Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-6031 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Simple IT Discussion Forum add-category-… |
code-projects |
Simple IT Discussion Forum |
2026-04-10T07:00:25.770Z | 2026-04-10T11:48:27.122Z |
| CVE-2026-6030 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
itsourcecode Construction Management System del1.php s… |
itsourcecode |
Construction Management System |
2026-04-10T06:45:10.429Z | 2026-04-10T15:15:49.331Z |
| CVE-2026-6029 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Totolink A7100RU CGI cstecgi.cgi setVpnAccountCfg os c… |
Totolink |
A7100RU |
2026-04-10T06:30:19.345Z | 2026-04-10T15:45:55.950Z |
| CVE-2026-1115 |
9.6 (3.0)
|
Stored XSS in parisneo/lollms |
parisneo |
parisneo/lollms |
2026-04-10T06:23:13.463Z | 2026-04-10T13:01:44.634Z |
| CVE-2026-6028 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Totolink A7100RU CGI cstecgi.cgi setPptpServerCfg os c… |
Totolink |
A7100RU |
2026-04-10T06:15:26.783Z | 2026-04-10T13:39:19.307Z |
| CVE-2026-6027 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Totolink A7100RU CGI cstecgi.cgi setUrlFilterRules os … |
Totolink |
A7100RU |
2026-04-10T06:00:22.402Z | 2026-04-10T06:00:22.402Z |
| CVE-2026-4432 |
6.5 (3.1)
|
YITH WooCommerce Wishlist < 4.13.0 - Unauthenticated A… |
Unknown |
YITH WooCommerce Wishlist |
2026-04-10T06:00:15.515Z | 2026-04-10T18:35:19.917Z |
| CVE-2025-14545 |
6.5 (3.1)
|
YML for Yandex Market < 5.0.26 - Shop Manager+ RCE via… |
Unknown |
YML for Yandex Market |
2026-04-10T06:00:13.825Z | 2026-04-10T18:37:24.983Z |
| CVE-2026-28704 |
7.8 (3.0)
8.4 (4.0)
|
Emocheck insecurely loads Dynamic Link Libraries … |
Japan Computer Emergency Response Team Coordination Center (JPCERT/CC) |
Emocheck |
2026-04-10T05:49:59.632Z | 2026-04-10T14:03:26.770Z |
| CVE-2026-6026 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Totolink A7100RU CGI cstecgi.cgi setPortalConfWeChat o… |
Totolink |
A7100RU |
2026-04-10T05:45:10.860Z | 2026-04-10T11:52:41.453Z |
| CVE-2026-6025 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Totolink A7100RU CGI cstecgi.cgi setSyslogCfg os comma… |
Totolink |
A7100RU |
2026-04-10T05:30:21.486Z | 2026-04-10T14:59:13.478Z |
| CVE-2026-6024 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Tenda i6 HTTP R7WebsSecurityHandlerfunction path traversal |
Tenda |
i6 |
2026-04-10T05:15:13.771Z | 2026-04-10T15:54:20.628Z |
| CVE-2026-5477 |
8.2 (4.0)
|
Prefix-substitution forgery via integer overflow in wo… |
wolfSSL |
wolfSSL |
2026-04-10T05:06:22.884Z | 2026-04-10T14:04:00.411Z |
| CVE-2026-6016 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC9 POST Request WizardHandle decodePwd stack-ba… |
Tenda |
AC9 |
2026-04-10T05:00:23.163Z | 2026-04-10T13:40:04.879Z |
| CVE-2026-6015 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC9 POST Request QuickIndex formQuickIndex stack… |
Tenda |
AC9 |
2026-04-10T04:45:15.605Z | 2026-04-10T04:45:15.605Z |
| CVE-2026-6014 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
D-Link DIR-513 POST Request formAdvanceSetup buffer overflow |
D-Link |
DIR-513 |
2026-04-10T04:30:21.978Z | 2026-04-10T11:58:43.540Z |
| CVE-2026-4482 |
6.8 (4.0)
|
Insight Agent Private Key Information Disclosure via I… |
Rapid7 |
Insight Agent |
2026-04-10T04:22:38.719Z | 2026-04-10T15:33:30.608Z |
| CVE-2026-6013 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
D-Link DIR-513 POST Request formSetRoute buffer overflow |
D-Link |
DIR-513 |
2026-04-10T04:15:13.189Z | 2026-04-10T15:35:06.404Z |
| CVE-2026-6012 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
D-Link DIR-513 POST Request formSetPassword buffer overflow |
D-Link |
DIR-513 |
2026-04-10T04:00:16.952Z | 2026-04-10T15:54:28.106Z |
| CVE-2026-6011 |
6.3 (4.0)
5.6 (3.1)
5.6 (3.0)
|
OpenClaw assertPublicHostname web-fetch.ts server-side… |
n/a |
OpenClaw |
2026-04-10T03:45:14.380Z | 2026-04-10T13:41:20.869Z |
| CVE-2026-2305 |
6.4 (3.1)
|
AddFunc Head & Footer Code <= 2.3 - Authenticated (Con… |
addfunc |
AddFunc Head & Footer Code |
2026-04-10T03:35:35.305Z | 2026-04-10T17:03:14.663Z |
| CVE-2026-6010 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
CodeAstro Online Classroom takeassessment2.php sql injection |
CodeAstro |
Online Classroom |
2026-04-10T03:30:14.967Z | 2026-04-10T03:30:14.967Z |
| CVE-2026-5188 |
2.3 (4.0)
|
Integer underflow in X.509 SAN parsing in wolfSSL |
wolfSSL |
wolfSSL |
2026-04-10T03:24:21.126Z | 2026-04-10T13:41:51.326Z |
| CVE-2026-6007 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
itsourcecode Construction Management System del.php sq… |
itsourcecode |
Construction Management System |
2026-04-10T03:15:12.064Z | 2026-04-10T12:08:17.415Z |
| CVE-2026-5500 |
8.7 (4.0)
|
Improper Validation of AES-GCM Authentication Tag Leng… |
wolfSSL |
wolfSSL |
2026-04-10T03:10:25.671Z | 2026-04-10T13:42:28.091Z |
| CVE-2026-5501 |
8.6 (4.0)
|
Improper Certificate Signature Verification in X.509 C… |
wolfSSL |
wolfSSL |
2026-04-10T03:07:39.604Z | 2026-04-10T13:43:04.704Z |
| CVE-2026-5466 |
7.6 (4.0)
|
wc_VerifyEccsiHash missing sanity check |
wolfSSL |
wolfSSL |
2026-04-10T03:00:42.976Z | 2026-04-10T13:43:34.035Z |
| CVE-2026-6006 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Patient Record Management System edit_hp… |
code-projects |
Patient Record Management System |
2026-04-10T03:00:20.534Z | 2026-04-10T17:04:11.688Z |
| CVE-2026-6005 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Patient Record Management System hematol… |
code-projects |
Patient Record Management System |
2026-04-10T02:45:12.085Z | 2026-04-10T15:54:38.282Z |
| CVE-2026-5479 |
7.6 (4.0)
|
wolfSSL EVP ChaCha20-Poly1305 AEAD authentication tag |
wolfSSL |
wolfSSL |
2026-04-10T02:38:39.918Z | 2026-04-10T13:44:05.956Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-33457 |
5.3 (4.0)
|
Potential livestatus injection in prediction graph page |
Checkmk GmbH |
Checkmk |
2026-04-10T08:31:35.768Z | 2026-04-10T12:47:24.094Z |
| CVE-2026-33456 |
5.1 (4.0)
|
Potential livestatus injection in notification test |
Checkmk GmbH |
Checkmk |
2026-04-10T08:31:27.807Z | 2026-04-10T12:47:50.407Z |
| CVE-2026-33455 |
5.3 (4.0)
|
Livestatus injection in monitoring quicksearch |
Checkmk GmbH |
Checkmk |
2026-04-10T08:30:20.089Z | 2026-04-10T12:48:27.066Z |
| CVE-2026-6035 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
code-projects Vehicle Showroom Management System Servi… |
code-projects |
Vehicle Showroom Management System |
2026-04-10T08:00:17.813Z | 2026-04-10T15:14:30.174Z |
| CVE-2026-6034 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
code-projects Vehicle Showroom Management System Profi… |
code-projects |
Vehicle Showroom Management System |
2026-04-10T07:45:10.191Z | 2026-04-10T15:54:13.540Z |
| CVE-2026-6033 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
CodeAstro Online Classroom updatedetailsfromstudent.ph… |
CodeAstro |
Online Classroom |
2026-04-10T07:30:13.796Z | 2026-04-10T12:59:53.115Z |
| CVE-2026-6032 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
code-projects Simple Laundry System checkcheckout.php … |
code-projects |
Simple Laundry System |
2026-04-10T07:15:13.733Z | 2026-04-10T07:15:13.733Z |
| CVE-2026-6031 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Simple IT Discussion Forum add-category-… |
code-projects |
Simple IT Discussion Forum |
2026-04-10T07:00:25.770Z | 2026-04-10T11:48:27.122Z |
| CVE-2026-5525 |
6 (3.1)
|
Stack-Based Buffer Overflow in Notepad++ File Drop Han… |
Notepad++ Project |
Notepad++ |
2026-04-10T07:40:59.902Z | 2026-04-10T12:49:59.124Z |
| CVE-2026-40212 |
5.4 (3.1)
|
OpenStack Skyline before 5.0.1, 6.0.0, and 7.0.0 … |
OpenStack |
Skyline |
2026-04-10T00:00:00.000Z | 2026-04-10T15:32:11.199Z |
| CVE-2026-22750 |
7.5 (3.1)
|
SSL bundle configuration silently bypassed in Spring C… |
VMware |
Spring Cloud Gateway |
2026-04-10T07:32:31.260Z | 2026-04-10T12:59:14.451Z |
| CVE-2026-6030 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
itsourcecode Construction Management System del1.php s… |
itsourcecode |
Construction Management System |
2026-04-10T06:45:10.429Z | 2026-04-10T15:15:49.331Z |
| CVE-2026-6029 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Totolink A7100RU CGI cstecgi.cgi setVpnAccountCfg os c… |
Totolink |
A7100RU |
2026-04-10T06:30:19.345Z | 2026-04-10T15:45:55.950Z |
| CVE-2026-6028 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Totolink A7100RU CGI cstecgi.cgi setPptpServerCfg os c… |
Totolink |
A7100RU |
2026-04-10T06:15:26.783Z | 2026-04-10T13:39:19.307Z |
| CVE-2026-6027 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Totolink A7100RU CGI cstecgi.cgi setUrlFilterRules os … |
Totolink |
A7100RU |
2026-04-10T06:00:22.402Z | 2026-04-10T06:00:22.402Z |
| CVE-2026-6026 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Totolink A7100RU CGI cstecgi.cgi setPortalConfWeChat o… |
Totolink |
A7100RU |
2026-04-10T05:45:10.860Z | 2026-04-10T11:52:41.453Z |
| CVE-2026-4432 |
6.5 (3.1)
|
YITH WooCommerce Wishlist < 4.13.0 - Unauthenticated A… |
Unknown |
YITH WooCommerce Wishlist |
2026-04-10T06:00:15.515Z | 2026-04-10T18:35:19.917Z |
| CVE-2026-28704 |
7.8 (3.0)
8.4 (4.0)
|
Emocheck insecurely loads Dynamic Link Libraries … |
Japan Computer Emergency Response Team Coordination Center (JPCERT/CC) |
Emocheck |
2026-04-10T05:49:59.632Z | 2026-04-10T14:03:26.770Z |
| CVE-2026-1115 |
9.6 (3.0)
|
Stored XSS in parisneo/lollms |
parisneo |
parisneo/lollms |
2026-04-10T06:23:13.463Z | 2026-04-10T13:01:44.634Z |
| CVE-2025-14545 |
6.5 (3.1)
|
YML for Yandex Market < 5.0.26 - Shop Manager+ RCE via… |
Unknown |
YML for Yandex Market |
2026-04-10T06:00:13.825Z | 2026-04-10T18:37:24.983Z |
| CVE-2026-6025 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Totolink A7100RU CGI cstecgi.cgi setSyslogCfg os comma… |
Totolink |
A7100RU |
2026-04-10T05:30:21.486Z | 2026-04-10T14:59:13.478Z |
| CVE-2026-6024 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Tenda i6 HTTP R7WebsSecurityHandlerfunction path traversal |
Tenda |
i6 |
2026-04-10T05:15:13.771Z | 2026-04-10T15:54:20.628Z |
| CVE-2026-6016 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC9 POST Request WizardHandle decodePwd stack-ba… |
Tenda |
AC9 |
2026-04-10T05:00:23.163Z | 2026-04-10T13:40:04.879Z |
| CVE-2026-6015 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC9 POST Request QuickIndex formQuickIndex stack… |
Tenda |
AC9 |
2026-04-10T04:45:15.605Z | 2026-04-10T04:45:15.605Z |
| CVE-2026-5477 |
8.2 (4.0)
|
Prefix-substitution forgery via integer overflow in wo… |
wolfSSL |
wolfSSL |
2026-04-10T05:06:22.884Z | 2026-04-10T14:04:00.411Z |
| CVE-2026-6014 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
D-Link DIR-513 POST Request formAdvanceSetup buffer overflow |
D-Link |
DIR-513 |
2026-04-10T04:30:21.978Z | 2026-04-10T11:58:43.540Z |
| CVE-2026-6013 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
D-Link DIR-513 POST Request formSetRoute buffer overflow |
D-Link |
DIR-513 |
2026-04-10T04:15:13.189Z | 2026-04-10T15:35:06.404Z |
| CVE-2026-6012 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
D-Link DIR-513 POST Request formSetPassword buffer overflow |
D-Link |
DIR-513 |
2026-04-10T04:00:16.952Z | 2026-04-10T15:54:28.106Z |
| CVE-2026-6011 |
6.3 (4.0)
5.6 (3.1)
5.6 (3.0)
|
OpenClaw assertPublicHostname web-fetch.ts server-side… |
n/a |
OpenClaw |
2026-04-10T03:45:14.380Z | 2026-04-10T13:41:20.869Z |
| CVE-2026-4482 |
6.8 (4.0)
|
Insight Agent Private Key Information Disclosure via I… |
Rapid7 |
Insight Agent |
2026-04-10T04:22:38.719Z | 2026-04-10T15:33:30.608Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-2024 | The PhotoStack Gallery plugin for WordPress is vulnerable to SQL Injection via the 'postid' paramet… | 2026-02-14T07:16:13.020 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-2022 | The Smart Forms plugin for WordPress is vulnerable to unauthorized access of data due to a missing … | 2026-02-14T07:16:12.847 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1988 | The Flexi Product Slider and Grid for WooCommerce plugin for WordPress is vulnerable to Local File … | 2026-02-14T07:16:12.670 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1987 | The Scheduler Widget plugin for WordPress is vulnerable to Insecure Direct Object Reference in all … | 2026-02-14T07:16:12.493 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1985 | The Press3D plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 3D Model Gute… | 2026-02-14T07:16:12.320 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1944 | The CallbackKiller service widget plugin for WordPress is vulnerable to unauthorized modification o… | 2026-02-14T07:16:12.150 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1939 | The Percent to Infograph plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the … | 2026-02-14T07:16:11.977 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1915 | The Simple Plyr plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'poster' … | 2026-02-14T07:16:11.803 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1910 | The UpMenu – Online ordering for restaurants plugin for WordPress is vulnerable to Stored Cross-Sit… | 2026-02-14T07:16:11.633 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1905 | The Sphere Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'width… | 2026-02-14T07:16:11.460 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1903 | The Ravelry Designs Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via th… | 2026-02-14T07:16:11.283 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1901 | The QuestionPro Surveys plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the '… | 2026-02-14T07:16:11.113 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1796 | The StyleBidet plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the URL pat… | 2026-02-14T07:16:10.903 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1795 | The Address Bar Ads plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the UR… | 2026-02-14T07:16:10.733 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1792 | The Geo Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the URL path i… | 2026-02-14T07:16:10.553 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1394 | The WP Quick Contact Us plugin for WordPress is vulnerable to Cross-Site Request Forgery in all ver… | 2026-02-14T07:16:10.343 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1306 | The midi-Synth plugin for WordPress is vulnerable to arbitrary file uploads due to missing file typ… | 2026-02-14T07:16:10.150 | 2026-04-08T19:25:02.067 |
