Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43346 |
N/A
|
ice: ptp: don't WARN when controlling PF is unavailable |
Linux |
Linux |
2026-05-08T13:39:31.930Z | 2026-05-08T13:39:31.930Z |
| CVE-2026-43345 |
N/A
|
net: ipa: fix event ring index not programmed for IPA v5.0+ |
Linux |
Linux |
2026-05-08T13:39:31.222Z | 2026-05-08T13:39:31.222Z |
| CVE-2026-43344 |
N/A
|
perf/x86/intel/uncore: Fix die ID init and look up bugs |
Linux |
Linux |
2026-05-08T13:39:30.537Z | 2026-05-08T13:39:30.537Z |
| CVE-2026-44340 |
8.7 (4.0)
|
PraisonAI: Symlink-extraction bypass of `_safe_extract… |
MervinPraison |
PraisonAI |
2026-05-08T13:38:47.812Z | 2026-05-08T23:22:36.847Z |
| CVE-2026-39816 |
7.5 (4.0)
|
Apache NiFi: Missing Execute Code Required Permission … |
Apache Software Foundation |
Apache NiFi |
2026-05-08T13:38:12.925Z | 2026-05-09T01:12:19.254Z |
| CVE-2026-43343 |
N/A
|
usb: gadget: f_subset: Fix unbalanced refcnt in geth_free |
Linux |
Linux |
2026-05-08T13:37:20.663Z | 2026-05-08T13:37:20.663Z |
| CVE-2026-43342 |
N/A
|
usb: gadget: f_rndis: Protect RNDIS options with mutex |
Linux |
Linux |
2026-05-08T13:37:19.920Z | 2026-05-08T13:37:19.920Z |
| CVE-2026-43341 |
N/A
|
net/ipv6: ioam6: prevent schema length wraparound in t… |
Linux |
Linux |
2026-05-08T13:37:19.256Z | 2026-05-08T13:37:19.256Z |
| CVE-2026-43340 |
N/A
|
comedi: Reinit dev->spinlock between attachments to lo… |
Linux |
Linux |
2026-05-08T13:37:18.580Z | 2026-05-08T13:37:18.580Z |
| CVE-2026-44339 |
8.6 (3.1)
|
PraisonAI has unsafe tool resolution in `ToolExecution… |
MervinPraison |
PraisonAI |
2026-05-08T13:37:09.706Z | 2026-05-08T21:27:22.924Z |
| CVE-2026-44338 |
7.3 (3.1)
|
PraisonAI ships and generates a legacy API server with… |
MervinPraison |
PraisonAI |
2026-05-08T13:35:44.521Z | 2026-05-08T14:14:43.177Z |
| CVE-2026-44337 |
6.3 (3.1)
|
PraisonAI knowledge-store backends interpolate unvalid… |
MervinPraison |
PraisonAI |
2026-05-08T13:33:51.716Z | 2026-05-08T14:19:46.766Z |
| CVE-2026-44336 |
9.4 (4.0)
|
PraisonAI MCP `tools/call` path-traversal and RCE via … |
MervinPraison |
PraisonAI |
2026-05-08T13:32:33.605Z | 2026-05-08T13:32:33.605Z |
| CVE-2026-43339 |
N/A
|
ipv6: prevent possible UaF in addrconf_permanent_addr() |
Linux |
Linux |
2026-05-08T13:31:24.315Z | 2026-05-08T13:31:24.315Z |
| CVE-2026-43338 |
N/A
|
btrfs: reserve enough transaction items for qgroup ioctls |
Linux |
Linux |
2026-05-08T13:31:23.623Z | 2026-05-09T04:10:38.625Z |
| CVE-2026-43337 |
N/A
|
drm/amd/display: Fix NULL pointer dereference in dcn40… |
Linux |
Linux |
2026-05-08T13:31:22.967Z | 2026-05-08T13:31:22.967Z |
| CVE-2026-43336 |
N/A
|
lib/crypto: chacha: Zeroize permuted_state before it l… |
Linux |
Linux |
2026-05-08T13:31:22.280Z | 2026-05-08T13:31:22.280Z |
| CVE-2026-43335 |
N/A
|
interconnect: qcom: sm8450: Fix NULL pointer dereferen… |
Linux |
Linux |
2026-05-08T13:31:21.623Z | 2026-05-08T13:31:21.623Z |
| CVE-2026-43334 |
N/A
|
Bluetooth: SMP: force responder MITM requirements befo… |
Linux |
Linux |
2026-05-08T13:31:20.923Z | 2026-05-08T13:31:20.923Z |
| CVE-2026-43333 |
N/A
|
bpf: reject direct access to nullable PTR_TO_BUF pointers |
Linux |
Linux |
2026-05-08T13:31:20.107Z | 2026-05-08T13:31:20.107Z |
| CVE-2026-43332 |
N/A
|
thermal: core: Fix thermal zone device registration er… |
Linux |
Linux |
2026-05-08T13:31:19.460Z | 2026-05-08T13:31:19.460Z |
| CVE-2026-43331 |
N/A
|
x86/kexec: Disable KCOV instrumentation after load_seg… |
Linux |
Linux |
2026-05-08T13:31:18.787Z | 2026-05-08T13:31:18.787Z |
| CVE-2026-43330 |
N/A
|
crypto: caam - fix overflow on long hmac keys |
Linux |
Linux |
2026-05-08T13:31:18.133Z | 2026-05-08T13:31:18.133Z |
| CVE-2026-43329 |
N/A
|
netfilter: flowtable: strictly check for maximum numbe… |
Linux |
Linux |
2026-05-08T13:31:17.479Z | 2026-05-08T13:31:17.479Z |
| CVE-2026-43328 |
N/A
|
cpufreq: governor: fix double free in cpufreq_dbs_gove… |
Linux |
Linux |
2026-05-08T13:31:16.787Z | 2026-05-08T13:31:16.787Z |
| CVE-2026-43327 |
N/A
|
USB: dummy-hcd: Fix locking/synchronization error |
Linux |
Linux |
2026-05-08T13:31:12.896Z | 2026-05-08T13:31:12.896Z |
| CVE-2026-43326 |
N/A
|
sched_ext: Fix SCX_KICK_WAIT deadlock by deferring wai… |
Linux |
Linux |
2026-05-08T13:31:10.184Z | 2026-05-08T13:31:10.184Z |
| CVE-2026-43325 |
N/A
|
wifi: iwlwifi: mvm: don't send a 6E related command wh… |
Linux |
Linux |
2026-05-08T13:31:09.536Z | 2026-05-08T13:31:09.536Z |
| CVE-2026-43324 |
N/A
|
USB: dummy-hcd: Fix interrupt synchronization error |
Linux |
Linux |
2026-05-08T13:31:08.850Z | 2026-05-08T13:31:08.850Z |
| CVE-2026-43323 |
N/A
|
sched/fair: Fix zero_vruntime tracking fix |
Linux |
Linux |
2026-05-08T13:31:08.188Z | 2026-05-08T13:31:08.188Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-44337 |
6.3 (3.1)
|
PraisonAI knowledge-store backends interpolate unvalid… |
MervinPraison |
PraisonAI |
2026-05-08T13:33:51.716Z | 2026-05-08T14:19:46.766Z |
| CVE-2026-44336 |
9.4 (4.0)
|
PraisonAI MCP `tools/call` path-traversal and RCE via … |
MervinPraison |
PraisonAI |
2026-05-08T13:32:33.605Z | 2026-05-08T13:32:33.605Z |
| CVE-2026-44335 |
7.7 (4.0)
|
SSRF bypass in PraisonAI |
MervinPraison |
PraisonAI |
2026-05-08T13:26:48.564Z | 2026-05-08T14:46:13.605Z |
| CVE-2026-44334 |
8.4 (3.1)
|
PraisonAI: Unauthenticated RCE via `tool_override.py` |
MervinPraison |
PraisonAI |
2026-05-08T13:25:32.988Z | 2026-05-08T23:20:28.539Z |
| CVE-2026-44129 |
8.3 (4.0)
|
Server-side template injection |
SEPPmail AG |
Secure Email Gateway |
2026-05-08T13:14:36.616Z | 2026-05-08T21:27:35.239Z |
| CVE-2026-44128 |
9.3 (4.0)
|
Unauthenticated Remote Code Execution |
SEPPmail AG |
Secure Email Gateway |
2026-05-08T13:13:46.034Z | 2026-05-08T21:27:48.160Z |
| CVE-2026-44127 |
8.8 (4.0)
|
Local File Inclusion (LFI) and Arbitrary File Deletion |
SEPPmail AG |
Secure Email Gateway |
2026-05-08T13:13:05.667Z | 2026-05-08T21:27:54.210Z |
| CVE-2026-44126 |
9.2 (4.0)
|
Insecure deserialization |
SEPPmail AG |
Secure Email Gateway |
2026-05-08T13:15:52.032Z | 2026-05-08T14:15:58.887Z |
| CVE-2026-44125 |
9.3 (4.0)
|
Missing Authorization in GINAv2 |
SEPPmail AG |
Secure Email Gateway |
2026-05-08T13:15:07.947Z | 2026-05-08T21:27:29.024Z |
| CVE-2026-43350 |
N/A
|
smb: client: require a full NFS mode SID before readin… |
Linux |
Linux |
2026-05-08T13:41:53.276Z | 2026-05-08T13:41:53.276Z |
| CVE-2026-43349 |
N/A
|
f2fs: fix to avoid uninit-value access in f2fs_sanity_… |
Linux |
Linux |
2026-05-08T13:41:52.611Z | 2026-05-08T13:41:52.611Z |
| CVE-2026-43348 |
N/A
|
mshv_vtl: Fix vmemmap_shift exceeding MAX_FOLIO_ORDER |
Linux |
Linux |
2026-05-08T13:41:51.909Z | 2026-05-08T13:41:51.909Z |
| CVE-2026-43347 |
N/A
|
arm64: dts: qcom: monaco: Reserve full Gunyah metadata… |
Linux |
Linux |
2026-05-08T13:39:32.598Z | 2026-05-08T13:39:32.598Z |
| CVE-2026-43346 |
N/A
|
ice: ptp: don't WARN when controlling PF is unavailable |
Linux |
Linux |
2026-05-08T13:39:31.930Z | 2026-05-08T13:39:31.930Z |
| CVE-2026-43345 |
N/A
|
net: ipa: fix event ring index not programmed for IPA v5.0+ |
Linux |
Linux |
2026-05-08T13:39:31.222Z | 2026-05-08T13:39:31.222Z |
| CVE-2026-43344 |
N/A
|
perf/x86/intel/uncore: Fix die ID init and look up bugs |
Linux |
Linux |
2026-05-08T13:39:30.537Z | 2026-05-08T13:39:30.537Z |
| CVE-2026-43343 |
N/A
|
usb: gadget: f_subset: Fix unbalanced refcnt in geth_free |
Linux |
Linux |
2026-05-08T13:37:20.663Z | 2026-05-08T13:37:20.663Z |
| CVE-2026-43342 |
N/A
|
usb: gadget: f_rndis: Protect RNDIS options with mutex |
Linux |
Linux |
2026-05-08T13:37:19.920Z | 2026-05-08T13:37:19.920Z |
| CVE-2026-43341 |
N/A
|
net/ipv6: ioam6: prevent schema length wraparound in t… |
Linux |
Linux |
2026-05-08T13:37:19.256Z | 2026-05-08T13:37:19.256Z |
| CVE-2026-43340 |
N/A
|
comedi: Reinit dev->spinlock between attachments to lo… |
Linux |
Linux |
2026-05-08T13:37:18.580Z | 2026-05-08T13:37:18.580Z |
| CVE-2026-43339 |
N/A
|
ipv6: prevent possible UaF in addrconf_permanent_addr() |
Linux |
Linux |
2026-05-08T13:31:24.315Z | 2026-05-08T13:31:24.315Z |
| CVE-2026-43338 |
N/A
|
btrfs: reserve enough transaction items for qgroup ioctls |
Linux |
Linux |
2026-05-08T13:31:23.623Z | 2026-05-09T04:10:38.625Z |
| CVE-2026-43337 |
N/A
|
drm/amd/display: Fix NULL pointer dereference in dcn40… |
Linux |
Linux |
2026-05-08T13:31:22.967Z | 2026-05-08T13:31:22.967Z |
| CVE-2026-43336 |
N/A
|
lib/crypto: chacha: Zeroize permuted_state before it l… |
Linux |
Linux |
2026-05-08T13:31:22.280Z | 2026-05-08T13:31:22.280Z |
| CVE-2026-43335 |
N/A
|
interconnect: qcom: sm8450: Fix NULL pointer dereferen… |
Linux |
Linux |
2026-05-08T13:31:21.623Z | 2026-05-08T13:31:21.623Z |
| CVE-2026-43334 |
N/A
|
Bluetooth: SMP: force responder MITM requirements befo… |
Linux |
Linux |
2026-05-08T13:31:20.923Z | 2026-05-08T13:31:20.923Z |
| CVE-2026-43333 |
N/A
|
bpf: reject direct access to nullable PTR_TO_BUF pointers |
Linux |
Linux |
2026-05-08T13:31:20.107Z | 2026-05-08T13:31:20.107Z |
| CVE-2026-43332 |
N/A
|
thermal: core: Fix thermal zone device registration er… |
Linux |
Linux |
2026-05-08T13:31:19.460Z | 2026-05-08T13:31:19.460Z |
| CVE-2026-43331 |
N/A
|
x86/kexec: Disable KCOV instrumentation after load_seg… |
Linux |
Linux |
2026-05-08T13:31:18.787Z | 2026-05-08T13:31:18.787Z |
| CVE-2026-43330 |
N/A
|
crypto: caam - fix overflow on long hmac keys |
Linux |
Linux |
2026-05-08T13:31:18.133Z | 2026-05-08T13:31:18.133Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-15483 | The Link Hopper plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘hop_name… | 2026-02-14T07:16:07.067 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-14873 | The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnera… | 2026-02-14T07:16:06.887 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-14852 | The MDirector Newsletter plugin for WordPress is vulnerable to Cross-Site Request Forgery in all ve… | 2026-02-14T07:16:06.433 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1932 | The Appointment Booking Calendar Plugin – Bookr plugin for WordPress is vulnerable to unauthorized … | 2026-02-14T06:16:06.007 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2469 | Versions of the package directorytree/imapengine before 1.22.3 are vulnerable to Improper Neutraliz… | 2026-02-14T05:16:22.270 | 2026-04-29T01:00:01.613 |
| fkie_cve-2026-2144 | The Magic Login Mail or QR Code plugin for WordPress is vulnerable to Privilege Escalation in all v… | 2026-02-14T05:16:21.973 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2027 | The AMP Enhancer – Compatibility Layer for Official AMP Plugin for WordPress is vulnerable to Store… | 2026-02-14T05:16:21.313 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1983 | The SEATT: Simple Event Attendance plugin for WordPress is vulnerable to Cross-Site Request Forgery… | 2026-02-14T05:16:20.140 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1912 | The Citations tools plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'code… | 2026-02-14T05:16:19.543 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1904 | The Simple Wp colorfull Accordion plugin for WordPress is vulnerable to Stored Cross-Site Scripting… | 2026-02-14T05:16:19.327 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1754 | The personal-authors-category plugin for WordPress is vulnerable to Reflected Cross-Site Scripting … | 2026-02-14T05:16:19.143 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1164 | The Easy Voice Mail plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘mess… | 2026-02-14T05:16:17.593 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0692 | The BlueSnap Payment Gateway for WooCommerce plugin for WordPress is vulnerable to Missing Authoriz… | 2026-02-14T05:16:16.923 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-26303 | Rejected reason: Not used | 2026-02-14T04:15:57.600 | 2026-02-14T04:15:57.600 |
| fkie_cve-2026-26302 | Rejected reason: Not used | 2026-02-14T04:15:57.540 | 2026-02-14T04:15:57.540 |
| fkie_cve-2026-26301 | Rejected reason: Not used | 2026-02-14T04:15:57.487 | 2026-02-14T04:15:57.487 |
| fkie_cve-2026-26300 | Rejected reason: Not used | 2026-02-14T04:15:57.427 | 2026-02-14T04:15:57.427 |
| fkie_cve-2026-26299 | Rejected reason: Not used | 2026-02-14T04:15:57.363 | 2026-02-14T04:15:57.363 |
| fkie_cve-2026-26298 | Rejected reason: Not used | 2026-02-14T04:15:57.307 | 2026-02-14T04:15:57.307 |
| fkie_cve-2026-26297 | Rejected reason: Not used | 2026-02-14T04:15:57.247 | 2026-02-14T04:15:57.247 |
| fkie_cve-2026-26296 | Rejected reason: Not used | 2026-02-14T04:15:57.190 | 2026-02-14T04:15:57.190 |
| fkie_cve-2026-26295 | Rejected reason: Not used | 2026-02-14T04:15:57.107 | 2026-02-14T04:15:57.107 |
