Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-1502 |
5.7 (4.0)
|
HTTP client proxy tunnel headers not validated for CR/LF |
Python Software Foundation |
CPython |
2026-04-10T17:54:44.121Z | 2026-04-11T04:39:26.099Z |
| CVE-2026-32932 |
4.7 (3.1)
|
Chamilo LMS has an Open Redirect via Unvalidated 'page… |
chamilo |
chamilo-lms |
2026-04-10T17:51:58.480Z | 2026-04-10T17:51:58.480Z |
| CVE-2026-32931 |
7.5 (3.1)
|
Chamilo LMS has Arbitrary File Upload via MIME-Only Va… |
chamilo |
chamilo-lms |
2026-04-10T17:50:40.176Z | 2026-04-10T17:50:40.176Z |
| CVE-2026-32930 |
7.1 (3.1)
|
Chamilo LMS has an IDOR in Gradebook Allows Cross-Cour… |
chamilo |
chamilo-lms |
2026-04-10T17:48:51.774Z | 2026-04-10T18:32:13.726Z |
| CVE-2026-32894 |
7.1 (3.1)
|
Chamilo LMS has an IDOR in Gradebook Allows Cross-Cour… |
chamilo |
chamilo-lms |
2026-04-10T17:44:24.994Z | 2026-04-10T17:44:24.994Z |
| CVE-2026-32893 |
5.4 (3.1)
|
Chamilo LMS has Reflected XSS via Unsanitized http_bui… |
chamilo |
chamilo-lms |
2026-04-10T17:42:24.220Z | 2026-04-10T17:42:24.220Z |
| CVE-2026-31941 |
7.7 (3.1)
|
Server-Side Request Forgery (SSRF) in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:37:50.948Z | 2026-04-10T18:33:22.920Z |
| CVE-2026-31940 |
7.5 (3.1)
|
Session Fixation in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:35:10.661Z | 2026-04-10T17:35:10.661Z |
| CVE-2026-5483 |
8.5 (3.1)
|
Odh-dashboard: odh dashboard kubernetes service accoun… |
Red Hat |
Red Hat OpenShift AI 2.16 |
2026-04-10T17:33:25.055Z | 2026-04-10T21:07:45.000Z |
| CVE-2026-31939 |
8.3 (3.1)
|
Path Traversal (Arbitrary File Delete) in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:32:29.252Z | 2026-04-10T17:32:29.252Z |
| CVE-2025-66447 |
0 (3.1)
|
Chamilo LMS has validation-less redirect on login page |
chamilo |
chamilo-lms |
2026-04-10T17:22:32.443Z | 2026-04-10T17:22:32.443Z |
| CVE-2026-40163 |
8.2 (3.1)
|
Saltcorn has an Unauthenticated Path Traversal in sync… |
saltcorn |
saltcorn |
2026-04-10T17:07:49.067Z | 2026-04-10T17:07:49.067Z |
| CVE-2026-40162 |
7.1 (3.1)
|
Bugsink affected by authenticated arbitrary file write… |
bugsink |
bugsink |
2026-04-10T17:02:58.985Z | 2026-04-10T18:30:44.339Z |
| CVE-2026-22560 |
N/A
|
An open redirect vulnerability in Rocket.Chat ver… |
Rocket.Chat |
Rocket.Chat |
2026-04-10T17:00:11.746Z | 2026-04-10T17:00:11.746Z |
| CVE-2026-40160 |
7.1 (4.0)
|
PraisonAIAgents has SSRF via unvalidated URL in `web_c… |
MervinPraison |
PraisonAIAgents |
2026-04-10T16:59:09.542Z | 2026-04-10T16:59:09.542Z |
| CVE-2026-40159 |
5.5 (3.1)
|
PraisonAI Exposes Sensitive Environment Variable via U… |
MervinPraison |
PraisonAI |
2026-04-10T16:57:11.623Z | 2026-04-10T16:57:11.623Z |
| CVE-2026-40158 |
8.6 (3.1)
|
PraisonAI has Improper Control of Generation of Code (… |
MervinPraison |
PraisonAI |
2026-04-10T16:49:24.753Z | 2026-04-10T18:31:12.440Z |
| CVE-2026-40157 |
9.4 (4.0)
|
PraisonAI affected by arbitrary file write via path tr… |
MervinPraison |
PraisonAI |
2026-04-10T16:47:16.109Z | 2026-04-10T16:47:16.109Z |
| CVE-2026-40156 |
7.8 (3.1)
|
PraisonAI Affected by Implicit Execution of Arbitrary … |
MervinPraison |
PraisonAI |
2026-04-10T16:46:15.807Z | 2026-04-10T16:46:15.807Z |
| CVE-2026-40100 |
5.3 (3.1)
|
FastGPT has Unauthenticated SSRF in /api/core/app/mcpT… |
labring |
FastGPT |
2026-04-10T16:39:25.856Z | 2026-04-10T16:39:25.856Z |
| CVE-2026-40097 |
3.7 (3.1)
|
Step CA affected by an index out of bounds panic in TP… |
smallstep |
certificates |
2026-04-10T16:34:53.330Z | 2026-04-10T18:30:15.176Z |
| CVE-2026-40074 |
6.3 (4.0)
|
SvelteKit's invalidated redirect in handle hook causes… |
sveltejs |
kit |
2026-04-10T16:26:07.068Z | 2026-04-10T16:26:07.068Z |
| CVE-2026-40073 |
8.2 (4.0)
|
SvelteKit has a BODY_SIZE_LIMIT bypass in @sveltejs/ad… |
sveltejs |
kit |
2026-04-10T16:24:39.987Z | 2026-04-10T16:24:39.987Z |
| CVE-2026-40086 |
5.3 (3.1)
|
Rembg has a Path Traversal via Custom Model Loading |
danielgatis |
rembg |
2026-04-10T16:16:28.850Z | 2026-04-10T18:29:27.832Z |
| CVE-2026-40103 |
4.3 (3.1)
|
Vikunja's Scoped API tokens with projects.background p… |
go-vikunja |
vikunja |
2026-04-10T16:12:27.603Z | 2026-04-10T16:12:27.603Z |
| CVE-2026-35602 |
5.4 (3.1)
|
Vikunja has a File Size Limit Bypass via Vikunja Import |
go-vikunja |
vikunja |
2026-04-10T16:10:39.630Z | 2026-04-10T16:10:39.630Z |
| CVE-2026-35601 |
4.1 (3.1)
|
Vikunja has an iCalendar Property Injection via CRLF i… |
go-vikunja |
vikunja |
2026-04-10T16:08:50.519Z | 2026-04-10T16:08:50.519Z |
| CVE-2026-35600 |
5.4 (3.1)
|
Vikunja has HTML Injection via Task Titles in Overdue … |
go-vikunja |
vikunja |
2026-04-10T16:07:07.846Z | 2026-04-10T16:07:07.846Z |
| CVE-2026-35599 |
6.5 (3.1)
|
Vikunja has an Algorithmic Complexity DoS in Repeating… |
go-vikunja |
vikunja |
2026-04-10T16:05:57.581Z | 2026-04-10T18:28:29.310Z |
| CVE-2026-35598 |
4.3 (3.1)
|
Vikunja has Missing Authorization on CalDAV Task Read |
go-vikunja |
vikunja |
2026-04-10T16:04:32.083Z | 2026-04-10T16:04:32.083Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40162 |
7.1 (3.1)
|
Bugsink affected by authenticated arbitrary file write… |
bugsink |
bugsink |
2026-04-10T17:02:58.985Z | 2026-04-10T18:30:44.339Z |
| CVE-2026-33141 |
6.5 (3.1)
|
Chamilo LMS has an IDOR in REST API Stats Endpoint Exp… |
chamilo |
chamilo-lms |
2026-04-10T18:01:26.027Z | 2026-04-10T18:01:26.027Z |
| CVE-2026-32932 |
4.7 (3.1)
|
Chamilo LMS has an Open Redirect via Unvalidated 'page… |
chamilo |
chamilo-lms |
2026-04-10T17:51:58.480Z | 2026-04-10T17:51:58.480Z |
| CVE-2026-32931 |
7.5 (3.1)
|
Chamilo LMS has Arbitrary File Upload via MIME-Only Va… |
chamilo |
chamilo-lms |
2026-04-10T17:50:40.176Z | 2026-04-10T17:50:40.176Z |
| CVE-2026-32930 |
7.1 (3.1)
|
Chamilo LMS has an IDOR in Gradebook Allows Cross-Cour… |
chamilo |
chamilo-lms |
2026-04-10T17:48:51.774Z | 2026-04-10T18:32:13.726Z |
| CVE-2026-32894 |
7.1 (3.1)
|
Chamilo LMS has an IDOR in Gradebook Allows Cross-Cour… |
chamilo |
chamilo-lms |
2026-04-10T17:44:24.994Z | 2026-04-10T17:44:24.994Z |
| CVE-2026-32893 |
5.4 (3.1)
|
Chamilo LMS has Reflected XSS via Unsanitized http_bui… |
chamilo |
chamilo-lms |
2026-04-10T17:42:24.220Z | 2026-04-10T17:42:24.220Z |
| CVE-2026-32892 |
9.1 (3.1)
|
OS Command Injection in Chamilo LMS 1.11.36 |
chamilo |
chamilo-lms |
2026-04-10T17:56:57.695Z | 2026-04-10T17:56:57.695Z |
| CVE-2026-31941 |
7.7 (3.1)
|
Server-Side Request Forgery (SSRF) in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:37:50.948Z | 2026-04-10T18:33:22.920Z |
| CVE-2026-31940 |
7.5 (3.1)
|
Session Fixation in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:35:10.661Z | 2026-04-10T17:35:10.661Z |
| CVE-2026-31939 |
8.3 (3.1)
|
Path Traversal (Arbitrary File Delete) in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:32:29.252Z | 2026-04-10T17:32:29.252Z |
| CVE-2026-1502 |
5.7 (4.0)
|
HTTP client proxy tunnel headers not validated for CR/LF |
Python Software Foundation |
CPython |
2026-04-10T17:54:44.121Z | 2026-04-11T04:39:26.099Z |
| CVE-2025-66447 |
0 (3.1)
|
Chamilo LMS has validation-less redirect on login page |
chamilo |
chamilo-lms |
2026-04-10T17:22:32.443Z | 2026-04-10T17:22:32.443Z |
| CVE-2026-40200 |
8.1 (3.1)
|
An issue was discovered in musl libc 0.7.10 throu… |
musl-libc |
musl |
2026-04-10T00:00:00.000Z | 2026-04-10T17:17:25.925Z |
| CVE-2026-40160 |
7.1 (4.0)
|
PraisonAIAgents has SSRF via unvalidated URL in `web_c… |
MervinPraison |
PraisonAIAgents |
2026-04-10T16:59:09.542Z | 2026-04-10T16:59:09.542Z |
| CVE-2026-40159 |
5.5 (3.1)
|
PraisonAI Exposes Sensitive Environment Variable via U… |
MervinPraison |
PraisonAI |
2026-04-10T16:57:11.623Z | 2026-04-10T16:57:11.623Z |
| CVE-2026-40158 |
8.6 (3.1)
|
PraisonAI has Improper Control of Generation of Code (… |
MervinPraison |
PraisonAI |
2026-04-10T16:49:24.753Z | 2026-04-10T18:31:12.440Z |
| CVE-2026-40157 |
9.4 (4.0)
|
PraisonAI affected by arbitrary file write via path tr… |
MervinPraison |
PraisonAI |
2026-04-10T16:47:16.109Z | 2026-04-10T16:47:16.109Z |
| CVE-2026-40156 |
7.8 (3.1)
|
PraisonAI Affected by Implicit Execution of Arbitrary … |
MervinPraison |
PraisonAI |
2026-04-10T16:46:15.807Z | 2026-04-10T16:46:15.807Z |
| CVE-2026-40103 |
4.3 (3.1)
|
Vikunja's Scoped API tokens with projects.background p… |
go-vikunja |
vikunja |
2026-04-10T16:12:27.603Z | 2026-04-10T16:12:27.603Z |
| CVE-2026-40100 |
5.3 (3.1)
|
FastGPT has Unauthenticated SSRF in /api/core/app/mcpT… |
labring |
FastGPT |
2026-04-10T16:39:25.856Z | 2026-04-10T16:39:25.856Z |
| CVE-2026-40097 |
3.7 (3.1)
|
Step CA affected by an index out of bounds panic in TP… |
smallstep |
certificates |
2026-04-10T16:34:53.330Z | 2026-04-10T18:30:15.176Z |
| CVE-2026-40086 |
5.3 (3.1)
|
Rembg has a Path Traversal via Custom Model Loading |
danielgatis |
rembg |
2026-04-10T16:16:28.850Z | 2026-04-10T18:29:27.832Z |
| CVE-2026-40074 |
6.3 (4.0)
|
SvelteKit's invalidated redirect in handle hook causes… |
sveltejs |
kit |
2026-04-10T16:26:07.068Z | 2026-04-10T16:26:07.068Z |
| CVE-2026-40073 |
8.2 (4.0)
|
SvelteKit has a BODY_SIZE_LIMIT bypass in @sveltejs/ad… |
sveltejs |
kit |
2026-04-10T16:24:39.987Z | 2026-04-10T16:24:39.987Z |
| CVE-2026-35670 |
6 (4.0)
5.9 (3.1)
|
OpenClaw < 2026.3.22 - Webhook Reply Rebinding via Use… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:28.524Z | 2026-04-10T16:03:28.524Z |
| CVE-2026-35669 |
8.7 (4.0)
8.8 (3.1)
|
OpenClaw < 2026.3.25 - Privilege Escalation via Gatewa… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:27.834Z | 2026-04-10T16:03:27.834Z |
| CVE-2026-35668 |
7.1 (4.0)
7.7 (3.1)
|
OpenClaw < 2026.3.24 - Sandbox Media Root Bypass via U… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:27.149Z | 2026-04-10T18:27:23.337Z |
| CVE-2026-35667 |
6.9 (4.0)
6.1 (3.1)
|
OpenClaw < 2026.3.24 - Improper Process Termination vi… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:26.457Z | 2026-04-10T20:17:55.994Z |
| CVE-2026-35666 |
7.7 (4.0)
8.8 (3.1)
|
OpenClaw < 2026.3.22 - Allowlist Bypass via Unregister… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:25.748Z | 2026-04-10T16:03:25.748Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-32058 | The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is conn… | 2026-02-15T11:15:52.773 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-1793 | The Element Pack Addons for Elementor plugin for WordPress is vulnerable to arbitrary file reads in… | 2026-02-15T04:15:54.260 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-1750 | The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Privilege Esc… | 2026-02-15T04:15:54.113 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-1490 | The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unautho… | 2026-02-15T04:15:53.783 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23210 | In the Linux kernel, the following vulnerability has been resolved: ice: Fix PTP NULL pointer dere… | 2026-02-14T17:15:58.910 | 2026-04-02T12:16:19.477 |
| fkie_cve-2026-23209 | In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in… | 2026-02-14T17:15:58.803 | 2026-04-03T14:16:27.493 |
| fkie_cve-2026-23208 | In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Prevent exces… | 2026-02-14T17:15:58.703 | 2026-03-18T20:49:35.557 |
| fkie_cve-2026-23207 | In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect cu… | 2026-02-14T17:15:58.610 | 2026-04-02T12:16:19.293 |
| fkie_cve-2026-23206 | In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: prevent ZERO_SIZ… | 2026-02-14T17:15:58.507 | 2026-03-19T16:34:27.203 |
| fkie_cve-2026-23205 | In the Linux kernel, the following vulnerability has been resolved: smb/client: fix memory leak in… | 2026-02-14T17:15:58.403 | 2026-03-18T17:10:59.223 |
| fkie_cve-2026-23204 | In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_he… | 2026-02-14T17:15:58.297 | 2026-04-03T14:16:27.310 |
| fkie_cve-2026-23203 | In the Linux kernel, the following vulnerability has been resolved: net: cpsw_new: Execute ndo_set… | 2026-02-14T17:15:58.177 | 2026-03-19T16:34:57.810 |
| fkie_cve-2026-23202 | In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect cu… | 2026-02-14T17:15:58.050 | 2026-03-19T16:35:07.930 |
| fkie_cve-2026-23201 | In the Linux kernel, the following vulnerability has been resolved: ceph: fix oops due to invalid … | 2026-02-14T17:15:57.950 | 2026-03-19T16:35:58.490 |
| fkie_cve-2026-23200 | In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix ECMP sibling count m… | 2026-02-14T17:15:57.847 | 2026-03-19T16:41:38.177 |
| fkie_cve-2026-23199 | In the Linux kernel, the following vulnerability has been resolved: procfs: avoid fetching build I… | 2026-02-14T17:15:57.743 | 2026-03-19T16:41:57.087 |
| fkie_cve-2026-23198 | In the Linux kernel, the following vulnerability has been resolved: KVM: Don't clobber irqfd routi… | 2026-02-14T17:15:57.640 | 2026-04-03T14:16:27.073 |
| fkie_cve-2026-23197 | In the Linux kernel, the following vulnerability has been resolved: i2c: imx: preserve error state… | 2026-02-14T17:15:57.540 | 2026-03-19T17:45:01.960 |
| fkie_cve-2026-23196 | In the Linux kernel, the following vulnerability has been resolved: HID: Intel-thc-hid: Intel-thc:… | 2026-02-14T17:15:57.440 | 2026-03-19T17:45:26.697 |
