Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-35620 |
5.3 (4.0)
5.4 (3.1)
|
OpenClaw < 2026.3.24 - Missing Authorization in /send … |
OpenClaw |
OpenClaw |
2026-04-10T16:03:09.127Z | 2026-04-10T16:03:09.127Z |
| CVE-2026-35619 |
5.3 (4.0)
4.3 (3.1)
|
OpenClaw < 2026.3.24 - Authorization Bypass via HTTP /… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:08.449Z | 2026-04-10T16:03:08.449Z |
| CVE-2026-35596 |
4.3 (3.1)
|
Vikunja has Broken Access Control on Label Read via SQ… |
go-vikunja |
vikunja |
2026-04-10T15:59:43.255Z | 2026-04-10T15:59:43.255Z |
| CVE-2026-35595 |
8.3 (3.1)
|
Vikunja Affected by Privilege Escalation via Project R… |
go-vikunja |
vikunja |
2026-04-10T15:58:32.658Z | 2026-04-10T18:16:18.230Z |
| CVE-2026-35594 |
6.5 (3.1)
|
Vikunja Link Share JWT tokens remain valid for 72 hour… |
go-vikunja |
vikunja |
2026-04-10T15:55:04.929Z | 2026-04-10T15:55:04.929Z |
| CVE-2026-40228 |
2.9 (3.1)
|
In systemd 259, systemd-journald can send ANSI es… |
systemd |
systemd |
2026-04-10T15:48:44.215Z | 2026-04-10T17:27:22.882Z |
| CVE-2026-40023 |
6.3 (4.0)
|
Apache Log4cxx, Apache Log4cxx (Conan), Apache Log4cxx… |
Apache Software Foundation |
Apache Log4cxx |
2026-04-10T15:45:52.895Z | 2026-04-10T17:29:20.009Z |
| CVE-2026-34727 |
7.4 (3.1)
|
Vikunja ahs a TOTP Two-Factor Authentication Bypass vi… |
go-vikunja |
vikunja |
2026-04-10T15:45:30.662Z | 2026-04-10T15:45:30.662Z |
| CVE-2026-40021 |
6.3 (4.0)
|
Apache Log4net: Silent log event loss in XmlLayout and… |
Apache Software Foundation |
Apache Log4net |
2026-04-10T15:44:17.451Z | 2026-04-10T17:35:01.228Z |
| CVE-2026-34481 |
6.3 (4.0)
|
Apache Log4j JSON Template Layout: Improper serializat… |
Apache Software Foundation |
Apache Log4j JSON Template Layout |
2026-04-10T15:43:00.100Z | 2026-04-10T17:41:38.229Z |
| CVE-2026-34480 |
6.9 (4.0)
|
Apache Log4j Core: Silent log event loss in XmlLayout … |
Apache Software Foundation |
Apache Log4j Core |
2026-04-10T15:42:03.843Z | 2026-04-10T17:45:07.434Z |
| CVE-2026-34479 |
6.9 (4.0)
|
Apache Log4j 1 to Log4j 2 bridge: Silent log event los… |
Apache Software Foundation |
Apache Log4j 1 to Log4j 2 bridge |
2026-04-10T15:41:07.888Z | 2026-04-10T17:47:34.402Z |
| CVE-2026-34478 |
6.9 (4.0)
|
Apache Log4j Core: Log injection in Rfc5424Layout due … |
Apache Software Foundation |
Apache Log4j Core |
2026-04-10T15:40:17.713Z | 2026-04-10T17:50:12.484Z |
| CVE-2026-34477 |
6.3 (4.0)
|
Apache Log4j Core: verifyHostName attribute silently i… |
Apache Software Foundation |
Apache Log4j Core |
2026-04-10T15:36:19.740Z | 2026-04-10T17:38:57.154Z |
| CVE-2026-29043 |
5.5 (3.1)
|
HDF5 H5T__ref_mem_setnull Heap Buffer Overflow |
HDFGroup |
hdf5 |
2026-04-10T15:35:51.682Z | 2026-04-10T15:35:51.682Z |
| CVE-2026-40227 |
6.2 (3.1)
|
In systemd 260 before 261, a local unprivileged u… |
systemd |
systemd |
2026-04-10T15:19:51.433Z | 2026-04-10T15:26:26.507Z |
| CVE-2026-40226 |
6.4 (3.1)
|
In nspawn in systemd 233 through 259 before 260, … |
systemd |
systemd |
2026-04-10T15:18:10.447Z | 2026-04-10T15:34:22.039Z |
| CVE-2026-40225 |
6.4 (3.1)
|
In udev in systemd before 260, local root executi… |
systemd |
systemd |
2026-04-10T15:16:19.827Z | 2026-04-10T15:33:39.797Z |
| CVE-2026-40224 |
6.7 (3.1)
|
In systemd 259 before 260, there is local privile… |
systemd |
systemd |
2026-04-10T15:14:21.904Z | 2026-04-10T18:13:05.818Z |
| CVE-2026-29002 |
8.6 (4.0)
7.2 (3.1)
|
CouchCMS Privilege Escalation via f_k_levels_list Parameter |
CouchCMS |
CouchCMS |
2026-04-10T15:11:43.411Z | 2026-04-10T16:20:02.847Z |
| CVE-2026-40223 |
4.7 (3.1)
|
In systemd 258 before 260, a local unprivileged u… |
systemd |
systemd |
2026-04-10T15:10:56.605Z | 2026-04-10T15:32:55.263Z |
| CVE-2026-40217 |
8.8 (3.1)
|
LiteLLM through 2026-04-08 allows remote attacker… |
BerriAI |
LiteLLM |
2026-04-10T13:43:23.147Z | 2026-04-10T13:43:23.147Z |
| CVE-2026-6069 |
7.5 (3.1)
|
CVE-2026-6069 |
NASM |
NASM |
2026-04-10T13:30:48.302Z | 2026-04-10T14:53:37.082Z |
| CVE-2026-6068 |
6.5 (3.1)
|
CVE-2026-6068 |
NASM |
NASM |
2026-04-10T13:30:38.420Z | 2026-04-10T14:56:52.908Z |
| CVE-2026-6067 |
7.5 (3.1)
|
CVE-2026-6067 |
NASM |
NASM |
2026-04-10T13:30:26.140Z | 2026-04-10T14:58:07.818Z |
| CVE-2025-58920 |
7.1 (3.1)
|
WordPress Cerato theme <= 2.2.18 - Reflected Cross Sit… |
Zootemplate |
Cerato |
2026-04-10T13:25:31.611Z | 2026-04-10T14:07:44.099Z |
| CVE-2025-58913 |
8.1 (3.1)
|
WordPress VideoPro theme <= 2.3.8.1 - Local File Inclu… |
CactusThemes |
VideoPro |
2026-04-10T13:21:05.820Z | 2026-04-10T13:21:05.820Z |
| CVE-2025-5804 |
7.5 (3.1)
|
WordPress Case Theme User < 1.0.4 - Local File Inclusi… |
Case Themes |
Case Theme User |
2026-04-10T13:19:43.457Z | 2026-04-10T13:19:43.457Z |
| CVE-2026-33092 |
7.8 (3.0)
|
Local privilege escalation due to improper handli… |
Acronis |
Acronis True Image OEM |
2026-04-10T13:17:45.275Z | 2026-04-10T14:02:46.538Z |
| CVE-2026-5412 |
9.9 (3.1)
|
Juju CloudSpec API could leak senstive information |
Canonical |
Juju |
2026-04-10T12:22:05.403Z | 2026-04-10T14:04:30.155Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-35596 |
4.3 (3.1)
|
Vikunja has Broken Access Control on Label Read via SQ… |
go-vikunja |
vikunja |
2026-04-10T15:59:43.255Z | 2026-04-10T15:59:43.255Z |
| CVE-2026-35595 |
8.3 (3.1)
|
Vikunja Affected by Privilege Escalation via Project R… |
go-vikunja |
vikunja |
2026-04-10T15:58:32.658Z | 2026-04-10T18:16:18.230Z |
| CVE-2026-22560 |
N/A
|
An open redirect vulnerability in Rocket.Chat ver… |
Rocket.Chat |
Rocket.Chat |
2026-04-10T17:00:11.746Z | 2026-04-10T17:00:11.746Z |
| CVE-2026-40228 |
2.9 (3.1)
|
In systemd 259, systemd-journald can send ANSI es… |
systemd |
systemd |
2026-04-10T15:48:44.215Z | 2026-04-10T17:27:22.882Z |
| CVE-2026-40227 |
6.2 (3.1)
|
In systemd 260 before 261, a local unprivileged u… |
systemd |
systemd |
2026-04-10T15:19:51.433Z | 2026-04-10T15:26:26.507Z |
| CVE-2026-40226 |
6.4 (3.1)
|
In nspawn in systemd 233 through 259 before 260, … |
systemd |
systemd |
2026-04-10T15:18:10.447Z | 2026-04-10T15:34:22.039Z |
| CVE-2026-40225 |
6.4 (3.1)
|
In udev in systemd before 260, local root executi… |
systemd |
systemd |
2026-04-10T15:16:19.827Z | 2026-04-10T15:33:39.797Z |
| CVE-2026-40224 |
6.7 (3.1)
|
In systemd 259 before 260, there is local privile… |
systemd |
systemd |
2026-04-10T15:14:21.904Z | 2026-04-10T18:13:05.818Z |
| CVE-2026-40223 |
4.7 (3.1)
|
In systemd 258 before 260, a local unprivileged u… |
systemd |
systemd |
2026-04-10T15:10:56.605Z | 2026-04-10T15:32:55.263Z |
| CVE-2026-40023 |
6.3 (4.0)
|
Apache Log4cxx, Apache Log4cxx (Conan), Apache Log4cxx… |
Apache Software Foundation |
Apache Log4cxx |
2026-04-10T15:45:52.895Z | 2026-04-10T17:29:20.009Z |
| CVE-2026-40021 |
6.3 (4.0)
|
Apache Log4net: Silent log event loss in XmlLayout and… |
Apache Software Foundation |
Apache Log4net |
2026-04-10T15:44:17.451Z | 2026-04-10T17:35:01.228Z |
| CVE-2026-35594 |
6.5 (3.1)
|
Vikunja Link Share JWT tokens remain valid for 72 hour… |
go-vikunja |
vikunja |
2026-04-10T15:55:04.929Z | 2026-04-10T15:55:04.929Z |
| CVE-2026-34727 |
7.4 (3.1)
|
Vikunja ahs a TOTP Two-Factor Authentication Bypass vi… |
go-vikunja |
vikunja |
2026-04-10T15:45:30.662Z | 2026-04-10T15:45:30.662Z |
| CVE-2026-34481 |
6.3 (4.0)
|
Apache Log4j JSON Template Layout: Improper serializat… |
Apache Software Foundation |
Apache Log4j JSON Template Layout |
2026-04-10T15:43:00.100Z | 2026-04-10T17:41:38.229Z |
| CVE-2026-34480 |
6.9 (4.0)
|
Apache Log4j Core: Silent log event loss in XmlLayout … |
Apache Software Foundation |
Apache Log4j Core |
2026-04-10T15:42:03.843Z | 2026-04-10T17:45:07.434Z |
| CVE-2026-34479 |
6.9 (4.0)
|
Apache Log4j 1 to Log4j 2 bridge: Silent log event los… |
Apache Software Foundation |
Apache Log4j 1 to Log4j 2 bridge |
2026-04-10T15:41:07.888Z | 2026-04-10T17:47:34.402Z |
| CVE-2026-34478 |
6.9 (4.0)
|
Apache Log4j Core: Log injection in Rfc5424Layout due … |
Apache Software Foundation |
Apache Log4j Core |
2026-04-10T15:40:17.713Z | 2026-04-10T17:50:12.484Z |
| CVE-2026-34477 |
6.3 (4.0)
|
Apache Log4j Core: verifyHostName attribute silently i… |
Apache Software Foundation |
Apache Log4j Core |
2026-04-10T15:36:19.740Z | 2026-04-10T17:38:57.154Z |
| CVE-2026-29043 |
5.5 (3.1)
|
HDF5 H5T__ref_mem_setnull Heap Buffer Overflow |
HDFGroup |
hdf5 |
2026-04-10T15:35:51.682Z | 2026-04-10T15:35:51.682Z |
| CVE-2026-29002 |
8.6 (4.0)
7.2 (3.1)
|
CouchCMS Privilege Escalation via f_k_levels_list Parameter |
CouchCMS |
CouchCMS |
2026-04-10T15:11:43.411Z | 2026-04-10T16:20:02.847Z |
| CVE-2026-23781 |
N/A
|
An issue was discovered in BMC Control-M/MFT 9.0.… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T15:52:02.482Z |
| CVE-2026-36236 |
N/A
|
SourceCodester Engineers Online Portal v1.0 is vu… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:47:13.962Z |
| CVE-2026-36235 |
N/A
|
A SQL injection vulnerability was found in the sc… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:33:55.426Z |
| CVE-2026-36234 |
N/A
|
itsourcecode Online Student Enrollment System v1.… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:33:20.708Z |
| CVE-2026-36233 |
N/A
|
A SQL injection vulnerability was found in the as… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:36:00.955Z |
| CVE-2026-36232 |
N/A
|
A SQL injection vulnerability was found in the in… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:38:14.710Z |
| CVE-2026-31262 |
N/A
|
Cross Site Scripting vulnerability in Altenar Spo… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:35:33.823Z |
| CVE-2026-29861 |
N/A
|
PHP-MYSQL-User-Login-System v1.0 was discovered t… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:38:34.237Z |
| CVE-2026-23782 |
N/A
|
An issue was discovered in BMC Control-M/MFT 9.0.… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:16:21.821Z |
| CVE-2026-23780 |
N/A
|
An issue was discovered in BMC Control-M/MFT 9.0.… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:26:38.015Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-23161 | In the Linux kernel, the following vulnerability has been resolved: mm/shmem, swap: fix race of tr… | 2026-02-14T16:15:56.277 | 2026-04-03T14:16:24.830 |
| fkie_cve-2026-23160 | In the Linux kernel, the following vulnerability has been resolved: octeon_ep: Fix memory leak in … | 2026-02-14T16:15:56.177 | 2026-03-18T14:12:40.197 |
| fkie_cve-2026-23159 | In the Linux kernel, the following vulnerability has been resolved: perf: sched: Fix perf crash wi… | 2026-02-14T16:15:56.070 | 2026-03-18T14:13:18.750 |
| fkie_cve-2026-23158 | In the Linux kernel, the following vulnerability has been resolved: gpio: virtuser: fix UAF in con… | 2026-02-14T16:15:55.967 | 2026-03-18T14:19:55.513 |
| fkie_cve-2026-23157 | In the Linux kernel, the following vulnerability has been resolved: btrfs: do not strictly require… | 2026-02-14T16:15:55.863 | 2026-03-25T11:16:19.570 |
| fkie_cve-2026-23156 | In the Linux kernel, the following vulnerability has been resolved: efivarfs: fix error propagatio… | 2026-02-14T16:15:55.760 | 2026-03-18T14:40:43.860 |
| fkie_cve-2026-23155 | In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bu… | 2026-02-14T16:15:55.653 | 2026-03-18T14:42:44.383 |
| fkie_cve-2026-23154 | In the Linux kernel, the following vulnerability has been resolved: net: fix segmentation of forwa… | 2026-02-14T16:15:55.550 | 2026-03-25T11:16:19.400 |
| fkie_cve-2026-23153 | In the Linux kernel, the following vulnerability has been resolved: firewire: core: fix race condi… | 2026-02-14T16:15:55.443 | 2026-03-18T14:16:24.010 |
| fkie_cve-2026-23152 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: correctly deco… | 2026-02-14T16:15:55.340 | 2026-03-17T21:11:25.373 |
| fkie_cve-2026-23151 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix memory le… | 2026-02-14T16:15:55.233 | 2026-03-17T21:11:37.000 |
| fkie_cve-2026-23150 | In the Linux kernel, the following vulnerability has been resolved: nfc: llcp: Fix memleak in nfc_… | 2026-02-14T16:15:55.123 | 2026-03-17T21:12:01.620 |
| fkie_cve-2026-23149 | In the Linux kernel, the following vulnerability has been resolved: drm: Do not allow userspace to… | 2026-02-14T16:15:55.023 | 2026-03-17T21:12:29.223 |
| fkie_cve-2026-23148 | In the Linux kernel, the following vulnerability has been resolved: nvmet: fix race in nvmet_bio_d… | 2026-02-14T16:15:54.913 | 2026-04-03T14:16:24.630 |
| fkie_cve-2026-23147 | In the Linux kernel, the following vulnerability has been resolved: btrfs: zlib: fix the folio lea… | 2026-02-14T16:15:54.813 | 2026-03-17T21:12:52.717 |
| fkie_cve-2026-23146 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_uart: fix null-… | 2026-02-14T16:15:54.703 | 2026-03-17T21:13:01.070 |
| fkie_cve-2026-23145 | In the Linux kernel, the following vulnerability has been resolved: ext4: fix iloc.bh leak in ext4… | 2026-02-14T16:15:54.597 | 2026-03-17T21:13:17.667 |
| fkie_cve-2026-23144 | In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: cleanup attrs … | 2026-02-14T16:15:54.490 | 2026-03-17T21:13:24.750 |
| fkie_cve-2026-23143 | In the Linux kernel, the following vulnerability has been resolved: virtio_net: Fix misalignment b… | 2026-02-14T16:15:54.383 | 2026-03-17T21:13:32.820 |
| fkie_cve-2026-23142 | In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs-scheme: cleanup… | 2026-02-14T16:15:54.273 | 2026-03-17T21:13:41.900 |
| fkie_cve-2026-23141 | In the Linux kernel, the following vulnerability has been resolved: btrfs: send: check for inline … | 2026-02-14T16:15:54.163 | 2026-03-25T11:16:19.240 |
| fkie_cve-2026-23140 | In the Linux kernel, the following vulnerability has been resolved: bpf, test_run: Subtract size o… | 2026-02-14T16:15:54.060 | 2026-03-17T21:13:55.033 |
| fkie_cve-2026-23139 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conncount: updat… | 2026-02-14T16:15:53.950 | 2026-04-03T14:16:24.440 |
| fkie_cve-2026-23138 | In the Linux kernel, the following vulnerability has been resolved: tracing: Add recursion protect… | 2026-02-14T16:15:53.830 | 2026-03-25T11:16:19.087 |
