Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43114 |
N/A
|
netfilter: nft_set_pipapo_avx2: don't return non-match… |
Linux |
Linux |
2026-05-06T07:40:39.877Z | 2026-05-06T07:40:39.877Z |
| CVE-2026-43113 |
N/A
|
wifi: wl1251: validate packet IDs before indexing tx_frames |
Linux |
Linux |
2026-05-06T07:40:39.234Z | 2026-05-06T07:40:39.234Z |
| CVE-2026-43112 |
N/A
|
fs/smb/client: fix out-of-bounds read in cifs_sanitize… |
Linux |
Linux |
2026-05-06T07:40:38.563Z | 2026-05-06T07:40:38.563Z |
| CVE-2026-43111 |
N/A
|
HID: roccat: fix use-after-free in roccat_report_event |
Linux |
Linux |
2026-05-06T07:40:37.916Z | 2026-05-06T07:40:37.916Z |
| CVE-2026-43110 |
N/A
|
wifi: brcmfmac: validate bsscfg indices in IF events |
Linux |
Linux |
2026-05-06T07:40:37.250Z | 2026-05-06T07:40:37.250Z |
| CVE-2026-43109 |
N/A
|
x86: shadow stacks: proper error handling for mmap lock |
Linux |
Linux |
2026-05-06T07:40:36.532Z | 2026-05-06T07:40:36.532Z |
| CVE-2026-43108 |
N/A
|
soc: qcom: pd-mapper: Fix element length in servreg_lo… |
Linux |
Linux |
2026-05-06T07:40:35.854Z | 2026-05-06T07:40:35.854Z |
| CVE-2026-43107 |
N/A
|
xfrm: account XFRMA_IF_ID in aevent size calculation |
Linux |
Linux |
2026-05-06T07:40:35.068Z | 2026-05-06T07:40:35.068Z |
| CVE-2026-43106 |
N/A
|
cachefiles: fix incorrect dentry refcount in cachefile… |
Linux |
Linux |
2026-05-06T07:40:34.365Z | 2026-05-06T07:40:34.365Z |
| CVE-2026-43105 |
N/A
|
drm/vc4: Fix memory leak of BO array in hang state |
Linux |
Linux |
2026-05-06T07:40:33.706Z | 2026-05-06T07:40:33.706Z |
| CVE-2026-43104 |
N/A
|
drm/vc4: Fix a memory leak in hang state error path |
Linux |
Linux |
2026-05-06T07:40:33.036Z | 2026-05-06T07:40:33.036Z |
| CVE-2026-43103 |
N/A
|
net: lapbether: handle NETDEV_PRE_TYPE_CHANGE |
Linux |
Linux |
2026-05-06T07:40:32.357Z | 2026-05-06T07:40:32.357Z |
| CVE-2026-43102 |
N/A
|
net: airoha: Fix memory leak in airoha_qdma_rx_process() |
Linux |
Linux |
2026-05-06T07:40:31.683Z | 2026-05-06T07:40:31.683Z |
| CVE-2026-43101 |
N/A
|
ipv6: ioam: fix potential NULL dereferences in __ioam6… |
Linux |
Linux |
2026-05-06T07:40:30.969Z | 2026-05-06T07:40:30.969Z |
| CVE-2026-43100 |
N/A
|
bridge: guard local VLAN-0 FDB helpers against NULL vl… |
Linux |
Linux |
2026-05-06T07:40:30.309Z | 2026-05-06T07:40:30.309Z |
| CVE-2026-43099 |
N/A
|
ipv4: icmp: fix null-ptr-deref in icmp_build_probe() |
Linux |
Linux |
2026-05-06T07:40:29.567Z | 2026-05-06T07:40:29.567Z |
| CVE-2026-43098 |
N/A
|
nfc: s3fwrn5: allocate rx skb before consuming bytes |
Linux |
Linux |
2026-05-06T07:40:28.845Z | 2026-05-06T07:40:28.845Z |
| CVE-2026-43097 |
N/A
|
PCI: hv: Fix double ida_free in hv_pci_probe error path |
Linux |
Linux |
2026-05-06T07:40:28.157Z | 2026-05-06T07:40:28.157Z |
| CVE-2026-43096 |
N/A
|
mshv: Fix infinite fault loop on permission-denied GPA… |
Linux |
Linux |
2026-05-06T07:40:27.453Z | 2026-05-06T07:40:27.453Z |
| CVE-2026-43095 |
N/A
|
ASoC: SDCA: Fix errors in IRQ cleanup |
Linux |
Linux |
2026-05-06T07:40:26.743Z | 2026-05-06T07:40:26.743Z |
| CVE-2026-43094 |
N/A
|
ixgbevf: add missing negotiate_features op to Hyper-V … |
Linux |
Linux |
2026-05-06T07:40:25.930Z | 2026-05-06T07:40:25.930Z |
| CVE-2026-43093 |
N/A
|
xsk: tighten UMEM headroom validation to account for t… |
Linux |
Linux |
2026-05-06T07:40:25.266Z | 2026-05-06T07:40:25.266Z |
| CVE-2026-43092 |
N/A
|
xsk: validate MTU against usable frame size on bind |
Linux |
Linux |
2026-05-06T07:40:24.619Z | 2026-05-06T07:40:24.619Z |
| CVE-2026-43091 |
N/A
|
xfrm: Wait for RCU readers during policy netns exit |
Linux |
Linux |
2026-05-06T07:40:23.955Z | 2026-05-06T07:40:23.955Z |
| CVE-2026-43090 |
N/A
|
xfrm: fix refcount leak in xfrm_migrate_policy_find |
Linux |
Linux |
2026-05-06T07:40:23.286Z | 2026-05-06T07:40:23.286Z |
| CVE-2026-43089 |
N/A
|
xfrm_user: fix info leak in build_mapping() |
Linux |
Linux |
2026-05-06T07:40:22.630Z | 2026-05-06T07:40:22.630Z |
| CVE-2026-43088 |
N/A
|
net: af_key: zero aligned sockaddr tail in PF_KEY exports |
Linux |
Linux |
2026-05-06T07:40:21.962Z | 2026-05-06T07:40:21.962Z |
| CVE-2026-43087 |
N/A
|
pinctrl: mcp23s08: Disable all pin interrupts during probe |
Linux |
Linux |
2026-05-06T07:40:21.303Z | 2026-05-06T07:40:21.303Z |
| CVE-2026-43086 |
N/A
|
ipvs: fix NULL deref in ip_vs_add_service error path |
Linux |
Linux |
2026-05-06T07:40:20.631Z | 2026-05-06T07:40:20.631Z |
| CVE-2026-43085 |
N/A
|
netfilter: nfnetlink_log: initialize nfgenmsg in NLMSG… |
Linux |
Linux |
2026-05-06T07:40:19.915Z | 2026-05-06T07:40:19.915Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43112 |
N/A
|
fs/smb/client: fix out-of-bounds read in cifs_sanitize… |
Linux |
Linux |
2026-05-06T07:40:38.563Z | 2026-05-06T07:40:38.563Z |
| CVE-2026-43111 |
N/A
|
HID: roccat: fix use-after-free in roccat_report_event |
Linux |
Linux |
2026-05-06T07:40:37.916Z | 2026-05-06T07:40:37.916Z |
| CVE-2026-43110 |
N/A
|
wifi: brcmfmac: validate bsscfg indices in IF events |
Linux |
Linux |
2026-05-06T07:40:37.250Z | 2026-05-06T07:40:37.250Z |
| CVE-2026-43109 |
N/A
|
x86: shadow stacks: proper error handling for mmap lock |
Linux |
Linux |
2026-05-06T07:40:36.532Z | 2026-05-06T07:40:36.532Z |
| CVE-2026-43108 |
N/A
|
soc: qcom: pd-mapper: Fix element length in servreg_lo… |
Linux |
Linux |
2026-05-06T07:40:35.854Z | 2026-05-06T07:40:35.854Z |
| CVE-2026-43107 |
N/A
|
xfrm: account XFRMA_IF_ID in aevent size calculation |
Linux |
Linux |
2026-05-06T07:40:35.068Z | 2026-05-06T07:40:35.068Z |
| CVE-2026-43106 |
N/A
|
cachefiles: fix incorrect dentry refcount in cachefile… |
Linux |
Linux |
2026-05-06T07:40:34.365Z | 2026-05-06T07:40:34.365Z |
| CVE-2026-43105 |
N/A
|
drm/vc4: Fix memory leak of BO array in hang state |
Linux |
Linux |
2026-05-06T07:40:33.706Z | 2026-05-06T07:40:33.706Z |
| CVE-2026-43104 |
N/A
|
drm/vc4: Fix a memory leak in hang state error path |
Linux |
Linux |
2026-05-06T07:40:33.036Z | 2026-05-06T07:40:33.036Z |
| CVE-2026-43103 |
N/A
|
net: lapbether: handle NETDEV_PRE_TYPE_CHANGE |
Linux |
Linux |
2026-05-06T07:40:32.357Z | 2026-05-06T07:40:32.357Z |
| CVE-2026-43102 |
N/A
|
net: airoha: Fix memory leak in airoha_qdma_rx_process() |
Linux |
Linux |
2026-05-06T07:40:31.683Z | 2026-05-06T07:40:31.683Z |
| CVE-2026-43101 |
N/A
|
ipv6: ioam: fix potential NULL dereferences in __ioam6… |
Linux |
Linux |
2026-05-06T07:40:30.969Z | 2026-05-06T07:40:30.969Z |
| CVE-2026-43100 |
N/A
|
bridge: guard local VLAN-0 FDB helpers against NULL vl… |
Linux |
Linux |
2026-05-06T07:40:30.309Z | 2026-05-06T07:40:30.309Z |
| CVE-2026-43099 |
N/A
|
ipv4: icmp: fix null-ptr-deref in icmp_build_probe() |
Linux |
Linux |
2026-05-06T07:40:29.567Z | 2026-05-06T07:40:29.567Z |
| CVE-2026-43098 |
N/A
|
nfc: s3fwrn5: allocate rx skb before consuming bytes |
Linux |
Linux |
2026-05-06T07:40:28.845Z | 2026-05-06T07:40:28.845Z |
| CVE-2026-43097 |
N/A
|
PCI: hv: Fix double ida_free in hv_pci_probe error path |
Linux |
Linux |
2026-05-06T07:40:28.157Z | 2026-05-06T07:40:28.157Z |
| CVE-2026-43096 |
N/A
|
mshv: Fix infinite fault loop on permission-denied GPA… |
Linux |
Linux |
2026-05-06T07:40:27.453Z | 2026-05-06T07:40:27.453Z |
| CVE-2026-43095 |
N/A
|
ASoC: SDCA: Fix errors in IRQ cleanup |
Linux |
Linux |
2026-05-06T07:40:26.743Z | 2026-05-06T07:40:26.743Z |
| CVE-2026-43094 |
N/A
|
ixgbevf: add missing negotiate_features op to Hyper-V … |
Linux |
Linux |
2026-05-06T07:40:25.930Z | 2026-05-06T07:40:25.930Z |
| CVE-2026-43093 |
N/A
|
xsk: tighten UMEM headroom validation to account for t… |
Linux |
Linux |
2026-05-06T07:40:25.266Z | 2026-05-06T07:40:25.266Z |
| CVE-2026-43092 |
N/A
|
xsk: validate MTU against usable frame size on bind |
Linux |
Linux |
2026-05-06T07:40:24.619Z | 2026-05-06T07:40:24.619Z |
| CVE-2026-43091 |
N/A
|
xfrm: Wait for RCU readers during policy netns exit |
Linux |
Linux |
2026-05-06T07:40:23.955Z | 2026-05-06T07:40:23.955Z |
| CVE-2026-43090 |
N/A
|
xfrm: fix refcount leak in xfrm_migrate_policy_find |
Linux |
Linux |
2026-05-06T07:40:23.286Z | 2026-05-06T07:40:23.286Z |
| CVE-2026-43089 |
N/A
|
xfrm_user: fix info leak in build_mapping() |
Linux |
Linux |
2026-05-06T07:40:22.630Z | 2026-05-06T07:40:22.630Z |
| CVE-2026-43088 |
N/A
|
net: af_key: zero aligned sockaddr tail in PF_KEY exports |
Linux |
Linux |
2026-05-06T07:40:21.962Z | 2026-05-06T07:40:21.962Z |
| CVE-2026-43087 |
N/A
|
pinctrl: mcp23s08: Disable all pin interrupts during probe |
Linux |
Linux |
2026-05-06T07:40:21.303Z | 2026-05-06T07:40:21.303Z |
| CVE-2026-43086 |
N/A
|
ipvs: fix NULL deref in ip_vs_add_service error path |
Linux |
Linux |
2026-05-06T07:40:20.631Z | 2026-05-06T07:40:20.631Z |
| CVE-2026-43085 |
N/A
|
netfilter: nfnetlink_log: initialize nfgenmsg in NLMSG… |
Linux |
Linux |
2026-05-06T07:40:19.915Z | 2026-05-06T07:40:19.915Z |
| CVE-2026-43084 |
N/A
|
netfilter: nfnetlink_queue: make hash table per queue |
Linux |
Linux |
2026-05-06T07:40:19.253Z | 2026-05-06T07:40:19.253Z |
| CVE-2026-43083 |
N/A
|
net: ioam6: fix OOB and missing lock |
Linux |
Linux |
2026-05-06T07:40:18.504Z | 2026-05-06T07:40:18.504Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-26250 | Rejected reason: Not used | 2026-02-13T04:15:53.690 | 2026-02-13T04:15:53.690 |
| fkie_cve-2026-26249 | Rejected reason: Not used | 2026-02-13T04:15:53.607 | 2026-02-13T04:15:53.607 |
| fkie_cve-2026-25108 | FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enab… | 2026-02-13T04:15:53.410 | 2026-02-24T21:38:18.607 |
| fkie_cve-2026-1721 | Summary A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the AI Playground's… | 2026-02-13T03:15:52.467 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-9293 | A vulnerability in the certificate validation logic may allow applications to accept untrusted or i… | 2026-02-13T02:16:46.523 | 2026-04-01T20:49:52.653 |
| fkie_cve-2025-9292 | A permissive web security configuration may allow cross-origin restrictions enforced by modern brow… | 2026-02-13T02:16:45.937 | 2026-04-01T20:52:43.110 |
| fkie_cve-2025-40905 | WWW::OAuth 1.000 and earlier for Perl uses the rand() function as the default source of entropy, wh… | 2026-02-13T00:16:03.280 | 2026-03-10T17:07:16.893 |
| fkie_cve-2024-21961 | Improper restriction of operations within the bounds of a memory buffer in PCIe® Link could allow a… | 2026-02-13T00:16:02.633 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-26188 | Solspace Freeform plugin for Craft CMS 5.x is a super flexible form-building tool. An authenticated… | 2026-02-12T23:16:09.760 | 2026-02-20T21:08:10.347 |
| fkie_cve-2025-70092 | A cross-site scripting (XSS) vulnerability in the Item Kits function of OpenSourcePOS v3.4.1 allows… | 2026-02-12T23:16:09.247 | 2026-02-18T15:45:45.157 |
| fkie_cve-2020-37167 | ClamAV versions prior to 0.103.0-rc contain a vulnerability in function name processing through the… | 2026-02-12T23:16:08.887 | 2026-04-15T00:35:42.020 |
| fkie_cve-2019-25342 | Centova Cast 3.2.12 contains a denial of service vulnerability that allows attackers to overwhelm t… | 2026-02-12T23:16:08.697 | 2026-04-15T00:35:42.020 |
| fkie_cve-2019-25341 | iNetTools for iOS 8.20 contains a denial of service vulnerability in the Whois feature that allows … | 2026-02-12T23:16:08.520 | 2026-04-15T00:35:42.020 |
| fkie_cve-2019-25340 | SpotAuditor 5.3.2 contains a denial of service vulnerability in its Base64 decryption feature that … | 2026-02-12T23:16:08.240 | 2026-02-20T21:09:38.997 |
| fkie_cve-2019-25339 | GHIA CamIP 1.2 for iOS contains a denial of service vulnerability in the password input field that … | 2026-02-12T23:16:07.953 | 2026-04-15T00:35:42.020 |
| fkie_cve-2019-25338 | DokuWiki 2018-04-22b contains a username enumeration vulnerability in its password reset functional… | 2026-02-12T23:16:07.670 | 2026-03-02T15:16:22.633 |
| fkie_cve-2019-25337 | OwnCloud 8.1.8 contains a username enumeration vulnerability that allows remote attackers to discov… | 2026-02-12T23:16:07.367 | 2026-04-15T00:35:42.020 |
| fkie_cve-2019-25336 | SpotAuditor 5.3.2 contains a local buffer overflow vulnerability in the Base64 Encrypted Password t… | 2026-02-12T23:16:07.097 | 2026-02-20T21:10:31.730 |
| fkie_cve-2019-25335 | PRO-7070 Hazır Profesyonel Web Sitesi version 1.0 contains an authentication bypass vulnerability i… | 2026-02-12T23:16:06.813 | 2026-04-15T00:35:42.020 |
| fkie_cve-2019-25334 | Product Key Explorer 4.2.0.0 contains a denial of service vulnerability that allows local attackers… | 2026-02-12T23:16:06.540 | 2026-03-25T20:23:39.077 |
| fkie_cve-2019-25333 | Bullwark Momentum Series JAWS 1.0 contains a directory traversal vulnerability that allows unauthen… | 2026-02-12T23:16:06.267 | 2026-04-15T00:35:42.020 |
| fkie_cve-2019-25332 | FTP Commander Pro 8.03 contains a local stack overflow vulnerability that allows attackers to execu… | 2026-02-12T23:16:06.017 | 2026-04-15T00:35:42.020 |