| fkie_cve-2025-14608 | The WP Last Modified Info plugin for WordPress is vulnerable to Insecure Direct Object Reference in… | 2026-02-14T04:15:56.643 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-14067 | The Easy Form Builder plugin for WordPress is vulnerable to unauthorized access of data due to a mi… | 2026-02-14T04:15:56.480 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-13973 | The StickEasy Protected Contact Form plugin for WordPress is vulnerable to Sensitive Information Di… | 2026-02-14T04:15:56.313 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-13681 | The BFG Tools – Extension Zipper plugin for WordPress is vulnerable to Path Traversal in all versio… | 2026-02-14T04:15:56.123 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-24853 | Caido is a web security auditing toolkit. Prior to 0.55.0, Caido blocks non whitelisted domains to … | 2026-02-13T23:16:11.800 | 2026-02-24T20:32:18.710 |
| fkie_cve-2026-26273 | Known is a social publishing platform. Prior to 1.6.3, a Critical Broken Authentication vulnerabili… | 2026-02-13T22:16:11.330 | 2026-02-18T21:01:56.787 |
| fkie_cve-2026-1844 | The PixelYourSite PRO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'py… | 2026-02-13T22:16:11.007 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1841 | The PixelYourSite – Your smart PIXEL (TAG) & API Manager plugin for WordPress is vulnerable to Stor… | 2026-02-13T22:16:10.833 | 2026-04-15T00:35:42.020 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-63hq-hrgx-pfwm |
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix transaction abort o… | 2026-05-08T15:31:25Z | 2026-05-08T15:31:26Z |
| ghsa-473v-h78r-2j73 |
|
In the Linux kernel, the following vulnerability has been resolved: i3c: mipi-i3c-hci: Fix race in… | 2026-05-08T15:31:25Z | 2026-05-08T15:31:25Z |
| ghsa-3mqh-w39c-q3pj |
|
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix in-place encr… | 2026-05-08T15:31:25Z | 2026-05-08T15:31:26Z |
| ghsa-354w-x6pj-669w |
|
In the Linux kernel, the following vulnerability has been resolved: iio: proximity: hx9023s: Prote… | 2026-05-08T15:31:25Z | 2026-05-08T15:31:25Z |
| ghsa-xvvm-359f-6vgc |
|
In the Linux kernel, the following vulnerability has been resolved: smb: client: require a full NF… | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-x76h-jjpq-cp24 |
9.3 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.4 fails to enforce authorization checks for multi… | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-wc7f-vvj8-28m9 |
8.3 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.4 contains a server-side template injection vulne… | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-qwq6-r6c6-68jr |
9.3 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.2.1 allows unauthenticated remote code execution … | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-pfm7-36qc-84v9 |
|
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_rndis: Protect … | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-p877-m7m5-3qh3 |
|
In the Linux kernel, the following vulnerability has been resolved: net/ipv6: ioam6: prevent schem… | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-m424-x6wr-wwgw |
|
In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel/uncore: Fix die… | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-m2rg-757j-v6hh |
|
In the Linux kernel, the following vulnerability has been resolved: arm64: dts: qcom: monaco: Rese… | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-j2m4-498q-2w8w |
|
In the Linux kernel, the following vulnerability has been resolved: mshv_vtl: Fix vmemmap_shift ex… | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-hgmq-893h-gwr8 |
|
In the Linux kernel, the following vulnerability has been resolved: interconnect: qcom: sm8450: Fi… | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-gh4w-5vrf-hhcg |
8.8 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.4 contains an unauthenticated path traversal vuln… | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-cxcr-vph9-wv8j |
|
In the Linux kernel, the following vulnerability has been resolved: comedi: Reinit dev->spinlock b… | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-cw2x-g67m-8387 |
|
In the Linux kernel, the following vulnerability has been resolved: lib/crypto: chacha: Zeroize pe… | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-9fq9-rx75-mm5g |
|
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid uninit-valu… | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-7657-q549-6g59 |
|
In the Linux kernel, the following vulnerability has been resolved: net: ipa: fix event ring index… | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-69wg-m4qc-c3qc |
9.2 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.4 insecurely deserializes untrusted data, which c… | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-5h67-3fpf-pw2r |
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: reserve enough transact… | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-5cr7-8523-mgr2 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix NULL poin… | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-4v8f-jwm3-5f44 |
|
In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent possible UaF in … | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-3ggx-x2j4-gfqr |
|
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SMP: force responde… | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-2h6g-jf6m-ch5q |
|
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_subset: Fix unb… | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-274m-pqm8-j3hc |
|
In the Linux kernel, the following vulnerability has been resolved: ice: ptp: don't WARN when cont… | 2026-05-08T15:31:24Z | 2026-05-08T15:31:24Z |
| ghsa-xw5q-w7ff-jgm4 |
|
In the Linux kernel, the following vulnerability has been resolved: media: solo6x10: Check for out… | 2026-05-08T15:31:23Z | 2026-05-08T15:31:23Z |
| ghsa-r88m-3gh4-8vp3 |
|
In the Linux kernel, the following vulnerability has been resolved: dm: remove fake timeout to avo… | 2026-05-08T15:31:23Z | 2026-05-08T15:31:23Z |
| ghsa-px47-fmm9-rxw4 |
|
In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Fix NULL-poin… | 2026-05-08T15:31:23Z | 2026-05-08T15:31:23Z |
| ghsa-p2r3-p9wp-qrx6 |
|
In the Linux kernel, the following vulnerability has been resolved: media: i2c: ov5647: Initialize… | 2026-05-08T15:31:23Z | 2026-05-08T15:31:23Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-34 |
9.8 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6-server | 2024-01-30T16:15:00+00:00 | 2024-02-08T20:20:16.896186+00:00 |
| pysec-2024-33 |
9.8 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6-node | 2024-01-30T16:15:00+00:00 | 2024-02-08T20:20:16.842528+00:00 |
| pysec-2024-32 |
4.3 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6 | 2024-01-30T16:15:00+00:00 | 2024-02-08T18:22:28.342089+00:00 |
| pysec-2024-31 |
3.7 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6 | 2024-01-30T16:15:00+00:00 | 2024-02-08T18:22:28.276390+00:00 |
| pysec-2024-30 |
8.8 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6 | 2024-01-30T16:15:00+00:00 | 2024-02-08T18:22:28.210087+00:00 |
| pysec-2024-25 |
9.8 (3.1)
|
DuckDB <=0.9.2 and DuckDB extension-template <=0.9.2 are vulnerable to malicious extensio… | duckdb | 2024-01-30T01:16:00+00:00 | 2024-02-06T00:25:51.550516+00:00 |
| pysec-2024-27 |
9.8 (3.1)
|
CrateDB 5.5.1 is contains an authentication bypass vulnerability in the Admin UI componen… | crate | 2024-01-30T01:15:00Z | 2025-01-30T22:47:57.847403Z |
| pysec-2024-26 |
6.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-… | aiohttp | 2024-01-29T23:15:00+00:00 | 2024-02-06T20:20:18.162431+00:00 |
| pysec-2024-24 |
7.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When usin… | aiohttp | 2024-01-29T23:15:00+00:00 | 2024-02-05T20:20:47.716944+00:00 |
| pysec-2024-21 |
8.8 (3.1)
|
A vulnerability classified as critical was found in van_der_Schaar LAB TemporAI 0.0.3. Af… | temporai | 2024-01-26T17:15:00+00:00 | 2024-02-01T18:22:23.971296+00:00 |
| pysec-2024-14 |
|
Apache Airflow, versions before 2.8.1, have a vulnerability that allows an authenticated … | apache-airflow | 2024-01-24T13:15:00+00:00 | 2024-01-24T16:22:57.416385+00:00 |
| pysec-2024-13 |
|
Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attac… | apache-airflow | 2024-01-24T13:15:00+00:00 | 2024-01-24T16:22:57.352530+00:00 |
| pysec-2024-128 |
6.1 (3.1)
|
Label Studio, an open source data labeling tool had a remote import feature allowed users… | label-studio | 2024-01-24T00:15:00+00:00 | 2024-11-21T14:22:53.406222+00:00 |
| pysec-2024-126 |
5.4 (3.1)
|
Label Studio is an a popular open source data labeling tool. Versions prior to 1.9.2 have… | label-studio | 2024-01-23T23:15:00+00:00 | 2024-11-21T14:22:53.235341+00:00 |
| pysec-2024-23 |
5.3 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. Versions 0.8.3 and prior have a limite… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-02-02T07:18:33.382718+00:00 |
| pysec-2024-22 |
6.1 (3.1)
|
TuiTse-TsuSin is a package for organizing the comparative corpus of Taiwanese Chinese cha… | tuitse-tsusin | 2024-01-23T18:15:00+00:00 | 2024-02-01T22:21:01.486817+00:00 |
| pysec-2024-20 |
9.8 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. In versions prior to 0.8.4, the `eleme… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-01-30T18:22:32.803340+00:00 |
| pysec-2024-19 |
6.1 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. In versions 0.8.3 and prior, the `elem… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-01-29T22:21:01.226431+00:00 |
| pysec-2024-18 |
9.8 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. In versions 0.8.3 and prior, the `wind… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-01-29T22:21:01.170723+00:00 |
| pysec-2024-16 |
5.4 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2024-01-23T00:15:00+00:00 | 2024-01-29T20:20:58.065227+00:00 |
| pysec-2024-9 |
|
MetaGPT through 0.6.4 allows the QaEngineer role to execute arbitrary code because RunCod… | metagpt | 2024-01-22T01:15:00+00:00 | 2024-01-22T07:20:28.329958+00:00 |
| pysec-2024-12 |
|
LlamaIndex (aka llama_index) through 0.9.34 allows SQL injection via the Text-to-SQL feat… | llama-index | 2024-01-22T01:15:00Z | 2024-02-10T01:22:25.611009Z |
| pysec-2024-8 |
|
The JSON loader in Embedchain before 0.1.57 allows a ReDoS (regular expression denial of … | embedchain | 2024-01-21T17:15:00+00:00 | 2024-01-21T20:21:00.544327+00:00 |
| pysec-2024-7 |
|
The OpenAPI loader in Embedchain before 0.1.57 allows attackers to execute arbitrary code… | embedchain | 2024-01-21T17:15:00+00:00 | 2024-01-21T20:21:00.484037+00:00 |
| pysec-2024-15 |
3.7 (3.1)
|
changedetection.io is an open source tool designed to monitor websites for content chang… | changedetection-io | 2024-01-19T20:15:00+00:00 | 2024-01-26T22:21:10.756741+00:00 |
| pysec-2024-103 |
9.8 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. The `concat… | vyper | 2024-01-18T19:15:00+00:00 | 2024-10-09T23:22:49.818476+00:00 |
| pysec-2024-17 |
8.8 (3.1)
|
pyLoad is a free and open-source Download Manager written in pure Python. The `pyload` AP… | pyload-ng | 2024-01-18T00:15:00+00:00 | 2024-01-29T20:20:58.389168+00:00 |
| pysec-2024-11 |
9.8 (3.1)
|
Remote Code Execution vulnerability in Apache IoTDB.This issue affects Apache IoTDB: from… | apache-iotdb | 2024-01-15T11:15:00+00:00 | 2024-01-22T22:21:02.620877+00:00 |
| pysec-2024-10 |
9.8 (3.1)
|
In Gentoo Portage before 3.0.47, there is missing PGP validation of executed code: the st… | portage | 2024-01-12T03:15:00+00:00 | 2024-01-22T18:22:47.599296+00:00 |
| pysec-2024-6 |
2.8 (3.1)
|
cdo-local-uuid project provides a specialized UUID-generating function that can, on user … | cdo-local-uuid | 2024-01-11T03:15:00+00:00 | 2024-01-19T22:21:07.454006+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-3136 | Malicious code in timestamp-py (PyPI) | 2026-04-28T21:29:07Z | 2026-05-02T23:49:22Z |
| mal-2026-3134 | Malicious code in timemcp-py (PyPI) | 2026-04-28T20:04:58Z | 2026-05-02T23:49:22Z |
| mal-2026-3133 | Malicious code in fetchapi-syncdata-pypi (PyPI) | 2026-04-28T18:46:19Z | 2026-04-28T18:46:19Z |
| mal-2026-3132 | Malicious code in timemcp (PyPI) | 2026-04-28T18:21:56Z | 2026-05-02T23:49:22Z |
| mal-2026-3140 | Malicious code in fivem-monitor (npm) | 2026-04-28T18:14:53Z | 2026-04-30T22:25:09Z |
| mal-2026-3131 | Malicious code in kcvlib (PyPI) | 2026-04-28T17:24:08Z | 2026-04-28T17:24:08Z |
| mal-2026-3130 | Malicious code in genmedia-izumi-agent (PyPI) | 2026-04-28T16:14:08Z | 2026-04-28T16:14:45Z |
| mal-2026-3129 | Malicious code in supertag (crates.io) | 2026-04-28T13:36:04Z | 2026-04-28T13:36:04Z |
| mal-2026-3128 | Malicious code in wm-plugin-teach-me-widget (npm) | 2026-04-28T10:21:02Z | 2026-04-30T22:25:13Z |
| mal-2026-3127 | Malicious code in coloreasyprint (PyPI) | 2026-04-28T08:25:33Z | 2026-04-28T08:25:33Z |
