Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-7930 |
8.8 (3.1)
|
Insufficient validation of untrusted input in Coo… |
Google |
Chrome |
2026-05-06T18:12:37.623Z | 2026-05-07T03:56:52.635Z |
| CVE-2026-7929 |
7.5 (3.1)
|
Use after free in MediaRecording in Google Chrome… |
Google |
Chrome |
2026-05-06T18:12:37.284Z | 2026-05-07T03:56:29.914Z |
| CVE-2026-7928 |
8.8 (3.1)
|
Use after free in WebRTC in Google Chrome on Wind… |
Google |
Chrome |
2026-05-06T18:12:36.787Z | 2026-05-07T03:56:28.823Z |
| CVE-2026-7927 |
8.8 (3.1)
|
Type Confusion in Runtime in Google Chrome prior … |
Google |
Chrome |
2026-05-06T18:12:36.406Z | 2026-05-07T03:56:27.693Z |
| CVE-2026-7926 |
8.8 (3.1)
|
Use after free in PresentationAPI in Google Chrom… |
Google |
Chrome |
2026-05-06T18:12:36.012Z | 2026-05-07T03:56:25.474Z |
| CVE-2026-7925 |
7.8 (3.1)
|
Use after free in Chromoting in Google Chrome on … |
Google |
Chrome |
2026-05-06T18:12:35.636Z | 2026-05-07T03:56:26.606Z |
| CVE-2026-7924 |
6.5 (3.1)
|
Uninitialized Use in Dawn in Google Chrome prior … |
Google |
Chrome |
2026-05-06T18:12:35.280Z | 2026-05-06T22:00:50.911Z |
| CVE-2026-7923 |
8.3 (3.1)
|
Out of bounds write in Skia in Google Chrome prio… |
Google |
Chrome |
2026-05-06T18:12:34.929Z | 2026-05-07T03:56:51.562Z |
| CVE-2026-7922 |
8.3 (3.1)
|
Use after free in ServiceWorker in Google Chrome … |
Google |
Chrome |
2026-05-06T18:12:34.578Z | 2026-05-07T03:56:50.435Z |
| CVE-2026-7921 |
8.8 (3.1)
|
Use after free in Passwords in Google Chrome prio… |
Google |
Chrome |
2026-05-06T18:12:34.240Z | 2026-05-07T03:56:33.229Z |
| CVE-2026-7920 |
8.3 (3.1)
|
Use after free in Skia in Google Chrome prior to … |
Google |
Chrome |
2026-05-06T18:12:33.899Z | 2026-05-07T03:56:49.259Z |
| CVE-2026-7919 |
8.3 (3.1)
|
Use after free in Aura in Google Chrome prior to … |
Google |
Chrome |
2026-05-06T18:12:33.549Z | 2026-05-07T03:56:48.131Z |
| CVE-2026-7918 |
8.3 (3.1)
|
Use after free in GPU in Google Chrome prior to 1… |
Google |
Chrome |
2026-05-06T18:12:33.137Z | 2026-05-07T03:56:46.916Z |
| CVE-2026-7917 |
8.3 (3.1)
|
Use after free in Fullscreen in Google Chrome on … |
Google |
Chrome |
2026-05-06T18:12:32.739Z | 2026-05-07T03:56:45.791Z |
| CVE-2026-7916 |
8.3 (3.1)
|
Insufficient data validation in InterestGroups in… |
Google |
Chrome |
2026-05-06T18:12:32.365Z | 2026-05-08T19:47:59.359Z |
| CVE-2026-7915 |
4.3 (3.1)
|
Insufficient data validation in DevTools in Googl… |
Google |
Chrome |
2026-05-06T18:12:31.980Z | 2026-05-10T13:22:36.266Z |
| CVE-2026-7914 |
8.3 (3.1)
|
Type Confusion in Accessibility in Google Chrome … |
Google |
Chrome |
2026-05-06T18:12:31.507Z | 2026-05-07T03:56:43.419Z |
| CVE-2026-7913 |
7.8 (3.1)
|
Insufficient policy enforcement in DevTools in Go… |
Google |
Chrome |
2026-05-06T18:12:31.073Z | 2026-05-07T03:56:42.323Z |
| CVE-2026-7912 |
4.2 (3.1)
|
Integer overflow in GPU in Google Chrome on Andro… |
Google |
Chrome |
2026-05-06T18:12:30.669Z | 2026-05-06T22:02:46.287Z |
| CVE-2026-7911 |
8.3 (3.1)
|
Use after free in Aura in Google Chrome on Window… |
Google |
Chrome |
2026-05-06T18:12:30.281Z | 2026-05-07T03:56:41.114Z |
| CVE-2026-7910 |
N/A
|
Use after free in Views in Google Chrome prior to… |
Google |
Chrome |
2026-05-06T18:12:29.911Z | 2026-05-06T18:12:29.911Z |
| CVE-2026-7909 |
3.1 (3.1)
|
Inappropriate implementation in ServiceWorker in … |
Google |
Chrome |
2026-05-06T18:12:29.530Z | 2026-05-06T22:03:04.633Z |
| CVE-2026-7908 |
9.6 (3.1)
|
Use after free in Fullscreen in Google Chrome pri… |
Google |
Chrome |
2026-05-06T18:12:29.198Z | 2026-05-07T03:56:40.000Z |
| CVE-2026-7907 |
8.8 (3.1)
|
Use after free in DOM in Google Chrome prior to 1… |
Google |
Chrome |
2026-05-06T18:12:28.841Z | 2026-05-07T03:56:35.558Z |
| CVE-2026-7906 |
8.8 (3.1)
|
Use after free in SVG in Google Chrome prior to 1… |
Google |
Chrome |
2026-05-06T18:12:28.459Z | 2026-05-07T03:56:34.364Z |
| CVE-2026-7905 |
8.3 (3.1)
|
Insufficient validation of untrusted input in Med… |
Google |
Chrome |
2026-05-06T18:12:28.128Z | 2026-05-07T03:56:38.912Z |
| CVE-2026-7904 |
4.3 (3.1)
|
Out of bounds read in Fonts in Google Chrome prio… |
Google |
Chrome |
2026-05-06T18:12:27.687Z | 2026-05-06T22:03:52.536Z |
| CVE-2026-7903 |
8.8 (3.1)
|
Integer overflow in ANGLE in Google Chrome on Mac… |
Google |
Chrome |
2026-05-06T18:12:27.350Z | 2026-05-07T03:56:37.833Z |
| CVE-2026-7902 |
8.8 (3.1)
|
Out of bounds memory access in V8 in Google Chrom… |
Google |
Chrome |
2026-05-06T18:12:26.961Z | 2026-05-10T13:22:54.340Z |
| CVE-2026-7901 |
8.8 (3.1)
|
Use after free in ANGLE in Google Chrome on Mac p… |
Google |
Chrome |
2026-05-06T18:12:26.506Z | 2026-05-07T03:56:04.734Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-7928 |
8.8 (3.1)
|
Use after free in WebRTC in Google Chrome on Wind… |
Google |
Chrome |
2026-05-06T18:12:36.787Z | 2026-05-07T03:56:28.823Z |
| CVE-2026-7927 |
8.8 (3.1)
|
Type Confusion in Runtime in Google Chrome prior … |
Google |
Chrome |
2026-05-06T18:12:36.406Z | 2026-05-07T03:56:27.693Z |
| CVE-2026-7926 |
8.8 (3.1)
|
Use after free in PresentationAPI in Google Chrom… |
Google |
Chrome |
2026-05-06T18:12:36.012Z | 2026-05-07T03:56:25.474Z |
| CVE-2026-7925 |
7.8 (3.1)
|
Use after free in Chromoting in Google Chrome on … |
Google |
Chrome |
2026-05-06T18:12:35.636Z | 2026-05-07T03:56:26.606Z |
| CVE-2026-7924 |
6.5 (3.1)
|
Uninitialized Use in Dawn in Google Chrome prior … |
Google |
Chrome |
2026-05-06T18:12:35.280Z | 2026-05-06T22:00:50.911Z |
| CVE-2026-7923 |
8.3 (3.1)
|
Out of bounds write in Skia in Google Chrome prio… |
Google |
Chrome |
2026-05-06T18:12:34.929Z | 2026-05-07T03:56:51.562Z |
| CVE-2026-7922 |
8.3 (3.1)
|
Use after free in ServiceWorker in Google Chrome … |
Google |
Chrome |
2026-05-06T18:12:34.578Z | 2026-05-07T03:56:50.435Z |
| CVE-2026-7921 |
8.8 (3.1)
|
Use after free in Passwords in Google Chrome prio… |
Google |
Chrome |
2026-05-06T18:12:34.240Z | 2026-05-07T03:56:33.229Z |
| CVE-2026-7920 |
8.3 (3.1)
|
Use after free in Skia in Google Chrome prior to … |
Google |
Chrome |
2026-05-06T18:12:33.899Z | 2026-05-07T03:56:49.259Z |
| CVE-2026-7919 |
8.3 (3.1)
|
Use after free in Aura in Google Chrome prior to … |
Google |
Chrome |
2026-05-06T18:12:33.549Z | 2026-05-07T03:56:48.131Z |
| CVE-2026-7918 |
8.3 (3.1)
|
Use after free in GPU in Google Chrome prior to 1… |
Google |
Chrome |
2026-05-06T18:12:33.137Z | 2026-05-07T03:56:46.916Z |
| CVE-2026-7917 |
8.3 (3.1)
|
Use after free in Fullscreen in Google Chrome on … |
Google |
Chrome |
2026-05-06T18:12:32.739Z | 2026-05-07T03:56:45.791Z |
| CVE-2026-7916 |
8.3 (3.1)
|
Insufficient data validation in InterestGroups in… |
Google |
Chrome |
2026-05-06T18:12:32.365Z | 2026-05-08T19:47:59.359Z |
| CVE-2026-7915 |
4.3 (3.1)
|
Insufficient data validation in DevTools in Googl… |
Google |
Chrome |
2026-05-06T18:12:31.980Z | 2026-05-10T13:22:36.266Z |
| CVE-2026-7914 |
8.3 (3.1)
|
Type Confusion in Accessibility in Google Chrome … |
Google |
Chrome |
2026-05-06T18:12:31.507Z | 2026-05-07T03:56:43.419Z |
| CVE-2026-7913 |
7.8 (3.1)
|
Insufficient policy enforcement in DevTools in Go… |
Google |
Chrome |
2026-05-06T18:12:31.073Z | 2026-05-07T03:56:42.323Z |
| CVE-2026-7912 |
4.2 (3.1)
|
Integer overflow in GPU in Google Chrome on Andro… |
Google |
Chrome |
2026-05-06T18:12:30.669Z | 2026-05-06T22:02:46.287Z |
| CVE-2026-7911 |
8.3 (3.1)
|
Use after free in Aura in Google Chrome on Window… |
Google |
Chrome |
2026-05-06T18:12:30.281Z | 2026-05-07T03:56:41.114Z |
| CVE-2026-7910 |
N/A
|
Use after free in Views in Google Chrome prior to… |
Google |
Chrome |
2026-05-06T18:12:29.911Z | 2026-05-06T18:12:29.911Z |
| CVE-2026-7909 |
3.1 (3.1)
|
Inappropriate implementation in ServiceWorker in … |
Google |
Chrome |
2026-05-06T18:12:29.530Z | 2026-05-06T22:03:04.633Z |
| CVE-2026-7908 |
9.6 (3.1)
|
Use after free in Fullscreen in Google Chrome pri… |
Google |
Chrome |
2026-05-06T18:12:29.198Z | 2026-05-07T03:56:40.000Z |
| CVE-2026-7907 |
8.8 (3.1)
|
Use after free in DOM in Google Chrome prior to 1… |
Google |
Chrome |
2026-05-06T18:12:28.841Z | 2026-05-07T03:56:35.558Z |
| CVE-2026-7906 |
8.8 (3.1)
|
Use after free in SVG in Google Chrome prior to 1… |
Google |
Chrome |
2026-05-06T18:12:28.459Z | 2026-05-07T03:56:34.364Z |
| CVE-2026-7905 |
8.3 (3.1)
|
Insufficient validation of untrusted input in Med… |
Google |
Chrome |
2026-05-06T18:12:28.128Z | 2026-05-07T03:56:38.912Z |
| CVE-2026-7904 |
4.3 (3.1)
|
Out of bounds read in Fonts in Google Chrome prio… |
Google |
Chrome |
2026-05-06T18:12:27.687Z | 2026-05-06T22:03:52.536Z |
| CVE-2026-7903 |
8.8 (3.1)
|
Integer overflow in ANGLE in Google Chrome on Mac… |
Google |
Chrome |
2026-05-06T18:12:27.350Z | 2026-05-07T03:56:37.833Z |
| CVE-2026-7902 |
8.8 (3.1)
|
Out of bounds memory access in V8 in Google Chrom… |
Google |
Chrome |
2026-05-06T18:12:26.961Z | 2026-05-10T13:22:54.340Z |
| CVE-2026-7901 |
8.8 (3.1)
|
Use after free in ANGLE in Google Chrome on Mac p… |
Google |
Chrome |
2026-05-06T18:12:26.506Z | 2026-05-07T03:56:04.734Z |
| CVE-2026-7900 |
8.3 (3.1)
|
Heap buffer overflow in ANGLE in Google Chrome pr… |
Google |
Chrome |
2026-05-06T18:12:26.002Z | 2026-05-07T03:56:36.706Z |
| CVE-2026-7899 |
8.8 (3.1)
|
Out of bounds read and write in V8 in Google Chro… |
Google |
Chrome |
2026-05-06T18:12:25.618Z | 2026-05-07T03:56:03.519Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2021-26381 | Improper system call parameter validation in the Trusted OS may allow a malicious driver to perform… | 2026-02-10T20:16:41.110 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-26009 | Catalyst is a platform built for enterprise game server hosts, game communities, and billing panel … | 2026-02-10T19:16:04.437 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-25613 | An authorized user may disable the MongoDB server by issuing a query against a collection that cont… | 2026-02-10T19:16:04.267 | 2026-02-25T16:45:10.213 |
| fkie_cve-2026-25610 | An authorized user may trigger a server crash by running a $geoNear pipeline with certain invalid i… | 2026-02-10T19:16:04.037 | 2026-02-25T16:46:13.320 |
| fkie_cve-2026-2302 | Under specific conditions when processing a maliciously crafted value of type Hash r, Mongoid::Crit… | 2026-02-10T19:16:04.677 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-25609 | Incorrect validation of the profile command may result in the determination that a request altering… | 2026-02-10T19:16:03.877 | 2026-02-25T16:54:40.037 |
| fkie_cve-2026-25506 | MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17… | 2026-02-10T19:16:03.720 | 2026-02-25T17:39:03.170 |
| fkie_cve-2026-21355 | DNG SDK versions 1.7.1 2410 and earlier are affected by an out-of-bounds read vulnerability that co… | 2026-02-10T19:15:59.503 | 2026-02-13T20:37:41.920 |
| fkie_cve-2026-21354 | DNG SDK versions 1.7.1 2410 and earlier are affected by an Integer Overflow or Wraparound vulnerabi… | 2026-02-10T19:15:59.140 | 2026-02-13T20:37:36.883 |
| fkie_cve-2026-21353 | DNG SDK versions 1.7.1 2410 and earlier are affected by an Integer Overflow or Wraparound vulnerabi… | 2026-02-10T19:15:58.373 | 2026-02-13T20:37:33.567 |
