Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-58920 |
7.1 (3.1)
|
WordPress Cerato theme <= 2.2.18 - Reflected Cross Sit… |
Zootemplate |
Cerato |
2026-04-10T13:25:31.611Z | 2026-04-10T14:07:44.099Z |
| CVE-2025-58913 |
8.1 (3.1)
|
WordPress VideoPro theme <= 2.3.8.1 - Local File Inclu… |
CactusThemes |
VideoPro |
2026-04-10T13:21:05.820Z | 2026-04-10T13:21:05.820Z |
| CVE-2025-5804 |
7.5 (3.1)
|
WordPress Case Theme User < 1.0.4 - Local File Inclusi… |
Case Themes |
Case Theme User |
2026-04-10T13:19:43.457Z | 2026-04-10T13:19:43.457Z |
| CVE-2026-33092 |
7.8 (3.0)
|
Local privilege escalation due to improper handli… |
Acronis |
Acronis True Image OEM |
2026-04-10T13:17:45.275Z | 2026-04-10T14:02:46.538Z |
| CVE-2026-5412 |
9.9 (3.1)
|
Juju CloudSpec API could leak senstive information |
Canonical |
Juju |
2026-04-10T12:22:05.403Z | 2026-04-10T14:04:30.155Z |
| CVE-2026-5774 |
6.1 (4.0)
|
Juju API Server Denial of Service and Authentication R… |
Canonical |
Juju |
2026-04-10T12:10:55.634Z | 2026-04-10T12:41:28.720Z |
| CVE-2026-5777 |
8.7 (4.0)
|
Security Misconfiguration Vulnerability in Atom 3x Projector |
EGate |
Atom 3X Projector |
2026-04-10T11:40:55.335Z | 2026-04-10T12:42:10.282Z |
| CVE-2026-39304 |
N/A
|
Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache… |
Apache Software Foundation |
Apache ActiveMQ Client |
2026-04-10T10:54:04.130Z | 2026-04-10T14:10:55.784Z |
| CVE-2026-31412 |
N/A
|
usb: gadget: f_mass_storage: Fix potential integer ove… |
Linux |
Linux |
2026-04-10T10:35:05.796Z | 2026-04-10T10:35:05.796Z |
| CVE-2026-4162 |
7.1 (3.1)
|
Gravity SMTP <= 2.1.4 - Missing Authorization to Authe… |
RocketGenius |
Gravity SMTP |
2026-04-10T09:25:56.478Z | 2026-04-10T09:25:56.478Z |
| CVE-2021-47961 |
8.1 (3.1)
|
A plaintext storage of a password vulnerability i… |
Synology |
Synology SSL VPN Client |
2026-04-10T09:22:37.522Z | 2026-04-10T12:42:56.656Z |
| CVE-2021-47960 |
6.5 (3.1)
|
A files or directories accessible to external par… |
Synology |
Synology SSL VPN Client |
2026-04-10T09:21:54.559Z | 2026-04-10T12:43:33.313Z |
| CVE-2026-6057 |
9.8 (3.1)
|
Unauthenticated Path Traversal in FalkorDB Browser Lea… |
FalkorDB |
FalkorDB Browser |
2026-04-10T09:16:30.338Z | 2026-04-10T20:25:53.551Z |
| CVE-2026-6042 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
musl libc GB18030 4-byte Decoder iconv.c iconv algorit… |
musl |
libc |
2026-04-10T09:00:18.733Z | 2026-04-10T15:54:06.200Z |
| CVE-2026-6038 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Vehicle Showroom Management System Regis… |
code-projects |
Vehicle Showroom Management System |
2026-04-10T08:45:11.480Z | 2026-04-10T12:46:54.925Z |
| CVE-2026-33457 |
5.3 (4.0)
|
Potential livestatus injection in prediction graph page |
Checkmk GmbH |
Checkmk |
2026-04-10T08:31:35.768Z | 2026-04-10T12:47:24.094Z |
| CVE-2026-33456 |
5.1 (4.0)
|
Potential livestatus injection in notification test |
Checkmk GmbH |
Checkmk |
2026-04-10T08:31:27.807Z | 2026-04-10T12:47:50.407Z |
| CVE-2026-33455 |
5.3 (4.0)
|
Livestatus injection in monitoring quicksearch |
Checkmk GmbH |
Checkmk |
2026-04-10T08:30:20.089Z | 2026-04-10T12:48:27.066Z |
| CVE-2026-6037 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Vehicle Showroom Management System AddVe… |
code-projects |
Vehicle Showroom Management System |
2026-04-10T08:30:10.270Z | 2026-04-10T08:30:10.270Z |
| CVE-2026-6036 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Vehicle Showroom Management System Vehic… |
code-projects |
Vehicle Showroom Management System |
2026-04-10T08:15:12.033Z | 2026-04-10T11:45:05.181Z |
| CVE-2026-6035 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
code-projects Vehicle Showroom Management System Servi… |
code-projects |
Vehicle Showroom Management System |
2026-04-10T08:00:17.813Z | 2026-04-10T15:14:30.174Z |
| CVE-2026-6034 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
code-projects Vehicle Showroom Management System Profi… |
code-projects |
Vehicle Showroom Management System |
2026-04-10T07:45:10.191Z | 2026-04-10T15:54:13.540Z |
| CVE-2026-5525 |
6 (3.1)
|
Stack-Based Buffer Overflow in Notepad++ File Drop Han… |
Notepad++ Project |
Notepad++ |
2026-04-10T07:40:59.902Z | 2026-04-10T12:49:59.124Z |
| CVE-2026-22750 |
7.5 (3.1)
|
SSL bundle configuration silently bypassed in Spring C… |
VMware |
Spring Cloud Gateway |
2026-04-10T07:32:31.260Z | 2026-04-10T12:59:14.451Z |
| CVE-2026-6033 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
CodeAstro Online Classroom updatedetailsfromstudent.ph… |
CodeAstro |
Online Classroom |
2026-04-10T07:30:13.796Z | 2026-04-10T12:59:53.115Z |
| CVE-2026-6032 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
code-projects Simple Laundry System checkcheckout.php … |
code-projects |
Simple Laundry System |
2026-04-10T07:15:13.733Z | 2026-04-10T07:15:13.733Z |
| CVE-2026-6031 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Simple IT Discussion Forum add-category-… |
code-projects |
Simple IT Discussion Forum |
2026-04-10T07:00:25.770Z | 2026-04-10T11:48:27.122Z |
| CVE-2026-6030 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
itsourcecode Construction Management System del1.php s… |
itsourcecode |
Construction Management System |
2026-04-10T06:45:10.429Z | 2026-04-10T15:15:49.331Z |
| CVE-2026-6029 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Totolink A7100RU CGI cstecgi.cgi setVpnAccountCfg os c… |
Totolink |
A7100RU |
2026-04-10T06:30:19.345Z | 2026-04-10T15:45:55.950Z |
| CVE-2026-1115 |
9.6 (3.0)
|
Stored XSS in parisneo/lollms |
parisneo |
parisneo/lollms |
2026-04-10T06:23:13.463Z | 2026-04-10T13:01:44.634Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-29861 |
N/A
|
PHP-MYSQL-User-Login-System v1.0 was discovered t… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:38:34.237Z |
| CVE-2026-23782 |
N/A
|
An issue was discovered in BMC Control-M/MFT 9.0.… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:16:21.821Z |
| CVE-2026-23780 |
N/A
|
An issue was discovered in BMC Control-M/MFT 9.0.… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:26:38.015Z |
| CVE-2025-44560 |
N/A
|
owntone-server 2ca10d9 is vulnerable to Buffer Ov… |
n/a |
n/a |
2026-04-10T00:00:00.000Z | 2026-04-10T14:48:52.868Z |
| CVE-2026-6069 |
7.5 (3.1)
|
CVE-2026-6069 |
NASM |
NASM |
2026-04-10T13:30:48.302Z | 2026-04-10T14:53:37.082Z |
| CVE-2026-6068 |
6.5 (3.1)
|
CVE-2026-6068 |
NASM |
NASM |
2026-04-10T13:30:38.420Z | 2026-04-10T14:56:52.908Z |
| CVE-2026-6067 |
7.5 (3.1)
|
CVE-2026-6067 |
NASM |
NASM |
2026-04-10T13:30:26.140Z | 2026-04-10T14:58:07.818Z |
| CVE-2026-40217 |
8.8 (3.1)
|
LiteLLM through 2026-04-08 allows remote attacker… |
BerriAI |
LiteLLM |
2026-04-10T13:43:23.147Z | 2026-04-10T13:43:23.147Z |
| CVE-2026-33092 |
7.8 (3.0)
|
Local privilege escalation due to improper handli… |
Acronis |
Acronis True Image OEM |
2026-04-10T13:17:45.275Z | 2026-04-10T14:02:46.538Z |
| CVE-2025-58920 |
7.1 (3.1)
|
WordPress Cerato theme <= 2.2.18 - Reflected Cross Sit… |
Zootemplate |
Cerato |
2026-04-10T13:25:31.611Z | 2026-04-10T14:07:44.099Z |
| CVE-2025-58913 |
8.1 (3.1)
|
WordPress VideoPro theme <= 2.3.8.1 - Local File Inclu… |
CactusThemes |
VideoPro |
2026-04-10T13:21:05.820Z | 2026-04-10T13:21:05.820Z |
| CVE-2025-5804 |
7.5 (3.1)
|
WordPress Case Theme User < 1.0.4 - Local File Inclusi… |
Case Themes |
Case Theme User |
2026-04-10T13:19:43.457Z | 2026-04-10T13:19:43.457Z |
| CVE-2026-5774 |
6.1 (4.0)
|
Juju API Server Denial of Service and Authentication R… |
Canonical |
Juju |
2026-04-10T12:10:55.634Z | 2026-04-10T12:41:28.720Z |
| CVE-2026-5412 |
9.9 (3.1)
|
Juju CloudSpec API could leak senstive information |
Canonical |
Juju |
2026-04-10T12:22:05.403Z | 2026-04-10T14:04:30.155Z |
| CVE-2026-5777 |
8.7 (4.0)
|
Security Misconfiguration Vulnerability in Atom 3x Projector |
EGate |
Atom 3X Projector |
2026-04-10T11:40:55.335Z | 2026-04-10T12:42:10.282Z |
| CVE-2026-39304 |
N/A
|
Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache… |
Apache Software Foundation |
Apache ActiveMQ Client |
2026-04-10T10:54:04.130Z | 2026-04-10T14:10:55.784Z |
| CVE-2026-31412 |
N/A
|
usb: gadget: f_mass_storage: Fix potential integer ove… |
Linux |
Linux |
2026-04-10T10:35:05.796Z | 2026-04-10T10:35:05.796Z |
| CVE-2026-6057 |
9.8 (3.1)
|
Unauthenticated Path Traversal in FalkorDB Browser Lea… |
FalkorDB |
FalkorDB Browser |
2026-04-10T09:16:30.338Z | 2026-04-10T20:25:53.551Z |
| CVE-2026-4162 |
7.1 (3.1)
|
Gravity SMTP <= 2.1.4 - Missing Authorization to Authe… |
RocketGenius |
Gravity SMTP |
2026-04-10T09:25:56.478Z | 2026-04-10T09:25:56.478Z |
| CVE-2021-47961 |
8.1 (3.1)
|
A plaintext storage of a password vulnerability i… |
Synology |
Synology SSL VPN Client |
2026-04-10T09:22:37.522Z | 2026-04-10T12:42:56.656Z |
| CVE-2021-47960 |
6.5 (3.1)
|
A files or directories accessible to external par… |
Synology |
Synology SSL VPN Client |
2026-04-10T09:21:54.559Z | 2026-04-10T12:43:33.313Z |
| CVE-2026-6042 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
musl libc GB18030 4-byte Decoder iconv.c iconv algorit… |
musl |
libc |
2026-04-10T09:00:18.733Z | 2026-04-10T15:54:06.200Z |
| CVE-2026-6038 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Vehicle Showroom Management System Regis… |
code-projects |
Vehicle Showroom Management System |
2026-04-10T08:45:11.480Z | 2026-04-10T12:46:54.925Z |
| CVE-2026-6037 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Vehicle Showroom Management System AddVe… |
code-projects |
Vehicle Showroom Management System |
2026-04-10T08:30:10.270Z | 2026-04-10T08:30:10.270Z |
| CVE-2026-6036 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Vehicle Showroom Management System Vehic… |
code-projects |
Vehicle Showroom Management System |
2026-04-10T08:15:12.033Z | 2026-04-10T11:45:05.181Z |
| CVE-2026-33457 |
5.3 (4.0)
|
Potential livestatus injection in prediction graph page |
Checkmk GmbH |
Checkmk |
2026-04-10T08:31:35.768Z | 2026-04-10T12:47:24.094Z |
| CVE-2026-33456 |
5.1 (4.0)
|
Potential livestatus injection in notification test |
Checkmk GmbH |
Checkmk |
2026-04-10T08:31:27.807Z | 2026-04-10T12:47:50.407Z |
| CVE-2026-33455 |
5.3 (4.0)
|
Livestatus injection in monitoring quicksearch |
Checkmk GmbH |
Checkmk |
2026-04-10T08:30:20.089Z | 2026-04-10T12:48:27.066Z |
| CVE-2026-6035 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
code-projects Vehicle Showroom Management System Servi… |
code-projects |
Vehicle Showroom Management System |
2026-04-10T08:00:17.813Z | 2026-04-10T15:14:30.174Z |
| CVE-2026-6034 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
code-projects Vehicle Showroom Management System Profi… |
code-projects |
Vehicle Showroom Management System |
2026-04-10T07:45:10.191Z | 2026-04-10T15:54:13.540Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-71202 | In the Linux kernel, the following vulnerability has been resolved: iommu/sva: invalidate stale IO… | 2026-02-14T16:15:52.790 | 2026-03-17T21:16:48.270 |
| fkie_cve-2025-71201 | In the Linux kernel, the following vulnerability has been resolved: netfs: Fix early read unlock o… | 2026-02-14T16:15:52.647 | 2026-03-17T21:16:55.887 |
| fkie_cve-2026-23131 | In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix … | 2026-02-14T15:16:08.387 | 2026-03-17T21:17:04.773 |
| fkie_cve-2026-23130 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix dead lock wh… | 2026-02-14T15:16:08.277 | 2026-03-17T21:17:11.440 |
| fkie_cve-2026-23129 | In the Linux kernel, the following vulnerability has been resolved: dpll: Prevent duplicate regist… | 2026-02-14T15:16:08.173 | 2026-03-18T14:17:11.903 |
| fkie_cve-2026-23128 | In the Linux kernel, the following vulnerability has been resolved: arm64: Set __nocfi on swsusp_a… | 2026-02-14T15:16:08.060 | 2026-03-18T14:46:26.907 |
| fkie_cve-2026-23127 | In the Linux kernel, the following vulnerability has been resolved: perf: Fix refcount warning on … | 2026-02-14T15:16:07.963 | 2026-03-18T14:49:58.400 |
| fkie_cve-2026-23126 | In the Linux kernel, the following vulnerability has been resolved: netdevsim: fix a race issue re… | 2026-02-14T15:16:07.853 | 2026-03-18T14:50:12.257 |
| fkie_cve-2026-23125 | In the Linux kernel, the following vulnerability has been resolved: sctp: move SCTP_CMD_ASSOC_SHKE… | 2026-02-14T15:16:07.740 | 2026-03-18T14:50:20.100 |
| fkie_cve-2026-23124 | In the Linux kernel, the following vulnerability has been resolved: ipv6: annotate data-race in nd… | 2026-02-14T15:16:07.633 | 2026-03-18T14:50:31.123 |
| fkie_cve-2026-23123 | In the Linux kernel, the following vulnerability has been resolved: interconnect: debugfs: initial… | 2026-02-14T15:16:07.500 | 2026-03-18T14:50:40.470 |
| fkie_cve-2026-23122 | In the Linux kernel, the following vulnerability has been resolved: igc: Reduce TSN TX packet buff… | 2026-02-14T15:16:07.390 | 2026-03-18T14:50:49.260 |
| fkie_cve-2026-23121 | In the Linux kernel, the following vulnerability has been resolved: mISDN: annotate data-race arou… | 2026-02-14T15:16:07.280 | 2026-03-18T13:39:23.070 |
| fkie_cve-2026-23120 | In the Linux kernel, the following vulnerability has been resolved: l2tp: avoid one data-race in l… | 2026-02-14T15:16:07.157 | 2026-03-18T13:39:35.227 |
| fkie_cve-2026-23119 | In the Linux kernel, the following vulnerability has been resolved: bonding: provide a net pointer… | 2026-02-14T15:16:07.043 | 2026-03-18T13:39:51.890 |
| fkie_cve-2026-23118 | In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix data-race warning a… | 2026-02-14T15:16:06.933 | 2026-03-25T11:16:18.923 |
| fkie_cve-2026-23117 | In the Linux kernel, the following vulnerability has been resolved: ice: add missing ice_deinit_hw… | 2026-02-14T15:16:06.830 | 2026-03-18T13:40:23.590 |
| fkie_cve-2026-23116 | In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8m-blk-ctrl: Remo… | 2026-02-14T15:16:06.713 | 2026-03-18T13:40:31.990 |
| fkie_cve-2026-23115 | In the Linux kernel, the following vulnerability has been resolved: serial: Fix not set tty->port … | 2026-02-14T15:16:06.607 | 2026-03-18T13:41:27.780 |
| fkie_cve-2026-23114 | In the Linux kernel, the following vulnerability has been resolved: arm64/fpsimd: ptrace: Fix SVE … | 2026-02-14T15:16:06.500 | 2026-03-18T13:41:42.553 |
