Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-3508 |
6.8 (4.0)
|
An Out-of-bounds Read vulnerability in the IOCTL ⦠|
ASUS |
ASUS System Control Interface |
2026-05-08T02:00:53.822Z | 2026-05-08T02:00:53.822Z |
| CVE-2026-6737 |
2 (4.0)
|
An Exposed IOCTL with Insufficient Access Control⦠|
ASUS |
AsusPTPFilter |
2026-05-08T02:00:26.422Z | 2026-05-08T02:00:26.422Z |
| CVE-2026-8127 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
eladmin Users API Endpoint UserController.java checkLe⦠|
n/a |
eladmin |
2026-05-08T02:00:14.462Z | 2026-05-08T02:00:14.462Z |
| CVE-2026-8126 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
SourceCodester Comment System post_comment.php sql injection |
SourceCodester |
Comment System |
2026-05-08T01:45:11.083Z | 2026-05-08T01:45:11.083Z |
| CVE-2026-31431 |
7.8 (3.1)
|
crypto: algif_aead - Revert to operating out-of-place |
Linux |
Linux |
2026-04-22T08:15:10.123Z | 2026-05-08T01:35:55.500Z |
| CVE-2026-8125 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Simple Chat System sendMessage.php sql i⦠|
code-projects |
Simple Chat System |
2026-05-08T01:30:10.489Z | 2026-05-08T01:30:10.489Z |
| CVE-2026-8124 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
GPAC box_code_base.c sidx_box_read allocation of resources |
n/a |
GPAC |
2026-05-08T01:15:10.347Z | 2026-05-08T01:15:10.347Z |
| CVE-2026-8123 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open5GS NSSF message.c ogs_sbi_discovery_option_add_sn⦠|
n/a |
Open5GS |
2026-05-08T01:00:12.670Z | 2026-05-08T01:00:12.670Z |
| CVE-2026-8122 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open5GS NSSF message.c ogs_sbi_discovery_option_add_se⦠|
n/a |
Open5GS |
2026-05-08T00:45:09.870Z | 2026-05-08T00:45:09.870Z |
| CVE-2026-8121 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open5GS NSSF conv.c ogs_sbi_parse_plmn_list denial of ⦠|
n/a |
Open5GS |
2026-05-08T00:30:10.368Z | 2026-05-08T00:30:10.368Z |
| CVE-2026-8120 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open5GS NSSF nnssf-handler.c denial of service |
n/a |
Open5GS |
2026-05-08T00:15:09.713Z | 2026-05-08T00:15:09.713Z |
| CVE-2026-8119 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
Open5GS NSSF nghttp2-server.c ogs_sbi_stream_find_by_i⦠|
n/a |
Open5GS |
2026-05-08T00:00:21.852Z | 2026-05-08T00:00:21.852Z |
| CVE-2026-8117 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
SourceCodester Pizzafy Ecommerce System index.php cros⦠|
SourceCodester |
Pizzafy Ecommerce System |
2026-05-07T23:45:10.695Z | 2026-05-07T23:45:10.695Z |
| CVE-2026-8116 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
huangjunsen0406 xiaozhi-mcphub dxtController.ts path t⦠|
huangjunsen0406 |
xiaozhi-mcphub |
2026-05-07T23:30:11.843Z | 2026-05-07T23:30:11.843Z |
| CVE-2026-8115 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
gyoridavid short-video-maker REST API rest.ts path traversal |
gyoridavid |
short-video-maker |
2026-05-07T22:45:11.302Z | 2026-05-07T22:45:11.302Z |
| CVE-2026-6411 |
7.3 (3.1)
|
MAXHUB Pivot Client Application Use of a Broken or Ris⦠|
MAXHUB |
MAXHUB Pivot client application |
2026-05-07T22:25:54.959Z | 2026-05-07T22:25:54.959Z |
| CVE-2026-42880 |
9.6 (3.1)
|
ArgoCD ServerSideDiff is vulnerable to Kubernetes Secr⦠|
argoproj |
argo-cd |
2026-05-07T22:20:39.506Z | 2026-05-07T22:20:39.506Z |
| CVE-2026-2710 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-05-07T22:20:00.454Z | |
| CVE-2026-8114 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
JeecgBoot JSON Object loadTreeData sql injection |
n/a |
JeecgBoot |
2026-05-07T22:00:11.288Z | 2026-05-07T22:00:11.288Z |
| CVE-2026-40213 |
7.4 (3.1)
|
OpenStack Cyborg before 16.0.1 uses rule:allow (c⦠|
OpenStack |
Cyborg |
2026-05-07T00:00:00.000Z | 2026-05-07T21:57:41.910Z |
| CVE-2026-40214 |
6.3 (3.1)
|
In OpenStack Cyborg before 16.0.1, the Accelerato⦠|
OpenStack |
Cyborg |
2026-05-07T00:00:00.000Z | 2026-05-07T21:54:10.614Z |
| CVE-2026-5121 |
7.5 (3.1)
|
Libarchive: libarchive: arbitrary code execution via i⦠|
Red Hat |
Red Hat Enterprise Linux 7 Extended Lifecycle Support |
2026-03-30T07:47:28.562Z | 2026-05-07T21:44:13.275Z |
| CVE-2026-4878 |
6.7 (3.1)
|
Libcap: libcap: privilege escalation via toctou race c⦠|
Red Hat |
Red Hat Enterprise Linux 10 |
2026-04-09T14:49:02.942Z | 2026-05-07T21:33:20.039Z |
| CVE-2026-4424 |
7.5 (3.1)
|
Libarchive: libarchive: information disclosure via hea⦠|
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-19T13:50:27.294Z | 2026-05-07T21:33:08.308Z |
| CVE-2026-6736 |
6.3 (4.0)
|
Authentication bypass vulnerability in GitHub Enterpri⦠|
GitHub |
Enterprise Server |
2026-05-07T21:14:33.490Z | 2026-05-07T21:27:45.553Z |
| CVE-2026-4775 |
7.8 (3.1)
|
Libtiff: libtiff: arbitrary code execution or denial o⦠|
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-24T14:42:47.529Z | 2026-05-07T21:24:46.165Z |
| CVE-2026-8106 |
5.9 (4.0)
|
Reflected HTML injection vulnerability in GitHub Enter⦠|
GitHub |
Enterprise Server |
2026-05-07T21:18:59.259Z | 2026-05-07T21:18:59.259Z |
| CVE-2026-8034 |
7.9 (4.0)
|
Server-side request forgery vulnerability in GitHub En⦠|
GitHub |
Enterprise Server |
2026-05-07T21:18:49.812Z | 2026-05-07T21:18:49.812Z |
| CVE-2026-7541 |
6.3 (4.0)
|
Denial of service vulnerability in GitHub Enterprise S⦠|
GitHub |
Enterprise Server |
2026-05-07T21:18:35.655Z | 2026-05-07T21:18:35.655Z |
| CVE-2026-8113 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
8421bit MiniClaw executeSkillScript kernel.ts isPathIn⦠|
8421bit |
MiniClaw |
2026-05-07T21:15:11.899Z | 2026-05-07T21:15:11.899Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-8127 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
eladmin Users API Endpoint UserController.java checkLe⦠|
n/a |
eladmin |
2026-05-08T02:00:14.462Z | 2026-05-08T02:00:14.462Z |
| CVE-2026-8126 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
SourceCodester Comment System post_comment.php sql injection |
SourceCodester |
Comment System |
2026-05-08T01:45:11.083Z | 2026-05-08T01:45:11.083Z |
| CVE-2026-6737 |
2 (4.0)
|
An Exposed IOCTL with Insufficient Access Control⦠|
ASUS |
AsusPTPFilter |
2026-05-08T02:00:26.422Z | 2026-05-08T02:00:26.422Z |
| CVE-2026-3508 |
6.8 (4.0)
|
An Out-of-bounds Read vulnerability in the IOCTL ⦠|
ASUS |
ASUS System Control Interface |
2026-05-08T02:00:53.822Z | 2026-05-08T02:00:53.822Z |
| CVE-2026-31431 |
7.8 (3.1)
|
crypto: algif_aead - Revert to operating out-of-place |
Linux |
Linux |
2026-04-22T08:15:10.123Z | 2026-05-08T01:35:55.500Z |
| CVE-2026-8125 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Simple Chat System sendMessage.php sql i⦠|
code-projects |
Simple Chat System |
2026-05-08T01:30:10.489Z | 2026-05-08T01:30:10.489Z |
| CVE-2026-8124 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
GPAC box_code_base.c sidx_box_read allocation of resources |
n/a |
GPAC |
2026-05-08T01:15:10.347Z | 2026-05-08T01:15:10.347Z |
| CVE-2026-8123 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open5GS NSSF message.c ogs_sbi_discovery_option_add_sn⦠|
n/a |
Open5GS |
2026-05-08T01:00:12.670Z | 2026-05-08T01:00:12.670Z |
| CVE-2026-8122 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open5GS NSSF message.c ogs_sbi_discovery_option_add_se⦠|
n/a |
Open5GS |
2026-05-08T00:45:09.870Z | 2026-05-08T00:45:09.870Z |
| CVE-2026-8121 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open5GS NSSF conv.c ogs_sbi_parse_plmn_list denial of ⦠|
n/a |
Open5GS |
2026-05-08T00:30:10.368Z | 2026-05-08T00:30:10.368Z |
| CVE-2026-8120 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open5GS NSSF nnssf-handler.c denial of service |
n/a |
Open5GS |
2026-05-08T00:15:09.713Z | 2026-05-08T00:15:09.713Z |
| CVE-2026-8119 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
Open5GS NSSF nghttp2-server.c ogs_sbi_stream_find_by_i⦠|
n/a |
Open5GS |
2026-05-08T00:00:21.852Z | 2026-05-08T00:00:21.852Z |
| CVE-2026-8117 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
SourceCodester Pizzafy Ecommerce System index.php cros⦠|
SourceCodester |
Pizzafy Ecommerce System |
2026-05-07T23:45:10.695Z | 2026-05-07T23:45:10.695Z |
| CVE-2026-8116 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
huangjunsen0406 xiaozhi-mcphub dxtController.ts path t⦠|
huangjunsen0406 |
xiaozhi-mcphub |
2026-05-07T23:30:11.843Z | 2026-05-07T23:30:11.843Z |
| CVE-2026-8115 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
gyoridavid short-video-maker REST API rest.ts path traversal |
gyoridavid |
short-video-maker |
2026-05-07T22:45:11.302Z | 2026-05-07T22:45:11.302Z |
| CVE-2026-6411 |
7.3 (3.1)
|
MAXHUB Pivot Client Application Use of a Broken or Ris⦠|
MAXHUB |
MAXHUB Pivot client application |
2026-05-07T22:25:54.959Z | 2026-05-07T22:25:54.959Z |
| CVE-2026-42880 |
9.6 (3.1)
|
ArgoCD ServerSideDiff is vulnerable to Kubernetes Secr⦠|
argoproj |
argo-cd |
2026-05-07T22:20:39.506Z | 2026-05-07T22:20:39.506Z |
| CVE-2026-2710 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-05-07T22:20:00.454Z | |
| CVE-2026-8114 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
JeecgBoot JSON Object loadTreeData sql injection |
n/a |
JeecgBoot |
2026-05-07T22:00:11.288Z | 2026-05-07T22:00:11.288Z |
| CVE-2026-8113 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
8421bit MiniClaw executeSkillScript kernel.ts isPathIn⦠|
8421bit |
MiniClaw |
2026-05-07T21:15:11.899Z | 2026-05-07T21:15:11.899Z |
| CVE-2026-8112 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
8421bit MiniClaw kernel.ts executeCognitivePulse os co⦠|
8421bit |
MiniClaw |
2026-05-07T21:00:13.825Z | 2026-05-07T21:00:13.825Z |
| CVE-2026-8106 |
5.9 (4.0)
|
Reflected HTML injection vulnerability in GitHub Enter⦠|
GitHub |
Enterprise Server |
2026-05-07T21:18:59.259Z | 2026-05-07T21:18:59.259Z |
| CVE-2026-8034 |
7.9 (4.0)
|
Server-side request forgery vulnerability in GitHub En⦠|
GitHub |
Enterprise Server |
2026-05-07T21:18:49.812Z | 2026-05-07T21:18:49.812Z |
| CVE-2026-7891 |
9.3 (4.0)
|
The VerySecureApp made by DIVD using Mendix Studi⦠|
DIVD |
VerySecureApp |
2026-05-07T21:07:22.206Z | 2026-05-07T21:07:22.206Z |
| CVE-2026-7541 |
6.3 (4.0)
|
Denial of service vulnerability in GitHub Enterprise S⦠|
GitHub |
Enterprise Server |
2026-05-07T21:18:35.655Z | 2026-05-07T21:18:35.655Z |
| CVE-2026-6736 |
6.3 (4.0)
|
Authentication bypass vulnerability in GitHub Enterpri⦠|
GitHub |
Enterprise Server |
2026-05-07T21:14:33.490Z | 2026-05-07T21:27:45.553Z |
| CVE-2026-5121 |
7.5 (3.1)
|
Libarchive: libarchive: arbitrary code execution via i⦠|
Red Hat |
Red Hat Enterprise Linux 7 Extended Lifecycle Support |
2026-03-30T07:47:28.562Z | 2026-05-07T21:44:13.275Z |
| CVE-2026-4878 |
6.7 (3.1)
|
Libcap: libcap: privilege escalation via toctou race c⦠|
Red Hat |
Red Hat Enterprise Linux 10 |
2026-04-09T14:49:02.942Z | 2026-05-07T21:33:20.039Z |
| CVE-2026-4775 |
7.8 (3.1)
|
Libtiff: libtiff: arbitrary code execution or denial o⦠|
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-24T14:42:47.529Z | 2026-05-07T21:24:46.165Z |
| CVE-2026-4424 |
7.5 (3.1)
|
Libarchive: libarchive: information disclosure via hea⦠|
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-19T13:50:27.294Z | 2026-05-07T21:33:08.308Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-4424 | A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archiv⦠| 2026-03-19T15:16:28.300 | 2026-05-07T22:16:35.730 |
| fkie_cve-2026-42826 | Exposure of sensitive information to an unauthorized actor in Azure DevOps allows an unauthorized a⦠| 2026-05-07T22:16:35.587 | 2026-05-07T22:16:35.587 |
| fkie_cve-2026-41929 | Vvveb before 1.0.8.2 contains an unauthenticated reflected cross-site scripting vulnerability in th⦠| 2026-05-07T22:16:35.450 | 2026-05-07T22:16:35.450 |
| fkie_cve-2026-41928 | Vvveb before 1.0.8.2 contains an information disclosure vulnerability in the cron controller that a⦠| 2026-05-07T22:16:35.313 | 2026-05-07T22:16:35.313 |
| fkie_cve-2026-41105 | Server-side request forgery (ssrf) in Azure Notification Service allows an authorized attacker to e⦠| 2026-05-07T22:16:35.183 | 2026-05-07T22:16:35.183 |
| fkie_cve-2026-40214 | In OpenStack Cyborg before 16.0.1, the Accelerator Request (ARQ) API does not enforce project owner⦠| 2026-05-07T22:16:35.047 | 2026-05-07T22:16:35.047 |
| fkie_cve-2026-40213 | OpenStack Cyborg before 16.0.1 uses rule:allow (check_str='@') as the default policy for multiple A⦠| 2026-05-07T22:16:34.910 | 2026-05-07T22:16:34.910 |
| fkie_cve-2026-35435 | Improper access control in Azure AI Foundry M365 published agents allows an unauthorized attacker t⦠| 2026-05-07T22:16:34.787 | 2026-05-07T22:16:34.787 |
| fkie_cve-2026-35428 | Improper neutralization of special elements used in a command ('command injection') in Azure Cloud ⦠| 2026-05-07T22:16:34.667 | 2026-05-07T22:16:34.667 |
| fkie_cve-2026-34327 | Externally controlled reference to a resource in another sphere in Microsoft Partner Center allows ⦠| 2026-05-07T22:16:34.540 | 2026-05-07T22:16:34.540 |
| fkie_cve-2026-33844 | Improper input validation in Azure Managed Instance for Apache Cassandra allows an authorized attac⦠| 2026-05-07T22:16:34.420 | 2026-05-07T22:16:34.420 |
| fkie_cve-2026-33823 | Improper authorization in Microsoft Teams allows an authorized attacker to disclose information ove⦠| 2026-05-07T22:16:34.283 | 2026-05-07T22:16:34.283 |
| fkie_cve-2026-33111 | Improper neutralization of special elements used in a command ('command injection') in Copilot Chat⦠| 2026-05-07T22:16:34.157 | 2026-05-07T22:16:34.157 |
| fkie_cve-2026-33109 | Improper access control in Azure Managed Instance for Apache Cassandra allows an authorized attacke⦠| 2026-05-07T22:16:34.030 | 2026-05-07T22:16:34.030 |
| fkie_cve-2026-32207 | Improper neutralization of input during web page generation ('cross-site scripting') in Azure Machi⦠| 2026-05-07T22:16:33.900 | 2026-05-07T22:16:33.900 |
| fkie_cve-2026-26164 | Improper neutralization of special elements in output used by a downstream component ('injection') ⦠| 2026-05-07T22:16:33.773 | 2026-05-07T22:16:33.773 |
| fkie_cve-2026-26129 | Improper neutralization of special elements in M365 Copilot allows an unauthorized attacker to disc⦠| 2026-05-07T22:16:33.607 | 2026-05-07T22:16:33.607 |
| fkie_cve-2026-8098 | A security vulnerability has been detected in code-projects Feedback System 1.0. Impacted is an unk⦠| 2026-05-07T21:16:30.900 | 2026-05-07T21:16:30.900 |
| fkie_cve-2026-8097 | A security flaw has been discovered in CodeAstro Online Classroom 1.0. This vulnerability affects u⦠| 2026-05-07T21:16:30.727 | 2026-05-07T21:16:30.727 |
| fkie_cve-2026-44365 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2026-34429. Reason:⦠| 2026-05-07T21:16:30.433 | 2026-05-07T21:16:30.433 |
| fkie_cve-2026-44244 | GitPython is a python library used to interact with Git repositories. Prior to version 3.1.49, GitC⦠| 2026-05-07T19:16:02.357 | 2026-05-07T21:16:30.283 |
| fkie_cve-2026-42449 | n8n-MCP is an MCP server that provides AI assistants access to n8n node documentation, properties, ⦠| 2026-05-07T21:16:30.133 | 2026-05-07T21:16:30.133 |
| fkie_cve-2026-42047 | Inngest is a platform for running event-driven and scheduled background functions with queueing, re⦠| 2026-05-07T21:16:29.980 | 2026-05-07T21:16:29.980 |
| fkie_cve-2026-41905 | FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version⦠| 2026-05-07T19:16:01.220 | 2026-05-07T21:16:29.870 |
| fkie_cve-2026-41692 | i18nextify is a JavaScript library that adds website internationalization via a script tag, without⦠| 2026-05-07T21:16:29.717 | 2026-05-07T21:16:29.717 |
| fkie_cve-2026-41691 | Copilot said: i18nextify is a JavaScript library that adds i18nextify is a JavaScript library that ⦠| 2026-05-07T21:16:29.560 | 2026-05-07T21:16:29.560 |
| fkie_cve-2026-34429 | Vvveb prior to 1.0.8.1 contains a stored cross-site scripting vulnerability that allows authenticat⦠| 2026-04-20T16:16:44.650 | 2026-05-07T21:16:29.427 |
| fkie_cve-2025-52479 | HTTP.jl provides HTTP client and server functionality for Julia, and URIs.jl parses and works with ⦠| 2025-06-25T16:15:27.017 | 2026-05-07T21:16:28.847 |
| fkie_cve-2026-42284 | GitPython is a python library used to interact with Git repositories. Prior to version 3.1.47, _clo⦠| 2026-05-07T19:16:01.783 | 2026-05-07T21:13:46.713 |
| fkie_cve-2026-44243 | GitPython is a python library used to interact with Git repositories. Prior to version 3.1.48, a vu⦠| 2026-05-07T19:16:02.227 | 2026-05-07T21:12:00.777 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-537j-gqpc-p7fq |
8.2 (3.1)
8.8 (4.0)
|
n8n Vulnerable to XSS via MCP OAuth client | 2026-04-29T21:23:04Z | 2026-05-08T01:31:29Z |
| ghsa-r4v6-9fqc-w5jr |
8.5 (3.1)
7.1 (4.0)
|
n8n's Credential Authorization Bypass in dynamic-node-parameters Allows Foreign API Key Replay | 2026-04-29T21:22:26Z | 2026-05-08T01:31:25Z |
| ghsa-44v6-jhgm-p3m4 |
7.5 (3.1)
7.1 (4.0)
|
n8n has a Python Task Runner Sandbox Escape Vulnerability | 2026-04-29T21:21:50Z | 2026-05-08T01:31:22Z |
| ghsa-756q-gq9h-fp22 |
7.7 (3.1)
6.0 (4.0)
|
n8n has Public API Variables IDOR that Allows Cross-Project Secret Disclosure | 2026-04-29T21:21:00Z | 2026-05-08T01:31:18Z |
| ghsa-49m9-pgww-9vq6 |
7.5 (3.1)
8.7 (4.0)
|
n8n Vulnerable to Unauthenticated Denial of Service via MCP Client Registration | 2026-04-29T21:19:07Z | 2026-05-08T01:31:14Z |
| ghsa-f77h-j2v7-g6mw |
5.4 (3.1)
6.3 (4.0)
|
n8n Vulnerable to Hijacking of Unauthenticated Chat Execution | 2026-04-29T21:17:44Z | 2026-05-08T01:31:09Z |
| ghsa-mp4j-h6gh-f6mp |
6.8 (3.1)
5.3 (4.0)
|
n8n has SQL Injection in SeaTable Node | 2026-04-29T21:10:58Z | 2026-05-08T01:30:50Z |
| ghsa-f6x8-65q6-j9m9 |
4.7 (3.1)
5.1 (4.0)
|
n8n has Open Redirect in MCP OAuth Consent Flow | 2026-04-29T21:10:17Z | 2026-05-08T01:30:46Z |
| ghsa-r6jc-mpqw-m755 |
9.8 (3.1)
5.3 (4.0)
|
n8n has SQL Injection in Oracle Database Node via Limit Field | 2026-04-29T21:08:27Z | 2026-05-08T01:30:42Z |
| ghsa-hp3c-vfpm-q4f7 |
8.2 (3.1)
5.3 (4.0)
|
n8n has SQL Injection in Snowflake and MySQL Nodes | 2026-04-29T21:03:29Z | 2026-05-08T01:30:35Z |
| ghsa-p7fg-763f-g4gf |
4.8 (4.0)
|
