Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-35403 |
6.5 (3.1)
|
LORIS has potential cross-site scripting in survey_acc… |
aces |
Loris |
2026-04-08T18:27:17.221Z | 2026-04-10T20:42:38.101Z |
| CVE-2026-34985 |
6.3 (3.1)
|
LORIS has incorrect access checks in media module |
aces |
Loris |
2026-04-08T18:22:09.927Z | 2026-04-10T20:41:48.430Z |
| CVE-2026-34723 |
8.7 (4.0)
|
Zammad has incorrect access control in getting_started… |
zammad |
zammad |
2026-04-08T18:14:08.582Z | 2026-04-10T20:40:49.909Z |
| CVE-2026-34719 |
8.3 (4.0)
|
Zammad has a Server-side request forgery (SSRF) via webhooks |
zammad |
zammad |
2026-04-08T18:02:16.224Z | 2026-04-10T20:38:50.653Z |
| CVE-2026-34166 |
3.7 (3.1)
|
LiquidJS has a Memory Limit Bypass via Quadratic Ampli… |
harttle |
liquidjs |
2026-04-08T17:52:05.849Z | 2026-04-10T20:37:03.164Z |
| CVE-2026-35407 |
5.9 (4.0)
|
Saleor has Cross-Account Email Change via Unbound Conf… |
saleor |
saleor |
2026-04-08T17:24:39.716Z | 2026-04-10T20:36:19.733Z |
| CVE-2026-32591 |
5.2 (3.1)
|
Mirror-registry: quay: server-side request forgery in … |
Red Hat |
mirror registry for Red Hat OpenShift |
2026-04-08T17:06:58.222Z | 2026-04-10T20:34:29.075Z |
| CVE-2026-40242 |
7.2 (3.1)
|
Arcane Unauthenticated SSRF with Conditional Response … |
getarcaneapp |
arcane |
2026-04-10T20:34:12.777Z | 2026-04-10T20:34:12.777Z |
| CVE-2026-33229 |
8.6 (4.0)
|
XWiki Platform affected by remote code execution with … |
xwiki |
xwiki-platform |
2026-04-08T14:53:35.977Z | 2026-04-10T20:33:15.897Z |
| CVE-2026-39408 |
5.9 (4.0)
|
Hono has a path traversal in toSSG() allows writing fi… |
honojs |
hono |
2026-04-08T14:42:25.357Z | 2026-04-10T20:31:47.508Z |
| CVE-2026-39393 |
8.1 (3.1)
|
Post-Installation Re-entry via Cache-Dependent Install… |
ci4-cms-erp |
ci4ms |
2026-04-08T14:31:44.692Z | 2026-04-10T20:29:43.521Z |
| CVE-2026-39389 |
6.7 (3.1)
|
CI4MS has a Hidden Items Authorization Bypass in Filee… |
ci4-cms-erp |
ci4ms |
2026-04-08T14:28:29.847Z | 2026-04-10T20:28:55.783Z |
| CVE-2026-28390 |
N/A
|
Possible NULL Dereference When Processing CMS KeyTrans… |
OpenSSL |
OpenSSL |
2026-04-07T22:00:54.172Z | 2026-04-10T20:26:06.061Z |
| CVE-2026-6057 |
9.8 (3.1)
|
Unauthenticated Path Traversal in FalkorDB Browser Lea… |
FalkorDB |
FalkorDB Browser |
2026-04-10T09:16:30.338Z | 2026-04-10T20:25:53.551Z |
| CVE-2026-40194 |
3.7 (3.1)
|
phpseclib has a variable-time HMAC comparison in SSH2:… |
phpseclib |
phpseclib |
2026-04-10T20:24:06.696Z | 2026-04-10T20:24:06.696Z |
| CVE-2026-34486 |
N/A
|
Apache Tomcat: Fix for CVE-2026-29146 allowed bypass o… |
Apache Software Foundation |
Apache Tomcat |
2026-04-09T19:35:35.994Z | 2026-04-10T20:20:56.605Z |
| CVE-2026-28389 |
N/A
|
Possible NULL Dereference When Processing CMS KeyAgree… |
OpenSSL |
OpenSSL |
2026-04-07T22:00:53.364Z | 2026-04-10T20:20:45.506Z |
| CVE-2026-40191 |
6.8 (4.0)
|
ClearanceKit has a policy bypass via dual-path Endpoin… |
craigjbass |
clearancekit |
2026-04-10T20:19:35.909Z | 2026-04-10T20:19:35.909Z |
| CVE-2026-28388 |
N/A
|
NULL Pointer Dereference When Processing a Delta CRL |
OpenSSL |
OpenSSL |
2026-04-07T22:00:52.382Z | 2026-04-10T20:18:43.095Z |
| CVE-2026-35655 |
6.9 (4.0)
5.7 (3.1)
|
OpenClaw < 2026.3.22 - Identity Spoofing via rawInput … |
OpenClaw |
OpenClaw |
2026-04-10T16:03:17.978Z | 2026-04-10T20:18:12.455Z |
| CVE-2026-35661 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.3.25 - Telegram DM-Scoped Inline Butto… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:22.250Z | 2026-04-10T20:18:04.127Z |
| CVE-2026-35667 |
6.9 (4.0)
6.1 (3.1)
|
OpenClaw < 2026.3.24 - Improper Process Termination vi… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:26.457Z | 2026-04-10T20:17:55.994Z |
| CVE-2026-34483 |
N/A
|
Apache Tomcat: Incomplete escaping of JSON access logs |
Apache Software Foundation |
Apache Tomcat |
2026-04-09T19:30:28.874Z | 2026-04-10T20:17:38.858Z |
| CVE-2026-28386 |
N/A
|
Out-of-bounds Read in AES-CFB-128 on X86-64 with AVX-5… |
OpenSSL |
OpenSSL |
2026-04-07T22:00:50.164Z | 2026-04-10T20:16:08.389Z |
| CVE-2026-34079 |
8.7 (4.0)
|
Flatpak affected by arbitrary file deletion on the hos… |
flatpak |
flatpak |
2026-04-07T21:29:44.601Z | 2026-04-10T20:13:47.945Z |
| CVE-2026-34020 |
N/A
|
Apache OpenMeetings: Login Credentials Passed via GET … |
Apache Software Foundation |
Apache OpenMeetings |
2026-04-09T15:52:06.599Z | 2026-04-10T20:13:47.789Z |
| CVE-2026-39922 |
5.3 (4.0)
|
GeoNode < 4.4.5, 5.0.2 SSRF via Service Registration |
GeoNode |
GeoNode |
2026-04-10T19:53:05.159Z | 2026-04-10T19:53:05.159Z |
| CVE-2026-39921 |
5.3 (4.0)
|
GeoNode < 4.4.5, 5.0.2 SSRF via Document Upload |
GeoNode |
GeoNode |
2026-04-10T19:52:49.924Z | 2026-04-10T19:52:49.924Z |
| CVE-2026-40190 |
5.6 (3.1)
|
LangSmith Client SDKs has Prototype Pollution in langs… |
langchain-ai |
langsmith-sdk |
2026-04-10T19:47:57.642Z | 2026-04-10T19:47:57.642Z |
| CVE-2026-40189 |
9.3 (4.0)
|
goshs has a file-based ACL authorization bypass in gos… |
patrickhener |
goshs |
2026-04-10T19:44:54.672Z | 2026-04-10T19:44:54.672Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-50667 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:40:56.882Z |
| CVE-2025-50668 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:40:48.569Z |
| CVE-2025-50669 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:40:41.067Z |
| CVE-2025-50670 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:40:34.059Z |
| CVE-2025-50672 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:40:26.971Z |
| CVE-2025-50673 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:40:20.741Z |
| CVE-2025-50655 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T17:41:12.166Z |
| CVE-2025-50657 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T17:42:12.056Z |
| CVE-2025-50659 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T17:42:58.903Z |
| CVE-2025-50660 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T17:43:58.901Z |
| CVE-2025-50661 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T17:48:21.475Z |
| CVE-2025-50662 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T17:52:49.377Z |
| CVE-2025-50663 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T17:57:17.682Z |
| CVE-2025-50664 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T17:58:28.733Z |
| CVE-2025-50671 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T17:47:17.026Z |
| CVE-2025-50644 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:42:24.409Z |
| CVE-2025-50645 |
7.5 (3.1)
|
A vulnerability has been discovered in D-Link DI-… |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:42:17.059Z |
| CVE-2025-50646 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:42:10.576Z |
| CVE-2025-50647 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:42:03.597Z |
| CVE-2025-50648 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:41:55.597Z |
| CVE-2025-50649 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:41:48.655Z |
| CVE-2025-50650 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:41:41.469Z |
| CVE-2025-50652 |
7.5 (3.1)
|
An issue in D-Link DI-8003 16.07.26A1 related to … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:41:34.397Z |
| CVE-2025-50653 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:41:26.891Z |
| CVE-2025-50654 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link … |
n/a |
n/a |
2026-04-08T00:00:00.000Z | 2026-04-10T15:41:20.354Z |
| CVE-2016-20043 |
8.6 (4.0)
8.4 (3.1)
|
NRSS RSS Reader 0.3.9-1 Stack Buffer Overflow |
nrss |
NRSS Reader |
2026-03-28T11:58:04.603Z | 2026-03-30T14:53:37.019Z |
| CVE-2026-35573 |
9.1 (3.1)
|
ChurchCRM has a Path traversal leads to RCE |
ChurchCRM |
CRM |
2026-04-07T17:06:07.161Z | 2026-04-08T18:49:46.996Z |
| CVE-2026-39339 |
9.1 (3.1)
|
ChurchCRM has an API Authentication Bypass |
ChurchCRM |
CRM |
2026-04-07T17:58:50.015Z | 2026-04-07T19:59:11.055Z |
| CVE-2026-35572 |
7 (4.0)
|
SSRF via Referer header in ChurchCRM allows server-sid… |
ChurchCRM |
CRM |
2026-04-07T17:07:57.506Z | 2026-04-07T19:59:43.438Z |
| CVE-2016-20044 |
8.6 (4.0)
8.4 (3.1)
|
PInfo 0.6.9-5.1 Local Buffer Overflow via -m Parameter |
pinfo |
PInfo |
2026-03-28T11:58:05.524Z | 2026-03-30T15:51:04.916Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-35631 | OpenClaw before 2026.3.22 fails to enforce operator.admin scope on mutating internal ACP chat comma… | 2026-04-09T22:16:31.790 | 2026-04-09T22:16:31.790 |
| fkie_cve-2026-35629 | OpenClaw before 2026.3.25 contains a server-side request forgery vulnerability in multiple channel … | 2026-04-09T22:16:31.603 | 2026-04-09T22:16:31.603 |
| fkie_cve-2026-35628 | OpenClaw before 2026.3.25 contains a missing rate limiting vulnerability in Telegram webhook authen… | 2026-04-09T22:16:31.423 | 2026-04-09T22:16:31.423 |
| fkie_cve-2026-35627 | OpenClaw before 2026.3.22 performs cryptographic and dispatch operations on inbound Nostr direct me… | 2026-04-09T22:16:31.240 | 2026-04-09T22:16:31.240 |
| fkie_cve-2026-35626 | OpenClaw before 2026.3.22 contains an unauthenticated resource exhaustion vulnerability in voice ca… | 2026-04-09T22:16:31.047 | 2026-04-09T22:16:31.047 |
| fkie_cve-2026-35625 | OpenClaw before 2026.3.25 contains a privilege escalation vulnerability where silent local shared-a… | 2026-04-09T22:16:30.867 | 2026-04-09T22:16:30.867 |
| fkie_cve-2026-35624 | OpenClaw before 2026.3.22 contains a policy confusion vulnerability in room authorization that matc… | 2026-04-09T22:16:30.683 | 2026-04-09T22:16:30.683 |
| fkie_cve-2026-35623 | OpenClaw before 2026.3.25 contains a missing rate limiting vulnerability in webhook authentication … | 2026-04-09T22:16:30.530 | 2026-04-09T22:16:30.530 |
| fkie_cve-2026-35622 | OpenClaw before 2026.3.22 contains an improper authentication verification vulnerability in Google … | 2026-04-09T22:16:30.340 | 2026-04-09T22:16:30.340 |
| fkie_cve-2026-35618 | OpenClaw before 2026.3.23 contains a replay identity vulnerability in Plivo V2 signature verificati… | 2026-04-09T22:16:30.143 | 2026-04-09T22:16:30.143 |
| fkie_cve-2026-35617 | OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in Google Chat group polic… | 2026-04-09T22:16:29.950 | 2026-04-09T22:16:29.950 |
| fkie_cve-2026-34512 | OpenClaw before 2026.3.25 contains an improper access control vulnerability in the HTTP /sessions/:… | 2026-04-09T22:16:29.757 | 2026-04-09T22:16:29.757 |
| fkie_cve-2026-33797 | An Improper Input Validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows… | 2026-04-09T22:16:29.547 | 2026-04-09T22:16:29.547 |
| fkie_cve-2026-33793 | An Execution with Unnecessary Privileges vulnerability in the User Interface (UI) of Juniper Networ… | 2026-04-09T22:16:29.297 | 2026-04-09T22:16:29.297 |
| fkie_cve-2026-33791 | An OS Command Injection vulnerability in the CLI processing of Juniper Networks Junos OS and Junos … | 2026-04-09T22:16:29.047 | 2026-04-09T22:16:29.047 |
| fkie_cve-2026-33790 | An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow daemon (flowd) of… | 2026-04-09T22:16:28.803 | 2026-04-09T22:16:28.803 |
| fkie_cve-2026-33788 | A Missing Authentication for Critical Function vulnerability in the Flexible PIC Concentrators (FPC… | 2026-04-09T22:16:28.593 | 2026-04-09T22:16:28.593 |
| fkie_cve-2026-33787 | An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis control daemon… | 2026-04-09T22:16:28.387 | 2026-04-09T22:16:28.387 |
| fkie_cve-2026-33786 | An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis control daemon… | 2026-04-09T22:16:28.193 | 2026-04-09T22:16:28.193 |
| fkie_cve-2026-33785 | A Missing Authorization vulnerability in the CLI of Juniper Networks Junos OS on MX Series allows a… | 2026-04-09T22:16:27.987 | 2026-04-09T22:16:27.987 |
| fkie_cve-2026-33784 | A Use of Default Password vulnerability in the Juniper Networks Support Insights (JSI) Virtual … | 2026-04-09T22:16:27.820 | 2026-04-09T22:16:27.820 |
| fkie_cve-2026-33783 | A Function Call With Incorrect Argument Type vulnerability in the sensor interface of Juniper Netwo… | 2026-04-09T22:16:27.590 | 2026-04-09T22:16:27.590 |
| fkie_cve-2026-33782 | A Missing Release of Memory after Effective Lifetime vulnerability in the DHCP daemon (jdhcpd) of J… | 2026-04-09T22:16:27.393 | 2026-04-09T22:16:27.393 |
| fkie_cve-2026-33781 | An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engi… | 2026-04-09T22:16:27.193 | 2026-04-09T22:16:27.193 |
| fkie_cve-2026-33780 | A Missing Release of Memory after Effective Lifetime vulnerability in the Layer 2 Address Learning … | 2026-04-09T22:16:26.960 | 2026-04-09T22:16:26.960 |
| fkie_cve-2026-33779 | An Improper Following of a Certificate's Chain of Trust vulnerability in J-Web of Juniper Networks … | 2026-04-09T22:16:26.720 | 2026-04-09T22:16:26.720 |
| fkie_cve-2026-33778 | An Improper Validation of Syntactic Correctness of Input vulnerability in the IPsec library used b… | 2026-04-09T22:16:26.500 | 2026-04-09T22:16:26.500 |
| fkie_cve-2026-33776 | A Missing Authorization vulnerability in the CLI of Juniper Networks Junos OS and Junos OS Evolved … | 2026-04-09T22:16:26.267 | 2026-04-09T22:16:26.267 |
| fkie_cve-2026-33775 | A Missing Release of Memory after Effective Lifetime vulnerability in the BroadBand Edge subscriber… | 2026-04-09T22:16:26.020 | 2026-04-09T22:16:26.020 |
| fkie_cve-2026-33774 | An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engi… | 2026-04-09T22:16:25.803 | 2026-04-09T22:16:25.803 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-q556-g83v-3933 |
6.5 (3.1)
|
Heap buffer overflow in WebAudio in Google Chrome prior to 147.0.7727.55 allowed a remote attacker … | 2026-04-09T00:31:59Z | 2026-04-10T21:31:13Z |
| ghsa-pvxc-vj6p-fp82 |
6.5 (3.1)
|
Heap buffer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to … | 2026-04-09T00:31:59Z | 2026-04-10T21:31:13Z |
