Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-8009 |
5 (3.1)
|
Inappropriate implementation in Cast in Google Ch… |
Google |
Chrome |
2026-05-06T18:13:11.521Z | 2026-05-06T21:47:12.093Z |
| CVE-2026-8008 |
5.4 (3.1)
|
Inappropriate implementation in DevTools in Googl… |
Google |
Chrome |
2026-05-06T18:13:11.169Z | 2026-05-06T21:47:21.898Z |
| CVE-2026-8007 |
7.5 (3.1)
|
Insufficient validation of untrusted input in Cas… |
Google |
Chrome |
2026-05-06T18:13:10.692Z | 2026-05-07T03:56:54.857Z |
| CVE-2026-8006 |
5.4 (3.1)
|
Insufficient policy enforcement in DevTools in Go… |
Google |
Chrome |
2026-05-06T18:13:10.335Z | 2026-05-06T21:47:40.718Z |
| CVE-2026-8005 |
4.3 (3.1)
|
Insufficient validation of untrusted input in Cas… |
Google |
Chrome |
2026-05-06T18:13:09.985Z | 2026-05-06T21:47:50.648Z |
| CVE-2026-8004 |
4.3 (3.1)
|
Insufficient policy enforcement in DevTools in Go… |
Google |
Chrome |
2026-05-06T18:13:09.616Z | 2026-05-06T21:47:59.531Z |
| CVE-2026-8003 |
5.4 (3.1)
|
Insufficient validation of untrusted input in Tab… |
Google |
Chrome |
2026-05-06T18:13:09.276Z | 2026-05-06T21:48:09.070Z |
| CVE-2026-8002 |
8.8 (3.1)
|
Use after free in Audio in Google Chrome on Mac p… |
Google |
Chrome |
2026-05-06T18:13:08.903Z | 2026-05-07T03:55:51.988Z |
| CVE-2026-8001 |
8.3 (3.1)
|
Use After Free in Printing in Google Chrome on Li… |
Google |
Chrome |
2026-05-06T18:13:08.504Z | 2026-05-07T03:56:55.965Z |
| CVE-2026-8000 |
8.8 (3.1)
|
Insufficient validation of untrusted input in Chr… |
Google |
Chrome |
2026-05-06T18:13:08.148Z | 2026-05-07T03:55:53.104Z |
| CVE-2026-7999 |
4.3 (3.1)
|
Inappropriate implementation in V8 in Google Chro… |
Google |
Chrome |
2026-05-06T18:13:07.680Z | 2026-05-06T21:49:00.986Z |
| CVE-2026-7998 |
5.4 (3.1)
|
Insufficient validation of untrusted input in Dia… |
Google |
Chrome |
2026-05-06T18:13:07.294Z | 2026-05-06T21:49:11.002Z |
| CVE-2026-7997 |
7.8 (3.1)
|
Insufficient validation of untrusted input in Upd… |
Google |
Chrome |
2026-05-06T18:13:06.912Z | 2026-05-07T03:56:57.063Z |
| CVE-2026-7996 |
4.2 (3.1)
|
Insufficient validation of untrusted input in SSL… |
Google |
Chrome |
2026-05-06T18:13:06.528Z | 2026-05-06T21:49:29.931Z |
| CVE-2026-7995 |
8.8 (3.1)
|
Out of bounds read in AdFilter in Google Chrome p… |
Google |
Chrome |
2026-05-06T18:13:06.063Z | 2026-05-07T03:55:54.399Z |
| CVE-2026-7994 |
7.8 (3.1)
|
Inappropriate implementation in Chromoting in Goo… |
Google |
Chrome |
2026-05-06T18:13:05.698Z | 2026-05-07T03:56:58.154Z |
| CVE-2026-7993 |
4.2 (3.1)
|
Insufficient validation of untrusted input in Pay… |
Google |
Chrome |
2026-05-06T18:13:05.353Z | 2026-05-06T21:49:58.710Z |
| CVE-2026-7992 |
8.8 (3.1)
|
Insufficient validation of untrusted input in UI … |
Google |
Chrome |
2026-05-06T18:13:05.011Z | 2026-05-07T03:55:55.609Z |
| CVE-2026-7991 |
8.8 (3.1)
|
Use after free in UI in Google Chrome prior to 14… |
Google |
Chrome |
2026-05-06T18:13:04.659Z | 2026-05-07T03:55:56.756Z |
| CVE-2026-7990 |
7.8 (3.1)
|
Insufficient validation of untrusted input in Upd… |
Google |
Chrome |
2026-05-06T18:13:04.329Z | 2026-05-07T03:56:59.243Z |
| CVE-2026-7989 |
4.2 (3.1)
|
Insufficient data validation in DataTransfer in G… |
Google |
Chrome |
2026-05-06T18:13:03.971Z | 2026-05-08T19:37:09.872Z |
| CVE-2026-7988 |
8.8 (3.1)
|
Type Confusion in WebRTC in Google Chrome prior t… |
Google |
Chrome |
2026-05-06T18:13:03.605Z | 2026-05-07T03:55:59.001Z |
| CVE-2026-7987 |
8.8 (3.1)
|
Use after free in WebRTC in Google Chrome prior t… |
Google |
Chrome |
2026-05-06T18:13:03.224Z | 2026-05-07T03:55:57.863Z |
| CVE-2026-7986 |
4.3 (3.1)
|
Insufficient policy enforcement in Autofill in Go… |
Google |
Chrome |
2026-05-06T18:13:02.861Z | 2026-05-06T21:51:05.027Z |
| CVE-2026-7985 |
8.3 (3.1)
|
Use after free in GPU in Google Chrome prior to 1… |
Google |
Chrome |
2026-05-06T18:13:02.341Z | 2026-05-07T03:56:09.217Z |
| CVE-2026-7984 |
8.8 (3.1)
|
Use after free in ReadingMode in Google Chrome pr… |
Google |
Chrome |
2026-05-06T18:13:01.749Z | 2026-05-07T03:56:00.356Z |
| CVE-2026-7983 |
4.3 (3.1)
|
Out of bounds read in Dawn in Google Chrome prior… |
Google |
Chrome |
2026-05-06T18:13:01.298Z | 2026-05-06T21:51:33.891Z |
| CVE-2026-7982 |
6.5 (3.1)
|
Uninitialized Use in WebCodecs in Google Chrome p… |
Google |
Chrome |
2026-05-06T18:13:00.944Z | 2026-05-06T21:51:43.237Z |
| CVE-2026-7981 |
8.1 (3.1)
|
Out of bounds read in Codecs in Google Chrome pri… |
Google |
Chrome |
2026-05-06T18:13:00.591Z | 2026-05-07T12:58:23.258Z |
| CVE-2026-7980 |
8.8 (3.1)
|
Use after free in WebAudio in Google Chrome prior… |
Google |
Chrome |
2026-05-06T18:13:00.212Z | 2026-05-07T03:56:05.831Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-8007 |
7.5 (3.1)
|
Insufficient validation of untrusted input in Cas… |
Google |
Chrome |
2026-05-06T18:13:10.692Z | 2026-05-07T03:56:54.857Z |
| CVE-2026-8006 |
5.4 (3.1)
|
Insufficient policy enforcement in DevTools in Go… |
Google |
Chrome |
2026-05-06T18:13:10.335Z | 2026-05-06T21:47:40.718Z |
| CVE-2026-8005 |
4.3 (3.1)
|
Insufficient validation of untrusted input in Cas… |
Google |
Chrome |
2026-05-06T18:13:09.985Z | 2026-05-06T21:47:50.648Z |
| CVE-2026-8004 |
4.3 (3.1)
|
Insufficient policy enforcement in DevTools in Go… |
Google |
Chrome |
2026-05-06T18:13:09.616Z | 2026-05-06T21:47:59.531Z |
| CVE-2026-8003 |
5.4 (3.1)
|
Insufficient validation of untrusted input in Tab… |
Google |
Chrome |
2026-05-06T18:13:09.276Z | 2026-05-06T21:48:09.070Z |
| CVE-2026-8002 |
8.8 (3.1)
|
Use after free in Audio in Google Chrome on Mac p… |
Google |
Chrome |
2026-05-06T18:13:08.903Z | 2026-05-07T03:55:51.988Z |
| CVE-2026-8001 |
8.3 (3.1)
|
Use After Free in Printing in Google Chrome on Li… |
Google |
Chrome |
2026-05-06T18:13:08.504Z | 2026-05-07T03:56:55.965Z |
| CVE-2026-8000 |
8.8 (3.1)
|
Insufficient validation of untrusted input in Chr… |
Google |
Chrome |
2026-05-06T18:13:08.148Z | 2026-05-07T03:55:53.104Z |
| CVE-2026-7999 |
4.3 (3.1)
|
Inappropriate implementation in V8 in Google Chro… |
Google |
Chrome |
2026-05-06T18:13:07.680Z | 2026-05-06T21:49:00.986Z |
| CVE-2026-7998 |
5.4 (3.1)
|
Insufficient validation of untrusted input in Dia… |
Google |
Chrome |
2026-05-06T18:13:07.294Z | 2026-05-06T21:49:11.002Z |
| CVE-2026-7997 |
7.8 (3.1)
|
Insufficient validation of untrusted input in Upd… |
Google |
Chrome |
2026-05-06T18:13:06.912Z | 2026-05-07T03:56:57.063Z |
| CVE-2026-7996 |
4.2 (3.1)
|
Insufficient validation of untrusted input in SSL… |
Google |
Chrome |
2026-05-06T18:13:06.528Z | 2026-05-06T21:49:29.931Z |
| CVE-2026-7995 |
8.8 (3.1)
|
Out of bounds read in AdFilter in Google Chrome p… |
Google |
Chrome |
2026-05-06T18:13:06.063Z | 2026-05-07T03:55:54.399Z |
| CVE-2026-7994 |
7.8 (3.1)
|
Inappropriate implementation in Chromoting in Goo… |
Google |
Chrome |
2026-05-06T18:13:05.698Z | 2026-05-07T03:56:58.154Z |
| CVE-2026-7993 |
4.2 (3.1)
|
Insufficient validation of untrusted input in Pay… |
Google |
Chrome |
2026-05-06T18:13:05.353Z | 2026-05-06T21:49:58.710Z |
| CVE-2026-7992 |
8.8 (3.1)
|
Insufficient validation of untrusted input in UI … |
Google |
Chrome |
2026-05-06T18:13:05.011Z | 2026-05-07T03:55:55.609Z |
| CVE-2026-7991 |
8.8 (3.1)
|
Use after free in UI in Google Chrome prior to 14… |
Google |
Chrome |
2026-05-06T18:13:04.659Z | 2026-05-07T03:55:56.756Z |
| CVE-2026-7990 |
7.8 (3.1)
|
Insufficient validation of untrusted input in Upd… |
Google |
Chrome |
2026-05-06T18:13:04.329Z | 2026-05-07T03:56:59.243Z |
| CVE-2026-7989 |
4.2 (3.1)
|
Insufficient data validation in DataTransfer in G… |
Google |
Chrome |
2026-05-06T18:13:03.971Z | 2026-05-08T19:37:09.872Z |
| CVE-2026-7988 |
8.8 (3.1)
|
Type Confusion in WebRTC in Google Chrome prior t… |
Google |
Chrome |
2026-05-06T18:13:03.605Z | 2026-05-07T03:55:59.001Z |
| CVE-2026-7987 |
8.8 (3.1)
|
Use after free in WebRTC in Google Chrome prior t… |
Google |
Chrome |
2026-05-06T18:13:03.224Z | 2026-05-07T03:55:57.863Z |
| CVE-2026-7986 |
4.3 (3.1)
|
Insufficient policy enforcement in Autofill in Go… |
Google |
Chrome |
2026-05-06T18:13:02.861Z | 2026-05-06T21:51:05.027Z |
| CVE-2026-7985 |
8.3 (3.1)
|
Use after free in GPU in Google Chrome prior to 1… |
Google |
Chrome |
2026-05-06T18:13:02.341Z | 2026-05-07T03:56:09.217Z |
| CVE-2026-7984 |
8.8 (3.1)
|
Use after free in ReadingMode in Google Chrome pr… |
Google |
Chrome |
2026-05-06T18:13:01.749Z | 2026-05-07T03:56:00.356Z |
| CVE-2026-7983 |
4.3 (3.1)
|
Out of bounds read in Dawn in Google Chrome prior… |
Google |
Chrome |
2026-05-06T18:13:01.298Z | 2026-05-06T21:51:33.891Z |
| CVE-2026-7982 |
6.5 (3.1)
|
Uninitialized Use in WebCodecs in Google Chrome p… |
Google |
Chrome |
2026-05-06T18:13:00.944Z | 2026-05-06T21:51:43.237Z |
| CVE-2026-7981 |
8.1 (3.1)
|
Out of bounds read in Codecs in Google Chrome pri… |
Google |
Chrome |
2026-05-06T18:13:00.591Z | 2026-05-07T12:58:23.258Z |
| CVE-2026-7980 |
8.8 (3.1)
|
Use after free in WebAudio in Google Chrome prior… |
Google |
Chrome |
2026-05-06T18:13:00.212Z | 2026-05-07T03:56:05.831Z |
| CVE-2026-7979 |
4.3 (3.1)
|
Inappropriate implementation in Media in Google C… |
Google |
Chrome |
2026-05-06T18:12:59.814Z | 2026-05-06T21:52:02.679Z |
| CVE-2026-7978 |
8.1 (3.1)
|
Inappropriate implementation in Companion in Goog… |
Google |
Chrome |
2026-05-06T18:12:59.436Z | 2026-05-07T03:57:00.415Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-2318 | Inappropriate implementation in PictureInPicture in Google Chrome prior to 145.0.7632.45 allowed a … | 2026-02-11T19:15:51.920 | 2026-02-13T17:29:01.080 |
| fkie_cve-2026-2317 | Inappropriate implementation in Animation in Google Chrome prior to 145.0.7632.45 allowed a remote … | 2026-02-11T19:15:51.817 | 2026-02-13T17:28:48.870 |
| fkie_cve-2026-2316 | Insufficient policy enforcement in Frames in Google Chrome prior to 145.0.7632.45 allowed a remote … | 2026-02-11T19:15:51.717 | 2026-02-13T17:28:37.780 |
| fkie_cve-2026-2315 | Inappropriate implementation in WebGPU in Google Chrome prior to 145.0.7632.45 allowed a remote att… | 2026-02-11T19:15:51.617 | 2026-02-13T17:27:56.897 |
| fkie_cve-2026-2314 | Heap buffer overflow in Codecs in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to… | 2026-02-11T19:15:51.427 | 2026-02-13T17:27:49.190 |
| fkie_cve-2026-2313 | Use after free in CSS in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentia… | 2026-02-11T19:15:51.220 | 2026-02-13T17:27:42.300 |
| fkie_cve-2025-70297 | A stored cross-site scripting (XSS) vulnerability in the recipe asset upload and media serving comp… | 2026-02-11T19:15:50.690 | 2026-02-23T15:33:59.703 |
| fkie_cve-2025-70296 | A stored HTML injection vulnerability in the Recipe Notes rendering component in Mealie 3.3.1 allow… | 2026-02-11T19:15:50.580 | 2026-02-23T15:34:31.483 |
| fkie_cve-2025-69873 | ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Ser… | 2026-02-11T19:15:50.467 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-69872 | DiskCache (python-diskcache) through 5.6.3 uses Python pickle for serialization by default. An atta… | 2026-02-11T19:15:50.360 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-69871 | A race condition vulnerability exists in MedusaJS Medusa v2.12.2 and earlier in the registerUsage()… | 2026-02-11T19:15:50.230 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2361 | PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by c… | 2026-02-11T18:16:08.313 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2360 | PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by c… | 2026-02-11T18:16:08.153 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0229 | A denial-of-service (DoS) vulnerability in the Advanced DNS Security (ADNS) feature of Palo Alto Ne… | 2026-02-11T18:16:07.897 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0228 | An improper certificate validation vulnerability in PAN-OS allows users to connect Terminal Server … | 2026-02-11T18:16:07.720 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-70085 | An issue was discovered in OpenSatKit 2.2.1. The EventErrStr buffer has a fixed size of 256 bytes. … | 2026-02-11T18:16:06.600 | 2026-02-17T15:02:22.943 |
| fkie_cve-2025-70084 | Directory traversal vulnerability in OpenSatKit 2.2.1 allows attackers to gain access to sensitive … | 2026-02-11T18:16:06.483 | 2026-02-17T15:03:33.090 |
| fkie_cve-2025-70083 | An issue was discovered in OpenSatKit 2.2.1. The DirName field in the telecommand is provided by th… | 2026-02-11T18:16:06.337 | 2026-02-17T15:03:48.430 |
| fkie_cve-2025-70029 | An issue in Sunbird-Ed SunbirdEd-portal v1.13.4 allows attackers to obtain sensitive information. T… | 2026-02-11T18:16:06.170 | 2026-04-01T15:29:33.850 |
| fkie_cve-2025-69874 | nanotar through 0.2.0 has a path traversal vulnerability in parseTar() and parseTarGzip() that allo… | 2026-02-11T18:16:05.430 | 2026-04-03T11:32:27.587 |
