Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-8008 |
5.4 (3.1)
|
Inappropriate implementation in DevTools in Googl… |
Google |
Chrome |
2026-05-06T18:13:11.169Z | 2026-05-06T21:47:21.898Z |
| CVE-2026-8007 |
7.5 (3.1)
|
Insufficient validation of untrusted input in Cas… |
Google |
Chrome |
2026-05-06T18:13:10.692Z | 2026-05-07T03:56:54.857Z |
| CVE-2026-8006 |
5.4 (3.1)
|
Insufficient policy enforcement in DevTools in Go… |
Google |
Chrome |
2026-05-06T18:13:10.335Z | 2026-05-06T21:47:40.718Z |
| CVE-2026-8005 |
4.3 (3.1)
|
Insufficient validation of untrusted input in Cas… |
Google |
Chrome |
2026-05-06T18:13:09.985Z | 2026-05-06T21:47:50.648Z |
| CVE-2026-8004 |
4.3 (3.1)
|
Insufficient policy enforcement in DevTools in Go… |
Google |
Chrome |
2026-05-06T18:13:09.616Z | 2026-05-06T21:47:59.531Z |
| CVE-2026-8003 |
5.4 (3.1)
|
Insufficient validation of untrusted input in Tab… |
Google |
Chrome |
2026-05-06T18:13:09.276Z | 2026-05-06T21:48:09.070Z |
| CVE-2026-8002 |
8.8 (3.1)
|
Use after free in Audio in Google Chrome on Mac p… |
Google |
Chrome |
2026-05-06T18:13:08.903Z | 2026-05-07T03:55:51.988Z |
| CVE-2026-8001 |
8.3 (3.1)
|
Use After Free in Printing in Google Chrome on Li… |
Google |
Chrome |
2026-05-06T18:13:08.504Z | 2026-05-07T03:56:55.965Z |
| CVE-2026-8000 |
8.8 (3.1)
|
Insufficient validation of untrusted input in Chr… |
Google |
Chrome |
2026-05-06T18:13:08.148Z | 2026-05-07T03:55:53.104Z |
| CVE-2026-7999 |
4.3 (3.1)
|
Inappropriate implementation in V8 in Google Chro… |
Google |
Chrome |
2026-05-06T18:13:07.680Z | 2026-05-06T21:49:00.986Z |
| CVE-2026-7998 |
5.4 (3.1)
|
Insufficient validation of untrusted input in Dia… |
Google |
Chrome |
2026-05-06T18:13:07.294Z | 2026-05-06T21:49:11.002Z |
| CVE-2026-7997 |
7.8 (3.1)
|
Insufficient validation of untrusted input in Upd… |
Google |
Chrome |
2026-05-06T18:13:06.912Z | 2026-05-07T03:56:57.063Z |
| CVE-2026-7996 |
4.2 (3.1)
|
Insufficient validation of untrusted input in SSL… |
Google |
Chrome |
2026-05-06T18:13:06.528Z | 2026-05-06T21:49:29.931Z |
| CVE-2026-7995 |
8.8 (3.1)
|
Out of bounds read in AdFilter in Google Chrome p… |
Google |
Chrome |
2026-05-06T18:13:06.063Z | 2026-05-07T03:55:54.399Z |
| CVE-2026-7994 |
7.8 (3.1)
|
Inappropriate implementation in Chromoting in Goo… |
Google |
Chrome |
2026-05-06T18:13:05.698Z | 2026-05-07T03:56:58.154Z |
| CVE-2026-7993 |
4.2 (3.1)
|
Insufficient validation of untrusted input in Pay… |
Google |
Chrome |
2026-05-06T18:13:05.353Z | 2026-05-06T21:49:58.710Z |
| CVE-2026-7992 |
8.8 (3.1)
|
Insufficient validation of untrusted input in UI … |
Google |
Chrome |
2026-05-06T18:13:05.011Z | 2026-05-07T03:55:55.609Z |
| CVE-2026-7991 |
8.8 (3.1)
|
Use after free in UI in Google Chrome prior to 14… |
Google |
Chrome |
2026-05-06T18:13:04.659Z | 2026-05-07T03:55:56.756Z |
| CVE-2026-7990 |
7.8 (3.1)
|
Insufficient validation of untrusted input in Upd… |
Google |
Chrome |
2026-05-06T18:13:04.329Z | 2026-05-07T03:56:59.243Z |
| CVE-2026-7989 |
4.2 (3.1)
|
Insufficient data validation in DataTransfer in G… |
Google |
Chrome |
2026-05-06T18:13:03.971Z | 2026-05-06T21:50:36.068Z |
| CVE-2026-7988 |
8.8 (3.1)
|
Type Confusion in WebRTC in Google Chrome prior t… |
Google |
Chrome |
2026-05-06T18:13:03.605Z | 2026-05-07T03:55:59.001Z |
| CVE-2026-7987 |
8.8 (3.1)
|
Use after free in WebRTC in Google Chrome prior t… |
Google |
Chrome |
2026-05-06T18:13:03.224Z | 2026-05-07T03:55:57.863Z |
| CVE-2026-7986 |
4.3 (3.1)
|
Insufficient policy enforcement in Autofill in Go… |
Google |
Chrome |
2026-05-06T18:13:02.861Z | 2026-05-06T21:51:05.027Z |
| CVE-2026-7985 |
8.3 (3.1)
|
Use after free in GPU in Google Chrome prior to 1… |
Google |
Chrome |
2026-05-06T18:13:02.341Z | 2026-05-07T03:56:09.217Z |
| CVE-2026-7984 |
8.8 (3.1)
|
Use after free in ReadingMode in Google Chrome pr… |
Google |
Chrome |
2026-05-06T18:13:01.749Z | 2026-05-07T03:56:00.356Z |
| CVE-2026-7983 |
4.3 (3.1)
|
Out of bounds read in Dawn in Google Chrome prior… |
Google |
Chrome |
2026-05-06T18:13:01.298Z | 2026-05-06T21:51:33.891Z |
| CVE-2026-7982 |
6.5 (3.1)
|
Uninitialized Use in WebCodecs in Google Chrome p… |
Google |
Chrome |
2026-05-06T18:13:00.944Z | 2026-05-06T21:51:43.237Z |
| CVE-2026-7981 |
8.1 (3.1)
|
Out of bounds read in Codecs in Google Chrome pri… |
Google |
Chrome |
2026-05-06T18:13:00.591Z | 2026-05-07T12:58:23.258Z |
| CVE-2026-7980 |
8.8 (3.1)
|
Use after free in WebAudio in Google Chrome prior… |
Google |
Chrome |
2026-05-06T18:13:00.212Z | 2026-05-07T03:56:05.831Z |
| CVE-2026-7979 |
4.3 (3.1)
|
Inappropriate implementation in Media in Google C… |
Google |
Chrome |
2026-05-06T18:12:59.814Z | 2026-05-06T21:52:02.679Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-8000 |
8.8 (3.1)
|
Insufficient validation of untrusted input in Chr… |
Google |
Chrome |
2026-05-06T18:13:08.148Z | 2026-05-07T03:55:53.104Z |
| CVE-2026-7999 |
4.3 (3.1)
|
Inappropriate implementation in V8 in Google Chro… |
Google |
Chrome |
2026-05-06T18:13:07.680Z | 2026-05-06T21:49:00.986Z |
| CVE-2026-7998 |
5.4 (3.1)
|
Insufficient validation of untrusted input in Dia… |
Google |
Chrome |
2026-05-06T18:13:07.294Z | 2026-05-06T21:49:11.002Z |
| CVE-2026-7997 |
7.8 (3.1)
|
Insufficient validation of untrusted input in Upd… |
Google |
Chrome |
2026-05-06T18:13:06.912Z | 2026-05-07T03:56:57.063Z |
| CVE-2026-7996 |
4.2 (3.1)
|
Insufficient validation of untrusted input in SSL… |
Google |
Chrome |
2026-05-06T18:13:06.528Z | 2026-05-06T21:49:29.931Z |
| CVE-2026-7995 |
8.8 (3.1)
|
Out of bounds read in AdFilter in Google Chrome p… |
Google |
Chrome |
2026-05-06T18:13:06.063Z | 2026-05-07T03:55:54.399Z |
| CVE-2026-7994 |
7.8 (3.1)
|
Inappropriate implementation in Chromoting in Goo… |
Google |
Chrome |
2026-05-06T18:13:05.698Z | 2026-05-07T03:56:58.154Z |
| CVE-2026-7993 |
4.2 (3.1)
|
Insufficient validation of untrusted input in Pay… |
Google |
Chrome |
2026-05-06T18:13:05.353Z | 2026-05-06T21:49:58.710Z |
| CVE-2026-7992 |
8.8 (3.1)
|
Insufficient validation of untrusted input in UI … |
Google |
Chrome |
2026-05-06T18:13:05.011Z | 2026-05-07T03:55:55.609Z |
| CVE-2026-7991 |
8.8 (3.1)
|
Use after free in UI in Google Chrome prior to 14… |
Google |
Chrome |
2026-05-06T18:13:04.659Z | 2026-05-07T03:55:56.756Z |
| CVE-2026-7990 |
7.8 (3.1)
|
Insufficient validation of untrusted input in Upd… |
Google |
Chrome |
2026-05-06T18:13:04.329Z | 2026-05-07T03:56:59.243Z |
| CVE-2026-7989 |
4.2 (3.1)
|
Insufficient data validation in DataTransfer in G… |
Google |
Chrome |
2026-05-06T18:13:03.971Z | 2026-05-06T21:50:36.068Z |
| CVE-2026-7988 |
8.8 (3.1)
|
Type Confusion in WebRTC in Google Chrome prior t… |
Google |
Chrome |
2026-05-06T18:13:03.605Z | 2026-05-07T03:55:59.001Z |
| CVE-2026-7987 |
8.8 (3.1)
|
Use after free in WebRTC in Google Chrome prior t… |
Google |
Chrome |
2026-05-06T18:13:03.224Z | 2026-05-07T03:55:57.863Z |
| CVE-2026-7986 |
4.3 (3.1)
|
Insufficient policy enforcement in Autofill in Go… |
Google |
Chrome |
2026-05-06T18:13:02.861Z | 2026-05-06T21:51:05.027Z |
| CVE-2026-7985 |
8.3 (3.1)
|
Use after free in GPU in Google Chrome prior to 1… |
Google |
Chrome |
2026-05-06T18:13:02.341Z | 2026-05-07T03:56:09.217Z |
| CVE-2026-7984 |
8.8 (3.1)
|
Use after free in ReadingMode in Google Chrome pr… |
Google |
Chrome |
2026-05-06T18:13:01.749Z | 2026-05-07T03:56:00.356Z |
| CVE-2026-7983 |
4.3 (3.1)
|
Out of bounds read in Dawn in Google Chrome prior… |
Google |
Chrome |
2026-05-06T18:13:01.298Z | 2026-05-06T21:51:33.891Z |
| CVE-2026-7982 |
6.5 (3.1)
|
Uninitialized Use in WebCodecs in Google Chrome p… |
Google |
Chrome |
2026-05-06T18:13:00.944Z | 2026-05-06T21:51:43.237Z |
| CVE-2026-7981 |
8.1 (3.1)
|
Out of bounds read in Codecs in Google Chrome pri… |
Google |
Chrome |
2026-05-06T18:13:00.591Z | 2026-05-07T12:58:23.258Z |
| CVE-2026-7980 |
8.8 (3.1)
|
Use after free in WebAudio in Google Chrome prior… |
Google |
Chrome |
2026-05-06T18:13:00.212Z | 2026-05-07T03:56:05.831Z |
| CVE-2026-7979 |
4.3 (3.1)
|
Inappropriate implementation in Media in Google C… |
Google |
Chrome |
2026-05-06T18:12:59.814Z | 2026-05-06T21:52:02.679Z |
| CVE-2026-7978 |
8.1 (3.1)
|
Inappropriate implementation in Companion in Goog… |
Google |
Chrome |
2026-05-06T18:12:59.436Z | 2026-05-07T03:57:00.415Z |
| CVE-2026-7977 |
6.3 (3.1)
|
Inappropriate implementation in Canvas in Google … |
Google |
Chrome |
2026-05-06T18:12:59.116Z | 2026-05-06T21:52:21.357Z |
| CVE-2026-7976 |
7.5 (3.1)
|
Use after free in Views in Google Chrome prior to… |
Google |
Chrome |
2026-05-06T18:12:58.810Z | 2026-05-07T03:56:10.296Z |
| CVE-2026-7975 |
8.3 (3.1)
|
Use after free in DevTools in Google Chrome prior… |
Google |
Chrome |
2026-05-06T18:12:58.457Z | 2026-05-07T03:56:11.421Z |
| CVE-2026-7974 |
8.8 (3.1)
|
Use after free in Blink in Google Chrome prior to… |
Google |
Chrome |
2026-05-06T18:12:58.111Z | 2026-05-07T03:56:12.725Z |
| CVE-2026-7973 |
8.8 (3.1)
|
Integer overflow in Dawn in Google Chrome on Wind… |
Google |
Chrome |
2026-05-06T18:12:57.739Z | 2026-05-07T03:56:13.865Z |
| CVE-2026-7972 |
4.3 (3.1)
|
Uninitialized Use in GPU in Google Chrome prior t… |
Google |
Chrome |
2026-05-06T18:12:57.320Z | 2026-05-06T21:53:08.430Z |
| CVE-2026-7971 |
6.3 (3.1)
|
Inappropriate implementation in ORB in Google Chr… |
Google |
Chrome |
2026-05-06T18:12:56.973Z | 2026-05-06T21:53:17.821Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-46304 | The issue was addressed with improved bounds checks. This issue is fixed in iOS 18.7.5 and iPadOS 1… | 2026-02-11T23:16:02.930 | 2026-04-02T19:21:06.087 |
| fkie_cve-2025-46303 | The issue was addressed with improved bounds checks. This issue is fixed in iOS 18.7.5 and iPadOS 1… | 2026-02-11T23:16:02.830 | 2026-04-02T19:21:05.893 |
| fkie_cve-2025-46302 | The issue was addressed with improved bounds checks. This issue is fixed in iOS 18.7.5 and iPadOS 1… | 2026-02-11T23:16:02.733 | 2026-04-02T19:21:05.710 |
| fkie_cve-2025-46301 | The issue was addressed with improved bounds checks. This issue is fixed in iOS 18.7.5 and iPadOS 1… | 2026-02-11T23:16:02.630 | 2026-04-02T19:21:05.527 |
| fkie_cve-2025-46300 | The issue was addressed with improved bounds checks. This issue is fixed in iOS 18.7.5 and iPadOS 1… | 2026-02-11T23:16:02.527 | 2026-04-02T19:21:05.337 |
| fkie_cve-2025-46290 | A logic issue was addressed with improved checks. This issue is fixed in iOS 18.7.3 and iPadOS 18.7… | 2026-02-11T23:16:02.407 | 2026-04-02T19:21:04.350 |
| fkie_cve-2025-43537 | A path handling issue was addressed with improved validation. This issue is fixed in iOS 18.7.5 and… | 2026-02-11T23:16:02.300 | 2026-04-02T19:21:01.487 |
| fkie_cve-2025-43417 | A path handling issue was addressed with improved logic. This issue is fixed in macOS Sonoma 14.8.4… | 2026-02-11T23:16:02.200 | 2026-04-02T19:20:43.050 |
| fkie_cve-2025-43403 | An authorization issue was addressed with improved state management. This issue is fixed in macOS S… | 2026-02-11T23:16:01.597 | 2026-02-13T14:50:34.183 |
| fkie_cve-2026-26031 | Frappe Learning Management System (LMS) is a learning system that helps users structure their conte… | 2026-02-11T22:15:52.540 | 2026-02-12T17:11:21.400 |
| fkie_cve-2026-26029 | sf-mcp-server is an implementation of Salesforce MCP server for Claude for Desktop. A command injec… | 2026-02-11T22:15:52.373 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-26023 | Dify is an open-source LLM app development platform. Prior to 1.13.0, a cross site scripting vulner… | 2026-02-11T22:15:52.233 | 2026-02-13T15:04:10.663 |
| fkie_cve-2026-26021 | set-in provides the set value of nested associative structure given array of keys. A prototype poll… | 2026-02-11T22:15:52.077 | 2026-02-13T21:43:27.900 |
| fkie_cve-2026-26019 | LangChain is a framework for building LLM-powered applications. Prior to 1.1.14, the RecursiveUrlLo… | 2026-02-11T22:15:51.910 | 2026-02-19T19:25:25.940 |
| fkie_cve-2026-26012 | vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitward… | 2026-02-11T22:15:51.703 | 2026-02-13T21:41:01.003 |
| fkie_cve-2024-50619 | Vulnerabilities in the My Account and User Management components in CIPPlanner CIPAce before 9.17 a… | 2026-02-11T22:15:50.020 | 2026-02-13T21:39:22.347 |
| fkie_cve-2024-50617 | Vulnerabilities in the File Download and Get File handler components in CIPPlanner CIPAce before 9.… | 2026-02-11T22:15:49.877 | 2026-02-13T21:38:59.390 |
| fkie_cve-2026-26158 | A flaw was found in BusyBox. This vulnerability allows an attacker to modify files outside of the i… | 2026-02-11T21:16:21.607 | 2026-05-05T21:16:21.820 |
| fkie_cve-2026-26157 | A flaw was found in BusyBox. Incomplete path sanitization in its archive extraction utilities allow… | 2026-02-11T21:16:21.400 | 2026-05-05T21:16:21.700 |
| fkie_cve-2026-26014 | Pion DTLS is a Go implementation of Datagram Transport Layer Security. Pion DTLS versions v1.0.0 th… | 2026-02-11T21:16:21.257 | 2026-02-25T17:40:28.640 |
| fkie_cve-2026-26010 | OpenMetadata is a unified metadata platform. Prior to 1.11.8, calls issued by the UI against /api/v… | 2026-02-11T21:16:21.117 | 2026-02-13T21:34:48.030 |
| fkie_cve-2026-25999 | Klaw is a self-service Apache Kafka Topic Management/Governance tool/portal. Prior to 2.10.2, there… | 2026-02-11T21:16:20.963 | 2026-02-26T23:25:10.173 |
