Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-39922 |
5.3 (4.0)
|
GeoNode < 4.4.5, 5.0.2 SSRF via Service Registration |
GeoNode |
GeoNode |
2026-04-10T19:53:05.159Z | 2026-04-10T19:53:05.159Z |
| CVE-2026-39921 |
5.3 (4.0)
|
GeoNode < 4.4.5, 5.0.2 SSRF via Document Upload |
GeoNode |
GeoNode |
2026-04-10T19:52:49.924Z | 2026-04-10T19:52:49.924Z |
| CVE-2026-40190 |
5.6 (3.1)
|
LangSmith Client SDKs has Prototype Pollution in langs… |
langchain-ai |
langsmith-sdk |
2026-04-10T19:47:57.642Z | 2026-04-10T19:47:57.642Z |
| CVE-2026-40189 |
9.3 (4.0)
|
goshs has a file-based ACL authorization bypass in gos… |
patrickhener |
goshs |
2026-04-10T19:44:54.672Z | 2026-04-10T19:44:54.672Z |
| CVE-2026-40188 |
7.7 (3.1)
|
goshs is Missing Write Protection for Parametric Data Values |
patrickhener |
goshs |
2026-04-10T19:43:45.197Z | 2026-04-10T19:43:45.197Z |
| CVE-2026-40046 |
N/A
|
Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ … |
Apache Software Foundation |
Apache ActiveMQ |
2026-04-09T15:58:32.966Z | 2026-04-10T19:41:00.618Z |
| CVE-2026-40185 |
7.1 (3.1)
|
Missing Authorization on Immich Trip Photo Routes in TREK |
mauriceboe |
TREK |
2026-04-10T19:40:16.382Z | 2026-04-10T19:40:16.382Z |
| CVE-2026-40184 |
3.7 (3.1)
|
Unauthenticated Access to Uploaded Files in TREK |
mauriceboe |
TREK |
2026-04-10T19:39:32.442Z | 2026-04-10T19:39:32.442Z |
| CVE-2026-40180 |
7.7 (4.0)
|
Zip Slip Path Traversal in quarkus-openapi-generator A… |
quarkiverse |
quarkus-openapi-generator |
2026-04-10T19:35:53.440Z | 2026-04-10T19:35:53.440Z |
| CVE-2026-40178 |
6.9 (4.0)
|
ajenti.plugin.core has a race conditions in 2FA |
ajenti |
ajenti |
2026-04-10T19:30:47.083Z | 2026-04-10T19:30:47.083Z |
| CVE-2026-40177 |
9.3 (4.0)
|
Password bypass when 2FA is activated |
ajenti |
ajenti |
2026-04-10T19:29:00.851Z | 2026-04-10T19:29:00.851Z |
| CVE-2026-40175 |
10 (3.1)
|
Axios has Unrestricted Cloud Metadata Exfiltration via… |
axios |
axios |
2026-04-10T19:23:52.285Z | 2026-04-10T19:23:52.285Z |
| CVE-2026-40168 |
8.2 (3.1)
|
Postiz has Server-Side Request Forgery via Redirect By… |
gitroomhq |
postiz-app |
2026-04-10T19:20:16.365Z | 2026-04-10T19:20:16.365Z |
| CVE-2026-32252 |
7.7 (3.1)
|
Chartbrew Cross-Tenant Template Export and Secret Disc… |
chartbrew |
chartbrew |
2026-04-10T19:17:53.438Z | 2026-04-10T19:17:53.438Z |
| CVE-2026-30232 |
7.8 (4.0)
|
Chartbrew has SSRF in API Data Connection - No IP Vali… |
chartbrew |
chartbrew |
2026-04-10T19:15:11.439Z | 2026-04-10T19:15:11.439Z |
| CVE-2026-27460 |
6.5 (3.1)
|
Tandoor Recipes Affected by Denial of Service via Reci… |
TandoorRecipes |
recipes |
2026-04-10T19:09:05.883Z | 2026-04-10T19:09:05.883Z |
| CVE-2026-33737 |
5.3 (3.1)
|
Chamilo LMS has an XML External Entity (XXE) Injection |
chamilo |
chamilo-lms |
2026-04-10T19:05:08.873Z | 2026-04-10T19:05:08.873Z |
| CVE-2026-33736 |
6.5 (3.1)
|
Chamilo LMS has an Insecure Direct Object Reference (I… |
chamilo |
chamilo-lms |
2026-04-10T19:03:18.638Z | 2026-04-10T19:03:18.638Z |
| CVE-2026-33710 |
7.5 (3.1)
|
Chamilo LMS has Weak REST API Key Generation (Predictable) |
chamilo |
chamilo-lms |
2026-04-10T18:59:24.111Z | 2026-04-10T18:59:24.111Z |
| CVE-2026-33708 |
6.5 (3.1)
|
Chamilo LMS has REST API PII Exposure via get_user_inf… |
chamilo |
chamilo-lms |
2026-04-10T18:54:35.034Z | 2026-04-10T18:54:35.034Z |
| CVE-2026-33707 |
9.4 (3.1)
|
Weak Password Recovery Mechanism for Forgotten Passwor… |
chamilo |
chamilo-lms |
2026-04-10T18:52:54.097Z | 2026-04-10T18:52:54.097Z |
| CVE-2026-33706 |
7.1 (3.1)
|
Chamilo LMS has a REST API Self-Privilege Escalation (… |
chamilo |
chamilo-lms |
2026-04-10T18:51:23.824Z | 2026-04-10T18:51:23.824Z |
| CVE-2026-33266 |
N/A
|
Apache OpenMeetings: Hardcoded Remember-Me Cookie Encr… |
Apache Software Foundation |
Apache OpenMeetings |
2026-04-09T15:52:36.105Z | 2026-04-10T18:49:13.351Z |
| CVE-2026-33618 |
8.8 (3.1)
|
Chamilo LMS Affected by Remote Code Execution via eval… |
chamilo |
chamilo-lms |
2026-04-10T18:10:16.691Z | 2026-04-10T18:46:09.585Z |
| CVE-2026-5867 |
6.5 (3.1)
|
Heap buffer overflow in WebML in Google Chrome pr… |
Google |
Chrome |
2026-04-08T21:20:43.173Z | 2026-04-10T18:45:24.503Z |
| CVE-2026-33005 |
N/A
|
Apache OpenMeetings: Insufficient checks in FileWebService |
Apache Software Foundation |
Apache OpenMeetings |
2026-04-09T15:52:50.770Z | 2026-04-10T18:44:45.976Z |
| CVE-2026-5864 |
6.5 (3.1)
|
Heap buffer overflow in WebAudio in Google Chrome… |
Google |
Chrome |
2026-04-08T21:20:41.982Z | 2026-04-10T18:44:16.825Z |
| CVE-2026-5869 |
6.5 (3.1)
|
Heap buffer overflow in WebML in Google Chrome pr… |
Google |
Chrome |
2026-04-08T21:20:43.915Z | 2026-04-10T18:40:08.229Z |
| CVE-2026-32990 |
N/A
|
Apache Tomcat: Fix for CVE-2025-66614 is incomplete |
Apache Software Foundation |
Apache Tomcat |
2026-04-09T19:23:49.618Z | 2026-04-10T18:39:25.498Z |
| CVE-2026-5886 |
7.5 (3.1)
|
Out of bounds read in WebAudio in Google Chrome o… |
Google |
Chrome |
2026-04-08T21:20:51.484Z | 2026-04-10T18:38:56.084Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-35573 |
9.1 (3.1)
|
ChurchCRM has a Path traversal leads to RCE |
ChurchCRM |
CRM |
2026-04-07T17:06:07.161Z | 2026-04-08T18:49:46.996Z |
| CVE-2026-39339 |
9.1 (3.1)
|
ChurchCRM has an API Authentication Bypass |
ChurchCRM |
CRM |
2026-04-07T17:58:50.015Z | 2026-04-07T19:59:11.055Z |
| CVE-2026-35572 |
7 (4.0)
|
SSRF via Referer header in ChurchCRM allows server-sid… |
ChurchCRM |
CRM |
2026-04-07T17:07:57.506Z | 2026-04-07T19:59:43.438Z |
| CVE-2016-20044 |
8.6 (4.0)
8.4 (3.1)
|
PInfo 0.6.9-5.1 Local Buffer Overflow via -m Parameter |
pinfo |
PInfo |
2026-03-28T11:58:05.524Z | 2026-03-30T15:51:04.916Z |
| CVE-2026-39326 |
8.8 (3.1)
|
ChurchCRM has a Blind SQL injection in PropertyTypeEdi… |
ChurchCRM |
CRM |
2026-04-07T17:30:57.529Z | 2026-04-07T19:59:29.975Z |
| CVE-2026-39329 |
8.8 (3.1)
|
ChurchCRM has a Blind SQL injection in EventNames.php |
ChurchCRM |
CRM |
2026-04-07T17:33:30.119Z | 2026-04-07T19:59:23.647Z |
| CVE-2026-39331 |
8.1 (3.1)
|
ChurchCRM has an API Authorization Bypass Allows Authe… |
ChurchCRM |
CRM |
2026-04-07T17:36:41.987Z | 2026-04-07T18:39:56.463Z |
| CVE-2026-39332 |
8.7 (3.1)
|
ChurchCRM has Reflected Cross-Site Scripting (XSS) in … |
ChurchCRM |
CRM |
2026-04-07T17:37:23.574Z | 2026-04-08T14:41:01.071Z |
| CVE-2026-39333 |
8.7 (3.1)
|
ChurchCRM has Reflected XSS in DateStart/DateEnd param… |
ChurchCRM |
CRM |
2026-04-07T17:38:02.576Z | 2026-04-07T19:59:17.229Z |
| CVE-2026-39334 |
8.8 (3.1)
|
ChurchCRM has a Blind SQL injection in SettingsIndivid… |
ChurchCRM |
CRM |
2026-04-07T17:38:45.436Z | 2026-04-07T18:08:28.055Z |
| CVE-2026-39336 |
6.1 (3.1)
|
ChurchCRM has Stored XSS from unescaped config values … |
ChurchCRM |
CRM |
2026-04-07T17:40:55.153Z | 2026-04-07T18:40:33.123Z |
| CVE-2026-39337 |
10 (3.1)
|
ChurchCRM Affected by Unauthenticated RCE in Install Wizard |
ChurchCRM |
CRM |
2026-04-07T18:08:27.227Z | 2026-04-07T18:41:52.764Z |
| CVE-2026-39319 |
8.8 (3.1)
|
ChurchCRM has a Second Order SQLI via FundRaiserEditor.php |
ChurchCRM |
CRM |
2026-04-07T18:05:18.331Z | 2026-04-08T14:39:12.132Z |
| CVE-2026-39325 |
7.2 (3.1)
|
ChurchCRM has a Blind SQL injection in SettingsUser.php |
ChurchCRM |
CRM |
2026-04-07T17:29:19.882Z | 2026-04-09T15:48:09.561Z |
| CVE-2026-39327 |
8.8 (3.1)
|
ChurchCRM has a SQL injection in MemberRoleChange.php |
ChurchCRM |
CRM |
2026-04-07T17:31:37.384Z | 2026-04-07T18:39:00.851Z |
| CVE-2026-39328 |
8.9 (3.1)
|
ChurchCRM has Stored XSS in Social Profile Fields |
ChurchCRM |
CRM |
2026-04-07T17:32:41.364Z | 2026-04-09T15:50:07.852Z |
| CVE-2026-39330 |
8.8 (3.1)
|
ChurchCRM has a Blind SQL injection in PropertyAssign.php |
ChurchCRM |
CRM |
2026-04-07T17:34:30.429Z | 2026-04-07T18:09:08.271Z |
| CVE-2026-22895 |
2.2 (4.0)
|
QuFTP Service |
QNAP Systems Inc. |
QuFTP Service |
2026-03-20T16:21:40.989Z | 2026-03-25T14:03:29.588Z |
| CVE-2026-24660 |
8.1 (3.1)
|
A heap-based buffer overflow vulnerability exists… |
LibRaw |
LibRaw |
2026-04-07T13:49:25.335Z | 2026-04-08T20:58:58.522Z |
| CVE-2026-24450 |
8.1 (3.1)
|
An integer overflow vulnerability exists in the u… |
LibRaw |
LibRaw |
2026-04-07T13:49:23.872Z | 2026-04-08T03:55:46.772Z |
| CVE-2026-21413 |
9.8 (3.1)
|
A heap-based buffer overflow vulnerability exists… |
LibRaw |
LibRaw |
2026-04-07T13:49:29.784Z | 2026-04-08T03:55:50.134Z |
| CVE-2026-20889 |
9.8 (3.1)
|
A heap-based buffer overflow vulnerability exists… |
LibRaw |
LibRaw |
2026-04-07T13:49:27.912Z | 2026-04-08T03:55:49.049Z |
| CVE-2026-20884 |
8.1 (3.1)
|
An integer overflow vulnerability exists in the d… |
LibRaw |
LibRaw |
2026-04-07T13:49:22.423Z | 2026-04-08T03:55:45.636Z |
| CVE-2026-20911 |
9.8 (3.1)
|
A heap-based buffer overflow vulnerability exists… |
LibRaw |
LibRaw |
2026-04-07T13:49:31.223Z | 2026-04-08T03:55:51.222Z |
| CVE-2026-33186 |
9.1 (3.1)
|
gRPC-Go has an authorization bypass via missing leadin… |
grpc |
grpc-go |
2026-03-20T22:23:32.147Z | 2026-03-24T18:09:13.422Z |
| CVE-2026-23554 |
7.8 (3.1)
|
Use after free of paging structures in EPT |
Xen |
Xen |
2026-03-23T06:56:52.344Z | 2026-03-23T14:19:27.752Z |
| CVE-2026-23555 |
7.1 (3.1)
|
Xenstored DoS by unprivileged domain |
Xen |
Xen |
2026-03-23T06:57:07.653Z | 2026-03-23T14:14:02.810Z |
| CVE-2026-4596 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
projectworlds Lawyer Management System lawyers.php cro… |
projectworlds |
Lawyer Management System |
2026-03-23T19:20:03.984Z | 2026-03-24T18:45:11.073Z |
| CVE-2026-35473 |
5.1 (4.0)
|
WeGIA - Open Redirect - IentradaControle - listarId() … |
LabRedesCefetRJ |
WeGIA |
2026-04-06T21:12:35.894Z | 2026-04-08T14:01:50.893Z |
| CVE-2026-35474 |
5.1 (4.0)
|
WeGIA - Open Redirect - atualizacao redirection - Unva… |
LabRedesCefetRJ |
WeGIA |
2026-04-06T21:13:25.517Z | 2026-04-07T15:59:13.467Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-39623 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-04-08T09:16:32.547 | 2026-04-09T21:16:10.650 |
| fkie_cve-2026-39621 | Cross-Site Request Forgery (CSRF) vulnerability in spicethemes SpicePress spicepress allows Upload … | 2026-04-08T09:16:32.270 | 2026-04-09T21:16:10.450 |
| fkie_cve-2026-39619 | Cross-Site Request Forgery (CSRF) vulnerability in priyanshumittal Busiprof busiprof allows Upload … | 2026-04-08T09:16:31.873 | 2026-04-09T21:16:10.243 |
| fkie_cve-2026-35206 | Helm is a package manager for Charts for Kubernetes. In Helm versions <=3.20.1 and <=4.1.3, a speci… | 2026-04-09T21:16:09.993 | 2026-04-09T21:16:09.993 |
| fkie_cve-2026-31354 | Multiple authenticated stored cross-site scripting (XSS) vulnerabilities in the Permissions module … | 2026-04-06T16:16:33.260 | 2026-04-09T21:16:09.793 |
| fkie_cve-2026-31353 | An authenticated stored cross-site scripting (XSS) vulnerability in the Category module of Feehi CM… | 2026-04-06T16:16:33.130 | 2026-04-09T21:16:09.590 |
| fkie_cve-2026-31352 | An authenticated stored cross-site scripting (XSS) vulnerability in the Role Management module of F… | 2026-04-06T16:16:33.027 | 2026-04-09T21:16:09.390 |
| fkie_cve-2026-31350 | An authenticated stored cross-site scripting (XSS) vulnerability in Feehi CMS v2.1.1 allows attacke… | 2026-04-06T16:16:32.807 | 2026-04-09T21:16:09.183 |
| fkie_cve-2026-31313 | An authenticated stored cross-site scripting (XSS) vulnerability in the creation/editing module of … | 2026-04-06T17:17:09.590 | 2026-04-09T21:16:08.990 |
| fkie_cve-2026-31059 | A remote command execution (RCE) vulnerability in the /goform/formDia component of UTT Aggressive H… | 2026-04-06T15:17:08.210 | 2026-04-09T21:16:08.773 |
| fkie_cve-2026-31040 | A vulnerability was identified in stata-mcp prior to v1.13.0 where insufficient validation of user-… | 2026-04-08T16:16:22.977 | 2026-04-09T21:16:08.590 |
| fkie_cve-2026-31017 | A Server-Side Request Forgery (SSRF) vulnerability exists in the Print Format functionality of ERPN… | 2026-04-08T17:21:18.737 | 2026-04-09T21:16:08.373 |
| fkie_cve-2026-30478 | A Dynamic-link Library Injection vulnerability in GatewayGeo MapServer for Windows version 5 allows… | 2026-04-09T18:16:58.847 | 2026-04-09T21:16:08.207 |
| fkie_cve-2026-30460 | Daylight Studio FuelCMS v1.5.2 was discovered to contain an authenticated remote code execution (RC… | 2026-04-07T16:16:23.593 | 2026-04-09T21:16:07.977 |
| fkie_cve-2026-30080 | OpenAirInterface v2.2.0 accepts Security Mode Complete without any integrity protection. Configurat… | 2026-04-08T17:21:18.623 | 2026-04-09T21:16:07.767 |
| fkie_cve-2026-30075 | OpenAirInterface Version 2.2.0 has a Buffer Overflow vulnerability in processing UplinkNASTransport… | 2026-04-08T17:21:18.503 | 2026-04-09T21:16:07.563 |
| fkie_cve-2025-59710 | An issue was discovered in Biztalk360 before 11.5. Because of incorrect access control, any user is… | 2026-04-03T15:16:04.500 | 2026-04-09T21:16:07.350 |
| fkie_cve-2025-59709 | An issue was discovered in Biztalk360 through 11.5. because of mishandling of user-provided input i… | 2026-04-03T15:16:03.817 | 2026-04-09T21:16:07.163 |
| fkie_cve-2025-45058 | D-Link DI-8300 v16.07.26A1 was discovered to contain a buffer overflow via the fx parameter in the … | 2026-04-08T18:24:45.723 | 2026-04-09T21:16:06.917 |
| fkie_cve-2025-45057 | D-Link DI-8300 v16.07.26A1 was discovered to contain a buffer overflow via the ip parameter in the … | 2026-04-08T18:24:45.597 | 2026-04-09T21:16:06.690 |
| fkie_cve-2025-14831 | A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (C… | 2026-02-09T15:16:09.937 | 2026-04-09T21:16:06.350 |
| fkie_cve-2023-54364 | Joomla HikaShop 4.7.4 contains a reflected cross-site scripting vulnerability that allows unauthent… | 2026-04-09T21:16:06.117 | 2026-04-09T21:16:06.117 |
| fkie_cve-2023-54363 | Joomla Solidres 2.13.3 contains a reflected cross-site scripting vulnerability that allows unauthen… | 2026-04-09T21:16:05.907 | 2026-04-09T21:16:05.907 |
| fkie_cve-2023-54362 | Joomla VirtueMart Shopping-Cart 4.0.12 contains a reflected cross-site scripting vulnerability that… | 2026-04-09T21:16:05.717 | 2026-04-09T21:16:05.717 |
| fkie_cve-2023-54361 | Joomla iProperty Real Estate 4.1.1 contains a reflected cross-site scripting vulnerability that all… | 2026-04-09T21:16:05.533 | 2026-04-09T21:16:05.533 |
| fkie_cve-2023-54360 | Joomla JLex Review 6.0.1 contains a reflected cross-site scripting vulnerability that allows attack… | 2026-04-09T21:16:05.340 | 2026-04-09T21:16:05.340 |
| fkie_cve-2023-54359 | WordPress adivaha Travel Plugin 2.3 contains a time-based blind SQL injection vulnerability that al… | 2026-04-09T21:16:05.153 | 2026-04-09T21:16:05.153 |
| fkie_cve-2023-54358 | WordPress adivaha Travel Plugin 2.3 contains a reflected cross-site scripting vulnerability that al… | 2026-04-09T21:16:04.960 | 2026-04-09T21:16:04.960 |
| fkie_cve-2023-52356 | A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff … | 2024-01-25T20:15:39.063 | 2026-04-09T21:16:04.570 |
| fkie_cve-2023-46945 | QD 20230821 is vulnerable to Server-side request forgery (SSRF) via a crafted request | 2026-04-08T17:17:01.010 | 2026-04-09T21:16:04.387 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-59xc-5v89-r7pr |
4.8 (3.1)
6.3 (4.0)
|