| mal-2026-3126 | Malicious code in lsh (crates.io) | 2026-04-28T01:45:56Z | 2026-04-28T14:20:08Z |
| mal-2026-3105 | Malicious code in mypypipkg (PyPI) | 2026-04-27T21:21:43Z | 2026-04-27T21:21:43Z |
| mal-2026-3123 | Malicious code in apple-app-store-server-library-poc (npm) | 2026-04-27T19:55:43Z | 2026-04-30T22:25:08Z |
| mal-2026-3104 | Malicious code in robase-ui (PyPI) | 2026-04-27T18:37:41Z | 2026-05-03T20:49:49Z |
| mal-2026-3122 | Malicious code in @w3m-frame/session_update (npm) | 2026-04-27T18:30:51Z | 2026-05-04T01:13:44Z |
| mal-2026-3103 | Malicious code in amzn_codewhisperer_streaming_client (crates.io) | 2026-04-27T18:01:06Z | 2026-04-27T18:01:06Z |
| mal-2026-3120 | Malicious code in @pyme-web/web-api (npm) | 2026-04-27T17:55:52Z | 2026-05-04T01:13:44Z |
| mal-2026-3119 | Malicious code in @pyme-web/ui-widget (npm) | 2026-04-27T17:46:10Z | 2026-05-04T01:13:44Z |
| mal-2026-3118 | Malicious code in @pyme-web/ui-base (npm) | 2026-04-27T17:46:02Z | 2026-05-04T01:13:44Z |
| mal-2026-3101 | Malicious code in amzn_consolas_client (crates.io) | 2026-04-27T17:36:04Z | 2026-04-27T17:36:04Z |
| mal-2026-3102 | Malicious code in semantic_search_client (crates.io) | 2026-04-27T17:20:59Z | 2026-04-27T17:20:59Z |
| mal-2026-3100 | Malicious code in fetch-data-api-syncapi (PyPI) | 2026-04-27T16:31:55Z | 2026-04-28T20:05:07Z |
| mal-2026-3121 | Malicious code in @taxmoninor/taxmon (npm) | 2026-04-27T15:10:55Z | 2026-05-04T01:13:44Z |
| mal-2026-3111 | Malicious code in @apple-pay-trust/authorize-payment (npm) | 2026-04-27T14:25:57Z | 2026-05-04T03:25:18Z |
| mal-2026-3108 | Malicious code in @activation_code/success (npm) | 2026-04-27T14:15:59Z | 2026-05-04T03:25:18Z |
| mal-2026-3112 | Malicious code in @apple-pay-trust/cancelled (npm) | 2026-04-27T14:15:53Z | 2026-05-01T10:46:43Z |
| mal-2026-3109 | Malicious code in @apiary-annex/meta (npm) | 2026-04-27T14:15:52Z | 2026-05-04T03:25:18Z |
| mal-2026-3117 | Malicious code in @business_promocode/cancel_promocode (npm) | 2026-04-27T14:15:48Z | 2026-05-04T03:25:18Z |
| mal-2026-3106 | Malicious code in @activation_code/activate (npm) | 2026-04-27T14:06:06Z | 2026-05-04T03:25:18Z |
| mal-2026-3116 | Malicious code in @business_promocode/apply_promocode (npm) | 2026-04-27T14:06:02Z | 2026-05-04T03:25:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0224 | Grafana: Mehrere Schwachstellen | 2026-01-26T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0222 | PyTorch: Schwachstelle ermöglicht Codeausführung | 2026-01-26T23:00:00.000+00:00 | 2026-01-27T23:00:00.000+00:00 |
| wid-sec-w-2026-0219 | Vercel Next.js: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-26T23:00:00.000+00:00 | 2026-01-27T23:00:00.000+00:00 |
| wid-sec-w-2026-0215 | Linux Kernel: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0214 | dormakaba Access Manager: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-01-27T23:00:00.000+00:00 |
| wid-sec-w-2026-0213 | expat: Schwachstelle ermöglicht Denial of Service | 2026-01-25T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0210 | IBM DB2 Big SQL: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0209 | Cpython: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0207 | Red Hat Enterprise Linux (urllib3): Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0203 | SmarterTools SmarterMail: Schwachstelle ermöglicht Umgehung | 2026-01-22T23:00:00.000+00:00 | 2026-02-22T23:00:00.000+00:00 |
| wid-sec-w-2026-0202 | Logback: Schwachstelle ermöglicht Manipulation von Daten | 2026-01-22T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0199 | Red Hat OpenShift Pipelines Operator (Fulcio): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0198 | Red Hat OpenShift und OpenShift AI (urllib3): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0196 | CPython: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-01-21T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0194 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0190 | vllm: Mehrere Schwachstellen | 2026-01-21T23:00:00.000+00:00 | 2026-01-22T23:00:00.000+00:00 |
| wid-sec-w-2026-0188 | Internet Systems Consortium BIND: Schwachstelle ermöglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0187 | Red Hat Enterprise Linux (glib): Schwachstelle ermöglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0185 | M-Files M-Files Server: Schwachstelle ermöglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0184 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0183 | InetUtils (telnetd): Schwachstelle ermöglicht Erlangen von Administratorrechten | 2026-01-20T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0182 | Apache Solr: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0179 | GNU libc: Schwachstelle ermöglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0177 | Atlassian Bamboo, Bitbucket, Confluence und Jira: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0176 | Google Chrome/Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2026-01-20T23:00:00.000+00:00 | 2026-01-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0174 | Oracle Systems: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0172 | Oracle Virtualization: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0168 | Oracle MySQL: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0164 | Oracle Java SE: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0159 | Oracle E-Business Suite: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-301-01 | Schneider Electric EcoStruxure | 2025-10-14T07:00:00.000000Z | 2025-10-14T07:00:00.000000Z |
| icsa-25-287-01 | Rockwell Automation 1715 EtherNet/IP Comms Module | 2025-10-14T06:00:00.000000Z | 2025-10-14T06:00:00.000000Z |
| icsa-25-289-10 | Siemens HyperLynx and Industrial Edge App Publisher | 2025-10-14T00:00:00.000000Z | 2026-01-14T22:05:41.165529Z |
| icsa-25-289-09 | Siemens TeleControl Server Basic | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-289-08 | Siemens SINEC NMS | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-289-07 | Siemens SIMATIC ET 200SP Communication Processors | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-289-06 | Siemens SiPass Integrated | 2025-10-14T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-289-05 | Siemens Solid Edge | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| va-25-282-01 | Newforma Project Center multiple vulnerabilities | 2025-10-09T19:50:00Z | 2025-10-09T19:50:00Z |
| icsa-25-282-03 | Rockwell Automation Stratix | 2025-10-09T06:00:00.000000Z | 2025-10-09T06:00:00.000000Z |
| icsa-25-282-02 | Rockwell Automation Lifecycle Services with Cisco | 2025-10-09T06:00:00.000000Z | 2025-10-09T06:00:00.000000Z |
| va-25-280-01 | OPEXUS FOIAXpress stored XSS | 2025-10-07T22:50:29Z | 2025-10-07T22:50:29Z |
| icsa-25-280-01 | Delta Electronics DIAScreen | 2025-10-07T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-275-01 | Raise3D Pro2 Series 3D Printers** | 2025-10-02T05:00:00.000000Z | 2025-10-02T05:00:00.000000Z |
| icsa-25-289-11 | Hitachi Energy MACH GWS | 2025-09-30T12:50:29.000000Z | 2025-09-30T12:50:29.000000Z |
| icsa-25-275-02 | Hitachi Energy MSM | 2025-09-30T09:02:31.000000Z | 2025-09-30T09:02:31.000000Z |
| icsa-25-282-01 | Hitachi Energy Asset Suite (Update A) | 2025-09-30T08:50:13.000000Z | 2025-10-28T09:50:00.000000Z |
| icsa-25-273-06 | National Instruments Circuit Design Suite | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-05 | OpenPLC_V3 | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-04 | Festo Controller CECC-S,-LK,-D Family Firmware (Update A) | 2025-09-30T06:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-273-01 | MegaSys Enterprises Telenium Online Web Application | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-07 | LG Innotek Camera Multiple Models | 2025-09-30T05:00:00.000000Z | 2025-09-30T05:00:00.000000Z |
| va-25-273-01 | Microsoft Windows inconsistent driver blocking | 2025-09-30T00:00:00Z | 2025-09-30T00:00:00Z |
| va-25-272-01 | Medical Informatics Engineering Enterprise Health multiple vulnerabilities | 2025-09-29T00:00:00Z | 2025-09-29T00:00:00Z |
| icsa-25-268-01 | Dingtian DT-R002 | 2025-09-25T06:00:00.000000Z | 2025-09-25T06:00:00.000000Z |
| icsa-25-266-04 | Viessmann Vitogate 300 | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| icsa-25-266-02 | Mitsubishi Electric MELSEC-Q Series CPU Module | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| icsa-25-266-01 | AutomationDirect CLICK PLUS | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| va-25-265-01 | Airship AI MFA bypass and default credentials vulnerabilities | 2025-09-22T14:06:13Z | 2025-09-22T14:06:13Z |
| icsa-25-261-07 | Dover Fueling Solutions ProGauge MagLink LX4 Devices | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-nxos-image-sig-bypas-pqdrqvjl | Cisco NX-OS Software Image Verification Bypass Vulnerability | 2024-12-04T16:00:00+00:00 | 2025-04-07T16:43:32+00:00 |
| cisco-sa-phone-infodisc-sbyqqvbg | Cisco 7800, 8800, and 9800 Series Phones Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ndfc-sqli-cyppaxrl | Cisco Nexus Dashboard Fabric Controller SQL Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-mpp-xss-8tav2tvf | Cisco 6800, 7800, 8800, and 9800 Series Phones with Multiplatform Firmware Stored Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vulns-af544ed5 | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vuln-dbqdwry | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-auth-bypass-bbrf7mke | Cisco Identity Services Engine Authorization Bypass and Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-imp-inf-disc-cupkua5n | Cisco Unified Communications Manager IM & Presence Service Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-esa-wsa-sma-xss-zym3f49n | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-epnmpi-sxss-yyf2zkxs | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ece-dos-oqb9ufev | Cisco Enterprise Chat and Email Denial of Service Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-cucm-xss-svckmmw | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-cmm-info-disc-9zemahga | Cisco Meeting Management Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ccmp-sxss-qbtdbzdd | Cisco Unified Contact Center Management Portal Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-backhaul-ap-cmdinj-r7e28ecs | Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point Command Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-3550-acl-bypass-mhskzc2q | Cisco Nexus 3550-F Switches Access Control List Programming Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-snort-rf-bypass-oy8f3pnm | Multiple Cisco Products Snort Rate Filter Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2025-01-13T16:44:31+00:00 |
| cisco-sa-snort-bypass-ptry37fx | Cisco Firepower Threat Defense Software TCP Snort 3 Detection Engine Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-sa-ftd-snort-fw-bcjtzpmu | Cisco Firepower Threat Defense Software and Cisco FirePOWER Services TCP/IP Traffic with Snort 2 and Snort 3 Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd2100-snort-dos-m9humt75 | Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Appliances TCP UDP Snort 2 and Snort 3 Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-vdb-snort-djj4cnbr | Cisco Firepower Threat Defense Software Vulnerability Database with Snort Detection Engine Security Policy Bypass and Denial of Service Issue | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-tls-dos-qxye5ufy | Cisco Firepower Threat Defense Software for Firepower 2100 Series TLS Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-statcred-dfc8txt5 | Cisco Firepower Threat Defense Software for Firepower 1000, 2100, 3100, and 4200 Series Static Credential Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-geoip-bypass-mb4zrdu | Cisco Firepower Threat Defense Software Geolocation ACL Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-xss-infodisc-rl4mjfer | Cisco Secure Firewall Management Center Software Cross-Site Scripting and Information Disclosure Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-24T11:52:38+00:00 |
| cisco-sa-fmc-xss-dhjxqyzs | Cisco Secure Firewall Management Center Software Cross-Site Scripting Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-sql-inject-2enmtc8v | Cisco Secure Firewall Management Center Software SQL Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2026-03-04T16:11:01+00:00 |
