Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-33324 |
9.4 (4.0)
|
SQLBot prompt injection allows arbitrary SQL execution… |
dataease |
SQLBot |
2026-05-05T19:09:36.031Z | 2026-05-05T19:38:28.127Z |
| CVE-2026-31893 |
6.8 (4.0)
|
Tunnelblick arbitrary file read via symlink following … |
Tunnelblick |
Tunnelblick |
2026-05-05T18:55:41.737Z | 2026-05-05T19:37:47.926Z |
| CVE-2026-34084 |
9.2 (4.0)
|
PhpSpreadsheet SSRF and RCE via PHP stream wrappers in… |
PHPOffice |
PhpSpreadsheet |
2026-05-05T19:22:16.383Z | 2026-05-05T19:32:59.799Z |
| CVE-2026-32936 |
8.7 (4.0)
|
CoreDNS DoH GET path missing size validation causes CP… |
coredns |
coredns |
2026-05-05T19:07:51.926Z | 2026-05-05T19:32:25.341Z |
| CVE-2026-7856 |
8.6 (4.0)
7.2 (3.1)
7.2 (3.0)
|
D-Link DI-8100 Web Management url_member.asp buffer overflow |
D-Link |
DI-8100 |
2026-05-05T19:00:14.098Z | 2026-05-05T19:30:58.408Z |
| CVE-2026-7845 |
2.1 (4.0)
2.6 (3.1)
2.6 (3.0)
|
chatchat-space Langchain-Chatchat Vision Chat Paste Im… |
chatchat-space |
Langchain-Chatchat |
2026-05-05T15:45:12.138Z | 2026-05-05T19:23:08.834Z |
| CVE-2026-43868 |
N/A
|
Apache Thrift: Rust implementation vulnerable to CVE-2… |
Apache Software Foundation |
Apache Thrift |
2026-05-05T07:49:47.754Z | 2026-05-05T19:21:34.278Z |
| CVE-2026-30923 |
8.2 (4.0)
|
libModSecurity3 denial of service via segfault when us… |
owasp-modsecurity |
ModSecurity |
2026-05-05T18:46:03.201Z | 2026-05-05T19:21:08.898Z |
| CVE-2026-7629 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
kleneway awesome-cursor-mpc-server Ccode-Review Tool c… |
kleneway |
awesome-cursor-mpc-server |
2026-05-02T13:00:15.327Z | 2026-05-05T19:14:12.966Z |
| CVE-2026-7725 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
PrefectHQ prefect GitRepository Pull storage.py argume… |
PrefectHQ |
prefect |
2026-05-04T03:00:17.845Z | 2026-05-05T19:08:56.044Z |
| CVE-2026-7732 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects BloodBank Managing System request_blood.… |
code-projects |
BloodBank Managing System |
2026-05-04T04:30:13.786Z | 2026-05-05T19:07:33.662Z |
| CVE-2026-7738 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
puchunjie doc-tools-mcp MCP mcp-server.ts open_documen… |
puchunjie |
doc-tools-mcp |
2026-05-04T06:00:17.307Z | 2026-05-05T19:02:30.978Z |
| CVE-2026-7713 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
crocodilestick Calibre-Web-Automated Kobo auth-token R… |
crocodilestick |
Calibre-Web-Automated |
2026-05-04T00:00:32.992Z | 2026-05-05T19:00:28.901Z |
| CVE-2025-52206 |
4.7 (3.1)
|
ISPConfig 3.3.0 is vulnerable to Cross Site Scrip… |
n/a |
n/a |
2026-05-05T00:00:00.000Z | 2026-05-05T18:58:11.246Z |
| CVE-2026-7719 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Totolink WA300 POST Request cstecgi.cgi loginauth buff… |
Totolink |
WA300 |
2026-05-04T01:30:16.375Z | 2026-05-05T18:57:04.238Z |
| CVE-2026-34000 |
6.1 (3.1)
|
Xwayland: xorg: x.org x server: information disclosure… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-05-05T14:41:05.468Z | 2026-05-05T18:52:32.853Z |
| CVE-2026-25589 |
7.7 (4.0)
|
RedisBloom RESTORE invalid memory access may allow rem… |
RedisBloom |
RedisBloom |
2026-05-05T16:50:35.545Z | 2026-05-05T18:49:30.919Z |
| CVE-2026-7853 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
D-Link DI-8100 HTTP auto_reboot.asp sprintf buffer overflow |
D-Link |
DI-8100 |
2026-05-05T17:45:14.044Z | 2026-05-05T18:46:18.528Z |
| CVE-2026-3382 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
ChaiScript boxed_number.hpp get_as memory corruption |
n/a |
ChaiScript |
2026-03-01T05:32:12.992Z | 2026-05-05T18:34:13.910Z |
| CVE-2026-3380 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 L7Im frmL7ImForm buffer overflow |
Tenda |
F453 |
2026-03-01T03:02:09.623Z | 2026-05-05T18:33:30.271Z |
| CVE-2026-3379 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 SetIpBind fromSetIpBind buffer overflow |
Tenda |
F453 |
2026-03-01T02:32:09.360Z | 2026-05-05T18:33:14.774Z |
| CVE-2026-3378 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 qossetting fromqossetting buffer overflow |
Tenda |
F453 |
2026-03-01T02:02:09.619Z | 2026-05-05T18:33:00.191Z |
| CVE-2026-3377 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 SafeUrlFilter fromSafeUrlFilter buffer overflow |
Tenda |
F453 |
2026-02-28T23:32:09.156Z | 2026-05-05T18:32:43.707Z |
| CVE-2026-3376 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 SafeMacFilter fromSafeMacFilter buffer overflow |
Tenda |
F453 |
2026-02-28T23:02:09.515Z | 2026-05-05T18:32:18.852Z |
| CVE-2026-7744 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
CodeAstro Online Classroom addnewstudent sql injection |
CodeAstro |
Online Classroom |
2026-05-04T07:30:13.668Z | 2026-05-05T18:10:47.678Z |
| CVE-2026-7750 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Totolink N300RH POST Request cstecgi.cgi setMacFilterR… |
Totolink |
N300RH |
2026-05-04T09:00:17.932Z | 2026-05-05T18:06:12.761Z |
| CVE-2026-7784 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
RTGS2017 NagaAgent Skills Endpoint extensions.py path … |
RTGS2017 |
NagaAgent |
2026-05-04T23:30:15.477Z | 2026-05-05T17:57:31.615Z |
| CVE-2026-7822 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
itsourcecode Courier Management System print_pdets.php… |
itsourcecode |
Courier Management System |
2026-05-05T04:30:13.126Z | 2026-05-05T17:55:05.073Z |
| CVE-2026-7682 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Edimax BR-6208AC L2TP Mode setWAN command injection |
Edimax |
BR-6208AC |
2026-05-03T06:15:09.912Z | 2026-05-05T17:46:44.840Z |
| CVE-2026-7676 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
kerwincui FastBee Tool Download Endpoint ToolControlle… |
kerwincui |
FastBee |
2026-05-03T03:00:45.620Z | 2026-05-05T17:44:32.709Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2016-9911 |
N/A
|
Quick Emulator (Qemu) built with the USB EHCI Emu… |
n/a |
n/a |
2016-12-23T22:00:00.000Z | 2024-08-06T03:07:31.451Z |
| CVE-2016-9908 |
N/A
|
Quick Emulator (Qemu) built with the Virtio GPU D… |
n/a |
n/a |
2016-12-23T22:00:00.000Z | 2024-08-06T03:07:31.376Z |
| CVE-2016-9907 |
N/A
|
Quick Emulator (Qemu) built with the USB redirect… |
n/a |
n/a |
2016-12-23T22:00:00.000Z | 2024-08-06T03:07:31.326Z |
| CVE-2016-9891 |
N/A
|
Cross-site scripting (XSS) vulnerability in admin… |
n/a |
n/a |
2016-12-29T18:00:00.000Z | 2024-08-06T03:07:32.084Z |
| CVE-2016-9889 |
N/A
|
Some forms with the parameter geo_zoomlevel_to_fo… |
n/a |
n/a |
2016-12-23T05:00:00.000Z | 2024-08-06T03:07:30.869Z |
| CVE-2016-9888 |
N/A
|
An error within the "tar_directory_for_file()" fu… |
n/a |
n/a |
2016-12-08T08:08:00.000Z | 2024-08-06T03:07:31.585Z |
| CVE-2016-9885 |
N/A
|
An issue was discovered in Pivotal GemFire for PC… |
n/a |
GemFire for PCF 1.6.x versions prior to 1.6.5 and 1.7.x versions prior to 1.7.1 |
2017-01-06T22:00:00.000Z | 2024-08-06T03:07:30.811Z |
| CVE-2016-9879 |
N/A
|
An issue was discovered in Pivotal Spring Securit… |
n/a |
Pivotal Spring Security before 3.2.10, 4.1.x before 4.1.4, and 4.2.x before 4.2.1 |
2017-01-06T22:00:00.000Z | 2024-08-06T03:07:30.183Z |
| CVE-2016-9878 |
N/A
|
An issue was discovered in Pivotal Spring Framewo… |
n/a |
Pivotal Spring Framework before 3.2.18, 4.2.x before 4.2.9, and 4.3.x before 4.3.5 |
2016-12-29T09:02:00.000Z | 2024-08-06T03:07:30.827Z |
| CVE-2016-9877 |
N/A
|
An issue was discovered in Pivotal RabbitMQ 3.x b… |
n/a |
Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6; RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12 and 1.7.x before 1.7.7 |
2016-12-29T09:02:00.000Z | 2024-08-06T03:07:30.822Z |
| CVE-2016-9869 |
N/A
|
An issue was discovered in EMC ScaleIO versions b… |
n/a |
EMC ScaleIO versions before 2.0.1.1 |
2017-01-06T22:00:00.000Z | 2024-08-06T03:07:30.831Z |
| CVE-2016-9868 |
N/A
|
An issue was discovered in EMC ScaleIO versions b… |
n/a |
EMC ScaleIO versions before 2.0.1.1 |
2017-01-06T22:00:00.000Z | 2024-08-06T03:07:30.164Z |
| CVE-2016-9867 |
N/A
|
An issue was discovered in EMC ScaleIO versions b… |
n/a |
EMC ScaleIO versions before 2.0.1.1 |
2017-01-06T22:00:00.000Z | 2024-08-06T03:07:30.158Z |
| CVE-2016-9866 |
N/A
|
An issue was discovered in phpMyAdmin. When the a… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T03:07:30.178Z |
| CVE-2016-9865 |
N/A
|
An issue was discovered in phpMyAdmin. Due to a b… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.621Z |
| CVE-2016-9864 |
N/A
|
An issue was discovered in phpMyAdmin. With a cra… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.561Z |
| CVE-2016-9863 |
N/A
|
An issue was discovered in phpMyAdmin. With a ver… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.637Z |
| CVE-2016-9862 |
N/A
|
An issue was discovered in phpMyAdmin. With a cra… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.525Z |
| CVE-2016-9861 |
N/A
|
An issue was discovered in phpMyAdmin. Due to the… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.525Z |
| CVE-2016-9860 |
N/A
|
An issue was discovered in phpMyAdmin. An unauthe… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.588Z |
| CVE-2016-9859 |
N/A
|
An issue was discovered in phpMyAdmin. With a cra… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.625Z |
| CVE-2016-9858 |
N/A
|
An issue was discovered in phpMyAdmin. With a cra… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.570Z |
| CVE-2016-9857 |
N/A
|
An issue was discovered in phpMyAdmin. XSS is pos… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.527Z |
| CVE-2016-9856 |
N/A
|
An XSS issue was discovered in phpMyAdmin because… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.553Z |
| CVE-2016-9855 |
N/A
|
An issue was discovered in phpMyAdmin. By calling… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.660Z |
| CVE-2016-9854 |
N/A
|
An issue was discovered in phpMyAdmin. By calling… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.576Z |
| CVE-2016-9853 |
N/A
|
An issue was discovered in phpMyAdmin. By calling… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.537Z |
| CVE-2016-9852 |
N/A
|
An issue was discovered in phpMyAdmin. By calling… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.577Z |
| CVE-2016-9851 |
N/A
|
An issue was discovered in phpMyAdmin. With a cra… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.569Z |
| CVE-2016-9850 |
N/A
|
