Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43104 |
N/A
|
drm/vc4: Fix a memory leak in hang state error path |
Linux |
Linux |
2026-05-06T07:40:33.036Z | 2026-05-06T07:40:33.036Z |
| CVE-2026-43103 |
N/A
|
net: lapbether: handle NETDEV_PRE_TYPE_CHANGE |
Linux |
Linux |
2026-05-06T07:40:32.357Z | 2026-05-06T07:40:32.357Z |
| CVE-2026-43102 |
N/A
|
net: airoha: Fix memory leak in airoha_qdma_rx_process() |
Linux |
Linux |
2026-05-06T07:40:31.683Z | 2026-05-06T07:40:31.683Z |
| CVE-2026-43101 |
N/A
|
ipv6: ioam: fix potential NULL dereferences in __ioam6… |
Linux |
Linux |
2026-05-06T07:40:30.969Z | 2026-05-06T07:40:30.969Z |
| CVE-2026-43100 |
N/A
|
bridge: guard local VLAN-0 FDB helpers against NULL vl… |
Linux |
Linux |
2026-05-06T07:40:30.309Z | 2026-05-06T07:40:30.309Z |
| CVE-2026-43099 |
N/A
|
ipv4: icmp: fix null-ptr-deref in icmp_build_probe() |
Linux |
Linux |
2026-05-06T07:40:29.567Z | 2026-05-06T07:40:29.567Z |
| CVE-2026-43098 |
N/A
|
nfc: s3fwrn5: allocate rx skb before consuming bytes |
Linux |
Linux |
2026-05-06T07:40:28.845Z | 2026-05-06T07:40:28.845Z |
| CVE-2026-43097 |
N/A
|
PCI: hv: Fix double ida_free in hv_pci_probe error path |
Linux |
Linux |
2026-05-06T07:40:28.157Z | 2026-05-06T07:40:28.157Z |
| CVE-2026-43096 |
N/A
|
mshv: Fix infinite fault loop on permission-denied GPA… |
Linux |
Linux |
2026-05-06T07:40:27.453Z | 2026-05-06T07:40:27.453Z |
| CVE-2026-43095 |
N/A
|
ASoC: SDCA: Fix errors in IRQ cleanup |
Linux |
Linux |
2026-05-06T07:40:26.743Z | 2026-05-06T07:40:26.743Z |
| CVE-2026-43094 |
N/A
|
ixgbevf: add missing negotiate_features op to Hyper-V … |
Linux |
Linux |
2026-05-06T07:40:25.930Z | 2026-05-06T07:40:25.930Z |
| CVE-2026-43093 |
N/A
|
xsk: tighten UMEM headroom validation to account for t… |
Linux |
Linux |
2026-05-06T07:40:25.266Z | 2026-05-06T07:40:25.266Z |
| CVE-2026-43092 |
N/A
|
xsk: validate MTU against usable frame size on bind |
Linux |
Linux |
2026-05-06T07:40:24.619Z | 2026-05-06T07:40:24.619Z |
| CVE-2026-43091 |
N/A
|
xfrm: Wait for RCU readers during policy netns exit |
Linux |
Linux |
2026-05-06T07:40:23.955Z | 2026-05-06T07:40:23.955Z |
| CVE-2026-43090 |
N/A
|
xfrm: fix refcount leak in xfrm_migrate_policy_find |
Linux |
Linux |
2026-05-06T07:40:23.286Z | 2026-05-06T07:40:23.286Z |
| CVE-2026-43089 |
N/A
|
xfrm_user: fix info leak in build_mapping() |
Linux |
Linux |
2026-05-06T07:40:22.630Z | 2026-05-06T07:40:22.630Z |
| CVE-2026-43088 |
N/A
|
net: af_key: zero aligned sockaddr tail in PF_KEY exports |
Linux |
Linux |
2026-05-06T07:40:21.962Z | 2026-05-06T07:40:21.962Z |
| CVE-2026-43087 |
N/A
|
pinctrl: mcp23s08: Disable all pin interrupts during probe |
Linux |
Linux |
2026-05-06T07:40:21.303Z | 2026-05-06T07:40:21.303Z |
| CVE-2026-43086 |
N/A
|
ipvs: fix NULL deref in ip_vs_add_service error path |
Linux |
Linux |
2026-05-06T07:40:20.631Z | 2026-05-06T07:40:20.631Z |
| CVE-2026-43085 |
N/A
|
netfilter: nfnetlink_log: initialize nfgenmsg in NLMSG… |
Linux |
Linux |
2026-05-06T07:40:19.915Z | 2026-05-06T07:40:19.915Z |
| CVE-2026-43084 |
N/A
|
netfilter: nfnetlink_queue: make hash table per queue |
Linux |
Linux |
2026-05-06T07:40:19.253Z | 2026-05-06T07:40:19.253Z |
| CVE-2026-43083 |
N/A
|
net: ioam6: fix OOB and missing lock |
Linux |
Linux |
2026-05-06T07:40:18.504Z | 2026-05-06T07:40:18.504Z |
| CVE-2026-43082 |
N/A
|
net: txgbe: leave space for null terminators on proper… |
Linux |
Linux |
2026-05-06T07:40:17.842Z | 2026-05-06T07:40:17.842Z |
| CVE-2026-43081 |
N/A
|
net: ipa: fix GENERIC_CMD register field masks for IPA v5.0+ |
Linux |
Linux |
2026-05-06T07:40:17.159Z | 2026-05-06T07:40:17.159Z |
| CVE-2026-43080 |
N/A
|
l2tp: Drop large packets with UDP encap |
Linux |
Linux |
2026-05-06T07:40:16.491Z | 2026-05-06T07:40:16.491Z |
| CVE-2026-43079 |
N/A
|
perf/x86/intel/uncore: Skip discovery table for offline dies |
Linux |
Linux |
2026-05-06T07:40:15.767Z | 2026-05-06T07:40:15.767Z |
| CVE-2026-43078 |
N/A
|
crypto: af_alg - Fix page reassignment overflow in af_… |
Linux |
Linux |
2026-05-06T07:40:15.092Z | 2026-05-06T07:40:15.092Z |
| CVE-2026-43077 |
N/A
|
crypto: algif_aead - Fix minimum RX size check for dec… |
Linux |
Linux |
2026-05-06T07:40:14.409Z | 2026-05-06T07:40:14.409Z |
| CVE-2026-43076 |
N/A
|
ocfs2: validate inline data i_size during inode read |
Linux |
Linux |
2026-05-06T07:40:13.634Z | 2026-05-06T07:40:13.634Z |
| CVE-2026-43075 |
N/A
|
ocfs2: fix out-of-bounds write in ocfs2_write_end_inline |
Linux |
Linux |
2026-05-06T07:40:03.337Z | 2026-05-06T07:40:03.337Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43095 |
N/A
|
ASoC: SDCA: Fix errors in IRQ cleanup |
Linux |
Linux |
2026-05-06T07:40:26.743Z | 2026-05-06T07:40:26.743Z |
| CVE-2026-43094 |
N/A
|
ixgbevf: add missing negotiate_features op to Hyper-V … |
Linux |
Linux |
2026-05-06T07:40:25.930Z | 2026-05-06T07:40:25.930Z |
| CVE-2026-43093 |
N/A
|
xsk: tighten UMEM headroom validation to account for t… |
Linux |
Linux |
2026-05-06T07:40:25.266Z | 2026-05-06T07:40:25.266Z |
| CVE-2026-43092 |
N/A
|
xsk: validate MTU against usable frame size on bind |
Linux |
Linux |
2026-05-06T07:40:24.619Z | 2026-05-06T07:40:24.619Z |
| CVE-2026-43091 |
N/A
|
xfrm: Wait for RCU readers during policy netns exit |
Linux |
Linux |
2026-05-06T07:40:23.955Z | 2026-05-06T07:40:23.955Z |
| CVE-2026-43090 |
N/A
|
xfrm: fix refcount leak in xfrm_migrate_policy_find |
Linux |
Linux |
2026-05-06T07:40:23.286Z | 2026-05-06T07:40:23.286Z |
| CVE-2026-43089 |
N/A
|
xfrm_user: fix info leak in build_mapping() |
Linux |
Linux |
2026-05-06T07:40:22.630Z | 2026-05-06T07:40:22.630Z |
| CVE-2026-43088 |
N/A
|
net: af_key: zero aligned sockaddr tail in PF_KEY exports |
Linux |
Linux |
2026-05-06T07:40:21.962Z | 2026-05-06T07:40:21.962Z |
| CVE-2026-43087 |
N/A
|
pinctrl: mcp23s08: Disable all pin interrupts during probe |
Linux |
Linux |
2026-05-06T07:40:21.303Z | 2026-05-06T07:40:21.303Z |
| CVE-2026-43086 |
N/A
|
ipvs: fix NULL deref in ip_vs_add_service error path |
Linux |
Linux |
2026-05-06T07:40:20.631Z | 2026-05-06T07:40:20.631Z |
| CVE-2026-43085 |
N/A
|
netfilter: nfnetlink_log: initialize nfgenmsg in NLMSG… |
Linux |
Linux |
2026-05-06T07:40:19.915Z | 2026-05-06T07:40:19.915Z |
| CVE-2026-43084 |
N/A
|
netfilter: nfnetlink_queue: make hash table per queue |
Linux |
Linux |
2026-05-06T07:40:19.253Z | 2026-05-06T07:40:19.253Z |
| CVE-2026-43083 |
N/A
|
net: ioam6: fix OOB and missing lock |
Linux |
Linux |
2026-05-06T07:40:18.504Z | 2026-05-06T07:40:18.504Z |
| CVE-2026-43082 |
N/A
|
net: txgbe: leave space for null terminators on proper… |
Linux |
Linux |
2026-05-06T07:40:17.842Z | 2026-05-06T07:40:17.842Z |
| CVE-2026-43081 |
N/A
|
net: ipa: fix GENERIC_CMD register field masks for IPA v5.0+ |
Linux |
Linux |
2026-05-06T07:40:17.159Z | 2026-05-06T07:40:17.159Z |
| CVE-2026-43080 |
N/A
|
l2tp: Drop large packets with UDP encap |
Linux |
Linux |
2026-05-06T07:40:16.491Z | 2026-05-06T07:40:16.491Z |
| CVE-2026-43079 |
N/A
|
perf/x86/intel/uncore: Skip discovery table for offline dies |
Linux |
Linux |
2026-05-06T07:40:15.767Z | 2026-05-06T07:40:15.767Z |
| CVE-2026-43078 |
N/A
|
crypto: af_alg - Fix page reassignment overflow in af_… |
Linux |
Linux |
2026-05-06T07:40:15.092Z | 2026-05-06T07:40:15.092Z |
| CVE-2026-43077 |
N/A
|
crypto: algif_aead - Fix minimum RX size check for dec… |
Linux |
Linux |
2026-05-06T07:40:14.409Z | 2026-05-06T07:40:14.409Z |
| CVE-2026-43076 |
N/A
|
ocfs2: validate inline data i_size during inode read |
Linux |
Linux |
2026-05-06T07:40:13.634Z | 2026-05-06T07:40:13.634Z |
| CVE-2026-43075 |
N/A
|
ocfs2: fix out-of-bounds write in ocfs2_write_end_inline |
Linux |
Linux |
2026-05-06T07:40:03.337Z | 2026-05-06T07:40:03.337Z |
| CVE-2026-43074 |
N/A
|
eventpoll: defer struct eventpoll free to RCU grace period |
Linux |
Linux |
2026-05-06T07:21:58.210Z | 2026-05-06T07:21:58.210Z |
| CVE-2026-42509 |
N/A
|
Apache Wicket: crafted strings can break out of the Ja… |
Apache Software Foundation |
Apache Wicket |
2026-05-06T08:34:00.746Z | 2026-05-06T09:51:12.253Z |
| CVE-2026-40010 |
N/A
|
Apache Wicket: possible session fixation using Authent… |
Apache Software Foundation |
Apache Wicket |
2026-05-06T08:34:30.480Z | 2026-05-06T09:51:10.306Z |
| CVE-2026-40001 |
5.2 (3.1)
|
Local privilege escalation vulnerability in ZTE PROCES… |
ZTE |
ZTE PROCESS Guard service |
2026-05-06T08:48:10.466Z | 2026-05-06T15:29:02.257Z |
| CVE-2026-35255 |
6.6 (3.1)
|
Vulnerability in the Oracle Cloud Native Environm… |
Oracle Corporation |
Oracle Cloud Native Environment Command Line Interface |
2026-05-06T08:05:59.070Z | 2026-05-06T13:01:24.072Z |
| CVE-2026-1719 |
7.5 (3.1)
|
Gravity Bookings <= 2.5.9 - Unauthenticated SQL Inject… |
GravityMore |
Gravity Bookings |
2026-05-06T09:27:48.508Z | 2026-05-06T14:34:37.725Z |
| CVE-2026-7841 |
8.8 (3.1)
|
GV-ASWeb Remote Code Execution (RCE) vulnerability |
GeoVision Inc. |
ASManager |
2026-05-06T06:47:53.765Z | 2026-05-07T01:13:11.587Z |
| CVE-2026-7457 |
6.4 (3.1)
|
LatePoint <= 5.5.0 - Authenticated (Subscriber+) Store… |
latepoint |
LatePoint – Calendar Booking Plugin for Appointments and Events |
2026-05-06T06:47:21.090Z | 2026-05-06T12:58:22.624Z |
| CVE-2026-7448 |
7.2 (3.1)
|
LatePoint <= 5.5.0 - Unauthenticated Stored Cross-Site… |
latepoint |
LatePoint – Calendar Booking Plugin for Appointments and Events |
2026-05-06T06:47:21.950Z | 2026-05-06T12:20:33.617Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-25227 | authentik is an open-source identity provider. From 2021.3.1 to before 2025.8.6, 2025.10.4, and 202… | 2026-02-12T20:16:10.313 | 2026-02-19T15:25:12.283 |
| fkie_cve-2026-24895 | FrankenPHP is a modern application server for PHP. Prior to 1.11.2, FrankenPHP’s CGI path splitting… | 2026-02-12T20:16:10.170 | 2026-02-20T18:30:00.857 |
| fkie_cve-2026-24894 | FrankenPHP is a modern application server for PHP. Prior to 1.11.2, when running FrankenPHP in work… | 2026-02-12T20:16:10.020 | 2026-02-20T18:31:06.207 |
| fkie_cve-2026-24044 | Element Server Suite Community Edition (ESS Community) deploys a Matrix stack using the provided He… | 2026-02-12T20:16:09.237 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-70314 | webfsd 1.21 is vulnerable to a Buffer Overflow via a crafted request. This is due to the filename v… | 2026-02-12T20:16:03.133 | 2026-02-18T19:53:35.620 |
| fkie_cve-2025-67433 | A heap buffer overflow in the processRequest function of Open TFTP Server MultiThreaded v1.7 allows… | 2026-02-12T20:16:02.877 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-67432 | A stack overflow in the ZBarcode_Encode function of Monkeybread Software MBS DynaPDF Plugin v21.3.1… | 2026-02-12T20:16:02.573 | 2026-04-15T00:35:42.020 |
| fkie_cve-2019-25348 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-02-12T20:16:01.940 | 2026-02-13T16:16:09.530 |
| fkie_cve-2019-25347 | thesystem App 1.0 contains a SQL injection vulnerability that allows attackers to bypass authentica… | 2026-02-12T20:16:01.773 | 2026-03-02T15:16:23.087 |
| fkie_cve-2019-25346 | TheSystem 1.0 contains a SQL injection vulnerability that allows attackers to bypass authentication… | 2026-02-12T20:16:01.593 | 2026-03-02T15:16:22.840 |
| fkie_cve-2019-25345 | Realtek IIS Codec Service 6.4.10041.133 contains an unquoted service path vulnerability that allows… | 2026-02-12T20:16:01.420 | 2026-04-15T00:35:42.020 |
| fkie_cve-2019-25344 | Wondershare MobileGo 8.5.0 contains an insecure file permissions vulnerability that allows local us… | 2026-02-12T20:16:01.233 | 2026-02-26T23:26:16.010 |
| fkie_cve-2019-25343 | NextVPN 4.10 contains an insecure file permissions vulnerability that allows local users to modify … | 2026-02-12T20:16:00.010 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-26219 | newbee-mall stores and verifies user passwords using an unsalted MD5 hashing algorithm. The impleme… | 2026-02-12T19:15:52.300 | 2026-02-25T16:40:13.200 |
| fkie_cve-2026-26218 | newbee-mall includes pre-seeded administrator accounts in its database initialization script. These… | 2026-02-12T19:15:52.120 | 2026-02-25T16:41:25.410 |
| fkie_cve-2026-22821 | mreporting is the more reporting GLPI plugin. Prior to 1.9.4, there is a possible SQL injection on … | 2026-02-12T19:15:51.883 | 2026-02-20T18:20:33.927 |
| fkie_cve-2026-21438 | webtransport-go is an implementation of the WebTransport protocol. Prior to 0.10.0, an attacker can… | 2026-02-12T19:15:51.677 | 2026-02-19T22:50:30.217 |
| fkie_cve-2026-21435 | webtransport-go is an implementation of the WebTransport protocol. Prior to v0.10.0, an attacker ca… | 2026-02-12T19:15:51.503 | 2026-02-19T22:51:49.417 |
| fkie_cve-2026-21434 | webtransport-go is an implementation of the WebTransport protocol. From 0.3.0 to 0.9.0, an attacker… | 2026-02-12T19:15:51.333 | 2026-02-19T22:53:24.643 |
| fkie_cve-2025-70981 | CordysCRM 1.4.1 is vulnerable to SQL Injection in the employee list query interface (/user/list) vi… | 2026-02-12T18:16:08.880 | 2026-02-18T19:54:25.737 |
| fkie_cve-2025-69807 | p2r3 Bareiron commit: 8e4d4020d is vulnerable to Buffer Overflow, which allows unauthenticated remo… | 2026-02-12T18:16:08.763 | 2026-02-23T17:20:35.473 |