| fkie_cve-2026-21352 | DNG SDK versions 1.7.1 2410 and earlier are affected by an out-of-bounds write vulnerability that c… | 2026-02-10T19:15:58.107 | 2026-02-13T20:37:27.767 |
| fkie_cve-2026-21347 | Bridge versions 15.1.3, 16.0.1 and earlier are affected by an Integer Overflow or Wraparound vulner… | 2026-02-10T19:15:57.890 | 2026-02-11T17:14:59.750 |
| fkie_cve-2026-21346 | Bridge versions 15.1.3, 16.0.1 and earlier are affected by an out-of-bounds write vulnerability tha… | 2026-02-10T19:15:57.657 | 2026-02-11T17:15:14.187 |
| fkie_cve-2026-21345 | Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability… | 2026-02-10T19:15:57.457 | 2026-02-11T17:15:24.487 |
| fkie_cve-2026-21344 | Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability… | 2026-02-10T19:15:57.190 | 2026-02-11T17:15:39.107 |
| fkie_cve-2026-21343 | Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability… | 2026-02-10T19:15:56.857 | 2026-02-11T17:16:03.557 |
| fkie_cve-2026-21342 | Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds write vulnerabilit… | 2026-02-10T19:15:56.613 | 2026-02-11T16:40:22.233 |
| fkie_cve-2026-21341 | Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds write vulnerabilit… | 2026-02-10T19:15:55.267 | 2026-02-11T16:40:15.260 |
| fkie_cve-2026-1850 | Complex queries can cause excessive memory usage in MongoDB Query Planner resulting in an Out-Of-Me… | 2026-02-10T19:15:51.633 | 2026-02-25T17:11:10.953 |
| fkie_cve-2026-1849 | MongoDB Server may experience an out-of-memory failure while evaluating expressions that produce de… | 2026-02-10T19:15:51.477 | 2026-02-25T17:17:56.350 |
| fkie_cve-2026-1848 | Connections received from the proxy port may not count towards total accepted connections, resultin… | 2026-02-10T19:15:51.333 | 2026-02-25T17:20:29.207 |
| fkie_cve-2026-1847 | Inserting certain large documents into a replica set could lead to replica set secondaries not bein… | 2026-02-10T19:15:51.160 | 2026-02-25T17:25:07.183 |
| fkie_cve-2026-26003 | FastGPT is an AI Agent building platform. From 4.14.0 to 4.14.5, attackers can directly access the … | 2026-02-10T18:16:39.107 | 2026-02-23T18:06:14.713 |
| fkie_cve-2026-25993 | EverShop is a TypeScript-first eCommerce platform. During category update and deletion event handli… | 2026-02-10T18:16:38.957 | 2026-02-23T18:03:12.130 |
| fkie_cve-2026-25992 | SiYuan is a personal knowledge management system. Prior to 3.5.5, the /api/file/getFile endpoint us… | 2026-02-10T18:16:38.807 | 2026-02-23T17:58:09.347 |
| fkie_cve-2026-25956 | Frappe is a full-stack web application framework. Prior to 14.99.14 and 15.94.0, an attacker could … | 2026-02-10T18:16:38.653 | 2026-02-17T15:05:39.610 |
| fkie_cve-2026-25950 | Rejected reason: Further research determined the issue is not a vulnerability. | 2026-02-10T18:16:38.593 | 2026-02-10T18:16:38.593 |
| fkie_cve-2026-25947 | Worklenz is a project management tool. Prior to 2.1.7, there are multiple SQL injection vulnerabili… | 2026-02-10T18:16:38.423 | 2026-02-23T17:57:18.470 |
| fkie_cve-2026-25805 | Zed is a multiplayer code editor. Prior to 0.219.4, Zed does not show with which parameters a tool … | 2026-02-10T18:16:38.200 | 2026-02-19T15:08:32.990 |
| fkie_cve-2026-25728 | ClipBucket v5 is an open source video sharing platform. Prior to 5.5.3 - #40, a Time-of-Check to Ti… | 2026-02-10T18:16:38.053 | 2026-02-18T15:02:02.293 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-whqh-9pq5-c7r3 |
5.4 (3.1)
|
phpMyFAQ has a SVG Sanitizer Entity Decoding Depth Limit Bypass Leading to Stored XSS | 2026-05-06T20:18:48Z | 2026-05-06T20:18:48Z |
| ghsa-f5p7-2c9q-8896 |
5.4 (3.1)
|
phpMyFAQ has Stored XSS in FAQ Question/Answer via Encode-Decode Bypass of removeAttributes() Sanit… | 2026-05-06T20:18:02Z | 2026-05-06T20:18:02Z |
| ghsa-pgh9-mpwc-8jjf |
8.6 (3.1)
|
Harvester's SUSE Virtualization Registration Client Vulnerable to MITM and DOS | 2026-05-06T20:16:08Z | 2026-05-06T20:16:08Z |
| ghsa-7cx3-2qx2-3g6w |
5.4 (3.1)
|
phpMyFAQ's Missing Authorization on Tag Deletion Allows Any Authenticated User to Delete Tags | 2026-05-06T20:12:07Z | 2026-05-06T20:12:07Z |
| ghsa-hpgw-ww76-c68r |
6.5 (3.1)
|
phpMyFAQ has an Authorization Bypass in All Admin Pages Due to Non-Terminating Permission Check | 2026-05-06T20:11:52Z | 2026-05-06T20:11:52Z |
| ghsa-9525-27vj-c8r8 |
7.6 (3.1)
|
phpMyFAQ has stored XSS via Utils::parseUrl() in comment rendering | 2026-05-06T20:10:48Z | 2026-05-06T20:10:48Z |
| ghsa-8hjv-92q9-g4xj |
7.5 (3.1)
|
Micronaut has unbounded `formattersCache` in `TimeConverterRegistrar` that Allows Memory Exhaustion… | 2026-05-06T20:00:22Z | 2026-05-06T20:00:22Z |
| ghsa-3rfq-4wpf-qqw3 |
3.7 (3.1)
|
Micronaut has Unbounded `bundleCache` in `ResourceBundleMessageSource` that Allows Memory Exhaustio… | 2026-05-06T19:57:54Z | 2026-05-06T19:57:54Z |
| ghsa-6447-269v-g68m |
8.8 (4.0)
|
Mezo: ERC-20 bridgeOut burn can be erased by a stale StateDB overwrite leading to full L1 bridge drain | 2026-05-06T19:57:36Z | 2026-05-06T19:57:36Z |
| ghsa-4rm2-28vj-fj39 |
9.4 (3.1)
|
Scramble vulnerable to remote code execution via evaluation of user-controlled input in validation rules | 2026-05-06T19:54:56Z | 2026-05-06T19:54:56Z |
| ghsa-vqv8-j3mj-wjxj |
5.4 (3.1)
|
wger: trainer_login open redirect - ?next= parameter not validated against host | 2026-05-06T19:50:52Z | 2026-05-06T19:50:52Z |
| ghsa-mhc8-p3jx-84mm |
9.9 (3.1)
|
wger: cross-tenant password reset and plaintext disclosure via gym=None bypass | 2026-05-06T19:50:31Z | 2026-05-06T19:50:31Z |
| ghsa-xq9m-hmp9-fw87 |
7.4 (3.1)
|
wger: CSV/TSV formula injection in gym member export (first_name/last_name) | 2026-05-06T19:48:16Z | 2026-05-06T19:48:16Z |
| ghsa-7545-fcxq-7j24 |
7.1 (3.1)
7.8 (4.0)
|
GitPython reference APIs has a path traversal vulnerability that allows arbitrary file write and de… | 2026-05-06T19:38:48Z | 2026-05-08T21:52:16Z |
| ghsa-rpmf-866q-6p89 |
7.5 (3.1)
|
basic-ftp allows a malicious FTP server to cause client-side denial of service via unbounded multil… | 2026-05-06T19:37:33Z | 2026-05-08T21:51:44Z |
| ghsa-3r34-vq8m-39gh |
8.1 (3.1)
|
Lemur: LDAP Filter Injection enables post-authentication privilege escalation | 2026-05-06T19:16:59Z | 2026-05-06T19:16:59Z |
| ghsa-vr7c-r5gj-j3w5 |
6.8 (3.1)
|
Lemur: LDAP Authentication Globally Disables TLS Certificate Verification When LDAP_USE_TLS Is Enabled | 2026-05-06T18:48:12Z | 2026-05-06T18:48:13Z |
| ghsa-vrqv-52x7-rm4v |
5.0 (4.0)
|
Kimai's Twig function config() leaks server-wide secrets (LDAP bind password, SAML SP private key) … | 2026-05-06T18:42:30Z | 2026-05-06T18:42:30Z |
| ghsa-xj8g-6jm5-p9wv |
4.3 (3.1)
|
A vulnerability in the log file download functionality of Cisco Prime Infrastructure could allow an… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-w7jh-xmq5-2m7v |
7.2 (3.1)
|
A vulnerability in the web UI of Cisco Unity Connection Web Inbox could allow an unauthenticated, r… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-rx97-pwc5-6v32 |
4.3 (3.1)
|
A vulnerability in the Lite Agent feature of Cisco Enterprise Chat and Email (ECE) could allow an a… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-rx82-7g7m-r755 |
6.4 (3.1)
|
A vulnerability in the web-based management interface of Cisco IoT Field Network Director could all… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-qwrq-5c2q-3p3m |
4.3 (3.1)
|
A vulnerability in the RADIUS Policy API endpoints of Cisco ISE could allow an authenticated, … | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-qcgm-qmr8-52ww |
8.4 (4.0)
|
Uncontrolled Search Path Element vulnerability in JohnsonControls AC2000 on Windows allows Leveragi… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-m776-2hwc-9x9m |
7.5 (3.1)
|
A vulnerability in the connection-handling mechanism of Cisco Crosswork Network Controller (CNC) an… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-9344-f92h-vr44 |
8.8 (3.1)
|
gopls by default communicates via pipe. However, -port and -listen flags are supported as means of … | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-83ch-55jw-xp9w |
5.4 (3.1)
|
A vulnerability in the REST API of Cisco Slido could have allowed an authenticated, remote attacker… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-7rq4-mv4g-6vcp |
7.7 (3.1)
|
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco 350 Series… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-63pc-j336-8qq4 |
5.3 (3.1)
|
A vulnerability in an identity management API endpoint of Cisco ISE could allow an unauthenticated,… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ghsa-4q4m-pqh7-mj3f |
6.5 (3.1)
|
A vulnerability in the web-based management interface of Cisco IoT Field Network Director could all… | 2026-05-06T18:30:31Z | 2026-05-06T18:30:31Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-184 |
|
Keylime does not enforce that the agent registrar data is the same when the tenant uses i… | keylime | 2022-05-06T17:15:00Z | 2022-05-17T21:40:52.506546Z |
| pysec-2022-187 |
|
TkVideoplayer is a simple library to play video files in tkinter. Uncontrolled memory con… | tkvideoplayer | 2022-05-06T00:15:00Z | 2022-05-17T21:41:01.217686Z |
| pysec-2022-42999 |
|
** DISPUTED ** In the python-libnmap package through 0.7.2 for Python, remote command exe… | python-libnmap | 2022-05-04T22:15:00Z | 2023-05-04T04:29:28.652969Z |
| pysec-2022-183 |
|
Encode OSS httpx <=1.0.0.beta0 is affected by improper input validation in `httpx.URL`, `… | httpx | 2022-04-28T14:15:00Z | 2022-05-17T21:40:52.405453Z |
| pysec-2022-43150 |
7.5 (3.1)
|
Apache Doris, prior to 1.0.0, used a hardcoded key and IV to initialize the cipher used f… | pydoris | 2022-04-26T16:15:00+00:00 | 2022-05-06T13:40:00+00:00 |
| pysec-2022-193 |
|
flask-session-captcha is a package which allows users to extend Flask by adding an image … | flask-session-captcha | 2022-04-25T22:15:00Z | 2022-05-17T23:28:25.264091Z |
| pysec-2022-43167 |
8.8 (3.1)
|
Selenium Server (Grid) before 4 allows CSRF because it permits non-JSON content types suc… | selenium | 2022-04-19T03:15:00+00:00 | 2024-11-21T14:23:01.289420+00:00 |
| pysec-2022-194 |
|
PyPDF2 is an open source python PDF library capable of splitting, merging, cropping, and … | pypdf2 | 2022-04-18T19:15:00Z | 2022-05-17T23:28:27.580433Z |
| pysec-2022-43153 |
5.5 (3.1)
|
Wasm3 0.5.0 has a heap-based buffer overflow in NewCodePage in m3_code.c (called indirect… | pywasm3 | 2022-04-16T16:15:00Z | 2024-11-21T14:23:00.113164Z |
| pysec-2022-192 |
|
django-mfa3 is a library that implements multi factor authentication for the django web f… | django-mfa3 | 2022-04-15T19:15:00Z | 2022-05-17T23:28:24.608119Z |
| pysec-2022-198 |
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In affected… | vyper | 2022-04-13T22:15:00Z | 2022-05-17T23:28:35.566517Z |
| pysec-2022-197 |
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. Versions of… | vyper | 2022-04-13T19:15:00Z | 2022-05-17T23:28:35.533012Z |
| pysec-2022-188 |
|
Apache Superset before 1.4.2 is vulnerable to SQL injection in chart data requests. Users… | apache-superset | 2022-04-13T19:15:00Z | 2022-05-17T23:28:23.962872Z |
