Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43320 |
N/A
|
drm/amd/display: Fix dsc eDP issue |
Linux |
Linux |
2026-05-08T13:26:14.930Z | 2026-05-09T04:10:34.972Z |
| CVE-2026-43319 |
N/A
|
spi: spidev: fix lock inversion between spi_lock and b… |
Linux |
Linux |
2026-05-08T13:26:14.231Z | 2026-05-09T04:10:33.132Z |
| CVE-2026-43318 |
N/A
|
drm/amdgpu: fix sync handling in amdgpu_dma_buf_move_notify |
Linux |
Linux |
2026-05-08T13:26:13.557Z | 2026-05-08T13:26:13.557Z |
| CVE-2026-43317 |
N/A
|
most: core: fix leak on early registration failure |
Linux |
Linux |
2026-05-08T13:26:12.899Z | 2026-05-08T13:26:12.899Z |
| CVE-2026-43316 |
N/A
|
media: solo6x10: Check for out of bounds chip_id |
Linux |
Linux |
2026-05-08T13:26:12.217Z | 2026-05-09T04:10:31.122Z |
| CVE-2025-71302 |
N/A
|
drm/panthor: fix for dma-fence safe access rules |
Linux |
Linux |
2026-05-08T13:26:11.418Z | 2026-05-09T04:09:53.948Z |
| CVE-2026-44334 |
8.4 (3.1)
|
PraisonAI: Unauthenticated RCE via `tool_override.py` |
MervinPraison |
PraisonAI |
2026-05-08T13:25:32.988Z | 2026-05-08T23:20:28.539Z |
| CVE-2026-41497 |
9.8 (3.1)
|
Incomplete fix for CVE-2026-34935: Command Injection i… |
MervinPraison |
PraisonAI |
2026-05-08T13:23:36.294Z | 2026-05-08T14:47:27.656Z |
| CVE-2026-41496 |
8.1 (3.1)
|
PraisonAI: SQL Injection via unvalidated `table_prefix… |
MervinPraison |
PraisonAI |
2026-05-08T13:19:10.753Z | 2026-05-08T23:18:11.328Z |
| CVE-2026-44126 |
9.2 (4.0)
|
Insecure deserialization |
SEPPmail AG |
Secure Email Gateway |
2026-05-08T13:15:52.032Z | 2026-05-08T14:15:58.887Z |
| CVE-2025-71301 |
N/A
|
drm/tests: shmem: Hold reservation lock around vmap/vunmap |
Linux |
Linux |
2026-05-08T13:15:22.100Z | 2026-05-08T13:15:22.100Z |
| CVE-2025-71300 |
N/A
|
Revert "arm64: zynqmp: Add an OP-TEE node to the devic… |
Linux |
Linux |
2026-05-08T13:15:21.406Z | 2026-05-08T13:15:21.406Z |
| CVE-2026-44125 |
9.3 (4.0)
|
Missing Authorization in GINAv2 |
SEPPmail AG |
Secure Email Gateway |
2026-05-08T13:15:07.947Z | 2026-05-08T21:27:29.024Z |
| CVE-2026-44129 |
8.3 (4.0)
|
Server-side template injection |
SEPPmail AG |
Secure Email Gateway |
2026-05-08T13:14:36.616Z | 2026-05-08T21:27:35.239Z |
| CVE-2026-41493 |
6.9 (4.0)
|
yard: Possible arbitrary path traversal and file acces… |
lsegal |
yard |
2026-05-08T13:13:49.232Z | 2026-05-08T21:27:41.408Z |
| CVE-2026-44128 |
9.3 (4.0)
|
Unauthenticated Remote Code Execution |
SEPPmail AG |
Secure Email Gateway |
2026-05-08T13:13:46.034Z | 2026-05-08T21:27:48.160Z |
| CVE-2026-44127 |
8.8 (4.0)
|
Local File Inclusion (LFI) and Arbitrary File Deletion |
SEPPmail AG |
Secure Email Gateway |
2026-05-08T13:13:05.667Z | 2026-05-08T21:27:54.210Z |
| CVE-2026-7864 |
6.9 (4.0)
|
Exposure of Sensitive Information to an Unauthorized Actor |
SEPPmail AG |
Secure Email Gateway |
2026-05-08T13:12:17.617Z | 2026-05-08T21:28:00.437Z |
| CVE-2026-43315 |
N/A
|
KVM: nSVM: Remove a user-triggerable WARN on nested_sv… |
Linux |
Linux |
2026-05-08T13:11:31.784Z | 2026-05-08T13:11:31.784Z |
| CVE-2026-43314 |
N/A
|
dm: remove fake timeout to avoid leak request |
Linux |
Linux |
2026-05-08T13:11:31.068Z | 2026-05-09T04:10:29.266Z |
| CVE-2026-43313 |
N/A
|
ACPI: processor: Fix NULL-pointer dereference in acpi_… |
Linux |
Linux |
2026-05-08T13:11:30.386Z | 2026-05-09T04:10:27.388Z |
| CVE-2026-43312 |
N/A
|
media: i2c: ov5647: Initialize subdev before controls |
Linux |
Linux |
2026-05-08T13:11:29.719Z | 2026-05-08T13:11:29.719Z |
| CVE-2026-43311 |
N/A
|
soc/tegra: pmc: Fix unsafe generic_handle_irq() call |
Linux |
Linux |
2026-05-08T13:11:29.068Z | 2026-05-09T04:10:25.725Z |
| CVE-2026-43310 |
N/A
|
media: verisilicon: Avoid G2 bus error while decoding … |
Linux |
Linux |
2026-05-08T13:11:28.372Z | 2026-05-08T13:11:28.372Z |
| CVE-2026-43309 |
N/A
|
md raid: fix hang when stopping arrays with metadata t… |
Linux |
Linux |
2026-05-08T13:11:27.595Z | 2026-05-09T04:10:23.875Z |
| CVE-2026-43308 |
N/A
|
btrfs: don't BUG() on unexpected delayed ref type in r… |
Linux |
Linux |
2026-05-08T13:11:26.937Z | 2026-05-09T04:10:21.987Z |
| CVE-2026-43307 |
N/A
|
iio: accel: adxl380: Avoid reading more entries than p… |
Linux |
Linux |
2026-05-08T13:11:26.295Z | 2026-05-08T13:11:26.295Z |
| CVE-2026-43306 |
N/A
|
bpf: crypto: Use the correct destructor kfunc type |
Linux |
Linux |
2026-05-08T13:11:25.624Z | 2026-05-09T04:10:20.515Z |
| CVE-2026-43305 |
N/A
|
drm/amd/display: Fix mismatched unlock for DMUB HW loc… |
Linux |
Linux |
2026-05-08T13:11:24.952Z | 2026-05-09T04:10:18.834Z |
| CVE-2026-43304 |
N/A
|
libceph: define and enforce CEPH_MAX_KEY_LEN |
Linux |
Linux |
2026-05-08T13:11:24.264Z | 2026-05-09T04:10:17.378Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43328 |
N/A
|
cpufreq: governor: fix double free in cpufreq_dbs_gove… |
Linux |
Linux |
2026-05-08T13:31:16.787Z | 2026-05-08T13:31:16.787Z |
| CVE-2026-43327 |
N/A
|
USB: dummy-hcd: Fix locking/synchronization error |
Linux |
Linux |
2026-05-08T13:31:12.896Z | 2026-05-08T13:31:12.896Z |
| CVE-2026-43326 |
N/A
|
sched_ext: Fix SCX_KICK_WAIT deadlock by deferring wai… |
Linux |
Linux |
2026-05-08T13:31:10.184Z | 2026-05-08T13:31:10.184Z |
| CVE-2026-43325 |
N/A
|
wifi: iwlwifi: mvm: don't send a 6E related command wh… |
Linux |
Linux |
2026-05-08T13:31:09.536Z | 2026-05-08T13:31:09.536Z |
| CVE-2026-43324 |
N/A
|
USB: dummy-hcd: Fix interrupt synchronization error |
Linux |
Linux |
2026-05-08T13:31:08.850Z | 2026-05-08T13:31:08.850Z |
| CVE-2026-43323 |
N/A
|
sched/fair: Fix zero_vruntime tracking fix |
Linux |
Linux |
2026-05-08T13:31:08.188Z | 2026-05-08T13:31:08.188Z |
| CVE-2026-43322 |
N/A
|
Bluetooth: hci_sync: Fix UAF in le_read_features_complete |
Linux |
Linux |
2026-05-08T13:31:07.436Z | 2026-05-08T13:31:07.436Z |
| CVE-2026-43321 |
N/A
|
bpf: Properly mark live registers for indirect jumps |
Linux |
Linux |
2026-05-08T13:26:15.600Z | 2026-05-09T04:10:36.698Z |
| CVE-2026-43320 |
N/A
|
drm/amd/display: Fix dsc eDP issue |
Linux |
Linux |
2026-05-08T13:26:14.930Z | 2026-05-09T04:10:34.972Z |
| CVE-2026-43319 |
N/A
|
spi: spidev: fix lock inversion between spi_lock and b… |
Linux |
Linux |
2026-05-08T13:26:14.231Z | 2026-05-09T04:10:33.132Z |
| CVE-2026-43318 |
N/A
|
drm/amdgpu: fix sync handling in amdgpu_dma_buf_move_notify |
Linux |
Linux |
2026-05-08T13:26:13.557Z | 2026-05-08T13:26:13.557Z |
| CVE-2026-43317 |
N/A
|
most: core: fix leak on early registration failure |
Linux |
Linux |
2026-05-08T13:26:12.899Z | 2026-05-08T13:26:12.899Z |
| CVE-2026-43316 |
N/A
|
media: solo6x10: Check for out of bounds chip_id |
Linux |
Linux |
2026-05-08T13:26:12.217Z | 2026-05-09T04:10:31.122Z |
| CVE-2026-43315 |
N/A
|
KVM: nSVM: Remove a user-triggerable WARN on nested_sv… |
Linux |
Linux |
2026-05-08T13:11:31.784Z | 2026-05-08T13:11:31.784Z |
| CVE-2026-43314 |
N/A
|
dm: remove fake timeout to avoid leak request |
Linux |
Linux |
2026-05-08T13:11:31.068Z | 2026-05-09T04:10:29.266Z |
| CVE-2026-43313 |
N/A
|
ACPI: processor: Fix NULL-pointer dereference in acpi_… |
Linux |
Linux |
2026-05-08T13:11:30.386Z | 2026-05-09T04:10:27.388Z |
| CVE-2026-43312 |
N/A
|
media: i2c: ov5647: Initialize subdev before controls |
Linux |
Linux |
2026-05-08T13:11:29.719Z | 2026-05-08T13:11:29.719Z |
| CVE-2026-43311 |
N/A
|
soc/tegra: pmc: Fix unsafe generic_handle_irq() call |
Linux |
Linux |
2026-05-08T13:11:29.068Z | 2026-05-09T04:10:25.725Z |
| CVE-2026-43310 |
N/A
|
media: verisilicon: Avoid G2 bus error while decoding … |
Linux |
Linux |
2026-05-08T13:11:28.372Z | 2026-05-08T13:11:28.372Z |
| CVE-2026-43309 |
N/A
|
md raid: fix hang when stopping arrays with metadata t… |
Linux |
Linux |
2026-05-08T13:11:27.595Z | 2026-05-09T04:10:23.875Z |
| CVE-2026-43308 |
N/A
|
btrfs: don't BUG() on unexpected delayed ref type in r… |
Linux |
Linux |
2026-05-08T13:11:26.937Z | 2026-05-09T04:10:21.987Z |
| CVE-2026-43307 |
N/A
|
iio: accel: adxl380: Avoid reading more entries than p… |
Linux |
Linux |
2026-05-08T13:11:26.295Z | 2026-05-08T13:11:26.295Z |
| CVE-2026-43306 |
N/A
|
bpf: crypto: Use the correct destructor kfunc type |
Linux |
Linux |
2026-05-08T13:11:25.624Z | 2026-05-09T04:10:20.515Z |
| CVE-2026-43305 |
N/A
|
drm/amd/display: Fix mismatched unlock for DMUB HW loc… |
Linux |
Linux |
2026-05-08T13:11:24.952Z | 2026-05-09T04:10:18.834Z |
| CVE-2026-43304 |
N/A
|
libceph: define and enforce CEPH_MAX_KEY_LEN |
Linux |
Linux |
2026-05-08T13:11:24.264Z | 2026-05-09T04:10:17.378Z |
| CVE-2026-43303 |
N/A
|
mm/page_alloc: clear page->private in free_pages_prepare() |
Linux |
Linux |
2026-05-08T13:11:23.561Z | 2026-05-08T13:11:23.561Z |
| CVE-2026-43302 |
N/A
|
drm/v3d: Set DMA segment size to avoid debug warnings |
Linux |
Linux |
2026-05-08T13:11:22.886Z | 2026-05-09T04:10:15.608Z |
| CVE-2026-43301 |
N/A
|
media: chips-media: wave5: Fix PM runtime usage count … |
Linux |
Linux |
2026-05-08T13:11:22.234Z | 2026-05-08T13:11:22.234Z |
| CVE-2026-43300 |
N/A
|
drm/panel: Fix a possible null-pointer dereference in … |
Linux |
Linux |
2026-05-08T13:11:21.530Z | 2026-05-09T04:10:13.854Z |
| CVE-2026-43299 |
N/A
|
btrfs: do not ASSERT() when the fs flips RO inside btr… |
Linux |
Linux |
2026-05-08T13:11:20.872Z | 2026-05-09T04:10:12.261Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-36552 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.700 | 2026-02-13T19:16:31.700 |
| fkie_cve-2025-36545 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.640 | 2026-02-13T19:16:31.640 |
| fkie_cve-2025-36542 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.580 | 2026-02-13T19:16:31.580 |
| fkie_cve-2025-36538 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.520 | 2026-02-13T19:16:31.520 |
| fkie_cve-2025-36534 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.460 | 2026-02-13T19:16:31.460 |
| fkie_cve-2025-36532 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.400 | 2026-02-13T19:16:31.400 |
| fkie_cve-2025-36526 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.343 | 2026-02-13T19:16:31.343 |
| fkie_cve-2025-36524 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.283 | 2026-02-13T19:16:31.283 |
| fkie_cve-2025-36523 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.220 | 2026-02-13T19:16:31.220 |
| fkie_cve-2025-36517 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.160 | 2026-02-13T19:16:31.160 |
| fkie_cve-2025-35997 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.103 | 2026-02-13T19:16:31.103 |
| fkie_cve-2025-35993 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.043 | 2026-02-13T19:16:31.043 |
| fkie_cve-2025-35976 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.980 | 2026-02-13T19:16:30.980 |
| fkie_cve-2025-35962 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.920 | 2026-02-13T19:16:30.920 |
| fkie_cve-2025-35961 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.863 | 2026-02-13T19:16:30.863 |
| fkie_cve-2025-35960 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.800 | 2026-02-13T19:16:30.800 |
| fkie_cve-2025-32734 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.447 | 2026-02-13T19:16:30.447 |
| fkie_cve-2025-32733 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.387 | 2026-02-13T19:16:30.387 |
| fkie_cve-2025-32090 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.330 | 2026-02-13T19:16:30.330 |
| fkie_cve-2025-32085 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.270 | 2026-02-13T19:16:30.270 |
| fkie_cve-2025-32082 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.213 | 2026-02-13T19:16:30.213 |
| fkie_cve-2025-32009 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.157 | 2026-02-13T19:16:30.157 |
| fkie_cve-2025-31942 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.093 | 2026-02-13T19:16:30.093 |
| fkie_cve-2025-31364 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.033 | 2026-02-13T19:16:30.033 |
| fkie_cve-2025-31358 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.877 | 2026-02-13T19:16:29.877 |
| fkie_cve-2025-31145 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.810 | 2026-02-13T19:16:29.810 |
| fkie_cve-2025-30517 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.747 | 2026-02-13T19:16:29.747 |
| fkie_cve-2025-29869 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.563 | 2026-02-13T19:16:29.563 |
| fkie_cve-2025-27941 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.500 | 2026-02-13T19:16:29.500 |
| fkie_cve-2025-27928 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.443 | 2026-02-13T19:16:29.443 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-3vvp-54wc-f6jr |
|
In the Linux kernel, the following vulnerability has been resolved: sched_ext: Fix SCX_KICK_WAIT d… | 2026-05-08T15:31:23Z | 2026-05-08T15:31:23Z |
| ghsa-2cxw-35rj-wxq7 |
|
In the Linux kernel, the following vulnerability has been resolved: bpf: reject direct access to n… | 2026-05-08T15:31:23Z | 2026-05-08T15:31:23Z |
| ghsa-w6qp-j494-g32c |
|
In the Linux kernel, the following vulnerability has been resolved: mm/vmalloc: prevent RCU stalls… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-w25g-q69r-fvpq |