| fkie_cve-2026-23195 | In the Linux kernel, the following vulnerability has been resolved: cgroup/dmem: avoid pool UAF A… | 2026-02-14T17:15:57.337 | 2026-04-03T14:16:26.923 |
| fkie_cve-2026-23194 | In the Linux kernel, the following vulnerability has been resolved: rust_binder: correctly handle … | 2026-02-14T17:15:57.233 | 2026-03-19T17:47:30.513 |
| fkie_cve-2026-23193 | In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-a… | 2026-02-14T17:15:57.123 | 2026-04-03T14:16:26.713 |
| fkie_cve-2026-23192 | In the Linux kernel, the following vulnerability has been resolved: linkwatch: use __dev_put() in … | 2026-02-14T17:15:57.020 | 2026-04-03T14:16:26.533 |
| fkie_cve-2026-23191 | In the Linux kernel, the following vulnerability has been resolved: ALSA: aloop: Fix racy access a… | 2026-02-14T17:15:56.917 | 2026-04-03T14:16:26.377 |
| fkie_cve-2026-23190 | In the Linux kernel, the following vulnerability has been resolved: ASoC: amd: fix memory leak in … | 2026-02-14T17:15:56.810 | 2026-03-18T17:11:17.490 |
| fkie_cve-2026-23189 | In the Linux kernel, the following vulnerability has been resolved: ceph: fix NULL pointer derefer… | 2026-02-14T17:15:56.703 | 2026-03-18T17:18:58.633 |
| fkie_cve-2026-23188 | In the Linux kernel, the following vulnerability has been resolved: net: usb: r8152: fix resume re… | 2026-02-14T17:15:56.600 | 2026-03-19T18:04:07.167 |
| fkie_cve-2026-23187 | In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8m-blk-ctrl: fix … | 2026-02-14T17:15:56.490 | 2026-03-19T18:04:36.990 |
| fkie_cve-2026-23186 | In the Linux kernel, the following vulnerability has been resolved: hwmon: (acpi_power_meter) Fix … | 2026-02-14T17:15:56.373 | 2026-03-18T15:10:00.913 |
| fkie_cve-2026-23185 | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mld: cancel mlo… | 2026-02-14T17:15:56.273 | 2026-04-03T14:16:26.243 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-pj2r-f9mw-vrcq |
5.5 (3.1)
|
PraisonAI Vulnerable to Sensitive Environment Variable Exposure via Untrusted MCP Subprocess Execution | 2026-04-10T19:28:15Z | 2026-04-10T19:28:15Z |
| ghsa-99g3-w8gr-x37c |
9.4 (4.0)
|
PraisonAI vulnerable to arbitrary file write via path traversal in `praisonai recipe unpack` | 2026-04-10T19:27:59Z | 2026-04-10T19:27:59Z |
| ghsa-2g3w-cpc4-chr4 |
7.8 (3.1)
|
PraisonAI Vulnerable to Implicit Execution of Arbitrary Code via Automatic `tools.py` Loading | 2026-04-10T19:26:44Z | 2026-04-10T19:26:44Z |
| ghsa-f2h6-7xfr-xm8w |
6.5 (3.1)
|
PraisonAI Vulnerable to Decompression Bomb DoS via Recipe Bundle Extraction Without Size Limits | 2026-04-10T19:26:21Z | 2026-04-10T19:26:21Z |
| ghsa-pv9q-275h-rh7x |
9.3 (3.1)
|
PraisonAI Vulnerable Untrusted Remote Template Code Execution | 2026-04-10T19:26:05Z | 2026-04-10T19:26:05Z |
| ghsa-qwgj-rrpj-75xm |
8.8 (3.1)
|
PraisonAI: Hardcoded `approval_mode="auto"` in Chainlit UI Overrides Administrator Configuration, E… | 2026-04-10T19:25:49Z | 2026-04-10T19:25:49Z |
| ghsa-3c4r-6p77-xwr7 |
8.6 (3.1)
|
PraisonAI Vulnerable to Code Injection and Protection Mechanism Failure | 2026-04-10T19:25:39Z | 2026-04-10T19:25:39Z |
| ghsa-7j2f-xc8p-fjmq |
5.3 (3.1)
|
PraisonAIAgents: Path Traversal via Unvalidated Glob Pattern in list_files Bypasses Workspace Boundary | 2026-04-10T19:24:32Z | 2026-04-10T19:24:32Z |
| ghsa-v8g7-9q6v-p3x8 |
7.4 (3.1)
|
PraisonAIAgents: Environment Variable Secret Exfiltration via os.path.expandvars() Bypassing shell=… | 2026-04-10T19:24:27Z | 2026-04-10T19:24:27Z |
| ghsa-pm96-6xpr-978x |
5.3 (3.1)
|
PraisonAI: Unauthenticated Information Disclosure of Agent Instructions via /api/agents in AgentOS | 2026-04-10T19:24:22Z | 2026-04-10T19:24:22Z |
| ghsa-4wr3-f4p3-5wjh |
7.9 (3.1)
|
PraisonAI: Unauthenticated Allow-List Manipulation Bypasses Agent Tool Approval Safety Controls | 2026-04-10T19:24:11Z | 2026-04-10T19:24:11Z |
| ghsa-8f4v-xfm9-3244 |
7.7 (3.1)
|
PraisonAIAgents has SSRF and Local File Read via Unvalidated URLs in web_crawl Tool | 2026-04-10T19:23:57Z | 2026-04-10T19:23:57Z |
| ghsa-grrg-5cg9-58pf |
6.2 (3.1)
|
PraisonAIAgents: Arbitrary File Read via read_skill_file Missing Workspace Boundary and Approval Gate | 2026-04-10T19:23:21Z | 2026-04-10T19:23:21Z |
| ghsa-2xgv-5cv2-47vv |
6.2 (3.1)
|
PraisonAI has Unrestricted Upload Size in WSGI Recipe Registry Server that Enables Memory Exhaustion DoS | 2026-04-10T19:23:13Z | 2026-04-10T19:23:13Z |
| ghsa-q5r4-47m9-5mc7 |
7.5 (3.1)
|
PraisonAI: Unauthenticated WebSocket Endpoint Proxies to Paid OpenAI Realtime API Without Rate Limits | 2026-04-10T19:22:52Z | 2026-04-10T19:22:52Z |
| ghsa-fvxx-ggmx-3cjg |
8.4 (3.1)
|
PraisonAI Vulnerable to Argument Injection into Cloud Run Environment Variables via Unsanitized Com… | 2026-04-10T19:22:37Z | 2026-04-10T19:22:37Z |
| ghsa-cfg2-mxfj-j6pw |
5.4 (3.1)
|
PraisonAI Vulnerable to Stored XSS via Unsanitized Agent Output in HTML Rendering (nh3 Not a Requir… | 2026-04-10T19:22:18Z | 2026-04-10T19:22:18Z |
| ghsa-v7px-3835-7gjx |
9.3 (4.0)
|
PraisonAIAgents has an OS Command Injection via shell=True in Memory Hooks Executor (memory/hooks.py) | 2026-04-10T19:21:54Z | 2026-04-10T19:21:54Z |
| ghsa-w95v-4h65-j455 |
8.7 (4.0)
|
SiYuan Affected by Zero-Click NTLM Hash Theft and Blind SSRF via Mermaid Diagram Rendering | 2026-04-10T19:21:44Z | 2026-04-10T19:21:44Z |
| ghsa-fm2x-c5qw-4h6f |
9.1 (3.1)
|
LXD: VM lowlevel restriction bypass via raw.apparmor and raw.qemu.conf | 2026-04-10T19:21:00Z | 2026-04-10T19:21:00Z |
| ghsa-q96j-3fmm-7fv4 |
9.1 (3.1)
|
LXD: Importing a crafted backup leads to project restriction bypass | 2026-04-10T19:20:55Z | 2026-04-10T19:20:55Z |
| ghsa-c3h3-89qf-jqm5 |
9.1 (3.1)
|
LXD: Update of type field in restricted TLS certificate allows privilege escalation to cluster admin | 2026-04-10T19:20:50Z | 2026-04-10T19:20:50Z |
| ghsa-c9vm-hv86-f23r |
|
justhtml includes multiple security fixes | 2026-04-10T19:20:04Z | 2026-04-10T19:20:04Z |
| ghsa-w59f-v72r-w493 |
8.5 (3.1)
|
A flaw was found in odh-dashboard in Red Hat Openshift AI. This vulnerability in the `odh-dashboard… | 2026-04-10T18:31:20Z | 2026-04-10T21:31:14Z |
| ghsa-qrwv-475h-2439 |
8.1 (3.1)
|
An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur … | 2026-04-10T18:31:20Z | 2026-04-10T18:31:20Z |
| ghsa-hjxq-7w9q-2jw6 |
5.7 (4.0)
|
CR/LF bytes were not rejected by HTTP client proxy tunnel headers or host. | 2026-04-10T18:31:20Z | 2026-04-11T06:31:14Z |
| ghsa-x53v-pxf5-chx6 |
6.2 (3.1)
|
In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with… | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-w35j-pv5h-q9q9 |
6.3 (4.0)
|
Apache Log4j's JsonTemplateLayout produces invalid JSON output when log events contain non-finite f… | 2026-04-10T18:31:18Z | 2026-04-10T21:16:54Z |
| ghsa-q8qr-wp2r-738r |
6.3 (4.0)
|
Apache Log4cxx's XMLLayout https://logging.apache.org/log4cxx/1.7.0/classlog4cxx_1_1xml_1_1XMLLayo… | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-jf3x-2pf6-c45w |
6.7 (3.1)
|
In systemd 259 before 260, there is local privilege escalation in systemd-machined because varlink … | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-100 |
6.1 (3.1)
|
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from… | openc3 | 2024-10-02T20:15:00+00:00 | 2024-10-08T17:22:06.493109+00:00 |
| pysec-2024-186 |
6.5 (3.1)
|
RestrictedPython is a restricted execution environment for Python to run untrusted code. … | restrictedpython | 2024-09-30T16:15:09+00:00 | 2025-01-19T04:23:01.259448+00:00 |
| pysec-2024-171 |
8.0 (3.1)
|
Strawberry GraphQL is a library for creating GraphQL APIs. Prior to version 0.243.0, mult… | strawberry-graphql | 2024-09-25T18:15:05+00:00 | 2025-01-18T22:21:43.412172+00:00 |
| pysec-2024-99 |
7.5 (3.1)
|
OpenSlides 4.0.15 was discovered to be using a weak hashing algorithm to store passwords. | openslides | 2024-09-25T15:15:00+00:00 | 2024-10-01T21:22:35.777428+00:00 |
| pysec-2024-96 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-string | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:56.151249+00:00 |
| pysec-2024-95 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-os-path | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:56.045949+00:00 |
| pysec-2024-94 |
8.1 (3.1)
|
A vulnerability was found in MicroPython 1.22.2. It has been declared as critical. Affect… | micropython-io | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.930133+00:00 |
| pysec-2024-93 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-io | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.864558+00:00 |
| pysec-2024-92 |
8.1 (3.1)
|
A vulnerability was found in MicroPython 1.22.2. It has been declared as critical. Affect… | micropython-copy | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.787891+00:00 |
| pysec-2024-91 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-copy | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.729708+00:00 |
| pysec-2024-89 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected … | micropython-os | 2024-09-17T19:15:00+00:00 | 2024-09-23T21:22:09.689786+00:00 |
| pysec-2024-88 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected … | micropython-io | 2024-09-17T19:15:00+00:00 | 2024-09-23T21:22:09.570550+00:00 |
| pysec-2024-87 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected … | micropython-copy | 2024-09-17T19:15:00+00:00 | 2024-09-23T21:22:09.445188+00:00 |
| pysec-2024-85 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-03-03T16:29:37.848846Z |
| pysec-2024-84 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.3.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-03-03T16:29:37.756762Z |
| pysec-2024-83 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-03-03T16:29:37.662671Z |
| pysec-2024-82 |
8.8 (3.1)
|
Deserialization of untrusted data can occur in versions 23.3.2.0 and newer of the MindsDB… | mindsdb | 2024-09-12T13:15:00Z | 2026-03-03T16:29:37.563380Z |
| pysec-2024-81 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:05.004524+00:00 |
| pysec-2024-80 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.922906+00:00 |
| pysec-2024-79 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.841635+00:00 |
| pysec-2024-78 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.12.4.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.697678+00:00 |
| pysec-2024-77 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.3.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.616691+00:00 |
| pysec-2024-212 |
|
Apache Airflow versions before 2.10.1 have a vulnerability that allows DAG authors to add… | apache-airflow | 2024-09-07T08:15:11+00:00 | 2025-01-19T22:22:22.289672+00:00 |
| pysec-2024-74 |
9.1 (3.1)
|
MindsDB is a platform for building artificial intelligence from enterprise data. Prior to… | mindsdb | 2024-09-05T17:15:00+00:00 | 2024-09-06T15:22:53.971446+00:00 |
| pysec-2024-90 |
6.1 (3.1)
|
Indico is an event management system that uses Flask-Multipass, a multi-backend authentic… | indico | 2024-09-04T20:15:00+00:00 | 2024-09-25T06:23:55.564403+00:00 |
| pysec-2024-180 |
5.4 (3.1)
|
Stored XSS in organizer and event settings of pretix up to 2024.7.0 allows malicious even… | pretix | 2024-08-23T15:15:17+00:00 | 2025-01-19T01:52:24.493530+00:00 |
| pysec-2024-192 |
|
An issue was discovered in llama_index before 0.10.38. download/integration.py includes a… | llama-index | 2024-08-22T20:15:10+00:00 | 2025-01-19T13:22:29.175614+00:00 |
| pysec-2024-181 |
6.1 (3.1)
|
Apache Airflow, versions before 2.10.0, have a vulnerability that allows the developer of… | apache-airflow | 2024-08-21T16:15:08+00:00 | 2025-01-19T04:22:59.351008+00:00 |
| pysec-2024-72 |
8.8 (3.1)
|
LF Edge eKuiper is a lightweight IoT data analytics and stream processing engine running … | ekuiper | 2024-08-20T15:15:00Z | 2024-09-18T07:04:07.042699Z |
| pysec-2024-71 |
7.5 (3.1)
|
A vulnerability in corydolphin/flask-cors up to version 4.0.1 allows the `Access-Control-… | flask-cors | 2024-08-18T19:15:00Z | 2024-09-09T07:59:30.591275Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2447 | Malicious code in @toprank/partner (npm) | 2026-04-03T07:43:43Z | 2026-04-07T14:41:20Z |
| mal-2026-2433 | Malicious code in pycolorlib3 (PyPI) | 2026-04-02T20:38:16Z | 2026-04-10T21:49:20Z |
| mal-2026-2432 | Malicious code in nwin64tls (PyPI) | 2026-04-02T20:28:37Z | 2026-04-02T20:28:37Z |
| mal-2026-2431 | Malicious code in nwin32tls (PyPI) | 2026-04-02T20:26:19Z | 2026-04-02T20:26:19Z |
| mal-2026-2443 | Malicious code in exprrrress (npm) | 2026-04-02T18:21:44Z | 2026-04-07T14:41:21Z |
| mal-2026-2442 | Malicious code in expreeeess (npm) | 2026-04-02T18:11:34Z | 2026-04-07T14:41:21Z |
| mal-2026-2439 | Malicious code in expeewas (npm) | 2026-04-02T15:22:21Z | 2026-04-07T14:41:21Z |
| mal-2026-2445 | Malicious code in pro-express (npm) | 2026-04-02T15:21:37Z | 2026-04-07T14:41:24Z |
| mal-2026-2441 | Malicious code in expirs (npm) | 2026-04-02T15:13:53Z | 2026-04-07T14:41:21Z |
| mal-2026-2437 | Malicious code in exaprse (npm) | 2026-04-02T15:12:58Z | 2026-04-07T14:41:21Z |
| mal-2026-2444 | Malicious code in exszpe3szs (npm) | 2026-04-02T15:12:47Z | 2026-04-07T14:41:21Z |
| mal-2026-2435 | Malicious code in 4xperss (npm) | 2026-04-02T15:12:23Z | 2026-04-07T14:41:19Z |