Duplicate Advisory: OpenClaw: Synology Chat Webhook Pre-Auth Rate-Limit Bypass Enables Brute-Force … | 2026-04-10T00:30:30Z | 2026-04-10T20:25:02Z |
| ghsa-qx8j-g322-qj6m |
7.4 (4.0)
|
OpenClaw: `fetchWithSsrFGuard` replays unsafe request bodies across cross-origin redirects | 2026-04-09T17:37:08Z | 2026-04-10T20:24:59Z |
| ghsa-pg8g-f2hf-x82m |
6.5 (3.1)
7.1 (4.0)
|
Duplicate Advisory: OpenClaw: `fetchWithSsrFGuard` replays unsafe request bodies across cross-origi… | 2026-04-09T00:31:59Z | 2026-04-10T20:24:54Z |
| ghsa-3h52-cx59-c456 |
6.9 (4.0)
|
OpenClaw: Feishu webhook reads and parses unauthenticated request bodies before signature validation | 2026-03-29T15:48:58Z | 2026-04-10T20:21:35Z |
| ghsa-8f9r-gr6r-x63q |
5.3 (3.1)
6.9 (4.0)
|
Duplicate Advisory: OpenClaw: Feishu webhook reads and parses unauthenticated request bodies before… | 2026-04-10T00:30:30Z | 2026-04-10T20:21:21Z |
| ghsa-vfg3-pqpq-93m4 |
5.3 (4.0)
|
OpenClaw: Tlon cite expansion happens before channel and DM authorization is complete | 2026-03-26T21:27:49Z | 2026-04-10T20:20:23Z |
| ghsa-p6j4-wvmc-vx2h |
7.3 (3.1)
6.9 (4.0)
|
Duplicate Advisory: OpenClaw: Tlon cite expansion happens before channel and DM authorization is complete | 2026-04-10T00:30:30Z | 2026-04-10T20:20:17Z |
| ghsa-hf68-49fm-59cq |
9.4 (4.0)
|
OpenClaw Gateway: RCE and Privilege Escalation from operator.pairing to operator.admin via device.p… | 2026-03-26T21:40:57Z | 2026-04-10T20:20:13Z |
| ghsa-r3v5-2grc-429h |
8.8 (3.1)
8.7 (4.0)
|
Duplicate Advisory: OpenClaw Gateway: RCE and Privilege Escalation from operator.pairing to operato… | 2026-04-10T00:30:30Z | 2026-04-10T20:20:07Z |
| ghsa-rqp8-q22p-5j9q |
6.9 (4.0)
|
OpenClaw Bypasses DM Policy Separation via Synology Chat Webhook Path Collision | 2026-03-26T21:45:35Z | 2026-04-10T20:19:58Z |
| ghsa-g8mc-c5f2-mqg7 |
4.8 (3.1)
6.3 (4.0)
|
Duplicate Advisory: OpenClaw Bypasses DM Policy Separation via Synology Chat Webhook Path Collision | 2026-04-10T00:30:30Z | 2026-04-10T20:19:52Z |
| ghsa-6mqc-jqh6-x8fc |
6.9 (4.0)
|
OpenClaw: Gateway Canvas local-direct requests bypass Canvas HTTP and WebSocket authentication | 2026-03-26T18:59:00Z | 2026-04-10T20:19:48Z |
| ghsa-9gvx-vj57-vqqx |
5.1 (3.1)
5.1 (4.0)
|
Duplicate Advisory: OpenClaw: Gateway Canvas local-direct requests bypass Canvas HTTP and WebSocket… | 2026-04-10T00:30:30Z | 2026-04-10T20:19:41Z |
| ghsa-4qwc-c7g9-4xcw |
8.2 (4.0)
|
OpenClaw: Remote media error responses could trigger unbounded memory allocation before failure | 2026-03-26T19:50:06Z | 2026-04-10T20:19:35Z |
| ghsa-hm63-vwj4-mj2q |
5.3 (3.1)
6.9 (4.0)
|
Duplicate Advisory: OpenClaw: Remote media error responses could trigger unbounded memory allocatio… | 2026-04-10T00:30:30Z | 2026-04-10T20:19:29Z |
| ghsa-rhfg-j8jq-7v2h |
|
OpenClaw: SSRF via Unguarded Configured Base URLs in Multiple Channel Extensions (Incomplete Fix fo… | 2026-03-29T15:48:42Z | 2026-04-10T20:19:25Z |
| ghsa-8j7f-g9gv-7jhc |
7.4 (3.1)
5.3 (4.0)
|
Duplicate Advisory: OpenClaw: SSRF via Unguarded Configured Base URLs in Multiple Channel Extension… | 2026-04-10T00:30:30Z | 2026-04-10T20:19:19Z |
| ghsa-65h8-27jh-q8wv |
8.6 (4.0)
|
OpenClaw: Nostr inbound DMs could trigger unauthenticated crypto work before sender policy enforcement | 2026-03-26T19:08:34Z | 2026-04-10T20:19:14Z |
| ghsa-2j53-2c28-g9v2 |
6.5 (3.1)
6.9 (4.0)
|
Duplicate Advisory: OpenClaw: Nostr inbound DMs could trigger unauthenticated crypto work before se… | 2026-04-10T00:30:30Z | 2026-04-10T20:19:08Z |
| ghsa-rm59-992w-x2mv |
6.6 (4.0)
|
OpenClaw is vulnerable to unauthenticated resource exhaustion through its voice call webhook handling | 2026-03-26T19:50:41Z | 2026-04-10T20:19:04Z |
| ghsa-36cp-mh65-x882 |
5.3 (3.1)
6.9 (4.0)
|
Duplicate Advisory: OpenClaw is vulnerable to unauthenticated resource exhaustion through its voice… | 2026-04-10T00:30:30Z | 2026-04-10T20:18:58Z |
| ghsa-cg6c-q2hx-69h7 |
8.2 (4.0)
|
OpenClaw: Plivo V2 verified replay identity drifts on query-only variants | 2026-03-26T18:56:32Z | 2026-04-10T20:18:52Z |
| ghsa-j56c-wpqm-h24x |
6.5 (3.1)
8.3 (4.0)
|
Duplicate Advisory: OpenClaw: Plivo V2 verified replay identity drifts on query-only variants | 2026-04-10T00:30:29Z | 2026-04-10T20:18:47Z |
| ghsa-6v7q-wjvx-w8wg |
8.2 (3.1)
|
basic-ftp: Incomplete CRLF Injection Protection Allows Arbitrary FTP Command Execution via Credenti… | 2026-04-10T20:18:23Z | 2026-04-10T20:18:23Z |
| ghsa-h9cx-xjg6-5v2w |
3.1 (3.1)
|
Flux notification-controller GCR Receiver missing email validation allows unauthorized reconciliati… | 2026-04-10T20:18:16Z | 2026-04-10T20:18:16Z |
| ghsa-9qq8-cgcv-qmc9 |
3.7 (3.1)
|
Step CA affected by an index out of bounds panic in TPM attestation EKU validation | 2026-04-10T20:18:08Z | 2026-04-10T20:18:08Z |
| ghsa-3ghp-8r47-4gj4 |
7.3 (3.1)
5.5 (4.0)
|
FoundationAgents MetaGPT vulnerable to eval injection | 2026-04-09T18:31:28Z | 2026-04-10T20:03:43Z |
| ghsa-3wqj-33cg-xc48 |
5.3 (3.1)
|
Rembg has a Path Traversal via Custom Model Loading | 2026-04-10T20:00:12Z | 2026-04-10T20:00:12Z |
| ghsa-49xc-52mp-cc9j |
9.1 (3.1)
|
nimiq-blockchain is missing a wall-clock upper bound on block timestamps | 2026-04-10T19:55:04Z | 2026-04-10T19:55:04Z |
| ghsa-2h6j-mhcp-9j9h |
7.5 (3.1)
|
GenieACS has an unauthenticated access vulnerability via the NBI API endpoint | 2026-04-07T21:32:39Z | 2026-04-10T19:54:53Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-125 |
|
A flaw was found in Ansible where the secret information present in async_files are getti… | ansible | 2021-06-09T12:15:00Z | 2024-12-03T18:23:29.400148Z |
| pysec-2019-251 |
7.5 (3.1)
|
The modoboa-dmarc plugin 1.1.0 for Modoboa is vulnerable to an XML External Entity Inject… | modoboa | 2019-12-10T20:15:00Z | 2024-12-02T10:49:36.349040Z |
| pysec-2023-298 |
5.3 (3.1)
|
isInList in the safeurl-python package before 1.2 for Python has an insufficiently restri… | safeurl-python | 2023-01-30T05:15:00Z | 2024-11-25T22:26:07.130924Z |
| pysec-2011-25 |
|
Unspecified vulnerability in (1) Zope 2.12.x before 2.12.19 and 2.13.x before 2.13.8, as … | Plone | 2011-07-19T20:55:00Z | 2024-11-25T22:26:05.519360Z |
| pysec-2023-270 |
2.8 (3.1)
|
A flaw was found in openstack-glance. This issue could allow a remote, authenticated atta… | glance | 2023-03-06T23:15:00Z | 2024-11-25T22:26:00.352650Z |
| pysec-2022-43071 |
9.8 (3.1)
|
api-res-py package in PyPI 0.1 is vulnerable to a code execution backdoor in the request … | api-res-py | 2022-06-08T20:15:00Z | 2024-11-25T22:25:53.019921Z |
| pysec-2022-43069 |
8.8 (3.1)
|
Apache IoTDB version 0.13.0 is vulnerable by session id attack. Users should upgrade to v… | apache-iotdb | 2022-09-05T10:15:00Z | 2024-11-25T22:25:52.941293Z |
| pysec-2022-43174 |
9.8 (3.1)
|
WMAgent v1.3.3rc2 and 1.3.3rc1, reqmgr 2 1.4.1rc5 and 1.4.0rc2, reqmon 1.4.1rc5, and glob… | wmagent | 2022-07-28T23:15:00Z | 2024-11-25T22:09:33.909779Z |
| pysec-2022-43163 |
9.8 (3.1)
|
WMAgent v1.3.3rc2 and 1.3.3rc1, reqmgr 2 1.4.1rc5 and 1.4.0rc2, reqmon 1.4.1rc5, and glob… | reqmon | 2022-07-28T23:15:00Z | 2024-11-25T22:09:33.909779Z |
| pysec-2022-43151 |
9.1 (3.1)
|
Patchelf v0.9 was discovered to contain an out-of-bounds read via the function modifyRPat… | pypatchelf | 2022-12-19T22:15:00Z | 2024-11-25T22:09:33.909779Z |
| pysec-2022-43136 |
9.8 (3.1)
|
WMAgent v1.3.3rc2 and 1.3.3rc1, reqmgr 2 1.4.1rc5 and 1.4.0rc2, reqmon 1.4.1rc5, and glob… | global-workqueue | 2022-07-28T23:15:00Z | 2024-11-25T22:09:33.909779Z |
| pysec-2022-43134 |
9.8 (3.1)
|
The exotel (aka exotel-py) package in PyPI as of 0.1.6 includes a code execution backdoor… | exotel | 2022-08-27T20:15:00Z | 2024-11-25T22:09:33.909779Z |
| pysec-2019-243 |
6.5 (3.1)
|
Designate does not enforce the DNS protocol limit concerning record set sizes | designate | 2019-11-22T15:15:00Z | 2024-11-25T22:09:33.909779Z |
| pysec-2017-114 |
6.5 (3.1)
|
Designate 2015.1.0 through 1.0.0.0b1 as packaged in OpenStack Kilo does not enforce Recor… | designate | 2017-08-31T22:29:00Z | 2024-11-25T22:09:33.909779Z |
| pysec-2006-4 |
|
Multiple heap-based buffer overflows in Libextractor 0.5.13 and earlier allow remote atta… | extractor | 2006-05-18T23:02:00Z | 2024-11-25T22:09:33.909779Z |
| pysec-2024-153 |
6.5 (3.1)
|
Streamlit is a data oriented application development framework for python. Snowflake Stre… | streamlit | 2024-08-12T17:15:17+00:00 | 2024-11-25T21:22:50.933853+00:00 |
| pysec-2024-152 |
|
aiocpa is a user-facing library for generating color gradients of text. Version 0.1.13 in… | aiocpa | 2024-11-25T19:30:00+00:00 | |
| pysec-2023-302 |
7.5 (3.1)
|
An issue in /upydev/keygen.py in upydev v0.4.3 allows attackers to decrypt sensitive info… | upydev | 2023-11-20T23:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2023-289 |
8.8 (3.1)
|
An issue in Plone CMS v. 5.2.4, 5.2.3, 5.2.2, 5.2.1, 5.2.0, 5.1rc2, 5.1rc1, 5.1b4, 5.1b3,… | plone | 2023-02-17T18:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2023-276 |
5.4 (3.1)
|
An XSS vulnerability was discovered in the Mayan EDMS DMS. Successful XSS exploitation wa… | mayan-edms | 2023-02-07T22:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2022-43154 |
7.8 (3.1)
|
WASM3 v0.5.0 was discovered to contain a heap overflow via the component /wabt/bin/poc.wasm. | pywasm3 | 2022-05-20T19:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2022-43152 |
7.4 (3.1)
|
A flaw was found in the python-scciclient when making an HTTPS connection to a server whe… | python-scciclient | 2022-09-01T18:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2022-43146 |
6.5 (3.1)
|
py-cord is a an API wrapper for Discord written in Python. Bots creating using py-cord ve… | py-cord | 2022-08-18T15:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2022-43145 |
9.8 (3.1)
|
libImaging/TgaRleDecode.c in Pillow 9.1.0 has a heap buffer overflow in the processing of… | pillow | 2022-05-25T12:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2022-43144 |
9.1 (3.1)
|
Patchelf v0.9 was discovered to contain an out-of-bounds read via the function modifyRPat… | patchelf | 2022-12-19T22:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2022-43140 |
6.5 (3.1)
|
A heap buffer overflow in the LIEF::MachO::BinaryParser::parse_dyldinfo_generic_bind func… | lief | 2022-11-17T23:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2022-43139 |
6.5 (3.1)
|
A vulnerability in the LIEF::MachO::SegmentCommand::virtual_address function of LIEF v0.1… | lief | 2022-09-30T19:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2022-43138 |
6.5 (3.1)
|
A vulnerability in the LIEF::MachO::BinaryParser::init_and_parse function of LIEF v0.12.1… | lief | 2022-10-03T13:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2022-43135 |
8.8 (3.1)
|
FreeTAKServer 1.9.8 contains a hardcoded Flask secret key which allows attackers to creat… | freetakserver | 2022-03-11T00:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2021-890 |
7.5 (3.1)
|
Buffer overflow in ajaxsoundstudio.com Pyo < and 1.03 in the Server_jack_init function.… | pyo | 2021-12-17T21:15:00Z | 2024-11-25T18:35:18.357593Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33709 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.469333Z |
| gsd-2024-33708 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.395735Z |
| gsd-2024-33707 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.497095Z |
| gsd-2024-33706 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.427436Z |
| gsd-2024-33705 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.385891Z |
| gsd-2024-33704 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.504657Z |
| gsd-2024-33703 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.386761Z |
| gsd-2024-33702 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.530768Z |
| gsd-2024-33701 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.589032Z |
| gsd-2024-33698 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.315544Z |
| gsd-2024-33697 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-27T05:02:18.598872Z |
| gsd-2024-33696 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-27T05:02:18.403548Z |
| gsd-2024-33695 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-27T05:02:18.407619Z |
| gsd-2024-33694 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-27T05:02:18.294663Z |
| gsd-2024-33693 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-27T05:02:18.509326Z |
| gsd-2024-33692 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-27T05:02:18.404770Z |
| gsd-2024-33691 | Cross-Site Request Forgery (CSRF) vulnerability in OptinMonster Popup Builder Team OptinM… | 2024-04-27T05:02:18.375458Z |
| gsd-2024-33690 | Cross-Site Request Forgery (CSRF) vulnerability in Jegstudio Financio.This issue affects … | 2024-04-27T05:02:18.467205Z |
| gsd-2024-33689 | Cross-Site Request Forgery (CSRF) vulnerability in Tony Zeoli, Tony Hayes Radio Station.T… | 2024-04-27T05:02:18.398121Z |
| gsd-2024-33688 | Cross-Site Request Forgery (CSRF) vulnerability in Extend Themes Teluro.This issue affect… | 2024-04-27T05:02:18.524420Z |
| gsd-2024-33687 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.432624Z |
| gsd-2024-33686 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.392053Z |
| gsd-2024-33685 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.523707Z |
| gsd-2024-33684 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.529859Z |
| gsd-2024-33683 | Cross-Site Request Forgery (CSRF) vulnerability in WP Republic Hide Dashboard Notificatio… | 2024-04-27T05:02:18.438205Z |
| gsd-2024-33682 | Cross-Site Request Forgery (CSRF) vulnerability in Cookie Information A/S WP GDPR Complia… | 2024-04-27T05:02:18.470225Z |
| gsd-2024-33681 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.329529Z |
| gsd-2024-33680 | Cross-Site Request Forgery (CSRF) vulnerability in MainWP MainWP Child Reports.This issue… | 2024-04-27T05:02:18.444951Z |
| gsd-2024-33679 | Cross-Site Request Forgery (CSRF) vulnerability in FameThemes FameTheme Demo Importer.Thi… | 2024-04-27T05:02:18.492186Z |
| gsd-2024-33678 | Cross-Site Request Forgery (CSRF) vulnerability in ClickCease ClickCease Click Fraud Prot… | 2024-04-27T05:02:18.319802Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2351 | Malicious code in dotenv-xtend (npm) | 2026-03-24T15:43:16Z | 2026-04-07T14:41:21Z |
| mal-2026-2350 | Malicious code in dotenv-express (npm) | 2026-03-24T15:43:15Z | 2026-04-07T14:41:21Z |
| mal-2026-2349 | Malicious code in deriv_ppetest (npm) | 2026-03-24T15:42:44Z | 2026-04-07T14:41:21Z |
| mal-2026-2348 | Malicious code in cursed-module (npm) | 2026-03-24T15:41:56Z | 2026-04-07T14:41:21Z |
| mal-2026-2347 | Malicious code in ctf-package-onetimeuseforctf (npm) | 2026-03-24T15:41:46Z | 2026-04-07T14:41:21Z |
| mal-2026-2346 | Malicious code in corsair-module (npm) | 2026-03-24T15:41:15Z | 2026-04-07T14:41:21Z |
| mal-2026-2345 | Malicious code in codecoverage-tools (npm) | 2026-03-24T15:40:45Z | 2026-04-07T14:41:21Z |
| mal-2026-2344 | Malicious code in codeanalysis-common (npm) | 2026-03-24T15:40:44Z | 2026-04-07T14:41:21Z |
| mal-2026-2323 | Malicious code in ethersproject-wallet (npm) | 2026-04-01T09:11:09Z | 2026-04-07T14:41:21Z |
| mal-2026-2491 | Malicious code in @not-nemo/crypto-tracker (npm) | 2026-04-05T14:31:21Z | 2026-04-07T14:41:20Z |
