Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43471 |
N/A
|
scsi: ufs: core: Fix possible NULL pointer dereference… |
Linux |
Linux |
2026-05-08T14:22:30.909Z | 2026-05-08T14:22:30.909Z |
| CVE-2026-43470 |
N/A
|
nfs: return EISDIR on nfs3_proc_create if d_alias is a dir |
Linux |
Linux |
2026-05-08T14:22:30.218Z | 2026-05-08T14:22:30.218Z |
| CVE-2026-43469 |
N/A
|
xprtrdma: Decrement re_receiving on the early exit paths |
Linux |
Linux |
2026-05-08T14:22:29.550Z | 2026-05-08T14:22:29.550Z |
| CVE-2026-43468 |
N/A
|
net/mlx5: Fix deadlock between devlink lock and esw->wq |
Linux |
Linux |
2026-05-08T14:22:28.889Z | 2026-05-08T14:22:28.889Z |
| CVE-2026-43467 |
N/A
|
net/mlx5: Fix crash when moving to switchdev mode |
Linux |
Linux |
2026-05-08T14:22:28.216Z | 2026-05-08T14:22:28.216Z |
| CVE-2026-43466 |
N/A
|
net/mlx5e: Fix DMA FIFO desync on error CQE SQ recovery |
Linux |
Linux |
2026-05-08T14:22:27.513Z | 2026-05-08T14:22:27.513Z |
| CVE-2026-43465 |
N/A
|
net/mlx5e: RX, Fix XDP multi-buf frag counting for str… |
Linux |
Linux |
2026-05-08T14:22:26.822Z | 2026-05-08T14:22:26.822Z |
| CVE-2026-43464 |
N/A
|
net/mlx5e: RX, Fix XDP multi-buf frag counting for legacy RQ |
Linux |
Linux |
2026-05-08T14:22:26.039Z | 2026-05-08T14:22:26.039Z |
| CVE-2026-43463 |
N/A
|
rxrpc, afs: Fix missing error pointer check after rxrp… |
Linux |
Linux |
2026-05-08T14:22:25.346Z | 2026-05-08T14:22:25.346Z |
| CVE-2026-43462 |
N/A
|
net: spacemit: Fix error handling in emac_tx_mem_map() |
Linux |
Linux |
2026-05-08T14:22:24.686Z | 2026-05-08T14:22:24.686Z |
| CVE-2026-43461 |
N/A
|
spi: amlogic: spifc-a4: Fix DMA mapping error handling |
Linux |
Linux |
2026-05-08T14:22:23.999Z | 2026-05-08T14:22:23.999Z |
| CVE-2026-43460 |
N/A
|
spi: rockchip-sfc: Fix double-free in remove() callback |
Linux |
Linux |
2026-05-08T14:22:23.332Z | 2026-05-08T14:22:23.332Z |
| CVE-2026-43459 |
N/A
|
ASoC: soc-core: flush delayed work before removing DAI… |
Linux |
Linux |
2026-05-08T14:22:22.651Z | 2026-05-08T14:22:22.651Z |
| CVE-2026-43458 |
N/A
|
serial: caif: hold tty->link reference in ldisc_open a… |
Linux |
Linux |
2026-05-08T14:22:21.997Z | 2026-05-08T14:22:21.997Z |
| CVE-2026-43457 |
N/A
|
mctp: i2c: fix skb memory leak in receive path |
Linux |
Linux |
2026-05-08T14:22:20.725Z | 2026-05-08T14:22:20.725Z |
| CVE-2026-43456 |
N/A
|
bonding: fix type confusion in bond_setup_by_slave() |
Linux |
Linux |
2026-05-08T14:22:20.036Z | 2026-05-08T14:22:20.036Z |
| CVE-2026-43455 |
N/A
|
mctp: route: hold key->lock in mctp_flow_prepare_output() |
Linux |
Linux |
2026-05-08T14:22:19.375Z | 2026-05-08T14:22:19.375Z |
| CVE-2026-43454 |
N/A
|
netfilter: nf_tables: Fix for duplicate device in netd… |
Linux |
Linux |
2026-05-08T14:22:18.719Z | 2026-05-08T14:22:18.719Z |
| CVE-2026-43453 |
N/A
|
netfilter: nft_set_pipapo: fix stack out-of-bounds rea… |
Linux |
Linux |
2026-05-08T14:22:18.087Z | 2026-05-08T14:22:18.087Z |
| CVE-2026-43452 |
N/A
|
netfilter: x_tables: guard option walkers against 1-by… |
Linux |
Linux |
2026-05-08T14:22:17.361Z | 2026-05-08T14:22:17.361Z |
| CVE-2026-43451 |
N/A
|
netfilter: nfnetlink_queue: fix entry leak in bridge v… |
Linux |
Linux |
2026-05-08T14:22:16.716Z | 2026-05-08T14:22:16.716Z |
| CVE-2026-43450 |
N/A
|
netfilter: nfnetlink_cthelper: fix OOB read in nfnl_ct… |
Linux |
Linux |
2026-05-08T14:22:15.915Z | 2026-05-08T14:22:15.915Z |
| CVE-2026-43449 |
N/A
|
nvme-pci: Fix slab-out-of-bounds in nvme_dbbuf_set |
Linux |
Linux |
2026-05-08T14:22:15.276Z | 2026-05-08T14:22:15.276Z |
| CVE-2026-43448 |
N/A
|
nvme-pci: Fix race bug in nvme_poll_irqdisable() |
Linux |
Linux |
2026-05-08T14:22:14.633Z | 2026-05-08T14:22:14.633Z |
| CVE-2026-43447 |
N/A
|
iavf: fix PTP use-after-free during reset |
Linux |
Linux |
2026-05-08T14:22:13.988Z | 2026-05-08T14:22:13.988Z |
| CVE-2026-43446 |
N/A
|
accel/amdxdna: Fix runtime suspend deadlock when there… |
Linux |
Linux |
2026-05-08T14:22:13.328Z | 2026-05-08T14:22:13.328Z |
| CVE-2026-43445 |
N/A
|
e1000/e1000e: Fix leak in DMA error cleanup |
Linux |
Linux |
2026-05-08T14:22:12.660Z | 2026-05-08T14:22:12.660Z |
| CVE-2026-43444 |
N/A
|
drm/amdkfd: Unreserve bo if queue update failed |
Linux |
Linux |
2026-05-08T14:22:11.976Z | 2026-05-08T14:22:11.976Z |
| CVE-2026-43443 |
N/A
|
ASoC: amd: acp-mach-common: Add missing error check fo… |
Linux |
Linux |
2026-05-08T14:22:11.303Z | 2026-05-08T14:22:11.303Z |
| CVE-2026-43442 |
N/A
|
io_uring: fix physical SQE bounds check for SQE_MIXED … |
Linux |
Linux |
2026-05-08T14:22:10.656Z | 2026-05-08T14:22:10.656Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43459 |
N/A
|
ASoC: soc-core: flush delayed work before removing DAI… |
Linux |
Linux |
2026-05-08T14:22:22.651Z | 2026-05-08T14:22:22.651Z |
| CVE-2026-43458 |
N/A
|
serial: caif: hold tty->link reference in ldisc_open a… |
Linux |
Linux |
2026-05-08T14:22:21.997Z | 2026-05-08T14:22:21.997Z |
| CVE-2026-43457 |
N/A
|
mctp: i2c: fix skb memory leak in receive path |
Linux |
Linux |
2026-05-08T14:22:20.725Z | 2026-05-08T14:22:20.725Z |
| CVE-2026-43456 |
N/A
|
bonding: fix type confusion in bond_setup_by_slave() |
Linux |
Linux |
2026-05-08T14:22:20.036Z | 2026-05-08T14:22:20.036Z |
| CVE-2026-43455 |
N/A
|
mctp: route: hold key->lock in mctp_flow_prepare_output() |
Linux |
Linux |
2026-05-08T14:22:19.375Z | 2026-05-08T14:22:19.375Z |
| CVE-2026-43454 |
N/A
|
netfilter: nf_tables: Fix for duplicate device in netd… |
Linux |
Linux |
2026-05-08T14:22:18.719Z | 2026-05-08T14:22:18.719Z |
| CVE-2026-43453 |
N/A
|
netfilter: nft_set_pipapo: fix stack out-of-bounds rea… |
Linux |
Linux |
2026-05-08T14:22:18.087Z | 2026-05-08T14:22:18.087Z |
| CVE-2026-43452 |
N/A
|
netfilter: x_tables: guard option walkers against 1-by… |
Linux |
Linux |
2026-05-08T14:22:17.361Z | 2026-05-08T14:22:17.361Z |
| CVE-2026-43451 |
N/A
|
netfilter: nfnetlink_queue: fix entry leak in bridge v… |
Linux |
Linux |
2026-05-08T14:22:16.716Z | 2026-05-08T14:22:16.716Z |
| CVE-2026-43450 |
N/A
|
netfilter: nfnetlink_cthelper: fix OOB read in nfnl_ct… |
Linux |
Linux |
2026-05-08T14:22:15.915Z | 2026-05-08T14:22:15.915Z |
| CVE-2026-43449 |
N/A
|
nvme-pci: Fix slab-out-of-bounds in nvme_dbbuf_set |
Linux |
Linux |
2026-05-08T14:22:15.276Z | 2026-05-08T14:22:15.276Z |
| CVE-2026-43448 |
N/A
|
nvme-pci: Fix race bug in nvme_poll_irqdisable() |
Linux |
Linux |
2026-05-08T14:22:14.633Z | 2026-05-08T14:22:14.633Z |
| CVE-2026-43447 |
N/A
|
iavf: fix PTP use-after-free during reset |
Linux |
Linux |
2026-05-08T14:22:13.988Z | 2026-05-08T14:22:13.988Z |
| CVE-2026-43446 |
N/A
|
accel/amdxdna: Fix runtime suspend deadlock when there… |
Linux |
Linux |
2026-05-08T14:22:13.328Z | 2026-05-08T14:22:13.328Z |
| CVE-2026-43445 |
N/A
|
e1000/e1000e: Fix leak in DMA error cleanup |
Linux |
Linux |
2026-05-08T14:22:12.660Z | 2026-05-08T14:22:12.660Z |
| CVE-2026-43444 |
N/A
|
drm/amdkfd: Unreserve bo if queue update failed |
Linux |
Linux |
2026-05-08T14:22:11.976Z | 2026-05-08T14:22:11.976Z |
| CVE-2026-43443 |
N/A
|
ASoC: amd: acp-mach-common: Add missing error check fo… |
Linux |
Linux |
2026-05-08T14:22:11.303Z | 2026-05-08T14:22:11.303Z |
| CVE-2026-43442 |
N/A
|
io_uring: fix physical SQE bounds check for SQE_MIXED … |
Linux |
Linux |
2026-05-08T14:22:10.656Z | 2026-05-08T14:22:10.656Z |
| CVE-2026-43441 |
N/A
|
net: bonding: Fix nd_tbl NULL dereference when IPv6 is… |
Linux |
Linux |
2026-05-08T14:22:09.982Z | 2026-05-08T14:22:09.982Z |
| CVE-2026-43440 |
N/A
|
net/mana: Null service_wq on setup error to prevent do… |
Linux |
Linux |
2026-05-08T14:22:09.334Z | 2026-05-08T14:22:09.334Z |
| CVE-2026-43439 |
N/A
|
cgroup: fix race between task migration and iteration |
Linux |
Linux |
2026-05-08T14:22:08.626Z | 2026-05-08T14:22:08.626Z |
| CVE-2026-43438 |
N/A
|
sched_ext: Remove redundant css_put() in scx_cgroup_init() |
Linux |
Linux |
2026-05-08T14:22:07.980Z | 2026-05-08T14:22:07.980Z |
| CVE-2026-43437 |
N/A
|
ALSA: pcm: fix use-after-free on linked stream runtime… |
Linux |
Linux |
2026-05-08T14:22:07.314Z | 2026-05-08T14:22:07.314Z |
| CVE-2026-43436 |
N/A
|
ALSA: usb-audio: Check endpoint numbers at parsing Sca… |
Linux |
Linux |
2026-05-08T14:22:06.632Z | 2026-05-08T14:22:06.632Z |
| CVE-2026-43435 |
N/A
|
rust_binder: fix oneway spam detection |
Linux |
Linux |
2026-05-08T14:22:05.921Z | 2026-05-08T14:22:05.921Z |
| CVE-2026-43434 |
N/A
|
rust_binder: check ownership before using vma |
Linux |
Linux |
2026-05-08T14:22:05.269Z | 2026-05-08T14:22:05.269Z |
| CVE-2026-43433 |
N/A
|
rust_binder: avoid reading the written value in offset… |
Linux |
Linux |
2026-05-08T14:22:04.632Z | 2026-05-08T14:22:04.632Z |
| CVE-2026-43432 |
N/A
|
usb: xhci: Fix memory leak in xhci_disable_slot() |
Linux |
Linux |
2026-05-08T14:22:03.985Z | 2026-05-08T14:22:03.985Z |
| CVE-2026-43431 |
N/A
|
xhci: Fix NULL pointer dereference when reading portli… |
Linux |
Linux |
2026-05-08T14:22:03.298Z | 2026-05-08T14:22:03.298Z |
| CVE-2026-43430 |
N/A
|
usb: yurex: fix race in probe |
Linux |
Linux |
2026-05-08T14:22:02.458Z | 2026-05-08T14:22:02.458Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-2577 | The WhatsApp bridge component in Nanobot binds the WebSocket server to all network interfaces (0.0.… | 2026-02-16T10:16:08.827 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2550 | A vulnerability was found in EFM iptime A6004MX 14.18.2. Affected is the function commit_vpncli_fil… | 2026-02-16T10:16:08.623 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2549 | A vulnerability has been found in zhanghuanhao LibrarySystem 图书馆管理系统 up to 1.1.1. This impacts an u… | 2026-02-16T10:16:08.403 | 2026-04-29T01:00:01.613 |
| fkie_cve-2026-0999 | Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 fail to properly validat… | 2026-02-16T10:16:08.140 | 2026-02-18T20:20:07.833 |
| fkie_cve-2026-0998 | Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 and Mattermost Plugin Zo… | 2026-02-16T10:16:07.983 | 2026-02-18T20:22:51.917 |
| fkie_cve-2026-0997 | Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 and Mattermost Plugin Zo… | 2026-02-16T10:16:07.793 | 2026-02-18T20:23:34.847 |
| fkie_cve-2025-59905 | Cross-Site Scripting (XSS) vulnerability reflected in Kubysoft, which occurs through multiple param… | 2026-02-16T10:16:07.390 | 2026-03-09T20:44:34.220 |
| fkie_cve-2025-59904 | Stored Cross-Site Scripting (XSS) vulnerability in Kubysoft, which is triggered through multiple pa… | 2026-02-16T10:16:07.240 | 2026-03-09T20:44:29.440 |
| fkie_cve-2025-59903 | Stored Cross-Site Scripting (XSS) vulnerability in Kubysoft, where uploaded SVG images are not prop… | 2026-02-16T10:16:06.980 | 2026-03-09T20:01:14.500 |
| fkie_cve-2026-2548 | A flaw has been found in WAYOS FBM-220G 24.10.19. This affects the function sub_40F820 of the file … | 2026-02-16T09:16:08.853 | 2026-04-29T01:00:01.613 |
| fkie_cve-2026-2547 | A vulnerability was detected in LigeroSmart up to 6.1.26. The impacted element is the function Agen… | 2026-02-16T09:16:08.660 | 2026-04-29T01:00:01.613 |
| fkie_cve-2026-2546 | A security vulnerability has been detected in LigeroSmart up to 6.1.26. The affected element is an … | 2026-02-16T09:16:08.437 | 2026-04-29T01:00:01.613 |
| fkie_cve-2026-2545 | A weakness has been identified in LigeroSmart up to 6.1.26. Impacted is an unknown function of the … | 2026-02-16T08:16:05.587 | 2026-04-29T01:00:01.613 |
| fkie_cve-2026-2544 | A security flaw has been discovered in yued-fe LuLu UI up to 3.0.0. This issue affects the function… | 2026-02-16T08:16:05.287 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2543 | A vulnerability was identified in vichan-devel vichan up to 5.1.5. This vulnerability affects unkno… | 2026-02-16T07:17:01.007 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2542 | A weakness has been identified in Total VPN 0.5.29.0 on Windows. Affected by this vulnerability is … | 2026-02-16T07:17:00.803 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2538 | A security flaw has been discovered in Flos Freeware Notepad2 4.2.22/4.2.23/4.2.24/4.2.25. Affected… | 2026-02-16T07:17:00.537 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0929 | The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capability checks, allo… | 2026-02-16T07:17:00.197 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2537 | A vulnerability was identified in Comfast CF-E4 2.6.0.1. This impacts an unknown function of the fi… | 2026-02-16T06:16:22.320 | 2026-04-29T01:00:01.613 |
| fkie_cve-2026-2536 | A vulnerability was determined in opencc JFlow up to 20260129. This affects the function Imp_Done o… | 2026-02-16T06:16:22.063 | 2026-04-29T01:00:01.613 |
| fkie_cve-2026-2535 | A vulnerability was found in Comfast CF-N1 V2 2.6.0.2. The impacted element is the function sub_44A… | 2026-02-16T05:16:07.777 | 2026-04-29T01:00:01.613 |
| fkie_cve-2026-2534 | A vulnerability has been found in Comfast CF-N1 V2 2.6.0.2. The affected element is the function su… | 2026-02-16T04:15:52.470 | 2026-04-29T01:00:01.613 |
| fkie_cve-2026-2533 | A flaw has been found in Tosei Self-service Washing Machine 4.02. Impacted is an unknown function o… | 2026-02-16T04:15:52.283 | 2026-04-29T01:00:01.613 |
| fkie_cve-2026-2532 | A vulnerability was detected in lintsinghua DeepAudit up to 3.0.3. This issue affects some unknown … | 2026-02-16T04:15:52.093 | 2026-02-28T00:38:08.223 |
| fkie_cve-2026-2531 | A security vulnerability has been detected in MindsDB up to 25.14.1. This vulnerability affects the… | 2026-02-16T04:15:51.897 | 2026-04-29T01:00:01.613 |
| fkie_cve-2026-2530 | A weakness has been identified in Wavlink WL-WN579A3 up to 20210219. This affects the function AddM… | 2026-02-16T04:15:51.677 | 2026-04-29T01:00:01.613 |
| fkie_cve-2026-2529 | A security flaw has been discovered in Wavlink WL-WN579A3 up to 20210219. Affected by this issue is… | 2026-02-16T02:16:07.000 | 2026-02-18T20:02:39.143 |
| fkie_cve-2026-2528 | A vulnerability was identified in Wavlink WL-WN579A3 up to 20210219. Affected by this vulnerability… | 2026-02-16T02:16:06.807 | 2026-04-29T01:00:01.613 |
| fkie_cve-2026-2527 | A vulnerability was determined in Wavlink WL-WN579A3 up to 20210219. Affected is an unknown functio… | 2026-02-16T02:16:06.620 | 2026-04-29T01:00:01.613 |
| fkie_cve-2026-2526 | A vulnerability was found in Wavlink WL-WN579A3 up to 20210219. This impacts the function multi_ssi… | 2026-02-16T02:16:06.423 | 2026-04-29T01:00:01.613 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-r48c-v28r-pf6v |
6.3 (4.0)
|
MCP Registry has an unauthenticated SSRF: HTTP namespace verification dials 6to4 / NAT64 / site-loc… | 2026-05-08T17:20:56Z | 2026-05-08T17:20:56Z |