| mal-2026-2438 | Malicious code in expeedsxs (npm) | 2026-04-02T15:12:22Z | 2026-04-07T14:41:21Z |
| mal-2026-2434 | Malicious code in 4exepreds (npm) | 2026-04-02T15:12:19Z | 2026-04-07T14:41:19Z |
| mal-2026-2436 | Malicious code in eixp4ressz (npm) | 2026-04-02T15:12:04Z | 2026-04-07T14:41:21Z |
| mal-2026-2440 | Malicious code in experedzss (npm) | 2026-04-02T15:11:56Z | 2026-04-07T14:41:21Z |
| mal-2026-2430 | Malicious code in k8s-node-health (PyPI) | 2026-04-02T15:10:22Z | 2026-04-02T15:52:55Z |
| mal-2026-2424 | Malicious code in bytefrontier-sdk (npm) | 2026-04-02T12:21:22Z | 2026-04-07T14:41:20Z |
| mal-2026-2428 | Malicious code in vv-ftend-api (npm) | 2026-04-02T12:21:07Z | 2026-04-07T14:41:26Z |
| mal-2026-2425 | Malicious code in bytefrontier-tracker (npm) | 2026-04-02T12:10:59Z | 2026-04-07T14:41:20Z |
| mal-2026-2426 | Malicious code in partner-tracker (npm) | 2026-04-02T12:10:54Z | 2026-04-07T14:41:24Z |
| mal-2026-2423 | Malicious code in bytefrontier-partner (npm) | 2026-04-02T12:10:52Z | 2026-04-07T14:41:20Z |
| mal-2026-2422 | Malicious code in bytefrontier-api (npm) | 2026-04-02T12:10:50Z | 2026-04-07T14:41:20Z |
| mal-2026-2427 | Malicious code in partner-tracker-api (npm) | 2026-04-02T12:10:47Z | 2026-04-07T14:41:24Z |
| mal-2026-2429 | Malicious code in vv-ftend-core (npm) | 2026-04-02T12:10:43Z | 2026-04-07T14:41:26Z |
| mal-2026-2421 | Malicious code in @mgcrae/pino-pretty-logger (npm) | 2026-04-02T11:28:24Z | 2026-04-07T14:41:19Z |
| mal-2026-2419 | Malicious code in express-session-js (npm) | 2026-04-02T09:56:44Z | 2026-04-07T14:41:21Z |
| mal-2026-2420 | Malicious code in @_wnpm/wnpm-cli (npm) | 2026-04-02T09:53:07Z | 2026-04-07T14:41:19Z |
| mal-2026-2405 | Malicious code in eht-account (PyPI) | 2026-04-01T17:49:00Z | 2026-04-01T17:49:00Z |
| mal-2026-2404 | Malicious code in ether-account (PyPI) | 2026-04-01T16:32:11Z | 2026-04-01T16:32:11Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0554 | Red Hat Enterprise Linux (udisks): Mehrere Schwachstellen | 2026-03-01T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0551 | OpenClaw: Mehrere Schwachstellen | 2026-02-26T23:00:00.000+00:00 | 2026-03-11T23:00:00.000+00:00 |
| wid-sec-w-2026-0548 | Golang Go: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2026-02-26T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0546 | Red Hat Enterprise Linux (Valkey): Mehrere Schwachstellen | 2026-02-26T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0544 | IBM QRadar SIEM: Mehrere Schwachstellen | 2026-02-26T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0542 | OpenClaw: Mehrere Schwachstellen | 2026-02-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0535 | Juniper JUNOS Evolved: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2026-02-25T23:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2026-0530 | Drupal Extensions: Mehrere Schwachstellen | 2026-02-25T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0526 | IBM App Connect Enterprise: Mehrere Schwachstellen | 2026-02-25T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0525 | GStreamer: Mehrere Schwachstellen | 2026-02-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0514 | FreeRDP: Mehrere Schwachstellen | 2026-02-24T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0508 | Keycloak: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-02-24T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0507 | util-linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-02-24T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0504 | Mattermost Server und Plugins: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2026-02-24T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0501 | OpenClaw: Mehrere Schwachstellen | 2026-02-24T23:00:00.000+00:00 | 2026-03-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0497 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2026-02-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0494 | Red Hat Enterprise Linux (389-ds-base): Schwachstelle ermöglicht Codeausführung und potenziell Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0490 | OpenClaw: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-11T23:00:00.000+00:00 |
| wid-sec-w-2026-0484 | ImageMagick: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0482 | libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0481 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0480 | Red Hat Enterprise Linux (Python Protobuf): Schwachstelle ermöglicht Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0479 | Red Hat OpenShift Service Mesh (Kiali): Schwachstelle ermöglicht Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0472 | OpenClaw: Mehrere Schwachstellen | 2026-02-22T23:00:00.000+00:00 | 2026-03-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0469 | GIMP: Mehrere Schwachstellen ermöglichen Codeausführung | 2026-02-19T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0462 | Linux Kernel: Mehrere Schwachstellen | 2026-02-18T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0452 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2026-02-18T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0448 | Red Hat Enterprise Linux (MUNGE): Schwachstelle ermöglicht Privilegieneskalation | 2026-02-17T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2026-0446 | libssh: Mehrere Schwachstellen ermöglichen Manipulation von Dateien und DoS | 2026-02-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0443 | Apache Tomcat und Tomcat Native: Mehrere Schwachstellen | 2026-02-17T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| va-26-008-01 | OPEXUS eCASE | 2026-01-08T16:36:15Z | 2026-01-08T16:36:15Z |
| va-26-008-03 | Ideagen DevonWay stored XSS | 2026-01-08T00:00:00Z | 2026-01-08T00:00:00Z |
| va-26-008-02 | OPEXUS eComplaint and eCasePortal IDOR | 2026-01-07T16:35:11Z | 2026-01-07T16:35:11Z |
| icsa-26-006-01 | Columbia Weather Systems MicroServer | 2026-01-06T07:00:00.000000Z | 2026-01-06T07:00:00.000000Z |
| icsma-25-364-01 | WHILL Model C2 Electric Wheelchairs and Model F Power Chairs (Update A) | 2025-12-30T07:00:00.000000Z | 2026-03-24T06:00:00.000000Z |
| icsa-25-352-08 | Axis Communications Camera Station Pro, Camera Station, and Device Manager (Update B) | 2025-12-18T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-25-352-07 | Rockwell Automation Micro820, Micro850, Micro870 | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-06 | Advantech WebAccess/SCADA | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-04 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electrics Products | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-03 | National Instruments LabView | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-01 | Inductive Automation Ignition | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| va-25-352-01 | BullWall Ransomware Containment and Server Intrusion Protection multiple vulnerabilities | 2025-12-18T00:00:00Z | 2025-12-18T00:00:00Z |
| icsa-25-350-04 | Mitsubishi Electric GT Designer3 | 2025-12-16T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-25-350-03 | Hitachi Energy AFS, AFR and AFF Series | 2025-12-16T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-25-350-02 | Johnson Controls PowerG, IQPanel and IQHub (Update A) | 2025-12-16T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| icsa-25-350-01 | Güralp Systems Fortimus Series, Minimus Series, and Certimus Series | 2025-12-16T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| va-25-345-01 | CISA Software Acquisition Guide Supplier Response Web Tool XSS | 2025-12-12T20:27:47Z | 2025-12-12T20:27:47Z |
| icsma-25-345-02 | Varex Imaging Panoramic Dental Imaging Software | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| icsma-25-345-01 | Grassroots DICOM (GDCM) | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| icsa-25-345-10 | OpenPLC_V3 (Update A) | 2025-12-11T07:00:00.000000Z | 2026-04-09T06:00:00.000000Z |
| icsa-25-345-03 | AzeoTech DAQFactory (Update A) | 2025-12-11T07:00:00.000000Z | 2026-01-12T07:00:00.000000Z |
| icsa-25-345-02 | Johnson Controls iSTAR Ultra | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| icsa-25-345-01 | Johnson Controls iSTAR | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| va-25-343-01 | Windscribe for Linux 'changeMTU' local privilege escalation | 2025-12-10T16:46:41Z | 2025-12-10T16:46:41Z |
| icsa-26-020-01 | Schneider Electric EcoStruxure Foxboro DCS (Update A) | 2025-12-09T08:00:00.000000Z | 2026-02-24T06:00:00.000000Z |
| icsa-25-352-02 | Schneider Electric EcoStruxure Foxboro DCS Advisor | 2025-12-09T08:00:00.000000Z | 2025-12-18T18:23:06.311869Z |
| icsa-25-343-01 | Universal Boot Loader (U-Boot) (Update A) | 2025-12-09T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| icsa-25-343-03 | Multiple India-based CCTV Cameras (Update A)** | 2025-12-09T06:00:00.000000Z | 2026-02-05T06:00:00.000000Z |
| icsa-26-043-03 | Siemens COMOS | 2025-12-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-015-12 | Siemens SIMATIC CN 4100 | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-nd-ptrs-xu2fm2wb | Cisco Nexus Dashboard Path Traversal Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-n39k-isis-dos-jhja8rfx | Cisco Nexus 3000 and 9000 Series Switches Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-pi-epnm-tet4gxbx | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Sensitive Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-ise-file-upload-qksx6c8g | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:43:01+00:00 |
| cisco-sa-authproxlog-sxczxq63 | Cisco Duo Authentication Proxy Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-ftd-ravpn-geobypass-9h38m37z | Cisco Secure Firewall Threat Defense Software Geolocation Remote Access VPN Bypass Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-ftd-dos-svkhtjgt | Cisco Secure Firewall Threat Defense Software Snort 3 Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fp2k-ipsec-dos-tjwgdzco | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 2100 Series IPv6 over IPsec Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-09T21:22:34+00:00 |
| cisco-sa-fmc-xss-jtnmcusp | Cisco Secure Firewall Management Center Software Cross-Site Scripting Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-xpathinj-corthdmb | Cisco Secure Firewall Management Center Software XPATH Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-radius-rce-tnbkf79 | Cisco Secure Firewall Management Center Software RADIUS Remote Code Execution Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-html-inj-mqjrzrny | Cisco Secure Firewall Management Center Software HTML Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-ftd-cmdinj-phe7kmt | Cisco Secure Firewall Management Center and Secure Firewall Threat Defense Software Command Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-hcrlpfyn | Cisco Secure Firewall Management Center Software Command Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-authz-bypass-m7xhnau | Cisco Secure Firewall Management Center Software Authorization Bypass Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpnwebs-dos-hjbhmbsx | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access VPN Web Server Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpn-dos-mfpeka6e | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-ssltls-dos-ehw76vze | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software SSL/TLS Certificate Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-19T16:32:05+00:00 |
| cisco-sa-asaftd-nat-dns-dos-bqhynhtm | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Network Address Translation DNS Inspection Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-http-file-huyx2jl4 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Server Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-dhcp-qj7ngs4n | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software DHCP Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-cmdinj-vehfezq3 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Authenticated Command Injection Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-ftd-ios-dos-doeshwhy | Cisco IOS, IOS XE, Secure Firewall Adaptive Security Appliance, and Secure Firewall Threat Defense Software IKEv2 Denial of Service Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-ftd-acl-bypass-mtpze9yh | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Access Control Rules Bypass Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-buffer-overflow-pyruhwbc | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Web Services Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-3100_4200_tlsdos-2ynscd54 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 3100 and 4200 Series TLS 1.3 Cipher Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-03T13:37:50+00:00 |
| cisco-sa-webex-join-ynxfqhk4 | Cisco Webex Meeting Client Join Certificate Validation Vulnerability | 2025-08-06T16:00:00+00:00 | 2025-08-06T16:00:00+00:00 |
| cisco-sa-ise_xss_acc_cont-ysr4ut4u | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2025-08-06T16:00:00+00:00 | 2025-08-06T16:00:00+00:00 |