| mal-2026-2447 | Malicious code in @toprank/partner (npm) | 2026-04-03T07:43:43Z | 2026-04-07T14:41:20Z |
| mal-2026-2425 | Malicious code in bytefrontier-tracker (npm) | 2026-04-02T12:10:59Z | 2026-04-07T14:41:20Z |
| mal-2026-2424 | Malicious code in bytefrontier-sdk (npm) | 2026-04-02T12:21:22Z | 2026-04-07T14:41:20Z |
| mal-2026-2423 | Malicious code in bytefrontier-partner (npm) | 2026-04-02T12:10:52Z | 2026-04-07T14:41:20Z |
| mal-2026-2422 | Malicious code in bytefrontier-api (npm) | 2026-04-02T12:10:50Z | 2026-04-07T14:41:20Z |
| mal-2026-2413 | Malicious code in cclr-component-resources (npm) | 2026-03-24T09:03:35Z | 2026-04-07T14:41:20Z |
| mal-2026-2412 | Malicious code in @wame/ngx-frf-utilities (npm) | 2026-03-24T09:08:41Z | 2026-04-07T14:41:20Z |
| mal-2026-2411 | Malicious code in @wame/ngx-adfs (npm) | 2026-03-24T09:08:34Z | 2026-04-07T14:41:20Z |
| mal-2026-2410 | Malicious code in @the-coca-cola-company/ngps-global-common-utils (npm) | 2026-03-24T09:07:58Z | 2026-04-07T14:41:20Z |
| mal-2026-2409 | Malicious code in @phonos/types (npm) | 2026-03-24T09:07:37Z | 2026-04-07T14:41:20Z |
| mal-2026-2343 | Malicious code in chain-multer (npm) | 2026-03-24T15:40:17Z | 2026-04-07T14:41:20Z |
| mal-2026-2342 | Malicious code in chai-set (npm) | 2026-03-24T15:40:16Z | 2026-04-07T14:41:20Z |
| mal-2026-2341 | Malicious code in chai-chain-cognivault (npm) | 2026-03-24T15:40:13Z | 2026-04-07T14:41:20Z |
| mal-2026-2340 | Malicious code in chai-chain-argon (npm) | 2026-03-24T15:40:12Z | 2026-04-07T14:41:20Z |
| mal-2026-2339 | Malicious code in chai-as-chains (npm) | 2026-03-24T15:39:59Z | 2026-04-07T14:41:20Z |
| mal-2026-2338 | Malicious code in chai-as-attached (npm) | 2026-03-24T15:39:58Z | 2026-04-07T14:41:20Z |
| mal-2026-2337 | Malicious code in chai-as-aligned (npm) | 2026-03-24T15:39:57Z | 2026-04-07T14:41:20Z |
| mal-2026-2336 | Malicious code in cdnjavacss (npm) | 2026-03-24T15:39:45Z | 2026-04-07T14:41:20Z |
| mal-2026-2335 | Malicious code in azurestack-common (npm) | 2026-03-24T15:38:26Z | 2026-04-07T14:41:20Z |
| mal-2026-2334 | Malicious code in argon-node (npm) | 2026-03-24T15:37:43Z | 2026-04-07T14:41:20Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0641 | NATS Server: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-03-09T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0554 | Red Hat Enterprise Linux (udisks): Mehrere Schwachstellen | 2026-03-01T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0544 | IBM QRadar SIEM: Mehrere Schwachstellen | 2026-02-26T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0530 | Drupal Extensions: Mehrere Schwachstellen | 2026-02-25T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0497 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2026-02-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0480 | Red Hat Enterprise Linux (Python Protobuf): Schwachstelle ermöglicht Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0397 | Drupal Module (UI Icons, Quick Edit): Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2026-02-11T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0353 | libpng: Schwachstelle ermöglicht Codeausführung | 2026-02-09T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0312 | Drupal (Login Disable): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-02-04T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0237 | libpng: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-27T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0224 | Grafana: Mehrere Schwachstellen | 2026-01-26T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0198 | Red Hat OpenShift und OpenShift AI (urllib3): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0168 | Oracle MySQL: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0114 | Red Hat OpenShift (github.com/sirupsen/logrus): Schwachstelle ermöglicht Denial of Service | 2026-01-14T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-2916 | Net-SNMP: Schwachstelle ermöglicht Codeausführung und DoS | 2025-12-23T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-2886 | Red Hat Enterprise Linux (git-lfs, opentelemetry-collector): Mehrere Schwachstellen | 2025-12-18T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-2881 | Red Hat Enterprise Linux (multicluster global hub): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-12-17T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-2724 | Golang Go: Mehrere Schwachstellen | 2025-12-02T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0403 | Apple macOS Tahoe, Sequoia und Sonoma: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-03-24T23:00:00.000+00:00 |
| wid-sec-w-2026-0402 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-03-24T23:00:00.000+00:00 |
| wid-sec-w-2026-0822 | PTC FlexPLM und Windchill: Schwachstelle ermöglicht Codeausführung | 2026-03-22T23:00:00.000+00:00 | 2026-03-23T23:00:00.000+00:00 |
| wid-sec-w-2026-0081 | Microsoft Office Produkte: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-03-22T23:00:00.000+00:00 |
| wid-sec-w-2026-0794 | Microsoft Azure DevOps, Data Factory and Cloud Shell: Mehrere Schwachstellen | 2026-03-19T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0793 | Netwrix Password Secure: Mehrere Schwachstellen | 2026-03-19T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0792 | SuiteCRM: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0784 | Ubiquiti UniFi Network Application: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2026-03-18T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0758 | Canonical Snap: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2026-03-17T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0723 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0714 | ImageMagick: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-03-12T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0702 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2026-03-11T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| va-25-345-01 | CISA Software Acquisition Guide Supplier Response Web Tool XSS | 2025-12-12T20:27:47Z | 2025-12-12T20:27:47Z |
| icsma-25-345-02 | Varex Imaging Panoramic Dental Imaging Software | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| icsma-25-345-01 | Grassroots DICOM (GDCM) | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| icsa-25-345-02 | Johnson Controls iSTAR Ultra | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| icsa-25-345-01 | Johnson Controls iSTAR | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| va-25-343-01 | Windscribe for Linux 'changeMTU' local privilege escalation | 2025-12-10T16:46:41Z | 2025-12-10T16:46:41Z |
| icsa-26-015-12 | Siemens SIMATIC CN 4100 | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-26-015-11 | Siemens RUGGEDCOM ROX II | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-09 | Siemens Gridscale X Prepay | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-08 | Siemens Energy Services | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-07 | Siemens Building X - Security Manager Edge Controller | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-06 | Siemens SINEMA Remote Connect Server | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-226-11 | Siemens SIMATIC S7-PLCSIM | 2025-08-12T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-226-03 | Siemens SIMATIC S7-PLCSIM | 2025-08-12T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-24-347-02 | Siemens Engineering Platforms | 2024-12-10T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-24-256-16 | Siemens Third-Party Component in SICAM and SITIPE Products | 2024-09-10T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-24-193-05 | Siemens SCALANCE, RUGGEDCOM | 2024-07-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-22-349-09 | Siemens OpenSSL 3.0 Affecting Products | 2022-12-13T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-338-07 | Advantech iView | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-06 | SolisCloud Monitoring Platform | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-05 | Sunbird DCIM dcTrack and Power IQ | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-04 | Johnson Controls iSTAR | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-03 | Johnson Controls OpenBlue Mobile Web Application for OpenBlue Workplace | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-02 | MAXHUB Pivot | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-01 | Mitsubishi Electric GX Works2 | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-219-02 | Johnson Controls FX Server, FX80 and FX90 (Update A) | 2025-08-07T06:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-148-03 | Consilium Safety CS5000 Fire Panel (Update A) | 2025-05-29T06:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsma-25-336-01 | Mirion Medical EC2 Software NMIS BioDose | 2025-12-02T07:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-25-336-02 | Iskra iHUB and iHUB Lite | 2025-12-02T07:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-25-336-01 | Industrial Video & Control Longwatch | 2025-12-02T07:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ewlc-user-del-hqxmpudj | Cisco IOS XE Wireless Controller Software Unauthorized User Deletion Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ewlc-cdp-dos-fpeks9k | Cisco IOS XE Wireless Controller Software Cisco Discovery Protocol Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-catc-insec-acc-mtt8eheb | Cisco Catalyst Center Insufficient Access Control Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-catalyst-tls-pqnd5kej | Cisco Catalyst SD-WAN Manager Certificate Validation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-c2960-3560-sboot-ztqadrhq | Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches Secure Boot Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-bootstrap-kfgxygdh | Cisco IOS XE Software Bootstrap Arbitrary File Write Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-asr903-rsp3-arp-dos-wmfzdvjz | Cisco IOS XE Software for Cisco ASR 903 Aggregation Services Routers ARP Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-webex-app-client-rce-ufymmylc | Cisco Webex App Client-Side Remote Code Execution Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-sna-prvesc-4bqmk33z | Cisco Secure Network Analytics Privilege Escalation Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-nd-unenum-2xffh472 | Cisco Nexus Dashboard LDAP Username Enumeration Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-nxos-image-sig-bypas-pqdrqvjl | Cisco NX-OS Software Image Verification Bypass Vulnerability | 2024-12-04T16:00:00+00:00 | 2025-04-07T16:43:32+00:00 |
| cisco-sa-cslu-7ghmzwmw | Cisco Smart Licensing Utility Vulnerabilities | 2024-09-04T16:00:00+00:00 | 2025-04-04T17:44:00+00:00 |
| cisco-sa-meraki-mx-vpn-dos-vnrpdvfb | Cisco Meraki MX and Z Series AnyConnect VPN Denial of Service Vulnerability | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-epnmpi-sxss-gsscpgy4 | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerabilities | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-ece-dos-tc6m9gz8 | Cisco Enterprise Chat and Email Denial of Service Vulnerability | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-webex-credexp-xmn85y6 | Cisco Webex for BroadWorks Credential Exposure Vulnerability | 2025-03-04T16:00:00+00:00 | 2025-04-01T13:40:00+00:00 |
| cisco-sa-sdwan-xss-zq4kpvyd | Cisco Catalyst SD-WAN Manager Cross-Site Scripting Vulnerability | 2024-09-25T16:00:00+00:00 | 2025-03-28T18:38:53+00:00 |
| cisco-sa-dnac-api-nbpzcjcm | Cisco Catalyst Center Unauthenticated API Access Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-03-26T16:00:00+00:00 |
| cisco-sa-xrike-9wygprgq | Cisco IOS XR Software Internet Key Exchange Version 2 Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-xr792-bwfvdpy | Cisco IOS XR Software Release 7.9.2 Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-sb-lkm-znerzjbz | Cisco IOS XR Software Secure Boot Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-ncs-hybridacl-crmzffkq | Cisco IOS XR Software Hybrid Access Control List Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-multicast-ermrsvq7 | Cisco IOS XR Software for ASR 9000 Series Routers Layer 3 Multicast Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-modular-acl-u5mepxmm | Cisco IOS XR Software Access Control List Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-ipv4uni-lfm3cfbu | Cisco IOS XR Software for ASR 9000 Series Routers IPv4 Unicast Packets Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-iosxr-priv-esc-gfqjxvof | Cisco IOS XR Software CLI Privilege Escalation Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-iosxr-bgp-dos-o7stephx | Cisco IOS XR Software Border Gateway Protocol Confederation Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-ios-xr-verii-bypass-hhpwqrvx | Cisco IOS XR Software Image Verification Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-snmp-dos-sdxnsucw | Cisco IOS, IOS XE, and IOS XR Software SNMP Denial of Service Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-03-12T15:22:33+00:00 |
| cisco-sa-sbr042-multi-vuln-ej76pke5 | Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers Vulnerabilities | 2023-01-11T16:00:00+00:00 | 2025-03-07T17:33:55+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-40005 | spi: cadence-quadspi: Implement refcount to handle unbind during busy | 2025-10-02T00:00:00.000Z | 2026-03-31T15:16:12.000Z |
| msrc_cve-2024-57872 | scsi: ufs: pltfrm: Dellocate HBA during ufshcd_pltfrm_remove() | 2025-01-02T00:00:00.000Z | 2026-03-31T15:16:07.000Z |
| msrc_cve-2026-2645 | Acceptance of CertificateVerify Message before ClientKeyExchange in TLS 1.2 | 2026-03-02T00:00:00.000Z | 2026-03-31T15:16:05.000Z |
| msrc_cve-2024-46727 | drm/amd/display: Add otg_master NULL check within resource_log_pipe_topology_update | 2024-09-01T07:00:00.000Z | 2026-03-31T15:16:05.000Z |
| msrc_cve-2025-39927 | ceph: fix race condition validating r_parent before applying state | 2025-10-02T00:00:00.000Z | 2026-03-31T15:16:04.000Z |
| msrc_cve-2025-37882 | usb: xhci: Fix isochronous Ring Underrun/Overrun event handling | 2025-05-02T00:00:00.000Z | 2026-03-31T15:16:04.000Z |
| msrc_cve-2026-23000 | net/mlx5e: Fix crash on profile change rollback failure | 2026-01-02T00:00:00.000Z | 2026-03-31T15:15:57.000Z |
| msrc_cve-2024-49934 | fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name | 2024-10-01T07:00:00.000Z | 2026-03-31T15:15:54.000Z |
| msrc_cve-2026-3503 | Fault injection attack with ML-DSA and ML-KEM on ARM | 2026-03-02T00:00:00.000Z | 2026-03-31T15:15:51.000Z |
| msrc_cve-2026-21620 | TFTP Path Traversal | 2026-02-02T00:00:00.000Z | 2026-03-31T15:15:42.000Z |
| msrc_cve-2025-37856 | btrfs: harden block_group::bg_list against list_del() races | 2025-05-02T00:00:00.000Z | 2026-03-31T15:15:42.000Z |
| msrc_cve-2024-46730 | drm/amd/display: Ensure array index tg_inst won't be -1 | 2024-09-01T07:00:00.000Z | 2026-03-31T15:15:42.000Z |
| msrc_cve-2024-36911 | hv_netvsc: Don't free decrypted memory | 2024-05-02T07:00:00.000Z | 2026-03-31T15:15:42.000Z |
| msrc_cve-2024-49926 | rcu-tasks: Fix access non-existent percpu rtpcp variable in rcu_tasks_need_gpcb() | 2024-10-01T07:00:00.000Z | 2026-03-31T15:15:39.000Z |