| fkie_cve-2026-1303 | The MailChimp Campaigns plugin for WordPress is vulnerable to Missing Authorization in all versions… | 2026-02-14T07:16:09.970 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1187 | The ZoomifyWP Free plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'filen… | 2026-02-14T07:16:09.800 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1096 | The Best-wp-google-map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'l… | 2026-02-14T07:16:09.627 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-0753 | The Super Simple Contact Form plugin for WordPress is vulnerable to Reflected Cross-Site Scripting … | 2026-02-14T07:16:09.450 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-0751 | The Payment Page | Payment Form for Stripe plugin for WordPress is vulnerable to Stored Cross-Site … | 2026-02-14T07:16:09.283 | 2026-04-08T17:21:06.983 |
| fkie_cve-2026-0745 | The User Language Switch plugin for WordPress is vulnerable to Server-Side Request Forgery in all v… | 2026-02-14T07:16:09.113 | 2026-04-08T18:25:38.043 |
| fkie_cve-2026-0736 | The Chatbot for WordPress by Collect.chat plugin for WordPress is vulnerable to Stored Cross-Site S… | 2026-02-14T07:16:08.940 | 2026-04-08T19:24:51.967 |
| fkie_cve-2026-0735 | The User Language Switch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the … | 2026-02-14T07:16:08.770 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-0727 | The Accordion and Accordion Slider plugin for WordPress is vulnerable to authorization bypass in al… | 2026-02-14T07:16:08.590 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-0693 | The Allow HTML in Category Descriptions plugin for WordPress is vulnerable to Stored Cross-Site Scr… | 2026-02-14T07:16:08.417 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-0559 | The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vul… | 2026-02-14T07:16:08.240 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-0557 | The WP Data Access plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin… | 2026-02-14T07:16:08.053 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-6792 | The One to one user Chat by WPGuppy plugin for WordPress is vulnerable to unauthorized access of da… | 2026-02-14T07:16:07.270 | 2026-02-18T17:52:44.520 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-rhpc-gv73-7m9f |
6.3 (3.1)
2.1 (4.0)
|
A flaw has been found in itsourcecode Construction Management System 1.0. The impacted element is a… | 2026-04-10T09:31:16Z | 2026-04-10T09:31:16Z |
| ghsa-p2v5-ghx9-jg75 |
5.3 (4.0)
|
Livestatus injection in the monitoring quicksearch in Checkmk <2.5.0b4 allows an authenticated atta… | 2026-04-10T09:31:16Z | 2026-04-10T09:31:16Z |
| ghsa-hxwv-vc7p-p66g |
5.1 (4.0)
|
Livestatus injection in the notification test mode in Checkmk <2.5.0b4 and <2.4.0p26 allows an auth… | 2026-04-10T09:31:16Z | 2026-04-10T09:31:16Z |
| ghsa-h7hj-cr59-59c2 |
5.4 (3.1)
|
OpenStack Skyline before 5.0.1, 6.0.0, and 7.0.0 has a DOM-based Cross-Site Scripting (XSS) vulnera… | 2026-04-10T09:31:16Z | 2026-04-10T18:31:17Z |
| ghsa-9x65-73m2-6pcg |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability has been found in code-projects Vehicle Showroom Management System 1.0. The affecte… | 2026-04-10T09:31:16Z | 2026-04-10T09:31:16Z |
| ghsa-9g69-m48x-mfpw |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was identified in code-projects Vehicle Showroom Management System 1.0. This impact… | 2026-04-10T09:31:16Z | 2026-04-10T09:31:16Z |
| ghsa-98g2-jqvc-f33c |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was found in code-projects Simple Laundry System 1.0. This impacts an unknown funct… | 2026-04-10T09:31:16Z | 2026-04-10T09:31:16Z |
| ghsa-8hrp-2fqv-gvrx |
6.0 (3.1)
|
A stack-based buffer overflow vulnerability exists in Notepad++ version 8.9.3 in the file drop hand… | 2026-04-10T09:31:16Z | 2026-04-10T09:31:16Z |
| ghsa-8gxr-c98h-cwxm |
5.3 (4.0)
|
Livestatus injection in the prediction graph page in Checkmk <2.5.0b4, <2.4.0p26, and <2.3.0p47 all… | 2026-04-10T09:31:16Z | 2026-04-10T09:31:16Z |
| ghsa-734f-8p5w-pjw7 |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was determined in code-projects Vehicle Showroom Management System 1.0. This affect… | 2026-04-10T09:31:16Z | 2026-04-10T09:31:16Z |
| ghsa-47p4-rx3f-4xcm |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was found in code-projects Vehicle Showroom Management System 1.0. The impacted ele… | 2026-04-10T09:31:16Z | 2026-04-10T09:31:16Z |
| ghsa-2qh3-3rmv-x43w |
3.3 (3.1)
4.8 (4.0)
|
A security flaw has been discovered in musl libc up to 1.2.6. Affected is the function iconv of the… | 2026-04-10T09:31:16Z | 2026-04-10T12:31:44Z |
| ghsa-wqxj-7q65-946x |
9.8 (3.1)
8.9 (4.0)
|
A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This vulnerability af… | 2026-04-10T09:31:15Z | 2026-04-10T09:31:15Z |
| ghsa-w3qf-xc88-m8c9 |
9.8 (3.1)
8.9 (4.0)
|
A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. This issue affects the fun… | 2026-04-10T09:31:15Z | 2026-04-10T09:31:16Z |
| ghsa-r2fc-mm5p-v3mp |
6.5 (3.1)
|
The YITH WooCommerce Wishlist WordPress plugin before 4.13.0 does not properly validate wishlist ow… | 2026-04-10T09:31:15Z | 2026-04-10T21:31:14Z |
| ghsa-hwqh-2684-54fc |
7.5 (3.1)
|
Spring Cloud Gateway's SSL bundle configuration silently bypassed | 2026-04-10T09:31:15Z | 2026-04-10T22:11:21Z |
| ghsa-frp9-cw9x-gf7v |
6.5 (3.1)
|
The YML for Yandex Market WordPress plugin before 5.0.26 is vulnerable to Remote Code Execution via… | 2026-04-10T09:31:15Z | 2026-04-10T21:31:14Z |
| ghsa-cvcj-h2fq-82fw |
7.8 (3.1)
8.4 (4.0)
|
Emocheck insecurely loads Dynamic Link Libraries (DLLs). If a crafted DLL file is placed to the sam… | 2026-04-10T09:31:15Z | 2026-04-10T09:31:15Z |
| ghsa-976v-qqvp-vpgg |
9.8 (3.1)
8.9 (4.0)
|
A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Impacted is th… | 2026-04-10T09:31:15Z | 2026-04-10T09:31:16Z |
| ghsa-8wrq-fv5f-pfp2 |
9.6 (3.1)
|
parisneo/lollms vulnerable to stored XSS in the social feature | 2026-04-10T09:31:15Z | 2026-04-10T22:11:10Z |
| ghsa-2w2j-5vf6-6jfw |
9.8 (3.1)
8.9 (4.0)
|
A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the … | 2026-04-10T09:31:15Z | 2026-04-10T09:31:16Z |
| ghsa-x6gx-rmhg-wc3f |
8.8 (3.1)
7.4 (4.0)
|
A security vulnerability has been detected in D-Link DIR-513 1.10. This affects the function formSe… | 2026-04-10T06:31:38Z | 2026-04-10T06:31:38Z |
| ghsa-wqhq-hx3v-9xwh |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability was found in Tenda AC9 15.03.02.13. The affected element is the function decodePwd … | 2026-04-10T06:31:38Z | 2026-04-10T06:31:38Z |
| ghsa-m77r-vqw2-hffx |
8.7 (4.0)
|
wolfSSL's wc_PKCS7_DecodeAuthEnvelopedData() does not properly sanitize the AES-GCM authentication … | 2026-04-10T06:31:38Z | 2026-04-10T06:31:38Z |
| ghsa-hg75-4cmp-f367 |
8.6 (4.0)
|
wolfSSL_X509_verify_cert in the OpenSSL compatibility layer accepts a certificate chain in which th… | 2026-04-10T06:31:38Z | 2026-04-10T06:31:38Z |
| ghsa-h7vm-f9h4-hh64 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was found in itsourcecode Construction Management System 1.0. This affects an unkno… | 2026-04-10T06:31:38Z | 2026-04-10T06:31:38Z |
| ghsa-h6p7-635q-vpx7 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability has been found in code-projects Patient Record Management System 1.0. The impacted … | 2026-04-10T06:31:38Z | 2026-04-10T06:31:38Z |
| ghsa-grqc-3vmg-p68x |
8.2 (4.0)
|
An integer overflow existed in the wolfCrypt CMAC implementation, that could be exploited to forge … | 2026-04-10T06:31:38Z | 2026-04-10T06:31:38Z |
| ghsa-ch75-q946-9j9r |
8.8 (3.1)
7.4 (4.0)
|
A flaw has been found in D-Link DIR-513 1.10. This issue affects the function formAdvanceSetup of t… | 2026-04-10T06:31:38Z | 2026-04-10T06:31:38Z |
| ghsa-9qjr-82wx-8hcx |
6.3 (3.1)
2.1 (4.0)
|
A flaw has been found in code-projects Patient Record Management System 1.0. The affected element i… | 2026-04-10T06:31:38Z | 2026-04-10T06:31:38Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-205 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. When using … | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-19T19:19:01.519824+00:00 |
| pysec-2024-164 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. If an exces… | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-16T21:21:41.436934+00:00 |
| pysec-2024-40 |
|
orjson.loads in orjson before 3.9.15 does not limit recursion for deeply nested JSON documents. | orjson | 2024-02-26T16:28:00+00:00 | 2024-02-26T18:22:26.039698+00:00 |
| pysec-2024-253 |
|
pretix before 2024.1.1 mishandles file validation. | pretix | 2024-02-26T16:28:00+00:00 | 2025-06-11T15:23:51.683422+00:00 |
| pysec-2024-235 |
8.1 (3.1)
|
With the following crawler configuration: ```python from bs4 import BeautifulSoup as Sou… | langchain-exa | 2024-02-26T16:27:49+00:00 | 2025-02-26T02:48:56.937312+00:00 |
| pysec-2024-39 |
|
Versions of the package fastecdsa before 2.3.2 are vulnerable to Use of Uninitialized Var… | fastecdsa | 2024-02-24T05:15:00+00:00 | 2024-02-24T07:19:09.418536+00:00 |
| pysec-2024-241 |
9.6 (3.1)
|
Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untru… | mlflow | 2024-02-23T22:15:55+00:00 | 2025-04-08T10:23:24.946136+00:00 |
| pysec-2024-240 |
9.6 (3.1)
|
Insufficient sanitization in MLflow leads to XSS when running an untrusted recipe. This … | mlflow | 2024-02-23T22:15:55+00:00 | 2025-04-08T10:23:24.900947+00:00 |
| pysec-2024-223 |
9.1 (3.1)
|
Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds … | onnx | 2024-02-23T18:15:50+00:00 | 2025-01-22T16:23:22.060512+00:00 |
| pysec-2024-222 |
7.5 (3.1)
|
Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Trav… | onnx | 2024-02-23T18:15:50+00:00 | 2025-01-22T16:23:21.994731+00:00 |
| pysec-2024-249 |
6.1 (3.1)
|
### Summary On all Label Studio versions prior to 1.11.0, data imported via file upload f… | label-studio | 2024-02-22T22:15:47+00:00 | 2025-05-19T11:22:35.312280+00:00 |
| pysec-2024-226 |
7.8 (3.1)
|
Pymatgen (Python Materials Genomics) is an open-source Python library for materials analy… | pymatgen | 2024-02-21T17:15:09+00:00 | 2025-02-06T00:34:28.734730+00:00 |
| pysec-2024-225 |
7.5 (3.1)
|
cryptography is a package designed to expose cryptographic primitives and recipes to Pyth… | cryptography | 2024-02-21T17:15:09+00:00 | 2025-02-06T00:34:24.427679+00:00 |
| pysec-2024-155 |
7.5 (3.1)
|
cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) … | cbor2 | 2024-02-19T23:15:07+00:00 | 2025-01-14T05:22:09.226388+00:00 |
| pysec-2024-107 |
5.0 (3.1)
|
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modif… | exiv2 | 2024-02-12T23:15:00+00:00 | 2024-10-23T00:00:00+00:00 |
| pysec-2024-106 |
5.0 (3.1)
|
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modif… | exiv2 | 2024-02-12T23:15:00+00:00 | 2024-10-23T00:00:00+00:00 |
| pysec-2024-104 |
5.3 (3.1)
|
A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of … | jwcrypto | 2024-02-12T14:15:00+00:00 | 2024-10-10T17:22:00.587279+00:00 |
| pysec-2024-37 |
6.5 (3.1)
|
nonebot2 is a cross-platform Python asynchronous chatbot framework written in Python. Thi… | nonebot2 | 2024-02-09T23:15:00+00:00 | 2024-02-16T16:22:37.389642+00:00 |
| pysec-2024-125 |
7.5 (3.1)
|
DIRAC is a distributed resource framework. In affected versions any user could get a toke… | dirac | 2024-02-09T00:15:00+00:00 | 2024-11-21T14:22:45.495938+00:00 |
| pysec-2024-150 |
9.8 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. Arrays can … | vyper | 2024-02-07T17:15:00+00:00 | 2024-11-21T14:23:03.024978+00:00 |
| pysec-2024-28 |
|
An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 be… | django | 2024-02-06T22:16:00+00:00 | 2024-02-07T00:25:46.826634+00:00 |
| pysec-2024-36 |
5.5 (3.1)
|
An information disclosure flaw was found in ansible-core due to a failure to respect the … | ansible-core | 2024-02-06T12:15:00+00:00 | 2024-02-14T07:20:09.911618+00:00 |
| pysec-2024-147 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. There is an error in the stack m… | vyper | 2024-02-05T21:15:00+00:00 | 2024-11-21T14:23:02.864019+00:00 |
| pysec-2024-38 |
7.5 (3.1)
|
FastAPI is a web framework for building APIs with Python 3.8+ based on standard Python ty… | fastapi | 2024-02-05T15:15:00+00:00 | 2024-02-16T18:22:32.607118+00:00 |
| pysec-2024-148 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. When calls … | vyper | 2024-02-02T17:15:00+00:00 | 2024-11-21T14:23:02.917464+00:00 |
| pysec-2024-35 |
5.4 (3.1)
|
Versions of the package dash-core-components before 2.13.0; all versions of the package d… | dash | 2024-02-02T05:15:00+00:00 | 2024-02-10T07:18:43.563257+00:00 |
| pysec-2024-149 |
9.8 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In versions… | vyper | 2024-02-01T17:15:00+00:00 | 2024-11-21T14:23:02.970591+00:00 |
| pysec-2024-29 |
4.9 (3.1)
|
OctoPrint is a web interface for 3D printer.s OctoPrint versions up until and including 1… | octoprint | 2024-01-31T18:15:00+00:00 | 2024-02-08T07:19:40.535297+00:00 |
| pysec-2024-127 |
5.3 (3.1)
|
Label Studio is a popular open source data labeling tool. The vulnerability affects all v… | label-studio | 2024-01-31T17:15:00+00:00 | 2024-11-21T14:22:53.294472+00:00 |