Claude SDK for TypeScript has Insecure Default File Permissions in Local Filesystem Memory Tool | 2026-04-29T22:28:12Z | 2026-05-08T01:30:32Z |
| ghsa-3gxm-wfjx-m847 |
6.0 (4.0)
|
beets has a Cross-site Scripting vulnerability | 2026-04-29T18:29:00Z | 2026-05-08T01:25:19Z |
| ghsa-grj5-jjm8-h35p |
9.8 (3.1)
|
VM2 Sandbox Breakout Through __lookupGetter__ | 2026-05-04T16:29:15Z | 2026-05-08T01:25:03Z |
| ghsa-9gh9-hwpr-rvqq |
7.0 (3.1)
|
uutils coreutils has a Time-of-Check to Time-of-Use (TOCTOU) race condition | 2026-04-22T18:31:45Z | 2026-05-08T01:24:58Z |
| ghsa-wmjr-v86c-m9jj |
2.0 (4.0)
|
Better Auth's multi-session sign-out hook allows forged cookies to revoke arbitrary sessions | 2025-11-26T22:11:50Z | 2026-05-08T01:19:47Z |
| ghsa-mr34-9552-qr95 |
5.8 (3.1)
6.3 (4.0)
|
OpenClaw: Webchat media embedding enforces local-root containment for tool-result files | 2026-04-17T22:33:09Z | 2026-05-08T01:13:04Z |
| ghsa-mcvf-jxcw-vj73 |
6.1 (3.1)
|
CKAN has CSRF exemption primed by anonymous requests | 2026-04-29T20:36:07Z | 2026-05-08T00:39:54Z |
| ghsa-m8jc-jjj9-hgc8 |
7.3 (3.1)
|
This vulnerability, in the MAXHUB Pivot client application versions prior to v1.36.2, may allow an⦠| 2026-05-08T00:31:35Z | 2026-05-08T00:31:35Z |
| ghsa-h65h-28xw-w79q |
6.3 (3.1)
2.1 (4.0)
|
A weakness has been identified in huangjunsen0406 xiaozhi-mcphub up to 1.0.3. This vulnerability af⦠| 2026-05-08T00:31:35Z | 2026-05-08T00:31:35Z |
| ghsa-935g-9rq5-q95c |
5.3 (3.1)
5.5 (4.0)
|
A security flaw has been discovered in gyoridavid short-video-maker up to 1.3.4. This affects an un⦠| 2026-05-08T00:31:35Z | 2026-05-08T00:31:35Z |
| ghsa-6f56-6pvf-gp4j |
4.3 (3.1)
2.1 (4.0)
|
A security vulnerability has been detected in SourceCodester Pizzafy Ecommerce System 1.0. This iss⦠| 2026-05-08T00:31:35Z | 2026-05-08T00:31:35Z |
| ghsa-xqmx-3vx6-fm88 |
5.9 (4.0)
|
A reflected HTML injection vulnerability was identified in the GitHub Enterprise Server Management ⦠| 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-w548-vv26-rff6 |
7.9 (4.0)
|
A server-side request forgery (SSRF) vulnerability was identified in the GitHub Enterprise Server n⦠| 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-rrf3-mgv7-cw6m |
9.3 (4.0)
|
The VerySecureApp made by DIVD using Mendix Studio Pro 11.8.0 Beta allows unintended data exposure ⦠| 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-q253-8qxh-gx79 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was found in 8421bit MiniClaw up to 223c16a1088e138838dcbd18cd65a37c35ac5a84. Affec⦠| 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-pghv-w792-qvjg |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was identified in JeecgBoot up to 3.9.1. Affected by this issue is some unknown fun⦠| 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-mmpc-xjxr-5hf8 |
6.3 (3.1)
|
In OpenStack Cyborg before 16.0.1, the Accelerator Request (ARQ) API does not enforce project owner⦠| 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-h86r-7gjv-6c7v |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in 8421bit MiniClaw up to 43905b934cf76489ab28e4d17da28ee97970f91f. ⦠| 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-gmwx-3xm2-9fx8 |
10.0 (3.1)
|
Exposure of sensitive information to an unauthorized actor in Azure DevOps allows an unauthorized a⦠| 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-96jg-8w8q-qmmc |
8.1 (3.1)
|
Server-side request forgery (ssrf) in Azure Notification Service allows an authorized attacker to e⦠| 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2025-56 |
4.3 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. In versions up t⦠| octoprint | 2025-04-22T18:15:59+00:00 | 2025-06-27T17:22:53.513680+00:00 |
| pysec-2024-256 |
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm⦠| mobsf | 2024-12-03T16:15:24+00:00 | 2025-06-27T17:22:53.325430+00:00 |
| pysec-2025-55 |
|
vLLM is an inference and serving engine for large language models (LLMs). Version 0.8.0 u⦠| vllm | 2025-05-30T19:15:30+00:00 | 2025-06-26T21:23:06.407481+00:00 |
| pysec-2025-54 |
|
vLLM is an inference and serving engine for large language models (LLMs). In versions 0.8⦠| vllm | 2025-05-30T19:15:30+00:00 | 2025-06-26T21:23:06.319321+00:00 |
| pysec-2025-53 |
|
vLLM is an inference and serving engine for large language models (LLMs). Prior to versio⦠| vllm | 2025-05-29T17:15:21+00:00 | 2025-06-26T21:23:06.231251+00:00 |
| pysec-2025-51 |
|
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) v⦠| apache-airflow-providers-snowflake | 2025-06-24T08:15:24+00:00 | 2025-06-26T21:23:03.132527+00:00 |
| pysec-2025-50 |
|
vLLM, an inference and serving engine for large language models (LLMs), has a Regular Exp⦠| vllm | 2025-05-30T18:15:32+00:00 | 2025-06-19T03:02:28.572160+00:00 |
| pysec-2024-255 |
|
Gradio before 4.20 allows credential leakage on Windows. | gradio | 2024-05-05T20:15:07+00:00 | 2025-06-17T19:21:48.983901+00:00 |
| pysec-2024-254 |
4.2 (3.1)
|
A session fixation vulnerability exists in the zenml-io/zenml application, where JWT toke⦠| zenml | 2024-04-16T00:15:11+00:00 | 2025-06-13T00:48:41.806476+00:00 |
| pysec-2025-49 |
8.8 (3.1)
|
setuptools is a package that allows users to download, build, install, upgrade, and unins⦠| setuptools | 2025-05-17T16:15:19+00:00 | 2025-06-12T22:23:11.115559+00:00 |
| pysec-2025-48 |
9.8 (3.1)
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm⦠| mobsf | 2025-03-31T17:15:42+00:00 | 2025-06-12T22:23:10.476087+00:00 |
| pysec-2024-253 |
|
pretix before 2024.1.1 mishandles file validation. | pretix | 2024-02-26T16:28:00+00:00 | 2025-06-11T15:23:51.683422+00:00 |
| pysec-2024-252 |
|
PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in t⦠| torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T19:22:08.948962+00:00 |
| pysec-2024-251 |
|
Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in⦠| torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T03:12:59.077932+00:00 |
| pysec-2025-47 |
|
An issue was discovered in Django 5.2 before 5.2.2, 5.1 before 5.1.10, and 4.2 before 4.2⦠| django | 2025-06-05T03:15:25+00:00 | 2025-06-05T05:23:28.296596+00:00 |
| pysec-2025-46 |
5.5 (3.1)
|
A vulnerability was found in erdogant pypickle up to 1.1.5. It has been classified as cri⦠| pypickle | 2025-05-26T08:15:19+00:00 | 2025-06-03T17:36:58.579358+00:00 |
| pysec-2025-45 |
7.8 (3.1)
|
A vulnerability was found in erdogant pypickle up to 1.1.5 and classified as problematic.⦠| pypickle | 2025-05-26T07:15:26+00:00 | 2025-06-03T17:36:58.528116+00:00 |
| pysec-2024-250 |
|
Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the component torch/csr⦠| torch | 2024-04-19T21:15:08+00:00 | 2025-06-03T15:23:56.072490+00:00 |
| pysec-2023-312 |
5.9 (3.1)
|
Redis before 6cbea7d allows a replica to cause an assertion failure in a primary server b⦠| redis | 2023-07-15T23:15:09Z | 2025-06-02T11:48:06.372423Z |
| pysec-2025-44 |
|
django-helpdesk before 1.0.0 allows Sensitive Data Exposure because of os.umask(0) in mod⦠| django-helpdesk | 2025-05-31T01:15:19+00:00 | 2025-05-31T03:09:35.357757+00:00 |
| pysec-2025-43 |
|
vLLM is an inference and serving engine for large language models (LLMs). In versions sta⦠| vllm | 2025-05-29T17:15:21+00:00 | 2025-05-29T19:21:01.611587+00:00 |
| pysec-2025-42 |
9.8 (3.1)
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Ver⦠| vllm | 2025-04-30T01:15:51+00:00 | 2025-05-28T21:23:12.396609+00:00 |
| pysec-2025-41 |
9.8 (3.1)
|
PyTorch is a Python package that provides tensor computation with strong GPU acceleration⦠| torch | 2025-04-18T16:15:23+00:00 | 2025-05-28T15:23:37.843138+00:00 |
| pysec-2025-40 |
7.5 (3.1)
|
A vulnerability in the `preprocess_string()` function of the `transformers.testing_utils`⦠| transformers | 2025-05-19T12:15:19+00:00 | 2025-05-21T19:22:10.801823+00:00 |
| pysec-2024-249 |
6.1 (3.1)
|
### Summary On all Label Studio versions prior to 1.11.0, data imported via file upload f⦠| label-studio | 2024-02-22T22:15:47+00:00 | 2025-05-19T11:22:35.312280+00:00 |
| pysec-2024-248 |
7.8 (3.1)
|
OpenCanary, a multi-protocol network honeypot, directly executed commands taken from its ⦠| opencanary | 2024-10-14T21:15:12+00:00 | 2025-05-16T14:23:05.150356+00:00 |
| pysec-2025-39 |
|
motionEye is an online interface for the software motion, a video surveillance program wi⦠| motioneye | 2025-05-14T16:15:29+00:00 | 2025-05-14T17:22:51.050788+00:00 |
| pysec-2025-38 |
|
OpenStack Ironic before 29.0.1 can write unintended files to a target node disk during im⦠| ironic | 2025-05-08T17:16:01Z | 2025-05-13T04:24:03.083929Z |
| pysec-2024-247 |
9.9 (3.1)
|
A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically⦠| zenml | 2024-04-16T00:15:11+00:00 | 2025-05-12T15:23:53.861001+00:00 |
| pysec-2025-37 |
|
An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2⦠| django | 2025-05-08T04:17:18+00:00 | 2025-05-08T05:23:16.210893+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33881 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.886591Z |
| gsd-2024-33880 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.882744Z |
| gsd-2024-33879 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.727068Z |
| gsd-2024-33878 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.850311Z |
| gsd-2024-33877 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.871220Z |
| gsd-2024-33876 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.990196Z |
| gsd-2024-33875 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.862083Z |
| gsd-2024-33874 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.959238Z |
| gsd-2024-33873 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.870402Z |
| gsd-2024-33872 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.839468Z |
| gsd-2024-33871 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.800751Z |
| gsd-2024-33870 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.943118Z |
| gsd-2024-33869 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.784255Z |
| gsd-2024-33868 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.896638Z |
| gsd-2024-33867 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.808129Z |
| gsd-2024-33866 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.819755Z |
| gsd-2024-33865 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.790923Z |
| gsd-2024-33864 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.792101Z |
| gsd-2024-33863 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.824810Z |
| gsd-2024-33862 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.799465Z |
| gsd-2024-33861 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.958057Z |
| gsd-2024-33860 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.777612Z |
| gsd-2024-33859 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.867340Z |
| gsd-2024-33858 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.848478Z |
| gsd-2024-33857 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.834866Z |
| gsd-2024-33856 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.944669Z |
| gsd-2024-33855 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.741239Z |
| gsd-2024-33854 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.916266Z |
| gsd-2024-33853 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.825026Z |
| gsd-2024-33852 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.824312Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-3189 | Malicious code in react-video-canvas (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:15Z |
| mal-2026-3310 | Malicious code in gweb-build-system (npm) | 2026-05-01T06:10:39Z | 2026-05-05T15:56:13Z |
| mal-2026-3261 | Malicious code in internal-auth-provider (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:13Z |
| mal-2026-3260 | Malicious code in google-storage-cloud (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:13Z |
| mal-2026-3259 | Malicious code in enterprise-auth-gateway-core (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:12Z |
| mal-2026-3202 | Malicious code in eslint-plugin-skyscanner-dates (npm) | 2026-04-30T17:59:18Z | 2026-05-05T15:56:12Z |
| mal-2026-3306 | Malicious code in bpmn-studio (npm) | 2026-05-01T16:23:02Z | 2026-05-05T15:56:11Z |
| mal-2026-3258 | Malicious code in @tech-global/internal-gateway-core (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:11Z |
| mal-2026-3185 | Malicious code in @saif777/codemirror5 (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:11Z |
| mal-2026-3257 | Malicious code in @omni-corp-infra/sso-bridge-core (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:10Z |
| mal-2026-3256 | Malicious code in @internal-infra/core-sso-bridge (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:10Z |
| mal-2026-3255 | Malicious code in @enterprise-core/auth-gateway-bridge (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:10Z |
| mal-2026-3254 | Malicious code in @corp-infra/sso-gateway-core (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:10Z |
| mal-2025-1011 | Malicious code in @infinid-indonesia/ui-kit (npm) | 2025-02-03T17:25:15Z | 2026-05-05T15:56:10Z |
| mal-2026-3345 | Malicious code in deployment-core (npm) | 2026-05-05T15:33:36Z | 2026-05-05T15:33:37Z |
| mal-2026-3346 | Malicious code in generator-go-circleci (npm) | 2026-05-05T15:33:36Z | 2026-05-05T15:33:36Z |
| mal-2026-3344 | Malicious code in @bold-commerce/stacks-ui (npm) | 2026-05-05T15:27:44Z | 2026-05-05T15:27:44Z |
| mal-2026-3343 | Malicious code in @atlan/connectors (npm) | 2026-05-05T15:27:44Z | 2026-05-05T15:27:44Z |
| mal-2026-3341 | Malicious code in runtime-probe (PyPI) | 2026-05-05T15:20:52Z | 2026-05-05T15:20:52Z |
| mal-2026-3342 | Malicious code in runtime-readout (PyPI) | 2026-05-05T15:14:31Z | 2026-05-05T15:14:31Z |
| mal-2026-3340 | Malicious code in trevlo (npm) | 2026-05-05T11:51:48Z | 2026-05-05T11:51:48Z |
| mal-2026-3339 | Malicious code in nf-ui-components (npm) | 2026-05-05T11:40:12Z | 2026-05-05T11:40:13Z |
| mal-2026-3304 | Malicious code in apcyber-test-package (npm) | 2026-05-03T12:35:37Z | 2026-05-04T23:51:16Z |
| mal-2026-3303 | Malicious code in ally-whitelist (npm) | 2026-05-03T12:29:27Z | 2026-05-04T23:51:16Z |
| mal-2026-3302 | Malicious code in ally-starter-api (npm) | 2026-05-03T12:19:19Z | 2026-05-04T23:51:16Z |
| mal-2026-3301 | Malicious code in ally-json-threat-protect (npm) | 2026-05-03T12:19:25Z | 2026-05-04T23:51:16Z |
| mal-2026-3300 | Malicious code in ally-forms (npm) | 2026-05-03T12:19:18Z | 2026-05-04T23:51:16Z |
| mal-2026-3299 | Malicious code in ally-eagw-identity (npm) | 2026-05-03T12:39:26Z | 2026-05-04T23:51:16Z |
| mal-2026-3298 | Malicious code in ally-ccapi (npm) | 2026-05-03T12:19:16Z | 2026-05-04T23:51:16Z |
| mal-2026-3297 | Malicious code in ally-call-wait-time (npm) | 2026-05-03T12:59:35Z | 2026-05-04T23:51:16Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| 2nga002743 | ABB AbilityTM zenon Remote Transport Vulnerability | 2025-08-12T00:30:00.000Z | 2025-08-12T00:30:00.000Z |
| 3adr011407 | ABB Automation Builder Vulnerabilities in user management and access control | 2025-04-30T00:00:00.000Z | 2025-07-25T00:00:00.000Z |
| 3adr011432 | AC500 V2 Buffer overread on Modbus protocol | 2025-07-23T00:30:00.000Z | 2025-07-23T00:30:00.000Z |
| 9akk108471a4556 | Busch-WelcomeĀ® 2 wire Door opener actuator by default in compatibility mode. | 2025-07-21T00:30:00.000Z | 2025-07-21T00:30:00.000Z |
| 2crt000008 | Lite Panel Pro Vulnerability in Session Management | 2025-06-26T00:30:00.000Z | 2025-06-26T00:30:00.000Z |
| 9akk108470a8948 | ELSB/Home Solutions Outdated SW Components in ABB Welcome IP-Gateway. | 2025-05-29T00:30:00.000Z | 2025-06-05T00:30:00.000Z |
| 9akk108471a1621 | EIBPORT Session Management Fail | 2025-06-02T00:30:00.000Z | 2025-06-04T00:30:00.000Z |
| 9akk108471a0021 | ELSB/BLBA ASPECT advisory several CVEs | 2025-05-22T00:30:00.000Z | 2025-05-23T10:30:00.000Z |
| 2crt000006 | ANC ā ABB Network Card Multiple vulnerabilities in ANC | 2025-04-30T00:30:00.000Z | 2025-04-30T00:30:00.000Z |
| 2crt000007 | Ekip Com IEC61850 Vulnerability in 3rd Party Library | 2025-04-29T00:30:00.000Z | 2025-04-29T00:30:00.000Z |
| 9akk108470a9989 | ABB MV Drives Affected by CODESYS RTS (Runtime System) Vulnerabilities | 2025-04-10T08:30:00.000Z | 2025-04-10T08:30:00.000Z |
| 2nga002579 | ABB Arctic communication solution ARM600 Vulnerabilities | 2025-04-07T10:30:00.000Z | 2025-04-07T10:30:00.000Z |
| 2nga002427 | ABB Arctic ARG600, ARC600, ARR600, ARP600 Arctic Wireless Gateway Modem Module and OpenSSH vulnerabilities | 2025-04-07T10:30:00.000Z | 2025-04-07T10:30:00.000Z |
| 9akk108470a9494 | Low Voltage DC Drives and Power Controllers CODESYS RTS Vulnerabilities | 2025-03-26T00:30:00.000Z | 2025-03-27T00:30:00.000Z |
| 9akk108470a9491 | ABB ACS880 +N8010 Drives CODESYS RTS Vulnerabilities | 2025-03-26T00:30:00.000Z | 2025-03-27T00:30:00.000Z |
| sa24p015 | B&R APROL Potential Privilege Escalation and Information Disclosure | 2025-03-24T00:30:00.000Z | 2025-03-24T00:30:00.000Z |
| 9akk108470a8565 | RMC-100 Vulnerability in the Web UI (REST Interface) | 2025-03-11T00:30:00.000Z | 2025-03-11T00:30:00.000Z |
| 9akk108470a5684 | FLXeon Controllers Cyber Security Advisory | 2025-01-20T00:30:00.000Z | 2025-02-14T00:30:00.000Z |
| 7paa012159 | System 800xA 5.1.x, 6.0.3.x, 6.1.1.x, 6.2.x - VideONet Camera passwords stored in clear text | 2025-02-10T00:30:00.000Z | 2025-02-10T00:30:00.000Z |
| 9akk108470a6775 | Hardcoded credentials in ASPECT Energy Management System | 2025-02-05T00:30:00.000Z | 2025-02-06T00:30:00.000Z |
| sa25p001 | Automation Runtime and mapp View Use of insecure algorithm for self-signed certificates | 2025-01-15T00:30:00.000Z | 2025-01-16T00:30:00.000Z |
| 9akk108470a5466 | Drive Composer Path Traversal Vulnerability | 2025-02-05T00:30:00.000Z | 2025-01-10T00:30:00.000Z |
| 3adr011377 | AC500 V3 Multiple vulnerabilities | 2025-01-07T00:30:00.000Z | 2025-01-07T00:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-1136 | Red Hat OpenShift Container Platform (gRPC-Go): Schwachstelle ermƶglicht Umgehen von Sicherheitsvorkehrungen | 2026-04-15T22:00:00.000+00:00 | 2026-04-26T22:00:00.000+00:00 |
