Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-32699 |
5.3 (4.0)
|
FacturaScripts unauthorized modification of immutable … |
NeoRazorX |
facturascripts |
2026-05-05T19:00:19.957Z | 2026-05-05T19:44:45.408Z |
| CVE-2026-7603 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
JeecgBoot LoadFile Endpoint FileDownloadUtils.jav chec… |
n/a |
JeecgBoot |
2026-05-02T04:15:11.675Z | 2026-05-05T19:43:31.623Z |
| CVE-2026-33489 |
8.2 (4.0)
|
CoreDNS transfer plugin subzone ACL bypass via lexicog… |
coredns |
coredns |
2026-05-05T19:13:48.461Z | 2026-05-05T19:43:06.361Z |
| CVE-2026-7857 |
8.6 (4.0)
7.2 (3.1)
7.2 (3.0)
|
D-Link DI-8100 CGI user_group.asp sprintf buffer overflow |
D-Link |
DI-8100 |
2026-05-05T19:15:13.939Z | 2026-05-05T19:39:19.507Z |
| CVE-2026-33324 |
9.4 (4.0)
|
SQLBot prompt injection allows arbitrary SQL execution… |
dataease |
SQLBot |
2026-05-05T19:09:36.031Z | 2026-05-05T19:38:28.127Z |
| CVE-2026-31893 |
6.8 (4.0)
|
Tunnelblick arbitrary file read via symlink following … |
Tunnelblick |
Tunnelblick |
2026-05-05T18:55:41.737Z | 2026-05-05T19:37:47.926Z |
| CVE-2026-34084 |
9.2 (4.0)
|
PhpSpreadsheet SSRF and RCE via PHP stream wrappers in… |
PHPOffice |
PhpSpreadsheet |
2026-05-05T19:22:16.383Z | 2026-05-05T19:32:59.799Z |
| CVE-2026-32936 |
8.7 (4.0)
|
CoreDNS DoH GET path missing size validation causes CP… |
coredns |
coredns |
2026-05-05T19:07:51.926Z | 2026-05-05T19:32:25.341Z |
| CVE-2026-7856 |
8.6 (4.0)
7.2 (3.1)
7.2 (3.0)
|
D-Link DI-8100 Web Management url_member.asp buffer overflow |
D-Link |
DI-8100 |
2026-05-05T19:00:14.098Z | 2026-05-05T19:30:58.408Z |
| CVE-2026-7845 |
2.1 (4.0)
2.6 (3.1)
2.6 (3.0)
|
chatchat-space Langchain-Chatchat Vision Chat Paste Im… |
chatchat-space |
Langchain-Chatchat |
2026-05-05T15:45:12.138Z | 2026-05-05T19:23:08.834Z |
| CVE-2026-43868 |
N/A
|
Apache Thrift: Rust implementation vulnerable to CVE-2… |
Apache Software Foundation |
Apache Thrift |
2026-05-05T07:49:47.754Z | 2026-05-05T19:21:34.278Z |
| CVE-2026-30923 |
8.2 (4.0)
|
libModSecurity3 denial of service via segfault when us… |
owasp-modsecurity |
ModSecurity |
2026-05-05T18:46:03.201Z | 2026-05-05T19:21:08.898Z |
| CVE-2026-7629 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
kleneway awesome-cursor-mpc-server Ccode-Review Tool c… |
kleneway |
awesome-cursor-mpc-server |
2026-05-02T13:00:15.327Z | 2026-05-05T19:14:12.966Z |
| CVE-2026-7725 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
PrefectHQ prefect GitRepository Pull storage.py argume… |
PrefectHQ |
prefect |
2026-05-04T03:00:17.845Z | 2026-05-05T19:08:56.044Z |
| CVE-2026-7732 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects BloodBank Managing System request_blood.… |
code-projects |
BloodBank Managing System |
2026-05-04T04:30:13.786Z | 2026-05-05T19:07:33.662Z |
| CVE-2026-7738 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
puchunjie doc-tools-mcp MCP mcp-server.ts open_documen… |
puchunjie |
doc-tools-mcp |
2026-05-04T06:00:17.307Z | 2026-05-05T19:02:30.978Z |
| CVE-2026-7713 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
crocodilestick Calibre-Web-Automated Kobo auth-token R… |
crocodilestick |
Calibre-Web-Automated |
2026-05-04T00:00:32.992Z | 2026-05-05T19:00:28.901Z |
| CVE-2025-52206 |
4.7 (3.1)
|
ISPConfig 3.3.0 is vulnerable to Cross Site Scrip… |
n/a |
n/a |
2026-05-05T00:00:00.000Z | 2026-05-05T18:58:11.246Z |
| CVE-2026-7719 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Totolink WA300 POST Request cstecgi.cgi loginauth buff… |
Totolink |
WA300 |
2026-05-04T01:30:16.375Z | 2026-05-05T18:57:04.238Z |
| CVE-2026-34000 |
6.1 (3.1)
|
Xwayland: xorg: x.org x server: information disclosure… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-05-05T14:41:05.468Z | 2026-05-05T18:52:32.853Z |
| CVE-2026-25589 |
7.7 (4.0)
|
RedisBloom RESTORE invalid memory access may allow rem… |
RedisBloom |
RedisBloom |
2026-05-05T16:50:35.545Z | 2026-05-05T18:49:30.919Z |
| CVE-2026-7853 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
D-Link DI-8100 HTTP auto_reboot.asp sprintf buffer overflow |
D-Link |
DI-8100 |
2026-05-05T17:45:14.044Z | 2026-05-05T18:46:18.528Z |
| CVE-2026-3382 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
ChaiScript boxed_number.hpp get_as memory corruption |
n/a |
ChaiScript |
2026-03-01T05:32:12.992Z | 2026-05-05T18:34:13.910Z |
| CVE-2026-3380 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 L7Im frmL7ImForm buffer overflow |
Tenda |
F453 |
2026-03-01T03:02:09.623Z | 2026-05-05T18:33:30.271Z |
| CVE-2026-3379 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 SetIpBind fromSetIpBind buffer overflow |
Tenda |
F453 |
2026-03-01T02:32:09.360Z | 2026-05-05T18:33:14.774Z |
| CVE-2026-3378 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 qossetting fromqossetting buffer overflow |
Tenda |
F453 |
2026-03-01T02:02:09.619Z | 2026-05-05T18:33:00.191Z |
| CVE-2026-3377 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 SafeUrlFilter fromSafeUrlFilter buffer overflow |
Tenda |
F453 |
2026-02-28T23:32:09.156Z | 2026-05-05T18:32:43.707Z |
| CVE-2026-3376 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 SafeMacFilter fromSafeMacFilter buffer overflow |
Tenda |
F453 |
2026-02-28T23:02:09.515Z | 2026-05-05T18:32:18.852Z |
| CVE-2026-7744 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
CodeAstro Online Classroom addnewstudent sql injection |
CodeAstro |
Online Classroom |
2026-05-04T07:30:13.668Z | 2026-05-05T18:10:47.678Z |
| CVE-2026-7750 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Totolink N300RH POST Request cstecgi.cgi setMacFilterR… |
Totolink |
N300RH |
2026-05-04T09:00:17.932Z | 2026-05-05T18:06:12.761Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2016-9912 |
N/A
|
Quick Emulator (Qemu) built with the Virtio GPU D… |
n/a |
n/a |
2016-12-23T22:00:00.000Z | 2024-08-06T03:07:31.420Z |
| CVE-2016-9911 |
N/A
|
Quick Emulator (Qemu) built with the USB EHCI Emu… |
n/a |
n/a |
2016-12-23T22:00:00.000Z | 2024-08-06T03:07:31.451Z |
| CVE-2016-9908 |
N/A
|
Quick Emulator (Qemu) built with the Virtio GPU D… |
n/a |
n/a |
2016-12-23T22:00:00.000Z | 2024-08-06T03:07:31.376Z |
| CVE-2016-9907 |
N/A
|
Quick Emulator (Qemu) built with the USB redirect… |
n/a |
n/a |
2016-12-23T22:00:00.000Z | 2024-08-06T03:07:31.326Z |
| CVE-2016-9891 |
N/A
|
Cross-site scripting (XSS) vulnerability in admin… |
n/a |
n/a |
2016-12-29T18:00:00.000Z | 2024-08-06T03:07:32.084Z |
| CVE-2016-9889 |
N/A
|
Some forms with the parameter geo_zoomlevel_to_fo… |
n/a |
n/a |
2016-12-23T05:00:00.000Z | 2024-08-06T03:07:30.869Z |
| CVE-2016-9888 |
N/A
|
An error within the "tar_directory_for_file()" fu… |
n/a |
n/a |
2016-12-08T08:08:00.000Z | 2024-08-06T03:07:31.585Z |
| CVE-2016-9885 |
N/A
|
An issue was discovered in Pivotal GemFire for PC… |
n/a |
GemFire for PCF 1.6.x versions prior to 1.6.5 and 1.7.x versions prior to 1.7.1 |
2017-01-06T22:00:00.000Z | 2024-08-06T03:07:30.811Z |
| CVE-2016-9879 |
N/A
|
An issue was discovered in Pivotal Spring Securit… |
n/a |
Pivotal Spring Security before 3.2.10, 4.1.x before 4.1.4, and 4.2.x before 4.2.1 |
2017-01-06T22:00:00.000Z | 2024-08-06T03:07:30.183Z |
| CVE-2016-9878 |
N/A
|
An issue was discovered in Pivotal Spring Framewo… |
n/a |
Pivotal Spring Framework before 3.2.18, 4.2.x before 4.2.9, and 4.3.x before 4.3.5 |
2016-12-29T09:02:00.000Z | 2024-08-06T03:07:30.827Z |
| CVE-2016-9877 |
N/A
|
An issue was discovered in Pivotal RabbitMQ 3.x b… |
n/a |
Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6; RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12 and 1.7.x before 1.7.7 |
2016-12-29T09:02:00.000Z | 2024-08-06T03:07:30.822Z |
| CVE-2016-9869 |
N/A
|
An issue was discovered in EMC ScaleIO versions b… |
n/a |
EMC ScaleIO versions before 2.0.1.1 |
2017-01-06T22:00:00.000Z | 2024-08-06T03:07:30.831Z |
| CVE-2016-9868 |
N/A
|
An issue was discovered in EMC ScaleIO versions b… |
n/a |
EMC ScaleIO versions before 2.0.1.1 |
2017-01-06T22:00:00.000Z | 2024-08-06T03:07:30.164Z |
| CVE-2016-9867 |
N/A
|
An issue was discovered in EMC ScaleIO versions b… |
n/a |
EMC ScaleIO versions before 2.0.1.1 |
2017-01-06T22:00:00.000Z | 2024-08-06T03:07:30.158Z |
| CVE-2016-9866 |
N/A
|
An issue was discovered in phpMyAdmin. When the a… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T03:07:30.178Z |
| CVE-2016-9865 |
N/A
|
An issue was discovered in phpMyAdmin. Due to a b… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.621Z |
| CVE-2016-9864 |
N/A
|
An issue was discovered in phpMyAdmin. With a cra… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.561Z |
| CVE-2016-9863 |
N/A
|
An issue was discovered in phpMyAdmin. With a ver… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.637Z |
| CVE-2016-9862 |
N/A
|
An issue was discovered in phpMyAdmin. With a cra… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.525Z |
| CVE-2016-9861 |
N/A
|
An issue was discovered in phpMyAdmin. Due to the… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.525Z |
| CVE-2016-9860 |
N/A
|
An issue was discovered in phpMyAdmin. An unauthe… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.588Z |
| CVE-2016-9859 |
N/A
|
An issue was discovered in phpMyAdmin. With a cra… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.625Z |
| CVE-2016-9858 |
N/A
|
An issue was discovered in phpMyAdmin. With a cra… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.570Z |
| CVE-2016-9857 |
N/A
|
An issue was discovered in phpMyAdmin. XSS is pos… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.527Z |
| CVE-2016-9856 |
N/A
|
An XSS issue was discovered in phpMyAdmin because… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.553Z |
| CVE-2016-9855 |
N/A
|
An issue was discovered in phpMyAdmin. By calling… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.660Z |
| CVE-2016-9854 |
N/A
|
An issue was discovered in phpMyAdmin. By calling… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.576Z |
| CVE-2016-9853 |
N/A
|
An issue was discovered in phpMyAdmin. By calling… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.537Z |
| CVE-2016-9852 |
N/A
|
An issue was discovered in phpMyAdmin. By calling… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.577Z |
| CVE-2016-9851 |
N/A
|