| fkie_cve-2025-65480 | An issue was discovered in Pacom Unison Client 5.13.1. Authenticated users can inject malicious scr… | 2026-02-11T18:16:04.907 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-65128 | A missing authentication mechanism in the web management API components of Shenzhen Zhibotong Elect… | 2026-02-11T18:16:04.353 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-25084 | Authentication for ZLAN5143D can be bypassed by directly accessing internal URLs. | 2026-02-11T17:16:13.243 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-24789 | An unprotected API endpoint allows an attacker to remotely change the device password without provi… | 2026-02-11T17:16:13.040 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-65127 | A lack of session validation in the web API component of Shenzhen Zhibotong Electronics ZBT WE2001 … | 2026-02-11T17:16:07.710 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-13391 | The Product Options and Price Calculation Formulas for WooCommerce – Uni CPO (Premium) plugin for W… | 2026-02-11T17:16:06.500 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-25869 | MiniGal Nano versions 0.3.5 and prior contain a path traversal vulnerability in index.php via the d… | 2026-02-11T16:16:06.813 | 2026-02-26T20:45:55.140 |
| fkie_cve-2026-25868 | MiniGal Nano version 0.3.5 and prior contain a reflected cross-site scripting (XSS) vulnerability i… | 2026-02-11T16:16:06.657 | 2026-02-26T20:30:30.263 |
| fkie_cve-2026-1837 | A specially-crafted file can cause libjxl's decoder to write pixel data to uninitialized unallocate… | 2026-02-11T16:16:04.697 | 2026-04-14T00:51:40.663 |
| fkie_cve-2025-64075 | A path traversal vulnerability in the check_token function of Shenzhen Zhibotong Electronics ZBT WE… | 2026-02-11T16:15:57.250 | 2026-04-15T00:35:42.020 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-fr47-rhr6-cfq2 |
5.3 (3.1)
5.5 (4.0)
|
A vulnerability has been found in PicoTronica e-Clinic Healthcare System ECHS 5.7. This affects an … | 2026-05-06T21:31:42Z | 2026-05-06T21:31:42Z |
| ghsa-f933-w8q2-6qcr |
3.1 (3.1)
|
Inappropriate implementation in MHTML in Google Chrome prior to 148.0.7778.96 allowed a remote atta… | 2026-05-06T21:31:42Z | 2026-05-07T01:05:55Z |
| ghsa-cjg8-85gj-v9q2 |
9.8 (3.1)
9.2 (4.0)
|
OpenClaw before 2026.4.15 contains an authentication bypass vulnerability in Feishu webhook and car… | 2026-05-06T21:31:42Z | 2026-05-06T21:31:42Z |
| ghsa-9r9j-3r2w-fg3v |
7.8 (3.1)
8.5 (4.0)
|
OpenClaw before 2026.4.20 fails to properly reserve the OPENCLAW_ runtime-control environment names… | 2026-05-06T21:31:42Z | 2026-05-06T21:31:42Z |
| ghsa-9853-g727-5v8x |
5.3 (3.1)
5.5 (4.0)
|
A vulnerability was detected in PicoTronica e-Clinic Healthcare System ECHS 5.7. The affected eleme… | 2026-05-06T21:31:42Z | 2026-05-06T21:31:42Z |
| ghsa-8h3h-w9q9-p8gc |
5.3 (3.1)
|
Uninitialized Use in GPU in Google Chrome on Android prior to 148.0.7778.96 allowed a remote attack… | 2026-05-06T21:31:42Z | 2026-05-07T01:05:55Z |
| ghsa-82rm-qcfx-2v78 |
5.3 (3.1)
6.0 (4.0)
|
OpenClaw versions 2026.4.10 before 2026.4.14 fail to persist session context during delivery queue … | 2026-05-06T21:31:42Z | 2026-05-06T21:31:42Z |
| ghsa-7ccf-f2c3-qwpg |
4.2 (3.1)
|
Script injection in UI in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who convin… | 2026-05-06T21:31:42Z | 2026-05-07T01:05:55Z |
| ghsa-79rr-5c85-xvw3 |
8.8 (3.1)
7.7 (4.0)
|
OpenClaw before 2026.4.15 contains an authorization bypass vulnerability in Matrix room control-com… | 2026-05-06T21:31:42Z | 2026-05-06T21:31:42Z |
| ghsa-6f72-9gxx-98mj |
5.3 (3.1)
6.0 (4.0)
|
OpenClaw before 2026.4.22 contains a time-of-check/time-of-use race condition in OpenShell sandbox … | 2026-05-06T21:31:42Z | 2026-05-06T21:31:42Z |
| ghsa-58pr-gw4m-rw8v |
4.3 (3.1)
2.3 (4.0)
|
OpenClaw before 2026.4.15 contains an arbitrary file read vulnerability in the QMD backend memory_g… | 2026-05-06T21:31:42Z | 2026-05-06T21:31:42Z |
| ghsa-3r56-7hhr-vfg9 |
7.7 (3.1)
4.9 (4.0)
|
OpenClaw before 2026.4.5 contains a server-side request forgery vulnerability in the CDP /json/vers… | 2026-05-06T21:31:42Z | 2026-05-06T21:31:42Z |
| ghsa-35vf-vw9f-q3cr |
7.8 (3.1)
8.5 (4.0)
|
OpenClaw before 2026.4.22 derives loopback MCP owner context from spoofable server-issued bearer to… | 2026-05-06T21:31:42Z | 2026-05-06T21:31:42Z |
| ghsa-xx7x-v3m4-97v5 |
5.0 (3.1)
|
Inappropriate implementation in Cast in Google Chrome prior to 148.0.7778.96 allowed a remote attac… | 2026-05-06T21:31:41Z | 2026-05-07T01:05:54Z |
| ghsa-x23j-rgr4-mp7m |
8.8 (3.1)
|
Insufficient validation of untrusted input in UI in Google Chrome on Linux, ChromeOS prior to 148.0… | 2026-05-06T21:31:41Z | 2026-05-07T01:05:53Z |
| ghsa-vvmh-4frj-rg66 |
8.3 (3.1)
|
Use After Free in Printing in Google Chrome on Linux, Mac, ChromeOS prior to 148.0.7778.96 allowed … | 2026-05-06T21:31:41Z | 2026-05-07T01:05:54Z |
| ghsa-rhr4-9ph6-j495 |
4.2 (3.1)
|
Insufficient validation of untrusted input in SSL in Google Chrome prior to 148.0.7778.96 allowed a… | 2026-05-06T21:31:41Z | 2026-05-07T01:05:54Z |
| ghsa-qx5w-9x78-2xgm |
4.3 (3.1)
|
Insufficient validation of untrusted input in FedCM in Google Chrome prior to 148.0.7778.96 allowed… | 2026-05-06T21:31:41Z | 2026-05-07T01:05:54Z |
| ghsa-qfcx-mrg9-9h93 |
4.3 (3.1)
|
Insufficient policy enforcement in Search in Google Chrome prior to 148.0.7778.96 allowed a remote … | 2026-05-06T21:31:41Z | 2026-05-07T01:05:54Z |
| ghsa-q4mf-cp72-chrc |
5.4 (3.1)
|
Insufficient policy enforcement in WebApp in Google Chrome prior to 148.0.7778.96 allowed a remote … | 2026-05-06T21:31:41Z | 2026-05-07T01:05:55Z |
| ghsa-pq24-mpmm-9ghf |
8.8 (3.1)
|
Use after free in Audio in Google Chrome on Mac prior to 148.0.7778.96 allowed a remote attacker to… | 2026-05-06T21:31:41Z | 2026-05-07T01:05:54Z |
| ghsa-jfv8-vv3x-c2hv |
8.8 (3.1)
|
Out of bounds read in AdFilter in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to… | 2026-05-06T21:31:41Z | 2026-05-07T01:05:53Z |
| ghsa-j96j-v243-5h5m |
8.1 (3.1)
|
Insufficient policy enforcement in DevTools in Google Chrome prior to 148.0.7778.96 allowed a remot… | 2026-05-06T21:31:41Z | 2026-05-07T01:05:55Z |
| ghsa-j7cx-gg68-qjrm |
5.4 (3.1)
|
Inappropriate implementation in MHTML in Google Chrome prior to 148.0.7778.96 allowed a remote atta… | 2026-05-06T21:31:41Z | 2026-05-07T01:05:54Z |
| ghsa-j778-m57f-8x3j |
5.4 (3.1)
|
Insufficient policy enforcement in DevTools in Google Chrome prior to 148.0.7778.96 allowed an atta… | 2026-05-06T21:31:41Z | 2026-05-07T01:05:54Z |
| ghsa-h8g3-828m-p6w2 |
8.8 (3.1)
|
Insufficient validation of untrusted input in ChromeDriver in Google Chrome on Windows prior to 148… | 2026-05-06T21:31:41Z | 2026-05-07T01:05:54Z |
| ghsa-h85h-76j4-qc96 |
6.3 (3.1)
|
Insufficient validation of untrusted input in SiteIsolation in Google Chrome prior to 148.0.7778.96… | 2026-05-06T21:31:41Z | 2026-05-07T01:05:54Z |
| ghsa-gpx2-mm2p-r2v3 |
8.8 (3.1)
|
Use after free in WebRTC in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execu… | 2026-05-06T21:31:41Z | 2026-05-07T01:05:55Z |
| ghsa-gjcp-2hjj-6c4v |
3.1 (3.1)
|
Side-channel information leakage in Media in Google Chrome prior to 148.0.7778.96 allowed a remote … | 2026-05-06T21:31:41Z | 2026-05-07T01:05:55Z |
| ghsa-f8f2-2mx9-q6hg |
7.5 (3.1)
|
Insufficient validation of untrusted input in Cast in Google Chrome prior to 148.0.7778.96 allowed … | 2026-05-06T21:31:41Z | 2026-05-07T01:05:54Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-43045 |
|
The d8s-xml package for Python, as distributed on PyPI, included a potential code-executi… | democritus-html | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.748809Z |
| pysec-2022-43044 |
|
The d8s-networking package for Python, as distributed on PyPI, included a potential code-… | democritus-hashes | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.653599Z |
| pysec-2022-43043 |
|
The d8s-file-system package for Python, as distributed on PyPI, included a potential code… | democritus-hashes | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.575571Z |
| pysec-2022-43042 |
|
The d8s-archives package for Python, as distributed on PyPI, included a potential code-ex… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.463544Z |
| pysec-2022-43041 |
|
The d8s-json package for Python, as distributed on PyPI, included a potential code-execut… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.395602Z |
| pysec-2022-43040 |
|
The d8s-utility package for Python, as distributed on PyPI, included a potential code-exe… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.328726Z |
| pysec-2022-43039 |
|
The d8s-yaml package for Python, as distributed on PyPI, included a potential code-execut… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.196757Z |
| pysec-2022-43038 |
|
The d8s-algorithms package for Python, as distributed on PyPI, included a potential code-… | democritus-dicts | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.098821Z |
| pysec-2022-43037 |
|
The d8s-lists package for Python, as distributed on PyPI, included a potential code-execu… | democritus-dicts | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.022993Z |
| pysec-2022-43036 |
|
The d8s-asns package for Python, as distributed on PyPI, included a potential code-execut… | democritus-csv | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.913597Z |
| pysec-2022-43035 |
|
The d8s-urls package for Python, as distributed on PyPI, included a potential code-execut… | democritus-csv | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.835906Z |
| pysec-2022-43034 |
|
The d8s-yaml package for Python, as distributed on PyPI, included a potential code-execut… | d8s-yaml | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.718747Z |
| pysec-2022-43033 |
|
The d8s-xml package for Python, as distributed on PyPI, included a potential code-executi… | d8s-xml | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.587712Z |
| pysec-2022-43032 |
|
The d8s-utility package for Python, as distributed on PyPI, included a potential code-exe… | d8s-utility | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.473097Z |
| pysec-2022-43031 |
|
The d8s-utility package for Python, as distributed on PyPI, included a potential code-exe… | d8s-utility | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.395893Z |
| pysec-2022-43030 |
|
The d8s-urls package for Python, as distributed on PyPI, included a potential code-execut… | d8s-urls | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.291206Z |
| pysec-2022-43029 |
|
The d8s-pdfs package for Python, as distributed on PyPI, included a potential code-execut… | d8s-pdfs | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.177857Z |
| pysec-2022-43028 |
|
The d8s-networking package for Python, as distributed on PyPI, included a potential code-… | d8s-networking | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.075232Z |
| pysec-2022-43027 |
|
The d8s-lists package for Python, as distributed on PyPI, included a potential code-execu… | d8s-lists | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.913872Z |
| pysec-2022-43026 |
|
The d8s-json package for Python, as distributed on PyPI, included a potential code-execut… | d8s-json | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.769675Z |
| pysec-2022-43025 |
|
The d8s-html package for Python, as distributed on PyPI, included a potential code-execut… | d8s-html | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.578719Z |
| pysec-2022-43024 |
|
The d8s-file-system package for Python, as distributed on PyPI, included a potential code… | d8s-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.460219Z |
| pysec-2022-43023 |
|
The d8s-domains package for Python, as distributed on PyPI, included a potential code-exe… | d8s-domains | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.349619Z |
| pysec-2022-43022 |
|
The d8s-asns package for Python, as distributed on PyPI, included a potential code-execut… | d8s-asns | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.247277Z |
| pysec-2022-43021 |
|
The d8s-asns package for Python, as distributed on PyPI, included a potential code-execut… | d8s-asns | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.172299Z |
| pysec-2022-43020 |
|
The d8s-archives package for Python, as distributed on PyPI, included a potential code-ex… | d8s-archives | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.057391Z |
| pysec-2022-43019 |
|
The d8s-algorithms package for Python, as distributed on PyPI, included a potential code-… | d8s-algorithms | 2022-10-11T22:15:00Z | 2023-06-05T01:12:47.946780Z |
| pysec-2022-303 |
|
mfa/FIDO2.py in django-mfa2 before 2.5.1 and 2.6.x before 2.6.1 allows a replay attack th… | django-mfa2 | 2022-10-11T14:15:00Z | 2022-10-11T19:05:00Z |
| pysec-2022-43158 |
6.1 (3.1)
|
Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.0a4. | rdiffweb | 2022-10-10T12:15:00+00:00 | 2024-11-21T14:23:00.394851+00:00 |
| pysec-2022-42983 |
|
