Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43205 |
N/A
|
dpaa2-switch: validate num_ifs to prevent out-of-bound… |
Linux |
Linux |
2026-05-06T11:28:10.270Z | 2026-05-06T11:28:10.270Z |
| CVE-2026-43204 |
N/A
|
ASoC: qcom: q6asm: drop DSP responses for closed data … |
Linux |
Linux |
2026-05-06T11:28:09.617Z | 2026-05-07T17:14:41.440Z |
| CVE-2026-43203 |
N/A
|
atm: fore200e: fix use-after-free in tasklets during d… |
Linux |
Linux |
2026-05-06T11:28:08.949Z | 2026-05-06T11:28:08.949Z |
| CVE-2026-43202 |
N/A
|
fbdev: vt8500lcdfb: fix missing dma_free_coherent() |
Linux |
Linux |
2026-05-06T11:28:08.226Z | 2026-05-06T11:28:08.226Z |
| CVE-2026-43201 |
N/A
|
APEI/GHES: ARM processor Error: don't go past allocate… |
Linux |
Linux |
2026-05-06T11:28:07.565Z | 2026-05-07T17:14:40.303Z |
| CVE-2026-43200 |
N/A
|
PCI: endpoint: Fix swapped parameters in pci_{primary/… |
Linux |
Linux |
2026-05-06T11:28:06.904Z | 2026-05-06T11:28:06.904Z |
| CVE-2026-43199 |
N/A
|
net/mlx5e: Fix "scheduling while atomic" in IPsec MAC … |
Linux |
Linux |
2026-05-06T11:28:06.232Z | 2026-05-06T11:28:06.232Z |
| CVE-2026-43198 |
N/A
|
tcp: fix potential race in tcp_v6_syn_recv_sock() |
Linux |
Linux |
2026-05-06T11:28:05.569Z | 2026-05-06T11:28:05.569Z |
| CVE-2026-43197 |
N/A
|
netconsole: avoid OOB reads, msg is not nul-terminated |
Linux |
Linux |
2026-05-06T11:28:04.829Z | 2026-05-06T11:28:04.829Z |
| CVE-2026-43196 |
N/A
|
soc: ti: pruss: Fix double free in pruss_clk_mux_setup() |
Linux |
Linux |
2026-05-06T11:28:04.132Z | 2026-05-06T11:28:04.132Z |
| CVE-2026-43195 |
N/A
|
drm/amdgpu: validate user queue size constraints |
Linux |
Linux |
2026-05-06T11:28:03.437Z | 2026-05-07T17:14:39.181Z |
| CVE-2026-43194 |
N/A
|
net: consume xmit errors of GSO frames |
Linux |
Linux |
2026-05-06T11:28:02.794Z | 2026-05-06T11:28:02.794Z |
| CVE-2026-43193 |
N/A
|
nfsd: fix nfs4_file refcount leak in nfsd_get_dir_deleg() |
Linux |
Linux |
2026-05-06T11:28:01.926Z | 2026-05-06T11:28:01.926Z |
| CVE-2026-43192 |
N/A
|
dm mpath: Add missing dm_put_device when failing to ge… |
Linux |
Linux |
2026-05-06T11:28:01.182Z | 2026-05-06T11:28:01.182Z |
| CVE-2026-43191 |
N/A
|
drm/amd/display: Adjust PHY FSM transition to TX_EN-to… |
Linux |
Linux |
2026-05-06T11:28:00.470Z | 2026-05-07T17:14:38.021Z |
| CVE-2026-43190 |
N/A
|
netfilter: xt_tcpmss: check remaining length before re… |
Linux |
Linux |
2026-05-06T11:27:59.798Z | 2026-05-07T17:14:36.868Z |
| CVE-2026-43189 |
N/A
|
media: v4l2-async: Fix error handling on steps after f… |
Linux |
Linux |
2026-05-06T11:27:59.108Z | 2026-05-07T17:14:35.685Z |
| CVE-2026-43188 |
N/A
|
ceph: do not propagate page array emplacement errors a… |
Linux |
Linux |
2026-05-06T11:27:58.402Z | 2026-05-06T11:27:58.402Z |
| CVE-2026-43187 |
N/A
|
xfs: delete attr leaf freemap entries when empty |
Linux |
Linux |
2026-05-06T11:27:57.727Z | 2026-05-06T11:27:57.727Z |
| CVE-2026-43186 |
N/A
|
ipv6: ioam: fix heap buffer overflow in __ioam6_fill_t… |
Linux |
Linux |
2026-05-06T11:27:57.053Z | 2026-05-06T11:27:57.053Z |
| CVE-2026-43185 |
N/A
|
ksmbd: fix signededness bug in smb_direct_prepare_nego… |
Linux |
Linux |
2026-05-06T11:27:56.386Z | 2026-05-06T11:27:56.386Z |
| CVE-2026-43184 |
N/A
|
rnbd-srv: Zero the rsp buffer before using it |
Linux |
Linux |
2026-05-06T11:27:55.672Z | 2026-05-07T17:14:34.478Z |
| CVE-2026-43183 |
N/A
|
media: cx25821: Fix a resource leak in cx25821_dev_setup() |
Linux |
Linux |
2026-05-06T11:27:54.977Z | 2026-05-07T17:14:33.359Z |
| CVE-2026-43182 |
N/A
|
media: ccs: Avoid possible division by zero |
Linux |
Linux |
2026-05-06T11:27:54.307Z | 2026-05-06T11:27:54.307Z |
| CVE-2026-43181 |
N/A
|
gpio: sysfs: fix chip removal with GPIOs exported over sysfs |
Linux |
Linux |
2026-05-06T11:27:53.626Z | 2026-05-06T11:27:53.626Z |
| CVE-2026-43180 |
N/A
|
net: usb: kaweth: remove TX queue manipulation in kawe… |
Linux |
Linux |
2026-05-06T11:27:52.983Z | 2026-05-06T11:27:52.983Z |
| CVE-2026-43179 |
N/A
|
erofs: fix incorrect early exits for invalid metabox-e… |
Linux |
Linux |
2026-05-06T11:27:52.324Z | 2026-05-06T11:27:52.324Z |
| CVE-2026-43178 |
N/A
|
procfs: fix possible double mmput() in do_procmap_query() |
Linux |
Linux |
2026-05-06T11:27:51.524Z | 2026-05-06T11:27:51.524Z |
| CVE-2026-43177 |
N/A
|
media: ipu6: Fix RPM reference leak in probe error paths |
Linux |
Linux |
2026-05-06T11:27:50.843Z | 2026-05-06T11:27:50.843Z |
| CVE-2026-43176 |
N/A
|
wifi: rtw89: pci: validate release report content befo… |
Linux |
Linux |
2026-05-06T11:27:50.150Z | 2026-05-07T17:14:32.214Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43198 |
N/A
|
tcp: fix potential race in tcp_v6_syn_recv_sock() |
Linux |
Linux |
2026-05-06T11:28:05.569Z | 2026-05-06T11:28:05.569Z |
| CVE-2026-43197 |
N/A
|
netconsole: avoid OOB reads, msg is not nul-terminated |
Linux |
Linux |
2026-05-06T11:28:04.829Z | 2026-05-06T11:28:04.829Z |
| CVE-2026-43196 |
N/A
|
soc: ti: pruss: Fix double free in pruss_clk_mux_setup() |
Linux |
Linux |
2026-05-06T11:28:04.132Z | 2026-05-06T11:28:04.132Z |
| CVE-2026-43195 |
N/A
|
drm/amdgpu: validate user queue size constraints |
Linux |
Linux |
2026-05-06T11:28:03.437Z | 2026-05-07T17:14:39.181Z |
| CVE-2026-43194 |
N/A
|
net: consume xmit errors of GSO frames |
Linux |
Linux |
2026-05-06T11:28:02.794Z | 2026-05-06T11:28:02.794Z |
| CVE-2026-43193 |
N/A
|
nfsd: fix nfs4_file refcount leak in nfsd_get_dir_deleg() |
Linux |
Linux |
2026-05-06T11:28:01.926Z | 2026-05-06T11:28:01.926Z |
| CVE-2026-43192 |
N/A
|
dm mpath: Add missing dm_put_device when failing to ge… |
Linux |
Linux |
2026-05-06T11:28:01.182Z | 2026-05-06T11:28:01.182Z |
| CVE-2026-43191 |
N/A
|
drm/amd/display: Adjust PHY FSM transition to TX_EN-to… |
Linux |
Linux |
2026-05-06T11:28:00.470Z | 2026-05-07T17:14:38.021Z |
| CVE-2026-43190 |
N/A
|
netfilter: xt_tcpmss: check remaining length before re… |
Linux |
Linux |
2026-05-06T11:27:59.798Z | 2026-05-07T17:14:36.868Z |
| CVE-2026-43189 |
N/A
|
media: v4l2-async: Fix error handling on steps after f… |
Linux |
Linux |
2026-05-06T11:27:59.108Z | 2026-05-07T17:14:35.685Z |
| CVE-2026-43188 |
N/A
|
ceph: do not propagate page array emplacement errors a… |
Linux |
Linux |
2026-05-06T11:27:58.402Z | 2026-05-06T11:27:58.402Z |
| CVE-2026-43187 |
N/A
|
xfs: delete attr leaf freemap entries when empty |
Linux |
Linux |
2026-05-06T11:27:57.727Z | 2026-05-06T11:27:57.727Z |
| CVE-2026-43186 |
N/A
|
ipv6: ioam: fix heap buffer overflow in __ioam6_fill_t… |
Linux |
Linux |
2026-05-06T11:27:57.053Z | 2026-05-06T11:27:57.053Z |
| CVE-2026-43185 |
N/A
|
ksmbd: fix signededness bug in smb_direct_prepare_nego… |
Linux |
Linux |
2026-05-06T11:27:56.386Z | 2026-05-06T11:27:56.386Z |
| CVE-2026-43184 |
N/A
|
rnbd-srv: Zero the rsp buffer before using it |
Linux |
Linux |
2026-05-06T11:27:55.672Z | 2026-05-07T17:14:34.478Z |
| CVE-2026-43183 |
N/A
|
media: cx25821: Fix a resource leak in cx25821_dev_setup() |
Linux |
Linux |
2026-05-06T11:27:54.977Z | 2026-05-07T17:14:33.359Z |
| CVE-2026-43182 |
N/A
|
media: ccs: Avoid possible division by zero |
Linux |
Linux |
2026-05-06T11:27:54.307Z | 2026-05-06T11:27:54.307Z |
| CVE-2026-43181 |
N/A
|
gpio: sysfs: fix chip removal with GPIOs exported over sysfs |
Linux |
Linux |
2026-05-06T11:27:53.626Z | 2026-05-06T11:27:53.626Z |
| CVE-2026-43180 |
N/A
|
net: usb: kaweth: remove TX queue manipulation in kawe… |
Linux |
Linux |
2026-05-06T11:27:52.983Z | 2026-05-06T11:27:52.983Z |
| CVE-2026-43179 |
N/A
|
erofs: fix incorrect early exits for invalid metabox-e… |
Linux |
Linux |
2026-05-06T11:27:52.324Z | 2026-05-06T11:27:52.324Z |
| CVE-2026-43178 |
N/A
|
procfs: fix possible double mmput() in do_procmap_query() |
Linux |
Linux |
2026-05-06T11:27:51.524Z | 2026-05-06T11:27:51.524Z |
| CVE-2026-43177 |
N/A
|
media: ipu6: Fix RPM reference leak in probe error paths |
Linux |
Linux |
2026-05-06T11:27:50.843Z | 2026-05-06T11:27:50.843Z |
| CVE-2026-43176 |
N/A
|
wifi: rtw89: pci: validate release report content befo… |
Linux |
Linux |
2026-05-06T11:27:50.150Z | 2026-05-07T17:14:32.214Z |
| CVE-2026-43175 |
N/A
|
clk: rs9: Reserve 8 struct clk_hw slots for for 9FGV0841 |
Linux |
Linux |
2026-05-06T11:27:49.496Z | 2026-05-06T11:27:49.496Z |
| CVE-2026-43174 |
N/A
|
io_uring/zcrx: fix post open error handling |
Linux |
Linux |
2026-05-06T11:27:48.785Z | 2026-05-06T11:27:48.785Z |
| CVE-2026-43173 |
N/A
|
net: ethernet: xscale: Check for PTP support properly |
Linux |
Linux |
2026-05-06T11:27:48.097Z | 2026-05-06T11:27:48.097Z |
| CVE-2026-43172 |
N/A
|
wifi: iwlwifi: fix 22000 series SMEM parsing |
Linux |
Linux |
2026-05-06T11:27:47.358Z | 2026-05-07T17:14:30.979Z |
| CVE-2026-43171 |
N/A
|
EFI/CPER: don't dump the entire memory region |
Linux |
Linux |
2026-05-06T11:27:46.698Z | 2026-05-07T17:14:29.768Z |
| CVE-2026-43170 |
N/A
|
usb: dwc3: gadget: Move vbus draw to workqueue context |
Linux |
Linux |
2026-05-06T11:27:46.021Z | 2026-05-06T11:27:46.021Z |
| CVE-2026-43169 |
N/A
|
drm/buddy: Prevent BUG_ON by validating rounded allocation |
Linux |
Linux |
2026-05-06T11:27:45.356Z | 2026-05-06T11:27:45.356Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-20629 | A privacy issue was addressed with improved handling of temporary files. This issue is fixed in mac… | 2026-02-11T23:16:06.417 | 2026-02-17T16:20:27.980 |
| fkie_cve-2026-20628 | A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 18.7.5 a… | 2026-02-11T23:16:06.287 | 2026-04-02T19:21:12.607 |
| fkie_cve-2026-20627 | An issue existed in the handling of environment variables. This issue was addressed with improved v… | 2026-02-11T23:16:06.187 | 2026-04-02T19:21:12.423 |
| fkie_cve-2026-20626 | This issue was addressed with improved checks. This issue is fixed in iOS 26.3 and iPadOS 26.3, mac… | 2026-02-11T23:16:06.083 | 2026-04-02T19:21:12.247 |
| fkie_cve-2026-20625 | A parsing issue in the handling of directory paths was addressed with improved path validation. Thi… | 2026-02-11T23:16:05.977 | 2026-04-02T19:21:12.053 |
| fkie_cve-2026-20624 | An injection issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.… | 2026-02-11T23:16:05.880 | 2026-04-02T19:21:11.870 |
| fkie_cve-2026-20623 | A permissions issue was addressed by removing the vulnerable code. This issue is fixed in macOS Tah… | 2026-02-11T23:16:05.787 | 2026-02-13T19:44:50.387 |
| fkie_cve-2026-20621 | The issue was addressed with improved memory handling. This issue is fixed in iOS 18.7.5 and iPadOS… | 2026-02-11T23:16:05.683 | 2026-04-02T19:21:11.417 |
| fkie_cve-2026-20620 | An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in ma… | 2026-02-11T23:16:05.577 | 2026-04-02T19:21:11.240 |
| fkie_cve-2026-20619 | A logging issue was addressed with improved data redaction. This issue is fixed in macOS Sequoia 15… | 2026-02-11T23:16:05.463 | 2026-02-13T19:45:07.067 |
| fkie_cve-2026-20618 | An issue was addressed with improved handling of temporary files. This issue is fixed in macOS Taho… | 2026-02-11T23:16:05.367 | 2026-02-18T16:22:30.783 |
| fkie_cve-2026-20617 | A race condition was addressed with improved state handling. This issue is fixed in iOS 26.3 and iP… | 2026-02-11T23:16:05.263 | 2026-04-02T19:21:10.737 |
| fkie_cve-2026-20616 | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iO… | 2026-02-11T23:16:05.160 | 2026-04-02T19:21:10.560 |
| fkie_cve-2026-20615 | A path handling issue was addressed with improved validation. This issue is fixed in iOS 26.3 and i… | 2026-02-11T23:16:05.060 | 2026-04-02T19:21:10.353 |
| fkie_cve-2026-20614 | A path handling issue was addressed with improved validation. This issue is fixed in macOS Sequoia … | 2026-02-11T23:16:04.957 | 2026-04-02T19:21:10.153 |
| fkie_cve-2026-20612 | A privacy issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, ma… | 2026-02-11T23:16:04.857 | 2026-04-02T19:21:09.967 |
| fkie_cve-2026-20611 | An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in i… | 2026-02-11T23:16:04.747 | 2026-04-02T19:21:09.760 |
| fkie_cve-2026-20610 | This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Tahoe 26.… | 2026-02-11T23:16:04.643 | 2026-02-13T15:45:52.137 |
| fkie_cve-2026-20609 | The issue was addressed with improved memory handling. This issue is fixed in iOS 18.7.5 and iPadOS… | 2026-02-11T23:16:04.510 | 2026-04-02T19:21:09.403 |
| fkie_cve-2026-20608 | This issue was addressed through improved state management. This issue is fixed in Safari 26.3, iOS… | 2026-02-11T23:16:04.407 | 2026-04-02T19:21:09.113 |
| fkie_cve-2026-20606 | This issue was addressed by removing the vulnerable code. This issue is fixed in iOS 18.7.5 and iPa… | 2026-02-11T23:16:04.310 | 2026-04-02T19:21:08.690 |
| fkie_cve-2026-20605 | The issue was addressed with improved memory handling. This issue is fixed in iOS 18.7.5 and iPadOS… | 2026-02-11T23:16:04.210 | 2026-04-02T19:21:08.497 |
| fkie_cve-2026-20603 | This issue was addressed with improved redaction of sensitive information. This issue is fixed in m… | 2026-02-11T23:16:04.110 | 2026-02-18T15:18:41.853 |