An issue was discovered in phpMyAdmin. Username m… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.526Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2016-9891 | Cross-site scripting (XSS) vulnerability in admin/media.php and admin/media_item.php in Dotclear be… | 2016-12-29T18:59:00.257 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9889 | Some forms with the parameter geo_zoomlevel_to_found_location in Tiki Wiki CMS 12.x before 12.10 LT… | 2016-12-23T05:59:00.720 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9888 | An error within the "tar_directory_for_file()" function (gsf-infile-tar.c) in GNOME Structured File… | 2016-12-08T08:59:02.430 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9885 | An issue was discovered in Pivotal GemFire for PCF 1.6.x versions prior to 1.6.5 and 1.7.x versions… | 2017-01-06T22:59:00.390 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9879 | An issue was discovered in Pivotal Spring Security before 3.2.10, 4.1.x before 4.1.4, and 4.2.x bef… | 2017-01-06T22:59:00.360 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9878 | An issue was discovered in Pivotal Spring Framework before 3.2.18, 4.2.x before 4.2.9, and 4.3.x be… | 2016-12-29T09:59:00.820 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9877 | An issue was discovered in Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6 and RabbitMQ fo… | 2016-12-29T09:59:00.790 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9869 | An issue was discovered in EMC ScaleIO versions before 2.0.1.1. Incorrect permissions on the SCINI … | 2017-01-06T22:59:00.327 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9868 | An issue was discovered in EMC ScaleIO versions before 2.0.1.1. A low-privileged local attacker may… | 2017-01-06T22:59:00.297 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9867 | An issue was discovered in EMC ScaleIO versions before 2.0.1.1. A low-privileged local attacker may… | 2017-01-06T22:59:00.267 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9866 | An issue was discovered in phpMyAdmin. When the arg_separator is different from its default & value… | 2016-12-11T03:00:08.853 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9865 | An issue was discovered in phpMyAdmin. Due to a bug in serialized string parsing, it was possible t… | 2016-12-11T03:00:07.477 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9864 | An issue was discovered in phpMyAdmin. With a crafted username or a table name, it was possible to … | 2016-12-11T03:00:06.057 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9863 | An issue was discovered in phpMyAdmin. With a very large request to table partitioning function, it… | 2016-12-11T03:00:04.917 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9862 | An issue was discovered in phpMyAdmin. With a crafted login request it is possible to inject BBCode… | 2016-12-11T03:00:03.197 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9861 | An issue was discovered in phpMyAdmin. Due to the limitation in URL matching, it was possible to by… | 2016-12-11T03:00:01.650 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9860 | An issue was discovered in phpMyAdmin. An unauthenticated user can execute a denial of service atta… | 2016-12-11T03:00:00.273 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9859 | An issue was discovered in phpMyAdmin. With a crafted request parameter value it is possible to ini… | 2016-12-11T02:59:59.023 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9858 | An issue was discovered in phpMyAdmin. With a crafted request parameter value it is possible to ini… | 2016-12-11T02:59:57.897 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9857 | An issue was discovered in phpMyAdmin. XSS is possible because of a weakness in a regular expressio… | 2016-12-11T02:59:56.243 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9856 | An XSS issue was discovered in phpMyAdmin because of an improper fix for CVE-2016-2559 in PMASA-201… | 2016-12-11T02:59:55.100 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9855 | An issue was discovered in phpMyAdmin. By calling some scripts that are part of phpMyAdmin in an un… | 2016-12-11T02:59:53.960 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9854 | An issue was discovered in phpMyAdmin. By calling some scripts that are part of phpMyAdmin in an un… | 2016-12-11T02:59:52.850 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9853 | An issue was discovered in phpMyAdmin. By calling some scripts that are part of phpMyAdmin in an un… | 2016-12-11T02:59:51.477 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9852 | An issue was discovered in phpMyAdmin. By calling some scripts that are part of phpMyAdmin in an un… | 2016-12-11T02:59:50.380 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9851 | An issue was discovered in phpMyAdmin. With a crafted request parameter value it is possible to byp… | 2016-12-11T02:59:49.193 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9850 | An issue was discovered in phpMyAdmin. Username matching for the allow/deny rules may result in wro… | 2016-12-11T02:59:48.130 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9849 | An issue was discovered in phpMyAdmin. It is possible to bypass AllowRoot restriction ($cfg['Server… | 2016-12-11T02:59:47.083 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9848 | An issue was discovered in phpMyAdmin. phpinfo (phpinfo.php) shows PHP information including values… | 2016-12-11T02:59:45.757 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9847 | An issue was discovered in phpMyAdmin. When the user does not specify a blowfish_secret key for enc… | 2016-12-11T02:59:44.553 | 2026-05-06T22:30:45.220 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-j823-4qch-3rgm |
8.1 (3.1)
|
Deserialization of untrusted data in Jackson Databind | 2020-06-18T14:44:46Z | 2026-05-06T18:37:19Z |
| ghsa-27xj-rqx5-2255 |
8.1 (3.1)
|
jackson-databind mishandles the interaction between serialization gadgets and typing | 2020-05-15T18:58:44Z | 2026-05-06T18:37:13Z |
| ghsa-5p34-5m6p-p58g |
9.8 (3.1)
|
jackson-databind mishandles the interaction between serialization gadgets and typing | 2020-04-23T21:08:40Z | 2026-05-06T18:37:08Z |
| ghsa-q882-jc55-6343 |
7.3 (3.1)
5.5 (4.0)
|
kaggle-mcp has a Path Traversal issue | 2026-04-27T21:31:02Z | 2026-05-06T18:36:42Z |
| ghsa-c8g3-x47w-8q7p |
7.0 (4.0)
|
Pimcore admin users can trigger SQL Injection | 2026-04-27T21:31:02Z | 2026-05-06T18:32:15Z |
| ghsa-xj8g-6jm5-p9wv |
4.3 (3.1)
|
A vulnerability in the log file download functionality of Cisco Prime Infrastructure could allow an… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-w7jh-xmq5-2m7v |
7.2 (3.1)
|
A vulnerability in the web UI of Cisco Unity Connection Web Inbox could allow an unauthenticated, r… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-rx97-pwc5-6v32 |
4.3 (3.1)
|
A vulnerability in the Lite Agent feature of Cisco Enterprise Chat and Email (ECE) could allow an a… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-rx82-7g7m-r755 |
6.4 (3.1)
|
A vulnerability in the web-based management interface of Cisco IoT Field Network Director could all… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-qwrq-5c2q-3p3m |
4.3 (3.1)
|
A vulnerability in the RADIUS Policy API endpoints of Cisco ISE could allow an authenticated, … | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-qcgm-qmr8-52ww |
8.4 (4.0)
|
Uncontrolled Search Path Element vulnerability in JohnsonControls AC2000 on Windows allows Leveragi… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-m776-2hwc-9x9m |
7.5 (3.1)
|
A vulnerability in the connection-handling mechanism of Cisco Crosswork Network Controller (CNC) an… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-9344-f92h-vr44 |
8.8 (3.1)
|
gopls by default communicates via pipe. However, -port and -listen flags are supported as means of … | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-83ch-55jw-xp9w |
5.4 (3.1)
|
A vulnerability in the REST API of Cisco Slido could have allowed an authenticated, remote attacker… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-7rq4-mv4g-6vcp |
7.7 (3.1)
|
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco 350 Series… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-63pc-j336-8qq4 |
5.3 (3.1)
|
A vulnerability in an identity management API endpoint of Cisco ISE could allow an unauthenticated,… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-4q4m-pqh7-mj3f |
6.5 (3.1)
|
A vulnerability in the web-based management interface of Cisco IoT Field Network Director could all… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-48h9-c48p-4x99 |
7.7 (3.1)
|
A vulnerability in the web-based management interface of Cisco IoT Field Network Director could all… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-wpww-4qvv-xpv8 |
9.8 (3.1)
|
Heap-based Buffer Overflow vulnerability in mod_proxy_ajp of Apache HTTP Server. If mod_proxy_ajp c… | 2026-05-06T00:31:33Z | 2026-05-06T18:30:30Z |
| ghsa-wfvp-xw34-rhwq |
8.8 (3.1)
|
A vulnerability in the web-based management interface of Cisco Unity Connection could allow an auth… | 2026-05-06T18:30:30Z | 2026-05-06T18:30:30Z |
| ghsa-qwh3-h35h-9j9f |
9.8 (3.1)
|
ERPNext v15.103.1 and before is vulnerable to Server-Side Template Injection (SSTI). An attacker wi… | 2026-05-05T18:33:27Z | 2026-05-06T18:30:30Z |
| ghsa-m376-6rq6-f84p |
8.5 (4.0)
|
Use of Hard-coded Cryptographic Key vulnerability in WatchGuard Agent on Windows allows Inclusion o… | 2026-05-06T18:30:30Z | 2026-05-06T18:30:30Z |
| ghsa-j336-jmmp-f6w9 |
8.5 (4.0)
|
Uncontrolled Search Path Element vulnerability in WatchGuard Agent on Windows allows Using Maliciou… | 2026-05-06T18:30:30Z | 2026-05-06T18:30:30Z |
| ghsa-hgvw-h399-c9rx |
7.1 (4.0)
|
Stack-based Buffer Overflow vulnerability in the WatchGuard Agent discovery service on Windows allo… | 2026-05-06T18:30:30Z | 2026-05-06T18:30:30Z |
| ghsa-9jrq-5wf3-m9fp |
9.8 (3.1)
|
Kestra v1.3.3 and before is vulnerable to SQL Injection. The vulnerability occurs because user-cont… | 2026-05-05T21:31:31Z | 2026-05-06T18:30:30Z |
| ghsa-8fh6-vhhp-g38w |
6.1 (3.1)
|
FluentCMS 1.2.3 is vulnerable to Cross Site Scripting (XSS) in TextHTML plugin. | 2026-05-05T21:31:32Z | 2026-05-06T18:30:30Z |
| ghsa-8cwf-5634-rgvv |
7.3 (4.0)
|
Incorrect permission assignment for a resource in the patch management component of the WatchGuard … | 2026-05-06T18:30:30Z | 2026-05-06T18:30:30Z |
| ghsa-78h5-gvjw-7pp9 |
6.1 (3.1)
|
ERPNext v15.103.1 and before is vulnerable to Cross Site Scripting (XSS) in the Email Template engi… | 2026-05-05T18:33:27Z | 2026-05-06T18:30:30Z |
| ghsa-66vv-qc26-mqpc |
7.5 (3.1)
|
Bitcoin Core through 28.x has a security issue, the details of which are not disclosed. The earlies… | 2026-05-05T21:31:31Z | 2026-05-06T18:30:30Z |
| ghsa-587q-94wg-2pfp |
7.8 (3.1)
8.6 (4.0)
|
The MongoDB C Driver's Cyrus SASL integration performs unsafe string copying during username canoni… | 2026-05-06T18:30:30Z | 2026-05-06T18:30:30Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-775 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:37.904410Z |
| pysec-2021-774 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:37.816605Z |
| pysec-2021-773 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:37.708091Z |
| pysec-2021-772 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:37.616060Z |
| pysec-2021-771 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:37.526889Z |
| pysec-2021-770 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:37.426472Z |
| pysec-2021-769 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:37.342418Z |
| pysec-2021-768 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:37.257593Z |
| pysec-2021-767 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:37.172867Z |