In Apache Airflow, prior to version 2.4.1, deactivating a user wouldn't prevent an alread… | apache-airflow | 2022-10-07T07:15:00Z | 2023-05-04T04:29:22.696589Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2644 | Malicious code in node-unpnotifyserv (npm) | 2026-04-14T11:47:49Z | 2026-04-23T20:50:51Z |
| mal-2026-2649 | Malicious code in okxglobal (npm) | 2026-04-14T11:47:13Z | 2026-04-23T20:50:51Z |
| mal-2026-2648 | Malicious code in okx-nav (npm) | 2026-04-14T11:47:13Z | 2026-04-23T20:50:51Z |
| mal-2026-2647 | Malicious code in okx-data (npm) | 2026-04-14T11:47:13Z | 2026-04-23T20:50:51Z |
| mal-2026-2646 | Malicious code in okfe-serverless-conf (npm) | 2026-04-14T11:47:13Z | 2026-04-23T20:50:51Z |
| mal-2026-2645 | Malicious code in okassistant (npm) | 2026-04-14T11:47:13Z | 2026-04-23T20:50:51Z |
| mal-2026-2642 | Malicious code in chatbotloader (npm) | 2026-04-14T11:47:13Z | 2026-04-23T20:50:50Z |
| mal-2026-2637 | Malicious code in apmfe (npm) | 2026-04-14T11:47:13Z | 2026-04-23T20:50:49Z |
| mal-2026-2661 | Malicious code in vip-landing (npm) | 2026-04-14T11:47:12Z | 2026-04-23T20:50:52Z |
| mal-2026-2660 | Malicious code in use-feature-flags-plugin (npm) | 2026-04-14T11:47:12Z | 2026-04-23T20:50:52Z |
| mal-2026-2652 | Malicious code in onewin-landing (npm) | 2026-04-14T11:47:12Z | 2026-04-23T20:50:51Z |
| mal-2026-2650 | Malicious code in one-sdui (npm) | 2026-04-14T11:47:12Z | 2026-04-23T20:50:51Z |
| mal-2026-2643 | Malicious code in ms-affiliate-links (npm) | 2026-04-14T11:47:12Z | 2026-04-23T20:50:51Z |
| mal-2026-2640 | Malicious code in bytefrontier-core (npm) | 2026-04-14T11:47:12Z | 2026-04-23T20:50:49Z |
| mal-2026-2639 | Malicious code in bytefrontier (npm) | 2026-04-14T11:47:12Z | 2026-04-23T20:50:49Z |
| mal-2026-2638 | Malicious code in billing-paywidget (npm) | 2026-04-14T11:47:12Z | 2026-04-23T20:50:49Z |
| mal-2026-2651 | Malicious code in one-translations (npm) | 2026-04-14T11:47:11Z | 2026-04-23T20:50:51Z |
| mal-2026-2655 | Malicious code in tailwind-lines-clamp (npm) | 2026-04-14T11:38:14Z | 2026-04-23T20:50:52Z |
| mal-2026-2634 | Malicious code in percy-cake-docker (npm) | 2026-04-14T11:31:04Z | 2026-04-23T20:50:51Z |
| mal-2026-2930 | Malicious code in path-internal (npm) | 2026-04-14T10:53:25Z | 2026-05-04T03:15:19Z |
| mal-2026-2630 | Malicious code in gate-apis (PyPI) | 2026-04-14T10:23:40Z | 2026-04-14T10:23:40Z |
| mal-2026-2920 | Malicious code in buffer-util-extend (npm) | 2026-04-14T10:22:11Z | 2026-04-23T20:50:49Z |
| mal-2026-2929 | Malicious code in path-extend (npm) | 2026-04-14T09:46:58Z | 2026-04-23T20:50:51Z |
| mal-2026-2825 | Malicious code in centralogger (npm) | 2026-04-14T09:21:57Z | 2026-04-23T20:50:49Z |
| mal-2026-2826 | Malicious code in dom-utils-lite (npm) | 2026-04-14T09:21:35Z | 2026-04-23T20:50:50Z |
| mal-2026-2629 | Malicious code in stacks-editor (npm) | 2026-04-14T08:55:57Z | 2026-04-23T20:50:52Z |
| mal-2026-2628 | Malicious code in svchost (PyPI) | 2026-04-14T05:42:26Z | 2026-04-14T05:42:26Z |
| mal-2026-2627 | Malicious code in pckg-sv (PyPI) | 2026-04-14T05:35:20Z | 2026-04-14T05:35:20Z |
| mal-2026-2626 | Malicious code in getcardslib (npm) | 2026-04-14T00:07:56Z | 2026-04-23T20:50:50Z |
| mal-2026-2632 | Malicious code in magentaa11y (npm) | 2026-04-13T23:08:06Z | 2026-04-23T20:50:51Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1815 | Foxit PDF Editor und Reader: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-09-02T22:00:00.000+00:00 |
| wid-sec-w-2025-1813 | ImageMagick: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-09-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1812 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-17T22:00:00.000+00:00 |
| wid-sec-w-2025-1810 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-08-12T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1807 | IBM WebSphere Application Server Liberty: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1799 | Intel Rapid Storage Technology: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-12T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1798 | Intel Graphics Driver: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-09-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1790 | Microsoft Windows und Windows Server: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-09-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1788 | IBM Storage Virtualize-Produkte: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-12T22:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1785 | Intel Prozessoren: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-1775 | Ivanti Avalanche: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1774 | Ivanti Connect Secure und Policy Secure: Mehrere Schwachstelle | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1773 | Microsoft Teams Geräte: Schwachstelle ermöglicht Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1772 | Siemens SICAM: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1771 | Mehrere Siemens-Produkte: Schwachstelle ermöglicht Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1770 | AMD Prozessoren: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1769 | Siemens SIMATIC S7: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1768 | Siemens SIPROTEC: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1767 | AMD Radeon Graphics Products: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1766 | Liferay Portal und DXP: Schwachstelle ermöglicht Denial of Service | 2025-08-11T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1764 | Bouncy Castle: Schwachstelle ermöglicht Denial of Service | 2025-08-11T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1761 | Omnissa Workspace ONE UEM: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-08-11T22:00:00.000+00:00 | 2025-09-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1757 | Linux Kernel: Schwachstelle ermöglicht Umgehen von Sicherheitsmechanismen | 2025-08-11T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1756 | libTIFF: Schwachstelle ermöglicht Denial of Service | 2025-08-11T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-1754 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-08-10T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1753 | vim: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-08-10T22:00:00.000+00:00 | 2025-09-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1749 | win.rar WinRAR: Schwachstelle ermöglicht Codeausführung | 2025-08-10T22:00:00.000+00:00 | 2025-08-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1748 | libarchive: Schwachstelle ermöglicht Denial of Service und potenziell Codeausführung | 2025-08-07T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1744 | OpenJPEG: Schwachstelle ermöglicht Denial of Service | 2025-08-07T22:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| wid-sec-w-2025-1740 | Golang Go: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-08-06T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-317-01 | Subnet Solutions PowerSYSTEM Center | 2024-11-12T07:00:00.000000Z | 2024-11-12T07:00:00.000000Z |
| icsa-24-326-04 | Schneider Electric Modicon M340, MC80, and Momentum Unity M1E (Update B) | 2024-11-12T05:00:00.000000Z | 2026-01-20T15:49:53.166459Z |
| icsa-24-326-06 | Schneider Electric PowerLogic PM5300 Series | 2024-11-12T00:00:00.000000Z | 2024-11-12T00:00:00.000000Z |
| icsa-24-326-05 | Schneider Electric EcoStruxure IT Gateway | 2024-11-12T00:00:00.000000Z | 2024-11-12T00:00:00.000000Z |
| icsa-24-326-03 | Schneider Electric Modicon M340, MC80, and Momentum Unity M1E | 2024-11-12T00:00:00.000000Z | 2024-11-12T00:00:00.000000Z |
| icsa-24-319-12 | Siemens Mendix Runtime | 2024-11-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-319-11 | Siemens SIMATIC CP | 2024-11-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-319-10 | Siemens TeleControl Server | 2024-11-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-319-09 | Siemens Spectrum Power 7 | 2024-11-12T00:00:00.000000Z | 2024-11-12T00:00:00.000000Z |
| icsa-24-319-08 | Siemens SINEC INS | 2024-11-12T00:00:00.000000Z | 2024-11-12T00:00:00.000000Z |
| icsa-24-319-07 | Siemens Engineering Platforms | 2024-11-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-319-06 | Siemens SCALANCE M-800 Family | 2024-11-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-319-05 | Siemens Solid Edge | 2024-11-12T00:00:00.000000Z | 2024-11-12T00:00:00.000000Z |
| icsa-24-319-04 | Siemens SINEC NMS | 2024-11-12T00:00:00.000000Z | 2024-11-12T00:00:00.000000Z |
| icsa-24-319-03 | Siemens OZW672 and OZW772 Web Server | 2024-11-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-319-02 | Siemens SIPORT | 2024-11-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-319-01 | Siemens RUGGEDCOM CROSSBOW | 2024-11-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-312-03 | Bosch Rexroth IndraDrive | 2024-11-07T07:00:00.000000Z | 2024-11-07T07:00:00.000000Z |
| icsa-24-312-02 | Delta Electronics DIAScreen | 2024-11-07T07:00:00.000000Z | 2024-11-07T07:00:00.000000Z |
| icsa-24-312-01 | Beckhoff Automation TwinCAT Package Manager | 2024-11-07T07:00:00.000000Z | 2024-11-07T07:00:00.000000Z |
| icsa-24-305-01 | Rockwell Automation FactoryTalk ThinManager | 2024-10-31T06:00:00.000000Z | 2024-10-31T06:00:00.000000Z |
| icsa-24-303-03 | Delta Electronics InfraSuite Device Master | 2024-10-29T06:00:00.000000Z | 2024-10-29T06:00:00.000000Z |
| icsa-24-303-02 | Solar-Log Base 15 | 2024-10-29T06:00:00.000000Z | 2024-10-29T06:00:00.000000Z |
| icsa-24-319-16 | Hitachi Energy MSM (Update A) | 2024-10-29T00:00:00.000000Z | 2026-05-05T06:00:00.000000Z |
| icsa-24-298-03 | Deep Sea Electronics DSE855 | 2024-10-24T06:00:00.000000Z | 2024-10-24T06:00:00.000000Z |
| icsa-24-298-02 | iniNet Solutions SpiderControl SCADA PC HMI Editor | 2024-10-24T06:00:00.000000Z | 2024-10-24T06:00:00.000000Z |
| icsa-24-298-01 | VIMESA VHF/FM Transmitter Blue Plus | 2024-10-24T06:00:00.000000Z | 2024-10-24T06:00:00.000000Z |
| icsa-24-303-01 | Siemens InterMesh Subscriber Devices | 2024-10-23T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-296-01 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products (Update C) | 2024-10-22T06:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-24-291-05 | Kieback&Peter DDC4000 Series | 2024-10-17T06:00:00.000000Z | 2024-10-17T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-wlc-dos-mkgrrscb | Cisco Wireless LAN Controller AireOS Software FIPS Mode Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-wlc-dhcp-dos-76pcjpxk | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family DHCP Processing Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-webui-cmdinj-gje47emn | Cisco IOS XE Software Web UI Command Injection Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ssh-excpt-dos-fzobqtnk | Cisco IOS and IOS XE Software SSH Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-sdwan-privesc-cli-xkgwmqku | Cisco SD-WAN Software Arbitrary File Corruption Vulnerability | 2022-09-28T16:00:00+00:00 | 2024-01-23T23:05:35+00:00 |
| cisco-sa-sdwan-avc-nddsgb8 | Cisco Software-Defined Application Visibility and Control on Cisco vManage Authentication Bypass Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-sdavc-za5fpxx2 | Cisco Software-Defined Application Visibility and Control on Cisco vManage Static Username and Password Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-sd-wan-priv-e6e8tedf | Cisco SD-WAN Software Privilege Escalation Vulnerabilities | 2022-09-28T16:00:00+00:00 | 2026-02-25T20:29:00+00:00 |
| cisco-sa-iosxe-mpls-dos-ab4oul3 | Cisco IOS XE Software for Catalyst Switches MPLS Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-iosxe-info-disc-nrorxjo | Cisco IOS XE ROM Monitor Software for Catalyst Switches Information Disclosure Vulnerability | 2022-09-28T16:00:00+00:00 | 2023-05-17T18:23:37+00:00 |
| cisco-sa-iosxe-cip-dos-9rtbklt9 | Cisco IOS and IOS XE Software Common Industrial Protocol Request Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-iosxe-6vpe-dos-tjbtf5zv | Cisco IOS XE Software IPv6 VPN over MPLS Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ios-xe-cat-verify-d4neqa6q | Cisco IOS XE Software for Catalyst 9200 Series Switches Arbitrary Code Execution Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ewc-priv-esc-nderyltk | Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points Privilege Escalation Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-duo-macos-bypass-ukznpxe6 | Cisco Duo for macOS Authentication Bypass Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-29T21:21:01+00:00 |
| cisco-sa-cwlc-snmpidv-rnyyqzuz | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Information Disclosure Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-c9800-mob-dos-342yac6j | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Mobility Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-arb-file-delete-vb2rvcqv | Cisco SD-WAN Arbitrary File Deletion Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ap-assoc-dos-egvqton8 | Cisco Catalyst 9100 Series Access Points Association Request Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-alg-dos-ku9z8kfx | Cisco IOS XE Software DNS NAT Protocol Application Layer Gateway Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-vu855201-j3z8cktx | Vulnerabilities in Layer 2 Network Security Controls Affecting Cisco Products: September 2022 | 2022-09-27T16:00:00+00:00 | 2022-10-05T18:16:08+00:00 |