An issue was discovered in phpMyAdmin. With a cra… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.569Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2016-9911 | Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage i… | 2016-12-23T22:59:00.487 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9908 | Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to an informa… | 2016-12-23T22:59:00.440 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9907 | Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory lea… | 2016-12-23T22:59:00.410 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9891 | Cross-site scripting (XSS) vulnerability in admin/media.php and admin/media_item.php in Dotclear be… | 2016-12-29T18:59:00.257 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9889 | Some forms with the parameter geo_zoomlevel_to_found_location in Tiki Wiki CMS 12.x before 12.10 LT… | 2016-12-23T05:59:00.720 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9888 | An error within the "tar_directory_for_file()" function (gsf-infile-tar.c) in GNOME Structured File… | 2016-12-08T08:59:02.430 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9885 | An issue was discovered in Pivotal GemFire for PCF 1.6.x versions prior to 1.6.5 and 1.7.x versions… | 2017-01-06T22:59:00.390 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9879 | An issue was discovered in Pivotal Spring Security before 3.2.10, 4.1.x before 4.1.4, and 4.2.x bef… | 2017-01-06T22:59:00.360 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9878 | An issue was discovered in Pivotal Spring Framework before 3.2.18, 4.2.x before 4.2.9, and 4.3.x be… | 2016-12-29T09:59:00.820 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9877 | An issue was discovered in Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6 and RabbitMQ fo… | 2016-12-29T09:59:00.790 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9869 | An issue was discovered in EMC ScaleIO versions before 2.0.1.1. Incorrect permissions on the SCINI … | 2017-01-06T22:59:00.327 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9868 | An issue was discovered in EMC ScaleIO versions before 2.0.1.1. A low-privileged local attacker may… | 2017-01-06T22:59:00.297 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9867 | An issue was discovered in EMC ScaleIO versions before 2.0.1.1. A low-privileged local attacker may… | 2017-01-06T22:59:00.267 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9866 | An issue was discovered in phpMyAdmin. When the arg_separator is different from its default & value… | 2016-12-11T03:00:08.853 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9865 | An issue was discovered in phpMyAdmin. Due to a bug in serialized string parsing, it was possible t… | 2016-12-11T03:00:07.477 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9864 | An issue was discovered in phpMyAdmin. With a crafted username or a table name, it was possible to … | 2016-12-11T03:00:06.057 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9863 | An issue was discovered in phpMyAdmin. With a very large request to table partitioning function, it… | 2016-12-11T03:00:04.917 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9862 | An issue was discovered in phpMyAdmin. With a crafted login request it is possible to inject BBCode… | 2016-12-11T03:00:03.197 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9861 | An issue was discovered in phpMyAdmin. Due to the limitation in URL matching, it was possible to by… | 2016-12-11T03:00:01.650 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9860 | An issue was discovered in phpMyAdmin. An unauthenticated user can execute a denial of service atta… | 2016-12-11T03:00:00.273 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9859 | An issue was discovered in phpMyAdmin. With a crafted request parameter value it is possible to ini… | 2016-12-11T02:59:59.023 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9858 | An issue was discovered in phpMyAdmin. With a crafted request parameter value it is possible to ini… | 2016-12-11T02:59:57.897 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9857 | An issue was discovered in phpMyAdmin. XSS is possible because of a weakness in a regular expressio… | 2016-12-11T02:59:56.243 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9856 | An XSS issue was discovered in phpMyAdmin because of an improper fix for CVE-2016-2559 in PMASA-201… | 2016-12-11T02:59:55.100 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9855 | An issue was discovered in phpMyAdmin. By calling some scripts that are part of phpMyAdmin in an un… | 2016-12-11T02:59:53.960 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9854 | An issue was discovered in phpMyAdmin. By calling some scripts that are part of phpMyAdmin in an un… | 2016-12-11T02:59:52.850 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9853 | An issue was discovered in phpMyAdmin. By calling some scripts that are part of phpMyAdmin in an un… | 2016-12-11T02:59:51.477 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9852 | An issue was discovered in phpMyAdmin. By calling some scripts that are part of phpMyAdmin in an un… | 2016-12-11T02:59:50.380 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9851 | An issue was discovered in phpMyAdmin. With a crafted request parameter value it is possible to byp… | 2016-12-11T02:59:49.193 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9850 | An issue was discovered in phpMyAdmin. Username matching for the allow/deny rules may result in wro… | 2016-12-11T02:59:48.130 | 2026-05-06T22:30:45.220 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-qcgm-qmr8-52ww |
8.4 (4.0)
|
Uncontrolled Search Path Element vulnerability in JohnsonControls AC2000 on Windows allows Leveragi… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-m776-2hwc-9x9m |
7.5 (3.1)
|
A vulnerability in the connection-handling mechanism of Cisco Crosswork Network Controller (CNC) an… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-9344-f92h-vr44 |
8.8 (3.1)
|
gopls by default communicates via pipe. However, -port and -listen flags are supported as means of … | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-83ch-55jw-xp9w |
5.4 (3.1)
|
A vulnerability in the REST API of Cisco Slido could have allowed an authenticated, remote attacker… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-7rq4-mv4g-6vcp |
7.7 (3.1)
|
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco 350 Series… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-63pc-j336-8qq4 |
5.3 (3.1)
|
A vulnerability in an identity management API endpoint of Cisco ISE could allow an unauthenticated,… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-4q4m-pqh7-mj3f |
6.5 (3.1)
|
A vulnerability in the web-based management interface of Cisco IoT Field Network Director could all… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-48h9-c48p-4x99 |
7.7 (3.1)
|
A vulnerability in the web-based management interface of Cisco IoT Field Network Director could all… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-wpww-4qvv-xpv8 |
9.8 (3.1)
|
Heap-based Buffer Overflow vulnerability in mod_proxy_ajp of Apache HTTP Server. If mod_proxy_ajp c… | 2026-05-06T00:31:33Z | 2026-05-06T18:30:30Z |
| ghsa-wfvp-xw34-rhwq |
8.8 (3.1)
|
A vulnerability in the web-based management interface of Cisco Unity Connection could allow an auth… | 2026-05-06T18:30:30Z | 2026-05-06T18:30:30Z |
| ghsa-qwh3-h35h-9j9f |
9.8 (3.1)
|
ERPNext v15.103.1 and before is vulnerable to Server-Side Template Injection (SSTI). An attacker wi… | 2026-05-05T18:33:27Z | 2026-05-06T18:30:30Z |
| ghsa-m376-6rq6-f84p |
8.5 (4.0)
|
Use of Hard-coded Cryptographic Key vulnerability in WatchGuard Agent on Windows allows Inclusion o… | 2026-05-06T18:30:30Z | 2026-05-06T18:30:30Z |
| ghsa-j336-jmmp-f6w9 |
8.5 (4.0)
|
Uncontrolled Search Path Element vulnerability in WatchGuard Agent on Windows allows Using Maliciou… | 2026-05-06T18:30:30Z | 2026-05-06T18:30:30Z |
| ghsa-hgvw-h399-c9rx |
7.1 (4.0)
|
Stack-based Buffer Overflow vulnerability in the WatchGuard Agent discovery service on Windows allo… | 2026-05-06T18:30:30Z | 2026-05-06T18:30:30Z |
| ghsa-9jrq-5wf3-m9fp |
9.8 (3.1)
|
Kestra v1.3.3 and before is vulnerable to SQL Injection. The vulnerability occurs because user-cont… | 2026-05-05T21:31:31Z | 2026-05-06T18:30:30Z |
| ghsa-8fh6-vhhp-g38w |
6.1 (3.1)
|
FluentCMS 1.2.3 is vulnerable to Cross Site Scripting (XSS) in TextHTML plugin. | 2026-05-05T21:31:32Z | 2026-05-06T18:30:30Z |
| ghsa-8cwf-5634-rgvv |
7.3 (4.0)
|
Incorrect permission assignment for a resource in the patch management component of the WatchGuard … | 2026-05-06T18:30:30Z | 2026-05-06T18:30:30Z |
| ghsa-78h5-gvjw-7pp9 |
6.1 (3.1)
|
ERPNext v15.103.1 and before is vulnerable to Cross Site Scripting (XSS) in the Email Template engi… | 2026-05-05T18:33:27Z | 2026-05-06T18:30:30Z |
| ghsa-66vv-qc26-mqpc |
7.5 (3.1)
|
Bitcoin Core through 28.x has a security issue, the details of which are not disclosed. The earlies… | 2026-05-05T21:31:31Z | 2026-05-06T18:30:30Z |
| ghsa-587q-94wg-2pfp |
7.8 (3.1)
8.6 (4.0)
|
The MongoDB C Driver's Cyrus SASL integration performs unsafe string copying during username canoni… | 2026-05-06T18:30:30Z | 2026-05-06T18:30:30Z |
| ghsa-546v-xqjf-qgcr |
9.1 (3.1)
|
Apache::Session::Generate::ModUniqueId versions from 1.54 through 1.94 for Perl session ids are ins… | 2026-05-06T15:32:40Z | 2026-05-06T18:30:30Z |
| ghsa-386p-v9x3-gxpm |
7.5 (3.1)
|
An issue was discovered in MM in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980… | 2026-05-05T18:33:24Z | 2026-05-06T18:30:30Z |
| ghsa-338p-fcwm-8fgc |
9.1 (3.1)
|
An issue was discovered in Gambio 4.9.2.0 (patched in 2024-02 v1.0.0 for GX4 v4.0.0.0 to v4.9.2.0).… | 2026-05-05T15:31:36Z | 2026-05-06T18:30:30Z |
| ghsa-2v93-vp82-cjv8 |
6.8 (3.1)
|
Velociraptor versions prior to 0.76.4 contain a cross organization authorization bypass in the HTTP… | 2026-05-06T18:30:30Z | 2026-05-06T18:30:30Z |
| ghsa-whhc-f8fh-m5cr |
8.8 (3.1)
8.7 (4.0)
|
This vulnerability exists in Quantum Networks router due to missing rate limiting and CAPTCHA prote… | 2026-04-21T12:30:24Z | 2026-05-06T18:30:25Z |
| ghsa-p7g8-g57p-r8qx |
5.3 (3.1)
|
A flaw was found in FFmpeg’s ALS audio decoder, where it does not properly check for memory allocat… | 2025-11-07T21:31:21Z | 2026-05-06T18:30:24Z |
| ghsa-j666-j6hj-fpc7 |
5.9 (3.1)
|
A flaw was found in libsoup. When establishing HTTPS tunnels through a configured HTTP proxy, sensi… | 2026-03-30T09:31:28Z | 2026-05-06T18:30:24Z |
| ghsa-7f6p-98mw-r63r |
8.8 (3.1)
8.7 (4.0)
|
This vulnerability exists in Quantum Networks router due to inadequate sanitization of user-supplie… | 2026-04-21T12:30:24Z | 2026-05-06T18:30:24Z |
| ghsa-365r-wjfh-hwpv |
7.3 (3.1)
6.9 (4.0)
|
The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows m… | 2026-03-21T00:31:43Z | 2026-05-06T18:30:24Z |
| ghsa-qgq4-89p9-qfrh |
4.3 (3.1)
|
A denial-of-service vulnerability has been identified in the libsoup HTTP client library. This flaw… | 2025-05-16T18:31:10Z | 2026-05-06T18:30:23Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-745 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing invalid ar… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:35.220537Z |
| pysec-2021-744 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing a complex … | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:35.049527Z |
| pysec-2021-743 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:34.887813Z |
| pysec-2021-742 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:34.728611Z |
| pysec-2021-741 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:34.555865Z |
| pysec-2021-740 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:34.396130Z |
| pysec-2021-739 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:34.219918Z |
| pysec-2021-738 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:34.038446Z |