| fkie_cve-2026-25994 | PJSIP is a free and open source multimedia communication library written in C. In 2.16 and earlier,… | 2026-02-11T21:16:20.813 | 2026-02-19T19:23:29.843 |
| fkie_cve-2026-25990 | Pillow is a Python imaging library. From 10.3.0 to before 12.1.1, an out-of-bounds write may be tri… | 2026-02-11T21:16:20.670 | 2026-04-30T21:16:30.170 |
| fkie_cve-2026-25935 | Vikunja is a todo-app to organize your life. Prior to 1.1.0, TaskGlanceTooltip.vue temporarily crea… | 2026-02-11T21:16:20.523 | 2026-02-20T20:17:54.320 |
| fkie_cve-2026-25924 | Kanboard is project management software focused on Kanban methodology. Prior to 1.2.50, a security … | 2026-02-11T21:16:19.283 | 2026-02-13T21:30:01.447 |
| fkie_cve-2026-25759 | Statmatic is a Laravel and Git powered content management system (CMS). From 6.0.0 to before 6.2.3,… | 2026-02-11T21:16:19.097 | 2026-02-18T19:37:29.220 |
| fkie_cve-2026-25633 | Statamic is a, Laravel + Git powered CMS designed for building websites. Prior to 5.73.6 and 6.2.5,… | 2026-02-11T21:16:18.910 | 2026-02-18T19:36:44.100 |
| fkie_cve-2026-25062 | Outline is a service that allows for collaborative documentation. Prior to 1.4.0, during the JSON i… | 2026-02-11T21:16:18.607 | 2026-02-20T18:10:18.630 |
| fkie_cve-2025-68663 | Outline is a service that allows for collaborative documentation. Prior to 1.1.0, a vulnerability w… | 2026-02-11T21:16:18.090 | 2026-02-20T18:14:25.373 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-4w6j-cm8p-vcvv |
5.4 (3.1)
|
Insufficient validation of untrusted input in TabGroups in Google Chrome prior to 148.0.7778.96 all… | 2026-05-06T21:31:41Z | 2026-05-07T01:05:54Z |
| ghsa-4p7v-xggp-73p4 |
4.3 (3.1)
|
Insufficient validation of untrusted input in Cast in Google Chrome prior to 148.0.7778.96 allowed … | 2026-05-06T21:31:41Z | 2026-05-07T01:05:54Z |
| ghsa-3rmx-2462-5g54 |
7.8 (3.1)
|
Inappropriate implementation in Chromoting in Google Chrome on Windows prior to 148.0.7778.96 allow… | 2026-05-06T21:31:41Z | 2026-05-07T01:05:53Z |
| ghsa-255w-3rfx-h4rv |
4.3 (3.1)
|
Inappropriate implementation in V8 in Google Chrome prior to 148.0.7778.96 allowed a remote attacke… | 2026-05-06T21:31:41Z | 2026-05-07T01:05:54Z |
| ghsa-wv44-78hj-q9gf |
8.3 (3.1)
|
Use after free in DevTools in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who ha… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-w5hh-7xrp-wmv3 |
4.3 (3.1)
|
Uninitialized Use in GPU in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had … | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-vc4p-4fpj-c36p |
8.1 (3.1)
|
Inappropriate implementation in Companion in Google Chrome on Mac prior to 148.0.7778.96 allowed a … | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-v875-65h5-w97q |
8.3 (3.1)
|
Use after free in TopChrome in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who h… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-px2j-fc7q-85fx |
4.3 (3.1)
|
Insufficient policy enforcement in Autofill in Google Chrome prior to 148.0.7778.96 allowed a remot… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-p7xq-3692-hrmr |
8.3 (3.1)
|
Insufficient validation of untrusted input in Navigation in Google Chrome prior to 148.0.7778.96 al… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-m89x-jh8w-76xc |
8.8 (3.1)
|
Integer overflow in Dawn in Google Chrome on Windows prior to 148.0.7778.96 allowed a remote attack… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-m7cv-wq8c-7836 |
3.1 (3.1)
|
Insufficient validation of untrusted input in DevTools in Google Chrome prior to 148.0.7778.96 allo… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-m6pj-5274-pwcq |
3.1 (3.1)
|
Insufficient validation of untrusted input in CORS in Google Chrome prior to 148.0.7778.96 allowed … | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-jrrr-m467-89v4 |
8.8 (3.1)
|
Use after free in WebRTC in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execu… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-jh98-89hc-9g7v |
4.2 (3.1)
|
Insufficient validation of untrusted input in FileSystem in Google Chrome prior to 148.0.7778.96 al… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-j52w-h358-ggww |
4.3 (3.1)
|
Insufficient validation of untrusted input in Permissions in Google Chrome prior to 148.0.7778.96 a… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-gwc3-hm5q-m633 |
5.3 (3.1)
|
Uninitialized Use in GPU in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had … | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-g824-5454-rwmq |
8.8 (3.1)
|
Out of bounds write in Media in Google Chrome on Mac, iOS prior to 148.0.7778.96 allowed a remote a… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-g28f-6ppf-f23m |
4.3 (3.1)
|
Inappropriate implementation in Media in Google Chrome prior to 148.0.7778.96 allowed a remote atta… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-frff-6649-89hj |
8.8 (3.1)
|
Use after free in Blink in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execut… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-fj9r-jc82-2cxp |
6.5 (3.1)
|
Uninitialized Use in WebCodecs in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-crff-gw66-2wvq |
8.3 (3.1)
|
Use after free in GPU in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had com… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-cm3m-44r2-vmp9 |
7.8 (3.1)
|
Insufficient validation of untrusted input in Updater in Google Chrome on Windows prior to 148.0.77… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-9q3j-rxj9-3656 |
4.3 (3.1)
|
Out of bounds read in Dawn in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to lea… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-9jcr-35p3-pjwq |
4.2 (3.1)
|
Insufficient data validation in DataTransfer in Google Chrome prior to 148.0.7778.96 allowed a remo… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-9c2c-f546-5wxv |
3.1 (3.1)
|
Insufficient validation of untrusted input in SiteIsolation in Google Chrome prior to 148.0.7778.96… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-82vp-jj7x-34qg |
8.8 (3.1)
|
Type Confusion in WebRTC in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execu… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-77w3-qw8r-vfhf |
4.3 (3.1)
|
Integer overflow in Network in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who h… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-75j5-jp23-gg4c |
8.3 (3.1)
|
Use after free in Navigation in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who … | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-7345-62fg-r8q2 |
8.8 (3.1)
|
Use after free in ReadingMode in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-43007 |
|
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) i… | rdiffweb | 2022-12-27T15:15:00Z | 2023-05-04T03:49:47.700028Z |
| pysec-2022-43006 |
|
Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.5. | rdiffweb | 2022-12-27T15:15:00Z | 2023-05-04T03:49:47.643896Z |
| pysec-2022-43005 |
|
Business Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.5. | rdiffweb | 2022-12-27T15:15:00Z | 2023-05-04T03:49:47.587629Z |
| pysec-2022-43014 |
|
A vulnerability, which was classified as problematic, has been found in cocagne pysrp up … | srp | 2022-12-27T11:15:00Z | 2023-05-04T03:49:48.139972Z |
| pysec-2022-43013 |
|
Slixmpp before 1.8.3 lacks SSL Certificate hostname validation in XMLStream, allowing an … | slixmpp | 2022-12-25T05:15:00Z | 2023-05-04T04:29:29.928881Z |
| pysec-2022-43017 |
|
An issue discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier allows … | wheel | 2022-12-23T00:15:00Z | 2023-05-04T03:49:49.039483Z |
| pysec-2022-43012 |
|
Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cau… | setuptools | 2022-12-23T00:15:00Z | 2023-05-04T04:29:29.797493Z |
| pysec-2022-42991 |
|
An issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers … | future | 2022-12-23T00:15:00Z | 2023-05-04T03:49:45.660760Z |
| pysec-2022-43004 |
|
Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.5.4. | rdiffweb | 2022-12-22T02:15:00Z | 2023-05-04T03:49:47.530589Z |
| pysec-2022-43003 |
|
Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.4. | rdiffweb | 2022-12-22T01:15:00Z | 2023-05-04T03:49:47.471955Z |
| pysec-2022-42988 |
|
A vulnerability classified as problematic was found in collective.contact.widget up to 1.… | collective-contact-widget | 2022-12-21T22:15:00Z | 2023-05-04T04:29:24.049172Z |
| pysec-2022-43151 |
9.1 (3.1)
|
Patchelf v0.9 was discovered to contain an out-of-bounds read via the function modifyRPat… | pypatchelf | 2022-12-19T22:15:00Z | 2024-11-25T22:09:33.909779Z |
| pysec-2022-43144 |
9.1 (3.1)
|
Patchelf v0.9 was discovered to contain an out-of-bounds read via the function modifyRPat… | patchelf | 2022-12-19T22:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2022-43016 |
|
A vulnerability, which was classified as problematic, has been found in UBI Reader up to … | ubi-reader | 2022-12-17T02:15:00Z | 2023-05-04T04:29:30.474506Z |
| pysec-2022-42994 |
|
GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to 0.1.5 are v… | guarddog | 2022-12-17T00:15:00Z | 2023-05-04T04:29:25.595529Z |
| pysec-2022-42993 |
|
GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to v0.1.8 are … | guarddog | 2022-12-16T23:15:00Z | 2023-05-04T04:29:25.550921Z |
| pysec-2022-43061 |
6.1 (3.1)
|
A vulnerability was found in django-photologue up to 3.15.1 and classified as problematic… | django-photologue | 2022-12-15T21:15:00+00:00 | 2023-11-07T20:24:24.147635+00:00 |
| pysec-2022-42990 |
|
A vulnerability was found in collective.task up to 3.0.9. It has been classified as probl… | collective-task | 2022-12-15T21:15:00Z | 2023-05-04T04:29:24.403566Z |
| pysec-2022-43060 |
5.9 (3.1)
|
The Apache Bookkeeper Java Client (before 4.14.6 and also 4.15.0) does not close the conn… | apache-bookkeeper-client | 2022-12-15T19:15:00+00:00 | 2023-11-07T20:24:23.853507+00:00 |
| pysec-2022-42989 |
|
A vulnerability, which was classified as problematic, has been found in collective.dms.ba… | collective-dms-basecontent | 2022-12-14T15:15:00Z | 2023-05-04T03:49:45.138352Z |
| pysec-2022-43155 |
5.5 (3.1)
|
wasm3 commit 7890a2097569fde845881e0b352d813573e371f9 was discovered to contain a segment… | pywasm3 | 2022-12-13T23:15:00Z | 2024-11-21T14:23:00.213494Z |
| pysec-2022-43062 |
7.8 (3.1)
|
A vulnerability classified as problematic was found in pacparser up to 1.3.x. Affected by… | pacparser | 2022-12-13T18:15:00+00:00 | 2023-11-07T20:24:25.809231+00:00 |
| pysec-2022-43002 |
|
Improper Privilege Management in GitHub repository ikus060/rdiffweb prior to 2.5.2. | rdiffweb | 2022-12-12T18:15:00Z | 2023-05-04T04:29:29.006053Z |
| pysec-2022-43011 |
|
Sentry is an error tracking and performance monitoring platform. In versions of the sentr… | sentry | 2022-12-10T01:15:00Z | 2023-05-04T04:29:29.699170Z |
| pysec-2022-42986 |
|
Certifi is a curated collection of Root Certificates for validating the trustworthiness o… | certifi | 2022-12-07T22:15:00Z | 2023-05-04T03:49:45.039819Z |
| pysec-2022-43063 |
9.8 (3.1)
|
Code injection in paddle.audio.functional.get_window in PaddlePaddle 2.4.0-rc0 allows arb… | paddlepaddle | 2022-12-07T09:15:00+00:00 | 2024-11-22T12:27:25.862098+00:00 |
| pysec-2022-42998 |
|
A directory traversal vulnerability in the SevenZipFile.extractall() function of the pyth… | py7zr | 2022-12-06T20:15:00Z | 2023-05-04T04:29:28.497759Z |
| pysec-2022-42997 |
|
Passeo is an open source python password generator. Versions prior to 1.0.5 rely on the p… | passeo | 2022-12-06T18:15:00Z | 2023-05-04T04:29:27.942516Z |
| pysec-2022-42992 |
|
All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to im… | gitpython | 2022-12-06T05:15:00Z | 2023-05-04T03:49:45.777062Z |
| pysec-2022-43175 |
6.1 (3.1)
|
Drag and Drop XBlock v2 implements a drag-and-drop style problem, where a learner has to … | xblock-drag-and-drop-v2 | 2022-11-28T21:15:00+00:00 | 2024-11-21T14:23:03.352390+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2712 | Malicious code in @evoja-web/redaction (npm) | 2026-04-16T09:33:49Z | 2026-04-23T20:50:49Z |
| mal-2026-2711 | Malicious code in @evoja-web/react-login (npm) | 2026-04-16T09:33:48Z | 2026-04-23T20:50:49Z |
| mal-2026-2710 | Malicious code in @evoja-web/create-react-project (npm) | 2026-04-16T09:33:46Z | 2026-04-23T20:50:49Z |
| mal-2026-2709 | Malicious code in @appleseed-apple/ac-sass-kit (npm) | 2026-04-16T09:29:32Z | 2026-04-23T20:50:49Z |
| mal-2026-2708 | Malicious code in @3stripes/toolkit (npm) | 2026-04-16T09:28:30Z | 2026-04-23T20:50:49Z |
| mal-2026-2707 | Malicious code in @3stripes/shared (npm) | 2026-04-16T09:28:29Z | 2026-04-23T20:50:49Z |
| mal-2026-2706 | Malicious code in @3stripes/sdk (npm) | 2026-04-16T09:28:28Z | 2026-04-23T20:50:49Z |
| mal-2026-2705 | Malicious code in @3stripes/core (npm) | 2026-04-16T09:28:27Z | 2026-04-23T20:50:49Z |
| mal-2026-2704 | Malicious code in @3stripes/config (npm) | 2026-04-16T09:28:27Z | 2026-04-23T20:50:49Z |
| mal-2026-2703 | Malicious code in @3stripes/components (npm) | 2026-04-16T09:28:26Z | 2026-04-23T20:50:49Z |