| ghsa-rqv2-m695-f8j4 |
5.1 (4.0)
|
MCP Registry vulnerable to stored XSS in catalogue UI via attribute-quote breakout in publisher-con… | 2026-05-08T17:18:32Z | 2026-05-08T17:18:32Z |
| ghsa-q3j6-qgpj-74h6 |
7.5 (3.1)
|
fast-uri vulnerable to path traversal via percent-encoded dot segments | 2026-05-08T17:15:09Z | 2026-05-08T17:15:09Z |
| ghsa-qxhc-wx3p-2wmg |
7.5 (3.1)
|
@fastify/accepts-serializer Vulnerable to Denial of Service via Unbounded Accept Header Cache Growth | 2026-05-08T17:13:38Z | 2026-05-08T17:13:38Z |
| ghsa-rxvx-hhpj-q6px |
7.5 (3.1)
|
ZITADEL has LDAP Filter Injection in Login Flow | 2026-05-08T17:11:29Z | 2026-05-08T17:11:29Z |
| ghsa-qwfw-ggxw-577c |
8.7 (4.0)
|
ex_webrtc client-role handshake is missing DTLS peer fingerprint validation | 2026-05-08T17:08:18Z | 2026-05-08T17:08:19Z |
| ghsa-95c3-6vvw-4mrq |
2.1 (4.0)
|
MCP Registry's GitHub OIDC tokens are replayable across registry deployments due to shared audience | 2026-05-08T17:06:22Z | 2026-05-08T17:06:22Z |
| ghsa-v8vw-gw5j-w7m6 |
5.7 (4.0)
|
MCP Registry has open redirect via protocol-relative path in trailing-slash middleware | 2026-05-08T17:02:12Z | 2026-05-08T17:02:12Z |
| ghsa-8g7g-hmwm-6rv2 |
8.3 (3.1)
|
n8n-mcp affected by path traversal, redirect-following SSRF, and telemetry payload exposure | 2026-05-08T17:00:09Z | 2026-05-08T17:00:09Z |
| ghsa-cmrh-wvq6-wm9r |
7.2 (4.0)
|
n8n-mcp webhook and API client paths has an authenticated SSRF | 2026-05-08T16:59:17Z | 2026-05-08T16:59:17Z |
| ghsa-w9f3-qc75-qgx9 |
9.3 (3.1)
|
PrestaShop has a stored XSS executable in customer service view | 2026-05-08T16:54:22Z | 2026-05-08T16:54:22Z |
| ghsa-2h64-c999-c9r6 |
9.4 (4.0)
|
SiYuan Affected by Stored XSS via Attribute View Name to Electron Renderer RCE | 2026-05-08T16:53:18Z | 2026-05-08T16:53:18Z |
| ghsa-52cq-7v8r-62c6 |
8.3 (4.0)
|
gmaps-mcp's unauthenticated HTTP transport allows unlimited Google Maps API calls at operator expense | 2026-05-08T16:32:29Z | 2026-05-08T16:32:29Z |
| ghsa-5wm8-gmm8-39j9 |
8.7 (4.0)
|
fast-xml-builder allows attribute values with unwanted quotes to bypass malicious or unwanted attributes | 2026-05-08T16:29:10Z | 2026-05-08T16:29:10Z |
| ghsa-45c6-75p6-83cc |
6.1 (3.1)
|
fast-xml-builder Comment Value regex can be bypassed | 2026-05-08T16:27:28Z | 2026-05-08T16:27:28Z |
| ghsa-2cm2-m3w5-gp2f |
5.3 (3.1)
|
vm2 has access to `VM2_INTERNAL_STATE_DO_NOT_USE_OR_PROGRAM_WILL_FAIL` | 2026-05-08T16:22:52Z | 2026-05-08T16:22:52Z |
| ghsa-9vg3-4rfj-wgcm |
9.8 (3.1)
|
vm2 has Sandbox Breakout Through Null Proto Exception | 2026-05-08T16:20:58Z | 2026-05-08T16:20:58Z |
| ghsa-9qj6-qjgg-37qq |
9.8 (3.1)
|
vm2 has sandbox breakout via `neutralizeArraySpeciesBatch` | 2026-05-08T15:58:48Z | 2026-05-08T15:58:48Z |
| ghsa-jp94-3292-c3xv |
6.1 (3.1)
|
Devise has an Open Redirect via Unvalidated `request.referrer` in Timeoutable Session Timeout Handler | 2026-05-08T15:41:47Z | 2026-05-08T15:41:47Z |
| ghsa-w5m6-6h93-74m4 |
|
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix possible … | 2026-05-08T15:31:30Z | 2026-05-08T15:31:30Z |
| ghsa-vgv8-2mh4-qh7r |
|
In the Linux kernel, the following vulnerability has been resolved: unshare: fix unshare_fs() hand… | 2026-05-08T15:31:30Z | 2026-05-08T15:31:30Z |
| ghsa-5rpf-7pmv-82cj |
|
In the Linux kernel, the following vulnerability has been resolved: scsi: storvsc: Fix scheduling … | 2026-05-08T15:31:30Z | 2026-05-08T15:31:30Z |
| ghsa-5h27-3wgq-g9cf |
|
In the Linux kernel, the following vulnerability has been resolved: fs: init flags_valid before ca… | 2026-05-08T15:31:30Z | 2026-05-08T15:31:30Z |
| ghsa-4rpc-8842-rq53 |
|
In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Add NULL checks … | 2026-05-08T15:31:30Z | 2026-05-08T15:31:30Z |
| ghsa-x288-7jx3-2597 |
|
In the Linux kernel, the following vulnerability has been resolved: spi: amlogic: spifc-a4: Fix DM… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-wm82-xv2w-22mm |
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: RX, Fix XDP multi-b… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-qq8v-696h-fhv2 |
|
In the Linux kernel, the following vulnerability has been resolved: mctp: route: hold key->lock in… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-qc73-3qqx-fc2q |
|
In the Linux kernel, the following vulnerability has been resolved: rxrpc, afs: Fix missing error … | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-pfqp-2whq-57g2 |
|
In the Linux kernel, the following vulnerability has been resolved: net: bonding: Fix nd_tbl NULL … | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-mxr7-7p5m-m8xr |
|
In the Linux kernel, the following vulnerability has been resolved: xprtrdma: Decrement re_receivi… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2025-28 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.772920+00:00 |
| pysec-2025-27 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.711157+00:00 |
| pysec-2025-26 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.645758+00:00 |
| pysec-2025-58 |
8.8 (3.1)
|
vLLM is a library for LLM inference and serving. vllm/model_executor/weight_utils.py impl… | vllm | 2025-01-27T18:15:41+00:00 | 2025-06-27T21:22:36.583615+00:00 |
| pysec-2025-12 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2025-01-21T15:15:13+00:00 | 2025-04-08T10:23:23.899726+00:00 |
| pysec-2025-1 |
|
An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2… | django | 2025-01-14T19:15:32+00:00 | 2025-01-14T21:22:18.665005+00:00 |
| pysec-2025-33 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. When the Vyper Compiler uses the… | vyper | 2025-01-14T18:16:05+00:00 | 2025-04-23T21:23:01.322686+00:00 |
| pysec-2024-158 |
|
Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when … | djoser | 2024-12-13T05:15:07+00:00 | 2025-01-14T05:22:11.856636+00:00 |
| pysec-2024-159 |
|
Versions of the package luigi before 3.6.0 are vulnerable to Arbitrary File Write via Arc… | luigi | 2024-12-10T05:15:07+00:00 | 2025-01-14T05:22:17.204098+00:00 |
| pysec-2024-157 |
|
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2… | django | 2024-12-06T12:15:18+00:00 | 2025-01-14T05:22:11.817473+00:00 |
| pysec-2024-156 |
|
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2… | django | 2024-12-06T12:15:17+00:00 | 2025-01-14T05:22:11.736011+00:00 |
| pysec-2024-256 |
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2024-12-03T16:15:24+00:00 | 2025-06-27T17:22:53.325430+00:00 |
| pysec-2024-161 |
|
Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R packag… | pyarrow | 2024-11-28T17:15:48+00:00 | 2025-01-14T05:22:20.554292+00:00 |
| pysec-2024-224 |
7.0 (3.1)
|
Excessive directory permissions in MLflow leads to local privilege escalation when using … | mlflow | 2024-11-25T14:15:06+00:00 | 2025-02-03T16:23:40.409646+00:00 |
| pysec-2024-187 |
9.8 (3.1)
|
virtualenv before 20.26.6 allows command injection through the activation scripts for a v… | virtualenv | 2024-11-24T16:15:06+00:00 | 2025-01-19T04:23:01.784352+00:00 |
| pysec-2024-229 |
8.8 (3.1)
|
Hugging Face Transformers Trax Model Deserialization of Untrusted Data Remote Code Execut… | transformers | 2024-11-22T22:15:07+00:00 | 2025-02-10T23:22:41.499413+00:00 |
| pysec-2024-228 |
8.8 (3.1)
|
Hugging Face Transformers MaskFormer Model Deserialization of Untrusted Data Remote Code … | transformers | 2024-11-22T22:15:07+00:00 | 2025-02-10T23:22:41.449105+00:00 |
| pysec-2024-227 |
8.8 (3.1)
|
Hugging Face Transformers MobileViTV2 Deserialization of Untrusted Data Remote Code Execu… | transformers | 2024-11-22T22:15:06+00:00 | 2025-02-10T23:22:41.399021+00:00 |
| pysec-2024-178 |
7.5 (3.1)
|
Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to version 2… | litestar | 2024-11-20T21:15:08+00:00 | 2025-01-19T01:52:23.772726+00:00 |
| pysec-2024-160 |
6.1 (3.1)
|
lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.cle… | lxml-html-clean | 2024-11-19T22:15:21+00:00 | 2025-01-14T05:22:17.244267+00:00 |
| pysec-2024-124 |
4.8 (3.1)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting… | django-cms | 2024-11-18T12:15:00Z | 2024-11-20T16:23:43.554559Z |
| pysec-2024-123 |
6.1 (3.1)
|
An open redirection vulnerability exists in pyload/pyload version 0.5.0. The vulnerabilit… | pyload-ng | 2024-11-15T11:15:00+00:00 | 2024-11-19T22:22:34.280606+00:00 |
| pysec-2024-182 |
|
Apache Airflow versions before 2.10.3 contain a vulnerability that could expose sensitive… | apache-airflow | 2024-11-15T09:15:14+00:00 | 2025-01-19T04:22:59.398988+00:00 |
| pysec-2024-204 |
8.1 (3.1)
|
TorchGeo Remote Code Execution Vulnerability | torchgeo | 2024-11-12T18:15:45+00:00 | 2025-01-19T19:19:01.299352+00:00 |
| pysec-2024-231 |
8.1 (3.1)
|
LightGBM Remote Code Execution Vulnerability | lightgbm | 2024-11-12T18:15:28+00:00 | 2025-02-15T07:20:34.246161+00:00 |
| pysec-2024-238 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-11-06T15:15:11+00:00 | 2025-04-08T10:23:23.857960+00:00 |
| pysec-2024-183 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-11-06T15:15:11+00:00 | 2025-01-19T04:22:59.576907+00:00 |
| pysec-2024-202 |
6.5 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-11-05T19:15:07+00:00 | 2025-01-19T16:22:59.212853+00:00 |
| pysec-2024-201 |
6.1 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-11-05T19:15:05+00:00 | 2025-01-19T16:22:59.154645+00:00 |
| pysec-2024-115 |
9.8 (3.1)
|
A vulnerability in the GraphCypherQAChain class of langchain-ai/langchain-community versi… | langchain | 2024-11-05T16:04:14Z | 2024-11-12T19:19:57.535206Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-3340 | Malicious code in trevlo (npm) | 2026-05-05T11:51:48Z | 2026-05-05T11:51:48Z |
| mal-2026-3339 | Malicious code in nf-ui-components (npm) | 2026-05-05T11:40:12Z | 2026-05-05T11:40:13Z |
| mal-2026-3334 | Malicious code in fanduel (npm) | 2026-05-04T21:55:51Z | 2026-05-04T21:55:51Z |
| mal-2026-3333 | Malicious code in rogiant-quick-install (PyPI) | 2026-05-04T21:10:00Z | 2026-05-04T21:10:00Z |
| mal-2026-3332 | Malicious code in rogiant (PyPI) | 2026-05-04T20:53:10Z | 2026-05-04T20:53:50Z |
| mal-2026-3331 | Malicious code in lazyhtml-scripts (npm) | 2026-05-04T19:42:20Z | 2026-05-04T19:42:20Z |
| mal-2026-3338 | Malicious code in ms.analytics-web (npm) | 2026-05-04T19:06:03Z | 2026-05-04T19:06:03Z |
| mal-2026-3329 | Malicious code in api-typings (npm) | 2026-05-04T16:46:38Z | 2026-05-04T16:46:38Z |
| mal-2026-3330 | Malicious code in seek-pass (npm) | 2026-05-04T16:40:53Z | 2026-05-04T16:40:53Z |
| mal-2026-3328 | Malicious code in pocpoc2626 (npm) | 2026-05-04T16:36:10Z | 2026-05-04T17:38:11Z |
| mal-2026-3327 | Malicious code in capacitor-plugin-service-worker (npm) | 2026-05-04T16:15:46Z | 2026-05-04T16:40:52Z |
| mal-2026-3336 | Malicious code in @channel_bot/xa0 (npm) | 2026-05-04T13:51:12Z | 2026-05-04T23:51:15Z |
| mal-2026-3326 | Malicious code in paychex-common-vendor-lib (npm) | 2026-05-04T13:20:41Z | 2026-05-04T13:20:41Z |
| mal-2026-3325 | Malicious code in cloudauth-sdk (PyPI) | 2026-05-04T11:30:49Z | 2026-05-04T11:30:49Z |
| mal-2026-3324 | Malicious code in randomchoicemas (PyPI) | 2026-05-04T10:29:41Z | 2026-05-04T10:29:41Z |
| mal-2026-3337 | Malicious code in @t-in-one/save_application_hid_to_storage (npm) | 2026-05-04T10:10:51Z | 2026-05-04T10:10:51Z |
| mal-2026-3335 | Malicious code in @bank-widgets/whats-new (npm) | 2026-05-04T09:30:54Z | 2026-05-04T09:30:54Z |
| mal-2026-3321 | Malicious code in @montanatonytest/app.web (npm) | 2026-05-04T03:02:53Z | 2026-05-04T03:02:59Z |
| mal-2026-3320 | Malicious code in @google-pay-trust/start (npm) | 2026-05-04T03:02:53Z | 2026-05-04T03:02:59Z |
| mal-2026-3319 | Malicious code in @google-pay-trust/init-google-pay-result (npm) | 2026-05-04T03:02:53Z | 2026-05-04T03:02:59Z |
| mal-2026-3318 | Malicious code in @b2b_blocker/hide_activation_error (npm) | 2026-05-04T03:02:53Z | 2026-05-04T03:02:59Z |
| mal-2026-3317 | Malicious code in @apple-pay-trust/destroy (npm) | 2026-05-04T03:02:53Z | 2026-05-04T03:02:54Z |
| mal-2026-3316 | Malicious code in @apple-pay-trust/check-apple-pay (npm) | 2026-05-04T03:02:53Z | 2026-05-04T03:02:59Z |
| mal-2026-3276 | Malicious code in accesso-angular-cache-buster (npm) | 2026-05-04T01:51:22Z | 2026-05-04T01:51:27Z |
| mal-2026-3286 | Malicious code in wagner-horizon (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:36Z |
| mal-2026-3285 | Malicious code in vpi-guides (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| mal-2026-3284 | Malicious code in tinfoil-shops (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:36Z |
| mal-2026-3283 | Malicious code in temhe-dev (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| mal-2026-3282 | Malicious code in shopify-draggable (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| mal-2026-3281 | Malicious code in pos-next-react-native (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0892 | WatchGuard Firebox: Mehrere Schwachstellen | 2026-03-26T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0891 | Dovecot: Mehrere Schwachstellen | 2026-03-26T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0888 | tigervnc: Schwachstelle ermöglicht Offenlegung von Informationen, Manipulation von Dateien, und Denial of Service | 2026-03-26T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0887 | Internet Systems Consortium Kea: Schwachstelle ermöglicht Denial of Service | 2026-03-26T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0884 | OpenClaw: Mehrere Schwachstellen | 2026-03-26T23:00:00.000+00:00 | 2026-04-12T22:00:00.000+00:00 |
| wid-sec-w-2026-0882 | GIMP: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0881 | IBM License Metric Tool: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0880 | FreeRDP: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0879 | Linux Kernel: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-04-08T22:00:00.000+00:00 |
| wid-sec-w-2026-0878 | FreeBSD Project FreeBSD OS: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0875 | Red Hat Enterprise Linux (ncurses): Schwachstelle ermöglicht Codeausführung | 2026-03-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0873 | docker: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0870 | libpng: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0869 | SolarWinds Platform: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0865 | Keycloak: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0864 | OpenBao: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0863 | Internet Systems Consortium BIND: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0861 | Linux Kernel: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0860 | NGINX und NGINX Plus: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0858 | NATS Server: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0856 | OpenClaw: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-04-12T22:00:00.000+00:00 |
