Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-35670 |
6 (4.0)
5.9 (3.1)
|
OpenClaw < 2026.3.22 - Webhook Reply Rebinding via Use… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:28.524Z | 2026-04-10T16:03:28.524Z |
| CVE-2026-35669 |
8.7 (4.0)
8.8 (3.1)
|
OpenClaw < 2026.3.25 - Privilege Escalation via Gatewa… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:27.834Z | 2026-04-10T16:03:27.834Z |
| CVE-2026-35668 |
7.1 (4.0)
7.7 (3.1)
|
OpenClaw < 2026.3.24 - Sandbox Media Root Bypass via U… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:27.149Z | 2026-04-10T18:27:23.337Z |
| CVE-2026-35667 |
6.9 (4.0)
6.1 (3.1)
|
OpenClaw < 2026.3.24 - Improper Process Termination vi… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:26.457Z | 2026-04-10T20:17:55.994Z |
| CVE-2026-35666 |
7.7 (4.0)
8.8 (3.1)
|
OpenClaw < 2026.3.22 - Allowlist Bypass via Unregister… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:25.748Z | 2026-04-10T16:03:25.748Z |
| CVE-2026-35665 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.3.24 - Denial of Service via Feishu We… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:25.047Z | 2026-04-10T16:58:15.053Z |
| CVE-2026-35664 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.3.25 - DM Pairing Bypass via Legacy Ca… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:24.375Z | 2026-04-10T16:03:24.375Z |
| CVE-2026-35663 |
8.7 (4.0)
8.8 (3.1)
|
OpenClaw < 2026.3.25 - Privilege Escalation via Backen… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:23.672Z | 2026-04-10T16:03:23.672Z |
| CVE-2026-35662 |
5.3 (4.0)
4.3 (3.1)
|
OpenClaw < 2026.3.22 - Missing controlScope Enforcemen… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:22.937Z | 2026-04-10T18:24:24.250Z |
| CVE-2026-35661 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.3.25 - Telegram DM-Scoped Inline Butto… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:22.250Z | 2026-04-10T20:18:04.127Z |
| CVE-2026-35660 |
7.2 (4.0)
8.1 (3.1)
|
OpenClaw < 2026.3.23 - Insufficient Access Control in … |
OpenClaw |
OpenClaw |
2026-04-10T16:03:21.568Z | 2026-04-10T16:03:21.568Z |
| CVE-2026-35659 |
5.1 (4.0)
4.6 (3.1)
|
OpenClaw < 2026.3.22 - Unresolved Service Metadata Rou… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:20.749Z | 2026-04-10T16:58:50.963Z |
| CVE-2026-35658 |
6 (4.0)
6.5 (3.1)
|
OpenClaw < 2026.3.2 - Filesystem Boundary Bypass in Im… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:20.067Z | 2026-04-10T16:03:20.067Z |
| CVE-2026-35657 |
7.1 (4.0)
6.5 (3.1)
|
OpenClaw < 2026.3.25 - Authorization Bypass in HTTP Se… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:19.372Z | 2026-04-10T16:03:19.372Z |
| CVE-2026-35597 |
5.9 (3.1)
|
Vikunja Affected by TOTP Brute-Force Due to Non-Functi… |
go-vikunja |
vikunja |
2026-04-10T16:03:19.636Z | 2026-04-10T16:03:19.636Z |
| CVE-2026-35656 |
6.3 (4.0)
6.5 (3.1)
|
OpenClaw < 2026.3.22 - XFF Loopback Spoofing Bypass in… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:18.659Z | 2026-04-10T18:23:28.866Z |
| CVE-2026-35655 |
6.9 (4.0)
5.7 (3.1)
|
OpenClaw < 2026.3.22 - Identity Spoofing via rawInput … |
OpenClaw |
OpenClaw |
2026-04-10T16:03:17.978Z | 2026-04-10T20:18:12.455Z |
| CVE-2026-35654 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.3.25 - Authorization Bypass in Microso… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:17.081Z | 2026-04-10T16:03:17.081Z |
| CVE-2026-35653 |
7.2 (4.0)
8.1 (3.1)
|
OpenClaw < 2026.3.24 - Incorrect Authorization in POST… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:16.391Z | 2026-04-10T16:59:30.616Z |
| CVE-2026-35652 |
6.9 (4.0)
6.5 (3.1)
|
OpenClaw < 2026.3.22 - Unauthorized Action Execution v… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:15.676Z | 2026-04-10T16:03:15.676Z |
| CVE-2026-35651 |
5.3 (4.0)
4.3 (3.1)
|
OpenClaw 2026.2.13 < 2026.3.25 - ANSI Escape Sequence … |
OpenClaw |
OpenClaw |
2026-04-10T16:03:14.791Z | 2026-04-10T16:03:14.791Z |
| CVE-2026-35650 |
7.7 (4.0)
7.5 (3.1)
|
OpenClaw < 2026.3.22 - Environment Variable Override B… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:13.984Z | 2026-04-10T18:22:40.750Z |
| CVE-2026-35649 |
6.3 (4.0)
6.5 (3.1)
|
OpenClaw < 2026.3.22 - Settings Reconciliation Bypass … |
OpenClaw |
OpenClaw |
2026-04-10T16:03:13.290Z | 2026-04-10T16:03:13.290Z |
| CVE-2026-35648 |
2.3 (4.0)
3.7 (3.1)
|
OpenClaw < 2026.3.22 - Policy Bypass via Unvalidated Q… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:12.588Z | 2026-04-10T16:03:12.588Z |
| CVE-2026-35647 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.3.25 - Direct Message Policy Bypass vi… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:11.903Z | 2026-04-10T17:21:38.896Z |
| CVE-2026-35643 |
8.6 (4.0)
8.8 (3.1)
|
OpenClaw < 2026.3.22 - Arbitrary Code Execution via Un… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:11.209Z | 2026-04-10T16:03:11.209Z |
| CVE-2026-35641 |
8.4 (4.0)
7.8 (3.1)
|
OpenClaw < 2026.3.24 - Arbitrary Code Execution via .n… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:10.490Z | 2026-04-10T16:03:10.490Z |
| CVE-2026-35621 |
7.1 (4.0)
6.5 (3.1)
|
OpenClaw < 2026.3.24 - Privilege Escalation via chat.s… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:09.856Z | 2026-04-10T18:21:15.828Z |
| CVE-2026-35620 |
5.3 (4.0)
5.4 (3.1)
|
OpenClaw < 2026.3.24 - Missing Authorization in /send … |
OpenClaw |
OpenClaw |
2026-04-10T16:03:09.127Z | 2026-04-10T16:03:09.127Z |
| CVE-2026-35619 |
5.3 (4.0)
4.3 (3.1)
|
OpenClaw < 2026.3.24 - Authorization Bypass via HTTP /… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:08.449Z | 2026-04-10T16:03:08.449Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-35665 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.3.24 - Denial of Service via Feishu We… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:25.047Z | 2026-04-10T16:58:15.053Z |
| CVE-2026-35664 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.3.25 - DM Pairing Bypass via Legacy Ca… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:24.375Z | 2026-04-10T16:03:24.375Z |
| CVE-2026-35663 |
8.7 (4.0)
8.8 (3.1)
|
OpenClaw < 2026.3.25 - Privilege Escalation via Backen… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:23.672Z | 2026-04-10T16:03:23.672Z |
| CVE-2026-35662 |
5.3 (4.0)
4.3 (3.1)
|
OpenClaw < 2026.3.22 - Missing controlScope Enforcemen… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:22.937Z | 2026-04-10T18:24:24.250Z |
| CVE-2026-35661 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.3.25 - Telegram DM-Scoped Inline Butto… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:22.250Z | 2026-04-10T20:18:04.127Z |
| CVE-2026-35660 |
7.2 (4.0)
8.1 (3.1)
|
OpenClaw < 2026.3.23 - Insufficient Access Control in … |
OpenClaw |
OpenClaw |
2026-04-10T16:03:21.568Z | 2026-04-10T16:03:21.568Z |
| CVE-2026-35659 |
5.1 (4.0)
4.6 (3.1)
|
OpenClaw < 2026.3.22 - Unresolved Service Metadata Rou… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:20.749Z | 2026-04-10T16:58:50.963Z |
| CVE-2026-35658 |
6 (4.0)
6.5 (3.1)
|
OpenClaw < 2026.3.2 - Filesystem Boundary Bypass in Im… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:20.067Z | 2026-04-10T16:03:20.067Z |
| CVE-2026-35657 |
7.1 (4.0)
6.5 (3.1)
|
OpenClaw < 2026.3.25 - Authorization Bypass in HTTP Se… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:19.372Z | 2026-04-10T16:03:19.372Z |
| CVE-2026-35656 |
6.3 (4.0)
6.5 (3.1)
|
OpenClaw < 2026.3.22 - XFF Loopback Spoofing Bypass in… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:18.659Z | 2026-04-10T18:23:28.866Z |
| CVE-2026-35655 |
6.9 (4.0)
5.7 (3.1)
|
OpenClaw < 2026.3.22 - Identity Spoofing via rawInput … |
OpenClaw |
OpenClaw |
2026-04-10T16:03:17.978Z | 2026-04-10T20:18:12.455Z |
| CVE-2026-35654 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.3.25 - Authorization Bypass in Microso… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:17.081Z | 2026-04-10T16:03:17.081Z |
| CVE-2026-35653 |
7.2 (4.0)
8.1 (3.1)
|
OpenClaw < 2026.3.24 - Incorrect Authorization in POST… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:16.391Z | 2026-04-10T16:59:30.616Z |
| CVE-2026-35652 |
6.9 (4.0)
6.5 (3.1)
|
OpenClaw < 2026.3.22 - Unauthorized Action Execution v… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:15.676Z | 2026-04-10T16:03:15.676Z |
| CVE-2026-35651 |
5.3 (4.0)
4.3 (3.1)
|
OpenClaw 2026.2.13 < 2026.3.25 - ANSI Escape Sequence … |
OpenClaw |
OpenClaw |
2026-04-10T16:03:14.791Z | 2026-04-10T16:03:14.791Z |
| CVE-2026-35650 |
7.7 (4.0)
7.5 (3.1)
|
OpenClaw < 2026.3.22 - Environment Variable Override B… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:13.984Z | 2026-04-10T18:22:40.750Z |
| CVE-2026-35649 |
6.3 (4.0)
6.5 (3.1)
|
OpenClaw < 2026.3.22 - Settings Reconciliation Bypass … |
OpenClaw |
OpenClaw |
2026-04-10T16:03:13.290Z | 2026-04-10T16:03:13.290Z |
| CVE-2026-35648 |
2.3 (4.0)
3.7 (3.1)
|
OpenClaw < 2026.3.22 - Policy Bypass via Unvalidated Q… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:12.588Z | 2026-04-10T16:03:12.588Z |
| CVE-2026-35647 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.3.25 - Direct Message Policy Bypass vi… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:11.903Z | 2026-04-10T17:21:38.896Z |
| CVE-2026-35643 |
8.6 (4.0)
8.8 (3.1)
|
OpenClaw < 2026.3.22 - Arbitrary Code Execution via Un… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:11.209Z | 2026-04-10T16:03:11.209Z |
| CVE-2026-35641 |
8.4 (4.0)
7.8 (3.1)
|
OpenClaw < 2026.3.24 - Arbitrary Code Execution via .n… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:10.490Z | 2026-04-10T16:03:10.490Z |
| CVE-2026-35621 |
7.1 (4.0)
6.5 (3.1)
|
OpenClaw < 2026.3.24 - Privilege Escalation via chat.s… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:09.856Z | 2026-04-10T18:21:15.828Z |
| CVE-2026-35620 |
5.3 (4.0)
5.4 (3.1)
|
OpenClaw < 2026.3.24 - Missing Authorization in /send … |
OpenClaw |
OpenClaw |
2026-04-10T16:03:09.127Z | 2026-04-10T16:03:09.127Z |
| CVE-2026-35619 |
5.3 (4.0)
4.3 (3.1)
|
OpenClaw < 2026.3.24 - Authorization Bypass via HTTP /… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:08.449Z | 2026-04-10T16:03:08.449Z |
| CVE-2026-35602 |
5.4 (3.1)
|
Vikunja has a File Size Limit Bypass via Vikunja Import |
go-vikunja |
vikunja |
2026-04-10T16:10:39.630Z | 2026-04-10T16:10:39.630Z |
| CVE-2026-35601 |
4.1 (3.1)
|
Vikunja has an iCalendar Property Injection via CRLF i… |
go-vikunja |
vikunja |
2026-04-10T16:08:50.519Z | 2026-04-10T16:08:50.519Z |
| CVE-2026-35600 |
5.4 (3.1)
|
Vikunja has HTML Injection via Task Titles in Overdue … |
go-vikunja |
vikunja |
2026-04-10T16:07:07.846Z | 2026-04-10T16:07:07.846Z |
| CVE-2026-35599 |
6.5 (3.1)
|
Vikunja has an Algorithmic Complexity DoS in Repeating… |
go-vikunja |
vikunja |
2026-04-10T16:05:57.581Z | 2026-04-10T18:28:29.310Z |
| CVE-2026-35598 |
4.3 (3.1)
|
Vikunja has Missing Authorization on CalDAV Task Read |
go-vikunja |
vikunja |
2026-04-10T16:04:32.083Z | 2026-04-10T16:04:32.083Z |
| CVE-2026-35597 |
5.9 (3.1)
|
Vikunja Affected by TOTP Brute-Force Due to Non-Functi… |
go-vikunja |
vikunja |
2026-04-10T16:03:19.636Z | 2026-04-10T16:03:19.636Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-23184 | In the Linux kernel, the following vulnerability has been resolved: binder: fix UAF in binder_netl… | 2026-02-14T17:15:56.167 | 2026-04-03T14:16:26.100 |
| fkie_cve-2026-23183 | In the Linux kernel, the following vulnerability has been resolved: cgroup/dmem: fix NULL pointer … | 2026-02-14T17:15:56.067 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23182 | In the Linux kernel, the following vulnerability has been resolved: spi: tegra: Fix a memory leak … | 2026-02-14T17:15:55.960 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23181 | In the Linux kernel, the following vulnerability has been resolved: btrfs: sync read disk super an… | 2026-02-14T17:15:55.853 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23180 | In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: add bounds check… | 2026-02-14T17:15:55.747 | 2026-04-03T14:16:25.903 |
| fkie_cve-2026-23179 | In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: fixup hang in nvmet… | 2026-02-14T17:15:55.643 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23178 | In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid: fix potential bu… | 2026-02-14T17:15:55.537 | 2026-04-03T14:16:25.703 |
| fkie_cve-2026-23177 | In the Linux kernel, the following vulnerability has been resolved: mm, shmem: prevent infinite lo… | 2026-02-14T17:15:55.430 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23176 | In the Linux kernel, the following vulnerability has been resolved: platform/x86: toshiba_haps: Fi… | 2026-02-14T17:15:55.320 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23175 | In the Linux kernel, the following vulnerability has been resolved: net: cpsw: Execute ndo_set_rx_… | 2026-02-14T17:15:55.210 | 2026-04-03T14:16:25.540 |
| fkie_cve-2026-23174 | In the Linux kernel, the following vulnerability has been resolved: nvme-pci: handle changing devi… | 2026-02-14T17:15:55.103 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-71224 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: ocb: skip rx_n… | 2026-02-14T17:15:54.773 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-71223 | In the Linux kernel, the following vulnerability has been resolved: smb/server: fix refcount leak … | 2026-02-14T17:15:54.670 | 2026-03-18T17:11:48.833 |
| fkie_cve-2025-71222 | In the Linux kernel, the following vulnerability has been resolved: wifi: wlcore: ensure skb headr… | 2026-02-14T17:15:54.560 | 2026-03-19T18:05:23.480 |
