Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2024-11079 |
5.5 (3.1)
|
Ansible-core: unsafe tagging bypass via hostvars objec… |
|
|
2024-11-11T23:32:55.539Z | 2026-03-18T01:33:55.730Z |
| CVE-2024-3049 |
5.9 (3.1)
|
Booth: specially crafted hash can lead to invalid hmac… |
|
|
2024-06-06T05:30:04.137Z | 2026-03-17T21:04:05.024Z |
| CVE-2024-1132 |
8.1 (3.1)
|
Keycloak: path transversal in redirection validation |
|
|
2024-04-17T13:21:19.130Z | 2026-03-17T20:52:47.238Z |
| CVE-2026-0121 |
2.9 (3.1)
|
In VPU, there is a possible use-after-free read d… |
Google |
Android |
2026-03-10T20:46:50.360Z | 2026-03-17T20:50:55.253Z |
| CVE-2026-28470 |
9.2 (4.0)
8.1 (3.1)
|
OpenClaw < 2026.2.2 - Exec Allowlist Bypass via Comman… |
OpenClaw |
OpenClaw |
2026-03-05T21:59:46.556Z | 2026-03-17T20:49:35.556Z |
| CVE-2025-68971 |
6.5 (3.1)
|
In Forgejo through 13.0.3, the attachment compone… |
n/a |
n/a |
2026-03-16T00:00:00.000Z | 2026-03-17T20:47:45.452Z |
| CVE-2026-32981 |
8.7 (4.0)
7.5 (3.1)
|
Ray Dashboard <= 2.8.0 Path Traversal Leading to Local… |
ray-project |
Ray |
2026-03-17T19:33:50.107Z | 2026-03-17T20:28:01.758Z |
| CVE-2024-1635 |
7.5 (3.1)
|
Undertow: out-of-memory error after several closed con… |
|
|
2024-02-19T21:23:14.496Z | 2026-03-17T20:16:47.818Z |
| CVE-2026-32774 |
5.3 (4.0)
6.4 (3.1)
|
Vulnogram - Stored Cross-Site Scripting via Comment Hy… |
Vulnogram |
Vulnogram |
2026-03-14T21:44:07.130Z | 2026-03-17T20:16:37.588Z |
| CVE-2026-4358 |
6.1 (4.0)
6.4 (3.1)
|
Memory safety issues in slot-based execution hash tabl… |
MongoDB Inc |
MongoDB Server |
2026-03-17T19:00:07.518Z | 2026-03-17T20:08:24.920Z |
| CVE-2026-3563 |
5.5 (3.1)
|
Improper input validation in the apps and endpoin… |
Devolutions |
PowerShell Universal |
2026-03-17T19:15:37.820Z | 2026-03-17T20:04:00.419Z |
| CVE-2026-4064 |
8.3 (3.1)
|
Missing authorization checks on multiple gRPC ser… |
Devolutions |
PowerShell Universal |
2026-03-17T19:14:17.189Z | 2026-03-17T20:03:19.106Z |
| CVE-2026-32837 |
5.1 (4.0)
|
mackron / miniaudio Out-of-Bounds Read in BEXT Coding … |
mackron |
miniaudio |
2026-03-17T19:10:06.080Z | 2026-03-17T19:59:38.500Z |
| CVE-2026-25772 |
4.9 (3.1)
|
Wazuh Database Synchronization Vulnerable to Stack-bas… |
wazuh |
wazuh |
2026-03-17T18:11:05.707Z | 2026-03-17T18:55:55.613Z |
| CVE-2026-3207 |
8.7 (4.0)
|
TIBCO BPM Enterprise Remote Code Execution (RCE) Vulne… |
TIBCO |
TIBCO BPM Enterprise |
2026-03-17T18:20:16.934Z | 2026-03-17T18:49:27.505Z |
| CVE-2026-21570 |
8.6 (4.0)
|
This High severity RCE (Remote Code Execution) v… |
Atlassian |
Bamboo Data Center |
2026-03-17T18:00:00.907Z | 2026-03-17T18:21:46.118Z |
| CVE-2026-32291 |
7 (4.0)
6.8 (3.1)
|
GL-iNet Comet (GL-RM1) KVM unauthenticated root access… |
GL-iNet |
Comet KVM |
2026-03-17T17:18:34.947Z | 2026-03-17T18:12:50.187Z |
| CVE-2026-32294 |
4.7 (3.1)
7 (4.0)
|
JetKVM insufficient firmware verification |
JetKVM |
JetKVM |
2026-03-17T17:19:22.624Z | 2026-03-17T18:12:13.714Z |
| CVE-2026-32295 |
9.3 (4.0)
7.5 (3.1)
|
JetKVM insufficient login rate limiting |
JetKVM |
JetKVM |
2026-03-17T17:19:39.692Z | 2026-03-17T18:11:34.304Z |
| CVE-2026-32296 |
8.8 (4.0)
8.2 (3.1)
|
Sipeed NanoKVM unauthenticated Wi-Fi configuration endpoint |
Sipeed |
NanoKVM |
2026-03-17T17:19:55.013Z | 2026-03-17T18:10:26.448Z |
| CVE-2026-32297 |
9.3 (4.0)
7.5 (3.1)
|
Angeet ES3 KVM unauthenticated arbitrary file write |
ANGEET |
ES3 KVM |
2026-03-17T17:20:07.456Z | 2026-03-17T18:09:55.887Z |
| CVE-2026-32298 |
8.5 (4.0)
9.1 (3.1)
|
Angeet ES3 KVM OS command injection |
ANGEET |
ES3 KVM |
2026-03-17T17:21:56.017Z | 2026-03-17T18:09:21.367Z |
| CVE-2026-32354 |
5.3 (3.1)
|
WordPress WpEvently plugin < 5.1.9 - Sensitive Data Ex… |
magepeopleteam |
WpEvently |
2026-03-13T11:41:59.838Z | 2026-03-17T18:08:39.398Z |
| CVE-2026-25534 |
9.1 (3.1)
|
Spinnaker clouddriver and orca URL validation bypass v… |
io.spinnaker.clouddriver |
clouddriver-artifacts |
2026-03-17T17:27:41.345Z | 2026-03-17T17:58:31.817Z |
| CVE-2026-32293 |
3.7 (3.1)
6.3 (4.0)
|
GL-iNet Comet (GL-RM1) KVM insufficient certificate va… |
GL-iNet |
Comet KVM |
2026-03-17T17:19:07.549Z | 2026-03-17T17:57:19.156Z |
| CVE-2026-32292 |
9.3 (4.0)
7.5 (3.1)
|
GL-iNet Comet (GL-RM1) KVM insufficient login rate-limiting |
GL-iNet |
Comet KVM |
2026-03-17T17:18:54.851Z | 2026-03-17T17:56:30.651Z |
| CVE-2026-32290 |
7 (4.0)
4.7 (3.1)
|
GL-iNet Comet (GL-RM1) KVM insufficient firmware verif… |
GL-iNet |
Comet KVM |
2026-03-17T17:18:14.150Z | 2026-03-17T17:54:48.338Z |
| CVE-2025-0665 |
7 (3.1)
|
eventfd double close |
curl |
curl |
2025-02-05T09:16:49.038Z | 2026-03-17T17:42:06.679Z |
| CVE-2026-32398 |
5.3 (3.1)
|
WordPress TeraWallet – For WooCommerce plugin <= 1.5.1… |
Subrata Mal |
TeraWallet – For WooCommerce |
2026-03-13T11:42:11.880Z | 2026-03-17T17:28:16.367Z |
| CVE-2026-4319 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Simple Food Order System add-item.php sq… |
code-projects |
Simple Food Order System |
2026-03-17T17:02:11.472Z | 2026-03-17T17:21:02.768Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-32256 |
7.5 (3.1)
|
music-metadata has an infinite loop vulnerability in A… |
Borewit |
music-metadata |
2026-03-18T03:22:33.342Z | 2026-03-18T13:34:12.042Z |
| CVE-2026-32254 |
7.1 (3.1)
|
Kube-router Proxy Module Blindly Trusts ExternalIPs/Lo… |
cloudnativelabs |
kube-router |
2026-03-18T03:14:39.392Z | 2026-03-18T13:35:56.647Z |
| CVE-2026-3207 |
8.7 (4.0)
|
TIBCO BPM Enterprise Remote Code Execution (RCE) Vulne… |
TIBCO |
TIBCO BPM Enterprise |
2026-03-17T18:20:16.934Z | 2026-03-17T18:49:27.505Z |
| CVE-2026-31898 |
8.1 (3.1)
|
jsPDF has a PDF Object Injection via FreeText color |
parallax |
jsPDF |
2026-03-18T03:03:43.469Z | 2026-03-18T14:00:43.434Z |
| CVE-2026-31891 |
7.7 (3.1)
|
Cockpit CMS has SQL Injection in MongoLite Aggregation… |
Cockpit-HQ |
Cockpit |
2026-03-18T02:58:12.427Z | 2026-03-18T18:36:30.952Z |
| CVE-2026-31865 |
6.5 (3.1)
|
Elysia Cookie Value Prototype Pollution |
elysiajs |
elysia |
2026-03-18T02:50:55.403Z | 2026-03-18T18:39:09.024Z |
| CVE-2026-30922 |
7.5 (3.1)
|
pyasn1 Vulnerable to Denial of Service via Unbounded R… |
pyasn1 |
pyasn1 |
2026-03-18T02:29:45.857Z | 2026-03-18T20:17:53.102Z |
| CVE-2026-30884 |
9.6 (3.1)
|
mdjnelson/moodle-mod_customcert Vulnerable to Authoriz… |
mdjnelson |
moodle-mod_customcert |
2026-03-18T02:26:30.420Z | 2026-03-18T19:17:40.756Z |
| CVE-2026-30707 |
8.1 (3.1)
|
An issue was discovered in SpeedExam Online Exami… |
n/a |
n/a |
2026-03-17T00:00:00.000Z | 2026-03-18T13:36:19.311Z |
| CVE-2026-28506 |
4.3 (3.1)
|
Outline's Information Disclosure in Activity Logs allo… |
outline |
outline |
2026-03-17T15:30:24.114Z | 2026-03-17T15:45:17.053Z |
| CVE-2026-2809 |
6.7 (4.0)
|
Endpoint DLP Driver DLL |
Netskope |
Endpoint DLP Module for Netskope Client |
2026-03-17T20:20:18.698Z | 2026-03-18T19:59:38.332Z |
| CVE-2026-27895 |
4.3 (3.1)
|
LAM has incorrect regular expression in PDF export com… |
LDAPAccountManager |
lam |
2026-03-17T23:51:26.501Z | 2026-03-18T19:55:14.059Z |
| CVE-2026-27894 |
8.8 (3.1)
|
LAM has Authenticated Local File Inclusion (LFI) in PD… |
LDAPAccountManager |
lam |
2026-03-17T23:48:06.530Z | 2026-03-18T19:54:13.831Z |
| CVE-2026-27811 |
8.8 (3.1)
|
Roxy-WI has a Command Injection via diff parameter in … |
roxy-wi |
roxy-wi |
2026-03-17T23:43:05.871Z | 2026-03-18T19:53:19.520Z |
| CVE-2026-27459 |
7.2 (4.0)
|
pyOpenSSL DTLS cookie callback buffer overflow |
pyca |
pyopenssl |
2026-03-17T23:34:28.483Z | 2026-03-18T19:52:15.812Z |
| CVE-2026-27448 |
1.7 (4.0)
|
pyOpenSSL allows TLS connection bypass via unhandled c… |
pyca |
pyopenssl |
2026-03-17T23:24:30.661Z | 2026-03-18T20:18:08.768Z |
| CVE-2026-26004 |
5.7 (4.0)
|
Sentry allows unauthorized access to event data across… |
getsentry |
sentry |
2026-03-17T23:21:35.460Z | 2026-03-18T20:17:22.669Z |
| CVE-2026-26001 |
7.1 (3.1)
|
GLPI Inventory Plugin has SQL Injection on dropdown_ca… |
glpi-project |
glpi-inventory-plugin |
2026-03-17T23:18:01.387Z | 2026-03-18T20:16:53.878Z |
| CVE-2026-25937 |
6.5 (3.1)
|
GLPI has a MFA bypass |
glpi-project |
glpi |
2026-03-17T23:16:38.069Z | 2026-03-18T20:14:40.392Z |
| CVE-2026-25936 |
6.5 (3.1)
|
GLPI Vulnerable to Authenticated SQL Injection |
glpi-project |
glpi |
2026-03-17T19:41:32.444Z | 2026-03-18T20:00:30.055Z |
| CVE-2026-25772 |
4.9 (3.1)
|
Wazuh Database Synchronization Vulnerable to Stack-bas… |
wazuh |
wazuh |
2026-03-17T18:11:05.707Z | 2026-03-17T18:55:55.613Z |
| CVE-2026-25771 |
5.3 (3.1)
|
Wazuh Vulnerable to Denial of Service via Synchronous … |
wazuh |
wazuh |
2026-03-17T18:08:53.091Z | 2026-03-18T13:37:20.251Z |
| CVE-2026-25770 |
9.1 (3.1)
|
Wazuh has Privilege Escalation to Root via Cluster Pro… |
wazuh |
wazuh |
2026-03-17T18:02:07.456Z | 2026-03-18T13:05:19.277Z |
| CVE-2026-25769 |
9.1 (3.1)
|
Wazuh Cluster vulnerable to Remote Code Execution via … |
wazuh |
wazuh |
2026-03-17T17:41:08.640Z | 2026-03-18T03:55:49.623Z |
| CVE-2026-2575 |
5.3 (3.1)
|
Keycloak: keycloak: denial of service due to excessive… |
Red Hat |
Red Hat build of Keycloak 26.4 |
2026-03-18T03:19:09.858Z | 2026-03-18T13:34:42.871Z |
| CVE-2026-25534 |
9.1 (3.1)
|
Spinnaker clouddriver and orca URL validation bypass v… |
io.spinnaker.clouddriver |
clouddriver-artifacts |
2026-03-17T17:27:41.345Z | 2026-03-17T17:58:31.817Z |
| CVE-2026-25449 |
9.8 (3.1)
|
WordPress Traveler theme < 3.2.8.1 - PHP Object Inject… |
Shinetheme |
Traveler |
2026-03-18T13:12:25.884Z | 2026-03-18T20:15:56.526Z |
| CVE-2026-24901 |
8.1 (3.1)
|
Outline's IDOR allows unauthorized viewing and seizing… |
outline |
outline |
2026-03-17T15:28:28.363Z | 2026-03-17T15:46:23.976Z |
| CVE-2026-23759 |
8.6 (4.0)
7.2 (3.1)
|
Perle IOLAN STS/SCS Authenticated Command Injection vi… |
Perle Systems |
IOLAN STS |
2026-03-17T15:20:10.743Z | 2026-03-17T16:09:08.925Z |
| CVE-2026-23248 |
N/A
|
perf/core: Fix refcount bug and potential UAF in perf_mmap |
Linux |
Linux |
2026-03-18T10:05:10.070Z | 2026-03-18T16:21:48.553Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-28506 | Outline is a service that allows for collaborative documentation. Prior to 1.5.0, the events.list A… | 2026-03-17T16:16:20.940 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-2809 | Netskope was notified about a potential gap in its Endpoint DLP Module for Netskope Client on Windo… | 2026-03-17T21:16:19.640 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-27895 | LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings… | 2026-03-18T00:16:19.780 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-27894 | LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings… | 2026-03-18T00:16:19.607 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-27811 | Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to ver… | 2026-03-18T00:16:19.427 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-27459 | pyOpenSSL is a Python wrapper around the OpenSSL library. Starting in version 22.0.0 and prior to v… | 2026-03-18T00:16:19.273 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-27448 | pyOpenSSL is a Python wrapper around the OpenSSL library. Starting in version 0.14.0 and prior to v… | 2026-03-18T00:16:19.107 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-26004 | Sentry is a developer-first error tracking and performance monitoring tool. Versions prior to 26.1.… | 2026-03-18T00:16:18.943 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-26001 | The GLPI Inventory Plugin handles network discovery, inventory, software deployment, and data colle… | 2026-03-18T00:16:18.770 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-25937 | GLPI is a free Asset and IT management software package. Starting in version 11.0.0 and prior to ve… | 2026-03-18T00:16:18.570 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-25936 | GLPI is a free Asset and IT management software package. Starting in version 11.0.0 and prior to ve… | 2026-03-17T20:16:13.707 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-25772 | Wazuh is a free and open source platform used for threat prevention, detection, and response. Start… | 2026-03-17T19:16:01.260 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-25771 | Wazuh is a free and open source platform used for threat prevention, detection, and response. Start… | 2026-03-17T19:16:01.083 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-25770 | Wazuh is a free and open source platform used for threat prevention, detection, and response. Start… | 2026-03-17T18:16:15.437 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-25769 | Wazuh is a free and open source platform used for threat prevention, detection, and response. Versi… | 2026-03-17T18:16:15.267 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-2575 | A flaw was found in Keycloak. An unauthenticated remote attacker can trigger an application level D… | 2026-03-18T04:17:16.783 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-25534 | ### Impact Spinnaker updated URL Validation logic on user input to provide sanitation on user input… | 2026-03-17T18:16:15.063 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-25449 | Deserialization of Untrusted Data vulnerability in Shinetheme Traveler allows Object Injection.This… | 2026-03-18T14:16:39.297 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-24901 | Outline is a service that allows for collaborative documentation. Prior to 1.4.0, an Insecure Direc… | 2026-03-17T16:16:20.350 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-23759 | Perle IOLAN STS/SCS terminal server models with firmware versions prior to 6.0 allow authenticated … | 2026-03-17T16:16:20.127 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-23248 | In the Linux kernel, the following vulnerability has been resolved: perf/core: Fix refcount bug an… | 2026-03-18T11:16:16.863 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-23247 | In the Linux kernel, the following vulnerability has been resolved: tcp: secure_seq: add back port… | 2026-03-18T11:16:16.723 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-23246 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: bounds-check l… | 2026-03-18T11:16:16.570 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-23245 | In the Linux kernel, the following vulnerability has been resolved: net/sched: act_gate: snapshot … | 2026-03-18T11:16:16.437 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-23244 | In the Linux kernel, the following vulnerability has been resolved: nvme: fix memory allocation in… | 2026-03-18T11:16:16.270 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-23243 | In the Linux kernel, the following vulnerability has been resolved: RDMA/umad: Reject negative dat… | 2026-03-18T11:16:16.090 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-23242 | In the Linux kernel, the following vulnerability has been resolved: RDMA/siw: Fix potential NULL p… | 2026-03-18T11:16:15.887 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-22882 | An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a s… | 2026-03-17T19:16:00.780 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-22727 | Unprotected internal endpoints in Cloud Foundry Capi Release 1.226.0 and below, and CF Deployment v… | 2026-03-17T23:16:17.470 | 2026-03-18T14:52:44.227 |