| fkie_cve-2026-20602 | The issue was addressed with improved handling of caches. This issue is fixed in macOS Sequoia 15.7… | 2026-02-11T23:16:04.003 | 2026-04-02T19:21:08.180 |
| fkie_cve-2026-20601 | A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Tahoe … | 2026-02-11T23:16:03.907 | 2026-03-04T19:16:18.943 |
| fkie_cve-2026-1669 | Arbitrary file read in the model loading mechanism (HDF5 integration) in Keras versions 3.0.0 throu… | 2026-02-11T23:16:03.750 | 2026-02-26T23:23:59.430 |
| fkie_cve-2025-67135 | Weak Security in the PF-50 1.2 keyfob of PGST PG107 Alarm System 1.25.05.hf allows attackers to com… | 2026-02-11T23:16:03.353 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-64074 | A path-traversal vulnerability in the logout functionality of Shenzhen Zhibotong Electronics ZBT WE… | 2026-02-11T23:16:03.227 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-46310 | This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15… | 2026-02-11T23:16:03.120 | 2026-02-13T15:47:47.473 |
| fkie_cve-2025-46305 | The issue was addressed with improved bounds checks. This issue is fixed in iOS 18.7.5 and iPadOS 1… | 2026-02-11T23:16:03.030 | 2026-04-02T19:21:06.277 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-mh4x-qpf6-hr3q |
8.7 (4.0)
|
A type confusion vulnerability in Qt SVG allows an attacker to cause an application crash via a cra… | 2026-05-06T12:30:36Z | 2026-05-06T12:30:36Z |
| ghsa-fcq7-vvcv-2qg9 |
|
In the Linux kernel, the following vulnerability has been resolved: ceph: supply snapshot context … | 2026-05-06T12:30:36Z | 2026-05-06T12:30:36Z |
| ghsa-5g7g-fprm-cgpp |
|
In the Linux kernel, the following vulnerability has been resolved: RDMA/ionic: Fix potential NULL… | 2026-05-06T12:30:36Z | 2026-05-06T12:30:36Z |
| ghsa-2hw8-5267-5p9j |
|
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Add sanity ch… | 2026-05-06T12:30:36Z | 2026-05-06T12:30:36Z |
| ghsa-wqxw-h6xc-72x8 |
|
In the Linux kernel, the following vulnerability has been resolved: phy: fsl-imx8mq-usb: set platf… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-w929-9wq4-xrmp |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: libertas: fix WARNING in… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-w6jm-j85g-vpgj |
|
In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix RSS context delet… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-w4mh-vmr5-87jc |
|
In the Linux kernel, the following vulnerability has been resolved: mailbox: mchp-ipc-sbi: fix out… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-vwc3-h3w8-q85f |
|
In the Linux kernel, the following vulnerability has been resolved: dm: clear cloned request bio p… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:36Z |
| ghsa-rj9j-qfgp-687w |
|
In the Linux kernel, the following vulnerability has been resolved: alpha: fix user-space corrupti… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-r9ph-9m45-xj6w |
|
In the Linux kernel, the following vulnerability has been resolved: EFI/CPER: don't go past the AR… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-q2m9-5gr9-rjw9 |
|
In the Linux kernel, the following vulnerability has been resolved: arm64: Add support for TSV110 … | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-p7j5-r5cq-h6qj |
|
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Ignore -EBUSY when c… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-jphw-vq37-q7ww |
|
In the Linux kernel, the following vulnerability has been resolved: APEI/GHES: ensure that won't g… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:36Z |
| ghsa-jgp7-74rh-r6jv |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix potential zer… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-j6r6-35jf-jm62 |
|
In the Linux kernel, the following vulnerability has been resolved: media: cx88: Add missing unmap… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-hv6m-q2m2-vxvr |
|
In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix double destroy_… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:36Z |
| ghsa-h2mh-m9gx-72x5 |
|
In the Linux kernel, the following vulnerability has been resolved: gfs2: fiemap page fault fix I… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-fwqr-8mv5-j4p7 |
|
In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Fix possible dere… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-fgwc-jh8c-45pq |
|
In the Linux kernel, the following vulnerability has been resolved: media: mtk-mdp: Fix a referenc… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-f426-43f4-xjrc |
|
In the Linux kernel, the following vulnerability has been resolved: media: qcom: camss: vfe: Fix o… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-cmxm-m5w5-f84q |
|
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Add bounds check on pa… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:36Z |
| ghsa-c8jc-4xgp-98r9 |
|
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Flush excepti… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:36Z |
| ghsa-9wc3-g8j8-wv5q |
|
In the Linux kernel, the following vulnerability has been resolved: hfsplus: pretend special inode… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-9729-xjvh-4qp8 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/atmel-hlcdc: fix memory le… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-96q3-68gv-9r3h |
|
In the Linux kernel, the following vulnerability has been resolved: media: chips-media: wave5: Fix… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-78gq-46gf-2hpp |
|
In the Linux kernel, the following vulnerability has been resolved: mailbox: Prevent out-of-bounds… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:36Z |
| ghsa-72v5-9fv6-xvr9 |
|
In the Linux kernel, the following vulnerability has been resolved: fbdev: of: display_timing: fix… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ghsa-593c-jfqg-mjgp |
|
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ec_bhf: Fix dma… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:36Z |
| ghsa-3r8g-c43c-9gw2 |
|
In the Linux kernel, the following vulnerability has been resolved: md-cluster: fix NULL pointer d… | 2026-05-06T12:30:35Z | 2026-05-06T12:30:35Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-58 |
|
Werkzeug is a comprehensive WSGI web application library. Prior to version 2.2.3, Werkzeu… | werkzeug | 2023-02-14T20:15:00Z | 2023-05-04T03:49:48.987713Z |
| pysec-2023-57 |
|
Werkzeug is a comprehensive WSGI web application library. Browsers may allow "nameless" c… | werkzeug | 2023-02-14T20:15:00Z | 2023-05-04T03:49:48.931463Z |
| pysec-2023-17 |
|
IPython (Interactive Python) is a command shell for interactive computing in multiple pro… | ipython | 2023-02-10T20:15:00Z | 2023-05-04T03:49:45.922825Z |
| pysec-2023-32 |
|
Authentication Bypass by Primary Weakness in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-02-10T19:15:00Z | 2023-05-04T03:49:46.777940Z |
| pysec-2023-276 |
5.4 (3.1)
|
An XSS vulnerability was discovered in the Mayan EDMS DMS. Successful XSS exploitation wa… | mayan-edms | 2023-02-07T22:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2023-11 |
|
cryptography is a package designed to expose cryptographic primitives and recipes to Pyth… | cryptography | 2023-02-07T21:15:00Z | 2023-05-04T03:49:45.221186Z |
| pysec-2023-208 |
4.3 (3.1)
|
A vulnerability was found in paxswill EVE Ship Replacement Program 0.12.11. It has been r… | eve-srp | 2023-02-06T17:15:00+00:00 | 2023-10-20T16:31:18.806057+00:00 |
| pysec-2023-39 |
|
OpenZeppelin Contracts for Cairo is a library for secure smart contract development writt… | openzeppelin-cairo-contracts | 2023-02-03T20:15:00Z | 2023-05-04T03:49:47.155676Z |
| pysec-2023-12 |
|
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of… | django | 2023-02-01T19:15:00Z | 2023-05-04T03:49:45.437728Z |
| pysec-2023-51 |
|
ubireader_extract_files is vulnerable to path traversal when run against specifically cra… | ubi-reader | 2023-01-31T10:15:00Z | 2023-05-04T03:49:48.432460Z |
| pysec-2023-5 |
|
Incorrect Authorization vulnerability in Apache Software Foundation Apache IoTDB.This iss… | apache-iotdb | 2023-01-31T10:15:00Z | 2023-05-04T03:49:44.792097Z |
| pysec-2023-6 |
|
Improper Authentication vulnerability in Apache Software Foundation Apache IoTDB.This iss… | apache-iotdb | 2023-01-30T17:15:00Z | 2023-05-04T03:49:44.840128Z |
| pysec-2023-298 |
5.3 (3.1)
|
isInList in the safeurl-python package before 1.2 for Python has an insufficiently restri… | safeurl-python | 2023-01-30T05:15:00Z | 2024-11-25T22:26:07.130924Z |
| pysec-2023-43 |
|
A vulnerability has been found in NYUCCL psiTurk up to 3.2.0 and classified as critical. … | psiturk | 2023-01-28T23:15:00Z | 2023-05-04T03:49:47.366068Z |
| pysec-2023-31 |
|
Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-26T23:15:00Z | 2023-05-04T03:49:46.722786Z |
| pysec-2023-30 |
|
Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-26T22:15:00Z | 2023-05-04T03:49:46.669829Z |
| pysec-2023-21 |
|
LTI Consumer XBlock implements the consumer side of the LTI specification enabling integr… | lti-consumer-xblock | 2023-01-26T21:18:00Z | 2023-05-04T03:49:46.153608Z |
| pysec-2023-38 |
|
Versions of the package onnx before 1.13.0 are vulnerable to Directory Traversal as the e… | onnx | 2023-01-26T21:15:00Z | 2023-05-04T03:49:47.105559Z |
| pysec-2023-1 |
|
Adyen has utility methods for validating notification HMAC signatures. The is_valid_hmac … | adyen | 2023-01-24T00:00:00Z | 2023-01-24T00:00:00Z |
| pysec-2023-284 |
6.5 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-23T14:15:00+00:00 | 2024-11-21T14:22:55.160710+00:00 |
| pysec-2023-290 |
8.8 (3.1)
|
An issue was discovered with assimp 5.1.4, a use after free occurred in function ColladaP… | pyassimp | 2023-01-20T19:15:00Z | 2024-11-21T14:22:59.461917Z |
| pysec-2023-283 |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-19T18:15:00+00:00 | 2024-11-21T14:22:55.105976+00:00 |
| pysec-2023-282 |
6.5 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-19T09:15:00+00:00 | 2024-11-21T14:22:55.051300+00:00 |
| pysec-2023-25 |
|
mechanize, a library for automatically interacting with HTTP web servers, contains a regu… | mechanize | 2023-01-17T22:15:00Z | 2023-05-04T03:49:46.357040Z |
| pysec-2023-14 |
|
** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classifie… | django-ucamlookup | 2023-01-05T09:15:00Z | 2023-05-04T03:49:45.271028Z |
| pysec-2023-19 |
|
A vulnerability, which was classified as problematic, was found in kakwa LdapCherry up to… | ldapcherry | 2023-01-05T08:15:00Z | 2023-05-04T03:49:46.049521Z |
| pysec-2023-4 |
|
Improper validation of script alert plugin parameters in Apache DolphinScheduler to avoid… | apache-dolphinscheduler | 2023-01-04T15:15:00Z | 2023-05-04T03:49:44.740629Z |
| pysec-2022-43010 |
|
Improper Access Control in GitHub repository ikus060/rdiffweb prior to 2.5.5. | rdiffweb | 2022-12-27T15:15:00Z | 2023-05-04T03:49:47.879238Z |
| pysec-2022-43009 |
|
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffwe… | rdiffweb | 2022-12-27T15:15:00Z | 2023-05-04T03:49:47.817934Z |
| pysec-2022-43008 |
|
Authentication Bypass by Primary Weakness in GitHub repository ikus060/rdiffweb prior to 2.5.5. | rdiffweb | 2022-12-27T15:15:00Z | 2023-05-04T03:49:47.756258Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2731 | Malicious code in buildkite-test-collector-cypress-example (npm) | 2026-04-16T09:47:24Z | 2026-04-23T20:50:49Z |
| mal-2026-2730 | Malicious code in browserstack-utils (npm) | 2026-04-16T09:47:17Z | 2026-04-23T20:50:49Z |
| mal-2026-2729 | Malicious code in apl-github-test (npm) | 2026-04-16T09:44:48Z | 2026-04-23T20:50:49Z |
| mal-2026-2728 | Malicious code in apl-announcements (npm) | 2026-04-16T09:44:46Z | 2026-04-23T20:50:49Z |
| mal-2026-2727 | Malicious code in agent-starter (npm) | 2026-04-16T09:43:16Z | 2026-04-23T20:50:49Z |
| mal-2026-2726 | Malicious code in agent-scheduler (npm) | 2026-04-16T09:43:13Z | 2026-04-23T20:50:49Z |
| mal-2026-2725 | Malicious code in agent-framework-web (npm) | 2026-04-16T09:43:12Z | 2026-04-23T20:50:49Z |
| mal-2026-2724 | Malicious code in agdebugger-frontend (npm) | 2026-04-16T09:43:10Z | 2026-04-23T20:50:49Z |
| mal-2026-2723 | Malicious code in actions-label-commenter (npm) | 2026-04-16T09:42:56Z | 2026-04-23T20:50:49Z |
| mal-2026-2722 | Malicious code in action-setup-enos (npm) | 2026-04-16T09:42:55Z | 2026-04-23T20:50:49Z |
| mal-2026-2721 | Malicious code in access-worker-test (npm) | 2026-04-16T09:42:49Z | 2026-04-23T20:50:49Z |
| mal-2026-2720 | Malicious code in aca-review-apps (npm) | 2026-04-16T09:42:47Z | 2026-04-23T20:50:49Z |
| mal-2026-2719 | Malicious code in @youcanneverguessthisonereally/test-pkg (npm) | 2026-04-16T09:42:05Z | 2026-04-23T20:50:49Z |
| mal-2026-2718 | Malicious code in @the-coca-cola-company/receipt-scanner-admin-lib (npm) | 2026-04-16T09:39:26Z | 2026-04-23T20:50:49Z |