| fkie_cve-2025-71221 | In the Linux kernel, the following vulnerability has been resolved: dmaengine: mmp_pdma: Fix race … | 2026-02-14T17:15:54.450 | 2026-03-25T11:16:15.247 |
| fkie_cve-2025-71220 | In the Linux kernel, the following vulnerability has been resolved: smb/server: call ksmbd_session… | 2026-02-14T17:15:54.343 | 2026-03-19T18:06:27.140 |
| fkie_cve-2025-71204 | In the Linux kernel, the following vulnerability has been resolved: smb/server: fix refcount leak … | 2026-02-14T17:15:54.237 | 2026-03-18T17:12:03.873 |
| fkie_cve-2025-71203 | In the Linux kernel, the following vulnerability has been resolved: riscv: Sanitize syscall table … | 2026-02-14T17:15:54.110 | 2026-03-25T11:16:15.093 |
| fkie_cve-2026-23173 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: TC, delete flows on… | 2026-02-14T16:15:57.560 | 2026-03-18T14:46:21.680 |
| fkie_cve-2026-23172 | In the Linux kernel, the following vulnerability has been resolved: net: wwan: t7xx: fix potential… | 2026-02-14T16:15:57.457 | 2026-04-03T14:16:25.353 |
| fkie_cve-2026-23171 | In the Linux kernel, the following vulnerability has been resolved: bonding: fix use-after-free du… | 2026-02-14T16:15:57.353 | 2026-04-03T14:16:25.187 |
| fkie_cve-2026-23170 | In the Linux kernel, the following vulnerability has been resolved: drm/imx/tve: fix probe device … | 2026-02-14T16:15:57.247 | 2026-03-18T14:57:32.293 |
| fkie_cve-2026-23169 | In the Linux kernel, the following vulnerability has been resolved: mptcp: fix race in mptcp_pm_nl… | 2026-02-14T16:15:57.147 | 2026-04-03T14:16:24.997 |
| fkie_cve-2026-23168 | In the Linux kernel, the following vulnerability has been resolved: flex_proportions: make fprop_n… | 2026-02-14T16:15:57.023 | 2026-03-18T15:00:47.557 |
| fkie_cve-2026-23167 | In the Linux kernel, the following vulnerability has been resolved: nfc: nci: Fix race between rfk… | 2026-02-14T16:15:56.910 | 2026-03-18T15:01:30.570 |
| fkie_cve-2026-23166 | In the Linux kernel, the following vulnerability has been resolved: ice: Fix NULL pointer derefere… | 2026-02-14T16:15:56.797 | 2026-03-18T15:02:35.403 |
| fkie_cve-2026-23165 | In the Linux kernel, the following vulnerability has been resolved: sfc: fix deadlock in RSS confi… | 2026-02-14T16:15:56.693 | 2026-03-18T15:02:51.063 |
| fkie_cve-2026-23164 | In the Linux kernel, the following vulnerability has been resolved: rocker: fix memory leak in roc… | 2026-02-14T16:15:56.590 | 2026-03-18T15:03:29.617 |
| fkie_cve-2026-23163 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix NULL pointer d… | 2026-02-14T16:15:56.483 | 2026-03-18T15:04:01.300 |
| fkie_cve-2026-23162 | In the Linux kernel, the following vulnerability has been resolved: drm/xe/nvm: Fix double-free on… | 2026-02-14T16:15:56.383 | 2026-03-18T15:07:36.563 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-4wr3-f4p3-5wjh |
7.9 (3.1)
|
PraisonAI: Unauthenticated Allow-List Manipulation Bypasses Agent Tool Approval Safety Controls | 2026-04-10T19:24:11Z | 2026-04-10T19:24:11Z |
| ghsa-8f4v-xfm9-3244 |
7.7 (3.1)
|
PraisonAIAgents has SSRF and Local File Read via Unvalidated URLs in web_crawl Tool | 2026-04-10T19:23:57Z | 2026-04-10T19:23:57Z |
| ghsa-grrg-5cg9-58pf |
6.2 (3.1)
|
PraisonAIAgents: Arbitrary File Read via read_skill_file Missing Workspace Boundary and Approval Gate | 2026-04-10T19:23:21Z | 2026-04-10T19:23:21Z |
| ghsa-2xgv-5cv2-47vv |
6.2 (3.1)
|
PraisonAI has Unrestricted Upload Size in WSGI Recipe Registry Server that Enables Memory Exhaustion DoS | 2026-04-10T19:23:13Z | 2026-04-10T19:23:13Z |
| ghsa-q5r4-47m9-5mc7 |
7.5 (3.1)
|
PraisonAI: Unauthenticated WebSocket Endpoint Proxies to Paid OpenAI Realtime API Without Rate Limits | 2026-04-10T19:22:52Z | 2026-04-10T19:22:52Z |
| ghsa-fvxx-ggmx-3cjg |
8.4 (3.1)
|
PraisonAI Vulnerable to Argument Injection into Cloud Run Environment Variables via Unsanitized Com… | 2026-04-10T19:22:37Z | 2026-04-10T19:22:37Z |
| ghsa-cfg2-mxfj-j6pw |
5.4 (3.1)
|
PraisonAI Vulnerable to Stored XSS via Unsanitized Agent Output in HTML Rendering (nh3 Not a Requir… | 2026-04-10T19:22:18Z | 2026-04-10T19:22:18Z |
| ghsa-v7px-3835-7gjx |
9.3 (4.0)
|
PraisonAIAgents has an OS Command Injection via shell=True in Memory Hooks Executor (memory/hooks.py) | 2026-04-10T19:21:54Z | 2026-04-10T19:21:54Z |
| ghsa-w95v-4h65-j455 |
8.7 (4.0)
|
SiYuan Affected by Zero-Click NTLM Hash Theft and Blind SSRF via Mermaid Diagram Rendering | 2026-04-10T19:21:44Z | 2026-04-10T19:21:44Z |
| ghsa-fm2x-c5qw-4h6f |
9.1 (3.1)
|
LXD: VM lowlevel restriction bypass via raw.apparmor and raw.qemu.conf | 2026-04-10T19:21:00Z | 2026-04-10T19:21:00Z |
| ghsa-q96j-3fmm-7fv4 |
9.1 (3.1)
|
LXD: Importing a crafted backup leads to project restriction bypass | 2026-04-10T19:20:55Z | 2026-04-10T19:20:55Z |
| ghsa-c3h3-89qf-jqm5 |
9.1 (3.1)
|
LXD: Update of type field in restricted TLS certificate allows privilege escalation to cluster admin | 2026-04-10T19:20:50Z | 2026-04-10T19:20:50Z |
| ghsa-c9vm-hv86-f23r |
|
justhtml includes multiple security fixes | 2026-04-10T19:20:04Z | 2026-04-10T19:20:04Z |
| ghsa-w59f-v72r-w493 |
8.5 (3.1)
|
A flaw was found in odh-dashboard in Red Hat Openshift AI. This vulnerability in the `odh-dashboard… | 2026-04-10T18:31:20Z | 2026-04-10T21:31:14Z |
| ghsa-qrwv-475h-2439 |
8.1 (3.1)
|
An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur … | 2026-04-10T18:31:20Z | 2026-04-10T18:31:20Z |
| ghsa-hjxq-7w9q-2jw6 |
5.7 (4.0)
|
CR/LF bytes were not rejected by HTTP client proxy tunnel headers or host. | 2026-04-10T18:31:20Z | 2026-04-11T06:31:14Z |
| ghsa-x53v-pxf5-chx6 |
6.2 (3.1)
|
In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with… | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-w35j-pv5h-q9q9 |
6.3 (4.0)
|
Apache Log4j's JsonTemplateLayout produces invalid JSON output when log events contain non-finite f… | 2026-04-10T18:31:18Z | 2026-04-10T21:16:54Z |
| ghsa-q8qr-wp2r-738r |
6.3 (4.0)
|
Apache Log4cxx's XMLLayout https://logging.apache.org/log4cxx/1.7.0/classlog4cxx_1_1xml_1_1XMLLayo… | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-jf3x-2pf6-c45w |
6.7 (3.1)
|
In systemd 259 before 260, there is local privilege escalation in systemd-machined because varlink … | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-hc7r-6254-88w5 |
6.4 (3.1)
|
In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted o… | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-h383-gmxw-35v2 |
6.9 (4.0)
|
The Log4j1XmlLayout from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden … | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-grjh-583f-v73h |
2.9 (3.1)
|
In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users… | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-8fhh-33x2-c7c5 |
|
An open redirect vulnerability in Rocket.Chat versions prior to 8.4.0 allows users to be redirected… | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-52rm-r39v-fwv9 |
4.7 (3.1)
|
In systemd 258 before 260, a local unprivileged user can trigger an assert when a Delegate=yes and … | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-4f7c-pmjv-c25w |
6.3 (4.0)
|
Apache Log4net's XmlLayout https://logging.apache.org/log4net/manual/configuration/layouts.html#la… | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-396h-m3pm-fpm5 |
6.4 (3.1)
|
In udev in systemd before 260, local root execution can occur via malicious hardware devices and un… | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-76mr-v53w-7h6c |
|
An issue was discovered in BMC Control-M/MFT 9.0.20 through 9.0.22. A set of default debug user cre… | 2026-04-10T18:31:17Z | 2026-04-10T18:31:17Z |
| ghsa-6hg6-v5c8-fphq |
6.3 (4.0)
|
The fix for CVE-2025-68161 https://logging.apache.org/security.html#CVE-2025-68161 was incomplete… | 2026-04-10T18:31:17Z | 2026-04-10T18:31:17Z |
| ghsa-6g6q-gcm9-395j |
7.2 (3.1)
8.6 (4.0)
|
CouchCMS contains a privilege escalation vulnerability that allows authenticated Admin-level users … | 2026-04-10T18:31:17Z | 2026-04-10T18:31:17Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-188 |
6.1 (3.1)
|
WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Lo… | webob | 2024-08-14T21:15:17+00:00 | 2025-01-19T04:23:01.908824+00:00 |
| pysec-2024-153 |
6.5 (3.1)
|
Streamlit is a data oriented application development framework for python. Snowflake Stre… | streamlit | 2024-08-12T17:15:17+00:00 | 2024-11-25T21:22:50.933853+00:00 |
| pysec-2024-200 |
7.2 (3.1)
|
JupyterHub is software that allows one to create a multi-user server for Jupyter notebook… | jupyterhub | 2024-08-08T15:15:17+00:00 | 2025-01-19T16:22:58.171761+00:00 |
| pysec-2024-70 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values… | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.804411+00:00 |
| pysec-2024-69 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and … | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.745844+00:00 |
| pysec-2024-68 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() an… | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.682679+00:00 |
| pysec-2024-67 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat… | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.613440+00:00 |
| pysec-2024-73 |
9.1 (3.1)
|
A vulnerability in the JSON file handling of gaizhenbiao/chuanhuchatgpt version 20240410 … | chuanhuchatgpt | 2024-07-31T01:15:00+00:00 | 2024-08-27T15:22:40.259109+00:00 |
| pysec-2024-75 |
6.1 (3.1)
|
Twisted is an event-based framework for internet applications, supporting Python 3.6+. Th… | twisted | 2024-07-29T16:15:00+00:00 | 2024-09-11T19:19:18.005250+00:00 |
| pysec-2024-203 |
7.5 (3.1)
|
DuckDB is a SQL database management system. In versions 1.0.0 and prior, content in files… | duckdb | 2024-07-24T18:15:05+00:00 | 2025-01-19T19:18:58.299130+00:00 |
| pysec-2024-65 |
|
Roundup before 2.4.0 allows XSS via JavaScript in PDF, XML, and SVG documents. | roundup | 2024-07-17T20:15:00+00:00 | 2024-07-17T23:22:05.024899+00:00 |
| pysec-2024-64 |
|
Roundup before 2.4.0 allows XSS via a SCRIPT element in an HTTP Referer header. | roundup | 2024-07-17T20:15:00+00:00 | 2024-07-17T23:22:04.987078+00:00 |
| pysec-2024-63 |
|
In Roundup before 2.4.0, classhelpers (_generic.help.html) allow XSS. | roundup | 2024-07-17T20:15:00+00:00 | 2024-07-17T23:22:04.949977+00:00 |
| pysec-2024-173 |
8.8 (3.1)
|
Unrestricted Upload of File with dangerous type vulnerability in Apache StreamPipes. Such… | streampipes | 2024-07-17T10:15:01+00:00 | 2025-01-18T22:21:43.618882+00:00 |
| pysec-2024-174 |
4.3 (3.1)
|
Server-Side Request Forgery (SSRF) vulnerability in Apache StreamPipes during installatio… | streampipes | 2024-07-17T09:15:02+00:00 | 2025-01-18T22:21:43.678475+00:00 |
| pysec-2024-172 |
3.7 (3.1)
|
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache StreamPipes in … | streampipes | 2024-07-17T09:15:02+00:00 | 2025-01-18T22:21:43.557516+00:00 |
| pysec-2024-190 |
8.8 (3.1)
|
Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenti… | apache-airflow | 2024-07-17T08:15:02+00:00 | 2025-01-19T07:21:16.859034+00:00 |
| pysec-2024-189 |
5.4 (3.1)
|
Apache Airflow versions before 2.9.3 have a vulnerability that allows an authenticated at… | apache-airflow | 2024-07-17T08:15:01+00:00 | 2025-01-19T07:21:16.796301+00:00 |
| pysec-2024-66 |
7.8 (3.1)
|
dbt enables data analysts and engineers to transform their data using the same practices … | dbt-core | 2024-07-16T23:15:00+00:00 | 2024-07-19T17:21:49.664320+00:00 |
| pysec-2024-62 |
|
Versions of the package langchain-experimental from 0.0.15 and before 0.0.21 are vulnerab… | langchain-experimental | 2024-07-15T05:15:00+00:00 | 2024-07-15T11:19:36.686972+00:00 |
| pysec-2024-86 |
4.9 (3.1)
|
Wagtail is an open source content management system built on Django. A bug in Wagtail's `… | wagtail | 2024-07-11T16:15:00+00:00 | 2024-09-19T19:20:17.668744+00:00 |
| pysec-2024-61 |
6.1 (3.1)
|
A Stored Cross-Site Scripting (XSS) vulnerability exists in gaizhenbiao/chuanhuchatgpt ve… | chuanhuchatgpt | 2024-07-11T11:15:00+00:00 | 2024-07-12T21:33:00.657381+00:00 |
| pysec-2024-59 |
|
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. get_supported_l… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.800540+00:00 |
| pysec-2024-58 |
|
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. Derived classes… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.704786+00:00 |
| pysec-2024-57 |
|
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. The django.cont… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.604887+00:00 |
| pysec-2024-56 |
|
An issue was discovered in Django 4.2 before 4.2.14 and 5.0 before 5.0.7. urlize and urli… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.495359+00:00 |
| pysec-2024-60 |
7.5 (3.1)
|
A vulnerability was identified in the kjd/idna library, specifically within the `idna.enc… | idna | 2024-07-07T18:15:00+00:00 | 2024-07-11T17:21:37.216928+00:00 |
| pysec-2024-230 |
7.5 (3.1)
|
Certifi is a curated collection of Root Certificates for validating the trustworthiness o… | certifi | 2024-07-05T19:15:10+00:00 | 2025-02-12T21:21:51.559667+00:00 |
| pysec-2024-176 |
6.1 (3.1)
|
A reflected Cross-Site Scripting (XSS) vulnerability was identified in zenml-io/zenml ver… | zenml | 2024-06-30T16:15:03+00:00 | 2025-01-18T22:21:45.122426+00:00 |
| pysec-2024-167 |
|
NLTK through 3.8.1 allows remote code execution if untrusted packages have pickled Python… | nltk | 2024-06-27T22:15:10+00:00 | 2025-01-18T19:19:06.317325+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2403 | Malicious code in polymarkets-sdk (PyPI) | 2026-04-01T15:30:14Z | 2026-04-01T16:27:32Z |
| mal-2026-2400 | Malicious code in kube-node-health (PyPI) | 2026-04-01T11:46:16Z | 2026-04-01T11:46:16Z |