| cisco-sa-piepnm-bsi-25jjqsbb | Cisco Prime Infrastructure and Evolved Programmable Network Manager Blind SQL Injection Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-ise-multi-3vpsxoxo | Cisco Identity Services Engine Authenticated Remote Code Execution and Authorization Bypass Vulnerabilities | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-25188 | Windows Telephony Service Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25187 | Winlogon Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25186 | Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25185 | Windows Shell Link Processing Spoofing Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25181 | GDI+ Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25180 | Windows Graphics Component Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25179 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25178 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25177 | Active Directory Domain Services Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25176 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25175 | Windows NTFS Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25174 | Windows Extensible File Allocation Table Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25173 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-13T07:00:00.000Z |
| msrc_cve-2026-25172 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-13T07:00:00.000Z |
| msrc_cve-2026-25171 | Windows Authentication Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25170 | Windows Hyper-V Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25169 | Windows Graphics Component Denial of Service Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25168 | Windows Graphics Component Denial of Service Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25167 | Microsoft Brokering File System Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25166 | Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25165 | Performance Counters for Windows Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24299 | M365 Copilot Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-19T07:00:00.000Z |
| msrc_cve-2026-24297 | Windows Kerberos Security Feature Bypass Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24296 | Windows Device Association Service Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24295 | Windows Device Association Service Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24294 | Windows SMB Server Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24293 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-11T07:00:00.000Z |
| msrc_cve-2026-24292 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24291 | Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24290 | Windows Projected File System Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0396 | Kwetsbaarheden verholpen in Apple macOS | 2025-12-15T09:06:36.450655Z | 2025-12-15T09:06:36.450655Z |
| ncsc-2025-0395 | Kwetsbaarheden verholpen in SAP Software | 2025-12-12T09:29:08.429888Z | 2025-12-12T09:29:08.429888Z |
| ncsc-2025-0394 | Kwetsbaarheden verholpen in React Server Components | 2025-12-12T09:04:19.324080Z | 2025-12-12T10:46:34.688189Z |
| ncsc-2025-0393 | Kwetsbaarheid verholpen in GeoServer | 2025-12-12T08:12:18.831044Z | 2025-12-12T09:02:27.681292Z |
| ncsc-2025-0392 | Kwetsbaarheid verholpen in Barracuda Service Center | 2025-12-11T13:53:23.819008Z | 2025-12-11T13:53:23.819008Z |
| ncsc-2025-0391 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2025-12-11T13:51:55.178462Z | 2025-12-11T13:51:55.178462Z |
| ncsc-2025-0390 | Kwetsbaarheden verholpen in GitLab CE/EE | 2025-12-11T09:22:54.841848Z | 2025-12-11T09:22:54.841848Z |
| ncsc-2025-0389 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-12-10T14:59:57.911864Z | 2025-12-10T14:59:57.911864Z |
| ncsc-2025-0388 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-12-10T13:35:58.314547Z | 2025-12-10T13:35:58.314547Z |
| ncsc-2025-0387 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2025-12-10T13:34:08.908897Z | 2025-12-10T13:34:08.908897Z |
| ncsc-2025-0386 | Kwetsbaarheden verholpen in Fortinet producten | 2025-12-10T09:51:34.918202Z | 2026-01-28T15:46:10.814803Z |
| ncsc-2025-0385 | Kwetsbaarheden verholpen in Microsoft Exchange | 2025-12-09T18:42:32.332749Z | 2025-12-09T18:42:32.332749Z |
| ncsc-2025-0384 | Kwetsbaarheden verholpen in Microsoft Office | 2025-12-09T18:40:33.839342Z | 2025-12-09T18:40:33.839342Z |
| ncsc-2025-0383 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-12-09T18:39:18.152251Z | 2025-12-09T18:39:18.152251Z |
| ncsc-2025-0382 | Kwetsbaarheden verholpen in Siemens producten | 2025-12-09T13:15:05.391966Z | 2025-12-09T13:15:05.391966Z |
| ncsc-2025-0381 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2025-12-08T08:23:21.965599Z | 2025-12-08T08:23:21.965599Z |
| ncsc-2025-0380 | Kwetsbaarheden verholpen in React Server Components | 2025-12-03T20:11:57.728117Z | 2025-12-05T12:13:36.590522Z |
| ncsc-2025-0379 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-12-02T13:25:17.745981Z | 2025-12-02T13:25:17.745981Z |
| ncsc-2025-0378 | Kwetsbaarheden verholpen in Mattermost | 2025-11-28T09:53:42.334621Z | 2025-11-28T09:53:42.334621Z |
| ncsc-2025-0377 | Kwetsbaarheden verholpen in GitLab | 2025-11-27T13:35:09.121804Z | 2025-11-27T13:35:09.121804Z |
| ncsc-2025-0376 | Kwetsbaarheden verholpen in SonicWall Email Security appliances | 2025-11-21T16:06:33.949861Z | 2025-11-21T16:06:33.949861Z |
| ncsc-2025-0375 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2025-11-21T16:06:14.387571Z | 2025-11-21T16:06:14.387571Z |
| ncsc-2025-0374 | Kwetsbaarheden verholpen in Arista EOS | 2025-11-20T11:48:20.126141Z | 2025-11-20T11:48:20.126141Z |
| ncsc-2025-0373 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2025-11-19T08:35:31.999400Z | 2025-11-19T08:35:31.999400Z |
| ncsc-2025-0372 | Kwetsbaarheid verholpen in Fortinet FortiWeb | 2025-11-19T08:34:59.616354Z | 2025-11-19T08:34:59.616354Z |
| ncsc-2025-0371 | Kwetsbaarheden verholpen in Google Chrome | 2025-11-18T09:01:31.984222Z | 2025-11-18T09:01:31.984222Z |
| ncsc-2025-0370 | Kwetsbaarheden verholpen in Cisco Unified Contact Center Express | 2025-11-18T07:04:55.173157Z | 2025-11-18T07:04:55.173157Z |
| ncsc-2025-0369 | Kwetsbaarheden verholpen in IBM AIX | 2025-11-18T07:03:55.766335Z | 2025-11-18T07:03:55.766335Z |
| ncsc-2025-0368 | Kwetsbaarheden verholpen in Zoom Workplace en Zoom Clients | 2025-11-18T07:02:36.696426Z | 2025-11-18T07:02:36.696426Z |
| ncsc-2025-0367 | Kwetsbaarheden verholpen in GitLab | 2025-11-18T07:01:35.502522Z | 2025-11-18T07:01:35.502522Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20431-1 | Security update for python-PyJWT | 2026-03-25T18:07:39Z | 2026-03-25T18:07:39Z |
| opensuse-su-2026:20430-1 | Security update for python-PyPDF2 | 2026-03-25T15:51:00Z | 2026-03-25T15:51:00Z |
| opensuse-su-2026:20429-1 | Security update for python-dynaconf | 2026-03-25T14:59:11Z | 2026-03-25T14:59:11Z |
| opensuse-su-2026:20428-1 | Security update for gimp | 2026-03-25T14:24:42Z | 2026-03-25T14:24:42Z |
| opensuse-su-2026:20421-1 | Security update for python-ldap | 2026-03-25T10:40:32Z | 2026-03-25T10:40:32Z |
| opensuse-su-2026:20420-1 | Security update for ffmpeg-7 | 2026-03-25T10:03:00Z | 2026-03-25T10:03:00Z |
| opensuse-su-2026:20416-1 | Security update for the Linux Kernel | 2026-03-25T08:49:52Z | 2026-03-25T08:49:52Z |
| opensuse-su-2026:20419-1 | Security update for python-pyOpenSSL | 2026-03-25T03:41:43Z | 2026-03-25T03:41:43Z |
| opensuse-su-2026:20418-1 | Security update for python-pyasn1 | 2026-03-25T03:09:48Z | 2026-03-25T03:09:48Z |
| opensuse-su-2026:10432-1 | golang-github-v2fly-v2ray-core-5.47.0-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10431-1 | python311-oci-sdk-2.168.3-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10430-1 | python311-lmdb-2.1.1-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10429-1 | jupyter-jupyterlab-templates-0.5.2-4.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10428-1 | python311-jupyter-ydoc-3.4.0-2.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10427-1 | jupyter-matplotlib-0.11.7-17.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10426-1 | python311-intake-2.0.9-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10425-1 | python311-cbor2-5.9.0-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10424-1 | jupyter-bqplot-jupyterlab-0.5.46-14.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10423-1 | nginx-1.29.7-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10422-1 | libtpms-devel-0.10.2-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10421-1 | kea-3.0.3-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10420-1 | amazon-cloudwatch-agent-1.300064.0-2.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:20417-1 | Security update for python-black | 2026-03-24T19:40:55Z | 2026-03-24T19:40:55Z |
| opensuse-su-2026:20415-1 | Security update for 389-ds | 2026-03-24T17:50:31Z | 2026-03-24T17:50:31Z |
| opensuse-su-2026:20414-1 | Security update for tomcat11 | 2026-03-24T16:07:26Z | 2026-03-24T16:07:26Z |
| opensuse-su-2026:20413-1 | Security update for nghttp2 | 2026-03-24T12:30:27Z | 2026-03-24T12:30:27Z |
| opensuse-su-2026:20422-1 | Security update for chromium | 2026-03-24T07:22:02Z | 2026-03-24T07:22:02Z |
| opensuse-su-2026:20412-1 | Security update for salt | 2026-03-24T06:24:23Z | 2026-03-24T06:24:23Z |
| opensuse-su-2026:10419-1 | rclone-1.73.3-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10418-1 | python311-jsonpath-ng-1.8.0-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:6497 | Red Hat Security Advisory: Red Hat Quay 3.16.3 | 2026-04-02T15:17:12+00:00 | 2026-04-12T14:09:04+00:00 |
| rhsa-2026:6473 | Red Hat Security Advisory: python3 security update | 2026-04-02T14:18:33+00:00 | 2026-04-11T01:47:19+00:00 |
| rhsa-2026:5873 | Red Hat Security Advisory: OpenShift Container Platform 4.16.59 bug fix and security update | 2026-04-02T14:11:18+00:00 | 2026-04-09T23:07:18+00:00 |
| rhsa-2026:6478 | Red Hat Security Advisory: Red Hat build of Keycloak 26.4.11 Images Update | 2026-04-02T13:58:01+00:00 | 2026-04-07T14:57:20+00:00 |
| rhsa-2026:6476 | Red Hat Security Advisory: Red Hat build of Keycloak 26.2.15 Images Update | 2026-04-02T13:55:29+00:00 | 2026-04-07T14:57:20+00:00 |
| rhsa-2026:6477 | Red Hat Security Advisory: Red Hat build of Keycloak 26.4.11 Update | 2026-04-02T13:54:47+00:00 | 2026-04-07T14:57:20+00:00 |
| rhsa-2026:6475 | Red Hat Security Advisory: Red Hat build of Keycloak 26.2.15 Update | 2026-04-02T13:53:32+00:00 | 2026-04-07T14:57:19+00:00 |
| rhsa-2026:6461 | Red Hat Security Advisory: openssh security update | 2026-04-02T12:35:10+00:00 | 2026-04-09T23:07:29+00:00 |
| rhsa-2026:6462 | Red Hat Security Advisory: openssh security update | 2026-04-02T12:33:43+00:00 | 2026-04-09T23:07:30+00:00 |
| rhsa-2026:6470 | Red Hat Security Advisory: perl-YAML-Syck security update | 2026-04-02T12:23:12+00:00 | 2026-04-02T16:39:27+00:00 |
| rhsa-2026:6469 | Red Hat Security Advisory: libpng15 security update | 2026-04-02T12:20:17+00:00 | 2026-04-09T14:37:57+00:00 |
| rhsa-2026:6468 | Red Hat Security Advisory: libpng15 security update | 2026-04-02T12:18:04+00:00 | 2026-04-09T14:37:58+00:00 |
| rhsa-2026:6467 | Red Hat Security Advisory: libpng15 security update | 2026-04-02T12:12:54+00:00 | 2026-04-09T14:38:00+00:00 |
| rhsa-2026:6463 | Red Hat Security Advisory: openssh security update | 2026-04-02T12:09:43+00:00 | 2026-04-09T23:07:30+00:00 |
| rhsa-2026:6464 | Red Hat Security Advisory: python3 security update | 2026-04-02T12:07:33+00:00 | 2026-04-09T15:17:15+00:00 |
| rhsa-2026:6466 | Red Hat Security Advisory: libpng15 security update | 2026-04-02T12:04:34+00:00 | 2026-04-09T14:37:59+00:00 |
| rhsa-2026:6445 | Red Hat Security Advisory: libpng12 security update | 2026-04-02T11:35:38+00:00 | 2026-04-09T14:38:07+00:00 |
| rhsa-2026:6439 | Red Hat Security Advisory: libpng15 security update | 2026-04-02T11:12:37+00:00 | 2026-04-09T14:38:09+00:00 |
| rhsa-2026:6435 | Red Hat Security Advisory: mariadb:10.11 security update | 2026-04-02T10:59:43+00:00 | 2026-04-02T16:36:39+00:00 |
| rhsa-2026:6436 | Red Hat Security Advisory: rsync security update | 2026-04-02T10:54:57+00:00 | 2026-04-09T14:38:01+00:00 |
| rhsa-2026:5910 | Red Hat Security Advisory: OpenShift Container Platform 4.16.59 bug fix and security update | 2026-04-02T08:02:20+00:00 | 2026-04-09T14:38:29+00:00 |
| rhsa-2026:6429 | Red Hat Security Advisory: Multicluster Global Hub 1.4.5 security update | 2026-04-02T07:56:10+00:00 | 2026-04-12T14:09:07+00:00 |
| rhsa-2026:6428 | Red Hat Security Advisory: Network Observability 1.11.1 for OpenShift | 2026-04-02T07:50:38+00:00 | 2026-04-12T14:09:04+00:00 |
| rhsa-2026:6427 | Red Hat Security Advisory: nginx:1.26 security update | 2026-04-02T07:42:56+00:00 | 2026-04-08T14:07:15+00:00 |
| rhsa-2026:6407 | Red Hat Security Advisory: nginx:1.24 security update | 2026-04-01T22:57:35+00:00 | 2026-04-08T14:07:11+00:00 |
| rhsa-2026:6408 | Red Hat Security Advisory: nginx security update | 2026-04-01T20:24:35+00:00 | 2026-04-08T14:07:11+00:00 |
| rhsa-2026:6404 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2026-04-01T18:20:27+00:00 | 2026-04-10T16:29:18+00:00 |