| pysec-2021-737 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:33.881511Z |
| pysec-2021-736 |
|
TensorFlow is an end-to-end open source platform for machine learning. The validation in … | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:33.722327Z |
| pysec-2021-735 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:33.559422Z |
| pysec-2021-734 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:33.390905Z |
| pysec-2021-733 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:33.208696Z |
| pysec-2021-732 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:33.046688Z |
| pysec-2021-731 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite code fo… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:32.887706Z |
| pysec-2021-730 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite impleme… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:32.707618Z |
| pysec-2021-729 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:32.536343Z |
| pysec-2021-728 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:32.373015Z |
| pysec-2021-727 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite impleme… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:32.210068Z |
| pysec-2021-726 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:32.041975Z |
| pysec-2021-725 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:31.883346Z |
| pysec-2021-724 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:31.724950Z |
| pysec-2021-723 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:31.566408Z |
| pysec-2021-722 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:31.406437Z |
| pysec-2021-721 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:31.250576Z |
| pysec-2021-720 |
|
TensorFlow is an end-to-end open source platform for machine learning. TFLite's convoluti… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:31.088691Z |
| pysec-2021-719 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:30.927051Z |
| pysec-2021-718 |
|
TensorFlow is an end-to-end open source platform for machine learning. The fix for CVE-20… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:30.746202Z |
| pysec-2021-717 |
|
TensorFlow is an end-to-end open source platform for machine learning. TFlite graphs must… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:30.563708Z |
| pysec-2021-716 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:30.403366Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-3928 | A vulnerability was found in Dromara open-capacity-platform 2.0.1. It has been declared a… | 2024-04-18T05:02:10.659461Z |
| gsd-2024-3927 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.518595Z |
| gsd-2024-3926 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.775069Z |
| gsd-2024-3925 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.817006Z |
| gsd-2024-3924 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.751327Z |
| gsd-2024-3923 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.874235Z |
| gsd-2024-3922 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.791000Z |
| gsd-2024-3921 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.715785Z |
| gsd-2024-3920 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.479687Z |
| gsd-2024-3919 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.735587Z |
| gsd-2024-3918 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.723547Z |
| gsd-2024-3917 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.851587Z |
| gsd-2024-3916 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.815556Z |
| gsd-2024-3915 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.698435Z |
| gsd-2024-3914 | Use after free in V8 in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to… | 2024-04-18T05:02:10.606503Z |
| gsd-2024-3913 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.593933Z |
| gsd-2024-3912 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:10.599391Z |
| gsd-2024-3911 | An unauthenticated remote attacker can deceive users into performing unintended actions d… | 2024-04-18T05:02:10.514583Z |
| gsd-2024-3910 | A vulnerability, which was classified as critical, has been found in Tenda AC500 2.0.1.9(… | 2024-04-18T05:02:10.827933Z |
| gsd-2024-3909 | A vulnerability classified as critical was found in Tenda AC500 2.0.1.9(1307). Affected b… | 2024-04-18T05:02:10.495396Z |
| gsd-2024-3908 | A vulnerability classified as critical has been found in Tenda AC500 2.0.1.9(1307). Affec… | 2024-04-18T05:02:10.724347Z |
| gsd-2024-3907 | A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been rated as critical. Th… | 2024-04-18T05:02:10.785699Z |
| gsd-2024-3906 | A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been declared as critical.… | 2024-04-18T05:02:10.519417Z |
| gsd-2024-3905 | A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been classified as critica… | 2024-04-18T05:02:10.654380Z |
| gsd-2024-31406 | Active debug code vulnerability exists in RoamWiFi R10 prior to 4.8.45. If this vulnerabi… | 2024-04-18T05:02:06.411332Z |
| gsd-2024-32758 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.093634Z |
| gsd-2024-32757 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.112406Z |
| gsd-2024-32756 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.020109Z |
| gsd-2024-32753 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.005572Z |
| gsd-2024-32752 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.001839Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2068 | Malicious code in eslint-config-ppf (npm) | 2026-03-22T18:03:03Z | 2026-03-26T00:50:45Z |
| mal-2026-2080 | Malicious code in cit-playwright-tests (npm) | 2026-03-22T18:26:44Z | 2026-03-26T00:50:44Z |
| mal-2026-2067 | Malicious code in babel-plugin-react-pure-component (npm) | 2026-03-22T17:43:09Z | 2026-03-26T00:50:44Z |
| mal-2026-2079 | Malicious code in @emilgroup/task-sdk-node (npm) | 2026-03-22T18:27:31Z | 2026-03-26T00:50:43Z |
| mal-2026-2078 | Malicious code in @emilgroup/task-sdk (npm) | 2026-03-22T18:26:09Z | 2026-03-26T00:50:43Z |
| mal-2026-2077 | Malicious code in @emilgroup/public-api-sdk-node (npm) | 2026-03-22T18:25:50Z | 2026-03-26T00:50:43Z |
| mal-2026-2076 | Malicious code in @emilgroup/document-uploader (npm) | 2026-03-22T18:27:17Z | 2026-03-26T00:50:43Z |
| mal-2026-2075 | Malicious code in @emilgroup/document-sdk-node (npm) | 2026-03-22T18:28:27Z | 2026-03-26T00:50:43Z |
| mal-2026-2074 | Malicious code in @emilgroup/discount-sdk (npm) | 2026-03-22T18:28:07Z | 2026-03-26T00:50:43Z |
| mal-2026-2073 | Malicious code in @airtm/uuid-base32 (npm) | 2026-03-22T18:26:54Z | 2026-03-26T00:50:43Z |
| mal-2026-2066 | Malicious code in @teale.io/eslint-config (npm) | 2026-03-22T18:17:41Z | 2026-03-26T00:50:43Z |
| mal-2026-2065 | Malicious code in @opengov/ppf-eslint-config (npm) | 2026-03-22T17:51:51Z | 2026-03-26T00:50:43Z |
| mal-2026-2064 | Malicious code in @opengov/ppf-backend-types (npm) | 2026-03-22T18:21:26Z | 2026-03-26T00:50:43Z |
| mal-2026-2063 | Malicious code in @opengov/form-utils (npm) | 2026-03-22T18:20:39Z | 2026-03-26T00:50:43Z |
| mal-2026-2062 | Malicious code in @leafnoise/mirage (npm) | 2026-03-22T18:20:11Z | 2026-03-26T00:50:43Z |
| mal-2026-2061 | Malicious code in @emilgroup/tenant-sdk-node (npm) | 2026-03-22T18:20:27Z | 2026-03-26T00:50:43Z |
| mal-2026-2060 | Malicious code in @emilgroup/tenant-sdk (npm) | 2026-03-22T18:22:16Z | 2026-03-26T00:50:43Z |
| mal-2026-2059 | Malicious code in @emilgroup/setting-sdk-node (npm) | 2026-03-22T18:23:01Z | 2026-03-26T00:50:43Z |
| mal-2026-2058 | Malicious code in @emilgroup/public-api-sdk (npm) | 2026-03-22T18:12:18Z | 2026-03-26T00:50:43Z |
| mal-2026-2057 | Malicious code in @emilgroup/payment-sdk-node (npm) | 2026-03-22T18:10:30Z | 2026-03-26T00:50:43Z |
| mal-2026-2056 | Malicious code in @emilgroup/payment-sdk (npm) | 2026-03-22T18:11:36Z | 2026-03-26T00:50:43Z |
| mal-2026-2055 | Malicious code in @emilgroup/partner-sdk-node (npm) | 2026-03-22T18:19:38Z | 2026-03-26T00:50:43Z |
| mal-2026-2054 | Malicious code in @emilgroup/partner-portal-sdk-node (npm) | 2026-03-22T18:14:47Z | 2026-03-26T00:50:43Z |
| mal-2026-2053 | Malicious code in @emilgroup/partner-portal-sdk (npm) | 2026-03-22T18:19:56Z | 2026-03-26T00:50:43Z |
| mal-2026-2052 | Malicious code in @emilgroup/notification-sdk-node (npm) | 2026-03-22T18:12:35Z | 2026-03-26T00:50:43Z |
| mal-2026-2051 | Malicious code in @emilgroup/insurance-sdk-node (npm) | 2026-03-22T18:14:20Z | 2026-03-26T00:50:43Z |
| mal-2026-2050 | Malicious code in @emilgroup/insurance-sdk (npm) | 2026-03-22T18:10:08Z | 2026-03-26T00:50:43Z |
| mal-2026-2049 | Malicious code in @emilgroup/gdv-sdk-node (npm) | 2026-03-22T17:55:14Z | 2026-03-26T00:50:43Z |
| mal-2026-2048 | Malicious code in @emilgroup/gdv-sdk (npm) | 2026-03-22T18:20:51Z | 2026-03-26T00:50:43Z |
| mal-2026-2047 | Malicious code in @emilgroup/docxtemplater-util (npm) | 2026-03-22T18:21:12Z | 2026-03-26T00:50:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-2202 | Apache Tomcat: Schwachstelle ermöglicht Denial of Service | 2024-09-23T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2024-2169 | bluez: Schwachstelle ermöglicht Codeausführung | 2024-09-17T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1522 | Apache Tomcat: Schwachstelle ermöglicht Denial of Service | 2024-07-03T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1232 | Rsync: Mehrere Schwachstellen | 2020-02-24T23:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0899 | Oracle Fusion Middleware: Mehrere Schwachstellen | 2024-04-16T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0630 | Apache Tomcat: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-03-13T23:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0594 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2024-03-11T23:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0163 | Apache Tomcat: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-01-18T23:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2023-2628 | Apache Tomcat: Mehrere Schwachstellen | 2023-10-10T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2023-2571 | Django: Schwachstelle ermöglicht Denial of Service | 2023-10-04T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2023-1142 | Red Hat Integration Camel for Spring Boot: Mehrere Schwachstellen | 2023-05-03T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2023-0717 | Apache Tomcat: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-03-21T23:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1254 | Microsoft Power Automate Desktop: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-05T22:00:00.000+00:00 | 2025-06-05T22:00:00.000+00:00 |
| wid-sec-w-2025-1253 | QT: Schwachstelle ermöglicht Denial of Service | 2025-06-05T22:00:00.000+00:00 | 2025-06-05T22:00:00.000+00:00 |
| wid-sec-w-2025-1251 | Devolutions Server: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-06-05T22:00:00.000+00:00 | 2025-06-05T22:00:00.000+00:00 |
| wid-sec-w-2025-1250 | Checkmk : Mehrere Schwachstellen | 2025-06-05T22:00:00.000+00:00 | 2025-06-05T22:00:00.000+00:00 |