| mal-2026-2328 | Malicious code in mcp-server-todo (npm) | 2026-04-01T11:23:23Z | 2026-04-07T14:41:23Z |
| mal-2026-2327 | Malicious code in kube-health-tools (PyPI) | 2026-04-01T09:47:27Z | 2026-04-01T09:47:27Z |
| mal-2026-2326 | Malicious code in raydium-bs58 (npm) | 2026-04-01T09:11:09Z | 2026-04-07T14:41:24Z |
| mal-2026-2323 | Malicious code in ethersproject-wallet (npm) | 2026-04-01T09:11:09Z | 2026-04-07T14:41:21Z |
| mal-2026-2322 | Malicious code in bs58-basic (npm) | 2026-04-01T09:11:09Z | 2026-04-07T14:41:20Z |
| mal-2026-2320 | Malicious code in base-x-64 (npm) | 2026-04-01T09:11:08Z | 2026-04-07T14:41:20Z |
| mal-2026-2325 | Malicious code in jonas-prettier-logger (npm) | 2026-04-01T09:10:18Z | 2026-04-07T14:41:22Z |
| mal-2026-2324 | Malicious code in jellyfi-pino-pretty-logger (npm) | 2026-04-01T09:10:18Z | 2026-04-07T14:41:22Z |
| mal-2026-2321 | Malicious code in base58-engine (npm) | 2026-04-01T09:10:18Z | 2026-04-07T14:41:20Z |
| mal-2026-2319 | Malicious code in base-or-engine (npm) | 2026-04-01T09:10:18Z | 2026-04-07T14:41:20Z |
| mal-2026-2318 | Malicious code in @logcore/pino-pretty-logger (npm) | 2026-04-01T09:10:18Z | 2026-04-07T14:41:19Z |
| mal-2026-2316 | Malicious code in openai-async-helpers (PyPI) | 2026-04-01T06:00:26Z | 2026-04-01T06:00:27Z |
| mal-2026-2317 | Malicious code in pygithub-async-utils (PyPI) | 2026-04-01T05:58:39Z | 2026-04-01T05:58:40Z |
| mal-2026-2315 | Malicious code in latinum-wallet-mcp (PyPI) | 2026-03-31T20:37:05Z | 2026-03-31T21:18:58Z |
| mal-2026-2314 | Malicious code in @c8o/nimbus-core (npm) | 2026-03-31T18:13:08Z | 2026-04-07T14:41:19Z |
| mal-2026-2313 | Malicious code in coredxloader (PyPI) | 2026-03-31T17:07:08Z | 2026-03-31T17:07:08Z |
| mal-2026-2312 | Malicious code in tailwindcss-typeface-inter (npm) | 2026-03-31T14:56:07Z | 2026-04-07T14:41:25Z |
| mal-2026-2311 | Malicious code in officepyai (PyPI) | 2026-03-31T09:26:34Z | 2026-03-31T09:28:16Z |
| mal-2026-2310 | Malicious code in lakeflow-community-connectors (PyPI) | 2026-03-31T05:36:24Z | 2026-03-31T05:36:24Z |
| mal-2026-2308 | Malicious code in workingitme (PyPI) | 2026-03-31T03:40:48Z | 2026-03-31T05:19:14Z |
| mal-2026-2309 | Malicious code in zzzzthisisitwantsafecheckitzzzz (PyPI) | 2026-03-31T03:35:47Z | 2026-03-31T05:19:14Z |
| mal-2026-2307 | Malicious code in axios (npm) | 2026-03-31T03:15:49Z | 2026-04-07T14:41:20Z |
| mal-2026-2306 | Malicious code in plain-crypto-js (npm) | 2026-03-31T02:07:58Z | 2026-03-31T05:26:30Z |
| mal-2026-2305 | Malicious code in databaseroboats (PyPI) | 2026-03-30T20:21:21Z | 2026-04-10T21:49:20Z |
| mal-2026-2304 | Malicious code in spanner-client (PyPI) | 2026-03-30T16:07:34Z | 2026-03-30T16:07:34Z |
| mal-2026-2303 | Malicious code in prodaccess (PyPI) | 2026-03-30T16:07:26Z | 2026-03-30T16:07:26Z |
| mal-2026-2301 | Malicious code in dremel (PyPI) | 2026-03-30T16:06:05Z | 2026-03-30T16:06:05Z |
| mal-2026-2302 | Malicious code in loas (PyPI) | 2026-03-30T16:04:14Z | 2026-03-30T16:04:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0441 | OpenClaw: Mehrere Schwachstellen | 2026-02-17T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0437 | Dell RecoverPoint for Virtual Machines: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und potenziell Privilegieneskalation | 2026-02-17T23:00:00.000+00:00 | 2026-02-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0427 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2026-02-16T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0425 | SmarterTools SmarterMail: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0424 | OpenClaw: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0423 | Gogs: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0422 | Mattermost: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0421 | Linux Kernel: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0420 | Google Chrome und Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2026-02-15T23:00:00.000+00:00 | 2026-02-17T23:00:00.000+00:00 |
| wid-sec-w-2026-0419 | vim (NetBeans): Schwachstelle ermöglicht Codeausführung | 2026-02-15T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0418 | Google Cloud Platform (Apigee): Schwachstelle ermöglicht Privilegieneskalation | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0417 | IBM Sterling Connect:Direct: Schwachstelle ermöglicht Denial of Service | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0416 | Keycloak: Schwachstelle ermöglicht Denial of Service | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0410 | HAProxy Enterprise, Community und ALOHA (QUIC): Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-12T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0409 | PostgreSQL: Mehrere Schwachstellen | 2026-02-12T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0405 | Grafana: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0403 | Apple macOS Tahoe, Sequoia und Sonoma: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-03-24T23:00:00.000+00:00 |
| wid-sec-w-2026-0402 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-03-24T23:00:00.000+00:00 |
| wid-sec-w-2026-0401 | Google Chrome: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0397 | Drupal Module (UI Icons, Quick Edit): Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2026-02-11T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0388 | Synacor Zimbra: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0383 | AMD Radeon: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0379 | Intel Prozessoren: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0378 | IBM WebSphere Application Server: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-02-10T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0377 | Ivanti Endpoint Manager: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2026-02-10T23:00:00.000+00:00 | 2026-03-09T23:00:00.000+00:00 |
| wid-sec-w-2026-0369 | Microsoft Windows: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0367 | Microsoft DeveloperTools (Visual Studio Code und .NET): Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0364 | Microsoft Defender für Endpoint Linux Extension: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2026-02-10T23:00:00.000+00:00 | 2026-02-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0363 | Microsoft Power BI: Schwachstelle ermöglicht Erlangen von Benutzerrechten und Codeausführung | 2026-02-10T23:00:00.000+00:00 | 2026-02-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0362 | Red Hat Enterprise Linux (Lodash): Schwachstelle ermöglicht Denial of Service | 2026-02-10T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-015-11 | Siemens RUGGEDCOM ROX II | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-26-015-06 | Siemens SINEC Security Monitor | 2025-12-09T00:00:00.000000Z | 2026-01-14T22:35:44.907344Z |
| icsa-26-015-05 | Siemens RUGGEDCOM ROS | 2025-12-09T00:00:00.000000Z | 2026-01-14T22:35:44.058931Z |
| icsa-26-008-01 | Hitachi Energy Asset Suite | 2025-12-09T00:00:00.000000Z | 2026-01-07T21:26:16.381953Z |
| icsa-25-352-05 | Siemens Interniche IP-Stack | 2025-12-09T00:00:00.000000Z | 2025-12-18T18:13:59.515670Z |
| icsa-25-345-09 | Siemens Gridscale X Prepay | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-08 | Siemens Energy Services | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-07 | Siemens Building X - Security Manager Edge Controller | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-06 | Siemens SINEMA Remote Connect Server | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-05 | Siemens Advanced Licensing (SALT) Toolkit | 2025-12-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-345-04 | Siemens IAM Client | 2025-12-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-338-07 | Advantech iView | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-06 | SolisCloud Monitoring Platform | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-05 | Sunbird DCIM dcTrack and Power IQ | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-04 | Johnson Controls iSTAR | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-03 | Johnson Controls OpenBlue Mobile Web Application for OpenBlue Workplace | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-02 | MAXHUB Pivot | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-01 | Mitsubishi Electric GX Works2 | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsma-25-336-01 | Mirion Medical EC2 Software NMIS BioDose | 2025-12-02T07:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-25-336-02 | Iskra iHUB and iHUB Lite | 2025-12-02T07:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-25-336-01 | Industrial Video & Control Longwatch | 2025-12-02T07:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-25-329-06 | SiRcom SMART Alert (SiSA) | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-05 | Festo Compact Vision System, Control Block, Controller, and Operator Unit products | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-03 | Zenitel TCIV-3+ | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-02 | Rockwell Automation Arena Simulation | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-01 | Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, Cobalt Share | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-04 | Opto 22 groov View | 2025-11-25T06:00:00.000000Z | 2025-11-25T06:00:00.000000Z |
| icsa-25-324-06 | Emerson Appleton UPSMON-PRO | 2025-11-20T07:00:00.000000Z | 2025-11-20T07:00:00.000000Z |
| icsa-25-324-01 | Automated Logic WebCTRL Premium Server | 2025-11-20T07:00:00.000000Z | 2025-11-20T07:00:00.000000Z |
| icsa-25-324-03 | Opto 22 GRV-EPIC and groov RIO | 2025-11-20T06:00:00.000000Z | 2025-11-20T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-cuis-ssrf-jsudjev | Cisco Unified Intelligence Center Server-Side Request Forgery Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-cuis-file-upload-uhnetstm | Cisco Unified Intelligence Center Arbitrary File Upload Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-spaces-conn-privesc-kgd2ccdu | Cisco Spaces Connector Privilege Escalation Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-ece-xss-cbtkteyc | Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-cucm-ssh-m4ubdpe7 | Cisco Unified Communications Manager Static SSH Credentials Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-broadworks-xss-o696ymra | Cisco BroadWorks CommPilot Application Software Cross-Site Scripting Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-10-21T15:13:31+00:00 |
| cisco-sa-ise-unauth-rce-zad2gnj6 | Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities | 2025-06-25T16:00:00+00:00 | 2025-07-24T23:30:31+00:00 |
| cisco-sa-ise-auth-bypass-mvfkvqau | Cisco Identity Services Engine Authorization Bypass Vulnerability | 2025-06-25T16:00:00+00:00 | 2025-06-25T16:00:00+00:00 |
| cisco-sa-meraki-mx-vpn-dos-sm5gcfm7 | Cisco Meraki MX and Z Series AnyConnect VPN with Client Certificate Authentication Denial of Service Vulnerability | 2025-06-18T16:00:00+00:00 | 2025-06-18T16:00:00+00:00 |
| cisco-sa-clamav-udf-hmwd9ndy | ClamAV UDF File Parsing Out-of-Bounds Read Information Disclosure Vulnerability | 2025-06-18T16:00:00+00:00 | 2025-06-18T16:00:00+00:00 |
| cisco-sa-vos-command-inject-65s2ucyy | Cisco Unified Communications Products Command Injection Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ucs-ssh-priv-esc-2mzdtdjm | Cisco Integrated Management Controller Privilege Escalation Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-uccx-multi-uhotvpgl | Cisco Unified Contact Center Express Vulnerabilities | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-uccx-editor-rce-ezyyzte8 | Cisco Unified Contact Center Express Editor Remote Code Execution Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-te-endagent-filewrt-zncdqnrj | Cisco ThousandEyes Endpoint Agent for Windows Arbitrary File Delete Vulnerabilities | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ndfc-shkv-snqjtjrp | Cisco Nexus Dashboard Fabric Controller SSH Host Key Validation Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ise-file-upload-p4m8vwxy | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-23T19:16:21+00:00 |
| cisco-sa-ise-aws-static-cred-fpmjucm7 | Cisco Identity Services Engine on Cloud Platforms Static Credential Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-05T17:26:25+00:00 |
| cisco-sa-icm-xss-cfcqhxag | Cisco Unified Intelligent Contact Management Enterprise Cross-Site Scripting Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ccp-info-disc-zygerqpd | Cisco Customer Collaboration Platform Information Disclosure Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-webex-xss-7teqtfn8 | Cisco Webex Services Cross-Site Scripting Vulnerabilities | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-webex-cache-q4xbkqbg | Cisco Webex Meetings Services HTTP Cache Poisoning Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sna-ssti-dpulqsmz | Cisco Secure Network Analytics Manager Privilege Escalation Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sna-apiacv-4b6x5ysw | Cisco Secure Network Analytics Manager API Authorization Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-ise-stored-xss-yff54m73 | Cisco Identity Services Stored Cross-Site Scripting Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-06-30T15:08:59+00:00 |