| ghsa-3gvp-p32j-pc5m |
6.5 (3.1)
|
Heap buffer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to … | 2026-04-09T00:31:59Z | 2026-04-10T21:31:13Z |
| ghsa-x5j5-m454-hv4r |
7.6 (3.1)
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-04-08T09:31:31Z | 2026-04-10T21:31:12Z |
| ghsa-w79w-69fh-fq49 |
8.5 (3.1)
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-04-08T09:31:31Z | 2026-04-10T21:31:12Z |
| ghsa-rpg5-467j-c25q |
7.5 (3.1)
|
Issue summary: When a delta CRL that contains a Delta CRL Indicator extension is processed a NULL p… | 2026-04-08T00:30:25Z | 2026-04-10T21:31:12Z |
| ghsa-q457-vx59-3fqg |
9.1 (3.1)
|
Issue summary: Applications using AES-CFB128 encryption or decryption on systems with AVX-512 and V… | 2026-04-08T00:30:25Z | 2026-04-10T21:31:12Z |
| ghsa-px56-fpc7-fx7f |
4.3 (3.1)
|
Missing Authorization vulnerability in embedplus Youtube Embed Plus youtube-embed-plus allows Explo… | 2026-04-08T09:31:31Z | 2026-04-10T21:31:12Z |
| ghsa-jx9c-j2q7-694g |
7.6 (3.1)
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-04-08T09:31:31Z | 2026-04-10T21:31:12Z |
| ghsa-fgpp-q3px-3xhc |
7.5 (3.1)
|
Issue summary: During processing of a crafted CMS EnvelopedData message with KeyTransportRecipientI… | 2026-04-08T00:30:25Z | 2026-04-10T21:31:12Z |
| ghsa-7x88-9hgc-69gf |
7.5 (3.1)
|
Issue summary: During processing of a crafted CMS EnvelopedData message with KeyAgreeRecipientInfo … | 2026-04-08T00:30:25Z | 2026-04-10T21:31:12Z |
| ghsa-9wq4-qr6w-vc44 |
5.5 (3.1)
|
StrongBox in Android before security patch level 2026-04-05 has a vulnerability of High Severity, a… | 2026-04-06T21:31:34Z | 2026-04-10T21:31:11Z |
| ghsa-8vvr-xvj3-cpff |
4.8 (3.1)
2.2 (4.0)
|
A cross-site scripting (XSS) vulnerability has been reported to affect QuFTP Service. If a remote a… | 2026-03-20T18:31:19Z | 2026-04-10T21:31:11Z |
| ghsa-w35j-pv5h-q9q9 |
6.3 (4.0)
|
Apache Log4j's JsonTemplateLayout produces invalid JSON output when log events contain non-finite f… | 2026-04-10T18:31:18Z | 2026-04-10T21:16:54Z |
| ghsa-3pxv-7cmr-fjr4 |
6.9 (4.0)
|
Apache Log4j Core's XmlLayout fails to sanitize characters | 2026-04-10T18:31:17Z | 2026-04-10T21:16:41Z |
| ghsa-68qg-g8mg-6pr7 |
10.0 (3.1)
|
paperclip Vulnerable to Unauthenticated Remote Code Execution via Import Authorization Bypass | 2026-04-10T21:08:57Z | 2026-04-10T21:08:57Z |
| ghsa-93vf-569f-22cq |
4.7 (3.1)
|
rhukster/dom-sanitizer: SVG <style> tag allows CSS injection via unfiltered url() and @import directives | 2026-04-10T21:08:30Z | 2026-04-10T21:08:31Z |
| ghsa-2rhw-gw3f-477j |
|
DNN: Same HostGUID for all new installs | 2026-04-10T21:07:13Z | 2026-04-10T21:07:13Z |
| ghsa-fpj4-9qhx-5m6m |
4.3 (3.1)
|
DNN: Force Friend Request Acceptance | 2026-04-10T21:07:08Z | 2026-04-10T21:07:08Z |
| ghsa-8f24-v5vv-gm5j |
6.9 (4.0)
|
next-intl has an open redirect vulnerability | 2026-04-10T21:03:55Z | 2026-04-10T21:03:55Z |
| ghsa-5568-6qcg-g7fx |
7.5 (3.1)
|
Apache ActiveMQ: Denial of Service via Out of Memory vulnerability | 2026-04-10T12:31:44Z | 2026-04-10T21:01:01Z |
| ghsa-7m55-2hr4-pw78 |
6.1 (4.0)
|
Juju: In-Memory Token Store for Discharge Tokens Lacks Concurrency Safety and Persistence | 2026-04-10T21:00:35Z | 2026-04-10T21:00:35Z |
| ghsa-w5fq-8965-c969 |
9.9 (3.1)
|
Juju: CloudSpec method leaking cloud credentials | 2026-04-10T21:00:16Z | 2026-04-10T21:00:16Z |
| ghsa-75hx-xj24-mqrw |
8.2 (3.1)
|
n8n-mcp has unauthenticated session termination and information disclosure in HTTP transport | 2026-04-10T20:59:58Z | 2026-04-10T20:59:58Z |
| ghsa-ffq7-898w-9jc4 |
8.0 (3.1)
|
DotNetNuke.Core has stored cross-site-scripting (XSS) via SVG upload | 2026-04-10T20:42:48Z | 2026-04-10T20:42:48Z |
| ghsa-h3x4-hc5v-v2gm |
5.3 (4.0)
|
OpenClaw: Windows media loaders accepted remote-host file URLs before local path validation | 2026-03-26T19:07:55Z | 2026-04-10T20:42:28Z |
| ghsa-8h8f-7cxm-m38j |
7.6 (3.1)
6.9 (4.0)
|
Duplicate Advisory: OpenClaw: Windows media loaders accepted remote-host file URLs before local pat… | 2026-04-02T21:32:52Z | 2026-04-10T20:42:21Z |
| ghsa-8fgx-wgvr-pcx8 |
5.3 (3.1)
5.5 (4.0)
|
Zod jsVideoUrlParser vulnerable to ReDoS in util.js | 2026-04-10T00:30:31Z | 2026-04-10T20:34:42Z |
| ghsa-wp29-qmvj-frvp |
7.3 (3.1)
5.5 (4.0)
|
FoundationAgents MetaGPT vulnerable to os command injection via the Terminal.run_command | 2026-04-09T21:31:30Z | 2026-04-10T20:34:27Z |
| ghsa-qw5f-qpq5-ppfg |
7.3 (3.1)
5.5 (4.0)
|
FoundationAgents MetaGPT vulnerable to OS Command Injection in metagpt/utils/common.py | 2026-04-09T21:31:30Z | 2026-04-10T20:27:58Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-204 |
8.1 (3.1)
|
TorchGeo Remote Code Execution Vulnerability | torchgeo | 2024-11-12T18:15:45+00:00 | 2025-01-19T19:19:01.299352+00:00 |
| pysec-2024-203 |
7.5 (3.1)
|
DuckDB is a SQL database management system. In versions 1.0.0 and prior, content in files… | duckdb | 2024-07-24T18:15:05+00:00 | 2025-01-19T19:18:58.299130+00:00 |
| pysec-2024-202 |
6.5 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-11-05T19:15:07+00:00 | 2025-01-19T16:22:59.212853+00:00 |
| pysec-2024-201 |
6.1 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-11-05T19:15:05+00:00 | 2025-01-19T16:22:59.154645+00:00 |
| pysec-2024-200 |
7.2 (3.1)
|
JupyterHub is software that allows one to create a multi-user server for Jupyter notebook… | jupyterhub | 2024-08-08T15:15:17+00:00 | 2025-01-19T16:22:58.171761+00:00 |
| pysec-2024-199 |
3.7 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T16:22:57.938459+00:00 |
| pysec-2024-198 |
4.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:11+00:00 | 2025-01-19T16:22:57.845317+00:00 |
| pysec-2024-197 |
5.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T16:22:57.732726+00:00 |
| pysec-2024-196 |
8.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T16:22:57.640183+00:00 |
| pysec-2024-195 |
5.5 (3.1)
|
Use of Web Browser Cache Containing Sensitive Information vulnerability in Apache Airflow… | apache-airflow | 2024-06-14T09:15:09+00:00 | 2025-01-19T16:22:56.419822+00:00 |
| pysec-2024-194 |
6.1 (3.1)
|
A clickjacking vulnerability exists in zenml-io/zenml versions up to and including 0.55.5… | zenml | 2024-06-06T19:15:54+00:00 | 2025-01-19T13:22:31.835293+00:00 |
| pysec-2024-193 |
3.3 (3.1)
|
An issue was discovered in zenml-io/zenml versions up to and including 0.55.4. Due to imp… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-19T13:22:31.701775+00:00 |
| pysec-2024-192 |
|
An issue was discovered in llama_index before 0.10.38. download/integration.py includes a… | llama-index | 2024-08-22T20:15:10+00:00 | 2025-01-19T13:22:29.175614+00:00 |
| pysec-2024-191 |
5.5 (3.1)
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2024-10-24T22:15:04+00:00 | 2025-01-19T10:22:29.812605+00:00 |
| pysec-2024-190 |
8.8 (3.1)
|
Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenti… | apache-airflow | 2024-07-17T08:15:02+00:00 | 2025-01-19T07:21:16.859034+00:00 |
| pysec-2024-189 |
5.4 (3.1)
|
Apache Airflow versions before 2.9.3 have a vulnerability that allows an authenticated at… | apache-airflow | 2024-07-17T08:15:01+00:00 | 2025-01-19T07:21:16.796301+00:00 |
| pysec-2024-188 |
6.1 (3.1)
|
WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Lo… | webob | 2024-08-14T21:15:17+00:00 | 2025-01-19T04:23:01.908824+00:00 |
| pysec-2024-187 |
9.8 (3.1)
|
virtualenv before 20.26.6 allows command injection through the activation scripts for a v… | virtualenv | 2024-11-24T16:15:06+00:00 | 2025-01-19T04:23:01.784352+00:00 |
| pysec-2024-186 |
6.5 (3.1)
|
RestrictedPython is a restricted execution environment for Python to run untrusted code. … | restrictedpython | 2024-09-30T16:15:09+00:00 | 2025-01-19T04:23:01.259448+00:00 |
| pysec-2024-185 |
|
Nebari through 2024.4.1 prints the temporary Keycloak root password. | nebari | 2024-05-06T00:15:10+00:00 | 2025-01-19T04:23:00.951638+00:00 |
| pysec-2024-184 |
7.5 (3.1)
|
A local file inclusion vulnerability exists in the JSON component of gradio-app/gradio ve… | gradio | 2024-06-06T18:15:18+00:00 | 2025-01-19T04:23:00.017053+00:00 |
| pysec-2024-183 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-11-06T15:15:11+00:00 | 2025-01-19T04:22:59.576907+00:00 |
| pysec-2024-182 |
|
Apache Airflow versions before 2.10.3 contain a vulnerability that could expose sensitive… | apache-airflow | 2024-11-15T09:15:14+00:00 | 2025-01-19T04:22:59.398988+00:00 |
| pysec-2024-181 |
6.1 (3.1)
|
Apache Airflow, versions before 2.10.0, have a vulnerability that allows the developer of… | apache-airflow | 2024-08-21T16:15:08+00:00 | 2025-01-19T04:22:59.351008+00:00 |
| pysec-2024-180 |
5.4 (3.1)
|
Stored XSS in organizer and event settings of pretix up to 2024.7.0 allows malicious even… | pretix | 2024-08-23T15:15:17+00:00 | 2025-01-19T01:52:24.493530+00:00 |
| pysec-2024-179 |
4.8 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-03-18T22:15:07+00:00 | 2025-01-19T01:52:24.377662+00:00 |
| pysec-2024-178 |
7.5 (3.1)
|
Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to version 2… | litestar | 2024-11-20T21:15:08+00:00 | 2025-01-19T01:52:23.772726+00:00 |
| pysec-2024-177 |
9.8 (3.1)
|
Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach… | langflow | 2024-06-10T20:15:15+00:00 | 2025-01-19T01:52:23.722576+00:00 |
| pysec-2024-176 |
6.1 (3.1)
|
A reflected Cross-Site Scripting (XSS) vulnerability was identified in zenml-io/zenml ver… | zenml | 2024-06-30T16:15:03+00:00 | 2025-01-18T22:21:45.122426+00:00 |
| pysec-2024-175 |
|
WordOps through 3.20.0 has a wo/cli/plugins/stack_pref.py TOCTOU race condition because t… | wordops | 2024-05-06T00:15:10+00:00 | 2025-01-18T22:21:44.991242+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33769 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.558897Z |
| gsd-2024-33768 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.521409Z |
| gsd-2024-33767 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.454953Z |
| gsd-2024-33766 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.508057Z |
| gsd-2024-33765 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.328589Z |
| gsd-2024-33764 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.348731Z |
| gsd-2024-33763 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.335356Z |
| gsd-2024-33762 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.364877Z |
| gsd-2024-33761 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.399777Z |
| gsd-2024-33760 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.533361Z |
| gsd-2024-33759 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.447890Z |
| gsd-2024-33758 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.500910Z |
| gsd-2024-33757 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.319530Z |
| gsd-2024-33756 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.430035Z |
| gsd-2024-33755 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.436135Z |
| gsd-2024-33754 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.379823Z |
| gsd-2024-33753 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.430763Z |
| gsd-2024-33752 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.406190Z |
| gsd-2024-33751 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.370177Z |
| gsd-2024-33750 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.304976Z |
| gsd-2024-33749 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.584613Z |
| gsd-2024-33748 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.439408Z |
| gsd-2024-33747 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.485640Z |
| gsd-2024-33746 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.376327Z |
| gsd-2024-33745 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.468253Z |
| gsd-2024-33744 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.543395Z |
| gsd-2024-33743 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.488662Z |
| gsd-2024-33742 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.321372Z |
| gsd-2024-33741 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.568527Z |
| gsd-2024-33740 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.479260Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2382 | Malicious code in osc-datagrid-validator (npm) | 2026-03-24T15:54:42Z | 2026-04-07T14:41:24Z |
| mal-2026-2381 | Malicious code in onb-enrichment (npm) | 2026-03-24T15:54:10Z | 2026-04-07T14:41:24Z |
| mal-2026-2326 | Malicious code in raydium-bs58 (npm) | 2026-04-01T09:11:09Z | 2026-04-07T14:41:24Z |
| mal-2026-2499 | Malicious code in nerite-security-audit (npm) | 2026-04-06T09:23:07Z | 2026-04-07T14:41:23Z |
| mal-2026-2449 | Malicious code in mgc (npm) | 2026-04-03T11:03:27Z | 2026-04-07T14:41:23Z |
| mal-2026-2417 | Malicious code in oc-navbar-module-client (npm) | 2026-03-24T09:07:11Z | 2026-04-07T14:41:23Z |
| mal-2026-2416 | Malicious code in oc-ccp-module-client (npm) | 2026-03-24T09:06:39Z | 2026-04-07T14:41:23Z |
| mal-2026-2415 | Malicious code in oc-aa-module-client (npm) | 2026-03-24T09:06:03Z | 2026-04-07T14:41:23Z |
| mal-2026-2380 | Malicious code in nodecognivault (npm) | 2026-03-24T15:53:30Z | 2026-04-07T14:41:23Z |
| mal-2026-2379 | Malicious code in node-neurograde (npm) | 2026-03-24T15:53:27Z | 2026-04-07T14:41:23Z |
| mal-2026-2378 | Malicious code in node-multer (npm) | 2026-03-24T15:53:26Z | 2026-04-07T14:41:23Z |
| mal-2026-2377 | Malicious code in no-function-declare-after-return (npm) | 2026-03-24T15:53:17Z | 2026-04-07T14:41:23Z |
| mal-2026-2376 | Malicious code in nf-promise-state-machine (npm) | 2026-03-24T15:53:12Z | 2026-04-07T14:41:23Z |
| mal-2026-2375 | Malicious code in nf-console (npm) | 2026-03-24T15:53:11Z | 2026-04-07T14:41:23Z |
| mal-2026-2374 | Malicious code in my-not-little-durgham (npm) | 2026-03-24T15:52:27Z | 2026-04-07T14:41:23Z |