|
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Return queued… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-vqpv-2jr8-2hmp |
|
In the Linux kernel, the following vulnerability has been resolved: drm/panel: Fix a possible null… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-v89v-4458-f6hp |
|
In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Set DMA segment size … | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-v7w4-33p2-qjcr |
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: do not ASSERT() when th… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-v56g-44rc-67wq |
|
In the Linux kernel, the following vulnerability has been resolved: md raid: fix hang when stoppin… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:23Z |
| ghsa-v2vh-p96v-7cc2 |
|
In the Linux kernel, the following vulnerability has been resolved: mm/slab: do not access current… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-r3q8-xm3r-6v78 |
|
In the Linux kernel, the following vulnerability has been resolved: net: nfc: nci: Fix parameter v… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-q637-vrq8-p3jv |
|
In the Linux kernel, the following vulnerability has been resolved: bpf: crypto: Use the correct d… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-q3cr-463h-3mvv |
|
In the Linux kernel, the following vulnerability has been resolved: iio: accel: adxl380: Avoid rea… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-mjx9-cr34-jhff |
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: don't BUG() on unexpect… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-jr3h-fqrg-28f2 |
|
In the Linux kernel, the following vulnerability has been resolved: media: chips-media: wave5: Fix… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-hx9m-6f9p-cjmr |
|
In the Linux kernel, the following vulnerability has been resolved: drm: renesas: rz-du: mipi_dsi:… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-h57h-m4cv-vwxg |
|
In the Linux kernel, the following vulnerability has been resolved: ext4: move ext4_percpu_param_i… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-h4fr-xr6m-wwp8 |
|
In the Linux kernel, the following vulnerability has been resolved: libceph: define and enforce CE… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-ghpp-gwgc-8pq9 |
|
In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: restore failed glo… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-g77g-v33m-x9rh |
|
In the Linux kernel, the following vulnerability has been resolved: media: chips-media: wave5: Fix… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-g272-h9j2-8655 |
|
In the Linux kernel, the following vulnerability has been resolved: drm: Account property blob all… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-f32h-8q3x-fpmq |
|
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Skip vcn poison ir… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-99gr-cw2x-89qp |
|
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix mismatche… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-7rmq-9hg9-v4q5 |
|
In the Linux kernel, the following vulnerability has been resolved: octeontx2-af: Workaround SQM/P… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-74vx-jmcf-f65x |
|
In the Linux kernel, the following vulnerability has been resolved: media: rockchip: rga: Fix poss… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-6g88-27p6-cw4p |
|
In the Linux kernel, the following vulnerability has been resolved: media: verisilicon: Avoid G2 b… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-6fh9-96ww-pvwq |
|
In the Linux kernel, the following vulnerability has been resolved: mm/page_alloc: clear page->pri… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-48jm-q77p-w8gv |
|
In the Linux kernel, the following vulnerability has been resolved: rapidio: replace rio_free_net(… | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-3xcp-xr96-v535 |
|
In the Linux kernel, the following vulnerability has been resolved: kexec: derive purgatory entry … | 2026-05-08T15:31:22Z | 2026-05-08T15:31:22Z |
| ghsa-x349-38c9-g449 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/panthor: fix for dma-fence… | 2026-05-08T15:31:21Z | 2026-05-08T15:31:21Z |
| ghsa-wcrj-2m2g-27wm |
|
In the Linux kernel, the following vulnerability has been resolved: spi: cadence-quadspi: Parse DT… | 2026-05-08T15:31:21Z | 2026-05-08T15:31:21Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-287 |
4.3 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-12-22T17:15:00+00:00 | 2024-11-21T14:22:55.764934+00:00 |
| pysec-2023-267 |
6.5 (3.1)
|
Apache Airflow, versions before 2.8.0, is affected by a vulnerability that allows an auth… | apache-airflow | 2023-12-21T10:15:00+00:00 | 2024-11-21T14:22:40.744438+00:00 |
| pysec-2023-266 |
6.5 (3.1)
|
Apache Airflow, version 2.7.0 through 2.7.3, has a vulnerability that allows an attacker … | apache-airflow | 2023-12-21T10:15:00+00:00 | 2024-11-21T14:22:40.683792+00:00 |
| pysec-2023-265 |
4.3 (3.1)
|
Apache Airflow, in versions prior to 2.8.0, contains a security vulnerability that allows… | apache-airflow | 2023-12-21T10:15:00+00:00 | 2024-11-21T14:22:40.621314+00:00 |
| pysec-2023-264 |
5.4 (3.1)
|
Apache Airflow, versions 2.6.0 through 2.7.3 has a stored XSS vulnerability that allows a… | apache-airflow | 2023-12-21T10:15:00+00:00 | 2024-11-21T14:22:40.559945+00:00 |
| pysec-2023-301 |
7.8 (3.1)
|
Deserialization of Untrusted Data in GitHub repository huggingface/transformers prior to 4.36. | transformers | 2023-12-20T17:15:00+00:00 | 2024-11-21T14:23:01.933055+00:00 |
| pysec-2023-300 |
8.8 (3.1)
|
Deserialization of Untrusted Data in GitHub repository huggingface/transformers prior to 4.36. | transformers | 2023-12-19T13:15:00+00:00 | 2024-11-21T14:23:01.871022+00:00 |
| pysec-2023-252 |
7.5 (3.1)
|
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-18T04:15:00+00:00 | 2024-02-06T22:20:23.832000+00:00 |
| pysec-2023-253 |
8.1 (3.1)
|
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-15T01:15:00+00:00 | 2024-02-14T00:26:12.242703+00:00 |
| pysec-2023-255 |
8.1 (3.1)
|
Command Injection in GitHub repository gradio-app/gradio prior to main. | gradio | 2023-12-14T14:15:00+00:00 | 2024-02-28T16:22:37.359017+00:00 |
| pysec-2023-307 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). Contr… | vyper | 2023-12-13T20:15:00+00:00 | 2024-11-21T14:23:02.808922+00:00 |
| pysec-2023-297 |
7.5 (3.1)
|
A path traversal vulnerability has been detected in Repox, which allows an attacker to re… | repox | 2023-12-13T10:15:00Z | 2024-11-21T14:23:00.892241Z |
| pysec-2023-296 |
7.5 (3.1)
|
An XEE vulnerability has been found in Repox, which allows a remote attacker to interfere… | repox | 2023-12-13T10:15:00Z | 2024-11-21T14:23:00.841929Z |
| pysec-2023-295 |
5.4 (3.1)
|
An XSS vulnerability stored in Repox has been identified, which allows a local attacker t… | repox | 2023-12-13T10:15:00Z | 2024-11-21T14:23:00.792103Z |
| pysec-2023-294 |
6.1 (3.1)
|
An XSS vulnerability has been detected in Repox, which allows an attacker to compromise i… | repox | 2023-12-13T10:15:00Z | 2024-11-21T14:23:00.74018Z |
| pysec-2023-293 |
7.5 (3.1)
|
An authentication bypass vulnerability has been found in Repox, which allows a remote use… | repox | 2023-12-13T09:15:00Z | 2024-11-21T14:23:00.689595Z |
| pysec-2023-309 |
8.8 (3.1)
|
Path Traversal in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-13T00:15:07+00:00 | 2025-04-09T17:27:26.271200+00:00 |
| pysec-2023-286 |
5.3 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-12-12T23:15:00+00:00 | 2024-11-21T14:22:55.664554+00:00 |
| pysec-2023-262 |
9.8 (3.1)
|
main.py in Searchor before 2.4.2 uses eval on CLI input, which may cause unexpected code … | searchor | 2023-12-12T18:15:00+00:00 | 2024-10-09T19:20:24.594458+00:00 |
| pysec-2023-281 |
8.8 (3.1)
|
Improper Neutralization of Special Elements Used in a Template Engine in GitHub repositor… | mlflow | 2023-12-12T04:15:00+00:00 | 2024-11-21T14:22:54.938745+00:00 |
| pysec-2023-261 |
9.8 (3.1)
|
SAP BTP Security Services Integration Library ([Python] sap-xssec) - versions < 4.1.0, al… | sap-xssec | 2023-12-12T02:15:00+00:00 | 2024-09-29T00:37:11.092461+00:00 |
| pysec-2023-278 |
5.3 (3.1)
|
MindsDB connects artificial intelligence models to real time data. Versions prior to 23.1… | mindsdb | 2023-12-11T21:15:00Z | 2026-04-23T07:43:20.300009Z |
| pysec-2023-277 |
5.3 (3.1)
|
MindsDB connects artificial intelligence models to real time data. Versions prior to 23.1… | mindsdb | 2023-12-11T19:15:00+00:00 | 2024-11-21T14:22:54.391272+00:00 |
| pysec-2023-292 |
7.8 (3.1)
|
PyInstaller bundles a Python application and all its dependencies into a single package. … | pyinstaller | 2023-12-09T01:15:00+00:00 | 2024-11-21T14:22:59.796437+00:00 |
| pysec-2023-260 |
6.1 (3.1)
|
A reflected Cross-Site Scripting (XSS) vulnerability exists in the mlflow/mlflow reposito… | mlflow | 2023-12-07T05:15:00+00:00 | 2024-04-16T15:20:55.191003+00:00 |
| pysec-2023-291 |
7.8 (3.1)
|
PyDrive2 is a wrapper library of google-api-python-client that simplifies many common Goo… | pydrive2 | 2023-12-05T21:15:00+00:00 | 2024-11-21T14:22:59.681617+00:00 |
| pysec-2023-272 |
4.3 (3.1)
|
The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints… | jupyter-server | 2023-12-04T21:15:00+00:00 | 2024-11-21T14:22:52.227754+00:00 |
| pysec-2023-250 |
5.3 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper … | aiohttp | 2023-11-30T07:15:00+00:00 | 2024-01-29T16:22:26.409794+00:00 |
| pysec-2023-251 |
5.3 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper … | aiohttp | 2023-11-29T20:15:00+00:00 | 2024-01-29T16:22:26.513672+00:00 |
| pysec-2023-254 |
7.5 (3.1)
|
cryptography is a package designed to expose cryptographic primitives and recipes to Pyth… | cryptography | 2023-11-29T19:15:00+00:00 | 2024-02-17T07:18:27.688636+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-3049 | Malicious code in classlink (npm) | 2026-04-26T17:10:32Z | 2026-04-30T22:25:09Z |
| mal-2026-3050 | Malicious code in robase-fast-install (PyPI) | 2026-04-26T16:51:54Z | 2026-05-03T20:49:49Z |
| mal-2026-3048 | Malicious code in robase-gui-api (PyPI) | 2026-04-26T16:29:00Z | 2026-05-03T20:49:49Z |
| mal-2026-3047 | Malicious code in robase-gui (PyPI) | 2026-04-26T15:49:13Z | 2026-05-03T20:49:49Z |
| mal-2026-3080 | Malicious code in frank-bot-gogle-cloning (npm) | 2026-04-26T15:17:51Z | 2026-04-30T22:25:09Z |
| mal-2026-3046 | Malicious code in swisscom-ai-research-keyphrase (PyPI) | 2026-04-26T13:13:19Z | 2026-04-26T13:13:19Z |
| mal-2026-3070 | Malicious code in @tw-marionette/clipboard (npm) | 2026-04-26T12:49:53Z | 2026-05-04T03:25:18Z |
| mal-2026-3066 | Malicious code in @ozon-complt/antibot-handler (npm) | 2026-04-26T12:49:53Z | 2026-05-04T03:25:18Z |
| mal-2026-3067 | Malicious code in @ozon-complt/split (npm) | 2026-04-26T12:39:46Z | 2026-05-04T03:25:18Z |
| mal-2026-3045 | Malicious code in quicktestybesty (PyPI) | 2026-04-26T01:09:46Z | 2026-05-03T20:49:49Z |
| mal-2026-3044 | Malicious code in quicksolving (PyPI) | 2026-04-25T20:27:13Z | 2026-05-03T20:49:49Z |
| mal-2026-3043 | Malicious code in rosolver (PyPI) | 2026-04-25T19:52:51Z | 2026-05-03T20:49:49Z |
| mal-2026-3042 | Malicious code in pycolorlib001 (PyPI) | 2026-04-25T19:20:50Z | 2026-05-03T20:49:49Z |
| mal-2026-3041 | Malicious code in robase-library-quick-install (PyPI) | 2026-04-25T19:00:53Z | 2026-05-03T20:49:49Z |
| mal-2026-3053 | Malicious code in @apple-pay-trust/merchant-session (npm) | 2026-04-25T18:16:00Z | 2026-05-04T03:25:18Z |
| mal-2026-3062 | Malicious code in @google-pay-trust/cancelled (npm) | 2026-04-25T18:15:50Z | 2026-05-04T03:25:18Z |
| mal-2026-3061 | Malicious code in @google-pay-trust/authorize-payment (npm) | 2026-04-25T18:06:02Z | 2026-05-04T03:25:18Z |
| mal-2026-3054 | Malicious code in @apple-pay-trust/start (npm) | 2026-04-25T18:05:52Z | 2026-05-04T03:25:18Z |
| mal-2026-3064 | Malicious code in @google-pay-trust/init-google-pay (npm) | 2026-04-25T18:05:43Z | 2026-05-04T03:25:18Z |
| mal-2026-3063 | Malicious code in @google-pay-trust/finish (npm) | 2026-04-25T18:05:42Z | 2026-05-04T03:25:18Z |
| mal-2026-3055 | Malicious code in @apple-pay-trust/validate-merchant (npm) | 2026-04-25T18:05:42Z | 2026-05-04T03:25:18Z |
| mal-2026-3040 | Malicious code in apollo-vertex (npm) | 2026-04-25T17:55:54Z | 2026-04-30T22:25:08Z |
| mal-2026-3038 | Malicious code in apollo-landing (npm) | 2026-04-25T17:35:48Z | 2026-04-30T22:25:08Z |
| mal-2026-3039 | Malicious code in process-app-task (npm) | 2026-04-25T17:35:42Z | 2026-04-30T22:25:12Z |
| mal-2026-3072 | Malicious code in @tw-models/storage (npm) | 2026-04-25T17:25:59Z | 2026-05-04T03:25:18Z |
| mal-2026-3071 | Malicious code in @tw-marionette/input (npm) | 2026-04-25T17:17:50Z | 2026-05-04T03:25:18Z |
| mal-2026-3073 | Malicious code in @tw-utils/static (npm) | 2026-04-25T17:15:57Z | 2026-05-04T03:25:18Z |