| fkie_cve-2025-69806 | p2r3 bareiron commit: 8e4d4020d contains an Out-of-bounds Read, which allows unauthenticated remote… | 2026-02-12T18:16:08.657 | 2026-02-23T17:21:48.243 |
| fkie_cve-2025-63421 | An issue in filosoft Comerc.32 Commercial Invoicing v.16.0.0.3 allows a local attacker to execute a… | 2026-02-12T18:16:08.547 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-54519 | A DLL hijacking vulnerability in Doc Nav could allow a local attacker to achieve privilege escalati… | 2026-02-12T18:16:08.417 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-52533 | Improper Access Control in an on-chip debug interface could allow a privileged attacker to enable a… | 2026-02-12T18:16:08.263 | 2026-04-15T00:35:42.020 |
| fkie_cve-2024-36319 | Debug code left active in AMD's Video Decoder Engine Firmware (VCN FW) could allow a attacker to su… | 2026-02-12T18:16:06.270 | 2026-04-15T00:35:42.020 |
| fkie_cve-2023-31323 | Type confusion in the AMD Secure Processor (ASP) could allow an attacker to pass a malformed argume… | 2026-02-12T18:16:06.120 | 2026-04-15T00:35:42.020 |
| fkie_cve-2023-20601 | Improper input validation within RAS TA Driver can allow a local attacker to access out-of-bounds m… | 2026-02-12T18:16:05.983 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-61880 | In Infoblox NIOS through 9.0.7, insecure deserialization can result in remote code execution. | 2026-02-12T17:16:05.380 | 2026-02-19T15:55:38.907 |
| fkie_cve-2025-61879 | In Infoblox NIOS through 9.0.7, a High-Privileged User Can Trigger an Arbitrary File Write via the … | 2026-02-12T17:16:05.277 | 2026-02-19T15:55:56.423 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-rhcj-6wxj-r34p |
|
In the Linux kernel, the following vulnerability has been resolved: tcp: fix potential race in tcp… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-rfv7-274m-vphw |
|
In the Linux kernel, the following vulnerability has been resolved: media: cx25821: Fix a resource… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-qpxp-qjrm-7f7r |
|
In the Linux kernel, the following vulnerability has been resolved: ceph: do not propagate page ar… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-qjw7-wgfm-9frq |
|
In the Linux kernel, the following vulnerability has been resolved: media: v4l2-async: Fix error h… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-h3wc-x575-rqjq |
|
In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: Fix swapped par… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-cvxc-xfv3-gf64 |
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix "scheduling whi… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-8x8h-4g2v-qpf2 |
|
In the Linux kernel, the following vulnerability has been resolved: ipv6: ioam: fix heap buffer ov… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-8h7q-934r-3xxv |
|
In the Linux kernel, the following vulnerability has been resolved: soc: ti: pruss: Fix double fre… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-8h5h-g93f-3ff6 |
|
In the Linux kernel, the following vulnerability has been resolved: xfs: delete attr leaf freemap … | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-7ghh-wj4j-cfv3 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate user queu… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-7gfx-7jvh-p5vw |
|
In the Linux kernel, the following vulnerability has been resolved: nfsd: fix nfs4_file refcount l… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-6g7r-xrvq-rpc8 |
|
In the Linux kernel, the following vulnerability has been resolved: net: consume xmit errors of GS… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-3vfw-27w6-rr78 |
|
In the Linux kernel, the following vulnerability has been resolved: dm mpath: Add missing dm_put_d… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-395h-h5jq-ggp6 |
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_tcpmss: check re… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-2m7x-2cj2-wg69 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Adjust PHY FS… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-25mj-mfqw-xqm2 |
|
In the Linux kernel, the following vulnerability has been resolved: netconsole: avoid OOB reads, m… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-2439-4xrr-7j2r |
|
In the Linux kernel, the following vulnerability has been resolved: APEI/GHES: ARM processor Error… | 2026-05-06T12:30:32Z | 2026-05-06T12:30:32Z |
| ghsa-x976-429q-rjpm |
|
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: Move vbus d… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-vq8h-ghh5-4h7f |
|
In the Linux kernel, the following vulnerability has been resolved: udplite: Fix null-ptr-deref in… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-vpc5-6pmj-q288 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/buddy: Prevent BUG_ON by v… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-v6h5-rjwv-4cvj |
|
In the Linux kernel, the following vulnerability has been resolved: EFI/CPER: don't dump the entir… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-qfxp-89fr-h27x |
|
In the Linux kernel, the following vulnerability has been resolved: media: ccs: Avoid possible div… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-m75h-8jqh-gvwj |
|
In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix reflink preserve cl… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-m5gj-w75c-gcxx |
|
In the Linux kernel, the following vulnerability has been resolved: media: tegra-video: Fix memory… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-m3w5-78ch-j8hg |
|
In the Linux kernel, the following vulnerability has been resolved: io_uring/zcrx: fix post open e… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-jph2-qvw9-vvwq |
|
In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Skip dev-iotlb flu… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-jpc7-m93r-5874 |
|
In the Linux kernel, the following vulnerability has been resolved: media: ipu6: Fix RPM reference… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-gvr9-3x96-5w99 |
|
In the Linux kernel, the following vulnerability has been resolved: gpio: sysfs: fix chip removal … | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-gq4c-7253-q3cg |
|
In the Linux kernel, the following vulnerability has been resolved: net: usb: kaweth: remove TX qu… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ghsa-g589-97cx-27m9 |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: pci: validate rel… | 2026-05-06T12:30:31Z | 2026-05-06T12:30:31Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-125 |
|
FPE in paddle.trace in PaddlePaddle before 2.5.0. This flaw can cause a runtime crash and… | paddlepaddle | 2023-07-26T12:15:00+00:00 | 2023-07-26T14:25:58.693754+00:00 |
| pysec-2023-124 |
|
Heap buffer overflow in paddle.trace in PaddlePaddle before 2.5.0. This flaw can lead to … | paddlepaddle | 2023-07-26T11:15:00+00:00 | 2023-07-26T12:51:10.139446+00:00 |
| pysec-2023-123 |
|
Null pointer dereference in paddle.flip in PaddlePaddle before 2.5.0. This resulted in a … | paddlepaddle | 2023-07-26T11:15:00+00:00 | 2023-07-26T12:51:10.092120+00:00 |
| pysec-2023-122 |
|
Use after free in paddle.diagonal in PaddlePaddle before 2.5.0. This resulted in a potent… | paddlepaddle | 2023-07-26T10:15:00+00:00 | 2023-07-26T12:51:10.047714+00:00 |
| pysec-2023-132 |
6.1 (3.1)
|
copyparty is file server software. Prior to version 1.8.7, the application contains a ref… | copyparty | 2023-07-25T22:15:00+00:00 | 2023-08-02T20:24:02.446410+00:00 |
| pysec-2023-133 |
5.3 (3.1)
|
Vyper is a Pythonic programming language that targets the Ethereum Virtual Machine (EVM).… | vyper | 2023-07-25T21:15:00+00:00 | 2023-08-03T18:27:50.332832+00:00 |
| pysec-2023-130 |
6.5 (3.1)
|
Sentry is an error tracking and performance monitoring platform. Starting in version 8.21… | sentry | 2023-07-25T19:15:00+00:00 | 2023-08-02T16:31:39.850029+00:00 |
| pysec-2023-129 |
5.4 (3.1)
|
Indico is an open source a general-purpose, web based event management tool. There is a C… | indico | 2023-07-21T19:15:00+00:00 | 2023-07-31T20:36:08.003610+00:00 |
| pysec-2023-120 |
|
### Impact aiohttp v3.8.4 and earlier are [bundled with llhttp v6.0.6](https://github.co… | aiohttp | 2023-07-20T14:52:00+00:00 | 2023-07-24T14:58:05.562874+00:00 |
| pysec-2023-128 |
2.8 (3.1)
|
A flaw was found in the keylime attestation verifier, which fails to flag a device's subm… | keylime | 2023-07-19T19:15:00+00:00 | 2023-07-28T16:31:09.279625+00:00 |
| pysec-2023-117 |
|
A ReDoS issue was discovered in pygments/lexers/smithy.py in pygments through 2.15.0 via … | pygments | 2023-07-19T15:15:00+00:00 | 2023-07-19T17:26:16.938508+00:00 |
| pysec-2023-308 |
10.0 (3.1)
|
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0. | mlflow | 2023-07-19T01:15:10+00:00 | 2025-04-09T17:27:26.223213+00:00 |
| pysec-2023-312 |
5.9 (3.1)
|
Redis before 6cbea7d allows a replica to cause an assertion failure in a primary server b… | redis | 2023-07-15T23:15:09Z | 2025-06-02T11:48:06.372423Z |
| pysec-2023-127 |
|
Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traver… | copyparty | 2023-07-14T20:15:00+00:00 | 2023-07-27T20:23:01.674307+00:00 |
| pysec-2023-112 |
|
The cryptography package before 41.0.2 for Python mishandles SSH certificates that have c… | cryptography | 2023-07-14T20:15:00+00:00 | 2023-08-21T15:28:13.372385+00:00 |
| pysec-2023-119 |
|
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows unautho… | apache-airflow | 2023-07-12T10:15:00+00:00 | 2023-07-20T19:19:47.109731+00:00 |
| pysec-2023-106 |
|
Apache Airflow, versions before 2.6.3, has a vulnerability where an authenticated user ca… | apache-airflow | 2023-07-12T10:15:00+00:00 | 2023-07-12T12:59:56.816194+00:00 |
| pysec-2023-105 |
|
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an atta… | apache-airflow | 2023-07-12T10:15:00+00:00 | 2023-07-12T12:59:56.733680+00:00 |
| pysec-2023-104 |
|
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an atta… | apache-airflow | 2023-07-12T10:15:00+00:00 | 2023-07-12T12:59:56.649145+00:00 |
| pysec-2023-103 |
|
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an unau… | apache-airflow | 2023-07-12T10:15:00+00:00 | 2023-07-12T12:59:56.564522+00:00 |
| pysec-2023-118 |
|
RestrictedPython is a tool that helps to define a subset of the Python language which all… | restrictedpython | 2023-07-11T18:15:00+00:00 | 2023-07-19T20:24:12.944004+00:00 |
| pysec-2023-116 |
|
xalpha v0.11.4 is vulnerable to Remote Command Execution (RCE). | xalpha | 2023-07-11T15:15:00+00:00 | 2023-07-18T16:37:19.127985+00:00 |
| pysec-2023-115 |
|
Sentry is an error tracking and performance monitoring platform. Starting in version 23.6… | sentry | 2023-07-06T23:15:00+00:00 | 2023-07-17T20:27:52.414117+00:00 |
| pysec-2023-114 |
|
** DISPUTED ** A use-after-free issue was discovered in Py_FindObjects() function in SciP… | scipy | 2023-07-06T21:15:00+00:00 | 2023-07-17T20:27:52.117232+00:00 |
| pysec-2023-111 |
|
SQLFluff is a SQL linter. Prior to version 2.1.2, in environments where untrusted users h… | sqlfluff | 2023-07-06T16:15:00+00:00 | 2023-07-13T21:23:24.026294+00:00 |
| pysec-2023-110 |
|
SQL injection vulnerability in langchain v.0.0.64 allows a remote attacker to obtain sens… | langchain | 2023-07-06T14:15:00Z | 2023-08-28T16:50:24.862628Z |
| pysec-2023-109 |
|
An issue in langchain v.0.0.64 allows a remote attacker to execute arbitrary code via the… | langchain | 2023-07-06T14:15:00Z | 2023-08-29T16:42:00.000000Z |
| pysec-2023-107 |
|
Fides is an open-source privacy engineering platform for managing the fulfillment of data… | ethyca-fides | 2023-07-05T22:15:00+00:00 | 2023-07-12T16:35:41.463418+00:00 |
| pysec-2023-108 |
|
MechanicalSoup is a Python library for automating interaction with websites. Starting in … | mechanicalsoup | 2023-07-05T20:15:00+00:00 | 2023-07-12T18:32:48.148340+00:00 |
| pysec-2023-101 |
|
A cross-site scripting (XSS) vulnerability in Selenium Grid v3.141.59 allows attackers to… | selenium | 2023-07-05T18:15:00Z | 2023-08-31T20:11:41.543920Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2822 | Malicious code in ing-web-v5 (npm) | 2026-04-17T02:00:34Z | 2026-04-23T20:50:50Z |
| mal-2026-2821 | Malicious code in robase-quick-install (PyPI) | 2026-04-16T22:30:00Z | 2026-05-03T20:49:49Z |
| mal-2026-2820 | Malicious code in chainutils (PyPI) | 2026-04-16T21:15:50Z | 2026-04-16T22:20:32Z |
| mal-2026-2895 | Malicious code in chai-as-optimized (npm) | 2026-04-16T20:36:13Z | 2026-04-23T20:50:50Z |
| mal-2026-2891 | Malicious code in chai-as-init (npm) | 2026-04-16T20:36:13Z | 2026-04-23T20:50:50Z |
| mal-2026-2890 | Malicious code in chai-as-ide (npm) | 2026-04-16T20:36:13Z | 2026-04-29T12:53:28Z |
| mal-2026-2819 | Malicious code in pynosist (PyPI) | 2026-04-16T17:48:29Z | 2026-04-16T22:20:32Z |
| mal-2026-2818 | Malicious code in genosys (PyPI) | 2026-04-16T17:48:14Z | 2026-04-16T22:20:32Z |
| mal-2026-2817 | Malicious code in lightweight-charts-4.1 (npm) | 2026-04-16T17:35:59Z | 2026-04-23T20:50:51Z |
| mal-2026-2914 | Malicious code in modern-events (npm) | 2026-04-16T15:24:25Z | 2026-04-24T20:32:58Z |
