Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-66170 |
N/A
|
Apache CloudStack: Any user can list backups that they… |
Apache Software Foundation |
Apache CloudStack |
2026-05-08T12:06:32.467Z | 2026-05-09T06:42:58.243Z |
| CVE-2026-8076 |
9.3 (4.0)
|
Weak credentials vulnerability in the CashDro 3 web ad… |
CashDro |
CashDro 3 Administration Panel |
2026-05-08T11:55:53.321Z | 2026-05-08T12:48:22.218Z |
| CVE-2026-8153 |
9.8 (3.1)
|
Command injection in Dashboard Server interface |
Universal Robots |
PolyScope 5 |
2026-05-08T11:45:18.462Z | 2026-05-08T12:47:12.421Z |
| CVE-2026-3318 |
5.3 (4.0)
|
Multiple vulnerabilities in Cradle e-commerce |
Cradle |
e-commerce |
2026-05-08T11:24:53.064Z | 2026-05-08T12:46:32.745Z |
| CVE-2026-7475 |
6.4 (3.1)
|
Sky Addons <= 3.3.2 - Authenticated (Author+) Stored C… |
wowdevs |
Sky Addons – Elementor Addons with Widgets & Templates |
2026-05-08T09:26:47.644Z | 2026-05-08T12:12:36.653Z |
| CVE-2026-5341 |
6.4 (3.1)
|
NMR Strava activities <= 1.0.14 - Authenticated (Contr… |
mirceatm |
NMR Strava activities |
2026-05-08T09:26:47.283Z | 2026-05-08T10:15:32.703Z |
| CVE-2026-7650 |
6.4 (3.1)
|
E2Pdf – Export Pdf Tool for WordPress <= 1.32.17 - Aut… |
oleksandrz |
E2Pdf – Export Pdf Tool for WordPress |
2026-05-08T09:26:46.732Z | 2026-05-08T12:45:42.968Z |
| CVE-2026-6213 |
10 (4.0)
|
Remote Spark SparkView RCE |
Remote Spark (https://www.remotespark.com/) |
SparkView |
2026-05-08T09:04:24.188Z | 2026-05-08T12:45:06.500Z |
| CVE-2026-7330 |
7.2 (3.1)
|
Auto Affiliate Links <= 6.8.8 - Unauthenticated Stored… |
thedark |
Auto Affiliate Links |
2026-05-08T08:26:33.373Z | 2026-05-08T21:28:08.223Z |
| CVE-2026-5127 |
8.8 (3.1)
|
User Frontend: AI Powered Frontend Posting, User Direc… |
wedevs |
User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration |
2026-05-08T08:26:32.725Z | 2026-05-08T20:00:10.551Z |
| CVE-2013-10075 |
9.1 (3.1)
|
Apache::Session versions through 1.94 for Perl re-crea… |
CHORNY |
Apache::Session |
2026-05-08T07:44:13.267Z | 2026-05-08T17:58:32.010Z |
| CVE-2026-43284 |
7.8 (3.1)
|
xfrm: esp: avoid in-place decrypt on shared skb frags |
Linux |
Linux |
2026-05-08T07:21:47.524Z | 2026-05-09T03:55:46.272Z |
| CVE-2026-44928 |
2.9 (3.1)
|
In uriparser before 1.0.2, the function family Eq… |
uriparser |
uriparser |
2026-05-08T07:15:28.378Z | 2026-05-08T12:49:01.200Z |
| CVE-2026-44927 |
2.9 (3.1)
|
In uriparser before 1.0.2, there is pointer diffe… |
uriparser |
uriparser |
2026-05-08T07:13:04.720Z | 2026-05-08T12:49:45.802Z |
| CVE-2026-44916 |
3 (3.1)
|
In OpenStack Ironic through 35.x, instance_info['… |
OpenStack |
Ironic |
2026-05-08T06:38:37.279Z | 2026-05-08T12:50:35.499Z |
| CVE-2026-8149 |
5.1 (4.0)
|
GCM chunking can lead to bad tag exception on decryption |
Legion of the Bouncy Castle Inc. |
BC-FJA |
2026-05-08T06:01:40.875Z | 2026-05-08T12:51:03.873Z |
| CVE-2026-4935 |
8.6 (3.1)
|
SureTriggers < 1.1.23 – Unauthenticated SQLi |
Unknown |
OttoKit: All-in-One Automation Platform |
2026-05-08T06:00:04.998Z | 2026-05-08T14:49:21.857Z |
| CVE-2026-8069 |
8.5 (4.0)
|
PredatorSense V3: Local Privilege Escalation (LPE) vul… |
Acer |
PredatorSense V3 |
2026-05-08T05:57:22.797Z | 2026-05-08T12:51:41.992Z |
| CVE-2026-8148 |
7.8 (3.1)
|
NAVER MYBOX Explorer for Windows before 3.0.11.16… |
NAVER |
NAVER MYBOX Explorer |
2026-05-08T04:36:12.538Z | 2026-05-08T17:59:41.775Z |
| CVE-2026-8138 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda CX12L SetPptpServerCfg” formSetPPTPServer stack-… |
Tenda |
CX12L |
2026-05-08T04:15:10.228Z | 2026-05-08T10:35:06.800Z |
| CVE-2026-8137 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Totolink X5000R formDdns sub_458E40 buffer overflow |
Totolink |
X5000R |
2026-05-08T04:00:13.042Z | 2026-05-08T12:55:48.365Z |
| CVE-2026-42279 |
5.8 (3.1)
|
solidtime: Time entry update endpoint allows cross-org… |
solidtime-io |
solidtime |
2026-05-08T03:57:31.727Z | 2026-05-08T10:38:51.086Z |
| CVE-2026-42278 |
8.8 (4.0)
|
UltraDAG: Smart Account Spending Policy Bypass via Pockets |
UltraDAGcom |
core |
2026-05-08T03:55:01.093Z | 2026-05-08T23:16:05.807Z |
| CVE-2026-42277 |
6.5 (3.1)
|
Onyx: IDOR in /chat/file/{file_id} allows any authenti… |
onyx-dot-app |
onyx |
2026-05-08T03:51:11.520Z | 2026-05-08T21:28:14.132Z |
| CVE-2026-42276 |
4.3 (3.1)
|
Onyx: IDOR in /chat/stop-chat-session allows any authe… |
onyx-dot-app |
onyx |
2026-05-08T03:49:56.765Z | 2026-05-08T12:57:18.681Z |
| CVE-2026-42275 |
8.7 (3.1)
|
zrok: WebDAV drive backend follows symlinks outside Dr… |
openziti |
zrok |
2026-05-08T03:45:57.209Z | 2026-05-08T12:13:21.216Z |
| CVE-2026-8136 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
SourceCodester Pharmacy Sales and Inventory System ind… |
SourceCodester |
Pharmacy Sales and Inventory System |
2026-05-08T03:45:08.503Z | 2026-05-08T21:28:20.603Z |
| CVE-2026-42274 |
7.8 (4.0)
|
Heimdall: Authorization bypass via path normalization … |
dadrus |
heimdall |
2026-05-08T03:43:41.597Z | 2026-05-08T03:43:41.597Z |
| CVE-2026-42273 |
7.8 (4.0)
|
Heimdall: Case-sensitive host matching may lead to pol… |
dadrus |
heimdall |
2026-05-08T03:42:50.312Z | 2026-05-08T10:40:56.541Z |
| CVE-2026-42272 |
7.8 (4.0)
|
Heimdall: Case-sensitive handling of URL-encoded slash… |
dadrus |
heimdall |
2026-05-08T03:40:17.541Z | 2026-05-08T23:12:35.366Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-25199 |
N/A
|
Apache CloudStack: Proxmox Extension Allows Unauthoriz… |
Apache Software Foundation |
Apache CloudStack |
2026-05-08T12:22:56.226Z | 2026-05-09T06:43:07.020Z |
| CVE-2026-25077 |
N/A
|
Apache CloudStack: Unauthenticated Command Injection i… |
Apache Software Foundation |
Apache CloudStack |
2026-05-08T12:21:27.034Z | 2026-05-09T06:43:05.523Z |
| CVE-2025-69233 |
6.5 (3.1)
|
Apache CloudStack: Domain/account resources limits not… |
Apache Software Foundation |
Apache CloudStack |
2026-05-08T12:19:30.874Z | 2026-05-09T06:43:04.154Z |
| CVE-2025-66467 |
8 (3.1)
|
Apache CloudStack: MinIO policy remains intact on buck… |
Apache Software Foundation |
Apache CloudStack |
2026-05-08T12:16:04.822Z | 2026-05-09T06:43:02.627Z |
| CVE-2025-66172 |
N/A
|
Apache CloudStack: Any user can attach a volume in the… |
Apache Software Foundation |
Apache CloudStack |
2026-05-08T12:13:18.311Z | 2026-05-09T06:43:01.212Z |
| CVE-2025-66171 |
N/A
|
Apache CloudStack: Any user can create a new VM from b… |
Apache Software Foundation |
Apache CloudStack |
2026-05-08T12:11:03.883Z | 2026-05-09T06:42:59.830Z |
| CVE-2025-66170 |
N/A
|
Apache CloudStack: Any user can list backups that they… |
Apache Software Foundation |
Apache CloudStack |
2026-05-08T12:06:32.467Z | 2026-05-09T06:42:58.243Z |
| CVE-2022-50994 |
9.2 (4.0)
8.1 (3.1)
|
DrayTek Vigor 2960 < 1.5.1.4 OS Command Injection via … |
DrayTek |
Vigor 2960 |
2026-05-08T12:35:08.919Z | 2026-05-08T13:58:11.141Z |
| CVE-2026-8153 |
9.8 (3.1)
|
Command injection in Dashboard Server interface |
Universal Robots |
PolyScope 5 |
2026-05-08T11:45:18.462Z | 2026-05-08T12:47:12.421Z |
| CVE-2026-8076 |
9.3 (4.0)
|
Weak credentials vulnerability in the CashDro 3 web ad… |
CashDro |
CashDro 3 Administration Panel |
2026-05-08T11:55:53.321Z | 2026-05-08T12:48:22.218Z |
| CVE-2026-3318 |
5.3 (4.0)
|
Multiple vulnerabilities in Cradle e-commerce |
Cradle |
e-commerce |
2026-05-08T11:24:53.064Z | 2026-05-08T12:46:32.745Z |
| CVE-2026-7650 |
6.4 (3.1)
|
E2Pdf – Export Pdf Tool for WordPress <= 1.32.17 - Aut… |
oleksandrz |
E2Pdf – Export Pdf Tool for WordPress |
2026-05-08T09:26:46.732Z | 2026-05-08T12:45:42.968Z |
| CVE-2026-7475 |
6.4 (3.1)
|
Sky Addons <= 3.3.2 - Authenticated (Author+) Stored C… |
wowdevs |
Sky Addons – Elementor Addons with Widgets & Templates |
2026-05-08T09:26:47.644Z | 2026-05-08T12:12:36.653Z |
| CVE-2026-6213 |
10 (4.0)
|
Remote Spark SparkView RCE |
Remote Spark (https://www.remotespark.com/) |
SparkView |
2026-05-08T09:04:24.188Z | 2026-05-08T12:45:06.500Z |
| CVE-2026-5341 |
6.4 (3.1)
|
NMR Strava activities <= 1.0.14 - Authenticated (Contr… |
mirceatm |
NMR Strava activities |
2026-05-08T09:26:47.283Z | 2026-05-08T10:15:32.703Z |
| CVE-2026-7330 |
7.2 (3.1)
|
Auto Affiliate Links <= 6.8.8 - Unauthenticated Stored… |
thedark |
Auto Affiliate Links |
2026-05-08T08:26:33.373Z | 2026-05-08T21:28:08.223Z |
| CVE-2026-5127 |
8.8 (3.1)
|
User Frontend: AI Powered Frontend Posting, User Direc… |
wedevs |
User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration |
2026-05-08T08:26:32.725Z | 2026-05-08T20:00:10.551Z |
| CVE-2026-44928 |
2.9 (3.1)
|
In uriparser before 1.0.2, the function family Eq… |
uriparser |
uriparser |
2026-05-08T07:15:28.378Z | 2026-05-08T12:49:01.200Z |
| CVE-2026-44927 |
2.9 (3.1)
|
In uriparser before 1.0.2, there is pointer diffe… |
uriparser |
uriparser |
2026-05-08T07:13:04.720Z | 2026-05-08T12:49:45.802Z |
| CVE-2026-43284 |
7.8 (3.1)
|
xfrm: esp: avoid in-place decrypt on shared skb frags |
Linux |
Linux |
2026-05-08T07:21:47.524Z | 2026-05-09T03:55:46.272Z |
| CVE-2013-10075 |
9.1 (3.1)
|
Apache::Session versions through 1.94 for Perl re-crea… |
CHORNY |
Apache::Session |
2026-05-08T07:44:13.267Z | 2026-05-08T17:58:32.010Z |
| CVE-2026-8149 |
5.1 (4.0)
|
GCM chunking can lead to bad tag exception on decryption |
Legion of the Bouncy Castle Inc. |
BC-FJA |
2026-05-08T06:01:40.875Z | 2026-05-08T12:51:03.873Z |
| CVE-2026-8069 |
8.5 (4.0)
|
PredatorSense V3: Local Privilege Escalation (LPE) vul… |
Acer |
PredatorSense V3 |
2026-05-08T05:57:22.797Z | 2026-05-08T12:51:41.992Z |
| CVE-2026-4935 |
8.6 (3.1)
|
SureTriggers < 1.1.23 – Unauthenticated SQLi |
Unknown |
OttoKit: All-in-One Automation Platform |
2026-05-08T06:00:04.998Z | 2026-05-08T14:49:21.857Z |
| CVE-2026-44916 |
3 (3.1)
|
In OpenStack Ironic through 35.x, instance_info['… |
OpenStack |
Ironic |
2026-05-08T06:38:37.279Z | 2026-05-08T12:50:35.499Z |
| CVE-2025-69691 |
9.9 (3.1)
|
Netgate pfSense CE 2.8.0 allows code execution in… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T21:29:04.070Z |
| CVE-2025-69690 |
9.1 (3.1)
|
Netgate pfSense CE 2.7.2 allows code execution by… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T21:29:10.073Z |
| CVE-2025-69599 |
N/A
|
RayVentory Scan Engine through 12.6 Update 8 allo… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T06:08:35.396Z |
| CVE-2025-67888 |
7.3 (3.1)
|
An issue was discovered in Control Web Panel (CWP… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T14:13:43.786Z |
| CVE-2025-67887 |
N/A
|
1C-Bitrix through 25.100.500 allows Remote Code E… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T05:52:28.158Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-27573 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.387 | 2026-02-13T19:16:29.387 |
| fkie_cve-2025-27569 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.327 | 2026-02-13T19:16:29.327 |
| fkie_cve-2025-27251 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.253 | 2026-02-13T19:16:29.253 |
| fkie_cve-2025-26471 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:28.970 | 2026-02-13T19:16:28.970 |
| fkie_cve-2025-25049 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:28.900 | 2026-02-13T19:16:28.900 |
| fkie_cve-2025-24524 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:28.103 | 2026-02-13T19:16:28.103 |
| fkie_cve-2025-24518 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:28.043 | 2026-02-13T19:16:28.043 |
| fkie_cve-2025-24492 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.983 | 2026-02-13T19:16:27.983 |
| fkie_cve-2025-24321 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.927 | 2026-02-13T19:16:27.927 |
| fkie_cve-2025-24300 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.860 | 2026-02-13T19:16:27.860 |
| fkie_cve-2025-22845 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.457 | 2026-02-13T19:16:27.457 |
| fkie_cve-2025-20110 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.397 | 2026-02-13T19:16:27.397 |
| fkie_cve-2025-20107 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.337 | 2026-02-13T19:16:27.337 |
| fkie_cve-2025-20098 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.277 | 2026-02-13T19:16:27.277 |
| fkie_cve-2025-20089 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.217 | 2026-02-13T19:16:27.217 |
| fkie_cve-2025-20078 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.153 | 2026-02-13T19:16:27.153 |
| fkie_cve-2025-20066 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.083 | 2026-02-13T19:16:27.083 |
| fkie_cve-2025-20038 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.013 | 2026-02-13T19:16:27.013 |
| fkie_cve-2025-20007 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:26.430 | 2026-02-13T19:16:26.430 |
| fkie_cve-2026-21870 | BACnet Protocol Stack library provides a BACnet application layer, network layer and media access (… | 2026-02-13T18:16:19.783 | 2026-02-18T18:49:07.307 |
| fkie_cve-2025-69770 | A zip slip vulnerability in the /DesignTools/SkinList.aspx endpoint of MojoPortal CMS v2.9.0.1 allo… | 2026-02-13T18:16:18.043 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-66676 | An issue in IObit Unlocker v1.3.0.11 allows attackers to cause a Denial of Service (DoS) via a craf… | 2026-02-13T18:16:17.923 | 2026-03-25T21:36:33.790 |