| mal-2026-3037 | Malicious code in standalone-apps (npm) | 2026-04-25T16:50:50Z | 2026-04-30T22:25:12Z |
| mal-2026-3036 | Malicious code in uipath-ui-widgets (npm) | 2026-04-25T16:20:53Z | 2026-04-30T22:25:13Z |
| mal-2026-3082 | Malicious code in kl-b2c-ui-kit (npm) | 2026-04-25T15:53:07Z | 2026-05-04T03:25:21Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0047 | CoreDNS: Schwachstelle ermöglicht Denial of Service | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0044 | libtasn1: Schwachstelle ermöglicht Denial of Service | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0043 | Trend Micro Apex Central: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0041 | Cisco Firewall Threat Defense, IOS XE und Meraki MX: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0040 | n8n: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0037 | GitLab CE und EE: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2026-0036 | OpenLDAP: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0035 | MediaWiki Erweiterungen: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2026-0034 | Keycloak: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-01-07T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2026-0030 | cURL: Mehrere Schwachstellen | 2026-01-06T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0026 | HCL BigFix: Mehrere Schwachstellen | 2026-01-06T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2026-0020 | Google Chrome/Microsoft Edge: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-01-06T23:00:00.000+00:00 | 2026-01-11T23:00:00.000+00:00 |
| wid-sec-w-2026-0019 | Red Hat Enterprise Linux (Quarkus): Mehrere Schwachstellen | 2026-01-06T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0018 | MailPit: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-06T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0017 | Veeam Backup & Replication: Mehrere Schwachstellen | 2026-01-05T23:00:00.000+00:00 | 2026-01-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0010 | Samsung Exynos: Mehrere Schwachstellen | 2026-01-04T23:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2026-0009 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0008 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2026-01-04T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0006 | OpenCTI: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen, Manipulation von Daten, Denial of Service | 2026-01-04T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0003 | Vaadin: Schwachstelle ermöglicht Cross-Site Scripting | 2026-01-04T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2941 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-30T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2938 | Arista EOS: Schwachstelle ermöglicht Denial of Service | 2025-12-30T23:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2025-2934 | ImageMagick: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-29T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2931 | GIMP: Schwachstelle ermöglicht Codeausführung | 2025-12-29T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2929 | Linux Kernel: Mehrere Schwachstellen | 2025-12-28T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2928 | GnuPG: Mehrere Schwachstellen | 2025-12-28T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2927 | NetApp ActiveIQ Unified Manager: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-28T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2920 | Linux Kernel: Mehrere Schwachstellen | 2025-12-23T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2916 | Net-SNMP: Schwachstelle ermöglicht Codeausführung und DoS | 2025-12-23T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-2915 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-23T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-245-03 | SunPower PVS6 | 2025-09-02T06:00:00.000000Z | 2025-09-02T06:00:00.000000Z |
| icsa-25-245-02 | Fuji Electric FRENIC-Loader 4 | 2025-09-02T06:00:00.000000Z | 2025-09-02T06:00:00.000000Z |
| icsa-25-245-01 | Delta Electronics EIP Builder | 2025-09-02T06:00:00.000000Z | 2025-09-02T06:00:00.000000Z |
| icsa-25-240-06 | GE Vernova CIMPLICITY | 2025-08-28T06:00:00.000000Z | 2025-08-28T06:00:00.000000Z |
| icsa-25-240-05 | Delta Electronics COMMGR | 2025-08-28T06:00:00.000000Z | 2025-08-28T06:00:00.000000Z |
| icsa-25-240-04 | Delta Electronics CNCSoft-G2 | 2025-08-28T06:00:00.000000Z | 2025-08-28T06:00:00.000000Z |
| icsa-25-240-02 | Mitsubishi Electric MELSEC iQ-F Series CPU Module | 2025-08-28T06:00:00.000000Z | 2025-08-28T06:00:00.000000Z |
| icsa-25-240-01 | Mitsubishi Electric MELSEC iQ-F Series CPU Module | 2025-08-28T06:00:00.000000Z | 2025-08-28T06:00:00.000000Z |
| icsa-25-261-05 | Remote Code Execution Vulnerability in Hitachi Energy Service Suite Product | 2025-08-26T09:52:01.000000Z | 2025-08-26T09:52:01.000000Z |
| icsa-25-261-04 | Multiple Open-Source Software Vulnerabilities in Hitachi Energy Asset Suite Product | 2025-08-26T09:22:47.000000Z | 2025-08-26T09:22:00.000000Z |
| icsa-25-238-01 | INVT VT-Designer and HMITool | 2025-08-26T06:00:00.000000Z | 2025-08-26T06:00:00.000000Z |
| va-25-239-01 | Agiloft multiple vulnerabilities | 2025-08-26T00:00:00Z | 2025-08-26T00:00:00Z |
| icsma-25-233-01 | FUJIFILM Healthcare Americas Synapse Mobility | 2025-08-21T06:00:00.000000Z | 2025-08-21T06:00:00.000000Z |
| icsa-25-233-01 | Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module (Update A) | 2025-08-21T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-226-31 | Rockwell Automation 1756-EN4TR, 1756-EN4TRXT (Update B) | 2025-08-14T06:00:00.000000Z | 2025-10-07T06:00:00.000000Z |
| icsa-25-226-30 | Rockwell Automation FactoryTalk Action Manager | 2025-08-14T06:00:00.000000Z | 2025-08-15T06:00:00.000000Z |
| icsa-25-226-29 | Rockwell Automation Studio 5000 Logix Designer | 2025-08-14T06:00:00.000000Z | 2025-08-14T06:00:00.000000Z |
| icsa-25-226-28 | Rockwell Automation ControlLogix Ethernet Modules | 2025-08-14T06:00:00.000000Z | 2025-08-14T06:00:00.000000Z |
| icsa-25-226-27 | Rockwell Automation ArmorBlock 5000 I/O - Webserver | 2025-08-14T06:00:00.000000Z | 2025-08-14T06:00:00.000000Z |
| icsa-25-226-26 | Rockwell Automation FLEX 5000 I/O (Update A) | 2025-08-14T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-226-25 | Rockwell Automation Micro800 | 2025-08-14T06:00:00.000000Z | 2025-08-14T06:00:00.000000Z |
| icsa-25-226-24 | Rockwell FactoryTalk Linx | 2025-08-14T06:00:00.000000Z | 2025-08-14T06:00:00.000000Z |
| icsa-25-226-23 | Rockwell Automation FactoryTalk Viewpoint | 2025-08-14T06:00:00.000000Z | 2025-08-14T06:00:00.000000Z |
| icsa-25-231-02 | Siemens Mendix SAML Module | 2025-08-14T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-231-01 | Siemens Desigo CC Product Family and SENTRON Powermanager | 2025-08-14T00:00:00.000000Z | 2025-08-14T00:00:00.000000Z |
| icsma-25-224-01 | Santesoft Sante PACS Server | 2025-08-12T06:00:00.000000Z | 2025-08-12T06:00:00.000000Z |
| icsa-25-224-04 | AVEVA PI Integrator | 2025-08-12T06:00:00.000000Z | 2025-08-12T06:00:00.000000Z |
| icsa-25-224-02 | Johnson Controls iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra G2, iSTAR Ultra G2 SE, iSTAR Edge G2 (Update A) | 2025-08-12T06:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-25-224-01 | Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, Cobalt Share | 2025-08-12T06:00:00.000000Z | 2025-08-12T06:00:00.000000Z |
| icsa-25-266-03 | Schneider Electric SESU | 2025-08-12T04:00:00.000000Z | 2025-09-09T04:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ndfc-raci-t46k3jnn | Cisco Nexus Dashboard Fabric Controller REST API Command Injection Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndfc-ptrce-bushlbp | Cisco Nexus Dashboard Fabric Controller Remote Code Execution Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndfc-cmdinj-uvyzrkfr | Cisco Nexus Dashboard Fabric Controller Arbitrary Command Execution Vulnerability | 2024-10-02T16:00:00+00:00 | 2026-03-31T18:47:53+00:00 |
| cisco-sa-ndfc-cidv-xvyx2wlj | Cisco Nexus Dashboard Fabric Controller Configuration Backup Information Disclosure Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-meraki-mx-vpn-dos-qtrhzg2 | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Denial of Service Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:28+00:00 |
| cisco-sa-meraki-mx-vpn-dos-by-qwukqv7x | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Session Takeover and Denial of Service Vulnerability | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:27+00:00 |
| cisco-sa-ise-info-disc-zyf2neex | Cisco Identity Services Engine Information Disclosure Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-expw-escalation-3bkz77bd | Cisco Expressway Series Privilege Escalation Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-cimc-redfish-cominj-sbkv5zz | Cisco UCS B-Series, Managed C-Series, and X-Series Servers Redfish API Command Injection Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-webui-csrf-ycuyxkko | Cisco IOS XE Software Web UI Cross-Site Request Forgery Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-vlan-dos-27pur5rt | Cisco Catalyst 9000 Series Switches Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-10-04T21:53:25+00:00 |
| cisco-sa-utd-snort3-dos-bypas-b4ouewxd | Cisco Unified Threat Defense Snort Intrusion Prevention System Engine for Cisco IOS XE Software Security Policy Bypass and Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-sdwan-xss-zq4kpvyd | Cisco Catalyst SD-WAN Manager Cross-Site Scripting Vulnerability | 2024-09-25T16:00:00+00:00 | 2025-03-28T18:38:53+00:00 |
| cisco-sa-sdwan-utd-dos-hdatqxs | Cisco Catalyst SD-WAN Routers Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-sdw-vedos-kqffhps3 | Cisco SD-WAN vEdge Software UDP Packet Validation Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-rsvp-dos-oypvgvzf | Cisco IOS and IOS XE Software Resource Reservation Protocol Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-repacl-9exgnbpd | Cisco IOS Software on Cisco Industrial Ethernet Series Switches Access Control List Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-pim-apbvfysj | Cisco IOS XE Software Protocol Independent Multicast Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-xe-sda-edge-dos-mbcbg9k | Cisco IOS XE Software SD-Access Fabric Edge Node Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-webui-hfwnrgk | Cisco IOS and IOS XE Software Web UI Cross-Site Request Forgery Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-httpsrvr-dos-yozthut | Cisco IOS XE Software HTTP Server Telephony Services Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-dnac-ssh-e4uodasj | Cisco Catalyst Center Static SSH Host Key Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-cpp-vfr-dos-nhhkggo | Cisco IOS XE Software IPv4 Fragmentation Reassembly Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-c9800-cwa-acl-npsbhsna | Cisco IOS XE Software for Wireless Controllers CWA Pre-Authentication ACL Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-pak-mem-exhst-3ke9fefy | Cisco IOS XR Software UDP Packet Memory Exhaustion Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-nso-auth-bypass-qnteesp | Multiple Cisco Products Web-Based Management Interface Privilege Escalation Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-25T13:05:54+00:00 |
| cisco-sa-l2services-2mvhdnuc | Cisco IOS XR Software Network Convergence System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-isis-xehpbvne | Cisco IOS XR Software Segment Routing for Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-xml-tcpdos-zexvru2s | Cisco IOS XR Software Dedicated XML Agent TCP Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-shellutil-hcb278wd | Cisco IOS XR Software CLI Arbitrary File Read Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-6100 | Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure | 2026-04-02T00:00:00.000Z | 2026-04-20T14:39:35.000Z |
| msrc_cve-2026-6019 | BaseCookie.js_output() does not neutralize embedded characters | 2026-04-02T00:00:00.000Z | 2026-04-30T01:55:25.000Z |
| msrc_cve-2026-5958 | Race Condition in GNU Sed | 2026-04-02T00:00:00.000Z | 2026-04-29T14:59:34.000Z |
| msrc_cve-2026-5928 | Static buffer overflow in deprecated nis_local_principal | 2026-04-02T00:00:00.000Z | 2026-04-23T01:01:28.000Z |
| msrc_cve-2026-5778 | Integer underflow leads to out-of-bounds access in sniffer ChaCha decrypt path. | 2026-04-02T00:00:00.000Z | 2026-04-30T01:54:33.000Z |
| msrc_cve-2026-5772 | MatchDomainName 1-Byte Stack Buffer Over-Read in Hostname Validation | 2026-04-02T00:00:00.000Z | 2026-04-30T01:39:09.000Z |
| msrc_cve-2026-5507 | Session Cache Restore — Arbitrary Free via Deserialized Pointer | 2026-04-02T00:00:00.000Z | 2026-04-30T01:53:59.000Z |
| msrc_cve-2026-5504 | PKCS7 CBC Padding Oracle — Plaintext Recovery | 2026-04-02T00:00:00.000Z | 2026-04-30T01:53:50.000Z |
| msrc_cve-2026-5503 | out-of-bounds write in TLSX_EchChangeSNI via attacker-controlled publicName | 2026-04-02T00:00:00.000Z | 2026-04-30T01:54:08.000Z |