| cisco-sa-fmc-sql-inj-loyafcfq | Cisco Secure Firewall Management Center Software SQL Injection Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-priv-esc-cmq4s6m7 | Cisco Secure Firewall Management Center Privilege Escalation Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-html-inj-nfjeyhxz | Cisco Secure Firewall Management Center Software HTML Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-26178 | Windows Advanced Rasterization Platform Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26177 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26176 | Windows Client Side Caching driver (csc.sys) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26175 | Windows Boot Manager Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26174 | Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26173 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26172 | Windows Push Notifications Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26171 | .NET Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-22T07:00:00.000Z |
| msrc_cve-2026-26170 | PowerShell Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26169 | Windows Kernel Memory Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26168 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-21T07:00:00.000Z |
| msrc_cve-2026-26167 | Windows Push Notifications Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26166 | Windows Shell Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26165 | Windows Shell Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26163 | Windows Kernel Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26162 | Windows OLE Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26161 | Windows Sensor Data Service Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26160 | Remote Desktop Licensing Service Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26159 | Remote Desktop Licensing Service Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26156 | Windows Hyper-V Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26155 | Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26154 | Windows Server Update Service (WSUS) Tampering Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26153 | Windows Encrypted File System (EFS) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26152 | Microsoft Cryptographic Services Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26151 | Remote Desktop Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26150 | Microsoft Purview eDiscovery Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-23T07:00:00.000Z |
| msrc_cve-2026-26149 | Microsoft Power Apps Security Feature Bypass | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26143 | Microsoft PowerShell Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-25184 | Applocker Filter Driver (applockerfltr.sys) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-24303 | Microsoft Partner Center Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-23T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0271 | Kwetsbaarheden verholpen in Arcserve Unified Data Protection | 2025-08-28T12:56:02.228992Z | 2025-08-28T12:56:02.228992Z |
| ncsc-2025-0270 | Kwetsbaarheden verholpen in Cisco NX-OS Software | 2025-08-28T08:36:20.358948Z | 2025-08-28T08:36:20.358948Z |
| ncsc-2025-0269 | Kwetsbaarheden verholpen in IBM Cognos Command Center | 2025-08-27T13:10:59.965070Z | 2025-08-27T13:10:59.965070Z |
| ncsc-2025-0268 | Kwetsbaarheden verholpen in Citrix NetScaler ADC en Gateway | 2025-08-26T13:11:42.925280Z | 2025-08-26T17:34:30.428328Z |
| ncsc-2025-0267 | Kwetsbaarheden verholpen in Foxit Reader | 2025-08-25T11:26:17.380689Z | 2025-08-25T11:26:17.380689Z |
| ncsc-2025-0266 | Kwetsbaarheid verholpen in Apple MacOS, iOS en iPadOS | 2025-08-22T05:49:07.556948Z | 2025-08-25T12:16:10.430485Z |
| ncsc-2025-0265 | Kwetsbaarheden verholpen in Commvault | 2025-08-20T12:15:48.655099Z | 2025-08-20T12:15:48.655099Z |
| ncsc-2025-0264 | Kwetsbaarheden verholpen in Cisco Secure Firewall Software | 2025-08-15T08:52:41.012811Z | 2025-08-15T08:52:41.012811Z |
| ncsc-2025-0263 | Kwetsbaarheden verholpen in N-able N-Central | 2025-08-14T12:38:27.349283Z | 2025-08-14T12:38:27.349283Z |
| ncsc-2025-0262 | Kwetsbaarheden verholpen in Xerox FreeFlow Core | 2025-08-14T07:00:50.843871Z | 2025-08-14T07:00:50.843871Z |
| ncsc-2025-0261 | Kwetsbaarheden verholpen in Adobe InCopy | 2025-08-13T10:13:59.220398Z | 2025-08-13T10:13:59.220398Z |
| ncsc-2025-0260 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-08-13T10:12:35.130811Z | 2025-08-13T10:12:35.130811Z |
| ncsc-2025-0259 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2025-08-13T10:11:22.733287Z | 2025-08-13T10:11:22.733287Z |
| ncsc-2025-0258 | Kwetsbaarheden verholpen in Adobe InDesign | 2025-08-13T10:05:31.442414Z | 2025-08-13T10:05:31.442414Z |
| ncsc-2025-0257 | Kwetsbaarheid verholpen in Adobe Photoshop | 2025-08-13T10:00:18.181867Z | 2025-08-13T10:00:18.181867Z |
| ncsc-2025-0256 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-08-13T09:59:45.240348Z | 2025-08-13T09:59:45.240348Z |
| ncsc-2025-0255 | Kwetsbaarheden verholpen in Fortinet producten | 2025-08-13T09:16:29.067287Z | 2025-08-13T09:35:40.587034Z |
| ncsc-2025-0254 | Kwetsbaarheden verholpen in Zoom | 2025-08-13T09:09:21.491424Z | 2025-08-13T09:09:21.491424Z |
| ncsc-2025-0253 | Kwetsbaarheden verholpen in Ivanti Connect Secure, Policy Secure en ZTA Gateways | 2025-08-13T09:06:58.420498Z | 2025-08-13T09:06:58.420498Z |
| ncsc-2025-0252 | Kwetsbaarheden verholpen in Microsoft Exchange Server | 2025-08-13T07:29:24.639524Z | 2025-08-13T07:29:24.639524Z |
| ncsc-2025-0251 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-08-13T07:25:08.789693Z | 2025-08-13T07:25:08.789693Z |
| ncsc-2025-0250 | Kwetsbaarheden verholpen in Microsoft Office | 2025-08-13T07:23:56.395786Z | 2025-08-13T07:23:56.395786Z |
| ncsc-2025-0249 | Kwetsbaarheden verholpen in Azure-producten | 2025-08-13T07:22:17.432067Z | 2025-08-13T07:22:17.432067Z |
| ncsc-2025-0248 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-08-13T07:21:52.836899Z | 2025-08-13T07:21:52.836899Z |
| ncsc-2025-0247 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2025-08-13T07:19:19.911308Z | 2025-08-13T07:19:19.911308Z |
| ncsc-2025-0246 | Kwetsbaarheden verholpen in Siemens producten | 2025-08-12T13:03:08.211775Z | 2025-08-12T13:03:08.211775Z |
| ncsc-2025-0245 | Kwetsbaarheden verholpen in SAP producten | 2025-08-12T11:10:21.111816Z | 2025-09-05T11:12:05.722381Z |
| ncsc-2025-0244 | Kwetsbaarheid verholpen in WinRAR | 2025-08-11T07:36:12.848669Z | 2025-08-11T07:36:12.848669Z |
| ncsc-2025-0243 | Kwetsbaarheid verholpen in Microsoft Exchange | 2025-08-07T09:15:22.461434Z | 2025-08-07T09:15:22.461434Z |
| ncsc-2025-0242 | Kwetsbaarheden verholpen in Trend Micro Apex One | 2025-08-06T13:21:03.156432Z | 2025-08-06T13:21:03.156432Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10441-1 | strongswan-6.0.5-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10440-1 | jupyter-nbclassic-1.3.3-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10439-1 | plexus-utils-4.0.2-2.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10438-1 | openbao-2.5.2-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10437-1 | libnghttp2-14-1.68.1-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10436-1 | freeipmi-1.6.17-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10435-1 | cpp-httplib-devel-0.38.0-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10434-1 | chromedriver-146.0.7680.164-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10433-1 | LibVNCServer-devel-0.9.15-2.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:20431-1 | Security update for python-PyJWT | 2026-03-25T18:07:39Z | 2026-03-25T18:07:39Z |
| opensuse-su-2026:20430-1 | Security update for python-PyPDF2 | 2026-03-25T15:51:00Z | 2026-03-25T15:51:00Z |
| opensuse-su-2026:20429-1 | Security update for python-dynaconf | 2026-03-25T14:59:11Z | 2026-03-25T14:59:11Z |
| opensuse-su-2026:20428-1 | Security update for gimp | 2026-03-25T14:24:42Z | 2026-03-25T14:24:42Z |
| opensuse-su-2026:20421-1 | Security update for python-ldap | 2026-03-25T10:40:32Z | 2026-03-25T10:40:32Z |
| opensuse-su-2026:20420-1 | Security update for ffmpeg-7 | 2026-03-25T10:03:00Z | 2026-03-25T10:03:00Z |
| opensuse-su-2026:20416-1 | Security update for the Linux Kernel | 2026-03-25T08:49:52Z | 2026-03-25T08:49:52Z |
| opensuse-su-2026:20419-1 | Security update for python-pyOpenSSL | 2026-03-25T03:41:43Z | 2026-03-25T03:41:43Z |
| opensuse-su-2026:20418-1 | Security update for python-pyasn1 | 2026-03-25T03:09:48Z | 2026-03-25T03:09:48Z |
| opensuse-su-2026:10432-1 | golang-github-v2fly-v2ray-core-5.47.0-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10431-1 | python311-oci-sdk-2.168.3-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10430-1 | python311-lmdb-2.1.1-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10429-1 | jupyter-jupyterlab-templates-0.5.2-4.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10428-1 | python311-jupyter-ydoc-3.4.0-2.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10427-1 | jupyter-matplotlib-0.11.7-17.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10426-1 | python311-intake-2.0.9-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10425-1 | python311-cbor2-5.9.0-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10424-1 | jupyter-bqplot-jupyterlab-0.5.46-14.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10423-1 | nginx-1.29.7-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10422-1 | libtpms-devel-0.10.2-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10421-1 | kea-3.0.3-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:11454 | Red Hat Security Advisory: pcs security update | 2026-04-29T05:28:24+00:00 | 2026-05-07T21:42:41+00:00 |
| rhsa-2026:7885 | Red Hat Security Advisory: Red Hat OpenStack Services on OpenShift 18.0.18 (golang-github-openstack-k8s-operators-os-diff) security update | 2026-04-29T04:17:03+00:00 | 2026-05-09T02:37:22+00:00 |
| rhsa-2026:7884 | Red Hat Security Advisory: Red Hat OpenStack Services on OpenShift 18.0.18 (openstack-nova) security update | 2026-04-29T04:16:18+00:00 | 2026-04-29T22:04:50+00:00 |
| rhsa-2026:11416 | Red Hat Security Advisory: grafana security update | 2026-04-28T22:47:53+00:00 | 2026-04-29T01:39:37+00:00 |
| rhsa-2026:11417 | Red Hat Security Advisory: grafana security update | 2026-04-28T22:32:28+00:00 | 2026-04-29T01:39:39+00:00 |
| rhsa-2026:11414 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.9.3 security update | 2026-04-28T21:45:16+00:00 | 2026-05-09T15:02:14+00:00 |
| rhsa-2026:11413 | Red Hat Security Advisory: yggdrasil security update | 2026-04-28T20:49:42+00:00 | 2026-05-08T15:01:14+00:00 |
| rhsa-2026:11412 | Red Hat Security Advisory: yggdrasil-worker-package-manager security update | 2026-04-28T20:36:52+00:00 | 2026-05-08T15:01:14+00:00 |
| rhsa-2026:11408 | Red Hat Security Advisory: VolSync v0.14 security fixes and container updates | 2026-04-28T19:03:51+00:00 | 2026-05-09T15:02:14+00:00 |
| rhsa-2026:11403 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-28T18:46:54+00:00 | 2026-05-04T21:23:49+00:00 |
| rhsa-2026:11389 | Red Hat Security Advisory: vim security update | 2026-04-28T18:21:32+00:00 | 2026-05-04T21:18:21+00:00 |
| rhsa-2026:11388 | Red Hat Security Advisory: xorg-x11-server security update | 2026-04-28T18:07:07+00:00 | 2026-05-04T21:18:11+00:00 |
| rhsa-2026:11375 | Red Hat Security Advisory: yggdrasil security update | 2026-04-28T15:50:31+00:00 | 2026-05-08T15:01:14+00:00 |
| rhsa-2026:11371 | Red Hat Security Advisory: bind security update | 2026-04-28T15:18:51+00:00 | 2026-04-28T18:40:35+00:00 |
| rhsa-2026:11372 | Red Hat Security Advisory: bind security update | 2026-04-28T15:07:06+00:00 | 2026-04-28T18:40:41+00:00 |
| rhsa-2026:11369 | Red Hat Security Advisory: xorg-x11-server-Xwayland security update | 2026-04-28T15:01:21+00:00 | 2026-05-04T21:18:16+00:00 |
| rhsa-2026:11360 | Red Hat Security Advisory: LibRaw security update | 2026-04-28T13:55:31+00:00 | 2026-05-07T08:26:54+00:00 |
| rhsa-2026:11352 | Red Hat Security Advisory: xorg-x11-server-Xwayland security update | 2026-04-28T11:29:51+00:00 | 2026-05-04T21:18:20+00:00 |
| rhsa-2026:11349 | Red Hat Security Advisory: libxml2 security update | 2026-04-28T11:27:56+00:00 | 2026-05-07T21:42:09+00:00 |
| rhsa-2026:11344 | Red Hat Security Advisory: kea security update | 2026-04-28T09:49:21+00:00 | 2026-04-28T18:44:39+00:00 |
| rhsa-2026:11336 | Red Hat Security Advisory: freerdp security update | 2026-04-28T07:54:50+00:00 | 2026-04-30T21:35:12+00:00 |
| rhsa-2026:11333 | Red Hat Security Advisory: freerdp security update | 2026-04-28T07:43:25+00:00 | 2026-04-30T21:35:08+00:00 |
| rhsa-2026:11329 | Red Hat Security Advisory: webkit2gtk3 security update | 2026-04-28T07:40:56+00:00 | 2026-05-07T08:26:53+00:00 |
| rhsa-2026:11332 | Red Hat Security Advisory: freerdp security update | 2026-04-28T07:39:45+00:00 | 2026-04-30T21:35:12+00:00 |
| rhsa-2026:11328 | Red Hat Security Advisory: gdk-pixbuf2 security update | 2026-04-28T07:20:40+00:00 | 2026-04-30T16:32:36+00:00 |
