Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43179 |
N/A
|
erofs: fix incorrect early exits for invalid metabox-e… |
Linux |
Linux |
2026-05-06T11:27:52.324Z | 2026-05-06T11:27:52.324Z |
| CVE-2026-43178 |
N/A
|
procfs: fix possible double mmput() in do_procmap_query() |
Linux |
Linux |
2026-05-06T11:27:51.524Z | 2026-05-06T11:27:51.524Z |
| CVE-2026-43177 |
N/A
|
media: ipu6: Fix RPM reference leak in probe error paths |
Linux |
Linux |
2026-05-06T11:27:50.843Z | 2026-05-06T11:27:50.843Z |
| CVE-2026-43176 |
N/A
|
wifi: rtw89: pci: validate release report content befo… |
Linux |
Linux |
2026-05-06T11:27:50.150Z | 2026-05-07T17:14:32.214Z |
| CVE-2026-43175 |
N/A
|
clk: rs9: Reserve 8 struct clk_hw slots for for 9FGV0841 |
Linux |
Linux |
2026-05-06T11:27:49.496Z | 2026-05-06T11:27:49.496Z |
| CVE-2026-43174 |
N/A
|
io_uring/zcrx: fix post open error handling |
Linux |
Linux |
2026-05-06T11:27:48.785Z | 2026-05-06T11:27:48.785Z |
| CVE-2026-43173 |
N/A
|
net: ethernet: xscale: Check for PTP support properly |
Linux |
Linux |
2026-05-06T11:27:48.097Z | 2026-05-06T11:27:48.097Z |
| CVE-2026-43172 |
N/A
|
wifi: iwlwifi: fix 22000 series SMEM parsing |
Linux |
Linux |
2026-05-06T11:27:47.358Z | 2026-05-07T17:14:30.979Z |
| CVE-2026-43171 |
N/A
|
EFI/CPER: don't dump the entire memory region |
Linux |
Linux |
2026-05-06T11:27:46.698Z | 2026-05-07T17:14:29.768Z |
| CVE-2026-43170 |
N/A
|
usb: dwc3: gadget: Move vbus draw to workqueue context |
Linux |
Linux |
2026-05-06T11:27:46.021Z | 2026-05-06T11:27:46.021Z |
| CVE-2026-43169 |
N/A
|
drm/buddy: Prevent BUG_ON by validating rounded allocation |
Linux |
Linux |
2026-05-06T11:27:45.356Z | 2026-05-06T11:27:45.356Z |
| CVE-2026-43168 |
N/A
|
ocfs2: fix reflink preserve cleanup issue |
Linux |
Linux |
2026-05-06T11:27:44.570Z | 2026-05-06T11:27:44.570Z |
| CVE-2026-43167 |
N/A
|
xfrm: always flush state and policy upon NETDEV_UNREGI… |
Linux |
Linux |
2026-05-06T11:27:43.904Z | 2026-05-06T11:27:43.904Z |
| CVE-2026-43166 |
N/A
|
erofs: fix interlaced plain identification for encoded… |
Linux |
Linux |
2026-05-06T11:27:43.242Z | 2026-05-06T11:27:43.242Z |
| CVE-2026-43165 |
N/A
|
hwmon: (nct7363) Fix a resource leak in nct7363_presen… |
Linux |
Linux |
2026-05-06T11:27:42.588Z | 2026-05-07T17:14:28.632Z |
| CVE-2026-43164 |
N/A
|
udplite: Fix null-ptr-deref in __udp_enqueue_schedule_skb(). |
Linux |
Linux |
2026-05-06T11:27:41.928Z | 2026-05-06T11:27:41.928Z |
| CVE-2026-43163 |
N/A
|
md/bitmap: fix GPF in write_page caused by resize race |
Linux |
Linux |
2026-05-06T11:27:41.265Z | 2026-05-06T11:27:41.265Z |
| CVE-2026-43162 |
N/A
|
media: tegra-video: Fix memory leak in __tegra_channel… |
Linux |
Linux |
2026-05-06T11:27:40.580Z | 2026-05-06T11:27:40.580Z |
| CVE-2026-43161 |
N/A
|
iommu/vt-d: Skip dev-iotlb flush for inaccessible PCIe… |
Linux |
Linux |
2026-05-06T11:27:39.881Z | 2026-05-06T11:27:39.881Z |
| CVE-2026-43160 |
N/A
|
mfd: macsmc: Initialize mutex |
Linux |
Linux |
2026-05-06T11:27:39.223Z | 2026-05-06T11:27:39.223Z |
| CVE-2026-43159 |
N/A
|
staging: rtl8723bs: fix null dereference in find_network |
Linux |
Linux |
2026-05-06T11:27:38.541Z | 2026-05-06T11:27:38.541Z |
| CVE-2026-43158 |
N/A
|
xfs: fix freemap adjustments when adding xattrs to lea… |
Linux |
Linux |
2026-05-06T11:27:37.848Z | 2026-05-06T11:27:37.848Z |
| CVE-2026-43157 |
N/A
|
octeontx2-af: CGX: fix bitmap leaks |
Linux |
Linux |
2026-05-06T11:27:37.185Z | 2026-05-06T11:27:37.185Z |
| CVE-2026-43156 |
N/A
|
net: usb: pegasus: enable basic endpoint checking |
Linux |
Linux |
2026-05-06T11:27:36.491Z | 2026-05-06T11:27:36.491Z |
| CVE-2026-43155 |
N/A
|
mux: mmio: fix regmap leak on probe failure |
Linux |
Linux |
2026-05-06T11:27:35.800Z | 2026-05-06T11:27:35.800Z |
| CVE-2026-43154 |
N/A
|
erofs: fix incorrect early exits in volume label handling |
Linux |
Linux |
2026-05-06T11:27:35.116Z | 2026-05-06T11:27:35.116Z |
| CVE-2026-43153 |
N/A
|
xfs: remove xfs_attr_leaf_hasname |
Linux |
Linux |
2026-05-06T11:27:34.446Z | 2026-05-06T11:27:34.446Z |
| CVE-2026-43152 |
N/A
|
HID: hid-pl: handle probe errors |
Linux |
Linux |
2026-05-06T11:27:33.736Z | 2026-05-06T11:27:33.736Z |
| CVE-2026-43151 |
N/A
|
Revert "media: iris: Add sanity check for stop streaming" |
Linux |
Linux |
2026-05-06T11:27:33.084Z | 2026-05-06T11:27:33.084Z |
| CVE-2026-43150 |
N/A
|
perf/arm-cmn: Reject unsupported hardware configurations |
Linux |
Linux |
2026-05-06T11:27:32.359Z | 2026-05-06T11:27:32.359Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43173 |
N/A
|
net: ethernet: xscale: Check for PTP support properly |
Linux |
Linux |
2026-05-06T11:27:48.097Z | 2026-05-06T11:27:48.097Z |
| CVE-2026-43172 |
N/A
|
wifi: iwlwifi: fix 22000 series SMEM parsing |
Linux |
Linux |
2026-05-06T11:27:47.358Z | 2026-05-07T17:14:30.979Z |
| CVE-2026-43171 |
N/A
|
EFI/CPER: don't dump the entire memory region |
Linux |
Linux |
2026-05-06T11:27:46.698Z | 2026-05-07T17:14:29.768Z |
| CVE-2026-43170 |
N/A
|
usb: dwc3: gadget: Move vbus draw to workqueue context |
Linux |
Linux |
2026-05-06T11:27:46.021Z | 2026-05-06T11:27:46.021Z |
| CVE-2026-43169 |
N/A
|
drm/buddy: Prevent BUG_ON by validating rounded allocation |
Linux |
Linux |
2026-05-06T11:27:45.356Z | 2026-05-06T11:27:45.356Z |
| CVE-2026-43168 |
N/A
|
ocfs2: fix reflink preserve cleanup issue |
Linux |
Linux |
2026-05-06T11:27:44.570Z | 2026-05-06T11:27:44.570Z |
| CVE-2026-43167 |
N/A
|
xfrm: always flush state and policy upon NETDEV_UNREGI… |
Linux |
Linux |
2026-05-06T11:27:43.904Z | 2026-05-06T11:27:43.904Z |
| CVE-2026-43166 |
N/A
|
erofs: fix interlaced plain identification for encoded… |
Linux |
Linux |
2026-05-06T11:27:43.242Z | 2026-05-06T11:27:43.242Z |
| CVE-2026-43165 |
N/A
|
hwmon: (nct7363) Fix a resource leak in nct7363_presen… |
Linux |
Linux |
2026-05-06T11:27:42.588Z | 2026-05-07T17:14:28.632Z |
| CVE-2026-43164 |
N/A
|
udplite: Fix null-ptr-deref in __udp_enqueue_schedule_skb(). |
Linux |
Linux |
2026-05-06T11:27:41.928Z | 2026-05-06T11:27:41.928Z |
| CVE-2026-43163 |
N/A
|
md/bitmap: fix GPF in write_page caused by resize race |
Linux |
Linux |
2026-05-06T11:27:41.265Z | 2026-05-06T11:27:41.265Z |
| CVE-2026-43162 |
N/A
|
media: tegra-video: Fix memory leak in __tegra_channel… |
Linux |
Linux |
2026-05-06T11:27:40.580Z | 2026-05-06T11:27:40.580Z |
| CVE-2026-43161 |
N/A
|
iommu/vt-d: Skip dev-iotlb flush for inaccessible PCIe… |
Linux |
Linux |
2026-05-06T11:27:39.881Z | 2026-05-06T11:27:39.881Z |
| CVE-2026-43160 |
N/A
|
mfd: macsmc: Initialize mutex |
Linux |
Linux |
2026-05-06T11:27:39.223Z | 2026-05-06T11:27:39.223Z |
| CVE-2026-43159 |
N/A
|
staging: rtl8723bs: fix null dereference in find_network |
Linux |
Linux |
2026-05-06T11:27:38.541Z | 2026-05-06T11:27:38.541Z |
| CVE-2026-43158 |
N/A
|
xfs: fix freemap adjustments when adding xattrs to lea… |
Linux |
Linux |
2026-05-06T11:27:37.848Z | 2026-05-06T11:27:37.848Z |
| CVE-2026-43157 |
N/A
|
octeontx2-af: CGX: fix bitmap leaks |
Linux |
Linux |
2026-05-06T11:27:37.185Z | 2026-05-06T11:27:37.185Z |
| CVE-2026-43156 |
N/A
|
net: usb: pegasus: enable basic endpoint checking |
Linux |
Linux |
2026-05-06T11:27:36.491Z | 2026-05-06T11:27:36.491Z |
| CVE-2026-43155 |
N/A
|
mux: mmio: fix regmap leak on probe failure |
Linux |
Linux |
2026-05-06T11:27:35.800Z | 2026-05-06T11:27:35.800Z |
| CVE-2026-43154 |
N/A
|
erofs: fix incorrect early exits in volume label handling |
Linux |
Linux |
2026-05-06T11:27:35.116Z | 2026-05-06T11:27:35.116Z |
| CVE-2026-43153 |
N/A
|
xfs: remove xfs_attr_leaf_hasname |
Linux |
Linux |
2026-05-06T11:27:34.446Z | 2026-05-06T11:27:34.446Z |
| CVE-2026-43152 |
N/A
|
HID: hid-pl: handle probe errors |
Linux |
Linux |
2026-05-06T11:27:33.736Z | 2026-05-06T11:27:33.736Z |
| CVE-2026-43151 |
N/A
|
Revert "media: iris: Add sanity check for stop streaming" |
Linux |
Linux |
2026-05-06T11:27:33.084Z | 2026-05-06T11:27:33.084Z |
| CVE-2026-43150 |
N/A
|
perf/arm-cmn: Reject unsupported hardware configurations |
Linux |
Linux |
2026-05-06T11:27:32.359Z | 2026-05-06T11:27:32.359Z |
| CVE-2026-43149 |
N/A
|
net: wan/fsl_ucc_hdlc: Fix dma_free_coherent() in uhdl… |
Linux |
Linux |
2026-05-06T11:27:31.708Z | 2026-05-06T11:27:31.708Z |
| CVE-2026-43148 |
N/A
|
powerpc/smp: Add check for kcalloc() failure in parse_… |
Linux |
Linux |
2026-05-06T11:27:30.902Z | 2026-05-06T11:27:30.902Z |
| CVE-2026-43147 |
N/A
|
Revert "PCI/IOV: Add PCI rescan-remove locking when en… |
Linux |
Linux |
2026-05-06T11:27:30.235Z | 2026-05-06T11:27:30.235Z |
| CVE-2026-43146 |
N/A
|
media: iris: Add buffer to list only after successful … |
Linux |
Linux |
2026-05-06T11:27:29.562Z | 2026-05-06T11:27:29.562Z |
| CVE-2026-43145 |
N/A
|
remoteproc: imx_rproc: Fix invalid loaded resource tab… |
Linux |
Linux |
2026-05-06T11:27:28.911Z | 2026-05-06T11:27:28.911Z |
| CVE-2026-43144 |
N/A
|
wifi: brcmfmac: Fix potential kernel oops when probe fails |
Linux |
Linux |
2026-05-06T11:27:28.220Z | 2026-05-06T11:27:28.220Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-15577 | An unauthenticated attacker can exploit this vulnerability by manipulating URL to achieve arbitrary… | 2026-02-12T07:15:56.400 | 2026-02-23T14:05:23.027 |
| fkie_cve-2026-2327 | Versions of the package markdown-it from 13.0.0 and before 14.1.1 are vulnerable to Regular Express… | 2026-02-12T06:16:02.243 | 2026-02-23T14:08:11.870 |
| fkie_cve-2025-14892 | The Prime Listing Manager WordPress plugin through 1.1 allows an attacker to gain administrative ac… | 2026-02-12T06:16:01.963 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2391 | ### Summary The `arrayLimit` option in qs does not enforce limits for comma-separated values when `… | 2026-02-12T05:17:11.187 | 2026-02-24T20:13:51.837 |
| fkie_cve-2026-26092 | Rejected reason: Not used | 2026-02-12T05:17:06.433 | 2026-02-12T05:17:06.433 |
| fkie_cve-2026-26091 | Rejected reason: Not used | 2026-02-12T05:17:06.373 | 2026-02-12T05:17:06.373 |
| fkie_cve-2026-26090 | Rejected reason: Not used | 2026-02-12T05:17:06.327 | 2026-02-12T05:17:06.327 |
| fkie_cve-2026-26089 | Rejected reason: Not used | 2026-02-12T05:17:06.267 | 2026-02-12T05:17:06.267 |
| fkie_cve-2026-26088 | Rejected reason: Not used | 2026-02-12T05:17:06.213 | 2026-02-12T05:17:06.213 |
| fkie_cve-2026-26087 | Rejected reason: Not used | 2026-02-12T05:17:06.157 | 2026-02-12T05:17:06.157 |
| fkie_cve-2026-26086 | Rejected reason: Not used | 2026-02-12T05:17:06.100 | 2026-02-12T05:17:06.100 |
| fkie_cve-2026-26085 | Rejected reason: Not used | 2026-02-12T05:17:06.020 | 2026-02-12T05:17:06.020 |
| fkie_cve-2026-25676 | The installer of M-Track Duo HD version 1.0.0 contains an issue with the DLL search path, which may… | 2026-02-12T05:17:04.020 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-26235 | JUNG Smart Visu Server 1.1.1050 contains a denial of service vulnerability that allows unauthentica… | 2026-02-12T04:15:47.770 | 2026-02-20T19:52:03.777 |
| fkie_cve-2026-26234 | JUNG Smart Visu Server 1.1.1050 contains a request header manipulation vulnerability that allows un… | 2026-02-12T04:15:47.600 | 2026-02-20T15:14:52.610 |
| fkie_cve-2026-1537 | The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnera… | 2026-02-12T04:15:47.413 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-23857 | Dell Update Package (DUP) Framework, versions 23.12.00 through 24.12.00, contains an Improper Handl… | 2026-02-12T03:15:47.003 | 2026-02-18T19:33:06.040 |
| fkie_cve-2026-23856 | Dell iDRAC Service Module (iSM) for Windows, versions prior to 6.0.3.1, and Dell iDRAC Service Modu… | 2026-02-12T03:15:46.833 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0969 | The serialize function used to compile MDX in next-mdx-remote is vulnerable to arbitrary code execu… | 2026-02-12T03:15:46.667 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1729 | The AdForest theme for WordPress is vulnerable to authentication bypass in all versions up to, and … | 2026-02-12T02:15:48.993 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-26215 | manga-image-translator version beta-0.3 and prior in shared API mode contains an unsafe deserializa… | 2026-02-11T23:16:10.797 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-20700 | A memory corruption issue was addressed with improved state management. This issue is fixed in iOS … | 2026-02-11T23:16:10.670 | 2026-03-25T17:39:37.227 |
| fkie_cve-2026-20682 | A logic issue was addressed with improved state management. This issue is fixed in iOS 18.7.5 and i… | 2026-02-11T23:16:10.557 | 2026-03-25T16:16:20.237 |
| fkie_cve-2026-20681 | A privacy issue was addressed with improved private data redaction for log entries. This issue is f… | 2026-02-11T23:16:10.460 | 2026-02-13T20:17:40.933 |
| fkie_cve-2026-20680 | The issue was addressed with additional restrictions on the observability of app states. This issue… | 2026-02-11T23:16:10.350 | 2026-04-02T19:21:22.013 |
| fkie_cve-2026-20678 | An authorization issue was addressed with improved state management. This issue is fixed in iOS 18.… | 2026-02-11T23:16:10.217 | 2026-04-02T19:21:21.847 |