| msrc_cve-2026-3230 | Improper key_share validation in TLS 1.3 HelloRetryRequest | 2026-03-02T00:00:00.000Z | 2026-03-31T15:15:35.000Z |
| msrc_cve-2024-26830 | i40e: Do not allow untrusted VF to remove administratively set MAC | 2024-04-02T07:00:00.000Z | 2026-03-31T15:15:26.000Z |
| msrc_cve-2025-40339 | drm/amdgpu: fix nullptr err of vm_handle_moved | 2025-12-02T00:00:00.000Z | 2026-03-31T15:15:25.000Z |
| msrc_cve-2024-36909 | Drivers: hv: vmbus: Don't free ring buffers that couldn't be re-encrypted | 2024-05-02T07:00:00.000Z | 2026-03-31T15:15:25.000Z |
| msrc_cve-2023-53543 | vdpa: Add max vqp attr to vdpa_nl_policy for nlattr length check | 2025-10-02T00:00:00.000Z | 2026-03-31T15:15:22.000Z |
| msrc_cve-2024-46728 | drm/amd/display: Check index for aux_rd_interval before using | 2024-09-01T07:00:00.000Z | 2026-03-31T15:15:18.000Z |
| msrc_cve-2026-3229 | Integer Overflow in Certificate Chain Allocation | 2026-03-02T00:00:00.000Z | 2026-03-31T15:15:17.000Z |
| msrc_cve-2025-37807 | bpf: Fix kmemleak warning for percpu hashmap | 2025-05-02T00:00:00.000Z | 2026-03-31T15:15:15.000Z |
| msrc_cve-2024-26837 | net: bridge: switchdev: Skip MDB replays of deferred events on offload | 2024-04-02T07:00:00.000Z | 2026-03-31T15:15:07.000Z |
| msrc_cve-2022-48744 | net/mlx5e: Avoid field-overflowing memcpy() | 2024-06-02T07:00:00.000Z | 2026-03-31T15:15:06.000Z |
| msrc_cve-2025-40289 | drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM | 2025-12-02T00:00:00.000Z | 2026-03-31T15:15:05.000Z |
| msrc_cve-2024-53210 | s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() | 2024-12-02T00:00:00.000Z | 2026-03-31T15:15:02.000Z |
| msrc_cve-2026-1005 | Integer underflow leads to out-of-bounds access in sniffer AES-GCM/CCM/ARIA-GCM decrypt path | 2026-03-02T00:00:00.000Z | 2026-03-31T15:14:58.000Z |
| msrc_cve-2024-46765 | ice: protect XDP configuration with a mutex | 2024-09-01T07:00:00.000Z | 2026-03-31T15:14:57.000Z |
| msrc_cve-2021-47432 | lib/generic-radix-tree.c: Don't overflow in peek() | 2024-05-02T07:00:00.000Z | 2026-03-31T15:14:48.000Z |
| msrc_cve-2024-42317 | mm/huge_memory: avoid PMD-size page cache if needed | 2024-08-02T00:00:00.000Z | 2026-03-31T15:14:47.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0308 | Kwetsbaarheden verholpen in Juniper Networks Junos Space | 2025-10-13T08:31:03.235596Z | 2025-10-13T08:31:03.235596Z |
| ncsc-2025-0307 | Kwetsbaarheid verholpen in Oracle E-Business Suite | 2025-10-13T07:52:22.500853Z | 2025-10-13T07:52:22.500853Z |
| ncsc-2025-0306 | Kwetsbaarheden verholpen in GitLab | 2025-10-13T07:25:32.225768Z | 2025-10-13T07:25:32.225768Z |
| ncsc-2025-0305 | Kwetsbaarheden verholpen in Juniper Networks Junos OS | 2025-10-13T07:17:00.445318Z | 2025-10-13T07:17:00.445318Z |
| ncsc-2025-0303 | Kwetsbaarheid verholpen in Oracle E-Business Suite | 2025-10-05T09:07:57.122302Z | 2025-10-08T13:03:30.836713Z |
| ncsc-2025-0304 | Kwetsbaarheden verholpen in Redis | 2025-10-08T11:43:37.331971Z | 2025-10-08T11:43:37.331971Z |
| ncsc-2025-0302 | Kwetsbaarheid verholpen in IBM InfoSphere | 2025-09-30T08:31:27.582962Z | 2025-09-30T08:31:27.582962Z |
| ncsc-2025-0301 | Kwetsbaarheden verholpen in VMware NSX | 2025-09-30T08:29:24.969885Z | 2025-09-30T08:29:24.969885Z |
| ncsc-2025-0300 | Kwetsbaarheden verholpen in GitLab EE & CE | 2025-09-29T09:40:53.033373Z | 2025-09-29T09:40:53.033373Z |
| ncsc-2025-0299 | Kwetsbaarheden verholpen in Zenitel ICX500 en ICX510 Gateway | 2025-09-26T07:00:18.729367Z | 2025-09-26T07:00:18.729367Z |
| ncsc-2025-0298 | Kwetsbaarheden verholpen in Cisco Secure Firewall ASA en FTD | 2025-09-25T18:17:20.040958Z | 2025-09-25T18:17:20.040958Z |
| ncsc-2025-0297 | Kwetsbaarheden verholpen in Cisco IOS en Cisco IOS XE Software | 2025-09-25T09:20:07.678881Z | 2025-09-25T10:42:19.129323Z |
| ncsc-2025-0295 | Kwetsbaarheid verholpen in Fortra's GoAnywhere MFT | 2025-09-19T12:26:42.186246Z | 2025-09-19T12:26:42.186246Z |
| ncsc-2025-0294 | Kwetsbaarheden verholpen in HPE Aruba Networking EdgeConnect SD-WAN Gateways | 2025-09-18T12:02:45.239087Z | 2025-09-18T12:02:45.239087Z |
| ncsc-2025-0293 | Kwetsbaarheden verholpen in Spring Framework | 2025-09-16T13:38:44.960337Z | 2025-09-16T13:38:44.960337Z |
| ncsc-2025-0292 | Kwetsbaarheden verholpen in Ivanti producten | 2025-09-16T12:21:50.959347Z | 2025-09-16T12:21:50.959347Z |
| ncsc-2025-0291 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-09-16T11:17:27.365694Z | 2025-09-16T11:17:27.365694Z |
| ncsc-2025-0290 | Kwetsbaarheden verholpen in Apple macOS | 2025-09-16T11:16:20.572265Z | 2025-09-16T11:16:20.572265Z |
| ncsc-2025-0289 | Kwetsbaarheden verholpen in Omnissa Workspace ONE UEM | 2025-09-12T15:23:20.359090Z | 2025-09-12T15:23:20.359090Z |
| ncsc-2025-0288 | Kwetsbaarheden verholpen in GitLab CE/EE | 2025-09-12T14:49:52.285990Z | 2025-09-12T14:49:52.285990Z |
| ncsc-2025-0287 | Kwetsbaarheden verholpen in Cisco NX-OS Software | 2025-09-11T08:18:37.706725Z | 2025-09-11T08:18:37.706725Z |
| ncsc-2025-0286 | Kwetsbaarheden verholpen in Cisco IOS XR Software | 2025-09-11T08:14:36.960621Z | 2025-09-11T08:14:36.960621Z |
| ncsc-2025-0285 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-09-10T11:01:43.415733Z | 2025-09-10T11:01:43.415733Z |
| ncsc-2025-0284 | Kwetsbaarheid verholpen in Adobe Commerce en Magento | 2025-09-10T10:49:56.787627Z | 2025-09-10T10:49:56.787627Z |
| ncsc-2025-0283 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-09-10T10:46:54.808276Z | 2025-09-10T10:46:54.808276Z |
| ncsc-2025-0282 | Kwetsbaarheid verholpen in Adobe Dreamweaver | 2025-09-10T10:38:24.553749Z | 2025-09-10T10:38:24.553749Z |
| ncsc-2025-0281 | Kwetsbaarheid verholpen in Adobe ColdFusion | 2025-09-10T10:24:09.409410Z | 2025-09-10T10:24:09.409410Z |
| ncsc-2025-0280 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2025-09-09T18:27:39.956624Z | 2025-09-09T18:27:39.956624Z |
| ncsc-2025-0279 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-09-09T18:25:53.539582Z | 2025-09-09T18:25:53.539582Z |
| ncsc-2025-0278 | Kwetsbaarheden verholpen in Microsoft Office | 2025-09-09T18:23:23.763765Z | 2025-09-09T18:23:23.763765Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20375-1 | Security update for python-PyPDF2 | 2026-03-17T15:19:48Z | 2026-03-17T15:19:48Z |
| opensuse-su-2026:20378-1 | Security update for libpng16 | 2026-03-17T14:49:10Z | 2026-03-17T14:49:10Z |
| opensuse-su-2026:20374-1 | Security update for krb5-appl | 2026-03-17T13:34:53Z | 2026-03-17T13:34:53Z |
| opensuse-su-2026:20373-1 | Security update for python-Django | 2026-03-17T13:27:11Z | 2026-03-17T13:27:11Z |
| opensuse-su-2026:20377-1 | Security update for python-maturin | 2026-03-17T12:51:10Z | 2026-03-17T12:51:10Z |
| opensuse-su-2026:20368-1 | Security update for ocaml | 2026-03-17T10:41:31Z | 2026-03-17T10:41:31Z |
| opensuse-su-2026:20372-1 | Security update for chromium | 2026-03-17T10:11:02Z | 2026-03-17T10:11:02Z |
| opensuse-su-2026:10385-1 | traefik-3.6.10-2.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10384-1 | cargo1.94-1.94.0-2.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10383-1 | cargo1.93-1.93.0-3.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10382-1 | cargo1.92-1.92.0-2.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10381-1 | python311-3.11.15-2.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10380-1 | python311-uv-0.10.11-1.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10379-1 | python311-CairoSVG-2.9.0-1.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10378-1 | ovmf-202602-5.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:20365-1 | Security update for MozillaFirefox | 2026-03-16T16:42:36Z | 2026-03-16T16:42:36Z |
| opensuse-su-2026:20366-1 | Security update for docker-stable | 2026-03-16T15:57:03Z | 2026-03-16T15:57:03Z |
| opensuse-su-2026:20364-1 | Security update for rust-keylime | 2026-03-16T15:31:12Z | 2026-03-16T15:31:12Z |
| opensuse-su-2026:10377-1 | python312-3.12.13-2.1 on GA media | 2026-03-16T00:00:00Z | 2026-03-16T00:00:00Z |
| opensuse-su-2026:10376-1 | chromedriver-146.0.7680.80-1.1 on GA media | 2026-03-16T00:00:00Z | 2026-03-16T00:00:00Z |
| opensuse-su-2026:10375-1 | coturn-4.9.0-1.1 on GA media | 2026-03-15T00:00:00Z | 2026-03-15T00:00:00Z |
| opensuse-su-2026:10374-1 | python311-tornado6-6.5.5-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:10373-1 | python311-simpleeval-1.0.5-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:10372-1 | python311-black-26.3.1-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:10371-1 | curl-8.19.0-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:20357-1 | Security update for qemu | 2026-03-13T10:47:15Z | 2026-03-13T10:47:15Z |
| opensuse-su-2026:20354-1 | Security update for libsoup2 | 2026-03-13T08:41:04Z | 2026-03-13T08:41:04Z |
| opensuse-su-2026:10370-1 | smb4k-4.0.5-1.2 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10369-1 | skaffold-2.18.0-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10368-1 | ruby4.0-rubygem-websocket-extensions-0.1.5-1.24 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:2920 | Red Hat Security Advisory: grafana security update | 2026-02-18T12:55:46+00:00 | 2026-04-13T02:41:52+00:00 |
| rhsa-2026:2914 | Red Hat Security Advisory: grafana security update | 2026-02-18T11:31:17+00:00 | 2026-04-13T02:41:52+00:00 |
| rhsa-2026:2844 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.26.1 Release. | 2026-02-17T18:20:32+00:00 | 2026-04-13T02:41:50+00:00 |
| rhsa-2026:2754 | Red Hat Security Advisory: Red Hat Quay 3.9.18 | 2026-02-16T15:43:51+00:00 | 2026-04-13T02:41:50+00:00 |
| rhsa-2026:2709 | Red Hat Security Advisory: golang security update | 2026-02-16T10:32:31+00:00 | 2026-04-13T02:41:50+00:00 |
| rhsa-2026:2708 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-02-16T10:08:41+00:00 | 2026-04-13T02:41:50+00:00 |
| rhsa-2026:2706 | Red Hat Security Advisory: golang security update | 2026-02-16T09:40:31+00:00 | 2026-04-13T02:41:50+00:00 |
| rhsa-2026:2681 | Red Hat Security Advisory: Red Hat Quay 3.16.2 | 2026-02-12T17:29:21+00:00 | 2026-04-13T02:41:50+00:00 |
| rhsa-2026:5866 | Red Hat Security Advisory: OpenShift Container Platform 4.17.52 packages and security update | 2026-04-01T09:29:07+00:00 | 2026-04-13T02:39:56+00:00 |
| rhsa-2026:4936 | Red Hat Security Advisory: Release of containers for RHOSO 18.0.17 security update | 2026-03-18T15:36:04+00:00 | 2026-04-13T02:39:42+00:00 |
| rhsa-2026:4464 | Red Hat Security Advisory: OpenShift Container Platform 4.16.58 packages and security update | 2026-03-19T07:51:30+00:00 | 2026-04-13T02:39:32+00:00 |
| rhsa-2026:4185 | Red Hat Security Advisory: Red Hat Quay 3.13.11 | 2026-03-10T13:57:02+00:00 | 2026-04-13T02:39:28+00:00 |
| rhsa-2026:4215 | Red Hat Security Advisory: Red Hat Quay 3.14.6 | 2026-03-10T15:34:38+00:00 | 2026-04-13T02:39:27+00:00 |
| rhsa-2026:3827 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.20.3 | 2026-03-05T07:31:32+00:00 | 2026-04-13T02:39:03+00:00 |
| rhsa-2026:3428 | Red Hat Security Advisory: container-tools:rhel8 security update | 2026-02-26T14:36:45+00:00 | 2026-04-13T02:38:47+00:00 |
| rhsa-2026:3289 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-02-25T07:10:59+00:00 | 2026-04-13T02:38:43+00:00 |
| rhsa-2026:3288 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-02-25T06:54:49+00:00 | 2026-04-13T02:38:42+00:00 |
| rhsa-2026:3287 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-02-25T07:05:39+00:00 | 2026-04-13T02:38:42+00:00 |
| rhsa-2026:3111 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.2.2 | 2026-02-23T17:39:45+00:00 | 2026-04-13T02:38:39+00:00 |
| rhsa-2026:3108 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.1.5 | 2026-02-23T17:24:11+00:00 | 2026-04-13T02:38:39+00:00 |
| rhsa-2026:3107 | Red Hat Security Advisory: Kiali 1.73.27 for Red Hat OpenShift Service Mesh 2.6 | 2026-02-23T17:16:07+00:00 | 2026-04-13T02:38:38+00:00 |
| rhsa-2026:3104 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.0.8 | 2026-02-23T17:13:34+00:00 | 2026-04-13T02:38:38+00:00 |
| rhsa-2026:2922 | Red Hat Security Advisory: RHTAS 1.2.2 - Red Hat Trusted Artifact Signer Release | 2026-02-18T12:26:00+00:00 | 2026-04-13T02:38:38+00:00 |
| rhsa-2026:3087 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-23T13:35:49+00:00 | 2026-04-13T02:38:37+00:00 |
| rhsa-2026:3053 | Red Hat Security Advisory: butane security update | 2026-02-23T06:47:46+00:00 | 2026-04-13T02:38:36+00:00 |
| rhsa-2026:2951 | Red Hat Security Advisory: Red Hat OpenShift API for Data Protection | 2026-02-18T14:15:26+00:00 | 2026-04-13T02:38:35+00:00 |
| rhsa-2026:2921 | Red Hat Security Advisory: RHTAS 1.2.2 - Red Hat Trusted Artifact Signer Release | 2026-02-18T12:19:05+00:00 | 2026-04-13T02:38:35+00:00 |
| rhsa-2026:2927 | Red Hat Security Advisory: RHTAS 1.2.2 - Red Hat Trusted Artifact Signer Release | 2026-02-18T12:52:55+00:00 | 2026-04-13T02:38:34+00:00 |
| rhsa-2026:2926 | Red Hat Security Advisory: RHTAS 1.2.2 - Red Hat Trusted Artifact Signer Release | 2026-02-18T12:44:41+00:00 | 2026-04-13T02:38:33+00:00 |
| rhsa-2026:2769 | Red Hat Security Advisory: Red Hat Ceph Storage 7.1 security and bug fix updates | 2026-02-17T00:55:59+00:00 | 2026-04-13T02:38:31+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2021-285-03 | IGSS (Interactive Graphical SCADA System) | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-02 | ConneXium Network Manager (CNM) Software | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-01 | spaceLYnk, Wiser For KNX, fellerLYnk | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-257-03 | StruxureWare Data Center Expert | 2021-09-14T00:00:00.000Z | 2021-09-14T00:00:00.000Z |
| sevd-2021-222-06 | CODESYS V2 Vulnerabilities in Programmable Automation Controller (PacDrive) M | 2021-08-10T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2021-222-05 | AccuSine PCSn/PCS+/PFV+ | 2021-08-10T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2021-222-03 | Pro-face GP-Pro EX | 2021-08-10T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2020-353-02 | Treck HTTP Server Vulnerability on TM3 Bus Coupler Modules (V2.0) | 2020-12-18T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2020-343-04 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules | 2020-12-08T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2020-343-03 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (V2.0) | 2020-12-08T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2021-194-05 | Easergy T200 | 2021-07-13T00:00:00.000Z | 2021-07-13T00:00:00.000Z |
| sevd-2021-194-04 | C-Bus Toolkit | 2021-07-13T00:00:00.000Z | 2021-07-13T00:00:00.000Z |
| sevd-2021-194-03 | SoSafe Configurable | 2021-07-13T00:00:00.000Z | 2021-07-13T00:00:00.000Z |
| sevd-2020-343-01 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and RemoteConnect™ | 2020-12-08T00:00:00.000Z | 2021-07-13T00:00:00.000Z |
| sevd-2020-174-01 | APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices | 2020-06-22T00:00:00.000Z | 2021-06-30T00:00:00.000Z |
| sevd-2021-159-03 | PowerLogic EGX100 and PowerLogicEGX300 | 2021-06-08T00:00:00.000Z | 2021-06-08T00:00:00.000Z |