| pysec-2021-766 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:37.088195Z |
| pysec-2021-765 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:36.998638Z |
| pysec-2021-764 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:36.903192Z |
| pysec-2021-763 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:36.820839Z |
| pysec-2021-762 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:36.737111Z |
| pysec-2021-761 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:36.648389Z |
| pysec-2021-760 |
|
TensorFlow is an end-to-end open source platform for machine learning. The code for `tf.r… | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:36.563048Z |
| pysec-2021-759 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:36.478576Z |
| pysec-2021-758 |
|
TensorFlow is an end-to-end open source platform for machine learning. When a user does n… | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:36.390179Z |
| pysec-2021-757 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:36.306207Z |
| pysec-2021-756 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:36.218671Z |
| pysec-2021-755 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:36.131748Z |
| pysec-2021-754 |
|
TensorFlow is an end-to-end open source platform for machine learning. If a user does not… | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:36.031970Z |
| pysec-2021-753 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:35.943696Z |
| pysec-2021-752 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:35.841569Z |
| pysec-2021-751 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:35.756075Z |
| pysec-2021-750 |
|
TensorFlow is an end-to-end open source platform for machine learning. When restoring ten… | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:35.665255Z |
| pysec-2021-749 |
|
TensorFlow is an end-to-end open source platform for machine learning. Sending invalid ar… | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:35.577694Z |
| pysec-2021-748 |
|
TensorFlow is an end-to-end open source platform for machine learning. It is possible to … | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:35.492639Z |
| pysec-2021-747 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:35.406311Z |
| pysec-2021-746 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:35.309422Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32777 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.857990Z |
| gsd-2024-32775 | Server-Side Request Forgery (SSRF) vulnerability in Pavex Embed Google Photos album.This … | 2024-04-19T05:01:57.927012Z |
| gsd-2024-32771 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.883611Z |
| gsd-2024-32770 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.897349Z |
| gsd-2024-32769 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.889529Z |
| gsd-2024-32768 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.867813Z |
| gsd-2024-32767 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.838957Z |
| gsd-2024-32766 | An OS command injection vulnerability has been reported to affect several QNAP operating … | 2024-04-19T05:01:57.820666Z |
| gsd-2024-32764 | A missing authentication for critical function vulnerability has been reported to affect … | 2024-04-19T05:01:57.901196Z |
| gsd-2024-32763 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.927225Z |
| gsd-2024-32762 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-19T05:01:57.879896Z |
| gsd-2024-3947 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.842542Z |
| gsd-2024-3946 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.614769Z |
| gsd-2024-3945 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.477480Z |
| gsd-2024-3944 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.487851Z |
| gsd-2024-3943 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.656681Z |
| gsd-2024-3942 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.532781Z |
| gsd-2024-3941 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.467866Z |
| gsd-2024-3940 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.548604Z |
| gsd-2024-3939 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.488797Z |
| gsd-2024-3938 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.730603Z |
| gsd-2024-3937 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.534300Z |
| gsd-2024-3936 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.872068Z |
| gsd-2024-3935 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.660998Z |
| gsd-2024-3934 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.583078Z |
| gsd-2024-3933 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.836212Z |
| gsd-2024-3932 | A vulnerability classified as problematic has been found in Totara LMS 18.0.1 Build 20231… | 2024-04-18T05:02:10.820638Z |
| gsd-2024-3931 | A vulnerability was found in Totara LMS 18.0.1 Build 20231128.01. It has been rated as pr… | 2024-04-18T05:02:10.509708Z |
| gsd-2024-3930 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.722087Z |
| gsd-2024-3929 | The Content Views – Post Grid & Filter, Recent Posts, Category Posts, & More (Gutenberg B… | 2024-04-18T05:02:10.608602Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2265 | Malicious code in monolith-twirp-codingagentintegrations-codingagentintegrations (RubyGems) | 2026-03-27T13:38:51Z | 2026-03-27T13:38:51Z |
| mal-2026-2266 | Malicious code in monolith-twirp-copilot-registry (RubyGems) | 2026-03-27T13:37:00Z | 2026-03-27T13:37:00Z |
| mal-2026-2267 | Malicious code in monolith-twirp-partitioning-pull_requests (RubyGems) | 2026-03-27T13:36:59Z | 2026-03-27T13:36:59Z |
| mal-2026-2263 | Malicious code in monolith-twirp-reposinsights-reposinsights (RubyGems) | 2026-03-27T13:27:04Z | 2026-03-27T13:27:04Z |
| mal-2026-2262 | Malicious code in monolith-twirp-pullsd-teams (RubyGems) | 2026-03-27T13:27:00Z | 2026-03-27T13:27:00Z |
| mal-2026-2259 | Malicious code in monolith-twirp-loops-core (RubyGems) | 2026-03-27T13:26:58Z | 2026-03-27T13:26:58Z |
| mal-2026-2261 | Malicious code in monolith-twirp-pullsd-repositories (RubyGems) | 2026-03-27T13:26:55Z | 2026-03-27T13:26:55Z |
| mal-2026-2260 | Malicious code in monolith-twirp-pullsd-pullrequestinfo (RubyGems) | 2026-03-27T13:26:48Z | 2026-03-27T13:26:48Z |
| mal-2026-2264 | Malicious code in monolith-twirp-scribe-scribe (RubyGems) | 2026-03-27T13:26:09Z | 2026-03-27T13:26:09Z |
| mal-2023-1164 | Malicious code in dox_assets (npm) | 2023-07-26T13:31:39Z | 2026-03-27T11:49:34Z |
| mal-2026-2085 | Malicious code in uipagain (npm) | 2026-03-23T12:10:52Z | 2026-03-27T05:01:26Z |
| mal-2025-5050 | Malicious code in react-card-security-code (npm) | 2025-06-13T01:39:08Z | 2026-03-27T05:01:25Z |
| mal-2026-2254 | Malicious code in telnyx (PyPI) | 2026-03-27T04:26:10Z | 2026-03-27T04:26:10Z |
| mal-2026-188 | Malicious code in shopping-cart-service (npm) | 2026-01-10T08:14:10Z | 2026-03-27T00:59:36Z |
| mal-2026-1455 | Malicious code in native_dep (npm) | 2026-03-14T06:20:46Z | 2026-03-27T00:59:35Z |
| mal-2026-2241 | Malicious code in pacbot (PyPI) | 2026-03-26T16:21:00Z | 2026-03-26T23:47:09Z |
| mal-2026-2240 | Malicious code in magtape (PyPI) | 2026-03-26T16:21:03Z | 2026-03-26T23:47:09Z |
| mal-2026-2239 | Malicious code in chaostoolkit-turbulence (PyPI) | 2026-03-26T16:32:17Z | 2026-03-26T23:47:08Z |
| mal-2026-2242 | Malicious code in somepentest-test-package (PyPI) | 2026-03-26T20:06:44Z | 2026-03-26T20:06:44Z |
| mal-2026-2144 | Malicious code in litellm (PyPI) | 2026-03-24T11:15:14Z | 2026-03-26T09:53:17Z |
| mal-2026-2233 | Malicious code in lightmock (PyPI) | 2026-03-26T08:27:10Z | 2026-03-26T08:27:10Z |
| mal-2026-2232 | Malicious code in checkmarx.cx-dev-assist (VSCode:https://open-vsx.org) | 2026-03-26T06:18:28Z | 2026-03-26T06:18:28Z |
| mal-2026-2231 | Malicious code in checkmarx.ast-results (VSCode:https://open-vsx.org) | 2026-03-26T06:18:28Z | 2026-03-26T06:18:28Z |
| mal-2026-2230 | Malicious code in aquasecurityofficial.trivy-vulnerability-scanner (VSCode:https://open-vsx.org) | 2026-03-26T04:00:51Z | 2026-03-26T04:00:51Z |
| mal-2026-2072 | Malicious code in react-leaflet-heatmap-layer (npm) | 2026-03-22T17:54:56Z | 2026-03-26T00:50:48Z |
| mal-2026-2071 | Malicious code in react-leaflet-cluster-layer (npm) | 2026-03-22T17:54:15Z | 2026-03-26T00:50:48Z |
| mal-2026-2027 | Malicious code in opengov-k6-core (npm) | 2026-03-22T16:22:33Z | 2026-03-26T00:50:47Z |
| mal-2026-2070 | Malicious code in jest-preset-ppf (npm) | 2026-03-22T18:18:56Z | 2026-03-26T00:50:46Z |
| mal-2026-2069 | Malicious code in eslint-config-service-users (npm) | 2026-03-22T18:21:59Z | 2026-03-26T00:50:45Z |
| mal-2026-2068 | Malicious code in eslint-config-ppf (npm) | 2026-03-22T18:03:03Z | 2026-03-26T00:50:45Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-0974 | GNU libc: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-04-25T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2024-0926 | GNU libc: Schwachstelle ermöglicht Codeausführung | 2024-04-17T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2024-0895 | Oracle Java SE: Mehrere Schwachstellen | 2024-04-16T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2024-0734 | util-linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-03-27T23:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2024-0722 | Linux Kernel: Mehrere Schwachstellen | 2024-03-26T23:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2024-0296 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-02-04T23:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2024-0246 | GNU libc: Mehrere Schwachstellen | 2024-01-30T23:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2023-3060 | cURL: Mehrere Schwachstellen | 2023-12-05T23:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2023-2741 | OpenSSL: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-10-24T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2023-2570 | cURL: Mehre Schwachstellen | 2023-10-04T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2023-2543 | GNU libc: Schwachstelle ermöglicht Privilegieneskalation | 2023-10-03T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2023-2384 | GNU libc: Mehrere Schwachstellen | 2023-09-18T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2023-0670 | OpenSSH: Mehrere Schwachstellen | 2023-03-15T23:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2022-0534 | OpenSSH: Schwachstelle ermöglicht Privilegieneskalation | 2021-09-26T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1272 | QNAP NAS Software und Anwendungen: Mehrere Schwachstellen | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1268 | Trend Micro Apex One: Mehrere Schwachstellen | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1267 | GeoServer: Mehrere Schwachstellen | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1264 | SAP Software: Mehrere Schwachstellen | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1263 | Jenkins "Gatling" Plugin: Schwachstelle ermöglicht Cross-Site Scripting | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1262 | FasterXML Jackson: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1260 | Trend Micro Internet Security: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1259 | Trend Micro Maximum Security: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1257 | SolarWinds Platform: Mehrere Schwachstellen | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1256 | Google Cloud Platform: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1255 | Trend Micro Worry-Free Business Security: Mehrere Schwachstellen | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1162 | Red Hat Enterprise Linux (zlib): Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-05-29T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0908 | Keycloack: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-04-29T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0694 | OpenVPN: Schwachstelle ermöglicht Denial of Service | 2025-04-02T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0314 | AMD Prozessoren: Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0285 | Red Hat Enterprise Linux (Quarkus und Netty): Mehrere Schwachstellen | 2025-02-05T23:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-093-02 | Hitachi Energy TRMTracker | 2025-03-25T13:30:00.000000Z | 2025-03-25T13:30:00.000000Z |