| cisco-sa-ise-restart-ss-uf986g2q | Cisco Identity Services Engine RADIUS Denial of Service Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-duo-ssp-cmd-inj-rcmyrna | Cisco Duo Self-Service Portal Command Injection Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-cuis-priv-esc-3pk96su4 | Cisco Unified Intelligence Center Privilege Escalation Vulnerabilities | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-cucm-kkhzbhr5 | Cisco Unified Communications Products Privilege Escalation Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-contcent-insuffacces-ardovhn8 | Cisco Unified Contact Center Enterprise Cloud Connect Insufficient Access Control Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-24289 | Windows Kernel Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24288 | Windows Mobile Broadband Driver Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24287 | Windows Kernel Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24285 | Win32k Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24283 | Multiple UNC Provider Kernel Driver Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24282 | Push message Routing Service Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23674 | MapUrlToZone Security Feature Bypass Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23673 | Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23672 | Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23671 | Windows Bluetooth RFCOM Protocol Driver Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23669 | RPC Runtime Library Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-24T07:00:00.000Z |
| msrc_cve-2026-23668 | Windows Graphics Component Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23667 | Broadcast DVR Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23665 | Linux Azure Diagnostic extension (LAD) Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23664 | Azure IoT Explorer Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23662 | Azure IoT Explorer Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23661 | Azure IoT Explorer Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23660 | Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23659 | Azure Data Factory Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-19T07:00:00.000Z |
| msrc_cve-2026-23658 | Azure DevOps: msazure Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-19T07:00:00.000Z |
| msrc_cve-2026-23654 | GitHub: Zero Shot SCFoundation Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-21262 | SQL Server Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-20967 | System Center Operations Manager (SCOM) Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-0385 | Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-13T07:00:00.000Z |
| msrc_cve-2026-26125 | Payment Orchestrator Service Elevation of Privilege Vulnerability | 2026-03-05T08:00:00.000Z | 2026-03-05T08:00:00.000Z |
| msrc_cve-2026-26124 | Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability | 2026-03-05T08:00:00.000Z | 2026-03-06T08:00:00.000Z |
| msrc_cve-2026-26122 | Microsoft ACI Confidential Containers Information Disclosure Vulnerability | 2026-03-05T08:00:00.000Z | 2026-03-06T08:00:00.000Z |
| msrc_cve-2026-23651 | Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability | 2026-03-05T08:00:00.000Z | 2026-03-06T08:00:00.000Z |
| msrc_cve-2026-21536 | Microsoft Devices Pricing Program Remote Code Execution Vulnerability | 2026-03-05T08:00:00.000Z | 2026-03-05T08:00:00.000Z |
| msrc_cve-2026-5201 | Gdk-pixbuf: gdk-pixbuf: denial of service via heap-based buffer overflow when processing a specially crafted jpeg image | 2026-03-02T00:00:00.000Z | 2026-04-08T01:38:43.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0366 | Kwetsbaarheid verholpen in Fortinet FortiWeb | 2025-11-15T14:57:33.774388Z | 2025-11-15T14:57:33.774388Z |
| ncsc-2025-0365 | Kwetsbaarheden verholpen in Cisco Catalyst Center | 2025-11-14T12:55:27.227262Z | 2025-11-14T12:55:27.227262Z |
| ncsc-2025-0364 | Kwetsbaarheid verholpen in Adobe Photoshop | 2025-11-12T12:17:16.207233Z | 2025-11-12T12:17:16.207233Z |
| ncsc-2025-0363 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-11-12T11:52:08.634593Z | 2025-11-12T11:56:09.924799Z |
| ncsc-2025-0362 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2025-11-11T18:35:40.376220Z | 2025-11-11T18:35:40.376220Z |
| ncsc-2025-0361 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2025-11-11T18:34:39.453615Z | 2025-11-11T18:34:39.453615Z |
| ncsc-2025-0360 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2025-11-11T18:33:13.936830Z | 2025-11-11T18:33:13.936830Z |
| ncsc-2025-0359 | Kwetsbaarheden verholpen in Microsoft Office | 2025-11-11T18:31:27.092072Z | 2025-11-11T18:31:27.092072Z |
| ncsc-2025-0358 | Kwetsbaartheden verholpen in Microsoft Windows | 2025-11-11T18:29:38.918562Z | 2025-11-11T18:29:38.918562Z |
| ncsc-2025-0357 | Kwetsbaarheden verholpen in Siemens producten | 2025-11-11T18:14:44.487803Z | 2025-11-11T18:14:44.487803Z |
| ncsc-2025-0356 | Kwetsbaarheden verholpen in SAP-producten | 2025-11-11T12:15:53.615720Z | 2025-11-11T12:15:53.615720Z |
| ncsc-2025-0355 | Kwetsbaarheden verholpen in Fortinet FortiOS en FortiProxy | 2025-11-07T10:07:28.475542Z | 2025-11-07T10:07:28.475542Z |
| ncsc-2025-0354 | Kwetsbaarheid verholpen in Cisco Identity Services Engine | 2025-11-06T12:36:51.591695Z | 2025-11-06T12:36:51.591695Z |
| ncsc-2025-0353 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-11-04T15:03:48.630084Z | 2025-11-04T15:03:48.630084Z |
| ncsc-2025-0352 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-11-04T12:53:15.358078Z | 2025-11-04T12:53:15.358078Z |
| ncsc-2025-0351 | Kwetsbaarheden verholpen in Apple MacOS | 2025-11-04T12:44:25.439757Z | 2025-11-04T12:44:25.439757Z |
| ncsc-2025-0350 | Kwetsbaarheid verholpen in CFMOTO Ride voertuigdatabeheer systemen | 2025-11-04T10:27:59.187171Z | 2025-11-04T10:27:59.187171Z |
| ncsc-2025-0349 | Kwetsbaarheden verholpen in Nagios XI | 2025-11-03T08:27:42.052256Z | 2025-11-03T08:27:42.052256Z |
| ncsc-2025-0348 | Kwetsbaarheden verholpen in Arista Networks producten | 2025-11-03T08:26:39.905306Z | 2025-11-03T08:26:39.905306Z |
| ncsc-2025-0347 | Kwetsbaarheden verholpen in IBM QRadar SIEM | 2025-11-03T08:17:18.981494Z | 2025-11-03T08:17:18.981494Z |
| ncsc-2025-0346 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2025-11-03T08:14:02.972842Z | 2025-11-03T08:14:02.972842Z |
| ncsc-2025-0345 | Kwetsbaarheden verholpen in Rockwell Automation FactoryTalk | 2025-10-31T09:35:00.469498Z | 2025-10-31T09:35:00.469498Z |
| ncsc-2025-0344 | Kwetsbaarheden verholpen in Rockwell Automation COMMS | 2025-10-31T09:34:05.069339Z | 2025-10-31T09:34:05.069339Z |
| ncsc-2025-0343 | Kwetsbaarheid verholpen in Mozilla Firefox | 2025-10-31T09:31:53.270725Z | 2025-10-31T09:31:53.270725Z |
| ncsc-2025-0342 | Kwetsbaarheden verholpen in GitLab Enterprise en Community Edition | 2025-10-27T08:08:17.974767Z | 2025-10-27T09:38:47.073257Z |
| ncsc-2025-0341 | Kwetsbaarheden verholpen in BIND 9 | 2025-10-24T08:19:45.232307Z | 2025-10-27T08:24:03.796638Z |
| ncsc-2025-0340 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2025-10-23T14:13:39.969386Z | 2025-10-23T14:13:39.969386Z |
| ncsc-2025-0339 | Kwetsbaarheden verholpen in Oracle MySQL | 2025-10-23T14:11:30.111892Z | 2025-10-23T14:11:30.111892Z |
| ncsc-2025-0338 | Kwetsbaarheden verholpen in Oracle JD Edwards EnterpriseOne Tools | 2025-10-23T13:53:27.268400Z | 2025-10-23T13:53:27.268400Z |
| ncsc-2025-0337 | Kwetsbaarheden verholpen in Oracle Java | 2025-10-23T13:51:40.686406Z | 2025-10-23T13:51:40.686406Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10417-1 | python311-deepdiff-8.6.2-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10416-1 | python313-PyMuPDF-1.27.2.2-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10415-1 | glances-common-4.5.2-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10414-1 | perl-Crypt-URandom-0.550.0-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10413-1 | firefox-esr-140.9.0-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:20423-1 | Security update for freeciv | 2026-03-23T15:34:35Z | 2026-03-23T15:34:35Z |
| opensuse-su-2026:20410-1 | Security update for exiv2 | 2026-03-23T09:44:37Z | 2026-03-23T09:44:37Z |
| opensuse-su-2026:10412-1 | python311-pydicom-3.0.2-1.1 on GA media | 2026-03-23T00:00:00Z | 2026-03-23T00:00:00Z |
| opensuse-su-2026:10411-1 | python311-dynaconf-3.2.13-1.1 on GA media | 2026-03-23T00:00:00Z | 2026-03-23T00:00:00Z |
| opensuse-su-2026:10410-1 | pnpm-10.32.1-1.1 on GA media | 2026-03-23T00:00:00Z | 2026-03-23T00:00:00Z |
| opensuse-su-2026:10409-1 | pgvector-devel-0.8.2-1.1 on GA media | 2026-03-23T00:00:00Z | 2026-03-23T00:00:00Z |
| opensuse-su-2026:10408-1 | freerdp-3.24.1-1.1 on GA media | 2026-03-23T00:00:00Z | 2026-03-23T00:00:00Z |
| opensuse-su-2026:10407-1 | azure-storage-azcopy-10.32.2-1.1 on GA media | 2026-03-23T00:00:00Z | 2026-03-23T00:00:00Z |
| opensuse-su-2026:10406-1 | lemon-3.51.3-1.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10405-1 | python314-3.14.3-3.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10404-1 | python310-3.10.20-2.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10403-1 | python311-pypdf-6.9.1-1.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10402-1 | python311-PyPDF2-2.11.1-8.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10401-1 | freeciv-3.2.4-1.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10400-1 | chromedriver-146.0.7680.153-2.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10399-1 | GraphicsMagick-1.3.46-4.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:20409-1 | Security update for harfbuzz | 2026-03-20T15:26:24Z | 2026-03-20T15:26:24Z |
| opensuse-su-2026:20408-1 | Security update for postgresql18 | 2026-03-20T14:50:43Z | 2026-03-20T14:50:43Z |
| opensuse-su-2026:20407-1 | Security update for python-orjson | 2026-03-20T12:07:21Z | 2026-03-20T12:07:21Z |
| opensuse-su-2026:20406-1 | Security update for python-tornado6 | 2026-03-20T10:53:33Z | 2026-03-20T10:53:33Z |
| opensuse-su-2026:20404-1 | Security update for curl | 2026-03-20T09:36:45Z | 2026-03-20T09:36:45Z |
| opensuse-su-2026:20405-1 | Security update for ImageMagick | 2026-03-20T09:31:54Z | 2026-03-20T09:31:54Z |
| opensuse-su-2026:20403-1 | Security update for vim | 2026-03-20T03:15:00Z | 2026-03-20T03:15:00Z |
| opensuse-su-2026:10398-1 | python311-3.11.15-3.1 on GA media | 2026-03-20T00:00:00Z | 2026-03-20T00:00:00Z |
| opensuse-su-2026:10397-1 | python311-PyJWT-2.12.1-1.1 on GA media | 2026-03-20T00:00:00Z | 2026-03-20T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:6390 | Red Hat Security Advisory: rsync security update | 2026-04-01T15:41:34+00:00 | 2026-04-09T14:38:01+00:00 |
| rhsa-2026:6385 | Red Hat Security Advisory: freerdp security update | 2026-04-01T15:01:19+00:00 | 2026-04-09T14:38:06+00:00 |
| rhsa-2026:6383 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-01T14:59:14+00:00 | 2026-04-10T11:59:05+00:00 |
| rhsa-2026:6382 | Red Hat Security Advisory: grafana security update | 2026-04-01T14:57:19+00:00 | 2026-04-10T11:59:03+00:00 |
| rhsa-2026:6384 | Red Hat Security Advisory: freerdp security update | 2026-04-01T14:55:19+00:00 | 2026-04-09T14:38:07+00:00 |
| rhsa-2026:6388 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-01T14:40:49+00:00 | 2026-04-10T11:59:05+00:00 |
| rhsa-2026:6344 | Red Hat Security Advisory: grafana security update | 2026-04-01T11:23:28+00:00 | 2026-04-10T11:59:03+00:00 |
| rhsa-2026:5876 | Red Hat Security Advisory: OpenShift Container Platform 4.19.27 packages and security update | 2026-04-01T10:19:18+00:00 | 2026-04-12T14:08:59+00:00 |
| rhsa-2026:5877 | Red Hat Security Advisory: OpenShift Container Platform 4.19.27 bug fix and security update | 2026-04-01T10:06:58+00:00 | 2026-04-02T16:39:26+00:00 |
| rhsa-2026:5878 | Red Hat Security Advisory: OpenShift Container Platform 4.19.27 bug fix and security update | 2026-04-01T09:48:10+00:00 | 2026-04-10T21:16:48+00:00 |
| rhsa-2026:6342 | Red Hat Security Advisory: thunderbird security update | 2026-04-01T09:40:38+00:00 | 2026-04-07T22:30:12+00:00 |
| rhsa-2026:5866 | Red Hat Security Advisory: OpenShift Container Platform 4.17.52 packages and security update | 2026-04-01T09:29:07+00:00 | 2026-04-12T14:08:58+00:00 |
| rhsa-2026:6341 | Red Hat Security Advisory: Red Hat build of Cryostat security update | 2026-04-01T09:19:49+00:00 | 2026-04-10T11:59:03+00:00 |
| rhsa-2026:5867 | Red Hat Security Advisory: OpenShift Container Platform 4.17.52 bug fix and security update | 2026-04-01T09:17:57+00:00 | 2026-04-02T16:39:27+00:00 |
| rhsa-2026:6340 | Red Hat Security Advisory: freerdp security update | 2026-04-01T09:08:02+00:00 | 2026-04-08T13:34:37+00:00 |
| rhsa-2026:5907 | Red Hat Security Advisory: OpenShift Container Platform 4.17.52 bug fix and security update | 2026-04-01T03:47:45+00:00 | 2026-04-10T21:16:52+00:00 |
| rhsa-2026:6311 | Red Hat Security Advisory: nginx security update | 2026-04-01T02:29:52+00:00 | 2026-04-08T14:07:10+00:00 |
| rhsa-2026:6310 | Red Hat Security Advisory: kernel security update | 2026-04-01T01:15:17+00:00 | 2026-04-08T19:38:50+00:00 |
| rhsa-2026:6309 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2026-03-31T23:31:56+00:00 | 2026-04-10T16:29:18+00:00 |
| rhsa-2026:6308 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update | 2026-03-31T22:34:16+00:00 | 2026-04-09T20:28:50+00:00 |
| rhsa-2026:6302 | Red Hat Security Advisory: nginx:1.24 security update | 2026-03-31T22:05:06+00:00 | 2026-04-08T14:07:09+00:00 |
| rhsa-2026:6301 | Red Hat Security Advisory: squid security update | 2026-03-31T20:09:21+00:00 | 2026-04-04T00:08:30+00:00 |
| rhsa-2026:6300 | Red Hat Security Advisory: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update | 2026-03-31T19:50:01+00:00 | 2026-04-10T09:03:53+00:00 |