| pysec-2022-191 |
|
A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3… | django | 2022-04-12T05:15:00Z | 2022-05-17T23:28:24.874544Z |
| pysec-2022-190 |
|
An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.… | django | 2022-04-12T05:15:00Z | 2022-05-17T23:28:24.739985Z |
| pysec-2022-196 |
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. In version … | vyper | 2022-04-04T18:15:00Z | 2022-05-17T23:28:35.497395Z |
| pysec-2022-195 |
|
Twisted is an event-based framework for internet applications, supporting Python 3.6+. Pr… | twisted | 2022-04-04T18:15:00Z | 2022-05-17T23:28:35.399117Z |
| pysec-2022-189 |
|
A Python format string issue leading to information disclosure and potentially remote cod… | consoleme | 2022-04-01T23:15:00Z | 2022-05-17T23:28:24.480886Z |
| pysec-2022-180 |
|
The Jupyter notebook is a web-based notebook environment for interactive computing. Prior… | notebook | 2022-03-31T23:15:00Z | 2022-04-11T00:47:31.258157Z |
| pysec-2022-178 |
|
Internet Routing Registry daemon version 4 is an IRR database server, processing IRR obje… | irrd | 2022-03-31T23:15:00Z | 2022-04-11T00:47:25.619560Z |
| pysec-2022-176 |
|
Apache DolphinScheduler user registration is vulnerable to Regular express Denial of Serv… | apache-dolphinscheduler | 2022-03-30T10:15:00Z | 2022-04-11T00:47:23.902690Z |
| pysec-2022-174 |
|
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. When… | salt | 2022-03-29T17:15:00Z | 2022-03-29T18:37:44.070893Z |
| pysec-2022-173 |
|
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Job … | salt | 2022-03-29T17:15:00Z | 2022-03-29T18:37:44.021549Z |
| pysec-2022-172 |
|
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. A mi… | salt | 2022-03-29T17:15:00Z | 2022-03-29T18:37:43.967592Z |
| pysec-2022-171 |
|
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Salt… | salt | 2022-03-29T17:15:00Z | 2022-03-29T18:37:43.897944Z |
| pysec-2022-168 |
|
Pillow before 9.0.1 allows attackers to delete files because spaces in temporary pathname… | pillow | 2022-03-28T02:15:00Z | 2022-03-28T05:28:10.602682Z |
| pysec-2022-43141 |
7.5 (3.1)
|
MotionEye v0.42.1 and below allows attackers to access sensitive information via a GET re… | motioneye | 2022-03-24T17:15:00+00:00 | 2024-11-21T14:22:55.422153+00:00 |
| pysec-2022-175 |
|
Insecure Temporary File in GitHub repository horovod/horovod prior to 0.24.0. | horovod | 2022-03-24T09:15:00Z | 2022-03-31T20:31:44.168006Z |
| pysec-2022-179 |
|
The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints… | jupyter-server | 2022-03-23T21:15:00Z | 2022-04-11T00:47:25.682046Z |
| pysec-2022-234 |
|
Poetry v1.1.9 and below was discovered to contain an untrusted search path which causes t… | poetry | 2022-03-21T22:15:00Z | 2023-05-25T05:07:00Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2459 | Malicious code in strapi-plugin-debug-tools (npm) | 2026-04-03T19:10:16Z | 2026-04-07T16:38:18Z |
| mal-2026-2455 | Malicious code in strapi-plugin-content-sync (npm) | 2026-04-03T19:09:53Z | 2026-04-07T16:38:18Z |
| mal-2026-2453 | Malicious code in strapi-plugin-cms-tools (npm) | 2026-04-03T19:09:34Z | 2026-04-07T16:38:18Z |
| mal-2026-2466 | Malicious code in strapi-plugin-hextest (npm) | 2026-04-03T19:09:14Z | 2026-04-07T16:38:18Z |
| mal-2026-2461 | Malicious code in strapi-plugin-finseven (npm) | 2026-04-03T19:08:49Z | 2026-04-07T16:38:18Z |
| mal-2026-2471 | Malicious code in strapi-plugin-nordica (npm) | 2026-04-03T19:08:46Z | 2026-04-07T16:38:18Z |
| mal-2026-2474 | Malicious code in strapi-plugin-nordica-deep (npm) | 2026-04-03T19:06:00Z | 2026-04-07T16:38:18Z |
| mal-2026-2480 | Malicious code in strapi-plugin-nordica-vhost (npm) | 2026-04-03T19:05:57Z | 2026-04-07T16:38:18Z |
| mal-2026-2477 | Malicious code in strapi-plugin-nordica-stage (npm) | 2026-04-03T19:05:39Z | 2026-04-07T16:38:18Z |
| mal-2026-2476 | Malicious code in strapi-plugin-nordica-recon (npm) | 2026-04-03T19:05:26Z | 2026-04-07T16:38:18Z |
| mal-2026-2472 | Malicious code in strapi-plugin-nordica-api (npm) | 2026-04-03T19:05:08Z | 2026-04-07T16:38:18Z |
| mal-2026-2473 | Malicious code in strapi-plugin-nordica-cms (npm) | 2026-04-03T19:04:49Z | 2026-04-07T16:38:18Z |
| mal-2026-2478 | Malicious code in strapi-plugin-nordica-sync (npm) | 2026-04-03T19:04:46Z | 2026-04-07T16:38:18Z |
| mal-2026-2475 | Malicious code in strapi-plugin-nordica-lite (npm) | 2026-04-03T19:04:32Z | 2026-04-07T16:38:18Z |
| mal-2026-2479 | Malicious code in strapi-plugin-nordica-tools (npm) | 2026-04-03T19:04:28Z | 2026-04-07T16:38:18Z |
| mal-2026-2484 | Malicious code in strapi-plugin-sitemap-gen (npm) | 2026-04-03T19:04:21Z | 2026-04-07T16:38:18Z |
| mal-2026-2468 | Malicious code in strapi-plugin-locale (npm) | 2026-04-03T17:28:57Z | 2026-04-07T16:38:18Z |
| mal-2026-2451 | Malicious code in strapi-plugin-api (npm) | 2026-04-03T17:27:21Z | 2026-04-07T16:38:18Z |
| mal-2026-2481 | Malicious code in strapi-plugin-notify (npm) | 2026-04-03T17:27:10Z | 2026-04-07T16:38:18Z |
| mal-2026-2462 | Malicious code in strapi-plugin-form (npm) | 2026-04-03T17:26:57Z | 2026-04-07T16:38:18Z |
| mal-2026-2482 | Malicious code in strapi-plugin-seed (npm) | 2026-04-03T17:24:36Z | 2026-04-07T16:38:18Z |
| mal-2026-2485 | Malicious code in strapi-plugin-sync (npm) | 2026-04-03T17:24:04Z | 2026-04-07T15:47:31Z |
| mal-2026-2464 | Malicious code in strapi-plugin-health (npm) | 2026-04-03T17:23:49Z | 2026-04-07T15:47:31Z |
| mal-2026-2469 | Malicious code in strapi-plugin-logger (npm) | 2026-04-03T16:13:59Z | 2026-04-07T15:47:31Z |
| mal-2026-2470 | Malicious code in strapi-plugin-monitor (npm) | 2026-04-03T16:13:14Z | 2026-04-07T16:38:18Z |
| mal-2026-2467 | Malicious code in strapi-plugin-hooks (npm) | 2026-04-03T16:11:54Z | 2026-04-07T15:47:31Z |
| mal-2026-2456 | Malicious code in strapi-plugin-core (npm) | 2026-04-03T16:11:29Z | 2026-04-07T15:47:31Z |
| mal-2026-2458 | Malicious code in strapi-plugin-database (npm) | 2026-04-03T16:11:12Z | 2026-04-07T15:47:31Z |
| mal-2026-2483 | Malicious code in strapi-plugin-server (npm) | 2026-04-03T16:10:54Z | 2026-04-07T14:41:25Z |
| mal-2026-2454 | Malicious code in strapi-plugin-config (npm) | 2026-04-03T16:10:23Z | 2026-04-07T15:47:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1313 | PaloAlto Networks PAN-OS: Mehrere Schwachstellen | 2025-06-11T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1312 | libxml2: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-06-11T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1311 | QT: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-06-11T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1310 | PaloAlto Networks GlobalProtect: Mehrere Schwachstellen | 2025-06-11T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1309 | IBM Tivoli Netcool/OMNIbus: Schwachstelle ermöglicht Denial of Service | 2025-06-11T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1308 | Mitel MiCollab: Schwachstelle ermöglicht Offenlegung von Informationen und Administrative Zugriffe | 2025-06-11T22:00:00.000+00:00 | 2025-06-24T22:00:00.000+00:00 |
| wid-sec-w-2025-1307 | Mitel OpenScape Accounting Management: Schwachstelle ermöglicht Codeausführung | 2025-06-11T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1306 | PaloAlto Networks Cortex XSOAR: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-11T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1305 | Microsoft 365 Copilot: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-11T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1304 | IBM Security Guardium: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-11T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1303 | Perl (IBM AIX): Schwachstelle ermöglicht Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1302 | Kibana: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1301 | Mozilla Thunderbird: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2025-06-10T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1300 | Insyde UEFI Firmware: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1299 | Apache CloudStack: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1298 | AMD Prozessoren: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-06-10T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1297 | Mozilla Firefox: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1296 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1295 | Fortinet FortiOS und FortiProxy: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1294 | GeoServer: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1293 | IBM DataPower Gateway: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1292 | Trend Micro Apex Central: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1291 | Pixel Patchday Juni 2025: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1290 | Fortinet FortiOS, FortiProxy, FortiWeb: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1289 | Fortinet FortiClient EMS: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1288 | IBM Security Verify Access: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1287 | Adobe Creative Cloud Anwendungen: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1286 | Fortinet FortiClient Windows: Schwachstelle ermöglicht Manipulation | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1285 | Adobe Experience Manager: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2025-06-10T22:00:00.000+00:00 | 2025-07-24T22:00:00.000+00:00 |
| wid-sec-w-2025-1284 | Adobe Magento: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-179-03 | Yokogawa FAST/TOOLS and CI Server | 2024-06-27T06:00:00.000000Z | 2024-06-27T06:00:00.000000Z |
| icsa-24-179-02 | SDG Technologies PnPSCADA | 2024-06-27T06:00:00.000000Z | 2024-06-27T06:00:00.000000Z |
| icsa-24-179-01 | TELSAT marKoni FM Transmitter | 2024-06-27T06:00:00.000000Z | 2024-06-27T06:00:00.000000Z |
| icsa-24-177-02 | PTC Creo Elements/Direct License Server (Update A) | 2024-06-25T06:00:00.000000Z | 2024-07-02T06:00:00.000000Z |
| icsa-24-177-01 | ABB 800xA Base | 2024-06-25T06:00:00.000000Z | 2024-06-25T06:00:00.000000Z |
| icsa-24-172-03 | Westermo L210-F2G | 2024-06-20T06:00:00.000000Z | 2024-06-20T06:00:00.000000Z |
| icsa-24-172-02 | CAREL Boss-Mini | 2024-06-20T06:00:00.000000Z | 2024-06-20T06:00:00.000000Z |
| icsa-24-172-01 | Yokogawa CENTUM | 2024-06-20T06:00:00.000000Z | 2024-06-20T06:00:00.000000Z |
| icsa-24-170-01 | RAD Data Communications SecFlow-2 | 2024-06-18T06:00:00.000000Z | 2024-06-18T06:00:00.000000Z |
| icsa-24-165-19 | Motorola Solutions Vigilant License Plate Readers | 2024-06-13T06:00:00.000000Z | 2024-06-13T06:00:00.000000Z |
| icsa-24-165-18 | Rockwell Automation FactoryTalk View SE | 2024-06-13T06:00:00.000000Z | 2024-06-13T06:00:00.000000Z |
| icsa-24-165-17 | Rockwell Automation FactoryTalk View SE | 2024-06-13T06:00:00.000000Z | 2024-06-13T06:00:00.000000Z |
| icsa-24-165-16 | Rockwell Automation FactoryTalk View SE | 2024-06-13T06:00:00.000000Z | 2024-06-13T06:00:00.000000Z |