| mal-2026-2699 | Malicious code in robase-api (PyPI) | 2026-04-16T07:06:16Z | 2026-05-03T20:49:49Z |
| mal-2026-2907 | Malicious code in nj-logger (npm) | 2026-04-16T02:50:55Z | 2026-04-23T20:50:51Z |
| mal-2026-2913 | Malicious code in vite-plugin-compress-plus (npm) | 2026-04-16T01:34:06Z | 2026-04-23T20:50:52Z |
| mal-2026-2908 | Malicious code in pretty-logger-js (npm) | 2026-04-16T01:34:06Z | 2026-04-23T20:50:51Z |
| mal-2026-2911 | Malicious code in terminal-formatter (npm) | 2026-04-16T00:44:26Z | 2026-04-23T20:50:52Z |
| mal-2026-2912 | Malicious code in trgrip (npm) | 2026-04-15T23:43:20Z | 2026-04-23T20:50:52Z |
| mal-2026-2910 | Malicious code in tailwindthml-flips (npm) | 2026-04-15T23:43:20Z | 2026-04-23T20:50:52Z |
| mal-2026-2909 | Malicious code in tailwind-typography-cssstyle (npm) | 2026-04-15T23:43:20Z | 2026-04-23T20:50:52Z |
| mal-2026-2906 | Malicious code in swplayer-react-sl (npm) | 2026-04-15T23:21:12Z | 2026-04-23T20:50:52Z |
| mal-2026-2905 | Malicious code in simple-auth-basic (npm) | 2026-04-15T23:21:12Z | 2026-04-23T20:50:52Z |
| mal-2026-2904 | Malicious code in trackora-node (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:52Z |
| mal-2026-2903 | Malicious code in trackora-chain (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:52Z |
| mal-2026-2902 | Malicious code in lockedin-chai-chain (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:51Z |
| mal-2026-2901 | Malicious code in env_express (npm) | 2026-04-15T22:05:03Z | 2026-04-24T05:18:59Z |
| mal-2026-2900 | Malicious code in dotenv-pack (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:50Z |
| mal-2026-2899 | Malicious code in chai-use-chains (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:50Z |
| mal-2026-2898 | Malicious code in chai-str (npm) | 2026-04-15T22:05:03Z | 2026-04-29T12:53:28Z |
| mal-2026-2897 | Malicious code in chai-beta (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:50Z |
| mal-2026-2896 | Malicious code in chai-as-stream (npm) | 2026-04-15T22:05:03Z | 2026-04-29T12:53:28Z |
| mal-2026-2894 | Malicious code in chai-as-nobj (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:50Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2053 | Linux Kernel: Mehrere Schwachstellen | 2025-09-15T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2051 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-14T22:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2049 | gdk-pixbuf: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-09-14T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2046 | cPanel cPanel/WHM: Schwachstelle ermöglicht Manipulation von Dateien | 2025-09-14T22:00:00.000+00:00 | 2025-09-15T22:00:00.000+00:00 |
| wid-sec-w-2025-2045 | expat: Schwachstelle ermöglicht Denial of Service | 2025-09-14T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2044 | Microsoft Visual Studio Code: Schwachstelle ermöglicht Codeausführung | 2025-09-14T22:00:00.000+00:00 | 2025-09-14T22:00:00.000+00:00 |
| wid-sec-w-2025-2043 | IBM QRadar SIEM: Mehrere Schwachstellen | 2025-09-11T22:00:00.000+00:00 | 2025-10-01T22:00:00.000+00:00 |
| wid-sec-w-2025-2040 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-11T22:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2039 | CUPS: Mehrere Schwachstellen | 2025-09-11T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2036 | IBM WebSphere Application Server: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-09-10T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2034 | Erlang/OTP: Mehrere Schwachstellen | 2025-09-10T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2028 | Red Hat OpenShift Container Platform: Schwachstelle ermöglicht Codeausführung | 2025-09-10T22:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2026 | ffmpeg: Schwachstelle ermöglicht Denial of Service | 2025-09-10T22:00:00.000+00:00 | 2025-10-21T22:00:00.000+00:00 |
| wid-sec-w-2025-2023 | cURL: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-09-09T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2015 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2025-09-09T22:00:00.000+00:00 | 2025-09-11T22:00:00.000+00:00 |
| wid-sec-w-2025-2007 | Xen: Mehrere Schwachstellen | 2025-09-09T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2004 | Microsoft Azure und Microsoft Entra: Mehrere Schwachstellen | 2025-09-09T22:00:00.000+00:00 | 2025-09-10T22:00:00.000+00:00 |
| wid-sec-w-2025-2002 | libssh: Schwachstelle ermöglicht Denial of Service | 2025-09-09T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-1999 | Adobe Magento SessionReaper: Schwachstelle ermöglicht Umgehung von Sicherheitsmaßnahmen | 2025-09-08T22:00:00.000+00:00 | 2025-10-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1998 | ffmpeg: Schwachstelle ermöglicht Codeausführung und potenziell Denial of Service | 2025-09-08T22:00:00.000+00:00 | 2025-10-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1989 | SAP Patchday September 2025: Mehrere Schwachstellen | 2025-09-08T22:00:00.000+00:00 | 2025-09-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1988 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1987 | Keycloak: Mehrere Schwachstellen | 2025-09-07T22:00:00.000+00:00 | 2025-09-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1986 | Apache Jackrabbit: Schwachstelle ermöglicht Codeausführung | 2025-09-07T22:00:00.000+00:00 | 2025-09-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1981 | ImageMagick (MagickCore blob): Schwachstelle ermöglicht Codeausführung | 2025-09-04T22:00:00.000+00:00 | 2025-09-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1980 | IBM MQ: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-09-04T22:00:00.000+00:00 | 2025-10-01T22:00:00.000+00:00 |
| wid-sec-w-2025-1978 | Red Hat OpenShift GitOps (Argo CD): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-09-04T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1976 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-04T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1974 | Podman: Schwachstelle ermöglicht Manipulation von Dateien | 2025-09-04T22:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-1968 | pgAdmin: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-09-03T22:00:00.000+00:00 | 2025-10-01T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsma-25-037-01 | MicroDicom DICOM Viewer | 2025-02-06T07:00:00.000000Z | 2025-02-06T07:00:00.000000Z |
| icsa-25-037-04 | Trimble Cityworks (Update A) | 2025-02-06T07:00:00.000000Z | 2025-02-11T07:00:00.000000Z |
| icsa-25-051-01 | ABB ASPECT-Enterprise NEXUS and MATRIX Series | 2025-02-05T00:30:00.000000Z | 2025-02-05T00:30:00.000000Z |
| icsa-25-035-08 | AutomationDirect C-more EA9 HMI | 2025-02-04T07:00:00.000000Z | 2025-02-04T07:00:00.000000Z |
| icsa-25-035-05 | Schneider Electric Web Designer for Modicon | 2025-02-04T07:00:00.000000Z | 2025-02-04T07:00:00.000000Z |
| icsa-25-035-03 | Elber Communications Equipment | 2025-02-04T07:00:00.000000Z | 2025-02-04T07:00:00.000000Z |
| icsa-25-035-02 | Rockwell Automation GuardLogix 5380 and 5580 (Update A) | 2025-02-04T07:00:00.000000Z | 2025-02-18T07:00:00.000000Z |
| icsa-25-035-01 | Western Telematic Inc NPS Series, DSM Series, CPM Series | 2025-02-04T07:00:00.000000Z | 2025-02-04T07:00:00.000000Z |
| icsma-25-030-01 | Contec Health CMS8000 Patient Monitor (Update A) | 2025-01-30T07:00:00.000000Z | 2025-02-25T07:00:00.000000Z |
| icsa-25-030-05 | Rockwell Automation FactoryTalk AssetCentre | 2025-01-30T07:00:00.000000Z | 2025-01-30T07:00:00.000000Z |
| icsa-25-030-04 | Rockwell Automation KEPServer | 2025-01-30T07:00:00.000000Z | 2025-01-30T07:00:00.000000Z |
| icsa-25-030-02 | New Rock Technologies Cloud Connected Devices | 2025-01-30T07:00:00.000000Z | 2025-01-30T07:00:00.000000Z |
| icsa-25-028-05 | Rockwell Automation DataMosaix Private Cloud | 2025-01-28T07:00:00.000000Z | 2025-01-28T07:00:00.000000Z |
| icsa-25-028-04 | Rockwell Automation FactoryTalk View Site Edition | 2025-01-28T07:00:00.000000Z | 2025-01-28T07:00:00.000000Z |
| icsa-25-028-03 | Rockwell Automation FactoryTalk | 2025-01-28T07:00:00.000000Z | 2025-01-28T07:00:00.000000Z |
| icsa-25-028-02 | Schneider Electric Power Logic | 2025-01-28T07:00:00.000000Z | 2025-01-28T07:00:00.000000Z |
| icsa-25-023-06 | HMS Networks Ewon Flexy 202 | 2025-01-23T07:00:00.000000Z | 2025-01-23T07:00:00.000000Z |
| icsa-25-023-01 | mySCADA myPRO Manager | 2025-01-23T07:00:00.000000Z | 2025-01-23T07:00:00.000000Z |
| icsa-25-051-02 | ABB FLXEON Controllers | 2025-01-23T06:30:00.000000Z | 2025-02-14T00:30:00.000000Z |
| va-25-022-01 | ECOVACS lawnmower and vacuum vulnerabilities | 2025-01-23T00:53:24Z | 2025-01-23T00:53:24Z |
| va-25-021-01 | Fedora Repository fedoraIntCallUser default credentials and insecure archive extraction | 2025-01-23T00:00:00Z | 2025-01-23T00:00:00Z |
| icsa-25-021-03 | ZF Roll Stability Support Plus (RSSPlus) | 2025-01-21T07:00:00.000000Z | 2025-01-21T07:00:00.000000Z |
| icsa-25-016-05 | Fuji Electric Alpha5 SMART | 2025-01-16T07:00:00.000000Z | 2025-01-16T07:00:00.000000Z |
| va-25-017-01 | TrueFiling authorization bypass via user-controlled keys | 2025-01-16T00:00:00Z | 2025-02-20T00:00:00Z |
| icsa-25-028-01 | B&R Automation Runtime | 2025-01-15T03:30:00.000000Z | 2025-01-15T03:30:00.000000Z |
| icsa-25-037-02 | Schneider Electric EcoStruxure (Update D) | 2025-01-14T07:00:00.000000Z | 2026-04-02T06:00:00.000000Z |
| icsa-25-014-04 | Belledonne Communications Linphone-Desktop | 2025-01-14T07:00:00.000000Z | 2025-01-14T07:00:00.000000Z |
| icsa-25-035-04 | Schneider Electric EcoStruxure Power Monitoring Expert (PME) (Update A) | 2025-01-14T05:00:00.000000Z | 2025-04-08T04:00:00.000000Z |
| icsa-25-035-07 | Schneider Electric Pro-face GP-Pro EX and Remote HMI (Update A) | 2025-01-14T00:00:00.000000Z | 2025-09-09T04:00:00.000000Z |
| icsa-25-035-06 | Schneider Electric Modicon M340 and BMXNOE0100/0110, BMXNOR0200H | 2025-01-14T00:00:00.000000Z | 2025-08-12T04:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-asaftdios-dhcpv6-cli-zf3ztv | Cisco Adaptive Security Appliance Software, Firepower Threat Defense Software, IOS Software, and IOS XE Software IPv6 DHCP (DHCPv6) Client Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-asa5500x-entropy-6v9bhvyp | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Low-Entropy Keys Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ap-cli-dos-tc2ekepu | Cisco Access Point Software Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ap-assoc-dos-d2sunwk2 | Cisco Access Point Software Association Request Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-aironetap-cmdinj-6bjt4fl8 | Cisco Access Point Software Command Injection Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-iosxr-load-infodisc-9rdor5fq | Cisco IOS XR Software Bootloader Unauthenticated Information Disclosure Vulnerability | 2023-03-08T16:00:00+00:00 | 2024-11-13T15:00:06+00:00 |
| cisco-sa-bfd-xmrescbt | Cisco IOS XR Software for ASR 9000 Series Routers Bidirectional Forwarding Detection Denial of Service Vulnerability | 2023-03-08T16:00:00+00:00 | 2023-03-08T16:00:00+00:00 |
| cisco-sa-webex-xss-yn8hhsmj | Cisco Webex App for Web Cross-Site Scripting Vulnerability | 2023-03-01T16:00:00+00:00 | 2023-03-01T16:00:00+00:00 |
| cisco-sa-ip-phone-cmd-inj-kmfynvcp | Cisco IP Phone 6800, 7800, and 8800 Series Web UI Vulnerabilities | 2023-03-01T16:00:00+00:00 | 2023-03-20T20:45:17+00:00 |
| cisco-sa-finesse-proxy-dos-vy5dqhrv | Cisco Finesse Reverse Proxy VPN-less Access to Finesse Desktop Denial of Service Vulnerability | 2023-03-01T16:00:00+00:00 | 2023-03-02T20:35:00+00:00 |
| cisco-sa-cuic-infodisc-ssrf-84zbmwvk | Cisco Unified Intelligence Center Vulnerabilities | 2023-03-01T16:00:00+00:00 | 2023-03-01T16:00:00+00:00 |
| cisco-sa-cisco-pi-epnm-xss-mzshh2j | Cisco Prime Infrastructure and Evolved Programmable Network Manager Stored Cross-Site Scripting Vulnerability | 2023-03-01T16:00:00+00:00 | 2023-04-06T15:31:34+00:00 |
| cisco-sa-ucsm-bkpsky-h8fcqgsa | Cisco FXOS Software and UCS Manager Software Configuration Backup Static Key Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-03-24T18:16:56+00:00 |
| cisco-sa-nxos-x509v3-unsupportedconfig-scrtabuk | Cisco NX-OS Software SSH X.509v3 Certificate Authentication with Unsupported Remote Authorization Method Privilege Escalation Issues | 2023-02-22T16:00:00+00:00 | 2023-02-22T16:00:00+00:00 |
| cisco-sa-nxos-cli-cmdinject-euqvk9u | Cisco NX-OS Software CLI Command Injection Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-02-22T16:00:00+00:00 |
| cisco-sa-nxfp-cmdinj-xxbzjtr | Cisco Firepower 4100 Series, Firepower 9300 Security Appliances, and UCS Fabric Interconnects Command Injection Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-02-22T16:00:00+00:00 |
| cisco-sa-elyfex-dos-gfvcbyx | Cisco Nexus 9300-FX3 Series Fabric Extender for UCS Fabric Interconnects Authentication Bypass Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-02-22T16:00:00+00:00 |
| cisco-sa-capic-csrfv-dmx6kswv | Cisco Application Policy Infrastructure Controller and Cisco Cloud Network Controller Cross-Site Request Forgery Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-03-29T21:04:31+00:00 |