| rhsa-2026:11331 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.7.2 | 2026-04-28T07:19:47+00:00 | 2026-05-09T15:02:14+00:00 |
| rhsa-2026:11327 | Red Hat Security Advisory: gdk-pixbuf2 security update | 2026-04-28T07:16:50+00:00 | 2026-04-30T16:32:38+00:00 |
| rhsa-2026:11330 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.6.5 | 2026-04-28T07:16:04+00:00 | 2026-05-09T15:02:16+00:00 |
| rhsa-2026:11326 | Red Hat Security Advisory: gdk-pixbuf2 security update | 2026-04-28T07:09:25+00:00 | 2026-04-30T16:32:37+00:00 |
| rhsa-2026:11325 | Red Hat Security Advisory: gdk-pixbuf2 security update | 2026-04-28T07:02:11+00:00 | 2026-04-30T16:32:36+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2019-225-01 | Harmony (formerly known as Magelis) HMI Panels | 2019-08-13T09:59:02.000Z | 2024-01-09T09:59:02.000Z |
| sesb-2019-214-01 | Wind River VxWorks Vulnerabilities (URGENT/11) | 2019-08-02T00:00:00.000Z | 2022-09-13T00:00:00.000Z |
| sevd-2019-134-11 | Multiple Vulnerabilities in Modicon Controller Products | 2019-05-14T16:48:40.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2018-095-01 | Security Notification - U.motion Builder software | 2018-04-05T00:00:00.000Z | 2020-02-11T00:00:00.000Z |
| sevd-2018-081-01 | Embedded FTP Servers for Modicon PAC Controllers | 2018-03-22T03:39:21.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2015-344-01 | GoAhead Web Server vulnerability | 2015-12-15T00:00:00.000Z | 2020-06-09T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-953710 | SSA-953710: Vulnerabilities in the Network Communication Stack in Desigo Fire Safety UL and Cerberus PRO UL Fire Protection Systems | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-925850 | SSA-925850: Improper Access Control in Polarion ALM | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-923361 | SSA-923361: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0011 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-916916 | SSA-916916: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.5 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-871704 | SSA-871704: Multiple Vulnerabilities in SICAM Products | 2024-05-14T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-661579 | SSA-661579: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-589937 | SSA-589937: Multiple Memory Corruption Vulnerabilities in Solid Edge | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-489698 | SSA-489698: X_T File Parsing Vulnerability in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-292022 | SSA-292022: Vulnerability in Nozomi Guardian/CMC before 23.4.1 on RUGGEDCOM APE1808 devices | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-273900 | SSA-273900: Multiple Vulnerabilities in SIMATIC CN 4100 before V3.0 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-258494 | SSA-258494: Stack Overflow Vulnerability in Simcenter Nastran before 2406.90 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-093430 | SSA-093430: Multiple Vulnerabilities in SIMATIC RTLS Locating Manager before V3.0 | 2024-05-14T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-046364 | SSA-046364: X_T File Parsing Vulnerabilities in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-750274 | SSA-750274: Impact of CVE-2024-3400 on RUGGEDCOM APE1808 devices configured with Palo Alto Networks Virtual NGFW | 2024-04-19T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-885980 | SSA-885980: Multiple Vulnerabilities in Scalance W1750D | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-822518 | SSA-822518: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW Before V11.0.1 on RUGGEDCOM APE1808 Devices | 2024-04-09T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-730482 | SSA-730482: Denial of Service Vulnerability in SIMATIC WinCC | 2024-04-09T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-556635 | SSA-556635: Multiple Vulnerabilities in Telecontrol Server Basic before V3.1.2.0 | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-455250 | SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.2-h3 | 2024-04-09T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-265688 | SSA-265688: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1 | 2024-04-09T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-222019 | SSA-222019: X_T File Parsing Vulnerabilities in Parasolid | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-128433 | SSA-128433: Multiple Vulnerabilities in SINEC NMS before V2.0 SP2 | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-918992 | SSA-918992: Unused HTTP Service on SENTRON 3KC ATC6 Ethernet Module | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-832273 | SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-792319 | SSA-792319: Missing Read Out Protection in SENTRON 7KM PAC3x20 Devices | 2024-03-12T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-770721 | SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-653855 | SSA-653855: Information Disclosure vulnerability in SINEMA Remote Connect Client before V3.1 SP1 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-576771 | SSA-576771: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-382651 | SSA-382651: File Parsing Vulnerability in Solid Edge | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-366067 | SSA-366067: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.1 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21342-1 | Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:20:12Z | 2026-04-22T17:20:12Z |
| suse-su-2026:21341-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:20:12Z | 2026-04-22T17:20:12Z |
| suse-su-2026:21301-1 | Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:20:12Z | 2026-04-22T17:20:12Z |
| suse-su-2026:21300-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:20:12Z | 2026-04-22T17:20:12Z |
| suse-su-2026:21340-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:17:06Z | 2026-04-22T17:17:06Z |
| suse-su-2026:21299-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:17:06Z | 2026-04-22T17:17:06Z |
| suse-su-2026:21339-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:16:25Z | 2026-04-22T17:16:25Z |
| suse-su-2026:21338-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:16:25Z | 2026-04-22T17:16:25Z |
| suse-su-2026:21298-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:16:25Z | 2026-04-22T17:16:25Z |
| suse-su-2026:21297-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:16:25Z | 2026-04-22T17:16:25Z |
| suse-su-2026:21337-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:16:00Z | 2026-04-22T17:16:00Z |
| suse-su-2026:21316-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:16:00Z | 2026-04-22T17:16:00Z |
| suse-su-2026:21336-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:14:01Z | 2026-04-22T17:14:01Z |
| suse-su-2026:21335-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:14:01Z | 2026-04-22T17:14:01Z |
| suse-su-2026:21296-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:14:01Z | 2026-04-22T17:14:01Z |
| suse-su-2026:21295-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:14:01Z | 2026-04-22T17:14:01Z |
| suse-su-2026:21334-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:09:05Z | 2026-04-22T17:09:05Z |
| suse-su-2026:21294-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:09:05Z | 2026-04-22T17:09:05Z |
| suse-su-2026:21333-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:00:43Z | 2026-04-22T17:00:43Z |
| suse-su-2026:21293-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:00:43Z | 2026-04-22T17:00:43Z |
| suse-su-2026:21332-1 | Security update for the Linux Kernel RT (Live Patch 15 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T16:59:48Z | 2026-04-22T16:59:48Z |
| suse-su-2026:21315-1 | Security update for the Linux Kernel RT (Live Patch 15 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T16:59:48Z | 2026-04-22T16:59:48Z |
| suse-su-2026:21331-1 | Security update for the Linux Kernel RT (Live Patch 18 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T16:59:00Z | 2026-04-22T16:59:00Z |
| suse-su-2026:21314-1 | Security update for the Linux Kernel RT (Live Patch 18 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T16:59:00Z | 2026-04-22T16:59:00Z |
| suse-su-2026:21330-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T16:54:00Z | 2026-04-22T16:54:00Z |
| suse-su-2026:21329-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T16:54:00Z | 2026-04-22T16:54:00Z |
| suse-su-2026:21328-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T16:54:00Z | 2026-04-22T16:54:00Z |
| suse-su-2026:21327-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T16:54:00Z | 2026-04-22T16:54:00Z |
| suse-su-2026:21326-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T16:54:00Z | 2026-04-22T16:54:00Z |
| suse-su-2026:21313-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T16:54:00Z | 2026-04-22T16:54:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:4059 | Important: postgresql:15 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:49:31Z |
| alsa-2026:4024 | Important: postgresql:13 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:52:09Z |
| alsa-2026:4012 | Moderate: kernel security update | 2026-03-09T00:00:00Z | 2026-03-13T09:42:02Z |
| alsa-2026:3985 | Important: git-lfs security update | 2026-03-09T00:00:00Z | 2026-03-13T12:38:07Z |
| alsa-2026:3967 | Important: libvpx security update | 2026-03-09T00:00:00Z | 2026-03-10T01:53:59Z |
| alsa-2026:3966 | Moderate: kernel security update | 2026-03-09T00:00:00Z | 2026-03-11T10:10:37Z |
| alsa-2026:3964 | Moderate: kernel-rt security update | 2026-03-09T00:00:00Z | 2026-03-10T02:07:14Z |
| alsa-2026:3963 | Moderate: kernel security update | 2026-03-09T00:00:00Z | 2026-03-10T02:04:41Z |
| alsa-2026:3940 | Moderate: nfs-utils security update | 2026-03-05T00:00:00Z | 2026-03-13T09:30:09Z |
| alsa-2026:3939 | Moderate: nfs-utils security update | 2026-03-05T00:00:00Z | 2026-03-11T09:35:33Z |
| alsa-2026:3938 | Moderate: nfs-utils security update | 2026-03-05T00:00:00Z | 2026-03-10T01:58:47Z |
| alsa-2026:3928 | Important: git-lfs security update | 2026-03-05T00:00:00Z | 2026-03-06T13:16:21Z |
| alsa-2026:3898 | Important: osbuild-composer security update | 2026-03-05T00:00:00Z | 2026-03-11T09:54:32Z |
| alsa-2026:3896 | Important: postgresql:15 security update | 2026-03-05T00:00:00Z | 2026-03-10T19:52:06Z |
| alsa-2026:3887 | Important: postgresql16 security update | 2026-03-05T00:00:00Z | 2026-03-06T13:21:51Z |
| alsa-2026:3864 | Important: delve security update | 2026-03-05T00:00:00Z | 2026-03-06T13:19:09Z |
| alsa-2026:3842 | Moderate: delve security update | 2026-03-05T00:00:00Z | 2026-03-13T09:28:13Z |
| alsa-2026:3840 | Important: image-builder security update | 2026-03-05T00:00:00Z | 2026-05-05T17:11:52Z |
| alsa-2026:3839 | Important: image-builder security update | 2026-03-05T00:00:00Z | 2026-05-05T11:43:10Z |
| alsa-2026:3753 | Important: osbuild-composer security update | 2026-03-04T00:00:00Z | 2026-03-10T19:47:08Z |
| alsa-2026:3752 | Important: osbuild-composer security update | 2026-03-04T00:00:00Z | 2026-03-11T09:57:01Z |
| alsa-2026:3730 | Important: postgresql security update | 2026-03-04T00:00:00Z | 2026-03-11T10:01:08Z |
| alsa-2026:3669 | Important: go-rpm-macros security update | 2026-03-03T00:00:00Z | 2026-03-04T11:09:35Z |
| alsa-2026:3668 | Important: go-rpm-macros security update | 2026-03-03T00:00:00Z | 2026-03-04T11:06:04Z |
| alsa-2026:3638 | Moderate: nginx:1.24 security update | 2026-03-03T00:00:00Z | 2026-03-04T10:33:37Z |
| alsa-2026:3551 | Important: libpng security update | 2026-03-02T00:00:00Z | 2026-03-04T10:21:19Z |
| alsa-2026:3517 | Important: thunderbird security update | 2026-03-02T00:00:00Z | 2026-03-05T07:45:44Z |
| alsa-2026:3516 | Important: thunderbird security update | 2026-03-02T00:00:00Z | 2026-03-04T10:23:48Z |
| alsa-2026:3515 | Important: thunderbird security update | 2026-03-02T00:00:00Z | 2026-03-04T11:54:18Z |
| alsa-2026:3507 | Important: valkey security update | 2026-03-02T00:00:00Z | 2026-03-04T10:26:29Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-226 | UNKNOWN READ in extract_sess_version | 2025-03-21T00:19:10.852617Z | 2025-03-21T00:19:10.852969Z |
| osv-2025-219 | Heap-buffer-overflow in opj_j2k_read_tile_header | 2025-03-18T00:18:30.566980Z | 2026-02-11T14:21:43.026699Z |
| osv-2025-215 | Security exception in graphql.parser.GraphqlAntlrToLanguage.createType | 2025-03-18T00:09:36.655072Z | 2025-03-18T00:09:36.655425Z |
| osv-2025-207 | Security exception in org.apache.lucene.analysis.tokenattributes.CharTermAttributeImpl.clone | 2025-03-16T00:02:33.765869Z | 2025-06-20T17:14:14.229009Z |
| osv-2025-202 | UNKNOWN READ in _blit_xrgb32_lerp_spans | 2025-03-15T00:01:51.127135Z | 2026-03-18T14:26:56.370221Z |