| cisco-sa-apvlan-tdttb4fy | Cisco Access Points VLAN Bypass from Native VLAN Vulnerability | 2022-09-27T16:00:00+00:00 | 2022-10-04T13:22:46+00:00 |
| cisco-sa-xr-cdp-wnalzvt2 | Cisco IOS XR Software Cisco Discovery Protocol Denial of Service Vulnerability | 2022-09-14T16:00:00+00:00 | 2022-09-14T16:00:00+00:00 |
| cisco-sa-ncs4k-tl1-gnnlwc6 | Cisco Network Convergence System 4000 Series TL1 Denial of Service Vulnerability | 2022-09-14T16:00:00+00:00 | 2022-09-14T16:00:00+00:00 |
| cisco-sa-iosxr-bng-gmg5gxt | Cisco IOS XR Software Broadband Network Gateway PPP over Ethernet Denial of Service Vulnerability | 2022-09-14T16:00:00+00:00 | 2022-09-14T16:00:00+00:00 |
| cisco-sa-webex-app-qrto6yc2 | Cisco Webex Meetings App Character Interface Manipulation Vulnerability | 2022-09-07T16:00:00+00:00 | 2023-02-24T15:40:30+00:00 |
| cisco-sa-vmanage-msg-serv-aqtup7vs | Cisco SD-WAN vManage Software Unauthenticated Access to Messaging Services Vulnerability | 2022-09-07T16:00:00+00:00 | 2022-09-27T21:40:31+00:00 |
| cisco-sa-sb-rv-vpnbypass-cpheup9o | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers IPSec VPN Server Authentication Bypass Vulnerability | 2022-09-07T16:00:00+00:00 | 2022-09-07T16:00:00+00:00 |
| cisco-sa-mlx5-jbpcrqd8 | Vulnerability in NVIDIA Data Plane Development Kit Affecting Cisco Products: August 2022 | 2022-09-07T16:00:00+00:00 | 2022-09-07T16:00:00+00:00 |
| cisco-sa-meraki-config-ab3da | Cisco Meraki MR Series Splash Page Insecure Configuration Option | 2022-09-07T16:00:00+00:00 | 2022-09-07T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-25834 | CVE-2026-25834 | 2026-04-02T00:00:00.000Z | 2026-05-07T01:13:26.000Z |
| msrc_cve-2026-25833 | CVE-2026-25833 | 2026-04-02T00:00:00.000Z | 2026-05-07T01:13:32.000Z |
| msrc_cve-2026-23473 | io_uring/poll: fix multishot recv missing EOF on wakeup race | 2026-04-02T00:00:00.000Z | 2026-04-29T14:44:47.000Z |
| msrc_cve-2026-23472 | serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN | 2026-04-02T00:00:00.000Z | 2026-05-06T14:51:17.000Z |
| msrc_cve-2026-23468 | drm/amdgpu: Limit BO list entry count to prevent resource exhaustion | 2026-04-02T00:00:00.000Z | 2026-05-06T14:51:24.000Z |
| msrc_cve-2026-23447 | net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check | 2026-04-02T00:00:00.000Z | 2026-04-25T01:05:41.000Z |
| msrc_cve-2026-23446 | net: usb: aqc111: Do not perform PM inside suspend callback | 2026-04-02T00:00:00.000Z | 2026-04-25T01:05:35.000Z |
| msrc_cve-2026-23444 | wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure | 2026-04-02T00:00:00.000Z | 2026-05-02T14:38:26.000Z |
| msrc_cve-2026-23442 | ipv6: add NULL checks for idev in SRv6 paths | 2026-04-02T00:00:00.000Z | 2026-05-02T14:38:31.000Z |
| msrc_cve-2026-23439 | udp_tunnel: fix NULL deref caused by udp_sock_create6 when CONFIG_IPV6=n | 2026-04-02T00:00:00.000Z | 2026-04-25T01:05:20.000Z |
| msrc_cve-2026-23438 | net: mvpp2: guard flow control update with global_tx_fc in buffer switching | 2026-04-02T00:00:00.000Z | 2026-04-25T01:05:15.000Z |
| msrc_cve-2026-23434 | mtd: rawnand: serialize lock/unlock against other NAND operations | 2026-04-02T00:00:00.000Z | 2026-04-25T01:05:09.000Z |
| msrc_cve-2026-23428 | ksmbd: fix use-after-free of share_conf in compound request | 2026-04-02T00:00:00.000Z | 2026-04-30T01:50:21.000Z |
| msrc_cve-2026-23422 | dpaa2-switch: Fix interrupt storm after receiving bad if_id in IRQ handler | 2026-04-02T00:00:00.000Z | 2026-04-30T01:45:46.000Z |
| msrc_cve-2026-23420 | wifi: wlcore: Fix a locking bug | 2026-04-02T00:00:00.000Z | 2026-04-27T14:42:41.000Z |
| msrc_cve-2026-23414 | tls: Purge async_hold in tls_decrypt_async_wait() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:48:15.000Z |
| msrc_cve-2026-23411 | apparmor: fix race between freeing data and fs accessing it | 2026-04-02T00:00:00.000Z | 2026-04-27T14:42:34.000Z |
| msrc_cve-2026-23410 | apparmor: fix race on rawdata dereference | 2026-04-02T00:00:00.000Z | 2026-04-27T14:42:29.000Z |
| msrc_cve-2026-23409 | apparmor: fix differential encoding verification | 2026-04-02T00:00:00.000Z | 2026-04-27T14:42:23.000Z |
| msrc_cve-2026-23408 | apparmor: Fix double free of ns_name in aa_replace_profiles() | 2026-04-02T00:00:00.000Z | 2026-04-27T14:42:17.000Z |
| msrc_cve-2026-23407 | apparmor: fix missing bounds check on DEFAULT table in verify_dfa() | 2026-04-02T00:00:00.000Z | 2026-04-27T14:42:05.000Z |
| msrc_cve-2026-23406 | apparmor: fix side-effect bug in match_char() macro usage | 2026-04-02T00:00:00.000Z | 2026-04-29T01:38:51.000Z |
| msrc_cve-2026-23405 | apparmor: fix: limit the number of levels of policy namespaces | 2026-04-02T00:00:00.000Z | 2026-04-27T14:42:00.000Z |
| msrc_cve-2026-23404 | apparmor: replace recursive profile removal with iterative approach | 2026-04-02T00:00:00.000Z | 2026-04-27T14:41:54.000Z |
| msrc_cve-2026-23403 | apparmor: fix memory leak in verify_header | 2026-04-02T00:00:00.000Z | 2026-04-27T14:41:48.000Z |
| msrc_cve-2026-23401 | KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE | 2026-04-02T00:00:00.000Z | 2026-04-29T14:44:05.000Z |
| msrc_cve-2026-22017 | CVE-2026-22017 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:42:26.000Z |
| msrc_cve-2026-22015 | CVE-2026-22015 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:44:41.000Z |
| msrc_cve-2026-22009 | CVE-2026-22009 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:41:31.000Z |
| msrc_cve-2026-22005 | CVE-2026-22005 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:44:09.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0321 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2024-07-30T08:45:50.286085Z | 2024-07-30T08:45:50.286085Z |
| ncsc-2024-0320 | Kwetsbaarheden verholpen in Apple MacOS | 2024-07-30T08:42:07.365674Z | 2024-07-30T08:42:07.365674Z |
| ncsc-2024-0319 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2024-07-30T08:39:16.399394Z | 2024-07-30T08:39:16.399394Z |
| ncsc-2024-0318 | Kwetsbaarheden verholpen in Docker Moby | 2024-07-25T11:28:37.900721Z | 2024-07-25T11:28:37.900721Z |
| ncsc-2024-0317 | Kwetsbaarheid gevonden in Ivanti Endpoint Manager | 2024-07-24T14:37:09.864241Z | 2024-07-24T14:37:09.864241Z |
| ncsc-2024-0316 | Kwetsbaarheid verholpen in Broadcom Symantec Privileged Access Management | 2024-07-22T09:17:29.853486Z | 2024-07-22T09:17:29.853486Z |
| ncsc-2024-0315 | Kwetsbaarheid verholpen in Cisco Smart Software Manager On-Prem | 2024-07-19T13:06:00.004663Z | 2024-07-19T13:06:00.004663Z |
| ncsc-2024-0314 | Kwetsbaarheden verholpen in Apache HTTP Server | 2024-07-19T07:34:12.997118Z | 2024-07-19T07:34:12.997118Z |
| ncsc-2024-0313 | Kwetsbaarheid verholpen in HPE 3PAR Service Processor | 2024-07-18T13:58:07.127103Z | 2024-07-18T13:58:07.127103Z |
| ncsc-2024-0312 | Kwetsbaarheden verholpen in Solarwinds Platform | 2024-07-18T13:23:55.561789Z | 2024-07-18T13:23:55.561789Z |
| ncsc-2024-0311 | Kwetsbaarheden verholpen in Cisco Secure Email Gateway | 2024-07-18T12:46:34.019785Z | 2024-07-18T12:46:34.019785Z |
| ncsc-2024-0310 | Kwetsbaarheid verholpen in SonicOS | 2024-07-18T12:25:06.813302Z | 2024-07-18T12:25:06.813302Z |
| ncsc-2024-0309 | Kwetsbaarheid gevonden in Ivanti Endpoint Manager | 2024-07-18T12:00:25.689314Z | 2024-07-18T12:00:25.689314Z |
| ncsc-2024-0308 | Kwetsbaarheden verholpen in Oracle Virtualization | 2024-07-17T13:55:57.768494Z | 2024-07-17T13:55:57.768494Z |
| ncsc-2024-0307 | Kwetsbaarheden verholpen in Oracle Systems | 2024-07-17T13:55:53.343378Z | 2024-07-17T13:55:53.343378Z |
| ncsc-2024-0306 | Kwetsbaarheden verholpen in Oracle Supply Chain | 2024-07-17T13:55:37.062720Z | 2024-07-17T13:55:37.062720Z |
| ncsc-2024-0305 | Kwetsbaarheden verholpen in Oracle Siebel CRM | 2024-07-17T13:55:31.923970Z | 2024-07-17T13:55:31.923970Z |
| ncsc-2024-0304 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2024-07-17T13:55:12.225033Z | 2024-07-17T13:55:12.225033Z |
| ncsc-2024-0303 | Kwetsbaarheden verholpen in Oracle MySQL | 2024-07-17T13:54:56.036488Z | 2024-07-17T13:54:56.036488Z |
| ncsc-2024-0302 | Kwetsbaarheden verholpen in Oracle JD Edwards | 2024-07-17T13:54:52.031796Z | 2024-07-17T13:54:52.031796Z |
| ncsc-2024-0301 | Kwetsbaarheden verholpen in Oracle Java SE | 2024-07-17T13:54:46.188033Z | 2024-07-17T13:54:46.188033Z |
| ncsc-2024-0300 | Kwetsbaarheid verholpen in Oracle Hyperion | 2024-07-17T13:54:07.536172Z | 2024-07-17T13:54:07.536172Z |
| ncsc-2024-0299 | Kwetsbaarheden verholpen in Oracle Analytics | 2024-07-17T13:54:03.545073Z | 2024-07-17T13:54:03.545073Z |
| ncsc-2024-0298 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2024-07-17T13:54:00.411174Z | 2024-07-17T13:54:00.411174Z |
| ncsc-2024-0297 | Kwetsbaarheden verholpen in Oracle Financial Services Applications | 2024-07-17T13:53:54.655859Z | 2024-07-17T13:53:54.655859Z |
| ncsc-2024-0296 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2024-07-17T13:53:28.440252Z | 2024-07-17T13:53:28.440252Z |
| ncsc-2024-0295 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2024-07-17T13:53:22.662201Z | 2024-07-17T13:53:22.662201Z |
| ncsc-2024-0294 | Kwetsbaarheden verholpen in Oracle Communications | 2024-07-17T13:52:53.293003Z | 2024-07-17T13:52:53.293003Z |
| ncsc-2024-0293 | Kwetsbaarheden verholpen in Oracle Communications Applications | 2024-07-17T13:52:33.045762Z | 2024-07-17T13:52:33.045762Z |
| ncsc-2024-0292 | Kwetsbaarheden verholpen in Oracle Essbase | 2024-07-17T13:52:18.885359Z | 2024-07-17T13:52:18.885359Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10133-1 | java-11-openj9-11.0.30.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10132-1 | freerdp-3.22.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:20156-1 | Security update for chromium | 2026-02-02T17:20:43Z | 2026-02-02T17:20:43Z |
| opensuse-su-2026:20152-1 | Security update for openssl-3 | 2026-02-02T13:00:02Z | 2026-02-02T13:00:02Z |
| opensuse-su-2026:20151-1 | Security update for wireshark | 2026-02-02T12:56:02Z | 2026-02-02T12:56:02Z |
| opensuse-su-2026:20150-1 | Security update for glib2 | 2026-02-02T12:41:24Z | 2026-02-02T12:41:24Z |
| opensuse-su-2026:20145-1 | Security update for the Linux Kernel | 2026-02-02T11:54:26Z | 2026-02-02T11:54:26Z |
| opensuse-su-2026:20148-1 | Security update for dpdk | 2026-02-02T11:12:33Z | 2026-02-02T11:12:33Z |
| opensuse-su-2026:20147-1 | Security update for python-wheel | 2026-02-02T09:49:12Z | 2026-02-02T09:49:12Z |
| opensuse-su-2026:10131-1 | trivy-0.69.0-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10130-1 | python311-PyNaCl-1.6.2-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10129-1 | libmlt++-7-7-7.36.1-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10128-1 | MozillaThunderbird-140.7.1-1.1 on GA media | 2026-01-31T00:00:00Z | 2026-01-31T00:00:00Z |
| opensuse-su-2026:20144-1 | Security update for python-filelock | 2026-01-30T21:24:37Z | 2026-01-30T21:24:37Z |
| opensuse-su-2026:20143-1 | Security update for java-25-openjdk | 2026-01-30T15:55:47Z | 2026-01-30T15:55:47Z |
| opensuse-su-2026:20140-1 | Security update for alloy | 2026-01-30T14:38:31Z | 2026-01-30T14:38:31Z |
| opensuse-su-2026:20141-1 | Security update for udisks2 | 2026-01-30T14:30:57Z | 2026-01-30T14:30:57Z |
| opensuse-su-2026:20142-1 | Security update for libsoup | 2026-01-30T14:27:58Z | 2026-01-30T14:27:58Z |
| opensuse-su-2026:20139-1 | Security update for unbound | 2026-01-30T10:05:07Z | 2026-01-30T10:05:07Z |
| opensuse-su-2026:20138-1 | Security update for jasper | 2026-01-30T09:59:14Z | 2026-01-30T09:59:14Z |
| opensuse-su-2026:10127-1 | rekor-1.5.0-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10126-1 | python315-3.15.0~a3-3.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10125-1 | python311-django-storages-1.14.6-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10124-1 | golang-github-prometheus-prometheus-3.9.1-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10123-1 | freerdp-3.21.0-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10122-1 | fontforge-20251009-4.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10121-1 | chromedriver-144.0.7559.109-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10120-1 | MozillaFirefox-147.0.2-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10119-1 | ImageMagick-7.1.2.13-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:20134-1 | Security update for java-17-openjdk | 2026-01-29T17:44:57Z | 2026-01-29T17:44:57Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:7610 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T23:42:31+00:00 | 2026-05-07T21:41:35+00:00 |
| rhsa-2026:7604 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T22:59:35+00:00 | 2026-04-21T13:31:12+00:00 |