| fkie_cve-2026-23113 | In the Linux kernel, the following vulnerability has been resolved: io_uring/io-wq: check IO_WQ_BI… | 2026-02-14T15:16:06.380 | 2026-03-25T11:16:18.723 |
| fkie_cve-2025-71200 | In the Linux kernel, the following vulnerability has been resolved: mmc: sdhci-of-dwcmshc: Prevent… | 2026-02-14T15:16:05.980 | 2026-03-18T13:42:10.163 |
| fkie_cve-2026-2312 | The Media Library Folders plugin for WordPress is vulnerable to Insecure Direct Object Reference in… | 2026-02-14T12:15:56.123 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1512 | The Essential Addons for Elementor – Popular Elementor Templates & Widgets plugin for WordPress is … | 2026-02-14T10:16:06.627 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1843 | The Super Page Cache plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Acti… | 2026-02-14T09:16:12.360 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1258 | The Mail Mint plugin for WordPress is vulnerable to blind SQL Injection via the 'forms', 'automatio… | 2026-02-14T09:16:12.190 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1254 | The Modula Image Gallery – Photo Grid & Video Gallery plugin for WordPress is vulnerable to authori… | 2026-02-14T09:16:12.020 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1249 | The MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar plugin for WordPress is vulne… | 2026-02-14T09:16:11.850 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-0550 | The myCred plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mycr… | 2026-02-14T09:16:11.683 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-8572 | The Truelysell Core plugin for WordPress is vulnerable to privilege escalation in versions less tha… | 2026-02-14T09:16:11.490 | 2026-02-18T17:52:44.520 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-83mf-f2q6-j3gg |
|
An issue was discovered in BMC Control-M/MFT 9.0.20 through 9.0.22. An API management endpoint allo… | 2026-04-10T15:31:58Z | 2026-04-10T15:31:58Z |
| ghsa-4xpm-h4rq-mjc8 |
|
A SQL injection vulnerability was found in the instructorClasses.php file of itsourcecode Online St… | 2026-04-10T15:31:58Z | 2026-04-10T15:31:58Z |
| ghsa-4vh8-vwxr-xc62 |
|
owntone-server 2ca10d9 is vulnerable to Buffer Overflow due to lack of recursive checking. | 2026-04-10T15:31:58Z | 2026-04-10T15:31:58Z |
| ghsa-xr7f-6r6v-cqmm |
7.8 (3.1)
|
Local privilege escalation due to improper handling of environment variables. The following product… | 2026-04-10T15:31:57Z | 2026-04-10T15:31:57Z |
| ghsa-wwjw-6p2f-76rh |
6.5 (3.1)
|
NASM contains a heap use after free vulnerability in response file (-@) processing where a dangling… | 2026-04-10T15:31:57Z | 2026-04-10T18:31:17Z |
| ghsa-whm2-488f-jvqp |
7.1 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-04-10T15:31:57Z | 2026-04-10T15:31:57Z |
| ghsa-wc24-xjh6-92j4 |
|
An issue was discovered in BMC Control-M/MFT 9.0.20 through 9.0.22. A SQL injection vulnerability i… | 2026-04-10T15:31:57Z | 2026-04-10T15:31:57Z |
| ghsa-rfxf-xpj4-mc2x |
8.1 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-04-10T15:31:57Z | 2026-04-10T15:31:57Z |
| ghsa-6h49-94j7-p577 |
7.5 (3.1)
|
A heap buffer overflow vulnerability exists in the Netwide Assembler (NASM) due to a lack of bounds… | 2026-04-10T15:31:57Z | 2026-04-10T18:31:17Z |
| ghsa-3926-2jvf-fg29 |
8.8 (3.1)
|
LiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via bytecode rewriting… | 2026-04-10T15:31:57Z | 2026-04-10T15:31:57Z |
| ghsa-xx5w-cvp6-jv83 |
9.2 (4.0)
|
Wasmtime with Winch compiler backend on aarch64 may allow a sandbox-escaping memory access | 2026-04-10T15:31:18Z | 2026-04-10T15:31:18Z |
| ghsa-96q5-xm3p-7m84 |
6.5 (3.1)
|
Vikunja: Link Share JWT tokens remain valid for 72 hours after share deletion or permission downgrade | 2026-04-10T15:31:11Z | 2026-04-10T19:36:07Z |
| ghsa-8jvc-mcx6-r4cg |
7.4 (3.1)
|
Vikunja has TOTP Two-Factor Authentication Bypass via OIDC Login Path | 2026-04-10T15:30:57Z | 2026-04-10T19:35:20Z |
| ghsa-frr3-hpw2-j7cq |
6.5 (3.1)
|
A files or directories accessible to external parties vulnerability in Synology SSL VPN Client befo… | 2026-04-10T12:31:44Z | 2026-04-10T12:31:44Z |
| ghsa-66q3-hgw9-jr5j |
7.1 (3.1)
|
The Gravity SMTP plugin for WordPress is vulnerable to Missing Authorization in versions up to, and… | 2026-04-10T12:31:44Z | 2026-04-10T12:31:44Z |
| ghsa-5568-6qcg-g7fx |
7.5 (3.1)
|
Apache ActiveMQ: Denial of Service via Out of Memory vulnerability | 2026-04-10T12:31:44Z | 2026-04-10T21:01:01Z |
| ghsa-3jqw-2342-vgxw |
8.7 (4.0)
|
This vulnerability exists in the Atom 3x Projector due to improper exposure of the Android Debug Br… | 2026-04-10T12:31:44Z | 2026-04-10T12:31:44Z |
| ghsa-35q9-fp2v-jhcq |
|
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_mass_storage: F… | 2026-04-10T12:31:44Z | 2026-04-10T12:31:44Z |
| ghsa-2jcx-2m59-6cv8 |
8.1 (3.1)
|
A plaintext storage of a password vulnerability in Synology SSL VPN Client before 1.4.5-0684 allows… | 2026-04-10T12:31:44Z | 2026-04-10T12:31:44Z |
| ghsa-2987-f6gf-82vj |
9.8 (3.1)
|
FalkorDB Browser 1.9.3 contains an unauthenticated path traversal vulnerability in the file upload … | 2026-04-10T12:31:44Z | 2026-04-10T21:31:14Z |
| ghsa-x96m-26ch-mprq |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in CodeAstro Online Classroom 1.0. Affected is an unknown function o… | 2026-04-10T09:31:16Z | 2026-04-10T09:31:16Z |
| ghsa-wvcm-8qcx-6vf4 |
4.3 (3.1)
2.1 (4.0)
|
A flaw has been found in code-projects Vehicle Showroom Management System 1.0. Impacted is an unkno… | 2026-04-10T09:31:16Z | 2026-04-10T09:31:16Z |
| ghsa-v7f2-qghm-mg3r |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability has been found in code-projects Simple IT Discussion Forum 1.0. This affects an unk… | 2026-04-10T09:31:16Z | 2026-04-10T09:31:16Z |
| ghsa-rhpc-gv73-7m9f |
6.3 (3.1)
2.1 (4.0)
|
A flaw has been found in itsourcecode Construction Management System 1.0. The impacted element is a… | 2026-04-10T09:31:16Z | 2026-04-10T09:31:16Z |
| ghsa-p2v5-ghx9-jg75 |
5.3 (4.0)
|
Livestatus injection in the monitoring quicksearch in Checkmk <2.5.0b4 allows an authenticated atta… | 2026-04-10T09:31:16Z | 2026-04-10T09:31:16Z |
| ghsa-hxwv-vc7p-p66g |
5.1 (4.0)
|
Livestatus injection in the notification test mode in Checkmk <2.5.0b4 and <2.4.0p26 allows an auth… | 2026-04-10T09:31:16Z | 2026-04-10T09:31:16Z |
| ghsa-h7hj-cr59-59c2 |
5.4 (3.1)
|
OpenStack Skyline before 5.0.1, 6.0.0, and 7.0.0 has a DOM-based Cross-Site Scripting (XSS) vulnera… | 2026-04-10T09:31:16Z | 2026-04-10T18:31:17Z |
| ghsa-9x65-73m2-6pcg |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability has been found in code-projects Vehicle Showroom Management System 1.0. The affecte… | 2026-04-10T09:31:16Z | 2026-04-10T09:31:16Z |
| ghsa-9g69-m48x-mfpw |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was identified in code-projects Vehicle Showroom Management System 1.0. This impact… | 2026-04-10T09:31:16Z | 2026-04-10T09:31:16Z |
| ghsa-98g2-jqvc-f33c |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was found in code-projects Simple Laundry System 1.0. This impacts an unknown funct… | 2026-04-10T09:31:16Z | 2026-04-10T09:31:16Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-233 |
|
python-jose through 3.3.0 allows attackers to cause a denial of service (resource consump… | python-jose | 2024-04-26T00:15:09+00:00 | 2025-02-18T19:20:15.511369+00:00 |
| pysec-2024-232 |
|
python-jose through 3.3.0 has algorithm confusion with OpenSSH ECDSA keys and other key f… | python-jose | 2024-04-26T00:15:09+00:00 | 2025-02-18T19:20:15.468012+00:00 |
| pysec-2024-209 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-19T19:19:01.689044+00:00 |
| pysec-2024-163 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Prior to ve… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-14T05:22:23.036505+00:00 |
| pysec-2024-208 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.647736+00:00 |
| pysec-2024-207 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.605918+00:00 |
| pysec-2024-206 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.566553+00:00 |
| pysec-2024-246 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Starting in… | vyper | 2024-04-25T17:15:50+00:00 | 2025-05-05T19:21:20.899426+00:00 |
| pysec-2024-50 |
|
Synapse is an open-source Matrix homeserver. A remote Matrix user with malicious intent, … | matrix-synapse | 2024-04-23T18:15:00+00:00 | 2024-04-23T21:18:51.688096+00:00 |
| pysec-2024-250 |
|
Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the component torch/csr… | torch | 2024-04-19T21:15:08+00:00 | 2025-06-03T15:23:56.072490+00:00 |
| pysec-2024-252 |
|
PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in t… | torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T19:22:08.948962+00:00 |
| pysec-2024-251 |
|
Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in… | torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T03:12:59.077932+00:00 |
| pysec-2024-243 |
9.3 (3.1)
|
mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs… | mlflow | 2024-04-16T00:15:12+00:00 | 2025-04-08T10:23:25.044416+00:00 |
| pysec-2024-254 |
4.2 (3.1)
|
A session fixation vulnerability exists in the zenml-io/zenml application, where JWT toke… | zenml | 2024-04-16T00:15:11+00:00 | 2025-06-13T00:48:41.806476+00:00 |
| pysec-2024-247 |
9.9 (3.1)
|
A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically… | zenml | 2024-04-16T00:15:11+00:00 | 2025-05-12T15:23:53.861001+00:00 |
| pysec-2024-49 |
|
Lektor before 3.3.11 does not sanitize DB path traversal. Thus, shell commands might be e… | lektor | 2024-03-27T06:15:00+00:00 | 2024-03-27T11:18:36.506150+00:00 |
| pysec-2024-257 |
7.5 (3.1)
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2024-03-22T23:15:07+00:00 | 2025-06-30T15:23:50.085549+00:00 |
| pysec-2024-234 |
9.8 (3.1)
|
Jupyter Server Proxy allows users to run arbitrary external processes alongside their Jup… | jupyter-server-proxy | 2024-03-20T20:15:08+00:00 | 2025-02-21T18:23:35.992501+00:00 |
| pysec-2024-48 |
|
Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial o… | black | 2024-03-19T05:15:00+00:00 | 2024-03-19T11:18:50.379002+00:00 |
| pysec-2024-179 |
4.8 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-03-18T22:15:07+00:00 | 2025-01-19T01:52:24.377662+00:00 |
| pysec-2024-47 |
|
In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.te… | django | 2024-03-15T20:15:00+00:00 | 2024-03-15T23:20:34.975097+00:00 |
| pysec-2024-46 |
|
Apache Airflow, versions 2.8.0 through 2.8.2, has a vulnerability that allows an authenti… | apache-airflow | 2024-03-14T09:15:00+00:00 | 2024-03-14T11:19:09.515892+00:00 |
| pysec-2024-221 |
5.3 (3.1)
|
aiosmtpd is a reimplementation of the Python stdlib smtpd.py based on asyncio. aiosmtpd i… | aiosmtpd | 2024-03-12T21:15:58+00:00 | 2025-01-22T16:23:18.042465+00:00 |
| pysec-2024-44 |
|
In RPyC before 6.0.0, when a server exposes a method that calls the attribute named __arr… | rpyc | 2024-03-12T16:15:00+00:00 | 2024-03-12T19:19:21.886478+00:00 |
| pysec-2024-45 |
|
LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to contro… | langchain-core | 2024-03-04T00:15:00+00:00 | 2024-03-13T23:20:07.486731+00:00 |
| pysec-2024-43 |
|
LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to contro… | langchain | 2024-03-04T00:15:00+00:00 | 2024-03-05T10:22:15.555734+00:00 |
| pysec-2024-42 |
|
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated Ops … | apache-airflow | 2024-03-01T11:15:00+00:00 | 2024-03-01T14:20:34.498842+00:00 |
| pysec-2024-245 |
|
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated user… | apache-airflow | 2024-02-29T11:15:08+00:00 | 2025-05-01T21:22:38.598048+00:00 |
| pysec-2024-162 |
6.5 (3.1)
|
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the XMLFeedSpider … | scrapy | 2024-02-28T00:15:53+00:00 | 2025-01-14T05:22:21.870348+00:00 |
| pysec-2024-41 |
|
diffoscope before 256 allows directory traversal via an embedded filename in a GPG file. … | diffoscope | 2024-02-27T02:15:00+00:00 | 2024-02-27T07:20:27.954412+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2269 | Malicious code in claude-lite (PyPI) | 2026-03-27T16:45:20Z | 2026-03-27T16:45:20Z |
| mal-2026-2272 | Malicious code in solana-api (PyPI) | 2026-03-27T16:44:41Z | 2026-03-27T16:44:41Z |
| mal-2026-2268 | Malicious code in gemini-ai-api (PyPI) | 2026-03-27T16:39:25Z | 2026-03-27T17:24:17Z |
| mal-2026-2265 | Malicious code in monolith-twirp-codingagentintegrations-codingagentintegrations (RubyGems) | 2026-03-27T13:38:51Z | 2026-03-27T13:38:51Z |
| mal-2026-2266 | Malicious code in monolith-twirp-copilot-registry (RubyGems) | 2026-03-27T13:37:00Z | 2026-03-27T13:37:00Z |
| mal-2026-2267 | Malicious code in monolith-twirp-partitioning-pull_requests (RubyGems) | 2026-03-27T13:36:59Z | 2026-03-27T13:36:59Z |
| mal-2026-2263 | Malicious code in monolith-twirp-reposinsights-reposinsights (RubyGems) | 2026-03-27T13:27:04Z | 2026-03-27T13:27:04Z |
| mal-2026-2262 | Malicious code in monolith-twirp-pullsd-teams (RubyGems) | 2026-03-27T13:27:00Z | 2026-03-27T13:27:00Z |
| mal-2026-2259 | Malicious code in monolith-twirp-loops-core (RubyGems) | 2026-03-27T13:26:58Z | 2026-03-27T13:26:58Z |
| mal-2026-2261 | Malicious code in monolith-twirp-pullsd-repositories (RubyGems) | 2026-03-27T13:26:55Z | 2026-03-27T13:26:55Z |
| mal-2026-2260 | Malicious code in monolith-twirp-pullsd-pullrequestinfo (RubyGems) | 2026-03-27T13:26:48Z | 2026-03-27T13:26:48Z |
| mal-2026-2264 | Malicious code in monolith-twirp-scribe-scribe (RubyGems) | 2026-03-27T13:26:09Z | 2026-03-27T13:26:09Z |
| mal-2026-2258 | Malicious code in current-context-urn (npm) | 2026-03-27T12:31:02Z | 2026-03-31T03:12:01Z |
| mal-2026-2257 | Malicious code in xpna-context (npm) | 2026-03-27T12:10:43Z | 2026-03-31T03:12:05Z |
| mal-2026-2256 | Malicious code in shenxun162938 (npm) | 2026-03-27T09:40:39Z | 2026-03-31T03:12:04Z |
| mal-2026-2255 | Malicious code in thisismytest123 (PyPI) | 2026-03-27T07:47:07Z | 2026-03-27T14:27:31Z |
| mal-2026-2254 | Malicious code in telnyx (PyPI) | 2026-03-27T04:26:10Z | 2026-03-27T04:26:10Z |
| mal-2026-2253 | Malicious code in dgxeon-soket-buttonx (npm) | 2026-03-27T03:24:37Z | 2026-03-31T03:12:01Z |
| mal-2026-2252 | Malicious code in dgxeon-baileys (npm) | 2026-03-27T03:24:37Z | 2026-03-31T03:12:01Z |