| pysec-2024-151 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. Vyper compi… | vyper | 2024-01-30T21:15:00+00:00 | 2024-11-21T14:23:03.091183+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2244 | Malicious code in fluxhttp (PyPI) | 2026-03-26T20:49:03Z | 2026-04-08T20:19:39Z |
| mal-2026-2243 | Malicious code in browserstack-electron-forge-include-package-plugin (npm) | 2026-03-26T20:45:39Z | 2026-03-31T03:12:00Z |
| mal-2026-2242 | Malicious code in somepentest-test-package (PyPI) | 2026-03-26T20:06:44Z | 2026-03-26T20:06:44Z |
| mal-2026-2238 | Malicious code in spr-i18n-labels (npm) | 2026-03-26T16:40:45Z | 2026-03-31T03:12:04Z |
| mal-2026-2239 | Malicious code in chaostoolkit-turbulence (PyPI) | 2026-03-26T16:32:17Z | 2026-03-26T23:47:08Z |
| mal-2026-2240 | Malicious code in magtape (PyPI) | 2026-03-26T16:21:03Z | 2026-03-26T23:47:09Z |
| mal-2026-2241 | Malicious code in pacbot (PyPI) | 2026-03-26T16:21:00Z | 2026-03-26T23:47:09Z |
| mal-2026-2237 | Malicious code in jsonify-builder (npm) | 2026-03-26T14:45:36Z | 2026-03-31T03:12:02Z |
| mal-2026-2236 | Malicious code in onboarding-server (npm) | 2026-03-26T14:15:47Z | 2026-03-31T03:12:03Z |
| mal-2026-2235 | Malicious code in srcsrctest (npm) | 2026-03-26T12:05:48Z | 2026-03-31T03:12:04Z |
| mal-2026-2234 | Malicious code in security-install-analytics (npm) | 2026-03-26T11:24:02Z | 2026-03-31T03:12:04Z |
| mal-2026-2233 | Malicious code in lightmock (PyPI) | 2026-03-26T08:27:10Z | 2026-03-26T08:27:10Z |
| mal-2026-2232 | Malicious code in checkmarx.cx-dev-assist (VSCode:https://open-vsx.org) | 2026-03-26T06:18:28Z | 2026-03-26T06:18:28Z |
| mal-2026-2231 | Malicious code in checkmarx.ast-results (VSCode:https://open-vsx.org) | 2026-03-26T06:18:28Z | 2026-03-26T06:18:28Z |
| mal-2026-2230 | Malicious code in aquasecurityofficial.trivy-vulnerability-scanner (VSCode:https://open-vsx.org) | 2026-03-26T04:00:51Z | 2026-03-26T04:00:51Z |
| mal-2026-2229 | Malicious code in @zecho/libsignal (npm) | 2026-03-26T00:57:13Z | 2026-03-31T03:12:00Z |
| mal-2026-2228 | Malicious code in @zecho/baileys-mod (npm) | 2026-03-26T00:57:13Z | 2026-03-31T03:12:00Z |
| mal-2026-2221 | Malicious code in @validator-lut-sdk/v3 (npm) | 2026-03-26T00:52:20Z | 2026-03-31T03:12:00Z |
| mal-2026-2227 | Malicious code in validator-lut-sdk (npm) | 2026-03-26T00:52:19Z | 2026-03-31T03:12:05Z |
| mal-2026-2225 | Malicious code in neanderthal-validator (npm) | 2026-03-26T00:52:19Z | 2026-03-31T03:12:03Z |
| mal-2026-2224 | Malicious code in jito-validator-sdk (npm) | 2026-03-26T00:52:19Z | 2026-03-31T03:12:02Z |
| mal-2026-2219 | Malicious code in @solmasterv3/solana-metadata-sdk (npm) | 2026-03-26T00:52:19Z | 2026-03-31T03:12:00Z |
| mal-2026-2218 | Malicious code in @solana-ipfs/sdk (npm) | 2026-03-26T00:52:19Z | 2026-03-31T03:12:00Z |
| mal-2026-2216 | Malicious code in @pumpfun-ipfs/sdk (npm) | 2026-03-26T00:52:19Z | 2026-03-31T03:12:00Z |
| mal-2026-2226 | Malicious code in node-coremesh (npm) | 2026-03-26T00:42:51Z | 2026-03-31T03:12:03Z |
| mal-2026-2222 | Malicious code in chain-coremesh (npm) | 2026-03-26T00:42:51Z | 2026-03-31T03:12:01Z |
| mal-2026-2215 | Malicious code in react-leaflet-marker-layer (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:12:04Z |
| mal-2026-2214 | Malicious code in react-autolink-text (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:12:04Z |
| mal-2026-2213 | Malicious code in @virtahealth/substrate-root (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:12:00Z |
| mal-2026-2212 | Malicious code in @opengov/qa-record-types-api (npm) | 2026-03-26T00:33:27Z | 2026-03-31T03:12:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0198 | Red Hat OpenShift und OpenShift AI (urllib3): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0196 | CPython: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-01-21T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0194 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0190 | vllm: Mehrere Schwachstellen | 2026-01-21T23:00:00.000+00:00 | 2026-01-22T23:00:00.000+00:00 |
| wid-sec-w-2026-0188 | Internet Systems Consortium BIND: Schwachstelle ermöglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0187 | Red Hat Enterprise Linux (glib): Schwachstelle ermöglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0185 | M-Files M-Files Server: Schwachstelle ermöglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0184 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0183 | InetUtils (telnetd): Schwachstelle ermöglicht Erlangen von Administratorrechten | 2026-01-20T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0182 | Apache Solr: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0179 | GNU libc: Schwachstelle ermöglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0177 | Atlassian Bamboo, Bitbucket, Confluence und Jira: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0176 | Google Chrome/Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2026-01-20T23:00:00.000+00:00 | 2026-01-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0174 | Oracle Systems: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0172 | Oracle Virtualization: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0168 | Oracle MySQL: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0164 | Oracle Java SE: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0159 | Oracle E-Business Suite: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0148 | ImageMagick: Mehrere Schwachstellen | 2026-01-19T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0145 | FreeRDP: Mehrere Schwachstellen ermöglichen DoS und Codeausführung | 2026-01-19T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0144 | n8n: Schwachstelle ermöglicht Codeausführung | 2026-01-18T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0138 | Red Hat Enterprise Linux (gpsd): Mehrere Schwachstellen | 2026-01-18T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0136 | AMD EPYC-Prozessoren: Schwachstelle ermöglicht Manipulation von Daten | 2026-01-15T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0135 | Google Fast Pair Bluetooth Protokoll: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-15T23:00:00.000+00:00 | 2026-01-20T23:00:00.000+00:00 |
| wid-sec-w-2026-0133 | SmarterTools SmarterMail: Mehrere Schwachstellen | 2026-01-15T23:00:00.000+00:00 | 2026-01-22T23:00:00.000+00:00 |
| wid-sec-w-2026-0132 | GNU libc: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-15T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0129 | Golang Go: Mehrere Schwachstellen | 2026-01-15T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0126 | libxml2: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-15T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0121 | Drupal Module: Mehrere Schwachstellen | 2026-01-14T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0119 | Linux Kernel: Mehrere Schwachstellen | 2026-01-14T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-289-05 | Siemens Solid Edge | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| va-25-282-01 | Newforma Project Center multiple vulnerabilities | 2025-10-09T19:50:00Z | 2025-10-09T19:50:00Z |
| icsa-25-282-03 | Rockwell Automation Stratix | 2025-10-09T06:00:00.000000Z | 2025-10-09T06:00:00.000000Z |
| icsa-25-282-02 | Rockwell Automation Lifecycle Services with Cisco | 2025-10-09T06:00:00.000000Z | 2025-10-09T06:00:00.000000Z |
| va-25-280-01 | OPEXUS FOIAXpress stored XSS | 2025-10-07T22:50:29Z | 2025-10-07T22:50:29Z |
| icsa-25-280-01 | Delta Electronics DIAScreen | 2025-10-07T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-275-01 | Raise3D Pro2 Series 3D Printers** | 2025-10-02T05:00:00.000000Z | 2025-10-02T05:00:00.000000Z |
| icsa-25-289-11 | Hitachi Energy MACH GWS | 2025-09-30T12:50:29.000000Z | 2025-09-30T12:50:29.000000Z |
| icsa-25-275-02 | Hitachi Energy MSM | 2025-09-30T09:02:31.000000Z | 2025-09-30T09:02:31.000000Z |
| icsa-25-282-01 | Hitachi Energy Asset Suite (Update A) | 2025-09-30T08:50:13.000000Z | 2025-10-28T09:50:00.000000Z |
| icsa-25-273-06 | National Instruments Circuit Design Suite | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-05 | OpenPLC_V3 | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-04 | Festo Controller CECC-S,-LK,-D Family Firmware (Update A) | 2025-09-30T06:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-273-01 | MegaSys Enterprises Telenium Online Web Application | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-07 | LG Innotek Camera Multiple Models | 2025-09-30T05:00:00.000000Z | 2025-09-30T05:00:00.000000Z |
| va-25-273-01 | Microsoft Windows inconsistent driver blocking | 2025-09-30T00:00:00Z | 2025-09-30T00:00:00Z |
| va-25-272-01 | Medical Informatics Engineering Enterprise Health multiple vulnerabilities | 2025-09-29T00:00:00Z | 2025-09-29T00:00:00Z |
| icsa-25-268-01 | Dingtian DT-R002 | 2025-09-25T06:00:00.000000Z | 2025-09-25T06:00:00.000000Z |
| icsa-25-266-04 | Viessmann Vitogate 300 | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| icsa-25-266-02 | Mitsubishi Electric MELSEC-Q Series CPU Module | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| icsa-25-266-01 | AutomationDirect CLICK PLUS | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| va-25-265-01 | Airship AI MFA bypass and default credentials vulnerabilities | 2025-09-22T14:06:13Z | 2025-09-22T14:06:13Z |
| icsa-25-261-07 | Dover Fueling Solutions ProGauge MagLink LX4 Devices | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-06 | Cognex In-Sight Explorer and In-Sight Camera Firmware | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-03 | Schneider Electric Saitel DR & Saitel DP Remote Terminal Unit | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-02 | Westermo Network Technologies WeOS 5 | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-01 | Westermo Network Technologies WeOS 5 | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-259-07 | Delta Electronics DIALink | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-06 | Siemens Multiple Industrial Products | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-05 | Siemens OpenSSL Vulnerability in Industrial Products | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-esa-sma-xss-wck2wcug | Cisco Secure Email and Web Manager and Secure Email Gateway Cross-Site Scripting Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-esa-sma-wsa-snmp-inf-fqpvl8sx | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance SNMP Polling Information Disclosure Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-esa-sma-wsa-multi-ykujhs34 | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-02-07T19:21:57+00:00 |
| cisco-sa-cmm-privesc-uy2vf8pc | Cisco Meeting Management REST API Privilege Escalation Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-clamav-ole2-h549rpha | ClamAV OLE2 File Format Decryption Denial of Service Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-bw-sip-dos-msysbrmt | Cisco BroadWorks SIP Denial of Service Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-xwork-xss-kccg7wwu | Cisco Crosswork Network Controller Stored Cross-Site Scripting Vulnerabilities | 2025-01-08T16:00:00+00:00 | 2025-01-08T16:00:00+00:00 |
| cisco-sa-thousandeyes-cert-pqtjuv9n | Cisco ThousandEyes Endpoint Agent for MacOS and RoomOS Certificate Validation Vulnerability | 2025-01-08T16:00:00+00:00 | 2025-01-13T22:15:18+00:00 |
| cisco-sa-cspc-xss-cdojzyh | Cisco Common Services Platform Collector Cross-Site Scripting Vulnerabilities | 2025-01-08T16:00:00+00:00 | 2025-01-08T16:00:00+00:00 |
| cisco-sa-nxos-image-sig-bypas-pqdrqvjl | Cisco NX-OS Software Image Verification Bypass Vulnerability | 2024-12-04T16:00:00+00:00 | 2025-04-07T16:43:32+00:00 |
| cisco-sa-phone-infodisc-sbyqqvbg | Cisco 7800, 8800, and 9800 Series Phones Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ndfc-sqli-cyppaxrl | Cisco Nexus Dashboard Fabric Controller SQL Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-mpp-xss-8tav2tvf | Cisco 6800, 7800, 8800, and 9800 Series Phones with Multiplatform Firmware Stored Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vulns-af544ed5 | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vuln-dbqdwry | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-auth-bypass-bbrf7mke | Cisco Identity Services Engine Authorization Bypass and Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-imp-inf-disc-cupkua5n | Cisco Unified Communications Manager IM & Presence Service Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-esa-wsa-sma-xss-zym3f49n | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-epnmpi-sxss-yyf2zkxs | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ece-dos-oqb9ufev | Cisco Enterprise Chat and Email Denial of Service Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-cucm-xss-svckmmw | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-cmm-info-disc-9zemahga | Cisco Meeting Management Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ccmp-sxss-qbtdbzdd | Cisco Unified Contact Center Management Portal Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-backhaul-ap-cmdinj-r7e28ecs | Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point Command Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-3550-acl-bypass-mhskzc2q | Cisco Nexus 3550-F Switches Access Control List Programming Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-snort-rf-bypass-oy8f3pnm | Multiple Cisco Products Snort Rate Filter Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2025-01-13T16:44:31+00:00 |