| msrc_cve-2026-5501 | Improper Certificate Signature Verification in X.509 Chain Validation Allows Forged Leaf Certificates | 2026-04-02T00:00:00.000Z | 2026-04-15T01:02:42.000Z |
| msrc_cve-2026-5500 | Improper Validation of AES-GCM Authentication Tag Length in PKCS#7 Envelope Allows Authentication Bypass | 2026-04-02T00:00:00.000Z | 2026-04-15T01:02:16.000Z |
| msrc_cve-2026-5479 | wolfSSL EVP ChaCha20-Poly1305 AEAD authentication tag | 2026-04-02T00:00:00.000Z | 2026-04-15T01:03:16.000Z |
| msrc_cve-2026-5477 | Prefix-substitution forgery via integer overflow in wolfCrypt CMAC | 2026-04-02T00:00:00.000Z | 2026-04-15T01:03:08.000Z |
| msrc_cve-2026-5466 | wc_VerifyEccsiHash missing sanity check | 2026-04-02T00:00:00.000Z | 2026-04-15T01:01:59.000Z |
| msrc_cve-2026-5460 | Heap Use-After-Free in PQC Hybrid KeyShare Error Cleanup in wolfSSL TLS 1.3 | 2026-04-02T00:00:00.000Z | 2026-04-30T01:39:29.000Z |
| msrc_cve-2026-5450 | scanf %mc off-by-one heap buffer overflow | 2026-04-02T00:00:00.000Z | 2026-04-25T01:04:16.000Z |
| msrc_cve-2026-5448 | 1-2 Byte Buffer Overflow in wolfSSL_X509_notAfter/notBefore | 2026-04-02T00:00:00.000Z | 2026-04-30T14:38:05.000Z |
| msrc_cve-2026-5447 | Heap buffer overflow in CertFromX509() via AuthorityKeyIdentifier | 2026-04-02T00:00:00.000Z | 2026-04-30T01:38:49.000Z |
| msrc_cve-2026-5446 | wolfSSL ARIA-GCM TLS 1.2/DTLS 1.2 GCM nonce reuse | 2026-04-02T00:00:00.000Z | 2026-04-30T01:39:49.000Z |
| msrc_cve-2026-5435 | Potential buffer overflow in ns_sprintrrf TSIG handling path | 2026-04-02T00:00:00.000Z | 2026-04-30T01:09:35.000Z |
| msrc_cve-2026-5393 | OOB Read in DoTls13CertificateVerify with WOLFSSL_DUAL_ALG_CERTS | 2026-04-02T00:00:00.000Z | 2026-04-30T01:53:42.000Z |
| msrc_cve-2026-5392 | wolfSSL heap OOB read in PKCS7 SignedData streaming | 2026-04-02T00:00:00.000Z | 2026-04-30T14:38:10.000Z |
| msrc_cve-2026-5358 | Static buffer overflow in deprecated nis_local_principal | 2026-04-02T00:00:00.000Z | 2026-04-23T01:01:23.000Z |
| msrc_cve-2026-5295 | Stack Buffer Overflow in wolfSSL PKCS7 wc_PKCS7_DecryptOri() via Oversized OID | 2026-04-02T00:00:00.000Z | 2026-04-30T01:54:16.000Z |
| msrc_cve-2026-5264 | DTLS 1.3 ACK heap buffer overflow | 2026-04-02T00:00:00.000Z | 2026-04-15T01:03:33.000Z |
| msrc_cve-2026-5263 | URI nameConstraints not enforced in ConfirmNameConstraints() | 2026-04-02T00:00:00.000Z | 2026-04-15T01:04:31.000Z |
| msrc_cve-2026-5194 | wolfSSL ECDSA Certificate Verification | 2026-04-02T00:00:00.000Z | 2026-04-15T01:02:34.000Z |
| msrc_cve-2026-5188 | Integer underflow in X.509 SAN parsing in wolfSSL | 2026-04-02T00:00:00.000Z | 2026-04-30T01:54:25.000Z |
| msrc_cve-2026-5187 | Heap Out-of-Bounds Write in DecodeObjectId() in wolfSSL | 2026-04-02T00:00:00.000Z | 2026-04-30T01:49:37.000Z |
| msrc_cve-2026-5160 | CVE-2026-5160 | 2026-04-02T00:00:00.000Z | 2026-04-29T14:58:47.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0211 | Kwetsbaarheden verholpen in Siemens producten | 2025-07-08T11:58:23.712452Z | 2025-07-08T11:58:23.712452Z |
| ncsc-2025-0210 | Kwetsbaarheid verholpen in Cisco Unified Communications Manager | 2025-07-03T07:43:27.075341Z | 2025-07-03T07:43:27.075341Z |
| ncsc-2025-0209 | Kwetsbaarheid verholpen in Google Chrome | 2025-07-01T15:56:24.236216Z | 2025-07-01T15:56:24.236216Z |
| ncsc-2025-0208 | Kwetsbaarheden verholpen in Adobe Commerce | 2025-06-30T12:59:12.105658Z | 2025-06-30T12:59:12.105658Z |
| ncsc-2025-0207 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2025-06-30T12:58:32.421661Z | 2025-06-30T12:58:32.421661Z |
| ncsc-2025-0206 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-06-30T12:57:43.622242Z | 2025-06-30T12:57:43.622242Z |
| ncsc-2025-0205 | Kwetsbaarheid verholpen in IBM WebSphere Application Server | 2025-06-26T12:32:54.177712Z | 2025-06-26T12:32:54.177712Z |
| ncsc-2025-0204 | Kwetsbaarheden verholpen in Cisco ISE en ISE-PIC | 2025-06-26T09:02:07.224036Z | 2025-07-23T07:46:25.364521Z |
| ncsc-2025-0203 | Kwetsbaarheid verholpen in Citrix NetScaler ADC en NetScaler Gateway | 2025-06-25T14:54:38.413413Z | 2025-06-25T14:54:38.413413Z |
| ncsc-2025-0202 | Kwetsbaarheden verholpen in IBM InfoSphere Information Server | 2025-06-22T08:19:47.485567Z | 2025-06-22T08:19:47.485567Z |
| ncsc-2025-0201 | Kwetsbaarheid verholpen in IBM Spectrum Protect Server | 2025-06-22T08:17:03.146698Z | 2025-06-22T08:17:03.146698Z |
| ncsc-2025-0200 | Kwetsbaarheden verholpen in IBM QRadar SIEM | 2025-06-20T11:04:50.445218Z | 2025-06-20T11:04:50.445218Z |
| ncsc-2025-0199 | Kwetsbaarheid verholpen in Cisco AnyConnect VPN voor Meraki MX en Z | 2025-06-19T08:42:22.673078Z | 2025-06-19T08:42:22.673078Z |
| ncsc-2025-0198 | Kwetsbaarheden verholpen in Veeam Backup | 2025-06-18T12:18:39.049977Z | 2025-06-18T12:18:39.049977Z |
| ncsc-2025-0197 | Kwetsbaarheid verholpen in GeoServer | 2025-06-18T10:17:42.472544Z | 2025-06-18T10:17:42.472544Z |
| ncsc-2025-0196 | Kwetsbaarheden verholpen in Citrix NetScaler ADC en NetScaler Gateway | 2025-06-18T08:32:32.792202Z | 2025-07-18T09:51:52.738778Z |
| ncsc-2025-0195 | Kwetsbaarheden verholpen in Apache Tomcat | 2025-06-18T08:01:06.984131Z | 2025-06-18T08:01:06.984131Z |
| ncsc-2025-0194 | Kwetsbaarheden verholpen in Trend Micro Apex One en Apex Central | 2025-06-12T11:12:33.408725Z | 2025-06-12T11:12:33.408725Z |
| ncsc-2025-0193 | Kwetsbaarheden verholpen in Ivanti Workspace Control | 2025-06-12T11:08:41.247215Z | 2025-06-12T11:08:41.247215Z |
| ncsc-2025-0192 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2025-06-12T11:04:45.167843Z | 2025-06-12T11:04:45.167843Z |
| ncsc-2025-0191 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2025-06-11T06:58:19.840921Z | 2025-06-11T06:58:19.840921Z |
| ncsc-2025-0190 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-06-10T18:46:10.932182Z | 2025-06-10T18:46:10.932182Z |
| ncsc-2025-0189 | Kwetsbaarheden verholpen in Microsoft Office | 2025-06-10T18:45:25.061778Z | 2025-06-10T18:45:25.061778Z |
| ncsc-2025-0188 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-06-10T18:43:18.187461Z | 2025-06-10T18:43:18.187461Z |
| ncsc-2025-0187 | Kwetsbaarheden verholpen in Siemens producten | 2025-06-10T13:11:56.672768Z | 2025-06-10T13:11:56.672768Z |
| ncsc-2025-0186 | Kwetsbaarheden verholpen in SAP Producten | 2025-06-10T10:15:56.898255Z | 2025-06-10T10:15:56.898255Z |
| ncsc-2025-0185 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-06-10T07:19:02.701613Z | 2025-06-10T07:19:02.701613Z |
| ncsc-2025-0184 | Kwetsbaarheden verholpen in HPE StoreOnce Software | 2025-06-05T10:37:04.196801Z | 2025-06-05T10:37:04.196801Z |
| ncsc-2025-0183 | Kwetsbaarheid verholpen in Cisco Identity Services Engine voor cloudplatformen | 2025-06-05T10:25:46.291683Z | 2025-06-05T10:25:46.291683Z |
| ncsc-2025-0182 | Kwetsbaarheden verholpen in Google Chrome en Microsoft Edge | 2025-06-03T07:52:36.009178Z | 2025-06-10T18:44:36.060357Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20409-1 | Security update for harfbuzz | 2026-03-20T15:26:24Z | 2026-03-20T15:26:24Z |
| opensuse-su-2026:20408-1 | Security update for postgresql18 | 2026-03-20T14:50:43Z | 2026-03-20T14:50:43Z |
| opensuse-su-2026:20407-1 | Security update for python-orjson | 2026-03-20T12:07:21Z | 2026-03-20T12:07:21Z |
| opensuse-su-2026:20406-1 | Security update for python-tornado6 | 2026-03-20T10:53:33Z | 2026-03-20T10:53:33Z |
| opensuse-su-2026:20404-1 | Security update for curl | 2026-03-20T09:36:45Z | 2026-03-20T09:36:45Z |
| opensuse-su-2026:20405-1 | Security update for ImageMagick | 2026-03-20T09:31:54Z | 2026-03-20T09:31:54Z |
| opensuse-su-2026:20403-1 | Security update for vim | 2026-03-20T03:15:00Z | 2026-03-20T03:15:00Z |
| opensuse-su-2026:10398-1 | python311-3.11.15-3.1 on GA media | 2026-03-20T00:00:00Z | 2026-03-20T00:00:00Z |
| opensuse-su-2026:10397-1 | python311-PyJWT-2.12.1-1.1 on GA media | 2026-03-20T00:00:00Z | 2026-03-20T00:00:00Z |
| opensuse-su-2026:10396-1 | openbao-2.5.1-1.1 on GA media | 2026-03-20T00:00:00Z | 2026-03-20T00:00:00Z |
| opensuse-su-2026:20402-1 | Security update for gstreamer-plugins-ugly | 2026-03-19T13:48:14Z | 2026-03-19T13:48:14Z |
| opensuse-su-2026:20401-1 | Security update for ucode-intel | 2026-03-19T09:31:38Z | 2026-03-19T09:31:38Z |
| opensuse-su-2026:20399-1 | Security update for libsodium | 2026-03-19T08:18:59Z | 2026-03-19T08:18:59Z |
| opensuse-su-2026:20398-1 | Security update for keylime | 2026-03-19T08:16:55Z | 2026-03-19T08:16:55Z |
| opensuse-su-2026:20397-1 | Security update for poppler | 2026-03-19T08:11:15Z | 2026-03-19T08:11:15Z |
| opensuse-su-2026:20396-1 | Security update for librsvg | 2026-03-19T08:11:15Z | 2026-03-19T08:11:15Z |
| opensuse-su-2026:10395-1 | qemu-10.2.2-1.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10394-1 | python313-3.13.12-2.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10393-1 | python311-pyasn1-0.6.3-1.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10392-1 | python311-pyOpenSSL-26.0.0-1.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10391-1 | GraphicsMagick-1.3.46-3.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:20394-1 | Security update for mumble | 2026-03-18T20:03:58Z | 2026-03-18T20:03:58Z |
| opensuse-su-2026:20390-1 | Security update for protobuf | 2026-03-18T18:15:53Z | 2026-03-18T18:15:53Z |
| opensuse-su-2026:20392-1 | Security update for python-Authlib | 2026-03-18T17:30:06Z | 2026-03-18T17:30:06Z |
| opensuse-su-2026:20393-1 | Security update for python-simpleeval | 2026-03-18T17:29:11Z | 2026-03-18T17:29:11Z |
| opensuse-su-2026:20388-1 | Security update for postgresql17 | 2026-03-18T15:31:19Z | 2026-03-18T15:31:19Z |
| opensuse-su-2026:20387-1 | Security update for busybox | 2026-03-18T15:29:19Z | 2026-03-18T15:29:19Z |
| opensuse-su-2026:20391-1 | Security update for MozillaThunderbird | 2026-03-18T13:37:38Z | 2026-03-18T13:37:38Z |
| opensuse-su-2026:20386-1 | Security update for cosign | 2026-03-18T11:29:30Z | 2026-03-18T11:29:30Z |
| opensuse-su-2026:20385-1 | Security update for libjxl | 2026-03-18T10:13:37Z | 2026-03-18T10:13:37Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:10709 | Red Hat Security Advisory: freerdp security update | 2026-04-27T02:14:52+00:00 | 2026-04-30T21:35:10+00:00 |
| rhsa-2026:10712 | Red Hat Security Advisory: git-lfs security update | 2026-04-27T02:11:32+00:00 | 2026-05-08T15:01:18+00:00 |
| rhsa-2026:10708 | Red Hat Security Advisory: gdk-pixbuf2 security update | 2026-04-27T02:08:37+00:00 | 2026-04-30T16:32:33+00:00 |
| rhsa-2026:10711 | Red Hat Security Advisory: python3.12 security update | 2026-04-27T02:07:12+00:00 | 2026-05-07T08:26:50+00:00 |
| rhsa-2026:10702 | Red Hat Security Advisory: webkit2gtk3 security update | 2026-04-27T02:00:56+00:00 | 2026-05-07T08:26:54+00:00 |
| rhsa-2026:10705 | Red Hat Security Advisory: rhc security update | 2026-04-27T01:54:41+00:00 | 2026-05-09T21:01:57+00:00 |
| rhsa-2026:10706 | Red Hat Security Advisory: rhc security update | 2026-04-27T01:50:01+00:00 | 2026-05-09T21:01:58+00:00 |
| rhsa-2026:10707 | Red Hat Security Advisory: gdk-pixbuf2 security update | 2026-04-27T01:38:51+00:00 | 2026-04-30T16:32:34+00:00 |
| rhsa-2026:10713 | Red Hat Security Advisory: pcs security update | 2026-04-27T01:38:16+00:00 | 2026-05-07T21:42:41+00:00 |
| rhsa-2026:10710 | Red Hat Security Advisory: pcs security update | 2026-04-27T01:35:11+00:00 | 2026-05-07T21:42:41+00:00 |
| rhsa-2026:10701 | Red Hat Security Advisory: yggdrasil-worker-package-manager security update | 2026-04-27T01:29:26+00:00 | 2026-05-08T15:01:13+00:00 |
| rhsa-2026:10698 | Red Hat Security Advisory: RHOAI 2.25.6 - Red Hat OpenShift AI | 2026-04-26T13:53:48+00:00 | 2026-05-09T21:01:57+00:00 |
| rhsa-2026:9689 | Red Hat Security Advisory: java-21-openjdk security update | 2026-04-24T11:24:15+00:00 | 2026-05-04T21:23:59+00:00 |
| rhsa-2026:9683 | Red Hat Security Advisory: java-1.8.0-openjdk security update | 2026-04-24T11:22:30+00:00 | 2026-05-04T21:23:53+00:00 |
| rhsa-2026:9686 | Red Hat Security Advisory: java-17-openjdk security update | 2026-04-24T10:14:35+00:00 | 2026-05-04T21:23:56+00:00 |
| rhsa-2026:10226 | Red Hat Security Advisory: grafana security update | 2026-04-24T07:50:50+00:00 | 2026-04-29T01:17:17+00:00 |
| rhsa-2026:10135 | Red Hat Security Advisory: buildah security update | 2026-04-24T07:46:55+00:00 | 2026-05-09T21:01:51+00:00 |
| rhsa-2026:10219 | Red Hat Security Advisory: golang security update | 2026-04-24T02:38:10+00:00 | 2026-05-07T15:35:28+00:00 |
| rhsa-2026:10255 | Red Hat Security Advisory: squid security update | 2026-04-24T01:10:39+00:00 | 2026-04-30T02:55:10+00:00 |
| rhsa-2026:10108 | Red Hat Security Advisory: kernel security update | 2026-04-23T23:21:04+00:00 | 2026-05-07T21:41:48+00:00 |
| rhsa-2026:10256 | Red Hat Security Advisory: squid security update | 2026-04-23T23:14:39+00:00 | 2026-04-30T02:55:10+00:00 |
| rhsa-2026:10257 | Red Hat Security Advisory: squid security update | 2026-04-23T23:11:04+00:00 | 2026-04-30T02:55:16+00:00 |