| mal-2026-2249 | Malicious code in chai-as-added (npm) | 2026-03-27T03:12:35Z | 2026-03-31T03:12:01Z |
| mal-2026-2251 | Malicious code in testtestsharp (npm) | 2026-03-27T03:07:31Z | 2026-03-31T03:12:05Z |
| mal-2026-2250 | Malicious code in test1sharp (npm) | 2026-03-27T03:07:31Z | 2026-03-31T03:12:05Z |
| mal-2026-2247 | Malicious code in cua-primitives-server (npm) | 2026-03-27T00:51:36Z | 2026-03-31T03:12:01Z |
| mal-2026-2246 | Malicious code in @ev-tech/eva-container-api (npm) | 2026-03-27T00:51:36Z | 2026-03-31T03:12:00Z |
| mal-2026-2248 | Malicious code in shop-republik-ch (npm) | 2026-03-27T00:51:35Z | 2026-03-31T03:12:04Z |
| mal-2026-2245 | Malicious code in requests-testik111 (PyPI) | 2026-03-26T21:35:07Z | 2026-03-27T17:24:17Z |
| mal-2026-2244 | Malicious code in fluxhttp (PyPI) | 2026-03-26T20:49:03Z | 2026-04-08T20:19:39Z |
| mal-2026-2243 | Malicious code in browserstack-electron-forge-include-package-plugin (npm) | 2026-03-26T20:45:39Z | 2026-03-31T03:12:00Z |
| mal-2026-2242 | Malicious code in somepentest-test-package (PyPI) | 2026-03-26T20:06:44Z | 2026-03-26T20:06:44Z |
| mal-2026-2238 | Malicious code in spr-i18n-labels (npm) | 2026-03-26T16:40:45Z | 2026-03-31T03:12:04Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0279 | GIMP: Schwachstelle ermöglicht Codeausführung | 2026-02-01T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0278 | OpenClaw: Schwachstelle ermöglicht Codeausführung | 2026-02-01T23:00:00.000+00:00 | 2026-03-01T23:00:00.000+00:00 |
| wid-sec-w-2026-0271 | Keycloak (Admin API): Schwachstelle ermöglicht Offenlegung von Informationen | 2026-02-01T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0269 | SaltStack Salt: Mehrere Schwachstellen | 2026-02-01T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0265 | expat: Schwachstelle ermöglicht Codeausführung | 2026-01-29T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0258 | Red Hat Enterprise Linux (iperf3): Schwachstelle ermöglicht Codeausführung | 2026-01-29T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0250 | Drupal Canvas und CAS: Mehrere Schwachstellen | 2026-01-28T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0246 | Lexmark Laser Printers: Mehrere Schwachstellen ermöglichen Ausführen von beliebigem Programmcode mit Benutzerrechten | 2026-01-28T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0244 | FreeRDP: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0243 | Red Hat OpenShift Container Platform: Schwachstelle ermöglicht Denial of Service | 2026-01-27T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0237 | libpng: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-27T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0235 | Nvidia Treiber: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0234 | OpenSSL: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0233 | vllm: Schwachstelle ermöglicht Offenlegung von Informationen und DoS | 2026-01-27T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0231 | GnuPG und Gpg4win: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0230 | Mozilla Thunderbird: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-27T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0229 | Citrix Systems XenServer und Xen: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-27T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0225 | Xen: Mehrere Schwachstellen | 2026-01-26T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0224 | Grafana: Mehrere Schwachstellen | 2026-01-26T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0222 | PyTorch: Schwachstelle ermöglicht Codeausführung | 2026-01-26T23:00:00.000+00:00 | 2026-01-27T23:00:00.000+00:00 |
| wid-sec-w-2026-0219 | Vercel Next.js: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-26T23:00:00.000+00:00 | 2026-01-27T23:00:00.000+00:00 |
| wid-sec-w-2026-0215 | Linux Kernel: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0214 | dormakaba Access Manager: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-01-27T23:00:00.000+00:00 |
| wid-sec-w-2026-0213 | expat: Schwachstelle ermöglicht Denial of Service | 2026-01-25T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0210 | IBM DB2 Big SQL: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0209 | Cpython: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0207 | Red Hat Enterprise Linux (urllib3): Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0203 | SmarterTools SmarterMail: Schwachstelle ermöglicht Umgehung | 2026-01-22T23:00:00.000+00:00 | 2026-02-22T23:00:00.000+00:00 |
| wid-sec-w-2026-0202 | Logback: Schwachstelle ermöglicht Manipulation von Daten | 2026-01-22T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0199 | Red Hat OpenShift Pipelines Operator (Fulcio): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-308-01 | Fuji Electric Monitouch V-SFT-6 (Update A) | 2025-11-04T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| va-25-304-02 | Restaurant Brands International assistant platform multiple vulnerabilities | 2025-10-31T17:02:13Z | 2025-10-31T17:02:13Z |
| va-25-304-01 | ELOG multiple vulnerabilities | 2025-10-31T16:57:24Z | 2025-10-31T16:57:24Z |
| icsa-25-303-02 | Hitachi Energy TropOS | 2025-10-30T06:00:00.000000Z | 2025-10-30T06:00:00.000000Z |
| icsa-25-303-01 | International Standards Organization ISO 15118-2 (Update A) | 2025-10-30T05:00:00.000000Z | 2026-03-17T05:00:00.000000Z |
| icsma-25-301-01 | Vertikal Systems Hospital Manager Backend Services | 2025-10-28T06:00:00.000000Z | 2025-10-28T06:00:00.000000Z |
| icsma-25-296-01 | NIHON KOHDEN Central Monitor CNS-6201 | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-04 | Delta Electronics ASDA-Soft | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-03 | Veeder-Root TLS4B Automatic Tank Gauge System | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-02 | ASKI Energy ALS-Mini-S8 and ALS-Mini-S4 | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-01 | AutomationDirect Productivity Suite | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| va-25-296-01 | Frontier Airlines website publicly available email address validation | 2025-10-23T00:00:00Z | 2025-10-23T00:00:00Z |
| va-25-297-01 | IBM DOORS Next Generation multiple vulnerabilities | 2025-10-22T18:45:47Z | 2026-03-04T00:00:00Z |
| icsma-25-294-01 | Oxford Nanopore Technologies MinKNOW | 2025-10-21T06:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| icsa-25-294-06 | Raisecomm RAX701-GC Series | 2025-10-21T06:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| icsa-25-294-05 | CloudEdge Online Cameras and App | 2025-10-21T06:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| icsa-25-294-02 | Rockwell Automation Compact GuardLogix 5370 | 2025-10-21T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-294-01 | Rockwell Automation 1783-NATR | 2025-10-21T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| va-25-289-01 | OPEXUS FOIAXpress unauthenticated administrator password reset | 2025-10-16T16:43:55Z | 2025-10-16T16:43:55Z |
| icsa-25-289-04 | Rockwell Automation ArmorStart AOP | 2025-10-16T06:00:00.000000Z | 2025-10-16T06:00:00.000000Z |
| icsa-25-289-03 | Rockwell Automation FactoryTalk ViewPoint | 2025-10-16T06:00:00.000000Z | 2025-10-16T06:00:00.000000Z |
| icsa-25-289-02 | Rockwell Automation FactoryTalk Linx | 2025-10-16T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-289-01 | Rockwell Automation FactoryTalk View Machine Edition and PanelView Plus 7 | 2025-10-16T06:00:00.000000Z | 2025-10-16T06:00:00.000000Z |
| icsa-25-301-01 | Schneider Electric EcoStruxure | 2025-10-14T07:00:00.000000Z | 2025-10-14T07:00:00.000000Z |
| icsa-25-287-01 | Rockwell Automation 1715 EtherNet/IP Comms Module | 2025-10-14T06:00:00.000000Z | 2025-10-14T06:00:00.000000Z |
| icsa-25-289-10 | Siemens HyperLynx and Industrial Edge App Publisher | 2025-10-14T00:00:00.000000Z | 2026-01-14T22:05:41.165529Z |
| icsa-25-289-09 | Siemens TeleControl Server Basic | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-289-08 | Siemens SINEC NMS | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-289-07 | Siemens SIMATIC ET 200SP Communication Processors | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-289-06 | Siemens SiPass Integrated | 2025-10-14T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-webex-app-client-rce-ufymmylc | Cisco Webex App Client-Side Remote Code Execution Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-sna-prvesc-4bqmk33z | Cisco Secure Network Analytics Privilege Escalation Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-nd-unenum-2xffh472 | Cisco Nexus Dashboard LDAP Username Enumeration Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-meraki-mx-vpn-dos-vnrpdvfb | Cisco Meraki MX and Z Series AnyConnect VPN Denial of Service Vulnerability | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-epnmpi-sxss-gsscpgy4 | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerabilities | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-ece-dos-tc6m9gz8 | Cisco Enterprise Chat and Email Denial of Service Vulnerability | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-xrike-9wygprgq | Cisco IOS XR Software Internet Key Exchange Version 2 Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-xr792-bwfvdpy | Cisco IOS XR Software Release 7.9.2 Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-sb-lkm-znerzjbz | Cisco IOS XR Software Secure Boot Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-ncs-hybridacl-crmzffkq | Cisco IOS XR Software Hybrid Access Control List Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-multicast-ermrsvq7 | Cisco IOS XR Software for ASR 9000 Series Routers Layer 3 Multicast Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-modular-acl-u5mepxmm | Cisco IOS XR Software Access Control List Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-ipv4uni-lfm3cfbu | Cisco IOS XR Software for ASR 9000 Series Routers IPv4 Unicast Packets Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-iosxr-priv-esc-gfqjxvof | Cisco IOS XR Software CLI Privilege Escalation Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-iosxr-bgp-dos-o7stephx | Cisco IOS XR Software Border Gateway Protocol Confederation Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-ios-xr-verii-bypass-hhpwqrvx | Cisco IOS XR Software Image Verification Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-tms-xss-vuln-wbtcywxg | Cisco TelePresence Management Suite Cross-Site Scripting Vulnerability | 2025-03-05T16:00:00+00:00 | 2025-03-05T16:44:57+00:00 |
| cisco-sa-secure-dll-injection-aoyzeqsg | Cisco Secure Client for Windows with Secure Firewall Posture Engine DLL Hijacking Vulnerability | 2025-03-05T16:00:00+00:00 | 2025-03-05T16:00:00+00:00 |
| cisco-sa-webex-credexp-xmn85y6 | Cisco Webex for BroadWorks Credential Exposure Vulnerability | 2025-03-04T16:00:00+00:00 | 2025-04-01T13:40:00+00:00 |
| cisco-sa-nxos-ici-dpojbwxk | Cisco Nexus 3000 and 9000 Series Switches Command Injection Vulnerability | 2025-02-26T16:00:00+00:00 | 2025-02-26T16:00:00+00:00 |
| cisco-sa-n3kn9k-healthdos-eoqswk4g | Cisco Nexus 3000 and 9000 Series Switches Health Monitoring Diagnostics Denial of Service Vulnerability | 2025-02-26T16:00:00+00:00 | 2025-02-26T16:00:00+00:00 |
| cisco-sa-apic-multi-vulns-9ummtg5 | Cisco Application Policy Infrastructure Controller Vulnerabilities | 2025-02-26T16:00:00+00:00 | 2025-02-26T16:00:00+00:00 |
| cisco-sa-phone-info-disc-yyxswstk | Cisco Video Phone 8875 and Desk Phone 9800 Series Information Disclosure Vulnerability | 2025-02-19T16:00:00+00:00 | 2025-02-19T16:00:00+00:00 |
| cisco-sa-esa-mailpol-bypass-5nvcjzmw | Cisco Secure Email Gateway Email Filter Bypass Vulnerability | 2025-02-19T16:00:00+00:00 | 2025-02-19T16:00:00+00:00 |
| cisco-sa-broadworks-xss-gdpgj58p | Cisco BroadWorks Application Delivery Platform Cross-Site Scripting Vulnerability | 2025-02-19T16:00:00+00:00 | 2025-02-19T16:00:00+00:00 |
| cisco-sa-swa-range-bypass-2bsehysu | Cisco Secure Web Appliance Range Request Bypass Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-snmp-dos-sdxnsucw | Cisco IOS, IOS XE, and IOS XR Software SNMP Denial of Service Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-03-12T15:22:33+00:00 |
| cisco-sa-ise-xss-42tgsdmg | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-ise-multivuls-ftw9aoxf | Cisco Identity Services Engine Insecure Java Deserialization and Authorization Bypass Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-02-10T20:23:50+00:00 |
| cisco-sa-expressway-xss-uexuzrew | Cisco Expressway Series Cross-Site Scripting Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-3644 | Incomplete control character validation in http.cookies | 2026-03-02T00:00:00.000Z | 2026-03-31T14:57:15.000Z |
| msrc_cve-2026-3634 | Libsoup: libsoup: http header injection and response splitting via crlf injection in content-type header | 2026-03-02T00:00:00.000Z | 2026-03-31T15:07:02.000Z |
| msrc_cve-2026-3633 | Libsoup: libsoup: header and http request injection via crlf injection | 2026-03-02T00:00:00.000Z | 2026-03-31T15:08:08.000Z |
| msrc_cve-2026-3632 | Libsoup: libsoup: http smuggling and server-side request forgery via malformed hostnames | 2026-03-02T00:00:00.000Z | 2026-03-31T15:07:34.000Z |
| msrc_cve-2026-3591 | A stack use-after-return flaw in SIG(0) handling code may enable ACL bypass | 2026-03-02T00:00:00.000Z | 2026-03-31T14:59:36.000Z |
| msrc_cve-2026-3580 | Compiler-induced timing leak in sp_256_get_entry_256_9 on RISC-V | 2026-03-02T00:00:00.000Z | 2026-03-31T15:13:42.000Z |
| msrc_cve-2026-3579 | Non-constant time multiplication subroutine __muldi3 on RISC-V RV32I | 2026-03-02T00:00:00.000Z | 2026-03-31T15:14:40.000Z |
| msrc_cve-2026-3549 | ECH parsing heap buffer overflow | 2026-03-02T00:00:00.000Z | 2026-03-27T01:42:32.000Z |
| msrc_cve-2026-3548 | Buffer overflow in CRL number parsing in wolfSSL | 2026-03-02T00:00:00.000Z | 2026-03-27T01:42:24.000Z |
| msrc_cve-2026-3547 | wolfSSL: out-of-bounds read (DoS) in ALPN parsing due to incomplete validation | 2026-03-02T00:00:00.000Z | 2026-03-27T01:42:40.000Z |
| msrc_cve-2026-3503 | Fault injection attack with ML-DSA and ML-KEM on ARM | 2026-03-02T00:00:00.000Z | 2026-03-31T15:15:51.000Z |
| msrc_cve-2026-3494 | MariaDB Server Audit Plugin Comment Handling Bypass | 2026-03-02T00:00:00.000Z | 2026-03-14T01:37:11.000Z |