| fkie_cve-2026-22323 | A CSRF vulnerability in the Link Aggregation configuration interface allows an unauthenticated remo… | 2026-03-18T08:16:30.513 | 2026-03-18T14:52:44.227 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-g4c7-xf45-99hx |
5.3 (3.1)
|
Missing Authorization vulnerability in WebberZone Contextual Related Posts allows Exploiting Incorr… | 2026-03-18T12:31:51Z | 2026-03-18T12:31:51Z |
| ghsa-rv6q-j73h-c4g9 |
7.1 (3.1)
|
A CSRF vulnerability in the Link Aggregation configuration interface allows an unauthenticated remo… | 2026-03-18T09:30:29Z | 2026-03-18T09:30:29Z |
| ghsa-mfmx-5m88-3hp5 |
7.2 (3.1)
|
A command injection vulnerability in the device’s Root CA certificate transfer workflow allows a hi… | 2026-03-18T09:30:28Z | 2026-03-18T09:30:28Z |
| ghsa-j66g-mfcw-hrf3 |
5.3 (3.1)
|
A stack-based buffer overflow in the device's Telnet/SSH CLI login routine occurs when a unauthenti… | 2026-03-18T09:30:28Z | 2026-03-18T09:30:28Z |
| ghsa-j2wh-rp49-235f |
7.1 (3.1)
|
A stored cross‑site scripting (XSS) vulnerability in the Link Aggregation configuration interface a… | 2026-03-18T09:30:28Z | 2026-03-18T09:30:28Z |
| ghsa-g2xp-c545-pvpg |
6.1 (3.1)
|
The Writeprint Stylometry plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via … | 2026-03-18T09:30:28Z | 2026-03-18T09:30:28Z |
| ghsa-c7gg-49qc-mfhm |
6.5 (3.1)
|
A remote attacker with user privileges for the webUI can use the setting of the TFTP Filename with … | 2026-03-18T09:30:28Z | 2026-03-18T09:30:28Z |
| ghsa-7hqw-92qf-g6mp |
4.9 (3.1)
|
A stack-based buffer overflow in the device's file installation workflow allows a high-privileged a… | 2026-03-18T09:30:28Z | 2026-03-18T09:30:28Z |
| ghsa-2957-vcfc-fpfc |
4.9 (3.1)
|
A stack-based buffer overflow vulnerability in the device's file transfer parameter workflow allows… | 2026-03-18T09:30:28Z | 2026-03-18T09:30:28Z |
| ghsa-26qr-26wf-xv6x |
2.4 (4.0)
|
A vulnerability found in Dahua NVR/XVR device. A third-party malicious attacker with physical acces… | 2026-03-18T09:30:28Z | 2026-03-18T09:30:28Z |
| ghsa-22m2-mv56-5hwq |
6.5 (3.1)
|
A stack-based buffer overflow in the CLI's TFTP file‑transfer command handling allows a low-privile… | 2026-03-18T09:30:28Z | 2026-03-18T09:30:28Z |
| ghsa-g2qr-3mxm-86jj |
5.8 (3.1)
|
A flaw was identified in Keycloak, an identity and access management solution, where it improperly … | 2026-03-18T06:31:20Z | 2026-03-18T06:31:20Z |
| ghsa-cp69-4955-vphq |
5.3 (3.1)
|
The Subscriptions for WooCommerce plugin for WordPress is vulnerable to unauthorized modification o… | 2026-03-18T06:31:20Z | 2026-03-18T06:31:20Z |
| ghsa-h253-w6v9-xv2v |
6.1 (3.1)
|
The [CR]Paid Link Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via … | 2026-03-18T06:31:19Z | 2026-03-18T06:31:19Z |
| ghsa-grpw-jgrw-ccqr |
7.8 (3.1)
|
Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-cre… | 2026-03-17T15:36:23Z | 2026-03-18T06:31:19Z |
| ghsa-g6qw-3gmw-m78m |
9.8 (3.1)
|
Vulnerability in the Oracle Edge Cloud Infrastructure Designer and Visualisation Toolkit product of… | 2026-03-18T00:30:54Z | 2026-03-18T06:31:19Z |
| ghsa-m6wh-wq6q-6x3j |
6.4 (3.1)
|
The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Stored Cross-Site Sc… | 2026-03-18T03:32:09Z | 2026-03-18T03:32:09Z |
| ghsa-9wx2-2pgr-5hg8 |
2.4 (3.1)
1.9 (4.0)
|
A flaw has been found in itsourcecode University Management System 1.0. Affected is an unknown func… | 2026-03-18T03:32:09Z | 2026-03-18T03:32:09Z |
| ghsa-8mvx-p2r9-r375 |
7.6 (3.1)
|
OpenClaw's web tools strict URL guard could lose DNS pinning when env proxy is configured | 2026-03-03T21:19:47Z | 2026-03-18T01:32:16Z |
| ghsa-3pxq-f3cp-jmxp |
5.3 (3.1)
|
OpenClaw: Unified root-bound write hardening for browser output and related path-boundary flows | 2026-03-03T21:20:01Z | 2026-03-18T01:31:51Z |
| ghsa-9p38-94jf-hgjj |
6.6 (3.1)
|
OpenClaw has macOS `system.run` allowlist bypass via quoted command substitution | 2026-03-03T21:41:12Z | 2026-03-18T01:31:29Z |
| ghsa-c6hr-w26q-c636 |
6.9 (4.0)
|
OpenClaw has ReDoS and regex injection via unescaped Feishu mention metadata in RegExp construction | 2026-03-02T22:17:30Z | 2026-03-18T01:30:54Z |
| ghsa-8fmp-37rc-p5g7 |
8.6 (4.0)
|
OpenClaw's config env vars allowed startup env injection into service runtime | 2026-03-03T19:53:02Z | 2026-03-18T01:30:34Z |
| ghsa-gwqp-86q6-w47g |
6.9 (4.0)
|
OpenClaw's exec allow-always can be bypassed via unrecognized multiplexer shell wrappers (busybox/t… | 2026-03-02T22:30:43Z | 2026-03-18T01:30:11Z |
| ghsa-vj3g-5px3-gr46 |
6.9 (4.0)
|
OpenClaw vulnerable to path traversal in Feishu media temp-file naming allows writes outside os.tmpdir() | 2026-03-03T18:42:28Z | 2026-03-18T01:25:43Z |
| ghsa-vmqr-rc7x-3446 |
6.4 (3.1)
|
OpenClaw's non-default safeBins sort configuration can bypass intended allowlist approval constraints | 2026-03-03T18:54:55Z | 2026-03-18T01:24:57Z |
| ghsa-5v6x-rfc3-7qfr |
8.5 (4.0)
|
OpenClaw has Windows system.run approval mismatch on cmd.exe /c trailing arguments | 2026-03-02T22:15:53Z | 2026-03-18T01:24:36Z |
| ghsa-87px-w7x5-8jjv |
3.5 (3.1)
2.0 (4.0)
|
A vulnerability was identified in TRENDnet TEW-824DRU 1.010B01/1.04B01. The impacted element is the… | 2026-03-18T00:30:55Z | 2026-03-18T00:30:55Z |
| ghsa-7cgm-xpmc-6mg5 |
3.5 (3.1)
2.0 (4.0)
|
A vulnerability was detected in Portabilis i-Educar 2.11. This impacts an unknown function of the f… | 2026-03-18T00:30:55Z | 2026-03-18T00:30:55Z |
| ghsa-x57f-4q9r-qvpp |
4.3 (3.1)
5.1 (4.0)
|
Edimax GS-5008PL firmware version 1.00.54 and prior contain a cross-site request forgery vulnerabil… | 2026-03-18T00:30:54Z | 2026-03-18T00:30:54Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2014-115 |
|
The urlopen function in pym/portage/util/_urlopen.py in Gentoo Portage 2.1.12, when using… | portage | 2014-09-29T22:55:00Z | 2024-11-21T14:22:59.10272Z |
| pysec-2011-27 |
|
The CMFEditions component 2.x in Plone 4.0.x through 4.0.9, 4.1, and 4.2 through 4.2a2 do… | products-plonehotfix20110928 | 2011-10-10T10:55:00Z | 2024-11-21T14:22:59.206417Z |
| pysec-2011-26 |
|
Unspecified vulnerability in Zope 2.12.x and 2.13.x, as used in Plone 4.0.x through 4.0.9… | products-plonehotfix20110928 | 2011-10-10T10:55:00Z | 2024-11-21T14:22:59.154748Z |
| pysec-2024-146 |
9.8 (3.1)
|
PaddlePaddle before 2.6.0 has a command injection in convert_shape_compare. This resulted… | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:58.401329+00:00 |
| pysec-2024-145 |
7.5 (3.1)
|
FPE in paddle.argmin and paddle.argmax in PaddlePaddle before 2.6.0. This flaw can cause … | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:58.341995+00:00 |
| pysec-2024-144 |
7.5 (3.1)
|
Nullptr dereference in paddle.crop in PaddlePaddle before 2.6.0. This flaw can cause a ru… | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:58.282654+00:00 |
| pysec-2024-143 |
9.8 (3.1)
|
PaddlePaddle before 2.6.0 has a command injection in _wget_download. This resulted in the… | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:58.223275+00:00 |
| pysec-2024-142 |
9.8 (3.1)
|
PaddlePaddle before 2.6.0 has a command injection in get_online_pass_interval. This resul… | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:58.166295+00:00 |
| pysec-2024-141 |
9.8 (3.1)
|
Heap buffer overflow in paddle.repeat_interleave in PaddlePaddle before 2.6.0. This flaw … | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:58.106968+00:00 |
| pysec-2024-140 |
7.5 (3.1)
|
FPE in paddle.amin in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and … | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:58.044369+00:00 |
| pysec-2024-139 |
9.8 (3.1)
|
Stack overflow in paddle.linalg.lu_unpack in PaddlePaddle before 2.6.0. This flaw can lea… | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:57.974712+00:00 |
| pysec-2024-138 |
7.5 (3.1)
|
FPE in paddle.lerp in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and … | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:57.913569+00:00 |
| pysec-2024-137 |
7.5 (3.1)
|
FPE in paddle.topk in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and … | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:57.844840+00:00 |
| pysec-2024-136 |
9.8 (3.1)
|
Stack overflow in paddle.searchsorted in PaddlePaddle before 2.6.0. This flaw can lead to… | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:57.785687+00:00 |
| pysec-2024-135 |
7.5 (3.1)
|
Nullptr in paddle.put_along_axis in PaddlePaddle before 2.6.0. This flaw can cause a runt… | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:57.726582+00:00 |
| pysec-2024-134 |
7.5 (3.1)
|
Nullptr in paddle.nextafter in PaddlePaddle before 2.6.0. This flaw can cause a runtime c… | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:57.667127+00:00 |
| pysec-2024-133 |
7.5 (3.1)
|
OOB access in paddle.mode in PaddlePaddle before 2.6.0. This flaw can cause a runtime cra… | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:57.605277+00:00 |
| pysec-2024-132 |
7.5 (3.1)
|
FPE in paddle.linalg.eig in PaddlePaddle before 2.6.0. This flaw can cause a runtime cras… | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:57.546560+00:00 |
| pysec-2024-131 |
7.5 (3.1)
|
Nullptr in paddle.dot in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash a… | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:57.485379+00:00 |
| pysec-2024-130 |
7.5 (3.1)
|
FPE in paddle.linalg.matrix_rank in PaddlePaddle before 2.6.0. This flaw can cause a runt… | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:57.427583+00:00 |
| pysec-2024-129 |
7.5 (3.1)
|
FPE in paddle.nanmedian in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash… | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:57.364643+00:00 |
| pysec-2022-43143 |
6.5 (3.1)
|
OpenZeppelin Contracts for Cairo is a library for contract development written in Cairo f… | openzeppelin-cairo-contracts-test | 2022-07-15T18:15:00Z | 2024-11-21T14:22:57.304802Z |
| pysec-2022-43142 |
7.8 (3.1)
|
Unverified Password Change in GitHub repository octoprint/octoprint prior to 1.8.3. | octoprint | 2022-08-22T12:15:00+00:00 | 2024-11-21T14:22:57.145370+00:00 |
| pysec-2018-153 |
5.5 (3.1)
|
Open Chinese Convert (OpenCC) 1.0.5 allows attackers to cause a denial of service (segmen… | opencc-py | 2018-09-13T02:29:00Z | 2024-11-21T14:22:57.249534Z |
| pysec-2014-114 |
|
Cross-site scripting (XSS) vulnerability in lua/host_details.lua in ntopng 1.1 allows rem… | ntopng | 2014-06-19T10:50:00Z | 2024-11-21T14:22:57.09034Z |
| pysec-2013-45 |
|
keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an i… | nova | 2013-12-27T01:55:00Z | 2024-11-21T14:22:56.793365Z |
| pysec-2012-41 |
|
OpenStack Compute (Nova) Folsom before 2012.2.2 and Grizzly, when using libvirt and LVM b… | nova | 2012-12-26T22:55:00Z | 2024-11-21T14:22:56.616552Z |
| pysec-2012-40 |
|
The Nova scheduler in OpenStack Compute (Nova) Folsom (2012.2) and Essex (2012.1), when D… | nova | 2012-07-17T21:55:00Z | 2024-11-21T14:22:56.558714Z |
| pysec-2012-39 |
|
virt/disk/api.py in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), and Diablo … | nova | 2012-07-22T16:55:00Z | 2024-11-21T14:22:56.493974Z |
| pysec-2012-38 |
|
Directory traversal vulnerability in virt/disk/api.py in OpenStack Compute (Nova) Folsom … | nova | 2012-07-22T16:55:00Z | 2024-11-21T14:22:56.434839Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33654 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.212436Z |
| gsd-2024-33653 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.211438Z |
| gsd-2024-33652 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.279059Z |
| gsd-2024-33651 | Cross-Site Request Forgery (CSRF) vulnerability in Matthew Fries MF Gig Calendar.This iss… | 2024-04-26T05:02:19.207978Z |
| gsd-2024-33650 | Cross-Site Request Forgery (CSRF) vulnerability in Cryout Creations Serious Slider.This i… | 2024-04-26T05:02:19.172076Z |