| icsa-24-165-14 | Fuji Electric Tellus Lite V-Simulator | 2024-06-13T06:00:00.000000Z | 2024-06-13T06:00:00.000000Z |
| icsa-25-063-05 | Hitachi Energy UNEM/ECST | 2024-06-11T12:30:00.000000Z | 2024-06-11T12:30:00.000000Z |
| icsa-25-063-04 | Hitachi Energy XMC20 | 2024-06-11T12:30:00.000000Z | 2024-06-11T12:30:00.000000Z |
| icsa-25-030-01 | Hitachi Energy UNEM | 2024-06-11T12:30:00.000000Z | 2024-06-11T12:30:00.000000Z |
| icsa-25-016-07 | Hitachi Energy FOX61x Products | 2024-06-11T12:30:00.000000Z | 2024-06-11T12:30:00.000000Z |
| icsa-25-016-06 | Hitachi Energy FOX61x, FOXCST, and FOXMAN-UN Products | 2024-06-11T12:30:00.000000Z | 2024-06-11T12:30:00.000000Z |
| icsa-25-014-01 | Hitachi Energy FOXMAN-UN | 2024-06-11T12:30:00.000000Z | 2024-10-29T13:30:00.000000Z |
| icsma-24-163-01 | MicroDicom DICOM Viewer | 2024-06-11T06:00:00.000000Z | 2024-06-11T06:00:00.000000Z |
| icsa-24-163-04 | Intrado 911 Emergency Gateway | 2024-06-11T06:00:00.000000Z | 2024-06-11T06:00:00.000000Z |
| icsa-24-163-03 | AVEVA PI Asset Framework Client | 2024-06-11T06:00:00.000000Z | 2024-06-11T06:00:00.000000Z |
| icsa-24-163-02 | AVEVA PI Web API | 2024-06-11T06:00:00.000000Z | 2024-06-11T06:00:00.000000Z |
| icsa-24-163-01 | Rockwell Automation ControlLogix, GuardLogix, and CompactLogix | 2024-06-11T06:00:00.000000Z | 2024-06-11T06:00:00.000000Z |
| icsa-25-254-09 | Schneider Electric Modicon M340, BMXNOE0100, and BMXNOE0110 | 2024-06-11T00:00:00.000000Z | 2025-08-12T04:00:00.000000Z |
| icsa-25-107-02 | Schneider Electric Sage Series | 2024-06-11T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-24-331-02 | Schneider Electric PowerLogic P5 | 2024-06-11T00:00:00.000000Z | 2024-09-10T00:00:00.000000Z |
| icsa-24-165-13 | Siemens SINEC Traffic Analyzer | 2024-06-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-165-12 | Siemens SCALANCE W700 | 2024-06-11T00:00:00.000000Z | 2025-01-14T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-asa-ftd-dos-jxywmjyl | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Transparent Mode Denial of Service Vulnerability | 2021-10-27T16:00:00+00:00 | 2021-10-27T16:00:00+00:00 |
| cisco-sa-webex-2fmkd7t | Cisco Webex Software Application Authorization Bypass Vulnerability | 2021-10-20T16:00:00+00:00 | 2021-10-20T16:00:00+00:00 |
| cisco-sa-tms-xss-cwjzjsqc | Cisco TelePresence Management Suite Stored Cross-Site Scripting Vulnerability | 2021-10-20T16:00:00+00:00 | 2021-10-20T16:00:00+00:00 |
| cisco-sa-sec-work-xss-t6sytu8q | Cisco Tetration Stored Cross-Site Scripting Vulnerability | 2021-10-20T16:00:00+00:00 | 2021-10-20T16:00:00+00:00 |
| cisco-sa-sd-wan-rhpbe34a | Cisco IOS XE SD-WAN Software Command Injection Vulnerability | 2021-10-20T16:00:00+00:00 | 2022-02-17T18:13:49+00:00 |
| cisco-sa-ise-xss1-rgxyry2v | Cisco Identity Services Engine Cross-Site Scripting Vulnerabilities | 2021-10-20T16:00:00+00:00 | 2021-11-12T18:15:57+00:00 |
| cisco-sa-ise-file-download-b3br5kqa | Cisco Identity Services Engine File Download Vulnerability | 2021-10-20T16:00:00+00:00 | 2021-10-20T16:00:00+00:00 |
| cisco-sa-imc-gui-dos-tzjrfyzh | Cisco Integrated Management Controller GUI Denial of Service Vulnerability | 2021-10-20T16:00:00+00:00 | 2021-10-20T16:00:00+00:00 |
| cisco-sa-cms-lahe8z5v | Cisco Meeting Server Call Bridge Denial of Service Vulnerability | 2021-10-20T16:00:00+00:00 | 2021-12-22T17:29:02+00:00 |
| cisco-sa-apache-httpd-pathtrv-lazg68cz | Apache HTTP Server Vulnerabilities: October 2021 | 2021-10-07T16:00:00+00:00 | 2021-10-07T16:00:00+00:00 |
| cisco-sa-wsa-dos-fmhdkswk | Cisco Web Security Appliance Proxy Service Denial of Service Vulnerability | 2021-10-06T16:00:00+00:00 | 2021-10-22T15:18:37+00:00 |
| cisco-sa-ucsi2-command-inject-cgyc8y2r | Cisco Intersight Virtual Appliance Command Injection Vulnerability | 2021-10-06T16:00:00+00:00 | 2021-10-06T16:00:00+00:00 |
| cisco-sa-tpce-rmos-mem-dos-rck56tt | Cisco TelePresence Collaboration Endpoint and RoomOS Software Denial of Service Vulnerability | 2021-10-06T16:00:00+00:00 | 2021-10-15T21:03:56+00:00 |
| cisco-sa-ssm-priv-esc-5g35cddj | Cisco Smart Software Manager Privilege Escalation Vulnerability | 2021-10-06T16:00:00+00:00 | 2021-10-06T16:00:00+00:00 |
| cisco-sa-sb220-lldp-multivuls-mvrutq8t | Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities | 2021-10-06T16:00:00+00:00 | 2022-01-13T21:37:56+00:00 |
| cisco-sa-sb-hardcoded-cred-mjcexvx | Cisco Business 220 Series Smart Switches Static Key and Password Vulnerabilities | 2021-10-06T16:00:00+00:00 | 2021-10-06T16:00:00+00:00 |
| cisco-sa-ise-xxe-inj-v4vsjesx | Cisco Identity Services Engine XML External Entity Injection Vulnerability | 2021-10-06T16:00:00+00:00 | 2021-10-06T16:00:00+00:00 |
| cisco-sa-ise-priv-esc-uwqprbm3 | Cisco Identity Services Engine Privilege Escalation Vulnerability | 2021-10-06T16:00:00+00:00 | 2021-10-11T16:18:56+00:00 |
| cisco-sa-ise-info-disc-pnxtlhdp | Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability | 2021-10-06T16:00:00+00:00 | 2021-10-06T16:00:00+00:00 |
| cisco-sa-ipphone-arbfileread-npdte2ow | Cisco IP Phone Software Arbitrary File Read Vulnerability | 2021-10-06T16:00:00+00:00 | 2021-10-14T13:57:39+00:00 |
| cisco-sa-esa-url-bypass-sgcfsdrp | Cisco Email Security Appliance URL Filtering Bypass Vulnerability | 2021-10-06T16:00:00+00:00 | 2021-10-06T16:00:00+00:00 |
| cisco-sa-dnac-infodisc-kyc6yncs | Cisco DNA Center Information Disclosure Vulnerability | 2021-10-06T16:00:00+00:00 | 2021-10-06T16:00:00+00:00 |
| cisco-sa-cvdsd-xss-fvdj6hk | Cisco Vision Dynamic Signage Director Reflected Cross-Site Scripting Vulnerability | 2021-10-06T16:00:00+00:00 | 2021-10-15T21:45:49+00:00 |
| cisco-sa-ata19x-multivuln-a4j57f3 | Cisco ATA 190 Series Analog Telephone Adapter Software Vulnerabilities | 2021-10-06T16:00:00+00:00 | 2021-10-22T15:03:27+00:00 |
| cisco-sa-anyconnect-lib-hija-cafb7x4q | Cisco AnyConnect Secure Mobility Client for Linux and Mac OS with VPN Posture (HostScan) Module Shared Library Hijacking Vulnerability | 2021-10-06T16:00:00+00:00 | 2021-10-06T16:00:00+00:00 |
| cisco-sa-amp-redirect-rq2bu7du | Cisco Orbital Open Redirect Vulnerability | 2021-10-06T16:00:00+00:00 | 2021-10-06T16:00:00+00:00 |
| cisco-sa-zbfw-tguguyq | Cisco IOS XE Software Protection Against Distributed Denial of Service Attacks Feature Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-zbfw-pp9jfzwl | Cisco IOS XE Software Zone-Based Policy Firewall ICMP and UDP Inspection Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-trustsec-dos-7fuxdr2 | Cisco IOS and IOS XE Software TrustSec CLI Parser Denial of Service Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-sdwan-maapi-privesc-ksug7qss | Cisco IOS XE SD-WAN Software Command Injection Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-4176 | Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from 5.43.0 before 5.43.9 contain a vulnerable version of Compress::Raw::Zlib | 2026-03-02T00:00:00.000Z | 2026-04-15T01:41:11.000Z |
| msrc_cve-2026-4159 | wc_PKCS7_DecodeEnvelopedData 1 byte out-of-bounds read | 2026-03-02T00:00:00.000Z | 2026-04-30T01:43:47.000Z |
| msrc_cve-2026-4111 | Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive | 2026-03-02T00:00:00.000Z | 2026-03-18T14:36:47.000Z |
| msrc_cve-2026-4105 | Systemd: systemd: privilege escalation via improper access control in registermachine d-bus method | 2026-03-02T00:00:00.000Z | 2026-04-01T14:36:30.000Z |
| msrc_cve-2026-4046 | iconv crash due to assertion failure with untrusted input | 2026-03-02T00:00:00.000Z | 2026-04-02T01:01:22.000Z |
| msrc_cve-2026-3904 | CVE-2026-3904 | 2026-03-02T00:00:00.000Z | 2026-03-27T01:38:14.000Z |
| msrc_cve-2026-3849 | Buffer Overflow in HPKE via Oversized ECH Config | 2026-03-02T00:00:00.000Z | 2026-04-22T01:39:34.000Z |
| msrc_cve-2026-3805 | use after free in SMB connection reuse | 2026-03-02T00:00:00.000Z | 2026-03-26T01:38:04.000Z |
| msrc_cve-2026-3784 | wrong proxy connection reuse with credentials | 2026-03-02T00:00:00.000Z | 2026-04-29T01:43:59.000Z |
| msrc_cve-2026-3783 | token leak with redirect and netrc | 2026-03-02T00:00:00.000Z | 2026-04-29T01:43:47.000Z |
| msrc_cve-2026-3731 | libssh SFTP Extension Name sftp.c sftp_extensions_get_data out-of-bounds | 2026-03-02T00:00:00.000Z | 2026-05-01T01:38:14.000Z |
| msrc_cve-2026-3713 | pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow | 2026-03-02T00:00:00.000Z | 2026-04-29T14:57:51.000Z |
| msrc_cve-2026-3644 | Incomplete control character validation in http.cookies | 2026-03-02T00:00:00.000Z | 2026-04-15T01:42:33.000Z |
| msrc_cve-2026-3634 | Libsoup: libsoup: http header injection and response splitting via crlf injection in content-type header | 2026-03-02T00:00:00.000Z | 2026-04-14T14:41:33.000Z |
| msrc_cve-2026-3633 | Libsoup: libsoup: header and http request injection via crlf injection | 2026-03-02T00:00:00.000Z | 2026-04-14T14:41:43.000Z |
| msrc_cve-2026-3632 | Libsoup: libsoup: http smuggling and server-side request forgery via malformed hostnames | 2026-03-02T00:00:00.000Z | 2026-04-14T14:41:38.000Z |
| msrc_cve-2026-3591 | A stack use-after-return flaw in SIG(0) handling code may enable ACL bypass | 2026-03-02T00:00:00.000Z | 2026-03-31T14:59:36.000Z |
| msrc_cve-2026-3580 | Compiler-induced timing leak in sp_256_get_entry_256_9 on RISC-V | 2026-03-02T00:00:00.000Z | 2026-04-30T01:43:33.000Z |
| msrc_cve-2026-3579 | Non-constant time multiplication subroutine __muldi3 on RISC-V RV32I | 2026-03-02T00:00:00.000Z | 2026-04-22T01:39:23.000Z |
| msrc_cve-2026-3549 | ECH parsing heap buffer overflow | 2026-03-02T00:00:00.000Z | 2026-03-27T01:42:32.000Z |
| msrc_cve-2026-3548 | Buffer overflow in CRL number parsing in wolfSSL | 2026-03-02T00:00:00.000Z | 2026-03-27T01:42:24.000Z |
| msrc_cve-2026-3547 | wolfSSL: out-of-bounds read (DoS) in ALPN parsing due to incomplete validation | 2026-03-02T00:00:00.000Z | 2026-03-27T01:42:40.000Z |
| msrc_cve-2026-3503 | Fault injection attack with ML-DSA and ML-KEM on ARM | 2026-03-02T00:00:00.000Z | 2026-04-22T01:39:17.000Z |
| msrc_cve-2026-3494 | MariaDB Server Audit Plugin Comment Handling Bypass | 2026-03-02T00:00:00.000Z | 2026-03-14T01:37:11.000Z |
| msrc_cve-2026-3479 | pkgutil.get_data() does not enforce documented restrictions | 2026-03-02T00:00:00.000Z | 2026-04-22T01:38:01.000Z |
| msrc_cve-2026-34714 | CVE-2026-34714 | 2026-03-02T00:00:00.000Z | 2026-04-08T01:37:47.000Z |
| msrc_cve-2026-34353 | CVE-2026-34353 | 2026-03-02T00:00:00.000Z | 2026-04-01T01:57:48.000Z |
| msrc_cve-2026-34085 | CVE-2026-34085 | 2026-03-02T00:00:00.000Z | 2026-04-22T01:41:08.000Z |
| msrc_cve-2026-34073 | cryptography has incomplete DNS name constraint enforcement on peer names | 2026-03-02T00:00:00.000Z | 2026-04-30T01:48:15.000Z |
| msrc_cve-2026-34043 | Serialize JavaScript has CPU Exhaustion Denial of Service via crafted array-like objects | 2026-03-02T00:00:00.000Z | 2026-04-30T01:46:20.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20003-1 | Security update of valkey | 2026-01-07T09:43:28Z | 2026-01-07T09:43:28Z |
| opensuse-su-2026:10015-1 | libwget4-2.2.1-1.1 on GA media | 2026-01-07T00:00:00Z | 2026-01-07T00:00:00Z |