| fkie_cve-2026-20677 | A race condition was addressed with improved handling of symbolic links. This issue is fixed in iOS… | 2026-02-11T23:16:10.107 | 2026-04-02T19:21:21.663 |
| fkie_cve-2026-20676 | This issue was addressed through improved state management. This issue is fixed in Safari 26.3, iOS… | 2026-02-11T23:16:09.990 | 2026-04-02T19:21:21.473 |
| fkie_cve-2026-20675 | The issue was addressed with improved bounds checks. This issue is fixed in iOS 18.7.5 and iPadOS 1… | 2026-02-11T23:16:09.870 | 2026-04-02T19:21:21.270 |
| fkie_cve-2026-20674 | A privacy issue was addressed by removing sensitive data. This issue is fixed in iOS 26.3 and iPadO… | 2026-02-11T23:16:09.757 | 2026-02-13T18:16:19.623 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-636m-32xr-g349 |
4.6 (3.1)
|
HCL BigFix Service Management (SM) does not adequately sanitize or safely render spreadsheet files … | 2026-05-06T15:32:41Z | 2026-05-06T15:32:41Z |
| ghsa-5w53-ghhh-45v8 |
7.1 (4.0)
|
Stack-based Buffer Overflow vulnerability in the WatchGuard Agent discovery service on Windows allo… | 2026-05-06T15:32:41Z | 2026-05-06T15:32:41Z |
| ghsa-5qfh-xfvx-w63g |
5.4 (3.1)
|
Cross Site Scripting vulnerability in Juzaweb CMS v.5.0.0 allows a remote attacker via execute arbi… | 2026-05-06T15:32:41Z | 2026-05-06T15:32:41Z |
| ghsa-4w64-m6x6-926r |
3.5 (3.1)
|
HCL BigFix Service Management (SM) application fails to strip EXIF metadata from uploaded images. … | 2026-05-06T15:32:41Z | 2026-05-06T15:32:41Z |
| ghsa-mjw2-gf6p-382h |
7.5 (3.1)
|
Gazelle versions through 0.49 for Perl allows HTTP Request Smuggling via Improper Header Precedence… | 2026-05-06T15:32:40Z | 2026-05-07T18:30:36Z |
| ghsa-546v-xqjf-qgcr |
9.1 (3.1)
|
Apache::Session::Generate::ModUniqueId versions from 1.54 through 1.94 for Perl session ids are ins… | 2026-05-06T15:32:40Z | 2026-05-06T18:30:30Z |
| ghsa-mh4x-qpf6-hr3q |
8.7 (4.0)
|
A type confusion vulnerability in Qt SVG allows an attacker to cause an application crash via a cra… | 2026-05-06T12:30:36Z | 2026-05-06T12:30:36Z |
| ghsa-fcq7-vvcv-2qg9 |
|
In the Linux kernel, the following vulnerability has been resolved: ceph: supply snapshot context … | 2026-05-06T12:30:36Z | 2026-05-06T12:30:36Z |
| ghsa-5g7g-fprm-cgpp |
|
In the Linux kernel, the following vulnerability has been resolved: RDMA/ionic: Fix potential NULL… | 2026-05-06T12:30:36Z | 2026-05-06T12:30:36Z |
| ghsa-2hw8-5267-5p9j |
|
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Add sanity ch… | 2026-05-06T12:30:36Z | 2026-05-06T12:30:36Z |
| ghsa-wqxw-h6xc-72x8 |
|
In the Linux kernel, the following vulnerability has been resolved: phy: fsl-imx8mq-usb: set platf… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-w929-9wq4-xrmp |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: libertas: fix WARNING in… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-w6jm-j85g-vpgj |
|
In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix RSS context delet… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-w4mh-vmr5-87jc |
|
In the Linux kernel, the following vulnerability has been resolved: mailbox: mchp-ipc-sbi: fix out… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-vwc3-h3w8-q85f |
|
In the Linux kernel, the following vulnerability has been resolved: dm: clear cloned request bio p… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:36Z |
| ghsa-rj9j-qfgp-687w |
|
In the Linux kernel, the following vulnerability has been resolved: alpha: fix user-space corrupti… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-r9ph-9m45-xj6w |
|
In the Linux kernel, the following vulnerability has been resolved: EFI/CPER: don't go past the AR… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-q2m9-5gr9-rjw9 |
|
In the Linux kernel, the following vulnerability has been resolved: arm64: Add support for TSV110 … | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-p7j5-r5cq-h6qj |
|
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Ignore -EBUSY when c… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-jphw-vq37-q7ww |
|
In the Linux kernel, the following vulnerability has been resolved: APEI/GHES: ensure that won't g… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:36Z |
| ghsa-jgp7-74rh-r6jv |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix potential zer… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-j6r6-35jf-jm62 |
|
In the Linux kernel, the following vulnerability has been resolved: media: cx88: Add missing unmap… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-hv6m-q2m2-vxvr |
|
In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix double destroy_… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:36Z |
| ghsa-h2mh-m9gx-72x5 |
|
In the Linux kernel, the following vulnerability has been resolved: gfs2: fiemap page fault fix I… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-fwqr-8mv5-j4p7 |
|
In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Fix possible dere… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-fgwc-jh8c-45pq |
|
In the Linux kernel, the following vulnerability has been resolved: media: mtk-mdp: Fix a referenc… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-f426-43f4-xjrc |
|
In the Linux kernel, the following vulnerability has been resolved: media: qcom: camss: vfe: Fix o… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-cmxm-m5w5-f84q |
|
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Add bounds check on pa… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:36Z |
| ghsa-c8jc-4xgp-98r9 |
|
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Flush excepti… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:36Z |
| ghsa-9wc3-g8j8-wv5q |
|
In the Linux kernel, the following vulnerability has been resolved: hfsplus: pretend special inode… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-79 |
|
Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to ve… | vyper | 2023-05-11T22:15:00Z | 2023-06-05T01:13:03.051477Z |
| pysec-2023-78 |
|
Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to ve… | vyper | 2023-05-11T21:15:00Z | 2023-06-05T01:13:02.949990Z |
| pysec-2023-77 |
|
Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to ve… | vyper | 2023-05-11T21:15:00Z | 2023-06-05T01:13:02.500642Z |
| pysec-2023-70 |
|
A directory traversal vulnerability in the /get-artifact API method of the mlflow platfor… | mlflow | 2023-05-11T02:15:00Z | 2023-06-05T01:12:55.587142Z |
| pysec-2023-63 |
|
in-toto is a framework to protect supply chain integrity. The in-toto configuration is re… | in-toto | 2023-05-10T18:15:00Z | 2023-06-05T01:12:53.259453Z |
| pysec-2023-64 |
|
mage-ai is an open-source data pipeline tool for transforming and integrating data. Those… | mage-ai | 2023-05-09T15:15:00Z | 2023-06-05T01:12:54.165512Z |
| pysec-2023-76 |
|
Vyper is a pythonic smart contract language for the EVM. The storage allocator does not g… | vyper | 2023-05-08T17:15:00Z | 2023-06-05T01:13:02.407312Z |
| pysec-2023-59 |
|
Privilege Context Switching Error vulnerability in Apache Software Foundation Apache Airf… | apache-airflow | 2023-05-08T12:15:00Z | 2023-06-05T01:12:45.655810Z |
| pysec-2023-60 |
|
Task instance details page in the UI is vulnerable to a stored XSS.This issue affects Apa… | apache-airflow | 2023-05-08T10:15:00Z | 2023-06-05T01:12:45.763850Z |
| pysec-2023-61 |
|
In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to b… | django | 2023-05-07T02:15:00Z | 2023-06-05T01:12:51.525399Z |
| pysec-2023-62 |
|
Flask is a lightweight WSGI web application framework. When all of the following conditio… | flask | 2023-05-02T18:15:00Z | 2023-06-05T01:12:52.229549Z |
| pysec-2023-72 |
|
** UNSUPPORTED WHEN ASSIGNED ** The Apache Spark UI offers the possibility to enable ACLs… | pyspark | 2023-05-02T09:15:00Z | 2023-06-05T01:12:58.679776Z |
| pysec-2023-68 |
|
Relative Path Traversal in GitHub repository mlflow/mlflow prior to 2.3.1. | mlflow | 2023-04-28T00:15:00Z | 2023-06-05T01:12:55.421205Z |
| pysec-2023-273 |
8.8 (3.1)
|
Kiwi TCMS is an open source test management system. In kiwitcms/Kiwi v12.2 and prior and … | kiwitcms | 2023-04-24T22:15:00+00:00 | 2024-11-21T14:22:53.063160+00:00 |
| pysec-2023-131 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the ethereum virtual machine. In versions… | vyper | 2023-04-24T22:15:00+00:00 | 2023-08-02T18:28:00.492615+00:00 |
| pysec-2023-27 |
|
mindsdb is a Machine Learning platform to help developers build AI solutions. In affected… | mindsdb | 2023-04-21T21:15:00Z | 2023-05-04T03:49:46.507545Z |
| pysec-2023-48 |
|
There MultipartParser usage in Encode's Starlette python framework before versions 0.25.0… | starlette | 2023-04-21T16:15:00Z | 2023-05-04T03:49:48.202946Z |
| pysec-2023-36 |
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.1.0. | modoboa | 2023-04-21T13:15:00Z | 2023-05-04T03:49:46.989399Z |
| pysec-2023-35 |
|
Improper Authorization in GitHub repository modoboa/modoboa prior to 2.1.0. | modoboa | 2023-04-21T13:15:00Z | 2023-05-04T03:49:46.938934Z |
| pysec-2023-41 |
|
pretalx 2.3.1 before 2.3.2 allows path traversal in HTML export (a non-default feature). … | pretalx | 2023-04-20T21:15:00Z | 2023-05-04T03:49:47.257209Z |
| pysec-2023-40 |
|
pretalx 2.3.1 before 2.3.2 allows path traversal in HTML export (a non-default feature). … | pretalx | 2023-04-20T21:15:00Z | 2023-05-04T03:49:47.207450Z |
| pysec-2023-20 |
|
Netflix Lemur before version 1.3.2 used insufficiently random values when generating de… | lemur | 2023-04-19T20:15:00Z | 2023-05-04T03:49:46.100234Z |
| pysec-2023-87 |
|
sqlparse is a non-validating SQL parser module for Python. In affected versions the SQL p… | sqlparse | 2023-04-18T22:15:00Z | 2023-06-14T20:24:17.342510Z |
| pysec-2023-34 |
|
Weak Password Requirements in GitHub repository modoboa/modoboa prior to 2.1.0. | modoboa | 2023-04-18T16:15:00Z | 2023-05-04T03:49:46.887089Z |
| pysec-2023-8 |
|
Incorrect Authorization vulnerability in Apache Software Foundation Apache IoTDB.This iss… | apache-iotdb | 2023-04-17T08:15:00Z | 2023-05-04T03:49:44.939309Z |
| pysec-2023-44 |
|
In Apache Spark versions prior to 3.4.0, applications using spark-submit can specify a 'p… | pyspark | 2023-04-17T08:15:00Z | 2023-05-04T03:49:47.415944Z |
| pysec-2023-7 |
|
Improper Authentication vulnerability in Apache Software Foundation Apache IoTDB.This iss… | apache-iotdb | 2023-04-17T07:15:00Z | 2023-05-04T03:49:44.888533Z |
| pysec-2023-22 |
|
An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST… | mailman | 2023-04-15T20:16:00Z | 2023-05-04T03:49:46.203477Z |
| pysec-2023-3 |
|
Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Dril… | apache-airflow | 2023-04-07T15:15:00Z | 2023-05-04T03:49:44.692400Z |
| pysec-2023-18 |
|
In LangChain through 0.0.131, the LLMMathChain chain allows prompt injection attacks that… | langchain | 2023-04-05T02:15:00Z | 2023-05-04T03:49:46.000016Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2778 | Malicious code in marketing-analytics (npm) | 2026-04-16T10:04:46Z | 2026-04-23T20:50:51Z |
| mal-2026-2777 | Malicious code in linode-developers (npm) | 2026-04-16T10:03:45Z | 2026-04-23T20:50:51Z |
| mal-2026-2776 | Malicious code in int-browsing-gateway (npm) | 2026-04-16T10:01:30Z | 2026-04-23T20:50:50Z |
| mal-2026-2775 | Malicious code in insomnia-smoke-test (npm) | 2026-04-16T10:01:27Z | 2026-04-23T20:50:50Z |
| mal-2026-2774 | Malicious code in insomnia-scripting-environment (npm) | 2026-04-16T10:01:25Z | 2026-04-23T20:50:50Z |
| mal-2026-2773 | Malicious code in insomnia-api (npm) | 2026-04-16T10:01:23Z | 2026-04-23T20:50:50Z |
| mal-2026-2772 | Malicious code in idaasfinancialnodeserv (npm) | 2026-04-16T10:01:07Z | 2026-04-23T20:50:50Z |
| mal-2026-2771 | Malicious code in icims-express-dot-engine (npm) | 2026-04-16T10:01:05Z | 2026-04-23T20:50:50Z |
| mal-2026-2770 | Malicious code in helios-components (npm) | 2026-04-16T10:00:25Z | 2026-04-23T20:50:50Z |
| mal-2026-2769 | Malicious code in hardhat-starter-kit (npm) | 2026-04-16T10:00:10Z | 2026-04-23T20:50:50Z |
| mal-2026-2768 | Malicious code in h3-next (npm) | 2026-04-16T10:00:02Z | 2026-04-23T20:50:50Z |
| mal-2026-2767 | Malicious code in ground-platform (npm) | 2026-04-16T09:59:40Z | 2026-04-23T20:50:50Z |
| mal-2026-2766 | Malicious code in gke-net (npm) | 2026-04-16T09:58:54Z | 2026-04-23T20:50:50Z |
| mal-2026-2765 | Malicious code in ghscan-pkgcheck-test-001 (npm) | 2026-04-16T09:58:43Z | 2026-04-23T20:50:50Z |
| mal-2026-2764 | Malicious code in gemini-cli-vscode-ide-companion (npm) | 2026-04-16T09:58:22Z | 2026-04-23T20:50:50Z |
| mal-2026-2763 | Malicious code in gemini-ai-checker (npm) | 2026-04-16T09:58:20Z | 2026-04-23T20:50:50Z |
| mal-2026-2762 | Malicious code in farikku-util (npm) | 2026-04-16T09:56:35Z | 2026-04-23T20:50:50Z |
| mal-2026-2761 | Malicious code in f0-fpti-tracking (npm) | 2026-04-16T09:56:20Z | 2026-04-23T20:50:50Z |
| mal-2026-2760 | Malicious code in f0-email-verification (npm) | 2026-04-16T09:56:16Z | 2026-04-23T20:50:50Z |