| mal-2026-2717 | Malicious code in @tax-taxdev/tools-scripts (npm) | 2026-04-16T09:39:16Z | 2026-04-23T20:50:49Z |
| mal-2026-2715 | Malicious code in @mesh-atoms/typography (npm) | 2026-04-16T09:35:32Z | 2026-04-23T20:50:49Z |
| mal-2026-2714 | Malicious code in @gameforge/http-server (npm) | 2026-04-16T09:34:11Z | 2026-04-23T20:50:49Z |
| mal-2026-2713 | Malicious code in @fuego-tools/analytics (npm) | 2026-04-16T09:34:04Z | 2026-04-23T20:50:49Z |
| mal-2026-2712 | Malicious code in @evoja-web/redaction (npm) | 2026-04-16T09:33:49Z | 2026-04-23T20:50:49Z |
| mal-2026-2711 | Malicious code in @evoja-web/react-login (npm) | 2026-04-16T09:33:48Z | 2026-04-23T20:50:49Z |
| mal-2026-2710 | Malicious code in @evoja-web/create-react-project (npm) | 2026-04-16T09:33:46Z | 2026-04-23T20:50:49Z |
| mal-2026-2709 | Malicious code in @appleseed-apple/ac-sass-kit (npm) | 2026-04-16T09:29:32Z | 2026-04-23T20:50:49Z |
| mal-2026-2708 | Malicious code in @3stripes/toolkit (npm) | 2026-04-16T09:28:30Z | 2026-04-23T20:50:49Z |
| mal-2026-2707 | Malicious code in @3stripes/shared (npm) | 2026-04-16T09:28:29Z | 2026-04-23T20:50:49Z |
| mal-2026-2706 | Malicious code in @3stripes/sdk (npm) | 2026-04-16T09:28:28Z | 2026-04-23T20:50:49Z |
| mal-2026-2705 | Malicious code in @3stripes/core (npm) | 2026-04-16T09:28:27Z | 2026-04-23T20:50:49Z |
| mal-2026-2704 | Malicious code in @3stripes/config (npm) | 2026-04-16T09:28:27Z | 2026-04-23T20:50:49Z |
| mal-2026-2703 | Malicious code in @3stripes/components (npm) | 2026-04-16T09:28:26Z | 2026-04-23T20:50:49Z |
| mal-2026-2699 | Malicious code in robase-api (PyPI) | 2026-04-16T07:06:16Z | 2026-05-03T20:49:49Z |
| mal-2026-2907 | Malicious code in nj-logger (npm) | 2026-04-16T02:50:55Z | 2026-04-23T20:50:51Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2119 | Cisco Industrial Ethernet Switches: Schwachstelle ermöglicht Denial of Service | 2025-09-24T22:00:00.000+00:00 | 2025-09-24T22:00:00.000+00:00 |
| wid-sec-w-2025-2117 | Google Chrome / Microsoft Edge: Mehrere Schwachstellen | 2025-09-23T22:00:00.000+00:00 | 2025-09-29T22:00:00.000+00:00 |
| wid-sec-w-2025-2115 | WordPress Core: Mehrere Schwachstellen | 2025-09-23T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2114 | Dell PowerEdge BIOS und iDRAC9: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-09-23T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2112 | DNSdist: Schwachstelle ermöglicht Denial of Service | 2025-09-23T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2111 | Proxmox Virtual Environment: Schwachstelle ermöglicht unbekannte Auswirkungen | 2025-09-22T22:00:00.000+00:00 | 2025-09-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2110 | LibTiff: Schwachstelle ermöglicht Codeausführung | 2025-09-22T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2109 | Autodesk Produkte: Schwachstelle ermöglicht Codeausführung | 2025-09-22T22:00:00.000+00:00 | 2025-11-09T23:00:00.000+00:00 |
| wid-sec-w-2025-2107 | Linux Kernel: Mehrere Schwachstellen | 2025-09-22T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2104 | WebKitGTK: Mehrere Schwachstellen | 2025-09-22T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2101 | Ghostscript: Schwachstellen ermöglichen Codeausführung | 2025-09-21T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2099 | Linux Kernel: Mehrere Schwachstellen | 2025-09-21T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2098 | IBM SPSS: Mehrere Schwachstellen | 2025-09-21T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2092 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-18T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2089 | Tor: Schwachstelle ermöglicht Denial of Service | 2025-09-18T22:00:00.000+00:00 | 2025-09-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2087 | Linux Kernel: Mehrere Schwachstellen | 2025-09-17T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2086 | Jenkins: Mehrere Schwachstellen | 2025-09-17T22:00:00.000+00:00 | 2025-09-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2085 | Red Hat OpenShift Service Mesh: Mehrere Schwachstellen | 2025-09-17T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2083 | Ruby: Schwachstelle ermöglicht Denial of Service | 2025-09-17T22:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2079 | JetBrains TeamCity: Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-2078 | Red Hat Enterprise Linux (Developer Hub): Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2077 | Linux Kernel: Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2076 | Liferay Portal: Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-2075 | Podman: Schwachstelle ermöglicht Manipulation von Dateien | 2025-09-16T22:00:00.000+00:00 | 2025-10-01T22:00:00.000+00:00 |
| wid-sec-w-2025-2074 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2025-09-29T22:00:00.000+00:00 |
| wid-sec-w-2025-2073 | ESRI ArcGIS: Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2025-09-29T22:00:00.000+00:00 |
| wid-sec-w-2025-2071 | WatchGuard Firebox: Schwachstelle ermöglicht Codeausführung | 2025-09-16T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-2068 | Aruba EdgeConnect: Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-2060 | VMware Tanzu Spring Framework und Spring Security: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-09-15T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2058 | Apple Safari: Mehrere Schwachstellen | 2025-09-15T22:00:00.000+00:00 | 2025-11-03T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsma-25-051-01 | Medixant RadiAnt DICOM Viewer | 2025-02-20T07:00:00.000000Z | 2025-02-20T07:00:00.000000Z |
| icsa-25-051-05 | Rapid Response Monitoring My Security Account App | 2025-02-20T07:00:00.000000Z | 2025-02-20T07:00:00.000000Z |
| icsa-25-051-03 | Carrier Block Load | 2025-02-20T07:00:00.000000Z | 2025-02-20T07:00:00.000000Z |
| icsa-25-051-06 | Elseta Vinci Protocol Analyzer | 2025-02-18T07:00:00.000000Z | 2025-02-18T07:00:00.000000Z |
| icsa-25-051-04 | Siemens SiPass Integrated | 2025-02-17T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsma-25-044-01 | Qardio Heart Health IOS and Android Application and QardioARM A100 | 2025-02-13T07:00:00.000000Z | 2025-02-13T07:00:00.000000Z |
| icsa-25-044-18 | Dingtian DT-R0 Series | 2025-02-13T07:00:00.000000Z | 2025-02-13T07:00:00.000000Z |
| icsa-25-044-17 | Outback Power Mojave Inverter | 2025-02-13T07:00:00.000000Z | 2025-02-13T07:00:00.000000Z |
| icsa-25-044-16 | mySCADA myPRO Manager | 2025-02-13T07:00:00.000000Z | 2025-02-13T07:00:00.000000Z |
| icsa-25-044-15 | ORing IAP-420 | 2025-02-13T07:00:00.000000Z | 2025-02-13T07:00:00.000000Z |
| va-25-043-01 | Ivanti Connect Secure and Ivanti Policy Secure external file control vulnerability | 2025-02-12T19:44:47Z | 2025-02-20T00:00:00Z |
| icsa-25-079-02 | Schneider Electric Enerlin’X IFE and eIFE | 2025-02-11T06:00:00.000000Z | 2025-02-11T06:00:00.000000Z |
| icsa-25-079-01 | Schneider Electric EcoStruxureâ„¢ | 2025-02-11T06:00:00.000000Z | 2025-02-11T06:00:00.000000Z |
| icsa-25-077-05 | Schneider Electric ASCO 5310/5350 Remote Annunciator | 2025-02-11T06:00:00.000000Z | 2025-02-11T06:00:00.000000Z |
| icsa-25-070-01 | Schneider Electric Uni-Telway Driver (Update C) | 2025-02-11T05:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-25-044-14 | Siemens Opcenter Intelligence | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-044-13 | Siemens SIMATIC PCS neo, TIA Administrator, and TIA Portal | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-044-12 | Siemens SIMATIC IPC DiagBase and SIMATIC IPC DiagMonitor | 2025-02-11T00:00:00.000000Z | 2025-04-08T00:00:00.000000Z |
| icsa-25-044-11 | Siemens Apogee PXC100 Devices | 2025-02-11T00:00:00.000000Z | 2025-02-11T00:00:00.000000Z |
| icsa-25-044-10 | Siemens Questa and ModelSim | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-044-09 | Siemens SCALANCE W700 IEEE 802.11ax | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-044-08 | Siemens OpenV2G | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-044-07 | Siemens Teamcenter | 2025-02-11T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-25-044-06 | Siemens RUGGEDCOM APE1808 | 2025-02-11T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-044-05 | Siemens SIPROTEC 5 Devices | 2025-02-11T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-044-04 | Siemens SIPROTEC 5 | 2025-02-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-044-03 | Siemens SIPROTEC 5 | 2025-02-11T00:00:00.000000Z | 2025-02-11T00:00:00.000000Z |
| icsa-25-044-02 | Siemens SIMATIC | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-044-01 | Siemens SIMATIC S7-1200 CPU Family | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsma-25-037-02 | Orthanc Server | 2025-02-06T07:00:00.000000Z | 2025-02-06T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ind-caelfk6v | Cisco Industrial Network Director Vulnerabilities | 2023-04-19T16:00:00+00:00 | 2023-04-19T16:00:00+00:00 |
| cisco-sa-cml-auth-bypass-4fucceg5 | Cisco Modeling Labs External Authentication Bypass Vulnerability | 2023-04-19T16:00:00+00:00 | 2023-04-19T16:00:00+00:00 |
| cisco-sa-bw-tcp-dos-kedjcxls | Cisco BroadWorks Network Server TCP Denial of Service Vulnerability | 2023-04-19T16:00:00+00:00 | 2023-04-19T16:00:00+00:00 |
| cisco-sa-wbx-sxss-fupl-64uhbcm5 | Cisco Webex Meetings Web UI Vulnerabilities | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-uccx-xss-go9l9xxr | Cisco Unified Contact Center Express Stored Cross-Site Scripting Vulnerability | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-stealthsmc-rce-sfnbpjcs | Cisco Secure Network Analytics Remote Code Execution Vulnerability | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-stealth-rce-bdwxfk9c | Cisco Secure Network Analytics Remote Code Execution Vulnerability | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-sb-rv32x-cmdinject-ckqszpxl | Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers Command Injection Vulnerabilities | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-sb-rv01x_rv32x_rce-nzagwwdd | Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers Remote Command Execution Vulnerability | 2023-04-05T16:00:00+00:00 | 2023-04-05T20:30:30+00:00 |
| cisco-sa-rv-stored-xss-vqz7gc8w | Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-pi-epnm-erpwaxle | Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Vulnerabilities | 2023-04-05T16:00:00+00:00 | 2023-05-15T13:11:25+00:00 |
| cisco-sa-meraki-lsp-7xysn6pj | Cisco Meraki Local Status Page Configuration Hardening | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-ise-injection-2xbog9dg | Cisco Identity Services Engine Command Injection Vulnerabilities | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-duo-replay-knunkd | Cisco Duo Authentication for macOS and Duo Authentication for Windows Logon Offline Credentials Replay Vulnerability | 2023-04-05T16:00:00+00:00 | 2023-06-23T16:48:56+00:00 |
| cisco-sa-cisco-pdng-dos-kmzwey2q | Cisco Packet Data Network Gateway IPsec ICMP Denial of Service Vulnerability | 2023-04-05T16:00:00+00:00 | 2023-04-19T20:31:01+00:00 |
| cisco-sa-adeos-mlayecvk | Cisco Evolved Programmable Network Manager, Cisco Identity Services Engine, and Cisco Prime Infrastructure Command Injection Vulnerabilities | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-wifi-ffeb-22epcewu | Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues Affecting Multiple Cisco Products | 2023-03-27T05:00:00+00:00 | 2023-03-27T05:00:00+00:00 |
| cisco-sa-webui-pthtrv-es7gsb9v | Cisco IOS XE Software Web UI Path Traversal Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-vman-csrf-76rdbleh | Cisco SD-WAN vManage Software Cluster Mode Cross-Site Request Forgery Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-27T21:11:52+00:00 |
| cisco-sa-ipv4-vfr-dos-cxxtfacb | Cisco IOS XE Software Virtual Fragmentation Reassembly Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-23T21:42:01+00:00 |
| cisco-sa-iox-priv-escalate-xg8zkypk | Cisco IOS XE Software IOx Application Hosting Environment Privilege Escalation Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-05-08T15:01:45+00:00 |
| cisco-sa-iosxe-priv-esc-sabd8hcu | Cisco IOS XE Software Privilege Escalation Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-24T19:59:49+00:00 |