| fkie_cve-2019-25331 | AVS Audio Converter 9.1 contains a local buffer overflow vulnerability that allows local attackers … | 2026-02-12T23:16:05.770 | 2026-04-15T00:35:42.020 |
| fkie_cve-2019-25330 | SurfOffline Professional 2.2.0.103 contains a structured exception handler (SEH) overflow vulnerabi… | 2026-02-12T23:16:05.490 | 2026-04-15T00:35:42.020 |
| fkie_cve-2019-25329 | FTP Navigator 8.03 contains a denial of service vulnerability that allows attackers to crash the ap… | 2026-02-12T23:16:05.163 | 2026-03-03T00:21:02.917 |
| fkie_cve-2019-25328 | XnConvert 1.82 contains a denial of service vulnerability in its registration code input field that… | 2026-02-12T23:16:04.790 | 2026-04-15T00:35:42.020 |
| fkie_cve-2019-25327 | Prime95 version 29.8 build 6 contains a buffer overflow vulnerability in the user ID input field th… | 2026-02-12T23:16:04.617 | 2026-04-15T00:35:42.020 |
| fkie_cve-2019-25325 | Thrive Smart Home 1.1 contains an SQL injection vulnerability in the checklogin.php endpoint that a… | 2026-02-12T23:16:04.413 | 2026-04-15T00:35:42.020 |
| fkie_cve-2019-25324 | RICOH Web Image Monitor 1.09 contains an HTML injection vulnerability in the address configuration … | 2026-02-12T23:16:04.237 | 2026-04-15T00:35:42.020 |
| fkie_cve-2019-25323 | Heatmiser Netmonitor v3.03 contains an HTML injection vulnerability in the outputSetup.htm page tha… | 2026-02-12T23:16:04.070 | 2026-04-15T00:35:42.020 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-5c3f-mcw3-6q2w |
|
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Add SRCU protection … | 2026-05-06T12:30:33Z | 2026-05-06T12:30:33Z |
| ghsa-3629-447p-wp7v |
|
In the Linux kernel, the following vulnerability has been resolved: PCI: Fix pci_slot_trylock() er… | 2026-05-06T12:30:33Z | 2026-05-06T12:30:33Z |
| ghsa-x85v-hg8f-rh5p |
|
In the Linux kernel, the following vulnerability has been resolved: rnbd-srv: Zero the rsp buffer … | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-vcg7-gx5w-x44c |
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix signededness bug in… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-rhcj-6wxj-r34p |
|
In the Linux kernel, the following vulnerability has been resolved: tcp: fix potential race in tcp… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-rfv7-274m-vphw |
|
In the Linux kernel, the following vulnerability has been resolved: media: cx25821: Fix a resource… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-qpxp-qjrm-7f7r |
|
In the Linux kernel, the following vulnerability has been resolved: ceph: do not propagate page ar… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-qjw7-wgfm-9frq |
|
In the Linux kernel, the following vulnerability has been resolved: media: v4l2-async: Fix error h… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-h3wc-x575-rqjq |
|
In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: Fix swapped par… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-cvxc-xfv3-gf64 |
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix "scheduling whi… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-8x8h-4g2v-qpf2 |
|
In the Linux kernel, the following vulnerability has been resolved: ipv6: ioam: fix heap buffer ov… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-8h7q-934r-3xxv |
|
In the Linux kernel, the following vulnerability has been resolved: soc: ti: pruss: Fix double fre… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-8h5h-g93f-3ff6 |
|
In the Linux kernel, the following vulnerability has been resolved: xfs: delete attr leaf freemap … | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-7ghh-wj4j-cfv3 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate user queu… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-7gfx-7jvh-p5vw |
|
In the Linux kernel, the following vulnerability has been resolved: nfsd: fix nfs4_file refcount l… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-6g7r-xrvq-rpc8 |
|
In the Linux kernel, the following vulnerability has been resolved: net: consume xmit errors of GS… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-3vfw-27w6-rr78 |
|
In the Linux kernel, the following vulnerability has been resolved: dm mpath: Add missing dm_put_d… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-395h-h5jq-ggp6 |
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_tcpmss: check re… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-2m7x-2cj2-wg69 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Adjust PHY FS… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-25mj-mfqw-xqm2 |
|
In the Linux kernel, the following vulnerability has been resolved: netconsole: avoid OOB reads, m… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-2439-4xrr-7j2r |
|
In the Linux kernel, the following vulnerability has been resolved: APEI/GHES: ARM processor Error… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-x976-429q-rjpm |
|
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: Move vbus d… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-vq8h-ghh5-4h7f |
|
In the Linux kernel, the following vulnerability has been resolved: udplite: Fix null-ptr-deref in… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-vpc5-6pmj-q288 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/buddy: Prevent BUG_ON by v… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-v6h5-rjwv-4cvj |
|
In the Linux kernel, the following vulnerability has been resolved: EFI/CPER: don't dump the entir… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-qfxp-89fr-h27x |
|
In the Linux kernel, the following vulnerability has been resolved: media: ccs: Avoid possible div… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-m75h-8jqh-gvwj |
|
In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix reflink preserve cl… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-m5gj-w75c-gcxx |
|
In the Linux kernel, the following vulnerability has been resolved: media: tegra-video: Fix memory… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-m3w5-78ch-j8hg |
|
In the Linux kernel, the following vulnerability has been resolved: io_uring/zcrx: fix post open e… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-jph2-qvw9-vvwq |
|
In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Skip dev-iotlb flu… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-192 |
8.1 (3.1)
|
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Coo… | urllib3 | 2023-10-04T17:15:00+00:00 | 2023-10-10T14:28:19.389317+00:00 |
| pysec-2023-190 |
7.5 (3.1)
|
Versions of the package asyncua before 0.9.96 are vulnerable to Denial of Service (DoS) s… | asyncua | 2023-10-03T05:15:00+00:00 | 2023-10-04T18:37:48.407821+00:00 |
| pysec-2023-189 |
7.5 (3.1)
|
Versions of the package asyncua before 0.9.96 are vulnerable to Improper Authentication s… | asyncua | 2023-10-03T05:15:00+00:00 | 2023-10-04T18:37:48.328804+00:00 |
| pysec-2023-187 |
|
An issue was discovered in pretix before 2023.7.1. Incorrect parsing of configuration fil… | pretix | 2023-10-02T20:15:00+00:00 | 2023-10-02T22:26:51.461030+00:00 |
| pysec-2023-188 |
7.5 (3.1)
|
When deserializing untrusted or corrupted data, it is possible for a reader to consume me… | avro | 2023-09-29T17:15:00+00:00 | 2023-10-03T22:26:25.361706+00:00 |
| pysec-2023-186 |
8.8 (3.1)
|
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffwe… | rdiffweb | 2023-09-29T14:15:00+00:00 | 2023-10-02T20:24:26.790735+00:00 |
| pysec-2023-179 |
|
This affects versions of the package pydash before 6.0.0. A number of pydash methods such… | pydash | 2023-09-28T05:15:00+00:00 | 2023-09-28T10:29:02.604249+00:00 |
| pysec-2023-191 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. The `_abi_decode()` function doe… | vyper | 2023-09-27T15:19:00+00:00 | 2023-10-04T20:26:42.494872+00:00 |
| pysec-2023-185 |
3.7 (3.1)
|
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foun… | matrix-synapse | 2023-09-27T15:19:00+00:00 | 2023-09-30T05:24:54.158504+00:00 |
| pysec-2023-180 |
4.3 (3.1)
|
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foun… | matrix-synapse | 2023-09-27T15:19:00+00:00 | 2023-09-29T20:23:39.578838+00:00 |
| pysec-2023-177 |
|
An issue in Gevent before version 23.9.0 allows a remote attacker to escalate privileges … | gevent | 2023-09-25T12:15:00+00:00 | 2023-09-25T14:28:09.019811+00:00 |
| pysec-2023-310 |
7.5 (3.1)
|
Mobile Security Framework (MobSF) <=v3.7.8 Beta is vulnerable to Insecure Permissions. NO… | mobsf | 2023-09-21T22:15:11+00:00 | 2025-04-09T17:27:26.663665+00:00 |
| pysec-2023-311 |
5.4 (3.1)
|
plone.namedfile allows users to handle `File` and `Image` fields targeting, but not depen… | plone-namedfile | 2023-09-21T15:15:10+00:00 | 2025-04-09T17:27:27.153848+00:00 |
| pysec-2023-178 |
7.5 (3.1)
|
plone.rest allows users to use HTTP verbs such as GET, POST, PUT, DELETE, etc. in Plone. … | plone-rest | 2023-09-21T15:15:00Z | 2023-10-28T20:22:08.431825Z |
| pysec-2023-306 |
8.1 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). In ve… | vyper | 2023-09-18T21:16:00+00:00 | 2024-11-21T14:23:02.752932+00:00 |
| pysec-2023-305 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). Start… | vyper | 2023-09-18T21:16:00+00:00 | 2024-11-21T14:23:02.698147+00:00 |
| pysec-2023-176 |
6.5 (3.1)
|
GeoNode is an open source platform that facilitates the creation, sharing, and collaborat… | geonode | 2023-09-15T21:15:00+00:00 | 2023-09-20T17:25:44.504117+00:00 |
| pysec-2023-173 |
5.3 (3.1)
|
Piccolo is an ORM and query builder which supports asyncio. In versions 0.120.0 and prior… | piccolo | 2023-09-12T21:15:00+00:00 | 2023-09-19T05:26:00.954782+00:00 |
| pysec-2023-171 |
|
Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authent… | apache-airflow | 2023-09-12T12:15:00+00:00 | 2023-09-12T14:27:23.735580+00:00 |
| pysec-2023-170 |
|
Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authent… | apache-airflow | 2023-09-12T12:15:00+00:00 | 2023-09-12T14:27:23.660908+00:00 |
| pysec-2023-172 |
4.3 (3.1)
|
The Create Single Payment application of SAP S/4HANA - versions 100, 101, 102, 103, 104, … | hana-ml | 2023-09-12T02:15:00Z | 2023-09-29T22:26:12.812435Z |
| pysec-2023-169 |
7.8 (3.1)
|
Git Providers can read from the wrong environment because they get the same cache directo… | salt | 2023-09-05T11:15:00+00:00 | 2023-09-08T20:23:17.288300+00:00 |
| pysec-2023-166 |
5.3 (3.1)
|
Salt masters prior to 3005.2 or 3006.2 contain a DOS in minion return. After receiving se… | salt | 2023-09-05T11:15:00+00:00 | 2023-09-07T20:23:20.197102+00:00 |
| pysec-2023-168 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language. In affected versions the order of evaluation… | vyper | 2023-09-04T18:15:00+00:00 | 2023-09-08T16:30:59.497777+00:00 |
| pysec-2023-167 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language. For the following (probably non-exhaustive) … | vyper | 2023-09-04T18:15:00+00:00 | 2023-09-08T15:22:00.929480+00:00 |
| pysec-2023-163 |
9.8 (3.1)
|
An issue in LanChain-ai Langchain v.0.0.245 allows a remote attacker to execute arbitrary… | numexpr | 2023-09-01T16:15:00Z | 2025-02-20T09:11:38.521949Z |
| pysec-2023-162 |
9.8 (3.1)
|
An issue in LanChain-ai Langchain v.0.0.245 allows a remote attacker to execute arbitrary… | langchain | 2023-09-01T16:15:00Z | 2023-10-04T16:56:57.465474Z |
| pysec-2023-165 |
6.5 (3.1)
|
GitPython is a python library used to interact with Git repositories. In order to resolv… | gitpython | 2023-08-30T22:15:00+00:00 | 2023-09-07T14:33:25.683922+00:00 |
| pysec-2023-164 |
4.7 (3.1)
|
borgbackup is an opensource, deduplicating archiver with compression and authenticated en… | borgbackup | 2023-08-30T18:15:00+00:00 | 2023-09-06T16:31:20.448538+00:00 |
| pysec-2023-159 |
7.7 (3.1)
|
RestrictedPython is a restricted execution environment for Python to run untrusted code. … | restrictedpython | 2023-08-30T18:15:00+00:00 | 2023-09-05T16:32:17.658660+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2936 | Malicious code in @tushar-br/editing-pack (npm) | 2026-04-20T06:32:59Z | 2026-04-23T20:50:49Z |
| mal-2026-2935 | Malicious code in @tushar-br/desktop (npm) | 2026-04-20T06:32:59Z | 2026-04-23T20:50:49Z |
| mal-2026-2939 | Malicious code in krdfonts (npm) | 2026-04-20T06:23:38Z | 2026-04-23T20:50:51Z |
| mal-2026-2934 | Malicious code in @otaxayuns/baileys (npm) | 2026-04-20T06:21:33Z | 2026-04-23T20:50:49Z |
| mal-2026-2944 | Malicious code in turbo-leven (npm) | 2026-04-20T06:15:42Z | 2026-04-23T20:50:52Z |
| mal-2026-2943 | Malicious code in turbo-he (npm) | 2026-04-20T06:15:42Z | 2026-04-23T20:50:52Z |
| mal-2026-2942 | Malicious code in optimized-fastest-levenshtein (npm) | 2026-04-20T06:15:42Z | 2026-04-23T20:50:51Z |
| mal-2026-2940 | Malicious code in mailcraftjs (npm) | 2026-04-20T06:15:42Z | 2026-04-23T20:50:51Z |
| mal-2026-2933 | Malicious code in @kjma/mailcraft (npm) | 2026-04-20T06:15:42Z | 2026-04-23T20:50:49Z |
