Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-33105 |
10 (3.1)
|
Microsoft Azure Kubernetes Service Elevation of Privil… |
Microsoft |
Azure Kubernetes Service |
2026-04-02T23:26:59.400Z | 2026-04-10T21:20:53.437Z |
| CVE-2026-26135 |
9.6 (3.1)
|
Azure Custom Locations Resource Provider (RP) Elevatio… |
Microsoft |
Azure Custom Locations Resource Provider |
2026-04-02T23:26:58.697Z | 2026-04-10T21:20:49.769Z |
| CVE-2026-33107 |
10 (3.1)
|
Azure Databricks Elevation of Privilege Vulnerability |
Microsoft |
Azure Databricks |
2026-04-02T23:26:57.956Z | 2026-04-10T21:20:48.970Z |
| CVE-2026-32186 |
10 (3.1)
|
Microsoft Bing Elevation of Privilege Vulnerability |
Microsoft |
Microsoft Bing |
2026-04-03T17:22:45.504Z | 2026-04-10T21:20:48.223Z |
| CVE-2026-33118 |
4.3 (3.1)
|
Microsoft Edge (Chromium-based) Spoofing Vulnerability |
Microsoft |
Microsoft Edge (Chromium-based) |
2026-04-10T21:20:44.423Z | 2026-04-10T21:20:44.423Z |
| CVE-2026-33119 |
5.4 (3.1)
|
Microsoft Edge (Chromium-based) for Android Spoofing V… |
Microsoft |
Microsoft Edge for Android |
2026-04-10T21:20:37.767Z | 2026-04-10T21:20:37.767Z |
| CVE-2026-32213 |
10 (3.1)
|
Azure AI Foundry Elevation of Privilege Vulnerability |
Microsoft |
Azure AI Foundry |
2026-04-02T23:26:56.002Z | 2026-04-10T21:20:30.982Z |
| CVE-2026-32590 |
7.1 (3.1)
|
Mirror-registry: remote code execution using pickle de… |
Red Hat |
mirror registry for Red Hat OpenShift |
2026-04-08T17:04:22.870Z | 2026-04-10T21:16:18.121Z |
| CVE-2026-5483 |
8.5 (3.1)
|
Odh-dashboard: odh dashboard kubernetes service accoun… |
Red Hat |
Red Hat OpenShift AI 2.16 |
2026-04-10T17:33:25.055Z | 2026-04-10T21:07:45.000Z |
| CVE-2026-4631 |
9.8 (3.1)
|
Cockpit: cockpit: unauthenticated remote code executio… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-04-07T16:30:28.069Z | 2026-04-10T21:05:16.830Z |
| CVE-2026-39901 |
5.7 (3.1)
|
monetr: Protected Transactions Deletable via PUT |
monetr |
monetr |
2026-04-08T21:02:56.280Z | 2026-04-10T20:55:42.904Z |
| CVE-2026-39889 |
7.5 (3.1)
|
PraisonAI has Unauthenticated SSE Event Stream Exposes… |
MervinPraison |
PraisonAI |
2026-04-08T20:44:24.276Z | 2026-04-10T20:54:03.584Z |
| CVE-2026-39883 |
7.3 (4.0)
|
OpenTelemetry-Go has an incomplete fix for CVE-2026-24… |
open-telemetry |
opentelemetry-go |
2026-04-08T20:26:41.731Z | 2026-04-10T20:52:54.819Z |
| CVE-2026-40252 |
5.3 (4.0)
|
Broken Access Control (IDOR) Leading to Cross-Tenant A… |
labring |
FastGPT |
2026-04-10T20:52:15.218Z | 2026-04-10T20:52:15.218Z |
| CVE-2026-5436 |
8.1 (3.1)
|
MW WP Form <= 5.1.1 - Unauthenticated Arbitrary File M… |
inc2734 |
MW WP Form |
2026-04-08T20:25:10.473Z | 2026-04-10T20:50:10.628Z |
| CVE-2026-39429 |
8.2 (3.1)
|
kcp's cache server is accessible without authenticatio… |
kcp-dev |
kcp |
2026-04-08T20:16:04.015Z | 2026-04-10T20:49:31.041Z |
| CVE-2026-39880 |
5 (3.1)
|
Remnawave Backend has a race condition in HWID device … |
remnawave |
backend |
2026-04-08T20:01:21.673Z | 2026-04-10T20:48:07.233Z |
| CVE-2026-5802 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
idachev mcp-javadc HTTP os command injection |
idachev |
mcp-javadc |
2026-04-08T20:00:24.876Z | 2026-04-10T20:47:03.503Z |
| CVE-2026-39859 |
6.3 (4.0)
|
LiquidJS has a renderFile() / parseFile() bypass confi… |
harttle |
liquidjs |
2026-04-08T19:45:21.747Z | 2026-04-10T20:45:55.071Z |
| CVE-2026-39362 |
5.3 (4.0)
|
InvenTree has SSRF via Remote Image Download — No IP/H… |
inventree |
InvenTree |
2026-04-08T19:32:46.744Z | 2026-04-10T20:44:13.278Z |
| CVE-2026-35477 |
5.5 (3.1)
|
InvenTree has SSTI in PART_NAME_FORMAT bypasses CVE-20… |
inventree |
InvenTree |
2026-04-08T19:20:58.967Z | 2026-04-10T20:43:12.243Z |
| CVE-2026-35403 |
6.5 (3.1)
|
LORIS has potential cross-site scripting in survey_acc… |
aces |
Loris |
2026-04-08T18:27:17.221Z | 2026-04-10T20:42:38.101Z |
| CVE-2026-34985 |
6.3 (3.1)
|
LORIS has incorrect access checks in media module |
aces |
Loris |
2026-04-08T18:22:09.927Z | 2026-04-10T20:41:48.430Z |
| CVE-2026-34723 |
8.7 (4.0)
|
Zammad has incorrect access control in getting_started… |
zammad |
zammad |
2026-04-08T18:14:08.582Z | 2026-04-10T20:40:49.909Z |
| CVE-2026-34719 |
8.3 (4.0)
|
Zammad has a Server-side request forgery (SSRF) via webhooks |
zammad |
zammad |
2026-04-08T18:02:16.224Z | 2026-04-10T20:38:50.653Z |
| CVE-2026-34166 |
3.7 (3.1)
|
LiquidJS has a Memory Limit Bypass via Quadratic Ampli… |
harttle |
liquidjs |
2026-04-08T17:52:05.849Z | 2026-04-10T20:37:03.164Z |
| CVE-2026-35407 |
5.9 (4.0)
|
Saleor has Cross-Account Email Change via Unbound Conf… |
saleor |
saleor |
2026-04-08T17:24:39.716Z | 2026-04-10T20:36:19.733Z |
| CVE-2026-32591 |
5.2 (3.1)
|
Mirror-registry: quay: server-side request forgery in … |
Red Hat |
mirror registry for Red Hat OpenShift |
2026-04-08T17:06:58.222Z | 2026-04-10T20:34:29.075Z |
| CVE-2026-40242 |
7.2 (3.1)
|
Arcane Unauthenticated SSRF with Conditional Response … |
getarcaneapp |
arcane |
2026-04-10T20:34:12.777Z | 2026-04-10T20:34:12.777Z |
| CVE-2026-33229 |
8.6 (4.0)
|
XWiki Platform affected by remote code execution with … |
xwiki |
xwiki-platform |
2026-04-08T14:53:35.977Z | 2026-04-10T20:33:15.897Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40242 |
7.2 (3.1)
|
Arcane Unauthenticated SSRF with Conditional Response … |
getarcaneapp |
arcane |
2026-04-10T20:34:12.777Z | 2026-04-10T20:34:12.777Z |
| CVE-2026-40194 |
3.7 (3.1)
|
phpseclib has a variable-time HMAC comparison in SSH2:… |
phpseclib |
phpseclib |
2026-04-10T20:24:06.696Z | 2026-04-10T20:24:06.696Z |
| CVE-2026-40191 |
6.8 (4.0)
|
ClearanceKit has a policy bypass via dual-path Endpoin… |
craigjbass |
clearancekit |
2026-04-10T20:19:35.909Z | 2026-04-10T20:19:35.909Z |
| CVE-2026-39883 |
7.3 (4.0)
|
OpenTelemetry-Go has an incomplete fix for CVE-2026-24… |
open-telemetry |
opentelemetry-go |
2026-04-08T20:26:41.731Z | 2026-04-10T20:52:54.819Z |
| CVE-2026-39408 |
5.9 (4.0)
|
Hono has a path traversal in toSSG() allows writing fi… |
honojs |
hono |
2026-04-08T14:42:25.357Z | 2026-04-10T20:31:47.508Z |
| CVE-2026-35407 |
5.9 (4.0)
|
Saleor has Cross-Account Email Change via Unbound Conf… |
saleor |
saleor |
2026-04-08T17:24:39.716Z | 2026-04-10T20:36:19.733Z |
| CVE-2026-34723 |
8.7 (4.0)
|
Zammad has incorrect access control in getting_started… |
zammad |
zammad |
2026-04-08T18:14:08.582Z | 2026-04-10T20:40:49.909Z |
| CVE-2026-34719 |
8.3 (4.0)
|
Zammad has a Server-side request forgery (SSRF) via webhooks |
zammad |
zammad |
2026-04-08T18:02:16.224Z | 2026-04-10T20:38:50.653Z |
| CVE-2026-34486 |
N/A
|
Apache Tomcat: Fix for CVE-2026-29146 allowed bypass o… |
Apache Software Foundation |
Apache Tomcat |
2026-04-09T19:35:35.994Z | 2026-04-10T20:20:56.605Z |
| CVE-2026-34483 |
N/A
|
Apache Tomcat: Incomplete escaping of JSON access logs |
Apache Software Foundation |
Apache Tomcat |
2026-04-09T19:30:28.874Z | 2026-04-10T20:17:38.858Z |
| CVE-2026-34079 |
8.7 (4.0)
|
Flatpak affected by arbitrary file deletion on the hos… |
flatpak |
flatpak |
2026-04-07T21:29:44.601Z | 2026-04-10T20:13:47.945Z |
| CVE-2026-34020 |
N/A
|
Apache OpenMeetings: Login Credentials Passed via GET … |
Apache Software Foundation |
Apache OpenMeetings |
2026-04-09T15:52:06.599Z | 2026-04-10T20:13:47.789Z |
| CVE-2026-33229 |
8.6 (4.0)
|
XWiki Platform affected by remote code execution with … |
xwiki |
xwiki-platform |
2026-04-08T14:53:35.977Z | 2026-04-10T20:33:15.897Z |
| CVE-2026-28390 |
N/A
|
Possible NULL Dereference When Processing CMS KeyTrans… |
OpenSSL |
OpenSSL |
2026-04-07T22:00:54.172Z | 2026-04-10T20:26:06.061Z |
| CVE-2026-28389 |
N/A
|
Possible NULL Dereference When Processing CMS KeyAgree… |
OpenSSL |
OpenSSL |
2026-04-07T22:00:53.364Z | 2026-04-10T20:20:45.506Z |
| CVE-2026-28388 |
N/A
|
NULL Pointer Dereference When Processing a Delta CRL |
OpenSSL |
OpenSSL |
2026-04-07T22:00:52.382Z | 2026-04-10T20:18:43.095Z |
| CVE-2026-28386 |
N/A
|
Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-5… |
OpenSSL |
OpenSSL |
2026-04-07T22:00:50.164Z | 2026-04-10T20:16:08.389Z |
| CVE-2025-45057 |
7.5 (3.1)
|
D-Link DI-8300 v16.07.26A1 was discovered to cont… |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-09T20:50:59.112Z |
| CVE-2025-45058 |
7.5 (3.1)
|
D-Link DI-8300 v16.07.26A1 was discovered to cont… |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-09T20:51:48.190Z |
| CVE-2025-45059 |
7.5 (3.1)
|
D-Link DI-8300 v16.07.26A1 was discovered to cont… |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:42:43.981Z |
| CVE-2025-50665 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:41:12.773Z |
| CVE-2025-50666 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:41:05.712Z |
| CVE-2025-50667 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:40:56.882Z |
| CVE-2025-50668 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:40:48.569Z |
| CVE-2025-50669 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:40:41.067Z |
| CVE-2025-50670 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:40:34.059Z |
| CVE-2025-50672 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:40:26.971Z |
| CVE-2025-50673 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:40:20.741Z |
| CVE-2025-50655 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T17:41:12.166Z |
| CVE-2025-50657 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T17:42:12.056Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-5264 | Heap buffer overflow in DTLS 1.3 ACK message processing. A remote attacker can send a crafted DTLS … | 2026-04-09T22:16:36.790 | 2026-04-09T22:16:36.790 |
| fkie_cve-2026-5263 | URI nameConstraints from constrained intermediate CAs are parsed but not enforced during certificat… | 2026-04-09T22:16:36.647 | 2026-04-09T22:16:36.647 |
| fkie_cve-2026-40154 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI treats remotely fetched templa… | 2026-04-09T22:16:36.503 | 2026-04-09T22:16:36.503 |
| fkie_cve-2026-40153 | PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, the execute_command function in sh… | 2026-04-09T22:16:36.350 | 2026-04-09T22:16:36.350 |
| fkie_cve-2026-40152 | PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, he list_files() tool in FileTools … | 2026-04-09T22:16:36.193 | 2026-04-09T22:16:36.193 |
| fkie_cve-2026-40151 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, the AgentOS deployment platform exposes … | 2026-04-09T22:16:36.047 | 2026-04-09T22:16:36.047 |
| fkie_cve-2026-40150 | PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, the web_crawl() function in praiso… | 2026-04-09T22:16:35.900 | 2026-04-09T22:16:35.900 |
| fkie_cve-2026-40149 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, the gateway's /api/approval/allow-list e… | 2026-04-09T22:16:35.750 | 2026-04-09T22:16:35.750 |
| fkie_cve-2026-40148 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, the _safe_extractall() function in Prais… | 2026-04-09T22:16:35.600 | 2026-04-09T22:16:35.600 |
| fkie_cve-2026-40117 | PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, read_skill_file() in skill_tools.p… | 2026-04-09T22:16:35.447 | 2026-04-09T22:16:35.447 |
| fkie_cve-2026-40116 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /media-stream WebSocket endpoint in … | 2026-04-09T22:16:35.297 | 2026-04-09T22:16:35.297 |
| fkie_cve-2026-40115 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, the WSGI-based recipe registry server (s… | 2026-04-09T22:16:35.143 | 2026-04-09T22:16:35.143 |
| fkie_cve-2026-40114 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /api/v1/runs endpoint accepts an arb… | 2026-04-09T22:16:35.000 | 2026-04-09T22:16:35.000 |
| fkie_cve-2026-40113 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, deploy.py constructs a single comma-deli… | 2026-04-09T22:16:34.853 | 2026-04-09T22:16:34.853 |
| fkie_cve-2026-40112 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, the Flask API endpoint in src/praisonai/… | 2026-04-09T22:16:34.707 | 2026-04-09T22:16:34.707 |
| fkie_cve-2026-40111 | PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, he memory hooks executor in praiso… | 2026-04-09T22:16:34.560 | 2026-04-09T22:16:34.560 |
| fkie_cve-2026-39848 | Dockyard is a Docker container management app. Prior to 1.1.0, Docker container start and stop oper… | 2026-04-09T22:16:34.407 | 2026-04-09T22:16:34.407 |
| fkie_cve-2026-35646 | OpenClaw before 2026.3.25 contains a pre-authentication rate-limit bypass vulnerability in webhook … | 2026-04-09T22:16:34.223 | 2026-04-09T22:16:34.223 |
| fkie_cve-2026-35645 | OpenClaw before 2026.3.25 contains a privilege escalation vulnerability in the gateway plugin subag… | 2026-04-09T22:16:34.050 | 2026-04-09T22:16:34.050 |
| fkie_cve-2026-35644 | OpenClaw before 2026.3.22 contains an information disclosure vulnerability that allows attackers wi… | 2026-04-09T22:16:33.873 | 2026-04-09T22:16:33.873 |
| fkie_cve-2026-35642 | OpenClaw before 2026.3.25 contains an authorization bypass vulnerability where group reaction event… | 2026-04-09T22:16:33.697 | 2026-04-09T22:16:33.697 |
| fkie_cve-2026-35640 | OpenClaw before 2026.3.25 parses JSON request bodies before validating webhook signatures, allowing… | 2026-04-09T22:16:33.507 | 2026-04-09T22:16:33.507 |
| fkie_cve-2026-35639 | OpenClaw before 2026.3.22 contains a privilege escalation vulnerability in the device.pair.approve … | 2026-04-09T22:16:33.317 | 2026-04-09T22:16:33.317 |
| fkie_cve-2026-35638 | OpenClaw before 2026.3.22 contains a privilege escalation vulnerability in the Control UI that allo… | 2026-04-09T22:16:33.123 | 2026-04-09T22:16:33.123 |
| fkie_cve-2026-35637 | OpenClaw before 2026.3.22 performs cite expansion before completing channel and DM authorization ch… | 2026-04-09T22:16:32.933 | 2026-04-09T22:16:32.933 |
| fkie_cve-2026-35636 | OpenClaw versions 2026.3.11 through 2026.3.24 contain a session isolation bypass vulnerability wher… | 2026-04-09T22:16:32.750 | 2026-04-09T22:16:32.750 |