| mal-2026-2759 | Malicious code in express-auth-basic (npm) | 2026-04-16T09:56:04Z | 2026-04-23T20:50:50Z |
| mal-2026-2758 | Malicious code in estaspnet (npm) | 2026-04-16T09:55:13Z | 2026-04-23T20:50:50Z |
| mal-2026-2757 | Malicious code in docai-sheets (npm) | 2026-04-16T09:53:31Z | 2026-04-23T20:50:50Z |
| mal-2026-2756 | Malicious code in digitallogger (npm) | 2026-04-16T09:53:05Z | 2026-04-23T20:50:50Z |
| mal-2026-2755 | Malicious code in devops-debug-tool-ctf (npm) | 2026-04-16T09:52:56Z | 2026-04-23T20:50:50Z |
| mal-2026-2754 | Malicious code in deployer-kit (npm) | 2026-04-16T09:52:37Z | 2026-04-23T20:50:50Z |
| mal-2026-2753 | Malicious code in declarative-tracker (npm) | 2026-04-16T09:52:10Z | 2026-04-23T20:50:50Z |
| mal-2026-2752 | Malicious code in country-specialization (npm) | 2026-04-16T09:50:53Z | 2026-04-23T20:50:50Z |
| mal-2026-2751 | Malicious code in coremeshnode (npm) | 2026-04-16T09:50:50Z | 2026-04-23T20:50:50Z |
| mal-2026-2750 | Malicious code in coremesh (npm) | 2026-04-16T09:50:48Z | 2026-04-23T20:50:50Z |
| mal-2026-2749 | Malicious code in conversation-relay (npm) | 2026-04-16T09:50:40Z | 2026-04-23T20:50:50Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2311 | Red Hat Enterprise Linux (libsoup3): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-10-15T22:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2310 | F5 BIG-IP und F5OS: Mehrere Schwachstellen | 2025-10-15T22:00:00.000+00:00 | 2026-03-31T22:00:00.000+00:00 |
| wid-sec-w-2025-2309 | Cisco TelePresence: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-10-15T22:00:00.000+00:00 | 2025-10-15T22:00:00.000+00:00 |
| wid-sec-w-2025-2307 | Microsoft Windows: Mehrere Schwachstellen | 2025-10-14T22:00:00.000+00:00 | 2025-11-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2305 | Ivanti Endpoint Manager (Admin Panel): Mehrere Schwachstellen | 2025-10-14T22:00:00.000+00:00 | 2025-10-16T22:00:00.000+00:00 |
| wid-sec-w-2025-2301 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2025-10-14T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2298 | Linux Kernel: Mehrere Schwachstellen | 2025-10-14T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2275 | Mozilla Firefox: Mehrere Schwachstellen | 2025-10-14T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2274 | Veeam Backup & Replication: Mehrere Schwachstellen | 2025-10-13T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2272 | Moodle: Mehrere Schwachstellen | 2025-10-13T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2269 | WebKitGTK: Schwachstelle ermöglicht Denial of Service und potenziell Codeausführung | 2025-10-13T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2268 | Linux Kernel: Mehrere Schwachstellen | 2025-10-13T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2264 | Ivanti Endpoint Manager: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-10-12T22:00:00.000+00:00 | 2025-10-13T22:00:00.000+00:00 |
| wid-sec-w-2025-2249 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-09T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2247 | Nvidia GPU Display Treiber: Mehrere Schwachstellen | 2025-10-08T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2246 | Linux Kernel: Mehrere Schwachstellen | 2025-10-08T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2242 | Wireshark: Schwachstelle ermöglicht Denial of Service | 2025-10-08T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2241 | binutils: Schwachstelle ermöglicht Denial of Service | 2025-10-08T22:00:00.000+00:00 | 2025-10-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2236 | GitLab: Mehrere Schwachstellen | 2025-10-08T22:00:00.000+00:00 | 2025-10-12T22:00:00.000+00:00 |
| wid-sec-w-2025-2232 | Liferay Portal: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2025-10-08T22:00:00.000+00:00 | 2025-10-08T22:00:00.000+00:00 |
| wid-sec-w-2025-2230 | Python (CPython Zipfile Module): Schwachstelle ermöglicht Manipulation von Dateien | 2025-10-07T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2229 | Linux Kernel: Mehrere Schwachstellen | 2025-10-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2228 | ESRI ArcGIS: Schwachstelle ermöglicht SQL injection | 2025-10-07T22:00:00.000+00:00 | 2025-10-22T22:00:00.000+00:00 |
| wid-sec-w-2025-2227 | Golang Go: Mehrere Schwachstellen | 2025-10-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2226 | binutils: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-07T22:00:00.000+00:00 | 2025-10-08T22:00:00.000+00:00 |
| wid-sec-w-2025-2224 | Keycloak: Mehrere Schwachstellen | 2025-10-07T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2223 | Liferay Portal und DXP: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2025-10-07T22:00:00.000+00:00 | 2025-10-08T22:00:00.000+00:00 |
| wid-sec-w-2025-2216 | Kibana: Mehrere Schwachstellen | 2025-10-06T22:00:00.000+00:00 | 2025-10-08T22:00:00.000+00:00 |
| wid-sec-w-2025-2212 | OpenSSH: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-10-06T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2209 | HAProxy und HAProxy ALOHA: Schwachstelle ermöglicht Denial of Service | 2025-10-05T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsma-25-100-01 | INFINITT Healthcare INFINITT PACS | 2025-04-10T06:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-100-08 | Subnet Solutions PowerSYSTEM Center | 2025-04-10T06:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-100-07 | Rockwell Automation Arena | 2025-04-10T06:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-107-03 | Schneider Electric ConneXium Network Manager Software | 2025-04-08T04:00:00.000000Z | 2025-04-08T04:00:00.000000Z |
| icsa-25-107-01 | Schneider Electric Trio Q Licensed Data Radio | 2025-04-08T04:00:00.000000Z | 2025-04-08T04:00:00.000000Z |
| icsa-25-105-03 | Siemens SIMOCODE, SIMATIC, SIPLUS, SIDOOR, SIWAREX | 2025-04-08T00:00:00.000000Z | 2025-07-10T00:00:00.000000Z |
| icsa-25-105-02 | Siemens Industrial Edge Device Kit | 2025-04-08T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-25-105-01 | Siemens Mendix Runtime | 2025-04-08T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-25-100-06 | Siemens SENTRON 7KT PAC1260 Data Manager | 2025-04-08T00:00:00.000000Z | 2025-04-08T00:00:00.000000Z |
| icsa-25-100-05 | Siemens Insights Hub Private Cloud | 2025-04-08T00:00:00.000000Z | 2025-04-08T00:00:00.000000Z |
| icsa-25-100-04 | Siemens Industrial Edge Devices | 2025-04-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-100-03 | Siemens Solid Edge | 2025-04-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-100-02 | Siemens SIDIS Prime | 2025-04-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-100-01 | Siemens License Server (SLS) | 2025-04-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-105-08 | ABB M2M Gateway | 2025-04-07T10:30:00.000000Z | 2025-04-07T10:30:00.000000Z |
| icsa-25-100-09 | ABB Arctic Wireless Gateways | 2025-04-07T10:30:00.000000Z | 2025-04-07T10:30:00.000000Z |
| icsa-25-091-01 | Rockwell Automation Lifecycle Services with Veeam Backup and Replication | 2025-04-01T06:00:00.000000Z | 2025-04-01T06:00:00.000000Z |
| icsa-25-093-04 | ABB Low Voltage DC Drives and Power Controllers CODESYS RTS | 2025-03-26T00:30:00.000000Z | 2025-03-26T00:30:00.000000Z |
| icsa-25-093-03 | ABB ACS880 Drives Containing CODESYS RTS | 2025-03-26T00:30:00.000000Z | 2025-03-26T00:30:00.000000Z |
| icsa-25-093-02 | Hitachi Energy TRMTracker | 2025-03-25T13:30:00.000000Z | 2025-03-25T13:30:00.000000Z |
| icsa-25-093-01 | Hitachi Energy RTU500 Series (Update B) | 2025-03-25T12:30:00.000000Z | 2025-09-09T12:30:00.000000Z |
| icsa-25-084-04 | Inaba Denki Sangyo CHOCO TEI WATCHER mini | 2025-03-25T06:00:00.000000Z | 2025-03-25T06:00:00.000000Z |
| icsa-25-084-03 | Rockwell Automation 440G TLS-Z | 2025-03-25T06:00:00.000000Z | 2025-03-25T06:00:00.000000Z |
| icsa-25-084-02 | Rockwell Automation Verve Asset Manager | 2025-03-25T06:00:00.000000Z | 2025-03-25T06:00:00.000000Z |
| icsa-25-093-05 | B&R APROL | 2025-03-24T00:30:00.000000Z | 2025-03-24T00:30:00.000000Z |
| icsma-25-079-01 | Santesoft Sante DICOM Viewer Pro | 2025-03-20T06:00:00.000000Z | 2025-03-20T06:00:00.000000Z |
| icsa-25-079-04 | SMA Sunny Portal | 2025-03-20T06:00:00.000000Z | 2025-03-20T06:00:00.000000Z |
| va-25-079-01 | CentralSquare eTRAKiT.Net SQL injection vulnerability | 2025-03-20T00:00:00Z | 2025-05-02T01:11:43Z |
| icsa-25-077-02 | Rockwell Automation Lifecycle Services with VMware | 2025-03-18T06:00:00.000000Z | 2025-03-18T06:00:00.000000Z |
| icsa-25-077-01 | Schneider Electric EcoStruxure Power Automation System User Interface (EPAS-UI) | 2025-03-18T06:00:00.000000Z | 2025-03-18T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-bw-auth-bypass-kcggmwhx | Cisco BroadWorks Application Delivery Platform and Xtended Services Platform Authentication Bypass Vulnerability | 2023-09-06T16:00:00+00:00 | 2023-09-06T16:00:00+00:00 |
| cisco-sa-asaftd-ravpn-auth-8lyfckec | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access VPN Unauthorized Access Vulnerability | 2023-09-06T16:00:00+00:00 | 2023-10-11T14:59:29+00:00 |
| cisco-sa-cucm-priv-esc-d8bky5eg | Cisco Unified Communications Products Privilege Escalation Vulnerability | 2023-08-30T16:00:00+00:00 | 2023-08-30T16:00:00+00:00 |
| cisco-sa-nxos-sftp-xvap5hfd | Cisco Nexus 3000 and 9000 Series Switches SFTP Server File Access Vulnerability | 2023-08-23T16:00:00+00:00 | 2023-08-23T16:00:00+00:00 |
| cisco-sa-nxos-remoteauth-dos-xb6pv74m | Cisco NX-OS Software TACACS+ or RADIUS Remote Authentication Directed Request Denial of Service Vulnerability | 2023-08-23T16:00:00+00:00 | 2023-08-23T16:00:00+00:00 |
| cisco-sa-nxos-n3_9k-isis-dos-ftcxb4vb | Cisco Nexus 3000 and 9000 Series Switches IS-IS Protocol Denial of Service Vulnerability | 2023-08-23T16:00:00+00:00 | 2023-08-23T16:00:00+00:00 |
| cisco-sa-fxos-arbitrary-file-blk6yupl | Cisco FXOS Software Arbitrary File Write Vulnerability | 2023-08-23T16:00:00+00:00 | 2023-08-23T16:00:00+00:00 |
| cisco-sa-fp-ucsfi-snmp-dos-qtv69nao | Cisco Firepower 4100 Series, Firepower 9300 Security Appliances, and UCS 6300 Series Fabric Interconnects SNMP Denial of Service Vulnerability | 2023-08-23T16:00:00+00:00 | 2023-08-23T16:00:00+00:00 |
| cisco-sa-apic-uapa-f4tashk | Cisco Application Policy Infrastructure Controller Unauthorized Policy Actions Vulnerability | 2023-08-23T16:00:00+00:00 | 2023-08-23T16:00:00+00:00 |
| cisco-sa-umbrella-tunnel-gjw5thge | Cisco Umbrella Virtual Appliance Undocumented Support Tunnel Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-uccx-wcp-jjeqdt3s | Cisco Unified Contact Center Express Finesse Portal Web Cache Poisoning Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-thoueye-privesc-nvhhgwb3 | Cisco ThousandEyes Enterprise Agent Virtual Appliance Privilege Escalation Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-17T21:54:23+00:00 |
| cisco-sa-te-va-priv-esc-pudgrx8e | Cisco ThousandEyes Enterprise Agent Virtual Appliance Privilege Escalation Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-17T22:00:29+00:00 |
| cisco-sa-pi-epnm-storedxss-ttjo62r | Cisco Prime Infrastructure and Evolved Programmable Network Manager Stored Cross-Site Scripting Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-pi-epnm-bfjsrjp5 | Cisco Prime Infrastructure and Evolved Programmable Network Manager Cross-Site Scripting Vulnerabilities | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-ivpa-cmdinj-c5xrbboy | Cisco Intersight Private Virtual Appliance Command Injection Vulnerabilities | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-ise-credentials-tkto3h3 | Cisco Identity Services Engine Device Credential Information Disclosure Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-ipphone-csrf-hocmxw2c | Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Request Forgery Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-intersight-forward-c45ncgqb | Cisco Intersight Virtual Appliance Unauthenticated Port Forwarding Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-expressway-injection-x475ebtq | Cisco Expressway Series and Cisco TelePresence Video Communication Server Command Injection Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-duo-dha-filewrite-xpmbmzak | Cisco Duo Device Health Application for Windows Arbitrary File Write Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-cucm-injection-g6mbwh2 | Cisco Unified Communications Manager SQL Injection Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-cucm-imp-xss-qtt4vdsk | Cisco Unified Communications Products Cross-Site Scripting Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-clamav-rnwneeee | ClamAV HFS+ File Scanning Infinite Loop Denial of Service Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-25T16:08:02+00:00 |
| cisco-sa-clamav-dos-ftkhqmwz | ClamAV AutoIt Module Denial of Service Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-cimc-xss-umytyetr | Cisco Integrated Management Controller Cross-Site Scripting Vulnerability | 2023-08-16T16:00:00+00:00 | 2024-02-22T20:57:19+00:00 |