| mal-2026-2921 | Malicious code in chandan-module-test (npm) | 2026-04-19T19:25:43Z | 2026-04-23T20:50:50Z |
| mal-2026-2928 | Malicious code in pa-marked-internal (npm) | 2026-04-19T18:50:52Z | 2026-04-23T20:50:51Z |
| mal-2026-2863 | Malicious code in rblx-studio-api (PyPI) | 2026-04-19T18:45:19Z | 2026-05-03T20:49:49Z |
| mal-2026-2931 | Malicious code in react-spa-shadcn (npm) | 2026-04-19T18:36:09Z | 2026-04-24T03:25:11Z |
| mal-2026-2864 | Malicious code in robase-setup (PyPI) | 2026-04-19T18:24:58Z | 2026-05-03T20:49:49Z |
| mal-2026-2927 | Malicious code in pa-marked (npm) | 2026-04-19T17:21:07Z | 2026-04-23T20:50:51Z |
| mal-2026-2862 | Malicious code in rtms-manager (npm) | 2026-04-19T10:44:08Z | 2026-04-25T08:26:42Z |
| mal-2026-2861 | Malicious code in vinext-monorepo (npm) | 2026-04-19T09:55:46Z | 2026-04-23T20:50:52Z |
| mal-2026-2932 | Malicious code in sy-editor-v3 (npm) | 2026-04-19T08:46:05Z | 2026-04-23T20:50:52Z |
| mal-2026-2860 | Malicious code in mylib-utils (PyPI) | 2026-04-18T22:47:46Z | 2026-04-18T22:47:46Z |
| mal-2026-2859 | Malicious code in rblx-api (PyPI) | 2026-04-18T18:07:19Z | 2026-05-03T20:49:49Z |
| mal-2026-2857 | Malicious code in @shoobx/types (npm) | 2026-04-18T17:35:52Z | 2026-04-23T20:50:49Z |
| mal-2026-2858 | Malicious code in @source-row/source-container (npm) | 2026-04-18T17:18:09Z | 2026-04-23T20:50:49Z |
| mal-2026-2856 | Malicious code in @ataslkit/profilecard (npm) | 2026-04-18T11:55:46Z | 2026-04-23T20:50:49Z |
| mal-2026-2855 | Malicious code in react-resource-router-next (npm) | 2026-04-18T11:17:25Z | 2026-04-23T20:50:51Z |
| mal-2026-2854 | Malicious code in stringhelp (PyPI) | 2026-04-18T09:09:55Z | 2026-04-18T09:10:50Z |
| mal-2026-2924 | Malicious code in cktool.core.internal (npm) | 2026-04-18T09:00:50Z | 2026-04-23T20:50:50Z |
| mal-2026-2923 | Malicious code in cktool.config (npm) | 2026-04-18T08:50:58Z | 2026-04-23T20:50:50Z |
| mal-2026-2922 | Malicious code in cktool.api (npm) | 2026-04-18T08:40:57Z | 2026-04-23T20:50:50Z |
| mal-2026-2925 | Malicious code in cktool.internal (npm) | 2026-04-18T08:09:56Z | 2026-04-23T20:50:50Z |
| mal-2026-2919 | Malicious code in apple-idms-internal (npm) | 2026-04-18T07:55:47Z | 2026-04-23T20:50:49Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2703 | Zabbix: Mehrere Schwachstellen | 2025-11-30T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2702 | Red Hat Enterprise Linux (Developer Hub): Schwachstelle ermöglicht Manipulation von Dateien | 2025-11-30T23:00:00.000+00:00 | 2025-12-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2701 | xwiki (XJetty): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-30T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2700 | CODESYS Control und Development System: Mehrere Schwachstellen | 2025-11-30T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2697 | Devolutions Remote Desktop Manager und Server: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-30T23:00:00.000+00:00 | 2025-11-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2694 | MariaDB: Schwachstelle ermöglicht Codeausführung | 2025-11-27T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2693 | CUPS: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-27T23:00:00.000+00:00 | 2026-01-27T23:00:00.000+00:00 |
| wid-sec-w-2025-2685 | Mattermost: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-26T23:00:00.000+00:00 | 2026-02-26T23:00:00.000+00:00 |
| wid-sec-w-2025-2682 | Tinyproxy: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-11-26T23:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2677 | OPNsense: Schwachstelle ermöglicht Manipulation von Dateien | 2025-11-25T23:00:00.000+00:00 | 2025-12-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2676 | GeoServer: Mehrere Schwachstellen | 2025-11-25T23:00:00.000+00:00 | 2025-12-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2672 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-24T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2670 | Fluent Bit: Mehrere Schwachstellen | 2025-11-24T23:00:00.000+00:00 | 2025-11-25T23:00:00.000+00:00 |
| wid-sec-w-2025-2667 | Janitza UMG 96-PA und UMG 96-PA-MID+: Schwachstelle ermöglicht Denial of Service | 2025-11-23T23:00:00.000+00:00 | 2025-11-24T23:00:00.000+00:00 |
| wid-sec-w-2025-2666 | vllm und PyTorch: Schwachstelle ermöglicht DoS und potenzielle Codeausführung | 2025-11-23T23:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2663 | libpng: Mehrere Schwachstellen | 2025-11-23T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2661 | Google Cloud Platform (Looker): Schwachstelle ermöglicht Ausführen von beliebigem Programmcode | 2025-11-23T23:00:00.000+00:00 | 2025-11-24T23:00:00.000+00:00 |
| wid-sec-w-2025-2658 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-20T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2657 | WebKitGTK: Mehrere Schwachstellen | 2025-11-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2655 | CUPS-Filters: Schwachstelle ermöglicht Codeausführung | 2025-11-20T23:00:00.000+00:00 | 2025-12-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2653 | Microsoft Visual Studio Code: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-11-20T23:00:00.000+00:00 | 2025-11-20T23:00:00.000+00:00 |
| wid-sec-w-2025-2652 | Red Hat Satellite: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-20T23:00:00.000+00:00 | 2025-11-20T23:00:00.000+00:00 |
| wid-sec-w-2025-2651 | GnuTLS: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-11-19T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2649 | Google Cloud Platform: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-11-19T23:00:00.000+00:00 | 2025-11-20T23:00:00.000+00:00 |
| wid-sec-w-2025-2647 | SonicWall Email Security: Mehrere Schwachstellen | 2025-11-19T23:00:00.000+00:00 | 2025-11-20T23:00:00.000+00:00 |
| wid-sec-w-2025-2645 | Golang Go: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-19T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2643 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-19T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2640 | SonicWall SSL-VPN: Schwachstelle ermöglicht Denial of Service | 2025-11-19T23:00:00.000+00:00 | 2025-11-20T23:00:00.000+00:00 |
| wid-sec-w-2025-2638 | Grub: Mehrere Schwachstellen | 2025-11-18T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2637 | Rsync: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-11-18T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-191-08 | Advantech iView | 2025-07-10T06:00:00.000000Z | 2025-07-10T06:00:00.000000Z |
| icsa-25-191-07 | Delta Electronics DTM Soft | 2025-07-10T06:00:00.000000Z | 2025-07-10T06:00:00.000000Z |
| icsa-25-189-01 | Emerson ValveLink Products | 2025-07-08T06:00:00.000000Z | 2025-07-08T06:00:00.000000Z |
| icsa-25-203-06 | Schneider Electric EcoStruxture IT Data Center Expert | 2025-07-08T04:00:00.000000Z | 2025-07-08T04:00:00.000000Z |
| icsa-25-203-05 | Schneider Electric System Monitor Application | 2025-07-08T04:00:00.000000Z | 2025-07-08T04:00:00.000000Z |
| icsa-25-203-03 | Schneider Electric EcoStruxure | 2025-07-08T04:00:00.000000Z | 2025-07-08T04:00:00.000000Z |
| icsa-25-294-04 | Siemens RUGGEDCOM ROS Devices | 2025-07-08T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-191-06 | Siemens SIPROTEC 5 | 2025-07-08T00:00:00.000000Z | 2025-07-08T00:00:00.000000Z |
| icsa-25-191-05 | Siemens TIA Project-Server and TIA Portal | 2025-07-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-191-04 | Siemens SIMATIC CN 4100 | 2025-07-08T00:00:00.000000Z | 2025-07-08T00:00:00.000000Z |
| icsa-25-191-03 | Siemens TIA Administrator | 2025-07-08T00:00:00.000000Z | 2025-07-08T00:00:00.000000Z |
| icsa-25-191-02 | Siemens Solid Edge | 2025-07-08T00:00:00.000000Z | 2025-07-08T00:00:00.000000Z |
| icsa-25-191-01 | Siemens SINEC NMS | 2025-07-08T00:00:00.000000Z | 2025-07-08T00:00:00.000000Z |
| icsa-25-184-04 | Mitsubishi Electric MELSEC iQ-F Series | 2025-07-03T06:00:00.000000Z | 2025-07-03T06:00:00.000000Z |
| icsa-25-184-03 | Mitsubishi Electric MELSOFT Update Manager (Update B) | 2025-07-03T06:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-25-184-02 | Hitachi Energy MicroSCADA X SYS600 | 2025-07-03T06:00:00.000000Z | 2025-07-03T06:00:00.000000Z |
| va-25-169-01 | Versa Networks Versa Director multiple vulnerabilities | 2025-07-02T20:57:00Z | 2025-07-02T20:57:00Z |
| icsa-25-182-05 | Voltronic Power and PowerShield UPS monitoring software | 2025-07-01T06:00:00.000000Z | 2025-07-01T06:00:00.000000Z |
| icsa-25-177-01 | Mitsubishi Electric Air Conditioning Systems (Update B) | 2025-06-26T06:00:00.000000Z | 2025-12-23T07:00:00.000000Z |
| icsa-25-177-02 | TrendMakers Sight Bulb Pro | 2025-06-26T05:00:00.000000Z | 2025-06-26T05:00:00.000000Z |
| icsa-25-182-07 | Hitachi Energy MSM | 2025-06-24T12:30:00.000000Z | 2025-06-24T12:30:00.000000Z |
| icsa-25-182-06 | Hitachi Energy Relion 670/650 and SAM600-IO Series (Update A) | 2025-06-24T12:30:00.000000Z | 2025-08-26T10:00:00.000000Z |
| icsa-25-175-07 | MICROSENS NMP Web+ | 2025-06-24T06:00:00.000000Z | 2025-06-24T06:00:00.000000Z |
| icsa-25-175-06 | Parsons AccuWeather widget | 2025-06-24T06:00:00.000000Z | 2025-06-24T06:00:00.000000Z |
| icsa-25-175-05 | ControlID iDSecure On-premises | 2025-06-24T06:00:00.000000Z | 2025-06-24T06:00:00.000000Z |
| icsa-25-175-02 | Delta Electronics CNCSoft | 2025-06-24T06:00:00.000000Z | 2025-06-24T06:00:00.000000Z |
| icsa-25-175-01 | Kaleris Navis N4 Terminal Operating System | 2025-06-24T06:00:00.000000Z | 2025-06-24T06:00:00.000000Z |
| icsa-25-184-01 | Hitachi Energy Relion 670/650 and SAM600-IO Series | 2025-06-24T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| va-25-171-01 | ClamAV | 2025-06-20T00:00:00Z | 2025-06-20T00:00:00Z |
| icsa-25-168-05 | Dover Fueling Solutions ProGauge MagLink LX consoles | 2025-06-17T06:00:00.000000Z | 2025-06-17T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ndo-upav-yrqsccsp | Cisco Nexus Dashboard Orchestrator Unauthorized Policy Actions Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-ndidv-lmxdvaf2 | Cisco Nexus Dashboard Information Disclosure Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-ndfccsrf-temzefj9 | Cisco Nexus Dashboard and Nexus Dashboard Hosted Services Cross-Site Request Forgery Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-ndfc-dir-trav-ssn3aydw | Cisco Nexus Dashboard Fabric Controller Plug and Play Arbitrary File Read Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-ise-ssrf-ftsth5oz | Cisco Identity Services Engine Server-Side Request Forgery Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-ise-csrf-nfakxrp5 | Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-ece-xss-csqxgxfm | Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-cucm-imps-xss-quwkd9yf | Cisco Unified Communications Manager IM & Presence Service Cross-Site Scripting Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-cem-csrf-sucmnjfr | Cisco Emergency Responder Cross-Site Request Forgery and Directory Traversal Vulnerabilities | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-wlc-mdns-dos-4hv6pbgf | Cisco IOS XE Software for Wireless LAN Controllers Multicast DNS Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-lisp-3gyxs3qp | Cisco IOS and IOS XE Software Locator ID Separation Protocol Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-isis-sgjyouhx | Cisco IOS and IOS XE Software Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-iosxe-wlc-privesc-rjsmrmpk | Cisco IOS XE Software for Wireless LAN Controllers Privilege Escalation Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-iosxe-utd-cmd-jbl8kvht | Cisco IOS XE Software Unified Threat Defense Command Injection Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-04-02T20:11:04+00:00 |
| cisco-sa-iosxe-priv-esc-seax6nlx | Cisco IOS XE Software Privilege Escalation Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-iosxe-ospf-dos-dr9sfrxp | Cisco IOS XE Software OSPFv2 Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-ios-xe-sda-edge-dos-qzwuwxwg | Cisco IOS XE Software SD-Access Fabric Edge Node Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-ios-dos-hq4d3tzg | Cisco IOS Software for Catalyst 6000 Series Switches Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-04-04T15:31:55+00:00 |