| rhsa-2026:6396 | Red Hat Security Advisory: freerdp security update | 2026-04-01T16:28:09+00:00 | 2026-04-09T14:38:07+00:00 |
| rhsa-2026:6395 | Red Hat Security Advisory: freerdp security update | 2026-04-01T16:24:09+00:00 | 2026-04-09T14:38:07+00:00 |
| rhsa-2026:6391 | Red Hat Security Advisory: mysql:8.4 security update | 2026-04-01T15:43:39+00:00 | 2026-04-02T16:36:39+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2023-045-02 | StruxureWare Data Center Expert | 2023-02-14T08:05:19.000Z | 2023-02-14T08:05:19.000Z |
| sevd-2023-045-03 | Merten KNX devices | 2023-02-14T07:24:05.000Z | 2023-02-14T07:24:05.000Z |
| sevd-2023-045-01 | EcoStruxureTM Geo SCADA Expert | 2023-02-14T06:02:05.000Z | 2023-02-14T06:02:05.000Z |
| sevd-2023-010-03 | EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 | 2023-01-10T17:44:20.000Z | 2023-01-10T17:44:20.000Z |
| sevd-2023-010-02 | EcoStruxure Geo SCADA Expert | 2023-01-10T16:24:00.000Z | 2023-03-13T18:30:00.000Z |
| sevd-2023-010-05 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-01-10T15:41:57.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-06 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon M340, M580 and M580 CPU Safety | 2023-01-10T15:17:09.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-04 | EcoStruxure™ Power SCADA Anywhere | 2023-01-10T10:28:35.000Z | 2023-01-10T10:28:35.000Z |
| sevd-2023-010-01 | EcoStruxureTM Machine Expert – HVAC (formerly SoMachine - HVAC) | 2023-01-10T09:28:52.000Z | 2023-01-10T09:28:52.000Z |
| sevd-2022-347-01 | APC Easy UPS Online Monitoring Software | 2022-12-13T06:09:04.000Z | 2023-01-11T00:00:00.000Z |
| sevd-2022-347-03 | EcoStruxure Power Commission | 2022-12-13T04:28:00.000Z | 2022-12-13T04:28:00.000Z |
| sevd-2022-347-02 | Saitel DR RTU | 2022-12-13T04:12:25.000Z | 2022-12-13T04:12:25.000Z |
| sevd-2022-312-01 | NetBotz 4 - 355/450/455/550/570 | 2022-11-08T06:53:24.000Z | 2023-02-14T06:30:00.000Z |
| sevd-2022-284-04 | EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 | 2022-10-11T10:45:15.000Z | 2022-10-14T10:45:15.000Z |
| sevd-2022-284-02 | EcoStruxure™ Panel Server Box (PAS900) | 2022-10-11T10:05:49.000Z | 2022-10-11T10:05:49.000Z |
| sevd-2022-284-01 | EcoStruxure™ Operator Terminal Expert and Pro-face BLUE | 2022-10-11T09:48:46.000Z | 2022-10-11T09:48:46.000Z |
| sevd-2022-284-03 | ISaGRAF Workbench for SAGE RTU | 2022-10-10T22:13:16.000Z | 2025-11-14T06:30:00.000Z |
| sevd-2022-256-01 | EcoStruxure Machine SCADA Expert and Pro-face BLUE Open Studio | 2022-09-13T05:45:41.000Z | 2022-09-13T05:45:41.000Z |
| sevd-2022-221-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, and Modicon Controllers M580 and M340 | 2022-08-09T10:58:35.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-03 | EcoStruxure™ Control Expert | 2022-08-09T09:14:27.000Z | 2022-08-09T09:14:27.000Z |
| sevd-2022-221-04 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-02 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-193-03 | Acti9 PowerTag Link C | 2022-07-12T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2022-193-02 | SpaceLogic C-Bus Home Controller, formerly known as C-Bus Wiser Home Controller MK2 | 2022-07-12T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2022-193-04 | Easergy P5 | 2022-07-12T08:55:42.000Z | 2022-07-12T08:55:42.000Z |
| sevd-2022-193-01 | OPC UA and X80 advanced RTU Modicon Communication Modules | 2022-07-12T04:00:00.000Z | 2022-08-19T06:30:00.000Z |
| sevd-2022-165-08 | EcoStruxure™ Cybersecurity Admin Expert | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-07 | CanBRASS | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-06 | Schneider Electric C-Bus Home Automation Products | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-05 | EcoStruxure Power Commission | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-819629 | SSA-819629: Weak Authentication Vulnerability in Industrial Edge Device Kit | 2025-04-08T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-817234 | SSA-817234: Multiple Kubernetes Ingress NGINX Controller Vulnerabilities in Insights Hub Private Cloud | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-725549 | SSA-725549: Denial of Service of ICMP in Industrial Devices | 2025-04-08T00:00:00Z | 2025-07-21T00:00:00Z |
| ssa-672923 | SSA-672923: Out of Bounds Write Vulnerability in Solid Edge | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-634640 | SSA-634640: Weak Authentication Vulnerability in Siemens Industrial Edge Devices | 2025-04-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-525431 | SSA-525431: Privilege Escalation Vulnerabilities in Siemens License Server Before V4.3 | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-277137 | SSA-277137: Multiple Vulnerabilities in SIDIS Prime Before V4.0.700 | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-187636 | SSA-187636: Multiple Vulnerabilities in SENTRON 7KT PAC1260 Data Manager | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-920092 | SSA-920092: Memory Corruption Vulnerability in Simcenter Femap | 2025-03-13T00:00:00Z | 2025-03-13T00:00:00Z |
| ssa-858251 | SSA-858251: Authentication Bypass Vulnerabilities in OPC UA | 2025-03-11T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-787280 | SSA-787280: Unlocked Bootloader Vulnerability in SINAMICS S200 | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-615740 | SSA-615740: Multiple Vulnerabilities in SINEMA Remote Connect Client Before V3.2 SP3 | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-515903 | SSA-515903: Multiple Vulnerabilities in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-507653 | SSA-507653: Improper Access Control Vulnerabilities in Tecnomatix Plant Simulation | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-503939 | SSA-503939: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP | 2025-03-11T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-280834 | SSA-280834: Improper OpenVPN Credential Validation Vulnerability in SCALANCE M-800 and SC-600 Families | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-216014 | SSA-216014: Vulnerabilities in EFI variable of SIMATIC IPCs, SIMATIC Tablet PCs, and SIMATIC Field PGs | 2025-03-11T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-075201 | SSA-075201: Multiple Vulnerabilities in SCALANCE LPE9403 Before V4.0 | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-073066 | SSA-073066: Multiple Vulnerabilities in SINEMA Remote Connect Server Before V3.2 SP3 | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-050438 | SSA-050438: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and Tecnomatix Plant Simulation | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-992434 | SSA-992434: Directory Traversal Vulnerability in Third-Party Component in SiPass integrated | 2025-02-17T00:00:00Z | 2025-02-17T00:00:00Z |
| ssa-770770 | SSA-770770: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.7 on RUGGEDCOM APE1808 Devices | 2025-02-11T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-769027 | SSA-769027: Multiple Vulnerabilities fixed in SCALANCE W700 IEEE 802.11ax devices before V3.0.0 | 2025-02-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-767615 | SSA-767615: Information Disclosure Vulnerability in SIPROTEC 5 Devices | 2025-02-11T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-687955 | SSA-687955: Accessible Development Shell via Physical Interface in SIPROTEC 5 | 2025-02-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-656895 | SSA-656895: Open Redirect Vulnerability in Teamcenter | 2025-02-11T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-647005 | SSA-647005: Memory Corruption Vulnerability in OpenV2G | 2025-02-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-637914 | SSA-637914: Local Code Execution Vulnerability in Questa and ModelSim Before V2025.1 | 2025-02-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-615116 | SSA-615116: Multiple Vulnerabilities in Apogee PXC and Talon TC Devices | 2025-02-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-369369 | SSA-369369: Weak Registry Permission Vulnerability in SIMATIC IPC DiagBase and SIMATIC IPC DiagMonitor | 2025-02-11T00:00:00Z | 2025-04-08T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1107-1 | Security update for python312 | 2026-03-27T09:04:01Z | 2026-03-27T09:04:01Z |
| suse-su-2026:1102-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T08:05:21Z | 2026-03-27T08:05:21Z |
| suse-su-2026:1105-1 | Security update for containerd | 2026-03-27T07:03:20Z | 2026-03-27T07:03:20Z |
| suse-su-2026:1099-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T04:33:50Z | 2026-03-27T04:33:50Z |
| suse-su-2026:1096-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T04:04:40Z | 2026-03-27T04:04:40Z |
| suse-su-2026:1101-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T01:33:43Z | 2026-03-27T01:33:43Z |
| suse-su-2026:1100-1 | Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise 15 SP6) | 2026-03-26T23:08:12Z | 2026-03-26T23:08:12Z |
| suse-su-2026:1098-1 | Security update for cosign | 2026-03-26T21:23:31Z | 2026-03-26T21:23:31Z |
| suse-su-2026:1094-1 | Security update for python-deepdiff | 2026-03-26T17:56:23Z | 2026-03-26T17:56:23Z |
| suse-su-2026:1093-1 | Security update for xen | 2026-03-26T17:52:21Z | 2026-03-26T17:52:21Z |
| suse-su-2026:1092-1 | Security update for xen | 2026-03-26T17:51:51Z | 2026-03-26T17:51:51Z |
| suse-su-2026:1091-1 | Security update for kea | 2026-03-26T17:48:22Z | 2026-03-26T17:48:22Z |
| suse-su-2026:1090-1 | Security update for python3 | 2026-03-26T17:45:14Z | 2026-03-26T17:45:14Z |
| suse-su-2026:1089-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6) | 2026-03-26T17:34:58Z | 2026-03-26T17:34:58Z |
| suse-su-2026:1088-1 | Security update for the Linux Kernel (Live Patch 67 for SUSE Linux Enterprise 12 SP5) | 2026-03-26T17:03:58Z | 2026-03-26T17:03:58Z |
| suse-su-2026:20948-1 | Security update for net-tools | 2026-03-26T15:12:29Z | 2026-03-26T15:12:29Z |
| suse-su-2026:20940-1 | Security update for net-tools | 2026-03-26T15:12:29Z | 2026-03-26T15:12:29Z |
| suse-su-2026:1083-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6) | 2026-03-26T15:03:57Z | 2026-03-26T15:03:57Z |
| suse-su-2026:1081-1 | Security update for the Linux Kernel | 2026-03-26T13:23:51Z | 2026-03-26T13:23:51Z |
| suse-su-2026:1078-1 | Security update for the Linux Kernel | 2026-03-26T12:43:07Z | 2026-03-26T12:43:07Z |
| suse-su-2026:1077-1 | Security update for the Linux Kernel | 2026-03-26T12:42:31Z | 2026-03-26T12:42:31Z |
| suse-su-2026:1076-1 | Security update for python-pyasn1 | 2026-03-26T12:42:05Z | 2026-03-26T12:42:05Z |
| suse-su-2026:1075-1 | Security update for python-pyasn1 | 2026-03-26T12:41:27Z | 2026-03-26T12:41:27Z |
| suse-su-2026:1074-1 | Security update for nghttp2 | 2026-03-26T12:39:53Z | 2026-03-26T12:39:53Z |
| suse-su-2026:1073-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6) | 2026-03-26T12:33:43Z | 2026-03-26T12:33:43Z |
| suse-su-2026:1068-1 | Security update for pgvector | 2026-03-26T10:39:31Z | 2026-03-26T10:39:31Z |
| suse-su-2026:1067-1 | Security update for python-urllib3 | 2026-03-26T10:39:06Z | 2026-03-26T10:39:06Z |
| suse-su-2026:1066-1 | Security update for ruby2.5 | 2026-03-26T10:38:44Z | 2026-03-26T10:38:44Z |
| suse-su-2026:1065-1 | Security update for sqlite3 | 2026-03-26T10:38:26Z | 2026-03-26T10:38:26Z |
| suse-su-2026:1064-1 | Security update for python-tornado6 | 2026-03-26T10:37:23Z | 2026-03-26T10:37:23Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:3668 | Important: go-rpm-macros security update | 2026-03-03T00:00:00Z | 2026-03-04T11:06:04Z |
| alsa-2026:3638 | Moderate: nginx:1.24 security update | 2026-03-03T00:00:00Z | 2026-03-04T10:33:37Z |
| alsa-2026:3551 | Important: libpng security update | 2026-03-02T00:00:00Z | 2026-03-04T10:21:19Z |
| alsa-2026:3517 | Important: thunderbird security update | 2026-03-02T00:00:00Z | 2026-03-05T07:45:44Z |
| alsa-2026:3516 | Important: thunderbird security update | 2026-03-02T00:00:00Z | 2026-03-04T10:23:48Z |
| alsa-2026:3515 | Important: thunderbird security update | 2026-03-02T00:00:00Z | 2026-03-04T11:54:18Z |
| alsa-2026:3507 | Important: valkey security update | 2026-03-02T00:00:00Z | 2026-03-04T10:26:29Z |
| alsa-2026:3488 | Moderate: kernel security update | 2026-03-02T00:00:00Z | 2026-03-04T10:30:56Z |
| alsa-2026:3477 | Moderate: gnutls security update | 2026-03-02T00:00:00Z | 2026-03-02T13:35:48Z |
| alsa-2026:3476 | Important: udisks2 security update | 2026-03-02T00:00:00Z | 2026-03-05T07:49:03Z |
| alsa-2026:3464 | Moderate: kernel security update | 2026-03-02T00:00:00Z | 2026-03-03T15:09:58Z |
| alsa-2026:3463 | Moderate: kernel-rt security update | 2026-03-02T00:00:00Z | 2026-03-03T15:13:38Z |
| alsa-2026:3443 | Important: valkey security update | 2026-02-26T00:00:00Z | 2026-03-05T07:52:10Z |
| alsa-2026:3428 | Important: container-tools:rhel8 security update | 2026-02-26T00:00:00Z | 2026-03-02T15:20:08Z |
| alsa-2026:3407 | Important: mingw-fontconfig security update | 2026-02-26T00:00:00Z | 2026-03-02T15:16:03Z |
| alsa-2026:3405 | Important: libpng security update | 2026-02-26T00:00:00Z | 2026-03-02T13:11:42Z |