| cisco-sa-snort-bypass-ptry37fx | Cisco Firepower Threat Defense Software TCP Snort 3 Detection Engine Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-sa-ftd-snort-fw-bcjtzpmu | Cisco Firepower Threat Defense Software and Cisco FirePOWER Services TCP/IP Traffic with Snort 2 and Snort 3 Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd2100-snort-dos-m9humt75 | Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Appliances TCP UDP Snort 2 and Snort 3 Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-vdb-snort-djj4cnbr | Cisco Firepower Threat Defense Software Vulnerability Database with Snort Detection Engine Security Policy Bypass and Denial of Service Issue | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-33672 | Picomatch: Method Injection in POSIX Character Classes causes incorrect Glob Matching | 2026-03-02T00:00:00.000Z | 2026-03-30T14:38:52.000Z |
| msrc_cve-2026-33671 | Picomatch has a ReDoS vulnerability via extglob quantifiers | 2026-03-02T00:00:00.000Z | 2026-03-30T14:38:39.000Z |
| msrc_cve-2026-33636 | LIBPNG has ARM NEON Palette Expansion Out-of-Bounds Read on AArch64 | 2026-03-02T00:00:00.000Z | 2026-04-02T01:06:35.000Z |
| msrc_cve-2026-33554 | CVE-2026-33554 | 2026-03-02T00:00:00.000Z | 2026-04-08T01:38:36.000Z |
| msrc_cve-2026-33542 | Incus does not verify combined fingerprint when downloading images from simplestreams servers | 2026-03-02T00:00:00.000Z | 2026-04-02T01:40:07.000Z |
| msrc_cve-2026-33526 | Squid vulnerable to Denial of Service in ICP Request handling | 2026-03-02T00:00:00.000Z | 2026-03-28T14:38:00.000Z |
| msrc_cve-2026-33515 | Squid has issues in ICP message handling | 2026-03-02T00:00:00.000Z | 2026-03-28T14:38:07.000Z |
| msrc_cve-2026-33416 | LIBPNG has use-after-free via pointer aliasing in `png_set_tRNS` and `png_set_PLTE` | 2026-03-02T00:00:00.000Z | 2026-04-02T01:05:59.000Z |
| msrc_cve-2026-33413 | etcd: Authorization bypasses in multiple APIs | 2026-03-02T00:00:00.000Z | 2026-03-31T14:57:04.000Z |
| msrc_cve-2026-33412 | Vim affected by Command injection via newline in glob() | 2026-03-02T00:00:00.000Z | 2026-03-31T14:54:51.000Z |
| msrc_cve-2026-3338 | PKCS7_verify Signature Validation Bypass in AWS-LC | 2026-03-02T00:00:00.000Z | 2026-03-06T01:38:11.000Z |
| msrc_cve-2026-3336 | PKCS7_verify Certificate Chain Validation Bypass in AWS-LC | 2026-03-02T00:00:00.000Z | 2026-03-06T01:38:19.000Z |
| msrc_cve-2026-33343 | etcd: Nested etcd transactions bypass RBAC authorization checks | 2026-03-02T00:00:00.000Z | 2026-03-31T14:56:33.000Z |
| msrc_cve-2026-33228 | flatted: Prototype Pollution via parse() | 2026-03-02T00:00:00.000Z | 2026-03-27T01:42:55.000Z |
| msrc_cve-2026-33216 | NATS has MQTT plaintext password disclosure | 2026-03-02T00:00:00.000Z | 2026-04-08T01:38:51.000Z |
| msrc_cve-2026-33186 | gRPC-Go has an authorization bypass via missing leading slash in :path | 2026-03-02T00:00:00.000Z | 2026-03-26T01:01:16.000Z |
| msrc_cve-2026-33056 | tar-rs: unpack_in can chmod arbitrary directories by following symlinks | 2026-03-02T00:00:00.000Z | 2026-03-31T15:18:00.000Z |
| msrc_cve-2026-33055 | tar-rs incorrectly ignores PAX size headers if header size is nonzero | 2026-03-02T00:00:00.000Z | 2026-03-31T15:17:14.000Z |
| msrc_cve-2026-32778 | CVE-2026-32778 | 2026-03-02T00:00:00.000Z | 2026-03-31T14:50:16.000Z |
| msrc_cve-2026-32777 | CVE-2026-32777 | 2026-03-02T00:00:00.000Z | 2026-03-31T14:47:24.000Z |
| msrc_cve-2026-32776 | CVE-2026-32776 | 2026-03-02T00:00:00.000Z | 2026-03-31T14:55:48.000Z |
| msrc_cve-2026-32775 | CVE-2026-32775 | 2026-03-02T00:00:00.000Z | 2026-03-31T14:56:17.000Z |
| msrc_cve-2026-32766 | astral-tokio-tar insufficiently validates PAX extensions during extraction | 2026-03-02T00:00:00.000Z | 2026-03-31T15:06:29.000Z |
| msrc_cve-2026-32748 | Squid has Denial of Service in ICP Response handling | 2026-03-02T00:00:00.000Z | 2026-03-28T14:38:14.000Z |
| msrc_cve-2026-32647 | NGINX ngx_http_mp4_module vulnerability | 2026-03-02T00:00:00.000Z | 2026-03-28T14:38:48.000Z |
| msrc_cve-2026-3230 | Improper key_share validation in TLS 1.3 HelloRetryRequest | 2026-03-02T00:00:00.000Z | 2026-03-31T15:15:35.000Z |
| msrc_cve-2026-3229 | Integer Overflow in Certificate Chain Allocation | 2026-03-02T00:00:00.000Z | 2026-03-31T15:15:17.000Z |
| msrc_cve-2026-32287 | Infinite loop in github.com/antchfx/xpath | 2026-03-02T00:00:00.000Z | 2026-04-02T14:39:36.000Z |
| msrc_cve-2026-32249 | NFA regex engine NULL pointer dereference affects Vim < 9.2.0137 | 2026-03-02T00:00:00.000Z | 2026-03-31T14:45:55.000Z |
| msrc_cve-2026-32241 | Flannel vulnerable to cross-node remote code execution via extension backend BackendData injection | 2026-03-02T00:00:00.000Z | 2026-04-10T01:01:36.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0276 | Kwetsbaarheden verholpen in Schneider Electric Saitel | 2025-09-09T15:16:00.122647Z | 2025-09-09T15:16:00.122647Z |
| ncsc-2025-0275 | Kwetsbaarheden verholpen in SAP producten | 2025-09-09T11:12:22.945466Z | 2025-09-09T11:12:22.945466Z |
| ncsc-2025-0274 | Kwetsbaarheden verholpen in Siemens producten | 2025-09-09T11:06:34.785987Z | 2025-09-09T11:06:34.785987Z |
| ncsc-2025-0273 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-09-04T08:15:14.806733Z | 2025-09-04T08:15:14.806733Z |
| ncsc-2025-0272 | Kwetsbaarheid verholpen in FreePBX | 2025-08-29T08:37:54.893549Z | 2025-08-29T08:37:54.893549Z |
| ncsc-2025-0271 | Kwetsbaarheden verholpen in Arcserve Unified Data Protection | 2025-08-28T12:56:02.228992Z | 2025-08-28T12:56:02.228992Z |
| ncsc-2025-0270 | Kwetsbaarheden verholpen in Cisco NX-OS Software | 2025-08-28T08:36:20.358948Z | 2025-08-28T08:36:20.358948Z |
| ncsc-2025-0269 | Kwetsbaarheden verholpen in IBM Cognos Command Center | 2025-08-27T13:10:59.965070Z | 2025-08-27T13:10:59.965070Z |
| ncsc-2025-0268 | Kwetsbaarheden verholpen in Citrix NetScaler ADC en Gateway | 2025-08-26T13:11:42.925280Z | 2025-08-26T17:34:30.428328Z |
| ncsc-2025-0267 | Kwetsbaarheden verholpen in Foxit Reader | 2025-08-25T11:26:17.380689Z | 2025-08-25T11:26:17.380689Z |
| ncsc-2025-0266 | Kwetsbaarheid verholpen in Apple MacOS, iOS en iPadOS | 2025-08-22T05:49:07.556948Z | 2025-08-25T12:16:10.430485Z |
| ncsc-2025-0265 | Kwetsbaarheden verholpen in Commvault | 2025-08-20T12:15:48.655099Z | 2025-08-20T12:15:48.655099Z |
| ncsc-2025-0264 | Kwetsbaarheden verholpen in Cisco Secure Firewall Software | 2025-08-15T08:52:41.012811Z | 2025-08-15T08:52:41.012811Z |
| ncsc-2025-0263 | Kwetsbaarheden verholpen in N-able N-Central | 2025-08-14T12:38:27.349283Z | 2025-08-14T12:38:27.349283Z |
| ncsc-2025-0262 | Kwetsbaarheden verholpen in Xerox FreeFlow Core | 2025-08-14T07:00:50.843871Z | 2025-08-14T07:00:50.843871Z |
| ncsc-2025-0261 | Kwetsbaarheden verholpen in Adobe InCopy | 2025-08-13T10:13:59.220398Z | 2025-08-13T10:13:59.220398Z |
| ncsc-2025-0260 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-08-13T10:12:35.130811Z | 2025-08-13T10:12:35.130811Z |
| ncsc-2025-0259 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2025-08-13T10:11:22.733287Z | 2025-08-13T10:11:22.733287Z |
| ncsc-2025-0258 | Kwetsbaarheden verholpen in Adobe InDesign | 2025-08-13T10:05:31.442414Z | 2025-08-13T10:05:31.442414Z |
| ncsc-2025-0257 | Kwetsbaarheid verholpen in Adobe Photoshop | 2025-08-13T10:00:18.181867Z | 2025-08-13T10:00:18.181867Z |
| ncsc-2025-0256 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-08-13T09:59:45.240348Z | 2025-08-13T09:59:45.240348Z |
| ncsc-2025-0255 | Kwetsbaarheden verholpen in Fortinet producten | 2025-08-13T09:16:29.067287Z | 2025-08-13T09:35:40.587034Z |
| ncsc-2025-0254 | Kwetsbaarheden verholpen in Zoom | 2025-08-13T09:09:21.491424Z | 2025-08-13T09:09:21.491424Z |
| ncsc-2025-0253 | Kwetsbaarheden verholpen in Ivanti Connect Secure, Policy Secure en ZTA Gateways | 2025-08-13T09:06:58.420498Z | 2025-08-13T09:06:58.420498Z |
| ncsc-2025-0252 | Kwetsbaarheden verholpen in Microsoft Exchange Server | 2025-08-13T07:29:24.639524Z | 2025-08-13T07:29:24.639524Z |
| ncsc-2025-0251 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-08-13T07:25:08.789693Z | 2025-08-13T07:25:08.789693Z |
| ncsc-2025-0250 | Kwetsbaarheden verholpen in Microsoft Office | 2025-08-13T07:23:56.395786Z | 2025-08-13T07:23:56.395786Z |
| ncsc-2025-0249 | Kwetsbaarheden verholpen in Azure-producten | 2025-08-13T07:22:17.432067Z | 2025-08-13T07:22:17.432067Z |
| ncsc-2025-0248 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-08-13T07:21:52.836899Z | 2025-08-13T07:21:52.836899Z |
| ncsc-2025-0247 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2025-08-13T07:19:19.911308Z | 2025-08-13T07:19:19.911308Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10367-1 | ruby4.0-rubygem-web-console-4.2.1-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10366-1 | ruby4.0-rubygem-thor-1.4.0-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10365-1 | ruby4.0-rubygem-sprockets-3.7-3.7.5-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10364-1 | ruby4.0-rubygem-sprockets-4.2.1-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10363-1 | ruby4.0-rubygem-rubyzip-2.3.2-1.19 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10362-1 | ruby4.0-rubygem-railties-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10361-1 | ruby4.0-rubygem-rails-html-sanitizer-1.6.0-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10360-1 | ruby4.0-rubygem-rails-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10359-1 | ruby4.0-rubygem-rack-session-2.1.1-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10358-1 | ruby4.0-rubygem-rack-3.1.18-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10357-1 | ruby4.0-rubygem-puma-6.4.3-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10356-1 | ruby4.0-rubygem-nokogiri-1.18.9-1.4 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10355-1 | ruby4.0-rubygem-multi_xml-0.6.0-1.31 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10354-1 | ruby4.0-rubygem-minitar-0.9-1.21 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10353-1 | ruby4.0-rubygem-loofah-2.23.1-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10352-1 | ruby4.0-rubygem-kramdown-2.4.0-1.17 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10351-1 | ruby4.0-rubygem-json_pure-2.7.6-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10350-1 | ruby4.0-rubygem-jquery-rails-4.6.0-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10349-1 | ruby4.0-rubygem-http-cookie-1.0.8-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10348-1 | ruby4.0-rubygem-grpc-1.70.1-1.7 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10347-1 | ruby4.0-rubygem-globalid-1.2.1-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10346-1 | ruby4.0-rubygem-fluentd-1.17.1-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10345-1 | ruby4.0-rubygem-activesupport-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10344-1 | ruby4.0-rubygem-activestorage-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10343-1 | ruby4.0-rubygem-activerecord-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10342-1 | ruby4.0-rubygem-activemodel-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10341-1 | ruby4.0-rubygem-activejob-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10340-1 | ruby4.0-rubygem-actionview-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10339-1 | ruby4.0-rubygem-actiontext-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10338-1 | ruby4.0-rubygem-actionpack-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:5851 | Red Hat Security Advisory: DevWorkspace Operator 0.40.0 release. | 2026-03-25T23:56:41+00:00 | 2026-04-12T20:00:59+00:00 |
| rhsa-2026:5831 | Red Hat Security Advisory: udisks2 security update | 2026-03-25T18:51:58+00:00 | 2026-03-26T00:04:39+00:00 |
| rhsa-2026:5142 | Red Hat Security Advisory: OpenShift Container Platform 4.20.17 bug fix and security update | 2026-03-25T17:02:30+00:00 | 2026-04-07T13:25:38+00:00 |
| rhsa-2026:5611 | Red Hat Security Advisory: Red Hat JBoss Web Server 6.2.1 release and security update | 2026-03-25T16:52:14+00:00 | 2026-04-11T01:47:14+00:00 |
| rhsa-2026:5612 | Red Hat Security Advisory: Red Hat JBoss Web Server 6.2.1 release and security update | 2026-03-25T16:44:19+00:00 | 2026-04-11T01:47:15+00:00 |
| rhsa-2026:5821 | Red Hat Security Advisory: kernel security update | 2026-03-25T14:47:25+00:00 | 2026-04-12T16:35:27+00:00 |
| rhsa-2026:5813 | Red Hat Security Advisory: kernel security update | 2026-03-25T14:39:42+00:00 | 2026-04-08T19:36:49+00:00 |
| rhsa-2026:5809 | Red Hat Security Advisory: Red Hat AI Inference Server 3.2.2 (cuda-ubi9) | 2026-03-25T13:08:34+00:00 | 2026-04-08T13:34:47+00:00 |
| rhsa-2026:5807 | Red Hat Security Advisory: RHOAI 2.16.4 - Red Hat OpenShift AI | 2026-03-25T12:32:51+00:00 | 2026-04-12T20:00:58+00:00 |
| rhsa-2026:5732 | Red Hat Security Advisory: kernel-rt security update | 2026-03-25T05:33:06+00:00 | 2026-04-08T13:33:50+00:00 |
| rhsa-2026:5127 | Red Hat Security Advisory: OpenShift Container Platform 4.18.36 bug fix and security update | 2026-03-25T04:59:06+00:00 | 2026-04-09T14:37:59+00:00 |
| rhsa-2026:5133 | Red Hat Security Advisory: OpenShift Container Platform 4.18.36 bug fix and security update | 2026-03-25T04:30:22+00:00 | 2026-04-10T21:16:45+00:00 |
| rhsa-2026:5727 | Red Hat Security Advisory: kernel security update | 2026-03-25T04:12:26+00:00 | 2026-04-12T16:35:25+00:00 |
| rhsa-2026:5692 | Red Hat Security Advisory: kernel security update | 2026-03-25T01:02:55+00:00 | 2026-04-08T19:37:28+00:00 |
| rhsa-2026:5691 | Red Hat Security Advisory: kernel security update | 2026-03-25T00:45:50+00:00 | 2026-04-12T16:35:25+00:00 |
| rhsa-2026:5689 | Red Hat Security Advisory: kernel security update | 2026-03-25T00:38:16+00:00 | 2026-04-08T13:33:48+00:00 |
| rhsa-2026:5693 | Red Hat Security Advisory: kernel security update | 2026-03-25T00:32:45+00:00 | 2026-04-08T13:33:49+00:00 |
| rhsa-2026:5690 | Red Hat Security Advisory: kernel-rt security update | 2026-03-25T00:24:00+00:00 | 2026-04-08T19:36:47+00:00 |
| rhsa-2026:5665 | Red Hat Security Advisory: Red Hat Quay 3.10.19 | 2026-03-24T18:02:58+00:00 | 2026-04-12T20:00:58+00:00 |
| rhsa-2026:5649 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-03-24T16:17:51+00:00 | 2026-04-12T20:01:01+00:00 |
| rhsa-2026:5645 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.17.1 | 2026-03-24T15:38:55+00:00 | 2026-04-12T20:00:57+00:00 |