| sevd-2021-159-01 | IGSS (Interactive Graphical SCADA System) | 2021-06-08T00:00:00.000Z | 2021-06-08T00:00:00.000Z |
| sevd-2020-161-05 | Easergy Builder | 2020-06-09T00:00:00.000Z | 2021-05-13T00:00:00.000Z |
| sevd-2020-161-04 | Easergy T300 | 2020-06-09T00:00:00.000Z | 2021-05-13T00:00:00.000Z |
| sevd-2021-130-07 | EcoStruxure Geo SCADA Expert | 2021-05-11T00:00:00.000Z | 2021-05-11T00:00:00.000Z |
| sevd-2021-130-05 | Modicon M241 & M251 Logic Controllers | 2021-05-11T00:00:00.000Z | 2021-05-11T00:00:00.000Z |
| sevd-2021-130-01 | Modicon Managed Switch | 2021-05-11T00:00:00.000Z | 2021-05-11T00:00:00.000Z |
| sevd-2020-080-01 | Modicon Controllers, EcoStruxure™ Control Expert and Unity Pro Programming Software | 2020-03-20T00:00:00.000Z | 2021-05-11T00:00:00.000Z |
| sevd-2020-315-03 | Interactive Graphical SCADA System (IGSS) | 2020-11-10T00:00:00.000Z | 2021-04-15T00:00:00.000Z |
| sevd-2020-133-03 | U.motion Servers and Touch Panels | 2020-05-12T00:00:00.000Z | 2021-04-15T00:00:00.000Z |
| sevd-2021-068-02 | PowerLogic ION7400 / PM8000 / ION9000 Power Meters | 2021-03-09T00:00:00.000Z | 2021-03-09T00:00:00.000Z |
| sevd-2021-068-01 | IGSS (Interactive Graphical SCADA System) | 2021-03-09T00:00:00.000Z | 2021-03-09T00:00:00.000Z |
| sevd-2020-252-01 | SCADAPack x70 Remote Connect and SCADAPack x70 Security Administrator | 2020-09-08T00:00:00.000Z | 2021-02-09T00:00:00.000Z |
| sevd-2021-040-01 | PowerLogic Power Metering Products | 2021-02-08T00:00:00.000Z | 2021-02-08T00:00:00.000Z |
| sevd-2020-315-05 | Modicon M100/M200/M221 Programmable Logic Controller | 2020-11-10T00:00:00.000Z | 2021-01-12T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-647005 | SSA-647005: Memory Corruption Vulnerability in OpenV2G | 2025-02-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-637914 | SSA-637914: Local Code Execution Vulnerability in Questa and ModelSim Before V2025.1 | 2025-02-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-615116 | SSA-615116: Multiple Vulnerabilities in Apogee PXC and Talon TC Devices | 2025-02-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-349422 | SSA-349422: Denial of Service Vulnerability in Industrial Real-Time (IRT) Devices | 2019-10-08T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-342348 | SSA-342348: Insufficient Session Expiration Vulnerability in Siemens Products | 2025-02-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-224824 | SSA-224824: Denial of Service Vulnerabilities in SIMATIC S7-1200 CPU Family Before V4.7 | 2025-02-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-196737 | SSA-196737: Multiple Vulnerabilities in SINEC Traffic Analyzer Before V1.2 | 2024-06-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-111547 | SSA-111547: Cleartext Storage of Sensitive Information Vulnerability in SIPROTEC 5 | 2025-02-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-404759 | SSA-404759: Information Disclosure Vulnerability in Siveillance Video Camera Drivers | 2025-01-14T00:00:00Z | 2025-01-15T00:00:00Z |
| ssa-999588 | SSA-999588: Multiple Vulnerabilities in User Management Component (UMC) Before V2.11.2 | 2023-12-12T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-871035 | SSA-871035: Session-Memory Deserialization Vulnerability in Siemens Engineering Platforms Before V19 | 2024-11-12T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-773256 | SSA-773256: Impact of Socket.IO CVE-2024-38355 on Siemens Industrial Products | 2024-09-10T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-730482 | SSA-730482: Denial of Service Vulnerability in SIMATIC WinCC | 2024-04-09T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-717113 | SSA-717113: Cross-Site Request Forgery (CSRF) Vulnerability in SIMATIC S7-1200 CPUs before V4.7 | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-690517 | SSA-690517: Multiple Vulnerabilities in SCALANCE W-700 IEEE 802.11ax Family | 2024-06-11T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-629254 | SSA-629254: Remote Code Execution Vulnerability in SIMATIC SCADA and PCS 7 systems | 2024-09-10T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-482757 | SSA-482757: Missing Immutable Root of Trust in S7-1500 CPU devices | 2023-01-10T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-446448 | SSA-446448: Denial of Service Vulnerability in PROFINET Stack Integrated on Interniche Stack | 2022-04-12T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-416411 | SSA-416411: Cross-Site Scripting Vulnerability in Industrial Edge Management | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-413565 | SSA-413565: Multiple Vulnerabilities in SCALANCE Products | 2022-12-13T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-314390 | SSA-314390: LDAP Injection Vulnerability in Mendix LDAP Module | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-979056 | SSA-979056: Out of Bounds Write Vulnerability in Parasolid | 2024-12-10T00:00:00Z | 2024-12-12T00:00:00Z |
| ssa-981975 | SSA-981975: Information Disclosure Vulnerability in Intel-CPUs (CVE-2022-40982) Impacting SIMATIC IPCs | 2023-09-12T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-962515 | SSA-962515: Out of Bounds Read Vulnerability in Industrial Products | 2024-05-14T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-881356 | SSA-881356: Multiple Memory Corruption Vulnerabilities in Simcenter Femap | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-822518 | SSA-822518: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW Before V11.0.1 on RUGGEDCOM APE1808 Devices | 2024-04-09T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-730188 | SSA-730188: Multiple File Parsing Vulnerabilities in Solid Edge V2024 | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-701627 | SSA-701627: XXE Injection Vulnerabilities in COMOS | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-645131 | SSA-645131: Multiple WRL File Parsing Vulnerabilities in Teamcenter Visualization | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-599968 | SSA-599968: Denial of Service Vulnerability in Profinet Devices | 2021-07-13T00:00:00Z | 2024-12-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20835-1 | Security update for python-pyasn1 | 2026-03-25T03:09:46Z | 2026-03-25T03:09:46Z |
| suse-su-2026:20942-1 | Security update for the initial kernel livepatch | 2026-03-24T20:36:24Z | 2026-03-24T20:36:24Z |
| suse-su-2026:20834-1 | Security update for the initial kernel livepatch | 2026-03-24T20:36:24Z | 2026-03-24T20:36:24Z |
| suse-su-2026:20928-1 | Security update for python-black | 2026-03-24T19:40:56Z | 2026-03-24T19:40:56Z |
| suse-su-2026:20927-1 | Security update for 389-ds | 2026-03-24T17:50:31Z | 2026-03-24T17:50:31Z |
| suse-su-2026:20889-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:44Z | 2026-03-24T16:49:44Z |
| suse-su-2026:20888-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:44Z | 2026-03-24T16:49:44Z |
| suse-su-2026:20866-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:44Z | 2026-03-24T16:49:44Z |
| suse-su-2026:20865-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:44Z | 2026-03-24T16:49:44Z |
| suse-su-2026:20887-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:34Z | 2026-03-24T16:49:34Z |
| suse-su-2026:20886-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:34Z | 2026-03-24T16:49:34Z |
| suse-su-2026:20864-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:34Z | 2026-03-24T16:49:34Z |
| suse-su-2026:20863-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:34Z | 2026-03-24T16:49:34Z |
| suse-su-2026:20885-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:25Z | 2026-03-24T16:49:25Z |
| suse-su-2026:20884-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:25Z | 2026-03-24T16:49:25Z |
| suse-su-2026:20862-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:25Z | 2026-03-24T16:49:25Z |
| suse-su-2026:20861-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:25Z | 2026-03-24T16:49:25Z |
| suse-su-2026:20883-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:13Z | 2026-03-24T16:49:13Z |
| suse-su-2026:20882-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:13Z | 2026-03-24T16:49:13Z |
| suse-su-2026:20860-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:13Z | 2026-03-24T16:49:13Z |
| suse-su-2026:20859-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:13Z | 2026-03-24T16:49:13Z |
| suse-su-2026:20881-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:03Z | 2026-03-24T16:49:03Z |
| suse-su-2026:20880-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:03Z | 2026-03-24T16:49:03Z |
| suse-su-2026:20858-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:03Z | 2026-03-24T16:49:03Z |
| suse-su-2026:20857-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:03Z | 2026-03-24T16:49:03Z |
| suse-su-2026:20900-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:56Z | 2026-03-24T16:48:56Z |
| suse-su-2026:20899-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:56Z | 2026-03-24T16:48:56Z |
| suse-su-2026:20856-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:56Z | 2026-03-24T16:48:56Z |
| suse-su-2026:20855-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:56Z | 2026-03-24T16:48:56Z |
| suse-su-2026:20898-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:44Z | 2026-03-24T16:48:44Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:1904 | Important: resource-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:22:54Z |
| alsa-2026:1905 | Important: fence-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:20:49Z |
| alsa-2026:1906 | Important: fence-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:07:49Z |
| alsa-2026:1907 | Important: opentelemetry-collector security update | 2026-02-04T00:00:00Z | 2026-02-10T07:58:47Z |
| alsa-2026:1908 | Important: opentelemetry-collector security update | 2026-02-04T00:00:00Z | 2026-02-10T07:56:31Z |
| alsa-2026:1913 | Moderate: util-linux security update | 2026-02-04T00:00:00Z | 2026-02-10T07:54:49Z |
| alsa-2026:1939 | Important: python3.12-wheel security update | 2026-02-04T00:00:00Z | 2026-02-10T07:52:01Z |
| alsa-2026:2048 | Important: freerdp security update | 2026-02-05T00:00:00Z | 2026-02-10T07:49:11Z |
| alsa-2026:2220 | Important: thunderbird security update | 2026-02-09T00:00:00Z | 2026-02-10T07:45:12Z |
| alsa-2026:2286 | Important: thunderbird security update | 2026-02-09T00:00:00Z | 2026-02-09T12:36:11Z |
| alsa-2026:2264 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-09T11:47:42Z |
| alsa-2026:2271 | Important: firefox security update | 2026-02-09T00:00:00Z | 2026-02-09T11:39:07Z |
| alsa-2026:2215 | Important: libsoup security update | 2026-02-09T00:00:00Z | 2026-02-09T11:36:21Z |
| alsa-2026:2124 | Important: osbuild-composer security update | 2026-02-05T00:00:00Z | 2026-02-09T11:33:23Z |
| alsa-2026:2039 | Important: fontforge security update | 2026-02-05T00:00:00Z | 2026-02-06T21:29:46Z |
| alsa-2026:1831 | Moderate: qemu-kvm security update | 2026-02-03T00:00:00Z | 2026-02-06T17:34:44Z |
| alsa-2026:1837 | Moderate: osbuild-composer security update | 2026-02-03T00:00:00Z | 2026-02-06T17:33:01Z |
| alsa-2026:2182 | Important: libsoup3 security update | 2026-02-05T00:00:00Z | 2026-02-06T17:31:52Z |
| alsa-2026:1842 | Important: nodejs24 security update | 2026-02-03T00:00:00Z | 2026-02-06T17:30:17Z |
| alsa-2026:1843 | Important: nodejs22 security update | 2026-02-03T00:00:00Z | 2026-02-06T17:27:45Z |
| alsa-2026:2081 | Important: freerdp security update | 2026-02-05T00:00:00Z | 2026-02-06T08:53:33Z |
| alsa-2026:2090 | Important: python3.12-wheel security update | 2026-02-05T00:00:00Z | 2026-02-06T08:49:17Z |
| alsa-2026:2128 | Moderate: python3 security update | 2026-02-05T00:00:00Z | 2026-02-06T08:39:22Z |
| alsa-2026:1617 | Moderate: kernel security update | 2026-02-02T00:00:00Z | 2026-02-06T08:24:53Z |
| alsa-2026:2042 | Important: brotli security update | 2026-02-05T00:00:00Z | 2026-02-05T12:08:23Z |
| alsa-2026:1690 | Important: kernel security update | 2026-02-02T00:00:00Z | 2026-02-05T09:56:48Z |
| alsa-2026:1902 | Important: python-wheel security update | 2026-02-04T00:00:00Z | 2026-02-05T09:52:44Z |
| alsa-2026:1825 | Moderate: curl security update | 2026-02-03T00:00:00Z | 2026-02-05T09:50:43Z |
| alsa-2026:1828 | Moderate: python3.12 security update | 2026-02-03T00:00:00Z | 2026-02-05T09:48:47Z |
| alsa-2026:1696 | Moderate: util-linux security update | 2026-02-02T00:00:00Z | 2026-02-03T11:05:12Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2026-2 | Heap-buffer-overflow in cmt_mpack_consume_uint_tag | 2026-01-03T00:15:15.907754Z | 2026-01-03T00:15:15.908130Z |
| osv-2024-395 | Use-of-uninitialized-value in pcapint_filter_with_aux_data | 2024-05-01T00:04:54.392345Z | 2025-12-31T14:19:24.719836Z |
| osv-2024-793 | Heap-buffer-overflow in H5HL__fl_deserialize | 2024-08-16T00:01:45.237305Z | 2025-12-31T14:19:11.515108Z |
| osv-2023-444 | Heap-buffer-overflow in opj_jp2_apply_pclr | 2023-05-31T14:02:00.753503Z | 2025-12-31T14:18:46.286556Z |
| osv-2025-1049 | Heap-buffer-overflow in unsigned char* std::__1::vector<unsigned char, std::__1::allocator<unsigned char | 2025-12-31T00:18:06.669541Z | 2025-12-31T00:18:06.670109Z |
| osv-2025-1039 | UNKNOWN WRITE in fuzz_regexp | 2025-12-29T00:18:31.417791Z | 2025-12-29T00:18:31.418390Z |
| osv-2023-137 | Heap-buffer-overflow in OT::Layout::Common::Coverage::get_population | 2023-03-03T13:00:38.278632Z | 2025-12-28T14:11:53.546267Z |
| osv-2025-1020 | Heap-buffer-overflow in mmcall | 2025-12-25T00:17:49.020029Z | 2025-12-25T00:17:49.020471Z |
| osv-2025-1018 | Stack-buffer-overflow in lre_exec | 2025-12-25T00:02:56.807884Z | 2025-12-25T00:02:56.808867Z |
| osv-2025-1016 | Use-of-uninitialized-value in js_create_function | 2025-12-24T00:15:30.844439Z | 2025-12-24T00:15:30.844983Z |
| osv-2024-1348 | Heap-buffer-overflow in glslang::HlslGrammar::acceptDeclaration | 2024-12-10T00:00:50.788Z | 2025-12-23T15:50:48.626100Z |
| osv-2024-1355 | UNKNOWN READ in glslang::TInfoSinkBase::location | 2024-12-10T00:08:00.540533Z | 2025-12-23T15:50:47.917708Z |
| osv-2024-1346 | UNKNOWN READ in glslang::HlslTokenStream::advanceToken | 2024-12-10T00:00:20.380006Z | 2025-12-23T15:50:47.126469Z |
| osv-2024-1343 | Container-overflow in glslang::HlslParseContext::decomposeIntrinsic | 2024-11-27T00:13:21.103465Z | 2025-12-23T15:50:45.708425Z |
| osv-2025-565 | Heap-buffer-overflow in pcpp::IPv6Address::IPv6Address | 2025-07-21T00:09:57.314960Z | 2025-12-22T14:22:23.333531Z |
| osv-2024-953 | UNKNOWN READ in pcpp::PcapNgFileReaderDevice::getNextPacket | 2024-08-16T00:13:41.933683Z | 2025-12-22T14:21:34.886075Z |
| osv-2024-954 | Use-of-uninitialized-value in pcpp::MplsLayer::toString | 2024-08-16T00:13:43.824630Z | 2025-12-22T14:21:33.246456Z |
| osv-2024-816 | Use-of-uninitialized-value in pcpp::SSLClientHelloMessage::ClientHelloTLSFingerprint::toString | 2024-08-16T00:02:36.618439Z | 2025-12-22T14:21:20.173609Z |
| osv-2024-812 | Use-of-uninitialized-value in pcpp::PcapFileWriterDevice::writePacket | 2024-08-16T00:02:26.387902Z | 2025-12-22T14:21:19.473015Z |
| osv-2024-360 | Heap-buffer-overflow in pcpp::TelnetLayer::getFieldLen | 2024-04-30T00:05:53.016170Z | 2025-12-22T14:20:47.423159Z |