| alsa-2026:3361 | Important: firefox security update | 2026-02-25T00:00:00Z | 2026-02-26T10:18:27Z |
| alsa-2026:3359 | Important: python-pyasn1 security update | 2026-02-25T00:00:00Z | 2026-02-26T10:19:52Z |
| alsa-2026:3354 | Important: python-pyasn1 security update | 2026-02-25T00:00:00Z | 2026-02-26T13:28:33Z |
| alsa-2026:3343 | Important: skopeo security update | 2026-02-25T00:00:00Z | 2026-02-26T13:30:14Z |
| alsa-2026:3341 | Important: containernetworking-plugins security update | 2026-02-25T00:00:00Z | 2026-03-02T12:59:54Z |
| alsa-2026:3340 | Important: skopeo security update | 2026-02-25T00:00:00Z | 2026-03-02T12:57:45Z |
| alsa-2026:3339 | Important: firefox security update | 2026-02-25T00:00:00Z | 2026-02-26T10:21:52Z |
| alsa-2026:3338 | Important: firefox security update | 2026-02-25T00:00:00Z | 2026-03-02T12:54:29Z |
| alsa-2026:3337 | Important: podman security update | 2026-02-25T00:00:00Z | 2026-02-26T10:23:45Z |
| alsa-2026:3336 | Important: podman security update | 2026-02-25T00:00:00Z | 2026-02-26T13:31:46Z |
| alsa-2026:3334 | Important: freerdp security update | 2026-02-25T00:00:00Z | 2026-02-26T09:39:13Z |
| alsa-2026:3298 | Important: buildah security update | 2026-02-25T00:00:00Z | 2026-02-26T10:25:19Z |
| alsa-2026:3297 | Important: buildah security update | 2026-02-25T00:00:00Z | 2026-02-26T10:26:55Z |
| alsa-2026:3291 | Important: runc security update | 2026-02-25T00:00:00Z | 2026-02-26T10:27:56Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-762 | Use-of-uninitialized-value in fuzzer_send | 2025-09-19T00:14:45.258709Z | 2025-09-19T00:14:45.259063Z |
| osv-2025-742 | Null-dereference READ in ubsan_GetStackTrace | 2025-09-14T00:15:42.184140Z | 2025-09-14T00:15:42.184553Z |
| osv-2025-729 | UNKNOWN READ in sam_hrecs_free_tags | 2025-09-13T00:08:43.863495Z | 2025-09-13T00:08:43.863848Z |
| osv-2025-723 | Heap-buffer-overflow in processClientServerHello | 2025-09-13T00:02:40.666090Z | 2025-09-13T00:02:40.666412Z |
| osv-2025-718 | Heap-buffer-overflow in pcpp::ArpLayer::toString | 2025-09-10T00:08:49.177204Z | 2025-12-22T14:17:36.857810Z |
| osv-2025-698 | Use-of-uninitialized-value in AesEncrypt_C | 2025-09-02T00:02:49.308939Z | 2025-12-05T14:58:11.846817Z |
| osv-2025-684 | Heap-buffer-overflow in TGAHandler::read | 2025-08-25T00:17:17.781502Z | 2025-08-25T00:17:17.782094Z |
| osv-2025-677 | Heap-buffer-overflow in TGAHandler::read | 2025-08-23T00:05:27.168432Z | 2025-08-23T00:05:27.168725Z |
| osv-2025-657 | Heap-use-after-free in ftp_pp_statemachine | 2025-08-20T00:12:09.699805Z | 2025-08-20T00:12:09.700264Z |
| osv-2025-638 | Security exception in com.fasterxml.jackson.databind.deser.std.UntypedObjectDeserializer$Vanilla.deser | 2025-08-17T00:01:49.946822Z | 2025-08-17T14:48:59.288257Z |
| osv-2025-634 | Null-dereference READ in enc_fuzzer@Enc.EncTest | 2025-08-15T00:17:04.845331Z | 2025-08-15T00:17:04.845683Z |
| osv-2025-633 | UNKNOWN WRITE in _lou_handlePassVariableAction | 2025-08-15T00:16:54.142913Z | 2025-08-15T00:16:54.143400Z |
| osv-2025-631 | Null-dereference READ in advanced_api_fuzzer@AdvancedApi.AdvancedApiTest | 2025-08-15T00:02:42.080995Z | 2025-08-15T00:02:42.081563Z |
| osv-2025-628 | Null-dereference READ in ubsan_GetStackTrace | 2025-08-14T00:15:27.806312Z | 2025-08-14T00:15:27.806631Z |
| osv-2025-627 | Null-dereference READ in ProcessRows | 2025-08-14T00:14:14.245302Z | 2025-08-14T00:14:14.245619Z |
| osv-2025-622 | Heap-buffer-overflow in cc_storage_append | 2025-08-13T00:16:18.937393Z | 2025-08-13T00:16:18.937719Z |
| osv-2025-620 | Heap-buffer-overflow in FragPrepareChunk | 2025-08-12T00:14:23.793424Z | 2025-08-12T00:14:23.793828Z |
| osv-2025-619 | Heap-buffer-overflow in webvtt_domnode_SelectNodesInTree | 2025-08-12T00:13:01.748418Z | 2025-08-12T00:13:01.748751Z |
| osv-2025-618 | Heap-buffer-overflow in iTUNTripletCallback | 2025-08-12T00:05:50.847179Z | 2025-08-12T00:05:50.847582Z |
| osv-2025-617 | UNKNOWN WRITE in MP4_BoxFree | 2025-08-12T00:04:18.009473Z | 2025-08-12T00:04:18.009816Z |
| osv-2025-616 | Heap-buffer-overflow in Open | 2025-08-12T00:00:48.056276Z | 2025-08-12T00:00:48.056623Z |
| osv-2025-615 | Index-out-of-bounds in hevc_get_picture_size | 2025-08-12T00:00:42.725434Z | 2025-08-12T00:00:42.725767Z |
| osv-2025-614 | Heap-buffer-overflow in hevc_hvcC_to_AnnexB_NAL | 2025-08-12T00:00:36.634849Z | 2025-08-12T00:00:36.635239Z |
| osv-2025-613 | Heap-buffer-overflow in check_sync_pes | 2025-08-12T00:00:33.354786Z | 2025-08-12T00:00:33.355391Z |
| osv-2025-608 | Heap-buffer-overflow in _dwarf_memcpy_noswap_bytes | 2025-08-09T00:02:00.092320Z | 2025-08-11T14:17:56.957704Z |
| osv-2025-600 | Heap-buffer-overflow in generic_unpack | 2025-08-05T00:10:00.536266Z | 2025-08-05T00:10:00.536669Z |
| osv-2025-597 | Heap-buffer-overflow in generic_unpack | 2025-08-04T00:08:26.345735Z | 2025-08-04T00:08:26.346368Z |
| osv-2025-593 | Heap-buffer-overflow in mmcall | 2025-08-02T00:16:19.626747Z | 2025-12-20T14:30:41.473113Z |
| osv-2025-591 | UNKNOWN READ in mov_read_header | 2025-08-02T00:02:00.509459Z | 2025-08-02T00:02:00.510035Z |
| osv-2025-589 | Heap-buffer-overflow in isvcd_decode_recon_tfr_nmb_base_lyr | 2025-08-01T00:10:54.848946Z | 2025-08-01T00:10:54.849286Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0124 | rand_os crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-19T20:48:42Z |
| rustsec-2025-0123 | opentelemetry-jaeger crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T12:07:07Z |
| rustsec-2025-0122 | cargo-asm crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T09:02:31Z |
| rustsec-2025-0121 | gcc crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:52:10Z |
| rustsec-2025-0119 | number_prefix crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:13:56Z |
| rustsec-2025-0120 | json5 crate is unmaintained | 2025-11-16T12:00:00Z | 2025-11-30T00:15:16Z |
| rustsec-2025-0118 | Unsound API access to a WebAssembly shared linear memory | 2025-11-11T12:00:00Z | 2025-11-13T16:55:40Z |
| rustsec-2025-0117 | tandem is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0116 | tandem_garble_interop is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0115 | tandem_http_server is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0114 | tandem_http_client is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0136 | Underflow in aes_key_unwrap function | 2025-11-07T12:00:00Z | 2025-12-17T06:01:32Z |
| rustsec-2025-0154 | `replit_ruspty` was removed from crates.io for malicious code | 2025-11-04T12:00:00Z | 2026-03-25T08:37:19Z |
| rustsec-2025-0131 | Lack of sufficient checks in public API | 2025-10-31T12:00:00Z | 2025-12-02T06:03:09Z |
| rustsec-2025-0111 | `tokio-tar` parses PAX extended headers incorrectly, allows file smuggling | 2025-10-21T12:00:00Z | 2026-01-17T07:44:05Z |
| rustsec-2025-0110 | astral-tokio-tar Vulnerable to PAX Header Desynchronization | 2025-10-21T12:00:00Z | 2025-10-25T11:18:52Z |
| rustsec-2025-0109 | Out-of-bounds memory access in binary_read_to_ref and binary_write_from_ref | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0108 | Uninitialized memory exposure in string reading functions | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0107 | Uninitialized memory exposure in any_as_u8_slice | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0106 | Undefined behavior in index_of_ptr with empty slices | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0105 | Uninitialized memory exposure in create_ring_buffer | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0142 | Segmentation fault and invalid memory read in `mnl::cb_run` | 2025-10-18T12:00:00Z | 2026-02-10T13:23:41Z |
| rustsec-2025-0126 | Heap-buffer-overflow in nftnl::Batch::with_page_size (nftnl-rs) | 2025-10-18T12:00:00Z | 2025-11-27T21:53:33Z |
| rustsec-2025-0104 | `unic-ucd-segment` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0103 | `unic-ucd-core` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0102 | `unic-ucd-age` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0101 | `unic-ucd-common` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0100 | `unic-ucd-ident` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0099 | `unic-ucd-block` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0098 | `unic-ucd-version` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-discourse-2026-32114 | Discourse's unscoped status lookups leak restricted metadata | 2026-03-27T07:10:39.880Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-32099 | Discourse prevents hidden profile data leak via user onebox | 2026-03-27T07:10:36.934Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-31869 | Discourse: Composer mentions endpoint leaks hidden group membership through PM `allowed_names` check | 2026-03-27T07:10:33.910Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-31805 | Discourse has a poll authorization bypass via post_id array parameter | 2026-03-27T07:10:31.444Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-30891 | Discourse hasUnauthorized Exposure of Private User Action Types | 2026-03-27T07:10:28.864Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-30889 | Discourse has Unauthorized Post Data Exposure in discourse-user-notes | 2026-03-27T07:10:26.417Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-30888 | Discourse has moderator privilege escalation via arbitrary post_id in suspend/silence endpoint | 2026-03-27T07:10:23.855Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-29072 | Discourse missing permission check for policy creation in discourse-policy | 2026-03-27T07:10:21.008Z | 2026-03-31T21:15:21.591Z |
| bit-discourse-2026-28282 | Discourse vulnerable to group membership addition permission bypass via discourse-policy plugin | 2026-03-27T07:10:17.839Z | 2026-03-31T21:15:21.591Z |
| bit-nginx-2026-32647 | NGINX ngx_http_mp4_module vulnerability | 2026-03-27T07:10:16.616Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-28755 | NGINX ngx_stream_ssl_module vulnerability | 2026-03-27T07:10:13.976Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-28753 | NGINX ngx_mail_proxy_module vulnerability | 2026-03-27T07:10:10.953Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-27784 | NGINX ngx_http_mp4_module vulnerability | 2026-03-27T07:10:08.052Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27936 | Discourse discloses restricted post-action counts to non-privileged users | 2026-03-27T07:10:06.332Z | 2026-03-31T21:15:21.591Z |
| bit-nginx-2026-27654 | NGINX ngx_http_dav_module vulnerability | 2026-03-27T07:10:05.293Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27935 | Discourse leaks private topic metadata to non-authorized users | 2026-03-27T07:10:03.445Z | 2026-03-31T21:15:21.591Z |
| bit-nginx-2026-27651 | NGINX ngx_mail_auth_http_module vulnerability | 2026-03-27T07:10:02.387Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27934 | Discourse leaks private topic title and post excerpt via user action API endpoint | 2026-03-27T07:10:00.671Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27740 | Discourse has Stored XSS in AI Triage Automation | 2026-03-27T07:09:57.609Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27570 | Discourse Vulnerable to Stored XSS via Shared AI Conversation Onebox | 2026-03-27T07:09:54.665Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27491 | Discourse has a bypass of official warnings messages by non-staff users | 2026-03-27T07:09:52.198Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27454 | Discourse has check revision visibility on posts endpoint | 2026-03-27T07:09:48.954Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27166 | Discourse vulnerable to HTML injection via prohibited iframe URLs | 2026-03-27T07:09:46.264Z | 2026-03-27T07:40:55.991Z |
| bit-nats-2026-33215 | NATS is vulnerable to MQTT hijacking via Client ID | 2026-03-27T07:08:53.339Z | 2026-03-27T12:16:52.978Z |
| bit-minio-2026-33419 | MinIO: LDAP login brute-force via user enumeration and missing rate limit | 2026-03-27T07:08:02.540Z | 2026-03-27T07:40:55.991Z |
| bit-minio-2026-33322 | MinIO: JWT Algorithm Confusion in OIDC Authentication | 2026-03-27T07:07:59.802Z | 2026-03-27T07:40:55.991Z |
| bit-python-2026-4519 | webbrowser.open() allows leading dashes in URLs | 2026-03-25T08:52:23.976Z | 2026-03-25T09:15:17.567Z |
| bit-mariadb-2026-32710 | Heap-based Buffer Overflow in MariaDB | 2026-03-25T08:46:04.911Z | 2026-04-01T09:11:42.692Z |
| bit-libpython-2026-4519 | webbrowser.open() allows leading dashes in URLs | 2026-03-25T08:44:11.251Z | 2026-03-25T09:15:17.567Z |
| bit-tomcat-2023-28709 | Apache Tomcat: Fix for CVE-2023-24998 is incomplete | 2026-03-24T10:21:40.054Z | 2026-03-24T10:46:38.869Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-qk02462 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.2.7-r1 | 2026-04-01T09:54:36.812395Z | 2026-03-13T12:42:57Z |
| cleanstart-2026-ox06978 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.1-r1 | 2026-04-01T09:53:21.567659Z | 2026-03-13T12:42:57Z |
| cleanstart-2026-qa91937 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-r6j8-c6r2-37rr applied in versions: 0.18.3-r1, 0.18.3-r2 | 2026-04-01T09:52:00.878696Z | 2026-03-13T12:44:37Z |