| wid-sec-w-2026-1135 | Budibase: Schwachstelle ermƶglicht Umgehen von Sicherheitsvorkehrungen | 2026-04-15T22:00:00.000+00:00 | 2026-04-26T22:00:00.000+00:00 |
| wid-sec-w-2025-2142 | Cisco ASA, FTD, IOS, IOS XE, IOS XR: Mehrere Schwachstellen | 2025-09-25T22:00:00.000+00:00 | 2026-04-23T22:00:00.000+00:00 |
| wid-sec-w-2026-1145 | Flowise: Mehrere Schwachstellen | 2026-04-15T22:00:00.000+00:00 | 2026-04-21T22:00:00.000+00:00 |
| wid-sec-w-2026-1084 | BigBlueButton: Mehrere Schwachstellen | 2026-04-13T22:00:00.000+00:00 | 2026-04-21T22:00:00.000+00:00 |
| wid-sec-w-2026-1081 | MinIO: Mehrere Schwachstellen ermƶglichen Umgehen von Sicherheitsvorkehrungen | 2026-04-13T22:00:00.000+00:00 | 2026-04-21T22:00:00.000+00:00 |
| wid-sec-w-2026-1118 | Dell PowerProtect Data Domain OS: Mehrere Schwachstellen | 2026-04-14T22:00:00.000+00:00 | 2026-04-19T22:00:00.000+00:00 |
| wid-sec-w-2026-1144 | GIMP: Mehrere Schwachstellen | 2026-04-15T22:00:00.000+00:00 | 2026-04-16T22:00:00.000+00:00 |
| wid-sec-w-2026-0991 | Apache ActiveMQ, Client, Broker und Web: Mehrere Schwachstellen | 2026-04-07T22:00:00.000+00:00 | 2026-04-15T22:00:00.000+00:00 |
| wid-sec-w-2026-0915 | Kyocera Drucker: Mehrere Schwachstellen | 2026-03-30T22:00:00.000+00:00 | 2026-04-15T22:00:00.000+00:00 |
| wid-sec-w-2026-1054 | Apache log4net: Schwachstelle ermƶglicht Manipulation von Dateien | 2026-04-12T22:00:00.000+00:00 | 2026-04-14T22:00:00.000+00:00 |
| wid-sec-w-2026-0950 | Linux Kernel: Mehrere Schwachstellen | 2026-03-31T22:00:00.000+00:00 | 2026-04-14T22:00:00.000+00:00 |
| wid-sec-w-2026-1068 | Adobe Acrobat und Acrobat Reader: Mehrere Schwachstellen | 2020-08-11T22:00:00.000+00:00 | 2026-04-13T22:00:00.000+00:00 |
| wid-sec-w-2025-2564 | Microsoft Windows und Windows Server: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2026-04-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2890 | Microsoft Windows: Mehrere Schwachstellen | 2023-11-14T23:00:00.000+00:00 | 2026-04-13T22:00:00.000+00:00 |
| wid-sec-w-2023-0368 | Microsoft Exchange: Mehrere Schwachstellen ermöglichen Codeausführung | 2023-02-14T23:00:00.000+00:00 | 2026-04-13T22:00:00.000+00:00 |
| wid-sec-w-2026-1047 | Adobe Acrobat Reader: Schwachstelle ermöglicht Offenlegung von Informationen und Codeausführung | 2026-04-09T22:00:00.000+00:00 | 2026-04-12T22:00:00.000+00:00 |
| wid-sec-w-2026-0884 | OpenClaw: Mehrere Schwachstellen | 2026-03-26T23:00:00.000+00:00 | 2026-04-12T22:00:00.000+00:00 |
| wid-sec-w-2026-0856 | OpenClaw: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-04-12T22:00:00.000+00:00 |
| wid-sec-w-2026-0542 | OpenClaw: Mehrere Schwachstellen | 2026-02-25T23:00:00.000+00:00 | 2026-04-12T22:00:00.000+00:00 |
| wid-sec-w-2026-0472 | OpenClaw: Mehrere Schwachstellen | 2026-02-22T23:00:00.000+00:00 | 2026-04-12T22:00:00.000+00:00 |
| wid-sec-w-2026-1036 | OpenCTI: Schwachstelle ermöglicht Codeausführung | 2026-04-08T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-1027 | LangChain: Schwachstelle ermƶglicht Umgehen von Sicherheitsvorkehrungen | 2026-04-08T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-1023 | libpng: Schwachstelle ermƶglicht Offenlegung von Informationen | 2026-04-08T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-1022 | Juniper Patchday April 2026: Mehrere Schwachstellen | 2026-04-08T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-1020 | Intel Prozessoren (Pentium Silver Series, Celeron J Series, und Celeron N series): Schwachstelle ermƶglicht Privilegieneskalation | 2026-04-08T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-1012 | SonicWall SMA1000 : Mehrere Schwachstellen | 2026-04-08T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-1006 | Golang Go: Mehrere Schwachstellen | 2026-04-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-1002 | Django: Mehrere Schwachstellen | 2026-04-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0997 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2026-04-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-111-07 | Siemens SCALANCE | 2026-04-14T00:00:00.000000Z | 2026-04-21T06:00:00.000000Z |
| icsa-26-111-06 | Zero Motorcycles Firmware | 2026-04-21T06:00:00.000000Z | 2026-04-21T06:00:00.000000Z |
| icsa-26-111-04 | Siemens Analytics Toolkit | 2026-04-14T00:00:00.000000Z | 2026-04-21T06:00:00.000000Z |
| icsa-26-111-03 | Siemens SINEC NMS | 2026-04-14T00:00:00.000000Z | 2026-04-21T06:00:00.000000Z |
| icsa-26-111-02 | Siemens RUGGEDCOM CROSSBOW Secure Access Manager Primary | 2026-04-14T00:00:00.000000Z | 2026-04-21T06:00:00.000000Z |
| icsa-26-111-01 | Siemens TPM 2.0 | 2026-04-14T00:00:00.000000Z | 2026-04-21T06:00:00.000000Z |
| icsa-26-111-05 | Hardy Barth Salia EV Charge Controller | 2026-04-21T05:00:00.000000Z | 2026-04-21T05:00:00.000000Z |
| icsa-26-106-04 | AVEVA Pipeline Simulation | 2026-04-16T06:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-26-106-03 | Anviz Multiple Products | 2026-04-16T06:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-26-106-02 | Horner Automation Cscape and XL4, XL7 PLC | 2026-04-16T06:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-26-106-01 | Delta Electronics ASDA-Soft | 2026-04-16T06:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-26-085-02 | OC Messaging and Custom Messaging Gateway | 2026-03-26T06:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-26-043-01 | Siemens SINEC NMS | 2026-02-10T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-26-015-07 | Siemens RUGGEDCOM APE1808 Devices | 2026-01-13T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-25-259-05 | Siemens OpenSSL Vulnerability in Industrial Products | 2022-02-08T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-25-226-18 | Siemens SIMOTION SCOUT, SIMOTION SCOUT TIA, and SINAMICS STARTER | 2025-08-12T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-25-135-15 | Siemens Mendix OIDC SSO | 2025-05-13T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-25-072-11 | Siemens SIMATIC IPC Family, ITP1000, and Field PGs | 2025-03-11T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-23-080-04 | Siemens RADIUS Client of SIPROTEC 5 Devices | 2023-03-14T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-22-349-09 | Siemens Products affected by OpenSSL 3.0 | 2022-12-13T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-22-286-11 | Siemens SCALANCE and RUGGEDCOM Products | 2022-10-11T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-22-223-07 | Siemens SCALANCE | 2022-08-09T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-22-167-14 | Siemens OpenSSL Affected Industrial Products | 2022-06-14T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-22-104-04 | Siemens SCALANCE FragAttacks | 2021-07-13T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-21-194-03 | Siemens PROFINET Devices | 2021-07-13T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-21-075-02 | GE UR Family (Update A) | 2021-03-16T06:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-26-099-02 | GPL Odorizers GPL750 | 2026-04-09T06:00:00.000000Z | 2026-04-09T06:00:00.000000Z |
| icsa-26-099-01 | Contemporary Controls BASC 20T | 2026-04-09T06:00:00.000000Z | 2026-04-09T06:00:00.000000Z |
| icsa-25-345-10 | OpenPLC_V3 (Update A) | 2025-12-11T07:00:00.000000Z | 2026-04-09T06:00:00.000000Z |
| va-26-097-02 | IBM Maximo Application Suite Sensitive Tokens without 'Secure' Attribute | 2026-04-07T20:51:13Z | 2026-04-07T20:51:13Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-cssm-priv-esc-xranouo8 | Cisco Smart Software Manager On-Prem Privilege Escalation Vulnerability | 2026-04-01T16:00:00+00:00 | 2026-04-01T16:00:00+00:00 |
| cisco-sa-cimc-auth-bypass-agg2bxtn | Cisco Integrated Management Controller Authentication Bypass Vulnerability | 2026-04-01T16:00:00+00:00 | 2026-04-01T16:00:00+00:00 |
| cisco-sa-ndfc-cmdinj-uvyzrkfr | Cisco Nexus Dashboard Fabric Controller Arbitrary Command Execution Vulnerability | 2024-10-02T16:00:00+00:00 | 2026-03-31T18:47:53+00:00 |
| cisco-sa-xe-secureboot-bypass-b6uyxysz | Cisco IOS XE Software for Cisco Catalyst and Rugged Series Switches Secure Boot Bypass Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-wlc-dos-hnx5kgom | Cisco IOS XE Wireless Controller Software for the Catalyst CW9800 Family CAPWAP Denial of Service Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-vmanage-xss-zqkhp9w9 | Cisco Catalyst SD-WAN Manager Cross-Site Scripting Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-scp-dos-duadxtcg | Cisco IOS XE Software Secure Copy Protocol Server Denial of Service Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-iox-xss-lpgkzwtj | Cisco IOx Application Hosting Environment Stored Cross-Site Scripting Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-iox-crlf-nvgktkjz | Cisco IOx Application Hosting Environment Carriage Return Line Feed Injection Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-iosxe_infodis-6j847ueb | Cisco IOS XE Software Secure Channel for Meraki Information Disclosure Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-iosxe-tls-dos-tvgldezl | Cisco IOS XE Software TLS Memory Exhaustion Denial of Service Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-iosxe-lobby-privesc-kwxbqjy | Cisco IOS XE Software Lobby Ambassador Privilege Escalation Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-ios-http-dos-sbv8xrpl | Cisco IOS Software and IOS XE Software Release 3E HTTP Server Denial of Service Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-bootp-wubhnbxa | Cisco IOS XE Software for Catalyst 9000 Series Switches DHCP Snooping Denial of Service Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-asa-ftd-ios-dos-kpepqggk | Cisco IOS, IOS XE, Secure Firewall Adaptive Security Appliance, and Secure Firewall Threat Defense Software IKEv2 Denial of Service Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-fmc-rce-nkhnuljh | Cisco Secure Firewall Management Center Software Remote Code Execution Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-25T14:21:24+00:00 |
| cisco-sa-xrncs-epni-int-dos-twmffusn | Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability | 2026-03-11T16:00:00+00:00 | 2026-03-11T16:00:00+00:00 |
| cisco-sa-isis-dos-kdmxpszk | Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2026-03-11T16:00:00+00:00 | 2026-03-11T16:00:00+00:00 |
| cisco-sa-iosxr-privesc-bf8d5u4w | Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities | 2026-03-11T16:00:00+00:00 | 2026-03-11T16:00:00+00:00 |
| cisco-sa-cc-xss-mrnah5jh | Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities | 2026-03-11T16:00:00+00:00 | 2026-03-11T16:00:00+00:00 |
| cisco-sa-fmc-sql-inject-2enmtc8v | Cisco Secure Firewall Management Center Software SQL Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2026-03-04T16:11:01+00:00 |
| cisco-sa-asaftd-cmd-inj-zjv8wysm | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Command Injection Vulnerability | 2024-04-24T16:00:00+00:00 | 2026-03-04T16:10:59+00:00 |
| cisco-sa-snort3-multi-dos-xfwkwswz | Multiple Cisco Products Snort 3 Denial of Service Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-onprem-fmc-authbypass-5jpp45v2 | Cisco Secure Firewall Management Center Software Authentication Bypass Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftdfmc-dir-trav-wergjhwq | Cisco Secure Firewall Management Center and Secure Firewall Threat Defense Software Path Traversal Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-tcp-dos-rhfqnwrg | Cisco Secure Firewall Threat Defense Software TLS with Snort 3 Detection Engine Denial of Service Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-snort-bypass-rlggkzvf | Cisco Secure Firewall Threat Defense Software Snort Deep Inspection Bypass Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-dnd-dos-bpecg7b7 | Cisco Secure Firewall Threat Defense Software SSL Decryption Policy Denial of Service Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-cmd-inj-mtzgzexf | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Authenticated Command Injection Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-fmc-sql-injection-2qh6ccjd | Cisco Secure Firewall Management Center Software SQL Injection Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-33007 | Apache HTTP Server: mod_authn_socache crash | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:57.000Z |
| msrc_cve-2026-33006 | Apache HTTP Server: mod_auth_digest timing attack | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:49.000Z |
| msrc_cve-2026-24072 | Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:41.000Z |
| msrc_cve-2026-34032 | Apache HTTP Server: mod_proxy_ajp: Heap Buffer Over-Read Due to Missing Null-Termination Check (ajp_msg_get_string) | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:33.000Z |
| msrc_cve-2026-34059 | Apache HTTP Server: mod_proxy_ajp: Heap Over-Read and memory disclosure in ajp_parse_data() | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:25.000Z |
| msrc_cve-2026-23918 | Apache HTTP Server: http2: double free and possible RCE on early reset | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:17.000Z |
| msrc_cve-2026-33523 | Apache HTTP Server: multiple modules: HTTP response splitting forwarding malicious status line | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:09.000Z |
| msrc_cve-2026-3832 | Gnutls: gnutls: security bypass allows acceptance of revoked server certificates via crafted ocsp response | 2026-04-02T00:00:00.000Z | 2026-05-07T01:11:00.000Z |
| msrc_cve-2026-3833 | Gnutls: gnutls: policy bypass due to case-sensitive nameconstraints comparison | 2026-04-02T00:00:00.000Z | 2026-05-07T01:10:52.000Z |
| msrc_cve-2026-33845 | Gnutls: gnutls: denial of service via dtls zero-length fragment | 2026-04-02T00:00:00.000Z | 2026-05-07T01:10:44.000Z |
| msrc_cve-2026-28810 | Predictable DNS Transaction IDs Enable Cache Poisoning in Built-in Resolver | 2026-04-02T00:00:00.000Z | 2026-05-07T01:10:02.000Z |
| msrc_cve-2026-43868 | Apache Thrift: Rust implementation vulnerable to CVE-2020-13949 pattern | 2026-05-02T00:00:00.000Z | 2026-05-07T01:09:57.000Z |
| msrc_cve-2026-43870 | Apache Thrift: Node.js web_server.js multi-vulnerability | 2026-05-02T00:00:00.000Z | 2026-05-07T01:09:49.000Z |
| msrc_cve-2026-43083 | net: ioam6: fix OOB and missing lock | 2026-05-02T00:00:00.000Z | 2026-05-07T01:09:41.000Z |
| msrc_cve-2026-43199 | net/mlx5e: Fix "scheduling while atomic" in IPsec MAC address query | 2026-05-02T00:00:00.000Z | 2026-05-07T01:09:36.000Z |
| msrc_cve-2026-43101 | ipv6: ioam: fix potential NULL dereferences in __ioam6_fill_trace_data() | 2026-05-02T00:00:00.000Z | 2026-05-07T01:09:27.000Z |
| msrc_cve-2026-43267 | wifi: rtw89: fix potential zero beacon interval in beacon tracking | 2026-05-02T00:00:00.000Z | 2026-05-07T01:09:22.000Z |
| msrc_cve-2026-43119 | Bluetooth: hci_sync: annotate data-races around hdev->req_status | 2026-05-02T00:00:00.000Z | 2026-05-07T01:09:16.000Z |
| msrc_cve-2026-43216 | net: Drop the lock in skb_may_tx_timestamp() | 2026-05-02T00:00:00.000Z | 2026-05-07T01:09:11.000Z |
| msrc_cve-2026-43228 | hfs: Replace BUG_ON with error handling for CNID count checks | 2026-05-02T00:00:00.000Z | 2026-05-07T01:09:06.000Z |
| msrc_cve-2026-43213 | wifi: rtw89: pci: validate sequence number of TX release report | 2026-05-02T00:00:00.000Z | 2026-05-07T01:09:00.000Z |
| msrc_cve-2025-71272 | most: core: fix resource leak in most_register_interface error paths | 2026-05-02T00:00:00.000Z | 2026-05-07T01:08:55.000Z |
| msrc_cve-2026-43195 | drm/amdgpu: validate user queue size constraints | 2026-05-02T00:00:00.000Z | 2026-05-07T01:08:49.000Z |
| msrc_cve-2026-43088 | net: af_key: zero aligned sockaddr tail in PF_KEY exports | 2026-05-02T00:00:00.000Z | 2026-05-07T01:08:44.000Z |
| msrc_cve-2026-43165 | hwmon: (nct7363) Fix a resource leak in nct7363_present_pwm_fanin | 2026-05-02T00:00:00.000Z | 2026-05-07T01:08:39.000Z |
| msrc_cve-2026-43219 | net: cpsw_new: Fix potential unregister of netdev that has not been registered yet | 2026-05-02T00:00:00.000Z | 2026-05-07T01:08:34.000Z |
| msrc_cve-2026-43201 | APEI/GHES: ARM processor Error: don't go past allocated memory | 2026-05-02T00:00:00.000Z | 2026-05-07T01:08:28.000Z |
| msrc_cve-2026-43237 | drm/amdgpu: Refactor amdgpu_gem_va_ioctl for Handling Last Fence Update and Timeline Management v4 | 2026-05-02T00:00:00.000Z | 2026-05-07T01:08:23.000Z |
| msrc_cve-2026-43250 | usb: chipidea: udc: fix DMA and SG cleanup in _ep_nuke() | 2026-05-02T00:00:00.000Z | 2026-05-07T01:08:18.000Z |
| msrc_cve-2025-71294 | drm/amdgpu: fix NULL pointer issue buffer funcs | 2026-05-02T00:00:00.000Z | 2026-05-07T01:08:12.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0106 | Kwetsbaarheden verholpen in Cisco Integrated Management Controller | 2026-04-03T10:34:46.145536Z | 2026-04-03T10:34:46.145536Z |
| ncsc-2026-0105 | Kwetsbaarheden verholpen in Cisco Nexus Dashboard en Nexus Dashboard Insights | 2026-04-03T08:20:48.187725Z | 2026-04-03T08:20:48.187725Z |
| ncsc-2026-0047 | Kwetsbaarheid verholpen in Fortinet FortiClient EMS | 2026-02-09T10:16:18.048622Z | 2026-03-30T11:36:22.656910Z |
| ncsc-2025-0319 | Kwetsbaarheden verholpen in F5 Networks BIG-IP, F5OS en NGINX App Protect WAF | 2025-10-15T15:21:14.871532Z | 2026-03-27T18:09:03.259108Z |
| ncsc-2026-0104 | Kwetsbaarheden verholpen in Cisco IOS XE Software | 2026-03-26T09:50:03.269095Z | 2026-03-26T09:50:03.269095Z |
| ncsc-2026-0103 | Kwetsbaarheden verholpen in GitLab | 2026-03-26T09:48:10.874427Z | 2026-03-26T09:48:10.874427Z |
| ncsc-2026-0102 | Kwetsbaarheden verholpen in Apple macOS | 2026-03-25T14:15:56.073353Z | 2026-03-25T14:15:56.073353Z |
| ncsc-2026-0101 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2026-03-25T14:02:07.392994Z | 2026-03-25T14:02:07.392994Z |
| ncsc-2026-0100 | Kwetsbaarheden verholpen in Citrix Netscaler ADC en Netscaler Gateway | 2026-03-23T13:43:30.957806Z | 2026-03-23T13:43:30.957806Z |
| ncsc-2026-0099 | Kwetsbaarheid verholpen in Oracle Identity Manager en Oracle Web Services Manager | 2026-03-20T15:56:12.716324Z | 2026-03-20T15:56:12.716324Z |
| ncsc-2026-0010 | Kwetsbaarheden verholpen in Microsoft Office | 2026-01-13T19:18:45.984019Z | 2026-03-20T14:03:59.225773Z |