| fkie_cve-2026-35635 | OpenClaw before 2026.3.22 contains a webhook path route replacement vulnerability in the Synology C… | 2026-04-09T22:16:32.567 | 2026-04-09T22:16:32.567 |
| fkie_cve-2026-35634 | OpenClaw before 2026.3.23 contains an authentication bypass vulnerability in the Canvas gateway whe… | 2026-04-09T22:16:32.380 | 2026-04-09T22:16:32.380 |
| fkie_cve-2026-35633 | OpenClaw before 2026.3.22 contains an unbounded memory allocation vulnerability in remote media HTT… | 2026-04-09T22:16:32.187 | 2026-04-09T22:16:32.187 |
| fkie_cve-2026-35632 | OpenClaw through 2026.2.22 contains a symlink traversal vulnerability in agents.create and agents.u… | 2026-04-09T22:16:32.003 | 2026-04-09T22:16:32.003 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-ff24-4prj-gpmj |
7.2 (3.1)
|
Arcane has Unauthenticated SSRF with Conditional Response Reflection in Template Fetch Endpoint | 2026-04-10T20:59:27Z | 2026-04-10T21:37:59Z |
| ghsa-r854-jrxh-36qx |
3.7 (3.1)
|
phpseclib has a variable-time HMAC comparison in SSH2::get_binary_packet() using != instead of hash… | 2026-04-10T20:58:10Z | 2026-04-10T21:37:53Z |
| ghsa-fw9q-39r9-c252 |
5.6 (3.1)
|
LangSmith Client SDKs has Prototype Pollution in langsmith-sdk via Incomplete `__proto__` Guard in … | 2026-04-10T20:18:02Z | 2026-04-10T21:37:36Z |
| ghsa-wvhv-qcqf-f3cx |
9.3 (4.0)
|
goshs has a file-based ACL authorization bypass in goshs state-changing routes | 2026-04-10T20:00:32Z | 2026-04-10T21:37:32Z |
| ghsa-2943-crp8-38xx |
7.7 (3.1)
|
goshs is Missing Write Protection for Parametric Data Values | 2026-04-10T20:00:28Z | 2026-04-10T21:37:27Z |
| ghsa-8647-755q-fw9p |
6.9 (4.0)
|
ajenti.plugin.core has race conditions in 2FA | 2026-04-10T19:54:41Z | 2026-04-10T21:37:21Z |
| ghsa-3mcx-6wxm-qr8v |
9.1 (4.0)
|
ajenti.plugin.core has password bypass when 2FA is activated | 2026-04-10T19:47:31Z | 2026-04-10T21:37:11Z |
| ghsa-fvcv-3m26-pcqx |
10.0 (3.1)
|
Axios has Unrestricted Cloud Metadata Exfiltration via Header Injection Chain | 2026-04-10T19:47:16Z | 2026-04-10T21:37:07Z |
| ghsa-jx2w-vp7f-456q |
6.3 (4.0)
|
quarkus-openapi-generator extension has Zip Slip Path Traversal in ApicurioCodegenWrapper class | 2026-04-08T19:14:32Z | 2026-04-10T21:36:53Z |
| ghsa-9m3c-qcxr-9x87 |
6.1 (3.1)
6.9 (4.0)
|
Apache Tomcat has an Open Redirect vulnerability | 2026-04-09T21:31:29Z | 2026-04-10T21:36:30Z |
| ghsa-xvqc-pp94-fmpx |
5.4 (3.1)
|
Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT vulnerable to Integer Overflow or Wraparound | 2026-04-09T18:31:27Z | 2026-04-10T21:35:56Z |
| ghsa-gcvm-c75m-h4p4 |
7.5 (3.1)
8.7 (4.0)
|
Apache OpenMeetings Uses GET Request Method With Sensitive Query Strings | 2026-04-09T18:31:27Z | 2026-04-10T21:35:15Z |
| ghsa-78cg-fc6c-w44w |
4.3 (3.1)
5.3 (4.0)
|
Apache OpenMeetings has an Improper Handling of Insufficient Privileges vulnerability | 2026-04-09T18:31:26Z | 2026-04-10T21:35:08Z |
| ghsa-wqxq-w68r-wg85 |
7.5 (3.1)
8.7 (4.0)
|
Apache OpenMeetings Uses Hard-coded Cryptographic Key | 2026-04-09T18:31:26Z | 2026-04-10T21:34:59Z |
| ghsa-56p5-8mhr-2fph |
7.5 (3.1)
8.2 (4.0)
|
LiquidJS: Root restriction bypass for partial and layout loading through symlinked templates | 2026-04-08T15:03:47Z | 2026-04-10T21:34:31Z |
| ghsa-mx42-j6wv-px98 |
4.3 (3.1)
5.3 (4.0)
|
RustFS has an authorization bypass in multipart UploadPartCopy enables cross-bucket object exfiltration | 2026-04-08T00:15:50Z | 2026-04-10T21:33:31Z |
| ghsa-3crg-w4f6-42mx |
6.9 (4.0)
|
pypdf: Manipulated XMP metadata entity declarations can exhaust RAM | 2026-04-10T20:59:36Z | 2026-04-10T21:32:54Z |
| ghsa-7m5h-w69j-qggg |
8.1 (3.1)
|
SiYuan: Publish Reader Can Arbitrarily Delete Attribute View Files via `/api/av/removeUnusedAttribu… | 2026-04-10T19:32:07Z | 2026-04-10T21:32:45Z |
| ghsa-m5gr-86j6-99jp |
9.1 (3.1)
|
gramps-webapi: Zip Slip Path Traversal in Media Archive Import | 2026-04-10T21:00:09Z | 2026-04-10T21:32:40Z |
| ghsa-h468-7pvh-8vr8 |
7.5 (3.1)
8.7 (4.0)
|
Apache Tomcat: Padding Oracle vulnerability in EncryptInterceptor | 2026-04-09T21:31:29Z | 2026-04-10T21:32:09Z |
| ghsa-q98v-9f9w-f49q |
6.3 (4.0)
|
The frontend gRPC server's streaming interceptor chain did not include the authorization intercepto… | 2026-04-10T21:31:16Z | 2026-04-10T21:31:16Z |
| ghsa-x87c-g7pw-2xr5 |
5.3 (4.0)
|
GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side request forgery vulner… | 2026-04-10T21:31:15Z | 2026-04-10T21:31:15Z |
| ghsa-v8f7-cg9p-w5jx |
5.3 (4.0)
|
GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side request forgery vulner… | 2026-04-10T21:31:15Z | 2026-04-10T21:31:15Z |
| ghsa-8r9f-h969-mm4m |
6.0 (4.0)
|
When calling base64.b64decode() or related functions the decoding process would stop after encounte… | 2026-04-10T21:31:15Z | 2026-04-10T21:31:15Z |
| ghsa-w59f-v72r-w493 |
8.5 (3.1)
|
A flaw was found in odh-dashboard in Red Hat Openshift AI. This vulnerability in the `odh-dashboard… | 2026-04-10T18:31:20Z | 2026-04-10T21:31:14Z |
| ghsa-r2fc-mm5p-v3mp |
6.5 (3.1)
|
The YITH WooCommerce Wishlist WordPress plugin before 4.13.0 does not properly validate wishlist ow… | 2026-04-10T09:31:15Z | 2026-04-10T21:31:14Z |
| ghsa-j5p3-q3mr-g82w |
7.5 (3.1)
|
Out of bounds read in WebAudio in Google Chrome on Mac prior to 147.0.7727.55 allowed a remote atta… | 2026-04-09T00:32:00Z | 2026-04-10T21:31:14Z |
| ghsa-frp9-cw9x-gf7v |
6.5 (3.1)
|
The YML for Yandex Market WordPress plugin before 5.0.26 is vulnerable to Remote Code Execution via… | 2026-04-10T09:31:15Z | 2026-04-10T21:31:14Z |
| ghsa-2987-f6gf-82vj |
9.8 (3.1)
|
FalkorDB Browser 1.9.3 contains an unauthenticated path traversal vulnerability in the file upload … | 2026-04-10T12:31:44Z | 2026-04-10T21:31:14Z |
| ghsa-q556-g83v-3933 |
6.5 (3.1)
|
Heap buffer overflow in WebAudio in Google Chrome prior to 147.0.7727.55 allowed a remote attacker … | 2026-04-09T00:31:59Z | 2026-04-10T21:31:13Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-231 |
8.1 (3.1)
|
LightGBM Remote Code Execution Vulnerability | lightgbm | 2024-11-12T18:15:28+00:00 | 2025-02-15T07:20:34.246161+00:00 |
| pysec-2024-230 |
7.5 (3.1)
|
Certifi is a curated collection of Root Certificates for validating the trustworthiness o… | certifi | 2024-07-05T19:15:10+00:00 | 2025-02-12T21:21:51.559667+00:00 |
| pysec-2024-229 |
8.8 (3.1)
|
Hugging Face Transformers Trax Model Deserialization of Untrusted Data Remote Code Execut… | transformers | 2024-11-22T22:15:07+00:00 | 2025-02-10T23:22:41.499413+00:00 |
| pysec-2024-228 |
8.8 (3.1)
|
Hugging Face Transformers MaskFormer Model Deserialization of Untrusted Data Remote Code … | transformers | 2024-11-22T22:15:07+00:00 | 2025-02-10T23:22:41.449105+00:00 |
| pysec-2024-227 |
8.8 (3.1)
|
Hugging Face Transformers MobileViTV2 Deserialization of Untrusted Data Remote Code Execu… | transformers | 2024-11-22T22:15:06+00:00 | 2025-02-10T23:22:41.399021+00:00 |
| pysec-2024-226 |
7.8 (3.1)
|
Pymatgen (Python Materials Genomics) is an open-source Python library for materials analy… | pymatgen | 2024-02-21T17:15:09+00:00 | 2025-02-06T00:34:28.734730+00:00 |
| pysec-2024-225 |
7.5 (3.1)
|
cryptography is a package designed to expose cryptographic primitives and recipes to Pyth… | cryptography | 2024-02-21T17:15:09+00:00 | 2025-02-06T00:34:24.427679+00:00 |
| pysec-2024-224 |
7.0 (3.1)
|
Excessive directory permissions in MLflow leads to local privilege escalation when using … | mlflow | 2024-11-25T14:15:06+00:00 | 2025-02-03T16:23:40.409646+00:00 |
| pysec-2024-27 |
9.8 (3.1)
|
CrateDB 5.5.1 is contains an authentication bypass vulnerability in the Admin UI componen… | crate | 2024-01-30T01:15:00Z | 2025-01-30T22:47:57.847403Z |
| pysec-2019-242 |
5.5 (3.1)
|
Capstone 3.0.4 has an out-of-bounds vulnerability (SEGV caused by a read memory access) i… | capstone | 2019-05-15T14:29:00Z | 2025-01-28T17:34:08.578134Z |
| pysec-2025-2 |
|
uniapi version 1.0.7 introduces code that would execute on import of the module and downl… | uniapi | 2025-01-24T19:56:53+00:00 | |
| pysec-2024-223 |
9.1 (3.1)
|
Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds … | onnx | 2024-02-23T18:15:50+00:00 | 2025-01-22T16:23:22.060512+00:00 |
| pysec-2024-222 |
7.5 (3.1)
|
Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Trav… | onnx | 2024-02-23T18:15:50+00:00 | 2025-01-22T16:23:21.994731+00:00 |
| pysec-2024-221 |
5.3 (3.1)
|
aiosmtpd is a reimplementation of the Python stdlib smtpd.py based on asyncio. aiosmtpd i… | aiosmtpd | 2024-03-12T21:15:58+00:00 | 2025-01-22T16:23:18.042465+00:00 |
| pysec-2024-220 |
5.4 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.972580+00:00 |
| pysec-2024-219 |
9.1 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.897787+00:00 |
| pysec-2024-218 |
8.1 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.803143+00:00 |
| pysec-2024-217 |
7.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This is a **data … | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T22:22:23.723816+00:00 |
| pysec-2024-216 |
7.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T22:22:23.549944+00:00 |
| pysec-2024-215 |
9.8 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:11+00:00 | 2025-01-19T22:22:23.471780+00:00 |
| pysec-2024-214 |
5.4 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T22:22:23.399444+00:00 |
| pysec-2024-213 |
6.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T22:22:23.310301+00:00 |
| pysec-2024-212 |
|
Apache Airflow versions before 2.10.1 have a vulnerability that allows DAG authors to add… | apache-airflow | 2024-09-07T08:15:11+00:00 | 2025-01-19T22:22:22.289672+00:00 |
| pysec-2024-211 |
7.5 (3.1)
|
Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote clien… | waitress | 2024-10-29T15:15:12+00:00 | 2025-01-19T19:19:01.852094+00:00 |
| pysec-2024-210 |
4.8 (3.1)
|
Waitress is a Web Server Gateway Interface server for Python 2 and 3. A remote client may… | waitress | 2024-10-29T15:15:11+00:00 | 2025-01-19T19:19:01.811922+00:00 |
| pysec-2024-209 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-19T19:19:01.689044+00:00 |
| pysec-2024-208 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.647736+00:00 |
| pysec-2024-207 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.605918+00:00 |
| pysec-2024-206 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.566553+00:00 |
| pysec-2024-205 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. When using … | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-19T19:19:01.519824+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33799 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.424348Z |
| gsd-2024-33798 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.346901Z |
| gsd-2024-33797 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.530297Z |
| gsd-2024-33796 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.308365Z |
| gsd-2024-33795 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.332784Z |
| gsd-2024-33794 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.557396Z |
| gsd-2024-33793 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.552273Z |
| gsd-2024-33792 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.507383Z |
| gsd-2024-33791 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.488352Z |
| gsd-2024-33790 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.450431Z |
| gsd-2024-33789 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.534336Z |
| gsd-2024-33788 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.591276Z |
| gsd-2024-33787 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.424661Z |
| gsd-2024-33786 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.606155Z |
| gsd-2024-33785 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.387543Z |
| gsd-2024-33784 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.595808Z |
| gsd-2024-33783 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.322051Z |
| gsd-2024-33782 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.322441Z |
| gsd-2024-33781 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.495881Z |
| gsd-2024-33780 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.307884Z |
| gsd-2024-33779 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.507854Z |
| gsd-2024-33778 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.295751Z |
| gsd-2024-33777 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.489805Z |
| gsd-2024-33776 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.587852Z |
| gsd-2024-33775 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.322245Z |
| gsd-2024-33774 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.484899Z |
| gsd-2024-33773 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.560326Z |
| gsd-2024-33772 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.282306Z |
| gsd-2024-33771 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.366201Z |
| gsd-2024-33770 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.514460Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2460 | Malicious code in strapi-plugin-events (npm) | 2026-04-03T11:03:27Z | 2026-04-07T15:47:31Z |
| mal-2026-2458 | Malicious code in strapi-plugin-database (npm) | 2026-04-03T16:11:12Z | 2026-04-07T15:47:31Z |
| mal-2026-2457 | Malicious code in strapi-plugin-cron (npm) | 2026-04-03T16:09:41Z | 2026-04-07T15:47:31Z |
| mal-2026-2456 | Malicious code in strapi-plugin-core (npm) | 2026-04-03T16:11:29Z | 2026-04-07T15:47:31Z |
| mal-2026-2454 | Malicious code in strapi-plugin-config (npm) | 2026-04-03T16:10:23Z | 2026-04-07T15:47:31Z |
| mal-2026-2429 | Malicious code in vv-ftend-core (npm) | 2026-04-02T12:10:43Z | 2026-04-07T14:41:26Z |
| mal-2026-2428 | Malicious code in vv-ftend-api (npm) | 2026-04-02T12:21:07Z | 2026-04-07T14:41:26Z |
| mal-2026-2398 | Malicious code in xrpl-hooks-ide (npm) | 2026-03-24T16:04:59Z | 2026-04-07T14:41:26Z |
| mal-2026-2397 | Malicious code in wraith-module (npm) | 2026-03-24T16:04:43Z | 2026-04-07T14:41:26Z |
