Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-7979 |
4.3 (3.1)
|
Inappropriate implementation in Media in Google C… |
Google |
Chrome |
2026-05-06T18:12:59.814Z | 2026-05-06T21:52:02.679Z |
| CVE-2026-7978 |
8.1 (3.1)
|
Inappropriate implementation in Companion in Goog… |
Google |
Chrome |
2026-05-06T18:12:59.436Z | 2026-05-07T03:57:00.415Z |
| CVE-2026-7977 |
6.3 (3.1)
|
Inappropriate implementation in Canvas in Google … |
Google |
Chrome |
2026-05-06T18:12:59.116Z | 2026-05-06T21:52:21.357Z |
| CVE-2026-7976 |
7.5 (3.1)
|
Use after free in Views in Google Chrome prior to… |
Google |
Chrome |
2026-05-06T18:12:58.810Z | 2026-05-07T03:56:10.296Z |
| CVE-2026-7975 |
8.3 (3.1)
|
Use after free in DevTools in Google Chrome prior… |
Google |
Chrome |
2026-05-06T18:12:58.457Z | 2026-05-07T03:56:11.421Z |
| CVE-2026-7974 |
8.8 (3.1)
|
Use after free in Blink in Google Chrome prior to… |
Google |
Chrome |
2026-05-06T18:12:58.111Z | 2026-05-07T03:56:12.725Z |
| CVE-2026-7973 |
8.8 (3.1)
|
Integer overflow in Dawn in Google Chrome on Wind… |
Google |
Chrome |
2026-05-06T18:12:57.739Z | 2026-05-07T03:56:13.865Z |
| CVE-2026-7972 |
4.3 (3.1)
|
Uninitialized Use in GPU in Google Chrome prior t… |
Google |
Chrome |
2026-05-06T18:12:57.320Z | 2026-05-06T21:53:08.430Z |
| CVE-2026-7971 |
6.3 (3.1)
|
Inappropriate implementation in ORB in Google Chr… |
Google |
Chrome |
2026-05-06T18:12:56.973Z | 2026-05-06T21:53:17.821Z |
| CVE-2026-7970 |
8.3 (3.1)
|
Use after free in TopChrome in Google Chrome prio… |
Google |
Chrome |
2026-05-06T18:12:56.577Z | 2026-05-07T03:56:15.166Z |
| CVE-2026-7969 |
4.3 (3.1)
|
Integer overflow in Network in Google Chrome prio… |
Google |
Chrome |
2026-05-06T18:12:56.222Z | 2026-05-06T21:53:36.654Z |
| CVE-2026-7968 |
3.1 (3.1)
|
Insufficient validation of untrusted input in COR… |
Google |
Chrome |
2026-05-06T18:12:55.854Z | 2026-05-06T21:53:46.027Z |
| CVE-2026-7967 |
8.3 (3.1)
|
Insufficient validation of untrusted input in Nav… |
Google |
Chrome |
2026-05-06T18:12:55.549Z | 2026-05-07T03:56:16.263Z |
| CVE-2026-7966 |
3.1 (3.1)
|
Insufficient validation of untrusted input in Sit… |
Google |
Chrome |
2026-05-06T18:12:55.215Z | 2026-05-06T21:54:04.881Z |
| CVE-2026-7965 |
3.1 (3.1)
|
Insufficient validation of untrusted input in Dev… |
Google |
Chrome |
2026-05-06T18:12:54.878Z | 2026-05-06T21:54:14.258Z |
| CVE-2026-7964 |
4.2 (3.1)
|
Insufficient validation of untrusted input in Fil… |
Google |
Chrome |
2026-05-06T18:12:54.526Z | 2026-05-06T21:54:23.637Z |
| CVE-2026-7963 |
8.3 (3.1)
|
Inappropriate implementation in ServiceWorker in … |
Google |
Chrome |
2026-05-06T18:12:54.194Z | 2026-05-07T03:56:17.382Z |
| CVE-2026-7962 |
5.4 (3.1)
|
Insufficient policy enforcement in DirectSockets … |
Google |
Chrome |
2026-05-06T18:12:53.834Z | 2026-05-06T21:54:42.375Z |
| CVE-2026-7961 |
4.3 (3.1)
|
Insufficient validation of untrusted input in Per… |
Google |
Chrome |
2026-05-06T18:12:53.500Z | 2026-05-06T21:54:51.757Z |
| CVE-2026-7960 |
5.3 (3.1)
|
Race in Speech in Google Chrome prior to 148.0.77… |
Google |
Chrome |
2026-05-06T18:12:53.174Z | 2026-05-06T21:55:01.153Z |
| CVE-2026-7959 |
3.1 (3.1)
|
Inappropriate implementation in Navigation in Goo… |
Google |
Chrome |
2026-05-06T18:12:52.805Z | 2026-05-06T21:55:11.048Z |
| CVE-2026-7958 |
5.4 (3.1)
|
Inappropriate implementation in ServiceWorker in … |
Google |
Chrome |
2026-05-06T18:12:52.474Z | 2026-05-06T21:55:20.944Z |
| CVE-2026-7957 |
8.8 (3.1)
|
Out of bounds write in Media in Google Chrome on … |
Google |
Chrome |
2026-05-06T18:12:52.126Z | 2026-05-07T03:56:18.561Z |
| CVE-2026-7956 |
8.3 (3.1)
|
Use after free in Navigation in Google Chrome pri… |
Google |
Chrome |
2026-05-06T18:12:51.776Z | 2026-05-07T03:56:19.681Z |
| CVE-2026-7955 |
5.3 (3.1)
|
Uninitialized Use in GPU in Google Chrome prior t… |
Google |
Chrome |
2026-05-06T18:12:51.435Z | 2026-05-06T21:55:49.669Z |
| CVE-2026-7954 |
3.1 (3.1)
|
Race in Shared Storage in Google Chrome prior to … |
Google |
Chrome |
2026-05-06T18:12:51.090Z | 2026-05-06T21:55:59.002Z |
| CVE-2026-7953 |
6.1 (3.1)
|
Insufficient validation of untrusted input in Omn… |
Google |
Chrome |
2026-05-06T18:12:50.626Z | 2026-05-06T21:56:08.989Z |
| CVE-2026-7952 |
4.2 (3.1)
|
Insufficient policy enforcement in Extensions in … |
Google |
Chrome |
2026-05-06T18:12:50.069Z | 2026-05-06T21:56:18.362Z |
| CVE-2026-7951 |
8.8 (3.1)
|
Out of bounds write in WebRTC in Google Chrome pr… |
Google |
Chrome |
2026-05-06T18:12:49.722Z | 2026-05-07T03:56:21.027Z |
| CVE-2026-7950 |
5.4 (3.1)
|
Out of bounds read and write in GFX in Google Chr… |
Google |
Chrome |
2026-05-06T18:12:49.329Z | 2026-05-06T21:56:38.241Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-7977 |
6.3 (3.1)
|
Inappropriate implementation in Canvas in Google … |
Google |
Chrome |
2026-05-06T18:12:59.116Z | 2026-05-06T21:52:21.357Z |
| CVE-2026-7976 |
7.5 (3.1)
|
Use after free in Views in Google Chrome prior to… |
Google |
Chrome |
2026-05-06T18:12:58.810Z | 2026-05-07T03:56:10.296Z |
| CVE-2026-7975 |
8.3 (3.1)
|
Use after free in DevTools in Google Chrome prior… |
Google |
Chrome |
2026-05-06T18:12:58.457Z | 2026-05-07T03:56:11.421Z |
| CVE-2026-7974 |
8.8 (3.1)
|
Use after free in Blink in Google Chrome prior to… |
Google |
Chrome |
2026-05-06T18:12:58.111Z | 2026-05-07T03:56:12.725Z |
| CVE-2026-7973 |
8.8 (3.1)
|
Integer overflow in Dawn in Google Chrome on Wind… |
Google |
Chrome |
2026-05-06T18:12:57.739Z | 2026-05-07T03:56:13.865Z |
| CVE-2026-7972 |
4.3 (3.1)
|
Uninitialized Use in GPU in Google Chrome prior t… |
Google |
Chrome |
2026-05-06T18:12:57.320Z | 2026-05-06T21:53:08.430Z |
| CVE-2026-7971 |
6.3 (3.1)
|
Inappropriate implementation in ORB in Google Chr… |
Google |
Chrome |
2026-05-06T18:12:56.973Z | 2026-05-06T21:53:17.821Z |
| CVE-2026-7970 |
8.3 (3.1)
|
Use after free in TopChrome in Google Chrome prio… |
Google |
Chrome |
2026-05-06T18:12:56.577Z | 2026-05-07T03:56:15.166Z |
| CVE-2026-7969 |
4.3 (3.1)
|
Integer overflow in Network in Google Chrome prio… |
Google |
Chrome |
2026-05-06T18:12:56.222Z | 2026-05-06T21:53:36.654Z |
| CVE-2026-7968 |
3.1 (3.1)
|
Insufficient validation of untrusted input in COR… |
Google |
Chrome |
2026-05-06T18:12:55.854Z | 2026-05-06T21:53:46.027Z |
| CVE-2026-7967 |
8.3 (3.1)
|
Insufficient validation of untrusted input in Nav… |
Google |
Chrome |
2026-05-06T18:12:55.549Z | 2026-05-07T03:56:16.263Z |
| CVE-2026-7966 |
3.1 (3.1)
|
Insufficient validation of untrusted input in Sit… |
Google |
Chrome |
2026-05-06T18:12:55.215Z | 2026-05-06T21:54:04.881Z |
| CVE-2026-7965 |
3.1 (3.1)
|
Insufficient validation of untrusted input in Dev… |
Google |
Chrome |
2026-05-06T18:12:54.878Z | 2026-05-06T21:54:14.258Z |
| CVE-2026-7964 |
4.2 (3.1)
|
Insufficient validation of untrusted input in Fil… |
Google |
Chrome |
2026-05-06T18:12:54.526Z | 2026-05-06T21:54:23.637Z |
| CVE-2026-7963 |
8.3 (3.1)
|
Inappropriate implementation in ServiceWorker in … |
Google |
Chrome |
2026-05-06T18:12:54.194Z | 2026-05-07T03:56:17.382Z |
| CVE-2026-7962 |
5.4 (3.1)
|
Insufficient policy enforcement in DirectSockets … |
Google |
Chrome |
2026-05-06T18:12:53.834Z | 2026-05-06T21:54:42.375Z |
| CVE-2026-7961 |
4.3 (3.1)
|
Insufficient validation of untrusted input in Per… |
Google |
Chrome |
2026-05-06T18:12:53.500Z | 2026-05-06T21:54:51.757Z |
| CVE-2026-7960 |
5.3 (3.1)
|
Race in Speech in Google Chrome prior to 148.0.77… |
Google |
Chrome |
2026-05-06T18:12:53.174Z | 2026-05-06T21:55:01.153Z |
| CVE-2026-7959 |
3.1 (3.1)
|
Inappropriate implementation in Navigation in Goo… |
Google |
Chrome |
2026-05-06T18:12:52.805Z | 2026-05-06T21:55:11.048Z |
| CVE-2026-7958 |
5.4 (3.1)
|
Inappropriate implementation in ServiceWorker in … |
Google |
Chrome |
2026-05-06T18:12:52.474Z | 2026-05-06T21:55:20.944Z |
| CVE-2026-7957 |
8.8 (3.1)
|
Out of bounds write in Media in Google Chrome on … |
Google |
Chrome |
2026-05-06T18:12:52.126Z | 2026-05-07T03:56:18.561Z |
| CVE-2026-7956 |
8.3 (3.1)
|
Use after free in Navigation in Google Chrome pri… |
Google |
Chrome |
2026-05-06T18:12:51.776Z | 2026-05-07T03:56:19.681Z |
| CVE-2026-7955 |
5.3 (3.1)
|
Uninitialized Use in GPU in Google Chrome prior t… |
Google |
Chrome |
2026-05-06T18:12:51.435Z | 2026-05-06T21:55:49.669Z |
| CVE-2026-7954 |
3.1 (3.1)
|
Race in Shared Storage in Google Chrome prior to … |
Google |
Chrome |
2026-05-06T18:12:51.090Z | 2026-05-06T21:55:59.002Z |
| CVE-2026-7953 |
6.1 (3.1)
|
Insufficient validation of untrusted input in Omn… |
Google |
Chrome |
2026-05-06T18:12:50.626Z | 2026-05-06T21:56:08.989Z |
| CVE-2026-7952 |
4.2 (3.1)
|
Insufficient policy enforcement in Extensions in … |
Google |
Chrome |
2026-05-06T18:12:50.069Z | 2026-05-06T21:56:18.362Z |
| CVE-2026-7951 |
8.8 (3.1)
|
Out of bounds write in WebRTC in Google Chrome pr… |
Google |
Chrome |
2026-05-06T18:12:49.722Z | 2026-05-07T03:56:21.027Z |
| CVE-2026-7950 |
5.4 (3.1)
|
Out of bounds read and write in GFX in Google Chr… |
Google |
Chrome |
2026-05-06T18:12:49.329Z | 2026-05-06T21:56:38.241Z |
| CVE-2026-7949 |
3.1 (3.1)
|
Out of bounds read in Skia in Google Chrome prior… |
Google |
Chrome |
2026-05-06T18:12:48.956Z | 2026-05-06T21:56:47.136Z |
| CVE-2026-7948 |
7.5 (3.1)
|
Race in Chromoting in Google Chrome on Windows pr… |
Google |
Chrome |
2026-05-06T18:12:48.422Z | 2026-05-07T03:56:22.106Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-64487 | Outline is a service that allows for collaborative documentation. Prior to 1.1.0, a privilege escal… | 2026-02-11T21:16:17.757 | 2026-02-20T18:17:53.060 |
| fkie_cve-2024-50620 | Unrestricted Upload of File with Dangerous Type vulnerabilities exist in the rich text editor and d… | 2026-02-11T21:16:17.580 | 2026-02-20T20:18:37.927 |
| fkie_cve-2020-37215 | MSN Password Recovery version 1.30 contains a denial of service vulnerability that allows attackers… | 2026-02-11T21:16:17.350 | 2026-04-15T00:35:42.020 |
| fkie_cve-2020-37214 | Voyager 1.3.0 contains a directory traversal vulnerability that allows attackers to access sensitiv… | 2026-02-11T21:16:17.170 | 2026-04-15T00:35:42.020 |
| fkie_cve-2020-37213 | TextCrawler Pro 3.1.1 contains a denial of service vulnerability that allows attackers to crash the… | 2026-02-11T21:16:17.003 | 2026-04-15T00:35:42.020 |
| fkie_cve-2020-37212 | SpotMSN 2.4.6 contains a denial of service vulnerability in the registration name input field that … | 2026-02-11T21:16:16.840 | 2026-02-26T23:23:31.830 |
| fkie_cve-2020-37211 | SpotIM 2.2 contains a denial of service vulnerability that allows attackers to crash the applicatio… | 2026-02-11T21:16:16.673 | 2026-02-26T23:23:09.800 |
| fkie_cve-2020-37210 | SpotIE 2.9.5 contains a denial of service vulnerability in the registration key input that allows a… | 2026-02-11T21:16:16.483 | 2026-02-26T23:22:38.663 |
| fkie_cve-2020-37209 | SpotFTP 3.0.0.0 contains a denial of service vulnerability in the registration name input field tha… | 2026-02-11T21:16:16.293 | 2026-02-20T20:20:21.453 |
| fkie_cve-2020-37208 | SpotFTP 3.0.0.0 contains a buffer overflow vulnerability in the registration key input field that a… | 2026-02-11T21:16:16.130 | 2026-02-20T20:20:30.210 |
| fkie_cve-2020-37207 | SpotDialup 1.6.7 contains a denial of service vulnerability in the registration key input field tha… | 2026-02-11T21:16:15.963 | 2026-02-26T23:22:15.940 |
| fkie_cve-2020-37206 | ShareAlarmPro contains a denial of service vulnerability that allows attackers to crash the applica… | 2026-02-11T21:16:15.797 | 2026-02-26T23:21:44.870 |
| fkie_cve-2020-37205 | RemShutdown 2.9.0.0 contains a denial of service vulnerability that allows attackers to crash the a… | 2026-02-11T21:16:15.630 | 2026-02-20T20:21:49.370 |
| fkie_cve-2020-37204 | RemShutdown 2.9.0.0 contains a denial of service vulnerability in its registration key input that a… | 2026-02-11T21:16:15.470 | 2026-02-20T20:21:59.007 |
| fkie_cve-2020-37203 | Office Product Key Finder 1.5.4 contains a denial of service vulnerability that allows attackers to… | 2026-02-11T21:16:15.300 | 2026-04-15T00:35:42.020 |
| fkie_cve-2020-37202 | NetworkSleuth 3.0.0.0 contains a denial of service vulnerability that allows attackers to crash the… | 2026-02-11T21:16:15.133 | 2026-04-15T00:35:42.020 |
| fkie_cve-2020-37201 | NetShareWatcher 1.5.8.0 contains a buffer overflow vulnerability in the registration name input tha… | 2026-02-11T21:16:14.963 | 2026-02-17T20:29:06.277 |
| fkie_cve-2020-37200 | NetShareWatcher 1.5.8.0 contains a buffer overflow vulnerability in the registration key input that… | 2026-02-11T21:16:14.790 | 2026-02-17T20:37:26.590 |
| fkie_cve-2020-37199 | NBMonitor 1.6.6.0 contains a denial of service vulnerability in its registration key input that all… | 2026-02-11T21:16:14.623 | 2026-02-26T23:20:24.633 |
| fkie_cve-2020-37198 | Duplicate Cleaner Pro 4.1.3 contains a denial of service vulnerability that allows attackers to cra… | 2026-02-11T21:16:14.457 | 2026-04-15T00:35:42.020 |