| ncsc-2026-0076 | Kwetsbaarheden verholpen in Cisco Secure Firewall Management Center | 2026-03-04T20:49:12.211658Z | 2026-03-19T11:48:18.917205Z |
| ncsc-2026-0098 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2026-03-13T08:41:19.155490Z | 2026-03-13T08:41:19.155490Z |
| ncsc-2026-0097 | Kwetsbaarheden verholpen in Google Chrome | 2026-03-13T08:33:43.877125Z | 2026-03-13T08:33:43.877125Z |
| ncsc-2026-0096 | Kwetsbaarheden verholpen in Veeam Backup & Replication | 2026-03-12T14:54:08.200676Z | 2026-03-12T14:54:08.200676Z |
| ncsc-2026-0095 | Kwetsbaarheid verholpen in pac4j-jwt | 2026-03-12T14:45:51.156512Z | 2026-03-12T14:45:51.156512Z |
| ncsc-2026-0094 | Kwetsbaarheden verholpen in Cisco IOS XR | 2026-03-12T14:44:08.106602Z | 2026-03-12T14:44:08.106602Z |
| ncsc-2026-0093 | Kwetsbaarheden verholpen in GitLab | 2026-03-12T14:42:46.936248Z | 2026-03-12T14:42:46.936248Z |
| ncsc-2026-0092 | Kwetsbaarheden verholpen in Fortinet FortiWeb | 2026-03-12T07:46:15.529522Z | 2026-03-12T07:46:15.529522Z |
| ncsc-2026-0091 | Kwetsbaarheden verholpen in SAP-producten | 2026-03-12T07:24:16.575638Z | 2026-03-12T07:24:16.575638Z |
| ncsc-2026-0090 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2026-03-12T07:12:51.952931Z | 2026-03-12T07:12:51.952931Z |
| ncsc-2026-0089 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2026-03-12T07:03:24.148324Z | 2026-03-12T07:03:24.148324Z |
| ncsc-2026-0088 | Kwetsbaarheden verholpen in Adobe Illustrator | 2026-03-12T06:55:39.712240Z | 2026-03-12T06:55:39.712240Z |
| ncsc-2026-0087 | Kwetsbaarheden verholpen in Adobe Commerce | 2026-03-12T06:49:56.459199Z | 2026-03-12T06:49:56.459199Z |
| ncsc-2026-0086 | Kwetsbaarheden verholpen in Fortinet FortiManager en FortiAnalyzer | 2026-03-11T09:19:38.777277Z | 2026-03-11T09:19:38.777277Z |
| ncsc-2026-0085 | Kwetsbaarheden verholpen in Microsoft Developer tools | 2026-03-10T20:35:10.478398Z | 2026-03-10T20:35:10.478398Z |
| ncsc-2026-0084 | Kwetsbaarheden verholpen in Microsoft Office | 2026-03-10T20:20:08.157658Z | 2026-03-10T20:20:08.157658Z |
| ncsc-2026-0083 | Kwetsbaarheid verholpen in Microsoft Authenticator app | 2026-03-10T20:18:35.792755Z | 2026-03-10T20:18:35.792755Z |
| ncsc-2026-0082 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-03-10T20:15:41.528951Z | 2026-03-10T20:15:41.528951Z |
| ncsc-2026-0081 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2026-03-10T20:12:56.032261Z | 2026-03-10T20:12:56.032261Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2023_5-01 | Information disclosure via the debug function in assertions in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_4-01 | Stored Cross-Site Scripting (XSS) in Threat Intelligence rules in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_3-01 | Authenticated Blind SQL Injection on alerts count in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_2-01 | Authenticated Blind SQL Injection on sorting in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_11-01 | SQL Injection on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_10-01 | DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_1-01 | Authenticated SQL Injection on Alerts in Guardian/CMC before 22.5.2 | 2023-05-03T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:9-01 | Authenticated SQL Injection on Query functionality in Guardian/CMC before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:8-01 | Session Fixation in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:7-01 | DoS via SAML configuration in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:6-01 | Partial DoS on Reports section due to null report name in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:5-01 | Information disclosure via the debug function in assertions in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:4-01 | Stored Cross-Site Scripting (XSS) in Threat Intelligence rules in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:3-01 | Authenticated Blind SQL Injection on alerts count in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:2-01 | Authenticated Blind SQL Injection on sorting in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:11-01 | SQL Injection on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:10-01 | DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:1-01 | Authenticated SQL Injection on Alerts in Guardian/CMC before 22.5.2 | 2023-05-03T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022_2-02 | Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022_2-01 | Authenticated RCE on logo report upload in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022:2-02 | Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022:2-01 | Authenticated RCE on logo report upload in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021_2-01 | Authenticated command path traversal on timezone settings in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021_1-01 | Authenticated command injection when changing date settings or hostname in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021:2-01 | Authenticated command path traversal on timezone settings in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021:1-01 | Authenticated command injection when changing date settings or hostname in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020_3-01 | Angular template injection on custom report name field | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020_2-01 | Cross-site request forgery attack on change password form | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020:3-01 | Angular template injection on custom report name field | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020:2-01 | Cross-site request forgery attack on change password form | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10677-1 | grafana-11.6.14+security01-2.1 on GA media | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| opensuse-su-2026:10676-1 | golang-github-prometheus-prometheus-3.11.3-1.1 on GA media | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| opensuse-su-2026:10675-1 | dpkg-1.22.22-1.1 on GA media | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| opensuse-su-2026:10674-1 | curl-8.20.0-1.1 on GA media | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| opensuse-su-2026:10673-1 | coredns-1.14.3-1.1 on GA media | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| opensuse-su-2026:10672-1 | cmctl-2.5.0-1.1 on GA media | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| opensuse-su-2026:10671-1 | bubblewrap-0.11.2-1.1 on GA media | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| opensuse-su-2026:10670-1 | avahi-0.8-43.1 on GA media | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| opensuse-su-2026:10669-1 | alloy-1.16.0-2.1 on GA media | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| opensuse-su-2026:10668-1 | MozillaFirefox-150.0.1-1.1 on GA media | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| opensuse-su-2026:20660-1 | Security update for chromium | 2026-05-01T22:48:13Z | 2026-05-01T22:48:13Z |
| opensuse-su-2026:20664-1 | Security update for MozillaThunderbird | 2026-05-01T17:00:28Z | 2026-05-01T17:00:28Z |
| opensuse-su-2026:10662-1 | glibc-2.43-1.1 on GA media | 2026-04-30T00:00:00Z | 2026-04-30T00:00:00Z |
| opensuse-su-2026:10661-1 | firefox-esr-140.10.1-1.1 on GA media | 2026-04-30T00:00:00Z | 2026-04-30T00:00:00Z |
| opensuse-su-2026:20654-1 | Security update for grafana | 2026-04-29T16:12:10Z | 2026-04-29T16:12:10Z |
| opensuse-su-2026:20652-1 | Security update for openexr | 2026-04-29T14:35:24Z | 2026-04-29T14:35:24Z |
| opensuse-su-2026:20651-1 | Security update for ntfs-3g_ntfsprogs | 2026-04-29T14:19:47Z | 2026-04-29T14:19:47Z |
| opensuse-su-2026:20650-1 | Security update for python-PyNaCl | 2026-04-29T14:17:40Z | 2026-04-29T14:17:40Z |
| opensuse-su-2026:20647-1 | Security update for libssh | 2026-04-29T11:20:23Z | 2026-04-29T11:20:23Z |
| opensuse-su-2026:20646-1 | Security update for PackageKit | 2026-04-29T09:45:23Z | 2026-04-29T09:45:23Z |
| opensuse-su-2026:20653-1 | Security update for radare2 | 2026-04-29T08:45:46Z | 2026-04-29T08:45:46Z |
| opensuse-su-2026:20645-1 | Security update for python-Mako | 2026-04-29T08:17:18Z | 2026-04-29T08:17:18Z |
| opensuse-su-2026:20644-1 | Security update for python-jwcrypto | 2026-04-29T08:15:26Z | 2026-04-29T08:15:26Z |
| opensuse-su-2026:10652-1 | gvim-9.2.0398-1.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10651-1 | trivy-0.70.0-1.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10650-1 | libtiff-devel-32bit-4.7.1-5.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10649-1 | sed-4.10-1.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10648-1 | python315-3.15.0~a8-3.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10647-1 | python310-3.10.20-6.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10646-1 | python311-pyOpenSSL-26.1.0-1.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:12119 | Red Hat Security Advisory: OpenShift Container Platform 4.18.39 security and extras update | 2026-05-06T07:35:33+00:00 | 2026-05-08T04:16:40+00:00 |
| rhsa-2026:12118 | Red Hat Security Advisory: OpenShift Container Platform 4.18.39 bug fix and security update | 2026-05-06T08:17:11+00:00 | 2026-05-08T04:16:39+00:00 |
| rhsa-2026:12116 | Red Hat Security Advisory: Assisted Installer RHEL 9 components for Multicluster Engine for Kubernetes 2.10.2 | 2026-04-30T06:52:26+00:00 | 2026-05-08T04:16:39+00:00 |
| rhsa-2026:11916 | Red Hat Security Advisory: Red Hat Quay 3.10.21 | 2026-04-29T21:18:39+00:00 | 2026-05-08T04:16:39+00:00 |
| rhsa-2026:11856 | Red Hat Security Advisory: Red Hat Quay 3.12.17 | 2026-04-29T17:11:19+00:00 | 2026-05-08T04:16:39+00:00 |
| rhsa-2026:11803 | Red Hat Security Advisory: VolSync v0.15 security fixes and container updates | 2026-04-29T15:35:02+00:00 | 2026-05-08T04:16:37+00:00 |
| rhsa-2026:11408 | Red Hat Security Advisory: VolSync v0.14 security fixes and container updates | 2026-04-28T19:03:51+00:00 | 2026-05-08T04:16:37+00:00 |
| rhsa-2026:11331 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.7.2 | 2026-04-28T07:19:47+00:00 | 2026-05-08T04:16:37+00:00 |
| rhsa-2026:11330 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.6.5 | 2026-04-28T07:16:04+00:00 | 2026-05-08T04:16:37+00:00 |
| rhsa-2026:11217 | Red Hat Security Advisory: RHACS 4.8.11 security and bug fix update | 2026-04-27T23:24:47+00:00 | 2026-05-08T04:16:36+00:00 |
| rhsa-2026:11070 | Red Hat Security Advisory: RHACS 4.8.11 security and bug fix update | 2026-04-27T20:25:56+00:00 | 2026-05-08T04:16:36+00:00 |
| rhsa-2026:10706 | Red Hat Security Advisory: rhc security update | 2026-04-27T01:50:01+00:00 | 2026-05-08T04:16:36+00:00 |
| rhsa-2026:10705 | Red Hat Security Advisory: rhc security update | 2026-04-27T01:54:41+00:00 | 2026-05-08T04:16:35+00:00 |
| rhsa-2026:10698 | Red Hat Security Advisory: RHOAI 2.25.6 - Red Hat OpenShift AI | 2026-04-26T13:53:48+00:00 | 2026-05-08T04:16:35+00:00 |
| rhsa-2026:10175 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.27.1 Release. | 2026-04-23T14:43:48+00:00 | 2026-05-08T04:16:34+00:00 |
| rhsa-2026:10172 | Red Hat Security Advisory: RHTAS 1.3.4 - Red Hat Trusted Artifact Signer Release | 2026-04-23T14:42:03+00:00 | 2026-05-08T04:16:34+00:00 |
| rhsa-2026:10158 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.7.2 | 2026-04-23T14:13:54+00:00 | 2026-05-08T04:16:34+00:00 |
| rhsa-2026:10155 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.6.5 | 2026-04-23T13:57:56+00:00 | 2026-05-08T04:16:33+00:00 |
| rhsa-2026:10153 | Red Hat Security Advisory: RHTAS 1.3.4 - Red Hat Trusted Artifact Signer Release | 2026-04-23T13:52:18+00:00 | 2026-05-08T04:16:33+00:00 |
| rhsa-2026:10131 | Red Hat Security Advisory: RHTAS 1.3.4 - Red Hat Trusted Artifact Signer Release | 2026-04-23T12:17:52+00:00 | 2026-05-08T04:16:32+00:00 |
| rhsa-2026:10130 | Red Hat Security Advisory: RHTAS 1.3.4 - Red Hat Trusted Artifact Signer Release | 2026-04-23T12:17:43+00:00 | 2026-05-08T04:16:32+00:00 |
| rhsa-2026:10126 | Red Hat Security Advisory: RHTAS 1.3.4 - Red Hat Trusted Artifact Signer Release | 2026-04-23T12:16:06+00:00 | 2026-05-08T04:16:32+00:00 |
| rhsa-2026:10125 | Red Hat Security Advisory: RHTAS 1.3.4 - Red Hat Trusted Artifact Signer Release | 2026-04-23T12:15:28+00:00 | 2026-05-08T04:16:32+00:00 |
| rhsa-2026:10107 | Red Hat Security Advisory: rhc security update | 2026-04-23T19:40:23+00:00 | 2026-05-08T04:16:32+00:00 |
| rhsa-2026:10105 | Red Hat Security Advisory: OpenShift Container Platform 4.16.60 security and extras update | 2026-04-30T10:57:19+00:00 | 2026-05-08T04:16:32+00:00 |
| rhsa-2026:10094 | Red Hat Security Advisory: OpenShift Container Platform 4.19.29 security and extras update | 2026-04-29T07:27:54+00:00 | 2026-05-08T04:16:32+00:00 |
| rhsa-2026:10093 | Red Hat Security Advisory: OpenShift Container Platform 4.19.29 bug fix and security update | 2026-04-29T08:06:12+00:00 | 2026-05-08T04:16:32+00:00 |
| rhsa-2026:9848 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.6.10 security update | 2026-04-22T17:54:30+00:00 | 2026-05-08T03:03:13+00:00 |
| rhsa-2026:8501 | Red Hat Security Advisory: Technical preview of the satellite/iop-vulnerability-frontend-rhel9 container image | 2026-04-16T15:10:13+00:00 | 2026-05-08T03:03:11+00:00 |
| rhsa-2026:8500 | Red Hat Security Advisory: General availability of the satellite/iop-host-inventory-frontend-rhel9 container image | 2026-04-16T15:10:10+00:00 | 2026-05-08T03:03:10+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2023-192-04 | CODESYS Runtime Vulnerabilities | 2023-07-11T07:15:18.000Z | 2025-12-09T08:00:00.000Z |
| sevd-2021-159-04 | ISaGRAF Vulnerabilities in IEC 61131-3 Programming and Engineering Tools | 2021-06-08T04:36:25.000Z | 2025-11-15T00:00:00.000Z |
| sevd-2022-284-03 | ISaGRAF Workbench for SAGE RTU | 2022-10-10T22:13:16.000Z | 2025-11-14T06:30:00.000Z |
| sevd-2025-315-02 | EcoStruxure⢠Machine SCADA Expert & Pro-face BLUE Open Studio | 2025-11-11T08:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-315-01 | PowerChute⢠Serial Shutdown | 2025-11-11T08:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-224-02 | EcoStruxure⢠Power Monitoring Expert Software & EcoStruxure⢠Power Operation (EPO) and EcoStruxure⢠Power SCADA Operation (PSO) | 2025-08-12T04:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-224-01 | Saitel DR & Saitel DP Remote Terminal Unit | 2025-08-12T04:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-287-01 | EcoStruxure⢠OPC UA Server Expert and EcoStruxure⢠Modicon Communication Server | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2025-133-01 | Modicon Controllers M241/M251/M258/LMC058 | 2025-05-13T04:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2024-345-03 | Modicon M241 / M251 / M258 / LMC058 | 2024-12-10T05:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2024-191-04 | Modicon Controllers M241/ M251, M258 / LMC058 and M262 | 2024-07-09T00:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2025-133-05 | Galaxy VS, Galaxy VL, Galaxy VXL | 2025-05-13T04:00:00.000Z | 2025-09-24T04:00:00.000Z |
| sevd-2025-252-02 | Saitel DR & Saitel DP Remote Terminal Unit | 2025-09-09T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-224-04 | EcoStruxure⢠Building Operation Enterprise Server, EcoStruxure⢠Building Operation Enterprise Central, and EcoStruxure⢠Workstation | 2025-08-12T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-224-03 | Schneider Electric Software Update | 2025-08-12T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-014-02 | Pro-face GP-Pro EX and Remote HMI | 2025-01-14T00:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2021-313-05 | BadAlloc Vulnerabilities | 2021-11-09T05:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-014-03 | Wind River VxWorks DHCP Server Vulnerability | 2025-01-14T05:00:00.000Z | 2025-08-12T04:00:00.000Z |
| sevd-2025-189-04 | EcoStruxure⢠Power Monitoring Expert (PME) and EcoStruxure⢠Power Operation (EPO) with Advanced Reporting and Dashboards | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-189-02 | System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-189-01 | EcoStruxure⢠IT Data Center Expert | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-03 | EVLink WallBox | 2025-06-10T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-02 | Modicon Controllers M241/M251/M258/LMC058/M262 | 2025-06-10T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2024-254-01 | Vijeo Designer | 2024-09-10T00:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-01 | Insight Home and Insight Facility | 2025-06-10T04:00:00.000Z | 2025-06-10T04:00:00.000Z |
| sevd-2020-287-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-10-13T00:00:00.000Z | 2025-06-10T04:00:00.000Z |
| sevd-2025-133-04 | Schneider Electric PrismaSeT Active - Wireless Panel Server | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-133-03 | EcoStruxure Power Build Rapsody | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-133-02 | Wiser Home Automation | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-098-01 | ConneXium Network Manager Software | 2025-04-08T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2023-0010 | Vulnerabilities in SICK Application Processing Unit | 2023-10-09T11:00:00.000Z | 2023-10-09T11:00:00.000Z |
| SCA-2023-0010 | Vulnerabilities in SICK Application Processing Unit | 2023-10-09T11:00:00.000Z | 2023-10-09T11:00:00.000Z |
| sca-2023-0008 | Vulnerability in SICK SIM1012 | 2023-09-29T13:00:00.000Z | 2023-09-29T13:00:00.000Z |
| SCA-2023-0008 | Vulnerability in SICK SIM1012 | 2023-09-29T13:00:00.000Z | 2023-09-29T13:00:00.000Z |
| sca-2023-0009 | Vulnerability in Wibu-Systems CodeMeter Runtime affects multiple SICK products | 2023-09-29T10:00:00.000Z | 2023-09-29T10:00:00.000Z |
| SCA-2023-0009 | Vulnerability in Wibu-Systems CodeMeter Runtime affects multiple SICK products | 2023-09-29T10:00:00.000Z | 2023-09-29T10:00:00.000Z |
| sca-2023-0007 | Vulnerabilities in SICK LMS5xx | 2023-08-25T11:00:00.000Z | 2023-08-25T11:00:00.000Z |
| SCA-2023-0007 | Vulnerabilities in SICK LMS5xx | 2023-08-25T11:00:00.000Z | 2023-08-25T11:00:00.000Z |