| rhsa-2026:10223 | Red Hat Security Advisory: grafana security update | 2026-04-23T22:58:29+00:00 | 2026-04-29T01:17:20+00:00 |
| rhsa-2026:10217 | Red Hat Security Advisory: golang security update | 2026-04-23T21:39:53+00:00 | 2026-05-07T15:35:28+00:00 |
| rhsa-2026:10250 | Red Hat Security Advisory: Red Hat Web Terminal Operator 1.11.0 release. | 2026-04-23T20:17:23+00:00 | 2026-05-09T21:01:55+00:00 |
| rhsa-2026:10107 | Red Hat Security Advisory: rhc security update | 2026-04-23T19:40:23+00:00 | 2026-05-09T21:01:47+00:00 |
| rhsa-2026:10225 | Red Hat Security Advisory: Red Hat Web Terminal Operator 1.12.0 release. | 2026-04-23T18:54:04+00:00 | 2026-05-09T21:01:54+00:00 |
| rhsa-2026:10111 | Red Hat Security Advisory: python3.12 security update | 2026-04-23T18:24:53+00:00 | 2026-05-05T20:31:09+00:00 |
| rhsa-2026:10169 | Red Hat Security Advisory: rhc-worker-playbook security update | 2026-04-23T17:49:58+00:00 | 2026-05-08T15:01:11+00:00 |
| rhsa-2026:10214 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.16 security update. | 2026-04-23T17:30:02+00:00 | 2026-05-05T03:16:34+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-480095 | SSA-480095: Vulnerabilities in the Web Interface of SICAM Q100 Devices before V2.60 | 2023-12-12T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-398330 | SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP >= V3.1.0 and < V3.1.5 | 2023-12-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-280603 | SSA-280603: Denial of Service Vulnerability in SINUMERIK ONE and SINUMERIK MC | 2023-12-12T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-180704 | SSA-180704: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.0 | 2023-12-12T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-118850 | SSA-118850: Denial of Service Vulnerability in the OPC UA Implementation in SINUMERIK ONE and SINUMERIK MC | 2023-12-12T00:00:00Z | 2023-12-12T00:00:00Z |
| ssa-077170 | SSA-077170: Multiple Vulnerabilities in SINEC INS before V1.0 SP2 Update 2 | 2023-12-12T00:00:00Z | 2023-12-12T00:00:00Z |
| ssa-068047 | SSA-068047: Multiple Vulnerabilities in SCALANCE M-800 Family Before V7.2.2 | 2023-12-12T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-887122 | SSA-887122: X_T File Parsing Vulnerabilities in Simcenter Femap | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-699386 | SSA-699386: Multiple Vulnerabilities in SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family before V4.5 | 2023-11-14T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-625850 | SSA-625850: Multiple WIBU Systems CodeMeter Vulnerabilities Affecting the Desigo CC Product Family and SENTRON powermanager | 2023-11-14T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-617233 | SSA-617233: Urgent/11 TCP/IP Stack Vulnerabilities in SIPROTEC 4 7SJ66 Devices | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-478780 | SSA-478780: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-457702 | SSA-457702: Wi-Fi Encryption Bypass Vulnerabilities in SCALANCE W700 Product Family | 2023-11-14T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-456933 | SSA-456933: Multiple Vulnerabilities in SIMATIC PCS neo before V4.1 | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-292063 | SSA-292063: Multiple Vulnerabilities in Nozomi Guardian/CMC before 22.6.3 and 23.1.0 on RUGGEDCOM APE1808 devices | 2023-11-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-268517 | SSA-268517: Code Execution Vulnerability (libwebp CVE-2023-4863) in Mendix Studio Pro | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-197270 | SSA-197270: Information Disclosure Vulnerability in Siemens OPC UA Modeling Editor (SiOME) | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-150063 | SSA-150063: Multiple Vulnerabilities in SINEC PNI before V2.0 | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-137900 | SSA-137900: Multiple Vulnerabilities in COMOS | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-099606 | SSA-099606: Multiple Vulnerabilities in SIMATIC MV500 before V3.3.5 | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-084182 | SSA-084182: Privilege Escalation Vulnerability in Mendix Runtime | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-843070 | SSA-843070: Multiple Vulnerabilities in SCALANCE W1750D | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-829656 | SSA-829656: Stack Overflow Vulnerability in Xpedition Layout Browser | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-784849 | SSA-784849: Direct Memory Access Vulnerabilities in SIMATIC CP Devices | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-770890 | SSA-770890: Path Traversal Vulnerability in the Web Server of CPCI85 Firmware of SICAM A8000 Devices | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-647455 | SSA-647455: Multiple Vulnerabilities in Nozomi Guardian/CMC before 22.6.2 on RUGGEDCOM APE1808 devices | 2023-10-10T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-594373 | SSA-594373: Cross-Site-Scripting (XSS) Vulnerability in SINEMA Server V14 | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-524778 | SSA-524778: File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-386812 | SSA-386812: Remote Code Execution Vulnerability in Simcenter Amesim before V2021.1 | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-295483 | SSA-295483: User Enumeration Vulnerability in Mendix Forgot Password Module | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21376-1 | Security update for google-guest-agent | 2026-04-22T10:23:05Z | 2026-04-22T10:23:05Z |
| suse-su-2026:21370-1 | Security update for ignition | 2026-04-22T10:09:05Z | 2026-04-22T10:09:05Z |
| suse-su-2026:21272-1 | Security update for ignition | 2026-04-22T10:09:05Z | 2026-04-22T10:09:05Z |
| suse-su-2026:21372-1 | Security update for openexr | 2026-04-22T10:07:59Z | 2026-04-22T10:07:59Z |
| suse-su-2026:21369-1 | Security update for sudo | 2026-04-22T10:00:02Z | 2026-04-22T10:00:02Z |
| suse-su-2026:21273-1 | Security update for sudo | 2026-04-22T10:00:02Z | 2026-04-22T10:00:02Z |
| suse-su-2026:1550-1 | Security update for openssl-1_1 | 2026-04-22T09:41:29Z | 2026-04-22T09:41:29Z |
| suse-su-2026:1549-1 | Security update for openssl-1_1 | 2026-04-22T09:40:58Z | 2026-04-22T09:40:58Z |
| suse-su-2026:1548-1 | Security update for kea | 2026-04-22T09:40:51Z | 2026-04-22T09:40:51Z |
| suse-su-2026:21271-1 | Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 16) | 2026-04-22T08:19:45Z | 2026-04-22T08:19:45Z |
| suse-su-2026:21368-1 | Security update for giflib | 2026-04-22T08:10:04Z | 2026-04-22T08:10:04Z |
| suse-su-2026:1541-1 | Security update for flatpak | 2026-04-22T07:22:36Z | 2026-04-22T07:22:36Z |
| suse-su-2026:1540-1 | Security update for podman | 2026-04-22T07:22:18Z | 2026-04-22T07:22:18Z |
| suse-su-2026:1539-1 | Security update for gdk-pixbuf | 2026-04-22T07:20:51Z | 2026-04-22T07:20:51Z |
| suse-su-2026:1537-1 | Security update for the Linux Kernel (Live Patch 71 for SUSE Linux Enterprise 12 SP5) | 2026-04-21T23:07:10Z | 2026-04-21T23:07:10Z |
| suse-su-2026:21270-1 | Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-04-21T18:19:42Z | 2026-04-21T18:19:42Z |
| suse-su-2026:21269-1 | Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-04-21T15:51:23Z | 2026-04-21T15:51:23Z |
| suse-su-2026:21268-1 | Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-04-21T15:49:23Z | 2026-04-21T15:49:23Z |
| suse-su-2026:21267-1 | Security update for the Linux Kernel RT (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-04-21T15:23:02Z | 2026-04-21T15:23:02Z |
| suse-su-2026:21266-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise 16) | 2026-04-21T15:04:19Z | 2026-04-21T15:04:19Z |
| suse-su-2026:1535-1 | Security update for the Linux Kernel (Live Patch 68 for SUSE Linux Enterprise 12 SP5) | 2026-04-21T14:34:30Z | 2026-04-21T14:34:30Z |
| suse-su-2026:1532-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 2026-04-21T12:04:58Z | 2026-04-21T12:04:58Z |
| suse-su-2026:1531-1 | Security update for the Linux Kernel (Live Patch 20 for SUSE Linux Enterprise 15 SP6) | 2026-04-21T12:04:49Z | 2026-04-21T12:04:49Z |
| suse-su-2026:21366-1 | Security update for tomcat11 | 2026-04-21T11:42:00Z | 2026-04-21T11:42:00Z |
| suse-su-2026:1530-1 | Security update for python311 | 2026-04-21T11:04:58Z | 2026-04-21T11:04:58Z |
| suse-su-2026:1527-1 | Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise 15 SP6) | 2026-04-21T10:04:36Z | 2026-04-21T10:04:36Z |
| suse-su-2026:21364-1 | Security update for libpng16 | 2026-04-21T10:01:03Z | 2026-04-21T10:01:03Z |
| suse-su-2026:21239-1 | Security update for libpng16 | 2026-04-21T10:01:03Z | 2026-04-21T10:01:03Z |
| suse-su-2026:21363-1 | Security update for ghostscript | 2026-04-21T09:48:49Z | 2026-04-21T09:48:49Z |
| suse-su-2026:21362-1 | Security update for gnome-remote-desktop | 2026-04-21T09:29:50Z | 2026-04-21T09:29:50Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:3094 | Important: protobuf security update | 2026-02-23T00:00:00Z | 2026-02-24T00:07:41Z |
| alsa-2026:3092 | Important: golang-github-openprinting-ipp-usb security update | 2026-02-23T00:00:00Z | 2026-02-26T10:33:21Z |
| alsa-2026:3083 | Important: kernel security update | 2026-02-23T00:00:00Z | 2026-02-24T12:59:25Z |
| alsa-2026:3068 | Important: freerdp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:34:44Z |
| alsa-2026:3067 | Important: freerdp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:36:11Z |
| alsa-2026:3066 | Moderate: kernel security update | 2026-02-23T00:00:00Z | 2026-02-26T10:43:00Z |
| alsa-2026:3042 | Moderate: openssl security update | 2026-02-23T00:00:00Z | 2026-02-23T09:07:14Z |
| alsa-2026:3040 | Important: grafana-pcp security update | 2026-02-23T00:00:00Z | 2026-03-10T20:11:50Z |
| alsa-2026:3035 | Important: grafana-pcp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:48:18Z |
| alsa-2026:3034 | Important: munge security update | 2026-02-23T00:00:00Z | 2026-02-26T10:49:31Z |
| alsa-2026:3033 | Important: munge security update | 2026-02-23T00:00:00Z | 2026-02-26T10:51:19Z |
| alsa-2026:3032 | Important: munge security update | 2026-02-23T00:00:00Z | 2026-02-23T14:44:19Z |
| alsa-2026:3031 | Important: libpng15 security update | 2026-02-23T00:00:00Z | 2026-02-26T10:52:26Z |
| alsa-2026:2920 | Important: grafana security update | 2026-02-18T00:00:00Z | 2026-02-19T10:58:19Z |
| alsa-2026:2914 | Important: grafana security update | 2026-02-18T00:00:00Z | 2026-02-19T18:04:08Z |
| alsa-2026:2821 | Moderate: kernel-rt security update | 2026-02-17T00:00:00Z | 2026-02-18T13:25:58Z |
| alsa-2026:2799 | Moderate: php security update | 2026-02-17T00:00:00Z | 2026-02-18T13:30:42Z |
| alsa-2026:2786 | Moderate: glibc security update | 2026-02-17T00:00:00Z | 2026-02-18T13:44:36Z |
| alsa-2026:2783 | Important: nodejs:20 security update | 2026-02-17T00:00:00Z | 2026-02-23T13:24:32Z |
| alsa-2026:2782 | Important: nodejs:22 security update | 2026-02-17T00:00:00Z | 2026-02-23T13:22:00Z |
| alsa-2026:2781 | Important: nodejs:24 security update | 2026-02-17T00:00:00Z | 2026-02-18T13:51:36Z |
| alsa-2026:2776 | Moderate: edk2 security update | 2026-02-17T00:00:00Z | 2026-02-18T13:48:45Z |
| alsa-2026:2722 | Moderate: kernel security update | 2026-02-16T00:00:00Z | 2026-02-23T13:18:53Z |
| alsa-2026:2721 | Moderate: kernel security update | 2026-02-16T00:00:00Z | 2026-02-23T13:34:16Z |
| alsa-2026:2720 | Moderate: kernel security update | 2026-02-16T00:00:00Z | 2026-02-23T13:27:24Z |
| alsa-2026:2719 | Important: gnupg2 security update | 2026-02-16T00:00:00Z | 2026-02-18T13:46:37Z |
| alsa-2026:2709 | Important: golang security update | 2026-02-16T00:00:00Z | 2026-02-17T10:27:57Z |
| alsa-2026:2708 | Important: go-toolset:rhel8 security update | 2026-02-16T00:00:00Z | 2026-02-16T14:22:53Z |
| alsa-2026:2707 | Important: gimp security update | 2026-02-16T00:00:00Z | 2026-02-17T10:29:58Z |
| alsa-2026:2706 | Important: golang security update | 2026-02-16T00:00:00Z | 2026-02-18T13:54:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-17 | Heap-buffer-overflow in cv::PngDecoder::readHeader | 2025-01-08T00:14:02.009521Z | 2025-01-08T00:14:02.009997Z |
| osv-2025-16 | UNKNOWN READ in png_free_data | 2025-01-08T00:13:45.160139Z | 2025-01-08T00:13:45.160518Z |
| osv-2025-13 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-01-07T00:15:11.722974Z | 2025-01-07T00:15:11.723402Z |
| osv-2025-7 | Heap-buffer-overflow in oatpp::json::Utils::escapeUtf8Char | 2025-01-07T00:03:42.053605Z | 2025-01-07T00:03:42.054132Z |
| osv-2025-6 | Heap-buffer-overflow in next_marker | 2025-01-06T00:16:10.036783Z | 2025-01-06T00:16:10.037219Z |
| osv-2025-4 | Heap-buffer-overflow in ___interceptor_pthread_create | 2025-01-05T00:17:02.263743Z | 2025-01-05T00:17:02.264158Z |
| osv-2025-3 | Heap-buffer-overflow in avifImageAddUUIDProperty | 2025-01-05T00:10:22.871565Z | 2025-01-05T00:10:22.872062Z |
| osv-2025-1 | Segv on unknown address in avif_fuzztest_properties@PropertiesAvifFuzzTest.PropsValid | 2025-01-04T00:00:30.888504Z | 2025-01-04T00:00:30.889140Z |