| wid-sec-w-2025-1022 | Red Hat OpenStack (python-h11): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-13T22:00:00.000+00:00 | 2025-06-05T22:00:00.000+00:00 |
| wid-sec-w-2025-0770 | HAProxy: Schwachstelle ermöglicht Denial of Service | 2025-04-08T22:00:00.000+00:00 | 2025-06-05T22:00:00.000+00:00 |
| wid-sec-w-2025-0327 | Intel Chipsatz: Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-06-05T22:00:00.000+00:00 |
| wid-sec-w-2025-0172 | GNU libc: Schwachstelle ermöglicht Denial of Service | 2025-01-22T23:00:00.000+00:00 | 2025-06-05T22:00:00.000+00:00 |
| wid-sec-w-2024-2215 | Apache Hadoop: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-09-24T22:00:00.000+00:00 | 2025-06-05T22:00:00.000+00:00 |
| wid-sec-w-2024-1274 | TianoCore EDK2: Schwachstelle ermöglicht Denial of Service | 2024-06-02T22:00:00.000+00:00 | 2025-06-05T22:00:00.000+00:00 |
| wid-sec-w-2024-0936 | GStreamer: Schwachstelle ermöglicht Codeausführung | 2024-04-21T22:00:00.000+00:00 | 2025-06-05T22:00:00.000+00:00 |
| wid-sec-w-2024-0198 | GStreamer: Schwachstelle ermöglicht Codeausführung oder Denial-of-Service | 2024-01-24T23:00:00.000+00:00 | 2025-06-05T22:00:00.000+00:00 |
| wid-sec-w-2024-0050 | Insyde UEFI Firmware: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-01-09T23:00:00.000+00:00 | 2025-06-05T22:00:00.000+00:00 |
| wid-sec-w-2023-1451 | Insyde UEFI Firmware: Mehrere Schwachstellen | 2023-06-13T22:00:00.000+00:00 | 2025-06-05T22:00:00.000+00:00 |
| wid-sec-w-2022-1421 | Lenovo BIOS: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-09-13T22:00:00.000+00:00 | 2025-06-05T22:00:00.000+00:00 |
| wid-sec-w-2025-1249 | Acronis Cyber Protect: Mehrere Schwachstellen | 2025-06-04T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2025-1248 | HPE StoreOnce: Mehrere Schwachstellen | 2025-06-04T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2025-1247 | VMware NSX: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2025-06-04T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-065-02 | Hitachi Energy Relion 670/650/SAM600-IO | 2021-11-04T13:30:00.000000Z | 2025-02-25T13:30:00.000000Z |
| icsa-25-065-01 | Hitachi Energy PCU400 | 2025-02-25T13:30:00.000000Z | 2025-02-25T13:30:00.000000Z |
| icsa-25-063-03 | Hitachi Energy MACH PS700 | 2025-02-25T13:30:00.000000Z | 2025-02-25T13:30:00.000000Z |
| icsma-25-030-01 | Contec Health CMS8000 Patient Monitor (Update A) | 2025-01-30T07:00:00.000000Z | 2025-02-25T07:00:00.000000Z |
| icsa-25-056-01 | Rockwell Automation PowerFlex 755 | 2025-02-25T07:00:00.000000Z | 2025-02-25T07:00:00.000000Z |
| icsma-25-051-01 | Medixant RadiAnt DICOM Viewer | 2025-02-20T07:00:00.000000Z | 2025-02-20T07:00:00.000000Z |
| icsa-25-051-05 | Rapid Response Monitoring My Security Account App | 2025-02-20T07:00:00.000000Z | 2025-02-20T07:00:00.000000Z |
| icsa-25-051-03 | Carrier Block Load | 2025-02-20T07:00:00.000000Z | 2025-02-20T07:00:00.000000Z |
| va-25-043-01 | Ivanti Connect Secure and Ivanti Policy Secure external file control vulnerability | 2025-02-12T19:44:47Z | 2025-02-20T00:00:00Z |
| va-25-017-01 | TrueFiling authorization bypass via user-controlled keys | 2025-01-16T00:00:00Z | 2025-02-20T00:00:00Z |
| icsa-25-051-06 | Elseta Vinci Protocol Analyzer | 2025-02-18T07:00:00.000000Z | 2025-02-18T07:00:00.000000Z |
| icsa-25-035-02 | Rockwell Automation GuardLogix 5380 and 5580 (Update A) | 2025-02-04T07:00:00.000000Z | 2025-02-18T07:00:00.000000Z |
| icsa-24-191-01 | Delta Electronics CNCSoft-G2 (Update A) | 2024-07-09T06:00:00.000000Z | 2025-02-18T07:00:00.000000Z |
| icsa-25-051-02 | ABB FLXEON Controllers | 2025-01-23T06:30:00.000000Z | 2025-02-14T00:30:00.000000Z |
| va-24-254-02 | TopQuadrant TopBraid EDG Insecure External Password Storage and XXE Vulnerabilities | 2024-09-10T16:03:00Z | 2025-02-13T20:00:00Z |
| icsma-25-044-01 | Qardio Heart Health IOS and Android Application and QardioARM A100 | 2025-02-13T07:00:00.000000Z | 2025-02-13T07:00:00.000000Z |
| icsa-25-044-18 | Dingtian DT-R0 Series | 2025-02-13T07:00:00.000000Z | 2025-02-13T07:00:00.000000Z |
| icsa-25-044-17 | Outback Power Mojave Inverter | 2025-02-13T07:00:00.000000Z | 2025-02-13T07:00:00.000000Z |
| icsa-25-044-16 | mySCADA myPRO Manager | 2025-02-13T07:00:00.000000Z | 2025-02-13T07:00:00.000000Z |
| icsa-25-044-15 | ORing IAP-420 | 2025-02-13T07:00:00.000000Z | 2025-02-13T07:00:00.000000Z |
| icsa-25-037-04 | Trimble Cityworks (Update A) | 2025-02-06T07:00:00.000000Z | 2025-02-11T07:00:00.000000Z |
| icsa-24-319-17 | 2N Access Commander (Update A) | 2024-11-14T07:00:00.000000Z | 2025-02-11T07:00:00.000000Z |
| icsa-25-079-02 | Schneider Electric Enerlin’X IFE and eIFE | 2025-02-11T06:00:00.000000Z | 2025-02-11T06:00:00.000000Z |
| icsa-25-079-01 | Schneider Electric EcoStruxureâ„¢ | 2025-02-11T06:00:00.000000Z | 2025-02-11T06:00:00.000000Z |
| icsa-25-077-05 | Schneider Electric ASCO 5310/5350 Remote Annunciator | 2025-02-11T06:00:00.000000Z | 2025-02-11T06:00:00.000000Z |
| icsa-25-044-11 | Siemens Apogee PXC100 Devices | 2025-02-11T00:00:00.000000Z | 2025-02-11T00:00:00.000000Z |
| icsa-25-044-03 | Siemens SIPROTEC 5 | 2025-02-11T00:00:00.000000Z | 2025-02-11T00:00:00.000000Z |
| icsma-25-037-02 | Orthanc Server | 2025-02-06T07:00:00.000000Z | 2025-02-06T07:00:00.000000Z |
| icsma-25-037-01 | MicroDicom DICOM Viewer | 2025-02-06T07:00:00.000000Z | 2025-02-06T07:00:00.000000Z |
| icsa-25-051-01 | ABB ASPECT-Enterprise NEXUS and MATRIX Series | 2025-02-05T00:30:00.000000Z | 2025-02-05T00:30:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-cpsc-info-disc-zkjbdj9f | Cisco Prime Service Catalog Information Disclosure Vulnerability | 2022-02-02T16:00:00+00:00 | 2022-02-02T16:00:00+00:00 |
| cisco-sa-cpsc-info-disc-zkJBDJ9F | Cisco Prime Service Catalog Information Disclosure Vulnerability | 2022-02-02T16:00:00+00:00 | 2022-02-02T16:00:00+00:00 |
| cisco-sa-apache-log4j-qruknebd | Vulnerabilities in Apache Log4j Library Affecting Cisco Products: December 2021 | 2021-12-10T18:45:00+00:00 | 2022-01-31T21:16:10+00:00 |
| cisco-sa-apache-log4j-qRuKNEbd | Vulnerabilities in Apache Log4j Library Affecting Cisco Products: December 2021 | 2021-12-10T18:45:00+00:00 | 2022-01-31T21:16:10+00:00 |
| cisco-sa-tetr-cmd-injc-skrwgo | Cisco Tetration Command Injection Vulnerability | 2022-01-12T16:00:00+00:00 | 2022-01-31T17:21:31+00:00 |
| cisco-sa-tetr-cmd-injc-skrwGO | Cisco Tetration Command Injection Vulnerability | 2022-01-12T16:00:00+00:00 | 2022-01-31T17:21:31+00:00 |
| cisco-sa-webex-xss-fmbpu2pe | Cisco Webex Meetings Cross-Site Scripting Vulnerability | 2022-01-19T16:00:00+00:00 | 2022-01-19T16:00:00+00:00 |
| cisco-sa-webex-xss-FmbPu2pe | Cisco Webex Meetings Cross-Site Scripting Vulnerability | 2022-01-19T16:00:00+00:00 | 2022-01-19T16:00:00+00:00 |
| cisco-sa-rcm-vuls-7cs3nuq | Cisco Redundancy Configuration Manager for Cisco StarOS Software Multiple Vulnerabilities | 2022-01-19T16:00:00+00:00 | 2022-01-19T16:00:00+00:00 |
| cisco-sa-rcm-vuls-7cS3Nuq | Cisco Redundancy Configuration Manager for Cisco StarOS Software Multiple Vulnerabilities | 2022-01-19T16:00:00+00:00 | 2022-01-19T16:00:00+00:00 |
| cisco-sa-confdcli-cmdinj-wybqdssh | ConfD CLI Command Injection Vulnerability | 2022-01-19T16:00:00+00:00 | 2022-01-19T16:00:00+00:00 |
| cisco-sa-confdcli-cmdinj-wybQDSSh | ConfD CLI Command Injection Vulnerability | 2022-01-19T16:00:00+00:00 | 2022-01-19T16:00:00+00:00 |
| cisco-sa-cli-cmdinj-4mttwzpb | Multiple Cisco Products CLI Command Injection Vulnerability | 2022-01-19T16:00:00+00:00 | 2022-01-19T16:00:00+00:00 |
| cisco-sa-cli-cmdinj-4MttWZPB | Multiple Cisco Products CLI Command Injection Vulnerability | 2022-01-19T16:00:00+00:00 | 2022-01-19T16:00:00+00:00 |
| cisco-sa-sb220-lldp-multivuls-mvrutq8t | Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities | 2021-10-06T16:00:00+00:00 | 2022-01-13T21:37:56+00:00 |
| cisco-sa-sb220-lldp-multivuls-mVRUtQ8T | Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities | 2021-10-06T16:00:00+00:00 | 2022-01-13T21:37:56+00:00 |
| cisco-sa-sna-xss-nxoxdhrq | Cisco Secure Network Analytics Cross-Site Scripting Vulnerability | 2022-01-12T16:00:00+00:00 | 2022-01-12T16:00:00+00:00 |
| cisco-sa-sna-xss-NXOxDhRQ | Cisco Secure Network Analytics Cross-Site Scripting Vulnerability | 2022-01-12T16:00:00+00:00 | 2022-01-12T16:00:00+00:00 |
| cisco-sa-prime-reg-xss-zloz8pfb | Cisco Prime Access Registrar Appliance Cross-Site Scripting Vulnerability | 2022-01-12T16:00:00+00:00 | 2022-01-12T16:00:00+00:00 |
| cisco-sa-prime-reg-xss-zLOz8PfB | Cisco Prime Access Registrar Appliance Cross-Site Scripting Vulnerability | 2022-01-12T16:00:00+00:00 | 2022-01-12T16:00:00+00:00 |
| cisco-sa-pi-epnm-path-trav-zws324yn | Cisco Prime Infrastructure and Evolved Programmable Network Manager Vulnerabilities | 2022-01-12T16:00:00+00:00 | 2022-01-12T16:00:00+00:00 |
| cisco-sa-ip-phone-info-disc-frdjfoxa | Cisco IP Phones Information Disclosure Vulnerability | 2022-01-12T16:00:00+00:00 | 2022-01-12T16:00:00+00:00 |
| cisco-sa-ip-phone-info-disc-fRdJfOxA | Cisco IP Phones Information Disclosure Vulnerability | 2022-01-12T16:00:00+00:00 | 2022-01-12T16:00:00+00:00 |
| cisco-sa-ece-multivulns-kbk2yvhr | Cisco Enterprise Chat and Email Vulnerabilities | 2022-01-12T16:00:00+00:00 | 2022-01-12T16:00:00+00:00 |
| cisco-sa-ece-multivulns-kbK2yVhR | Cisco Enterprise Chat and Email Vulnerabilities | 2022-01-12T16:00:00+00:00 | 2022-01-12T16:00:00+00:00 |
| cisco-sa-csm-mult-xss-7hmokqtt | Cisco Security Manager Cross-Site Scripting Vulnerabilities | 2022-01-12T16:00:00+00:00 | 2022-01-12T16:00:00+00:00 |
| cisco-sa-csm-mult-xss-7hmOKQTt | Cisco Security Manager Cross-Site Scripting Vulnerabilities | 2022-01-12T16:00:00+00:00 | 2022-01-12T16:00:00+00:00 |
| cisco-sa-ccmp-priv-esc-jzhtflm4 | Cisco Unified Contact Center Management Portal and Unified Contact Center Domain Manager Privilege Escalation Vulnerability | 2022-01-12T16:00:00+00:00 | 2022-01-12T16:00:00+00:00 |
| cisco-sa-ccmp-priv-esc-JzhTFLm4 | Cisco Unified Contact Center Management Portal and Unified Contact Center Domain Manager Privilege Escalation Vulnerability | 2022-01-12T16:00:00+00:00 | 2022-01-12T16:00:00+00:00 |
| cisco-sa-cspc-info-disc-km3bgvl | Cisco Common Services Platform Collector Information Disclosure Vulnerability | 2021-11-03T16:00:00+00:00 | 2022-01-06T17:54:37+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-26706 | parisc: Fix random data corruption from exception handler | 2024-04-02T07:00:00.000Z | 2026-03-31T15:00:43.000Z |
| msrc_cve-2026-23118 | rxrpc: Fix data-race warning and potential load/store tearing | 2026-02-02T00:00:00.000Z | 2026-03-31T15:00:41.000Z |
| msrc_cve-2025-38127 | ice: fix Tx scheduler error handling in XDP callback | 2025-07-02T00:00:00.000Z | 2026-03-31T15:00:41.000Z |
| msrc_cve-2024-43913 | nvme: apple: fix device reference counting | 2024-08-02T00:00:00.000Z | 2026-03-31T15:00:38.000Z |
| msrc_cve-2025-38409 | drm/msm: Fix another leak in the submit error path | 2025-07-02T00:00:00.000Z | 2026-03-31T15:00:30.000Z |
| msrc_cve-2022-48667 | smb3: fix temporary data corruption in insert range | 2024-04-02T07:00:00.000Z | 2026-03-31T15:00:24.000Z |
