Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43083 |
N/A
|
net: ioam6: fix OOB and missing lock |
Linux |
Linux |
2026-05-06T07:40:18.504Z | 2026-05-06T07:40:18.504Z |
| CVE-2026-43082 |
N/A
|
net: txgbe: leave space for null terminators on proper… |
Linux |
Linux |
2026-05-06T07:40:17.842Z | 2026-05-06T07:40:17.842Z |
| CVE-2026-43081 |
N/A
|
net: ipa: fix GENERIC_CMD register field masks for IPA v5.0+ |
Linux |
Linux |
2026-05-06T07:40:17.159Z | 2026-05-06T07:40:17.159Z |
| CVE-2026-43080 |
N/A
|
l2tp: Drop large packets with UDP encap |
Linux |
Linux |
2026-05-06T07:40:16.491Z | 2026-05-06T07:40:16.491Z |
| CVE-2026-43079 |
N/A
|
perf/x86/intel/uncore: Skip discovery table for offline dies |
Linux |
Linux |
2026-05-06T07:40:15.767Z | 2026-05-06T07:40:15.767Z |
| CVE-2026-43078 |
N/A
|
crypto: af_alg - Fix page reassignment overflow in af_… |
Linux |
Linux |
2026-05-06T07:40:15.092Z | 2026-05-06T07:40:15.092Z |
| CVE-2026-43077 |
N/A
|
crypto: algif_aead - Fix minimum RX size check for dec… |
Linux |
Linux |
2026-05-06T07:40:14.409Z | 2026-05-06T07:40:14.409Z |
| CVE-2026-43076 |
N/A
|
ocfs2: validate inline data i_size during inode read |
Linux |
Linux |
2026-05-06T07:40:13.634Z | 2026-05-06T07:40:13.634Z |
| CVE-2026-43075 |
N/A
|
ocfs2: fix out-of-bounds write in ocfs2_write_end_inline |
Linux |
Linux |
2026-05-06T07:40:03.337Z | 2026-05-06T07:40:03.337Z |
| CVE-2026-43074 |
N/A
|
eventpoll: defer struct eventpoll free to RCU grace period |
Linux |
Linux |
2026-05-06T07:21:58.210Z | 2026-05-06T07:21:58.210Z |
| CVE-2026-35254 |
6.1 (3.1)
|
Vulnerability in the Oracle OCI CLI product of Or… |
Oracle Corporation |
Oracle OCI CLI of Oracle Open Source Projects |
2026-05-06T07:08:36.667Z | 2026-05-06T13:02:17.951Z |
| CVE-2026-23928 |
7.3 (4.0)
|
Stored XSS vulnerability in the Item history/Plain tex… |
Zabbix |
Zabbix |
2026-05-06T07:00:33.681Z | 2026-05-06T12:59:52.397Z |
| CVE-2026-23927 |
5.1 (4.0)
|
Agent 2 Oracle plugin TNS connection string injection … |
Zabbix |
Zabbix |
2026-05-06T06:59:42.854Z | 2026-05-06T13:00:17.802Z |
| CVE-2026-23926 |
7.3 (4.0)
|
Stored XSS vulnerability in Host navigator widget main… |
Zabbix |
Zabbix |
2026-05-06T06:58:51.362Z | 2026-05-06T12:59:26.878Z |
| CVE-2026-7841 |
8.8 (3.1)
|
GV-ASWeb Remote Code Execution (RCE) vulnerability |
GeoVision Inc. |
ASManager |
2026-05-06T06:47:53.765Z | 2026-05-06T12:54:50.289Z |
| CVE-2026-7448 |
7.2 (3.1)
|
LatePoint <= 5.5.0 - Unauthenticated Stored Cross-Site… |
latepoint |
LatePoint – Calendar Booking Plugin for Appointments and Events |
2026-05-06T06:47:21.950Z | 2026-05-06T12:20:33.617Z |
| CVE-2026-7332 |
7.2 (3.1)
|
LatePoint <= 5.5.0 - Unauthenticated Stored Cross-Site… |
latepoint |
LatePoint – Calendar Booking Plugin for Appointments and Events |
2026-05-06T06:47:21.566Z | 2026-05-06T18:54:33.336Z |
| CVE-2026-7457 |
6.4 (3.1)
|
LatePoint <= 5.5.0 - Authenticated (Subscriber+) Store… |
latepoint |
LatePoint – Calendar Booking Plugin for Appointments and Events |
2026-05-06T06:47:21.090Z | 2026-05-06T12:58:22.624Z |
| CVE-2026-6672 |
6.4 (3.1)
|
Affiliate Program Suite <= 1.2.7 - Authenticated (Cont… |
iovamihai |
Affiliate Program Suite — SliceWP Affiliates |
2026-05-06T06:47:20.670Z | 2026-05-06T15:24:27.768Z |
| CVE-2026-6344 |
4.9 (3.1)
|
Fluent Forms <= 6.2.1 - Authenticated (Administrator+)… |
techjewel |
Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder |
2026-05-06T06:47:20.113Z | 2026-05-06T14:25:29.004Z |
| CVE-2026-35253 |
4.7 (3.1)
|
Vulnerability in the Oracle Macoron Tool product … |
Oracle Corporation |
Oracle Macaron Tool of Oracle Open Source Projects |
2026-05-06T06:22:28.369Z | 2026-05-06T18:49:10.118Z |
| CVE-2026-2306 |
4.3 (3.1)
|
Ninja Tables <= 5.2.6 - Missing Authorization to Authe… |
techjewel |
Ninja Tables – Easy Data Table Builder |
2026-05-06T04:26:48.825Z | 2026-05-06T14:33:46.147Z |
| CVE-2026-5753 |
6.5 (3.1)
|
All-in-One WP Migration Unlimited Extension <= 2.83 - … |
servmask |
All-in-One WP Migration Unlimited Extension |
2026-05-06T03:27:21.807Z | 2026-05-06T12:57:42.449Z |
| CVE-2026-3208 |
5.3 (3.1)
|
Mercado Pago payments for WooCommerce <= 8.7.11 - Miss… |
mercadopago |
Mercado Pago payments for WooCommerce |
2026-05-06T03:27:21.276Z | 2026-05-06T12:20:58.112Z |
| CVE-2026-7572 |
4.4 (3.1)
|
Velociraptor EVTX Parser — Process Crash via Crafted .… |
Velocidex |
velociraptor |
2026-05-06T02:38:59.573Z | 2026-05-06T16:42:17.097Z |
| CVE-2026-7573 |
5 (3.1)
|
GetUserRoles API endpoint allows any authenticated use… |
Velocidex |
velociraptor |
2026-05-06T02:15:34.491Z | 2026-05-06T16:17:18.756Z |
| CVE-2025-71256 |
7.5 (3.1)
|
In nr modem, there is a possible improper input v… |
Unisoc (Shanghai) Technologies Co., Ltd. |
T8100/T9100/T8200/T8300 |
2026-05-06T01:43:17.932Z | 2026-05-06T12:56:05.504Z |
| CVE-2025-71255 |
7.5 (3.1)
|
In Modem IMS, there is a possible improper input … |
Unisoc (Shanghai) Technologies Co., Ltd. |
SC7731E/SC9832E/SC9863A/T310/T610/T618/T7200/T7225/T7250/T7255/T7280/T7300/T8100/T9100/T8200/T8300 |
2026-05-06T01:43:15.186Z | 2026-05-06T12:55:25.546Z |
| CVE-2025-71254 |
7.5 (3.1)
|
In Modem IMS, there is a possible improper input … |
Unisoc (Shanghai) Technologies Co., Ltd. |
SC7731E/SC9832E/SC9863A/T310/T610/T618/T7200/T7225/T7250/T7255/T7280/T7300/T8100/T9100/T8200/T8300 |
2026-05-06T01:43:13.544Z | 2026-05-06T12:50:34.970Z |
| CVE-2025-71253 |
7.5 (3.1)
|
In Modem IMS, there is a possible improper input … |
Unisoc (Shanghai) Technologies Co., Ltd. |
SC7731E/SC9832E/SC9863A/T310/T610/T618/T7200/T7225/T7250/T7255/T7280/T7300/T8100/T9100/T8200/T8300 |
2026-05-06T01:43:08.618Z | 2026-05-06T15:24:34.885Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43082 |
N/A
|
net: txgbe: leave space for null terminators on proper… |
Linux |
Linux |
2026-05-06T07:40:17.842Z | 2026-05-06T07:40:17.842Z |
| CVE-2026-43081 |
N/A
|
net: ipa: fix GENERIC_CMD register field masks for IPA v5.0+ |
Linux |
Linux |
2026-05-06T07:40:17.159Z | 2026-05-06T07:40:17.159Z |
| CVE-2026-43080 |
N/A
|
l2tp: Drop large packets with UDP encap |
Linux |
Linux |
2026-05-06T07:40:16.491Z | 2026-05-06T07:40:16.491Z |
| CVE-2026-43079 |
N/A
|
perf/x86/intel/uncore: Skip discovery table for offline dies |
Linux |
Linux |
2026-05-06T07:40:15.767Z | 2026-05-06T07:40:15.767Z |
| CVE-2026-43078 |
N/A
|
crypto: af_alg - Fix page reassignment overflow in af_… |
Linux |
Linux |
2026-05-06T07:40:15.092Z | 2026-05-06T07:40:15.092Z |
| CVE-2026-43077 |
N/A
|
crypto: algif_aead - Fix minimum RX size check for dec… |
Linux |
Linux |
2026-05-06T07:40:14.409Z | 2026-05-06T07:40:14.409Z |
| CVE-2026-43076 |
N/A
|
ocfs2: validate inline data i_size during inode read |
Linux |
Linux |
2026-05-06T07:40:13.634Z | 2026-05-06T07:40:13.634Z |
| CVE-2026-43075 |
N/A
|
ocfs2: fix out-of-bounds write in ocfs2_write_end_inline |
Linux |
Linux |
2026-05-06T07:40:03.337Z | 2026-05-06T07:40:03.337Z |
| CVE-2026-43074 |
N/A
|
eventpoll: defer struct eventpoll free to RCU grace period |
Linux |
Linux |
2026-05-06T07:21:58.210Z | 2026-05-06T07:21:58.210Z |
| CVE-2026-42509 |
N/A
|
Apache Wicket: crafted strings can break out of the Ja… |
Apache Software Foundation |
Apache Wicket |
2026-05-06T08:34:00.746Z | 2026-05-06T09:51:12.253Z |
| CVE-2026-40010 |
N/A
|
Apache Wicket: possible session fixation using Authent… |
Apache Software Foundation |
Apache Wicket |
2026-05-06T08:34:30.480Z | 2026-05-06T09:51:10.306Z |
| CVE-2026-40001 |
5.2 (3.1)
|
Local privilege escalation vulnerability in ZTE PROCES… |
ZTE |
ZTE PROCESS Guard service |
2026-05-06T08:48:10.466Z | 2026-05-06T15:29:02.257Z |
| CVE-2026-35255 |
6.6 (3.1)
|
Vulnerability in the Oracle Cloud Native Environm… |
Oracle Corporation |
Oracle Cloud Native Environment Command Line Interface |
2026-05-06T08:05:59.070Z | 2026-05-06T13:01:24.072Z |
| CVE-2026-1719 |
7.5 (3.1)
|
Gravity Bookings <= 2.5.9 - Unauthenticated SQL Inject… |
GravityMore |
Gravity Bookings |
2026-05-06T09:27:48.508Z | 2026-05-06T14:34:37.725Z |
| CVE-2026-7841 |
8.8 (3.1)
|
GV-ASWeb Remote Code Execution (RCE) vulnerability |
GeoVision Inc. |
ASManager |
2026-05-06T06:47:53.765Z | 2026-05-06T12:54:50.289Z |
| CVE-2026-7457 |
6.4 (3.1)
|
LatePoint <= 5.5.0 - Authenticated (Subscriber+) Store… |
latepoint |
LatePoint – Calendar Booking Plugin for Appointments and Events |
2026-05-06T06:47:21.090Z | 2026-05-06T12:58:22.624Z |
| CVE-2026-7448 |
7.2 (3.1)
|
LatePoint <= 5.5.0 - Unauthenticated Stored Cross-Site… |
latepoint |
LatePoint – Calendar Booking Plugin for Appointments and Events |
2026-05-06T06:47:21.950Z | 2026-05-06T12:20:33.617Z |
| CVE-2026-7332 |
7.2 (3.1)
|
LatePoint <= 5.5.0 - Unauthenticated Stored Cross-Site… |
latepoint |
LatePoint – Calendar Booking Plugin for Appointments and Events |
2026-05-06T06:47:21.566Z | 2026-05-06T18:54:33.336Z |
| CVE-2026-6672 |
6.4 (3.1)
|
Affiliate Program Suite <= 1.2.7 - Authenticated (Cont… |
iovamihai |
Affiliate Program Suite — SliceWP Affiliates |
2026-05-06T06:47:20.670Z | 2026-05-06T15:24:27.768Z |
| CVE-2026-6344 |
4.9 (3.1)
|
Fluent Forms <= 6.2.1 - Authenticated (Administrator+)… |
techjewel |
Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder |
2026-05-06T06:47:20.113Z | 2026-05-06T14:25:29.004Z |
| CVE-2026-35254 |
6.1 (3.1)
|
Vulnerability in the Oracle OCI CLI product of Or… |
Oracle Corporation |
Oracle OCI CLI of Oracle Open Source Projects |
2026-05-06T07:08:36.667Z | 2026-05-06T13:02:17.951Z |
| CVE-2026-35253 |
4.7 (3.1)
|
Vulnerability in the Oracle Macoron Tool product … |
Oracle Corporation |
Oracle Macaron Tool of Oracle Open Source Projects |
2026-05-06T06:22:28.369Z | 2026-05-06T18:49:10.118Z |
| CVE-2026-23928 |
7.3 (4.0)
|
Stored XSS vulnerability in the Item history/Plain tex… |
Zabbix |
Zabbix |
2026-05-06T07:00:33.681Z | 2026-05-06T12:59:52.397Z |
| CVE-2026-23927 |
5.1 (4.0)
|
Agent 2 Oracle plugin TNS connection string injection … |
Zabbix |
Zabbix |
2026-05-06T06:59:42.854Z | 2026-05-06T13:00:17.802Z |
| CVE-2026-23926 |
7.3 (4.0)
|
Stored XSS vulnerability in Host navigator widget main… |
Zabbix |
Zabbix |
2026-05-06T06:58:51.362Z | 2026-05-06T12:59:26.878Z |
| CVE-2026-2306 |
4.3 (3.1)
|
Ninja Tables <= 5.2.6 - Missing Authorization to Authe… |
techjewel |
Ninja Tables – Easy Data Table Builder |
2026-05-06T04:26:48.825Z | 2026-05-06T14:33:46.147Z |
| CVE-2026-5753 |
6.5 (3.1)
|
All-in-One WP Migration Unlimited Extension <= 2.83 - … |
servmask |
All-in-One WP Migration Unlimited Extension |
2026-05-06T03:27:21.807Z | 2026-05-06T12:57:42.449Z |
| CVE-2026-3208 |
5.3 (3.1)
|
Mercado Pago payments for WooCommerce <= 8.7.11 - Miss… |
mercadopago |
Mercado Pago payments for WooCommerce |
2026-05-06T03:27:21.276Z | 2026-05-06T12:20:58.112Z |
| CVE-2026-7573 |
5 (3.1)
|
GetUserRoles API endpoint allows any authenticated use… |
Velocidex |
velociraptor |
2026-05-06T02:15:34.491Z | 2026-05-06T16:17:18.756Z |
| CVE-2026-7572 |
4.4 (3.1)
|
Velociraptor EVTX Parser — Process Crash via Crafted .… |
Velocidex |
velociraptor |
2026-05-06T02:38:59.573Z | 2026-05-06T16:42:17.097Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2019-25322 | Heatmiser Netmonitor 3.03 contains a hardcoded credentials vulnerability in the networkSetup.htm pa… | 2026-02-12T23:16:03.897 | 2026-04-15T00:35:42.020 |
| fkie_cve-2019-25321 | FTP Navigator 8.03 contains a stack overflow vulnerability that allows attackers to execute arbitra… | 2026-02-12T23:16:03.720 | 2026-03-03T14:48:45.597 |
| fkie_cve-2019-25320 | E Learning Script 1.0 contains an authentication bypass vulnerability that allows attackers to acce… | 2026-02-12T23:16:03.547 | 2026-04-15T00:35:42.020 |
| fkie_cve-2019-25319 | Domain Quester Pro 6.02 contains a stack overflow vulnerability that allows remote attackers to exe… | 2026-02-12T23:16:03.377 | 2026-04-15T00:35:42.020 |
| fkie_cve-2019-25318 | AVS Audio Converter 9.1.2.600 contains a stack overflow vulnerability that allows attackers to exec… | 2026-02-12T23:16:02.590 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-26225 | Intego Personal Backup, a macOS backup utility that allows users to create scheduled backups and bo… | 2026-02-12T22:16:07.477 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-26224 | Intego Log Reporter, a macOS diagnostic utility bundled with Intego security products that collects… | 2026-02-12T22:16:07.320 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-26185 | Directus is a real-time API and App dashboard for managing SQL database content. Before 11.14.1, a … | 2026-02-12T22:16:07.100 | 2026-02-20T21:09:03.123 |
| fkie_cve-2026-26076 | ntpd-rs is a full-featured implementation of the Network Time Protocol. Prior to 1.7.1, an attacker… | 2026-02-12T22:16:06.960 | 2026-02-23T15:51:55.747 |
| fkie_cve-2026-26075 | FastGPT is an AI Agent building platform. Due to the fact that FastGPT's web page acquisition nodes… | 2026-02-12T22:16:06.817 | 2026-02-23T16:52:24.110 |
| fkie_cve-2026-26069 | Scraparr is a Prometheus Exporter for various components of the *arr Suite. From 3.0.0-beta to befo… | 2026-02-12T22:16:06.670 | 2026-02-23T16:58:36.867 |
| fkie_cve-2026-26068 | emp3r0r is a stealth-focused C2 designed by Linux users for Linux environments. Prior to 3.21.1, un… | 2026-02-12T22:16:06.507 | 2026-02-25T15:47:26.743 |
| fkie_cve-2026-26056 | Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vul… | 2026-02-12T22:16:06.347 | 2026-04-01T20:53:39.900 |