| cisco-sa-ikev1-no2ccfwz | Cisco IOS and IOS XE Software Internet Key Exchange Version 1 Fragmentation Denial of Service Vulnerabilities | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-dmi-acl-bypass-xv8fo8vz | Cisco IOS XE Software NETCONF/RESTCONF IPv4 Access Control List Bypass Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-dhcp-dos-t3cxpo9z | Cisco IOS XE Software DHCP Snooping with Endpoint Analytics Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-ccc-authz-bypass-5ekchjrb | Cisco Catalyst Center Authorization Bypass Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-aux-333wbz8f | Cisco IOS XE Software Auxiliary Asynchronous Port Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-ap-secureboot-bypass-zt5vjksd | Cisco Access Point Software Secure Boot Bypass Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-ap-dos-h9tggx6w | Cisco Access Point Software Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-airo-ap-dos-ppptcvw | Cisco Aironet Access Point Software Resource Exhaustion Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-xrl2vpn-jesru3fc | Cisco IOS XR Software Layer 2 Services Denial of Service Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-snmp-uhv6zdef | Cisco IOS XR Software SNMP Management Plane Protection ACL Bypass Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-iosxr-ssh-privesc-ewdmkew3 | Cisco IOS XR Software SSH Privilege Escalation Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-iosxr-scp-dos-kb6suuhw | Cisco IOS XR Software Authenticated CLI Secure Copy Protocol and SFTP Denial of Service Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-31651 | mmc: vub300: fix NULL-deref on disconnect | 2026-04-02T00:00:00.000Z | 2026-05-01T14:40:35.000Z |
| msrc_cve-2026-31649 | net: stmmac: fix integer underflow in chain mode | 2026-04-02T00:00:00.000Z | 2026-05-01T14:43:32.000Z |
| msrc_cve-2026-31648 | mm: filemap: fix nr_pages calculation overflow in filemap_map_pages() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:46:31.000Z |
| msrc_cve-2026-31646 | net: lan966x: fix page_pool error handling in lan966x_fdma_rx_alloc_page_pool() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:39:06.000Z |
| msrc_cve-2026-31645 | net: lan966x: fix page pool leak in error paths | 2026-04-02T00:00:00.000Z | 2026-04-29T14:59:19.000Z |
| msrc_cve-2026-31642 | rxrpc: Fix call removal to use RCU safe deletion | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:49.000Z |
| msrc_cve-2026-31639 | rxrpc: Fix key reference count leak from call->key | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:57.000Z |
| msrc_cve-2026-31638 | rxrpc: Only put the call ref if one was acquired | 2026-04-02T00:00:00.000Z | 2026-05-01T14:39:46.000Z |
| msrc_cve-2026-31637 | rxrpc: reject undecryptable rxkad response tickets | 2026-04-02T00:00:00.000Z | 2026-05-01T14:40:22.000Z |
| msrc_cve-2026-31634 | rxrpc: fix reference count leak in rxrpc_server_keyring() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:44:08.000Z |
| msrc_cve-2026-31630 | rxrpc: proc: size address buffers for %pISpc output | 2026-04-02T00:00:00.000Z | 2026-04-29T14:41:39.000Z |
| msrc_cve-2026-31629 | nfc: llcp: add missing return after LLCP_CLOSED checks | 2026-04-02T00:00:00.000Z | 2026-05-01T14:43:05.000Z |
| msrc_cve-2026-31628 | x86/CPU: Fix FPDSS on Zen1 | 2026-04-02T00:00:00.000Z | 2026-05-01T14:43:12.000Z |
| msrc_cve-2026-31627 | i2c: s3c24xx: check the size of the SMBUS message before using it | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:56.000Z |
| msrc_cve-2026-31626 | staging: rtl8723bs: initialize le_tmp64 in rtw_BIP_verify() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:40:49.000Z |
| msrc_cve-2026-31625 | HID: alps: fix NULL pointer dereference in alps_raw_event() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:44:14.000Z |
| msrc_cve-2026-31624 | HID: core: clamp report_size in s32ton() to avoid undefined shift | 2026-04-02T00:00:00.000Z | 2026-05-01T14:40:29.000Z |
| msrc_cve-2026-31623 | net: usb: cdc-phonet: fix skb frags[] overflow in rx_complete() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:17.000Z |
| msrc_cve-2026-31622 | NFC: digital: Bounds check NFC-A cascade depth in SDD response handler | 2026-04-02T00:00:00.000Z | 2026-05-01T14:44:34.000Z |
| msrc_cve-2026-31621 | bnge: return after auxiliary_device_uninit() in error path | 2026-04-02T00:00:00.000Z | 2026-04-29T14:46:38.000Z |
| msrc_cve-2026-31620 | ALSA: usx2y: us144mkii: fix NULL deref on missing interface 0 | 2026-04-02T00:00:00.000Z | 2026-04-29T14:52:49.000Z |
| msrc_cve-2026-31619 | ALSA: fireworks: bound device-supplied status before string array lookup | 2026-04-02T00:00:00.000Z | 2026-05-01T14:45:03.000Z |
| msrc_cve-2026-31618 | fbdev: tdfxfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO | 2026-04-02T00:00:00.000Z | 2026-05-01T14:39:32.000Z |
| msrc_cve-2026-31617 | usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:51:31.000Z |
| msrc_cve-2026-31616 | usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:40:49.000Z |
| msrc_cve-2026-31615 | usb: gadget: renesas_usb3: validate endpoint index in standard request handlers | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:09.000Z |
| msrc_cve-2026-31613 | smb: client: fix OOB reads parsing symlink error response | 2026-04-02T00:00:00.000Z | 2026-04-29T15:00:49.000Z |
| msrc_cve-2026-31612 | ksmbd: validate EaNameLength in smb2_get_ea() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:24.000Z |
| msrc_cve-2026-31611 | ksmbd: require 3 sub-authorities before reading sub_auth[2] | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:43.000Z |
| msrc_cve-2026-31610 | ksmbd: fix mechToken leak when SPNEGO decode fails after token alloc | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:16.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0119 | Kwetsbaarheden verholpen in SAP-producten | 2025-04-09T09:12:05.705017Z | 2025-04-30T13:12:27.070565Z |
| ncsc-2025-0118 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-04-09T08:14:16.645915Z | 2025-04-09T08:14:16.645915Z |
| ncsc-2025-0117 | Kwetsbaarheden verholpen in Adobe Animate | 2025-04-09T08:12:45.041685Z | 2025-04-09T08:12:45.041685Z |
| ncsc-2025-0116 | Kwetsbaarheid verholpen in Adobe Photoshop | 2025-04-09T08:09:40.474635Z | 2025-04-09T08:09:40.474635Z |
| ncsc-2025-0115 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2025-04-09T08:08:15.866613Z | 2025-04-09T08:08:15.866613Z |
| ncsc-2025-0114 | Kwetsbaarheden verholpen in Adobe After Effects | 2025-04-09T08:05:51.653949Z | 2025-04-09T08:05:51.653949Z |
| ncsc-2025-0113 | Kwetsbaarheid verholpen in FortiSwitch | 2025-04-09T06:49:51.895137Z | 2025-04-09T06:49:51.895137Z |
| ncsc-2025-0112 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-04-08T18:57:53.660384Z | 2025-04-08T18:57:53.660384Z |
| ncsc-2025-0111 | Kwetsbaarheid verholpen in Microsoft Dynamics | 2025-04-08T18:56:16.386532Z | 2025-04-08T18:56:16.386532Z |
| ncsc-2025-0110 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-04-08T18:54:30.631706Z | 2025-04-08T18:54:30.631706Z |
| ncsc-2025-0109 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-04-08T18:53:20.624247Z | 2025-04-08T18:53:20.624247Z |
| ncsc-2025-0108 | Kwetsbaarheid verholpen in Microsoft System Center | 2025-04-08T18:52:22.999321Z | 2025-04-08T18:52:22.999321Z |
| ncsc-2025-0107 | Kwetsbaarheden verholpen in Microsoft Office | 2025-04-08T18:50:53.931519Z | 2025-04-08T18:50:53.931519Z |
| ncsc-2025-0106 | Kwetsbaarheden verholpen in Siemens producten | 2025-04-08T13:57:11.959816Z | 2025-04-08T13:57:11.959816Z |
| ncsc-2025-0105 | Kwetsbaarheid verholpen in Ivanti Connect Secure, Policy Secure en ZTA Gateways | 2025-04-03T14:19:37.560619Z | 2025-04-03T14:19:37.560619Z |
| ncsc-2025-0104 | Kwetsbaarheid verholpen in Cisco Enterprise Chat and Email | 2025-04-03T08:04:22.928655Z | 2025-04-03T08:04:22.928655Z |
| ncsc-2025-0103 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-04-01T08:42:27.059536Z | 2025-04-01T08:42:27.059536Z |
| ncsc-2025-0102 | Kwetsbaarheden verholpen in Apple macOS | 2025-04-01T08:41:09.934597Z | 2025-04-01T08:41:09.934597Z |
| ncsc-2025-0101 | Kwetsbaarheid verholpen in CrushFTP | 2025-04-01T07:47:50.425419Z | 2025-04-07T14:03:59.372671Z |
| ncsc-2025-0100 | Kwetsbaarheden verholpen in GitLab EE/CE | 2025-03-27T14:49:34.316050Z | 2025-03-27T14:49:34.316050Z |
| ncsc-2025-0099 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2025-03-27T09:18:30.331072Z | 2025-03-27T09:18:30.331072Z |
| ncsc-2025-0098 | Kwetsbaarheid verholpen in Google Chrome | 2025-03-26T12:45:59.434386Z | 2025-03-26T12:45:59.434386Z |
| ncsc-2025-0097 | Kwetsbaarheid verholpen in NetApp SnapCenter | 2025-03-25T08:41:39.996819Z | 2025-03-25T08:41:39.996819Z |
| ncsc-2025-0096 | Kwetsbaarheid verholpen in Next.js | 2025-03-25T08:38:53.524904Z | 2025-03-25T08:38:53.524904Z |
| ncsc-2025-0095 | Kwetsbaarheden verholpen in Kubernetes Ingress NGINX Controller | 2025-03-25T07:13:08.093318Z | 2025-03-27T14:41:30.387171Z |
| ncsc-2025-0094 | Kwetsbaarheid verholpen in Veeam Backup & Replication | 2025-03-20T14:10:16.806777Z | 2025-03-20T14:10:16.806777Z |
| ncsc-2025-0093 | Kwetsbaarheid verholpen in IBM InfoSphere Information Server | 2025-03-20T13:17:45.897480Z | 2025-03-20T13:17:45.897480Z |
| ncsc-2025-0092 | Kwetsbaarheden verholpen in IBM AIX | 2025-03-20T13:13:43.163579Z | 2025-03-20T13:13:43.163579Z |
| ncsc-2025-0091 | Kwetsbaarheid verholpen in Synology DiskStation Manager | 2025-03-19T15:03:23.414509Z | 2025-03-19T15:03:23.414509Z |
| ncsc-2025-0090 | Kwetsbaarheid verholpen in Synology Replication Service en Synology Unified Controller | 2025-03-19T15:02:46.122619Z | 2025-03-19T15:02:46.122619Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20337-1 | Security update for ImageMagick | 2026-03-09T10:04:29Z | 2026-03-09T10:04:29Z |
| opensuse-su-2026:10314-1 | traefik2-2.11.40-1.1 on GA media | 2026-03-09T00:00:00Z | 2026-03-09T00:00:00Z |
| opensuse-su-2026:10313-1 | rclone-1.73.2-1.1 on GA media | 2026-03-09T00:00:00Z | 2026-03-09T00:00:00Z |
| opensuse-su-2026:10312-1 | python311-pymongo-4.16.0-1.1 on GA media | 2026-03-09T00:00:00Z | 2026-03-09T00:00:00Z |
| opensuse-su-2026:10311-1 | corepack24-24.13.0-4.1 on GA media | 2026-03-08T00:00:00Z | 2026-03-08T00:00:00Z |
| opensuse-su-2026:10310-1 | go1.25-1.25.8-1.1 on GA media | 2026-03-08T00:00:00Z | 2026-03-08T00:00:00Z |
| opensuse-su-2026:20332-1 | Security update for chromium | 2026-03-07T12:59:14Z | 2026-03-07T12:59:14Z |
| opensuse-su-2026:10309-1 | weblate-5.16.1-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10308-1 | virtiofsd-1.13.2-2.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10307-1 | tomcat11-11.0.18-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10306-1 | tomcat10-10.1.52-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10305-1 | tomcat-9.0.115-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10304-1 | python311-nltk-3.9.3-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10303-1 | libIex-3_4-33-3.4.6-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10302-1 | kubeshark-cli-53.1.0-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10301-1 | kernel-devel-longterm-6.18.16-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10300-1 | jetty-annotations-9.4.58-3.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10299-1 | go1.26-1.26.1-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10298-1 | exiv2-0.28.8-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10297-1 | coredns-1.14.2-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10296-1 | chromedriver-145.0.7632.159-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10295-1 | NetworkManager-applet-strongswan-1.6.4-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:20333-1 | Security update for python-PyPDF2 | 2026-03-06T21:01:39Z | 2026-03-06T21:01:39Z |
| opensuse-su-2026:20330-1 | Security update for python-uv | 2026-03-06T14:43:28Z | 2026-03-06T14:43:28Z |
| opensuse-su-2026:20323-1 | Security update for roundcubemail | 2026-03-05T18:31:03Z | 2026-03-05T18:31:03Z |
| opensuse-su-2026:20329-1 | Security update for gstreamer-rtsp-server, gstreamer-plugins-ugly, gstreamer-plugins-rs, gstreamer-plugins-libav, gstreamer-plugins-good, gstreamer-plugins-base, gstreamer-plugins-bad, gstreamer-docs, gstreamer-devtools, gstreamer | 2026-03-05T18:13:13Z | 2026-03-05T18:13:13Z |
| opensuse-su-2026:20322-1 | Security update for python-joserfc | 2026-03-05T14:32:35Z | 2026-03-05T14:32:35Z |
| opensuse-su-2026:20327-1 | Security update for helm | 2026-03-05T14:27:21Z | 2026-03-05T14:27:21Z |
| opensuse-su-2026:20326-1 | Security update for virtiofsd | 2026-03-05T14:23:19Z | 2026-03-05T14:23:19Z |
| opensuse-ru-2026:20325-1 | Recommended update for shim | 2026-03-05T14:21:04Z | 2026-03-05T14:21:04Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:9354 | Red Hat Security Advisory: python3.9 security update | 2026-04-21T15:36:00+00:00 | 2026-05-05T20:31:05+00:00 |
| rhsa-2026:9388 | Red Hat Security Advisory: Red Hat build of OpenTelemetry 3.9.2 release | 2026-04-21T15:19:05+00:00 | 2026-05-07T01:16:53+00:00 |
| rhsa-2026:9345 | Red Hat Security Advisory: thunderbird security update | 2026-04-21T15:10:45+00:00 | 2026-05-06T20:37:07+00:00 |
| rhsa-2026:9385 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.9.2 release | 2026-04-21T15:08:38+00:00 | 2026-05-07T01:16:53+00:00 |
| rhsa-2026:9294 | Red Hat Security Advisory: giflib security update | 2026-04-21T14:49:05+00:00 | 2026-04-21T19:40:51+00:00 |