| gsd-2024-33649 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.185793Z |
| gsd-2024-33648 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.149332Z |
| gsd-2024-33647 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.188223Z |
| gsd-2024-33646 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.206029Z |
| gsd-2024-33645 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.239357Z |
| gsd-2024-33644 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.256945Z |
| gsd-2024-33643 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.131060Z |
| gsd-2024-33642 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-26T05:02:19.166814Z |
| gsd-2024-33641 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.213153Z |
| gsd-2024-33640 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.209462Z |
| gsd-2024-33639 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-26T05:02:19.283203Z |
| gsd-2024-33638 | Cross-Site Request Forgery (CSRF) vulnerability in Brijesh Kothari Smart Maintenance Mode… | 2024-04-26T05:02:19.155155Z |
| gsd-2024-33637 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.257652Z |
| gsd-2024-33636 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.188953Z |
| gsd-2024-33635 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.164031Z |
| gsd-2024-33634 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.138995Z |
| gsd-2024-33633 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.141967Z |
| gsd-2024-33632 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.238835Z |
| gsd-2024-33631 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.242437Z |
| gsd-2024-33630 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.283884Z |
| gsd-2024-33629 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.165154Z |
| gsd-2024-33628 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.149995Z |
| gsd-2024-33627 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.157764Z |
| gsd-2024-4226 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.358460Z |
| gsd-2024-4225 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.423760Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1292 | Malicious code in odds-analyzer (npm) | 2026-03-09T16:01:36Z | 2026-03-09T16:01:36Z |
| mal-2026-1291 | Malicious code in requests-lite (PyPI) | 2026-03-09T10:21:44Z | 2026-03-09T10:21:44Z |
| mal-2026-1290 | Malicious code in remjsonparse (PyPI) | 2026-03-09T10:09:35Z | 2026-03-09T10:09:35Z |
| mal-2026-870 | Malicious code in b10connoisseur (PyPI) | 2026-02-12T12:10:26Z | 2026-03-08T22:44:03Z |
| mal-2026-1092 | Malicious code in jwrincident (PyPI) | 2026-02-28T22:36:00Z | 2026-03-08T19:40:48Z |
| mal-2026-1289 | Malicious code in aioutil3 (PyPI) | 2026-03-08T19:35:54Z | 2026-03-08T19:35:54Z |
| mal-2026-1288 | Malicious code in arnavtest123 (PyPI) | 2026-03-08T19:01:20Z | 2026-03-08T19:01:20Z |
| mal-2026-1286 | Malicious code in demozecosse (PyPI) | 2026-03-08T16:29:43Z | 2026-03-08T16:29:43Z |
| mal-2026-1283 | Malicious code in demozecob (PyPI) | 2026-03-08T14:53:48Z | 2026-03-08T14:53:48Z |
| mal-2026-1285 | Malicious code in demozecox (PyPI) | 2026-03-08T14:52:48Z | 2026-03-08T14:52:48Z |
| mal-2026-1284 | Malicious code in demozecosso (PyPI) | 2026-03-08T14:52:35Z | 2026-03-08T14:52:35Z |
| mal-2026-1282 | Malicious code in xmrig-miner (PyPI) | 2026-03-08T14:15:50Z | 2026-03-08T14:15:50Z |
| mal-2026-1280 | Malicious code in py-sysbench (PyPI) | 2026-03-08T14:15:27Z | 2026-03-08T14:15:27Z |
| mal-2026-1279 | Malicious code in cpucheck (PyPI) | 2026-03-08T14:14:08Z | 2026-03-08T14:14:08Z |
| mal-2026-1281 | Malicious code in pyutils-helper (PyPI) | 2026-03-08T14:13:30Z | 2026-03-08T14:13:30Z |
| mal-2026-1274 | Malicious code in test-mal-npm-pkg-not-local (npm) | 2026-03-06T14:26:46Z | 2026-03-08T01:39:48Z |
| mal-2026-1273 | Malicious code in test-mal-npm-pkg-local (npm) | 2026-03-06T14:26:46Z | 2026-03-08T01:39:48Z |
| mal-2026-1272 | Malicious code in test-mal-npm-pkg-2 (npm) | 2026-03-06T14:26:46Z | 2026-03-08T01:39:48Z |
| mal-2026-1258 | Malicious code in tether-dev-docs (npm) | 2026-03-06T00:01:05Z | 2026-03-08T01:39:48Z |
| mal-2026-1242 | Malicious code in yaml-manifest-utils-mynarratorai (npm) | 2026-03-04T18:39:41Z | 2026-03-08T01:39:48Z |
| mal-2026-1221 | Malicious code in xrpl-dev-portal (npm) | 2026-03-03T15:37:29Z | 2026-03-08T01:39:48Z |
| mal-2026-1215 | Malicious code in whop-sdk (npm) | 2026-03-03T06:54:17Z | 2026-03-08T01:39:48Z |
| mal-2026-1214 | Malicious code in typescript-constructors (npm) | 2026-03-03T06:42:40Z | 2026-03-08T01:39:48Z |
| mal-2026-1213 | Malicious code in turbo-json-parser (npm) | 2026-03-03T06:43:35Z | 2026-03-08T01:39:48Z |
| mal-2026-1184 | Malicious code in web-prompt (npm) | 2026-03-03T06:18:43Z | 2026-03-08T01:39:48Z |
| mal-2026-1181 | Malicious code in webnochs (npm) | 2026-03-03T05:29:56Z | 2026-03-08T01:39:48Z |
| mal-2026-1180 | Malicious code in webnoch (npm) | 2026-03-03T05:29:56Z | 2026-03-08T01:39:48Z |
| mal-2026-1164 | Malicious code in yazxzpedia-libsignal (npm) | 2026-03-03T04:08:41Z | 2026-03-08T01:39:48Z |
| mal-2026-1163 | Malicious code in xpack-video-submission (npm) | 2026-03-03T04:08:35Z | 2026-03-08T01:39:48Z |
| mal-2026-1162 | Malicious code in xpack-test-3.0 (npm) | 2026-03-03T04:08:35Z | 2026-03-08T01:39:48Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2249 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-09T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2230 | Python (CPython Zipfile Module): Schwachstelle ermöglicht Manipulation von Dateien | 2025-10-07T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2170 | Linux Kernel: Mehrere Schwachstellen | 2025-09-30T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2098 | IBM SPSS: Mehrere Schwachstellen | 2025-09-21T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2060 | VMware Tanzu Spring Framework und Spring Security: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-09-15T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2053 | Linux Kernel: Mehrere Schwachstellen | 2025-09-15T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2049 | gdk-pixbuf: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-09-14T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2023 | cURL: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-09-09T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1978 | Red Hat OpenShift GitOps (Argo CD): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-09-04T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1832 | VMware Tanzu Spring Framework: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-08-13T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1810 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-08-12T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1718 | Red Hat Enterprise Linux (gdk-pixbuf): Schwachstelle ermöglicht Denial of Service | 2025-08-04T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1664 | Python: Schwachstelle ermöglicht Denial of Service | 2025-07-28T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1540 | Apache Commons Lang: Schwachstelle ermöglicht Denial of Service | 2025-07-13T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1522 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-09T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1470 | Python (CPython): Schwachstelle ermöglicht Denial of Service | 2025-07-07T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1460 | PHP: Mehrere Schwachstellen | 2025-07-03T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-0879 | BusyBox: Mehrere Schwachstellen | 2025-04-23T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-0635 | RabbitMQ: Schwachstelle ermöglicht Cross-Site Scripting | 2025-03-25T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-0633 | Gitea: Mehrere Schwachstellen | 2025-03-25T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2024-3176 | Eclipse Jetty: Mehrere Schwachstellen | 2024-10-14T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2024-2044 | Django: Mehrere Schwachstellen | 2024-09-03T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2024-1775 | Django: Mehrere Schwachstellen | 2024-08-06T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2024-1569 | Django: Mehrere Schwachstellen | 2024-07-09T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2024-1530 | OpenJPEG: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-07-04T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2023-2386 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-09-18T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2023-2001 | AMD Prozessoren: Mehrere Schwachstellen | 2023-08-08T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2023-1957 | Linux Kernel: Mehrere Schwachstellen | 2023-08-03T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2023-0183 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-01-23T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0222 | PyTorch: Schwachstelle ermöglicht Codeausführung | 2026-01-26T23:00:00.000+00:00 | 2026-01-27T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-268-01 | Dingtian DT-R002 | 2025-09-25T06:00:00.000000Z | 2025-09-25T06:00:00.000000Z |
| icsa-25-140-07 | Schneider Electric Galaxy VS, Galaxy VL, Galaxy VXL (Update A) | 2025-05-13T04:00:00.000000Z | 2025-09-24T04:00:00.000000Z |
| icsa-25-266-04 | Viessmann Vitogate 300 | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| icsa-25-266-02 | Mitsubishi Electric MELSEC-Q Series CPU Module | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| icsa-25-266-01 | AutomationDirect CLICK PLUS | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| va-25-265-01 | Airship AI MFA bypass and default credentials vulnerabilities | 2025-09-22T14:06:13Z | 2025-09-22T14:06:13Z |
| icsa-25-261-07 | Dover Fueling Solutions ProGauge MagLink LX4 Devices | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-06 | Cognex In-Sight Explorer and In-Sight Camera Firmware | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-03 | Schneider Electric Saitel DR & Saitel DP Remote Terminal Unit | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-02 | Westermo Network Technologies WeOS 5 | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-01 | Westermo Network Technologies WeOS 5 | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-254-10 | Daikin Europe N.V Security Gateway | 2025-09-11T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-191-10 | End-of-Train and Head-of-Train Remote Linking Protocol (Update C) | 2025-07-10T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-24-030-02 | Mitsubishi Electric FA Engineering Software Products (Update D) | 2024-01-30T07:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-259-07 | Delta Electronics DIALink | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-06 | Siemens Multiple Industrial Products | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-05 | Siemens OpenSSL Vulnerability in Industrial Products | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-04 | Siemens RUGGEDCOM, SINEC NMS, and SINEMA | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-03 | Siemens SIMATIC NET CP, SINEMA and SCALANCE | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-02 | Hitachi Energy RTU500 series | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| va-25-259-01 | CISA Thorium multiple vulnerabilities | 2025-09-16T00:00:00Z | 2025-09-16T00:00:00Z |
| va-25-258-01 | psPAS does not enforce TLS 1.2 within Get-PASSAMLResponse | 2025-09-15T18:41:08Z | 2025-09-15T18:41:08Z |
| va-25-174-01 | OPEXUS FOIAXpress Public Access Link (PAL) multiple vulnerabilities | 2025-07-31T17:01:09Z | 2025-09-09T21:12:34Z |
| va-25-252-01 | OPEXUS FOIAXpress Public Access Link (PAL) SQL injection | 2025-09-09T20:48:26Z | 2025-09-09T20:48:26Z |
| icsa-25-093-01 | Hitachi Energy RTU500 Series (Update B) | 2025-03-25T12:30:00.000000Z | 2025-09-09T12:30:00.000000Z |