| mal-2026-2396 | Malicious code in voodoo-internal-api (npm) | 2026-03-24T16:03:29Z | 2026-04-07T14:41:26Z |
| mal-2026-2500 | Malicious code in totally-safe-util (npm) | 2026-04-06T09:20:39Z | 2026-04-07T14:41:25Z |
| mal-2026-2483 | Malicious code in strapi-plugin-server (npm) | 2026-04-03T16:10:54Z | 2026-04-07T14:41:25Z |
| mal-2026-2418 | Malicious code in tombac-chronos (npm) | 2026-03-24T09:08:22Z | 2026-04-07T14:41:25Z |
| mal-2026-2395 | Malicious code in uuidvalidatorarabis (npm) | 2026-03-24T16:03:12Z | 2026-04-07T14:41:25Z |
| mal-2026-2394 | Malicious code in typescript-mock-data (npm) | 2026-03-24T16:02:29Z | 2026-04-07T14:41:25Z |
| mal-2026-2393 | Malicious code in this-is-my-test-package (npm) | 2026-03-24T16:01:46Z | 2026-04-07T14:41:25Z |
| mal-2026-2392 | Malicious code in stormbreaker-shade (npm) | 2026-03-24T16:00:27Z | 2026-04-07T14:41:25Z |
| mal-2026-2391 | Malicious code in ssr-catalogue-sfcc (npm) | 2026-03-24T16:00:16Z | 2026-04-07T14:41:25Z |
| mal-2026-2390 | Malicious code in ssh-common (npm) | 2026-03-24T16:00:14Z | 2026-04-07T14:41:25Z |
| mal-2026-2389 | Malicious code in spectral-module (npm) | 2026-03-24T16:00:11Z | 2026-04-07T14:41:25Z |
| mal-2026-2388 | Malicious code in spectral-engine (npm) | 2026-03-24T16:00:10Z | 2026-04-07T14:41:25Z |
| mal-2026-2312 | Malicious code in tailwindcss-typeface-inter (npm) | 2026-03-31T14:56:07Z | 2026-04-07T14:41:25Z |
| mal-2026-2445 | Malicious code in pro-express (npm) | 2026-04-02T15:21:37Z | 2026-04-07T14:41:24Z |
| mal-2026-2427 | Malicious code in partner-tracker-api (npm) | 2026-04-02T12:10:47Z | 2026-04-07T14:41:24Z |
| mal-2026-2426 | Malicious code in partner-tracker (npm) | 2026-04-02T12:10:54Z | 2026-04-07T14:41:24Z |
| mal-2026-2387 | Malicious code in securefiles-common (npm) | 2026-03-24T15:59:00Z | 2026-04-07T14:41:24Z |
| mal-2026-2386 | Malicious code in react-native-forter (npm) | 2026-03-24T15:57:26Z | 2026-04-07T14:41:24Z |
| mal-2026-2385 | Malicious code in product-status (npm) | 2026-03-24T15:56:11Z | 2026-04-07T14:41:24Z |
| mal-2026-2384 | Malicious code in piyush_test_vadapav (npm) | 2026-03-24T15:55:29Z | 2026-04-07T14:41:24Z |
| mal-2026-2383 | Malicious code in phantom-module (npm) | 2026-03-24T15:55:16Z | 2026-04-07T14:41:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-3251 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-10-21T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3134 | Linux Kernel: Mehrere Schwachstellen | 2024-10-09T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3050 | Linux Kernel: Mehrere Schwachstellen | 2024-09-29T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-2173 | Linux Kernel: Mehrere Schwachstellen | 2024-09-17T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1721 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-07-28T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1451 | Linux Kernel: Mehrere Schwachstellen | 2024-06-25T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1259 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifischen Angriff | 2024-05-30T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0585 | Grafana: Schwachstelle ermöglicht Privilegieneskalation | 2024-03-07T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0219 | libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-01-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2023-3004 | libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-11-26T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2022-0463 | NGINX: Schwachstelle ermöglicht Denial of Service | 2021-05-25T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0879 | Linux Kernel: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-04-08T22:00:00.000+00:00 |
| wid-sec-w-2026-0982 | OpenBSD: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-04-06T22:00:00.000+00:00 | 2026-04-07T22:00:00.000+00:00 |
| wid-sec-w-2026-0937 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2026-03-31T22:00:00.000+00:00 | 2026-04-06T22:00:00.000+00:00 |
| wid-sec-w-2026-0789 | Roundcube: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-04-06T22:00:00.000+00:00 |
| wid-sec-w-2025-2310 | F5 BIG-IP und F5OS: Mehrere Schwachstellen | 2025-10-15T22:00:00.000+00:00 | 2026-03-31T22:00:00.000+00:00 |
| wid-sec-w-2026-0909 | Tinyproxy: Schwachstelle ermöglicht Denial of Service | 2026-03-29T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0904 | vim: Schwachstelle ermöglicht Codeausführung | 2026-03-29T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0892 | WatchGuard Firebox: Mehrere Schwachstellen | 2026-03-26T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0891 | Dovecot: Mehrere Schwachstellen | 2026-03-26T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0880 | FreeRDP: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0864 | OpenBao: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0825 | strongSwan: Schwachstelle ermöglicht Denial of Service | 2026-03-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0782 | WebKitGTK: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0761 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Denial of Service | 2026-03-17T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0756 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Privilegieneskalation und Offenlegung von Informationen | 2026-03-16T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0744 | ImageMagick: Schwachstelle ermöglicht Denial of Service | 2026-03-16T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0688 | cPanel cPanel/WHM: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0643 | ImageMagick: Mehrere Schwachstellen | 2026-03-09T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0494 | Red Hat Enterprise Linux (389-ds-base): Schwachstelle ermöglicht Codeausführung und potenziell Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-036-01 | TP-Link Systems Inc. VIGI Series IP Camera | 2026-02-05T06:00:00.000000Z | 2026-02-11T06:00:00.000000Z |
| icsma-26-041-01 | ZOLL ePCR IOS Mobile Application | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-04 | AVEVA PI to CONNECT Agent | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-03 | AVEVA PI Data Archive | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-02 | ZLAN Information Technology Co. ZLAN5143D | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-01 | Yokogawa FAST/TOOLS | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-036-06 | Hitachi Energy FOX61x | 2026-01-27T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-05 | Hitachi Energy XMC20 | 2026-01-27T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-04 | Ilevia EVE X1 Server | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-03 | o6 Automation GmbH Open62541 | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-02 | Mitsubishi Electric MELSEC iQ-R Series | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-029-01 | KiloView Encoder Series (Update A) | 2026-01-29T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-25-184-03 | Mitsubishi Electric MELSOFT Update Manager (Update B) | 2025-07-03T06:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-25-184-01 | Hitachi Energy Relion 670/650 and SAM600-IO Series | 2025-06-24T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-25-343-03 | Multiple India-based CCTV Cameras (Update A)** | 2025-12-09T06:00:00.000000Z | 2026-02-05T06:00:00.000000Z |
| icsa-26-034-04 | Synectix LAN 232 TRIO | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-03 | RISS SRL MOMA Seismic Station | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-02 | *Avation Light Engine Pro * | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-01 | Mitsubishi Electric FREQSHIP-mini for Windows | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-310-02 | Ubia Ubox (Update A) | 2025-11-06T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-128-03 | Mitsubishi Electric Multiple FA Products (Update B) | 2025-05-08T06:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-24-345-06 | Rockwell Automation Arena (Update B) | 2024-12-10T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-23-089-01 | Hitachi Energy IEC 61850 MMS-Server (Update B) | 2023-02-14T13:30:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-23-068-05 | Hitachi Energy Relion 670, 650 and SAM600-IO Series | 2023-02-28T13:30:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-112-03 | Schneider Electric Wiser Home Controller WHC-5918A | 2024-07-09T00:00:00.000000Z | 2026-01-30T07:00:00.000000Z |
| icsa-26-029-03 | Rockwell Automation ControlLogix | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-26-029-02 | Rockwell Automation ArmorStart LT | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-205-01 | Mitsubishi Electric CNC Series (Update B) | 2025-07-24T06:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-126-03 | BrightSign Players (Update A) | 2025-05-06T06:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-028-06 | Schneider Electric RemoteConnect and SCADAPack x70 Utilities (Update A) | 2025-01-14T00:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ucs-xss-ey6xhyps | Cisco UCS Manager Software Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-vkvmorv-cnkrv7hk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Open Redirect Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-multi-cmdinj-e4ukjyrz | Cisco UCS Manager Software Command Injection Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-kvmsxss-6h7anuyk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxospc-pim6-vg4jfph | Cisco Nexus 3000 and 9000 Series Switches Protocol Independent Multicast Version 6 Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-infodis-tectysfg | Cisco NX-OS Software Sensitive Log Information Disclosure Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-cmdinj-qhnze5ss | Cisco NX-OS Software Command Injection Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nshs-urapi-gjubvfpu | Cisco Nexus Dashboard and Nexus Dashboard Fabric Controller Unauthorized REST API Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nd-ptrs-xu2fm2wb | Cisco Nexus Dashboard Path Traversal Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-n39k-isis-dos-jhja8rfx | Cisco Nexus 3000 and 9000 Series Switches Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ise-file-upload-qksx6c8g | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:43:01+00:00 |
| cisco-sa-pi-epnm-tet4gxbx | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Sensitive Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-authproxlog-sxczxq63 | Cisco Duo Authentication Proxy Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-20180328-smi2 | Cisco IOS and IOS XE Software Smart Install Remote Code Execution Vulnerability | 2018-03-28T16:00:00+00:00 | 2025-08-20T14:26:26+00:00 |
| cisco-sa-asaftd-ssltls-dos-ehw76vze | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software SSL/TLS Certificate Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-19T16:32:05+00:00 |
| cisco-sa-ftd-ravpn-geobypass-9h38m37z | Cisco Secure Firewall Threat Defense Software Geolocation Remote Access VPN Bypass Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-ftd-dos-svkhtjgt | Cisco Secure Firewall Threat Defense Software Snort 3 Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-xss-jtnmcusp | Cisco Secure Firewall Management Center Software Cross-Site Scripting Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-xpathinj-corthdmb | Cisco Secure Firewall Management Center Software XPATH Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-radius-rce-tnbkf79 | Cisco Secure Firewall Management Center Software RADIUS Remote Code Execution Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-html-inj-mqjrzrny | Cisco Secure Firewall Management Center Software HTML Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-ftd-cmdinj-phe7kmt | Cisco Secure Firewall Management Center and Secure Firewall Threat Defense Software Command Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-hcrlpfyn | Cisco Secure Firewall Management Center Software Command Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-authz-bypass-m7xhnau | Cisco Secure Firewall Management Center Software Authorization Bypass Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpnwebs-dos-hjbhmbsx | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access VPN Web Server Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpn-dos-mfpeka6e | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-nat-dns-dos-bqhynhtm | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Network Address Translation DNS Inspection Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-http-file-huyx2jl4 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Server Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-dhcp-qj7ngs4n | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software DHCP Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-cmdinj-vehfezq3 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Authenticated Command Injection Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-0966 | Libssh: buffer underflow in ssh_get_hexa() on invalid input | 2026-03-02T00:00:00.000Z | 2026-04-02T01:39:33.000Z |
| msrc_cve-2026-0967 | Libssh: libssh: denial of service via inefficient regular expression processing | 2026-03-02T00:00:00.000Z | 2026-04-02T01:39:25.000Z |
| msrc_cve-2026-0965 | Libssh: libssh: denial of service via improper configuration file handling | 2026-03-02T00:00:00.000Z | 2026-04-02T01:39:17.000Z |
| msrc_cve-2026-29111 | systemd: Local unprivileged user can trigger an assert | 2026-03-02T00:00:00.000Z | 2026-04-02T01:38:20.000Z |
| msrc_cve-2026-2739 | This affects versions of the package bn.js before 5.2.3. Calling maskn(0) on any BN instance corrupts the internal state, causing toString(), divmod(), and other methods to enter an infinite loop, hanging the process indefinitely. | 2026-02-02T00:00:00.000Z | 2026-04-02T01:37:20.000Z |