| cisco-sa-ios-xe-sdwan-vqahejyw | Cisco IOS XE SD-WAN Software Command Injection Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ios-gre-crash-p6ne5sq5 | Cisco IOS XE Software Fragmented Tunnel Protocol Packet Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ios-dhcpv6-dos-44cmvddk | Cisco IOS and IOS XE Software IPv6 DHCP (DHCPv6) Relay and Server Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ewlc-dos-wfujbhkw | Cisco IOS XE Software for Wireless LAN Controllers HTTP Client Profiling Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-dnac-privesc-qfxe74rs | Cisco DNA Center Privilege Escalation Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-dnac-infodisc-pe7zabdr | Cisco DNA Center Information Disclosure Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-c9800-apjoin-dos-nxrhkt5 | Cisco IOS XE Software for Wireless LAN Controllers CAPWAP Join Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-c9300-spi-ace-yejygnnq | Cisco IOS XE Software for Cisco Catalyst 9300 Series Switches Secure Boot Bypass Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-05-11T15:34:52+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-31557 | nvmet: move async event work off nvmet-wq | 2026-04-02T00:00:00.000Z | 2026-05-06T14:39:09.000Z |
| msrc_cve-2026-31555 | futex: Clear stale exiting pointer in futex_lock_pi() retry path | 2026-04-02T00:00:00.000Z | 2026-04-29T14:51:52.000Z |
| msrc_cve-2026-31552 | wifi: wlcore: Return -ENOMEM instead of -EAGAIN if there is not enough headroom | 2026-04-02T00:00:00.000Z | 2026-04-29T01:02:32.000Z |
| msrc_cve-2026-31551 | wifi: mac80211: Fix static_branch_dec() underflow for aql_disable. | 2026-04-02T00:00:00.000Z | 2026-04-29T01:02:26.000Z |
| msrc_cve-2026-31550 | pmdomain: bcm: bcm2835-power: Increase ASB control timeout | 2026-04-02T00:00:00.000Z | 2026-04-29T01:02:20.000Z |
| msrc_cve-2026-31549 | i2c: cp2615: fix serial string NULL-deref at probe | 2026-04-02T00:00:00.000Z | 2026-04-29T01:02:15.000Z |
| msrc_cve-2026-31548 | wifi: cfg80211: cancel pmsr_free_wk in cfg80211_pmsr_wdev_down | 2026-04-02T00:00:00.000Z | 2026-04-29T01:02:09.000Z |
| msrc_cve-2026-31546 | net: bonding: fix NULL deref in bond_debug_rlb_hash_show | 2026-04-02T00:00:00.000Z | 2026-04-30T01:10:18.000Z |
| msrc_cve-2026-31545 | NFC: nxp-nci: allow GPIOs to sleep | 2026-04-02T00:00:00.000Z | 2026-04-30T01:10:09.000Z |
| msrc_cve-2026-31540 | drm/i915/gt: Check set_default_submission() before deferencing | 2026-04-02T00:00:00.000Z | 2026-04-30T01:10:00.000Z |
| msrc_cve-2026-31537 | smb: server: make use of smbdirect_socket.send_io.bcredits | 2026-04-02T00:00:00.000Z | 2026-04-30T01:38:55.000Z |
| msrc_cve-2026-31536 | smb: server: let send_done handle a completion without IB_SEND_SIGNALED | 2026-04-02T00:00:00.000Z | 2026-05-06T14:39:25.000Z |
| msrc_cve-2026-31533 | net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption | 2026-04-02T00:00:00.000Z | 2026-05-01T14:46:51.000Z |
| msrc_cve-2026-31532 | can: raw: fix ro->uniq use-after-free in raw_rcv() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:38:59.000Z |
| msrc_cve-2026-31531 | ipv4: nexthop: allocate skb dynamically in rtm_get_nexthop() | 2026-04-02T00:00:00.000Z | 2026-05-06T14:38:39.000Z |
| msrc_cve-2026-31530 | cxl/port: Fix use after free of parent_port in cxl_detach_ep() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:47:15.000Z |
| msrc_cve-2026-31528 | perf: Make sure to use pmu_ctx->pmu for groups | 2026-04-02T00:00:00.000Z | 2026-04-29T14:45:59.000Z |
| msrc_cve-2026-31527 | driver core: platform: use generic driver_override infrastructure | 2026-04-02T00:00:00.000Z | 2026-04-30T01:43:00.000Z |
| msrc_cve-2026-31525 | bpf: Fix undefined behavior in interpreter sdiv/smod for INT_MIN | 2026-04-02T00:00:00.000Z | 2026-04-29T14:47:28.000Z |
| msrc_cve-2026-31524 | HID: asus: avoid memory leak in asus_report_fixup() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:04:37.000Z |
| msrc_cve-2026-31523 | nvme-pci: ensure we're polling a polled queue | 2026-04-02T00:00:00.000Z | 2026-04-30T01:07:37.000Z |
| msrc_cve-2026-31522 | HID: magicmouse: avoid memory leak in magicmouse_report_fixup() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:11:54.000Z |
| msrc_cve-2026-31521 | module: Fix kernel panic when a symbol st_shndx is out of bounds | 2026-04-02T00:00:00.000Z | 2026-04-30T01:13:42.000Z |
| msrc_cve-2026-31520 | HID: apple: avoid memory leak in apple_report_fixup() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:40:47.000Z |
| msrc_cve-2026-31519 | btrfs: set BTRFS_ROOT_ORPHAN_CLEANUP during subvol create | 2026-04-02T00:00:00.000Z | 2026-04-30T01:10:13.000Z |
| msrc_cve-2026-31518 | esp: fix skb leak with espintcp and async crypto | 2026-04-02T00:00:00.000Z | 2026-04-30T01:09:33.000Z |
| msrc_cve-2026-31516 | xfrm: prevent policy_hthresh.work from racing with netns teardown | 2026-04-02T00:00:00.000Z | 2026-05-06T14:52:42.000Z |
| msrc_cve-2026-31515 | af_key: validate families in pfkey_send_migrate() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:05:39.000Z |
| msrc_cve-2026-31512 | Bluetooth: L2CAP: Validate PDU length before reading SDU length in l2cap_ecred_data_rcv() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:48:21.000Z |
| msrc_cve-2026-31510 | Bluetooth: L2CAP: Fix null-ptr-deref on l2cap_sock_ready_cb | 2026-04-02T00:00:00.000Z | 2026-04-30T01:08:58.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0440 | Kwetsbaarheden verholpen in Citrix Session Recording | 2024-11-13T08:51:17.257998Z | 2024-11-13T08:51:17.257998Z |
| ncsc-2024-0439 | Kwetsbaarheden verholpen in Microsoft Office | 2024-11-12T18:57:09.604321Z | 2024-11-12T18:57:09.604321Z |
| ncsc-2024-0438 | Kwetsbaarheid verholpen in Microsoft Exchange Server | 2024-11-12T18:56:25.729148Z | 2024-11-12T18:56:25.729148Z |
| ncsc-2024-0437 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2024-11-12T18:55:39.363057Z | 2024-11-12T18:55:39.363057Z |
| ncsc-2024-0436 | Kwetsbaarheden verholpen in Microsoft Azure | 2024-11-12T18:54:41.456199Z | 2024-11-12T18:54:41.456199Z |
| ncsc-2024-0435 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2024-11-12T18:54:00.107773Z | 2024-11-12T18:54:00.107773Z |
| ncsc-2024-0434 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-11-12T18:53:07.914094Z | 2024-11-12T18:53:07.914094Z |
| ncsc-2024-0433 | Kwetsbaarheden verholpen in Siemens producten | 2024-11-12T14:19:20.051128Z | 2024-11-12T14:19:20.051128Z |
| ncsc-2024-0432 | Kwetsbaarheden verholpen in Cisco Identity Services Engine | 2024-11-07T08:55:49.899244Z | 2024-11-07T08:55:49.899244Z |
| ncsc-2024-0431 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS | 2024-11-07T08:51:16.689034Z | 2024-11-07T08:51:16.689034Z |
| ncsc-2024-0430 | Kwetsbaarheid verholpen in Cisco Catalyst Access points | 2024-11-07T08:47:41.650502Z | 2024-11-07T08:47:41.650502Z |
| ncsc-2024-0429 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-11-05T14:09:27.373651Z | 2024-11-05T14:09:27.373651Z |
| ncsc-2024-0428 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2024-10-30T11:39:26.910666Z | 2024-10-30T11:39:26.910666Z |
| ncsc-2024-0427 | Kwetsbaarheden verholpen in Google Chrome | 2024-10-30T11:36:05.615865Z | 2024-10-30T11:36:05.615865Z |
| ncsc-2024-0426 | Kwetsbaarheden verholpen in Apple MacOS | 2024-10-30T11:26:13.535716Z | 2024-10-30T11:26:13.535716Z |
| ncsc-2024-0425 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2024-10-30T10:53:07.348476Z | 2024-10-30T10:53:07.348476Z |
| ncsc-2024-0424 | Kwetsbaarheden verholpen in Cisco Adaptive Security Appliance en Firepower Threat Defense | 2024-10-24T08:37:15.013231Z | 2024-10-24T08:37:15.013231Z |
| ncsc-2024-0423 | Kwetsbaarheid ontdekt in Fortinet FortiManager | 2024-10-23T16:51:38.477778Z | 2024-11-15T10:52:37.440334Z |
| ncsc-2024-0422 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2024-10-18T09:26:29.690794Z | 2024-10-18T09:26:29.690794Z |
| ncsc-2024-0421 | Kwetsbaarheden verholpen in SolarWinds Serv-U | 2024-10-18T09:10:48.856424Z | 2024-10-18T09:10:48.856424Z |
| ncsc-2024-0420 | Kwetsbaarheden verholpen in Oracle MySQL | 2024-10-17T13:20:42.437738Z | 2024-10-17T13:20:42.437738Z |
| ncsc-2024-0419 | Kwetsbaarheden verholpen in Oracle Java | 2024-10-17T13:20:07.759085Z | 2024-10-17T13:20:07.759085Z |
| ncsc-2024-0418 | Kwetsbaarheden verholpen in Oracle Analytics | 2024-10-17T13:19:50.583299Z | 2024-10-17T13:19:50.583299Z |
| ncsc-2024-0417 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2024-10-17T13:19:16.185510Z | 2024-10-17T13:19:16.185510Z |
| ncsc-2024-0416 | Kwetsbaarheden verholpen in Oracle Financial Services Applications | 2024-10-17T13:18:45.385015Z | 2024-10-17T13:18:45.385015Z |
| ncsc-2024-0415 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2024-10-17T13:18:06.611153Z | 2024-10-17T13:18:06.611153Z |
| ncsc-2024-0414 | Kwetsbaarheden verholpen in Oracle Communications | 2024-10-17T13:17:52.103171Z | 2024-10-17T13:17:52.103171Z |
| ncsc-2024-0413 | Kwetsbaarheden verholpen in Oracle Commerce | 2024-10-17T13:17:19.736602Z | 2024-10-17T13:17:19.736602Z |
| ncsc-2024-0412 | Kwetsbaarheden verholpen in Oracle Peoplesoft | 2024-10-17T13:16:18.175855Z | 2024-10-17T13:16:18.175855Z |
| ncsc-2024-0411 | Kwetsbaarheden verholpen in Oracle Database producten | 2024-10-17T13:15:19.595269Z | 2024-10-17T13:15:19.595269Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10205-1 | python311-cryptography-46.0.5-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10204-1 | openjfx-17.0.18.0-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10203-1 | libssh-config-0.11.4-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10202-1 | himmelblau-2.3.5+git0.9dd526c-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10201-1 | chromedriver-145.0.7632.45-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:20233-1 | Security update for openCryptoki | 2026-02-13T17:42:04Z | 2026-02-13T17:42:04Z |
| opensuse-su-2026:20227-1 | Security update for patch | 2026-02-13T16:41:43Z | 2026-02-13T16:41:43Z |
| opensuse-su-2026:20219-1 | Security update for htmldoc | 2026-02-13T16:07:48Z | 2026-02-13T16:07:48Z |
| opensuse-su-2026:20220-1 | Security update for go1.24 | 2026-02-13T11:53:30Z | 2026-02-13T11:53:30Z |
| opensuse-su-2026:20214-1 | Security update for go1.25 | 2026-02-13T10:08:14Z | 2026-02-13T10:08:14Z |
| opensuse-su-2026:20206-1 | Security update for kepler | 2026-02-13T08:53:10Z | 2026-02-13T08:53:10Z |
| opensuse-su-2026:10200-1 | python310-3.10.19-4.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10199-1 | python311-pymssql-2.3.12-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10198-1 | python311-Pillow-12.1.1-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10197-1 | libecpg6-18.2-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10196-1 | matrix-synapse-1.147.1-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10195-1 | gimp-3.0.8-2.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10194-1 | cargo-audit-advisory-db-20260213-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:20205-1 | Security update for rust1.93 | 2026-02-12T15:13:26Z | 2026-02-12T15:13:26Z |
| opensuse-su-2026:20204-1 | Security update for python-aiohttp, python-Brotli | 2026-02-12T14:01:04Z | 2026-02-12T14:01:04Z |
| opensuse-su-2026:10193-1 | postgresql17-17.8-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10192-1 | postgresql16-16.12-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10191-1 | postgresql15-15.16-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10190-1 | postgresql14-14.21-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10189-1 | libowncloudsync-devel-6.0.3-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10188-1 | libpng16-16-1.6.55-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10187-1 | haproxy-3.3.3+git0.465d8e2fc-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10186-1 | gnome-remote-desktop-49.2-2.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10185-1 | cargo-c-0.10.15-2.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10184-1 | cargo-auditable-0.7.2~0-2.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:8490 | Red Hat Security Advisory: Kiali 2.11.9 for Red Hat OpenShift Service Mesh 3.1 | 2026-04-16T14:03:40+00:00 | 2026-05-08T09:12:46+00:00 |
| rhsa-2026:8472 | Red Hat Security Advisory: .NET 9.0 security update | 2026-04-16T13:57:40+00:00 | 2026-05-05T14:44:22+00:00 |
| rhsa-2026:8470 | Red Hat Security Advisory: .NET 8.0 security update | 2026-04-16T13:56:50+00:00 | 2026-05-05T14:44:19+00:00 |
| rhsa-2026:8484 | Red Hat Security Advisory: Kiali 2.4.15 for Red Hat OpenShift Service Mesh 3.0 | 2026-04-16T13:49:55+00:00 | 2026-05-08T09:12:50+00:00 |
| rhsa-2026:8483 | Red Hat Security Advisory: Kiali 1.73.29 for Red Hat OpenShift Service Mesh 2.6 | 2026-04-16T13:44:17+00:00 | 2026-05-08T09:12:45+00:00 |
| rhsa-2026:8457 | Red Hat Security Advisory: freerdp security update | 2026-04-16T13:20:40+00:00 | 2026-04-30T21:34:33+00:00 |
| rhsa-2026:8466 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-16T13:14:38+00:00 | 2026-04-30T23:07:46+00:00 |
| rhsa-2026:8459 | Red Hat Security Advisory: thunderbird security update | 2026-04-16T12:56:50+00:00 | 2026-05-07T21:41:55+00:00 |
| rhsa-2026:8458 | Red Hat Security Advisory: freerdp security update | 2026-04-16T12:52:15+00:00 | 2026-04-30T21:34:34+00:00 |
| rhsa-2026:8456 | Red Hat Security Advisory: osbuild-composer security update | 2026-04-16T12:38:40+00:00 | 2026-05-07T21:41:55+00:00 |