| cisco-sa-aci-lldp-dos-yscnzopx | Cisco Nexus 9000 Series Fabric Switches in ACI Mode Link Layer Discovery Protocol Memory Leak Denial of Service Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-02-22T16:00:00+00:00 |
| cisco-sa-nexus-dashboard-xss-xc5bcgsq | Cisco Nexus Dashboard Cross-Site Scripting Vulnerability | 2023-02-15T16:00:00+00:00 | 2023-02-15T16:00:00+00:00 |
| cisco-sa-ndb-dnsdos-bysczosu | Cisco Nexus Dashboard Denial of Service Vulnerability | 2023-02-15T16:00:00+00:00 | 2023-02-15T16:00:00+00:00 |
| cisco-sa-ise-xss-ubfhg75c | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | 2023-02-15T16:00:00+00:00 | 2023-02-15T16:00:00+00:00 |
| cisco-sa-esa-sma-privesc-9dvkfpj8 | Cisco Email Security Appliance and Cisco Secure Email and Web Manager Vulnerabilities | 2023-02-15T16:00:00+00:00 | 2023-02-16T17:32:38+00:00 |
| cisco-sa-clamav-xxe-tcszduhn | ClamAV DMG File Parsing XML Entity Expansion Vulnerability Affecting Cisco Products: February 2023 | 2023-02-15T16:00:00+00:00 | 2023-02-15T20:15:58+00:00 |
| cisco-sa-clamav-q8dthcy | ClamAV HFS+ Partition Scanning Buffer Overflow Vulnerability Affecting Cisco Products: February 2023 | 2023-02-15T16:00:00+00:00 | 2023-02-22T14:09:19+00:00 |
| cisco-sa-sb-rv-afu-exxwa65v | Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Arbitrary File Upload Vulnerability | 2023-02-01T16:00:00+00:00 | 2023-02-01T16:00:00+00:00 |
| cisco-sa-ise-xxe-inj-gecehy58 | Cisco Identity Services Engine XML External Entity Injection Vulnerability | 2023-02-01T16:00:00+00:00 | 2023-02-02T14:24:08+00:00 |
| cisco-sa-ise-os-injection-pxhksdm | Cisco Identity Services Engine Privilege Escalation Vulnerabilities | 2023-02-01T16:00:00+00:00 | 2023-02-01T16:00:00+00:00 |
| cisco-sa-iox-8whgn5dl | Cisco IOx Application Hosting Environment Command Injection Vulnerability | 2023-02-01T16:00:00+00:00 | 2023-06-01T15:34:21+00:00 |
| cisco-sa-cisco-pi-xss-pu6dnfd9 | Cisco Prime Infrastructure Reflected Cross-Site Scripting Vulnerability | 2023-02-01T16:00:00+00:00 | 2023-02-01T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-31509 | nfc: nci: fix circular locking dependency in nci_close_device | 2026-04-02T00:00:00.000Z | 2026-04-30T01:12:16.000Z |
| msrc_cve-2026-31508 | net: openvswitch: Avoid releasing netdev before teardown completes | 2026-04-02T00:00:00.000Z | 2026-05-01T14:46:44.000Z |
| msrc_cve-2026-31507 | net/smc: fix double-free of smc_spd_priv when tee() duplicates splice pipe buffer | 2026-04-02T00:00:00.000Z | 2026-04-30T01:11:14.000Z |
| msrc_cve-2026-31506 | net: bcmasp: fix double free of WoL irq | 2026-04-02T00:00:00.000Z | 2026-05-06T14:52:57.000Z |
| msrc_cve-2026-31505 | iavf: fix out-of-bounds writes in iavf_get_ethtool_stats() | 2026-04-02T00:00:00.000Z | 2026-05-06T14:38:01.000Z |
| msrc_cve-2026-31504 | net: fix fanout UAF in packet_release() via NETDEV_UP race | 2026-04-02T00:00:00.000Z | 2026-04-30T01:07:11.000Z |
| msrc_cve-2026-31503 | udp: Fix wildcard bind conflict check when using hash2 | 2026-04-02T00:00:00.000Z | 2026-04-30T01:12:38.000Z |
| msrc_cve-2026-31502 | team: fix header_ops type confusion with non-Ethernet ports | 2026-04-02T00:00:00.000Z | 2026-04-30T01:45:07.000Z |
| msrc_cve-2026-31500 | Bluetooth: btintel: serialize btintel_hw_error() with hci_req_sync_lock | 2026-04-02T00:00:00.000Z | 2026-04-30T01:11:31.000Z |
| msrc_cve-2026-31499 | Bluetooth: L2CAP: Fix deadlock in l2cap_conn_del() | 2026-04-02T00:00:00.000Z | 2026-05-06T14:44:21.000Z |
| msrc_cve-2026-31498 | Bluetooth: L2CAP: Fix ERTM re-init and zero pdu_len infinite loop | 2026-04-02T00:00:00.000Z | 2026-04-30T01:47:57.000Z |
| msrc_cve-2026-31497 | Bluetooth: btusb: clamp SCO altsetting table indices | 2026-04-02T00:00:00.000Z | 2026-04-30T01:07:53.000Z |
| msrc_cve-2026-31496 | netfilter: nf_conntrack_expect: skip expectations in other netns via proc | 2026-04-02T00:00:00.000Z | 2026-04-30T01:05:23.000Z |
| msrc_cve-2026-31495 | netfilter: ctnetlink: use netlink policy range checks | 2026-04-02T00:00:00.000Z | 2026-04-30T01:10:44.000Z |
| msrc_cve-2026-31494 | net: macb: use the current queue number for stats | 2026-04-02T00:00:00.000Z | 2026-04-30T01:13:23.000Z |
| msrc_cve-2026-31493 | RDMA/efa: Fix use of completion ctx after free | 2026-04-02T00:00:00.000Z | 2026-05-06T14:38:27.000Z |
| msrc_cve-2026-31492 | RDMA/irdma: Initialize free_qp completion before using it | 2026-04-02T00:00:00.000Z | 2026-04-30T01:48:09.000Z |
| msrc_cve-2026-31489 | spi: meson-spicc: Fix double-put in remove path | 2026-04-02T00:00:00.000Z | 2026-05-06T14:38:09.000Z |
| msrc_cve-2026-31488 | drm/amd/display: Do not skip unrelated mode changes in DSC validation | 2026-04-02T00:00:00.000Z | 2026-05-06T14:52:49.000Z |
| msrc_cve-2026-31487 | spi: use generic driver_override infrastructure | 2026-04-02T00:00:00.000Z | 2026-05-06T14:52:35.000Z |
| msrc_cve-2026-31486 | hwmon: (pmbus/core) Protect regulator operations with mutex | 2026-04-02T00:00:00.000Z | 2026-05-06T14:52:27.000Z |
| msrc_cve-2026-31485 | spi: spi-fsl-lpspi: fix teardown order issue (UAF) | 2026-04-02T00:00:00.000Z | 2026-04-30T01:10:31.000Z |
| msrc_cve-2026-31483 | s390/syscalls: Add spectre boundary for syscall dispatch table | 2026-04-02T00:00:00.000Z | 2026-04-30T01:10:57.000Z |
| msrc_cve-2026-31482 | s390/entry: Scrub r12 register on kernel entry | 2026-04-02T00:00:00.000Z | 2026-04-30T01:44:39.000Z |
| msrc_cve-2026-31480 | tracing: Fix potential deadlock in cpu hotplug with osnoise | 2026-04-02T00:00:00.000Z | 2026-04-30T01:47:35.000Z |
| msrc_cve-2026-31478 | ksmbd: replace hardcoded hdr2_len with offsetof() in smb2_calc_max_out_buf_len() | 2026-04-02T00:00:00.000Z | 2026-05-01T01:39:24.000Z |
| msrc_cve-2026-31477 | ksmbd: fix memory leaks and NULL deref in smb2_lock() | 2026-04-02T00:00:00.000Z | 2026-04-30T14:38:48.000Z |
| msrc_cve-2026-31476 | ksmbd: do not expire session on binding failure | 2026-04-02T00:00:00.000Z | 2026-04-30T01:53:14.000Z |
| msrc_cve-2026-31474 | can: isotp: fix tx.buf use-after-free in isotp_sendmsg() | 2026-04-02T00:00:00.000Z | 2026-04-29T15:01:21.000Z |
| msrc_cve-2026-31473 | media: mc, v4l2: serialize REINIT and REQBUFS with req_queue_mutex | 2026-04-02T00:00:00.000Z | 2026-04-29T14:49:06.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0411 | Kwetsbaarheden verholpen in Oracle Database producten | 2024-10-17T13:15:19.595269Z | 2024-10-17T13:15:19.595269Z |
| ncsc-2024-0410 | Kwetsbaarheden verholpen in Solarwinds Platform | 2024-10-17T06:09:32.053449Z | 2024-10-17T06:09:32.053449Z |
| ncsc-2024-0409 | Kwetsbaarheid verholpen in Solarwinds Web Helpdesk | 2024-10-17T06:08:32.057774Z | 2024-10-17T06:08:32.057774Z |
| ncsc-2024-0408 | Kwetsbaarheden verholpen in Splunk Enterprise | 2024-10-15T15:18:24.694416Z | 2024-10-15T15:18:24.694416Z |
| ncsc-2024-0407 | Kwetsbaarheden verholpen in Moxa systemen | 2024-10-14T12:14:38.572540Z | 2024-10-14T12:14:38.572540Z |
| ncsc-2024-0406 | Kwetsbaarheden verholpen in Gitlab Enterprise Edition en Community Edition | 2024-10-11T08:23:31.975727Z | 2024-10-11T08:23:31.975727Z |
| ncsc-2024-0405 | Kwetsbaarheden verholpen in Palo Alto Expedition | 2024-10-10T12:02:12.890277Z | 2024-10-10T12:02:12.890277Z |
| ncsc-2024-0404 | Kwetsbaarheden verholpen in Juniper JunOS en JunOS Evolved | 2024-10-10T11:19:54.515278Z | 2024-10-10T11:19:54.515278Z |
| ncsc-2024-0403 | Kwetsbaarheid verholpen in Mozilla Firefox | 2024-10-10T07:20:38.171954Z | 2024-10-10T07:20:38.171954Z |
| ncsc-2024-0402 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2024-10-09T13:38:09.912496Z | 2024-10-09T13:38:09.912496Z |
| ncsc-2024-0401 | Kwetsbaarheid verholpen in Ivanti Endpoint Manager Mobile | 2024-10-09T11:21:34.434721Z | 2024-10-09T11:21:34.434721Z |
| ncsc-2024-0400 | Kwetsbaarheden verholpen in Ivanti Avalanche | 2024-10-09T10:45:10.558311Z | 2024-10-09T10:45:10.558311Z |
| ncsc-2024-0399 | Kwetsbaarheden verholpen in Ivanti Cloud Services Appliance | 2024-10-09T09:49:35.398654Z | 2024-10-09T09:49:35.398654Z |
| ncsc-2024-0398 | Kwetsbaarheden verholpen in Ivanti Connect Secure en Policy Secure | 2024-10-09T09:47:33.556285Z | 2024-10-11T07:03:14.760313Z |
| ncsc-2024-0397 | Kwetsbaarheden verholpen in Microsoft System Center | 2024-10-08T20:02:55.249830Z | 2024-10-08T20:02:55.249830Z |
| ncsc-2024-0396 | Kwetsbaarheden verholpen in Microsoft Office | 2024-10-08T20:00:57.142744Z | 2024-10-08T20:00:57.142744Z |
| ncsc-2024-0395 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2024-10-08T19:59:28.385237Z | 2024-10-08T19:59:28.385237Z |
| ncsc-2024-0394 | Kwetsbaarheden verholpen in Microsoft SQL Server Power BI Report Server | 2024-10-08T19:58:15.839568Z | 2024-10-08T19:58:15.839568Z |
| ncsc-2024-0393 | Kwetsbaarheden verholpen in Microsoft Azure componenten | 2024-10-08T19:57:08.426643Z | 2024-10-08T19:57:08.426643Z |
| ncsc-2024-0392 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-10-08T19:55:28.028805Z | 2024-10-08T19:55:28.028805Z |
| ncsc-2024-0391 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-10-08T13:55:56.095947Z | 2024-10-08T13:55:56.095947Z |
| ncsc-2024-0390 | Kwetsbaarheden verholpen in Siemens producten | 2024-10-08T13:49:37.486004Z | 2024-10-08T13:49:37.486004Z |
| ncsc-2024-0389 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2024-10-04T10:11:42.963861Z | 2024-10-04T10:11:42.963861Z |
| ncsc-2024-0388 | Kwetsbaarheden verholpen in Draytek Vigor routers | 2024-10-04T09:52:41.945864Z | 2024-10-04T09:52:41.945864Z |
| ncsc-2024-0387 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2024-10-02T09:07:21.241299Z | 2024-10-02T09:07:21.241299Z |
| ncsc-2024-0386 | Kwetsbaarheden verholpen in Zimbra | 2024-10-02T07:02:43.365395Z | 2024-10-10T12:50:25.238470Z |
| ncsc-2024-0385 | Kwetsbaarheden verholpen in Foxit PDF Editor en PDF Reader | 2024-09-30T09:41:20.295003Z | 2024-09-30T09:41:20.295003Z |
| ncsc-2024-0384 | Kwetsbaarheden ontdekt in CUPS | 2024-09-27T08:45:53.798141Z | 2024-10-02T08:45:09.718543Z |
| ncsc-2024-0383 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS | 2024-09-26T09:00:05.136774Z | 2024-09-26T09:00:05.136774Z |
| ncsc-2024-0382 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2024-09-26T08:52:21.805564Z | 2024-09-26T08:52:21.805564Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10183-1 | build-20260202-2.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:20202-1 | Security update for python-pip | 2026-02-11T19:17:08Z | 2026-02-11T19:17:08Z |
| opensuse-su-2026:20203-1 | Security update for openjpeg2 | 2026-02-11T19:15:23Z | 2026-02-11T19:15:23Z |
| opensuse-su-2026:20199-1 | Security update for micropython | 2026-02-11T16:38:19Z | 2026-02-11T16:38:19Z |
| opensuse-su-2026:20198-1 | Security update for xorg-x11-server | 2026-02-11T11:25:45Z | 2026-02-11T11:25:45Z |
| opensuse-su-2026:10182-1 | snpguest-0.10.0-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10181-1 | sccache-0.13.0~1-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10180-1 | rustup-1.28.2~0-3.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10179-1 | python311-maturin-1.11.5-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10178-1 | libmunge2-0.5.18-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10177-1 | gnutls-3.8.12-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10176-1 | freerdp2-2.11.7-4.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10175-1 | cargo-audit-0.22.1~git0.efcde93-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10174-1 | assimp-devel-6.0.4-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10173-1 | apptainer-1.4.5-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:20193-1 | Security update for orthanc, gdcm, orthanc-authorization, orthanc-dicomweb, orthanc-gdcm, orthanc-indexer, orthanc-mysql, orthanc-neuro, orthanc-postgresql, orthanc-python, orthanc-stl, orthanc-tcia, orthanc-wsi, python-pyorthanc | 2026-02-10T22:29:40Z | 2026-02-10T22:29:40Z |
| opensuse-su-2026:20191-1 | Security update for trivy | 2026-02-10T21:52:10Z | 2026-02-10T21:52:10Z |
| opensuse-su-2026:20192-1 | Security update for tailscale | 2026-02-10T21:45:05Z | 2026-02-10T21:45:05Z |
| opensuse-su-2026:10172-1 | wicked2nm-1.4.1-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10171-1 | lemon-3.51.2-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10170-1 | keylime-ima-policy-0.2.8+116-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10169-1 | libp11-kit0-0.26.2-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10168-1 | openQA-5.1770718745.ce2072d3-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10167-1 | libxml2-16-2.14.5-3.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10166-1 | libsoup-2_4-1-2.74.3-15.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10165-1 | keylime-config-7.14.0+0-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10164-1 | go1.25-1.25.7-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10163-1 | go1.24-1.24.13-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:20183-1 | Security update for chromium | 2026-02-07T14:42:36Z | 2026-02-07T14:42:36Z |
| opensuse-su-2026:20184-1 | Security update for python-Django | 2026-02-07T13:45:17Z | 2026-02-07T13:45:17Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:8334 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-15T17:31:38+00:00 | 2026-05-05T13:37:53+00:00 |