| fkie_cve-2026-26055 | Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vul… | 2026-02-12T22:16:06.190 | 2026-04-01T20:57:00.640 |
| fkie_cve-2026-25828 | grub-btrfs through 2026-01-31 (on Arch Linux and derivative distributions) allows initramfs OS comm… | 2026-02-12T22:16:05.493 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1358 | Airleader Master versions 6.381 and prior allow for file uploads without restriction to multiple w… | 2026-02-12T22:16:04.213 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-70845 | lty628 aidigu v1.9.1 is vulnerable to Cross Site Scripting (XSS) exists in the /setting/ page where… | 2026-02-12T22:16:03.740 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-14282 | A flaw was found in Dropbear. When running in multi-user mode and authenticating users, the dropbea… | 2026-02-12T22:16:03.373 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-26020 | AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelli… | 2026-02-12T21:16:03.500 | 2026-02-17T20:10:42.077 |
| fkie_cve-2026-26011 | navigation2 is a ROS 2 Navigation Framework and System. In 1.3.11 and earlier, a critical heap out-… | 2026-02-12T21:16:03.340 | 2026-02-23T17:00:05.130 |
| fkie_cve-2026-26005 | ClipBucket v5 is an open source video sharing platform. Prior to 5.5.3 - #45, in Clip Bucket V5, Th… | 2026-02-12T21:16:03.173 | 2026-02-18T14:59:54.727 |
| fkie_cve-2026-26000 | XWiki Platform is a generic wiki platform offering runtime services for applications built on top o… | 2026-02-12T21:16:02.990 | 2026-02-19T19:22:44.910 |
| fkie_cve-2026-25996 | Inspektor Gadget is a set of tools and framework for data collection and system inspection on Kuber… | 2026-02-12T21:16:02.820 | 2026-03-16T18:02:26.257 |
| fkie_cve-2026-0619 | A reachable infinite loop via an integer wraparound is present in Silicon Labs' Matter SDK which al… | 2026-02-12T21:16:02.500 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-25949 | Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.8, there is a potential vulnerabil… | 2026-02-12T20:16:11.227 | 2026-02-20T18:44:41.160 |
| fkie_cve-2026-25933 | Arduino App Lab is a cross-platform IDE for developing Arduino Apps. Prior to 0.4.0, a vulnerabilit… | 2026-02-12T20:16:11.067 | 2026-02-19T21:30:53.170 |
| fkie_cve-2026-25922 | authentik is an open-source identity provider. Prior to 2025.8.6, 2025.10.4, and 2025.12.4, when us… | 2026-02-12T20:16:10.910 | 2026-02-18T20:59:27.193 |
| fkie_cve-2026-25768 | LavinMQ is a high-performance message queue & streaming server. Before 2.6.6, an authenticated user… | 2026-02-12T20:16:10.773 | 2026-02-20T18:37:35.940 |
| fkie_cve-2026-25767 | LavinMQ is a high-performance message queue & streaming server. Before 2.6.8, an authenticated user… | 2026-02-12T20:16:10.623 | 2026-02-20T18:35:38.183 |
| fkie_cve-2026-25748 | authentik is an open-source identity provider. Prior to 2025.10.4 and 2025.12.4, with a malformed c… | 2026-02-12T20:16:10.473 | 2026-02-19T15:23:42.360 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-wh2v-8c6h-56m5 |
|
In the Linux kernel, the following vulnerability has been resolved: perf/arm-cmn: Reject unsupport… | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-w255-hqmv-g27g |
|
In the Linux kernel, the following vulnerability has been resolved: ntb: ntb_hw_switchtec: Fix shi… | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-vgjg-qrh9-w8x6 |
|
In the Linux kernel, the following vulnerability has been resolved: octeontx2-af: CGX: fix bitmap … | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-q3vc-67q5-pp3g |
|
In the Linux kernel, the following vulnerability has been resolved: HID: magicmouse: Do not crash … | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-m3xp-x2x9-8qr4 |
|
In the Linux kernel, the following vulnerability has been resolved: mfd: core: Add locking around … | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-jc53-6rw8-5w3x |
|
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix missing … | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-j9jf-6fw4-2v2v |
|
In the Linux kernel, the following vulnerability has been resolved: xfs: remove xfs_attr_leaf_hasn… | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-j4pf-wvpf-rv38 |
|
In the Linux kernel, the following vulnerability has been resolved: xfs: fix freemap adjustments w… | 2026-05-06T12:30:30Z | 2026-05-06T12:30:31Z |
| ghsa-hr53-gf94-w7mp |
|
In the Linux kernel, the following vulnerability has been resolved: xfrm6: fix uninitialized saddr… | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-h8pw-w24f-rm6q |
|
In the Linux kernel, the following vulnerability has been resolved: HID: logitech-hidpp: Check max… | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-h7j6-jxcq-9qj7 |
|
In the Linux kernel, the following vulnerability has been resolved: Revert "media: iris: Add sanit… | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-f9xw-88w2-23h7 |
|
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda: Fix NUL… | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-crh8-6485-fxq6 |
|
In the Linux kernel, the following vulnerability has been resolved: erofs: fix incorrect early exi… | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-cq62-68rx-vm58 |
|
In the Linux kernel, the following vulnerability has been resolved: media: iris: gen1: Destroy int… | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-cjv4-23g7-c427 |
|
In the Linux kernel, the following vulnerability has been resolved: mux: mmio: fix regmap leak on … | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-c68r-r9r9-c6jp |
|
In the Linux kernel, the following vulnerability has been resolved: net: wan/fsl_ucc_hdlc: Fix dma… | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-c4q3-46pg-rxhc |
|
In the Linux kernel, the following vulnerability has been resolved: media: cx23885: Add missing un… | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-9988-cq64-6qpm |
|
In the Linux kernel, the following vulnerability has been resolved: HID: hid-pl: handle probe erro… | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-84vf-8m4p-c2c4 |
|
In the Linux kernel, the following vulnerability has been resolved: mfd: macsmc: Initialize mutex … | 2026-05-06T12:30:30Z | 2026-05-06T12:30:31Z |
| ghsa-7xgq-2f8h-fvh6 |
|
In the Linux kernel, the following vulnerability has been resolved: powerpc/smp: Add check for kca… | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-7f3f-6h8v-698g |
|
In the Linux kernel, the following vulnerability has been resolved: remoteproc: imx_rproc: Fix inv… | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-5c36-jx4m-m84f |
|
In the Linux kernel, the following vulnerability has been resolved: Revert "PCI/IOV: Add PCI resca… | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-3xm2-xcvm-ghrh |
|
In the Linux kernel, the following vulnerability has been resolved: reset: gpio: suppress bind att… | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-3fch-xpx6-pcr2 |
|
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix null d… | 2026-05-06T12:30:30Z | 2026-05-06T12:30:31Z |
| ghsa-26jf-v4w3-xhqx |
|
In the Linux kernel, the following vulnerability has been resolved: media: iris: Add buffer to lis… | 2026-05-06T12:30:30Z | 2026-05-06T12:30:30Z |
| ghsa-xrc9-fq2p-6mm2 |
|
In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Update cpuidl… | 2026-05-06T12:30:29Z | 2026-05-06T12:30:29Z |
| ghsa-xgp5-j47w-j4jx |
|
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix NULL pointer i… | 2026-05-06T12:30:29Z | 2026-05-06T12:30:29Z |
| ghsa-xg3f-ph47-c5jv |
|
In the Linux kernel, the following vulnerability has been resolved: misc: ti_fpc202: fix a potenti… | 2026-05-06T12:30:29Z | 2026-05-06T12:30:29Z |
| ghsa-wjfp-2w53-2rcg |
|
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: ipc4-topology: Corr… | 2026-05-06T12:30:29Z | 2026-05-06T12:30:29Z |
| ghsa-rphf-w922-p2vc |
|
In the Linux kernel, the following vulnerability has been resolved: ima: verify the previous kerne… | 2026-05-06T12:30:29Z | 2026-05-06T12:30:29Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-157 |
6.1 (3.1)
|
jupyter-server is the backend for Jupyter web applications. Improper cross-site credentia… | jupyter-server | 2023-08-28T21:15:00+00:00 | 2023-09-01T20:23:47.344401+00:00 |
| pysec-2023-155 |
6.1 (3.1)
|
jupyter-server is the backend for Jupyter web applications. Open Redirect Vulnerability. … | jupyter-server | 2023-08-28T21:15:00+00:00 | 2023-09-01T16:31:48.441782+00:00 |
| pysec-2023-161 |
7.8 (3.1)
|
GitPython is a python library used to interact with Git repositories. When resolving a p… | gitpython | 2023-08-28T18:15:00+00:00 | 2023-09-05T22:26:14.587281+00:00 |
| pysec-2023-156 |
8.8 (3.1)
|
Deserialization of Untrusted Data, Inclusion of Functionality from Untrusted Control Sphe… | apache-airflow-providers-apache-spark | 2023-08-28T08:15:00+00:00 | 2023-09-01T18:27:11.679668+00:00 |
| pysec-2023-160 |
6.5 (3.1)
|
A flaw was found in the Keylime registrar that could allow a bypass of the challenge-resp… | keylime | 2023-08-25T17:15:00+00:00 | 2023-09-05T20:22:36.414406+00:00 |
| pysec-2023-154 |
5.3 (3.1)
|
Datasette is an open source multi-tool for exploring and publishing data. This bug affect… | datasette | 2023-08-25T01:15:00Z | 2023-10-08T16:12:24.555320Z |
| pysec-2023-269 |
7.5 (3.1)
|
GeoNode is an open source platform that facilitates the creation, sharing, and collaborat… | geonode | 2023-08-24T23:15:00+00:00 | 2024-11-21T14:22:50.995218+00:00 |
| pysec-2023-158 |
8.0 (3.1)
|
The session fixation vulnerability allowed the authenticated user to continue accessing A… | apache-airflow | 2023-08-23T16:15:00+00:00 | 2023-09-04T08:29:37.781470+00:00 |
| pysec-2023-152 |
8.1 (3.1)
|
Apache Airflow, in versions prior to 2.7.0, contains a security vulnerability that can be… | apache-airflow | 2023-08-23T16:15:00+00:00 | 2023-08-29T18:28:28.180958+00:00 |
| pysec-2023-153 |
6.1 (3.1)
|
Open Redirect vulnerability in Horizon Web Dashboard 19.4.0 thru 20.1.4 via the success_u… | horizon | 2023-08-22T19:16:00+00:00 | 2023-08-30T18:28:45.068261+00:00 |
| pysec-2023-151 |
9.8 (3.1)
|
An issue in langchain v.0.0.171 allows a remote attacker to execute arbitrary code via th… | langchain | 2023-08-22T19:16:00Z | 2023-08-29T15:11:37.047967Z |
| pysec-2023-149 |
|
The json2xml package through 3.12.0 for Python allows an error in typecode decoding enabl… | json2xml | 2023-08-22T19:16:00+00:00 | 2023-08-22T20:23:14.541580+00:00 |
| pysec-2023-150 |
7.8 (3.1)
|
Buffer Overflow vulnerability in tEXtToDataBuf function in pngimage.cpp in Exiv2 0.27.1 a… | exiv2 | 2023-08-22T19:15:00+00:00 | 2023-08-25T18:28:13.546911+00:00 |
| pysec-2023-148 |
9.8 (3.1)
|
An issue in llama_index v.0.7.13 and before allows a remote attacker to execute arbitrary… | llama-index | 2023-08-15T17:15:00+00:00 | 2023-08-22T18:27:29.213194+00:00 |
| pysec-2023-147 |
9.8 (3.1)
|
An issue in langchain langchain-ai v.0.0.232 and before allows a remote attacker to execu… | langchain | 2023-08-15T17:15:00+00:00 | 2023-08-22T18:27:28.580705+00:00 |
| pysec-2023-146 |
9.8 (3.1)
|
An issue in Harrison Chase langchain v.0.0.194 and before allows a remote attacker to exe… | langchain | 2023-08-15T17:15:00+00:00 | 2023-08-22T14:25:42.963301+00:00 |
| pysec-2023-145 |
9.8 (3.1)
|
An issue in LangChain v.0.0.231 allows a remote attacker to execute arbitrary code via th… | langchain | 2023-08-15T17:15:00Z | 2023-08-29T18:47:00.000000Z |
| pysec-2023-136 |
|
Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Dril… | apache-airflow | 2023-08-11T08:15:00+00:00 | 2023-08-17T03:22:30.530556+00:00 |
| pysec-2023-137 |
|
GitPython before 3.1.32 does not block insecure non-multi options in clone and clone_from… | gitpython | 2023-08-11T07:15:00+00:00 | 2023-08-17T03:22:31.332731+00:00 |
| pysec-2023-141 |
5.4 (3.1)
|
A stored cross-site scripting (XSS) vulnerability in Netbox v3.4.7 allows attackers to ex… | pynetbox | 2023-08-10T20:15:00Z | 2023-09-07T15:50:00.665697Z |
| pysec-2023-144 |
8.8 (3.1)
|
Cross Site Request Forgery (CSRF) vulnerability in wger Project wger Workout Manager 2.2.… | wger | 2023-08-08T16:15:00+00:00 | 2023-08-17T03:22:34.520767+00:00 |
| pysec-2023-143 |
5.4 (3.1)
|
Cross Site Scripting vulnerability in wger Project wger Workout Manager v.2.2.0a3 allows … | wger | 2023-08-08T16:15:00+00:00 | 2023-08-17T03:22:34.437974+00:00 |
| pysec-2023-142 |
5.9 (3.1)
|
Vyer is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). In ver… | vyper | 2023-08-07T19:15:00+00:00 | 2023-08-17T03:22:33.953997+00:00 |
| pysec-2023-134 |
|
Execution with Unnecessary Privileges, : Exposure of Sensitive Information to an Unauthor… | apache-airflow | 2023-08-05T07:15:00+00:00 | 2023-08-05T10:26:00.927631+00:00 |
| pysec-2023-138 |
9.8 (3.1)
|
An issue in Harrison Chase langchain v.0.0.194 allows an attacker to execute arbitrary co… | langchain | 2023-08-05T03:15:00Z | 2023-08-22T15:51:39.650271Z |
| pysec-2023-140 |
6.5 (3.1)
|
MindsDB's AI Virtual Database allows developers to connect any AI/ML model to any datasou… | mindsdb | 2023-08-04T18:15:00+00:00 | 2023-08-17T03:22:32.744229+00:00 |
| pysec-2023-139 |
5.3 (3.1)
|
Sydent is an identity server for the Matrix communications protocol. Prior to version 2.5… | matrix-sydent | 2023-08-04T16:15:00+00:00 | 2023-08-17T03:22:32.583512+00:00 |