| rhsa-2026:9295 | Red Hat Security Advisory: giflib security update | 2026-04-21T14:47:00+00:00 | 2026-04-21T19:40:48+00:00 |
| rhsa-2026:9289 | Red Hat Security Advisory: python3 security update | 2026-04-21T14:31:25+00:00 | 2026-05-05T20:31:09+00:00 |
| rhsa-2026:9292 | Red Hat Security Advisory: giflib security update | 2026-04-21T14:23:49+00:00 | 2026-04-21T19:40:54+00:00 |
| rhsa-2026:9290 | Red Hat Security Advisory: giflib security update | 2026-04-21T14:20:34+00:00 | 2026-04-21T19:40:52+00:00 |
| rhsa-2026:9291 | Red Hat Security Advisory: giflib security update | 2026-04-21T14:15:03+00:00 | 2026-04-21T19:40:53+00:00 |
| rhsa-2026:9264 | Red Hat Security Advisory: kernel security update | 2026-04-21T13:08:50+00:00 | 2026-05-04T21:14:41+00:00 |
| rhsa-2026:9262 | Red Hat Security Advisory: python3.9 security update | 2026-04-21T12:05:49+00:00 | 2026-05-05T20:31:07+00:00 |
| rhsa-2026:9260 | Red Hat Security Advisory: python3.11 security update | 2026-04-21T11:45:55+00:00 | 2026-05-05T20:31:07+00:00 |
| rhsa-2026:9261 | Red Hat Security Advisory: python3.9 security update | 2026-04-21T11:42:29+00:00 | 2026-05-05T20:31:07+00:00 |
| rhsa-2026:9259 | Red Hat Security Advisory: perl-XML-Parser security update | 2026-04-21T11:41:29+00:00 | 2026-04-22T13:44:40+00:00 |
| rhsa-2026:9258 | Red Hat Security Advisory: perl-XML-Parser security update | 2026-04-21T11:21:19+00:00 | 2026-04-22T13:44:41+00:00 |
| rhsa-2026:9246 | Red Hat Security Advisory: perl-XML-Parser security update | 2026-04-21T10:18:29+00:00 | 2026-04-22T13:44:41+00:00 |
| rhsa-2026:9228 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-21T07:26:49+00:00 | 2026-05-05T20:35:34+00:00 |
| rhsa-2026:9221 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-21T06:25:52+00:00 | 2026-04-21T19:46:37+00:00 |
| rhsa-2026:9220 | Red Hat Security Advisory: squid security update | 2026-04-21T06:11:41+00:00 | 2026-04-30T02:55:09+00:00 |
| rhsa-2026:9205 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-21T03:04:46+00:00 | 2026-05-05T11:27:06+00:00 |
| rhsa-2026:9131 | Red Hat Security Advisory: kernel security update | 2026-04-20T21:18:37+00:00 | 2026-05-06T20:36:25+00:00 |
| rhsa-2026:9112 | Red Hat Security Advisory: kernel security update | 2026-04-20T21:06:53+00:00 | 2026-05-06T20:36:31+00:00 |
| rhsa-2026:9135 | Red Hat Security Advisory: kernel-rt security update | 2026-04-20T21:03:12+00:00 | 2026-05-06T20:34:49+00:00 |
| rhsa-2026:9109 | Red Hat Security Advisory: containernetworking-plugins security update | 2026-04-20T20:04:52+00:00 | 2026-05-06T20:58:23+00:00 |
| rhsa-2026:9108 | Red Hat Security Advisory: gvisor-tap-vsock security update | 2026-04-20T19:56:47+00:00 | 2026-05-06T20:58:23+00:00 |
| rhsa-2026:9113 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-20T19:45:39+00:00 | 2026-04-23T04:31:13+00:00 |
| rhsa-2026:9110 | Red Hat Security Advisory: perl-XML-Parser security update | 2026-04-20T19:23:02+00:00 | 2026-04-22T13:44:40+00:00 |
| rhsa-2026:9098 | Red Hat Security Advisory: skopeo security update | 2026-04-20T18:55:22+00:00 | 2026-05-06T20:58:23+00:00 |
| rhsa-2026:9097 | Red Hat Security Advisory: runc security update | 2026-04-20T18:53:07+00:00 | 2026-05-06T20:58:22+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-116924 | SSA-116924: Path Traversal Vulnerability in TIA Portal | 2023-04-11T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-851884 | SSA-851884: Authentication Bypass Vulnerability in Mendix SAML Module | 2023-03-14T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-726834 | SSA-726834: Denial of Service Vulnerability in the RADIUS Client of SIPROTEC 5 Devices | 2023-03-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-565386 | SSA-565386: Third-Party Component Vulnerabilities in SCALANCE W-700 IEEE 802.11ax devices before V2.0 | 2023-03-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-419740 | SSA-419740: Multiple Third-Party Component Vulnerabilities in RUGGEDCOM and SCALANCE Products before V7.2 | 2023-03-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-320629 | SSA-320629: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.3 | 2023-03-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-260625 | SSA-260625: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.2 | 2023-03-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-203374 | SSA-203374: Multiple OpenSSL Vulnerabilities in SCALANCE W1750D Devices | 2023-03-14T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-953464 | SSA-953464: Multiple Vulnerabilites in Siemens Brownfield Connectivity - Client before V2.15 | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-847261 | SSA-847261: Multiple SPP File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2023-02-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-836777 | SSA-836777: JT File Parsing Vulnerabilities in JT Open, JT Utilities and Parasolid | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-744259 | SSA-744259: Golang Vulnerabilities in Brownfield Connectivity - Gateway before V1.10.1 | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-686975 | SSA-686975: IPU 2022.3 Vulnerabilities in Siemens Industrial Products using Intel CPUs | 2023-02-14T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-658793 | SSA-658793: Command Injection Vulnerability in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-640968 | SSA-640968: Untrusted Search Path Vulnerability in TIA Project-Server formerly known as TIA Multiuser Server | 2023-02-14T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-617755 | SSA-617755: Denial of Service Vulnerability in the SNMP Agent of SCALANCE X-200IRT Products | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-565356 | SSA-565356: X_T File Parsing Vulnerabilities in Simcenter Femap before V2023.1 | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-491245 | SSA-491245: Multiple File Parsing Vulnerabilities in Solid Edge | 2023-02-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-450613 | SSA-450613: Insyde BIOS Vulnerabilities in RUGGEDCOM APE1808 Product Family | 2023-02-14T00:00:00Z | 2023-09-12T00:00:00Z |
| ssa-252808 | SSA-252808: XPath Constraint Vulnerability in Mendix Runtime | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-997779 | SSA-997779: File Parsing Vulnerability in Solid Edge before V2023 MP1 | 2023-01-10T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-936212 | SSA-936212: JT File Parsing Vulnerabilities in JT Open, JT Utilities and Solid Edge | 2023-01-10T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-496604 | SSA-496604: Cross-Site Scripting Vulnerability in Mendix SAML Module | 2023-01-10T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-482757 | SSA-482757: Missing Immutable Root of Trust in S7-1500 CPU devices | 2023-01-10T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-476715 | SSA-476715: Two Vulnerabilities in Automation License Manager | 2023-01-10T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-332410 | SSA-332410: Multiple Vulnerabilities in SINEC INS before V1.0 SP2 Update 1 | 2023-01-10T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-930100 | SSA-930100: Privilege Escalation Vulnerability in Simcenter STAR-CCM+ | 2022-12-13T00:00:00Z | 2023-07-11T00:00:00Z |
| ssa-849072 | SSA-849072: Several Vulnerabilities in SICAM PAS before V8.06 | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-792594 | SSA-792594: Host Header Injection Vulnerability in Polarion ALM | 2022-12-13T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-700053 | SSA-700053: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2022-12-13T00:00:00Z | 2023-04-11T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1337-1 | Security update for rust1.92 | 2026-04-15T07:33:26Z | 2026-04-15T07:33:26Z |
| suse-su-2026:1335-1 | Security update for xorg-x11-server | 2026-04-14T17:28:43Z | 2026-04-14T17:28:43Z |
| suse-su-2026:1333-1 | Security update for xorg-x11-server | 2026-04-14T17:18:59Z | 2026-04-14T17:18:59Z |
| suse-su-2026:1332-1 | Security update for xorg-x11-server | 2026-04-14T17:15:06Z | 2026-04-14T17:15:06Z |
| suse-su-2026:1331-1 | Security update for xorg-x11-server | 2026-04-14T17:11:37Z | 2026-04-14T17:11:37Z |
| suse-su-2026:1330-1 | Security update for xorg-x11-server | 2026-04-14T17:08:59Z | 2026-04-14T17:08:59Z |
| suse-su-2026:1329-1 | Security update for xwayland | 2026-04-14T17:06:20Z | 2026-04-14T17:06:20Z |
| suse-su-2026:1328-1 | Security update for xwayland | 2026-04-14T17:04:46Z | 2026-04-14T17:04:46Z |
| suse-su-2026:21195-1 | Security update for go1.26-openssl | 2026-04-14T15:41:55Z | 2026-04-14T15:41:55Z |
| suse-su-2026:21194-1 | Security update for plexus-utils | 2026-04-14T15:02:29Z | 2026-04-14T15:02:29Z |
| suse-su-2026:21192-1 | Security update for pam | 2026-04-14T13:47:51Z | 2026-04-14T13:47:51Z |
| suse-su-2026:21112-1 | Security update for pam | 2026-04-14T13:47:51Z | 2026-04-14T13:47:51Z |
| suse-su-2026:1325-1 | Security update for clamav | 2026-04-14T13:15:45Z | 2026-04-14T13:15:45Z |
| suse-su-2026:1324-1 | Security update for clamav | 2026-04-14T13:15:31Z | 2026-04-14T13:15:31Z |
| suse-su-2026:1323-1 | Security update for libpng16 | 2026-04-14T13:11:55Z | 2026-04-14T13:11:55Z |
| suse-su-2026:1322-1 | Security update for MozillaFirefox | 2026-04-14T12:42:11Z | 2026-04-14T12:42:11Z |
| suse-su-2026:1321-1 | Security update for go1.25 | 2026-04-14T12:40:53Z | 2026-04-14T12:40:53Z |
| suse-su-2026:1320-1 | Security update for go1.26 | 2026-04-14T12:39:43Z | 2026-04-14T12:39:43Z |
| suse-su-2026:21191-1 | Security update for cockpit-subscriptions | 2026-04-14T12:16:29Z | 2026-04-14T12:16:29Z |
| suse-su-2026:21111-1 | Security update for cockpit-subscriptions | 2026-04-14T12:16:29Z | 2026-04-14T12:16:29Z |
| suse-su-2026:1314-1 | Security update for ignition | 2026-04-14T11:07:12Z | 2026-04-14T11:07:12Z |
| suse-su-2026:1313-1 | Security update for freerdp2 | 2026-04-14T10:47:31Z | 2026-04-14T10:47:31Z |
| suse-su-2026:1312-1 | Security update for bind | 2026-04-14T10:46:32Z | 2026-04-14T10:46:32Z |
| suse-su-2026:1311-1 | Security update for libpng16 | 2026-04-14T10:44:51Z | 2026-04-14T10:44:51Z |
| suse-su-2026:1310-1 | Security update for libssh | 2026-04-14T10:42:14Z | 2026-04-14T10:42:14Z |
| suse-su-2026:1309-1 | Security update for sudo | 2026-04-14T10:39:38Z | 2026-04-14T10:39:38Z |
| suse-su-2026:1308-1 | Security update for sudo | 2026-04-14T10:38:01Z | 2026-04-14T10:38:01Z |
| suse-su-2026:1307-1 | Security update for strongswan | 2026-04-14T10:35:42Z | 2026-04-14T10:35:42Z |
| suse-su-2026:21118-1 | Security update for vim | 2026-04-14T08:33:54Z | 2026-04-14T08:33:54Z |
| suse-su-2026:21117-1 | Security update for avahi | 2026-04-14T08:31:12Z | 2026-04-14T08:31:12Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:1472 | Important: openssl security update | 2026-01-28T00:00:00Z | 2026-01-28T19:58:47Z |
| alsa-2026:1429 | Important: php:8.3 security update | 2026-01-27T00:00:00Z | 2026-01-29T11:59:57Z |
| alsa-2026:1412 | Important: php:8.2 security update | 2026-01-27T00:00:00Z | 2026-02-02T11:16:18Z |
| alsa-2026:1410 | Moderate: python3.11 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:02:18Z |
| alsa-2026:1409 | Important: php:8.2 security update | 2026-01-27T00:00:00Z | 2026-02-02T11:20:21Z |
| alsa-2026:1408 | Moderate: python3.12 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:05:44Z |
| alsa-2026:1381 | Moderate: osbuild-composer security update | 2026-01-27T00:00:00Z | 2026-02-02T11:22:03Z |
| alsa-2026:1380 | Moderate: osbuild-composer security update | 2026-01-27T00:00:00Z | 2026-01-29T12:07:35Z |
| alsa-2026:1377 | Moderate: image-builder security update | 2026-01-27T00:00:00Z | 2026-02-12T10:36:07Z |
| alsa-2026:1374 | Moderate: python3.11 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:10:37Z |
| alsa-2026:1359 | Moderate: gcc-toolset-15-binutils security update | 2026-01-27T00:00:00Z | 2026-02-02T11:23:42Z |
| alsa-2026:1350 | Moderate: curl security update | 2026-01-27T00:00:00Z | 2026-01-29T12:31:06Z |
| alsa-2026:1344 | Important: grafana security update | 2026-01-27T00:00:00Z | 2026-01-29T12:12:24Z |
| alsa-2026:1334 | Moderate: glibc security update | 2026-01-27T00:00:00Z | 2026-01-29T12:29:45Z |
| alsa-2026:1254 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-29T12:14:07Z |
| alsa-2026:1241 | Important: resource-agents security update | 2026-01-26T00:00:00Z | 2026-04-14T07:53:22Z |
| alsa-2026:1240 | Important: fence-agents security update | 2026-01-26T00:00:00Z | 2026-04-15T07:17:05Z |
| alsa-2026:1239 | Important: fence-agents security update | 2026-01-26T00:00:00Z | 2026-02-02T11:30:59Z |
| alsa-2026:1226 | Important: python3.12-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:21:23Z |
| alsa-2026:1224 | Important: python3.11-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:28:50Z |
