Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-15587 |
8.6 (4.0)
|
Credentials exposure in tinycontrol devices |
tinycontrol |
Lan Kontroler v3.5 |
2026-03-16T09:26:00.418Z | 2026-03-16T16:26:18.674Z |
| CVE-2025-11500 |
8.7 (4.0)
|
Credentials exposure in tinycontrol devices |
tinycontrol |
Lan Kontroler v3.5 |
2026-03-16T09:26:14.290Z | 2026-03-16T16:24:33.361Z |
| CVE-2026-4276 |
N/A
|
LibreChat RAG API, version 0.7.0, contains a log-injec… |
LibreChat |
RAG API |
2026-03-16T15:31:35.542Z | 2026-03-16T16:22:47.436Z |
| CVE-2026-4232 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Tiandy Integrated Management Platform getAuthorityByUs… |
Tiandy |
Integrated Management Platform |
2026-03-16T09:32:21.380Z | 2026-03-16T16:18:19.546Z |
| CVE-2026-4270 |
5.5 (3.1)
6.8 (4.0)
|
AWS API MCP File Access Restriction Bypass |
AWS |
AWS API MCP Server |
2026-03-16T16:07:53.324Z | 2026-03-16T16:17:11.659Z |
| CVE-2026-3227 |
8.5 (4.0)
|
Authenticated Command Injection on TP-Link TL-WR802N, … |
TP-Link Systems Inc. |
TL-WR802N v4 |
2026-03-13T21:38:31.666Z | 2026-03-16T16:16:25.873Z |
| CVE-2026-30405 |
N/A
|
An issue in GoBGP gobgpd v.4.2.0 allows a remote … |
n/a |
n/a |
2026-03-16T00:00:00.000Z | 2026-03-16T16:16:12.457Z |
| CVE-2025-54758 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2025. Notes: none. | N/A | N/A | 2026-03-16T16:08:31.803Z | |
| CVE-2025-53517 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2025. Notes: none. | N/A | N/A | 2026-03-16T16:08:31.030Z | |
| CVE-2025-53815 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2025. Notes: none. | N/A | N/A | 2026-03-16T16:08:30.186Z | |
| CVE-2026-4233 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
ThingsGateway download path traversal |
n/a |
ThingsGateway |
2026-03-16T10:02:07.004Z | 2026-03-16T16:05:50.727Z |
| CVE-2026-4251 |
2 (4.0)
2.5 (3.1)
2.5 (3.0)
|
CityData CityChat ai.citydata.citychat credentials.jso… |
CityData |
CityChat |
2026-03-16T16:02:08.596Z | 2026-03-16T16:02:08.596Z |
| CVE-2026-32587 |
5.4 (3.1)
|
WordPress WP EasyPay plugin <= 4.2.11 - Broken Access … |
Saad Iqbal |
WP EasyPay |
2026-03-16T15:30:04.835Z | 2026-03-16T15:50:18.350Z |
| CVE-2026-32394 |
4.3 (3.1)
|
WordPress PublishPress Capabilities plugin <= 2.31.0 -… |
PublishPress |
PublishPress Capabilities |
2026-03-13T11:42:11.143Z | 2026-03-16T15:47:29.113Z |
| CVE-2026-4168 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
Tecnick TCExam Group tce_edit_group.php cross site scripting |
Tecnick |
TCExam |
2026-03-15T06:02:07.600Z | 2026-03-16T15:45:07.014Z |
| CVE-2026-4169 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
Tecnick TCExam XML Export tce_xml_users.php F_xml_expo… |
Tecnick |
TCExam |
2026-03-15T06:02:09.933Z | 2026-03-16T15:43:55.190Z |
| CVE-2026-32392 |
7.5 (3.1)
|
WordPress Greenly theme <= 8.1 - Local File Inclusion … |
Creatives_Planet |
Greenly |
2026-03-13T11:42:10.798Z | 2026-03-16T15:42:58.079Z |
| CVE-2026-4170 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Topsec TopACM HTTP Request nmc_sync.php os command injection |
Topsec |
TopACM |
2026-03-15T07:02:43.789Z | 2026-03-16T15:41:29.413Z |
| CVE-2026-3084 |
7.8 (3.0)
|
GStreamer H.266 Codec Parser Integer Underflow Remote … |
GStreamer |
GStreamer |
2026-03-13T20:42:03.443Z | 2026-03-16T15:41:06.083Z |
| CVE-2026-3083 |
8.8 (3.0)
|
GStreamer rtpqdm2depay Out-Of-Bounds Write Remote Code… |
GStreamer |
GStreamer |
2026-03-13T20:41:31.185Z | 2026-03-16T15:41:06.349Z |
| CVE-2026-2921 |
7.8 (3.0)
|
GStreamer RIFF Palette Integer Overflow Remote Code Ex… |
GStreamer |
GStreamer |
2026-03-13T20:41:50.780Z | 2026-03-16T15:41:06.206Z |
| CVE-2026-32635 |
8.6 (4.0)
|
Angular has XSS in i18n attribute bindings |
@angular |
compiler |
2026-03-13T20:58:12.554Z | 2026-03-16T15:41:05.243Z |
| CVE-2026-32628 |
7.7 (4.0)
|
AnythingLLM has SQL Injection in Built-in SQL Agent Pl… |
Mintplex-Labs |
anything-llm |
2026-03-13T20:50:15.991Z | 2026-03-16T15:41:05.437Z |
| CVE-2026-32627 |
8.7 (3.1)
|
cpp-httplib has a Silent TLS Certificate Verification … |
yhirose |
cpp-httplib |
2026-03-13T20:48:14.442Z | 2026-03-16T15:41:05.578Z |
| CVE-2026-2493 |
7.5 (3.0)
|
IceWarp collaboration Directory Traversal Information … |
IceWarp |
IceWarp |
2026-03-13T20:42:38.658Z | 2026-03-16T15:41:05.952Z |
| CVE-2026-2491 |
6.3 (3.0)
|
Socomec DIRIS A-40 HTTP API Authentication Bypass Vuln… |
Socomec |
DIRIS A-40 |
2026-03-13T20:43:15.417Z | 2026-03-16T15:41:05.821Z |
| CVE-2025-15060 |
9.8 (3.0)
|
claude-hovercraft executeClaudeCode Command Injection … |
claude-hovercraft |
claude-hovercraft |
2026-03-13T20:43:36.780Z | 2026-03-16T15:41:05.701Z |
| CVE-2026-4171 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
CodeGenieApp serverless-express API Endpoint TodoList.… |
CodeGenieApp |
serverless-express |
2026-03-15T08:02:07.894Z | 2026-03-16T15:40:39.639Z |
| CVE-2025-69784 |
N/A
|
A local, non-privileged attacker can abuse a vuln… |
n/a |
n/a |
2026-03-16T00:00:00.000Z | 2026-03-16T15:40:15.852Z |
| CVE-2025-69783 |
N/A
|
A local attacker can bypass OpenEDR's 2.5.1.0 sel… |
n/a |
n/a |
2026-03-16T00:00:00.000Z | 2026-03-16T15:39:36.471Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-52649 |
1.8 (3.1)
|
HCL AION is affected by a vulnerability where certain … |
HCL |
AION |
2026-03-16T14:36:32.396Z | 2026-03-16T14:36:32.396Z |
| CVE-2025-52648 |
4.8 (3.1)
|
HCL AION is affected by a vulnerability where off… |
HCL |
AION |
2026-03-16T12:53:25.744Z | 2026-03-16T14:44:03.534Z |
| CVE-2025-52646 |
2.2 (3.1)
|
HCL AION is affected by a vulnerability where certain … |
HCL |
AION |
2026-03-16T14:42:16.317Z | 2026-03-16T14:42:16.317Z |
| CVE-2025-52645 |
1.9 (3.1)
|
HCL AION is affected by a vulnerability where model pa… |
HCL |
AION |
2026-03-16T14:39:12.088Z | 2026-03-16T14:39:12.088Z |
| CVE-2025-52644 |
5.8 (3.1)
|
HCL AION is affected by a vulnerability where certain … |
HCL |
AION |
2026-03-16T14:29:03.864Z | 2026-03-16T14:29:03.864Z |
| CVE-2025-52643 |
4.7 (3.1)
|
HCL AION is affected by a vulnerability where untruste… |
HCL |
AION |
2026-03-16T14:26:57.457Z | 2026-03-16T14:26:57.457Z |
| CVE-2025-52642 |
3.3 (3.1)
|
HCL AION is affected by an internal filesystem paths d… |
HCL |
AION |
2026-03-16T14:45:23.821Z | 2026-03-16T14:45:23.821Z |
| CVE-2025-52638 |
5.6 (3.1)
|
Multiple security vulnerabilities affect HCL AION |
HCL |
AION |
2026-03-16T12:35:06.222Z | 2026-03-16T14:44:57.108Z |
| CVE-2025-52637 |
4.5 (3.1)
|
Multiple security vulnerabilities affect HCL AION |
HCL |
AION |
2026-03-16T12:27:48.222Z | 2026-03-16T14:54:07.756Z |
| CVE-2025-52636 |
1.8 (3.1)
|
HCL AION is affected by a improper handling of uploads… |
HCL |
AION |
2026-03-16T14:21:08.132Z | 2026-03-16T14:21:08.132Z |
| CVE-2025-2274 |
4.8 (4.0)
|
Stored Cross Site Scripting in Forcepoint Web Security |
Forcepoint |
Web Security (On-Prem) |
2026-03-16T14:46:50.015Z | 2026-03-16T14:46:50.015Z |
| CVE-2026-28501 |
9.8 (3.1)
|
WWBN AVideo: Unauthenticated SQL Injection via JSON Re… |
WWBN |
AVideo |
2026-03-06T03:05:21.787Z | 2026-03-06T16:09:52.823Z |
| CVE-2026-28502 |
9.3 (4.0)
|
WWBN AVideo: Authenticated Remote Code Execution via U… |
WWBN |
AVideo |
2026-03-06T03:04:57.497Z | 2026-03-06T16:10:00.643Z |
| CVE-2026-29046 |
9.2 (4.0)
|
TinyWeb: HTTP Header Control Character Injection into … |
maximmasiutin |
TinyWeb |
2026-03-06T02:54:11.026Z | 2026-03-06T16:10:18.974Z |
| CVE-2026-32329 |
5.3 (3.1)
|
WordPress Advanced Related Posts plugin <= 1.9.1 - Bro… |
Ays Pro |
Advanced Related Posts |
2026-03-13T11:41:54.930Z | 2026-03-13T18:53:29.720Z |
| CVE-2026-32328 |
5.4 (3.1)
|
WordPress Lemmony theme < 1.7.1 - Cross Site Request F… |
shufflehound |
Lemmony |
2026-03-13T11:41:54.754Z | 2026-03-13T15:28:59.573Z |
| CVE-2026-32322 |
5.3 (3.1)
|
soroban-sdk: `Fr` scalar field equality comparison byp… |
stellar |
rs-soroban-sdk |
2026-03-12T21:39:38.022Z | 2026-03-13T15:00:09.804Z |
| CVE-2026-32320 |
6.5 (3.1)
|
Ella Core: AMF DoS via malformed PathSwitchRequest wit… |
ellanetworks |
core |
2026-03-12T21:34:50.318Z | 2026-03-14T03:46:29.938Z |
| CVE-2026-32319 |
7.5 (3.1)
|
Ella Core: Unauthenticated AMF DoS via malformed Initi… |
ellanetworks |
core |
2026-03-12T21:33:32.463Z | 2026-03-14T03:45:57.547Z |
| CVE-2026-32308 |
7.6 (3.1)
|
OneUptime: Stored XSS via Mermaid Diagram Rendering (s… |
OneUptime |
oneuptime |
2026-03-12T21:29:00.510Z | 2026-03-14T03:43:13.858Z |
| CVE-2026-32306 |
10 (3.1)
|
OneUptime ClickHouse SQL Injection via Aggregate Query… |
OneUptime |
oneuptime |
2026-03-12T21:27:51.463Z | 2026-03-14T03:42:22.271Z |
| CVE-2026-32304 |
9.8 (3.1)
|
Locutus: RCE via unsanitized input in create_function() |
locutusjs |
locutus |
2026-03-12T21:24:51.730Z | 2026-03-13T13:12:13.553Z |
