Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-7744 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
CodeAstro Online Classroom addnewstudent sql injection |
CodeAstro |
Online Classroom |
2026-05-04T07:30:13.668Z | 2026-05-05T18:10:47.678Z |
| CVE-2026-7750 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Totolink N300RH POST Request cstecgi.cgi setMacFilterR… |
Totolink |
N300RH |
2026-05-04T09:00:17.932Z | 2026-05-05T18:06:12.761Z |
| CVE-2026-7784 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
RTGS2017 NagaAgent Skills Endpoint extensions.py path … |
RTGS2017 |
NagaAgent |
2026-05-04T23:30:15.477Z | 2026-05-05T17:57:31.615Z |
| CVE-2026-7822 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
itsourcecode Courier Management System print_pdets.php… |
itsourcecode |
Courier Management System |
2026-05-05T04:30:13.126Z | 2026-05-05T17:55:05.073Z |
| CVE-2026-7682 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Edimax BR-6208AC L2TP Mode setWAN command injection |
Edimax |
BR-6208AC |
2026-05-03T06:15:09.912Z | 2026-05-05T17:46:44.840Z |
| CVE-2026-7676 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
kerwincui FastBee Tool Download Endpoint ToolControlle… |
kerwincui |
FastBee |
2026-05-03T03:00:45.620Z | 2026-05-05T17:44:32.709Z |
| CVE-2026-7670 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Jinher OA UserSel.aspx sql injection |
Jinher |
OA |
2026-05-02T22:15:13.667Z | 2026-05-05T17:40:43.108Z |
| CVE-2026-32597 |
7.5 (3.1)
|
PyJWT accepts unknown `crit` header extensions (RFC 75… |
jpadilla |
pyjwt |
2026-03-12T21:41:50.427Z | 2026-05-05T17:32:42.698Z |
| CVE-2025-65717 |
4.3 (3.1)
|
An issue in Visual Studio Code Extensions Live Se… |
n/a |
n/a |
2026-02-16T00:00:00.000Z | 2026-05-05T17:30:12.392Z |
| CVE-2026-36356 |
9.1 (3.1)
|
The GoAhead web server on MeiG Smart FORGE_SLT711… |
n/a |
n/a |
2026-05-05T00:00:00.000Z | 2026-05-05T17:26:31.899Z |
| CVE-2026-36355 |
7.7 (3.1)
|
The rtl8192cd Wi-Fi kernel driver in the Realtek … |
n/a |
n/a |
2026-05-05T00:00:00.000Z | 2026-05-05T17:19:32.920Z |
| CVE-2026-5394 |
7 (4.0)
|
Pimcore Platform v12.3.3 - SQL Injection in DataObject… |
pimcore |
pimcore |
2026-04-27T19:15:04.496Z | 2026-05-05T17:17:45.826Z |
| CVE-2026-29168 |
N/A
|
Apache HTTP Server: mod_md unrestricted OCSP response |
Apache Software Foundation |
Apache HTTP Server |
2026-05-05T13:10:05.656Z | 2026-05-05T16:31:49.391Z |
| CVE-2026-7846 |
2.1 (4.0)
2.6 (3.1)
2.6 (3.0)
|
chatchat-space Langchain-Chatchat OpenAI-Compatible Fi… |
chatchat-space |
Langchain-Chatchat |
2026-05-05T16:00:15.199Z | 2026-05-05T16:11:21.230Z |
| CVE-2025-70067 |
9.8 (3.1)
|
Buffer Overflow vulnerability exists in Assimp ve… |
n/a |
n/a |
2026-05-04T00:00:00.000Z | 2026-05-05T16:03:26.574Z |
| CVE-2026-36365 |
7.8 (3.1)
|
An issue in Lymphatus caesium-image-compressor Al… |
n/a |
n/a |
2026-05-04T00:00:00.000Z | 2026-05-05T16:03:21.331Z |
| CVE-2026-37458 |
6.5 (3.1)
|
Missing input validation in the MP_REACH_NLRI com… |
n/a |
n/a |
2026-05-04T00:00:00.000Z | 2026-05-05T16:03:14.025Z |
| CVE-2026-37461 |
7.5 (3.1)
|
An out-of-bounds read in the ParseIP6Extended fun… |
n/a |
n/a |
2026-05-04T00:00:00.000Z | 2026-05-05T16:03:08.662Z |
| CVE-2026-42440 |
N/A
|
Apache OpenNLP: OOM DoS via Unbounded Array Allocation… |
Apache Software Foundation |
Apache OpenNLP |
2026-05-04T16:40:32.503Z | 2026-05-05T16:03:03.237Z |
| CVE-2026-42027 |
N/A
|
Apache OpenNLP: Arbitrary Class Instantiation via Mode… |
Apache Software Foundation |
Apache OpenNLP |
2026-05-04T16:43:12.583Z | 2026-05-05T16:02:56.683Z |
| CVE-2026-7447 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
SourceCodester Pet Grooming Management Software update… |
SourceCodester |
Pet Grooming Management Software |
2026-04-30T00:15:12.060Z | 2026-05-05T16:02:41.361Z |
| CVE-2026-42238 |
9 (4.0)
|
Unauthenticated Remote Code Execution via Backup Resto… |
0xJacky |
nginx-ui |
2026-05-04T20:13:22.196Z | 2026-05-05T15:50:36.447Z |
| CVE-2026-6696 |
6.1 (3.1)
|
Zingaya Click-to-Call <= 1.0 - Reflected Cross-Site Sc… |
zingaya |
Zingaya Click-to-Call |
2026-05-05T02:26:54.906Z | 2026-05-05T15:42:21.067Z |
| CVE-2026-4409 |
6.5 (3.1)
|
Subscribe To Comments Reloaded <= 240119 - Improper Au… |
wpkube |
Subscribe To Comments Reloaded |
2026-05-05T02:26:55.996Z | 2026-05-05T15:34:57.256Z |
| CVE-2026-43069 |
N/A
|
Bluetooth: hci_ll: Fix firmware leak on error path |
Linux |
Linux |
2026-05-05T15:23:28.120Z | 2026-05-05T15:23:28.120Z |
| CVE-2026-43068 |
N/A
|
ext4: avoid allocate block from corrupted group in ext… |
Linux |
Linux |
2026-05-05T15:23:27.371Z | 2026-05-05T15:23:27.371Z |
| CVE-2026-43066 |
N/A
|
ext4: fix iloc.bh leak in ext4_fc_replay_inode() error paths |
Linux |
Linux |
2026-05-05T15:23:25.984Z | 2026-05-05T15:23:25.984Z |
| CVE-2026-43065 |
N/A
|
ext4: always drain queued discard work in ext4_mb_release() |
Linux |
Linux |
2026-05-05T15:23:25.326Z | 2026-05-05T15:23:25.326Z |
| CVE-2026-43064 |
N/A
|
dmaengine: idxd: Fix not releasing workqueue on .release() |
Linux |
Linux |
2026-05-05T15:23:24.687Z | 2026-05-05T15:23:24.687Z |
| CVE-2026-43061 |
N/A
|
serial: 8250: Fix TX deadlock when using DMA |
Linux |
Linux |
2026-05-05T15:17:27.079Z | 2026-05-05T15:17:27.079Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2016-9854 |
N/A
|
An issue was discovered in phpMyAdmin. By calling… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.576Z |
| CVE-2016-9853 |
N/A
|
An issue was discovered in phpMyAdmin. By calling… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.537Z |
| CVE-2016-9852 |
N/A
|
An issue was discovered in phpMyAdmin. By calling… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.577Z |
| CVE-2016-9851 |
N/A
|
An issue was discovered in phpMyAdmin. With a cra… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.569Z |
| CVE-2016-9850 |
N/A
|
An issue was discovered in phpMyAdmin. Username m… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.526Z |
| CVE-2016-9849 |
N/A
|
An issue was discovered in phpMyAdmin. It is poss… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.530Z |
| CVE-2016-9848 |
N/A
|
An issue was discovered in phpMyAdmin. phpinfo (p… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.523Z |
| CVE-2016-9847 |
N/A
|
An issue was discovered in phpMyAdmin. When the u… |
n/a |
n/a |
2016-12-11T02:00:00.000Z | 2024-08-06T02:59:03.661Z |
| CVE-2016-9846 |
N/A
|
QEMU (aka Quick Emulator) built with the Virtio G… |
n/a |
n/a |
2016-12-29T22:00:00.000Z | 2024-08-06T02:59:03.577Z |
| CVE-2016-9845 |
N/A
|
QEMU (aka Quick Emulator) built with the Virtio G… |
n/a |
n/a |
2016-12-29T22:00:00.000Z | 2024-08-06T02:59:03.575Z |
| CVE-2016-9839 |
N/A
|
In MapServer before 7.0.3, OGR driver error messa… |
n/a |
n/a |
2016-12-08T08:08:00.000Z | 2024-08-06T02:59:03.697Z |
| CVE-2016-9838 |
N/A
|
An issue was discovered in components/com_users/m… |
n/a |
n/a |
2016-12-16T09:02:00.000Z | 2024-08-06T02:59:03.556Z |
| CVE-2016-9837 |
N/A
|
An issue was discovered in templates/beez3/html/c… |
n/a |
n/a |
2016-12-16T09:02:00.000Z | 2024-08-06T02:59:03.431Z |
| CVE-2016-9836 |
N/A
|
The file scanning mechanism of JFilterInput::isFi… |
n/a |
n/a |
2016-12-05T17:00:00.000Z | 2024-08-06T02:59:03.553Z |
| CVE-2016-9835 |
N/A
|
Directory traversal vulnerability in file "jcss.p… |
n/a |
n/a |
2016-12-05T08:09:00.000Z | 2024-08-06T02:59:03.531Z |
| CVE-2016-9832 |
N/A
|
PricewaterhouseCoopers (PwC) ACE-ABAP 8.10.304 fo… |
n/a |
n/a |
2016-12-09T11:00:00.000Z | 2024-08-06T02:59:03.546Z |
| CVE-2016-9806 |
N/A
|
Race condition in the netlink_dump function in ne… |
n/a |
n/a |
2016-12-28T07:42:00.000Z | 2024-08-06T02:59:03.426Z |
| CVE-2016-9804 |
N/A
|
In BlueZ 5.42, a buffer overflow was observed in … |
n/a |
n/a |
2016-12-03T06:28:00.000Z | 2024-08-06T02:59:03.568Z |
| CVE-2016-9803 |
N/A
|
In BlueZ 5.42, an out-of-bounds read was observed… |
n/a |
n/a |
2016-12-03T06:28:00.000Z | 2024-08-06T02:59:03.576Z |
| CVE-2016-9802 |
N/A
|
In BlueZ 5.42, a buffer over-read was identified … |
n/a |
n/a |
2016-12-03T06:28:00.000Z | 2024-08-06T02:59:03.553Z |
| CVE-2016-9801 |
N/A
|
In BlueZ 5.42, a buffer overflow was observed in … |
n/a |
n/a |
2016-12-03T06:28:00.000Z | 2024-08-06T02:59:03.524Z |
| CVE-2016-9800 |
N/A
|
In BlueZ 5.42, a buffer overflow was observed in … |
n/a |
n/a |
2016-12-03T06:28:00.000Z | 2024-08-06T02:59:03.441Z |
| CVE-2016-9799 |
N/A
|
In BlueZ 5.42, a buffer overflow was observed in … |
n/a |
n/a |
2016-12-03T06:28:00.000Z | 2024-08-06T02:59:03.566Z |
| CVE-2016-9798 |
N/A
|
In BlueZ 5.42, a use-after-free was identified in… |
n/a |
n/a |
2016-12-03T06:28:00.000Z | 2024-08-06T02:59:03.587Z |
| CVE-2016-9797 |
N/A
|
In BlueZ 5.42, a buffer over-read was observed in… |
n/a |
n/a |
2016-12-03T06:28:00.000Z | 2024-08-06T02:59:03.447Z |
| CVE-2016-9796 |
N/A
|
Alcatel-Lucent OmniVista 8770 2.0 through 3.0 exp… |
n/a |
n/a |
2016-12-03T06:28:00.000Z | 2024-08-06T02:59:03.564Z |
| CVE-2016-9794 |
N/A
|
Race condition in the snd_pcm_period_elapsed func… |
n/a |
n/a |
2016-12-28T07:42:00.000Z | 2024-08-06T02:59:03.501Z |
| CVE-2016-9793 |
N/A
|
The sock_setsockopt function in net/core/sock.c i… |
n/a |
n/a |
2016-12-28T07:42:00.000Z | 2024-08-06T02:59:03.525Z |
| CVE-2016-9777 |
N/A
|
KVM in the Linux kernel before 4.8.12, when I/O A… |
n/a |
n/a |
2016-12-28T07:42:00.000Z | 2024-08-06T02:59:03.471Z |
| CVE-2016-9776 |
N/A
|
QEMU (aka Quick Emulator) built with the ColdFire… |
n/a |
n/a |