| rhsa-2026:5640 | Red Hat Security Advisory: mysql:8.4 security update | 2026-03-24T15:07:28+00:00 | 2026-04-02T16:36:36+00:00 |
| rhsa-2026:5636 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.7.9 security update | 2026-03-24T14:23:47+00:00 | 2026-04-12T20:00:57+00:00 |
| rhsa-2026:5174 | Red Hat Security Advisory: OpenShift Container Platform 4.21.7 bug fix and security update | 2026-03-24T14:21:18+00:00 | 2026-04-07T13:25:34+00:00 |
| rhsa-2026:5633 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.12.8 security update | 2026-03-24T14:07:27+00:00 | 2026-04-12T20:00:57+00:00 |
| rhsa-2026:5578 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update | 2026-03-24T10:56:42+00:00 | 2026-03-24T13:02:45+00:00 |
| rhsa-2026:5602 | Red Hat Security Advisory: vim security update | 2026-03-24T10:45:32+00:00 | 2026-04-10T14:25:21+00:00 |
| rhsa-2026:5603 | Red Hat Security Advisory: opencryptoki security update | 2026-03-24T10:44:47+00:00 | 2026-03-30T11:10:27+00:00 |
| rhsa-2026:5587 | Red Hat Security Advisory: opencryptoki security update | 2026-03-24T10:40:27+00:00 | 2026-03-30T11:10:27+00:00 |
| rhsa-2026:5585 | Red Hat Security Advisory: gnutls security update | 2026-03-24T10:39:38+00:00 | 2026-04-09T20:26:34+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2020-224-07 | SoMove | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-06 | Harmony® eXLhoist | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-05 | PowerChute Business Edition | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-04 | APC Easy UPS On-Line Software | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-03 | Modicon M218 Logic Controller | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-02 | spaceLYnk & Wiser for KNX (formerly homeLYnk) | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-01 | Schneider Electric Modbus Serial Driver | 2020-08-11T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-196-01 | Schneider Electric Software Update (SESU) | 2020-07-14T00:00:00.000Z | 2020-07-14T00:00:00.000Z |
| sevd-2020-175-01 | Treck TCP/IP Vulnerabilities (Ripple20) | 2020-06-23T16:00:00.000Z | 2022-08-08T13:57:08.970Z |
| sevd-2020-174-01 | APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices | 2020-06-22T00:00:00.000Z | 2021-06-30T00:00:00.000Z |
| sevd-2020-161-05 | Easergy Builder | 2020-06-09T00:00:00.000Z | 2021-05-13T00:00:00.000Z |
| sevd-2020-161-04 | Easergy T300 | 2020-06-09T00:00:00.000Z | 2021-05-13T00:00:00.000Z |
| sevd-2020-161-03 | Modicon LMC078 Logic Controller additional URGENT/11 Fix | 2020-06-09T00:00:00.000Z | 2020-06-09T00:00:00.000Z |
| sevd-2020-161-01 | Modicon M218 Logic Controller | 2020-06-09T00:00:00.000Z | 2020-06-09T00:00:00.000Z |
| sevd-2020-133-03 | U.motion Servers and Touch Panels | 2020-05-12T00:00:00.000Z | 2021-04-15T00:00:00.000Z |
| sevd-2020-133-02 | Vijeo Designer and Vijeo Designer Basic Software | 2020-05-12T00:00:00.000Z | 2020-08-14T00:00:00.000Z |
| sevd-2020-105-03 | Vijeo Designer and Vijeo Designer Basic | 2020-04-14T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-105-02 | Modicon M218/M241/M251/M258 Logic Controllers,SoMachine/SoMachine Motion, EcoStruxure™ Machine Expert | 2020-04-14T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| sevd-2020-105-01 | Modicon M100/M200/M221 controllers, SoMachine Basic and EcoStruxure Machine Expert - Basic Programming Software | 2020-04-14T00:00:00.000Z | 2020-04-14T00:00:00.000Z |
| sevd-2020-080-01 | Modicon Controllers, EcoStruxure™ Control Expert and Unity Pro Programming Software | 2020-03-20T00:00:00.000Z | 2021-05-11T00:00:00.000Z |
| sevd-2020-070-04 | Andover Continuum System | 2020-03-10T00:00:00.000Z | 2020-05-12T00:00:00.000Z |
| sevd-2020-070-03 | ZigBee Installation Toolkit | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-070-02 | Modicon Quantum Ethernet Network module and Quantum / Premium COPRO | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-070-01 | IGSS (Interactive Graphical SCADA System) | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-042-01 | ProSoft Configurator for Modicon PMEPXM0100 (H) | 2020-02-11T00:00:00.000Z | 2020-02-11T00:00:00.000Z |
| sevd-2020-014-01 | MSX Configurator | 2020-01-14T00:00:00.000Z | 2020-01-14T00:00:00.000Z |
| sevd-2019-281-02 | Modicon Controllers | 2019-09-26T12:53:28.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2019-225-01 | Harmony (formerly known as Magelis) HMI Panels | 2019-08-13T09:59:02.000Z | 2024-01-09T09:59:02.000Z |
| sesb-2019-214-01 | Wind River VxWorks Vulnerabilities (URGENT/11) | 2019-08-02T00:00:00.000Z | 2022-09-13T00:00:00.000Z |
| sevd-2019-134-11 | Modicon Controllers | 2019-05-14T08:31:22.000Z | 2025-02-11T06:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-381581 | SSA-381581: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 SP1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-364175 | SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 | 2024-07-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-313039 | SSA-313039: Deserialization Vulnerability in STEP 7 Safety before V19 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-170375 | SSA-170375: Multiple Vulnerabilities in RUGGEDCOM ROS Before V5.9 | 2024-07-09T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-088132 | SSA-088132: Denial of Service Vulnerability in the OPC UA Server Implementations of Several Industrial Products | 2024-07-09T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-064222 | SSA-064222: Multiple File Parsing Vulnerabilities in Simcenter Femap before V2406 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-900277 | SSA-900277: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0012 and V2024.0001 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-879734 | SSA-879734: Multiple Vulnerabilities in SCALANCE XM-400/XR-500 before V6.6.1 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-771940 | SSA-771940: X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-06-11T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-690517 | SSA-690517: Multiple Vulnerabilities in SCALANCE W-700 IEEE 802.11ax Family | 2024-06-11T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-625862 | SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-620338 | SSA-620338: Buffer Overflow Vulnerability in SICAM AK3 / BC / TM | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-540640 | SSA-540640: Improper Privilege Management Vulnerability in Mendix Runtime | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-481506 | SSA-481506: Information Disclosure Vulnerability in SIMATIC S7-200 SMART Devices | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-341067 | SSA-341067: Multiple vulnerabilities in third-party components in ST7 ScadaConnect before V1.1 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-337522 | SSA-337522: Multiple Vulnerabilities in TIM 1531 IRC before V2.4.8 | 2024-06-11T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-319319 | SSA-319319: Denial of Service Vulnerability in TIA Administrator | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-238730 | SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-196737 | SSA-196737: Multiple Vulnerabilities in SINEC Traffic Analyzer Before V1.2 | 2024-06-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-024584 | SSA-024584: Authentication Bypass Vulnerability in PowerSys before V3.11 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-976324 | SSA-976324: Multiple IGS File Parsing Vulnerabilities in PS/IGES Parasolid Translator Component before V27.1.215 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-962515 | SSA-962515: Out of Bounds Read Vulnerability in Industrial Products | 2024-05-14T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-953710 | SSA-953710: Vulnerabilities in the Network Communication Stack in Desigo Fire Safety UL and Cerberus PRO UL Fire Protection Systems | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-925850 | SSA-925850: Improper Access Control in Polarion ALM | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-923361 | SSA-923361: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0011 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-916916 | SSA-916916: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.5 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-871704 | SSA-871704: Multiple Vulnerabilities in SICAM Products | 2024-05-14T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-661579 | SSA-661579: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-589937 | SSA-589937: Multiple Memory Corruption Vulnerabilities in Solid Edge | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-489698 | SSA-489698: X_T File Parsing Vulnerability in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20897-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:44Z | 2026-03-24T16:48:44Z |
| suse-su-2026:20854-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:44Z | 2026-03-24T16:48:44Z |
| suse-su-2026:20853-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:44Z | 2026-03-24T16:48:44Z |
| suse-su-2026:20845-1 | Security update for the Linux Kernel | 2026-03-24T16:48:38Z | 2026-03-24T16:48:38Z |
| suse-su-2026:20896-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:35Z | 2026-03-24T16:48:35Z |
| suse-su-2026:20895-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:35Z | 2026-03-24T16:48:35Z |
| suse-su-2026:20852-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:35Z | 2026-03-24T16:48:35Z |
| suse-su-2026:20851-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:35Z | 2026-03-24T16:48:35Z |
| suse-su-2026:20876-1 | Security update for the Linux Kernel | 2026-03-24T16:48:29Z | 2026-03-24T16:48:29Z |
| suse-su-2026:20894-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20893-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20892-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20891-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20850-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20849-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20848-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20847-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20926-1 | Security update for tomcat11 | 2026-03-24T16:09:46Z | 2026-03-24T16:09:46Z |
| suse-su-2026:0998-1 | Security update for gstreamer-plugins-ugly | 2026-03-24T14:56:39Z | 2026-03-24T14:56:39Z |
| suse-su-2026:0997-1 | Security update for the Linux Kernel (Live Patch 45 for SUSE Linux Enterprise 15 SP4) | 2026-03-24T14:34:37Z | 2026-03-24T14:34:37Z |
| suse-su-2026:20925-1 | Security update for nghttp2 | 2026-03-24T12:31:51Z | 2026-03-24T12:31:51Z |
| suse-su-2026:20833-1 | Security update for nghttp2 | 2026-03-24T12:31:51Z | 2026-03-24T12:31:51Z |
| suse-su-2026:20832-1 | Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-03-24T11:33:36Z | 2026-03-24T11:33:36Z |
| suse-su-2026:20826-1 | Security update for systemd | 2026-03-24T09:34:46Z | 2026-03-24T09:34:46Z |
| suse-su-2026:20822-1 | Security update for systemd | 2026-03-24T09:27:18Z | 2026-03-24T09:27:18Z |
| suse-su-2026:0992-1 | Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4) | 2026-03-24T09:11:21Z | 2026-03-24T09:11:21Z |
| suse-su-2026:20821-1 | Security update for python-pyasn1 | 2026-03-24T09:09:54Z | 2026-03-24T09:09:54Z |
| suse-su-2026:0993-1 | Security update for go1.26-openssl | 2026-03-24T08:54:50Z | 2026-03-24T08:54:50Z |
| suse-su-2026:0991-1 | Security update for systemd | 2026-03-24T07:23:00Z | 2026-03-24T07:23:00Z |
| suse-su-2026:0990-1 | Security update for systemd | 2026-03-24T07:22:51Z | 2026-03-24T07:22:51Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:1661 | Moderate: kernel-rt security update | 2026-02-02T00:00:00Z | 2026-02-02T13:40:07Z |
| alsa-2026:1631 | Moderate: python3 security update | 2026-02-02T00:00:00Z | 2026-02-02T12:08:18Z |
| alsa-2026:1628 | Important: php security update | 2026-02-02T00:00:00Z | 2026-02-02T09:59:40Z |
| alsa-2026:1617 | Moderate: kernel security update | 2026-02-02T00:00:00Z | 2026-02-06T08:24:53Z |
| alsa-2026:1597 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T10:00:47Z |
| alsa-2026:1595 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T10:01:50Z |
| alsa-2026:1592 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T11:56:57Z |
| alsa-2026:1574 | Important: gimp:2.8 security update | 2026-01-29T00:00:00Z | 2026-01-29T14:07:36Z |
| alsa-2026:1518 | Important: grafana-pcp security update | 2026-01-28T00:00:00Z | 2026-01-29T12:32:40Z |
| alsa-2026:1478 | Moderate: python3.9 security update | 2026-01-28T00:00:00Z | 2026-01-28T19:56:37Z |
| alsa-2026:1473 | Important: openssl security update | 2026-01-28T00:00:00Z | 2026-02-02T11:12:21Z |
| alsa-2026:1472 | Important: openssl security update | 2026-01-28T00:00:00Z | 2026-01-28T19:58:47Z |
| alsa-2026:1429 | Important: php:8.3 security update | 2026-01-27T00:00:00Z | 2026-01-29T11:59:57Z |
| alsa-2026:1412 | Important: php:8.2 security update | 2026-01-27T00:00:00Z | 2026-02-02T11:16:18Z |
| alsa-2026:1410 | Moderate: python3.11 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:02:18Z |
| alsa-2026:1409 | Important: php:8.2 security update | 2026-01-27T00:00:00Z | 2026-02-02T11:20:21Z |
| alsa-2026:1408 | Moderate: python3.12 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:05:44Z |
| alsa-2026:1381 | Moderate: osbuild-composer security update | 2026-01-27T00:00:00Z | 2026-02-02T11:22:03Z |
| alsa-2026:1380 | Moderate: osbuild-composer security update | 2026-01-27T00:00:00Z | 2026-01-29T12:07:35Z |
| alsa-2026:1377 | Moderate: image-builder security update | 2026-01-27T00:00:00Z | 2026-02-12T10:36:07Z |
| alsa-2026:1374 | Moderate: python3.11 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:10:37Z |
| alsa-2026:1359 | Moderate: gcc-toolset-15-binutils security update | 2026-01-27T00:00:00Z | 2026-02-02T11:23:42Z |