| fkie_cve-2020-37197 | Dnss Domain Name Search Software contains a denial of service vulnerability that allows attackers t… | 2026-02-11T21:16:14.297 | 2026-02-26T23:21:11.890 |
| fkie_cve-2020-37196 | Dnss Domain Name Search Software contains a denial of service vulnerability that allows attackers t… | 2026-02-11T21:16:14.127 | 2026-02-27T16:13:28.690 |
| fkie_cve-2020-37195 | BlueAuditor 1.7.2.0 contains a denial of service vulnerability in the registration name input field… | 2026-02-11T21:16:13.950 | 2026-04-15T00:35:42.020 |
| fkie_cve-2020-37194 | Backup Key Recovery 2.2.5 contains a denial of service vulnerability that allows attackers to crash… | 2026-02-11T21:16:13.780 | 2026-04-15T00:35:42.020 |
| fkie_cve-2020-37193 | ZIP Password Recovery 2.30 contains a denial of service vulnerability that allows attackers to cras… | 2026-02-11T21:16:13.603 | 2026-04-15T00:35:42.020 |
| fkie_cve-2020-37192 | MSN Password Recovery 1.30 contains an XML external entity injection vulnerability that allows atta… | 2026-02-11T21:16:13.427 | 2026-04-15T00:35:42.020 |
| fkie_cve-2020-37191 | Top Password Software Dialup Password Recovery 1.30 contains a denial of service vulnerability that… | 2026-02-11T21:16:13.257 | 2026-04-15T00:35:42.020 |
| fkie_cve-2020-37190 | Top Password Firefox Password Recovery 2.8 contains a denial of service vulnerability that allows a… | 2026-02-11T21:16:13.093 | 2026-04-15T00:35:42.020 |
| fkie_cve-2020-37189 | TaskCanvas 1.4.0 contains a denial of service vulnerability in the registration code input field th… | 2026-02-11T21:16:12.923 | 2026-04-15T00:35:42.020 |
| fkie_cve-2020-37188 | SpotOutlook 1.2.6 contains a denial of service vulnerability in the registration name input field t… | 2026-02-11T21:16:12.757 | 2026-04-15T00:35:42.020 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-3rmx-2462-5g54 |
7.8 (3.1)
|
Inappropriate implementation in Chromoting in Google Chrome on Windows prior to 148.0.7778.96 allow… | 2026-05-06T21:31:41Z | 2026-05-07T01:05:53Z |
| ghsa-255w-3rfx-h4rv |
4.3 (3.1)
|
Inappropriate implementation in V8 in Google Chrome prior to 148.0.7778.96 allowed a remote attacke… | 2026-05-06T21:31:41Z | 2026-05-07T01:05:54Z |
| ghsa-wv44-78hj-q9gf |
8.3 (3.1)
|
Use after free in DevTools in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who ha… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-w5hh-7xrp-wmv3 |
4.3 (3.1)
|
Uninitialized Use in GPU in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had … | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-vc4p-4fpj-c36p |
8.1 (3.1)
|
Inappropriate implementation in Companion in Google Chrome on Mac prior to 148.0.7778.96 allowed a … | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-v875-65h5-w97q |
8.3 (3.1)
|
Use after free in TopChrome in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who h… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-px2j-fc7q-85fx |
4.3 (3.1)
|
Insufficient policy enforcement in Autofill in Google Chrome prior to 148.0.7778.96 allowed a remot… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-p7xq-3692-hrmr |
8.3 (3.1)
|
Insufficient validation of untrusted input in Navigation in Google Chrome prior to 148.0.7778.96 al… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-m89x-jh8w-76xc |
8.8 (3.1)
|
Integer overflow in Dawn in Google Chrome on Windows prior to 148.0.7778.96 allowed a remote attack… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-m7cv-wq8c-7836 |
3.1 (3.1)
|
Insufficient validation of untrusted input in DevTools in Google Chrome prior to 148.0.7778.96 allo… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-m6pj-5274-pwcq |
3.1 (3.1)
|
Insufficient validation of untrusted input in CORS in Google Chrome prior to 148.0.7778.96 allowed … | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-jrrr-m467-89v4 |
8.8 (3.1)
|
Use after free in WebRTC in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execu… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-jh98-89hc-9g7v |
4.2 (3.1)
|
Insufficient validation of untrusted input in FileSystem in Google Chrome prior to 148.0.7778.96 al… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-j52w-h358-ggww |
4.3 (3.1)
|
Insufficient validation of untrusted input in Permissions in Google Chrome prior to 148.0.7778.96 a… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-gwc3-hm5q-m633 |
5.3 (3.1)
|
Uninitialized Use in GPU in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had … | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-g824-5454-rwmq |
8.8 (3.1)
|
Out of bounds write in Media in Google Chrome on Mac, iOS prior to 148.0.7778.96 allowed a remote a… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-g28f-6ppf-f23m |
4.3 (3.1)
|
Inappropriate implementation in Media in Google Chrome prior to 148.0.7778.96 allowed a remote atta… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-frff-6649-89hj |
8.8 (3.1)
|
Use after free in Blink in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execut… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-fj9r-jc82-2cxp |
6.5 (3.1)
|
Uninitialized Use in WebCodecs in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-crff-gw66-2wvq |
8.3 (3.1)
|
Use after free in GPU in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had com… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-cm3m-44r2-vmp9 |
7.8 (3.1)
|
Insufficient validation of untrusted input in Updater in Google Chrome on Windows prior to 148.0.77… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-9q3j-rxj9-3656 |
4.3 (3.1)
|
Out of bounds read in Dawn in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to lea… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-9jcr-35p3-pjwq |
4.2 (3.1)
|
Insufficient data validation in DataTransfer in Google Chrome prior to 148.0.7778.96 allowed a remo… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-9c2c-f546-5wxv |
3.1 (3.1)
|
Insufficient validation of untrusted input in SiteIsolation in Google Chrome prior to 148.0.7778.96… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-82vp-jj7x-34qg |
8.8 (3.1)
|
Type Confusion in WebRTC in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execu… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-77w3-qw8r-vfhf |
4.3 (3.1)
|
Integer overflow in Network in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who h… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-75j5-jp23-gg4c |
8.3 (3.1)
|
Use after free in Navigation in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who … | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ghsa-7345-62fg-r8q2 |
8.8 (3.1)
|
Use after free in ReadingMode in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-6w49-227h-qm5v |
7.5 (3.1)
|
Use after free in Views in Google Chrome prior to 148.0.7778.96 allowed an attacker who convinced a… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:53Z |
| ghsa-5x3p-258g-5rp8 |
5.3 (3.1)
|
Race in Speech in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromise… | 2026-05-06T21:31:40Z | 2026-05-07T01:05:52Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-43015 |
|
In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary … | torch | 2022-11-26T02:15:00Z | 2023-05-04T03:49:48.383740Z |
| pysec-2022-42996 |
|
MPXJ is an open source library to read and write project plans from a variety of file for… | mpxj | 2022-11-25T19:15:00Z | 2023-05-04T04:29:27.436392Z |
| pysec-2022-42995 |
|
A vulnerability was found in keylime. This security issue happens in some circumstances, … | keylime | 2022-11-22T19:15:00Z | 2023-05-04T04:29:25.773897Z |
| pysec-2022-42987 |
|
CKAN through 2.9.6 account takeovers by unauthenticated users when an existing user id is… | ckan | 2022-11-22T01:15:00Z | 2023-05-04T04:29:23.890366Z |
| pysec-2022-43140 |
6.5 (3.1)
|
A heap buffer overflow in the LIEF::MachO::BinaryParser::parse_dyldinfo_generic_bind func… | lief | 2022-11-17T23:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2022-43001 |
|
Missing Authentication for Critical Function in GitHub repository ikus060/rdiffweb prior … | rdiffweb | 2022-11-16T13:15:00Z | 2023-05-04T04:29:28.960174Z |
| pysec-2022-42984 |
|
In Apache Airflow versions prior to 2.4.3, there was an open redirect in the webserver's … | apache-airflow | 2022-11-15T09:15:00Z | 2023-05-04T04:29:22.748527Z |
| pysec-2022-43000 |
|
Insufficient Session Expiration in GitHub repository ikus060/rdiffweb prior to 2.5.0. | rdiffweb | 2022-11-14T21:15:00Z | 2023-05-04T04:29:28.911542Z |
| pysec-2022-42982 |
|
A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who c… | apache-airflow | 2022-11-14T10:15:00Z | 2023-05-04T04:29:22.645854Z |
| pysec-2022-42981 |
|
A vulnerability in UI of Apache Airflow allows an attacker to view unmasked secrets in re… | apache-airflow | 2022-11-14T10:15:00Z | 2023-05-04T04:29:22.592547Z |
| pysec-2022-42980 |
|
Pillow before 9.3.0 allows denial of service via SAMPLESPERPIXEL. | pillow | 2022-11-14T07:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2022-42979 |
|
Pillow before 9.2.0 performs Improper Handling of Highly Compressed GIF Data (Data Amplif… | pillow | 2022-11-14T07:15:00Z | 2022-11-14T11:29:25.508491Z |
| pysec-2022-43055 |
7.5 (3.1)
|
Hyperledger Fabric 2.3 allows attackers to cause a denial of service (orderer crash) by r… | hyperledger | 2022-11-12T20:15:00+00:00 | 2023-08-17T03:22:31.453589+00:00 |
| pysec-2022-43018 |
|
WsgiDAV is a generic and extendable WebDAV server based on WSGI. Implementations using th… | wsgidav | 2022-11-11T21:15:00Z | 2023-05-04T04:29:31.369774Z |
| pysec-2022-42985 |
|
Arches is a web platform for creating, managing, & visualizing geospatial data. Versions … | arches | 2022-11-11T04:15:00Z | 2023-05-04T04:29:23.524968Z |
| pysec-2022-43178 |
7.5 (3.1)
|
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the cleo … | cleo | 2022-11-09T20:15:10+00:00 | 2025-04-09T17:27:24.793038+00:00 |
| pysec-2022-43130 |
9.8 (3.1)
|
The d8s-timer for python, as distributed on PyPI, included a potential code-execution bac… | democritus-uuids | 2022-11-07T15:15:00Z | 2024-11-21T14:22:45.198186Z |
| pysec-2022-43129 |
9.8 (3.1)
|
The d8s-strings for python, as distributed on PyPI, included a potential code-execution b… | democritus-uuids | 2022-11-07T15:15:00Z | 2024-11-21T14:22:45.148199Z |
| pysec-2022-43128 |
9.8 (3.1)
|
The d8s-xml for python, as distributed on PyPI, included a potential code-execution backd… | democritus-utility | 2022-11-07T15:15:00Z | 2024-11-21T14:22:45.091449Z |
| pysec-2022-43127 |
9.8 (3.1)
|
The d8s-networking for python, as distributed on PyPI, included a potential code-executio… | democritus-user-agents | 2022-11-07T15:15:00Z | 2024-11-21T14:22:45.041198Z |
| pysec-2022-43126 |
9.8 (3.1)
|
The d8s-dates for python, as distributed on PyPI, included a potential code-execution bac… | democritus-timezones | 2022-11-07T15:15:00Z | 2024-11-21T14:22:44.991216Z |
| pysec-2022-43109 |
9.8 (3.1)
|
The d8s-stats for python, as distributed on PyPI, included a potential code-execution bac… | democritus-math | 2022-11-07T15:15:00Z | 2024-11-21T14:22:44.122837Z |
| pysec-2022-43108 |
9.8 (3.1)
|
The d8s-networking for python, as distributed on PyPI, included a potential code-executio… | democritus-json | 2022-11-07T15:15:00Z | 2024-11-21T14:22:44.072231Z |
| pysec-2022-43100 |
9.8 (3.1)
|
The d8s-python for python, as distributed on PyPI, included a potential code-execution ba… | democritus-grammars | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.665816Z |
| pysec-2022-43097 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | democritus-domains | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.511664Z |
| pysec-2022-43096 |
8.8 (3.1)
|
The d8s-timer for python, as distributed on PyPI, included a potential code-execution bac… | democritus-dates | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.46136Z |
| pysec-2022-43094 |
9.8 (3.1)
|
The d8s-python for python, as distributed on PyPI, included a potential code-execution ba… | democritus-algorithms | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.361191Z |
| pysec-2022-43093 |
9.8 (3.1)
|
The d8s-xml for python, as distributed on PyPI, included a potential code-execution backd… | d8s-xml | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.253271Z |
| pysec-2022-43091 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | d8s-urls | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.149086Z |
| pysec-2022-43090 |
8.8 (3.1)
|
The d8s-timer for python, as distributed on PyPI, included a potential code-execution bac… | d8s-timer | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.097689Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2894 | Malicious code in chai-as-nobj (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:50Z |
| mal-2026-2893 | Malicious code in chai-as-mobj (npm) | 2026-04-15T22:05:03Z | 2026-04-29T12:53:28Z |
| mal-2026-2892 | Malicious code in chai-as-inserted (npm) | 2026-04-15T22:05:03Z | 2026-04-29T12:53:28Z |
| mal-2026-2889 | Malicious code in chai-as-evm (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:50Z |