2016-12-29T22:00:00.000Z | 2024-08-06T02:59:03.469Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2016-9853 | An issue was discovered in phpMyAdmin. By calling some scripts that are part of phpMyAdmin in an un… | 2016-12-11T02:59:51.477 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9852 | An issue was discovered in phpMyAdmin. By calling some scripts that are part of phpMyAdmin in an un… | 2016-12-11T02:59:50.380 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9851 | An issue was discovered in phpMyAdmin. With a crafted request parameter value it is possible to byp… | 2016-12-11T02:59:49.193 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9850 | An issue was discovered in phpMyAdmin. Username matching for the allow/deny rules may result in wro… | 2016-12-11T02:59:48.130 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9849 | An issue was discovered in phpMyAdmin. It is possible to bypass AllowRoot restriction ($cfg['Server… | 2016-12-11T02:59:47.083 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9848 | An issue was discovered in phpMyAdmin. phpinfo (phpinfo.php) shows PHP information including values… | 2016-12-11T02:59:45.757 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9847 | An issue was discovered in phpMyAdmin. When the user does not specify a blowfish_secret key for enc… | 2016-12-11T02:59:44.553 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9846 | QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to a memo… | 2016-12-29T22:59:00.573 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9845 | QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to an inf… | 2016-12-29T22:59:00.543 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9839 | In MapServer before 7.0.3, OGR driver error messages are too verbose and may leak sensitive informa… | 2016-12-08T08:59:01.240 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9838 | An issue was discovered in components/com_users/models/registration.php in Joomla! before 3.6.5. In… | 2016-12-16T09:59:00.327 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9837 | An issue was discovered in templates/beez3/html/com_content/article/default.php in Joomla! before 3… | 2016-12-16T09:59:00.310 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9836 | The file scanning mechanism of JFilterInput::isFileSafe() in Joomla! CMS before 3.6.5 does not cons… | 2016-12-05T17:59:00.180 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9835 | Directory traversal vulnerability in file "jcss.php" in Zikula 1.3.x before 1.3.11 and 1.4.x before… | 2016-12-05T08:59:02.673 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9832 | PricewaterhouseCoopers (PwC) ACE-ABAP 8.10.304 for SAP Security allows remote authenticated users t… | 2016-12-10T02:59:24.340 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9806 | Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel before … | 2016-12-28T07:59:00.667 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9804 | In BlueZ 5.42, a buffer overflow was observed in "commands_dump" function in "tools/parser/csr.c" s… | 2016-12-03T06:59:09.513 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9803 | In BlueZ 5.42, an out-of-bounds read was observed in "le_meta_ev_dump" function in "tools/parser/hc… | 2016-12-03T06:59:08.527 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9802 | In BlueZ 5.42, a buffer over-read was identified in "l2cap_packet" function in "monitor/packet.c" s… | 2016-12-03T06:59:07.527 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9801 | In BlueZ 5.42, a buffer overflow was observed in "set_ext_ctrl" function in "tools/parser/l2cap.c" … | 2016-12-03T06:59:06.417 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9800 | In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hc… | 2016-12-03T06:59:05.137 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9799 | In BlueZ 5.42, a buffer overflow was observed in "pklg_read_hci" function in "btsnoop.c" source fil… | 2016-12-03T06:59:04.013 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9798 | In BlueZ 5.42, a use-after-free was identified in "conf_opt" function in "tools/parser/l2cap.c" sou… | 2016-12-03T06:59:02.887 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9797 | In BlueZ 5.42, a buffer over-read was observed in "l2cap_dump" function in "tools/parser/l2cap.c" s… | 2016-12-03T06:59:01.747 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9796 | Alcatel-Lucent OmniVista 8770 2.0 through 3.0 exposes different ORBs interfaces, which can be queri… | 2016-12-03T06:59:00.167 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9794 | Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem… | 2016-12-28T07:59:00.603 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9793 | The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negati… | 2016-12-28T07:59:00.557 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9777 | KVM in the Linux kernel before 4.8.12, when I/O APIC is enabled, does not properly restrict the VCP… | 2016-12-28T07:59:00.510 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9776 | QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vuln… | 2016-12-29T22:59:00.510 | 2026-05-06T22:30:45.220 |
| fkie_cve-2016-9757 | In the Create Tags page of the Rapid7 Nexpose version 6.4.12 user interface, any authenticated user… | 2016-12-20T22:59:00.350 | 2026-05-06T22:30:45.220 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-2v93-vp82-cjv8 |
6.8 (3.1)
|
Velociraptor versions prior to 0.76.4 contain a cross organization authorization bypass in the HTTP… | 2026-05-06T18:30:30Z | 2026-05-06T18:30:30Z |
| ghsa-whhc-f8fh-m5cr |
8.8 (3.1)
8.7 (4.0)
|
This vulnerability exists in Quantum Networks router due to missing rate limiting and CAPTCHA prote… | 2026-04-21T12:30:24Z | 2026-05-06T18:30:25Z |
| ghsa-p7g8-g57p-r8qx |
5.3 (3.1)
|
A flaw was found in FFmpeg’s ALS audio decoder, where it does not properly check for memory allocat… | 2025-11-07T21:31:21Z | 2026-05-06T18:30:24Z |
| ghsa-j666-j6hj-fpc7 |
5.9 (3.1)
|
A flaw was found in libsoup. When establishing HTTPS tunnels through a configured HTTP proxy, sensi… | 2026-03-30T09:31:28Z | 2026-05-06T18:30:24Z |
| ghsa-7f6p-98mw-r63r |
8.8 (3.1)
8.7 (4.0)
|
This vulnerability exists in Quantum Networks router due to inadequate sanitization of user-supplie… | 2026-04-21T12:30:24Z | 2026-05-06T18:30:24Z |
| ghsa-365r-wjfh-hwpv |
7.3 (3.1)
6.9 (4.0)
|
The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows m… | 2026-03-21T00:31:43Z | 2026-05-06T18:30:24Z |
| ghsa-qgq4-89p9-qfrh |
4.3 (3.1)
|
A denial-of-service vulnerability has been identified in the libsoup HTTP client library. This flaw… | 2025-05-16T18:31:10Z | 2026-05-06T18:30:23Z |
| ghsa-q2fw-m52x-w593 |
3.6 (3.1)
|
A vulnerability was found in libssh, where an uninitialized variable exists under certain condition… | 2025-07-22T15:32:52Z | 2026-05-06T18:30:23Z |
| ghsa-jwxc-5ch3-vxqq |
7.1 (3.1)
|
A flaw was found in the skupper console, a read-only interface that renders cluster network, traff… | 2024-12-24T06:30:42Z | 2026-05-06T18:30:23Z |
| ghsa-hxjp-2xf5-wmrj |
5.9 (3.1)
|
A flaw was found in libsoup’s caching mechanism, SoupCache, where the HTTP Vary header is ignored w… | 2025-09-03T15:30:33Z | 2026-05-06T18:30:23Z |
| ghsa-59fq-gggw-pqjr |
6.2 (3.1)
|
A stack-based buffer overflow was found in the QEMU e1000 network device. The code for padding shor… | 2025-11-01T00:30:26Z | 2026-05-06T18:30:23Z |
| ghsa-39mw-228p-wr6v |
3.1 (3.1)
|
A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly send… | 2025-09-09T12:30:49Z | 2026-05-06T18:30:23Z |
| ghsa-vmh7-9c7h-2pgg |
6.3 (3.1)
2.1 (4.0)
|
auto-favicon has a Server-Side Request Forgery issue | 2026-04-27T21:31:02Z | 2026-05-06T18:29:24Z |
| ghsa-9g2q-w3w2-vf7q |
5.7 (4.0)
|
Kimai has Missing Voter Check that Allows Cross-Team Timesheet Manipulation | 2026-05-06T18:28:45Z | 2026-05-06T18:28:46Z |
| ghsa-v2fc-qm4h-8hqv |
5.3 (3.1)
|
Nokogiri XSLT transform has a memory leak | 2026-05-06T18:27:38Z | 2026-05-06T18:27:38Z |
| ghsa-c4rq-3m3g-8wgx |
7.5 (3.1)
|
Nokogiri CSS selector tokenizer has regular expression backtracking | 2026-05-06T18:24:18Z | 2026-05-06T18:24:18Z |
| ghsa-8p33-q827-ghj5 |
8.7 (4.0)
|
dssrf: every IPv6 category bypasses is_url_safe | 2026-05-06T18:13:32Z | 2026-05-06T18:13:32Z |
| ghsa-2528-jw5q-ww88 |
7.5 (3.1)
8.7 (4.0)
|
phpseclib: guardrails needed on isPrime and randomPrime | 2026-05-06T17:57:10Z | 2026-05-06T17:57:10Z |
| ghsa-hg35-mp25-qf6h |
7.5 (3.1)
8.7 (4.0)
|
Duplicate Advisory: phpseclib: guardrails needed on isPrime and randomPrime | 2024-03-02T00:31:33Z | 2026-05-06T17:56:50Z |
| ghsa-33m5-hqp9-97pw |
7.1 (4.0)
|
Craft CMS's Missing Volume Permission Check in AssetsController::actionShowInFolder Allows Informat… | 2026-05-06T17:54:47Z | 2026-05-06T17:54:47Z |
| ghsa-c3gc-9pf2-84gg |
5.3 (3.1)
|
PyLoad vulnerable to unauthenticated traceback disclosure via global exception handler in WebUI | 2026-05-06T17:54:20Z | 2026-05-06T17:54:20Z |
| ghsa-qrgm-p9w5-rrfw |
8.6 (4.0)
|
Craft CMS has Potential Authenticated Remote Code Execution via Malicious Attached Behavior | 2026-05-06T17:54:06Z | 2026-05-06T17:54:06Z |
| ghsa-gj2p-p9m4-c8gw |
7.1 (4.0)
|
Craft CMS's Missing Authorization in GraphQL Address Resolver Allows Cross-Scope PII Disclosure | 2026-05-06T17:49:17Z | 2026-05-06T17:49:17Z |
| ghsa-4c35-wcg5-mm9h |
4.2 (3.1)
|
next-intl has prototype pollution with `experimental.messages.precompile` via attacker-controlled t… | 2026-05-06T17:34:12Z | 2026-05-06T17:34:12Z |
| ghsa-r27j-894h-3w3p |
3.7 (3.1)
|
mcp-data-vis vulnerable to denial of service via unsanitized `select` key lookup on `Object.prototy… | 2026-05-06T17:32:01Z | 2026-05-06T17:32:01Z |
| ghsa-x368-4g9h-fvv4 |
5.6 (3.1)
2.9 (4.0)
|
vLLM makes Use of Uninitialized Resource | 2026-04-27T18:32:09Z | 2026-05-06T17:31:34Z |
| ghsa-w65c-cmxj-qrhm |
6.3 (3.1)
2.1 (4.0)
|
Wooey has an Incorrect Privilege Assignment issue | 2026-04-27T18:32:09Z | 2026-05-06T17:26:57Z |
| ghsa-xx64-wwv2-hcqq |
2.7 (4.0)
|
astral-tokio-tar: `unpack_in` can chmod arbitrary directories by following symlinks | 2026-05-06T17:26:38Z | 2026-05-06T17:26:39Z |
| ghsa-fp55-jw48-c537 |
6.6 (4.0)
|
astral-tokio-tar is Vulnerable to PAX Header Desynchronization | 2026-05-06T17:26:12Z | 2026-05-06T17:26:12Z |
| ghsa-v5c3-6wvc-pc2q |
7.1 (4.0)
|
QuantumNous/new-api has an SSRF Filter Bypass via 0.0.0.0 | 2026-05-06T17:23:21Z | 2026-05-06T17:23:21Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-715 |
|
TensorFlow is an end-to-end open source platform for machine learning. The reference impl… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:30.233507Z |
| pysec-2021-714 |
|
TensorFlow is an end-to-end open source platform for machine learning. The optimized impl… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:30.034082Z |
| pysec-2021-713 |
|
TensorFlow is an end-to-end open source platform for machine learning. The `Prepare` step… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:29.871064Z |
| pysec-2021-712 |
|
TensorFlow is an end-to-end open source platform for machine learning. Optimized pooling … | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:29.712146Z |
| pysec-2021-711 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite computa… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:29.363788Z |
| pysec-2021-710 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:29.199701Z |
| pysec-2021-709 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:29.040868Z |
| pysec-2021-708 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:28.875018Z |
| pysec-2021-707 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:28.711775Z |
| pysec-2021-706 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:28.532911Z |
| pysec-2021-705 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:28.365362Z |
| pysec-2021-704 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:28.203971Z |
| pysec-2021-703 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:28.044558Z |
| pysec-2021-702 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:27.875893Z |
| pysec-2021-701 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:27.716876Z |