| rhsa-2026:7578 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T22:29:38+00:00 | 2026-04-23T14:47:29+00:00 |
| rhsa-2026:7545 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T21:56:16+00:00 | 2026-04-21T13:28:51+00:00 |
| rhsa-2026:7519 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T21:28:45+00:00 | 2026-05-07T21:42:35+00:00 |
| rhsa-2026:7504 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T20:49:01+00:00 | 2026-04-20T21:32:45+00:00 |
| rhsa-2026:7500 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T20:46:25+00:00 | 2026-04-20T21:33:32+00:00 |
| rhsa-2026:7477 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T20:19:55+00:00 | 2026-05-05T20:35:33+00:00 |
| rhsa-2026:7473 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T20:15:55+00:00 | 2026-05-07T21:44:23+00:00 |
| rhsa-2026:7461 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T19:54:09+00:00 | 2026-04-24T20:38:21+00:00 |
| rhsa-2026:7458 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T19:50:47+00:00 | 2026-04-20T21:33:08+00:00 |
| rhsa-2026:7443 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T19:25:32+00:00 | 2026-05-05T20:35:30+00:00 |
| rhsa-2026:7418 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T18:51:01+00:00 | 2026-04-20T21:33:25+00:00 |
| rhsa-2026:7414 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T18:46:42+00:00 | 2026-04-20T21:32:47+00:00 |
| rhsa-2026:7404 | Red Hat Security Advisory: RHOAI 3.2 - Red Hat OpenShift AI | 2026-04-10T18:15:43+00:00 | 2026-04-29T05:21:04+00:00 |
| rhsa-2026:7403 | Red Hat Security Advisory: RHOAI 3.3.1 - Red Hat OpenShift AI | 2026-04-10T18:15:41+00:00 | 2026-04-29T05:21:00+00:00 |
| rhsa-2026:7401 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T18:11:38+00:00 | 2026-04-19T19:35:56+00:00 |
| rhsa-2026:7398 | Red Hat Security Advisory: RHOAI 2.25.4 - Red Hat OpenShift AI | 2026-04-10T17:33:41+00:00 | 2026-04-29T05:20:59+00:00 |
| rhsa-2026:7397 | Red Hat Security Advisory: RHOAI 2.16.4 - Red Hat OpenShift AI | 2026-04-10T17:33:17+00:00 | 2026-04-29T05:20:58+00:00 |
| rhsa-2026:7387 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T16:03:53+00:00 | 2026-04-20T21:34:14+00:00 |
| rhsa-2026:7382 | Red Hat Security Advisory: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection | 2026-04-10T15:11:45+00:00 | 2026-04-10T21:19:45+00:00 |
| rhsa-2026:7384 | Red Hat Security Advisory: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection | 2026-04-10T15:07:15+00:00 | 2026-04-10T21:19:45+00:00 |
| rhsa-2026:7386 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T14:47:42+00:00 | 2026-04-20T21:32:46+00:00 |
| rhsa-2026:7383 | Red Hat Security Advisory: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection | 2026-04-10T14:30:44+00:00 | 2026-04-10T21:19:45+00:00 |
| rhsa-2026:7381 | Red Hat Security Advisory: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection | 2026-04-10T14:23:39+00:00 | 2026-04-10T21:19:45+00:00 |
| rhsa-2026:7378 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T13:03:00+00:00 | 2026-05-04T08:48:53+00:00 |
| rhsa-2026:7369 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T09:46:15+00:00 | 2026-04-25T02:11:17+00:00 |
| rhsa-2026:7364 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T07:11:51+00:00 | 2026-04-19T19:35:54+00:00 |
| rhsa-2026:7361 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-10T06:59:19+00:00 | 2026-04-21T19:46:39+00:00 |
| rhsa-2026:7350 | Red Hat Security Advisory: nodejs:24 security update | 2026-04-09T20:27:37+00:00 | 2026-05-08T20:33:47+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-794542 | SSA-794542: Insecure Folder Permissions in SIMARIS Configuration | 2021-02-09T00:00:00Z | 2021-05-11T00:00:00Z |
| ssa-663999 | SSA-663999: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.1.0.1 | 2021-02-09T00:00:00Z | 2021-05-17T00:00:00Z |
| ssa-428051 | SSA-428051: Privilege Escalation Vulnerability in TIA Administrator | 2021-02-09T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-362164 | SSA-362164: Predictable Initial Sequence Numbers in the TCP/IP Stack of Nucleus RTOS | 2021-02-09T00:00:00Z | 2022-11-08T00:00:00Z |
| ssa-646763 | SSA-646763: DNSpooq - Dnsmasq Vulnerabilities in SCALANCE and RUGGEDCOM Devices | 2021-01-19T00:00:00Z | 2021-05-11T00:00:00Z |
| ssa-622830 | SSA-622830: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.1.0 | 2021-01-12T00:00:00Z | 2021-05-17T00:00:00Z |
| ssa-274900 | SSA-274900: Use of Hardcoded Key in SCALANCE X Devices Under Certain Conditions | 2021-01-12T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-139628 | SSA-139628: Vulnerabilities in Web Server for Scalance X Products | 2021-01-12T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-541017 | SSA-541017: Embedded TCP/IP Stack Vulnerabilities (AMNESIA:33) in SIRIUS 3RW5 Modbus TCP and SENTRON PAC / 3VA Devices | 2020-12-08T00:00:00Z | 2021-04-13T00:00:00Z |
| ssa-478893 | SSA-478893: TightVNC Vulnerabilities in Industrial Products (Revoked) | 2020-12-08T00:00:00Z | 2021-05-11T00:00:00Z |
| ssa-492828 | SSA-492828: Denial-of-Service Vulnerability in SIMATIC S7-300 CPUs and SINUMERIK Controller | 2020-11-10T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-542525 | SSA-542525: Authentication Vulnerabilities in SIMATIC HMI Products | 2020-09-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-534763 | SSA-534763: Special Register Buffer Data Sampling (SRBDS) aka Crosstalk in Industrial Products | 2020-09-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-455843 | SSA-455843: WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens Products | 2020-09-08T00:00:00Z | 2022-02-17T00:00:00Z |
| ssa-689942 | SSA-689942: Denial-of-Service and DLL Hijacking Vulnerabilities in Multiple SIMATIC Software Products | 2020-06-09T00:00:00Z | 2021-04-13T00:00:00Z |
| ssa-312271 | SSA-312271: Unquoted Search Path Vulnerability in Windows-based Industrial Software Applications | 2020-06-09T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-593272 | SSA-593272: SegmentSmack in Interniche IP-Stack based Industrial Devices | 2020-04-14T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-162506 | SSA-162506: DHCP Client Vulnerability in SIMOTICS CONNECT 400, Desigo PXC/PXM, APOGEE MEC/MBC/PXC, APOGEE PXC Series, and TALON TC Series | 2020-04-14T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-102233 | SSA-102233: SegmentSmack in VxWorks-based Industrial Devices | 2020-04-14T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-844761 | SSA-844761: Multiple Vulnerabilities in SiNVR/SiVMS Video Server | 2020-03-10T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-978220 | SSA-978220: Denial of Service Vulnerability over SNMP in Multiple Industrial Products | 2020-02-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-951513 | SSA-951513: Clickjacking Vulnerability in SCALANCE S, SCALANCE X-300, X-200IRT, X-200RNA and X-200 Switch Families | 2020-02-11T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-780073 | SSA-780073: Denial of Service Vulnerability in PROFINET Devices via DCE-RPC Packets | 2020-02-11T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-591405 | SSA-591405: Web Vulnerabilities in SCALANCE S-600 Family | 2020-02-11T00:00:00Z | 2021-04-13T00:00:00Z |
| ssa-431678 | SSA-431678: Denial of Service Vulnerability in SIMATIC S7 CPU Families | 2020-02-11T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-270778 | SSA-270778: Denial-of-Service Vulnerability in SIMATIC PCS 7, SIMATIC WinCC and SIMATIC NET PC Software | 2020-02-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-629512 | SSA-629512: Local Privilege Escalation Vulnerability in TIA Portal | 2020-01-14T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-443566 | SSA-443566: Authentication Bypass in SCALANCE X Switches Families | 2020-01-14T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-761617 | SSA-761617: Authentication Bypass and Information Disclosure Vulnerabilities in SiNVR/SiVMS Video Server | 2019-12-10T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-618620 | SSA-618620: Vulnerabilities in Boot Loader (U-Boot) of RUGGEDCOM ROS Devices | 2019-12-10T00:00:00Z | 2023-12-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21008-1 | Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-04-09T08:48:26Z | 2026-04-09T08:48:26Z |
| suse-su-2026:21007-1 | Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-04-09T08:48:26Z | 2026-04-09T08:48:26Z |
| suse-su-2026:21006-1 | Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 16) | 2026-04-09T08:48:26Z | 2026-04-09T08:48:26Z |
| suse-su-2026:21005-1 | Security update for the Linux Kernel RT (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-04-09T08:48:26Z | 2026-04-09T08:48:26Z |
| suse-su-2026:21004-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise 16) | 2026-04-09T08:48:26Z | 2026-04-09T08:48:26Z |
| suse-ru-2026:1228-1 | Recommended update for shadow | 2026-04-09T08:27:26Z | 2026-04-09T08:27:26Z |
| suse-su-2026:1225-1 | Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise 15 SP6) | 2026-04-09T01:53:43Z | 2026-04-09T01:53:43Z |
| suse-su-2026:1222-1 | Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) | 2026-04-08T20:04:54Z | 2026-04-08T20:04:54Z |
| suse-su-2026:21065-1 | Security update for openssl-3 | 2026-04-08T16:32:18Z | 2026-04-08T16:32:18Z |
| suse-su-2026:1221-1 | Security update for the Linux Kernel (Live Patch 67 for SUSE Linux Enterprise 12 SP5) | 2026-04-08T16:04:43Z | 2026-04-08T16:04:43Z |
| suse-su-2026:21037-1 | Security update for openssl-3 | 2026-04-08T15:00:50Z | 2026-04-08T15:00:50Z |
| suse-su-2026:1218-1 | Security update for python-requests | 2026-04-08T14:39:49Z | 2026-04-08T14:39:49Z |
| suse-su-2026:21036-1 | Security update for python-requests | 2026-04-08T14:30:11Z | 2026-04-08T14:30:11Z |
| suse-su-2026:21035-1 | Security update for libtpms | 2026-04-08T14:28:41Z | 2026-04-08T14:28:41Z |
| suse-su-2026:21064-1 | Security update for libtpms | 2026-04-08T14:17:58Z | 2026-04-08T14:17:58Z |
| suse-su-2026:21063-1 | Security update for python-requests | 2026-04-08T14:11:12Z | 2026-04-08T14:11:12Z |
| suse-su-2026:1217-1 | Security update for freerdp | 2026-04-08T12:28:33Z | 2026-04-08T12:28:33Z |
| suse-su-2026:1216-1 | Security update for openssl-1_1 | 2026-04-08T12:28:22Z | 2026-04-08T12:28:22Z |
| suse-su-2026:1215-1 | Security update for openssl-3 | 2026-04-08T12:27:58Z | 2026-04-08T12:27:58Z |
| suse-su-2026:1214-1 | Security update for openssl-3 | 2026-04-08T12:27:45Z | 2026-04-08T12:27:45Z |
| suse-su-2026:1213-1 | Security update for openssl-3 | 2026-04-08T12:27:10Z | 2026-04-08T12:27:10Z |
| suse-su-2026:1051-1 | Security update for vim | 2026-04-08T11:40:57Z | 2026-04-08T11:40:57Z |
| suse-su-2026:1212-1 | Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5) | 2026-04-08T10:04:46Z | 2026-04-08T10:04:46Z |
| suse-su-2026:1209-1 | Security update for bind | 2026-04-08T07:12:41Z | 2026-04-08T07:12:41Z |
| suse-su-2026:1208-1 | Security update for ignition | 2026-04-08T07:12:23Z | 2026-04-08T07:12:23Z |
| suse-su-2026:21062-1 | Security update for expat | 2026-04-07T18:52:31Z | 2026-04-07T18:52:31Z |
| suse-su-2026:21144-1 | Security update for systemd | 2026-04-07T15:06:51Z | 2026-04-07T15:06:51Z |
| suse-su-2026:21003-1 | Security update for systemd | 2026-04-07T15:06:51Z | 2026-04-07T15:06:51Z |
| suse-su-2026:21143-1 | Security update for tar | 2026-04-07T14:59:15Z | 2026-04-07T14:59:15Z |
| suse-su-2026:21002-1 | Security update for tar | 2026-04-07T14:59:15Z | 2026-04-07T14:59:15Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:19156 | Important: libtiff security update | 2025-10-28T00:00:00Z | 2025-10-30T10:20:53Z |
| alsa-2025:19113 | Important: libtiff security update | 2025-10-27T00:00:00Z | 2025-10-28T07:58:42Z |
| alsa-2025:19107 | Important: squid:4 security update | 2025-10-27T00:00:00Z | 2025-10-28T09:25:35Z |
| alsa-2025:19103 | Moderate: kernel-rt security update | 2025-10-27T00:00:00Z | 2025-10-28T07:51:20Z |
| alsa-2025:19102 | Moderate: kernel security update | 2025-10-27T00:00:00Z | 2025-10-28T07:55:37Z |
| alsa-2025:18983 | Important: thunderbird security update | 2025-10-22T00:00:00Z | 2025-10-27T08:16:53Z |
| alsa-2025:18824 | Moderate: java-21-openjdk security update | 2025-10-22T00:00:00Z | 2025-10-30T07:18:58Z |
| alsa-2025:18821 | Moderate: java-17-openjdk security update | 2025-10-22T00:00:00Z | 2025-10-30T07:28:25Z |
| alsa-2025:18815 | Moderate: java-1.8.0-openjdk security update | 2025-10-22T00:00:00Z | 2025-10-30T12:06:21Z |
| alsa-2025:18321 | Important: thunderbird security update | 2025-10-20T00:00:00Z | 2025-10-22T10:38:17Z |
| alsa-2025:18320 | Important: thunderbird security update | 2025-10-20T00:00:00Z | 2025-10-22T10:33:35Z |
| alsa-2025:18318 | Moderate: kernel security update | 2025-10-20T00:00:00Z | 2025-10-22T10:27:59Z |
| alsa-2025:18298 | Moderate: kernel-rt security update | 2025-10-20T00:00:00Z | 2025-10-20T12:08:20Z |
| alsa-2025:18297 | Moderate: kernel security update | 2025-10-20T00:00:00Z | 2025-10-20T12:01:40Z |