| opensuse-su-2026:10014-1 | python311-cbor2-5.8.0-2.1 on GA media | 2026-01-07T00:00:00Z | 2026-01-07T00:00:00Z |
| opensuse-su-2026:10013-1 | apptainer-1.4.5-1.1 on GA media | 2026-01-07T00:00:00Z | 2026-01-07T00:00:00Z |
| opensuse-su-2026:10012-1 | ImageMagick-7.1.2.12-1.1 on GA media | 2026-01-07T00:00:00Z | 2026-01-07T00:00:00Z |
| opensuse-su-2026:10011-1 | python314-3.14.2-1.1 on GA media | 2026-01-06T00:00:00Z | 2026-01-06T00:00:00Z |
| opensuse-su-2026:10010-1 | python311-filelock-3.20.2-1.1 on GA media | 2026-01-06T00:00:00Z | 2026-01-06T00:00:00Z |
| opensuse-su-2026:10009-1 | log4j-2.20.0-1.1 on GA media | 2026-01-06T00:00:00Z | 2026-01-06T00:00:00Z |
| opensuse-su-2026:10008-1 | gpsd-3.27.3-1.1 on GA media | 2026-01-06T00:00:00Z | 2026-01-06T00:00:00Z |
| opensuse-su-2026:10007-1 | c-ares-devel-1.34.6-1.1 on GA media | 2026-01-06T00:00:00Z | 2026-01-06T00:00:00Z |
| opensuse-su-2026:10006-1 | dcmtk-3.7.0-1.1 on GA media | 2026-01-05T00:00:00Z | 2026-01-05T00:00:00Z |
| opensuse-su-2026:10005-1 | python312-Django6-6.0-1.1 on GA media | 2026-01-03T00:00:00Z | 2026-01-03T00:00:00Z |
| opensuse-su-2026:10004-1 | fluidsynth-2.5.2-1.1 on GA media | 2026-01-03T00:00:00Z | 2026-01-03T00:00:00Z |
| opensuse-su-2026:20001-1 | Security update for sssd | 2026-01-02T16:58:16Z | 2026-01-02T16:58:16Z |
| opensuse-su-2026:20002-1 | Security update for MozillaThunderbird | 2026-01-02T12:14:18Z | 2026-01-02T12:14:18Z |
| opensuse-su-2026:10003-1 | python311-marshmallow-3.26.2-1.1 on GA media | 2026-01-02T00:00:00Z | 2026-01-02T00:00:00Z |
| opensuse-su-2026:10002-1 | libmatio-devel-1.5.29-1.1 on GA media | 2026-01-01T00:00:00Z | 2026-01-01T00:00:00Z |
| opensuse-su-2026:10001-1 | dirmngr-2.5.16-1.1 on GA media | 2026-01-01T00:00:00Z | 2026-01-01T00:00:00Z |
| opensuse-su-2026:10000-1 | gnu-recutils-1.9-3.1 on GA media | 2026-01-01T00:00:00Z | 2026-01-01T00:00:00Z |
| opensuse-su-2025:15854-1 | kepler-0.11.3-1.1 on GA media | 2025-12-31T00:00:00Z | 2025-12-31T00:00:00Z |
| opensuse-su-2025:20130-1 | Security update for bash-git-prompt | 2025-12-30T17:08:26Z | 2025-12-30T17:08:26Z |
| opensuse-su-2025:20121-1 | Security update for redis | 2025-12-30T17:05:45Z | 2025-12-30T17:05:45Z |
| opensuse-su-2025:20155-1 | Security update for exim | 2025-12-30T17:02:44Z | 2025-12-30T17:02:44Z |
| opensuse-su-2025:20128-1 | Security update for shadowsocks-v2ray-plugin, v2ray-core | 2025-12-30T17:02:04Z | 2025-12-30T17:02:04Z |
| opensuse-su-2025:20097-1 | Security update for helmfile | 2025-12-30T17:00:02Z | 2025-12-30T17:00:02Z |
| opensuse-su-2025:20178-1 | Security update for chromium | 2025-12-30T16:56:53Z | 2025-12-30T16:56:53Z |
| opensuse-su-2025:15853-1 | weblate-5.14.3-2.1 on GA media | 2025-12-30T00:00:00Z | 2025-12-30T00:00:00Z |
| opensuse-su-2025:15852-1 | trivy-0.68.2-1.1 on GA media | 2025-12-29T00:00:00Z | 2025-12-29T00:00:00Z |
| opensuse-su-2025:15851-1 | python313-3.13.11-1.1 on GA media | 2025-12-29T00:00:00Z | 2025-12-29T00:00:00Z |
| opensuse-su-2025:15850-1 | python312-3.12.12-4.1 on GA media | 2025-12-29T00:00:00Z | 2025-12-29T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:5907 | Red Hat Security Advisory: OpenShift Container Platform 4.17.52 bug fix and security update | 2026-04-01T03:47:45+00:00 | 2026-05-09T00:12:27+00:00 |
| rhsa-2026:6311 | Red Hat Security Advisory: nginx security update | 2026-04-01T02:29:52+00:00 | 2026-04-23T06:08:46+00:00 |
| rhsa-2026:6310 | Red Hat Security Advisory: kernel security update | 2026-04-01T01:15:17+00:00 | 2026-04-27T19:41:41+00:00 |
| rhsa-2026:6309 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2026-03-31T23:31:56+00:00 | 2026-05-08T03:02:44+00:00 |
| rhsa-2026:6308 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update | 2026-03-31T22:34:16+00:00 | 2026-05-08T03:02:48+00:00 |
| rhsa-2026:6302 | Red Hat Security Advisory: nginx:1.24 security update | 2026-03-31T22:05:06+00:00 | 2026-04-23T06:08:46+00:00 |
| rhsa-2026:6301 | Red Hat Security Advisory: squid security update | 2026-03-31T20:09:21+00:00 | 2026-04-30T02:54:08+00:00 |
| rhsa-2026:6300 | Red Hat Security Advisory: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update | 2026-03-31T19:50:01+00:00 | 2026-04-28T14:08:21+00:00 |
| rhsa-2026:6285 | Red Hat Security Advisory: python3.12 security update | 2026-03-31T17:26:23+00:00 | 2026-05-05T20:29:27+00:00 |
| rhsa-2026:6286 | Red Hat Security Advisory: python3.11 security update | 2026-03-31T17:26:16+00:00 | 2026-05-05T20:29:20+00:00 |
| rhsa-2026:6283 | Red Hat Security Advisory: python3.12 security update | 2026-03-31T17:06:33+00:00 | 2026-05-05T20:29:24+00:00 |
| rhsa-2026:6292 | Red Hat Security Advisory: General availability of the satellite/iop-insights-engine-rhel9 container image | 2026-03-31T16:56:51+00:00 | 2026-05-10T13:39:21+00:00 |
| rhsa-2026:6291 | Red Hat Security Advisory: General availability of the satellite/iop-advisor-backend-rhel9 container image | 2026-03-31T16:56:50+00:00 | 2026-05-07T17:11:05+00:00 |
| rhsa-2026:6288 | Red Hat Security Advisory: General availability of the satellite/iop-remediations-rhel9 container image | 2026-03-31T16:45:29+00:00 | 2026-05-08T03:02:42+00:00 |
| rhsa-2026:6287 | Red Hat Security Advisory: General availability of the satellite/iop-advisor-frontend-rhel9 container image | 2026-03-31T16:45:05+00:00 | 2026-05-10T13:39:21+00:00 |
| rhsa-2026:6281 | Red Hat Security Advisory: python3.11 security update | 2026-03-31T16:39:52+00:00 | 2026-05-05T20:29:25+00:00 |
| rhsa-2026:6278 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2026-03-31T16:23:06+00:00 | 2026-05-10T08:56:50+00:00 |
| rhsa-2026:6277 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Product Security and Bug Fix Update | 2026-03-31T16:12:45+00:00 | 2026-05-10T08:56:50+00:00 |
| rhsa-2026:6268 | Red Hat Security Advisory: 389-ds:1.4 security update | 2026-03-31T15:37:55+00:00 | 2026-03-31T17:31:28+00:00 |
| rhsa-2026:6266 | Red Hat Security Advisory: libxslt security update | 2026-03-31T14:49:35+00:00 | 2026-04-29T18:27:14+00:00 |
| rhsa-2026:6259 | Red Hat Security Advisory: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update | 2026-03-31T13:11:45+00:00 | 2026-04-28T14:08:20+00:00 |
| rhsa-2026:6256 | Red Hat Security Advisory: python3.12 security update | 2026-03-31T09:59:24+00:00 | 2026-05-05T20:29:22+00:00 |
| rhsa-2026:6253 | Red Hat Security Advisory: python3.11 security update | 2026-03-31T09:11:44+00:00 | 2026-04-23T23:44:29+00:00 |
| rhsa-2026:6251 | Red Hat Security Advisory: Red Hat OpenShift API for Data Protection | 2026-03-31T07:30:54+00:00 | 2026-05-10T08:56:50+00:00 |
| rhsa-2026:6234 | Red Hat Security Advisory: nginx security update | 2026-03-31T04:54:48+00:00 | 2026-04-23T06:08:43+00:00 |
| rhsa-2026:6235 | Red Hat Security Advisory: nginx security update | 2026-03-31T04:46:48+00:00 | 2026-04-23T06:08:43+00:00 |
| rhsa-2026:6226 | Red Hat Security Advisory: Multicluster Global Hub 1.6.2 security update | 2026-03-31T02:53:32+00:00 | 2026-05-10T08:56:50+00:00 |
| rhsa-2026:6220 | Red Hat Security Advisory: 389-ds-base security update | 2026-03-31T00:30:42+00:00 | 2026-03-31T17:31:35+00:00 |
| rhsa-2026:6206 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-03-30T18:30:07+00:00 | 2026-04-19T19:40:52+00:00 |
| rhsa-2026:6193 | Red Hat Security Advisory: kernel security update | 2026-03-30T16:23:36+00:00 | 2026-04-22T13:40:30+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1000-1 | Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5) | 2026-03-25T07:08:02Z | 2026-03-25T07:08:02Z |
| suse-su-2026:20944-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 16) | 2026-03-25T06:46:04Z | 2026-03-25T06:46:04Z |
| suse-su-2026:20837-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 16) | 2026-03-25T06:46:04Z | 2026-03-25T06:46:04Z |
| suse-su-2026:20943-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-03-25T05:44:30Z | 2026-03-25T05:44:30Z |
| suse-su-2026:20836-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-03-25T05:44:30Z | 2026-03-25T05:44:30Z |
| suse-su-2026:20930-1 | Security update for python-pyOpenSSL | 2026-03-25T03:41:42Z | 2026-03-25T03:41:42Z |
| suse-su-2026:20929-1 | Security update for python-pyasn1 | 2026-03-25T03:09:46Z | 2026-03-25T03:09:46Z |
| suse-su-2026:20835-1 | Security update for python-pyasn1 | 2026-03-25T03:09:46Z | 2026-03-25T03:09:46Z |
| suse-su-2026:20942-1 | Security update for the initial kernel livepatch | 2026-03-24T20:36:24Z | 2026-03-24T20:36:24Z |
| suse-su-2026:20834-1 | Security update for the initial kernel livepatch | 2026-03-24T20:36:24Z | 2026-03-24T20:36:24Z |
| suse-su-2026:20928-1 | Security update for python-black | 2026-03-24T19:40:56Z | 2026-03-24T19:40:56Z |
| suse-su-2026:20927-1 | Security update for 389-ds | 2026-03-24T17:50:31Z | 2026-03-24T17:50:31Z |
| suse-su-2026:20889-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:44Z | 2026-03-24T16:49:44Z |
| suse-su-2026:20888-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:44Z | 2026-03-24T16:49:44Z |
| suse-su-2026:20866-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:44Z | 2026-03-24T16:49:44Z |
| suse-su-2026:20865-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:44Z | 2026-03-24T16:49:44Z |
| suse-su-2026:20887-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:34Z | 2026-03-24T16:49:34Z |
| suse-su-2026:20886-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:34Z | 2026-03-24T16:49:34Z |
| suse-su-2026:20864-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:34Z | 2026-03-24T16:49:34Z |
| suse-su-2026:20863-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:34Z | 2026-03-24T16:49:34Z |
| suse-su-2026:20885-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:25Z | 2026-03-24T16:49:25Z |
| suse-su-2026:20884-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:25Z | 2026-03-24T16:49:25Z |
| suse-su-2026:20862-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:25Z | 2026-03-24T16:49:25Z |
| suse-su-2026:20861-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:25Z | 2026-03-24T16:49:25Z |
| suse-su-2026:20883-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:13Z | 2026-03-24T16:49:13Z |
| suse-su-2026:20882-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:13Z | 2026-03-24T16:49:13Z |
| suse-su-2026:20860-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:13Z | 2026-03-24T16:49:13Z |
| suse-su-2026:20859-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:13Z | 2026-03-24T16:49:13Z |
| suse-su-2026:20881-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:03Z | 2026-03-24T16:49:03Z |
| suse-su-2026:20880-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:49:03Z | 2026-03-24T16:49:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:11748 | Important: firefox security update | 2025-07-24T00:00:00Z | 2025-07-30T15:41:56Z |
| alsa-2025:11747 | Important: firefox security update | 2025-07-24T00:00:00Z | 2025-07-30T09:15:51Z |
| alsa-2025:11537 | Important: sudo security update | 2025-07-22T00:00:00Z | 2025-07-24T09:20:42Z |
| alsa-2025:11534 | Important: git security update | 2025-07-22T00:00:00Z | 2025-07-23T08:07:31Z |