| pysec-2021-700 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:27.544548Z |
| pysec-2021-699 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:27.365628Z |
| pysec-2021-698 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:27.168452Z |
| pysec-2021-697 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:27.008570Z |
| pysec-2021-696 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:26.840571Z |
| pysec-2021-695 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:26.658454Z |
| pysec-2021-694 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:26.499647Z |
| pysec-2021-693 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:26.340630Z |
| pysec-2021-692 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can wr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:26.175336Z |
| pysec-2021-691 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:26.009362Z |
| pysec-2021-690 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:25.817127Z |
| pysec-2021-689 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:25.642142Z |
| pysec-2021-688 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:25.478301Z |
| pysec-2021-687 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:25.291953Z |
| pysec-2021-686 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:25.121902Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32751 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.109407Z |
| gsd-2024-32750 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.005981Z |
| gsd-2024-32748 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.168188Z |
| gsd-2024-32742 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.045520Z |
| gsd-2024-32740 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.018993Z |
| gsd-2024-32737 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.050032Z |
| gsd-2024-32736 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.016707Z |
| gsd-2024-32735 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.027944Z |
| gsd-2024-32734 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.003888Z |
| gsd-2024-32732 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.071932Z |
| gsd-2024-32730 | SAP Enable Now Manager does not perform necessary authorization checks for an authenticat… | 2024-04-18T05:02:05.054758Z |
| gsd-2024-32729 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.174437Z |
| gsd-2024-32726 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in vinoth06. Fro… | 2024-04-18T05:02:05.174102Z |
| gsd-2024-32725 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.139407Z |
| gsd-2024-32723 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-18T05:02:05.091499Z |
| gsd-2024-32722 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-18T05:02:05.002054Z |
| gsd-2024-32717 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.056184Z |
| gsd-2024-32716 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in StreamWeasels… | 2024-04-18T05:02:05.143728Z |
| gsd-2024-32713 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.114002Z |
| gsd-2024-32711 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-18T05:02:05.083858Z |
| gsd-2024-32710 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vuln… | 2024-04-18T05:02:05.045717Z |
| gsd-2024-32708 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.166360Z |
| gsd-2024-32707 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-18T05:02:05.169161Z |
| gsd-2024-32706 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vuln… | 2024-04-18T05:02:05.012855Z |
| gsd-2024-32703 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-18T05:02:05.056380Z |
| gsd-2024-32702 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-18T05:02:05.045323Z |
| gsd-2024-32699 | Cross-Site Request Forgery (CSRF) vulnerability in YITH YITH WooCommerce Compare.This iss… | 2024-04-18T05:02:05.006427Z |
| gsd-2024-32698 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-18T05:02:05.035429Z |
| gsd-2024-32697 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-18T05:02:05.020590Z |
| gsd-2024-32693 | Cross-Site Request Forgery (CSRF) vulnerability in ValvePress Automatic.This issue affect… | 2024-04-18T05:02:05.147692Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2048 | Malicious code in @emilgroup/gdv-sdk (npm) | 2026-03-22T18:20:51Z | 2026-03-26T00:50:43Z |
| mal-2026-2047 | Malicious code in @emilgroup/docxtemplater-util (npm) | 2026-03-22T18:21:12Z | 2026-03-26T00:50:43Z |
| mal-2026-2046 | Malicious code in @emilgroup/document-sdk (npm) | 2026-03-22T18:13:19Z | 2026-03-26T00:50:43Z |
| mal-2026-2045 | Malicious code in @emilgroup/customer-sdk-node (npm) | 2026-03-22T18:08:39Z | 2026-03-26T00:50:43Z |
| mal-2026-2044 | Malicious code in @emilgroup/customer-sdk (npm) | 2026-03-22T18:07:56Z | 2026-03-26T00:50:43Z |
| mal-2026-2043 | Malicious code in @emilgroup/commission-sdk-node (npm) | 2026-03-22T18:23:18Z | 2026-03-26T00:50:43Z |
| mal-2026-2042 | Malicious code in @emilgroup/claim-sdk-node (npm) | 2026-03-22T18:13:37Z | 2026-03-26T00:50:43Z |
| mal-2026-2041 | Malicious code in @emilgroup/claim-sdk (npm) | 2026-03-22T18:03:52Z | 2026-03-26T00:50:43Z |
| mal-2026-2040 | Malicious code in @emilgroup/changelog-sdk-node (npm) | 2026-03-22T18:22:34Z | 2026-03-26T00:50:43Z |
| mal-2026-2039 | Malicious code in @emilgroup/billing-sdk-node (npm) | 2026-03-22T18:11:15Z | 2026-03-26T00:50:43Z |
| mal-2026-2038 | Malicious code in @emilgroup/billing-sdk (npm) | 2026-03-22T18:13:01Z | 2026-03-26T00:50:43Z |
| mal-2026-2037 | Malicious code in @emilgroup/auth-sdk-node (npm) | 2026-03-22T18:19:17Z | 2026-03-26T00:50:43Z |
| mal-2026-2036 | Malicious code in @emilgroup/auth-sdk (npm) | 2026-03-22T17:49:17Z | 2026-03-26T00:50:43Z |
| mal-2026-2035 | Malicious code in @emilgroup/api-documentation (npm) | 2026-03-22T18:14:02Z | 2026-03-26T00:50:43Z |
| mal-2026-2034 | Malicious code in @emilgroup/accounting-sdk-node (npm) | 2026-03-22T18:11:51Z | 2026-03-26T00:50:43Z |
| mal-2026-2033 | Malicious code in @emilgroup/accounting-sdk (npm) | 2026-03-22T17:48:24Z | 2026-03-26T00:50:43Z |
| mal-2026-2032 | Malicious code in @emilgroup/account-sdk-node (npm) | 2026-03-22T18:17:58Z | 2026-03-26T00:50:43Z |
| mal-2026-2031 | Malicious code in @emilgroup/account-sdk (npm) | 2026-03-22T17:45:33Z | 2026-03-26T00:50:43Z |
| mal-2026-2030 | Malicious code in @pypestream/floating-ui-dom (npm) | 2026-03-22T17:11:18Z | 2026-03-26T00:50:43Z |
| mal-2026-2187 | Malicious code in vision-service-python-client-internal (PyPI) | 2026-03-25T06:58:31Z | 2026-03-25T06:58:31Z |
| mal-2026-2186 | Malicious code in vision-service-python-client (PyPI) | 2026-03-25T06:56:22Z | 2026-03-25T06:56:22Z |
| mal-2026-2185 | Malicious code in hy-api-utilities (PyPI) | 2026-03-25T06:54:07Z | 2026-03-25T06:54:07Z |
| mal-2026-2184 | Malicious code in auth0-ai-ms-agent (PyPI) | 2026-03-25T06:52:53Z | 2026-03-25T06:52:53Z |
| mal-2026-2172 | Malicious code in v2-8-3 (PyPI) | 2026-03-25T05:05:45Z | 2026-03-25T05:54:06Z |
| mal-2026-2171 | Malicious code in globally (PyPI) | 2026-03-25T05:05:53Z | 2026-03-25T05:54:06Z |
| mal-2026-2170 | Malicious code in fairness-bias (PyPI) | 2026-03-25T05:05:53Z | 2026-03-25T05:54:06Z |
| mal-2026-2177 | Malicious code in linting (PyPI) | 2026-03-25T05:07:06Z | 2026-03-25T05:07:06Z |
| mal-2026-2175 | Malicious code in facebookresearch (PyPI) | 2026-03-25T05:06:56Z | 2026-03-25T05:07:03Z |
| mal-2026-2183 | Malicious code in yeshsurya (PyPI) | 2026-03-25T05:06:58Z | 2026-03-25T05:06:58Z |
| mal-2026-2178 | Malicious code in lm-sys (PyPI) | 2026-03-25T05:04:34Z | 2026-03-25T05:05:02Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1246 | Cisco Unified Contact Center Express (UCCX): Mehrere Schwachstellen | 2025-06-04T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2025-1243 | Synology DiskStation Manager: Schwachstelle ermöglicht Manipulation von Dateien | 2025-06-04T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2025-1242 | Cisco Unified Communications Produkte: Schwachstelle ermöglicht Codeausführung mit Root Rechten | 2025-06-04T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2025-1241 | Cisco Nexus Dashboard: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-04T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2025-1240 | Cisco Integrated Management Controller: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-04T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2025-1239 | Cisco Identity Services Engine (ISE): Schwachstelle ermöglicht Unsicheres Erzeugen von temporären Dateien | 2025-06-04T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2025-1238 | Cisco Identity Services Engine (ISE) Cloud Platforms: Schwachstelle ermöglicht erlangen von Admin Rechten | 2025-06-04T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2025-1237 | Cisco Unified Intelligent Contact Management Enterprise: Schwachstelle ermöglicht Cross-Site Scripting | 2025-06-04T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2025-1228 | cURL: Schwachstelle ermöglicht Denial of Service | 2025-06-03T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2025-0794 | Juniper Junos Space: Mehrere Schwachstellen | 2025-04-13T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2025-0200 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Ausspaehen von Informationen | 2025-01-27T23:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2025-0166 | Oracle PeopleSoft: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-3676 | cURL: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-12-10T23:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-3573 | Red Hat Advanced Cluster Security: Schwachstelle ermöglicht Denial of Service | 2024-12-01T23:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-3468 | Red Hat OpenShift: Schwachstelle ermöglicht Denial of Service | 2024-11-13T23:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-3342 | cURL: Schwachstelle ermöglicht Denial of Service | 2024-11-05T23:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-3330 | Red Hat Trusted Profile Analyzer: Schwachstelle ermöglicht Denial of Service | 2024-11-04T23:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-3287 | Red Hat Enterprise Linux (buildah): Schwachstelle ermöglicht Offenlegung von Informationen | 2024-10-28T23:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-3270 | Python: Schwachstelle ermöglicht Codeausführung | 2024-10-24T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-3056 | Diffie-Hellman Implementierungen: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-09-30T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-2227 | QEMU: Schwachstelle ermöglicht Denial of Service | 2024-09-25T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-2192 | QEMU: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-09-22T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-2133 | Linux Kernel: Mehrere Schwachstellen | 2024-09-12T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-2117 | Intel Prozessor: Mehrere Schwachstellen | 2024-09-10T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-2075 | OpenSC: Schwachstelle ermöglicht Codeausführung | 2024-09-08T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-2074 | Red Hat Enterprise Linux (glib2): Schwachstelle ermöglicht Manipulation von Dateien | 2024-09-08T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-2072 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-09-05T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-2036 | Red Hat OpenShift: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2024-09-03T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-1970 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-09-02T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-1969 | OpenSC: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2024-09-02T22:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-035-08 | AutomationDirect C-more EA9 HMI | 2025-02-04T07:00:00.000000Z | 2025-02-04T07:00:00.000000Z |