| msrc_cve-2026-33636 | LIBPNG has ARM NEON Palette Expansion Out-of-Bounds Read on AArch64 | 2026-03-02T00:00:00.000Z | 2026-04-02T01:06:35.000Z |
| msrc_cve-2026-33416 | LIBPNG has use-after-free via pointer aliasing in `png_set_tRNS` and `png_set_PLTE` | 2026-03-02T00:00:00.000Z | 2026-04-02T01:05:59.000Z |
| msrc_cve-2026-5121 | Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing | 2026-03-02T00:00:00.000Z | 2026-04-02T01:04:42.000Z |
| msrc_cve-2026-4739 | Integer overflow vulnerabilities in InsightSoftwareConsortium/ITK | 2026-03-02T00:00:00.000Z | 2026-04-02T01:04:10.000Z |
| msrc_cve-2026-4176 | Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from 5.43.0 before 5.43.9 contain a vulnerable version of Compress::Raw::Zlib | 2026-03-02T00:00:00.000Z | 2026-04-02T01:04:04.000Z |
| msrc_cve-2026-4046 | iconv crash due to assertion failure with untrusted input | 2026-03-02T00:00:00.000Z | 2026-04-02T01:01:22.000Z |
| msrc_cve-2026-33896 | Forge has a basicConstraints bypass in its certificate chain verification (RFC 5280 violation) | 2026-03-02T00:00:00.000Z | 2026-04-01T14:37:25.000Z |
| msrc_cve-2026-33891 | Forge has Denial of Service via Infinite Loop in BigInteger.modInverse() with Zero Input | 2026-03-02T00:00:00.000Z | 2026-04-01T14:37:20.000Z |
| msrc_cve-2026-33895 | Forge has signature forgery in Ed25519 due to missing S > L check | 2026-03-02T00:00:00.000Z | 2026-04-01T14:37:15.000Z |
| msrc_cve-2026-4105 | Systemd: systemd: privilege escalation via improper access control in registermachine d-bus method | 2026-03-02T00:00:00.000Z | 2026-04-01T14:36:30.000Z |
| msrc_cve-2024-8354 | Qemu-kvm: usb: assertion failure in usb_ep_get() | 2024-09-01T07:00:00.000Z | 2026-04-01T14:36:00.000Z |
| msrc_cve-2026-21518 | GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability | 2026-02-10T08:00:00.000Z | 2026-04-01T07:00:00.000Z |
| msrc_cve-2025-21370 | Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability | 2025-01-14T00:00:00.000Z | 2026-04-01T07:00:00.000Z |
| msrc_cve-2026-33937 | Handlebars.js has JavaScript Injection via AST Type Confusion | 2026-03-02T00:00:00.000Z | 2026-04-01T01:58:16.000Z |
| msrc_cve-2026-34353 | CVE-2026-34353 | 2026-03-02T00:00:00.000Z | 2026-04-01T01:57:48.000Z |
| msrc_cve-2025-67030 | CVE-2025-67030 | 2026-03-02T00:00:00.000Z | 2026-04-01T01:57:06.000Z |
| msrc_cve-2026-4746 | Heap Buffer Over-Write Vulenrabilty in timeplus-io/proton | 2026-03-02T00:00:00.000Z | 2026-04-01T01:56:21.000Z |
| msrc_cve-2024-41013 | xfs: don't walk off the end of a directory data block | 2024-07-01T07:00:00.000Z | 2026-04-01T01:52:41.000Z |
| msrc_cve-2024-35839 | netfilter: bridge: replace physindev with physinif in nf_bridge_info | 2024-05-02T07:00:00.000Z | 2026-04-01T01:51:56.000Z |
| msrc_cve-2023-52676 | bpf: Guard stack limits against 32bit overflow | 2024-05-02T07:00:00.000Z | 2026-04-01T01:51:22.000Z |
| msrc_cve-2025-68822 | Input: alps - fix use-after-free bugs caused by dev3_register_work | 2026-01-02T00:00:00.000Z | 2026-04-01T01:49:12.000Z |
| msrc_cve-2026-21711 | CVE-2026-21711 | 2026-03-02T00:00:00.000Z | 2026-04-01T01:20:03.000Z |
| msrc_cve-2025-38029 | kasan: avoid sleepable page allocation from atomic context | 2025-06-02T00:00:00.000Z | 2026-03-31T15:19:26.000Z |
| msrc_cve-2025-38064 | virtio: break and reset virtio devices on device_shutdown() | 2025-06-02T00:00:00.000Z | 2026-03-31T15:19:18.000Z |
| msrc_cve-2025-38041 | clk: sunxi-ng: h616: Reparent GPU clock during frequency changes | 2025-06-02T00:00:00.000Z | 2026-03-31T15:19:10.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0398 | Kwetsbaarheid in Cisco AsyncOS | 2025-12-17T19:47:00.346651Z | 2025-12-17T19:47:00.346651Z |
| ncsc-2025-0397 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-12-15T09:08:39.804149Z | 2025-12-15T09:08:39.804149Z |
| ncsc-2025-0396 | Kwetsbaarheden verholpen in Apple macOS | 2025-12-15T09:06:36.450655Z | 2025-12-15T09:06:36.450655Z |
| ncsc-2025-0394 | Kwetsbaarheden verholpen in React Server Components | 2025-12-12T09:04:19.324080Z | 2025-12-12T10:46:34.688189Z |
| ncsc-2025-0395 | Kwetsbaarheden verholpen in SAP Software | 2025-12-12T09:29:08.429888Z | 2025-12-12T09:29:08.429888Z |
| ncsc-2025-0393 | Kwetsbaarheid verholpen in GeoServer | 2025-12-12T08:12:18.831044Z | 2025-12-12T09:02:27.681292Z |
| ncsc-2025-0392 | Kwetsbaarheid verholpen in Barracuda Service Center | 2025-12-11T13:53:23.819008Z | 2025-12-11T13:53:23.819008Z |
| ncsc-2025-0391 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2025-12-11T13:51:55.178462Z | 2025-12-11T13:51:55.178462Z |
| ncsc-2025-0390 | Kwetsbaarheden verholpen in GitLab CE/EE | 2025-12-11T09:22:54.841848Z | 2025-12-11T09:22:54.841848Z |
| ncsc-2025-0389 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-12-10T14:59:57.911864Z | 2025-12-10T14:59:57.911864Z |
| ncsc-2025-0388 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-12-10T13:35:58.314547Z | 2025-12-10T13:35:58.314547Z |
| ncsc-2025-0387 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2025-12-10T13:34:08.908897Z | 2025-12-10T13:34:08.908897Z |
| ncsc-2025-0385 | Kwetsbaarheden verholpen in Microsoft Exchange | 2025-12-09T18:42:32.332749Z | 2025-12-09T18:42:32.332749Z |
| ncsc-2025-0384 | Kwetsbaarheden verholpen in Microsoft Office | 2025-12-09T18:40:33.839342Z | 2025-12-09T18:40:33.839342Z |
| ncsc-2025-0383 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-12-09T18:39:18.152251Z | 2025-12-09T18:39:18.152251Z |
| ncsc-2025-0382 | Kwetsbaarheden verholpen in Siemens producten | 2025-12-09T13:15:05.391966Z | 2025-12-09T13:15:05.391966Z |
| ncsc-2025-0381 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2025-12-08T08:23:21.965599Z | 2025-12-08T08:23:21.965599Z |
| ncsc-2025-0380 | Kwetsbaarheden verholpen in React Server Components | 2025-12-03T20:11:57.728117Z | 2025-12-05T12:13:36.590522Z |
| ncsc-2025-0379 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-12-02T13:25:17.745981Z | 2025-12-02T13:25:17.745981Z |
| ncsc-2025-0378 | Kwetsbaarheden verholpen in Mattermost | 2025-11-28T09:53:42.334621Z | 2025-11-28T09:53:42.334621Z |
| ncsc-2025-0377 | Kwetsbaarheden verholpen in GitLab | 2025-11-27T13:35:09.121804Z | 2025-11-27T13:35:09.121804Z |
| ncsc-2025-0376 | Kwetsbaarheden verholpen in SonicWall Email Security appliances | 2025-11-21T16:06:33.949861Z | 2025-11-21T16:06:33.949861Z |
| ncsc-2025-0375 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2025-11-21T16:06:14.387571Z | 2025-11-21T16:06:14.387571Z |
| ncsc-2025-0334 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2025-10-23T13:42:11.992643Z | 2025-11-21T16:03:18.991100Z |
| ncsc-2025-0374 | Kwetsbaarheden verholpen in Arista EOS | 2025-11-20T11:48:20.126141Z | 2025-11-20T11:48:20.126141Z |
| ncsc-2025-0373 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2025-11-19T08:35:31.999400Z | 2025-11-19T08:35:31.999400Z |
| ncsc-2025-0372 | Kwetsbaarheid verholpen in Fortinet FortiWeb | 2025-11-19T08:34:59.616354Z | 2025-11-19T08:34:59.616354Z |
| ncsc-2025-0371 | Kwetsbaarheden verholpen in Google Chrome | 2025-11-18T09:01:31.984222Z | 2025-11-18T09:01:31.984222Z |
| ncsc-2025-0370 | Kwetsbaarheden verholpen in Cisco Unified Contact Center Express | 2025-11-18T07:04:55.173157Z | 2025-11-18T07:04:55.173157Z |
| ncsc-2025-0369 | Kwetsbaarheden verholpen in IBM AIX | 2025-11-18T07:03:55.766335Z | 2025-11-18T07:03:55.766335Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20431-1 | Security update for python-PyJWT | 2026-03-25T18:07:39Z | 2026-03-25T18:07:39Z |
| opensuse-su-2026:20430-1 | Security update for python-PyPDF2 | 2026-03-25T15:51:00Z | 2026-03-25T15:51:00Z |
| opensuse-su-2026:20429-1 | Security update for python-dynaconf | 2026-03-25T14:59:11Z | 2026-03-25T14:59:11Z |
| opensuse-su-2026:20428-1 | Security update for gimp | 2026-03-25T14:24:42Z | 2026-03-25T14:24:42Z |
| opensuse-su-2026:20421-1 | Security update for python-ldap | 2026-03-25T10:40:32Z | 2026-03-25T10:40:32Z |
| opensuse-su-2026:20420-1 | Security update for ffmpeg-7 | 2026-03-25T10:03:00Z | 2026-03-25T10:03:00Z |
| opensuse-su-2026:20416-1 | Security update for the Linux Kernel | 2026-03-25T08:49:52Z | 2026-03-25T08:49:52Z |
| opensuse-su-2026:20419-1 | Security update for python-pyOpenSSL | 2026-03-25T03:41:43Z | 2026-03-25T03:41:43Z |
| opensuse-su-2026:20418-1 | Security update for python-pyasn1 | 2026-03-25T03:09:48Z | 2026-03-25T03:09:48Z |
| opensuse-su-2026:10432-1 | golang-github-v2fly-v2ray-core-5.47.0-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10431-1 | python311-oci-sdk-2.168.3-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10430-1 | python311-lmdb-2.1.1-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10429-1 | jupyter-jupyterlab-templates-0.5.2-4.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10428-1 | python311-jupyter-ydoc-3.4.0-2.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10427-1 | jupyter-matplotlib-0.11.7-17.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10426-1 | python311-intake-2.0.9-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10425-1 | python311-cbor2-5.9.0-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10424-1 | jupyter-bqplot-jupyterlab-0.5.46-14.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10423-1 | nginx-1.29.7-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10422-1 | libtpms-devel-0.10.2-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10421-1 | kea-3.0.3-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10420-1 | amazon-cloudwatch-agent-1.300064.0-2.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:20417-1 | Security update for python-black | 2026-03-24T19:40:55Z | 2026-03-24T19:40:55Z |
| opensuse-su-2026:20415-1 | Security update for 389-ds | 2026-03-24T17:50:31Z | 2026-03-24T17:50:31Z |
| opensuse-su-2026:20414-1 | Security update for tomcat11 | 2026-03-24T16:07:26Z | 2026-03-24T16:07:26Z |
| opensuse-su-2026:20413-1 | Security update for nghttp2 | 2026-03-24T12:30:27Z | 2026-03-24T12:30:27Z |
| opensuse-su-2026:20422-1 | Security update for chromium | 2026-03-24T07:22:02Z | 2026-03-24T07:22:02Z |
| opensuse-su-2026:20412-1 | Security update for salt | 2026-03-24T06:24:23Z | 2026-03-24T06:24:23Z |
| opensuse-su-2026:10419-1 | rclone-1.73.3-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10418-1 | python311-jsonpath-ng-1.8.0-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:3906 | Red Hat Security Advisory: OpenShift Container Platform 4.18.35 security and extras update | 2026-03-11T03:54:55+00:00 | 2026-04-12T14:08:12+00:00 |
| rhsa-2026:3905 | Red Hat Security Advisory: OpenShift Container Platform 4.18.35 bug fix and security update | 2026-03-11T04:27:58+00:00 | 2026-04-12T14:08:12+00:00 |
| rhsa-2026:3898 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-05T14:35:19+00:00 | 2026-04-12T14:08:12+00:00 |
| rhsa-2026:3864 | Red Hat Security Advisory: delve security update | 2026-03-05T11:35:47+00:00 | 2026-04-12T14:08:12+00:00 |
| rhsa-2026:3884 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.19.2 security update | 2026-03-05T12:07:11+00:00 | 2026-04-12T14:08:11+00:00 |
| rhsa-2026:3880 | Red Hat Security Advisory: grafana security update | 2026-03-05T12:20:43+00:00 | 2026-04-12T14:08:11+00:00 |
| rhsa-2026:3836 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:03:15+00:00 | 2026-04-12T14:08:11+00:00 |
| rhsa-2026:3879 | Red Hat Security Advisory: grafana security update | 2026-03-05T12:15:12+00:00 | 2026-04-12T14:08:10+00:00 |
| rhsa-2026:3875 | Red Hat Security Advisory: OpenShift Container Platform 4.18.35 packages and security update | 2026-03-11T05:09:45+00:00 | 2026-04-12T14:08:10+00:00 |
| rhsa-2026:3874 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.18.4 security update | 2026-03-05T11:31:22+00:00 | 2026-04-12T14:08:09+00:00 |
| rhsa-2026:3869 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.17.5 security update | 2026-03-05T11:15:16+00:00 | 2026-04-12T14:08:09+00:00 |
| rhsa-2026:3856 | Red Hat Security Advisory: OpenShift Container Platform 4.20.16 security and extras update | 2026-03-11T03:54:47+00:00 | 2026-04-12T14:08:08+00:00 |
| rhsa-2026:3855 | Red Hat Security Advisory: OpenShift Container Platform 4.20.16 bug fix and security update | 2026-03-11T04:54:31+00:00 | 2026-04-12T14:08:08+00:00 |
| rhsa-2026:3854 | Red Hat Security Advisory: grafana security update | 2026-03-05T11:07:41+00:00 | 2026-04-12T14:08:08+00:00 |
| rhsa-2026:3843 | Red Hat Security Advisory: delve security update | 2026-03-05T09:56:17+00:00 | 2026-04-12T14:08:07+00:00 |
| rhsa-2026:3841 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:37:53+00:00 | 2026-04-12T14:08:07+00:00 |
| rhsa-2026:3840 | Red Hat Security Advisory: image-builder security update | 2026-03-05T09:44:51+00:00 | 2026-04-12T14:08:07+00:00 |
| rhsa-2026:3839 | Red Hat Security Advisory: image-builder security update | 2026-03-05T10:11:47+00:00 | 2026-04-12T14:08:06+00:00 |
| rhsa-2026:3838 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:44:33+00:00 | 2026-04-12T14:08:06+00:00 |
| rhsa-2026:3835 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:01:36+00:00 | 2026-04-12T14:08:05+00:00 |
| rhsa-2026:3833 | Red Hat Security Advisory: grafana security update | 2026-03-05T08:23:57+00:00 | 2026-04-12T14:08:05+00:00 |
| rhsa-2026:3821 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:51:55+00:00 | 2026-04-12T14:08:05+00:00 |
| rhsa-2026:3831 | Red Hat Security Advisory: grafana security update | 2026-03-05T07:55:46+00:00 | 2026-04-12T14:08:04+00:00 |
| rhsa-2026:3822 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:53:01+00:00 | 2026-04-12T14:08:04+00:00 |
| rhsa-2026:3820 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:19:06+00:00 | 2026-04-12T14:08:03+00:00 |
| rhsa-2026:3818 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:11:00+00:00 | 2026-04-12T14:08:03+00:00 |
| rhsa-2026:3817 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:25:53+00:00 | 2026-04-12T14:08:03+00:00 |