| icsa-24-331-04 | Hitachi Energy MicroSCADA Pro/X SYS600 (Update A) | 2024-08-27T12:30:00.000000Z | 2025-03-25T13:30:00.000000Z |
| icsa-25-084-04 | Inaba Denki Sangyo CHOCO TEI WATCHER mini | 2025-03-25T06:00:00.000000Z | 2025-03-25T06:00:00.000000Z |
| icsa-25-084-03 | Rockwell Automation 440G TLS-Z | 2025-03-25T06:00:00.000000Z | 2025-03-25T06:00:00.000000Z |
| icsa-25-084-02 | Rockwell Automation Verve Asset Manager | 2025-03-25T06:00:00.000000Z | 2025-03-25T06:00:00.000000Z |
| icsa-25-093-05 | B&R APROL | 2025-03-24T00:30:00.000000Z | 2025-03-24T00:30:00.000000Z |
| icsma-25-079-01 | Santesoft Sante DICOM Viewer Pro | 2025-03-20T06:00:00.000000Z | 2025-03-20T06:00:00.000000Z |
| icsa-25-079-04 | SMA Sunny Portal | 2025-03-20T06:00:00.000000Z | 2025-03-20T06:00:00.000000Z |
| icsa-25-077-02 | Rockwell Automation Lifecycle Services with VMware | 2025-03-18T06:00:00.000000Z | 2025-03-18T06:00:00.000000Z |
| icsa-25-077-01 | Schneider Electric EcoStruxure Power Automation System User Interface (EPAS-UI) | 2025-03-18T06:00:00.000000Z | 2025-03-18T06:00:00.000000Z |
| icsma-25-072-01 | Philips Intellispace Cardiovascular (ISCV) | 2025-03-13T06:00:00.000000Z | 2025-03-13T06:00:00.000000Z |
| icsa-25-072-12 | Sungrow iSolarCloud Android App, WiNet Firmware | 2025-03-13T06:00:00.000000Z | 2025-03-13T06:00:00.000000Z |
| icsa-25-070-02 | Optigo Networks Visual BACnet Capture Tool / Optigo Visual Networks Capture Tool | 2025-03-11T06:00:00.000000Z | 2025-03-11T06:00:00.000000Z |
| icsa-25-077-04 | Schneider Electric EcoStruxure Panel Server | 2025-03-11T04:00:00.000000Z | 2025-03-11T04:00:00.000000Z |
| icsa-25-077-03 | Schneider Electric EcoStruxure Power Automation System | 2025-03-11T04:00:00.000000Z | 2025-03-11T04:00:00.000000Z |
| icsa-25-084-01 | ABB RMC-100 | 2025-03-11T00:30:00.000000Z | 2025-03-11T00:30:00.000000Z |
| icsa-25-072-10 | Siemens SINEMA Remote Connect Client | 2025-03-11T00:00:00.000000Z | 2025-03-11T00:00:00.000000Z |
| icsa-25-072-07 | Siemens SCALANCE M-800 and SC-600 Families | 2025-03-11T00:00:00.000000Z | 2025-03-11T00:00:00.000000Z |
| icsa-25-072-05 | Siemens SINAMICS S200 | 2025-03-11T00:00:00.000000Z | 2025-03-11T00:00:00.000000Z |
| icsa-25-072-02 | Siemens SINEMA Remote Connect Server | 2025-03-11T00:00:00.000000Z | 2025-03-11T00:00:00.000000Z |
| icsa-21-103-05 | Siemens Nucleus Products IPv6 Stack | 2021-04-13T00:00:00.000000Z | 2025-03-11T00:00:00.000000Z |
| icsa-19-318-01 | Siemens Mentor Nucleus Networking Module | 2019-11-12T00:00:00.000000Z | 2025-03-11T00:00:00.000000Z |
| icsa-25-063-08 | Edimax IC-7100 IP Camera | 2025-03-04T07:00:00.000000Z | 2025-03-04T07:00:00.000000Z |
| icsa-25-063-07 | GMOD Apollo | 2025-03-04T07:00:00.000000Z | 2025-03-04T07:00:00.000000Z |
| icsa-25-063-06 | Delta Electronics CNCSoft-G2 | 2025-03-04T07:00:00.000000Z | 2025-03-04T07:00:00.000000Z |
| icsa-25-063-01 | Carrier Block Load | 2025-03-04T07:00:00.000000Z | 2025-03-04T07:00:00.000000Z |
| va-24-262-01 | Planet Fitness Workouts mobile apps do not properly validate TLS certificates | 2024-09-23T00:00:00Z | 2025-02-28T00:00:00Z |
| icsma-25-058-01 | Dario Health USB-C Blood Glucose Monitoring System Starter Kit Android Application | 2025-02-27T07:00:00.000000Z | 2025-02-27T07:00:00.000000Z |
| icsa-25-133-03 | Hitachi Energy MACH GWS products | 2025-02-25T13:30:00.000000Z | 2025-02-25T13:30:00.000000Z |
| icsa-25-133-01 | Hitachi Energy Service Suite | 2025-02-25T13:30:00.000000Z | 2025-02-25T13:30:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-staros-cmdinj-759mnt4n | Cisco StarOS Command Injection Vulnerability | 2022-03-02T16:00:00+00:00 | 2022-03-02T16:00:00+00:00 |
| cisco-sa-staros-cmdinj-759mNT4n | Cisco StarOS Command Injection Vulnerability | 2022-03-02T16:00:00+00:00 | 2022-03-02T16:00:00+00:00 |
| cisco-sa-expressway-filewrite-87q5yrk | Cisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilities | 2022-03-02T16:00:00+00:00 | 2022-03-02T16:00:00+00:00 |
| cisco-sa-expressway-filewrite-87Q5YRk | Cisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilities | 2022-03-02T16:00:00+00:00 | 2022-03-02T16:00:00+00:00 |
| cisco-sa-cdp-dos-g8dplwyg | Cisco FXOS and NX-OS Software Cisco Discovery Protocol Service Denial of Service Vulnerability | 2022-02-23T16:00:00+00:00 | 2022-03-01T17:35:44+00:00 |
| cisco-sa-cdp-dos-G8DPLWYG | Cisco FXOS and NX-OS Software Cisco Discovery Protocol Service Denial of Service Vulnerability | 2022-02-23T16:00:00+00:00 | 2022-03-01T17:35:44+00:00 |
| cisco-sa-esa-dos-mxzvgtgu | Cisco Email Security Appliance DNS Verification Denial of Service Vulnerability | 2022-02-16T16:00:00+00:00 | 2022-02-25T19:22:29+00:00 |
| cisco-sa-esa-dos-MxZvGtgU | Cisco Email Security Appliance DNS Verification Denial of Service Vulnerability | 2022-02-16T16:00:00+00:00 | 2022-02-25T19:22:29+00:00 |
| cisco-sa-nxos-nxapi-cmdinject-uluknmz2 | Cisco NX-OS Software NX-API Command Injection Vulnerability | 2022-02-23T16:00:00+00:00 | 2022-02-23T16:00:00+00:00 |
| cisco-sa-nxos-nxapi-cmdinject-ULukNMZ2 | Cisco NX-OS Software NX-API Command Injection Vulnerability | 2022-02-23T16:00:00+00:00 | 2022-02-23T16:00:00+00:00 |
| cisco-sa-cfsoip-dos-tpykydr | Cisco NX-OS Software Cisco Fabric Services Over IP Denial of Service Vulnerability | 2022-02-23T16:00:00+00:00 | 2022-02-23T16:00:00+00:00 |
| cisco-sa-cfsoip-dos-tpykyDr | Cisco NX-OS Software Cisco Fabric Services Over IP Denial of Service Vulnerability | 2022-02-23T16:00:00+00:00 | 2022-02-23T16:00:00+00:00 |
| cisco-sa-n9kaci-tcp-dos-yxukt6gm | Cisco Nexus 9000 Series Fabric Switches ACI Mode Multi-Pod and Multi-Site TCP Denial of Service Vulnerability | 2021-08-25T16:00:00+00:00 | 2022-02-23T15:56:25+00:00 |
| cisco-sa-n9kaci-tcp-dos-YXukt6gM | Cisco Nexus 9000 Series Fabric Switches ACI Mode Multi-Pod and Multi-Site TCP Denial of Service Vulnerability | 2021-08-25T16:00:00+00:00 | 2022-02-23T15:56:25+00:00 |
| cisco-sa-iosxr-scp-inject-qwzocv2 | Cisco IOS XR Software Arbitrary File Read and Write Vulnerability | 2021-09-08T16:00:00+00:00 | 2022-02-18T14:38:20+00:00 |
| cisco-sa-iosxr-scp-inject-QwZOCv2 | Cisco IOS XR Software Arbitrary File Read and Write Vulnerability | 2021-09-08T16:00:00+00:00 | 2022-02-18T14:38:20+00:00 |
| cisco-sa-sd-wan-rhpbe34a | Cisco IOS XE SD-WAN Software Command Injection Vulnerability | 2021-10-20T16:00:00+00:00 | 2022-02-17T18:13:49+00:00 |
| cisco-sa-sd-wan-rhpbE34A | Cisco IOS XE SD-WAN Software Command Injection Vulnerability | 2021-10-20T16:00:00+00:00 | 2022-02-17T18:13:49+00:00 |
| cisco-sa-rcm-tcp-dos-2wh8xjaq | Cisco Redundancy Configuration Manager for Cisco StarOS Software TCP Denial of Service Vulnerability | 2022-02-16T16:00:00+00:00 | 2022-02-16T16:00:00+00:00 |
| cisco-sa-rcm-tcp-dos-2Wh8XjAQ | Cisco Redundancy Configuration Manager for Cisco StarOS Software TCP Denial of Service Vulnerability | 2022-02-16T16:00:00+00:00 | 2022-02-16T16:00:00+00:00 |
| cisco-sa-pi-epnm-xss-p8fbz2fw | Cisco Prime Infrastructure and Evolved Programmable Network Manager Cross-Site Scripting Vulnerability | 2022-02-16T16:00:00+00:00 | 2022-02-16T16:00:00+00:00 |
| cisco-sa-pi-epnm-xss-P8fBz2FW | Cisco Prime Infrastructure and Evolved Programmable Network Manager Cross-Site Scripting Vulnerability | 2022-02-16T16:00:00+00:00 | 2022-02-16T16:00:00+00:00 |
| cisco-sa-smb-mult-vuln-ka9pk6d | Cisco Small Business RV Series Routers Vulnerabilities | 2022-02-02T16:00:00+00:00 | 2022-02-14T13:54:42+00:00 |
| cisco-sa-smb-mult-vuln-KA9PK6D | Cisco Small Business RV Series Routers Vulnerabilities | 2022-02-02T16:00:00+00:00 | 2022-02-14T13:54:42+00:00 |
| cisco-sa-dnac-info-disc-8qeynkej | Cisco DNA Center Information Disclosure Vulnerability | 2022-02-02T16:00:00+00:00 | 2022-02-04T20:22:37+00:00 |
| cisco-sa-dnac-info-disc-8QEynKEj | Cisco DNA Center Information Disclosure Vulnerability | 2022-02-02T16:00:00+00:00 | 2022-02-04T20:22:37+00:00 |
| cisco-sa-sma-wsa-esa-info-dis-vsvpzohp | Cisco Content Security Management Appliance and Cisco Web Security Appliance Information Disclosure Vulnerability | 2020-09-02T16:00:00+00:00 | 2022-02-02T21:31:49+00:00 |
| cisco-sa-sma-wsa-esa-info-dis-vsvPzOHP | Cisco Content Security Management Appliance and Cisco Web Security Appliance Information Disclosure Vulnerability | 2020-09-02T16:00:00+00:00 | 2022-02-02T21:31:49+00:00 |
| cisco-sa-swg-fbyps-3z4qt7p | Cisco Umbrella Secure Web Gateway File Inspection Bypass Vulnerability | 2022-02-02T16:00:00+00:00 | 2022-02-02T16:00:00+00:00 |
| cisco-sa-swg-fbyps-3z4qT7p | Cisco Umbrella Secure Web Gateway File Inspection Bypass Vulnerability | 2022-02-02T16:00:00+00:00 | 2022-02-02T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-49134 | mlxsw: spectrum: Guard against invalid local ports | 2025-02-02T00:00:00.000Z | 2026-03-31T14:59:23.000Z |
| msrc_cve-2024-36914 | drm/amd/display: Skip on writeback when it's not applicable | 2024-05-02T07:00:00.000Z | 2026-03-31T14:59:10.000Z |
| msrc_cve-2023-53012 | thermal: core: call put_device() only after device_register() fails | 2025-03-02T00:00:00.000Z | 2026-03-31T14:59:06.000Z |
| msrc_cve-2026-3119 | Authenticated query containing a TKEY record may cause named to terminate unexpectedly | 2026-03-02T00:00:00.000Z | 2026-03-31T14:59:03.000Z |
| msrc_cve-2025-21863 | io_uring: prevent opcode speculation | 2025-03-02T00:00:00.000Z | 2026-03-31T14:59:00.000Z |
| msrc_cve-2024-43823 | PCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs() | 2024-08-02T00:00:00.000Z | 2026-03-31T14:58:48.000Z |
| msrc_cve-2025-38331 | net: ethernet: cortina: Use TOE/TSO on all TCP | 2025-07-02T00:00:00.000Z | 2026-03-31T14:58:41.000Z |
| msrc_cve-2023-53010 | bnxt: Do not read past the end of test names | 2025-03-02T00:00:00.000Z | 2026-03-31T14:58:39.000Z |
| msrc_cve-2026-3104 | Memory leak in code preparing DNSSEC proofs of non-existence | 2026-03-02T00:00:00.000Z | 2026-03-31T14:58:37.000Z |