| pysec-2023-135 |
|
Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store. These ar… | certifi | 2023-08-03T19:36:12+00:00 | 2023-08-07T05:41:30.977938+00:00 |
| pysec-2023-280 |
7.8 (3.1)
|
OS Command Injection in GitHub repository mlflow/mlflow prior to 2.6.0. | mlflow | 2023-08-01T01:15:00+00:00 | 2024-11-21T14:22:54.880705+00:00 |
| pysec-2023-126 |
|
PaddlePaddle before 2.5.0 has a command injection in fs.py. This resulted in the ability … | paddlepaddle | 2023-07-26T12:15:00+00:00 | 2023-07-26T14:25:58.775032+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2853 | Malicious code in react-hook-form (npm) | 2026-04-18T07:33:44Z | 2026-04-23T20:50:51Z |
| mal-2026-2917 | Malicious code in ac-sasskit-internal (npm) | 2026-04-18T06:43:51Z | 2026-04-23T20:50:49Z |
| mal-2026-2926 | Malicious code in material-ui-plugin-cache-endpoint (npm) | 2026-04-17T21:01:14Z | 2026-04-23T20:50:51Z |
| mal-2026-2852 | Malicious code in aet-test (PyPI) | 2026-04-17T18:46:36Z | 2026-04-17T18:46:36Z |
| mal-2026-2851 | Malicious code in @indriver-poc/whisperwind (npm) | 2026-04-17T18:36:01Z | 2026-04-23T20:50:49Z |
| mal-2026-2850 | Malicious code in value-slider (npm) | 2026-04-17T14:21:04Z | 2026-04-23T20:50:52Z |
| mal-2026-2848 | Malicious code in @than-xs/libsignal-node (npm) | 2026-04-17T14:11:43Z | 2026-04-23T20:50:49Z |
| mal-2026-2849 | Malicious code in @than1st/baileys (npm) | 2026-04-17T14:08:17Z | 2026-04-23T20:50:49Z |
| mal-2026-2847 | Malicious code in shan-lib (PyPI) | 2026-04-17T13:41:42Z | 2026-04-17T13:41:42Z |
| mal-2026-2846 | Malicious code in eslint-plugin-totara (npm) | 2026-04-17T12:20:55Z | 2026-04-23T20:50:50Z |
| mal-2026-2845 | Malicious code in node-red-contrib-yolo-object-detection (npm) | 2026-04-17T11:30:45Z | 2026-04-23T20:50:51Z |
| mal-2026-2843 | Malicious code in shan-lib-poc (PyPI) | 2026-04-17T10:56:55Z | 2026-04-17T10:56:55Z |
| mal-2026-2841 | Malicious code in lixxyly (PyPI) | 2026-04-17T10:53:13Z | 2026-04-17T10:53:14Z |
| mal-2026-2844 | Malicious code in shelipp (PyPI) | 2026-04-17T10:52:43Z | 2026-04-17T10:52:43Z |
| mal-2026-2842 | Malicious code in looopiw (PyPI) | 2026-04-17T10:50:21Z | 2026-04-17T10:50:21Z |
| mal-2026-2840 | Malicious code in sher-server-tool (PyPI) | 2026-04-17T10:48:02Z | 2026-04-17T11:25:37Z |
| mal-2026-2839 | Malicious code in sher-net (PyPI) | 2026-04-17T10:45:37Z | 2026-04-17T10:45:37Z |
| mal-2026-2838 | Malicious code in koa-v3 (npm) | 2026-04-17T10:20:59Z | 2026-04-23T20:50:51Z |
| mal-2026-2837 | Malicious code in solanakit (PyPI) | 2026-04-17T08:06:00Z | 2026-04-17T08:06:00Z |
| mal-2026-2835 | Malicious code in procoder (PyPI) | 2026-04-17T07:55:42Z | 2026-04-17T07:55:42Z |
| mal-2026-2831 | Malicious code in azure-ai-agentserver-githubcopilot (PyPI) | 2026-04-17T07:53:08Z | 2026-04-17T07:53:08Z |
| mal-2026-2832 | Malicious code in ixosrestinterface (PyPI) | 2026-04-17T07:49:53Z | 2026-04-17T07:49:53Z |
| mal-2026-2833 | Malicious code in keystackutilities (PyPI) | 2026-04-17T07:49:51Z | 2026-04-17T07:49:51Z |
| mal-2026-2834 | Malicious code in loadcoremwassistant (PyPI) | 2026-04-17T07:49:49Z | 2026-04-17T07:49:49Z |
| mal-2026-2836 | Malicious code in restasv3 (PyPI) | 2026-04-17T07:49:46Z | 2026-04-17T07:49:46Z |
| mal-2026-2828 | Malicious code in express-security-policy (npm) | 2026-04-17T06:20:31Z | 2026-04-23T20:50:50Z |
| mal-2026-2830 | Malicious code in renovate-config-doctolib (npm) | 2026-04-17T06:20:10Z | 2026-04-23T20:50:51Z |
| mal-2026-2829 | Malicious code in paddle-internal-scripts (npm) | 2026-04-17T06:19:25Z | 2026-04-23T20:50:51Z |
| mal-2026-2822 | Malicious code in ing-web-v5 (npm) | 2026-04-17T02:00:34Z | 2026-04-23T20:50:50Z |
| mal-2026-2821 | Malicious code in robase-quick-install (PyPI) | 2026-04-16T22:30:00Z | 2026-05-03T20:49:49Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2636 | OpenVPN: Mehrere Schwachstellen | 2025-11-18T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2635 | Red Hat Ansible Automation Platform: Schwachstelle ermöglicht Denial of Service | 2025-11-18T23:00:00.000+00:00 | 2025-11-20T23:00:00.000+00:00 |
| wid-sec-w-2025-2616 | libvirt: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-17T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2613 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung oder DoS | 2025-11-17T23:00:00.000+00:00 | 2025-11-24T23:00:00.000+00:00 |
| wid-sec-w-2025-2612 | M-Files M-Files Server: Schwachstelle ermöglicht Denial of Service | 2025-11-16T23:00:00.000+00:00 | 2025-11-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2609 | IBM SAN Volume Controller, Storwize und FlashSystem: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-16T23:00:00.000+00:00 | 2025-11-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2608 | Golang Go: Schwachstelle ermöglicht Denial of Service | 2025-11-16T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2607 | Red Hat Enterprise Linux (lasso): Eine Schwachstelle ermöglichen Codeausführung | 2025-11-16T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2603 | Fortinet FortiWeb: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2025-11-13T23:00:00.000+00:00 | 2025-11-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2600 | PostgreSQL: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-13T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2598 | CUPS (Filters): Mehrere Schwachstellen | 2025-11-13T23:00:00.000+00:00 | 2025-12-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2595 | Linux Kernel: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2593 | pgAdmin: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2586 | Red Hat Enterprise Linux (python-kdcproxy): Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2584 | Red Hat Enterprise Linux Ceph Storage: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2580 | Google Chrome/Microsoft Edge: Schwachstelle ermöglicht nicht näher beschriebene Auswirkungen | 2025-11-11T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-2579 | Linux Kernel: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2568 | Red Hat Enterprise Linux (kea): Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-11T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2566 | Mozilla Firefox und Firefox ESR: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2564 | Microsoft Windows und Windows Server: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2026-04-13T22:00:00.000+00:00 |
| wid-sec-w-2025-2537 | BusyBox (wget): Schwachstelle ermöglicht Umgehung von Sicherheitsvorkehrungen | 2025-11-10T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2533 | RedHat Multicluster Engine for Kubernetes: Schwachstelle ermöglicht Privilegieneskalation | 2025-11-09T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2531 | Linux Kernel: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-11-09T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2518 | Red Hat Enterprise Linux (runc): Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-11-09T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2510 | AnyDesk: Mehrere Schwachstellen | 2025-11-06T23:00:00.000+00:00 | 2025-12-07T23:00:00.000+00:00 |
| wid-sec-w-2025-2508 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Denial of Service | 2025-11-06T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2500 | Cisco Contact Center Produkte (CCE,CCX,CUIC): Mehrere Schwachstellen | 2025-11-05T23:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2499 | IBM WebSphere Application Server: Schwachstelle ermöglicht Manipulation von Dateien und potenziell Umgehen von Sicherheitsvorkehrungen | 2025-11-05T23:00:00.000+00:00 | 2025-11-20T23:00:00.000+00:00 |
| wid-sec-w-2025-2495 | Django: Mehrere Schwachstellen ermöglichen Denial of Service und SQL-Injection | 2025-11-05T23:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2491 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2025-11-05T23:00:00.000+00:00 | 2025-11-24T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-168-04 | Fuji Electric Smart Editor | 2025-06-17T06:00:00.000000Z | 2025-06-17T06:00:00.000000Z |
| icsa-25-168-02 | LS Electric GMWin 4 | 2025-06-17T06:00:00.000000Z | 2025-06-17T06:00:00.000000Z |
| icsa-25-162-10 | PTZOptics and Other Pan-Tilt-Zoom Cameras | 2025-06-12T06:00:00.000000Z | 2025-06-12T06:00:00.000000Z |
| icsa-25-162-09 | AVEVA PI Connector for CygNet | 2025-06-12T06:00:00.000000Z | 2025-06-12T06:00:00.000000Z |
| icsa-25-162-08 | AVEVA PI Web API | 2025-06-12T06:00:00.000000Z | 2025-06-12T06:00:00.000000Z |
| icsa-25-162-07 | AVEVA PI Data Archive | 2025-06-12T06:00:00.000000Z | 2025-06-12T06:00:00.000000Z |
| icsa-25-168-01 | Siemens Mendix Studio Pro | 2025-06-12T00:00:00.000000Z | 2025-07-08T00:00:00.000000Z |
| icsma-25-160-01 | MicroDicom DICOM Viewer | 2025-06-10T06:00:00.000000Z | 2025-06-10T06:00:00.000000Z |
| icsa-25-160-01 | SinoTrack GPS Receiver | 2025-06-10T05:00:00.000000Z | 2025-06-10T05:00:00.000000Z |
| icsa-25-175-04 | Schneider Electric EVLink WallBox (Update A) | 2025-06-10T04:00:00.000000Z | 2025-07-08T04:00:00.000000Z |
| icsa-25-175-03 | Schneider Electric Modicon Controllers (Update A) | 2025-06-10T04:00:00.000000Z | 2025-07-08T04:00:00.000000Z |
| icsa-25-162-06 | Siemens Energy Services | 2025-06-10T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-25-162-05 | Siemens SIMATIC S7-1500 CPU Family | 2025-06-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-162-04 | Siemens SCALANCE and RUGGEDCOM | 2025-06-10T00:00:00.000000Z | 2026-01-14T22:05:41.593078Z |
| icsa-25-162-03 | Siemens SCALANCE and RUGGEDCOM | 2025-06-10T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-25-162-02 | Siemens RUGGEDCOM APE1808 | 2025-06-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-162-01 | Siemens Tecnomatix Plant Simulation | 2025-06-10T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-25-155-01 | CyberData 011209 SIP Emergency Intercom | 2025-06-05T06:00:00.000000Z | 2025-06-05T06:00:00.000000Z |
| icsa-25-153-03 | Mitsubishi Electric MELSEC iQ-F Series | 2025-06-03T06:00:00.000000Z | 2025-06-03T06:00:00.000000Z |
| icsa-25-153-01 | Schneider Electric Wiser Home Automation | 2025-06-03T06:00:00.000000Z | 2025-06-03T06:00:00.000000Z |
| icsma-25-148-01 | Santesoft Sante DICOM Viewer Pro | 2025-05-29T06:00:00.000000Z | 2025-05-29T06:00:00.000000Z |
| icsa-25-148-04 | Instantel Micromate (Update A) | 2025-05-29T06:00:00.000000Z | 2025-08-07T06:00:00.000000Z |
| icsa-25-148-03 | Consilium Safety CS5000 Fire Panel (Update A) | 2025-05-29T06:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| va-25-147-01 | Craft CMS stores user-provided content session files | 2025-05-28T20:57:43Z | 2025-05-28T20:57:43Z |
| va-25-148-01 | ZKTeco BioTime multiple vulnerabilities | 2025-05-28T15:28:55Z | 2025-05-28T15:28:55Z |
| icsa-25-146-01 | Johnson Controls iSTAR Configuration Utility (ICU) tool | 2025-05-27T06:00:00.000000Z | 2025-05-27T06:00:00.000000Z |
| icsa-25-148-01 | Siemens SiPass | 2025-05-23T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-142-02 | Rockwell Automation FactoryTalk Historian ThingWorx | 2025-05-22T06:00:00.000000Z | 2025-05-22T06:00:00.000000Z |
| icsa-25-142-01 | Lantronix Device Installer | 2025-05-22T06:00:00.000000Z | 2025-05-22T06:00:00.000000Z |
| icsa-25-140-11 | Assured Telematics Inc (ATI) Fleet Management System (Update A) | 2025-05-20T06:00:00.000000Z | 2025-06-10T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-iosxr-pppma-jkwfgnew | Cisco IOS XR Software for ASR 9000 Series Aggregation Services Routers PPPoE Denial of Service Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-iosxr-dhcp-dos-3tgpkrdm | Cisco IOS XR Software DHCP Version 4 Server Denial of Service Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-iosxr-acl-bypass-rzu5nl3e | Cisco IOS XR Software MPLS and Pseudowire Interfaces Access Control List Bypass Vulnerabilities | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-secure-privesc-syxqo6ds | Cisco Secure Client for Linux with ISE Posture Module Privilege Escalation Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-secure-client-crlf-w43v4g7 | Cisco Secure Client Carriage Return Line Feed Injection Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-12T14:17:07+00:00 |
| cisco-sa-sb-wap-multi-85g83crb | Cisco Small Business 100, 300, and 500 Series Wireless Access Points Command Injection and Buffer Overflow Vulnerabilities | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-duo-win-bypass-pn42kkbm | Cisco Duo Authentication for Windows Logon and RDP Authentication Bypass Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-duo-infodisc-rlceqm6t | Cisco Duo Authentication for Windows Logon and RDP Information Disclosure Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-08T18:23:38+00:00 |