| osv-2024-369 | Segv on unknown address in pcpp::IPv6Layer::~IPv6Layer | 2024-04-30T00:07:01.572543Z | 2025-12-22T14:20:46.950585Z |
| osv-2024-334 | Heap-buffer-overflow in readParsedPacket | 2024-04-30T00:01:24.720399Z | 2025-12-22T14:20:39.449858Z |
| osv-2023-952 | Heap-buffer-overflow in back_passDoAction | 2023-10-02T13:03:05.682426Z | 2025-12-22T14:19:45.912864Z |
| osv-2024-1023 | Use-of-uninitialized-value in pcpp::SomeIpLayer::parseSomeIpLayer | 2024-08-16T00:17:01.984623Z | 2025-12-22T14:18:12.391769Z |
| osv-2025-718 | Heap-buffer-overflow in pcpp::ArpLayer::toString | 2025-09-10T00:08:49.177204Z | 2025-12-22T14:17:36.857810Z |
| osv-2023-1306 | Heap-use-after-free in pcpp::TLVRecordReader<pcpp::DhcpOption>::getTLVRecord | 2023-12-15T00:10:21.932370Z | 2025-12-22T14:15:50.738544Z |
| osv-2023-1232 | Heap-buffer-overflow in pcpp::TLSECPointFormatExtension::getECPointFormatList | 2023-11-28T13:01:23.208343Z | 2025-12-22T14:15:49.713990Z |
| osv-2023-1150 | Heap-buffer-overflow in pcpp::computeChecksum | 2023-11-13T13:01:45.923889Z | 2025-12-22T14:15:48.387128Z |
| osv-2022-819 | Use-of-uninitialized-value in init_main_qtable | 2022-09-02T00:00:49.565627Z | 2025-12-22T14:15:44.411248Z |
| osv-2025-994 | Heap-buffer-overflow in rx_icmp | 2025-12-18T00:00:43.710332Z | 2025-12-21T14:32:46.078182Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0035 | Multiple soundness issues in `macroquad` | 2025-04-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0034 | soundness issue and unmaintained | 2025-05-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0033 | Public API without sufficient bounds checking | 2025-03-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0032 | Safe API can cause heap-buffer-overflow | 2025-03-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0031 | Unsound public API in unmaintained crate | 2025-04-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0027 | Panic in mp3-metadata due to the lack of bounds checking | 2025-04-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0024 | crossbeam-channel: double free on Drop | 2025-04-08T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0023 | Broadcast channel calls clone in parallel, but does not require `Sync` | 2025-04-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0022 | Use-After-Free in `Md::fetch` and `Cipher::fetch` | 2025-04-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0020 | Risk of buffer overflow in `PyString::from_object` | 2025-04-01T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0019 | `array-init-cursor` in version 0.2.0 and below is unsound when used with types that implement `Drop` | 2025-03-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0018 | Potential out-of-bounds read with a malformed ELF file and the HashTable API. | 2025-03-26T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0016 | Use after free in `Parc` and `Prc` due to missing lifetime constraints | 2025-03-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0015 | Denial of Service via malicious Web Push endpoint | 2025-02-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0009 | Some AES functions may panic when overflow checking is enabled. | 2025-03-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0008 | Openh264 Decoding Functions Heap Overflow Vulnerability | 2025-02-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0006 | Hickory DNS failure to verify self-signed RRSIG for DNSKEYs | 2025-02-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0005 | Out of bounds write triggered by crafted coverage data | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0004 | ssl::select_next_proto use after free | 2025-02-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0003 | Segmentation fault due to lack of bound check | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0002 | Segmentation fault due to lack of bound check | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0443 | webp crate may expose memory contents when encoding an image | 2024-09-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0442 | Dump Undefined Memory by `JitDumpFile` | 2024-07-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0437 | Crash due to uncontrolled recursion in protobuf crate | 2024-12-12T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0435 | Unsound usages of `Vec::from_raw_parts` | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0431 | Unsound usages of `core::slice::from_raw_parts` | 2024-12-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0430 | Use of insecure cryptographic algorithms | 2024-12-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0429 | Unsoundness in `Iterator` and `DoubleEndedIterator` impls for `glib::VariantStrIter` | 2024-03-30T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0428 | Undefined behaviour in `kvm_ioctls::ioctls::vm::VmFd::create_device` | 2024-12-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0426 | Unsound usages of `u8` type casting | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-tomcat-2025-52520 | Apache Tomcat: DoS via integer overflow in multipart file upload | 2025-07-16T08:19:00.271Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-48989 | Apache Tomcat: h2 DoS - Made You Reset | 2025-08-18T08:14:11.138Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-48988 | Apache Tomcat: FileUpload large number of parts with headers DoS | 2025-07-10T10:47:06.961Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-46701 | Apache Tomcat: Security constraint bypass for CGI scripts | 2025-07-10T10:47:00.568Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-31650 | Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame | 2025-04-30T05:56:04.703Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2024-54677 | Apache Tomcat: DoS in examples web application | 2025-07-10T10:46:30.955Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2024-50379 | Apache Tomcat: RCE due to TOCTOU issue in JSP compilation | 2025-07-10T10:45:55.643Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2024-23672 | Apache Tomcat: WebSocket DoS with incomplete closing handshake | 2025-07-17T08:09:47.503Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2023-34981 | Apache Tomcat: AJP response header mix-up | 2024-03-06T11:08:35.200Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2022-45143 | Apache Tomcat: JsonErrorReportValve escaping | 2024-03-06T11:09:02.789Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2022-42252 | Apache Tomcat request smuggling via malformed content-length | 2024-03-06T11:09:09.680Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2022-34305 | XSS in examples web application | 2024-03-06T11:09:17.789Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2022-29885 | EncryptInterceptor does not provide complete protection on insecure networks | 2024-03-06T11:09:24.492Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2022-23181 | Local privilege escalation with FileStore | 2024-03-06T11:09:36.902Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-43980 | Apache Tomcat: Information disclosure | 2024-03-06T11:09:43.693Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-42340 | DoS via memory leak with WebSocket connections | 2024-03-06T11:09:50.280Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-41079 | Apache Tomcat DoS with unexpected TLS packet | 2024-03-06T11:09:56.377Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-33037 | Incorrect Transfer-Encoding handling with HTTP/1.0 | 2024-03-06T11:10:01.262Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-30640 | Auth weakness in JNDIRealm | 2024-03-06T11:10:06.381Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-25329 | Incomplete fix for CVE-2020-9484 | 2024-03-06T11:10:17.511Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-25122 | Apache Tomcat h2c request mix-up | 2024-03-06T11:10:22.561Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-24122 | Apache Tomcat information disclosure | 2024-03-06T11:10:27.482Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2020-9484 | 2024-03-06T11:10:32.165Z | 2026-03-20T09:47:33.381Z | |
| bit-tomcat-2020-17527 | Apache Tomcat: Request header mix-up between HTTP/2 streams | 2024-03-06T11:11:37.082Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2020-13943 | 2024-03-06T11:11:40.396Z | 2026-03-20T09:47:33.381Z | |
| bit-tomcat-2020-13935 | 2024-03-06T11:11:44.067Z | 2026-03-20T09:47:33.381Z | |
| bit-tomcat-2020-13934 | 2024-03-06T11:11:47.794Z | 2026-03-20T09:47:33.381Z | |
| bit-tomcat-2020-11996 | 2024-03-06T11:11:51.472Z | 2026-03-20T09:47:33.381Z | |
| bit-thrift-2020-13949 | 2026-03-20T09:20:15.378Z | 2026-03-20T09:47:33.381Z | |
| bit-spark-2025-54920 | Apache Spark: Spark History Server Code Execution Vulnerability | 2026-03-18T08:54:07.780Z | 2026-03-20T09:47:33.381Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-pk48502 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-68121 applied in versions: 2.3.0-r0 | 2026-04-01T09:45:06.972039Z | 2026-03-18T08:57:33Z |
| cleanstart-2026-fx51482 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.5.1-r0, 1.5.1-r1 | 2026-04-01T09:45:37.795716Z | 2026-03-18T07:43:14Z |
| cleanstart-2026-ow14897 | Security fixes for CVE-2025-25285, CVE-2025-69873, CVE-2026-21637, ghsa-23c5-xmqv-rm74, ghsa-72xf-g2v4-qvf3, ghsa-7r86-cg39-jmmj, ghsa-pfrx-2q88-qq97, ghsa-rc47-6667-2j5j, ghsa-rmvr-2pp2-xj38 applied in versions: 2.5.10-r2, 2.5.10-r3, 2.6.0-r1 | 2026-04-01T09:45:25.624227Z | 2026-03-18T07:42:00Z |
| cleanstart-2026-lm72903 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 4.5.1-r0 | 2026-04-01T09:45:35.196573Z | 2026-03-18T05:58:10Z |
| cleanstart-2026-ei62818 | Security fixes for ghsa-3677-xxcr-wjqv, ghsa-qqpg-mvqg-649v, ghsa-x44p-gvrj-pj2r applied in versions: 2.7.2-r0 | 2026-04-01T09:45:31.119946Z | 2026-03-18T05:57:33Z |
| cleanstart-2026-kr58137 | Security fixes for CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, ghsa-6v2p-p543-phr9 applied in versions: 0.8.19-r0, 0.8.19-r1, 0.8.19-r2 | 2026-04-01T09:46:06.671153Z | 2026-03-17T13:57:04Z |
| cleanstart-2026-ie15850 | Security fixes for CVE-2023-32762, CVE-2023-32763 applied in versions: 6.5.0-r5 | 2026-04-01T09:45:56.402696Z | 2026-03-17T13:11:05Z |
| cleanstart-2026-do09088 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-67721, CVE-2025-68119, CVE-2025-68121, CVE-2026-1225, CVE-2026-1605, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-72hv-8253-57qq applied in versions: 479-r0 | 2026-04-01T09:47:03.615107Z | 2026-03-17T07:41:03Z |
| cleanstart-2026-fz57809 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.15.1-r0 | 2026-04-01T09:46:36.079269Z | 2026-03-17T05:43:20Z |
| cleanstart-2026-bw46578 | Security fixes for CVE-2014-0138, CVE-2014-0139, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9594, CVE-2017-1000099, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000257, CVE-2017-2629, CVE-2017-7407, CVE-2017-7468, CVE-2017-8816, CVE-2017-8817, CVE-2017-8818, CVE-2018-0500, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000300, CVE-2018-1000301, CVE-2018-14618, CVE-2018-16839, CVE-2018-16840, CVE-2018-16842, CVE-2018-16890, CVE-2019-3822, CVE-2019-3823, CVE-2019-5435, CVE-2019-5436, CVE-2019-5481, CVE-2019-5482, CVE-2020-8169, CVE-2020-8177, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2021-22876, CVE-2021-22890, CVE-2021-22897, CVE-2021-22898, CVE-2021-22901, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2022-22576, CVE-2022-27774, CVE-2022-27775, CVE-2022-27776, CVE-2022-27778, CVE-2022-27779, CVE-2022-27780, CVE-2022-27781, CVE-2022-27782, CVE-2022-30115, CVE-2022-32205, CVE-2022-32206, CVE-2022-32207, CVE-2022-32208, CVE-2022-32221, CVE-2022-35252, CVE-2022-35260, CVE-2022-42915, CVE-2022-42916, CVE-2022-43551, CVE-2022-43552, CVE-2023-23914, CVE-2023-23915, CVE-2023-23916, CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27537, CVE-2023-27538, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-38039, CVE-2023-38545, CVE-2023-38546, CVE-2023-46218, CVE-2023-46219, CVE-2024-0853, CVE-2024-11053, CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-6197, CVE-2024-6874, CVE-2024-7264, CVE-2024-8096, CVE-2024-9681, CVE-2025-0167, CVE-2025-0665, CVE-2025-0725, CVE-2025-10148, CVE-2025-4947, CVE-2025-5025, CVE-2025-5399, CVE-2025-9086, CVE-2026-24515, CVE-2026-25210 applied in versions: 0, 7.36.0-r0, 7.50.1-r0, 7.50.2-r0, 7.50.3-r0, 7.51.0-r0, 7.52.1-r0, 7.53.0-r0, 7.53.1-r2, 7.54.0-r0, 7.55.0-r0, 7.56.1-r0, 7.57.0-r0, 7.59.0-r0, 7.60.0-r0, 7.61.0-r0, 7.61.1-r0, 7.62.0-r0, 7.64.0-r0, 7.65.0-r0, 7.66.0-r0, 7.71.0-r0, 7.72.0-r0, 7.74.0-r0, 7.76.0-r0, 7.77.0-r0, 7.78.0-r0, 7.79.0-r0, 7.83.0-r0, 7.83.1-r0, 7.84.0-r0, 7.85.0-r0, 7.86.0-r0, 7.87.0-r0, 7.88.0-r0, 8.0.0-r0, 8.1.0-r0, 8.10.0-r0, 8.11.0-r0, 8.11.1-r0, 8.12.0-r0, 8.14.0-r0, 8.14.1-r0, 8.15.0-r0, 8.16.0-r0, 8.3.0-r0, 8.4.0-r0, 8.5.0-r0, 8.6.0-r0, 8.7.1-r0, 8.9.0-r0, 8.9.1-r0 | 2026-04-01T09:55:26.061155Z | 2026-03-16T17:22:25Z |
| cleanstart-2026-ay18527 | Security fixes for CVE-2014-0138, CVE-2014-0139, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9594, CVE-2017-1000099, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000257, CVE-2017-2629, CVE-2017-7407, CVE-2017-7468, CVE-2017-8816, CVE-2017-8817, CVE-2017-8818, CVE-2018-0500, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000300, CVE-2018-1000301, CVE-2018-14618, CVE-2018-16839, CVE-2018-16840, CVE-2018-16842, CVE-2018-16890, CVE-2019-3822, CVE-2019-3823, CVE-2019-5435, CVE-2019-5436, CVE-2019-5481, CVE-2019-5482, CVE-2020-8169, CVE-2020-8177, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2021-22876, CVE-2021-22890, CVE-2021-22897, CVE-2021-22898, CVE-2021-22901, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2022-22576, CVE-2022-27774, CVE-2022-27775, CVE-2022-27776, CVE-2022-27778, CVE-2022-27779, CVE-2022-27780, CVE-2022-27781, CVE-2022-27782, CVE-2022-30115, CVE-2022-32205, CVE-2022-32206, CVE-2022-32207, CVE-2022-32208, CVE-2022-32221, CVE-2022-35252, CVE-2022-35260, CVE-2022-42915, CVE-2022-42916, CVE-2022-43551, CVE-2022-43552, CVE-2023-23914, CVE-2023-23915, CVE-2023-23916, CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27537, CVE-2023-27538, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-38039, CVE-2023-38545, CVE-2023-38546, CVE-2023-46218, CVE-2023-46219, CVE-2024-0853, CVE-2024-11053, CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-6197, CVE-2024-6874, CVE-2024-7264, CVE-2024-8096, CVE-2024-9681, CVE-2025-0167, CVE-2025-0665, CVE-2025-0725, CVE-2025-10148, CVE-2025-4947, CVE-2025-5025, CVE-2025-5399, CVE-2025-9086, CVE-2026-24515, CVE-2026-25210 applied in versions: 0, 7.36.0-r0, 7.50.1-r0, 7.50.2-r0, 7.50.3-r0, 7.51.0-r0, 7.52.1-r0, 7.53.0-r0, 7.53.1-r2, 7.54.0-r0, 7.55.0-r0, 7.56.1-r0, 7.57.0-r0, 7.59.0-r0, 7.60.0-r0, 7.61.0-r0, 7.61.1-r0, 7.62.0-r0, 7.64.0-r0, 7.65.0-r0, 7.66.0-r0, 7.71.0-r0, 7.72.0-r0, 7.74.0-r0, 7.76.0-r0, 7.77.0-r0, 7.78.0-r0, 7.79.0-r0, 7.83.0-r0, 7.83.1-r0, 7.84.0-r0, 7.85.0-r0, 7.86.0-r0, 7.87.0-r0, 7.88.0-r0, 8.0.0-r0, 8.1.0-r0, 8.10.0-r0, 8.11.0-r0, 8.11.1-r0, 8.12.0-r0, 8.14.0-r0, 8.14.1-r0, 8.15.0-r0, 8.17.0-r0, 8.3.0-r0, 8.4.0-r0, 8.5.0-r0, 8.6.0-r0, 8.7.1-r0, 8.9.0-r0, 8.9.1-r0 | 2026-04-01T09:55:26.067667Z | 2026-03-16T17:21:19Z |