| fkie_cve-2026-23137 | In the Linux kernel, the following vulnerability has been resolved: of: unittest: Fix memory leak … | 2026-02-14T16:15:53.703 | 2026-03-17T21:15:45.090 |
| fkie_cve-2026-23136 | In the Linux kernel, the following vulnerability has been resolved: libceph: reset sparse-read sta… | 2026-02-14T16:15:53.590 | 2026-04-03T14:16:24.267 |
| fkie_cve-2026-23135 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix dma_free_coh… | 2026-02-14T16:15:53.483 | 2026-03-17T21:16:17.760 |
| fkie_cve-2026-23134 | In the Linux kernel, the following vulnerability has been resolved: slab: fix kmalloc_nolock() con… | 2026-02-14T16:15:53.377 | 2026-03-17T21:16:27.177 |
| fkie_cve-2026-23133 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: fix dma_free_coh… | 2026-02-14T16:15:53.270 | 2026-03-17T21:16:34.003 |
| fkie_cve-2026-23132 | In the Linux kernel, the following vulnerability has been resolved: drm/bridge: synopsys: dw-dp: f… | 2026-02-14T16:15:53.163 | 2026-03-17T21:16:41.337 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-445c-vh5m-36rj |
6.9 (4.0)
|
Apache Log4j Core's Rfc5424Layout https://logging.apache.org/log4j/2.x/manual/layouts.html#RFC5424… | 2026-04-10T18:31:17Z | 2026-04-10T18:31:18Z |
| ghsa-3pxv-7cmr-fjr4 |
6.9 (4.0)
|
Apache Log4j Core's XmlLayout fails to sanitize characters | 2026-04-10T18:31:17Z | 2026-04-10T21:16:41Z |
| ghsa-5f5r-95pg-xrpm |
3.5 (3.1)
|
Beszel has an IDOR in hub API endpoints that read system ID from URL parameter | 2026-04-10T17:32:05Z | 2026-04-10T17:32:05Z |
| ghsa-3f6h-2hrp-w5wx |
6.3 (4.0)
|
@sveltejs/kit: Unvalidated redirect in handle hook causes Denial-of-Service | 2026-04-10T17:32:00Z | 2026-04-10T19:46:47Z |
| ghsa-2crg-3p73-43xp |
8.2 (4.0)
|
@sveltejs/adapter-node has a BODY_SIZE_LIMIT bypass | 2026-04-10T17:24:31Z | 2026-04-10T19:46:38Z |
| ghsa-99j8-wv67-4c72 |
6.8 (3.1)
|
Aiven Operator has cross-namespace secret exfiltration via ClickhouseUser connInfoSecretSource | 2026-04-10T17:22:00Z | 2026-04-10T17:22:00Z |
| ghsa-v479-vf79-mg83 |
4.3 (3.1)
|
Vikunja: Scoped API tokens with projects.background permission can delete project backgrounds | 2026-04-10T15:36:47Z | 2026-04-10T19:47:00Z |
| ghsa-v457-wxvj-p9w9 |
7.5 (3.1)
|
@vitejs/plugin-rsc has a Denial of Service with React Server Components | 2026-04-10T15:36:00Z | 2026-04-10T15:36:00Z |
| ghsa-q4gf-8mx6-v5v3 |
7.5 (3.1)
|
Next.js has a Denial of Service with Server Components | 2026-04-10T15:35:47Z | 2026-04-10T15:35:47Z |
| ghsa-479c-33wc-g2pg |
7.5 (3.1)
|
React Server Components have a Denial of Service Vulnerability | 2026-04-10T15:35:37Z | 2026-04-10T15:35:38Z |
| ghsa-qh78-rvg3-cv54 |
5.4 (3.1)
|
Vikunja has File Size Limit Bypass via Vikunja Import | 2026-04-10T15:35:18Z | 2026-04-10T19:46:01Z |
| ghsa-2g7h-7rqr-9p4r |
4.1 (3.1)
|
Vikunja has iCalendar Property Injection via CRLF in CalDAV Task Output | 2026-04-10T15:35:05Z | 2026-04-10T19:45:55Z |
| ghsa-45q4-x4r9-8fqj |
5.4 (3.1)
|
Vikunja has HTML Injection via Task Titles in Overdue Email Notifications | 2026-04-10T15:34:53Z | 2026-04-10T19:45:50Z |
| ghsa-r4fg-73rc-hhh7 |
6.5 (3.1)
|
Vikunja has Algorithmic Complexity DoS in Repeating Task Handler | 2026-04-10T15:34:41Z | 2026-04-10T19:36:35Z |
| ghsa-48ch-p4gq-x46x |
4.3 (3.1)
|
Vikunja Missing Authorization on CalDAV Task Read | 2026-04-10T15:34:23Z | 2026-04-10T19:36:26Z |
| ghsa-fgfv-pv97-6cmj |
5.9 (3.1)
|
Vikunja Vulnerable to TOTP Brute-Force Due to Non-Functional Account Lockout | 2026-04-10T15:34:14Z | 2026-04-10T19:36:20Z |
| ghsa-hj5c-mhh2-g7jq |
4.3 (3.1)
|
Vikunja has Broken Access Control on Label Read via SQL Operator Precedence Bug | 2026-04-10T15:33:59Z | 2026-04-10T15:33:59Z |
| ghsa-2vq4-854f-5c72 |
8.3 (3.1)
|
Vikunja vulnerable to Privilege Escalation via Project Reparenting | 2026-04-10T15:33:50Z | 2026-04-10T19:36:15Z |
| ghsa-hr2v-4r36-88hr |
4.8 (4.0)
|
Helm Chart extraction output directory collapse via `Chart.yaml` name dot-segment | 2026-04-10T15:33:09Z | 2026-04-10T15:33:09Z |
| ghsa-q5jf-9vfq-h4h7 |
8.4 (4.0)
|
Helm's plugin verification fails open when .prov is missing, allowing unsigned plugin install | 2026-04-10T15:33:03Z | 2026-04-10T15:33:03Z |
| ghsa-vmx8-mqv2-9gmg |
8.4 (4.0)
|
Helm has a path traversal in plugin metadata version enables arbitrary file write outside Helm plug… | 2026-04-10T15:32:56Z | 2026-04-10T15:32:56Z |
| ghsa-f984-pcp8-v2p7 |
6.1 (4.0)
|
Wasmtime has improperly masked return value from `table.grow` with Winch compiler backend | 2026-04-10T15:32:49Z | 2026-04-10T15:32:49Z |
| ghsa-wvjf-23gc-c2fw |
7.5 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-04-10T15:31:58Z | 2026-04-10T15:31:58Z |
| ghsa-r9rh-xw3r-r4x2 |
|
A SQL injection vulnerability was found in the scheduleSubList.php file of itsourcecode Online Stud… | 2026-04-10T15:31:58Z | 2026-04-10T15:31:58Z |
| ghsa-pfc2-7mmr-x54w |
7.5 (3.1)
|
NASM’s disasm() function contains a stack based buffer overflow when formatting disassembly output,… | 2026-04-10T15:31:58Z | 2026-04-10T15:31:58Z |
| ghsa-mcv5-wpqg-r546 |
|
A SQL injection vulnerability was found in the assignInstructorSubjects.php file of itsourcecode On… | 2026-04-10T15:31:58Z | 2026-04-10T15:31:58Z |
| ghsa-h5j3-w5wp-rcr7 |
|
SourceCodester Engineers Online Portal v1.0 is vulnerable to SQL Injection in update_password.php v… | 2026-04-10T15:31:58Z | 2026-04-10T15:31:58Z |
| ghsa-g636-hw74-5gw3 |
|
Cross Site Scripting vulnerability in Altenar Sportsbook Software Platform (SB2) v.2.0 allows a rem… | 2026-04-10T15:31:58Z | 2026-04-10T15:31:58Z |
| ghsa-g288-xp64-f3j7 |
|
PHP-MYSQL-User-Login-System v1.0 was discovered to contain a SQL injection vulnerability via the us… | 2026-04-10T15:31:58Z | 2026-04-10T15:31:58Z |
| ghsa-fm6c-v9mw-r38m |
|
itsourcecode Online Student Enrollment System v1.0 is vulnerable to SQL Injection in newCourse.php … | 2026-04-10T15:31:58Z | 2026-04-10T15:31:58Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-54 |
6.5 (3.1)
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-06-24T18:15:00+00:00 | 2024-06-26T19:19:24.981233+00:00 |
| pysec-2024-53 |
|
langchain_experimental (aka LangChain Experimental) before 0.0.61 for LangChain provides … | langchain-experimental | 2024-06-16T15:15:00+00:00 | 2024-06-16T17:20:32.187558+00:00 |
| pysec-2024-195 |
5.5 (3.1)
|
Use of Web Browser Cache Containing Sensitive Information vulnerability in Apache Airflow… | apache-airflow | 2024-06-14T09:15:09+00:00 | 2025-01-19T16:22:56.419822+00:00 |
| pysec-2024-98 |
9.8 (3.1)
|
** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Submarine… | apache-submarine | 2024-06-12T15:15:00+00:00 | 2024-09-26T17:22:54.526846+00:00 |
| pysec-2024-97 |
9.8 (3.1)
|
** UNSUPPORTED WHEN ASSIGNED ** Improper Authentication vulnerability in Apache Submarine… | apache-submarine | 2024-06-12T14:15:00+00:00 | 2024-09-26T17:22:54.470974+00:00 |
| pysec-2024-236 |
6.1 (3.1)
|
Jupyter Server Proxy allows users to run arbitrary external processes alongside their not… | jupyter-server-proxy | 2024-06-11T22:15:09+00:00 | 2025-02-26T23:22:41.524251+00:00 |
| pysec-2024-177 |
9.8 (3.1)
|
Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach… | langflow | 2024-06-10T20:15:15+00:00 | 2025-01-19T01:52:23.722576+00:00 |
| pysec-2024-52 |
|
lepture Authlib before 1.3.1 has algorithm confusion with asymmetric public keys. Unless … | authlib | 2024-06-09T19:15:00+00:00 | 2024-06-09T21:20:21.309692+00:00 |
| pysec-2024-76 |
7.5 (3.1)
|
An XML External Entity (XXE) vulnerability in the ebookmeta.get_metadata function of eboo… | ebookmeta | 2024-06-07T19:15:00+00:00 | 2024-09-13T21:22:04.531357+00:00 |
| pysec-2024-117 |
9.8 (3.1)
|
man-group/dtale version 3.10.0 is vulnerable to an authentication bypass and remote code … | dtale | 2024-06-06T19:16:00+00:00 | 2024-11-03T20:22:34.425699+00:00 |
| pysec-2024-110 |
4.7 (3.1)
|
A sensitive data leakage vulnerability was identified in scikit-learn's TfidfVectorizer, … | scikit-learn | 2024-06-06T19:16:00+00:00 | 2024-10-24T21:22:05.950602+00:00 |
| pysec-2024-108 |
7.5 (3.1)
|
A path traversal vulnerability exists in the parisneo/lollms application, affecting versi… | lollms | 2024-06-06T19:16:00+00:00 | 2024-10-17T17:21:59.592496+00:00 |
| pysec-2024-242 |
7.5 (3.1)
|
A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically … | mlflow | 2024-06-06T19:15:55+00:00 | 2025-04-08T10:23:24.995743+00:00 |
| pysec-2024-194 |
6.1 (3.1)
|
A clickjacking vulnerability exists in zenml-io/zenml versions up to and including 0.55.5… | zenml | 2024-06-06T19:15:54+00:00 | 2025-01-19T13:22:31.835293+00:00 |
| pysec-2024-193 |
3.3 (3.1)
|
An issue was discovered in zenml-io/zenml versions up to and including 0.55.4. Due to imp… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-19T13:22:31.701775+00:00 |
| pysec-2024-170 |
4.8 (3.1)
|
A stored Cross-Site Scripting (XSS) vulnerability was identified in the zenml-io/zenml re… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-18T19:19:08.253212+00:00 |
| pysec-2024-169 |
6.5 (3.1)
|
An improper authorization vulnerability exists in the zenml-io/zenml repository, specific… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-18T19:19:08.205431+00:00 |
| pysec-2024-239 |
8.8 (3.1)
|
A vulnerability in mlflow/mlflow version 8.2.1 allows for remote code execution due to im… | mlflow | 2024-06-06T19:15:51+00:00 | 2025-04-08T10:23:24.852109+00:00 |
| pysec-2024-118 |
4.7 (3.1)
|
A Denial-of-Service (DoS) vulnerability exists in the `SitemapLoader` class of the `langc… | langchain | 2024-06-06T19:15:00+00:00 | 2024-11-03T20:22:34.854295+00:00 |
| pysec-2024-105 |
3.1 (3.1)
|
A race condition vulnerability exists in zenml-io/zenml versions up to and including 0.55… | zenml | 2024-06-06T19:15:00+00:00 | 2024-10-11T17:21:29.672975+00:00 |
| pysec-2024-184 |
7.5 (3.1)
|
A local file inclusion vulnerability exists in the JSON component of gradio-app/gradio ve… | gradio | 2024-06-06T18:15:18+00:00 | 2025-01-19T04:23:00.017053+00:00 |
| pysec-2024-165 |
7.5 (3.1)
|
The Jupyter Server provides the backend for Jupyter web applications. Jupyter Server on W… | jupyter-server | 2024-06-06T16:15:11+00:00 | 2025-01-18T19:19:04.842426+00:00 |
| pysec-2024-166 |
|
Nautobot is a Network Source of Truth and Network Automation Platform. A user with permis… | nautobot | 2024-05-28T23:15:17+00:00 | 2025-01-18T19:19:06.277166+00:00 |
| pysec-2024-258 |
|
In scrapy/scrapy, an issue was identified where the Authorization header is not removed d… | scrapy | 2024-05-20T08:15:08+00:00 | 2025-07-15T17:37:50.051730+00:00 |
| pysec-2024-244 |
7.5 (3.1)
|
A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a by… | mlflow | 2024-05-16T09:15:14+00:00 | 2025-04-08T10:23:25.092581+00:00 |
| pysec-2024-51 |
|
A broken access control vulnerability exists in mlflow/mlflow versions before 2.10.1, whe… | mlflow | 2024-05-16T09:15:00+00:00 | 2024-05-16T11:19:52.866536+00:00 |
| pysec-2024-237 |
9.4 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-05-14T16:17:12+00:00 | 2025-03-05T17:22:29.121263+00:00 |
| pysec-2024-185 |
|
Nebari through 2024.4.1 prints the temporary Keycloak root password. | nebari | 2024-05-06T00:15:10+00:00 | 2025-01-19T04:23:00.951638+00:00 |
| pysec-2024-175 |
|
WordOps through 3.20.0 has a wo/cli/plugins/stack_pref.py TOCTOU race condition because t… | wordops | 2024-05-06T00:15:10+00:00 | 2025-01-18T22:21:44.991242+00:00 |
| pysec-2024-255 |
|
Gradio before 4.20 allows credential leakage on Windows. | gradio | 2024-05-05T20:15:07+00:00 | 2025-06-17T19:21:48.983901+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2300 | Malicious code in eslint-validator (npm) | 2026-03-30T15:59:45Z | 2026-03-31T03:12:01Z |
| mal-2026-2299 | Malicious code in mnemoniclib (PyPI) | 2026-03-30T12:02:35Z | 2026-03-30T12:02:35Z |
| mal-2026-2298 | Malicious code in hiveos-sdk (PyPI) | 2026-03-30T11:55:02Z | 2026-03-30T11:55:02Z |
| mal-2026-2297 | Malicious code in earthengine-api (npm) | 2026-03-30T01:40:30Z | 2026-03-31T03:12:01Z |
| mal-2026-2296 | Malicious code in bos-decoration-elements (npm) | 2026-03-29T22:45:22Z | 2026-03-31T03:12:00Z |
| mal-2026-2295 | Malicious code in databaseroboat (PyPI) | 2026-03-29T20:12:48Z | 2026-04-10T21:49:20Z |
| mal-2026-2294 | Malicious code in hiveos (PyPI) | 2026-03-29T18:44:31Z | 2026-03-29T18:44:31Z |
| mal-2026-2291 | Malicious code in pychatz (PyPI) | 2026-03-29T13:50:56Z | 2026-03-29T13:50:56Z |
| mal-2026-2292 | Malicious code in safecheckit (PyPI) | 2026-03-29T13:37:12Z | 2026-03-29T22:12:52Z |
| mal-2026-2293 | Malicious code in thisismytestnouser (PyPI) | 2026-03-29T13:34:24Z | 2026-03-29T13:34:25Z |
| mal-2026-2290 | Malicious code in iwantsafecheckit (PyPI) | 2026-03-29T13:31:21Z | 2026-03-29T22:12:52Z |
| mal-2026-2289 | Malicious code in database-roblox (PyPI) | 2026-03-29T12:15:48Z | 2026-04-10T21:49:20Z |
| mal-2026-2287 | Malicious code in f0-state-manager (npm) | 2026-03-29T11:50:43Z | 2026-03-31T03:12:01Z |
| mal-2026-2288 | Malicious code in merchservicingnodeserv (npm) | 2026-03-29T11:50:39Z | 2026-03-31T03:12:03Z |
| mal-2026-2285 | Malicious code in dial-app-version (npm) | 2026-03-29T10:58:29Z | 2026-03-31T03:12:01Z |
| mal-2026-2284 | Malicious code in bizsignupnodeweb (npm) | 2026-03-29T10:58:26Z | 2026-03-31T03:12:00Z |
| mal-2026-2286 | Malicious code in sn3akysnak3-test (npm) | 2026-03-29T10:55:32Z | 2026-03-31T03:12:04Z |
| mal-2026-2283 | Malicious code in interwebz (PyPI) | 2026-03-29T10:06:44Z | 2026-03-29T10:06:44Z |
| mal-2026-2282 | Malicious code in @adac-fahrzeugplattform/ui (npm) | 2026-03-29T04:43:26Z | 2026-03-31T03:11:59Z |
| mal-2026-2281 | Malicious code in roboats-addition (PyPI) | 2026-03-28T20:17:03Z | 2026-04-10T21:49:20Z |
| mal-2026-2280 | Malicious code in roboat-additions (PyPI) | 2026-03-28T20:16:43Z | 2026-04-10T21:49:20Z |
| mal-2026-2279 | Malicious code in roboat-addition (PyPI) | 2026-03-28T20:15:46Z | 2026-04-10T21:49:20Z |
| mal-2026-2278 | Malicious code in python-aiogram-telegram-updater (PyPI) | 2026-03-28T19:40:48Z | 2026-03-28T19:40:48Z |