| icsa-25-035-05 | Schneider Electric Web Designer for Modicon | 2025-02-04T07:00:00.000000Z | 2025-02-04T07:00:00.000000Z |
| icsa-25-035-03 | Elber Communications Equipment | 2025-02-04T07:00:00.000000Z | 2025-02-04T07:00:00.000000Z |
| icsa-25-035-01 | Western Telematic Inc NPS Series, DSM Series, CPM Series | 2025-02-04T07:00:00.000000Z | 2025-02-04T07:00:00.000000Z |
| icsa-23-299-03 | Ashlar-Vellum Cobalt, Graphite, Xenon, Argon, Lithium (Update A) | 2023-10-24T06:00:00.000000Z | 2025-02-04T07:00:00.000000Z |
| icsma-22-244-01 | Contec Health CMS8000 Patient Monitor (Update A) | 2022-09-01T06:00:00.000000Z | 2025-01-30T07:00:00.000000Z |
| icsa-25-030-05 | Rockwell Automation FactoryTalk AssetCentre | 2025-01-30T07:00:00.000000Z | 2025-01-30T07:00:00.000000Z |
| icsa-25-030-04 | Rockwell Automation KEPServer | 2025-01-30T07:00:00.000000Z | 2025-01-30T07:00:00.000000Z |
| icsa-25-030-02 | New Rock Technologies Cloud Connected Devices | 2025-01-30T07:00:00.000000Z | 2025-01-30T07:00:00.000000Z |
| icsma-24-352-01 | BD Diagnostic Solutions Products (Update A) | 2024-12-17T07:00:00.000000Z | 2025-01-28T07:00:00.000000Z |
| icsa-25-028-05 | Rockwell Automation DataMosaix Private Cloud | 2025-01-28T07:00:00.000000Z | 2025-01-28T07:00:00.000000Z |
| icsa-25-028-04 | Rockwell Automation FactoryTalk View Site Edition | 2025-01-28T07:00:00.000000Z | 2025-01-28T07:00:00.000000Z |
| icsa-25-028-03 | Rockwell Automation FactoryTalk | 2025-01-28T07:00:00.000000Z | 2025-01-28T07:00:00.000000Z |
| icsa-25-028-02 | Schneider Electric Power Logic | 2025-01-28T07:00:00.000000Z | 2025-01-28T07:00:00.000000Z |
| icsa-25-023-06 | HMS Networks Ewon Flexy 202 | 2025-01-23T07:00:00.000000Z | 2025-01-23T07:00:00.000000Z |
| icsa-25-023-01 | mySCADA myPRO Manager | 2025-01-23T07:00:00.000000Z | 2025-01-23T07:00:00.000000Z |
| va-25-022-01 | ECOVACS lawnmower and vacuum vulnerabilities | 2025-01-23T00:53:24Z | 2025-01-23T00:53:24Z |
| va-25-021-01 | Fedora Repository fedoraIntCallUser default credentials and insecure archive extraction | 2025-01-23T00:00:00Z | 2025-01-23T00:00:00Z |
| icsa-25-021-03 | ZF Roll Stability Support Plus (RSSPlus) | 2025-01-21T07:00:00.000000Z | 2025-01-21T07:00:00.000000Z |
| icsa-25-016-05 | Fuji Electric Alpha5 SMART | 2025-01-16T07:00:00.000000Z | 2025-01-16T07:00:00.000000Z |
| icsa-25-010-03 | Delta Electronics DRASimuCAD (Update A) | 2025-01-09T07:00:00.000000Z | 2025-01-16T07:00:00.000000Z |
| icsa-24-058-01 | Mitsubishi Electric Multiple Factory Automation Products (Update A) | 2024-02-27T07:00:00.000000Z | 2025-01-16T07:00:00.000000Z |
| icsa-25-028-01 | B&R Automation Runtime | 2025-01-15T03:30:00.000000Z | 2025-01-15T03:30:00.000000Z |
| icsa-25-014-04 | Belledonne Communications Linphone-Desktop | 2025-01-14T07:00:00.000000Z | 2025-01-14T07:00:00.000000Z |
| icsa-25-016-02 | Siemens Industrial Edge Management | 2025-01-14T00:00:00.000000Z | 2025-01-14T00:00:00.000000Z |
| icsa-24-256-14 | Siemens SIMATIC SCADA and PCS 7 Systems | 2024-09-10T00:00:00.000000Z | 2025-01-14T00:00:00.000000Z |
| icsa-24-165-12 | Siemens SCALANCE W700 | 2024-06-11T00:00:00.000000Z | 2025-01-14T00:00:00.000000Z |
| icsa-24-102-02 | Siemens SIMATIC WinCC | 2024-04-09T00:00:00.000000Z | 2025-01-14T00:00:00.000000Z |
| icsa-23-348-03 | Siemens User Management Component (UMC) | 2023-12-12T00:00:00.000000Z | 2025-01-14T00:00:00.000000Z |
| icsa-23-012-08 | Siemens S7-1500 CPU devices | 2023-01-10T00:00:00.000000Z | 2025-01-14T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-cspc-info-disc-KM3bGVL | Cisco Common Services Platform Collector Information Disclosure Vulnerability | 2021-11-03T16:00:00+00:00 | 2022-01-06T17:54:37+00:00 |
| cisco-sa-pi-sql-inj-kgllsfw8 | Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager SQL Injection Vulnerability | 2020-06-03T16:00:00+00:00 | 2022-01-06T17:41:46+00:00 |
| cisco-sa-pi-sql-inj-KGLLsFw8 | Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager SQL Injection Vulnerability | 2020-06-03T16:00:00+00:00 | 2022-01-06T17:41:46+00:00 |
| cisco-sa-cms-lahe8z5v | Cisco Meeting Server Call Bridge Denial of Service Vulnerability | 2021-10-20T16:00:00+00:00 | 2021-12-22T17:29:02+00:00 |
| cisco-sa-cms-LAHe8z5v | Cisco Meeting Server Call Bridge Denial of Service Vulnerability | 2021-10-20T16:00:00+00:00 | 2021-12-22T17:29:02+00:00 |
| cisco-sa-wifi-faf-22epcewu | Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021 | 2021-05-11T18:00:00+00:00 | 2021-12-15T15:47:26+00:00 |
| cisco-sa-wifi-faf-22epcEWu | Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021 | 2021-05-11T18:00:00+00:00 | 2021-12-15T15:47:26+00:00 |
| cisco-sa-cspc-ilr-8qmw8y8x | Cisco Common Services Platform Collector Improper Logging Restriction Vulnerability | 2021-11-17T16:00:00+00:00 | 2021-11-18T22:48:15+00:00 |
| cisco-sa-CSPC-ILR-8qmW8y8X | Cisco Common Services Platform Collector Improper Logging Restriction Vulnerability | 2021-11-17T16:00:00+00:00 | 2021-11-18T22:48:15+00:00 |
| cisco-sa-cspc-xss-kjrnbm3p | Cisco Common Services Platform Collector Stored Cross-Site Scripting Vulnerability | 2021-11-17T16:00:00+00:00 | 2021-11-18T22:48:14+00:00 |
| cisco-sa-CSPC-XSS-KjrNbM3p | Cisco Common Services Platform Collector Stored Cross-Site Scripting Vulnerability | 2021-11-17T16:00:00+00:00 | 2021-11-18T22:48:14+00:00 |
| cisco-sa-cspc-sqli-unvptn5 | Cisco Common Services Platform Collector SQL Injection Vulnerability | 2021-11-17T16:00:00+00:00 | 2021-11-18T22:48:13+00:00 |
| cisco-sa-CSPC-SQLI-unVPTn5 | Cisco Common Services Platform Collector SQL Injection Vulnerability | 2021-11-17T16:00:00+00:00 | 2021-11-18T22:48:13+00:00 |
| cisco-sa-ise-xss1-rgxyry2v | Cisco Identity Services Engine Cross-Site Scripting Vulnerabilities | 2021-10-20T16:00:00+00:00 | 2021-11-12T18:15:57+00:00 |
| cisco-sa-ise-xss1-rgxYry2V | Cisco Identity Services Engine Cross-Site Scripting Vulnerabilities | 2021-10-20T16:00:00+00:00 | 2021-11-12T18:15:57+00:00 |
| cisco-sa-cps-static-key-jms92hnv | Cisco Policy Suite Static SSH Keys Vulnerability | 2021-11-03T16:00:00+00:00 | 2021-11-04T17:32:39+00:00 |
| cisco-sa-cps-static-key-JmS92hNv | Cisco Policy Suite Static SSH Keys Vulnerability | 2021-11-03T16:00:00+00:00 | 2021-11-04T17:32:39+00:00 |
| cisco-sa-webex-activation-3sdnfxcy | Cisco Webex Meetings Email Content Injection Vulnerability | 2021-11-03T16:00:00+00:00 | 2021-11-03T16:00:00+00:00 |
| cisco-sa-webex-activation-3sdNFxcy | Cisco Webex Meetings Email Content Injection Vulnerability | 2021-11-03T16:00:00+00:00 | 2021-11-03T16:00:00+00:00 |
| cisco-sa-vmesh-openred-agnrmf5 | Cisco Webex Video Mesh Arbitrary Site Redirection Vulnerability | 2021-11-03T16:00:00+00:00 | 2021-11-03T16:00:00+00:00 |
| cisco-sa-vmesh-openred-AGNRmf5 | Cisco Webex Video Mesh Arbitrary Site Redirection Vulnerability | 2021-11-03T16:00:00+00:00 | 2021-11-03T16:00:00+00:00 |
| cisco-sa-videomesh-xss-qjm2bdqf | Cisco Webex Video Mesh Cross-Site Scripting Vulnerability | 2021-11-03T16:00:00+00:00 | 2021-11-03T16:00:00+00:00 |
| cisco-sa-videomesh-xss-qjm2BDQf | Cisco Webex Video Mesh Cross-Site Scripting Vulnerability | 2021-11-03T16:00:00+00:00 | 2021-11-03T16:00:00+00:00 |
| cisco-sa-umbrella-user-enum-s7xfjwde | Cisco Umbrella Email Enumeration Vulnerability | 2021-11-03T16:00:00+00:00 | 2021-11-03T16:00:00+00:00 |
| cisco-sa-umbrella-user-enum-S7XfJwDE | Cisco Umbrella Email Enumeration Vulnerability | 2021-11-03T16:00:00+00:00 | 2021-11-03T16:00:00+00:00 |
| cisco-sa-ucm-csrf-xrtkdu3h | Cisco Unified Communications Products Cross-Site Request Forgery Vulnerability | 2021-11-03T16:00:00+00:00 | 2021-11-03T16:00:00+00:00 |
| cisco-sa-ucm-csrf-xrTkDu3H | Cisco Unified Communications Products Cross-Site Request Forgery Vulnerability | 2021-11-03T16:00:00+00:00 | 2021-11-03T16:00:00+00:00 |
| cisco-sa-smb-switches-web-dos-xmyffkt8 | Cisco Small Business 200, 300, and 500 Series Switches Web-Based Management Interface Denial of Service Vulnerability | 2021-11-03T16:00:00+00:00 | 2021-11-03T16:00:00+00:00 |
| cisco-sa-smb-switches-web-dos-xMyFFkt8 | Cisco Small Business 200, 300, and 500 Series Switches Web-Based Management Interface Denial of Service Vulnerability | 2021-11-03T16:00:00+00:00 | 2021-11-03T16:00:00+00:00 |
| cisco-sa-smb-switches-tokens-uzwpr4e5 | Cisco Small Business Series Switches Session Credentials Replay Vulnerability | 2021-11-03T16:00:00+00:00 | 2021-11-03T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-38331 | net: ethernet: cortina: Use TOE/TSO on all TCP | 2025-07-02T00:00:00.000Z | 2026-03-31T14:58:41.000Z |
| msrc_cve-2023-53010 | bnxt: Do not read past the end of test names | 2025-03-02T00:00:00.000Z | 2026-03-31T14:58:39.000Z |
| msrc_cve-2026-3104 | Memory leak in code preparing DNSSEC proofs of non-existence | 2026-03-02T00:00:00.000Z | 2026-03-31T14:58:37.000Z |
| msrc_cve-2024-49899 | drm/amd/display: Initialize denominators' default to 1 | 2024-10-01T07:00:00.000Z | 2026-03-31T14:58:30.000Z |
| msrc_cve-2025-38300 | crypto: sun8i-ce-cipher - fix error handling in sun8i_ce_cipher_prepare() | 2025-07-02T00:00:00.000Z | 2026-03-31T14:58:19.000Z |
| msrc_cve-2023-53009 | drm/amdkfd: Add sync after creating vram bo | 2025-03-02T00:00:00.000Z | 2026-03-31T14:58:16.000Z |
| msrc_cve-2024-26920 | tracing/trigger: Fix to return error if failed to alloc snapshot | 2024-04-02T07:00:00.000Z | 2026-03-31T14:58:09.000Z |
| msrc_cve-2022-48990 | drm/amdgpu: fix use-after-free during gpu recovery | 2024-10-01T07:00:00.000Z | 2026-03-31T14:58:04.000Z |
| msrc_cve-2022-49342 | net: ethernet: bgmac: Fix refcount leak in bcma_mdio_mii_register | 2025-02-02T00:00:00.000Z | 2026-03-31T14:57:55.000Z |