| fkie_cve-2026-26268 | Cursor is a code editor built for programming with AI. Sandbox escape via writing .git configuratio… | 2026-02-13T17:16:14.227 | 2026-02-18T17:59:35.067 |
| fkie_cve-2026-26226 | beautiful-mermaid versions prior to 0.1.3 contain an SVG attribute injection issue that can lead to… | 2026-02-13T17:16:14.073 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2026 | A vulnerability has been identified where weak file permissions in the Nessus Agent directory on Wi… | 2026-02-13T17:16:14.383 | 2026-02-24T20:26:42.967 |
| fkie_cve-2025-70123 | An improper input validation and protocol compliance vulnerability in free5GC v4.0.1 allows remote … | 2026-02-13T17:16:12.210 | 2026-02-18T15:40:29.760 |
| fkie_cve-2025-70122 | A heap buffer overflow vulnerability in the UPF component of free5GC v4.0.1 allows remote attackers… | 2026-02-13T17:16:12.090 | 2026-02-18T15:40:09.237 |
| fkie_cve-2025-70121 | An array index out of bounds vulnerability in the AMF component of free5GC v4.0.1 allows remote att… | 2026-02-13T17:16:11.933 | 2026-02-18T15:45:58.910 |
| fkie_cve-2025-1790 | Local privilege escalation in Genetec Sipelia Plugin. An authenticated low-privileged Windows user … | 2026-02-13T17:16:10.917 | 2026-04-26T18:49:06.673 |
| fkie_cve-2026-26221 | Hyland OnBase contains an unauthenticated .NET Remoting exposure in the OnBase Workflow Timer Servi… | 2026-02-13T16:16:11.683 | 2026-04-15T00:35:42.020 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-m9cx-2hp3-5j6q |
10.0 (4.0)
|
A vulnerability in Remote Spark SparkView before build 1122 allows an attacker to bypasses the loca… | 2026-05-08T12:31:56Z | 2026-05-08T12:31:56Z |
| ghsa-7929-xh7v-8jrh |
6.4 (3.1)
|
The NMR Strava activities plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the… | 2026-05-08T12:31:56Z | 2026-05-08T12:31:56Z |
| ghsa-59rm-h9h8-h9gh |
6.4 (3.1)
|
The Sky Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `sky-custo… | 2026-05-08T12:31:56Z | 2026-05-08T12:31:57Z |
| ghsa-xw5w-xhjv-gf29 |
2.9 (3.1)
|
In uriparser before 1.0.2, the function family EqualsUri can misclassify two unequal URIs as equal. | 2026-05-08T09:31:30Z | 2026-05-08T09:31:30Z |
| ghsa-v3rv-7vgj-hq3v |
7.2 (3.1)
|
The Auto Affiliate Links plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versi… | 2026-05-08T09:31:30Z | 2026-05-08T09:31:30Z |
| ghsa-mx76-r943-rf8g |
5.1 (4.0)
|
A vulnerability in Legion of the Bouncy Castle Inc. BC-FJA BC-FIPS on Linux, X86_64, AVX, AVX-512f.… | 2026-05-08T09:31:30Z | 2026-05-08T09:31:30Z |
| ghsa-mmw8-mxmc-8w2r |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decr… | 2026-05-08T09:31:30Z | 2026-05-08T15:31:20Z |
| ghsa-jc25-ggg4-hhvw |
8.8 (3.1)
|
The User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registra… | 2026-05-08T09:31:30Z | 2026-05-08T09:31:30Z |
| ghsa-c9p5-pwmj-4f88 |
9.1 (3.1)
|
Apache::Session versions through 1.94 for Perl re-creates deleted sessions. The session stores Apa… | 2026-05-08T09:31:30Z | 2026-05-08T21:31:24Z |
| ghsa-vx26-r59q-724x |
9.8 (3.1)
|
Certain GL.iNet devices with 4.x firmware allow authentication bypass (resulting in administrative … | 2026-05-08T09:31:29Z | 2026-05-08T21:31:24Z |
| ghsa-gpvp-9x48-h5wv |
8.6 (3.1)
|
The OttoKit: All-in-One Automation Platform WordPress plugin before 1.1.23 does not properly saniti… | 2026-05-08T09:31:29Z | 2026-05-08T15:31:20Z |
| ghsa-gmxg-5w57-j63q |
2.9 (3.1)
|
In uriparser before 1.0.2, there is pointer difference truncation to int in various places. | 2026-05-08T09:31:29Z | 2026-05-08T09:31:30Z |
| ghsa-979m-gf7m-rg53 |
3.0 (3.1)
|
In OpenStack Ironic through 35.x, instance_info['ks_template'] is rendered without sandboxing. | 2026-05-08T09:31:29Z | 2026-05-08T09:31:29Z |
| ghsa-7ww6-9q8h-2g49 |
9.9 (3.1)
|
Netgate pfSense CE 2.8.0 allows code execution in the XMLRPC API via pfsense.exec_php. NOTE: the Su… | 2026-05-08T09:31:29Z | 2026-05-09T00:31:53Z |
| ghsa-73qc-9hmq-7x6f |
6.3 (3.1)
|
Bitrix24 through 25.100.300 allows Remote Code Execution because an actor with SOURCE/WRITE permiss… | 2026-05-08T09:31:29Z | 2026-05-08T18:31:32Z |
| ghsa-6q25-xprm-2cg4 |
7.3 (3.1)
|
An issue was discovered in Control Web Panel (CWP) before 0.9.8.1209. User input passed via the "ke… | 2026-05-08T09:31:29Z | 2026-05-08T15:31:20Z |
| ghsa-67h9-58cf-72hp |
8.5 (4.0)
|
PredatorSense version 3.00.3136 to 3.00.3196 contain Local Privilege Escalation (LPE) vulnerability… | 2026-05-08T09:31:29Z | 2026-05-08T09:31:30Z |
| ghsa-5vw7-w2ww-jcfq |
9.1 (3.1)
|
Netgate pfSense CE 2.7.2 allows code execution by using the module installer with a backup file wit… | 2026-05-08T09:31:29Z | 2026-05-09T00:31:53Z |
| ghsa-5gxm-mp3j-xhc7 |
|
RayVentory Scan Engine through 12.6 Update 8 allows attackers to gain privileges if they control th… | 2026-05-08T09:31:29Z | 2026-05-08T09:31:29Z |
| ghsa-2636-hvcv-37w8 |
|
1C-Bitrix through 25.100.500 allows Remote Code Execution because an actor with SOURCE/WRITE permis… | 2026-05-08T09:31:29Z | 2026-05-08T09:31:29Z |
| ghsa-xqpp-8rwp-6rcr |
5.3 (3.1)
|
In libslic3r/GCode/PostProcessor.cpp in Prusa PrusaSlicer through 2.6.1, a crafted 3mf project file… | 2026-05-08T06:32:38Z | 2026-05-08T18:31:31Z |
| ghsa-vr2c-fpjq-qvp3 |
6.3 (3.1)
|
SOPlanning 1.52.00 is vulnerable to SQL Injection by an authenticated user via projets.php with statut[]. | 2026-05-08T06:32:38Z | 2026-05-08T18:31:32Z |
| ghsa-v5fc-fw74-r356 |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability was found in Tenda CX12L 16.03.53.12. This issue affects the function formSetPPTPSe… | 2026-05-08T06:32:38Z | 2026-05-08T06:32:38Z |
| ghsa-rx53-rx95-fqqm |
7.5 (3.1)
|
Mikrotik RouterOS (x86) 6.40.5 through 6.49.10 (fixed in 7) allows a remote attacker to cause a den… | 2026-05-08T06:32:38Z | 2026-05-08T15:31:20Z |
| ghsa-hxqg-f8pm-8v2h |
7.3 (3.1)
|
LINQPad before 5.52.01 Pro edition is vulnerable to Unsafe Deserialization in LINQPad.AutoRefManage… | 2026-05-08T06:32:38Z | 2026-05-08T21:31:24Z |
| ghsa-hrfc-58jm-6fpc |
7.3 (3.1)
|
Prison Management System Using PHP v1.0 was discovered to contain a SQL injection vulnerability via… | 2026-05-08T06:32:38Z | 2026-05-08T18:31:32Z |
| ghsa-9r2v-r8jf-9prp |
7.8 (3.1)
|
NAVER MYBOX Explorer for Windows before 3.0.11.160 allows a local attacker to escalate privileges t… | 2026-05-08T06:32:38Z | 2026-05-08T21:31:23Z |
| ghsa-94g3-j7xc-qpwj |
7.3 (3.1)
|
A Command Injection issue in the payload build page in BYOB (Build Your Own Botnet) 2.0 allows atta… | 2026-05-08T06:32:38Z | 2026-05-08T18:31:32Z |
| ghsa-8cxw-g3j3-5xpx |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability has been found in Totolink X5000R 9.1.0u.6369_B20230113. This vulnerability affects… | 2026-05-08T06:32:38Z | 2026-05-08T06:32:38Z |
| ghsa-7pgf-mjr6-8r53 |
6.3 (3.1)
|
/cgi-bin/time.cgi in Atlona AT-OME-MS42 Matrix Switcher 1.1.2 allow remote authenticated users to e… | 2026-05-08T06:32:38Z | 2026-05-08T15:31:20Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-268 |
7.5 (3.1)
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Dolphi… | apache-dolphinscheduler | 2023-11-24T08:15:00+00:00 | 2024-11-21T14:22:40.797843+00:00 |
| pysec-2023-285 |
5.4 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-11-22T16:15:00+00:00 | 2024-11-21T14:22:55.567982+00:00 |
| pysec-2023-244 |
|
Apache Software Foundation Apache Submarine has an SQL injection vulnerability when a use… | apache-submarine | 2023-11-22T10:15:00+00:00 | 2023-11-22T11:21:52.095543+00:00 |
| pysec-2023-288 |
6.5 (3.1)
|
The Nautobot Device Onboarding plugin uses the netmiko and NAPALM libraries to simplify t… | nautobot-device-onboarding | 2023-11-21T23:15:00+00:00 | 2024-11-21T14:22:55.475794+00:00 |
| pysec-2023-302 |
7.5 (3.1)
|
An issue in /upydev/keygen.py in upydev v0.4.3 allows attackers to decrypt sensitive info… | upydev | 2023-11-20T23:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2023-240 |
|
Apache Software Foundation Apache Submarine has a bug when serializing against yaml. The … | apache-submarine | 2023-11-20T09:15:00+00:00 | 2023-11-20T11:21:41.073991+00:00 |
| pysec-2023-245 |
7.5 (3.1)
|
PyPinkSign v0.5.1 uses a non-random or static IV for Cipher Block Chaining (CBC) mode in … | pypinksign | 2023-11-16T18:15:00+00:00 | 2023-11-22T19:19:42.405614+00:00 |
| pysec-2023-243 |
7.4 (3.1)
|
Missing SSL certificate validation in localstack v2.3.2 allows attackers to eavesdrop on … | localstack | 2023-11-16T18:15:00Z | 2024-10-09T12:05:48.156835Z |
| pysec-2023-242 |
7.4 (3.1)
|
Missing SSL certificate validation in HTTPie v3.2.2 allows attackers to eavesdrop on comm… | httpie | 2023-11-16T18:15:00+00:00 | 2023-11-22T02:43:48.390438+00:00 |
| pysec-2023-304 |
8.8 (3.1)
|
vantage6 is a framework to manage and deploy privacy enhancing technologies like Federate… | vantage6-server | 2023-11-14T21:15:00+00:00 | 2024-11-21T14:23:02.641254+00:00 |
| pysec-2023-303 |
8.8 (3.1)
|
vantage6 is a framework to manage and deploy privacy enhancing technologies like Federate… | vantage6-node | 2023-11-14T21:15:00+00:00 | 2024-11-21T14:23:02.574095+00:00 |
| pysec-2023-247 |
6.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Affected … | aiohttp | 2023-11-14T21:15:00+00:00 | 2023-11-22T23:23:57.631856+00:00 |
| pysec-2023-246 |
7.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. The HTTP … | aiohttp | 2023-11-14T21:15:00+00:00 | 2023-11-22T23:23:57.547793+00:00 |
| pysec-2023-239 |
6.8 (3.1)
|
An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the remote end of an… | asyncssh | 2023-11-14T03:15:00+00:00 | 2023-11-20T09:25:38.326328+00:00 |
| pysec-2023-237 |
5.9 (3.1)
|
An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the extension info m… | asyncssh | 2023-11-14T03:15:00+00:00 | 2023-11-17T17:27:01.919743+00:00 |
| pysec-2023-275 |
7.5 (3.1)
|
Label Studio is an open source data labeling tool. In all current versions of Label Studi… | label-studio | 2023-11-13T21:15:00+00:00 | 2024-11-21T14:22:53.350760+00:00 |
| pysec-2023-236 |
7.5 (3.1)
|
Remarshal prior to v0.17.1 expands YAML alias nodes unlimitedly, hence Remarshal is vulne… | remarshal | 2023-11-13T03:15:00+00:00 | 2023-11-16T20:25:23.801345+00:00 |
| pysec-2023-232 |
|
We failed to apply CVE-2023-40611 in 2.7.1 and this vulnerability was marked as fixed the… | apache-airflow | 2023-11-12T14:15:00+00:00 | 2023-11-12T16:29:15.404665+00:00 |
| pysec-2023-231 |
|
Apache Airflow, versions before 2.7.3, has a vulnerability that allows an authorized user… | apache-airflow | 2023-11-12T14:15:00+00:00 | 2023-11-12T16:29:15.321733+00:00 |
| pysec-2023-241 |
9.1 (3.1)
|
Piccolo is an object-relational mapping and query builder which supports asyncio. Prior t… | piccolo | 2023-11-10T18:15:00Z | 2024-01-23T23:21:13.409656Z |
| pysec-2023-234 |
7.5 (3.1)
|
An issue discovered in esptool 4.6.2 allows attackers to view sensitive information via w… | esptool | 2023-11-09T16:15:00Z | 2024-01-02T13:04:16.284694Z |
| pysec-2023-274 |
8.8 (3.1)
|
Label Studio is a multi-type data labeling and annotation tool with standardized output f… | label-studio | 2023-11-09T15:15:00+00:00 | 2024-11-21T14:22:53.173192+00:00 |
| pysec-2023-235 |
7.5 (3.1)
|
An issue was discovered in Couchbase Server 7.2.0. There is a private key leak in debug.l… | couchbase | 2023-11-08T21:15:00Z | 2024-01-03T21:03:33.010228Z |
| pysec-2023-233 |
8.8 (3.1)
|
Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif,… | exiv2 | 2023-11-06T18:15:00Z | 2024-01-02T15:20:59.435740Z |
| pysec-2023-227 |
|
An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrol… | pillow | 2023-11-03T05:15:00+00:00 | 2023-11-03T10:29:41.505456+00:00 |
| pysec-2023-226 |
|
In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.te… | django | 2023-11-03T05:15:00+00:00 | 2023-11-03T10:29:40.328470+00:00 |
| pysec-2023-225 |
|
In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encodi… | django | 2023-11-03T05:15:00+00:00 | 2023-11-03T10:29:40.160394+00:00 |
| pysec-2023-223 |
|
Unsafe YAML deserialization in yaml.Loader in transmute-core before 1.13.5 allows attacke… | transmute-core | 2023-11-02T06:15:00+00:00 | 2023-11-02T10:30:07.951105+00:00 |
| pysec-2023-222 |
|
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.… | django | 2023-11-02T06:15:00+00:00 | 2023-11-02T10:30:06.341485+00:00 |
| pysec-2023-230 |
5.3 (3.1)
|
Synapse is an open-source Matrix homeserver Prior to versions 1.95.1 and 1.96.0rc1, cache… | matrix-synapse | 2023-10-31T17:15:00+00:00 | 2023-11-08T20:24:49.199333+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-3078 | Malicious code in axis-notification (npm) | 2026-04-25T09:45:43Z | 2026-05-04T23:51:16Z |
| mal-2026-3077 | Malicious code in axis-charts (npm) | 2026-04-25T09:45:42Z | 2026-05-04T23:51:16Z |
| mal-2026-3032 | Malicious code in js-component-explorer (npm) | 2026-04-25T08:43:55Z | 2026-04-30T22:25:10Z |
| mal-2026-3069 | Malicious code in @tochka-ui/foundation (npm) | 2026-04-24T22:55:55Z | 2026-05-04T03:25:18Z |
| mal-2026-3083 | Malicious code in elementary-data (PyPI) | 2026-04-24T22:54:25Z | 2026-04-27T14:18:51Z |