| icsa-25-252-09 | Rockwell Automation 1783-NATR | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-07 | Rockwell Automation ControlLogix 5580 | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-06 | Rockwell Automation CompactLogix® 5480 | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-05 | Rockwell Automation FactoryTalk Activation Manager | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-04 | Rockwell Automation FactoryTalk Optix | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-asaftd-ikev2-dos-9FgEyHsF | Cisco Adaptive Security Appliance and Firepower Threat Defense Software IKEv2 VPN Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-dap-dos-bhekp7n | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Dynamic Access Policies Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-dap-dos-bhEkP7n | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Dynamic Access Policies Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-bf-dos-vdzhlqrw | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access VPN Brute Force Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-bf-dos-vDZhLqrW | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access VPN Brute Force Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-nyh3fhp | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access SSL VPN Authentication Targeted Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-nyH3fhp | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access SSL VPN Authentication Targeted Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-czf8gt | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access VPN Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-cZf8gT | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access VPN Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-4gyewmkg | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access SSL VPN Authentication Targeted Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-4gYEWMKg | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access SSL VPN Authentication Targeted Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-tls-cwy6zxb | Cisco Adaptive Security Appliance and Firepower Threat Defense Software TLS Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-tls-CWY6zXB | Cisco Adaptive Security Appliance and Firepower Threat Defense Software TLS Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ssh-rce-graupeuf | Cisco Adaptive Security Appliance Software SSH Remote Command Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ssh-rce-gRAuPEUF | Cisco Adaptive Security Appliance Software SSH Remote Command Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ssh-dos-eedwu5rm | Cisco Adaptive Security Appliance Software SSH Server Resource Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ssh-dos-eEDWu5RM | Cisco Adaptive Security Appliance Software SSH Server Resource Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ftd-priv-esc-hbs9gnwq | Cisco Adaptive Security Appliance and Firepower Threat Defense Software FXOS CLI Root Privilege Escalation Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ftd-priv-esc-hBS9gnwq | Cisco Adaptive Security Appliance and Firepower Threat Defense Software FXOS CLI Root Privilege Escalation Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-fmc-code-inj-wshrgz8l | Cisco Firepower Threat Defense Software and Firepower Management Center Software Code Injection Vulnerability | 2023-11-01T16:00:00+00:00 | 2024-10-23T15:57:47+00:00 |
| cisco-sa-ftd-fmc-code-inj-wSHrgz8L | Cisco Firepower Threat Defense Software and Firepower Management Center Software Code Injection Vulnerability | 2023-11-01T16:00:00+00:00 | 2024-10-23T15:57:47+00:00 |
| cisco-sa-ucsc-bkpsky-tgj5f73j | Cisco UCS Central Software Configuration Backup Information Disclosure Vulnerability | 2024-10-16T16:00:00+00:00 | 2024-10-16T16:00:00+00:00 |
| cisco-sa-ucsc-bkpsky-TgJ5f73J | Cisco UCS Central Software Configuration Backup Information Disclosure Vulnerability | 2024-10-16T16:00:00+00:00 | 2024-10-16T16:00:00+00:00 |
| cisco-sa-ccmpdm-rxss-tax76u3k | Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability | 2024-10-16T16:00:00+00:00 | 2024-10-16T16:00:00+00:00 |
| cisco-sa-ccmpdm-rxss-tAX76U3k | Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability | 2024-10-16T16:00:00+00:00 | 2024-10-16T16:00:00+00:00 |
| cisco-sa-vlan-dos-27pur5rt | Cisco Catalyst 9000 Series Switches Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-10-04T21:53:25+00:00 |
| cisco-sa-vlan-dos-27Pur5RT | Cisco Catalyst 9000 Series Switches Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-10-04T21:53:25+00:00 |
| cisco-sa-sb-rv04x_rv32x_vulns-yj2osdhv | Cisco Small Business RV042, RV042G, RV320, and RV325 Routers Denial of Service and Remote Code Execution Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV | Cisco Small Business RV042, RV042G, RV320, and RV325 Routers Denial of Service and Remote Code Execution Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-rv34x-privesc-rce-qe33tcms | Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Privilege Escalation and Remote Command Execution Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-21825 | bpf: Cancel the running bpf_timer through kworker for PREEMPT_RT | 2025-03-02T00:00:00.000Z | 2026-03-04T14:40:30.000Z |
| msrc_cve-2025-39981 | Bluetooth: MGMT: Fix possible UAFs | 2025-10-02T00:00:00.000Z | 2026-03-04T14:40:23.000Z |
| msrc_cve-2025-22109 | ax25: Remove broken autobind | 2025-04-02T00:00:00.000Z | 2026-03-04T14:40:23.000Z |
| msrc_cve-2024-47662 | drm/amd/display: Remove register from DCN35 DMCUB diagnostic collection | 2024-10-01T07:00:00.000Z | 2026-03-04T14:40:21.000Z |
| msrc_cve-2025-39940 | dm-stripe: fix a possible integer overflow | 2025-10-02T00:00:00.000Z | 2026-03-04T14:40:17.000Z |
| msrc_cve-2024-41045 | bpf: Defer work in bpf_timer_cancel_and_free | 2024-07-01T07:00:00.000Z | 2026-03-04T14:40:16.000Z |
| msrc_cve-2024-46870 | drm/amd/display: Disable DMCUB timeout for DCN35 | 2024-10-01T07:00:00.000Z | 2026-03-04T14:40:13.000Z |
| msrc_cve-2025-39932 | smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work) | 2025-10-02T00:00:00.000Z | 2026-03-04T14:40:10.000Z |
| msrc_cve-2025-22125 | md/raid1,raid10: don't ignore IO flags | 2025-04-02T00:00:00.000Z | 2026-03-04T14:40:09.000Z |
| msrc_cve-2024-47661 | drm/amd/display: Avoid overflow from uint32_t to uint8_t | 2024-10-01T07:00:00.000Z | 2026-03-04T14:40:06.000Z |
| msrc_cve-2025-55554 | pytorch v2.8.0 was discovered to contain an integer overflow in the component torch.nan_to_num-.long(). | 2025-09-02T00:00:00.000Z | 2026-03-04T14:40:03.000Z |
| msrc_cve-2025-37861 | scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue | 2025-05-02T00:00:00.000Z | 2026-03-04T14:40:03.000Z |
| msrc_cve-2024-44951 | serial: sc16is7xx: fix TX fifo corruption | 2024-09-01T07:00:00.000Z | 2026-03-04T14:39:59.000Z |
| msrc_cve-2025-55551 | An issue in the component torch.linalg.lu of pytorch v2.8.0 allows attackers to cause a Denial of Service (DoS) when performing a slice operation. | 2025-09-02T00:00:00.000Z | 2026-03-04T14:39:56.000Z |
| msrc_cve-2025-4574 | Crossbeam-channel: crossbeam-channel vulnerable to double free on drop | 2025-05-02T00:00:00.000Z | 2026-03-04T14:39:52.000Z |
| msrc_cve-2024-46834 | ethtool: fail closed if we can't get max channel used in indirection tables | 2024-09-01T07:00:00.000Z | 2026-03-04T14:39:52.000Z |
| msrc_cve-2025-39905 | net: phylink: add lock for serializing concurrent pl->phydev writes with resolver | 2025-10-02T00:00:00.000Z | 2026-03-04T14:39:48.000Z |
| msrc_cve-2025-22070 | fs/9p: fix NULL pointer dereference on mkdir | 2025-04-02T00:00:00.000Z | 2026-03-04T14:39:44.000Z |
| msrc_cve-2025-39901 | i40e: remove read access to debugfs files | 2025-10-02T00:00:00.000Z | 2026-03-04T14:39:41.000Z |
| msrc_cve-2025-4035 | Libsoup: cookie domain validation bypass via uppercase characters in libsoup | 2025-04-02T00:00:00.000Z | 2026-03-04T14:39:37.000Z |
| msrc_cve-2025-39927 | ceph: fix race condition validating r_parent before applying state | 2025-10-02T00:00:00.000Z | 2026-03-04T14:39:33.000Z |
| msrc_cve-2024-46727 | drm/amd/display: Add otg_master NULL check within resource_log_pipe_topology_update | 2024-09-01T07:00:00.000Z | 2026-03-04T14:39:32.000Z |
| msrc_cve-2025-46327 | Go Snowflake Driver has race condition when checking access to Easy Logging configuration file | 2025-04-02T00:00:00.000Z | 2026-03-04T14:39:30.000Z |
| msrc_cve-2025-39859 | ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog | 2025-09-02T00:00:00.000Z | 2026-03-04T14:39:26.000Z |
| msrc_cve-2024-46730 | drm/amd/display: Ensure array index tg_inst won't be -1 | 2024-09-01T07:00:00.000Z | 2026-03-04T14:39:25.000Z |
| msrc_cve-2025-37860 | sfc: fix NULL dereferences in ef100_process_design_param() | 2025-04-02T00:00:00.000Z | 2026-03-04T14:39:23.000Z |
| msrc_cve-2025-39850 | vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects | 2025-09-02T00:00:00.000Z | 2026-03-04T14:39:18.000Z |
| msrc_cve-2025-46394 | In tar in BusyBox through 1.37.0, a TAR archive can have filenames hidden from a listing through the use of terminal escape sequences. | 2025-04-02T00:00:00.000Z | 2026-03-04T14:39:17.000Z |
| msrc_cve-2025-39862 | wifi: mt76: mt7915: fix list corruption after hardware restart | 2025-09-02T00:00:00.000Z | 2026-03-04T14:39:12.000Z |
| msrc_cve-2024-58251 | In netstat in BusyBox through 1.37.0, local users can launch of network application with an argv[0] containing an ANSI terminal escape sequence, leading to a denial of service (terminal locked up) when netstat is used by a victim. | 2025-04-02T00:00:00.000Z | 2026-03-04T14:39:10.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0173 | Kwetsbaarheid verholpen in Cisco Identity Services Engine | 2025-05-22T08:14:06.046824Z | 2025-05-22T08:14:06.046824Z |
| ncsc-2025-0172 | Kwetsbaarheden verholpen in Cisco Webex | 2025-05-22T08:13:51.228348Z | 2025-05-22T08:13:51.228348Z |
| ncsc-2025-0171 | Kwetsbaarheden verholpen in VMware producten | 2025-05-21T13:08:22.714183Z | 2025-05-21T13:08:22.714183Z |
| ncsc-2025-0170 | Kwetsbaarheden verholpen in VMware Cloud Foundation | 2025-05-21T09:12:05.676292Z | 2025-05-21T09:12:05.676292Z |
| ncsc-2025-0169 | Kwetsbaarheden verholpen in Google Chrome | 2025-05-16T12:41:47.685095Z | 2025-05-16T12:41:47.685095Z |
| ncsc-2025-0152 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager Mobile (EPMM, voormalig MobileIron) | 2025-05-13T15:35:45.784542Z | 2025-05-16T09:42:15.822544Z |
| ncsc-2025-0168 | Kwetsbaarheid verholpen in FortiVoice | 2025-05-14T13:50:54.001151Z | 2025-05-14T13:50:54.001151Z |
| ncsc-2025-0167 | Kwetsbaarheden verholpen in Zoho ManageEngine | 2025-05-14T13:19:58.768414Z | 2025-05-14T13:19:58.768414Z |
| ncsc-2025-0166 | Kwetsbaarheden verholpen in Fortinet producten | 2025-05-14T08:41:08.980708Z | 2025-05-14T08:41:08.980708Z |
| ncsc-2025-0165 | Kwetsbaarheid verholpen in Adobe Illustrator | 2025-05-14T08:25:17.869407Z | 2025-05-14T08:25:17.869407Z |
| ncsc-2025-0164 | Kwetsbaarheden verholpen in Adobe Photoshop | 2025-05-14T08:24:02.186984Z | 2025-05-14T08:24:02.186984Z |
| ncsc-2025-0163 | Kwetsbaarheden verholpen in Adobe Animate | 2025-05-14T08:21:49.917725Z | 2025-05-14T08:21:49.917725Z |
| ncsc-2025-0162 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2025-05-14T08:18:54.775740Z | 2025-05-14T08:18:54.775740Z |
| ncsc-2025-0161 | Kwetsbaarheid verholpen in Ivanti Neurons for ITSM | 2025-05-14T08:16:04.867590Z | 2025-05-14T08:16:04.867590Z |
| ncsc-2025-0160 | Kwetsbaarheden verholpen in Siemens producten | 2025-05-14T07:13:32.957900Z | 2025-05-14T07:13:32.957900Z |
| ncsc-2025-0159 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-05-13T19:47:12.555983Z | 2025-05-13T19:47:12.555983Z |
| ncsc-2025-0158 | Kwetsbaarheden verholpen in Microsoft Edge | 2025-05-13T19:17:52.478234Z | 2025-05-13T19:17:52.478234Z |
| ncsc-2025-0157 | Kwetsbaarheden verholpen in Microsoft Defender | 2025-05-13T19:14:25.545635Z | 2025-05-13T19:14:25.545635Z |
| ncsc-2025-0156 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-05-13T19:10:10.012472Z | 2025-05-13T19:10:10.012472Z |
| ncsc-2025-0155 | Kwetsbaarheden verholpen in Microsoft Office | 2025-05-13T18:58:56.989073Z | 2025-05-13T18:58:56.989073Z |
| ncsc-2025-0154 | Kwetsbaarheden verholpen in Microsoft Dynamics Dataverse | 2025-05-13T18:44:03.290810Z | 2025-05-13T18:44:03.290810Z |
| ncsc-2025-0153 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-05-13T18:35:28.760017Z | 2025-05-13T18:35:28.760017Z |
| ncsc-2025-0151 | Kwetsbaarheden verholpen in Apple macOS | 2025-05-13T09:19:37.094950Z | 2025-05-13T09:19:37.094950Z |
| ncsc-2025-0150 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-05-13T09:14:44.606584Z | 2025-05-13T09:14:44.606584Z |
| ncsc-2025-0149 | Kwetsbaarheden verholpen in SAP producten | 2025-05-13T09:05:38.110295Z | 2025-05-13T09:05:38.110295Z |
| ncsc-2025-0148 | Kwetsbaarheden verholpen in ASUS DriverHub | 2025-05-12T13:22:18.034442Z | 2025-05-12T13:22:18.034442Z |
| ncsc-2025-0147 | Kwetsbaarheden verholpen in F5 BIG-IP | 2025-05-09T08:07:32.002935Z | 2025-05-09T08:07:32.002935Z |
| ncsc-2025-0146 | Kwetsbaarheden verholpen in Cisco IOS XE Software | 2025-05-08T08:43:57.415709Z | 2025-05-08T08:43:57.415709Z |
| ncsc-2025-0145 | Kwetsbaarheden verholpen in SonicWall SMA100 | 2025-05-08T08:40:26.301646Z | 2025-05-08T08:40:26.301646Z |
| ncsc-2025-0144 | Kwetsbaarheden verholpen in SysAid On-Prem | 2025-05-08T06:56:21.378830Z | 2025-05-08T06:56:21.378830Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10136-1 | java-1_8_0-openjdk-1.8.0.482-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10135-1 | java-1_8_0-openj9-1.8.0.482-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10134-1 | java-17-openj9-17.0.18.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10133-1 | java-11-openj9-11.0.30.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10132-1 | freerdp-3.22.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:20156-1 | Security update for chromium | 2026-02-02T17:20:43Z | 2026-02-02T17:20:43Z |
| opensuse-su-2026:20152-1 | Security update for openssl-3 | 2026-02-02T13:00:02Z | 2026-02-02T13:00:02Z |
| opensuse-su-2026:20151-1 | Security update for wireshark | 2026-02-02T12:56:02Z | 2026-02-02T12:56:02Z |
| opensuse-su-2026:20150-1 | Security update for glib2 | 2026-02-02T12:41:24Z | 2026-02-02T12:41:24Z |
| opensuse-su-2026:20145-1 | Security update for the Linux Kernel | 2026-02-02T11:54:26Z | 2026-02-02T11:54:26Z |
| opensuse-su-2026:20148-1 | Security update for dpdk | 2026-02-02T11:12:33Z | 2026-02-02T11:12:33Z |
| opensuse-su-2026:20147-1 | Security update for python-wheel | 2026-02-02T09:49:12Z | 2026-02-02T09:49:12Z |
| opensuse-su-2026:10131-1 | trivy-0.69.0-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10130-1 | python311-PyNaCl-1.6.2-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10129-1 | libmlt++-7-7-7.36.1-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10128-1 | MozillaThunderbird-140.7.1-1.1 on GA media | 2026-01-31T00:00:00Z | 2026-01-31T00:00:00Z |
| opensuse-su-2026:20144-1 | Security update for python-filelock | 2026-01-30T21:24:37Z | 2026-01-30T21:24:37Z |