| msrc_cve-2025-37938 | tracing: Verify event formats that have "%*p.." | 2025-05-02T00:00:00.000Z | 2026-03-31T14:57:54.000Z |
| msrc_cve-2024-53093 | nvme-multipath: defer partition scanning | 2024-11-02T00:00:00.000Z | 2026-03-31T14:57:52.000Z |
| msrc_cve-2025-37931 | btrfs: adjust subpage bit start based on sectorsize | 2025-05-02T00:00:00.000Z | 2026-03-31T14:57:31.000Z |
| msrc_cve-2025-38449 | drm/gem: Acquire references on GEM handles for framebuffers | 2025-07-02T00:00:00.000Z | 2026-03-31T14:57:26.000Z |
| msrc_cve-2024-53100 | nvme: tcp: avoid race between queue_lock lock and destroy | 2024-11-02T00:00:00.000Z | 2026-03-31T14:57:25.000Z |
| msrc_cve-2022-49534 | scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT | 2025-02-02T00:00:00.000Z | 2026-03-31T14:57:25.000Z |
| msrc_cve-2024-38543 | lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure | 2024-06-02T07:00:00.000Z | 2026-03-31T14:57:14.000Z |
| msrc_cve-2026-33413 | etcd: Authorization bypasses in multiple APIs | 2026-03-02T00:00:00.000Z | 2026-03-31T14:57:04.000Z |
| msrc_cve-2025-38215 | fbdev: Fix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var | 2025-07-02T00:00:00.000Z | 2026-03-31T14:57:04.000Z |
| msrc_cve-2024-50017 | x86/mm/ident_map: Use gbpages only where full GB page should be mapped. | 2024-10-01T07:00:00.000Z | 2026-03-31T14:57:02.000Z |
| msrc_cve-2025-38436 | drm/scheduler: signal scheduled fence when kill job | 2025-07-02T00:00:00.000Z | 2026-03-31T14:57:01.000Z |
| msrc_cve-2024-53094 | RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES | 2024-11-02T00:00:00.000Z | 2026-03-31T14:57:00.000Z |
| msrc_cve-2022-49547 | btrfs: fix deadlock between concurrent dio writes when low on free data space | 2025-02-02T00:00:00.000Z | 2026-03-31T14:56:59.000Z |
| msrc_cve-2024-38557 | net/mlx5: Reload only IB representors upon lag disable/enable | 2024-06-02T07:00:00.000Z | 2026-03-31T14:56:46.000Z |
| msrc_cve-2025-38198 | fbcon: Make sure modelist not set on unregistered console | 2025-07-02T00:00:00.000Z | 2026-03-31T14:56:40.000Z |
| msrc_cve-2025-38426 | drm/amdgpu: Add basic validation for RAS header | 2025-07-02T00:00:00.000Z | 2026-03-31T14:56:38.000Z |
| msrc_cve-2024-27002 | clk: mediatek: Do a runtime PM get on controllers during probe | 2024-05-02T07:00:00.000Z | 2026-03-31T14:56:38.000Z |
| msrc_cve-2022-48976 | netfilter: flowtable_offload: fix using __this_cpu_add in preemptible | 2024-10-01T07:00:00.000Z | 2026-03-31T14:56:38.000Z |
| msrc_cve-2026-33343 | etcd: Nested etcd transactions bypass RBAC authorization checks | 2026-03-02T00:00:00.000Z | 2026-03-31T14:56:33.000Z |
| msrc_cve-2022-49529 | drm/amdgpu/pm: fix the null pointer while the smu is disabled | 2025-02-02T00:00:00.000Z | 2026-03-31T14:56:33.000Z |
| msrc_cve-2024-43906 | drm/admgpu: fix dereferencing null pointer context | 2024-08-02T00:00:00.000Z | 2026-03-31T14:56:22.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15364-1 | libexslt0-1.1.43-2.1 on GA media | 2025-07-20T00:00:00Z | 2025-07-20T00:00:00Z |
| opensuse-su-2025:15363-1 | libxml2-2-2.13.8-3.1 on GA media | 2025-07-20T00:00:00Z | 2025-07-20T00:00:00Z |
| opensuse-su-2025:15362-1 | java-21-openjdk-21.0.8.0-1.1 on GA media | 2025-07-20T00:00:00Z | 2025-07-20T00:00:00Z |
| opensuse-su-2025:15361-1 | busybox-1.37.0-5.1 on GA media | 2025-07-20T00:00:00Z | 2025-07-20T00:00:00Z |
| opensuse-su-2025:15360-1 | apache2-2.4.64-1.1 on GA media | 2025-07-20T00:00:00Z | 2025-07-20T00:00:00Z |
| opensuse-su-2025:15359-1 | valkey-8.1.3-1.1 on GA media | 2025-07-18T00:00:00Z | 2025-07-18T00:00:00Z |
| opensuse-su-2025:15358-1 | java-24-openjdk-24.0.2.0-1.1 on GA media | 2025-07-18T00:00:00Z | 2025-07-18T00:00:00Z |
| opensuse-su-2025:15357-1 | java-17-openjdk-17.0.16.0-1.1 on GA media | 2025-07-18T00:00:00Z | 2025-07-18T00:00:00Z |
| opensuse-su-2025:15356-1 | java-11-openjdk-11.0.28.0-1.1 on GA media | 2025-07-18T00:00:00Z | 2025-07-18T00:00:00Z |
| opensuse-su-2025:15355-1 | cosign-2.5.3-1.1 on GA media | 2025-07-18T00:00:00Z | 2025-07-18T00:00:00Z |
| opensuse-su-2025:15354-1 | bind-9.20.11-1.1 on GA media | 2025-07-18T00:00:00Z | 2025-07-18T00:00:00Z |
| opensuse-su-2025:15353-1 | rustup-1.28.2~0-1.1 on GA media | 2025-07-17T00:00:00Z | 2025-07-17T00:00:00Z |
| opensuse-su-2025:15352-1 | kubelogin-0.2.10-1.1 on GA media | 2025-07-17T00:00:00Z | 2025-07-17T00:00:00Z |
| opensuse-su-2025:15351-1 | fractal-12.beta+14-1.1 on GA media | 2025-07-17T00:00:00Z | 2025-07-17T00:00:00Z |
| opensuse-su-2025:15350-1 | chromedriver-138.0.7204.157-1.1 on GA media | 2025-07-17T00:00:00Z | 2025-07-17T00:00:00Z |
| opensuse-su-2025:15349-1 | ImageMagick-7.1.2.0-1.1 on GA media | 2025-07-17T00:00:00Z | 2025-07-17T00:00:00Z |
| opensuse-su-2025:15348-1 | FastCGI-2.4.6-1.1 on GA media | 2025-07-17T00:00:00Z | 2025-07-17T00:00:00Z |
| opensuse-su-2025:15347-1 | apache-commons-lang3-3.18.0-1.1 on GA media | 2025-07-16T00:00:00Z | 2025-07-16T00:00:00Z |
| opensuse-su-2025:15346-1 | keylime-ima-policy-0.2.7+117-1.1 on GA media | 2025-07-15T00:00:00Z | 2025-07-15T00:00:00Z |
| opensuse-su-2025:15345-1 | libQt6Concurrent6-6.9.1-2.1 on GA media | 2025-07-15T00:00:00Z | 2025-07-15T00:00:00Z |
| opensuse-su-2025:15344-1 | mailman3-3.3.10-2.1 on GA media | 2025-07-15T00:00:00Z | 2025-07-15T00:00:00Z |
| opensuse-su-2025:15343-1 | ggml-devel-5889-1.1 on GA media | 2025-07-15T00:00:00Z | 2025-07-15T00:00:00Z |
| opensuse-su-2025:15342-1 | xen-4.20.1_02-1.1 on GA media | 2025-07-11T00:00:00Z | 2025-07-11T00:00:00Z |
| opensuse-su-2025:15341-1 | trivy-0.64.1-1.1 on GA media | 2025-07-11T00:00:00Z | 2025-07-11T00:00:00Z |
| opensuse-su-2025:15340-1 | php8-8.4.10-1.1 on GA media | 2025-07-11T00:00:00Z | 2025-07-11T00:00:00Z |
| opensuse-su-2025:15339-1 | liboqs-devel-0.14.0-1.1 on GA media | 2025-07-11T00:00:00Z | 2025-07-11T00:00:00Z |
| opensuse-su-2025:15338-1 | k9s-0.50.7-2.1 on GA media | 2025-07-11T00:00:00Z | 2025-07-11T00:00:00Z |
| opensuse-su-2025:15337-1 | git-2.50.1-1.1 on GA media | 2025-07-11T00:00:00Z | 2025-07-11T00:00:00Z |
| opensuse-su-2025:15336-1 | cmctl-2.3.0-1.1 on GA media | 2025-07-11T00:00:00Z | 2025-07-11T00:00:00Z |
| opensuse-su-2025:15335-1 | afterburn-5.8.2-3.1 on GA media | 2025-07-11T00:00:00Z | 2025-07-11T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:10141 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 3.3.1 | 2026-04-23T13:36:23+00:00 | 2026-05-08T14:59:14+00:00 |
| rhsa-2026:8838 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-17T23:15:06+00:00 | 2026-05-08T14:59:13+00:00 |
| rhsa-2026:10140 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 3.3.1 | 2026-04-23T13:34:50+00:00 | 2026-05-08T14:59:13+00:00 |
| rhsa-2026:7305 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-09T12:35:20+00:00 | 2026-05-08T14:59:12+00:00 |
| rhsa-2026:7307 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-09T12:37:08+00:00 | 2026-05-08T14:59:11+00:00 |
| rhsa-2026:6552 | Red Hat Security Advisory: OpenShift Container Platform 4.18.37 packages and security update | 2026-04-09T08:35:05+00:00 | 2026-05-08T14:58:59+00:00 |
| rhsa-2026:5971 | Red Hat Security Advisory: Satellite 6.16.7 Async Update | 2026-03-26T20:30:38+00:00 | 2026-05-08T14:58:59+00:00 |
| rhsa-2026:5970 | Red Hat Security Advisory: Satellite 6.17.7 Async Update | 2026-03-26T20:28:38+00:00 | 2026-05-08T14:58:59+00:00 |
| rhsa-2026:5878 | Red Hat Security Advisory: OpenShift Container Platform 4.19.27 bug fix and security update | 2026-04-01T09:48:10+00:00 | 2026-05-08T14:58:57+00:00 |
| rhsa-2026:3842 | Red Hat Security Advisory: delve security update | 2026-03-05T11:24:36+00:00 | 2026-05-08T14:58:57+00:00 |
| rhsa-2018:0583 | Red Hat Security Advisory: rh-ruby22-ruby security, bug fix, and enhancement update | 2018-03-26T09:39:32+00:00 | 2026-05-08T14:44:58+00:00 |
| rhsa-2012:0070 | Red Hat Security Advisory: ruby security update | 2012-01-30T18:23:00+00:00 | 2026-05-08T14:44:58+00:00 |
| rhsa-2011:1581 | Red Hat Security Advisory: ruby security, bug fix, and enhancement update | 2011-12-05T19:38:00+00:00 | 2026-05-08T14:44:57+00:00 |
| rhsa-2008:0562 | Red Hat Security Advisory: ruby security update | 2008-07-14T13:38:00+00:00 | 2026-05-08T12:52:39+00:00 |
| rhsa-2008:0561 | Red Hat Security Advisory: ruby security update | 2008-07-14T13:26:00+00:00 | 2026-05-08T12:52:39+00:00 |
| rhsa-2026:8291 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-15T10:20:34+00:00 | 2026-05-08T12:52:38+00:00 |
| rhsa-2011:0910 | Red Hat Security Advisory: ruby security update | 2011-06-28T17:30:00+00:00 | 2026-05-08T10:43:33+00:00 |
| rhsa-2011:0909 | Red Hat Security Advisory: ruby security update | 2011-06-28T17:27:00+00:00 | 2026-05-08T10:43:32+00:00 |
| rhsa-2011:0908 | Red Hat Security Advisory: ruby security update | 2011-06-28T17:21:00+00:00 | 2026-05-08T10:43:31+00:00 |
| rhsa-2026:9699 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.20.2 security update | 2026-04-22T12:35:53+00:00 | 2026-05-08T10:09:36+00:00 |
| rhsa-2026:9698 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.19.3 security update | 2026-04-22T12:29:18+00:00 | 2026-05-08T10:09:36+00:00 |
| rhsa-2026:9697 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.18.5 security update | 2026-04-22T12:28:10+00:00 | 2026-05-08T10:09:36+00:00 |
| rhsa-2026:13938 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-05-06T08:55:25+00:00 | 2026-05-08T09:04:17+00:00 |
| rhsa-2025:0536 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.15.0 | 2025-01-21T16:57:37+00:00 | 2026-05-08T08:47:09+00:00 |
| rhsa-2024:8974 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.12.0 security and bug fixes | 2024-11-06T20:13:07+00:00 | 2026-05-08T08:47:08+00:00 |
| rhsa-2024:8425 | Red Hat Security Advisory: OpenShift Container Platform 4.15.37 bug fix and security update | 2024-10-31T03:37:09+00:00 | 2026-05-08T08:46:59+00:00 |
| rhsa-2024:8260 | Red Hat Security Advisory: OpenShift Container Platform 4.16.18 bug fix and security update | 2024-10-24T10:44:45+00:00 | 2026-05-08T08:46:57+00:00 |
| rhsa-2024:8235 | Red Hat Security Advisory: OpenShift Container Platform 4.14.39 security update | 2024-10-23T13:14:14+00:00 | 2026-05-08T08:46:55+00:00 |
| rhsa-2024:8229 | Red Hat Security Advisory: OpenShift Container Platform 4.17.2 bug fix and security update | 2024-10-23T05:29:09+00:00 | 2026-05-08T08:46:55+00:00 |
| rhsa-2024:7179 | Red Hat Security Advisory: OpenShift Container Platform 4.15.35 bug fix and security update | 2024-10-02T05:49:45+00:00 | 2026-05-08T08:46:49+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0496-1 | Security update for the Linux Kernel | 2026-02-13T10:52:18Z | 2026-02-13T10:52:18Z |
| suse-su-2026:0495-1 | Security update for the Linux Kernel | 2026-02-13T10:52:00Z | 2026-02-13T10:52:00Z |
| suse-su-2026:20428-1 | Security update for go1.25 | 2026-02-13T10:08:20Z | 2026-02-13T10:08:20Z |