| mal-2026-3060 | Malicious code in @frengki0707/google-cloud-clone (npm) | 2026-04-24T22:43:16Z | 2026-04-30T22:25:07Z |
| mal-2026-3052 | Malicious code in @alfa.life.mapp/app.web (npm) | 2026-04-24T20:06:24Z | 2026-05-04T03:25:18Z |
| mal-2026-3031 | Malicious code in swampo (PyPI) | 2026-04-24T18:55:32Z | 2026-04-24T18:55:32Z |
| mal-2026-3065 | Malicious code in @m0ntana/app.web (npm) | 2026-04-24T18:21:08Z | 2026-05-04T03:25:18Z |
| mal-2026-3030 | Malicious code in model-poc-suhail (npm) | 2026-04-24T15:35:46Z | 2026-04-30T22:25:11Z |
| mal-2026-3025 | Malicious code in next-rwa (npm) | 2026-04-24T03:19:37Z | 2026-04-24T03:19:38Z |
| mal-2026-3024 | Malicious code in auth0-ui-components-docs (npm) | 2026-04-24T03:19:37Z | 2026-04-24T03:19:38Z |
| mal-2026-3027 | Malicious code in wrapped-logger-utils (npm) | 2026-04-24T03:07:24Z | 2026-04-24T03:07:24Z |
| mal-2026-3026 | Malicious code in sagat-core (npm) | 2026-04-24T02:39:04Z | 2026-04-24T02:39:04Z |
| mal-2026-3028 | Malicious code in amplitude-ma-ts (npm) | 2026-04-24T01:35:44Z | 2026-04-27T01:42:39Z |
| mal-2026-3023 | Malicious code in test-pkg-jie (PyPI) | 2026-04-23T18:36:37Z | 2026-04-23T18:36:37Z |
| mal-2026-3021 | Malicious code in lightspark-js (npm) | 2026-04-23T17:50:48Z | 2026-04-23T20:50:51Z |
| mal-2026-3022 | Malicious code in jie-utility-package (PyPI) | 2026-04-23T17:48:51Z | 2026-04-23T17:48:51Z |
| mal-2026-3020 | Malicious code in @bitwarden/cli (npm) | 2026-04-23T17:07:51Z | 2026-04-23T20:50:49Z |
| mal-2026-3018 | Malicious code in microsoft-employee-experience (npm) | 2026-04-23T16:11:04Z | 2026-04-24T06:47:56Z |
| mal-2026-3019 | Malicious code in hls.js (npm) | 2026-04-23T16:08:37Z | 2026-04-23T20:50:50Z |
| mal-2026-3017 | Malicious code in react-spa-npm (npm) | 2026-04-23T14:35:43Z | 2026-04-24T03:25:11Z |
| mal-2026-3016 | Malicious code in amazon-q-developer-streaming-client (npm) | 2026-04-23T13:15:52Z | 2026-04-24T06:47:53Z |
| mal-2026-3015 | Malicious code in lyroxcoder (PyPI) | 2026-04-23T10:40:59Z | 2026-04-23T10:40:59Z |
| mal-2026-3029 | Malicious code in eth-logger (npm) | 2026-04-23T07:27:12Z | 2026-04-24T06:47:54Z |
| mal-2026-3008 | Malicious code in json-spacer (npm) | 2026-04-23T04:42:45Z | 2026-04-23T20:50:51Z |
| mal-2026-3007 | Malicious code in json-dec (npm) | 2026-04-23T04:42:45Z | 2026-04-23T20:50:50Z |
| mal-2026-3006 | Malicious code in changelog-utils-structured-logger (npm) | 2026-04-23T04:24:15Z | 2026-04-23T20:50:50Z |
| mal-2026-3005 | Malicious code in changelog-cli-logger (npm) | 2026-04-23T04:24:15Z | 2026-04-23T20:50:50Z |
| mal-2026-3004 | Malicious code in @nklkas/hyperliquid (npm) | 2026-04-23T04:24:15Z | 2026-04-23T20:50:49Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2914 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-22T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2911 | Synacor Zimbra: Mehrere Schwachstellen | 2025-12-22T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2910 | Hitachi Ops Center: Mehrere Schwachstellen | 2025-12-22T23:00:00.000+00:00 | 2025-12-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2909 | IBM App Connect Enterprise: Mehrere Schwachstellen | 2025-12-22T23:00:00.000+00:00 | 2025-12-22T23:00:00.000+00:00 |
| wid-sec-w-2025-2905 | MongoDB: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-18T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2904 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-18T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2897 | Apache log4j: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-18T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2891 | WebKitGTK: Mehrere Schwachstellen ermöglichen Codeausführung und DoS | 2025-12-18T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2888 | ImageMagick: Schwachstelle ermöglicht Denial of Service | 2025-12-18T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2887 | PHP: Mehrere Schwachstellen | 2025-12-18T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2886 | Red Hat Enterprise Linux (git-lfs, opentelemetry-collector): Mehrere Schwachstellen | 2025-12-18T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-2885 | Mozilla Firefox: Mehrere Schwachstellen | 2025-12-18T23:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2882 | Red Hat Enterprise Linux (audiofile): Schwachstelle ermöglicht Denial of Service | 2025-12-17T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2881 | Red Hat Enterprise Linux (multicluster global hub): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-12-17T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-2872 | Drupal HTTP Client Manager: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-17T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2871 | GIMP: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-12-17T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2868 | Linux Kernel: Mehrere Schwachstellen | 2025-12-16T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2867 | HPE OneView: Schwachstelle ermöglicht Codeausführung | 2025-12-16T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-2866 | Dropbear SSH: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2025-12-16T23:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2860 | JetBrains TeamCity: Mehrere Schwachstellen | 2025-12-16T23:00:00.000+00:00 | 2025-12-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2858 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2025-12-16T23:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2857 | Apache Commons Text: Schwachstelle ermöglicht Codeausführung | 2025-12-16T23:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2854 | Roundcube: Mehrere Schwachstellen | 2025-12-15T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2849 | Red Hat Enterprise Linux (Keylime): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-12-15T23:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2846 | strongSwan (NetworkManager-Plugin): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-12-14T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2840 | Exim: Schwachstelle ermöglicht Codeausführung | 2025-12-14T23:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2836 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2025-12-14T23:00:00.000+00:00 | 2026-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2830 | Red Hat Enterprise Linux (libsoup): Schwachstelle ermöglicht Denial of Service | 2025-12-11T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2825 | MediaWiki: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-12-10T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2823 | Drupal (Acquia Content Hub): Schwachstelle ermöglicht Darstellen falscher Informationen | 2025-12-10T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-254-08 | Schneider Electric EcoStruxure | 2025-08-12T04:00:00.000000Z | 2025-09-09T04:00:00.000000Z |
| icsa-25-240-03 | Schneider Electric Saitel DR & Saitel DP Remote Terminal Unit | 2025-08-12T04:00:00.000000Z | 2025-08-12T04:00:00.000000Z |
| icsa-25-238-03 | Schneider Electric Modicon M340 Controller and Communication Modules | 2025-08-12T04:00:00.000000Z | 2025-08-12T04:00:00.000000Z |
| icsa-25-224-03 | Schneider Electric EcoStruxure Power Monitoring Expert | 2025-08-12T04:00:00.000000Z | 2025-11-11T08:00:00.000000Z |
| icsa-25-266-17 | Siemens SINEC Traffic Analyzer | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-22 | Siemens Web Installer | 2025-08-12T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-226-21 | Siemens BFCClient | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-20 | Siemens RUGGEDCOM ROX II | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-19 | Siemens SINUMERIK | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-18 | Siemens SIMOTION SCOUT, SIMOTION SCOUT TIA, and SINAMICS STARTER | 2025-08-12T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-25-226-17 | Siemens SINEC Traffic Analyzer | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-16 | Siemens SICAM Q100/Q200 | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-15 | Siemens SINEC OS | 2025-08-12T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-25-226-14 | Siemens RUGGEDCOM ROX II | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-13 | Siemens SIMATIC RTLS Locating Manager | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-12 | Siemens SIPROTEC 4 and SIPROTEC 4 Compact | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-11 | Siemens SIMATIC S7-PLCSIM | 2025-08-12T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-226-10 | Siemens SIPROTEC 5 | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-09 | Siemens RUGGEDCOM APE1808 | 2025-08-12T00:00:00.000000Z | 2026-01-14T22:05:42.880807Z |
| icsa-25-226-08 | Siemens RUGGEDCOM CROSSBOW Station Access Controller | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-07 | Siemens Third-Party Components in SINEC OS | 2025-08-12T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-25-226-06 | Siemens Opcenter Quality | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-05 | Siemens WIBU CodeMeter Runtime | 2025-08-12T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| icsa-25-226-04 | Siemens Simcenter Femap | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-03 | Siemens SIMATIC S7-PLCSIM | 2025-08-12T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-226-02 | Siemens COMOS | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-01 | Siemens SIMATIC RTLS Locating Manager | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-219-08 | Yealink IP Phones and RPS (Redirect and Provisioning Service) | 2025-08-07T06:00:00.000000Z | 2025-08-07T06:00:00.000000Z |
| icsa-25-219-07 | EG4 Electronics EG4 Inverters (Update B) | 2025-08-07T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-219-05 | Packet Power EMX and EG | 2025-08-07T06:00:00.000000Z | 2025-08-07T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-iosxr-priv-esc-crg5vhcq | Cisco IOS XR Software CLI Privilege Escalation Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-ponctlr-ci-ohchmsfl | Cisco Routed Passive Optical Network Controller Vulnerabilities | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-meraki-agent-dll-hj-ptn7ptke | Cisco Meraki Systems Manager Agent for Windows Privilege Escalation Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-ise-injection-6kn9tsxm | Cisco Identity Services Engine Command Injection Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-expressway-auth-kdfrcz2j | Cisco Expressway Edge Improper Authorization Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-duo-epic-info-sdlv6h8y | Cisco Duo Epic for Hyperdrive Information Disclosure Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-cslu-7ghmzwmw | Cisco Smart Licensing Utility Vulnerabilities | 2024-09-04T16:00:00+00:00 | 2025-04-04T17:44:00+00:00 |
| cisco-sa-nxos-psbe-ce-yvbtn5du | Cisco NX-OS Software Python Sandbox Escape Vulnerabilities | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-nxos-dhcp6-relay-dos-zneaa6xn | Cisco NX-OS Software DHCPv6 Relay Agent Denial of Service Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-nxos-cmdinj-lq6jszhh | Cisco NX-OS Software Command Injection Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-nxos-bshacepe-bapehsx7 | Cisco NX-OS Software Bash Arbitrary Code Execution and Privilege Escalation Vulnerabilities | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-capic-priv-esc-uyqjjnuu | Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-apic-cousmo-ubpbygbq | Cisco Application Policy Infrastructure Controller Unauthorized Policy Actions Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-ise-rest-5bpkrntz | Cisco Identity Services Engine REST API Blind SQL Injection Vulnerabilities | 2024-08-21T16:00:00+00:00 | 2024-08-22T15:15:53+00:00 |
| cisco-sa-ise-info-exp-vdf8jbyk | Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-09-05T13:14:02+00:00 |
| cisco-sa-ise-csrf-y4zuz5rj | Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-08-21T16:00:00+00:00 |
| cisco-sa-cucm-xss-9zmfhyz | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-09-20T15:48:56+00:00 |
| cisco-sa-cucm-dos-kkhq43we | Cisco Unified Communications Manager Denial of Service Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-08-21T16:00:00+00:00 |
| cisco-sa-spa-http-vulns-rjzmx2xz | Cisco Small Business SPA300 Series and SPA500 Series IP Phones Web UI Vulnerabilities | 2024-08-07T16:00:00+00:00 | 2024-08-07T16:00:00+00:00 |
| cisco-sa-ise-xss-v2bm9jcy | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2024-08-07T16:00:00+00:00 | 2024-08-07T16:00:00+00:00 |
| cisco-sa-webex-app-zjnm8x8j | Cisco Webex App Vulnerabilities | 2024-07-17T16:00:00+00:00 | 2024-07-17T16:00:00+00:00 |
| cisco-sa-swa-priv-esc-7uhpzscc | Cisco Secure Web Appliance Privilege Escalation Vulnerability | 2024-07-17T16:00:00+00:00 | 2024-11-22T17:13:56+00:00 |
| cisco-sa-sb-rv34x-rce-7pqfu2e | Cisco RV340 and RV345 Dual WAN Gigabit VPN Routers Authenticated Remote Code Execution Vulnerability | 2024-07-17T16:00:00+00:00 | 2024-07-17T16:00:00+00:00 |
| cisco-sa-ise-file-upload-krw2txa9 | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | 2024-07-17T16:00:00+00:00 | 2024-07-17T16:00:00+00:00 |