| CVE-2026-32302 |
8.1 (3.1)
|
OpenClaw: Untrusted web origins can obtain authenticat… |
openclaw |
openclaw |
2026-03-12T21:22:29.099Z | 2026-03-13T13:11:06.707Z |
| CVE-2026-32301 |
9.3 (3.1)
|
Centrifugo: SSRF via unverified JWT claims interpolate… |
centrifugal |
centrifugo |
2026-03-12T21:19:03.862Z | 2026-03-13T13:09:57.376Z |
| CVE-2026-31949 |
6.5 (3.1)
|
LibreChat Denial of Service (DoS) via Unhandled Except… |
danny-avila |
LibreChat |
2026-03-13T19:47:24.653Z | 2026-03-16T13:43:45.488Z |
| CVE-2026-31944 |
7.6 (3.1)
|
LibreChat MCP OAuth callback does not validate browser… |
danny-avila |
LibreChat |
2026-03-13T19:44:30.850Z | 2026-03-16T13:41:21.254Z |
| CVE-2026-31922 |
8.5 (3.1)
|
WordPress Fox LMS plugin <= 1.0.6.3 - SQL Injection vu… |
Ays Pro |
Fox LMS |
2026-03-13T11:41:54.569Z | 2026-03-13T19:26:59.728Z |
| CVE-2026-31919 |
4.3 (3.1)
|
WordPress Advanced Coupons for WooCommerce Coupons plu… |
Josh Kohlbach |
Advanced Coupons for WooCommerce Coupons |
2026-03-13T11:41:54.329Z | 2026-03-13T14:48:55.614Z |
| CVE-2026-31918 |
6.5 (3.1)
|
WordPress immonex Kickstart plugin <= 1.13.0 - Cross S… |
immonex |
immonex Kickstart |
2026-03-13T11:41:54.126Z | 2026-03-13T19:23:48.722Z |
| CVE-2026-31917 |
8.5 (3.1)
|
WordPress WP ERP plugin <= 1.16.10 - SQL Injection vul… |
weDevs |
WP ERP |
2026-03-13T11:41:53.941Z | 2026-03-13T15:21:10.021Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-32322 | soroban-sdk is a Rust SDK for Soroban contracts. Prior to 22.0.11, 23.5.3, and 25.3.0, The Fr (scal… | 2026-03-13T19:54:42.610 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-32320 | Ella Core is a 5G core designed for private networks. Prior to 1.5.1, Ella Core panics when process… | 2026-03-13T19:54:42.450 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-32319 | Ella Core is a 5G core designed for private networks. Prior to 1.5.1, Ella Core panics when process… | 2026-03-13T19:54:42.297 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-32308 | OneUptime is a solution for monitoring and managing online services. Prior to 10.0.23, the Markdown… | 2026-03-13T19:54:42.147 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-32306 | OneUptime is a solution for monitoring and managing online services. Prior to 10.0.23, the telemetr… | 2026-03-13T19:54:42.000 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-32304 | Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior… | 2026-03-13T19:54:41.830 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-32302 | OpenClaw is a personal AI assistant. Prior to 2026.3.11, browser-originated WebSocket connections c… | 2026-03-13T19:54:41.650 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-32301 | Centrifugo is an open-source scalable real-time messaging server. Prior to 6.7.0, Centrifugo is vul… | 2026-03-13T19:54:41.477 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-31949 | LibreChat is a ChatGPT clone with additional features. Prior to 0.8.3-rc1, a Denial of Service (DoS… | 2026-03-13T19:54:39.753 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-31944 | LibreChat is a ChatGPT clone with additional features. From 0.8.2 to 0.8.2-rc3, The MCP (Model Cont… | 2026-03-13T19:54:39.590 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-31922 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-03-13T19:54:39.393 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-31919 | Missing Authorization vulnerability in Josh Kohlbach Advanced Coupons for WooCommerce Coupons advan… | 2026-03-13T19:54:39.193 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-31918 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-03-13T19:54:39.000 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-31917 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-03-13T19:54:38.807 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-31916 | Missing Authorization vulnerability in Iulia Cazan Latest Post Shortcode latest-post-shortcode allo… | 2026-03-13T19:54:38.613 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-31915 | Missing Authorization vulnerability in UX-themes Flatsome flatsome allows Exploiting Incorrectly Co… | 2026-03-13T19:54:38.410 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-31899 | CairoSVG is an SVG converter based on Cairo, a 2D graphics library. Prior to Kozea/CairoSVG has exp… | 2026-03-13T19:54:38.190 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-31897 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, there is an out-o… | 2026-03-13T19:54:38.023 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-31886 | Dagu is a workflow engine with a built-in Web user interface. Prior to 2.2.4, the dagRunId request … | 2026-03-13T19:54:37.690 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-31883 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, a size_t underflo… | 2026-03-13T19:54:37.190 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-31882 | Dagu is a workflow engine with a built-in Web user interface. Prior to 2.2.4, when Dagu is configur… | 2026-03-13T19:54:37.000 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-31864 | JumpServer is an open source bastion host and an operation and maintenance security audit system. a… | 2026-03-13T19:54:36.803 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-31814 | Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. From 0.13.0 to bef… | 2026-03-13T19:54:36.470 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-31806 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, the gdi_surface_… | 2026-03-13T19:54:36.300 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-31798 | JumpServer is an open source bastion host and an operation and maintenance security audit system. P… | 2026-03-13T19:54:36.097 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-30961 | Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior… | 2026-03-13T19:54:35.903 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-30955 | Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior… | 2026-03-13T19:54:35.740 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-30943 | Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior… | 2026-03-13T19:54:35.573 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-30915 | SFTPGo is an open source, event-driven file transfer solution. SFTPGo versions before v2.7.1 contai… | 2026-03-13T19:54:35.410 | 2026-03-16T14:54:11.293 |
| fkie_cve-2026-30914 | SFTPGo is an open source, event-driven file transfer solution. In SFTPGo versions prior to 2.7.1, a… | 2026-03-13T19:54:35.247 | 2026-03-16T14:54:11.293 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-jgpm-mqw8-q875 |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability has been found in Technologies Integrated Management Platform 7.17.0. Affected by t… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-hxpm-2ppg-5m8m |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was detected in LB-LINK BL-WR9000 2.4.9. This affects the function sub_458754 of th… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-hj3v-rf5w-w57g |
8.8 (3.1)
7.4 (4.0)
|
A security vulnerability has been detected in LB-LINK BL-WR9000 2.4.9. The impacted element is the … | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-h38j-6r2q-95r4 |
5.3 (3.1)
1.9 (4.0)
|
A weakness has been identified in i-SENS SmartLog App up to 2.6.8 on Android. This affects an unkno… | 2026-03-16T15:30:45Z | 2026-03-16T15:30:46Z |
| ghsa-g5vr-q7cx-vw4q |
2.4 (3.1)
1.9 (4.0)
|
A security flaw has been discovered in CMS Made Simple up to 2.2.21. Impacted is an unknown functio… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-fvc6-2v8r-w926 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW,… | 2026-03-16T15:30:45Z | 2026-03-16T15:30:46Z |
| ghsa-frpm-2wwm-5rh6 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW,… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-f7mc-3j8p-q33m |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was identified in itsourcecode Payroll Management System 1.0. This issue affects so… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-f62h-6jmm-8r9r |
8.4 (4.0)
|
A DLL search order hijacking vulnerability in Thermalright TR-VISION HOME on Windows (64-bit) allow… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-c8j7-9pjj-vhm4 |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was found in vanna-ai vanna up to 2.0.2. Affected by this vulnerability is the func… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-c72j-jqf3-28p7 |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was identified in ThingsGateway 12. This affects an unknown part of the file /api/f… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-c4r9-x3w8-g3p3 |
2.5 (3.1)
1.1 (4.0)
|