| rhsa-2026:3816 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T05:42:24+00:00 | 2026-04-12T14:08:03+00:00 |
| rhsa-2026:3815 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T05:32:24+00:00 | 2026-04-12T14:08:03+00:00 |
| rhsa-2026:3814 | Red Hat Security Advisory: go-rpm-macros security update | 2026-03-05T11:07:45+00:00 | 2026-04-12T14:08:02+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2023-283-01 | SpaceLogic C-Bus Toolkit | 2023-10-10T12:00:34.000Z | 2023-10-10T12:00:34.000Z |
| sevd-2023-255-01 | IGSS (Interactive Graphical SCADA System) | 2023-09-12T10:52:23.000Z | 2023-09-12T10:52:23.000Z |
| sevd-2023-220-01 | Pro-face GP-Pro EX | 2023-08-08T06:32:38.000Z | 2023-08-08T06:32:38.000Z |
| sevd-2023-192-01 | StruxureWare Data Center Expert | 2023-07-11T07:37:38.000Z | 2023-07-11T07:37:38.000Z |
| sevd-2023-192-03 | Accutech Manager | 2023-07-11T06:49:15.000Z | 2023-07-11T06:49:15.000Z |
| sevd-2023-164-03 | Foxboro SCADA | 2023-06-13T12:34:32.000Z | 2023-06-13T12:34:32.000Z |
| sevd-2023-164-02 | IGSS (Interactive Graphical SCADA System) | 2023-06-13T11:43:59.000Z | 2023-06-13T11:43:59.000Z |
| sevd-2023-164-04 | EcoStruxureTM Foxboro DCS Control Core Services | 2023-06-13T09:20:49.000Z | 2023-06-13T09:20:49.000Z |
| sevd-2023-164-01 | EcoStruxure™ Operator Terminal Expert and Pro-face BLUE | 2023-06-13T09:08:30.000Z | 2023-06-13T09:08:30.000Z |
| sevd-2023-129-01 | OPC Factory Server | 2023-05-09T16:33:38.000Z | 2023-05-09T16:33:38.000Z |
| sevd-2023-129-03 | PowerLogic ION7400 / PM8000 / ION9000 Power Meters | 2023-05-09T16:02:26.000Z | 2023-05-09T16:02:26.000Z |
| sevd-2023-129-02 | EcoStruxure™ Power SCADA Operation | 2023-05-09T11:52:40.000Z | 2023-05-09T11:52:40.000Z |
| sevd-2023-129-04 | Power SCADA Anywhere | 2023-05-09T08:00:55.000Z | 2023-05-09T08:00:55.000Z |
| sevd-2021-217-01 | NicheStack TCP/IP Vulnerabilities (INFRA:HALT) in Lexium ILE, ILA, ILS, and Communication Option Boards for Altivar and Lexium32 drives | 2021-08-05T06:29:08.000Z | 2023-05-09T06:29:00.000Z |
| sevd-2023-101-06 | Easergy Builder | 2023-04-11T14:20:02.000Z | 2023-04-11T14:20:02.000Z |
| sevd-2023-101-02 | Conext™ Gateway/ InsightHome and InsightFacility | 2023-04-11T14:01:38.000Z | 2023-04-11T14:01:38.000Z |
| sevd-2022-087-01 | SCADAPack Workbench | 2022-03-28T13:51:11.000Z | 2023-04-11T13:51:11.000Z |
| sevd-2022-011-06 | CODESYS V3 Runtime, Development System, and Gateway Vulnerabilities | 2022-01-11T07:08:13.000Z | 2023-04-11T11:30:00.000Z |
| sevd-2020-315-07 | PLC Simulator on EcoStruxure™ Control Expert and Process Expert | 2020-11-10T15:07:11.000Z | 2023-03-14T15:07:11.000Z |
| sevd-2023-073-04 | IGSS (Interactive Graphical SCADA System) | 2023-03-14T10:58:24.000Z | 2023-03-14T10:58:24.000Z |
| sevd-2023-073-02 | PowerLogic™ HDPM6000 | 2023-03-14T09:26:56.000Z | 2023-03-14T09:26:56.000Z |
| sevd-2023-010-02 | EcoStruxure Geo SCADA Expert | 2023-01-10T16:24:00.000Z | 2023-03-13T18:30:00.000Z |
| sevd-2022-165-01 | IGSS (Interactive Graphical SCADA System) | 2022-06-14T18:30:00.000Z | 2023-03-13T18:30:00.000Z |
| sevd-2021-257-02 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Premium and Associated Communication Modules | 2021-09-14T20:04:00.000Z | 2023-02-14T20:04:43.000Z |
| sevd-2020-315-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-11-10T12:05:04.000Z | 2023-02-14T12:05:00.000Z |
| sevd-2023-045-02 | StruxureWare Data Center Expert | 2023-02-14T08:05:19.000Z | 2023-02-14T08:05:19.000Z |
| sevd-2023-045-03 | Merten KNX devices | 2023-02-14T07:24:05.000Z | 2023-02-14T07:24:05.000Z |
| sevd-2022-312-01 | NetBotz 4 - 355/450/455/550/570 | 2022-11-08T06:53:24.000Z | 2023-02-14T06:30:00.000Z |
| sevd-2023-045-01 | EcoStruxureTM Geo SCADA Expert | 2023-02-14T06:02:05.000Z | 2023-02-14T06:02:05.000Z |
| sevd-2022-347-01 | APC Easy UPS Online Monitoring Software | 2022-12-13T06:09:04.000Z | 2023-01-11T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-770902 | SSA-770902: Denial of Service Vulnerability in the Web Server of RUGGEDCOM ROS Devices | 2023-08-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-769791 | SSA-769791: Local Arbitrary Code Execution Vulnerability in COMOS Before V10.6 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-767615 | SSA-767615: Information Disclosure Vulnerability in SIPROTEC 5 Devices | 2025-02-11T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-764417 | SSA-764417: Weak Encryption Vulnerability in RUGGEDCOM ROS Devices | 2022-03-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-674084 | SSA-674084: File Parsing Vulnerabilities in Simcenter Femap Before V2506 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-665108 | SSA-665108: Arbitrary File Upload Vulnerability in RUGGEDCOM ROX II | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-529291 | SSA-529291: Information Disclosure Vulnerabilities in SICAM Q100/Q200 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-517338 | SSA-517338: Multiple Vulnerabilities in SINEC Traffic Analyzer Before V3.0 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-493787 | SSA-493787: Arbitrary Code Execution Vulnerability in SIMATIC RTLS Locating Manager Before V3.2 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-460466 | SSA-460466: Denial of Service Vulnerability in TIA Project-Server and TIA Portal | 2025-07-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-446307 | SSA-446307: Authentication Bypass Vulnerability in BMC (CVE-2024-54085) affects SIMATIC IPC RS-828A | 2025-05-13T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-400089 | SSA-400089: Denial of Service Vulnerability in SIPROTEC 4 and SIPROTEC 4 Compact | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-398330 | SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP >= V3.1.0 and < V3.1.5 | 2023-12-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-382999 | SSA-382999: Multiple Vulnerabilities in Opcenter Quality Before V2506 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-353002 | SSA-353002: Multiple Vulnerabilities in SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family | 2024-03-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-256353 | SSA-256353: Third-Party Component Vulnerabilities in RUGGEDCOM ROS | 2022-03-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-177847 | SSA-177847: Improper VNC Password Check Vulnerability in SINUMERIK Controllers | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-170375 | SSA-170375: Multiple Vulnerabilities in RUGGEDCOM ROS Before V5.9 | 2024-07-09T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-097435 | SSA-097435: Usernames Disclosure Vulnerability in Mendix Runtime | 2024-09-10T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-094954 | SSA-094954: Authentication Bypass Vulnerability in BIST mode of RUGGEDCOM ROX II | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-725549 | SSA-725549: Denial of Service of ICMP in Industrial Devices | 2025-04-08T00:00:00Z | 2025-07-21T00:00:00Z |
| ssa-183963 | SSA-183963: Certificate Validation Vulnerabilities in SICAM TOOLBOX II Before V07.11 | 2025-07-08T00:00:00Z | 2025-07-18T00:00:00Z |
| ssa-938066 | SSA-938066: Remote Code Execution Vulnerability in SENTRON Powermanager and Desigo CC | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-904646 | SSA-904646: Sensitive Data Exposure Vulnerability in SIPROTEC 5 Devices | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-763427 | SSA-763427: Authentication Bypass Vulnerability in SIMATIC CP and TIM Devices | 2015-11-27T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-634640 | SSA-634640: Weak Authentication Vulnerability in Siemens Industrial Edge Devices | 2025-04-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-627195 | SSA-627195: Zip Path Traversal Vulnerability in Mendix Studio Pro's Module Installation Process | 2025-06-12T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-626991 | SSA-626991: Denial of Service Vulnerability in SIMATIC CN 4100 before V4.0 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-593272 | SSA-593272: SegmentSmack in Interniche IP-Stack based Industrial Devices | 2020-04-14T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-573669 | SSA-573669: Multiple Vulnerabilities in TIA Administrator Before V3.0.6 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1107-1 | Security update for python312 | 2026-03-27T09:04:01Z | 2026-03-27T09:04:01Z |
| suse-su-2026:1102-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T08:05:21Z | 2026-03-27T08:05:21Z |
| suse-su-2026:1105-1 | Security update for containerd | 2026-03-27T07:03:20Z | 2026-03-27T07:03:20Z |
| suse-su-2026:1099-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T04:33:50Z | 2026-03-27T04:33:50Z |
| suse-su-2026:1096-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T04:04:40Z | 2026-03-27T04:04:40Z |
| suse-su-2026:1101-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T01:33:43Z | 2026-03-27T01:33:43Z |
| suse-su-2026:1100-1 | Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise 15 SP6) | 2026-03-26T23:08:12Z | 2026-03-26T23:08:12Z |
| suse-su-2026:1098-1 | Security update for cosign | 2026-03-26T21:23:31Z | 2026-03-26T21:23:31Z |
| suse-su-2026:1094-1 | Security update for python-deepdiff | 2026-03-26T17:56:23Z | 2026-03-26T17:56:23Z |
| suse-su-2026:1093-1 | Security update for xen | 2026-03-26T17:52:21Z | 2026-03-26T17:52:21Z |
| suse-su-2026:1092-1 | Security update for xen | 2026-03-26T17:51:51Z | 2026-03-26T17:51:51Z |
| suse-su-2026:1091-1 | Security update for kea | 2026-03-26T17:48:22Z | 2026-03-26T17:48:22Z |
| suse-su-2026:1090-1 | Security update for python3 | 2026-03-26T17:45:14Z | 2026-03-26T17:45:14Z |
| suse-su-2026:1089-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6) | 2026-03-26T17:34:58Z | 2026-03-26T17:34:58Z |
| suse-su-2026:1088-1 | Security update for the Linux Kernel (Live Patch 67 for SUSE Linux Enterprise 12 SP5) | 2026-03-26T17:03:58Z | 2026-03-26T17:03:58Z |
| suse-su-2026:20948-1 | Security update for net-tools | 2026-03-26T15:12:29Z | 2026-03-26T15:12:29Z |
| suse-su-2026:20940-1 | Security update for net-tools | 2026-03-26T15:12:29Z | 2026-03-26T15:12:29Z |
| suse-su-2026:1083-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6) | 2026-03-26T15:03:57Z | 2026-03-26T15:03:57Z |
| suse-su-2026:1081-1 | Security update for the Linux Kernel | 2026-03-26T13:23:51Z | 2026-03-26T13:23:51Z |
| suse-su-2026:1078-1 | Security update for the Linux Kernel | 2026-03-26T12:43:07Z | 2026-03-26T12:43:07Z |
| suse-su-2026:1077-1 | Security update for the Linux Kernel | 2026-03-26T12:42:31Z | 2026-03-26T12:42:31Z |
| suse-su-2026:1076-1 | Security update for python-pyasn1 | 2026-03-26T12:42:05Z | 2026-03-26T12:42:05Z |
| suse-su-2026:1075-1 | Security update for python-pyasn1 | 2026-03-26T12:41:27Z | 2026-03-26T12:41:27Z |
| suse-su-2026:1074-1 | Security update for nghttp2 | 2026-03-26T12:39:53Z | 2026-03-26T12:39:53Z |
| suse-su-2026:1073-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6) | 2026-03-26T12:33:43Z | 2026-03-26T12:33:43Z |
| suse-su-2026:1068-1 | Security update for pgvector | 2026-03-26T10:39:31Z | 2026-03-26T10:39:31Z |
| suse-su-2026:1067-1 | Security update for python-urllib3 | 2026-03-26T10:39:06Z | 2026-03-26T10:39:06Z |
| suse-su-2026:1066-1 | Security update for ruby2.5 | 2026-03-26T10:38:44Z | 2026-03-26T10:38:44Z |
| suse-su-2026:1065-1 | Security update for sqlite3 | 2026-03-26T10:38:26Z | 2026-03-26T10:38:26Z |
| suse-su-2026:1064-1 | Security update for python-tornado6 | 2026-03-26T10:37:23Z | 2026-03-26T10:37:23Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:3443 | Important: valkey security update | 2026-02-26T00:00:00Z | 2026-03-05T07:52:10Z |
| alsa-2026:3476 | Important: udisks2 security update | 2026-03-02T00:00:00Z | 2026-03-05T07:49:03Z |
| alsa-2026:3517 | Important: thunderbird security update | 2026-03-02T00:00:00Z | 2026-03-05T07:45:44Z |
| alsa-2026:3515 | Important: thunderbird security update | 2026-03-02T00:00:00Z | 2026-03-04T11:54:18Z |
| alsa-2026:3669 | Important: go-rpm-macros security update | 2026-03-03T00:00:00Z | 2026-03-04T11:09:35Z |
| alsa-2026:3668 | Important: go-rpm-macros security update | 2026-03-03T00:00:00Z | 2026-03-04T11:06:04Z |
| alsa-2026:3638 | Moderate: nginx:1.24 security update | 2026-03-03T00:00:00Z | 2026-03-04T10:33:37Z |
| alsa-2026:3488 | Moderate: kernel security update | 2026-03-02T00:00:00Z | 2026-03-04T10:30:56Z |
| alsa-2026:3507 | Important: valkey security update | 2026-03-02T00:00:00Z | 2026-03-04T10:26:29Z |
| alsa-2026:3516 | Important: thunderbird security update | 2026-03-02T00:00:00Z | 2026-03-04T10:23:48Z |
| alsa-2026:3551 | Important: libpng security update | 2026-03-02T00:00:00Z | 2026-03-04T10:21:19Z |
| alsa-2026:3463 | Moderate: kernel-rt security update | 2026-03-02T00:00:00Z | 2026-03-03T15:13:38Z |
| alsa-2026:3464 | Moderate: kernel security update | 2026-03-02T00:00:00Z | 2026-03-03T15:09:58Z |
| alsa-2026:3428 | Important: container-tools:rhel8 security update | 2026-02-26T00:00:00Z | 2026-03-02T15:20:08Z |
| alsa-2026:3407 | Important: mingw-fontconfig security update | 2026-02-26T00:00:00Z | 2026-03-02T15:16:03Z |
| alsa-2026:3477 | Moderate: gnutls security update | 2026-03-02T00:00:00Z | 2026-03-02T13:35:48Z |
| alsa-2026:3405 | Important: libpng security update | 2026-02-26T00:00:00Z | 2026-03-02T13:11:42Z |
| alsa-2026:3275 | Moderate: kernel security update | 2026-02-25T00:00:00Z | 2026-03-02T13:07:09Z |
| alsa-2026:3341 | Important: containernetworking-plugins security update | 2026-02-25T00:00:00Z | 2026-03-02T12:59:54Z |
| alsa-2026:3340 | Important: skopeo security update | 2026-02-25T00:00:00Z | 2026-03-02T12:57:45Z |
| alsa-2026:3338 | Important: firefox security update | 2026-02-25T00:00:00Z | 2026-03-02T12:54:29Z |
| alsa-2026:3336 | Important: podman security update | 2026-02-25T00:00:00Z | 2026-02-26T13:31:46Z |