| rhsa-2026:6285 | Red Hat Security Advisory: python3.12 security update | 2026-03-31T17:26:23+00:00 | 2026-04-11T01:47:19+00:00 |
| rhsa-2026:6286 | Red Hat Security Advisory: python3.11 security update | 2026-03-31T17:26:16+00:00 | 2026-04-11T01:47:19+00:00 |
| rhsa-2026:6283 | Red Hat Security Advisory: python3.12 security update | 2026-03-31T17:06:33+00:00 | 2026-04-11T01:47:17+00:00 |
| rhsa-2026:6292 | Red Hat Security Advisory: General availability of the satellite/iop-insights-engine-rhel9 container image | 2026-03-31T16:56:51+00:00 | 2026-04-12T14:09:03+00:00 |
| rhsa-2026:6291 | Red Hat Security Advisory: General availability of the satellite/iop-advisor-backend-rhel9 container image | 2026-03-31T16:56:50+00:00 | 2026-03-31T22:32:22+00:00 |
| rhsa-2026:6288 | Red Hat Security Advisory: General availability of the satellite/iop-remediations-rhel9 container image | 2026-03-31T16:45:29+00:00 | 2026-04-09T02:09:34+00:00 |
| rhsa-2026:6287 | Red Hat Security Advisory: General availability of the satellite/iop-advisor-frontend-rhel9 container image | 2026-03-31T16:45:05+00:00 | 2026-04-12T14:09:03+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2022-165-04 | Data Center Expert | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-03 | Conext™ Combox | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-02 | Geo SCADA Mobile | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-01 | IGSS (Interactive Graphical SCADA System) | 2022-06-14T18:30:00.000Z | 2023-03-13T18:30:00.000Z |
| sevd-2022-130-03 | Wiser Smart | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-130-02 | Saitel DP RTU | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-130-01 | PowerLogic ION Setup | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-102-01 | IGSS (Interactive Graphical SCADA System) | 2022-04-12T08:47:25.000Z | 2022-07-12T08:47:25.000Z |
| sevd-2022-102-02 | Modicon M340 Controller and Communication Modules | 2022-04-12T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2022-087-01 | SCADAPack Workbench | 2022-03-28T13:51:11.000Z | 2023-04-11T13:51:11.000Z |
| sevd-2022-067-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ for x70 | 2022-03-08T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-067-03 | Ritto Wiser™ Door | 2022-03-08T10:12:35.000Z | 2022-03-08T10:12:35.000Z |
| sevd-2022-067-02 | APC Smart-UPS SMT, SMC, SMX, SCL, SRC, XU, XP, CSH2, SURTD, SMTL, SRT, and select SRTL Series | 2022-03-08T06:30:00.000Z | 2022-06-16T18:30:00.000Z |
| sevd-2022-039-06 | Harmony/Magelis iPC Series HMI, Vijeo Designer and Vijeo Designer Basic | 2022-02-08T23:25:23.000Z | 2022-02-08T23:25:23.000Z |
| sevd-2022-039-04 | spaceLYnk, Wiser For KNX, fellerLYnk | 2022-02-08T20:32:52.000Z | 2022-03-08T20:32:52.000Z |
| sevd-2022-039-03 | Easergy P40 | 2022-02-08T17:58:55.000Z | 2022-02-08T17:58:55.000Z |
| sevd-2022-039-05 | EcoStruxure Geo SCADA Expert | 2022-02-08T17:33:44.000Z | 2022-02-08T17:33:44.000Z |
| sevd-2022-039-02 | EcoStruxure EV Charging Expert | 2022-02-08T12:36:59.000Z | 2022-02-08T12:36:59.000Z |
| sevd-2022-039-01 | IGSS (Interactive Graphical SCADA System) | 2022-02-08T07:29:58.000Z | 2022-02-08T07:29:58.000Z |
| sevd-2022-011-07 | EcoStruxure™ Power Monitoring Expert | 2022-01-11T13:20:28.000Z | 2022-01-11T13:20:28.000Z |
| sevd-2022-011-05 | ConneXium Tofino Firewall and Loadable Security Modules | 2022-01-11T12:53:54.000Z | 2022-01-11T12:53:54.000Z |
| sevd-2022-011-04 | Easergy P3 | 2022-01-11T11:28:56.000Z | 2022-01-11T11:28:56.000Z |
| sevd-2022-011-03 | Easergy P5 | 2022-01-11T11:05:25.000Z | 2022-03-02T11:05:25.000Z |
| sevd-2022-011-02 | Easergy T300 | 2022-01-11T10:48:02.000Z | 2022-01-11T10:48:02.000Z |
| sevd-2022-011-01 | Ethernet and Web server on Modicon M340 controller and Communication Modules | 2022-01-11T07:53:07.000Z | 2022-01-11T07:53:07.000Z |
| sevd-2022-011-06 | CODESYS V3 Runtime, Development System, and Gateway Vulnerabilities | 2022-01-11T07:08:13.000Z | 2023-04-11T11:30:00.000Z |
| sevd-2021-348-04 | APC by Schneider Electric Rack PDU | 2021-12-14T00:00:00.000Z | 2021-12-21T00:00:00.000Z |
| sevd-2021-348-02 | EVlink City / Parking / Smart Wallbox Charging Stations | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sevd-2021-348-01 | IGSS (Interactive Graphical SCADA System) | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sesb-2021-347-01 | Apache Log4j Vulnerabilities (Log4Shell) | 2021-12-13T09:22:58.000Z | 2022-08-09T09:22:58.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-342348 | SSA-342348: Insufficient Session Expiration Vulnerability in Siemens Products | 2025-02-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-246355 | SSA-246355: Multiple Vulnerabilities in Tableau Server Component of Opcenter Intelligence | 2025-02-11T00:00:00Z | 2025-02-14T00:00:00Z |
| ssa-224824 | SSA-224824: Denial of Service Vulnerabilities in SIMATIC S7-1200 CPU Family Before V4.7 | 2025-02-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-195895 | SSA-195895: User Enumeration Vulnerability in the Webserver of SIMATIC Products | 2025-02-11T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-111547 | SSA-111547: Cleartext Storage of Sensitive Information Vulnerability in SIPROTEC 5 | 2025-02-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-717113 | SSA-717113: Cross-Site Request Forgery (CSRF) Vulnerability in SIMATIC S7-1200 CPUs before V4.7 | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-416411 | SSA-416411: Cross-Site Scripting Vulnerability in Industrial Edge Management | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-404759 | SSA-404759: Information Disclosure Vulnerability in Siveillance Video Camera Drivers | 2025-01-14T00:00:00Z | 2025-01-15T00:00:00Z |
| ssa-314390 | SSA-314390: LDAP Injection Vulnerability in Mendix LDAP Module | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-194557 | SSA-194557: Improper Limitation of Filesystem Access through Web Server Vulnerability in SIPROTEC 5 | 2025-01-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-928984 | SSA-928984: Heap-based Buffer Overflow Vulnerability in User Management Component (UMC) | 2024-12-16T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-979056 | SSA-979056: Out of Bounds Write Vulnerability in Parasolid | 2024-12-10T00:00:00Z | 2024-12-12T00:00:00Z |
| ssa-881356 | SSA-881356: Multiple Memory Corruption Vulnerabilities in Simcenter Femap | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-800126 | SSA-800126: Deserialization Vulnerability in Siemens Engineering Platforms before V20 | 2024-12-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-730188 | SSA-730188: Multiple File Parsing Vulnerabilities in Solid Edge V2024 | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-701627 | SSA-701627: XXE Injection Vulnerabilities in COMOS | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-645131 | SSA-645131: Multiple WRL File Parsing Vulnerabilities in Teamcenter Visualization | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-620799 | SSA-620799: Denial of Service Vulnerability During BLE Pairing in SENTRON Powercenter 1000/1100 | 2024-12-10T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-392859 | SSA-392859: Local Arbitrary Code Execution Vulnerability in Siemens Engineering Platforms before V20 | 2024-12-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-384652 | SSA-384652: Cross-Site Request Forgery (CSRF) Vulnerability in RUGGEDCOM ROX II | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-128393 | SSA-128393: Firmware Decryption Vulnerability in SICAM A8000 CP-8031 and CP-8050 | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-354569 | SSA-354569: Multiple Vulnerabilities in Palo Alto Networks PAN-OS on RUGGEDCOM APE1808 Devices | 2024-11-22T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-824503 | SSA-824503: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation Before V2302.0018 and V2404.0007 | 2024-11-18T00:00:00Z | 2024-11-18T00:00:00Z |
| ssa-472448 | SSA-472448: Security Bypass Vulnerability in the SQL Client-Server Communication in Siveillance Video | 2024-11-13T00:00:00Z | 2024-11-13T00:00:00Z |
| ssa-915275 | SSA-915275: Multiple Vulnerabilities in SINEC INS Before V1.0 SP2 Update 3 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-914892 | SSA-914892: Race Condition Vulnerability in Basic Authentication Implementation of Mendix Runtime | 2024-11-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-871035 | SSA-871035: Session-Memory Deserialization Vulnerability in Siemens Engineering Platforms Before V19 | 2024-11-12T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-654798 | SSA-654798: Incorrect Authorization Vulnerability in SIMATIC CP 1543-1 Devices | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-616032 | SSA-616032: Local Privilege Escalation Vulnerability in Spectrum Power 7 Before V24Q3 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-454789 | SSA-454789: Deserialization Vulnerability in TeleControl Server Basic V3.1 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1063-1 | Security update for frr | 2026-03-26T10:36:49Z | 2026-03-26T10:36:49Z |
| suse-su-2026:1062-1 | Security update for python310 | 2026-03-26T10:36:25Z | 2026-03-26T10:36:25Z |
| suse-su-2026:1061-1 | Security update for systemd | 2026-03-26T10:35:55Z | 2026-03-26T10:35:55Z |
| suse-su-2026:1060-1 | Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP5) | 2026-03-26T10:04:45Z | 2026-03-26T10:04:45Z |
| suse-su-2026:1059-1 | Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5) | 2026-03-26T10:04:27Z | 2026-03-26T10:04:27Z |
| suse-su-2026:20936-1 | Security update for openexr | 2026-03-26T10:00:01Z | 2026-03-26T10:00:01Z |
| suse-su-2026:20935-1 | Security update for fetchmail | 2026-03-26T09:57:50Z | 2026-03-26T09:57:50Z |
| suse-su-2026:1058-1 | Security update for tomcat | 2026-03-26T09:46:45Z | 2026-03-26T09:46:45Z |
| suse-su-2026:20871-1 | Security update for docker-compose | 2026-03-26T09:12:43Z | 2026-03-26T09:12:43Z |
| suse-su-2026:20870-1 | Security update for nghttp2 | 2026-03-26T09:10:44Z | 2026-03-26T09:10:44Z |
| suse-su-2026:1057-1 | Security update for frr | 2026-03-26T08:58:49Z | 2026-03-26T08:58:49Z |
| suse-su-2026:1056-1 | Security update for nghttp2 | 2026-03-26T08:57:39Z | 2026-03-26T08:57:39Z |
| suse-su-2026:20879-1 | Security update for python-PyJWT | 2026-03-26T08:57:07Z | 2026-03-26T08:57:07Z |
| suse-su-2026:1048-1 | Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) | 2026-03-26T04:34:10Z | 2026-03-26T04:34:10Z |
| suse-su-2026:1049-1 | Security update for the Linux Kernel (Live Patch 25 for SUSE Linux Enterprise 15 SP5) | 2026-03-26T01:34:07Z | 2026-03-26T01:34:07Z |
| suse-su-2026:1046-1 | Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4) | 2026-03-25T19:34:09Z | 2026-03-25T19:34:09Z |
| suse-su-2026:20947-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-03-25T18:18:29Z | 2026-03-25T18:18:29Z |
| suse-su-2026:20842-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-03-25T18:18:29Z | 2026-03-25T18:18:29Z |
| suse-su-2026:20945-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-03-25T18:10:41Z | 2026-03-25T18:10:41Z |
| suse-su-2026:20840-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-03-25T18:10:41Z | 2026-03-25T18:10:41Z |
| suse-su-2026:20946-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-03-25T18:10:07Z | 2026-03-25T18:10:07Z |
| suse-su-2026:20841-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-03-25T18:10:07Z | 2026-03-25T18:10:07Z |
| suse-su-2026:20934-1 | Security update for python-PyJWT | 2026-03-25T18:08:28Z | 2026-03-25T18:08:28Z |
| suse-su-2026:20839-1 | Security update for python-PyJWT | 2026-03-25T18:08:28Z | 2026-03-25T18:08:28Z |
| suse-su-2026:1045-1 | Security update for the Linux Kernel (Live Patch 77 for SUSE Linux Enterprise 12 SP5) | 2026-03-25T18:04:47Z | 2026-03-25T18:04:47Z |
| suse-su-2026:1044-1 | Security update for the Linux Kernel (Live Patch 70 for SUSE Linux Enterprise 12 SP5) | 2026-03-25T17:54:43Z | 2026-03-25T17:54:43Z |
| suse-su-2026:1041-1 | Security update for the Linux Kernel | 2026-03-25T14:13:20Z | 2026-03-25T14:13:20Z |
| suse-su-2026:1040-1 | Security update for systemd | 2026-03-25T12:43:09Z | 2026-03-25T12:43:09Z |
| suse-su-2026:1039-1 | Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5) | 2026-03-25T12:34:25Z | 2026-03-25T12:34:25Z |
| suse-su-2026:20933-1 | Security update for python-ldap | 2026-03-25T10:48:13Z | 2026-03-25T10:48:13Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:3275 | Moderate: kernel security update | 2026-02-25T00:00:00Z | 2026-03-02T13:07:09Z |
| alsa-2026:3208 | Moderate: 389-ds-base security update | 2026-02-24T00:00:00Z | 2026-02-26T10:30:07Z |
| alsa-2026:3189 | Moderate: 389-ds-base security update | 2026-02-24T00:00:00Z | 2026-02-26T10:31:32Z |
| alsa-2026:3188 | Important: grafana security update | 2026-02-24T00:00:00Z | 2026-02-24T17:11:47Z |
| alsa-2026:3187 | Important: grafana-pcp security update | 2026-02-24T00:00:00Z | 2026-02-24T17:14:01Z |
| alsa-2026:3110 | Important: kernel-rt security update | 2026-02-23T00:00:00Z | 2026-02-24T13:03:08Z |
| alsa-2026:3095 | Important: protobuf security update | 2026-02-23T00:00:00Z | 2026-02-24T00:13:34Z |
| alsa-2026:3094 | Important: protobuf security update | 2026-02-23T00:00:00Z | 2026-02-24T00:07:41Z |
| alsa-2026:3092 | Important: golang-github-openprinting-ipp-usb security update | 2026-02-23T00:00:00Z | 2026-02-26T10:33:21Z |
| alsa-2026:3083 | Important: kernel security update | 2026-02-23T00:00:00Z | 2026-02-24T12:59:25Z |
| alsa-2026:3068 | Important: freerdp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:34:44Z |