A security vulnerability has been detected in XREAL Nebula App up to 3.2.1 on Android. This impacts… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-9qgv-q4c6-mp34 |
5.8 (3.1)
|
HCL AION is affected by a vulnerability where certain user actions are not adequately audited or lo… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-97g2-6cfp-4vhx |
8.8 (3.1)
7.4 (4.0)
|
A weakness has been identified in LB-LINK BL-WR9000 2.4.9. The affected element is the function sub… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-8j8h-hvqj-xxxw |
3.3 (3.1)
1.9 (4.0)
|
A flaw has been found in INDEX Conferences & Exhibitions Organization YWF BPOF APGCS App up to 1.0.… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-8ggf-9853-3cf8 |
3.8 (3.1)
2.0 (4.0)
|
A vulnerability was determined in SSCMS up to 7.4.0. This vulnerability affects the function PathUt… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-7gfx-c7w8-ghq7 |
6.3 (3.1)
2.1 (4.0)
|
A security flaw has been discovered in SSCMS 7.4.0. This vulnerability affects unknown code of the … | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-79x7-8whp-c62c |
2.5 (3.1)
1.1 (4.0)
|
A vulnerability was detected in myAEDES App up to 1.18.4 on Android. Affected is an unknown functio… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-6r37-9q52-pqr5 |
1.8 (3.1)
|
HCL AION is affected by a vulnerability related to the handling of upload size limits. Improper con… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-6mj8-jmp2-g8q7 |
7.3 (3.1)
5.5 (4.0)
|
A flaw has been found in vanna-ai vanna up to 2.0.2. This impacts the function remove_training_data… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-65rf-q535-88ch |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was found in Tiandy Easy7 Integrated Management Platform 7.17.0. This affects an un… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-5vm9-9xjm-4755 |
4.7 (3.1)
|
HCL AION is affected by a vulnerability where untrusted file parsing operations are not executed wi… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-5mr9-crcg-8wh2 |
4.3 (3.1)
|
Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to use consistent … | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-3qgf-4qfv-p6fh |
1.9 (3.1)
|
HCL AION is affected by a vulnerability where model packaging and distribution mechanisms may not i… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-35h3-7v37-r8cx |
7.3 (3.1)
5.5 (4.0)
|
A weakness has been identified in itsourcecode Online Enrollment System 1.0. This issue affects som… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-2mvv-v998-h3gj |
3.3 (3.1)
|
HCL AION is affected by a vulnerability where internal filesystem paths may be exposed through appl… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-2gqq-wrj6-92hv |
4.7 (3.1)
2.0 (4.0)
|
A vulnerability has been found in itsourcecode College Management System 1.0. This issue affects so… | 2026-03-16T15:30:46Z | 2026-03-16T15:30:46Z |
| ghsa-xcmw-c5v3-hvv7 |
5.3 (3.1)
5.5 (4.0)
|
A vulnerability was identified in Tiandy Easy7 Integrated Management Platform 7.17.0. Impacted is a… | 2026-03-16T15:30:45Z | 2026-03-16T15:30:45Z |
| ghsa-x6g7-76r9-f4v3 |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was detected in JawherKl node-api-postgres up to 2.5. This impacts the function Use… | 2026-03-16T15:30:45Z | 2026-03-16T15:30:45Z |
| ghsa-wfg7-892m-79mq |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW,… | 2026-03-16T15:30:45Z | 2026-03-16T15:30:45Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-111 |
9.1 (3.1)
|
A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langcha… | langchain | 2024-10-29T13:15:00Z | 2025-05-02T18:39:47.588215Z |
| pysec-2024-245 |
|
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated user… | apache-airflow | 2024-02-29T11:15:08+00:00 | 2025-05-01T21:22:38.598048+00:00 |
| pysec-2025-35 |
7.5 (3.1)
|
Weblate is a web based localization tool. Prior to version 5.11, when creating a new comp… | weblate | 2025-04-15T21:16:04+00:00 | 2025-04-30T17:22:51.467257+00:00 |
| pysec-2025-34 |
|
The unsafe globals in Picklescan before 0.0.25 do not include ssl. Consequently, ssl.get_… | picklescan | 2025-04-24T01:15:49+00:00 | 2025-04-24T03:08:15.436691+00:00 |
| pysec-2025-33 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. When the Vyper Compiler uses the… | vyper | 2025-01-14T18:16:05+00:00 | 2025-04-23T21:23:01.322686+00:00 |
| pysec-2025-32 |
9.8 (3.1)
|
BentoML is a Python library for building online serving systems optimized for AI apps and… | bentoml | 2025-04-09T16:15:25+00:00 | 2025-04-22T19:21:34.073355+00:00 |
| pysec-2025-31 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper handles AugAssign statemen… | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.116292+00:00 |
| pysec-2025-30 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Multiple evaluation of a single … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.064106+00:00 |
| pysec-2025-29 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper `sqrt()` builtin uses the … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.005382+00:00 |
| pysec-2025-28 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.772920+00:00 |
| pysec-2025-27 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.711157+00:00 |
| pysec-2025-26 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.645758+00:00 |
| pysec-2025-25 |
6.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the CORS middle… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.532849+00:00 |
| pysec-2025-24 |
7.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the /api/remove… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.486485+00:00 |
| pysec-2025-23 |
|
Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Inform… | ray | 2025-03-06T05:15:16+00:00 | 2025-04-09T17:27:27.434099+00:00 |
| pysec-2025-22 |
9.8 (3.1)
|
A vulnerability, that could result in Remote Code Execution (RCE), has been found in Plot… | plotai | 2025-03-10T14:15:24+00:00 | 2025-04-09T17:27:27.203714+00:00 |
| pysec-2025-21 |
9.8 (3.1)
|
picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model arch… | picklescan | 2025-03-10T12:15:12+00:00 | 2025-04-09T17:27:27.016747+00:00 |
| pysec-2023-311 |
5.4 (3.1)
|
plone.namedfile allows users to handle `File` and `Image` fields targeting, but not depen… | plone-namedfile | 2023-09-21T15:15:10+00:00 | 2025-04-09T17:27:27.153848+00:00 |
| pysec-2022-43179 |
7.3 (3.1)
|
Poetry is a dependency manager for Python. To handle dependencies that come from a Git re… | poetry | 2022-09-07T19:15:08+00:00 | 2025-04-09T17:27:27.255151+00:00 |
| pysec-2021-891 |
7.8 (3.1)
|
CWE - CWE-287: Improper Authentication vulnerability in SUSE Linux Enterprise Server 15 S… | salt | 2021-03-03T10:15:13+00:00 | 2025-04-09T17:27:27.582884+00:00 |
| pysec-2025-20 |
6.5 (3.1)
|
picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes i… | picklescan | 2025-03-10T12:15:10+00:00 | 2025-04-09T17:27:26.966215+00:00 |
| pysec-2025-19 |
9.8 (3.1)
|
picklescan before 0.0.22 only considers standard pickle file extensions in the scope for … | picklescan | 2025-03-03T19:15:34+00:00 | 2025-04-09T17:27:26.916350+00:00 |
| pysec-2025-18 |
|
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craf… | picklescan | 2025-02-26T15:15:24+00:00 | 2025-04-09T17:27:26.867210+00:00 |
| pysec-2025-17 |
5.5 (3.1)
|
In mlflow/mlflow version 2.18, an admin is able to create a new user account without sett… | mlflow | 2025-03-20T10:15:54+00:00 | 2025-04-09T17:27:26.322333+00:00 |
| pysec-2023-310 |
7.5 (3.1)
|
Mobile Security Framework (MobSF) <=v3.7.8 Beta is vulnerable to Insecure Permissions. NO… | mobsf | 2023-09-21T22:15:11+00:00 | 2025-04-09T17:27:26.663665+00:00 |
| pysec-2023-309 |
8.8 (3.1)
|
Path Traversal in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-13T00:15:07+00:00 | 2025-04-09T17:27:26.271200+00:00 |
| pysec-2023-308 |
10.0 (3.1)
|
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0. | mlflow | 2023-07-19T01:15:10+00:00 | 2025-04-09T17:27:26.223213+00:00 |
| pysec-2025-16 |
7.5 (3.1)
|
LNbits is a Lightning wallet and accounts system. A Server-Side Request Forgery (SSRF) vu… | lnbits | 2025-04-06T20:15:15+00:00 | 2025-04-09T17:27:25.872691+00:00 |
| pysec-2025-15 |
5.3 (3.1)
|
Flask-AppBuilder is an application development framework. Prior to 4.5.3, Flask-AppBuilde… | flask-appbuilder | 2025-03-03T16:15:41+00:00 | 2025-04-09T17:27:25.227116+00:00 |
| pysec-2025-14 |
|
An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normal… | django | 2025-04-02T13:15:44+00:00 | 2025-04-09T17:27:25.169049+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33851 | phpecc, as used in paragonie/phpecc before 2.0.1, has a branch-based timing leak in Point… | 2024-04-28T05:02:07.732559Z |