| opensuse-su-2026:20143-1 | Security update for java-25-openjdk | 2026-01-30T15:55:47Z | 2026-01-30T15:55:47Z |
| opensuse-su-2026:20140-1 | Security update for alloy | 2026-01-30T14:38:31Z | 2026-01-30T14:38:31Z |
| opensuse-su-2026:20141-1 | Security update for udisks2 | 2026-01-30T14:30:57Z | 2026-01-30T14:30:57Z |
| opensuse-su-2026:20142-1 | Security update for libsoup | 2026-01-30T14:27:58Z | 2026-01-30T14:27:58Z |
| opensuse-su-2026:20139-1 | Security update for unbound | 2026-01-30T10:05:07Z | 2026-01-30T10:05:07Z |
| opensuse-su-2026:20138-1 | Security update for jasper | 2026-01-30T09:59:14Z | 2026-01-30T09:59:14Z |
| opensuse-su-2026:10127-1 | rekor-1.5.0-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10126-1 | python315-3.15.0~a3-3.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10125-1 | python311-django-storages-1.14.6-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10124-1 | golang-github-prometheus-prometheus-3.9.1-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10123-1 | freerdp-3.21.0-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10122-1 | fontforge-20251009-4.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10121-1 | chromedriver-144.0.7559.109-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:7198 | Red Hat Security Advisory: OpenShift Container Platform 4.15.0 bug fix and security update | 2024-02-27T20:49:10+00:00 | 2026-03-18T20:57:23+00:00 |
| rhsa-2023:6894 | Red Hat Security Advisory: OpenShift Container Platform 4.12.44 bug fix and security update | 2023-11-21T12:36:12+00:00 | 2026-03-18T20:57:23+00:00 |
| rhsa-2023:6893 | Red Hat Security Advisory: OpenShift Container Platform 4.12.44 security and extras update | 2023-11-21T12:20:30+00:00 | 2026-03-18T20:57:22+00:00 |
| rhsa-2023:6845 | Red Hat Security Advisory: OpenShift Container Platform 4.13.22 security and extras update | 2023-11-15T00:43:04+00:00 | 2026-03-18T20:57:21+00:00 |
| rhsa-2023:6842 | Red Hat Security Advisory: OpenShift Container Platform 4.12.43 bug fix and security update | 2023-11-16T20:31:52+00:00 | 2026-03-18T20:57:21+00:00 |
| rhsa-2023:6828 | Red Hat Security Advisory: ACS 4.1 enhancement update | 2023-11-08T18:34:59+00:00 | 2026-03-18T20:57:21+00:00 |
| rhsa-2023:6841 | Red Hat Security Advisory: Red Hat OpenShift Enterprise security update | 2023-11-16T20:14:47+00:00 | 2026-03-18T20:57:20+00:00 |
| rhsa-2023:6840 | Red Hat Security Advisory: OpenShift Container Platform 4.14.2 packages and security update | 2023-11-15T07:24:02+00:00 | 2026-03-18T20:57:20+00:00 |
| rhsa-2023:6839 | Red Hat Security Advisory: OpenShift Container Platform 4.14.2 security update | 2023-11-16T05:56:26+00:00 | 2026-03-18T20:57:19+00:00 |
| rhsa-2023:6837 | Red Hat Security Advisory: OpenShift Container Platform 4.14.2 bug fix and security update | 2023-11-15T04:22:30+00:00 | 2026-03-18T20:57:19+00:00 |
| rhsa-2023:6836 | Red Hat Security Advisory: OpenShift Container Platform 4.14.2 security and extras update | 2023-11-15T00:47:45+00:00 | 2026-03-18T20:57:18+00:00 |
| rhsa-2023:6818 | Red Hat Security Advisory: Satellite 6.14 security and bug fix update | 2023-11-08T14:26:58+00:00 | 2026-03-18T20:57:18+00:00 |
| rhsa-2023:6788 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | 2023-11-08T02:05:06+00:00 | 2026-03-18T20:57:18+00:00 |
| rhsa-2023:6787 | Red Hat Security Advisory: Network Observability security update | 2023-11-08T01:54:46+00:00 | 2026-03-18T20:57:18+00:00 |
| rhsa-2023:6786 | Red Hat Security Advisory: Fence Agents Remediation Operator 0.2.1 security update | 2023-11-08T01:46:23+00:00 | 2026-03-18T20:57:18+00:00 |
| rhsa-2023:6296 | Red Hat Security Advisory: Release of OpenShift Serverless 1.30.2 | 2023-11-02T19:16:02+00:00 | 2026-03-18T20:57:18+00:00 |
| rhsa-2023:6785 | Red Hat Security Advisory: Machine Deletion Remediation Operator 0.2.1 security update | 2023-11-08T01:37:29+00:00 | 2026-03-18T20:57:17+00:00 |
| rhsa-2023:6784 | Red Hat Security Advisory: Node Health Check Operator 0.6.1 security update | 2023-11-08T01:27:34+00:00 | 2026-03-18T20:57:16+00:00 |
| rhsa-2023:6783 | Red Hat Security Advisory: Node Health Check Operator 0.4.1 | 2023-11-08T01:18:25+00:00 | 2026-03-18T20:57:16+00:00 |
| rhsa-2023:6782 | Red Hat Security Advisory: openshift-gitops-kam security update | 2023-11-08T01:10:45+00:00 | 2026-03-18T20:57:16+00:00 |
| rhsa-2023:6781 | Red Hat Security Advisory: openshift-pipelines-client security update | 2023-11-08T01:10:46+00:00 | 2026-03-18T20:57:16+00:00 |
| rhsa-2023:6779 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Operator security update | 2023-11-08T00:57:26+00:00 | 2026-03-18T20:57:15+00:00 |
| rhsa-2023:6305 | Red Hat Security Advisory: Migration Toolkit for Applications security update | 2023-11-06T11:24:51+00:00 | 2026-03-18T20:57:15+00:00 |
| rhsa-2023:6298 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.30.2 security update | 2023-11-03T08:48:21+00:00 | 2026-03-18T20:57:14+00:00 |
| rhsa-2023:6280 | Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update | 2023-11-02T10:25:06+00:00 | 2026-03-18T20:57:14+00:00 |
| rhsa-2023:6279 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.11.5 | 2023-11-15T01:08:30+00:00 | 2026-03-18T20:57:13+00:00 |
| rhsa-2023:6276 | Red Hat Security Advisory: OpenShift Container Platform 4.12.42 bug fix and security update | 2023-11-08T10:40:48+00:00 | 2026-03-18T20:57:13+00:00 |
| rhsa-2023:6275 | Red Hat Security Advisory: OpenShift Container Platform 4.12.42 security and extras update | 2023-11-08T10:25:29+00:00 | 2026-03-18T20:57:13+00:00 |
| rhsa-2023:6272 | Red Hat Security Advisory: OpenShift Container Platform 4.11.53 bug fix and security update | 2023-11-08T10:41:09+00:00 | 2026-03-18T20:57:13+00:00 |
| rhsa-2023:6271 | Red Hat Security Advisory: OpenShift Container Platform 4.11.53 security and extras update | 2023-11-08T09:43:47+00:00 | 2026-03-18T20:57:12+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-481506 | SSA-481506: Information Disclosure Vulnerability in SIMATIC S7-200 SMART Devices | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-341067 | SSA-341067: Multiple vulnerabilities in third-party components in ST7 ScadaConnect before V1.1 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-319319 | SSA-319319: Denial of Service Vulnerability in TIA Administrator | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-238730 | SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-093430 | SSA-093430: Multiple Vulnerabilities in SIMATIC RTLS Locating Manager before V3.0 | 2024-05-14T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-035466 | SSA-035466: Incorrect Permission Assignment in SICAM PAS/PQS | 2023-10-10T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-024584 | SSA-024584: Authentication Bypass Vulnerability in PowerSys before V3.11 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-900277 | SSA-900277: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0012 and V2024.0001 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-879734 | SSA-879734: Multiple Vulnerabilities in SCALANCE XM-400/XR-500 before V6.6.1 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-871704 | SSA-871704: Multiple Vulnerabilities in SICAM Products | 2024-05-14T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-832273 | SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| SSA-771940 | SSA-771940: X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-06-11T00:00:00Z | 2024-08-13T00:00:00Z |
| SSA-753746 | SSA-753746: Denial of Service Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products | 2024-02-13T00:00:00Z | 2024-09-10T00:00:00Z |
| SSA-711309 | SSA-711309: Denial of Service Vulnerability in the OPC UA Implementations of SIMATIC Products | 2023-09-12T00:00:00Z | 2025-11-11T00:00:00Z |
| SSA-690517 | SSA-690517: Multiple Vulnerabilities in SCALANCE W-700 IEEE 802.11ax Family | 2024-06-11T00:00:00Z | 2025-01-14T00:00:00Z |
| SSA-625862 | SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-620338 | SSA-620338: Buffer Overflow Vulnerability in SICAM AK3 / BC / TM | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-599968 | SSA-599968: Denial of Service Vulnerability in Profinet Devices | 2021-07-13T00:00:00Z | 2024-12-10T00:00:00Z |
| SSA-566905 | SSA-566905: Multiple Denial of Service Vulnerabilities in the Webserver of Industrial Products | 2023-04-11T00:00:00Z | 2024-09-10T00:00:00Z |
| SSA-540640 | SSA-540640: Improper Privilege Management Vulnerability in Mendix Runtime | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-482757 | SSA-482757: Missing Immutable Root of Trust in S7-1500 CPU devices | 2023-01-10T00:00:00Z | 2025-01-14T00:00:00Z |
| SSA-481506 | SSA-481506: Information Disclosure Vulnerability in SIMATIC S7-200 SMART Devices | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-446448 | SSA-446448: Denial of Service Vulnerability in PROFINET Stack Integrated on Interniche Stack | 2022-04-12T00:00:00Z | 2025-01-14T00:00:00Z |
| SSA-407785 | SSA-407785: Multiple X_T File Parsing Vulnerabilities in Parasolid and Teamcenter Visualization | 2023-08-08T00:00:00Z | 2024-08-13T00:00:00Z |
| SSA-398330 | SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP >= V3.1.0 and < V3.1.5 | 2023-12-12T00:00:00Z | 2025-08-12T00:00:00Z |
| SSA-353002 | SSA-353002: Multiple Vulnerabilities in SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family | 2024-03-12T00:00:00Z | 2025-08-12T00:00:00Z |
| SSA-341067 | SSA-341067: Multiple vulnerabilities in third-party components in ST7 ScadaConnect before V1.1 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-337522 | SSA-337522: Multiple Vulnerabilities in TIM 1531 IRC before V2.4.8 | 2024-06-11T00:00:00Z | 2024-07-09T00:00:00Z |
| SSA-319319 | SSA-319319: Denial of Service Vulnerability in TIA Administrator | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-238730 | SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20486-1 | Security update for google-osconfig-agent | 2026-02-17T09:38:09Z | 2026-02-17T09:38:09Z |
| suse-su-2026:20485-1 | Security update for python-urllib3 | 2026-02-17T09:38:09Z | 2026-02-17T09:38:09Z |
| suse-su-2026:20483-1 | Security update for google-guest-agent | 2026-02-17T09:37:33Z | 2026-02-17T09:37:33Z |
| suse-su-2026:20484-1 | Security update for libsodium | 2026-02-17T09:37:03Z | 2026-02-17T09:37:03Z |
| suse-su-2026:20481-1 | Security update for expat | 2026-02-17T09:35:30Z | 2026-02-17T09:35:30Z |
| suse-su-2026:20482-1 | Security update for python-pyasn1 | 2026-02-17T09:34:54Z | 2026-02-17T09:34:54Z |
| suse-su-2026:20454-1 | Security update for cockpit | 2026-02-17T09:00:57Z | 2026-02-17T09:00:57Z |
| suse-su-2026:20451-1 | Security update for docker-compose | 2026-02-17T08:53:14Z | 2026-02-17T08:53:14Z |
| suse-su-2026:20452-1 | Security update for crun | 2026-02-17T08:51:47Z | 2026-02-17T08:51:47Z |
| suse-su-2026:20450-1 | Security update for kernel-firmware | 2026-02-17T08:39:43Z | 2026-02-17T08:39:43Z |
| suse-su-2026:20448-1 | Security update for libsodium | 2026-02-17T08:34:12Z | 2026-02-17T08:34:12Z |
| suse-su-2026:0566-1 | Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4) | 2026-02-17T06:33:40Z | 2026-02-17T06:33:40Z |
| suse-su-2026:0565-1 | Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4) | 2026-02-16T18:04:25Z | 2026-02-16T18:04:25Z |
| suse-su-2026:0563-1 | Security update for protobuf | 2026-02-16T16:19:22Z | 2026-02-16T16:19:22Z |
| suse-su-2026:20446-1 | Security update for glib2 | 2026-02-16T14:25:53Z | 2026-02-16T14:25:53Z |
| suse-su-2026:20447-1 | Security update for python-pyasn1 | 2026-02-16T14:23:52Z | 2026-02-16T14:23:52Z |
| suse-su-2026:20445-1 | Security update for libsoup | 2026-02-16T14:21:49Z | 2026-02-16T14:21:49Z |
| suse-su-2026:20444-1 | Security update for gpg2 | 2026-02-16T14:21:49Z | 2026-02-16T14:21:49Z |
| suse-su-2026:20443-1 | Security update for python-urllib3 | 2026-02-16T14:21:49Z | 2026-02-16T14:21:49Z |
| suse-su-2026:0561-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T12:33:41Z | 2026-02-16T12:33:41Z |
| suse-su-2026:0560-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T12:03:47Z | 2026-02-16T12:03:47Z |
| suse-su-2026:0559-1 | Security update for freerdp | 2026-02-16T11:43:04Z | 2026-02-16T11:43:04Z |
| suse-su-2026:0558-1 | Security update for libnvidia-container | 2026-02-16T11:42:25Z | 2026-02-16T11:42:25Z |
| suse-su-2026:0557-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T10:33:36Z | 2026-02-16T10:33:36Z |
| suse-su-2026:0556-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T10:03:47Z | 2026-02-16T10:03:47Z |
| suse-su-2026:20374-1 | Security update for python311 | 2026-02-16T09:45:48Z | 2026-02-16T09:45:48Z |
| suse-su-2026:0555-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T09:04:29Z | 2026-02-16T09:04:29Z |
| suse-su-2026:20373-1 | Security update for openssl-3 | 2026-02-16T08:54:36Z | 2026-02-16T08:54:36Z |
| suse-su-2026:0554-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T08:33:36Z | 2026-02-16T08:33:36Z |
| suse-su-2026:20353-1 | Security update for libxml2 | 2026-02-16T08:28:24Z | 2026-02-16T08:28:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:23111 | Moderate: mysql:8.4 security update | 2025-12-11T00:00:00Z | 2025-12-17T11:32:52Z |
| alsa-2025:22395 | Moderate: kernel security update | 2025-12-01T00:00:00Z | 2025-12-15T12:44:56Z |
| alsa-2025:23087 | Moderate: grafana security update | 2025-12-11T00:00:00Z | 2025-12-15T12:37:43Z |
| alsa-2025:23134 | Moderate: mysql:8.0 security update | 2025-12-11T00:00:00Z | 2025-12-12T10:33:42Z |