| mal-2026-2702 | Malicious code in emergentintegrations (PyPI) | 2026-04-16T14:03:42Z | 2026-04-16T14:42:29Z |
| mal-2026-2701 | Malicious code in sanitize-url (npm) | 2026-04-16T13:51:15Z | 2026-04-23T20:50:52Z |
| mal-2026-2700 | Malicious code in conventional-changelog-dash (npm) | 2026-04-16T12:15:47Z | 2026-04-23T20:50:50Z |
| mal-2026-2816 | Malicious code in monolith-twirp-pullsd-users (RubyGems) | 2026-04-16T10:28:47Z | 2026-04-16T10:28:47Z |
| mal-2026-2815 | Malicious code in monolith-twirp-pullsd-authorization (RubyGems) | 2026-04-16T10:28:47Z | 2026-04-16T10:28:47Z |
| mal-2026-2814 | Malicious code in gitlab-orchestrator (RubyGems) | 2026-04-16T10:28:44Z | 2026-04-16T10:28:44Z |
| mal-2026-2813 | Malicious code in requests-testik11 (PyPI) | 2026-04-16T10:27:40Z | 2026-04-16T10:27:40Z |
| mal-2026-2812 | Malicious code in requests-test-test44 (PyPI) | 2026-04-16T10:27:40Z | 2026-04-16T10:27:40Z |
| mal-2026-2811 | Malicious code in requests-test-test3 (PyPI) | 2026-04-16T10:27:39Z | 2026-04-16T10:27:39Z |
| mal-2026-2810 | Malicious code in requests-test-test2 (PyPI) | 2026-04-16T10:27:39Z | 2026-04-16T10:27:39Z |
| mal-2026-2809 | Malicious code in bombonsec-test-123 (PyPI) | 2026-04-16T10:25:26Z | 2026-04-16T10:25:26Z |
| mal-2026-2808 | Malicious code in wpfuihelpercore (NuGet) | 2026-04-16T10:25:01Z | 2026-04-16T10:25:01Z |
| mal-2026-2807 | Malicious code in jjrawlins.cdkiampolicybuilderhelper (NuGet) | 2026-04-16T10:24:59Z | 2026-04-16T10:24:59Z |
| mal-2026-2806 | Malicious code in youpin (npm) | 2026-04-16T10:24:22Z | 2026-04-23T20:50:52Z |
| mal-2026-2805 | Malicious code in winston-prisma (npm) | 2026-04-16T10:23:34Z | 2026-04-23T20:50:52Z |
| mal-2026-2804 | Malicious code in transcript-viewer-ui-demo (npm) | 2026-04-16T10:21:08Z | 2026-04-23T20:50:52Z |
| mal-2026-2803 | Malicious code in tailwind-configuration (npm) | 2026-04-16T10:19:18Z | 2026-04-23T20:50:52Z |
| mal-2026-2802 | Malicious code in synthetics-sdk-node (npm) | 2026-04-16T10:19:13Z | 2026-04-23T20:50:52Z |
| mal-2026-2801 | Malicious code in sfx-data (npm) | 2026-04-16T10:17:01Z | 2026-04-23T20:50:52Z |
| mal-2026-2800 | Malicious code in separadordeinfo (npm) | 2026-04-16T10:16:50Z | 2026-04-23T20:50:52Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2488 | Red Hat Enterprise Linux (SSSD, libsoup): Mehrere Schwachstellen | 2025-11-04T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2485 | cURL (wcurl): Schwachstelle ermöglicht Manipulation von Dateien | 2025-11-03T23:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2483 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-11-03T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2475 | Apple macOS: Mehrere Schwachstellen | 2025-11-03T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2474 | Android Patchday November 2025: Multiple Vulnerabilities | 2025-11-03T23:00:00.000+00:00 | 2025-11-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2473 | Apple iOS: Mehrere Schwachstellen | 2025-11-03T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2472 | Samsung Android: Mehrere Schwachstellen | 2025-11-03T23:00:00.000+00:00 | 2025-12-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2468 | CPython: Schwachstelle ermöglicht Denial of Service | 2025-11-02T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2466 | QEMU e1000 Network Devices: Schwachstelle ermöglicht Denial of Service | 2025-11-02T23:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2025-2464 | OpenSMTP: Schwachstelle ermöglicht Denial of Service | 2025-11-02T23:00:00.000+00:00 | 2025-11-20T23:00:00.000+00:00 |
| wid-sec-w-2025-2450 | Linux Kernel: Mehrere Schwachstellen | 2025-10-29T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2449 | GIMP: Schwachstelle ermöglicht Codeausführung | 2025-10-29T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2445 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2025-10-29T23:00:00.000+00:00 | 2025-11-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2444 | Dell Secure Connect Gateway: Mehrere Schwachstellen | 2025-10-29T23:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2441 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-29T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2436 | Xwayland und X.Org X11: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-10-28T23:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2435 | D-LINK Aquila Pro AI R15: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2025-10-28T23:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2433 | Google Cloud Platform (Envoy Proxy):: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-28T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2431 | Linux Kernel: Mehrere Schwachstellen | 2025-10-28T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2430 | Linux Kernel: Mehrere Schwachstellen | 2025-10-27T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2427 | strongSwan (eap-mschapv2 plugin): Schwachstelle ermöglicht Codeausführung und DoS | 2025-10-27T23:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2420 | Apache Tomcat: Mehrere Schwachstellen | 2025-10-27T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2416 | Proxmox Backup Server: Mehrere Schwachstellen | 2025-10-26T23:00:00.000+00:00 | 2025-11-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2409 | Xen: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-10-26T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2407 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-26T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2404 | AMD “Zen 5” Prozessoren: Schwachstelle gefährdet Vertraulichkeit und Integrität | 2025-10-23T22:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2403 | Ubiquiti UniFi: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-10-23T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2398 | Moxa Switch: Mehrere Schwachstellen | 2025-10-23T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2396 | Hashicorp Vault: Mehrere Schwachstellen | 2025-10-23T22:00:00.000+00:00 | 2025-11-24T23:00:00.000+00:00 |
| wid-sec-w-2025-2395 | Rancher Manager: Mehrere Schwachstellen | 2025-10-23T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-140-09 | AutomationDirect MB-Gateway | 2025-05-20T06:00:00.000000Z | 2025-05-20T06:00:00.000000Z |
| icsa-25-140-03 | Danfoss AK-SM 8xxA Series (Update A) | 2025-05-20T06:00:00.000000Z | 2025-08-26T06:00:00.000000Z |
| icsa-25-140-02 | National Instruments Circuit Design Suite | 2025-05-20T06:00:00.000000Z | 2025-05-20T06:00:00.000000Z |
| icsa-25-140-01 | ABUP IoT Cloud Platform | 2025-05-20T06:00:00.000000Z | 2025-05-20T06:00:00.000000Z |
| icsa-25-140-04 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products (Update F) | 2025-05-20T04:00:00.000000Z | 2026-04-07T05:00:00.000000Z |
| va-25-136-01 | IBM Security Guardium stored cross-site scripting | 2025-05-16T20:14:51Z | 2025-06-16T00:00:00Z |
| icsa-25-135-20 | Schneider Electric EcoStruxure Power Build Rapsody | 2025-05-15T06:00:00.000000Z | 2025-05-15T06:00:00.000000Z |
| icsa-25-135-19 | ECOVACS DEEBOT Vacuum and Base Station (Update A) | 2025-05-15T06:00:00.000000Z | 2025-07-10T06:00:00.000000Z |
| icsa-25-140-05 | Siemens Siveillance Video | 2025-05-14T00:00:00.000000Z | 2025-05-14T00:00:00.000000Z |
| icsa-25-133-04 | ABB Automation Builder | 2025-05-13T06:00:00.000000Z | 2025-05-13T06:00:00.000000Z |
| icsa-25-153-02 | Schneider Electric EcoStruxure Power Build Rapsody | 2025-05-13T04:00:00.000000Z | 2025-05-13T04:00:00.000000Z |
| icsa-25-140-08 | Schneider Electric Modicon Controllers (Update B) | 2025-05-13T04:00:00.000000Z | 2025-10-14T07:00:00.000000Z |
| icsa-25-140-07 | Schneider Electric Galaxy VS, Galaxy VL, Galaxy VXL (Update A) | 2025-05-13T04:00:00.000000Z | 2025-09-24T04:00:00.000000Z |
| icsa-25-140-06 | Schneider Electric PrismaSeT Active - Wireless Panel Server | 2025-05-13T04:00:00.000000Z | 2025-05-13T04:00:00.000000Z |
| icsa-25-148-02 | Siemens SiPass Integrated | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-135-18 | Siemens SCALANCE LPE9403 | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-135-17 | Siemens RUGGEDCOM ROX II | 2025-05-13T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-135-16 | Siemens MS/TP Point Pickup Module | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-135-15 | Siemens Mendix OIDC SSO | 2025-05-13T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-25-135-14 | Siemens APOGEE PXC and TALON TC Series | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-135-13 | Siemens SIRIUS | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-135-12 | Siemens SIMATIC PCS | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-135-11 | Siemens Polarion | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-135-10 | Siemens OZW Web Servers | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-135-09 | Siemens User Management Component (UMC) | 2025-05-13T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-135-08 | Siemens VersiCharge AC Series EV Chargers | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-135-07 | Siemens SIMATIC IPC RS-828A | 2025-05-13T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-135-06 | Siemens Teamcenter Visualization | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-135-05 | Siemens SIPROTEC and SICAM | 2025-05-13T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-135-04 | Siemens Desigo | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-uipphone-xss-ncmuykqa | Cisco IP Phone Stored Cross-Site Scripting Vulnerability | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-secure-endpoint-dos-rzogfknd | Cisco Secure Endpoint for Windows Scanning Evasion Vulnerability | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-ise-mult-j-kxpnynr | Cisco Identity Services Engine Vulnerabilities | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-appd-php-authpriv-gebwtvu5 | Cisco AppDynamics PHP Agent Privilege Escalation Vulnerability | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-accsc-dos-9slzkz8 | Cisco Secure Client Software Denial of Service Vulnerabilities | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-snort-ftd-zxytnjom | Multiple Cisco Products Snort FTP Inspection Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-sa-ftd-snort3-urldos-occfqtex | Cisco Firepower Threat Defense Software SSL/TLS URL Category and Snort 3 Detection Engine Bypass and Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ise-injection-qexegrcw | Cisco Identity Services Engine Command Injection Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ise-file-upload-fcelp4xs | Cisco Identity Services Engine Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftdsnort3sip-bypass-lmz2thkn | Cisco Firepower Threat Defense Software Snort 3 Geolocation IP Filter Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-snort3acp-bypass-3bdr2beh | Multiple Cisco Products Snort 3 Access Control Policy Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2024-02-06T18:30:17+00:00 |
| cisco-sa-ftd-snort3-uanuntcv | Cisco Firepower Threat Defense Software Snort 3 Detection Engine Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-snort3-8u4hhxh8 | Cisco Firepower Threat Defense Software SSL and Snort 3 Detection Engine Bypass and Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-smbsnort3-dos-pfojoyuv | Cisco Firepower Threat Defense Software SMB Protocol Snort 3 Detection Engine Bypass and Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-intrusion-dos-dft7wygc | Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Firewalls Inspection Rules Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-icmpv6-dos-4emklun | Cisco Firepower Threat Defense Software and Cisco FirePOWER Services ICMPv6 with Snort 2 Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-16T21:10:27+00:00 |
| cisco-sa-ftd-fmc-code-inj-wshrgz8l | Cisco Firepower Threat Defense Software and Firepower Management Center Software Code Injection Vulnerability | 2023-11-01T16:00:00+00:00 | 2024-10-23T15:57:47+00:00 |
| cisco-sa-fmc-xss-sk2gkfvj | Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-logview-dos-ayjdex55 | Cisco Firepower Management Center Software Log API Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-file-download-7js4ug2j | Cisco Firepower Management Center Software Arbitrary File Download Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-cmdinj-btegufox | Cisco Firepower Management Center Software Command Injection Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-29mp49hn | Cisco Firepower Management Center Software Command Injection Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-cms-segfault-g6es4ve8 | Cisco Meeting Server Web Bridge Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asaftd-ssl-dos-kxg8mpua | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software AnyConnect SSL/TLS VPN Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asaftd-saml-hijack-ttuqfyz | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SAML Assertion Hijack Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asaftd-multi-cert-dza3h5pt | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access SSL VPN Multiple Certificate Authentication Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asaftd-ac-acl-bypass-bwd7q6gb | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software AnyConnect Access Control List Bypass Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asa-webvpn-dos-3ghzqbas | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access VPN Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-02T13:47:35+00:00 |