| suse-su-2026:0494-1 | Security update for curl | 2026-02-13T09:59:28Z | 2026-02-13T09:59:28Z |
| suse-su-2026:0491-1 | Security update for the Linux Kernel RT (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2026-02-13T06:04:19Z | 2026-02-13T06:04:19Z |
| suse-su-2026:0490-1 | Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 15 SP7) | 2026-02-13T06:04:16Z | 2026-02-13T06:04:16Z |
| suse-su-2026:0489-1 | Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 15 SP7) | 2026-02-13T06:04:12Z | 2026-02-13T06:04:12Z |
| suse-su-2026:0487-1 | Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 2026-02-13T06:04:09Z | 2026-02-13T06:04:09Z |
| suse-su-2026:0484-1 | Security update for munge | 2026-02-12T18:22:45Z | 2026-02-12T18:22:45Z |
| suse-su-2026:0483-1 | Security update for zabbix | 2026-02-12T16:34:19Z | 2026-02-12T16:34:19Z |
| suse-su-2026:0482-1 | Security update for libsodium | 2026-02-12T16:04:29Z | 2026-02-12T16:04:29Z |
| suse-su-2026:0481-1 | Security update for openCryptoki | 2026-02-12T16:04:14Z | 2026-02-12T16:04:14Z |
| suse-su-2026:0480-1 | Security update for helm | 2026-02-12T15:35:07Z | 2026-02-12T15:35:07Z |
| suse-su-2026:0479-1 | Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container, virt-synchronization-controller-container | 2026-02-12T15:34:08Z | 2026-02-12T15:34:08Z |
| suse-su-2026:20426-1 | Security update for rust1.93 | 2026-02-12T15:15:49Z | 2026-02-12T15:15:49Z |
| suse-su-2026:20349-1 | Security update for openssl-3 | 2026-02-12T14:47:03Z | 2026-02-12T14:47:03Z |
| suse-su-2026:20347-1 | Security update for curl | 2026-02-12T14:05:28Z | 2026-02-12T14:05:28Z |
| suse-su-2026:20425-1 | Security update for python-aiohttp, python-Brotli | 2026-02-12T13:59:27Z | 2026-02-12T13:59:27Z |
| suse-su-2026:20346-1 | Security update for util-linux | 2026-02-12T13:57:47Z | 2026-02-12T13:57:47Z |
| suse-su-2026:0477-1 | Security update for xrdp | 2026-02-12T11:45:18Z | 2026-02-12T11:45:18Z |
| suse-su-2026:0476-1 | Security update for python-azure-core | 2026-02-12T11:44:24Z | 2026-02-12T11:44:24Z |
| suse-su-2026:0475-1 | Security update for the Linux Kernel | 2026-02-12T11:32:54Z | 2026-02-12T11:32:54Z |
| suse-su-2026:0474-1 | Security update for the Linux Kernel | 2026-02-12T11:28:48Z | 2026-02-12T11:28:48Z |
| suse-su-2026:0473-1 | Security update for the Linux Kernel | 2026-02-12T11:26:33Z | 2026-02-12T11:26:33Z |
| suse-su-2026:0472-1 | Security update for the Linux Kernel | 2026-02-12T11:26:05Z | 2026-02-12T11:26:05Z |
| suse-su-2026:0471-1 | Security update for the Linux Kernel | 2026-02-12T11:25:44Z | 2026-02-12T11:25:44Z |
| suse-su-2026:0470-1 | Security update for rust-keylime | 2026-02-12T11:22:07Z | 2026-02-12T11:22:07Z |
| suse-su-2026:0469-1 | Security update for libsoup | 2026-02-12T11:21:36Z | 2026-02-12T11:21:36Z |
| suse-su-2026:0460-1 | Security update for python-wheel | 2026-02-11T23:30:06Z | 2026-02-11T23:30:06Z |
| suse-su-2026:0459-1 | Security update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia-persistenced.cuda | 2026-02-11T23:29:36Z | 2026-02-11T23:29:36Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:9277 | Moderate: oci-seccomp-bpf-hook security update | 2024-11-12T00:00:00Z | 2024-11-18T11:46:57Z |
| alsa-2024:9200 | Moderate: runc security update | 2024-11-12T00:00:00Z | 2024-11-18T11:46:57Z |
| alsa-2024:9188 | Low: bpftrace security update | 2024-11-12T00:00:00Z | 2024-11-18T11:46:56Z |
| alsa-2024:9180 | Moderate: mod_auth_openidc security update | 2024-11-12T00:00:00Z | 2024-11-18T11:46:55Z |
| alsa-2024:9089 | Moderate: containernetworking-plugins security update | 2024-11-12T00:00:00Z | 2024-11-18T11:46:53Z |
| alsa-2024:9644 | Important: squid:4 security update | 2024-11-14T00:00:00Z | 2024-11-15T12:51:05Z |
| alsa-2024:9540 | Important: tigervnc security update | 2024-11-13T00:00:00Z | 2024-11-15T12:49:29Z |
| alsa-2024:9636 | Important: webkit2gtk3 security update | 2024-11-14T00:00:00Z | 2024-11-15T12:47:22Z |
| alsa-2024:9689 | Low: binutils security update | 2024-11-14T00:00:00Z | 2024-11-15T12:45:11Z |
| alsa-2024:9573 | Important: libsoup security update | 2024-11-13T00:00:00Z | 2024-11-14T08:09:34Z |
| alsa-2024:9502 | Moderate: expat security update | 2024-11-13T00:00:00Z | 2024-11-13T06:26:28Z |
| alsa-2024:9056 | Moderate: gstreamer1-plugins-base security update | 2024-11-11T00:00:00Z | 2024-11-12T07:10:52Z |
| alsa-2024:9051 | Important: podman security update | 2024-11-11T00:00:00Z | 2024-11-11T07:47:01Z |
| alsa-2024:8935 | Moderate: edk2 security update | 2024-11-06T00:00:00Z | 2024-11-08T09:03:51Z |
| alsa-2024:8846 | Important: container-tools:rhel8 security update | 2024-11-05T00:00:00Z | 2024-11-06T10:20:18Z |
| alsa-2024:8798 | Moderate: xorg-x11-server and xorg-x11-server-Xwayland security update | 2024-11-04T00:00:00Z | 2024-11-06T10:17:31Z |
| alsa-2024:8830 | Low: bpftrace security update | 2024-11-05T00:00:00Z | 2024-11-06T10:15:43Z |
| alsa-2024:8831 | Low: bcc security update | 2024-11-05T00:00:00Z | 2024-11-06T10:14:51Z |
| alsa-2024:8833 | Moderate: libtiff security update | 2024-11-05T00:00:00Z | 2024-11-06T10:13:20Z |
| alsa-2024:8834 | Important: python-gevent security update | 2024-11-05T00:00:00Z | 2024-11-06T10:11:50Z |
| alsa-2024:8836 | Moderate: python3.12 security update | 2024-11-05T00:00:00Z | 2024-11-06T10:10:27Z |
| alsa-2024:8838 | Moderate: python3.11 security update | 2024-11-05T00:00:00Z | 2024-11-06T10:08:30Z |
| alsa-2024:8842 | Moderate: python3.12-urllib3 security update | 2024-11-05T00:00:00Z | 2024-11-06T10:06:23Z |
| alsa-2024:8843 | Moderate: python3.11-urllib3 security update | 2024-11-05T00:00:00Z | 2024-11-06T10:04:47Z |
| alsa-2024:8847 | Moderate: grafana-pcp security update | 2024-11-05T00:00:00Z | 2024-11-06T10:01:28Z |
| alsa-2024:8849 | Moderate: haproxy security update | 2024-11-05T00:00:00Z | 2024-11-06T09:59:57Z |
| alsa-2024:8856 | Moderate: kernel security update | 2024-11-05T00:00:00Z | 2024-11-06T09:58:25Z |
| alsa-2024:8859 | Moderate: xmlrpc-c security update | 2024-11-05T00:00:00Z | 2024-11-06T09:55:25Z |
| alsa-2024:8860 | Important: krb5 security update | 2024-11-05T00:00:00Z | 2024-11-06T09:53:37Z |
| alsa-2024:8870 | Moderate: kernel-rt security update | 2024-11-05T00:00:00Z | 2024-11-06T09:52:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-1121 | Global-buffer-overflow in get_unpack_proc | 2022-10-31T00:01:58.006119Z | 2022-11-04T00:38:08.490845Z |
| osv-2022-1133 | Security exception in org.codehaus.janino.Parser.parseAssignmentExpression | 2022-11-04T00:01:16.930555Z | 2022-11-04T00:01:16.930773Z |
| osv-2022-1132 | Heap-buffer-overflow in add_compile_string | 2022-11-04T00:01:02.762454Z | 2022-11-04T00:01:02.762704Z |
| osv-2022-1131 | Heap-use-after-free in gs_font_finalize | 2022-11-04T00:00:42.594752Z | 2022-11-04T00:00:42.595012Z |
| osv-2022-1128 | Heap-buffer-overflow in void rawspeed::DngOpcodes::PixelOpcode::applyOP<unsigned short, rawspeed::DngOpc | 2022-11-02T00:02:45.378194Z | 2022-11-02T00:02:45.378451Z |
| osv-2022-1126 | Security exception in java.base/jdk.internal.math.FloatingDecimal.readJavaFormatString | 2022-11-02T00:00:25.597410Z | 2022-11-02T00:00:25.597684Z |
| osv-2022-1122 | Heap-buffer-overflow in LibRaw::phase_one_correct | 2022-10-31T00:02:41.800433Z | 2022-10-31T00:02:41.800685Z |
| osv-2022-1120 | Heap-use-after-free in xmlXIncludeDoProcess | 2022-10-31T00:01:06.205897Z | 2022-10-31T00:01:06.206161Z |
| osv-2022-715 | Segv on unknown address in jpeg_read_scanlines | 2022-08-15T00:00:50.156496Z | 2022-10-30T22:16:00.000000Z |
| osv-2022-1114 | Heap-buffer-overflow in g_strchug | 2022-10-29T00:02:16.621855Z | 2022-10-29T00:02:16.622144Z |
| osv-2022-1113 | Heap-buffer-overflow in ForceZero | 2022-10-29T00:02:15.234535Z | 2022-10-29T00:02:15.234747Z |
| osv-2022-1112 | Heap-buffer-overflow in wmem_strbuf_append_vprintf | 2022-10-29T00:02:08.475185Z | 2022-10-29T00:02:08.475437Z |
| osv-2022-1111 | Heap-buffer-overflow in expert_set_info_vformat | 2022-10-29T00:01:00.172919Z | 2022-10-29T00:01:00.173162Z |
| osv-2022-1110 | Heap-buffer-overflow in parse_classes_64 | 2022-10-29T00:00:58.770691Z | 2022-10-29T00:00:58.770919Z |
| osv-2022-1109 | Security exception in java.base/jdk.internal.math.FloatingDecimal.readJavaFormatString | 2022-10-29T00:00:36.758920Z | 2022-10-29T00:00:36.759244Z |
| osv-2022-1108 | Use-after-poison in /mnt/scratch0/clusterfuzz/bot/builds/clusterfuzz-builds_ruby_e5a0a396033f4deba21 | 2022-10-29T00:00:16.195172Z | 2022-10-29T00:00:16.195411Z |
| osv-2022-1107 | Heap-buffer-overflow in LibRaw::kodak_rgb_load_raw | 2022-10-29T00:00:14.932789Z | 2022-10-29T00:00:14.933033Z |
| osv-2022-1104 | Stack-buffer-overflow in LibRaw::xtrans_interpolate | 2022-10-28T00:02:31.850780Z | 2022-10-28T00:02:31.851036Z |
| osv-2022-1102 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2022-10-28T00:00:28.941716Z | 2022-10-28T00:00:28.941977Z |
| osv-2022-1098 | Heap-buffer-overflow in fasthuf_initialize | 2022-10-27T00:01:30.614104Z | 2022-10-27T00:01:30.614382Z |
| osv-2022-1097 | Stack-use-after-return in gs_type2_interpret | 2022-10-26T00:02:22.076282Z | 2022-10-26T00:02:22.076539Z |
| osv-2022-1096 | Security exception in jaz.Zer.<clinit> | 2022-10-26T00:02:21.642341Z | 2022-10-26T00:02:21.642563Z |
| osv-2022-1093 | Heap-buffer-overflow in LibRaw::kodak_rgb_load_raw | 2022-10-25T00:02:48.098918Z | 2022-10-25T00:02:48.099166Z |
| osv-2022-1085 | Heap-buffer-overflow in Ins_ALIGNRP | 2022-10-24T00:02:10.728084Z | 2022-10-24T00:02:10.728645Z |
| osv-2022-1084 | Stack-buffer-overflow in authentic_parse_size | 2022-10-24T00:01:05.279645Z | 2022-10-24T00:01:05.279893Z |
| osv-2022-1079 | Stack-buffer-overflow in add_ff_action | 2022-10-23T00:00:23.841917Z | 2022-10-23T00:00:23.842187Z |
| osv-2022-1078 | Heap-buffer-overflow in LibRaw_buffer_datastream::read | 2022-10-22T00:02:28.969073Z | 2022-10-22T00:02:28.969542Z |
| osv-2022-1063 | Heap-use-after-free in xps_image_enum_finalize | 2022-10-19T00:00:45.093099Z | 2022-10-21T00:38:08.934054Z |
| osv-2022-1071 | Heap-use-after-free in xmlXIncludeCopyXPointer | 2022-10-21T00:02:26.399267Z | 2022-10-21T00:02:26.399509Z |
| osv-2022-1067 | Security exception in jaz.Zer.<clinit> | 2022-10-21T00:00:11.016183Z | 2022-10-21T00:00:11.016564Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-python-2024-6923 | Email header injection due to unquoted newlines | 2024-08-19T09:33:54.548Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-6232 | Regular-expression DoS when parsing TarFile headers | 2024-09-16T12:04:20.671Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-4032 | Incorrect IPv4 and IPv6 private ranges | 2024-06-20T11:17:24.961Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-11168 | Improper validation of IPv6 and IPvFuture addresses | 2024-12-10T11:25:45.323Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-0450 | Quoted zip-bomb protection for zipfile | 2024-12-13T12:41:10.011Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-0397 | Memory race condition in ssl.SSLContext certificate store methods | 2024-06-20T11:18:14.556Z | 2025-11-06T13:25:46.476Z |