| alsa-2026:3067 | Important: freerdp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:36:11Z |
| alsa-2026:3066 | Moderate: kernel security update | 2026-02-23T00:00:00Z | 2026-02-26T10:43:00Z |
| alsa-2026:3042 | Moderate: openssl security update | 2026-02-23T00:00:00Z | 2026-02-23T09:07:14Z |
| alsa-2026:3040 | Important: grafana-pcp security update | 2026-02-23T00:00:00Z | 2026-03-10T20:11:50Z |
| alsa-2026:3035 | Important: grafana-pcp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:48:18Z |
| alsa-2026:3034 | Important: munge security update | 2026-02-23T00:00:00Z | 2026-02-26T10:49:31Z |
| alsa-2026:3033 | Important: munge security update | 2026-02-23T00:00:00Z | 2026-02-26T10:51:19Z |
| alsa-2026:3032 | Important: munge security update | 2026-02-23T00:00:00Z | 2026-02-23T14:44:19Z |
| alsa-2026:3031 | Important: libpng15 security update | 2026-02-23T00:00:00Z | 2026-02-26T10:52:26Z |
| alsa-2026:2920 | Important: grafana security update | 2026-02-18T00:00:00Z | 2026-02-19T10:58:19Z |
| alsa-2026:2914 | Important: grafana security update | 2026-02-18T00:00:00Z | 2026-02-19T18:04:08Z |
| alsa-2026:2821 | Moderate: kernel-rt security update | 2026-02-17T00:00:00Z | 2026-02-18T13:25:58Z |
| alsa-2026:2799 | Moderate: php security update | 2026-02-17T00:00:00Z | 2026-02-18T13:30:42Z |
| alsa-2026:2786 | Moderate: glibc security update | 2026-02-17T00:00:00Z | 2026-02-18T13:44:36Z |
| alsa-2026:2783 | Important: nodejs:20 security update | 2026-02-17T00:00:00Z | 2026-02-23T13:24:32Z |
| alsa-2026:2782 | Important: nodejs:22 security update | 2026-02-17T00:00:00Z | 2026-02-23T13:22:00Z |
| alsa-2026:2781 | Important: nodejs:24 security update | 2026-02-17T00:00:00Z | 2026-02-18T13:51:36Z |
| alsa-2026:2776 | Moderate: edk2 security update | 2026-02-17T00:00:00Z | 2026-02-18T13:48:45Z |
| alsa-2026:2722 | Moderate: kernel security update | 2026-02-16T00:00:00Z | 2026-02-23T13:18:53Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-584 | Heap-buffer-overflow in isvcd_mark_err_slice_skip | 2025-07-31T00:09:08.538145Z | 2025-07-31T00:09:08.538507Z |
| osv-2025-580 | UNKNOWN READ in signed char Assimp::StreamReader<false, false>::Get<signed char> | 2025-07-29T00:16:41.422221Z | 2026-01-25T14:18:57.285875Z |
| osv-2025-570 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-07-23T00:17:34.356115Z | 2025-07-23T00:17:34.356449Z |
| osv-2025-565 | Heap-buffer-overflow in pcpp::IPv6Address::IPv6Address | 2025-07-21T00:09:57.314960Z | 2025-12-22T14:22:23.333531Z |
| osv-2025-564 | Heap-buffer-overflow in ndpi_match_host_subprotocol | 2025-07-21T00:03:40.000875Z | 2025-07-21T00:03:40.001170Z |
| osv-2025-550 | Use-of-uninitialized-value in CFF::cff2_cs_opset_t<cff2_cs_opset_subr_subset_t, CFF::subr_subset_param_t, CFF: | 2025-07-16T00:09:08.050994Z | 2025-07-16T00:09:08.051469Z |
| osv-2025-547 | Security exception in com.alibaba.fastjson2.JSONReader.readArray | 2025-07-15T00:09:03.936493Z | 2026-02-07T14:17:37.720783Z |
| osv-2025-544 | Heap-buffer-overflow in N_BELE_RTP::LEPolicy::get32 | 2025-07-11T00:16:53.687776Z | 2025-07-11T00:16:53.688703Z |
| osv-2025-542 | Use-of-uninitialized-value in httpEncode64_3 | 2025-07-10T00:07:45.698070Z | 2025-07-10T00:07:45.698655Z |
| osv-2025-541 | Heap-buffer-overflow in js_create_function | 2025-07-09T00:20:09.455729Z | 2025-07-09T00:20:09.456170Z |
| osv-2025-538 | Heap-double-free in policydb_destroy | 2025-07-09T00:05:37.052433Z | 2025-12-20T14:25:14.356814Z |
| osv-2025-534 | Heap-use-after-free in ih264_inter_pred_luma_horz_ssse3 | 2025-07-08T00:08:11.218515Z | 2025-07-08T00:08:11.218991Z |
| osv-2025-530 | Invalid-free in cli_pdf | 2025-07-07T00:17:21.884018Z | 2025-07-07T00:17:21.884367Z |
| osv-2025-528 | Heap-buffer-overflow in xmlnode_parser_structural_error_libxml | 2025-07-07T00:10:42.902465Z | 2025-07-07T00:10:42.902766Z |
| osv-2025-525 | UNKNOWN READ in std::__1::__function::__func<cv::PngDecoder::compose_frame | 2025-07-06T00:18:54.304371Z | 2025-07-06T00:18:54.304891Z |
| osv-2025-524 | Heap-buffer-overflow in JS_CallInternal | 2025-07-05T00:19:21.758513Z | 2025-07-05T00:19:21.758880Z |
| osv-2025-515 | Use-of-uninitialized-value in JS_DefineProperty | 2025-07-03T00:16:17.481972Z | 2025-07-03T00:16:17.482410Z |
| osv-2025-512 | Invalid-free in pdf_decodestream | 2025-07-03T00:00:40.745577Z | 2025-07-03T00:00:40.746200Z |
| osv-2025-500 | UNKNOWN READ in getUShort | 2025-06-29T00:08:49.553890Z | 2025-06-29T00:08:49.554520Z |
| osv-2025-491 | Heap-buffer-overflow in libssl.soNUMBER | 2025-06-27T00:16:09.822144Z | 2025-06-27T00:16:09.822510Z |
| osv-2025-486 | Bad-cast to cv::PngDecoder from invalid vptr | 2025-06-24T00:16:24.786334Z | 2025-06-24T00:16:24.786690Z |
| osv-2025-485 | Use-of-uninitialized-value in pcpp::IDnsResource::decodeName | 2025-06-24T00:11:04.762139Z | 2025-06-24T00:11:04.762681Z |
| osv-2025-484 | Heap-buffer-overflow in load_protocols_file_fd | 2025-06-23T00:14:46.656195Z | 2025-06-23T00:14:46.656704Z |
| osv-2025-481 | Stack-buffer-overflow in void glz::from<10000u, int>::op<glz::opts_csv{10000u, | 2025-06-20T00:15:46.185029Z | 2025-06-20T00:15:46.185445Z |
| osv-2025-480 | Stack-buffer-overflow in void glz::from<10000u, std::__1::__bit_reference<std::__1::vector<bool, std::__1 | 2025-06-20T00:14:17.007847Z | 2025-06-20T00:14:17.008310Z |
| osv-2025-469 | Use-of-uninitialized-value in ndpi_strdup | 2025-06-16T00:17:21.776120Z | 2025-06-16T00:17:21.776520Z |
| osv-2025-465 | Heap-buffer-overflow in xmlParsePubidLiteral | 2025-06-15T00:09:20.387117Z | 2025-06-15T00:09:20.387490Z |
| osv-2025-461 | Heap-buffer-overflow in xmlParsePubidLiteral | 2025-06-14T00:10:49.391511Z | 2025-06-14T00:10:49.391787Z |
| osv-2025-457 | Heap-buffer-overflow in xmlParsePubidLiteral | 2025-06-14T00:04:11.416575Z | 2025-06-14T00:04:11.417116Z |
| osv-2025-456 | Use-of-uninitialized-value in ppd_hash_option | 2025-06-12T00:10:52.355312Z | 2025-06-12T00:10:52.355684Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0097 | `unic-idna-mapping` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0096 | `unic-bidi` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0095 | `unic` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0094 | `unic-ucd-category` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0093 | `unic-char-basics` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0092 | `unic-ucd-case` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0091 | `unic-utils` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0090 | `unic-emoji-char` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0089 | `unic-ucd-name_aliases` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0088 | `unic-idna-punycode` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0087 | `unic-cli` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0086 | `unic-char` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0085 | `unic-idna` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0084 | `unic-emoji` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0083 | `unic-ucd-bidi` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0082 | `unic-normal` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0081 | `unic-char-property` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0080 | `unic-common` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0079 | `unic-ucd-hangul` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0078 | `unic-ucd-normal` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0077 | `unic-ucd` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0076 | `unic-ucd-name` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0075 | `unic-char-range` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-22T14:41:04Z |
| rustsec-2025-0074 | `unic-segment` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0073 | DoS vulnerability on `alloy_dyn_abi::TypedData` hashing | 2025-10-15T12:00:00Z | 2025-10-15T13:11:39Z |
| rustsec-2025-0072 | soundness issue and unmaintained | 2025-10-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0071 | Incorrect handling of embedded SVG and MathML leads to mutation XSS after removal | 2025-09-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0070 | Pingora MadeYouReset HTTP/2 vulnerability | 2025-09-17T12:00:00Z | 2025-09-18T07:10:31Z |
| rustsec-2025-0069 | `daemonize` is Unmaintained | 2025-09-14T12:00:00Z | 2025-09-15T14:42:32Z |
| rustsec-2025-0068 | serde_yml crate is unsound and unmaintained | 2025-09-11T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-tomcat-2023-28708 | Apache Tomcat: JSESSIONID Cookie missing secure attribute in some configurations | 2026-03-24T10:21:38.576Z | 2026-03-24T10:46:38.869Z |
| bit-mlflow-2025-15031 | Path Traversal Vulnerability in mlflow/mlflow | 2026-03-24T08:47:14.572Z | 2026-04-08T12:15:37.582Z |
| bit-parse-2026-33163 | Parse Server leaks protected fields via LiveQuery afterEvent trigger | 2026-03-20T11:37:51.448Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-33042 | Parse Server affected by empty authData bypassing credential requirement on signup | 2026-03-20T11:37:48.161Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32944 | Parse Server crash via deeply nested query condition operators | 2026-03-20T11:37:45.054Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32943 | Parse Server has a password reset token single-use bypass via concurrent requests | 2026-03-20T11:37:41.707Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32886 | Parse Server's Cloud function dispatch crashes server via prototype chain traversal | 2026-03-20T11:37:38.226Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32878 | Parse Server vulnerable to schema poisoning via prototype pollution in deep copy | 2026-03-20T11:37:35.433Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32770 | Parse Server: LiveQuery subscription with invalid regular expression crashes server | 2026-03-20T11:37:32.539Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32742 | Parse Server session creation endpoint allows overwriting server-generated session fields | 2026-03-20T11:37:29.063Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32728 | Parse Server has a stored XSS filter bypass via Content-Type MIME parameter and missing XML extension blocklist entries | 2026-03-20T11:37:25.520Z | 2026-03-20T12:05:40.000Z |
| bit-python-2026-3479 | pkgutil.get_data() does not enforce documented restrictions | 2026-03-20T09:21:01.169Z | 2026-03-20T09:47:33.381Z |
| bit-thrift-2020-13949 | 2026-03-20T09:20:15.378Z | 2026-03-20T09:47:33.381Z | |
| bit-parse-2026-32594 | Parse Server GraphQL WebSocket endpoint bypasses security middleware | 2026-03-20T09:19:20.642Z | 2026-03-20T09:47:33.381Z |
| bit-jenkins-2026-33002 | 2026-03-20T09:15:13.235Z | 2026-03-31T18:23:47.490Z | |
| bit-jenkins-2026-33001 | 2026-03-20T09:15:10.344Z | 2026-03-20T09:47:33.381Z | |
| bit-libpython-2026-3479 | pkgutil.get_data() does not enforce documented restrictions | 2026-03-20T09:14:06.576Z | 2026-03-20T09:47:33.381Z |
| bit-ceph-2025-52555 | CephFS Permission Escalation Vulnerability in Ceph Fuse mounted FS | 2026-03-20T09:05:53.515Z | 2026-03-20T09:47:33.381Z |
| bit-ceph-2024-48916 | Ceph is vulnerable to authentication bypass through RadosGW | 2026-03-20T09:05:50.770Z | 2026-03-24T15:24:05.672Z |
| bit-ceph-2024-47866 | RGW DoS attack with empty HTTP header in S3 object copy | 2026-03-20T09:05:48.271Z | 2026-03-24T15:24:05.672Z |
| bit-ceph-2022-0670 | 2026-03-20T09:05:45.618Z | 2026-03-20T09:47:33.381Z | |
| bit-ceph-2021-20288 | 2026-03-20T09:05:43.098Z | 2026-03-20T09:47:33.381Z | |
| bit-ceph-2020-1760 | 2026-03-20T09:05:40.784Z | 2026-03-20T09:47:33.381Z | |
| bit-ceph-2020-1759 | 2026-03-20T09:05:38.136Z | 2026-03-20T09:47:33.381Z | |
| bit-ceph-2020-1699 | 2026-03-20T09:05:35.402Z | 2026-03-20T09:47:33.381Z | |
| bit-ceph-2020-12059 | 2026-03-20T09:05:32.882Z | 2026-03-20T09:47:33.381Z | |
| bit-ceph-2020-10753 | 2026-03-20T09:05:30.474Z | 2026-03-20T09:47:33.381Z | |
| bit-ceph-2020-10736 | 2026-03-20T09:05:27.834Z | 2026-03-20T09:47:33.381Z | |
| bit-python-2026-4224 | Stack overflow parsing XML with deeply nested DTD content models | 2026-03-18T08:54:58.205Z | 2026-03-18T09:23:06.258Z |
| bit-python-2026-3644 | Incomplete control character validation in http.cookies | 2026-03-18T08:54:55.802Z | 2026-03-18T09:23:06.258Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ck42797 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-1229, CVE-2026-25679, CVE-2026-25934, CVE-2026-27139, CVE-2026-27142, ghsa-37cx-329c-33x3 applied in versions: 0.18.0-r1, 1.16.0-r0 | 2026-04-01T09:42:37.879665Z | 2026-03-19T07:29:02Z |
| cleanstart-2026-jd68539 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61732, CVE-2025-68121, ghsa-vvgc-356p-c3xw applied in versions: 1.7.0-r0 | 2026-04-01T09:42:09.713315Z | 2026-03-19T07:35:12Z |
| cleanstart-2026-gx29850 | Security fixes for CVE-2025-61732, CVE-2025-68121 applied in versions: 1.132.0-r0, 1.132.0-r1 | 2026-04-01T09:42:09.716696Z | 2026-03-19T07:32:54Z |
| cleanstart-2026-em40436 | Security fixes for ghsa-8v2v-wjwg-vx6r applied in versions: 1.16.3-r0 | 2026-04-01T09:42:07.970704Z | 2026-03-19T07:29:54Z |
| cleanstart-2026-kj56465 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 5.4.8-r0 | 2026-04-01T09:41:55.075579Z | 2026-03-19T07:57:48Z |
| cleanstart-2026-ax74442 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-01T09:41:13.499618Z | 2026-03-19T12:02:36Z |
| cleanstart-2026-ib04141 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq applied in versions: 3.7.2-r4, 3.7.2-r5 | 2026-04-01T09:40:40.529278Z | 2026-03-19T12:02:36Z |