| alsa-2026:3343 | Important: skopeo security update | 2026-02-25T00:00:00Z | 2026-02-26T13:30:14Z |
| alsa-2026:3354 | Important: python-pyasn1 security update | 2026-02-25T00:00:00Z | 2026-02-26T13:28:33Z |
| alsa-2026:3031 | Important: libpng15 security update | 2026-02-23T00:00:00Z | 2026-02-26T10:52:26Z |
| alsa-2026:3033 | Important: munge security update | 2026-02-23T00:00:00Z | 2026-02-26T10:51:19Z |
| alsa-2026:3034 | Important: munge security update | 2026-02-23T00:00:00Z | 2026-02-26T10:49:31Z |
| alsa-2026:3035 | Important: grafana-pcp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:48:18Z |
| alsa-2026:3066 | Moderate: kernel security update | 2026-02-23T00:00:00Z | 2026-02-26T10:43:00Z |
| alsa-2026:3067 | Important: freerdp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:36:11Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2026-308 | Heap-buffer-overflow in vcardstructured_new_from_string | 2026-02-25T00:19:49.963815Z | 2026-02-25T00:19:49.964188Z |
| osv-2026-307 | Global-buffer-overflow in navcom_parse | 2026-02-25T00:16:23.864362Z | 2026-02-25T00:16:23.864694Z |
| osv-2026-304 | Heap-use-after-free in tf::Executor::_invoke | 2026-02-25T00:09:10.290694Z | 2026-02-25T00:09:10.291030Z |
| osv-2026-300 | UNKNOWN WRITE in nmeaid_to_prn | 2026-02-25T00:06:00.225480Z | 2026-02-25T00:06:00.225972Z |
| osv-2026-297 | Security exception in org.apache.poi.util.IOUtils.safelyAllocate | 2026-02-24T00:02:29.789817Z | 2026-02-24T00:02:29.790144Z |
| osv-2026-292 | UNKNOWN WRITE in <wasmtime::runtime::func::Func>::call_unchecked_raw::< | 2026-02-23T00:19:15.717984Z | 2026-02-23T00:19:15.718280Z |
| osv-2026-272 | Heap-use-after-free in vcardproperty_get_value | 2026-02-21T00:20:10.455944Z | 2026-02-21T00:20:10.456357Z |
| osv-2022-1165 | Heap-buffer-overflow in parse_content_length | 2022-11-12T13:00:05.964113Z | 2026-02-19T14:11:05.455361Z |
| osv-2026-261 | Segv on unknown address in ___interceptor_strtol | 2026-02-19T00:09:21.893775Z | 2026-02-19T00:09:21.894076Z |
| osv-2026-259 | Use-of-uninitialized-value in tsip_parse_input | 2026-02-18T00:14:29.378028Z | 2026-02-18T00:14:29.378341Z |
| osv-2023-819 | Heap-buffer-overflow in ucl_object_dtor_unref_single | 2023-09-09T14:01:07.368928Z | 2026-02-17T14:21:16.973749Z |
| osv-2023-78 | Heap-buffer-overflow in ucl_object_dtor_unref_single | 2023-02-18T13:01:01.445224Z | 2026-02-17T14:21:11.808505Z |
| osv-2021-1261 | UNKNOWN READ in kh_get_ucl_hash_node | 2021-09-15T00:00:41.384284Z | 2026-02-17T14:15:50.348749Z |
| osv-2026-255 | UNKNOWN WRITE in nmeaid_to_prn | 2026-02-17T00:17:19.574579Z | 2026-02-17T00:17:19.574905Z |
| osv-2026-244 | Use-of-uninitialized-value in ihevcd_fmt_conv | 2026-02-15T00:03:36.246033Z | 2026-02-15T00:03:36.246568Z |
| osv-2026-242 | Use-of-uninitialized-value in ntrip_parse_url | 2026-02-14T00:17:42.945923Z | 2026-02-14T00:17:42.946299Z |
| osv-2026-240 | Use-of-uninitialized-value in packet_get1 | 2026-02-14T00:09:50.559032Z | 2026-02-14T00:09:50.559326Z |
| osv-2025-219 | Heap-buffer-overflow in opj_j2k_read_tile_header | 2025-03-18T00:18:30.566980Z | 2026-02-11T14:21:43.026699Z |
| osv-2022-725 | Heap-buffer-overflow in jxl::N_EMU128::WriteToU8Stage::ProcessRow | 2022-08-18T00:01:05.918943Z | 2026-02-11T14:11:54.187880Z |
| osv-2022-608 | Heap-use-after-free in jxl::WriteToPixelCallbackStage::ProcessRow | 2022-07-21T00:01:50.967627Z | 2026-02-11T14:11:11.571040Z |
| osv-2026-216 | Heap-buffer-overflow in mg_mqtt_next_prop | 2026-02-10T00:08:51.349946Z | 2026-02-11T14:08:38.238200Z |
| osv-2026-229 | Segv on unknown address in aiAnimation::~aiAnimation | 2026-02-11T00:12:18.313233Z | 2026-02-11T00:12:18.313574Z |
| osv-2026-226 | UNKNOWN WRITE in decode_xa2_00 | 2026-02-11T00:10:08.757600Z | 2026-02-11T00:10:08.757920Z |
| osv-2026-215 | UNKNOWN READ in getTypeCacheHashTableBucket | 2026-02-10T00:07:25.477890Z | 2026-02-10T00:07:25.478286Z |
| osv-2026-212 | UNKNOWN READ in gpsd_poll | 2026-02-09T00:15:09.775765Z | 2026-02-09T00:15:09.776491Z |
| osv-2022-519 | Stack-buffer-overflow in LookupThousands | 2022-06-29T00:00:24.107785Z | 2026-02-08T14:10:55.777894Z |
| osv-2022-462 | Stack-buffer-overflow in strcat | 2022-06-07T00:01:47.521548Z | 2026-02-08T14:10:42.909724Z |
| osv-2021-802 | Stack-buffer-overflow in InterpretCondition | 2021-05-27T00:00:31.797718Z | 2026-02-08T14:08:02.526845Z |
| osv-2021-1110 | Stack-buffer-overflow in TranslateWord2 | 2021-08-08T00:02:17.026887Z | 2026-02-08T14:07:47.971880Z |
| osv-2026-209 | Use-of-uninitialized-value in ntrip_parse_url | 2026-02-08T00:06:08.137216Z | 2026-02-08T00:06:08.137699Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0038 | RustSec Advisory | 2026-03-08T12:00:00Z | 2026-03-11T06:21:51Z |
| rustsec-2026-0035 | Cache poisoning via insecure-by-default cache key | 2026-03-04T12:00:00Z | 2026-03-09T20:53:55Z |
| rustsec-2026-0034 | HTTP Request Smuggling via HTTP/1.0 and Transfer-Encoding Misparsing | 2026-03-04T12:00:00Z | 2026-03-09T20:53:55Z |
| rustsec-2026-0033 | HTTP Request Smuggling via Premature Upgrade | 2026-03-04T12:00:00Z | 2026-03-09T20:53:55Z |
| rustsec-2025-0140 | Non-utf8 String can be created with `TimeBuf::as_str` | 2025-12-29T12:00:00Z | 2026-03-04T07:42:48Z |
| rustsec-2026-0029 | Double-free and use-after-free for Hive | 2026-02-26T12:00:00Z | 2026-03-01T06:01:36Z |
| rustsec-2025-0153 | hexchat crate is unsound and unmaintained | 2025-11-17T12:00:00Z | 2026-02-26T06:11:28Z |
| rustsec-2026-0026 | Unnecessary clamping of seed reduces seed entropy to 251 bits | 2026-02-05T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0025 | Panic in `libcrux-psq` on decryption of malformed AES-GCM ciphertext | 2026-02-08T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0024 | Incorrect X25519 clamping check rejects all secrets on import | 2026-01-26T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0023 | X25519 secret validation did not check buffer length or clamping | 2026-01-26T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0022 | Panic when dropping a `[Typed]Func::call_async` future | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0021 | Panic adding excessive fields to a `wasi:http/types.fields` instance | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0020 | Guest-controlled resource exhaustion in WASI implementations | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0013 | Type confusion when accessing data from sublasses of subclasses of native types with `abi3` feature targeting Python 3.12 and up | 2026-02-18T12:00:00Z | 2026-02-23T07:15:28Z |
| rustsec-2026-0012 | Unsoundness in opt-in ARMv8 assembly backend for `keccak` | 2026-02-12T12:00:00Z | 2026-02-20T04:00:15Z |
| rustsec-2025-0142 | Segmentation fault and invalid memory read in `mnl::cb_run` | 2025-10-18T12:00:00Z | 2026-02-10T13:23:41Z |
| rustsec-2025-0149 | World Writable Directory in /var/log/below Allows Local Privilege Escalation | 2025-03-12T12:00:00Z | 2026-02-08T07:26:28Z |
| rustsec-2026-0009 | Denial of Service via Stack Exhaustion | 2026-02-05T12:00:00Z | 2026-02-06T09:12:16Z |
| rustsec-2026-0008 | Potential undefined behavior when dereferencing Buf struct | 2026-02-02T12:00:00Z | 2026-02-05T06:08:13Z |
| rustsec-2026-0007 | Integer overflow in `BytesMut::reserve` | 2026-02-03T12:00:00Z | 2026-02-04T06:56:11Z |
| rustsec-2026-0006 | Wasmtime segfault or unused out-of-sandbox load with `f64.copysign` operator on x86-64 | 2026-01-26T12:00:00Z | 2026-01-30T05:41:11Z |
| rustsec-2025-0143 | Unsound APIs of public `constant::Reader` and `StructSchema` | 2025-12-24T12:00:00Z | 2026-01-29T05:56:50Z |
| rustsec-2025-0144 | Timing side-channel in ML-DSA decomposition | 2025-12-12T12:00:00Z | 2026-01-27T22:28:37Z |
| rustsec-2024-0436 | paste - no longer maintained | 2024-10-07T12:00:00Z | 2026-01-27T21:51:15Z |
| rustsec-2026-0005 | Potential use-after-free in `oneshot` when used asynchronously | 2026-01-25T12:00:00Z | 2026-01-27T05:50:51Z |
| rustsec-2026-0004 | Triton VM Soundness Vulnerability due to Improper Sampling of Randomness | 2026-01-21T12:00:00Z | 2026-01-23T05:50:29Z |
| rustsec-2021-0155 | Use After Free in lucet-runtime | 2021-11-30T12:00:00Z | 2026-01-17T19:50:19Z |
| rustsec-2025-0111 | `tokio-tar` parses PAX extended headers incorrectly, allows file smuggling | 2025-10-21T12:00:00Z | 2026-01-17T07:44:05Z |
| rustsec-2025-0141 | Bincode is unmaintained | 2025-12-16T12:00:00Z | 2026-01-16T11:04:42Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-parse-2026-33538 | Parse Server: Denial of service via unindexed database query for unconfigured auth providers | 2026-03-27T07:14:39.195Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33527 | Parse Server: Session update endpoint allows overwriting server-generated session fields | 2026-03-27T07:14:36.431Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33508 | Parse Server: LiveQuery subscription query depth bypass | 2026-03-27T07:14:33.818Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33498 | Parse Server: Query condition depth bypass via pre-validation transform pipeline | 2026-03-27T07:14:30.964Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33429 | Parse Server: Protected field change detection oracle via LiveQuery watch parameter | 2026-03-27T07:14:28.266Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33421 | Parse Server: LiveQuery bypasses CLP pointer permission enforcement | 2026-03-27T07:14:25.801Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33409 | Parse Server: Auth provider validation bypass on login via partial authData | 2026-03-27T07:14:23.276Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33323 | Parse Server: Email verification resend page leaks user existence | 2026-03-27T07:14:20.379Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-32647 | NGINX ngx_http_mp4_module vulnerability | 2026-03-27T07:10:16.616Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-28755 | NGINX ngx_stream_ssl_module vulnerability | 2026-03-27T07:10:13.976Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-28753 | NGINX ngx_mail_proxy_module vulnerability | 2026-03-27T07:10:10.953Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-27784 | NGINX ngx_http_mp4_module vulnerability | 2026-03-27T07:10:08.052Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-27654 | NGINX ngx_http_dav_module vulnerability | 2026-03-27T07:10:05.293Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-27651 | NGINX ngx_mail_auth_http_module vulnerability | 2026-03-27T07:10:02.387Z | 2026-03-27T07:40:55.991Z |
| bit-minio-2026-33419 | MinIO: LDAP login brute-force via user enumeration and missing rate limit | 2026-03-27T07:08:02.540Z | 2026-03-27T07:40:55.991Z |
| bit-minio-2026-33322 | MinIO: JWT Algorithm Confusion in OIDC Authentication | 2026-03-27T07:07:59.802Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33428 | Discourse Allows Unauthorized Access to Deleted Posts Index via Group Membership | 2026-03-27T07:11:24.928Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33427 | Discourse Authorization Page Displays Unvalidated Redirect Domain | 2026-03-27T07:11:21.636Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33426 | Discourse users can edit or synonymize hidden tags they can't see | 2026-03-27T07:11:18.684Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33425 | Discourse has inferable private group membership or existence via exclude_groups parameter | 2026-03-27T07:11:15.979Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33424 | PM access granted through invites after access revocation | 2026-03-27T07:11:13.161Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33423 | Discourse staff can modify any user's group notification level | 2026-03-27T07:11:10.696Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33422 | Discourse exposes ip_address of flagged user | 2026-03-27T07:11:08.096Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33411 | Discourse's solved topic stream has potential stored XSS in topic title | 2026-03-27T07:11:05.061Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33410 | Discourse hardens chat DM channel creation and expansion | 2026-03-27T07:11:02.112Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33408 | Discourse has Improper Authorization in "Post Edits" Report For Moderators | 2026-03-27T07:10:59.380Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33395 | Discourse has stored click‑based XSS via Graphviz SVG javascript: links | 2026-03-27T07:10:56.479Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33394 | Discourse leaks PM post edits to moderators | 2026-03-27T07:10:53.768Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33393 | Discourse fixes loose hostname matching in spam host allowlist | 2026-03-27T07:10:50.748Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33355 | Discourse filters whisper posts from private-posts feed | 2026-03-27T07:10:48.005Z | 2026-03-27T07:40:55.991Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-cv29689 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2025-62820, CVE-2026-25793, CVE-2026-30836 applied in versions: 0.10.2-r0, 0.9.10-r0, 0.9.9-r0, 0.9.9-r1 | 2026-04-01T09:24:13.195625Z | 2026-03-24T13:01:13Z |
| cleanstart-2026-ni04192 | Security fixes for CVE-2025-61729, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-fv92-fjc5-jj9h, ghsa-p77j-4mvh-x3m3 applied in versions: 3.6.16-r0, 3.6.18-r0, 3.6.18-r1, 3.6.18-r2, 3.7.4-r0 | 2026-04-01T09:24:43.327769Z | 2026-03-24T12:54:01Z |
| cleanstart-2026-mk10646 | Security fixes for CVE-2025-61729, CVE-2026-25679, CVE-2026-25934, CVE-2026-27139, CVE-2026-27142, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-9h8m-3fm2-qjrq, ghsa-fv92-fjc5-jj9h, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x applied in versions: 3.6.16-r0, 3.7.4-r0, 3.7.9-r0, 3.7.9-r1 | 2026-04-01T09:24:40.606937Z | 2026-03-24T12:53:01Z |