| mal-2026-2888 | Malicious code in chai-as-encrypted (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:49Z |
| mal-2026-2887 | Malicious code in chai-as-elevated (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:49Z |
| mal-2026-2886 | Malicious code in chai-as-chain-v2 (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:49Z |
| mal-2026-2885 | Malicious code in chai-as-adapter (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:49Z |
| mal-2026-2740 | Malicious code in chai-as-type (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:50Z |
| mal-2026-2697 | Malicious code in ccxt-telemetry (PyPI) | 2026-04-15T20:02:13Z | 2026-04-15T20:02:13Z |
| mal-2026-2698 | Malicious code in kyleip (PyPI) | 2026-04-15T19:50:37Z | 2026-04-15T19:50:37Z |
| mal-2026-2884 | Malicious code in forge-jsx (npm) | 2026-04-15T18:37:07Z | 2026-05-04T01:57:07Z |
| mal-2026-2696 | Malicious code in bfx-hf-strategy-perf (npm) | 2026-04-15T18:25:54Z | 2026-04-23T20:50:49Z |
| mal-2026-2695 | Malicious code in cpu-optimizers2-33 (PyPI) | 2026-04-15T16:48:54Z | 2026-04-15T16:48:54Z |
| mal-2026-2694 | Malicious code in cpu-optimizers (PyPI) | 2026-04-15T16:18:21Z | 2026-04-15T16:18:21Z |
| mal-2026-2693 | Malicious code in vs-supplier-portal-web (npm) | 2026-04-15T14:57:24Z | 2026-04-23T20:50:52Z |
| mal-2026-2692 | Malicious code in fusion-events (npm) | 2026-04-15T14:57:24Z | 2026-04-23T20:50:50Z |
| mal-2026-2691 | Malicious code in base-counter-web (npm) | 2026-04-15T14:57:24Z | 2026-04-23T20:50:49Z |
| mal-2026-2690 | Malicious code in @pnc-ref/harmony-support-v18 (npm) | 2026-04-15T14:19:35Z | 2026-04-23T20:50:49Z |
| mal-2026-2689 | Malicious code in @pnc-ref/harmony-core-v18 (npm) | 2026-04-15T14:19:35Z | 2026-04-23T20:50:49Z |
| mal-2026-2688 | Malicious code in @pnc-cib/cib-core-lib (npm) | 2026-04-15T14:19:35Z | 2026-04-23T20:50:49Z |
| mal-2026-2687 | Malicious code in com.baogong.app_push_permission (npm) | 2026-04-15T13:49:47Z | 2026-04-23T20:50:50Z |
| mal-2026-2685 | Malicious code in react-dom-19 (npm) | 2026-04-15T13:21:15Z | 2026-04-23T20:50:51Z |
| mal-2026-2686 | Malicious code in neverinstallme (PyPI) | 2026-04-15T13:10:53Z | 2026-04-15T13:10:53Z |
| mal-2026-2684 | Malicious code in tensorzero-node (npm) | 2026-04-15T10:55:56Z | 2026-04-23T20:50:52Z |
| mal-2026-2683 | Malicious code in @athena-ui-components/axios (npm) | 2026-04-15T09:40:47Z | 2026-04-23T20:50:49Z |
| mal-2026-2681 | Malicious code in @athena-ui-components/dashboard-widget (npm) | 2026-04-15T09:00:54Z | 2026-04-23T20:50:49Z |
| mal-2026-2682 | Malicious code in @athena-ui-components/deeplink (npm) | 2026-04-15T09:00:45Z | 2026-04-23T20:50:49Z |
| mal-2026-2916 | Malicious code in @jesusvizcaino2021/com.baogong.app-push-permission (npm) | 2026-04-15T08:18:47Z | 2026-04-23T20:50:49Z |
| mal-2026-2827 | Malicious code in js-logger-pack (npm) | 2026-04-15T06:24:12Z | 2026-04-23T20:50:50Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1965 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-09-03T22:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-1962 | Google Cloud Platform Looker Studio: Mehrere Schwachstellen | 2025-09-03T22:00:00.000+00:00 | 2025-11-10T23:00:00.000+00:00 |
| wid-sec-w-2025-1961 | Django (FilteredRelation): Schwachstelle ermöglicht SQL injection | 2025-09-03T22:00:00.000+00:00 | 2025-09-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1954 | Drupal: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-09-03T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-1948 | libxml2 (exsltDynMapFunction): Schwachstelle ermöglicht Denial of Service | 2025-09-02T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1944 | Android Patchday September 2025: Multiple Vulnerabilities | 2025-09-02T22:00:00.000+00:00 | 2025-09-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1941 | TYPO3 Extension (Backup Plus): Schwachstelle ermöglicht Codeausführung | 2025-09-01T22:00:00.000+00:00 | 2025-09-02T22:00:00.000+00:00 |
| wid-sec-w-2025-1937 | Samsung Exynos: Schwachstelle ermöglicht Denial of Service | 2025-08-31T22:00:00.000+00:00 | 2025-09-02T22:00:00.000+00:00 |
| wid-sec-w-2025-1933 | Linux Kernel: Eine Schwachstelle ermöglicht einen Denial of Service | 2025-08-31T22:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1932 | Wireshark: Schwachstelle ermöglicht Denial of Service | 2025-08-28T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1931 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-28T22:00:00.000+00:00 | 2025-09-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1928 | Linux UDisks Daemon: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-28T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1925 | Hashicorp Vault: Schwachstelle ermöglicht Denial of Service | 2025-08-28T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1922 | Rancher: Schwachstelle ermöglicht Denial of Service | 2025-08-28T22:00:00.000+00:00 | 2025-09-02T22:00:00.000+00:00 |
| wid-sec-w-2025-1921 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-08-27T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-1914 | Linux Kernel: Schwachstelle ermöglicht Codeausführung | 2025-08-26T22:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1913 | Google Chrome und Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2025-08-26T22:00:00.000+00:00 | 2025-09-02T22:00:00.000+00:00 |
| wid-sec-w-2025-1912 | Shibboleth Identity Provider: Schwachstelle ermöglicht Cross-Site Scripting | 2025-08-26T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1911 | ILIAS: Mehrere Schwachstellen | 2025-08-26T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1910 | Citrix Systems ADC und NetScaler Gateway: Mehrere Schwachstellen | 2025-08-26T22:00:00.000+00:00 | 2025-08-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1909 | Nagios Enterprises Nagios XI: Schwachstelle ermöglicht Cross-Site Scripting | 2025-08-26T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1908 | TeamViewer: Schwachstelle ermöglicht Manipulation von Dateien | 2025-08-25T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1907 | QNAP NAS (File Station 5): Mehrere Schwachstellen | 2025-08-25T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1906 | ImageMagick: Mehrere Schwachstellen | 2025-08-25T22:00:00.000+00:00 | 2025-09-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1905 | IBM QRadar SIEM Komponente: Mehrere Schwachstellen | 2025-08-25T22:00:00.000+00:00 | 2025-08-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1903 | Microsoft GitHub Enterprise: Mehrere Schwachstellen | 2025-08-25T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1902 | D-LINK Router DI-7400G+ und DIR-650IN: Mehrere Schwachstellen | 2025-08-25T22:00:00.000+00:00 | 2025-08-25T22:00:00.000+00:00 |
| wid-sec-w-2025-1901 | Red Hat Enterprise Linux (aide): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-08-24T22:00:00.000+00:00 | 2025-09-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1899 | OpenText Enterprise Security Manager: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-08-24T22:00:00.000+00:00 | 2025-08-25T22:00:00.000+00:00 |
| wid-sec-w-2025-1898 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und Privilegieneskalation | 2025-08-24T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-028-06 | Schneider Electric RemoteConnect and SCADAPack x70 Utilities (Update A) | 2025-01-14T00:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-023-05 | Schneider Electric EcoStruxure Power Build Rapsody | 2025-01-14T00:00:00.000000Z | 2025-05-13T04:00:00.000000Z |
| icsa-25-021-02 | Siemens SIMATIC S7-1200 CPUs | 2025-01-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-016-04 | Siemens SIPROTEC 5 Products | 2025-01-14T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-016-03 | Siemens Siveillance Video Camera | 2025-01-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-016-02 | Siemens Industrial Edge Management | 2025-01-14T00:00:00.000000Z | 2025-01-14T00:00:00.000000Z |
| icsa-25-016-01 | Siemens Mendix LDAP | 2025-01-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-037-03 | ABB Drive Composer | 2025-01-10T04:30:00.000000Z | 2025-01-10T03:30:00.000000Z |
| icsa-25-010-03 | Delta Electronics DRASimuCAD (Update A) | 2025-01-09T07:00:00.000000Z | 2025-01-16T07:00:00.000000Z |
| icsa-25-007-02 | Nedap Librix Ecoreader | 2025-01-07T07:00:00.000000Z | 2025-01-07T07:00:00.000000Z |
| icsma-24-354-01 | Ossur Mobile Logic Application | 2024-12-19T07:00:00.000000Z | 2024-12-19T07:00:00.000000Z |
| icsa-24-354-07 | Schneider Electric Modicon Controllers (Update A) | 2024-12-19T07:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| icsa-24-354-05 | Tibbo AggreGate Network Manager | 2024-12-19T07:00:00.000000Z | 2024-12-19T07:00:00.000000Z |
| icsa-24-354-03 | Delta Electronics DTM Soft | 2024-12-19T07:00:00.000000Z | 2024-12-19T07:00:00.000000Z |
| icsa-24-354-01 | Hitachi Energy RTU500 series CMU | 2024-12-19T07:00:00.000000Z | 2024-12-19T07:00:00.000000Z |
| icsma-24-352-01 | BD Diagnostic Solutions Products (Update A) | 2024-12-17T07:00:00.000000Z | 2025-01-28T07:00:00.000000Z |
| icsa-24-352-03 | Rockwell Automation PowerMonitor 1000 Remote | 2024-12-17T07:00:00.000000Z | 2024-12-17T07:00:00.000000Z |
| icsa-24-352-02 | Hitachi Energy TropOS Devices Series 1400/2400/6400 | 2024-12-17T07:00:00.000000Z | 2024-12-17T07:00:00.000000Z |
| icsa-24-352-01 | ThreatQuotient ThreatQ Platform | 2024-12-17T07:00:00.000000Z | 2024-12-17T07:00:00.000000Z |
| icsa-24-354-04 | Siemens User Management Component | 2024-12-16T00:00:00.000000Z | 2026-01-14T22:05:42.437898Z |
| icsa-24-345-06 | Rockwell Automation Arena (Update B) | 2024-12-10T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-24-345-05 | Horner Automation Cscape | 2024-12-10T07:00:00.000000Z | 2024-12-10T07:00:00.000000Z |
| icsa-24-345-04 | National Instruments LabVIEW | 2024-12-10T07:00:00.000000Z | 2024-12-10T07:00:00.000000Z |
| icsa-24-345-01 | MOBATIME Network Master Clock - DTS 4801 | 2024-12-10T07:00:00.000000Z | 2024-12-10T07:00:00.000000Z |
| icsa-24-352-04 | Schneider Electric Modicon | 2024-12-10T05:00:00.000000Z | 2025-10-14T07:00:00.000000Z |
| icsa-25-010-02 | Schneider Electric Harmony HMI and Pro-Face HMI Products | 2024-12-10T00:00:00.000000Z | 2024-12-10T00:00:00.000000Z |
| icsa-25-010-01 | Schneider Electric PowerChute Serial Shutdown | 2024-12-10T00:00:00.000000Z | 2024-12-10T00:00:00.000000Z |
| icsa-24-347-10 | Siemens SENTRON Powercenter 1000 | 2024-12-10T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-24-347-09 | Siemens Teamcenter Visualization | 2024-12-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-347-08 | Siemens COMOS | 2024-12-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-npe-hardening-dkel83jp | Identifying and Mitigating Security Exposures When Using No Payload Encryption Images with Existing Cryptographic Configuration | 2023-01-18T16:00:00+00:00 | 2023-01-18T16:00:00+00:00 |
| cisco-sa-esa-url-bypass-wbmqqnjh | Cisco Email Security Appliance URL Filtering Bypass Vulnerability | 2023-01-18T16:00:00+00:00 | 2023-02-13T15:30:30+00:00 |
| cisco-sa-cucm-sql-rppczr8n | Cisco Unified Communications Manager SQL Injection Vulnerability | 2023-01-18T16:00:00+00:00 | 2023-01-18T16:00:00+00:00 |
| cisco-sa-sbr042-multi-vuln-ej76pke5 | Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers Vulnerabilities | 2023-01-11T16:00:00+00:00 | 2025-03-07T17:33:55+00:00 |
| cisco-sa-sb-rv-rcedos-7hjp74jd | Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Remote Code Execution and Denial of Service Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-01-12T16:07:37+00:00 |
| cisco-sa-rv-cmd-exe-n47kjqle | Cisco Small Business RV160 and RV260 Series VPN Routers Remote Command Execution Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-roomos-dkjgfgrk | Cisco TelePresence Collaboration Endpoint and RoomOS Software Vulnerabilities | 2023-01-11T16:00:00+00:00 | 2023-03-07T14:21:36+00:00 |
| cisco-sa-nso-path-trvsl-zjbemkzg | Cisco Network Services Orchestrator Path Traversal Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-02-03T17:57:30+00:00 |
| cisco-sa-lldp-memlk-mcoecpt | Cisco Webex Room Phone and Cisco Webex Share Link Layer Discovery Protocol Memory Leak Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-ip-phone-auth-bypass-psqxzrpr | Cisco IP Phone 7800 and 8800 Series Web Management Interface Authentication Bypass Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-ind-fzyvjjtg | Cisco Industrial Network Director Vulnerabilities | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-cxagent-goq9qjqz | Cisco CX Cloud Agent Privilege Escalation Vulnerabilities | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-cuis-xss-omm8jybx | Cisco Unified Intelligence Center Reflected Cross-Site Scripting Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-05-30T14:22:18+00:00 |