| cisco-sa-asa-icmpv6-t5tzqwnd | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software ICMPv6 Message Processing Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-02T13:50:35+00:00 |
| cisco-sa-sdwan-lfi-owlbkuge | Cisco Catalyst SD-WAN Manager Local File Inclusion Vulnerability | 2023-10-18T16:00:00+00:00 | 2023-10-18T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-31579 | wireguard: device: use exit_rtnl callback instead of manual rtnl_lock in pre_exit | 2026-04-02T00:00:00.000Z | 2026-04-29T14:41:52.000Z |
| msrc_cve-2026-31578 | media: as102: fix to not free memory after the device is registered in as102_usb_probe() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:43:59.000Z |
| msrc_cve-2026-31577 | nilfs2: fix NULL i_assoc_inode dereference in nilfs_mdt_save_to_shadow_map | 2026-04-02T00:00:00.000Z | 2026-05-01T14:40:56.000Z |
| msrc_cve-2026-31576 | media: hackrf: fix to not free memory after the device is registered in hackrf_probe() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:43:12.000Z |
| msrc_cve-2026-31575 | mm/userfaultfd: fix hugetlb fault mutex hash calculation | 2026-04-02T00:00:00.000Z | 2026-04-29T14:39:11.000Z |
| msrc_cve-2026-31574 | clockevents: Add missing resets of the next_event_forced flag | 2026-04-02T00:00:00.000Z | 2026-04-29T14:55:01.000Z |
| msrc_cve-2026-31570 | can: gw: fix OOB heap access in cgw_csum_crc8_rel() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:56:43.000Z |
| msrc_cve-2026-31568 | s390/mm: Add missing secure storage access fixups for donated memory | 2026-04-02T00:00:00.000Z | 2026-04-29T14:38:43.000Z |
| msrc_cve-2026-31566 | drm/amdgpu: Fix fence put before wait in amdgpu_amdkfd_submit_ib | 2026-04-02T00:00:00.000Z | 2026-04-29T14:55:58.000Z |
| msrc_cve-2026-31565 | RDMA/irdma: Fix deadlock during netdev reset with active connections | 2026-04-02T00:00:00.000Z | 2026-04-29T14:57:41.000Z |
| msrc_cve-2026-31563 | net: macb: Use dev_consume_skb_any() to free TX SKBs | 2026-04-02T00:00:00.000Z | 2026-04-29T14:58:53.000Z |
| msrc_cve-2026-31560 | spi: spi-dw-dma: fix print error log when wait finish transaction | 2026-04-02T00:00:00.000Z | 2026-04-29T15:00:42.000Z |
| msrc_cve-2026-31557 | nvmet: move async event work off nvmet-wq | 2026-04-02T00:00:00.000Z | 2026-04-29T14:51:36.000Z |
| msrc_cve-2026-31555 | futex: Clear stale exiting pointer in futex_lock_pi() retry path | 2026-04-02T00:00:00.000Z | 2026-04-29T14:51:52.000Z |
| msrc_cve-2026-31552 | wifi: wlcore: Return -ENOMEM instead of -EAGAIN if there is not enough headroom | 2026-04-02T00:00:00.000Z | 2026-04-29T01:02:32.000Z |
| msrc_cve-2026-31551 | wifi: mac80211: Fix static_branch_dec() underflow for aql_disable. | 2026-04-02T00:00:00.000Z | 2026-04-29T01:02:26.000Z |
| msrc_cve-2026-31550 | pmdomain: bcm: bcm2835-power: Increase ASB control timeout | 2026-04-02T00:00:00.000Z | 2026-04-29T01:02:20.000Z |
| msrc_cve-2026-31549 | i2c: cp2615: fix serial string NULL-deref at probe | 2026-04-02T00:00:00.000Z | 2026-04-29T01:02:15.000Z |
| msrc_cve-2026-31548 | wifi: cfg80211: cancel pmsr_free_wk in cfg80211_pmsr_wdev_down | 2026-04-02T00:00:00.000Z | 2026-04-29T01:02:09.000Z |
| msrc_cve-2026-31546 | net: bonding: fix NULL deref in bond_debug_rlb_hash_show | 2026-04-02T00:00:00.000Z | 2026-04-30T01:10:18.000Z |
| msrc_cve-2026-31545 | NFC: nxp-nci: allow GPIOs to sleep | 2026-04-02T00:00:00.000Z | 2026-04-30T01:10:09.000Z |
| msrc_cve-2026-31540 | drm/i915/gt: Check set_default_submission() before deferencing | 2026-04-02T00:00:00.000Z | 2026-04-30T01:10:00.000Z |
| msrc_cve-2026-31537 | smb: server: make use of smbdirect_socket.send_io.bcredits | 2026-04-02T00:00:00.000Z | 2026-04-30T01:38:55.000Z |
| msrc_cve-2026-31536 | smb: server: let send_done handle a completion without IB_SEND_SIGNALED | 2026-04-02T00:00:00.000Z | 2026-04-30T01:02:50.000Z |
| msrc_cve-2026-31533 | net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption | 2026-04-02T00:00:00.000Z | 2026-05-01T14:46:51.000Z |
| msrc_cve-2026-31532 | can: raw: fix ro->uniq use-after-free in raw_rcv() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:38:59.000Z |
| msrc_cve-2026-31531 | ipv4: nexthop: allocate skb dynamically in rtm_get_nexthop() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:14:00.000Z |
| msrc_cve-2026-31530 | cxl/port: Fix use after free of parent_port in cxl_detach_ep() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:47:15.000Z |
| msrc_cve-2026-31528 | perf: Make sure to use pmu_ctx->pmu for groups | 2026-04-02T00:00:00.000Z | 2026-04-29T14:45:59.000Z |
| msrc_cve-2026-31527 | driver core: platform: use generic driver_override infrastructure | 2026-04-02T00:00:00.000Z | 2026-04-30T01:43:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0059 | Kwetsbaarheid verholpen in Fortinet FortiOS | 2025-02-13T09:29:35.625977Z | 2025-02-13T09:29:35.625977Z |
| ncsc-2025-0058 | Kwetsbaarheden verholpen in Palo Alto Networks PAN-OS | 2025-02-13T09:28:54.459828Z | 2025-02-21T08:08:58.513404Z |
| ncsc-2025-0057 | Kwetsbaarheden verholpen in GitLab CE/EE | 2025-02-13T09:09:26.087113Z | 2025-02-13T09:09:26.087113Z |
| ncsc-2025-0056 | Kwetsbaarheden verholpen in Schneider Electric ASCO | 2025-02-13T09:07:55.191514Z | 2025-02-13T09:07:55.191514Z |
| ncsc-2025-0055 | Kwetsbaarheid verholpen in CrowdStrike Falcon sensor | 2025-02-13T08:22:07.880125Z | 2025-02-13T08:22:07.880125Z |
| ncsc-2025-0054 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2025-02-13T06:46:08.560650Z | 2025-02-13T06:46:08.560650Z |
| ncsc-2025-0053 | Kwetsbaarheden verholpen in Fortinet FortiSwitch, FortiManager, FortiAnalyzer, FortiOS en FortiProxy | 2025-02-12T12:39:02.366846Z | 2025-02-18T08:09:48.619964Z |
| ncsc-2025-0052 | Kwetsbaarheden verholpen in Ivanti Connect Secure en Ivanti Policy Secure | 2025-02-12T09:35:30.260596Z | 2025-02-12T09:35:30.260596Z |
| ncsc-2025-0051 | Kwetsbaarheden verholpen in Siemens producten | 2025-02-11T19:40:34.993264Z | 2025-02-11T19:40:34.993264Z |
| ncsc-2025-0050 | Kwetsbaarheden verholpen in Microsoft Office | 2025-02-11T19:19:24.863294Z | 2025-02-11T19:19:24.863294Z |
| ncsc-2025-0049 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2025-02-11T19:17:58.768578Z | 2025-02-11T19:17:58.768578Z |
| ncsc-2025-0048 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-02-11T19:17:03.555400Z | 2025-02-11T19:17:03.555400Z |
| ncsc-2025-0047 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-02-11T19:16:04.610648Z | 2025-02-11T19:16:04.610648Z |
| ncsc-2025-0046 | Kwetsbaarheid verholpen in Apple iOS en iPadOS | 2025-02-11T09:54:03.266145Z | 2025-02-11T09:54:03.266145Z |
| ncsc-2025-0045 | Kwetsbaarheden verholpen in SAP producten | 2025-02-11T09:08:48.427126Z | 2025-02-11T09:08:48.427126Z |
| ncsc-2025-0044 | Kwetsbaarheden verholpen in Cisco Identity Services Engine | 2025-02-07T07:50:13.796001Z | 2025-02-07T07:50:13.796001Z |
| ncsc-2025-0043 | Kwetsbaarheden verholpen in Cisco IOS, IOS XE en IOS XR Software | 2025-02-07T07:44:34.306225Z | 2025-02-11T06:53:00.177478Z |
| ncsc-2025-0042 | Kwetsbaarheden verholpen in Cisco AsyncOS Software | 2025-02-07T07:41:10.612134Z | 2025-02-07T07:41:10.612134Z |
| ncsc-2025-0041 | Kwetsbaarheden verholpen in F5 BIG-IP | 2025-02-07T07:38:11.981975Z | 2025-02-11T06:51:17.629249Z |
| ncsc-2025-0040 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2025-02-07T07:33:40.643635Z | 2025-02-07T07:33:40.643635Z |
| ncsc-2025-0039 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-02-04T09:13:08.342699Z | 2025-02-04T09:13:08.342699Z |
| ncsc-2025-0038 | Kwetsbaarheden verholpen in Zimbra Collaboration | 2025-02-04T09:10:55.525420Z | 2025-02-04T09:10:55.525420Z |
| ncsc-2025-0037 | Kwetsbaarheden verholpen in VMware Aria Operations | 2025-01-31T12:25:21.454904Z | 2025-01-31T12:25:21.454904Z |
| ncsc-2025-0036 | Kwetsbaarheden verholpen in Rockwell Automation FactoryTalk | 2025-01-29T10:35:51.164484Z | 2025-01-29T10:35:51.164484Z |
| ncsc-2025-0035 | Kwetsbaarheden verholpen in Rockwell Automation FactoryTalk | 2025-01-29T10:32:40.594073Z | 2025-01-29T10:32:40.594073Z |
| ncsc-2025-0034 | Kwetsbaarheden verholpen in Apple iPadOS en iOS | 2025-01-28T11:31:14.861619Z | 2025-01-28T11:31:14.861619Z |
| ncsc-2025-0033 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2025-01-28T10:43:20.128933Z | 2025-01-28T10:43:20.128933Z |
| ncsc-2025-0032 | Kwetsbaarheden verholpen in Apple macOS | 2025-01-28T10:37:38.942515Z | 2025-01-28T10:37:38.942515Z |
| ncsc-2025-0031 | Kwetsbaarheid verholpen in Cisco Meeting Management | 2025-01-23T13:56:01.391387Z | 2025-01-23T13:56:01.391387Z |
| ncsc-2025-0030 | Kwetsbaarheid verholpen in Cisco BroadWorks | 2025-01-23T13:53:16.250734Z | 2025-01-23T13:53:16.250734Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10275-1 | gvfs-1.58.2-1.1 on GA media | 2026-03-01T00:00:00Z | 2026-03-01T00:00:00Z |
| opensuse-su-2026:20291-1 | Security update for fluidsynth | 2026-02-27T13:36:22Z | 2026-02-27T13:36:22Z |
| opensuse-su-2026:20290-1 | Security update for haproxy | 2026-02-27T13:15:21Z | 2026-02-27T13:15:21Z |
| opensuse-su-2026:20287-1 | Security update for the Linux Kernel | 2026-02-27T13:03:55Z | 2026-02-27T13:03:55Z |
| opensuse-su-2026:20283-1 | Security update for libsoup2 | 2026-02-27T08:52:33Z | 2026-02-27T08:52:33Z |
| opensuse-su-2026:20281-1 | Security update for kubevirt | 2026-02-27T08:51:11Z | 2026-02-27T08:51:11Z |
| opensuse-su-2026:10274-1 | libwireshark19-4.6.4-1.1 on GA media | 2026-02-27T00:00:00Z | 2026-02-27T00:00:00Z |
| opensuse-su-2026:10273-1 | libudisks2-0-2.11.0-2.1 on GA media | 2026-02-27T00:00:00Z | 2026-02-27T00:00:00Z |
| opensuse-su-2026:10272-1 | libIex-3_4-33-3.4.5-1.1 on GA media | 2026-02-27T00:00:00Z | 2026-02-27T00:00:00Z |
| opensuse-su-2026:10271-1 | libjxl-devel-0.11.2-1.1 on GA media | 2026-02-27T00:00:00Z | 2026-02-27T00:00:00Z |
| opensuse-su-2026:10270-1 | gosec-2.24.0-1.1 on GA media | 2026-02-27T00:00:00Z | 2026-02-27T00:00:00Z |
| opensuse-su-2026:10269-1 | cockpit-podman-120-2.1 on GA media | 2026-02-27T00:00:00Z | 2026-02-27T00:00:00Z |
| opensuse-su-2026:10268-1 | cockpit-356-2.1 on GA media | 2026-02-27T00:00:00Z | 2026-02-27T00:00:00Z |
| opensuse-su-2026:10267-1 | ImageMagick-7.1.2.15-1.1 on GA media | 2026-02-27T00:00:00Z | 2026-02-27T00:00:00Z |
| opensuse-su-2026:20279-1 | Security update for containerized-data-importer | 2026-02-26T16:03:48Z | 2026-02-26T16:03:48Z |
| opensuse-su-2026:20273-1 | Security update for 7zip | 2026-02-26T11:53:30Z | 2026-02-26T11:53:30Z |
| opensuse-su-2026:20277-1 | Security update for chromium | 2026-02-26T11:50:46Z | 2026-02-26T11:50:46Z |
| opensuse-su-2026:20271-1 | Security update for python-urllib3_1 | 2026-02-26T09:45:23Z | 2026-02-26T09:45:23Z |
| opensuse-su-2026:20270-1 | Security update for autogen | 2026-02-26T09:10:10Z | 2026-02-26T09:10:10Z |
| opensuse-su-2026:10266-1 | valkey-9.0.3-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10265-1 | qemu-10.2.1-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10264-1 | python311-Flask-3.1.3-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10263-1 | heroic-games-launcher-2.20.0-2.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10262-1 | evolution-data-server-3.58.3-2.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10261-1 | docker-29.2.1_ce-37.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10260-1 | digger-cli-0.6.143-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10259-1 | chromedriver-145.0.7632.116-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10258-1 | busybox-1.37.0-10.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10257-1 | MozillaFirefox-148.0-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:20275-1 | Security update for gimp | 2026-02-25T10:52:32Z | 2026-02-25T10:52:32Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:8888 | Red Hat Security Advisory: openexr security update | 2026-04-20T03:46:39+00:00 | 2026-04-30T21:34:32+00:00 |
| rhsa-2026:8880 | Red Hat Security Advisory: squid security update | 2026-04-20T03:44:44+00:00 | 2026-04-30T02:55:11+00:00 |
| rhsa-2026:8874 | Red Hat Security Advisory: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update | 2026-04-20T03:31:29+00:00 | 2026-04-28T14:08:39+00:00 |
| rhsa-2026:8870 | Red Hat Security Advisory: openexr security update | 2026-04-20T03:19:54+00:00 | 2026-04-30T21:34:36+00:00 |
| rhsa-2026:8887 | Red Hat Security Advisory: giflib security update | 2026-04-20T03:14:34+00:00 | 2026-04-21T19:40:52+00:00 |
| rhsa-2026:8860 | Red Hat Security Advisory: grafana security update | 2026-04-20T03:13:04+00:00 | 2026-05-06T15:02:17+00:00 |
| rhsa-2026:8871 | Red Hat Security Advisory: openexr security update | 2026-04-20T03:08:14+00:00 | 2026-04-30T21:34:34+00:00 |
| rhsa-2026:8863 | Red Hat Security Advisory: OpenEXR security update | 2026-04-20T03:05:29+00:00 | 2026-04-30T21:34:40+00:00 |