| rhsa-2026:8324 | Red Hat Security Advisory: rhc security update | 2026-04-15T15:40:22+00:00 | 2026-05-08T15:00:42+00:00 |
| rhsa-2026:8322 | Red Hat Security Advisory: rhc security update | 2026-04-15T15:31:17+00:00 | 2026-05-08T15:01:16+00:00 |
| rhsa-2026:8325 | Red Hat Security Advisory: buildah, crun, podman, runc, and skopeo security update | 2026-04-15T15:24:38+00:00 | 2026-05-08T15:02:55+00:00 |
| rhsa-2026:8317 | Red Hat Security Advisory: squid:4 security update | 2026-04-15T14:42:07+00:00 | 2026-04-30T02:55:08+00:00 |
| rhsa-2026:8315 | Red Hat Security Advisory: thunderbird security update | 2026-04-15T14:07:46+00:00 | 2026-04-28T18:40:38+00:00 |
| rhsa-2026:8314 | Red Hat Security Advisory: delve security update | 2026-04-15T14:04:27+00:00 | 2026-05-08T15:00:42+00:00 |
| rhsa-2026:8312 | Red Hat Security Advisory: bind security update | 2026-04-15T14:02:51+00:00 | 2026-04-28T18:40:28+00:00 |
| rhsa-2026:8311 | Red Hat Security Advisory: perl-YAML-Syck security update | 2026-04-15T13:54:32+00:00 | 2026-04-17T01:27:25+00:00 |
| rhsa-2026:8290 | Red Hat Security Advisory: thunderbird security update | 2026-04-15T10:57:46+00:00 | 2026-04-28T18:40:25+00:00 |
| rhsa-2026:8284 | Red Hat Security Advisory: thunderbird security update | 2026-04-15T10:54:21+00:00 | 2026-04-28T18:40:34+00:00 |
| rhsa-2026:8289 | Red Hat Security Advisory: thunderbird security update | 2026-04-15T10:48:56+00:00 | 2026-04-28T18:40:26+00:00 |
| rhsa-2026:8286 | Red Hat Security Advisory: thunderbird security update | 2026-04-15T10:46:26+00:00 | 2026-04-28T18:40:36+00:00 |
| rhsa-2026:8287 | Red Hat Security Advisory: thunderbird security update | 2026-04-15T10:42:50+00:00 | 2026-04-28T18:40:23+00:00 |
| rhsa-2026:8288 | Red Hat Security Advisory: thunderbird security update | 2026-04-15T10:42:35+00:00 | 2026-04-28T18:40:25+00:00 |
| rhsa-2026:8285 | Red Hat Security Advisory: thunderbird security update | 2026-04-15T10:31:30+00:00 | 2026-04-28T18:40:35+00:00 |
| rhsa-2026:8291 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-15T10:20:34+00:00 | 2026-05-08T12:52:38+00:00 |
| rhsa-2026:8259 | Red Hat Security Advisory: vim security update | 2026-04-15T07:35:40+00:00 | 2026-05-08T14:46:22+00:00 |
| rhsa-2026:8229 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.13.6 security update | 2026-04-15T02:15:09+00:00 | 2026-05-08T16:03:56+00:00 |
| rhsa-2026:8218 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.8.5 security update | 2026-04-15T01:45:31+00:00 | 2026-05-08T16:03:56+00:00 |
| rhsa-2026:8211 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-14T22:57:31+00:00 | 2026-04-23T18:11:40+00:00 |
| rhsa-2026:8167 | Red Hat Security Advisory: Red Hat Web Terminal Operator 1.15.0 release. | 2026-04-14T18:58:52+00:00 | 2026-05-08T16:03:55+00:00 |
| rhsa-2026:8165 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-14T17:59:27+00:00 | 2026-04-27T16:49:32+00:00 |
| rhsa-2026:8155 | Red Hat Security Advisory: bind9.16 security update | 2026-04-14T17:40:23+00:00 | 2026-04-28T18:40:27+00:00 |
| rhsa-2026:8159 | Red Hat Security Advisory: Red Hat Build of Apache Camel 4.14 for Quarkus 3.27 update is now available (RHBQ 3.27.3.GA) | 2026-04-14T17:20:53+00:00 | 2026-05-07T18:06:40+00:00 |
| rhsa-2026:7109 | Red Hat Security Advisory: Red Hat build of Quarkus 3.20.6 release and security update | 2026-04-14T17:18:52+00:00 | 2026-05-07T18:06:27+00:00 |
| rhsa-2026:8096 | Red Hat Security Advisory: perl:5.32 security update | 2026-04-14T16:21:58+00:00 | 2026-04-14T19:34:00+00:00 |
| rhsa-2026:8151 | Red Hat Security Advisory: Submariner v0.22 security fixes and container updates | 2026-04-14T15:55:27+00:00 | 2026-05-08T16:33:54+00:00 |
| rhsa-2026:8093 | Red Hat Security Advisory: pcs security update | 2026-04-14T15:32:28+00:00 | 2026-05-05T14:43:50+00:00 |
| rhsa-2026:8119 | Red Hat Security Advisory: squid security update | 2026-04-14T15:09:13+00:00 | 2026-04-30T02:55:07+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-676336 | SSA-676336: OpenSSH Vulnerabilities in SCALANCE X-200 and X-300/X408 Switches | 2021-09-14T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-549234 | SSA-549234: Denial-of-Service Vulnerability in SIMATIC NET CP Modules | 2021-09-14T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-535997 | SSA-535997: Cleartext Storage of Sensitive Information in Multiple SIMATIC Products | 2021-09-14T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-535380 | SSA-535380: Command Injection Vulnerability in Siveillance OIS Affecting Several Building Management Systems | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-500748 | SSA-500748: Denial-of-Service Vulnerabilities in SIPROTEC 5 Devices | 2021-09-14T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-453715 | SSA-453715: Deserialization Vulnerability in CCOM Communication Component of Desigo CC Family | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-413407 | SSA-413407: Path Traversal Vulnerability in Teamcenter Active Workspace | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-334944 | SSA-334944: Vulnerability in SINEMA Remote Connect Server | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-330339 | SSA-330339: Web Vulnerabilities in SINEC NMS | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-316383 | SSA-316383: NumberJack Vulnerability in LOGO! CMR and SIMATIC RTU 3000 devices | 2021-09-14T00:00:00Z | 2022-02-08T00:00:00Z |
| ssa-288459 | SSA-288459: Heap Overflow Vulnerability in RFID terminals | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-208530 | SSA-208530: File parsing vulnerabilities in IFC adapter in NX | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-150692 | SSA-150692: Multiple Vulnerabilities in RUGGEDCOM ROX | 2021-09-14T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-109294 | SSA-109294: Scene File Parsing Vulnerability in Simcenter STAR-CCM+ Viewer | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-816035 | SSA-816035: Code Execution Vulnerability in SINEMA Remote Connect Client | 2021-08-19T00:00:00Z | 2021-08-19T00:00:00Z |
| ssa-938030 | SSA-938030: DGN and PAR File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.2.0.2 | 2021-08-10T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-865327 | SSA-865327: Incorrect Authorization Vulnerability in Industrial Products | 2021-08-10T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-830194 | SSA-830194: Missing Authentication Vulnerability in S7-1200 Devices | 2021-08-10T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-818688 | SSA-818688: Multiple Vulnerabilities in Solid Edge before SE2021MP7 | 2021-08-10T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-756744 | SSA-756744: OS Command Injection Vulnerability in SINEC NMS | 2021-08-10T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-679335 | SSA-679335: Multiple Vulnerabilities in Embedded FTP Server of SIMATIC CP Modules | 2021-08-10T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-553445 | SSA-553445: DNS "Name:Wreck" Vulnerabilities in Multiple Siemens Energy AGT and SGT solutions | 2021-08-10T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-365397 | SSA-365397: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.2.0.1 | 2021-08-10T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-309571 | SSA-309571: IPU 2021.1 Vulnerabilities in Siemens Industrial Products using Intel CPUs (June 2021) | 2021-08-10T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-158827 | SSA-158827: Denial-of-Service Vulnerability in Automation License Manager | 2021-08-10T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-789208 | SSA-789208: Multiple Vulnerabilities (INFRA:HALT) in Interniche IP-Stack based Low Voltage Devices | 2021-08-04T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-941426 | SSA-941426: Multiple LLDP Vulnerabilities in Industrial Products | 2021-07-13T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-913875 | SSA-913875: Frame Aggregation and Fragmentation Vulnerabilities in 802.11 | 2021-07-13T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-772220 | SSA-772220: OpenSSL Vulnerabilities in Industrial Products | 2021-07-13T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-729965 | SSA-729965: TLS Certificate Validation Vulnerability in SINUMERIK Integrate Operate Client | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21224-1 | Security update for corosync | 2026-04-10T11:19:52Z | 2026-04-10T11:19:52Z |
| suse-su-2026:1247-1 | Security update for nghttp2 | 2026-04-10T10:34:43Z | 2026-04-10T10:34:43Z |
| suse-su-2026:1248-1 | Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T09:13:03Z | 2026-04-10T09:13:03Z |
| suse-su-2026:21216-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-04-10T08:14:40Z | 2026-04-10T08:14:40Z |
| suse-su-2026:21020-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-04-10T08:14:40Z | 2026-04-10T08:14:40Z |
| suse-su-2026:1244-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2026-04-10T08:04:54Z | 2026-04-10T08:04:54Z |
| suse-su-2026:1242-1 | Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T07:04:48Z | 2026-04-10T07:04:48Z |
| suse-su-2026:21164-1 | Security update for glibc | 2026-04-10T06:44:31Z | 2026-04-10T06:44:31Z |
| suse-su-2026:21019-1 | Security update for glibc | 2026-04-10T06:44:31Z | 2026-04-10T06:44:31Z |
| suse-su-2026:1239-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise 15 SP6) | 2026-04-09T19:04:33Z | 2026-04-09T19:04:33Z |
| suse-su-2026:21157-1 | Security update for MozillaFirefox | 2026-04-09T17:17:04Z | 2026-04-09T17:17:04Z |
| suse-su-2026:1237-1 | Security update for the Linux Kernel (Live Patch 47 for SUSE Linux Enterprise 15 SP4) | 2026-04-09T17:04:59Z | 2026-04-09T17:04:59Z |
| suse-su-2026:21018-1 | Security update for ovmf | 2026-04-09T15:10:40Z | 2026-04-09T15:10:40Z |
| suse-su-2026:21161-1 | Security update for ovmf | 2026-04-09T15:05:01Z | 2026-04-09T15:05:01Z |
| suse-su-2026:21159-1 | Security update for python-gi-docgen | 2026-04-09T14:40:15Z | 2026-04-09T14:40:15Z |
| suse-su-2026:1236-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6) | 2026-04-09T14:22:32Z | 2026-04-09T14:22:32Z |
| suse-su-2026:21091-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21090-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21061-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21060-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21089-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21088-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21059-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21058-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21087-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| suse-su-2026:21086-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| suse-su-2026:21057-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| suse-su-2026:21056-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| suse-su-2026:21085-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21084-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:21693 | Important: haproxy security update | 2025-11-18T00:00:00Z | 2025-11-19T10:52:41Z |
| alsa-2025:21691 | Important: haproxy security update | 2025-11-18T00:00:00Z | 2025-11-24T12:50:19Z |
| alsa-2025:21628 | Critical: lasso security update | 2025-11-17T00:00:00Z | 2025-11-19T10:11:06Z |
| alsa-2025:21462 | Critical: lasso security update | 2025-11-17T00:00:00Z | 2025-11-19T09:40:25Z |
| alsa-2025:21398 | Moderate: kernel security update | 2025-11-17T00:00:00Z | 2025-11-19T14:49:27Z |
| alsa-2025:21397 | Moderate: kernel-rt security update | 2025-11-17T00:00:00Z | 2025-11-19T14:52:45Z |
| alsa-2025:21281 | Important: firefox security update | 2025-11-13T00:00:00Z | 2025-11-25T09:59:17Z |
| alsa-2025:21280 | Important: firefox security update | 2025-11-13T00:00:00Z | 2025-11-24T12:36:14Z |
| alsa-2025:21255 | Moderate: openssl security update | 2025-11-13T00:00:00Z | 2025-12-01T08:04:03Z |
| alsa-2025:21248 | Moderate: openssl security update | 2025-11-13T00:00:00Z | 2025-11-25T09:31:36Z |
| alsa-2025:21232 | Important: container-tools:rhel8 security update | 2025-11-13T00:00:00Z | 2025-11-20T10:07:52Z |
| alsa-2025:21220 | Important: podman security update | 2025-11-13T00:00:00Z | 2025-11-25T10:45:01Z |
| alsa-2025:21142 | Important: python-kdcproxy security update | 2025-11-12T00:00:00Z | 2025-11-24T12:51:27Z |
| alsa-2025:21140 | Important: idm:DL1 security update | 2025-11-12T00:00:00Z | 2025-11-20T09:13:27Z |
| alsa-2025:21139 | Important: python-kdcproxy security update | 2025-11-12T00:00:00Z | 2025-11-19T09:41:31Z |
| alsa-2025:21111 | Important: bind9.18 security update | 2025-11-12T00:00:00Z | 2025-12-01T08:06:30Z |
| alsa-2025:21110 | Important: bind security update | 2025-11-12T00:00:00Z | 2025-11-19T09:39:10Z |
| alsa-2025:21038 | Important: kea security update | 2025-11-11T00:00:00Z | 2025-12-05T08:28:57Z |
| alsa-2025:21036 | Important: pcs security update | 2025-11-11T00:00:00Z | 2025-12-05T08:31:28Z |
| alsa-2025:21035 | Moderate: xorg-x11-server-Xwayland security update | 2025-11-11T00:00:00Z | 2025-11-24T09:01:21Z |
| alsa-2025:21034 | Important: bind security update | 2025-11-11T00:00:00Z | 2025-11-24T09:00:19Z |