| osv-2024-1417 | Heap-buffer-overflow in cv::PngDecoder::read_from_io | 2025-01-02T00:15:00.246767Z | 2025-01-02T00:15:00.247102Z |
| osv-2024-1411 | Use-of-uninitialized-value in mark_context | 2024-12-29T00:03:28.881713Z | 2024-12-29T00:03:28.882100Z |
| osv-2024-1406 | UNKNOWN READ in _TIFFVSetField | 2024-12-27T00:16:38.077175Z | 2024-12-27T00:16:38.077756Z |
| osv-2024-1391 | Heap-buffer-overflow in gsicc_create_getv2buffer | 2024-12-20T00:03:10.307442Z | 2024-12-20T00:03:10.308031Z |
| osv-2024-1388 | Security exception in com.google.gson.internal.bind.TypeAdapters$28.write | 2024-12-18T00:02:54.357847Z | 2024-12-18T00:02:54.358393Z |
| osv-2024-1380 | Index-out-of-bounds in ndpi_search_dns | 2024-12-15T00:12:21.687565Z | 2024-12-15T00:12:21.687988Z |
| osv-2024-1375 | Index-out-of-bounds in dwg_decode_eed | 2024-12-15T00:01:20.442440Z | 2025-05-03T14:23:13.369570Z |
| osv-2024-1372 | Bad-cast to Assimp::LogStream from Assimp::OptimizeMeshesProcess | 2024-12-14T00:00:14.982156Z | 2024-12-14T00:00:14.982614Z |
| osv-2024-1356 | Heap-buffer-overflow in ChunkAssignData | 2024-12-10T00:13:56.481718Z | 2024-12-10T00:13:56.482170Z |
| osv-2024-1355 | UNKNOWN READ in glslang::TInfoSinkBase::location | 2024-12-10T00:08:00.540533Z | 2025-12-23T15:50:47.917708Z |
| osv-2024-1351 | Use-of-uninitialized-value in Archive::UnexpEndArcMsg | 2024-12-10T00:05:42.992615Z | 2024-12-10T00:05:42.992960Z |
| osv-2024-1348 | Heap-buffer-overflow in glslang::HlslGrammar::acceptDeclaration | 2024-12-10T00:00:50.788Z | 2025-12-23T15:50:48.626100Z |
| osv-2024-1346 | UNKNOWN READ in glslang::HlslTokenStream::advanceToken | 2024-12-10T00:00:20.380006Z | 2025-12-23T15:50:47.126469Z |
| osv-2024-1343 | Container-overflow in glslang::HlslParseContext::decomposeIntrinsic | 2024-11-27T00:13:21.103465Z | 2025-12-23T15:50:45.708425Z |
| osv-2024-1336 | Security exception in org.checkerframework.checker.formatter.util.FormatUtil.formatParameterCategories | 2024-11-26T00:01:25.736998Z | 2024-11-26T00:01:25.737632Z |
| osv-2024-1332 | Negative-size-param in extract_mr_data | 2024-11-21T00:04:16.535838Z | 2024-11-21T00:04:16.536469Z |
| osv-2024-1330 | Heap-buffer-overflow in zoom_search_again | 2024-11-20T00:15:27.562125Z | 2024-11-20T14:27:37.875526Z |
| osv-2024-1326 | Heap-buffer-overflow in ndpi_search_mikrotik | 2024-11-18T00:12:17.790747Z | 2024-11-18T00:12:17.791146Z |
| osv-2024-1324 | Heap-buffer-overflow in Assimp::FBXExporter::WriteObjects | 2024-11-18T00:01:13.979270Z | 2024-11-18T00:01:13.979758Z |
| osv-2024-1322 | Security exception in com.alibaba.fastjson2.JSONReader.readObject | 2024-11-18T00:00:16.618504Z | 2025-03-18T00:24:17.881614Z |
| osv-2024-1320 | Heap-buffer-overflow in process_page_ | 2024-11-17T00:15:09.627790Z | 2024-11-17T00:15:09.628193Z |
| osv-2024-1312 | Heap-buffer-overflow in jv_string_vfmt | 2024-11-15T00:16:08.928897Z | 2025-03-05T14:20:12.622041Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0366 | CWA-2023-004: Excessive number of function parameters in compiled Wasm | 2024-08-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0385 | `cw0` is unmaintained | 2024-08-26T12:00:00Z | 2024-11-10T13:12:32Z |
| rustsec-2024-0365 | Binary Protocol Misinterpretation caused by Truncating or Overflowing Casts | 2024-08-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0364 | gitoxide-core does not neutralize special characters for terminals | 2024-08-22T12:00:00Z | 2024-08-22T23:15:02Z |
| rustsec-2024-0363 | Binary Protocol Misinterpretation caused by Truncating or Overflowing Casts | 2024-08-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0444 | Uncaught exception when transitioning the state of `AsyncGenerator` objects from within a property getter of `then` | 2024-08-14T12:00:00Z | 2025-12-19T06:15:15Z |
| rustsec-2024-0390 | minitrace is Unmaintained | 2024-08-14T12:00:00Z | 2024-11-10T13:54:21Z |
| rustsec-2024-0361 | CWA-2024-004: Gas mispricing in cosmwasm-vm | 2024-08-08T12:00:00Z | 2024-08-08T17:11:37Z |
| rustsec-2024-0362 | Stack overflow when parsing specially crafted JSON ABI strings | 2024-07-30T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0446 | Shell expansion in custom commands | 2024-07-26T12:00:00Z | 2025-12-22T13:54:49Z |
| rustsec-2024-0360 | `XmpFile::close` can trigger UB | 2024-07-26T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0359 | The kstring integration in gix-attributes is unsound | 2024-07-24T12:00:00Z | 2025-01-19T00:36:24Z |
| rustsec-2024-0358 | Apache Arrow Rust Object Store: AWS WebIdentityToken exposure in log files | 2024-07-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0357 | `MemBio::get_buf` has undefined behavior with empty buffers | 2024-07-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0405 | op_panic in the base runtime can force a panic in the runtime's containing thread | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0403 | op_panic in the base runtime can force a panic in the runtime's containing thread | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0393 | Ambiguous challenge derivation | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0392 | Ambiguous challenge derivation | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0391 | Ambiguous challenge derivation | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0356 | `UserIdentity::is_verified` not checking verification status of own user identity while performing the check | 2024-07-18T12:00:00Z | 2024-07-19T10:11:38Z |
| rustsec-2024-0355 | gix-path can use a fake program files location | 2024-07-18T12:00:00Z | 2024-07-18T16:46:06Z |
| rustsec-2024-0354 | Usage of non-constant time base64 decoder could lead to leakage of secret key material | 2024-07-17T12:00:00Z | 2024-07-18T11:24:58Z |
| rustsec-2024-0369 | phonenumber: panic on parsing crafted phonenumber inputs | 2024-07-07T12:00:00Z | 2024-09-05T13:40:37Z |
| rustsec-2024-0442 | Dump Undefined Memory by `JitDumpFile` | 2024-07-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0389 | `openslide` is unmaintained | 2024-07-03T12:00:00Z | 2024-11-10T13:42:14Z |
| rustsec-2024-0387 | `opentelemetry_api` has been merged into the `opentelemetry` crate | 2024-07-03T12:00:00Z | 2024-11-10T13:29:25Z |
| rustsec-2024-0347 | Incorrect usage of `#[repr(packed)]` | 2024-07-01T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0346 | Incorrect usage of `#[repr(packed)]` | 2024-07-01T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0388 | `derivative` is unmaintained; consider using an alternative | 2024-06-26T12:00:00Z | 2024-11-10T13:34:40Z |
| rustsec-2024-0345 | Low severity (DoS) vulnerability in sequoia-openpgp | 2024-06-26T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-java-2024-20921 | 2026-05-06T14:44:09.496Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2024-20919 | 2026-05-06T14:44:07.996Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2024-20918 | 2026-05-06T14:44:06.582Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-42950 | 2026-05-06T14:44:05.128Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-42917 | 2026-05-06T14:44:03.789Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-41993 | 2026-05-06T14:44:02.357Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-41074 | 2026-05-06T14:44:00.940Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-25193 | 2026-05-06T14:43:59.414Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-22081 | 2026-05-06T14:43:58.077Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-22067 | 2026-05-06T14:43:56.684Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-22049 | 2026-05-06T14:43:55.298Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-22045 | 2026-05-06T14:43:54.000Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-22044 | 2026-05-06T14:43:52.647Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-22043 | 2026-05-06T14:43:51.213Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-22041 | 2026-05-06T14:43:49.644Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-22036 | 2026-05-06T14:43:48.288Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-22025 | 2026-05-06T14:43:46.849Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-22006 | 2026-05-06T14:43:45.377Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-21968 | 2026-05-06T14:43:44.043Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-21967 | 2026-05-06T14:43:42.553Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-21954 | 2026-05-06T14:43:41.151Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-21939 | 2026-05-06T14:43:39.798Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-21938 | 2026-05-06T14:43:38.285Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-21937 | 2026-05-06T14:43:36.874Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-21930 | 2026-05-06T14:43:35.437Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-21843 | 2026-05-06T14:43:34.009Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-21835 | 2026-05-06T14:43:32.376Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2023-21830 | 2026-05-06T14:43:31.032Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-39399 | 2026-05-06T14:43:29.383Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-34169 | Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets | 2026-05-06T14:43:28.069Z | 2026-05-08T06:11:36.072Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ni04192 | Security fixes for CVE-2025-61729, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-fv92-fjc5-jj9h, ghsa-p77j-4mvh-x3m3 applied in versions: 3.6.16-r0, 3.6.18-r0, 3.6.18-r1, 3.6.18-r2, 3.7.4-r0 | 2026-04-01T09:24:43.327769Z | 2026-03-24T12:54:01Z |
| cleanstart-2026-mk10646 | Security fixes for CVE-2025-61729, CVE-2026-25679, CVE-2026-25934, CVE-2026-27139, CVE-2026-27142, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-9h8m-3fm2-qjrq, ghsa-fv92-fjc5-jj9h, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x applied in versions: 3.6.16-r0, 3.7.4-r0, 3.7.9-r0, 3.7.9-r1 | 2026-04-01T09:24:40.606937Z | 2026-03-24T12:53:01Z |
| cleanstart-2026-ot07577 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2026-1229 applied in versions: 3.19.0-r0, 4.0.1-r0, 4.1.0-r0 | 2026-04-01T09:24:34.526263Z | 2026-03-24T13:01:13Z |
| cleanstart-2026-cv29689 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2025-62820, CVE-2026-25793, CVE-2026-30836 applied in versions: 0.10.2-r0, 0.9.10-r0, 0.9.9-r0, 0.9.9-r1 | 2026-04-01T09:24:13.195625Z | 2026-03-24T13:01:13Z |
| cleanstart-2026-mf20926 | Security fixes for CVE-2021-38561, CVE-2022-27191, CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-58190, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 3.1.2-r3, 3.1.2-r4, 3.7.0-r0, 3.7.0-r2 | 2026-04-01T09:24:07.163057Z | 2026-03-24T13:01:13Z |
| cleanstart-2026-pv98664 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-m6hq-p25p-ffr2, ghsa-p77j-4mvh-x3m3, ghsa-pwhc-rpq9-4c8w applied in versions: 0.6.4-r5, 0.6.4-r6, 0.7.0-r4 | 2026-04-01T09:23:47.321714Z | 2026-03-25T04:34:22Z |
| cleanstart-2026-ol17158 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-m6hq-p25p-ffr2, ghsa-p77j-4mvh-x3m3, ghsa-pwhc-rpq9-4c8w applied in versions: 0.7.0-r2, 0.7.0-r3, 0.7.0-r4 | 2026-04-01T09:23:46.993269Z | 2026-03-25T04:38:39Z |
| cleanstart-2026-zw86166 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-p77j-4mvh-x3m3 applied in versions: 0.8.10-r0, 0.8.4-r0 | 2026-04-01T09:22:53.735679Z | 2026-03-25T04:41:41Z |
| cleanstart-2026-pw57640 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, CVE-2026-4427, ghsa-37cx-329c-33x3, ghsa-6g7g-w4f8-9c9x, ghsa-9h8m-3fm2-qjrq, ghsa-9mj6-hxhv-w67j, ghsa-cfpf-hrx2-8rv6, ghsa-f6x5-jh6r-wrfv, ghsa-fw7p-63qq-7hpr, ghsa-j5w8-q4qc-rx2x, ghsa-jqcq-xjh3-6g23, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x, ghsa-x6gf-mpr2-68h6 applied in versions: 1.12.1-r0, 1.12.1-r1, 1.12.1-r2 | 2026-04-01T09:22:37.368205Z | 2026-03-25T05:32:13Z |
| cleanstart-2026-ev91316 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0, 1.27.6-r1 | 2026-04-01T09:22:33.462978Z | 2026-03-25T04:58:46Z |
| cleanstart-2026-kw90815 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0, 1.27.6-r1, 1.27.8-r0 | 2026-04-01T09:22:32.438088Z | 2026-03-25T05:02:40Z |
| cleanstart-2026-hh87643 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.26.8-r0, 1.26.8-r1 | 2026-04-01T09:22:32.645637Z | 2026-03-25T04:50:32Z |
| cleanstart-2026-gk29346 | Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2025-66564, CVE-2026-1229, CVE-2026-22039, CVE-2026-22703, CVE-2026-22772, CVE-2026-23831, CVE-2026-23881, CVE-2026-24051, CVE-2026-24117, CVE-2026-24137, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-29wx-vh33-7x7r, ghsa-2x5j-vhc8-9cwm, ghsa-459x-q9hg-4gpq, ghsa-4qg8-fj49-pxjh, ghsa-4vq8-7jfc-9cvp, ghsa-6m8w-jc87-6cr7, ghsa-88jx-383q-w4qc, ghsa-95pr-fxf5-86gv, ghsa-c5q2-7r4c-mv6g, ghsa-c6gw-w398-hv78, ghsa-c77r-fh37-x2px, ghsa-f83f-xpx7-ffpw, ghsa-fv92-fjc5-jj9h, ghsa-jrr2-x33p-6hvc, ghsa-mh63-6h87-95cp, ghsa-mqqf-5wvp-8fh8, ghsa-p77j-4mvh-x3m3, ghsa-qjvc-p88j-j9rm, ghsa-r5p3-955p-5ggq, ghsa-v23v-6jw2-98fq, ghsa-v6v8-xj6m-xwqh, ghsa-xw73-rw38-6vjc applied in versions: 1.4.2-r2, 1.4.2-r4, 1.4.2-r6, 1.4.2-r7 | 2026-04-01T09:22:17.389111Z | 2026-03-25T11:02:44Z |