| cleanstart-2026-nv84668 | Security fixes for ghsa-84h7-rjj3-6jx4, ghsa-vc5p-v9hr-52mj applied in versions: 4.1.1-r1 | 2026-04-01T09:51:29.848674Z | 2026-03-13T13:15:35Z |
| cleanstart-2026-na08955 | Security fixes for ghsa-84h7-rjj3-6jx4, ghsa-vc5p-v9hr-52mj applied in versions: 4.1.1-r1 | 2026-04-01T09:51:24.306982Z | 2026-03-13T13:15:35Z |
| cleanstart-2026-fb05615 | Security fixes for CVE-2025-15558, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2026-27141, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x, ghsa-p436-gjf2-799p applied in versions: 2.13.4-r0, 2.13.4-r1, 2.13.4-r2 | 2026-04-01T09:50:57.277339Z | 2026-03-15T13:46:33Z |
| cleanstart-2026-mk39503 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-1229, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 3.19.0-r0, 4.0.1-r0, 4.1.0-r0, 4.1.0-r1 | 2026-04-01T09:50:25.337048Z | 2026-03-16T05:34:59Z |
| cleanstart-2026-aq75465 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-1229, CVE-2026-27141 applied in versions: 3.19.0-r0, 4.0.0-r0, 4.0.1-r0, 4.1.1-r1 | 2026-04-01T09:50:20.419820Z | 2026-03-16T05:35:26Z |
| cleanstart-2026-jk47870 | Security fixes for CVE-2025-66614, CVE-2026-1225, CVE-2026-24281, CVE-2026-24308, CVE-2026-24733, ghsa-6rw7-vpxm-498p, ghsa-73rr-hh4g-fpgx, ghsa-8qq5-rm4j-mr97, ghsa-wqch-xfxh-vrr4 applied in versions: 4.2.1.1-r1, 4.3.1-r0 | 2026-04-01T09:49:35.155892Z | 2026-03-16T09:42:46Z |
| cleanstart-2026-fj01373 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68119, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-9h8m-3fm2-qjrq, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.34.0-r0, 0.34.0-r1, 0.34.0-r2 | 2026-04-01T09:49:20.210015Z | 2026-03-16T11:05:40Z |
| cleanstart-2026-ol32822 | Security fixes for CVE-2024-36537, CVE-2025-47910, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2026-25518, ghsa-gx3x-vq4p-mhhv applied in versions: 2.4.0-r1, 2.4.0-r2 | 2026-04-01T09:48:17.130268Z | 2026-03-16T16:39:54Z |
| cleanstart-2026-kw35511 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 5.0.18-r6, 5.0.18-r7 | 2026-04-01T09:48:16.623063Z | 2026-03-16T16:36:08Z |
| cleanstart-2026-do09088 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-67721, CVE-2025-68119, CVE-2025-68121, CVE-2026-1225, CVE-2026-1605, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-72hv-8253-57qq applied in versions: 479-r0 | 2026-04-01T09:47:03.615107Z | 2026-03-17T07:41:03Z |
| cleanstart-2026-fz57809 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.15.1-r0 | 2026-04-01T09:46:36.079269Z | 2026-03-17T05:43:20Z |
| cleanstart-2026-kr58137 | Security fixes for CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, ghsa-6v2p-p543-phr9 applied in versions: 0.8.19-r0, 0.8.19-r1, 0.8.19-r2 | 2026-04-01T09:46:06.671153Z | 2026-03-17T13:57:04Z |
| cleanstart-2026-ie15850 | Security fixes for CVE-2023-32762, CVE-2023-32763 applied in versions: 6.5.0-r5 | 2026-04-01T09:45:56.402696Z | 2026-03-17T13:11:05Z |
| cleanstart-2026-fx51482 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.5.1-r0, 1.5.1-r1 | 2026-04-01T09:45:37.795716Z | 2026-03-18T07:43:14Z |
| cleanstart-2026-lm72903 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 4.5.1-r0 | 2026-04-01T09:45:35.196573Z | 2026-03-18T05:58:10Z |
| cleanstart-2026-ei62818 | Security fixes for ghsa-3677-xxcr-wjqv, ghsa-qqpg-mvqg-649v, ghsa-x44p-gvrj-pj2r applied in versions: 2.7.2-r0 | 2026-04-01T09:45:31.119946Z | 2026-03-18T05:57:33Z |
| cleanstart-2026-ow14897 | Security fixes for CVE-2025-25285, CVE-2025-69873, CVE-2026-21637, ghsa-23c5-xmqv-rm74, ghsa-72xf-g2v4-qvf3, ghsa-7r86-cg39-jmmj, ghsa-pfrx-2q88-qq97, ghsa-rc47-6667-2j5j, ghsa-rmvr-2pp2-xj38 applied in versions: 2.5.10-r2, 2.5.10-r3, 2.6.0-r1 | 2026-04-01T09:45:25.624227Z | 2026-03-18T07:42:00Z |
| cleanstart-2026-ox88144 | Security fixes for CVE-2025-47911, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61732, CVE-2026-27139 applied in versions: 1.34.1-r0, 1.34.1-r2 | 2026-04-01T09:45:10.149925Z | 2026-03-18T13:13:46Z |
| cleanstart-2026-pk48502 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-68121 applied in versions: 2.3.0-r0 | 2026-04-01T09:45:06.972039Z | 2026-03-18T08:57:33Z |
| cleanstart-2026-gr86205 | Security fixes for CVE-2022-23181, CVE-2022-29885, CVE-2022-34305, CVE-2022-42252, CVE-2022-45143, CVE-2023-24998, CVE-2023-28708, CVE-2026-24515, CVE-2026-25210 applied in versions: 11.0.18-r0, 9.0.58-r0, 9.0.63-r0, 9.0.64-r0, 9.0.68-r0, 9.0.70-r0, 9.0.71-r0, 9.0.73-r0, 9.0.80-r0 | 2026-04-01T09:45:02.431388Z | 2026-03-19T05:47:18Z |
| cleanstart-2026-iy78242 | Security fixes for CVE-2025-61729, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-273p-m2cw-6833, ghsa-4c4x-jm2x-pf9j, ghsa-4qg8-fj49-pxjh, ghsa-59jp-pj84-45mr, ghsa-72c7-4g63-hpw5, ghsa-846p-jg2w-w324, ghsa-9h8m-3fm2-qjrq, ghsa-f6x5-jh6r-wrfv, ghsa-f83f-xpx7-ffpw, ghsa-fcv2-xgw5-pqxf, ghsa-fphv-w9fq-2525, ghsa-fw7p-63qq-7hpr, ghsa-j5w8-q4qc-rx2x, ghsa-jqc5-w2xx-5vq4, ghsa-p436-gjf2-799p, ghsa-whqx-f9j3-ch6m applied in versions: 0.26.0-r0, 0.26.0-r1, 0.26.0-r2, 0.26.0-r3, 0.26.0-r4 | 2026-04-01T09:44:29.089231Z | 2026-03-19T06:58:14Z |
| cleanstart-2026-pj76318 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, ghsa-273p-m2cw-6833, ghsa-4c4x-jm2x-pf9j, ghsa-4qg8-fj49-pxjh, ghsa-846p-jg2w-w324, ghsa-fcv2-xgw5-pqxf, ghsa-fphv-w9fq-2525, ghsa-jqc5-w2xx-5vq4, ghsa-whqx-f9j3-ch6m applied in versions: 1.14.1-r0, 1.14.1-r1, 1.14.1-r2, 1.14.1-r3 | 2026-04-01T09:44:23.291711Z | 2026-03-19T06:56:15Z |
| cleanstart-2026-mq21261 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142 applied in versions: 1.5.1-r0, 1.5.1-r1, 1.5.1-r2, 1.5.1-r3 | 2026-04-01T09:43:56.426341Z | 2026-03-19T07:05:59Z |
| cleanstart-2026-bt99405 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.29.2-r0, 1.29.2-r1 | 2026-04-01T09:43:54.267145Z | 2026-03-19T07:01:48Z |
| cleanstart-2026-qb67682 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.2-r1, 3.3.3-r0 | 2026-04-01T09:43:42.917590Z | 2026-03-19T07:11:57Z |
| cleanstart-2026-gs57401 | Security fixes for CVE-2025-69873, CVE-2026-1525, CVE-2026-1526, CVE-2026-1527, CVE-2026-1528, CVE-2026-2229, CVE-2026-2327, CVE-2026-2391, CVE-2026-25128, CVE-2026-25547, CVE-2026-2581, CVE-2026-25896, CVE-2026-26278, CVE-2026-26960, CVE-2026-27601, CVE-2026-27903, CVE-2026-27904, CVE-2026-27942, CVE-2026-28292, CVE-2026-29786, CVE-2026-31802, CVE-2026-32141, CVE-2026-33036, ghsa-23c5-xmqv-rm74, ghsa-25h7-pfq9-p65f, ghsa-2g4f-4pwh-qvx6, ghsa-2mjp-6q6p-2qxm, ghsa-37qj-frw5-hhjh, ghsa-38c4-r59v-3vqw, ghsa-3ppc-4f35-3m26, ghsa-4992-7rv2-5pvq, ghsa-7h2j-956f-4vf2, ghsa-7r86-cg39-jmmj, ghsa-83g3-92jg-28cx, ghsa-8gc5-j5rx-235r, ghsa-8wc6-vgrq-x6cf, ghsa-9ppj-qmqm-q256, ghsa-f269-vfmq-vjvj, ghsa-fj3w-jwp8-x2g3, ghsa-jmr7-xgp7-cmfj, ghsa-m7jm-9gc2-mpf2, ghsa-phc3-fgpg-7m6h, ghsa-qffp-2rhf-9h96, ghsa-qpx9-hpmf-5gmw, ghsa-r275-fr43-pm7q, ghsa-v9p9-hfj2-hcw8, ghsa-vrm6-8vpv-qv8q, ghsa-w7fw-mjwx-w883 applied in versions: 43.4.3-r1 | 2026-04-01T09:43:24.793409Z | 2026-03-19T07:48:38Z |
| cleanstart-2026-gc37751 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-66jq-2c23-2xh5, ghsa-9h8m-3fm2-qjrq applied in versions: 0.65.0-r0, 0.65.0-r1 | 2026-04-01T09:43:05.536029Z | 2026-03-19T07:09:40Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2021-ALE-022 | [MaJ] Vulnérabilité dans Apache Log4j | 2021-12-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-021 | Vulnérabilité dans Microsoft Exchange | 2021-11-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-021 | Vulnérabilité dans Microsoft Exchange | 2021-11-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-019 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-09-08T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-019 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-09-08T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-017 | Multiples vulnérabilités dans Microsoft Exchange | 2021-08-27T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-017 | Multiples vulnérabilités dans Microsoft Exchange | 2021-08-27T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| CERTFR-2021-ALE-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| certfr-2021-ale-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| CERTFR-2021-ALE-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| certfr-2021-ale-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| certfr-2021-ale-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| CERTFR-2021-ALE-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| CERTFR-2021-ALE-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| CERTFR-2021-ALE-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-007 | [MàJ] Vulnérabilité dans Pulse Connect Secure | 2021-04-20T00:00:00.000000 | 2021-06-21T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0304 | Multiples vulnérabilités dans Xen | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0303 | Vulnérabilité dans Microsoft Edge | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0302 | Multiples vulnérabilités dans Python | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0301 | Multiples vulnérabilités dans les produits Kaspersky | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0300 | Multiples vulnérabilités dans Mattermost Server | 2026-03-17T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0299 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0298 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0297 | Vulnérabilité dans Google Chrome | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0296 | Vulnérabilité dans OpenSSL | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0295 | Vulnérabilité dans les produits Microsoft | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0294 | Vulnérabilité dans Microsoft Office | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0293 | Vulnérabilité dans Microsoft Edge | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0292 | Multiples vulnérabilités dans les produits IBM | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0291 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0290 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0289 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0288 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0287 | Multiples vulnérabilités dans les produits NetApp | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0286 | Multiples vulnérabilités dans Google Chrome | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0285 | Vulnérabilité dans Python | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0284 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0283 | Vulnérabilité dans Microsoft Edge | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0282 | Multiples vulnérabilités dans Veeam Backup & Replication | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0281 | Multiples vulnérabilités dans les produits Splunk | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0280 | Multiples vulnérabilités dans les produits Apple | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0279 | Multiples vulnérabilités dans Cisco IOS XR | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0278 | Multiples vulnérabilités dans Google Chrome | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0277 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0276 | Multiples vulnérabilités dans GitLab | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0275 | Vulnérabilité dans GLPI | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000096 | Installer of WTW EAGLE (for Windows) may insecurely load Dynamic Link Libraries | 2025-10-29T14:17+09:00 | 2025-10-29T14:17+09:00 |
| jvndb-2025-000095 | MZK-DP300N uses hard-coded credentials | 2025-10-28T14:04+09:00 | 2025-10-28T14:04+09:00 |
| jvndb-2025-000093 | Multiple stored cross-site scripting vulnerabilities in Pleasanter | 2025-10-24T15:11+09:00 | 2025-10-24T15:11+09:00 |
| jvndb-2025-000084 | GROWI vulnerable to cross-site scripting | 2025-10-22T15:44+09:00 | 2025-10-22T15:44+09:00 |
| jvndb-2025-000091 | Multiple I-O DATA NAS management applications register Windows services with unquoted file paths | 2025-10-22T15:04+09:00 | 2025-12-10T16:20+09:00 |
| jvndb-2025-000090 | Multiple stored cross-site scripting vulnerabilities in Movable Type | 2025-10-22T13:54+09:00 | 2025-10-22T13:54+09:00 |
| jvndb-2025-000088 | Lanscope Endpoint Manager (On-Premises) vulnerable to improper verification of source of a communication channel | 2025-10-20T16:17+09:00 | 2025-10-22T10:06+09:00 |
| jvndb-2025-000092 | ETERNUS SF vulnerable to incorrect default permissions | 2025-10-20T14:20+09:00 | 2025-10-20T14:20+09:00 |
| jvndb-2025-000089 | Installer of AutoDownloader may insecurely load Dynamic Link Libraries | 2025-10-17T13:38+09:00 | 2025-10-17T13:38+09:00 |
| jvndb-2025-000074 | Multiple vulnerabilities in desknet's NEO | 2025-10-16T17:30+09:00 | 2025-10-16T17:30+09:00 |
| jvndb-2025-000076 | Multiple vulnerabilities in ChatLuck | 2025-10-16T17:17+09:00 | 2025-10-16T17:17+09:00 |
| jvndb-2025-000087 | Ruijie Networks RG-EST300 undocumented SSH functionality | 2025-10-16T14:19+09:00 | 2025-10-16T14:19+09:00 |
| jvndb-2025-016124 | Buffalo Wi-Fi router WXR9300BE6P series vulnerable to path traversal | 2025-10-16T11:16+09:00 | 2025-10-16T11:16+09:00 |