| alsa-2025:21032 | Important: libsoup3 security update | 2025-11-11T00:00:00Z | 2025-11-24T08:58:48Z |
| alsa-2025:21030 | Important: expat security update | 2025-11-11T00:00:00Z | 2025-11-24T08:57:33Z |
| alsa-2025:21020 | Important: sssd security update | 2025-11-11T00:00:00Z | 2026-01-14T12:41:29Z |
| alsa-2025:21015 | Moderate: vim security update | 2025-11-11T00:00:00Z | 2025-11-24T08:56:33Z |
| alsa-2025:21013 | Moderate: libssh security update | 2025-11-11T00:00:00Z | 2025-11-24T08:54:57Z |
| alsa-2025:21002 | Important: squid security update | 2025-11-11T00:00:00Z | 2025-11-24T08:53:45Z |
| alsa-2025:20998 | Important: libtiff security update | 2025-11-11T00:00:00Z | 2025-11-24T08:51:54Z |
| alsa-2025:20994 | Important: ipa security update | 2025-11-11T00:00:00Z | 2025-12-05T09:05:25Z |
| alsa-2025:20983 | Important: podman security update | 2025-11-11T00:00:00Z | 2025-11-25T10:54:40Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-151 | Heap-buffer-overflow in od_ec_dec_normalize | 2024-03-07T00:04:15.146851Z | 2024-04-24T14:26:12.240231Z |
| osv-2024-149 | Heap-use-after-free in get_ls_tile_buffers | 2024-03-07T00:01:26.874963Z | 2024-04-24T14:25:20.329505Z |
| osv-2024-144 | UNKNOWN READ in spvtools::val::ValidateAccessChain | 2024-02-29T00:12:28.292465Z | 2024-04-23T14:17:09.435427Z |
| osv-2024-142 | Heap-buffer-overflow in gf_gz_decompress_payload_ex | 2024-02-29T00:06:19.763458Z | 2024-04-18T14:20:45.279874Z |
| osv-2024-140 | Container-overflow in WasmEdge::LLVM::Compiler::compile | 2024-02-28T00:12:59.500279Z | 2024-04-29T11:16:32.126190Z |
| osv-2024-138 | Security exception in com.github.javaparser.GeneratedJavaParser.Expression | 2024-02-28T00:05:23.810172Z | 2024-04-04T14:17:31.086359Z |
| osv-2024-137 | Global-buffer-overflow in igraph_dl_yylex | 2024-02-27T00:01:01.786536Z | 2024-04-03T14:17:44.548648Z |
| osv-2024-135 | Heap-buffer-overflow in BS_ReadByte | 2024-02-25T00:05:28.923786Z | 2024-04-18T14:10:11.037617Z |
| osv-2024-123 | Heap-use-after-free in dxf_tables_read | 2024-02-22T00:12:27.847169Z | 2024-04-29T11:24:19.340311Z |
| osv-2024-120 | Security exception in com.spotify.docker.client.shaded.com.fasterxml.jackson.databind.util.TokenBuffer | 2024-02-21T00:00:31.892843Z | 2024-02-21T00:00:31.893273Z |
| osv-2024-118 | Heap-buffer-overflow in sav_process_row | 2024-02-20T00:01:08.095087Z | 2024-04-29T11:19:02.854462Z |
| osv-2024-117 | Security exception in com.spotify.docker.client.shaded.com.fasterxml.jackson.databind.util.TokenBuffer | 2024-02-19T00:05:05.793082Z | 2024-02-19T00:05:05.793781Z |
| osv-2024-114 | Segv on unknown address in lj_BC_RET1 | 2024-02-17T00:12:33.617106Z | 2024-04-17T14:24:32.039372Z |
| osv-2024-112 | Stack-overflow in boost::read_graphviz_detail::parser::parse_subgraph | 2024-02-16T00:05:47.896843Z | 2026-04-24T14:13:21.773842Z |
| osv-2024-104 | Heap-buffer-overflow in mrb_memsearch | 2024-02-15T00:00:54.473735Z | 2024-02-15T00:00:54.474295Z |
| osv-2024-103 | Heap-use-after-free in xmlRemoveID | 2024-02-15T00:00:51.271367Z | 2024-02-15T00:00:51.271973Z |
| osv-2024-102 | Heap-buffer-overflow in mrb_memsearch | 2024-02-15T00:00:47.674187Z | 2024-02-15T00:00:47.674761Z |
| osv-2024-98 | UNKNOWN READ in PackLinuxElf32::adjABS | 2024-02-11T00:14:29.715614Z | 2024-04-29T11:31:53.382431Z |
| osv-2024-96 | Heap-buffer-overflow in mrb_memsearch | 2024-02-11T00:00:45.699847Z | 2024-02-14T14:17:20.000446Z |
| osv-2024-89 | Security exception in com.puppycrawl.tools.checkstyle.JavaAstVisitor.getInnerBopAst | 2024-02-09T00:03:08.288815Z | 2024-04-01T14:22:58.864850Z |
| osv-2024-88 | Heap-use-after-free in fuzzer_execute_ex | 2024-02-09T00:02:29.396272Z | 2024-02-09T00:02:29.396615Z |
| osv-2024-86 | Security exception in org.threeten.bp.format.DateTimeFormatterBuilder$CompositePrinterParser.parse | 2024-02-09T00:00:11.154046Z | 2026-05-08T14:31:17.736503Z |
| osv-2024-85 | Security exception in com.github.javaparser.ast.validator.TreeVisitorValidator.accept | 2024-02-08T00:13:58.690460Z | 2026-05-04T14:09:11.112779Z |
| osv-2024-82 | Heap-use-after-free in xmlValidatePopElement | 2024-02-08T00:02:35.342535Z | 2024-02-08T00:02:35.343044Z |
| osv-2024-81 | Heap-use-after-free in xmlRemoveID | 2024-02-08T00:02:18.078478Z | 2024-02-08T00:02:18.079086Z |
| osv-2024-80 | Stack-buffer-overflow in line_join_points | 2024-02-07T00:03:02.923052Z | 2024-04-29T11:39:24.480321Z |
| osv-2024-79 | Heap-double-free in supported_features | 2024-02-07T00:03:00.459996Z | 2024-02-07T00:03:00.460359Z |
| osv-2024-77 | Heap-use-after-free in xmlRemoveID | 2024-02-06T00:06:09.284671Z | 2024-02-06T00:06:09.285249Z |
| osv-2024-74 | Heap-buffer-overflow in hts_log | 2024-02-04T00:02:45.988846Z | 2024-04-29T11:31:45.626304Z |
| osv-2024-73 | Heap-buffer-overflow in pdf_finalize_string | 2024-02-04T00:02:39.648902Z | 2024-04-29T11:36:07.742568Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2022-0010 | enum_map macro can cause UB when `Enum` trait is incorrectly implemented | 2022-02-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0009 | Failure to verify the public key of a `SignedEnvelope` against the `PeerId` in a `PeerRecord` | 2022-02-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0041 | Unsoundness of AtomicCell<*64> arithmetics on 32-bit targets that support Atomic*64 | 2022-02-05T12:00:00Z | 2022-08-04T13:56:30Z |
| rustsec-2022-0081 | json is unmaintained | 2022-02-01T12:00:00Z | 2023-08-25T17:52:15Z |
| rustsec-2022-0048 | xml-rs is Unmaintained | 2022-01-26T12:00:00Z | 2023-05-05T07:39:54Z |
| rustsec-2022-0040 | Multiple soundness issues in `owning_ref` | 2022-01-26T12:00:00Z | 2023-10-14T21:21:18Z |
| rustsec-2022-0007 | A malicious coder can get unsound access to TCell or TLCell memory | 2022-01-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0006 | Data race in `Iter` and `IterMut` | 2022-01-23T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0005 | crate has been renamed to `ftdi-embedded-hal` | 2022-01-22T12:00:00Z | 2022-01-22T18:27:42Z |
| rustsec-2022-0043 | Improper validation of Windows paths could lead to directory traversal attack | 2022-01-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0003 | Space bug in `clean_text` | 2022-01-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0044 | `markdown` (1.0.0 and higher) is maintained | 2022-01-17T12:00:00Z | 2025-04-28T10:35:27Z |
| rustsec-2022-0039 | project abandoned | 2022-01-17T12:00:00Z | 2022-08-02T18:15:56Z |
| rustsec-2022-0036 | project abandoned | 2022-01-17T12:00:00Z | 2022-08-02T17:34:36Z |
| rustsec-2022-0082 | Improper validation of Windows paths could lead to directory traversal attack | 2022-01-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0078 | Use-after-free due to a lifetime error in `Vec::into_iter()` | 2022-01-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0002 | Unsoundness in `dashmap` references | 2022-01-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0001 | lmdb is unmaintained, use lmdb-rkv instead | 2022-01-05T12:00:00Z | 2022-01-05T16:02:27Z |
| rustsec-2022-0008 | Delegate functions are missing `Send` bound | 2022-01-02T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0004 | Stack overflow in rustc_serialize when parsing deeply nested JSON | 2022-01-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0134 | rental is unmaintained, author has moved on | 2021-12-27T12:00:00Z | 2022-03-06T11:02:04Z |
| rustsec-2021-0133 | cargo-download is unmaintained | 2021-12-25T12:00:00Z | 2021-12-25T18:20:22Z |
| rustsec-2021-0142 | dotenv is Unmaintained | 2021-12-24T12:00:00Z | 2022-08-30T19:40:13Z |
| rustsec-2021-0141 | dotenv is Unmaintained | 2021-12-24T12:00:00Z | 2022-08-30T19:40:13Z |
| rustsec-2021-0130 | Use after free in lru crate | 2021-12-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0132 | Integer overflow in the bundled Brotli C library | 2021-12-20T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2021-0131 | Integer overflow in the bundled Brotli C library | 2021-12-20T12:00:00Z | 2021-12-21T20:51:30Z |
| rustsec-2021-0129 | Invalid handling of `X509_verify_cert()` internal errors in libssl | 2021-12-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0128 | Incorrect Lifetime Bounds on Closures in `rusqlite` | 2021-12-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0153 | `encoding` is unmaintained | 2021-12-05T12:00:00Z | 2023-03-12T07:17:34Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-elk-2026-33459 | Uncontrolled Resource Consumption in Kibana Leading to Denial of Service | 2026-04-13T05:38:35.203Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-33458 | Server-Side Request Forgery (SSRF) in Kibana One Workflow Leading to Information Disclosure | 2026-04-13T05:38:33.681Z | 2026-04-17T00:10:47.507Z |
| bit-airflow-2026-34538 | Apache Airflow: Authorization bypass in DagRun wait endpoint (XCom exposure) | 2026-04-13T05:38:18.100Z | 2026-04-13T06:11:47.324Z |
| bit-airflow-2025-57735 | Apache Airflow: Airflow Logout Not Invalidating JWT | 2026-04-13T05:37:57.108Z | 2026-04-13T06:11:47.324Z |
| bit-activemq-2026-40046 | Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT: Missing fix for CVE-2025-66168: MQTT control packet remaining length field is not properly validated | 2026-04-13T05:36:23.428Z | 2026-04-13T06:11:47.324Z |
| bit-joomla-2026-23899 | Joomla! Core - [20260306] - Improper access check in webservice endpoints | 2026-04-10T08:49:24.143Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-23898 | Joomla! Core - [20260305] - Arbitrary file deletion in com_joomlaupdate | 2026-04-10T08:49:22.196Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21632 | Joomla! Core - [20260304] - XSS vectors in various article title outputs | 2026-04-10T08:49:20.111Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21631 | Joomla! Core - [20260303] - XSS vector in com_associations comparison view | 2026-04-10T08:49:17.625Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21630 | Joomla! Core - [20260302] - SQL injection in com_content articles webservice endpoint | 2026-04-10T08:49:15.352Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21629 | Joomla! Core - [20260301] - ACL hardening in com_ajax | 2026-04-10T08:49:13.196Z | 2026-04-10T09:26:18.172Z |
| bit-parse-2026-39381 | Parse Server's Endpoint `/sessions/me` bypasses `_Session` `protectedFields` | 2026-04-09T14:37:43.255Z | 2026-04-09T15:05:10.890Z |
| bit-parse-2026-39321 | Parse Server has a login timing side-channel reveals user existence | 2026-04-09T14:37:40.125Z | 2026-04-09T15:05:10.890Z |
| bit-cosign-2026-39395 | Cosign's verify-blob-attestation reports false positive when payload parsing fails | 2026-04-09T08:37:13.235Z | 2026-04-17T00:10:47.507Z |
| bit-activemq-2026-34197 | Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ: Authenticated users could perform RCE via Jolokia MBeans | 2026-04-09T08:36:52.749Z | 2026-04-18T09:10:03.541Z |
| bit-activemq-2026-33227 | Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ Web, Apache ActiveMQ: Improper Limitation of a Pathname to a Restricted Classpath Directory | 2026-04-09T08:36:51.132Z | 2026-04-09T09:13:50.652Z |
| bit-cassandra-2026-27315 | Apache Cassandra: cqlsh history sensitive information leak | 2026-04-09T08:36:45.141Z | 2026-04-10T09:26:18.172Z |
| bit-parse-2026-35200 | Parse Server has a file upload Content-Type override via extension mismatch | 2026-04-08T14:51:33.993Z | 2026-04-08T15:15:28.618Z |
| bit-discourse-2026-34947 | Discourse: Staged user custom fields are exposed on public invite pages | 2026-04-08T14:45:19.092Z | 2026-04-08T15:15:28.618Z |
| bit-discourse-2026-27481 | Discourse: Hidden tag visibility bypass on tag routes | 2026-04-08T14:43:31.143Z | 2026-04-08T15:15:28.618Z |
| bit-jupyterhub-2026-33709 | JupyterHub has an Open Redirect Vulnerability | 2026-04-08T08:40:42.508Z | 2026-04-08T09:14:18.943Z |