| bit-python-2023-6597 | 2024-12-13T12:41:26.412Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2023-40217 | 2024-03-06T11:03:14.481Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2023-27043 | 2024-10-22T12:06:11.918Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2023-24329 | 2024-03-06T11:04:03.580Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2022-42919 | 2024-03-06T11:05:06.167Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2022-0391 | 2024-03-06T11:05:40.083Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2021-4189 | 2024-03-06T11:05:50.693Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2021-3737 | 2024-03-06T11:06:04.065Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2021-3733 | 2024-03-06T11:06:14.679Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2021-3426 | 2024-03-06T11:06:24.568Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2021-29921 | 2024-03-06T11:06:43.578Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2021-28861 | 2024-03-06T11:06:51.991Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2020-10735 | 2024-03-06T11:08:16.884Z | 2025-11-06T13:25:46.476Z | |
| bit-postgresql-2024-10979 | PostgreSQL PL/Perl environment variable changes execute arbitrary code | 2024-11-16T07:16:38.797Z | 2025-11-06T13:25:46.476Z |
| bit-postgresql-2024-10978 | PostgreSQL SET ROLE, SET SESSION AUTHORIZATION reset to wrong user ID | 2024-11-16T07:16:45.984Z | 2025-11-06T13:25:46.476Z |
| bit-postgresql-2024-10977 | PostgreSQL libpq retains an error message from man-in-the-middle | 2024-11-16T07:16:52.278Z | 2025-11-06T13:25:46.476Z |
| bit-postgresql-2024-10976 | PostgreSQL row security below e.g. subqueries disregards user ID changes | 2024-11-16T07:16:59.886Z | 2025-11-06T13:25:46.476Z |
| bit-postgresql-2023-5870 | Postgresql: role pg_signal_backend can signal certain superuser processes. | 2024-03-06T11:02:29.084Z | 2025-11-06T13:25:46.476Z |
| bit-postgresql-2023-5869 | Postgresql: buffer overrun from integer overflow in array modification | 2024-03-06T11:02:41.294Z | 2025-11-06T13:25:46.476Z |
| bit-postgresql-2023-5868 | Postgresql: memory disclosure in aggregate function calls | 2024-03-06T11:02:52.082Z | 2025-11-06T13:25:46.476Z |
| bit-pip-2025-8869 | Fallback tar extraction in pip doesn't check symbolic links point to extraction directory | 2025-09-26T08:48:13.610Z | 2025-11-06T13:25:46.476Z |
| bit-pip-2023-5752 | Mercurial configuration injectable in repo revision when installing via pip | 2024-03-06T11:01:43.973Z | 2025-11-06T13:25:46.476Z |
| bit-phpmyadmin-2025-24530 | 2025-04-24T07:21:48.097Z | 2025-11-06T13:25:46.476Z | |
| bit-phpmyadmin-2025-24529 | 2025-04-24T07:21:41.489Z | 2025-11-06T13:25:46.476Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0729 | Multiples vulnérabilités dans Qnap File Station | 2025-08-26T00:00:00.000000 | 2025-08-26T00:00:00.000000 |
| CERTFR-2025-AVI-0730 | Multiples vulnérabilités dans Citrix NetScaler ADC et NetScaler Gateway | 2025-08-26T00:00:00.000000 | 2025-08-26T00:00:00.000000 |
| CERTFR-2025-AVI-0729 | Multiples vulnérabilités dans Qnap File Station | 2025-08-26T00:00:00.000000 | 2025-08-26T00:00:00.000000 |
| certfr-2025-avi-0728 | Vulnérabilité dans Centreon Web | 2025-08-25T00:00:00.000000 | 2025-08-25T00:00:00.000000 |
| certfr-2025-avi-0727 | Multiples vulnérabilités dans les produits ESET | 2025-08-25T00:00:00.000000 | 2025-08-25T00:00:00.000000 |
| certfr-2025-avi-0726 | Vulnérabilité dans les produits Moxa | 2025-08-25T00:00:00.000000 | 2025-08-25T00:00:00.000000 |
| certfr-2025-avi-0725 | Vulnérabilité dans Liferay | 2025-08-25T00:00:00.000000 | 2025-08-25T00:00:00.000000 |
| certfr-2025-avi-0643 | Vulnérabilité dans Mattermost Server | 2025-07-31T00:00:00.000000 | 2025-08-25T00:00:00.000000 |
| CERTFR-2025-AVI-0728 | Vulnérabilité dans Centreon Web | 2025-08-25T00:00:00.000000 | 2025-08-25T00:00:00.000000 |
| CERTFR-2025-AVI-0727 | Multiples vulnérabilités dans les produits ESET | 2025-08-25T00:00:00.000000 | 2025-08-25T00:00:00.000000 |
| CERTFR-2025-AVI-0726 | Vulnérabilité dans les produits Moxa | 2025-08-25T00:00:00.000000 | 2025-08-25T00:00:00.000000 |
| CERTFR-2025-AVI-0725 | Vulnérabilité dans Liferay | 2025-08-25T00:00:00.000000 | 2025-08-25T00:00:00.000000 |
| CERTFR-2025-AVI-0643 | Vulnérabilité dans Mattermost Server | 2025-07-31T00:00:00.000000 | 2025-08-25T00:00:00.000000 |
| certfr-2025-avi-0724 | Multiples vulnérabilités dans les produits IBM | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| certfr-2025-avi-0723 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| certfr-2025-avi-0722 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| certfr-2025-avi-0721 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| certfr-2025-avi-0720 | Multiples vulnérabilités dans Microsoft Windows | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| certfr-2025-avi-0719 | Vulnérabilité dans Microsoft Edge | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| certfr-2025-avi-0718 | Multiples vulnérabilités dans les produits Liferay | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| CERTFR-2025-AVI-0724 | Multiples vulnérabilités dans les produits IBM | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| CERTFR-2025-AVI-0723 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| CERTFR-2025-AVI-0722 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| CERTFR-2025-AVI-0721 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| CERTFR-2025-AVI-0720 | Multiples vulnérabilités dans Microsoft Windows | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| CERTFR-2025-AVI-0719 | Vulnérabilité dans Microsoft Edge | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| CERTFR-2025-AVI-0718 | Multiples vulnérabilités dans les produits Liferay | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| certfr-2025-avi-0717 | Vulnérabilité dans Elastic Beats | 2025-08-21T00:00:00.000000 | 2025-08-21T00:00:00.000000 |
| certfr-2025-avi-0716 | Vulnérabilité dans les produits Apple | 2025-08-21T00:00:00.000000 | 2025-08-21T00:00:00.000000 |
| certfr-2025-avi-0715 | Multiples vulnérabilités dans les produits Liferay | 2025-08-21T00:00:00.000000 | 2025-08-21T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2017-000119 | Installer of Houkokusyo Sakusei Shien Tool provided by Ministry of the Environment may insecurely load Dynamic Link Libraries | 2017-06-05T13:47+09:00 | 2018-01-17T13:49+09:00 |
| jvndb-2016-000231 | kintone mobile for Android fails to verify SSL server certificates | 2016-11-28T13:47+09:00 | 2018-01-17T12:34+09:00 |
| jvndb-2017-000109 | Installer of SaAT Netizen may insecurely load Dynamic Link Libraries | 2017-06-02T14:00+09:00 | 2018-01-17T12:29+09:00 |
| jvndb-2017-000093 | WordPress plugin "MaxButtons" vulnerable to cross-site scripting | 2017-05-16T13:59+09:00 | 2018-01-17T12:28+09:00 |
| jvndb-2017-000110 | Installer of SaAT Personal may insecurely load Dynamic Link Libraries | 2017-06-02T14:00+09:00 | 2018-01-17T12:25+09:00 |
| jvndb-2016-000218 | CG-WLR300NX vulnerable to cross-site scripting | 2016-11-11T14:49+09:00 | 2018-01-17T12:18+09:00 |
| jvndb-2016-000217 | CG-WLR300NX vulnerable to cross-site request forgery | 2016-11-11T14:49+09:00 | 2018-01-17T12:18+09:00 |
| jvndb-2016-000213 | mobiGate App fails to verify SSL server certificates | 2016-11-01T13:47+09:00 | 2018-01-17T12:18+09:00 |
| jvndb-2016-000210 | SQL injection vulnerability in WordPress plugin WP-OliveCart | 2016-10-20T14:22+09:00 | 2018-01-17T12:10+09:00 |
| jvndb-2016-000209 | Cross-site request forgery vulnerability in WordPress plugin WP-OliveCart | 2016-10-20T14:22+09:00 | 2018-01-17T12:10+09:00 |
| jvndb-2016-000208 | Cross-site scripting vulnerability in WordPress plugin WP-OliveCart | 2016-10-20T14:22+09:00 | 2018-01-17T12:10+09:00 |
| jvndb-2016-000220 | DERAEMON-CMS vulnerable to cross-site scripting | 2016-11-15T13:41+09:00 | 2018-01-17T12:09+09:00 |
| jvndb-2016-000219 | CG-WLR300NX fails to restrict access permissions | 2016-11-11T14:50+09:00 | 2018-01-17T12:09+09:00 |
| jvndb-2016-000221 | Multiple I-O DATA network camera products vulnerable to information disclosure | 2016-11-11T13:51+09:00 | 2018-01-17T12:02+09:00 |
| jvndb-2016-000232 | Simple keitai chat vulnerable to cross-site scripting | 2016-11-25T13:54+09:00 | 2018-01-17T11:57+09:00 |
| jvndb-2016-000194 | Docomo L-04D mobile WiFi router vulnerable to cross-site request forgery | 2016-10-03T15:17+09:00 | 2018-01-17T11:53+09:00 |
| jvndb-2016-000234 | Multiple I-O DATA network camera products vulnerable to OS command injection | 2016-11-30T15:17+09:00 | 2018-01-17T11:52+09:00 |
| jvndb-2016-000242 | Sleipnir for Mac vulnerable to URL spoofing | 2016-12-07T14:44+09:00 | 2018-01-17T11:48+09:00 |
| jvndb-2016-000235 | Multiple I-O DATA network camera products vulnerable to buffer overflow | 2016-11-30T15:17+09:00 | 2018-01-17T11:48+09:00 |
| jvndb-2016-000207 | The installer of e-Tax Software may insecurely load Dynamic Link Libraries | 2016-10-19T12:29+09:00 | 2018-01-17T11:48+09:00 |
| jvndb-2017-000092 | WordPress plugin "WP Booking System" vulnerable to cross-site scripting | 2017-05-16T13:58+09:00 | 2018-01-17T11:46+09:00 |
| jvndb-2017-010584 | AssetView and AssetView PLATINUM contain multiple vulnerabilities | 2018-01-12T15:32+09:00 | 2018-01-12T15:32+09:00 |
| jvndb-2017-010236 | Cross-site Scripting Vulnerability in Fujitsu NetCOBOL | 2018-01-12T15:07+09:00 | 2018-01-12T15:07+09:00 |
| jvndb-2017-004687 | Cross-site Scripting Vulnerability in Fujitsu Interstage List Works | 2018-01-12T14:58+09:00 | 2018-01-12T14:58+09:00 |
| jvndb-2016-000212 | The installer of The Public Certification Service for Individuals "The JPKI user's software" may insecurely load Dynamic Link Libraries | 2016-11-01T16:44+09:00 | 2017-12-25T11:28+09:00 |
| jvndb-2016-000211 | Installer of 7-Zip for Windows may insecurely load Dynamic Link Libraries | 2016-10-26T15:13+09:00 | 2017-12-25T10:27+09:00 |
| jvndb-2017-000091 | FlashAir do not set credential information in PhotoShare | 2017-05-16T15:46+09:00 | 2017-12-21T19:16+09:00 |
| jvndb-2017-000090 | FlashAir fails to restrict access permissions in PhotoShare | 2017-05-16T15:34+09:00 | 2017-12-21T19:13+09:00 |
| jvndb-2017-000069 | Multiple installers of Toshiba memory card related software may insecurely load Dynamic Link Libraries | 2017-04-14T14:09+09:00 | 2017-12-21T17:50+09:00 |