| alsa-2025:23142 | Important: wireshark security update | 2025-12-11T00:00:00Z | 2025-12-12T10:27:48Z |
| alsa-2025:23139 | Moderate: libsoup3 security update | 2025-12-11T00:00:00Z | 2025-12-12T10:26:40Z |
| alsa-2025:23137 | Moderate: mysql:8.4 security update | 2025-12-11T00:00:00Z | 2025-12-12T10:24:42Z |
| alsa-2025:23109 | Moderate: mysql security update | 2025-12-11T00:00:00Z | 2025-12-12T10:21:57Z |
| alsa-2025:23128 | Important: firefox security update | 2025-12-11T00:00:00Z | 2025-12-12T10:19:27Z |
| alsa-2025:23088 | Moderate: grafana security update | 2025-12-11T00:00:00Z | 2025-12-12T10:18:20Z |
| alsa-2025:23083 | Important: wireshark security update | 2025-12-10T00:00:00Z | 2025-12-12T10:17:19Z |
| alsa-2025:23035 | Important: firefox security update | 2025-12-10T00:00:00Z | 2025-12-12T10:16:15Z |
| alsa-2025:23034 | Important: firefox security update | 2025-12-10T00:00:00Z | 2025-12-12T10:14:54Z |
| alsa-2025:23008 | Moderate: mysql8.4 security update | 2025-12-10T00:00:00Z | 2025-12-12T10:13:50Z |
| alsa-2025:23048 | Important: tomcat security update | 2025-12-10T00:00:00Z | 2025-12-11T14:01:21Z |
| alsa-2025:23086 | Moderate: luksmeta security update | 2025-12-11T00:00:00Z | 2025-12-11T13:43:22Z |
| alsa-2025:22760 | Important: abrt security update | 2025-12-04T00:00:00Z | 2025-12-10T10:40:28Z |
| alsa-2025:22854 | Moderate: kernel security update | 2025-12-08T00:00:00Z | 2025-12-10T08:12:35Z |
| alsa-2025:22790 | Important: webkit2gtk3 security update | 2025-12-08T00:00:00Z | 2025-12-08T14:01:28Z |
| alsa-2025:22789 | Important: webkit2gtk3 security update | 2025-12-08T00:00:00Z | 2025-12-08T13:59:43Z |
| alsa-2025:22800 | Moderate: kernel-rt security update | 2025-12-08T00:00:00Z | 2025-12-08T13:58:04Z |
| alsa-2025:22801 | Moderate: kernel security update | 2025-12-08T00:00:00Z | 2025-12-08T13:53:19Z |
| alsa-2025:22405 | Moderate: kernel security update | 2025-12-01T00:00:00Z | 2025-12-08T12:22:10Z |
| alsa-2025:20994 | Important: ipa security update | 2025-11-11T00:00:00Z | 2025-12-05T09:05:25Z |
| alsa-2025:21931 | Moderate: kernel security update | 2025-11-24T00:00:00Z | 2025-12-05T08:40:44Z |
| alsa-2025:21036 | Important: pcs security update | 2025-11-11T00:00:00Z | 2025-12-05T08:31:28Z |
| alsa-2025:21038 | Important: kea security update | 2025-11-11T00:00:00Z | 2025-12-05T08:28:57Z |
| alsa-2025:21936 | Important: valkey security update | 2025-11-24T00:00:00Z | 2025-12-05T08:20:47Z |
| alsa-2025:22668 | Moderate: go-toolset:rhel8 security update | 2025-12-03T00:00:00Z | 2025-12-05T08:01:54Z |
| alsa-2025:22012 | Important: buildah security update | 2025-11-25T00:00:00Z | 2025-12-05T07:44:58Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-597 | Heap-buffer-overflow in generic_unpack | 2025-08-04T00:08:26.345735Z | 2025-08-04T00:08:26.346368Z |
| osv-2025-591 | UNKNOWN READ in mov_read_header | 2025-08-02T00:02:00.509459Z | 2025-08-02T00:02:00.510035Z |
| osv-2025-589 | Heap-buffer-overflow in isvcd_decode_recon_tfr_nmb_base_lyr | 2025-08-01T00:10:54.848946Z | 2025-08-01T00:10:54.849286Z |
| osv-2025-584 | Heap-buffer-overflow in isvcd_mark_err_slice_skip | 2025-07-31T00:09:08.538145Z | 2025-07-31T00:09:08.538507Z |
| osv-2025-93 | Heap-buffer-overflow in lj_strfmt_pushvf | 2025-02-05T00:18:14.584575Z | 2025-07-23T14:24:29.384461Z |
| osv-2025-249 | Heap-use-after-free in lj_strfmt_pushvf | 2025-04-02T00:09:53.120387Z | 2025-07-23T14:23:01.826780Z |
| osv-2025-267 | Stack-buffer-overflow in snap_usedef | 2025-04-08T00:17:16.034122Z | 2025-07-23T14:22:40.655455Z |
| osv-2025-570 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-07-23T00:17:34.356115Z | 2025-07-23T00:17:34.356449Z |
| osv-2023-838 | Use-of-uninitialized-value in wabt::BinaryReaderIR::OnOpcode | 2023-09-12T14:01:08.316035Z | 2025-07-22T14:22:12.701561Z |
| osv-2025-564 | Heap-buffer-overflow in ndpi_match_host_subprotocol | 2025-07-21T00:03:40.000875Z | 2025-07-21T00:03:40.001170Z |
| osv-2025-550 | Use-of-uninitialized-value in CFF::cff2_cs_opset_t<cff2_cs_opset_subr_subset_t, CFF::subr_subset_param_t, CFF: | 2025-07-16T00:09:08.050994Z | 2025-07-16T00:09:08.051469Z |
| osv-2025-544 | Heap-buffer-overflow in N_BELE_RTP::LEPolicy::get32 | 2025-07-11T00:16:53.687776Z | 2025-07-11T00:16:53.688703Z |
| osv-2025-542 | Use-of-uninitialized-value in httpEncode64_3 | 2025-07-10T00:07:45.698070Z | 2025-07-10T00:07:45.698655Z |
| osv-2025-541 | Heap-buffer-overflow in js_create_function | 2025-07-09T00:20:09.455729Z | 2025-07-09T00:20:09.456170Z |
| osv-2025-534 | Heap-use-after-free in ih264_inter_pred_luma_horz_ssse3 | 2025-07-08T00:08:11.218515Z | 2025-07-08T00:08:11.218991Z |
| osv-2025-530 | Invalid-free in cli_pdf | 2025-07-07T00:17:21.884018Z | 2025-07-07T00:17:21.884367Z |
| osv-2025-528 | Heap-buffer-overflow in xmlnode_parser_structural_error_libxml | 2025-07-07T00:10:42.902465Z | 2025-07-07T00:10:42.902766Z |
| osv-2025-525 | UNKNOWN READ in std::__1::__function::__func<cv::PngDecoder::compose_frame | 2025-07-06T00:18:54.304371Z | 2025-07-06T00:18:54.304891Z |
| osv-2022-1276 | Stack-buffer-overflow in ntlm_phase_3 | 2023-06-15T14:01:52.594793Z | 2025-07-05T14:11:24.654963Z |
| osv-2025-524 | Heap-buffer-overflow in JS_CallInternal | 2025-07-05T00:19:21.758513Z | 2025-07-05T00:19:21.758880Z |
| osv-2025-515 | Use-of-uninitialized-value in JS_DefineProperty | 2025-07-03T00:16:17.481972Z | 2025-07-03T00:16:17.482410Z |
| osv-2025-512 | Invalid-free in pdf_decodestream | 2025-07-03T00:00:40.745577Z | 2025-07-03T00:00:40.746200Z |
| osv-2024-440 | UNKNOWN READ | 2024-05-07T00:06:11.033336Z | 2025-07-01T14:30:06.613574Z |
| osv-2024-396 | UNKNOWN READ in jvp_object_free | 2024-05-01T00:11:24.552935Z | 2025-07-01T14:29:52.935440Z |
| osv-2022-785 | Heap-buffer-overflow in resize_packet | 2022-08-27T00:00:14.614126Z | 2025-07-01T14:25:29.517657Z |
| osv-2022-572 | Heap-buffer-overflow in dhcp_reply | 2022-07-12T00:00:45.818288Z | 2025-07-01T14:24:05.029738Z |
| osv-2022-1101 | UNKNOWN READ in APFSBtreeNodeIterator<APFSJObjBtreeNode> APFSJObjBtreeNode::find<unsigned long, | 2022-10-28T00:00:27.714849Z | 2025-06-29T14:11:11.919343Z |
| osv-2025-500 | UNKNOWN READ in getUShort | 2025-06-29T00:08:49.553890Z | 2025-06-29T00:08:49.554520Z |
| osv-2023-225 | Heap-buffer-overflow in std::__1::enable_if<true, void>::type APFSBtreeNodeIterator<APFSBtreeNode<apfs_o | 2023-03-24T13:02:18.004510Z | 2025-06-28T14:26:09.281381Z |
| osv-2022-1106 | Heap-buffer-overflow in APFSJObject::add_entry | 2022-10-28T00:02:37.921684Z | 2025-06-28T14:21:48.859764Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2023-0033 | Parsing borsh messages with ZST which are not-copy/clone is unsound | 2023-04-12T12:00:00Z | 2024-09-23T15:02:17Z |
| rustsec-2023-0055 | Multiple soundness issues | 2023-09-03T12:00:00Z | 2024-09-16T14:15:37Z |
| rustsec-2024-0370 | proc-macro-error is unmaintained | 2024-09-01T12:00:00Z | 2024-09-09T12:08:37Z |
| rustsec-2024-0373 | `Endpoint::retry()` calls can lead to panicking | 2024-09-02T12:00:00Z | 2024-09-08T01:47:13Z |
| rustsec-2024-0372 | Memory leak when calling a canister method via `ic_cdk::call` | 2024-09-05T12:00:00Z | 2024-09-07T18:23:36Z |
| rustsec-2024-0371 | gix-path improperly resolves configuration path reported by Git | 2024-09-06T12:00:00Z | 2024-09-07T01:48:33Z |
| rustsec-2024-0369 | phonenumber: panic on parsing crafted phonenumber inputs | 2024-07-07T12:00:00Z | 2024-09-05T13:40:37Z |
| rustsec-2024-0367 | gix-path uses local config across repos when it is the highest scope | 2024-08-31T12:00:00Z | 2024-09-03T22:23:51Z |
| rustsec-2024-0364 | gitoxide-core does not neutralize special characters for terminals | 2024-08-22T12:00:00Z | 2024-08-22T23:15:02Z |
| rustsec-2024-0361 | CWA-2024-004: Gas mispricing in cosmwasm-vm | 2024-08-08T12:00:00Z | 2024-08-08T17:11:37Z |
| rustsec-2024-0356 | `UserIdentity::is_verified` not checking verification status of own user identity while performing the check | 2024-07-18T12:00:00Z | 2024-07-19T10:11:38Z |
| rustsec-2024-0355 | gix-path can use a fake program files location | 2024-07-18T12:00:00Z | 2024-07-18T16:46:06Z |
| rustsec-2024-0354 | Usage of non-constant time base64 decoder could lead to leakage of secret key material | 2024-07-17T12:00:00Z | 2024-07-18T11:24:58Z |
| rustsec-2024-0353 | Refs and paths with reserved Windows device names access the devices | 2024-05-22T12:00:00Z | 2024-07-08T15:14:36Z |
| rustsec-2024-0352 | Refs and paths with reserved Windows device names access the devices | 2024-05-22T12:00:00Z | 2024-07-08T15:14:36Z |
| rustsec-2024-0351 | Refs and paths with reserved Windows device names access the devices | 2024-05-22T12:00:00Z | 2024-07-08T15:14:36Z |
| rustsec-2024-0350 | Traversal outside working tree enables arbitrary code execution | 2024-05-22T12:00:00Z | 2024-07-08T15:12:43Z |
| rustsec-2024-0349 | Traversal outside working tree enables arbitrary code execution | 2024-05-22T12:00:00Z | 2024-07-08T15:12:43Z |
| rustsec-2024-0348 | Traversal outside working tree enables arbitrary code execution | 2024-05-22T12:00:00Z | 2024-07-08T15:12:43Z |
| rustsec-2024-0335 | gix-transport indirect code execution via malicious username | 2024-04-13T12:00:00Z | 2024-07-02T23:39:37Z |
| rustsec-2024-0343 | Reduced entropy due to inadequate character set usage | 2024-06-03T12:00:00Z | 2024-06-15T13:11:33Z |
| rustsec-2020-0071 | Potential segfault in the time crate | 2020-11-18T12:00:00Z | 2024-06-05T14:00:17Z |
| rustsec-2024-0341 | Slow loris vulnerability with default configuration | 2024-03-15T12:00:00Z | 2024-05-21T02:12:32Z |
| rustsec-2024-0339 | Tor path lengths too short when "Vanguards lite" configured | 2024-05-15T12:00:00Z | 2024-05-21T02:12:32Z |
| rustsec-2024-0342 | Degraded secret zeroization capabilities | 2024-05-02T12:00:00Z | 2024-05-20T15:25:56Z |
| rustsec-2024-0337 | The crate `zip_next` has been renamed to `zip`. | 2024-04-20T12:00:00Z | 2024-04-24T14:13:51Z |
| rustsec-2024-0336 | `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network input | 2024-04-19T12:00:00Z | 2024-04-20T02:21:14Z |
| rustsec-2023-0079 | KyberSlash: division timings depending on secrets | 2023-12-01T12:00:00Z | 2024-04-12T21:07:31Z |
| rustsec-2024-0334 | `libp2p-tokio-socks5` is unmaintained | 2024-04-05T12:00:00Z | 2024-04-12T16:31:39Z |
| rustsec-2024-0333 | `rsa-export` is unmaintained | 2024-04-06T12:00:00Z | 2024-04-12T16:29:46Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-node-2025-59464 | 2026-01-26T14:47:55.131Z | 2026-01-31T09:09:11.750Z | |
| bit-joomla-2025-63083 | Joomla! Core - [20260102] - XSS vector in the pagebreak plugin | 2026-01-31T08:43:33.433Z | 2026-01-31T09:09:11.750Z |
| bit-joomla-2025-63082 | Joomla! Core - [20260101] - Inadequate content filtering for data URLs | 2026-01-31T08:43:31.962Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-68119 | Unexpected code execution when invoking toolchain in cmd/go | 2026-01-31T08:43:40.539Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61731 | Arbitrary file write using cgo pkg-config directive in cmd/go | 2026-01-31T08:43:38.643Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61728 | Excessive CPU consumption when building archive index in archive/zip | 2026-01-31T08:43:32.870Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61726 | Memory exhaustion in query parameter parsing in net/url | 2026-01-31T08:43:29.079Z | 2026-01-31T09:09:11.750Z |
| bit-discourse-2026-23743 | Discourse allows permalinks to restricted resources to leak resource slugs to unauthorized users | 2026-01-31T08:42:04.050Z | 2026-01-31T09:09:11.750Z |
| bit-gitea-2026-20912 | Gitea: Cross-Repository Authorization Bypass via Release Attachment Linking Leads to Private Attachment Disclosure | 2026-01-30T08:40:49.607Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20904 | Gitea: Broken access control in OpenID visibility toggle enables cross-user visibility changes | 2026-01-30T08:40:47.849Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20897 | Gitea Git LFS Lock Deletion Broken Access Control (Cross-Repo IDOR) | 2026-01-30T08:40:45.840Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20888 | Gitea Pull Requests Auto-Merge: Read-Only Users Can Cancel Scheduled Auto-Merge via Web Endpoint (Authorization Bypass) | 2026-01-30T08:40:43.950Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20883 | Gitea Stopwatch API Missing Authorization Check Leads to Post-Revocation Information Disclosure | 2026-01-30T08:40:41.879Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20800 | Notification API Leaks Private Repository Issue Titles After Collaborator Permission Revocation | 2026-01-30T08:40:39.688Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20750 | Gitea Organization Projects Cross-Organization Authorization Bypass via Project ID (IDOR) | 2026-01-30T08:40:37.768Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20736 | Gitea Web Attachment Deletion: Cross-Repository Unauthorized Deletion via Missing Repo Ownership Check | 2026-01-30T08:40:35.702Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-0798 | Gitea Release Email Notifications Leak Private Repository Release Details After Access Revocation | 2026-01-30T08:40:33.870Z | 2026-01-30T09:12:31.676Z |
| bit-rum-2022-50806 | 4images 1.9 - Remote Command Execution (RCE) | 2026-01-29T20:50:41.024Z | 2026-01-29T21:11:31.203Z |
| bit-pytorch-2026-24747 | PyTorch Vulnerable to Remote Code Execution via Untrusted Checkpoint Files | 2026-01-29T08:50:25.994Z | 2026-01-29T09:11:54.406Z |
| bit-python-2025-13836 | Excessive read buffering DoS in http.client | 2025-12-05T11:13:05.077Z | 2026-01-27T09:14:53.416Z |