| cisco-sa-ac-leak-sew6g2kd | Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables Affecting Cisco AnyConnect Secure Mobility Client and Cisco Secure Client | 2023-08-08T15:00:00+00:00 | 2023-08-08T15:00:00+00:00 |
| cisco-sa-wsa-bypass-vxvqwzsj | Cisco Secure Web Appliance Content Encoding Filter Bypass Vulnerability | 2023-08-02T16:00:00+00:00 | 2024-08-14T14:27:30+00:00 |
| cisco-sa-commpilot-xss-jc46sezf | Cisco BroadWorks CommPilot Application Software Cross-Site Scripting Vulnerability | 2023-08-02T16:00:00+00:00 | 2023-08-30T19:34:29+00:00 |
| cisco-sa-asaftd-aclconfig-wvk52f3z | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software ACLs Not Installed upon Reload | 2023-07-27T16:00:00+00:00 | 2023-07-27T16:38:54+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-31616 | usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:40:49.000Z |
| msrc_cve-2026-31615 | usb: gadget: renesas_usb3: validate endpoint index in standard request handlers | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:09.000Z |
| msrc_cve-2026-31613 | smb: client: fix OOB reads parsing symlink error response | 2026-04-02T00:00:00.000Z | 2026-05-06T14:41:21.000Z |
| msrc_cve-2026-31612 | ksmbd: validate EaNameLength in smb2_get_ea() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:24.000Z |
| msrc_cve-2026-31611 | ksmbd: require 3 sub-authorities before reading sub_auth[2] | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:43.000Z |
| msrc_cve-2026-31610 | ksmbd: fix mechToken leak when SPNEGO decode fails after token alloc | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:16.000Z |
| msrc_cve-2026-31609 | smb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush() | 2026-04-02T00:00:00.000Z | 2026-05-01T01:02:29.000Z |
| msrc_cve-2026-31608 | smb: server: avoid double-free in smb_direct_free_sendmsg after smb_direct_flush_send_list() | 2026-04-02T00:00:00.000Z | 2026-05-02T01:42:00.000Z |
| msrc_cve-2026-31607 | usbip: validate number_of_packets in usbip_pack_ret_submit() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:39:12.000Z |
| msrc_cve-2026-31606 | usb: gadget: f_hid: don't call cdev_init while cdev in use | 2026-04-02T00:00:00.000Z | 2026-05-06T14:39:17.000Z |
| msrc_cve-2026-31605 | fbdev: udlfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO | 2026-04-02T00:00:00.000Z | 2026-05-01T14:40:07.000Z |
| msrc_cve-2026-31604 | wifi: rtw88: fix device leak on probe failure | 2026-04-02T00:00:00.000Z | 2026-05-01T14:45:22.000Z |
| msrc_cve-2026-31603 | staging: sm750fb: fix division by zero in ps_to_hz() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:36.000Z |
| msrc_cve-2026-31602 | ALSA: ctxfi: Limit PTP to a single page | 2026-04-02T00:00:00.000Z | 2026-05-02T01:41:29.000Z |
| msrc_cve-2026-31601 | vfio/xe: Reorganize the init to decouple migration from reset | 2026-04-02T00:00:00.000Z | 2026-04-29T14:40:06.000Z |
| msrc_cve-2026-31600 | arm64: mm: Handle invalid large leaf mappings correctly | 2026-04-02T00:00:00.000Z | 2026-04-29T15:00:22.000Z |
| msrc_cve-2026-31599 | media: vidtv: fix NULL pointer dereference in vidtv_channel_pmt_match_sections | 2026-04-02T00:00:00.000Z | 2026-05-01T14:45:10.000Z |
| msrc_cve-2026-31598 | ocfs2: fix possible deadlock between unlink and dio_end_io_write | 2026-04-02T00:00:00.000Z | 2026-05-02T01:41:49.000Z |
| msrc_cve-2026-31597 | ocfs2: fix use-after-free in ocfs2_fault() when VM_FAULT_RETRY | 2026-04-02T00:00:00.000Z | 2026-05-01T14:44:41.000Z |
| msrc_cve-2026-31596 | ocfs2: handle invalid dinode in ocfs2_group_extend | 2026-04-02T00:00:00.000Z | 2026-05-01T14:40:00.000Z |
| msrc_cve-2026-31595 | PCI: endpoint: pci-epf-vntb: Stop cmd_handler work in epf_ntb_epc_cleanup | 2026-04-02T00:00:00.000Z | 2026-05-01T14:43:45.000Z |
| msrc_cve-2026-31594 | PCI: endpoint: pci-epf-vntb: Remove duplicate resource teardown | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:10.000Z |
| msrc_cve-2026-31593 | KVM: SEV: Reject attempts to sync VMSA of an already-launched/encrypted vCPU | 2026-04-02T00:00:00.000Z | 2026-04-29T14:53:05.000Z |
| msrc_cve-2026-31592 | KVM: SEV: Protect *all* of sev_mem_enc_register_region() with kvm->lock | 2026-04-02T00:00:00.000Z | 2026-05-06T14:42:05.000Z |
| msrc_cve-2026-31591 | KVM: SEV: Lock all vCPUs when synchronzing VMSAs for SNP launch finish | 2026-04-02T00:00:00.000Z | 2026-04-29T14:41:14.000Z |
| msrc_cve-2026-31590 | KVM: SEV: Drop WARN on large size for KVM_MEMORY_ENCRYPT_REG_REGION | 2026-04-02T00:00:00.000Z | 2026-05-01T14:39:26.000Z |
| msrc_cve-2026-31589 | mm: call ->free_folio() directly in folio_unmap_invalidate() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:54:48.000Z |
| msrc_cve-2026-31588 | KVM: x86: Use scratch field in MMIO fragment to hold small write values | 2026-04-02T00:00:00.000Z | 2026-05-01T14:43:39.000Z |
| msrc_cve-2026-31587 | ASoC: qcom: q6apm: move component registration to unmanaged version | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:31.000Z |
| msrc_cve-2026-31586 | mm: blk-cgroup: fix use-after-free in cgwb_release_workfn() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:43:52.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0500 | Kwetsbaarheden verholpen in Foxit PDF Reader en PDF Editor | 2024-12-31T09:22:24.145718Z | 2024-12-31T09:22:24.145718Z |
| ncsc-2024-0499 | Kwetsbaarheid verholpen in Palo Alto Networks PAN-OS | 2024-12-27T13:26:43.003788Z | 2024-12-27T13:26:43.003788Z |
| ncsc-2024-0498 | Kwetsbaarheid verholpen in Adobe ColdFusion | 2024-12-24T10:17:54.620060Z | 2024-12-24T10:17:54.620060Z |
| ncsc-2024-0497 | Kwetsbaarheden verholpen in IBM Cognos Analytics | 2024-12-23T11:43:39.921631Z | 2024-12-23T11:43:39.921631Z |
| ncsc-2024-0496 | Kwetsbaarheid verholpen in FortiManager | 2024-12-19T15:22:59.271730Z | 2024-12-19T15:22:59.271730Z |
| ncsc-2024-0495 | Kwetsbaarheden verholpen in Rockwell Automation Power Monitor 1000 | 2024-12-19T14:54:38.668612Z | 2024-12-19T14:54:38.668612Z |
| ncsc-2024-0494 | Kwetsbaarheid verholpen in Fortinet FortiWLM | 2024-12-19T14:53:01.724784Z | 2024-12-19T14:53:01.724784Z |
| ncsc-2024-0493 | Kwetsbaarheid verholpen in BeyondTrust Privileged Remote Access | 2024-12-18T10:42:27.324531Z | 2024-12-18T10:42:27.324531Z |
| ncsc-2024-0492 | Kwetsbaarheid verholpen in Apache Struts | 2024-12-13T10:05:07.992077Z | 2024-12-22T18:38:46.211336Z |
| ncsc-2024-0491 | Kwetsbaarheden verholpen in XWiki Platform | 2024-12-13T10:04:20.533908Z | 2024-12-13T10:04:20.533908Z |
| ncsc-2024-0490 | Kwetsbaarheden verholpen in GitLab | 2024-12-13T10:03:05.321565Z | 2024-12-13T10:03:05.321565Z |
| ncsc-2024-0489 | Kwetsbaarheid verholpen in Schneider Electric Modicon | 2024-12-13T09:58:33.792150Z | 2024-12-13T09:58:33.792150Z |
| ncsc-2024-0488 | Kwetsbaarheden verholpen in macOS | 2024-12-12T10:31:34.869451Z | 2024-12-12T10:31:34.869451Z |
| ncsc-2024-0487 | Kwetsbaarheden verholpen in Apple iPadOS en iOS | 2024-12-12T10:30:17.550009Z | 2024-12-12T10:30:17.550009Z |
| ncsc-2024-0486 | Kwetsbaarheden verholpen in Ivanti Cloud Security Appliance | 2024-12-11T08:58:00.974296Z | 2024-12-11T08:58:00.974296Z |
| ncsc-2024-0485 | Kwetsbaarheid verholpen in Splunk Enterprise | 2024-12-11T08:53:56.285002Z | 2024-12-11T08:53:56.285002Z |
| ncsc-2024-0484 | Kwetsbaarheden verholpen in Ivanti Connect Secure en Policy Secure | 2024-12-11T08:50:15.463062Z | 2025-01-08T11:00:21.273985Z |
| ncsc-2024-0483 | Kwetsbaarheden verholpen in Adobe Connect | 2024-12-11T08:46:09.788540Z | 2024-12-11T08:46:09.788540Z |
| ncsc-2024-0482 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2024-12-11T08:42:21.663200Z | 2024-12-11T08:42:21.663200Z |
| ncsc-2024-0481 | Kwetsbaarheden verholpen in Adobe Illustrator | 2024-12-11T08:37:21.228987Z | 2024-12-11T08:37:21.228987Z |
| ncsc-2024-0480 | Kwetsbaarheid verholpen in Adobe After Effects | 2024-12-11T08:34:49.812349Z | 2024-12-11T08:34:49.812349Z |
| ncsc-2024-0479 | Kwetsbaarheden verholpen in Animate | 2024-12-11T08:31:02.174506Z | 2024-12-11T08:31:02.174506Z |
| ncsc-2024-0478 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2024-12-11T08:20:20.778758Z | 2024-12-11T08:20:20.778758Z |
| ncsc-2024-0477 | Kwetsbaarheid verholpen in Adobe Photoshop | 2024-12-11T08:17:46.923581Z | 2024-12-11T08:17:46.923581Z |
| ncsc-2024-0476 | Kwetsbaarheid verholpen in Adobe Premiere Pro | 2024-12-11T08:12:35.655333Z | 2024-12-11T08:12:35.655333Z |
| ncsc-2024-0475 | Kwetsbaarheid verholpen in Adobe Framemaker | 2024-12-11T08:06:34.387394Z | 2024-12-11T08:06:34.387394Z |
| ncsc-2024-0474 | Kwetsbaarheden verholpen in Drupal Core | 2024-12-10T19:35:37.345875Z | 2024-12-10T19:35:37.345875Z |
| ncsc-2024-0473 | Kwetsbaarheden verholpen in Siemens producten | 2024-12-10T19:34:53.515240Z | 2024-12-10T19:34:53.515240Z |
| ncsc-2024-0472 | Kwetsbaarheden verholpen in SAP producten | 2024-12-10T19:34:10.105945Z | 2024-12-10T19:34:10.105945Z |
| ncsc-2024-0471 | Kwetsbaarheden verholpen in Microsoft Office | 2024-12-10T19:33:29.415423Z | 2024-12-10T19:33:29.415423Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10247-1 | python311-Django4-4.2.28-1.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:10246-1 | libsoup-2_4-1-2.74.3-17.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:10245-1 | libsoup-3_0-0-3.6.6-1.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:10244-1 | libsignal-protocol-c-devel-2.3.3-2.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:10243-1 | freerdp2-2.11.7-5.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:10242-1 | firefox-esr-140.8.0-1.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:10241-1 | cacti-1.2.30+git231.bca15e70c-1.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:20261-1 | Security update for openQA, os-autoinst, openQA-devel-container | 2026-02-23T19:35:27Z | 2026-02-23T19:35:27Z |
| opensuse-su-2026:20260-1 | Security update for mosquitto | 2026-02-23T18:17:43Z | 2026-02-23T18:17:43Z |
| opensuse-su-2026:10240-1 | weblate-5.16-1.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10239-1 | warewulf4-4.6.5-2.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10238-1 | python311-PyPDF2-2.11.1-4.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10237-1 | libopenssl-3-devel-3.5.3-2.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10236-1 | heroic-games-launcher-2.20.0-1.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10235-1 | cosign-3.0.5-1.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:20258-1 | Security update for chromium | 2026-02-21T02:15:40Z | 2026-02-21T02:15:40Z |
| opensuse-su-2026:10234-1 | chromedriver-145.0.7632.109-1.1 on GA media | 2026-02-21T00:00:00Z | 2026-02-21T00:00:00Z |
| opensuse-su-2026:20266-1 | Security update for postgresql15 | 2026-02-20T16:18:08Z | 2026-02-20T16:18:08Z |
| opensuse-su-2026:20265-1 | Security update for postgresql14 | 2026-02-20T16:14:27Z | 2026-02-20T16:14:27Z |
| opensuse-su-2026:20262-1 | Security update for docker-stable | 2026-02-20T15:40:19Z | 2026-02-20T15:40:19Z |
| opensuse-su-2026:10233-1 | kyverno-1.17.1-1.1 on GA media | 2026-02-20T00:00:00Z | 2026-02-20T00:00:00Z |
| opensuse-su-2026:10232-1 | cosign-3.0.4-2.1 on GA media | 2026-02-20T00:00:00Z | 2026-02-20T00:00:00Z |
| opensuse-su-2026:10231-1 | busybox-1.37.0-9.1 on GA media | 2026-02-20T00:00:00Z | 2026-02-20T00:00:00Z |
| opensuse-su-2026:20257-1 | Security update for python-Authlib | 2026-02-19T13:21:50Z | 2026-02-19T13:21:50Z |
| opensuse-su-2026:20253-1 | Security update for MozillaFirefox | 2026-02-19T11:09:58Z | 2026-02-19T11:09:58Z |
| opensuse-su-2026:20254-1 | Security update for python313 | 2026-02-19T10:31:04Z | 2026-02-19T10:31:04Z |
| opensuse-su-2026:20248-1 | Security update for chromium | 2026-02-19T02:43:57Z | 2026-02-19T02:43:57Z |
| opensuse-su-2026:10230-1 | vexctl-0.4.1+git78.f951e3a-1.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| opensuse-su-2026:10229-1 | ucode-intel-20260210-1.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| opensuse-su-2026:10228-1 | syft-1.42.1-1.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:8884 | Red Hat Security Advisory: giflib security update | 2026-04-20T02:20:40+00:00 | 2026-04-21T19:40:51+00:00 |
| rhsa-2026:8867 | Red Hat Security Advisory: libarchive security update | 2026-04-20T02:20:14+00:00 | 2026-05-07T21:44:30+00:00 |
| rhsa-2026:8855 | Red Hat Security Advisory: rhc security update | 2026-04-20T02:20:04+00:00 | 2026-05-07T21:41:58+00:00 |
| rhsa-2026:8875 | Red Hat Security Advisory: fontforge security update | 2026-04-20T02:12:34+00:00 | 2026-04-23T07:01:06+00:00 |
| rhsa-2026:8851 | Red Hat Security Advisory: rhc security update | 2026-04-20T01:48:19+00:00 | 2026-05-07T21:41:59+00:00 |
| rhsa-2026:8849 | Red Hat Security Advisory: grafana security update | 2026-04-20T01:29:04+00:00 | 2026-05-07T21:42:01+00:00 |
| rhsa-2026:8850 | Red Hat Security Advisory: thunderbird security update | 2026-04-20T01:28:29+00:00 | 2026-04-28T18:40:43+00:00 |