| msrc_cve-2026-3479 | pkgutil.get_data() does not enforce documented restrictions | 2026-03-02T00:00:00.000Z | 2026-03-31T15:08:56.000Z |
| msrc_cve-2026-34714 | CVE-2026-34714 | 2026-03-02T00:00:00.000Z | 2026-04-08T01:37:47.000Z |
| msrc_cve-2026-34353 | CVE-2026-34353 | 2026-03-02T00:00:00.000Z | 2026-04-01T01:57:48.000Z |
| msrc_cve-2026-34085 | CVE-2026-34085 | 2026-03-02T00:00:00.000Z | 2026-03-31T14:51:54.000Z |
| msrc_cve-2026-34073 | cryptography has incomplete DNS name constraint enforcement on peer names | 2026-03-02T00:00:00.000Z | 2026-04-03T01:01:25.000Z |
| msrc_cve-2026-34043 | Serialize JavaScript has CPU Exhaustion Denial of Service via crafted array-like objects | 2026-03-02T00:00:00.000Z | 2026-04-02T01:40:32.000Z |
| msrc_cve-2026-33941 | Handlebars.js has JavaScript Injection in CLI Precompiler via Unescaped Names and Options | 2026-03-02T00:00:00.000Z | 2026-03-31T01:03:08.000Z |
| msrc_cve-2026-33940 | Handlebars.js has JavaScript Injection via AST Type Confusion when passing an object as dynamic partial | 2026-03-02T00:00:00.000Z | 2026-03-31T01:03:30.000Z |
| msrc_cve-2026-33939 | Handlebars.js has Denial of Service via Malformed Decorator Syntax in Template Compilation | 2026-03-02T00:00:00.000Z | 2026-03-31T01:03:19.000Z |
| msrc_cve-2026-33938 | Handlebars.js has JavaScript Injection via AST Type Confusion by tampering @partial-block | 2026-03-02T00:00:00.000Z | 2026-03-31T01:03:02.000Z |
| msrc_cve-2026-33937 | Handlebars.js has JavaScript Injection via AST Type Confusion | 2026-03-02T00:00:00.000Z | 2026-04-01T01:58:16.000Z |
| msrc_cve-2026-33936 | python-ecdsa: Denial of Service via improper DER length validation in crafted private keys | 2026-03-02T00:00:00.000Z | 2026-04-08T01:36:46.000Z |
| msrc_cve-2026-33916 | Handlebars.js has Prototype Pollution Leading to XSS through Partial Template Injection | 2026-03-02T00:00:00.000Z | 2026-03-31T01:03:13.000Z |
| msrc_cve-2026-33896 | Forge has a basicConstraints bypass in its certificate chain verification (RFC 5280 violation) | 2026-03-02T00:00:00.000Z | 2026-04-01T14:37:25.000Z |
| msrc_cve-2026-33895 | Forge has signature forgery in Ed25519 due to missing S > L check | 2026-03-02T00:00:00.000Z | 2026-04-01T14:37:15.000Z |
| msrc_cve-2026-33891 | Forge has Denial of Service via Infinite Loop in BigInteger.modInverse() with Zero Input | 2026-03-02T00:00:00.000Z | 2026-04-01T14:37:20.000Z |
| msrc_cve-2026-3381 | Compress::Raw::Zlib versions through 2.219 for Perl use potentially insecure versions of zlib | 2026-03-02T00:00:00.000Z | 2026-03-26T01:39:38.000Z |
| msrc_cve-2026-33750 | brace-expansion: Zero-step sequence causes process hang and memory exhaustion | 2026-03-02T00:00:00.000Z | 2026-04-02T01:39:52.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0306 | Kwetsbaarheden verholpen in GitLab | 2025-10-13T07:25:32.225768Z | 2025-10-13T07:25:32.225768Z |
| ncsc-2025-0305 | Kwetsbaarheden verholpen in Juniper Networks Junos OS | 2025-10-13T07:17:00.445318Z | 2025-10-13T07:17:00.445318Z |
| ncsc-2025-0304 | Kwetsbaarheden verholpen in Redis | 2025-10-08T11:43:37.331971Z | 2025-10-08T11:43:37.331971Z |
| ncsc-2025-0303 | Kwetsbaarheid verholpen in Oracle E-Business Suite | 2025-10-05T09:07:57.122302Z | 2025-10-08T13:03:30.836713Z |
| ncsc-2025-0302 | Kwetsbaarheid verholpen in IBM InfoSphere | 2025-09-30T08:31:27.582962Z | 2025-09-30T08:31:27.582962Z |
| ncsc-2025-0301 | Kwetsbaarheden verholpen in VMware NSX | 2025-09-30T08:29:24.969885Z | 2025-09-30T08:29:24.969885Z |
| ncsc-2025-0300 | Kwetsbaarheden verholpen in GitLab EE & CE | 2025-09-29T09:40:53.033373Z | 2025-09-29T09:40:53.033373Z |
| ncsc-2025-0299 | Kwetsbaarheden verholpen in Zenitel ICX500 en ICX510 Gateway | 2025-09-26T07:00:18.729367Z | 2025-09-26T07:00:18.729367Z |
| ncsc-2025-0298 | Kwetsbaarheden verholpen in Cisco Secure Firewall ASA en FTD | 2025-09-25T18:17:20.040958Z | 2025-09-25T18:17:20.040958Z |
| ncsc-2025-0297 | Kwetsbaarheden verholpen in Cisco IOS en Cisco IOS XE Software | 2025-09-25T09:20:07.678881Z | 2025-09-25T10:42:19.129323Z |
| ncsc-2025-0296 | Kwetsbaarheid verholpen in WatchGuard Fireware OS | 2025-09-19T13:31:26.392203Z | 2025-10-17T08:19:28.145953Z |
| ncsc-2025-0295 | Kwetsbaarheid verholpen in Fortra's GoAnywhere MFT | 2025-09-19T12:26:42.186246Z | 2025-09-19T12:26:42.186246Z |
| ncsc-2025-0294 | Kwetsbaarheden verholpen in HPE Aruba Networking EdgeConnect SD-WAN Gateways | 2025-09-18T12:02:45.239087Z | 2025-09-18T12:02:45.239087Z |
| ncsc-2025-0293 | Kwetsbaarheden verholpen in Spring Framework | 2025-09-16T13:38:44.960337Z | 2025-09-16T13:38:44.960337Z |
| ncsc-2025-0292 | Kwetsbaarheden verholpen in Ivanti producten | 2025-09-16T12:21:50.959347Z | 2025-09-16T12:21:50.959347Z |
| ncsc-2025-0291 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-09-16T11:17:27.365694Z | 2025-09-16T11:17:27.365694Z |
| ncsc-2025-0290 | Kwetsbaarheden verholpen in Apple macOS | 2025-09-16T11:16:20.572265Z | 2025-09-16T11:16:20.572265Z |
| ncsc-2025-0289 | Kwetsbaarheden verholpen in Omnissa Workspace ONE UEM | 2025-09-12T15:23:20.359090Z | 2025-09-12T15:23:20.359090Z |
| ncsc-2025-0288 | Kwetsbaarheden verholpen in GitLab CE/EE | 2025-09-12T14:49:52.285990Z | 2025-09-12T14:49:52.285990Z |
| ncsc-2025-0287 | Kwetsbaarheden verholpen in Cisco NX-OS Software | 2025-09-11T08:18:37.706725Z | 2025-09-11T08:18:37.706725Z |
| ncsc-2025-0286 | Kwetsbaarheden verholpen in Cisco IOS XR Software | 2025-09-11T08:14:36.960621Z | 2025-09-11T08:14:36.960621Z |
| ncsc-2025-0285 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-09-10T11:01:43.415733Z | 2025-09-10T11:01:43.415733Z |
| ncsc-2025-0284 | Kwetsbaarheid verholpen in Adobe Commerce en Magento | 2025-09-10T10:49:56.787627Z | 2025-09-10T10:49:56.787627Z |
| ncsc-2025-0283 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-09-10T10:46:54.808276Z | 2025-09-10T10:46:54.808276Z |
| ncsc-2025-0282 | Kwetsbaarheid verholpen in Adobe Dreamweaver | 2025-09-10T10:38:24.553749Z | 2025-09-10T10:38:24.553749Z |
| ncsc-2025-0281 | Kwetsbaarheid verholpen in Adobe ColdFusion | 2025-09-10T10:24:09.409410Z | 2025-09-10T10:24:09.409410Z |
| ncsc-2025-0280 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2025-09-09T18:27:39.956624Z | 2025-09-09T18:27:39.956624Z |
| ncsc-2025-0279 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-09-09T18:25:53.539582Z | 2025-09-09T18:25:53.539582Z |
| ncsc-2025-0278 | Kwetsbaarheden verholpen in Microsoft Office | 2025-09-09T18:23:23.763765Z | 2025-09-09T18:23:23.763765Z |
| ncsc-2025-0277 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-09-09T18:22:30.766030Z | 2025-09-09T18:22:30.766030Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20375-1 | Security update for python-PyPDF2 | 2026-03-17T15:19:48Z | 2026-03-17T15:19:48Z |
| opensuse-su-2026:20378-1 | Security update for libpng16 | 2026-03-17T14:49:10Z | 2026-03-17T14:49:10Z |
| opensuse-su-2026:20374-1 | Security update for krb5-appl | 2026-03-17T13:34:53Z | 2026-03-17T13:34:53Z |
| opensuse-su-2026:20373-1 | Security update for python-Django | 2026-03-17T13:27:11Z | 2026-03-17T13:27:11Z |
| opensuse-su-2026:20377-1 | Security update for python-maturin | 2026-03-17T12:51:10Z | 2026-03-17T12:51:10Z |
| opensuse-su-2026:20368-1 | Security update for ocaml | 2026-03-17T10:41:31Z | 2026-03-17T10:41:31Z |
| opensuse-su-2026:20372-1 | Security update for chromium | 2026-03-17T10:11:02Z | 2026-03-17T10:11:02Z |
| opensuse-su-2026:10385-1 | traefik-3.6.10-2.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10384-1 | cargo1.94-1.94.0-2.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10383-1 | cargo1.93-1.93.0-3.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10382-1 | cargo1.92-1.92.0-2.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10381-1 | python311-3.11.15-2.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10380-1 | python311-uv-0.10.11-1.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10379-1 | python311-CairoSVG-2.9.0-1.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10378-1 | ovmf-202602-5.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:20365-1 | Security update for MozillaFirefox | 2026-03-16T16:42:36Z | 2026-03-16T16:42:36Z |
| opensuse-su-2026:20366-1 | Security update for docker-stable | 2026-03-16T15:57:03Z | 2026-03-16T15:57:03Z |
| opensuse-su-2026:20364-1 | Security update for rust-keylime | 2026-03-16T15:31:12Z | 2026-03-16T15:31:12Z |
| opensuse-su-2026:10377-1 | python312-3.12.13-2.1 on GA media | 2026-03-16T00:00:00Z | 2026-03-16T00:00:00Z |
| opensuse-su-2026:10376-1 | chromedriver-146.0.7680.80-1.1 on GA media | 2026-03-16T00:00:00Z | 2026-03-16T00:00:00Z |
| opensuse-su-2026:10375-1 | coturn-4.9.0-1.1 on GA media | 2026-03-15T00:00:00Z | 2026-03-15T00:00:00Z |
| opensuse-su-2026:10374-1 | python311-tornado6-6.5.5-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:10373-1 | python311-simpleeval-1.0.5-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:10372-1 | python311-black-26.3.1-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:10371-1 | curl-8.19.0-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:20357-1 | Security update for qemu | 2026-03-13T10:47:15Z | 2026-03-13T10:47:15Z |
| opensuse-su-2026:20354-1 | Security update for libsoup2 | 2026-03-13T08:41:04Z | 2026-03-13T08:41:04Z |
| opensuse-su-2026:10370-1 | smb4k-4.0.5-1.2 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10369-1 | skaffold-2.18.0-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10368-1 | ruby4.0-rubygem-websocket-extensions-0.1.5-1.24 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:6012 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.14 security update | 2026-03-30T11:00:07+00:00 | 2026-04-08T13:32:23+00:00 |
| rhsa-2026:6036 | Red Hat Security Advisory: kernel-rt security update | 2026-03-30T10:58:10+00:00 | 2026-04-08T19:36:39+00:00 |
| rhsa-2026:6166 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.21.1 | 2026-03-30T10:40:40+00:00 | 2026-04-11T01:58:33+00:00 |
| rhsa-2026:6053 | Red Hat Security Advisory: kernel security update | 2026-03-30T10:03:59+00:00 | 2026-04-08T04:28:16+00:00 |
| rhsa-2026:6055 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.7.1 | 2026-03-30T07:07:31+00:00 | 2026-04-12T20:01:03+00:00 |
| rhsa-2026:5971 | Red Hat Security Advisory: Satellite 6.16.7 Async Update | 2026-03-26T20:30:38+00:00 | 2026-04-10T21:16:52+00:00 |
| rhsa-2026:5970 | Red Hat Security Advisory: Satellite 6.17.7 Async Update | 2026-03-26T20:28:38+00:00 | 2026-04-10T21:16:51+00:00 |
| rhsa-2026:5968 | Red Hat Security Advisory: Satellite 6.18.4 Async Update | 2026-03-26T19:47:53+00:00 | 2026-04-12T20:01:02+00:00 |
| rhsa-2026:5958 | Red Hat Security Advisory: libtiff security update | 2026-03-26T17:50:08+00:00 | 2026-04-09T20:34:29+00:00 |
| rhsa-2026:5952 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.2.3 | 2026-03-26T15:03:15+00:00 | 2026-04-12T20:01:02+00:00 |
| rhsa-2026:5950 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.1.6 | 2026-03-26T14:51:43+00:00 | 2026-04-12T20:01:01+00:00 |
| rhsa-2026:5948 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.0.9 | 2026-03-26T14:31:40+00:00 | 2026-04-12T20:01:01+00:00 |
| rhsa-2026:5944 | Red Hat Security Advisory: golang security update | 2026-03-26T14:09:22+00:00 | 2026-04-10T21:16:50+00:00 |
| rhsa-2026:5942 | Red Hat Security Advisory: golang security update | 2026-03-26T13:53:57+00:00 | 2026-04-10T21:16:49+00:00 |
| rhsa-2026:5943 | Red Hat Security Advisory: golang security update | 2026-03-26T13:47:37+00:00 | 2026-04-10T21:16:49+00:00 |
| rhsa-2026:5941 | Red Hat Security Advisory: golang security update | 2026-03-26T13:40:22+00:00 | 2026-04-10T21:16:49+00:00 |
| rhsa-2026:5939 | Red Hat Security Advisory: freerdp security update | 2026-03-26T12:23:05+00:00 | 2026-04-09T14:38:00+00:00 |
| rhsa-2026:5936 | Red Hat Security Advisory: freerdp security update | 2026-03-26T11:40:05+00:00 | 2026-04-09T14:38:03+00:00 |
| rhsa-2026:5932 | Red Hat Security Advisory: firefox security update | 2026-03-26T11:38:50+00:00 | 2026-04-07T22:30:09+00:00 |
| rhsa-2026:5930 | Red Hat Security Advisory: firefox security update | 2026-03-26T11:37:15+00:00 | 2026-04-07T22:30:09+00:00 |
| rhsa-2026:5931 | Red Hat Security Advisory: firefox security update | 2026-03-26T11:25:15+00:00 | 2026-04-07T22:30:06+00:00 |
| rhsa-2026:5919 | Red Hat Security Advisory: opencryptoki security update | 2026-03-26T11:07:21+00:00 | 2026-03-30T11:10:30+00:00 |
| rhsa-2026:5917 | Red Hat Security Advisory: opencryptoki security update | 2026-03-26T10:21:25+00:00 | 2026-03-30T11:10:28+00:00 |
| rhsa-2026:5913 | Red Hat Security Advisory: ncurses security update | 2026-03-26T09:44:20+00:00 | 2026-04-09T23:07:19+00:00 |
| rhsa-2026:5086 | Red Hat Security Advisory: OpenShift Container Platform 4.14.63 packages and security update | 2026-03-26T07:35:30+00:00 | 2026-04-12T20:00:49+00:00 |
| rhsa-2026:5087 | Red Hat Security Advisory: OpenShift Container Platform 4.14.63 bug fix and security update | 2026-03-26T07:26:50+00:00 | 2026-04-09T14:37:59+00:00 |
| rhsa-2026:5107 | Red Hat Security Advisory: OpenShift Container Platform 4.14.63 bug fix and security update | 2026-03-26T06:43:02+00:00 | 2026-04-12T20:00:49+00:00 |
| rhsa-2026:5108 | Red Hat Security Advisory: OpenShift Container Platform 4.14.63 security and extras update | 2026-03-26T05:55:43+00:00 | 2026-04-10T21:19:48+00:00 |
| rhsa-2026:5853 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-26T01:05:19+00:00 | 2026-04-12T20:01:01+00:00 |
| rhsa-2026:5852 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-26T00:58:34+00:00 | 2026-04-12T20:01:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2021-130-05 | Modicon M241 & M251 Logic Controllers | 2021-05-11T00:00:00.000Z | 2021-05-11T00:00:00.000Z |
| sevd-2021-130-01 | Modicon Managed Switch | 2021-05-11T00:00:00.000Z | 2021-05-11T00:00:00.000Z |
| sevd-2021-103-01 | C-Bus Toolkit and C-Gate Server | 2021-04-13T11:17:13.000Z | 2022-11-08T11:17:13.000Z |
| sevd-2021-068-02 | PowerLogic ION7400 / PM8000 / ION9000 Power Meters | 2021-03-09T00:00:00.000Z | 2021-03-09T00:00:00.000Z |
| sevd-2021-068-01 | IGSS (Interactive Graphical SCADA System) | 2021-03-09T00:00:00.000Z | 2021-03-09T00:00:00.000Z |
| sevd-2021-040-01 | PowerLogic Power Metering Products | 2021-02-08T00:00:00.000Z | 2021-02-08T00:00:00.000Z |