| alsa-2025:11533 | Important: git security update | 2025-07-22T00:00:00Z | 2025-07-24T09:25:29Z |
| alsa-2025:11463 | Moderate: fence-agents security update | 2025-07-21T00:00:00Z | 2025-07-22T13:35:00Z |
| alsa-2025:11462 | Important: git security update | 2025-07-21T00:00:00Z | 2025-07-22T10:34:40Z |
| alsa-2025:11456 | Moderate: kernel-rt security update | 2025-07-21T00:00:00Z | 2025-07-23T07:31:24Z |
| alsa-2025:11455 | Moderate: kernel security update | 2025-07-21T00:00:00Z | 2025-08-04T11:36:19Z |
| alsa-2025:11428 | Important: kernel security update | 2025-07-21T00:00:00Z | 2025-07-30T08:22:07Z |
| alsa-2025:11411 | Important: kernel security update | 2025-07-21T00:00:00Z | 2025-07-23T07:42:35Z |
| alsa-2025:11401 | Important: valkey security update | 2025-07-21T00:00:00Z | 2025-07-28T15:46:39Z |
| alsa-2025:10862 | Important: java-1.8.0-openjdk security update | 2025-07-17T00:00:00Z | 2025-07-21T09:43:41Z |
| alsa-2025:11335 | Important: tomcat security update | 2025-07-16T00:00:00Z | 2025-07-17T08:49:49Z |
| alsa-2025:11333 | Important: tomcat security update | 2025-07-16T00:00:00Z | 2025-07-17T08:17:04Z |
| alsa-2025:11332 | Important: tomcat9 security update | 2025-07-16T00:00:00Z | 2025-07-21T10:03:39Z |
| alsa-2025:11327 | Moderate: glib2 security update | 2025-07-16T00:00:00Z | 2025-07-17T08:13:56Z |
| alsa-2025:11324 | Important: cloud-init security update | 2025-07-16T00:00:00Z | 2025-07-17T08:11:16Z |
| alsa-2025:11299 | Moderate: kernel-rt security update | 2025-07-16T00:00:00Z | 2025-07-16T12:42:40Z |
| alsa-2025:11298 | Moderate: kernel security update | 2025-07-16T00:00:00Z | 2025-07-16T12:39:32Z |
| alsa-2025:10873 | Important: java-21-openjdk security update | 2025-07-16T00:00:00Z | 2025-07-30T13:16:04Z |
| alsa-2025:11140 | Moderate: glib2 security update | 2025-07-15T00:00:00Z | 2025-07-16T12:44:37Z |
| alsa-2025:11066 | Moderate: glibc security update | 2025-07-15T00:00:00Z | 2025-07-18T06:49:51Z |
| alsa-2025:11047 | Moderate: pcs security update | 2025-07-15T00:00:00Z | 2026-04-09T15:41:47Z |
| alsa-2025:11044 | Moderate: python3.12-setuptools security update | 2025-07-15T00:00:00Z | 2025-07-16T08:04:17Z |
| alsa-2025:11043 | Moderate: python3.11-setuptools security update | 2025-07-15T00:00:00Z | 2025-07-16T08:02:22Z |
| alsa-2025:11042 | Moderate: socat security update | 2025-07-15T00:00:00Z | 2025-07-16T08:00:21Z |
| alsa-2025:11036 | Moderate: python-setuptools security update | 2025-07-15T00:00:00Z | 2025-08-04T11:32:31Z |
| alsa-2025:11035 | Moderate: lz4 security update | 2025-07-15T00:00:00Z | 2025-08-02T13:24:46Z |
| alsa-2025:11030 | Moderate: emacs security update | 2025-07-15T00:00:00Z | 2025-07-16T07:58:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-696 | Security exception in org.apache.lucene.analysis.tokenattributes.CharTermAttributeImpl.clone | 2023-08-14T14:00:47.094365Z | 2023-08-14T14:00:47.094611Z |
| osv-2023-693 | Security exception in org.json.JSONArray.writeTo | 2023-08-13T14:00:24.146135Z | 2023-08-13T14:00:24.146368Z |
| osv-2023-692 | Invalid-free in reset_context | 2023-08-13T14:00:16.114233Z | 2024-09-01T14:21:14.987075Z |
| osv-2023-689 | Use-of-uninitialized-value | 2023-08-12T14:02:14.530750Z | 2023-08-12T14:02:14.531027Z |
| osv-2023-688 | Invalid-free in Flow::~Flow | 2023-08-12T14:00:58.558753Z | 2023-08-12T14:00:58.559035Z |
| osv-2023-685 | Invalid-free in reset_context | 2023-08-11T14:02:10.018940Z | 2024-09-01T14:21:29.336035Z |
| osv-2023-684 | Heap-use-after-free in __xmlRaiseError | 2023-08-11T14:02:03.986718Z | 2023-08-11T14:02:03.986997Z |
| osv-2023-680 | Security exception in org.apache.poi.hdgf.streams.PointerContainingStream.findChildren | 2023-08-11T14:00:29.963332Z | 2023-08-11T14:00:29.963569Z |
| osv-2023-675 | Heap-use-after-free in parse_options | 2023-08-09T14:02:25.748940Z | 2024-04-29T14:13:24.917092Z |
| osv-2023-674 | Heap-buffer-overflow in get_grouplength | 2023-08-09T14:02:09.770996Z | 2023-08-09T14:02:09.771217Z |
| osv-2023-673 | Heap-buffer-overflow in match | 2023-08-09T14:01:09.834447Z | 2023-08-09T14:01:09.834676Z |
| osv-2023-665 | Security exception in org.apache.poi.hdgf.streams.PointerContainingStream.findChildren | 2023-08-08T14:02:01.481029Z | 2023-08-08T14:02:01.481263Z |
| osv-2023-663 | Segv on unknown address in decUnitCompare | 2023-08-08T14:00:59.624933Z | 2023-08-08T14:00:59.625154Z |
| osv-2023-662 | Security exception in org.apache.commons.io.IOUtils.byteArray | 2023-08-08T14:00:57.801101Z | 2023-08-08T14:00:57.801377Z |
| osv-2023-660 | Security exception in org.apache.poi.hwpf.model.StyleSheet.createPap | 2023-08-08T14:00:31.168112Z | 2023-08-08T14:00:31.168352Z |
| osv-2023-645 | Segv on unknown address in decUnitCompare | 2023-08-04T14:02:38.270949Z | 2023-08-04T14:02:38.271192Z |
| osv-2023-640 | Stack-buffer-overflow in initialize_encryption_key | 2023-08-04T14:00:55.352181Z | 2023-08-17T14:21:56.675468Z |
| osv-2022-1280 | Heap-buffer-overflow in Canvas5Structure::NIBDecoder::decode | 2023-08-04T14:00:41.927304Z | 2023-08-04T14:00:41.927544Z |
| osv-2023-636 | Security exception in jflex.core.NFA.insertNFA | 2023-08-03T14:00:58.919043Z | 2023-08-03T14:00:58.919497Z |
| osv-2023-634 | Heap-buffer-overflow in bit_read_BB | 2023-08-02T14:02:44.231233Z | 2023-11-01T14:21:43.594840Z |
| osv-2023-631 | Heap-buffer-overflow in test_verify | 2023-08-01T14:02:11.454420Z | 2023-08-01T14:02:11.454673Z |
| osv-2023-627 | Security exception in org.apache.lucene.util.automaton.RegExp.toAutomaton | 2023-07-31T14:00:58.902209Z | 2023-07-31T14:00:58.902458Z |
| osv-2023-623 | Heap-use-after-free in Elf32_free | 2023-07-28T14:01:31.646164Z | 2023-07-28T14:01:31.646403Z |
| osv-2023-619 | Security exception in java.base/java.util.regex.Pattern$GroupTail.match | 2023-07-27T14:00:54.002113Z | 2023-07-27T14:00:54.002341Z |
| osv-2023-618 | Security exception in java.base/java.util.regex.Pattern$Loop.match | 2023-07-27T14:00:53.785484Z | 2023-07-27T14:00:53.785737Z |
| osv-2023-617 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2023-07-27T14:00:51.420632Z | 2023-08-04T14:17:57.934642Z |
| osv-2023-610 | Security exception in org.apache.lucene.util.automaton.RegExp.toAutomaton | 2023-07-23T14:02:28.957945Z | 2023-07-23T14:02:28.958170Z |
| osv-2023-609 | Stack-buffer-overflow in sc_pkcs15_get_lastupdate | 2023-07-23T14:02:26.863116Z | 2023-07-23T14:02:26.863362Z |
| osv-2023-606 | Heap-buffer-overflow in ZSTD_decompressMultiFrame | 2023-07-23T14:01:02.159160Z | 2026-05-04T14:15:29.176008Z |
| osv-2023-605 | Heap-use-after-free in Elf64_free | 2023-07-23T14:00:51.654724Z | 2024-04-01T14:21:09.455014Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2020-0100 | Double free when calling `sys_info::disk_info` from multiple threads | 2020-05-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0017 | Use after free in ArcIntern::drop | 2020-05-28T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0028 | `LocalRequest::clone` creates multiple mutable references to the same object | 2020-05-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0018 | crate has been renamed to `block-cipher` | 2020-05-26T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0019 | tokio-rustls reads may cause excessive memory usage | 2020-05-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0021 | rio allows a use-after-free buffer access when a future is leaked | 2020-05-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0161 | `array!` macro is unsound in presence of traits that implement methods it calls internally | 2020-05-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0025 | bigint is unmaintained, use uint instead | 2020-05-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0056 | stdweb is unmaintained | 2020-05-04T12:00:00Z | 2020-10-25T18:57:46Z |
| rustsec-2020-0061 | futures_task::noop_waker_ref can segfault due to dereferencing a NULL pointer | 2020-05-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0036 | failure is officially deprecated/unmaintained | 2020-05-02T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2020-0016 | `net2` crate has been deprecated; use `socket2` instead | 2020-05-01T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0015 | Crash causing Denial of Service attack | 2020-04-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0013 | fake-static allows converting any reference into a `'static` reference | 2020-04-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0012 | Relies on undefined behavior of `char::from_u32_unchecked` | 2020-04-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0014 | Various memory safety issues | 2020-04-23T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0011 | Library exclusively intended to obfuscate code. | 2020-04-23T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0020 | `stb_truetype` crate has been deprecated; use `ttf-parser` instead | 2020-04-18T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0009 | `read_scalar` and `read_scalar_at` allow transmuting values without `unsafe` blocks | 2020-04-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0146 | arr! macro erases lifetimes | 2020-04-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0007 | use-after or double free of allocated memory | 2020-03-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0006 | Flaw in `realloc` allows reading unknown memory | 2020-03-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0008 | Flaw in hyper allows request smuggling by sending a body in GET requests | 2020-03-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0005 | CBox API allows to de-reference raw pointers without `unsafe` code | 2020-03-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0010 | tiberius is unmaintained | 2020-02-28T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0147 | rulinalg is unmaintained, use nalgebra instead | 2020-02-11T12:00:00Z | 2021-03-04T13:58:02Z |
| rustsec-2020-0023 | Lifetime boundary for `raw_slice` and `raw_slice_mut` are incorrect | 2020-02-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0158 | slice-deque is unmaintained | 2020-02-10T12:00:00Z | 2021-11-18T14:04:01Z |
| rustsec-2020-0144 | lzw is unmaintained | 2020-02-10T12:00:00Z | 2021-02-10T18:27:15Z |
| rustsec-2020-0169 | multi_mut is Unmaintained | 2020-02-07T12:00:00Z | 2024-12-04T12:55:45Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2026-1747 | Authentication Bypass Using an Alternate Path or Channel in GitLab | 2026-03-02T09:08:43.992Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2026-1725 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-02T09:08:42.293Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2026-1662 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-02T09:08:40.525Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2026-1388 | Inefficient Regular Expression Complexity in GitLab | 2026-03-02T09:08:35.227Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2026-0752 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-03-02T09:08:25.612Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2025-3525 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-02T09:06:54.236Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2025-14511 | Improper Validation of Specified Quantity in Input in GitLab | 2026-03-02T09:05:49.359Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2025-14103 | Missing Authorization in GitLab | 2026-03-02T09:05:45.582Z | 2026-03-02T09:10:16.414Z |