| gsd-2024-33850 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.952536Z |
| gsd-2024-33849 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.924449Z |
| gsd-2024-4295 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:06.068263Z |
| gsd-2024-4294 | A vulnerability, which was classified as critical, has been found in PHPGurukul Doctor Ap… | 2024-04-28T05:02:06.079201Z |
| gsd-2024-4293 | A vulnerability classified as problematic was found in PHPGurukul Doctor Appointment Mana… | 2024-04-28T05:02:06.052534Z |
| gsd-2024-4292 | A vulnerability classified as critical has been found in Contemporary Controls BASrouter … | 2024-04-28T05:02:06.073286Z |
| gsd-2024-4291 | A vulnerability was found in Tenda A301 15.13.08.12_multi_TDE01. It has been rated as cri… | 2024-04-28T05:02:06.058388Z |
| gsd-2023-52722 | An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER … | 2024-04-28T05:01:28.746814Z |
| gsd-2022-48685 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:00:27.870720Z |
| gsd-2022-48684 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:00:27.715598Z |
| gsd-2024-24777 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:24.547536Z |
| gsd-2024-28875 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:20.401696Z |
| gsd-2024-33846 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.353086Z |
| gsd-2024-33845 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.569462Z |
| gsd-2024-33844 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.384822Z |
| gsd-2024-33843 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.393431Z |
| gsd-2024-33842 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.286185Z |
| gsd-2024-33841 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.393169Z |
| gsd-2024-33840 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.586722Z |
| gsd-2024-33839 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.579161Z |
| gsd-2024-33838 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.585807Z |
| gsd-2024-33837 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.377806Z |
| gsd-2024-33836 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.309729Z |
| gsd-2024-33835 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.550838Z |
| gsd-2024-33834 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.333945Z |
| gsd-2024-33833 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.551960Z |
| gsd-2024-33832 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.298682Z |
| gsd-2024-33831 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.326184Z |
| gsd-2024-33830 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.395389Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1455 | Malicious code in native_dep (npm) | 2026-03-14T06:20:46Z | 2026-03-14T06:20:46Z |
| mal-2026-1422 | Malicious code in fastapi-middleware-cors (PyPI) | 2026-03-13T20:20:02Z | 2026-03-13T20:20:02Z |
| mal-2026-1420 | Malicious code in cw-isdk (npm) | 2026-03-13T15:38:25Z | 2026-03-13T18:49:49Z |
| mal-2026-1418 | Malicious code in tailwind-mainanimation (npm) | 2026-03-13T14:20:40Z | 2026-03-13T14:20:40Z |
| mal-2026-1419 | Malicious code in tailwindcss-style-modify (npm) | 2026-03-13T14:15:45Z | 2026-03-13T14:15:45Z |
| mal-2026-1389 | Malicious code in twitch-twilight-intl (npm) | 2026-03-13T05:37:47Z | 2026-03-13T11:27:13Z |
| mal-2026-1388 | Malicious code in tourney-sdk-react (npm) | 2026-03-13T05:37:58Z | 2026-03-13T11:27:13Z |
| mal-2026-1387 | Malicious code in tahoe-tap (npm) | 2026-03-13T05:38:17Z | 2026-03-13T11:27:13Z |
| mal-2026-1386 | Malicious code in tachyon-spade-reporter (npm) | 2026-03-13T05:39:05Z | 2026-03-13T11:27:13Z |
| mal-2026-1385 | Malicious code in conductor-managed-airflow-environment (npm) | 2026-03-13T05:37:35Z | 2026-03-13T11:27:09Z |
| mal-2026-780 | Malicious code in ac-element-engagement (npm) | 2026-02-06T02:07:02Z | 2026-03-13T11:16:26Z |
| mal-2026-1412 | Malicious code in project47 (PyPI) | 2026-03-13T10:54:54Z | 2026-03-13T10:54:54Z |
| mal-2026-1409 | Malicious code in darkig (PyPI) | 2026-03-13T10:50:53Z | 2026-03-13T10:50:53Z |
| mal-2026-1410 | Malicious code in ighack (PyPI) | 2026-03-13T10:47:01Z | 2026-03-13T10:47:01Z |
| mal-2026-1411 | Malicious code in nfd (PyPI) | 2026-03-13T10:41:13Z | 2026-03-13T10:41:13Z |
| mal-2026-1417 | Malicious code in twitch.dashboard-v2.core (npm) | 2026-03-13T10:37:20Z | 2026-03-13T10:37:27Z |
| mal-2026-1416 | Malicious code in twitch-security (npm) | 2026-03-13T10:37:20Z | 2026-03-13T10:37:20Z |
| mal-2026-1415 | Malicious code in pulsard-utils (npm) | 2026-03-13T10:37:20Z | 2026-03-13T10:37:20Z |
| mal-2026-1414 | Malicious code in hardhat2-config (npm) | 2026-03-13T10:37:20Z | 2026-03-13T10:37:20Z |
| mal-2026-1413 | Malicious code in brlc-base (npm) | 2026-03-13T10:37:19Z | 2026-03-13T10:37:20Z |
| mal-2026-1408 | Malicious code in nai (PyPI) | 2026-03-13T10:31:39Z | 2026-03-13T10:31:39Z |
| mal-2026-1407 | Malicious code in thief-utils (PyPI) | 2026-03-13T08:43:52Z | 2026-03-13T08:43:52Z |
| mal-2026-1406 | Malicious code in makenotion-ppetest (PyPI) | 2026-03-13T08:13:53Z | 2026-03-13T08:13:53Z |
| mal-2026-1456 | Malicious code in rrweb-v1 (npm) | 2026-03-13T07:10:46Z | 2026-03-13T07:10:46Z |
| mal-2026-1400 | Malicious code in solana-pumpfun-sdk (npm) | 2026-03-13T06:55:58Z | 2026-03-13T06:55:58Z |
| mal-2026-1399 | Malicious code in pino-sdk (npm) | 2026-03-13T06:55:58Z | 2026-03-13T06:55:58Z |
| mal-2026-1392 | Malicious code in @dinzid04/libsignal-node (npm) | 2026-03-13T06:54:12Z | 2026-03-13T06:54:13Z |
| mal-2026-1391 | Malicious code in @dinzid04/baileys (npm) | 2026-03-13T06:54:12Z | 2026-03-13T06:54:13Z |
| mal-2026-1401 | Malicious code in tailwindcss-animation-advanced (npm) | 2026-03-13T06:51:42Z | 2026-03-13T06:51:42Z |
| mal-2026-1393 | Malicious code in cortana-md-bot (npm) | 2026-03-13T06:48:27Z | 2026-03-13T06:48:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1569 | Oracle Java SE: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-1452 | Linux Kernel: Mehrere Schwachstellen | 2025-07-02T22:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-1389 | Podman: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-06-24T22:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0441 | OpenClaw: Mehrere Schwachstellen | 2026-02-17T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0424 | OpenClaw: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1898 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und Privilegieneskalation | 2025-08-24T22:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0535 | Juniper JUNOS Evolved: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2026-02-25T23:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2026-0554 | Red Hat Enterprise Linux (udisks): Mehrere Schwachstellen | 2026-03-01T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0546 | Red Hat Enterprise Linux (Valkey): Mehrere Schwachstellen | 2026-02-26T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0526 | IBM App Connect Enterprise: Mehrere Schwachstellen | 2026-02-25T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0422 | Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2026-02-15T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0410 | HAProxy Enterprise, Community und ALOHA (QUIC): Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-12T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0379 | Intel Prozessoren: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0359 | GnuTLS: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0324 | Linux Kernel: Mehrere Schwachstellen | 2026-02-04T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0305 | Red Hat Enterprise Linux (libsoup): Mehrere Schwachstellen | 2026-02-04T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0234 | OpenSSL: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0080 | Microsoft Azure: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0068 | libpng (API-Funktionen): Mehrere Schwachstellen ermöglichen DoS und Offenlegung von Informationen | 2026-01-12T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0062 | Red Hat Enterprise Linux (libsoup): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und Datenmanipulation | 2026-01-11T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2920 | Linux Kernel: Mehrere Schwachstellen | 2025-12-23T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2914 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-22T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2904 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-18T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2887 | PHP: Mehrere Schwachstellen | 2025-12-18T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2868 | Linux Kernel: Mehrere Schwachstellen | 2025-12-16T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2765 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-08T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2756 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-07T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2658 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-20T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2651 | GnuTLS: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-11-19T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2488 | Red Hat Enterprise Linux (SSSD, libsoup): Mehrere Schwachstellen | 2025-11-04T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-020-01 | Schneider Electric EcoStruxure Foxboro DCS (Update A) | 2025-12-09T08:00:00.000000Z | 2026-02-24T06:00:00.000000Z |