| bit-python-2025-12084 | Quadratic complexity in node ID cache clearing | 2025-12-10T17:49:06.243Z | 2026-01-27T09:14:53.416Z |
| bit-libpython-2025-13836 | Excessive read buffering DoS in http.client | 2025-12-05T11:07:36.854Z | 2026-01-27T09:14:53.416Z |
| bit-libpython-2025-12084 | Quadratic complexity in node ID cache clearing | 2025-12-10T17:41:46.450Z | 2026-01-27T09:14:53.416Z |
| bit-gitlab-2026-1102 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-01-27T09:13:24.685Z | 2026-01-27T09:14:53.416Z |
| bit-gitlab-2026-0723 | Unchecked Return Value in GitLab | 2026-01-27T09:13:22.812Z | 2026-01-27T09:14:53.416Z |
| bit-gitlab-2025-13928 | Incorrect Authorization in GitLab | 2026-01-27T09:10:58.706Z | 2026-01-27T09:14:53.416Z |
| bit-gitlab-2025-13927 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-01-27T09:10:56.771Z | 2026-01-27T09:14:53.416Z |
| bit-gitlab-2025-13335 | Loop with Unreachable Exit Condition ('Infinite Loop') in GitLab | 2026-01-27T09:10:47.144Z | 2026-01-27T09:14:53.416Z |
| bit-tensorflow-2022-29204 | Missing validation causes denial of service in TensorFlow via `Conv3DBackpropFilterV2` | 2024-03-06T11:14:25.120Z | 2026-01-26T15:09:56.435Z |
| bit-solr-2026-22444 | Apache Solr: Insufficient file-access checking in standalone core-creation requests | 2026-01-26T14:49:58.661Z | 2026-01-26T15:09:56.435Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-gs30434 | Within HostnameError | 2026-01-30T14:35:22.588418Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gs02052 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:22:23.453780Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gq48460 | Cancelling a query (e | 2026-01-30T16:26:55.253385Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gn47077 | Within HostnameError | 2026-01-30T14:48:53.159123Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gl70025 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:08:25.191230Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gl18398 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:36:55.508939Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gj12884 | Within HostnameError | 2026-01-30T16:31:25.827659Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gc72145 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:09:23.061580Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gc16599 | Cancelling a query (e | 2026-01-30T15:46:54.243517Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fz95989 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:40:52.734894Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fw42039 | vulnerability was found in PostgreSQL with the use of the MERGE command, which fails to test new rows against row security policies defined for UPDATE and SELECT | 2026-01-30T17:19:56.954092Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fs64938 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:24:53.185811Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fr57243 | Cancelling a query (e | 2026-01-30T14:52:52.746706Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fr00621 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:36:52.496829Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fp29743 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:37:25.443687Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fn26367 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:10:23.074072Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fn12833 | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security) | 2026-01-30T16:25:25.422564Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fm00685 | Cancelling a query (e | 2026-01-30T15:07:53.091254Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fj56296 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:45:23.960354Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fd27182 | Cancelling a query (e | 2026-01-30T15:02:52.949683Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ez98723 | Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a ... | 2026-01-30T14:21:51.714006Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ez55127 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:54:23.021613Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ew68942 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:53:53.713652Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-er42900 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T15:41:23.817747Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-el98096 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T17:35:58.312765Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-el98016 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:23:23.257385Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ek72220 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:24:55.137022Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ej58111 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:50:24.547860Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ec15228 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:02:54.964872Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dy37532 | Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability | 2026-01-30T15:36:23.811582Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2016-ALE-002 | Vulnérabilité dans Adobe Flash Player | 2016-04-06T00:00:00.000000 | 2016-04-08T00:00:00.000000 |
| certfr-2016-ale-001 | Campagne de messages électroniques non sollicités de type Locky | 2016-02-19T00:00:00.000000 | 2016-04-07T00:00:00.000000 |
| CERTFR-2016-ALE-001 | Campagne de messages électroniques non sollicités de type Locky | 2016-02-19T00:00:00.000000 | 2016-04-07T00:00:00.000000 |
| certfr-2015-ale-015 | Campagne de messages électroniques non sollicités de type TeslaCrypt | 2015-12-21T00:00:00.000000 | 2016-03-10T00:00:00.000000 |
| CERTFR-2015-ALE-015 | Campagne de messages électroniques non sollicités de type TeslaCrypt | 2015-12-21T00:00:00.000000 | 2016-03-10T00:00:00.000000 |
| certfr-2015-ale-009 | Vulnérabilité dans Apple Mac OS X | 2015-07-24T00:00:00.000000 | 2015-12-22T00:00:00.000000 |
| CERTFR-2015-ALE-009 | Vulnérabilité dans Apple Mac OS X | 2015-07-24T00:00:00.000000 | 2015-12-22T00:00:00.000000 |
| certfr-2015-ale-012 | Campagne de messages électroniques non sollicités de type Dridex | 2015-10-23T00:00:00.000000 | 2015-11-26T00:00:00.000000 |
| CERTFR-2015-ALE-012 | Campagne de messages électroniques non sollicités de type Dridex | 2015-10-23T00:00:00.000000 | 2015-11-26T00:00:00.000000 |
| certfr-2015-ale-011 | Vulnérabilité dans Adobe Flash Player | 2015-10-14T00:00:00.000000 | 2015-10-19T00:00:00.000000 |
| CERTFR-2015-ALE-011 | Vulnérabilité dans Adobe Flash Player | 2015-10-14T00:00:00.000000 | 2015-10-19T00:00:00.000000 |
| certfr-2015-ale-010 | Multiples vulnérabilités dans Google Android | 2015-07-28T00:00:00.000000 | 2015-10-06T00:00:00.000000 |
| CERTFR-2015-ALE-010 | Multiples vulnérabilités dans Google Android | 2015-07-28T00:00:00.000000 | 2015-10-06T00:00:00.000000 |
| certfr-2015-ale-008 | Vulnérabilité dans le pilote de gestion des polices de caractères de Microsoft Windows | 2015-07-20T00:00:00.000000 | 2015-07-30T00:00:00.000000 |
| CERTFR-2015-ALE-008 | Vulnérabilité dans le pilote de gestion des polices de caractères de Microsoft Windows | 2015-07-20T00:00:00.000000 | 2015-07-30T00:00:00.000000 |
| certfr-2015-ale-007 | Vulnérabilité dans Oracle Java SE | 2015-07-13T00:00:00.000000 | 2015-07-20T00:00:00.000000 |
| certfr-2015-ale-006 | Vulnérabilité dans Adobe Flash Player | 2015-07-11T00:00:00.000000 | 2015-07-20T00:00:00.000000 |
| CERTFR-2015-ALE-007 | Vulnérabilité dans Oracle Java SE | 2015-07-13T00:00:00.000000 | 2015-07-20T00:00:00.000000 |
| CERTFR-2015-ALE-006 | Vulnérabilité dans Adobe Flash Player | 2015-07-11T00:00:00.000000 | 2015-07-20T00:00:00.000000 |
| certfr-2015-ale-005 | Vulnérabilité dans Adobe Flash Player | 2015-07-08T00:00:00.000000 | 2015-07-10T00:00:00.000000 |
| certfr-2015-ale-003 | Nouvelle campagne d'hameçonnage de type rançongiciel | 2015-02-05T00:00:00.000000 | 2015-07-10T00:00:00.000000 |
| CERTFR-2015-ALE-005 | Vulnérabilité dans Adobe Flash Player | 2015-07-08T00:00:00.000000 | 2015-07-10T00:00:00.000000 |
| CERTFR-2015-ALE-003 | Nouvelle campagne d'hameçonnage de type rançongiciel | 2015-02-05T00:00:00.000000 | 2015-07-10T00:00:00.000000 |
| certfr-2015-ale-004 | Vulnérabilité dans Microsoft Internet Explorer | 2015-02-10T00:00:00.000000 | 2015-03-31T00:00:00.000000 |
| CERTFR-2015-ALE-004 | Vulnérabilité dans Microsoft Internet Explorer | 2015-02-10T00:00:00.000000 | 2015-03-31T00:00:00.000000 |
| certfr-2015-ale-002 | Vulnérabilité dans Adobe Flash Player | 2015-02-02T00:00:00.000000 | 2015-02-05T00:00:00.000000 |
| CERTFR-2015-ALE-002 | Vulnérabilité dans Adobe Flash Player | 2015-02-02T00:00:00.000000 | 2015-02-05T00:00:00.000000 |
| certfr-2015-ale-001 | Vulnérabilité dans Adobe Flash Player | 2015-01-22T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-011 | Vulnérabilité de l'implémentation Kerberos dans Microsoft Windows | 2014-11-18T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-010 | Vulnérabilité de l'implémentation des protocoles SSL/TLS dans Microsoft Windows | 2014-11-11T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0081 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| certfr-2026-avi-0080 | Vulnérabilité dans Broadcom Web Security Services Agent | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| certfr-2025-avi-0970 | Multiples vulnérabilités dans Synacor Zimbra Collaboration | 2025-11-06T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| CERTFR-2026-AVI-0083 | Multiples vulnérabilités dans les produits IBM | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| CERTFR-2026-AVI-0082 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| CERTFR-2026-AVI-0081 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| CERTFR-2026-AVI-0080 | Vulnérabilité dans Broadcom Web Security Services Agent | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| CERTFR-2025-AVI-0970 | Multiples vulnérabilités dans Synacor Zimbra Collaboration | 2025-11-06T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| certfr-2026-avi-0079 | Vulnérabilité dans Python | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0078 | Vulnérabilité dans Ceph | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0077 | Multiples vulnérabilités dans les produits Symantec | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0076 | Vulnérabilité dans les produits Cisco | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| CERTFR-2026-AVI-0079 | Vulnérabilité dans Python | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| CERTFR-2026-AVI-0078 | Vulnérabilité dans Ceph | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| CERTFR-2026-AVI-0077 | Multiples vulnérabilités dans les produits Symantec | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| CERTFR-2026-AVI-0076 | Vulnérabilité dans les produits Cisco | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0075 | Multiples vulnérabilités dans GitLab | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0074 | Multiples vulnérabilités dans Oracle Weblogic | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0073 | Multiples vulnérabilités dans Oracle Virtualization | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0072 | Multiples vulnérabilités dans Oracle Systems | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0071 | Multiples vulnérabilités dans Oracle PeopleSoft | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0070 | Multiples vulnérabilités dans Oracle MySQL | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0069 | Multiples vulnérabilités dans Oracle Java SE | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0068 | Multiples vulnérabilités dans Oracle Database Server | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0067 | Multiples vulnérabilités dans Python | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0066 | Vulnérabilité dans Google Chrome | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0065 | Multiples vulnérabilités dans les produits Atlassian | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| CERTFR-2026-AVI-0075 | Multiples vulnérabilités dans GitLab | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| CERTFR-2026-AVI-0074 | Multiples vulnérabilités dans Oracle Weblogic | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| CERTFR-2026-AVI-0073 | Multiples vulnérabilités dans Oracle Virtualization | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2020-007305 | Installer of Trend Micro Security 2020 (Consumer) may insecurely load Dynamic Link Libraries | 2024-08-22T11:33+09:00 | 2024-08-22T11:33+09:00 |
| jvndb-2017-009536 | Packetbeat vulnerable to denial-of-service (DoS) | 2024-08-21T17:54+09:00 | 2024-08-21T17:54+09:00 |
| jvndb-2018-009127 | Multiple vulnerabilities in LogonTracer | 2024-08-21T17:37+09:00 | 2024-08-21T17:37+09:00 |
| jvndb-2020-002957 | A vulnerability in TOYOTA MOTOR's DCU (Display Control Unit) | 2024-08-20T18:12+09:00 | 2024-08-20T18:12+09:00 |
| jvndb-2020-007306 | Trend Micro Security (Consumer) Driver vulnerable to Out-of-bounds Read | 2024-08-20T17:52+09:00 | 2024-08-20T17:52+09:00 |
| jvndb-2024-000085 | "Rakuten Ichiba App" fails to restrict custom URL schemes properly | 2024-08-20T16:56+09:00 | 2024-08-20T16:56+09:00 |
| jvndb-2024-005167 | EL Injection Vulnerability in Hitachi Tuning Manager | 2024-08-15T09:38+09:00 | 2024-08-15T09:38+09:00 |