| rhsa-2026:8852 | Red Hat Security Advisory: rhc security update | 2026-04-20T01:22:23+00:00 | 2026-05-07T21:41:59+00:00 |
| rhsa-2026:8853 | Red Hat Security Advisory: grafana security update | 2026-04-20T01:21:28+00:00 | 2026-05-07T21:41:58+00:00 |
| rhsa-2026:8841 | Red Hat Security Advisory: go-rpm-macros security update | 2026-04-20T00:48:03+00:00 | 2026-05-07T21:42:00+00:00 |
| rhsa-2026:8842 | Red Hat Security Advisory: delve security update | 2026-04-20T00:37:18+00:00 | 2026-05-07T21:41:59+00:00 |
| rhsa-2026:8840 | Red Hat Security Advisory: go-rpm-macros security update | 2026-04-20T00:29:18+00:00 | 2026-05-07T21:42:00+00:00 |
| rhsa-2026:8838 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-17T23:15:06+00:00 | 2026-04-21T13:32:51+00:00 |
| rhsa-2026:8824 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-17T19:24:04+00:00 | 2026-05-07T08:27:20+00:00 |
| rhsa-2026:8822 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-17T18:54:19+00:00 | 2026-05-07T08:27:19+00:00 |
| rhsa-2026:8814 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-17T17:04:56+00:00 | 2026-04-22T16:37:10+00:00 |
| rhsa-2026:8813 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-17T16:26:53+00:00 | 2026-04-20T21:33:24+00:00 |
| rhsa-2026:8812 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-17T16:12:07+00:00 | 2026-04-20T21:34:30+00:00 |
| rhsa-2026:8756 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-17T12:05:00+00:00 | 2026-04-29T18:26:28+00:00 |
| rhsa-2026:8753 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-17T11:29:33+00:00 | 2026-04-20T21:35:33+00:00 |
| rhsa-2026:8749 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-17T11:19:38+00:00 | 2026-04-25T16:56:44+00:00 |
| rhsa-2026:8748 | Red Hat Security Advisory: Red Hat AI Inference Server Model Optimization Tools 3.3.1 (CUDA) | 2026-04-17T11:11:06+00:00 | 2026-05-06T09:07:43+00:00 |
| rhsa-2026:8746 | Red Hat Security Advisory: Red Hat AI Inference Server 3.3.1 (CUDA) | 2026-04-17T11:10:51+00:00 | 2026-05-06T09:07:39+00:00 |
| rhsa-2026:8747 | Red Hat Security Advisory: Red Hat AI Inference Server 3.3.1 (ROCm) | 2026-04-17T11:10:50+00:00 | 2026-05-06T09:07:38+00:00 |
| rhsa-2026:8729 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-17T04:59:45+00:00 | 2026-04-19T19:37:46+00:00 |
| rhsa-2026:8610 | Red Hat Security Advisory: perl-XML-Parser security update | 2026-04-16T22:31:22+00:00 | 2026-04-22T13:44:24+00:00 |
| rhsa-2026:8608 | Red Hat Security Advisory: perl-XML-Parser security update | 2026-04-16T22:26:12+00:00 | 2026-04-22T13:44:24+00:00 |
| rhsa-2026:8609 | Red Hat Security Advisory: perl-XML-Parser security update | 2026-04-16T22:22:12+00:00 | 2026-04-22T13:44:25+00:00 |
| rhsa-2026:8578 | Red Hat Security Advisory: perl-XML-Parser security update | 2026-04-16T21:15:12+00:00 | 2026-04-22T13:44:21+00:00 |
| rhsa-2026:8577 | Red Hat Security Advisory: perl-XML-Parser security update | 2026-04-16T21:10:52+00:00 | 2026-04-22T13:44:29+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-285795 | SSA-285795: Denial of Service in OPC-UA in Industrial Products | 2022-05-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-165073 | SSA-165073: Multiple Vulnerabilities in the Webinterface of SICAM P850 and SICAM P855 Devices | 2022-05-10T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-162616 | SSA-162616: File Parsing Vulnerabilities in Simcenter Femap before V2022.2 | 2022-05-10T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-254054 | SSA-254054: Spring Framework Vulnerability (Spring4Shell or SpringShell, CVE-2022-22965) - Impact to Siemens Products | 2022-04-19T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-998762 | SSA-998762: File Parsing Vulnerabilities in Simcenter Femap before V2022.1.2 | 2022-04-12T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-870917 | SSA-870917: Improper Access Control Vulnerability in Mendix | 2022-04-12T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-836527 | SSA-836527: Multiple Vulnerabilities in SCALANCE X-300 Switch Family Devices | 2022-04-12T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-711829 | SSA-711829: Denial of Service Vulnerability in TIA Administrator | 2022-04-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-655554 | SSA-655554: Multiple Vulnerabilities in SIMATIC Energy Manager before V7.3 Update 1 | 2022-04-12T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-557541 | SSA-557541: Denial-of-Service Vulnerability in SIMATIC S7-400 CPUs | 2022-04-12T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-446448 | SSA-446448: Denial of Service Vulnerability in PROFINET Stack Integrated on Interniche Stack | 2022-04-12T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-414513 | SSA-414513: Information Disclosure Vulnerability in Mendix | 2022-04-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-392912 | SSA-392912: Multiple Denial Of Service Vulnerabilities in SCALANCE W1700 Devices | 2022-04-12T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-350757 | SSA-350757: Improper Access Control Vulnerability in TIA Portal Affecting S7-1200 and S7-1500 CPUs Web Server (Incl. Related ET200 CPUs and SIPLUS variants) | 2022-04-12T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-316850 | SSA-316850: Unauthenticated File Access in SICAM A8000 Devices | 2022-04-12T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-764417 | SSA-764417: Weak Encryption Vulnerability in RUGGEDCOM ROS Devices | 2022-03-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-594438 | SSA-594438: Remote Code Execution and Denial-of-Service Vulnerability in multiple RUGGEDCOM ROX products | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-562051 | SSA-562051: Cross-Site Scripting Vulnerability in Polarion ALM | 2022-03-08T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-415938 | SSA-415938: Improper Access Control Vulnerability in Mendix | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-406691 | SSA-406691: Buffer Vulnerabilities in DHCP function of RUGGEDCOM ROX products | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-389290 | SSA-389290: Third-Party Component Vulnerabilities in SINEC INS | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-337210 | SSA-337210: Privilege Escalation Vulnerability in SINUMERIK MC | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-256353 | SSA-256353: Third-Party Component Vulnerabilities in RUGGEDCOM ROS | 2022-03-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-252466 | SSA-252466: Multiple Vulnerabilities in Climatix POL909 (AWM and AWB) | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-250085 | SSA-250085: Multiple Vulnerabilities in SINEC NMS and SINEMA Server | 2022-03-08T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-223353 | SSA-223353: Multiple Vulnerabilities in Nucleus RTOS based SIMOTICS CONNECT 400 | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-166747 | SSA-166747: Scene File Parsing Vulnerability in Simcenter STAR-CCM+ Viewer before V2022.1 | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-155599 | SSA-155599: File Parsing Vulnerabilities in COMOS | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-148641 | SSA-148641: XPath Constraint Vulnerability in Mendix Runtime | 2022-03-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-134279 | SSA-134279: Vulnerability in Mendix Forgot Password Appstore module | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1287-1 | Security update for the Linux Kernel (Live Patch 70 for SUSE Linux Enterprise 12 SP5) | 2026-04-12T23:15:16Z | 2026-04-12T23:15:16Z |
| suse-su-2026:1285-1 | Security update for the Linux Kernel (Live Patch 68 for SUSE Linux Enterprise 12 SP5) | 2026-04-12T19:04:23Z | 2026-04-12T19:04:23Z |
| suse-su-2026:1284-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP7) | 2026-04-12T10:34:11Z | 2026-04-12T10:34:11Z |
| suse-su-2026:1283-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-04-12T10:34:05Z | 2026-04-12T10:34:05Z |
| suse-su-2026:1281-1 | Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4) | 2026-04-12T08:35:33Z | 2026-04-12T08:35:33Z |
| suse-su-2026:1280-1 | Security update for the Linux Kernel (Live Patch 41 for SUSE Linux Enterprise 15 SP4) | 2026-04-12T02:04:36Z | 2026-04-12T02:04:36Z |
| suse-su-2026:1279-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP7) | 2026-04-12T00:08:13Z | 2026-04-12T00:08:13Z |
| suse-su-2026:1278-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7) | 2026-04-12T00:08:07Z | 2026-04-12T00:08:07Z |
| suse-su-2026:1274-1 | Security update for the Linux Kernel (Live Patch 19 for SUSE Linux Enterprise 15 SP6) | 2026-04-11T20:04:33Z | 2026-04-11T20:04:33Z |
| suse-su-2026:1273-1 | Security update for MozillaFirefox | 2026-04-11T19:04:46Z | 2026-04-11T19:04:46Z |
| suse-su-2026:1272-1 | Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise 15 SP6) | 2026-04-11T18:04:50Z | 2026-04-11T18:04:50Z |
| suse-su-2026:1271-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6) | 2026-04-11T18:04:43Z | 2026-04-11T18:04:43Z |
| suse-su-2026:1270-1 | Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP5) | 2026-04-11T16:34:14Z | 2026-04-11T16:34:14Z |
| suse-su-2026:1269-1 | Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4) | 2026-04-11T16:04:45Z | 2026-04-11T16:04:45Z |
| suse-su-2026:1268-1 | Security update for the Linux Kernel (Live Patch 38 for SUSE Linux Enterprise 15 SP4) | 2026-04-11T14:04:40Z | 2026-04-11T14:04:40Z |
| suse-su-2026:1266-1 | Security update for the Linux Kernel (Live Patch 20 for SUSE Linux Enterprise 15 SP6) | 2026-04-11T11:04:41Z | 2026-04-11T11:04:41Z |
| suse-su-2026:21217-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-04-11T07:42:41Z | 2026-04-11T07:42:41Z |
| suse-su-2026:21096-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-04-11T07:42:41Z | 2026-04-11T07:42:41Z |
| suse-su-2026:1265-1 | Security update for the Linux Kernel (Live Patch 46 for SUSE Linux Enterprise 15 SP4) | 2026-04-11T04:34:33Z | 2026-04-11T04:34:33Z |
| suse-su-2026:1263-1 | Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T22:35:17Z | 2026-04-10T22:35:17Z |
| suse-su-2026:1262-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP7) | 2026-04-10T21:43:55Z | 2026-04-10T21:43:55Z |
| suse-su-2026:1261-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP7) | 2026-04-10T19:34:46Z | 2026-04-10T19:34:46Z |
| suse-su-2026:21173-1 | Security update for sqlite3 | 2026-04-10T18:50:16Z | 2026-04-10T18:50:16Z |
| suse-su-2026:21095-1 | Security update for sqlite3 | 2026-04-10T18:50:16Z | 2026-04-10T18:50:16Z |
| suse-su-2026:21172-1 | Security update for pcre2 | 2026-04-10T18:27:30Z | 2026-04-10T18:27:30Z |
| suse-su-2026:21094-1 | Security update for pcre2 | 2026-04-10T18:27:30Z | 2026-04-10T18:27:30Z |
| suse-su-2026:1259-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6) | 2026-04-10T17:35:15Z | 2026-04-10T17:35:15Z |
| suse-su-2026:1258-1 | Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T17:35:09Z | 2026-04-10T17:35:09Z |
| suse-su-2026:1257-1 | Security update for openssl-1_1 | 2026-04-10T15:06:36Z | 2026-04-10T15:06:36Z |
| suse-su-2026:1256-1 | Security update for openssl-1_0_0 | 2026-04-10T14:57:18Z | 2026-04-10T14:57:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:23729 | Important: opentelemetry-collector security update | 2025-12-21T00:00:00Z | 2025-12-23T13:07:45Z |
| alsa-2025:23700 | Important: webkit2gtk3 security update | 2025-12-18T00:00:00Z | 2025-12-22T13:39:46Z |
| alsa-2025:23667 | Important: git-lfs security update | 2025-12-18T00:00:00Z | 2025-12-22T13:42:09Z |
| alsa-2025:23664 | Important: opentelemetry-collector security update | 2025-12-18T00:00:00Z | 2025-12-23T13:09:37Z |
| alsa-2025:23663 | Important: webkit2gtk3 security update | 2025-12-18T00:00:00Z | 2025-12-22T14:04:48Z |
| alsa-2025:23543 | Important: container-tools:rhel8 security update | 2025-12-17T00:00:00Z | 2025-12-24T09:25:49Z |
| alsa-2025:23530 | Important: python39:3.9 security update | 2025-12-17T00:00:00Z | 2025-12-22T14:10:23Z |
| alsa-2025:23484 | Moderate: libssh security update | 2025-12-17T00:00:00Z | 2025-12-21T19:50:15Z |
| alsa-2025:23483 | Moderate: libssh security update | 2025-12-17T00:00:00Z | 2025-12-21T19:54:52Z |
| alsa-2025:23481 | Moderate: openssh security update | 2025-12-17T00:00:00Z | 2025-12-21T20:00:09Z |
| alsa-2025:23480 | Moderate: openssh security update | 2025-12-17T00:00:00Z | 2025-12-21T20:03:34Z |
| alsa-2025:23479 | Moderate: openssh security update | 2025-12-17T00:00:00Z | 2025-12-21T20:05:20Z |
| alsa-2025:23383 | Moderate: curl security update | 2025-12-16T00:00:00Z | 2025-12-22T14:12:06Z |
| alsa-2025:23382 | Moderate: binutils security update | 2025-12-16T00:00:00Z | 2025-12-22T14:14:14Z |
| alsa-2025:23343 | Moderate: binutils security update | 2025-12-16T00:00:00Z | 2025-12-22T13:47:22Z |
| alsa-2025:23342 | Moderate: python3.9 security update | 2025-12-16T00:00:00Z | 2025-12-22T13:45:25Z |
| alsa-2025:23336 | Moderate: gcc-toolset-13-binutils security update | 2025-12-16T00:00:00Z | 2025-12-22T13:43:11Z |