| sca-2023-0006 | Vulnerabilities in SICK ICR890-4 | 2023-07-10T13:00:00.000Z | 2023-07-10T13:00:00.000Z |
| SCA-2023-0006 | Vulnerabilities in SICK ICR890-4 | 2023-07-10T13:00:00.000Z | 2023-07-10T13:00:00.000Z |
| sca-2023-0005 | Vulnerabilities in SICK EventCam App | 2023-06-19T11:00:00.000Z | 2023-06-19T11:00:00.000Z |
| SCA-2023-0005 | Vulnerabilities in SICK EventCam App | 2023-06-19T11:00:00.000Z | 2023-06-19T11:00:00.000Z |
| sca-2023-0004 | Vulnerabilities in SICK FTMg | 2023-05-11T13:00:00.000Z | 2023-05-11T13:00:00.000Z |
| SCA-2023-0004 | Vulnerabilities in SICK FTMg | 2023-05-11T13:00:00.000Z | 2023-05-11T13:00:00.000Z |
| sca-2023-0003 | Vulnerability in SICK Flexi Soft and Flexi Classic Gateways | 2023-05-03T13:00:00.000Z | 2023-05-03T13:00:00.000Z |
| SCA-2023-0003 | Vulnerability in SICK Flexi Soft and Flexi Classic Gateways | 2023-05-03T13:00:00.000Z | 2023-05-03T13:00:00.000Z |
| sca-2023-0002 | Use of Telnet in multiple SICK Flexi Soft and Flexi Classic Gateways | 2023-04-11T10:00:00.000Z | 2023-04-11T10:00:00.000Z |
| sca-2023-0001 | Bootloader mode vulnerability in Flexi Soft Gateways v3 | 2023-02-20T14:00:00.000Z | 2023-02-20T14:00:00.000Z |
| sca-2022-0015 | Use of a Broken or Risky Cryptographic Algorithm in SICK RFU6xx RADIO FREQUEN. SENSOR | 2022-12-08T16:00:00.000Z | 2022-12-08T16:00:00.000Z |
| sca-2022-0013 | Password recovery vulnerability affects multiple SICK SIMs | 2022-10-21T13:00:00.000Z | 2022-11-04T14:00:00.000Z |
| sca-2022-0014 | SICK FlexiCompact affected by Denial of Service vulnerability | 2022-10-31T11:00:00.000Z | 2022-10-31T11:00:00.000Z |
| sca-2022-0012 | OpenSSL vulnerability affects multiple SICK SIMs | 2022-08-08T13:00:00.000Z | 2022-08-03T13:00:00.000Z |
| sca-2022-0010 | Vulnerability in SICK Flexi Soft Designer & Safety Designer | 2022-05-16T10:00:00.000Z | 2022-07-19T10:00:00.000Z |
| sca-2022-0011 | Vulnerabilities in SICK Package Analytics | 2022-06-08T15:00:00.000Z | 2022-06-08T15:00:00.000Z |
| sca-2022-0009 | Vulnerability in SICK Flexi Soft PROFINET IO Gateway FX0-GPNT and SICK microScan3 PROFINET | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
| sca-2022-0008 | Vulnerability in SICK Gateways for Flexi Soft, Flexi Compact, SICK EFI Gateway UE4740, SICK microScan3 and outdoorScan3 | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
| sca-2022-0007 | Vulnerabilities in SICK MARSIC300 | 2022-04-21T15:00:00.000Z | 2022-04-21T15:00:00.000Z |
| sca-2022-0006 | Vulnerability in SICK MSC800 | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
| sca-2022-0005 | Vulnerability in SICK Overall Equipment Effectiveness (OEE) | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
| sca-2022-0004 | Microsoft vulnerability affects multiple SICK IPCs with SICK MEAC | 2022-04-11T15:00:00.000Z | 2022-03-31T15:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-485750 | SSA-485750: Multiple Vulnerabilities in SIDIS Prime Before V4.0.800 | 2026-03-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-430425 | SSA-430425: Multiple Vulnerabilities in SINEC Security Monitor before V4.9.0 | 2024-10-08T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-282044 | SSA-282044: DLL Hijacking Vulnerability in Siemens Web Installer used by the Online Software Delivery | 2025-08-12T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-212953 | SSA-212953: Multiple Vulnerabilities in COMOS | 2025-12-09T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-201595 | SSA-201595: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager | 2025-08-14T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-126399 | SSA-126399: Improper Access Control Vulnerability in Heliox EV Chargers | 2026-03-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-082556 | SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 | 2025-06-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-027652 | SSA-027652: Privilege Escalation Vulnerability in SINAMICS Drives | 2025-09-09T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-613116 | SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1 | 2025-08-12T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-355557 | SSA-355557: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.2 | 2025-08-12T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-089022 | SSA-089022: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.3 | 2026-01-28T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-965753 | SSA-965753: Multiple File Parsing Vulnerabilities in Simcenter Femap and Nastran Before V2512 | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-864900 | SSA-864900: Multiple Vulnerabilities in Fortigate NGFW on RUGGEDCOM APE1808 Devices | 2025-05-13T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-783261 | SSA-783261: Denial of Service Vulnerability in Automation License Manager (ALM) Before V5.2 | 2012-12-12T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-674753 | SSA-674753: Denial-of-Service Vulnerability in ET 200 Devices | 2026-01-13T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-625934 | SSA-625934: Improper Access Control Vulnerability in the Webhooks Implementation of Siveillance Video Management Servers | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-599451 | SSA-599451: Multiple Vulnerabilities in SiPass integrated | 2025-10-14T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-507364 | SSA-507364: Heap Based Buffer Overflow Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-445819 | SSA-445819: Out of Bounds Read in PS/IGES Parasolid Translator Component in Solid Edge | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-265688 | SSA-265688: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1 | 2024-04-09T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-130874 | SSA-130874: Buffer Overflow Vulnerability in SCALANCE X Switches | 2012-04-05T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-035571 | SSA-035571: Cross Site Scripting Vulnerability in Polarion Before V2506 | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-978177 | SSA-978177: Vulnerability in Nozomi Guardian/CMC Before 25.4.0 on RUGGEDCOM APE1808 Devices | 2025-08-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-928984 | SSA-928984: Heap-based Buffer Overflow Vulnerability in User Management Component (UMC) | 2024-12-16T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-912274 | SSA-912274: Multiple Vulnerabilities in RUGGEDCOM ROX Before V2.17 | 2025-12-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-858251 | SSA-858251: Authentication Bypass Vulnerabilities in OPC UA | 2025-03-11T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-832273 | SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-698820 | SSA-698820: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.4 on RUGGEDCOM APE1808 Devices | 2024-07-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-693776 | SSA-693776: Multiple Vulnerabilities in Industrial Communication Devices based on SINEC OS before V3.2 | 2025-06-10T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-366067 | SSA-366067: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.1 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21486-1 | Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:14:11Z | 2026-05-05T13:14:11Z |
| suse-su-2026:21483-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:11:23Z | 2026-05-05T13:11:23Z |
| suse-su-2026:21482-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:10:44Z | 2026-05-05T13:10:44Z |
| suse-su-2026:21481-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:10:05Z | 2026-05-05T13:10:05Z |
| suse-su-2026:21480-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:10:05Z | 2026-05-05T13:10:05Z |
| suse-su-2026:21479-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:10:05Z | 2026-05-05T13:10:05Z |
| suse-su-2026:21478-1 | Security update for the Linux Kernel RT (Live Patch 18 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21477-1 | Security update for the Linux Kernel RT (Live Patch 15 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21476-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21475-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21474-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21473-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21472-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21471-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21470-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:20Z | 2026-05-05T13:07:20Z |
| suse-su-2026:21469-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:20Z | 2026-05-05T13:07:20Z |
| suse-su-2026:21468-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:20Z | 2026-05-05T13:07:20Z |
| suse-su-2026:21467-1 | Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T12:51:00Z | 2026-05-05T12:51:00Z |
| suse-su-2026:1692-1 | Security update for xen | 2026-05-05T08:03:58Z | 2026-05-05T08:03:58Z |
| suse-su-2026:1691-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise 15 SP7) | 2026-05-05T07:04:40Z | 2026-05-05T07:04:40Z |
| suse-su-2026:1690-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise 15 SP7) | 2026-05-05T06:34:37Z | 2026-05-05T06:34:37Z |
| suse-su-2026:1689-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise 15 SP7) | 2026-05-05T06:34:34Z | 2026-05-05T06:34:34Z |
| suse-su-2026:1686-1 | Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 15 SP7) | 2026-05-05T06:34:25Z | 2026-05-05T06:34:25Z |
| suse-su-2026:1684-1 | Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-05-05T06:34:20Z | 2026-05-05T06:34:20Z |
| suse-su-2026:1671-2 | Security update for the Linux Kernel | 2026-05-04T09:19:31Z | 2026-05-04T09:19:31Z |
| suse-su-2026:1678-1 | Security update for the Linux Kernel | 2026-05-02T10:27:10Z | 2026-05-02T10:27:10Z |
| suse-su-2026:1677-1 | Security update for the Linux Kernel | 2026-05-02T10:26:10Z | 2026-05-02T10:26:10Z |
| suse-su-2026:21443-1 | Security update for the Linux Kernel | 2026-05-02T10:03:34Z | 2026-05-02T10:03:34Z |
| suse-su-2026:21457-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_20 | 2026-05-02T08:51:37Z | 2026-05-02T08:51:37Z |
| suse-su-2026:21444-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_20 | 2026-05-02T08:51:37Z | 2026-05-02T08:51:37Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:13380 | Important: openssh security update | 2026-05-04T00:00:00Z | 2026-05-04T20:47:27Z |
| alsa-2026:13381 | Important: openssh security update | 2026-05-04T00:00:00Z | 2026-05-04T20:44:48Z |
| alsa-2026:12285 | Important: thunderbird security update | 2026-04-30T00:00:00Z | 2026-05-03T15:58:32Z |
| alsa-2026:12265 | Important: libtiff security update | 2026-04-30T00:00:00Z | 2026-05-01T12:12:41Z |
| alsa-2026:12423 | Important: libcap security update | 2026-04-30T00:00:00Z | 2026-05-01T12:09:19Z |
| alsa-2026:12271 | Important: libtiff security update | 2026-04-30T00:00:00Z | 2026-05-01T06:49:54Z |
| alsa-2026:12441 | Important: libcap security update | 2026-04-30T00:00:00Z | 2026-05-01T06:44:16Z |
| alsa-2026:12310 | Important: sudo security update | 2026-04-30T00:00:00Z | 2026-05-01T06:38:28Z |
| alsa-2026:12176 | Important: fence-agents security update | 2026-04-30T00:00:00Z | 2026-04-30T11:54:21Z |
| alsa-2026:11504 | Important: PackageKit security update | 2026-04-29T00:00:00Z | 2026-04-30T08:54:32Z |
| alsa-2026:8863 | Important: OpenEXR security update | 2026-04-20T00:00:00Z | 2026-04-30T07:37:50Z |
| alsa-2026:8861 | Important: giflib security update | 2026-04-20T00:00:00Z | 2026-04-30T07:36:08Z |
| alsa-2026:8859 | Important: giflib security update | 2026-04-20T00:00:00Z | 2026-04-30T07:34:34Z |
| alsa-2026:9683 | Important: java-1.8.0-openjdk security update | 2026-04-23T00:00:00Z | 2026-04-30T07:32:51Z |
| alsa-2026:10226 | Important: grafana security update | 2026-04-23T00:00:00Z | 2026-04-30T07:30:29Z |
| alsa-2026:10135 | Important: buildah security update | 2026-04-23T00:00:00Z | 2026-04-30T07:28:56Z |
| alsa-2026:9689 | Important: java-21-openjdk security update | 2026-04-23T00:00:00Z | 2026-04-30T07:26:22Z |
| alsa-2026:10711 | Important: python3.12 security update | 2026-04-27T00:00:00Z | 2026-04-30T07:17:03Z |
| alsa-2026:10708 | Important: gdk-pixbuf2 security update | 2026-04-27T00:00:00Z | 2026-04-30T07:14:52Z |
| alsa-2026:11509 | Important: vim security update | 2026-04-29T00:00:00Z | 2026-04-30T07:09:12Z |
| alsa-2026:11692 | Important: xorg-x11-server security update | 2026-04-29T00:00:00Z | 2026-04-30T07:07:01Z |
| alsa-2026:11656 | Important: xorg-x11-server-Xwayland security update | 2026-04-29T00:00:00Z | 2026-04-30T07:03:37Z |
| alsa-2026:11635 | Important: PackageKit security update | 2026-04-29T00:00:00Z | 2026-04-29T12:49:50Z |
| alsa-2026:11412 | Important: yggdrasil-worker-package-manager security update | 2026-04-28T00:00:00Z | 2026-04-29T11:33:24Z |
| alsa-2026:11413 | Important: yggdrasil security update | 2026-04-28T00:00:00Z | 2026-04-29T11:31:50Z |
| alsa-2026:11510 | Important: vim security update | 2026-04-29T00:00:00Z | 2026-04-29T10:04:42Z |
| alsa-2026:11521 | Important: sudo security update | 2026-04-29T00:00:00Z | 2026-04-29T09:51:31Z |
| alsa-2026:11077 | Important: python3 security update | 2026-04-27T00:00:00Z | 2026-04-29T09:05:11Z |
| alsa-2026:10757 | Important: firefox security update | 2026-04-27T00:00:00Z | 2026-04-29T08:58:25Z |
| alsa-2026:10766 | Important: firefox security update | 2026-04-27T00:00:00Z | 2026-04-29T08:56:50Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| hsec-2023-0003 | code injection in xmonad-contrib | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0002 | Improper Verification of Cryptographic Signature | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0001 | Hash flooding vulnerability in aeson | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2021-1672 | Heap-buffer-overflow in blosc_d | 2021-12-12T00:01:29.747137Z | 2026-05-04T14:07:55.244481Z |
| osv-2021-1070 | Heap-buffer-overflow in ZSTD_decompressBlock_internal | 2021-07-29T00:01:10.187569Z | 2026-05-04T14:07:41.491351Z |
| osv-2026-678 | UNKNOWN WRITE in ___interceptor_strncpy | 2026-05-04T00:04:49.943355Z | 2026-05-04T00:04:49.943663Z |
| osv-2024-696 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-07-31T00:03:10.056663Z | 2026-05-02T14:28:43.223547Z |
| osv-2024-641 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-07-14T00:06:37.034414Z | 2026-05-02T14:28:29.616182Z |
| osv-2024-400 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-05-02T00:03:16.309384Z | 2026-05-02T14:28:03.527863Z |
| osv-2024-245 | Security exception in com.github.javaparser.ast.validator.TreeVisitorValidator.accept | 2024-04-08T00:11:03.595756Z | 2026-05-02T14:27:51.488017Z |
| osv-2024-278 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-04-19T00:12:11.684954Z | 2026-05-02T14:21:46.603660Z |
| osv-2021-972 | UNKNOWN READ in void mc_chroma<unsigned short> | 2021-07-13T00:00:16.631711Z | 2026-05-02T14:18:57.926504Z |
| osv-2020-876 | Use-of-uninitialized-value in XCFImageFormat::mergeRGBToRGB | 2020-07-14T22:13:55.541274Z | 2026-05-02T14:18:08.289648Z |
| osv-2025-280 | Heap-buffer-overflow in Assimp::SceneCombiner::CopyScene | 2025-04-15T00:04:03.423453Z | 2026-05-01T14:27:37.508431Z |
| osv-2026-610 | Memcpy-param-overlap in htx_replace_blk_value | 2026-04-22T00:07:53.902461Z | 2026-05-01T14:26:40.032545Z |
| osv-2024-679 | Heap-buffer-overflow in readImage4v2 | 2024-07-25T00:14:34.485446Z | 2026-05-01T14:26:21.860184Z |
| osv-2024-1220 | UNKNOWN READ in Assimp::NDOImporter::InternReadFile | 2024-10-14T00:17:45.088625Z | 2026-05-01T14:23:35.230004Z |
| osv-2023-869 | Heap-buffer-overflow in Assimp::MD5::MD5MeshParser::MD5MeshParser | 2023-09-17T14:01:25.028324Z | 2026-05-01T14:22:59.941483Z |
| osv-2022-834 | Heap-use-after-free in mk_event_timeout_destroy | 2022-09-04T00:00:31.605787Z | 2026-05-01T14:21:42.816649Z |
| osv-2023-800 | Heap-buffer-overflow in XCFImageFormat::loadTileRLE | 2023-09-07T14:00:27.693270Z | 2026-05-01T14:21:27.560882Z |
| osv-2023-55 | Index-out-of-bounds in LibRaw::apply_tiff | 2023-02-07T13:00:07.438565Z | 2026-05-01T14:21:23.722114Z |
| osv-2022-675 | Heap-buffer-overflow in void RDKit::ParseV3000AtomProps<std::__1::vector<std::__1::basic_string_view<cha | 2022-08-06T00:00:51.363676Z | 2026-05-01T14:20:42.587775Z |
| osv-2022-1288 | Stack-buffer-overflow in bool SmilesParseOps::parser::parse_atom_props<std::__1::__wrap_iter<char const*> | 2024-11-04T00:16:22.516312Z | 2026-05-01T14:18:55.851744Z |
| osv-2022-1277 | Heap-use-after-free in mk_event_timeout_destroy | 2023-06-26T14:01:01.876870Z | 2026-05-01T14:18:23.533530Z |
| osv-2022-1018 | Index-out-of-bounds in LibRaw::kodak_radc_load_raw | 2022-10-06T00:02:27.511658Z | 2026-05-01T14:16:50.369145Z |
| osv-2021-948 | Use-of-uninitialized-value in residual_coding | 2021-07-10T00:01:12.890029Z | 2026-05-01T14:16:47.903365Z |
| osv-2021-735 | Use-of-uninitialized-value in decode_CABAC_FL_bypass | 2021-05-08T00:00:14.355747Z | 2026-05-01T14:16:44.338101Z |
| osv-2021-586 | Use-of-uninitialized-value in void intra_prediction_angular<unsigned short> | 2021-03-31T00:01:03.787831Z | 2026-05-01T14:16:43.083869Z |
| osv-2021-525 | Use-of-uninitialized-value in void edge_filtering_chroma_internal<unsigned char> | 2021-03-16T00:00:19.176877Z | 2026-05-01T14:16:42.002269Z |
| osv-2020-868 | Use-of-uninitialized-value in fetchARGB32ToRGBA64PM_avx2 | 2020-07-14T22:13:50.828646Z | 2026-05-01T14:16:15.536333Z |
| osv-2026-659 | Heap-buffer-overflow in ___interceptor_strncpy | 2026-05-01T00:18:13.867231Z | 2026-05-01T00:18:13.867552Z |
| osv-2022-867 | Heap-buffer-overflow in get_utf_8_string | 2022-09-09T00:01:54.157712Z | 2026-04-30T16:25:40.002563Z |