| cisco-sa-appd-xss-3jwqsmnt | Cisco AppDynamics Controller Cross-Site Scripting Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-appd-traversal-m7n8mzpf | Cisco AppDynamics Controller Path Traversal Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-ucsfi-imm-syn-p6kztdqc | Cisco UCS 6400 and 6500 Series Fabric Interconnects Intersight Managed Mode Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-nxos-po-acl-tkyepgvl | Cisco Nexus 3000 and 9000 Series Switches Port Channel ACL Programming Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-nxos-lldp-dos-z7pnctgt | Cisco FXOS and NX-OS Software Link Layer Discovery Protocol Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-nxos-ebgp-dos-l3qcwvj | Cisco NX-OS Software External Border Gateway Protocol Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-ipv6-mpls-dos-r9ycxkwm | Cisco NX-OS Software MPLS Encapsulated IPv6 Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-cuic-access-control-jjszqmjj | Cisco Unified Intelligence Center Insufficient Access Control Vulnerability | 2024-02-21T16:00:00+00:00 | 2024-02-21T16:00:00+00:00 |
| cisco-sa-expressway-csrf-knnzdmj3 | Cisco Expressway Series Cross-Site Request Forgery Vulnerabilities | 2024-02-07T16:00:00+00:00 | 2024-02-12T17:55:43+00:00 |
| cisco-sa-clamav-hdffu6t | ClamAV OLE2 File Format Parsing Denial of Service Vulnerability | 2024-02-07T16:00:00+00:00 | 2024-02-13T17:57:43+00:00 |
| cisco-sa-sb-bus-acl-bypass-5zn9hnjk | Cisco Small Business Series Switches Stacked Reload ACL Bypass Vulnerability | 2024-01-24T16:00:00+00:00 | 2024-01-24T16:00:00+00:00 |
| cisco-sa-cucm-rce-bwnzqcum | Cisco Unified Communications Products Remote Code Execution Vulnerability | 2024-01-24T16:00:00+00:00 | 2024-01-30T19:16:46+00:00 |
| cisco-sa-cuc-xss-9tfuu5ms | Cisco Unity Connection Cross-Site Scripting Vulnerability | 2024-01-24T16:00:00+00:00 | 2024-01-24T16:00:00+00:00 |
| cisco-sa-tms-portal-xss-axnevg3s | Cisco TelePresence Management Suite Cross-Site Scripting Vulnerabilities | 2024-01-10T16:00:00+00:00 | 2024-01-12T15:18:40+00:00 |
| cisco-sa-thouseyes-privesc-dmzhg3qv | Cisco ThousandEyes Enterprise Agent Virtual Appliance Privilege Escalation Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-sb-wap-inject-bhstwgxo | Cisco WAP371 Wireless Access Point Command Injection Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-pi-epnm-wkzjeyeq | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Vulnerabilities | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-ise-xss-bl4vtml | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-cuc-unauth-afu-froyscsd | Cisco Unity Connection Unauthenticated Arbitrary File Upload Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-02-05T17:23:14+00:00 |
| cisco-sa-broadworks-xss-6syj82ju | Cisco BroadWorks Application Delivery Platform and Xtended Services Platform Stored Cross-Site Scripting Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-23T17:43:55+00:00 |
| cisco-sa-struts-c2kcmkmt | Apache Struts Vulnerability Affecting Cisco Products: December 2023 | 2023-12-12T16:00:00+00:00 | 2023-12-21T22:23:04+00:00 |
| cisco-sa-asa-ssl-vpn-y88qom77 | Cisco Adaptive Security Appliance and Firepower Threat Defense Software VPN Packet Validation Vulnerability | 2023-12-05T16:00:00+00:00 | 2023-12-05T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-31609 | smb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush() | 2026-04-02T00:00:00.000Z | 2026-05-01T01:02:29.000Z |
| msrc_cve-2026-31608 | smb: server: avoid double-free in smb_direct_free_sendmsg after smb_direct_flush_send_list() | 2026-04-02T00:00:00.000Z | 2026-05-02T01:42:00.000Z |
| msrc_cve-2026-31607 | usbip: validate number_of_packets in usbip_pack_ret_submit() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:39:12.000Z |
| msrc_cve-2026-31606 | usb: gadget: f_hid: don't call cdev_init while cdev in use | 2026-04-02T00:00:00.000Z | 2026-05-01T01:02:19.000Z |
| msrc_cve-2026-31605 | fbdev: udlfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO | 2026-04-02T00:00:00.000Z | 2026-05-01T14:40:07.000Z |
| msrc_cve-2026-31604 | wifi: rtw88: fix device leak on probe failure | 2026-04-02T00:00:00.000Z | 2026-05-01T14:45:22.000Z |
| msrc_cve-2026-31603 | staging: sm750fb: fix division by zero in ps_to_hz() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:36.000Z |
| msrc_cve-2026-31602 | ALSA: ctxfi: Limit PTP to a single page | 2026-04-02T00:00:00.000Z | 2026-05-02T01:41:29.000Z |
| msrc_cve-2026-31601 | vfio/xe: Reorganize the init to decouple migration from reset | 2026-04-02T00:00:00.000Z | 2026-04-29T14:40:06.000Z |
| msrc_cve-2026-31600 | arm64: mm: Handle invalid large leaf mappings correctly | 2026-04-02T00:00:00.000Z | 2026-04-29T15:00:22.000Z |
| msrc_cve-2026-31599 | media: vidtv: fix NULL pointer dereference in vidtv_channel_pmt_match_sections | 2026-04-02T00:00:00.000Z | 2026-05-01T14:45:10.000Z |
| msrc_cve-2026-31598 | ocfs2: fix possible deadlock between unlink and dio_end_io_write | 2026-04-02T00:00:00.000Z | 2026-05-02T01:41:49.000Z |
| msrc_cve-2026-31597 | ocfs2: fix use-after-free in ocfs2_fault() when VM_FAULT_RETRY | 2026-04-02T00:00:00.000Z | 2026-05-01T14:44:41.000Z |
| msrc_cve-2026-31596 | ocfs2: handle invalid dinode in ocfs2_group_extend | 2026-04-02T00:00:00.000Z | 2026-05-01T14:40:00.000Z |
| msrc_cve-2026-31595 | PCI: endpoint: pci-epf-vntb: Stop cmd_handler work in epf_ntb_epc_cleanup | 2026-04-02T00:00:00.000Z | 2026-05-01T14:43:45.000Z |
| msrc_cve-2026-31594 | PCI: endpoint: pci-epf-vntb: Remove duplicate resource teardown | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:10.000Z |
| msrc_cve-2026-31593 | KVM: SEV: Reject attempts to sync VMSA of an already-launched/encrypted vCPU | 2026-04-02T00:00:00.000Z | 2026-04-29T14:53:05.000Z |
| msrc_cve-2026-31592 | KVM: SEV: Protect *all* of sev_mem_enc_register_region() with kvm->lock | 2026-04-02T00:00:00.000Z | 2026-04-30T01:10:40.000Z |
| msrc_cve-2026-31591 | KVM: SEV: Lock all vCPUs when synchronzing VMSAs for SNP launch finish | 2026-04-02T00:00:00.000Z | 2026-04-29T14:41:14.000Z |
| msrc_cve-2026-31590 | KVM: SEV: Drop WARN on large size for KVM_MEMORY_ENCRYPT_REG_REGION | 2026-04-02T00:00:00.000Z | 2026-05-01T14:39:26.000Z |
| msrc_cve-2026-31589 | mm: call ->free_folio() directly in folio_unmap_invalidate() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:54:48.000Z |
| msrc_cve-2026-31588 | KVM: x86: Use scratch field in MMIO fragment to hold small write values | 2026-04-02T00:00:00.000Z | 2026-05-01T14:43:39.000Z |
| msrc_cve-2026-31587 | ASoC: qcom: q6apm: move component registration to unmanaged version | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:31.000Z |
| msrc_cve-2026-31586 | mm: blk-cgroup: fix use-after-free in cgwb_release_workfn() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:43:52.000Z |
| msrc_cve-2026-31585 | media: vidtv: fix nfeeds state corruption on start_streaming failure | 2026-04-02T00:00:00.000Z | 2026-05-01T14:45:28.000Z |
| msrc_cve-2026-31584 | media: mediatek: vcodec: fix use-after-free in encoder release path | 2026-04-02T00:00:00.000Z | 2026-04-30T01:53:23.000Z |
| msrc_cve-2026-31583 | media: em28xx: fix use-after-free in em28xx_v4l2_open() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:39:39.000Z |
| msrc_cve-2026-31582 | hwmon: (powerz) Fix use-after-free on USB disconnect | 2026-04-02T00:00:00.000Z | 2026-04-30T01:42:36.000Z |
| msrc_cve-2026-31581 | ALSA: 6fire: fix use-after-free on disconnect | 2026-04-02T00:00:00.000Z | 2026-04-30T01:52:14.000Z |
| msrc_cve-2026-31580 | bcache: fix cached_dev.sb_bio use-after-free and crash | 2026-04-02T00:00:00.000Z | 2026-04-30T14:38:53.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0089 | Kwetsbaarheid verholpen in Apache Tomcat | 2025-03-17T18:36:12.978021Z | 2025-03-17T18:36:12.978021Z |
| ncsc-2025-0088 | Kwetsbaarheden verholpen in Autodesk AutoCAD | 2025-03-14T10:10:13.263645Z | 2025-03-14T10:10:13.263645Z |
| ncsc-2025-0087 | Kwetsbaarheden verholpen in GitLab | 2025-03-14T09:14:59.775984Z | 2025-03-14T09:14:59.775984Z |
| ncsc-2025-0086 | Kwetsbaarheid verholpen in Apple iOS, iPadOS, macOS Sequoia, visionOS en Safari | 2025-03-12T13:48:59.223945Z | 2025-03-12T13:48:59.223945Z |
| ncsc-2025-0085 | Kwetsbaarheid verholpen in Ivanti Secure Access Client | 2025-03-12T11:00:45.614633Z | 2025-03-12T11:00:45.614633Z |
| ncsc-2025-0084 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-03-12T10:56:00.883114Z | 2025-03-12T10:56:00.883114Z |
| ncsc-2025-0083 | Kwetsbaarheden verholpen in Fortinet FortiSandbox | 2025-03-12T10:51:18.487649Z | 2025-03-12T10:51:18.487649Z |
| ncsc-2025-0082 | Kwetsbaarheden verholpen in FortiOS, FortiProxy, FortiPAM, FortiSRA en FortiWeb. | 2025-03-12T10:46:38.451715Z | 2025-03-12T10:46:38.451715Z |
| ncsc-2025-0081 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-03-11T18:45:19.628300Z | 2025-03-11T18:45:19.628300Z |
| ncsc-2025-0080 | Kwetsbaarheden verholpen in Microsoft Office | 2025-03-11T18:44:43.336447Z | 2025-03-11T18:44:43.336447Z |
| ncsc-2025-0079 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-03-11T18:44:07.766518Z | 2025-03-11T18:44:07.766518Z |
| ncsc-2025-0078 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-03-11T18:43:14.505624Z | 2025-03-11T18:43:14.505624Z |
| ncsc-2025-0077 | Kwetsbaarheden verholpen in Siemens producten | 2025-03-11T12:30:29.277759Z | 2025-03-11T12:30:29.277759Z |
| ncsc-2025-0076 | Kwetsbaarheden verholpen in SAP software | 2025-03-11T12:20:06.258896Z | 2025-03-11T12:20:06.258896Z |
| ncsc-2025-0075 | Kwetsbaarheid verholpen in Elastic Kibana | 2025-03-07T13:51:51.509917Z | 2025-03-07T13:51:51.509917Z |
| ncsc-2025-0074 | Kwetsbaarheden verholpen in IBM Storage producten | 2025-03-04T14:14:48.398751Z | 2025-03-04T14:14:48.398751Z |
| ncsc-2025-0073 | Kwetsbaarheden verholpen in VMware producten | 2025-03-04T14:11:56.959153Z | 2025-03-04T14:11:56.959153Z |
| ncsc-2025-0072 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-03-04T10:15:32.203439Z | 2025-03-04T10:15:32.203439Z |
| ncsc-2025-0071 | Kwetsbaarheid verholpen in Zohocorp ManageEngine ADSelfService Plus | 2025-03-03T14:11:46.709999Z | 2025-03-03T14:11:46.709999Z |
| ncsc-2025-0070 | Kwetsbaarheden verholpen in GitLab | 2025-03-03T14:10:30.120360Z | 2025-03-03T14:10:30.120360Z |
| ncsc-2025-0069 | Kwetsbaarheid verholpen in MITRE Caldera | 2025-02-25T07:42:48.535179Z | 2025-02-25T07:42:48.535179Z |
| ncsc-2025-0068 | Kwetsbaarheden verholpen in Mattermost | 2025-02-24T12:04:19.392654Z | 2025-02-24T12:04:19.392654Z |
| ncsc-2025-0067 | Kwetsbaarheid verholpen in Exim | 2025-02-21T12:54:32.376733Z | 2025-02-21T12:54:32.376733Z |
| ncsc-2025-0066 | Kwetsbaarheid verholpen in XWiki | 2025-02-21T12:33:24.503983Z | 2025-02-21T12:33:24.503983Z |
| ncsc-2025-0065 | Kwetsbaarheden verholpen in Nagios XI | 2025-02-21T12:32:41.120020Z | 2025-02-21T12:32:41.120020Z |
| ncsc-2025-0064 | Kwetsbaarheden verholpen in IBM Cognos Controller | 2025-02-21T08:40:26.849797Z | 2025-02-21T08:40:26.849797Z |
| ncsc-2025-0063 | Kwetsbaarheid verholpen in PostgreSQL | 2025-02-19T09:11:55.511966Z | 2025-02-19T09:11:55.511966Z |
| ncsc-2025-0062 | Kwetsbaarheid verholpen in Juniper Session Smart Router | 2025-02-18T14:25:56.916762Z | 2025-02-18T14:25:56.916762Z |
| ncsc-2025-0061 | Kwetsbaarheden verholpen in Siemens producten | 2025-02-14T08:46:28.240775Z | 2025-02-14T08:46:28.240775Z |
| ncsc-2025-0060 | Kwetsbaarheid verholpen in Veeam | 2025-02-13T09:48:03.729080Z | 2025-02-13T09:48:03.729080Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10294-1 | telemetrygen-0.147.0-1.1 on GA media | 2026-03-05T00:00:00Z | 2026-03-05T00:00:00Z |
| opensuse-su-2026:10293-1 | python311-joserfc-1.6.3-1.1 on GA media | 2026-03-05T00:00:00Z | 2026-03-05T00:00:00Z |
| opensuse-su-2026:10292-1 | python311-Django-5.2.12-1.1 on GA media | 2026-03-05T00:00:00Z | 2026-03-05T00:00:00Z |
| opensuse-su-2026:10291-1 | libsoup-2_4-1-2.74.3-18.1 on GA media | 2026-03-05T00:00:00Z | 2026-03-05T00:00:00Z |
| opensuse-su-2026:10290-1 | heroic-games-launcher-2.20.1-2.1 on GA media | 2026-03-05T00:00:00Z | 2026-03-05T00:00:00Z |
| opensuse-su-2026:10289-1 | freetype2-devel-2.14.2-1.1 on GA media | 2026-03-05T00:00:00Z | 2026-03-05T00:00:00Z |
| opensuse-su-2026:20320-1 | Security update for freerdp2 | 2026-03-04T17:52:31Z | 2026-03-04T17:52:31Z |
| opensuse-su-2026:20312-1 | Security update for libxml2, libxslt | 2026-03-04T10:51:24Z | 2026-03-04T10:51:24Z |
| opensuse-su-2026:10288-1 | libblkid-devel-2.41.3-4.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10287-1 | sdbootutil-1+git20260303.90d816d-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10286-1 | ruby4.0-rubygem-rack-2.2-2.2.22-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10285-1 | python311-pillow-heif-1.3.0-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10284-1 | python311-PyPDF2-2.11.1-5.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10283-1 | python313-Django6-6.0.3-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10282-1 | python311-Django4-4.2.29-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10281-1 | mchange-commons-0.4.0-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10280-1 | incus-6.22-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10279-1 | c3p0-0.12.0-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10278-1 | ImageMagick-7.1.2.15-2.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:20308-1 | Security update for go1.24-openssl | 2026-03-03T17:46:58Z | 2026-03-03T17:46:58Z |
| opensuse-su-2026:20306-1 | Security update for expat | 2026-03-03T16:13:34Z | 2026-03-03T16:13:34Z |
| opensuse-su-2026:20305-1 | Security update for podman | 2026-03-03T16:13:34Z | 2026-03-03T16:13:34Z |
| opensuse-su-2026:20318-1 | Security update for gitea-tea | 2026-03-03T14:44:11Z | 2026-03-03T14:44:11Z |