| cisco-sa-inode-static-key-vuvceynn | Cisco Intelligent Node Software Static Key Vulnerability | 2024-07-17T16:00:00+00:00 | 2024-07-17T16:00:00+00:00 |
| cisco-sa-expressway-redirect-kjsfuxgj | Cisco Expressway Series Open Redirect Vulnerability | 2024-07-17T16:00:00+00:00 | 2024-07-17T16:00:00+00:00 |
| cisco-sa-esa-priv-esc-ssti-xno2eogz | Cisco Secure Email Gateway Server-Side Template Injection Vulnerability | 2024-07-17T16:00:00+00:00 | 2024-07-17T16:00:00+00:00 |
| cisco-sa-esa-afw-bgg2usjh | Cisco Secure Email Gateway Arbitrary File Write Vulnerability | 2024-07-17T16:00:00+00:00 | 2024-07-17T16:00:00+00:00 |
| cisco-sa-cssm-auth-slw3uhuy | Cisco Smart Software Manager On-Prem Password Change Vulnerability | 2024-07-17T16:00:00+00:00 | 2024-08-07T14:54:52+00:00 |
| cisco-sa-xr-secure-boot-qud5g8ap | Cisco IOS XR Software Secure Boot Bypass Vulnerability | 2024-07-10T16:00:00+00:00 | 2024-07-10T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-4878 | Libcap: libcap: privilege escalation via toctou race condition in cap_set_file() | 2026-04-02T00:00:00.000Z | 2026-04-14T14:47:44.000Z |
| msrc_cve-2026-4786 | Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open() | 2026-04-02T00:00:00.000Z | 2026-04-22T01:37:33.000Z |
| msrc_cve-2026-42798 | CVE-2026-42798 | 2026-04-02T00:00:00.000Z | 2026-05-05T01:03:12.000Z |
| msrc_cve-2026-41989 | CVE-2026-41989 | 2026-04-02T00:00:00.000Z | 2026-05-06T14:38:50.000Z |
| msrc_cve-2026-41988 | CVE-2026-41988 | 2026-04-02T00:00:00.000Z | 2026-04-30T01:50:14.000Z |
| msrc_cve-2026-41907 | uuid: Missing buffer bounds check in `v3`/`v5`/`v6` when `buf` is provided | 2026-04-02T00:00:00.000Z | 2026-04-27T14:43:21.000Z |
| msrc_cve-2026-41898 | rust-openssl: Unchecked callback-returned length in PSK and cookie generate trampolines can cause OpenSSL to leak adjacent memory to the network peer | 2026-04-02T00:00:00.000Z | 2026-04-30T01:55:17.000Z |
| msrc_cve-2026-41681 | rust-openssl: MdCtxRef::digest_final() writes past caller buffer with no length check | 2026-04-02T00:00:00.000Z | 2026-04-30T01:50:12.000Z |
| msrc_cve-2026-41678 | rust-openssl: Incorrect bounds assertion in aes key wrap | 2026-04-02T00:00:00.000Z | 2026-04-30T01:49:10.000Z |
| msrc_cve-2026-41677 | rust-openssl: Out-of-bounds read in PEM password callback when user callback returns an oversized length | 2026-04-02T00:00:00.000Z | 2026-04-30T01:49:43.000Z |
| msrc_cve-2026-41676 | rust-openssl: Deriver::derive and PkeyCtxRef::derive can overflow short buffers on OpenSSL 1.1.1 | 2026-04-02T00:00:00.000Z | 2026-04-30T01:48:29.000Z |
| msrc_cve-2026-41636 | Apache Thrift: Node.js skip() recursion | 2026-04-02T00:00:00.000Z | 2026-05-01T01:04:09.000Z |
| msrc_cve-2026-41607 | Apache Thrift: C++ JSON OOB read | 2026-04-02T00:00:00.000Z | 2026-05-01T01:04:23.000Z |
| msrc_cve-2026-41606 | Apache Thrift: c_glib dispatch stack overflow | 2026-04-02T00:00:00.000Z | 2026-05-01T01:03:58.000Z |
| msrc_cve-2026-41605 | Apache Thrift: Swift Compact Protocol integer overflow | 2026-04-02T00:00:00.000Z | 2026-05-01T01:04:28.000Z |
| msrc_cve-2026-41604 | Apache Thrift: Swift Range crash in skip() | 2026-04-02T00:00:00.000Z | 2026-05-01T01:04:03.000Z |
| msrc_cve-2026-41603 | Apache Thrift: Java TSSLTransportFactory hostname verification | 2026-04-02T00:00:00.000Z | 2026-04-30T01:11:14.000Z |
| msrc_cve-2026-41602 | Apache Thrift: Go TFramedTransport uint32 overflow | 2026-04-02T00:00:00.000Z | 2026-05-01T01:03:27.000Z |
| msrc_cve-2026-41526 | CVE-2026-41526 | 2026-04-02T00:00:00.000Z | 2026-05-09T01:38:59.000Z |
| msrc_cve-2026-41445 | KissFFT Integer Overflow Heap Buffer Overflow via kiss_fftndr_alloc() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:49:48.000Z |
| msrc_cve-2026-41411 | Vim: Command injection via backtick expansion in tag filenames | 2026-04-02T00:00:00.000Z | 2026-04-29T01:39:36.000Z |
| msrc_cve-2026-41305 | PostCSS has XSS via Unescaped </style> in its CSS Stringify Output | 2026-04-02T00:00:00.000Z | 2026-04-30T01:52:52.000Z |
| msrc_cve-2026-41254 | CVE-2026-41254 | 2026-04-02T00:00:00.000Z | 2026-04-29T14:59:03.000Z |
| msrc_cve-2026-41205 | Mako: Path traversal via double-slash URI prefix in TemplateLookup | 2026-04-02T00:00:00.000Z | 2026-05-06T14:39:00.000Z |
| msrc_cve-2026-41140 | Poetry: Path traversal in tar extraction on Python 3.10.0 - 3.10.12 and 3.11.0 - 3.11.4 | 2026-04-02T00:00:00.000Z | 2026-04-29T14:47:17.000Z |
| msrc_cve-2026-41082 | CVE-2026-41082 | 2026-04-02T00:00:00.000Z | 2026-05-07T01:13:38.000Z |
| msrc_cve-2026-41080 | CVE-2026-41080 | 2026-04-02T00:00:00.000Z | 2026-05-02T01:38:30.000Z |
| msrc_cve-2026-41079 | OpenPrinting CUPS: Heap out-of-bounds read in SNMP supply-level polling leaks stack memory to authenticated users | 2026-04-02T00:00:00.000Z | 2026-04-29T14:51:25.000Z |
| msrc_cve-2026-41066 | lxml: Default configuration of iterparse() and ETCompatXMLParser() allows XXE to local files | 2026-04-02T00:00:00.000Z | 2026-05-06T14:42:16.000Z |
| msrc_cve-2026-41035 | CVE-2026-41035 | 2026-04-02T00:00:00.000Z | 2026-04-18T01:01:55.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0181 | Kwetsbaarheid verholpen in Roundcube Webmail | 2025-06-02T09:04:58.900416Z | 2025-06-05T14:19:00.303593Z |
| ncsc-2025-0180 | Kwetsbaarheid verholpen in IBM Tivoli Monitoring | 2025-06-02T09:00:25.515472Z | 2025-06-02T09:00:25.515472Z |
| ncsc-2025-0179 | Kwetsbaarheid verholpen in Siemens SiPass Integrated | 2025-05-27T11:42:46.878569Z | 2025-05-27T11:42:46.878569Z |
| ncsc-2025-0178 | Kwetsbaarheden verholpen in Infoblox NETMRI | 2025-05-23T08:55:37.586046Z | 2025-05-23T08:55:37.586046Z |
| ncsc-2025-0177 | Kwetsbaarheden verholpen in ABB ASPECT-productlijn | 2025-05-23T08:40:56.272804Z | 2025-05-23T08:40:56.272804Z |
| ncsc-2025-0176 | Kwetsbaarheden verholpen in GitLab | 2025-05-23T08:38:34.688022Z | 2025-05-23T08:38:34.688022Z |
| ncsc-2025-0175 | Kwetsbaarheden verholpen in Trend Micro Apex Central | 2025-05-23T08:28:52.215347Z | 2025-05-23T08:28:52.215347Z |
| ncsc-2025-0174 | Kwetsbaarheden verholpen in Cisco Unified Intelligence Center | 2025-05-22T08:14:14.245836Z | 2025-05-22T08:14:14.245836Z |
| ncsc-2025-0173 | Kwetsbaarheid verholpen in Cisco Identity Services Engine | 2025-05-22T08:14:06.046824Z | 2025-05-22T08:14:06.046824Z |
| ncsc-2025-0172 | Kwetsbaarheden verholpen in Cisco Webex | 2025-05-22T08:13:51.228348Z | 2025-05-22T08:13:51.228348Z |
| ncsc-2025-0171 | Kwetsbaarheden verholpen in VMware producten | 2025-05-21T13:08:22.714183Z | 2025-05-21T13:08:22.714183Z |
| ncsc-2025-0170 | Kwetsbaarheden verholpen in VMware Cloud Foundation | 2025-05-21T09:12:05.676292Z | 2025-05-21T09:12:05.676292Z |
| ncsc-2025-0169 | Kwetsbaarheden verholpen in Google Chrome | 2025-05-16T12:41:47.685095Z | 2025-05-16T12:41:47.685095Z |
| ncsc-2025-0168 | Kwetsbaarheid verholpen in FortiVoice | 2025-05-14T13:50:54.001151Z | 2025-05-14T13:50:54.001151Z |
| ncsc-2025-0167 | Kwetsbaarheden verholpen in Zoho ManageEngine | 2025-05-14T13:19:58.768414Z | 2025-05-14T13:19:58.768414Z |
| ncsc-2025-0166 | Kwetsbaarheden verholpen in Fortinet producten | 2025-05-14T08:41:08.980708Z | 2025-05-14T08:41:08.980708Z |
| ncsc-2025-0165 | Kwetsbaarheid verholpen in Adobe Illustrator | 2025-05-14T08:25:17.869407Z | 2025-05-14T08:25:17.869407Z |
| ncsc-2025-0164 | Kwetsbaarheden verholpen in Adobe Photoshop | 2025-05-14T08:24:02.186984Z | 2025-05-14T08:24:02.186984Z |
| ncsc-2025-0163 | Kwetsbaarheden verholpen in Adobe Animate | 2025-05-14T08:21:49.917725Z | 2025-05-14T08:21:49.917725Z |
| ncsc-2025-0162 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2025-05-14T08:18:54.775740Z | 2025-05-14T08:18:54.775740Z |
| ncsc-2025-0161 | Kwetsbaarheid verholpen in Ivanti Neurons for ITSM | 2025-05-14T08:16:04.867590Z | 2025-05-14T08:16:04.867590Z |
| ncsc-2025-0160 | Kwetsbaarheden verholpen in Siemens producten | 2025-05-14T07:13:32.957900Z | 2025-05-14T07:13:32.957900Z |
| ncsc-2025-0159 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-05-13T19:47:12.555983Z | 2025-05-13T19:47:12.555983Z |
| ncsc-2025-0158 | Kwetsbaarheden verholpen in Microsoft Edge | 2025-05-13T19:17:52.478234Z | 2025-05-13T19:17:52.478234Z |
| ncsc-2025-0157 | Kwetsbaarheden verholpen in Microsoft Defender | 2025-05-13T19:14:25.545635Z | 2025-05-13T19:14:25.545635Z |
| ncsc-2025-0156 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-05-13T19:10:10.012472Z | 2025-05-13T19:10:10.012472Z |
| ncsc-2025-0155 | Kwetsbaarheden verholpen in Microsoft Office | 2025-05-13T18:58:56.989073Z | 2025-05-13T18:58:56.989073Z |
| ncsc-2025-0154 | Kwetsbaarheden verholpen in Microsoft Dynamics Dataverse | 2025-05-13T18:44:03.290810Z | 2025-05-13T18:44:03.290810Z |
| ncsc-2025-0153 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-05-13T18:35:28.760017Z | 2025-05-13T18:35:28.760017Z |
| ncsc-2025-0152 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager Mobile (EPMM, voormalig MobileIron) | 2025-05-13T15:35:45.784542Z | 2025-05-16T09:42:15.822544Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20384-1 | Security update for libsoup | 2026-03-18T10:01:12Z | 2026-03-18T10:01:12Z |
| opensuse-su-2026:20383-1 | Security update for net-snmp | 2026-03-18T09:56:31Z | 2026-03-18T09:56:31Z |
| opensuse-su-2026:20131-1 | Security update for postgresql17 and postgresql18 | 2026-03-18T08:31:44Z | 2026-03-18T08:31:44Z |
| opensuse-su-2026:10390-1 | tempo-cli-2.10.3-1.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:10389-1 | python311-salt-3006.0-56.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:10388-1 | mumble-1.5.857-2.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:10387-1 | kernel-devel-6.19.8-1.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:10386-1 | ImageMagick-7.1.2.17-1.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:20380-1 | Security update for snpguest | 2026-03-17T15:51:45Z | 2026-03-17T15:51:45Z |
| opensuse-su-2026:20375-1 | Security update for python-PyPDF2 | 2026-03-17T15:19:48Z | 2026-03-17T15:19:48Z |
| opensuse-su-2026:20378-1 | Security update for libpng16 | 2026-03-17T14:49:10Z | 2026-03-17T14:49:10Z |
| opensuse-su-2026:20374-1 | Security update for krb5-appl | 2026-03-17T13:34:53Z | 2026-03-17T13:34:53Z |
| opensuse-su-2026:20373-1 | Security update for python-Django | 2026-03-17T13:27:11Z | 2026-03-17T13:27:11Z |
| opensuse-su-2026:20377-1 | Security update for python-maturin | 2026-03-17T12:51:10Z | 2026-03-17T12:51:10Z |
| opensuse-su-2026:20368-1 | Security update for ocaml | 2026-03-17T10:41:31Z | 2026-03-17T10:41:31Z |
| opensuse-su-2026:20372-1 | Security update for chromium | 2026-03-17T10:11:02Z | 2026-03-17T10:11:02Z |
| opensuse-su-2026:10385-1 | traefik-3.6.10-2.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10384-1 | cargo1.94-1.94.0-2.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10383-1 | cargo1.93-1.93.0-3.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10382-1 | cargo1.92-1.92.0-2.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10381-1 | python311-3.11.15-2.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10380-1 | python311-uv-0.10.11-1.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10379-1 | python311-CairoSVG-2.9.0-1.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10378-1 | ovmf-202602-5.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:20365-1 | Security update for MozillaFirefox | 2026-03-16T16:42:36Z | 2026-03-16T16:42:36Z |
| opensuse-su-2026:20366-1 | Security update for docker-stable | 2026-03-16T15:57:03Z | 2026-03-16T15:57:03Z |
| opensuse-su-2026:20364-1 | Security update for rust-keylime | 2026-03-16T15:31:12Z | 2026-03-16T15:31:12Z |
| opensuse-su-2026:10377-1 | python312-3.12.13-2.1 on GA media | 2026-03-16T00:00:00Z | 2026-03-16T00:00:00Z |
| opensuse-su-2026:10376-1 | chromedriver-146.0.7680.80-1.1 on GA media | 2026-03-16T00:00:00Z | 2026-03-16T00:00:00Z |
| opensuse-su-2026:10375-1 | coturn-4.9.0-1.1 on GA media | 2026-03-15T00:00:00Z | 2026-03-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:10215 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.18 security update. | 2026-04-23T17:30:01+00:00 | 2026-05-05T03:16:34+00:00 |
| rhsa-2026:10213 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.17 security update. | 2026-04-23T17:30:00+00:00 | 2026-05-05T03:16:34+00:00 |
| rhsa-2026:10211 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.14 security update. | 2026-04-23T17:21:09+00:00 | 2026-05-05T03:16:33+00:00 |
| rhsa-2026:10209 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.12 security update. | 2026-04-23T17:20:35+00:00 | 2026-05-05T03:16:33+00:00 |
| rhsa-2026:10206 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.19 security update. | 2026-04-23T17:15:37+00:00 | 2026-05-05T03:16:32+00:00 |
| rhsa-2026:10205 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.20 security update. | 2026-04-23T17:06:07+00:00 | 2026-05-05T03:16:32+00:00 |
| rhsa-2026:10133 | Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update | 2026-04-23T16:57:43+00:00 | 2026-05-08T15:01:11+00:00 |
| rhsa-2026:10204 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.15 security update. | 2026-04-23T16:56:17+00:00 | 2026-05-05T03:16:32+00:00 |