| jvndb-2017-010275 | Cross-site Scripting Vulnerability in JP1/Service Support and JP1/Integrated Management - Service Support | 2017-12-11T11:46+09:00 | 2017-12-20T11:09+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-07944 | iccDEV签名解析器空指针引用漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07943 | iccDEV无效枚举值漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07942 | iccDEV XML计算器解析器空指针取消引用漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07941 | iccDEV CIccTagCurve::CIccTagCurve函数未定义行为漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07940 | iccDEV CIccTagSparseMatrixArray空指针引用漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07939 | iccDEV XML解析器空指针引用漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07938 | iccDEV ToneMap解析器堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07937 | iccDEV IccTagXml函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07936 | iccDEV CIccXmlArrayType::ParseText函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07935 | iccDEV CIccLocalizedUnicode::GetText函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07934 | iccDEV CIccCLUT::Init函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07933 | iccDEV堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07249 | Google Android逻辑错误漏洞 | 2025-09-08 | 2026-01-26 |
| cnvd-2026-07248 | Google Android缺少权限检查漏洞 | 2025-09-08 | 2026-01-26 |
| cnvd-2026-07240 | Google Chrome实现不当漏洞(CNVD-2026-07240) | 2026-01-23 | 2026-01-26 |
| cnvd-2026-07196 | Microsoft Excel代码执行漏洞(CNVD-2026-07196) | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07195 | Adobe Substance3D Stager资源管理错误漏洞(CNVD-2026-07195) | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07194 | Adobe Substance3D Modeler越界读取漏洞(CNVD-2026-07194) | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07193 | Adobe Substance3D Modeler越界读取漏洞(CNVD-2026-07193) | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07192 | Adobe Substance3D Designer越界读取漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07191 | Adobe Substance3D Designer缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07190 | Adobe Illustrator代码问题漏洞(CNVD-2026-07190) | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07189 | Adobe Illustrator代码问题漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07188 | Adobe Dreamweaver Desktop输入验证错误漏洞(CNVD-2026-07188) | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07187 | Adobe Dreamweaver Desktop输入验证错误漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07160 | Fuji Electric V-SFT栈缓冲区溢出漏洞 | 2025-10-15 | 2026-01-26 |
| cnvd-2026-06337 | 用友网络科技股份有限公司U8 cloud存在信息泄露漏洞 | 2025-12-12 | 2026-01-26 |
| cnvd-2026-06272 | 用友网络科技股份有限公司U8 cloud存在SQL注入漏洞(CNVD-2026-06272) | 2025-12-12 | 2026-01-26 |
| cnvd-2026-06106 | 湖南强智科技发展有限公司教务管理系统存在SQL注入漏洞(CNVD-2026-06106 ) | 2025-12-15 | 2026-01-26 |
| cnvd-2026-07157 | Tenda FH1203 page参数栈缓冲区溢出漏洞 | 2023-07-12 | 2026-01-23 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01282 | Уязвимость функции dml21_map_dc_state_into_dml_display_cfg() модуля drivers/gpu/drm/amd/d… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01226 | Уязвимость метода API ConnectToHub почтового сервера SmarterTools SmarterMail, позволяюща… | 04.02.2026 | 06.02.2026 |
| bdu:2025-16208 | Уязвимость инструмента разработчика «1С:Библиотека стандартных подсистем», связанная с не… | 23.12.2025 | 06.02.2026 |
| bdu:2025-16207 | Уязвимость программных обеспечений 1С: ERP Управление предприятием, 1С:Комплексная автома… | 23.12.2025 | 06.02.2026 |
| bdu:2025-14380 | Уязвимость программного инструмента организации безопасного доступа для кластеров Kuberne… | 17.11.2025 | 06.02.2026 |
| bdu:2026-01281 | Уязвимость пакетов npm React Router и Remix, связанная с непринятием мер по защите структ… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01280 | Уязвимость функции pinmux_func_name_to_selector() модуля drivers/pinctrl/pinmux.c драйвер… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01279 | Уязвимость расширения vscode-go редактора исходного кода Visual Studio Code, позволяющая … | 05.02.2026 | 05.02.2026 |
| bdu:2026-01278 | Уязвимость функции target_lu_gp_members_show() модуля drivers/target/target_core_configfs… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01277 | Уязвимость функции essiv_aead_crypt() компонента essiv ядра операционной системы Linux, п… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01276 | Уязвимость функции smb_break_all_levII_oplock() модуля fs/smb/server/oplock.c сервера SMB… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01275 | Уязвимость функции rcu_read_unlock_special() модуля kernel/rcu/tree_plugin.h ядра операци… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01274 | Уязвимость PHP-фреймворка Laravel, связанная с непринятием мер по нейтрализации подстанов… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01273 | Уязвимость функции smb2_reconnect_server() модуля fs/smb/client/smb2pdu.c поддержки клие… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01272 | Уязвимость функции amd_iommu_report_page_fault() модуля drivers/iommu/amd/iommu.c драйвер… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01271 | Уязвимость функции parse_features() модуля drivers/md/dm-flakey.c драйвера нескольких уст… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01270 | Уязвимость функции mt7921_usb_sdio_tx_prepare_skb() модуля drivers/net/wireless/mediatek/… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01269 | Уязвимость функции txBegin() модуля fs/jfs/jfs_txnmgr.c файловой системы JFS ядра операци… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01268 | Уязвимость функции btracker_destroy() модуля drivers/md/dm-cache-background-tracker.c дра… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01267 | Уязвимость функции usbtmc_ioctl_request() модуля drivers/usb/class/usbtmc.c драйвера устр… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01266 | Уязвимость функции brcmf_set_pmk() модуля drivers/net/wireless/broadcom/brcm80211/brcmfma… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01265 | Уязвимость функции nfs_set_pgio_error() модуля fs/nfs/pagelist.c поддержки клиентов NFS я… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01264 | Уязвимость функции alloc_event_waiters() модуля drivers/gpu/drm/amd/amdkfd/kfd_events.c д… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01263 | Уязвимость функции vmbus_bus_init() модуля drivers/hv/vmbus_drv.c драйвера поддержки гост… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01262 | Уязвимость функции longhaul_exit() модуля drivers/cpufreq/longhaul.c драйвера масштабиров… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01261 | Уязвимость функции dcn401_init_hw() модуля drivers/gpu/drm/amd/display/dc/hwss/dcn401/dcn… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01260 | Уязвимость функции hci_conn_complete_evt() модуля net/bluetooth/hci_event.c ядра операцио… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01259 | Уязвимость функции binder_inc_ref_for_node() модуля drivers/android/binder.c драйвера свя… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01258 | Уязвимость функции pm8001_chip_fw_flash_update_req() модуля drivers/scsi/pm8001/pm8001_hw… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01257 | Уязвимость функции interrupt_preinit_v3_hw() модуля drivers/scsi/hisi_sas/hisi_sas_v3_hw.… | 05.02.2026 | 05.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202302-0482 | A timing based side channel exists in the OpenSSL RSA Decryption implementation which cou… | 2024-06-17T11:16:50.530000Z |
| var-200609-1021 | Unspecified vulnerability in CFNetwork in Mac OS 10.4.8 and earlier allows user-assisted … | 2024-06-17T11:14:30.321000Z |
| var-201506-0497 | The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 … | 2024-06-17T11:09:37.934000Z |
| var-201306-0247 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-06-17T11:06:10.007000Z |
| var-201310-0349 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, J… | 2024-06-17T11:01:47.379000Z |
| var-200609-1388 | The Apple Type Services (ATS) server in Mac OS X 10.4.8 and earlier does not securely cre… | 2024-06-17T10:47:41.719000Z |
| var-201511-0294 | The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows … | 2024-06-17T10:39:27.524000Z |
| var-201302-0249 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-06-17T10:36:22.734000Z |
| var-201109-0130 | The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft In… | 2024-06-17T10:34:10.800000Z |
| var-201304-0105 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-06-17T10:29:12.558000Z |
| var-200609-1381 | The Security Framework in Apple Mac OS X 10.3.9, and 10.4.x before 10.4.7, does not prope… | 2024-06-17T10:23:16.222000Z |
| var-200609-0665 | The Online Certificate Status Protocol (OCSP) service in the Security Framework in Apple … | 2024-06-17T10:22:52.185000Z |
| var-201306-0249 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-06-17T10:13:08.871000Z |
| var-201404-0585 | MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat,… | 2024-06-17T10:12:21.043000Z |
| var-201501-0435 | OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attack… | 2024-06-17T10:09:08.262000Z |
| var-200609-1216 | The Security Framework in Apple Mac OS X 10.4 through 10.4.8 allows remote attackers to c… | 2024-06-17T09:57:10.804000Z |
| var-201302-0230 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-06-17T09:50:56.738000Z |
| var-200609-1143 | The Security Framework in Apple Mac OS X 10.3.x up to 10.3.9 does not properly prioritize… | 2024-06-17T09:39:54.333000Z |
| var-201306-0257 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-06-17T09:19:49.709000Z |
| var-201110-0383 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2024-06-17T08:59:38.963000Z |
| var-201304-0189 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-06-17T08:58:07.454000Z |
| var-201408-0090 | The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0… | 2024-06-17T08:53:04.393000Z |
| var-200609-1397 | The Airport driver for certain Orinoco based Airport cards in Darwin kernel 8.8.0 in Appl… | 2024-06-17T08:52:34.191000Z |
| var-200609-0708 | Multiple buffer overflows in the Apple Type Services (ATS) server in Mac OS X 10.4 throug… | 2024-06-17T05:07:33.457000Z |
| var-200110-0190 | Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.… | 2024-06-17T04:47:26.073000Z |
| var-200609-1424 | The Installer application in Apple Mac OS X 10.4.8 and earlier, when used by a user with … | 2024-06-17T04:37:16.023000Z |
| var-200609-1132 | The Security Framework in Apple Mac OS X 10.4 through 10.4.8 allows remote attackers to c… | 2024-06-17T04:01:33.384000Z |
| var-200609-1306 | The Security Framework in Apple Mac OS X 10.3.9, and 10.4.x before 10.4.7, does not prope… | 2024-06-17T03:59:16.226000Z |
| var-200609-0855 | The Online Certificate Status Protocol (OCSP) service in the Security Framework in Apple … | 2024-06-17T03:48:59.542000Z |
| var-200609-1208 | The FTP server in Apple Mac OS X 10.4.8 and earlier, when FTP Access is enabled, will cra… | 2024-06-17T03:41:22.867000Z |