| opensuse-su-2026:20301-1 | Security update for go1.25-openssl | 2026-03-03T09:04:46Z | 2026-03-03T09:04:46Z |
| opensuse-su-2026:20298-1 | Security update for assertj-core | 2026-03-02T16:00:38Z | 2026-03-02T16:00:38Z |
| opensuse-su-2026:20297-1 | Security update for rhino | 2026-03-02T16:00:37Z | 2026-03-02T16:00:37Z |
| opensuse-su-2026:20295-1 | Security update for cpp-httplib | 2026-03-02T10:20:20Z | 2026-03-02T10:20:20Z |
| opensuse-su-2026:10277-1 | python311-pypdf-6.7.5-1.1 on GA media | 2026-03-02T00:00:00Z | 2026-03-02T00:00:00Z |
| opensuse-su-2026:20292-1 | Security update for python-azure-core | 2026-03-01T15:59:49Z | 2026-03-01T15:59:49Z |
| opensuse-su-2026:10276-1 | libsoup-3_0-0-3.6.6-2.1 on GA media | 2026-03-01T00:00:00Z | 2026-03-01T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:9095 | Red Hat Security Advisory: kernel security update | 2026-04-20T18:30:02+00:00 | 2026-05-06T20:36:30+00:00 |
| rhsa-2026:9094 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-20T18:16:32+00:00 | 2026-05-06T15:02:26+00:00 |
| rhsa-2026:9093 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-20T18:01:22+00:00 | 2026-05-06T15:02:20+00:00 |
| rhsa-2026:9090 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-20T17:00:17+00:00 | 2026-05-06T15:02:20+00:00 |
| rhsa-2026:9080 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-20T15:56:17+00:00 | 2026-05-05T11:27:06+00:00 |
| rhsa-2026:9077 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-20T15:39:22+00:00 | 2026-05-05T11:27:06+00:00 |
| rhsa-2026:9044 | Red Hat Security Advisory: osbuild-composer security update | 2026-04-20T14:26:01+00:00 | 2026-05-06T15:02:19+00:00 |
| rhsa-2026:9042 | Red Hat Security Advisory: python3.11 security update | 2026-04-20T14:13:36+00:00 | 2026-05-05T20:30:37+00:00 |
| rhsa-2026:9043 | Red Hat Security Advisory: grafana security update | 2026-04-20T14:13:11+00:00 | 2026-05-06T15:02:19+00:00 |
| rhsa-2026:9052 | Red Hat Security Advisory: Red Hat Lightspeed (formerly Insights) for Runtimes security update | 2026-04-20T14:01:31+00:00 | 2026-05-06T17:28:26+00:00 |
| rhsa-2026:9031 | Red Hat Security Advisory: python-urllib3 security update | 2026-04-20T13:27:51+00:00 | 2026-04-30T21:35:12+00:00 |
| rhsa-2026:9026 | Red Hat Security Advisory: libarchive security update | 2026-04-20T13:09:21+00:00 | 2026-05-05T20:30:43+00:00 |
| rhsa-2026:8945 | Red Hat Security Advisory: freerdp security update | 2026-04-20T11:34:29+00:00 | 2026-04-30T21:34:34+00:00 |
| rhsa-2026:8949 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-20T11:16:56+00:00 | 2026-05-06T15:02:19+00:00 |
| rhsa-2026:8944 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-20T10:34:46+00:00 | 2026-05-05T20:35:34+00:00 |
| rhsa-2026:8937 | Red Hat Security Advisory: fontforge security update | 2026-04-20T10:03:35+00:00 | 2026-04-20T13:54:57+00:00 |
| rhsa-2026:8930 | Red Hat Security Advisory: grafana security update | 2026-04-20T09:35:55+00:00 | 2026-05-06T15:02:19+00:00 |
| rhsa-2026:8921 | Red Hat Security Advisory: kernel security update | 2026-04-20T09:31:55+00:00 | 2026-04-28T01:29:21+00:00 |
| rhsa-2026:8931 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-20T09:31:25+00:00 | 2026-05-06T15:02:19+00:00 |
| rhsa-2026:8908 | Red Hat Security Advisory: libarchive security update | 2026-04-20T05:23:50+00:00 | 2026-05-05T20:30:49+00:00 |
| rhsa-2026:8862 | Red Hat Security Advisory: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update | 2026-04-20T04:34:22+00:00 | 2026-04-28T14:08:39+00:00 |
| rhsa-2026:8866 | Red Hat Security Advisory: libarchive security update | 2026-04-20T04:20:19+00:00 | 2026-05-05T20:30:47+00:00 |
| rhsa-2026:8857 | Red Hat Security Advisory: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update | 2026-04-20T04:13:34+00:00 | 2026-04-28T14:08:39+00:00 |
| rhsa-2026:8873 | Red Hat Security Advisory: libarchive security update | 2026-04-20T04:05:19+00:00 | 2026-05-05T20:30:43+00:00 |
| rhsa-2026:8872 | Red Hat Security Advisory: openexr security update | 2026-04-20T04:01:45+00:00 | 2026-04-30T21:34:34+00:00 |
| rhsa-2026:8883 | Red Hat Security Advisory: giflib security update | 2026-04-20T03:50:24+00:00 | 2026-04-21T19:40:50+00:00 |
| rhsa-2026:8888 | Red Hat Security Advisory: openexr security update | 2026-04-20T03:46:39+00:00 | 2026-04-30T21:34:32+00:00 |
| rhsa-2026:8880 | Red Hat Security Advisory: squid security update | 2026-04-20T03:44:44+00:00 | 2026-04-30T02:55:11+00:00 |
| rhsa-2026:8874 | Red Hat Security Advisory: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update | 2026-04-20T03:31:29+00:00 | 2026-04-28T14:08:39+00:00 |
| rhsa-2026:8870 | Red Hat Security Advisory: openexr security update | 2026-04-20T03:19:54+00:00 | 2026-04-30T21:34:36+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-588101 | SSA-588101: Multiple File Parsing Vulnerabilities in Parasolid | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-552874 | SSA-552874: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2022-12-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-547714 | SSA-547714: Argument Injection Vulnerability in SIMATIC WinCC OA Ultralight Client | 2022-12-13T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-436469 | SSA-436469: TCP Vulnerability in APOGEE/TALON Field Panels | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-413565 | SSA-413565: Multiple Vulnerabilities in SCALANCE Products | 2022-12-13T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-412672 | SSA-412672: Multiple OpenSSL and OpenSSH Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-408105 | SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products | 2022-12-13T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-382653 | SSA-382653: Multiple Denial of Service Vulnerabilities in Industrial Products | 2022-12-13T00:00:00Z | 2023-09-12T00:00:00Z |
| ssa-363821 | SSA-363821: Multiple Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-360681 | SSA-360681: Datalogics File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-333517 | SSA-333517: Multiple Vulnerabilities in SCALANCE SC-600 Family before V3.0 | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-274282 | SSA-274282: Cross Site Scripting Vulnerability in PLM Help Server V4.2 | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-224632 | SSA-224632: Improper Access Control Vulnerability in Mendix Email Connector Module | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-223771 | SSA-223771: SISCO Stack Vulnerability in SIPROTEC 5 Devices | 2022-12-13T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-210822 | SSA-210822: Improper Access Control Vulnerability in Mendix Workflow Commons Module | 2022-12-13T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-180579 | SSA-180579: Privilege Management Vulnerability and Multiple Nucleus RTOS Vulnerabilities in APOGEE/TALON Field Panels before V3.5.5/V2.8.20 | 2022-12-13T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-853037 | SSA-853037: File Parsing Vulnerabilities in Parasolid | 2022-11-08T00:00:00Z | 2022-11-08T00:00:00Z |
| ssa-787941 | SSA-787941: Denial of Service Vulnerability in RUGGEDCOM ROS devices | 2022-11-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-587547 | SSA-587547: Unencrypted Storage of User Credentials in QMS Automotive | 2022-11-08T00:00:00Z | 2023-09-12T00:00:00Z |
| ssa-570294 | SSA-570294: Multiple Vulnerabilities in SICAM Q100 Before V2.50 | 2022-11-08T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-568428 | SSA-568428: Weak Key Protection Vulnerability in SINUMERIK ONE and SINUMERIK MC | 2022-11-08T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-506569 | SSA-506569: Multiple Vulnerabilities in SCALANCE W1750D | 2022-11-08T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-478960 | SSA-478960: Missing CSRF Protection in the Web Server Login Page of Industrial Controllers | 2022-11-08T00:00:00Z | 2023-09-12T00:00:00Z |
| ssa-371761 | SSA-371761: Arbitrary Code Execution Vulnerability in the Logback Component of SINEC NMS before V1.0.3 | 2022-11-08T00:00:00Z | 2022-11-08T00:00:00Z |
| ssa-120378 | SSA-120378: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2022-11-08T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-640732 | SSA-640732: Authentication Bypass Vulnerability in Siveillance Video Mobile Server | 2022-10-21T00:00:00Z | 2022-10-21T00:00:00Z |
| ssa-955858 | SSA-955858: Multiple Vulnerabilities in LOGO! 8 BM Devices | 2022-10-11T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-935500 | SSA-935500: Denial of Service Vulnerability in FTP Server of Nucleus RTOS based APOGEE, TALON and Desigo PXC/PXM Products | 2022-10-11T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-928782 | SSA-928782: Firmware Authenticity Vulnerability in LOGO! 8 BM Devices | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-836027 | SSA-836027: Client-side Authentication in Desigo CC and Cerberus DMS | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21116-1 | Security update for python-cryptography | 2026-04-14T08:30:04Z | 2026-04-14T08:30:04Z |
| suse-su-2026:21115-1 | Security update for ignition | 2026-04-14T08:29:25Z | 2026-04-14T08:29:25Z |
| suse-su-2026:21127-1 | Security update for avahi | 2026-04-14T08:01:54Z | 2026-04-14T08:01:54Z |
| suse-su-2026:21128-1 | Security update for ignition | 2026-04-14T08:01:00Z | 2026-04-14T08:01:00Z |
| suse-su-2026:21126-1 | Security update for python-cryptography | 2026-04-14T07:57:50Z | 2026-04-14T07:57:50Z |
| suse-su-2026:21124-1 | Security update for vim | 2026-04-14T07:55:35Z | 2026-04-14T07:55:35Z |
| suse-su-2026:1305-1 | Security update for the Linux Kernel (Live Patch 76 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T18:34:02Z | 2026-04-13T18:34:02Z |
| suse-su-2026:21123-1 | Security update for the Linux Kernel | 2026-04-13T18:28:29Z | 2026-04-13T18:28:29Z |
| suse-su-2026:21114-1 | Security update for the Linux Kernel | 2026-04-13T17:04:49Z | 2026-04-13T17:04:49Z |
| suse-su-2026:21122-1 | Security update for kernel-livepatch-MICRO-6-0_Update_18 | 2026-04-13T16:42:46Z | 2026-04-13T16:42:46Z |
| suse-su-2026:21120-1 | Security update for kernel-livepatch-MICRO-6-0_Update_18 | 2026-04-13T16:42:46Z | 2026-04-13T16:42:46Z |
| suse-su-2026:1304-1 | Security update for the Linux Kernel (Live Patch 73 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T16:04:42Z | 2026-04-13T16:04:42Z |
| suse-su-2026:1303-1 | Security update for tigervnc | 2026-04-13T16:02:59Z | 2026-04-13T16:02:59Z |
| suse-su-2026:1302-1 | Security update for tigervnc | 2026-04-13T16:02:16Z | 2026-04-13T16:02:16Z |
| suse-su-2026:1301-1 | Security update for tigervnc | 2026-04-13T16:01:23Z | 2026-04-13T16:01:23Z |
| suse-su-2026:1300-1 | Security update for GraphicsMagick | 2026-04-13T15:58:01Z | 2026-04-13T15:58:01Z |
| suse-su-2026:1299-1 | Security update for nodejs24 | 2026-04-13T15:54:45Z | 2026-04-13T15:54:45Z |
| suse-su-2026:21186-1 | Security update for openssl-3 | 2026-04-13T15:48:01Z | 2026-04-13T15:48:01Z |
| suse-su-2026:21107-1 | Security update for openssl-3 | 2026-04-13T15:48:01Z | 2026-04-13T15:48:01Z |
| suse-su-2026:1298-1 | Security update for the Linux Kernel (Live Patch 72 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T15:04:44Z | 2026-04-13T15:04:44Z |
| suse-su-2026:21184-1 | Security update for cockpit | 2026-04-13T14:11:34Z | 2026-04-13T14:11:34Z |
| suse-su-2026:21106-1 | Security update for cockpit | 2026-04-13T14:11:34Z | 2026-04-13T14:11:34Z |
| suse-su-2026:1297-1 | Security update for the Linux Kernel (Live Patch 71 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T12:42:14Z | 2026-04-13T12:42:14Z |
| suse-su-2026:1296-1 | Security update for python39 | 2026-04-13T12:32:48Z | 2026-04-13T12:32:48Z |
| suse-su-2026:21180-1 | Security update for webkit2gtk3 | 2026-04-13T12:16:05Z | 2026-04-13T12:16:05Z |
| suse-su-2026:21181-1 | Security update for nodejs24 | 2026-04-13T10:59:52Z | 2026-04-13T10:59:52Z |
| suse-su-2026:21178-1 | Security update for python313 | 2026-04-13T09:49:38Z | 2026-04-13T09:49:38Z |
| suse-su-2026:21104-1 | Security update for python313 | 2026-04-13T09:49:38Z | 2026-04-13T09:49:38Z |
| suse-su-2026:1294-1 | Security update for the Linux Kernel (Live Patch 77 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T09:04:33Z | 2026-04-13T09:04:33Z |
| suse-su-2026:21221-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-04-13T09:00:51Z | 2026-04-13T09:00:51Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:0991 | Moderate: glib2 security update | 2026-01-22T00:00:00Z | 2026-01-24T01:40:03Z |
| alsa-2026:0975 | Moderate: glib2 security update | 2026-01-22T00:00:00Z | 2026-01-23T23:34:09Z |
| alsa-2026:0928 | Important: java-21-openjdk security update | 2026-01-22T00:00:00Z | 2026-01-26T11:04:56Z |
| alsa-2026:0927 | Important: java-17-openjdk security update | 2026-01-22T00:00:00Z | 2026-01-24T01:52:06Z |
| alsa-2026:0936 | Moderate: glib2 security update | 2026-01-21T00:00:00Z | 2026-01-24T01:44:09Z |
| alsa-2026:0930 | Moderate: pcs security update | 2026-01-21T00:00:00Z | 2026-01-24T01:46:11Z |
| alsa-2026:0924 | Important: thunderbird security update | 2026-01-21T00:00:00Z | 2026-01-24T01:47:12Z |
| alsa-2026:0923 | Important: golang security update | 2026-01-21T00:00:00Z | 2026-01-24T01:54:58Z |
| alsa-2026:0922 | Important: golang security update | 2026-01-21T00:00:00Z | 2026-01-23T23:39:55Z |