| rhsa-2026:10101 | Red Hat Security Advisory: python3.9 security update | 2026-04-23T16:40:22+00:00 | 2026-05-05T20:31:07+00:00 |
| rhsa-2026:10201 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.13 security update. | 2026-04-23T16:39:39+00:00 | 2026-05-05T03:16:31+00:00 |
| rhsa-2026:9691 | Red Hat Security Advisory: OpenJDK 21.0.11 Security Update for Windows Builds | 2026-04-23T16:10:22+00:00 | 2026-05-04T21:23:59+00:00 |
| rhsa-2026:9690 | Red Hat Security Advisory: OpenJDK 21.0.11 Security Update for Portable Linux Builds | 2026-04-23T16:10:07+00:00 | 2026-05-04T21:23:59+00:00 |
| rhsa-2026:9694 | Red Hat Security Advisory: OpenJDK 25.0.3 Security Update for Portable Linux Builds | 2026-04-23T16:09:51+00:00 | 2026-05-04T21:24:01+00:00 |
| rhsa-2026:9688 | Red Hat Security Advisory: OpenJDK 17.0.19 Security Update for Windows Builds | 2026-04-23T16:08:36+00:00 | 2026-05-04T21:23:56+00:00 |
| rhsa-2026:9684 | Red Hat Security Advisory: OpenJDK 8u492 Security Update for Portable Linux Builds | 2026-04-23T16:07:25+00:00 | 2026-05-04T21:23:54+00:00 |
| rhsa-2026:9685 | Red Hat Security Advisory: OpenJDK 8u492 Windows Security Update | 2026-04-23T16:07:19+00:00 | 2026-05-04T21:23:54+00:00 |
| rhsa-2026:9687 | Red Hat Security Advisory: OpenJDK 17.0.19 Security Update for Portable Linux Builds | 2026-04-23T16:07:04+00:00 | 2026-05-04T21:23:56+00:00 |
| rhsa-2026:10199 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.21 security update. | 2026-04-23T16:00:39+00:00 | 2026-05-05T03:16:31+00:00 |
| rhsa-2026:10102 | Red Hat Security Advisory: python security update | 2026-04-23T15:03:53+00:00 | 2026-05-05T20:31:05+00:00 |
| rhsa-2026:10184 | Red Hat Security Advisory: RHOAI 2.25.5 - Red Hat OpenShift AI | 2026-04-23T14:53:58+00:00 | 2026-05-09T08:54:28+00:00 |
| rhsa-2026:10175 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.27.1 Release. | 2026-04-23T14:43:48+00:00 | 2026-05-09T08:54:27+00:00 |
| rhsa-2026:10172 | Red Hat Security Advisory: RHTAS 1.3.4 - Red Hat Trusted Artifact Signer Release | 2026-04-23T14:42:03+00:00 | 2026-05-09T08:54:27+00:00 |
| rhsa-2026:10158 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.7.2 | 2026-04-23T14:13:54+00:00 | 2026-05-09T08:54:26+00:00 |
| rhsa-2026:10155 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.6.5 | 2026-04-23T13:57:56+00:00 | 2026-05-09T08:54:26+00:00 |
| rhsa-2026:10153 | Red Hat Security Advisory: RHTAS 1.3.4 - Red Hat Trusted Artifact Signer Release | 2026-04-23T13:52:18+00:00 | 2026-05-09T08:54:26+00:00 |
| rhsa-2026:10141 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 3.3.1 | 2026-04-23T13:36:23+00:00 | 2026-05-08T14:59:14+00:00 |
| rhsa-2026:10140 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 3.3.1 | 2026-04-23T13:34:50+00:00 | 2026-05-08T14:59:13+00:00 |
| rhsa-2026:10131 | Red Hat Security Advisory: RHTAS 1.3.4 - Red Hat Trusted Artifact Signer Release | 2026-04-23T12:17:52+00:00 | 2026-05-09T08:54:25+00:00 |
| rhsa-2026:10130 | Red Hat Security Advisory: RHTAS 1.3.4 - Red Hat Trusted Artifact Signer Release | 2026-04-23T12:17:43+00:00 | 2026-05-09T08:54:25+00:00 |
| rhsa-2026:10126 | Red Hat Security Advisory: RHTAS 1.3.4 - Red Hat Trusted Artifact Signer Release | 2026-04-23T12:16:06+00:00 | 2026-05-09T08:54:24+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-160243 | SSA-160243: Multiple Vulnerabilities in SINEC NMS before V2.0 | 2023-10-10T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-134651 | SSA-134651: Hard Coded SSH ID in CPCI85 Firmware of SICAM A8000 Devices | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-035466 | SSA-035466: Incorrect Permission Assignment in SICAM PAS/PQS | 2023-10-10T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-646240 | SSA-646240: Sensitive Information Disclosure in SIMATIC PCS neo Administration Console | 2023-09-14T00:00:00Z | 2023-09-14T00:00:00Z |
| ssa-357182 | SSA-357182: Local Privilege Escalation Vulnerability in Spectrum Power 7 | 2023-09-14T00:00:00Z | 2023-09-14T00:00:00Z |
| ssa-981975 | SSA-981975: Information Disclosure Vulnerability in Intel-CPUs (CVE-2022-40982) Impacting SIMATIC IPCs | 2023-09-12T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-957369 | SSA-957369: Insyde BIOS Vulnerabilities in RUGGEDCOM APE1808 Product Family | 2023-09-12T00:00:00Z | 2023-09-12T00:00:00Z |
| ssa-711309 | SSA-711309: Denial of Service Vulnerability in the OPC UA Implementations of SIMATIC Products | 2023-09-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-278349 | SSA-278349: Multiple WRL File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2023-09-12T00:00:00Z | 2023-09-12T00:00:00Z |
| ssa-240541 | SSA-240541: WIBU Systems CodeMeter Heap Buffer Overflow Vulnerability in Industrial Products | 2023-09-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-190839 | SSA-190839: X_T File Parsing Vulnerabilities in Parasolid | 2023-09-12T00:00:00Z | 2023-09-12T00:00:00Z |
| ssa-147266 | SSA-147266: Multiple Vulnerabilities in QMS Automotive before V12.39 | 2023-09-12T00:00:00Z | 2023-09-12T00:00:00Z |
| ssa-975961 | SSA-975961: Privilege Escalation Vulnerabilities in SICAM TOOLBOX II before V07.10 | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-908185 | SSA-908185: Mirror Port Isolation Vulnerability in RUGGEDCOM ROS Devices | 2023-08-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-811403 | SSA-811403: Multiple File Parsing Vulnerabilities in Solid Edge before V223 Update 7 | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-770902 | SSA-770902: Denial of Service Vulnerability in the Web Server of RUGGEDCOM ROS Devices | 2023-08-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-472630 | SSA-472630: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.4 | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-407785 | SSA-407785: Multiple X_T File Parsing Vulnerabilities in Parasolid and Teamcenter Visualization | 2023-08-08T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-264815 | SSA-264815: Type Confusion Vulnerability in OpenSSL X.400 Address Processing in SIMATIC Products | 2023-08-08T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-264814 | SSA-264814: Timing Based Side Channel Vulnerability in the OpenSSL RSA Decryption in SIMATIC Products | 2023-08-08T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-188491 | SSA-188491: DLL Hijacking Vulnerabilities in Siemens Software Center | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-131450 | SSA-131450: File parsing Vulnerabilities in Solid Edge, JT2Go and Teamcenter Visualization | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-116172 | SSA-116172: Nullsoft Scriptable Install System (NSIS) Vulnerability (CVE-2023-37378) in Parasolid Installer | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-001569 | SSA-001569: JT File Parsing Vulnerabilities in JT Open, JT Utilities and Parasolid | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-924149 | SSA-924149: Stack Overflow Vulnerability in SiPass Integrated before V2.90.3.8 | 2023-07-11T00:00:00Z | 2023-07-11T00:00:00Z |
| ssa-764801 | SSA-764801: File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2023-07-11T00:00:00Z | 2023-09-12T00:00:00Z |
| ssa-561322 | SSA-561322: Multiple Vulnerabilities in SIMATIC MV500 Devices before V3.3.4 | 2023-07-11T00:00:00Z | 2023-07-11T00:00:00Z |
| ssa-313488 | SSA-313488: Multiple Vulnerabilities in SIMATIC CN 4100 before V2.5 | 2023-07-11T00:00:00Z | 2023-07-11T00:00:00Z |
| ssa-146325 | SSA-146325: Multiple Vulnerabilities in RUGGEDCOM ROX before V2.16 | 2023-07-11T00:00:00Z | 2023-07-11T00:00:00Z |
| ssa-975766 | SSA-975766: Open Design Alliance Drawings SDK Vulnerability in Solid Edge | 2023-06-13T00:00:00Z | 2023-11-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1525-1 | Security update 5.1.3 for Multi-Linux Manager Salt Bundle | 2026-04-21T09:26:32Z | 2026-04-21T09:26:32Z |
| suse-su-2026:1524-1 | Security update 5.1.3 for Multi-Linux Manager Client Tools | 2026-04-21T09:26:09Z | 2026-04-21T09:26:09Z |
| suse-su-2026:1523-1 | Security update 5.1.3 for Multi-Linux Manager Salt Bundle | 2026-04-21T09:25:43Z | 2026-04-21T09:25:43Z |
| suse-su-2026:1521-1 | Security update 5.1.3 for Multi-Linux Manager Client Tools | 2026-04-21T09:25:11Z | 2026-04-21T09:25:11Z |
| suse-su-2026:1520-1 | Security update 5.1.3 for Multi-Linux Manager Client Tools | 2026-04-21T09:24:49Z | 2026-04-21T09:24:49Z |
| suse-su-2026:1519-1 | Security update 5.1.3 for Multi-Linux Manager Client Tools | 2026-04-21T09:24:29Z | 2026-04-21T09:24:29Z |
| suse-su-2026:21250-1 | Security update for openvswitch | 2026-04-21T09:05:08Z | 2026-04-21T09:05:08Z |
| suse-su-2026:21251-1 | Security update for libpng16 | 2026-04-21T09:02:28Z | 2026-04-21T09:02:28Z |
| suse-su-2026:21247-1 | Security update for ncurses | 2026-04-21T08:57:05Z | 2026-04-21T08:57:05Z |
| suse-su-2026:21263-1 | Security update for libvirt | 2026-04-21T08:35:17Z | 2026-04-21T08:35:17Z |
| suse-su-2026:21262-1 | Security update for libpng16 | 2026-04-21T08:32:33Z | 2026-04-21T08:32:33Z |
| suse-su-2026:21261-1 | Security update for ncurses | 2026-04-21T08:27:11Z | 2026-04-21T08:27:11Z |
| suse-su-2026:1513-1 | Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise 15 SP6) | 2026-04-21T08:04:22Z | 2026-04-21T08:04:22Z |
| suse-su-2026:1511-1 | Security update for flatpak | 2026-04-21T06:28:50Z | 2026-04-21T06:28:50Z |
| suse-su-2026:1510-1 | Security update for ncurses | 2026-04-21T06:28:16Z | 2026-04-21T06:28:16Z |
| suse-su-2026:1509-1 | Security update for nodejs22 | 2026-04-21T06:27:53Z | 2026-04-21T06:27:53Z |
| suse-su-2026:1508-1 | Security update for podman | 2026-04-21T06:27:08Z | 2026-04-21T06:27:08Z |
| suse-su-2026:1505-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6) | 2026-04-20T22:36:36Z | 2026-04-20T22:36:36Z |
| suse-su-2026:21257-1 | Security update for libcap | 2026-04-20T16:57:37Z | 2026-04-20T16:57:37Z |
| suse-su-2026:1504-1 | Security update for GraphicsMagick | 2026-04-20T16:18:41Z | 2026-04-20T16:18:41Z |
| suse-su-2026:1503-1 | Security update for python | 2026-04-20T16:17:54Z | 2026-04-20T16:17:54Z |
| suse-su-2026:1501-1 | Security update for glibc-livepatches | 2026-04-20T16:16:50Z | 2026-04-20T16:16:50Z |
| suse-su-2026:1500-1 | Security update for libpng15 | 2026-04-20T16:16:39Z | 2026-04-20T16:16:39Z |
| suse-su-2026:1499-1 | Security update for ncurses | 2026-04-20T16:16:27Z | 2026-04-20T16:16:27Z |
| suse-su-2026:1498-1 | Security update for glibc-livepatches | 2026-04-20T16:16:19Z | 2026-04-20T16:16:19Z |
| suse-su-2026:1497-1 | Security update for ImageMagick | 2026-04-20T16:15:53Z | 2026-04-20T16:15:53Z |
| suse-su-2026:1496-1 | Security update for gegl | 2026-04-20T16:14:43Z | 2026-04-20T16:14:43Z |
| suse-su-2026:1495-1 | Security update for containerd | 2026-04-20T15:59:16Z | 2026-04-20T15:59:16Z |
| suse-su-2026:1494-1 | Security update for rootlesskit | 2026-04-20T15:58:20Z | 2026-04-20T15:58:20Z |
| suse-su-2026:1493-1 | Security update for rootlesskit | 2026-04-20T15:58:00Z | 2026-04-20T15:58:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:2627 | Moderate: gcc-toolset-14-binutils security update | 2026-02-12T00:00:00Z | 2026-02-13T08:03:55Z |
| alsa-2026:2470 | Moderate: php:7.4 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:10:23Z |
| alsa-2026:2452 | Important: pcs security update | 2026-02-10T00:00:00Z | 2026-02-12T10:12:36Z |
| alsa-2026:2438 | Important: pcs security update | 2026-02-10T00:00:00Z | 2026-02-12T10:14:13Z |
| alsa-2026:2422 | Important: nodejs:20 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:15:50Z |
| alsa-2026:2421 | Important: nodejs:22 security update | 2026-02-10T00:00:00Z | 2026-02-13T10:53:31Z |
| alsa-2026:2420 | Important: nodejs:24 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:19:24Z |
| alsa-2026:2419 | Moderate: python3.12 security update | 2026-02-10T00:00:00Z | 2026-02-11T15:30:15Z |
| alsa-2026:2410 | Important: libsoup3 security update | 2026-02-10T00:00:00Z | 2026-02-11T15:26:55Z |
| alsa-2026:2389 | Important: brotli security update | 2026-02-10T00:00:00Z | 2026-02-11T11:06:48Z |
| alsa-2026:2378 | Moderate: kernel-rt security update | 2026-02-10T00:00:00Z | 2026-02-10T09:34:16Z |
| alsa-2026:2323 | Important: git-lfs security update | 2026-02-09T00:00:00Z | 2026-02-11T11:02:49Z |
| alsa-2026:2286 | Important: thunderbird security update | 2026-02-09T00:00:00Z | 2026-02-09T12:36:11Z |
| alsa-2026:2282 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-12T10:29:43Z |
| alsa-2026:2271 | Important: firefox security update | 2026-02-09T00:00:00Z | 2026-02-09T11:39:07Z |
| alsa-2026:2264 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-09T11:47:42Z |
| alsa-2026:2230 | Important: fontforge security update | 2026-02-09T00:00:00Z | 2026-02-10T10:04:33Z |
| alsa-2026:2225 | Critical: keylime security update | 2026-02-09T00:00:00Z | 2026-02-10T10:06:14Z |
| alsa-2026:2224 | Critical: keylime security update | 2026-02-09T00:00:00Z | 2026-02-11T15:22:49Z |
| alsa-2026:2222 | Important: freerdp security update | 2026-02-09T00:00:00Z | 2026-02-10T10:08:14Z |