| bit-superset-2026-23984 | Apache Superset: SQLLab Read-Only Bypass on PostgreSQL | 2026-03-02T08:51:08.893Z | 2026-03-03T09:19:06.344Z |
| bit-superset-2026-23969 | Apache Superset: Exposure of Sensitive Information via Incomplete ClickHouse Function Filtering | 2026-03-02T08:51:03.240Z | 2026-03-02T09:10:16.414Z |
| bit-moodle-2026-26047 | Moodle: moodle: uncontrolled resource consumption in tex formula editor leading to denial of service | 2026-03-02T08:50:27.185Z | 2026-03-02T09:10:16.414Z |
| bit-moodle-2026-26046 | Moodle: moodle: improper input sanitization in tex filter administration setting | 2026-03-02T08:50:25.461Z | 2026-03-02T09:10:16.414Z |
| bit-moodle-2026-26045 | Moodle: moodle: improper validation in file restore functionality leading to remote code execution | 2026-03-02T08:50:23.910Z | 2026-03-02T09:10:16.414Z |
| bit-mastodon-2026-27477 | Mastodon has SSRF via unvalidated FASP Provider base_url | 2026-03-02T08:42:58.043Z | 2026-03-02T09:10:16.414Z |
| bit-mastodon-2026-27468 | Mastodon may allow unconfirmed FASP to make subscriptions | 2026-03-02T08:42:56.320Z | 2026-03-02T09:10:16.414Z |
| bit-grafana-2026-21725 | Authorization Bypass via TOCTOU in Grafana Datasource Deletion by Name | 2026-03-02T08:41:16.926Z | 2026-03-02T09:10:16.414Z |
| bit-pytorch-2025-2149 | PyTorch Quantized Sigmoid Module nnq_Sigmoid initialization | 2026-02-26T15:23:05.500Z | 2026-02-26T15:46:51.306Z |
| bit-pytorch-2025-2148 | PyTorch Tuple torch.ops.profiler._call_end_callbacks_on_jit_fut memory corruption | 2026-02-26T15:23:02.496Z | 2026-02-26T15:46:51.306Z |
| bit-neo4j-2026-1337 | Insufficient escaping of unicode characters in query log | 2026-02-26T15:16:17.899Z | 2026-02-26T15:46:51.306Z |
| bit-superset-2026-23983 | Apache Superset: Sensitive Data Exposure via REST API (disabled by default) | 2026-02-26T08:54:03.107Z | 2026-02-26T09:13:58.886Z |
| bit-superset-2026-23982 | Apache Superset: Improper Authorization in Dataset Creation Allows Access Control Bypass | 2026-02-26T08:54:01.397Z | 2026-02-26T09:13:58.886Z |
| bit-superset-2026-23980 | Apache Superset: Improper Neutralization of Special Elements used in a SQL Command | 2026-02-26T08:53:59.760Z | 2026-02-26T09:13:58.886Z |
| bit-valkey-2026-27623 | Valkey has Pre-Authentication DOS from malformed RESP request | 2026-02-26T08:53:22.415Z | 2026-02-26T09:13:58.886Z |
| bit-valkey-2026-21863 | Malformed Valkey Cluster bus message can lead to Remote DoS | 2026-02-26T08:53:20.799Z | 2026-02-26T09:13:58.886Z |
| bit-valkey-2025-67733 | Valkey Affected by RESP Protocol Injection via Lua error_reply | 2026-02-26T08:53:18.978Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-25613 | An unsafe cast in the MongoDB query planner can result in a segmentation fault. | 2026-02-26T08:47:48.322Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-25610 | Invalid $geoNear index hint may cause server crash | 2026-02-26T08:47:46.620Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-25609 | profile command may permit unauthorized configuration | 2026-02-26T08:47:44.983Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-1850 | An authorized user may disable the MongoDB server by issuing a certain type of complex query due to boolean expression simplification | 2026-02-26T08:47:43.390Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-1849 | Mongod can run out of stack memory when expressions create deeply nested documents | 2026-02-26T08:47:41.788Z | 2026-02-26T09:13:58.886Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-1040 | Vulnérabilité dans Postfix | 2025-11-26T00:00:00.000000 | 2025-11-26T00:00:00.000000 |
| certfr-2025-avi-1039 | Vulnérabilité dans Kaspersky Security Center | 2025-11-25T00:00:00.000000 | 2025-11-25T00:00:00.000000 |
| certfr-2025-avi-1038 | Vulnérabilité dans les produits PrimX | 2025-11-25T00:00:00.000000 | 2025-11-25T00:00:00.000000 |
| certfr-2025-avi-1037 | Multiples vulnérabilités dans Progress MOVEit Transfer | 2025-11-25T00:00:00.000000 | 2025-11-25T00:00:00.000000 |
| CERTFR-2025-AVI-1039 | Vulnérabilité dans Kaspersky Security Center | 2025-11-25T00:00:00.000000 | 2025-11-25T00:00:00.000000 |
| CERTFR-2025-AVI-1038 | Vulnérabilité dans les produits PrimX | 2025-11-25T00:00:00.000000 | 2025-11-25T00:00:00.000000 |
| CERTFR-2025-AVI-1037 | Multiples vulnérabilités dans Progress MOVEit Transfer | 2025-11-25T00:00:00.000000 | 2025-11-25T00:00:00.000000 |
| certfr-2025-avi-1036 | Multiples vulnérabilités dans les produits VMware | 2025-11-24T00:00:00.000000 | 2025-11-24T00:00:00.000000 |
| certfr-2025-avi-1035 | Multiples vulnérabilités dans les produits Synology | 2025-11-24T00:00:00.000000 | 2025-11-24T00:00:00.000000 |
| CERTFR-2025-AVI-1036 | Multiples vulnérabilités dans les produits VMware | 2025-11-24T00:00:00.000000 | 2025-11-24T00:00:00.000000 |
| CERTFR-2025-AVI-1035 | Multiples vulnérabilités dans les produits Synology | 2025-11-24T00:00:00.000000 | 2025-11-24T00:00:00.000000 |
| certfr-2025-avi-1034 | Multiples vulnérabilités dans les produits IBM | 2025-11-21T00:00:00.000000 | 2025-11-21T00:00:00.000000 |
| certfr-2025-avi-1033 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-11-21T00:00:00.000000 | 2025-11-21T00:00:00.000000 |
| certfr-2025-avi-1032 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-11-21T00:00:00.000000 | 2025-11-21T00:00:00.000000 |
| certfr-2025-avi-1031 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-11-21T00:00:00.000000 | 2025-11-21T00:00:00.000000 |
| certfr-2025-avi-1030 | Vulnérabilité dans Microsoft Visual Studio Code | 2025-11-21T00:00:00.000000 | 2025-11-21T00:00:00.000000 |
| CERTFR-2025-AVI-1034 | Multiples vulnérabilités dans les produits IBM | 2025-11-21T00:00:00.000000 | 2025-11-21T00:00:00.000000 |
| CERTFR-2025-AVI-1033 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-11-21T00:00:00.000000 | 2025-11-21T00:00:00.000000 |
| CERTFR-2025-AVI-1032 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-11-21T00:00:00.000000 | 2025-11-21T00:00:00.000000 |
| CERTFR-2025-AVI-1031 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-11-21T00:00:00.000000 | 2025-11-21T00:00:00.000000 |
| CERTFR-2025-AVI-1030 | Vulnérabilité dans Microsoft Visual Studio Code | 2025-11-21T00:00:00.000000 | 2025-11-21T00:00:00.000000 |
| certfr-2025-avi-1029 | Vulnérabilité dans les produits Kaspersky | 2025-11-20T00:00:00.000000 | 2025-11-20T00:00:00.000000 |
| certfr-2025-avi-1028 | Vulnérabilité dans GnuTLS | 2025-11-20T00:00:00.000000 | 2025-11-20T00:00:00.000000 |
| certfr-2025-avi-1027 | Multiples vulnérabilités dans les produits SonicWall | 2025-11-20T00:00:00.000000 | 2025-11-20T00:00:00.000000 |
| certfr-2025-avi-1026 | Multiples vulnérabilités dans Wireshark | 2025-11-20T00:00:00.000000 | 2025-11-20T00:00:00.000000 |
| CERTFR-2025-AVI-1029 | Vulnérabilité dans les produits Kaspersky | 2025-11-20T00:00:00.000000 | 2025-11-20T00:00:00.000000 |
| CERTFR-2025-AVI-1028 | Vulnérabilité dans GnuTLS | 2025-11-20T00:00:00.000000 | 2025-11-20T00:00:00.000000 |
| CERTFR-2025-AVI-1027 | Multiples vulnérabilités dans les produits SonicWall | 2025-11-20T00:00:00.000000 | 2025-11-20T00:00:00.000000 |
| CERTFR-2025-AVI-1026 | Multiples vulnérabilités dans Wireshark | 2025-11-20T00:00:00.000000 | 2025-11-20T00:00:00.000000 |
| certfr-2025-avi-1025 | Multiples vulnérabilités dans les produits Atlassian | 2025-11-19T00:00:00.000000 | 2025-11-19T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2021-000057 | Multiple cross-site scripting vulnerabilities in EC-CUBE | 2021-06-23T15:15+09:00 | 2021-06-23T15:15+09:00 |
| jvndb-2021-000055 | WordPress plugin "Fudousan plugin" series vulnerable to cross-site scripting | 2021-06-22T15:06+09:00 | 2021-06-22T15:06+09:00 |
| jvndb-2021-000054 | Inkdrop vulnerable to OS command injection | 2021-06-22T15:06+09:00 | 2021-06-22T15:06+09:00 |
| jvndb-2021-000053 | Hitachi Virtual File Platform vulnerable to OS command injection | 2021-06-18T15:45+09:00 | 2021-06-18T15:45+09:00 |
| jvndb-2021-000052 | Hitachi Application Server Help vulnerable cross-site scripting | 2021-06-17T15:11+09:00 | 2021-06-17T15:11+09:00 |
| jvndb-2021-000051 | Multiple cross-site scripting vulnerabilities in multiple EC-CUBE plugins provided by EC-CUBE | 2021-06-16T16:18+09:00 | 2021-06-16T16:18+09:00 |
| jvndb-2021-000049 | Multiple ETUNA EC-CUBE plugins vulnerable to cross-site scripting | 2021-06-15T16:09+09:00 | 2021-06-16T11:52+09:00 |
| jvndb-2021-000050 | Multiple vulnerabilities in GROWI | 2021-06-14T15:10+09:00 | 2021-06-14T15:10+09:00 |
| jvndb-2021-000048 | Asken App for Android fails to restrict custom URL schemes properly | 2021-06-14T15:10+09:00 | 2021-06-14T15:10+09:00 |
| jvndb-2021-000047 | WordPress plugin "Welcart e-Commerce" vulnerable to cross-site scripting | 2021-06-11T15:24+09:00 | 2021-06-11T15:24+09:00 |
| jvndb-2021-001756 | urllib3 vulnerable to Regular expression Denial-of-Service (ReDoS) | 2021-06-08T12:21+09:00 | 2021-06-08T12:21+09:00 |
| jvndb-2021-000046 | ATOM - Smart life App vulnerable to improper server certificate verification | 2021-06-03T14:05+09:00 | 2021-06-03T14:05+09:00 |
| jvndb-2021-000045 | goo blog App fails to restrict custom URL schemes properly | 2021-06-02T15:46+09:00 | 2021-06-02T15:46+09:00 |
| jvndb-2021-001575 | Multiple vulnerabilities in Buffalo WSR-1166DHP3 and WSR-1166DHP4 routers | 2021-06-01T15:18+09:00 | 2021-06-01T15:18+09:00 |
| jvndb-2021-000044 | Zettlr vulnerable to cross-site scripting | 2021-05-26T14:50+09:00 | 2021-06-03T16:21+09:00 |
| jvndb-2021-001506 | Hitachi Ops Center Analyzer vulnerability of communication using a certificate not intended by the user | 2021-05-25T14:11+09:00 | 2021-05-25T14:11+09:00 |
| jvndb-2021-000041 | The installers of ScanSnap Manager may insecurely load Dynamic Link Libraries | 2021-05-21T16:34+09:00 | 2021-05-21T16:34+09:00 |
| jvndb-2021-000043 | Installer of Overwolf may insecurely load Dynamic Link Libraries | 2021-05-21T16:07+09:00 | 2021-05-21T16:07+09:00 |
| jvndb-2021-000042 | Multiple cross-site scripting vulnerabilities in multiple PHP Factory products | 2021-05-21T15:38+09:00 | 2021-05-21T15:38+09:00 |
| jvndb-2021-000040 | QND vulnerable to privilege escalation | 2021-05-21T14:21+09:00 | 2021-05-21T14:21+09:00 |
| jvndb-2021-000037 | mod_auth_openidc vulnerable to denial-of-service (DoS) | 2021-05-14T15:35+09:00 | 2021-05-14T15:35+09:00 |
| jvndb-2021-000038 | Multiple vulnerabilities in Cisco Small Business Series Wireless Access Points | 2021-05-14T15:26+09:00 | 2021-05-14T15:26+09:00 |
| jvndb-2021-000039 | RFNTPS vulnerable to OS command injection | 2021-05-13T16:05+09:00 | 2021-05-13T16:05+09:00 |
| jvndb-2021-000036 | Multiple vulnerabilities in KonaWiki2 | 2021-05-13T16:05+09:00 | 2021-05-13T16:05+09:00 |