| osv-2025-190 | Heap-buffer-overflow in std::__1::__function::__func<cv::PngDecoder::compose_frame | 2025-03-11T00:04:32.361664Z | 2025-03-11T00:04:32.362119Z |
| osv-2025-178 | Heap-buffer-overflow in usm_set_user_password | 2025-02-28T00:16:54.655227Z | 2025-02-28T00:16:54.655745Z |
| osv-2025-177 | Segv on unknown address in chunk_free_object | 2025-02-28T00:16:24.018716Z | 2025-02-28T00:16:24.019131Z |
| osv-2025-175 | UNKNOWN READ in insert_free | 2025-02-28T00:12:26.919208Z | 2025-02-28T00:12:26.919553Z |
| osv-2025-174 | Heap-use-after-free in gc_trace | 2025-02-28T00:12:25.140274Z | 2025-02-28T00:12:25.140618Z |
| osv-2025-173 | UNKNOWN READ in chunk_obj_alloc | 2025-02-28T00:11:40.566459Z | 2025-02-28T00:11:40.566797Z |
| osv-2025-169 | Stack-buffer-overflow in utf8_in2 | 2025-02-27T00:07:08.029075Z | 2026-03-21T14:18:54.197384Z |
| osv-2025-165 | Index-out-of-bounds in dwg_decode_eed | 2025-02-26T00:17:27.930225Z | 2025-02-26T00:17:27.930707Z |
| osv-2025-162 | Heap-buffer-overflow in snmp_in_options | 2025-02-24T00:15:40.967551Z | 2025-03-18T00:30:24.116747Z |
| osv-2025-161 | Heap-buffer-overflow in se_add_pair | 2025-02-24T00:15:33.662895Z | 2025-03-18T00:37:12.676515Z |
| osv-2025-160 | UNKNOWN WRITE in ndpi_free_flow_data | 2025-02-24T00:07:49.495615Z | 2025-02-24T00:07:49.495976Z |
| osv-2025-156 | Check failed in CheckUnwind | 2025-02-23T00:16:50.073196Z | 2025-02-23T00:16:50.073520Z |
| osv-2025-154 | UNKNOWN READ in ndpi_strdup | 2025-02-23T00:13:05.487818Z | 2025-02-23T00:13:05.488183Z |
| osv-2025-149 | UNKNOWN READ in processClientServerHello | 2025-02-23T00:00:50.236281Z | 2025-02-23T00:00:50.236700Z |
| osv-2025-148 | Heap-buffer-overflow in setup_engineID | 2025-02-23T00:00:36.951152Z | 2025-03-18T00:22:22.817245Z |
| osv-2025-147 | UNKNOWN WRITE in ndpi_free_flow_data | 2025-02-22T00:18:07.814416Z | 2025-02-22T00:18:07.814726Z |
| osv-2025-145 | Heap-buffer-overflow in ___interceptor_strncat | 2025-02-22T00:14:15.620085Z | 2025-02-22T00:14:15.620535Z |
| osv-2025-133 | Stack-buffer-overflow in se_read_conf | 2025-02-17T00:02:18.986364Z | 2025-03-18T00:27:33.917908Z |
| osv-2025-132 | Heap-use-after-free in netsnmp_hex_to_binary | 2025-02-17T00:01:01.920904Z | 2025-03-18T00:33:26.648884Z |
| osv-2025-131 | Heap-buffer-overflow in vips_foreign_save_heif_write_block | 2025-02-16T00:13:44.282887Z | 2025-03-18T00:32:21.245932Z |
| osv-2025-127 | Object-size in unpack_dsd_samples | 2025-02-15T00:16:56.314634Z | 2025-02-15T00:16:56.315060Z |
| osv-2025-124 | Use-of-uninitialized-value in get_word | 2025-02-15T00:09:23.967012Z | 2025-02-15T00:09:23.967345Z |
| osv-2025-119 | Heap-buffer-overflow in snmp_config_when | 2025-02-14T00:15:08.375253Z | 2025-03-18T00:37:43.437021Z |
| osv-2025-114 | Index-out-of-bounds in ada_fuzz_header.h | 2025-02-14T00:11:24.754671Z | 2025-02-14T00:11:24.755045Z |
| osv-2025-113 | Heap-buffer-overflow in snmp_log_options | 2025-02-14T00:01:45.812592Z | 2025-03-18T00:35:43.690001Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0029 | totally-safe introduces memory vulnerabilities in safe Rust | 2025-02-10T12:00:00Z | 2025-05-05T18:31:28Z |
| rustsec-2025-0028 | cve-rs introduces memory vulnerabilities in safe Rust | 2025-02-10T12:00:00Z | 2025-05-06T21:08:48Z |
| rustsec-2025-0006 | Hickory DNS failure to verify self-signed RRSIG for DNSKEYs | 2025-02-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0004 | ssl::select_next_proto use after free | 2025-02-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0160 | `custom-req-on-workers` was removed from crates.io for malicious code | 2025-01-30T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0158 | `jfrog_quotes` was removed from crates.io for malicious code | 2025-01-30T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0001 | gix-worktree-state nonexclusive checkout sets executable files world-writable | 2025-01-18T12:00:00Z | 2025-01-22T17:11:51Z |
| rustsec-2025-0040 | `root` appended to group listings | 2025-01-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0161 | libsecp256k1 is unmaintained | 2025-01-14T12:00:00Z | 2026-04-14T11:24:03Z |
| rustsec-2025-0026 | registry is unmaintained | 2025-01-13T12:00:00Z | 2025-04-29T08:11:21Z |
| rustsec-2025-0005 | Out of bounds write triggered by crafted coverage data | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0003 | Segmentation fault due to lack of bound check | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0002 | Segmentation fault due to lack of bound check | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0430 | Use of insecure cryptographic algorithms | 2024-12-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0431 | Unsound usages of `core::slice::from_raw_parts` | 2024-12-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0435 | Unsound usages of `Vec::from_raw_parts` | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0426 | Unsound usages of `u8` type casting | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0424 | Unsound usages of `core::slice::from_raw_parts_mut` | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0433 | Malicious plugin names, recipients, or identities can cause arbitrary binary execution | 2024-12-18T12:00:00Z | 2025-01-03T18:23:54Z |
| rustsec-2024-0432 | Malicious plugin names, recipients, or identities can cause arbitrary binary execution | 2024-12-18T12:00:00Z | 2025-01-03T18:23:54Z |
| rustsec-2024-0437 | Crash due to uncontrolled recursion in protobuf crate | 2024-12-12T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0423 | gtk-layer-shell-sys GTK3 bindings - no longer maintained | 2024-12-09T12:00:00Z | 2024-12-09T13:12:34Z |
| rustsec-2024-0422 | gtk-layer-shell GTK3 bindings - no longer maintained | 2024-12-09T12:00:00Z | 2024-12-09T13:12:34Z |
| rustsec-2024-0421 | `idna` accepts Punycode labels that do not produce any non-ASCII when decoded | 2024-12-09T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0447 | Panics on Malformed Untrusted Input | 2024-12-05T12:00:00Z | 2025-12-24T14:48:25Z |
| rustsec-2024-0428 | Undefined behaviour in `kvm_ioctls::ioctls::vm::VmFd::create_device` | 2024-12-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0409 | Build corruption when using `PYO3_CONFIG_FILE` environment variable | 2024-12-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0408 | Unsound usages of `std::slice::from_raw_parts` | 2024-12-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0400 | `ruzstd` uninit and out-of-bounds memory reads | 2024-11-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0399 | rustls network-reachable panic in `Acceptor::accept` | 2024-11-22T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-java-2025-50059 | 2026-05-06T14:45:36.983Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-47219 | 2026-05-06T14:45:35.623Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-43457 | 2026-05-06T14:45:34.262Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-32415 | 2026-05-06T14:45:32.966Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-32414 | 2026-05-06T14:45:31.642Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-30761 | 2026-05-06T14:45:30.179Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-30754 | 2026-05-06T14:45:28.769Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-30752 | 2026-05-06T14:45:27.254Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-30749 | 2026-05-06T14:45:25.824Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-30698 | 2026-05-06T14:45:24.584Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-30691 | 2026-05-06T14:45:23.157Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-27113 | 2026-05-06T14:45:21.731Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-24928 | 2026-05-06T14:45:20.148Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-24855 | 2026-05-06T14:45:18.662Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-21587 | 2026-05-06T14:45:17.182Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-21502 | 2026-05-06T14:45:15.746Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-10911 | Libxslt: use-after-free with key data stored cross-rvt | 2026-05-06T14:45:14.224Z | 2026-05-08T06:11:36.072Z |
| bit-java-2025-0509 | Signing Checks Bypass | 2026-05-06T14:45:12.781Z | 2026-05-08T06:11:36.072Z |
| bit-java-2024-56171 | 2026-05-06T14:45:11.536Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2024-55549 | 2026-05-06T14:45:10.140Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2024-54534 | 2026-05-06T14:45:08.551Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2024-47778 | GHSL-2024-258: GStreamer has an OOB-read in gst_wavparse_adtl_chunk | 2026-05-06T14:45:07.074Z | 2026-05-08T06:11:36.072Z |
| bit-java-2024-47777 | GHSL-2024-259: GStreamer has an OOB-read in gst_wavparse_smpl_chunk | 2026-05-06T14:45:05.604Z | 2026-05-08T06:11:36.072Z |
| bit-java-2024-47776 | GHSL-2024-260: GStreamer has a OOB-read in gst_wavparse_cue_chunk | 2026-05-06T14:45:04.040Z | 2026-05-08T06:11:36.072Z |
| bit-java-2024-47775 | GHSL-2024-261: GStreamer has an OOB-read in parse_ds64 | 2026-05-06T14:45:02.492Z | 2026-05-08T06:11:36.072Z |
| bit-java-2024-47606 | GHSL-2024-166: GStreamer Integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes | 2026-05-06T14:45:01.107Z | 2026-05-08T06:11:36.072Z |
| bit-java-2024-47597 | GHSL-2024-245: GStreamer has an OOB-read in qtdemux_parse_samples | 2026-05-06T14:44:59.658Z | 2026-05-08T06:11:36.072Z |
| bit-java-2024-47596 | GHSL-2024-244: GStreamer has an OOB-read in FOURCC_SMI_ parsing | 2026-05-06T14:44:58.317Z | 2026-05-08T06:11:36.072Z |
| bit-java-2024-47546 | GHSL-2024-243: GStreamer has an integer underflow in extract_cc_from_data leading to OOB-read | 2026-05-06T14:44:56.653Z | 2026-05-08T06:11:36.072Z |
| bit-java-2024-47545 | GHSL-2024-242: GStreamer has an integer underflow in FOURCC_strf parsing leading to OOB-read | 2026-05-06T14:44:55.155Z | 2026-05-08T06:11:36.072Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-gu55430 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-9h8m-3fm2-qjrq, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.9.4-r0, 1.9.4-r1, 1.9.4-r2, 1.9.4-r3 | 2026-04-01T09:37:53.639715Z | 2026-03-20T04:52:14Z |
| cleanstart-2026-ms81166 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.4.4-r2, 2.4.4-r4, 2.5.0-r0, 2.5.0-r1 | 2026-04-01T09:37:27.717828Z | 2026-03-20T11:37:58Z |
| cleanstart-2026-ir69938 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.4.4-r2, 2.5.0-r0, 2.5.1-r0, 2.5.1-r1 | 2026-04-01T09:37:08.257134Z | 2026-03-20T11:37:58Z |
| cleanstart-2026-lb23787 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x, ghsa-p436-gjf2-799p applied in versions: 2.13.4-r0, 2.13.4-r1, 2.13.4-r2, 2.13.5-r0, 2.13.5-r1 | 2026-04-01T09:37:01.194631Z | 2026-03-22T07:08:40Z |
| cleanstart-2026-pe63912 | Security fixes for CVE-2021-3538, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.15.0-r0, 2.15.0-r1 | 2026-04-01T09:37:00.583811Z | 2026-03-22T07:02:21Z |
| cleanstart-2026-mt27167 | Security fixes for CVE-2021-3538, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.14.3-r0, 2.14.3-r1 | 2026-04-01T09:36:58.329684Z | 2026-03-22T07:06:00Z |
| cleanstart-2026-os42112 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x, ghsa-p436-gjf2-799p applied in versions: 2.12.4-r0, 2.12.4-r1, 2.13.4-r0, 2.13.4-r1, 2.13.4-r2 | 2026-04-01T09:36:49.810788Z | 2026-03-22T07:12:11Z |
| cleanstart-2026-ee52954 | Security fixes for CVE-2021-3538, CVE-2025-22871, CVE-2025-29923, CVE-2025-4673, CVE-2025-47907, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-hcg3-q754-cr77, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw applied in versions: 3.0.0.1-r2, 3.0.0.1-r3, 3.0.0.1-r4 | 2026-04-01T09:36:34.270182Z | 2026-03-22T07:36:37Z |
| cleanstart-2026-qy63788 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.14.3-r0, 2.14.3-r1 | 2026-04-01T09:36:08.453160Z | 2026-03-22T07:24:09Z |
| cleanstart-2026-kw24478 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.15.0-r0, 2.15.0-r1 | 2026-04-01T09:36:08.569651Z | 2026-03-22T07:20:42Z |
| cleanstart-2026-ap81168 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.13.4-r0, 2.13.5-r0, 2.13.5-r1 | 2026-04-01T09:35:54.838524Z | 2026-03-22T07:27:04Z |
| cleanstart-2026-jb52011 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-p77j-4mvh-x3m3 applied in versions: 1.11.1-r1, 1.11.1-r2 | 2026-04-01T09:35:29.036304Z | 2026-03-22T07:44:23Z |
| cleanstart-2026-da83816 | Security fixes for CVE-2026-33186, ghsa-p77j-4mvh-x3m3 applied in versions: 1.14.0-r0 | 2026-04-01T09:35:14.283813Z | 2026-03-22T07:39:37Z |
| cleanstart-2026-jj84567 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.6.4-r3 | 2026-04-01T09:35:06.408771Z | 2026-03-22T07:50:03Z |
| cleanstart-2026-fl27179 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.5.2-r3 | 2026-04-01T09:34:50.735567Z | 2026-03-22T07:53:14Z |