| cisco-sa-bw-xss-ezqdxqg4 | Cisco BroadWorks Application Delivery Platform, Application Server, and Xtended Services Platform Cross-Site Scripting Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-bw-dos-hpkeyzp | Cisco BroadWorks Application Delivery Platform and Xtended Services Platform Denial of Service Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-02-06T18:20:29+00:00 |
| cisco-sa-ipp-oobwrite-8cmf5r7u | Cisco IP Phone 7800 and 8800 Series Cisco Discovery Protocol Stack Overflow Vulnerability | 2022-12-08T16:00:00+00:00 | 2023-04-27T21:07:18+00:00 |
| cisco-sa-ise-7q4tnyux | Cisco Identity Services Engine Vulnerabilities | 2022-11-16T16:00:00+00:00 | 2023-03-31T20:41:42+00:00 |
| cisco-sa-ssl-client-dos-ccrqpka | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SSL/TLS Client Denial of Service Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-snort-smb-3nfhjtr | Multiple Cisco Products Snort SMB2 Detection Engine Policy Bypass and Denial of Service Vulnerabilities | 2022-11-09T16:00:00+00:00 | 2022-11-30T21:51:24+00:00 |
| cisco-sa-fw3100-secure-boot-5m8muh26 | Cisco Secure Firewall 3100 Series Secure Boot Bypass Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-ftdsnort3sip-dos-a4chearc | Cisco Firepower Threat Defense Software SIP and Snort 3 Detection Engine Denial of Service Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-ftd-tls-bb-rcgtmy2 | Cisco Firepower Threat Defense Software SSL Decryption Policy Bleichenbacher Attack Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-ftd-mgmt-privesc-7gqr2th | Cisco Firepower Threat Defense Software Privilege Escalation Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-ftd-gre-dos-hmedhqpm | Cisco Firepower Threat Defense Software Generic Routing Encapsulation Denial of Service Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-ftd-fxos-cmd-inj-q9blnsrk | Cisco Firepower Threat Defense Software and Cisco FXOS Software Command Injection Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-fmcsfr-snmp-access-6gqgtj4s | Cisco FirePOWER Software for ASA FirePOWER Module, Firepower Management Center Software, and NGIPS Software SNMP Default Credential Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-fmc-xxe-mzpc4byd | Cisco Firepower Management Center Software XML External Entity Injection Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-fmc-xss-latzyzxs | Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-fmc-info-disc-ughnrrhp | Cisco Firepower Management Center Software Information Disclosure Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-fmc-dos-oweunwjn | Cisco Firepower Management Center and Firepower Threat Defense Software SSH Denial of Service Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-31469 | virtio_net: Fix UAF on dst_ops when IFF_XMIT_DST_RELEASE is cleared and napi_tx is false | 2026-04-02T00:00:00.000Z | 2026-04-29T14:39:02.000Z |
| msrc_cve-2026-31467 | erofs: add GFP_NOIO in the bio completion if needed | 2026-04-02T00:00:00.000Z | 2026-04-29T14:47:45.000Z |
| msrc_cve-2026-31464 | scsi: ibmvfc: Fix OOB access in ibmvfc_discover_targets_done() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:44:02.000Z |
| msrc_cve-2026-31462 | drm/amdgpu: prevent immediate PASID reuse case | 2026-04-02T00:00:00.000Z | 2026-05-06T14:37:42.000Z |
| msrc_cve-2026-31461 | drm/amd/display: Fix drm_edid leak in amdgpu_dm | 2026-04-02T00:00:00.000Z | 2026-04-23T14:37:13.000Z |
| msrc_cve-2026-31458 | mm/damon/sysfs: check contexts->nr before accessing contexts_arr[0] | 2026-04-02T00:00:00.000Z | 2026-04-29T15:01:29.000Z |
| msrc_cve-2026-31455 | xfs: stop reclaim before pushing AIL during unmount | 2026-04-02T00:00:00.000Z | 2026-05-07T01:03:18.000Z |
| msrc_cve-2026-31454 | xfs: save ailp before dropping the AIL lock in push callbacks | 2026-04-02T00:00:00.000Z | 2026-04-29T14:39:34.000Z |
| msrc_cve-2026-31453 | xfs: avoid dereferencing log items after push callbacks | 2026-04-02T00:00:00.000Z | 2026-04-29T14:47:12.000Z |
| msrc_cve-2026-31452 | ext4: convert inline data to extents when truncate exceeds inline size | 2026-04-02T00:00:00.000Z | 2026-04-29T15:00:27.000Z |
| msrc_cve-2026-31451 | ext4: replace BUG_ON with proper error handling in ext4_read_inline_folio | 2026-04-02T00:00:00.000Z | 2026-04-29T14:45:32.000Z |
| msrc_cve-2026-31450 | ext4: publish jinode after initialization | 2026-04-02T00:00:00.000Z | 2026-04-29T14:48:51.000Z |
| msrc_cve-2026-31449 | ext4: validate p_idx bounds in ext4_ext_correct_indexes | 2026-04-02T00:00:00.000Z | 2026-05-06T14:38:18.000Z |
| msrc_cve-2026-31448 | ext4: avoid infinite loops caused by residual data | 2026-04-02T00:00:00.000Z | 2026-04-29T14:42:49.000Z |
| msrc_cve-2026-31447 | ext4: reject mount if bigalloc with s_first_data_block != 0 | 2026-04-02T00:00:00.000Z | 2026-04-29T14:43:57.000Z |
| msrc_cve-2026-31446 | ext4: fix use-after-free in update_super_work when racing with umount | 2026-04-02T00:00:00.000Z | 2026-04-29T14:40:33.000Z |
| msrc_cve-2026-31444 | ksmbd: fix use-after-free and NULL deref in smb_grant_oplock() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:44:13.000Z |
| msrc_cve-2026-31441 | dmaengine: idxd: Fix memory leak when a wq is reset | 2026-04-02T00:00:00.000Z | 2026-04-29T14:38:46.000Z |
| msrc_cve-2026-31440 | dmaengine: idxd: Fix leaking event log memory | 2026-04-02T00:00:00.000Z | 2026-05-06T14:37:52.000Z |
| msrc_cve-2026-31439 | dmaengine: xilinx: xdma: Fix regmap init error handling | 2026-04-02T00:00:00.000Z | 2026-04-29T14:43:26.000Z |
| msrc_cve-2026-31433 | ksmbd: fix potencial OOB in get_file_all_info() for compound requests | 2026-04-02T00:00:00.000Z | 2026-04-30T01:45:42.000Z |
| msrc_cve-2026-31432 | ksmbd: fix OOB write in QUERY_INFO for compound requests | 2026-04-02T00:00:00.000Z | 2026-04-30T01:45:19.000Z |
| msrc_cve-2026-31431 | crypto: algif_aead - Revert to operating out-of-place | 2026-04-02T00:00:00.000Z | 2026-05-05T14:41:54.000Z |
| msrc_cve-2026-31430 | X.509: Fix out-of-bounds access when parsing extensions | 2026-04-02T00:00:00.000Z | 2026-05-01T14:38:42.000Z |
| msrc_cve-2026-31429 | net: skb: fix cross-cache free of KFENCE-allocated skb head | 2026-04-02T00:00:00.000Z | 2026-04-30T01:41:58.000Z |
| msrc_cve-2026-31428 | netfilter: nfnetlink_log: fix uninitialized padding leak in NFULA_PAYLOAD | 2026-04-02T00:00:00.000Z | 2026-04-29T14:57:19.000Z |
| msrc_cve-2026-31427 | netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp | 2026-04-02T00:00:00.000Z | 2026-04-29T14:56:09.000Z |
| msrc_cve-2026-31426 | ACPI: EC: clean up handlers on probe failure in acpi_ec_setup() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:56:24.000Z |
| msrc_cve-2026-31424 | netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP | 2026-04-02T00:00:00.000Z | 2026-04-29T14:55:12.000Z |
| msrc_cve-2026-31423 | net/sched: sch_hfsc: fix divide-by-zero in rtsc_min() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:54:57.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0381 | Kwetsbaarheden verholpen in Apple MacOS | 2024-09-26T08:48:34.451990Z | 2024-09-26T08:48:34.451990Z |
| ncsc-2024-0380 | Kwetsbaarheid verholpen in pgAdmin | 2024-09-24T06:36:30.438686Z | 2024-09-24T07:31:32.768856Z |
| ncsc-2024-0379 | Kwetsbaarheden verholpen in Ivanti Cloud Services Appliance | 2024-09-20T07:57:16.737952Z | 2024-09-20T07:57:16.737952Z |
| ncsc-2024-0378 | Kwetsbaarheden verholpen in SAP producten | 2024-09-19T11:37:39.757598Z | 2024-09-19T11:37:39.757598Z |
| ncsc-2024-0377 | Kwetsbaarheden verholpen in VMware vCenter Server | 2024-09-18T11:28:43.103000Z | 2024-11-19T09:56:16.772512Z |
| ncsc-2024-0376 | Kwetsbaarheden verholpen in Docker Desktop | 2024-09-18T11:25:01.116345Z | 2024-09-18T11:25:01.116345Z |
| ncsc-2024-0375 | Kwetsbaarheid verholpen in Rockwell Automation FactoryTalk View Site | 2024-09-13T08:52:23.143943Z | 2024-09-13T08:52:23.143943Z |
| ncsc-2024-0374 | Kwetsbaarheid verholpen in Rockwell Automation ThinManager | 2024-09-13T08:46:33.745410Z | 2024-09-13T08:46:33.745410Z |
| ncsc-2024-0373 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-09-13T08:44:24.003809Z | 2024-09-13T08:44:24.003809Z |
| ncsc-2024-0372 | Kwetsbaarheden verholpen in Citrix Workspace App for Windows | 2024-09-13T08:42:05.882665Z | 2024-09-13T08:42:05.882665Z |
| ncsc-2024-0371 | Kwetsbaarheden verholpen in Cisco IOS XR | 2024-09-13T08:40:26.656280Z | 2024-09-13T08:40:26.656280Z |
| ncsc-2024-0370 | Kwetsbaarheden verholpen in Solarwinds Access Rights Manager | 2024-09-13T08:30:38.806820Z | 2024-09-13T08:30:38.806820Z |
| ncsc-2024-0369 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2024-09-11T09:39:20.224400Z | 2024-09-13T17:00:35.302643Z |
| ncsc-2024-0368 | Kwetsbaarheden verholpen in Adobe producten | 2024-09-11T09:31:21.515977Z | 2024-09-11T09:31:21.515977Z |
| ncsc-2024-0367 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2024-09-10T18:28:04.110959Z | 2024-09-10T18:28:04.110959Z |
| ncsc-2024-0366 | Kwetsbaarheden verholpen in Microsoft Azure | 2024-09-10T18:27:15.880741Z | 2024-09-10T18:27:15.880741Z |
| ncsc-2024-0365 | Kwetsbaarheden verholpen in Microsoft Office | 2024-09-10T18:23:10.239728Z | 2024-09-10T18:23:10.239728Z |
| ncsc-2024-0364 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2024-09-10T18:22:18.355522Z | 2024-09-10T18:22:18.355522Z |
| ncsc-2024-0363 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-09-10T18:21:28.305189Z | 2024-09-10T18:21:28.305189Z |
| ncsc-2024-0362 | Kwetsbaarheden verholpen in Siemens producten | 2024-09-10T18:20:41.668720Z | 2024-09-10T18:20:41.668720Z |
| ncsc-2024-0361 | Kwetsbaarheden verholpen in QNAP QTS en QTS Hero | 2024-09-10T10:56:51.207746Z | 2024-09-10T10:56:51.207746Z |
| ncsc-2024-0360 | Kwetsbaarheid verholpen in Kemp LoadMaster | 2024-09-06T08:02:25.414309Z | 2024-09-06T08:02:25.414309Z |
| ncsc-2024-0359 | Kwetsbaarheden verholpen in diverse producten van Veeam. | 2024-09-06T08:01:04.558202Z | 2024-10-11T09:18:53.784374Z |
| ncsc-2024-0358 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-09-05T12:02:20.203769Z | 2024-09-05T12:02:20.203769Z |
| ncsc-2024-0357 | Kwetsbaarheden verholpen in Zyxel Flex en USG Firewalls | 2024-09-03T09:51:27.134213Z | 2024-09-03T09:51:27.134213Z |
| ncsc-2024-0356 | Kwetsbaarheid verholpen in Zyxel Access Points en Secure Routers | 2024-09-03T09:45:01.012004Z | 2024-09-03T09:45:01.012004Z |
| ncsc-2024-0355 | Kwetsbaarheden verholpen in Progress WhatsUp Gold | 2024-08-30T13:44:34.239519Z | 2024-09-02T11:51:17.688561Z |
| ncsc-2024-0354 | Kwetsbaarheden verholpen in Progress WS_FTP server | 2024-08-30T13:42:50.517100Z | 2024-08-30T13:42:50.517100Z |
| ncsc-2024-0353 | Kwetsbaarheid verholpen in Sonicwall SonicOS | 2024-08-27T12:45:37.679365Z | 2024-09-10T12:34:18.650826Z |
| ncsc-2024-0352 | Kwetsbaarheden verholpen in Solarwinds Web Helpdesk | 2024-08-22T13:05:56.658579Z | 2024-08-22T13:05:56.658579Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10162-1 | localsearch-3.10.2-2.1 on GA media | 2026-02-07T00:00:00Z | 2026-02-07T00:00:00Z |
| opensuse-su-2026:20186-1 | Security update for libsoup | 2026-02-06T11:13:48Z | 2026-02-06T11:13:48Z |
| opensuse-su-2026:20185-1 | Security update for cockpit-packages | 2026-02-06T09:31:50Z | 2026-02-06T09:31:50Z |
| opensuse-su-2026:20182-1 | Security update for cockpit | 2026-02-06T03:08:03Z | 2026-02-06T03:08:03Z |
| opensuse-su-2026:20181-1 | Security update for cockpit-subscriptions | 2026-02-06T02:48:38Z | 2026-02-06T02:48:38Z |
| opensuse-su-2026:10161-1 | python311-azure-core-1.38.0-2.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:10160-1 | python311-Django-5.2.11-1.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:10159-1 | opencloud-server-5.0.2-1.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:10158-1 | nginx-1.29.5-1.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:10157-1 | libsnmp45-32bit-5.9.5.2-1.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:10156-1 | micropython-1.26.1-2.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:10155-1 | cockpit-podman-119.1-2.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:10154-1 | cockpit-354-3.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:10153-1 | chromedriver-144.0.7559.132-1.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:20180-1 | Security update for python-maturin | 2026-02-05T20:51:59Z | 2026-02-05T20:51:59Z |
| opensuse-su-2026:20178-1 | Security update for libxml2 | 2026-02-05T11:26:20Z | 2026-02-05T11:26:20Z |
| opensuse-su-2026:20177-1 | Security update for golang-github-prometheus-prometheus | 2026-02-05T10:44:24Z | 2026-02-05T10:44:24Z |
| opensuse-su-2026:10152-1 | python315-3.15.0~a3-4.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10151-1 | python311-wheel-0.46.3-1.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10150-1 | cockpit-subscriptions-14.4-2.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10149-1 | cockpit-repos-4.7-2.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10148-1 | cockpit-packages-4.1-2.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10147-1 | cockpit-machines-346-2.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:20172-1 | Security update for cups | 2026-02-04T11:37:13Z | 2026-02-04T11:37:13Z |