| alsa-2026:0921 | Important: go-toolset:rhel8 security update | 2026-01-21T00:00:00Z | 2026-01-26T10:07:11Z |
| alsa-2026:0914 | Important: gimp security update | 2026-01-21T00:00:00Z | 2026-01-26T10:10:46Z |
| alsa-2026:0845 | Important: brotli security update | 2026-01-20T00:00:00Z | 2026-01-21T10:45:25Z |
| alsa-2026:0793 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-23T13:22:18Z |
| alsa-2026:0786 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-23T07:53:26Z |
| alsa-2026:0771 | Important: gpsd-minimal security update | 2026-01-19T00:00:00Z | 2026-01-20T11:54:05Z |
| alsa-2026:0770 | Important: gpsd security update | 2026-01-19T00:00:00Z | 2026-01-21T10:46:37Z |
| alsa-2026:0760 | Important: kernel-rt security update | 2026-01-19T00:00:00Z | 2026-01-20T08:13:58Z |
| alsa-2026:0759 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-20T08:07:16Z |
| alsa-2026:0756 | Moderate: transfig security update | 2026-01-19T00:00:00Z | 2026-01-19T10:24:15Z |
| alsa-2026:0753 | Important: container-tools:rhel8 security update | 2026-01-19T00:00:00Z | 2026-01-21T09:07:00Z |
| alsa-2026:0752 | Important: jmc security update | 2026-01-19T00:00:00Z | 2026-01-20T11:59:21Z |
| alsa-2026:0750 | Important: net-snmp security update | 2026-01-19T00:00:00Z | 2026-01-20T07:38:35Z |
| alsa-2026:0728 | Important: gnupg2 security update | 2026-01-15T00:00:00Z | 2026-01-16T08:41:48Z |
| alsa-2026:0719 | Important: gnupg2 security update | 2026-01-15T00:00:00Z | 2026-01-16T08:23:06Z |
| alsa-2026:0700 | Moderate: transfig security update | 2026-01-15T00:00:00Z | 2026-01-16T14:46:41Z |
| alsa-2026:0697 | Important: gnupg2 security update | 2026-01-15T00:00:00Z | 2026-01-16T08:52:59Z |
| alsa-2026:0696 | Important: net-snmp security update | 2026-01-15T00:00:00Z | 2026-01-26T10:04:02Z |
| alsa-2026:0695 | Moderate: libpq security update | 2026-01-15T00:00:00Z | 2026-01-16T14:48:26Z |
| alsa-2026:0694 | Important: firefox security update | 2026-01-15T00:00:00Z | 2026-01-16T14:51:10Z |
| alsa-2026:0668 | Important: net-snmp security update | 2026-01-15T00:00:00Z | 2026-01-16T14:53:15Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-856 | Use-of-uninitialized-value in cups_fill | 2024-08-16T00:05:10.919440Z | 2024-08-16T00:05:10.919721Z |
| osv-2024-853 | UNKNOWN READ in chunk_free_object | 2024-08-16T00:04:58.897243Z | 2025-01-10T05:30:16.360095Z |
| osv-2024-852 | UNKNOWN READ in jvp_object_free | 2024-08-16T00:04:43.641868Z | 2024-08-16T00:04:43.642269Z |
| osv-2024-847 | Null-dereference READ in _libssh2_packet_add | 2024-08-16T00:04:07.189033Z | 2025-02-01T14:27:03.602163Z |
| osv-2024-838 | Bad-cast to RDKit::AtomRDKit::ROMol::initFromOther | 2024-08-16T00:03:32.029853Z | 2026-03-07T14:34:10.603763Z |
| osv-2024-833 | UNKNOWN READ in chunk_free_object | 2024-08-16T00:03:18.896326Z | 2024-08-16T00:03:18.896644Z |
| osv-2024-832 | UNKNOWN READ in Pistache::Http::Header::Expect::parseRaw | 2024-08-16T00:03:13.834235Z | 2025-01-10T05:18:27.558670Z |
| osv-2024-831 | Heap-buffer-overflow in jv_parse | 2024-08-16T00:03:12.871175Z | 2025-03-07T14:24:40.166702Z |
| osv-2024-830 | UNKNOWN READ in ShadingImage::generateAxialBitmap | 2024-08-16T00:03:09.951294Z | 2024-08-16T00:03:09.951596Z |
| osv-2024-828 | Use-of-uninitialized-value in packet_parse | 2024-08-16T00:03:08.665359Z | 2024-08-16T00:03:08.665719Z |
| osv-2024-817 | Use-of-uninitialized-value in pcapint_filter_with_aux_data | 2024-08-16T00:02:39.185747Z | 2025-01-08T14:19:40.985698Z |
| osv-2024-816 | Use-of-uninitialized-value in pcpp::SSLClientHelloMessage::ClientHelloTLSFingerprint::toString | 2024-08-16T00:02:36.618439Z | 2025-12-22T14:21:20.173609Z |
| osv-2024-812 | Use-of-uninitialized-value in pcpp::PcapFileWriterDevice::writePacket | 2024-08-16T00:02:26.387902Z | 2025-12-22T14:21:19.473015Z |
| osv-2024-805 | Use-of-uninitialized-value in pcpp::NflogLayer::parseNextLayer | 2024-08-16T00:02:19.436836Z | 2024-08-16T00:02:19.437200Z |
| osv-2024-801 | UNKNOWN READ in PointerVector.h | 2024-08-16T00:02:10.140304Z | 2025-04-16T14:27:34.855775Z |
| osv-2024-793 | Heap-buffer-overflow in H5HL__fl_deserialize | 2024-08-16T00:01:45.237305Z | 2025-12-31T14:19:11.515108Z |
| osv-2024-792 | Index-out-of-bounds in AAHD::make_ahd_rb_hv | 2024-08-16T00:01:41.357755Z | 2024-08-16T00:01:41.358066Z |
| osv-2024-777 | Global-buffer-overflow in vte_write_debug | 2024-08-16T00:00:55.259153Z | 2024-08-16T00:00:55.259408Z |
| osv-2024-772 | UNKNOWN READ in H5SL_search | 2024-08-16T00:00:44.075617Z | 2025-08-14T14:39:54.764895Z |
| osv-2024-764 | Use-of-uninitialized-value in _cupsStrAlloc | 2024-08-16T00:00:28.318434Z | 2024-08-16T00:00:28.318983Z |
| osv-2024-748 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-08-13T00:04:40.789098Z | 2024-08-13T00:04:40.789448Z |
| osv-2024-747 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-08-13T00:03:34.008550Z | 2024-08-13T00:03:34.008929Z |
| osv-2024-728 | Negative-size-param in pdf_resize_resource_arrays | 2024-08-08T00:09:33.935595Z | 2026-03-18T14:32:58.071449Z |
| osv-2024-719 | Heap-buffer-overflow in hevc_ref_pic_lists_modification | 2024-08-07T00:05:22.699506Z | 2026-05-06T14:47:57.671872Z |
| osv-2024-714 | Segv on unknown address in lwan_request_get_cookie | 2024-08-04T00:01:49.853424Z | 2025-06-17T14:38:11.268036Z |
| osv-2024-698 | Heap-use-after-free in xmlCharEncCloseFunc | 2024-07-31T00:12:19.254629Z | 2026-04-16T14:30:06.495743Z |
| osv-2024-696 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-07-31T00:03:10.056663Z | 2026-05-02T14:28:43.223547Z |
| osv-2024-695 | Stack-buffer-overflow in gf_vvc_parse_nalu_bs | 2024-07-31T00:02:35.217594Z | 2026-05-06T14:46:48.762980Z |
| osv-2024-680 | Security exception in com.github.javaparser.GeneratedJavaParser.Expression | 2024-07-26T00:06:29.761307Z | 2026-05-04T14:22:08.224431Z |
| osv-2024-679 | Heap-buffer-overflow in readImage4v2 | 2024-07-25T00:14:34.485446Z | 2026-05-01T14:26:21.860184Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2023-0070 | Insufficient covariance check makes self_cell unsound | 2023-11-10T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0114 | `tiny-server` was removed from crates.io for malicious code | 2023-11-06T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0104 | `littest` was removed from crates.io for malicious code | 2023-11-06T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0077 | Remotely exploitable DoS condition in Rosenpass <=0.2.0 | 2023-11-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0069 | sudo-rs: Path Traversal vulnerability | 2023-11-01T12:00:00Z | 2023-11-06T12:48:19Z |
| rustsec-2023-0094 | `martin-mbtiles` has been renamed to `mbtiles` | 2023-10-30T12:00:00Z | 2025-09-14T19:19:34Z |
| rustsec-2023-0078 | Potential stack use-after-free in `Instrumented::into_inner` | 2023-10-19T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0068 | Sequential calls of encryption API (`encrypt`, `wrap`, and `dump`) result in nonce reuse | 2023-10-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0087 | `MaybeUninit` misuse in `simd-json-derive` | 2023-10-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0067 | `fehler` is unmaintained; use `culpa` instead | 2023-10-12T12:00:00Z | 2023-10-14T15:01:02Z |
| rustsec-2023-0065 | Tungstenite allows remote attackers to cause a denial of service | 2023-09-25T12:00:00Z | 2023-09-29T12:03:03Z |
| rustsec-2023-0064 | gix-transport code execution vulnerability | 2023-09-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0063 | Denial of service in Quinn servers | 2023-09-21T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0083 | blurhash: panic on parsing crafted blurhash inputs | 2023-09-19T12:00:00Z | 2026-03-11T10:51:38Z |
| rustsec-2023-0082 | phonenumber: panic on parsing crafted RF3966 phonenumber inputs | 2023-09-19T12:00:00Z | 2026-03-11T10:37:17Z |
| rustsec-2023-0085 | HPACK decoder panics on invalid input | 2023-09-15T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2023-0084 | `hpack` is unmaintained | 2023-09-15T12:00:00Z | 2024-03-06T14:01:14Z |
| rustsec-2023-0062 | BER/CER/DER decoder panics on invalid input | 2023-09-13T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0061 | libwebp: OOB write in BuildHuffmanTable | 2023-09-12T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0060 | libwebp: OOB write in BuildHuffmanTable | 2023-09-12T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0059 | Unaligned read of `*const *const c_char` pointer | 2023-09-10T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0058 | Exposes reference to non-Sync data to an arbitrary thread | 2023-09-10T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0057 | Fails to prohibit standard library access prior to initialization of Rust standard library runtime | 2023-09-10T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0091 | Miscompilation of wasm `i64x2.shr_s` instruction with constant input on x86\_64 | 2023-09-05T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2023-0086 | Multiple soundness issues | 2023-09-03T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0055 | Multiple soundness issues | 2023-09-03T12:00:00Z | 2024-09-16T14:15:37Z |
| rustsec-2023-0056 | Default functions in VolatileMemory trait lack bounds checks, potentially leading to out-of-bounds memory accesses | 2023-09-01T12:00:00Z | 2023-09-06T17:18:09Z |
| rustsec-2023-0053 | rustls-webpki: CPU denial of service in certificate path building | 2023-08-22T12:00:00Z | 2023-08-27T15:52:52Z |
| rustsec-2023-0052 | webpki: CPU denial of service in certificate path building | 2023-08-22T12:00:00Z | 2023-09-30T20:13:23Z |
| rustsec-2023-0110 | `postgresderive` was removed from crates.io for malicious code | 2023-08-18T12:00:00Z | 2026-03-26T06:26:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-cilium-2026-33726 | Cilium L7 proxy may bypass Kubernetes NetworkPolicy for same-node traffic | 2026-04-06T07:45:24.262Z | 2026-04-06T08:26:41.107Z |
| bit-grafana-2026-33375 | Grafana MSSQL Data Source Plugin: Restriction Bypass Leading to OOM DoS | 2026-04-01T08:41:17.463Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-28375 | Grafana Testdata datasource can issue unbounded memory allocations | 2026-04-01T08:41:15.363Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27880 | OpenFeature evaluation API reads input data with no bounds | 2026-04-01T08:41:13.459Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27879 | Query resampling can cause unbounded memory allocations | 2026-04-01T08:41:11.477Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27877 | Public dashboards discloses all direct mode datasources | 2026-04-01T08:41:09.536Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27876 | RCE on Grafana via sqlExpressions | 2026-04-01T08:41:07.673Z | 2026-04-08T09:14:18.943Z |
| bit-appsmith-2026-34411 | Appsmith < 1.98 Unauthenticated Instance Configuration Disclosure via Management APIs | 2026-04-01T08:35:37.595Z | 2026-04-01T09:11:42.692Z |
| bit-gitlab-2026-2370 | Improper Handling of Parameters in GitLab | 2026-03-31T09:12:36.844Z | 2026-03-31T09:14:23.567Z |
| bit-mastodon-2026-33869 | Mastodon has a denial of service for quote authorization | 2026-03-31T08:45:37.827Z | 2026-03-31T09:14:23.567Z |
| bit-mastodon-2026-33868 | Mastodon has a GET-Based Open Redirect via '/web/%2F<domain>' | 2026-03-31T08:45:35.531Z | 2026-03-31T09:14:23.567Z |
| bit-prestashop-2026-33674 | PrestaShop: Improper Use of Validation Framework | 2026-03-30T11:49:50.984Z | 2026-04-06T08:26:41.107Z |
| bit-prestashop-2026-33673 | PrestaShop has multiple stored XSS vulnerabilities via unprotected Template variables | 2026-03-30T11:49:49.224Z | 2026-04-06T08:26:41.107Z |
| bit-nats-2026-33249 | NATS: Message tracing can be redirected to arbitrary subject | 2026-03-30T11:45:25.356Z | 2026-03-30T12:13:12.971Z |
| bit-nats-2026-33248 | NATS has mTLS verify_and_map authentication bypass via incorrect Subject DN matching | 2026-03-27T17:45:26.680Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33247 | NATS credentials are exposed in monitoring port via command-line argv | 2026-03-27T17:45:24.871Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33246 | NATS: Leafnode connections allow spoofing of Nats-Request-Info identity headers | 2026-03-27T17:45:23.082Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33223 | NATS Server: Incomplete Stripping of Nats-Request-Info Header Allows Identity Spoofing | 2026-03-27T17:45:21.527Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33222 | NATS JetStream has an authorization bypass through its Management API | 2026-03-27T17:45:19.827Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33219 | NATS is vulnerable to pre-auth DoS through WebSockets client service | 2026-03-27T17:45:18.190Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33218 | NATS has pre-auth server panic via leafnode handling | 2026-03-27T17:45:16.655Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33217 | NATS allows MQTT clients to bypass ACL checks | 2026-03-27T17:45:15.042Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33216 | NATS has MQTT plaintext password disclosure | 2026-03-27T17:45:13.444Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-29785 | NATS Server panic via malicious compression on leafnode port | 2026-03-27T17:45:10.061Z | 2026-03-27T18:14:10.313Z |
