | 2024-07-23T22:16:08.579000Z |
| var-200107-0173 | Cisco CBOS 2.3.0.053 sends output of the "sh nat" (aka "show nat") command to the termina… | 2024-07-23T22:16:08.756000Z |
| var-201206-0055 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:14:46.537000Z |
| var-201901-1586 | In Safari before 11.1.2, iTunes before 12.8 for Windows, iOS before 11.4.1, tvOS before 1… | 2024-07-23T22:14:43.295000Z |
| var-201903-0423 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:14:42.527000Z |
| var-201304-0373 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:14:42.081000Z |
| var-200701-0061 | Finder 10.4.6 on Apple Mac OS X 10.4.8 allows user-assisted remote attackers to cause a d… | 2024-07-23T22:14:37.008000Z |
| var-200502-0025 | The der_chop script in the openssl package in Trustix Secure Linux 1.5 through 2.1 and ot… | 2024-07-23T22:14:37.244000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2024-029 | Phoenix Contact: Unbounded growth of OpenSSL session cache in multiple FL MGUARD devices | 2024-06-11T06:00:00.000Z | 2024-06-11T06:00:00.000Z |
| vde-2024-019 | Phoenix Contact: Multiple vulnerabilities in the Firmware of CHARX SEC charge controllers | 2024-05-14T06:00:00.000Z | 2024-05-14T06:00:00.000Z |
| vde-2024-011 | PHOENIX CONTACT: Multiple vulnerabilities in CHARX SEC charge controllers | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| vde-2023-055 | Phoenix Contact: Automation Worx and classic line controllers prone to Incorrect Permission Assignment for Critical Resource | 2023-12-12T07:00:00.000Z | 2023-12-12T07:00:00.000Z |
| vde-2023-062 | Phoenix Contact: WIBU-SYSTEMS CodeMeter Runtime vulnerabilities in multiple products | 2023-11-21T08:15:00.000Z | 2023-11-21T08:15:00.000Z |
| vde-2023-030 | Phoenix Contact: Multiple products affected by WIBU Codemeter Vulnerability (Update A) | 2023-09-19T06:50:00.000Z | 2023-11-13T11:00:00.000Z |
| vde-2023-004 | Phoenix Contact: Directory Traversal Vulnerability in ENERGY AXC PU Web service | 2023-04-11T08:00:00.000Z | 2023-04-11T08:00:00.000Z |
| vde-2022-018 | PHOENIX CONTACT: Multiple vulnerabilities in RAD-ISM-900-EN-BD devices | 2022-05-11T14:20:00.000Z | 2022-05-11T14:20:00.000Z |
| vde-2021-046 | PHOENIX CONTACT: XSS and memory-leak in FL MGUARD 1102/1105 | 2021-11-10T07:23:00.000Z | 2021-11-10T07:23:00.000Z |
| vde-2020-049 | Phoenix Contact: Multiple vulnerabilities in PLCnext Control devices < 2021.0 LTS | 2020-12-17T09:00:00.000Z | 2020-12-17T09:00:00.000Z |
| vde-2020-030 | PHOENIX CONTACT: Products utilizing WIBU-SYSTEMS CodeMeter components | 2020-09-09T06:22:00.000Z | 2020-09-09T06:22:00.000Z |
| vde-2020-018 | PHOENIX CONTACT: FL MGUARD, TC MGUARD, TC ROUTER and TC CLOUD CLIENT: PPPD vulnerable to CVE-2020-8597 | 2020-06-02T08:42:00.000Z | 2020-06-02T08:42:00.000Z |
| vde-2020-013 | PHOENIX CONTACT: Local Privilege Escalation in Portico Remote desktop control software | 2020-03-27T09:48:00.000Z | 2020-03-27T09:48:00.000Z |
| vde-2018-015 | Phoenix Contact: AXL F BK PN Denial of Service Vulnerability | 2018-09-21T07:03:00.000Z | 2018-09-21T07:03:00.000Z |
| vde-2018-012 | PHOENIX CONTACT: ILC 1x1 ETH Denial of Service | 2018-08-13T11:55:00.000Z | 2018-08-13T11:55:00.000Z |
| vde-2018-005 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series through 1.33 allows Information Exposure | 2018-05-16T05:35:00.000Z | 2018-05-16T05:35:00.000Z |