| sevd-2021-012-02 | EcoStruxure Power Build - Rapsody | 2021-01-12T08:32:35.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2020-353-02 | Treck HTTP Server Vulnerability on TM3 Bus Coupler Modules (V2.0) | 2020-12-18T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2020-343-05 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and Associated Communication Modules | 2020-12-08T21:04:43.000Z | 2022-09-13T20:04:43.000Z |
| sevd-2020-343-06 | Web Server on Modicon M340, Legacy Offers Modicon Quantum Modicon Premium and associated Communication Modules | 2020-12-08T09:08:01.000Z | 2020-12-08T09:08:01.000Z |
| sevd-2020-343-07 | SNMP Service on Modicon M340 and Associated Communication Modules | 2020-12-08T05:49:51.000Z | 2022-09-13T05:49:51.000Z |
| sevd-2020-343-09 | Modicon M258 Logic Controllers and SoMachine/ SoMachine Motion Software | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-343-08 | Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-343-04 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules | 2020-12-08T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2020-343-03 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (V2.0) | 2020-12-08T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2020-343-02 | EcoStruxure Geo SCADA Expert | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-343-01 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and RemoteConnect™ | 2020-12-08T00:00:00.000Z | 2021-07-13T00:00:00.000Z |
| sevd-2020-315-07 | PLC Simulator on EcoStruxure™ Control Expert and Process Expert | 2020-11-10T15:07:11.000Z | 2023-03-14T15:07:11.000Z |
| sevd-2020-315-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-11-10T12:05:04.000Z | 2023-02-14T12:05:00.000Z |
| sevd-2020-315-06 | Easergy T300 | 2020-11-10T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-315-05 | Modicon M100/M200/M221 Programmable Logic Controller | 2020-11-10T00:00:00.000Z | 2021-01-12T00:00:00.000Z |
| sevd-2020-315-04 | EcoStruxure Building Operation (EBO) | 2020-11-10T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| sevd-2020-315-03 | Interactive Graphical SCADA System (IGSS) | 2020-11-10T00:00:00.000Z | 2021-04-15T00:00:00.000Z |
| sevd-2020-315-02 | EcoStruxure™ Operator Terminal Expert (Vijeo XD), Pro-face BLUE and WinGP runtime | 2020-11-09T00:00:00.000Z | 2021-01-11T00:00:00.000Z |
| sevd-2020-287-04 | EcoStruxure™ and SmartStruxure™ Power Monitoring and SCADA Software | 2020-10-13T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-287-03 | Smartlink, PowerTag, and Wiser Series Gateways | 2020-10-13T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-287-02 | Wibu-Systems CodeMeter Vulnerabilities | 2020-10-13T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-287-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-10-13T00:00:00.000Z | 2025-06-10T04:00:00.000Z |
| sevd-2020-252-01 | SCADAPack x70 Remote Connect and SCADAPack x70 Security Administrator | 2020-09-08T00:00:00.000Z | 2021-02-09T00:00:00.000Z |
| sevd-2020-224-08 | Schneider Electric PACTware | 2020-08-11T00:00:00.000Z | 2020-08-13T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-423808 | SSA-423808: Multiple NULL Pointer Dereference Vulnerabilities in Industrial Products | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-417159 | SSA-417159: Multiple Vulnerabilities in SINEMA Remote Connect Client Before V3.2 SP2 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-359713 | SSA-359713: Authorization Bypass Vulnerability in Industrial Edge Management | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-342438 | SSA-342438: Privilege Escalation Vulnerability in SINUMERIK ONE, SINUMERIK 840D and SINUMERIK 828D | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-103653 | SSA-103653: Denial-of-Service Vulnerability in Automation License Manager | 2024-09-10T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-097786 | SSA-097786: Insertion of Sensitive Information into Log File Vulnerability in SINUMERIK systems | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-097435 | SSA-097435: Usernames Disclosure Vulnerability in Mendix Runtime | 2024-09-10T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-039007 | SSA-039007: Heap-based Buffer Overflow Vulnerability in User Management Component (UMC) | 2024-09-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-921449 | SSA-921449: Plaintext Storage of a Password Vulnerability in LOGO! V8.3 BM Devices | 2024-08-13T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-856475 | SSA-856475: X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-784301 | SSA-784301: Multiple Vulnerabilities in SINEC NMS Before V3.0 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-720392 | SSA-720392: Multiple Vulnerabilities in Third-Party Components in Location Intelligence Before V4.4 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-716317 | SSA-716317: Multiple Vulnerability in SINEC Traffic Analyzer Before V2.0 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-659443 | SSA-659443: Local Code Execution Vulnerabilities in COMOS Before V10.5 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-417547 | SSA-417547: Multiple Vulnerabilities in INTRALOG WMS Before V4 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-357412 | SSA-357412: PRT File Parsing Vulnerability in NX Before V2406.3000 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-087301 | SSA-087301: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.1 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-857368 | SSA-857368: Multiple Vulnerabilities in Omnivise T3000 | 2024-08-02T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-071402 | SSA-071402: Multiple Vulnerabilities in SICAM Products | 2024-07-22T00:00:00Z | 2024-07-22T00:00:00Z |
| ssa-998949 | SSA-998949: Hard-coded Default Encryption Key in Mendix Encryption Module V10.0.0 and V10.0.1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-928781 | SSA-928781: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 HF1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-883918 | SSA-883918: Information Disclosure Vulnerability in SIMATIC WinCC | 2024-07-09T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-868282 | SSA-868282: Multiple Vulnerabilities in SINEMA Remote Connect Client before V3.2 HF1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-825651 | SSA-825651: Deserialization Vulnerability in SIMATIC STEP 7 (TIA Portal) before V18 Update 2 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-824889 | SSA-824889: XML File Parsing Vulnerabilities in JT Open and PLM XML SDK | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-779936 | SSA-779936: Catalog-Profile Deserialization Vulnerability in Siemens Engineering Platforms before V19 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-750499 | SSA-750499: Weak Encryption Vulnerability in SIPROTEC 5 Devices | 2024-07-09T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-723487 | SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products | 2024-07-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-722010 | SSA-722010: Datalogics File Parsing Vulnerability in Teamcenter Visualization and JT2Go | 2024-07-09T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-698820 | SSA-698820: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.4 on RUGGEDCOM APE1808 Devices | 2024-07-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20835-1 | Security update for python-pyasn1 | 2026-03-25T03:09:46Z | 2026-03-25T03:09:46Z |
| suse-su-2026:20942-1 | Security update for the initial kernel livepatch | 2026-03-24T20:36:24Z | 2026-03-24T20:36:24Z |
| suse-su-2026:20834-1 | Security update for the initial kernel livepatch | 2026-03-24T20:36:24Z | 2026-03-24T20:36:24Z |
| suse-su-2026:20928-1 | Security update for python-black | 2026-03-24T19:40:56Z | 2026-03-24T19:40:56Z |
| suse-su-2026:20927-1 | Security update for 389-ds | 2026-03-24T17:50:31Z | 2026-03-24T17:50:31Z |
| suse-su-2026:20889-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:44Z | 2026-03-24T16:49:44Z |
| suse-su-2026:20888-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:44Z | 2026-03-24T16:49:44Z |
| suse-su-2026:20866-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:44Z | 2026-03-24T16:49:44Z |
| suse-su-2026:20865-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:44Z | 2026-03-24T16:49:44Z |
| suse-su-2026:20887-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:34Z | 2026-03-24T16:49:34Z |
| suse-su-2026:20886-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:34Z | 2026-03-24T16:49:34Z |
| suse-su-2026:20864-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:34Z | 2026-03-24T16:49:34Z |
| suse-su-2026:20863-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:34Z | 2026-03-24T16:49:34Z |
| suse-su-2026:20885-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:25Z | 2026-03-24T16:49:25Z |
| suse-su-2026:20884-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:25Z | 2026-03-24T16:49:25Z |
| suse-su-2026:20862-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:25Z | 2026-03-24T16:49:25Z |
| suse-su-2026:20861-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:25Z | 2026-03-24T16:49:25Z |
| suse-su-2026:20883-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:13Z | 2026-03-24T16:49:13Z |
| suse-su-2026:20882-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:13Z | 2026-03-24T16:49:13Z |
| suse-su-2026:20860-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:13Z | 2026-03-24T16:49:13Z |
| suse-su-2026:20859-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:13Z | 2026-03-24T16:49:13Z |
| suse-su-2026:20881-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:03Z | 2026-03-24T16:49:03Z |
| suse-su-2026:20880-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:03Z | 2026-03-24T16:49:03Z |
| suse-su-2026:20858-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:03Z | 2026-03-24T16:49:03Z |
| suse-su-2026:20857-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:03Z | 2026-03-24T16:49:03Z |
| suse-su-2026:20900-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:56Z | 2026-03-24T16:48:56Z |
| suse-su-2026:20899-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:56Z | 2026-03-24T16:48:56Z |
| suse-su-2026:20856-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:56Z | 2026-03-24T16:48:56Z |
| suse-su-2026:20855-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:56Z | 2026-03-24T16:48:56Z |
| suse-su-2026:20898-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:44Z | 2026-03-24T16:48:44Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:2212 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-12T10:34:27Z |
| alsa-2026:2182 | Important: libsoup3 security update | 2026-02-05T00:00:00Z | 2026-02-06T17:31:52Z |
| alsa-2026:2128 | Moderate: python3 security update | 2026-02-05T00:00:00Z | 2026-02-06T08:39:22Z |
| alsa-2026:2124 | Important: osbuild-composer security update | 2026-02-05T00:00:00Z | 2026-02-09T11:33:23Z |
| alsa-2026:2090 | Important: python3.12-wheel security update | 2026-02-05T00:00:00Z | 2026-02-06T08:49:17Z |
| alsa-2026:2081 | Important: freerdp security update | 2026-02-05T00:00:00Z | 2026-02-06T08:53:33Z |
| alsa-2026:2048 | Important: freerdp security update | 2026-02-05T00:00:00Z | 2026-02-10T07:49:11Z |
| alsa-2026:2042 | Important: brotli security update | 2026-02-05T00:00:00Z | 2026-02-05T12:08:23Z |
| alsa-2026:2039 | Important: fontforge security update | 2026-02-05T00:00:00Z | 2026-02-06T21:29:46Z |
| alsa-2026:1939 | Important: python3.12-wheel security update | 2026-02-04T00:00:00Z | 2026-02-10T07:52:01Z |
| alsa-2026:1913 | Moderate: util-linux security update | 2026-02-04T00:00:00Z | 2026-02-10T07:54:49Z |
| alsa-2026:1908 | Important: opentelemetry-collector security update | 2026-02-04T00:00:00Z | 2026-02-10T07:56:31Z |
| alsa-2026:1907 | Important: opentelemetry-collector security update | 2026-02-04T00:00:00Z | 2026-02-10T07:58:47Z |
| alsa-2026:1906 | Important: fence-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:07:49Z |
| alsa-2026:1905 | Important: fence-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:20:49Z |
| alsa-2026:1904 | Important: resource-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:22:54Z |
| alsa-2026:1903 | Important: fence-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:31:08Z |
| alsa-2026:1902 | Important: python-wheel security update | 2026-02-04T00:00:00Z | 2026-02-05T09:52:44Z |
| alsa-2026:1852 | Moderate: util-linux security update | 2026-02-03T00:00:00Z | 2026-02-10T08:33:43Z |
| alsa-2026:1843 | Important: nodejs22 security update | 2026-02-03T00:00:00Z | 2026-02-06T17:27:45Z |
| alsa-2026:1842 | Important: nodejs24 security update | 2026-02-03T00:00:00Z | 2026-02-06T17:30:17Z |
| alsa-2026:1837 | Moderate: osbuild-composer security update | 2026-02-03T00:00:00Z | 2026-02-06T17:33:01Z |
| alsa-2026:1831 | Moderate: qemu-kvm security update | 2026-02-03T00:00:00Z | 2026-02-06T17:34:44Z |
| alsa-2026:1828 | Moderate: python3.12 security update | 2026-02-03T00:00:00Z | 2026-02-05T09:48:47Z |
| alsa-2026:1825 | Moderate: curl security update | 2026-02-03T00:00:00Z | 2026-02-05T09:50:43Z |
| alsa-2026:1715 | Important: golang-github-openprinting-ipp-usb security update | 2026-02-02T00:00:00Z | 2026-02-03T11:03:28Z |
| alsa-2026:1714 | Moderate: wireshark security update | 2026-02-02T00:00:00Z | 2026-02-03T11:02:21Z |
| alsa-2026:1696 | Moderate: util-linux security update | 2026-02-02T00:00:00Z | 2026-02-03T11:05:12Z |
| alsa-2026:1690 | Important: kernel security update | 2026-02-02T00:00:00Z | 2026-02-05T09:56:48Z |
| alsa-2026:1662 | Moderate: kernel security update | 2026-02-02T00:00:00Z | 2026-02-02T13:45:57Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-312 | Heap-buffer-overflow in ZSTD_decompressMultiFrame | 2025-05-02T00:14:14.459388Z | 2026-03-27T14:26:26.446866Z |
| osv-2025-300 | Negative-size-param in recurse_update_offsets | 2025-04-26T00:15:04.274172Z | 2025-04-26T00:15:04.274471Z |
| osv-2025-298 | Heap-buffer-overflow in i18n::phonenumbers::UnicodeText::const_iterator::operator-- | 2025-04-26T00:02:46.771719Z | 2025-10-11T14:20:31.062038Z |
| osv-2025-291 | Use-of-uninitialized-value in Poco::Net::NTLMCredentials::parseChallengeMessage | 2025-04-20T00:07:34.286645Z | 2025-04-20T00:07:34.287298Z |