| alsa-2026:1178 | Moderate: kernel security update | 2026-01-26T00:00:00Z | 2026-02-02T11:36:10Z |
| alsa-2026:1148 | Important: kernel-rt security update | 2026-01-26T00:00:00Z | 2026-01-26T13:52:56Z |
| alsa-2026:1143 | Important: kernel security update | 2026-01-26T00:00:00Z | 2026-01-30T09:51:59Z |
| alsa-2026:1142 | Important: kernel security update | 2026-01-26T00:00:00Z | 2026-01-26T13:49:21Z |
| alsa-2026:1089 | Important: python3.11-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:15:08Z |
| alsa-2026:1088 | Important: python3.12-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:17:27Z |
| alsa-2026:1087 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:19:22Z |
| alsa-2026:1086 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-26T13:16:32Z |
| alsa-2026:0933 | Important: java-25-openjdk security update | 2026-01-26T00:00:00Z | 2026-01-28T14:39:55Z |
| alsa-2026:0932 | Important: java-1.8.0-openjdk security update | 2026-01-26T00:00:00Z | 2026-01-29T13:07:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-1029 | Stack-buffer-overflow in gf_hevc_parse_nalu_bs | 2024-08-17T00:13:24.697197Z | 2024-08-17T00:13:24.697938Z |
| osv-2024-1023 | Use-of-uninitialized-value in pcpp::SomeIpLayer::parseSomeIpLayer | 2024-08-16T00:17:01.984623Z | 2025-12-22T14:18:12.391769Z |
| osv-2024-1010 | UNKNOWN READ in H5SL_first | 2024-08-16T00:16:31.692553Z | 2025-08-14T14:39:40.358063Z |
| osv-2024-1009 | Heap-buffer-overflow in pcpp::Layer::shortenLayer | 2024-08-16T00:16:31.167287Z | 2025-10-21T14:37:47.186948Z |
| osv-2024-996 | Use-of-uninitialized-value in cups_array_find | 2024-08-16T00:15:52.987192Z | 2024-08-16T00:15:52.987525Z |
| osv-2024-994 | Use-of-uninitialized-value in packet_parse | 2024-08-16T00:15:48.093497Z | 2024-08-16T00:15:48.093872Z |
| osv-2024-987 | Heap-buffer-overflow in pcpp::NDPNeighborAdvertisementLayer::toString | 2024-08-16T00:15:31.057826Z | 2025-04-16T14:29:47.716122Z |
| osv-2024-985 | Heap-double-free in libssh2_default_free | 2024-08-16T00:15:23.884058Z | 2024-08-16T00:15:23.884369Z |
| osv-2024-983 | UNKNOWN READ in ireclaim | 2024-08-16T00:15:21.362695Z | 2024-08-16T00:15:21.363094Z |
| osv-2024-978 | Stack-buffer-overflow in narrow_conv_backprop | 2024-08-16T00:15:00.390591Z | 2025-01-10T05:19:36.120081Z |
| osv-2024-969 | Security exception in com.github.javaparser.GeneratedJavaParser.Expression | 2024-08-16T00:14:31.527023Z | 2024-08-16T00:14:31.527538Z |
| osv-2024-967 | Heap-buffer-overflow in pcpp::byteArrayToHexString | 2024-08-16T00:14:27.813459Z | 2025-10-22T18:24:09.671012Z |
| osv-2024-965 | Stack-buffer-overflow in FLAC__stream_encoder_init_ogg_file | 2024-08-16T00:14:23.665242Z | 2024-08-16T00:14:23.665768Z |
| osv-2024-964 | Security exception in com.alibaba.fastjson2.JSONPathSegment$CycleNameSegment$MapLoop.accept | 2024-08-16T00:14:15.405443Z | 2024-08-16T00:14:15.405835Z |
| osv-2024-963 | Heap-buffer-overflow in GfxTilingPattern::scanXObjectForBlendMode | 2024-08-16T00:14:14.315705Z | 2024-08-16T00:14:14.316160Z |
| osv-2024-957 | Heap-buffer-overflow in pcpp::computeChecksum | 2024-08-16T00:13:51.457458Z | 2025-10-22T18:24:27.257255Z |
| osv-2024-955 | Use-of-uninitialized-value in pcpp::IPv6Address::toString | 2024-08-16T00:13:46.718533Z | 2024-08-16T00:13:46.718830Z |
| osv-2024-954 | Use-of-uninitialized-value in pcpp::MplsLayer::toString | 2024-08-16T00:13:43.824630Z | 2025-12-22T14:21:33.246456Z |
| osv-2024-953 | UNKNOWN READ in pcpp::PcapNgFileReaderDevice::getNextPacket | 2024-08-16T00:13:41.933683Z | 2025-12-22T14:21:34.886075Z |
| osv-2024-951 | Index-out-of-bounds in hevc_ref_pic_lists_modification | 2024-08-16T00:13:38.322516Z | 2024-08-16T00:13:38.322849Z |
| osv-2024-947 | Heap-buffer-overflow in pcpp::SomeIpSdEntry::SomeIpSdEntry | 2024-08-16T00:13:30.824621Z | 2025-04-03T14:42:12.138019Z |
| osv-2024-939 | Security exception in org.apache.poi.util.LZWDecompresser.decompress | 2024-08-16T00:13:05.088720Z | 2024-08-16T00:13:05.089105Z |
| osv-2024-925 | Index-out-of-bounds in derive_collocated_motion_vectors | 2024-08-16T00:11:02.964872Z | 2024-08-16T00:11:02.965320Z |
| osv-2024-919 | Heap-buffer-overflow in validate_relpath | 2024-08-16T00:09:34.461792Z | 2025-03-06T14:20:56.754046Z |
| osv-2024-914 | UNKNOWN READ in boost::re_detail_500::basic_regex_formatter<std::__1::ostream_iterator<char, cha | 2024-08-16T00:08:20.277708Z | 2026-04-24T14:18:54.995966Z |
| osv-2024-883 | Security exception in com.puppycrawl.tools.checkstyle.JavaAstVisitor.getInnerBopAst | 2024-08-16T00:06:29.139503Z | 2024-08-16T00:06:29.139893Z |
| osv-2024-879 | Security exception in java.base/java.util.Arrays.copyOf | 2024-08-16T00:06:11.887593Z | 2024-08-16T00:06:11.888006Z |
| osv-2024-867 | Use-of-uninitialized-value in std::__1::ostreambuf_iterator<char, std::__1::char_traits<char>> std::__1::__pad | 2024-08-16T00:05:38.614485Z | 2025-03-19T14:29:11.494602Z |
| osv-2024-861 | UNKNOWN READ in chunk_free_object | 2024-08-16T00:05:25.024909Z | 2024-08-16T00:05:25.025249Z |
| osv-2024-859 | Heap-double-free in libssh2_default_free | 2024-08-16T00:05:16.221580Z | 2024-08-16T00:05:16.221993Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0005 | Unsound sending of non-Send types across threads | 2024-01-07T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2024-0002 | `serde` deserialization for `FamStructWrapper` lacks bound checks that could potentially lead to out-of-bounds memory access | 2024-01-02T12:00:00Z | 2024-01-14T03:39:46Z |
| rustsec-2023-0124 | `bit-flags` was removed from crates.io for malicious code | 2023-12-22T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0075 | Unaligned write of u64 on 32-bit and 16-bit platforms | 2023-12-20T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0080 | Buffer overflow due to integer overflow in `transpose` | 2023-12-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0074 | Some Ref methods are unsound with some type parameters | 2023-12-14T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0073 | Infinite decoding loop through specially crafted payload | 2023-12-08T12:00:00Z | 2023-12-09T10:05:32Z |
| rustsec-2023-0079 | KyberSlash: division timings depending on secrets | 2023-12-01T12:00:00Z | 2024-04-12T21:07:31Z |
| rustsec-2023-0072 | `openssl` `X509StoreRef::objects` is unsound | 2023-11-23T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0096 | Plaintext exposed in decrypt_in_place_detached even on tag verification failure | 2023-11-22T12:00:00Z | 2025-12-29T13:49:34Z |
| rustsec-2023-0071 | Marvin Attack: potential key recovery through timing sidechannels | 2023-11-22T12:00:00Z | 2026-04-25T06:40:09Z |
| rustsec-2023-0117 | `tauri-winrt-notifications` was removed from crates.io for malicious code | 2023-11-20T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0108 | `tauri-win-rt-notification` was removed from crates.io for malicious code | 2023-11-20T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0123 | `hann-rs-service` was removed from crates.io for malicious code | 2023-11-18T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0119 | `openvpn-plugin-rs` was removed from crates.io for malicious code | 2023-11-18T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0105 | `windowsservice` was removed from crates.io for malicious code | 2023-11-18T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0122 | `winx-rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0121 | `libusb1-main` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0120 | `windows-service-rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0118 | `win_run_rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0116 | `registry-win` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0115 | `acceptxmr-rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0113 | `win-base64-rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0112 | `monero-rpc-rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0111 | `monero-api` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0109 | `win-crypto` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0107 | `lasso-rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0106 | `lfest-main` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0076 | `cpython` is unmaintained | 2023-11-14T12:00:00Z | 2023-12-20T22:34:55Z |
| rustsec-2023-0088 | `loopdev` crate is unmaintained; use 'loopdev-3` instead. | 2023-11-13T12:00:00Z | 2024-11-10T16:18:40Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-discourse-2026-32615 | Discourse: Category group moderators can perform actions on topics in restricted categories without read access | 2026-04-07T08:43:53.093Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32607 | Discourse: Stored XSS via unescaped assignee name | 2026-04-07T08:43:50.897Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32273 | Discourse: XSS on category description update via API | 2026-04-07T08:43:48.997Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32243 | Discourse: Stored XSS in discourse-ai shared conversations onebox | 2026-04-07T08:43:46.857Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32143 | Discourse: Admin-only report can be exported by moderators | 2026-04-07T08:43:44.810Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32113 | Discourse: Open redirect via `sso_destination_url` cookie in `enter` | 2026-04-07T08:43:40.581Z | 2026-04-07T09:14:25.218Z |
| bit-parse-2026-34784 | Parse Server: Streaming file download bypasses afterFind file trigger authorization | 2026-04-06T14:49:38.726Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34595 | Parse Server: LiveQuery protected-field guard bypass via array-like logical operator value | 2026-04-06T14:49:36.710Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34574 | Parse Server: Session field immutability bypass via falsy-value guard | 2026-04-06T14:49:34.810Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34573 | Parse Server: GraphQL complexity validator exponential fragment traversal DoS | 2026-04-06T14:49:33.069Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34532 | Parse Server: Cloud function validator bypass via prototype chain traversal | 2026-04-06T14:49:31.298Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34373 | Parse Server: GraphQL API endpoint ignores CORS origin restriction | 2026-04-06T14:49:29.676Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34363 | Parse Server: LiveQuery protected field leak via shared mutable state across concurrent subscribers | 2026-04-06T14:49:27.983Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34224 | Parse Server: MFA single-use token bypass via concurrent authData login requests | 2026-04-06T14:49:26.245Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34215 | Parse Server: Auth data exposed via verify password endpoint | 2026-04-06T14:49:24.609Z | 2026-04-06T15:13:09.641Z |
| bit-minio-2026-34204 | MinIO is Vulnerable to SSE Metadata Injection via Replication Headers | 2026-04-06T09:26:13.602Z | 2026-04-06T11:34:08.453Z |
| bit-node-2026-21717 | 2026-04-06T07:58:47.295Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21716 | 2026-04-06T07:58:44.008Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21715 | 2026-04-06T07:58:41.424Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21714 | 2026-04-06T07:58:38.953Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21713 | 2026-04-06T07:58:36.353Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21712 | 2026-04-06T07:58:33.472Z | 2026-04-06T08:26:41.107Z | |
| bit-node-2026-21711 | 2026-04-06T07:58:30.648Z | 2026-04-06T08:26:41.107Z | |
| bit-node-2026-21710 | 2026-04-06T07:58:28.068Z | 2026-04-13T06:11:47.324Z | |
| bit-mongodb-2026-5170 | Users could trigger a crash of mongod primaries during promotion to sharded | 2026-04-06T07:54:20.562Z | 2026-04-06T08:26:41.107Z |
| bit-mongodb-2026-4358 | Memory safety issues in slot-based execution hash table spill | 2026-04-06T07:54:17.803Z | 2026-04-06T08:26:41.107Z |
| bit-grafana-2026-21724 | Missing Protected-field Authorization in Provisioning Contact Points API | 2026-04-06T07:50:18.770Z | 2026-04-17T00:10:47.507Z |
| bit-kyverno-2026-4789 | CVE-2026-4789 | 2026-04-06T07:49:20.364Z | 2026-04-23T18:12:09.750Z |
| bit-dotnet-2026-26131 | .NET Elevation of Privilege Vulnerability | 2026-04-06T07:48:26.731Z | 2026-04-06T08:26:41.107Z |