| cleanstart-2026-lq42192 | Security fixes for CVE-2014-0138, CVE-2014-0139, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9594, CVE-2017-1000099, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000257, CVE-2017-2629, CVE-2017-7407, CVE-2017-7468, CVE-2017-8816, CVE-2017-8817, CVE-2017-8818, CVE-2018-0500, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000300, CVE-2018-1000301, CVE-2018-14618, CVE-2018-16839, CVE-2018-16840, CVE-2018-16842, CVE-2018-16890, CVE-2019-3822, CVE-2019-3823, CVE-2019-5435, CVE-2019-5436, CVE-2019-5481, CVE-2019-5482, CVE-2020-8169, CVE-2020-8177, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2021-22876, CVE-2021-22890, CVE-2021-22897, CVE-2021-22898, CVE-2021-22901, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2022-22576, CVE-2022-27774, CVE-2022-27775, CVE-2022-27776, CVE-2022-27778, CVE-2022-27779, CVE-2022-27780, CVE-2022-27781, CVE-2022-27782, CVE-2022-30115, CVE-2022-32205, CVE-2022-32206, CVE-2022-32207, CVE-2022-32208, CVE-2022-32221, CVE-2022-35252, CVE-2022-35260, CVE-2022-42915, CVE-2022-42916, CVE-2022-43551, CVE-2022-43552, CVE-2023-23914, CVE-2023-23915, CVE-2023-23916, CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27537, CVE-2023-27538, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-38039, CVE-2023-38545, CVE-2023-38546, CVE-2023-46218, CVE-2023-46219, CVE-2024-0853, CVE-2024-11053, CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-6197, CVE-2024-6874, CVE-2024-7264, CVE-2024-8096, CVE-2024-9681, CVE-2025-0167, CVE-2025-0665, CVE-2025-0725, CVE-2025-10148, CVE-2025-4947, CVE-2025-5025, CVE-2025-5399, CVE-2025-9086, CVE-2026-24515, CVE-2026-25210 applied in versions: 0, 7.36.0-r0, 7.50.1-r0, 7.50.2-r0, 7.50.3-r0, 7.51.0-r0, 7.52.1-r0, 7.53.0-r0, 7.53.1-r2, 7.54.0-r0, 7.55.0-r0, 7.56.1-r0, 7.57.0-r0, 7.59.0-r0, 7.60.0-r0, 7.61.0-r0, 7.61.1-r0, 7.62.0-r0, 7.64.0-r0, 7.65.0-r0, 7.66.0-r0, 7.71.0-r0, 7.72.0-r0, 7.74.0-r0, 7.76.0-r0, 7.77.0-r0, 7.78.0-r0, 7.79.0-r0, 7.83.0-r0, 7.83.1-r0, 7.84.0-r0, 7.85.0-r0, 7.86.0-r0, 7.87.0-r0, 7.88.0-r0, 8.0.0-r0, 8.1.0-r0, 8.10.0-r0, 8.11.0-r0, 8.11.1-r0, 8.12.0-r0, 8.14.0-r0, 8.14.1-r0, 8.15.0-r0, 8.18.0-r0, 8.3.0-r0, 8.4.0-r0, 8.5.0-r0, 8.6.0-r0, 8.7.1-r0, 8.9.0-r0, 8.9.1-r0 | 2026-04-01T09:55:24.898216Z | 2026-03-16T17:19:31Z |
| cleanstart-2026-ol32822 | Security fixes for CVE-2024-36537, CVE-2025-47910, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2026-25518, ghsa-gx3x-vq4p-mhhv applied in versions: 2.4.0-r1, 2.4.0-r2 | 2026-04-01T09:48:17.130268Z | 2026-03-16T16:39:54Z |
| cleanstart-2026-kw35511 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 5.0.18-r6, 5.0.18-r7 | 2026-04-01T09:48:16.623063Z | 2026-03-16T16:36:08Z |
| cleanstart-2026-fj01373 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68119, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-9h8m-3fm2-qjrq, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.34.0-r0, 0.34.0-r1, 0.34.0-r2 | 2026-04-01T09:49:20.210015Z | 2026-03-16T11:05:40Z |
| cleanstart-2026-jk47870 | Security fixes for CVE-2025-66614, CVE-2026-1225, CVE-2026-24281, CVE-2026-24308, CVE-2026-24733, ghsa-6rw7-vpxm-498p, ghsa-73rr-hh4g-fpgx, ghsa-8qq5-rm4j-mr97, ghsa-wqch-xfxh-vrr4 applied in versions: 4.2.1.1-r1, 4.3.1-r0 | 2026-04-01T09:49:35.155892Z | 2026-03-16T09:42:46Z |
| cleanstart-2026-aq75465 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-1229, CVE-2026-27141 applied in versions: 3.19.0-r0, 4.0.0-r0, 4.0.1-r0, 4.1.1-r1 | 2026-04-01T09:50:20.419820Z | 2026-03-16T05:35:26Z |
| cleanstart-2026-mk39503 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-1229, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 3.19.0-r0, 4.0.1-r0, 4.1.0-r0, 4.1.0-r1 | 2026-04-01T09:50:25.337048Z | 2026-03-16T05:34:59Z |
| cleanstart-2026-fb05615 | Security fixes for CVE-2025-15558, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2026-27141, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x, ghsa-p436-gjf2-799p applied in versions: 2.13.4-r0, 2.13.4-r1, 2.13.4-r2 | 2026-04-01T09:50:57.277339Z | 2026-03-15T13:46:33Z |
| cleanstart-2026-nv84668 | Security fixes for ghsa-84h7-rjj3-6jx4, ghsa-vc5p-v9hr-52mj applied in versions: 4.1.1-r1 | 2026-04-01T09:51:29.848674Z | 2026-03-13T13:15:35Z |
| cleanstart-2026-na08955 | Security fixes for ghsa-84h7-rjj3-6jx4, ghsa-vc5p-v9hr-52mj applied in versions: 4.1.1-r1 | 2026-04-01T09:51:24.306982Z | 2026-03-13T13:15:35Z |
| cleanstart-2026-qa91937 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-r6j8-c6r2-37rr applied in versions: 0.18.3-r1, 0.18.3-r2 | 2026-04-01T09:52:00.878696Z | 2026-03-13T12:44:37Z |
| cleanstart-2026-of85770 | Security fixes for CVE-2014-0138, CVE-2014-0139, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9594, CVE-2017-1000099, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000257, CVE-2017-2629, CVE-2017-7407, CVE-2017-7468, CVE-2017-8816, CVE-2017-8817, CVE-2017-8818, CVE-2018-0500, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000300, CVE-2018-1000301, CVE-2018-14618, CVE-2018-16839, CVE-2018-16840, CVE-2018-16842, CVE-2018-16890, CVE-2019-3822, CVE-2019-3823, CVE-2019-5435, CVE-2019-5436, CVE-2019-5481, CVE-2019-5482, CVE-2020-8169, CVE-2020-8177, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2021-22876, CVE-2021-22890, CVE-2021-22897, CVE-2021-22898, CVE-2021-22901, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2022-22576, CVE-2022-27774, CVE-2022-27775, CVE-2022-27776, CVE-2022-27778, CVE-2022-27779, CVE-2022-27780, CVE-2022-27781, CVE-2022-27782, CVE-2022-30115, CVE-2022-32205, CVE-2022-32206, CVE-2022-32207, CVE-2022-32208, CVE-2022-32221, CVE-2022-35252, CVE-2022-35260, CVE-2022-42915, CVE-2022-42916, CVE-2022-43551, CVE-2022-43552, CVE-2023-23914, CVE-2023-23915, CVE-2023-23916, CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27537, CVE-2023-27538, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-38039, CVE-2023-38545, CVE-2023-38546, CVE-2023-46218, CVE-2023-46219, CVE-2024-0853, CVE-2024-11053, CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-6197, CVE-2024-6874, CVE-2024-7264, CVE-2024-8096, CVE-2024-9681, CVE-2025-0167, CVE-2025-0665, CVE-2025-0725, CVE-2025-10148, CVE-2025-4947, CVE-2025-5025, CVE-2025-5399, CVE-2025-9086 applied in versions: 0, 7.36.0-r0, 7.50.1-r0, 7.50.2-r0, 7.50.3-r0, 7.51.0-r0, 7.52.1-r0, 7.53.0-r0, 7.53.1-r2, 7.54.0-r0, 7.55.0-r0, 7.56.1-r0, 7.57.0-r0, 7.59.0-r0, 7.60.0-r0, 7.61.0-r0, 7.61.1-r0, 7.62.0-r0, 7.64.0-r0, 7.65.0-r0, 7.66.0-r0, 7.71.0-r0, 7.72.0-r0, 7.74.0-r0, 7.76.0-r0, 7.77.0-r0, 7.78.0-r0, 7.79.0-r0, 7.83.0-r0, 7.83.1-r0, 7.84.0-r0, 7.85.0-r0, 7.86.0-r0, 7.87.0-r0, 7.88.0-r0, 8.0.0-r0, 8.1.0-r0, 8.10.0-r0, 8.11.0-r0, 8.11.1-r0, 8.12.0-r0, 8.14.0-r0, 8.14.1-r0, 8.15.0-r0, 8.3.0-r0, 8.4.0-r0, 8.5.0-r0, 8.6.0-r0, 8.7.1-r0, 8.9.0-r0, 8.9.1-r0 | 2026-04-01T09:57:04.724781Z | 2026-03-13T12:43:33Z |
| cleanstart-2026-qk02462 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.2.7-r1 | 2026-04-01T09:54:36.812395Z | 2026-03-13T12:42:57Z |
| cleanstart-2026-ox06978 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.1-r1 | 2026-04-01T09:53:21.567659Z | 2026-03-13T12:42:57Z |
| cleanstart-2026-nj43712 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.1-r0, 3.3.1-r1 | 2026-04-01T09:56:40.531114Z | 2026-03-13T12:42:57Z |
| cleanstart-2026-gq03231 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-24051, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.2.7-r1 | 2026-04-01T09:56:49.752050Z | 2026-03-13T12:42:57Z |
| cleanstart-2026-gv56027 | Security fixes for ghsa-58pv-8j8x-9vj2, ghsa-jm66-cg57-jjv5, ghsa-mrfv-m5wm-5w6w applied in versions: 2.81.0-r0 | 2026-04-01T09:56:19.014864Z | 2026-03-13T07:11:43Z |
| cleanstart-2026-du32240 | Security fixes for CVE-2026-2391, CVE-2026-26960, CVE-2026-29786, CVE-2026-31802, ghsa-34x7-hfp2-rc4v, ghsa-5359-pvf2-pw78, ghsa-73rr-hh4g-fpgx, ghsa-8qq5-rm4j-mr97, ghsa-r6q2-hw4h-h46w applied in versions: 4.2.1.1-r1, 4.2.1.1-r2, 4.3.0.1-r0, 4.3.1-r0 | 2026-04-01T09:57:23.228226Z | 2026-03-12T13:10:45Z |
| cleanstart-2026-mq02912 | Security fixes for CVE-2017-7529, CVE-2018-16845, CVE-2019-20372, CVE-2019-9511, CVE-2019-9513, CVE-2019-9516, CVE-2021-23017, CVE-2021-46461, CVE-2021-46462, CVE-2021-46463, CVE-2022-25139, CVE-2022-3638, CVE-2022-41741, CVE-2022-41742, CVE-2023-44487, CVE-2024-31079, CVE-2024-32760, CVE-2024-34161, CVE-2024-35200, CVE-2024-7347, CVE-2025-23419 applied in versions: 0, 1.12.1-r0, 1.14.1-r0, 1.16.1-r0, 1.16.1-r6, 1.20.1-r0, 1.20.1-r1, 1.20.2-r2, 1.22.1-r0, 1.24.0-r12, 1.26.2-r0, 1.26.3-r0 | 2026-04-01T09:58:43.603060Z | 2026-03-12T13:09:34Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2020-ALE-005 | Multiples vulnérabilités dans le serveur de passerelle RDP de Windows | 2020-01-14T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-ale-003 | Vulnérabilité dans les produits Mozilla | 2020-01-09T00:00:00.000000 | 2020-01-20T00:00:00.000000 |
| CERTFR-2020-ALE-003 | Vulnérabilité dans les produits Mozilla | 2020-01-09T00:00:00.000000 | 2020-01-20T00:00:00.000000 |
| certfr-2020-ale-004 | Vulnérabilité dans Microsoft Windows | 2020-01-14T00:00:00.000000 | 2020-01-17T00:00:00.000000 |
| CERTFR-2020-ALE-004 | Vulnérabilité dans Microsoft Windows | 2020-01-14T00:00:00.000000 | 2020-01-17T00:00:00.000000 |
| certfr-2019-ale-015 | Multiples vulnérabilités dans Google Chrome | 2019-11-04T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2019-ale-014 | Vulnérabilité dans PHP | 2019-10-29T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| CERTFR-2019-ALE-015 | Multiples vulnérabilités dans Google Chrome | 2019-11-04T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| CERTFR-2019-ALE-014 | Vulnérabilité dans PHP | 2019-10-29T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2019-ale-013 | Vulnérabilité dans Microsoft Internet Explorer | 2019-09-24T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-012 | Multiples vulnérabilités dans Microsoft Remote Desktop Services | 2019-08-14T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-006 | Vulnérabilité dans Microsoft Remote Desktop Services | 2019-05-22T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| CERTFR-2019-ALE-013 | Vulnérabilité dans Microsoft Internet Explorer | 2019-09-24T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| CERTFR-2019-ALE-012 | Multiples vulnérabilités dans Microsoft Remote Desktop Services | 2019-08-14T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| CERTFR-2019-ALE-006 | Vulnérabilité dans Microsoft Remote Desktop Services | 2019-05-22T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-011 | Vulnérabilité dans Oracle WebLogic | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-010 | Vulnérabilité dans Mozilla Firefox | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-009 | Vulnérabilité dans Exim | 2019-06-11T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-008 | Vulnérabilité dans Microsoft SharePoint Server | 2019-05-29T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| CERTFR-2019-ALE-011 | Vulnérabilité dans Oracle WebLogic | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| CERTFR-2019-ALE-010 | Vulnérabilité dans Mozilla Firefox | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| CERTFR-2019-ALE-009 | Vulnérabilité dans Exim | 2019-06-11T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| CERTFR-2019-ALE-008 | Vulnérabilité dans Microsoft SharePoint Server | 2019-05-29T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-007 | Vulnérabilité dans le serveur DHCP de Windows | 2019-05-15T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| certfr-2019-ale-005 | Vulnérabilité dans Oracle WebLogic | 2019-04-26T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| certfr-2019-ale-003 | Campagnes de rançongiciels | 2019-01-31T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| CERTFR-2019-ALE-007 | Vulnérabilité dans le serveur DHCP de Windows | 2019-05-15T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| CERTFR-2019-ALE-005 | Vulnérabilité dans Oracle WebLogic | 2019-04-26T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| CERTFR-2019-ALE-003 | Campagnes de rançongiciels | 2019-01-31T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| certfr-2019-ale-004 | Multiples vulnérabilités dans Microsoft Edge et Internet Explorer | 2019-04-01T00:00:00.000000 | 2019-04-17T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0220 | Multiples vulnérabilités dans les produits Elastic | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0219 | Vulnérabilité dans Stormshield Network Security | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0218 | Multiples vulnérabilités dans les produits VMware | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0216 | Vulnérabilité dans PostgreSQL | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0215 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0214 | Vulnérabilité dans Juniper Networks Junos OS Evolved | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0213 | Multiples vulnérabilités dans les produits Cisco | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0212 | Multiples vulnérabilités dans les produits Centreon | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0211 | Multiples vulnérabilités dans Wireshark | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0210 | Multiples vulnérabilités dans Cisco Catalyst SD-WAN | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0209 | Multiples vulnérabilités dans les produits VMware | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0208 | Vulnérabilité dans les produits Synology | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0207 | Multiples vulnérabilités dans GitLab | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0206 | Multiples vulnérabilités dans les produits Trend Micro | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0205 | Multiples vulnérabilités dans SolarWinds Serv-U | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0204 | Multiples vulnérabilités dans les produits Mozilla | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0179 | Multiples vulnérabilités dans SPIP | 2026-02-18T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0155 | Multiples vulnérabilités dans SPIP | 2026-02-12T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2025-avi-0043 | Multiples vulnérabilités dans SPIP | 2025-01-17T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0203 | Vulnérabilité dans Microsoft Azure Linux | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0202 | Multiples vulnérabilités dans les produits SonicWall | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0200 | Vulnérabilité dans Centreon open tickets | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0199 | Multiples vulnérabilités dans les produits VMware | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0198 | Multiples vulnérabilités dans Google Chrome | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0197 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-23T00:00:00.000000 | 2026-02-23T00:00:00.000000 |
| certfr-2026-avi-0187 | Multiples vulnérabilités dans Tenable Security Center | 2026-02-19T00:00:00.000000 | 2026-02-23T00:00:00.000000 |