| wid-sec-w-2026-0855 | Xen: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0854 | Squid: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0851 | IBM InfoSphere Information Server: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0850 | Mozilla Firefox und Mozilla Thunderbird: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0849 | ImageMagick: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-03-24T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0847 | GitLab: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0845 | IBM WebSphere Application Server Liberty: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0844 | Hitachi Ops Center: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0843 | Node.js: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-078-05 | Mitsubishi Electric CNC Series | 2026-03-10T00:00:00.000000Z | 2026-03-19T06:00:00.000000Z |
| icsa-26-076-04 | Siemens SICAM SIAPP SDK | 2026-03-10T00:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-071-05 | Siemens Heliox EV Chargers | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-04 | Siemens SIMATIC | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-03 | Siemens SIDIS Prime | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-02 | Siemens RUGGEDCOM APE1808 Devices | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-064-01 | Delta Electronics CNCSoft-G2 | 2026-03-05T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| icsa-26-062-05 | Labkotec LID-3300IP | 2026-03-03T07:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-04 | Portwell Engineering Toolkits | 2026-03-03T07:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-08 | Everon OCPP Backends | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-062-07 | ePower epower.ie | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-062-06 | Mobiliti e-mobi.hu | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-062-01 | Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet Module (Update A) | 2026-03-03T00:00:00.000000Z | 2026-05-07T06:00:00.000000Z |
| icsa-26-076-01 | CODESYS in Festo Automation Suite | 2026-02-26T08:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-057-10 | Copeland XWEB and XWEB Pro | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-09 | Yokogawa CENTUM VP R6, R7 | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-08 | Mobility46 mobility46.se | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-07 | EV Energy ev.energy | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-06 | SWITCH EV swtchenergy.com | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-05 | Chargemap chargemap.com | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-04 | EV2GO ev2go.io | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-03 | CloudCharge cloudcharge.se | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-02 | Pelco, Inc. Sarix Pro 3 Series IP Cameras | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-01 | Johnson Controls, Inc. Frick Controls Quantum HD | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-055-01 | InSAT MasterSCADA BUK-TS | 2026-02-24T07:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-26-055-03 | Gardyn Home Kit (Update A) | 2026-02-24T06:00:00.000000Z | 2026-04-02T05:00:00.000000Z |
| icsa-26-092-03 | Hitachi Energy Ellipse | 2026-02-24T00:00:00.000000Z | 2026-04-02T06:00:00.000000Z |
| icsa-26-062-03 | Hitachi Energy RTU500 Product | 2026-02-24T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-02 | Hitachi Energy Relion REB500 Product | 2026-02-24T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-050-04 | Welker OdorEyes EcoSystem Pulse Bypass System with XL4 Controller | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-asaftd-desync-n5avzeqw | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Services Client-Side Request Smuggling Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asa-ssh-keybypass-cr5xpusf | Cisco Secure Firewall Adaptive Security Appliance Software SSH Partial Private Key Authentication Bypass Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ucsm-cmdinj-gvxlpesb | Cisco UCS Manager Software Command Injection Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsm-afwae-mogufyln | Cisco UCS Manager Software Privilege Escalation Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsfxosxss-7skve8zv | Cisco FXOS and UCS Manager Software Stored Cross-Site Scripting Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsciv-wgytc78q | Cisco FXOS and UCS Manager Software Command Injection Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-sdwan-rpa-ehchtzk | Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-03-03T00:38:56+00:00 |
| cisco-sa-sdwan-authbp-qwcx8d4v | Cisco Catalyst SD-WAN Vulnerabilities | 2026-02-25T16:00:00+00:00 | 2026-04-22T15:10:56+00:00 |
| cisco-sa-nxos-ether-dos-kv8ynwz4 | Cisco Nexus 3600 and 9500-R Series Switching Platforms Layer 2 Loop Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-nxos-dsnmp-cnn39uh | Cisco Nexus 9000 Series Fabric Switches in ACI Mode SNMP Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-nxos-cpdos-qlsv6pfd | Cisco Nexus 9000 Series Fabric Switches in ACI Mode Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-n3kn9k_aci_lldp_dos-ndgrrra3 | Cisco NX-OS Software Link Layer Discovery Protocol Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-apic-dos-rnus8efw | Cisco Application Policy Infrastructure Controller Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-wsa-archive-bypass-scx2e8zf | Cisco Secure Web Appliance Real-Time Scanning Archive File Bypass Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-20T21:08:47+00:00 |
| cisco-sa-tce-roomos-dos-9v9jrc2q | Cisco TelePresence Collaboration Endpoint Software and RoomOS Software Denial of Service Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-12T17:37:39+00:00 |
| cisco-sa-pi-xss-byevkcd | Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-epnm-pi-redirect-6sx82dn | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Open Redirect Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-cmm-file-up-ky47n8kk | Cisco Meeting Management Arbitrary File Upload Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-voice-rce-morhqy4b | Cisco Unified Communications Products Remote Code Execution Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-02-13T15:21:01+00:00 |
| cisco-sa-ucce-pcce-xss-2jvyg3ud | Cisco Packaged Contact Center Enterprise and Cisco Unified Contact Center Enterprise Cross-Site Scripting Vulnerabilities | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-intersight-privesc-p6tbm6jk | Cisco Intersight Virtual Appliance Privilege Escalation Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-iec6400-pem5uq7v | Cisco IEC6400 Wireless Backhaul Edge Compute Software SSH Denial of Service Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-ise-xss-9tdh2kx | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-ise-xss-964cdxw5 | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-epnm-pi-stored-xss-gekx8ywk | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-snort3-dcerpc-vulns-j9hnf4th | Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities | 2026-01-07T16:00:00+00:00 | 2026-02-10T20:42:07+00:00 |
| cisco-sa-ise-xxe-jwsbsdkt | Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability | 2026-01-07T16:00:00+00:00 | 2026-01-07T16:00:00+00:00 |
| cisco-sa-sma-attack-n9bf4 | Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager | 2025-12-17T16:00:00+00:00 | 2026-01-15T16:01:43+00:00 |
| cisco-sa-react-flight-tyw32ddb | Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 | 2025-12-04T16:00:00+00:00 | 2025-12-17T22:37:17+00:00 |
| cisco-sa-privesc-catc-ryjreelu | Cisco Catalyst Center Privilege Escalation Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-43073 | x86-64: rename misleadingly named '__copy_user_nocache()' function | 2026-05-02T00:00:00.000Z | 2026-05-07T01:03:11.000Z |
| msrc_cve-2026-43058 | media: vidtv: fix pass-by-value structs causing MSAN warnings | 2026-05-02T00:00:00.000Z | 2026-05-06T14:48:50.000Z |
| msrc_cve-2026-43053 | xfs: close crash window in attr dabtree inactivation | 2026-05-02T00:00:00.000Z | 2026-05-06T14:45:49.000Z |
| msrc_cve-2026-43052 | wifi: mac80211: check tdls flag in ieee80211_tdls_oper | 2026-05-02T00:00:00.000Z | 2026-05-06T14:47:18.000Z |
| msrc_cve-2026-43049 | HID: logitech-hidpp: Prevent use-after-free on force feedback initialisation failure | 2026-05-02T00:00:00.000Z | 2026-05-06T14:46:50.000Z |
| msrc_cve-2026-43048 | HID: core: Mitigate potential OOB by removing bogus memset() | 2026-05-02T00:00:00.000Z | 2026-05-06T14:45:58.000Z |
| msrc_cve-2026-43045 | mshv: Fix error handling in mshv_region_pin | 2026-05-02T00:00:00.000Z | 2026-05-02T01:03:37.000Z |
| msrc_cve-2026-43042 | mpls: add seqcount to protect the platform_label{,s} pair | 2026-05-02T00:00:00.000Z | 2026-05-06T14:46:59.000Z |
| msrc_cve-2026-43037 | ip6_tunnel: clear skb2->cb[] in ip4ip6_err() | 2026-05-02T00:00:00.000Z | 2026-05-06T01:01:29.000Z |
| msrc_cve-2026-43036 | net: use skb_header_pointer() for TCPv4 GSO frag_off check | 2026-05-02T00:00:00.000Z | 2026-05-06T14:46:24.000Z |
| msrc_cve-2026-43033 | crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption | 2026-05-02T00:00:00.000Z | 2026-05-04T14:40:36.000Z |
| msrc_cve-2026-43022 | Bluetooth: hci_sync: hci_cmd_sync_queue_once() return -EEXIST if exists | 2026-05-02T00:00:00.000Z | 2026-05-02T01:02:42.000Z |
| msrc_cve-2026-43021 | Bluetooth: hci_sync: fix leaks when hci_cmd_sync_queue_once fails | 2026-05-02T00:00:00.000Z | 2026-05-02T01:03:09.000Z |
| msrc_cve-2026-43019 | Bluetooth: hci_conn: fix potential UAF in set_cig_params_sync | 2026-05-02T00:00:00.000Z | 2026-05-06T14:47:52.000Z |
| msrc_cve-2026-43010 | bpf: Reject sleepable kprobe_multi programs at attach time | 2026-05-02T00:00:00.000Z | 2026-05-06T14:47:43.000Z |
| msrc_cve-2026-43009 | bpf: Fix incorrect pruning due to atomic fetch precision tracking | 2026-05-02T00:00:00.000Z | 2026-05-06T14:48:10.000Z |
| msrc_cve-2026-42154 | Prometheus: remote read endpoint allows denial of service via crafted snappy payload | 2026-05-02T00:00:00.000Z | 2026-05-07T01:03:58.000Z |
| msrc_cve-2026-42151 | Prometheus Azure AD remote write OAuth client secret exposed via config API | 2026-05-02T00:00:00.000Z | 2026-05-07T01:03:49.000Z |
| msrc_cve-2026-41675 | xmldom: XML node injection through unvalidated processing instruction serialization | 2026-05-02T00:00:00.000Z | 2026-05-08T01:01:35.000Z |
| msrc_cve-2026-41674 | xmldom: XML injection through unvalidated DocumentType serialization | 2026-05-02T00:00:00.000Z | 2026-05-08T01:01:29.000Z |
| msrc_cve-2026-41673 | xmldom: Denial of service via uncontrolled recursion in XML serialization | 2026-05-02T00:00:00.000Z | 2026-05-08T01:01:40.000Z |
| msrc_cve-2026-41672 | xmldom: XML node injection through unvalidated comment serialization | 2026-05-02T00:00:00.000Z | 2026-05-08T01:01:23.000Z |
| msrc_cve-2026-37457 | CVE-2026-37457 | 2026-05-02T00:00:00.000Z | 2026-05-08T01:42:40.000Z |
| msrc_cve-2026-35579 | CoreDNS TSIG authentication bypass on gRPC, QUIC, DoH, and DoH3 transports | 2026-05-02T00:00:00.000Z | 2026-05-07T01:03:04.000Z |
| msrc_cve-2026-34059 | Apache HTTP Server: mod_proxy_ajp: Heap Over-Read and memory disclosure in ajp_parse_data() | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:25.000Z |
| msrc_cve-2026-34032 | Apache HTTP Server: mod_proxy_ajp: Heap Buffer Over-Read Due to Missing Null-Termination Check (ajp_msg_get_string) | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:33.000Z |
| msrc_cve-2026-33857 | Apache HTTP Server: Off-by-one OOB reads in AJP getter functions | 2026-05-02T00:00:00.000Z | 2026-05-07T01:12:22.000Z |
| msrc_cve-2026-33523 | Apache HTTP Server: multiple modules: HTTP response splitting forwarding malicious status line | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:09.000Z |
| msrc_cve-2026-33489 | CoreDNS transfer plugin subzone ACL bypass via lexicographic zone comparison | 2026-05-02T00:00:00.000Z | 2026-05-07T01:02:40.000Z |
| msrc_cve-2026-33190 | CoreDNS TSIG authentication bypass on encrypted DNS transports | 2026-05-02T00:00:00.000Z | 2026-05-07T01:02:32.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0076 | Kwetsbaarheden verholpen in Cisco Secure Firewall Management Center | 2026-03-04T20:49:12.211658Z | 2026-03-19T11:48:18.917205Z |
| ncsc-2026-0075 | Kwetsbaarheid verholpen in n8n Automation Platform | 2026-03-04T14:03:54.207583Z | 2026-03-04T14:03:54.207583Z |
| ncsc-2026-0074 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2026-03-03T09:07:09.279353Z | 2026-03-03T09:07:09.279353Z |
| ncsc-2026-0073 | Kwetsbaarheid verholpen in Juniper Junos OS Evolved | 2026-02-27T09:48:51.845864Z | 2026-02-27T09:48:51.845864Z |
| ncsc-2026-0072 | Kwetsbaarheden verholpen in GitLab | 2026-02-27T07:15:18.318821Z | 2026-02-27T07:15:18.318821Z |
| ncsc-2026-0071 | Kwetsbaarheden verholpen in Cisco Catalyst SD-WAN Manager | 2026-02-25T17:11:09.013125Z | 2026-03-06T12:07:02.595940Z |
| ncsc-2026-0070 | Kwetsbaarheden verholpen in VMware Aria Operations | 2026-02-25T11:24:46.807867Z | 2026-03-04T08:54:08.940512Z |
| ncsc-2026-0069 | Kwetsbaarheden verholpen in SolarWinds Serv-U | 2026-02-25T10:39:38.154815Z | 2026-02-25T10:39:38.154815Z |
| ncsc-2026-0068 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2026-02-23T14:27:28.865278Z | 2026-02-23T14:27:28.865278Z |
| ncsc-2026-0067 | Kwetsbaarheden verholpen in GitHub Enterprise Server | 2026-02-20T10:13:39.540778Z | 2026-02-20T10:13:39.540778Z |
| ncsc-2026-0066 | Kwetsbaarheid verholpen in Google Chrome | 2026-02-19T08:29:30.712590Z | 2026-02-19T08:29:30.712590Z |
| ncsc-2026-0065 | Kwetsbaarheid verholpen in Dell RecoverPoint for Virtual Machines | 2026-02-18T13:18:23.815384Z | 2026-02-18T13:18:23.815384Z |
| ncsc-2026-0064 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2026-02-13T13:35:03.870920Z | 2026-02-13T13:35:03.870920Z |
| ncsc-2026-0063 | Kwetsbaarheden verholpen in Apple macOS | 2026-02-13T13:24:06.433550Z | 2026-02-13T13:24:06.433550Z |
| ncsc-2026-0062 | Kwetsbaarheden verholpen in GitLab CE/EE | 2026-02-11T11:45:05.986313Z | 2026-02-11T11:45:05.986313Z |