| osv-2025-290 | Heap-buffer-overflow in pcpp::TelnetLayer::toString | 2025-04-19T00:05:45.140280Z | 2025-09-25T14:31:44.695948Z |
| osv-2025-289 | Stack-buffer-overflow in ot::Cli::Utils::OutputLine | 2025-04-19T00:05:17.593162Z | 2025-04-19T00:05:17.593788Z |
| osv-2025-280 | Heap-buffer-overflow in Assimp::SceneCombiner::CopyScene | 2025-04-15T00:04:03.423453Z | 2026-01-25T14:19:05.873424Z |
| osv-2025-275 | UNKNOWN READ in void std::__1::vector<unsigned char, std::__1::allocator<unsigned char>>::__cons | 2025-04-14T00:02:37.519708Z | 2025-04-17T14:43:50.559313Z |
| osv-2025-271 | Use-of-uninitialized-value in luaS_new | 2025-04-11T00:04:20.869490Z | 2025-04-11T00:04:20.869967Z |
| osv-2025-267 | Stack-buffer-overflow in snap_usedef | 2025-04-08T00:17:16.034122Z | 2025-07-23T14:22:40.655455Z |
| osv-2025-266 | Heap-buffer-overflow in lj_buf_ruleb128 | 2025-04-08T00:17:06.279554Z | 2026-03-05T14:36:27.176471Z |
| osv-2025-264 | Security exception in org.joni.Parser.parseCharClass | 2025-04-08T00:00:08.174777Z | 2025-04-08T00:00:08.175341Z |
| osv-2025-262 | UNKNOWN WRITE in _lou_handlePassVariableAction | 2025-04-07T00:02:21.621602Z | 2025-09-25T14:33:42.888095Z |
| osv-2025-260 | Heap-buffer-overflow in bfd_getb16 | 2025-04-06T00:00:51.202273Z | 2025-04-06T00:00:51.202704Z |
| osv-2025-258 | Global-buffer-overflow in parseExtraField | 2025-04-05T00:05:58.760780Z | 2025-04-05T00:05:58.761154Z |
| osv-2025-256 | Global-buffer-overflow in QByteArray::QByteArray | 2025-04-05T00:02:36.742745Z | 2025-04-05T00:02:36.743233Z |
| osv-2025-253 | Security exception in org.apache.lucene.analysis.ckb.SoraniNormalizer.normalize | 2025-04-03T00:17:24.000398Z | 2026-02-26T15:05:21.477837Z |
| osv-2025-251 | Heap-buffer-overflow in icu_78::RegexMatcher::MatchChunkAt | 2025-04-02T00:16:00.337471Z | 2025-04-02T00:16:00.337850Z |
| osv-2025-249 | Heap-use-after-free in lj_strfmt_pushvf | 2025-04-02T00:09:53.120387Z | 2025-07-23T14:23:01.826780Z |
| osv-2025-248 | Heap-buffer-overflow in cli_bm_addpatt | 2025-04-02T00:00:13.427589Z | 2025-04-02T00:00:13.428120Z |
| osv-2025-240 | Security exception in com.powsybl.commons.xml.XmlUtil.lambda$skipSubElements$0 | 2025-03-28T00:05:50.145107Z | 2025-03-30T14:32:19.516483Z |
| osv-2025-230 | Heap-buffer-overflow in wasm_loader_prepare_bytecode | 2025-03-22T00:05:22.916187Z | 2025-03-22T00:05:22.916485Z |
| osv-2025-226 | UNKNOWN READ in extract_sess_version | 2025-03-21T00:19:10.852617Z | 2025-03-21T00:19:10.852969Z |
| osv-2025-219 | Heap-buffer-overflow in opj_j2k_read_tile_header | 2025-03-18T00:18:30.566980Z | 2026-02-11T14:21:43.026699Z |
| osv-2025-215 | Security exception in graphql.parser.GraphqlAntlrToLanguage.createType | 2025-03-18T00:09:36.655072Z | 2025-03-18T00:09:36.655425Z |
| osv-2025-207 | Security exception in org.apache.lucene.analysis.tokenattributes.CharTermAttributeImpl.clone | 2025-03-16T00:02:33.765869Z | 2025-06-20T17:14:14.229009Z |
| osv-2025-202 | UNKNOWN READ in _blit_xrgb32_lerp_spans | 2025-03-15T00:01:51.127135Z | 2026-03-18T14:26:56.370221Z |
| osv-2025-190 | Heap-buffer-overflow in std::__1::__function::__func<cv::PngDecoder::compose_frame | 2025-03-11T00:04:32.361664Z | 2025-03-11T00:04:32.362119Z |
| osv-2025-178 | Heap-buffer-overflow in usm_set_user_password | 2025-02-28T00:16:54.655227Z | 2025-02-28T00:16:54.655745Z |
| osv-2025-177 | Segv on unknown address in chunk_free_object | 2025-02-28T00:16:24.018716Z | 2025-02-28T00:16:24.019131Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0036 | surf is unmaintained | 2025-05-17T12:00:00Z | 2025-05-17T13:43:35Z |
| rustsec-2025-0113 | soundness issue and unmaintained | 2025-05-06T12:00:00Z | 2025-11-04T06:10:22Z |
| rustsec-2025-0064 | soundness issue and unmaintained | 2025-05-06T12:00:00Z | 2025-09-11T07:03:09Z |
| rustsec-2025-0039 | Lack of sufficient checks in public API | 2025-05-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0034 | soundness issue and unmaintained | 2025-05-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0027 | Panic in mp3-metadata due to the lack of bounds checking | 2025-04-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0025 | rustc-serialize is unmaintained | 2025-04-28T12:00:00Z | 2025-04-28T13:38:14Z |
| rustsec-2025-0063 | Possible unsound public API | 2025-04-25T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0038 | Out of bounds access in public safe API | 2025-04-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0031 | Unsound public API in unmaintained crate | 2025-04-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0035 | Multiple soundness issues in `macroquad` | 2025-04-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0024 | crossbeam-channel: double free on Drop | 2025-04-08T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0023 | Broadcast channel calls clone in parallel, but does not require `Sync` | 2025-04-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0022 | Use-After-Free in `Md::fetch` and `Cipher::fetch` | 2025-04-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0021 | SHA-1 collision attacks are not detected | 2025-04-03T12:00:00Z | 2025-04-08T07:10:04Z |
| rustsec-2025-0020 | Risk of buffer overflow in `PyString::from_object` | 2025-04-01T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0033 | Public API without sufficient bounds checking | 2025-03-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0032 | Safe API can cause heap-buffer-overflow | 2025-03-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0019 | `array-init-cursor` in version 0.2.0 and below is unsound when used with types that implement `Drop` | 2025-03-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0018 | Potential out-of-bounds read with a malformed ELF file and the HashTable API. | 2025-03-26T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0017 | The `trust-dns` project has been rebranded to `hickory-dns` | 2025-03-23T12:00:00Z | 2025-03-23T07:00:21Z |
| rustsec-2025-0016 | Use after free in `Parc` and `Prc` due to missing lifetime constraints | 2025-03-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0149 | World Writable Directory in /var/log/below Allows Local Privilege Escalation | 2025-03-12T12:00:00Z | 2026-02-08T07:26:28Z |
| rustsec-2025-0156 | `tree-sitter-pkl` was removed from crates.io for malicious code | 2025-03-10T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0014 | humantime is unmaintained | 2025-03-08T12:00:00Z | 2025-03-13T00:41:50Z |
| rustsec-2025-0009 | Some AES functions may panic when overflow checking is enabled. | 2025-03-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0010 | Versions of *ring* prior to 0.17 are unmaintained. | 2025-03-05T12:00:00Z | 2025-03-07T15:46:47Z |
| rustsec-2025-0012 | `backoff` is unmaintained. | 2025-03-04T12:00:00Z | 2025-08-06T09:33:04Z |
| rustsec-2025-0011 | `openpgp-card-sequoia` is unmaintained. | 2025-03-04T12:00:00Z | 2025-03-07T15:47:21Z |
| rustsec-2025-0008 | Openh264 Decoding Functions Heap Overflow Vulnerability | 2025-02-24T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2025-13929 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-13T09:31:23.093Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-13690 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-13T09:31:10.589Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-12704 | Missing Authorization in GitLab | 2026-03-13T09:30:55.187Z | 2026-03-18T09:23:06.258Z |
| bit-gitlab-2025-12697 | Improper Encoding or Escaping of Output in GitLab | 2026-03-13T09:30:53.383Z | 2026-03-18T09:23:06.258Z |
| bit-gitlab-2025-12576 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-13T09:30:49.795Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-12555 | Incorrect Authorization in GitLab | 2026-03-13T09:30:40.688Z | 2026-03-13T09:37:20.375Z |
| bit-wordpress-2026-3906 | WordPress 6.9 - 6.9.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Note Creation via REST API | 2026-03-13T09:17:59.157Z | 2026-03-13T09:37:20.375Z |
| bit-consul-2026-2808 | Consul vulnerable to arbitrary file reads through the vault kubernetes authentication provider | 2026-03-13T09:02:37.072Z | 2026-03-13T09:37:20.375Z |
| bit-parse-2026-31828 | Parse Server has an LDAP injection via unsanitized user input in DN and group filter construction | 2026-03-12T14:48:18.251Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-31800 | Parse Server: Classes `_GraphQLConfig` and `_Audience` master key bypass via generic class routes | 2026-03-12T14:48:16.613Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30972 | Parse Server has a rate limit bypass via batch request endpoint | 2026-03-12T14:48:14.900Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30967 | Parse Server OAuth2 authentication adapter account takeover via identity spoofing | 2026-03-12T14:48:13.390Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30966 | Parse Server role escalation and CLP bypass via direct `_Join` table write | 2026-03-12T14:48:11.522Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30965 | Parse Server session token exfiltration via `redirectClassNameForKey` query parameter | 2026-03-12T14:48:09.696Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30962 | Parse Server has a protected fields bypass via logical query operators | 2026-03-12T14:48:07.977Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30949 | Parse Server is missing audience validation in Keycloak authentication adapter | 2026-03-12T14:48:06.075Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30948 | Parse Server has stored cross-site scripting (XSS) via SVG file upload | 2026-03-12T14:48:04.274Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30947 | Parse Server ha a bypass of class-level permissions in LiveQuery | 2026-03-12T14:48:02.496Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30946 | Parse Server affected by denial-of-service via unbounded query complexity in REST and GraphQL API | 2026-03-12T14:48:00.783Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30941 | Parse Server has a NoSQL injection via token type in password reset and email verification endpoints | 2026-03-12T14:47:58.977Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30939 | Parse Server has Denial of Service (DoS) and Cloud Function Dispatch Bypass via Prototype Chain Resolution | 2026-03-12T14:47:57.281Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30938 | Parse Server has denylist `requestKeywordDenylist` keyword scan bypass through nested object placement | 2026-03-12T14:47:55.401Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30925 | Parse Server affected by Regular Expression Denial of Service (ReDoS) via `$regex` query in LiveQuery | 2026-03-12T14:47:53.415Z | 2026-03-20T09:47:33.381Z |
| bit-envoy-2026-26330 | Envoy global rate limit may crash when the response phase limit is enabled and the response phase request is failed directly | 2026-03-12T08:39:47.564Z | 2026-03-12T09:10:07.191Z |
| bit-envoy-2026-26311 | Envoy HTTP: filter chain execution on reset streams causing UAF crash | 2026-03-12T08:39:46.109Z | 2026-03-12T09:10:07.191Z |
| bit-envoy-2026-26310 | Crash for scoped ip address in Envoy during DNS | 2026-03-12T08:39:44.551Z | 2026-03-12T09:10:07.191Z |
| bit-envoy-2026-26309 | Envoy has an off-by-one write in JsonEscaper::escapeString() | 2026-03-12T08:39:42.871Z | 2026-03-12T09:10:07.191Z |
| bit-envoy-2026-26308 | Envoy has an RBAC Header Validation Bypass via Multi-Value Header Concatenation | 2026-03-12T08:39:41.078Z | 2026-03-12T09:10:07.191Z |
| bit-appsmith-2026-30862 | Critical Stored XSS & Privilege Escalation in Appsmith | 2026-03-12T08:36:03.908Z | 2026-03-12T09:10:07.191Z |
| bit-parse-2026-30863 | Parse Server: JWT audience validation bypass in Google, Apple, and Facebook authentication adapters | 2026-03-11T15:49:05.551Z | 2026-03-11T18:56:50.865Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-dc73689 | Security fixes for CVE-2025-11143, CVE-2025-67735, CVE-2025-68161, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.48.0-r1 | 2026-04-01T09:29:13.129218Z | 2026-03-23T08:05:00Z |
| cleanstart-2026-gy92571 | Security fixes for ghsa-22h5-pq3x-2gf2, ghsa-33mh-2634-fwr2, ghsa-4cx2-fc23-5wg6, ghsa-6xw4-3v39-52mm, ghsa-72hv-8253-57qq, ghsa-72qj-48g4-5xgx, ghsa-c2f4-jgmc-q2r5, ghsa-gh9q-2xrm-x6qv, ghsa-j4pr-3wm6-xx2r, ghsa-mhwm-jh88-3gjf, ghsa-mr3q-g2mv-mr4q, ghsa-p543-xpfm-54cp, ghsa-vc5p-v9hr-52mj, ghsa-vqg5-3255-v292, ghsa-w9pc-fmgc-vxvw, ghsa-wpv5-97wm-hp9c applied in versions: 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-04-01T09:28:54.070298Z | 2026-03-23T10:27:15Z |
| cleanstart-2026-gm79879 | Security fixes for CVE-2025-11143, CVE-2025-68161, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.49.1-r0 | 2026-04-01T09:28:51.825289Z | 2026-03-23T08:12:03Z |
| cleanstart-2026-ez47382 | Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2025-66564, CVE-2026-22703, CVE-2026-22772, CVE-2026-23831, CVE-2026-23991, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2x5j-vhc8-9cwm, ghsa-59jp-pj84-45mr, ghsa-6m8w-jc87-6cr7, ghsa-jqc5-w2xx-5vq4, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-vvgc-356p-c3xw applied in versions: 1.14.4-r1, 1.14.4-r2, 1.16.3-r3, 1.16.3-r4 | 2026-04-01T09:28:49.379705Z | 2026-03-23T08:59:19Z |
| cleanstart-2026-ds86833 | Security fixes for CVE-2025-11143, CVE-2026-1605, ghsa-72hv-8253-57qq, ghsa-cphf-4846-3xx9 applied in versions: 0.50.0-r0, 0.50.1-r0 | 2026-04-01T09:28:26.952828Z | 2026-03-23T08:16:08Z |
| cleanstart-2026-nn77774 | Security fixes for CVE-2026-33186, ghsa-p77j-4mvh-x3m3 applied in versions: 2.4.0-r0 | 2026-04-01T09:28:03.910369Z | 2026-03-23T12:37:31Z |
| cleanstart-2026-cu52059 | Security fixes for CVE-2025-61728, CVE-2025-61730, CVE-2026-24051, CVE-2026-27139, CVE-2026-27142, ghsa-9h8m-3fm2-qjrq applied in versions: 3.3.0-r7, 3.5.0-r0 | 2026-04-01T09:27:57.960712Z | 2026-03-23T14:23:15Z |
| cleanstart-2026-am88528 | Security fixes for CVE-2025-15558, CVE-2025-61729, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-fv92-fjc5-jj9h, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3 applied in versions: 3.6.16-r0, 3.6.18-r0, 3.6.19-r0, 3.6.19-r1, 3.6.19-r2, 3.6.19-r3, 3.7.4-r0 | 2026-04-01T09:27:52.956018Z | 2026-03-23T14:25:49Z |