| cleanstart-2026-pz85180 | Security fixes for CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, ghsa-9h8m-3fm2-qjrq, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x applied in versions: 3.7.8-r2, 3.7.8-r3 | 2026-04-01T09:25:09.013456Z | 2026-03-24T12:47:42Z |
| cleanstart-2026-cp95927 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 1.28.1-r0, 1.28.1-r1 | 2026-04-01T09:25:12.106009Z | 2026-03-24T12:00:17Z |
| cleanstart-2026-ci66802 | Security fixes for CVE-2015-2104, CVE-2020-8908, CVE-2021-21295, CVE-2021-21409, CVE-2021-37136, CVE-2022-1471, CVE-2022-41881, CVE-2023-27043, CVE-2023-2976, CVE-2023-34462, CVE-2023-6378, CVE-2024-12254, CVE-2024-12718, CVE-2024-12798, CVE-2024-12801, CVE-2024-27137, CVE-2024-6232, CVE-2024-6923, CVE-2024-9287, CVE-2025-0938, CVE-2025-23015, CVE-2025-4138, CVE-2025-4330, CVE-2025-4516, CVE-2025-4517, CVE-2026-1225, ghsa-25qh-j22f-pwp8, ghsa-3mc7-4q67-w48m, ghsa-5mg8-w23w-74h3, ghsa-6v67-2wr5-gvf4, ghsa-72hv-8253-57qq, ghsa-7g45-4rm6-3mm3, ghsa-98wm-3w3q-mw94, ghsa-9w3m-gqgf-c4p9, ghsa-c4r9-r8fh-9vj2, ghsa-hhhw-99gj-p3c3, ghsa-mjmj-j48q-9wg2, ghsa-pr98-23f8-jwxv, ghsa-qqpg-mvqg-649v, ghsa-vmq6-5m68-f53m, ghsa-w37g-rhq8-7m4j applied in versions: 4.0.17-r1, 4.0.19-r2, 4.0.19-r3, 4.1.9-r0 | 2026-04-01T09:27:07.387904Z | 2026-03-24T10:05:19Z |
| cleanstart-2026-km27583 | Security fixes for CVE-2015-2104, CVE-2023-27043, CVE-2024-12254, CVE-2024-12718, CVE-2024-12798, CVE-2024-12801, CVE-2024-27137, CVE-2024-6232, CVE-2024-6923, CVE-2024-9287, CVE-2025-0938, CVE-2025-23015, CVE-2025-4138, CVE-2025-4330, CVE-2025-4516, CVE-2025-4517, CVE-2025-58057, CVE-2026-1225, ghsa-25qh-j22f-pwp8, ghsa-3p8m-j85q-pgmj, ghsa-5mg8-w23w-74h3, ghsa-6v67-2wr5-gvf4, ghsa-72hv-8253-57qq, ghsa-7g45-4rm6-3mm3, ghsa-pr98-23f8-jwxv, ghsa-qqpg-mvqg-649v applied in versions: 4.0.17-r1, 4.1.9-r0, 5.0.6-r1, 5.0.6-r2 | 2026-04-01T09:26:50.907320Z | 2026-03-24T09:56:29Z |
| cleanstart-2026-db61851 | Security fixes for CVE-2024-10005, CVE-2024-10006, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24051, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.8.11-r0, 1.8.11-r1, 1.8.11-r2, 1.8.11-r3, 1.9.4-r0 | 2026-04-01T09:26:58.691080Z | 2026-03-24T08:56:04Z |
| cleanstart-2026-jj09127 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-33186 applied in versions: 0.28.7-r1, 0.29.0-r0, 0.30.0-r0 | 2026-04-01T09:26:20.691727Z | 2026-03-24T04:58:10Z |
| cleanstart-2026-id24148 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-33186 applied in versions: 0.28.7-r1, 0.29.0-r0, 0.30.0-r0 | 2026-04-01T09:27:05.843609Z | 2026-03-24T04:58:10Z |
| cleanstart-2026-hk06185 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-47914, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p84v-gxvw-73pf applied in versions: 3.7.0-r0, 3.7.3-r0, 3.7.4-r0, 3.7.6-r0, 3.7.9-r0, 3.7.9-r1, 3.7.9-r2, 4.0.2-r0 | 2026-04-01T09:27:48.241920Z | 2026-03-24T04:58:10Z |
| cleanstart-2026-ka15295 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.7.0-r0, 3.7.0.-r1 | 2026-04-01T09:27:33.488765Z | 2026-03-23T14:26:32Z |
| cleanstart-2026-am88528 | Security fixes for CVE-2025-15558, CVE-2025-61729, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-fv92-fjc5-jj9h, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3 applied in versions: 3.6.16-r0, 3.6.18-r0, 3.6.19-r0, 3.6.19-r1, 3.6.19-r2, 3.6.19-r3, 3.7.4-r0 | 2026-04-01T09:27:52.956018Z | 2026-03-23T14:25:49Z |
| cleanstart-2026-mz18595 | Security fixes for CVE-2025-61730, CVE-2025-61732, CVE-2026-27139, CVE-2026-27142 applied in versions: 3.4.0-r7 | 2026-04-01T09:27:48.953742Z | 2026-03-23T14:24:01Z |
| cleanstart-2026-cu52059 | Security fixes for CVE-2025-61728, CVE-2025-61730, CVE-2026-24051, CVE-2026-27139, CVE-2026-27142, ghsa-9h8m-3fm2-qjrq applied in versions: 3.3.0-r7, 3.5.0-r0 | 2026-04-01T09:27:57.960712Z | 2026-03-23T14:23:15Z |
| cleanstart-2026-nn77774 | Security fixes for CVE-2026-33186, ghsa-p77j-4mvh-x3m3 applied in versions: 2.4.0-r0 | 2026-04-01T09:28:03.910369Z | 2026-03-23T12:37:31Z |
| cleanstart-2026-dv49099 | Security fixes for CVE-2025-64756, CVE-2025-69873, CVE-2026-1525, CVE-2026-1526, CVE-2026-1527, CVE-2026-1528, CVE-2026-2229, CVE-2026-2327, CVE-2026-23745, CVE-2026-2391, CVE-2026-24842, CVE-2026-25128, CVE-2026-25547, CVE-2026-2581, CVE-2026-25896, CVE-2026-26278, CVE-2026-26960, CVE-2026-27601, CVE-2026-27903, CVE-2026-27904, CVE-2026-27942, CVE-2026-28292, CVE-2026-29786, CVE-2026-31802, CVE-2026-32141, CVE-2026-33036, ghsa-23c5-xmqv-rm74, ghsa-25h7-pfq9-p65f, ghsa-2g4f-4pwh-qvx6, ghsa-2mjp-6q6p-2qxm, ghsa-34x7-hfp2-rc4v, ghsa-37qj-frw5-hhjh, ghsa-38c4-r59v-3vqw, ghsa-3ppc-4f35-3m26, ghsa-4992-7rv2-5pvq, ghsa-5j98-mcp5-4vw2, ghsa-73rr-hh4g-fpgx, ghsa-7h2j-956f-4vf2, ghsa-7r86-cg39-jmmj, ghsa-83g3-92jg-28cx, ghsa-8gc5-j5rx-235r, ghsa-8qq5-rm4j-mr97, ghsa-8wc6-vgrq-x6cf, ghsa-9ppj-qmqm-q256, ghsa-f269-vfmq-vjvj, ghsa-fj3w-jwp8-x2g3, ghsa-jmr7-xgp7-cmfj, ghsa-m7jm-9gc2-mpf2, ghsa-phc3-fgpg-7m6h, ghsa-qffp-2rhf-9h96, ghsa-qpx9-hpmf-5gmw, ghsa-r275-fr43-pm7q, ghsa-r6q2-hw4h-h46w, ghsa-v9p9-hfj2-hcw8, ghsa-vrm6-8vpv-qv8q, ghsa-w7fw-mjwx-w883 applied in versions: 43.4.4-r0 | 2026-04-01T09:31:16.419730Z | 2026-03-23T10:49:42Z |
| cleanstart-2026-gy92571 | Security fixes for ghsa-22h5-pq3x-2gf2, ghsa-33mh-2634-fwr2, ghsa-4cx2-fc23-5wg6, ghsa-6xw4-3v39-52mm, ghsa-72hv-8253-57qq, ghsa-72qj-48g4-5xgx, ghsa-c2f4-jgmc-q2r5, ghsa-gh9q-2xrm-x6qv, ghsa-j4pr-3wm6-xx2r, ghsa-mhwm-jh88-3gjf, ghsa-mr3q-g2mv-mr4q, ghsa-p543-xpfm-54cp, ghsa-vc5p-v9hr-52mj, ghsa-vqg5-3255-v292, ghsa-w9pc-fmgc-vxvw, ghsa-wpv5-97wm-hp9c applied in versions: 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-04-01T09:28:54.070298Z | 2026-03-23T10:27:15Z |
| cleanstart-2026-ez47382 | Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2025-66564, CVE-2026-22703, CVE-2026-22772, CVE-2026-23831, CVE-2026-23991, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2x5j-vhc8-9cwm, ghsa-59jp-pj84-45mr, ghsa-6m8w-jc87-6cr7, ghsa-jqc5-w2xx-5vq4, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-vvgc-356p-c3xw applied in versions: 1.14.4-r1, 1.14.4-r2, 1.16.3-r3, 1.16.3-r4 | 2026-04-01T09:28:49.379705Z | 2026-03-23T08:59:19Z |
| cleanstart-2026-ds86833 | Security fixes for CVE-2025-11143, CVE-2026-1605, ghsa-72hv-8253-57qq, ghsa-cphf-4846-3xx9 applied in versions: 0.50.0-r0, 0.50.1-r0 | 2026-04-01T09:28:26.952828Z | 2026-03-23T08:16:08Z |
| cleanstart-2026-gm79879 | Security fixes for CVE-2025-11143, CVE-2025-68161, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.49.1-r0 | 2026-04-01T09:28:51.825289Z | 2026-03-23T08:12:03Z |
| cleanstart-2026-dc73689 | Security fixes for CVE-2025-11143, CVE-2025-67735, CVE-2025-68161, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.48.0-r1 | 2026-04-01T09:29:13.129218Z | 2026-03-23T08:05:00Z |
| cleanstart-2026-ia43044 | Security fixes for CVE-2020-8908, CVE-2022-42889, CVE-2023-2976, CVE-2024-25710, CVE-2024-26308, CVE-2024-29371, CVE-2024-29857, CVE-2024-30171, CVE-2024-31573, CVE-2024-47554, CVE-2025-11143, CVE-2025-12383, CVE-2025-48734, CVE-2025-48924, CVE-2025-58057, CVE-2025-67735, CVE-2025-68161, CVE-2025-8916, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.47.0-r2, 0.47.0-r3 | 2026-04-01T09:30:15.088429Z | 2026-03-23T07:56:09Z |
| cleanstart-2026-pi36812 | Security fixes for CVE-2026-33186, ghsa-6v2p-p943-phr9, ghsa-c6gw-w398-hv78, ghsa-f6x5-jh6r-wrfv, ghsa-hcg3-p754-cr77, ghsa-j5w8-q4qc-rx2x, ghsa-qxp5-gw88-xv66, ghsa-v778-237x-gjrc, ghsa-vvgc-356p-c3xw applied in versions: 1.15.0-r1, 1.19.0-r0 | 2026-04-01T09:29:23.569974Z | 2026-03-23T07:52:18Z |
| cleanstart-2026-as59691 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-31837, CVE-2026-31838, ghsa-9h8m-3fm2-qjrq applied in versions: 1.28.3-r0 | 2026-04-01T09:29:30.943219Z | 2026-03-23T07:49:41Z |
| cleanstart-2026-fr61696 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.17.0-r0 | 2026-04-01T09:29:33.599999Z | 2026-03-23T07:49:32Z |
| cleanstart-2026-pw47027 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.29.0-r0 | 2026-04-01T09:30:02.510665Z | 2026-03-23T07:47:56Z |
| cleanstart-2026-jw59894 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.28.4-r0 | 2026-04-01T09:30:04.839715Z | 2026-03-23T07:47:23Z |
| cleanstart-2026-ld14062 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.27.4-r0, 1.27.4-r1, 1.27.7-r0 | 2026-04-01T09:30:12.003312Z | 2026-03-23T07:46:39Z |
| cleanstart-2026-gm81143 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-8r3f-844c-mc37 applied in versions: 1.7.0-r0, 1.7.0-r1 | 2026-04-01T09:30:33.612618Z | 2026-03-23T07:45:53Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-ale-017 | Multiples vulnérabilités dans Microsoft Exchange | 2021-08-27T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2022-ALE-003 | [MàJ] Vulnérabilité dans l'implémentation du protocole RPC par Microsoft | 2022-04-13T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2022-ALE-001 | [MaJ] Vulnérabilité dans Microsoft Windows | 2022-01-12T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-022 | [MaJ] Vulnérabilité dans Apache Log4j | 2021-12-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-021 | Vulnérabilité dans Microsoft Exchange | 2021-11-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-019 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-09-08T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-017 | Multiples vulnérabilités dans Microsoft Exchange | 2021-08-27T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| CERTFR-2021-ALE-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| certfr-2021-ale-004 | [MàJ] Multiples vulnérabilités dans Microsoft Exchange Server | 2021-03-03T00:00:00.000000 | 2021-07-16T00:00:00.000000 |
| CERTFR-2021-ALE-004 | [MàJ] Multiples vulnérabilités dans Microsoft Exchange Server | 2021-03-03T00:00:00.000000 | 2021-07-16T00:00:00.000000 |
| certfr-2021-ale-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| CERTFR-2021-ALE-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| certfr-2021-ale-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| CERTFR-2021-ALE-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| certfr-2021-ale-007 | [MàJ] Vulnérabilité dans Pulse Connect Secure | 2021-04-20T00:00:00.000000 | 2021-06-21T00:00:00.000000 |
| CERTFR-2021-ALE-007 | [MàJ] Vulnérabilité dans Pulse Connect Secure | 2021-04-20T00:00:00.000000 | 2021-06-21T00:00:00.000000 |
| certfr-2021-ale-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0307 | Vulnérabilité dans les produits Microsoft | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0306 | Multiples vulnérabilités dans Redmine | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0305 | Multiples vulnérabilités dans Spring AI | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0304 | Multiples vulnérabilités dans Xen | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0303 | Vulnérabilité dans Microsoft Edge | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0302 | Multiples vulnérabilités dans Python | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0301 | Multiples vulnérabilités dans les produits Kaspersky | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0176 | Vulnérabilité dans Mattermost Server | 2026-02-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0173 | Multiples vulnérabilités dans les produits Mattermost | 2026-02-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0052 | Multiples vulnérabilités dans Mattermost Server | 2026-01-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0299 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0298 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0297 | Vulnérabilité dans Google Chrome | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0296 | Vulnérabilité dans OpenSSL | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0295 | Vulnérabilité dans les produits Microsoft | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0294 | Vulnérabilité dans Microsoft Office | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0293 | Vulnérabilité dans Microsoft Edge | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0292 | Multiples vulnérabilités dans les produits IBM | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0291 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0290 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0289 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0288 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0287 | Multiples vulnérabilités dans les produits NetApp | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0286 | Multiples vulnérabilités dans Google Chrome | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0285 | Vulnérabilité dans Python | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0284 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0283 | Vulnérabilité dans Microsoft Edge | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0282 | Multiples vulnérabilités dans Veeam Backup & Replication | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0281 | Multiples vulnérabilités dans les produits Splunk | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0280 | Multiples vulnérabilités dans les produits Apple | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000102 | CLUSTERPRO X and EXPRESSCLUSTER X vulnerable to OS command injection | 2025-11-07T14:55+09:00 | 2025-11-07T14:55+09:00 |
| jvndb-2025-000101 | GROWI vulnerable to stored cross-site scripting | 2025-11-06T13:45+09:00 | 2025-11-06T13:45+09:00 |
| jvndb-2024-013260 | Multiple vulnerabilities in Edgecross Basic Software for Windows | 2024-11-22T10:59+09:00 | 2025-11-04T16:41+09:00 |
| jvndb-2025-017972 | Multiple vulnerabilities in Century Systems FutureNet MA and IP-K series | 2025-11-04T16:37+09:00 | 2025-11-04T16:37+09:00 |
| jvndb-2025-000100 | Multiple Roboticsware products register Windows services with unquoted file paths | 2025-11-04T14:17+09:00 | 2025-11-04T14:17+09:00 |