| alsa-2026:1350 | Moderate: curl security update | 2026-01-27T00:00:00Z | 2026-01-29T12:31:06Z |
| alsa-2026:1344 | Important: grafana security update | 2026-01-27T00:00:00Z | 2026-01-29T12:12:24Z |
| alsa-2026:1334 | Moderate: glibc security update | 2026-01-27T00:00:00Z | 2026-01-29T12:29:45Z |
| alsa-2026:1254 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-29T12:14:07Z |
| alsa-2026:1239 | Important: fence-agents security update | 2026-01-26T00:00:00Z | 2026-02-02T11:30:59Z |
| alsa-2026:1226 | Important: python3.12-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:21:23Z |
| alsa-2026:1224 | Important: python3.11-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:28:50Z |
| alsa-2026:1178 | Moderate: kernel security update | 2026-01-26T00:00:00Z | 2026-02-02T11:36:10Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-175 | UNKNOWN READ in insert_free | 2025-02-28T00:12:26.919208Z | 2025-02-28T00:12:26.919553Z |
| osv-2025-174 | Heap-use-after-free in gc_trace | 2025-02-28T00:12:25.140274Z | 2025-02-28T00:12:25.140618Z |
| osv-2025-173 | UNKNOWN READ in chunk_obj_alloc | 2025-02-28T00:11:40.566459Z | 2025-02-28T00:11:40.566797Z |
| osv-2025-169 | Stack-buffer-overflow in utf8_in2 | 2025-02-27T00:07:08.029075Z | 2026-03-21T14:18:54.197384Z |
| osv-2025-165 | Index-out-of-bounds in dwg_decode_eed | 2025-02-26T00:17:27.930225Z | 2025-02-26T00:17:27.930707Z |
| osv-2025-162 | Heap-buffer-overflow in snmp_in_options | 2025-02-24T00:15:40.967551Z | 2025-03-18T00:30:24.116747Z |
| osv-2025-161 | Heap-buffer-overflow in se_add_pair | 2025-02-24T00:15:33.662895Z | 2025-03-18T00:37:12.676515Z |
| osv-2025-160 | UNKNOWN WRITE in ndpi_free_flow_data | 2025-02-24T00:07:49.495615Z | 2025-02-24T00:07:49.495976Z |
| osv-2025-156 | Check failed in CheckUnwind | 2025-02-23T00:16:50.073196Z | 2025-02-23T00:16:50.073520Z |
| osv-2025-154 | UNKNOWN READ in ndpi_strdup | 2025-02-23T00:13:05.487818Z | 2025-02-23T00:13:05.488183Z |
| osv-2025-149 | UNKNOWN READ in processClientServerHello | 2025-02-23T00:00:50.236281Z | 2025-02-23T00:00:50.236700Z |
| osv-2025-148 | Heap-buffer-overflow in setup_engineID | 2025-02-23T00:00:36.951152Z | 2025-03-18T00:22:22.817245Z |
| osv-2025-147 | UNKNOWN WRITE in ndpi_free_flow_data | 2025-02-22T00:18:07.814416Z | 2025-02-22T00:18:07.814726Z |
| osv-2025-145 | Heap-buffer-overflow in ___interceptor_strncat | 2025-02-22T00:14:15.620085Z | 2025-02-22T00:14:15.620535Z |
| osv-2025-133 | Stack-buffer-overflow in se_read_conf | 2025-02-17T00:02:18.986364Z | 2025-03-18T00:27:33.917908Z |
| osv-2025-132 | Heap-use-after-free in netsnmp_hex_to_binary | 2025-02-17T00:01:01.920904Z | 2025-03-18T00:33:26.648884Z |
| osv-2025-131 | Heap-buffer-overflow in vips_foreign_save_heif_write_block | 2025-02-16T00:13:44.282887Z | 2025-03-18T00:32:21.245932Z |
| osv-2025-127 | Object-size in unpack_dsd_samples | 2025-02-15T00:16:56.314634Z | 2025-02-15T00:16:56.315060Z |
| osv-2025-124 | Use-of-uninitialized-value in get_word | 2025-02-15T00:09:23.967012Z | 2025-02-15T00:09:23.967345Z |
| osv-2025-119 | Heap-buffer-overflow in snmp_config_when | 2025-02-14T00:15:08.375253Z | 2025-03-18T00:37:43.437021Z |
| osv-2025-114 | Index-out-of-bounds in ada_fuzz_header.h | 2025-02-14T00:11:24.754671Z | 2025-02-14T00:11:24.755045Z |
| osv-2025-113 | Heap-buffer-overflow in snmp_log_options | 2025-02-14T00:01:45.812592Z | 2025-03-18T00:35:43.690001Z |
| osv-2025-111 | Stack-buffer-overflow in absl::debugging_internal::ParseLocalNameSuffix | 2025-02-13T00:15:36.403252Z | 2025-02-13T00:15:36.403744Z |
| osv-2022-1292 | Heap-buffer-overflow in LibRaw::phase_one_correct | 2025-02-10T00:13:32.671074Z | 2025-02-10T00:13:32.671487Z |
| osv-2025-108 | Use-of-uninitialized-value in decimate_dsd_run | 2025-02-10T00:12:35.140061Z | 2025-02-10T00:12:35.140400Z |
| osv-2025-107 | Use-of-uninitialized-value in get_words_lossless | 2025-02-10T00:06:27.370789Z | 2025-02-10T00:06:27.371196Z |
| osv-2025-105 | Heap-use-after-free in unpack_dsd_samples | 2025-02-10T00:00:59.046535Z | 2025-02-10T00:00:59.047010Z |
| osv-2025-93 | Heap-buffer-overflow in lj_strfmt_pushvf | 2025-02-05T00:18:14.584575Z | 2025-07-23T14:24:29.384461Z |
| osv-2025-92 | Null-dereference READ in session_startup | 2025-02-05T00:18:00.385170Z | 2025-12-20T14:25:08.038174Z |
| osv-2025-90 | Null-dereference READ in ubsan_GetStackTrace | 2025-02-03T00:02:54.185593Z | 2025-12-20T14:15:37.974751Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0013 | resolve is unmaintained | 2025-02-21T12:00:00Z | 2025-03-07T15:52:15Z |
| rustsec-2025-0007 | *ring* is unmaintained | 2025-02-20T12:00:00Z | 2025-03-06T21:16:59Z |
| rustsec-2025-0015 | Denial of Service via malicious Web Push endpoint | 2025-02-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0159 | `sophosfirewall-python` was removed from crates.io for malicious code | 2025-02-15T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0155 | `rands` was removed from crates.io for malicious code | 2025-02-10T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2025-0030 | totally-safe-transmute allows transmuting any type to any other type in safe Rust | 2025-02-10T12:00:00Z | 2025-05-06T20:14:30Z |
| rustsec-2025-0029 | totally-safe introduces memory vulnerabilities in safe Rust | 2025-02-10T12:00:00Z | 2025-05-05T18:31:28Z |
| rustsec-2025-0028 | cve-rs introduces memory vulnerabilities in safe Rust | 2025-02-10T12:00:00Z | 2025-05-06T21:08:48Z |
| rustsec-2025-0006 | Hickory DNS failure to verify self-signed RRSIG for DNSKEYs | 2025-02-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0004 | ssl::select_next_proto use after free | 2025-02-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0160 | `custom-req-on-workers` was removed from crates.io for malicious code | 2025-01-30T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0158 | `jfrog_quotes` was removed from crates.io for malicious code | 2025-01-30T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0001 | gix-worktree-state nonexclusive checkout sets executable files world-writable | 2025-01-18T12:00:00Z | 2025-01-22T17:11:51Z |
| rustsec-2025-0040 | `root` appended to group listings | 2025-01-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0026 | registry is unmaintained | 2025-01-13T12:00:00Z | 2025-04-29T08:11:21Z |
| rustsec-2025-0005 | Out of bounds write triggered by crafted coverage data | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0003 | Segmentation fault due to lack of bound check | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0002 | Segmentation fault due to lack of bound check | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0430 | Use of insecure cryptographic algorithms | 2024-12-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0431 | Unsound usages of `core::slice::from_raw_parts` | 2024-12-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0435 | Unsound usages of `Vec::from_raw_parts` | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0426 | Unsound usages of `u8` type casting | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0424 | Unsound usages of `core::slice::from_raw_parts_mut` | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0433 | Malicious plugin names, recipients, or identities can cause arbitrary binary execution | 2024-12-18T12:00:00Z | 2025-01-03T18:23:54Z |
| rustsec-2024-0432 | Malicious plugin names, recipients, or identities can cause arbitrary binary execution | 2024-12-18T12:00:00Z | 2025-01-03T18:23:54Z |
| rustsec-2024-0437 | Crash due to uncontrolled recursion in protobuf crate | 2024-12-12T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0423 | gtk-layer-shell-sys GTK3 bindings - no longer maintained | 2024-12-09T12:00:00Z | 2024-12-09T13:12:34Z |
| rustsec-2024-0422 | gtk-layer-shell GTK3 bindings - no longer maintained | 2024-12-09T12:00:00Z | 2024-12-09T13:12:34Z |
| rustsec-2024-0421 | `idna` accepts Punycode labels that do not produce any non-ASCII when decoded | 2024-12-09T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0447 | Panics on Malformed Untrusted Input | 2024-12-05T12:00:00Z | 2025-12-24T14:48:25Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-parse-2026-30854 | Parse Server: GraphQL `__type` introspection bypass via inline fragments when public introspection is disabled | 2026-03-11T15:49:02.829Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30850 | Parse Server: File metadata endpoint bypasses `beforeFind` / `afterFind` trigger authorization | 2026-03-11T15:48:59.848Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30848 | Parse Server: `PagesRouter` path traversal allows reading files outside configured pages directory | 2026-03-11T15:48:57.194Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30835 | Parse Server: Malformed `$regex` query leaks database error details in API response | 2026-03-11T15:48:54.398Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30229 | Parse Server: Endpoint `/loginAs` allows `readOnlyMasterKey` to gain full read and write access as any user | 2026-03-11T15:48:51.922Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30228 | Parse Server: File creation and deletion bypasses `readOnlyMasterKey` write restriction | 2026-03-11T15:48:49.330Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-29182 | Parse Server: Cloud Hooks and Cloud Jobs bypass `readOnlyMasterKey` write restriction | 2026-03-11T15:48:46.637Z | 2026-03-11T18:56:50.865Z |
| bit-zookeeper-2026-24308 | Apache ZooKeeper: Sensitive information disclosure in client configuration handling | 2026-03-10T08:52:17.946Z | 2026-03-11T09:11:40.352Z |
| bit-zookeeper-2026-24281 | Apache ZooKeeper: Reverse-DNS fallback enables hostname verification bypass in ZooKeeper ZKTrustManager | 2026-03-10T08:52:16.699Z | 2026-03-11T09:11:40.352Z |
| bit-mariadb-2026-3494 | MariaDB Server Audit Plugin Comment Handling Bypass | 2026-03-10T08:46:18.025Z | 2026-03-17T09:18:01.284Z |
| bit-golang-2026-27142 | URLs in meta content attribute actions are not escaped in html/template | 2026-03-10T08:44:16.859Z | 2026-03-17T09:18:01.284Z |
| bit-golang-2026-27139 | FileInfo can escape from a Root in os | 2026-03-10T08:44:14.844Z | 2026-03-10T09:11:39.609Z |
| bit-golang-2026-27138 | Panic in name constraint checking for malformed certificates in crypto/x509 | 2026-03-10T08:44:12.992Z | 2026-03-11T09:11:40.352Z |
| bit-golang-2026-27137 | Incorrect enforcement of email constraints in crypto/x509 | 2026-03-10T08:44:11.145Z | 2026-03-11T09:11:40.352Z |
| bit-golang-2026-25679 | Incorrect parsing of IPv6 host literals in net/url | 2026-03-10T08:44:09.300Z | 2026-03-11T09:11:40.352Z |
| bit-maven-2021-26291 | block repositories using http by default | 2026-03-10T08:44:08.742Z | 2026-03-10T09:11:39.609Z |
| bit-ghost-2026-29784 | Ghost: Incomplete CSRF protections around OTC use | 2026-03-10T08:40:17.691Z | 2026-03-10T09:11:39.609Z |
| bit-ghost-2026-29053 | Ghost Vulnerable to Remote Code Execution via Malicious Themes | 2026-03-07T08:42:59.400Z | 2026-03-10T09:11:39.609Z |
| bit-moodle-2025-67847 | Moodle: moodle: remote code execution via insufficient restore input validation | 2026-03-06T08:50:20.446Z | 2026-03-06T09:10:26.160Z |
| bit-python-2026-2297 | SourcelessFileLoader does not use io.open_code() | 2026-03-06T08:50:18.397Z | 2026-03-06T09:10:26.160Z |
| bit-moodle-2021-47857 | Moodle 3.10.3 - 'label' Persistent Cross Site Scripting | 2026-03-06T08:46:28.845Z | 2026-03-06T09:10:26.160Z |
| bit-libpython-2026-2297 | SourcelessFileLoader does not use io.open_code() | 2026-03-06T08:43:26.501Z | 2026-03-06T09:10:26.160Z |
| bit-django-2026-25674 | Potential incorrect permissions on newly created file system objects | 2026-03-06T08:38:51.644Z | 2026-03-06T09:10:26.160Z |
| bit-django-2026-25673 | Potential denial-of-service vulnerability in URLField via Unicode normalization on Windows | 2026-03-06T08:38:49.880Z | 2026-03-06T09:10:26.160Z |
| bit-activemq-2025-66168 | Apache ActiveMQ, Apache ActiveMQ All Module, Apache ActiveMQ MQTT Module: MQTT control packet remaining length field is not properly validated | 2026-03-06T08:36:37.326Z | 2026-03-06T09:10:26.160Z |
| bit-discourse-2026-28227 | Discourse Vulnerable to Unauthorized Topic Creation in Staff-Only Categories via Topic Timer publish_to_category | 2026-03-03T13:29:32.408Z | 2026-03-03T13:59:21.562Z |
| bit-discourse-2026-28219 | Privilege Escalation via Mass Assignment Allows Regular Users to Set Topics as Global Banners | 2026-03-03T13:29:30.555Z | 2026-03-03T13:59:21.562Z |
| bit-discourse-2026-28218 | Discourse's Fail-Open Access Control in Data Explorer Plugin Allows Unauthorized SQL Query Execution | 2026-03-03T13:29:28.795Z | 2026-03-03T13:59:21.562Z |
| bit-discourse-2026-27162 | DIscourse doesn't prevent whispers to leak in excerpts | 2026-03-03T13:29:27.139Z | 2026-03-03T13:59:21.562Z |
| bit-discourse-2026-27154 | Discourse has XSS when editing a malicious post | 2026-03-03T13:29:25.328Z | 2026-03-03T13:59:21.562Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-gk29346 | Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2025-66564, CVE-2026-1229, CVE-2026-22039, CVE-2026-22703, CVE-2026-22772, CVE-2026-23831, CVE-2026-23881, CVE-2026-24051, CVE-2026-24117, CVE-2026-24137, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-29wx-vh33-7x7r, ghsa-2x5j-vhc8-9cwm, ghsa-459x-q9hg-4gpq, ghsa-4qg8-fj49-pxjh, ghsa-4vq8-7jfc-9cvp, ghsa-6m8w-jc87-6cr7, ghsa-88jx-383q-w4qc, ghsa-95pr-fxf5-86gv, ghsa-c5q2-7r4c-mv6g, ghsa-c6gw-w398-hv78, ghsa-c77r-fh37-x2px, ghsa-f83f-xpx7-ffpw, ghsa-fv92-fjc5-jj9h, ghsa-jrr2-x33p-6hvc, ghsa-mh63-6h87-95cp, ghsa-mqqf-5wvp-8fh8, ghsa-p77j-4mvh-x3m3, ghsa-qjvc-p88j-j9rm, ghsa-r5p3-955p-5ggq, ghsa-v23v-6jw2-98fq, ghsa-v6v8-xj6m-xwqh, ghsa-xw73-rw38-6vjc applied in versions: 1.4.2-r2, 1.4.2-r4, 1.4.2-r6, 1.4.2-r7 | 2026-04-01T09:22:17.389111Z | 2026-03-25T11:02:44Z |
| cleanstart-2026-lk63891 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.29.0-r0, 1.29.1-r0 | 2026-04-01T09:22:08.586608Z | 2026-03-25T05:12:36Z |