| osv-2026-605 | Heap-buffer-overflow in DwaCompressor_uncompress | 2026-04-21T00:16:42.288653Z | 2026-04-30T14:32:28.224899Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0094 | Improperly masked return value from `table.grow` with Winch compiler backend | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0093 | Heap OOB read in component model UTF-16 to latin1+utf16 string transcoding | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0092 | Panic when transcoding misaligned component model UTF-16 strings | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0091 | Out-of-bounds write or crash when transcoding component model strings | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0090 | Use-after-free bug after cloning `wasmtime::Linker` | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0089 | Host panic when Winch compiler executes `table.fill` | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0088 | Data leakage between pooling allocator instances | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0087 | Wasmtime segfault or unused out-of-sandbox load with `f64x2.splat` operator on Cranelift x86-64 | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0086 | Host data leakage with 64-bit tables and Winch | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0085 | Panic when lifting `flags` component value | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0084 | `logprinter` was removed from crates.io for malicious code | 2026-04-09T12:00:00Z | 2026-04-09T11:23:07Z |
| rustsec-2026-0083 | zantetsu-trainer is unmaintained | 2026-04-07T12:00:00Z | 2026-04-08T08:55:27Z |
| rustsec-2026-0082 | zantetsu-ffi is unmaintained | 2026-04-07T12:00:00Z | 2026-04-08T08:55:27Z |
| rustsec-2026-0081 | `logtrace` was removed from crates.io for malicious code | 2026-04-05T12:00:00Z | 2026-04-05T23:52:05Z |
| rustsec-2026-0080 | Multiple soundness issues in `scaly` safe APIs | 2026-01-19T12:00:00Z | 2026-04-05T05:30:42Z |
| rustsec-2026-0079 | `DynFuture` drop can construct a dangling reference | 2026-01-21T12:00:00Z | 2026-04-05T05:30:42Z |
| rustsec-2023-0125 | Logs AWS credentials when TRACE-level logging is enabled | 2023-04-19T12:00:00Z | 2026-04-02T14:44:59Z |
| rustsec-2025-0160 | `custom-req-on-workers` was removed from crates.io for malicious code | 2025-01-30T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0159 | `sophosfirewall-python` was removed from crates.io for malicious code | 2025-02-15T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0158 | `jfrog_quotes` was removed from crates.io for malicious code | 2025-01-30T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0157 | `statsrelay-protobuf` was removed from crates.io for malicious code | 2025-08-26T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0156 | `tree-sitter-pkl` was removed from crates.io for malicious code | 2025-03-10T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2026-0077 | Incorrect Check of Signer Response Norm During Verification | 2026-03-04T12:00:00Z | 2026-03-27T05:55:06Z |
| rustsec-2026-0076 | Panic in Signature Hint Decoding During Verification | 2026-03-04T12:00:00Z | 2026-03-27T05:55:06Z |
| rustsec-2026-0075 | All-Zero Key Generation on Catastrophic RNG Failure | 2026-03-04T12:00:00Z | 2026-03-27T05:55:06Z |
| rustsec-2026-0074 | Incorrect Output of Incremental Portable SHAKE API | 2026-03-04T12:00:00Z | 2026-03-27T05:55:06Z |
| rustsec-2026-0073 | Panic in Standalone MAC Operations | 2026-03-04T12:00:00Z | 2026-03-27T05:55:06Z |
| rustsec-2025-0155 | `rands` was removed from crates.io for malicious code | 2025-02-10T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0124 | `bit-flags` was removed from crates.io for malicious code | 2023-12-22T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0123 | `hann-rs-service` was removed from crates.io for malicious code | 2023-11-18T12:00:00Z | 2026-03-26T06:26:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-java-2026-22007 | 2026-05-06T14:46:08.064Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2026-22003 | 2026-05-06T14:46:06.719Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2026-21947 | 2026-05-06T14:46:05.330Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2026-21945 | 2026-05-06T14:46:04.020Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2026-21933 | 2026-05-06T14:46:02.521Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2026-21932 | 2026-05-06T14:46:01.161Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2026-21925 | 2026-05-06T14:45:59.793Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2026-20676 | 2026-05-06T14:45:58.323Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2026-20652 | 2026-05-06T14:45:56.875Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2026-20644 | 2026-05-06T14:45:55.295Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2026-20636 | 2026-05-06T14:45:53.825Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2026-20635 | 2026-05-06T14:45:52.367Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2026-20608 | 2026-05-06T14:45:51.105Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2025-7425 | Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr | 2026-05-06T14:45:49.607Z | 2026-05-06T15:10:05.412Z |
| bit-java-2025-7424 | Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes | 2026-05-06T14:45:48.138Z | 2026-05-06T15:10:05.412Z |
| bit-java-2025-61748 | 2026-05-06T14:45:46.797Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2025-6052 | Glib: integer overflow in g_string_maybe_expand() leading to potential buffer overflow in glib gstring | 2026-05-06T14:45:45.337Z | 2026-05-06T15:10:05.412Z |
| bit-java-2025-6021 | Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2 | 2026-05-06T14:45:43.734Z | 2026-05-06T15:10:05.412Z |
| bit-java-2025-53066 | 2026-05-06T14:45:42.187Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2025-53057 | 2026-05-06T14:45:40.894Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2025-50106 | 2026-05-06T14:45:39.505Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2025-50063 | 2026-05-06T14:45:38.294Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2025-50059 | 2026-05-06T14:45:36.983Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2025-47219 | 2026-05-06T14:45:35.623Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2025-43457 | 2026-05-06T14:45:34.262Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2025-32415 | 2026-05-06T14:45:32.966Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2025-32414 | 2026-05-06T14:45:31.642Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2025-30761 | 2026-05-06T14:45:30.179Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2025-30754 | 2026-05-06T14:45:28.769Z | 2026-05-06T15:10:05.412Z | |
| bit-java-2025-30752 | 2026-05-06T14:45:27.254Z | 2026-05-06T15:10:05.412Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-bb70412 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-22T00:41:59.291167Z | 2026-04-21T09:28:36Z |
| cleanstart-2026-lf33811 | In libexpat before 2 | 2026-04-22T00:40:28.653558Z | 2026-04-21T09:26:32Z |
| cleanstart-2026-lt06489 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-22T00:37:51.095485Z | 2026-04-21T07:42:07Z |
| cleanstart-2026-af45008 | When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers | 2026-04-21T00:40:00.550928Z | 2026-04-20T07:28:24Z |
| cleanstart-2026-ad31975 | Security fixes for ghsa-72hv-8253-57qq, ghsa-pwqr-wmgm-9rr8, ghsa-w9fj-cfpg-grvv applied in versions: 26.5.6-r3 | 2026-04-21T00:36:59.139031Z | 2026-04-20T07:28:24Z |
| cleanstart-2026-dy53885 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-21T00:37:09.087233Z | 2026-04-20T05:52:44Z |
| cleanstart-2026-dk70097 | In libexpat before 2 | 2026-04-21T00:38:59.570153Z | 2026-04-20T05:52:44Z |
| cleanstart-2026-cp08056 | In libexpat before 2 | 2026-04-21T00:38:29.529453Z | 2026-04-20T05:52:44Z |
| cleanstart-2026-mw34654 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-18T00:36:20.394488Z | 2026-04-17T12:37:31Z |
| cleanstart-2026-js27352 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-18T00:36:20.590981Z | 2026-04-17T12:37:31Z |
| cleanstart-2026-bc44092 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-18T00:36:20.226066Z | 2026-04-17T12:37:31Z |
| cleanstart-2026-kf53276 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-17T00:38:05.902586Z | 2026-04-16T05:00:01Z |
| cleanstart-2026-gw37659 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-17T00:38:05.744772Z | 2026-04-16T05:00:01Z |
| cleanstart-2026-co09549 | In libexpat before 2 | 2026-04-17T00:39:07.237615Z | 2026-04-16T05:00:01Z |
| cleanstart-2026-ak18460 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-17T00:38:05.524563Z | 2026-04-16T05:00:01Z |
| cleanstart-2026-mn70386 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-16T00:37:18.538311Z | 2026-04-15T10:48:12Z |
| cleanstart-2026-io64153 | In libexpat before 2 | 2026-04-16T00:38:53.556040Z | 2026-04-15T10:48:12Z |
| cleanstart-2026-hh39661 | In libexpat before 2 | 2026-04-16T00:38:49.545664Z | 2026-04-15T10:48:12Z |
| cleanstart-2026-ez90321 | Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper s... | 2026-04-16T00:40:49.655378Z | 2026-04-15T10:23:29Z |
| cleanstart-2026-cf62516 | Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper s... | 2026-04-16T00:42:51.354420Z | 2026-04-15T10:18:15Z |
| cleanstart-2026-gn18755 | gRPC-Go is the Go language implementation of gRPC | 2026-04-16T00:38:55.766955Z | 2026-04-15T10:06:08Z |
| cleanstart-2026-bh97849 | gRPC-Go is the Go language implementation of gRPC | 2026-04-16T00:46:20.819037Z | 2026-04-15T10:00:00Z |
| cleanstart-2026-an01004 | filippo | 2026-04-16T00:44:50.314232Z | 2026-04-15T09:36:13Z |
| cleanstart-2026-jz43336 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-16T00:45:49.932786Z | 2026-04-15T09:24:00Z |
| cleanstart-2026-iy92636 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-04-16T00:46:49.187187Z | 2026-04-15T09:17:00Z |
| cleanstart-2026-ks09647 | Axios is a promise based HTTP client for the browser and Node | 2026-04-16T00:55:51.498867Z | 2026-04-15T07:43:47Z |
| cleanstart-2026-dr81473 | HashiCorpās go-getter library up to v1 | 2026-04-16T00:55:21.838513Z | 2026-04-15T06:15:46Z |
| cleanstart-2026-cr55131 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-16T01:01:17.387205Z | 2026-04-15T04:54:42Z |
| cleanstart-2026-fb07695 | When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint | 2026-04-15T00:45:38.848496Z | 2026-04-14T11:38:13Z |
| cleanstart-2026-mp87020 | If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources | 2026-04-15T00:39:08.262212Z | 2026-04-14T11:37:13Z |
| ID | Description | Updated |
|---|---|---|
| ts-2023-001 | TS-2023-001 | 2023-01-17T00:00 |
| ts-2022-005 | TS-2022-005 | 2022-11-21T00:00 |
| ts-2022-004 | TS-2022-004 | 2022-11-21T00:00 |
| ts-2022-003 | TS-2022-003 | 2022-06-14T00:00 |
| ts-2022-002 | TS-2022-002 | 2022-05-11T00:00 |
| ts-2022-001 | TS-2022-001 | 2022-02-07T00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-ale-001 | [Mà J] Vulnérabilité dans les produits Ivanti | 2025-01-09T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| CERTFR-2025-ALE-002 | [Mà J] Vulnérabilité dans les produits Fortinet | 2025-05-07T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| CERTFR-2025-ALE-001 | [Mà J] Vulnérabilité dans les produits Ivanti | 2025-01-09T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| certfr-2024-ale-014 | [Mà J] Multiples vulnérabilités dans Fortinet FortiManager | 2024-10-30T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| certfr-2024-ale-013 | Exploitations de vulnƩrabilitƩs dans Ivanti Cloud Services Appliance (CSA) | 2025-03-31T00:00:00.000000 | 2024-10-25T00:00:00.000000 |
| CERTFR-2024-ALE-014 | [Mà J] Multiples vulnérabilités dans Fortinet FortiManager | 2024-10-30T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| CERTFR-2024-ALE-013 | Exploitations de vulnƩrabilitƩs dans Ivanti Cloud Services Appliance (CSA) | 2025-03-31T00:00:00.000000 | 2024-10-25T00:00:00.000000 |
| certfr-2024-ale-015 | [Mà J] Multiples vulnérabilités sur l'interface d'administration des équipements Palo Alto Networks | 2024-11-15T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| CERTFR-2024-ALE-015 | [Mà J] Multiples vulnérabilités sur l'interface d'administration des équipements Palo Alto Networks | 2024-11-15T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| certfr-2024-ale-012 | [Mà J] Vulnérabilités affectant OpenPrinting CUPS | 2024-09-27T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-011 | VulnƩrabilitƩ dans SonicWall | 2024-09-10T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| CERTFR-2024-ALE-012 | [Mà J] Vulnérabilités affectant OpenPrinting CUPS | 2024-09-27T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| CERTFR-2024-ALE-011 | VulnƩrabilitƩ dans SonicWall | 2024-09-10T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-010 | Multiples vulnƩrabilitƩs dans Roundcube | 2024-08-09T00:00:00.000000 | 2024-10-07T00:00:00.000000 |
| certfr-2024-ale-009 | VulnƩrabilitƩ dans OpenSSH | 2024-07-01T00:00:00.000000 | 2024-07-03T00:00:00.000000 |
| CERTFR-2024-ALE-010 | Multiples vulnƩrabilitƩs dans Roundcube | 2024-08-09T00:00:00.000000 | 2024-10-07T00:00:00.000000 |
| CERTFR-2024-ALE-009 | VulnƩrabilitƩ dans OpenSSH | 2024-07-01T00:00:00.000000 | 2024-07-03T00:00:00.000000 |
| certfr-2024-ale-008 | [Mà J] Vulnérabilité dans les produits Check Point | 2024-05-30T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-007 | Multiples vulnƩrabilitƩs dans les produits Cisco | 2024-04-25T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-006 | [Mà J] Vulnérabilité dans Palo Alto Networks GlobalProtect | 2024-04-12T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-004 | [Mà J] Vulnérabilité dans Fortinet FortiOS | 2024-02-09T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-008 | [Mà J] Vulnérabilité dans les produits Check Point | 2024-05-30T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-007 | Multiples vulnƩrabilitƩs dans les produits Cisco | 2024-04-25T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-006 | [Mà J] Vulnérabilité dans Palo Alto Networks GlobalProtect | 2024-04-12T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-004 | [Mà J] Vulnérabilité dans Fortinet FortiOS | 2024-02-09T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-005 | [Mà J] Vulnérabilité dans Microsoft Outlook | 2024-02-15T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-003 | [MĆ J] Incident affectant les solutions AnyDesk | 2024-02-05T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-001 | [Mà J] Multiples vulnérabilités dans Ivanti Connect Secure et Policy Secure Gateways | 2024-01-11T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| CERTFR-2024-ALE-005 | [Mà J] Vulnérabilité dans Microsoft Outlook | 2024-02-15T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| CERTFR-2024-ALE-003 | [MĆ J] Incident affectant les solutions AnyDesk | 2024-02-05T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0522 | Multiples vulnƩrabilitƩs dans le noyau Linux d'Ubuntu | 2026-04-30T00:00:00.000000 | 2026-04-30T00:00:00.000000 |
| certfr-2026-avi-0521 | Multiples vulnƩrabilitƩs dans le noyau Linux de Red Hat | 2026-04-30T00:00:00.000000 | 2026-04-30T00:00:00.000000 |
| certfr-2026-avi-0520 | Multiples vulnƩrabilitƩs dans le noyau Linux de SUSE | 2026-04-30T00:00:00.000000 | 2026-04-30T00:00:00.000000 |
| certfr-2026-avi-0519 | Multiples vulnƩrabilitƩs dans Microsoft Azure Linux | 2026-04-30T00:00:00.000000 | 2026-04-30T00:00:00.000000 |
| certfr-2026-avi-0518 | Multiples vulnƩrabilitƩs dans Wireshark | 2026-04-30T00:00:00.000000 | 2026-04-30T00:00:00.000000 |
| certfr-2026-avi-0517 | Multiples vulnƩrabilitƩs dans les produits SonicWall | 2026-04-30T00:00:00.000000 | 2026-04-30T00:00:00.000000 |
| certfr-2026-avi-0516 | VulnƩrabilitƩ dans les produits Netgate | 2026-04-30T00:00:00.000000 | 2026-04-30T00:00:00.000000 |
| certfr-2026-avi-0515 | Multiples vulnƩrabilitƩs dans MISP | 2026-04-30T00:00:00.000000 | 2026-04-30T00:00:00.000000 |
| certfr-2026-avi-0514 | Multiples vulnƩrabilitƩs dans Curl | 2026-04-29T00:00:00.000000 | 2026-04-29T00:00:00.000000 |
| certfr-2026-avi-0513 | Multiples vulnƩrabilitƩs dans les produits Microsoft | 2026-04-29T00:00:00.000000 | 2026-04-29T00:00:00.000000 |
| certfr-2026-avi-0512 | VulnƩrabilitƩ dans Microsoft Edge | 2026-04-29T00:00:00.000000 | 2026-04-29T00:00:00.000000 |
| certfr-2026-avi-0511 | VulnƩrabilitƩ dans Elastic Package Registry | 2026-04-29T00:00:00.000000 | 2026-04-29T00:00:00.000000 |
| certfr-2026-avi-0510 | Multiples vulnƩrabilitƩs dans Citrix XenServer | 2026-04-29T00:00:00.000000 | 2026-04-29T00:00:00.000000 |
| certfr-2026-avi-0509 | Multiples vulnƩrabilitƩs dans Xen | 2026-04-29T00:00:00.000000 | 2026-04-29T00:00:00.000000 |
| certfr-2026-avi-0508 | Multiples vulnƩrabilitƩs dans Moodle | 2026-04-29T00:00:00.000000 | 2026-04-29T00:00:00.000000 |
| certfr-2026-avi-0507 | Multiples vulnƩrabilitƩs dans les produits Mozilla | 2026-04-29T00:00:00.000000 | 2026-04-29T00:00:00.000000 |
| certfr-2026-avi-0506 | Multiples vulnƩrabilitƩs dans Google Chrome | 2026-04-29T00:00:00.000000 | 2026-04-29T00:00:00.000000 |
| certfr-2026-avi-0505 | VulnƩrabilitƩ dans Python | 2026-04-28T00:00:00.000000 | 2026-04-28T00:00:00.000000 |
| certfr-2026-avi-0504 | Multiples vulnƩrabilitƩs dans Spring | 2026-04-28T00:00:00.000000 | 2026-04-28T00:00:00.000000 |
| certfr-2026-avi-0487 | Multiples vulnƩrabilitƩs dans Google Chrome | 2026-04-23T00:00:00.000000 | 2026-04-28T00:00:00.000000 |
| certfr-2026-avi-0503 | Multiples vulnƩrabilitƩs dans les produits Microsoft | 2026-04-27T00:00:00.000000 | 2026-04-27T00:00:00.000000 |
| certfr-2026-avi-0502 | Multiples vulnƩrabilitƩs dans Microsoft Edge | 2026-04-27T00:00:00.000000 | 2026-04-27T00:00:00.000000 |
| certfr-2026-avi-0501 | Multiples vulnƩrabilitƩs dans les produits FoxIT | 2026-04-27T00:00:00.000000 | 2026-04-27T00:00:00.000000 |
| certfr-2026-avi-0500 | Multiples vulnƩrabilitƩs dans VMware Tanzu | 2026-04-27T00:00:00.000000 | 2026-04-27T00:00:00.000000 |
| certfr-2026-avi-0499 | Multiples vulnƩrabilitƩs dans les produits Moxa | 2026-04-27T00:00:00.000000 | 2026-04-27T00:00:00.000000 |
| certfr-2026-avi-0498 | Multiples vulnƩrabilitƩs dans Zabbix Agent2 | 2026-04-27T00:00:00.000000 | 2026-04-27T00:00:00.000000 |
| certfr-2026-avi-0497 | Multiples vulnƩrabilitƩs dans le noyau Linux de SUSE | 2026-04-24T00:00:00.000000 | 2026-04-24T00:00:00.000000 |