| alsa-2025:18286 | Moderate: libssh security update | 2025-10-20T00:00:00Z | 2025-10-20T11:55:49Z |
| alsa-2025:18285 | Important: firefox security update | 2025-10-20T00:00:00Z | 2025-10-20T11:50:28Z |
| alsa-2025:18281 | Moderate: kernel security update | 2025-10-20T00:00:00Z | 2025-10-22T10:16:53Z |
| alsa-2025:18275 | Moderate: libssh security update | 2025-10-16T00:00:00Z | 2025-10-17T08:04:25Z |
| alsa-2025:18231 | Moderate: libssh security update | 2025-10-16T00:00:00Z | 2025-10-16T14:22:59Z |
| alsa-2025:18183 | Important: libsoup3 security update | 2025-10-15T00:00:00Z | 2025-10-16T08:01:45Z |
| alsa-2025:18155 | Important: firefox security update | 2025-10-15T00:00:00Z | 2025-10-20T12:31:42Z |
| alsa-2025:18154 | Important: firefox security update | 2025-10-15T00:00:00Z | 2025-10-20T12:30:08Z |
| alsa-2025:18153 | Important: .NET 9.0 security update | 2025-10-15T00:00:00Z | 2025-11-03T08:44:34Z |
| alsa-2025:18152 | Important: .NET 8.0 security update | 2025-10-15T00:00:00Z | 2025-11-03T08:46:41Z |
| alsa-2025:18151 | Important: .NET 9.0 security update | 2025-10-15T00:00:00Z | 2025-11-03T08:48:44Z |
| alsa-2025:18150 | Important: .NET 9.0 security update | 2025-10-15T00:00:00Z | 2025-11-03T08:55:12Z |
| alsa-2025:18149 | Important: .NET 8.0 security update | 2025-10-15T00:00:00Z | 2025-10-20T12:28:15Z |
| alsa-2025:18148 | Important: .NET 8.0 security update | 2025-10-15T00:00:00Z | 2025-10-20T12:11:02Z |
| alsa-2025:18097 | Important: webkit2gtk3 security update | 2025-10-15T00:00:00Z | 2025-10-23T12:50:53Z |
| alsa-2025:18070 | Important: webkit2gtk3 security update | 2025-10-15T00:00:00Z | 2025-11-03T08:51:57Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-1303 | Heap-use-after-free in htmlCurrentChar | 2023-12-15T00:00:06.313566Z | 2023-12-15T00:00:06.314002Z |
| osv-2023-1302 | Global-buffer-overflow in pcre_get_compiled_regex_cache_ex | 2023-12-14T00:13:52.791976Z | 2023-12-14T00:13:52.792479Z |
| osv-2023-1301 | Global-buffer-overflow in xmlDictLookupInternal | 2023-12-14T00:13:26.532719Z | 2023-12-14T00:13:26.533280Z |
| osv-2023-1300 | Security exception in com.fasterxml.jackson.core.JsonParser.currentName | 2023-12-14T00:13:10.208981Z | 2023-12-14T00:13:10.209415Z |
| osv-2023-1299 | Global-buffer-overflow in pcre_get_compiled_regex_cache_ex | 2023-12-14T00:12:13.097305Z | 2023-12-14T00:12:13.097842Z |
| osv-2023-1298 | Heap-buffer-overflow in loongarch_split_args_by_comma | 2023-12-14T00:10:40.133892Z | 2023-12-14T00:10:40.134313Z |
| osv-2023-1295 | Global-buffer-overflow in libraw_tagtype_dataunit_bytes | 2023-12-14T00:03:32.723059Z | 2023-12-14T00:03:32.723513Z |
| osv-2023-1294 | Heap-buffer-overflow in ih264d_compute_bs_non_mbaff | 2023-12-14T00:00:54.614578Z | 2024-04-29T11:26:00.379744Z |
| osv-2023-1291 | Security exception in org.apache.poi.poifs.crypt.binaryrc4.BinaryRC4Decryptor.initCipherForBlock | 2023-12-13T00:03:48.820074Z | 2023-12-13T00:03:48.820457Z |
| osv-2023-1276 | Heap-use-after-free in authentic_emu_update_tokeninfo | 2023-12-10T00:04:07.333337Z | 2023-12-10T00:04:07.333792Z |
| osv-2023-1272 | Heap-buffer-overflow in OT::cff2::accelerator_templ_t<CFF::cff2_private_dict_opset_t, CFF::cff2_private_ | 2023-12-09T00:05:42.581782Z | 2023-12-09T00:05:42.582124Z |
| osv-2023-1271 | Heap-buffer-overflow in is_decl_requires_met | 2023-12-09T00:03:11.119664Z | 2023-12-09T00:03:11.120297Z |
| osv-2023-1268 | Stack-buffer-overflow in decNaNs | 2023-12-08T00:11:32.086790Z | 2023-12-08T00:11:32.087163Z |
| osv-2023-1267 | Heap-buffer-overflow in dwg_free_object | 2023-12-08T00:11:02.971903Z | 2026-03-16T14:18:18.473266Z |
| osv-2023-1266 | Security exception in java.base/javax.crypto.spec.SecretKeySpec.<init> | 2023-12-08T00:10:39.042967Z | 2023-12-08T00:10:39.043541Z |
| osv-2023-1265 | Security exception in org.apache.poi.hdgf.streams.ChunkStream.findChunks | 2023-12-08T00:02:47.592445Z | 2023-12-08T00:02:47.593139Z |
| osv-2023-1263 | Heap-buffer-overflow in js_is_live_code | 2023-12-07T00:05:27.754264Z | 2023-12-07T00:05:27.754792Z |
| osv-2023-1259 | Use-of-uninitialized-value in std::__1::__stdoutbuf<char>::xsputn | 2023-12-06T04:45:58.561174Z | 2025-05-14T14:15:48.653022Z |
| osv-2023-1256 | Heap-buffer-overflow in H5T__bit_copy | 2023-12-03T13:02:43.376076Z | 2026-01-13T04:40:40.198673Z |
| osv-2023-1247 | Heap-buffer-overflow in r_bin_coff_new_buf | 2023-12-02T13:00:46.246790Z | 2023-12-02T13:00:46.247042Z |
| osv-2023-1244 | Security exception in org.springframework.expression.spel.ast.OpPlus.getValueInternal | 2023-12-02T13:00:17.170709Z | 2023-12-09T14:11:35.526034Z |
| osv-2023-1243 | Heap-use-after-free in zend_reference_destroy | 2023-12-01T13:02:45.270293Z | 2023-12-01T13:02:45.270620Z |
| osv-2023-1240 | UNKNOWN READ in MqttProps_Free | 2023-11-30T13:03:05.050780Z | 2023-11-30T13:03:05.051057Z |
| osv-2023-1239 | Heap-buffer-overflow in decToString | 2023-11-30T13:00:20.622604Z | 2023-11-30T13:00:20.622871Z |
| osv-2023-1232 | Heap-buffer-overflow in pcpp::TLSECPointFormatExtension::getECPointFormatList | 2023-11-28T13:01:23.208343Z | 2025-12-22T14:15:49.713990Z |
| osv-2023-1231 | Global-buffer-overflow in iaace_estimate_scfs_chan | 2023-11-28T13:01:01.666771Z | 2023-11-28T13:01:01.667048Z |
| osv-2023-1228 | Stack-buffer-overflow in asn1_decode_entry | 2023-11-27T13:03:26.289859Z | 2023-11-27T13:03:26.290112Z |
| osv-2023-1227 | Stack-buffer-overflow in io_memory_read | 2023-11-27T13:03:22.969939Z | 2023-11-29T14:21:41.958752Z |
| osv-2023-1223 | Heap-buffer-overflow in H5O__shared_decode | 2023-11-27T13:01:18.977198Z | 2025-03-18T00:47:06.884278Z |
| osv-2023-1222 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2023-11-27T13:00:10.105607Z | 2023-11-27T13:00:10.105869Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2021-0063 | XSS in `comrak` | 2021-05-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0058 | Null pointer deref in `X509_issuer_and_serial_hash()` | 2021-05-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0057 | Integer overflow in CipherUpdate | 2021-05-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0056 | CA certificate check bypass with X509_V_FLAG_X509_STRICT | 2021-05-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0055 | NULL pointer deref in signature_algorithms processing | 2021-05-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0061 | `aes-ctr` has been merged into the `aes` crate | 2021-04-29T12:00:00Z | 2021-05-04T01:28:43Z |
| rustsec-2021-0060 | `aes-soft` has been merged into the `aes` crate | 2021-04-29T12:00:00Z | 2021-05-04T01:28:43Z |
| rustsec-2021-0059 | `aesni` has been merged into the `aes` crate | 2021-04-29T12:00:00Z | 2021-05-04T01:28:43Z |
| rustsec-2021-0054 | Archives may contain uninitialized memory | 2021-04-28T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0136 | `sass-rs` has been deprecated | 2021-04-07T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2021-0113 | AtomicBucket<T> unconditionally implements Send/Sync | 2021-04-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0140 | rusttype is Unmaintained | 2021-04-01T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2021-0041 | Denial of service through parsing payloads with too big exponent | 2021-03-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0053 | 'merge_sort::merge()' crashes with double-free for `T: Drop` | 2021-03-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0038 | Multiple memory safety issues | 2021-03-06T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0037 | Fix a use-after-free bug in diesels Sqlite backend | 2021-03-05T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0035 | `quinn` invalidly assumes the memory layout of std::net::SocketAddr | 2021-03-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0036 | Intern<T>: Data race allowed on T | 2021-03-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0032 | Deserializing an array can drop uninitialized memory on panic | 2021-03-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0062 | project abandoned; migrate to the `aes-siv` crate | 2021-02-28T12:00:00Z | 2021-05-03T19:05:09Z |
| rustsec-2021-0052 | Multiple functions can cause double-frees | 2021-02-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0050 | swap_index can write out of bounds and return uninitialized memory | 2021-02-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0033 | push_cloned can drop uninitialized memory or double free on panic | 2021-02-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0026 | XSS in `comrak` | 2021-02-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0048 | StackVec::extend can write out of bounds when size_hint is incorrect | 2021-02-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0047 | SliceDeque::drain_filter can double drop an element if the predicate panics | 2021-02-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0028 | Multiple memory safety issues in insert_row | 2021-02-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0049 | `through` and `through_and` causes a double free if the map function panics | 2021-02-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0030 | move_elements can double-free objects on panic | 2021-02-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0112 | `Read` on uninitialized buffer may cause UB ('tectonic_xdv' crate) | 2021-02-17T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2026-2726 | Incorrect Authorization in GitLab | 2026-03-27T12:15:04.107Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-1724 | Missing Authentication for Critical Function in GitLab | 2026-03-27T12:14:54.117Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-14595 | Missing Authorization in GitLab | 2026-03-27T12:11:45.074Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-13436 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-27T12:11:11.989Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-13078 | Improper Validation of Specified Quantity in Input in GitLab | 2026-03-27T12:11:08.026Z | 2026-03-27T12:16:52.978Z |
| bit-nats-2026-27889 | NATS: Pre-auth remote server crash via WebSocket frame length overflow in wsRead | 2026-03-27T11:47:22.988Z | 2026-03-27T12:16:52.978Z |
| bit-etcd-2026-33413 | etcd: Authorization bypasses in multiple APIs | 2026-03-27T11:39:27.916Z | 2026-03-27T12:16:52.978Z |
| bit-etcd-2026-33343 | etcd: Nested etcd transactions bypass RBAC authorization checks | 2026-03-27T11:39:26.076Z | 2026-03-27T12:16:52.978Z |
| bit-parse-2026-33627 | Parse Server: Auth data exposed via /users/me endpoint | 2026-03-27T07:14:47.660Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33624 | Parse Server: MFA recovery code single-use bypass via concurrent requests | 2026-03-27T07:14:44.950Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33539 | Parse Server: SQL injection via aggregate and distinct field names in PostgreSQL adapter | 2026-03-27T07:14:42.086Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33538 | Parse Server: Denial of service via unindexed database query for unconfigured auth providers | 2026-03-27T07:14:39.195Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33527 | Parse Server: Session update endpoint allows overwriting server-generated session fields | 2026-03-27T07:14:36.431Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33508 | Parse Server: LiveQuery subscription query depth bypass | 2026-03-27T07:14:33.818Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33498 | Parse Server: Query condition depth bypass via pre-validation transform pipeline | 2026-03-27T07:14:30.964Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33429 | Parse Server: Protected field change detection oracle via LiveQuery watch parameter | 2026-03-27T07:14:28.266Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33421 | Parse Server: LiveQuery bypasses CLP pointer permission enforcement | 2026-03-27T07:14:25.801Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33409 | Parse Server: Auth provider validation bypass on login via partial authData | 2026-03-27T07:14:23.276Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33323 | Parse Server: Email verification resend page leaks user existence | 2026-03-27T07:14:20.379Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33428 | Discourse Allows Unauthorized Access to Deleted Posts Index via Group Membership | 2026-03-27T07:11:24.928Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33427 | Discourse Authorization Page Displays Unvalidated Redirect Domain | 2026-03-27T07:11:21.636Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33426 | Discourse users can edit or synonymize hidden tags they can't see | 2026-03-27T07:11:18.684Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33425 | Discourse has inferable private group membership or existence via exclude_groups parameter | 2026-03-27T07:11:15.979Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33424 | PM access granted through invites after access revocation | 