| bit-gitlab-2026-4363 | Incorrect Authorization in GitLab | 2026-03-27T12:15:19.935Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-3988 | Inefficient Algorithmic Complexity in GitLab | 2026-03-27T12:15:17.809Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-3857 | Cross-Site Request Forgery (CSRF) in GitLab | 2026-03-27T12:15:15.885Z | 2026-03-31T09:14:23.567Z |
| bit-gitlab-2026-2995 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in GitLab | 2026-03-27T12:15:11.976Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2973 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-03-27T12:15:10.065Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2745 | Authentication Bypass Using an Alternate Path or Channel in GitLab | 2026-03-27T12:15:06.072Z | 2026-03-27T12:16:52.978Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ia56615 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-25T00:44:12.047442Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-rh10099 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-02-25T00:43:12.068903Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-lo42921 | Within HostnameError | 2026-02-25T00:42:42.699243Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-dv04077 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-25T00:42:42.369607Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-dc27717 | OpenVPN version 2 | 2026-02-25T00:39:42.192253Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-dn18334 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-25T00:39:41.622120Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-xk29348 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 8.4.0-r0 | 2026-02-25T00:39:11.477214Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-hw19594 | Within HostnameError | 2026-02-24T00:45:50.891263Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-uo76615 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-24T00:45:21.009333Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-yq79300 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-24T00:45:20.890998Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-pn58989 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-24T00:45:20.977848Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-sp64433 | Security fixes for GHSA-6rw7-vpxm-498p, GHSA-73rr-hh4g-fpgx, GHSA-8qq5-rm4j-mr97 applied in versions: 4.2.1.1-r1 | 2026-02-24T00:44:51.180009Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-io04548 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-24T00:44:50.498217Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-lm41397 | node-tar is a full-featured Tar for Node | 2026-02-24T00:40:50.950958Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-cl79805 | Security fixes for GHSA-F6X5-JH6R-WRFV, GHSA-J5W8-Q4QC-RX2X applied in versions: 0.8.4-r0 | 2026-02-24T00:38:50.220255Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-ln12820 | vulnerability has been identified in Node | 2026-02-19T00:58:49.154512Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-kn34553 | vulnerability has been identified in Node | 2026-02-19T00:58:48.926519Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-oj16660 | Security fixes for GHSA-2GH3-RMM4-6RQ5, GHSA-434X-W66G-QW3R, GHSA-R6V5-FH4H-64XC, GHSA-XWFJ-JGWM-7WP5 applied in versions: 1.28.2-r0, 1.28.4-r0 | 2026-02-19T00:39:07.225007Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-nn87556 | Security fixes for GHSA-2GH3-RMM4-6RQ5, GHSA-434X-W66G-QW3R, GHSA-R6V5-FH4H-64XC, GHSA-XWFJ-JGWM-7WP5 applied in versions: 1.28.2-r0, 1.29.0-r0 | 2026-02-19T00:39:07.788394Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-kn30288 | Security fixes for GHSA-2GH3-RMM4-6RQ5, GHSA-434X-W66G-QW3R, GHSA-R6V5-FH4H-64XC, GHSA-RHFX-M35P-FF5J, GHSA-XWFJ-JGWM-7WP5 applied in versions: 1.27.5-r1, 1.27.6-r0 | 2026-02-19T00:39:07.163109Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-yn08405 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 7.1.1-r7 | 2026-02-19T00:39:05.944714Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-zt77083 | When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers | 2026-02-18T00:40:43.959662Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-rs39538 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-18T00:37:41.553514Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-lr19699 | Within HostnameError | 2026-02-18T00:37:41.636616Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-dt95939 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-18T00:37:41.674179Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-at88149 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-18T00:37:41.548996Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-xv54160 | Within HostnameError | 2026-02-17T00:41:15.330012Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-gg58376 | Within HostnameError | 2026-02-17T00:41:15.939977Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-uh39784 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-17T00:40:45.017480Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-vg57433 | Within HostnameError | 2026-02-17T00:39:45.599344Z | 2026-02-16T09:23:22Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2010-ALE-014 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2010-09-09T00:00:00.000000 | 2010-10-06T00:00:00.000000 |
| certa-2010-ale-013 | Vulnérabilité dans le contrôle ActiveX Apple QuickTime | 2010-08-31T00:00:00.000000 | 2010-09-17T00:00:00.000000 |
| CERTA-2010-ALE-013 | Vulnérabilité dans le contrôle ActiveX Apple QuickTime | 2010-08-31T00:00:00.000000 | 2010-09-17T00:00:00.000000 |
| certa-2010-ale-012 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2010-08-06T00:00:00.000000 | 2010-08-20T00:00:00.000000 |
| CERTA-2010-ALE-012 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2010-08-06T00:00:00.000000 | 2010-08-20T00:00:00.000000 |
| certa-2010-ale-011 | Vulnérabilités dans Apple iOS | 2010-08-04T00:00:00.000000 | 2010-08-12T00:00:00.000000 |
| CERTA-2010-ALE-011 | Vulnérabilités dans Apple iOS | 2010-08-04T00:00:00.000000 | 2010-08-12T00:00:00.000000 |
| certa-2010-ale-010 | Vulnérabilité dans le Shell de Microsoft Windows | 2010-07-19T00:00:00.000000 | 2010-08-03T00:00:00.000000 |
| CERTA-2010-ALE-010 | Vulnérabilité dans le Shell de Microsoft Windows | 2010-07-19T00:00:00.000000 | 2010-08-03T00:00:00.000000 |
| certa-2010-ale-009 | Exploitation par un code malveillant d'une vulnérabilité Microsoft Windows non corrigée | 2010-07-16T00:00:00.000000 | 2010-08-03T00:00:00.000000 |
| CERTA-2010-ALE-009 | Exploitation par un code malveillant d'une vulnérabilité Microsoft Windows non corrigée | 2010-07-16T00:00:00.000000 | 2010-08-03T00:00:00.000000 |
| certa-2010-ale-008 | Vulnérabilité dans le Centre d'aide et de support Windows | 2010-06-10T00:00:00.000000 | 2010-07-15T00:00:00.000000 |
| CERTA-2010-ALE-008 | Vulnérabilité dans le Centre d'aide et de support Windows | 2010-06-10T00:00:00.000000 | 2010-07-15T00:00:00.000000 |
| certa-2010-ale-007 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2010-06-05T00:00:00.000000 | 2010-06-30T00:00:00.000000 |
| CERTA-2010-ALE-007 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2010-06-05T00:00:00.000000 | 2010-06-30T00:00:00.000000 |
| certa-2010-ale-006 | Vulnérabilité de Safari | 2010-05-14T00:00:00.000000 | 2010-05-27T00:00:00.000000 |
| CERTA-2010-ALE-006 | Vulnérabilité de Safari | 2010-05-14T00:00:00.000000 | 2010-05-27T00:00:00.000000 |
| certa-2010-ale-005 | Vulnérabilité dans Java Deployment Toolkit | 2010-04-09T00:00:00.000000 | 2010-04-16T00:00:00.000000 |
| CERTA-2010-ALE-005 | Vulnérabilité dans Java Deployment Toolkit | 2010-04-09T00:00:00.000000 | 2010-04-16T00:00:00.000000 |
| certa-2010-ale-004 | Vulnérabilité dans Microsoft Internet Explorer | 2010-03-10T00:00:00.000000 | 2010-03-31T00:00:00.000000 |
| CERTA-2010-ALE-004 | Vulnérabilité dans Microsoft Internet Explorer | 2010-03-10T00:00:00.000000 | 2010-03-31T00:00:00.000000 |
| certa-2010-ale-003 | Vulnérabilité dans Microsoft VBScript | 2010-03-02T00:00:00.000000 | 2010-04-13T00:00:00.000000 |
| CERTA-2010-ALE-003 | Vulnérabilité dans Microsoft VBScript | 2010-03-02T00:00:00.000000 | 2010-04-13T00:00:00.000000 |
| certa-2010-ale-002 | Vulnérabilité dans le sous-système MS-DOS de Microsoft Windows | 2010-01-21T00:00:00.000000 | 2010-02-10T00:00:00.000000 |
| CERTA-2010-ALE-002 | Vulnérabilité dans le sous-système MS-DOS de Microsoft Windows | 2010-01-21T00:00:00.000000 | 2010-02-10T00:00:00.000000 |
| certa-2010-ale-001 | Vulnérabilité dans Microsoft Internet Explorer | 2010-01-15T00:00:00.000000 | 2010-01-22T00:00:00.000000 |
| CERTA-2010-ALE-001 | Vulnérabilité dans Microsoft Internet Explorer | 2010-01-15T00:00:00.000000 | 2010-01-22T00:00:00.000000 |
| certa-2009-ale-023 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-12-15T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| CERTA-2009-ALE-023 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-12-15T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2009-ale-022 | Vulnérabilité dans TANDBERG MXP | 2009-12-11T00:00:00.000000 | 2009-12-11T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2026-AVI-0134 | Vulnérabilité dans Microsoft Edge | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| CERTFR-2026-AVI-0133 | Multiples vulnérabilités dans Roundcube | 2026-02-09T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| CERTFR-2026-AVI-0132 | Multiples vulnérabilités dans VMware Tanzu Greenplum | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0131 | Multiples vulnérabilités dans les produits IBM | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0130 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0129 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0128 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0127 | Vulnérabilité dans NetApp ONTAP 9 | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0126 | Vulnérabilité dans ESET Management Agent | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0125 | Multiples vulnérabilités dans les produits Moxa | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0124 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0123 | Multiples vulnérabilités dans Asterisk | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0122 | Multiples vulnérabilités dans Tenable Nessus | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0121 | Vulnérabilité dans les produits Juniper Networks | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0131 | Multiples vulnérabilités dans les produits IBM | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0130 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0129 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0128 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0127 | Vulnérabilité dans NetApp ONTAP 9 | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0126 | Vulnérabilité dans ESET Management Agent | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0125 | Multiples vulnérabilités dans les produits Moxa | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0124 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0123 | Multiples vulnérabilités dans Asterisk | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0122 | Multiples vulnérabilités dans Tenable Nessus | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0121 | Vulnérabilité dans les produits Juniper Networks | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0120 | Multiples vulnérabilités dans les produits F5 | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0119 | Multiples vulnérabilités dans les produits Cisco | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0118 | Multiples vulnérabilités dans les produits Splunk | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| CERTFR-2026-AVI-0120 | Multiples vulnérabilités dans les produits F5 | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| CERTFR-2026-AVI-0119 | Multiples vulnérabilités dans les produits Cisco | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-000907 | 0ch BBS Script (0ch) vulnerable to cross-site scripting | 2024-03-26T15:35+09:00 | 2024-03-26T15:35+09:00 |
| jvndb-2024-000902 | TvRock vulnerable to cross-site scripting | 2024-03-26T14:27+09:00 | 2024-03-26T14:27+09:00 |
| jvndb-2024-000904 | WebProxy vulnerable to OS command injection | 2024-03-26T14:19+09:00 | 2024-03-26T14:19+09:00 |
| jvndb-2023-025113 | BUFFALO LinkStation 200 series vulnerable to arbitrary code execution | 2024-03-25T18:16+09:00 | 2024-03-25T18:16+09:00 |
| jvndb-2024-003016 | Multiple vulnerabilities in home gateway HGW BL1500HM | 2024-03-25T17:28+09:00 | 2025-03-28T12:01+09:00 |
| jvndb-2024-000033 | WordPress Plugin "easy-popup-show" vulnerable to cross-site request forgery | 2024-03-25T13:31+09:00 | 2024-03-25T13:31+09:00 |
| jvndb-2024-003008 | Sangoma Technologies CG/MG family driver cg6kwin2k.sys vulnerable to insufficient access control on its IOCTL | 2024-03-22T13:50+09:00 | 2024-04-24T11:45+09:00 |
| jvndb-2024-000032 | Multiple vulnerabilities in FitNesse | 2024-03-18T14:08+09:00 | 2024-03-19T11:02+09:00 |
| jvndb-2024-000031 | "ABEMA" App for Android fails to restrict access permissions | 2024-03-15T16:37+09:00 | 2024-03-15T16:37+09:00 |
| jvndb-2024-002961 | Information Exposure Vulnerability in Cosminexus Component Container | 2024-03-13T12:10+09:00 | 2024-03-13T12:10+09:00 |