| icsa-26-050-04 | Welker OdorEyes EcoSystem Pulse Bypass System with XL4 Controller | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-050-03 | Jinan USR IOT Technology Limited (PUSR) USR-W610 | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-050-02 | Valmet DNA Engineering Web Tools | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-050-01 | EnOcean SmartServer IoT | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-24-263-02 | IDEC Products (Update A) | 2024-09-19T06:00:00.000000Z | 2026-02-18T07:00:00.000000Z |
| icsa-26-048-03 | GE Vernova Enervista UR Setup | 2026-02-17T07:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-048-02 | Delta Electronics ASDA-Soft | 2026-02-17T07:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-048-01 | Siemens Simcenter Femap and Nastran | 2026-02-10T00:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-043-10 | Airleader Master | 2026-02-12T07:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-09 | Hitachi Energy SuprOS | 2026-01-27T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-07 | Siemens Siveillance Video Management Servers | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-05 | Siemens Solid Edge | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-04 | Siemens Desigo CC Product Family and SENTRON Powermanager | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-02 | Siemens Polarion | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-01 | Siemens SINEC NMS | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-015-04 | Siemens SIMATIC and SIPLUS products | 2026-01-13T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-289-06 | Siemens SiPass Integrated | 2025-10-14T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-135-01 | Siemens RUGGEDCOM APE1808 Devices | 2025-05-13T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-072-11 | Siemens SIMATIC IPC Family, ITP1000, and Field PGs | 2025-03-11T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-24-102-01 | Siemens SIMATIC S7-1500 | 2024-04-09T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-12-349-01 | Siemens Automation License Manager Uncontrolled Resource Consumption | 2012-12-12T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-140-04 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products (Update E) | 2025-05-20T04:00:00.000000Z | 2026-02-12T05:00:00.000000Z |
| icsa-26-036-01 | TP-Link Systems Inc. VIGI Series IP Camera | 2026-02-05T06:00:00.000000Z | 2026-02-11T06:00:00.000000Z |
| icsma-26-041-01 | ZOLL ePCR IOS Mobile Application | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-04 | AVEVA PI to CONNECT Agent | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-03 | AVEVA PI Data Archive | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-02 | ZLAN Information Technology Co. ZLAN5143D | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-01 | Yokogawa FAST/TOOLS | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-036-06 | Hitachi Energy FOX61x | 2026-01-27T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-http-code-exec-wmfp3h3o | Cisco Secure Firewall Adaptive Security Appliance Software, Secure Firewall Threat Defense Software, IOS Software, IOS XE Software, and IOS XR Software Web Services Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:51+00:00 |
| cisco-sa-ise-radsupress-dos-8yf3jthh | Cisco Identity Services Engine RADIUS Suppression Denial of Service Vulnerability | 2025-11-05T16:00:00+00:00 | 2025-11-05T16:00:00+00:00 |
| cisco-sa-broadworks-xss-o696ymra | Cisco BroadWorks CommPilot Application Software Cross-Site Scripting Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-10-21T15:13:31+00:00 |
| cisco-sa-roomos-inf-disc-qggsbxam | Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-phone-dos-fpyjlv7a | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-secboot-uqfd8avc | Cisco IOS XE Software Secure Boot Bypass Vulnerabilities | 2025-09-24T16:00:00+00:00 | 2025-10-15T15:57:29+00:00 |
| cisco-sa-snmp-x4lphte | Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-06T18:27:02+00:00 |
| cisco-sa-ios-tacacs-hdb7thjw | Cisco IOS and IOS XE Software TACACS+ Authentication Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-01T16:39:50+00:00 |
| cisco-sa-cv-xss-rwrakaj9 | Cisco Cyber Vision Center Stored Cross-Site Scripting Vulnerabilities | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-cucm-stored-xss-fnj66yly | Cisco Unified Communications Manager Stored Cross-Site Scripting Vulnerability | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-cat9k-ptmd7bgy | Cisco IOS XE Software for Catalyst 9000 Series Switches Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-30T14:26:46+00:00 |
| cisco-sa-ap-ipv6-gw-tuazpn9o | Cisco Access Point Software Intermittent IPv6 Gateway Change Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:51+00:00 |
| cisco-sa-webui-xss-vwydgjou | Cisco IOS XE Software Web Authentication Reflected Cross-Site Scripting Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:50+00:00 |
| cisco-sa-snmpwred-x3mjyf5m | Cisco IOS XE Software Simple Network Management Protocol Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-nbar-dos-lavwtmet | Cisco IOS XE Software Network-Based Application Recognition Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-arg-inject-eyddbh4e | Cisco IOS XE Software CLI Argument Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-xe-cmd-inject-rpjm8bgl | Cisco IOS XE Software HTTP API Command Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-invalid-url-dos-nvxszf6u | Cisco IOS Software Industrial Ethernet Switch Device Manager Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-cli-eb7cz6yo | Cisco IOS and IOS XE Software CLI Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-defaultacl-psjk9nvf | Cisco SD-WAN vEdge Software Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-cat9k-acl-l4k7vxgd | Cisco IOS XE Software on Cisco Catalyst 9500X and 9600X Series Switches Virtual Interface Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-action-frame-inj-qqcncz8h | Cisco Wireless Access Point Software Device Analytics Action Frame Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-9800cl-openscep-sb4xtxzp | Cisco IOS XE Software for Catalyst 9800 Series Wireless Controller for Cloud Unauthenticated Access to Certificate Enrollment Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-snmp-bypass-hhuvujdn | Cisco IOS XE SD-WAN Software Packet Filtering Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-09-22T14:12:28+00:00 |
| cisco-sa-xrsig-uy4zrucg | Cisco IOS XR Software Image Verification Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-iosxr-arp-storm-ejuu55ym | Cisco IOS XR ARP Broadcast Storm Denial of Service Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-acl-packetio-swjhhbtz | Cisco IOS XR Software Management Interface ACL Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-fp2k-ipsec-dos-tjwgdzco | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 2100 Series IPv6 over IPsec Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-09T21:22:34+00:00 |