| cleanstart-2026-jm60128 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0, 1.28.4-r1 | 2026-04-01T09:22:08.268986Z | 2026-03-25T05:05:50Z |
| cleanstart-2026-ej96468 | Security fixes for ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0, 1.28.4-r1, 1.28.5-r0 | 2026-04-01T09:22:08.656529Z | 2026-03-25T05:09:00Z |
| cleanstart-2026-ce02533 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2025-62820, CVE-2026-30836, CVE-2026-33186, ghsa-p77j-4mvh-x3m3, ghsa-q4r8-xm5f-56gw applied in versions: 0.10.1-r0, 0.9.10-r0, 0.9.9-r0, 0.9.9-r1 | 2026-04-01T09:21:33.459909Z | 2026-03-25T10:51:25Z |
| cleanstart-2026-at91215 | Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2x5j-vhc8-9cwm, ghsa-6m8w-jc87-6cr7, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-vvgc-356p-c3xw applied in versions: 1.14.4-r1, 1.14.4-r2, 1.15.3-r1, 1.15.3-r2 | 2026-04-01T09:20:36.013002Z | 2026-03-25T11:15:10Z |
| cleanstart-2026-gm18965 | Security fixes for CVE-2025-15558, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.14.2-r2 | 2026-04-01T09:20:25.238160Z | 2026-03-25T11:27:12Z |
| cleanstart-2026-ic68874 | Security fixes for CVE-2025-15558, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.13.4-r0, 2.13.4-r1 | 2026-04-01T09:20:18.599218Z | 2026-03-25T11:32:52Z |
| cleanstart-2026-ls12576 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 1.16.2-r2, 1.17.2-r0, 1.17.2-r1, 1.18.0-r0 | 2026-04-01T09:19:50.661957Z | 2026-03-25T14:09:04Z |
| cleanstart-2026-jg61689 | Security fixes for CVE-2025-15558, CVE-2026-33186, ghsa-p436-gjf2-799p applied in versions: 1.29.0-r0, 1.29.0-r1 | 2026-04-01T09:19:48.393428Z | 2026-03-25T13:59:35Z |
| cleanstart-2026-ha09227 | Security fixes for CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.18.0-r0, 0.18.0-r1 | 2026-04-01T09:19:28.951475Z | 2026-03-25T14:21:54Z |
| cleanstart-2026-pn56882 | Security fixes for CVE-2026-24051 applied in versions: 1.65.0-r0 | 2026-04-01T09:19:27.916186Z | 2026-03-25T14:07:29Z |
| cleanstart-2026-ma32024 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, CVE-2026-33186, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.2-r1, 3.3.3-r0, 3.3.4-r0 | 2026-04-01T09:19:21.169476Z | 2026-03-26T07:01:17Z |
| cleanstart-2026-ae87452 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.20.12-r0, 1.20.12-r1, 1.20.12-r2 | 2026-04-01T09:19:15.219275Z | 2026-03-25T14:22:43Z |
| cleanstart-2026-gm63718 | Security fixes for CVE-2025-15558, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-25934, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-q9hv-hpm4-hj6x applied in versions: 1.39.0-r0, 1.39.0-r1, 1.39.0-r2, 1.39.0-r3 | 2026-04-01T09:19:09.281060Z | 2026-03-25T14:21:09Z |
| cleanstart-2026-mx45462 | Security fixes for CVE-2025-61729 applied in versions: 1.1.0-r0 | 2026-04-01T09:18:16.445023Z | 2026-03-25T14:24:33Z |
| cleanstart-2026-gi40937 | Security fixes for CVE-2023-5870, CVE-2024-7348, CVE-2025-8713, CVE-2025-8714, CVE-2025-8715 applied in versions: 16.1-r0, 16.2-r0, 16.4-r0, 17.6-r0 | 2026-04-01T09:18:12.444694Z | 2026-03-26T07:01:17Z |
| cleanstart-2026-jr35772 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:17:37.864227Z | 2026-03-26T15:01:29Z |
| cleanstart-2026-bd71263 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:17:26.065920Z | 2026-03-26T17:04:08Z |
| cleanstart-2026-kz45320 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:16:45.727713Z | 2026-03-26T18:22:34Z |
| cleanstart-2026-eq25508 | Security fixes for CVE-2025-11082, CVE-2025-11083 applied in versions: 2.46.0-r0 | 2026-04-01T09:16:21.124779Z | 2026-03-26T13:10:59Z |
| cleanstart-2026-em10970 | Security fixes for CVE-2017-9233, CVE-2019-15903, CVE-2021-45960, CVE-2021-46143, CVE-2022-22822, CVE-2022-22823, CVE-2022-22824, CVE-2022-22825, CVE-2022-22826, CVE-2022-22827, CVE-2022-23852, CVE-2022-23990, CVE-2022-25235, CVE-2022-25236, CVE-2022-25313, CVE-2022-25314, CVE-2022-25315, CVE-2022-40674, CVE-2022-43680, CVE-2023-52425, CVE-2023-52426, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-50602, CVE-2026-24515, CVE-2026-25210, CVE-2026-32767 applied in versions: 2.2.0-r1, 2.2.7-r0, 2.2.7-r1, 2.4.3-r0, 2.4.4-r0, 2.4.5-r0, 2.4.9-r0, 2.5.0-r0, 2.6.0-r0, 2.6.2-r0, 2.6.3-r0, 2.6.4-r0, 2.7.2-r0, 2.7.5-r0 | 2026-04-01T09:16:01.861201Z | 2026-03-26T13:10:59Z |
| cleanstart-2026-ow78143 | Security fixes for CVE-2025-68156, CVE-2026-24051, CVE-2026-26958, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 2.18.3-r0, 2.18.3-r1 | 2026-04-01T09:14:00.541150Z | 2026-03-26T14:38:42Z |
| cleanstart-2026-ac65885 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25518, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 1.18.0-r0, 1.18.0-r1, 1.18.0-r2, 1.18.0-r3 | 2026-04-01T09:13:17.231184Z | 2026-03-27T06:25:28Z |
| cleanstart-2026-oj21550 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2026-24051, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 1.34.2-r0, 1.35.0-r0, 1.35.3-r0 | 2026-04-01T09:12:23.484446Z | 2026-03-28T09:40:45Z |
| cleanstart-2026-jf28061 | Security fixes for CVE-2026-24051, CVE-2026-26958, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 2.19.0-r0, 2.19.0-r1 | 2026-04-01T09:12:22.444974Z | 2026-03-27T12:52:14Z |
| cleanstart-2026-cf63743 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2026-24051, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 1.34.2-r0, 1.34.6-r0 | 2026-04-01T09:12:16.516536Z | 2026-03-28T09:39:54Z |
| cleanstart-2026-gz72045 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 3.51.2-r0 | 2026-04-01T09:11:42.310345Z | 2026-03-28T09:54:58Z |
| cleanstart-2026-cg86499 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 3.6.5-r0 | 2026-04-01T09:11:07.076579Z | 2026-03-28T09:58:50Z |
| cleanstart-2026-kj02127 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.8.6-r0, 1.8.6-r1 | 2026-04-01T09:11:01.446923Z | 2026-03-28T10:00:21Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2019-ALE-003 | Campagnes de rançongiciels | 2019-01-31T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| certfr-2019-ale-002 | Vulnérabilités affectant l'écosystème Microsoft Exchange et Active Directory | 2019-01-30T00:00:00.000000 | 2019-03-06T00:00:00.000000 |
| CERTFR-2019-ALE-002 | Vulnérabilités affectant l'écosystème Microsoft Exchange et Active Directory | 2019-01-30T00:00:00.000000 | 2019-03-06T00:00:00.000000 |
| certfr-2019-ale-001 | Vulnérabilité dans le gestionnaire de paquets APT | 2019-01-22T00:00:00.000000 | 2019-02-27T00:00:00.000000 |
| CERTFR-2019-ALE-001 | Vulnérabilité dans le gestionnaire de paquets APT | 2019-01-22T00:00:00.000000 | 2019-02-27T00:00:00.000000 |
| certfr-2018-ale-013 | Vulnérabilité dans Microsoft Internet Explorer | 2018-12-20T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| CERTFR-2018-ALE-013 | Vulnérabilité dans Microsoft Internet Explorer | 2018-12-20T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| certfr-2018-ale-012 | Vulnérabilité dans Wallix AdminBastion | 2018-10-26T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| CERTFR-2018-ALE-012 | Vulnérabilité dans Wallix AdminBastion | 2018-10-26T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| certfr-2018-ale-011 | Vulnérabilité dans le client Git | 2018-10-08T00:00:00.000000 | 2018-10-12T00:00:00.000000 |
| CERTFR-2018-ALE-011 | Vulnérabilité dans le client Git | 2018-10-08T00:00:00.000000 | 2018-10-12T00:00:00.000000 |
| certfr-2018-ale-010 | Vulnérabilité activement exploitée dans le framework STRUTS 2 | 2018-08-29T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-009 | Vulnérabilité dans Microsoft Windows | 2018-08-29T00:00:00.000000 | 2018-09-17T00:00:00.000000 |
| CERTFR-2018-ALE-010 | Vulnérabilité activement exploitée dans le framework STRUTS 2 | 2018-08-29T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| CERTFR-2018-ALE-009 | Vulnérabilité dans Microsoft Windows | 2018-08-29T00:00:00.000000 | 2018-09-17T00:00:00.000000 |
| certfr-2018-ale-008 | Campagne de messages électroniques non sollicités de type Locky Locker | 2018-08-03T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| CERTFR-2018-ALE-008 | Campagne de messages électroniques non sollicités de type Locky Locker | 2018-08-03T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-007 | Multiples vulnérabilités dans S/MIME et OpenPGP | 2018-05-14T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| CERTFR-2018-ALE-007 | Multiples vulnérabilités dans S/MIME et OpenPGP | 2018-05-14T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-006 | Vulnérabilité dans Cisco IOS et IOS XE Smart Install Client | 2018-04-06T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| CERTFR-2018-ALE-006 | Vulnérabilité dans Cisco IOS et IOS XE Smart Install Client | 2018-04-06T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-005 | Multiples vulnérabilités dans Drupal | 2018-03-29T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| CERTFR-2018-ALE-005 | Multiples vulnérabilités dans Drupal | 2018-03-29T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-004 | Vulnérabilité dans le serveur de messagerie Exim | 2018-03-07T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| CERTFR-2018-ALE-004 | Vulnérabilité dans le serveur de messagerie Exim | 2018-03-07T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-003 | Vulnérabilité dans Adobe Flash Player | 2018-02-02T00:00:00.000000 | 2018-02-07T00:00:00.000000 |
| CERTFR-2018-ALE-003 | Vulnérabilité dans Adobe Flash Player | 2018-02-02T00:00:00.000000 | 2018-02-07T00:00:00.000000 |
| certfr-2018-ale-002 | Vulnérabilité dans Cisco Adaptive Security Appliance | 2018-02-01T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| CERTFR-2018-ALE-002 | Vulnérabilité dans Cisco Adaptive Security Appliance | 2018-02-01T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| certfr-2018-ale-001 | Multiples vulnérabilités de fuite d'informations dans des processeurs | 2018-01-04T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0184 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0183 | Vulnérabilité dans HPE Aruba Networking ClearPass Policy Manager | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0182 | Multiples vulnérabilités dans Atlassian Confluence | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0181 | Vulnérabilité dans Apache Tomcat | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0180 | Vulnérabilité dans NetApp StorageGRID | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0179 | Multiples vulnérabilités dans SPIP | 2026-02-18T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0178 | Multiples vulnérabilités dans Tenable Security Center | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0177 | Multiples vulnérabilités dans Moodle | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0176 | Vulnérabilité dans Mattermost Server | 2026-02-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0175 | Multiples vulnérabilités dans les produits Mozilla | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0174 | Multiples vulnérabilités dans LibreNMS | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0173 | Multiples vulnérabilités dans les produits Mattermost | 2026-02-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0172 | Vulnérabilité dans Google Chrome | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| CERTFR-2026-AVI-0173 | Multiples vulnérabilités dans les produits Mattermost | 2026-02-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| CERTFR-2026-AVI-0172 | Vulnérabilité dans Google Chrome | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| certfr-2026-avi-0171 | Multiples vulnérabilités dans les produits IBM | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0170 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0169 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0168 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0167 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0166 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0165 | Vulnérabilité dans Mattermost Server | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0164 | Multiples vulnérabilités dans PostgreSQL | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0163 | Multiples vulnérabilités dans HAProxy | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0162 | Multiples vulnérabilités dans Juniper Networks Secure Analytics | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0161 | Vulnérabilité dans Tenable Nessus Agent | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0171 | Multiples vulnérabilités dans les produits IBM | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0170 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0169 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0168 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000018 | Multiple vulnerabilities in home gateway HGW-BL1500HM | 2025-03-19T15:33+09:00 | 2025-03-28T11:48+09:00 |
| jvndb-2025-000020 | +F FS010M vulnerable to OS command injection | 2025-03-18T15:01+09:00 | 2025-03-18T15:01+09:00 |
| jvndb-2025-000017 | hostapd vulnerable to improper processing of RADIUS packets | 2025-03-12T14:19+09:00 | 2025-03-12T14:19+09:00 |
| jvndb-2025-000016 | Multiple vulnerabilities in RemoteView Agent (for Windows) | 2025-03-06T14:27+09:00 | 2025-03-10T15:22+09:00 |
| jvndb-2025-001898 | Multiple vulnerabilities in FutureNet AS series (Industrial Routers) and FA series (Protocol Conversion Machine) | 2025-03-04T14:56+09:00 | 2025-03-04T14:56+09:00 |
| jvndb-2025-001605 | "RoboForm Password Manager" App for Android vulnerable to authentication bypass using an alternate path or channel | 2025-02-20T20:15+09:00 | 2025-02-20T20:15+09:00 |
| jvndb-2025-000014 | Multiple cross-site scripting vulnerabilities in Movable Type | 2025-02-19T16:19+09:00 | 2025-02-19T16:19+09:00 |
| jvndb-2025-000015 | RevoWorks SCVX and RevoWorks Browser vulnerable to incorrect resource transfer between spheres | 2025-02-19T14:51+09:00 | 2025-02-19T14:51+09:00 |