| rhsa-2026:8864 | Red Hat Security Advisory: libarchive security update | 2026-04-20T03:02:24+00:00 | 2026-05-05T20:30:49+00:00 |
| rhsa-2026:8861 | Red Hat Security Advisory: giflib security update | 2026-04-20T03:02:19+00:00 | 2026-04-21T19:40:50+00:00 |
| rhsa-2026:8882 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-20T03:00:09+00:00 | 2026-05-06T15:02:18+00:00 |
| rhsa-2026:8865 | Red Hat Security Advisory: libarchive security update | 2026-04-20T02:59:49+00:00 | 2026-05-05T20:30:47+00:00 |
| rhsa-2026:8854 | Red Hat Security Advisory: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update | 2026-04-20T02:58:59+00:00 | 2026-04-28T14:08:39+00:00 |
| rhsa-2026:8868 | Red Hat Security Advisory: nghttp2 security update | 2026-04-20T02:56:54+00:00 | 2026-05-05T20:30:46+00:00 |
| rhsa-2026:8876 | Red Hat Security Advisory: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update | 2026-04-20T02:56:00+00:00 | 2026-04-28T14:08:40+00:00 |
| rhsa-2026:8859 | Red Hat Security Advisory: giflib security update | 2026-04-20T02:53:59+00:00 | 2026-04-21T19:40:49+00:00 |
| rhsa-2026:8848 | Red Hat Security Advisory: go-rpm-macros security update | 2026-04-20T02:53:24+00:00 | 2026-05-06T15:02:15+00:00 |
| rhsa-2026:8885 | Red Hat Security Advisory: giflib security update | 2026-04-20T02:48:24+00:00 | 2026-04-21T19:40:52+00:00 |
| rhsa-2026:8856 | Red Hat Security Advisory: go-rpm-macros security update | 2026-04-20T02:48:15+00:00 | 2026-05-06T15:02:17+00:00 |
| rhsa-2026:8847 | Red Hat Security Advisory: grafana security update | 2026-04-20T02:45:04+00:00 | 2026-05-06T15:02:15+00:00 |
| rhsa-2026:8879 | Red Hat Security Advisory: grafana security update | 2026-04-20T02:44:19+00:00 | 2026-05-06T15:02:18+00:00 |
| rhsa-2026:8886 | Red Hat Security Advisory: giflib security update | 2026-04-20T02:41:29+00:00 | 2026-04-21T19:40:52+00:00 |
| rhsa-2026:8878 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-20T02:38:29+00:00 | 2026-05-06T15:02:18+00:00 |
| rhsa-2026:8881 | Red Hat Security Advisory: grafana security update | 2026-04-20T02:37:32+00:00 | 2026-05-06T15:02:18+00:00 |
| rhsa-2026:8845 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-20T02:34:54+00:00 | 2026-05-06T15:02:17+00:00 |
| rhsa-2026:8877 | Red Hat Security Advisory: grafana security update | 2026-04-20T02:32:39+00:00 | 2026-05-06T15:02:17+00:00 |
| rhsa-2026:8858 | Red Hat Security Advisory: giflib security update | 2026-04-20T02:26:19+00:00 | 2026-04-21T19:40:53+00:00 |
| rhsa-2026:8869 | Red Hat Security Advisory: openexr security update | 2026-04-20T02:23:59+00:00 | 2026-04-30T21:34:38+00:00 |
| rhsa-2026:8884 | Red Hat Security Advisory: giflib security update | 2026-04-20T02:20:40+00:00 | 2026-04-21T19:40:51+00:00 |
| rhsa-2026:8867 | Red Hat Security Advisory: libarchive security update | 2026-04-20T02:20:14+00:00 | 2026-05-05T20:30:47+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-697140 | SSA-697140: Denial of Service Vulnerability in the TCP Event Service of SCALANCE and RUGGEDCOM Products | 2022-10-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-649853 | SSA-649853: Improper Certificate Validation Vulnerability in Industrial Edge Management | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-611756 | SSA-611756: JT File Parsing Vulnerability in JTTK and Simcenter Femap | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-572005 | SSA-572005: Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices | 2022-10-11T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-568427 | SSA-568427: Weak Key Protection Vulnerability in SIMATIC S7-1200 and S7-1500 CPU Families | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-552702 | SSA-552702: Privilege Escalation Vulnerability in the Web Interface of SCALANCE and RUGGEDCOM Products | 2022-10-11T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-501891 | SSA-501891: Cross-Site Scripting Vulnerability in SCALANCE X-200 and X-200IRT Families | 2022-10-11T00:00:00Z | 2022-11-08T00:00:00Z |
| ssa-384224 | SSA-384224: Denial of Service Vulnerability in SIMATIC HMI Panels | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-360783 | SSA-360783: Multiple Webserver Vulnerabilities in Desigo PXM Devices | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-313313 | SSA-313313: Denial of Service Vulnerability in the FTP Server of Nucleus RTOS | 2022-10-11T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-258115 | SSA-258115: DWG File Parsing Vulnerability in Solid Edge before SE2022MP9 | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-638652 | SSA-638652: Authentication Bypass Vulnerability in Mendix SAML Module | 2022-09-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-637483 | SSA-637483 Third-Party Component Vulnerabilities in SINEC INS before V1.0 SP2 | 2022-09-13T00:00:00Z | 2022-09-13T00:00:00Z |
| ssa-518824 | SSA-518824 Multiple File Parsing Vulnerabilities in Simcenter Femap and Parasolid | 2022-09-13T00:00:00Z | 2022-09-13T00:00:00Z |
| ssa-459643 | SSA-459643: Denial of Service Vulnerability in RUGGEDCOM ROS before V5.6.0 | 2022-09-13T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-759952 | SSA-759952: Command Injection and Denial of Service Vulnerability in Teamcenter | 2022-08-09T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-710008 | SSA-710008: Multiple Web Vulnerabilities in SCALANCE Products | 2022-08-09T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-555707 | SSA-555707: Information Disclosure Vulnerability in Simcenter STAR-CCM+ | 2022-08-09T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-185638 | SSA-185638: Authentication Bypass Vulnerability in SICAM A8000 Web Server Module | 2022-08-09T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-944952 | SSA-944952: Authentication Bypass Vulnerability in Opcenter Quality | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-910883 | SSA-910883: DHCP Client Vulnerability in SINAMICS PERFECT HARMONY GH180 Drives | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-865333 | SSA-865333: Memory Corruption Vulnerability in EN100 Ethernet Module | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-840800 | SSA-840800: Code Injection Vulnerability in RUGGEDCOM ROS | 2022-07-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-610768 | SSA-610768: XML Entity Expansion Injection Vulnerability in Mendix Excel Importer Module | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-599506 | SSA-599506: Command Injection Vulnerability in RUGGEDCOM ROX | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-580125 | SSA-580125: Multiple Vulnerabilities in SIMATIC eaSie | 2022-07-12T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-517377 | SSA-517377: Multiple Vulnerabilities in the SRCS VPN Feature in SIMATIC CP Devices | 2022-07-12T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-492173 | SSA-492173: Expression Injection Vulnerability in Mendix Applications | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-491621 | SSA-491621: Denial of Service Vulnerability in CPC80 Firmware of SICAM A8000 Devices | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-474231 | SSA-474231: File Parsing Vulnerability in Simcenter Femap before V2022.2 | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21102-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-04-13T09:00:51Z | 2026-04-13T09:00:51Z |
| suse-su-2026:1293-1 | Security update for the Linux Kernel (Live Patch 75 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T08:35:44Z | 2026-04-13T08:35:44Z |
| suse-su-2026:1292-1 | Security update for python312 | 2026-04-13T08:10:43Z | 2026-04-13T08:10:43Z |
| suse-su-2026:1291-1 | Security update for openssl-1_0_0 | 2026-04-13T08:09:41Z | 2026-04-13T08:09:41Z |
| suse-su-2026:1290-1 | Security update for openssl-1_1 | 2026-04-13T08:08:54Z | 2026-04-13T08:08:54Z |
| suse-su-2026:1288-1 | Security update for the Linux Kernel (Live Patch 74 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T06:34:14Z | 2026-04-13T06:34:14Z |
| suse-su-2026:21220-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 16) | 2026-04-13T03:18:11Z | 2026-04-13T03:18:11Z |
| suse-su-2026:21100-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 16) | 2026-04-13T03:18:11Z | 2026-04-13T03:18:11Z |
| suse-su-2026:21219-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-04-13T02:46:56Z | 2026-04-13T02:46:56Z |
| suse-su-2026:21099-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-04-13T02:46:56Z | 2026-04-13T02:46:56Z |
| suse-su-2026:21218-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 16) | 2026-04-13T02:14:56Z | 2026-04-13T02:14:56Z |
| suse-su-2026:21098-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 16) | 2026-04-13T02:14:56Z | 2026-04-13T02:14:56Z |
| suse-su-2026:1287-1 | Security update for the Linux Kernel (Live Patch 70 for SUSE Linux Enterprise 12 SP5) | 2026-04-12T23:15:16Z | 2026-04-12T23:15:16Z |
| suse-su-2026:1285-1 | Security update for the Linux Kernel (Live Patch 68 for SUSE Linux Enterprise 12 SP5) | 2026-04-12T19:04:23Z | 2026-04-12T19:04:23Z |
| suse-su-2026:1284-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP7) | 2026-04-12T10:34:11Z | 2026-04-12T10:34:11Z |
| suse-su-2026:1283-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-04-12T10:34:05Z | 2026-04-12T10:34:05Z |
| suse-su-2026:1281-1 | Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4) | 2026-04-12T08:35:33Z | 2026-04-12T08:35:33Z |
| suse-su-2026:1280-1 | Security update for the Linux Kernel (Live Patch 41 for SUSE Linux Enterprise 15 SP4) | 2026-04-12T02:04:36Z | 2026-04-12T02:04:36Z |
| suse-su-2026:1279-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP7) | 2026-04-12T00:08:13Z | 2026-04-12T00:08:13Z |
| suse-su-2026:1278-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7) | 2026-04-12T00:08:07Z | 2026-04-12T00:08:07Z |
| suse-su-2026:1274-1 | Security update for the Linux Kernel (Live Patch 19 for SUSE Linux Enterprise 15 SP6) | 2026-04-11T20:04:33Z | 2026-04-11T20:04:33Z |
| suse-su-2026:1273-1 | Security update for MozillaFirefox | 2026-04-11T19:04:46Z | 2026-04-11T19:04:46Z |
| suse-su-2026:1272-1 | Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise 15 SP6) | 2026-04-11T18:04:50Z | 2026-04-11T18:04:50Z |
| suse-su-2026:1271-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6) | 2026-04-11T18:04:43Z | 2026-04-11T18:04:43Z |
| suse-su-2026:1270-1 | Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP5) | 2026-04-11T16:34:14Z | 2026-04-11T16:34:14Z |
| suse-su-2026:1269-1 | Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4) | 2026-04-11T16:04:45Z | 2026-04-11T16:04:45Z |
| suse-su-2026:1268-1 | Security update for the Linux Kernel (Live Patch 38 for SUSE Linux Enterprise 15 SP4) | 2026-04-11T14:04:40Z | 2026-04-11T14:04:40Z |
| suse-su-2026:1266-1 | Security update for the Linux Kernel (Live Patch 20 for SUSE Linux Enterprise 15 SP6) | 2026-04-11T11:04:41Z | 2026-04-11T11:04:41Z |
| suse-su-2026:21217-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-04-11T07:42:41Z | 2026-04-11T07:42:41Z |
| suse-su-2026:21096-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-04-11T07:42:41Z | 2026-04-11T07:42:41Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:0668 | Important: net-snmp security update | 2026-01-15T00:00:00Z | 2026-01-16T14:53:15Z |
| alsa-2026:0667 | Important: firefox security update | 2026-01-15T00:00:00Z | 2026-02-12T10:37:47Z |
| alsa-2026:0608 | Moderate: vsftpd security update | 2026-01-14T00:00:00Z | 2026-01-16T14:54:25Z |
| alsa-2026:0606 | Moderate: vsftpd security update | 2026-01-14T00:00:00Z | 2026-01-16T14:56:39Z |
| alsa-2026:0605 | Moderate: vsftpd security update | 2026-01-14T00:00:00Z | 2026-01-16T14:57:43Z |
| alsa-2026:0596 | Moderate: cups security update | 2026-01-14T00:00:00Z | 2026-01-16T14:59:53Z |
| alsa-2026:0594 | Moderate: libpq security update | 2026-01-14T00:00:00Z | 2026-01-16T15:02:50Z |
| alsa-2026:0545 | Important: podman security update | 2026-01-14T00:00:00Z | 2026-01-16T15:04:20Z |
| alsa-2026:0525 | Moderate: postgresql16 security update | 2026-01-13T00:00:00Z | 2026-01-16T15:06:52Z |
| alsa-2026:0524 | Moderate: postgresql:15 security update | 2026-01-13T00:00:00Z | 2026-01-16T15:09:07Z |
| alsa-2026:0523 | Moderate: postgresql:13 security update | 2026-01-13T00:00:00Z | 2026-01-16T15:11:39Z |
| alsa-2026:0519 | Moderate: postgresql:16 security update | 2026-01-13T00:00:00Z | 2026-01-16T15:14:12Z |
| alsa-2026:0493 | Moderate: postgresql:16 security update | 2026-01-13T00:00:00Z | 2026-01-19T09:45:22Z |
| alsa-2026:0492 | Moderate: postgresql:15 security update | 2026-01-13T00:00:00Z | 2026-01-19T10:02:02Z |
| alsa-2026:0491 | Moderate: postgresql security update | 2026-01-13T00:00:00Z | 2026-01-16T15:16:39Z |
| alsa-2026:0470 | Important: podman security update | 2026-01-12T00:00:00Z | 2026-01-16T15:18:30Z |
| alsa-2026:0464 | Moderate: cups security update | 2026-01-12T00:00:00Z | 2026-01-16T15:20:45Z |
| alsa-2026:0458 | Moderate: libpq security update | 2026-01-12T00:00:00Z | 2026-01-16T15:21:50Z |
| alsa-2026:0453 | Important: kernel security update | 2026-01-12T00:00:00Z | 2026-01-16T15:27:10Z |