| alsa-2026:2220 | Important: thunderbird security update | 2026-02-09T00:00:00Z | 2026-02-10T07:45:12Z |
| alsa-2026:2216 | Important: libsoup security update | 2026-02-09T00:00:00Z | 2026-02-10T10:37:43Z |
| alsa-2026:2215 | Important: libsoup security update | 2026-02-09T00:00:00Z | 2026-02-09T11:36:21Z |
| alsa-2026:2212 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-12T10:34:27Z |
| alsa-2026:2182 | Important: libsoup3 security update | 2026-02-05T00:00:00Z | 2026-02-06T17:31:52Z |
| alsa-2026:2128 | Moderate: python3 security update | 2026-02-05T00:00:00Z | 2026-02-06T08:39:22Z |
| alsa-2026:2124 | Important: osbuild-composer security update | 2026-02-05T00:00:00Z | 2026-02-09T11:33:23Z |
| alsa-2026:2090 | Important: python3.12-wheel security update | 2026-02-05T00:00:00Z | 2026-02-06T08:49:17Z |
| alsa-2026:2081 | Important: freerdp security update | 2026-02-05T00:00:00Z | 2026-02-06T08:53:33Z |
| alsa-2026:2048 | Important: freerdp security update | 2026-02-05T00:00:00Z | 2026-02-10T07:49:11Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-1310 | Use-of-uninitialized-value in decompress_yuv.cc | 2024-11-15T00:03:32.569897Z | 2024-11-15T00:03:32.570195Z |
| osv-2024-1297 | Heap-buffer-overflow in rijndaelSetupEncrypt | 2024-11-09T00:13:03.370689Z | 2024-11-09T00:13:03.371200Z |
| osv-2024-1293 | Use-of-uninitialized-value in k5_hashtab_add | 2024-11-08T00:16:09.025852Z | 2024-11-08T00:16:09.026399Z |
| osv-2024-1282 | Segv on unknown address in udiv | 2024-11-05T00:16:47.572692Z | 2024-11-05T00:16:47.573042Z |
| osv-2024-1279 | Heap-buffer-overflow in opj_j2k_read_tile_header | 2024-11-05T00:12:57.052133Z | 2024-11-05T00:12:57.052585Z |
| osv-2024-1274 | Segv on unknown address in yara_yyparse | 2024-11-05T00:04:03.220856Z | 2025-06-03T14:42:15.782999Z |
| osv-2024-1272 | Segv on unknown address in std::__1::ios_base::~ios_base | 2024-11-05T00:03:30.787980Z | 2025-04-17T14:38:30.981292Z |
| osv-2022-1288 | Stack-buffer-overflow in bool SmilesParseOps::parser::parse_atom_props<std::__1::__wrap_iter<char const*> | 2024-11-04T00:16:22.516312Z | 2026-05-01T14:18:55.851744Z |
| osv-2024-1266 | UNKNOWN READ in llama_output_reserve | 2024-11-03T00:14:31.568857Z | 2024-11-03T00:14:31.569247Z |
| osv-2024-1261 | Stack-buffer-overflow in _pcre2_compile_class_not_nested_16 | 2024-11-02T00:11:51.445365Z | 2024-11-02T00:11:51.445768Z |
| osv-2024-1254 | Security exception in org.apache.lucene.util.ArrayUtil.growExact | 2024-11-01T00:07:39.301298Z | 2026-02-26T14:30:06.734190Z |
| osv-2024-1253 | Segv on unknown address in llama_output_reserve | 2024-11-01T00:03:18.217276Z | 2024-11-01T00:03:18.217677Z |
| osv-2023-1398 | Heap-buffer-overflow in load_1 | 2024-11-01T00:02:38.719507Z | 2024-11-01T00:02:38.719949Z |
| osv-2024-1251 | UNKNOWN WRITE in s_DCTD_process | 2024-11-01T00:02:31.749497Z | 2025-04-29T14:29:01.935923Z |
| osv-2024-1249 | Heap-buffer-overflow in extract_ice_option | 2024-10-30T00:15:55.709182Z | 2025-03-18T00:40:00.171776Z |
| osv-2024-1244 | Heap-buffer-overflow in extract_fmtp | 2024-10-27T00:10:45.337287Z | 2024-11-06T14:24:14.483448Z |
| osv-2024-1241 | Heap-buffer-overflow in polygonToCellsExperimental | 2024-10-25T00:13:57.330581Z | 2024-10-25T00:13:57.331154Z |
| osv-2024-1239 | Heap-buffer-overflow in convsamp | 2024-10-24T00:06:22.931512Z | 2024-10-25T14:18:35.097668Z |
| osv-2024-1237 | Use-of-uninitialized-value in jit_compile | 2024-10-22T00:13:19.495791Z | 2024-10-22T00:13:19.496460Z |
| osv-2024-1232 | Segv on unknown address in cranelift_filetests::function_runner::Trampoline::call::hb2e77cf3a13ebaf4 | 2024-10-19T00:15:15.010866Z | 2024-10-19T00:15:15.011237Z |
| osv-2024-1230 | Heap-buffer-overflow in extract_rtpmap | 2024-10-19T00:00:26.792754Z | 2025-01-10T05:21:03.406469Z |
| osv-2024-1220 | UNKNOWN READ in Assimp::NDOImporter::InternReadFile | 2024-10-14T00:17:45.088625Z | 2026-05-01T14:23:35.230004Z |
| osv-2024-1218 | UNKNOWN READ in Poco::UTF16Encoding::queryConvert | 2024-10-14T00:08:40.382545Z | 2025-04-10T14:48:52.198172Z |
| osv-2024-1216 | Use-of-uninitialized-value in Poco::Net::NTLMCredentials::parseChallengeMessage | 2024-10-13T00:11:43.323181Z | 2025-03-18T00:32:42.736858Z |
| osv-2024-1212 | Heap-buffer-overflow in cram_encode_container | 2024-10-11T00:16:27.350249Z | 2024-10-11T00:16:27.350643Z |
| osv-2024-1210 | Heap-buffer-overflow in parse_mixed_content | 2024-10-11T00:15:50.054920Z | 2025-01-10T05:11:11.351763Z |
| osv-2024-1209 | Heap-use-after-free in xmlValidateOneElement | 2024-10-11T00:15:43.610812Z | 2025-03-18T00:30:11.577855Z |
| osv-2024-1206 | Heap-buffer-overflow in extract_sendrecv_mode | 2024-10-11T00:13:47.835312Z | 2025-01-10T05:11:09.130549Z |
| osv-2024-1205 | Memcpy-param-overlap in repeat | 2024-10-11T00:12:59.211479Z | 2025-06-02T14:22:48.890155Z |
| osv-2024-1203 | Global-buffer-overflow in AnnouncePunctuation | 2024-10-11T00:02:53.598773Z | 2024-10-11T00:02:53.599146Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0395 | The maintainer of chrono-english is unresponsive | 2024-06-24T12:00:00Z | 2024-11-10T20:38:56Z |
| rustsec-2024-0344 | Timing variability in `curve25519-dalek`'s `Scalar29::sub`/`Scalar52::sub` | 2024-06-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0394 | mmap unmaintained | 2024-06-10T12:00:00Z | 2024-11-10T14:06:58Z |
| rustsec-2024-0343 | Reduced entropy due to inadequate character set usage | 2024-06-03T12:00:00Z | 2024-06-15T13:11:33Z |
| rustsec-2024-0353 | Refs and paths with reserved Windows device names access the devices | 2024-05-22T12:00:00Z | 2024-07-08T15:14:36Z |
| rustsec-2024-0352 | Refs and paths with reserved Windows device names access the devices | 2024-05-22T12:00:00Z | 2024-07-08T15:14:36Z |
| rustsec-2024-0351 | Refs and paths with reserved Windows device names access the devices | 2024-05-22T12:00:00Z | 2024-07-08T15:14:36Z |
| rustsec-2024-0350 | Traversal outside working tree enables arbitrary code execution | 2024-05-22T12:00:00Z | 2024-07-08T15:12:43Z |
| rustsec-2024-0349 | Traversal outside working tree enables arbitrary code execution | 2024-05-22T12:00:00Z | 2024-07-08T15:12:43Z |
| rustsec-2024-0348 | Traversal outside working tree enables arbitrary code execution | 2024-05-22T12:00:00Z | 2024-07-08T15:12:43Z |
| rustsec-2024-0406 | BTreeMap memory leak when deallocating nodes with overflows | 2024-05-17T12:00:00Z | 2024-12-04T12:44:24Z |
| rustsec-2024-0340 | Tor path lengths too short when "full Vanguards" configured | 2024-05-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0339 | Tor path lengths too short when "Vanguards lite" configured | 2024-05-15T12:00:00Z | 2024-05-21T02:12:32Z |
| rustsec-2024-0342 | Degraded secret zeroization capabilities | 2024-05-02T12:00:00Z | 2024-05-20T15:25:56Z |
| rustsec-2024-0338 | Arithmetic overflows in cosmwasm-std | 2024-04-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0337 | The crate `zip_next` has been renamed to `zip`. | 2024-04-20T12:00:00Z | 2024-04-24T14:13:51Z |
| rustsec-2024-0336 | `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network input | 2024-04-19T12:00:00Z | 2024-04-20T02:21:14Z |
| rustsec-2024-0335 | gix-transport indirect code execution via malicious username | 2024-04-13T12:00:00Z | 2024-07-02T23:39:37Z |
| rustsec-2024-0333 | `rsa-export` is unmaintained | 2024-04-06T12:00:00Z | 2024-04-12T16:29:46Z |
| rustsec-2024-0334 | `libp2p-tokio-socks5` is unmaintained | 2024-04-05T12:00:00Z | 2024-04-12T16:31:39Z |
| rustsec-2024-0332 | Degradation of service in h2 servers with CONTINUATION Flood | 2024-04-03T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2024-0441 | Panic when using a dropped extenref-typed element segment | 2024-04-02T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0331 | Puccinier is unmainted. | 2024-03-31T12:00:00Z | 2024-03-31T14:44:37Z |
| rustsec-2024-0429 | Unsoundness in `Iterator` and `DoubleEndedIterator` impls for `glib::VariantStrIter` | 2024-03-30T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0320 | yaml-rust is unmaintained. | 2024-03-20T12:00:00Z | 2024-11-01T12:31:51Z |
| rustsec-2024-0341 | Slow loris vulnerability with default configuration | 2024-03-15T12:00:00Z | 2024-05-21T02:12:32Z |
| rustsec-2024-0407 | Fails to ensure slice elements match the slice's declared type | 2024-03-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0021 | Parts of Report are dropped as the wrong type during downcast | 2024-03-05T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2024-0420 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| rustsec-2024-0419 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-java-2022-21628 | 2026-05-06T14:43:26.463Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21626 | 2026-05-06T14:43:24.995Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21624 | 2026-05-06T14:43:23.547Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21619 | 2026-05-06T14:43:22.218Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21618 | 2026-05-06T14:43:20.800Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21549 | 2026-05-06T14:43:19.474Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21541 | 2026-05-06T14:43:18.194Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21540 | 2026-05-06T14:43:16.818Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21476 | 2026-05-06T14:43:15.551Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21449 | 2026-05-06T14:43:14.106Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21434 | 2026-05-06T14:43:12.687Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21426 | 2026-05-06T14:43:11.317Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21366 | 2026-05-06T14:43:09.927Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21365 | 2026-05-06T14:43:08.470Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21360 | 2026-05-06T14:43:07.121Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21349 | 2026-05-06T14:43:05.668Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21341 | 2026-05-06T14:43:04.233Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21340 | 2026-05-06T14:43:02.777Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21305 | 2026-05-06T14:43:01.409Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21299 | 2026-05-06T14:43:00.055Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21296 | 2026-05-06T14:42:58.789Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21294 | 2026-05-06T14:42:57.516Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21293 | 2026-05-06T14:42:56.259Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21291 | 2026-05-06T14:42:54.893Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21283 | 2026-05-06T14:42:53.466Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21282 | 2026-05-06T14:42:52.049Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21277 | 2026-05-06T14:42:50.458Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21271 | 2026-05-06T14:42:49.048Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2022-21248 | 2026-05-06T14:42:47.602Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2021-35603 | 2026-05-06T14:42:46.109Z | 2026-05-08T06:11:36.072Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-bd71263 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:17:26.065920Z | 2026-03-26T17:04:08Z |
| cleanstart-2026-kz45320 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:16:45.727713Z | 2026-03-26T18:22:34Z |
| cleanstart-2026-eq25508 | Security fixes for CVE-2025-11082, CVE-2025-11083 applied in versions: 2.46.0-r0 | 2026-04-01T09:16:21.124779Z | 2026-03-26T13:10:59Z |
| cleanstart-2026-em10970 | Security fixes for CVE-2017-9233, CVE-2019-15903, CVE-2021-45960, CVE-2021-46143, CVE-2022-22822, CVE-2022-22823, CVE-2022-22824, CVE-2022-22825, CVE-2022-22826, CVE-2022-22827, CVE-2022-23852, CVE-2022-23990, CVE-2022-25235, CVE-2022-25236, CVE-2022-25313, CVE-2022-25314, CVE-2022-25315, CVE-2022-40674, CVE-2022-43680, CVE-2023-52425, CVE-2023-52426, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-50602, CVE-2026-24515, CVE-2026-25210, CVE-2026-32767 applied in versions: 2.2.0-r1, 2.2.7-r0, 2.2.7-r1, 2.4.3-r0, 2.4.4-r0, 2.4.5-r0, 2.4.9-r0, 2.5.0-r0, 2.6.0-r0, 2.6.2-r0, 2.6.3-r0, 2.6.4-r0, 2.7.2-r0, 2.7.5-r0 | 2026-04-01T09:16:01.861201Z | 2026-03-26T13:10:59Z |
| cleanstart-2026-ow78143 | Security fixes for CVE-2025-68156, CVE-2026-24051, CVE-2026-26958, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 2.18.3-r0, 2.18.3-r1 | 2026-04-01T09:14:00.541150Z | 2026-03-26T14:38:42Z |
| cleanstart-2026-ac65885 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25518, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 1.18.0-r0, 1.18.0-r1, 1.18.0-r2, 1.18.0-r3 | 2026-04-01T09:13:17.231184Z | 2026-03-27T06:25:28Z |
| cleanstart-2026-oj21550 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2026-24051, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 1.34.2-r0, 1.35.0-r0, 1.35.3-r0 | 2026-04-01T09:12:23.484446Z | 2026-03-28T09:40:45Z |
| cleanstart-2026-jf28061 | Security fixes for CVE-2026-24051, CVE-2026-26958, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 2.19.0-r0, 2.19.0-r1 | 2026-04-01T09:12:22.444974Z | 2026-03-27T12:52:14Z |