| mal-2026-2277 | Malicious code in aiogram-photo-updater (PyPI) | 2026-03-28T19:40:23Z | 2026-03-28T19:40:23Z |
| mal-2026-2276 | Malicious code in payerpath-customer-lib (npm) | 2026-03-28T14:45:51Z | 2026-03-31T03:12:04Z |
| mal-2026-2274 | Malicious code in autoshipment-public-front (npm) | 2026-03-28T10:54:19Z | 2026-03-31T11:35:12Z |
| mal-2026-2275 | Malicious code in npmamzs (npm) | 2026-03-28T10:54:14Z | 2026-03-31T03:12:03Z |
| mal-2026-2270 | Malicious code in copytrading (PyPI) | 2026-03-27T16:50:02Z | 2026-03-27T16:50:02Z |
| mal-2026-2273 | Malicious code in trustwallet (PyPI) | 2026-03-27T16:47:51Z | 2026-03-27T16:47:51Z |
| mal-2026-2271 | Malicious code in metamask-api (PyPI) | 2026-03-27T16:47:31Z | 2026-03-27T16:47:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0361 | GIMP: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0359 | GnuTLS: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0357 | Roundcube: Mehrere Schwachstellen | 2026-02-09T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0355 | PowerDNS Recursor: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0353 | libpng: Schwachstelle ermöglicht Codeausführung | 2026-02-09T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0347 | Red Hat Build of Keycloak: Mehrere Schwachstellen | 2026-02-09T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0345 | Golang Go: Mehrere Schwachstellen | 2026-02-08T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0342 | GIMP: Schwachstelle ermöglicht Denial of Service | 2026-02-08T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0335 | vim: Schwachstelle ermöglicht Codeausführung | 2026-02-05T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0331 | BeyondTrust Privileged Remote Access und Remote Support: Schwachstelle ermöglicht Codeausführung | 2026-02-05T23:00:00.000+00:00 | 2026-02-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0327 | Asterisk: Mehrere Schwachstellen | 2026-02-05T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0326 | Red Hat Self-service automation portal for Ansible Automation Platform: Schwachstelle ermöglicht Manipulation von Dateien | 2026-02-05T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0324 | Linux Kernel: Mehrere Schwachstellen | 2026-02-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0318 | n8n: Mehrere Schwachstellen | 2026-02-04T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0312 | Drupal (Login Disable): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-02-04T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0310 | Cisco TelePresence Collaboration Endpoint Software: Schwachstelle ermöglicht Denial of Service | 2026-02-04T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0309 | NGINX OSS und NGINX Plus: Schwachstelle ermöglicht Manipulation von Dateien | 2026-02-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0308 | Cisco Evolved Programmable Network Manager und Prime Infrastructure: Schwachstelle ermöglicht Darstellen falscher Informationen | 2026-02-04T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0307 | Cisco Prime Infrastructure: Schwachstelle ermöglicht Cross-Site Scripting | 2026-02-04T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0306 | Red Hat Enterprise Linux (pyasn1): Schwachstelle ermöglicht Denial of Service | 2026-02-04T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0305 | Red Hat Enterprise Linux (libsoup): Mehrere Schwachstellen | 2026-02-04T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0303 | OpenClaw: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-02-03T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0302 | Red Hat Enterprise Linux (python-wheel): Schwachstelle ermöglicht Privilegieneskalation und Codeausführung | 2026-02-03T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0297 | Django: Mehrere Schwachstellen | 2026-02-03T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0291 | OpenClaw/Clawdbot: Mehrere Schwachstellen ermöglichen Codeausführung | 2026-02-02T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0290 | Samsung Android: Mehrere Schwachstellen | 2026-02-02T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0289 | Kubernetes (ingress-nginx): Mehrere Schwachstellen | 2026-02-02T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0284 | libxml2 (xmllint): Schwachstelle ermöglicht Denial of Service | 2026-02-02T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| bsi-2026-0001 | Unauthorized access affects VibroLine and AvibiaLine devices | 2026-02-02T13:00:00.000Z | 2026-02-02T13:00:00.000Z |
| wid-sec-w-2026-0280 | Linux Kernel: Mehrere Schwachstellen | 2026-02-01T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-324-02 | ICAM365 CCTV Camera Multiple Models | 2025-11-20T06:00:00.000000Z | 2025-11-20T06:00:00.000000Z |
| icsa-25-322-05 | METZ CONNECT EWIO2 | 2025-11-18T12:00:00.000000Z | 2025-11-18T12:00:00.000000Z |
| icsa-25-322-03 | Shelly Pro 3EM | 2025-11-18T07:00:00.000000Z | 2025-11-18T07:00:00.000000Z |
| icsa-25-322-02 | Shelly Pro 4PM | 2025-11-18T07:00:00.000000Z | 2025-11-18T07:00:00.000000Z |
| icsa-25-317-12 | Siemens Spectrum Power 4 | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-11 | Siemens SICAM P850 family and SICAM P855 family | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-10 | *Rockwell Automation AADvance-Trusted SIS Workstation * | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-09 | Rockwell Automation FactoryTalk Policy Manager | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-08 | General Industrial Controls Lynx+ Gateway | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-07 | Rockwell Automation FactoryTalk DataMosaix Private Cloud | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-06 | Rockwell Automation Studio 5000 Simulation Interface | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-05 | Rockwell Automation Verve Asset Manager | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-04 | Brightpick Mission Control / Internal Logic Control | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-03 | AVEVA Edge | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-02 | AVEVA Application Server IDE | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-01 | Mitsubishi Electric MELSEC iQ-F Series | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-322-04 | Schneider Electric PowerChute Serial Shutdown | 2025-11-11T08:00:00.000000Z | 2025-11-11T08:00:00.000000Z |
| icsa-25-322-01 | Schneider Electric EcoStruxure Machine SCADA Expert & Pro-face BLUE Open Studio | 2025-11-11T08:00:00.000000Z | 2025-11-11T08:00:00.000000Z |
| icsa-25-317-17 | Siemens Software Center and Solid Edge | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-16 | Siemens Altair Grid Engine | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-15 | Siemens COMOS | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-14 | Siemens Solid Edge | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-13 | Siemens LOGO! 8 BM Devices | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-310-03 | ABB FLXeon Controllers | 2025-11-06T07:00:00.000000Z | 2025-11-06T07:00:00.000000Z |
| icsa-25-310-02 | Ubia Ubox (Update A) | 2025-11-06T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-310-01 | Advantech DeviceOn/iEdge | 2025-11-06T07:00:00.000000Z | 2025-11-06T07:00:00.000000Z |
| icsa-25-308-05 | IDIS ICM Viewer | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-04 | Radiometrics VizAir | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-03 | Delta Electronics CNCSoft-G2 | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-02 | Survision License Plate Recognition Camera | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-wlc-wncd-p6gvt6hl | Cisco IOS XE Software for WLC Wireless IPv6 Clients Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-wlc-file-uplpd-rhzg9ufc | Cisco IOS XE Wireless Controller Software Arbitrary File Upload Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-06-06T20:02:48+00:00 |
| cisco-sa-webui-multi-arnhm4v6 | Cisco IOS XE Software Web-Based Management Interface Vulnerabilities | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-webui-cmdinj-gvn3oknc | Cisco IOS XE Software Web-Based Management Interface Command Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-vmanage-xss-xhn8m5jt | Cisco Catalyst SD-WAN Manager Stored Cross-Site Scripting Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-vmanage-html-inj-gxvtk6zj | Cisco Catalyst SD-WAN Manager Reflected HTML Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-twamp-kv4fhugn | Cisco IOS, IOS XE, and IOS XR Software TWAMP Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-snmpv3-qkeyvzsy | Cisco IOS and IOS XE Software SNMPv3 Configuration Restriction Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-snmp-bypass-hhuvujdn | Cisco IOS XE SD-WAN Software Packet Filtering Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-09-22T14:12:28+00:00 |
| cisco-sa-sisf-dos-zgwt4ddy | Multiple Cisco Products Switch Integrated Security Features DHCPv6 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-sdwanarbfile-2zkhkzwj | Cisco Catalyst SD-WAN Manager Arbitrary File Creation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-14T20:04:53+00:00 |
| cisco-sa-sdwan-priviesc-wck7bmmt | Cisco Catalyst SD-WAN Manager Privilege Escalation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-sdwan-fileoverwrite-uc9txwh | Cisco Catalyst SD-WAN Manager Arbitrary File Overwrite Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-08T15:55:57+00:00 |
| cisco-sa-netconf-nacm-bypass-tgzv9pmq | Cisco IOS XE Software Model-Driven Programmability Authorization Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-multiprod-ikev2-dos-gpctuqv2 | Cisco Adaptive Security Appliance Software, Firepower Threat Defense Software, IOS Software, and IOS XE Software IKEv2 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ipsgacl-pg6qfzk | Cisco IOS Software on Cisco Catalyst 1000 and 2960L Switches Access Control List Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iox-dos-95fqnf7b | Cisco IOx Application Hosting Environment Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-privesc-su7scvdp | Cisco IOS XE Software Privilege Escalation Vulnerabilities | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-ikev1-dos-xhk3hzfc | Cisco IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-dhcpsn-dos-xbn8mtks | Cisco IOS XE Software DHCP Snooping Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ios-http-privesc-wcrd5e3 | Cisco IOS Software Industrial Ethernet Switch Device Manager Privilege Escalation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ewlc-user-del-hqxmpudj | Cisco IOS XE Wireless Controller Software Unauthorized User Deletion Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ewlc-cdp-dos-fpeks9k | Cisco IOS XE Wireless Controller Software Cisco Discovery Protocol Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-dnac-api-nbpzcjcm | Cisco Catalyst Center Unauthenticated API Access Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-03-26T16:00:00+00:00 |
| cisco-sa-catc-insec-acc-mtt8eheb | Cisco Catalyst Center Insufficient Access Control Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-catalyst-tls-pqnd5kej | Cisco Catalyst SD-WAN Manager Certificate Validation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-c2960-3560-sboot-ztqadrhq | Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches Secure Boot Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-bootstrap-kfgxygdh | Cisco IOS XE Software Bootstrap Arbitrary File Write Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-asr903-rsp3-arp-dos-wmfzdvjz | Cisco IOS XE Software for Cisco ASR 903 Aggregation Services Routers ARP Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-erlang-otp-ssh-xyzzy | Multiple Cisco Products Unauthenticated Remote Code Execution in Erlang/OTP SSH Server: April 2025 | 2025-04-22T21:45:00+00:00 | 2025-06-11T14:40:37+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-5121 | Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing | 2026-03-02T00:00:00.000Z | 2026-04-02T01:04:42.000Z |
| msrc_cve-2026-5119 | Libsoup: libsoup: information disclosure via cleartext transmission of cookies during https tunnel establishment | 2026-03-02T00:00:00.000Z | 2026-04-02T14:38:47.000Z |
| msrc_cve-2026-5107 | FRRouting FRR EVPN Type-2 Route bgp_evpn.c process_type2_route access control | 2026-03-02T00:00:00.000Z | 2026-04-09T14:37:56.000Z |
| msrc_cve-2026-4897 | Polkit: polkit: denial of service via unbounded input processing through standard input | 2026-03-02T00:00:00.000Z | 2026-04-09T01:40:37.000Z |
| msrc_cve-2026-4833 | Orc discount Markdown markdown.c compile recursion | 2026-03-02T00:00:00.000Z | 2026-03-30T14:39:05.000Z |
| msrc_cve-2026-4775 | Libtiff: libtiff: arbitrary code execution or denial of service via signed integer overflow in tiff file processing | 2026-03-02T00:00:00.000Z | 2026-03-27T01:04:43.000Z |
| msrc_cve-2026-4746 | Heap Buffer Over-Write Vulenrabilty in timeplus-io/proton | 2026-03-02T00:00:00.000Z | 2026-04-01T01:56:21.000Z |
| msrc_cve-2026-4739 | Integer overflow vulnerabilities in InsightSoftwareConsortium/ITK | 2026-03-02T00:00:00.000Z | 2026-04-02T01:04:10.000Z |
| msrc_cve-2026-4732 | Out-of-bounds Read Overflow in tildearrow/furnace | 2026-03-02T00:00:00.000Z | 2026-04-02T14:38:55.000Z |
| msrc_cve-2026-4647 | Binutils: out-of-bounds read in xcoff relocation processing in gnu binutils bfd library | 2026-03-02T00:00:00.000Z | 2026-03-27T01:03:50.000Z |
| msrc_cve-2026-4645 | Github.com/antchfx/xpath: xpath: denial of service via crafted boolean xpath expressions | 2026-03-02T00:00:00.000Z | 2026-04-08T01:41:42.000Z |
| msrc_cve-2026-4519 | webbrowser.open() allows leading dashes in URLs | 2026-03-02T00:00:00.000Z | 2026-03-31T15:18:21.000Z |
| msrc_cve-2026-4438 | gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames | 2026-03-02T00:00:00.000Z | 2026-03-31T15:09:47.000Z |