| certfr-2026-avi-0196 | Multiples vulnérabilités dans les produits IBM | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0195 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0194 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0193 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-007390 | Trend Micro Internet Security and Trend Micro Maximum Security vulnerable to link following local privilege escalation (CVE-2025-49384, CVE-2025-49385) | 2025-06-24T11:18+09:00 | 2025-06-24T11:18+09:00 |
| jvndb-2025-000040 | KCM3100 vulnerable to authentication bypass using an alternate path or channel | 2025-06-18T13:42+09:00 | 2025-06-18T13:42+09:00 |
| jvndb-2025-000039 | Multiple vulnerabilities in RICOH Streamline NX PC Client | 2025-06-13T16:09+09:00 | 2025-06-13T16:09+09:00 |
| jvndb-2025-000038 | UpdateNavi vulnerable to improper restriction of communication channel to intended endpoints | 2025-06-12T15:56+09:00 | 2025-06-12T15:56+09:00 |
| jvndb-2025-000037 | Multiple surveillance cameras provided by i-PRO Co., Ltd. vulnerable to cross-site request forgery | 2025-06-06T13:56+09:00 | 2025-06-06T13:56+09:00 |
| jvndb-2025-000036 | TimeWorks vulnerable to path traversal | 2025-06-03T15:35+09:00 | 2025-06-03T15:35+09:00 |
| jvndb-2025-000035 | Improper file access permission settings in PC Time Tracer | 2025-06-03T14:40+09:00 | 2025-06-03T14:40+09:00 |
| jvndb-2025-000034 | Multiple vulnerabilities in wivia 5 | 2025-05-30T15:57+09:00 | 2025-05-30T15:57+09:00 |
| jvndb-2025-001238 | Multiple out-of-bounds write vulnerabilities in Canon Office/Small Office Multifunction Printers and Laser Printers | 2025-01-29T13:41+09:00 | 2025-05-27T16:06+09:00 |
| jvndb-2025-000032 | Mailform Pro CGI generating error messages containing sensitive information | 2025-05-26T14:22+09:00 | 2025-05-26T14:22+09:00 |
| jvndb-2025-000033 | Improper pattern file validation in i-FILTER optional feature 'Anti-Virus & Sandbox' | 2025-05-23T15:36+09:00 | 2025-05-23T15:36+09:00 |
| jvndb-2025-005467 | Passback vulnerabilities in Canon Production Printers, Office/Small Office Multifunction Printers, and Laser Printers | 2025-05-22T15:03+09:00 | 2025-05-22T15:03+09:00 |
| jvndb-2024-000117 | Stack-based buffer overflow vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor | 2024-10-31T16:44+09:00 | 2025-05-19T17:59+09:00 |
| jvndb-2025-005107 | Multiple vulnerabilities in V-SFT | 2025-05-16T14:32+09:00 | 2025-05-16T14:32+09:00 |
| jvndb-2025-005057 | Multiple vulnerabilities in I-O DATA network attached hard disk 'HDL-T Series' | 2025-05-15T18:27+09:00 | 2025-05-15T18:27+09:00 |
| jvndb-2025-005050 | Multiple vulnerabilities in a-blog cms | 2025-05-15T18:11+09:00 | 2025-05-15T18:11+09:00 |
| jvndb-2025-000031 | Pgpool-II vulnerable to authentication bypass by primary weakness | 2025-05-15T16:14+09:00 | 2025-05-15T16:14+09:00 |
| jvndb-2025-004863 | Panasonic IR Control Hub vulnerable to Unauthorised firmware loading | 2025-05-14T11:30+09:00 | 2025-05-14T11:30+09:00 |
| jvndb-2025-004671 | Multiple vulnerabilities in GL-MT2500 and GL-MT2500A | 2025-05-12T17:52+09:00 | 2025-05-12T17:52+09:00 |
| jvndb-2025-001016 | OMRON NJ/NX series vulnerable to path traversal | 2025-02-06T18:27+09:00 | 2025-05-08T17:44+09:00 |
| jvndb-2025-004079 | Improper access permission settings in multiple SEIKO EPSON printer drivers for Windows OS | 2025-04-30T11:46+09:00 | 2025-04-30T11:46+09:00 |
| jvndb-2025-004076 | Security Update for Trend Micro Trend Vision One (April 2025) | 2025-04-30T10:38+09:00 | 2025-04-30T10:38+09:00 |
| jvndb-2025-000029 | Multiple vulnerabilities in Quick Agent | 2025-04-25T13:49+09:00 | 2025-04-25T13:49+09:00 |
| jvndb-2025-000028 | i-PRO Configuration Tool vulnerable to use of hard-coded cryptographic key | 2025-04-24T13:50+09:00 | 2025-04-24T13:50+09:00 |
| jvndb-2025-000027 | Active! mail vulnerable to stack-based buffer overflow | 2025-04-18T16:50+09:00 | 2025-04-18T16:50+09:00 |
| jvndb-2016-000129 | Android OS issue where it is affected by the CRIME attack | 2016-07-25T11:15+09:00 | 2025-04-18T16:36+09:00 |
| jvndb-2025-003213 | TP-Link Deco BE65 Pro vulnerable to OS command injection | 2025-04-11T13:52+09:00 | 2025-04-11T13:52+09:00 |
| jvndb-2025-000026 | Multiple vulnerabilities in BizRobo! | 2025-04-10T15:36+09:00 | 2025-04-10T15:36+09:00 |
| jvndb-2025-003091 | Multiple vulnerabilities in Trend Micro Endpoint security products for enterprises (April 2025) | 2025-04-09T14:55+09:00 | 2025-04-09T14:55+09:00 |
| jvndb-2025-002990 | Multiple vulnerabilities in Inaba Denki Sangyo Wi-Fi AP UNIT 'AC-WPS-11ac series' | 2025-04-07T17:44+09:00 | 2025-04-07T17:44+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14669 | IBM Db2拒绝服务漏洞(CNVD-2026-14669) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14668 | IBM Db2拒绝服务漏洞(CNVD-2026-14668) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14667 | IBM Db2拒绝服务漏洞(CNVD-2026-14667) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14666 | IBM Db2拒绝服务漏洞(CNVD-2026-14666) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14665 | IBM Db2 Big SQL on Cloud Pak for Data资源管理错误漏洞 | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14664 | Rockwell Automation PanelView Plus 7 Performance Series B身份验证绕过漏洞 | 2025-10-17 | 2026-03-24 |
| cnvd-2026-14663 | Rockwell Automation FactoryTalk ViewPoint拒绝服务漏洞 | 2025-10-17 | 2026-03-24 |
| cnvd-2026-14662 | Rockwell Automation Compact GuardLogix 5370拒绝服务漏洞 | 2025-10-17 | 2026-03-24 |
| cnvd-2026-14661 | Rockwell Automation Verve Asset Manager存在未明漏洞 | 2025-11-14 | 2026-03-24 |
| cnvd-2026-14660 | Rockwell Automation Studio 5000 Simulation Interface服务端请求伪造漏洞 | 2025-11-14 | 2026-03-24 |
| cnvd-2026-14659 | Rockwell Automation Studio 5000 Simulation Interface代码执行漏洞 | 2025-11-14 | 2026-03-24 |
| cnvd-2026-14658 | Rockwell Automation FactoryTalk DataMosaix Private Cloud跨站脚本漏洞 | 2025-11-14 | 2026-03-24 |
| cnvd-2026-14657 | Rockwell Automation DataMosaix Private Cloud存在未明漏洞 | 2025-11-14 | 2026-03-24 |
| cnvd-2026-14656 | Rockwell Automation Arena堆栈缓冲区溢出漏洞 | 2025-11-18 | 2026-03-24 |
| cnvd-2026-14655 | Rockwell Automation FactoryTalk DataMosaix Private Cloud SQL注入漏洞 | 2025-12-15 | 2026-03-24 |
| cnvd-2026-14654 | Rockwell Automation 432ES-IG3 Series A拒绝服务漏洞 | 2025-12-15 | 2026-03-24 |
| cnvd-2026-14653 | Rockwell Automation Studio 5000 Logix Designer代码问题漏洞 | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14652 | Google Android存在未明漏洞(CNVD-2026-14652 | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14651 | Google Android存在未明漏洞(CNVD-2026-14651) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14650 | Google Android权限提升漏洞(CNVD-2026-14650) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14649 | Google Android权限提升漏洞(CNVD-2026-14649) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14648 | Google Android存在未明漏洞(CNVD-2026-14648) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14647 | Google Android拒绝服务漏洞(CNVD-2026-14647) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14646 | Google Android存在未明漏洞(CNVD-2026-14646) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14645 | Google Android存在未明漏洞(CNVD-2026-14645) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14644 | Google Android权限提升漏洞(CNVD-2026-14644) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14643 | Google Android访问控制错误漏洞(CNVD-2026-14643) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-15248 | Huawei HarmonyOS设备认证模块认证绕过漏洞 | 2026-03-12 | 2026-03-23 |
| cnvd-2026-15144 | HCL AION SQL注入漏洞 | 2026-03-19 | 2026-03-23 |
| cnvd-2026-14508 | Adobe Audition越界写入漏洞(CNVD-2026-14508) | 2026-02-24 | 2026-03-23 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15196 | Уязвимость компонента fs/buffer.c ядра операционной системы Linux, позволяющая нарушителю… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15194 | Уязвимость компонента kernel/trace/ftrace.c ядра операционной системы Linux, позволяющая … | 05.12.2025 | 16.02.2026 |
| bdu:2025-15193 | Уязвимость компонента iio/light/as73211.c ядра операционной системы Linux, позволяющая на… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15192 | Уязвимость драйвера comedi ядра операционной системы Linux, позволяющая нарушителю вызват… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15189 | Уязвимость компонента bpf_jit.c ядра операционной системы Linux, позволяющая нарушителю в… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15188 | Уязвимость драйвера drbd/drbd_receiver.c ядра операционной системы Linux, позволяющая нар… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15187 | Уязвимость компонента comedi/comedi_fops.c ядра операционной системы Linux, позволяющая н… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15186 | Уязвимость компонента net/appletalk/aarp.c ядра операционной системы Linux, позволяющая н… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15185 | Уязвимость компонента fs/ntfs3/dir.c ядра операционной системы Linux, позволяющая нарушит… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15184 | Уязвимость компонента proc ядра операционной системы Linux, позволяющая нарушителю оказат… | 04.12.2025 | 16.02.2026 |
| bdu:2025-15183 | Уязвимость компонента fs/hfsplus/extents.c ядра операционной системы Linux, позволяющая н… | 04.12.2025 | 16.02.2026 |
| bdu:2025-15180 | Уязвимость компонента vsock ядра операционной системы Linux, позволяющая нарушителю оказа… | 04.12.2025 | 16.02.2026 |
| bdu:2025-15179 | Уязвимость компонентов bpf и ktls ядра операционной системы Linux, позволяющая нарушителю… | 04.12.2025 | 16.02.2026 |
| bdu:2025-15178 | Уязвимость компонента wifi ядра операционной системы Linux, позволяющая нарушителю оказат… | 04.12.2025 | 16.02.2026 |
| bdu:2025-15177 | Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | 04.12.2025 | 16.02.2026 |
| bdu:2025-15175 | Уязвимость компонента f2fs ядра операционной системы Linux, позволяющая нарушителю оказат… | 04.12.2025 | 16.02.2026 |
| bdu:2025-15174 | Уязвимость компонента f2fs ядра операционной системы Linux, позволяющая нарушителю оказат… | 04.12.2025 | 16.02.2026 |
| bdu:2025-15173 | Уязвимость компонента f2fs ядра операционной системы Linux, позволяющая нарушителю оказат… | 04.12.2025 | 16.02.2026 |
| bdu:2025-15172 | Уязвимость компонента pptp ядра операционной системы Linux, позволяющая нарушителю оказат… | 04.12.2025 | 16.02.2026 |
| bdu:2025-15171 | Уязвимость компонента ipv6 ядра операционной системы Linux, позволяющая нарушителю оказат… | 04.12.2025 | 16.02.2026 |
| bdu:2025-15168 | Уязвимость компонента hwmon ядра операционной системы Linux, позволяющая нарушителю вызва… | 04.12.2025 | 16.02.2026 |
| bdu:2025-15166 | Уязвимость компонента quirks ядра операционной системы Linux, позволяющая нарушителю вызв… | 04.12.2025 | 16.02.2026 |
| bdu:2025-15162 | Уязвимость компонента net/xfrm ядра операционной системы Linux, связанная с использование… | 04.12.2025 | 16.02.2026 |
| bdu:2025-15160 | Уязвимость функции clone_private_mnt() ядра операционной системы Linux, позволяющая наруш… | 04.12.2025 | 16.02.2026 |
| bdu:2025-15159 | Уязвимость компонента btrfs ядра операционной системы Linux, позволяющая нарушителю оказа… | 04.12.2025 | 16.02.2026 |
| bdu:2025-15114 | Уязвимость компонента cfg80211 подсистемы Wi-Fi ядра операционной системы Linux,позволяющ… | 03.12.2025 | 16.02.2026 |
| bdu:2025-15112 | Уязвимость компонента kernel/time/hrtimer.c ядра операционной системы Linux, позволяющая … | 03.12.2025 | 16.02.2026 |
| bdu:2025-15111 | Уязвимость функции __xfs_dir3_data_check() (fs/xfs/libxfs/xfs_dir2_data.c) ядра операцион… | 03.12.2025 | 16.02.2026 |
| bdu:2025-15028 | Уязвимость компонента x86/cpu/hygon ядра операционной системы Linux, позволяющая нарушите… | 03.12.2025 | 16.02.2026 |
| bdu:2025-15027 | Уязвимость компонента fs/smb/server/smb2pdu.c ядра операционной системы Linux, позволяюща… | 03.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202210-1888 | When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_R… | 2024-07-23T21:58:55.307000Z |
| var-202004-0061 | The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7… | 2024-07-23T21:58:31.314000Z |
| var-201804-1185 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T21:58:31.021000Z |
| var-201012-0287 | Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome b… | 2024-07-23T21:58:30.837000Z |
| var-202112-0566 | Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2… | 2024-07-23T21:58:00.289000Z |
| var-201903-0926 | An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9… | 2024-07-23T21:57:59.201000Z |
| var-200110-0192 | OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key… | 2024-07-23T21:57:58.746000Z |
| var-202012-1529 | A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion se… | 2024-07-23T21:57:50.923000Z |
| var-201711-0007 | A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1… | 2024-07-23T21:57:50.988000Z |
| var-201904-1414 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:57:11.524000Z |
| var-202206-1157 | Incomplete cleanup in specific special register write operations for some Intel(R) Proces… | 2024-07-23T21:57:10.821000Z |
| var-200810-0140 | Unspecified vulnerability in Finder in Mac OS X 10.5.5 allows user-assisted attackers to … | 2024-07-23T21:57:09.157000Z |
| var-201108-0184 | Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and … | 2024-07-23T21:56:59.027000Z |
| var-200809-0176 | sys/netinet6/icmp6.c in the kernel in FreeBSD 6.3 through 7.1, NetBSD 3.0 through 4.0, an… | 2024-07-23T21:56:59.282000Z |
| var-202210-1203 | Git is an open source, scalable, distributed revision control system. `git shell` is a re… | 2024-07-23T21:56:58.153000Z |
| var-201304-0178 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:56:58.917000Z |
| var-200703-0011 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted at… | 2024-07-23T21:56:58.629000Z |
| var-201904-0746 | A race condition was addressed with additional validation. This issue affected versions p… | 2024-07-23T21:56:56.832000Z |
| var-201406-0230 | The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel… | 2024-07-23T21:56:56.921000Z |
| var-201110-0443 | The ospf_flood function in ospf_flood.c in ospfd in Quagga before 0.99.19 allows remote a… | 2024-07-23T21:56:49.016000Z |
| var-201912-1864 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:56:48.951000Z |
| var-201806-1445 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2024-07-23T21:56:47.636000Z |
| var-201708-1547 | The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers… | 2024-07-23T21:56:47.739000Z |
| var-201712-0280 | An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari be… | 2024-07-23T21:56:39.563000Z |
| var-200609-1276 | The Security Framework in Apple Mac OS X 10.4 through 10.4.8 allows remote attackers to c… | 2024-07-23T21:56:38.677000Z |
| var-202203-0131 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:56:37.654000Z |
| var-201412-0613 | Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers … | 2024-07-23T21:56:37.541000Z |
| var-200703-0012 | Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to… | 2024-07-23T21:56:37.438000Z |
| var-200906-0617 | The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly ini… | 2024-07-23T21:56:36.646000Z |
| var-200701-0517 | Untrusted search path vulnerability in writeconfig in Apple Mac OS X 10.4.8 allows local … | 2024-07-23T21:56:15.579000Z |