| msrc_cve-2025-38125 | net: stmmac: make sure that ptp_rate is not 0 before configuring EST | 2025-07-02T00:00:00.000Z | 2026-03-31T15:00:19.000Z |
| msrc_cve-2024-26677 | rxrpc: Fix delayed ACKs to not set the reference serial number | 2024-04-02T07:00:00.000Z | 2026-03-31T15:00:19.000Z |
| msrc_cve-2026-23113 | io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop | 2026-02-02T00:00:00.000Z | 2026-03-31T15:00:18.000Z |
| msrc_cve-2024-35862 | smb: client: fix potential UAF in smb2_is_network_name_deleted() | 2024-05-02T07:00:00.000Z | 2026-03-31T15:00:17.000Z |
| msrc_cve-2024-35949 | btrfs: make sure that WRITTEN is set on all metadata blocks | 2024-05-02T07:00:00.000Z | 2026-03-31T15:00:06.000Z |
| msrc_cve-2024-40915 | riscv: rewrite __kernel_map_pages() to fix sleeping in invalid context | 2024-07-01T07:00:00.000Z | 2026-03-31T15:00:02.000Z |
| msrc_cve-2025-38117 | Bluetooth: MGMT: Protect mgmt_pending list with its own lock | 2025-07-02T00:00:00.000Z | 2026-03-31T14:59:55.000Z |
| msrc_cve-2025-21881 | uprobes: Reject the shared zeropage in uprobe_write_opcode() | 2025-03-02T00:00:00.000Z | 2026-03-31T14:59:55.000Z |
| msrc_cve-2024-49891 | scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths | 2024-10-01T07:00:00.000Z | 2026-03-31T14:59:55.000Z |
| msrc_cve-2026-23110 | scsi: core: Wake up the error handler when final completions race against each other | 2026-02-02T00:00:00.000Z | 2026-03-31T14:59:54.000Z |
| msrc_cve-2024-35864 | smb: client: fix potential UAF in smb2_is_valid_lease_break() | 2024-05-02T07:00:00.000Z | 2026-03-31T14:59:51.000Z |
| msrc_cve-2024-27400 | drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 | 2024-05-02T07:00:00.000Z | 2026-03-31T14:59:42.000Z |
| msrc_cve-2026-3591 | A stack use-after-return flaw in SIG(0) handling code may enable ACL bypass | 2026-03-02T00:00:00.000Z | 2026-03-31T14:59:36.000Z |
| msrc_cve-2024-37354 | btrfs: fix crash on racing fsync and size-extending write into prealloc | 2024-06-02T07:00:00.000Z | 2026-03-31T14:59:36.000Z |
| msrc_cve-2022-48979 | drm/amd/display: fix array index out of bound error in DCN32 DML | 2024-10-01T07:00:00.000Z | 2026-03-31T14:59:34.000Z |
| msrc_cve-2025-38105 | ALSA: usb-audio: Kill timer properly at removal | 2025-07-02T00:00:00.000Z | 2026-03-31T14:59:30.000Z |
| msrc_cve-2025-21872 | efi: Don't map the entire mokvar table to determine its size | 2025-03-02T00:00:00.000Z | 2026-03-31T14:59:30.000Z |
| msrc_cve-2024-53091 | bpf: Add sk_is_inet and IS_ICSK check in tls_sw_has_ctx_tx/rx | 2024-11-02T00:00:00.000Z | 2026-03-31T14:59:26.000Z |
| msrc_cve-2022-49134 | mlxsw: spectrum: Guard against invalid local ports | 2025-02-02T00:00:00.000Z | 2026-03-31T14:59:23.000Z |
| msrc_cve-2024-36914 | drm/amd/display: Skip on writeback when it's not applicable | 2024-05-02T07:00:00.000Z | 2026-03-31T14:59:10.000Z |
| msrc_cve-2023-53012 | thermal: core: call put_device() only after device_register() fails | 2025-03-02T00:00:00.000Z | 2026-03-31T14:59:06.000Z |
| msrc_cve-2026-3119 | Authenticated query containing a TKEY record may cause named to terminate unexpectedly | 2026-03-02T00:00:00.000Z | 2026-03-31T14:59:03.000Z |
| msrc_cve-2025-21863 | io_uring: prevent opcode speculation | 2025-03-02T00:00:00.000Z | 2026-03-31T14:59:00.000Z |
| msrc_cve-2024-43823 | PCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs() | 2024-08-02T00:00:00.000Z | 2026-03-31T14:58:48.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15394-1 | libsuricata8_0_0-8.0.0-1.1 on GA media | 2025-07-28T00:00:00Z | 2025-07-28T00:00:00Z |
| opensuse-su-2025:15393-1 | java-21-openj9-21.0.8.0-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
| opensuse-su-2025:15392-1 | java-1_8_0-openj9-1.8.0.462-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
| opensuse-su-2025:15391-1 | java-17-openj9-17.0.16.0-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
| opensuse-su-2025:15390-1 | java-11-openj9-11.0.28.0-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
| opensuse-su-2025:15389-1 | forgejo-longterm-11.0.3-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
| opensuse-su-2025:15388-1 | rpi-imager-1.9.5-1.1 on GA media | 2025-07-26T00:00:00Z | 2025-07-26T00:00:00Z |
| opensuse-su-2025:15387-1 | libmozjs-128-0-128.13.0-1.1 on GA media | 2025-07-26T00:00:00Z | 2025-07-26T00:00:00Z |
| opensuse-su-2025:15386-1 | MozillaFirefox-141.0-1.1 on GA media | 2025-07-26T00:00:00Z | 2025-07-26T00:00:00Z |
| opensuse-su-2025:15385-1 | perl-Authen-SASL-2.180.0-2.1 on GA media | 2025-07-25T00:00:00Z | 2025-07-25T00:00:00Z |
| opensuse-su-2025:15384-1 | apache2-2.4.65-1.1 on GA media | 2025-07-25T00:00:00Z | 2025-07-25T00:00:00Z |
| opensuse-su-2025:15383-1 | MozillaThunderbird-140.1.0-1.1 on GA media | 2025-07-25T00:00:00Z | 2025-07-25T00:00:00Z |
| opensuse-su-2025:15382-1 | ruby3.4-rubygem-thor-1.4.0-1.1 on GA media | 2025-07-24T00:00:00Z | 2025-07-24T00:00:00Z |
| opensuse-su-2025:15381-1 | python311-starlette-0.47.2-1.1 on GA media | 2025-07-24T00:00:00Z | 2025-07-24T00:00:00Z |
| opensuse-su-2025:15380-1 | jupyter-nbdime-7.0.2-21.1 on GA media | 2025-07-24T00:00:00Z | 2025-07-24T00:00:00Z |
| opensuse-su-2025:15379-1 | minio-client-20250721T052808Z-1.1 on GA media | 2025-07-24T00:00:00Z | 2025-07-24T00:00:00Z |
| opensuse-su-2025:15378-1 | javamail-1.6.2-3.1 on GA media | 2025-07-24T00:00:00Z | 2025-07-24T00:00:00Z |
| opensuse-su-2025:15377-1 | grype-db-0.35.0-1.1 on GA media | 2025-07-24T00:00:00Z | 2025-07-24T00:00:00Z |
| opensuse-su-2025:15376-1 | cloud-init-25.1.3-1.1 on GA media | 2025-07-24T00:00:00Z | 2025-07-24T00:00:00Z |
| opensuse-su-2025:15375-1 | chromedriver-138.0.7204.168-1.1 on GA media | 2025-07-24T00:00:00Z | 2025-07-24T00:00:00Z |
| opensuse-su-2025:15374-1 | viewvc-1.3.0~dev20250722-1.1 on GA media | 2025-07-23T00:00:00Z | 2025-07-23T00:00:00Z |
| opensuse-su-2025:15373-1 | jupyter-jupyterlab-templates-0.5.2-3.1 on GA media | 2025-07-23T00:00:00Z | 2025-07-23T00:00:00Z |
| opensuse-su-2025:15372-1 | grafana-11.6.3+security01-1.1 on GA media | 2025-07-23T00:00:00Z | 2025-07-23T00:00:00Z |
| opensuse-su-2025:15371-1 | firefox-esr-140.1.0-1.1 on GA media | 2025-07-23T00:00:00Z | 2025-07-23T00:00:00Z |
| opensuse-su-2025:15370-1 | hauler-1.2.5-1.1 on GA media | 2025-07-21T00:00:00Z | 2025-07-21T00:00:00Z |
| opensuse-su-2025:15369-1 | cyradm-3.8.6-1.1 on GA media | 2025-07-21T00:00:00Z | 2025-07-21T00:00:00Z |
| opensuse-su-2025:15368-1 | lemon-3.50.3-1.1 on GA media | 2025-07-20T00:00:00Z | 2025-07-20T00:00:00Z |
| opensuse-su-2025:15367-1 | python313-3.13.5-3.1 on GA media | 2025-07-20T00:00:00Z | 2025-07-20T00:00:00Z |
| opensuse-su-2025:15366-1 | python312-3.12.11-3.1 on GA media | 2025-07-20T00:00:00Z | 2025-07-20T00:00:00Z |
| opensuse-su-2025:15365-1 | python311-3.11.13-3.1 on GA media | 2025-07-20T00:00:00Z | 2025-07-20T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:7833 | Red Hat Security Advisory: golang security update | 2026-04-13T09:59:28+00:00 | 2026-05-08T15:00:38+00:00 |
| rhsa-2026:7674 | Red Hat Security Advisory: rhc security update | 2026-04-13T02:53:32+00:00 | 2026-05-08T15:00:37+00:00 |
| rhsa-2026:7669 | Red Hat Security Advisory: rhc security update | 2026-04-13T02:01:06+00:00 | 2026-05-08T15:00:37+00:00 |
| rhsa-2026:7665 | Red Hat Security Advisory: rhc security update | 2026-04-13T02:29:01+00:00 | 2026-05-08T15:00:36+00:00 |
| rhsa-2026:7328 | Red Hat Security Advisory: rhc security update | 2026-04-09T15:29:16+00:00 | 2026-05-08T15:00:36+00:00 |
| rhsa-2026:7315 | Red Hat Security Advisory: rhc security update | 2026-04-09T14:48:57+00:00 | 2026-05-08T15:00:35+00:00 |
| rhsa-2026:7259 | Red Hat Security Advisory: git-lfs security update | 2026-04-09T09:55:16+00:00 | 2026-05-08T15:00:35+00:00 |
| rhsa-2026:7011 | Red Hat Security Advisory: grafana security update | 2026-04-08T13:36:08+00:00 | 2026-05-08T15:00:35+00:00 |
| rhsa-2026:7009 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-08T13:35:28+00:00 | 2026-05-08T15:00:34+00:00 |
| rhsa-2026:7005 | Red Hat Security Advisory: git-lfs security update | 2026-04-08T11:31:47+00:00 | 2026-05-08T15:00:34+00:00 |
| rhsa-2026:6949 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-04-08T00:41:20+00:00 | 2026-05-08T15:00:33+00:00 |
| rhsa-2026:6720 | Red Hat Security Advisory: Red Hat Quay 3.12.16 | 2026-04-06T22:57:46+00:00 | 2026-05-08T15:00:33+00:00 |
| rhsa-2026:6388 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-01T14:40:49+00:00 | 2026-05-08T15:00:31+00:00 |
| rhsa-2026:6383 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-01T14:59:14+00:00 | 2026-05-08T15:00:31+00:00 |
| rhsa-2026:6382 | Red Hat Security Advisory: grafana security update | 2026-04-01T14:57:19+00:00 | 2026-05-08T15:00:31+00:00 |
| rhsa-2026:6344 | Red Hat Security Advisory: grafana security update | 2026-04-01T11:23:28+00:00 | 2026-05-08T15:00:30+00:00 |
| rhsa-2026:6341 | Red Hat Security Advisory: Red Hat build of Cryostat security update | 2026-04-01T09:19:49+00:00 | 2026-05-08T15:00:30+00:00 |
| rhsa-2026:5942 | Red Hat Security Advisory: golang security update | 2026-03-26T13:53:57+00:00 | 2026-05-08T15:00:29+00:00 |
| rhsa-2026:5944 | Red Hat Security Advisory: golang security update | 2026-03-26T14:09:22+00:00 | 2026-05-08T15:00:26+00:00 |
| rhsa-2026:5943 | Red Hat Security Advisory: golang security update | 2026-03-26T13:47:37+00:00 | 2026-05-08T15:00:26+00:00 |
| rhsa-2026:5941 | Red Hat Security Advisory: golang security update | 2026-03-26T13:40:22+00:00 | 2026-05-08T15:00:25+00:00 |
| rhsa-2026:14020 | Red Hat Security Advisory: Release of components for Service Telemetry Framework 1.5.7 | 2026-05-06T11:39:14+00:00 | 2026-05-08T14:59:19+00:00 |
| rhsa-2026:13736 | Red Hat Security Advisory: OpenShift Container Platform 4.18.40 bug fix and security update | 2026-05-06T19:58:31+00:00 | 2026-05-08T14:59:18+00:00 |
| rhsa-2026:13671 | Red Hat Security Advisory: image-builder security update | 2026-05-05T10:29:37+00:00 | 2026-05-08T14:59:18+00:00 |
| rhsa-2026:13643 | Red Hat Security Advisory: osbuild-composer security update | 2026-05-05T09:28:37+00:00 | 2026-05-08T14:59:18+00:00 |
| rhsa-2026:13642 | Red Hat Security Advisory: image-builder security update | 2026-05-05T09:23:22+00:00 | 2026-05-08T14:59:17+00:00 |
| rhsa-2026:13512 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2026-05-04T14:31:09+00:00 | 2026-05-08T14:59:17+00:00 |
| rhsa-2026:13508 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Product Security and Bug Fix Update | 2026-05-04T14:10:09+00:00 | 2026-05-08T14:59:17+00:00 |
| rhsa-2026:11800 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.2.10 | 2026-04-29T15:26:45+00:00 | 2026-05-08T14:59:15+00:00 |
| rhsa-2026:11686 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.15 | 2026-04-29T12:06:04+00:00 | 2026-05-08T14:59:14+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0539-1 | Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T13:33:40Z | 2026-02-15T13:33:40Z |
| suse-su-2026:0535-1 | Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T11:04:06Z | 2026-02-15T11:04:06Z |