| ncsc-2026-0061 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2026-02-11T11:34:50.888067Z | 2026-02-11T11:34:50.888067Z |
| ncsc-2026-0060 | Kwetsbaarheden verholpen in Fortinet FortiSandbox, FortiAuthenticator en FortiClient | 2026-02-11T11:34:36.684955Z | 2026-02-11T11:34:36.684955Z |
| ncsc-2026-0059 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2026-02-11T08:16:27.583936Z | 2026-03-10T14:20:48.176282Z |
| ncsc-2026-0058 | Kwetsbaarheden verholpen in Microsoft Office | 2026-02-10T19:11:42.825147Z | 2026-02-10T19:11:42.825147Z |
| ncsc-2026-0057 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-02-10T19:08:27.878305Z | 2026-02-10T19:08:27.878305Z |
| ncsc-2026-0056 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2026-02-10T19:07:16.028511Z | 2026-02-10T19:07:16.028511Z |
| ncsc-2026-0055 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-02-10T19:05:45.729972Z | 2026-02-10T19:05:45.729972Z |
| ncsc-2026-0054 | Kwetsbaarheid verholpen in Microsoft Exchange | 2026-02-10T19:04:51.366294Z | 2026-02-10T19:04:51.366294Z |
| ncsc-2026-0053 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-02-10T19:01:45.561771Z | 2026-02-10T19:01:45.561771Z |
| ncsc-2026-0052 | Kwetsbaarheden verholpen in SAP producten | 2026-02-10T12:28:40.531069Z | 2026-02-10T12:28:40.531069Z |
| ncsc-2026-0051 | Kwetsbaarheden verholpen in Siemens producten | 2026-02-10T12:27:40.637581Z | 2026-02-10T12:27:40.637581Z |
| ncsc-2026-0050 | Kwetsbaarheid verholpen in PEAR | 2026-02-09T10:41:43.856342Z | 2026-02-09T10:41:43.856342Z |
| ncsc-2026-0049 | Kwetsbaarheden verholpen in n8n | 2026-02-09T10:39:40.792744Z | 2026-02-09T10:39:40.792744Z |
| ncsc-2026-0048 | Kwetsbaarheid verholpen in BeyondTrust Remote Support | 2026-02-09T10:27:57.867529Z | 2026-02-13T12:54:32.614217Z |
| ncsc-2026-0047 | Kwetsbaarheid verholpen in Fortinet FortiClient EMS | 2026-02-09T10:16:18.048622Z | 2026-03-30T11:36:22.656910Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2019_2-01 | CSV Injection on node label | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019_1-01 | Stored XSS in field name data model | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019:2-01 | CSV Injection on node label | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019:1-01 | Stored XSS in field name data model | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10645-1 | python311-pip-26.1-1.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10644-1 | prometheus-postgres_exporter-0.10.1-6.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10643-1 | php-composer2-2.9.7-1.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10642-1 | libmozjs-140-0-140.10.0-1.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10641-1 | libixml11-1.18.5-1.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10640-1 | libpng12-0-1.2.59-5.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10639-1 | java-25-openjdk-25.0.3.0-1.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10638-1 | java-21-openjdk-21.0.11.0-1.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10637-1 | java-17-openjdk-17.0.19.0-1.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10636-1 | java-11-openjdk-11.0.31.0-1.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10635-1 | hauler-1.4.2-1.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10634-1 | golang-github-QubitProducts-exporter_exporter-0.4.0-16.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10633-1 | freerdp-3.24.2-1.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10632-1 | dnsdist-2.0.5-1.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10631-1 | distribution-registry-3.1.0-1.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10630-1 | azure-storage-azcopy-10.32.2-2.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:10629-1 | PackageKit-1.3.5-1.1 on GA media | 2026-04-28T00:00:00Z | 2026-04-28T00:00:00Z |
| opensuse-su-2026:20629-1 | Security update for mariadb | 2026-04-27T14:44:48Z | 2026-04-27T14:44:48Z |
| opensuse-su-2026:20632-1 | Security update for freerdp2 | 2026-04-27T13:16:46Z | 2026-04-27T13:16:46Z |
| opensuse-su-2026:20628-1 | Security update for container-suseconnect | 2026-04-27T11:20:01Z | 2026-04-27T11:20:01Z |
| opensuse-su-2026:10625-1 | xdg-dbus-proxy-0.1.7-1.1 on GA media | 2026-04-26T00:00:00Z | 2026-04-26T00:00:00Z |
| opensuse-su-2026:10624-1 | libsystemd0-259.5-1.3 on GA media | 2026-04-26T00:00:00Z | 2026-04-26T00:00:00Z |
| opensuse-su-2026:10623-1 | strongswan-6.0.6-1.1 on GA media | 2026-04-26T00:00:00Z | 2026-04-26T00:00:00Z |
| opensuse-su-2026:10622-1 | python313-mitmproxy-12.2.2-1.1 on GA media | 2026-04-26T00:00:00Z | 2026-04-26T00:00:00Z |
| opensuse-su-2026:10621-1 | libngtcp2-16-1.22.1-1.1 on GA media | 2026-04-26T00:00:00Z | 2026-04-26T00:00:00Z |
| opensuse-su-2026:10620-1 | libmozjs-115-0-115.15.0-8.1 on GA media | 2026-04-26T00:00:00Z | 2026-04-26T00:00:00Z |
| opensuse-su-2026:10619-1 | emacs-30.2-8.1 on GA media | 2026-04-26T00:00:00Z | 2026-04-26T00:00:00Z |
| opensuse-su-2026:10618-1 | alloy-1.15.1-1.1 on GA media | 2026-04-26T00:00:00Z | 2026-04-26T00:00:00Z |
| opensuse-su-2026:10610-1 | MozillaThunderbird-140.9.1-1.1 on GA media | 2026-04-24T00:00:00Z | 2026-04-24T00:00:00Z |
| opensuse-su-2026:20620-1 | Security update for rclone | 2026-04-23T16:22:47Z | 2026-04-23T16:22:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:14137 | Red Hat Security Advisory: kernel-rt security update | 2026-05-06T13:41:11+00:00 | 2026-05-08T20:34:02+00:00 |
| rhsa-2026:12282 | Red Hat Security Advisory: OpenShift Container Platform 4.12.88 bug fix and security update | 2026-05-06T13:32:35+00:00 | 2026-05-08T20:59:24+00:00 |
| rhsa-2026:12283 | Red Hat Security Advisory: OpenShift Container Platform 4.12.88 security and extras update | 2026-05-06T13:03:21+00:00 | 2026-05-08T21:37:34+00:00 |
| rhsa-2026:14087 | Red Hat Security Advisory: libsoup security update | 2026-05-06T13:00:52+00:00 | 2026-05-06T20:40:59+00:00 |
| rhsa-2026:13811 | Red Hat Security Advisory: OpenShift Container Platform 4.21.14 bug fix and security update | 2026-05-06T11:54:56+00:00 | 2026-05-08T20:34:11+00:00 |
| rhsa-2026:13978 | Red Hat Security Advisory: libsoup security update | 2026-05-06T11:48:42+00:00 | 2026-05-06T20:41:00+00:00 |
| rhsa-2026:13977 | Red Hat Security Advisory: firefox security update | 2026-05-06T11:41:06+00:00 | 2026-05-07T21:42:06+00:00 |
| rhsa-2026:14020 | Red Hat Security Advisory: Release of components for Service Telemetry Framework 1.5.7 | 2026-05-06T11:39:14+00:00 | 2026-05-08T14:59:19+00:00 |
| rhsa-2026:13971 | Red Hat Security Advisory: skopeo security update | 2026-05-06T11:24:56+00:00 | 2026-05-08T03:00:00+00:00 |
| rhsa-2026:13938 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-05-06T08:55:25+00:00 | 2026-05-08T09:04:17+00:00 |
| rhsa-2026:13932 | Red Hat Security Advisory: kernel security update | 2026-05-06T08:46:35+00:00 | 2026-05-08T20:34:07+00:00 |
| rhsa-2026:13936 | Red Hat Security Advisory: kernel security update | 2026-05-06T08:21:05+00:00 | 2026-05-08T20:34:02+00:00 |
| rhsa-2026:12118 | Red Hat Security Advisory: OpenShift Container Platform 4.18.39 bug fix and security update | 2026-05-06T08:17:11+00:00 | 2026-05-08T21:37:31+00:00 |
| rhsa-2026:12119 | Red Hat Security Advisory: OpenShift Container Platform 4.18.39 security and extras update | 2026-05-06T07:35:33+00:00 | 2026-05-08T21:37:32+00:00 |
| rhsa-2026:13922 | Red Hat Security Advisory: firefox security update | 2026-05-06T07:12:20+00:00 | 2026-05-07T21:42:19+00:00 |
| rhsa-2026:13923 | Red Hat Security Advisory: capstone security update | 2026-05-06T07:03:45+00:00 | 2026-05-06T08:41:50+00:00 |
| rhsa-2026:13917 | Red Hat Security Advisory: fence-agents security update | 2026-05-06T06:52:25+00:00 | 2026-05-06T15:01:47+00:00 |
| rhsa-2026:13916 | Red Hat Security Advisory: fence-agents security update | 2026-05-06T06:40:52+00:00 | 2026-05-06T15:01:47+00:00 |
| rhsa-2026:13907 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-05-06T05:41:42+00:00 | 2026-05-07T09:01:41+00:00 |
| rhsa-2026:13902 | Red Hat Security Advisory: resource-agents security update | 2026-05-06T04:38:55+00:00 | 2026-05-06T15:01:47+00:00 |
| rhsa-2026:13889 | Red Hat Security Advisory: sudo security update | 2026-05-06T01:06:34+00:00 | 2026-05-07T02:29:04+00:00 |
| rhsa-2026:13895 | Red Hat Security Advisory: sudo security update | 2026-05-06T01:00:22+00:00 | 2026-05-07T02:27:34+00:00 |
| rhsa-2026:13888 | Red Hat Security Advisory: sudo security update | 2026-05-06T00:52:29+00:00 | 2026-05-07T02:27:17+00:00 |
| rhsa-2026:13891 | Red Hat Security Advisory: sudo security update | 2026-05-06T00:46:41+00:00 | 2026-05-07T02:28:58+00:00 |
| rhsa-2026:13896 | Red Hat Security Advisory: sudo security update | 2026-05-06T00:43:34+00:00 | 2026-05-07T02:27:28+00:00 |
| rhsa-2026:13892 | Red Hat Security Advisory: sudo security update | 2026-05-06T00:40:29+00:00 | 2026-05-07T02:28:56+00:00 |
| rhsa-2026:13887 | Red Hat Security Advisory: kernel security update | 2026-05-05T23:54:00+00:00 | 2026-05-08T20:34:07+00:00 |
| rhsa-2026:13870 | Red Hat Security Advisory: LibRaw security update | 2026-05-05T19:56:39+00:00 | 2026-05-07T08:28:37+00:00 |
| rhsa-2026:13868 | Red Hat Security Advisory: LibRaw security update | 2026-05-05T19:33:34+00:00 | 2026-05-07T08:27:22+00:00 |
| rhsa-2026:13857 | Red Hat Security Advisory: dovecot security update | 2026-05-05T19:26:43+00:00 | 2026-05-05T20:30:36+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2024-317-03 | Modicon Controllers M340 / Momentum / MC80 | 2024-11-12T05:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2024-317-04 | EcoStruxure™ IT Gateway | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-317-02 | Modicon Controllers M340 / Momentum / MC80 & EcoStruxure™ Control Expert | 2024-11-12T00:00:00.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2024-317-01 | PowerLogic PM5300 Series | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-282-05 | EcoStruxure™ Power Monitoring Expert (PME) | 2024-10-08T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2024-282-08 | EcoStruxure EV Charging Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-07 | System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-06 | Zelio Soft 2 | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-04 | EVlink Home Smart and Schneider Charge | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-03 | Easergy Studio | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-02 | Harmony iPC – HMIBSC IIoT Edge Box Core | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-01 | Data Center Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-254-02 | EcoStruxure™ Power Monitoring Expert and EcoStruxure™ Power Operation or EcoStruxure™ Power SCADA Operation with Advanced Reporting and Dashboards | 2024-09-10T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2024-254-01 | Vijeo Designer | 2024-09-10T00:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2024-226-02 | EcoStruxure™ Machine SCADA Expert / BLUE Open Studio | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2024-226-01 | Accutech Manager | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2024-191-04 | Modicon Controllers M241/ M251, M258 / LMC058 and M262 | 2024-07-09T00:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2024-191-03 | EcoStruxure Foxboro SCADA FoxRTU Station | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-191-02 | EcoStruxureTM Foxboro DCS Core Control Services | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-191-01 | Wiser Home Controller WHC-5918A | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-163-05 | SAGE RTU | 2024-06-11T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-163-04 | SpaceLogic AS-P and AS-B Automation Servers | 2024-06-11T00:00:00.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2024-163-03 | EVlink Home Smart | 2024-06-11T00:00:00.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2024-163-02 | PowerLogic P5 | 2024-06-11T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2024-163-01 | Modicon M340, Modbus/TCP Ethernet Modicon M340 module, and Modbus/TCP Ethernet Modicon M340 FactoryCast module | 2024-06-11T00:00:00.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2024-100-01 | Easergy Studio | 2024-04-09T00:00:00.000Z | 2024-04-09T00:00:00.000Z |
| sevd-2024-072-01 | Easergy T200 Multiple Vulnerabilities | 2024-03-12T07:02:04.000Z | 2024-03-12T07:02:04.000Z |
| sevd-2024-072-02 | EcoStruxure Power Design - Ecodial | 2024-03-12T05:00:00.000Z | 2024-03-12T05:00:00.000Z |
| sevd-2024-044-01 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon M340, M580 and M580 Safety PLCs | 2024-02-13T12:41:43.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2024-044-03 | EcoStruxure IT Gateway | 2024-02-13T12:21:44.000Z | 2024-02-13T12:21:44.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2020-0003 | MEAC affected by Windows SMBv3 vulnerability | 2020-08-07T10:00:00.000Z | 2020-08-07T10:00:00.000Z |
| sca-2020-0002 | Vulnerabilities in SICK Package Analytics | 2020-08-07T10:00:00.000Z | 2020-07-28T10:00:00.000Z |
| sca-2020-0001 | Security Information Regarding "Profile Programming" | 2020-05-31T10:00:00.000Z | 2020-05-31T10:00:00.000Z |
| sca-2019-0002 | Vulnerability in SICK FX0-GENT00000 and SICK FX0-GPNT00000 | 2019-09-20T10:00:00.000Z | 2019-09-20T10:00:00.000Z |
| sca-2019-0001 | MSC800 affected by hard-coded credentials vulnerability | 2019-06-21T10:00:00.000Z | 2019-06-21T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-563922 | SSA-563922: Local Privilege Escalation Vulnerability in SIMOTION Tools | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-534283 | SSA-534283: Insecure File Share Vulnerability in SIMATIC Virtualization as a Service (SIVaaS) | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-494539 | SSA-494539: Multiple Vulnerabilities in SINEC OS | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-027652 | SSA-027652: Privilege Escalation Vulnerability in SINAMICS Drives | 2025-09-09T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-395458 | SSA-395458: Account Hijacking Vulnerability in Mendix SAML Module | 2025-08-14T00:00:00Z | 2025-08-14T00:00:00Z |