| cleanstart-2026-mz18595 | Security fixes for CVE-2025-61730, CVE-2025-61732, CVE-2026-27139, CVE-2026-27142 applied in versions: 3.4.0-r7 | 2026-04-01T09:27:48.953742Z | 2026-03-23T14:24:01Z |
| cleanstart-2026-hk06185 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-47914, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p84v-gxvw-73pf applied in versions: 3.7.0-r0, 3.7.3-r0, 3.7.4-r0, 3.7.6-r0, 3.7.9-r0, 3.7.9-r1, 3.7.9-r2, 4.0.2-r0 | 2026-04-01T09:27:48.241920Z | 2026-03-24T04:58:10Z |
| cleanstart-2026-ka15295 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.7.0-r0, 3.7.0.-r1 | 2026-04-01T09:27:33.488765Z | 2026-03-23T14:26:32Z |
| cleanstart-2026-ci66802 | Security fixes for CVE-2015-2104, CVE-2020-8908, CVE-2021-21295, CVE-2021-21409, CVE-2021-37136, CVE-2022-1471, CVE-2022-41881, CVE-2023-27043, CVE-2023-2976, CVE-2023-34462, CVE-2023-6378, CVE-2024-12254, CVE-2024-12718, CVE-2024-12798, CVE-2024-12801, CVE-2024-27137, CVE-2024-6232, CVE-2024-6923, CVE-2024-9287, CVE-2025-0938, CVE-2025-23015, CVE-2025-4138, CVE-2025-4330, CVE-2025-4516, CVE-2025-4517, CVE-2026-1225, ghsa-25qh-j22f-pwp8, ghsa-3mc7-4q67-w48m, ghsa-5mg8-w23w-74h3, ghsa-6v67-2wr5-gvf4, ghsa-72hv-8253-57qq, ghsa-7g45-4rm6-3mm3, ghsa-98wm-3w3q-mw94, ghsa-9w3m-gqgf-c4p9, ghsa-c4r9-r8fh-9vj2, ghsa-hhhw-99gj-p3c3, ghsa-mjmj-j48q-9wg2, ghsa-pr98-23f8-jwxv, ghsa-qqpg-mvqg-649v, ghsa-vmq6-5m68-f53m, ghsa-w37g-rhq8-7m4j applied in versions: 4.0.17-r1, 4.0.19-r2, 4.0.19-r3, 4.1.9-r0 | 2026-04-01T09:27:07.387904Z | 2026-03-24T10:05:19Z |
| cleanstart-2026-id24148 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-33186 applied in versions: 0.28.7-r1, 0.29.0-r0, 0.30.0-r0 | 2026-04-01T09:27:05.843609Z | 2026-03-24T04:58:10Z |
| cleanstart-2026-db61851 | Security fixes for CVE-2024-10005, CVE-2024-10006, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24051, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.8.11-r0, 1.8.11-r1, 1.8.11-r2, 1.8.11-r3, 1.9.4-r0 | 2026-04-01T09:26:58.691080Z | 2026-03-24T08:56:04Z |
| cleanstart-2026-km27583 | Security fixes for CVE-2015-2104, CVE-2023-27043, CVE-2024-12254, CVE-2024-12718, CVE-2024-12798, CVE-2024-12801, CVE-2024-27137, CVE-2024-6232, CVE-2024-6923, CVE-2024-9287, CVE-2025-0938, CVE-2025-23015, CVE-2025-4138, CVE-2025-4330, CVE-2025-4516, CVE-2025-4517, CVE-2025-58057, CVE-2026-1225, ghsa-25qh-j22f-pwp8, ghsa-3p8m-j85q-pgmj, ghsa-5mg8-w23w-74h3, ghsa-6v67-2wr5-gvf4, ghsa-72hv-8253-57qq, ghsa-7g45-4rm6-3mm3, ghsa-pr98-23f8-jwxv, ghsa-qqpg-mvqg-649v applied in versions: 4.0.17-r1, 4.1.9-r0, 5.0.6-r1, 5.0.6-r2 | 2026-04-01T09:26:50.907320Z | 2026-03-24T09:56:29Z |
| cleanstart-2026-jj09127 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-33186 applied in versions: 0.28.7-r1, 0.29.0-r0, 0.30.0-r0 | 2026-04-01T09:26:20.691727Z | 2026-03-24T04:58:10Z |
| cleanstart-2026-cp95927 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 1.28.1-r0, 1.28.1-r1 | 2026-04-01T09:25:12.106009Z | 2026-03-24T12:00:17Z |
| cleanstart-2026-pz85180 | Security fixes for CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, ghsa-9h8m-3fm2-qjrq, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x applied in versions: 3.7.8-r2, 3.7.8-r3 | 2026-04-01T09:25:09.013456Z | 2026-03-24T12:47:42Z |
| cleanstart-2026-ni04192 | Security fixes for CVE-2025-61729, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-fv92-fjc5-jj9h, ghsa-p77j-4mvh-x3m3 applied in versions: 3.6.16-r0, 3.6.18-r0, 3.6.18-r1, 3.6.18-r2, 3.7.4-r0 | 2026-04-01T09:24:43.327769Z | 2026-03-24T12:54:01Z |
| cleanstart-2026-mk10646 | Security fixes for CVE-2025-61729, CVE-2026-25679, CVE-2026-25934, CVE-2026-27139, CVE-2026-27142, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-9h8m-3fm2-qjrq, ghsa-fv92-fjc5-jj9h, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x applied in versions: 3.6.16-r0, 3.7.4-r0, 3.7.9-r0, 3.7.9-r1 | 2026-04-01T09:24:40.606937Z | 2026-03-24T12:53:01Z |
| cleanstart-2026-ot07577 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2026-1229 applied in versions: 3.19.0-r0, 4.0.1-r0, 4.1.0-r0 | 2026-04-01T09:24:34.526263Z | 2026-03-24T13:01:13Z |
| cleanstart-2026-cv29689 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2025-62820, CVE-2026-25793, CVE-2026-30836 applied in versions: 0.10.2-r0, 0.9.10-r0, 0.9.9-r0, 0.9.9-r1 | 2026-04-01T09:24:13.195625Z | 2026-03-24T13:01:13Z |
| cleanstart-2026-mf20926 | Security fixes for CVE-2021-38561, CVE-2022-27191, CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-58190, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 3.1.2-r3, 3.1.2-r4, 3.7.0-r0, 3.7.0-r2 | 2026-04-01T09:24:07.163057Z | 2026-03-24T13:01:13Z |
| cleanstart-2026-pv98664 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-m6hq-p25p-ffr2, ghsa-p77j-4mvh-x3m3, ghsa-pwhc-rpq9-4c8w applied in versions: 0.6.4-r5, 0.6.4-r6, 0.7.0-r4 | 2026-04-01T09:23:47.321714Z | 2026-03-25T04:34:22Z |
| cleanstart-2026-ol17158 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-m6hq-p25p-ffr2, ghsa-p77j-4mvh-x3m3, ghsa-pwhc-rpq9-4c8w applied in versions: 0.7.0-r2, 0.7.0-r3, 0.7.0-r4 | 2026-04-01T09:23:46.993269Z | 2026-03-25T04:38:39Z |
| cleanstart-2026-zw86166 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-p77j-4mvh-x3m3 applied in versions: 0.8.10-r0, 0.8.4-r0 | 2026-04-01T09:22:53.735679Z | 2026-03-25T04:41:41Z |
| cleanstart-2026-pw57640 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, CVE-2026-4427, ghsa-37cx-329c-33x3, ghsa-6g7g-w4f8-9c9x, ghsa-9h8m-3fm2-qjrq, ghsa-9mj6-hxhv-w67j, ghsa-cfpf-hrx2-8rv6, ghsa-f6x5-jh6r-wrfv, ghsa-fw7p-63qq-7hpr, ghsa-j5w8-q4qc-rx2x, ghsa-jqcq-xjh3-6g23, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x, ghsa-x6gf-mpr2-68h6 applied in versions: 1.12.1-r0, 1.12.1-r1, 1.12.1-r2 | 2026-04-01T09:22:37.368205Z | 2026-03-25T05:32:13Z |
| cleanstart-2026-ev91316 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0, 1.27.6-r1 | 2026-04-01T09:22:33.462978Z | 2026-03-25T04:58:46Z |
| cleanstart-2026-kw90815 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0, 1.27.6-r1, 1.27.8-r0 | 2026-04-01T09:22:32.438088Z | 2026-03-25T05:02:40Z |
| cleanstart-2026-hh87643 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.26.8-r0, 1.26.8-r1 | 2026-04-01T09:22:32.645637Z | 2026-03-25T04:50:32Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2020-ale-002 | Vulnérabilité dans les produits Citrix ADC et Citrix Gateway | 2020-01-09T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-001 | Multiples vulnérabilités dans les produits de Pulse Secure | 2020-01-09T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| CERTFR-2020-ALE-003 | Vulnérabilité dans les produits Mozilla | 2020-01-09T00:00:00.000000 | 2020-01-20T00:00:00.000000 |
| CERTFR-2020-ALE-002 | Vulnérabilité dans les produits Citrix ADC et Citrix Gateway | 2020-01-09T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-001 | Multiples vulnérabilités dans les produits de Pulse Secure | 2020-01-09T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2019-ale-015 | Multiples vulnérabilités dans Google Chrome | 2019-11-04T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| CERTFR-2019-ALE-015 | Multiples vulnérabilités dans Google Chrome | 2019-11-04T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2019-ale-014 | Vulnérabilité dans PHP | 2019-10-29T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| CERTFR-2019-ALE-014 | Vulnérabilité dans PHP | 2019-10-29T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2019-ale-013 | Vulnérabilité dans Microsoft Internet Explorer | 2019-09-24T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| CERTFR-2019-ALE-013 | Vulnérabilité dans Microsoft Internet Explorer | 2019-09-24T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-012 | Multiples vulnérabilités dans Microsoft Remote Desktop Services | 2019-08-14T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| CERTFR-2019-ALE-012 | Multiples vulnérabilités dans Microsoft Remote Desktop Services | 2019-08-14T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-011 | Vulnérabilité dans Oracle WebLogic | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-010 | Vulnérabilité dans Mozilla Firefox | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| CERTFR-2019-ALE-011 | Vulnérabilité dans Oracle WebLogic | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| CERTFR-2019-ALE-010 | Vulnérabilité dans Mozilla Firefox | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-009 | Vulnérabilité dans Exim | 2019-06-11T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| CERTFR-2019-ALE-009 | Vulnérabilité dans Exim | 2019-06-11T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-008 | Vulnérabilité dans Microsoft SharePoint Server | 2019-05-29T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| CERTFR-2019-ALE-008 | Vulnérabilité dans Microsoft SharePoint Server | 2019-05-29T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-006 | Vulnérabilité dans Microsoft Remote Desktop Services | 2019-05-22T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| CERTFR-2019-ALE-006 | Vulnérabilité dans Microsoft Remote Desktop Services | 2019-05-22T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-007 | Vulnérabilité dans le serveur DHCP de Windows | 2019-05-15T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| CERTFR-2019-ALE-007 | Vulnérabilité dans le serveur DHCP de Windows | 2019-05-15T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| certfr-2019-ale-005 | Vulnérabilité dans Oracle WebLogic | 2019-04-26T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| CERTFR-2019-ALE-005 | Vulnérabilité dans Oracle WebLogic | 2019-04-26T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| certfr-2019-ale-004 | Multiples vulnérabilités dans Microsoft Edge et Internet Explorer | 2019-04-01T00:00:00.000000 | 2019-04-17T00:00:00.000000 |
| CERTFR-2019-ALE-004 | Multiples vulnérabilités dans Microsoft Edge et Internet Explorer | 2019-04-01T00:00:00.000000 | 2019-04-17T00:00:00.000000 |
| certfr-2019-ale-003 | Campagnes de rançongiciels | 2019-01-31T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0214 | Vulnérabilité dans Juniper Networks Junos OS Evolved | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0213 | Multiples vulnérabilités dans les produits Cisco | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0212 | Multiples vulnérabilités dans les produits Centreon | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0211 | Multiples vulnérabilités dans Wireshark | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0210 | Multiples vulnérabilités dans Cisco Catalyst SD-WAN | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0209 | Multiples vulnérabilités dans les produits VMware | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0208 | Vulnérabilité dans les produits Synology | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0207 | Multiples vulnérabilités dans GitLab | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0206 | Multiples vulnérabilités dans les produits Trend Micro | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0205 | Multiples vulnérabilités dans SolarWinds Serv-U | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0204 | Multiples vulnérabilités dans les produits Mozilla | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0203 | Vulnérabilité dans Microsoft Azure Linux | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0202 | Multiples vulnérabilités dans les produits SonicWall | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0201 | Multiples vulnérabilités dans Mattermost Server | 2026-02-24T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0200 | Vulnérabilité dans Centreon open tickets | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0199 | Multiples vulnérabilités dans les produits VMware | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0198 | Multiples vulnérabilités dans Google Chrome | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0197 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-23T00:00:00.000000 | 2026-02-23T00:00:00.000000 |
| certfr-2026-avi-0196 | Multiples vulnérabilités dans les produits IBM | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0195 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0194 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0193 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0192 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0191 | Vulnérabilité dans Traefik | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0190 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0189 | Vulnérabilité dans F5 BIG-IP | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0188 | Multiples vulnérabilités dans les produits Splunk | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0187 | Multiples vulnérabilités dans Tenable Security Center | 2026-02-19T00:00:00.000000 | 2026-02-23T00:00:00.000000 |
| certfr-2026-avi-0186 | Multiples vulnérabilités dans Google Chrome | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0185 | Vulnérabilité dans Microsoft Windows | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000035 | Improper file access permission settings in PC Time Tracer | 2025-06-03T14:40+09:00 | 2025-06-03T14:40+09:00 |
| jvndb-2025-000034 | Multiple vulnerabilities in wivia 5 | 2025-05-30T15:57+09:00 | 2025-05-30T15:57+09:00 |
| jvndb-2025-000032 | Mailform Pro CGI generating error messages containing sensitive information | 2025-05-26T14:22+09:00 | 2025-05-26T14:22+09:00 |
| jvndb-2025-000033 | Improper pattern file validation in i-FILTER optional feature 'Anti-Virus & Sandbox' | 2025-05-23T15:36+09:00 | 2025-05-23T15:36+09:00 |
| jvndb-2025-005467 | Passback vulnerabilities in Canon Production Printers, Office/Small Office Multifunction Printers, and Laser Printers | 2025-05-22T15:03+09:00 | 2025-05-22T15:03+09:00 |
| jvndb-2025-005107 | Multiple vulnerabilities in V-SFT | 2025-05-16T14:32+09:00 | 2025-05-16T14:32+09:00 |
| jvndb-2025-005057 | Multiple vulnerabilities in I-O DATA network attached hard disk 'HDL-T Series' | 2025-05-15T18:27+09:00 | 2025-05-15T18:27+09:00 |
| jvndb-2025-005050 | Multiple vulnerabilities in a-blog cms | 2025-05-15T18:11+09:00 | 2025-05-15T18:11+09:00 |
| jvndb-2025-000031 | Pgpool-II vulnerable to authentication bypass by primary weakness | 2025-05-15T16:14+09:00 | 2025-05-15T16:14+09:00 |