| suse-su-2026:20436-1 | Security update for nodejs22 | 2026-02-15T08:45:21Z | 2026-02-15T08:45:21Z |
| suse-su-2026:0528-1 | Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T06:33:50Z | 2026-02-15T06:33:50Z |
| suse-su-2026:0533-1 | Security update for the Linux Kernel (Live Patch 45 for SUSE Linux Enterprise 15 SP4) | 2026-02-15T06:33:38Z | 2026-02-15T06:33:38Z |
| suse-su-2026:20435-1 | Security update for fontforge | 2026-02-14T21:30:08Z | 2026-02-14T21:30:08Z |
| suse-su-2026:0526-1 | Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4) | 2026-02-14T19:33:43Z | 2026-02-14T19:33:43Z |
| suse-su-2026:0525-1 | Security update for the Linux Kernel (Live Patch 73 for SUSE Linux Enterprise 12 SP5) | 2026-02-14T17:04:03Z | 2026-02-14T17:04:03Z |
| suse-su-2026:0524-1 | Security update for the Linux Kernel (Live Patch 72 for SUSE Linux Enterprise 12 SP5) | 2026-02-14T17:03:57Z | 2026-02-14T17:03:57Z |
| suse-su-2026:0521-1 | Security update for the Linux Kernel (Live Patch 69 for SUSE Linux Enterprise 12 SP5) | 2026-02-14T12:03:47Z | 2026-02-14T12:03:47Z |
| suse-su-2026:0518-1 | Security update for the Linux Kernel (Live Patch 64 for SUSE Linux Enterprise 12 SP5) | 2026-02-14T09:03:51Z | 2026-02-14T09:03:51Z |
| suse-su-2026:0517-1 | Security update for protobuf | 2026-02-14T08:25:01Z | 2026-02-14T08:25:01Z |
| suse-su-2026:0515-1 | Security update for the Linux Kernel (Live Patch 65 for SUSE Linux Enterprise 12 SP5) | 2026-02-13T23:04:09Z | 2026-02-13T23:04:09Z |
| suse-su-2026:20434-1 | Security update for openCryptoki | 2026-02-13T17:44:22Z | 2026-02-13T17:44:22Z |
| suse-su-2026:20345-1 | Security update for openCryptoki | 2026-02-13T17:42:31Z | 2026-02-13T17:42:31Z |
| suse-su-2026:20352-1 | Security update for protobuf | 2026-02-13T16:56:15Z | 2026-02-13T16:56:15Z |
| suse-su-2026:20350-1 | Security update for expat | 2026-02-13T16:46:23Z | 2026-02-13T16:46:23Z |
| suse-su-2026:20431-1 | Security update for patch | 2026-02-13T16:41:48Z | 2026-02-13T16:41:48Z |
| suse-su-2026:20343-1 | Security update for patch | 2026-02-13T16:41:48Z | 2026-02-13T16:41:48Z |
| suse-su-2026:0514-1 | Security update for cargo-auditable | 2026-02-13T14:57:18Z | 2026-02-13T14:57:18Z |
| suse-su-2026:0510-1 | Security update for util-linux | 2026-02-13T14:52:46Z | 2026-02-13T14:52:46Z |
| suse-su-2026:0508-1 | Security update for curl | 2026-02-13T14:50:33Z | 2026-02-13T14:50:33Z |
| suse-su-2026:0506-1 | Security update for cargo-auditable | 2026-02-13T14:32:17Z | 2026-02-13T14:32:17Z |
| suse-su-2026:0505-1 | Security update for cargo-auditable | 2026-02-13T14:31:50Z | 2026-02-13T14:31:50Z |
| suse-su-2026:0504-1 | Security update for java-1_8_0-openjdk | 2026-02-13T14:24:00Z | 2026-02-13T14:24:00Z |
| suse-su-2026:0503-1 | Security update for ImageMagick | 2026-02-13T14:23:00Z | 2026-02-13T14:23:00Z |
| suse-su-2026:20429-1 | Security update for go1.24 | 2026-02-13T11:58:52Z | 2026-02-13T11:58:52Z |
| suse-su-2026:0499-1 | Security update for glibc-livepatches | 2026-02-13T11:42:17Z | 2026-02-13T11:42:17Z |
| suse-su-2026:0498-1 | Security update for openssl1 | 2026-02-13T10:56:54Z | 2026-02-13T10:56:54Z |
| suse-su-2026:0497-1 | Security update for libsoup2 | 2026-02-13T10:56:05Z | 2026-02-13T10:56:05Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:9122 | Moderate: xorg-x11-server security update | 2024-11-12T00:00:00Z | 2024-11-18T11:50:34Z |
| alsa-2024:9405 | Low: vim security update | 2024-11-12T00:00:00Z | 2024-11-18T11:49:53Z |
| alsa-2024:9195 | Moderate: cyrus-imapd security update | 2024-11-12T00:00:00Z | 2024-11-18T11:49:43Z |
| alsa-2024:9559 | Important: libsoup security update | 2024-11-13T00:00:00Z | 2024-11-18T11:49:25Z |
| alsa-2024:9458 | Moderate: python3.11-urllib3 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:49:14Z |
| alsa-2024:9457 | Moderate: python3.12-urllib3 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:49:13Z |
| alsa-2024:9442 | Moderate: mingw-glib2 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:49:07Z |
| alsa-2024:9423 | Moderate: python-dns security update | 2024-11-12T00:00:00Z | 2024-11-18T11:49:05Z |
| alsa-2024:9281 | Moderate: python-jwcrypto security update | 2024-11-12T00:00:00Z | 2024-11-18T11:48:49Z |
| alsa-2024:9158 | Moderate: lldpd security update | 2024-11-12T00:00:00Z | 2024-11-18T11:48:33Z |
| alsa-2024:9150 | Moderate: python-jinja2 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:48:33Z |
| alsa-2024:9548 | Important: openexr security update | 2024-11-13T00:00:00Z | 2024-11-18T11:48:22Z |
| alsa-2024:9456 | Important: osbuild-composer security update | 2024-11-12T00:00:00Z | 2024-11-18T11:48:14Z |
| alsa-2024:9413 | Moderate: bluez security update | 2024-11-12T00:00:00Z | 2024-11-18T11:48:04Z |
| alsa-2024:9181 | Moderate: jose security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:46Z |
| alsa-2024:9093 | Moderate: xorg-x11-server-Xwayland security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:41Z |
| alsa-2024:9827 | Moderate: libvpx security update | 2024-11-18T00:00:00Z | 2024-11-18T11:47:38Z |
| alsa-2024:9541 | Moderate: expat security update | 2024-11-13T00:00:00Z | 2024-11-18T11:47:33Z |
| alsa-2024:9473 | Important: grafana security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:32Z |
| alsa-2024:9459 | Important: buildah security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:30Z |
| alsa-2024:9439 | Moderate: fontforge security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:24Z |
| alsa-2024:9404 | Moderate: libgcrypt security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:20Z |
| alsa-2024:9185 | Moderate: iperf3 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:13Z |
| alsa-2024:9135 | Moderate: toolbox security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:10Z |
| alsa-2024:9098 | Moderate: skopeo security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:09Z |
| alsa-2024:9625 | Important: squid security update | 2024-11-14T00:00:00Z | 2024-11-18T11:47:07Z |
| alsa-2024:9472 | Important: grafana-pcp security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:05Z |
| alsa-2024:9430 | Low: nano security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:01Z |
| alsa-2024:9424 | Low: tpm2-tools security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:01Z |
| alsa-2024:9401 | Moderate: microcode_ctl security update | 2024-11-12T00:00:00Z | 2024-11-18T11:46:59Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-1207 | Security exception in java.desktop/java.awt.image.DataBufferInt.<init> | 2022-11-25T13:00:24.374896Z | 2022-11-25T13:00:24.375136Z |
| osv-2022-664 | Heap-buffer-overflow in decode_preR13_section_hdr | 2022-08-02T00:00:39.660612Z | 2022-11-25T00:14:56.081549Z |
| osv-2022-1199 | Use-of-uninitialized-value in rawspeed::RawImageData::checkRowIsInitialized | 2022-11-23T13:02:10.345362Z | 2022-11-23T13:02:10.345722Z |
| osv-2022-1194 | Heap-buffer-overflow in sputs | 2022-11-23T13:00:27.864744Z | 2022-11-23T13:00:27.864987Z |
| osv-2022-1193 | Heap-buffer-overflow in archive_read_has_encrypted_entries | 2022-11-22T13:02:17.631310Z | 2022-11-22T13:02:17.631547Z |
| osv-2022-398 | Heap-buffer-overflow in json_common_entity_data | 2022-05-07T00:00:06.828980Z | 2022-11-20T00:16:38.866820Z |
| osv-2022-1180 | Heap-buffer-overflow in json_common_entity_data | 2022-11-18T13:02:18.978213Z | 2022-11-18T13:02:18.978476Z |
| osv-2022-1177 | Stack-buffer-overflow in FLAC::Decoder::FuzzerDecoder::metadata_callback | 2022-11-18T13:00:31.496514Z | 2022-11-18T13:00:31.496753Z |
| osv-2022-1169 | Heap-use-after-free in output_thread | 2022-11-12T13:02:27.360322Z | 2022-11-12T13:02:27.360588Z |
| osv-2022-1166 | Use-of-uninitialized-value in TLSDecodeHandshakeHello | 2022-11-12T13:00:09.891864Z | 2022-11-12T13:00:09.892117Z |
| osv-2022-1164 | Heap-buffer-overflow in virtio_net_queue_enable | 2022-11-11T13:02:08.720876Z | 2022-11-11T13:02:08.721115Z |
| osv-2022-1163 | Negative-size-param in mrb_str_format | 2022-11-11T13:01:06.175780Z | 2022-11-11T13:01:06.176039Z |
| osv-2022-1162 | Null-dereference READ | 2022-11-11T13:00:54.864747Z | 2022-11-11T13:00:54.864997Z |
| osv-2022-1161 | UNKNOWN READ in pack_unpack | 2022-11-10T13:02:30.999392Z | 2022-11-10T13:02:30.999645Z |
| osv-2022-1160 | Index-out-of-bounds in str_init_embed | 2022-11-10T13:02:30.022816Z | 2022-11-10T13:02:30.023077Z |
| osv-2022-1159 | Heap-buffer-overflow in LibRaw_buffer_datastream::read | 2022-11-10T13:02:24.758084Z | 2022-11-10T13:02:24.758462Z |
| osv-2022-1157 | Stack-buffer-overflow in merge_utf16be_ascii | 2022-11-10T13:00:16.300150Z | 2022-11-10T13:00:16.300418Z |
| osv-2022-1153 | Heap-buffer-overflow in parse_via_param | 2022-11-08T13:00:06.384152Z | 2022-11-09T04:08:50.426121Z |
| osv-2022-1074 | Invalid-free in _dealloc | 2022-10-22T00:00:27.668938Z | 2022-11-09T00:00:27.669183Z |
| osv-2021-1565 | Memcpy-param-overlap in parquet::DeltaByteArrayDecoder::GetInternal | 2021-11-12T00:00:22.286310Z | 2022-11-07T00:00:00.061851Z |
| osv-2021-1549 | Uncaught exception in com.google.gson.internal.bind.TypeAdapters$27.read | 2021-11-09T00:00:09.004185Z | 2022-11-06T23:48:30.706011Z |
| osv-2022-1151 | Heap-buffer-overflow in mg_mqtt_parse | 2022-11-06T00:02:38.065165Z | 2022-11-06T00:02:38.065390Z |
| osv-2022-1150 | Heap-buffer-overflow in js_free_function_def | 2022-11-06T00:02:37.597350Z | 2022-11-06T00:02:37.597550Z |
| osv-2022-1149 | Heap-buffer-overflow in gbNUMBER_mbc_enc_len | 2022-11-06T00:02:33.238692Z | 2022-11-06T00:02:33.238946Z |
| osv-2022-1148 | Stack-buffer-underflow in gs_type2_interpret | 2022-11-06T00:02:24.119500Z | 2022-11-06T00:02:24.119722Z |
| osv-2022-1145 | Heap-buffer-overflow in gbNUMBER_mbc_enc_len | 2022-11-06T00:01:05.747777Z | 2022-11-06T00:01:05.748011Z |
| osv-2022-1144 | Heap-buffer-overflow in onigenc_mbn_mbc_case_fold | 2022-11-06T00:00:40.796078Z | 2022-11-06T00:00:40.796330Z |
| osv-2022-1143 | UNKNOWN READ in Ins_MSIRP | 2022-11-06T00:00:25.171482Z | 2022-11-06T00:00:25.171703Z |
| osv-2022-1142 | Heap-buffer-overflow in onigenc_unicode_mbc_case_fold | 2022-11-06T00:00:24.469442Z | 2022-11-06T00:00:24.469652Z |
| osv-2022-1136 | Heap-buffer-overflow in rx_ip | 2022-11-05T00:00:11.545292Z | 2022-11-05T00:00:11.545557Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-tomcat-2025-52434 | Apache Tomcat: APR/Native Connector crash leading to DoS | 2025-07-16T08:18:56.172Z | 2025-11-06T13:25:46.476Z |
| bit-tomcat-2023-42794 | Apache Tomcat: FileUpload: DoS due to accumulation of temporary files on Windows | 2024-03-06T11:08:11.491Z | 2025-11-06T13:25:46.476Z |
| bit-tomcat-2020-1935 | 2024-03-06T11:11:33.381Z | 2025-11-06T13:25:46.476Z | |