| mal-2026-2373 | Malicious code in my-little-durgham (npm) | 2026-03-24T15:52:26Z | 2026-04-07T14:41:23Z |
| mal-2026-2372 | Malicious code in mollie-api-adapter-poc (npm) | 2026-03-24T15:51:57Z | 2026-04-07T14:41:23Z |
| mal-2026-2371 | Malicious code in merchant-rps (npm) | 2026-03-24T15:51:44Z | 2026-04-07T14:41:23Z |
| mal-2026-2370 | Malicious code in mcc-data (npm) | 2026-03-24T15:51:27Z | 2026-04-07T14:41:23Z |
| mal-2026-2369 | Malicious code in loadshh (npm) | 2026-03-24T15:50:45Z | 2026-04-07T14:41:23Z |
| mal-2026-2328 | Malicious code in mcp-server-todo (npm) | 2026-04-01T11:23:23Z | 2026-04-07T14:41:23Z |
| mal-2026-2414 | Malicious code in ftapi-core (npm) | 2026-03-24T09:05:38Z | 2026-04-07T14:41:22Z |
| mal-2026-2368 | Malicious code in json-mapping-token (npm) | 2026-03-24T15:49:41Z | 2026-04-07T14:41:22Z |
| mal-2026-2367 | Malicious code in json-mapping-fetch (npm) | 2026-03-24T15:49:40Z | 2026-04-07T14:41:22Z |
| mal-2026-2366 | Malicious code in ghost-module (npm) | 2026-03-24T15:47:13Z | 2026-04-07T14:41:22Z |
| mal-2026-2325 | Malicious code in jonas-prettier-logger (npm) | 2026-04-01T09:10:18Z | 2026-04-07T14:41:22Z |
| mal-2026-2324 | Malicious code in jellyfi-pino-pretty-logger (npm) | 2026-04-01T09:10:18Z | 2026-04-07T14:41:22Z |
| mal-2026-2498 | Malicious code in df-sandbox-test (npm) | 2026-04-06T09:18:00Z | 2026-04-07T14:41:21Z |
| mal-2026-2497 | Malicious code in commerce-utils (npm) | 2026-04-06T09:11:24Z | 2026-04-07T14:41:21Z |
| mal-2026-2496 | Malicious code in chess-sec-ssrf1 (npm) | 2026-04-06T06:10:44Z | 2026-04-07T14:41:21Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0484 | ImageMagick: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0479 | Red Hat OpenShift Service Mesh (Kiali): Schwachstelle ermöglicht Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0462 | Linux Kernel: Mehrere Schwachstellen | 2026-02-18T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0405 | Grafana: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0362 | Red Hat Enterprise Linux (Lodash): Schwachstelle ermöglicht Denial of Service | 2026-02-10T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0345 | Golang Go: Mehrere Schwachstellen | 2026-02-08T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0327 | Asterisk: Mehrere Schwachstellen | 2026-02-05T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0326 | Red Hat Self-service automation portal for Ansible Automation Platform: Schwachstelle ermöglicht Manipulation von Dateien | 2026-02-05T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0306 | Red Hat Enterprise Linux (pyasn1): Schwachstelle ermöglicht Denial of Service | 2026-02-04T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0269 | SaltStack Salt: Mehrere Schwachstellen | 2026-02-01T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0743 | OpenClaw: Mehrere Schwachstellen | 2026-03-16T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0727 | OpenClaw: Mehrere Schwachstellen | 2026-03-15T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0711 | OpenClaw: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0691 | OpenClaw: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0882 | GIMP: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0881 | IBM License Metric Tool: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0878 | FreeBSD Project FreeBSD OS: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0873 | docker: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0869 | SolarWinds Platform: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0865 | Keycloak: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0849 | ImageMagick: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-03-24T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0837 | Google Chrome: Mehrere Schwachstellen | 2026-03-23T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0833 | Ruby on Rails: Mehrere Schwachstellen | 2026-03-23T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0831 | systemd: Mehrere Schwachstellen | 2026-03-23T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0821 | Keycloak: Mehrere Schwachstellen | 2026-03-22T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0816 | Apache ActiveMQ Artemis: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-22T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0787 | Keycloak: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0785 | libarchive: Schwachstelle ermöglicht Denial of Service | 2026-03-18T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0781 | Drupal Automated Logout Extension: Schwachstelle ermöglicht Manipulation von Dateien | 2026-03-18T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0775 | nghttp2: Schwachstelle ermöglicht Denial of Service | 2026-03-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-027-03 | Schneider Electric Zigbee Products | 2026-01-13T08:00:00.000000Z | 2026-01-27T20:13:34.637968Z |
| icsa-26-027-02 | Festo Didactic SE MES PC | 2024-02-27T12:00:00.000000Z | 2026-01-27T16:20:28.099631Z |
| icsa-26-027-04 | Johnson Controls Metasys Products | 2026-01-27T07:00:00.000000Z | 2026-01-27T07:00:00.000000Z |
| icsa-26-022-01 | Schneider Electric | 2026-01-13T08:00:00.000000Z | 2026-01-22T17:29:46.950679Z |
| icsa-26-022-08 | EVMAPA | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-07 | Delta Electronics DIAView | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-06 | Hubitat Elevation Hubs | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-05 | Weintek cMT X Series HMI EasyWeb Service | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-04 | Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-03 | Rockwell Automation CompactLogix 5370 | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-02 | AutomationDirect CLICK Programmable Logic Controller | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-25-352-08 | Axis Communications Camera Station Pro, Camera Station, and Device Manager (Update B) | 2025-12-18T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-24-326-04 | Schneider Electric Modicon M340, MC80, and Momentum Unity M1E (Update B) | 2024-11-12T05:00:00.000000Z | 2026-01-20T15:49:53.166459Z |
| icsa-26-020-02 | Schneider Electric devices using CODESYS Runtime | 2023-07-11T07:15:18.000000Z | 2026-01-20T15:49:51.778731Z |
| icsa-26-020-03 | Rockwell Automation Verve Asset Manager | 2026-01-20T07:00:00.000000Z | 2026-01-20T07:00:00.000000Z |
| va-26-015-01 | NOAA PMEL Live Access Server (LAS) command injection | 2026-01-15T19:59:37Z | 2026-01-15T19:59:37Z |
| icsa-26-015-01 | AVEVA Process Optimization | 2026-01-15T07:00:00.000000Z | 2026-01-15T07:00:00.000000Z |
| icsa-24-135-04 | Mitsubishi Electric Multiple FA Engineering Software Products (Update E) | 2024-05-14T06:00:00.000000Z | 2026-01-15T07:00:00.000000Z |
| icsa-26-015-08 | Siemens Industrial Edge Devices | 2026-01-13T00:00:00.000000Z | 2026-01-14T23:03:52.355094Z |
| icsa-26-015-02 | Festo Firmware | 2022-11-29T11:49:00.000000Z | 2026-01-14T22:46:49.184310Z |
| icsa-26-015-07 | Siemens RUGGEDCOM APE1808 Devices | 2026-01-13T00:00:00.000000Z | 2026-01-14T22:35:44.478578Z |
| icsa-26-015-06 | Siemens SINEC Security Monitor | 2025-12-09T00:00:00.000000Z | 2026-01-14T22:35:44.907344Z |
| icsa-26-015-05 | Siemens RUGGEDCOM ROS | 2025-12-09T00:00:00.000000Z | 2026-01-14T22:35:44.058931Z |
| icsa-26-015-03 | Siemens TeleControl Server Basic | 2026-01-13T00:00:00.000000Z | 2026-01-14T22:32:36.777247Z |
| icsa-25-226-09 | Siemens RUGGEDCOM APE1808 | 2025-08-12T00:00:00.000000Z | 2026-01-14T22:05:42.880807Z |
| icsa-25-072-09 | Siemens OPC UA | 2025-03-11T00:00:00.000000Z | 2026-01-14T22:05:42.018496Z |
| icsa-24-354-04 | Siemens User Management Component | 2024-12-16T00:00:00.000000Z | 2026-01-14T22:05:42.437898Z |
| icsa-25-289-10 | Siemens HyperLynx and Industrial Edge App Publisher | 2025-10-14T00:00:00.000000Z | 2026-01-14T22:05:41.165529Z |
| icsa-25-162-04 | Siemens SCALANCE and RUGGEDCOM | 2025-06-10T00:00:00.000000Z | 2026-01-14T22:05:41.593078Z |
| icsa-24-074-05 | Siemens RUGGEDCOM APE1808 | 2024-03-12T00:00:00.000000Z | 2026-01-14T22:00:12.208787Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-asa-ftd-ios-dos-doeshwhy | Cisco IOS, IOS XE, Secure Firewall Adaptive Security Appliance, and Secure Firewall Threat Defense Software IKEv2 Denial of Service Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-ftd-acl-bypass-mtpze9yh | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Access Control Rules Bypass Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-buffer-overflow-pyruhwbc | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Web Services Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-webex-join-ynxfqhk4 | Cisco Webex Meeting Client Join Certificate Validation Vulnerability | 2025-08-06T16:00:00+00:00 | 2025-08-06T16:00:00+00:00 |
| cisco-sa-ise_xss_acc_cont-ysr4ut4u | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2025-08-06T16:00:00+00:00 | 2025-08-06T16:00:00+00:00 |
| cisco-sa-20170629-snmp | SNMP Remote Code Execution Vulnerabilities in Cisco IOS and IOS XE Software | 2017-06-29T16:00:00+00:00 | 2025-07-30T16:27:06+00:00 |
| cisco-sa-ise-unauth-rce-zad2gnj6 | Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities | 2025-06-25T16:00:00+00:00 | 2025-07-24T23:30:31+00:00 |
| cisco-sa-piepnm-bsi-25jjqsbb | Cisco Prime Infrastructure and Evolved Programmable Network Manager Blind SQL Injection Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-ise-multi-3vpsxoxo | Cisco Identity Services Engine Authenticated Remote Code Execution and Authorization Bypass Vulnerabilities | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-cuis-ssrf-jsudjev | Cisco Unified Intelligence Center Server-Side Request Forgery Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-cuis-file-upload-uhnetstm | Cisco Unified Intelligence Center Arbitrary File Upload Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-spaces-conn-privesc-kgd2ccdu | Cisco Spaces Connector Privilege Escalation Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-ece-xss-cbtkteyc | Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-cucm-ssh-m4ubdpe7 | Cisco Unified Communications Manager Static SSH Credentials Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-ise-stored-xss-yff54m73 | Cisco Identity Services Stored Cross-Site Scripting Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-06-30T15:08:59+00:00 |
| cisco-sa-ise-auth-bypass-mvfkvqau | Cisco Identity Services Engine Authorization Bypass Vulnerability | 2025-06-25T16:00:00+00:00 | 2025-06-25T16:00:00+00:00 |
| cisco-sa-ise-file-upload-p4m8vwxy | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-23T19:16:21+00:00 |
| cisco-sa-meraki-mx-vpn-dos-sm5gcfm7 | Cisco Meraki MX and Z Series AnyConnect VPN with Client Certificate Authentication Denial of Service Vulnerability | 2025-06-18T16:00:00+00:00 | 2025-06-18T16:00:00+00:00 |
| cisco-sa-clamav-udf-hmwd9ndy | ClamAV UDF File Parsing Out-of-Bounds Read Information Disclosure Vulnerability | 2025-06-18T16:00:00+00:00 | 2025-06-18T16:00:00+00:00 |
| cisco-sa-erlang-otp-ssh-xyzzy | Multiple Cisco Products Unauthenticated Remote Code Execution in Erlang/OTP SSH Server: April 2025 | 2025-04-22T21:45:00+00:00 | 2025-06-11T14:40:37+00:00 |
| cisco-sa-wlc-file-uplpd-rhzg9ufc | Cisco IOS XE Wireless Controller Software Arbitrary File Upload Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-06-06T20:02:48+00:00 |
| cisco-sa-ise-aws-static-cred-fpmjucm7 | Cisco Identity Services Engine on Cloud Platforms Static Credential Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-05T17:26:25+00:00 |
| cisco-sa-vos-command-inject-65s2ucyy | Cisco Unified Communications Products Command Injection Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ucs-ssh-priv-esc-2mzdtdjm | Cisco Integrated Management Controller Privilege Escalation Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-uccx-multi-uhotvpgl | Cisco Unified Contact Center Express Vulnerabilities | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-uccx-editor-rce-ezyyzte8 | Cisco Unified Contact Center Express Editor Remote Code Execution Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-te-endagent-filewrt-zncdqnrj | Cisco ThousandEyes Endpoint Agent for Windows Arbitrary File Delete Vulnerabilities | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ndfc-shkv-snqjtjrp | Cisco Nexus Dashboard Fabric Controller SSH Host Key Validation Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-icm-xss-cfcqhxag | Cisco Unified Intelligent Contact Management Enterprise Cross-Site Scripting Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ccp-info-disc-zygerqpd | Cisco Customer Collaboration Platform Information Disclosure Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-37801 | spi: spi-imx: Add check for spi_imx_setupxfer() | 2025-05-02T00:00:00.000Z | 2026-03-31T15:19:02.000Z |
| msrc_cve-2024-40989 | KVM: arm64: Disassociate vcpus from redistributor region on teardown | 2024-07-01T07:00:00.000Z | 2026-03-31T15:18:59.000Z |
| msrc_cve-2025-37800 | driver core: fix potential NULL pointer dereference in dev_uevent() | 2025-05-02T00:00:00.000Z | 2026-03-31T15:18:56.000Z |
| msrc_cve-2024-40966 | tty: add the option to have a tty reject a new ldisc | 2024-07-01T07:00:00.000Z | 2026-03-31T15:18:54.000Z |
| msrc_cve-2025-5791 | Users: `root` appended to group listings | 2025-06-02T00:00:00.000Z | 2026-03-31T15:18:51.000Z |
| msrc_cve-2022-48816 | SUNRPC: lock against ->sock changing during sysfs read | 2024-07-01T07:00:00.000Z | 2026-03-31T15:18:48.000Z |
| msrc_cve-2024-41008 | drm/amdgpu: change vm->task_info handling | 2024-07-01T07:00:00.000Z | 2026-03-31T15:18:45.000Z |