| msrc_cve-2024-49899 | drm/amd/display: Initialize denominators' default to 1 | 2024-10-01T07:00:00.000Z | 2026-03-31T14:58:30.000Z |
| msrc_cve-2025-38300 | crypto: sun8i-ce-cipher - fix error handling in sun8i_ce_cipher_prepare() | 2025-07-02T00:00:00.000Z | 2026-03-31T14:58:19.000Z |
| msrc_cve-2023-53009 | drm/amdkfd: Add sync after creating vram bo | 2025-03-02T00:00:00.000Z | 2026-03-31T14:58:16.000Z |
| msrc_cve-2024-26920 | tracing/trigger: Fix to return error if failed to alloc snapshot | 2024-04-02T07:00:00.000Z | 2026-03-31T14:58:09.000Z |
| msrc_cve-2022-48990 | drm/amdgpu: fix use-after-free during gpu recovery | 2024-10-01T07:00:00.000Z | 2026-03-31T14:58:04.000Z |
| msrc_cve-2022-49342 | net: ethernet: bgmac: Fix refcount leak in bcma_mdio_mii_register | 2025-02-02T00:00:00.000Z | 2026-03-31T14:57:55.000Z |
| msrc_cve-2025-37938 | tracing: Verify event formats that have "%*p.." | 2025-05-02T00:00:00.000Z | 2026-03-31T14:57:54.000Z |
| msrc_cve-2024-53093 | nvme-multipath: defer partition scanning | 2024-11-02T00:00:00.000Z | 2026-03-31T14:57:52.000Z |
| msrc_cve-2025-37931 | btrfs: adjust subpage bit start based on sectorsize | 2025-05-02T00:00:00.000Z | 2026-03-31T14:57:31.000Z |
| msrc_cve-2025-38449 | drm/gem: Acquire references on GEM handles for framebuffers | 2025-07-02T00:00:00.000Z | 2026-03-31T14:57:26.000Z |
| msrc_cve-2024-53100 | nvme: tcp: avoid race between queue_lock lock and destroy | 2024-11-02T00:00:00.000Z | 2026-03-31T14:57:25.000Z |
| msrc_cve-2022-49534 | scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT | 2025-02-02T00:00:00.000Z | 2026-03-31T14:57:25.000Z |
| msrc_cve-2024-38543 | lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure | 2024-06-02T07:00:00.000Z | 2026-03-31T14:57:14.000Z |
| msrc_cve-2026-33413 | etcd: Authorization bypasses in multiple APIs | 2026-03-02T00:00:00.000Z | 2026-03-31T14:57:04.000Z |
| msrc_cve-2025-38215 | fbdev: Fix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var | 2025-07-02T00:00:00.000Z | 2026-03-31T14:57:04.000Z |
| msrc_cve-2024-50017 | x86/mm/ident_map: Use gbpages only where full GB page should be mapped. | 2024-10-01T07:00:00.000Z | 2026-03-31T14:57:02.000Z |
| msrc_cve-2025-38436 | drm/scheduler: signal scheduled fence when kill job | 2025-07-02T00:00:00.000Z | 2026-03-31T14:57:01.000Z |
| msrc_cve-2024-53094 | RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES | 2024-11-02T00:00:00.000Z | 2026-03-31T14:57:00.000Z |
| msrc_cve-2022-49547 | btrfs: fix deadlock between concurrent dio writes when low on free data space | 2025-02-02T00:00:00.000Z | 2026-03-31T14:56:59.000Z |
| msrc_cve-2024-38557 | net/mlx5: Reload only IB representors upon lag disable/enable | 2024-06-02T07:00:00.000Z | 2026-03-31T14:56:46.000Z |
| msrc_cve-2025-38198 | fbcon: Make sure modelist not set on unregistered console | 2025-07-02T00:00:00.000Z | 2026-03-31T14:56:40.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15424-1 | govulncheck-vulndb-0.0.20250807T150727-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
| opensuse-su-2025:15423-1 | go1.24-1.24.6-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
| opensuse-su-2025:15422-1 | go1.23-1.23.12-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
| opensuse-su-2025:15421-1 | chromedriver-139.0.7258.66-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
| opensuse-su-2025:15420-1 | go1.25-1.25rc3-1.1 on GA media | 2025-08-07T00:00:00Z | 2025-08-07T00:00:00Z |
| opensuse-su-2025:15419-1 | traefik2-2.11.28-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15418-1 | traefik-3.5.0-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15417-1 | libtiff-devel-32bit-4.7.0-7.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15416-1 | libpoppler-cpp2-25.08.0-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15415-1 | libIex-3_3-32-3.3.5-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15414-1 | iperf-3.19.1-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15413-1 | ghostscript-10.05.1-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15412-1 | agama-17+60.68fdb92ec-26.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15411-1 | gnutls-3.8.10-1.1 on GA media | 2025-08-05T00:00:00Z | 2025-08-05T00:00:00Z |
| opensuse-su-2025:15410-1 | erlang-rabbitmq-client-3.13.7-5.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15409-1 | python313-3.13.5-4.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15408-1 | python312-3.12.11-4.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15407-1 | python311-3.11.13-4.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15406-1 | kubeshark-cli-52.8.0-1.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15405-1 | govulncheck-vulndb-0.0.20250730T213748-1.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15404-1 | python39-3.9.23-4.1 on GA media | 2025-08-03T00:00:00Z | 2025-08-03T00:00:00Z |
| opensuse-su-2025:15403-1 | python314-3.14.0~rc1-2.1 on GA media | 2025-08-03T00:00:00Z | 2025-08-03T00:00:00Z |
| opensuse-su-2025:15402-1 | python310-3.10.18-4.1 on GA media | 2025-08-03T00:00:00Z | 2025-08-03T00:00:00Z |
| opensuse-su-2025:15401-1 | liblua5_5-5-5.5.0~beta1-1.1 on GA media | 2025-08-03T00:00:00Z | 2025-08-03T00:00:00Z |
| opensuse-su-2025:15400-1 | grub2-2.12-56.1 on GA media | 2025-08-03T00:00:00Z | 2025-08-03T00:00:00Z |
| opensuse-su-2025:15399-1 | chromedriver-138.0.7204.183-1.1 on GA media | 2025-08-01T00:00:00Z | 2025-08-01T00:00:00Z |
| opensuse-su-2025:15398-1 | kwctl-1.27.1-1.1 on GA media | 2025-07-31T00:00:00Z | 2025-07-31T00:00:00Z |
| opensuse-su-2025:15397-1 | gdk-pixbuf-devel-2.42.12-4.1 on GA media | 2025-07-31T00:00:00Z | 2025-07-31T00:00:00Z |
| opensuse-su-2025:15396-1 | ffmpeg-7-7.1.1-8.1 on GA media | 2025-07-30T00:00:00Z | 2025-07-30T00:00:00Z |
| opensuse-su-2025:15395-1 | docker-28.3.3_ce-26.1 on GA media | 2025-07-30T00:00:00Z | 2025-07-30T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:13545 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2026-05-04T17:14:54+00:00 | 2026-05-08T14:58:57+00:00 |
| rhsa-2018:0583 | Red Hat Security Advisory: rh-ruby22-ruby security, bug fix, and enhancement update | 2018-03-26T09:39:32+00:00 | 2026-05-08T14:44:58+00:00 |
| rhsa-2012:0070 | Red Hat Security Advisory: ruby security update | 2012-01-30T18:23:00+00:00 | 2026-05-08T14:44:58+00:00 |
| rhsa-2011:1581 | Red Hat Security Advisory: ruby security, bug fix, and enhancement update | 2011-12-05T19:38:00+00:00 | 2026-05-08T14:44:57+00:00 |
| rhsa-2008:0562 | Red Hat Security Advisory: ruby security update | 2008-07-14T13:38:00+00:00 | 2026-05-08T12:52:39+00:00 |
| rhsa-2008:0561 | Red Hat Security Advisory: ruby security update | 2008-07-14T13:26:00+00:00 | 2026-05-08T12:52:39+00:00 |
| rhsa-2026:8291 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-15T10:20:34+00:00 | 2026-05-08T12:52:38+00:00 |
| rhsa-2011:0910 | Red Hat Security Advisory: ruby security update | 2011-06-28T17:30:00+00:00 | 2026-05-08T10:43:33+00:00 |
| rhsa-2011:0909 | Red Hat Security Advisory: ruby security update | 2011-06-28T17:27:00+00:00 | 2026-05-08T10:43:32+00:00 |
| rhsa-2011:0908 | Red Hat Security Advisory: ruby security update | 2011-06-28T17:21:00+00:00 | 2026-05-08T10:43:31+00:00 |
| rhsa-2026:9699 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.20.2 security update | 2026-04-22T12:35:53+00:00 | 2026-05-08T10:09:36+00:00 |
| rhsa-2026:9698 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.19.3 security update | 2026-04-22T12:29:18+00:00 | 2026-05-08T10:09:36+00:00 |
| rhsa-2026:9697 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.18.5 security update | 2026-04-22T12:28:10+00:00 | 2026-05-08T10:09:36+00:00 |
| rhsa-2026:13938 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-05-06T08:55:25+00:00 | 2026-05-08T09:04:17+00:00 |
| rhsa-2025:0536 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.15.0 | 2025-01-21T16:57:37+00:00 | 2026-05-08T08:47:09+00:00 |
| rhsa-2024:8974 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.12.0 security and bug fixes | 2024-11-06T20:13:07+00:00 | 2026-05-08T08:47:08+00:00 |
| rhsa-2024:8425 | Red Hat Security Advisory: OpenShift Container Platform 4.15.37 bug fix and security update | 2024-10-31T03:37:09+00:00 | 2026-05-08T08:46:59+00:00 |
| rhsa-2024:8260 | Red Hat Security Advisory: OpenShift Container Platform 4.16.18 bug fix and security update | 2024-10-24T10:44:45+00:00 | 2026-05-08T08:46:57+00:00 |
| rhsa-2024:8235 | Red Hat Security Advisory: OpenShift Container Platform 4.14.39 security update | 2024-10-23T13:14:14+00:00 | 2026-05-08T08:46:55+00:00 |
| rhsa-2024:8229 | Red Hat Security Advisory: OpenShift Container Platform 4.17.2 bug fix and security update | 2024-10-23T05:29:09+00:00 | 2026-05-08T08:46:55+00:00 |
| rhsa-2024:7179 | Red Hat Security Advisory: OpenShift Container Platform 4.15.35 bug fix and security update | 2024-10-02T05:49:45+00:00 | 2026-05-08T08:46:49+00:00 |
| rhsa-2024:7164 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.4 security and bug fix update | 2024-09-26T03:46:53+00:00 | 2026-05-08T08:46:48+00:00 |
| rhsa-2024:6687 | Red Hat Security Advisory: OpenShift Container Platform 4.16.13 bug fix and security update | 2024-09-19T05:38:53+00:00 | 2026-05-08T08:46:47+00:00 |
| rhsa-2024:6209 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.10 security update | 2024-09-03T10:04:55+00:00 | 2026-05-08T08:46:45+00:00 |
| rhsa-2024:4484 | Red Hat Security Advisory: OpenShift Container Platform 4.13.45 bug fix and security update | 2024-07-17T01:35:44+00:00 | 2026-05-08T08:46:34+00:00 |
| rhsa-2024:4041 | Red Hat Security Advisory: OpenShift Container Platform 4.15.19 bug fix and security update | 2024-06-26T12:05:41+00:00 | 2026-05-08T08:46:23+00:00 |
| rhsa-2024:4010 | Red Hat Security Advisory: OpenShift Container Platform 4.14.31 security update | 2024-06-26T02:06:07+00:00 | 2026-05-08T08:46:21+00:00 |
| rhsa-2024:4006 | Red Hat Security Advisory: OpenShift Container Platform 4.12.60 bug fix and security update | 2024-06-27T02:11:24+00:00 | 2026-05-08T08:46:21+00:00 |
| rhsa-2024:3968 | Red Hat Security Advisory: container-tools:rhel8 bug fix and enhancement update | 2024-06-18T00:36:57+00:00 | 2026-05-08T08:46:20+00:00 |
| rhsa-2024:3827 | Red Hat Security Advisory: buildah security and bug fix update | 2024-06-11T20:07:13+00:00 | 2026-05-08T08:46:18+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20452-1 | Security update for crun | 2026-02-17T08:51:47Z | 2026-02-17T08:51:47Z |
| suse-su-2026:20450-1 | Security update for kernel-firmware | 2026-02-17T08:39:43Z | 2026-02-17T08:39:43Z |
| suse-su-2026:20448-1 | Security update for libsodium | 2026-02-17T08:34:12Z | 2026-02-17T08:34:12Z |
| suse-su-2026:0566-1 | Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4) | 2026-02-17T06:33:40Z | 2026-02-17T06:33:40Z |
| suse-su-2026:0565-1 | Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4) | 2026-02-16T18:04:25Z | 2026-02-16T18:04:25Z |
| suse-su-2026:0563-1 | Security update for protobuf | 2026-02-16T16:19:22Z | 2026-02-16T16:19:22Z |
| suse-su-2026:20446-1 | Security update for glib2 | 2026-02-16T14:25:53Z | 2026-02-16T14:25:53Z |