| cleanstart-2026-lk63891 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.29.0-r0, 1.29.1-r0 | 2026-04-01T09:22:08.586608Z | 2026-03-25T05:12:36Z |
| cleanstart-2026-jm60128 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0, 1.28.4-r1 | 2026-04-01T09:22:08.268986Z | 2026-03-25T05:05:50Z |
| cleanstart-2026-ej96468 | Security fixes for ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0, 1.28.4-r1, 1.28.5-r0 | 2026-04-01T09:22:08.656529Z | 2026-03-25T05:09:00Z |
| cleanstart-2026-ce02533 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2025-62820, CVE-2026-30836, CVE-2026-33186, ghsa-p77j-4mvh-x3m3, ghsa-q4r8-xm5f-56gw applied in versions: 0.10.1-r0, 0.9.10-r0, 0.9.9-r0, 0.9.9-r1 | 2026-04-01T09:21:33.459909Z | 2026-03-25T10:51:25Z |
| cleanstart-2026-at91215 | Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2x5j-vhc8-9cwm, ghsa-6m8w-jc87-6cr7, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-vvgc-356p-c3xw applied in versions: 1.14.4-r1, 1.14.4-r2, 1.15.3-r1, 1.15.3-r2 | 2026-04-01T09:20:36.013002Z | 2026-03-25T11:15:10Z |
| cleanstart-2026-gm18965 | Security fixes for CVE-2025-15558, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.14.2-r2 | 2026-04-01T09:20:25.238160Z | 2026-03-25T11:27:12Z |
| cleanstart-2026-ic68874 | Security fixes for CVE-2025-15558, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.13.4-r0, 2.13.4-r1 | 2026-04-01T09:20:18.599218Z | 2026-03-25T11:32:52Z |
| cleanstart-2026-ls12576 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 1.16.2-r2, 1.17.2-r0, 1.17.2-r1, 1.18.0-r0 | 2026-04-01T09:19:50.661957Z | 2026-03-25T14:09:04Z |
| cleanstart-2026-jg61689 | Security fixes for CVE-2025-15558, CVE-2026-33186, ghsa-p436-gjf2-799p applied in versions: 1.29.0-r0, 1.29.0-r1 | 2026-04-01T09:19:48.393428Z | 2026-03-25T13:59:35Z |
| cleanstart-2026-ha09227 | Security fixes for CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.18.0-r0, 0.18.0-r1 | 2026-04-01T09:19:28.951475Z | 2026-03-25T14:21:54Z |
| cleanstart-2026-pn56882 | Security fixes for CVE-2026-24051 applied in versions: 1.65.0-r0 | 2026-04-01T09:19:27.916186Z | 2026-03-25T14:07:29Z |
| cleanstart-2026-ma32024 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, CVE-2026-33186, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.2-r1, 3.3.3-r0, 3.3.4-r0 | 2026-04-01T09:19:21.169476Z | 2026-03-26T07:01:17Z |
| cleanstart-2026-ae87452 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.20.12-r0, 1.20.12-r1, 1.20.12-r2 | 2026-04-01T09:19:15.219275Z | 2026-03-25T14:22:43Z |
| cleanstart-2026-gm63718 | Security fixes for CVE-2025-15558, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-25934, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-q9hv-hpm4-hj6x applied in versions: 1.39.0-r0, 1.39.0-r1, 1.39.0-r2, 1.39.0-r3 | 2026-04-01T09:19:09.281060Z | 2026-03-25T14:21:09Z |
| cleanstart-2026-mx45462 | Security fixes for CVE-2025-61729 applied in versions: 1.1.0-r0 | 2026-04-01T09:18:16.445023Z | 2026-03-25T14:24:33Z |
| cleanstart-2026-gi40937 | Security fixes for CVE-2023-5870, CVE-2024-7348, CVE-2025-8713, CVE-2025-8714, CVE-2025-8715 applied in versions: 16.1-r0, 16.2-r0, 16.4-r0, 17.6-r0 | 2026-04-01T09:18:12.444694Z | 2026-03-26T07:01:17Z |
| cleanstart-2026-jr35772 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:17:37.864227Z | 2026-03-26T15:01:29Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2016-ALE-001 | Campagne de messages électroniques non sollicités de type Locky | 2016-02-19T00:00:00.000000 | 2016-04-07T00:00:00.000000 |
| certfr-2015-ale-015 | Campagne de messages électroniques non sollicités de type TeslaCrypt | 2015-12-21T00:00:00.000000 | 2016-03-10T00:00:00.000000 |
| CERTFR-2015-ALE-015 | Campagne de messages électroniques non sollicités de type TeslaCrypt | 2015-12-21T00:00:00.000000 | 2016-03-10T00:00:00.000000 |
| certfr-2015-ale-014 | Vulnérabilité dans Juniper ScreenOS | 2015-12-18T00:00:00.000000 | 2016-04-11T00:00:00.000000 |
| CERTFR-2015-ALE-014 | Vulnérabilité dans Juniper ScreenOS | 2015-12-18T00:00:00.000000 | 2016-04-11T00:00:00.000000 |
| certfr-2015-ale-013 | Vulnérabilité dans Joomla! | 2015-12-14T00:00:00.000000 | 2016-08-01T00:00:00.000000 |
| CERTFR-2015-ALE-013 | Vulnérabilité dans Joomla! | 2015-12-14T00:00:00.000000 | 2016-08-01T00:00:00.000000 |
| certfr-2015-ale-012 | Campagne de messages électroniques non sollicités de type Dridex | 2015-10-23T00:00:00.000000 | 2015-11-26T00:00:00.000000 |
| CERTFR-2015-ALE-012 | Campagne de messages électroniques non sollicités de type Dridex | 2015-10-23T00:00:00.000000 | 2015-11-26T00:00:00.000000 |
| certfr-2015-ale-011 | Vulnérabilité dans Adobe Flash Player | 2015-10-14T00:00:00.000000 | 2015-10-19T00:00:00.000000 |
| CERTFR-2015-ALE-011 | Vulnérabilité dans Adobe Flash Player | 2015-10-14T00:00:00.000000 | 2015-10-19T00:00:00.000000 |
| certfr-2015-ale-010 | Multiples vulnérabilités dans Google Android | 2015-07-28T00:00:00.000000 | 2015-10-06T00:00:00.000000 |
| CERTFR-2015-ALE-010 | Multiples vulnérabilités dans Google Android | 2015-07-28T00:00:00.000000 | 2015-10-06T00:00:00.000000 |
| certfr-2015-ale-009 | Vulnérabilité dans Apple Mac OS X | 2015-07-24T00:00:00.000000 | 2015-12-22T00:00:00.000000 |
| CERTFR-2015-ALE-009 | Vulnérabilité dans Apple Mac OS X | 2015-07-24T00:00:00.000000 | 2015-12-22T00:00:00.000000 |
| certfr-2015-ale-008 | Vulnérabilité dans le pilote de gestion des polices de caractères de Microsoft Windows | 2015-07-20T00:00:00.000000 | 2015-07-30T00:00:00.000000 |
| CERTFR-2015-ALE-008 | Vulnérabilité dans le pilote de gestion des polices de caractères de Microsoft Windows | 2015-07-20T00:00:00.000000 | 2015-07-30T00:00:00.000000 |
| certfr-2015-ale-007 | Vulnérabilité dans Oracle Java SE | 2015-07-13T00:00:00.000000 | 2015-07-20T00:00:00.000000 |
| CERTFR-2015-ALE-007 | Vulnérabilité dans Oracle Java SE | 2015-07-13T00:00:00.000000 | 2015-07-20T00:00:00.000000 |
| certfr-2015-ale-006 | Vulnérabilité dans Adobe Flash Player | 2015-07-11T00:00:00.000000 | 2015-07-20T00:00:00.000000 |
| CERTFR-2015-ALE-006 | Vulnérabilité dans Adobe Flash Player | 2015-07-11T00:00:00.000000 | 2015-07-20T00:00:00.000000 |
| certfr-2015-ale-005 | Vulnérabilité dans Adobe Flash Player | 2015-07-08T00:00:00.000000 | 2015-07-10T00:00:00.000000 |
| CERTFR-2015-ALE-005 | Vulnérabilité dans Adobe Flash Player | 2015-07-08T00:00:00.000000 | 2015-07-10T00:00:00.000000 |
| certfr-2015-ale-004 | Vulnérabilité dans Microsoft Internet Explorer | 2015-02-10T00:00:00.000000 | 2015-03-31T00:00:00.000000 |
| CERTFR-2015-ALE-004 | Vulnérabilité dans Microsoft Internet Explorer | 2015-02-10T00:00:00.000000 | 2015-03-31T00:00:00.000000 |
| certfr-2015-ale-003 | Nouvelle campagne d'hameçonnage de type rançongiciel | 2015-02-05T00:00:00.000000 | 2015-07-10T00:00:00.000000 |
| CERTFR-2015-ALE-003 | Nouvelle campagne d'hameçonnage de type rançongiciel | 2015-02-05T00:00:00.000000 | 2015-07-10T00:00:00.000000 |
| certfr-2015-ale-002 | Vulnérabilité dans Adobe Flash Player | 2015-02-02T00:00:00.000000 | 2015-02-05T00:00:00.000000 |
| CERTFR-2015-ALE-002 | Vulnérabilité dans Adobe Flash Player | 2015-02-02T00:00:00.000000 | 2015-02-05T00:00:00.000000 |
| certfr-2015-ale-001 | Vulnérabilité dans Adobe Flash Player | 2015-01-22T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0222 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0221 | Multiples vulnérabilités dans les produits Centreon | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0220 | Multiples vulnérabilités dans les produits Elastic | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0219 | Vulnérabilité dans Stormshield Network Security | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0218 | Multiples vulnérabilités dans les produits VMware | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0217 | Multiples vulnérabilités dans SPIP | 2026-02-26T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0216 | Vulnérabilité dans PostgreSQL | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0215 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0214 | Vulnérabilité dans Juniper Networks Junos OS Evolved | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0213 | Multiples vulnérabilités dans les produits Cisco | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0212 | Multiples vulnérabilités dans les produits Centreon | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0211 | Multiples vulnérabilités dans Wireshark | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0210 | Multiples vulnérabilités dans Cisco Catalyst SD-WAN | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0209 | Multiples vulnérabilités dans les produits VMware | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0208 | Vulnérabilité dans les produits Synology | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0207 | Multiples vulnérabilités dans GitLab | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0206 | Multiples vulnérabilités dans les produits Trend Micro | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0205 | Multiples vulnérabilités dans SolarWinds Serv-U | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0204 | Multiples vulnérabilités dans les produits Mozilla | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0203 | Vulnérabilité dans Microsoft Azure Linux | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0202 | Multiples vulnérabilités dans les produits SonicWall | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0201 | Multiples vulnérabilités dans Mattermost Server | 2026-02-24T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0200 | Vulnérabilité dans Centreon open tickets | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0199 | Multiples vulnérabilités dans les produits VMware | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0198 | Multiples vulnérabilités dans Google Chrome | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0197 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-23T00:00:00.000000 | 2026-02-23T00:00:00.000000 |
| certfr-2026-avi-0196 | Multiples vulnérabilités dans les produits IBM | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0195 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0194 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0193 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-000104 | MF Teacher Performance Management System vulnerable to cross-site scripting | 2024-09-27T15:00+09:00 | 2024-10-10T11:14+09:00 |
| jvndb-2024-000103 | The installer of e-Tax software(common program) vulnerable to privilege escalation | 2024-09-24T16:12+09:00 | 2024-09-24T16:12+09:00 |
| jvndb-2024-000102 | Multiple NTT EAST Home GateWay/Hikari Denwa routers fail to restrict access permissions | 2024-09-24T16:00+09:00 | 2024-10-18T11:02+09:00 |
| jvndb-2024-000101 | Multiple vulnerabilities in PLANEX COMMUNICATIONS network devices | 2024-09-24T15:26+09:00 | 2024-09-24T15:26+09:00 |
| jvndb-2024-008391 | Multiple vulnerabilities in TAKENAKA ENGINEERING digital video recorders | 2024-09-19T14:07+09:00 | 2024-09-19T14:07+09:00 |
| jvndb-2024-000100 | Multiple vulnerabilities in WordPress plugin "Welcart e-Commerce" | 2024-09-18T14:34+09:00 | 2024-09-18T14:34+09:00 |
| jvndb-2024-000099 | Assimp vulnerable to heap-based buffer overflow | 2024-09-18T14:20+09:00 | 2024-09-18T14:20+09:00 |
| jvndb-2020-018328 | Falsification and eavesdropping of contents across multiple websites via Web Rehosting services | 2024-09-12T12:23+09:00 | 2024-09-12T12:23+09:00 |
| jvndb-2023-027250 | Security Problem in Web Browser Permission Mechanism | 2024-09-11T18:19+09:00 | 2024-09-11T18:19+09:00 |
| jvndb-2020-018327 | Malleability attack against executables encrypted by CBC mode with no integrity check | 2024-09-11T18:19+09:00 | 2024-09-11T18:19+09:00 |
| jvndb-2024-000095 | Multiple Alps System Integration products and the OEM products vulnerable to cross-site request forgery | 2024-09-09T16:40+09:00 | 2024-09-09T16:40+09:00 |
| jvndb-2024-000096 | Pgpool-II vulnerable to information disclosure | 2024-09-09T14:58+09:00 | 2024-09-09T14:58+09:00 |
| jvndb-2024-000094 | "@cosme" App fails to restrict custom URL schemes properly | 2024-09-09T14:20+09:00 | 2024-09-09T14:20+09:00 |
| jvndb-2024-000097 | WordPress Plugin "Forminator" vulnerable to cross-site scripting | 2024-09-09T13:51+09:00 | 2024-09-09T13:51+09:00 |
| jvndb-2024-000098 | Multiple products from KINGSOFT JAPAN vulnerable to path traversal | 2024-09-06T15:07+09:00 | 2024-09-06T15:07+09:00 |
| jvndb-2024-000090 | Secure Boot bypass Vulnerability in PRIMERGY | 2024-09-06T14:39+09:00 | 2024-09-06T14:39+09:00 |
| jvndb-2024-000093 | WordPress Plugin "Advanced Custom Fields" vulnerable to cross-site scripting | 2024-09-04T13:01+09:00 | 2024-09-04T13:01+09:00 |