| bit-discourse-2026-33415 | Discourse: Improper Access Control in discourse-ai Allows Unauthorized Category Content Exposure | 2026-04-07T08:44:29.473Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33300 | Discourse: Hidden group names and access metadata are exposed to moderators through the `category-chatables` endpoint | 2026-04-07T08:44:13.358Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33185 | Discourse: Group SMTP test endpoint susceptible to SSRF | 2026-04-07T08:44:07.641Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33074 | Discourse: Vulnerability in discourse-subscriptions plugin allowing users to self-grant to higher tier subscriptions | 2026-04-07T08:44:05.677Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33073 | discourse-subscriptions plugin leaking stripe API key in multisite environment | 2026-04-07T08:44:03.688Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32951 | Discourse: Authorization bypass in oneboxer via user-controlled category id | 2026-04-07T08:44:01.614Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32620 | Discourse: Missing post-level authorization allows whisper metadata disclosure | 2026-04-07T08:43:59.465Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32619 | Discourse: Insufficient topic visibility check allows unauthorized poll manipulation in private categories | 2026-04-07T08:43:57.232Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32618 | Discourse: Unauthorized channel membership inference via excluded_memberships_channel_id | 2026-04-07T08:43:55.159Z | 2026-04-07T09:14:25.218Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-mf93723 | Within HostnameError | 2026-01-30T16:03:24.521286Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xr85161 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:02:54.934169Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ec15228 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:02:54.964872Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bd53293 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:02:54.709597Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wq07901 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:01:54.911193Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-np17404 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:58:24.395667Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oa33370 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:57:24.977544Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yc48827 | Within HostnameError | 2026-01-30T15:56:24.532632Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hv28992 | Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3 | 2026-01-30T15:55:24.450018Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dp30290 | processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input | 2026-01-30T15:52:54.729374Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oh86281 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:52:25.054249Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ll43287 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:50:54.603931Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ej58111 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:50:24.547860Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qw16951 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:48:54.464404Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zp68963 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:47:54.288582Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sv79070 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:47:54.520743Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ad41794 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:47:54.368234Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tr11635 | Cancelling a query (e | 2026-01-30T15:46:54.229170Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gc16599 | Cancelling a query (e | 2026-01-30T15:46:54.243517Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xd92996 | Cancelling a query (e | 2026-01-30T15:46:24.650971Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ok45738 | Within HostnameError | 2026-01-30T15:45:53.967263Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rx06615 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:45:24.056160Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fj56296 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:45:23.960354Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bt39952 | Moby is an open source container framework developed by Docker Inc | 2026-01-30T15:45:23.955705Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uy81473 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:44:54.187987Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bs24435 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:44:54.166999Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-me47927 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T15:43:24.066833Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bq46815 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:43:24.142238Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pa85871 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T15:42:24.099846Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bv91860 | Within HostnameError | 2026-01-30T15:42:23.881650Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2005-ALE-013 | Vulnérabilité dans Citrix Metaframe Presentation | 2005-10-07T00:00:00.000000 | 2013-06-06T00:00:00.000000 |
| certa-2005-ale-012 | Vulnérabilité de Netscape 8 | 2005-09-27T00:00:00.000000 | 2006-04-12T00:00:00.000000 |
| certa-2005-ale-011 | Vulnérabilité de HelixPlayer et RealPlayer | 2005-09-27T00:00:00.000000 | 2005-10-10T00:00:00.000000 |
| certa-2005-ale-010 | Vulnérabilité dans Qpopper | 2005-09-27T00:00:00.000000 | 2005-09-27T00:00:00.000000 |
| CERTA-2005-ALE-012 | Vulnérabilité de Netscape 8 | 2005-09-27T00:00:00.000000 | 2006-04-12T00:00:00.000000 |
| CERTA-2005-ALE-011 | Vulnérabilité de HelixPlayer et RealPlayer | 2005-09-27T00:00:00.000000 | 2005-10-10T00:00:00.000000 |
| CERTA-2005-ALE-010 | Vulnérabilité dans Qpopper | 2005-09-27T00:00:00.000000 | 2005-09-27T00:00:00.000000 |
| certa-2005-ale-009 | Vulnérabilité dans Mozilla Thunderbird | 2005-09-23T00:00:00.000000 | 2005-09-23T00:00:00.000000 |
| CERTA-2005-ALE-009 | Vulnérabilité dans Mozilla Thunderbird | 2005-09-23T00:00:00.000000 | 2005-09-23T00:00:00.000000 |
| certa-2005-ale-008 | Possible vulnérabilité de la bibliothèque msdds.dll | 2005-08-19T00:00:00.000000 | 2006-04-12T00:00:00.000000 |
| CERTA-2005-ALE-008 | Possible vulnérabilité de la bibliothèque msdds.dll | 2005-08-19T00:00:00.000000 | 2006-04-12T00:00:00.000000 |
| certa-2005-ale-007 | Exploitation de la faille MS05-039 | 2005-08-16T00:00:00.000000 | 2005-08-16T00:00:00.000000 |
| CERTA-2005-ALE-007 | Exploitation de la faille MS05-039 | 2005-08-16T00:00:00.000000 | 2005-08-16T00:00:00.000000 |
| certa-2005-ale-006 | Vulnérabilité du protocole RDP de Microsoft | 2005-07-18T00:00:00.000000 | 2005-08-10T00:00:00.000000 |
| CERTA-2005-ALE-006 | Vulnérabilité du protocole RDP de Microsoft | 2005-07-18T00:00:00.000000 | 2005-08-10T00:00:00.000000 |
| certa-2005-ale-005 | Vulnérabilité d'Internet Explorer | 2005-07-02T00:00:00.000000 | 2005-07-13T00:00:00.000000 |
| CERTA-2005-ALE-005 | Vulnérabilité d'Internet Explorer | 2005-07-02T00:00:00.000000 | 2005-07-13T00:00:00.000000 |
| certa-2005-ale-004 | Propagation du ver MYTOB | 2005-06-03T00:00:00.000000 | 2005-06-03T00:00:00.000000 |
| CERTA-2005-ALE-004 | Propagation du ver MYTOB | 2005-06-03T00:00:00.000000 | 2005-06-03T00:00:00.000000 |
| certa-2005-ale-003 | Multiples vulnérabilités de Firefox | 2005-05-09T00:00:00.000000 | 2005-05-12T00:00:00.000000 |
| CERTA-2005-ALE-003 | Multiples vulnérabilités de Firefox | 2005-05-09T00:00:00.000000 | 2005-05-12T00:00:00.000000 |
| certa-2005-ale-002 | Exploitation d'une vulnérabilité dans Oracle Database Server | 2005-04-28T00:00:00.000000 | 2005-04-28T00:00:00.000000 |
| CERTA-2005-ALE-002 | Exploitation d'une vulnérabilité dans Oracle Database Server | 2005-04-28T00:00:00.000000 | 2005-04-28T00:00:00.000000 |
| certa-2005-ale-001 | Vulnérabilité d'Internet Explorer | 2005-01-03T00:00:00.000000 | 2005-01-11T00:00:00.000000 |
| CERTA-2005-ALE-001 | Vulnérabilité d'Internet Explorer | 2005-01-03T00:00:00.000000 | 2005-01-11T00:00:00.000000 |
| certa-2004-ale-014 | Exploitation massive d'une faille du forum phpBB | 2004-12-22T00:00:00.000000 | 2004-12-22T00:00:00.000000 |
| CERTA-2004-ALE-014 | Exploitation massive d'une faille du forum phpBB | 2004-12-22T00:00:00.000000 | 2004-12-22T00:00:00.000000 |
| certa-2004-ale-013 | Vulnérabilité dans le composant ActiveX DHTML Edit d'Internet Explorer | 2004-12-20T00:00:00.000000 | 2004-12-20T00:00:00.000000 |
| CERTA-2004-ALE-013 | Vulnérabilité dans le composant ActiveX DHTML Edit d'Internet Explorer | 2004-12-20T00:00:00.000000 | 2004-12-20T00:00:00.000000 |
| certa-2004-ale-012 | Vulnérabilité d'Internet Explorer | 2004-11-09T00:00:00.000000 | 2004-12-02T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2026-AVI-0049 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| CERTFR-2026-AVI-0048 | Multiples vulnérabilités dans Wireshark | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| CERTFR-2026-AVI-0047 | Vulnérabilité dans F5 NGINX Ingress Controller | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0046 | Multiples vulnérabilités dans les produits Microsoft | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0045 | Multiples vulnérabilités dans Microsoft Azure | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0044 | Multiples vulnérabilités dans Microsoft Windows | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0043 | Multiples vulnérabilités dans Microsoft Office | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0042 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0041 | Multiples vulnérabilités dans les produits Elastic | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0040 | Multiples vulnérabilités dans Google Chrome | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0039 | Multiples vulnérabilités dans Node.js | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0038 | Multiples vulnérabilités dans les produits Mozilla | 2026-01-14T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0037 | Multiples vulnérabilités dans Typo3 | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0036 | Multiples vulnérabilités dans Suricata | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0035 | Multiples vulnérabilités dans les produits Fortinet | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0034 | Multiples vulnérabilités dans les produits SAP | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0033 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0032 | Multiples vulnérabilités dans les produits Siemens | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0031 | Vulnérabilité dans le greffon VSCode pour Spring CLI | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0046 | Multiples vulnérabilités dans les produits Microsoft | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0045 | Multiples vulnérabilités dans Microsoft Azure | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0044 | Multiples vulnérabilités dans Microsoft Windows | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0043 | Multiples vulnérabilités dans Microsoft Office | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0042 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0041 | Multiples vulnérabilités dans les produits Elastic | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0040 | Multiples vulnérabilités dans Google Chrome | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0039 | Multiples vulnérabilités dans Node.js | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0038 | Multiples vulnérabilités dans les produits Mozilla | 2026-01-14T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| CERTFR-2026-AVI-0037 | Multiples vulnérabilités dans Typo3 | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0036 | Multiples vulnérabilités dans Suricata | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2023-000049 | Multiple vulnerabilities in Cybozu Garoon | 2023-05-15T14:29+09:00 | 2024-05-24T15:26+09:00 |
| jvndb-2023-000047 | Beekeeper Studio vulnerable to code injection | 2023-05-12T16:42+09:00 | 2024-05-24T16:17+09:00 |
| jvndb-2023-000043 | Multiple vulnerabilities in MicroEngine Mailform | 2023-05-10T13:57+09:00 | 2024-05-24T17:07+09:00 |
| jvndb-2023-001774 | Multiple vulnerabilities in SolarView Compact | 2023-05-09T16:09+09:00 | 2024-06-27T13:30+09:00 |
| jvndb-2023-000045 | WordPress Plugin "VK Blocks" and "VK All in One Expansion Unit" vulnerable to cross-site scripting | 2023-05-09T15:14+09:00 | 2024-05-24T17:05+09:00 |
| jvndb-2023-000042 | WordPress Plugin "Newsletter" vulnerable to cross-site scripting | 2023-05-09T14:42+09:00 | 2024-06-13T16:14+09:00 |
| jvndb-2023-000046 | SR-7100VN vulnerable to privilege escalation | 2023-05-09T13:58+09:00 | 2024-05-24T16:13+09:00 |
| jvndb-2023-000041 | LINE WORKS Drive Explorer vulnerable to code injection | 2023-05-08T15:16+09:00 | 2024-05-23T17:03+09:00 |
| jvndb-2023-000044 | JINS MEME CORE uses a hard-coded cryptographic key | 2023-05-08T15:13+09:00 | 2024-06-13T16:19+09:00 |
| jvndb-2023-001639 | Heap-based buffer overflow vulnerability in OMRON CX-Drive | 2023-04-25T14:31+09:00 | 2024-05-27T18:11+09:00 |
| jvndb-2023-000040 | WordPress Plugin "Appointment and Event Booking Calendar for WordPress - Amelia" vulnerable to cross-site scripting | 2023-04-24T13:41+09:00 | 2024-05-28T16:59+09:00 |
| jvndb-2023-000035 | Improper restriction of XML external entity references (XXE) in Shinseiyo Sogo Soft | 2023-04-19T14:49+09:00 | 2024-05-29T16:58+09:00 |
| jvndb-2023-000039 | WordPress plugin "LIQUID SPEECH BALLOON" vulnerable to cross-site request forgery | 2023-04-19T14:24+09:00 | 2024-05-28T16:56+09:00 |
| jvndb-2023-000038 | EC-CUBE plugin "NEXT ENGINE Integration Plugin (for EC-CUBE 2.0 series)" vulnerable to authentication bypass | 2023-04-19T14:06+09:00 | 2024-05-30T15:11+09:00 |
| jvndb-2023-001534 | Security Issues in FINS protocol | 2023-04-18T13:58+09:00 | 2024-05-23T17:35+09:00 |
| jvndb-2023-000037 | Joruri Gw vulnerable to cross-site scripting | 2023-04-17T14:19+09:00 | 2024-05-30T16:19+09:00 |
| jvndb-2023-000036 | API server of TONE Family vulnerable to authentication bypass using an alternate path | 2023-04-17T14:04+09:00 | 2023-04-17T14:04+09:00 |