| rhsa-2026:7243 | Red Hat Security Advisory: OpenShift Container Platform 4.19.28 bug fix and security update | 2026-04-16T10:59:20+00:00 | 2026-05-07T14:34:38+00:00 |
| rhsa-2026:8434 | Red Hat Security Advisory: rhc security update | 2026-04-16T10:51:10+00:00 | 2026-05-07T21:41:57+00:00 |
| rhsa-2026:8437 | Red Hat Security Advisory: RHTAS 1.4 - GA Release of Model Transparency | 2026-04-16T10:43:56+00:00 | 2026-05-07T21:42:15+00:00 |
| rhsa-2026:7238 | Red Hat Security Advisory: OpenShift Container Platform 4.13.65 packages and security update | 2026-04-16T10:34:19+00:00 | 2026-05-08T03:02:57+00:00 |
| rhsa-2026:7239 | Red Hat Security Advisory: OpenShift Container Platform 4.13.65 bug fix and security update | 2026-04-16T10:25:29+00:00 | 2026-05-07T14:34:39+00:00 |
| rhsa-2026:8427 | Red Hat Security Advisory: firefox security update | 2026-04-16T10:20:59+00:00 | 2026-04-28T18:40:32+00:00 |
| rhsa-2026:7249 | Red Hat Security Advisory: OpenShift Container Platform 4.19.28 bug fix and security update | 2026-04-16T10:18:08+00:00 | 2026-05-08T09:04:04+00:00 |
| rhsa-2026:8433 | Red Hat Security Advisory: OpenShift Compliance Operator bug fix and enhancement update | 2026-04-16T10:06:55+00:00 | 2026-05-08T09:12:44+00:00 |
| rhsa-2026:7252 | Red Hat Security Advisory: OpenShift Container Platform 4.13.65 bug fix and security update | 2026-04-16T10:06:20+00:00 | 2026-05-08T09:04:03+00:00 |
| rhsa-2026:7253 | Red Hat Security Advisory: OpenShift Container Platform 4.13.65 security and extras update | 2026-04-16T09:33:36+00:00 | 2026-05-08T03:03:01+00:00 |
| rhsa-2026:7250 | Red Hat Security Advisory: OpenShift Container Platform 4.19.28 security and extras update | 2026-04-16T08:33:47+00:00 | 2026-05-08T03:03:00+00:00 |
| rhsa-2026:8352 | Red Hat Security Advisory: bind security update | 2026-04-15T23:05:33+00:00 | 2026-04-28T18:40:33+00:00 |
| rhsa-2026:8346 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-15T21:09:22+00:00 | 2026-05-07T19:08:49+00:00 |
| rhsa-2026:8342 | Red Hat Security Advisory: kernel security update | 2026-04-15T20:24:58+00:00 | 2026-05-06T20:36:23+00:00 |
| rhsa-2026:7245 | Red Hat Security Advisory: OpenShift Container Platform 4.21.10 bug fix and security update | 2026-04-15T19:57:18+00:00 | 2026-05-08T09:12:43+00:00 |
| rhsa-2026:8339 | Red Hat Security Advisory: nodejs:20 security update | 2026-04-15T19:16:52+00:00 | 2026-05-07T21:44:26+00:00 |
| rhsa-2026:8338 | Red Hat Security Advisory: Red Hat Web Terminal Operator 1.13.0 release. | 2026-04-15T18:17:16+00:00 | 2026-05-08T09:12:43+00:00 |
| rhsa-2026:8337 | Red Hat Security Advisory: Red Hat Web Terminal Operator 1.14.0 release. | 2026-04-15T18:11:57+00:00 | 2026-05-08T09:04:07+00:00 |
| rhsa-2026:8334 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-15T17:31:38+00:00 | 2026-05-05T13:37:53+00:00 |
| rhsa-2026:8324 | Red Hat Security Advisory: rhc security update | 2026-04-15T15:40:22+00:00 | 2026-05-07T21:41:56+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-352143 | SSA-352143: Multiple File Parsing Vulnerabilities in JTTK before V11.0.3.0 and JT Utilities before V13.0.3.0 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-199605 | SSA-199605: Arbitrary File Download Vulnerability in SIMATIC eaSie PCS 7 Skill Package | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-161331 | SSA-161331: Scene File Parsing Vulnerability in Simcenter STAR-CCM+ Viewer before V2021.3.1 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-160202 | SSA-160202: Multiple Access Control Vulnerabilities in SiPass Integrated | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-133772 | SSA-133772: Zip Path Traversal Vulnerability in Teamcenter Active Workspace | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-917476 | SSA-917476: Multiple Vulnerabilities in SCALANCE W1750D | 2021-11-09T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-840188 | SSA-840188: Multiple Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products | 2021-11-09T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-779699 | SSA-779699: Two Incorrect Authorization Vulnerabilities in Mendix | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-755517 | SSA-755517: Path Traversal Vulnerability in Siveillance Video DLNA Server | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-740908 | SSA-740908: File Parsing Vulnerabilities in JT Translator in NX | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-703715 | SSA-703715: Information Disclosure Vulnerability in Climatix POL909 (AWM and AWB) | 2021-11-09T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-537983 | SSA-537983: Local Code Execution Vulnerability in SENTRON powermanager V3 | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-338732 | SSA-338732: Information Disclosure Vulnerability in Mendix | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-328042 | SSA-328042: File Parsing Vulnerabilities in OBJ Translator in NX | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-145157 | SSA-145157: Multiple Vulnerabilities in SIMATIC RTLS Locating Manager before V2.12 | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-114589 | SSA-114589: Multiple Vulnerabilities in Nucleus RTOS based APOGEE, TALON and Desigo PXC/PXM Products | 2021-11-09T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-044112 | SSA-044112: Multiple Vulnerabilities (NUCLEUS:13) in the TCP/IP Stack of Nucleus RTOS | 2021-11-09T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-766247 | SSA-766247: Authentication Vulnerability in SIMATIC Process Historian | 2021-10-12T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-280624 | SSA-280624: Multiple Vulnerabilities in SCALANCE W1750D | 2021-10-12T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-178380 | SSA-178380: Denial-of-Service Vulnerability in SINUMERIK Controllers | 2021-10-12T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-173565 | SSA-173565: Denial-of-Service Vulnerability in RUGGEDCOM ROX Devices | 2021-10-12T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-163251 | SSA-163251: Multiple Vulnerabilities in SINEC NMS | 2021-10-12T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-728618 | SSA-728618: Multiple Vulnerabilities in Solid Edge before SE2021MP8 | 2021-09-28T00:00:00Z | 2021-09-28T00:00:00Z |
| ssa-997732 | SSA-997732: Modfem File Parsing Vulnerability in Simcenter Femap before V2021.2 | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-987403 | SSA-987403: Multiple Vulnerabilities in Teamcenter | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-944498 | SSA-944498: Buffer Overflow Vulnerability in Web Server of APOGEE and TALON Automation Devices | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-847986 | SSA-847986: Denial-of-Service Vulnerabilities in SIPROTEC 5 relays | 2021-09-14T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-835377 | SSA-835377: Missing Authentication Vulnerability in SINEMA Server | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-756638 | SSA-756638: Vulnerabilities in Third-Party Component Mbed TLS of LOGO! CMR Family and SIMATIC RTU 3000 Family | 2021-09-14T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-692317 | SSA-692317: Authorization Bypass Vulnerability in Industrial Edge | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21096-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-04-11T07:42:41Z | 2026-04-11T07:42:41Z |
| suse-su-2026:1265-1 | Security update for the Linux Kernel (Live Patch 46 for SUSE Linux Enterprise 15 SP4) | 2026-04-11T04:34:33Z | 2026-04-11T04:34:33Z |
| suse-su-2026:1263-1 | Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T22:35:17Z | 2026-04-10T22:35:17Z |
| suse-su-2026:1262-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP7) | 2026-04-10T21:43:55Z | 2026-04-10T21:43:55Z |
| suse-su-2026:1261-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP7) | 2026-04-10T19:34:46Z | 2026-04-10T19:34:46Z |
| suse-su-2026:21173-1 | Security update for sqlite3 | 2026-04-10T18:50:16Z | 2026-04-10T18:50:16Z |
| suse-su-2026:21095-1 | Security update for sqlite3 | 2026-04-10T18:50:16Z | 2026-04-10T18:50:16Z |
| suse-su-2026:21172-1 | Security update for pcre2 | 2026-04-10T18:27:30Z | 2026-04-10T18:27:30Z |
| suse-su-2026:21094-1 | Security update for pcre2 | 2026-04-10T18:27:30Z | 2026-04-10T18:27:30Z |
| suse-su-2026:1259-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6) | 2026-04-10T17:35:15Z | 2026-04-10T17:35:15Z |
| suse-su-2026:1258-1 | Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T17:35:09Z | 2026-04-10T17:35:09Z |
| suse-su-2026:1257-1 | Security update for openssl-1_1 | 2026-04-10T15:06:36Z | 2026-04-10T15:06:36Z |
| suse-su-2026:1256-1 | Security update for openssl-1_0_0 | 2026-04-10T14:57:18Z | 2026-04-10T14:57:18Z |
| suse-su-2026:1255-1 | Security update for openssl-1_1 | 2026-04-10T14:56:12Z | 2026-04-10T14:56:12Z |
| suse-su-2026:1254-1 | Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T14:04:42Z | 2026-04-10T14:04:42Z |
| suse-su-2026:21121-1 | Security update for NetworkManager | 2026-04-10T12:48:36Z | 2026-04-10T12:48:36Z |
| suse-su-2026:21113-1 | Security update for NetworkManager | 2026-04-10T12:30:19Z | 2026-04-10T12:30:19Z |
| suse-su-2026:21167-1 | Security update for cockpit-podman | 2026-04-10T11:54:16Z | 2026-04-10T11:54:16Z |
| suse-su-2026:21023-1 | Security update for cockpit-podman | 2026-04-10T11:54:16Z | 2026-04-10T11:54:16Z |
| suse-su-2026:21168-1 | Security update for cockpit-machines | 2026-04-10T11:53:13Z | 2026-04-10T11:53:13Z |
| suse-su-2026:21024-1 | Security update for cockpit-machines | 2026-04-10T11:53:13Z | 2026-04-10T11:53:13Z |
| suse-su-2026:21166-1 | Security update for cockpit | 2026-04-10T11:42:11Z | 2026-04-10T11:42:11Z |
| suse-su-2026:21022-1 | Security update for cockpit | 2026-04-10T11:42:11Z | 2026-04-10T11:42:11Z |
| suse-su-2026:1252-1 | Security update for tigervnc | 2026-04-10T11:36:58Z | 2026-04-10T11:36:58Z |
| suse-su-2026:1251-1 | Security update for cockpit-podman | 2026-04-10T11:36:50Z | 2026-04-10T11:36:50Z |
| suse-su-2026:1250-1 | Security update for cockpit-tukit | 2026-04-10T11:36:40Z | 2026-04-10T11:36:40Z |
| suse-su-2026:1249-1 | Security update for cockpit-machines | 2026-04-10T11:36:32Z | 2026-04-10T11:36:32Z |
| suse-su-2026:21165-1 | Security update for python-cryptography | 2026-04-10T11:26:32Z | 2026-04-10T11:26:32Z |
| suse-su-2026:21021-1 | Security update for python-cryptography | 2026-04-10T11:26:32Z | 2026-04-10T11:26:32Z |
| suse-su-2026:21285-1 | Security update for corosync | 2026-04-10T11:20:26Z | 2026-04-10T11:20:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:22395 | Moderate: kernel security update | 2025-12-01T00:00:00Z | 2025-12-15T12:44:56Z |
| alsa-2025:22394 | Moderate: qt6-qtsvg security update | 2025-12-01T00:00:00Z | 2025-12-05T07:42:49Z |
| alsa-2025:22388 | Moderate: kernel security update | 2025-12-01T00:00:00Z | 2025-12-03T11:59:02Z |
| alsa-2025:22387 | Moderate: kernel-rt security update | 2025-12-01T00:00:00Z | 2025-12-03T12:01:56Z |
| alsa-2025:22376 | Moderate: libxml2 security update | 2025-12-01T00:00:00Z | 2025-12-03T12:03:31Z |
| alsa-2025:22363 | Important: firefox security update | 2025-12-01T00:00:00Z | 2025-12-03T12:05:25Z |
| alsa-2025:22361 | Moderate: qt6-qtquick3d security update | 2025-12-01T00:00:00Z | 2025-12-05T07:43:58Z |
| alsa-2025:22175 | Important: expat security update | 2025-11-26T00:00:00Z | 2025-12-03T12:07:34Z |
| alsa-2025:22063 | Moderate: cups security update | 2025-11-25T00:00:00Z | 2025-11-28T13:48:35Z |
| alsa-2025:22012 | Important: buildah security update | 2025-11-25T00:00:00Z | 2025-12-05T07:44:58Z |
| alsa-2025:22011 | Important: buildah security update | 2025-11-25T00:00:00Z | 2025-11-25T12:06:57Z |
| alsa-2025:22005 | Moderate: go-rpm-macros security update | 2025-11-25T00:00:00Z | 2025-11-25T10:51:18Z |
| alsa-2025:21977 | Moderate: libssh security update | 2025-11-24T00:00:00Z | 2025-11-25T12:04:18Z |
| alsa-2025:21974 | Important: mingw-expat security update | 2025-11-24T00:00:00Z | 2025-12-01T07:55:50Z |
| alsa-2025:21968 | Important: gimp security update | 2025-11-24T00:00:00Z | 2025-12-01T07:58:09Z |
| alsa-2025:21936 | Important: valkey security update | 2025-11-24T00:00:00Z | 2025-12-05T08:20:47Z |
| alsa-2025:21931 | Moderate: kernel security update | 2025-11-24T00:00:00Z | 2025-12-05T08:40:44Z |
| alsa-2025:21926 | Moderate: kernel security update | 2025-11-24T00:00:00Z | 2025-12-01T08:01:07Z |
| alsa-2025:21920 | Moderate: kernel-rt security update | 2025-11-24T00:00:00Z | 2025-11-25T09:25:12Z |
| alsa-2025:21917 | Moderate: kernel security update | 2025-11-24T00:00:00Z | 2025-11-25T09:27:51Z |
| alsa-2025:21916 | Important: valkey security update | 2025-11-24T00:00:00Z | 2025-12-01T08:02:48Z |
| alsa-2025:21881 | Important: thunderbird security update | 2025-11-20T00:00:00Z | 2025-11-25T09:29:54Z |
| alsa-2025:21843 | Important: thunderbird security update | 2025-11-20T00:00:00Z | 2025-11-24T10:41:50Z |