| msrc_cve-2025-39940 | dm-stripe: fix a possible integer overflow | 2025-10-02T00:00:00.000Z | 2026-03-31T15:18:42.000Z |
| msrc_cve-2025-39932 | smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work) | 2025-10-02T00:00:00.000Z | 2026-03-31T15:18:35.000Z |
| msrc_cve-2025-21870 | ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers | 2025-03-02T00:00:00.000Z | 2026-03-31T15:18:35.000Z |
| msrc_cve-2025-21888 | RDMA/mlx5: Fix a WARN during dereg_mr for DM type | 2025-03-02T00:00:00.000Z | 2026-03-31T15:18:28.000Z |
| msrc_cve-2025-13462 | tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling | 2026-03-02T00:00:00.000Z | 2026-03-31T15:18:28.000Z |
| msrc_cve-2025-55554 | pytorch v2.8.0 was discovered to contain an integer overflow in the component torch.nan_to_num-.long(). | 2025-09-02T00:00:00.000Z | 2026-03-31T15:18:27.000Z |
| msrc_cve-2026-4519 | webbrowser.open() allows leading dashes in URLs | 2026-03-02T00:00:00.000Z | 2026-03-31T15:18:21.000Z |
| msrc_cve-2025-55551 | An issue in the component torch.linalg.lu of pytorch v2.8.0 allows attackers to cause a Denial of Service (DoS) when performing a slice operation. | 2025-09-02T00:00:00.000Z | 2026-03-31T15:18:19.000Z |
| msrc_cve-2024-49937 | wifi: cfg80211: Set correct chandef when starting CAC | 2024-10-01T07:00:00.000Z | 2026-03-31T15:18:17.000Z |
| msrc_cve-2024-35808 | md/dm-raid: don't call md_reap_sync_thread() directly | 2024-05-02T07:00:00.000Z | 2026-03-31T15:18:17.000Z |
| msrc_cve-2025-69720 | CVE-2025-69720 | 2026-03-02T00:00:00.000Z | 2026-03-31T15:18:12.000Z |
| msrc_cve-2024-39508 | io_uring/io-wq: Use set_bit() and test_bit() at worker->flags | 2024-07-01T07:00:00.000Z | 2026-03-31T15:18:10.000Z |
| msrc_cve-2024-49939 | wifi: rtw89: avoid to add interface to list twice when SER | 2024-10-01T07:00:00.000Z | 2026-03-31T15:18:09.000Z |
| msrc_cve-2024-26866 | spi: lpspi: Avoid potential use-after-free in probe() | 2024-04-02T07:00:00.000Z | 2026-03-31T15:18:08.000Z |
| msrc_cve-2025-21976 | fbdev: hyperv_fb: Allow graceful removal of framebuffer | 2025-04-02T00:00:00.000Z | 2026-03-31T15:18:02.000Z |
| msrc_cve-2026-33056 | tar-rs: unpack_in can chmod arbitrary directories by following symlinks | 2026-03-02T00:00:00.000Z | 2026-03-31T15:18:00.000Z |
| msrc_cve-2024-50248 | ntfs3: Add bounds checking to mi_enum_attr() | 2024-11-02T00:00:00.000Z | 2026-03-31T15:17:59.000Z |
| msrc_cve-2024-38620 | Bluetooth: HCI: Remove HCI_AMP support | 2024-06-02T07:00:00.000Z | 2026-03-31T15:17:59.000Z |
| msrc_cve-2024-26893 | firmware: arm_scmi: Fix double free in SMC transport cleanup path | 2024-04-02T07:00:00.000Z | 2026-03-31T15:17:57.000Z |
| msrc_cve-2024-36951 | drm/amdkfd: range check cp bad op exception interrupts | 2024-05-02T07:00:00.000Z | 2026-03-31T15:17:49.000Z |
| msrc_cve-2024-49925 | fbdev: efifb: Register sysfs groups through driver core | 2024-10-01T07:00:00.000Z | 2026-03-31T15:17:48.000Z |
| msrc_cve-2025-21658 | btrfs: avoid NULL pointer dereference if no valid extent tree | 2025-01-02T00:00:00.000Z | 2026-03-31T15:17:47.000Z |
| msrc_cve-2025-37907 | accel/ivpu: Fix locking order in ivpu_job_submit | 2025-05-02T00:00:00.000Z | 2026-03-31T15:17:45.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0368 | Kwetsbaarheden verholpen in Zoom Workplace en Zoom Clients | 2025-11-18T07:02:36.696426Z | 2025-11-18T07:02:36.696426Z |
| ncsc-2025-0367 | Kwetsbaarheden verholpen in GitLab | 2025-11-18T07:01:35.502522Z | 2025-11-18T07:01:35.502522Z |
| ncsc-2025-0366 | Kwetsbaarheid verholpen in Fortinet FortiWeb | 2025-11-15T14:57:33.774388Z | 2025-11-15T14:57:33.774388Z |
| ncsc-2025-0365 | Kwetsbaarheden verholpen in Cisco Catalyst Center | 2025-11-14T12:55:27.227262Z | 2025-11-14T12:55:27.227262Z |
| ncsc-2025-0364 | Kwetsbaarheid verholpen in Adobe Photoshop | 2025-11-12T12:17:16.207233Z | 2025-11-12T12:17:16.207233Z |
| ncsc-2025-0363 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-11-12T11:52:08.634593Z | 2025-11-12T11:56:09.924799Z |
| ncsc-2025-0362 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2025-11-11T18:35:40.376220Z | 2025-11-11T18:35:40.376220Z |
| ncsc-2025-0361 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2025-11-11T18:34:39.453615Z | 2025-11-11T18:34:39.453615Z |
| ncsc-2025-0360 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2025-11-11T18:33:13.936830Z | 2025-11-11T18:33:13.936830Z |
| ncsc-2025-0359 | Kwetsbaarheden verholpen in Microsoft Office | 2025-11-11T18:31:27.092072Z | 2025-11-11T18:31:27.092072Z |
| ncsc-2025-0358 | Kwetsbaartheden verholpen in Microsoft Windows | 2025-11-11T18:29:38.918562Z | 2025-11-11T18:29:38.918562Z |
| ncsc-2025-0357 | Kwetsbaarheden verholpen in Siemens producten | 2025-11-11T18:14:44.487803Z | 2025-11-11T18:14:44.487803Z |
| ncsc-2025-0356 | Kwetsbaarheden verholpen in SAP-producten | 2025-11-11T12:15:53.615720Z | 2025-11-11T12:15:53.615720Z |
| ncsc-2025-0355 | Kwetsbaarheden verholpen in Fortinet FortiOS en FortiProxy | 2025-11-07T10:07:28.475542Z | 2025-11-07T10:07:28.475542Z |
| ncsc-2025-0354 | Kwetsbaarheid verholpen in Cisco Identity Services Engine | 2025-11-06T12:36:51.591695Z | 2025-11-06T12:36:51.591695Z |
| ncsc-2025-0353 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-11-04T15:03:48.630084Z | 2025-11-04T15:03:48.630084Z |
| ncsc-2025-0352 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-11-04T12:53:15.358078Z | 2025-11-04T12:53:15.358078Z |
| ncsc-2025-0351 | Kwetsbaarheden verholpen in Apple MacOS | 2025-11-04T12:44:25.439757Z | 2025-11-04T12:44:25.439757Z |
| ncsc-2025-0350 | Kwetsbaarheid verholpen in CFMOTO Ride voertuigdatabeheer systemen | 2025-11-04T10:27:59.187171Z | 2025-11-04T10:27:59.187171Z |
| ncsc-2025-0349 | Kwetsbaarheden verholpen in Nagios XI | 2025-11-03T08:27:42.052256Z | 2025-11-03T08:27:42.052256Z |
| ncsc-2025-0348 | Kwetsbaarheden verholpen in Arista Networks producten | 2025-11-03T08:26:39.905306Z | 2025-11-03T08:26:39.905306Z |
| ncsc-2025-0347 | Kwetsbaarheden verholpen in IBM QRadar SIEM | 2025-11-03T08:17:18.981494Z | 2025-11-03T08:17:18.981494Z |
| ncsc-2025-0346 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2025-11-03T08:14:02.972842Z | 2025-11-03T08:14:02.972842Z |
| ncsc-2025-0345 | Kwetsbaarheden verholpen in Rockwell Automation FactoryTalk | 2025-10-31T09:35:00.469498Z | 2025-10-31T09:35:00.469498Z |
| ncsc-2025-0344 | Kwetsbaarheden verholpen in Rockwell Automation COMMS | 2025-10-31T09:34:05.069339Z | 2025-10-31T09:34:05.069339Z |
| ncsc-2025-0343 | Kwetsbaarheid verholpen in Mozilla Firefox | 2025-10-31T09:31:53.270725Z | 2025-10-31T09:31:53.270725Z |
| ncsc-2025-0342 | Kwetsbaarheden verholpen in GitLab Enterprise en Community Edition | 2025-10-27T08:08:17.974767Z | 2025-10-27T09:38:47.073257Z |
| ncsc-2025-0341 | Kwetsbaarheden verholpen in BIND 9 | 2025-10-24T08:19:45.232307Z | 2025-10-27T08:24:03.796638Z |
| ncsc-2025-0310 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-10-14T18:03:45.875739Z | 2025-10-24T11:09:29.790442Z |
| ncsc-2025-0340 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2025-10-23T14:13:39.969386Z | 2025-10-23T14:13:39.969386Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10417-1 | python311-deepdiff-8.6.2-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10416-1 | python313-PyMuPDF-1.27.2.2-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10415-1 | glances-common-4.5.2-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10414-1 | perl-Crypt-URandom-0.550.0-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10413-1 | firefox-esr-140.9.0-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:20423-1 | Security update for freeciv | 2026-03-23T15:34:35Z | 2026-03-23T15:34:35Z |
| opensuse-su-2026:20410-1 | Security update for exiv2 | 2026-03-23T09:44:37Z | 2026-03-23T09:44:37Z |
| opensuse-su-2026:10412-1 | python311-pydicom-3.0.2-1.1 on GA media | 2026-03-23T00:00:00Z | 2026-03-23T00:00:00Z |
| opensuse-su-2026:10411-1 | python311-dynaconf-3.2.13-1.1 on GA media | 2026-03-23T00:00:00Z | 2026-03-23T00:00:00Z |
| opensuse-su-2026:10410-1 | pnpm-10.32.1-1.1 on GA media | 2026-03-23T00:00:00Z | 2026-03-23T00:00:00Z |
| opensuse-su-2026:10409-1 | pgvector-devel-0.8.2-1.1 on GA media | 2026-03-23T00:00:00Z | 2026-03-23T00:00:00Z |
| opensuse-su-2026:10408-1 | freerdp-3.24.1-1.1 on GA media | 2026-03-23T00:00:00Z | 2026-03-23T00:00:00Z |
| opensuse-su-2026:10407-1 | azure-storage-azcopy-10.32.2-1.1 on GA media | 2026-03-23T00:00:00Z | 2026-03-23T00:00:00Z |
| opensuse-su-2026:10406-1 | lemon-3.51.3-1.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10405-1 | python314-3.14.3-3.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10404-1 | python310-3.10.20-2.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10403-1 | python311-pypdf-6.9.1-1.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10402-1 | python311-PyPDF2-2.11.1-8.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10401-1 | freeciv-3.2.4-1.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10400-1 | chromedriver-146.0.7680.153-2.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10399-1 | GraphicsMagick-1.3.46-4.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:20409-1 | Security update for harfbuzz | 2026-03-20T15:26:24Z | 2026-03-20T15:26:24Z |
| opensuse-su-2026:20408-1 | Security update for postgresql18 | 2026-03-20T14:50:43Z | 2026-03-20T14:50:43Z |
| opensuse-su-2026:20407-1 | Security update for python-orjson | 2026-03-20T12:07:21Z | 2026-03-20T12:07:21Z |
| opensuse-su-2026:20406-1 | Security update for python-tornado6 | 2026-03-20T10:53:33Z | 2026-03-20T10:53:33Z |
| opensuse-su-2026:20404-1 | Security update for curl | 2026-03-20T09:36:45Z | 2026-03-20T09:36:45Z |
| opensuse-su-2026:20405-1 | Security update for ImageMagick | 2026-03-20T09:31:54Z | 2026-03-20T09:31:54Z |
| opensuse-su-2026:20403-1 | Security update for vim | 2026-03-20T03:15:00Z | 2026-03-20T03:15:00Z |
| opensuse-su-2026:10398-1 | python311-3.11.15-3.1 on GA media | 2026-03-20T00:00:00Z | 2026-03-20T00:00:00Z |
| opensuse-su-2026:10397-1 | python311-PyJWT-2.12.1-1.1 on GA media | 2026-03-20T00:00:00Z | 2026-03-20T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:3812 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T04:13:33+00:00 | 2026-04-12T19:59:58+00:00 |
| rhsa-2026:3782 | Red Hat Security Advisory: RHOAI 2.25.3 - Red Hat OpenShift AI | 2026-03-04T18:23:40+00:00 | 2026-04-12T19:59:58+00:00 |
| rhsa-2026:3753 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-04T15:52:29+00:00 | 2026-04-12T19:59:58+00:00 |
| rhsa-2026:3752 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-04T15:29:36+00:00 | 2026-04-12T19:59:58+00:00 |
| rhsa-2026:3718 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.15.4 | 2026-03-04T07:52:57+00:00 | 2026-04-12T19:59:57+00:00 |
| rhsa-2026:3713 | Red Hat Security Advisory: RHOAI 3.3 - Red Hat OpenShift AI | 2026-03-04T07:18:30+00:00 | 2026-04-12T19:59:56+00:00 |
| rhsa-2026:3699 | Red Hat Security Advisory: yggdrasil-worker-package-manager security update | 2026-03-04T05:15:19+00:00 | 2026-04-12T19:59:56+00:00 |
| rhsa-2026:3669 | Red Hat Security Advisory: go-rpm-macros security update | 2026-03-03T15:33:23+00:00 | 2026-04-12T19:59:56+00:00 |
| rhsa-2026:3668 | Red Hat Security Advisory: go-rpm-macros security update | 2026-03-03T16:17:02+00:00 | 2026-04-12T19:59:56+00:00 |
| rhsa-2026:3556 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.14 | 2026-03-02T16:52:33+00:00 | 2026-04-12T19:59:56+00:00 |
| rhsa-2026:3471 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T01:35:05+00:00 | 2026-04-12T19:59:56+00:00 |
| rhsa-2026:3559 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.14 | 2026-03-02T17:03:40+00:00 | 2026-04-12T19:59:55+00:00 |
| rhsa-2026:3506 | Red Hat Security Advisory: yggdrasil security update | 2026-03-02T06:45:32+00:00 | 2026-04-12T19:59:54+00:00 |
| rhsa-2026:3489 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T02:56:16+00:00 | 2026-04-12T19:59:54+00:00 |
| rhsa-2026:3473 | Red Hat Security Advisory: golang security update | 2026-03-02T01:23:25+00:00 | 2026-04-12T19:59:54+00:00 |
| rhsa-2026:3472 | Red Hat Security Advisory: golang security update | 2026-03-02T01:26:30+00:00 | 2026-04-12T19:59:53+00:00 |
| rhsa-2026:3470 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T01:22:15+00:00 | 2026-04-12T19:59:52+00:00 |
| rhsa-2026:3469 | Red Hat Security Advisory: golang security update | 2026-03-02T01:34:30+00:00 | 2026-04-12T19:59:52+00:00 |
| rhsa-2026:3468 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T01:25:20+00:00 | 2026-04-12T19:59:52+00:00 |
| rhsa-2026:3462 | Red Hat Security Advisory: Red Hat AI Inference Server 3.2.2 (ROCm) | 2026-02-27T14:55:49+00:00 | 2026-04-12T19:59:51+00:00 |
| rhsa-2026:3461 | Red Hat Security Advisory: Red Hat AI Inference Server 3.2.2 (CUDA) | 2026-02-27T14:54:46+00:00 | 2026-04-12T19:59:50+00:00 |
| rhsa-2026:3459 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.9.0 release | 2026-02-26T19:58:40+00:00 | 2026-04-12T19:59:50+00:00 |
| rhsa-2026:3427 | Red Hat Security Advisory: Red Hat build of OpenTelemetry 3.9.0 release | 2026-02-26T11:02:21+00:00 | 2026-04-12T19:59:50+00:00 |
| rhsa-2026:3416 | Red Hat Security Advisory: OpenShift Container Platform 4.17.50 packages and security update | 2026-03-04T09:07:15+00:00 | 2026-04-12T19:59:50+00:00 |
| rhsa-2026:3406 | Red Hat Security Advisory: New container image: rhceph-9.0 | 2026-02-26T07:14:51+00:00 | 2026-04-12T19:59:50+00:00 |
| rhsa-2026:3391 | Red Hat Security Advisory: OpenShift Container Platform 4.19.25 packages and security update | 2026-03-04T15:54:04+00:00 | 2026-04-12T19:59:49+00:00 |
| rhsa-2026:3343 | Red Hat Security Advisory: skopeo security update | 2026-02-25T11:50:40+00:00 | 2026-04-12T19:59:48+00:00 |