| jvndb-2024-000030 | a-blog cms vulnerable to directory traversal | 2024-03-08T15:27+09:00 | 2024-03-08T15:27+09:00 |
| jvndb-2024-002942 | OMRON NJ/NX series vulnerable to path traversal | 2024-03-08T14:16+09:00 | 2024-03-08T14:16+09:00 |
| jvndb-2024-000028 | Multiple vulnerabilities in SKYSEA Client View | 2024-03-07T16:09+09:00 | 2024-07-29T18:13+09:00 |
| jvndb-2024-000027 | FUJIFILM Business Innovation Corp. printers vulnerable to cross-site request forgery | 2024-03-06T18:24+09:00 | 2024-03-06T18:24+09:00 |
| jvndb-2024-000026 | Multiple vulnerabilities in printers and scanners which implement BROTHER Web Based Management | 2024-03-06T18:12+09:00 | 2024-03-06T18:12+09:00 |
| jvndb-2024-000029 | Toyoko Inn official App vulnerable to improper server certificate verification | 2024-03-06T13:53+09:00 | 2024-03-06T13:53+09:00 |
| jvndb-2024-000025 | Protection mechanism failure in RevoWorks | 2024-02-29T15:40+09:00 | 2024-02-29T15:40+09:00 |
| jvndb-2024-000024 | OET-213H-BTS1 missing authorization check in the initial configuration | 2024-02-29T14:59+09:00 | 2024-02-29T14:59+09:00 |
| jvndb-2024-000023 | OpenPNE plugin "opTimelinePlugin" vulnerable to cross-site scripting | 2024-02-29T13:12+09:00 | 2024-02-29T13:12+09:00 |
| jvndb-2024-000022 | Multiple vulnerabilities in baserCMS | 2024-02-27T14:25+09:00 | 2024-02-27T14:25+09:00 |
| jvndb-2024-002831 | ELECOM wireless LAN routers vulnerable to OS command injection | 2024-02-22T08:15+09:00 | 2026-02-04T12:02+09:00 |
| jvndb-2024-002832 | EL Injection Vulnerability in Hitachi Global Link Manager | 2024-02-21T15:53+09:00 | 2024-02-21T15:53+09:00 |
| jvndb-2024-000020 | Multiple vulnerabilities in ELECOM wireless LAN routers and wireless LAN repeater | 2024-02-20T14:14+09:00 | 2024-11-26T15:26+09:00 |
| jvndb-2024-002560 | Android App "Mopria Print Service" vulnerable to improper intent handling | 2024-02-15T15:26+09:00 | 2024-02-15T15:26+09:00 |
| jvndb-2024-000019 | a-blog cms vulnerable to URL spoofing | 2024-02-15T14:12+09:00 | 2024-02-15T14:12+09:00 |
| jvndb-2024-002050 | Multiple out-of-bounds write vulnerabilities in Canon Office/Small Office Multifunction Printers and Laser Printers | 2024-02-07T15:39+09:00 | 2024-03-08T18:05+09:00 |
| jvndb-2024-001882 | Sharp NEC Display Solutions' public displays vulnerable to local file inclusion | 2024-02-07T14:25+09:00 | 2024-07-11T14:27+09:00 |
| jvndb-2020-013805 | Zeroshell vulnerable to OS command injection | 2024-02-07T13:38+09:00 | 2024-02-07T13:38+09:00 |
| jvndb-2024-001804 | Multiple buffer overflow vulnerabilities in HOME SPOT CUBE2 | 2024-02-06T15:02+09:00 | 2024-03-11T17:32+09:00 |
| jvndb-2024-001785 | Incorrect permission assignment vulnerability in Trend Micro uiAirSupport | 2024-02-06T14:46+09:00 | 2024-03-11T17:42+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-17479 | Discourse信息泄露漏洞(CNVD-2026-17479) | 2026-03-24 | 2026-04-16 |
| cnvd-2026-17478 | Discourse信息泄露漏洞(CNVD-2026-17478) | 2026-03-24 | 2026-04-16 |
| cnvd-2026-17477 | Discourse信息泄露漏洞(CNVD-2026-17477) | 2026-03-24 | 2026-04-16 |
| cnvd-2026-17272 | Discourse信息泄露漏洞(CNVD-2026-17272) | 2026-03-24 | 2026-04-16 |
| cnvd-2026-17271 | Discourse信息泄露漏洞(CNVD-2026-17271) | 2026-03-24 | 2026-04-16 |
| cnvd-2026-15061 | OpenClaw操作系统命令注入漏洞 | 2026-03-24 | 2026-03-26 |
| cnvd-2026-15060 | OpenClaw操作系统命令注入漏洞(CNVD-2026-15060) | 2026-03-24 | 2026-03-26 |
| cnvd-2026-15059 | OpenClaw操作系统命令注入漏洞(CNVD-2026-15059) | 2026-03-24 | 2026-03-26 |
| cnvd-2026-14861 | OpenClaw后置链接漏洞(CNVD-2026-14861) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14860 | OpenClaw代码问题漏洞(CNVD-2026-14860) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14859 | OpenClaw后置链接漏洞(CNVD-2026-14859) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14858 | OpenClaw后置链接漏洞(CNVD-2026-14858) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14857 | OpenClaw路径遍历漏洞(CNVD-2026-14857) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14856 | OpenClaw路径遍历漏洞(CNVD-2026-14856) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14850 | OpenClaw路径遍历漏洞(CNVD-2026-14850) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14849 | OpenClaw代码问题漏洞(CNVD-2026-14849) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14848 | OpenClaw路径遍历漏洞(CNVD-2026-14848) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14846 | OpenClaw后置链接漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14844 | OpenClaw代码问题漏洞(CNVD-2026-14844) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14843 | OpenClaw身份验证强化漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14842 | OpenClaw访问控制错误漏洞(CNVD-2026-14842) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14841 | OpenClaw授权绕过漏洞(CNVD-2026-14841) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14840 | OpenClaw身份验证绕过漏洞(CNVD-2026-14840) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14839 | OpenClaw身份验证绕过漏洞(CNVD-2026-14839) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14838 | OpenClaw存在未明漏洞(CNVD-2026-14838) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14837 | OpenClaw授权绕过漏洞(CNVD-2026-14837) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14836 | OpenClaw元数据欺骗漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14835 | OpenClaw授权绕过漏洞(CNVD-2026-14835) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14834 | OpenClaw存在未明漏洞(CNVD-2026-14834) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14833 | OpenClaw身份验证绕过漏洞 | 2026-03-24 | 2026-03-25 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01243 | Уязвимость функции btrfs_delete_free_space_tree() модуля fs/btrfs/free-space-tree.c файло… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01242 | Уязвимость функции btrfs_finish_ordered_zoned() модуля fs/btrfs/zoned.c файловой системы … | 05.02.2026 | 05.02.2026 |
| bdu:2026-01241 | Уязвимость функции __ocfs2_move_extent() модуля fs/ocfs2/move_extents.c файловой системы … | 05.02.2026 | 05.02.2026 |
| bdu:2026-01240 | Уязвимость функции ext4_mb_new_inode_pa() модуля fs/ext4/mballoc.c файловой системы Ext4 … | 05.02.2026 | 05.02.2026 |
| bdu:2026-01239 | Уязвимость функции tegra_xusb_port_unregister() модуля drivers/phy/tegra/xusb.c драйвера … | 05.02.2026 | 05.02.2026 |
| bdu:2026-01238 | Уязвимость функции snd_dg00x_stream_init_duplex() модуля sound/firewire/digi00x/digi00x-s… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01237 | Уязвимость функции BTF_ID() модуля kernel/bpf/verifier.c поддержки интерпретатора BPF ядр… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01236 | Уязвимость функции drm_client_target_cloned() модуля drivers/gpu/drm/drm_client_modeset.c… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01235 | Уязвимость функции anysee_master_xfer() модуля drivers/media/usb/dvb-usb-v2/anysee.c драй… | 05.02.2026 | 05.02.2026 |
| bdu:2026-01234 | Уязвимость функции skb_segment_list() модуля net/core/skbuff.c поддержки сетевых функций … | 04.02.2026 | 04.02.2026 |
| bdu:2026-01233 | Уязвимость функции fail_iommu_bus_notify() модуля arch/powerpc/kernel/iommu.c поддержки п… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01232 | Уязвимость функции intel_gvt_debugfs_init() модуля drivers/gpu/drm/i915/gvt/debugfs.c дра… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01231 | Уязвимость функции ntfs_link_inode() модуля fs/ntfs3/inode.c файловой системы NTFS 3 ядра… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01230 | Уязвимость функции isAccessAllowed() программного средства управления и запуска OCI-конте… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01229 | Уязвимость функции __qedi_remove() модуля drivers/scsi/qedi/qedi_main.c драйвера устройст… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01228 | Уязвимость функции drm_fb_helper_damage() модуля drivers/gpu/drm/drm_fb_helper.c драйвера… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01227 | Уязвимость почтового сервера SmarterTools SmarterMail, связанная с использованием имени с… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01226 | Уязвимость метода API ConnectToHub почтового сервера SmarterTools SmarterMail, позволяюща… | 04.02.2026 | 06.02.2026 |
| bdu:2026-01225 | Уязвимость функции sc16is7xx_probe() модуля drivers/tty/serial/sc16is7xx.c драйвера консо… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01224 | Уязвимость параметра weights_only функции torch.load() фреймворка машинного обучения PyTo… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01223 | Уязвимость файлов формата PKCS#12 библиотеки OpenSSL, позволяющая нарушителю вызвать отка… | 04.02.2026 | 10.02.2026 |
| bdu:2026-01222 | Уязвимость инструмента командной строки openssl dgst библиотеки OpenSSL, позволяющая нару… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01221 | Уязвимость функции btrfs_drop_extent_map_range() модуля fs/btrfs/extent_map.c файловой си… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01220 | Уязвимость функции PKCS7_digest_from_attributes() библиотеки OpenSSL, позволяющая нарушит… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01219 | Уязвимость функции TS_RESP_verify_response() библиотеки OpenSSL, позволяющая нарушителю в… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01218 | Уязвимость функции PKCS12_item_decrypt_d2i_ex() библиотеки OpenSSL, позволяющая нарушител… | 04.02.2026 | 10.02.2026 |
| bdu:2026-01217 | Уязвимость функции PKCS12_get_friendlyname() библиотеки OpenSSL, позволяющая нарушителю в… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01216 | Уязвимость функции BIO_f_linebuffer() библиотеки OpenSSL, позволяющая нарушителю вызвать … | 04.02.2026 | 04.02.2026 |
| bdu:2026-01215 | Уязвимость функции SSL_CIPHER_find() библиотеки OpenSSL, позволяющая нарушителю вызвать о… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01214 | Уязвимость кода парсинга файлов формата PKCS#12 библиотеки OpenSSL, позволяющая нарушител… | 04.02.2026 | 10.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201406-0445 | OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly re… | 2024-07-23T21:30:24.345000Z |
| var-200809-0013 | Network Preferences in Apple Mac OS X 10.4.11 stores PPP passwords in cleartext in a worl… | 2024-07-23T21:30:24.177000Z |
| var-201104-0082 | dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and … | 2024-07-23T21:30:23.564000Z |
| var-201804-1179 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T21:29:57.987000Z |
| var-201110-0388 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2024-07-23T21:29:27.159000Z |
| var-201806-1460 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T21:29:26.304000Z |
| var-200904-0811 | Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier… | 2024-07-23T21:29:26.736000Z |
| var-200809-0402 | Heap-based buffer overflow in Apple Type Services (ATS) in Apple Mac OS X 10.4.11 and 10.… | 2024-07-23T21:29:26.389000Z |
| var-200906-0591 | The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util befor… | 2024-07-23T21:29:05.332000Z |
| var-200806-0425 | Unspecified vulnerability in WebKit in Apple Safari before 3.1.2, as distributed in Mac O… | 2024-07-23T21:29:05.522000Z |
| var-201411-0410 | cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain nam… | 2024-07-23T21:29:03.698000Z |
| var-201912-0635 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:28:59.002000Z |
| var-201912-0648 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:28:49.167000Z |
| var-200711-0538 | Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header fro… | 2024-07-23T21:28:49.905000Z |
| var-201904-1444 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:28:46.398000Z |
| var-201706-0271 | In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NU… | 2024-07-23T21:28:45.678000Z |
| var-202105-1431 | The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired… | 2024-07-23T21:28:26.944000Z |
| var-200704-0221 | The WebFoundation framework in Apple Mac OS X 10.3.9 and earlier allows subdomain cookies… | 2024-07-23T21:28:26.644000Z |
| var-200511-0018 | The Internet Key Exchange version 1 (IKEv1) implementation in Stonesoft StoneGate Firewal… | 2024-07-23T21:28:25.870000Z |
| var-200703-0028 | Server Manager (servermgrd) in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 does not suf… | 2024-07-23T21:28:21.532000Z |
| var-200503-0071 | The Sun Java Plugin capability in Java 2 Runtime Environment (JRE) 1.4.2_01, 1.4.2_04, an… | 2024-07-23T21:28:20.494000Z |
| var-200609-0312 | Buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to … | 2024-07-23T21:27:23.266000Z |
| var-201912-0582 | A logic issue was addressed with improved state management. This issue is fixed in iOS 12… | 2024-07-23T21:27:22.850000Z |
| var-202203-0145 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed … | 2024-07-23T21:26:46.093000Z |
| var-201912-1847 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:26:10.950000Z |
| var-201806-1441 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2024-07-23T21:26:10.287000Z |
| var-200802-0651 | modules/libpr0n/decoders/bmp/nsBMPDecoder.cpp in Mozilla Firefox before 2.0.0.12, Thunder… | 2024-07-23T21:26:10.434000Z |
| var-201310-0596 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, a… | 2024-07-23T21:26:09.527000Z |
| var-201202-0070 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:26:09.744000Z |
| var-201904-0985 | SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remot… | 2024-07-23T21:26:06.321000Z |