| jvndb-2023-000034 | JB Inquiry form vulnerable to exposure of private personal information to an unauthorized actor | 2023-04-14T15:48+09:00 | 2024-05-29T16:44+09:00 |
| jvndb-2023-000033 | Trend Micro Security may insecurely load Dynamic Link Libraries | 2023-04-14T15:44+09:00 | 2024-04-26T17:48+09:00 |
| jvndb-2023-001493 | Multiple mobile printing apps for Android vulnerable to improper intent handling | 2023-04-13T11:09+09:00 | 2024-05-30T15:48+09:00 |
| jvndb-2023-001492 | Vulnerability in JP1/VERITAS | 2023-04-12T15:01+09:00 | 2023-04-12T15:01+09:00 |
| jvndb-2023-001411 | Yokogawa Electric CENTUM series vulnerable to cleartext storage of sensitive information | 2023-04-06T14:59+09:00 | 2024-05-29T18:23+09:00 |
| jvndb-2023-000032 | Improper restriction of XML external entity references (XXE) in National land numerical information data conversion tool | 2023-04-04T15:22+09:00 | 2024-06-04T15:56+09:00 |
| jvndb-2023-000031 | Multiple vulnerabilities in JustSystems products | 2023-04-04T15:22+09:00 | 2024-05-29T17:32+09:00 |
| jvndb-2023-001402 | JTEKT ELECTRONIC Screen Creator Advance 2 vulnerable to improper restriction of operations within the bounds of a memory buffer | 2023-04-03T16:24+09:00 | 2024-06-04T17:15+09:00 |
| jvndb-2023-001400 | CONPROSYS HMI System(CHS) vulnerable to SQL injection | 2023-04-03T16:19+09:00 | 2023-04-03T16:19+09:00 |
| jvndb-2023-000030 | HAProxy vulnerable to HTTP request/response smuggling | 2023-03-31T15:54+09:00 | 2024-06-04T16:17+09:00 |
| jvndb-2023-000029 | Multiple vulnerabilities in Seiko Solutions SkyBridge MB-A100/A110/A200/A130 SkySpider MB-R210 | 2023-03-31T15:54+09:00 | 2024-05-27T17:08+09:00 |
| jvndb-2023-000028 | baserCMS vulnerable to arbitrary file uploads | 2023-03-27T13:39+09:00 | 2024-06-06T17:31+09:00 |
| jvndb-2023-000027 | ELECOM WAB-MAT registers its windows service executable with an unquoted file path | 2023-03-24T14:35+09:00 | 2024-06-03T17:36+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-13962 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13962) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13961 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13961) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13960 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13960) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13959 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13959) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13958 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13958) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13957 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13957) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13956 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13956) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13955 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13955) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13954 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13954) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13953 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13953) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13952 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13952) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13951 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13951) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13950 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13950) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13949 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13949) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13948 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13948) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13947 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13947) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13946 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13946) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13945 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13945) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13944 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13944) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13943 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13943) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-18799 | Huawei HarmonyOS扫描模块缓冲区溢出漏洞 | 2026-03-12 | 2026-04-28 |
| cnvd-2026-18798 | Huawei HarmonyOS打印模块竞争条件漏洞 | 2026-03-12 | 2026-04-28 |
| cnvd-2026-15381 | Huawei HarmonyOS cellular_data模块权限控制漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15380 | Huawei HarmonyOS证书管理模块路径遍历漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15379 | Huawei HarmonyOS维测模块条件竞争漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15378 | Huawei HarmonyOS蓝牙字符越界读漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15377 | Huawei HarmonyOS权限管理服务条件竞争漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15376 | Huawei HarmonyOS安全控件条件竞争漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15375 | Huawei HarmonyOS扫描模块访问未初始化指针漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15250 | Huawei HarmonyOS证书管理模块数据处理漏洞 | 2026-03-12 | 2026-03-25 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01036 | Уязвимость микропрограммного обеспечения беспроводных Wi-Fi маршрутизаторов Tenda W30E, с… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01035 | Уязвимость приложения для обмена мгновенными сообщениями Mattermost, связанная с использо… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01034 | Уязвимость системы обнаружения и предотвращения вторжений Suricata, связанная с использов… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01033 | Уязвимость микропрограммного обеспечения маршрутизаторов Tenda W30E, связанная с раскрыти… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01032 | Уязвимость веб-интерфейса управления микропрограммного обеспечения маршрутизаторов Tenda … | 30.01.2026 | 30.01.2026 |
| bdu:2026-01031 | Уязвимость веб-интерфейса управления микропрограммного обеспечения маршрутизаторов Tenda … | 30.01.2026 | 30.01.2026 |
| bdu:2026-01030 | Уязвимость менеджера пакетов pnpm, связанная с неверным ограничением имени пути к каталог… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01029 | Уязвимость функций fs.statSync() и fs.readFileSync() сценария store/cafs/src/addFilesFrom… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01028 | Уязвимость функции path.join() менеджера пакетов pnpm, позволяющая нарушителю получить не… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01027 | Уязвимость системы для управления внутренними сервисами и автоматизации бизнес-процессов … | 30.01.2026 | 13.02.2026 |
| bdu:2026-01026 | Уязвимость административной панели платформы управления мобильными устройствами Telpo MDM… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01025 | Уязвимость пользовательского интерфейса платформы управления мобильными устройствами Telp… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01024 | Уязвимость библиотеки клиентских инструментов для платформы мониторинга sentry-sdk, позво… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01023 | Уязвимость демона RGW системы хранения данных Ceph, позволяющая нарушителю вызвать отказ … | 30.01.2026 | 30.01.2026 |
| bdu:2026-01022 | Уязвимость утилиты qemu-img агента для взаимодействия между системой Ironic и физическим … | 30.01.2026 | 30.01.2026 |
| bdu:2026-01021 | Уязвимость библиотеки клиентских инструментов для платформы мониторинга sentry-sdk, позво… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01020 | Уязвимость JWT-библиотеки Jose4j, связанная с неправильной защитой токенов безопасности, … | 30.01.2026 | 30.01.2026 |
| bdu:2026-01019 | Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | 30.01.2026 | 30.01.2026 |
| bdu:2026-01018 | Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | 30.01.2026 | 30.01.2026 |
| bdu:2026-01017 | Уязвимость ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код | 30.01.2026 | 16.02.2026 |
| bdu:2026-01016 | Уязвимость сервера протокола MCP codehooks-mcp-server, связанная с непринятием мер по ней… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01015 | Уязвимость микропрограммного обеспечения IP-камер Reolink WiFi, связанная с незащищённым … | 30.01.2026 | 30.01.2026 |
| bdu:2026-01014 | Уязвимость информационной системы openSIS, связанная с непринятием мер по защите структур… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01013 | Уязвимость компонента Custom Protocol Bluetooth-чипов TWS-наушников Airoha Technology, по… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01012 | Уязвимость компонента BR/EDR Bluetooth-чипов TWS-наушников Airoha Technology, позволяющая… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01011 | Уязвимость службы GATT Bluetooth-чипов TWS-наушников Airoha Technology, связанная с отсут… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01010 | Уязвимость корпоративной системы управления электронной почтой Zimbra Collaboration Suite… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01009 | Уязвимость модуля TDDP микропрограммного обеспечения маршрутизаторов TP-Link Archer C20 и… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01008 | Уязвимость установщика Epson Web Installer микропрограммного обеспечения принтеров и скан… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01007 | Уязвимость компонента Server Infrastructure системы управления взаимоотношениями с клиент… | 30.01.2026 | 30.01.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202006-1832 | A memory corruption issue was addressed with improved validation. This issue is fixed in … | 2024-07-23T21:03:26.090000Z |
| var-201801-1712 | Systems with microprocessors utilizing speculative execution and branch prediction may al… | 2024-07-23T21:03:25.229000Z |
| var-201302-0404 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE 7 U… | 2024-07-23T21:03:25.858000Z |
| var-202201-0104 | In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtt… | 2024-07-23T21:03:24.853000Z |
| var-201108-0145 | Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before … | 2024-07-23T21:03:24.463000Z |
| var-201904-1403 | The issue was addressed by removing origin information. This issue affected versions prio… | 2024-07-23T21:03:18.489000Z |
| var-200703-0023 | Integer overflow in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 allows remote user-assi… | 2024-07-23T21:03:17.231000Z |
| var-201112-0047 | The Cascading Style Sheets (CSS) implementation in Google Chrome before 16.0.912.63 on 64… | 2024-07-23T21:03:15.583000Z |
| var-201210-0132 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:03:14.420000Z |
| var-200512-0749 | The khtml::RenderTableSection::ensureRows function in KHTMLParser in Apple Mac OS X 10.4.… | 2024-07-23T21:03:14.261000Z |
| var-201906-1174 | Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. T… | 2024-07-23T21:03:12.658000Z |
| var-200904-0798 | The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.1… | 2024-07-23T21:03:08.190000Z |
| var-202201-0304 | A logic issue was addressed with improved state management. This issue is fixed in iOS 15… | 2024-07-23T21:03:06.170000Z |
| var-201107-0023 | WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrar… | 2024-07-23T21:03:05.834000Z |
| var-202103-1001 | An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G… | 2024-07-23T21:02:01.229000Z |
| var-201206-0059 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:01:58.493000Z |
| var-202008-0248 | An elevation of privilege vulnerability exists when an attacker establishes a vulnerable … | 2024-07-23T21:01:54.969000Z |
| var-201910-1646 | By design, BIND is intended to limit the number of TCP clients that can be connected at a… | 2024-07-23T21:01:53.208000Z |
| var-201811-0987 | nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, whic… | 2024-07-23T21:01:53.545000Z |
| var-201306-0225 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:01:21.795000Z |
| var-201205-0393 | Multiple stack-based buffer overflows in Apple QuickTime before 7.7.2 on Windows allow re… | 2024-07-23T21:01:21.160000Z |
| var-201204-0092 | Google Chrome before 18.0.1025.151 allows remote attackers to bypass the Same Origin Poli… | 2024-07-23T21:01:20.651000Z |
| var-201302-0306 | Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on … | 2024-07-23T21:01:18.595000Z |
| var-200712-0594 | Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Se… | 2024-07-23T21:01:17.067000Z |
| var-201512-0485 | ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2… | 2024-07-23T21:00:45.295000Z |
| var-200810-0143 | Buffer overflow in PSNormalizer in Mac OS X 10.4.11 and 10.5.5 allows remote attackers to… | 2024-07-23T21:00:45.115000Z |
| var-200809-0195 | Cross-site scripting (XSS) vulnerability in Wiki Server in Apple Mac OS X 10.5 through 10… | 2024-07-23T21:00:44.978000Z |
| var-202003-1786 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:00:14.087000Z |
| var-200609-0703 | The Installer application in Apple Mac OS X 10.4.8 and earlier, when used by a user with … | 2024-07-23T21:00:06.153000Z |
| var-201711-0473 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T20:59:26.236000Z |