| cleanstart-2026-qi69220 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-01T09:40:21.793084Z | 2026-03-19T12:02:36Z |
| cleanstart-2026-kt54860 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-01T09:40:18.425287Z | 2026-03-19T12:02:36Z |
| cleanstart-2026-il36032 | Security fixes for CVE-2025-30218, CVE-2025-49005, CVE-2025-65945, ghsa-2mjp-6q6p-2qxm, ghsa-33vc-wfww-vjfv, ghsa-43fc-jf86-j433, ghsa-4992-7rv2-5pvq, ghsa-4hjh-wcwx-xvwj, ghsa-554w-wpv2-vw27, ghsa-5gfm-wpxj-wjgq, ghsa-5jpx-9hw9-2fx4, ghsa-65ch-62r8-g69g, ghsa-869p-cjfg-cm3x, ghsa-968p-4wvh-cqc8, ghsa-9g9p-9gw9-jx7f, ghsa-9qr9-h5gf-34mp, ghsa-f269-vfmq-vjvj, ghsa-fjxv-7rqg-78g4, ghsa-g9mf-h72j-4rw9, ghsa-h25m-26qc-wcjf, ghsa-jmr7-xgp7-cmfj, ghsa-m7jm-9gc2-mpf2, ghsa-mwv6-3258-q52c, ghsa-rcmh-qjqh-p98v, ghsa-v9p9-hfj2-hcw8, ghsa-vrm6-8vpv-qv8q, ghsa-w37m-7fhw-fmv9, ghsa-xxjr-mmjv-4gpg applied in versions: 2.11.0-r0, 2.11.0-r2 | 2026-04-01T09:39:16.823043Z | 2026-03-19T12:59:29Z |
| cleanstart-2026-ix47217 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-26958, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.18.0-r0, 0.19.0-r0 | 2026-04-01T09:39:04.589001Z | 2026-03-19T12:57:20Z |
| cleanstart-2026-ad71344 | Security fixes for CVE-2024-10005, CVE-2024-10006, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.10.7-r1, 1.10.9-r0, 1.10.9-r1, 1.10.9-r2, 1.10.9-r3, 1.9.4-r0 | 2026-04-01T09:38:56.500937Z | 2026-03-20T04:46:15Z |
| cleanstart-2026-di15427 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-26958, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.18.0-r0, 0.19.0-r0 | 2026-04-01T09:38:54.759545Z | 2026-03-19T12:58:08Z |
| cleanstart-2026-dp35743 | Security fixes for CVE-2024-10005, CVE-2024-10006, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24051, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.7.10-r0, 1.7.10-r1, 1.7.10-r2, 1.7.10-r3, 1.9.4-r0 | 2026-04-01T09:38:30.680533Z | 2026-03-20T04:50:14Z |
| cleanstart-2026-om95908 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-qxp5-gwg8-xv66, ghsa-r92c-9c7f-3pj8, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.10.7-r1, 1.11.4-r0, 1.11.5-r0, 1.11.5-r1, 1.11.5-r2, 1.9.4-r0 | 2026-04-01T09:38:28.220463Z | 2026-03-20T04:48:45Z |
| cleanstart-2026-kd93706 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.25.0-r0 | 2026-04-01T09:38:28.023266Z | 2026-03-19T12:59:29Z |
| cleanstart-2026-ls00044 | Security fixes for CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-54410, CVE-2025-58181, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.3.2-r4, 2.3.2-r5, 2.4.4-r2, 2.5.0-r0, 2.5.0-r1 | 2026-04-01T09:38:02.432087Z | 2026-03-20T11:37:58Z |
| cleanstart-2026-hx97842 | Security fixes for CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-54410, CVE-2025-58181, CVE-2025-58190, CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.2.2-r6, 2.3.2-r4, 2.4.4-r2, 2.5.0-r0, 2.5.0-r1 | 2026-04-01T09:37:55.704076Z | 2026-03-20T11:37:58Z |
| cleanstart-2026-gu55430 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-9h8m-3fm2-qjrq, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.9.4-r0, 1.9.4-r1, 1.9.4-r2, 1.9.4-r3 | 2026-04-01T09:37:53.639715Z | 2026-03-20T04:52:14Z |
| cleanstart-2026-ms81166 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.4.4-r2, 2.4.4-r4, 2.5.0-r0, 2.5.0-r1 | 2026-04-01T09:37:27.717828Z | 2026-03-20T11:37:58Z |
| cleanstart-2026-ir69938 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.4.4-r2, 2.5.0-r0, 2.5.1-r0, 2.5.1-r1 | 2026-04-01T09:37:08.257134Z | 2026-03-20T11:37:58Z |
| cleanstart-2026-lb23787 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x, ghsa-p436-gjf2-799p applied in versions: 2.13.4-r0, 2.13.4-r1, 2.13.4-r2, 2.13.5-r0, 2.13.5-r1 | 2026-04-01T09:37:01.194631Z | 2026-03-22T07:08:40Z |
| cleanstart-2026-pe63912 | Security fixes for CVE-2021-3538, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.15.0-r0, 2.15.0-r1 | 2026-04-01T09:37:00.583811Z | 2026-03-22T07:02:21Z |
| cleanstart-2026-mt27167 | Security fixes for CVE-2021-3538, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.14.3-r0, 2.14.3-r1 | 2026-04-01T09:36:58.329684Z | 2026-03-22T07:06:00Z |
| cleanstart-2026-os42112 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x, ghsa-p436-gjf2-799p applied in versions: 2.12.4-r0, 2.12.4-r1, 2.13.4-r0, 2.13.4-r1, 2.13.4-r2 | 2026-04-01T09:36:49.810788Z | 2026-03-22T07:12:11Z |
| cleanstart-2026-ee52954 | Security fixes for CVE-2021-3538, CVE-2025-22871, CVE-2025-29923, CVE-2025-4673, CVE-2025-47907, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-hcg3-q754-cr77, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw applied in versions: 3.0.0.1-r2, 3.0.0.1-r3, 3.0.0.1-r4 | 2026-04-01T09:36:34.270182Z | 2026-03-22T07:36:37Z |
| cleanstart-2026-qy63788 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.14.3-r0, 2.14.3-r1 | 2026-04-01T09:36:08.453160Z | 2026-03-22T07:24:09Z |
| cleanstart-2026-kw24478 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.15.0-r0, 2.15.0-r1 | 2026-04-01T09:36:08.569651Z | 2026-03-22T07:20:42Z |
| cleanstart-2026-ap81168 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.13.4-r0, 2.13.5-r0, 2.13.5-r1 | 2026-04-01T09:35:54.838524Z | 2026-03-22T07:27:04Z |
| cleanstart-2026-jb52011 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-p77j-4mvh-x3m3 applied in versions: 1.11.1-r1, 1.11.1-r2 | 2026-04-01T09:35:29.036304Z | 2026-03-22T07:44:23Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2021-ALE-007 | [MàJ] Vulnérabilité dans Pulse Connect Secure | 2021-04-20T00:00:00.000000 | 2021-06-21T00:00:00.000000 |
| certfr-2021-ale-006 | [MàJ] Vulnérabilité dans F5 BIG-IP | 2021-03-22T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| CERTFR-2021-ALE-006 | [MàJ] Vulnérabilité dans F5 BIG-IP | 2021-03-22T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2021-ale-005 | Multiples vulnérabilités dans Microsoft DNS server | 2021-03-12T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| CERTFR-2021-ALE-005 | Multiples vulnérabilités dans Microsoft DNS server | 2021-03-12T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-004 | [MàJ] Multiples vulnérabilités dans Microsoft Exchange Server | 2021-03-03T00:00:00.000000 | 2021-07-16T00:00:00.000000 |
| CERTFR-2021-ALE-004 | [MàJ] Multiples vulnérabilités dans Microsoft Exchange Server | 2021-03-03T00:00:00.000000 | 2021-07-16T00:00:00.000000 |
| certfr-2021-ale-003 | [MàJ] Vulnérabilité dans VMware vCenter Server | 2021-02-25T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| CERTFR-2021-ALE-003 | [MàJ] Vulnérabilité dans VMware vCenter Server | 2021-02-25T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-002 | [MàJ] Vulnérabilité dans Google Chrome et Microsoft Edge | 2021-02-05T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| CERTFR-2021-ALE-002 | [MàJ] Vulnérabilité dans Google Chrome et Microsoft Edge | 2021-02-05T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2021-ale-001 | |MàJ] Vulnérabilité dans SonicWall SMA100 | 2021-02-02T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| CERTFR-2021-ALE-001 | |MàJ] Vulnérabilité dans SonicWall SMA100 | 2021-02-02T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2020-ale-026 | [MaJ] Présence de code malveillant dans SolarWinds Orion | 2020-12-14T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| CERTFR-2020-ALE-026 | [MaJ] Présence de code malveillant dans SolarWinds Orion | 2020-12-14T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2020-ale-025 | Vulnérabilité dans Fortinet FortiOS SSL-VPN | 2020-11-27T00:00:00.000000 | 2021-02-08T00:00:00.000000 |
| CERTFR-2020-ALE-025 | Vulnérabilité dans Fortinet FortiOS SSL-VPN | 2020-11-27T00:00:00.000000 | 2021-02-08T00:00:00.000000 |
| certfr-2020-ale-024 | [MaJ] Vulnérabilité dans les produits VMware | 2020-11-24T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| CERTFR-2020-ALE-024 | [MaJ] Vulnérabilité dans les produits VMware | 2020-11-24T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-023 | Multiples vulnérabilités dans Google Chrome | 2020-11-12T00:00:00.000000 | 2020-12-04T00:00:00.000000 |
| CERTFR-2020-ALE-023 | Multiples vulnérabilités dans Google Chrome | 2020-11-12T00:00:00.000000 | 2020-12-04T00:00:00.000000 |
| certfr-2020-ale-022 | [MàJ] Vulnérabilité dans Oracle Weblogic | 2020-10-30T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| CERTFR-2020-ALE-022 | [MàJ] Vulnérabilité dans Oracle Weblogic | 2020-10-30T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-021 | Vulnérabilité dans Samba | 2020-09-18T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| CERTFR-2020-ALE-021 | Vulnérabilité dans Samba | 2020-09-18T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-020 | [MàJ] Vulnérabilité dans Microsoft Netlogon | 2020-09-15T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| CERTFR-2020-ALE-020 | [MàJ] Vulnérabilité dans Microsoft Netlogon | 2020-09-15T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-019 | Recrudescence d'activité Emotet en France | 2020-09-07T00:00:00.000000 | 2021-02-09T00:00:00.000000 |
| CERTFR-2020-ALE-019 | Recrudescence d'activité Emotet en France | 2020-09-07T00:00:00.000000 | 2021-02-09T00:00:00.000000 |
| certfr-2020-ale-018 | Vulnérabilité dans Cisco ASA et FTD | 2020-07-28T00:00:00.000000 | 2020-11-05T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0274 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0273 | Multiples vulnérabilités dans Microsoft Azure | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0272 | Multiples vulnérabilités dans Microsoft .Net | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0271 | Multiples vulnérabilités dans Microsoft Windows | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0270 | Multiples vulnérabilités dans Microsoft Office | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0269 | Multiples vulnérabilités dans Curl | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0268 | Multiples vulnérabilités dans Traefik | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0267 | Multiples vulnérabilités dans Mozilla Firefox | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0266 | Multiples vulnérabilités dans VMware Tanzu | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0265 | Multiples vulnérabilités dans les produits Fortinet | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0264 | Multiples vulnérabilités dans les produits Adobe | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0263 | Vulnérabilité dans Ivanti Desktop and Server Management (DSM) | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0262 | Multiples vulnérabilités dans HPE Aruba Networking AOS-CX | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0261 | Multiples vulnérabilités dans les produits Intel | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0260 | Multiples vulnérabilités dans WordPress | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0259 | Multiples vulnérabilités dans Stormshield Network Security | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0258 | Vulnérabilité dans Microsoft CBL-Mariner | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0257 | Vulnérabilité dans Mozilla Focus | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0256 | Multiples vulnérabilités dans les produits SAP | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0255 | Multiples vulnérabilités dans les produits Siemens | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0254 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0253 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-09T00:00:00.000000 | 2026-03-09T00:00:00.000000 |
| certfr-2026-avi-0252 | Multiples vulnérabilités dans les produits Moxa | 2026-03-09T00:00:00.000000 | 2026-03-09T00:00:00.000000 |
| certfr-2026-avi-0251 | Multiples vulnérabilités dans Apache Zookeeper | 2026-03-09T00:00:00.000000 | 2026-03-09T00:00:00.000000 |
| certfr-2026-avi-0250 | Vulnérabilité dans Apereo CAS | 2026-03-09T00:00:00.000000 | 2026-03-09T00:00:00.000000 |
| certfr-2026-avi-0249 | Multiples vulnérabilités dans les produits IBM | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0248 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0247 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0246 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0245 | Vulnérabilité dans Zabbix | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000072 | Obsidian GitHub Copilot Plugin stores sensitive information in cleartext | 2025-09-05T16:52+09:00 | 2025-09-05T16:52+09:00 |
| jvndb-2025-000073 | RATOC RAID Monitoring Manager for Windows registers a Windows service with an unquoted file path | 2025-09-05T16:20+09:00 | 2025-09-05T16:20+09:00 |
| jvndb-2025-000071 | "Yahoo! Shopping" App for Android fails to restrict custom URL schemes properly | 2025-09-05T15:12+09:00 | 2025-09-05T15:12+09:00 |
| jvndb-2025-000075 | Multiple vulnerabilities in TkEasyGUI | 2025-09-05T14:53+09:00 | 2025-09-05T14:53+09:00 |
| jvndb-2025-000069 | Web Caster V130 vulnerable to cross-site request forgery | 2025-09-03T14:23+09:00 | 2025-09-03T14:23+09:00 |
| jvndb-2025-000070 | "Gunosy" App vulnerable to insertion of sensitive information into sent data | 2025-09-02T14:20+09:00 | 2025-09-09T09:51+09:00 |
| jvndb-2025-000068 | Seiko Solutions SkyBridge BASIC MB-A130 vulnerable to OS command injection | 2025-09-01T16:21+09:00 | 2025-09-01T16:21+09:00 |
| jvndb-2025-012659 | Denial-of-service (DoS) vulnerability in Konica Minolta bizhub series | 2025-09-01T15:22+09:00 | 2025-09-01T15:22+09:00 |
| jvndb-2025-000067 | Multiple vulnerabilities in multiple iND products | 2025-08-29T14:47+09:00 | 2025-08-29T14:47+09:00 |
| jvndb-2025-000066 | Improper file access permission settings in multiple i-FILTER products | 2025-08-27T19:50+09:00 | 2025-09-29T13:45+09:00 |