| alsa-2026:0445 | Moderate: kernel security update | 2026-01-12T00:00:00Z | 2026-01-16T15:31:40Z |
| alsa-2026:0444 | Important: kernel security update | 2026-01-12T00:00:00Z | 2026-01-16T15:34:47Z |
| alsa-2026:0443 | Important: kernel-rt security update | 2026-01-12T00:00:00Z | 2026-01-16T15:37:02Z |
| alsa-2026:0437 | Important: buildah security update | 2026-01-12T00:00:00Z | 2026-01-16T15:38:30Z |
| alsa-2026:0436 | Important: buildah security update | 2026-01-12T00:00:00Z | 2026-01-16T15:50:15Z |
| alsa-2026:0423 | Important: libsoup3 security update | 2026-01-12T00:00:00Z | 2026-01-16T15:49:08Z |
| alsa-2026:0422 | Important: libsoup security update | 2026-01-12T00:00:00Z | 2026-01-16T15:46:52Z |
| alsa-2026:0421 | Important: libsoup security update | 2026-01-12T00:00:00Z | 2026-01-16T15:44:34Z |
| alsa-2026:0337 | Moderate: openssl security update | 2026-01-08T00:00:00Z | 2026-01-16T15:42:22Z |
| alsa-2026:0312 | Moderate: cups security update | 2026-01-08T00:00:00Z | 2026-01-16T15:40:37Z |
| alsa-2026:0247 | Important: mariadb:10.11 security update | 2026-01-07T00:00:00Z | 2026-01-12T10:57:59Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-678 | Use-of-uninitialized-value in FLAC__replaygain_synthesis__apply_gain | 2024-07-25T00:09:08.389428Z | 2025-02-11T14:21:01.793416Z |
| osv-2024-677 | Segv on unknown address in gs_gc_reclaim | 2024-07-25T00:06:43.762625Z | 2026-03-18T14:32:20.684770Z |
| osv-2024-675 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-07-24T00:07:37.523933Z | 2026-05-04T14:21:28.619874Z |
| osv-2024-668 | Security exception in jflex.core.NFA.insertNFA | 2024-07-20T00:01:48.807354Z | 2024-07-20T00:01:48.807879Z |
| osv-2024-664 | Heap-buffer-overflow in gf_dash_group_get_template | 2024-07-18T00:13:55.576218Z | 2026-05-06T14:44:38.886623Z |
| osv-2024-662 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-07-18T00:06:40.832938Z | 2026-05-04T14:21:15.393865Z |
| osv-2024-661 | Security exception in java.base/java.util.ArrayList.<init> | 2024-07-18T00:05:57.665844Z | 2025-12-01T14:21:01.321021Z |
| osv-2024-659 | Index-out-of-bounds in gf_vvc_parse_nalu_bs | 2024-07-18T00:01:18.765548Z | 2026-05-06T14:43:22.128420Z |
| osv-2024-655 | Stack-buffer-overflow in UnrollChunkyBytes | 2024-07-17T00:06:15.877340Z | 2025-05-23T07:44:18.608203Z |
| osv-2024-641 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-07-14T00:06:37.034414Z | 2026-05-02T14:28:29.616182Z |
| osv-2024-640 | Null-dereference READ | 2024-07-13T00:15:12.997693Z | 2024-07-13T00:15:12.998025Z |
| osv-2024-638 | Heap-buffer-overflow in ih264d_format_convert | 2024-07-13T00:12:13.793261Z | 2024-07-16T14:18:45.507955Z |
| osv-2024-637 | Heap-buffer-overflow in ih264d_format_convert | 2024-07-13T00:08:20.097992Z | 2024-07-16T14:17:43.815608Z |
| osv-2024-636 | Null-dereference READ in evp_mac_final | 2024-07-13T00:04:18.446520Z | 2024-07-13T00:04:18.446812Z |
| osv-2024-635 | Null-dereference READ in do_evp_kdf | 2024-07-13T00:03:44.593921Z | 2024-07-13T00:03:44.594307Z |
| osv-2024-634 | Heap-buffer-overflow in htmlCurrentChar | 2024-07-13T00:03:44.049545Z | 2024-07-13T00:03:44.049863Z |
| osv-2024-627 | Heap-buffer-overflow in gf_hevc_parse_nalu_bs | 2024-07-12T00:01:41.960899Z | 2024-07-12T00:01:41.961272Z |
| osv-2024-602 | Heap-buffer-overflow in ultrahdr::getYuv420Pixel | 2024-06-29T00:09:20.554523Z | 2024-06-29T00:09:20.554958Z |
| osv-2024-592 | UNKNOWN READ in spvtools::disassemble::InstructionDisassembler::EmitInstruction | 2024-06-27T00:03:46.520119Z | 2025-01-10T05:00:09.280885Z |
| osv-2024-577 | Heap-use-after-free in sputs | 2024-06-22T00:14:08.186738Z | 2024-06-22T00:14:08.187320Z |
| osv-2024-575 | UNKNOWN READ in H5SL_remove | 2024-06-20T00:03:37.435999Z | 2024-06-20T00:03:37.436551Z |
| osv-2024-574 | Heap-buffer-overflow in spvtools::disassemble::InstructionDisassembler::EmitInstruction | 2024-06-19T00:15:01.983925Z | 2024-06-25T14:22:08.649397Z |
| osv-2024-567 | Security exception in jflex.core.NFA.insertNFA | 2024-06-16T00:06:55.824759Z | 2024-06-16T00:06:55.825276Z |
| osv-2024-555 | Heap-buffer-overflow in ArduinoJson::V704HB22::detail::MsgPackDeserializer<ArduinoJson::V704HB22::detail | 2024-06-13T00:06:28.782972Z | 2024-06-28T14:18:08.360826Z |
| osv-2024-552 | UNKNOWN READ in ndpi_search_zoom | 2024-06-12T00:12:06.312903Z | 2024-06-12T00:12:06.313282Z |
| osv-2024-551 | Heap-buffer-overflow in mz_zip_mem_read_func | 2024-06-12T00:06:30.075962Z | 2024-06-12T00:06:30.076324Z |
| osv-2024-550 | Heap-buffer-overflow in mz_zip_mem_read_func | 2024-06-12T00:06:02.418206Z | 2024-06-12T00:06:02.418563Z |
| osv-2024-548 | Use-of-uninitialized-value in icalmemory_strdup | 2024-06-12T00:00:26.364017Z | 2024-06-12T00:00:26.364669Z |
| osv-2024-539 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-06-07T00:08:30.308579Z | 2024-07-16T14:19:14.406686Z |
| osv-2024-538 | Use-of-uninitialized-value in QUICVariableInt::size | 2024-06-06T00:12:59.950768Z | 2024-07-16T14:22:07.747083Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2023-0103 | `postgress` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0102 | `serd` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0101 | `oncecell` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0100 | `xrvrv` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0099 | `envlogger` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0098 | `if-cfg` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0097 | `lazystatic` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0054 | Use-after-free in `vec_insert_bytes` | 2023-08-07T12:00:00Z | 2023-08-27T15:52:52Z |
| rustsec-2023-0049 | `tui` is unmaintained; use `ratatui` instead | 2023-08-07T12:00:00Z | 2023-08-07T13:27:47Z |
| rustsec-2023-0095 | Invalid Slice Split Results in Server Panic | 2023-08-03T12:00:00Z | 2025-12-22T18:53:25Z |
| rustsec-2023-0051 | `dlopen_derive` is unmaintained | 2023-07-30T12:00:00Z | 2023-08-19T10:29:52Z |
| rustsec-2023-0048 | Unsoundness in `intern` methods on `intaglio` symbol interners | 2023-07-26T12:00:00Z | 2023-07-29T17:20:00Z |
| rustsec-2023-0089 | atomic-polyfill is unmaintained | 2023-07-11T12:00:00Z | 2025-04-29T08:31:10Z |
| rustsec-2023-0047 | impl `FromMdbValue` for bool is unsound | 2023-06-26T12:00:00Z | 2023-07-29T17:20:00Z |
| rustsec-2023-0045 | memoffset allows reading uninitialized memory | 2023-06-21T12:00:00Z | 2023-07-08T12:30:19Z |
| rustsec-2023-0044 | `openssl` `X509VerifyParamRef::set_host` buffer over-read | 2023-06-20T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0046 | Misaligned pointer dereference in `ChunkId::new` | 2023-06-15T12:00:00Z | 2023-07-08T12:30:19Z |
| rustsec-2023-0042 | Ouroboros is Unsound | 2023-06-11T12:00:00Z | 2023-07-08T12:30:19Z |
| rustsec-2023-0041 | Remote Attackers can cause Denial-of-Service (packet loops) with crafted DNS packets | 2023-06-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0040 | `users` crate is unmaintained | 2023-06-01T12:00:00Z | 2023-08-21T10:35:45Z |
| rustsec-2023-0039 | Out-of-bounds array access leads to panic | 2023-05-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0038 | Out-of-bounds array access leads to panic | 2023-05-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0037 | crate has been renamed to `crypto_secretbox` | 2023-05-16T12:00:00Z | 2023-05-17T03:02:51Z |
| rustsec-2023-0066 | Vulnerable to privilege escalation using ioctls TIOCSTI and TIOCLINUX | 2023-04-29T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0092 | Undefined Behavior in Rust runtime functions | 2023-04-21T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2023-0125 | Logs AWS credentials when TRACE-level logging is enabled | 2023-04-19T12:00:00Z | 2026-04-02T14:44:59Z |
| rustsec-2023-0035 | Adverserial use of `make_bitflags!` macro can cause undefined behavior | 2023-04-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0034 | Resource exhaustion vulnerability in h2 may lead to Denial of Service (DoS) | 2023-04-14T12:00:00Z | 2023-04-20T19:17:55Z |
| rustsec-2023-0033 | Parsing borsh messages with ZST which are not-copy/clone is unsound | 2023-04-12T12:00:00Z | 2024-09-23T15:02:17Z |
| rustsec-2023-0050 | multipart is Unmaintained | 2023-04-11T12:00:00Z | 2023-08-18T20:38:40Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2026-2726 | Incorrect Authorization in GitLab | 2026-03-27T12:15:04.107Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-1724 | Missing Authentication for Critical Function in GitLab | 2026-03-27T12:14:54.117Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-14595 | Missing Authorization in GitLab | 2026-03-27T12:11:45.074Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-13436 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-27T12:11:11.989Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-13078 | Improper Validation of Specified Quantity in Input in GitLab | 2026-03-27T12:11:08.026Z | 2026-03-27T12:16:52.978Z |
| bit-nats-2026-27889 | NATS: Pre-auth remote server crash via WebSocket frame length overflow in wsRead | 2026-03-27T11:47:22.988Z | 2026-03-27T12:16:52.978Z |
| bit-etcd-2026-33413 | etcd: Authorization bypasses in multiple APIs | 2026-03-27T11:39:27.916Z | 2026-03-27T12:16:52.978Z |
| bit-etcd-2026-33343 | etcd: Nested etcd transactions bypass RBAC authorization checks | 2026-03-27T11:39:26.076Z | 2026-03-27T12:16:52.978Z |
| bit-parse-2026-33627 | Parse Server: Auth data exposed via /users/me endpoint | 2026-03-27T07:14:47.660Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33624 | Parse Server: MFA recovery code single-use bypass via concurrent requests | 2026-03-27T07:14:44.950Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33539 | Parse Server: SQL injection via aggregate and distinct field names in PostgreSQL adapter | 2026-03-27T07:14:42.086Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33538 | Parse Server: Denial of service via unindexed database query for unconfigured auth providers | 2026-03-27T07:14:39.195Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33527 | Parse Server: Session update endpoint allows overwriting server-generated session fields | 2026-03-27T07:14:36.431Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33508 | Parse Server: LiveQuery subscription query depth bypass | 2026-03-27T07:14:33.818Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33498 | Parse Server: Query condition depth bypass via pre-validation transform pipeline | 2026-03-27T07:14:30.964Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33429 | Parse Server: Protected field change detection oracle via LiveQuery watch parameter | 2026-03-27T07:14:28.266Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33421 | Parse Server: LiveQuery bypasses CLP pointer permission enforcement | 2026-03-27T07:14:25.801Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33409 | Parse Server: Auth provider validation bypass on login via partial authData | 2026-03-27T07:14:23.276Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33323 | Parse Server: Email verification resend page leaks user existence | 2026-03-27T07:14:20.379Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33428 | Discourse Allows Unauthorized Access to Deleted Posts Index via Group Membership | 2026-03-27T07:11:24.928Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33427 | Discourse Authorization Page Displays Unvalidated Redirect Domain | 2026-03-27T07:11:21.636Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33426 | Discourse users can edit or synonymize hidden tags they can't see | 2026-03-27T07:11:18.684Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33425 | Discourse has inferable private group membership or existence via exclude_groups parameter | 2026-03-27T07:11:15.979Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33424 | PM access granted through invites after access revocation | 2026-03-27T07:11:13.161Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33423 | Discourse staff can modify any user's group notification level | 2026-03-27T07:11:10.696Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33422 | Discourse exposes ip_address of flagged user | 2026-03-27T07:11:08.096Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33411 | Discourse's solved topic stream has potential stored XSS in topic title | 2026-03-27T07:11:05.061Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33410 | Discourse hardens chat DM channel creation and expansion | 2026-03-27T07:11:02.112Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33408 | Discourse has Improper Authorization in "Post Edits" Report For Moderators | 2026-03-27T07:10:59.380Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33395 | Discourse has stored click‑based XSS via Graphviz SVG javascript: links | 2026-03-27T07:10:56.479Z | 2026-03-27T07:40:55.991Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-jr03360 | Within HostnameError | 2026-02-17T00:39:45.300172Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-bs57244 | Within HostnameError | 2026-02-17T00:39:44.907078Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-kk07808 | issue has been found in third-party PNM decoding associated with libpng 1 | 2026-02-14T00:37:45.311656Z | 2026-02-13T12:28:27Z |