2026-03-27T07:11:13.161Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33423 | Discourse staff can modify any user's group notification level | 2026-03-27T07:11:10.696Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33422 | Discourse exposes ip_address of flagged user | 2026-03-27T07:11:08.096Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33411 | Discourse's solved topic stream has potential stored XSS in topic title | 2026-03-27T07:11:05.061Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33410 | Discourse hardens chat DM channel creation and expansion | 2026-03-27T07:11:02.112Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33408 | Discourse has Improper Authorization in "Post Edits" Report For Moderators | 2026-03-27T07:10:59.380Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33395 | Discourse has stored click‑based XSS via Graphviz SVG javascript: links | 2026-03-27T07:10:56.479Z | 2026-03-27T07:40:55.991Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-jx43631 | Within HostnameError | 2026-01-30T15:06:23.337190Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ib05679 | Within HostnameError | 2026-01-30T15:06:23.436295Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sh75345 | Cancelling a query (e | 2026-01-30T15:05:23.442396Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bh03809 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:04:53.009971Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vl83369 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:53.758258Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rj88561 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:53.732429Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-lp38773 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:53.100242Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uj17204 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:52.998379Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pi00621 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:52.974587Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-py88758 | Cancelling a query (e | 2026-01-30T15:02:53.130919Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hw39798 | Cancelling a query (e | 2026-01-30T15:02:52.970576Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hu01783 | Cancelling a query (e | 2026-01-30T15:02:52.911074Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fd27182 | Cancelling a query (e | 2026-01-30T15:02:52.949683Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-co80279 | Within HostnameError | 2026-01-30T15:02:52.896368Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ti76190 | Cancelling a query (e | 2026-01-30T15:02:23.296683Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-di91874 | Cancelling a query (e | 2026-01-30T15:02:23.274144Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vc16841 | Within HostnameError | 2026-01-30T15:02:22.944744Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sq13072 | Moby is an open source container framework developed by Docker Inc | 2026-01-30T15:02:22.907312Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kq33111 | Cancelling a query (e | 2026-01-30T15:02:22.834896Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rl45001 | tar | 2026-01-30T15:01:22.967754Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ys66739 | Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3 | 2026-01-30T15:00:53.250874Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xs24366 | Cancelling a query (e | 2026-01-30T15:00:52.862887Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oo42606 | Cancelling a query (e | 2026-01-30T15:00:52.876848Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pd17156 | Cancelling a query (e | 2026-01-30T15:00:22.872625Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bj28314 | Within HostnameError | 2026-01-30T15:00:22.906070Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yj61997 | Cancelling a query (e | 2026-01-30T14:59:52.788649Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bj35875 | tar | 2026-01-30T14:59:52.925710Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nd19988 | Cancelling a query (e | 2026-01-30T14:59:22.824513Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-aj76138 | tar | 2026-01-30T14:58:52.957172Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vf66781 | Within HostnameError | 2026-01-30T14:57:22.763452Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2001-ALE-011 | <TT>antivirus2001</TT> est un cheval de Troie | 2001-09-10T00:00:00.000000 | 2001-09-13T00:00:00.000000 |
| certa-2001-ale-010 | Propagation du ver "Code Blue" | 2001-09-07T00:00:00.000000 | 2001-09-07T00:00:00.000000 |
| CERTA-2001-ALE-010 | Propagation du ver "Code Blue" | 2001-09-07T00:00:00.000000 | 2001-09-07T00:00:00.000000 |
| certa-2001-ale-009 | Propagation importante du virus SirCam | 2001-07-24T00:00:00.000000 | 2001-07-26T00:00:00.000000 |
| CERTA-2001-ALE-009 | Propagation importante du virus SirCam | 2001-07-24T00:00:00.000000 | 2001-07-26T00:00:00.000000 |
| certa-2001-ale-008 | Propagation du ver « Code Red » | 2001-07-18T00:00:00.000000 | 2001-08-13T00:00:00.000000 |
| CERTA-2001-ALE-008 | Propagation du ver « Code Red » | 2001-07-18T00:00:00.000000 | 2001-08-13T00:00:00.000000 |
| certa-2001-ale-007 | Propagation d'un ver affectant sadmind et IIS | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| certa-2001-ale-006 | Prolifération en Europe du virus HOMEPAGE | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| CERTA-2001-ALE-007 | Propagation d'un ver affectant sadmind et IIS | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| CERTA-2001-ALE-006 | Prolifération en Europe du virus HOMEPAGE | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| certa-2001-ale-005 | Vulnérabilités dans les modems ADSL d'Alcatel | 2001-04-11T00:00:00.000000 | 2001-04-11T00:00:00.000000 |
| CERTA-2001-ALE-005 | Vulnérabilités dans les modems ADSL d'Alcatel | 2001-04-11T00:00:00.000000 | 2001-04-11T00:00:00.000000 |
| certa-2001-ale-004 | Vulnérabilité dans le démon snmpXdmid sous Sun Solaris | 2001-03-30T00:00:00.000000 | 2001-03-30T00:00:00.000000 |
| CERTA-2001-ALE-004 | Vulnérabilité dans le démon snmpXdmid sous Sun Solaris | 2001-03-30T00:00:00.000000 | 2001-03-30T00:00:00.000000 |
| certa-2001-ale-003 | Prolifération du ver Li0n | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| certa-2001-ale-002 | Risque d'exploitation des ressources partagées sous Windows | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| CERTA-2001-ALE-003 | Prolifération du ver Li0n | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| CERTA-2001-ALE-002 | Risque d'exploitation des ressources partagées sous Windows | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| certa-2001-ale-001 | Propagation du ver Ramen sous Linux. | 2001-01-19T00:00:00.000000 | 2001-01-19T00:00:00.000000 |
| CERTA-2001-ALE-001 | Propagation du ver Ramen sous Linux. | 2001-01-19T00:00:00.000000 | 2001-01-19T00:00:00.000000 |
| certa-2000-ale-016 | Connexion à Wanadoo | 2000-11-30T00:00:00.000000 | 2000-11-30T00:00:00.000000 |
| CERTA-2000-ALE-016 | Connexion à Wanadoo | 2000-11-30T00:00:00.000000 | 2000-11-30T00:00:00.000000 |
| certa-2000-ale-015 | Risque d'usurpation de l'identité de Sun Microsystems | 2000-10-25T00:00:00.000000 | 2000-10-25T00:00:00.000000 |
| CERTA-2000-ALE-015 | Risque d'usurpation de l'identité de Sun Microsystems | 2000-10-25T00:00:00.000000 | 2000-10-25T00:00:00.000000 |
| certa-2000-ale-013 | Virus VBS Quatro-A | 2000-09-18T00:00:00.000000 | 2000-09-18T00:00:00.000000 |
| CERTA-2000-ALE-013 | Virus VBS Quatro-A | 2000-09-18T00:00:00.000000 | 2000-09-18T00:00:00.000000 |
| certa-2000-ale-014 | Vulnérabilité dans la bibliothèque glibc sous Unix | 2000-09-14T00:00:00.000000 | 2000-09-14T00:00:00.000000 |
| CERTA-2000-ALE-014 | Vulnérabilité dans la bibliothèque glibc sous Unix | 2000-09-14T00:00:00.000000 | 2000-09-14T00:00:00.000000 |
| certa-2000-ale-012 | Mauvaise compatibilité des scanners de virus avec NTFS | 2000-09-08T00:00:00.000000 | 2000-09-08T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2026-AVI-0003 | Multiples vulnérabilités dans les produits Qnap | 2026-01-05T00:00:00.000000 | 2026-01-05T00:00:00.000000 |
| certfr-2026-avi-0002 | Multiples vulnérabilités dans les produits IBM | 2026-01-02T00:00:00.000000 | 2026-01-02T00:00:00.000000 |
| certfr-2026-avi-0001 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-02T00:00:00.000000 | 2026-01-02T00:00:00.000000 |
| CERTFR-2026-AVI-0002 | Multiples vulnérabilités dans les produits IBM | 2026-01-02T00:00:00.000000 | 2026-01-02T00:00:00.000000 |
| CERTFR-2026-AVI-0001 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-02T00:00:00.000000 | 2026-01-02T00:00:00.000000 |
| certfr-2025-avi-1142 | Multiples vulnérabilités dans Moxa NPort | 2025-12-31T00:00:00.000000 | 2025-12-31T00:00:00.000000 |
| CERTFR-2025-AVI-1142 | Multiples vulnérabilités dans Moxa NPort | 2025-12-31T00:00:00.000000 | 2025-12-31T00:00:00.000000 |
| certfr-2025-avi-1141 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1140 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1139 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1138 | Multiples vulnérabilités dans VMware Tanzu Platform | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1137 | Multiples vulnérabilités dans les produits IBM | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| CERTFR-2025-AVI-1141 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| CERTFR-2025-AVI-1140 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| CERTFR-2025-AVI-1139 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| CERTFR-2025-AVI-1138 | Multiples vulnérabilités dans VMware Tanzu Platform | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| CERTFR-2025-AVI-1137 | Multiples vulnérabilités dans les produits IBM | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1136 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1135 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1134 | Multiples vulnérabilités dans MongoDB Server | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1133 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1132 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1131 | Multiples vulnérabilités dans les produits IBM | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1130 | Multiples vulnérabilités dans les produits Foxit | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1129 | Multiples vulnérabilités dans les produits VMware | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1128 | Multiples vulnérabilités dans Mozilla Firefox | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1127 | Multiples vulnérabilités dans Centreon Web | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1126 | Multiples vulnérabilités dans PHP | 2025-12-19T00:00:00.000000 | 2025-12-22T00:00:00.000000 |
| certfr-2025-avi-1125 | Vulnérabilité dans les produits NetApp | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1124 | Multiples vulnérabilités dans Microsoft Edge | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2022-000092 | Typora fails to properly neutralize JavaScript code. | 2022-11-21T15:31+09:00 | 2024-06-03T15:13+09:00 |
| jvndb-2022-000091 | WordPress Plugin "WordPress Popular Posts" accepts untrusted external inputs to update certain internal variables | 2022-11-18T15:14+09:00 | 2022-11-18T15:14+09:00 |
| jvndb-2022-000089 | RICOH Aficio SP 4210N vulnerable to cross-site scripting | 2022-11-17T11:15+09:00 | 2022-11-17T11:15+09:00 |
| jvndb-2022-000090 | Multiple vulnerabilities in Movable Type | 2022-11-16T17:07+09:00 | 2024-06-03T15:31+09:00 |
| jvndb-2022-000088 | TERASOLUNA Global Framework and TERASOLUNA Server Framework for Java (Rich) vulnerable to ClassLoader manipulation | 2022-11-14T16:45+09:00 | 2024-06-06T16:11+09:00 |
| jvndb-2022-000086 | Aiphone Video Multi-Tenant System Entrance Stations vulnerable to information disclosure | 2022-11-10T13:40+09:00 | 2024-06-06T17:37+09:00 |
| jvndb-2022-002691 | Multiple vulnerabilities in OMRON products | 2022-11-10T09:46+09:00 | 2022-11-10T09:46+09:00 |
| jvndb-2022-000085 | WordPress Plugin "Salon booking system" vulnerable to cross-site scripting | 2022-11-08T15:07+09:00 | 2024-06-05T18:07+09:00 |
| jvndb-2022-000087 | Multiple vulnerabilities in WordPress | 2022-11-08T14:59+09:00 | 2024-06-06T16:27+09:00 |
| jvndb-2022-000079 | Multiple vulnerabilities in the web interfaces of Kyocera Document Solutions MFPs and printers | 2022-11-01T14:51+09:00 | 2024-06-06T17:01+09:00 |
| jvndb-2022-000084 | Multiple vulnerabilities in FUJI SOFT network devices | 2022-10-28T15:12+09:00 | 2024-06-06T16:48+09:00 |
| jvndb-2022-000083 | Multiple vulnerabilities in SHIRASAGI | 2022-10-25T15:10+09:00 | 2024-06-05T16:06+09:00 |
| jvndb-2022-000082 | Multiple vulnerabilities in nadesiko3 | 2022-10-20T16:58+09:00 | 2024-06-05T17:28+09:00 |