| cleanstart-2026-cf63743 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2026-24051, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 1.34.2-r0, 1.34.6-r0 | 2026-04-01T09:12:16.516536Z | 2026-03-28T09:39:54Z |
| cleanstart-2026-gz72045 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 3.51.2-r0 | 2026-04-01T09:11:42.310345Z | 2026-03-28T09:54:58Z |
| cleanstart-2026-cg86499 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 3.6.5-r0 | 2026-04-01T09:11:07.076579Z | 2026-03-28T09:58:50Z |
| cleanstart-2026-kj02127 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.8.6-r0, 1.8.6-r1 | 2026-04-01T09:11:01.446923Z | 2026-03-28T10:00:21Z |
| cleanstart-2026-mj07404 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-527x-5wrf-22m2, ghsa-9h8m-3fm2-qjrq, ghsa-c9v3-4pv7-87pr, ghsa-h75p-j8xm-m278, ghsa-p77j-4mvh-x3m3 applied in versions: 1.26.7-r0, 1.26.7-r1, 1.26.7-r2 | 2026-04-01T09:10:45.280620Z | 2026-03-28T10:02:34Z |
| cleanstart-2026-gq31133 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-527x-5wrf-22m2, ghsa-9h8m-3fm2-qjrq, ghsa-c9v3-4pv7-87pr, ghsa-h75p-j8xm-m278, ghsa-p77j-4mvh-x3m3 applied in versions: 1.26.7-r0, 1.26.7-r1, 1.26.7-r2 | 2026-04-01T09:10:41.066012Z | 2026-03-28T10:03:10Z |
| cleanstart-2026-dg06447 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.12.2-r0, 2.12.2-r1 | 2026-04-01T09:10:38.729051Z | 2026-03-28T10:04:36Z |
| cleanstart-2026-cb01846 | Security fixes for CVE-2025-0913, CVE-2025-4673, CVE-2025-47907, CVE-2025-47911, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-58190, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.6.1-r0, 2.6.1-r1, 2.6.1-r7 | 2026-04-01T09:10:27.866703Z | 2026-03-28T10:13:21Z |
| cleanstart-2026-jk84667 | Security fixes for CVE-2025-0913, CVE-2025-4673, CVE-2025-47907, CVE-2025-47911, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-58190, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.7.0-r7, 2.7.0-r8 | 2026-04-01T09:10:09.429544Z | 2026-03-28T10:13:46Z |
| cleanstart-2026-is74202 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:09:55.185988Z | 2026-03-31T04:38:08Z |
| cleanstart-2026-ld15132 | Security fixes for CVE-2020-8912, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-6g7g-w4f8-9c9x, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 0.142.0-r0, 0.144.0-r0, 0.144.0-r1, 0.144.0-r2, 0.144.0-r3 | 2026-04-01T09:09:25.500286Z | 2026-03-28T10:14:28Z |
| cleanstart-2026-bk44511 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.78.0-r0, 1.78.0-r2, 1.78.0-r3 | 2026-04-01T09:08:47.105116Z | 2026-03-28T10:16:01Z |
| cleanstart-2026-li04631 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.79.0-r0, 1.79.0-r2, 1.79.0-r3 | 2026-04-01T09:08:44.082129Z | 2026-03-28T10:16:19Z |
| cleanstart-2026-ls30652 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-47914, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-33186, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-p84v-gxvw-73pf applied in versions: 3.7.0-r0, 3.7.11-r0, 3.7.3-r0, 3.7.4-r0, 3.7.6-r0, 3.7.9-r0, 3.7.9-r1, 3.7.9-r2, 4.0.2-r0 | 2026-04-01T09:07:01.631355Z | 2026-03-30T12:04:05Z |
| cleanstart-2026-hk71313 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw applied in versions: 0.12.0-r0, 0.12.0-r1, 0.12.0-r2 | 2026-04-01T09:06:39.410428Z | 2026-03-30T06:53:15Z |
| cleanstart-2026-ch77232 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 18.7.1-r0 | 2026-04-01T09:06:04.906254Z | 2026-03-31T07:29:33Z |
| cleanstart-2026-is43446 | Security fixes for ghsa-25qh-j22f-pwp8, ghsa-389x-839f-4rhx, ghsa-3p8m-j85q-pgmj, ghsa-4g8c-wm8x-jfhw, ghsa-5jpm-x58v-624v, ghsa-72hv-8253-57qq, ghsa-84h7-rjj3-6jx4, ghsa-fghv-69vj-qj49, ghsa-jq43-27x9-3v86, ghsa-pwqr-wmgm-9rr8, ghsa-qqpg-mvqg-649v, ghsa-w9fj-cfpg-grvv, ghsa-xq3w-v528-46rv applied in versions: 0.1.109-r0, 0.1.109-r1, 0.1.111-r2 | 2026-04-01T09:05:58.458627Z | 2026-03-31T07:55:31Z |
| cleanstart-2026-eb74978 | Security fixes for CVE-2020-8912, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1 | 2026-04-01T09:05:49.917651Z | 2026-03-31T15:18:53Z |
| cleanstart-2026-bk28579 | Security fixes for CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1 | 2026-04-01T09:05:31.827204Z | 2026-03-31T15:16:59Z |
| cleanstart-2026-gj95666 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T01:04:41.222114Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-af35851 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T01:02:37.708854Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-qk48981 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T01:00:35.988532Z | 2026-03-09T13:15:34Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2015-ALE-001 | Vulnérabilité dans Adobe Flash Player | 2015-01-22T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-011 | Vulnérabilité de l'implémentation Kerberos dans Microsoft Windows | 2014-11-18T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2014-ALE-011 | Vulnérabilité de l'implémentation Kerberos dans Microsoft Windows | 2014-11-18T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-010 | Vulnérabilité de l'implémentation des protocoles SSL/TLS dans Microsoft Windows | 2014-11-11T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2014-ALE-010 | Vulnérabilité de l'implémentation des protocoles SSL/TLS dans Microsoft Windows | 2014-11-11T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-009 | Vulnérabilité dans Microsoft OLE | 2014-10-22T00:00:00.000000 | 2014-11-12T00:00:00.000000 |
| CERTFR-2014-ALE-009 | Vulnérabilité dans Microsoft OLE | 2014-10-22T00:00:00.000000 | 2014-11-12T00:00:00.000000 |
| certfr-2014-ale-008 | Vulnérabilité dans Drupal | 2014-10-16T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2014-ALE-008 | Vulnérabilité dans Drupal | 2014-10-16T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-007 | Vulnérabilité dans SSLv3 | 2014-10-15T00:00:00.000000 | 2014-10-15T00:00:00.000000 |
| CERTFR-2014-ALE-007 | Vulnérabilité dans SSLv3 | 2014-10-15T00:00:00.000000 | 2014-10-15T00:00:00.000000 |
| certfr-2014-ale-006 | Vulnérabilité dans GNU bash | 2014-09-25T00:00:00.000000 | 2014-09-30T00:00:00.000000 |
| CERTFR-2014-ALE-006 | Vulnérabilité dans GNU bash | 2014-09-25T00:00:00.000000 | 2014-09-30T00:00:00.000000 |
| certfr-2014-ale-005 | Vulnérabilité dans Microsoft Internet Explorer | 2014-04-28T00:00:00.000000 | 2014-05-02T00:00:00.000000 |
| CERTFR-2014-ALE-005 | Vulnérabilité dans Microsoft Internet Explorer | 2014-04-28T00:00:00.000000 | 2014-05-02T00:00:00.000000 |
| certfr-2014-ale-004 | Vulnérabilité dans Apache Struts | 2014-04-25T00:00:00.000000 | 2014-04-29T00:00:00.000000 |
| CERTFR-2014-ALE-004 | Vulnérabilité dans Apache Struts | 2014-04-25T00:00:00.000000 | 2014-04-29T00:00:00.000000 |
| certfr-2014-ale-003 | Vulnérabilité dans OpenSSL | 2014-04-08T00:00:00.000000 | 2014-07-30T00:00:00.000000 |
| CERTFR-2014-ALE-003 | Vulnérabilité dans OpenSSL | 2014-04-08T00:00:00.000000 | 2014-07-30T00:00:00.000000 |
| certfr-2014-ale-002 | Vulnérabilité dans Microsoft Word | 2014-03-25T00:00:00.000000 | 2014-04-09T00:00:00.000000 |
| CERTFR-2014-ALE-002 | Vulnérabilité dans Microsoft Word | 2014-03-25T00:00:00.000000 | 2014-04-09T00:00:00.000000 |
| certfr-2014-ale-001 | Vulnérabilité dans Microsoft Internet Explorer | 2014-02-21T00:00:00.000000 | 2014-03-12T00:00:00.000000 |
| CERTFR-2014-ALE-001 | Vulnérabilité dans Microsoft Internet Explorer | 2014-02-21T00:00:00.000000 | 2014-03-12T00:00:00.000000 |
| certa-2013-ale-008 | Vulnérabilité critique dans le noyau de Microsoft Windows | 2013-11-28T00:00:00.000000 | 2014-01-16T00:00:00.000000 |
| CERTA-2013-ALE-008 | Vulnérabilité critique dans le noyau de Microsoft Windows | 2013-11-28T00:00:00.000000 | 2014-01-16T00:00:00.000000 |
| certa-2013-ale-007 | Vulnérabilité dans un composant graphique de Microsoft | 2013-11-06T00:00:00.000000 | 2013-12-10T00:00:00.000000 |
| CERTA-2013-ALE-007 | Vulnérabilité dans un composant graphique de Microsoft | 2013-11-06T00:00:00.000000 | 2013-12-10T00:00:00.000000 |
| certa-2013-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2013-09-18T00:00:00.000000 | 2013-10-09T00:00:00.000000 |
| CERTA-2013-ALE-006 | Vulnérabilité dans Microsoft Internet Explorer | 2013-09-18T00:00:00.000000 | 2013-10-09T00:00:00.000000 |
| certa-2013-ale-005 | Vulnérabilité dans le noyau Linux | 2013-05-14T00:00:00.000000 | 2013-05-24T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0192 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0191 | Vulnérabilité dans Traefik | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0190 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0189 | Vulnérabilité dans F5 BIG-IP | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0188 | Multiples vulnérabilités dans les produits Splunk | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0187 | Multiples vulnérabilités dans Tenable Security Center | 2026-02-19T00:00:00.000000 | 2026-02-23T00:00:00.000000 |
| certfr-2026-avi-0186 | Multiples vulnérabilités dans Google Chrome | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0185 | Vulnérabilité dans Microsoft Windows | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0184 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0183 | Vulnérabilité dans HPE Aruba Networking ClearPass Policy Manager | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0182 | Multiples vulnérabilités dans Atlassian Confluence | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0181 | Vulnérabilité dans Apache Tomcat | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0180 | Vulnérabilité dans NetApp StorageGRID | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0179 | Multiples vulnérabilités dans SPIP | 2026-02-18T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0178 | Multiples vulnérabilités dans Tenable Security Center | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0177 | Multiples vulnérabilités dans Moodle | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0176 | Vulnérabilité dans Mattermost Server | 2026-02-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0175 | Multiples vulnérabilités dans les produits Mozilla | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0174 | Multiples vulnérabilités dans LibreNMS | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0173 | Multiples vulnérabilités dans les produits Mattermost | 2026-02-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0172 | Vulnérabilité dans Google Chrome | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| CERTFR-2026-AVI-0173 | Multiples vulnérabilités dans les produits Mattermost | 2026-02-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| CERTFR-2026-AVI-0172 | Vulnérabilité dans Google Chrome | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| certfr-2026-avi-0171 | Multiples vulnérabilités dans les produits IBM | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0170 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0169 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0168 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0167 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0166 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0165 | Vulnérabilité dans Mattermost Server | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2020-002957 | A vulnerability in TOYOTA MOTOR's DCU (Display Control Unit) | 2024-08-20T18:12+09:00 | 2024-08-20T18:12+09:00 |
| jvndb-2020-007306 | Trend Micro Security (Consumer) Driver vulnerable to Out-of-bounds Read | 2024-08-20T17:52+09:00 | 2024-08-20T17:52+09:00 |
| jvndb-2024-000085 | "Rakuten Ichiba App" fails to restrict custom URL schemes properly | 2024-08-20T16:56+09:00 | 2024-08-20T16:56+09:00 |
| jvndb-2024-005167 | EL Injection Vulnerability in Hitachi Tuning Manager | 2024-08-15T09:38+09:00 | 2024-08-15T09:38+09:00 |
| jvndb-2016-000124 | WAON service app for Android fails to verify SSL server certificates | 2024-08-15T09:36+09:00 | 2024-08-15T09:36+09:00 |
| jvndb-2024-000083 | Firmware update for RICOH JavaTM Platform resets the TLS configuration | 2024-08-06T15:13+09:00 | 2024-08-06T15:13+09:00 |
| jvndb-2024-000079 | Cybozu Office vulnerable to bypass browsing restrictions in Custom App | 2024-08-06T14:59+09:00 | 2024-08-06T14:59+09:00 |
| jvndb-2024-000082 | Pimax Play and PiTool accept WebSocket connections from unintended endpoints | 2024-08-05T13:58+09:00 | 2024-08-05T13:58+09:00 |
| jvndb-2024-000084 | Multiple vulnerabilities in ZEXELON ZWX-2000CSW2-HN | 2024-08-05T13:46+09:00 | 2024-08-05T13:46+09:00 |
| jvndb-2024-000077 | FFRI AMC vulnerable to OS command injection | 2024-07-30T16:40+09:00 | 2024-07-30T16:40+09:00 |
| jvndb-2024-000078 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2024-07-30T15:34+09:00 | 2026-02-03T15:35+09:00 |
| jvndb-2024-000081 | EC-CUBE plugin (for EC-CUBE 4 series) "EC-CUBE Web API Plugin" vulnerable to stored cross-site scripting | 2024-07-30T14:06+09:00 | 2024-07-30T14:06+09:00 |
| jvndb-2024-000080 | EC-CUBE 4 Series improper input validation when installing plugins | 2024-07-30T13:56+09:00 | 2024-07-30T13:56+09:00 |
| jvndb-2024-004595 | Multiple vulnerabilities in FutureNet NXR series, VXR series and WXR series | 2024-07-29T17:51+09:00 | 2025-06-30T09:56+09:00 |