| rhsa-2026:3341 | Red Hat Security Advisory: containernetworking-plugins security update | 2026-02-25T12:14:45+00:00 | 2026-04-12T19:59:48+00:00 |
| rhsa-2026:3340 | Red Hat Security Advisory: skopeo security update | 2026-02-25T12:16:20+00:00 | 2026-04-12T19:59:48+00:00 |
| rhsa-2026:3337 | Red Hat Security Advisory: podman security update | 2026-02-25T11:48:26+00:00 | 2026-04-12T19:59:48+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2023-010-03 | EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 | 2023-01-10T17:44:20.000Z | 2023-01-10T17:44:20.000Z |
| sevd-2023-010-04 | EcoStruxure™ Power SCADA Anywhere | 2023-01-10T10:28:35.000Z | 2023-01-10T10:28:35.000Z |
| sevd-2023-010-01 | EcoStruxureTM Machine Expert – HVAC (formerly SoMachine - HVAC) | 2023-01-10T09:28:52.000Z | 2023-01-10T09:28:52.000Z |
| sevd-2022-347-03 | EcoStruxure Power Commission | 2022-12-13T04:28:00.000Z | 2022-12-13T04:28:00.000Z |
| sevd-2022-347-02 | Saitel DR RTU | 2022-12-13T04:12:25.000Z | 2022-12-13T04:12:25.000Z |
| sevd-2021-103-01 | C-Bus Toolkit and C-Gate Server | 2021-04-13T11:17:13.000Z | 2022-11-08T11:17:13.000Z |
| sevd-2021-130-04 | homeLYnk (Wiser For KNX) and spaceLYnk | 2021-05-11T07:30:55.000Z | 2022-11-08T07:30:55.000Z |
| sevd-2022-284-04 | EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 | 2022-10-11T10:45:15.000Z | 2022-10-14T10:45:15.000Z |
| sevd-2022-284-02 | EcoStruxure™ Panel Server Box (PAS900) | 2022-10-11T10:05:49.000Z | 2022-10-11T10:05:49.000Z |
| sevd-2022-284-01 | EcoStruxure™ Operator Terminal Expert and Pro-face BLUE | 2022-10-11T09:48:46.000Z | 2022-10-11T09:48:46.000Z |
| sevd-2020-343-05 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and Associated Communication Modules | 2020-12-08T21:04:43.000Z | 2022-09-13T20:04:43.000Z |
| sevd-2020-343-07 | SNMP Service on Modicon M340 and Associated Communication Modules | 2020-12-08T05:49:51.000Z | 2022-09-13T05:49:51.000Z |
| sevd-2022-256-01 | EcoStruxure Machine SCADA Expert and Pro-face BLUE Open Studio | 2022-09-13T05:45:41.000Z | 2022-09-13T05:45:41.000Z |
| sesb-2019-214-01 | Wind River VxWorks Vulnerabilities (URGENT/11) | 2019-08-02T00:00:00.000Z | 2022-09-13T00:00:00.000Z |
| sevd-2022-193-01 | OPC UA and X80 advanced RTU Modicon Communication Modules | 2022-07-12T04:00:00.000Z | 2022-08-19T06:30:00.000Z |
| sesb-2021-347-01 | Apache Log4j Vulnerabilities (Log4Shell) | 2021-12-13T09:22:58.000Z | 2022-08-09T09:22:58.000Z |
| sevd-2022-221-03 | EcoStruxure™ Control Expert | 2022-08-09T09:14:27.000Z | 2022-08-09T09:14:27.000Z |
| sevd-2020-175-01 | Treck TCP/IP Vulnerabilities (Ripple20) | 2020-06-23T16:00:00.000Z | 2022-08-08T13:57:08.970Z |
| sevd-2022-193-03 | Acti9 PowerTag Link C | 2022-07-12T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2022-193-02 | SpaceLogic C-Bus Home Controller, formerly known as C-Bus Wiser Home Controller MK2 | 2022-07-12T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2021-257-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ for x70 | 2021-09-14T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2021-222-02 | AT&T Labs Compressor (XMilI) and Decompressor (XDemill) used by EcoStruxureTM Control Expert, EcoStruxureTM Process Expert and SCADAPack RemoteConnect™ for x70 | 2021-08-01T07:25:51.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2022-193-04 | Easergy P5 | 2022-07-12T08:55:42.000Z | 2022-07-12T08:55:42.000Z |
| sevd-2022-102-01 | IGSS (Interactive Graphical SCADA System) | 2022-04-12T08:47:25.000Z | 2022-07-12T08:47:25.000Z |
| sevd-2022-067-02 | APC Smart-UPS SMT, SMC, SMX, SCL, SRC, XU, XP, CSH2, SURTD, SMTL, SRT, and select SRTL Series | 2022-03-08T06:30:00.000Z | 2022-06-16T18:30:00.000Z |
| sevd-2022-165-08 | EcoStruxure™ Cybersecurity Admin Expert | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-07 | CanBRASS | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-06 | Schneider Electric C-Bus Home Automation Products | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-05 | EcoStruxure Power Commission | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-04 | Data Center Expert | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-446545 | SSA-446545: Impact of RegreSSHion (CVE-2024-6387) in Siemens Industrial Products | 2024-09-10T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-327438 | SSA-327438: Multiple Vulnerabilities in SCALANCE LPE9403 | 2025-05-13T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-091753 | SSA-091753: Multiple Vulnerabilities in Solid Edge Before SE2025 Update 5 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-078892 | SSA-078892: Multiple Vulnerabilities in SINEC NMS Before V4.0 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-426509 | SSA-426509: Multiple Local Code Execution Vulnerabilities in Questa and ModelSim | 2024-10-08T00:00:00Z | 2025-06-17T00:00:00Z |
| ssa-345750 | SSA-345750: Default Credentials in Energy Services Using Elspec G5DFR | 2025-06-10T00:00:00Z | 2025-06-16T00:00:00Z |
| ssa-874353 | SSA-874353: Entity Enumeration Vulnerability in Mendix Runtime | 2025-04-08T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-656895 | SSA-656895: Open Redirect Vulnerability in Teamcenter | 2025-02-11T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-633269 | SSA-633269: Incorrect Authorization Check Vulnerability in Industrial Communication Devices based on SINEC OS before V3.1 | 2025-06-10T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-620799 | SSA-620799: Denial of Service Vulnerability During BLE Pairing in SENTRON Powercenter 1000/1100 | 2024-12-10T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-497656 | SSA-497656: Multiple NTP Vulnerabilities in TIM 4R-IE Devices | 2021-04-13T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-486186 | SSA-486186: Out of Bounds Read Vulnerability in Tecnomatix Plant Simulation Before 2404 | 2025-06-10T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-354569 | SSA-354569: Multiple Vulnerabilities in Palo Alto Networks PAN-OS on RUGGEDCOM APE1808 Devices | 2024-11-22T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-340240 | SSA-340240: Denial of Service Vulnerability in SIRIUS 3RV2921-5M | 2024-10-08T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-162506 | SSA-162506: DHCP Client Vulnerability in SIMOTICS CONNECT 400, Desigo PXC/PXM, APOGEE MEC/MBC/PXC, APOGEE PXC Series, and TALON TC Series | 2020-04-14T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-041082 | SSA-041082: Out of Bounds Read Vulnerability in SiPass Integrated Before V2.95.3.18 | 2025-05-23T00:00:00Z | 2025-05-23T00:00:00Z |
| ssa-556937 | SSA-556937: Multiple Vulnerabilities in VersiCharge AC Series EV Chargers | 2025-05-13T00:00:00Z | 2025-05-14T00:00:00Z |
| ssa-552330 | SSA-552330: System Configuration Password Reset in Siveillance Video V2024 R1 | 2025-05-14T00:00:00Z | 2025-05-14T00:00:00Z |
| ssa-935500 | SSA-935500: Denial of Service Vulnerability in FTP Server of Nucleus RTOS based APOGEE, TALON and Desigo PXC/PXM Products | 2022-10-11T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-901508 | SSA-901508: Multiple Vulnerabilities in INTRALOG WMS Before V5 | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-828116 | SSA-828116: Denial of Service Vulnerability in BACnet ATEC Devices | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-819629 | SSA-819629: Weak Authentication Vulnerability in Industrial Edge Device Kit | 2025-04-08T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-718393 | SSA-718393: Partial Denial of Service Vulnerability in APOGEE PXC and TALON TC Series (BACnet) Devices | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-668154 | SSA-668154: Denial of Service Vulnerability in MS/TP Point Pickup Module | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-542540 | SSA-542540: Out of Bounds Read Vulnerability in Teamcenter Visualization | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-523418 | SSA-523418: Information Disclosure Vulnerability in Desigo CC | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-455250 | SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.2-h3 | 2024-04-09T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-339086 | SSA-339086: Insufficient Session Expiration Vulnerability in SIMATIC PCS neo | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-222768 | SSA-222768: Multiple Vulnerabilities in SIRIUS 3SK2 Safety Relays and 3RK3 Modular Safety Systems | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-162255 | SSA-162255: Multiple Vulnerabilities in Polarion Before V2410 | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1063-1 | Security update for frr | 2026-03-26T10:36:49Z | 2026-03-26T10:36:49Z |
| suse-su-2026:1062-1 | Security update for python310 | 2026-03-26T10:36:25Z | 2026-03-26T10:36:25Z |
| suse-su-2026:1061-1 | Security update for systemd | 2026-03-26T10:35:55Z | 2026-03-26T10:35:55Z |
| suse-su-2026:1060-1 | Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP5) | 2026-03-26T10:04:45Z | 2026-03-26T10:04:45Z |
| suse-su-2026:1059-1 | Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5) | 2026-03-26T10:04:27Z | 2026-03-26T10:04:27Z |
| suse-su-2026:20936-1 | Security update for openexr | 2026-03-26T10:00:01Z | 2026-03-26T10:00:01Z |
| suse-su-2026:20935-1 | Security update for fetchmail | 2026-03-26T09:57:50Z | 2026-03-26T09:57:50Z |
| suse-su-2026:1058-1 | Security update for tomcat | 2026-03-26T09:46:45Z | 2026-03-26T09:46:45Z |
| suse-su-2026:20871-1 | Security update for docker-compose | 2026-03-26T09:12:43Z | 2026-03-26T09:12:43Z |
| suse-su-2026:20870-1 | Security update for nghttp2 | 2026-03-26T09:10:44Z | 2026-03-26T09:10:44Z |
| suse-su-2026:1057-1 | Security update for frr | 2026-03-26T08:58:49Z | 2026-03-26T08:58:49Z |
| suse-su-2026:1056-1 | Security update for nghttp2 | 2026-03-26T08:57:39Z | 2026-03-26T08:57:39Z |
| suse-su-2026:20879-1 | Security update for python-PyJWT | 2026-03-26T08:57:07Z | 2026-03-26T08:57:07Z |
| suse-su-2026:1048-1 | Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) | 2026-03-26T04:34:10Z | 2026-03-26T04:34:10Z |
| suse-su-2026:1049-1 | Security update for the Linux Kernel (Live Patch 25 for SUSE Linux Enterprise 15 SP5) | 2026-03-26T01:34:07Z | 2026-03-26T01:34:07Z |
| suse-su-2026:1046-1 | Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4) | 2026-03-25T19:34:09Z | 2026-03-25T19:34:09Z |
| suse-su-2026:20947-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-03-25T18:18:29Z | 2026-03-25T18:18:29Z |
| suse-su-2026:20842-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-03-25T18:18:29Z | 2026-03-25T18:18:29Z |
| suse-su-2026:20945-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-03-25T18:10:41Z | 2026-03-25T18:10:41Z |
| suse-su-2026:20840-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-03-25T18:10:41Z | 2026-03-25T18:10:41Z |
| suse-su-2026:20946-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-03-25T18:10:07Z | 2026-03-25T18:10:07Z |
| suse-su-2026:20841-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-03-25T18:10:07Z | 2026-03-25T18:10:07Z |
| suse-su-2026:20934-1 | Security update for python-PyJWT | 2026-03-25T18:08:28Z | 2026-03-25T18:08:28Z |
| suse-su-2026:20839-1 | Security update for python-PyJWT | 2026-03-25T18:08:28Z | 2026-03-25T18:08:28Z |
| suse-su-2026:1045-1 | Security update for the Linux Kernel (Live Patch 77 for SUSE Linux Enterprise 12 SP5) | 2026-03-25T18:04:47Z | 2026-03-25T18:04:47Z |
| suse-su-2026:1044-1 | Security update for the Linux Kernel (Live Patch 70 for SUSE Linux Enterprise 12 SP5) | 2026-03-25T17:54:43Z | 2026-03-25T17:54:43Z |
| suse-su-2026:1041-1 | Security update for the Linux Kernel | 2026-03-25T14:13:20Z | 2026-03-25T14:13:20Z |
| suse-su-2026:1040-1 | Security update for systemd | 2026-03-25T12:43:09Z | 2026-03-25T12:43:09Z |
| suse-su-2026:1039-1 | Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5) | 2026-03-25T12:34:25Z | 2026-03-25T12:34:25Z |
| suse-su-2026:20933-1 | Security update for python-ldap | 2026-03-25T10:48:13Z | 2026-03-25T10:48:13Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:3068 | Important: freerdp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:34:44Z |
| alsa-2026:3092 | Important: golang-github-openprinting-ipp-usb security update | 2026-02-23T00:00:00Z | 2026-02-26T10:33:21Z |
| alsa-2026:3189 | Moderate: 389-ds-base security update | 2026-02-24T00:00:00Z | 2026-02-26T10:31:32Z |
| alsa-2026:3208 | Moderate: 389-ds-base security update | 2026-02-24T00:00:00Z | 2026-02-26T10:30:07Z |
| alsa-2026:3291 | Important: runc security update | 2026-02-25T00:00:00Z | 2026-02-26T10:27:56Z |
| alsa-2026:3297 | Important: buildah security update | 2026-02-25T00:00:00Z | 2026-02-26T10:26:55Z |
| alsa-2026:3298 | Important: buildah security update | 2026-02-25T00:00:00Z | 2026-02-26T10:25:19Z |
| alsa-2026:3337 | Important: podman security update | 2026-02-25T00:00:00Z | 2026-02-26T10:23:45Z |
| alsa-2026:3339 | Important: firefox security update | 2026-02-25T00:00:00Z | 2026-02-26T10:21:52Z |
| alsa-2026:3359 | Important: python-pyasn1 security update | 2026-02-25T00:00:00Z | 2026-02-26T10:19:52Z |
| alsa-2026:3361 | Important: firefox security update | 2026-02-25T00:00:00Z | 2026-02-26T10:18:27Z |
| alsa-2026:3334 | Important: freerdp security update | 2026-02-25T00:00:00Z | 2026-02-26T09:39:13Z |
| alsa-2026:3187 | Important: grafana-pcp security update | 2026-02-24T00:00:00Z | 2026-02-24T17:14:01Z |
| alsa-2026:3188 | Important: grafana security update | 2026-02-24T00:00:00Z | 2026-02-24T17:11:47Z |
| alsa-2026:3110 | Important: kernel-rt security update | 2026-02-23T00:00:00Z | 2026-02-24T13:03:08Z |
| alsa-2026:3083 | Important: kernel security update | 2026-02-23T00:00:00Z | 2026-02-24T12:59:25Z |