| opensuse-su-2026:10146-1 | libpainter0-0.9.27-1.1 on GA media | 2026-02-04T00:00:00Z | 2026-02-04T00:00:00Z |
| opensuse-su-2026:10145-1 | python312-Django6-6.0.2-1.1 on GA media | 2026-02-04T00:00:00Z | 2026-02-04T00:00:00Z |
| opensuse-su-2026:10144-1 | expat-2.7.4-1.1 on GA media | 2026-02-04T00:00:00Z | 2026-02-04T00:00:00Z |
| opensuse-ru-2026:20168-1 | Recommended update for gimp | 2026-02-03T18:05:40Z | 2026-02-03T18:05:40Z |
| opensuse-su-2026:20167-1 | Security update for xrdp | 2026-02-03T15:00:07Z | 2026-02-03T15:00:07Z |
| opensuse-su-2026:10143-1 | traefik2-2.11.35-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:8075 | Red Hat Security Advisory: bind security update | 2026-04-14T14:56:03+00:00 | 2026-04-28T18:40:28+00:00 |
| rhsa-2026:7380 | Red Hat Security Advisory: Red Hat build of Quarkus 3.27.3 release and security update | 2026-04-14T14:45:52+00:00 | 2026-05-07T18:06:33+00:00 |
| rhsa-2026:8052 | Red Hat Security Advisory: firefox security update | 2026-04-14T11:50:27+00:00 | 2026-05-07T21:41:53+00:00 |
| rhsa-2026:7983 | Red Hat Security Advisory: nodejs:22 security update | 2026-04-14T07:23:22+00:00 | 2026-05-08T14:46:27+00:00 |
| rhsa-2026:7992 | Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update | 2026-04-14T06:48:01+00:00 | 2026-05-08T15:00:41+00:00 |
| rhsa-2026:7942 | Red Hat Security Advisory: HawtIO 4.3.1 for Red Hat build of Apache Camel 4 Release and security update. | 2026-04-13T21:59:31+00:00 | 2026-05-08T16:03:54+00:00 |
| rhsa-2026:7933 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-13T19:42:10+00:00 | 2026-05-01T21:38:01+00:00 |
| rhsa-2026:7915 | Red Hat Security Advisory: bind9.18 security update | 2026-04-13T19:40:30+00:00 | 2026-04-28T18:40:22+00:00 |
| rhsa-2026:7896 | Red Hat Security Advisory: nodejs:20 security update | 2026-04-13T18:36:15+00:00 | 2026-05-08T14:46:20+00:00 |
| rhsa-2026:7883 | Red Hat Security Advisory: golang security update | 2026-04-13T17:44:19+00:00 | 2026-05-08T15:00:40+00:00 |
| rhsa-2026:7876 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-04-13T16:34:14+00:00 | 2026-05-08T15:00:39+00:00 |
| rhsa-2026:7877 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-04-13T16:31:14+00:00 | 2026-05-08T15:00:39+00:00 |
| rhsa-2026:7879 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-04-13T16:26:59+00:00 | 2026-05-08T15:00:40+00:00 |
| rhsa-2026:7878 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-04-13T16:21:54+00:00 | 2026-05-08T15:00:39+00:00 |
| rhsa-2026:7854 | Red Hat Security Advisory: podman security update | 2026-04-13T12:51:03+00:00 | 2026-05-08T16:03:54+00:00 |
| rhsa-2026:7858 | Red Hat Security Advisory: firefox security update | 2026-04-13T12:47:34+00:00 | 2026-04-28T18:40:09+00:00 |
| rhsa-2026:7850 | Red Hat Security Advisory: gstreamer-plugins-base and gstreamer-plugins-good security update | 2026-04-13T11:16:58+00:00 | 2026-04-28T14:08:28+00:00 |
| rhsa-2026:7837 | Red Hat Security Advisory: firefox security update | 2026-04-13T10:58:28+00:00 | 2026-04-28T18:40:04+00:00 |
| rhsa-2026:7845 | Red Hat Security Advisory: firefox security update | 2026-04-13T10:52:23+00:00 | 2026-04-28T18:40:18+00:00 |
| rhsa-2026:7848 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-13T10:39:02+00:00 | 2026-04-29T05:21:00+00:00 |
| rhsa-2026:7838 | Red Hat Security Advisory: firefox security update | 2026-04-13T10:37:18+00:00 | 2026-04-28T18:40:09+00:00 |
| rhsa-2026:7834 | Red Hat Security Advisory: golang security update | 2026-04-13T10:25:23+00:00 | 2026-05-08T15:00:38+00:00 |
| rhsa-2026:7843 | Red Hat Security Advisory: firefox security update | 2026-04-13T10:24:18+00:00 | 2026-04-28T18:40:31+00:00 |
| rhsa-2026:7842 | Red Hat Security Advisory: firefox security update | 2026-04-13T10:18:06+00:00 | 2026-04-28T18:40:19+00:00 |
| rhsa-2026:7841 | Red Hat Security Advisory: firefox security update | 2026-04-13T10:16:48+00:00 | 2026-04-28T18:40:04+00:00 |
| rhsa-2026:7839 | Red Hat Security Advisory: firefox security update | 2026-04-13T10:05:28+00:00 | 2026-04-28T18:40:05+00:00 |
| rhsa-2026:7840 | Red Hat Security Advisory: firefox security update | 2026-04-13T10:05:13+00:00 | 2026-04-28T18:40:09+00:00 |
| rhsa-2026:7846 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-13T10:05:01+00:00 | 2026-05-07T08:30:52+00:00 |
| rhsa-2026:7833 | Red Hat Security Advisory: golang security update | 2026-04-13T09:59:28+00:00 | 2026-05-08T15:00:38+00:00 |
| rhsa-2026:7711 | Red Hat Security Advisory: vim security update | 2026-04-13T08:55:38+00:00 | 2026-05-08T14:46:22+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-675303 | SSA-675303: WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens Products | 2021-07-13T00:00:00Z | 2022-02-08T00:00:00Z |
| ssa-661034 | SSA-661034: Incorrect Permission Assignment in Multiple SIMATIC Software Products | 2021-07-13T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-641963 | SSA-641963: Remote Code Execution Vulnerability in Multiple SIMATIC Software Products | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-622535 | SSA-622535: Multiple Vulnerabilities in Teamcenter Active Workspace | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-599968 | SSA-599968: Denial of Service Vulnerability in Profinet Devices | 2021-07-13T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-560465 | SSA-560465: DHCP Client Vulnerability in VxWorks-based Industrial Products | 2021-07-13T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-483182 | SSA-483182: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.2 | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-448291 | SSA-448291: Denial-of-Service Vulnerability in ARP Protocol of RWG Universal Controllers | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-434536 | SSA-434536: Memory Protection Bypass Vulnerability in SINUMERIK ONE and SINUMERIK MC | 2021-07-13T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-434535 | SSA-434535: Memory Protection Bypass Vulnerability in SINAMICS PERFECT HARMONY GH180 Drives | 2021-07-13T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-373591 | SSA-373591: Buffer Overflow Vulnerability in RUGGEDCOM ROS Devices | 2021-07-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-352521 | SSA-352521: Access Check Bypass Vulnerability in Mendix | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-209268 | SSA-209268: Multiple JT File Parsing Vulnerabilities in JT Utilities before V13.0.2.0 | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-173615 | SSA-173615: Multiple PAR and ASM File Parsing Vulnerabilities in Solid Edge | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-787292 | SSA-787292: Denial of Service Vulnerability in SIMATIC RFID Readers | 2021-06-08T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-645530 | SSA-645530: TIFF File Parsing Vulnerability in JT2Go and Teamcenter Visualization before V13.1.0.3 | 2021-06-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-522654 | SSA-522654: Privilege Escalation Vulnerability in Mendix SAML Module | 2021-06-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-419820 | SSA-419820: Denial-of-Service Vulnerability in TIM 1531 IRC | 2021-06-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-211752 | SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA | 2021-06-08T00:00:00Z | 2022-02-08T00:00:00Z |
| ssa-208356 | SSA-208356: DFT File Parsing Vulnerabilities in Solid Edge | 2021-06-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-200951 | SSA-200951: Multiple Vulnerabilities in Third-Party Component libcurl of TIM Devices | 2021-06-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-133038 | SSA-133038: Multiple Modfem File Parsing Vulnerabilities in Simcenter Femap | 2021-06-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-434534 | SSA-434534: Memory Protection Bypass Vulnerability in SIMATIC S7-1200 and S7-1500 CPU Families | 2021-05-28T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-119468 | SSA-119468: Luxion KeyShot Vulnerabilities in Solid Edge | 2021-05-25T00:00:00Z | 2021-05-25T00:00:00Z |
| ssa-695540 | SSA-695540: ASM and PAR File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.1.0.2 | 2021-05-17T00:00:00Z | 2021-05-17T00:00:00Z |
| ssa-983548 | SSA-983548: Multiple SPP File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2021-05-11T00:00:00Z | 2021-05-11T00:00:00Z |
| ssa-940818 | SSA-940818: UltraVNC Vulnerabilities in SIMATIC HMIs/WinCC Products | 2021-05-11T00:00:00Z | 2021-05-11T00:00:00Z |
| ssa-919955 | SSA-919955: Information Disclosure Vulnerability in Mendix Database Replication Module | 2021-05-11T00:00:00Z | 2021-05-11T00:00:00Z |
| ssa-854248 | SSA-854248: Information Disclosure Vulnerability in Mendix Excel Importer Module | 2021-05-11T00:00:00Z | 2021-05-11T00:00:00Z |
| ssa-752103 | SSA-752103: Telnet Authentication Vulnerability in SINAMICS Medium Voltage Products | 2021-05-11T00:00:00Z | 2021-08-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21083-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21082-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21081-1 | Security update for the Linux Kernel RT (Live Patch 15 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21055-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21054-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21053-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21052-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21051-1 | Security update for the Linux Kernel RT (Live Patch 15 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21080-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:33Z | 2026-04-09T13:20:33Z |
| suse-su-2026:21050-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:33Z | 2026-04-09T13:20:33Z |
| suse-su-2026:21079-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:25Z | 2026-04-09T13:20:25Z |
| suse-su-2026:21078-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:25Z | 2026-04-09T13:20:25Z |
| suse-su-2026:21049-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:25Z | 2026-04-09T13:20:25Z |
| suse-su-2026:21048-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:25Z | 2026-04-09T13:20:25Z |
| suse-su-2026:21077-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:15Z | 2026-04-09T13:20:15Z |
| suse-su-2026:21076-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:15Z | 2026-04-09T13:20:15Z |
| suse-su-2026:21047-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:15Z | 2026-04-09T13:20:15Z |
| suse-su-2026:21046-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:15Z | 2026-04-09T13:20:15Z |
| suse-su-2026:21075-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21074-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21045-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21044-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21073-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21072-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21071-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21070-1 | Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21043-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21042-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21041-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21040-1 | Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:20963 | Moderate: qt5-qt3d security update | 2025-11-11T00:00:00Z | 2025-11-19T09:37:23Z |
| alsa-2025:20962 | Important: pcs security update | 2025-11-11T00:00:00Z | 2025-12-01T08:09:09Z |
| alsa-2025:20961 | Moderate: xorg-x11-server security update | 2025-11-11T00:00:00Z | 2025-11-19T09:36:21Z |
| alsa-2025:20960 | Moderate: xorg-x11-server-Xwayland security update | 2025-11-11T00:00:00Z | 2025-11-19T09:34:47Z |
| alsa-2025:20959 | Important: libsoup security update | 2025-11-11T00:00:00Z | 2025-11-19T09:32:27Z |
| alsa-2025:20958 | Important: tigervnc security update | 2025-11-11T00:00:00Z | 2025-12-01T08:10:34Z |
| alsa-2025:20957 | Important: runc security update | 2025-11-11T00:00:00Z | 2025-11-19T09:31:22Z |
| alsa-2025:20956 | Important: libtiff security update | 2025-11-11T00:00:00Z | 2025-11-19T09:30:24Z |
| alsa-2025:20955 | Important: redis:7 security update | 2025-11-11T00:00:00Z | 2025-11-19T09:42:38Z |
| alsa-2025:20954 | Important: sssd security update | 2025-11-11T00:00:00Z | 2025-12-01T08:13:09Z |
| alsa-2025:20945 | Moderate: vim security update | 2025-11-11T00:00:00Z | 2025-11-19T09:26:44Z |
| alsa-2025:20943 | Moderate: libssh security update | 2025-11-11T00:00:00Z | 2025-11-19T09:28:35Z |
| alsa-2025:20936 | Important: sqlite security update | 2025-11-11T00:00:00Z | 2025-11-19T09:25:24Z |
| alsa-2025:20935 | Important: squid security update | 2025-11-11T00:00:00Z | 2025-11-19T09:24:20Z |
| alsa-2025:20928 | Important: ipa security update | 2025-11-11T00:00:00Z | 2025-12-01T08:16:32Z |
| alsa-2025:20926 | Important: redis security update | 2025-11-11T00:00:00Z | 2025-11-19T09:23:20Z |