| msrc_cve-2026-4437 | gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response | 2026-03-02T00:00:00.000Z | 2026-03-31T15:09:24.000Z |
| msrc_cve-2026-4426 | Libarchive: libarchive: denial of service via malformed iso file processing | 2026-03-02T00:00:00.000Z | 2026-03-31T15:10:59.000Z |
| msrc_cve-2026-4424 | Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing | 2026-03-02T00:00:00.000Z | 2026-03-31T15:11:32.000Z |
| msrc_cve-2026-4395 | Heap-based buffer overflow in wc_ecc_import_x963_ex KCAPI path | 2026-03-02T00:00:00.000Z | 2026-03-31T15:14:03.000Z |
| msrc_cve-2026-4224 | Stack overflow parsing XML with deeply nested DTD content models | 2026-03-02T00:00:00.000Z | 2026-03-31T14:56:40.000Z |
| msrc_cve-2026-4176 | Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from 5.43.0 before 5.43.9 contain a vulnerable version of Compress::Raw::Zlib | 2026-03-02T00:00:00.000Z | 2026-04-02T01:04:04.000Z |
| msrc_cve-2026-4159 | wc_PKCS7_DecodeEnvelopedData 1 byte out-of-bounds read | 2026-03-02T00:00:00.000Z | 2026-03-31T15:13:21.000Z |
| msrc_cve-2026-4111 | Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive | 2026-03-02T00:00:00.000Z | 2026-03-18T14:36:47.000Z |
| msrc_cve-2026-4105 | Systemd: systemd: privilege escalation via improper access control in registermachine d-bus method | 2026-03-02T00:00:00.000Z | 2026-04-01T14:36:30.000Z |
| msrc_cve-2026-4046 | iconv crash due to assertion failure with untrusted input | 2026-03-02T00:00:00.000Z | 2026-04-02T01:01:22.000Z |
| msrc_cve-2026-3904 | CVE-2026-3904 | 2026-03-02T00:00:00.000Z | 2026-03-27T01:38:14.000Z |
| msrc_cve-2026-3849 | Buffer Overflow in HPKE via Oversized ECH Config | 2026-03-02T00:00:00.000Z | 2026-03-31T15:14:23.000Z |
| msrc_cve-2026-3805 | use after free in SMB connection reuse | 2026-03-02T00:00:00.000Z | 2026-03-26T01:38:04.000Z |
| msrc_cve-2026-3784 | wrong proxy connection reuse with credentials | 2026-03-02T00:00:00.000Z | 2026-03-27T01:39:08.000Z |
| msrc_cve-2026-3783 | token leak with redirect and netrc | 2026-03-02T00:00:00.000Z | 2026-03-27T01:39:33.000Z |
| msrc_cve-2026-3731 | libssh SFTP Extension Name sftp.c sftp_extensions_get_data out-of-bounds | 2026-03-02T00:00:00.000Z | 2026-03-31T14:43:04.000Z |
| msrc_cve-2026-3713 | pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow | 2026-03-02T00:00:00.000Z | 2026-03-31T14:42:17.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0336 | Kwetsbaarheden verholpen in Oracle Hyperion | 2025-10-23T13:49:44.344049Z | 2025-10-23T13:49:44.344049Z |
| ncsc-2025-0335 | Kwetsbaarheden verholpen in Oracle Analytics | 2025-10-23T13:45:06.747933Z | 2025-10-23T13:45:06.747933Z |
| ncsc-2025-0334 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2025-10-23T13:42:11.992643Z | 2025-11-21T16:03:18.991100Z |
| ncsc-2025-0333 | Kwetsbaarheden verholpen in Oracle Financial Services | 2025-10-23T13:35:32.902231Z | 2025-10-23T13:35:32.902231Z |
| ncsc-2025-0332 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2025-10-23T13:26:49.210414Z | 2025-10-23T13:26:49.210414Z |
| ncsc-2025-0331 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2025-10-23T13:23:20.471568Z | 2025-10-23T13:23:20.471568Z |
| ncsc-2025-0330 | Kwetsbaarheden verholpen in Oracle Communications producten | 2025-10-23T13:20:15.363063Z | 2025-10-23T13:20:15.363063Z |
| ncsc-2025-0329 | Kwetsbaarheden verholpen in Oracle Commerce | 2025-10-23T07:20:51.213314Z | 2025-10-23T07:20:51.213314Z |
| ncsc-2025-0328 | Kwetsbaarheden verholpen in Oracle Database producten | 2025-10-23T07:19:57.652532Z | 2025-10-23T07:19:57.652532Z |
| ncsc-2025-0327 | Kwetsbaarheden verholpen in Zohocorp's ManageEngine | 2025-10-23T07:18:47.274781Z | 2025-10-23T07:18:47.274781Z |
| ncsc-2025-0326 | Kwetsbaarheden verholpen in Moxa’s netwerkbeveiligingsapparaten | 2025-10-20T13:03:34.436477Z | 2025-10-20T13:03:34.436477Z |
| ncsc-2025-0325 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2025-10-20T12:59:06.729067Z | 2025-10-20T12:59:06.729067Z |
| ncsc-2025-0324 | Kwetsbaarheid verholpen in FortiOS | 2025-10-17T08:42:51.624827Z | 2025-10-17T08:42:51.624827Z |
| ncsc-2025-0323 | Kwetsbaarheden verholpen in SAP Producten | 2025-10-17T08:04:54.828451Z | 2025-10-17T08:04:54.828451Z |
| ncsc-2025-0322 | Kwetsbaarheden verholpen in Adobe Commerce | 2025-10-16T06:32:33.597617Z | 2025-10-16T06:32:33.597617Z |
| ncsc-2025-0321 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-10-16T06:27:14.019367Z | 2025-10-16T06:27:14.019367Z |
| ncsc-2025-0320 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-10-16T06:25:05.618348Z | 2025-10-16T06:25:05.618348Z |
| ncsc-2025-0319 | Kwetsbaarheden verholpen in F5 Networks BIG-IP, F5OS en NGINX App Protect WAF | 2025-10-15T15:21:14.871532Z | 2026-03-27T18:09:03.259108Z |
| ncsc-2025-0318 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2025-10-15T06:22:07.027110Z | 2025-10-15T06:22:07.027110Z |
| ncsc-2025-0317 | Kwetsbaarheden verholpen in Veeam Backup & Replication | 2025-10-15T06:13:55.126030Z | 2025-10-15T06:13:55.126030Z |
| ncsc-2025-0316 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2025-10-14T18:52:06.487996Z | 2025-10-14T18:52:06.487996Z |
| ncsc-2025-0315 | Kwetsbaarheden verholpen in Microsoft Office | 2025-10-14T18:38:05.692251Z | 2025-10-14T18:38:05.692251Z |
| ncsc-2025-0314 | Kwetsbaarheden verholpen in Microsoft System Center | 2025-10-14T18:27:56.075338Z | 2025-10-14T18:27:56.075338Z |
| ncsc-2025-0313 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-10-14T18:21:47.576457Z | 2025-10-14T18:21:47.576457Z |
| ncsc-2025-0312 | Kwetsbaarheden verholpen in Microsoft Exchange | 2025-10-14T18:16:12.274468Z | 2025-10-14T18:16:12.274468Z |
| ncsc-2025-0311 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-10-14T18:13:41.244373Z | 2025-10-14T18:13:41.244373Z |
| ncsc-2025-0310 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-10-14T18:03:45.875739Z | 2025-10-24T11:09:29.790442Z |
| ncsc-2025-0309 | Kwetsbaarheden verholpen in Siemens producten | 2025-10-14T11:22:10.254089Z | 2025-10-14T11:22:10.254089Z |
| ncsc-2025-0308 | Kwetsbaarheden verholpen in Juniper Networks Junos Space | 2025-10-13T08:31:03.235596Z | 2025-10-13T08:31:03.235596Z |
| ncsc-2025-0307 | Kwetsbaarheid verholpen in Oracle E-Business Suite | 2025-10-13T07:52:22.500853Z | 2025-10-13T07:52:22.500853Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10396-1 | openbao-2.5.1-1.1 on GA media | 2026-03-20T00:00:00Z | 2026-03-20T00:00:00Z |
| opensuse-su-2026:20402-1 | Security update for gstreamer-plugins-ugly | 2026-03-19T13:48:14Z | 2026-03-19T13:48:14Z |
| opensuse-su-2026:20401-1 | Security update for ucode-intel | 2026-03-19T09:31:38Z | 2026-03-19T09:31:38Z |
| opensuse-su-2026:20399-1 | Security update for libsodium | 2026-03-19T08:18:59Z | 2026-03-19T08:18:59Z |
| opensuse-su-2026:20398-1 | Security update for keylime | 2026-03-19T08:16:55Z | 2026-03-19T08:16:55Z |
| opensuse-su-2026:20397-1 | Security update for poppler | 2026-03-19T08:11:15Z | 2026-03-19T08:11:15Z |
| opensuse-su-2026:20396-1 | Security update for librsvg | 2026-03-19T08:11:15Z | 2026-03-19T08:11:15Z |
| opensuse-su-2026:10395-1 | qemu-10.2.2-1.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10394-1 | python313-3.13.12-2.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10393-1 | python311-pyasn1-0.6.3-1.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10392-1 | python311-pyOpenSSL-26.0.0-1.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10391-1 | GraphicsMagick-1.3.46-3.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:20394-1 | Security update for mumble | 2026-03-18T20:03:58Z | 2026-03-18T20:03:58Z |
| opensuse-su-2026:20390-1 | Security update for protobuf | 2026-03-18T18:15:53Z | 2026-03-18T18:15:53Z |
| opensuse-su-2026:20392-1 | Security update for python-Authlib | 2026-03-18T17:30:06Z | 2026-03-18T17:30:06Z |
| opensuse-su-2026:20393-1 | Security update for python-simpleeval | 2026-03-18T17:29:11Z | 2026-03-18T17:29:11Z |
| opensuse-su-2026:20388-1 | Security update for postgresql17 | 2026-03-18T15:31:19Z | 2026-03-18T15:31:19Z |
| opensuse-su-2026:20387-1 | Security update for busybox | 2026-03-18T15:29:19Z | 2026-03-18T15:29:19Z |
| opensuse-su-2026:20391-1 | Security update for MozillaThunderbird | 2026-03-18T13:37:38Z | 2026-03-18T13:37:38Z |
| opensuse-su-2026:20386-1 | Security update for cosign | 2026-03-18T11:29:30Z | 2026-03-18T11:29:30Z |
| opensuse-su-2026:20385-1 | Security update for libjxl | 2026-03-18T10:13:37Z | 2026-03-18T10:13:37Z |
| opensuse-su-2026:20384-1 | Security update for libsoup | 2026-03-18T10:01:12Z | 2026-03-18T10:01:12Z |
| opensuse-su-2026:20383-1 | Security update for net-snmp | 2026-03-18T09:56:31Z | 2026-03-18T09:56:31Z |
| opensuse-su-2026:20131-1 | Security update for postgresql17 and postgresql18 | 2026-03-18T08:31:44Z | 2026-03-18T08:31:44Z |
| opensuse-su-2026:10390-1 | tempo-cli-2.10.3-1.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:10389-1 | python311-salt-3006.0-56.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:10388-1 | mumble-1.5.857-2.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:10387-1 | kernel-devel-6.19.8-1.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:10386-1 | ImageMagick-7.1.2.17-1.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:20380-1 | Security update for snpguest | 2026-03-17T15:51:45Z | 2026-03-17T15:51:45Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:6281 | Red Hat Security Advisory: python3.11 security update | 2026-03-31T16:39:52+00:00 | 2026-04-11T01:47:17+00:00 |
| rhsa-2026:6278 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2026-03-31T16:23:06+00:00 | 2026-04-12T14:09:02+00:00 |
| rhsa-2026:6277 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Product Security and Bug Fix Update | 2026-03-31T16:12:45+00:00 | 2026-04-12T14:09:02+00:00 |
| rhsa-2026:6268 | Red Hat Security Advisory: 389-ds:1.4 security update | 2026-03-31T15:37:55+00:00 | 2026-03-31T17:31:28+00:00 |
| rhsa-2026:6266 | Red Hat Security Advisory: libxslt security update | 2026-03-31T14:49:35+00:00 | 2026-04-09T20:37:28+00:00 |
| rhsa-2026:6259 | Red Hat Security Advisory: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update | 2026-03-31T13:11:45+00:00 | 2026-04-10T09:03:54+00:00 |
| rhsa-2026:6256 | Red Hat Security Advisory: python3.12 security update | 2026-03-31T09:59:24+00:00 | 2026-04-11T01:47:20+00:00 |
| rhsa-2026:6253 | Red Hat Security Advisory: python3.11 security update | 2026-03-31T09:11:44+00:00 | 2026-04-09T15:17:11+00:00 |
| rhsa-2026:6251 | Red Hat Security Advisory: Red Hat OpenShift API for Data Protection | 2026-03-31T07:30:54+00:00 | 2026-04-12T14:09:02+00:00 |
| rhsa-2026:6234 | Red Hat Security Advisory: nginx security update | 2026-03-31T04:54:48+00:00 | 2026-04-08T14:07:08+00:00 |
| rhsa-2026:6235 | Red Hat Security Advisory: nginx security update | 2026-03-31T04:46:48+00:00 | 2026-04-08T14:07:09+00:00 |
| rhsa-2026:6226 | Red Hat Security Advisory: Multicluster Global Hub 1.6.2 security update | 2026-03-31T02:53:32+00:00 | 2026-04-12T17:10:47+00:00 |
| rhsa-2026:6220 | Red Hat Security Advisory: 389-ds-base security update | 2026-03-31T00:30:42+00:00 | 2026-03-31T17:31:35+00:00 |
| rhsa-2026:6193 | Red Hat Security Advisory: kernel security update | 2026-03-30T16:23:36+00:00 | 2026-04-08T19:38:05+00:00 |
| rhsa-2026:6191 | Red Hat Security Advisory: container-tools:rhel8 security update | 2026-03-30T16:08:31+00:00 | 2026-04-12T17:10:46+00:00 |
| rhsa-2026:6188 | Red Hat Security Advisory: thunderbird security update | 2026-03-30T16:05:18+00:00 | 2026-04-07T22:30:09+00:00 |
| rhsa-2026:6164 | Red Hat Security Advisory: kernel security update | 2026-03-30T15:45:21+00:00 | 2026-04-08T19:37:29+00:00 |
| rhsa-2026:6192 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.27.0 Release. | 2026-03-30T15:41:48+00:00 | 2026-04-12T14:09:01+00:00 |
| rhsa-2026:6182 | Red Hat Security Advisory: nginx security update | 2026-03-30T15:03:16+00:00 | 2026-04-08T14:07:07+00:00 |
| rhsa-2026:6184 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.19 security, enhancement & bug fix update | 2026-03-30T13:41:49+00:00 | 2026-04-12T14:09:00+00:00 |
| rhsa-2026:6174 | Red Hat Security Advisory: Red Hat Developer Hub 1.8.5 release. | 2026-03-30T12:51:47+00:00 | 2026-04-08T19:51:09+00:00 |
| rhsa-2026:6170 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.21.1 | 2026-03-30T12:14:24+00:00 | 2026-04-11T01:58:33+00:00 |
| rhsa-2026:6153 | Red Hat Security Advisory: kernel security update | 2026-03-30T11:32:45+00:00 | 2026-04-08T19:37:31+00:00 |
| rhsa-2026:6006 | Red Hat Security Advisory: opencryptoki security update | 2026-03-30T11:08:03+00:00 | 2026-03-30T17:25:24+00:00 |
| rhsa-2026:6037 | Red Hat Security Advisory: kernel security update | 2026-03-30T11:05:54+00:00 | 2026-04-08T19:36:43+00:00 |
| rhsa-2026:6005 | Red Hat Security Advisory: freerdp security update | 2026-03-30T11:03:30+00:00 | 2026-04-09T14:38:00+00:00 |
| rhsa-2026:6007 | Red Hat Security Advisory: python security update | 2026-03-30T11:02:34+00:00 | 2026-04-09T15:17:10+00:00 |
| rhsa-2026:6004 | Red Hat Security Advisory: freerdp security update | 2026-03-30T11:02:09+00:00 | 2026-04-09T14:38:01+00:00 |
| rhsa-2026:6008 | Red Hat Security Advisory: python3 security update | 2026-03-30T11:01:54+00:00 | 2026-04-09T15:17:10+00:00 |
| rhsa-2026:6011 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.17 security update | 2026-03-30T11:00:14+00:00 | 2026-04-08T13:32:27+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2021-313-04 | Windows Print Spooler embedded in EcoStruxure™ Process Expert | 2021-11-09T08:45:48.000Z | 2022-03-08T08:45:48.000Z |
| sevd-2021-313-03 | APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices | 2021-11-09T06:30:00.000Z | 2022-05-10T00:00:00.00Z |