| alsa-2026:3095 | Important: protobuf security update | 2026-02-23T00:00:00Z | 2026-02-24T00:13:34Z |
| alsa-2026:3094 | Important: protobuf security update | 2026-02-23T00:00:00Z | 2026-02-24T00:07:41Z |
| alsa-2026:3032 | Important: munge security update | 2026-02-23T00:00:00Z | 2026-02-23T14:44:19Z |
| alsa-2026:2721 | Moderate: kernel security update | 2026-02-16T00:00:00Z | 2026-02-23T13:34:16Z |
| alsa-2026:2720 | Moderate: kernel security update | 2026-02-16T00:00:00Z | 2026-02-23T13:27:24Z |
| alsa-2026:2783 | Important: nodejs:20 security update | 2026-02-17T00:00:00Z | 2026-02-23T13:24:32Z |
| alsa-2026:2782 | Important: nodejs:22 security update | 2026-02-17T00:00:00Z | 2026-02-23T13:22:00Z |
| alsa-2026:2722 | Moderate: kernel security update | 2026-02-16T00:00:00Z | 2026-02-23T13:18:53Z |
| alsa-2026:3042 | Moderate: openssl security update | 2026-02-23T00:00:00Z | 2026-02-23T09:07:14Z |
| alsa-2026:2914 | Important: grafana security update | 2026-02-18T00:00:00Z | 2026-02-19T18:04:08Z |
| alsa-2026:2920 | Important: grafana security update | 2026-02-18T00:00:00Z | 2026-02-19T10:58:19Z |
| alsa-2026:2706 | Important: golang security update | 2026-02-16T00:00:00Z | 2026-02-18T13:54:31Z |
| alsa-2026:2781 | Important: nodejs:24 security update | 2026-02-17T00:00:00Z | 2026-02-18T13:51:36Z |
| alsa-2026:2776 | Moderate: edk2 security update | 2026-02-17T00:00:00Z | 2026-02-18T13:48:45Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-547 | Security exception in com.alibaba.fastjson2.JSONReader.readArray | 2025-07-15T00:09:03.936493Z | 2026-02-07T14:17:37.720783Z |
| osv-2023-197 | Global-buffer-overflow in base_C_MessageEncryptInit | 2023-03-18T13:00:57.254906Z | 2026-02-07T14:09:46.773524Z |
| osv-2026-205 | UNKNOWN READ in gpsd_poll | 2026-02-07T00:03:03.099317Z | 2026-02-07T00:03:03.099778Z |
| osv-2026-204 | Segv on unknown address in icalarray_append | 2026-02-06T00:20:37.969087Z | 2026-02-06T00:20:37.969390Z |
| osv-2026-200 | Global-buffer-overflow in nameMatch | 2026-02-06T00:15:58.927791Z | 2026-02-06T00:15:58.928058Z |
| osv-2026-196 | Null-dereference READ in ubsan_GetStackTrace | 2026-02-06T00:06:05.778394Z | 2026-02-06T00:06:05.778867Z |
| osv-2026-195 | Use-of-uninitialized-value in vcardstructured_free | 2026-02-05T00:15:22.587525Z | 2026-02-05T00:15:22.587818Z |
| osv-2026-189 | Global-buffer-overflow in gpsd_poll | 2026-02-04T00:05:14.950372Z | 2026-02-04T00:05:14.950857Z |
| osv-2026-182 | Use-of-uninitialized-value in json_internal_read_object | 2026-02-03T00:11:05.023029Z | 2026-02-03T00:11:05.023344Z |
| osv-2026-177 | Security exception in org.apache.poi.util.IOUtils.safelyAllocate | 2026-02-02T00:20:01.368972Z | 2026-02-02T00:20:01.369362Z |
| osv-2026-169 | Null-dereference READ in execute_post_instantiate_functions | 2026-02-01T00:01:05.927662Z | 2026-02-01T00:01:05.927997Z |
| osv-2022-1003 | Index-out-of-bounds in LibRaw::ahd_interpolate_r_and_b_in_rgb_and_convert_to_cielab | 2022-09-30T00:02:10.026151Z | 2026-01-31T14:08:33.420267Z |
| osv-2026-167 | Use-of-uninitialized-value in aivdm_analyze | 2026-01-31T00:10:49.750917Z | 2026-01-31T00:10:49.751204Z |
| osv-2026-166 | Use-of-uninitialized-value in ntrip_parse_url | 2026-01-31T00:10:39.163525Z | 2026-01-31T00:10:39.163931Z |
| osv-2023-235 | Use-of-uninitialized-value in complexity_RC_reset_marking | 2023-03-26T13:00:16.681780Z | 2026-01-29T14:14:41.215909Z |
| osv-2023-234 | Use-of-uninitialized-value in ihevce_enc_frm_proc_slave_thrd | 2023-03-26T13:00:12.135289Z | 2026-01-29T14:14:40.129452Z |
| osv-2023-239 | Use-of-uninitialized-value in ihevce_strm_fill_done | 2023-03-26T13:02:03.445119Z | 2026-01-29T14:14:38.558891Z |
| osv-2026-97 | Heap-buffer-overflow in vpx_wb_write_literal | 2026-01-21T00:09:09.897624Z | 2026-01-28T14:23:52.198239Z |
| osv-2026-156 | Segv on unknown address in aivdm_analyze | 2026-01-28T00:06:24.327227Z | 2026-01-28T00:06:24.327712Z |
| osv-2026-150 | Null-dereference READ in wasm_runtime_invoke_native | 2026-01-27T00:02:06.850780Z | 2026-01-27T00:02:06.851098Z |
| osv-2026-144 | Use-of-uninitialized-value in initFilter | 2026-01-26T00:05:57.473672Z | 2026-01-26T00:05:57.473958Z |
| osv-2026-141 | Segv on unknown address in yuv2rgb4_X_c | 2026-01-26T00:03:47.552290Z | 2026-01-26T00:03:47.552807Z |
| osv-2025-280 | Heap-buffer-overflow in Assimp::SceneCombiner::CopyScene | 2025-04-15T00:04:03.423453Z | 2026-01-25T14:19:05.873424Z |
| osv-2025-580 | UNKNOWN READ in signed char Assimp::StreamReader<false, false>::Get<signed char> | 2025-07-29T00:16:41.422221Z | 2026-01-25T14:18:57.285875Z |
| osv-2024-1220 | UNKNOWN READ in Assimp::NDOImporter::InternReadFile | 2024-10-14T00:17:45.088625Z | 2026-01-25T14:14:41.961973Z |
| osv-2023-869 | Heap-buffer-overflow in Assimp::MD5::MD5MeshParser::MD5MeshParser | 2023-09-17T14:01:25.028324Z | 2026-01-25T14:13:45.937535Z |
| osv-2026-136 | Memcpy-param-overlap in grk::memStreamRead | 2026-01-25T00:10:48.352834Z | 2026-01-25T00:10:48.353140Z |
| osv-2026-121 | Use-of-uninitialized-value in trySubset | 2026-01-24T00:15:22.824642Z | 2026-01-24T14:24:01.498986Z |
| osv-2026-122 | Use-of-uninitialized-value in rtcm2_unpack | 2026-01-24T00:18:15.169881Z | 2026-01-24T00:18:15.170285Z |
| osv-2026-119 | Segv on unknown address in gpsd_poll | 2026-01-23T00:09:08.434854Z | 2026-01-23T00:09:08.435286Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0003 | Non-constant-time code generation on ARM32 targets | 2026-01-14T12:00:00Z | 2026-01-15T17:45:42Z |
| rustsec-2026-0002 | `IterMut` violates Stacked Borrows by invalidating internal pointer | 2026-01-07T12:00:00Z | 2026-01-08T05:46:06Z |
| rustsec-2026-0001 | Potential Undefined Behaviors in `Arc<T>`/`Rc<T>` impls of `from_value` on OOM | 2026-01-05T12:00:00Z | 2026-01-06T15:33:19Z |
| rustsec-2025-0139 | theshit vulnerable to unsafe loading of user-owned Python rules when running as root | 2025-12-30T12:00:00Z | 2026-01-04T20:34:25Z |
| rustsec-2023-0096 | Plaintext exposed in decrypt_in_place_detached even on tag verification failure | 2023-11-22T12:00:00Z | 2025-12-29T13:49:34Z |
| rustsec-2025-0138 | --allow-read / --allow-write permission bypass in `node:sqlite` | 2025-06-03T12:00:00Z | 2025-12-29T10:04:21Z |
| rustsec-2025-0137 | Unsoundness of safe `reciprocal_mg10` | 2025-12-22T12:00:00Z | 2025-12-28T09:42:26Z |
| rustsec-2024-0447 | Panics on Malformed Untrusted Input | 2024-12-05T12:00:00Z | 2025-12-24T14:48:25Z |
| rustsec-2023-0095 | Invalid Slice Split Results in Server Panic | 2023-08-03T12:00:00Z | 2025-12-22T18:53:25Z |
| rustsec-2024-0446 | Shell expansion in custom commands | 2024-07-26T12:00:00Z | 2025-12-22T13:54:49Z |
| rustsec-2022-0103 | Incorrect signature verification on gzip-compressed install images | 2022-03-04T12:00:00Z | 2025-12-21T13:45:28Z |
| rustsec-2024-0445 | cap-primitives doesn't fully sandbox all the Windows device filenames | 2024-11-05T12:00:00Z | 2025-12-19T21:01:24Z |
| rustsec-2024-0444 | Uncaught exception when transitioning the state of `AsyncGenerator` objects from within a property getter of `then` | 2024-08-14T12:00:00Z | 2025-12-19T06:15:15Z |
| rustsec-2021-0082 | vec-const attempts to construct a Vec from a pointer to a const slice | 2021-08-14T12:00:00Z | 2025-12-17T17:06:41Z |
| rustsec-2025-0136 | Underflow in aes_key_unwrap function | 2025-11-07T12:00:00Z | 2025-12-17T06:01:32Z |
| rustsec-2025-0135 | matrix-sdk-base: Denial of service due to custom `m.room.join_rules` events | 2025-12-08T12:00:00Z | 2025-12-08T12:23:54Z |
| rustsec-2025-0133 | Incorrect calculation on aarch64 | 2025-12-04T12:00:00Z | 2025-12-06T07:36:56Z |
| rustsec-2025-0134 | rustls-pemfile is unmaintained | 2025-11-28T12:00:00Z | 2025-12-05T19:07:24Z |
| rustsec-2025-0132 | `Reader::open_mmap` unsoundly marks unsafe memmap operation as safe | 2025-11-28T12:00:00Z | 2025-12-02T06:03:09Z |
| rustsec-2025-0131 | Lack of sufficient checks in public API | 2025-10-31T12:00:00Z | 2025-12-02T06:03:09Z |
| rustsec-2025-0120 | json5 crate is unmaintained | 2025-11-16T12:00:00Z | 2025-11-30T00:15:16Z |
| rustsec-2025-0126 | Heap-buffer-overflow in nftnl::Batch::with_page_size (nftnl-rs) | 2025-10-18T12:00:00Z | 2025-11-27T21:53:33Z |
| rustsec-2025-0130 | Missing check in ZK proof in CGGMP21 Threshold Signing Protocol | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0129 | Missing check in ZK proof in CGGMP21 Threshold Signing Protocol | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0128 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0127 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0125 | Resource Exhaustion (Memory and Handle Leaks) on Windows and macOS | 2025-11-22T12:00:00Z | 2025-11-22T12:29:36Z |
| rustsec-2025-0124 | rand_os crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-19T20:48:42Z |
| rustsec-2025-0123 | opentelemetry-jaeger crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T12:07:07Z |
| rustsec-2025-0122 | cargo-asm crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T09:02:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-discourse-2026-33291 | Discourse user can create Zendesk tickets even when it does not have access to topic | 2026-03-27T07:10:45.396Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33251 | Discourse has a Hidden Solved topics permission bypass | 2026-03-27T07:10:42.800Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-32114 | Discourse's unscoped status lookups leak restricted metadata | 2026-03-27T07:10:39.880Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-32099 | Discourse prevents hidden profile data leak via user onebox | 2026-03-27T07:10:36.934Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-31869 | Discourse: Composer mentions endpoint leaks hidden group membership through PM `allowed_names` check | 2026-03-27T07:10:33.910Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-31805 | Discourse has a poll authorization bypass via post_id array parameter | 2026-03-27T07:10:31.444Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-30891 | Discourse hasUnauthorized Exposure of Private User Action Types | 2026-03-27T07:10:28.864Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-30889 | Discourse has Unauthorized Post Data Exposure in discourse-user-notes | 2026-03-27T07:10:26.417Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-30888 | Discourse has moderator privilege escalation via arbitrary post_id in suspend/silence endpoint | 2026-03-27T07:10:23.855Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27934 | Discourse leaks private topic title and post excerpt via user action API endpoint | 2026-03-27T07:10:00.671Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27740 | Discourse has Stored XSS in AI Triage Automation | 2026-03-27T07:09:57.609Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27570 | Discourse Vulnerable to Stored XSS via Shared AI Conversation Onebox | 2026-03-27T07:09:54.665Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27491 | Discourse has a bypass of official warnings messages by non-staff users | 2026-03-27T07:09:52.198Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27454 | Discourse has check revision visibility on posts endpoint | 2026-03-27T07:09:48.954Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27166 | Discourse vulnerable to HTML injection via prohibited iframe URLs | 2026-03-27T07:09:46.264Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2023-28112 | Discourse's SSRF protection missing for some FastImage requests | 2024-03-06T10:58:19.088Z | 2026-03-25T18:30:22.404Z |
| bit-discourse-2023-38706 | Discourse vulnerable to DoS via drafts | 2024-03-06T10:54:51.089Z | 2026-03-25T17:48:21.059Z |
| bit-python-2026-4519 | webbrowser.open() allows leading dashes in URLs | 2026-03-25T08:52:23.976Z | 2026-03-25T09:15:17.567Z |
| bit-libpython-2026-4519 | webbrowser.open() allows leading dashes in URLs | 2026-03-25T08:44:11.251Z | 2026-03-25T09:15:17.567Z |
| bit-discourse-2025-64528 | Users are able to find users by name even when `enable_names` is off | 2026-01-08T11:40:33.666Z | 2026-03-25T09:15:17.567Z |
| bit-discourse-2024-56197 | Users can see other user's tagged PMs in Discourse | 2025-02-20T10:31:38.504Z | 2026-03-25T09:15:17.567Z |
| bit-ceph-2024-48916 | Ceph is vulnerable to authentication bypass through RadosGW | 2026-03-20T09:05:50.770Z | 2026-03-24T15:24:05.672Z |
| bit-ceph-2024-47866 | RGW DoS attack with empty HTTP header in S3 object copy | 2026-03-20T09:05:48.271Z | 2026-03-24T15:24:05.672Z |
| bit-tomcat-2023-28709 | Apache Tomcat: Fix for CVE-2023-24998 is incomplete | 2026-03-24T10:21:40.054Z | 2026-03-24T10:46:38.869Z |
| bit-tomcat-2023-28708 | Apache Tomcat: JSESSIONID Cookie missing secure attribute in some configurations | 2026-03-24T10:21:38.576Z | 2026-03-24T10:46:38.869Z |
| bit-valkey-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:19:55.260Z | 2026-03-21T09:12:01.983Z |
| bit-redis-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:18:53.323Z | 2026-03-21T09:12:01.983Z |
| bit-keydb-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:12:52.562Z | 2026-03-21T09:12:01.983Z |
| bit-tomcat-2026-24734 | Apache Tomcat Native, Apache Tomcat: OCSP revocation bypass | 2026-02-20T09:53:00.269Z | 2026-03-20T13:43:29.174Z |
| bit-tomcat-2025-55752 | Apache Tomcat: Directory traversal via rewrite with possible RCE if PUT is enabled | 2025-11-06T13:00:31.694Z | 2026-03-20T13:43:29.174Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-qv50101 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-8r3f-844c-mc37 applied in versions: 1.6.0-r0 | 2026-04-01T09:30:36.985458Z | 2026-03-23T07:45:33Z |
| cleanstart-2026-nc32267 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.24.4-r0, 1.28.1-r0, 1.28.1-r1 | 2026-04-01T09:31:06.582607Z | 2026-03-23T07:39:20Z |