| jvndb-2025-001563 | Out-of-bounds write vulnerability in FUJIFILM Business Innovation Corp. MFPs | 2025-02-18T16:33+09:00 | 2025-02-18T16:33+09:00 |
| jvndb-2025-001562 | Out-of-bounds read vulnerability in OMRON CX-Programmer | 2025-02-18T16:24+09:00 | 2025-02-18T16:24+09:00 |
| jvndb-2025-001548 | Out-of-bounds read vulnerability in Cente middleware | 2025-02-17T18:22+09:00 | 2025-02-17T18:22+09:00 |
| jvndb-2025-000012 | Multiple vulnerabilities in The LuxCal Web Calendar | 2025-02-17T13:43+09:00 | 2025-02-17T13:43+09:00 |
| jvndb-2025-000013 | acmailer CGI and acmailer DB vulnerable to OS command injection | 2025-02-14T16:39+09:00 | 2025-02-14T16:39+09:00 |
| jvndb-2025-000002 | Multiple vulnerabilities in NEC Aterm series (NV25-003) | 2025-02-14T15:48+09:00 | 2025-02-14T15:48+09:00 |
| jvndb-2025-000011 | Multiple vulnerabilities in FileMegane | 2025-02-13T13:39+09:00 | 2025-02-13T13:39+09:00 |
| jvndb-2025-000010 | acmailer vulnerable to cross-site scripting | 2025-02-12T15:05+09:00 | 2025-02-12T15:05+09:00 |
| jvndb-2025-001017 | Multiple vulnerabilities in STEALTHONE D220/D340/D440 | 2025-02-06T18:27+09:00 | 2025-02-06T18:27+09:00 |
| jvndb-2025-001016 | OMRON NJ/NX series vulnerable to path traversal | 2025-02-06T18:27+09:00 | 2025-05-08T17:44+09:00 |
| jvndb-2025-001018 | Improper restriction of XML external entity reference (XXE) vulnerability in OMRON NB-Designer | 2025-02-06T18:26+09:00 | 2025-02-06T18:26+09:00 |
| jvndb-2025-000008 | Multiple vulnerabilities in Defense Platform Home Edition | 2025-02-05T14:06+09:00 | 2025-02-05T14:06+09:00 |
| jvndb-2025-000009 | WordPress Plugin "Activity Log WinterLock" vulnerable to cross-site request forgery | 2025-02-04T13:58+09:00 | 2025-02-04T13:58+09:00 |
| jvndb-2025-001244 | Clickjacking Vulnerability in JP1/ServerConductor/Deployment Manager | 2025-01-30T18:19+09:00 | 2025-01-30T18:19+09:00 |
| jvndb-2025-000007 | SXF Common Library vulnerable to improper input data handling | 2025-01-29T14:57+09:00 | 2025-01-29T14:57+09:00 |
| jvndb-2025-001238 | Multiple out-of-bounds write vulnerabilities in Canon Office/Small Office Multifunction Printers and Laser Printers | 2025-01-29T13:41+09:00 | 2025-05-27T16:06+09:00 |
| jvndb-2025-000006 | WordPress Plugin "Simple Image Sizes" vulnerable to cross-site scripting | 2025-01-28T13:44+09:00 | 2025-01-28T13:44+09:00 |
| jvndb-2025-000005 | EXIF Viewer Classic vulnerable to cross-site scripting | 2025-01-27T14:25+09:00 | 2025-01-27T14:25+09:00 |
| jvndb-2025-000004 | Multiple vulnerabilities in I-O DATA router UD-LT2 | 2025-01-22T13:55+09:00 | 2025-02-20T15:55+09:00 |
| jvndb-2025-000003 | FortiWeb vulnerable to SQL injection | 2025-01-21T15:59+09:00 | 2025-01-21T15:59+09:00 |
| jvndb-2025-001027 | Linux Ratfor vulnerable to stack-based buffer overflow | 2025-01-16T13:27+09:00 | 2025-01-16T13:27+09:00 |
| jvndb-2025-000001 | PLANEX COMMUNICATIONS MZK-DP300N vulnerable to cross-site scripting | 2025-01-08T17:08+09:00 | 2025-01-08T17:08+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14396 | OpenClaw文件包含漏洞 | 2026-03-12 | 2026-03-20 |
| cnvd-2026-14395 | OpenClaw访问控制错误漏洞(CNVD-2026-14395) | 2026-03-12 | 2026-03-20 |
| cnvd-2026-13832 | OpenClaw拒绝服务漏洞(CNVD-2026-13832) | 2026-03-12 | 2026-03-16 |
| cnvd-2026-13801 | OpenClaw命令注入漏洞(CNVD-2026-13801) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13800 | OpenClaw拒绝服务漏洞(CNVD-2026-13800) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13601 | OpenClaw信息泄露漏洞(CNVD-2026-13601) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13596 | OpenClaw存在未明漏洞(CNVD-2026-13596) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13595 | OpenClaw访问控制错误漏洞(CNVD-2026-13595) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13594 | OpenClaw加密问题漏洞 | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13593 | OpenClaw存在未明漏洞(CNVD-2026-13593) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13592 | OpenClaw路径遍历漏洞(CNVD-2026-13592) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13591 | OpenClaw数据伪造问题漏洞(CNVD-2026-13591) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13590 | OpenClaw代码问题漏洞(CNVD-2026-13590) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13589 | OpenClaw存在未明漏洞(CNVD-2026-13589) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13588 | OpenClaw访问控制错误漏洞(CNVD-2026-13588) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13555 | OpenClaw任意文件读取漏洞(CNVD-2026-13555) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13554 | OpenClaw拒绝服务漏洞(CNVD-2026-13554) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13553 | OpenClaw路径遍历漏洞 | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13552 | OpenClaw拒绝服务漏洞(CNVD-2026-13552) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13551 | OpenClaw路径遍历漏洞(CNVD-2026-13551) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13544 | OpenClaw身份伪造漏洞 | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13543 | OpenClaw拒绝服务漏洞(CNVD-2026-13543) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-15390 | Mozilla Firefox和Mozilla Thunderbird代码执行漏洞 | 2026-03-11 | 2026-03-31 |
| cnvd-2026-15389 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15389) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15388 | 多款Mozilla产品代码执行漏洞(CNVD-2026-15388) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15387 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15387) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15386 | 多款Mozilla产品代码执行漏洞(CNVD-2026-15386) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15385 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15385) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15384 | 多款Mozilla产品整数溢出漏洞(CNVD-2026-15384) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15383 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15383) | 2026-03-11 | 2026-03-30 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01454 | Уязвимость функции rcu_tasks_rude_wait_gp() модуля kernel/rcu/tasks.h ядра операционной с… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01453 | Уязвимость функции gfs2_show_options() модуля fs/gfs2/super.c файловой системы GFS2 ядра … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01452 | Уязвимость функции show_ipi_list() модуля arch/loongarch/kernel/smp.c поддержки архитекту… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01451 | Уязвимость функции ucsi_read_message_in() модуля drivers/usb/typec/ucsi/ucsi.c драйвера п… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01450 | Уязвимость определения структуры imx8mp_blk_ctrl_domain_data{} модуля drivers/pmdomain/im… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01449 | Уязвимость функции free_netvsc_device() модуля drivers/net/hyperv/netvsc.c драйвера подде… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01448 | Уязвимость функции iwl_txq_reclaim() модуля drivers/net/wireless/intel/iwlwifi/queue/tx.c… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01447 | Уязвимость функции x86_android_tablet_remove() модуля drivers/platform/x86/x86-android-ta… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01446 | Уязвимость функции __ext4_fill_super() модуля fs/ext4/super.c ядра операционной системы L… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01445 | Уязвимость функции ena_com_cdesc_rx_pkt_get() модуля drivers/net/ethernet/amazon/ena/ena_… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01444 | Уязвимость функции scrub_submit_extent_sector_read() модуля fs/btrfs/scrub.c поддержки фа… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01443 | Уязвимость функции nvmf_reg_read32() модуля drivers/nvme/host/fabrics.c драйвера поддержк… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01442 | Уязвимость функции kvm_get_mode() модуля arch/arm64/include/asm/kvm_host.h поддержки плат… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01441 | Уязвимость компонента RDMA/mlx5 ядра операционной системы Linux, позволяющая нарушителю в… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01440 | Уязвимость команды WMI_TXSTATUS_EVENTID ядра операционной системы Linux, позволяющая нару… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01439 | Уязвимость компонента smb ядра операционной системы Linux, позволяющая нарушителю оказать… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01438 | Уязвимость функции stbi__convert_format библиотек для C/C++ Libstb, позволяющая нарушител… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01437 | Уязвимость компонента kdc/do_tgs_req.c сетевого протокола аутентификации Kerberos, позвол… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01436 | Уязвимость программной платформы Node.js, связанная с неконтролируемым расходом ресурсов,… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01435 | Уязвимость функций Buffer.fill() и Buffer.alloc() программной платформы Node.js, позволяю… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01434 | Уязвимость компонентов node_http2 программной платформы Node.js, позволяющая нарушителю в… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01433 | Уязвимость сетевого протокола аутентификации Kerberos, связанная с непринятием мер по ней… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01432 | Уязвимость сетевого протокола аутентификации Kerberos, связанная с недостатком использова… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01431 | Уязвимость программной платформы для разработки и управления веб-приложениями Symfony, св… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01430 | Уязвимость функции url.parse() программной платформы Node.js, позволяющая нарушителю оказ… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01429 | Уязвимость компонентов http программной платформы Node.js, позволяющая нарушителю вызвать… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01428 | Уязвимость кодировки UCS-2 программной платформы Node.js, позволяющая нарушителю вызвать … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01427 | Уязвимость функции GetImagePixelCache компонента MagickCore/cache.c консольного графическ… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01426 | Уязвимость функции WriteTIFFImage компонента coders/tiff.c консольного графического редак… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01425 | Уязвимость функции MontageImageCommand компонента MagickWand/montage.c консольного графич… | 09.02.2026 | 09.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200610-0022 | User interface inconsistency in Workgroup Manager in Apple Mac OS X 10.4 through 10.4.7 a… | 2024-07-23T21:56:15.078000Z |
| var-200905-0505 | Array index error in the insertItemBefore method in WebKit, as used in Apple Safari befor… | 2024-07-23T21:56:07.125000Z |
| var-201912-0618 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:55:36.712000Z |
| var-202112-2011 | Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 an… | 2024-07-23T21:55:35.394000Z |
| var-201810-0932 | The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side chan… | 2024-07-23T21:55:35.727000Z |
| var-201210-0063 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:55:35.147000Z |
| var-200809-0182 | ImageIO in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows context-dependent attack… | 2024-07-23T21:55:33.188000Z |
| var-201903-0417 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:55:16.315000Z |
| var-201912-0597 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:55:13.309000Z |
| var-200809-0009 | ImageIO in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows context-dependent attack… | 2024-07-23T21:55:12.610000Z |
| var-201704-1589 | In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server t… | 2024-07-23T21:55:11.835000Z |
| var-200911-0398 | The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Int… | 2024-07-23T21:54:40.707000Z |
| var-201912-0128 | A logic issue was addressed with improved state management. This issue is fixed in watchO… | 2024-07-23T21:54:39.274000Z |
| var-201502-0366 | named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when D… | 2024-07-23T21:54:05.549000Z |
| var-201006-1183 | WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4… | 2024-07-23T21:53:56.790000Z |
| var-202003-1784 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:53:51.536000Z |
| var-201302-0132 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:53:51.971000Z |
| var-201711-0447 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T21:53:49.059000Z |
| var-201805-0963 | Systems with microprocessors utilizing speculative execution and speculative execution of… | 2024-07-23T21:53:48.206000Z |
| var-200102-0104 | "Multiple Users" Control Panel in Mac OS 9 allows Normal users to gain Owner privileges b… | 2024-07-23T21:53:48.441000Z |
| var-201403-0387 | Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python … | 2024-07-23T21:53:47.789000Z |
| var-201208-0344 | libxml2 2.9.0-rc1 and earlier, as used in Google Chrome before 21.0.1180.89, does not pro… | 2024-07-23T21:53:17.145000Z |
| var-201910-1495 | The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print… | 2024-07-23T21:53:16.217000Z |
| var-201912-0579 | A logic issue existed in the handling of synchronous page loads. This issue was addressed… | 2024-07-23T21:53:15.777000Z |
| var-200905-0196 | racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denia… | 2024-07-23T21:53:12.318000Z |
| var-200609-0315 | Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary c… | 2024-07-23T21:53:10.410000Z |
| var-202212-1751 | A type confusion issue was addressed with improved state handling. This issue is fixed in… | 2024-07-23T21:52:34.161000Z |
| var-201404-0398 | Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 an… | 2024-07-23T21:52:34.093000Z |
| var-201008-0172 | Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType befor… | 2024-07-23T21:52:33.872000Z |
| var-202108-2172 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:52:30.241000Z |