| alsa-2025:23326 | Moderate: skopeo security update | 2025-12-16T00:00:00Z | 2025-12-22T13:49:03Z |
| alsa-2025:23325 | Moderate: podman security update | 2025-12-16T00:00:00Z | 2025-12-22T13:50:22Z |
| alsa-2025:23323 | Moderate: python3.12 security update | 2025-12-16T00:00:00Z | 2025-12-22T13:52:25Z |
| alsa-2025:23309 | Moderate: php:8.3 security update | 2025-12-16T00:00:00Z | 2025-12-22T13:55:21Z |
| alsa-2025:23306 | Moderate: binutils security update | 2025-12-16T00:00:00Z | 2025-12-22T13:58:22Z |
| alsa-2025:23295 | Moderate: podman security update | 2025-12-16T00:00:00Z | 2025-12-22T13:57:14Z |
| alsa-2025:23294 | Moderate: skopeo security update | 2025-12-16T00:00:00Z | 2025-12-22T13:59:22Z |
| alsa-2025:23279 | Important: kernel security update | 2025-12-16T00:00:00Z | 2026-01-05T20:25:38Z |
| alsa-2025:23241 | Important: kernel security update | 2025-12-16T00:00:00Z | 2026-01-05T20:29:24Z |
| alsa-2025:23210 | Important: keylime security update | 2025-12-15T00:00:00Z | 2025-12-17T13:58:57Z |
| alsa-2025:23201 | Important: keylime security update | 2025-12-15T00:00:00Z | 2025-12-22T14:00:47Z |
| alsa-2025:23142 | Important: wireshark security update | 2025-12-11T00:00:00Z | 2025-12-12T10:27:48Z |
| alsa-2025:23141 | Moderate: ruby security update | 2025-12-11T00:00:00Z | 2026-01-05T20:34:29Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-420 | Use-of-uninitialized-value in Lexer::Error | 2024-05-05T00:06:56.111677Z | 2024-05-05T00:06:56.112011Z |
| osv-2024-417 | Use-of-uninitialized-value in bssl::ssl_cipher_process_rulestr | 2024-05-05T00:05:37.413119Z | 2024-05-08T03:26:30Z |
| osv-2024-409 | Use-of-uninitialized-value in Lexer::ReadToken | 2024-05-05T00:02:40.009382Z | 2024-05-05T00:02:40.009837Z |
| osv-2024-404 | Use-of-uninitialized-value in avifSequenceHeaderParse | 2024-05-04T00:03:34.449449Z | 2024-05-04T00:03:34.449922Z |
| osv-2024-403 | UNKNOWN READ in mem_planar_put_image_slow | 2024-05-04T00:02:34.636950Z | 2024-05-04T00:02:34.637538Z |
| osv-2024-402 | Stack-buffer-overflow in SwiftProtobuf.TextFormatScanner. | 2024-05-03T00:00:37.545228Z | 2024-05-10T00:00:37.545806Z |
| osv-2024-400 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-05-02T00:03:16.309384Z | 2026-05-02T14:28:03.527863Z |
| osv-2024-398 | Use-of-uninitialized-value in wabt::BinaryReaderObjdump::PrintInitExpr | 2024-05-01T00:11:38.602555Z | 2026-03-11T14:28:35.396657Z |
| osv-2024-396 | UNKNOWN READ in jvp_object_free | 2024-05-01T00:11:24.552935Z | 2026-04-24T14:19:17.552379Z |
| osv-2024-395 | Use-of-uninitialized-value in pcapint_filter_with_aux_data | 2024-05-01T00:04:54.392345Z | 2025-12-31T14:19:24.719836Z |
| osv-2024-393 | Heap-buffer-overflow in pcpp::BgpLayer::getHeaderLen | 2024-04-30T00:15:10.223298Z | 2025-10-22T18:24:01.160234Z |
| osv-2024-390 | Heap-buffer-overflow in H5O__cache_chk_serialize | 2024-04-30T00:14:19.116132Z | 2025-03-18T00:44:44.672358Z |
| osv-2024-389 | Heap-buffer-overflow in JS_CallInternal | 2024-04-30T00:14:11.245997Z | 2024-04-30T00:14:11.246314Z |
| osv-2024-387 | Heap-buffer-overflow in H5F_addr_encode | 2024-04-30T00:13:39.184262Z | 2026-03-24T15:11:37.246096Z |
| osv-2024-384 | Heap-use-after-free in json_fixed_string | 2024-04-30T00:12:26.560732Z | 2024-12-25T14:21:22.172697Z |
| osv-2024-382 | UNKNOWN READ in pcpp::Packet::destructPacketData | 2024-04-30T00:12:20.588223Z | 2025-05-14T14:16:53.222952Z |
| osv-2024-381 | Heap-buffer-overflow in H5F__accum_free | 2024-04-30T00:12:14.936195Z | 2025-10-10T16:22:08.455396Z |
| osv-2024-380 | Heap-use-after-free in H5FL__blk_gc_list | 2024-04-30T00:12:11.366893Z | 2025-08-06T15:10:14.893372Z |
| osv-2024-379 | UNKNOWN READ in H5SL_first | 2024-04-30T00:12:09.539697Z | 2025-01-10T05:30:29.297578Z |
| osv-2024-372 | Security exception in java.base/java.util.Arrays.copyOf | 2024-04-30T00:09:04.989259Z | 2025-12-01T14:21:29.544925Z |
| osv-2024-371 | UNKNOWN READ in jv_array_set | 2024-04-30T00:08:27.982063Z | 2025-05-18T14:24:27.459047Z |
| osv-2024-370 | Heap-buffer-overflow in H5O__chunk_protect | 2024-04-30T00:08:00.120801Z | 2025-09-27T15:27:53.336806Z |
| osv-2024-369 | Segv on unknown address in pcpp::IPv6Layer::~IPv6Layer | 2024-04-30T00:07:01.572543Z | 2025-12-22T14:20:46.950585Z |
| osv-2024-360 | Heap-buffer-overflow in pcpp::TelnetLayer::getFieldLen | 2024-04-30T00:05:53.016170Z | 2025-12-22T14:20:47.423159Z |
| osv-2024-359 | Security exception in graphql.schema.GraphQLTypeUtil.simplePrint | 2024-04-30T00:05:50.949087Z | 2024-04-30T00:05:50.949438Z |
| osv-2024-352 | Heap-buffer-overflow in __parse_options | 2024-04-30T00:04:28.080620Z | 2025-03-19T14:25:45.717598Z |
| osv-2024-351 | UNKNOWN READ in H5SL__release_common | 2024-04-30T00:03:47.754456Z | 2025-10-11T15:15:24.788105Z |
| osv-2024-349 | Security exception in java.base/java.lang.AbstractStringBuilder.<init> | 2024-04-30T00:03:33.576785Z | 2024-08-27T14:19:50.205074Z |
| osv-2024-345 | Use-of-uninitialized-value in aesEncryptBlock | 2024-04-30T00:03:14.686810Z | 2024-05-27T14:03:03.110153Z |
| osv-2024-343 | Heap-buffer-overflow in pcpp::BgpUpdateMessageLayer::setPathAttributes | 2024-04-30T00:02:38.268026Z | 2025-01-13T14:51:10.266632Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2023-0028 | buf_redux is Unmaintained | 2023-01-24T12:00:00Z | 2023-03-24T15:42:41Z |
| rustsec-2023-0019 | `kuchiki` is unmaintained | 2023-01-21T12:00:00Z | 2023-05-23T20:17:25Z |
| rustsec-2023-0003 | git2 does not verify SSH keys by default | 2023-01-20T12:00:00Z | 2023-01-20T23:06:55Z |
| rustsec-2023-0002 | git2 Rust package suppresses ssh host key checking | 2023-01-12T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2023-0005 | `tokio::io::ReadHalf<T>::unsplit` is Unsound | 2023-01-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0004 | bzip2 Denial of Service (DoS) | 2023-01-09T12:00:00Z | 2023-02-04T13:29:07Z |
| rustsec-2023-0001 | reject_remote_clients Configuration corruption | 2023-01-04T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2022-0072 | Location header incorporates user input, allowing open redirect | 2022-12-23T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0073 | crate has been renamed to `embedded-alloc` | 2022-12-21T12:00:00Z | 2022-12-23T16:46:57Z |
| rustsec-2022-0077 | `claim` is Unmaintained | 2022-12-04T12:00:00Z | 2023-02-04T10:58:43Z |
| rustsec-2022-0074 | Force cast a &Vec<T> to &[T] | 2022-12-02T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0080 | parity-util-mem Unmaintained | 2022-11-30T12:00:00Z | 2023-01-16T09:26:23Z |
| rustsec-2022-0070 | Unsound API in `secp256k1` allows use-after-free and invalid deallocation from safe code | 2022-11-30T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0069 | Improper validation of Windows paths could lead to directory traversal attack | 2022-11-30T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0068 | out-of-bounds read possible when setting list-of-pointers | 2022-11-30T12:00:00Z | 2022-11-30T22:16:39Z |
| rustsec-2022-0094 | Mimalloc Can Allocate Memory with Bad Alignment | 2022-11-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2022-0089 | `aliyun-oss-client` secret exposure | 2022-11-19T12:00:00Z | 2023-02-07T22:07:40Z |
| rustsec-2022-0076 | Bug in Wasmtime implementation of pooling instance allocator | 2022-11-10T12:00:00Z | 2023-03-15T23:49:40Z |
| rustsec-2022-0075 | Bug in pooling instance allocator | 2022-11-10T12:00:00Z | 2023-01-14T00:56:30Z |
| rustsec-2022-0097 | Out of bounds write in `wasmtime_trap_code` C API function | 2022-11-07T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0102 | Out of bounds read/write with zero-memory-pages configuration | 2022-11-05T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0098 | Data leakage between instances in the pooling allocator | 2022-11-05T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0065 | X.509 Email Address Variable Length Buffer Overflow | 2022-11-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0064 | X.509 Email Address 4-byte Buffer Overflow | 2022-11-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0079 | ELF header parsing library doesn't check for valid offset | 2022-10-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0066 | Denial of Service from unchecked request length | 2022-10-30T12:00:00Z | 2022-11-02T22:38:38Z |
| rustsec-2022-0083 | evm incorrect state transition | 2022-10-25T12:00:00Z | 2023-02-02T11:20:42Z |
| rustsec-2022-0062 | matrix-sdk 0.6.0 logs access tokens | 2022-10-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0067 | Invalid use of `mem::uninitialized` causes `use-of-uninitialized-value` | 2022-10-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0060 | orbtk is Unmaintained | 2022-10-13T12:00:00Z | 2022-10-19T01:14:12Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-discourse-2026-31805 | Discourse has a poll authorization bypass via post_id array parameter | 2026-03-27T07:10:31.444Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-30891 | Discourse hasUnauthorized Exposure of Private User Action Types | 2026-03-27T07:10:28.864Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-30889 | Discourse has Unauthorized Post Data Exposure in discourse-user-notes | 2026-03-27T07:10:26.417Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-30888 | Discourse has moderator privilege escalation via arbitrary post_id in suspend/silence endpoint | 2026-03-27T07:10:23.855Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-29072 | Discourse missing permission check for policy creation in discourse-policy | 2026-03-27T07:10:21.008Z | 2026-03-31T21:15:21.591Z |
| bit-discourse-2026-28282 | Discourse vulnerable to group membership addition permission bypass via discourse-policy plugin | 2026-03-27T07:10:17.839Z | 2026-03-31T21:15:21.591Z |
| bit-nginx-2026-32647 | NGINX ngx_http_mp4_module vulnerability | 2026-03-27T07:10:16.616Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-28755 | NGINX ngx_stream_ssl_module vulnerability | 2026-03-27T07:10:13.976Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-28753 | NGINX ngx_mail_proxy_module vulnerability | 2026-03-27T07:10:10.953Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-27784 | NGINX ngx_http_mp4_module vulnerability | 2026-03-27T07:10:08.052Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27936 | Discourse discloses restricted post-action counts to non-privileged users | 2026-03-27T07:10:06.332Z | 2026-03-31T21:15:21.591Z |
| bit-nginx-2026-27654 | NGINX ngx_http_dav_module vulnerability | 2026-03-27T07:10:05.293Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27935 | Discourse leaks private topic metadata to non-authorized users | 2026-03-27T07:10:03.445Z | 2026-03-31T21:15:21.591Z |
| bit-nginx-2026-27651 | NGINX ngx_mail_auth_http_module vulnerability | 2026-03-27T07:10:02.387Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27934 | Discourse leaks private topic title and post excerpt via user action API endpoint | 2026-03-27T07:10:00.671Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27740 | Discourse has Stored XSS in AI Triage Automation | 2026-03-27T07:09:57.609Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27570 | Discourse Vulnerable to Stored XSS via Shared AI Conversation Onebox | 2026-03-27T07:09:54.665Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27491 | Discourse has a bypass of official warnings messages by non-staff users | 2026-03-27T07:09:52.198Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27454 | Discourse has check revision visibility on posts endpoint | 2026-03-27T07:09:48.954Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27166 | Discourse vulnerable to HTML injection via prohibited iframe URLs | 2026-03-27T07:09:46.264Z | 2026-03-27T07:40:55.991Z |
| bit-nats-2026-33215 | NATS is vulnerable to MQTT hijacking via Client ID | 2026-03-27T07:08:53.339Z | 2026-03-27T12:16:52.978Z |
| bit-minio-2026-33419 | MinIO: LDAP login brute-force via user enumeration and missing rate limit | 2026-03-27T07:08:02.540Z | 2026-03-27T07:40:55.991Z |
| bit-minio-2026-33322 | MinIO: JWT Algorithm Confusion in OIDC Authentication | 2026-03-27T07:07:59.802Z | 2026-03-27T07:40:55.991Z |
| bit-python-2026-4519 | webbrowser.open() allows leading dashes in URLs | 2026-03-25T08:52:23.976Z | 2026-03-25T09:15:17.567Z |
| bit-mariadb-2026-32710 | Heap-based Buffer Overflow in MariaDB | 2026-03-25T08:46:04.911Z | 2026-04-01T09:11:42.692Z |
| bit-libpython-2026-4519 | webbrowser.open() allows leading dashes in URLs | 2026-03-25T08:44:11.251Z | 2026-03-25T09:15:17.567Z |
| bit-tomcat-2023-28709 | Apache Tomcat: Fix for CVE-2023-24998 is incomplete | 2026-03-24T10:21:40.054Z | 2026-03-24T10:46:38.869Z |
| bit-tomcat-2023-28708 | Apache Tomcat: JSESSIONID Cookie missing secure attribute in some configurations | 2026-03-24T10:21:38.576Z | 2026-03-24T10:46:38.869Z |
| bit-mlflow-2025-15031 | Path Traversal Vulnerability in mlflow/mlflow | 2026-03-24T08:47:14.572Z | 2026-04-08T12:15:37.582Z |