| cleanstart-2026-li47669 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.26.2-r0, 1.26.3-r0, 1.26.3-r1 | 2026-04-01T09:31:09.448053Z | 2026-03-23T07:38:42Z |
| cleanstart-2026-pv93827 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.25.4-r0, 1.25.4-r1, 1.25.4-r2 | 2026-04-01T09:31:37.416388Z | 2026-03-23T07:38:20Z |
| cleanstart-2026-fn44356 | Security fixes for CVE-2022-29526, CVE-2025-47907, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10-r0, 0.11-r0, 0.9-r0, 0.9-r1, 0.9-r2 | 2026-04-01T09:31:56.126620Z | 2026-03-23T07:36:06Z |
| cleanstart-2026-cl65461 | Security fixes for CVE-2022-29526, CVE-2025-47907, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10-r0, 0.11-r0, 0.8-r0, 0.8-r1, 0.8-r2, 0.9-r0 | 2026-04-01T09:31:56.332937Z | 2026-03-23T07:35:18Z |
| cleanstart-2026-nv78596 | Security fixes for CVE-2022-29526, CVE-2025-47907, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-4f99-4q7p-p3gh applied in versions: 0.10-r0, 0.11-r0, 0.11-r2, 0.11-r3, 0.11-r4 | 2026-04-01T09:32:41.363681Z | 2026-03-23T07:34:57Z |
| cleanstart-2026-on62368 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10.0-r0, 0.10.0-r1, 0.11.0-r0, 1.13.1-r0 | 2026-04-01T09:32:49.419019Z | 2026-03-23T07:09:26Z |
| cleanstart-2026-gi67088 | Security fixes for CVE-2020-8559, CVE-2020-8565, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, ghsa-33c5-9fx5-fvjm, ghsa-8cfg-vx93-jvxw applied in versions: 2.12.0-r0, 2.12.0-r1 | 2026-04-01T09:33:02.208236Z | 2026-03-23T07:05:35Z |
| cleanstart-2026-jm96857 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.16.4-r0, 2.16.4-r1 | 2026-04-01T09:32:39.352692Z | 2026-03-23T07:04:06Z |
| cleanstart-2026-ps51260 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.2.2-r0, 1.2.2-r1 | 2026-04-01T09:33:07.208099Z | 2026-03-23T07:02:53Z |
| cleanstart-2026-qj92322 | Security fixes for CVE-2025-15558, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.0.2-r0, 2.0.2-r1 | 2026-04-01T09:33:14.887013Z | 2026-03-23T06:58:42Z |
| cleanstart-2026-lp76319 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.21.2-r0, 1.21.2-r1 | 2026-04-01T09:33:36.179758Z | 2026-03-23T06:57:40Z |
| cleanstart-2026-gq14179 | Security fixes for CVE-2025-11143, CVE-2025-53864, CVE-2025-55163, CVE-2025-58056, CVE-2025-58057, CVE-2025-67735, CVE-2025-68161, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.46.1-r3, 0.46.1-r4 | 2026-04-01T09:33:44.585498Z | 2026-03-23T06:45:45Z |
| cleanstart-2026-nv36169 | Security fixes for CVE-2025-61732, CVE-2025-66564, CVE-2025-68121, CVE-2026-24686, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, ghsa-fcv2-xgw5-pqxf applied in versions: 0.7.29-r1, 0.7.29-r2 | 2026-04-01T09:33:48.680625Z | 2026-03-23T06:33:00Z |
| cleanstart-2026-bc17682 | Security fixes for CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.4.4-r0, 2.4.4-r1 | 2026-04-01T09:33:57.594313Z | 2026-03-23T06:28:34Z |
| cleanstart-2026-kk98885 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-9h8m-3fm2-qjrq applied in versions: 2.18.0-r0 | 2026-04-01T09:34:13.357278Z | 2026-03-23T06:16:30Z |
| cleanstart-2026-jk59495 | Security fixes for CVE-2025-0913, CVE-2025-4673, CVE-2025-47907, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-9h8m-3fm2-qjrq, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 3.3.2-r0, 3.4.2-r0, 3.4.2-r3, 3.4.2-r4 | 2026-04-01T09:34:49.510720Z | 2026-03-22T18:12:16Z |
| cleanstart-2026-fl27179 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.5.2-r3 | 2026-04-01T09:34:50.735567Z | 2026-03-22T07:53:14Z |
| cleanstart-2026-jj84567 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.6.4-r3 | 2026-04-01T09:35:06.408771Z | 2026-03-22T07:50:03Z |
| cleanstart-2026-jb52011 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-p77j-4mvh-x3m3 applied in versions: 1.11.1-r1, 1.11.1-r2 | 2026-04-01T09:35:29.036304Z | 2026-03-22T07:44:23Z |
| cleanstart-2026-da83816 | Security fixes for CVE-2026-33186, ghsa-p77j-4mvh-x3m3 applied in versions: 1.14.0-r0 | 2026-04-01T09:35:14.283813Z | 2026-03-22T07:39:37Z |
| cleanstart-2026-ee52954 | Security fixes for CVE-2021-3538, CVE-2025-22871, CVE-2025-29923, CVE-2025-4673, CVE-2025-47907, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-hcg3-q754-cr77, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw applied in versions: 3.0.0.1-r2, 3.0.0.1-r3, 3.0.0.1-r4 | 2026-04-01T09:36:34.270182Z | 2026-03-22T07:36:37Z |
| cleanstart-2026-ap81168 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.13.4-r0, 2.13.5-r0, 2.13.5-r1 | 2026-04-01T09:35:54.838524Z | 2026-03-22T07:27:04Z |
| cleanstart-2026-qy63788 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.14.3-r0, 2.14.3-r1 | 2026-04-01T09:36:08.453160Z | 2026-03-22T07:24:09Z |
| cleanstart-2026-kw24478 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.15.0-r0, 2.15.0-r1 | 2026-04-01T09:36:08.569651Z | 2026-03-22T07:20:42Z |
| cleanstart-2026-os42112 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x, ghsa-p436-gjf2-799p applied in versions: 2.12.4-r0, 2.12.4-r1, 2.13.4-r0, 2.13.4-r1, 2.13.4-r2 | 2026-04-01T09:36:49.810788Z | 2026-03-22T07:12:11Z |
| cleanstart-2026-lb23787 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x, ghsa-p436-gjf2-799p applied in versions: 2.13.4-r0, 2.13.4-r1, 2.13.4-r2, 2.13.5-r0, 2.13.5-r1 | 2026-04-01T09:37:01.194631Z | 2026-03-22T07:08:40Z |
| cleanstart-2026-mt27167 | Security fixes for CVE-2021-3538, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.14.3-r0, 2.14.3-r1 | 2026-04-01T09:36:58.329684Z | 2026-03-22T07:06:00Z |
| cleanstart-2026-pe63912 | Security fixes for CVE-2021-3538, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.15.0-r0, 2.15.0-r1 | 2026-04-01T09:37:00.583811Z | 2026-03-22T07:02:21Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-ale-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| CERTFR-2021-ALE-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| CERTFR-2021-ALE-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-005 | Multiples vulnérabilités dans Microsoft DNS server | 2021-03-12T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-003 | [MàJ] Vulnérabilité dans VMware vCenter Server | 2021-02-25T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-001 | |MàJ] Vulnérabilité dans SonicWall SMA100 | 2021-02-02T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| CERTFR-2021-ALE-005 | Multiples vulnérabilités dans Microsoft DNS server | 2021-03-12T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| CERTFR-2021-ALE-003 | [MàJ] Vulnérabilité dans VMware vCenter Server | 2021-02-25T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| CERTFR-2021-ALE-001 | |MàJ] Vulnérabilité dans SonicWall SMA100 | 2021-02-02T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-006 | [MàJ] Vulnérabilité dans F5 BIG-IP | 2021-03-22T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2020-ale-026 | [MaJ] Présence de code malveillant dans SolarWinds Orion | 2020-12-14T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| CERTFR-2021-ALE-006 | [MàJ] Vulnérabilité dans F5 BIG-IP | 2021-03-22T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| CERTFR-2020-ALE-026 | [MaJ] Présence de code malveillant dans SolarWinds Orion | 2020-12-14T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2021-ale-002 | [MàJ] Vulnérabilité dans Google Chrome et Microsoft Edge | 2021-02-05T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-021 | Vulnérabilité dans Samba | 2020-09-18T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-020 | [MàJ] Vulnérabilité dans Microsoft Netlogon | 2020-09-15T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| CERTFR-2021-ALE-002 | [MàJ] Vulnérabilité dans Google Chrome et Microsoft Edge | 2021-02-05T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| CERTFR-2020-ALE-021 | Vulnérabilité dans Samba | 2020-09-18T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| CERTFR-2020-ALE-020 | [MàJ] Vulnérabilité dans Microsoft Netlogon | 2020-09-15T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-019 | Recrudescence d'activité Emotet en France | 2020-09-07T00:00:00.000000 | 2021-02-09T00:00:00.000000 |
| CERTFR-2020-ALE-019 | Recrudescence d'activité Emotet en France | 2020-09-07T00:00:00.000000 | 2021-02-09T00:00:00.000000 |
| certfr-2020-ale-025 | Vulnérabilité dans Fortinet FortiOS SSL-VPN | 2020-11-27T00:00:00.000000 | 2021-02-08T00:00:00.000000 |
| CERTFR-2020-ALE-025 | Vulnérabilité dans Fortinet FortiOS SSL-VPN | 2020-11-27T00:00:00.000000 | 2021-02-08T00:00:00.000000 |
| certfr-2020-ale-024 | [MaJ] Vulnérabilité dans les produits VMware | 2020-11-24T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-022 | [MàJ] Vulnérabilité dans Oracle Weblogic | 2020-10-30T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| CERTFR-2020-ALE-024 | [MaJ] Vulnérabilité dans les produits VMware | 2020-11-24T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| CERTFR-2020-ALE-022 | [MàJ] Vulnérabilité dans Oracle Weblogic | 2020-10-30T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-023 | Multiples vulnérabilités dans Google Chrome | 2020-11-12T00:00:00.000000 | 2020-12-04T00:00:00.000000 |
| CERTFR-2020-ALE-023 | Multiples vulnérabilités dans Google Chrome | 2020-11-12T00:00:00.000000 | 2020-12-04T00:00:00.000000 |
| certfr-2020-ale-018 | Vulnérabilité dans Cisco ASA et FTD | 2020-07-28T00:00:00.000000 | 2020-11-05T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0279 | Multiples vulnérabilités dans Cisco IOS XR | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0278 | Multiples vulnérabilités dans Google Chrome | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0277 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0276 | Multiples vulnérabilités dans GitLab | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0275 | Vulnérabilité dans GLPI | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0274 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0273 | Multiples vulnérabilités dans Microsoft Azure | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0272 | Multiples vulnérabilités dans Microsoft .Net | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0271 | Multiples vulnérabilités dans Microsoft Windows | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0270 | Multiples vulnérabilités dans Microsoft Office | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0269 | Multiples vulnérabilités dans Curl | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0268 | Multiples vulnérabilités dans Traefik | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0267 | Multiples vulnérabilités dans Mozilla Firefox | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0266 | Multiples vulnérabilités dans VMware Tanzu | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0265 | Multiples vulnérabilités dans les produits Fortinet | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0264 | Multiples vulnérabilités dans les produits Adobe | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0263 | Vulnérabilité dans Ivanti Desktop and Server Management (DSM) | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0262 | Multiples vulnérabilités dans HPE Aruba Networking AOS-CX | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0261 | Multiples vulnérabilités dans les produits Intel | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0260 | Multiples vulnérabilités dans WordPress | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0259 | Multiples vulnérabilités dans Stormshield Network Security | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0258 | Vulnérabilité dans Microsoft CBL-Mariner | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0257 | Vulnérabilité dans Mozilla Focus | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0256 | Multiples vulnérabilités dans les produits SAP | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0255 | Multiples vulnérabilités dans les produits Siemens | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0254 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0253 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-09T00:00:00.000000 | 2026-03-09T00:00:00.000000 |
| certfr-2026-avi-0252 | Multiples vulnérabilités dans les produits Moxa | 2026-03-09T00:00:00.000000 | 2026-03-09T00:00:00.000000 |
| certfr-2026-avi-0251 | Multiples vulnérabilités dans Apache Zookeeper | 2026-03-09T00:00:00.000000 | 2026-03-09T00:00:00.000000 |
| certfr-2026-avi-0250 | Vulnérabilité dans Apereo CAS | 2026-03-09T00:00:00.000000 | 2026-03-09T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000077 | RICOH Streamline NX vulnerable to tampering with operation history | 2025-09-08T13:42+09:00 | 2025-09-24T16:53+09:00 |
| jvndb-2025-007519 | Multiple vulnerabilities in multiple BROTHER products | 2025-06-26T18:15+09:00 | 2025-09-22T10:16+09:00 |
| jvndb-2025-014105 | OMRON SOCIAL SOLUTIONS Uninterruptible Power Supply (UPS) management application registers a Windows service with an unquoted file path | 2025-09-19T16:21+09:00 | 2025-09-19T16:21+09:00 |
| jvndb-2025-014104 | Multiple vulnerabilities in I-O DATA wireless LAN routers | 2025-09-19T14:58+09:00 | 2025-09-19T14:58+09:00 |
| jvndb-2025-014081 | Multiple Brother and its OEM products with weak initial administrator passwords | 2025-09-19T10:52+09:00 | 2025-09-19T10:52+09:00 |
| jvndb-2025-000079 | UNIVERGE IX/IX-R/IX-V series routers provided by NEC Corporation vulnerable to cross-site scripting | 2025-09-18T17:43+09:00 | 2025-09-18T17:43+09:00 |
| jvndb-2025-000078 | Century HW RAID Manager registers a Windows service with an unquoted file path | 2025-09-17T13:45+09:00 | 2025-09-17T13:45+09:00 |
| jvndb-2025-000048 | WTW-EAGLE App vulnerable to improper server certificate validation | 2025-09-12T13:57+09:00 | 2025-09-12T13:57+09:00 |