| jvndb-2016-000124 | WAON service app for Android fails to verify SSL server certificates | 2024-08-15T09:36+09:00 | 2024-08-15T09:36+09:00 |
| jvndb-2024-000083 | Firmware update for RICOH JavaTM Platform resets the TLS configuration | 2024-08-06T15:13+09:00 | 2024-08-06T15:13+09:00 |
| jvndb-2024-000079 | Cybozu Office vulnerable to bypass browsing restrictions in Custom App | 2024-08-06T14:59+09:00 | 2024-08-06T14:59+09:00 |
| jvndb-2024-000082 | Pimax Play and PiTool accept WebSocket connections from unintended endpoints | 2024-08-05T13:58+09:00 | 2024-08-05T13:58+09:00 |
| jvndb-2024-000084 | Multiple vulnerabilities in ZEXELON ZWX-2000CSW2-HN | 2024-08-05T13:46+09:00 | 2024-08-05T13:46+09:00 |
| jvndb-2024-000074 | Multiple vulnerabilities in SKYSEA Client View | 2024-07-29T15:28+09:00 | 2024-07-31T14:12+09:00 |
| jvndb-2024-000077 | FFRI AMC vulnerable to OS command injection | 2024-07-30T16:40+09:00 | 2024-07-30T16:40+09:00 |
| jvndb-2024-000081 | EC-CUBE plugin (for EC-CUBE 4 series) "EC-CUBE Web API Plugin" vulnerable to stored cross-site scripting | 2024-07-30T14:06+09:00 | 2024-07-30T14:06+09:00 |
| jvndb-2024-000080 | EC-CUBE 4 Series improper input validation when installing plugins | 2024-07-30T13:56+09:00 | 2024-07-30T13:56+09:00 |
| jvndb-2024-000028 | Multiple vulnerabilities in SKYSEA Client View | 2024-03-07T16:09+09:00 | 2024-07-29T18:13+09:00 |
| jvndb-2024-000076 | SDoP contains a stack-based buffer overflow vulnerability. | 2024-07-29T17:24+09:00 | 2024-07-29T17:24+09:00 |
| jvndb-2024-003242 | OMRON NJ/NX series vulnerable to insufficient verification of data authenticity | 2024-05-28T12:28+09:00 | 2024-07-26T16:27+09:00 |
| jvndb-2021-000105 | PowerCMS XMLRPC API vulnerable to OS command injection | 2021-11-24T15:47+09:00 | 2024-07-26T15:22+09:00 |
| jvndb-2024-000075 | ORC vulnerable to stack-based buffer overflow | 2024-07-26T13:55+09:00 | 2024-07-26T13:55+09:00 |
| jvndb-2022-000030 | Multiple vulnerabilities in Operation management interface of FUJITSU Network IPCOM | 2022-05-09T15:02+09:00 | 2024-07-18T16:30+09:00 |
| jvndb-2024-000073 | Assimp vulnerable to heap-based buffer overflow | 2024-07-18T13:44+09:00 | 2024-07-18T13:44+09:00 |
| jvndb-2024-000072 | Cybozu Garoon vulnerable to cross-site scripting | 2024-07-16T16:14+09:00 | 2024-07-16T16:14+09:00 |
| jvndb-2024-000071 | FUJITSU Network Edgiot GW1500 vulnerable to path traversal | 2024-07-16T14:41+09:00 | 2024-07-16T14:41+09:00 |
| jvndb-2023-007150 | Multiple vulnerabilities in First Corporation's DVRs | 2023-11-17T17:31+09:00 | 2024-07-11T17:05+09:00 |
| jvndb-2023-000094 | Multiple vulnerabilities in WordPress plugin "Welcart e-Commerce" | 2023-09-22T13:51+09:00 | 2024-07-11T16:49+09:00 |
| jvndb-2024-000007 | Multiple Dahua Technology products vulnerable to authentication bypass | 2024-01-18T13:43+09:00 | 2024-07-11T16:10+09:00 |
| jvndb-2024-001882 | Sharp NEC Display Solutions' public displays vulnerable to local file inclusion | 2024-02-07T14:25+09:00 | 2024-07-11T14:27+09:00 |
| jvndb-2024-000070 | Out-of-bounds write vulnerability in Ricoh MFPs and printers | 2024-07-10T14:16+09:00 | 2024-07-10T14:16+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-11734 | Tenda AX1806 sub_4C408函数堆栈溢出漏洞 | 2026-01-30 | 2026-02-24 |
| cnvd-2026-11733 | Tenda D301和Tenda D151访问控制错误漏洞 | 2026-02-05 | 2026-02-24 |
| cnvd-2026-02809 | ComfyUI-Manager CRLF注入漏洞 | 2026-01-09 | 2026-02-23 |
| cnvd-2026-10895 | WordPress插件Pixel Manager for WooCommerce信息泄露漏洞 | 2025-11-20 | 2026-02-14 |
| cnvd-2026-10894 | WordPress插件Quiz Maker信息泄露漏洞 | 2025-11-21 | 2026-02-14 |
| cnvd-2026-10893 | WordPress插件WP FullCalendar信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10892 | WordPress插件WP Directory Kit信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10891 | WordPress插件CubeWP – All-in-One Dynamic Content Framework信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10890 | WordPress插件Contact Form 7 GetResponse Extension信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10889 | WordPress插件Cargus信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10888 | WordPress插件Booking Ultra Pro信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10887 | MailEnable存在未明漏洞(CNVD-2026-10887) | 2025-12-18 | 2026-02-14 |
| cnvd-2026-10885 | FRRouting拒绝服务漏洞(CNVD-2026-10885) | 2025-10-31 | 2026-02-14 |
| cnvd-2026-06351 | 用友网络科技股份有限公司U8+渠道管理(高级版)存在SQL注入漏洞(CNVD-C-2025-1245200) | 2025-12-31 | 2026-02-14 |
| cnvd-2026-10886 | MailEnable存在未明漏洞 | 2025-12-18 | 2026-02-13 |
| cnvd-2026-10884 | FRRouting拒绝服务漏洞(CNVD-2026-10884) | 2025-10-31 | 2026-02-13 |
| cnvd-2026-10883 | FRRouting拒绝服务漏洞(CNVD-2026-10883) | 2025-10-31 | 2026-02-13 |
| cnvd-2026-10882 | FRRouting拒绝服务漏洞 | 2025-10-31 | 2026-02-13 |
| cnvd-2026-10881 | mall-swarm授权问题漏洞(CNVD-2026-10881) | 2025-11-18 | 2026-02-13 |
| cnvd-2026-10880 | mall-swarm存在未明漏洞 | 2025-11-18 | 2026-02-13 |
| cnvd-2026-10879 | mall-swarm授权问题漏洞(CNVD-2026-10879) | 2025-11-18 | 2026-02-13 |
| cnvd-2026-10878 | mall-swarm授权问题漏洞(CNVD-2026-10878) | 2025-11-18 | 2026-02-13 |
| cnvd-2026-10877 | mall-swarm授权问题漏洞(CNVD-2026-10877) | 2025-11-18 | 2026-02-13 |
| cnvd-2026-10876 | mall-swarm授权问题漏洞 | 2025-12-10 | 2026-02-13 |
| cnvd-2026-10875 | Huawei HarmonyOS卡框架模块多线程竞争条件漏洞 | 2026-01-19 | 2026-02-13 |
| cnvd-2026-10874 | Huawei HarmonyOS和EMUI克隆模块中间人攻击漏洞 | 2026-01-19 | 2026-02-13 |
| cnvd-2026-10873 | Huawei HarmonyOS和EMUI媒体库模块权限验证绕过漏洞(CNVD-2026-10873) | 2026-01-19 | 2026-02-13 |
| cnvd-2026-10872 | Huawei HarmonyOS和EMUI媒体库模块权限验证绕过漏洞 | 2026-01-19 | 2026-02-13 |
| cnvd-2026-10871 | WordPress插件metasync存在未明漏洞 | 2026-02-04 | 2026-02-12 |
| cnvd-2026-10870 | WordPress插件Simple User Registration访问控制错误漏洞 | 2026-02-04 | 2026-02-12 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-12371 | Уязвимость компонента nfsd ядра операционной системы Linux, позволяющая нарушителю вызват… | 29.09.2025 | 16.02.2026 |
| bdu:2025-12370 | Уязвимость компонента drm/nouveau ядра операционной системы Linux, позволяющая нарушителю… | 29.09.2025 | 16.02.2026 |
| bdu:2025-12368 | Уязвимость компонента amdgpu_dm_hdcp.c ядра операционной системы Linux, позволяющая наруш… | 29.09.2025 | 16.02.2026 |
| bdu:2025-12367 | Уязвимость компонента bus.c ядра операционной системы Linux, позволяющая нарушителю вызва… | 29.09.2025 | 16.02.2026 |
| bdu:2025-12365 | Уязвимость ядра операционной системы Linux, связанная с использованием неинициализированн… | 29.09.2025 | 16.02.2026 |
| bdu:2025-12357 | Уязвимость компонента nf_conncount ядра операционной системы Linux, позволяющая нарушител… | 29.09.2025 | 16.02.2026 |
| bdu:2025-12356 | Уязвимость модуля `user` систем управления конфигурациями Ansible Core и Ansible, позволя… | 29.09.2025 | 16.02.2026 |
| bdu:2025-12353 | Уязвимость компонента page_pool.c ядра операционной системы Linux, позволяющая нарушителю… | 29.09.2025 | 16.02.2026 |
| bdu:2025-12352 | Уязвимость компонента ftrace.c ядра операционной системы Linux, позволяющая нарушителю вы… | 29.09.2025 | 16.02.2026 |
| bdu:2025-12351 | Уязвимость функции st_lsm6dsx_read_tagged_fifo() компонента st_lsm6dsx_buffer.c ядра опер… | 29.09.2025 | 16.02.2026 |
| bdu:2025-12350 | Уязвимость функции st_lsm6dsx_read_fifo() компонента st_lsm6dsx_buffer.c ядра операционно… | 29.09.2025 | 16.02.2026 |
| bdu:2025-12349 | Уязвимость компонента net/sched/sch_hfsc.c ядра операционной системы Linux, позволяющая н… | 29.09.2025 | 16.02.2026 |
| bdu:2025-12347 | Уязвимость компонента syscall.c ядра операционной системы Linux, позволяющая нарушителю в… | 29.09.2025 | 16.02.2026 |
| bdu:2025-12344 | Уязвимость компонента vlan ядра операционной системы Linux, позволяющая нарушителю вызват… | 29.09.2025 | 16.02.2026 |
| bdu:2025-12343 | Уязвимость ядра операционной системы Linux, связанная с ошибками при блокировке потоков, … | 29.09.2025 | 16.02.2026 |
| bdu:2025-12338 | Уязвимость компонента bpf_trace.c ядра операционной системы Linux, позволяющая нарушителю… | 29.09.2025 | 16.02.2026 |
| bdu:2025-12336 | Уязвимость компонентов drivers/usb/typec/ucsi/ ядра операционной системы Linux, позволяющ… | 29.09.2025 | 16.02.2026 |
| bdu:2025-12335 | Уязвимость модуля USB ядра операционной системы Linux, позволяющая нарушителю вызвать отк… | 29.09.2025 | 16.02.2026 |
| bdu:2025-12334 | Уязвимость ядра операционной системы Linux, связанная с доступом к неинициализированному … | 29.09.2025 | 16.02.2026 |
| bdu:2025-12333 | Уязвимость ядра операционной системы Linux, связанная с доступом к неинициализированному … | 29.09.2025 | 16.02.2026 |
| bdu:2025-12330 | Уязвимость компонента jfs ядра операционной системы Linux, позволяющая нарушителю получит… | 29.09.2025 | 16.02.2026 |
| bdu:2025-12329 | Уязвимость компонента brcmnand.c ядра операционной системы Linux, позволяющая нарушителю … | 29.09.2025 | 16.02.2026 |
| bdu:2025-12325 | Уязвимость модуля email интерпретатора языка программирования Python, позволяющая наруши… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12324 | Уязвимость ядра операционной системы Linux, связанная с неправильным контролем идентифика… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12322 | Уязвимость функции kvalloc() компонента eventlog/acpi.c The ядра операционной системы Lin… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12309 | Уязвимость функции __send_empty_flush() драйвера dm ядра операционной системы Linux, позв… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12307 | Уязвимость компонента venus ядра операционной системы Linux, позволяющая нарушителю вызва… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12306 | Уязвимость компонента venus ядра операционной системы Linux, позволяющая нарушителю вызва… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12304 | Уязвимость компонента gtp ядра операционной системы Linux, позволяющая нарушителю вызвать… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12302 | Уязвимость сетевого протокола аутентификации Kerberos, связанная с записью за границами б… | 28.09.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201902-0360 | In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popov… | 2024-07-23T21:44:51.239000Z |
| var-202210-0043 | The llhttp parser in the http module in Node v18.7.0 does not correctly handle header fie… | 2024-07-23T21:44:46.557000Z |
| var-200809-0187 | Finder in Apple Mac OS X 10.5.2 through 10.5.4 allows remote attackers to cause a denial … | 2024-07-23T21:44:13.542000Z |
| var-202203-0664 | BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions… | 2024-07-23T21:44:12.287000Z |
| var-201109-0214 | Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers… | 2024-07-23T21:44:12.444000Z |
| var-200901-0466 | The MD5 Message-Digest Algorithm is not collision resistant, which makes it easier for co… | 2024-07-23T21:44:12.668000Z |
| var-201202-0137 | Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote at… | 2024-07-23T21:43:37.915000Z |
| var-201806-1468 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2024-07-23T21:43:36.931000Z |
| var-201110-0321 | FreeType 2 before 2.4.7, as used in CoreGraphics in Apple iOS before 5, Mandriva Enterpri… | 2024-07-23T21:43:33.476000Z |
| var-200703-0009 | Integer overflow in Apple QuickTime before 7.1.5, when installed on Windows operating sys… | 2024-07-23T21:43:33.598000Z |
| var-200102-0029 | Cisco 600 routers running CBOS 2.4.1 and earlier allow remote attackers to cause a denial… | 2024-07-23T21:43:33.797000Z |
| var-201710-1405 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari befo… | 2024-07-23T21:43:29.001000Z |
| var-201912-0457 | A validation issue was addressed with improved logic. This issue is fixed in iOS 12.2, tv… | 2024-07-23T21:43:28.933000Z |
| var-201302-0309 | Use-after-free vulnerability in Adobe Flash Player before 10.3.183.63 and 11.x before 11.… | 2024-07-23T21:43:28.487000Z |
| var-202103-1464 | An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello m… | 2024-07-23T21:43:25.615000Z |
| var-201710-1409 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari befo… | 2024-07-23T21:43:25.189000Z |
| var-201210-0343 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:43:24.967000Z |
| var-201912-0551 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2024-07-23T21:43:21.002000Z |
| var-201211-0366 | Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on … | 2024-07-23T21:42:50.004000Z |
| var-200609-0310 | Multiple buffer overflows in Apple QuickTime before 7.1.3 allow user-assisted remote atta… | 2024-07-23T21:42:44.179000Z |
| var-200909-0789 | libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when Open… | 2024-07-23T21:42:38.375000Z |
| var-201606-0382 | Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified … | 2024-07-23T21:42:37.934000Z |
| var-201206-0058 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:42:36.964000Z |
| var-201912-1860 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:42:32.013000Z |
| var-200711-0560 | Perl-Compatible Regular Expression (PCRE) library before 7.3 backtracks too far when matc… | 2024-07-23T21:42:00.915000Z |
| var-201109-0209 | Google Chrome before 14.0.835.163 does not properly handle Cascading Style Sheets (CSS) t… | 2024-07-23T21:41:33.003000Z |
| var-201007-0319 | The counters functionality in the Cascading Style Sheets (CSS) implementation in WebKit i… | 2024-07-23T21:41:32.923000Z |
| var-201302-0136 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:41:31.932000Z |
| var-200703-0018 | Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to… | 2024-07-23T21:41:31.383000Z |
| var-201603-0222 | The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denia… | 2024-07-23T21:40:58.575000Z |