| alsa-2025:20922 | Important: webkit2gtk3 security update | 2025-11-11T00:00:00Z | 2025-11-19T09:22:06Z |
| alsa-2025:20909 | Important: podman security update | 2025-11-11T00:00:00Z | 2025-11-24T12:26:34Z |
| alsa-2025:20838 | Moderate: zziplib security update | 2025-11-11T00:00:00Z | 2025-11-19T09:20:52Z |
| alsa-2025:20559 | Low: shadow-utils security update | 2025-11-11T00:00:00Z | 2025-11-19T09:19:16Z |
| alsa-2025:20532 | Moderate: grub2 security update | 2025-11-11T00:00:00Z | 2025-11-19T09:18:10Z |
| alsa-2025:20518 | Moderate: kernel security update | 2025-11-11T00:00:00Z | 2025-11-19T09:15:54Z |
| alsa-2025:20478 | Moderate: zziplib security update | 2025-11-11T00:00:00Z | 2025-11-24T10:49:03Z |
| alsa-2025:20181 | Important: pam security update | 2025-11-11T00:00:00Z | 2025-11-24T10:46:53Z |
| alsa-2025:20155 | Moderate: binutils security update | 2025-11-11T00:00:00Z | 2025-11-24T10:47:58Z |
| alsa-2025:20145 | Low: shadow-utils security update | 2025-11-11T00:00:00Z | 2025-11-24T10:50:07Z |
| alsa-2025:20126 | Moderate: openssh security update | 2025-11-11T00:00:00Z | 2025-11-24T10:51:19Z |
| alsa-2025:20095 | Moderate: kernel security update | 2025-11-11T00:00:00Z | 2025-11-24T10:55:21Z |
| alsa-2025:20034 | Important: libtiff security update | 2025-11-10T00:00:00Z | 2025-11-11T12:31:49Z |
| alsa-2025:19950 | Important: bind9.18 security update | 2025-11-10T00:00:00Z | 2025-11-19T09:11:13Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-72 | UNKNOWN READ in LLVMFuzzerRunDriver | 2024-02-03T00:04:56.169161Z | 2024-02-03T00:04:56.169853Z |
| osv-2024-68 | Heap-buffer-overflow in gsfdmx_probe_data | 2024-02-02T00:02:07.804929Z | 2024-04-18T14:26:13.767979Z |
| osv-2024-66 | Heap-buffer-overflow in mrb_memsearch | 2024-02-01T00:13:20.152510Z | 2024-02-14T14:19:50.489803Z |
| osv-2024-65 | Heap-buffer-overflow in mrb_memsearch | 2024-02-01T00:12:19.091201Z | 2024-02-14T14:19:46.707491Z |
| osv-2024-64 | Global-buffer-overflow in ReadVariantArrayBuiltInType | 2024-02-01T00:03:55.790847Z | 2024-02-06T14:18:25.113400Z |
| osv-2024-42 | Heap-double-free in dwg_free_common_entity_data | 2024-01-26T00:03:30.637411Z | 2024-04-27T14:26:04.198487Z |
| osv-2024-39 | Heap-buffer-overflow in simdutf::westmere::implementation::convert_utf8_to_utf32 | 2024-01-25T00:05:37.689031Z | 2024-04-29T11:31:05.900312Z |
| osv-2024-38 | Heap-buffer-overflow in json_HEADER | 2024-01-25T00:03:33.797633Z | 2024-04-27T14:25:53.641813Z |
| osv-2024-36 | Heap-use-after-free in LLVMFuzzerRunDriver | 2024-01-24T00:12:37.499127Z | 2024-01-24T00:12:37.499641Z |
| osv-2024-33 | Heap-buffer-overflow in ctxload_probe_data | 2024-01-24T00:05:37.532325Z | 2024-04-18T14:26:43.225909Z |
| osv-2024-30 | Heap-buffer-overflow in mrb_memsearch | 2024-01-22T00:05:20.803259Z | 2024-02-14T14:19:17.217387Z |
| osv-2024-29 | Heap-buffer-overflow in mrb_memsearch | 2024-01-22T00:01:33.424797Z | 2024-02-14T14:18:57.560129Z |
| osv-2024-28 | Security exception in java.base/java.util.Arrays.copyOf | 2024-01-21T00:12:30.613951Z | 2025-12-01T14:21:19.263844Z |
| osv-2024-25 | Stack-buffer-overflow in icu_75::PluralRuleParser::parse | 2024-01-21T00:00:16.253854Z | 2024-04-16T15:30:31.262505Z |
| osv-2024-24 | Security exception in java.base/java.util.Arrays.copyOf | 2024-01-20T00:04:01.700018Z | 2024-03-13T14:21:08.789955Z |
| osv-2024-22 | Heap-use-after-free in ucl_hash_func | 2024-01-19T00:14:18.833531Z | 2024-07-16T04:35:26.847250Z |
| osv-2024-20 | Heap-buffer-overflow in bam_aux_get | 2024-01-19T00:05:05.917557Z | 2024-04-29T11:28:16.496002Z |
| osv-2024-18 | Heap-use-after-free in QPDF::read_xref | 2024-01-19T00:01:09.084916Z | 2025-01-10T05:03:37.159682Z |
| osv-2024-17 | Heap-use-after-free in iasecc_delete_file | 2024-01-17T00:12:20.698997Z | 2024-04-05T14:21:32.049652Z |
| osv-2024-10 | Heap-buffer-overflow in __string | 2024-01-12T00:12:45.528472Z | 2024-04-16T16:14:55.449018Z |
| osv-2024-9 | Stack-buffer-overflow in _canonicalize | 2024-01-11T00:04:20.734197Z | 2024-04-16T15:44:42.424488Z |
| osv-2024-7 | Heap-buffer-overflow in icu_75::Locale::Locale | 2024-01-07T00:11:45.064745Z | 2024-01-07T00:11:45.065397Z |
| osv-2024-6 | Global-buffer-overflow in void jxl::N_AVX2::WriteToOutputStage::StoreUnsignedRow<unsigned char> | 2024-01-06T00:11:05.929725Z | 2024-03-08T14:19:24.750958Z |
| osv-2024-4 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-01-04T00:13:53.974088Z | 2024-04-01T14:13:38.051217Z |
| osv-2024-3 | Stack-buffer-overflow in icu_75::TZDBTimeZoneNames::getMetaZoneNames | 2024-01-04T00:03:08.480968Z | 2024-04-17T16:20:49.591813Z |
| osv-2023-1382 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-01-01T00:12:36.633204Z | 2024-01-01T00:12:36.633589Z |
| osv-2023-1381 | Heap-buffer-overflow in NetworkInterface::processPacket | 2024-01-01T00:03:49.670656Z | 2024-01-01T00:03:49.671160Z |
| osv-2023-1378 | Heap-buffer-overflow in ih264d_get_bits_h264 | 2023-12-31T00:13:35.510537Z | 2024-04-25T14:13:38.925666Z |
| osv-2023-1375 | Heap-buffer-overflow in IEC104Stats::processPacket | 2023-12-31T00:10:56.069235Z | 2023-12-31T00:10:56.069852Z |
| osv-2023-1373 | Heap-use-after-free in xmlRemoveID | 2023-12-31T00:01:26.816109Z | 2023-12-31T00:01:26.816606Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2021-0155 | Use After Free in lucet-runtime | 2021-11-30T12:00:00Z | 2026-01-17T19:50:19Z |
| rustsec-2021-0126 | RustEmbed generated `get` method allows for directory traversal when reading files from disk | 2021-11-29T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0124 | Data race when sending and receiving after closing a `oneshot` channel | 2021-11-16T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0125 | Panic on incorrect date input to `simple_asn1` | 2021-11-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0123 | Converting `NSString` to a String Truncates at Null Bytes | 2021-11-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0122 | Generated code can read and write out of bounds in safe code | 2021-10-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0137 | sodiumoxide is deprecated | 2021-10-22T12:00:00Z | 2022-08-10T04:01:59Z |
| rustsec-2021-0120 | abomonation transmutes &T to and from &[u8] without sufficient constraints | 2021-10-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0138 | Incorrect use of `set_len` allows for un-initialized memory | 2021-10-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0121 | Non-aligned u32 read in Chacha20 encryption and decryption | 2021-10-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0144 | traitobject is Unmaintained | 2021-10-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0119 | Out-of-bounds write in nix::unistd::getgrouplist | 2021-09-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0115 | `#[zeroize(drop)]` doesn't implement `Drop` for `enum`s | 2021-09-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0114 | Aliased mutable references from `tls_rand` & `TlsWyRand` | 2021-09-23T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0110 | Multiple Vulnerabilities in Wasmtime | 2021-09-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0111 | Memory Safety Issue when using `patch` or `merge` on `state` and assign the result back to `state` | 2021-09-16T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0118 | `FixedSizeBinaryArray` does not perform bound checks on accessing values and offsets | 2021-09-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0117 | `DecimalArray` does not perform bound checks on accessing values and offsets | 2021-09-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0116 | `BinaryArray` does not perform bound checks on reading values and offsets | 2021-09-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0154 | Uninitalized memory read & leak caused by fuser crate | 2021-09-10T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2021-0100 | Miscomputed results when using AVX2 backend | 2021-09-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0147 | `daemonize` is Unmaintained | 2021-09-01T12:00:00Z | 2023-04-08T19:49:55Z |
| rustsec-2021-0099 | Crate has been renamed to `cosmrs` | 2021-08-25T12:00:00Z | 2021-08-25T14:54:10Z |
| rustsec-2021-0098 | Read buffer overruns processing ASN.1 strings | 2021-08-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0097 | SM2 Decryption Buffer Overflow | 2021-08-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0139 | ansi_term is Unmaintained | 2021-08-18T12:00:00Z | 2023-09-06T22:52:31Z |
| rustsec-2021-0096 | spirv_headers is unmaintained, use spirv instead | 2021-08-16T12:00:00Z | 2021-08-23T14:34:15Z |
| rustsec-2021-0127 | serde_cbor is unmaintained | 2021-08-15T12:00:00Z | 2021-12-01T14:04:55Z |
| rustsec-2021-0082 | vec-const attempts to construct a Vec from a pointer to a const slice | 2021-08-14T12:00:00Z | 2025-12-17T17:06:41Z |
| rustsec-2021-0103 | Partial read is incorrect in molecule | 2021-07-30T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-discourse-2026-32615 | Discourse: Category group moderators can perform actions on topics in restricted categories without read access | 2026-04-07T08:43:53.093Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32607 | Discourse: Stored XSS via unescaped assignee name | 2026-04-07T08:43:50.897Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32273 | Discourse: XSS on category description update via API | 2026-04-07T08:43:48.997Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32243 | Discourse: Stored XSS in discourse-ai shared conversations onebox | 2026-04-07T08:43:46.857Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32143 | Discourse: Admin-only report can be exported by moderators | 2026-04-07T08:43:44.810Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32113 | Discourse: Open redirect via `sso_destination_url` cookie in `enter` | 2026-04-07T08:43:40.581Z | 2026-04-07T09:14:25.218Z |
| bit-parse-2026-34784 | Parse Server: Streaming file download bypasses afterFind file trigger authorization | 2026-04-06T14:49:38.726Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34595 | Parse Server: LiveQuery protected-field guard bypass via array-like logical operator value | 2026-04-06T14:49:36.710Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34574 | Parse Server: Session field immutability bypass via falsy-value guard | 2026-04-06T14:49:34.810Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34573 | Parse Server: GraphQL complexity validator exponential fragment traversal DoS | 2026-04-06T14:49:33.069Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34532 | Parse Server: Cloud function validator bypass via prototype chain traversal | 2026-04-06T14:49:31.298Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34373 | Parse Server: GraphQL API endpoint ignores CORS origin restriction | 2026-04-06T14:49:29.676Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34363 | Parse Server: LiveQuery protected field leak via shared mutable state across concurrent subscribers | 2026-04-06T14:49:27.983Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34224 | Parse Server: MFA single-use token bypass via concurrent authData login requests | 2026-04-06T14:49:26.245Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34215 | Parse Server: Auth data exposed via verify password endpoint | 2026-04-06T14:49:24.609Z | 2026-04-06T15:13:09.641Z |
| bit-minio-2026-34204 | MinIO is Vulnerable to SSE Metadata Injection via Replication Headers | 2026-04-06T09:26:13.602Z | 2026-04-06T11:34:08.453Z |
| bit-node-2026-21717 | 2026-04-06T07:58:47.295Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21716 | 2026-04-06T07:58:44.008Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21715 | 2026-04-06T07:58:41.424Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21714 | 2026-04-06T07:58:38.953Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21713 | 2026-04-06T07:58:36.353Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21712 | 2026-04-06T07:58:33.472Z | 2026-04-06T08:26:41.107Z | |
| bit-node-2026-21711 | 2026-04-06T07:58:30.648Z | 2026-04-06T08:26:41.107Z | |
| bit-node-2026-21710 | 2026-04-06T07:58:28.068Z | 2026-04-13T06:11:47.324Z | |
| bit-mongodb-2026-5170 | Users could trigger a crash of mongod primaries during promotion to sharded | 2026-04-06T07:54:20.562Z | 2026-04-06T08:26:41.107Z |
| bit-mongodb-2026-4358 | Memory safety issues in slot-based execution hash table spill | 2026-04-06T07:54:17.803Z | 2026-04-06T08:26:41.107Z |
| bit-grafana-2026-21724 | Missing Protected-field Authorization in Provisioning Contact Points API | 2026-04-06T07:50:18.770Z | 2026-04-17T00:10:47.507Z |
| bit-kyverno-2026-4789 | CVE-2026-4789 | 2026-04-06T07:49:20.364Z | 2026-04-23T18:12:09.750Z |
| bit-dotnet-2026-26131 | .NET Elevation of Privilege Vulnerability | 2026-04-06T07:48:26.731Z | 2026-04-06T08:26:41.107Z |