| jvndb-2025-000064 | Multiple vulnerabilities in SS1 | 2025-08-27T15:13+09:00 | 2025-08-27T15:13+09:00 |
| jvndb-2025-000065 | ScanSnap Manager installers vulnerable to privilege escalation | 2025-08-27T14:22+09:00 | 2025-08-27T14:22+09:00 |
| jvndb-2025-000063 | Western Digital Kitfox registers a Windows service with an unquoted file path | 2025-08-22T13:37+09:00 | 2025-08-22T13:37+09:00 |
| jvndb-2025-000062 | Multiple vulnerabilities in Group-Office | 2025-08-21T14:03+09:00 | 2025-08-21T14:03+09:00 |
| jvndb-2025-011884 | FUJIFILM Healthcare Americas Synapse Mobility vulnerable to Privilege Escalation | 2025-08-21T11:49+09:00 | 2025-08-25T10:38+09:00 |
| jvndb-2025-000061 | Multiple vulnerabilities in Movable Type | 2025-08-20T15:30+09:00 | 2025-08-20T15:30+09:00 |
| jvndb-2025-000060 | PgManage vulnerable to injection | 2025-08-18T13:40+09:00 | 2025-08-18T13:40+09:00 |
| jvndb-2025-000059 | Seagate Toolkit registers a Windows service with an unquoted file path | 2025-08-14T12:32+09:00 | 2025-08-19T14:40+09:00 |
| jvndb-2025-000058 | WordPress plugin "Advanced Custom Fields" vulnerable to HTML injection | 2025-08-08T15:29+09:00 | 2025-08-08T15:29+09:00 |
| jvndb-2025-010972 | Multiple SEIKO EPSON products use weak initial passwords | 2025-08-08T14:50+09:00 | 2025-08-08T14:50+09:00 |
| jvndb-2025-000057 | Multiple vulnerabilities in Mubit Powered BLUE 870 | 2025-08-08T14:47+09:00 | 2025-08-08T14:47+09:00 |
| jvndb-2025-010854 | Trend Micro Endpoint security products for enterprises vulnerable to multiple OS command injection | 2025-08-07T12:25+09:00 | 2025-08-19T11:36+09:00 |
| jvndb-2025-000056 | Multiple vulnerabilities in Sato label printers CL4/6NX Plus and CL4/6NX-J Plus series | 2025-08-06T16:38+09:00 | 2025-08-06T16:38+09:00 |
| jvndb-2025-010603 | Out-of-bounds write vulnerability in FUJIFILM Business Innovation MFPs | 2025-08-05T11:29+09:00 | 2025-08-05T11:29+09:00 |
| jvndb-2025-010408 | Multiple vulnerabilities in PowerCMS | 2025-08-01T12:05+09:00 | 2025-08-01T12:05+09:00 |
| jvndb-2025-000055 | ZXHN-F660T and ZXHN-F660A use a common credential for all installations | 2025-07-31T15:12+09:00 | 2025-07-31T15:12+09:00 |
| jvndb-2025-000054 | Apache Jena Fuseki vulnerable to path traversal | 2025-07-30T14:17+09:00 | 2025-07-30T14:17+09:00 |
| jvndb-2025-000053 | "SwitchBot" App vulnerable to insertion of sensitive information into log file | 2025-07-29T13:44+09:00 | 2025-07-29T13:44+09:00 |
| jvndb-2025-010056 | TP-Link VIGI NVR1104H-4P and VIGI NVR2016H-16MP vulnerable to OS command injection | 2025-07-28T17:53+09:00 | 2025-07-28T17:53+09:00 |
| jvndb-2025-000052 | TP-Link Archer C1200 vulnerable to clickjacking | 2025-07-24T14:16+09:00 | 2025-07-24T14:16+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14389 | OpenClaw信息泄露漏洞(CNVD-2026-14389) | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14387 | WordPress插件Calculated Fields Form跨站脚本漏洞 | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14386 | WordPress插件Avada Core跨站脚本漏洞 | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14385 | WordPress插件Astra Bulk Edit跨站脚本漏洞 | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14384 | WordPress插件Active Products Tables for WooCommerce跨站脚本漏洞 | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14252 | Apache Spark反序列化漏洞 | 2026-03-19 | 2026-03-19 |
| cnvd-2026-14251 | Apache Livy输入验证错误漏洞 | 2026-03-19 | 2026-03-19 |
| cnvd-2026-14250 | Zephyr缓冲区溢出漏洞 | 2026-03-19 | 2026-03-19 |
| cnvd-2026-14249 | Open5GS拒绝服务漏洞(CNVD-2026-14249) | 2026-03-19 | 2026-03-19 |
| cnvd-2026-15170 | Adobe Commerce授权问题漏洞(CNVD-2026-15170) | 2026-03-17 | 2026-03-27 |
| cnvd-2026-15169 | Adobe Commerce授权问题漏洞(CNVD-2026-15169) | 2026-03-17 | 2026-03-27 |
| cnvd-2026-15168 | Adobe Commerce授权问题漏洞(CNVD-2026-15168) | 2026-03-17 | 2026-03-27 |
| cnvd-2026-14602 | Fortinet FortiWeb操作系统命令注入漏洞(CNVD-2026-14602) | 2026-03-17 | 2026-03-17 |
| cnvd-2026-14601 | Fortinet FortiSandbox跨站脚本漏洞(CNVD-2026-14601) | 2026-03-17 | 2026-03-17 |
| cnvd-2026-14600 | Fortinet FortiSandbox Cloud操作系统命令注入漏洞 | 2026-03-17 | 2026-03-17 |
| cnvd-2026-14599 | Google Chrome WebView资源管理错误漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14598 | Google Chrome Web Speech越界读漏洞 | 2026-03-17 | 2026-03-19 |
| cnvd-2026-14597 | Google Chrome Agents资源管理错误漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14596 | Google Chrome WebMCP资源管理错误漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14595 | Google Chrome Extensions资源管理错误漏洞(CNVD-2026-14595) | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14594 | Google Chrome TextEncoding资源管理错误漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14593 | Google Chrome MediaStream内存错误引用漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14592 | Google Chrome WebMIDI内存错误引用漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14503 | Adobe Premiere Pro越界读取漏洞(CNVD-2026-14503) | 2026-03-17 | 2026-03-23 |
| cnvd-2026-14502 | Adobe Illustrator堆缓冲区溢出漏洞(CNVD-2026-14502) | 2026-03-17 | 2026-03-23 |
| cnvd-2026-14501 | Adobe Illustrator堆栈缓冲区溢出漏洞(CNVD-2026-14501) | 2026-03-17 | 2026-03-23 |
| cnvd-2026-14408 | Microsoft Excel代码执行漏洞(CNVD-2026-14408) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14394 | OpenClaw目录遍历漏洞(CNVD-2026-14394) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14393 | OpenClaw远程代码执行漏洞(CNVD-2026-14393) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14392 | OpenClaw目录遍历漏洞(CNVD-2026-14392) | 2026-03-17 | 2026-03-20 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01566 | Уязвимость функции f2fs_map_blocks() модуля fs/f2fs/data.c файловой системы F2FS ядра опе… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01565 | Уязвимость функции nfsd_splice_actor() модуля fs/nfsd/vfs.c поддержки сетевой файловой си… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01564 | Уязвимость функции ext4_io_end_defer_completion() модуля fs/ext4/page-io.c файловой сист… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01563 | Уязвимость функции hns_roce_v2_init() модуля drivers/infiniband/hw/hns/hns_roce_hw_v2.c д… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01562 | Уязвимость функции gmin_get_config_var() модуля drivers/staging/media/atomisp/pci/atomisp… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01561 | Уязвимость функции blocking_domain_set_dev_pasid() модуля drivers/iommu/intel/iommu.c дра… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01560 | Уязвимость функции dmabuf_exp_from_pages() модуля drivers/xen/gntdev-dmabuf.c драйвера ус… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01559 | Уязвимость функции panthor_gem_create_with_handle() модуля drivers/gpu/drm/panthor/pantho… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01558 | Уязвимость функции meson_encoder_hdmi_init() модуля drivers/gpu/drm/meson/meson_encoder_h… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01557 | Уязвимость функции signal_our_withdraw() модуля fs/gfs2/util.c файловой системы GFS2 ядра… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01556 | Уязвимость функции __fbnic_open() модуля drivers/net/ethernet/meta/fbnic/fbnic_netdev.c д… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01555 | Уязвимость функции scarlett2_input_select_ctl_info() модуля sound/usb/mixer_scarlett2.c п… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01554 | Уязвимость функции inet6_rt_notify() модуля net/ipv6/route.c ядра операционной системы Li… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01553 | Уязвимость функции ieee80211_link_info_change_notify() модуля net/mac80211/main.c реализа… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01550 | Уязвимость функций usbnet_stop() и usbnet_disconnect() ядра операционной системы Linux, п… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01549 | Уязвимость функций scpi_init_versions() и scpi_probe() ядра операционной системы Linux, п… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01548 | Уязвимость функции pm8001_chip_reg_dev_req() модуля drivers/scsi/pm8001/pm8001_hwi.c драй… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01547 | Уязвимость функции pm8001_send_abort_all() модуля drivers/scsi/pm8001/pm8001_hwi.c драйве… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01546 | Уязвимость функции attempt_restore_of_faulty_devices() ядра операционной системы Linux, п… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01545 | Уязвимость функций qla2x00_async_login_sp_done(), qla2x00_async_adisc_sp_done(), qla2x00_… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01544 | Уязвимость функции qla24xx_handle_plogi_done_event() модуля drivers/scsi/qla2xxx/qla_init… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01543 | Уязвимость функции qla2xxx_create_qpair() модуля drivers/scsi/qla2xxx/qla_init.c драйвера… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01542 | Уязвимость функции avic_pi_update_irte() модуля arch/x86/kvm/svm/avic.c подсистемы виртуа… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01541 | Уязвимость функции hci_sync_conn_complete_evt() модуля net/bluetooth/hci_event.c подсисте… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01540 | Уязвимость функции dp_link_settings_read() модуля drivers/gpu/drm/amd/display/amdgpu_dm/a… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01539 | Уязвимость функции mlxsw_sp_pude_event_func() модуля drivers/net/ethernet/mellanox/mlxsw/… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01538 | Уязвимость функции kfd_process_notifier_release() модуля drivers/gpu/drm/amd/amdkfd/kfd_p… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01537 | Уязвимость функции acpi_processor_get_lpi_info() модуля drivers/acpi/processor_idle.c дра… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01536 | Уязвимость функций ext4_writepage(), mpage_prepare_extent_to_map() модуля fs/ext4/inode.c… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01535 | Уязвимость функции ntfs_read_inode_mount() модуля fs/ntfs/inode.c файловой системы ядра о… | 10.02.2026 | 10.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201404-0378 | Unspecified vulnerability in Oracle Java SE 5.0u61, SE 6u71, 7u51, and 8; JRockit R27.8.1… | 2024-07-23T22:08:28.541000Z |
| var-201908-0264 | Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a den… | 2024-07-23T22:07:30.228000Z |
| var-201702-0469 | An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari be… | 2024-07-23T22:06:53.547000Z |
| var-200703-0016 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted at… | 2024-07-23T22:06:48.011000Z |
| var-201609-0595 | The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly … | 2024-07-23T22:06:46.651000Z |
| var-202004-1974 | A type confusion issue was addressed with improved memory handling. This issue is fixed i… | 2024-07-23T22:06:44.403000Z |
| var-201705-3790 | In Open vSwitch (OvS) v2.7.0, there is a buffer over-read while parsing the group mod Ope… | 2024-07-23T22:06:43.841000Z |
| var-202109-1802 | A crafted request uri-path can cause mod_proxy to forward the request to an origin server… | 2024-07-23T22:06:13.520000Z |
| var-202110-1622 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:06:10.313000Z |
| var-200905-0043 | Integer underflow in QuickDraw Manager in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7, … | 2024-07-23T22:06:10.145000Z |
| var-202203-0129 | A cookie management issue was addressed with improved state management. This issue is fix… | 2024-07-23T22:06:09.291000Z |
| var-200210-0102 | Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a deni… | 2024-07-23T22:06:08.093000Z |
| var-202009-0037 | A flaw was discovered in all versions of Undertow before Undertow 2.2.0.Final, where HTTP… | 2024-07-23T22:06:07.991000Z |
| var-201912-0619 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:06:04.230000Z |
| var-200809-0566 | Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2… | 2024-07-23T22:06:03.293000Z |
| var-202201-0424 | A validation issue was addressed with improved input sanitization. This issue is fixed in… | 2024-07-23T22:06:01.833000Z |
| var-200604-0201 | Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary c… | 2024-07-23T22:05:29.066000Z |
| var-201201-0025 | Use-after-free vulnerability in Google Chrome before 16.0.912.77 allows remote attackers … | 2024-07-23T22:05:28.758000Z |
| var-201808-0957 | Systems with microprocessors utilizing speculative execution and address translations may… | 2024-07-23T22:05:21.889000Z |
| var-202203-1400 | jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of servic… | 2024-07-23T22:05:19.247000Z |
| var-201912-0640 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:05:19.907000Z |
| var-201904-1343 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:05:19.745000Z |
| var-201007-0949 | WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before… | 2024-07-23T22:05:19.065000Z |
| var-201912-1856 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:04:56.028000Z |
| var-200904-0821 | The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products… | 2024-07-23T22:04:56.133000Z |
| var-200603-0282 | Unspecified vulnerability in Safari, LaunchServices, and/or CoreTypes in Apple Mac OS X 1… | 2024-07-23T22:04:24.723000Z |
| var-201912-0509 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:03:53.293000Z |
| var-200806-0575 | SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and … | 2024-07-23T22:03:53.151000Z |
| var-200703-0024 | Unspecified vulnerability in the authentication feature for DirectoryService (DS Plug-Ins… | 2024-07-23T22:03:53.866000Z |
| var-202005-1054 | dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by d… | 2024-07-23T22:03:49.580000Z |