| alsa-2025:21816 | Moderate: delve and golang security update | 2025-11-20T00:00:00Z | 2025-11-24T12:49:17Z |
| alsa-2025:21815 | Moderate: delve and golang security update | 2025-11-20T00:00:00Z | 2025-11-20T10:59:53Z |
| alsa-2025:21776 | Important: expat security update | 2025-11-19T00:00:00Z | 2025-11-20T09:03:52Z |
| alsa-2025:21702 | Important: podman security update | 2025-11-18T00:00:00Z | 2025-11-19T10:51:29Z |
| alsa-2025:21693 | Important: haproxy security update | 2025-11-18T00:00:00Z | 2025-11-19T10:52:41Z |
| alsa-2025:21691 | Important: haproxy security update | 2025-11-18T00:00:00Z | 2025-11-24T12:50:19Z |
| alsa-2025:21628 | Critical: lasso security update | 2025-11-17T00:00:00Z | 2025-11-19T10:11:06Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-223 | UNKNOWN READ in H5HG_read | 2024-04-01T00:01:29.989664Z | 2026-01-13T04:44:02.988515Z |
| osv-2024-221 | Heap-buffer-overflow in libspdm_copy_mem | 2024-03-31T00:05:20.376065Z | 2024-04-06T14:38:17.060185Z |
| osv-2024-217 | Heap-use-after-free in dropNode | 2024-03-30T00:03:20.549054Z | 2024-03-30T00:03:20.549358Z |
| osv-2024-207 | Heap-buffer-overflow in emit_goto | 2024-03-27T00:05:42.651468Z | 2024-03-27T00:05:42.651810Z |
| osv-2024-204 | Heap-use-after-free in JS_NewObjectFromShape | 2024-03-27T00:00:05.756758Z | 2024-03-27T00:00:05.757264Z |
| osv-2024-198 | Heap-use-after-free in xmlCopyPropInternal | 2024-03-25T00:05:53.628217Z | 2024-03-25T00:05:53.628547Z |
| osv-2024-195 | Security exception in com.github.javaparser.ast.validator.TreeVisitorValidator.accept | 2024-03-24T00:14:24.746452Z | 2026-05-04T14:18:35.195926Z |
| osv-2024-194 | Heap-use-after-free in xmlDOMWrapNSNormAcquireNormalizedNs | 2024-03-24T00:06:16.876227Z | 2024-03-24T00:06:16.876833Z |
| osv-2024-193 | Use-of-uninitialized-value in api.c | 2024-03-24T00:04:56.514783Z | 2024-03-24T00:04:56.515126Z |
| osv-2024-189 | Negative-size-param in vcf_parse_format | 2024-03-23T00:12:44.903137Z | 2024-04-16T14:19:36.401830Z |
| osv-2024-187 | Heap-buffer-overflow in pcre2_fuzzsupport.c | 2024-03-23T00:06:48.454975Z | 2024-03-23T00:06:48.455591Z |
| osv-2024-184 | Security exception in org.threeten.bp.format.DateTimeFormatterBuilder$CompositePrinterParser.parse | 2024-03-21T00:13:27.175097Z | 2025-09-25T14:28:31.599671Z |
| osv-2024-182 | Heap-buffer-overflow in pcre2_fuzzsupport.c | 2024-03-19T00:03:53.557559Z | 2024-03-19T00:03:53.558132Z |
| osv-2024-181 | Security exception in org.antlr.v4.runtime.atn.PredictionContext.fromRuleContext | 2024-03-18T00:11:51.491190Z | 2024-04-29T11:30:26.169921Z |
| osv-2024-180 | Heap-buffer-overflow in ixheaace_process | 2024-03-17T00:05:09.373138Z | 2024-03-17T00:05:09.373453Z |
| osv-2024-179 | UNKNOWN READ in gs_font_finalize | 2024-03-17T00:03:41.275523Z | 2024-04-12T14:46:15.104038Z |
| osv-2024-178 | Global-buffer-overflow in dissect_dns_answer | 2024-03-16T00:04:44.507570Z | 2024-03-16T00:04:44.508060Z |
| osv-2024-177 | Heap-buffer-overflow in p11_rpc_buffer_get_date_value | 2024-03-16T00:01:15.392885Z | 2024-03-16T00:01:15.393177Z |
| osv-2024-173 | Heap-buffer-overflow in pcre2_fuzzsupport.c | 2024-03-15T00:09:32.005883Z | 2024-03-15T00:09:32.006372Z |
| osv-2024-171 | Security exception in org.threeten.bp.format.DateTimeFormatterBuilder$CompositePrinterParser.parse | 2024-03-15T00:08:01.855772Z | 2025-09-25T14:28:39.920838Z |
| osv-2024-170 | Use-of-uninitialized-value in pcpp::Packet::createFirstLayer | 2024-03-14T00:14:30.862304Z | 2024-03-14T00:14:30.862862Z |
| osv-2024-167 | Security exception in com.github.javaparser.GeneratedJavaParser.Expression | 2024-03-14T00:10:52.218597Z | 2024-04-29T11:19:04.592001Z |
| osv-2024-163 | Stack-buffer-overflow in H5S_get_simple_extent_dims | 2024-03-12T00:05:38.587103Z | 2024-04-29T11:18:04.652469Z |
| osv-2024-161 | Heap-buffer-overflow in pcre2_fuzzsupport.c | 2024-03-11T00:00:35.333844Z | 2024-03-11T00:00:35.334478Z |
| osv-2024-157 | Heap-buffer-overflow in gf_strmemstr | 2024-03-10T00:06:03.489792Z | 2024-04-18T14:20:28.786302Z |
| osv-2024-156 | Stack-buffer-overflow in rtpin_satip_get_server_ip | 2024-03-10T00:01:41.405747Z | 2024-04-18T14:21:00.600694Z |
| osv-2024-153 | Heap-buffer-overflow in od_ec_dec_init | 2024-03-07T00:13:48.067527Z | 2024-04-24T14:26:37.406573Z |
| osv-2024-151 | Heap-buffer-overflow in od_ec_dec_normalize | 2024-03-07T00:04:15.146851Z | 2024-04-24T14:26:12.240231Z |
| osv-2024-149 | Heap-use-after-free in get_ls_tile_buffers | 2024-03-07T00:01:26.874963Z | 2024-04-24T14:25:20.329505Z |
| osv-2024-144 | UNKNOWN READ in spvtools::val::ValidateAccessChain | 2024-02-29T00:12:28.292465Z | 2024-04-23T14:17:09.435427Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2022-0029 | `MsQueue` `push`/`pop` use the wrong orderings | 2022-06-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0028 | Use after free in Neon external buffers | 2022-05-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0031 | Panic due to improper UTF-8 indexing | 2022-05-21T12:00:00Z | 2022-06-26T20:01:26Z |
| rustsec-2022-0030 | Stack overflow during recursive expression parsing | 2022-05-21T12:00:00Z | 2022-06-26T19:44:13Z |
| rustsec-2022-0054 | wee_alloc is Unmaintained | 2022-05-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0046 | Out-of-bounds read when opening multiple column families with TTL | 2022-05-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0024 | double-checked-cell is unmaintained | 2022-05-11T12:00:00Z | 2022-05-11T21:13:02Z |
| rustsec-2022-0023 | `static_type_map` has been renamed to `erased_set` | 2022-05-11T12:00:00Z | 2022-05-11T19:44:11Z |
| rustsec-2022-0042 | malicious crate `rustdecimal` | 2022-05-10T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2022-0022 | Parser creates invalid uninitialized value | 2022-05-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0021 | `SegQueue` creates zero value of any type | 2022-05-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0020 | `SegQueue` creates zero value of any type | 2022-05-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0019 | Channel creates zero value of any type | 2022-05-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0018 | Timing attack | 2022-05-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0027 | `OCSP_basic_verify` may incorrectly verify the response signing certificate | 2022-05-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0026 | Incorrect MAC key used in the RC4-MD5 ciphersuite | 2022-05-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0025 | Resource leakage when decoding certificates and keys | 2022-05-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0017 | `array!` macro is unsound when its length is impure constant | 2022-04-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0071 | Rusoto is unmaintained | 2022-04-24T12:00:00Z | 2022-12-18T12:08:00Z |
| rustsec-2022-0092 | `rmp-serde` `Raw` and `RawRef` unsound | 2022-04-13T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0016 | Use after free with `externref`s and epoch interruption in Wasmtime | 2022-03-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0099 | Use after free with `externref`s and epoch interruption in Wasmtime | 2022-03-28T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0015 | pty is unmaintained | 2022-03-22T12:00:00Z | 2022-03-22T14:52:42Z |
| rustsec-2022-0014 | Infinite loop in `BN_mod_sqrt()` reachable when parsing certificates | 2022-03-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0013 | Regexes with large repetitions on empty sub-expressions take a very long time to parse | 2022-03-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0103 | Incorrect signature verification on gzip-compressed install images | 2022-03-04T12:00:00Z | 2025-12-21T13:45:28Z |
| rustsec-2022-0012 | Arrow2 allows double free in `safe` code | 2022-03-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0011 | Miscomputation when performing AES encryption in rust-crypto | 2022-02-28T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0047 | Post-Quantum Signature scheme Rainbow level I parametersets broken | 2022-02-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0096 | Invalid drop of VMExternRef from partially-initialized instances in the pooling instance allocator | 2022-02-17T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2026-2104 | Authorization Bypass Through User-Controlled Key in GitLab | 2026-04-13T06:09:50.678Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-1516 | Improper Control of Generation of Code ('Code Injection') in GitLab | 2026-04-13T06:09:35.915Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-1101 | Improper Validation of Specified Quantity in Input in GitLab | 2026-04-13T06:09:20.803Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2025-9484 | Missing Authorization in GitLab | 2026-04-13T06:08:58.190Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2025-12664 | Improper Validation of Specified Quantity in Input in GitLab | 2026-04-13T06:05:51.788Z | 2026-04-13T06:11:47.324Z |
| bit-tomcat-2026-34486 | Apache Tomcat: Fix for CVE-2026-29146 allowed bypass of EncryptInterceptor | 2026-04-13T05:53:08.595Z | 2026-04-13T06:11:47.324Z |
| bit-tomcat-2026-32990 | Apache Tomcat: Fix for CVE-2025-66614 is incomplete | 2026-04-13T05:53:05.369Z | 2026-04-13T06:11:47.324Z |
| bit-tomcat-2026-29129 | Apache Tomcat: TLS cipher order is not preserved | 2026-04-13T05:53:00.617Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-33810 | Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509 | 2026-04-13T05:43:50.259Z | 2026-04-21T12:33:30.555Z |
| bit-golang-2026-32289 | JsBraceDepth Context Tracking Bugs (XSS) in html/template | 2026-04-13T05:43:48.183Z | 2026-04-17T00:10:47.507Z |
| bit-golang-2026-32288 | Unbounded allocation for old GNU sparse in archive/tar | 2026-04-13T05:43:46.362Z | 2026-04-17T00:10:47.507Z |
| bit-golang-2026-32283 | Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection retention and DoS in crypto/tls | 2026-04-13T05:43:44.464Z | 2026-04-17T00:10:47.507Z |
| bit-golang-2026-32282 | TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix | 2026-04-13T05:43:42.625Z | 2026-04-17T00:10:47.507Z |
| bit-golang-2026-32281 | Inefficient policy validation in crypto/x509 | 2026-04-13T05:43:40.495Z | 2026-04-17T00:10:47.507Z |
| bit-golang-2026-32280 | Unexpected work during chain building in crypto/x509 | 2026-04-13T05:43:38.849Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-27140 | Code execution vulnerability in SWIG code generation in cmd/go | 2026-04-13T05:43:35.566Z | 2026-04-17T00:10:47.507Z |
| bit-logstash-2026-33466 | Improper Limitation of a Pathname to a Restricted Directory in Logstash Leading to Arbitrary File Write | 2026-04-13T05:42:10.653Z | 2026-04-22T09:10:06.651Z |
| bit-kibana-2026-4498 | Execution with Unnecessary Privileges in Kibana Leading to reading index data beyond their direct Elasticsearch RBAC scope | 2026-04-13T05:42:05.042Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-33461 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:42:03.441Z | 2026-04-23T09:10:51.830Z |
| bit-kibana-2026-33460 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:42:01.870Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-33459 | Uncontrolled Resource Consumption in Kibana Leading to Denial of Service | 2026-04-13T05:42:00.230Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-33458 | Server-Side Request Forgery (SSRF) in Kibana One Workflow Leading to Information Disclosure | 2026-04-13T05:41:58.634Z | 2026-04-17T00:10:47.507Z |
| bit-helm-2026-35206 | Helm Chart extraction output directory collapse via `Chart.yaml` name dot-segment | 2026-04-13T05:40:36.770Z | 2026-04-13T06:11:47.324Z |
| bit-helm-2026-35205 | Helm's plugin verification fails open when .prov is missing, allowing unsigned plugin install | 2026-04-13T05:40:35.063Z | 2026-04-13T06:11:47.324Z |
| bit-helm-2026-35204 | Helm has a path traversal in plugin metadata version enables arbitrary file write outside Helm plugin directory | 2026-04-13T05:40:33.104Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-4498 | Execution with Unnecessary Privileges in Kibana Leading to reading index data beyond their direct Elasticsearch RBAC scope | 2026-04-13T05:38:40.214Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-33461 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:38:38.805Z | 2026-04-23T09:10:51.830Z |