| jvndb-2025-004863 | Panasonic IR Control Hub vulnerable to Unauthorised firmware loading | 2025-05-14T11:30+09:00 | 2025-05-14T11:30+09:00 |
| jvndb-2025-000030 | Reflected cross-site scripting vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor | 2025-05-12T18:00+09:00 | 2025-07-17T10:06+09:00 |
| jvndb-2025-004671 | Multiple vulnerabilities in GL-MT2500 and GL-MT2500A | 2025-05-12T17:52+09:00 | 2025-05-12T17:52+09:00 |
| jvndb-2025-004079 | Improper access permission settings in multiple SEIKO EPSON printer drivers for Windows OS | 2025-04-30T11:46+09:00 | 2025-04-30T11:46+09:00 |
| jvndb-2025-004076 | Security Update for Trend Micro Trend Vision One (April 2025) | 2025-04-30T10:38+09:00 | 2025-04-30T10:38+09:00 |
| jvndb-2025-000029 | Multiple vulnerabilities in Quick Agent | 2025-04-25T13:49+09:00 | 2025-04-25T13:49+09:00 |
| jvndb-2025-000028 | i-PRO Configuration Tool vulnerable to use of hard-coded cryptographic key | 2025-04-24T13:50+09:00 | 2025-04-24T13:50+09:00 |
| jvndb-2025-000027 | Active! mail vulnerable to stack-based buffer overflow | 2025-04-18T16:50+09:00 | 2025-04-18T16:50+09:00 |
| jvndb-2025-003213 | TP-Link Deco BE65 Pro vulnerable to OS command injection | 2025-04-11T13:52+09:00 | 2025-04-11T13:52+09:00 |
| jvndb-2025-000026 | Multiple vulnerabilities in BizRobo! | 2025-04-10T15:36+09:00 | 2025-04-10T15:36+09:00 |
| jvndb-2025-003091 | Multiple vulnerabilities in Trend Micro Endpoint security products for enterprises (April 2025) | 2025-04-09T14:55+09:00 | 2025-04-09T14:55+09:00 |
| jvndb-2025-002990 | Multiple vulnerabilities in Inaba Denki Sangyo Wi-Fi AP UNIT 'AC-WPS-11ac series' | 2025-04-07T17:44+09:00 | 2025-04-07T17:44+09:00 |
| jvndb-2025-000025 | WinRAR vulnerable to the symbolic link based "Mark of the Web" check bypass | 2025-04-03T12:29+09:00 | 2025-04-03T12:29+09:00 |
| jvndb-2025-000022 | Multiple vulnerabilities in JTEKT ELECTRONICS CORPORATION's products | 2025-04-02T15:12+09:00 | 2025-04-02T15:12+09:00 |
| jvndb-2025-002790 | Out-of-bounds Write vulnerabilities in Canon Printer Drivers for Production Printers, Office/Small Office Multifunction Printers and Laser Printers | 2025-04-02T15:05+09:00 | 2025-04-02T15:05+09:00 |
| jvndb-2025-000023 | WordPress plugin "Welcart e-Commerce" vulnerable to untrusted data deserialization | 2025-04-01T14:20+09:00 | 2025-04-01T14:20+09:00 |
| jvndb-2025-002714 | Improper symbolic link file handling in FutureNet NXR series, VXR series and WXR series routers | 2025-03-31T16:59+09:00 | 2025-04-03T15:19+09:00 |
| jvndb-2025-000024 | a-blog cms vulnerable to untrusted data deserialization | 2025-03-28T10:46+09:00 | 2025-03-28T10:46+09:00 |
| jvndb-2025-000021 | Multiple vulnerabilities in PowerCMS | 2025-03-26T18:13+09:00 | 2025-03-26T18:13+09:00 |
| jvndb-2025-002592 | Multiple vulnerabilities in CHOCO TEI WATCHER mini | 2025-03-26T13:25+09:00 | 2025-03-26T13:25+09:00 |
| jvndb-2025-000019 | Multiple vulnerabilities in AssetView | 2025-03-25T17:10+09:00 | 2025-03-25T17:10+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-13962 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13962) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13961 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13961) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13960 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13960) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13959 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13959) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13958 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13958) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13957 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13957) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13956 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13956) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13955 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13955) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13954 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13954) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13953 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13953) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13952 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13952) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13951 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13951) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13950 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13950) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13949 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13949) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13948 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13948) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13947 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13947) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13946 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13946) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13945 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13945) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13944 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13944) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13943 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13943) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-15381 | Huawei HarmonyOS cellular_data模块权限控制漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15380 | Huawei HarmonyOS证书管理模块路径遍历漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15379 | Huawei HarmonyOS维测模块条件竞争漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15378 | Huawei HarmonyOS蓝牙字符越界读漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15377 | Huawei HarmonyOS权限管理服务条件竞争漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15376 | Huawei HarmonyOS安全控件条件竞争漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15375 | Huawei HarmonyOS扫描模块访问未初始化指针漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15250 | Huawei HarmonyOS证书管理模块数据处理漏洞 | 2026-03-12 | 2026-03-25 |
| cnvd-2026-15248 | Huawei HarmonyOS设备认证模块认证绕过漏洞 | 2026-03-12 | 2026-03-23 |
| cnvd-2026-14397 | OpenClaw安全绕过漏洞 | 2026-03-12 | 2026-03-20 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01498 | Уязвимость функции si_parse_power_table() ядра операционной системы Linux, позволяющая на… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01497 | Уязвимость плагина Rule Based Authorization Plugin поискового сервера Apache Solr, позвол… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01496 | Уязвимость функции radeon_atombios_fini() модуля drivers/gpu/drm/radeon/radeon_device.c д… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01495 | Уязвимость функции fromSetWifiGusetBasic() микропрограммного обеспечения маршрутизаторов … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01494 | Уязвимость функции type_show() ядра операционной системы Linux, позволяющая нарушителю ок… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01493 | Уязвимость функции sanity_check_curseg() ядра операционной системы Linux, позволяющая нар… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01492 | Уязвимость веб-интерфейса сервера для управления программами Fortinet FortiClient Enterpr… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01491 | Уязвимость функции fc_exch_abts_resp() ядра операционной системы Linux, позволяющая наруш… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01490 | Уязвимость функции ipc_msg_send_request() ядра операционной системы Linux, позволяющая на… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01489 | Уязвимость функции OnAssocReq() ядра операционной системы Linux, позволяющая нарушителю о… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01488 | Уязвимость функции ext4_truncate() модуля fs/ext4/inode.c файловой системы Ext4 ядра опер… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01487 | Уязвимость функции swap_inode_boot_loader() модуля fs/ext4/ioctl.c файловой системы Ext4 … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01486 | Уязвимость функции pci_device_is_present() модуля drivers/pci/pci.c драйвера устройств PC… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01485 | Уязвимость функции ath11k_dp_rx_mon_deliver() модуля drivers/net/wireless/ath/ath11k/dp_r… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01484 | Уязвимость функций raid0_run() (drivers/md/raid0.c) и raid10_run() (drivers/md/raid10.c) … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01483 | Уязвимость функции _regulator_do_enable() модуля drivers/regulator/core.c драйвера регуля… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01468 | Уязвимость библиотеки преобразования путей path-to-regexp, связанная с неэффективной вычи… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01467 | Уязвимость сервера для разработки Metro Development Server, связанная с непринятием мер п… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01466 | Уязвимость компонента Duo Workflow Service сервиса для взаимодействия с внешними LLM-пров… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01465 | Уязвимость функции lookup_ioctl() модуля drivers/md/dm-ioctl.c драйвера поддержки несколь… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01464 | Уязвимость функции __mcheck_cpu_apply_quirks() модуля arch/x86/kernel/cpu/mce/core.c подд… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01463 | Уязвимость функции nwl_dsi_bridge_mode_set() модуля drivers/gpu/drm/bridge/nwl-dsi.c драй… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01462 | Уязвимость функции status_resync() модуля drivers/md/md.c драйвера нескольких устройств (… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01461 | Уязвимость функции vb2ops_vdec_queue_setup() модуля drivers/media/platform/mediatek/vcode… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01460 | Уязвимость функции nilfs_evict_inode() модуля fs/nilfs2/inode.c файловой системы NILFS2 я… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01459 | Уязвимость функции mpi_cmp_ui() модуля lib/crypto/mpi/mpi-cmp.c ядра операционной системы… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01458 | Уязвимость функции f2fs_abort_atomic_write() модуля fs/f2fs/segment.c файловой системы F2… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01457 | Уязвимость функции nilfs_bmap_lookup_at_level() модуля fs/nilfs2/bmap.c файловой системы … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01456 | Уязвимость функции __hfs_bnode_create() модуля fs/hfs/bnode.c файловой системы ядра опера… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01455 | Уязвимость функции nilfs_prepare_segment_for_recovery() модуля fs/nilfs2/recovery.c подде… | 09.02.2026 | 09.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202210-1888 | When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_R… | 2024-07-23T21:58:55.307000Z |
| var-202004-0061 | The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7… | 2024-07-23T21:58:31.314000Z |
| var-201804-1185 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T21:58:31.021000Z |
| var-201012-0287 | Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome b… | 2024-07-23T21:58:30.837000Z |
| var-202112-0566 | Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2… | 2024-07-23T21:58:00.289000Z |
| var-201903-0926 | An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9… | 2024-07-23T21:57:59.201000Z |
| var-200110-0192 | OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key… | 2024-07-23T21:57:58.746000Z |
| var-202012-1529 | A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion se… | 2024-07-23T21:57:50.923000Z |
| var-201711-0007 | A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1… | 2024-07-23T21:57:50.988000Z |
| var-201904-1414 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:57:11.524000Z |
| var-202206-1157 | Incomplete cleanup in specific special register write operations for some Intel(R) Proces… | 2024-07-23T21:57:10.821000Z |
| var-200810-0140 | Unspecified vulnerability in Finder in Mac OS X 10.5.5 allows user-assisted attackers to … | 2024-07-23T21:57:09.157000Z |
| var-201108-0184 | Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and … | 2024-07-23T21:56:59.027000Z |
| var-200809-0176 | sys/netinet6/icmp6.c in the kernel in FreeBSD 6.3 through 7.1, NetBSD 3.0 through 4.0, an… | 2024-07-23T21:56:59.282000Z |
| var-202210-1203 | Git is an open source, scalable, distributed revision control system. `git shell` is a re… | 2024-07-23T21:56:58.153000Z |
| var-201304-0178 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:56:58.917000Z |
| var-200703-0011 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted at… | 2024-07-23T21:56:58.629000Z |
| var-201904-0746 | A race condition was addressed with additional validation. This issue affected versions p… | 2024-07-23T21:56:56.832000Z |
| var-201406-0230 | The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel… | 2024-07-23T21:56:56.921000Z |
| var-201110-0443 | The ospf_flood function in ospf_flood.c in ospfd in Quagga before 0.99.19 allows remote a… | 2024-07-23T21:56:49.016000Z |
| var-201912-1864 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:56:48.951000Z |
| var-201806-1445 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2024-07-23T21:56:47.636000Z |
| var-201708-1547 | The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers… | 2024-07-23T21:56:47.739000Z |
| var-201712-0280 | An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari be… | 2024-07-23T21:56:39.563000Z |
| var-200609-1276 | The Security Framework in Apple Mac OS X 10.4 through 10.4.8 allows remote attackers to c… | 2024-07-23T21:56:38.677000Z |
| var-202203-0131 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:56:37.654000Z |
| var-201412-0613 | Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers … | 2024-07-23T21:56:37.541000Z |
| var-200703-0012 | Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to… | 2024-07-23T21:56:37.438000Z |
| var-200906-0617 | The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly ini… | 2024-07-23T21:56:36.646000Z |
| var-200701-0517 | Untrusted search path vulnerability in writeconfig in Apple Mac OS X 10.4.8 allows local … | 2024-07-23T21:56:15.579000Z |