| bit-dotnet-2026-26127 | .NET Denial of Service Vulnerability | 2026-04-06T07:48:23.759Z | 2026-04-06T08:26:41.107Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ia37596 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T15:41:53.874436Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-er42900 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T15:41:23.817747Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dv06422 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:40:54.415037Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mj51212 | Cancelling a query (e | 2026-01-30T15:40:23.782215Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-so16176 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:39:24.255623Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ru37859 | Cancelling a query (e | 2026-01-30T15:39:24.210234Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pc16040 | Within HostnameError | 2026-01-30T15:37:23.991168Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dy37532 | Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability | 2026-01-30T15:36:23.811582Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rw65075 | Within HostnameError | 2026-01-30T15:35:53.815887Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hg66170 | Cancelling a query (e | 2026-01-30T15:35:23.809128Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qj89068 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:34:54.378061Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bz92766 | beego is an open-source web framework for the Go programming language | 2026-01-30T15:34:54.149400Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jm84344 | Within HostnameError | 2026-01-30T15:33:53.700265Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nv07964 | Cancelling a query (e | 2026-01-30T15:33:23.809279Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-do54415 | Within HostnameError | 2026-01-30T15:33:23.703184Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-av38242 | Cancelling a query (e | 2026-01-30T15:33:23.662793Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qk01721 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:32:54.211133Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oi08379 | Cancelling a query (e | 2026-01-30T15:32:54.729863Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rr90125 | Cancelling a query (e | 2026-01-30T15:32:53.790454Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xx70537 | Cancelling a query (e | 2026-01-30T15:32:24.053481Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ry09679 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:31:53.660443Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-po40318 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:31:53.772564Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pg91940 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T15:31:24.365282Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ct39828 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:31:23.928259Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zo91195 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:30:24.594235Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ur80185 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:30:24.609590Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ts42581 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:29:23.600518Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sy95837 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:28:53.594094Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fs64938 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:24:53.185811Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hx78047 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:24:23.175483Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2004-ALE-012 | Vulnérabilité d'Internet Explorer | 2004-11-09T00:00:00.000000 | 2004-12-02T00:00:00.000000 |
| certa-2004-ale-011 | Diffusion de programmes exploitant la faille GDI+ | 2004-09-23T00:00:00.000000 | 2004-09-23T00:00:00.000000 |
| CERTA-2004-ALE-011 | Diffusion de programmes exploitant la faille GDI+ | 2004-09-23T00:00:00.000000 | 2004-09-23T00:00:00.000000 |
| certa-2004-ale-010 | Vulnérabilité du service Telnet de Cisco IOS | 2004-08-30T00:00:00.000000 | 2004-08-30T00:00:00.000000 |
| CERTA-2004-ALE-010 | Vulnérabilité du service Telnet de Cisco IOS | 2004-08-30T00:00:00.000000 | 2004-08-30T00:00:00.000000 |
| certa-2004-ale-009 | Vulnérabilités d'Internet Explorer | 2004-06-09T00:00:00.000000 | 2004-08-03T00:00:00.000000 |
| CERTA-2004-ALE-009 | Vulnérabilités d'Internet Explorer | 2004-06-09T00:00:00.000000 | 2004-08-03T00:00:00.000000 |
| certa-2004-ale-008 | Vulnérabilité de Safari | 2004-05-19T00:00:00.000000 | 2004-05-24T00:00:00.000000 |
| CERTA-2004-ALE-008 | Vulnérabilité de Safari | 2004-05-19T00:00:00.000000 | 2004-05-24T00:00:00.000000 |
| certa-2004-ale-007 | Exploitation de la vulnérabilité LSASS sous Windows : appration du ver Sasser | 2004-05-02T00:00:00.000000 | 2004-05-02T00:00:00.000000 |
| CERTA-2004-ALE-007 | Exploitation de la vulnérabilité LSASS sous Windows : appration du ver Sasser | 2004-05-02T00:00:00.000000 | 2004-05-02T00:00:00.000000 |
| certa-2004-ale-006 | Vulnérabilité SMB sous Windows | 2004-04-28T00:00:00.000000 | 2004-04-28T00:00:00.000000 |
| CERTA-2004-ALE-006 | Vulnérabilité SMB sous Windows | 2004-04-28T00:00:00.000000 | 2004-04-28T00:00:00.000000 |
| certa-2004-ale-005 | Vulnérabilité d'Internet Explorer | 2004-04-09T00:00:00.000000 | 2004-04-15T00:00:00.000000 |
| CERTA-2004-ALE-005 | Vulnérabilité d'Internet Explorer | 2004-04-09T00:00:00.000000 | 2004-04-15T00:00:00.000000 |
| certa-2004-ale-004 | Vulnérabilité du composant dtlogin de CDE | 2004-03-26T00:00:00.000000 | 2004-08-05T00:00:00.000000 |
| CERTA-2004-ALE-004 | Vulnérabilité du composant dtlogin de CDE | 2004-03-26T00:00:00.000000 | 2004-08-05T00:00:00.000000 |
| certa-2004-ale-003 | Propagation du ver Phatbot | 2004-03-19T00:00:00.000000 | 2004-03-19T00:00:00.000000 |
| CERTA-2004-ALE-003 | Propagation du ver Phatbot | 2004-03-19T00:00:00.000000 | 2004-03-19T00:00:00.000000 |
| certa-2004-ale-002 | Propagation du virux Bizex | 2004-02-26T00:00:00.000000 | 2004-02-26T00:00:00.000000 |
| CERTA-2004-ALE-002 | Propagation du virux Bizex | 2004-02-26T00:00:00.000000 | 2004-02-26T00:00:00.000000 |
| certa-2004-ale-001 | Obstacles à la résolution d'incidents | 2004-01-30T00:00:00.000000 | 2004-01-30T00:00:00.000000 |
| CERTA-2004-ALE-001 | Obstacles à la résolution d'incidents | 2004-01-30T00:00:00.000000 | 2004-01-30T00:00:00.000000 |
| certa-2003-ale-006 | Vulnérabilité dans l'affichage des adresses réticulaires | 2003-12-19T00:00:00.000000 | 2004-02-03T00:00:00.000000 |
| CERTA-2003-ALE-006 | Vulnérabilité dans l'affichage des adresses réticulaires | 2003-12-19T00:00:00.000000 | 2004-02-03T00:00:00.000000 |
| certa-2003-ale-005 | Vulnérabilité de sadmind sur Solaris | 2003-09-19T00:00:00.000000 | 2003-09-19T00:00:00.000000 |
| CERTA-2003-ALE-005 | Vulnérabilité de sadmind sur Solaris | 2003-09-19T00:00:00.000000 | 2003-09-19T00:00:00.000000 |
| certa-2003-ale-004 | Vulnérabilité d'Internet Explorer | 2003-09-10T00:00:00.000000 | 2003-10-06T00:00:00.000000 |
| CERTA-2003-ALE-004 | Vulnérabilité d'Internet Explorer | 2003-09-10T00:00:00.000000 | 2003-10-06T00:00:00.000000 |
| certa-2003-ale-003 | Exploitation massive de la vulnérabilité « include PHP » | 2003-09-09T00:00:00.000000 | 2003-09-09T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2026-AVI-0035 | Multiples vulnérabilités dans les produits Fortinet | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0034 | Multiples vulnérabilités dans les produits SAP | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0033 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0032 | Multiples vulnérabilités dans les produits Siemens | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0031 | Vulnérabilité dans le greffon VSCode pour Spring CLI | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0030 | Vulnérabilité dans MISP | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| certfr-2026-avi-0029 | Multiples vulnérabilités dans VMware Tanzu Gemfire | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| certfr-2026-avi-0028 | Multiples vulnérabilités dans MariaDB | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| certfr-2026-avi-0027 | Vulnérabilité dans NetApp ONTAP | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| certfr-2026-avi-0026 | Vulnérabilité dans Google Pixel | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| CERTFR-2026-AVI-0030 | Vulnérabilité dans MISP | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| CERTFR-2026-AVI-0029 | Multiples vulnérabilités dans VMware Tanzu Gemfire | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| CERTFR-2026-AVI-0028 | Multiples vulnérabilités dans MariaDB | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| CERTFR-2026-AVI-0027 | Vulnérabilité dans NetApp ONTAP | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| CERTFR-2026-AVI-0026 | Vulnérabilité dans Google Pixel | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| certfr-2026-avi-0025 | Vulnérabilité dans Microsoft Edge | 2026-01-12T00:00:00.000000 | 2026-01-12T00:00:00.000000 |
| certfr-2026-avi-0024 | Multiples vulnérabilités dans VMware Tanzu Greenplum Backup and Restore | 2026-01-12T00:00:00.000000 | 2026-01-12T00:00:00.000000 |
| certfr-2026-avi-0023 | Multiples vulnérabilités dans les produits Axis | 2026-01-12T00:00:00.000000 | 2026-01-12T00:00:00.000000 |
| CERTFR-2026-AVI-0025 | Vulnérabilité dans Microsoft Edge | 2026-01-12T00:00:00.000000 | 2026-01-12T00:00:00.000000 |
| CERTFR-2026-AVI-0024 | Multiples vulnérabilités dans VMware Tanzu Greenplum Backup and Restore | 2026-01-12T00:00:00.000000 | 2026-01-12T00:00:00.000000 |
| CERTFR-2026-AVI-0023 | Multiples vulnérabilités dans les produits Axis | 2026-01-12T00:00:00.000000 | 2026-01-12T00:00:00.000000 |
| certfr-2026-avi-0022 | Multiples vulnérabilités dans les produits Microsoft | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| certfr-2026-avi-0021 | Vulnérabilité dans Microsoft Edge | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| certfr-2026-avi-0020 | Multiples vulnérabilités dans les produits IBM | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| certfr-2026-avi-0019 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| certfr-2026-avi-0018 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| certfr-2026-avi-0017 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| certfr-2026-avi-0016 | Vulnérabilité dans les produits Moxa | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| CERTFR-2026-AVI-0022 | Multiples vulnérabilités dans les produits Microsoft | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| CERTFR-2026-AVI-0021 | Vulnérabilité dans Microsoft Edge | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2023-001320 | Multiple vulnerabilities in Contec CONPROSYS IoT Gateway products | 2023-03-22T13:41+09:00 | 2024-06-04T17:00+09:00 |
| jvndb-2023-000025 | TP-Link T2600G-28SQ uses vulnerable SSH host keys | 2023-03-17T12:27+09:00 | 2024-06-04T16:58+09:00 |
| jvndb-2023-000024 | Android App "Wolt Delivery: Food and more" uses a hard-coded API key for an external service | 2023-03-13T12:28+09:00 | 2024-06-03T17:15+09:00 |
| jvndb-2023-001308 | Multiple vulnerabilities in Buffalo network devices | 2023-03-08T15:12+09:00 | 2024-06-04T16:42+09:00 |
| jvndb-2023-000022 | Multiple vulnerabilities in SEIKO EPSON printers/network interface Web Config | 2023-03-08T15:09+09:00 | 2024-06-03T17:36+09:00 |
| jvndb-2023-001304 | Multiple vulnerabilities in JTEKT ELECTRONICS Kostac PLC Programming Software | 2023-03-06T15:31+09:00 | 2024-06-07T16:39+09:00 |
| jvndb-2023-000023 | Multiple vulnerabilities in PostgreSQL extension module pg_ivm | 2023-03-06T15:22+09:00 | 2024-06-10T16:41+09:00 |
| jvndb-2023-001291 | Multiple vulnerabilities in Trend Micro Maximum Security | 2023-03-03T11:10+09:00 | 2024-06-13T17:06+09:00 |
| jvndb-2023-001292 | Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service | 2023-03-02T17:33+09:00 | 2024-06-07T16:59+09:00 |
| jvndb-2023-001269 | File and Directory Permissions Vulnerability in Hitachi Automation Director, Hitachi Infrastructure Analytics Advisor, Hitachi Ops Center | 2023-03-01T16:59+09:00 | 2024-06-11T16:42+09:00 |
| jvndb-2023-000021 | Multiple vulnerabilities in SS1 and Rakuraku PC Cloud | 2023-03-01T15:57+09:00 | 2024-06-06T18:02+09:00 |
| jvndb-2023-000019 | Multiple cross-site scripting vulnerabilities in EC-CUBE | 2023-02-28T16:38+09:00 | 2024-06-10T17:28+09:00 |
| jvndb-2023-000020 | web2py development tool vulnerable to open redirect | 2023-02-28T15:00+09:00 | 2024-06-07T16:31+09:00 |
| jvndb-2023-000018 | Multiple cross-site scripting vulnerabilities in SHIRASAGI | 2023-02-22T15:16+09:00 | 2024-06-10T17:18+09:00 |
| jvndb-2023-000017 | Improper restriction of XML external entity reference (XXE) vulnerability in tsClinical Define.xml Generator and tsClinical Metadata Desktop Tools | 2023-02-14T17:00+09:00 | 2024-06-12T11:15+09:00 |