| certfr-2026-avi-0496 | Multiples vulnƩrabilitƩs dans le noyau Linux de Red Hat | 2026-04-24T00:00:00.000000 | 2026-04-24T00:00:00.000000 |
| certfr-2026-avi-0495 | Multiples vulnƩrabilitƩs dans le noyau Linux d'Ubuntu | 2026-04-24T00:00:00.000000 | 2026-04-24T00:00:00.000000 |
| certfr-2026-avi-0494 | VulnƩrabilitƩ dans les produits Microsoft | 2026-04-24T00:00:00.000000 | 2026-04-24T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-009406 | Security information for Hitachi Disk Array Systems | 2026-03-31T15:53+09:00 | 2026-03-31T15:53+09:00 |
| jvndb-2026-009147 | Vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2026-03-27T18:18+09:00 | 2026-03-27T18:18+09:00 |
| jvndb-2026-009148 | Open Redirect Vulnerability in Hitachi Ops Center Administrator | 2026-03-27T18:17+09:00 | 2026-03-27T18:17+09:00 |
| jvndb-2026-000047 | Multiple vulnerabilities in baserCMS | 2026-03-27T18:00+09:00 | 2026-03-27T18:00+09:00 |
| jvndb-2026-000045 | WordPress Plugin "OpenStreetMap" vulnerable to cross-site scripting | 2026-03-27T17:34+09:00 | 2026-03-27T17:34+09:00 |
| jvndb-2026-000046 | Multiple vulnerabilities in BUFFALO Wi-Fi routers | 2026-03-27T17:18+09:00 | 2026-03-27T17:18+09:00 |
| jvndb-2026-000044 | Multiple vulnerabilities in the installer of RATOC RAID Monitoring Manager for Windows | 2026-03-26T17:41+09:00 | 2026-03-26T17:41+09:00 |
| jvndb-2026-000042 | Digital Photo Frame GH-WDF10A vulnerable to improper access restriction | 2026-03-26T17:41+09:00 | 2026-03-26T17:41+09:00 |
| jvndb-2026-000043 | SHARP routers missing authentication for some web APIs | 2026-03-25T18:41+09:00 | 2026-03-25T18:41+09:00 |
| jvndb-2026-000040 | Installer of OM Workspace (Windows Edition) may insecurely load Dynamic Link Libraries | 2026-03-25T18:13+09:00 | 2026-03-25T18:13+09:00 |
| jvndb-2026-000041 | SANYO DENKI SANUPS SOFTWARE registers Windows services with unquoted file paths | 2026-03-25T17:58+09:00 | 2026-03-25T17:58+09:00 |
| jvndb-2026-007524 | Vulnerability in Hitachi Command Suite | 2026-03-17T16:42+09:00 | 2026-03-17T16:42+09:00 |
| jvndb-2026-000038 | Installer for IBM Trusteer Rapport may insecurely load Dynamic Link Libraries | 2026-03-17T14:57+09:00 | 2026-03-17T14:57+09:00 |
| jvndb-2026-000039 | Missing authorization in the OpenAI thread/message API endpoints of GROWI | 2026-03-16T17:18+09:00 | 2026-03-16T17:18+09:00 |
| jvndb-2026-000037 | OpenLiteSpeed and LSWS Enterprise vulnerable to OS command injection | 2026-03-16T17:18+09:00 | 2026-03-16T17:18+09:00 |
| jvndb-2026-006887 | Multiple vulnerabilities in Micro Research MR-GM5L-S1 and MR-GM5A-L1 | 2026-03-12T17:22+09:00 | 2026-03-12T17:22+09:00 |
| jvndb-2026-000036 | Improper file access permission settings in multiple Digital Arts products | 2026-03-09T14:57+09:00 | 2026-03-09T16:23+09:00 |
| jvndb-2026-000035 | Installer for Qsee Client may insecurely load Dynamic Link Libraries | 2026-03-09T14:57+09:00 | 2026-03-09T14:57+09:00 |
| jvndb-2026-006102 | Security issues in ESC/POS | 2026-03-06T10:31+09:00 | 2026-03-06T10:31+09:00 |
| jvndb-2026-000034 | django-allauth vulnerable to open redirect | 2026-03-05T12:36+09:00 | 2026-03-05T12:36+09:00 |
| jvndb-2026-000033 | EC-CUBE vulnerable to multi-factor authentication bypass | 2026-03-05T12:36+09:00 | 2026-03-05T12:36+09:00 |
| jvndb-2026-000032 | Multiple vulnerabilities in Dell UPS Multi-UPS Management Console (MUMC) | 2026-03-04T12:20+09:00 | 2026-03-04T12:20+09:00 |
| jvndb-2026-005746 | Multiple vulnerabilities in Trend Micro Endpoint security products for enterprises (February 2026) | 2026-03-04T10:40+09:00 | 2026-03-04T10:40+09:00 |
| jvndb-2026-005744 | Canon IJ Scan Utility registers Windows services with unquoted file paths | 2026-03-04T10:40+09:00 | 2026-03-04T10:40+09:00 |
| jvndb-2026-000030 | IM-LogicDesigner module of intra-mart Accel Platform vulnerable to untrusted data deserialization | 2026-02-27T15:41+09:00 | 2026-03-03T10:06+09:00 |
| jvndb-2026-005259 | Out-of-bounds write vulnerability in Fujitsu BIOS Driver (fbiosdrv.sys) | 2026-03-02T11:46+09:00 | 2026-03-02T11:46+09:00 |
| jvndb-2026-000031 | Improper file access permission settings in the installers for multiple Soliton Systems products | 2026-02-27T15:41+09:00 | 2026-02-27T15:41+09:00 |
| jvndb-2026-000029 | Multiple vulnerabilities in the installer of FinalCode Client | 2026-02-26T14:24+09:00 | 2026-02-26T14:24+09:00 |
| jvndb-2026-004811 | Vulnerability in Hitachi Configuration Manager and Hitachi Ops Center API Configuration Manager | 2026-02-26T11:02+09:00 | 2026-02-26T11:02+09:00 |
| jvndb-2026-004810 | Vulnerability in Hitachi Configuration Manager and Hitachi Ops Center API Configuration Manager | 2026-02-26T11:02+09:00 | 2026-02-26T11:02+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-18818 | TOTOLINK A3300R houråę°å½ä»¤ę³Øå „ę¼ę“ | 2026-04-24 | 2026-04-29 |
| cnvd-2026-18817 | TOTOLINK A3300R modeåę°å½ä»¤ę³Øå „ę¼ę“ | 2026-04-24 | 2026-04-29 |
| cnvd-2026-18815 | TOTOLINK A3300R weekåę°å½ä»¤ę³Øå „ę¼ę“ | 2026-04-24 | 2026-04-29 |
| cnvd-2026-18803 | TOTOLINK A3300R stunServerAddråę°ęä½ē³»ē»å½ä»¤ę³Øå „ę¼ę“ | 2026-04-24 | 2026-04-29 |
| cnvd-2026-18816 | TOTOLINK A3300R recHouråę°å½ä»¤ę³Øå „ę¼ę“ | 2026-04-24 | 2026-04-28 |
| cnvd-2026-18814 | TOTOLINK A3300R useråę°å½ä»¤ę³Øå „ę¼ę“ | 2026-04-24 | 2026-04-28 |
| cnvd-2026-18813 | TOTOLINK A3300R intervalåę°å½ä»¤ę³Øå „ę¼ę“ | 2026-04-24 | 2026-04-28 |
| cnvd-2026-18809 | TOTOLINK A3300R informEnableåę°å½ä»¤ę³Øå „ę¼ę“ | 2026-04-24 | 2026-04-28 |
| cnvd-2026-18808 | TOTOLINK A3300R stunEnableåę°å½ä»¤ę³Øå „ę¼ę“ | 2026-04-24 | 2026-04-28 |
| cnvd-2026-18807 | TOTOLINK A3300R stun_useråę°å½ä»¤ę³Øå „ę¼ę“ | 2026-04-24 | 2026-04-28 |
| cnvd-2026-18806 | TOTOLINK A3300R stunMinAliveåę°å½ä»¤ę³Øå „ę¼ę“ | 2026-04-24 | 2026-04-28 |
| cnvd-2026-18805 | TOTOLINK A3300R stunMaxAliveåę°ęä½ē³»ē»å½ä»¤ę³Øå „ę¼ę“ | 2026-04-24 | 2026-04-28 |
| cnvd-2026-18802 | Huawei HarmonyOS设å¤å®å Øē®”ē樔åē«äŗę”ä»¶ę¼ę“ | 2026-03-09 | 2026-04-28 |
| cnvd-2026-18801 | Huawei HarmonyOSēŖå£ęØ”ååééę¾ę¼ę“ | 2026-03-09 | 2026-04-28 |
| cnvd-2026-18800 | Huawei HarmonyOSęå°ęØ”åē«äŗę”ä»¶ę¼ę“ļ¼CNVD-2026-18800ļ¼ | 2026-03-09 | 2026-04-28 |
| cnvd-2026-18799 | Huawei HarmonyOSę«ę樔åē¼å²åŗęŗ¢åŗę¼ę“ | 2026-03-12 | 2026-04-28 |
| cnvd-2026-18798 | Huawei HarmonyOSęå°ęØ”åē«äŗę”ä»¶ę¼ę“ | 2026-03-12 | 2026-04-28 |
| cnvd-2026-18797 | Huawei HarmonyOSå±å¹ē®”ē樔åå åé误å¼ēØę¼ę“ | 2026-04-14 | 2026-04-28 |
| cnvd-2026-18796 | Huawei HarmonyOSéē„ęå”ē«äŗę”ä»¶ę¼ę“ | 2026-04-14 | 2026-04-28 |
| cnvd-2026-18795 | Huawei HarmonyOSäŗä»¶éē„樔åē«äŗę”ä»¶ę¼ę“ | 2026-04-14 | 2026-04-28 |
| cnvd-2026-18794 | Google Chromeå®å Øē»čæę¼ę“ļ¼CNVD-2026-18794ļ¼ | 2026-03-04 | 2026-04-28 |
| cnvd-2026-18793 | Google Chromeå®å Øē»čæę¼ę“ļ¼CNVD-2026-18793ļ¼ | 2026-03-04 | 2026-04-28 |
| cnvd-2026-18792 | Google Chromeå®å Øē»čæę¼ę“ļ¼CNVD-2026-18792ļ¼ | 2026-03-04 | 2026-04-28 |
| cnvd-2026-18791 | Google Chrome代ē ę§č”ę¼ę“ļ¼CNVD-2026-18791ļ¼ | 2026-03-04 | 2026-04-28 |
| cnvd-2026-18790 | Google Androidęéē»čæę¼ę“ | 2026-03-06 | 2026-04-28 |
| cnvd-2026-18789 | Google AndroidååØęŖęę¼ę“ļ¼CNVD-2026-18789ļ¼ | 2026-03-06 | 2026-04-28 |
| cnvd-2026-18788 | Google Androidč¶ēåå „ę¼ę“ļ¼CNVD-2026-18788ļ¼ | 2026-03-06 | 2026-04-28 |
| cnvd-2026-18787 | Google Androidäæ”ęÆę³é²ę¼ę“ļ¼CNVD-2026-18787ļ¼ | 2026-03-06 | 2026-04-28 |
| cnvd-2026-18786 | Google Androidęéęåę¼ę“ļ¼CNVD-2026-18786ļ¼ | 2026-03-06 | 2026-04-28 |
| cnvd-2026-18785 | Google Androidęéē®”ēäøå½ę¼ę“ | 2026-03-06 | 2026-04-28 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01814 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммного Š¾Š±ŠµŃŠæŠµŃŠµŠ½ŠøŃ Microsoft ACI Confidential Containers, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń Ń Ń⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01813 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммного Š¾Š±ŠµŃŠæŠµŃŠµŠ½ŠøŃ Azure IoT Explorer, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń ŠæŃŠøŠ²Ńзкой Šŗ Š¾ŃŠŗŃŃŃŃŠ¼ ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01812 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŠ¾ŃŃŠ¾Š²Š¾Š³Š¾ ŃŠµŃŠ²ŠµŃŠ° Microsoft Exchange Server, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń Š¾ŃŠøŠ±ŠŗŠ°Š¼Šø ŠæŃŠµŠ“ŃŃŠ°Š²Š»ŠµŠ½Šøā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01811 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ»ŃŠ¶Š±Ń Š°Š½Š°Š»ŠøŃŠøŠŗŠø ГаннŃŃ Azure HDInsights, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń Š½ŠµŠæŃŠøŠ½ŃŃŠøŠµŠ¼ Š¼ŠµŃ ŠæŠ¾ Š·Š°ŃŠøŃ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01810 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠµŠ“Š°ŠŗŃŠ¾Ńа ŃŠ»ŠµŠŗŃŃŠ¾Š½Š½ŃŃ ŃŠ°Š±Š»ŠøŃ Microsoft Excel ŠæŠ°ŠŗŠµŃŠ¾Š² ŠæŃŠ¾Š³Ńамм Microsoft Office⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01809 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ»ŃŠ¶Š±Ń Ń ŃŠ°Š½ŠøŠ»ŠøŃа ГаннŃŃ Windows Storage Services Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01808 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠµŠ°Š»ŠøŠ·Š°ŃŠøŠø ŠæŃŠ¾Ńокола NTLM Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01807 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠøŃŃŠµŠ¼Ń Š°ŠæŠæŠ°ŃŠ°Ńной виŃŃŃŠ°Š»ŠøŠ·Š°ŃŠøŠø Hyper-V Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Windows, позволŃ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01806 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¼ŠµŃ Š°Š½ŠøŠ·Š¼Š° CCF (Cluster Client Failover) Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01805 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š“ŃŠ°Š¹Š²ŠµŃа HTTP.sys Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŠæŠ¾Š²ŃŃŠøŃŃ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01804 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ“ŃŠ° Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŠæŠ¾Š²ŃŃŠøŃŃ ŃŠ²Š¾Šø ŠæŃŠøŠ²ŠøŠ»ŠµŠ³ŠøŠø | 16.02.2026 | 16.02.2026 |
| bdu:2026-01803 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š“ŃŠ°Š¹Š²ŠµŃа WinSock Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŠæŠ¾Š²ŃŃŠøŃŃ ā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01802 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ“ŃŠ° Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŠæŠ¾Š²ŃŃŠøŃŃ ŃŠ²Š¾Šø ŠæŃŠøŠ²ŠøŠ»ŠµŠ³ŠøŠø | 16.02.2026 | 16.02.2026 |
| bdu:2026-01801 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š“ŃŠ°Š¹Š²ŠµŃа HTTP.sys Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŠæŠ¾Š²ŃŃŠøŃŃ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01800 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ“ŃŠ° Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŠæŠ¾Š²ŃŃŠøŃŃ ŃŠ²Š¾Šø ŠæŃŠøŠ²ŠøŠ»ŠµŠ³ŠøŠø | 16.02.2026 | 16.02.2026 |
| bdu:2026-01799 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ“ŃŠ° Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŃŠ°ŃŠŗŃŃŃŃ Š·Š°ŃŠøŃаемŃŃ Šøā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01798 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³ŃŠ°Š¼Š¼Ń Š“Š»Ń ŃŠøŃŃŠ¾Š²Š°Š½ŠøŃ ŠøŠ½ŃŠ¾ŃŠ¼Š°ŃŠøŠø Šø ŃŠ¾Š·Š“Š°Š½ŠøŃ ŃŠ»ŠµŠŗŃŃŠ¾Š½Š½ŃŃ ŃŠøŃŃŠ¾Š²ŃŃ ŠæŠ¾Š“ŠæŠøŃŠµŠ¹ G⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01797 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŃŠ½ŠŗŃŠøŠø _bfd_elf_slurp_version_tables() ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° bfd/elf.c ŠæŃŠ¾Š³Ńаммного ŃŃŠµŠ“⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01796 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° libbfd.c ŠæŃŠ¾Š³Ńаммного ŃŃŠµŠ“ŃŃŠ²Š° ŃŠ°Š·ŃŠ°Š±Š¾ŃŠŗŠø GNU Binutils, позволŃŃŃŠ°Ń⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01795 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммного ŃŃŠµŠ“ŃŃŠ²Š° ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ ŠŗŠ¾Š½ŠµŃŠ½Ńми ŃŠ¾Ńками Ivanti Endpoint Manager, ŃŠ²ā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01794 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŃŠ½ŠŗŃŠøŠø usbg_make_tpg() Š¼Š¾Š“ŃŠ»Ń drivers/usb/gadget/function/f_tcm.c Š“ŃŠ°Š¹Š²ŠµŃа га⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01792 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммного ŃŃŠµŠ“ŃŃŠ²Š° Š»Š¾ŠŗŠ°Š»ŃŠ½Š¾Š¹ инŃŃŠ°ŃŃŃŃŠŗŃŃŃŃ Azure Local, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń Š¾ŃŠøŠ±ŠŗŠ°ā¦ | 13.02.2026 | 16.02.2026 |
| bdu:2026-01727 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŃŠ½ŠŗŃŠøŠø Š¾ŃŠµŠ½ŠŗŠø ŠøŠ·Š±ŠøŃŠ°ŃŠµŠ»ŃŠ½Š¾ŃŃŠø ŃŠ°ŃŃŠøŃŠµŠ½ŠøŃ Intarray ŃŠøŃŃŠµŠ¼Ń ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ Š±Š°Š·Š°Š¼Šø Г⦠| 11.02.2026 | 16.02.2026 |
| bdu:2026-01726 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŃŠ½ŠŗŃŠøŠø Š¾Š±ŃŠ°Š±Š¾ŃŠŗŠø ŃŠøŠæŠ¾Š² ГаннŃŃ oidvector ŃŠøŃŃŠµŠ¼Ń ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ Š±Š°Š·Š°Š¼Šø ГаннŃŃ Post⦠| 11.02.2026 | 16.02.2026 |
| bdu:2026-01724 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° pg_trgm ŃŠøŃŃŠµŠ¼Ń ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ Š±Š°Š·Š°Š¼Šø ГаннŃŃ PostgreSQL, позволŃŃŃŠ°Ń на⦠| 11.02.2026 | 16.02.2026 |
| bdu:2026-01723 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠøŃŃŠµŠ¼Ń ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ Š±Š°Š·Š°Š¼Šø ГаннŃŃ PostgreSQL, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń Š½ŠµŠ²ŠµŃŠ½Ńм ŠøŠ½Š“ŠµŠŗŃŠøŃован⦠| 11.02.2026 | 16.02.2026 |
| bdu:2026-01722 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° pgcrypto ŃŠøŃŃŠµŠ¼Ń ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ Š±Š°Š·Š°Š¼Šø ГаннŃŃ PostgreSQL, позволŃŃŃŠ°Ń н⦠| 11.02.2026 | 16.02.2026 |
| bdu:2026-01017 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ“ŃŠ° Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Linux, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń Š²ŃŠæŠ¾Š»Š½ŠøŃŃ ŠæŃŠ¾ŠøŠ·Š²Š¾Š»ŃŠ½ŃŠ¹ коГ | 30.01.2026 | 16.02.2026 |
| bdu:2025-15831 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммного Š¾Š±ŠµŃŠæŠµŃŠµŠ½ŠøŃ Š“Š»Ń Š½Š°ŃŃŃŠ¾Š¹ŠŗŠø Š±ŠµŠ·Š¾ŠæŠ°ŃŠ½Š¾ŃŃŠø astra-safepolicy, ŃŠ²Ńзанна⦠| 15.12.2025 | 16.02.2026 |
| bdu:2025-15830 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° net ŃŠ“ŃŠ° Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Linux, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń Š²ŃŠ·Š²Š°ŃŃ⦠| 15.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202001-0832 | A Buffer Overflow vulnerability exists in the Message Server service _MsJ2EE_AddStatistic⦠| 2024-07-23T22:37:43.319000Z |
| var-201208-0222 | Multiple stack-based buffer overflows in msg_server.exe in SAP NetWeaver ABAP 7.x allow r⦠| 2024-07-23T22:37:43.393000Z |
| var-202108-1148 | An access issue was addressed with improved access restrictions. This issue is fixed in m⦠| 2024-07-23T22:36:01.656000Z |
| var-200202-0006 | Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause⦠| 2024-07-23T22:34:48.127000Z |
| var-202007-0395 | Advantech iView, versions 5.6 and prior, contains multiple SQL injection vulnerabilities ⦠| 2024-07-23T22:33:57.481000Z |
| var-201805-1147 | WPLSoft in Delta Electronics versions 2.45.0 and prior utilizes a fixed length heap buffe⦠| 2024-07-23T22:32:10.966000Z |
| var-201902-0647 | LCDS Laquis SCADA prior to version 4.1.0.4150 allows execution of script code by opening ⦠| 2024-07-23T22:32:09.990000Z |
| var-201908-0863 | Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain a USE⦠| 2024-07-23T22:30:33.144000Z |
| var-201912-0120 | A memory corruption issue was addressed with improved validation. This issue is fixed in ⦠| 2024-07-23T22:30:32.761000Z |
| var-201912-0114 | A memory corruption issue was addressed with improved validation. This issue is fixed in ⦠| 2024-07-23T22:30:32.792000Z |
| var-202305-1589 | D-Link DIR-2150 SetSysEmailSettings EmailTo Command Injection Remote Code Execution Vulne⦠| 2024-07-23T22:30:26.856000Z |
| var-202407-0235 | Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can res⦠| 2024-07-23T22:30:24.825000Z |
| var-202407-0234 | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data ⦠| 2024-07-23T22:30:24.699000Z |
| var-202407-0233 | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data ⦠| 2024-07-23T22:30:24.731000Z |
| var-202407-0232 | Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can res⦠| 2024-07-23T22:30:24.657000Z |
| var-201112-0097 | Stack-based buffer overflow in the CmpWebServer component in 3S CoDeSys 3.4 SP4 Patch 2 a⦠| 2024-07-23T22:29:05.132000Z |
| var-201801-0152 | An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions pri⦠| 2024-07-23T22:28:30.754000Z |
| var-201801-0151 | A Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior ⦠| 2024-07-23T22:28:30.640000Z |
| var-201807-0341 | ABB Panel Builder 800 all versions has an improper input validation vulnerability which m⦠| 2024-07-23T22:28:27.949000Z |
| var-201806-1058 | Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices befo⦠| 2024-07-23T22:28:27.641000Z |
| var-201906-1029 | In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulne⦠| 2024-07-23T22:28:26.009000Z |
| var-202004-0077 | There are multiple ways an unauthenticated attacker could perform SQL injection on WebAcc⦠| 2024-07-23T22:28:24.545000Z |
| var-202206-2050 | The affected product is vulnerable to multiple SQL injections, which may allow an unautho⦠| 2024-07-23T22:27:49.515000Z |
| var-202305-1981 | D-Link DIR-2150 SetSysEmailSettings AccountName Command Injection Remote Code Execution V⦠| 2024-07-23T22:27:44.287000Z |
| var-202305-0214 | D-Link DIR-2640 HNAP LoginPassword Authentication Bypass Vulnerability. This vulnerabilit⦠| 2024-07-23T22:27:44.496000Z |
| var-202305-0130 | D-Link DIR-2640 EmailFrom Command Injection Remote Code Execution Vulnerability. This vul⦠| 2024-07-23T22:27:44.522000Z |
| var-202407-0441 | A vulnerability has been identified in SIMATIC PCS 7 V9.1 (All versions), SIMATIC WinCC R⦠| 2024-07-23T22:27:41.577000Z |
| var-201105-0156 | Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 30⦠| 2024-07-23T22:25:52.955000Z |
| var-201402-0028 | The process_rs function in the router advertisement daemon (radvd) before 1.8.2, when Uni⦠| 2024-07-23T22:25:48.624000Z |