| ssa-201595 | SSA-201595: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager | 2025-08-14T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-994087 | SSA-994087: Multiple SQLite Vulnerabilities in RUGGEDCOM CROSSBOW Station Access Controller Before V5.7 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-978177 | SSA-978177: Vulnerability in Nozomi Guardian/CMC Before 25.4.0 on RUGGEDCOM APE1808 Devices | 2025-08-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-894058 | SSA-894058: Improper Bandwidth Limitation of Network Packets Over Local USB Port Vulnerability in SIPROTEC 5 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-769791 | SSA-769791: Local Arbitrary Code Execution Vulnerability in COMOS Before V10.6 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-707630 | SSA-707630: Multiple Vulnerabilities in SIMATIC RTLS Locating Manager Before V3.3 | 2025-08-12T00:00:00Z | 2025-08-26T00:00:00Z |
| ssa-693808 | SSA-693808: Deserialization Vulnerability in Siemens Engineering Platforms | 2025-08-12T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-674084 | SSA-674084: File Parsing Vulnerabilities in Simcenter Femap Before V2506 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-665108 | SSA-665108: Arbitrary File Upload Vulnerability in RUGGEDCOM ROX II | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-613116 | SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1 | 2025-08-12T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-529291 | SSA-529291: Information Disclosure Vulnerabilities in SICAM Q100/Q200 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-517338 | SSA-517338: Multiple Vulnerabilities in SINEC Traffic Analyzer Before V3.0 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-493787 | SSA-493787: Arbitrary Code Execution Vulnerability in SIMATIC RTLS Locating Manager Before V3.2 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-493396 | SSA-493396: Deserialization Vulnerability in Siemens Engineering Platforms | 2025-08-12T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-400089 | SSA-400089: Denial of Service Vulnerability in SIPROTEC 4 and SIPROTEC 4 Compact | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-382999 | SSA-382999: Multiple Vulnerabilities in Opcenter Quality Before V2506 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-355557 | SSA-355557: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.2 | 2025-08-12T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-331739 | SSA-331739: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting Siemens Products | 2025-08-12T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-282044 | SSA-282044: DLL Hijacking Vulnerability in Siemens Web Installer used by the Online Software Delivery | 2025-08-12T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-186293 | SSA-186293: XML External Entity (XXE) Injection Vulnerability in SIMOTION SCOUT, SIMOTION SCOUT TIA and SINAMICS STARTER | 2025-08-12T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-177847 | SSA-177847: Improper VNC Password Check Vulnerability in SINUMERIK Controllers | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-094954 | SSA-094954: Authentication Bypass Vulnerability in BIST mode of RUGGEDCOM ROX II | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-028723 | SSA-028723: Multiple OpenSSL Vulnerabilities in BFCClient Before V2.17 | 2025-08-12T00:00:00Z | 2025-08-13T00:00:00Z |
| ssa-938066 | SSA-938066: Remote Code Execution Vulnerability in SENTRON Powermanager and Desigo CC | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-904646 | SSA-904646: Sensitive Data Exposure Vulnerability in SIPROTEC 5 Devices | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21482-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:10:44Z | 2026-05-05T13:10:44Z |
| suse-su-2026:21497-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:10:05Z | 2026-05-05T13:10:05Z |
| suse-su-2026:21496-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:10:05Z | 2026-05-05T13:10:05Z |
| suse-su-2026:21495-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:10:05Z | 2026-05-05T13:10:05Z |
| suse-su-2026:21481-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:10:05Z | 2026-05-05T13:10:05Z |
| suse-su-2026:21480-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:10:05Z | 2026-05-05T13:10:05Z |
| suse-su-2026:21479-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:10:05Z | 2026-05-05T13:10:05Z |
| suse-su-2026:21516-1 | Security update for the Linux Kernel RT (Live Patch 18 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21515-1 | Security update for the Linux Kernel RT (Live Patch 15 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21514-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21513-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21512-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21511-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21510-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21509-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21478-1 | Security update for the Linux Kernel RT (Live Patch 18 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21477-1 | Security update for the Linux Kernel RT (Live Patch 15 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21476-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21475-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21474-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21473-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21472-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21471-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:21Z | 2026-05-05T13:07:21Z |
| suse-su-2026:21508-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:20Z | 2026-05-05T13:07:20Z |
| suse-su-2026:21507-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:20Z | 2026-05-05T13:07:20Z |
| suse-su-2026:21506-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:20Z | 2026-05-05T13:07:20Z |
| suse-su-2026:21470-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:20Z | 2026-05-05T13:07:20Z |
| suse-su-2026:21469-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:20Z | 2026-05-05T13:07:20Z |
| suse-su-2026:21468-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T13:07:20Z | 2026-05-05T13:07:20Z |
| suse-su-2026:21494-1 | Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T12:51:00Z | 2026-05-05T12:51:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:10766 | Important: firefox security update | 2026-04-27T00:00:00Z | 2026-04-29T08:56:50Z |
| alsa-2026:10758 | Important: sudo security update | 2026-04-27T00:00:00Z | 2026-04-28T13:33:57Z |
| alsa-2026:10757 | Important: firefox security update | 2026-04-27T00:00:00Z | 2026-04-29T08:58:25Z |
| alsa-2026:10745 | Important: python3.12 security update | 2026-04-27T00:00:00Z | 2026-04-28T13:32:18Z |
| alsa-2026:10741 | Important: gdk-pixbuf2 security update | 2026-04-27T00:00:00Z | 2026-04-28T13:29:07Z |
| alsa-2026:10739 | Important: tigervnc security update | 2026-04-27T00:00:00Z | 2026-04-28T13:27:18Z |
| alsa-2026:10713 | Important: pcs security update | 2026-04-27T00:00:00Z | 2026-04-29T08:19:01Z |
| alsa-2026:10711 | Important: python3.12 security update | 2026-04-27T00:00:00Z | 2026-04-30T07:17:03Z |
| alsa-2026:10710 | Important: pcs security update | 2026-04-27T00:00:00Z | 2026-04-28T13:25:52Z |
| alsa-2026:10708 | Important: gdk-pixbuf2 security update | 2026-04-27T00:00:00Z | 2026-04-30T07:14:52Z |
| alsa-2026:10707 | Important: gdk-pixbuf2 security update | 2026-04-27T00:00:00Z | 2026-04-28T13:24:49Z |
| alsa-2026:10702 | Important: webkit2gtk3 security update | 2026-04-27T00:00:00Z | 2026-04-28T13:23:05Z |
| alsa-2026:9689 | Important: java-21-openjdk security update | 2026-04-23T00:00:00Z | 2026-04-30T07:26:22Z |
| alsa-2026:9686 | Important: java-17-openjdk security update | 2026-04-23T00:00:00Z | 2026-04-28T13:20:41Z |
| alsa-2026:9683 | Important: java-1.8.0-openjdk security update | 2026-04-23T00:00:00Z | 2026-04-30T07:32:51Z |
| alsa-2026:10226 | Important: grafana security update | 2026-04-23T00:00:00Z | 2026-04-30T07:30:29Z |
| alsa-2026:10223 | Important: grafana security update | 2026-04-23T00:00:00Z | 2026-04-28T13:15:16Z |
| alsa-2026:10135 | Important: buildah security update | 2026-04-23T00:00:00Z | 2026-04-30T07:28:56Z |
| alsa-2026:9693 | Important: java-25-openjdk security update | 2026-04-22T00:00:00Z | 2026-04-24T09:58:24Z |
| alsa-2026:9692 | Important: webkit2gtk3 security update | 2026-04-22T00:00:00Z | 2026-04-24T10:02:57Z |
| alsa-2026:9666 | Moderate: wireshark security update | 2026-04-22T00:00:00Z | 2026-04-24T10:01:40Z |
| alsa-2026:9638 | Important: thunderbird security update | 2026-04-22T00:00:00Z | 2026-04-24T10:00:18Z |
| alsa-2026:9345 | Important: thunderbird security update | 2026-04-21T00:00:00Z | 2026-04-22T07:34:30Z |
| alsa-2026:9264 | Important: kernel security update | 2026-04-21T00:00:00Z | 2026-04-24T10:07:33Z |
| alsa-2026:9135 | Important: kernel-rt security update | 2026-04-20T00:00:00Z | 2026-04-21T08:48:27Z |
| alsa-2026:9131 | Important: kernel security update | 2026-04-20T00:00:00Z | 2026-04-21T08:45:35Z |
| alsa-2026:9044 | Important: osbuild-composer security update | 2026-04-20T00:00:00Z | 2026-04-22T11:48:37Z |
| alsa-2026:8945 | Important: freerdp security update | 2026-04-20T00:00:00Z | 2026-04-20T12:43:14Z |
| alsa-2026:8921 | Important: kernel security update | 2026-04-20T00:00:00Z | 2026-04-22T10:40:57Z |
| alsa-2026:8888 | Important: openexr security update | 2026-04-20T00:00:00Z | 2026-04-20T08:30:11Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2026-216 | Heap-buffer-overflow in mg_mqtt_next_prop | 2026-02-10T00:08:51.349946Z | 2026-02-11T14:08:38.238200Z |
| osv-2026-215 | UNKNOWN READ in getTypeCacheHashTableBucket | 2026-02-10T00:07:25.477890Z | 2026-02-10T00:07:25.478286Z |
| osv-2026-212 | UNKNOWN READ in gpsd_poll | 2026-02-09T00:15:09.775765Z | 2026-02-09T00:15:09.776491Z |
| osv-2026-209 | Use-of-uninitialized-value in ntrip_parse_url | 2026-02-08T00:06:08.137216Z | 2026-02-08T00:06:08.137699Z |
| osv-2026-205 | UNKNOWN READ in gpsd_poll | 2026-02-07T00:03:03.099317Z | 2026-02-07T00:03:03.099778Z |
| osv-2026-204 | Segv on unknown address in icalarray_append | 2026-02-06T00:20:37.969087Z | 2026-02-06T00:20:37.969390Z |
| osv-2026-203 | Segv on unknown address in glslang::TIntermediate::addSymbol | 2026-02-06T00:20:30.779951Z | 2026-02-06T00:20:30.780234Z |
| osv-2026-200 | Global-buffer-overflow in nameMatch | 2026-02-06T00:15:58.927791Z | 2026-02-06T00:15:58.928058Z |
| osv-2026-196 | Null-dereference READ in ubsan_GetStackTrace | 2026-02-06T00:06:05.778394Z | 2026-02-06T00:06:05.778867Z |
| osv-2026-195 | Use-of-uninitialized-value in vcardstructured_free | 2026-02-05T00:15:22.587525Z | 2026-02-05T00:15:22.587818Z |
| osv-2026-189 | Global-buffer-overflow in gpsd_poll | 2026-02-04T00:05:14.950372Z | 2026-02-04T00:05:14.950857Z |
| osv-2026-182 | Use-of-uninitialized-value in json_internal_read_object | 2026-02-03T00:11:05.023029Z | 2026-02-03T00:11:05.023344Z |
| osv-2026-177 | Security exception in org.apache.poi.util.IOUtils.safelyAllocate | 2026-02-02T00:20:01.368972Z | 2026-02-02T00:20:01.369362Z |
| osv-2026-170 | Use-of-uninitialized-value in pcpp::PcapNgFileReaderDevice::getNextPacketInternal | 2026-02-01T00:01:32.497703Z | 2026-02-01T00:01:32.498001Z |
| osv-2026-169 | Null-dereference READ in execute_post_instantiate_functions | 2026-02-01T00:01:05.927662Z | 2026-02-01T00:01:05.927997Z |
| osv-2026-167 | Use-of-uninitialized-value in aivdm_analyze | 2026-01-31T00:10:49.750917Z | 2026-01-31T00:10:49.751204Z |
| osv-2026-166 | Use-of-uninitialized-value in ntrip_parse_url | 2026-01-31T00:10:39.163525Z | 2026-01-31T00:10:39.163931Z |
| osv-2026-156 | Segv on unknown address in aivdm_analyze | 2026-01-28T00:06:24.327227Z | 2026-01-28T00:06:24.327712Z |
| osv-2026-150 | Null-dereference READ in wasm_runtime_invoke_native | 2026-01-27T00:02:06.850780Z | 2026-01-27T00:02:06.851098Z |
| osv-2026-144 | Use-of-uninitialized-value in initFilter | 2026-01-26T00:05:57.473672Z | 2026-01-26T00:05:57.473958Z |
| osv-2026-141 | Segv on unknown address in yuv2rgb4_X_c | 2026-01-26T00:03:47.552290Z | 2026-01-26T00:03:47.552807Z |
| osv-2026-136 | Memcpy-param-overlap in grk::memStreamRead | 2026-01-25T00:10:48.352834Z | 2026-01-25T00:10:48.353140Z |
| osv-2026-122 | Use-of-uninitialized-value in rtcm2_unpack | 2026-01-24T00:18:15.169881Z | 2026-01-24T00:18:15.170285Z |
| osv-2026-121 | Use-of-uninitialized-value in trySubset | 2026-01-24T00:15:22.824642Z | 2026-01-24T14:24:01.498986Z |
| osv-2026-119 | Segv on unknown address in gpsd_poll | 2026-01-23T00:09:08.434854Z | 2026-01-23T00:09:08.435286Z |
| osv-2026-112 | Use-of-uninitialized-value in PrintSERPacket | 2026-01-23T00:01:50.403598Z | 2026-01-23T00:01:50.404362Z |
| osv-2026-105 | Use-of-uninitialized-value in pcpp::SSLServerHelloMessage::ServerHelloTLSFingerprint::toString | 2026-01-22T00:08:03.696405Z | 2026-01-22T00:08:03.696709Z |
| osv-2026-98 | Heap-buffer-overflow in hostname_issubdomain | 2026-01-21T00:16:59.551255Z | 2026-01-21T00:16:59.551548Z |
| osv-2026-97 | Heap-buffer-overflow in vpx_wb_write_literal | 2026-01-21T00:09:09.897624Z | 2026-01-28T14:23:52.198239Z |
| osv-2026-91 | Use-after-poison in compress.cc | 2026-01-20T00:09:07.159786Z | 2026-01-20T00:09:07.160128Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0067 | `unpack_in` can chmod arbitrary directories by following symlinks | 2026-03-19T12:00:00Z | 2026-03-23T09:31:59Z |
| rustsec-2026-0048 | CRL Distribution Point Scope Check Logic Error in AWS-LC | 2026-03-19T12:00:00Z | 2026-03-20T17:11:58Z |
| rustsec-2026-0044 | AWS-LC X.509 Name Constraints Bypass via Wildcard/Unicode CN | 2026-03-19T12:00:00Z | 2026-03-20T17:11:58Z |
| rustsec-2026-0042 | CRL Distribution Point Scope Check Logic Error in AWS-LC | 2026-03-19T12:00:00Z | 2026-03-20T17:11:58Z |
| rustsec-2026-0066 | Insufficient validation of PAX extensions during extraction | 2026-03-17T12:00:00Z | 2026-03-23T09:31:59Z |
| rustsec-2026-0041 | Decompressing invalid data can leak information from uninitialized memory or reused output buffer | 2026-03-17T12:00:00Z | 2026-03-17T16:08:45Z |
| rustsec-2026-0040 | `tracing-ethers` was removed from crates.io due to malicious code | 2026-03-14T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0039 | `chrono_anchor` was removed from crates.io due to malicious code | 2026-03-10T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0037 | Denial of service in Quinn endpoints | 2026-03-09T12:00:00Z | 2026-03-14T07:21:57Z |
| rustsec-2026-0038 | RustSec Advisory | 2026-03-08T12:00:00Z | 2026-03-11T06:21:51Z |
| rustsec-2026-0077 | Incorrect Check of Signer Response Norm During Verification | 2026-03-04T12:00:00Z | 2026-03-27T05:55:06Z |
| rustsec-2026-0076 | Panic in Signature Hint Decoding During Verification | 2026-03-04T12:00:00Z | 2026-03-27T05:55:06Z |
| rustsec-2026-0075 | All-Zero Key Generation on Catastrophic RNG Failure | 2026-03-04T12:00:00Z | 2026-03-27T05:55:06Z |