| jvndb-2025-000098 | Optical Disc Archive Software (for Windows) registers a Windows service with an unquoted file path | 2025-11-04T13:51+09:00 | 2025-11-04T13:51+09:00 |
| jvndb-2025-000099 | Progress Flowmon vulnerable to authenticated OS command injection | 2025-11-04T12:47+09:00 | 2025-11-04T12:47+09:00 |
| jvndb-2025-000096 | Installer of WTW EAGLE (for Windows) may insecurely load Dynamic Link Libraries | 2025-10-29T14:17+09:00 | 2025-10-29T14:17+09:00 |
| jvndb-2025-000095 | MZK-DP300N uses hard-coded credentials | 2025-10-28T14:04+09:00 | 2025-10-28T14:04+09:00 |
| jvndb-2025-014793 | NIHON KOHDEN Central Monitor CNS-6201 vulnerable to NULL pointer dereference | 2025-10-01T11:35+09:00 | 2025-10-27T12:28+09:00 |
| jvndb-2025-000093 | Multiple stored cross-site scripting vulnerabilities in Pleasanter | 2025-10-24T15:11+09:00 | 2025-10-24T15:11+09:00 |
| jvndb-2025-000084 | GROWI vulnerable to cross-site scripting | 2025-10-22T15:44+09:00 | 2025-10-22T15:44+09:00 |
| jvndb-2025-000090 | Multiple stored cross-site scripting vulnerabilities in Movable Type | 2025-10-22T13:54+09:00 | 2025-10-22T13:54+09:00 |
| jvndb-2025-000088 | Lanscope Endpoint Manager (On-Premises) vulnerable to improper verification of source of a communication channel | 2025-10-20T16:17+09:00 | 2025-10-22T10:06+09:00 |
| jvndb-2025-000092 | ETERNUS SF vulnerable to incorrect default permissions | 2025-10-20T14:20+09:00 | 2025-10-20T14:20+09:00 |
| jvndb-2025-000089 | Installer of AutoDownloader may insecurely load Dynamic Link Libraries | 2025-10-17T13:38+09:00 | 2025-10-17T13:38+09:00 |
| jvndb-2025-000074 | Multiple vulnerabilities in desknet's NEO | 2025-10-16T17:30+09:00 | 2025-10-16T17:30+09:00 |
| jvndb-2025-000076 | Multiple vulnerabilities in ChatLuck | 2025-10-16T17:17+09:00 | 2025-10-16T17:17+09:00 |
| jvndb-2025-000087 | Ruijie Networks RG-EST300 undocumented SSH functionality | 2025-10-16T14:19+09:00 | 2025-10-16T14:19+09:00 |
| jvndb-2025-016124 | Buffalo Wi-Fi router WXR9300BE6P series vulnerable to path traversal | 2025-10-16T11:16+09:00 | 2025-10-16T11:16+09:00 |
| jvndb-2025-000085 | Multiple RSUPPORT products may insecurely load Dynamic Link Libraries | 2025-10-15T15:55+09:00 | 2025-10-15T15:55+09:00 |
| jvndb-2025-000086 | Phoenix Contact CHARX SEC-3xxx vulnerable to code injection | 2025-10-15T15:54+09:00 | 2025-10-15T15:54+09:00 |
| jvndb-2025-000083 | BUFFALO NAS Navigator2 registers a Windows service with an unquoted file path | 2025-10-10T13:56+09:00 | 2025-10-10T13:56+09:00 |
| jvndb-2025-015451 | Multiple vulnerabilities in FUJI Electric V-SFT | 2025-10-09T13:39+09:00 | 2025-10-09T13:39+09:00 |
| jvndb-2025-000081 | DataSpider Servista improper restriction of XML external entity references | 2025-09-29T14:44+09:00 | 2025-10-07T16:54+09:00 |
| jvndb-2025-000082 | The installers of DENSO TEN drive recorder viewer may insecurely load Dynamic Link Libraries | 2025-10-06T15:38+09:00 | 2025-10-06T15:38+09:00 |
| jvndb-2025-015061 | Trend Micro Antivirus for Mac vulnerable to Local Privilege Escalation | 2025-10-06T13:52+09:00 | 2025-10-06T13:52+09:00 |
| jvndb-2025-000044 | Denial-of-service (DoS) vulnerabilities in multiple Apache products | 2025-06-26T14:41+09:00 | 2025-10-01T14:18+09:00 |
| jvndb-2025-014642 | Multiple vulnerabilities in Canon Printer Drivers for Production Printers, Office/Small Office Multifunction Printers and Laser Printers | 2025-09-30T11:50+09:00 | 2025-09-30T11:50+09:00 |
| jvndb-2025-000066 | Improper file access permission settings in multiple i-FILTER products | 2025-08-27T19:50+09:00 | 2025-09-29T13:45+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-15380 | Huawei HarmonyOS证书管理模块路径遍历漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15379 | Huawei HarmonyOS维测模块条件竞争漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15378 | Huawei HarmonyOS蓝牙字符越界读漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15377 | Huawei HarmonyOS权限管理服务条件竞争漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15376 | Huawei HarmonyOS安全控件条件竞争漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15375 | Huawei HarmonyOS扫描模块访问未初始化指针漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15252 | ZTE ZXMP M721私钥泄露漏洞 | 2025-10-31 | 2026-03-27 |
| cnvd-2026-15170 | Adobe Commerce授权问题漏洞(CNVD-2026-15170) | 2026-03-17 | 2026-03-27 |
| cnvd-2026-15169 | Adobe Commerce授权问题漏洞(CNVD-2026-15169) | 2026-03-17 | 2026-03-27 |
| cnvd-2026-15168 | Adobe Commerce授权问题漏洞(CNVD-2026-15168) | 2026-03-17 | 2026-03-27 |
| cnvd-2026-15159 | Apache Airflow信息泄露漏洞(CNVD-2026-15159) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15158 | Apache Airflow信息泄露漏洞(CNVD-2026-15158) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15157 | Apache Airflow安全绕过漏洞(CNVD-2026-15157) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15156 | Apache Airflow信息泄露漏洞(CNVD-2026-15156) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15154 | HCL AION安全绕过漏洞 | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15153 | HCL AION存在未明漏洞(CNVD-2026-15153) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15152 | OpenClaw拒绝服务漏洞(CNVD-2026-15152) | 2026-03-26 | 2026-03-27 |
| cnvd-2026-15151 | HCL AION存在未明漏洞(CNVD-2026-15151) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15150 | HCL AION存在未明漏洞(CNVD-2026-15150) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15149 | HCL AION存在未明漏洞(CNVD-2026-15149) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15148 | HCL AION存在未明漏洞(CNVD-2026-15148) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15147 | HCL AION存在未明漏洞(CNVD-2026-15147) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15146 | HCL AION SQL注入漏洞(CNVD-2026-15146) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15145 | HCL AION信息泄露漏洞(CNVD-2026-15145) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15251 | ZTE MF258K Pro配置缺陷漏洞 | 2026-01-19 | 2026-03-26 |
| cnvd-2026-15061 | OpenClaw操作系统命令注入漏洞 | 2026-03-24 | 2026-03-26 |
| cnvd-2026-15060 | OpenClaw操作系统命令注入漏洞(CNVD-2026-15060) | 2026-03-24 | 2026-03-26 |
| cnvd-2026-15059 | OpenClaw操作系统命令注入漏洞(CNVD-2026-15059) | 2026-03-24 | 2026-03-26 |
| cnvd-2026-15058 | OpenClaw命令注入漏洞(CNVD-2026-15058) | 2026-03-26 | 2026-03-26 |
| cnvd-2026-15057 | OpenClaw加密问题漏洞(CNVD-2026-15057) | 2026-03-26 | 2026-03-26 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15748 | Уязвимость драйвера net/usb/asix_devices.c ядра операционной системы Linux, позволяющая н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15746 | Уязвимость компонента net/netlink/af_netlink.c ядра операционной системы Linux, позволяющ… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15745 | Уязвимость компонента fs/smb/client/smb2ops.c ядра операционной системы Linux, позволяюща… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15744 | Уязвимость компонента sound/usb/validate.c ядра операционной системы Linux, позволяющая н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15743 | Уязвимость компонента netfilter ядра операционной системы Linux, позволяющая нарушителю п… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15741 | Уязвимость драйвера ppp ядра операционной системы Linux, позволяющая нарушителю вызвать о… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15740 | Уязвимость компонента drm/amd/display ядра операционной системы Linux, позволяющая наруши… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15739 | Уязвимость функции qla4xxx_get_ep_fwdb() драйвера qla4xxx ядра операционной системы Linux… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15733 | Уязвимость компонента trace ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15732 | Уязвимость компонента comedi/drivers/pcl726.c ядра операционной системы Linux, позволяюща… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15731 | Уязвимость драйвера comedi ядра операционной системы Linux, позволяющая нарушителю вызват… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15730 | Уязвимость модуля smb ядра операционной системы Linux, позволяющая нарушителю вызвать отк… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15729 | Уязвимость компонента amdgpu_dm.c ядра операционной системы Linux, позволяющая нарушителю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15728 | Уязвимость компонента s390/char/sclp.c ядра операционной системы Linux, позволяющая наруш… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15724 | Уязвимость компонента NFS ядра операционной системы Linux, позволяющая нарушителю вызвать… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15717 | Уязвимость драйвера acpi/pfr_update.c ядра операционной системы Linux, позволяющая наруши… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15716 | Уязвимость компонента net/ipv6/seg6_hmac.c ядра операционной системы Linux, позволяющая н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15715 | Уязвимость компонента net/hsr/hsr_slave.c ядра операционной системы Linux, позволяющая на… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15714 | Уязвимость компонента drm/amdkfd ядра операционной системы Linux, позволяющая нарушителю … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15713 | Уязвимость компонента qcom/venus/hfi_venus.c ядра операционной системы Linux, позволяющая… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15712 | Уязвимость драйвера rainshadow-cec ядра операционной системы Linux, позволяющая нарушител… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15711 | Уязвимость компонента iio/imu/bno055/bno055.c ядра операционной системы Linux, позволяюща… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15708 | Уязвимость компонента drivers/tty/serial/8250 ядра операционной системы Linux, позволяюща… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15706 | Уязвимость функции nfs_fh_to_dentry() компонента fs/nfs/export.c ядра операционной систем… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15705 | Уязвимость компонента fs/f2fs ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15704 | Уязвимость функции __kmemleak_do_cleanup() компонента mm/kmemleak.c ядра операционной сис… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15703 | Уязвимость компонента fs/btrfs ядра операционной системы Linux, позволяющая нарушителю на… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15702 | Уязвимость компонента fs/jfs ядра операционной системы Linux, позволяющая нарушителю полу… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15701 | Уязвимость функции rcu_preempt_deferred_qs_handler() компонента kernel/rcu/tree_plugin.h … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15696 | Уязвимость компонента net/sched ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202010-1511 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T22:14:35.686000Z |
| var-201912-1854 | An issue existed in the drawing of web page elements. The issue was addressed with improv… | 2024-07-23T22:14:33.774000Z |
| var-200511-0019 | The Internet Key Exchange version 1 (IKEv1) implementation in Check Point products allows… | 2024-07-23T22:14:03.297000Z |
| var-201008-0270 | The WDB target agent debug service in Wind River VxWorks 6.x, 5.x, and earlier, as used o… | 2024-07-23T22:14:01.941000Z |
| var-200904-0819 | Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.… | 2024-07-23T22:12:51.678000Z |
| var-201711-0446 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T22:12:50.009000Z |
| var-201912-0506 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:12:49.908000Z |
| var-200609-0311 | Heap-based buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote at… | 2024-07-23T22:12:46.615000Z |
| var-201905-1248 | Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some m… | 2024-07-23T22:12:08.666000Z |
| var-202007-1133 | Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an … | 2024-07-23T22:12:07.961000Z |
| var-201009-0230 | bgpd in Quagga before 0.99.17 does not properly parse AS paths, which allows remote attac… | 2024-07-23T22:12:06.629000Z |
| var-201806-1488 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T22:12:00.711000Z |
| var-201405-0244 | The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEA… | 2024-07-23T22:12:00.239000Z |
| var-200611-0368 | The (1) Password Manager in Mozilla Firefox 2.0, and 1.5.0.8 and earlier; and the (2) Pas… | 2024-07-23T22:11:59.300000Z |
| var-201806-1436 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T22:11:27.007000Z |
| var-201702-0879 | An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari … | 2024-07-23T22:10:32.463000Z |
| var-200703-0010 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted at… | 2024-07-23T22:10:30.778000Z |
| var-201902-0855 | png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_im… | 2024-07-23T22:10:27.196000Z |
| var-202010-1294 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T22:10:25.978000Z |
| var-201506-0038 | Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to exe… | 2024-07-23T22:10:25.193000Z |
| var-200805-0585 | OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the… | 2024-07-23T22:10:24.233000Z |
| var-202012-1547 | A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel thr… | 2024-07-23T22:10:23.557000Z |
| var-201302-0236 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:10:22.448000Z |
| var-202004-2191 | In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untru… | 2024-07-23T22:10:21.285000Z |
| var-201904-0742 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:10:15.079000Z |
| var-200608-0030 | Unspecified vulnerability in the "compression state handling" in Bom for Apple Mac OS X 1… | 2024-07-23T22:10:15.377000Z |
| var-201912-0608 | A memory corruption issue was addressed with improved input validation. This issue is fix… | 2024-07-23T22:09:37.183000Z |
| var-200505-0162 | Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based … | 2024-07-23T22:09:05.800000Z |
| var-202003-1771 | A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-pro… | 2024-07-23T22:09:01.387000Z |
| var-201506-0465 | The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.… | 2024-07-23T22:08:28.995000Z |