| jvndb-2025-000085 | Multiple RSUPPORT products may insecurely load Dynamic Link Libraries | 2025-10-15T15:55+09:00 | 2025-10-15T15:55+09:00 |
| jvndb-2025-000086 | Phoenix Contact CHARX SEC-3xxx vulnerable to code injection | 2025-10-15T15:54+09:00 | 2025-10-15T15:54+09:00 |
| jvndb-2025-000083 | BUFFALO NAS Navigator2 registers a Windows service with an unquoted file path | 2025-10-10T13:56+09:00 | 2025-10-10T13:56+09:00 |
| jvndb-2025-015451 | Multiple vulnerabilities in FUJI Electric V-SFT | 2025-10-09T13:39+09:00 | 2025-10-09T13:39+09:00 |
| jvndb-2025-000082 | The installers of DENSO TEN drive recorder viewer may insecurely load Dynamic Link Libraries | 2025-10-06T15:38+09:00 | 2025-10-06T15:38+09:00 |
| jvndb-2025-015061 | Trend Micro Antivirus for Mac vulnerable to Local Privilege Escalation | 2025-10-06T13:52+09:00 | 2025-10-06T13:52+09:00 |
| jvndb-2025-014967 | Multiple vulnerabilities in multiple Keyence products | 2025-10-03T11:19+09:00 | 2025-12-23T14:36+09:00 |
| jvndb-2025-014793 | NIHON KOHDEN Central Monitor CNS-6201 vulnerable to NULL pointer dereference | 2025-10-01T11:35+09:00 | 2025-10-27T12:28+09:00 |
| jvndb-2025-014642 | Multiple vulnerabilities in Canon Printer Drivers for Production Printers, Office/Small Office Multifunction Printers and Laser Printers | 2025-09-30T11:50+09:00 | 2025-09-30T11:50+09:00 |
| jvndb-2025-000081 | DataSpider Servista improper restriction of XML external entity references | 2025-09-29T14:44+09:00 | 2025-10-07T16:54+09:00 |
| jvndb-2025-014105 | OMRON SOCIAL SOLUTIONS Uninterruptible Power Supply (UPS) management application registers a Windows service with an unquoted file path | 2025-09-19T16:21+09:00 | 2025-09-19T16:21+09:00 |
| jvndb-2025-014104 | Multiple vulnerabilities in I-O DATA wireless LAN routers | 2025-09-19T14:58+09:00 | 2025-09-19T14:58+09:00 |
| jvndb-2025-014081 | Multiple Brother and its OEM products with weak initial administrator passwords | 2025-09-19T10:52+09:00 | 2025-09-19T10:52+09:00 |
| jvndb-2025-000079 | UNIVERGE IX/IX-R/IX-V series routers provided by NEC Corporation vulnerable to cross-site scripting | 2025-09-18T17:43+09:00 | 2025-09-18T17:43+09:00 |
| jvndb-2025-000078 | Century HW RAID Manager registers a Windows service with an unquoted file path | 2025-09-17T13:45+09:00 | 2025-09-17T13:45+09:00 |
| jvndb-2025-000048 | WTW-EAGLE App vulnerable to improper server certificate validation | 2025-09-12T13:57+09:00 | 2025-09-12T13:57+09:00 |
| jvndb-2025-000077 | RICOH Streamline NX vulnerable to tampering with operation history | 2025-09-08T13:42+09:00 | 2025-09-24T16:53+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14835 | OpenClaw授权绕过漏洞(CNVD-2026-14835) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14834 | OpenClaw存在未明漏洞(CNVD-2026-14834) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14833 | OpenClaw身份验证绕过漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14832 | OpenClaw存在未明漏洞(CNVD-2026-14832) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14831 | OpenClaw授权绕过漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14830 | OpenClaw存在未明漏洞(CNVD-2026-14830) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14829 | OpenClaw存在未明漏洞(CNVD-2026-14829) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14828 | OpenClaw存在未明漏洞(CNVD-2026-14828) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14827 | OpenClaw数据伪造问题漏洞(CNVD-2026-14827) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14826 | OpenClaw信息泄露漏洞(CNVD-2026-14826) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14825 | OpenClaw拒绝服务漏洞(CNVD-2026-14825) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-15159 | Apache Airflow信息泄露漏洞(CNVD-2026-15159) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15158 | Apache Airflow信息泄露漏洞(CNVD-2026-15158) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15157 | Apache Airflow安全绕过漏洞(CNVD-2026-15157) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15156 | Apache Airflow信息泄露漏洞(CNVD-2026-15156) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15154 | HCL AION安全绕过漏洞 | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15153 | HCL AION存在未明漏洞(CNVD-2026-15153) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15151 | HCL AION存在未明漏洞(CNVD-2026-15151) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15150 | HCL AION存在未明漏洞(CNVD-2026-15150) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15149 | HCL AION存在未明漏洞(CNVD-2026-15149) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15148 | HCL AION存在未明漏洞(CNVD-2026-15148) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15147 | HCL AION存在未明漏洞(CNVD-2026-15147) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15146 | HCL AION SQL注入漏洞(CNVD-2026-15146) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15145 | HCL AION信息泄露漏洞(CNVD-2026-15145) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15144 | HCL AION SQL注入漏洞 | 2026-03-19 | 2026-03-23 |
| cnvd-2026-14969 | WordPress插件WpEvently信息泄露漏洞 | 2026-03-19 | 2026-03-26 |
| cnvd-2026-14968 | WordPress插件wpDiscuz信息泄露漏洞 | 2026-03-19 | 2026-03-26 |
| cnvd-2026-14686 | Belkin F9K1122堆栈缓冲区溢出漏洞(CNVD-2026-14686) | 2026-03-19 | 2026-03-24 |
| cnvd-2026-14680 | TRENDnet TEW-632BRP缓冲区溢出漏洞 | 2026-03-19 | 2026-03-24 |
| cnvd-2026-14390 | OpenClaw访问控制错误漏洞(CNVD-2026-14390) | 2026-03-19 | 2026-03-20 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01708 | Уязвимость функции commonprefix() модуля pip языка программирования Python, позволяющая н… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01707 | Уязвимость библиотеки обработки JSON-данных Json-smart, связанная с неконтролируемой реку… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01706 | Уязвимость функции toFixed() среды выполнения JavaScript-кода Rhino, позволяющая нарушите… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01705 | Уязвимость классов ManifestParser и AmazonS3 системы контроля версий Git на языке Java Ec… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01704 | Уязвимость компонента JSON Web Token Handler программного средства для управления иденти… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01703 | Уязвимость функции h2v2_merged_upsample_internal() библиотеки libjpeg-turbo, позволяющая … | 11.02.2026 | 11.02.2026 |
| bdu:2026-01702 | Уязвимость диспетчера окон рабочего стола (Desktop Window Manager) операционных систем Wi… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01701 | Уязвимость службы удаленного рабочего стола Remote Desktop Services (RDS) операционных си… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01700 | Уязвимость компонента MSHTML операционных систем Windows, позволяющая нарушителю обойти ф… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01699 | Уязвимость пакета программ Microsoft Office, связанная с использованием ненадежных входны… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01698 | Уязвимость службы Remote Access Connection Manager (RASMan) операционной системы Windows,… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01639 | Уязвимость функций virtio_queue_rqs() и virtblk_poll() модуля drivers/block/virtio_blk.c … | 11.02.2026 | 11.02.2026 |
| bdu:2026-01636 | Уязвимость функции felix_change_tag_protocol() модуля drivers/net/dsa/ocelot/felix.c драй… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01635 | Уязвимость анализатора XML-файлов Xerces2 Java, связанная с ошибками управления ресурсом,… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01634 | Уязвимость библиотеки синтаксического анализа XML Apache Xerces, связанная с выполнением … | 11.02.2026 | 11.02.2026 |
| bdu:2026-01633 | Уязвимость функции gfx_v9_0_hw_fini() модуля drivers/gpu/drm/amd/amdgpu/gfx_v9_0.c драйве… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01632 | Уязвимость компонента io.netty.handler.codec.http.HttpRequestEncoder сетевого программног… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01631 | Уязвимость функции nouveau_gem_prime_import_sg_table() модуля drivers/gpu/drm/nouveau/nou… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01630 | Уязвимость командной оболочки Shell операционных систем Windows, позволяющая нарушителю о… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01629 | Уязвимость функции efivar_ssdt_load() модуля drivers/firmware/efi/efi.c драйвера прошивок… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01628 | Уязвимость функции irdma_net_event() модуля drivers/infiniband/hw/irdma/utils.c драйвера … | 11.02.2026 | 11.02.2026 |
| bdu:2026-01627 | Уязвимость функции kimage_map_segment() модуля kernel/kexec_core.c ядра операционной сист… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01626 | Уязвимость функций rtw89_core_register_hw(), rtw89_pci_probe() модуля drivers/net/wireles… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01625 | Уязвимость инструмента создания сценариев веб-клиента системы для управления взаимоотноше… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01599 | Уязвимость функции drain_obj_stock() модуля mm/memcontrol.c подсистемы управления памятью… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01598 | Уязвимость функции f2fs_put_super() модуля fs/f2fs/super.c файловой системы F2FS ядра опе… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01570 | Уязвимость функции a7xx_patch_pwrup_reglist() модуля drivers/gpu/drm/msm/adreno/a6xx_gpu… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01569 | Уязвимость функции exynos_clkout_probe() модуля drivers/clk/samsung/clk-exynos-clkout.c д… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01568 | Уязвимость функции adv7842_cp_log_status() модуля drivers/media/i2c/adv7842.c драйвера му… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01567 | Уязвимость функции raid1_remove_disk() модуля drivers/md/raid1.c драйвера нескольких устр… | 11.02.2026 | 11.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202010-1511 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T22:14:35.686000Z |
| var-201912-1854 | An issue existed in the drawing of web page elements. The issue was addressed with improv… | 2024-07-23T22:14:33.774000Z |
| var-200511-0019 | The Internet Key Exchange version 1 (IKEv1) implementation in Check Point products allows… | 2024-07-23T22:14:03.297000Z |
| var-201008-0270 | The WDB target agent debug service in Wind River VxWorks 6.x, 5.x, and earlier, as used o… | 2024-07-23T22:14:01.941000Z |
| var-200904-0819 | Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.… | 2024-07-23T22:12:51.678000Z |
| var-201711-0446 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T22:12:50.009000Z |
| var-201912-0506 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:12:49.908000Z |
| var-200609-0311 | Heap-based buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote at… | 2024-07-23T22:12:46.615000Z |
| var-201905-1248 | Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some m… | 2024-07-23T22:12:08.666000Z |
| var-202007-1133 | Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an … | 2024-07-23T22:12:07.961000Z |
| var-201009-0230 | bgpd in Quagga before 0.99.17 does not properly parse AS paths, which allows remote attac… | 2024-07-23T22:12:06.629000Z |
| var-201806-1488 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T22:12:00.711000Z |
| var-201405-0244 | The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEA… | 2024-07-23T22:12:00.239000Z |
| var-200611-0368 | The (1) Password Manager in Mozilla Firefox 2.0, and 1.5.0.8 and earlier; and the (2) Pas… | 2024-07-23T22:11:59.300000Z |
| var-201806-1436 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T22:11:27.007000Z |
| var-201702-0879 | An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari … | 2024-07-23T22:10:32.463000Z |
| var-200703-0010 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted at… | 2024-07-23T22:10:30.778000Z |
| var-201902-0855 | png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_im… | 2024-07-23T22:10:27.196000Z |
| var-202010-1294 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T22:10:25.978000Z |
| var-201506-0038 | Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to exe… | 2024-07-23T22:10:25.193000Z |
| var-200805-0585 | OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the… | 2024-07-23T22:10:24.233000Z |
| var-202012-1547 | A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel thr… | 2024-07-23T22:10:23.557000Z |
| var-201302-0236 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:10:22.448000Z |
| var-202004-2191 | In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untru… | 2024-07-23T22:10:21.285000Z |
| var-201904-0742 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:10:15.079000Z |
| var-200608-0030 | Unspecified vulnerability in the "compression state handling" in Bom for Apple Mac OS X 1… | 2024-07-23T22:10:15.377000Z |
| var-201912-0608 | A memory corruption issue was addressed with improved input validation. This issue is fix… | 2024-07-23T22:09:37.183000Z |
| var-200505-0162 | Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based … | 2024-07-23T22:09:05.800000Z |
| var-202003-1771 | A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-pro… | 2024-07-23T22:09:01.387000Z |
| var-201506-0465 | The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.… | 2024-07-23T22:08:28.995000Z |