| var-201402-0027 | The process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows re⦠| 2024-07-23T22:25:48.742000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2022-051 | PHOENIX CONTACT: Denial-of-Service vulnerability in mGuard product family | 2022-11-15T09:27:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-046 | PHOENIX CONTACT: Multiple Linux component vulnerabilities in PLCnext Firmware | 2022-11-10T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-026 | PHOENIX CONTACT: Vulnerability in ProConOS/ProConOS eCLR SDK and MULTIPROG Engineering tool | 2022-06-21T05:16:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-025 | PHOENIX CONTACT: Vulnerability in classic line industrial controllers | 2022-06-21T05:15:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-014 | PHOENIX CONTACT: mGuard Device Manager affected by HTTP Request Smuggling of Apache Webserver | 2022-04-12T06:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-010 | PHOENIX CONTACT: Multiple Linux component vulnerabilities fixed in latest AXC F x152 LTS release | 2022-04-12T06:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-007 | PHOENIX CONTACT: Path Traversal in Library of PLCnext Technology Toolchain and FL Network Manager | 2022-03-22T07:43:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-005 | PHOENIX CONTACT: Vulnerabilities in XML parser library Expat (libexpat) | 2022-03-30T07:30:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-059 | PHOENIX CONTACT: BLUEMARK X1 / LED / CLED printers utilizing the Siemens Nucleus RTOS TCP/IP Stack | 2022-01-11T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-056 | WAGO: Multiple Vulnerabilities in CODESYS Runtime 2.3 and WebVisualisation | 2021-11-16T14:11:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-052 | PHOENIX CONTACT: PC Worx/-Express prone to improper input validation vulnerability | 2021-11-03T09:45:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-035 | PHOENIX CONTACT: FL MGUARD DM version 1.12.0 and 1.13.0 Improper Privilege Management | 2021-08-11T07:59:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-032 | PHOENIX CONTACT: Niche Ethernet Stack for ILC1x0, ILC1x1 and AXC 1050 Industrial controllers and CHARX control DC | 2021-08-04T07:57:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-026 | PHOENIX CONTACT: Denial-of-Service vulnerabilty in Emalytics, ILC 2050 BI and ILC 2050 BI-L | 2020-08-20T07:11:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-012 | PHOENIX CONTACT: Local Privilege Escalation in PC WORX SRT | 2020-03-27T09:47:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-001 | PHOENIX CONTACT: Emalytics Controller ILC 2050 BI(L) allows unauthorised read and write access to the configuration file | 2020-02-17T08:10:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2019-020 | PHOENIX CONTACT: improper access control exists on FL NAT devices when using MAC-based port security | 2019-10-29T10:56:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2019-009 | PHOENIX CONTACT: Multiple Vulnerabilities in AXC F 2152 | 2019-06-04T10:22:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2018-007 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series - Stack-based Buffer Overflow in shared object file | 2018-05-16T10:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2017-002 | PHOENIX CONTACT: mGuard device manager (mdm) multiple vulnerabilities in Java SE | 2017-09-07T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2017-001 | PHOENIX CONTACT: mGuard IKE daemon remote denial of service | 2017-03-07T11:05:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-003 | PHOENIX CONTACT: Multiple vulnerabilities in ENERGY AXC PU | 2023-03-14T09:14:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-058 | PHOENIX CONTACT: Profinet SDK libexpat vulnerabilities | 2022-12-13T07:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-053 | PHOENIX CONTACT: Advisory for TC ROUTER and CLOUD CLIENT | 2023-03-07T07:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-048 | PHOENIX CONTACT: Automationworx BCP File Parsing Vulnerabilities | 2022-11-15T09:25:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-028 | PHOENIX CONTACT: Missing Authentication in ProConOS/ProConOS eCLR SDK and MULTIPROG Engineering tool | 2022-06-21T05:18:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-013 | PHOENIX CONTACT: Multiple products affected by possible infinite loop within OpenSSL library | 2022-04-12T06:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2019-001 | PHOENIX CONTACT: Multiple Vulnerabilities in FL SWITCH 3xxx, 4xxx and 48xx | 2019-01-23T12:02:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2018-006 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series through 1.33 has a Stack-based Buffer Overflow | 2018-05-16T10:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2025-005 | Phoenix Contact: Security Advisory for ESL Stick USB-A | 2025-01-14T11:00:00.000Z | 2025-05-14T13:00:14.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2018-009 | Pepperl+Fuchs: Security advisory for MELTDOWN and SPECTRE attacks in ecom mobile Devices | 2018-07-06T14:47:00.000Z | 2018-10-23T10:00:00.000Z |
| vde-2017-005 | Pepperl+Fuchs / ecom instruments: WLAN enabled products utilizing WPA2 encryption | 2017-12-11T13:26:00.000Z | 2018-10-23T10:00:00.000Z |
| vde-2018-008 | Pepperl+Fuchs: Remote Code Execution Vulnerability in HMI Devices | 2018-07-06T13:37:00.000Z | 2018-07-06T13:37:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2020-036 | WAGO: Multiple Vulnerabilities in I/O-Check Service | 2021-06-29T10:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2020-044 | WAGO: Web-Based Management Authentication Vulnerability in WAGO 750-36X and WAGO 750-8XX | 2021-08-31T07:01:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-042 | WAGO: PLC families 750-88x and 750-352 prone to DoS attack, versions < FW10 (Update A) | 2020-10-27T10:28:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-029 | WAGO: XSS vulnerability in Web-UI in WAGO 750-88X and WAGO 750-89X | 2020-09-30T11:11:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-028 | WAGO: Authentication Bypass Vulnerability in WAGO 750-36X and WAGO 750-8XX Version <= FW03 | 2020-09-30T11:08:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-004 | WAGO: e!Cockpit cleartext communication and hardcoded key | 2020-03-09T09:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-038 | WAGO: OpenSSL DoS Vulnerability in PLCs | 2021-08-31T07:00:00.000Z | 2025-05-14T12:53:43.000Z |
| vde-2020-045 | WAGO: Command Injection Vulnerability in I/O-Check Service of multiple products | 2020-12-17T09:02:00.000Z | 2025-05-14T12:53:43.000Z |
| vde-2020-008 | WAGO: Cloud Connectivity Multiple Vulnerabilities | 2020-03-09T09:15:00.000Z | 2025-05-14T12:53:43.000Z |
| vde-2025-009 | WAGO: Vulnerabilities in CODESYS Control V3 - OPC UA Stack | 2025-02-04T11:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-043 | WAGO: Vulnerable WIBU-SYSTEMS Codemeter installed through e!COCKPIT and WAGO-I/O-Pro | 2021-08-31T07:02:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-013 | WAGO: Multiple Vulnerabilities in the Web-Based Management Interface | 2021-05-05T08:54:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-032 | WAGO: Vulnerable WIBU-SYSTEMS Codemeter installed through e!COCKPIT | 2020-09-09T06:23:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-027 | WAGO: Vulnerability in web-based authentication in WAGO 750-8XX Version <= FW07 | 2020-09-30T11:06:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-020 | WAGO: PPPD in PFC100 and PFC200 Series is vulnerable to CVE-2020-8597 | 2020-06-10T10:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-006 | WAGO: Web-Based Management Authentication Vulnerabilities | 2020-03-09T11:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-017 | WAGO: Series PFC100/PFC200 Information Disclosure | 2019-09-18T11:25:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2023-046 | WAGO: Multiple products vulnerable to local file inclusion | 2023-10-23T10:00:00.000Z | 2025-04-28T10:00:00.000Z |
| vde-2025-007 | WAGO: Year 2038 problem | 2025-04-15T10:00:00.000Z | 2025-04-15T10:00:00.000Z |
| vde-2025-004 | Wago: Vulnerability in libwagosnmp | 2025-03-05T11:00:00.000Z | 2025-04-10T13:00:00.000Z |
| vde-2024-072 | WAGO: Vulnerabilities in CODESYS Control | 2024-12-03T11:00:00.000Z | 2024-12-03T11:00:00.000Z |
| vde-2023-042 | Wago: Vulnerable WIBU-SYSTEMS Codemeter installed through e!COCKPIT and WAGO-I/O-Pro (UPDATE B) | 2023-09-25T10:00:00.000Z | 2024-11-20T11:00:00.000Z |
| vde-2023-006 | WAGO: Controller with CODESYS 2.3 Runtime Denial-of-Service | 2023-06-25T06:00:00.000Z | 2024-07-08T10:00:00.000Z |
| vde-2024-021 | WAGO: Vulnerability in WAGO Navigator | 2024-05-21T06:00:00.000Z | 2024-05-21T06:00:00.000Z |
| vde-2023-068 | WAGO: Multiple Vulnerabilities in e!Cockpit and e!Runtime / CODESYS Runtime | 2024-05-21T06:00:00.000Z | 2024-05-21T06:00:00.000Z |
| vde-2023-039 | Wago: Multiple vulnerabilities in web-based management of multiple products | 2024-03-13T08:30:00.000Z | 2024-03-13T08:30:00.000Z |
| vde-2024-007 | WAGO: WIBU-SYSTEMS CodeMeter Runtime vulnerabilities in multiple products | 2024-01-22T07:00:00.000Z | 2024-01-22T07:00:00.000Z |
| vde-2023-045 | Wago: Vulnerability in Smart Designer Web-Application | 2023-12-05T07:00:00.000Z | 2023-12-05T07:00:00.000Z |
| vde-2023-044 | Wago: Vulnerabilities in IEC61850 Server / Telecontrol | 2023-12-05T07:00:00.000Z | 2023-12-05T07:00:00.000Z |
| vde-2023-037 | WAGO: Remote Code execution vulnerability in managed Switches | 2023-11-21T07:00:00.000Z | 2023-11-21T07:00:00.000Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| MOKSHA-2026-0059 |
5.3 (3.1)
5.3 (4.0)
|
Multi-Tenant Trust Confusion via VM.xenstore_data |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0058 |
5.3 (3.1)
5.3 (4.0)
|
Xenstore Quota Exhaustion via VM.xenstore_data |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0057 |
5.3 (3.1)
5.3 (4.0)
|
FIST Namespace Exposure via VM.xenstore_data |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0056 |
5.3 (3.1)
5.3 (4.0)
|
Console Access Manipulation via VM.other_config disabl⦠|
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0055 |
5.3 (3.1)
7.1 (4.0)
|
set_other_config RBAC Bypass for PCI Passthrough Key |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0054 |
5.3 (3.1)
5.3 (4.0)
|
MAC Address Collision via VM.other_config mac_seed |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0053 |
5.3 (3.1)
5.3 (4.0)
|
MTU Manipulation (0-65535) via VIF.other_config |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0052 |
5.3 (3.1)
5.3 (4.0)
|
Leaked VBD Detection Spoofing via task_id/related_to |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0051 |
5.4 (3.1)
2.3 (4.0)
|
Config Drive Misidentification via VDI.other_config co⦠|
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0050 |
5.5 (3.1)
5.1 (4.0)
|
LUNperVDI Mode Manipulation via SR.sm_config |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0049 |
5.5 (3.1)
5.1 (4.0)
|
HIMN Identity Hijack + DHCP Manipulation via Network.o⦠|
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0048 |
5.5 (3.1)
7.0 (4.0)
|
Storage Availability Disruption via Host.other_config ⦠|
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0047 |
6.1 (3.1)
5.1 (4.0)
|
DNS Search Domain Injection via PIF.other_config domain |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0046 |
6.5 (3.1)
8.3 (4.0)
|
MTU Manipulation / Network Partition via PIF.other_config |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0045 |
6.5 (3.1)
5.1 (4.0)
|
Arbitrary Bond Property Injection via PIF.other_config⦠|
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0044 |
6.5 (3.1)
5.3 (4.0)
|
QEMU -parallel Path Traversal (VM DoS) via VM.platform |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0043 |
6.5 (3.1)
7.0 (4.0)
|
PBD Synchronization Bypass via Pool.other_config sync_⦠|
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0042 |
6.5 (3.1)
5.1 (4.0)
|
SMTP Server Redirection / Credential Exfiltration via ⦠|
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0041 |
6.5 (3.1)
5.1 (4.0)
|
Rolling Upgrade State Injection via Pool.other_config |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0040 |
6.5 (3.1)
6.9 (4.0)
|
CHAP Credential Exposure via PBD.device_config |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0039 |
6.5 (3.1)
7.0 (4.0)
|
Filesystem Layout Manipulation via SR.sm_config nosubd⦠|
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0038 |
6.5 (3.1)
8.3 (4.0)
|
Provisioning Type Manipulation via SR.sm_config allocation |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0037 |
6.5 (3.1)
7.0 (4.0)
|
VHD Test Mode and Failure Injection via SR.other_confi⦠|
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0036 |
6.7 (3.1)
7.0 (4.0)
|
LVM Configuration Injection via SR.other_config lvm-conf |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0035 |
6.8 (3.1)
6.9 (4.0)
|
iSCSI Initiator Identity Spoofing via Host.other_confi⦠|
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0034 |
6.8 (3.1)
7.1 (4.0)
|
Coalesce Blocking via VDI.other_config leaf-coalesce |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0033 |
7.1 (3.1)
5.3 (4.0)
|
Rate Limit Bypass via VIF.qos_algorithm_params Large k⦠|
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0032 |
7.1 (3.1)
8.3 (4.0)
|
Bidirectional Data Exfiltration via VM.xenstore_data G⦠|
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0031 |
7.1 (3.1)
8.3 (4.0)
|
Guest Agent Poisoning via VM.xenstore_data vm-data Injection |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0030 |
7.1 (3.1)
7.1 (4.0)
|
XML Injection in Template Provisioning via VM.other_co⦠|
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| GCVE-1-2026-0002 |
10 (4.0)
|
Heap-buffer-overflow in EXIF writer for extra IFD tags |
ffmpeg |
ffmpeg |
2026-01-02T19:50:00.000Z | 2026-01-02T20:05:27.269877Z |
| GCVE-1-2026-0001 |
N/A
|
Bundle reference to gpg.fail |
gnupg |
gnupg |
2026-01-02T10:20:00.000Z | 2026-01-02T13:31:14.359346Z |
| GCVE-1-2025-0041 |
6.4 (4.0)
|
[online services] Reflected Cross-Site Scripting (XSS)⦠|
typo3 |
typo3 |
2025-12-19T14:25:00.000Z | 2025-12-19T14:54:51.594645Z |
| GCVE-1-2025-0031 |
7.1 (4.0)
|
A cross-site scripting (XSS) vulnerability was identif⦠|
misp |
misp |
2025-12-03T10:58:00.000Z | 2025-12-16T09:36:09.594750Z |
| GCVE-1-2025-0040 |
7.2 (4.0)
|
A cross-site scripting (XSS) vulnerability was id⦠|
misp |
misp |
2025-12-13T08:44:32.378924Z | 2025-12-13T08:44:32.378924Z |
| GCVE-1-2025-0039 |
8.5 (4.0)
|
XSS Reintroduced in MISP Dashboard World Map Widget Du⦠|
misp |
misp |
2025-12-10T14:33:52.856734Z | 2025-12-10T14:33:52.856734Z |
| GCVE-1-2025-0038 |
5 (4.0)
|
Reflected XSS in MISP Template Tag Removal and MISP Ad⦠|
misp |
misp |
2025-12-10T14:10:00.000Z | 2025-12-10T14:16:55.918270Z |
| GCVE-1-2025-0037 |
7 (4.0)
|
Reflected XSS in MISP Dashboard Widgets via Unescaped ⦠|
misp |
misp |
2025-12-10T14:01:03.200804Z | 2025-12-10T14:01:03.200804Z |
| GCVE-1-2025-0036 |
8.3 (4.0)
|
A reflected cross-site scripting (XSS) vulnerability w⦠|
misp |
misp |
2025-12-10T13:46:07.170083Z | 2025-12-10T13:46:07.170083Z |
| GCVE-1-2025-0035 |
8.3 (4.0)
|
Insufficient sanitization of bundle metadata (availabl⦠|
CIRCL |
vulnerability-lookup |
2025-12-08T10:25:00.000Z | 2025-12-08T12:14:06.307298Z |
| GCVE-1-2025-0034 |
7 (4.0)
|
Missing CSRF protection on state-changing endpoints in⦠|
CIRCL |
vulnerability-lookup |
2025-12-08T10:19:00.000Z | 2025-12-08T12:13:24.197294Z |
| GCVE-1-2025-0033 |
8.1 (4.0)
|
Vulnerability-lookup did not track or limit failed One⦠|
CIRCL |
vulnerability-lookup |
2025-12-08T10:11:00.000Z | 2025-12-08T12:12:53.235996Z |
| GCVE-1-2025-0032 |
10 (4.0)
|
The default configuration of WatchGuard Firebox device⦠|
watchguard |
firebox |
2025-12-03T16:25:00.000Z | 2025-12-19T13:48:34.570799Z |
| GCVE-1-2025-0030 |
6.2 (4.0)
|
A cross-site scripting (XSS) vulnerability in the MISP⦠|
misp |
misp |
2025-12-03T10:53:00.000Z | 2025-12-03T10:58:55.845341Z |
| GCVE-1-2025-0019 |
4 (4.0)
|
Path traversal vulnerability in EventReport for site-admin |
misp |
misp |
2025-11-26T14:47:00.000Z | 2025-11-28T07:27:42.721350Z |
| GCVE-1-2025-0017 |
9.4 (4.0)
|
Privilege escalation in Cerebrate allows an authentica⦠|
cerebrate |
cerebrate |
2025-11-12T08:15:00.000Z | 2025-11-28T07:22:08.205835Z |
| GCVE-1-2025-0029 |
6.3 (4.0)
|
Reflected cross-site scripting (XSS) vulnerabilities i⦠|
misp |
misp |
2025-11-27T12:41:00.000Z | 2025-11-27T12:48:51.085860Z |
| GCVE-1-2025-0027 |
9.4 (4.0)
|
Reflected cross-site scripting (XSS) vulnerability in ⦠|
misp |
misp |
2025-11-27T07:17:00.000Z | 2025-12-02T08:51:04.323899Z |
| GCVE-1-2025-0028 |
8.5 (4.0)
|
Information leakage vulnerability in the MISP Feed con⦠|
misp |
misp |
2025-11-27T07:23:00.000Z | 2025-12-02T08:51:35.429494Z |
| GCVE-1-2025-0026 |
9.4 (4.0)
|
Reflected cross-site scripting (XSS) vulnerability in ⦠|
misp |
misp |
2025-11-26T16:35:00.000Z | 2025-12-02T08:50:46.381572Z |
| GCVE-1-2025-0025 |
9.4 (4.0)
|
Reflected cross-site scripting (XSS) vulnerability in ⦠|
misp |
misp |
2025-11-26T16:27:00.000Z | 2025-12-02T08:50:18.897756Z |
| GCVE-1-2025-0024 |
9.4 (4.0)
|
cross-site scripting (XSS) vulnerability in the MISP s⦠|
misp |
misp |
2025-11-26T16:14:00.000Z | 2025-12-02T08:50:01.482327Z |
| GCVE-1-2025-0023 |
9.4 (4.0)
|
XSS in MISP server comparison tool |
misp |
misp |
2025-11-26T16:10:00.000Z | 2025-12-02T08:49:24.626168Z |
| GCVE-1-2025-0022 |
9.4 (4.0)
|
Clarified setting's impact on download_attachments_on_load |
misp |
misp |
2025-11-26T16:04:00.000Z | 2025-12-02T08:49:04.510294Z |
| GCVE-1-2025-0021 |
9.4 (4.0)
|
XSS in MISP ReST client in HTML view |
misp |
misp |
2025-11-26T15:55:00.000Z | 2025-12-02T08:48:41.869838Z |
| GCVE-1-2025-0020 |
9.4 (4.0)
|
cross-site scripting (XSS) in Galaxy element JSON view |
misp |
misp |
2025-11-26T15:49:00.000Z | 2025-12-02T08:47:41.151429Z |
| GCVE-1-2025-0018 |
9.4 (4.0)
|
HTML injection issue was identified in Lookylooās web ⦠|
lookyloo |
lookyloo |
2025-11-18T15:33:00.000Z | 2025-11-18T20:39:45.579295Z |
| GCVE-1-2025-0016 |
6 (4.0)
|
Local file inclusion in [ImportFromUrl() URL hand⦠|
misp |
misp |
2025-11-04T09:20:00.000Z | 2025-11-04T09:56:38.383646Z |