| rustsec-2026-0074 | Incorrect Output of Incremental Portable SHAKE API | 2026-03-04T12:00:00Z | 2026-03-27T05:55:06Z |
| rustsec-2026-0073 | Panic in Standalone MAC Operations | 2026-03-04T12:00:00Z | 2026-03-27T05:55:06Z |
| rustsec-2026-0036 | `time-sync` was removed from crates.io due to malicious code | 2026-03-04T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0035 | Cache poisoning via insecure-by-default cache key | 2026-03-04T12:00:00Z | 2026-03-09T20:53:55Z |
| rustsec-2026-0034 | HTTP Request Smuggling via HTTP/1.0 and Transfer-Encoding Misparsing | 2026-03-04T12:00:00Z | 2026-03-09T20:53:55Z |
| rustsec-2026-0033 | HTTP Request Smuggling via Premature Upgrade | 2026-03-04T12:00:00Z | 2026-03-09T20:53:55Z |
| rustsec-2026-0032 | `dnp3times` was removed from crates.io due to malicious code | 2026-03-04T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0031 | `time_calibrators` was removed from crates.io due to malicious code | 2026-03-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0030 | `time_calibrator` was removed from crates.io due to malicious code | 2026-03-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0047 | PKCS7_verify Signature Validation Bypass in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0046 | PKCS7_verify Certificate Chain Validation Bypass in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0045 | Timing Side-Channel in AES-CCM Tag Verification in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0043 | Timing Side-Channel in AES-CCM Tag Verification in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0029 | Double-free and use-after-free for Hive | 2026-02-26T12:00:00Z | 2026-03-01T06:01:36Z |
| rustsec-2026-0028 | `tracing_checks` was removed from crates.io for transitively including malicious code | 2026-02-26T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0027 | `tracings` was removed from crates.io for malicious code | 2026-02-26T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0022 | Panic when dropping a `[Typed]Func::call_async` future | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-jre-2024-54534 | 2026-05-08T05:46:46.642Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-47778 | GHSL-2024-258: GStreamer has an OOB-read in gst_wavparse_adtl_chunk | 2026-05-08T05:46:44.993Z | 2026-05-08T06:11:36.072Z |
| bit-jre-2024-47777 | GHSL-2024-259: GStreamer has an OOB-read in gst_wavparse_smpl_chunk | 2026-05-08T05:46:43.528Z | 2026-05-08T06:11:36.072Z |
| bit-jre-2024-47776 | GHSL-2024-260: GStreamer has a OOB-read in gst_wavparse_cue_chunk | 2026-05-08T05:46:42.024Z | 2026-05-08T06:11:36.072Z |
| bit-jre-2024-47775 | GHSL-2024-261: GStreamer has an OOB-read in parse_ds64 | 2026-05-08T05:46:40.464Z | 2026-05-08T06:11:36.072Z |
| bit-jre-2024-47606 | GHSL-2024-166: GStreamer Integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes | 2026-05-08T05:46:38.657Z | 2026-05-08T06:11:36.072Z |
| bit-jre-2024-47597 | GHSL-2024-245: GStreamer has an OOB-read in qtdemux_parse_samples | 2026-05-08T05:46:37.056Z | 2026-05-08T06:11:36.072Z |
| bit-jre-2024-47596 | GHSL-2024-244: GStreamer has an OOB-read in FOURCC_SMI_ parsing | 2026-05-08T05:46:35.506Z | 2026-05-08T06:11:36.072Z |
| bit-jre-2024-47546 | GHSL-2024-243: GStreamer has an integer underflow in extract_cc_from_data leading to OOB-read | 2026-05-08T05:46:34.125Z | 2026-05-08T06:11:36.072Z |
| bit-jre-2024-47545 | GHSL-2024-242: GStreamer has an integer underflow in FOURCC_strf parsing leading to OOB-read | 2026-05-08T05:46:32.708Z | 2026-05-08T06:11:36.072Z |
| bit-jre-2024-47544 | GHSL-2024-238: GStreamer has NULL-pointer dereferences in MP4/MOV demuxer CENC handling | 2026-05-08T05:46:30.902Z | 2026-05-08T06:11:36.072Z |
| bit-jre-2024-40896 | 2026-05-08T05:46:29.455Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-25062 | 2026-05-08T05:46:27.913Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21235 | 2026-05-08T05:46:26.567Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21217 | 2026-05-08T05:46:24.951Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21211 | 2026-05-08T05:46:23.448Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21210 | 2026-05-08T05:46:21.676Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21208 | 2026-05-08T05:46:19.939Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21147 | 2026-05-08T05:46:18.207Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21145 | 2026-05-08T05:46:16.717Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21144 | 2026-05-08T05:46:15.285Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21140 | 2026-05-08T05:46:13.859Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21138 | 2026-05-08T05:46:12.364Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21131 | 2026-05-08T05:46:10.579Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21094 | 2026-05-08T05:46:08.864Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21085 | 2026-05-08T05:46:07.309Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21068 | 2026-05-08T05:46:05.655Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21012 | 2026-05-08T05:46:04.208Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21011 | 2026-05-08T05:46:02.790Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21005 | 2026-05-08T05:46:01.318Z | 2026-05-08T06:11:36.072Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-eo57061 | In libexpat before 2 | 2026-04-15T00:45:38.991412Z | 2026-04-14T08:58:37Z |
| cleanstart-2026-fb07695 | When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint | 2026-04-15T00:45:38.848496Z | 2026-04-14T11:38:13Z |
| cleanstart-2026-fz27876 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-15T00:44:39.850466Z | 2026-04-14T08:58:37Z |
| cleanstart-2026-fd98843 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-15T00:43:03.053896Z | 2026-04-14T08:58:37Z |
| cleanstart-2026-fa60324 | It was found that the cookie used for CSRF prevention in Keycloak was not unique to each session | 2026-04-15T00:42:39.375533Z | 2026-04-14T09:27:59Z |
| cleanstart-2026-bz28794 | Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service | 2026-04-15T00:41:09.072733Z | 2026-04-14T10:03:45Z |
| cleanstart-2026-mp87020 | If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources | 2026-04-15T00:39:08.262212Z | 2026-04-14T11:37:13Z |
| cleanstart-2026-ec57959 | protojson | 2026-04-15T00:38:38.411296Z | 2026-04-14T11:35:55Z |
| cleanstart-2026-fh63386 | When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint | 2026-04-14T00:44:12.807187Z | 2026-04-13T10:06:48Z |
| cleanstart-2026-lk73694 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-14T00:43:42.897096Z | 2026-04-13T05:21:32Z |
| cleanstart-2026-jh41080 | In libexpat before 2 | 2026-04-14T00:41:12.662437Z | 2026-04-13T11:37:38Z |
| cleanstart-2026-nj21771 | png_image_free in png | 2026-04-14T00:41:12.278705Z | 2026-04-13T10:08:55Z |
| cleanstart-2026-ka64649 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-14T00:38:03.199310Z | 2026-04-13T11:37:38Z |
| cleanstart-2026-nh62318 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-14T00:38:02.309746Z | 2026-04-13T11:37:38Z |
| cleanstart-2026-ne70100 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-12T00:36:10.440964Z | 2026-04-11T06:04:40Z |
| cleanstart-2026-mz25894 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-12T00:36:10.207025Z | 2026-04-11T06:04:40Z |
| cleanstart-2026-hu81793 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-12T00:36:09.840766Z | 2026-04-11T06:04:40Z |
| cleanstart-2026-jt73156 | protojson | 2026-04-11T00:42:17.168521Z | 2026-04-10T12:27:18Z |
| cleanstart-2026-lb69194 | In libexpat before 2 | 2026-04-11T00:39:42.680532Z | 2026-04-10T05:48:24Z |
| cleanstart-2026-ei21238 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-11T00:37:54.711613Z | 2026-04-10T10:45:58Z |
| cleanstart-2026-dm93480 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-10T01:06:00.088585Z | 2026-04-09T09:11:04Z |
| cleanstart-2026-oc72960 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-10T01:04:28.955253Z | 2026-04-09T08:54:07Z |
| cleanstart-2026-av56399 | Security fixes for ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 25.10.0-r1 | 2026-04-10T01:04:01.910374Z | 2026-04-09T08:54:48Z |
| cleanstart-2026-jm69747 | Security fixes for ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 25.10.0-r1 | 2026-04-10T01:04:01.248430Z | 2026-04-09T08:55:52Z |
| cleanstart-2026-aa51484 | Security fixes for ghsa-389x-839f-4rhx, ghsa-3p8m-j85q-pgmj, ghsa-4cx2-fc23-5wg6, ghsa-4g8c-wm8x-jfhw, ghsa-735f-pc8j-v9w8, ghsa-fghv-69vj-qj49, ghsa-prj3-ccx8-p6x4, ghsa-xq3w-v528-46rv applied in versions: 0.12.0-r16 | 2026-04-10T01:04:01.115500Z | 2026-04-09T08:58:26Z |
| cleanstart-2026-dp55969 | Security fixes for ghsa-389x-839f-4rhx, ghsa-3p8m-j85q-pgmj, ghsa-4cx2-fc23-5wg6, ghsa-4g8c-wm8x-jfhw, ghsa-735f-pc8j-v9w8, ghsa-fghv-69vj-qj49, ghsa-prj3-ccx8-p6x4, ghsa-xq3w-v528-46rv applied in versions: 0.12.0-r16 | 2026-04-10T01:04:00.139766Z | 2026-04-09T09:00:58Z |
| cleanstart-2026-ac01087 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-10T01:03:59.042951Z | 2026-04-09T09:55:12Z |
| cleanstart-2026-kl76732 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-10T01:03:58.949308Z | 2026-04-09T09:05:28Z |
| cleanstart-2026-nx54250 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-10T01:03:29.003448Z | 2026-04-09T09:59:33Z |
| cleanstart-2026-hm40094 | filippo | 2026-04-10T01:03:28.912174Z | 2026-04-09T09:27:45Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2024-ALE-002 | [MàJ] Multiples Vulnérabilités dans GitLab | 2024-01-12T00:00:00.000000 | 2024-02-22T00:00:00.000000 |
| certfr-2024-ale-001 | [MàJ] Multiples vulnérabilités dans Ivanti Connect Secure et Policy Secure Gateways | 2024-01-11T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| CERTFR-2024-ALE-001 | [MàJ] Multiples vulnérabilités dans Ivanti Connect Secure et Policy Secure Gateways | 2024-01-11T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2023-ale-013 | Vulnérabilité dans Apache Struts 2 | 2023-12-13T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-013 | Vulnérabilité dans Apache Struts 2 | 2023-12-13T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-006 | Vulnérabilité dans les produits Microsoft | 2023-12-12T00:00:00.000000 | 2023-07-12T00:00:00.000000 |
| CERTFR-2023-ALE-006 | Vulnérabilité dans les produits Microsoft | 2023-12-12T00:00:00.000000 | 2023-07-12T00:00:00.000000 |
| certfr-2023-ale-012 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-10-23T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-012 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-10-23T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-011 | [MàJ] Multiples vulnérabilités dans Cisco IOS XE | 2023-10-17T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-011 | [MàJ] Multiples vulnérabilités dans Cisco IOS XE | 2023-10-17T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-010 | Multiples vulnérabilités dans Exim | 2023-10-02T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-010 | Multiples vulnérabilités dans Exim | 2023-10-02T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-009 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2023-07-26T00:00:00.000000 | 2023-09-15T00:00:00.000000 |
| CERTFR-2023-ALE-009 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2023-07-26T00:00:00.000000 | 2023-09-15T00:00:00.000000 |
| certfr-2023-ale-008 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-07-19T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| CERTFR-2023-ALE-008 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-07-19T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-007 | [MàJ] Vulnérabilité dans Zimbra Collaboration Suite | 2023-07-17T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| CERTFR-2023-ALE-007 | [MàJ] Vulnérabilité dans Zimbra Collaboration Suite | 2023-07-17T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-005 | Synthèse sur l'exploitation d'une vulnérabilité dans MOVEit Transfer | 2023-07-05T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2023-ALE-005 | Synthèse sur l'exploitation d'une vulnérabilité dans MOVEit Transfer | 2023-07-05T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-004 | Vulnérabilité dans les produits Fortinet | 2023-06-13T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2023-ALE-004 | Vulnérabilité dans les produits Fortinet | 2023-06-13T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-003 | [MàJ] Compromission de l'application 3CX Desktop App | 2023-03-31T00:00:00.000000 | 2023-04-12T00:00:00.000000 |
| CERTFR-2023-ALE-003 | [MàJ] Compromission de l'application 3CX Desktop App | 2023-03-31T00:00:00.000000 | 2023-04-12T00:00:00.000000 |
| certfr-2023-ale-002 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2023-03-15T00:00:00.000000 | 2023-05-11T00:00:00.000000 |
| CERTFR-2023-ALE-002 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2023-03-15T00:00:00.000000 | 2023-05-11T00:00:00.000000 |
| certfr-2023-ale-001 | Vulnérabilité dans Fortinet FortiOS | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2023-ALE-001 | Vulnérabilité dans Fortinet FortiOS | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2023-ale-015 | [MàJ] Campagne d'exploitation d'une vulnérabilité affectant VMware ESXi | 2023-02-03T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0492 | Multiples vulnérabilités dans les produits IBM | 2026-04-24T00:00:00.000000 | 2026-04-24T00:00:00.000000 |
| certfr-2026-avi-0491 | Multiples vulnérabilités dans Synology DSM | 2026-04-24T00:00:00.000000 | 2026-04-24T00:00:00.000000 |
| certfr-2026-avi-0490 | Multiples vulnérabilités dans Traefik | 2026-04-24T00:00:00.000000 | 2026-04-24T00:00:00.000000 |
| certfr-2026-avi-0489 | Vulnérabilité dans les produits Tenable | 2026-04-24T00:00:00.000000 | 2026-04-24T00:00:00.000000 |
| certfr-2026-avi-0488 | Multiples vulnérabilités dans Spring Boot | 2026-04-24T00:00:00.000000 | 2026-04-24T00:00:00.000000 |
| certfr-2026-avi-0487 | Multiples vulnérabilités dans Google Chrome | 2026-04-23T00:00:00.000000 | 2026-04-28T00:00:00.000000 |
| certfr-2026-avi-0486 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-23T00:00:00.000000 | 2026-04-23T00:00:00.000000 |
| certfr-2026-avi-0485 | Vulnérabilité dans Mattermost Server | 2026-04-23T00:00:00.000000 | 2026-04-23T00:00:00.000000 |
| certfr-2026-avi-0484 | Multiples vulnérabilités dans strongSwan | 2026-04-23T00:00:00.000000 | 2026-04-23T00:00:00.000000 |