| jvndb-2023-000016 | The installers of ELECOM Camera Assistant and QuickFileDealer may insecurely load Dynamic Link Libraries | 2023-02-14T17:00+09:00 | 2023-02-14T17:00+09:00 |
| jvndb-2023-000015 | Multiple vulnerabilities in PLANEX COMMUNICATIONS Network Camera CS-WMV02G | 2023-02-13T14:48+09:00 | 2024-06-12T17:03+09:00 |
| jvndb-2023-001215 | Zuken Elmic KASAGO uses insufficient random values for TCP Initial Sequence Numbers | 2023-02-13T14:18+09:00 | 2024-06-14T15:45+09:00 |
| jvndb-2023-000014 | NEC PC Settings Tool vulnerable to missing authentication for critical function | 2023-02-10T14:43+09:00 | 2024-06-10T18:13+09:00 |
| jvndb-2023-001212 | Multiple vulnerabilities in JTEKT ELECTRONICS Screen Creator Advance 2 | 2023-02-08T12:46+09:00 | 2024-06-10T17:25+09:00 |
| jvndb-2023-000013 | Ichiran App vulnerable to improper server certificate verification | 2023-02-06T14:31+09:00 | 2024-06-12T14:25+09:00 |
| jvndb-2023-000012 | Vulnerability in Driver Distributor where passwords are stored in a recoverable format | 2023-01-31T14:14+09:00 | 2024-06-12T11:07+09:00 |
| jvndb-2023-000011 | SUSHIRO App for Android outputs sensitive information to the log file | 2023-01-31T14:10+09:00 | 2024-06-11T17:35+09:00 |
| jvndb-2023-001110 | Improper restriction of XML external entity reference (XXE) vulnerability in OMRON CX-Motion Pro | 2023-01-25T14:28+09:00 | 2023-01-25T14:28+09:00 |
| jvndb-2023-000010 | pgAdmin 4 vulnerable to directory traversal | 2023-01-24T16:00+09:00 | 2024-06-05T16:22+09:00 |
| jvndb-2023-000009 | EasyMail vulnerable to cross-site scripting | 2023-01-24T16:00+09:00 | 2023-01-24T16:00+09:00 |
| jvndb-2023-001108 | Contec CONPROSYS HMI System (CHS) vulnerable to multiple SQL injections | 2023-01-24T13:38+09:00 | 2023-01-24T13:38+09:00 |
| jvndb-2023-000008 | Pgpool-II vulnerable to information disclosure | 2023-01-23T16:35+09:00 | 2024-06-20T17:54+09:00 |
| jvndb-2023-001008 | File and Directory Permissions Vulnerability in Hitachi Tuning Manager | 2023-01-18T13:51+09:00 | 2023-01-18T13:51+09:00 |
| jvndb-2023-000007 | WordPress plugin "Welcart e-Commerce" vulnerable to directory traversal | 2023-01-17T14:17+09:00 | 2023-01-17T14:17+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-15248 | Huawei HarmonyOS设备认证模块认证绕过漏洞 | 2026-03-12 | 2026-03-23 |
| cnvd-2026-14397 | OpenClaw安全绕过漏洞 | 2026-03-12 | 2026-03-20 |
| cnvd-2026-14396 | OpenClaw文件包含漏洞 | 2026-03-12 | 2026-03-20 |
| cnvd-2026-14395 | OpenClaw访问控制错误漏洞(CNVD-2026-14395) | 2026-03-12 | 2026-03-20 |
| cnvd-2026-13832 | OpenClaw拒绝服务漏洞(CNVD-2026-13832) | 2026-03-12 | 2026-03-16 |
| cnvd-2026-13801 | OpenClaw命令注入漏洞(CNVD-2026-13801) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13800 | OpenClaw拒绝服务漏洞(CNVD-2026-13800) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13601 | OpenClaw信息泄露漏洞(CNVD-2026-13601) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13596 | OpenClaw存在未明漏洞(CNVD-2026-13596) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13595 | OpenClaw访问控制错误漏洞(CNVD-2026-13595) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13594 | OpenClaw加密问题漏洞 | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13593 | OpenClaw存在未明漏洞(CNVD-2026-13593) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13592 | OpenClaw路径遍历漏洞(CNVD-2026-13592) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13591 | OpenClaw数据伪造问题漏洞(CNVD-2026-13591) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13590 | OpenClaw代码问题漏洞(CNVD-2026-13590) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13589 | OpenClaw存在未明漏洞(CNVD-2026-13589) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13588 | OpenClaw访问控制错误漏洞(CNVD-2026-13588) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13555 | OpenClaw任意文件读取漏洞(CNVD-2026-13555) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13554 | OpenClaw拒绝服务漏洞(CNVD-2026-13554) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13553 | OpenClaw路径遍历漏洞 | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13552 | OpenClaw拒绝服务漏洞(CNVD-2026-13552) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13551 | OpenClaw路径遍历漏洞(CNVD-2026-13551) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13544 | OpenClaw身份伪造漏洞 | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13543 | OpenClaw拒绝服务漏洞(CNVD-2026-13543) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-16157 | Microsoft Excel信息泄露漏洞(CNVD-2026-16157) | 2026-03-11 | 2026-04-07 |
| cnvd-2026-15390 | Mozilla Firefox和Mozilla Thunderbird代码执行漏洞 | 2026-03-11 | 2026-03-31 |
| cnvd-2026-15389 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15389) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15388 | 多款Mozilla产品代码执行漏洞(CNVD-2026-15388) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15387 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15387) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15386 | 多款Mozilla产品代码执行漏洞(CNVD-2026-15386) | 2026-03-11 | 2026-03-30 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01006 | Уязвимость компонента Brookstrut Sample App образцовых приложений для демонстрации функци… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01005 | Уязвимость компонента Java VM системы управления базами данных Oracle Database Server, по… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01004 | Уязвимость компонента SQLcl системы управления базами данных Oracle Database Server, позв… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01003 | Уязвимость компонента General масштабируемого фреймворка для создания и развёртывания при… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01002 | Уязвимость компонента Platform инструмента для разработки клинических исследований Oracle… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01001 | Уязвимость подкомпонента Core компонента Oracle Configurator системы автоматизации деятел… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01000 | Уязвимость компонента Scripting Admin программного средства для создания и обработки сцен… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00999 | Уязвимость безопасности системы для защиты баз данных Oracle Zero Data Loss Recovery Appl… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00998 | Уязвимость компонента Workflow Loader системы для управления бизнес-процессами Oracle Wor… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00997 | Уязвимость компонента Relationship Pricing системы банковского обслуживания Oracle FLEXCU… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00996 | Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Ser… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00995 | Уязвимость компонента Product Quality Management приложения Oracle Agile Product Lifecycl… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00994 | Уязвимость компонента Integration Broker пакета бизнес-приложений Oracle PeopleSoft Enter… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00993 | Уязвимость метода getInformation класса FortEquipmentNodeController системы управления ИТ… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00992 | Уязвимость метода portValidate класса IpOrPortController системы управления ИТ-инфраструк… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00991 | Уязвимость компонентов Company Dir / Org Chart Viewer, Employee Snapshot платформы для уп… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00990 | Уязвимость программной платформы на базе git для совместной работы над кодом GitLab, связ… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00989 | Уязвимость конфигурации программной платформы на базе git для совместной работы над кодом… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00988 | Уязвимость компонента canonical/get-workflow-version-action платформы для автоматизации р… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00987 | Уязвимость программной платформы комплексного сетевого управления D-Link D-View, связанна… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00986 | Уязвимость компонента File Name Handler антивирусного программного обеспечения Comodo Int… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00985 | Уязвимость компонента Update Handler антивирусного программного обеспечения Comodo Intern… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00984 | Уязвимость функции safe_extract() платформы машинного обучения ClearML, позволяющая наруш… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00983 | Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая наруши… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00982 | Уязвимость программной платформы на базе git для совместной работы над кодом GitLab CE/EE… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00981 | Уязвимость веб-инструмента администрирования СУБД PostgreSQL phpPgAdmin, связанная с непр… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00980 | Уязвимость программной платформы комплексного сетевого управления D-Link D-View, связанна… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00979 | Уязвимость программной платформы на базе git для совместной работы над кодом GitLab CE/EE… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00978 | Уязвимость поля субтитров событий календаря виртуальной обучающей среды Moodle, позволяющ… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00977 | Уязвимость компонента Filesystems системы хранения данных Oracle ZFS Storage Appliance Ki… | 30.01.2026 | 30.01.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201912-0637 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:58:55.141000Z |
| var-201504-0247 | The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combin… | 2024-07-23T20:58:53.769000Z |
| var-201302-0142 | Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.… | 2024-07-23T20:58:53.947000Z |
| var-202205-1291 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T20:58:14.944000Z |
| var-202201-0498 | nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overfl… | 2024-07-23T20:58:14.690000Z |
| var-201412-0612 | The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute afte… | 2024-07-23T20:58:12.108000Z |
| var-201904-1398 | A use after free issue was addressed with improved memory management. This issue affected… | 2024-07-23T20:58:11.954000Z |
| var-201908-0422 | Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denia… | 2024-07-23T20:58:10.670000Z |
| var-201405-0243 | The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does n… | 2024-07-23T20:58:10.245000Z |
| var-200512-0293 | Heap-based buffer overflow in LibSystem in Mac OS X 10.4 through 10.4.5 allows context-de… | 2024-07-23T20:58:10.141000Z |
| var-201108-0080 | Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and … | 2024-07-23T20:57:37.509000Z |
| var-202206-1900 | curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverrespon… | 2024-07-23T20:57:34.431000Z |
| var-201904-1406 | A use after free issue was addressed with improved memory management. This issue affected… | 2024-07-23T20:57:19.701000Z |
| var-202010-1523 | An out-of-bounds write issue was addressed with improved bounds checking. This issue is f… | 2024-07-23T20:57:18.265000Z |
| var-200901-0756 | The JavaScript garbage collector in WebKit in Apple Safari before 4.0, iPhone OS 1.0 thro… | 2024-07-23T20:57:17.769000Z |
| var-201806-1467 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2024-07-23T20:57:06.890000Z |
| var-201908-0261 | Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leadin… | 2024-07-23T20:56:58.444000Z |
| var-201912-1844 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:56:57.656000Z |
| var-202205-1990 | Buffer Over-read in GitHub repository vim/vim prior to 8.2. Vim is a cross-platform text … | 2024-07-23T20:56:27.098000Z |
| var-201103-0294 | Integer overflow in WebKit, as used on the Research In Motion (RIM) BlackBerry Torch 9800… | 2024-07-23T20:56:26.520000Z |
| var-202206-1106 | Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an… | 2024-07-23T20:56:25.918000Z |
| var-201001-0692 | The print_fatal_signal function in kernel/signal.c in the Linux kernel before 2.6.32.4 on… | 2024-07-23T20:55:47.319000Z |
| var-200602-0446 | The "Open 'safe' files after downloading" option in Safari on Apple Mac OS X allows remot… | 2024-07-23T20:55:47.190000Z |
| var-202105-1325 | In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches of ISC DHC… | 2024-07-23T20:55:14.082000Z |
| var-201903-0420 | A logic issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, … | 2024-07-23T20:55:14.940000Z |
| var-202002-1182 | A logic issue was addressed with improved state management. This issue is fixed in iOS 13… | 2024-07-23T20:55:13.517000Z |
| var-201711-0479 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T20:55:13.287000Z |
| var-201303-0172 | sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physical… | 2024-07-23T20:55:11.903000Z |
| var-201912-0510 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:55:07.586000Z |
| var-201705-3788 | In Open vSwitch (OvS) 2.7.0, while parsing an OpenFlow role status message, there is a ca… | 2024-07-23T20:54:28.045000Z |