| sevd-2021-313-05 | BadAlloc Vulnerabilities | 2021-11-09T05:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2021-313-07 | Eurotherm GUIcon | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-313-02 | Schneider Electric Software Update | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-313-01 | SCADAPack 300E Series RTU | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-285-05 | Conext™ Advisor & Conext™ Control V2 | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-04 | Modicon M218 Logic Controller | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-03 | IGSS (Interactive Graphical SCADA System) | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-02 | ConneXium Network Manager (CNM) Software | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-01 | spaceLYnk, Wiser For KNX, fellerLYnk | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-257-02 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Premium and Associated Communication Modules | 2021-09-14T20:04:00.000Z | 2023-02-14T20:04:43.000Z |
| sevd-2021-257-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ for x70 | 2021-09-14T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2021-257-03 | StruxureWare Data Center Expert | 2021-09-14T00:00:00.000Z | 2021-09-14T00:00:00.000Z |
| sevd-2021-222-04 | Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert | 2021-08-10T02:27:39.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-222-06 | CODESYS V2 Vulnerabilities in Programmable Automation Controller (PacDrive) M | 2021-08-10T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2021-222-05 | AccuSine PCSn/PCS+/PFV+ | 2021-08-10T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2021-222-03 | Pro-face GP-Pro EX | 2021-08-10T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2021-217-01 | NicheStack TCP/IP Vulnerabilities (INFRA:HALT) in Lexium ILE, ILA, ILS, and Communication Option Boards for Altivar and Lexium32 drives | 2021-08-05T06:29:08.000Z | 2023-05-09T06:29:00.000Z |
| sevd-2021-222-02 | AT&T Labs Compressor (XMilI) and Decompressor (XDemill) used by EcoStruxureTM Control Expert, EcoStruxureTM Process Expert and SCADAPack RemoteConnect™ for x70 | 2021-08-01T07:25:51.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2021-194-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ x70, and Modicon Controllers M580 and M340 | 2021-07-13T08:22:02.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-194-05 | Easergy T200 | 2021-07-13T00:00:00.000Z | 2021-07-13T00:00:00.000Z |
| sevd-2021-194-04 | C-Bus Toolkit | 2021-07-13T00:00:00.000Z | 2021-07-13T00:00:00.000Z |
| sevd-2021-194-03 | SoSafe Configurable | 2021-07-13T00:00:00.000Z | 2021-07-13T00:00:00.000Z |
| sevd-2021-159-04 | ISaGRAF Vulnerabilities in IEC 61131-3 Programming and Engineering Tools | 2021-06-08T04:36:25.000Z | 2025-11-15T00:00:00.000Z |
| sevd-2021-159-03 | PowerLogic EGX100 and PowerLogicEGX300 | 2021-06-08T00:00:00.000Z | 2021-06-08T00:00:00.000Z |
| sevd-2021-159-02 | PowerLogic PM5500 and PowerLogic PM8ECC | 2021-06-08T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2021-159-01 | IGSS (Interactive Graphical SCADA System) | 2021-06-08T00:00:00.000Z | 2021-06-08T00:00:00.000Z |
| sevd-2021-130-04 | homeLYnk (Wiser For KNX) and spaceLYnk | 2021-05-11T07:30:55.000Z | 2022-11-08T07:30:55.000Z |
| sevd-2021-130-07 | EcoStruxure Geo SCADA Expert | 2021-05-11T00:00:00.000Z | 2021-05-11T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-354112 | SSA-354112: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.2 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-351178 | SSA-351178: Multiple Vulnerabilities in Solid Edge Before SE2024 Update 9 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-331112 | SSA-331112: Multiple Vulnerabilities in SINEC NMS Before V3.0 SP1 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-230445 | SSA-230445: Stored XSS Vulnerability in OZW Web Servers Before V5.2 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-064257 | SSA-064257: Privilege Escalation Vulnerability in SIPORT Before V3.4.0 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-000297 | SSA-000297: Multiple SQLite Vulnerabilities in RUGGEDCOM CROSSBOW Station Access Controller Before V5.6 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-333468 | SSA-333468: Multiple Vulnerabilities in InterMesh Subscriber Devices | 2024-10-23T00:00:00Z | 2024-10-23T00:00:00Z |
| ssa-438590 | SSA-438590: Buffer Overflow Vulnerability in Siveillance Video Camera Drivers | 2024-10-10T00:00:00Z | 2024-10-10T00:00:00Z |
| ssa-959281 | SSA-959281: XML File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-876787 | SSA-876787: Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-852501 | SSA-852501: Multiple Memory Corruption Vulnerabilities in Simcenter Nastran Before 2406.5000 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-850560 | SSA-850560: Use of 4-Digit PIN in SENTRON PAC3200 Devices | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-626178 | SSA-626178: Stack-Based Buffer Overflow Vulnerability in JT2Go Before V2406.0003 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-583523 | SSA-583523: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2024-10-08T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-540493 | SSA-540493: Kiosk Mode Escape Vulnerability in HiMed Cockpit Devices Before V11.6.2 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-430425 | SSA-430425: Multiple Vulnerabilities in SINEC Security Monitor before V4.9.0 | 2024-10-08T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-426509 | SSA-426509: Multiple Local Code Execution Vulnerabilities in Questa and ModelSim | 2024-10-08T00:00:00Z | 2025-06-17T00:00:00Z |
| ssa-368868 | SSA-368868: Multiple Vulnerabilities in WibuKey for Windows | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-340240 | SSA-340240: Denial of Service Vulnerability in SIRIUS 3RV2921-5M | 2024-10-08T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-254396 | SSA-254396: Vulnerability in Nozomi Guardian/CMC Before 24.3.1 on RUGGEDCOM APE1808 Devices | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-054046 | SSA-054046: Unauthenticated Information Disclosure in Web Server of SIMATIC S7-1500 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-969738 | SSA-969738: Denial of Service Vulnerability in SIMATIC S7-200 SMART Devices | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-869574 | SSA-869574: Multiple Vulnerabilities in SINEMA Remote Connect Server Before V3.2 SP2 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-773256 | SSA-773256: Impact of Socket.IO CVE-2024-38355 on Siemens Industrial Products | 2024-09-10T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-765405 | SSA-765405: Multiple Vulnerabilities in SIMATIC RFID Readers | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-721642 | SSA-721642: Injection Vulnerability in SCALANCE W700 802.11 AX Family Before V2.4 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-673996 | SSA-673996: Buffer Overflow Vulnerability in Third-Party Component in SICAM and SITIPE Products | 2024-09-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-629254 | SSA-629254: Remote Code Execution Vulnerability in SIMATIC SCADA and PCS 7 systems | 2024-09-10T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-446545 | SSA-446545: Impact of RegreSSHion (CVE-2024-6387) in Siemens Industrial Products | 2024-09-10T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-427715 | SSA-427715: Stack-Based Buffer Overflow Vulnerability in Tecnomatix Plant Simulation | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1037-1 | Security update for grafana | 2026-03-25T10:31:04Z | 2026-03-25T10:31:04Z |
| suse-su-2026:1030-1 | Security update for salt | 2026-03-25T10:17:20Z | 2026-03-25T10:17:20Z |
| suse-su-2026:1029-1 | Security update for salt | 2026-03-25T10:16:49Z | 2026-03-25T10:16:49Z |
| suse-su-2026:1028-1 | Security update for salt | 2026-03-25T10:16:17Z | 2026-03-25T10:16:17Z |
| suse-su-2026:1027-1 | Security update for salt | 2026-03-25T10:15:43Z | 2026-03-25T10:15:43Z |
| suse-su-2026:1026-1 | Security update 5.0.7 for Multi-Linux Manager Salt Bundle | 2026-03-25T10:15:30Z | 2026-03-25T10:15:30Z |
| suse-su-2026:1014-1 | Security update 5.0.7 for Multi-Linux Manager Salt Bundle | 2026-03-25T10:12:32Z | 2026-03-25T10:12:32Z |
| suse-su-2026:1013-1 | Security update 5.0.7 for Multi-Linux Manager Client Tools | 2026-03-25T10:11:52Z | 2026-03-25T10:11:52Z |
| suse-su-2026:1012-1 | Security update 5.0.7 for Multi-Linux Manager Salt Bundle | 2026-03-25T10:10:54Z | 2026-03-25T10:10:54Z |
| suse-su-2026:1011-1 | Security update 5.0.7 for Multi-Linux Manager Client Tools | 2026-03-25T10:10:31Z | 2026-03-25T10:10:31Z |
| suse-su-2026:1010-1 | Security update 5.0.7 for Multi-Linux Manager Server | 2026-03-25T10:10:02Z | 2026-03-25T10:10:02Z |
| suse-su-2026:1008-1 | Security update for Prometheus | 2026-03-25T10:07:27Z | 2026-03-25T10:07:27Z |
| suse-su-2026:20932-1 | Security update for ffmpeg-7 | 2026-03-25T09:58:50Z | 2026-03-25T09:58:50Z |
| suse-su-2026:20878-1 | Security update for python-pyasn1 | 2026-03-25T09:44:19Z | 2026-03-25T09:44:19Z |
| suse-su-2026:20868-1 | Security update for capstone | 2026-03-25T09:40:00Z | 2026-03-25T09:40:00Z |
| suse-su-2026:1002-1 | Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) | 2026-03-25T09:34:30Z | 2026-03-25T09:34:30Z |
| suse-su-2026:1005-1 | Security update for giflib | 2026-03-25T09:32:48Z | 2026-03-25T09:32:48Z |
| suse-su-2026:1004-1 | Security update for libsoup | 2026-03-25T09:32:40Z | 2026-03-25T09:32:40Z |
| suse-su-2026:20869-1 | Security update for python-PyJWT | 2026-03-25T09:31:26Z | 2026-03-25T09:31:26Z |
| suse-su-2026:1003-1 | Security update for the Linux Kernel | 2026-03-25T09:25:47Z | 2026-03-25T09:25:47Z |
| suse-su-2026:20931-1 | Security update for the Linux Kernel | 2026-03-25T08:48:43Z | 2026-03-25T08:48:43Z |
| suse-su-2026:20838-1 | Security update for the Linux Kernel | 2026-03-25T08:48:43Z | 2026-03-25T08:48:43Z |
| suse-ru-2026:1001-1 | Recommended update for rust1.94 | 2026-03-25T08:36:36Z | 2026-03-25T08:36:36Z |
| suse-su-2026:1000-1 | Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5) | 2026-03-25T07:08:02Z | 2026-03-25T07:08:02Z |
| suse-su-2026:20944-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 16) | 2026-03-25T06:46:04Z | 2026-03-25T06:46:04Z |
| suse-su-2026:20837-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 16) | 2026-03-25T06:46:04Z | 2026-03-25T06:46:04Z |
| suse-su-2026:20943-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-03-25T05:44:30Z | 2026-03-25T05:44:30Z |
| suse-su-2026:20836-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-03-25T05:44:30Z | 2026-03-25T05:44:30Z |
| suse-su-2026:20930-1 | Security update for python-pyOpenSSL | 2026-03-25T03:41:42Z | 2026-03-25T03:41:42Z |
| suse-su-2026:20929-1 | Security update for python-pyasn1 | 2026-03-25T03:09:46Z | 2026-03-25T03:09:46Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:2721 | Moderate: kernel security update | 2026-02-16T00:00:00Z | 2026-02-23T13:34:16Z |
| alsa-2026:2720 | Moderate: kernel security update | 2026-02-16T00:00:00Z | 2026-02-23T13:27:24Z |
| alsa-2026:2719 | Important: gnupg2 security update | 2026-02-16T00:00:00Z | 2026-02-18T13:46:37Z |
| alsa-2026:2709 | Important: golang security update | 2026-02-16T00:00:00Z | 2026-02-17T10:27:57Z |
| alsa-2026:2708 | Important: go-toolset:rhel8 security update | 2026-02-16T00:00:00Z | 2026-02-16T14:22:53Z |
| alsa-2026:2707 | Important: gimp security update | 2026-02-16T00:00:00Z | 2026-02-17T10:29:58Z |
| alsa-2026:2706 | Important: golang security update | 2026-02-16T00:00:00Z | 2026-02-18T13:54:31Z |
| alsa-2026:2627 | Moderate: gcc-toolset-14-binutils security update | 2026-02-12T00:00:00Z | 2026-02-13T08:03:55Z |
| alsa-2026:2470 | Moderate: php:7.4 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:10:23Z |
| alsa-2026:2452 | Important: pcs security update | 2026-02-10T00:00:00Z | 2026-02-12T10:12:36Z |
| alsa-2026:2438 | Important: pcs security update | 2026-02-10T00:00:00Z | 2026-02-12T10:14:13Z |
| alsa-2026:2422 | Important: nodejs:20 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:15:50Z |
| alsa-2026:2421 | Important: nodejs:22 security update | 2026-02-10T00:00:00Z | 2026-02-13T10:53:31Z |
| alsa-2026:2420 | Important: nodejs:24 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:19:24Z |
| alsa-2026:2419 | Moderate: python3.12 security update | 2026-02-10T00:00:00Z | 2026-02-11T15:30:15Z |
| alsa-2026:2410 | Important: libsoup3 security update | 2026-02-10T00:00:00Z | 2026-02-11T15:26:55Z |
| alsa-2026:2389 | Important: brotli security update | 2026-02-10T00:00:00Z | 2026-02-11T11:06:48Z |
| alsa-2026:2378 | Moderate: kernel-rt security update | 2026-02-10T00:00:00Z | 2026-02-10T09:34:16Z |
| alsa-2026:2323 | Important: git-lfs security update | 2026-02-09T00:00:00Z | 2026-02-11T11:02:49Z |
| alsa-2026:2286 | Important: thunderbird security update | 2026-02-09T00:00:00Z | 2026-02-09T12:36:11Z |
| alsa-2026:2282 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-12T10:29:43Z |
| alsa-2026:2271 | Important: firefox security update | 2026-02-09T00:00:00Z | 2026-02-09T11:39:07Z |
| alsa-2026:2264 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-09T11:47:42Z |
| alsa-2026:2230 | Important: fontforge security update | 2026-02-09T00:00:00Z | 2026-02-10T10:04:33Z |
| alsa-2026:2225 | Critical: keylime security update | 2026-02-09T00:00:00Z | 2026-02-10T10:06:14Z |
| alsa-2026:2224 | Critical: keylime security update | 2026-02-09T00:00:00Z | 2026-02-11T15:22:49Z |
| alsa-2026:2222 | Important: freerdp security update | 2026-02-09T00:00:00Z | 2026-02-10T10:08:14Z |
| alsa-2026:2220 | Important: thunderbird security update | 2026-02-09T00:00:00Z | 2026-02-10T07:45:12Z |
| alsa-2026:2216 | Important: libsoup security update | 2026-02-09T00:00:00Z | 2026-02-10T10:37:43Z |
| alsa-2026:2215 | Important: libsoup security update | 2026-02-09T00:00:00Z | 2026-02-09T11:36:21Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-454 | Use-of-uninitialized-value in _cups_strcasecmp | 2025-06-11T00:12:12.952969Z | 2025-06-11T00:12:12.953357Z |