| cleanstart-2026-jk59495 | Security fixes for CVE-2025-0913, CVE-2025-4673, CVE-2025-47907, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-9h8m-3fm2-qjrq, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 3.3.2-r0, 3.4.2-r0, 3.4.2-r3, 3.4.2-r4 | 2026-04-01T09:34:49.510720Z | 2026-03-22T18:12:16Z |
| cleanstart-2026-kk98885 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-9h8m-3fm2-qjrq applied in versions: 2.18.0-r0 | 2026-04-01T09:34:13.357278Z | 2026-03-23T06:16:30Z |
| cleanstart-2026-bc17682 | Security fixes for CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.4.4-r0, 2.4.4-r1 | 2026-04-01T09:33:57.594313Z | 2026-03-23T06:28:34Z |
| cleanstart-2026-nv36169 | Security fixes for CVE-2025-61732, CVE-2025-66564, CVE-2025-68121, CVE-2026-24686, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, ghsa-fcv2-xgw5-pqxf applied in versions: 0.7.29-r1, 0.7.29-r2 | 2026-04-01T09:33:48.680625Z | 2026-03-23T06:33:00Z |
| cleanstart-2026-gq14179 | Security fixes for CVE-2025-11143, CVE-2025-53864, CVE-2025-55163, CVE-2025-58056, CVE-2025-58057, CVE-2025-67735, CVE-2025-68161, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.46.1-r3, 0.46.1-r4 | 2026-04-01T09:33:44.585498Z | 2026-03-23T06:45:45Z |
| cleanstart-2026-lp76319 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.21.2-r0, 1.21.2-r1 | 2026-04-01T09:33:36.179758Z | 2026-03-23T06:57:40Z |
| cleanstart-2026-qj92322 | Security fixes for CVE-2025-15558, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.0.2-r0, 2.0.2-r1 | 2026-04-01T09:33:14.887013Z | 2026-03-23T06:58:42Z |
| cleanstart-2026-ps51260 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.2.2-r0, 1.2.2-r1 | 2026-04-01T09:33:07.208099Z | 2026-03-23T07:02:53Z |
| cleanstart-2026-gi67088 | Security fixes for CVE-2020-8559, CVE-2020-8565, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, ghsa-33c5-9fx5-fvjm, ghsa-8cfg-vx93-jvxw applied in versions: 2.12.0-r0, 2.12.0-r1 | 2026-04-01T09:33:02.208236Z | 2026-03-23T07:05:35Z |
| cleanstart-2026-on62368 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10.0-r0, 0.10.0-r1, 0.11.0-r0, 1.13.1-r0 | 2026-04-01T09:32:49.419019Z | 2026-03-23T07:09:26Z |
| cleanstart-2026-nv78596 | Security fixes for CVE-2022-29526, CVE-2025-47907, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-4f99-4q7p-p3gh applied in versions: 0.10-r0, 0.11-r0, 0.11-r2, 0.11-r3, 0.11-r4 | 2026-04-01T09:32:41.363681Z | 2026-03-23T07:34:57Z |
| cleanstart-2026-jm96857 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.16.4-r0, 2.16.4-r1 | 2026-04-01T09:32:39.352692Z | 2026-03-23T07:04:06Z |
| cleanstart-2026-fn44356 | Security fixes for CVE-2022-29526, CVE-2025-47907, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10-r0, 0.11-r0, 0.9-r0, 0.9-r1, 0.9-r2 | 2026-04-01T09:31:56.126620Z | 2026-03-23T07:36:06Z |
| cleanstart-2026-cl65461 | Security fixes for CVE-2022-29526, CVE-2025-47907, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10-r0, 0.11-r0, 0.8-r0, 0.8-r1, 0.8-r2, 0.9-r0 | 2026-04-01T09:31:56.332937Z | 2026-03-23T07:35:18Z |
| cleanstart-2026-pv93827 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.25.4-r0, 1.25.4-r1, 1.25.4-r2 | 2026-04-01T09:31:37.416388Z | 2026-03-23T07:38:20Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2018-ALE-001 | Multiples vulnérabilités de fuite d'informations dans des processeurs | 2018-01-04T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2017-ale-020 | Vulnérabilité dans des implémentations de TLS | 2017-12-13T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| CERTFR-2017-ALE-020 | Vulnérabilité dans des implémentations de TLS | 2017-12-13T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| certfr-2017-ale-019 | Vulnérabilité d'usurpation d'identité dans plusieurs clients de messagerie | 2017-12-05T00:00:00.000000 | 2018-03-07T00:00:00.000000 |
| CERTFR-2017-ALE-019 | Vulnérabilité d'usurpation d'identité dans plusieurs clients de messagerie | 2017-12-05T00:00:00.000000 | 2018-03-07T00:00:00.000000 |
| certfr-2017-ale-018 | Vulnérabilité dans Apple MacOS High Sierra | 2017-11-29T00:00:00.000000 | 2017-11-30T00:00:00.000000 |
| CERTFR-2017-ALE-018 | Vulnérabilité dans Apple MacOS High Sierra | 2017-11-29T00:00:00.000000 | 2017-11-30T00:00:00.000000 |
| certfr-2017-ale-017 | Vulnérabilité dans le serveur de messagerie Exim | 2017-11-27T00:00:00.000000 | 2018-02-01T00:00:00.000000 |
| CERTFR-2017-ALE-017 | Vulnérabilité dans le serveur de messagerie Exim | 2017-11-27T00:00:00.000000 | 2018-02-01T00:00:00.000000 |
| certfr-2017-ale-016 | Campagne de rançongiciel Bad Rabbit | 2017-10-25T00:00:00.000000 | 2017-10-27T00:00:00.000000 |
| CERTFR-2017-ALE-016 | Campagne de rançongiciel Bad Rabbit | 2017-10-25T00:00:00.000000 | 2017-10-27T00:00:00.000000 |
| certfr-2017-ale-014 | Vulnérabilité dans le protocole WPA/WPA2 | 2017-10-18T00:00:00.000000 | 2017-10-19T00:00:00.000000 |
| CERTFR-2017-ALE-014 | Vulnérabilité dans le protocole WPA/WPA2 | 2017-10-18T00:00:00.000000 | 2017-10-19T00:00:00.000000 |
| certfr-2017-ale-015 | Vulnérabilités dans la bibliothèque Infineon RSA | 2017-10-16T00:00:00.000000 | 2017-10-17T00:00:00.000000 |
| CERTFR-2017-ALE-015 | Vulnérabilités dans la bibliothèque Infineon RSA | 2017-10-16T00:00:00.000000 | 2017-10-17T00:00:00.000000 |
| certfr-2017-ale-013 | Présence de code malveillant dans Piriform CCleaner | 2017-09-18T00:00:00.000000 | 2017-10-09T00:00:00.000000 |
| CERTFR-2017-ALE-013 | Présence de code malveillant dans Piriform CCleaner | 2017-09-18T00:00:00.000000 | 2017-10-09T00:00:00.000000 |
| certfr-2017-ale-012 | Campagne de maliciels prenant l'apparence d'un rançongiciel à multiples capacités de propagation | 2017-06-27T00:00:00.000000 | 2017-08-03T00:00:00.000000 |
| CERTFR-2017-ALE-012 | Campagne de maliciels prenant l'apparence d'un rançongiciel à multiples capacités de propagation | 2017-06-27T00:00:00.000000 | 2017-08-03T00:00:00.000000 |
| certfr-2017-ale-011 | Campagne de messages électroniques non sollicités de type Jaff | 2017-05-14T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| CERTFR-2017-ALE-011 | Campagne de messages électroniques non sollicités de type Jaff | 2017-05-14T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| certfr-2017-ale-010 | Propagation d'un rançongiciel exploitant les vulnérabilités MS17-010 | 2017-05-12T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| CERTFR-2017-ALE-010 | Propagation d'un rançongiciel exploitant les vulnérabilités MS17-010 | 2017-05-12T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| certfr-2017-ale-009 | Vulnérabilité dans Microsoft Malware Protection Engine | 2017-05-09T00:00:00.000000 | 2017-05-15T00:00:00.000000 |
| CERTFR-2017-ALE-009 | Vulnérabilité dans Microsoft Malware Protection Engine | 2017-05-09T00:00:00.000000 | 2017-05-15T00:00:00.000000 |
| certfr-2017-ale-008 | Multiples vulnérabilités dans Microsoft Windows XP et Windows Server 2003 | 2017-04-14T00:00:00.000000 | 2017-09-06T00:00:00.000000 |
| CERTFR-2017-ALE-008 | Multiples vulnérabilités dans Microsoft Windows XP et Windows Server 2003 | 2017-04-14T00:00:00.000000 | 2017-09-06T00:00:00.000000 |
| certfr-2017-ale-007 | Vulnérabilité dans Microsoft Office | 2017-04-10T00:00:00.000000 | 2017-04-12T00:00:00.000000 |
| CERTFR-2017-ALE-007 | Vulnérabilité dans Microsoft Office | 2017-04-10T00:00:00.000000 | 2017-04-12T00:00:00.000000 |
| certfr-2017-ale-006 | Multiples vulnérabilités dans SCADA Siemens RUGGEDCOM ROX I | 2017-03-29T00:00:00.000000 | 2017-03-29T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0282 | Multiples vulnérabilités dans Veeam Backup & Replication | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0281 | Multiples vulnérabilités dans les produits Splunk | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0280 | Multiples vulnérabilités dans les produits Apple | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0279 | Multiples vulnérabilités dans Cisco IOS XR | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0278 | Multiples vulnérabilités dans Google Chrome | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0277 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0276 | Multiples vulnérabilités dans GitLab | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0275 | Vulnérabilité dans GLPI | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0274 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0273 | Multiples vulnérabilités dans Microsoft Azure | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0272 | Multiples vulnérabilités dans Microsoft .Net | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0271 | Multiples vulnérabilités dans Microsoft Windows | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0270 | Multiples vulnérabilités dans Microsoft Office | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0269 | Multiples vulnérabilités dans Curl | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0268 | Multiples vulnérabilités dans Traefik | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0267 | Multiples vulnérabilités dans Mozilla Firefox | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0266 | Multiples vulnérabilités dans VMware Tanzu | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0265 | Multiples vulnérabilités dans les produits Fortinet | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0264 | Multiples vulnérabilités dans les produits Adobe | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0263 | Vulnérabilité dans Ivanti Desktop and Server Management (DSM) | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0262 | Multiples vulnérabilités dans HPE Aruba Networking AOS-CX | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0261 | Multiples vulnérabilités dans les produits Intel | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0260 | Multiples vulnérabilités dans WordPress | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0259 | Multiples vulnérabilités dans Stormshield Network Security | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0258 | Vulnérabilité dans Microsoft CBL-Mariner | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0257 | Vulnérabilité dans Mozilla Focus | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0256 | Multiples vulnérabilités dans les produits SAP | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0255 | Multiples vulnérabilités dans les produits Siemens | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0254 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0253 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-09T00:00:00.000000 | 2026-03-09T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000011 | Multiple vulnerabilities in FileMegane | 2025-02-13T13:39+09:00 | 2025-02-13T13:39+09:00 |
| jvndb-2025-000010 | acmailer vulnerable to cross-site scripting | 2025-02-12T15:05+09:00 | 2025-02-12T15:05+09:00 |
| jvndb-2025-001017 | Multiple vulnerabilities in STEALTHONE D220/D340/D440 | 2025-02-06T18:27+09:00 | 2025-02-06T18:27+09:00 |
| jvndb-2025-001016 | OMRON NJ/NX series vulnerable to path traversal | 2025-02-06T18:27+09:00 | 2025-05-08T17:44+09:00 |
| jvndb-2025-001018 | Improper restriction of XML external entity reference (XXE) vulnerability in OMRON NB-Designer | 2025-02-06T18:26+09:00 | 2025-02-06T18:26+09:00 |
| jvndb-2025-000008 | Multiple vulnerabilities in Defense Platform Home Edition | 2025-02-05T14:06+09:00 | 2025-02-05T14:06+09:00 |
| jvndb-2025-000009 | WordPress Plugin "Activity Log WinterLock" vulnerable to cross-site request forgery | 2025-02-04T13:58+09:00 | 2025-02-04T13:58+09:00 |
| jvndb-2025-001244 | Clickjacking Vulnerability in JP1/ServerConductor/Deployment Manager | 2025-01-30T18:19+09:00 | 2025-01-30T18:19+09:00 |
| jvndb-2025-000007 | SXF Common Library vulnerable to improper input data handling | 2025-01-29T14:57+09:00 | 2025-01-29T14:57+09:00 |
| jvndb-2025-001238 | Multiple out-of-bounds write vulnerabilities in Canon Office/Small Office Multifunction Printers and Laser Printers | 2025-01-29T13:41+09:00 | 2025-05-27T16:06+09:00 |
| jvndb-2025-000006 | WordPress Plugin "Simple Image Sizes" vulnerable to cross-site scripting | 2025-01-28T13:44+09:00 | 2025-01-28T13:44+09:00 |
| jvndb-2025-000005 | EXIF Viewer Classic vulnerable to cross-site scripting | 2025-01-27T14:25+09:00 | 2025-01-27T14:25+09:00 |
| jvndb-2025-000004 | Multiple vulnerabilities in I-O DATA router UD-LT2 | 2025-01-22T13:55+09:00 | 2025-02-20T15:55+09:00 |
| jvndb-2025-000003 | FortiWeb vulnerable to SQL injection | 2025-01-21T15:59+09:00 | 2025-01-21T15:59+09:00 |
| jvndb-2025-001027 | Linux Ratfor vulnerable to stack-based buffer overflow | 2025-01-16T13:27+09:00 | 2025-01-16T13:27+09:00 |
| jvndb-2025-000001 | PLANEX COMMUNICATIONS MZK-DP300N vulnerable to cross-site scripting | 2025-01-08T17:08+09:00 | 2025-01-08T17:08+09:00 |