| bit-tensorflow-2022-41883 | Out of bounds segmentation fault due to unequal op inputs in Tensorflow | 2024-03-06T11:11:35.699Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2025-55675 | Apache Superset: Incorrect datasource authorization on REST API | 2025-08-18T08:13:52.905Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2025-55674 | Apache Superset: Improper SQL authorisation, parse not checking for specific engine functions | 2025-08-18T08:13:51.077Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2025-55673 | Apache Superset: Metadata exposure in embedded charts | 2025-08-18T08:13:49.073Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2025-55672 | Apache Superset: Stored XSS on charts metadata | 2025-08-18T08:13:46.716Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-45438 | Apache Superset: Dashboard metadata information leak | 2025-02-05T07:28:48.307Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43721 | Apache Superset: Open Redirect Vulnerability | 2025-02-05T07:28:53.604Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43720 | Apache Superset: Improper rendering of user input | 2025-02-05T07:28:59.302Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43719 | Apache Superset: Cross Site Request Forgery (CSRF) on accept, request access API | 2025-02-05T07:29:05.011Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43718 | Apache Superset: Cross-Site Scripting vulnerability on upload forms | 2025-02-05T07:29:11.197Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43717 | Apache Superset: Cross-Site Scripting on dashboards | 2025-02-05T07:29:16.011Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-41703 | Apache Superset: SQL injection vulnerability in adhoc clauses | 2025-02-05T07:29:20.796Z | 2025-11-06T13:25:46.476Z |
| bit-sqlite-2023-7104 | SQLite SQLite3 make alltest sqlite3session.c sessionReadRecord heap-based overflow | 2024-03-06T11:05:41.196Z | 2025-11-06T13:25:46.476Z |
| bit-sqlite-2021-36690 | 2024-03-06T11:06:24.567Z | 2025-11-06T13:25:46.476Z | |
| bit-setuptools-2022-40897 | 2024-03-06T11:04:50.199Z | 2025-11-06T13:25:46.476Z | |
| bit-ruby-2024-27282 | 2024-06-04T09:56:49.809Z | 2025-11-06T13:25:46.476Z | |
| bit-ruby-2023-28756 | 2024-03-06T11:04:05.363Z | 2025-11-06T13:25:46.476Z | |
| bit-ruby-2022-28739 | 2024-03-06T11:04:15.708Z | 2025-11-06T13:25:46.476Z | |
| bit-ruby-2021-33621 | 2024-03-06T11:05:00.460Z | 2025-11-06T13:25:46.476Z | |
| bit-ruby-2020-5247 | HTTP Response Splitting in Puma | 2024-03-06T11:05:50.672Z | 2025-11-06T13:25:46.476Z |
| bit-redis-2025-46819 | Redis is vulnerable to DoS via specially crafted LUA scripts | 2025-10-08T08:51:28.594Z | 2025-11-06T13:25:46.476Z |
| bit-redis-2024-31228 | Denial-of-service due to unbounded pattern matching in Redis | 2024-10-09T16:41:13.129Z | 2025-11-06T13:25:46.476Z |
| bit-redis-2022-35977 | Integer overflow in certain command arguments can drive Redis to OOM panic | 2024-03-06T11:05:24.585Z | 2025-11-06T13:25:46.476Z |
| bit-python-2025-0938 | URL parser allowed square brackets in domain names | 2025-04-14T11:35:18.242Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-9287 | Virtual environment (venv) activation scripts don't quote paths | 2024-12-13T12:39:42.210Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-8088 | Infinite loop when iterating over zip archive entry names from zipfile.Path | 2025-04-14T11:34:52.441Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-7592 | Quadratic complexity parsing cookies with backslashes | 2024-09-16T12:03:55.576Z | 2025-11-06T13:25:46.476Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0743 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0742 | Vulnérabilité dans Microsoft Edge | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0741 | Vulnérabilité dans Wireshark | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0740 | Multiples vulnérabilités dans Tenable Security Center | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0739 | Multiples vulnérabilités dans Asterisk | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0738 | Multiples vulnérabilités dans les produits Elastic | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| CERTFR-2025-AVI-0746 | Multiples vulnérabilités dans les produits IBM | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| CERTFR-2025-AVI-0745 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| CERTFR-2025-AVI-0744 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| CERTFR-2025-AVI-0743 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| CERTFR-2025-AVI-0742 | Vulnérabilité dans Microsoft Edge | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| CERTFR-2025-AVI-0741 | Vulnérabilité dans Wireshark | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| CERTFR-2025-AVI-0740 | Multiples vulnérabilités dans Tenable Security Center | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| CERTFR-2025-AVI-0739 | Multiples vulnérabilités dans Asterisk | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| CERTFR-2025-AVI-0738 | Multiples vulnérabilités dans les produits Elastic | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0737 | Multiples vulnérabilités dans les produits Cisco | 2025-08-28T00:00:00.000000 | 2025-08-28T00:00:00.000000 |
| certfr-2025-avi-0736 | Multiples vulnérabilités dans GitLab | 2025-08-28T00:00:00.000000 | 2025-08-28T00:00:00.000000 |
| certfr-2025-avi-0735 | Vulnérabilité dans GLPI | 2025-08-28T00:00:00.000000 | 2025-08-28T00:00:00.000000 |
| certfr-2025-avi-0734 | Vulnérabilité dans ISC Kea DHCP | 2025-08-28T00:00:00.000000 | 2025-08-28T00:00:00.000000 |
| certfr-2025-avi-0733 | Vulnérabilité dans Nagios XI | 2025-08-28T00:00:00.000000 | 2025-08-28T00:00:00.000000 |
| CERTFR-2025-AVI-0737 | Multiples vulnérabilités dans les produits Cisco | 2025-08-28T00:00:00.000000 | 2025-08-28T00:00:00.000000 |
| CERTFR-2025-AVI-0736 | Multiples vulnérabilités dans GitLab | 2025-08-28T00:00:00.000000 | 2025-08-28T00:00:00.000000 |
| CERTFR-2025-AVI-0735 | Vulnérabilité dans GLPI | 2025-08-28T00:00:00.000000 | 2025-08-28T00:00:00.000000 |
| CERTFR-2025-AVI-0734 | Vulnérabilité dans ISC Kea DHCP | 2025-08-28T00:00:00.000000 | 2025-08-28T00:00:00.000000 |
| CERTFR-2025-AVI-0733 | Vulnérabilité dans Nagios XI | 2025-08-28T00:00:00.000000 | 2025-08-28T00:00:00.000000 |
| certfr-2025-avi-0732 | Vulnérabilité dans Google Chrome | 2025-08-27T00:00:00.000000 | 2025-08-27T00:00:00.000000 |
| certfr-2025-avi-0731 | Vulnérabilité dans Shibboleth Identity Provider | 2025-08-27T00:00:00.000000 | 2025-08-27T00:00:00.000000 |
| CERTFR-2025-AVI-0732 | Vulnérabilité dans Google Chrome | 2025-08-27T00:00:00.000000 | 2025-08-27T00:00:00.000000 |
| CERTFR-2025-AVI-0731 | Vulnérabilité dans Shibboleth Identity Provider | 2025-08-27T00:00:00.000000 | 2025-08-27T00:00:00.000000 |
| certfr-2025-avi-0730 | Multiples vulnérabilités dans Citrix NetScaler ADC et NetScaler Gateway | 2025-08-26T00:00:00.000000 | 2025-08-26T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2017-000181 | WordPress plugin "Popup Maker" vulnerable to cross-site scripting | 2017-07-24T13:52+09:00 | 2018-01-24T14:03+09:00 |
| jvndb-2017-000177 | RBB SPEED TEST App fails to verify SSL server certificates | 2017-07-24T15:08+09:00 | 2018-01-24T14:03+09:00 |
| jvndb-2017-000107 | RW-5100 tool to verify execution environment may insecurely load Dynamic Link Libraries | 2017-06-01T16:47+09:00 | 2018-01-24T14:03+09:00 |
| jvndb-2015-000049 | "Restaurant Karaoke SHIDAX" App for Android fails to verify SSL server certificates | 2015-04-03T13:36+09:00 | 2018-01-24T14:03+09:00 |
| jvndb-2017-000186 | NFC Port Software remover may insecurely load Dynamic Link Libraries | 2017-07-27T15:38+09:00 | 2018-01-24T14:02+09:00 |
| jvndb-2017-000187 | Installer of LhaForge may insecurely load Dynamic Link Libraries | 2017-07-27T14:31+09:00 | 2018-01-24T13:59+09:00 |
| jvndb-2017-000104 | RW-4040 driver installer may insecurely load Dynamic Link Libraries | 2017-06-01T16:25+09:00 | 2018-01-24T13:57+09:00 |
| jvndb-2017-000185 | Multiple vulnerabilities in I-O DATA WN-AX1167GR | 2017-07-27T14:26+09:00 | 2018-01-24T13:56+09:00 |
| jvndb-2017-000057 | CS-Cart Japanese Edition vulnerable to cross-site request forgery | 2017-04-10T18:13+09:00 | 2018-01-24T13:49+09:00 |
| jvndb-2017-000180 | Multiple vulnerabilities in multiple Buffalo wireless LAN routers | 2017-07-20T14:13+09:00 | 2018-01-24T12:34+09:00 |
| jvndb-2017-000175 | Multiple vulnerabilities SONY Portable Wireless Server WG-C10 | 2017-07-19T15:07+09:00 | 2018-01-24T12:34+09:00 |
| jvndb-2017-000131 | Cybozu KUNAI for Android vulnerable to cross-site scripting | 2017-06-12T13:36+09:00 | 2018-01-24T12:34+09:00 |
| jvndb-2017-000127 | Cross-site scripting vulnerability in WordPress plugin "WordPress Download Manager" | 2017-06-13T14:11+09:00 | 2018-01-24T12:24+09:00 |
| jvndb-2017-000128 | Open redirect vulnerability in WordPress plugin "WordPress Download Manager" | 2017-06-13T14:11+09:00 | 2018-01-24T12:21+09:00 |
| jvndb-2017-000125 | AppCheck may insecurely invoke an executable file | 2017-06-07T14:54+09:00 | 2018-01-24T12:15+09:00 |
| jvndb-2017-000124 | The installer of SemiDynaEXE provided by Geospatial Information Authority of Japan (GSI) may insecurely load Dynamic Link Libraries | 2017-06-08T15:31+09:00 | 2018-01-24T12:15+09:00 |
| jvndb-2017-000123 | The installer of TKY2JGD provided by Geospatial Information Authority of Japan (GSI) may insecurely load Dynamic Link Libraries | 2017-06-08T15:31+09:00 | 2018-01-24T12:15+09:00 |
| jvndb-2017-000122 | The installer of PatchJGD(Hyoko) provided by Geospatial Information Authority of Japan (GSI) may insecurely load Dynamic Link Libraries | 2017-06-08T15:31+09:00 | 2018-01-24T12:15+09:00 |
| jvndb-2017-000121 | The installer of PatchJGD provided by Geospatial Information Authority of Japan (GSI) may insecurely load Dynamic Link Libraries | 2017-06-08T15:31+09:00 | 2018-01-24T12:15+09:00 |
| jvndb-2015-000186 | ManageEngine Firewall Analyzer fails to restrict access permissions | 2015-11-27T13:29+09:00 | 2018-01-24T12:12+09:00 |
| jvndb-2015-000185 | ManageEngine Firewall Analyzer vulnerable to directory traversal | 2015-11-27T13:28+09:00 | 2018-01-24T12:05+09:00 |
| jvndb-2017-000089 | GroupSession fails to restrict access permissions | 2017-05-25T14:14+09:00 | 2018-01-24T11:59+09:00 |
| jvndb-2016-000165 | Splunk Enterprise and Splunk Light vulnerable to cross-site scripting | 2016-09-16T14:17+09:00 | 2018-01-24T11:53+09:00 |
| jvndb-2017-005606 | Multiple vulnerabilities in Deep Discovery Email Inspector | 2018-01-17T16:15+09:00 | 2018-01-17T16:15+09:00 |
| jvndb-2017-002290 | Trend Micro Control Manager vulnerable to SQL injection | 2018-01-17T16:15+09:00 | 2018-01-17T16:15+09:00 |
| jvndb-2016-000246 | Mutiple SONY Videoconference Systems do not properly perform authentication | 2016-12-16T14:11+09:00 | 2018-01-17T14:03+09:00 |
| jvndb-2017-000115 | WordPress plugin "Multi Feed Reader" vulnerable to SQL injection | 2017-06-06T14:54+09:00 | 2018-01-17T13:58+09:00 |
| jvndb-2017-000102 | The installer of the Ministry of Justice [The electronic authentication system based on the commercial registration system "The CRCA user's Software"] may insecurely load Dynamic Link Libraries | 2017-06-06T11:19+09:00 | 2018-01-17T13:58+09:00 |
| jvndb-2017-000100 | Installer of electronic tendering and bid opening system provided by Acquisition, Technology & Logistics Agency may insecurely load Dynamic Link Libraries | 2017-05-25T14:14+09:00 | 2018-01-17T13:58+09:00 |