| cleanstart-2026-pr84319 | Security fixes for GHSA-2GH3-RMM4-6RQ5, GHSA-R6V5-FH4H-64XC, GHSA-RHFX-M35P-FF5J, GHSA-XWFJ-JGWM-7WP5 applied in versions: 1.27.5-r1, 1.27.6-r0 | 2026-02-14T00:37:23.085740Z | 2026-02-13T12:28:27Z |
| cleanstart-2026-mh09144 | issue was discovered in libexpat before 2 | 2026-02-13T00:45:17.459930Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-wv76464 | libexpat in Expat before 2 | 2026-02-13T00:43:45.311968Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-tr92727 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-13T00:41:14.875956Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-gv85693 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-13T00:40:14.240914Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-ca79883 | Security fixes for GHSA-6V2P-P943-PHR9, GHSA-C6GW-W398-HV78, GHSA-F6X5-JH6R-WRFV, GHSA-HCG3-P754-CR77, GHSA-J5W8-Q4QC-RX2X, GHSA-QXP5-GW88-XV66, GHSA-V778-237X-GJRC, GHSA-VVGC-356P-C3XW applied in versions: 1.15.0-r1 | 2026-02-13T00:40:14.901695Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-jb30245 | Security fixes for GHSA-F6X5-JH6R-WRFV, GHSA-J5W8-Q4QC-RX2X applied in versions: 0.47.2-r0 | 2026-02-13T00:39:45.274258Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-qi35149 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-13T00:39:44.259950Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-fi29887 | During the TLS 1 | 2026-02-13T00:39:44.225771Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-ls08172 | Within HostnameError | 2026-02-11T00:41:59.030674Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-cv28298 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-02-11T00:41:59.034081Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-by71381 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-02-11T00:41:59.117560Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-xb34574 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-11T00:40:59.223419Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-im73098 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-11T00:40:59.052841Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-tj33788 | Within HostnameError | 2026-02-10T00:39:24.476012Z | 2026-02-09T12:51:17Z |
| cleanstart-2026-gp14462 | Security fixes for GHSA-VVGC-356P-C3XW applied in versions: 0.18.0-r0 | 2026-02-10T00:39:23.397354Z | 2026-02-09T12:51:17Z |
| cleanstart-2026-xe32069 | Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a ... | 2026-02-06T01:10:32.733224Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-wx01708 | vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device | 2026-02-06T01:10:02.024980Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-ps82605 | Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a ... | 2026-02-06T01:09:01.544353Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-tc95380 | vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device | 2026-02-06T01:06:01.062694Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-zm20570 | Moby is an open-source project created by Docker for software containerization | 2026-02-06T00:54:29.621254Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-sp51034 | Moby is an open-source project created by Docker for software containerization | 2026-02-06T00:52:59.619100Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-td34476 | Moby is an open-source project created by Docker for software containerization | 2026-02-06T00:51:29.459800Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-jq02410 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-02-06T00:41:59.411604Z | 2026-02-05T12:20:16Z |
| cleanstart-2026-wk88787 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-02-06T00:41:29.451524Z | 2026-02-05T12:20:16Z |
| cleanstart-2026-rr78450 | Within HostnameError | 2026-02-06T00:39:29.463576Z | 2026-02-05T12:20:16Z |
| cleanstart-2026-jn44153 | Security fixes for GHSA-F6X5-JH6R-WRFV, GHSA-GX3X-VQ4P-MHHV, GHSA-J5W8-Q4QC-RX2X applied in versions: 1.18.0-r0, 1.19.0-r1 | 2026-02-06T00:39:29.662228Z | 2026-02-05T12:20:16Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2009-ALE-022 | Vulnérabilité dans TANDBERG MXP | 2009-12-11T00:00:00.000000 | 2009-12-11T00:00:00.000000 |
| certa-2009-ale-021 | Vulnérabilité dans Adobe Illustrator | 2009-12-10T00:00:00.000000 | 2010-01-08T00:00:00.000000 |
| CERTA-2009-ALE-021 | Vulnérabilité dans Adobe Illustrator | 2009-12-10T00:00:00.000000 | 2010-01-08T00:00:00.000000 |
| certa-2009-ale-020 | Vulnérabilité dans Internet Explorer | 2009-11-21T00:00:00.000000 | 2009-12-09T00:00:00.000000 |
| CERTA-2009-ALE-020 | Vulnérabilité dans Internet Explorer | 2009-11-21T00:00:00.000000 | 2009-12-09T00:00:00.000000 |
| certa-2009-ale-019 | Vulnérabilité dans Windows 7 et Windows Server 2008 R2 | 2009-11-16T00:00:00.000000 | 2010-06-10T00:00:00.000000 |
| CERTA-2009-ALE-019 | Vulnérabilité dans Windows 7 et Windows Server 2008 R2 | 2009-11-16T00:00:00.000000 | 2010-06-10T00:00:00.000000 |
| certa-2009-ale-018 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-10-09T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| CERTA-2009-ALE-018 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-10-09T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| certa-2009-ale-017 | Vulnérabilités dans l'implémentation TCP/IP de divers produits | 2009-09-09T00:00:00.000000 | 2013-02-19T00:00:00.000000 |
| certa-2009-ale-016 | Vulnérabilité de SMBv2 dans Microsoft Windows | 2009-09-09T00:00:00.000000 | 2009-10-13T00:00:00.000000 |
| CERTA-2009-ALE-017 | Vulnérabilités dans l'implémentation TCP/IP de divers produits | 2009-09-09T00:00:00.000000 | 2013-02-19T00:00:00.000000 |
| CERTA-2009-ALE-016 | Vulnérabilité de SMBv2 dans Microsoft Windows | 2009-09-09T00:00:00.000000 | 2009-10-13T00:00:00.000000 |
| certa-2009-ale-015 | Vulnérabilités du serveur FTP de Microsoft IIS | 2009-09-01T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| CERTA-2009-ALE-015 | Vulnérabilités du serveur FTP de Microsoft IIS | 2009-09-01T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| certa-2009-ale-014 | Multiples vulnérabilités du client de messagerie Mozilla Thunderbird | 2009-08-07T00:00:00.000000 | 2013-02-05T00:00:00.000000 |
| CERTA-2009-ALE-014 | Multiples vulnérabilités du client de messagerie Mozilla Thunderbird | 2009-08-07T00:00:00.000000 | 2013-02-05T00:00:00.000000 |
| certa-2009-ale-013 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2009-07-23T00:00:00.000000 | 2009-07-31T00:00:00.000000 |
| CERTA-2009-ALE-013 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2009-07-23T00:00:00.000000 | 2009-07-31T00:00:00.000000 |
| certa-2009-ale-012 | Vulnérabilité dans Mozilla Firefox | 2009-07-15T00:00:00.000000 | 2009-07-17T00:00:00.000000 |
| CERTA-2009-ALE-012 | Vulnérabilité dans Mozilla Firefox | 2009-07-15T00:00:00.000000 | 2009-07-17T00:00:00.000000 |
| certa-2009-ale-011 | Vulnérabilité dans Microsoft Office Web Components Control | 2009-07-13T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| CERTA-2009-ALE-011 | Vulnérabilité dans Microsoft Office Web Components Control | 2009-07-13T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| certa-2009-ale-010 | Vulnérabilité dans le contrôle ActiveX Microsoft Video | 2009-07-07T00:00:00.000000 | 2009-07-15T00:00:00.000000 |
| CERTA-2009-ALE-010 | Vulnérabilité dans le contrôle ActiveX Microsoft Video | 2009-07-07T00:00:00.000000 | 2009-07-15T00:00:00.000000 |
| certa-2009-ale-009 | Vulnérabilité dans Microsoft DirectShow | 2009-05-29T00:00:00.000000 | 2009-07-14T00:00:00.000000 |
| CERTA-2009-ALE-009 | Vulnérabilité dans Microsoft DirectShow | 2009-05-29T00:00:00.000000 | 2009-07-14T00:00:00.000000 |
| certa-2009-ale-008 | Vulnérabilité Java de Mac OS X | 2009-05-20T00:00:00.000000 | 2009-06-17T00:00:00.000000 |
| CERTA-2009-ALE-008 | Vulnérabilité Java de Mac OS X | 2009-05-20T00:00:00.000000 | 2009-06-17T00:00:00.000000 |
| certa-2009-ale-007 | Vulnérabilité WebDAV sous Microsoft IIS | 2009-05-18T00:00:00.000000 | 2009-06-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2026-AVI-0118 | Multiples vulnérabilités dans les produits Splunk | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0117 | Multiples vulnérabilités dans GLPI | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0116 | Vulnérabilité dans les produits Moxa | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0115 | Multiples vulnérabilités dans Tenable Identity Exposure | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0114 | Multiples vulnérabilités dans Google Chrome | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0113 | Vulnérabilité dans Google Pixel | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| CERTFR-2026-AVI-0117 | Multiples vulnérabilités dans GLPI | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| CERTFR-2026-AVI-0116 | Vulnérabilité dans les produits Moxa | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| CERTFR-2026-AVI-0115 | Multiples vulnérabilités dans Tenable Identity Exposure | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| CERTFR-2026-AVI-0114 | Multiples vulnérabilités dans Google Chrome | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| CERTFR-2026-AVI-0113 | Vulnérabilité dans Google Pixel | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0112 | Multiples vulnérabilités dans les produits VMware | 2026-02-02T00:00:00.000000 | 2026-02-02T00:00:00.000000 |
| certfr-2026-avi-0111 | Vulnérabilité dans ESET Inspect Connector | 2026-02-02T00:00:00.000000 | 2026-02-02T00:00:00.000000 |
| CERTFR-2026-AVI-0112 | Multiples vulnérabilités dans les produits VMware | 2026-02-02T00:00:00.000000 | 2026-02-02T00:00:00.000000 |
| CERTFR-2026-AVI-0111 | Vulnérabilité dans ESET Inspect Connector | 2026-02-02T00:00:00.000000 | 2026-02-02T00:00:00.000000 |
| certfr-2026-avi-0110 | Multiples vulnérabilités Ivanti Endpoint Manager Mobile (EPMM) | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0109 | Multiples vulnérabilités dans les produits IBM | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0108 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0107 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0106 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0105 | Vulnérabilité dans Microsoft Edge | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0104 | Vulnérabilité dans Qnap QTS | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0103 | Multiples vulnérabilités dans Node.js | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0102 | Vulnérabilité dans Splunk Enterprise | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| CERTFR-2026-AVI-0110 | Multiples vulnérabilités Ivanti Endpoint Manager Mobile (EPMM) | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| CERTFR-2026-AVI-0109 | Multiples vulnérabilités dans les produits IBM | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| CERTFR-2026-AVI-0108 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| CERTFR-2026-AVI-0107 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| CERTFR-2026-AVI-0106 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| CERTFR-2026-AVI-0105 | Vulnérabilité dans Microsoft Edge | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-000017 | Cybozu KUNAI for Android vulnerable to denial-of-service (DoS) | 2024-02-06T13:25+09:00 | 2024-06-27T13:28+09:00 |
| jvndb-2024-001462 | File and Directory Permissions Vulnerability in Hitachi Tuning Manager | 2024-02-05T14:54+09:00 | 2024-02-05T14:54+09:00 |
| jvndb-2024-000016 | Group Office vulnerable to cross-site scripting | 2024-02-01T13:48+09:00 | 2024-03-11T18:04+09:00 |
| jvndb-2024-000015 | Payment EX vulnerable to information disclosure | 2024-02-01T13:41+09:00 | 2024-03-11T17:42+09:00 |
| jvndb-2024-001161 | Multiple vulnerabilities in SHARP Energy Management Controller with Cloud Services | 2024-01-31T16:01+09:00 | 2024-01-31T16:01+09:00 |
| jvndb-2024-001160 | File and Directory Permissions Vulnerability in Hitachi Storage Plug-in for VMware vCenter | 2024-01-31T15:25+09:00 | 2024-03-11T17:41+09:00 |
| jvndb-2024-001062 | Yamaha wireless LAN access point devices vulnerable to active debug code | 2024-01-24T17:16+09:00 | 2024-03-13T17:24+09:00 |
| jvndb-2024-001061 | ELECOM wireless LAN routers vulnerable to OS command injection | 2024-01-24T17:16+09:00 | 2025-02-13T14:31+09:00 |
| jvndb-2024-000014 | Oracle WebLogic Server vulnerable to HTTP header injection | 2024-01-24T13:53+09:00 | 2024-01-24T13:53+09:00 |
| jvndb-2024-000005 | "Mercari" App for Android fails to restrict custom URL schemes properly | 2024-01-24T13:46+09:00 | 2024-03-04T18:01+09:00 |
| jvndb-2024-000008 | Improper restriction of XML external entity references (XXE) in MLIT "Electronic Delivery Check System" and "Electronic delivery item Inspection Support System" | 2024-01-23T16:57+09:00 | 2024-03-13T17:40+09:00 |
| jvndb-2024-000013 | Android App "Spoon" uses a hard-coded API key for an external service | 2024-01-23T16:53+09:00 | 2024-03-14T17:44+09:00 |
| jvndb-2024-000010 | Improper restriction of XML external entity references (XXE) in "Electronic Delivery Check System (Ministry of Agriculture, Forestry and Fisheries The Agriculture and Rural Development Project Version)" | 2024-01-23T15:25+09:00 | 2024-03-14T17:33+09:00 |