| osv-2025-449 | Heap-buffer-overflow in check_content_type_and_change_protocol | 2025-06-10T00:16:50.624468Z | 2025-06-10T00:16:50.624907Z |
| osv-2025-447 | Use-of-uninitialized-value in spvtools::EmitNumericLiteral | 2025-06-09T00:05:11.128452Z | 2025-09-24T14:18:33.220549Z |
| osv-2024-1446 | Segv on unknown address in glslang::TIntermediate::addSymbol | 2025-06-06T00:12:59.981959Z | 2025-06-06T00:12:59.982286Z |
| osv-2025-442 | Security exception in org.jsoup.parser.HtmlTreeBuilder.process | 2025-06-06T00:12:40.427852Z | 2025-06-06T00:12:40.428189Z |
| osv-2025-437 | Heap-buffer-overflow in mmcall | 2025-06-05T00:18:59.402795Z | 2025-06-05T00:18:59.403189Z |
| osv-2025-436 | Security exception in graphql.parser.GraphqlAntlrToLanguage.createNonNullType | 2025-06-05T00:11:24.382209Z | 2025-06-05T00:11:24.382444Z |
| osv-2025-433 | Null-dereference READ in _libssh2_packet_add | 2025-06-05T00:02:57.199903Z | 2025-06-05T00:02:57.200566Z |
| osv-2025-424 | UNKNOWN READ in RDKit::RDValue::destroy | 2025-06-03T00:12:35.236863Z | 2025-09-24T14:19:44.921114Z |
| osv-2025-412 | UNKNOWN WRITE in luaL_newstate | 2025-05-28T00:06:09.320289Z | 2025-05-28T00:06:09.320970Z |
| osv-2025-408 | Heap-buffer-overflow in sav_parse_long_variable_names_record | 2025-05-27T00:12:59.401698Z | 2025-05-27T00:12:59.402180Z |
| osv-2025-406 | Security exception in com.puppycrawl.tools.checkstyle.JavaAstVisitor.getInnerBopAst | 2025-05-27T00:01:44.628210Z | 2025-05-27T00:01:44.628747Z |
| osv-2025-404 | Use-of-uninitialized-value in JS_FreeRuntime | 2025-05-23T00:14:00.218149Z | 2025-05-23T00:14:00.218494Z |
| osv-2025-401 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-05-23T00:07:37.622395Z | 2025-05-23T00:07:37.622817Z |
| osv-2025-396 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-05-22T00:16:08.210127Z | 2025-05-22T00:16:08.210510Z |
| osv-2025-384 | Segv on unknown address in rtpp_refcnt_decref | 2025-05-20T00:04:47.616424Z | 2025-05-20T00:04:47.617104Z |
| osv-2025-374 | Use-of-uninitialized-value in pcpp::SomeIpSdEntry::SomeIpSdEntry | 2025-05-17T00:16:26.661924Z | 2025-05-17T00:16:26.662355Z |
| osv-2025-373 | Heap-use-after-free in aiMesh::~aiMesh | 2025-05-17T00:11:17.621374Z | 2025-08-22T19:20:38.723565Z |
| osv-2025-371 | Index-out-of-bounds in tcp_analyze_sequence_number | 2025-05-16T00:16:16.300219Z | 2025-05-16T00:16:16.300689Z |
| osv-2025-369 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-05-15T00:19:04.752117Z | 2025-05-15T00:19:04.752522Z |
| osv-2025-368 | Heap-buffer-overflow in __parse_options | 2025-05-15T00:03:04.543640Z | 2025-05-15T00:03:04.544159Z |
| osv-2025-363 | Heap-buffer-overflow in jv_string_vfmt | 2025-05-14T00:03:23.388719Z | 2025-05-14T00:03:23.389224Z |
| osv-2025-357 | Segv on unknown address in pcpp::Packet::computeCalculateFields | 2025-05-12T00:13:14.901744Z | 2025-09-10T14:24:05.862334Z |
| osv-2025-354 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.statement | 2025-05-11T00:17:30.348393Z | 2025-05-11T00:17:30.348809Z |
| osv-2025-352 | Use-of-uninitialized-value in JS_FreeRuntime | 2025-05-10T00:17:01.243609Z | 2025-05-10T00:17:01.243981Z |
| osv-2025-346 | Heap-buffer-overflow in JS_CallInternal | 2025-05-09T00:16:48.213077Z | 2025-05-09T00:16:48.213425Z |
| osv-2025-326 | Heap-use-after-free in __JS_FreeValueRT | 2025-05-05T00:17:02.285374Z | 2025-05-05T00:17:02.285666Z |
| osv-2025-324 | Index-out-of-bounds in dwg_decode_eed | 2025-05-05T00:11:42.580777Z | 2025-05-05T00:11:42.581345Z |
| osv-2025-323 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-05-04T00:19:17.568436Z | 2025-05-04T00:19:17.568755Z |
| osv-2025-321 | Use-of-uninitialized-value in JS_DefineProperty | 2025-05-04T00:16:03.249115Z | 2025-05-04T00:16:03.249427Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0067 | `libyml::string::yaml_string_extend` is unsound and unmaintained | 2025-09-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0065 | matrix-sdk-base: Panic in the `RoomMember::normalized_power_level()` method | 2025-09-11T12:00:00Z | 2025-09-11T12:21:52Z |
| rustsec-2025-0000 | matrix-sdk-base: Panic in the `RoomMember::normalized_power_level()` method | 2025-09-11T12:00:00Z | 2025-09-11T12:10:54Z |
| rustsec-2025-0066 | The `google-apis-rs` project is now unmaintained | 2025-09-09T12:00:00Z | 2025-09-11T16:34:38Z |
| rustsec-2025-0061 | iron crate is unmaintained | 2025-09-08T12:00:00Z | 2025-09-08T09:09:54Z |
| rustsec-2025-0060 | crypto-hash crate is unmaintained | 2025-09-08T12:00:00Z | 2025-09-08T09:09:54Z |
| rustsec-2025-0059 | servo-fontconfig crate is unmaintained | 2025-09-08T12:00:00Z | 2025-09-08T09:09:54Z |
| rustsec-2025-0058 | custom_derive crate is unmaintained | 2025-09-07T12:00:00Z | 2025-09-07T08:38:20Z |
| rustsec-2025-0057 | fxhash - no longer maintained | 2025-09-05T12:00:00Z | 2025-09-05T19:09:01Z |
| rustsec-2025-0056 | adler crate is unmaintained, use adler2 instead | 2025-09-05T12:00:00Z | 2025-09-05T09:05:48Z |
| rustsec-2025-0055 | Logging user input may result in poisoning logs with ANSI escape sequences | 2025-08-29T12:00:00Z | 2025-09-02T11:05:02Z |
| rustsec-2025-0157 | `statsrelay-protobuf` was removed from crates.io for malicious code | 2025-08-26T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0052 | async-std has been discontinued | 2025-08-24T12:00:00Z | 2025-08-27T11:36:30Z |
| rustsec-2025-0054 | ArrayQueue::push_front is not panic-safe | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0053 | Multiple memory corruption vulnerabilities in safe APIs | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0050 | IdMap::from_iter may lead to uninitialized memory being freed on drop | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0049 | User-defined implementations of the safe trait scratchpad::Tracking can cause heap buffer overflows | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0047 | Out-of-bounds access in `get_disjoint_mut` due to incorrect bounds check | 2025-08-12T12:00:00Z | 2025-08-12T09:41:13Z |
| rustsec-2025-0051 | `xcb::Connection::connect_to_fd*` functions violate I/O safety | 2025-08-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0048 | tsify-next is unmaintained, use tsify instead | 2025-07-29T12:00:00Z | 2025-08-13T14:05:32Z |
| rustsec-2025-0112 | Possible host crash with host-to-wasm component intrinsics | 2025-07-18T12:00:00Z | 2025-10-25T11:20:30Z |
| rustsec-2025-0046 | Host panic with `fd_renumber` WASIp1 function | 2025-07-18T12:00:00Z | 2025-07-18T19:48:13Z |
| rustsec-2025-0045 | ConstStaticCell could have been used to pass non-Send values to another thread | 2025-07-17T12:00:00Z | 2025-07-17T14:38:11Z |
| rustsec-2025-0043 | matrix-sdk-sqlite: SQL injection vulnerability in `SqliteEventCacheStore::find_event_with_relations` | 2025-07-11T12:00:00Z | 2025-07-11T15:30:12Z |
| rustsec-2025-0042 | Uninitialized read after allocating MemBump | 2025-07-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0044 | Four unique double-free vulnerabilities triggered via safe APIs | 2025-06-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0041 | matrix-sdk-crypto vulnerable to encrypted event sender spoofing by homeserver administrator | 2025-06-11T12:00:00Z | 2025-06-12T09:17:43Z |
| rustsec-2025-0138 | --allow-read / --allow-write permission bypass in `node:sqlite` | 2025-06-03T12:00:00Z | 2025-12-29T10:04:21Z |
| rustsec-2025-0062 | Heap Buffer Overflow in the DrainCol Destructor | 2025-05-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0037 | Pingora Request Smuggling and Cache Poisoning | 2025-05-22T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-spark-2025-54920 | Apache Spark: Spark History Server Code Execution Vulnerability | 2026-03-18T08:54:07.780Z | 2026-03-20T09:47:33.381Z |
| bit-libpython-2026-4224 | Stack overflow parsing XML with deeply nested DTD content models | 2026-03-18T08:45:42.290Z | 2026-03-18T09:23:06.258Z |
| bit-libpython-2026-3644 | Incomplete control character validation in http.cookies | 2026-03-18T08:45:39.878Z | 2026-03-18T09:23:06.258Z |
| bit-airflow-2026-30911 | Apache Airflow: Execution API HITL Endpoints Missing Per-Task Authorization | 2026-03-18T08:39:32.817Z | 2026-03-18T09:23:06.258Z |
| bit-airflow-2026-28779 | Apache Airflow: Path of session token in cookie does not consider base_url - session hijacking via co-hosted applications | 2026-03-18T08:39:31.052Z | 2026-03-18T09:23:06.258Z |
| bit-airflow-2026-28563 | Apache Airflow: DAG authorization bypass | 2026-03-18T08:39:29.066Z | 2026-03-18T09:23:06.258Z |
| bit-airflow-2026-26929 | Apache Airflow: Wildcard DagVersion Listing Bypasses Per‑DAG RBAC and Leaks Metadata | 2026-03-18T08:39:27.056Z | 2026-03-18T09:23:06.258Z |
| bit-parse-2026-32269 | Parse Server OAuth2 adapter app ID validation sends wrong token to introspection endpoint | 2026-03-16T09:53:45.375Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-32248 | Parse Server: Account takeover via operator injection in authentication data identifier | 2026-03-16T09:53:42.464Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-32242 | Parse Server OAuth2 adapter shares mutable state across providers via singleton instance | 2026-03-16T09:53:39.413Z | 2026-03-20T09:47:33.381Z |
| bit-gitlab-2026-1182 | Improper Removal of Sensitive Information Before Storage or Transfer in GitLab | 2026-03-14T09:09:00.605Z | 2026-03-14T09:10:54.038Z |
| bit-python-2025-13462 | tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling | 2026-03-14T08:49:56.012Z | 2026-03-20T09:47:33.381Z |
| bit-libpython-2025-13462 | tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling | 2026-03-14T08:42:41.133Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-32234 | Parse Server has a SQL injection via query field name when using PostgreSQL | 2026-03-13T12:28:58.177Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-32098 | Parse Server has a protected fields bypass via LiveQuery subscription WHERE clause | 2026-03-13T12:28:55.457Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31901 | Parse Server has user enumeration via email verification endpoint | 2026-03-13T12:28:52.748Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31875 | Parse Server MFA recovery codes not consumed after use | 2026-03-13T12:28:49.853Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31872 | Parse Server has a protected fields bypass via dot-notation in query and sort | 2026-03-13T12:28:47.303Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31871 | Parse Server has a SQL Injection via dot-notation sub-key name in `Increment` operation on PostgreSQL | 2026-03-13T12:28:44.452Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31868 | Parse Server has Stored XSS via file upload of HTML-renderable file types | 2026-03-13T12:28:41.729Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31856 | Parse Server has a SQL injection via `Increment` operation on nested object field in PostgreSQL | 2026-03-13T12:28:38.912Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31840 | Parse Server has a SQL injection via dot-notation field name in PostgreSQL | 2026-03-13T12:28:36.029Z | 2026-03-13T12:55:29.610Z |
| bit-gitlab-2026-3848 | Improper Neutralization of CRLF Sequences ('CRLF Injection') in GitLab | 2026-03-13T09:35:49.642Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-1732 | Improper Removal of Sensitive Information Before Storage or Transfer in GitLab | 2026-03-13T09:35:40.993Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-1663 | Missing Authorization in GitLab | 2026-03-13T09:35:36.922Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-1230 | Use of Incorrectly-Resolved Name or Reference in GitLab | 2026-03-13T09:35:23.537Z | 2026-03-18T09:23:06.258Z |
| bit-gitlab-2026-1090 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-03-13T09:35:17.166Z | 2026-03-14T09:10:54.038Z |
| bit-gitlab-2026-1069 | Uncontrolled Recursion in GitLab | 2026-03-13T09:35:15.010Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-0602 | Authentication Bypass Using an Alternate Path or Channel in GitLab | 2026-03-13T09:35:05.636Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-14513 | Improper Validation of Specified Quantity in Input in GitLab | 2026-03-13T09:31:32.729Z | 2026-03-13T09:37:20.375Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-da83816 | Security fixes for CVE-2026-33186, ghsa-p77j-4mvh-x3m3 applied in versions: 1.14.0-r0 | 2026-04-01T09:35:14.283813Z | 2026-03-22T07:39:37Z |
| cleanstart-2026-jj84567 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.6.4-r3 | 2026-04-01T09:35:06.408771Z | 2026-03-22T07:50:03Z |
| cleanstart-2026-fl27179 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.5.2-r3 | 2026-04-01T09:34:50.735567Z | 2026-03-22T07:53:14Z |
| cleanstart-2026-jk59495 | Security fixes for CVE-2025-0913, CVE-2025-4673, CVE-2025-47907, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-9h8m-3fm2-qjrq, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 3.3.2-r0, 3.4.2-r0, 3.4.2-r3, 3.4.2-r4 | 2026-04-01T09:34:49.510720Z | 2026-03-22T18:12:16Z |
| cleanstart-2026-kk98885 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-9h8m-3fm2-qjrq applied in versions: 2.18.0-r0 | 2026-04-01T09:34:13.357278Z | 2026-03-23T06:16:30Z |
| cleanstart-2026-bc17682 | Security fixes for CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.4.4-r0, 2.4.4-r1 | 2026-04-01T09:33:57.594313Z | 2026-03-23T06:28:34Z |
| cleanstart-2026-nv36169 | Security fixes for CVE-2025-61732, CVE-2025-66564, CVE-2025-68121, CVE-2026-24686, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, ghsa-fcv2-xgw5-pqxf applied in versions: 0.7.29-r1, 0.7.29-r2 | 2026-04-01T09:33:48.680625Z | 2026-03-23T06:33:00Z |
| cleanstart-2026-gq14179 | Security fixes for CVE-2025-11143, CVE-2025-53864, CVE-2025-55163, CVE-2025-58056, CVE-2025-58057, CVE-2025-67735, CVE-2025-68161, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.46.1-r3, 0.46.1-r4 | 2026-04-01T09:33:44.585498Z | 2026-03-23T06:45:45Z |
| cleanstart-2026-lp76319 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.21.2-r0, 1.21.2-r1 | 2026-04-01T09:33:36.179758Z | 2026-03-23T06:57:40Z |