| jvndb-2024-015471 | Trend Micro Deep Security 20.0 Agent (for Windows) vulnerable to uncontrolled search path element | 2024-12-25T11:28+09:00 | 2024-12-25T11:28+09:00 |
| jvndb-2024-015393 | Multiple security updates for Trend Micro Apex One and Apex One as a Service (December 2024) | 2024-12-23T12:52+09:00 | 2024-12-23T12:52+09:00 |
| jvndb-2024-014918 | Authentication Bypass Vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2024-12-17T15:23+09:00 | 2024-12-17T15:23+09:00 |
| jvndb-2024-000128 | Multiple vulnerabilities in SHARP routers | 2024-12-17T07:54+09:00 | 2024-12-17T07:54+09:00 |
| jvndb-2024-000127 | "Shonen Jump+" App for Android fails to restrict custom URL schemes properly | 2024-12-16T15:07+09:00 | 2024-12-16T15:07+09:00 |
| jvndb-2024-014825 | WordPress Plugin "My WP Customize Admin/Frontend" vulnerable to cross-site scripting | 2024-12-16T13:57+09:00 | 2024-12-16T13:57+09:00 |
| jvndb-2024-014793 | Multiple vulnerabilities in FXC AE1021 and AE1021PE | 2024-12-16T11:51+09:00 | 2024-12-16T11:51+09:00 |
| jvndb-2024-014079 | Trend Micro Deep Security Agent for Windows and Deep Security Notifier on DSVA vulnerable to OS command injection | 2024-12-06T12:11+09:00 | 2024-12-06T12:11+09:00 |
| jvndb-2024-000125 | Multiple vulnerabilities in I-O DATA routers UD-LT1 and UD-LT1/EX | 2024-12-04T15:22+09:00 | 2024-12-18T15:20+09:00 |
| jvndb-2024-000124 | Multiple vulnerabilities in UNIVERGE IX/IX-R/IX-V series routers | 2024-12-02T16:38+09:00 | 2024-12-02T16:38+09:00 |
| jvndb-2024-000123 | Multiple FCNT Android devices vulnerable to authentication bypass | 2024-11-29T15:30+09:00 | 2024-11-29T15:30+09:00 |
| jvndb-2024-013702 | Multiple vulnerabilities in FUJI ELECTRIC products | 2024-11-29T14:42+09:00 | 2024-11-29T14:42+09:00 |
| jvndb-2024-000122 | HAProxy vulnerable to HTTP request/response smuggling | 2024-11-27T14:36+09:00 | 2024-11-27T14:36+09:00 |
| jvndb-2024-000121 | WordPress Plugin "WP Admin UI Customize" vulnerable to cross-site scripting | 2024-11-26T13:57+09:00 | 2024-11-26T13:57+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-18394 | Endian Firewall group参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18390 | Endian Firewall DOMAIN参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18382 | Endian Firewall domain参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18378 | Endian Firewall ADDRESS BCC参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18377 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18377) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18376 | Endian Firewall REMARK参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18375 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18375) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18373 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18373) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18370 | Endian Firewall new_cert_name参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18365 | Endian Firewall remark参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-16877 | IBM Aspera Shares存储型跨站脚本漏洞 | 2026-04-07 | 2026-04-10 |
| cnvd-2026-16876 | IBM Verify Identity Access认证绕过漏洞(CNVD-2026-16876) | 2026-04-07 | 2026-04-10 |
| cnvd-2026-16875 | IBM Content Navigator跨站脚本漏洞(CNVD-2026-16875) | 2026-04-07 | 2026-04-10 |
| cnvd-2026-16036 | Linux kernel双重释放漏洞(CNVD-2026-16036) | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16035 | FreeRDP拒绝服务漏洞(CNVD-2026-16035) | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16034 | FreeRDP越界读取漏洞(CNVD-2026-16034) | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16033 | FreeRDP堆缓冲区溢出漏洞(CNVD-2026-16033) | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16032 | FreeRDP双重释放漏洞(CNVD-2026-16032) | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16031 | OpenBao授权问题漏洞 | 2026-04-02 | 2026-04-03 |
| cnvd-2026-19045 | 多款Apple产品拒绝服务漏洞(CNVD-2026-19045) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19043 | Apple macOS Tahoe存在未明漏洞(CNVD-2026-19043) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19042 | Apple macOS Tahoe存在未明漏洞(CNVD-2026-19042) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19041 | Apple macOS Tahoe存在未明漏洞(CNVD-2026-19041) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19040 | Apple macOS Tahoe存在未明漏洞(CNVD-2026-19040) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19039 | Apple macOS Tahoe堆缓冲区溢出漏洞 | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19038 | Apple macOS Tahoe存在未明漏洞(CNVD-2026-19038) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19037 | Apple macOS存在未明漏洞(CNVD-2026-19037) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19036 | Apple macOS Tahoe存在未明漏洞(CNVD-2026-19036) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19035 | Apple macOS Tahoe存在未明漏洞(CNVD-2026-19035) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19034 | Apple macOS存在未明漏洞(CNVD-2026-19034) | 2026-03-31 | 2026-04-30 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01424 | Уязвимость DNS-сервера Dnsmasq, связанная с ошибками реализации проверки безопасности для… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01423 | Уязвимость функции hci_conn_del() модуля net/bluetooth/hci_conn.c подсистемы Bluetooth яд… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01422 | Уязвимость функции DestroyImage компонента MagickCore/image.c консольного графического ре… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01421 | Уязвимость функции ReadMVGImage компонента coders/mvg.c консольного графического редактор… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01420 | Уязвимость функции WriteMPCImage() компонента coders/mpc.c консольного графического редак… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01419 | Уязвимость функции lite_font_map() компонента coders/wmf.c консольного графического редак… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01418 | Уязвимость функции mpi3mr_process_cfg_req() модуля drivers/scsi/mpi3mr/mpi3mr_fw.c драйве… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01417 | Уязвимость функции usb_shark_probe() модуля drivers/media/radio/radio-shark.c драйвера му… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01416 | Уязвимость функции imx_pcie_suspend_noirq() модуля drivers/pci/controller/dwc/pci-imx6.c … | 08.02.2026 | 08.02.2026 |
| bdu:2026-01415 | Уязвимость функции virtnet_rq_alloc() модуля drivers/net/virtio_net.c драйвера поддержки … | 08.02.2026 | 08.02.2026 |
| bdu:2026-01414 | Уязвимость функции disk_destroy_zone_wplugs_hash_table() модуля block/blk-zoned.c поддерж… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01413 | Уязвимость функции can_nocow_file_extent() модуля fs/btrfs/inode.c поддержки файловой сис… | 08.02.2026 | 10.02.2026 |
| bdu:2026-01412 | Уязвимость функции ksmbd_conn_init_server_callbacks() модуля fs/smb/server/connection.c п… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01411 | Уязвимость функции cow_file_range() модуля fs/btrfs/inode.c поддержки файловой системы bt… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01410 | Уязвимость функции sdw_hda_dai_hw_params() модуля sound/soc/sof/intel/hda-dai.c поддержки… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01409 | Уязвимость функции lookup_inline_extent_backref() модуля fs/btrfs/extent-tree.c файловой … | 08.02.2026 | 08.02.2026 |
| bdu:2026-01408 | Уязвимость функции nfsd_net_init() модуля fs/nfsd/nfsctl.c поддержки сетевой файловой сис… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01407 | Уязвимость функции vimc_streamer_pipeline_terminate() модуля drivers/media/test-drivers/v… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01406 | Уязвимость функции parse_durable_handle_context() модуля fs/smb/server/smb2pdu.c поддержк… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01405 | Уязвимость функции veth_pool_store() модуля drivers/net/ethernet/ibm/ibmveth.c драйвера п… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01404 | Уязвимость функции v9fs_vfs_mkdir_dotl() модуля fs/9p/vfs_inode_dotl.c файловой системы я… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01403 | Уязвимость функции get_pat_info() модуля arch/x86/mm/pat/memtype.c платформы x86 ядра опе… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01402 | Уязвимость функции old_deviceless() модуля net/bridge/br_ioctl.c реализации сетевых функц… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01401 | Уязвимость функции ath12k_dp_mon_rx_parse_status_tlv() модуля drivers/net/wireless/ath/at… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01400 | Уязвимость функции hibernate_compressor_param_set() модуля kernel/power/hibernate.c ядра … | 08.02.2026 | 08.02.2026 |
| bdu:2026-01399 | Уязвимость функции dwc_pcie_register_dev() модуля drivers/perf/dwc_pcie_pmu.c драйвера по… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01398 | Уязвимость функции xgene_hwmon_probe() модуля drivers/hwmon/xgene-hwmon.c драйвера монито… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01397 | Уязвимость функции gfs2_dinode_in() модуля fs/gfs2/dir.c файловой системы GFS2 ядра опера… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01396 | Уязвимость функций hfs_find_init() (fs/hfs/bfind.c) и hfs_btree_open() (fs/hfs/btree.c) ф… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01395 | Уязвимость функции tpm2_init_space() модуля drivers/char/tpm/tpm2-space.c драйвера поддер… | 08.02.2026 | 08.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200106-0170 | Buffer overflow in ntpd ntp daemon 4.0.99k and earlier (aka xntpd and xntp3) allows remot… | 2024-07-23T21:52:30.595000Z |
| var-201403-0508 | The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.… | 2024-07-23T21:52:28.560000Z |
| var-202205-1319 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:52:24.897000Z |
| var-201804-1186 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T21:52:24.271000Z |
| var-201102-0095 | Google Chrome before 9.0.597.94 does not properly perform event handling for animations, … | 2024-07-23T21:52:24.603000Z |
| var-200107-0019 | Cisco routers and switches running IOS 12.0 through 12.2.1 allows a remote attacker to ca… | 2024-07-23T21:51:49.898000Z |
| var-202002-1480 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:51:05.518000Z |
| var-201503-0389 | The build_tablename function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP th… | 2024-07-23T21:51:05.137000Z |
| var-202109-1805 | Malformed requests may cause the server to dereference a NULL pointer. This issue affects… | 2024-07-23T21:51:04.963000Z |
| var-201803-0086 | LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) … | 2024-07-23T21:51:04.545000Z |
| var-202206-1186 | Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may all… | 2024-07-23T21:51:00.840000Z |
| var-201912-1853 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:50:27.591000Z |
| var-201912-0123 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:50:27.004000Z |
| var-201904-0756 | A memory corruption issue was addressed with improved memory handling. This issue affecte… | 2024-07-23T21:50:26.406000Z |
| var-200907-0717 | WebKit in Apple Safari before 4.0.2, as used on iPhone OS before 3.1, iPhone OS before 3.… | 2024-07-23T21:50:25.062000Z |
| var-202205-1304 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:50:24.904000Z |
| var-200810-0142 | The Postfix configuration file in Mac OS X 10.5.5 causes Postfix to be network-accessible… | 2024-07-23T21:50:24.464000Z |
| var-201107-0125 | The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, a… | 2024-07-23T21:50:23.993000Z |
| var-202006-1651 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 a… | 2024-07-23T21:50:22.831000Z |
| var-200809-0008 | Finder in Apple Mac OS X 10.5 through 10.5.4 does not properly update permission data in … | 2024-07-23T21:50:10.607000Z |
| var-201203-0191 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2024-07-23T21:50:08.937000Z |
| var-201206-0064 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:49:37.613000Z |
| var-202004-2202 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T21:49:25.052000Z |
| var-202207-1485 | An out-of-bounds write issue was addressed with improved input validation. This issue is … | 2024-07-23T21:49:20.877000Z |
| var-201007-0321 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 thro… | 2024-07-23T21:49:20.293000Z |
| var-201803-0099 | The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, whic… | 2024-07-23T21:49:16.122000Z |
| var-200505-0359 | Apple Terminal 1.4.4 allows attackers to execute arbitrary commands via terminal escape s… | 2024-07-23T21:49:11.998000Z |
| var-202003-1782 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:48:40.941000Z |
| var-201806-1486 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T21:48:39.044000Z |
| var-200705-0670 | The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.1… | 2024-07-23T21:48:39.239000Z |