| jvndb-2024-007002 | Panasonic Control FPWIN Pro7 vulnerable to stack-based buffer overflow | 2024-09-02T14:57+09:00 | 2024-09-02T14:57+09:00 |
| jvndb-2024-000091 | IPCOM vulnerable to information disclosure | 2024-08-30T14:56+09:00 | 2024-08-30T14:56+09:00 |
| jvndb-2024-000092 | Multiple vulnerabilities in WordPress plugin "Carousel Slider" | 2024-08-30T13:58+09:00 | 2024-08-30T13:58+09:00 |
| jvndb-2024-000089 | WindLDR and WindO/I-NV4 store sensitive information in cleartext | 2024-08-29T15:08+09:00 | 2024-09-24T17:14+09:00 |
| jvndb-2024-006787 | xfpt vulnerable to stack-based buffer overflow | 2024-08-29T14:07+09:00 | 2024-08-29T14:07+09:00 |
| jvndb-2024-000088 | Multiple vulnerabilities in ELECOM wireless LAN routers and access points | 2024-08-27T14:40+09:00 | 2024-11-26T15:17+09:00 |
| jvndb-2024-006646 | Authentication Bypass Vulnerability in Hitachi Ops Center Common Services | 2024-08-27T12:01+09:00 | 2024-08-27T12:01+09:00 |
| jvndb-2024-006367 | Unquoted Service Path in Hitachi Device Manager | 2024-08-26T16:27+09:00 | 2024-08-26T16:27+09:00 |
| jvndb-2024-000087 | BUFFALO wireless LAN routers and wireless LAN repeaters vulnerable to OS command injection | 2024-08-23T14:17+09:00 | 2024-08-23T14:17+09:00 |
| jvndb-2024-000086 | Multiple Safie products vulnerable to improper server certificate verification | 2024-08-22T13:51+09:00 | 2024-08-29T12:23+09:00 |
| jvndb-2020-007305 | Installer of Trend Micro Security 2020 (Consumer) may insecurely load Dynamic Link Libraries | 2024-08-22T11:33+09:00 | 2024-08-22T11:33+09:00 |
| jvndb-2017-009536 | Packetbeat vulnerable to denial-of-service (DoS) | 2024-08-21T17:54+09:00 | 2024-08-21T17:54+09:00 |
| jvndb-2018-009127 | Multiple vulnerabilities in LogonTracer | 2024-08-21T17:37+09:00 | 2024-08-21T17:37+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-16136 | IBM Concert代码问题漏洞(CNVD-2026-16136) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16135 | IBM Concert加密问题漏洞(CNVD-2026-16135) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16134 | IBM Concert加密问题漏洞(CNVD-2026-16134) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16133 | IBM InfoSphere Information Server加密问题漏洞 | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16132 | IBM InfoSphere Information Server信息泄露漏洞(CNVD-2026-16132) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16131 | IBM InfoSphere Information Server信息泄露漏洞(CNVD-2026-16131) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16130 | IBM InfoSphere Information Server信息泄露漏洞(CNVD-2026-16130) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16129 | IBM InfoSphere Information Server信息泄露漏洞(CNVD-2026-16129) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16128 | IBM Concert访问控制错误漏洞(CNVD-2026-16128) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16064 | WordPress插件SMTP Mailer信息泄露漏洞 | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16058 | Apple macOS存在未明漏洞(CNVD-2026-16058) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16040 | OpenClaw路径遍历漏洞(CNVD-2026-16040) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16039 | WordPress插件Addon Jobsearch Chat跨站脚本漏洞 | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16038 | Linux kernel内存错误引用漏洞(CNVD-2026-16038) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16037 | FreeBSD缓冲区溢出漏洞(CNVD-2026-16037) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-15843 | WordPress插件Abandoned Cart Recovery for WooCommerce跨站脚本漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15842 | HCL Traveler存在未明漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15841 | HCL Aftermarket DPC硬编码漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15840 | HCL Aftermarket DPC文件上传漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15839 | HCL Aftermarket DPC跨站脚本漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15838 | HCL Aftermarket DPC访问控制错误漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15837 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15837) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15836 | HCL Aftermarket DPC输入验证错误漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15835 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15835) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15834 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15834) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15833 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15833) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15832 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15832) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15831 | HCL Aftermarket DPC会话固定漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15830 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15830) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15829 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15829) | 2026-03-31 | 2026-04-01 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01364 | Уязвимость функции ffs_func_eps_enable() модуля drivers/usb/gadget/function/f_fs.c драйве… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01363 | Уязвимость функции multiq3_attach() модуля drivers/comedi/drivers/multiq3.c поддержки уст… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01362 | Уязвимость функции dc_stream_get_scanoutpos() модуля drivers/gpu/drm/amd/display/dc/core/… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01361 | Уязвимость функции f2fs_alloc_nid() модуля fs/f2fs/node.c файловой системы F2FS ядра опер… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01360 | Уязвимость функции find_sdca_entity_control() модуля sound/soc/sdca/sdca_functions.c подд… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01359 | Уязвимость функции mptcp_do_fastclose() модуля net/mptcp/protocol.c ядра операционной сис… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01358 | Уязвимость функции pci_aer_init() модуля drivers/pci/pcie/aer.c драйвера устройств PCI я… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01357 | Уязвимость функции init_amd_zen4() модуля arch/x86/kernel/cpu/amd.c поддержки платформы x… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01356 | Уязвимость функции __page_pool_alloc_netmems_slow() модуля net/core/page_pool.c поддержки… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01355 | Уязвимость функции copy_highpage() модуля arch/arm64/mm/copypage.c поддержки платформы AR… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01354 | Уязвимость функции devlink_notify_unregister() модуля net/devlink/leftover.c реализации с… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01353 | Уязвимость механизма обеспечения безопасности программной платформы Node.js, позволяющая … | 06.02.2026 | 06.02.2026 |
| bdu:2026-01352 | Уязвимость функции stmmac_rx() ядра операционной системы Linux, позволяющая нарушителю, д… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01351 | Уязвимость функции blkg_conf_prep() модуля block/blk-cgroup.c поддержки блочного уровня я… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01350 | Уязвимость функции ufs_qcom_suspend() модуля drivers/ufs/host/ufs-qcom.c поддержки хост-к… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01349 | Уязвимость функции ext4_destroy_inline_data_nolock() модуля fs/ext4/inline.c файловой си… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01348 | Уязвимость функции ieee80211_register_hw() ядра операционной системы Linux, позволяющая н… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01347 | Уязвимость функции ext4_prepare_inline_data() модуля fs/ext4/inline.c файловой системы Ex… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01346 | Уязвимость функции stripe_io_hints() ядра операционной системы Linux, позволяющая нарушит… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01345 | Уязвимость функции bfs_iget() модуля fs/bfs/inode.c файловой системы ядра операционной си… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01344 | Уязвимость функций appendChild() и _clear_id_cache() интерпретатора языка программировани… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01343 | Уязвимость функции l2cap_connect_create_rsp() ядра операционной системы Linux, позволяюща… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01342 | Уязвимость функции machine_crash_nonpanic_core() модуля arch/arm/kernel/machine_kexec.c п… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01341 | Уязвимость функции SMB2_negotiate() ядра операционной системы Linux, позволяющая нарушите… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01340 | Уязвимость функции hfsplus_iget() модуля fs/hfsplus/super.c поддержки расширенной файлово… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01339 | Уязвимость функции hdr_find_e() ядра операционной системы Linux, позволяющая нарушителю п… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01338 | Уязвимость функции txInit() модуля fs/jfs/jfs_txnmgr.c файловой системы JFS ядра операцио… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01337 | Уязвимость функции ftrace_module_enable() модуля kernel/trace/ftrace.c поддержки трассиро… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01336 | Уязвимость функции drm_gem_dma_free() модуля drivers/gpu/drm/drm_gem_dma_helper.c драйвер… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01335 | Уязвимость функции hfs_asc2mac() ядра операционной системы Linux, позволяющая нарушителю … | 06.02.2026 | 06.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201902-0360 | In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popov… | 2024-07-23T21:44:51.239000Z |
| var-202210-0043 | The llhttp parser in the http module in Node v18.7.0 does not correctly handle header fie… | 2024-07-23T21:44:46.557000Z |
| var-200809-0187 | Finder in Apple Mac OS X 10.5.2 through 10.5.4 allows remote attackers to cause a denial … | 2024-07-23T21:44:13.542000Z |
| var-202203-0664 | BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions… | 2024-07-23T21:44:12.287000Z |
| var-201109-0214 | Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers… | 2024-07-23T21:44:12.444000Z |
| var-200901-0466 | The MD5 Message-Digest Algorithm is not collision resistant, which makes it easier for co… | 2024-07-23T21:44:12.668000Z |
| var-201202-0137 | Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote at… | 2024-07-23T21:43:37.915000Z |
| var-201806-1468 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2024-07-23T21:43:36.931000Z |
| var-201110-0321 | FreeType 2 before 2.4.7, as used in CoreGraphics in Apple iOS before 5, Mandriva Enterpri… | 2024-07-23T21:43:33.476000Z |
| var-200703-0009 | Integer overflow in Apple QuickTime before 7.1.5, when installed on Windows operating sys… | 2024-07-23T21:43:33.598000Z |
| var-200102-0029 | Cisco 600 routers running CBOS 2.4.1 and earlier allow remote attackers to cause a denial… | 2024-07-23T21:43:33.797000Z |
| var-201710-1405 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari befo… | 2024-07-23T21:43:29.001000Z |
| var-201912-0457 | A validation issue was addressed with improved logic. This issue is fixed in iOS 12.2, tv… | 2024-07-23T21:43:28.933000Z |
| var-201302-0309 | Use-after-free vulnerability in Adobe Flash Player before 10.3.183.63 and 11.x before 11.… | 2024-07-23T21:43:28.487000Z |
| var-202103-1464 | An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello m… | 2024-07-23T21:43:25.615000Z |
| var-201710-1409 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari befo… | 2024-07-23T21:43:25.189000Z |
| var-201210-0343 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:43:24.967000Z |
| var-201912-0551 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2024-07-23T21:43:21.002000Z |
| var-201211-0366 | Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on … | 2024-07-23T21:42:50.004000Z |
| var-200609-0310 | Multiple buffer overflows in Apple QuickTime before 7.1.3 allow user-assisted remote atta… | 2024-07-23T21:42:44.179000Z |
| var-200909-0789 | libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when Open… | 2024-07-23T21:42:38.375000Z |
| var-201606-0382 | Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified … | 2024-07-23T21:42:37.934000Z |
| var-201206-0058 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:42:36.964000Z |
| var-201912-1860 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:42:32.013000Z |
| var-200711-0560 | Perl-Compatible Regular Expression (PCRE) library before 7.3 backtracks too far when matc… | 2024-07-23T21:42:00.915000Z |
| var-201109-0209 | Google Chrome before 14.0.835.163 does not properly handle Cascading Style Sheets (CSS) t… | 2024-07-23T21:41:33.003000Z |
| var-201007-0319 | The counters functionality in the Cascading Style Sheets (CSS) implementation in WebKit i… | 2024-07-23T21:41:32.923000Z |
| var-201302-0136 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:41:31.932000Z |
| var-200703-0018 | Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to… | 2024-07-23T21:41:31.383000Z |
| var-201603-0222 | The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denia… | 2024-07-23T21:40:58.575000Z |