| bit-elk-2026-33460 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:38:37.022Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-33459 | Uncontrolled Resource Consumption in Kibana Leading to Denial of Service | 2026-04-13T05:38:35.203Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-33458 | Server-Side Request Forgery (SSRF) in Kibana One Workflow Leading to Information Disclosure | 2026-04-13T05:38:33.681Z | 2026-04-17T00:10:47.507Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-xo49545 | Within HostnameError | 2026-01-30T16:21:25.500719Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ui65993 | Within HostnameError | 2026-01-30T16:21:25.457624Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zm84646 | Within HostnameError | 2026-01-30T16:20:55.488130Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pk62208 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:20:55.127319Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nd18869 | tar | 2026-01-30T16:20:55.683557Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ml51665 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:20:55.711028Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kz60560 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:19:55.200542Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ch38544 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:19:55.527550Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xp58111 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:18:55.480183Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xi02879 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:18:55.578686Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sj80413 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:16:55.110567Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cd66042 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:16:25.085708Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ku65968 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:15:25.445497Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xp03839 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:14:55.099611Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qm19832 | Moby is an open source container framework developed by Docker Inc | 2026-01-30T16:13:25.141915Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-um63521 | Within HostnameError | 2026-01-30T16:12:25.029065Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xr17407 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:11:25.270681Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-so95938 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:11:25.480356Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jr48309 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:11:25.334563Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cz81512 | Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes | 2026-01-30T16:11:25.451968Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uz73015 | Cancelling a query (e | 2026-01-30T16:09:25.315533Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zm51114 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:08:25.157380Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pk69606 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:08:25.435888Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gl70025 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:08:25.191230Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ps30901 | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes | 2026-01-30T16:07:55.053827Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wp20592 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:05:24.814830Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-we92783 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:05:24.753007Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wa03785 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:05:24.799763Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nv34418 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:04:54.566695Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qv26039 | Within HostnameError | 2026-01-30T16:03:24.653963Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2006-ALE-010 | Vulnérabilité dans Internet Explorer | 2006-08-23T00:00:00.000000 | 2006-08-25T00:00:00.000000 |
| certa-2006-ale-009 | Vulnérabilité de la librairie MSO.DLL dans Microsoft Office | 2006-07-15T00:00:00.000000 | 2006-08-09T00:00:00.000000 |
| CERTA-2006-ALE-009 | Vulnérabilité de la librairie MSO.DLL dans Microsoft Office | 2006-07-15T00:00:00.000000 | 2006-08-09T00:00:00.000000 |
| certa-2006-ale-008 | Vulnérabilité d'ExtCalendar | 2006-07-11T00:00:00.000000 | 2006-07-11T00:00:00.000000 |
| CERTA-2006-ALE-008 | Vulnérabilité d'ExtCalendar | 2006-07-11T00:00:00.000000 | 2006-07-11T00:00:00.000000 |
| certa-2006-ale-007 | Vulnérabilité dans Microsoft Excel | 2006-06-16T00:00:00.000000 | 2006-07-12T00:00:00.000000 |
| CERTA-2006-ALE-007 | Vulnérabilité dans Microsoft Excel | 2006-06-16T00:00:00.000000 | 2006-07-12T00:00:00.000000 |
| certa-2006-ale-006 | Vulnérabilité dans Microsoft Word | 2006-05-20T00:00:00.000000 | 2006-06-14T00:00:00.000000 |
| CERTA-2006-ALE-006 | Vulnérabilité dans Microsoft Word | 2006-05-20T00:00:00.000000 | 2006-06-14T00:00:00.000000 |
| certa-2006-ale-005 | Vulnérabilité dans Firefox | 2006-04-26T00:00:00.000000 | 2006-05-02T00:00:00.000000 |
| CERTA-2006-ALE-005 | Vulnérabilité dans Firefox | 2006-04-26T00:00:00.000000 | 2006-05-02T00:00:00.000000 |
| certa-2006-ale-004 | Multiples vulnérabilités sous Mac OS X d'Apple | 2006-04-22T00:00:00.000000 | 2006-05-12T00:00:00.000000 |
| CERTA-2006-ALE-004 | Multiples vulnérabilités sous Mac OS X d'Apple | 2006-04-22T00:00:00.000000 | 2006-05-12T00:00:00.000000 |
| certa-2006-ale-003 | Vulnérabilité de Sendmail | 2006-03-24T00:00:00.000000 | 2006-03-24T00:00:00.000000 |
| CERTA-2006-ALE-003 | Vulnérabilité de Sendmail | 2006-03-24T00:00:00.000000 | 2006-03-24T00:00:00.000000 |
| certa-2006-ale-002 | Multiples vulnérabilités dans Microsoft Internet Explorer | 2006-03-23T00:00:00.000000 | 2006-04-12T00:00:00.000000 |
| CERTA-2006-ALE-002 | Multiples vulnérabilités dans Microsoft Internet Explorer | 2006-03-23T00:00:00.000000 | 2006-04-12T00:00:00.000000 |
| certa-2006-ale-001 | Vulnérabilité dans le traitement de certains fichiers sous MAC OS X | 2006-02-22T00:00:00.000000 | 2006-03-02T00:00:00.000000 |
| CERTA-2006-ALE-001 | Vulnérabilité dans le traitement de certains fichiers sous MAC OS X | 2006-02-22T00:00:00.000000 | 2006-03-02T00:00:00.000000 |
| certa-2005-ale-019 | Exploitation d'une vulnérabilité mal corrigée dans Microsoft Windows | 2005-12-28T00:00:00.000000 | 2006-01-06T00:00:00.000000 |
| CERTA-2005-ALE-019 | Exploitation d'une vulnérabilité mal corrigée dans Microsoft Windows | 2005-12-28T00:00:00.000000 | 2006-01-06T00:00:00.000000 |
| certa-2005-ale-018 | Vulnérabilité du navigateur Firefox | 2005-12-08T00:00:00.000000 | 2005-12-08T00:00:00.000000 |
| CERTA-2005-ALE-018 | Vulnérabilité du navigateur Firefox | 2005-12-08T00:00:00.000000 | 2005-12-08T00:00:00.000000 |
| certa-2005-ale-017 | Vulnérabilité de Microsoft Internet Explorer | 2005-11-21T00:00:00.000000 | 2005-12-14T00:00:00.000000 |
| CERTA-2005-ALE-017 | Vulnérabilité de Microsoft Internet Explorer | 2005-11-21T00:00:00.000000 | 2005-12-14T00:00:00.000000 |
| certa-2005-ale-016 | Vulnérabilité de Microsoft Windows RPC | 2005-11-18T00:00:00.000000 | 2005-11-18T00:00:00.000000 |
| CERTA-2005-ALE-016 | Vulnérabilité de Microsoft Windows RPC | 2005-11-18T00:00:00.000000 | 2005-11-18T00:00:00.000000 |
| certa-2005-ale-014 | Vulnérabilité d'un grand nombre d'antivirus | 2005-10-11T00:00:00.000000 | 2005-10-11T00:00:00.000000 |
| CERTA-2005-ALE-014 | Vulnérabilité d'un grand nombre d'antivirus | 2005-10-11T00:00:00.000000 | 2005-10-11T00:00:00.000000 |
| certa-2005-ale-013 | Vulnérabilité dans Citrix Metaframe Presentation | 2005-10-07T00:00:00.000000 | 2013-06-06T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2026-AVI-0064 | Vulnérabilité Microsoft Power Apps | 2026-01-19T00:00:00.000000 | 2026-01-19T00:00:00.000000 |
| CERTFR-2026-AVI-0063 | Multiples vulnérabilités dans Microsoft Edge | 2026-01-19T00:00:00.000000 | 2026-01-19T00:00:00.000000 |
| CERTFR-2026-AVI-0062 | Vulnérabilité dans Mattermost Desktop App | 2026-01-19T00:00:00.000000 | 2026-01-19T00:00:00.000000 |
| certfr-2026-avi-0061 | Multiples vulnérabilités dans les produits IBM | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0060 | Vulnérabilité dans Apache Struts | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0059 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0058 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0057 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0056 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0055 | Multiples vulnérabilités dans GLPI | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0054 | Multiples vulnérabilités dans Centreon Infra Monitoring | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0053 | Vulnérabilité dans Traefik | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0052 | Multiples vulnérabilités dans Mattermost Server | 2026-01-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| CERTFR-2026-AVI-0061 | Multiples vulnérabilités dans les produits IBM | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| CERTFR-2026-AVI-0060 | Vulnérabilité dans Apache Struts | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| CERTFR-2026-AVI-0059 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| CERTFR-2026-AVI-0058 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| CERTFR-2026-AVI-0057 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| CERTFR-2026-AVI-0056 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| CERTFR-2026-AVI-0055 | Multiples vulnérabilités dans GLPI | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| CERTFR-2026-AVI-0054 | Multiples vulnérabilités dans Centreon Infra Monitoring | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| CERTFR-2026-AVI-0053 | Vulnérabilité dans Traefik | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| CERTFR-2026-AVI-0052 | Multiples vulnérabilités dans Mattermost Server | 2026-01-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0051 | Multiples vulnérabilités dans les produits Mozilla | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0050 | Multiples vulnérabilités dans les produits Juniper Networks | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0049 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0048 | Multiples vulnérabilités dans Wireshark | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0047 | Vulnérabilité dans F5 NGINX Ingress Controller | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| CERTFR-2026-AVI-0051 | Multiples vulnérabilités dans les produits Mozilla | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| CERTFR-2026-AVI-0050 | Multiples vulnérabilités dans les produits Juniper Networks | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2023-002270 | Null pointer dereference vulnerability in multiple printers and MFPs which implement BROTHER debut web server | 2023-06-30T11:49+09:00 | 2024-04-22T16:07+09:00 |
| jvndb-2023-000067 | WordPress Plugin "Snow Monkey Forms" vulnerable to directory traversal | 2023-06-27T17:05+09:00 | 2024-04-26T17:56+09:00 |
| jvndb-2023-000065 | Multiple vulnerabilities in WAVLINK WL-WN531AX2 | 2023-06-27T16:50+09:00 | 2023-06-27T16:50+09:00 |
| jvndb-2023-000066 | Multiple vulnerabilities in Aterm series | 2023-06-27T15:12+09:00 | 2024-05-22T18:16+09:00 |
| jvndb-2023-000060 | Multiple vulnerabilities in Pleasanter | 2023-06-22T15:49+09:00 | 2024-05-07T14:10+09:00 |
| jvndb-2023-000064 | SYNCK GRAPHICA Mailform Pro CGI vulnerable to Regular expression Denial-of-Service (ReDoS) | 2023-06-20T14:48+09:00 | 2024-04-26T18:03+09:00 |
| jvndb-2023-000063 | Multiple vulnerabilities in Panasonic AiSEG2 | 2023-06-16T14:05+09:00 | 2023-06-16T14:05+09:00 |
| jvndb-2023-002111 | Printer Driver Packager NX creates driver installation packages without modification detection | 2023-06-15T16:06+09:00 | 2024-05-23T15:45+09:00 |
| jvndb-2023-002100 | Security updates for multiple Trend Micro products for enterprises (June 2023) | 2023-06-14T14:47+09:00 | 2024-05-23T15:23+09:00 |
| jvndb-2023-000061 | Chatwork Desktop Application (Mac) vulnerable to code injection | 2023-06-13T13:38+09:00 | 2024-05-24T16:02+09:00 |
| jvndb-2023-000062 | "WPS Office" vulnerable to OS command injection | 2023-06-12T12:57+09:00 | 2024-04-18T17:49+09:00 |
| jvndb-2023-000059 | Multiple vulnerabilities in Inaba Denki Sangyo Wi-Fi AP UNIT | 2023-06-09T15:18+09:00 | 2024-05-27T16:38+09:00 |
| jvndb-2023-000048 | ASUS Router RT-AX3000 vulnerable to using sensitive cookies without 'Secure' attribute | 2023-06-09T15:18+09:00 | 2024-04-18T17:44+09:00 |
| jvndb-2023-002072 | Multiple vulnerabilities in Fuji Electric products | 2023-06-09T12:23+09:00 | 2024-05-23T15:33+09:00 |
| jvndb-2023-002055 | Multiple vulnerabilities in KbDevice digital video recorders | 2023-06-07T11:52+09:00 | 2024-05-24T15:57+09:00 |
| jvndb-2023-002022 | Multiple vulnerabilities in FUJI ELECTRIC FRENIC RHC Loader | 2023-06-05T15:55+09:00 | 2024-04-18T17:40+09:00 |
| jvndb-2023-000057 | "Jiyu Kukan Toku-Toku coupon" App vulnerable to improper server certificate verification | 2023-06-01T14:51+09:00 | 2024-05-23T17:19+09:00 |