| bit-parse-2026-33163 | Parse Server leaks protected fields via LiveQuery afterEvent trigger | 2026-03-20T11:37:51.448Z | 2026-03-20T12:05:40.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-yb44027 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T17:04:26.396860Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ka40024 | PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access | 2026-01-30T17:03:56.468881Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sb85645 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T17:00:56.485426Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-os18490 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T16:58:26.304466Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xl45869 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T16:57:56.432971Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dn29911 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-01-30T16:57:26.436107Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zr62045 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-01-30T16:56:56.696859Z | 2026-01-29T18:58:54Z |
| cleanstart-2025-zr62045 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-01-30T16:56:56.696859Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jm16286 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-01-30T16:56:26.537390Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bn11148 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T16:54:56.412220Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jd48541 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T16:52:56.596548Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hl71566 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:50:56.129322Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tk38210 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:46:25.995358Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sb25660 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T16:44:27.197226Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pz62650 | Cancelling a query (e | 2026-01-30T16:41:55.453512Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-lz10721 | Within HostnameError | 2026-01-30T16:40:55.517816Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hj34439 | Go before 1 | 2026-01-30T16:39:55.415446Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kz30232 | Go before 1 | 2026-01-30T16:39:25.872575Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oj15484 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:37:55.388839Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-iy17697 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:37:55.497960Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-on38469 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:37:25.667594Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fp29743 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:37:25.443687Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gl18398 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:36:55.508939Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qd78411 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:36:25.408698Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vv68546 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:35:55.883570Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ty78539 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T16:35:55.295657Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-na36743 | Within HostnameError | 2026-01-30T16:35:55.379246Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ax77726 | vulnerability was found in PAM | 2026-01-30T16:35:55.808062Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pw02676 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:35:26.383203Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vs64679 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T16:35:25.680295Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2008-ALE-009 | Vulnérabilité dans Microsoft Access Snapshot Viewer | 2008-07-08T00:00:00.000000 | 2008-08-13T00:00:00.000000 |
| certa-2008-ale-008 | Vulnérabilité du navigateur Safari | 2008-06-02T00:00:00.000000 | 2008-06-20T00:00:00.000000 |
| CERTA-2008-ALE-008 | Vulnérabilité du navigateur Safari | 2008-06-02T00:00:00.000000 | 2008-06-20T00:00:00.000000 |
| certa-2008-ale-007 | Multiples vulnérabilités dans Apple iCal | 2008-05-23T00:00:00.000000 | 2008-05-29T00:00:00.000000 |
| CERTA-2008-ALE-007 | Multiples vulnérabilités dans Apple iCal | 2008-05-23T00:00:00.000000 | 2008-05-29T00:00:00.000000 |
| certa-2008-ale-006 | Vulnérabilités dans HP OpenView NNM | 2008-04-18T00:00:00.000000 | 2010-06-10T00:00:00.000000 |
| CERTA-2008-ALE-006 | Vulnérabilités dans HP OpenView NNM | 2008-04-18T00:00:00.000000 | 2010-06-10T00:00:00.000000 |
| certa-2008-ale-005 | Vulnérabilité dans Microsoft Jet Database Engine | 2008-03-25T00:00:00.000000 | 2008-05-14T00:00:00.000000 |
| CERTA-2008-ALE-005 | Vulnérabilité dans Microsoft Jet Database Engine | 2008-03-25T00:00:00.000000 | 2008-05-14T00:00:00.000000 |
| certa-2008-ale-004 | Vulnérabilité dans VMware | 2008-02-27T00:00:00.000000 | 2008-04-16T00:00:00.000000 |
| CERTA-2008-ALE-004 | Vulnérabilité dans VMware | 2008-02-27T00:00:00.000000 | 2008-04-16T00:00:00.000000 |
| certa-2008-ale-003 | Vulnérabilité dans Excel | 2008-01-16T00:00:00.000000 | 2008-03-12T00:00:00.000000 |
| CERTA-2008-ALE-003 | Vulnérabilité dans Excel | 2008-01-16T00:00:00.000000 | 2008-03-12T00:00:00.000000 |
| certa-2008-ale-002 | Vulnérabilité dans Joomla! | 2008-01-14T00:00:00.000000 | 2008-02-25T00:00:00.000000 |
| CERTA-2008-ALE-002 | Vulnérabilité dans Joomla! | 2008-01-14T00:00:00.000000 | 2008-02-25T00:00:00.000000 |
| certa-2008-ale-001 | Vulnérabilité dans Apple QuickTime | 2008-01-11T00:00:00.000000 | 2008-02-07T00:00:00.000000 |
| CERTA-2008-ALE-001 | Vulnérabilité dans Apple QuickTime | 2008-01-11T00:00:00.000000 | 2008-02-07T00:00:00.000000 |
| certa-2007-ale-017 | Vulnérabilité dans la gestion RTSP d'Apple QuickTime | 2007-11-27T00:00:00.000000 | 2007-12-14T00:00:00.000000 |
| CERTA-2007-ALE-017 | Vulnérabilité dans la gestion RTSP d'Apple QuickTime | 2007-11-27T00:00:00.000000 | 2007-12-14T00:00:00.000000 |
| certa-2007-ale-016 | Vulnérabilité d'Oracle 10g | 2007-11-16T00:00:00.000000 | 2007-11-16T00:00:00.000000 |
| CERTA-2007-ALE-016 | Vulnérabilité d'Oracle 10g | 2007-11-16T00:00:00.000000 | 2007-11-16T00:00:00.000000 |
| certa-2007-ale-015 | Vulnérabilité dans le traitement des URI sous Windows | 2007-10-10T00:00:00.000000 | 2007-11-14T00:00:00.000000 |
| CERTA-2007-ALE-015 | Vulnérabilité dans le traitement des URI sous Windows | 2007-10-10T00:00:00.000000 | 2007-11-14T00:00:00.000000 |
| certa-2007-ale-014 | Vulnérabilité dans Apple QuickTime | 2007-09-13T00:00:00.000000 | 2007-10-12T00:00:00.000000 |
| CERTA-2007-ALE-014 | Vulnérabilité dans Apple QuickTime | 2007-09-13T00:00:00.000000 | 2007-10-12T00:00:00.000000 |
| certa-2007-ale-013 | Vulnérabilité dans Mozilla Firefox | 2007-07-27T00:00:00.000000 | 2007-07-31T00:00:00.000000 |
| CERTA-2007-ALE-013 | Vulnérabilité dans Mozilla Firefox | 2007-07-27T00:00:00.000000 | 2007-07-31T00:00:00.000000 |
| certa-2007-ale-012 | Multiples vulnérabilités dans Mozilla Firefox | 2007-06-06T00:00:00.000000 | 2007-07-18T00:00:00.000000 |
| certa-2007-ale-011 | Vulnérabilité du composant d'indexation des serveurs Microsoft IIS | 2007-06-06T00:00:00.000000 | 2013-02-19T00:00:00.000000 |
| CERTA-2007-ALE-012 | Multiples vulnérabilités dans Mozilla Firefox | 2007-06-06T00:00:00.000000 | 2007-07-18T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2026-AVI-0094 | Multiples vulnérabilités dans HPE Aruba Networking Fabric Composer | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| CERTFR-2026-AVI-0093 | Multiples vulnérabilités dans Tenable Network Monitor | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| CERTFR-2026-AVI-0092 | Vulnérabilité dans Google Chrome | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0091 | Multiples vulnérabilités dans Xen | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| certfr-2026-avi-0090 | Multiples vulnérabilités dans Citrix XenServer | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| certfr-2026-avi-0089 | Vulnérabilité dans Microsoft Office | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| certfr-2026-avi-0088 | Vulnérabilité dans MariaDB | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| CERTFR-2026-AVI-0091 | Multiples vulnérabilités dans Xen | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| CERTFR-2026-AVI-0090 | Multiples vulnérabilités dans Citrix XenServer | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| CERTFR-2026-AVI-0089 | Vulnérabilité dans Microsoft Office | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| CERTFR-2026-AVI-0088 | Vulnérabilité dans MariaDB | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| certfr-2026-avi-0087 | Vulnérabilité dans les produits Belden | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| certfr-2026-avi-0086 | Vulnérabilité dans CPython | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| certfr-2026-avi-0085 | Multiples vulnérabilités dans NetApp Brocade SAN Navigator | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| certfr-2026-avi-0084 | Vulnérabilité dans Microsoft Edge | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| CERTFR-2026-AVI-0087 | Vulnérabilité dans les produits Belden | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| CERTFR-2026-AVI-0086 | Vulnérabilité dans CPython | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| CERTFR-2026-AVI-0085 | Multiples vulnérabilités dans NetApp Brocade SAN Navigator | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| CERTFR-2026-AVI-0084 | Vulnérabilité dans Microsoft Edge | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| certfr-2026-avi-0083 | Multiples vulnérabilités dans les produits IBM | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| certfr-2026-avi-0082 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| certfr-2026-avi-0081 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| certfr-2026-avi-0080 | Vulnérabilité dans Broadcom Web Security Services Agent | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| CERTFR-2026-AVI-0083 | Multiples vulnérabilités dans les produits IBM | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| CERTFR-2026-AVI-0082 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| CERTFR-2026-AVI-0081 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| CERTFR-2026-AVI-0080 | Vulnérabilité dans Broadcom Web Security Services Agent | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| certfr-2026-avi-0079 | Vulnérabilité dans Python | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0078 | Vulnérabilité dans Ceph | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0077 | Multiples vulnérabilités dans les produits Symantec | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2023-000102 | Multiple vulnerabilities in JustSystems products | 2023-10-19T15:16+09:00 | 2024-05-16T16:44+09:00 |
| jvndb-2023-000104 | Improper restriction of XML external entity references (XXE) in Proself | 2023-10-18T18:00+09:00 | 2024-05-15T17:08+09:00 |
| jvndb-2023-003913 | Multiple vulnerabilities in JTEKT ELECTRONICS OnSinView2 | 2023-10-18T14:13+09:00 | 2024-05-16T17:28+09:00 |
| jvndb-2023-000101 | web2py vulnerable to OS command injection | 2023-10-16T16:11+09:00 | 2024-05-22T17:58+09:00 |
| jvndb-2023-000100 | Scanning evasion issue in Cisco Secure Email Gateway | 2023-10-16T16:11+09:00 | 2023-10-27T15:52+09:00 |
| jvndb-2023-003788 | Out-of-bounds read vulnerability in Keyence KV STUDIO and KV REPLAY VIEWER | 2023-10-11T15:23+09:00 | 2024-05-16T17:09+09:00 |
| jvndb-2023-000098 | e-Gov Client Application fails to restrict custom URL schemes properly | 2023-10-06T14:57+09:00 | 2024-05-17T17:55+09:00 |
| jvndb-2023-003771 | File and Directory Permissions Vulnerability in JP1/Performance Management | 2023-10-04T15:23+09:00 | 2023-10-04T15:23+09:00 |
| jvndb-2023-003770 | DoS Vulnerability in Hitachi Ops Center Common Services | 2023-10-04T15:23+09:00 | 2024-05-22T15:31+09:00 |
| jvndb-2023-003769 | Information Exposure Vulnerability in Hitachi Ops Center Administrator | 2023-10-04T15:23+09:00 | 2024-05-22T15:20+09:00 |
| jvndb-2023-000097 | Citadel WebCit vulnerable to cross-site scripting on Instant Messaging facility | 2023-10-04T14:07+09:00 | 2024-05-21T17:08+09:00 |
| jvndb-2023-003767 | Multiple vulnerabilities in multiple FURUNO SYSTEMS wireless LAN access point devices in ST(Standalone) mode | 2023-10-03T14:26+09:00 | 2024-05-22T18:01+09:00 |
| jvndb-2023-000096 | Improper restriction of XML external entity references (XXE) in FD Application | 2023-10-02T12:36+09:00 | 2024-05-22T15:37+09:00 |
| jvndb-2023-003764 | Multiple vulnerabilities in Panasonic KW Watcher | 2023-09-27T14:44+09:00 | 2023-09-27T14:44+09:00 |
| jvndb-2023-000095 | Shihonkanri Plus vulnerable to relative path traversal | 2023-09-27T13:49+09:00 | 2024-05-21T17:16+09:00 |