| cisco-sa-webex-xss-55bv8hhm | Cisco Webex Meetings Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-webex-urlredirect-uk8ddjsz | Cisco Webex Meetings URL Redirection Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-26123 | Microsoft Authenticator Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26121 | Azure IOT Explorer Spoofing Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26118 | Azure MCP Server Tools Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26117 | Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26116 | SQL Server Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26115 | SQL Server Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26114 | Microsoft SharePoint Server Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26113 | Microsoft Office Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26112 | Microsoft Excel Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26110 | Microsoft Office Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26109 | Microsoft Excel Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26108 | Microsoft Excel Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26107 | Microsoft Excel Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26106 | Microsoft SharePoint Server Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26105 | Microsoft SharePoint Server Spoofing Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25190 | GDI Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25189 | Windows DWM Core Library Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25188 | Windows Telephony Service Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25187 | Winlogon Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25186 | Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25185 | Windows Shell Link Processing Spoofing Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25181 | GDI+ Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25180 | Windows Graphics Component Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25179 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25178 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25177 | Active Directory Domain Services Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25176 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25175 | Windows NTFS Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25174 | Windows Extensible File Allocation Table Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25171 | Windows Authentication Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0039 | ZeroDay kwetsbaarheid verholpen in Microsoft Office | 2026-01-27T07:27:52.867415Z | 2026-01-27T07:27:52.867415Z |
| ncsc-2026-0038 | Kwetsbaarheid verholpen in BIND 9 | 2026-01-23T08:54:43.506215Z | 2026-01-23T08:54:43.506215Z |
| ncsc-2026-0037 | Kwetsbaarheden verholpen in GitLab Community Edition en Enterprise Edition | 2026-01-22T12:35:30.505659Z | 2026-01-22T12:35:30.505659Z |
| ncsc-2026-0036 | Kwetsbaarheden verholpen in Cisco Unified Communications producten | 2026-01-22T09:49:39.156365Z | 2026-01-22T09:49:39.156365Z |
| ncsc-2026-0035 | Kwetsbaarheid verholpen in Palo Alto Networks PAN-OS | 2026-01-22T09:22:36.433609Z | 2026-01-22T09:22:36.433609Z |
| ncsc-2026-0034 | Kwetsbaarheden verholpen in Atlassian producten | 2026-01-22T09:03:42.667958Z | 2026-01-22T09:03:42.667958Z |
| ncsc-2026-0033 | Kwetsbaarheid verholpen in GNU Inetutils telnetd | 2026-01-21T14:15:46.424529Z | 2026-01-21T14:15:46.424529Z |
| ncsc-2026-0032 | Kwetsbaarheden verholpen in Oracle MySQL | 2026-01-21T10:12:24.844869Z | 2026-01-21T10:12:24.844869Z |
| ncsc-2026-0031 | Kwetsbaarheden verholpen in Oracle JD Edwards | 2026-01-21T10:12:00.674214Z | 2026-01-21T10:12:00.674214Z |
| ncsc-2026-0030 | Kwetsbaarheden verholpen in Oracle Java | 2026-01-21T10:11:39.759123Z | 2026-01-21T10:11:39.759123Z |
| ncsc-2026-0029 | Kwetsbaarheden verholpen in Oracle Hyperion | 2026-01-21T10:10:46.297433Z | 2026-01-21T10:10:46.297433Z |
| ncsc-2026-0028 | Kwetsbaarheden verholpen in Oracle Analytics | 2026-01-21T10:10:15.985753Z | 2026-01-21T10:10:15.985753Z |
| ncsc-2026-0027 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2026-01-21T10:08:59.379774Z | 2026-01-21T10:08:59.379774Z |
| ncsc-2026-0026 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2026-01-21T10:06:27.920991Z | 2026-01-21T10:06:27.920991Z |
| ncsc-2026-0025 | Kwetsbaarheden verholpen in Oracle Financial Services | 2026-01-21T09:55:33.889125Z | 2026-01-21T09:55:33.889125Z |
| ncsc-2026-0024 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2026-01-21T09:29:38.334428Z | 2026-01-21T09:29:38.334428Z |
| ncsc-2026-0023 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2026-01-21T09:27:58.715578Z | 2026-01-21T09:27:58.715578Z |
| ncsc-2026-0022 | Kwetsbaarheden verholpen in Oracle Communications producten | 2026-01-21T09:25:39.876330Z | 2026-01-21T09:25:39.876330Z |
| ncsc-2026-0021 | Kwetsbaarheden verholpen in Oracle Database Server producten | 2026-01-21T09:19:00.000449Z | 2026-01-21T09:19:00.000449Z |
| ncsc-2026-0020 | Kwetsbaarheden verholpen in Oracle Commerce | 2026-01-21T09:18:16.268788Z | 2026-01-21T09:18:16.268788Z |
| ncsc-2026-0019 | Kwetsbaarheid verholpen in Fortinet FortiSIEM | 2026-01-16T13:34:34.467426Z | 2026-01-16T13:34:34.467426Z |
| ncsc-2026-0018 | Kwetsbaarheden verholpen in TYPO3 CMS | 2026-01-16T10:11:37.524826Z | 2026-01-16T10:11:37.524826Z |
| ncsc-2026-0017 | Kwetsbaarheden verholpen in Juniper Networks JunOS | 2026-01-16T10:07:39.310560Z | 2026-01-16T10:07:39.310560Z |
| ncsc-2026-0016 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS | 2026-01-16T09:44:20.575860Z | 2026-01-16T09:44:20.575860Z |
| ncsc-2026-0015 | Kwetsbaarheid verholpen in Fortinet FortiOS | 2026-01-15T12:31:57.265723Z | 2026-01-15T12:31:57.265723Z |
| ncsc-2026-0014 | Kwetsbaarheden verholpen in Adobe Illustrator | 2026-01-15T12:16:05.427141Z | 2026-01-15T12:16:05.427141Z |
| ncsc-2026-0013 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2026-01-14T13:45:48.530782Z | 2026-01-14T13:45:48.530782Z |
| ncsc-2026-0012 | Kwetsbaarheden verholpen in Adobe Dreamweaver Desktop | 2026-01-14T13:41:56.261778Z | 2026-01-14T13:41:56.261778Z |
| ncsc-2026-0011 | Kwetsbaarheid verholpen in Microsoft Developer Tools | 2026-01-13T19:19:27.690900Z | 2026-01-13T19:19:27.690900Z |
| ncsc-2026-0010 | Kwetsbaarheden verholpen in Microsoft Office | 2026-01-13T19:18:45.984019Z | 2026-01-13T19:18:45.984019Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2019:2-01 | CSV Injection on node label | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019:1-01 | Stored XSS in field name data model | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10259-1 | chromedriver-145.0.7632.116-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10258-1 | busybox-1.37.0-10.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10257-1 | MozillaFirefox-148.0-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10247-1 | python311-Django4-4.2.28-1.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:10246-1 | libsoup-2_4-1-2.74.3-17.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:10245-1 | libsoup-3_0-0-3.6.6-1.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:10244-1 | libsignal-protocol-c-devel-2.3.3-2.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:10243-1 | freerdp2-2.11.7-5.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:10242-1 | firefox-esr-140.8.0-1.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:10241-1 | cacti-1.2.30+git231.bca15e70c-1.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:20261-1 | Security update for openQA, os-autoinst, openQA-devel-container | 2026-02-23T19:35:27Z | 2026-02-23T19:35:27Z |
| opensuse-su-2026:20260-1 | Security update for mosquitto | 2026-02-23T18:17:43Z | 2026-02-23T18:17:43Z |
| opensuse-su-2026:10240-1 | weblate-5.16-1.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10239-1 | warewulf4-4.6.5-2.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10238-1 | python311-PyPDF2-2.11.1-4.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10237-1 | libopenssl-3-devel-3.5.3-2.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10236-1 | heroic-games-launcher-2.20.0-1.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10235-1 | cosign-3.0.5-1.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:20258-1 | Security update for chromium | 2026-02-21T02:15:40Z | 2026-02-21T02:15:40Z |
| opensuse-su-2026:10234-1 | chromedriver-145.0.7632.109-1.1 on GA media | 2026-02-21T00:00:00Z | 2026-02-21T00:00:00Z |
| opensuse-su-2026:10233-1 | kyverno-1.17.1-1.1 on GA media | 2026-02-20T00:00:00Z | 2026-02-20T00:00:00Z |
| opensuse-su-2026:10232-1 | cosign-3.0.4-2.1 on GA media | 2026-02-20T00:00:00Z | 2026-02-20T00:00:00Z |
| opensuse-su-2026:10231-1 | busybox-1.37.0-9.1 on GA media | 2026-02-20T00:00:00Z | 2026-02-20T00:00:00Z |
| opensuse-su-2026:20257-1 | Security update for python-Authlib | 2026-02-19T13:21:50Z | 2026-02-19T13:21:50Z |
| opensuse-su-2026:20253-1 | Security update for MozillaFirefox | 2026-02-19T11:09:58Z | 2026-02-19T11:09:58Z |
| opensuse-su-2026:20254-1 | Security update for python313 | 2026-02-19T10:31:04Z | 2026-02-19T10:31:04Z |
| opensuse-su-2026:20248-1 | Security update for chromium | 2026-02-19T02:43:57Z | 2026-02-19T02:43:57Z |
| opensuse-su-2026:10230-1 | vexctl-0.4.1+git78.f951e3a-1.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| opensuse-su-2026:10229-1 | ucode-intel-20260210-1.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| opensuse-su-2026:10228-1 | syft-1.42.1-1.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:4215 | Red Hat Security Advisory: Red Hat Quay 3.14.6 | 2026-03-10T15:34:38+00:00 | 2026-03-16T12:44:05+00:00 |