| jvndb-2022-002544 | Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service | 2022-10-20T16:18+09:00 | 2024-06-13T13:58+09:00 |
| jvndb-2022-002537 | Stack-based buffer overflow vulnerability in Yokogawa Test & Measurement WTViewerE | 2022-10-19T16:23+09:00 | 2024-06-12T16:54+09:00 |
| jvndb-2022-000081 | Lemon8 App fails to restrict access permissions | 2022-10-19T14:08+09:00 | 2024-06-12T16:39+09:00 |
| jvndb-2022-000080 | Android App "IIJ SmartKey" vulnerable to information disclosure | 2022-10-14T13:57+09:00 | 2024-06-27T13:40+09:00 |
| jvndb-2022-002451 | Multiple vulnerabilities in SVMPC1 and SVMPC2 | 2022-10-13T17:27+09:00 | 2024-05-30T16:38+09:00 |
| jvndb-2022-000078 | bingo!CMS vulnerable to authentication bypass | 2022-10-11T17:49+09:00 | 2024-05-30T17:57+09:00 |
| jvndb-2022-002448 | Multiple vulnerabilities in Trend Micro Deep Security and Cloud One - Workload Security agents for Windows | 2022-10-11T17:02+09:00 | 2024-06-13T14:30+09:00 |
| jvndb-2022-000077 | The installer of Sony Content Transfer may insecurely load Dynamic Link Libraries | 2022-10-11T15:08+09:00 | 2024-06-12T12:12+09:00 |
| jvndb-2022-000076 | Growi vulnerable to improper access control | 2022-10-07T14:30+09:00 | 2024-06-12T12:04+09:00 |
| jvndb-2022-000075 | IPFire WebUI vulnerable to cross-site scripting | 2022-10-06T13:05+09:00 | 2024-06-12T14:28+09:00 |
| jvndb-2022-002444 | Multiple vulnerabilities in Buffalo network devices | 2022-10-05T17:44+09:00 | 2022-10-13T16:28+09:00 |
| jvndb-2022-002443 | Privilege Escalation Vulnerability in Hitachi Storage Plug-in for VMware vCenter | 2022-10-05T17:28+09:00 | 2022-10-05T17:28+09:00 |
| jvndb-2022-000074 | BookStack vulnerable to cross-site scripting | 2022-09-30T14:48+09:00 | 2024-06-12T14:07+09:00 |
| jvndb-2022-002367 | OpenAM (OpenAM Consortium Edition) vulnerable to open redirect | 2022-09-16T15:30+09:00 | 2024-06-13T11:39+09:00 |
| jvndb-2022-000073 | Multiple vulnerabilities in EC-CUBE | 2022-09-15T16:30+09:00 | 2024-06-13T11:09+09:00 |
| jvndb-2022-000072 | EC-CUBE plugin "Product Image Bulk Upload Plugin" vulnerable to insufficient verification in uploading files | 2022-09-15T16:13+09:00 | 2024-06-13T11:03+09:00 |
| jvndb-2022-000071 | Multiple vulnerabilities in Trend Micro Apex One and Trend Micro Apex One as a Service | 2022-09-14T18:15+09:00 | 2024-06-13T11:34+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-13385 | Siemens SIDIS Prime存在多个漏洞 | 2026-03-10 | 2026-03-12 |
| cnvd-2026-13384 | Siemens Mendix应用程序授权配置错误漏洞 | 2026-03-10 | 2026-03-12 |
| cnvd-2026-18802 | Huawei HarmonyOS设备安全管理模块竞争条件漏洞 | 2026-03-09 | 2026-04-28 |
| cnvd-2026-18801 | Huawei HarmonyOS窗口模块双重释放漏洞 | 2026-03-09 | 2026-04-28 |
| cnvd-2026-18800 | Huawei HarmonyOS打印模块竞争条件漏洞(CNVD-2026-18800) | 2026-03-09 | 2026-04-28 |
| cnvd-2026-17486 | Discourse存在未明漏洞(CNVD-2026-17486) | 2026-03-09 | 2026-04-16 |
| cnvd-2026-17485 | Discourse访问控制错误漏洞(CNVD-2026-17485) | 2026-03-09 | 2026-04-16 |
| cnvd-2026-17484 | Discourse访问控制错误漏洞(CNVD-2026-17484) | 2026-03-09 | 2026-04-16 |
| cnvd-2026-16155 | Google Android权限提升漏洞(CNVD-2026-16155) | 2026-03-09 | 2026-04-07 |
| cnvd-2026-16154 | Google Android信息泄露漏洞(CNVD-2026-16154) | 2026-03-09 | 2026-04-07 |
| cnvd-2026-16147 | D-Link DIR-513堆栈缓冲区溢出漏洞(CNVD-2026-16147) | 2026-03-09 | 2026-04-07 |
| cnvd-2026-16146 | D-Link DIR-513堆栈缓冲区溢出漏洞(CNVD-2026-16146) | 2026-03-09 | 2026-04-07 |
| cnvd-2026-16138 | Delta Electronics CNCSoft-G2代码执行漏洞 | 2026-03-09 | 2026-04-07 |
| cnvd-2026-14972 | Chamilo import.php文件操作系统命令注入漏洞 | 2026-03-09 | 2026-03-26 |
| cnvd-2026-14971 | Chamilo editinstance.php文件操作系统命令注入漏洞 | 2026-03-09 | 2026-03-26 |
| cnvd-2026-14970 | Chamilo CSV文件名跨站脚本漏洞 | 2026-03-09 | 2026-03-26 |
| cnvd-2026-14652 | Google Android存在未明漏洞(CNVD-2026-14652 | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14651 | Google Android存在未明漏洞(CNVD-2026-14651) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14650 | Google Android权限提升漏洞(CNVD-2026-14650) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14649 | Google Android权限提升漏洞(CNVD-2026-14649) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14648 | Google Android存在未明漏洞(CNVD-2026-14648) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14647 | Google Android拒绝服务漏洞(CNVD-2026-14647) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14646 | Google Android存在未明漏洞(CNVD-2026-14646) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14645 | Google Android存在未明漏洞(CNVD-2026-14645) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14644 | Google Android权限提升漏洞(CNVD-2026-14644) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14643 | Google Android访问控制错误漏洞(CNVD-2026-14643) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-13797 | Google Chrome Skia整数溢出漏洞(CNVD-2026-13797) | 2026-03-09 | 2026-03-16 |
| cnvd-2026-13796 | Google Chrome DevTools堆破坏漏洞 | 2026-03-09 | 2026-03-16 |
| cnvd-2026-13795 | Google Chrome WebAudio内存越界访问漏洞 | 2026-03-09 | 2026-03-16 |
| cnvd-2026-13794 | Google Chrome CSS内存越界读漏洞 | 2026-03-09 | 2026-03-16 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-00946 | Уязвимость функции formSetIptv() микропрограммного обеспечения маршрутизаторов Tenda AX3,… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00945 | Уязвимость функции sub_727F4() микропрограммного обеспечения маршрутизаторов Tenda AX-180… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00944 | Уязвимость функции sub_60CFC() микропрограммного обеспечения маршрутизаторов Tenda AX-180… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00943 | Уязвимость микропрограммного обеспечения беспроводных Wi-Fi маршрутизаторов Tenda W30E, с… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00942 | Уязвимость механизма CORS микропрограммного обеспечения беспроводных Wi-Fi маршрутизаторо… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00941 | Уязвимость микропрограммного обеспечения беспроводных Wi-Fi маршрутизаторов Tenda W30E, с… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00940 | Уязвимость микропрограммного обеспечения маршрутизаторов Tenda AC23, связанная с выходом … | 29.01.2026 | 29.01.2026 |
| bdu:2026-00939 | Уязвимость микропрограммного обеспечения беспроводных Wi-Fi маршрутизаторов Tenda W30E, с… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00938 | Уязвимость микропрограммного обеспечения беспроводных Wi-Fi маршрутизаторов Tenda W30E, с… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00937 | Уязвимость микропрограммного обеспечения беспроводных Wi-Fi маршрутизаторов Tenda W30E, с… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00936 | Уязвимость функции sub_41E2A0() файла /goform/set_mode микропрограммного обеспечения марш… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00935 | Уязвимость функции setUnloadUserData() сценария /cgi-bin/cstecgi.cgi микропрограммного об… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00934 | Уязвимость программного обеспечения управления ИТ-инфраструктурой SolarWinds Web Help Des… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00933 | Уязвимость программного обеспечения управления ИТ-инфраструктурой SolarWinds Web Help Des… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00932 | Уязвимость программного обеспечения управления ИТ-инфраструктурой SolarWinds Web Help Des… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00931 | Уязвимость программного обеспечения управления ИТ-инфраструктурой SolarWinds Web Help Des… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00930 | Уязвимость программного обеспечения управления ИТ-инфраструктурой SolarWinds Web Help Des… | 29.01.2026 | 13.02.2026 |
| bdu:2026-00929 | Уязвимость DSP-сервиса микропрограммного обеспечения встраиваемых плат Qualcomm, позволяю… | 29.01.2026 | 04.02.2026 |
| bdu:2026-00928 | Уязвимость прошивки WLAN микропрограммного обеспечения встраиваемых плат Qualcomm, позвол… | 29.01.2026 | 04.02.2026 |
| bdu:2026-00927 | Уязвимость прошивки WLAN микропрограммного обеспечения встраиваемых плат Qualcomm, позвол… | 29.01.2026 | 04.02.2026 |
| bdu:2026-00926 | Уязвимость микропрограммного обеспечения встраиваемых плат Qualcomm, связанная с чтением … | 29.01.2026 | 04.02.2026 |
| bdu:2026-00925 | Уязвимость прошивки WLAN микропрограммного обеспечения встраиваемых плат Qualcomm, позвол… | 29.01.2026 | 04.02.2026 |
| bdu:2026-00924 | Уязвимость драйвера камеры микропрограммного обеспечения встраиваемых плат Qualcomm, позв… | 29.01.2026 | 04.02.2026 |
| bdu:2026-00923 | Уязвимость микропрограммного обеспечения встраиваемых плат Qualcomm, вызванная переполнен… | 29.01.2026 | 04.02.2026 |
| bdu:2026-00922 | Уязвимость службы DSP (Digital Signal Processor) микропрограммного обеспечения встраиваем… | 29.01.2026 | 04.02.2026 |
| bdu:2026-00921 | Уязвимость программного обеспечения для удалённого доступа и управления RuDesktop, связан… | 29.01.2026 | 13.02.2026 |
| bdu:2026-00920 | Уязвимость программного обеспечения для удалённого доступа и управления RuDesktop, сущест… | 29.01.2026 | 13.02.2026 |
| bdu:2026-00919 | Уязвимость программного обеспечения для удалённого доступа и управления RuDesktop, сущест… | 29.01.2026 | 13.02.2026 |
| bdu:2026-00918 | Уязвимость программного обеспечения для удалённого доступа и управления RuDesktop, связан… | 29.01.2026 | 13.02.2026 |
| bdu:2026-00917 | Уязвимость микропрограммного обеспечения беспроводных Wi-Fi маршрутизаторов Tenda W30E, с… | 28.01.2026 | 28.01.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200706-0666 | Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apac… | 2024-07-23T20:50:38.808000Z |
| var-200803-0169 | The Cisco PIX/ASA Finesse Operation System 7.1 and 7.2 allows local users to gain privile… | 2024-07-23T20:50:33.392000Z |
| var-200110-0176 | Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox … | 2024-07-23T20:50:33.705000Z |
| var-201605-0075 | Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL befor… | 2024-07-23T20:50:28.659000Z |
| var-201008-1004 | The loginDefaultEncrypt algorithm in loginLib in Wind River VxWorks before 6.9 does not p… | 2024-07-23T20:50:25.420000Z |
| var-200505-1436 | zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users… | 2024-07-23T20:50:25.579000Z |
| var-202012-1546 | A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. d… | 2024-07-23T20:50:20.423000Z |
| var-200609-0782 | Multiple buffer overflows in the Apple Type Services (ATS) server in Mac OS X 10.4 throug… | 2024-07-23T20:49:47.183000Z |
| var-201503-0052 | Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in O… | 2024-07-23T20:49:46.592000Z |
| var-200905-0155 | Multiple memory leaks in Ipsec-tools before 0.7.2 allow remote attackers to cause a denia… | 2024-07-23T20:49:45.261000Z |
| var-200707-0577 | Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used i… | 2024-07-23T20:49:41.081000Z |
| var-202103-1554 | Netty is an open-source, asynchronous event-driven network application framework for rapi… | 2024-07-23T20:49:40.283000Z |
| var-201504-0361 | The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x befor… | 2024-07-23T20:49:39.732000Z |
| var-200102-0027 | CBOS 2.4.1 and earlier in Cisco 600 routers allows remote attackers to cause a denial of … | 2024-07-23T20:49:36.601000Z |
| var-202011-0444 | Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker… | 2024-07-23T20:49:35.185000Z |
| var-201912-1849 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:49:34.258000Z |
| var-202005-0223 | SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shado… | 2024-07-23T20:49:32.020000Z |
| var-200811-0015 | Apple Safari before 3.2 does not properly prevent caching of form data for form fields th… | 2024-07-23T20:49:28.186000Z |
| var-202105-1306 | The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-… | 2024-07-23T20:49:26.394000Z |
| var-200505-0163 | Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when h… | 2024-07-23T20:48:54.841000Z |
| var-201211-0368 | Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS … | 2024-07-23T20:48:23.186000Z |
| var-201108-0149 | Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and … | 2024-07-23T20:47:46.652000Z |
| var-200505-0311 | Stack-based buffer overflow in the VPN daemon (vpnd) for Mac OS X before 10.3.9 allows lo… | 2024-07-23T20:47:42.176000Z |
| var-200504-0292 | Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote … | 2024-07-23T20:47:38.700000Z |
| var-201006-0051 | Cross-site request forgery (CSRF) vulnerability in the web interface in CUPS before 1.4.4… | 2024-07-23T20:46:54.348000Z |
| var-202201-0355 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. vim/vim Exists in a… | 2024-07-23T20:45:27.502000Z |
| var-201804-1210 | An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS b… | 2024-07-23T20:45:24.222000Z |
| var-200701-0400 | crashdump in Apple Mac OS X 10.4.8 allows local users in the admin group to modify arbitr… | 2024-07-23T20:45:22.440000Z |
| var-200701-0398 | Format string vulnerability in Apple Installer 2.1.5 on Mac OS X 10.4.8 allows user-assis… | 2024-07-23T20:45:19.199000Z |
| var-202005-1052 | When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.… | 2024-07-23T20:45:17.285000Z |