| bit-dotnet-2026-26127 | .NET Denial of Service Vulnerability | 2026-04-06T07:48:23.759Z | 2026-04-06T08:26:41.107Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-yw12690 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-27T01:01:12.144914Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-qc30410 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-27T01:01:12.325618Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-id51598 | Cancelling a query (e | 2026-02-27T01:01:11.850782Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-dz05206 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-27T01:00:40.158214Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-wp10148 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-27T00:57:40.231450Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-ac12204 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-27T00:54:09.647466Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-aj16639 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-27T00:53:09.299313Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-ff98917 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-27T00:51:38.790691Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-zn32454 | When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers | 2026-02-27T00:50:08.716833Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-er93728 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-27T00:46:38.846728Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-xz04425 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-27T00:43:38.553069Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-ny12442 | node-tar is a full-featured Tar for Node | 2026-02-27T00:41:38.733387Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-vu62737 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-26T00:41:56.473097Z | 2026-02-25T07:34:17Z |
| cleanstart-2026-kk99760 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-26T00:41:27.004859Z | 2026-02-25T07:34:17Z |
| cleanstart-2026-dc63423 | Within HostnameError | 2026-02-26T00:40:26.756005Z | 2026-02-25T07:34:17Z |
| cleanstart-2026-rd09851 | net/url package does not set a limit on the number of query parameters in a query | 2026-02-25T00:53:44.039015Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-cy44461 | Within HostnameError | 2026-02-25T00:53:13.101959Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-uk11127 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-25T00:52:43.391940Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-wk32717 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-25T00:52:13.178542Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-vi85055 | Within HostnameError | 2026-02-25T00:51:12.873948Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-pm90259 | Cancelling a query (e | 2026-02-25T00:50:43.010672Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-vz85637 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-25T00:50:42.986205Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-ig94553 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-25T00:49:42.735675Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-ha44046 | Within HostnameError | 2026-02-25T00:49:42.693487Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-oo47906 | Security fixes for GHSA-VC5P-V9HR-52MJ applied in versions: 4.1.1-r0 | 2026-02-25T00:49:14.177631Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-zs11519 | Security fixes for GHSA-vc5p-v9hr-52mj applied in versions: 4.1.1-r0 | 2026-02-25T00:49:13.663387Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-fm65506 | html | 2026-02-25T00:49:12.988018Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-ds30740 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-25T00:46:12.495329Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-oa82425 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-25T00:44:42.034173Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-uq43569 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-25T00:44:12.116432Z | 2026-02-24T09:23:19Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2011-ALE-008 | Vulnérabilité dans Adobe Reader et Acrobat | 2011-12-07T00:00:00.000000 | 2012-01-10T00:00:00.000000 |
| certa-2011-ale-007 | Vulnérabilité dans ftpd et ProFTPD sur FreeBSD | 2011-12-02T00:00:00.000000 | 2011-12-26T00:00:00.000000 |
| CERTA-2011-ALE-007 | Vulnérabilité dans ftpd et ProFTPD sur FreeBSD | 2011-12-02T00:00:00.000000 | 2011-12-26T00:00:00.000000 |
| certa-2011-ale-006 | Exploitation d'une vulnérabilité dans la gestion des polices TrueType sur Windows | 2011-11-04T00:00:00.000000 | 2011-12-14T00:00:00.000000 |
| CERTA-2011-ALE-006 | Exploitation d'une vulnérabilité dans la gestion des polices TrueType sur Windows | 2011-11-04T00:00:00.000000 | 2011-12-14T00:00:00.000000 |
| certa-2011-ale-005 | Exploitation malveillante d'une fonctionnalité du protocole SSL afin de provoquer un déni de service | 2011-10-27T00:00:00.000000 | 2011-10-27T00:00:00.000000 |
| CERTA-2011-ALE-005 | Exploitation malveillante d'une fonctionnalité du protocole SSL afin de provoquer un déni de service | 2011-10-27T00:00:00.000000 | 2011-10-27T00:00:00.000000 |
| certa-2011-ale-004 | Vulnérabilités dans Apple iOS | 2011-07-05T00:00:00.000000 | 2011-07-18T00:00:00.000000 |
| CERTA-2011-ALE-004 | Vulnérabilités dans Apple iOS | 2011-07-05T00:00:00.000000 | 2011-07-18T00:00:00.000000 |
| certa-2011-ale-003 | Vulnérabilité dans Adobe Flash Player, Adobe Reader et Acrobat | 2011-04-12T00:00:00.000000 | 2011-06-20T00:00:00.000000 |
| CERTA-2011-ALE-003 | Vulnérabilité dans Adobe Flash Player, Adobe Reader et Acrobat | 2011-04-12T00:00:00.000000 | 2011-06-20T00:00:00.000000 |
| certa-2011-ale-002 | Vulnérabilité dans Adobe Flash Player, Adobe Reader et Acrobat | 2011-03-15T00:00:00.000000 | 2011-03-22T00:00:00.000000 |
| CERTA-2011-ALE-002 | Vulnérabilité dans Adobe Flash Player, Adobe Reader et Acrobat | 2011-03-15T00:00:00.000000 | 2011-03-22T00:00:00.000000 |
| certa-2011-ale-001 | Vulnérabilité dans le moteur de rendu graphique de Windows | 2011-01-05T00:00:00.000000 | 2011-02-10T00:00:00.000000 |
| CERTA-2011-ALE-001 | Vulnérabilité dans le moteur de rendu graphique de Windows | 2011-01-05T00:00:00.000000 | 2011-02-10T00:00:00.000000 |
| certa-2010-ale-021 | Vulnérabilité dans Microsoft Internet Explorer | 2010-12-22T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| CERTA-2010-ALE-021 | Vulnérabilité dans Microsoft Internet Explorer | 2010-12-22T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2010-ale-020 | Vulnérabilité dans Adobe Reader et Acrobat | 2010-11-05T00:00:00.000000 | 2010-11-17T00:00:00.000000 |
| CERTA-2010-ALE-020 | Vulnérabilité dans Adobe Reader et Acrobat | 2010-11-05T00:00:00.000000 | 2010-11-17T00:00:00.000000 |
| certa-2010-ale-019 | Vulnérabilité dans Microsoft Internet Explorer | 2010-11-03T00:00:00.000000 | 2010-12-17T00:00:00.000000 |
| CERTA-2010-ALE-019 | Vulnérabilité dans Microsoft Internet Explorer | 2010-11-03T00:00:00.000000 | 2010-12-17T00:00:00.000000 |
| certa-2010-ale-018 | Vulnérabilité dans Adobe Flash Player, Adobe Reader et Acrobat | 2010-10-28T00:00:00.000000 | 2010-11-18T00:00:00.000000 |
| CERTA-2010-ALE-018 | Vulnérabilité dans Adobe Flash Player, Adobe Reader et Acrobat | 2010-10-28T00:00:00.000000 | 2010-11-18T00:00:00.000000 |
| certa-2010-ale-017 | Vulnérabilité dans Mozilla Firefox | 2010-10-27T00:00:00.000000 | 2010-10-28T00:00:00.000000 |
| CERTA-2010-ALE-017 | Vulnérabilité dans Mozilla Firefox | 2010-10-27T00:00:00.000000 | 2010-10-28T00:00:00.000000 |
| certa-2010-ale-016 | Vulnérabilité Adobe Shockwave Player | 2010-10-22T00:00:00.000000 | 2010-10-29T00:00:00.000000 |
| CERTA-2010-ALE-016 | Vulnérabilité Adobe Shockwave Player | 2010-10-22T00:00:00.000000 | 2010-10-29T00:00:00.000000 |
| certa-2010-ale-015 | Vulnérabilité dans Adobe Flash Player | 2010-09-14T00:00:00.000000 | 2010-09-21T00:00:00.000000 |
| CERTA-2010-ALE-015 | Vulnérabilité dans Adobe Flash Player | 2010-09-14T00:00:00.000000 | 2010-09-21T00:00:00.000000 |
| certa-2010-ale-014 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2010-09-09T00:00:00.000000 | 2010-10-06T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0142 | Multiples vulnérabilités dans MongoDB | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0153 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0152 | Multiples vulnérabilités dans Microsoft Azure | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0151 | Vulnérabilité dans Microsoft .Net | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0150 | Multiples vulnérabilités dans Microsoft Windows | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0149 | Multiples vulnérabilités dans Microsoft Office | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0148 | Multiples vulnérabilités dans les produits Intel | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0147 | Multiples vulnérabilités dans les produits Fortinet | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0146 | Multiples vulnérabilités dans GitLab | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0145 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0144 | Multiples vulnérabilités dans Ivanti Endpoint Manager | 2026-02-11T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0143 | Multiples vulnérabilités dans Synology Storage Manager | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0142 | Multiples vulnérabilités dans MongoDB | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0141 | Multiples vulnérabilités dans les produits SAP | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0140 | Multiples vulnérabilités dans les produits Axis | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0139 | Multiples vulnérabilités dans les produits Siemens | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0138 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0137 | Multiples vulnérabilités dans GnuTLS | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| CERTFR-2026-AVI-0141 | Multiples vulnérabilités dans les produits SAP | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| CERTFR-2026-AVI-0140 | Multiples vulnérabilités dans les produits Axis | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| CERTFR-2026-AVI-0139 | Multiples vulnérabilités dans les produits Siemens | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| CERTFR-2026-AVI-0138 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| CERTFR-2026-AVI-0137 | Multiples vulnérabilités dans GnuTLS | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0136 | Vulnérabilité dans Fortinet FortiClientEMS | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0135 | Vulnérabilité dans GitLab AI Gateway | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0134 | Vulnérabilité dans Microsoft Edge | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0133 | Multiples vulnérabilités dans Roundcube | 2026-02-09T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0132 | Multiples vulnérabilités dans VMware Tanzu Greenplum | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| CERTFR-2026-AVI-0136 | Vulnérabilité dans Fortinet FortiClientEMS | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| CERTFR-2026-AVI-0135 | Vulnérabilité dans GitLab AI Gateway | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-000043 | Multiple vulnerabilities in MosP kintai kanri | 2024-05-09T14:10+09:00 | 2024-05-09T14:10+09:00 |
| jvndb-2024-000044 | WordPress Plugin "Heateor Social Login WordPress" vulnerable to cross-site scripting | 2024-05-08T13:43+09:00 | 2024-05-08T13:43+09:00 |
| jvndb-2024-003178 | Trend Micro Maximum Security vulnerable to improper link resolution (CVE-2024-32849) | 2024-05-08T10:19+09:00 | 2024-05-08T10:19+09:00 |
| jvndb-2024-003119 | NETGEAR routers vulnerable to buffer overflow | 2024-04-25T11:21+09:00 | 2024-04-25T11:21+09:00 |
| jvndb-2024-000042 | Multiple vulnerabilities in RoamWiFi R10 | 2024-04-24T13:44+09:00 | 2024-04-24T13:44+09:00 |
| jvndb-2024-003116 | Multiple vulnerabilities in OMRON Sysmac Studio/CX-One and CX-Programmer | 2024-04-24T10:13+09:00 | 2024-04-24T10:13+09:00 |
| jvndb-2024-000901 | TvRock vulnerable to cross-site request forgery | 2024-04-23T18:22+09:00 | 2024-04-23T18:22+09:00 |
| jvndb-2024-000903 | TvRock vulnerable to denial-of-service (DoS) | 2024-04-23T18:21+09:00 | 2024-04-23T18:21+09:00 |
| jvndb-2024-003108 | Armeria-saml improperly handles SAML messages | 2024-04-22T17:28+09:00 | 2024-04-22T17:28+09:00 |
| jvndb-2023-014491 | LINE client for iOS vulnerable to improper server certificate verification | 2024-04-22T15:27+09:00 | 2024-04-22T15:27+09:00 |
| jvndb-2024-000041 | Multiple vulnerabilities in WordPress Plugin "Forminator" | 2024-04-18T13:53+09:00 | 2024-04-18T13:53+09:00 |
| jvndb-2022-017175 | Proscend Communications M330-W and M330-W5 vulnerable to OS command injection | 2024-04-16T14:30+09:00 | 2024-04-16T14:30+09:00 |
| jvndb-2024-000040 | Multiple vulnerabilities in BUFFALO wireless LAN routers | 2024-04-15T16:29+09:00 | 2024-04-15T16:29+09:00 |
| jvndb-2024-000039 | Multiple vulnerabilities in a-blog cms | 2024-04-10T13:55+09:00 | 2024-04-10T13:55+09:00 |
| jvndb-2024-000038 | Multiple vulnerabilities in WordPress Plugin "Ninja Forms" | 2024-04-08T13:44+09:00 | 2024-04-08T13:44+09:00 |
| jvndb-2024-003068 | Multiple vulnerabilities in Cente middleware | 2024-04-05T15:36+09:00 | 2024-09-24T15:00+09:00 |