| cleanstart-2026-qj92322 | Security fixes for CVE-2025-15558, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.0.2-r0, 2.0.2-r1 | 2026-04-01T09:33:14.887013Z | 2026-03-23T06:58:42Z |
| cleanstart-2026-ps51260 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.2.2-r0, 1.2.2-r1 | 2026-04-01T09:33:07.208099Z | 2026-03-23T07:02:53Z |
| cleanstart-2026-gi67088 | Security fixes for CVE-2020-8559, CVE-2020-8565, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, ghsa-33c5-9fx5-fvjm, ghsa-8cfg-vx93-jvxw applied in versions: 2.12.0-r0, 2.12.0-r1 | 2026-04-01T09:33:02.208236Z | 2026-03-23T07:05:35Z |
| cleanstart-2026-on62368 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10.0-r0, 0.10.0-r1, 0.11.0-r0, 1.13.1-r0 | 2026-04-01T09:32:49.419019Z | 2026-03-23T07:09:26Z |
| cleanstart-2026-nv78596 | Security fixes for CVE-2022-29526, CVE-2025-47907, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-4f99-4q7p-p3gh applied in versions: 0.10-r0, 0.11-r0, 0.11-r2, 0.11-r3, 0.11-r4 | 2026-04-01T09:32:41.363681Z | 2026-03-23T07:34:57Z |
| cleanstart-2026-jm96857 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.16.4-r0, 2.16.4-r1 | 2026-04-01T09:32:39.352692Z | 2026-03-23T07:04:06Z |
| cleanstart-2026-fn44356 | Security fixes for CVE-2022-29526, CVE-2025-47907, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10-r0, 0.11-r0, 0.9-r0, 0.9-r1, 0.9-r2 | 2026-04-01T09:31:56.126620Z | 2026-03-23T07:36:06Z |
| cleanstart-2026-cl65461 | Security fixes for CVE-2022-29526, CVE-2025-47907, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10-r0, 0.11-r0, 0.8-r0, 0.8-r1, 0.8-r2, 0.9-r0 | 2026-04-01T09:31:56.332937Z | 2026-03-23T07:35:18Z |
| cleanstart-2026-pv93827 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.25.4-r0, 1.25.4-r1, 1.25.4-r2 | 2026-04-01T09:31:37.416388Z | 2026-03-23T07:38:20Z |
| cleanstart-2026-dv49099 | Security fixes for CVE-2025-64756, CVE-2025-69873, CVE-2026-1525, CVE-2026-1526, CVE-2026-1527, CVE-2026-1528, CVE-2026-2229, CVE-2026-2327, CVE-2026-23745, CVE-2026-2391, CVE-2026-24842, CVE-2026-25128, CVE-2026-25547, CVE-2026-2581, CVE-2026-25896, CVE-2026-26278, CVE-2026-26960, CVE-2026-27601, CVE-2026-27903, CVE-2026-27904, CVE-2026-27942, CVE-2026-28292, CVE-2026-29786, CVE-2026-31802, CVE-2026-32141, CVE-2026-33036, ghsa-23c5-xmqv-rm74, ghsa-25h7-pfq9-p65f, ghsa-2g4f-4pwh-qvx6, ghsa-2mjp-6q6p-2qxm, ghsa-34x7-hfp2-rc4v, ghsa-37qj-frw5-hhjh, ghsa-38c4-r59v-3vqw, ghsa-3ppc-4f35-3m26, ghsa-4992-7rv2-5pvq, ghsa-5j98-mcp5-4vw2, ghsa-73rr-hh4g-fpgx, ghsa-7h2j-956f-4vf2, ghsa-7r86-cg39-jmmj, ghsa-83g3-92jg-28cx, ghsa-8gc5-j5rx-235r, ghsa-8qq5-rm4j-mr97, ghsa-8wc6-vgrq-x6cf, ghsa-9ppj-qmqm-q256, ghsa-f269-vfmq-vjvj, ghsa-fj3w-jwp8-x2g3, ghsa-jmr7-xgp7-cmfj, ghsa-m7jm-9gc2-mpf2, ghsa-phc3-fgpg-7m6h, ghsa-qffp-2rhf-9h96, ghsa-qpx9-hpmf-5gmw, ghsa-r275-fr43-pm7q, ghsa-r6q2-hw4h-h46w, ghsa-v9p9-hfj2-hcw8, ghsa-vrm6-8vpv-qv8q, ghsa-w7fw-mjwx-w883 applied in versions: 43.4.4-r0 | 2026-04-01T09:31:16.419730Z | 2026-03-23T10:49:42Z |
| cleanstart-2026-li47669 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.26.2-r0, 1.26.3-r0, 1.26.3-r1 | 2026-04-01T09:31:09.448053Z | 2026-03-23T07:38:42Z |
| cleanstart-2026-nc32267 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.24.4-r0, 1.28.1-r0, 1.28.1-r1 | 2026-04-01T09:31:06.582607Z | 2026-03-23T07:39:20Z |
| cleanstart-2026-qv50101 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-8r3f-844c-mc37 applied in versions: 1.6.0-r0 | 2026-04-01T09:30:36.985458Z | 2026-03-23T07:45:33Z |
| cleanstart-2026-gm81143 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-8r3f-844c-mc37 applied in versions: 1.7.0-r0, 1.7.0-r1 | 2026-04-01T09:30:33.612618Z | 2026-03-23T07:45:53Z |
| cleanstart-2026-ia43044 | Security fixes for CVE-2020-8908, CVE-2022-42889, CVE-2023-2976, CVE-2024-25710, CVE-2024-26308, CVE-2024-29371, CVE-2024-29857, CVE-2024-30171, CVE-2024-31573, CVE-2024-47554, CVE-2025-11143, CVE-2025-12383, CVE-2025-48734, CVE-2025-48924, CVE-2025-58057, CVE-2025-67735, CVE-2025-68161, CVE-2025-8916, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.47.0-r2, 0.47.0-r3 | 2026-04-01T09:30:15.088429Z | 2026-03-23T07:56:09Z |
| cleanstart-2026-ld14062 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.27.4-r0, 1.27.4-r1, 1.27.7-r0 | 2026-04-01T09:30:12.003312Z | 2026-03-23T07:46:39Z |
| cleanstart-2026-jw59894 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.28.4-r0 | 2026-04-01T09:30:04.839715Z | 2026-03-23T07:47:23Z |
| cleanstart-2026-pw47027 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.29.0-r0 | 2026-04-01T09:30:02.510665Z | 2026-03-23T07:47:56Z |
| cleanstart-2026-fr61696 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.17.0-r0 | 2026-04-01T09:29:33.599999Z | 2026-03-23T07:49:32Z |
| cleanstart-2026-as59691 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-31837, CVE-2026-31838, ghsa-9h8m-3fm2-qjrq applied in versions: 1.28.3-r0 | 2026-04-01T09:29:30.943219Z | 2026-03-23T07:49:41Z |
| cleanstart-2026-pi36812 | Security fixes for CVE-2026-33186, ghsa-6v2p-p943-phr9, ghsa-c6gw-w398-hv78, ghsa-f6x5-jh6r-wrfv, ghsa-hcg3-p754-cr77, ghsa-j5w8-q4qc-rx2x, ghsa-qxp5-gw88-xv66, ghsa-v778-237x-gjrc, ghsa-vvgc-356p-c3xw applied in versions: 1.15.0-r1, 1.19.0-r0 | 2026-04-01T09:29:23.569974Z | 2026-03-23T07:52:18Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2020-ALE-018 | Vulnérabilité dans Cisco ASA et FTD | 2020-07-28T00:00:00.000000 | 2020-11-05T00:00:00.000000 |
| certfr-2020-ale-017 | Multiples vulnérabilités dans SAP Netweaver AS JAVA | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| certfr-2020-ale-016 | Vulnérabilité dans Microsoft Domain Name System (DNS) Server | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| CERTFR-2020-ALE-017 | Multiples vulnérabilités dans SAP Netweaver AS JAVA | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| CERTFR-2020-ALE-016 | Vulnérabilité dans Microsoft Domain Name System (DNS) Server | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| certfr-2020-ale-015 | Vulnérabilité dans F5 BIG-IP | 2020-07-05T00:00:00.000000 | 2020-09-15T00:00:00.000000 |
| CERTFR-2020-ALE-015 | Vulnérabilité dans F5 BIG-IP | 2020-07-05T00:00:00.000000 | 2020-09-15T00:00:00.000000 |
| certfr-2020-ale-014 | Vulnérabilité dans Palo Alto Networks PAN-OS | 2020-07-03T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-014 | Vulnérabilité dans Palo Alto Networks PAN-OS | 2020-07-03T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-013 | Multiples vulnérabilités dans Microsoft Windows | 2020-07-01T00:00:00.000000 | 2020-07-05T00:00:00.000000 |
| CERTFR-2020-ALE-013 | Multiples vulnérabilités dans Microsoft Windows | 2020-07-01T00:00:00.000000 | 2020-07-05T00:00:00.000000 |
| certfr-2020-ale-012 | Multiples vulnérabilités dans SaltStack | 2020-05-04T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-012 | Multiples vulnérabilités dans SaltStack | 2020-05-04T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-011 | Multiples vulnérabilités dans les produits Microsoft qui utilisent la bibliothèque Autodesk FBX | 2020-04-22T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| CERTFR-2020-ALE-011 | Multiples vulnérabilités dans les produits Microsoft qui utilisent la bibliothèque Autodesk FBX | 2020-04-22T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-ale-010 | Multiples vulnérabilités dans Mozilla Firefox | 2020-04-06T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| CERTFR-2020-ALE-010 | Multiples vulnérabilités dans Mozilla Firefox | 2020-04-06T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-009 | Multiples vulnérabilités dans Microsoft Windows | 2020-03-24T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| CERTFR-2020-ALE-009 | Multiples vulnérabilités dans Microsoft Windows | 2020-03-24T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-ale-008 | Vulnérabilité dans l'implémentation du protocole SMB par Microsoft | 2020-03-11T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-008 | Vulnérabilité dans l'implémentation du protocole SMB par Microsoft | 2020-03-11T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-007 | Vulnérabilité dans Microsoft Exchange Server | 2020-02-27T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| CERTFR-2020-ALE-007 | Vulnérabilité dans Microsoft Exchange Server | 2020-02-27T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2020-01-20T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| CERTFR-2020-ALE-006 | Vulnérabilité dans Microsoft Internet Explorer | 2020-01-20T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-ale-005 | Multiples vulnérabilités dans le serveur de passerelle RDP de Windows | 2020-01-14T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-ale-004 | Vulnérabilité dans Microsoft Windows | 2020-01-14T00:00:00.000000 | 2020-01-17T00:00:00.000000 |
| CERTFR-2020-ALE-005 | Multiples vulnérabilités dans le serveur de passerelle RDP de Windows | 2020-01-14T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| CERTFR-2020-ALE-004 | Vulnérabilité dans Microsoft Windows | 2020-01-14T00:00:00.000000 | 2020-01-17T00:00:00.000000 |
| certfr-2020-ale-003 | Vulnérabilité dans les produits Mozilla | 2020-01-09T00:00:00.000000 | 2020-01-20T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0244 | Vulnérabilité dans Nextcloud Flow | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0243 | Vulnérabilité dans SPIP | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0242 | Multiples vulnérabilités dans les produits Cisco | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0241 | Vulnérabilité dans ClamAV | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0240 | Vulnérabilité dans CPython | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0239 | Multiples vulnérabilités dans Google Chrome | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0238 | Vulnérabilité dans NetApp ONTAP 9 | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0237 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0236 | Multiples vulnérabilités dans Traefik | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0235 | Multiples vulnérabilités dans HPE Aruba Networking AOS | 2026-03-04T00:00:00.000000 | 2026-03-04T00:00:00.000000 |
| certfr-2026-avi-0234 | Vulnérabilité dans Tenable Nessus Manager | 2026-03-04T00:00:00.000000 | 2026-03-04T00:00:00.000000 |
| certfr-2026-avi-0233 | Multiples vulnérabilités dans Google Pixel | 2026-03-04T00:00:00.000000 | 2026-03-04T00:00:00.000000 |
| certfr-2026-avi-0232 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-03T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0231 | Multiples vulnérabilités dans Google Android | 2026-03-03T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0230 | Multiples vulnérabilités dans Docker Desktop | 2026-03-03T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0229 | Multiples vulnérabilités dans MISP | 2026-03-02T00:00:00.000000 | 2026-03-02T00:00:00.000000 |
| certfr-2026-avi-0228 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-02T00:00:00.000000 | 2026-03-02T00:00:00.000000 |
| certfr-2026-avi-0227 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0226 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0225 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0224 | Multiples vulnérabilités dans les produits IBM | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0223 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0222 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0221 | Multiples vulnérabilités dans les produits Centreon | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0220 | Multiples vulnérabilités dans les produits Elastic | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0219 | Vulnérabilité dans Stormshield Network Security | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0218 | Multiples vulnérabilités dans les produits VMware | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0217 | Multiples vulnérabilités dans SPIP | 2026-02-26T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0216 | Vulnérabilité dans PostgreSQL | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0215 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000051 | Real-time Bus Tracking System vulnerable to improper validation of specified quantity in input | 2025-07-23T13:54+09:00 | 2025-07-23T13:54+09:00 |
| jvndb-2025-009576 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2025-07-23T11:13+09:00 | 2025-07-23T11:13+09:00 |
| jvndb-2025-000050 | "region PAY" App for Android vulnerable to insertion of sensitive information into log file | 2025-07-22T13:33+09:00 | 2025-07-22T13:33+09:00 |
| jvndb-2025-009150 | Security updates for Trend Micro products (June 2025) | 2025-07-17T17:03+09:00 | 2025-07-17T17:03+09:00 |
| jvndb-2025-000049 | ZWX-2000CSW2-HN and ZWX-2000CS2-HN vulnerable to use of hard-coded credentials | 2025-07-16T13:54+09:00 | 2025-07-16T13:54+09:00 |
| jvndb-2025-008881 | Least Privilege Violation Vulnerability in the communications functions of NJ/NX series Machine Automation Controllers | 2025-07-15T15:54+09:00 | 2025-07-15T15:54+09:00 |
| jvndb-2025-008783 | Firebox T15 contains an issue with hidden functionality | 2025-07-14T17:22+09:00 | 2025-07-14T17:22+09:00 |
| jvndb-2025-008145 | Epson Web Installer for Mac vulnerable to missing authentication for critical function | 2025-07-08T14:08+09:00 | 2025-07-08T14:08+09:00 |
| jvndb-2025-008106 | Heap-based buffer overflow vulnerability in V-SFT and TELLUS | 2025-07-07T16:26+09:00 | 2025-07-07T16:26+09:00 |
| jvndb-2025-008105 | Windows shortcut following (.LNK) vulnerability in Trend Micro Security for Windows (CVE-2025-52521) | 2025-07-07T16:04+09:00 | 2025-07-07T16:04+09:00 |
| jvndb-2025-000047 | Multiple vulnerabilities in Nimesa Backup and Recovery | 2025-07-07T15:26+09:00 | 2025-07-07T15:26+09:00 |
| jvndb-2025-007978 | Multiple vulnerabilities in Trend Micro Password Manager for Windows (CVE-2025-48443, CVE-2025-52837) | 2025-07-04T13:28+09:00 | 2025-07-04T13:28+09:00 |