| jvndb-2025-000070 | "Gunosy" App vulnerable to insertion of sensitive information into sent data | 2025-09-02T14:20+09:00 | 2025-09-09T09:51+09:00 |
| jvndb-2025-000072 | Obsidian GitHub Copilot Plugin stores sensitive information in cleartext | 2025-09-05T16:52+09:00 | 2025-09-05T16:52+09:00 |
| jvndb-2025-000073 | RATOC RAID Monitoring Manager for Windows registers a Windows service with an unquoted file path | 2025-09-05T16:20+09:00 | 2025-09-05T16:20+09:00 |
| jvndb-2025-000071 | "Yahoo! Shopping" App for Android fails to restrict custom URL schemes properly | 2025-09-05T15:12+09:00 | 2025-09-05T15:12+09:00 |
| jvndb-2025-000075 | Multiple vulnerabilities in TkEasyGUI | 2025-09-05T14:53+09:00 | 2025-09-05T14:53+09:00 |
| jvndb-2025-000069 | Web Caster V130 vulnerable to cross-site request forgery | 2025-09-03T14:23+09:00 | 2025-09-03T14:23+09:00 |
| jvndb-2025-000068 | Seiko Solutions SkyBridge BASIC MB-A130 vulnerable to OS command injection | 2025-09-01T16:21+09:00 | 2025-09-01T16:21+09:00 |
| jvndb-2025-012659 | Denial-of-service (DoS) vulnerability in Konica Minolta bizhub series | 2025-09-01T15:22+09:00 | 2025-09-01T15:22+09:00 |
| jvndb-2025-000067 | Multiple vulnerabilities in multiple iND products | 2025-08-29T14:47+09:00 | 2025-08-29T14:47+09:00 |
| jvndb-2025-000064 | Multiple vulnerabilities in SS1 | 2025-08-27T15:13+09:00 | 2025-08-27T15:13+09:00 |
| jvndb-2025-000065 | ScanSnap Manager installers vulnerable to privilege escalation | 2025-08-27T14:22+09:00 | 2025-08-27T14:22+09:00 |
| jvndb-2025-011884 | FUJIFILM Healthcare Americas Synapse Mobility vulnerable to Privilege Escalation | 2025-08-21T11:49+09:00 | 2025-08-25T10:38+09:00 |
| jvndb-2025-000063 | Western Digital Kitfox registers a Windows service with an unquoted file path | 2025-08-22T13:37+09:00 | 2025-08-22T13:37+09:00 |
| jvndb-2025-000062 | Multiple vulnerabilities in Group-Office | 2025-08-21T14:03+09:00 | 2025-08-21T14:03+09:00 |
| jvndb-2025-000061 | Multiple vulnerabilities in Movable Type | 2025-08-20T15:30+09:00 | 2025-08-20T15:30+09:00 |
| jvndb-2025-000059 | Seagate Toolkit registers a Windows service with an unquoted file path | 2025-08-14T12:32+09:00 | 2025-08-19T14:40+09:00 |
| jvndb-2025-010854 | Trend Micro Endpoint security products for enterprises vulnerable to multiple OS command injection | 2025-08-07T12:25+09:00 | 2025-08-19T11:36+09:00 |
| jvndb-2025-007521 | Multiple Brother driver installers for Windows vulnerable to privilege escalation | 2025-06-27T09:37+09:00 | 2025-08-19T11:29+09:00 |
| jvndb-2025-000060 | PgManage vulnerable to injection | 2025-08-18T13:40+09:00 | 2025-08-18T13:40+09:00 |
| jvndb-2025-000058 | WordPress plugin "Advanced Custom Fields" vulnerable to HTML injection | 2025-08-08T15:29+09:00 | 2025-08-08T15:29+09:00 |
| jvndb-2025-010972 | Multiple SEIKO EPSON products use weak initial passwords | 2025-08-08T14:50+09:00 | 2025-08-08T14:50+09:00 |
| jvndb-2025-000057 | Multiple vulnerabilities in Mubit Powered BLUE 870 | 2025-08-08T14:47+09:00 | 2025-08-08T14:47+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14995 | Apple macOS Tahoe信息泄露漏洞(CNVD-2026-14995) | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14994 | Apple macOS Tahoe信息泄露漏洞(CNVD-2026-14994) | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14975 | Apple macOS越界读取漏洞(CNVD-2026-14975) | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14974 | Apple macOS信息泄露漏洞(CNVD-2026-14974) | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14973 | Apple macOS Tahoe权限提升漏洞 | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14972 | Chamilo import.php文件操作系统命令注入漏洞 | 2026-03-09 | 2026-03-26 |
| cnvd-2026-14971 | Chamilo editinstance.php文件操作系统命令注入漏洞 | 2026-03-09 | 2026-03-26 |
| cnvd-2026-14970 | Chamilo CSV文件名跨站脚本漏洞 | 2026-03-09 | 2026-03-26 |
| cnvd-2026-14969 | WordPress插件WpEvently信息泄露漏洞 | 2026-03-19 | 2026-03-26 |
| cnvd-2026-14968 | WordPress插件wpDiscuz信息泄露漏洞 | 2026-03-19 | 2026-03-26 |
| cnvd-2026-15250 | Huawei HarmonyOS证书管理模块数据处理漏洞 | 2026-03-12 | 2026-03-25 |
| cnvd-2026-14861 | OpenClaw后置链接漏洞(CNVD-2026-14861) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14860 | OpenClaw代码问题漏洞(CNVD-2026-14860) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14859 | OpenClaw后置链接漏洞(CNVD-2026-14859) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14858 | OpenClaw后置链接漏洞(CNVD-2026-14858) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14857 | OpenClaw路径遍历漏洞(CNVD-2026-14857) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14856 | OpenClaw路径遍历漏洞(CNVD-2026-14856) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14850 | OpenClaw路径遍历漏洞(CNVD-2026-14850) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14849 | OpenClaw代码问题漏洞(CNVD-2026-14849) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14848 | OpenClaw路径遍历漏洞(CNVD-2026-14848) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14846 | OpenClaw后置链接漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14844 | OpenClaw代码问题漏洞(CNVD-2026-14844) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14843 | OpenClaw身份验证强化漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14842 | OpenClaw访问控制错误漏洞(CNVD-2026-14842) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14841 | OpenClaw授权绕过漏洞(CNVD-2026-14841) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14840 | OpenClaw身份验证绕过漏洞(CNVD-2026-14840) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14839 | OpenClaw身份验证绕过漏洞(CNVD-2026-14839) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14838 | OpenClaw存在未明漏洞(CNVD-2026-14838) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14837 | OpenClaw授权绕过漏洞(CNVD-2026-14837) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14836 | OpenClaw元数据欺骗漏洞 | 2026-03-24 | 2026-03-25 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15695 | Уязвимость компонента drivers/gpu/drm/hisilicon/hibmc/hibmc_drm_drv.c ядра операционной с… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15694 | Уязвимость функции br_multicast_query_expired() компонента net/bridge/br_multicast.c ядра… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15693 | Уязвимость функции destroy_args() компонента mm/debug_vm_pgtable.c ядра операционной сист… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15692 | Уязвимость компонента ufs-exynos.c ядра операционной системы Linux, позволяющая нарушител… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15690 | Уязвимость компонента drivers/bus ядра операционной системы Linux, позволяющая нарушителю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15688 | Уязвимость компонента fs/nfs ядра операционной системы Linux, позволяющая нарушителю полу… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15687 | Уязвимость компонента dwc3 ядра операционной системы Linux, позволяющая нарушителю вызват… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15686 | Уязвимость функции mt_report_fixup() ядра операционной системы Linux, позволяющая нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15683 | Уязвимость функции trace_printk_seq() ядра операционной системы Linux, связанная с неконт… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15682 | Уязвимость компонента efivarfs ядра операционной системы Linux, позволяющая нарушителю вы… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15680 | Уязвимость компонента fs/smb ядра операционной системы Linux, позволяющая нарушителю вызв… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15679 | Уязвимость компонента inode.c ядра операционной системы Linux, позволяющая нарушителю пол… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15678 | Уязвимость компонентов rose ядра операционной системы Linux, позволяющая нарушителю получ… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15677 | Уязвимость компонента rose_route.c ядра операционной системы Linux, позволяющая нарушител… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15676 | Уязвимость компонента xfs ядра операционной системы Linux, позволяющая нарушителю вызвать… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15674 | Уязвимость модуля wifi ядра операционной системы Linux, позволяющая нарушителю получить д… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15669 | Уязвимость компонента slub.c ядра операционной системы Linux, позволяющая нарушителю вызв… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15667 | Уязвимость функции do_validate_mem() компонента rsrc_nonstatic.c ядра операционной систем… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15665 | Уязвимость компонента arch/x86 ядра операционной системы Linux, позволяющая нарушителю по… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15660 | Уязвимость компонента fs/hfsplus/unicode.c ядра операционной системы Linux, позволяющая н… | 14.12.2025 | 16.02.2026 |
| bdu:2025-15659 | Уязвимость компонента fs/hfsplus/bnode.c ядра операционной системы Linux, позволяющая нар… | 14.12.2025 | 16.02.2026 |
| bdu:2025-15658 | Уязвимость компонента netfilter ядра операционной системы Linux, позволяющая нарушителю в… | 14.12.2025 | 16.02.2026 |
| bdu:2025-15559 | Уязвимость функции sqlite3KeyInfoFromExprList системы управления базами данных SQLite, по… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15558 | Уязвимость реализации протокола IEEE 802.11 ядра операционной системы Linux, позволяющая … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15556 | Уязвимость компонента jfs_imap.c ядра операционной системы Linux, позволяющая нарушителю … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15555 | Уязвимость компонента ksmbd ядра операционной системы Linux, позволяющая нарушителю вызва… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15554 | Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | 11.12.2025 | 16.02.2026 |
| bdu:2025-15553 | Уязвимость компонента net/sched ядра операционной системы Linux, позволяющая нарушителю в… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15552 | Уязвимость компонента eventpoll ядра операционной системы Linux, позволяющая нарушителю в… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15551 | Уязвимость функции nf_tables_updchain компонента net/netfilter/nf_tables_api.c ядра опера… | 11.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201404-0378 | Unspecified vulnerability in Oracle Java SE 5.0u61, SE 6u71, 7u51, and 8; JRockit R27.8.1… | 2024-07-23T22:08:28.541000Z |
| var-201908-0264 | Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a den… | 2024-07-23T22:07:30.228000Z |
| var-201702-0469 | An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari be… | 2024-07-23T22:06:53.547000Z |
| var-200703-0016 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted at… | 2024-07-23T22:06:48.011000Z |
| var-201609-0595 | The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly … | 2024-07-23T22:06:46.651000Z |
| var-202004-1974 | A type confusion issue was addressed with improved memory handling. This issue is fixed i… | 2024-07-23T22:06:44.403000Z |
| var-201705-3790 | In Open vSwitch (OvS) v2.7.0, there is a buffer over-read while parsing the group mod Ope… | 2024-07-23T22:06:43.841000Z |
| var-202109-1802 | A crafted request uri-path can cause mod_proxy to forward the request to an origin server… | 2024-07-23T22:06:13.520000Z |
| var-202110-1622 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:06:10.313000Z |
| var-200905-0043 | Integer underflow in QuickDraw Manager in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7, … | 2024-07-23T22:06:10.145000Z |
| var-202203-0129 | A cookie management issue was addressed with improved state management. This issue is fix… | 2024-07-23T22:06:09.291000Z |
| var-200210-0102 | Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a deni… | 2024-07-23T22:06:08.093000Z |
| var-202009-0037 | A flaw was discovered in all versions of Undertow before Undertow 2.2.0.Final, where HTTP… | 2024-07-23T22:06:07.991000Z |
| var-201912-0619 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:06:04.230000Z |
| var-200809-0566 | Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2… | 2024-07-23T22:06:03.293000Z |
| var-202201-0424 | A validation issue was addressed with improved input sanitization. This issue is fixed in… | 2024-07-23T22:06:01.833000Z |
| var-200604-0201 | Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary c… | 2024-07-23T22:05:29.066000Z |
| var-201201-0025 | Use-after-free vulnerability in Google Chrome before 16.0.912.77 allows remote attackers … | 2024-07-23T22:05:28.758000Z |
| var-201808-0957 | Systems with microprocessors utilizing speculative execution and address translations may… | 2024-07-23T22:05:21.889000Z |
| var-202203-1400 | jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of servic… | 2024-07-23T22:05:19.247000Z |
| var-201912-0640 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:05:19.907000Z |
| var-201904-1343 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:05:19.745000Z |
| var-201007-0949 | WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before… | 2024-07-23T22:05:19.065000Z |
| var-201912-1856 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:04:56.028000Z |
| var-200904-0821 | The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products… | 2024-07-23T22:04:56.133000Z |
| var-200603-0282 | Unspecified vulnerability in Safari, LaunchServices, and/or CoreTypes in Apple Mac OS X 1… | 2024-07-23T22:04:24.723000Z |
| var-201912-0509 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:03:53.293000Z |
| var-200806-0575 | SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and … | 2024-07-23T22:03:53.151000Z |
| var-200703-0024 | Unspecified vulnerability in the authentication feature for DirectoryService (DS Plug-Ins… | 2024-07-23T22:03:53.866000Z |
| var-202005-1054 | dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by d… | 2024-07-23T22:03:49.580000Z |