| suse-su-2026:20447-1 | Security update for python-pyasn1 | 2026-02-16T14:23:52Z | 2026-02-16T14:23:52Z |
| suse-su-2026:20445-1 | Security update for libsoup | 2026-02-16T14:21:49Z | 2026-02-16T14:21:49Z |
| suse-su-2026:20444-1 | Security update for gpg2 | 2026-02-16T14:21:49Z | 2026-02-16T14:21:49Z |
| suse-su-2026:20443-1 | Security update for python-urllib3 | 2026-02-16T14:21:49Z | 2026-02-16T14:21:49Z |
| suse-su-2026:0561-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T12:33:41Z | 2026-02-16T12:33:41Z |
| suse-su-2026:0560-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T12:03:47Z | 2026-02-16T12:03:47Z |
| suse-su-2026:0559-1 | Security update for freerdp | 2026-02-16T11:43:04Z | 2026-02-16T11:43:04Z |
| suse-su-2026:0558-1 | Security update for libnvidia-container | 2026-02-16T11:42:25Z | 2026-02-16T11:42:25Z |
| suse-su-2026:0557-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T10:33:36Z | 2026-02-16T10:33:36Z |
| suse-su-2026:0556-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T10:03:47Z | 2026-02-16T10:03:47Z |
| suse-su-2026:20374-1 | Security update for python311 | 2026-02-16T09:45:48Z | 2026-02-16T09:45:48Z |
| suse-su-2026:0555-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T09:04:29Z | 2026-02-16T09:04:29Z |
| suse-su-2026:20373-1 | Security update for openssl-3 | 2026-02-16T08:54:36Z | 2026-02-16T08:54:36Z |
| suse-su-2026:0554-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T08:33:36Z | 2026-02-16T08:33:36Z |
| suse-su-2026:20353-1 | Security update for libxml2 | 2026-02-16T08:28:24Z | 2026-02-16T08:28:24Z |
| suse-su-2026:20372-1 | Security update for libxml2 | 2026-02-16T08:19:48Z | 2026-02-16T08:19:48Z |
| suse-su-2026:0551-1 | Security update for the Linux Kernel (Live Patch 15 for SUSE Linux Enterprise 15 SP6) | 2026-02-16T06:33:35Z | 2026-02-16T06:33:35Z |
| suse-su-2026:0550-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6) | 2026-02-16T05:33:34Z | 2026-02-16T05:33:34Z |
| suse-su-2026:0548-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6) | 2026-02-16T03:33:34Z | 2026-02-16T03:33:34Z |
| suse-su-2026:0546-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6) | 2026-02-15T19:33:42Z | 2026-02-15T19:33:42Z |
| suse-su-2026:0544-1 | Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T18:03:51Z | 2026-02-15T18:03:51Z |
| suse-su-2026:0543-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6) | 2026-02-15T17:33:36Z | 2026-02-15T17:33:36Z |
| suse-su-2026:0542-1 | Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T16:03:51Z | 2026-02-15T16:03:51Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:9097 | Moderate: buildah security update | 2024-11-12T00:00:00Z | 2024-11-19T06:25:44Z |
| alsa-2024:9144 | Important: webkit2gtk3 security update | 2024-11-12T00:00:00Z | 2024-11-19T06:23:59Z |
| alsa-2024:9543 | Important: .NET 9.0 security update | 2024-11-13T00:00:00Z | 2024-11-19T06:01:57Z |
| alsa-2024:9190 | Moderate: python3.12 security update | 2024-11-12T00:00:00Z | 2024-11-18T18:13:18Z |
| alsa-2024:9192 | Moderate: python3.11 security update | 2024-11-12T00:00:00Z | 2024-11-18T18:11:50Z |
| alsa-2024:9552 | Important: thunderbird security update | 2024-11-13T00:00:00Z | 2024-11-18T18:10:34Z |
| alsa-2024:9554 | Important: firefox security update | 2024-11-13T00:00:00Z | 2024-11-18T18:09:22Z |
| alsa-2024:9331 | Moderate: krb5 security update | 2024-11-12T00:00:00Z | 2024-11-18T14:12:56Z |
| alsa-2024:9371 | Moderate: python3.9 security update | 2024-11-12T00:00:00Z | 2024-11-18T14:10:04Z |
| alsa-2024:9452 | Moderate: pcp security update | 2024-11-12T00:00:00Z | 2024-11-18T14:06:11Z |
| alsa-2024:9128 | Moderate: libvirt security update | 2024-11-12T00:00:00Z | 2024-11-18T11:56:39Z |
| alsa-2024:9136 | Moderate: qemu-kvm security update | 2024-11-12T00:00:00Z | 2024-11-18T11:55:36Z |
| alsa-2024:9306 | Moderate: httpd security update | 2024-11-12T00:00:00Z | 2024-11-18T11:55:18Z |
| alsa-2024:9317 | Low: NetworkManager security update | 2024-11-12T00:00:00Z | 2024-11-18T11:55:17Z |
| alsa-2024:9167 | Moderate: poppler security update | 2024-11-12T00:00:00Z | 2024-11-18T11:53:58Z |
| alsa-2024:9474 | Important: krb5 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:53:53Z |
| alsa-2024:9470 | Low: cups security update | 2024-11-12T00:00:00Z | 2024-11-18T11:53:52Z |
| alsa-2024:9325 | Low: cockpit security update | 2024-11-12T00:00:00Z | 2024-11-18T11:53:47Z |
| alsa-2024:9243 | Moderate: postfix security update | 2024-11-12T00:00:00Z | 2024-11-18T11:52:52Z |
| alsa-2024:9553 | Important: webkit2gtk3 security update | 2024-11-13T00:00:00Z | 2024-11-18T11:52:36Z |
| alsa-2024:9468 | Moderate: python3.9 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:52:32Z |
| alsa-2024:9454 | Important: podman security update | 2024-11-12T00:00:00Z | 2024-11-18T11:52:29Z |
| alsa-2024:9451 | Moderate: python3.12 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:52:28Z |
| alsa-2024:9450 | Moderate: python3.11 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:52:25Z |
| alsa-2024:9449 | Important: bubblewrap and flatpak security update | 2024-11-12T00:00:00Z | 2024-11-18T11:52:24Z |
| alsa-2024:9194 | Moderate: python3.11-PyMySQL security update | 2024-11-12T00:00:00Z | 2024-11-18T11:52:13Z |
| alsa-2024:9193 | Moderate: python3.12-PyMySQL security update | 2024-11-12T00:00:00Z | 2024-11-18T11:52:12Z |
| alsa-2024:9187 | Low: bcc security update | 2024-11-12T00:00:00Z | 2024-11-18T11:51:30Z |
| alsa-2024:9088 | Moderate: edk2 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:51:18Z |
| alsa-2024:9184 | Moderate: gtk3 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:50:42Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-6 | Heap-buffer-overflow in parse_skip_ws | 2023-01-14T13:00:05.918404Z | 2023-01-14T13:00:05.918656Z |
| osv-2022-657 | Heap-buffer-overflow in dynapi_set_helper | 2022-07-31T00:02:03.618698Z | 2023-01-13T00:11:29.004032Z |
| osv-2022-1232 | Stack-buffer-overflow in sc_pkcs15init_rmdir | 2022-12-03T13:02:04.273073Z | 2023-01-13T00:06:49.146258Z |
| osv-2022-1119 | Container-overflow in spvtools::opt::blockmergeutil::CanMergeWithSuccessor | 2022-10-31T00:00:28.775967Z | 2023-01-10T07:03:44.497651Z |
| osv-2021-557 | Heap-use-after-free in copy_string | 2021-03-25T00:01:05.489589Z | 2023-01-04T05:36:30.237110Z |
| osv-2017-16 | Heap-buffer-overflow in file_strncmp | 2021-01-13T00:00:27.841127Z | 2023-01-04T05:25:43.259245Z |
| osv-2022-1260 | Heap-buffer-overflow in AffixMgr::cpdcase_check | 2022-12-13T13:01:01.668619Z | 2022-12-30T00:11:08.178221Z |
| osv-2022-1265 | Heap-buffer-overflow in BITLK_read_sb | 2022-12-25T13:01:07.279978Z | 2022-12-25T13:01:07.280239Z |
| osv-2021-1576 | Heap-buffer-overflow in __bpf_object__open | 2021-11-14T00:01:18.685915Z | 2022-12-14T22:22:31.473646Z |
| osv-2021-1562 | Heap-buffer-overflow in __bpf_object__open | 2021-11-11T00:01:42.735141Z | 2022-12-14T22:22:31.473646Z |
| osv-2022-1262 | Heap-use-after-free in HEIFHandler::ensureDecoder | 2022-12-14T13:00:07.679619Z | 2022-12-14T13:00:07.679889Z |
| osv-2022-654 | Heap-buffer-overflow in dwg_geojson_feature | 2022-07-31T00:00:26.014159Z | 2022-12-13T00:15:49.831271Z |
| osv-2022-848 | Heap-buffer-overflow in pcpp::HttpRequestFirstLine::parseVersion | 2022-09-06T00:01:33.775721Z | 2022-12-12T00:11:45.288626Z |
| osv-2022-656 | Heap-buffer-overflow in dwg_decode_LWPOLYLINE_private | 2022-07-31T00:00:46.624694Z | 2022-12-10T00:15:05.367372Z |
| osv-2022-1246 | Heap-buffer-overflow in AffixMgr::cpdpat_check | 2022-12-06T13:02:14.586303Z | 2022-12-06T13:02:14.586537Z |
| osv-2022-1234 | Heap-use-after-free in gf_odf_vvc_cfg_read_bs | 2022-12-04T13:00:21.935260Z | 2022-12-04T13:00:21.935497Z |
| osv-2022-1231 | Heap-buffer-overflow in dv_copy | 2022-12-03T13:00:32.573380Z | 2022-12-03T13:00:32.573638Z |
| osv-2022-1230 | Use-of-uninitialized-value in bn_trim | 2022-12-03T13:00:07.835694Z | 2022-12-03T13:00:07.835919Z |
| osv-2022-403 | Heap-use-after-free in dwg_add_handleref | 2022-05-09T00:00:48.738027Z | 2022-12-03T00:15:46.871208Z |
| osv-2022-1229 | UNKNOWN WRITE in gdev_mem_open_scan_lines_interleaved | 2022-12-02T13:02:30.595911Z | 2022-12-02T13:02:30.596151Z |
| osv-2022-1225 | Heap-use-after-free in gs_font_finalize | 2022-11-30T13:00:26.992236Z | 2022-11-30T13:00:26.992476Z |
| osv-2022-1223 | Heap-use-after-free in mbedtls_pkcs7_free | 2022-11-28T13:02:09.500450Z | 2022-11-28T13:02:09.500685Z |
| osv-2022-1181 | Heap-use-after-free in template_execute | 2022-11-18T13:02:20.167230Z | 2022-11-28T00:14:28.341608Z |
| osv-2022-1217 | Security exception in com.code_intelligence.jazzer.sanitizers.RegexInjection.hookInternal | 2022-11-27T13:00:42.462635Z | 2022-11-27T13:00:42.462879Z |
| osv-2022-1178 | Heap-buffer-overflow in bytes_copy_rectangle_zero_padding | 2022-11-18T13:00:40.887717Z | 2022-11-27T00:20:07.053947Z |
| osv-2022-1214 | UNKNOWN READ in chunk_free_object | 2022-11-26T13:00:56.434547Z | 2022-11-26T13:00:56.434779Z |
| osv-2022-1212 | Heap-buffer-overflow in OT::hb_ot_apply_context_t::skipping_iterator_t::next | 2022-11-26T13:00:53.392207Z | 2022-11-26T13:00:53.392505Z |
| osv-2022-1211 | Heap-buffer-overflow in bit_calc_CRC | 2022-11-26T13:00:13.775523Z | 2022-11-26T13:00:13.775771Z |
| osv-2022-1209 | Heap-buffer-overflow in OT::hb_ot_apply_context_t::skipping_iterator_t::next | 2022-11-25T13:00:49.966315Z | 2022-11-25T13:00:49.966564Z |
| osv-2022-1208 | Stack-buffer-overflow in cmap_put_ranges | 2022-11-25T13:00:40.523526Z | 2022-11-25T13:00:40.523768Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2025-2615 | Insertion of Sensitive Information Into Sent Data in GitLab | 2025-11-20T09:04:09.576Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-12983 | Memory Allocation with Excessive Size Value in GitLab | 2025-11-20T09:03:27.972Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-11990 | Improper Handling of URL Encoding (Hex Encoding) in GitLab | 2025-11-20T09:03:19.328Z | 2025-11-20T09:06:46.640Z |
| bit-gitlab-2025-11865 | Incorrect Authorization in GitLab | 2025-11-20T09:03:10.744Z | 2025-11-20T09:06:46.640Z |
| bit-moodle-2025-62401 | Moodle: possible to bypass timer in timed assignments | 2025-11-17T23:47:50.898Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62400 | Moodle: hidden group names visible to event creators | 2025-11-17T23:47:49.403Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62399 | Moodle: password brute force risk when mobile/web services enabled | 2025-11-17T23:47:47.926Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62398 | Moodle: possible to bypass mfa | 2025-11-17T23:47:46.528Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62397 | Moodle: router produces json instead of 404 error for invalid course id | 2025-11-17T23:47:45.012Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62396 | Moodle: router (r.php) could expose application directories | 2025-11-17T23:47:43.645Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62395 | Moodle: external cohort search service leaks system cohort data | 2025-11-17T23:47:42.131Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62394 | Moodle: quiz notifications sent to suspended participants | 2025-11-17T23:47:40.687Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62393 | Moodle: course access permissions not properly checked in course_output_fragment_course_overview | 2025-11-17T23:47:39.287Z | 2025-11-18T00:06:24.423Z |