| jvndb-2021-000035 | EC-CUBE vulnerable to cross-site scripting | 2021-05-10T18:08+09:00 | 2021-05-10T18:08+09:00 |
| jvndb-2021-001380 | Multiple Buffalo network devices contain hidden functionality | 2021-04-28T16:15+09:00 | 2021-05-07T16:16+09:00 |
| jvndb-2021-001381 | Multiple vulnerabilities in Buffalo broadband routers | 2021-04-28T16:14+09:00 | 2021-05-07T16:28+09:00 |
| jvndb-2021-000034 | WordPress plugin "WP Fastest Cache" vulnerable to directory traversal | 2021-04-27T17:12+09:00 | 2021-04-27T17:12+09:00 |
| jvndb-2021-000033 | Hot Pepper Gourmet App fails to restrict access permissions | 2021-04-27T17:10+09:00 | 2023-03-08T17:02+09:00 |
| jvndb-2021-000909 | yappa-ng vulnerable to cross-site scripting | 2021-04-22T16:33+09:00 | 2021-04-22T16:33+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-12554 | Microsoft GitHub Copilot for JetBrains命令注入漏洞 | 2026-03-02 | 2026-03-04 |
| cnvd-2026-12553 | Microsoft Excel缓冲区溢出漏洞(CNVD-2026-12553) | 2026-03-02 | 2026-03-04 |
| cnvd-2026-12552 | Microsoft Excel缓冲区溢出漏洞(CNVD-2026-12552) | 2026-03-02 | 2026-03-04 |
| cnvd-2026-13786 | IBM Concert信息泄露漏洞(CNVD-2026-13786) | 2026-02-28 | 2026-03-16 |
| cnvd-2026-13785 | IBM Concert跨站脚本漏洞(CNVD-2026-13785) | 2026-02-28 | 2026-03-16 |
| cnvd-2026-12893 | Apache Superset输入验证漏洞 | 2026-02-27 | 2026-03-04 |
| cnvd-2026-15863 | Advantech WISE-6610操作系统命令注入漏洞 | 2026-02-25 | 2026-04-02 |
| cnvd-2026-12871 | Adobe DNG SDK缓冲区溢出漏洞 | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12870 | Adobe After Effects缓冲区溢出漏洞(CNVD-2026-12870) | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12869 | Adobe After Effects资源管理错误漏洞(CNVD-2026-12869) | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12868 | Adobe After Effects资源管理错误漏洞(CNVD-2026-12868) | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12867 | Adobe After Effects资源管理错误漏洞 | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12866 | Adobe After Effects输入验证错误漏洞(CNVD-2026-12866) | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12865 | Adobe After Effects类型混淆漏洞 | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12561 | Microsoft Defender for Linux代码执行漏洞 | 2026-02-25 | 2026-03-04 |
| cnvd-2026-17720 | Adobe Audition拒绝服务漏洞 | 2026-02-24 | 2026-04-20 |
| cnvd-2026-17719 | Adobe Substance3D Designer越界读取漏洞(CNVD-2026-17719) | 2026-02-24 | 2026-04-20 |
| cnvd-2026-14508 | Adobe Audition越界写入漏洞(CNVD-2026-14508) | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14507 | Adobe Substance3D Designer越界写入漏洞 | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14506 | Adobe Audition越界读取漏洞(CNVD-2026-14506) | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14505 | Adobe Audition缓冲区溢出漏洞(CNVD-2026-14505) | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14504 | Adobe Substance3D Designer缓冲区溢出漏洞(CNVD-2026-14504) | 2026-02-24 | 2026-03-23 |
| cnvd-2026-12875 | Adobe Substance3D Designer缓冲区溢出漏洞(CNVD-2026-12875) | 2026-02-24 | 2026-03-09 |
| cnvd-2026-12874 | Adobe Substance3D Designer代码问题漏洞 | 2026-02-24 | 2026-03-09 |
| cnvd-2026-12873 | Adobe Audition缓冲区溢出漏洞 | 2026-02-24 | 2026-03-09 |
| cnvd-2026-12872 | Adobe Substance3D Designer缓冲区溢出漏洞(CNVD-2026-12872) | 2026-02-24 | 2026-03-09 |
| cnvd-2026-12894 | Apache Druid认证绕过漏洞 | 2026-02-13 | 2026-03-04 |
| cnvd-2026-18674 | Adobe Substance3D Stager越界读取漏洞(CNVD-2026-18674) | 2026-02-12 | 2026-04-27 |
| cnvd-2026-18673 | Adobe Substance3D Modeler越界读取漏洞(CNVD-2026-18673) | 2026-02-12 | 2026-04-27 |
| cnvd-2026-18672 | Adobe Lightroom Desktop越界写入漏洞 | 2026-02-12 | 2026-04-27 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-00724 | Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушител… | 23.01.2026 | 23.01.2026 |
| bdu:2026-00723 | Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушител… | 23.01.2026 | 23.01.2026 |
| bdu:2026-00722 | Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушител… | 23.01.2026 | 23.01.2026 |
| bdu:2026-00721 | Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушител… | 23.01.2026 | 23.01.2026 |
| bdu:2026-00720 | Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушител… | 23.01.2026 | 23.01.2026 |
| bdu:2026-00719 | Уязвимость компонента REST API агента сканирования RedCheck, позволяющая нарушителю выпол… | 23.01.2026 | 10.02.2026 |
| bdu:2026-00718 | Уязвимость компонента moment.js агента скнирования RedCheck, позволяющая нарушителю получ… | 23.01.2026 | 26.01.2026 |
| bdu:2026-00717 | Уязвимость компонента moment.js агента сканирования RedCheck, позволяющая нарушителю вызв… | 23.01.2026 | 26.01.2026 |
| bdu:2026-00716 | Уязвимость функции spectrum_router() ядра операционной системы Linux, позволяющая нарушит… | 23.01.2026 | 27.01.2026 |
| bdu:2026-00715 | Уязвимость функции cffrml_receive() ядра операционной системы Linux, позволяющая нарушите… | 23.01.2026 | 27.01.2026 |
| bdu:2026-00714 | Уязвимость функции x86_pmu_stop() ядра операционной системы Linux, позволяющая нарушителю… | 23.01.2026 | 27.01.2026 |
| bdu:2026-00713 | Уязвимость функции bnad_get_ethtool_stats() ядра операционной системы Linux, позволяющая … | 23.01.2026 | 27.01.2026 |
| bdu:2026-00712 | Уязвимость функции iomap_adjust_read_range() ядра операционной системы Linux, позволяющая… | 23.01.2026 | 27.01.2026 |
| bdu:2026-00711 | Уязвимость функции nfsd_create_setattr() ядра операционной системы Linux, позволяющая нар… | 23.01.2026 | 27.01.2026 |
| bdu:2026-00710 | Уязвимость функции spectrum_mr() ядра операционной системы Linux, позволяющая нарушителю … | 23.01.2026 | 27.01.2026 |
| bdu:2026-00709 | Уязвимость сервера telnetd пакета сетевых программ Inetutils, позволяющая нарушителю обой… | 23.01.2026 | 30.01.2026 |
| bdu:2026-00708 | Уязвимость модулей drivers/gpu/drm/xe/xe_exec.c, drivers/gpu/drm/xe/xe_vm.c и include/uap… | 23.01.2026 | 27.01.2026 |
| bdu:2026-00707 | Уязвимость функции ac_ioctl() ядра операционной системы Linux, позволяющая нарушителю выз… | 23.01.2026 | 27.01.2026 |
| bdu:2026-00706 | Уязвимость веб-интерфейса управления системы обработки вызовов Cisco Unified Communicatio… | 23.01.2026 | 23.01.2026 |
| bdu:2026-00705 | Уязвимость функции f2fs_zero_range() ядра операционной системы Linux, позволяющая нарушит… | 23.01.2026 | 27.01.2026 |
| bdu:2026-00704 | Уязвимость функции drm_sched_stop() ядра операционной системы Linux, позволяющая нарушите… | 23.01.2026 | 23.01.2026 |
| bdu:2026-00703 | Уязвимость компонента Server: Pluggable Auth системы управления базами данных Oracle MySQ… | 22.01.2026 | 22.01.2026 |
| bdu:2026-00702 | Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Ser… | 22.01.2026 | 22.01.2026 |
| bdu:2026-00701 | Уязвимость компонента Server: Parser системы управления базами данных Oracle MySQL Server… | 22.01.2026 | 22.01.2026 |
| bdu:2026-00700 | Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Ser… | 22.01.2026 | 22.01.2026 |
| bdu:2026-00699 | Уязвимость компонента Server:Thread Pooling системы управления базами данных Oracle MySQL… | 22.01.2026 | 22.01.2026 |
| bdu:2026-00698 | Уязвимость инструмента анализа производительности системы NVIDIA NSight Systems программн… | 22.01.2026 | 22.01.2026 |
| bdu:2026-00697 | Уязвимость инструмента анализа производительности системы NVIDIA NSight Systems программн… | 22.01.2026 | 22.01.2026 |
| bdu:2026-00696 | Уязвимость компонента Supplier Portal приложения Oracle Agile Product Lifecycle Managemen… | 22.01.2026 | 22.01.2026 |
| bdu:2026-00695 | Уязвимость компонента RMI программной платформы Oracle Java SE, виртуальных машин Oracle … | 22.01.2026 | 10.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200505-0354 | Buffer overflow in the Foundation framework for Mac OS X 10.3.9 allows local users to exe… | 2024-07-23T20:17:16.312000Z |
| var-201206-0054 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T20:17:15.929000Z |
| var-200901-0726 | Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.0, iPhone OS 1.0… | 2024-07-23T20:17:14.213000Z |
| var-200904-0800 | The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before… | 2024-07-23T20:17:13.895000Z |
| var-201809-0686 | curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication c… | 2024-07-23T20:17:09.201000Z |
| var-201705-3873 | In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 me… | 2024-07-23T20:17:09.711000Z |
| var-201006-1234 | Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X… | 2024-07-23T20:17:09.441000Z |
| var-201903-0442 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:17:08.574000Z |
| var-200811-0321 | The plug-in interface in WebKit in Apple Safari before 3.2 does not prevent plug-ins from… | 2024-07-23T20:17:08.920000Z |
| var-202004-0345 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T20:17:07.679000Z |
| var-202109-1966 | There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a mal… | 2024-07-23T20:16:30.843000Z |
| var-200701-0341 | The Bonjour functionality in mDNSResponder, iChat 3.1.6, and InstantMessage framework 428… | 2024-07-23T20:16:29.180000Z |
| var-201904-1411 | A cross-origin issue existed with "iframe" elements. This was addressed with improved tra… | 2024-07-23T20:16:28.429000Z |
| var-201912-0532 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed … | 2024-07-23T20:16:27.834000Z |
| var-201805-0967 | Systems with microprocessors utilizing speculative execution and that perform speculative… | 2024-07-23T20:16:27.316000Z |
| var-201409-1147 | The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remot… | 2024-07-23T20:16:26.490000Z |
| var-201403-0275 | sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd… | 2024-07-23T20:15:55.666000Z |
| var-202112-1782 | Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not pro… | 2024-07-23T20:15:54.690000Z |
| var-200505-0350 | The AppleScript Editor in Mac OS X 10.3.9 does not properly display script code for an ap… | 2024-07-23T20:15:49.782000Z |
| var-201707-0556 | Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whites… | 2024-07-23T20:15:16.169000Z |
| var-201806-1456 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. iOS befor… | 2024-07-23T20:15:15.076000Z |
| var-201011-0178 | The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and poss… | 2024-07-23T20:15:12.423000Z |
| var-200505-0351 | Bluetooth-enabled systems in Mac OS X 10.3.9 enables the Bluetooth file exchange service … | 2024-07-23T20:15:10.160000Z |
| var-200701-0518 | The CFUserNotificationSendRequest function in UserNotificationCenter.app in Apple Mac OS … | 2024-07-23T20:15:09.518000Z |
| var-202204-0432 | Subversion's mod_dav_svn is vulnerable to memory corruption. While looking up path-based … | 2024-07-23T20:15:05.279000Z |
| var-201912-0496 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:15:05.516000Z |
| var-200901-0714 | OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFi… | 2024-07-23T20:15:05.042000Z |
| var-200709-0495 | Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server bef… | 2024-07-23T20:15:05.431000Z |
| var-202210-1202 | Git is an open source, scalable, distributed revision control system. Versions prior to 2… | 2024-07-23T20:15:03.784000Z |
| var-201306-0256 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T20:15:01.919000Z |