| jvndb-2023-002002 | Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS) | 2023-06-01T13:48+09:00 | 2024-03-19T18:13+09:00 |
| jvndb-2023-000058 | Pleasanter vulnerable to cross-site scripting | 2023-05-31T15:34+09:00 | 2024-03-19T18:17+09:00 |
| jvndb-2023-000052 | DataSpider Servista uses a hard-coded cryptographic key | 2023-05-31T15:34+09:00 | 2024-03-19T17:44+09:00 |
| jvndb-2023-000056 | Starlette vulnerable to directory traversal | 2023-05-30T13:34+09:00 | 2024-03-19T18:08+09:00 |
| jvndb-2023-000055 | ESS REC Agent Server Edition for Linux etc. vulnerable to directory traversal | 2023-05-26T13:58+09:00 | 2024-03-21T17:15+09:00 |
| jvndb-2023-000054 | Wacom Tablet Driver installer for macOS vulnerable to improper link resolution before file access | 2023-05-25T13:40+09:00 | 2023-05-25T13:40+09:00 |
| jvndb-2023-001926 | Cross-site Scripting Vulnerability in Hitachi Ops Center Analyzer | 2023-05-24T11:40+09:00 | 2024-05-24T17:01+09:00 |
| jvndb-2023-000053 | Tornado vulnerable to open redirect | 2023-05-22T13:30+09:00 | 2024-03-21T17:05+09:00 |
| jvndb-2023-001894 | Android App "Brother iPrint&Scan" vulnerable to improper access control | 2023-05-19T15:40+09:00 | 2023-05-19T15:40+09:00 |
| jvndb-2023-000051 | Multiple vulnerabilities in T&D and ESPEC MIC data logger products | 2023-05-19T15:21+09:00 | 2024-05-23T17:03+09:00 |
| jvndb-2023-000026 | Qrio Smart Lock Q-SL2 vulnerable to authentication bypass by capture-replay | 2023-05-18T14:13+09:00 | 2024-05-23T17:18+09:00 |
| jvndb-2023-001852 | OS command injection vulnerability in Inaba Denki Sangyo Wi-Fi AP UNIT | 2023-05-17T15:09+09:00 | 2023-05-17T15:09+09:00 |
| jvndb-2023-000050 | Multiple vulnerabilities in WordPress Plugin "MW WP Form" and "Snow Monkey Forms" | 2023-05-15T14:29+09:00 | 2024-05-29T16:27+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-13997 | Huawei EMUI和Huawei HarmonyOS系统服务框架权限绕过漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-18676 | Adobe DNG SDK输入验证错误漏洞 | 2026-03-16 | 2026-04-27 |
| cnvd-2026-18675 | Adobe DNG SDK越界写入漏洞 | 2026-03-16 | 2026-04-27 |
| cnvd-2026-17372 | Apache IoTDB输入验证不当漏洞 | 2026-03-16 | 2026-04-10 |
| cnvd-2026-16692 | Fortinet FortiWeb代码问题漏洞 | 2026-03-16 | 2026-04-10 |
| cnvd-2026-16601 | Mozilla Firefox安全绕过漏洞(CNVD-2026-16601) | 2026-03-16 | 2026-04-09 |
| cnvd-2026-16600 | ImageMagick整数溢出漏洞(CNVD-2026-16600) | 2026-03-16 | 2026-04-09 |
| cnvd-2026-16599 | Adobe Substance3D Painter越界读取漏洞(CNVD-2026-16599) | 2026-03-16 | 2026-04-09 |
| cnvd-2026-16598 | Adobe Substance3D Painter越界读取漏洞(CNVD-2026-16598) | 2026-03-16 | 2026-04-09 |
| cnvd-2026-16597 | OliveTin路径遍历漏洞 | 2026-03-16 | 2026-04-09 |
| cnvd-2026-16596 | iccDEV缓冲区溢出漏洞 | 2026-03-16 | 2026-04-09 |
| cnvd-2026-16164 | Microsoft SharePoint Server欺骗漏洞(CNVD-2026-16164) | 2026-03-16 | 2026-04-07 |
| cnvd-2026-16163 | Microsoft SharePoint Server远程代码执行漏洞(CNVD-2026-16163) | 2026-03-16 | 2026-04-07 |
| cnvd-2026-16162 | Microsoft SharePoint Server远程代码执行漏洞(CNVD-2026-16162) | 2026-03-16 | 2026-04-07 |
| cnvd-2026-15865 | Delta Electronics COMMGR2堆栈缓冲区溢出漏洞 | 2026-03-16 | 2026-04-02 |
| cnvd-2026-15864 | Delta Electronics COMMGR2拒绝服务漏洞 | 2026-03-16 | 2026-04-02 |
| cnvd-2026-13976 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13976) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13975 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13975) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13974 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13974) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13973 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13973) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13972 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13972) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13971 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13971) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13970 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13970) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13969 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13969) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13968 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13968) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13967 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13967) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13966 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13966) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13965 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13965) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13964 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13964) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13963 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13963) | 2026-03-16 | 2026-03-17 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01067 | Уязвимость функции system() (/boaform/formSysCmd) микропрограммного обеспечения оптически… | 02.02.2026 | 02.02.2026 |
| bdu:2026-01066 | Уязвимость программного обеспечения для настройки и обслуживания сервоприводов ASDA-Soft,… | 02.02.2026 | 02.02.2026 |
| bdu:2026-01065 | Уязвимость микропрограммного обеспечения встраиваемых плат Qualcomm, существующая из-за н… | 02.02.2026 | 04.02.2026 |
| bdu:2026-01064 | Уязвимость компонента NVIDIA Virtual GPU Manager драйвера виртуальных графических процесс… | 02.02.2026 | 02.02.2026 |
| bdu:2026-01063 | Уязвимость компонента NVIDIA Virtual GPU Manager драйвера виртуальных графических процесс… | 02.02.2026 | 02.02.2026 |
| bdu:2026-01062 | Уязвимость функции fromAdvSetMacMtuWan микропрограммного обеспечения маршрутизаторов Tend… | 02.02.2026 | 02.02.2026 |
| bdu:2026-01061 | Уязвимость приложения для управления жизненным циклом мобильных устройств и мобильных при… | 02.02.2026 | 02.02.2026 |
| bdu:2026-01060 | Уязвимость функции metadata.checkType() фреймворка для обеспечения безопасности систем об… | 31.01.2026 | 31.01.2026 |
| bdu:2026-01059 | Уязвимость функции metadata.VerifyDelegate() фреймворка для обеспечения безопасности сист… | 31.01.2026 | 31.01.2026 |
| bdu:2026-01058 | Уязвимость конфигурации UPLOAD_DIR и UPLOAD_KEEP_FILENAME=True потокового многокомпонентн… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01057 | Уязвимость функций rt6_uncached_list_del() и rt_del_uncached_list() ядра операционной сис… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01056 | Уязвимость модулей arch/x86/kvm/x86.c и arch/x86/kernel/fpu/core.c ядра операционной сист… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01055 | Уязвимость функции mlx5e_netdev_change_profile() ядра операционной системы Linux, позволя… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01053 | Уязвимость функции hnd_parentalctrl_unblock() микропрограммного обеспечения маршрутизатор… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01052 | Уязвимость микропрограммного обеспечения промышленного контроллера SICK TDC-X401GL, связа… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01051 | Уязвимость микропрограммного обеспечения промышленного контроллера SICK TDC-X401GL, связа… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01050 | Уязвимость функции mlx5_unload_one() модуля drivers/net/ethernet/mellanox/mlx5/core/lag/l… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01049 | Уязвимость функции name_size() ядра операционной системы Linux, позволяющая нарушителю вы… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01048 | Уязвимость функции png_image_read_direct_scaled() библиотеки libpng, позволяющая нарушите… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01047 | Уязвимость микропрограммного обеспечения встраиваемых плат Qualcomm, связанная с чтением … | 30.01.2026 | 04.02.2026 |
| bdu:2026-01046 | Уязвимость веб-интерфейса управления микропрограммного обеспечения беспроводных маршрутиз… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01045 | Уязвимость функции unserialize() WebSocket-сервера Laravel Reverb, позволяющая нарушителю… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01044 | Уязвимость компонента systemutil.cgi микропрограммного обеспечения маршрутизаторов Telesq… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01043 | Уязвимость компонента Spring Boot Actuator корпоративного защищённого решения для обмена … | 30.01.2026 | 30.01.2026 |
| bdu:2026-01042 | Уязвимость компонента JSP Application корпоративного защищённого решения для обмена сообщ… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01041 | Уязвимость файла .dylib текстового редактора Sublime Text операционной системы Mac Os, по… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01040 | Уязвимость компонента EnvoyExtensionPolicy программной платформы для управления Envoy Pro… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01039 | Уязвимость реализации механизма аутентификации Polkit утилиты InputPlumber операционной с… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01038 | Уязвимость функции Search и Discovery микропрограммного обеспечения устройств видеонаблюд… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01037 | Уязвимость веб-интерфейса управления микропрограммного обеспечения беспроводных маршрутиз… | 30.01.2026 | 30.01.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201905-0711 | Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessor… | 2024-07-23T21:06:26.228000Z |
| var-201410-0371 | Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows… | 2024-07-23T21:06:25.896000Z |
| var-200906-0605 | drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier… | 2024-07-23T21:06:23.926000Z |
| var-200701-0516 | Format string vulnerability in Apple iChat 3.1.6 allows remote attackers to cause a denia… | 2024-07-23T21:06:21.462000Z |
| var-200704-0217 | The Login Window in Apple Mac OS X 10.3.9 through 10.4.9 does not properly check certain … | 2024-07-23T21:05:47.835000Z |
| var-201302-0264 | Use-after-free vulnerability in Adobe Flash Player before 10.3.183.63 and 11.x before 11.… | 2024-07-23T21:05:46.754000Z |
| var-201110-0385 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2024-07-23T21:05:46.173000Z |
| var-202108-1140 | A device configuration issue was addressed with an updated configuration. This issue is f… | 2024-07-23T21:05:39.606000Z |
| var-202103-1463 | The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates p… | 2024-07-23T21:05:39.679000Z |
| var-201912-0642 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:05:39.981000Z |
| var-200701-0124 | The ufs_lookup function in the Mac OS X 10.4.8 and FreeBSD 6.1 kernels allows local users… | 2024-07-23T21:05:38.664000Z |
| var-201903-0440 | A type confusion issue was addressed with improved memory handling. This issue is fixed i… | 2024-07-23T21:05:02.081000Z |
| var-202112-0562 | It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete… | 2024-07-23T21:05:01.160000Z |
| var-201602-0272 | ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use… | 2024-07-23T21:05:01.067000Z |
| var-200704-0229 | Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allo… | 2024-07-23T21:05:01.347000Z |
| var-201806-1487 | An issue was discovered in certain Apple products. iOS before 11.3.1 is affected. Safari … | 2024-07-23T21:05:00.631000Z |
| var-201006-1194 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 throug… | 2024-07-23T21:05:00.580000Z |
| var-202002-1191 | An out-of-bounds read was addressed with improved input validation. This issue is fixed i… | 2024-07-23T21:04:58.267000Z |
| var-201504-0147 | cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which a… | 2024-07-23T21:04:58.843000Z |
| var-200812-0322 | Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows re… | 2024-07-23T21:04:56.685000Z |
| var-201912-1851 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:04:54.509000Z |
| var-201304-0091 | sudo 1.3.5 through 1.7.10 and 1.8.0 through 1.8.5, when the tty_tickets option is enabled… | 2024-07-23T21:04:54.405000Z |
| var-201912-0484 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T21:04:53.320000Z |
| var-200704-0214 | fsck, as used by the AirPort Disk feature of the AirPort Extreme Base Station with 802.11… | 2024-07-23T21:04:53.153000Z |
| var-201904-1473 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:04:52.392000Z |
| var-200701-0396 | Format string vulnerability in Apple Software Update 2.0.5 on Mac OS X 10.4.8 allows remo… | 2024-07-23T21:04:51.875000Z |
| var-201409-1155 | GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed functi… | 2024-07-23T21:04:41.941000Z |
| var-201003-1082 | The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x befo… | 2024-07-23T21:04:41.162000Z |
| var-201501-0339 | The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 b… | 2024-07-23T21:04:37.270000Z |
| var-200608-0042 | OpenSSH in Apple Mac OS X 10.4.7 allows remote attackers to cause a denial of service or … | 2024-07-23T21:04:03.433000Z |