| certfr-2026-avi-0483 | Multiples vulnérabilités dans Stormshield Management Center | 2026-04-23T00:00:00.000000 | 2026-04-23T00:00:00.000000 |
| certfr-2026-avi-0482 | Vulnérabilité dans CPython | 2026-04-23T00:00:00.000000 | 2026-04-23T00:00:00.000000 |
| certfr-2026-avi-0481 | Vulnérabilité dans les produits Apple | 2026-04-23T00:00:00.000000 | 2026-04-23T00:00:00.000000 |
| certfr-2026-avi-0480 | Multiples vulnérabilités dans les produits Mozilla | 2026-04-22T00:00:00.000000 | 2026-04-22T00:00:00.000000 |
| certfr-2026-avi-0479 | Multiples vulnérabilités dans les produits Atlassian | 2026-04-22T00:00:00.000000 | 2026-04-22T00:00:00.000000 |
| certfr-2026-avi-0478 | Vulnérabilité dans Microsoft .Net | 2026-04-22T00:00:00.000000 | 2026-04-22T00:00:00.000000 |
| certfr-2026-avi-0477 | Multiples vulnérabilités dans les produits Spring | 2026-04-22T00:00:00.000000 | 2026-04-22T00:00:00.000000 |
| certfr-2026-avi-0476 | Multiples vulnérabilités dans les produits NetApp | 2026-04-22T00:00:00.000000 | 2026-04-22T00:00:00.000000 |
| certfr-2026-avi-0475 | Multiples vulnérabilités dans GitLab | 2026-04-22T00:00:00.000000 | 2026-04-22T00:00:00.000000 |
| certfr-2026-avi-0474 | Vulnérabilité dans Python | 2026-04-22T00:00:00.000000 | 2026-04-22T00:00:00.000000 |
| certfr-2026-avi-0473 | Multiples vulnérabilités dans Oracle Weblogic | 2026-04-22T00:00:00.000000 | 2026-04-22T00:00:00.000000 |
| certfr-2026-avi-0472 | Multiples vulnérabilités dans Oracle Virtualization | 2026-04-22T00:00:00.000000 | 2026-04-22T00:00:00.000000 |
| certfr-2026-avi-0471 | Multiples vulnérabilités dans Oracle Systems | 2026-04-22T00:00:00.000000 | 2026-04-22T00:00:00.000000 |
| certfr-2026-avi-0470 | Multiples vulnérabilités dans Oracle PeopleSoft | 2026-04-22T00:00:00.000000 | 2026-04-22T00:00:00.000000 |
| certfr-2026-avi-0469 | Multiples vulnérabilités dans Oracle MySQL | 2026-04-22T00:00:00.000000 | 2026-04-22T00:00:00.000000 |
| certfr-2026-avi-0468 | Multiples vulnérabilités dans Oracle Java SE | 2026-04-22T00:00:00.000000 | 2026-04-22T00:00:00.000000 |
| certfr-2026-avi-0467 | Multiples vulnérabilités dans Oracle Database Server | 2026-04-22T00:00:00.000000 | 2026-04-22T00:00:00.000000 |
| certfr-2026-avi-0466 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-21T00:00:00.000000 | 2026-04-21T00:00:00.000000 |
| certfr-2026-avi-0465 | Vulnérabilité dans Mattermost Server | 2026-04-21T00:00:00.000000 | 2026-04-21T00:00:00.000000 |
| certfr-2026-avi-0464 | Vulnérabilité dans Typo3 | 2026-04-21T00:00:00.000000 | 2026-04-21T00:00:00.000000 |
| certfr-2026-avi-0463 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-20T00:00:00.000000 | 2026-04-20T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-000026 | Lanscope Endpoint Manager (On-Premises) vulnerable to path traversal | 2026-02-25T15:14+09:00 | 2026-02-25T15:14+09:00 |
| jvndb-2026-004359 | Security information for Hitachi Disk Array Systems | 2026-02-20T18:35+09:00 | 2026-02-20T18:35+09:00 |
| jvndb-2026-000027 | WordPress Plugin "Survey Maker" vulnerable to cross-site scripting | 2026-02-20T12:32+09:00 | 2026-02-20T12:32+09:00 |
| jvndb-2026-000028 | Installer for Job log aggregation/analysis software RICOH Job Log Aggregation Tool may insecurely load Dynamic Link Libraries | 2026-02-20T12:31+09:00 | 2026-02-20T12:31+09:00 |
| jvndb-2026-003912 | Vulnerability in Cosminexus HTTP Server and Hitachi Web Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003911 | Vulnerability in Cosminexus HTTP Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003910 | Multiple Vulnerabilities in Cosminexus HTTP Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003909 | Multiple Vulnerabilities in Hitachi Command Suite products | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003908 | Multiple Vulnerabilities in Hitachi Command Suite, Hitachi Automation Director, Hitachi Configuration Manager, Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003907 | Multiple Vulnerabilities in JP1 | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003906 | Multiple Vulnerabilities in Cosminexus | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003905 | Multiple Vulnerabilities in Cosminexus HTTP Server and Hitachi Web Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-000025 | Joomla! CMS vulnerable to cross-site scripting | 2026-02-17T12:46+09:00 | 2026-02-17T12:46+09:00 |
| jvndb-2026-000023 | FileZen vulnerable to OS command injection | 2026-02-13T16:51+09:00 | 2026-02-13T17:08+09:00 |
| jvndb-2026-000024 | Installer of M-Audio M-Track Duo HD may insecurely load Dynamic Link Libraries | 2026-02-12T13:32+09:00 | 2026-02-12T13:32+09:00 |
| jvndb-2026-000022 | Oki Electric Industry products and OEM products register Windows services with unquoted file paths | 2026-02-09T15:21+09:00 | 2026-02-09T15:21+09:00 |
| jvndb-2026-000021 | web2py vulnerable to open redirect | 2026-02-05T15:01+09:00 | 2026-02-05T15:01+09:00 |
| jvndb-2026-000020 | Multiple vulnerabilities in Movable Type | 2026-02-04T16:15+09:00 | 2026-02-04T16:15+09:00 |
| jvndb-2026-000019 | Multiple vulnerabilities in ELECOM wireless LAN products | 2026-02-03T14:57+09:00 | 2026-02-03T14:57+09:00 |
| jvndb-2026-000017 | Improper file access permission settings in Mitsubishi Small-Capacity UPS Shutdown Software FREQSHIP-mini for Windows | 2026-02-03T14:57+09:00 | 2026-02-05T14:41+09:00 |
| jvndb-2026-000016 | Installer for Roland Cloud Manager may insecurely load Dynamic Link Libraries | 2026-02-03T14:57+09:00 | 2026-02-04T12:39+09:00 |
| jvndb-2026-000015 | Sonatype Nexus Repository vulnerable to server-side request forgery | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000014 | OS command injection in raspap-webgui | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000013 | Multiple Microsoft Office products vulnerable to untrusted search path | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000012 | Multiple vulnerabilities in Cybozu Garoon | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000018 | Undocumented "TelnetEnable" functionality of End of Service NETGEAR products | 2026-01-30T14:23+09:00 | 2026-01-30T14:23+09:00 |
| jvndb-2026-002119 | Multiple vulnerabilities in BROTHER MFPs (multifunction printers) | 2026-01-30T11:26+09:00 | 2026-01-30T11:26+09:00 |
| jvndb-2026-002030 | Multiple Vulnerabilities in Cosminexus | 2026-01-29T10:32+09:00 | 2026-01-29T10:32+09:00 |
| jvndb-2026-001972 | Archer MR600 vulnerable to OS command injection | 2026-01-28T10:41+09:00 | 2026-01-28T10:41+09:00 |
| jvndb-2026-000011 | beat-access for Windows may insecurely load Dynamic Link Libraries | 2026-01-27T18:22+09:00 | 2026-01-27T18:22+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-18596 | Microsoft Desktop Windows Manager资源管理错误漏洞(CNVD-2026-18596) | 2026-04-21 | 2026-04-21 |
| cnvd-2026-18595 | Microsoft Brokering File System资源管理错误漏洞 | 2026-04-21 | 2026-04-21 |
| cnvd-2026-18594 | Microsoft Azure Monitor Agent代码问题漏洞(CNVD-2026-18594) | 2026-04-21 | 2026-04-21 |
| cnvd-2026-18593 | Microsoft Azure Monitor Agent输入验证错误漏洞(CNVD-2026-18593) | 2026-04-21 | 2026-04-21 |
| cnvd-2026-18592 | Microsoft .NET Framework拒绝服务漏洞 | 2026-04-21 | 2026-04-21 |
| cnvd-2026-18586 | Dell PowerProtect Data Domain信息泄露漏洞(CNVD-2026-18586) | 2026-04-20 | 2026-04-21 |
| cnvd-2026-18585 | Dell PowerProtect Data Domain Data Domain Operating System命令注入漏洞 | 2026-04-20 | 2026-04-21 |
| cnvd-2026-18584 | Dell PowerProtect Data Domain Data Domain Operating System命令注入漏洞(CNVD-2026-18584) | 2026-04-20 | 2026-04-21 |
| cnvd-2026-18583 | Dell PowerProtect Data Domain跨站脚本漏洞(CNVD-2026-18583) | 2026-04-20 | 2026-04-21 |
| cnvd-2026-18582 | Dell PowerProtect Data Domain OS命令注入漏洞(CNVD-2026-18582) | 2026-04-20 | 2026-04-21 |
| cnvd-2026-18581 | Dell PowerProtect Data Domain OS命令注入漏洞(CNVD-2026-18581) | 2026-04-20 | 2026-04-21 |
| cnvd-2026-18580 | Dell PowerProtect Data Domain OS命令注入漏洞 | 2026-04-20 | 2026-04-21 |
| cnvd-2026-18540 | Dell PowerProtect Data Domain参数注入漏洞(CNVD-2026-18540) | 2026-04-20 | 2026-04-21 |
| cnvd-2026-18147 | PraisonAI存在未明漏洞(CNVD-2026-18147) | 2026-04-20 | 2026-04-22 |
| cnvd-2026-18146 | PraisonAI存在未明漏洞 | 2026-04-20 | 2026-04-22 |
| cnvd-2026-18145 | PraisonAI操作系统命令注入漏洞(CNVD-2026-18145) | 2026-04-20 | 2026-04-22 |
| cnvd-2026-18144 | PraisonAI SQL注入漏洞 | 2026-04-20 | 2026-04-22 |
| cnvd-2026-18143 | PraisonAI操作系统命令注入漏洞 | 2026-04-20 | 2026-04-22 |
| cnvd-2026-18142 | PraisonAI代码问题漏洞 | 2026-04-20 | 2026-04-22 |
| cnvd-2026-17891 | IBM Tivoli Netcool Impact日志信息泄露漏洞 | 2026-04-16 | 2026-04-21 |
| cnvd-2026-17890 | Apache Airflow安全绕过漏洞 | 2026-04-16 | 2026-04-21 |
| cnvd-2026-17822 | Google Chrome on Windows未初始化使用漏洞 | 2026-04-16 | 2026-04-20 |
| cnvd-2026-17821 | Google Chrome存在未明漏洞(CNVD-2026-17821) | 2026-04-16 | 2026-04-20 |
| cnvd-2026-17820 | Google Chrome访问控制错误漏洞(CNVD-2026-17820) | 2026-04-16 | 2026-04-20 |
| cnvd-2026-17819 | Google Chrome Permissions组件内存错误引用漏洞 | 2026-04-16 | 2026-04-20 |
| cnvd-2026-17818 | Google Chrome Forms组件内存错误引用漏洞(CNVD-2026-17818) | 2026-04-16 | 2026-04-20 |
| cnvd-2026-17817 | Google Chrome Codecs组件内存错误引用漏洞(CNVD-2026-17817) | 2026-04-16 | 2026-04-20 |
| cnvd-2026-17816 | Google Chrome Video组件内存错误引用漏洞 | 2026-04-16 | 2026-04-20 |
| cnvd-2026-17815 | Google Chrome FileSystem组件内存错误引用漏洞 | 2026-04-16 | 2026-04-20 |
| cnvd-2026-17814 | Google Chrome PDFium组件堆缓冲区溢出漏洞 | 2026-04-16 | 2026-04-20 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01783 | Уязвимость почтового клиента Microsoft Outlook, пакетов программ Microsoft Office, Excel … | 13.02.2026 | 13.02.2026 |
| bdu:2026-01782 | Уязвимость пакетов программ Microsoft Office, Excel и 365 Apps for Enterprise, связанная … | 13.02.2026 | 13.02.2026 |
| bdu:2026-01781 | Уязвимость пакетов программ Microsoft Office, Excel и 365 Apps for Enterprise, связанная … | 13.02.2026 | 13.02.2026 |
| bdu:2026-01780 | Уязвимость компонента Graphics операционных систем Windows, позволяющая нарушителю повыси… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01779 | Уязвимость подсистемы совместимости для запуска Linux-приложений Windows Subsystem for Li… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01778 | Уязвимость драйвера Windows Ancillary Function Driver for WinSock операционных систем Win… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01777 | Уязвимость компонента Graphics операционных систем Windows, позволяющая нарушителю повыси… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01776 | Уязвимость сервера отчетов Power BI Report Server, связанная с недостаточной проверкой вв… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01775 | Уязвимость программной платформы .NET, связанная с некорректной обработкой отсутствующего… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01774 | Уязвимость функции png_set_quantize() библиотеки для работы с растровой графикой в формат… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01773 | Уязвимость системы автоматизации технологических процессов EcoStruxure Process Expert и E… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01772 | Уязвимость программного обеспечения Gridscale X Prepay, связанная с несоответствием ответ… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01771 | Уязвимость сетевого программного обеспечения Siemens, связанная с неконтролируемым элемен… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01770 | Уязвимость программного обеспечения контроля лицензий CodeMeter, связанная с недостатками… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01769 | Уязвимость системного демона chassisd операционной системы Juniper Networks Junos маршрут… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01768 | Уязвимость веб-интерфейса управления системы обработки вызовов Cisco Unified Communicatio… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01767 | Уязвимость веб-интерфейса управления системы мониторинга и управления сетевым оборудовани… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01766 | Уязвимость микропрограммного обеспечения Cisco SIP IP-телефонов Cisco Video Phone 8875, D… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01765 | Уязвимость микропрограммного обеспечения Cisco SIP IP-телефонов Cisco Video Phone 8875, D… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01764 | Уязвимость веб-интерфейса средства унифицированного управления Cisco Unified Computing Sy… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01763 | Уязвимость программных продуктов Cisco Unified Contact Center Enterprise и Cisco Packaged… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01762 | Уязвимость SSH службы технологии Cisco Ultra-Reliable Wireless Backhaul (URWB) сетевых ус… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01761 | Уязвимость оболочки обслуживания программного средства управления облачными системами Cis… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01760 | Уязвимость программных продуктов Cisco Unified Contact Center Enterprise и Cisco Packaged… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01759 | Уязвимость веб-интерфейса управления системы мониторинга и управления сетевым оборудовани… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01758 | Уязвимость веб-интерфейса платформы управления политиками соединений Cisco Identity Servi… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01757 | Уязвимость веб-интерфейса платформы управления политиками соединений Cisco Identity Servi… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01756 | Уязвимость механизма обнаружения Snort программного межсетевого экрана Cisco Secure Firew… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01755 | Уязвимость механизма обнаружения Snort программного межсетевого экрана Cisco Secure Firew… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01754 | Уязвимость ядра подсистемы совместимости для запуска Linux-приложений Windows Subsystem f… | 13.02.2026 | 13.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201402-0026 | Buffer overflow in the process_ra function in the router advertisement daemon (radvd) bef… | 2024-07-23T22:25:48.682000Z |
| var-201805-1144 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2024-07-23T22:25:33.529000Z |
| var-201805-1143 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2024-07-23T22:25:33.635000Z |
| var-202005-0008 | Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buf… | 2024-07-23T22:25:28.455000Z |
| var-202407-0704 | A vulnerability has been identified in CPCI85 Central Processing/Communication (All versi… | 2024-07-23T22:25:01.735000Z |
| var-200107-0035 | slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cau… | 2024-07-23T22:24:58.858000Z |
| var-200512-0643 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2024-07-23T22:24:53.371000Z |