| rhsa-2026:4211 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-10T22:25:59+00:00 | 2026-03-16T12:44:04+00:00 |
| rhsa-2026:4185 | Red Hat Security Advisory: Red Hat Quay 3.13.11 | 2026-03-10T13:57:02+00:00 | 2026-03-16T12:44:04+00:00 |
| rhsa-2026:4174 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-03-10T12:12:43+00:00 | 2026-03-16T12:44:03+00:00 |
| rhsa-2026:4170 | Red Hat Security Advisory: Red Hat OpenShift API for Data Protection | 2026-03-10T10:02:11+00:00 | 2026-03-16T12:44:02+00:00 |
| rhsa-2026:4166 | Red Hat Security Advisory: git-lfs security update | 2026-03-10T09:26:33+00:00 | 2026-03-16T12:44:02+00:00 |
| rhsa-2026:4164 | Red Hat Security Advisory: git-lfs security update | 2026-03-10T09:29:17+00:00 | 2026-03-16T12:44:02+00:00 |
| rhsa-2026:3985 | Red Hat Security Advisory: git-lfs security update | 2026-03-09T02:13:04+00:00 | 2026-03-16T12:44:01+00:00 |
| rhsa-2026:3977 | Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update | 2026-03-09T01:52:37+00:00 | 2026-03-16T12:44:01+00:00 |
| rhsa-2026:3974 | Red Hat Security Advisory: git-lfs security update | 2026-03-09T01:51:17+00:00 | 2026-03-16T12:44:00+00:00 |
| rhsa-2026:3973 | Red Hat Security Advisory: git-lfs security update | 2026-03-09T01:30:22+00:00 | 2026-03-16T12:43:59+00:00 |
| rhsa-2026:3972 | Red Hat Security Advisory: git-lfs security update | 2026-03-09T01:55:26+00:00 | 2026-03-16T12:43:59+00:00 |
| rhsa-2026:3931 | Red Hat Security Advisory: git-lfs security update | 2026-03-05T16:12:11+00:00 | 2026-03-16T12:43:59+00:00 |
| rhsa-2026:3971 | Red Hat Security Advisory: rhc-worker-playbook security update | 2026-03-09T01:33:17+00:00 | 2026-03-16T12:43:58+00:00 |
| rhsa-2026:3970 | Red Hat Security Advisory: rhc-worker-playbook security update | 2026-03-09T01:29:32+00:00 | 2026-03-16T12:43:57+00:00 |
| rhsa-2026:3960 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2026-03-06T11:24:38+00:00 | 2026-03-16T12:43:57+00:00 |
| rhsa-2026:3959 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2026-03-06T16:36:31+00:00 | 2026-03-16T12:43:56+00:00 |
| rhsa-2026:3958 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Product Security and Bug Fix Update | 2026-03-06T11:00:27+00:00 | 2026-03-16T12:43:56+00:00 |
| rhsa-2026:3932 | Red Hat Security Advisory: git-lfs security update | 2026-03-05T16:08:17+00:00 | 2026-03-16T12:43:56+00:00 |
| rhsa-2026:3930 | Red Hat Security Advisory: git-lfs security update | 2026-03-05T17:14:14+00:00 | 2026-03-16T12:43:55+00:00 |
| rhsa-2026:3929 | Red Hat Security Advisory: git-lfs security update | 2026-03-05T17:28:44+00:00 | 2026-03-16T12:43:55+00:00 |
| rhsa-2026:3928 | Red Hat Security Advisory: git-lfs security update | 2026-03-05T16:42:20+00:00 | 2026-03-16T12:43:54+00:00 |
| rhsa-2026:3906 | Red Hat Security Advisory: OpenShift Container Platform 4.18.35 security and extras update | 2026-03-11T03:54:55+00:00 | 2026-03-16T12:43:54+00:00 |
| rhsa-2026:3905 | Red Hat Security Advisory: OpenShift Container Platform 4.18.35 bug fix and security update | 2026-03-11T04:27:58+00:00 | 2026-03-16T12:43:54+00:00 |
| rhsa-2026:3855 | Red Hat Security Advisory: OpenShift Container Platform 4.20.16 bug fix and security update | 2026-03-11T04:54:31+00:00 | 2026-03-16T12:43:54+00:00 |
| rhsa-2026:3898 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-05T14:35:19+00:00 | 2026-03-16T12:43:53+00:00 |
| rhsa-2026:3884 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.19.2 security update | 2026-03-05T12:07:11+00:00 | 2026-03-16T12:43:53+00:00 |
| rhsa-2026:3880 | Red Hat Security Advisory: grafana security update | 2026-03-05T12:20:43+00:00 | 2026-03-16T12:43:52+00:00 |
| rhsa-2026:3879 | Red Hat Security Advisory: grafana security update | 2026-03-05T12:15:12+00:00 | 2026-03-16T12:43:52+00:00 |
| rhsa-2026:3841 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:37:53+00:00 | 2026-03-16T12:43:52+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2025-042-04 | Enerlin'X IFE and eIFE | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-042-03 | EcoStruxure™ Process Expert, EcoStruxure™ Process Expert for AVEVA System Platform | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-042-01 | ASCO 5310 / 5350 Remote Annunciator | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2019-134-11 | Modicon Controllers | 2019-05-14T08:31:22.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-014-08 | Power Logic HDPM6000 High-Density Metering System | 2025-01-14T00:00:00.000Z | 2025-01-14T00:00:00.000Z |
| sevd-2025-014-04 | Web Designer for Modicon Communication Modules | 2025-01-14T00:00:00.000Z | 2025-01-14T00:00:00.000Z |
| sevd-2024-345-02 | Harmony HMI and Pro-face HMI products | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| sevd-2024-345-01 | PowerChute Serial Shutdown | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| sevd-2024-317-04 | EcoStruxure™ IT Gateway | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-317-02 | Modicon Controllers M340 / Momentum / MC80 | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-317-01 | PowerLogic PM5300 Series | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2021-159-02 | PowerLogic PM5500 and PowerLogic PM8ECC | 2021-06-08T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-282-08 | EcoStruxure EV Charging Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-07 | System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-06 | Zelio Soft 2 | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-04 | EVlink Home Smart and Schneider Charge | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-03 | Easergy Studio | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-02 | Harmony iPC – HMIBSC IIoT Edge Box Core | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-01 | Data Center Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2022-102-02 | Modicon M340 Controller and Communication Modules | 2022-04-12T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-254-02 | EcoStruxure™ Power Monitoring Expert and EcoStruxure™ Power Operation or EcoStruxure™ Power SCADA Operation with Advanced Reporting and Dashboards | 2024-09-10T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2024-163-02 | PowerLogic P5 | 2024-06-11T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2023-073-01 | EcoStruxure™ Power Monitoring Expert | 2023-03-14T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2023-192-02 | EcoStruxure™ OPC UA Server Expert | 2023-07-11T07:01:56.000Z | 2024-08-13T07:00:00.000Z |
| sevd-2024-226-02 | EcoStruxure™ Machine SCADA Expert / BLUE Open Studio | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2024-226-01 | Accutech Manager | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-101-05 | Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-04-11T09:46:26.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-06 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon M340, M580 and M580 CPU Safety | 2023-01-10T15:17:09.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-05 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-01-10T15:41:57.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-04 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2022-0002 | PwnKit vulnerability affects multiple SICK IPCs | 2022-02-23T16:00:00.000Z | 2022-02-23T16:00:00.000Z |
| sca-2022-0001 | Vulnerability in SICK FieldEcho | 2022-02-17T16:00:00.000Z | 2022-02-17T16:00:00.000Z |
| sca-2021-0003 | SICK Security Advisory for Apache Log4j (CVE-2021-44228) | 2021-12-14T17:00:00.000Z | 2021-12-17T12:00:00.000Z |
| sca-2021-0004 | Vulnerabilities in SICK SOPAS ET | 2021-12-16T08:00:00.000Z | 2021-12-17T08:00:00.000Z |
| sca-2021-0002 | MEAC affected by Windows SMBv1 vulnerability | 2021-08-04T10:00:00.000Z | 2021-08-04T10:00:00.000Z |
| sca-2021-0001 | Inadequate SSH configuration in SICK Visionary-S CX | 2021-06-25T10:00:00.000Z | 2021-06-25T10:00:00.000Z |
| sca-2020-0005 | Package Analytics affected by Windows TCP/IP vulnerability | 2020-10-29T11:00:00.000Z | 2020-10-29T11:00:00.000Z |
| sca-2020-0004 | Vulnerability in Platform Mechanism AutoIP | 2020-08-31T10:00:00.000Z | 2020-08-31T10:00:00.000Z |
| sca-2020-0003 | MEAC affected by Windows SMBv3 vulnerability | 2020-08-07T10:00:00.000Z | 2020-08-07T10:00:00.000Z |
| sca-2020-0002 | Vulnerabilities in SICK Package Analytics | 2020-08-07T10:00:00.000Z | 2020-07-28T10:00:00.000Z |
| sca-2020-0001 | Security Information Regarding "Profile Programming" | 2020-05-31T10:00:00.000Z | 2020-05-31T10:00:00.000Z |