| jvndb-2025-000045 | Multiple vulnerabilities in Active! mail | 2025-07-02T14:13+09:00 | 2025-07-02T14:13+09:00 |
| jvndb-2025-007754 | Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS) | 2025-07-02T11:31+09:00 | 2025-07-02T11:31+09:00 |
| jvndb-2025-007607 | Pass-Back Attack vulnerability in Konica Minorta bizhub series | 2025-07-01T14:09+09:00 | 2025-07-01T14:09+09:00 |
| jvndb-2025-007595 | Multiple vulnerabilities in Web Connection of Konica Minolta MFPs | 2025-07-01T14:02+09:00 | 2025-07-01T14:02+09:00 |
| jvndb-2025-000046 | SLNX Help Documentation of RICOH Streamline NX vulnerable to reflected cross-site scripting | 2025-06-30T15:45+09:00 | 2025-06-30T15:45+09:00 |
| jvndb-2025-007552 | Multiple vulnerabilities in TB-eye network recorders and AHD recorders | 2025-06-30T14:45+09:00 | 2025-06-30T14:45+09:00 |
| jvndb-2025-007521 | Multiple Brother driver installers for Windows vulnerable to privilege escalation | 2025-06-27T09:37+09:00 | 2025-08-19T11:29+09:00 |
| jvndb-2025-007519 | Multiple vulnerabilities in multiple BROTHER products | 2025-06-26T18:15+09:00 | 2025-09-22T10:16+09:00 |
| jvndb-2025-000043 | Multiple vulnerabilities in iroha Board | 2025-06-26T15:13+09:00 | 2025-06-26T15:13+09:00 |
| jvndb-2025-000044 | Denial-of-service (DoS) vulnerabilities in multiple Apache products | 2025-06-26T14:41+09:00 | 2025-10-01T14:18+09:00 |
| jvndb-2025-000042 | Inefficient regular expressions in GROWI | 2025-06-24T15:25+09:00 | 2025-06-24T15:25+09:00 |
| jvndb-2025-000041 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2025-06-24T14:50+09:00 | 2026-02-03T15:35+09:00 |
| jvndb-2025-007390 | Trend Micro Internet Security and Trend Micro Maximum Security vulnerable to link following local privilege escalation (CVE-2025-49384, CVE-2025-49385) | 2025-06-24T11:18+09:00 | 2025-06-24T11:18+09:00 |
| jvndb-2025-000040 | KCM3100 vulnerable to authentication bypass using an alternate path or channel | 2025-06-18T13:42+09:00 | 2025-06-18T13:42+09:00 |
| jvndb-2025-000039 | Multiple vulnerabilities in RICOH Streamline NX PC Client | 2025-06-13T16:09+09:00 | 2025-06-13T16:09+09:00 |
| jvndb-2025-000038 | UpdateNavi vulnerable to improper restriction of communication channel to intended endpoints | 2025-06-12T15:56+09:00 | 2025-06-12T15:56+09:00 |
| jvndb-2025-000037 | Multiple surveillance cameras provided by i-PRO Co., Ltd. vulnerable to cross-site request forgery | 2025-06-06T13:56+09:00 | 2025-06-06T13:56+09:00 |
| jvndb-2025-000036 | TimeWorks vulnerable to path traversal | 2025-06-03T15:35+09:00 | 2025-06-03T15:35+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14391 | OpenClaw代码注入漏洞(CNVD-2026-14391) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14388 | OpenClaw目录遍历漏洞 | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14142 | WordPress插件My Tickets信息泄露漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14141 | WordPress插件Greenshift – animation and page builder blocks信息泄露漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14140 | WordPress插件Classified Listing信息泄露漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14139 | WordPress插件Chaty信息泄露漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14138 | WordPress插件WP Booking System信息泄露漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14137 | WordPress插件NextScripts: Social Networks Auto-Poster跨站脚本漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14120 | OpenAkita操作系统命令注入漏洞 | 2026-03-17 | 2026-03-17 |
| cnvd-2026-14119 | Siemens SICAM SIAPP SDK缓冲区溢出漏洞 | 2026-03-17 | 2026-03-17 |
| cnvd-2026-14007 | Huawei HarmonyOS资源调度模块权限控制漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14000 | Huawei EMUI和Huawei HarmonyOS IMS模块越界写入漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-13998 | Huawei EMUI和Huawei HarmonyOS电子邮件应用校验不当漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-13997 | Huawei EMUI和Huawei HarmonyOS系统服务框架权限绕过漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-15865 | Delta Electronics COMMGR2堆栈缓冲区溢出漏洞 | 2026-03-16 | 2026-04-02 |
| cnvd-2026-15864 | Delta Electronics COMMGR2拒绝服务漏洞 | 2026-03-16 | 2026-04-02 |
| cnvd-2026-13976 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13976) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13975 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13975) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13974 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13974) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13973 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13973) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13972 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13972) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13971 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13971) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13970 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13970) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13969 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13969) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13968 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13968) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13967 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13967) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13966 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13966) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13965 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13965) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13964 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13964) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13963 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13963) | 2026-03-16 | 2026-03-17 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01534 | Уязвимость функции smtcfb_write() модуля drivers/video/fbdev/sm712fb.c драйвера поддержки… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01533 | Уязвимость функции mt8183_da7219_max98357_dev_probe() модуля sound/soc/mediatek/mt8183/mt… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01532 | Уязвимость функции qla2x00_bsg_job_done() модуля drivers/scsi/qla2xxx/qla_bsg.c драйвера … | 10.02.2026 | 10.02.2026 |
| bdu:2026-01531 | Уязвимость функции __udf_iget() модуля fs/udf/inode.c файловой системы ядра операционной … | 10.02.2026 | 10.02.2026 |
| bdu:2026-01530 | Уязвимость функции mt7601u_rx_next_seg_len() модуля drivers/net/wireless/mediatek/mt7601u… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01529 | Уязвимость функции lio_target_nacl_info_show() модуля drivers/target/iscsi/iscsi_target_c… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01528 | Уязвимость функции bnxt_get_nvram_directory() модуля drivers/net/ethernet/broadcom/bnxt/b… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01527 | Уязвимость функции ext4_iget_extra_inode() модуля fs/ext4/inode.c файловой системы Ext4 я… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01526 | Уязвимость функции ieee80211_probe_client() модуля net/mac80211/cfg.c реализации стека ma… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01525 | Уязвимость функции brcmf_c_preinit_dcmds() модуля drivers/net/wireless/broadcom/brcm80211… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01524 | Уязвимость функции prepare_to_relocate() ядра операционной системы Linux, позволяющая нар… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01523 | Уязвимость функций lpfc_debugfs_multixripools_write() и lpfc_debugfs_nvmestat_write() ядр… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01522 | Уязвимость функции raid5_end_write_request() ядра операционной системы Linux, позволяющая… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01521 | Уязвимость функций ext4_mb_clear_bb() и ext4_free_blocks() ядра операционной системы Linu… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01520 | Уязвимость функции usb_udc_uevent() ядра операционной системы Linux, позволяющая нарушите… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01516 | Уязвимость функции convert___skb_to_skb() ядра операционной системы Linux, позволяющая на… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01515 | Уязвимость операционной системы HPE Alletra, системы хранения данных HPE Nimble Storage A… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01514 | Уязвимость функции optc1_enable_optc_clock() ядра операционной системы Linux, позволяющая… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01510 | Уязвимость функции __ieee80211_scan_completed() ядра операционной системы Linux, позволяю… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01509 | Уязвимость функций nilfs_relax_pressure_in_lock() и nilfs_construct_segment() ядра операц… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01508 | Уязвимость функции cpe_mime_handlers() микропрограммного обеспечения маршрутизаторов Link… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01507 | Уязвимость функции ntfs_read_inode_mount() ядра операционной системы Linux, позволяющая н… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01506 | Уязвимость функции formSetWanDiag() микропрограммного обеспечения маршрутизаторов Tenda G… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01505 | Уязвимость функции null_init_tag_set() модуля drivers/block/null_blk/main.c драйвера блоч… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01504 | Уязвимость функции pot_hole() ядра операционной системы Linux, позволяющая нарушителю ока… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01503 | Уязвимость функции usbnet_probe () модуля drivers/net/usb/usbnet.c драйвера сетевых адапт… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01502 | Уязвимость функции bcmgenet_desc_rx() модуля drivers/net/ethernet/broadcom/genet/bcmgenet… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01501 | Уязвимость функции snd_pcm_oss_period_size() ядра операционной системы Linux, позволяющая… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01500 | Уязвимость функции sja1105_table_delete_entry() модуля drivers/net/dsa/sja1105/sja1105_st… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01499 | Уязвимость функции jfs_link() модуля fs/jfs/namei.c файловой системы JFS ядра операционно… | 09.02.2026 | 09.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201106-0026 | Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.181.22 on Wind… | 2024-07-23T22:03:48.916000Z |
| var-202005-1028 | A malicious actor who intentionally exploits this lack of effective limitation on the num… | 2024-07-23T22:03:40.061000Z |
| var-201911-1619 | Improper invalidation for page table updates by a virtual guest operating system for mult… | 2024-07-23T22:03:40.870000Z |
| var-201505-0337 | The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorit… | 2024-07-23T22:03:40.995000Z |
| var-201912-0533 | This issue was addressed with improved transparency. This issue is fixed in iOS 12.2. A u… | 2024-07-23T22:03:39.534000Z |
| var-201908-0265 | Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a … | 2024-07-23T22:03:39.695000Z |
| var-200103-0056 | Network Dynamic Data Exchange (DDE) in Windows 2000 allows local users to gain SYSTEM pri… | 2024-07-23T22:03:07.478000Z |
| var-202109-1368 | A type confusion issue was addressed with improved state handling. This issue is fixed in… | 2024-07-23T22:03:02.962000Z |
| var-200609-1249 | The Security Framework in Apple Mac OS X 10.3.9, and 10.4.x before 10.4.7, does not prope… | 2024-07-23T22:03:02.065000Z |
| var-201904-1344 | Multiple memory corruption issues were addressed with improved input validation. This iss… | 2024-07-23T22:03:00.873000Z |
| var-202108-2039 | A logic issue was addressed with improved state management. This issue is fixed in macOS … | 2024-07-23T22:02:34.481000Z |
| var-201006-1259 | Double free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 1… | 2024-07-23T22:02:34.562000Z |
| var-201707-0592 | Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre att… | 2024-07-23T22:02:33.954000Z |
| var-201109-0190 | Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allow… | 2024-07-23T22:02:33.523000Z |
| var-200803-0016 | CFNetwork in Apple Mac OS X 10.4.11 allows remote HTTPS proxy servers to spoof secure web… | 2024-07-23T22:01:55.420000Z |
| var-201912-1850 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:01:51.188000Z |
| var-200609-1027 | Buffer overflow in PPP on Apple Mac OS X 10.4.x up to 10.4.8 and 10.3.x up to 10.3.9, whe… | 2024-07-23T22:01:14.362000Z |
| var-201904-1408 | A memory corruption issue was addressed with improved state management. This issue affect… | 2024-07-23T22:01:11.971000Z |
| var-202201-0372 | lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. The vu… | 2024-07-23T22:01:10.106000Z |
| var-200612-0136 | Buffer overflow in the glob implementation (glob.c) in libc in NetBSD-current before 2005… | 2024-07-23T22:01:10.008000Z |
| var-201609-0593 | Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.… | 2024-07-23T22:01:08.857000Z |
| var-201304-0375 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:01:08.426000Z |
| var-201210-0270 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:01:08.344000Z |
| var-200603-0279 | Directory traversal vulnerability in the BOM framework in Mac OS X 10.x before 10.3.9 and… | 2024-07-23T22:01:08.748000Z |
| var-201904-1397 | An input validation issue was addressed with improved input validation. This issue affect… | 2024-07-23T22:01:07.123000Z |
| var-200704-0213 | load_webdav in Apple Mac OS X 10.3.9 through 10.4.9 does not properly clean the environme… | 2024-07-23T22:00:36.528000Z |
| var-201711-0480 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T21:59:32.421000Z |
| var-200102-0030 | The Web interface to Cisco 600 routers running CBOS 2.4.1 and earlier allow remote attack… | 2024-07-23T21:59:32.267000Z |
| var-202207-0381 | A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.20.0, <18.5… | 2024-07-23T21:59:00.866000Z |
| var-201801-1708 | The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before… | 2024-07-23T21:58:56.016000Z |