| bit-mongodb-2025-10061 | Malformed $group Query May Cause MongoDB Server to Crash | 2025-09-19T09:58:18.588Z | 2025-11-14T15:09:14.122Z |
| bit-kibana-2025-37734 | Kibana Origin Validation Error | 2025-11-14T14:40:47.948Z | 2025-11-14T15:09:14.122Z |
| bit-elk-2025-37734 | Kibana Origin Validation Error | 2025-11-14T14:38:05.480Z | 2025-11-14T15:09:14.122Z |
| bit-redis-2025-46817 | Lua library commands may lead to integer overflow and potential RCE | 2025-10-08T08:51:25.578Z | 2025-11-13T11:23:28.166Z |
| bit-keydb-2025-46817 | Lua library commands may lead to integer overflow and potential RCE | 2025-10-08T08:43:20.393Z | 2025-11-13T11:23:28.166Z |
| bit-discourse-2025-48954 | Discourse vulnerable to XSS via user-provided query parameter in oauth failure flow | 2025-07-01T17:44:46.702Z | 2025-11-13T11:23:28.166Z |
| bit-django-2025-64459 | Potential SQL injection via _connector keyword argument in QuerySet and Q objects | 2025-11-11T11:36:39.904Z | 2025-11-11T12:05:08.739Z |
| bit-django-2025-64458 | Potential denial-of-service vulnerability in HttpResponseRedirect and HttpResponsePermanentRedirect on Windows | 2025-11-11T11:36:38.456Z | 2025-11-11T12:05:08.739Z |
| bit-wildfly-2022-0866 | 2025-11-07T11:01:40.946Z | 2025-11-07T11:28:28.483Z | |
| bit-mlflow-2025-11201 | MLflow Tracking Server Model Creation Directory Traversal Remote Code Execution Vulnerability | 2025-11-07T10:57:31.684Z | 2025-11-07T11:28:28.483Z |
| bit-redis-2025-62507 | Redis: Bug in XACKDEL may lead to stack overflow and potential RCE | 2025-11-07T08:49:33.083Z | 2025-11-07T09:06:54.375Z |
| bit-keydb-2025-62507 | Redis: Bug in XACKDEL may lead to stack overflow and potential RCE | 2025-11-07T08:40:53.783Z | 2025-11-07T09:06:54.375Z |
| bit-gitlab-2025-9958 | Insertion of Sensitive Information Into Sent Data in GitLab | 2025-10-01T15:13:13.235Z | 2025-11-07T09:06:54.375Z |
| bit-mastodon-2022-2166 | Improper Restriction of Excessive Authentication Attempts in mastodon/mastodon | 2025-11-06T15:08:22.357Z | 2025-11-06T15:44:17.098Z |
| bit-zookeeper-2025-58457 | Apache ZooKeeper: Insufficient Permission Check in AdminServer Snapshot/Restore Commands | 2025-09-26T08:51:26.070Z | 2025-11-06T13:25:46.476Z |
| bit-wildfly-2021-3644 | 2024-03-06T11:08:38.390Z | 2025-11-06T13:25:46.476Z | |
| bit-vault-2024-6468 | Vault Vulnerable to Denial of Service When Setting a Proxy Protocol Behavior | 2024-07-17T07:39:35.824Z | 2025-11-06T13:25:46.476Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0759 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-09-05T00:00:00.000000 | 2025-09-05T00:00:00.000000 |
| certfr-2025-avi-0758 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-09-05T00:00:00.000000 | 2025-09-05T00:00:00.000000 |
| certfr-2025-avi-0757 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-09-05T00:00:00.000000 | 2025-09-05T00:00:00.000000 |
| certfr-2025-avi-0756 | Multiples vulnérabilités dans les produits VMware | 2025-09-05T00:00:00.000000 | 2025-09-05T00:00:00.000000 |
| certfr-2025-avi-0755 | Vulnérabilité dans les produits Synology | 2025-09-05T00:00:00.000000 | 2025-09-05T00:00:00.000000 |
| CERTFR-2025-AVI-0760 | Multiples vulnérabilités dans les produits IBM | 2025-09-05T00:00:00.000000 | 2025-09-05T00:00:00.000000 |
| CERTFR-2025-AVI-0759 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-09-05T00:00:00.000000 | 2025-09-05T00:00:00.000000 |
| CERTFR-2025-AVI-0758 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-09-05T00:00:00.000000 | 2025-09-05T00:00:00.000000 |
| CERTFR-2025-AVI-0757 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-09-05T00:00:00.000000 | 2025-09-05T00:00:00.000000 |
| CERTFR-2025-AVI-0756 | Multiples vulnérabilités dans les produits VMware | 2025-09-05T00:00:00.000000 | 2025-09-05T00:00:00.000000 |
| CERTFR-2025-AVI-0755 | Vulnérabilité dans les produits Synology | 2025-09-05T00:00:00.000000 | 2025-09-05T00:00:00.000000 |
| certfr-2025-avi-0754 | Multiples vulnérabilités dans les produits VMware | 2025-09-04T00:00:00.000000 | 2025-09-04T00:00:00.000000 |
| certfr-2025-avi-0753 | Vulnérabilité dans Shibboleth Service Provider | 2025-09-04T00:00:00.000000 | 2025-09-04T00:00:00.000000 |
| certfr-2025-avi-0752 | Multiples vulnérabilités dans Google Pixel | 2025-09-04T00:00:00.000000 | 2025-09-04T00:00:00.000000 |
| CERTFR-2025-AVI-0754 | Multiples vulnérabilités dans les produits VMware | 2025-09-04T00:00:00.000000 | 2025-09-04T00:00:00.000000 |
| CERTFR-2025-AVI-0753 | Vulnérabilité dans Shibboleth Service Provider | 2025-09-04T00:00:00.000000 | 2025-09-04T00:00:00.000000 |
| CERTFR-2025-AVI-0752 | Multiples vulnérabilités dans Google Pixel | 2025-09-04T00:00:00.000000 | 2025-09-04T00:00:00.000000 |
| certfr-2025-avi-0751 | Multiples vulnérabilités dans les produits VMware | 2025-09-03T00:00:00.000000 | 2025-09-03T00:00:00.000000 |
| certfr-2025-avi-0750 | Multiples vulnérabilités dans Google Android | 2025-09-03T00:00:00.000000 | 2025-09-03T00:00:00.000000 |
| certfr-2025-avi-0749 | Multiples vulnérabilités dans Google Chrome | 2025-09-03T00:00:00.000000 | 2025-09-03T00:00:00.000000 |
| CERTFR-2025-AVI-0751 | Multiples vulnérabilités dans les produits VMware | 2025-09-03T00:00:00.000000 | 2025-09-03T00:00:00.000000 |
| CERTFR-2025-AVI-0750 | Multiples vulnérabilités dans Google Android | 2025-09-03T00:00:00.000000 | 2025-09-03T00:00:00.000000 |
| CERTFR-2025-AVI-0749 | Multiples vulnérabilités dans Google Chrome | 2025-09-03T00:00:00.000000 | 2025-09-03T00:00:00.000000 |
| certfr-2025-avi-0748 | Vulnérabilité dans les produits Liferay | 2025-09-02T00:00:00.000000 | 2025-09-02T00:00:00.000000 |
| CERTFR-2025-AVI-0748 | Vulnérabilité dans les produits Liferay | 2025-09-02T00:00:00.000000 | 2025-09-02T00:00:00.000000 |
| certfr-2025-avi-0747 | Multiples vulnérabilités dans les produits Qnap | 2025-09-01T00:00:00.000000 | 2025-09-01T00:00:00.000000 |
| CERTFR-2025-AVI-0747 | Multiples vulnérabilités dans les produits Qnap | 2025-09-01T00:00:00.000000 | 2025-09-01T00:00:00.000000 |
| certfr-2025-avi-0746 | Multiples vulnérabilités dans les produits IBM | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0745 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0744 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2011-000020 | IBM Tivoli vulnerable to denial-of-service (DoS) | 2011-03-10T16:38+09:00 | 2018-02-07T17:10+09:00 |
| jvndb-2011-000018 | IBM Lotus vulnerable to denial-of-service (DoS) | 2011-03-04T19:28+09:00 | 2018-02-07T17:10+09:00 |
| jvndb-2011-000017 | IBM WebSphere Application Server vulnerable to denial-of-service (DoS) | 2011-03-04T19:29+09:00 | 2018-02-07T17:10+09:00 |
| jvndb-2011-000016 | IBM DB2 vulnerable to denial-of-service (DoS) | 2011-03-04T19:29+09:00 | 2018-02-07T17:10+09:00 |
| jvndb-2017-000173 | Installer of Yahoo! Toolbar (for Internet explorer) may insecurely load Dynamic Link Libraries | 2017-07-12T14:42+09:00 | 2018-02-07T16:48+09:00 |
| jvndb-2017-000172 | FileCapsule Deluxe Portable and Encrypted Files in Self-Decryption Format created by FileCapsule Deluxe Portable may insecurely load Dynamic Link Libraries | 2017-07-13T14:35+09:00 | 2018-02-07T16:48+09:00 |
| jvndb-2017-000145 | Installer of Setup file of advance preparation for e-Tax software (WEB version) may insecurely load Dynamic Link Libraries | 2017-06-28T16:40+09:00 | 2018-02-07T13:40+09:00 |
| jvndb-2017-000144 | Denshi Nyusatsu Check Tool provided by Ministry of Education, Culture, Sports, Science and Technology may insecurely load Dynamic Link Libraries | 2017-06-26T14:28+09:00 | 2018-02-07T13:40+09:00 |
| jvndb-2017-000162 | Installer of Douroshisetu Kihon Data Sakusei System may insecurely load Dynamic Link Libraries | 2017-07-04T14:43+09:00 | 2018-02-07T12:32+09:00 |
| jvndb-2017-000161 | Installer of Douro Kouji Kanseizutou Check Program may insecurely load Dynamic Link Libraries | 2017-07-04T14:43+09:00 | 2018-02-07T12:32+09:00 |
| jvndb-2017-000142 | Installer of Charamin OMP may insecurely load Dynamic Link Libraries | 2017-06-23T14:38+09:00 | 2018-02-07T12:32+09:00 |
| jvndb-2017-000152 | Installer of Shinseiyou Sougou Soft provided by The Ministry of Justice may insecurely load Dynamic Link Libraries | 2017-06-30T14:19+09:00 | 2018-02-07T12:22+09:00 |
| jvndb-2017-000153 | Installer of PDF Digital Signature Plugin provided by the Ministry of Justice may insecurely load Dynamic Link Libraries | 2017-06-30T14:18+09:00 | 2018-02-07T12:21+09:00 |
| jvndb-2017-000158 | Installer and self-extracting archive containing the installer of MLIT DenshiSeikabutsuSakuseiShienKensa system may insecurely load Dynamic Link Libraries | 2017-07-03T14:14+09:00 | 2018-02-07T12:20+09:00 |
| jvndb-2017-000169 | Installers of Lhaz and Lhaz+, and Self-Extracting Archives created by Lhaz or Lhaz+ may insecurely load Dynamic Link Libraries | 2017-07-07T14:18+09:00 | 2018-02-07T12:19+09:00 |
| jvndb-2017-000164 | WordPress plugin "Shortcodes Ultimate" vulnerable to directory traversal | 2017-07-06T13:41+09:00 | 2018-02-07T11:52+09:00 |
| jvndb-2017-000160 | MFC-J960DWN vulnerable to cross-site request forgery | 2017-07-04T13:59+09:00 | 2018-02-07T11:52+09:00 |
| jvndb-2017-000157 | Cybozu Garoon vulnerable to cross-site scripting | 2017-07-03T15:23+09:00 | 2018-02-07T11:52+09:00 |
| jvndb-2017-000146 | Marp vulnerable to improper access control in JavaScript execution | 2017-09-29T13:54+09:00 | 2018-02-07T11:52+09:00 |
| jvndb-2017-000132 | WordPress plugin "WP-Members" vulnerable to cross-site scripting | 2017-06-13T14:50+09:00 | 2018-02-07T11:52+09:00 |
| jvndb-2017-004607 | Deep Discovery Email Inspector vulnerable to arbitrary code execution | 2018-01-31T13:43+09:00 | 2018-01-31T13:43+09:00 |
| jvndb-2016-000121 | Apache Commons FileUpload vulnerable to denial-of-service (DoS) | 2016-06-30T13:53+09:00 | 2018-01-29T10:30+09:00 |
| jvndb-2017-000195 | Installer of Baidu IME may insecurely load Dynamic Link Libraries | 2017-08-03T12:28+09:00 | 2018-01-24T14:34+09:00 |
| jvndb-2017-000196 | Installer of IP Messenger may insecurely load Dynamic Link Libraries | 2017-08-03T14:35+09:00 | 2018-01-24T14:26+09:00 |
| jvndb-2017-000108 | Installer of Tera Term may insecurely load Dynamic Link Libraries | 2017-06-01T14:42+09:00 | 2018-01-24T14:20+09:00 |
| jvndb-2017-000106 | RW-5100 driver installer may insecurely load Dynamic Link Libraries | 2017-06-01T16:44+09:00 | 2018-01-24T14:15+09:00 |
| jvndb-2017-000189 | Installers of Sony PaSoRi related software may insecurely load Dynamic Link Libraries | 2017-07-27T15:38+09:00 | 2018-01-24T14:14+09:00 |
| jvndb-2017-000105 | RW-4040 tool to verify execution environment may insecurely load Dynamic Link Libraries | 2017-06-01T16:40+09:00 | 2018-01-24T14:05+09:00 |
| jvndb-2017-000188 | I-O DATA WN-G300R31 uses hard-coded credentials | 2017-07-27T14:13+09:00 | 2018-01-24T14:03+09:00 |