| jvndb-2016-000233 | The installers of multiple Japan Pension Service software may insecurely load Dynamic Link Libraries | 2016-12-01T13:40+09:00 | 2018-01-17T13:54+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-07199 | Microsoft Office Click-To-Run代码执行漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07198 | Microsoft Excel代码执行漏洞(CNVD-2026-07198) | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07197 | Microsoft Excel代码执行漏洞(CNVD-2026-07197) | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08442 | iccDEV SIccCalcOp::ArgsPushed函数类型混淆漏洞 | 2026-01-14 | 2026-01-26 |
| cnvd-2026-08441 | iccDEV CIccProfileXml::ParseBasic函数类型混淆漏洞 | 2026-01-14 | 2026-01-26 |
| cnvd-2026-08440 | iccDEV CIccTagXmlTagData::ToXml函数类型混淆漏洞 | 2026-01-14 | 2026-01-26 |
| cnvd-2026-08439 | iccDEV CIccTag:IsTypeCompressed函数类型混淆漏洞 | 2026-01-14 | 2026-01-26 |
| cnvd-2026-08438 | iccDEV ToXmlCurve函数类型混淆漏洞 | 2026-01-14 | 2026-01-26 |
| cnvd-2026-08437 | iccDEV CIccSegmentedCurveXml::ToXml函数类型混淆漏洞 | 2026-01-14 | 2026-01-26 |
| cnvd-2026-08436 | iccDEV icStatusCMM::CIccEvalCompare::EvaluateProfile函数类型混淆漏洞 | 2026-01-14 | 2026-01-26 |
| cnvd-2026-08435 | iccDEV CIccSingleSampledeCurveXml类的类型混淆漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08429 | iccDEV Unicode缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08428 | iccDEV CIccTagText::Read函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08427 | iccDEV CIccTagLut8::Validate函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08426 | iccDEV CIccTagLut16::Validate函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08425 | iccDEV CIccSparseMatrix::CIccSparseMatrix函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08424 | iccDEV CIccProfile::LoadTag函数输入验证不当漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08423 | iccDEV CIccMBB::Validate函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08422 | iccDEV CIccCalculatorFunc::SequenceNeedTempReset函数越界读取漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08421 | iccDEV ICC颜色配置文件未定义行为漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08420 | iccDEV计算器解析器堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08419 | iccDEV CIccProfileXml::ParseBasic函数空指针取消引用漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07952 | iccDEV未知标签解析器空指针取消引用漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07951 | iccDEV ICC色彩配置文件空指针取消引用漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07950 | iccDEV数字错误漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07949 | iccDEV CIccTagLutAtoB::Validate函数未定义行为漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07948 | iccDEV CIccTagLut16::Read函数未定义行为漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07947 | iccDEV XML计算器宏扩展堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07946 | iccDEV XML标签解析器空指针引用漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07945 | iccDEV CIccTagSpectralViewingConditions函数未定义行为漏洞 | 2026-01-19 | 2026-01-26 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01313 | Уязвимость функции sco_sock_kill() модуля net/bluetooth/sco.c подсистемы Bluetooth ядра о… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01312 | Уязвимость функции bcsp_recv() модуля drivers/bluetooth/hci_bcsp.c драйвера устройств Blu… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01311 | Уязвимость функции virtio_gpu_cmd_transfer_to_host_2d() ядра операционной системы Linux, … | 06.02.2026 | 06.02.2026 |
| bdu:2026-01310 | Уязвимость функции snd_usbmidi_output_open() модуля sound/usb/midi.c поддержки звуковых у… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01309 | Уязвимость функции ntfs_read_mft() ядра операционной системы Linux, позволяющая нарушител… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01308 | Уязвимость функции bit_putcs() модуля drivers/video/fbdev/core/bitblit.c драйвера устройс… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01307 | Уязвимость функции safexcel_probe_generic() ядра операционной системы Linux, позволяющая … | 06.02.2026 | 06.02.2026 |
| bdu:2026-01306 | Уязвимость функций hfs_find_init() и hfs_brec_find() модуля fs/hfsplus/bfind.c поддержки … | 06.02.2026 | 06.02.2026 |
| bdu:2026-01305 | Уязвимость функции map_create() ядра операционной системы Linux, позволяющая нарушителю в… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01304 | Уязвимость функции bus_error030 () ядра операционной системы Linux, позволяющая нарушител… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01303 | Уязвимость функции ov5675_init_controls() ядра операционной системы Linux, позволяющая на… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01302 | Уязвимость функции adreno_gpu_init() модуля drivers/gpu/drm/msm/adreno/adreno_gpu.c драйв… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01301 | Уязвимость функции ntfs_new_inode() модуля fs/ntfs3/fsntfs.c файловой системы NTFS 3 ядра… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01300 | Уязвимость функции gdlm_put_lock() модуля fs/gfs2/lock_dlm.c файловой системы GFS2 ядра о… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01299 | Уязвимость функции __replace_atomic_write_block() модуля fs/f2fs/segment.c файловой систе… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01298 | Уязвимость функции nonstatic_release_resource_db() модуля drivers/pcmcia/rsrc_nonstatic.c… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01297 | Уязвимость функции isert_wait_conn() модуля drivers/infiniband/ulp/isert/ib_isert.c драйв… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01296 | Уязвимость функции xfrm_state_delete_tunnel() модуля net/xfrm/xfrm_state.c ядра операцион… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01295 | Уязвимость функции kcm_sendmsg() в модуле net/kcm/kcmsock.c реализации сетевых функций яд… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01294 | Уязвимость функции vmw_cmd_dma() модуля drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c драйвера … | 06.02.2026 | 06.02.2026 |
| bdu:2026-01293 | Уязвимость функции ipcomp_free_scratches() модуля net/xfrm/xfrm_ipcomp.c реализации сетев… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01291 | Уязвимость функции dbMount() модуля fs/jfs/jfs_dmap.c файловой системы JFS ядра операцион… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01290 | Уязвимость функции brcmf_fw_alloc_request() модуля drivers/net/wireless/broadcom/brcm8021… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01289 | Уязвимость функции si470x_usb_driver_probe() модуля drivers/media/radio/si470x/radio-si47… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01288 | Уязвимость функций smb_inherit_dacl() и smb_check_perm_dacl() модуля fs/smb/server/smbacl… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01287 | Уязвимость контроллера входящего трафика в кластере Kubernetes ingress-nginx, связанная с… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01286 | Уязвимость функции управления сертификатами веб-интерфейса платформы планирования и прове… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01285 | Уязвимость функции kernfs_remove_by_name_ns() модуля fs/kernfs/dir.c файловой системы ядр… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01284 | Уязвимость платформы для автоматизации рабочих процессов n8n, связанная с недостаточным к… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01283 | Уязвимость функции btrfs_quota_enable() модуля fs/btrfs/qgroup.c файловой системы btrfs я… | 06.02.2026 | 06.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201310-0370 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, 6u60 and earlier, 5.0u51 an… | 2024-07-04T21:29:43.030000Z |
| var-200609-1351 | The Apple Type Services (ATS) server in Mac OS X 10.4.8 and earlier does not securely cre… | 2024-07-04T21:24:49.999000Z |
| var-201210-0278 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-04T21:24:03.785000Z |
| var-200609-1035 | The Installer application in Apple Mac OS X 10.4.8 and earlier, when used by a user with … | 2024-07-04T21:23:37.062000Z |
| var-200609-1338 | Stack-based buffer overflow in the Apple Type Services (ATS) server in Mac OS 10.4.8 and … | 2024-07-04T21:23:29.803000Z |
| var-201310-0351 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, a… | 2024-07-04T21:16:33.407000Z |
| var-201405-0503 | Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly co… | 2024-07-04T21:14:54.719000Z |
| var-201310-0343 | Unspecified vulnerability in the Java SE component in Oracle Java SE Java SE 7u40 and ear… | 2024-07-04T21:14:32.836000Z |
| var-201601-0016 | Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before … | 2024-07-04T21:13:56.044000Z |
| var-200609-1283 | Buffer overflow in PPP on Apple Mac OS X 10.4.x up to 10.4.8 and 10.3.x up to 10.3.9, whe… | 2024-07-04T21:13:56.935000Z |
| var-200609-1400 | The Security Framework in Apple Mac OS X 10.4 through 10.4.8 allows remote attackers to c… | 2024-07-04T21:10:55.352000Z |
| var-201512-0482 | The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 … | 2024-07-04T21:07:09.468000Z |
| var-201303-0226 | Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly va… | 2024-07-04T21:04:47.345000Z |
| var-201302-0049 | Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in t… | 2024-07-04T20:49:39.766000Z |
| var-200609-0718 | The Security Framework in Apple Mac OS X 10.3.x up to 10.3.9 does not properly prioritize… | 2024-07-04T20:46:28.140000Z |
| var-201210-0133 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-04T20:41:44.479000Z |
| var-201302-0106 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-04T20:37:52.473000Z |
| var-200609-1261 | OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers t… | 2024-07-04T20:24:05.364000Z |
| var-201408-0094 | Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before… | 2024-07-04T20:22:30.174000Z |
| var-201306-0264 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-04T20:22:30.682000Z |
| var-201110-0387 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2024-06-17T11:45:38.645000Z |
| var-201201-0169 | The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC che… | 2024-06-17T11:44:02.037000Z |
| var-201304-0106 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-06-17T11:38:43.739000Z |
| var-202106-0521 | curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line… | 2024-06-17T11:37:18.530000Z |
| var-201410-1151 | OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly en… | 2024-06-17T11:32:57.198000Z |
| var-201410-1143 | snmplib/mib.c in net-snmp 5.7.0 and earlier, when the -OQ option is used, allows remote a… | 2024-06-17T11:31:56.496000Z |
| var-200110-0354 | Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox … | 2024-06-17T11:30:28.835000Z |
| var-200609-0871 | Heap-based buffer overflow in the Finder in Apple Mac OS X 10.4.8 and earlier allows user… | 2024-06-17T11:21:56.277000Z |
| var-200609-0823 | Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.… | 2024-06-17T11:20:51.586000Z |
| var-200609-1236 | Buffer overflow in PPP on Apple Mac OS X 10.4.x up to 10.4.8 and 10.3.x up to 10.3.9, whe… | 2024-06-17T11:16:58.992000Z |