| jvndb-2023-003757 | Trend Micro Mobile Security vulnerable to cross-site scripting | 2023-09-26T11:30+09:00 | 2024-03-13T18:07+09:00 |
| jvndb-2023-000094 | Multiple vulnerabilities in WordPress plugin "Welcart e-Commerce" | 2023-09-22T13:51+09:00 | 2024-07-11T16:49+09:00 |
| jvndb-2023-003721 | Trend Micro Endpoint security products for enterprises vulnerable to arbitrary code execution | 2023-09-20T13:58+09:00 | 2024-05-09T18:22+09:00 |
| jvndb-2023-003592 | Multiple vulnerabilities in JTEKT ELECTRONICS Kostac PLC Programming Software | 2023-09-13T15:02+09:00 | 2023-09-13T15:02+09:00 |
| jvndb-2023-000093 | Pyramid vulnerable to directory traversal | 2023-09-11T13:53+09:00 | 2024-05-16T16:52+09:00 |
| jvndb-2023-003335 | Vulnerability in JP1/VERITAS | 2023-09-06T15:35+09:00 | 2023-09-06T15:35+09:00 |
| jvndb-2023-000092 | "direct" Desktop App for macOS fails to restrict access permissions | 2023-09-06T14:33+09:00 | 2023-09-06T14:33+09:00 |
| jvndb-2023-000091 | Multiple vulnerabilities in F-RevoCRM | 2023-09-05T15:51+09:00 | 2024-05-14T18:06+09:00 |
| jvndb-2023-000090 | Multiple vulnerabilities in CGIs of PMailServer and PMailServer2 | 2023-09-05T14:55+09:00 | 2023-09-05T14:55+09:00 |
| jvndb-2023-000088 | Multiple vulnerabilities in SHIRASAGI | 2023-09-04T13:41+09:00 | 2024-05-14T17:58+09:00 |
| jvndb-2023-000089 | Multiple vulnerabilities in i-PRO VI Web Client | 2023-08-31T14:13+09:00 | 2024-05-14T18:05+09:00 |
| jvndb-2023-003028 | Phoenix Technologies Windows kernel driver vulnerable to insufficient access control on its IOCTL | 2023-08-30T10:05+09:00 | 2024-04-24T11:43+09:00 |
| jvndb-2023-003023 | Vulnerability in HiRDB | 2023-08-29T15:55+09:00 | 2023-09-06T15:45+09:00 |
| jvndb-2023-000087 | SYNCK GRAPHICA Mailform Pro CGI vulnerable to Regular expression Denial-of-Service (ReDoS) | 2023-08-24T14:12+09:00 | 2024-05-15T17:12+09:00 |
| jvndb-2023-000085 | "Skylark" App fails to restrict custom URL schemes properly | 2023-08-24T13:34+09:00 | 2024-12-03T15:51+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-17888 | Siemens SICAM SIAPP SDK命令执行漏洞 | 2026-03-17 | 2026-04-21 |
| cnvd-2026-17887 | Siemens SICAM SIAPP SDK拒绝服务漏洞 | 2026-03-17 | 2026-04-21 |
| cnvd-2026-17886 | Siemens SICAM SIAPP SDK堆栈缓冲区溢出漏洞 | 2026-03-17 | 2026-04-21 |
| cnvd-2026-17885 | Siemens SICAM SIAPP SDK越界写入漏洞 | 2026-03-17 | 2026-04-21 |
| cnvd-2026-17165 | SAP Business One Job Service跨站脚本漏洞 | 2026-03-17 | 2026-04-10 |
| cnvd-2026-16595 | Adobe Commerce输入验证错误漏洞(CNVD-2026-16595) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16594 | Adobe Commerce路径遍历漏洞(CNVD-2026-16594) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16593 | Adobe Commerce开放重定向漏洞 | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16592 | Adobe Commerce服务端请求伪造漏洞 | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16588 | Adobe Commerce输入验证错误漏洞(CNVD-2026-16588) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16587 | Adobe Commerce跨站脚本漏洞(CNVD-2026-16587) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16586 | Adobe Commerce跨站脚本漏洞(CNVD-2026-16586) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16585 | Adobe Commerce跨站脚本漏洞(CNVD-2026-16585) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16584 | Adobe Commerce跨站脚本漏洞(CNVD-2026-16584) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16583 | Adobe Commerce跨站脚本漏洞(CNVD-2026-16583) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16582 | Adobe Commerce跨站脚本漏洞(CNVD-2026-16582) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16581 | Adobe Commerce安全绕过漏洞(CNVD-2026-16581) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16580 | Adobe Commerce安全绕过漏洞(CNVD-2026-16580) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16579 | Adobe Commerce安全绕过漏洞(CNVD-2026-16579) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16578 | Adobe Commerce安全绕过漏洞(CNVD-2026-16578) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16577 | WordPress插件Easy Post Submission存在未明漏洞 | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16576 | WordPress插件Eagle BookingSQL注入漏洞 | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16160 | Microsoft Office代码执行漏洞(CNVD-2026-16160) | 2026-03-17 | 2026-04-07 |
| cnvd-2026-16156 | Microsoft Excel代码执行漏洞(CNVD-2026-16156) | 2026-03-17 | 2026-04-07 |
| cnvd-2026-16153 | Microsoft Excel代码执行漏洞(CNVD-2026-16153) | 2026-03-17 | 2026-04-07 |
| cnvd-2026-16152 | Microsoft Excel代码执行漏洞(CNVD-2026-16152) | 2026-03-17 | 2026-04-07 |
| cnvd-2026-15170 | Adobe Commerce授权问题漏洞(CNVD-2026-15170) | 2026-03-17 | 2026-03-27 |
| cnvd-2026-15169 | Adobe Commerce授权问题漏洞(CNVD-2026-15169) | 2026-03-17 | 2026-03-27 |
| cnvd-2026-15168 | Adobe Commerce授权问题漏洞(CNVD-2026-15168) | 2026-03-17 | 2026-03-27 |
| cnvd-2026-14602 | Fortinet FortiWeb操作系统命令注入漏洞(CNVD-2026-14602) | 2026-03-17 | 2026-03-17 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01152 | Уязвимость функции change_memory_common() модуля arch/arm64/mm/pageattr.c ядра операционн… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01151 | Уязвимость функции ima_match_rules() модуля security/integrity/ima/ima_policy.c подсистем… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01150 | Уязвимость функции qla2xxx_process_purls_iocb() модуля drivers/scsi/qla2xxx/qla_nvme.c др… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01149 | Уязвимость функции ivpu_gem_bo_free() модуля drivers/accel/ivpu/ivpu_gem.c драйвера нейро… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01148 | Уязвимость функции iwl_mei_rx_filter() модуля drivers/net/wireless/intel/iwlwifi/mei/net.… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01147 | Уязвимость функции mt7921_acpi_read() модуля drivers/net/wireless/mediatek/mt76/mt7921/ac… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01146 | Уязвимость функции begin_cpu_udmabuf() модуля drivers/dma-buf/udmabuf.c 2 ядра операционн… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01145 | Уязвимость функции ssip_pn_open() модуля drivers/hsi/clients/ssi_protocol.c драйвера высо… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01144 | Уязвимость функции efct_device_init() модуля drivers/scsi/elx/efct/efct_driver.c драйвера… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01143 | Уязвимость функции ntfs_fill_super() модуля fs/ntfs3/super.c файловой системы NTFS 3 ядра… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01142 | Уязвимость функции print_wrapper_info() модуля drivers/media/platform/nxp/imx-jpeg/mxc-jp… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01141 | Уязвимость функции arch_kimage_file_post_load_cleanup() модуля arch/riscv/kernel/elf_kexe… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01140 | Уязвимость функции virtual_nci_send() модуля drivers/nfc/virtual_ncidev.c драйвера NFC яд… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01139 | Уязвимость функции dpu_rm_get_assigned_resources() модуля drivers/gpu/drm/msm/disp/dpu1/d… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01138 | Уязвимость функции __iio_device_register() модуля drivers/iio/industrialio-core.c ядра оп… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01137 | Уязвимость функции svs_probe() модуля drivers/soc/mediatek/mtk-svs.c ядра операционной си… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01136 | Уязвимость функции f2fs_write_raw_pages() модуля fs/f2fs/compress.c файловой системы F2FS… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01135 | Уязвимость функции ntfs_read_mft() модуля fs/ntfs3/inode.c ядра операционной системы Lin… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01134 | Уязвимость веб-интерфейса для управления и взаимодействия с базой данных Cassandra Web, с… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01133 | Уязвимость функции nvmet_tcp_handle_h2c_data_pdu() ядра операционной системы Linux, позво… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01132 | Уязвимость функции inet6_addr_del() ядра операционной системы Linux, позволяющая нарушите… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01131 | Уязвимость функции загрузки прошивки микропрограммного обеспечения роутеров TOTOLINK EX20… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01130 | Уязвимость службы Content Distribution Service (NomadBranch.exe) программной платформы дл… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01129 | Уязвимость функции sub_4298C0() микропрограммного обеспечения IP-камер D-Link DCS700l, по… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01128 | Уязвимость службы Music File Upload Service микропрограммного обеспечения IP-камер D-Link… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01127 | Уязвимость сценария /set_temp_nodes.php микропрограммного обеспечения маршрутизаторов DIR… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01126 | Уязвимость встроенного веб-сервера boa (/boafrm/formLtefotaUpgradeFibocom) микропрограммн… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01125 | Уязвимость функции sub_4250E0() (/boafrm/formSmsManage) микропрограммного обеспечения мар… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01124 | Уязвимость функции checkUserFromLanOrWan() (/boaform/admin/formLogin) микропрограммного о… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01123 | Уязвимость приложения для управления жизненным циклом мобильных устройств и мобильных при… | 03.02.2026 | 03.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200603-0270 | Unspecified vulnerability in Safari, LaunchServices, and/or CoreTypes in Apple Mac OS X 1… | 2024-07-23T21:15:31.812000Z |
| var-201904-1433 | A memory corruption issue was addressed with improved validation. This issue affected ver… | 2024-07-23T21:15:28.536000Z |
| var-200701-0156 | Integer overflow in the byte_swap_sbin function in bsd/ufs/ufs/ufs_byte_order.c in Mac OS… | 2024-07-23T21:15:07.589000Z |
| var-201904-1475 | A memory consumption issue was addressed with improved memory handling. This issue affect… | 2024-07-23T21:14:35.907000Z |
| var-201302-0398 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:14:35.493000Z |
| var-202108-1249 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed … | 2024-07-23T21:14:34.847000Z |
| var-200102-0005 | HTTP server on the WatchGuard SOHO firewall does not properly restrict access to administ… | 2024-07-23T21:14:25.191000Z |
| var-200906-0612 | drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earli… | 2024-07-23T21:14:24.068000Z |
| var-201210-0267 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:14:23.983000Z |
| var-200712-0604 | Double free vulnerability in the gss_krb5int_make_seal_token_v3 function in lib/gssapi/kr… | 2024-07-23T21:14:23.335000Z |
| var-201912-0629 | A logic issue was addressed with improved state management. This issue is fixed in tvOS 1… | 2024-07-23T21:14:22.861000Z |
| var-201302-0250 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:14:03.420000Z |
| var-200809-0183 | The kernel in Apple Mac OS X 10.5 through 10.5.4 does not properly flush cached credentia… | 2024-07-23T21:14:02.408000Z |
| var-201109-0208 | Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers… | 2024-07-23T21:14:00.290000Z |
| var-202205-1299 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2024-07-23T21:13:54.017000Z |
| var-200106-0199 | banners.php in PHP-Nuke 4.4 and earlier allows remote attackers to modify banner ad URLs … | 2024-07-23T21:13:54.400000Z |
| var-200810-0144 | Heap-based buffer overflow in the read_rle16 function in imagetops in CUPS before 1.3.9 a… | 2024-07-23T21:13:53.646000Z |
| var-201907-1641 | In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recordin… | 2024-07-23T21:13:51.034000Z |
| var-201507-0017 | The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x be… | 2024-07-23T21:13:51.101000Z |
| var-201904-1404 | A use after free issue was addressed with improved memory management. This issue affected… | 2024-07-23T21:13:19.243000Z |
| var-202108-2221 | curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. T… | 2024-07-23T21:13:18.214000Z |
| var-201210-0457 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:13:17.006000Z |
| var-201410-0859 | Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earli… | 2024-07-23T21:12:41.300000Z |
| var-201006-1144 | WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4… | 2024-07-23T21:12:41.398000Z |
| var-200608-0036 | Integer overflow in ImageIO in Apple Mac OS X 10.4.7 allows user-assisted attackers to ca… | 2024-07-23T21:12:41.892000Z |
| var-201710-0974 | Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the G… | 2024-07-23T21:12:37.370000Z |
| var-201103-0291 | Buffer overflow in Fax4Decode in LibTIFF 3.9.4 and possibly other versions, as used in Im… | 2024-07-23T21:12:37.468000Z |
| var-201511-0027 | The xsltStylePreCompute function in preproc.c in libxslt 1.1.28 does not check if the par… | 2024-07-23T21:12:31.080000Z |
| var-202003-1785 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:12:28.156000Z |
| var-201310-0372 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, J… | 2024-07-23T21:12:27.691000Z |