| jvndb-2017-000184 | Installer of Tween may insecurely load Dynamic Link Libraries | 2017-07-24T15:08+09:00 | 2018-01-24T14:03+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-08450 | Pre-School Enrollment System /profile.php文件SQL注入漏洞 | 2025-03-12 | 2026-01-27 |
| cnvd-2026-08449 | Pre-School Enrollment System /edit-class.php文件SQL注入漏洞 | 2025-03-13 | 2026-01-27 |
| cnvd-2026-08448 | Pre-School Enrollment System /index.php文件SQL注入漏洞 | 2025-03-13 | 2026-01-27 |
| cnvd-2026-08447 | Pre-School Enrollment System /contact-us.php文件SQL注入漏洞 | 2025-03-19 | 2026-01-27 |
| cnvd-2026-08446 | Pre-School Enrollment System目录遍历漏洞 | 2025-04-25 | 2026-01-27 |
| cnvd-2026-08445 | Pre-School Enrollment System enrollment-details.php文件SQL注入漏洞 | 2025-05-13 | 2026-01-27 |
| cnvd-2026-08444 | Online Course Registration System /manage-students.php文件SQL注入漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08443 | Online Course Registration System /enroll.php文件SQL注入漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08434 | iccDEV CIccCLUT::Init函数未定义行为漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08433 | iccDEV未定义行为漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08432 | iccDEV内存泄漏漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08431 | iccDEV CIccXmlArrayType::ParseTextCountNum函数整数溢出漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08430 | iccDEV CIccXform::Create函数释放后重用漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07962 | Soda PDF Desktop目录遍历漏洞 | 2025-12-15 | 2026-01-27 |
| cnvd-2026-07961 | Soda PDF Desktop越界写入漏洞 | 2025-12-15 | 2026-01-27 |
| cnvd-2026-07960 | Soda PDF Desktop权限提升漏洞 | 2026-01-09 | 2026-01-27 |
| cnvd-2026-07959 | Soda PDF Desktop越界读取信息泄露漏洞(CNVD-2026-07959) | 2026-01-09 | 2026-01-27 |
| cnvd-2026-07958 | Soda PDF Desktop内存损坏信息泄露漏洞 | 2026-01-09 | 2026-01-27 |
| cnvd-2026-07957 | Soda PDF Desktop越界读取信息泄露漏洞 | 2026-01-09 | 2026-01-27 |
| cnvd-2026-07956 | iccDEV CIccProfileXml::ParseBasic函数堆缓冲区溢出漏洞 | 2026-01-14 | 2026-01-27 |
| cnvd-2026-07955 | iccDEV SIccCalcOp::Describe函数堆缓冲区溢出漏洞 | 2026-01-14 | 2026-01-27 |
| cnvd-2026-07954 | iccDEV拒绝服务漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07953 | iccDEV空指针成员调用漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07206 | Microsoft SharePoint Server远程代码执行漏洞(CNVD-2026-07206) | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07205 | Microsoft SharePoint Server欺骗漏洞(CNVD-2026-07205) | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07204 | Microsoft SharePoint远程代码执行漏洞(CNVD-2026-07204) | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07203 | Microsoft SharePoint信息泄露漏洞(CNVD-2026-07203) | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07202 | Microsoft SharePoint Server远程代码执行漏洞(CNVD-2026-07202) | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07201 | Microsoft Office代码执行漏洞(CNVD-2026-07201) | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07200 | Microsoft Office代码执行漏洞(CNVD-2026-07200) | 2026-01-19 | 2026-01-27 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01343 | Уязвимость функции l2cap_connect_create_rsp() ядра операционной системы Linux, позволяюща… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01342 | Уязвимость функции machine_crash_nonpanic_core() модуля arch/arm/kernel/machine_kexec.c п… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01341 | Уязвимость функции SMB2_negotiate() ядра операционной системы Linux, позволяющая нарушите… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01340 | Уязвимость функции hfsplus_iget() модуля fs/hfsplus/super.c поддержки расширенной файлово… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01339 | Уязвимость функции hdr_find_e() ядра операционной системы Linux, позволяющая нарушителю п… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01338 | Уязвимость функции txInit() модуля fs/jfs/jfs_txnmgr.c файловой системы JFS ядра операцио… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01337 | Уязвимость функции ftrace_module_enable() модуля kernel/trace/ftrace.c поддержки трассиро… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01336 | Уязвимость функции drm_gem_dma_free() модуля drivers/gpu/drm/drm_gem_dma_helper.c драйвер… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01335 | Уязвимость функции hfs_asc2mac() ядра операционной системы Linux, позволяющая нарушителю … | 06.02.2026 | 06.02.2026 |
| bdu:2026-01334 | Уязвимость функции __drm_gem_fb_end_cpu_access() модуля drivers/gpu/drm/drm_gem_framebuff… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01333 | Уязвимость функции drm_gem_prime_handle_to_dmabuf() модуля drivers/gpu/drm/drm_prime.c др… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01332 | Уязвимость функции ses_enclosure_data_process() модуля drivers/scsi/ses.c драйвера устрой… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01331 | Уязвимость функции ses_enclosure_data_process() модуля drivers/scsi/ses.c драйвера устрой… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01330 | Уязвимость функции __netpoll_setup() ядра операционной системы Linux, позволяющая нарушит… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01329 | Уязвимость функции fpu_vstl() ядра операционной системы Linux, позволяющая нарушителю выз… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01328 | Уязвимость функции tuning_ctl_set() модуля sound/pci/hda/patch_ca0132.c звуковой подсисте… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01327 | Уязвимость функции flush_cache_all_local() модуля arch/parisc/include/asm/cacheflush.h по… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01326 | Уязвимость функции sddr55_write_data() модуля drivers/usb/storage/sddr55.c драйвера устро… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01325 | Уязвимость функции iommu_mmio_write() ядра операционной системы Linux, позволяющая наруши… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01324 | Уязвимость функции rxstate() ядра операционной системы Linux, позволяющая нарушителю полу… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01323 | Уязвимость функции handle_auth_session_key() модуля net/ceph/auth_x.c реализации сетевых … | 06.02.2026 | 06.02.2026 |
| bdu:2026-01322 | Уязвимость функции udp_tunnel_nic_netdevice_event() модуля net/ipv4/udp_tunnel_nic.c реал… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01321 | Уязвимость функции true_sectors_per_clst() ядра операционной системы Linux, позволяющая н… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01320 | Уязвимость функции ath11k_mac_setup_channels_rates() ядра операционной системы Linux, поз… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01319 | Уязвимость функции relocate_one_page() ядра операционной системы Linux, позволяющая наруш… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01318 | Уязвимость функции tcp_fastopen_active_disable_ofo_check() модуля net/ipv4/tcp_fastopen.c… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01317 | Уязвимость функции hci_remove_adv_monitor() ядра операционной системы Linux, позволяющая … | 06.02.2026 | 06.02.2026 |
| bdu:2026-01316 | Уязвимость функции nfs4_setup_readdir() модуля fs/nfs/nfs4proc.c поддержки клиентов NFS я… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01315 | Уязвимость функции iopt_alloc_pages() ядра операционной системы Linux, позволяющая наруши… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01314 | Уязвимость функции filter() ядра операционной системы Linux, позволяющая нарушителю оказа… | 06.02.2026 | 06.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202406-0247 | CWE-125: Out-of-bounds Read vulnerability exists that could cause denial of service of th… | 2024-07-04T23:01:16.144000Z |
| var-202301-2256 | TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discove… | 2024-07-04T22:59:39.501000Z |
| var-202212-1929 | Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation ME… | 2024-07-04T22:59:39.711000Z |
| var-202405-0176 | A vulnerability has been identified in CPCI85 Central Processing/Communication (All versi… | 2024-07-04T22:59:37.336000Z |
| var-202405-0175 | A vulnerability has been identified in OPUPI0 AMQP/MQTT (All versions < V5.30). The affec… | 2024-07-04T22:59:37.320000Z |
| var-202405-0174 | A vulnerability has been identified in CPC80 Central Processing/Communication (All versio… | 2024-07-04T22:59:37.352000Z |
| var-202402-0226 | In Modem NL1, there is a possible system crash due to an improper input validation. This … | 2024-07-04T22:52:33.082000Z |
| var-202406-0299 | CWE-532: Insertion of Sensitive Information into Log File vulnerability exists that could… | 2024-07-04T22:52:32.453000Z |
| var-201707-0964 | The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 an… | 2024-07-04T22:50:25.110000Z |
| var-202111-0660 | Active Directory Domain Services Elevation of Privilege Vulnerability. This vulnerability… | 2024-07-04T22:48:15.754000Z |
| var-202204-1376 | Windows Common Log File System Driver Elevation of Privilege Vulnerability. This vulnerab… | 2024-07-04T22:43:37.100000Z |
| var-202403-0784 | Privileges are not fully verified server-side, which can be abused by a user with limite… | 2024-07-04T22:43:26.731000Z |
| var-201208-0108 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-04T22:40:02.829000Z |
| var-201306-0148 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-04T22:39:15.298000Z |
| var-201304-0352 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-04T22:38:36.514000Z |
| var-201304-0184 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-04T22:37:15.699000Z |
| var-201302-0020 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-04T22:30:20.317000Z |
| var-201201-0038 | protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict head… | 2024-07-04T22:29:48.615000Z |
| var-201310-0368 | Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java S… | 2024-07-04T22:23:37.217000Z |
| var-200107-0045 | Internet Explorer 5.5 and earlier allows remote attackers to obtain the physical location… | 2024-07-04T22:18:25.097000Z |
| var-201206-0053 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-04T22:14:03.453000Z |
| var-201206-0061 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-04T22:13:15.782000Z |
| var-200609-0858 | Multiple buffer overflows in the Apple Type Services (ATS) server in Mac OS X 10.4 throug… | 2024-07-04T22:10:51.415000Z |
| var-201506-0498 | The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 bef… | 2024-07-04T22:03:03.877000Z |
| var-201206-0028 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6… | 2024-07-04T21:55:06.733000Z |
| var-201703-0328 | The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0… | 2024-07-04T21:49:02.280000Z |
| var-201304-0379 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-04T21:42:08.702000Z |
| var-201408-0212 | The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows re… | 2024-07-04T21:41:39.624000Z |
| var-201310-0135 | Unspecified vulnerability in the Java SE, Java SE Embedded component in Oracle Java SE Ja… | 2024-07-04T21:33:37.499000Z |
| var-201609-0592 | The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remot… | 2024-07-04T21:32:12.934000Z |