| jvndb-2024-000009 | Improper restriction of XML external entity references (XXE) in Electronic Deliverables Creation Support Tool provided by Ministry of Defense | 2024-01-23T15:13+09:00 | 2024-03-13T17:46+09:00 |
| jvndb-2024-000012 | Access analysis CGI An-Analyzer vulnerable to open redirect | 2024-01-22T15:57+09:00 | 2024-03-13T17:34+09:00 |
| jvndb-2024-000011 | Multiple vulnerabilities in a-blog cms | 2024-01-22T15:08+09:00 | 2024-03-13T17:50+09:00 |
| jvndb-2024-000006 | FusionPBX vulnerable to cross-site scripting | 2024-01-19T12:30+09:00 | 2024-03-12T17:31+09:00 |
| jvndb-2024-000007 | Multiple Dahua Technology products vulnerable to authentication bypass | 2024-01-18T13:43+09:00 | 2024-07-11T16:10+09:00 |
| jvndb-2024-000004 | Drupal vulnerable to improper handling of structural elements | 2024-01-16T13:41+09:00 | 2024-03-12T17:33+09:00 |
| jvndb-2024-000003 | Pleasanter vulnerable to cross-site scripting | 2024-01-15T15:59+09:00 | 2024-01-15T15:59+09:00 |
| jvndb-2024-000002 | Thermal camera TMC series vulnerable to insufficient technical documentation | 2024-01-15T15:19+09:00 | 2024-03-11T18:17+09:00 |
| jvndb-2024-000001 | Improper input validation vulnerability in WordPress Plugin "WordPress Quiz Maker Plugin" | 2024-01-12T13:51+09:00 | 2024-03-14T12:28+09:00 |
| jvndb-2024-001002 | Multiple TP-Link products vulnerable to OS command injection | 2024-01-10T13:57+09:00 | 2024-03-14T13:52+09:00 |
| jvndb-2024-001001 | Multiple vulnerabilities in Panasonic Control FPWIN Pro7 | 2024-01-10T13:46+09:00 | 2024-01-10T13:46+09:00 |
| jvndb-2023-000126 | Multiple vulnerabilities in PowerCMS | 2023-12-26T16:46+09:00 | 2024-03-18T17:58+09:00 |
| jvndb-2023-000125 | Multiple vulnerabilities in BUFFALO VR-S1000 | 2023-12-26T15:51+09:00 | 2024-03-19T17:56+09:00 |
| jvndb-2023-014781 | Brother iPrint&Scan Desktop for Windows vulnerable to improper link resolution before file access | 2023-12-26T09:27+09:00 | 2024-03-18T18:05+09:00 |
| jvndb-2023-012042 | WordPress plugin "MW WP Form" vulnerable to arbitrary file upload | 2023-12-15T15:17+09:00 | 2024-03-26T17:39+09:00 |
| jvndb-2023-000123 | Multiple vulnerabilities in GROWI | 2023-12-13T15:30+09:00 | 2024-03-19T17:46+09:00 |
| jvndb-2023-011403 | ELECOM wireless LAN routers vulnerable to OS command injection | 2023-12-13T15:06+09:00 | 2024-04-18T17:22+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14832 | OpenClaw存在未明漏洞(CNVD-2026-14832) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14831 | OpenClaw授权绕过漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14830 | OpenClaw存在未明漏洞(CNVD-2026-14830) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14829 | OpenClaw存在未明漏洞(CNVD-2026-14829) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14828 | OpenClaw存在未明漏洞(CNVD-2026-14828) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14827 | OpenClaw数据伪造问题漏洞(CNVD-2026-14827) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14826 | OpenClaw信息泄露漏洞(CNVD-2026-14826) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14825 | OpenClaw拒绝服务漏洞(CNVD-2026-14825) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-16151 | Google Chrome内存错误引用漏洞(CNVD-2026-16151) | 2026-03-23 | 2026-04-07 |
| cnvd-2026-18148 | StudioCMS信息泄露漏洞 | 2026-03-20 | 2026-04-22 |
| cnvd-2026-17494 | WordPress插件Atarim存在未明漏洞 | 2026-03-19 | 2026-04-16 |
| cnvd-2026-17493 | Microsoft Edge (Chromium-based) for Android欺骗漏洞(CNVD-2026-17493) | 2026-03-19 | 2026-04-16 |
| cnvd-2026-17492 | IBM Aspera Console拒绝服务漏洞 | 2026-03-19 | 2026-04-16 |
| cnvd-2026-17491 | IBM Aspera Console信息泄露漏洞(CNVD-2026-17491) | 2026-03-19 | 2026-04-16 |
| cnvd-2026-17371 | Dell ThinOS 10命令注入漏洞 | 2026-03-19 | 2026-04-15 |
| cnvd-2026-17188 | AnythingLLM SQL注入漏洞 | 2026-03-19 | 2026-04-15 |
| cnvd-2026-16617 | ImageMagick缓冲区溢出漏洞(CNVD-2026-16617) | 2026-03-19 | 2026-04-09 |
| cnvd-2026-16396 | HCL AION拒绝服务漏洞 | 2026-03-19 | 2026-04-08 |
| cnvd-2026-15159 | Apache Airflow信息泄露漏洞(CNVD-2026-15159) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15158 | Apache Airflow信息泄露漏洞(CNVD-2026-15158) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15157 | Apache Airflow安全绕过漏洞(CNVD-2026-15157) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15156 | Apache Airflow信息泄露漏洞(CNVD-2026-15156) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15154 | HCL AION安全绕过漏洞 | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15153 | HCL AION存在未明漏洞(CNVD-2026-15153) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15151 | HCL AION存在未明漏洞(CNVD-2026-15151) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15150 | HCL AION存在未明漏洞(CNVD-2026-15150) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15149 | HCL AION存在未明漏洞(CNVD-2026-15149) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15148 | HCL AION存在未明漏洞(CNVD-2026-15148) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15147 | HCL AION存在未明漏洞(CNVD-2026-15147) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15146 | HCL AION SQL注入漏洞(CNVD-2026-15146) | 2026-03-19 | 2026-03-27 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01213 | Уязвимость функции dbUnmount() модуля fs/jfs/jfs_dmap.c файловой системы JFS ядра операци… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01212 | Уязвимость параметра max_cert_list сжатия сертификатов в TLS 1.3 библиотеки OpenSSL, позв… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01211 | Уязвимость функции do_mount_setattr() модуля fs/namespace.c файловой системы ядра операци… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01210 | Уязвимость функции autofs_catatonic_mode() модуля fs/autofs/waitq.c файловой системы ядра… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01209 | Уязвимость функции vfio_iommu_iova_build_caps() модуля drivers/vfio/vfio_iommu_type1.c др… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01208 | Уязвимость функции kfd_build_sysfs_node_entry() модуля drivers/gpu/drm/amd/amdkfd/kfd_top… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01207 | Уязвимость функции crash_load_segments() модуля arch/x86/kernel/crash.c поддержки платфор… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01206 | Уязвимость функции tcf_block_bind() модуля net/sched/cls_api.c подсистемы управления траф… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01205 | Уязвимость функции get_gpio_i2c_info() модуля drivers/gpu/drm/amd/display/dc/bios/bios_pa… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01204 | Уязвимость функции __ext4_fill_super() модуля fs/ext4/super.c файловой системы Ext4 ядра … | 04.02.2026 | 04.02.2026 |
| bdu:2026-01203 | Уязвимость функции target_free_cmd_counter() модуля drivers/target/target_core_transport.… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01202 | Уязвимость функции mt7996_mcu_exit() модуля drivers/net/wireless/mediatek/mt76/mt7996/mcu… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01201 | Уязвимость функции spmmc_drv_probe() модуля drivers/mmc/host/sunplus-mmc.c драйвера карт … | 04.02.2026 | 04.02.2026 |
| bdu:2026-01200 | Уязвимость функции __ip6_make_skb() модуля net/ipv6/ip6_output.c реализации протокола IPv… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01199 | Уязвимость функции smsusb_stop_streaming() модуля drivers/media/usb/siano/smsusb.c драйве… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01198 | Уязвимость функции blkcg_activate_policy() модуля block/blk-cgroup.c поддержки блочного у… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01197 | Уязвимость функции xfrm_dev_policy_add() модуля net/xfrm/xfrm_device.c реализации сетевых… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01196 | Уязвимость функции btrfs_search_path_in_tree_user() модуля fs/btrfs/ioctl.c файловой сист… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01195 | Уязвимость функции qt1010_init() модуля drivers/media/tuners/qt1010.c драйвера мультимеди… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01194 | Уязвимость функции iomap_write_delalloc_scan() модуля fs/iomap/buffered-io.c файловой сис… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01193 | Уязвимость функции __write_overflow_field() модуля include/linux/fortify-string.h ядра оп… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01192 | Уязвимость функции imx_uart_probe() модуля drivers/tty/serial/imx.c драйвера консоли TTY … | 04.02.2026 | 04.02.2026 |
| bdu:2026-01191 | Уязвимость функции ieee80211_tx_dequeue() модуля net/mac80211/tx.c реализации стека mac80… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01190 | Уязвимость функции qedf_alloc_global_queues() модуля drivers/scsi/qedf/qedf_main.c драйве… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01189 | Уязвимость компонента Session Handler платформы для создания и развертывания рабочих проц… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01188 | Уязвимость функции vduse_vdpa_set_vq_affinity() модуля drivers/vdpa/vdpa_user/vduse_dev.c… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01187 | Уязвимость функции raid10_run() модуля drivers/md/raid10.c драйвера нескольких устройств … | 04.02.2026 | 04.02.2026 |
| bdu:2026-01186 | Уязвимость функции rdma_restrack_del() модуля drivers/infiniband/core/restrack.c драйвера… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01185 | Уязвимость функции sev_migrate_from() модуля arch/x86/kvm/svm/sev.c подсистемы виртуализа… | 04.02.2026 | 04.02.2026 |
| bdu:2026-01184 | Уязвимость функции intel_quark_thermal_init() модуля drivers/thermal/intel/intel_quark_dt… | 04.02.2026 | 04.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201912-0636 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:24:52.133000Z |
| var-200102-0077 | Memory leak in Cisco Catalyst 4000, 5000, and 6000 series switches allows remote attacker… | 2024-07-23T21:24:52.601000Z |
| var-200504-0293 | Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allo… | 2024-07-23T21:24:51.414000Z |
| var-202006-1831 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2024-07-23T21:24:50.411000Z |
| var-202106-0349 | Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to pote… | 2024-07-23T21:24:47.280000Z |
| var-201410-1144 | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0… | 2024-07-23T21:24:46.357000Z |
| var-200809-0190 | Multiple integer overflows in the SearchKit API in Apple Mac OS X 10.4.11 and 10.5 throug… | 2024-07-23T21:24:45.643000Z |
| var-200701-0295 | The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML … | 2024-07-23T21:24:06.215000Z |
| var-202003-1779 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:23:59.719000Z |
| var-201304-0317 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:23:59.799000Z |
| var-200110-0170 | The Legion of the Bouncy Castle Java Cryptography API before release 1.38, as used in Cry… | 2024-07-23T21:23:39.977000Z |
| var-201504-0150 | cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate con… | 2024-07-23T21:23:08.257000Z |
| var-202108-2123 | A memory corruption vulnerability was addressed with improved locking. This issue is fixe… | 2024-07-23T21:23:07.966000Z |
| var-201503-0388 | Use-after-free vulnerability in the _zend_shared_memdup function in zend_shared_alloc.c i… | 2024-07-23T21:23:07.716000Z |
| var-201003-1075 | Use-after-free vulnerability in the abstract file-descriptor handling interface in the cu… | 2024-07-23T21:23:07.044000Z |
| var-200801-0561 | Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 th… | 2024-07-23T21:23:07.143000Z |
| var-201711-0454 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T21:23:03.598000Z |
| var-201506-0264 | The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.… | 2024-07-23T21:23:02.233000Z |
| var-202004-0812 | In ksh version 20120801, a flaw was found in the way it evaluates certain environment var… | 2024-07-23T21:22:46.394000Z |
| var-200506-0133 | Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow r… | 2024-07-23T21:22:45.018000Z |
| var-202001-0472 | Insufficient control flow in certain data structures for some Intel(R) Processors with In… | 2024-07-23T21:22:25.122000Z |
| var-201710-1406 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari befo… | 2024-07-23T21:22:23.796000Z |
| var-201302-0233 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:21:52.515000Z |
| var-201105-0197 | Unspecified vulnerability in the Java Embedding Plugin (JEP) in Mozilla Firefox before 3.… | 2024-07-23T21:21:47.763000Z |
| var-200803-0028 | The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unu… | 2024-07-23T21:21:47.664000Z |
| var-201311-0106 | Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1… | 2024-07-23T21:21:38.043000Z |
| var-201904-1401 | A cross-site scripting issue existed in Safari. This issue was addressed with improved UR… | 2024-07-23T21:21:37.851000Z |
| var-202004-2200 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T21:21:06.954000Z |
| var-201912-0525 | A logic issue was addressed with improved state management. This issue is fixed in tvOS 1… | 2024-07-23T21:21:06.108000Z |
| var-200312-0218 | OpenSSL 0.9.6k allows remote attackers to cause a denial of service (crash via large recu… | 2024-07-23T21:21:01.334000Z |