| var-200512-0611 | Multiple heap-based buffer overflows in QuickTime.qts in Apple QuickTime Player 7.0.3 and… | 2024-07-23T22:24:53.455000Z |
| var-200512-0300 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2024-07-23T22:24:53.297000Z |
| var-200512-0297 | Integer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbit… | 2024-07-23T22:24:53.525000Z |
| var-200512-0294 | Buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbitr… | 2024-07-23T22:24:53.234000Z |
| var-201407-0233 | Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote atta… | 2024-07-23T22:22:21.013000Z |
| var-201601-0038 | Multiple stack-based buffer overflows in Advantech WebAccess before 8.1 allow remote atta… | 2024-07-23T22:22:04.421000Z |
| var-201801-0394 | TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbi… | 2024-07-23T22:21:46.499000Z |
| var-201904-0181 | Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow… | 2024-07-23T22:21:36.530000Z |
| var-202108-1160 | Description: A permissions issue was addressed with improved validation. This issue is fi… | 2024-07-23T22:20:46.081000Z |
| var-202305-0218 | D-Link DAP-1360 webproc WEB_DisplayPage Stack-based Buffer Overflow Remote Code Execution… | 2024-07-23T22:20:18.349000Z |
| var-202305-0217 | D-Link DAP-1360 Hardcoded Credentials Authentication Bypass Vulnerability. This vulnerabi… | 2024-07-23T22:20:18.369000Z |
| var-202305-0216 | D-Link DAP-1360 Multiple Parameters Stack-Based Buffer Overflow Remote Code Execution Vul… | 2024-07-23T22:20:18.413000Z |
| var-202305-0177 | D-Link DAP-1360 webproc Stack-based Buffer Overflow Remote Code Execution Vulnerability. … | 2024-07-23T22:20:18.434000Z |
| var-202305-0176 | D-Link DAP-1360 webproc var:sys_Token Heap-based Buffer Overflow Remote Code Execution Vu… | 2024-07-23T22:20:18.458000Z |
| var-202305-0166 | D-Link DAP-1360 webproc var:menu Stack-based Buffer Overflow Remote Code Execution Vulner… | 2024-07-23T22:20:18.326000Z |
| var-202305-0154 | D-Link DAP-1360 webproc var:page Stack-based Buffer Overflow Remote Code Execution Vulner… | 2024-07-23T22:20:18.503000Z |
| var-202305-0153 | D-Link DAP-1360 webupg UPGCGI_CheckAuth Numeric Truncation Remote Code Execution Vulnerab… | 2024-07-23T22:20:18.392000Z |
| var-202305-0071 | D-Link DAP-1360 webproc Heap-based Buffer Overflow Remote Code Execution Vulnerability. T… | 2024-07-23T22:20:18.481000Z |
| var-202305-0070 | D-Link DAP-1360 webproc COMM_MakeCustomMsg Stack-based Buffer Overflow Remote Code Execut… | 2024-07-23T22:20:18.303000Z |
| var-202308-3323 | D-Link DAP-2622 DDP Change ID Password Auth Username Stack-based Buffer Overflow Remote C… | 2024-07-23T22:20:12.387000Z |
| var-202308-3185 | D-Link DAP-2622 DDP Configuration Backup Filename Stack-based Buffer Overflow Remote Code… | 2024-07-23T22:20:12.455000Z |
| var-202308-3131 | D-Link DAP-2622 DDP Reset Factory Auth Password Stack-based Buffer Overflow Remote Code E… | 2024-07-23T22:20:12.487000Z |
| var-202308-3130 | D-Link DAP-2622 DDP Configuration Restore Auth Username Stack-based Buffer Overflow Remot… | 2024-07-23T22:20:12.431000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2021-052 | PHOENIX CONTACT: PC Worx/-Express prone to improper input validation vulnerability | 2021-11-03T09:45:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-035 | PHOENIX CONTACT: FL MGUARD DM version 1.12.0 and 1.13.0 Improper Privilege Management | 2021-08-11T07:59:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-029 | PHOENIX CONTACT: DoS for PLCnext Control devices in versions <2021.0.5 LTS | 2021-08-04T07:58:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-032 | PHOENIX CONTACT: Niche Ethernet Stack for ILC1x0, ILC1x1 and AXC 1050 Industrial controllers and CHARX control DC | 2021-08-04T07:57:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-036 | PHOENIX CONTACT: Products utilizing WIBU SYSTEMS CodeMeter components in versions prior to V7.21a | 2021-08-04T07:56:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-025 | PHOENIX CONTACT: Security Advisory for PLCNext, ILC 2050 BI, FL MGUARD DM UNLIMITED, TC ROUTER und CLOUD CLIENT products | 2021-06-23T12:19:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-023 | PHOENIX CONTACT: Security Advisory for FL SWITCH SMCS series | 2021-06-23T12:17:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-022 | PHOENIX CONTACT: Security Advisory for FL COMSERVER UNI | 2021-06-23T12:16:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-019 | PHOENIX CONTACT: Security Advisory for ILC1x1 Industrial controllers | 2021-06-23T12:16:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-021 | PHOENIX CONTACT: Security Advisory for AXL F BK and IL BK products | 2021-06-23T12:15:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-020 | PHOENIX CONTACT: Security Advisory for Automation Worx Software Suite | 2021-06-23T11:10:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-024 | PHOENIX CONTACT: Security Advisory for PLCNext, SMARTRTU AXC, CHARX control modular and EEM-SB37x | 2021-05-04T08:17:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-046 | PHOENIX CONTACT: mGuard <8.8.3 products missing initialization of resource | 2020-12-17T09:01:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-049 | Phoenix Contact: Multiple vulnerabilities in PLCnext Control devices < 2021.0 LTS | 2020-12-17T09:00:00.000Z | 2020-12-17T09:00:00.000Z |
| vde-2020-047 | PHOENIX CONTACT: BTP Touch Panels uncontrolled resource consumption | 2020-12-02T09:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-030 | PHOENIX CONTACT: Products utilizing WIBU-SYSTEMS CodeMeter components | 2020-09-09T06:22:00.000Z | 2020-09-09T06:22:00.000Z |
| vde-2020-026 | PHOENIX CONTACT: Denial-of-Service vulnerabilty in Emalytics, ILC 2050 BI and ILC 2050 BI-L | 2020-08-20T07:11:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-025 | PHOENIX CONTACT: Improper path sanitation on import of project files in PLCnext Engineer | 2020-07-21T09:38:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-023 | PHOENIX CONTACT: Two Vulnerabilities in Automation Worx Suite | 2020-07-01T08:25:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-018 | PHOENIX CONTACT: FL MGUARD, TC MGUARD, TC ROUTER and TC CLOUD CLIENT: PPPD vulnerable to CVE-2020-8597 | 2020-06-02T08:42:00.000Z | 2020-06-02T08:42:00.000Z |
| vde-2020-013 | PHOENIX CONTACT: Local Privilege Escalation in Portico Remote desktop control software | 2020-03-27T09:48:00.000Z | 2020-03-27T09:48:00.000Z |
| vde-2020-012 | PHOENIX CONTACT: Local Privilege Escalation in PC WORX SRT | 2020-03-27T09:47:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-003 | PHOENIX CONTACT: TC Router and TC Cloud Client multiple vulnerabilities | 2020-03-05T15:58:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-002 | PHOENIX CONTACT: Advisory for multiple FL Switch GHS utilising VxWorks | 2020-02-25T09:07:00.000Z | 2025-06-05T13:28:12.000Z |
| vde-2020-001 | PHOENIX CONTACT: Emalytics Controller ILC 2050 BI(L) allows unauthorised read and write access to the configuration file | 2020-02-17T08:10:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2019-020 | PHOENIX CONTACT: improper access control exists on FL NAT devices when using MAC-based port security | 2019-10-29T10:56:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2019-016 | PHOENIX CONTACT: Security Advisory for Automation Worx Software Suite | 2019-10-15T06:17:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-015 | PHOENIX CONTACT: Security Advisory for multiple Industrial Controllers | 2019-08-07T00:00:00.000Z | 2025-07-11T07:00:00.000Z |
| vde-2019-014 | PHOENIX CONTACT: Multiple Vulnerabilities in Automation Worx Software Suite | 2019-06-19T12:41:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-009 | PHOENIX CONTACT: Multiple Vulnerabilities in AXC F 2152 | 2019-06-04T10:22:00.000Z | 2025-05-22T13:03:10.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2020-042 | WAGO: PLC families 750-88x and 750-352 prone to DoS attack, versions < FW10 (Update A) | 2020-10-27T10:28:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-029 | WAGO: XSS vulnerability in Web-UI in WAGO 750-88X and WAGO 750-89X | 2020-09-30T11:11:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-028 | WAGO: Authentication Bypass Vulnerability in WAGO 750-36X and WAGO 750-8XX Version <= FW03 | 2020-09-30T11:08:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-027 | WAGO: Vulnerability in web-based authentication in WAGO 750-8XX Version <= FW07 | 2020-09-30T11:06:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-032 | WAGO: Vulnerable WIBU-SYSTEMS Codemeter installed through e!COCKPIT | 2020-09-09T06:23:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-020 | WAGO: PPPD in PFC100 and PFC200 Series is vulnerable to CVE-2020-8597 | 2020-06-10T10:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-015 | WAGO: Web Based Management - Code Execution Vulnerability | 2020-06-10T08:00:00.000Z | 2020-06-10T08:00:00.000Z |
| vde-2020-006 | WAGO: Web-Based Management Authentication Vulnerabilities | 2020-03-09T11:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-011 | WAGO: Multiple Vulnerabilities in I/O-Check Service | 2020-03-09T09:30:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-010 | WAGO: Cloud Connectivity Remote Code Execution Vulnerability | 2020-03-09T09:25:00.000Z | 2020-03-09T09:25:00.000Z |
| vde-2020-009 | WAGO: e!Cockpit Two Update Package Vulnerabilities | 2020-03-09T09:18:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-008 | WAGO: Cloud Connectivity Multiple Vulnerabilities | 2020-03-09T09:15:00.000Z | 2025-05-14T12:53:43.000Z |
| vde-2020-007 | WAGO: Web-Based Management Denial of Service | 2020-03-09T09:10:00.000Z | 2020-03-09T09:10:00.000Z |
| vde-2020-004 | WAGO: e!Cockpit cleartext communication and hardcoded key | 2020-03-09T09:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2019-022 | WAGO: Multiple Vulnerabilities in I/O-Check Service in Multiple Devices | 2019-12-16T09:00:00.000Z | 2019-12-16T09:00:00.000Z |
| vde-2019-017 | WAGO: Series PFC100/PFC200 Information Disclosure | 2019-09-18T11:25:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-013 | WAGO: Multiple Vulnerabilities in industrial managed switches | 2019-06-12T10:25:00.000Z | 2019-06-12T10:25:00.000Z |
| vde-2018-013 | WAGO: 750-8xx Controller Denial of Service | 2018-08-17T09:45:00.000Z | 2025-09-22T10:00:00.000Z |
| vde-2018-010 | WAGO: Multiple vulnerabilities in e!DISPLAY products | 2018-07-10T09:50:00.000Z | 2025-05-22T13:03:10.000Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| MOKSHA-2026-0029 |
7.1 (3.1)
5.3 (4.0)
|
SR-IOV VIF Whitelist Bypass via VIF.other_config |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0028 |
7.1 (3.1)
8.3 (4.0)
|
VDI Lifecycle Corruption via VBD.other_config owner Key |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0027 |
7.2 (3.1)
7.0 (4.0)
|
Gateway/DNS Routing Hijack via PIF.other_config defaul… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0026 |
7.2 (3.1)
7.5 (4.0)
|
Python Module Import Injection via Host.other_config m… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0025 |
7.2 (3.1)
8.4 (4.0)
|
Storage Protocol Metadata Poisoning via SR.sm_config (… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0024 |
7.2 (3.1)
7.3 (4.0)
|
NFS Mount Option Injection via PBD.device_config |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0023 |
7.2 (3.1)
8.2 (4.0)
|
Guest Agent Script Execution Enablement via Pool.other… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0022 |
7.5 (3.1)
8.3 (4.0)
|
Real-Time I/O Class Abuse via VBD.qos_algorithm_params… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0021 |
7.5 (3.1)
6.3 (4.0)
|
Cross-VM Traffic Sniffing via VIF.other_config Promisc… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0020 |
7.1 (3.1)
8.3 (4.0)
|
CBT Metadata Corruption via VDI.other_config content_id |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0019 |
7.5 (3.1)
5.3 (4.0)
|
Tapdisk Memory Pool Injection via VDI.other_config mem-pool |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0018 |
7.6 (3.1)
8.2 (4.0)
|
HA Timeout Manipulation via Pool.other_config (Split-B… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0017 |
7.6 (3.1)
7.0 (4.0)
|
Static Route Injection via Network.other_config |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0016 |
7.6 (3.1)
8.5 (4.0)
|
PVinPVH Xen Kernel Command-Line Injection via VM.platform |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0015 |
7.6 (3.1)
8.4 (4.0)
|
VHD Format Flag Corruption via SR.sm_config use_vhd |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0014 |
8.1 (3.1)
7.8 (4.0)
|
Local Initiator IQN Injection via PBD.device_config |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0013 |
8.2 (3.1)
8.2 (4.0)
|
Pool-Wide OVS Fail-Mode Denial of Service via Pool.oth… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0012 |
8.2 (3.1)
8.2 (4.0)
|
OVS Fail-Mode Denial of Service via Network.other_config |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0011 |
8.4 (3.1)
6.4 (4.0)
|
VIF Backend VM Hijack via Network.other_config backend_vm |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0010 |
8.4 (3.1)
8.1 (4.0)
|
Block Device Path Injection via PBD.device_config |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0009 |
8.5 (3.1)
8.5 (4.0)
|
QEMU Serial Host Filesystem Write via VM.platform hvm_serial |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0008 |
8.2 (3.1)
8.4 (4.0)
|
Storage Driver Domain PBD Detach DoS via VM.other_config |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0007 |
7.5 (3.1)
7.1 (4.0)
|
Backend-Kind I/O Driver Type Confusion via VBD.other_config |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0006 |
8.5 (3.1)
8.8 (4.0)
|
Storage Migration Redirection via VDI.other_config maps_to |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0005 |
9.1 (3.1)
8.7 (4.0)
|
NFS Server Redirection via PBD.device_config |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0004 |
9.1 (3.1)
8.7 (4.0)
|
iSCSI Target Redirection via PBD.device_config |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0003 |
9.9 (3.1)
8.6 (4.0)
|
System Domain Privilege Escalation via is_system_domain |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0002 |
9.9 (3.1)
8.6 (4.0)
|
Storage Protocol Injection via sm_config |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0001 |
9.9 (3.1)
9.4 (4.0)
|
Arbitrary Host Device Mount via VBD.other_config backe… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z |