| jvndb-2024-000076 | SDoP contains a stack-based buffer overflow vulnerability. | 2024-07-29T17:24+09:00 | 2024-07-29T17:24+09:00 |
| jvndb-2024-000074 | Multiple vulnerabilities in SKYSEA Client View | 2024-07-29T15:28+09:00 | 2024-07-31T14:12+09:00 |
| jvndb-2024-004623 | Multiple products from Check Point Software Technologies vulnerable to information disclosure | 2024-07-29T10:23+09:00 | 2024-10-24T16:37+09:00 |
| jvndb-2024-000075 | ORC vulnerable to stack-based buffer overflow | 2024-07-26T13:55+09:00 | 2024-07-26T13:55+09:00 |
| jvndb-2024-000073 | Assimp vulnerable to heap-based buffer overflow | 2024-07-18T13:44+09:00 | 2024-07-18T13:44+09:00 |
| jvndb-2024-000072 | Cybozu Garoon vulnerable to cross-site scripting | 2024-07-16T16:14+09:00 | 2024-07-16T16:14+09:00 |
| jvndb-2024-000071 | FUJITSU Network Edgiot GW1500 vulnerable to path traversal | 2024-07-16T14:41+09:00 | 2024-07-16T14:41+09:00 |
| jvndb-2024-000070 | Out-of-bounds write vulnerability in Ricoh MFPs and printers | 2024-07-10T14:16+09:00 | 2024-07-10T14:16+09:00 |
| jvndb-2024-000059 | Multiple vulnerabilities in multiple Webmin products | 2024-07-09T14:27+09:00 | 2024-07-09T14:27+09:00 |
| jvndb-2024-000069 | Cleartext transmission issue in TONE store App to TONE store | 2024-07-08T13:43+09:00 | 2024-07-08T13:43+09:00 |
| jvndb-2024-000068 | JP1/Extensible SNMP Agent fails to restrict access permissions | 2024-07-03T14:57+09:00 | 2024-07-03T14:57+09:00 |
| jvndb-2024-003831 | Multiple TP-Link products vulnerable to OS command injection | 2024-06-28T17:38+09:00 | 2024-06-28T17:38+09:00 |
| jvndb-2024-000067 | "Piccoma" App uses a hard-coded API key for an external service | 2024-06-28T13:18+09:00 | 2024-06-28T13:18+09:00 |
| jvndb-2024-000066 | WordPress plugins "WP Tweet Walls" and "Sola Testimonials" vulnerable to cross-site request forgery | 2024-06-26T14:25+09:00 | 2024-06-26T14:25+09:00 |
| jvndb-2024-003699 | LINE client for iOS vulnerable to universal cross-site scripting | 2024-06-24T11:05+09:00 | 2024-06-24T11:05+09:00 |
| jvndb-2024-003645 | Multiple vulnerabilities in multiple Trend Micro products | 2024-06-20T14:59+09:00 | 2024-06-20T14:59+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-15828 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15828) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15827 | HCL Aftermarket DPC存在未明漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15826 | HCL Aftermarket DPC跨源资源共享漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15825 | HCL Aftermarket DPC SQL注入漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-18542 | Dell Integrated Dell Remote Access Controller信息泄露漏洞 | 2026-03-26 | 2026-04-21 |
| cnvd-2026-18541 | Dell Integrated Dell Remote Access Controller代码执行漏洞 | 2026-03-26 | 2026-04-21 |
| cnvd-2026-17490 | MailEnable StartDate参数跨站脚本漏洞 | 2026-03-26 | 2026-04-16 |
| cnvd-2026-17489 | MailEnable SelectedIndex参数跨站脚本漏洞 | 2026-03-26 | 2026-04-16 |
| cnvd-2026-17488 | MailEnable Attendees参数跨站脚本漏洞 | 2026-03-26 | 2026-04-16 |
| cnvd-2026-17265 | Discourse存在未明漏洞(CNVD-2026-17265) | 2026-03-26 | 2026-04-16 |
| cnvd-2026-17264 | Discourse跨站脚本漏洞(CNVD-2026-17264) | 2026-03-26 | 2026-04-16 |
| cnvd-2026-16395 | OpenClaw权限提升漏洞(CNVD-2026-16395) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16394 | OpenClaw任意代码执行漏洞(CNVD-2026-16394) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16393 | OpenClaw沙盒逃逸漏洞 | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16392 | OpenClaw存在未明漏洞(CVE-2026-32913) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16391 | OpenClaw存在未明漏洞(CNVD-2026-16391) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16390 | OpenClaw拒绝服务漏洞(CNVD-2026-16390) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16389 | OpenClaw存在未明漏洞(CNVD-2026-16389) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16388 | OpenClaw路径限制绕过漏洞 | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16387 | OpenClaw存在未明漏洞(CNVD-2026-16387) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16386 | OpenClaw存在未明漏洞(CNVD-2026-16386) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16385 | OpenClaw存在未明漏洞(CNVD-2026-16385) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16384 | OpenClaw存在未明漏洞(CNVD-2026-16384) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16383 | OpenClaw存在未明漏洞(CNVD-2026-16383) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16382 | OpenClaw批准绕过漏洞 | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16066 | WordPress插件King Addons for Elementor信息泄露漏洞 | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16065 | WordPress插件Download Manager信息泄露漏洞 | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16063 | GNU BinUtils缓冲区溢出漏洞(CNVD-2026-16063) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16057 | OpenClaw路径遍历漏洞(CNVD-2026-16057) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16056 | OpenClaw安全绕过漏洞(CNVD-2026-16056) | 2026-03-26 | 2026-04-03 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01334 | Уязвимость функции __drm_gem_fb_end_cpu_access() модуля drivers/gpu/drm/drm_gem_framebuff… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01333 | Уязвимость функции drm_gem_prime_handle_to_dmabuf() модуля drivers/gpu/drm/drm_prime.c др… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01332 | Уязвимость функции ses_enclosure_data_process() модуля drivers/scsi/ses.c драйвера устрой… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01331 | Уязвимость функции ses_enclosure_data_process() модуля drivers/scsi/ses.c драйвера устрой… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01330 | Уязвимость функции __netpoll_setup() ядра операционной системы Linux, позволяющая нарушит… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01329 | Уязвимость функции fpu_vstl() ядра операционной системы Linux, позволяющая нарушителю выз… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01328 | Уязвимость функции tuning_ctl_set() модуля sound/pci/hda/patch_ca0132.c звуковой подсисте… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01327 | Уязвимость функции flush_cache_all_local() модуля arch/parisc/include/asm/cacheflush.h по… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01326 | Уязвимость функции sddr55_write_data() модуля drivers/usb/storage/sddr55.c драйвера устро… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01325 | Уязвимость функции iommu_mmio_write() ядра операционной системы Linux, позволяющая наруши… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01324 | Уязвимость функции rxstate() ядра операционной системы Linux, позволяющая нарушителю полу… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01323 | Уязвимость функции handle_auth_session_key() модуля net/ceph/auth_x.c реализации сетевых … | 06.02.2026 | 06.02.2026 |
| bdu:2026-01322 | Уязвимость функции udp_tunnel_nic_netdevice_event() модуля net/ipv4/udp_tunnel_nic.c реал… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01321 | Уязвимость функции true_sectors_per_clst() ядра операционной системы Linux, позволяющая н… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01320 | Уязвимость функции ath11k_mac_setup_channels_rates() ядра операционной системы Linux, поз… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01319 | Уязвимость функции relocate_one_page() ядра операционной системы Linux, позволяющая наруш… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01318 | Уязвимость функции tcp_fastopen_active_disable_ofo_check() модуля net/ipv4/tcp_fastopen.c… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01317 | Уязвимость функции hci_remove_adv_monitor() ядра операционной системы Linux, позволяющая … | 06.02.2026 | 06.02.2026 |
| bdu:2026-01316 | Уязвимость функции nfs4_setup_readdir() модуля fs/nfs/nfs4proc.c поддержки клиентов NFS я… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01315 | Уязвимость функции iopt_alloc_pages() ядра операционной системы Linux, позволяющая наруши… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01314 | Уязвимость функции filter() ядра операционной системы Linux, позволяющая нарушителю оказа… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01313 | Уязвимость функции sco_sock_kill() модуля net/bluetooth/sco.c подсистемы Bluetooth ядра о… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01312 | Уязвимость функции bcsp_recv() модуля drivers/bluetooth/hci_bcsp.c драйвера устройств Blu… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01311 | Уязвимость функции virtio_gpu_cmd_transfer_to_host_2d() ядра операционной системы Linux, … | 06.02.2026 | 06.02.2026 |
| bdu:2026-01310 | Уязвимость функции snd_usbmidi_output_open() модуля sound/usb/midi.c поддержки звуковых у… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01309 | Уязвимость функции ntfs_read_mft() ядра операционной системы Linux, позволяющая нарушител… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01308 | Уязвимость функции bit_putcs() модуля drivers/video/fbdev/core/bitblit.c драйвера устройс… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01307 | Уязвимость функции safexcel_probe_generic() ядра операционной системы Linux, позволяющая … | 06.02.2026 | 06.02.2026 |
| bdu:2026-01306 | Уязвимость функций hfs_find_init() и hfs_brec_find() модуля fs/hfsplus/bfind.c поддержки … | 06.02.2026 | 06.02.2026 |
| bdu:2026-01305 | Уязвимость функции map_create() ядра операционной системы Linux, позволяющая нарушителю в… | 06.02.2026 | 06.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200512-0299 | Heap-based buffer overflow in rsync in Mac OS X 10.4 through 10.4.5 allows remote authent… | 2024-07-23T21:40:52.289000Z |
| var-202212-2277 | An integer underflow in Organization Specific TLV was found in various versions of OpenvS… | 2024-07-23T21:40:51.741000Z |
| var-200912-0756 | The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Wind… | 2024-07-23T21:40:51.958000Z |
| var-201210-0456 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:40:50.864000Z |
| var-200712-0433 | Integer underflow in the asn1_get_string function in the SNMP back end (backend/snmp.c) f… | 2024-07-23T21:40:50.122000Z |
| var-201904-1460 | A cross-site scripting issue existed in Safari. This issue was addressed with improved UR… | 2024-07-23T21:40:45.159000Z |
| var-201806-1466 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T21:40:45.074000Z |
| var-201501-0436 | The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1… | 2024-07-23T21:40:45.003000Z |
| var-200704-0226 | Apple File Protocol (AFP) Client in Apple Mac OS X 10.3.9 through 10.4.9 does not properl… | 2024-07-23T21:40:44.831000Z |
| var-201605-0465 | The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple … | 2024-07-23T21:40:43.806000Z |
| var-202010-1510 | A type confusion issue was addressed with improved memory handling. This issue is fixed i… | 2024-07-23T21:40:40.672000Z |
| var-201103-0114 | The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x be… | 2024-07-23T21:40:40.823000Z |
| var-201302-0262 | Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.… | 2024-07-23T21:40:39.972000Z |
| var-201109-0201 | Use-after-free vulnerability in the document loader in Google Chrome before 14.0.835.163 … | 2024-07-23T21:40:39.355000Z |
| var-200505-1240 | The rsvp_print function in tcpdump 3.9.1 and earlier allows remote attackers to cause a d… | 2024-07-23T21:40:35.490000Z |
| var-201912-1857 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:39:57.528000Z |
| var-202104-0752 | A memory corruption issue was addressed with improved validation. This issue is fixed in … | 2024-07-23T21:39:56.465000Z |
| var-200902-0880 | International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in A… | 2024-07-23T21:39:24.164000Z |
| var-201908-1958 | The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently l… | 2024-07-23T21:39:23.746000Z |
| var-200102-0052 | Cisco Catalyst 6000, 5000, or 4000 switches allow remote attackers to cause a denial of s… | 2024-07-23T21:39:23.577000Z |
| var-201708-0038 | The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 al… | 2024-07-23T21:39:15.769000Z |
| var-200901-0706 | WebKit in Apple Safari before 4.0 does not prevent remote loading of local Java applets, … | 2024-07-23T21:39:10.742000Z |
| var-202112-1608 | A carefully crafted request body can cause a buffer overflow in the mod_lua multipart par… | 2024-07-23T21:38:29.659000Z |
| var-202301-1703 | The issue was addressed with improved memory handling. This issue is fixed in macOS Monte… | 2024-07-23T21:38:27.556000Z |
| var-202103-0287 | A flaw possibility of race condition and incorrect initialization of the process id was f… | 2024-07-23T21:38:27.231000Z |
| var-201011-0174 | ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute … | 2024-07-23T21:37:24.567000Z |
| var-202106-0343 | Improper isolation of shared resources in some Intel(R) Processors may allow an authentic… | 2024-07-23T21:37:23.721000Z |
| var-201506-0268 | The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before… | 2024-07-23T21:36:44.513000Z |
| var-201904-0744 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:36:28.176000Z |
| var-201606-0329 | Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/us… | 2024-07-23T21:36:28.630000Z |