| jvndb-2024-000037 | Multiple vulnerabilities in NEC Aterm series | 2024-04-05T14:53+09:00 | 2024-04-05T14:53+09:00 |
| jvndb-2024-003067 | Multiple vulnerabilities in PLANEX COMMUNICATIONS wireless LAN routers | 2024-04-05T14:17+09:00 | 2024-04-05T14:17+09:00 |
| jvndb-2024-003051 | FURUNO SYSTEMS Managed Switch ACERA 9010 running in non MS mode with the initial configuration has no password | 2024-04-02T18:03+09:00 | 2024-04-02T18:03+09:00 |
| jvndb-2024-003050 | KEYENCE VT STUDIO may insecurely load Dynamic Link Libraries | 2024-04-01T14:44+09:00 | 2024-04-01T14:44+09:00 |
| jvndb-2024-003049 | Multiple vulnerabilities in KEYENCE KV STUDIO, KV REPLAY VIEWER, and VT5-WX15/WX12 | 2024-04-01T12:31+09:00 | 2024-09-25T13:51+09:00 |
| jvndb-2024-000036 | "Yahoo! JAPAN" App vulnerable to cross-site scripting | 2024-03-29T13:28+09:00 | 2024-03-29T13:28+09:00 |
| jvndb-2024-003047 | SEEnergy SVR-116 vulnerable to OS command injection | 2024-03-28T11:38+09:00 | 2024-03-28T11:38+09:00 |
| jvndb-2024-003026 | Security information for Hitachi Disk Array Systems | 2024-03-27T15:52+09:00 | 2024-03-27T15:52+09:00 |
| jvndb-2024-000035 | Multiple vulnerabilities in WordPress Plugin "Survey Maker" | 2024-03-27T14:48+09:00 | 2024-03-27T14:48+09:00 |
| jvndb-2024-000034 | SonicDICOM Media Viewer may insecurely load Dynamic Link Libraries | 2024-03-27T14:31+09:00 | 2024-03-27T14:31+09:00 |
| jvndb-2024-003025 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2024-03-27T14:26+09:00 | 2024-11-27T14:34+09:00 |
| jvndb-2024-000905 | Mini Thread vulnerable to cross-site scripting | 2024-03-26T17:43+09:00 | 2024-03-26T17:43+09:00 |
| jvndb-2024-000906 | ffBull vulnerable to OS command injection | 2024-03-26T16:07+09:00 | 2024-03-26T16:07+09:00 |
| jvndb-2024-000900 | "EasyRange" may insecurely load executable files | 2024-03-26T15:50+09:00 | 2024-03-26T15:50+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-15845 | Canva Affinity越界读取漏洞(CNVD-2026-15845) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15844 | Canva Affinity越界读取漏洞 | 2026-03-26 | 2026-04-01 |
| cnvd-2026-15407 | Google Chrome存在未明漏洞(CNVD-2026-15407) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15406 | Google Chrome堆缓冲区溢出漏洞(CNVD-2026-15406) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15405 | Google Chrome整数溢出漏洞(CNVD-2026-15405) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15404 | Google Chrome内存错误引用漏洞(CNVD-2026-15404) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15403 | Google Chrome堆缓冲区溢出漏洞(CNVD-2026-15403) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15402 | Google Chrome越界读取漏洞(CNVD-2026-15402) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15401 | Google Chrome越界读取漏洞(CNVD-2026-15401) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15400 | Google Chrome FedCM内存错误引用漏洞 | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15395 | Google Chrome资源管理错误漏洞(CNVD-2026-15395) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15152 | OpenClaw拒绝服务漏洞(CNVD-2026-15152) | 2026-03-26 | 2026-03-27 |
| cnvd-2026-15058 | OpenClaw命令注入漏洞(CNVD-2026-15058) | 2026-03-26 | 2026-03-26 |
| cnvd-2026-15057 | OpenClaw加密问题漏洞(CNVD-2026-15057) | 2026-03-26 | 2026-03-26 |
| cnvd-2026-16159 | Microsoft Office代码执行漏洞(CNVD-2026-16159) | 2026-03-25 | 2026-04-07 |
| cnvd-2026-16150 | Google Chrome信息泄露漏洞(CNVD-2026-16150) | 2026-03-25 | 2026-04-07 |
| cnvd-2026-16149 | Google Chrome安全绕过漏洞(CNVD-2026-16149) | 2026-03-25 | 2026-04-07 |
| cnvd-2026-16148 | Google Chrome安全绕过漏洞(CNVD-2026-16148) | 2026-03-25 | 2026-04-07 |
| cnvd-2026-15411 | Google Chrome安全绕过漏洞(CNVD-2026-15411) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15410 | Google Chrome安全绕过漏洞(CNVD-2026-15410) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15409 | Google Chrome安全绕过漏洞(CNVD-2026-15409) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15408 | Google Chrome安全绕过漏洞(CNVD-2026-15408) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15399 | Google Chrome安全绕过漏洞(CNVD-2026-15399) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15398 | Google Chrome安全绕过漏洞(CNVD-2026-15398) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15397 | Google Chrome安全绕过漏洞(CNVD-2026-15397) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15396 | Google Chrome安全绕过漏洞(CNVD-2026-15396) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-17483 | Discourse存在未明漏洞(CNVD-2026-17483) | 2026-03-24 | 2026-04-16 |
| cnvd-2026-17482 | Discourse存在未明漏洞(CNVD-2026-17482) | 2026-03-24 | 2026-04-16 |
| cnvd-2026-17481 | Discourse存在未明漏洞(CNVD-2026-17481) | 2026-03-24 | 2026-04-16 |
| cnvd-2026-17480 | Discourse存在未明漏洞(CNVD-2026-17480) | 2026-03-24 | 2026-04-16 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01273 | Уязвимость функции smb2_reconnect_server() модуля fs/smb/client/smb2pdu.c поддержки клие… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01272 | Уязвимость функции amd_iommu_report_page_fault() модуля drivers/iommu/amd/iommu.c драйвер… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01271 | Уязвимость функции parse_features() модуля drivers/md/dm-flakey.c драйвера нескольких уст… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01270 | Уязвимость функции mt7921_usb_sdio_tx_prepare_skb() модуля drivers/net/wireless/mediatek/… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01269 | Уязвимость функции txBegin() модуля fs/jfs/jfs_txnmgr.c файловой системы JFS ядра операци… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01268 | Уязвимость функции btracker_destroy() модуля drivers/md/dm-cache-background-tracker.c дра… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01267 | Уязвимость функции usbtmc_ioctl_request() модуля drivers/usb/class/usbtmc.c драйвера устр… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01266 | Уязвимость функции brcmf_set_pmk() модуля drivers/net/wireless/broadcom/brcm80211/brcmfma… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01265 | Уязвимость функции nfs_set_pgio_error() модуля fs/nfs/pagelist.c поддержки клиентов NFS я… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01264 | Уязвимость функции alloc_event_waiters() модуля drivers/gpu/drm/amd/amdkfd/kfd_events.c д… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01263 | Уязвимость функции vmbus_bus_init() модуля drivers/hv/vmbus_drv.c драйвера поддержки гост… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01262 | Уязвимость функции longhaul_exit() модуля drivers/cpufreq/longhaul.c драйвера масштабиров… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01261 | Уязвимость функции dcn401_init_hw() модуля drivers/gpu/drm/amd/display/dc/hwss/dcn401/dcn… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01260 | Уязвимость функции hci_conn_complete_evt() модуля net/bluetooth/hci_event.c ядра операцио… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01259 | Уязвимость функции binder_inc_ref_for_node() модуля drivers/android/binder.c драйвера свя… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01258 | Уязвимость функции pm8001_chip_fw_flash_update_req() модуля drivers/scsi/pm8001/pm8001_hw… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01257 | Уязвимость функции interrupt_preinit_v3_hw() модуля drivers/scsi/hisi_sas/hisi_sas_v3_hw.… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01256 | Уязвимость функции ill_acc_of_setup() модуля arch/mips/ralink/ill_acc.c поддержки архитек… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01255 | Уязвимость функции gc_worker_can_early_drop() модуля net/netfilter/nf_conntrack_core.c ко… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01254 | Уязвимость функции _nfs42_proc_copy_notify() модуля fs/nfs/nfs42proc.c поддержки клиентов… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01253 | Уязвимость функций init() и fini() модуля drivers/char/virtio_console.c драйвера поддержк… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01252 | Уязвимость функции ext4_bmap() модуля fs/ext4/inode.c файловой системы Ext4 ядра операцио… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01251 | Уязвимость функции exfat_find() модуля fs/exfat/namei.c файловой системы exFAT ядра опера… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01250 | Уязвимость функции virtio_net_hdr_to_skb() модуля include/linux/virtio_net.h ядра операци… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01249 | Уязвимость функции asm () модуля kernel/kheaders.c ядра операционной системы Linux, позво… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01248 | Уязвимость функции ffa_device_remove() модуля drivers/firmware/arm_ffa/bus.c драйвера про… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01247 | Уязвимость функции batch_clear_carry() модуля drivers/iommu/iommufd/pages.c драйвера IOMM… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01246 | Уязвимость функции ext4_xattr_move_to_block() модуля fs/ext4/xattr.c файловой системы Ext… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01245 | Уязвимость функции ssif_info_find() модуля drivers/char/ipmi/ipmi_ssif.c драйвера алфавит… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01244 | Уязвимость функции gl861_i2c_master_xfer() модуля drivers/media/usb/dvb-usb-v2/gl861.c д… | 05.02.2026 | 05.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200704-0220 | Buffer overflow in natd in network_cmds in Apple Mac OS X 10.3.9 through 10.4.9, when Int… | 2024-07-23T21:33:23.970000Z |
| var-200810-0141 | Heap-based buffer overflow in the local IPC component in the EAPOLController plugin for c… | 2024-07-23T21:33:22.791000Z |
| var-201203-0199 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2024-07-23T21:32:49.621000Z |
| var-201210-0179 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:32:41.649000Z |
| var-200603-0274 | FileVault in Mac OS X 10.4.5 and earlier does not properly mount user directories when cr… | 2024-07-23T21:32:41.957000Z |
| var-202105-1428 | An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi… | 2024-07-23T21:32:40.302000Z |
| var-202004-0530 | In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean e… | 2024-07-23T21:32:40.951000Z |
| var-201507-0303 | Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.23 and earlie… | 2024-07-23T21:32:40.217000Z |
| var-201208-0141 | Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in … | 2024-07-23T21:32:40.141000Z |
| var-200904-0813 | The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.1… | 2024-07-23T21:32:40.678000Z |
| var-201203-0181 | Google Chrome before 18.0.1025.142 does not properly handle text fragments, which allows … | 2024-07-23T21:32:39.897000Z |
| var-202102-1092 | An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_a… | 2024-07-23T21:32:38.477000Z |
| var-201605-0491 | The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, … | 2024-07-23T21:31:34.358000Z |
| var-201207-0279 | ISC BIND 9.4.x, 9.5.x, 9.6.x, and 9.7.x before 9.7.6-P2; 9.8.x before 9.8.3-P2; 9.9.x bef… | 2024-07-23T21:31:34.437000Z |
| var-201006-1149 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 throug… | 2024-07-23T21:31:33.583000Z |
| var-201711-0474 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T21:31:29.650000Z |
| var-201408-0081 | The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows m… | 2024-07-23T21:31:18.574000Z |
| var-200106-0149 | Buffer overflow in IPSwitch IMail SMTP server 6.06 and possibly prior versions allows rem… | 2024-07-23T21:31:18.052000Z |
| var-202101-0218 | A flaw was found in dnsmasq before 2.83. A buffer overflow vulnerability was discovered i… | 2024-07-23T21:31:17.324000Z |
| var-200609-1341 | The VPN service in Apple Mac OS X 10.3.x through 10.3.9 and 10.4.x through 10.4.8 does no… | 2024-07-23T21:31:15.642000Z |
| var-202109-1900 | An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be explo… | 2024-07-23T21:31:14.809000Z |
| var-201906-1176 | Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragme… | 2024-07-23T21:31:12.688000Z |
| var-201304-0062 | Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, T… | 2024-07-23T21:31:12.868000Z |
| var-201111-0207 | The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64… | 2024-07-23T21:30:39.002000Z |
| var-200107-0175 | GoAhead webserver 2.1 allows remote attackers to cause a denial of service via an HTTP re… | 2024-07-23T21:30:38.108000Z |
| var-200703-0027 | Unspecified vulnerability in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 creates files … | 2024-07-23T21:30:34.312000Z |
| var-201912-0624 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:30:33.534000Z |
| var-200609-1325 | Unspecified vulnerability in CFNetwork in Mac OS 10.4.8 and earlier allows user-assisted … | 2024-07-23T21:30:33.425000Z |
| var-201806-1444 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2024-07-23T21:30:32.366000Z |
| var-201408-0089 | Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.… | 2024-07-23T21:30:26.317000Z |