| sca-2019-0002 | Vulnerability in SICK FX0-GENT00000 and SICK FX0-GPNT00000 | 2019-09-20T10:00:00.000Z | 2019-09-20T10:00:00.000Z |
| sca-2019-0001 | MSC800 affected by hard-coded credentials vulnerability | 2019-06-21T10:00:00.000Z | 2019-06-21T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-408105 | SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products | 2022-12-13T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-392859 | SSA-392859: Local Arbitrary Code Execution Vulnerability in Siemens Engineering Platforms before V20 | 2024-12-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-356310 | SSA-356310: Multiple Vulnerabilities in Gridscale X Prepay | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-202008 | SSA-202008: Multiple Vulnerabilities in Ruggedcom Rox Before V2.17.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-241605 | SSA-241605: Out of Bounds Read in PS/IGES Parasolid Translator Component Before V29.0.258 | 2025-11-17T00:00:00Z | 2025-11-17T00:00:00Z |
| ssa-190588 | SSA-190588: Cross-Site Scripting Vulnerability in Mendix Rich Text Widget | 2025-11-17T00:00:00Z | 2025-11-17T00:00:00Z |
| ssa-794185 | SSA-794185: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SIPROTEC, SICAM and Related Products | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-750499 | SSA-750499: Weak Encryption Vulnerability in SIPROTEC 5 Devices | 2024-07-09T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-726617 | SSA-726617: Incorrect Privilege Assignment Vulnerability in Mendix OIDC SSO Module | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-711309 | SSA-711309: Denial of Service Vulnerability in the OPC UA Implementations of SIMATIC Products | 2023-09-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-687955 | SSA-687955: Accessible Development Shell via Physical Interface in SIPROTEC 5 | 2025-02-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-682326 | SSA-682326: Multiple Vulnerabilities in COMOS before V10.4.5 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-631336 | SSA-631336: Multiple Web Server Vulnerabilities in SICAM GridEdge Before V2.6.6 | 2022-06-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-552874 | SSA-552874: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2022-12-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-522291 | SSA-522291: Improper Certificate Validation Vulnerability in Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-514895 | SSA-514895: Multiple Vulnerabilities in Altair Grid Engine V2025.1.0 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-365596 | SSA-365596: DLL Hijacking Vulnerability in Siemens Software Center and Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-339694 | SSA-339694: Multiple Vulnerabilities in Spectrum Power 4 Before v4.70 SP12 Security Patch 2 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-322980 | SSA-322980: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2023-04-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-301229 | SSA-301229: Client-Side Enforcement of Server-Side Security Vulnerabilities in RUGGEDCOM ROX II | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-267056 | SSA-267056: Multiple Vulnerabilities in LOGO! 8 BM Devices | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-225578 | SSA-225578: Improper Access Control Vulnerability in SICAM GridEdge Before V2.7.3 | 2022-07-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-201498 | SSA-201498: Multiple Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices Before V3.11 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-194557 | SSA-194557: Improper Limitation of Filesystem Access through Web Server Vulnerability in SIPROTEC 5 | 2025-01-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-876787 | SSA-876787: Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-722410 | SSA-722410: Multiple Vulnerabilities in User Management Component (UMC) | 2025-09-09T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-625789 | SSA-625789: Multiple Vulnerabilities in SIMATIC S7-1200 CPU V1/V2 Devices | 2011-06-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-614723 | SSA-614723: Denial of Service Vulnerabilities in User Management Component (UMC) | 2025-05-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-541582 | SSA-541582: Multiple File Parsing Vulnerabilities in Solid Edge | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-486936 | SSA-486936: Authentication Vulnerability in SIMATIC ET 200SP Communication Processors | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0768-1 | Security update for postgresql14 | 2026-03-03T13:10:00Z | 2026-03-03T13:10:00Z |
| suse-su-2026:0767-1 | Security update for python311 | 2026-03-03T13:05:43Z | 2026-03-03T13:05:43Z |
| suse-su-2026:0766-1 | Security update for gnome-remote-desktop | 2026-03-03T13:02:47Z | 2026-03-03T13:02:47Z |
| suse-su-2026:0765-1 | Security update for smc-tools | 2026-03-03T12:59:51Z | 2026-03-03T12:59:51Z |
| suse-su-2026:0763-1 | Security update for freerdp | 2026-03-03T12:49:14Z | 2026-03-03T12:49:14Z |
| suse-su-2026:0748-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-03-02T12:04:07Z | 2026-03-02T12:04:07Z |
| suse-su-2026:0745-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6) | 2026-03-02T09:34:17Z | 2026-03-02T09:34:17Z |
| suse-su-2026:0741-1 | Security update for shim | 2026-03-02T08:11:15Z | 2026-03-02T08:11:15Z |
| suse-su-2026:0740-1 | Security update for mozilla-nss | 2026-03-02T08:10:37Z | 2026-03-02T08:10:37Z |
| suse-su-2026:0736-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 2026-03-02T07:04:29Z | 2026-03-02T07:04:29Z |
| suse-su-2026:0734-1 | Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5) | 2026-03-01T19:33:48Z | 2026-03-01T19:33:48Z |
| suse-su-2026:0731-1 | Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) | 2026-03-01T16:35:28Z | 2026-03-01T16:35:28Z |
| suse-su-2026:0694-1 | Security update for gpg2 | 2026-02-27T15:14:36Z | 2026-02-27T15:14:36Z |
| suse-su-2026:0693-1 | Security update for python311 | 2026-02-27T15:14:09Z | 2026-02-27T15:14:09Z |
| suse-su-2026:0692-1 | Security update for MozillaThunderbird | 2026-02-27T15:12:00Z | 2026-02-27T15:12:00Z |
| suse-su-2026:0690-1 | Security update for libsoup | 2026-02-27T15:11:03Z | 2026-02-27T15:11:03Z |
| suse-su-2026:0689-1 | Security update for libsoup | 2026-02-27T15:10:48Z | 2026-02-27T15:10:48Z |
| suse-su-2026:0688-1 | Security update for the Linux Kernel | 2026-02-27T15:09:04Z | 2026-02-27T15:09:04Z |
| suse-su-2026:0687-1 | Security update for go1 | 2026-02-27T15:08:16Z | 2026-02-27T15:08:16Z |
| suse-su-2026:0670-1 | Security update for ucode-intel | 2026-02-26T15:21:41Z | 2026-02-26T15:21:41Z |
| suse-su-2026:0669-1 | Security update for ucode-intel | 2026-02-26T15:21:31Z | 2026-02-26T15:21:31Z |
| suse-su-2026:0668-1 | Security update for ucode-intel | 2026-02-26T15:21:13Z | 2026-02-26T15:21:13Z |
| suse-su-2026:0667-1 | Security update for redis7 | 2026-02-26T15:19:55Z | 2026-02-26T15:19:55Z |
| suse-su-2026:0666-1 | Security update for docker | 2026-02-26T15:17:25Z | 2026-02-26T15:17:25Z |
| suse-su-2026:0665-1 | Security update for frr | 2026-02-26T15:16:24Z | 2026-02-26T15:16:24Z |
| suse-su-2026:0664-1 | Security update for python3 | 2026-02-26T15:15:20Z | 2026-02-26T15:15:20Z |
| suse-su-2026:0663-1 | Security update for python | 2026-02-26T15:13:11Z | 2026-02-26T15:13:11Z |
| suse-su-2026:0662-1 | Security update for qemu | 2026-02-26T15:12:26Z | 2026-02-26T15:12:26Z |
| suse-su-2026:0661-1 | Security update for erlang | 2026-02-26T15:10:09Z | 2026-02-26T15:10:09Z |
| suse-su-2026:0659-1 | Security update for docker-stable | 2026-02-26T15:08:37Z | 2026-02-26T15:08:37Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:3477 | Moderate: gnutls security update | 2026-03-02T00:00:00Z | 2026-03-02T13:35:48Z |
| alsa-2026:3405 | Important: libpng security update | 2026-02-26T00:00:00Z | 2026-03-02T13:11:42Z |
| alsa-2026:3275 | Moderate: kernel security update | 2026-02-25T00:00:00Z | 2026-03-02T13:07:09Z |
| alsa-2026:3341 | Important: containernetworking-plugins security update | 2026-02-25T00:00:00Z | 2026-03-02T12:59:54Z |
| alsa-2026:3340 | Important: skopeo security update | 2026-02-25T00:00:00Z | 2026-03-02T12:57:45Z |
| alsa-2026:3338 | Important: firefox security update | 2026-02-25T00:00:00Z | 2026-03-02T12:54:29Z |
| alsa-2026:3336 | Important: podman security update | 2026-02-25T00:00:00Z | 2026-02-26T13:31:46Z |
| alsa-2026:3343 | Important: skopeo security update | 2026-02-25T00:00:00Z | 2026-02-26T13:30:14Z |
| alsa-2026:3354 | Important: python-pyasn1 security update | 2026-02-25T00:00:00Z | 2026-02-26T13:28:33Z |
| alsa-2026:3031 | Important: libpng15 security update | 2026-02-23T00:00:00Z | 2026-02-26T10:52:26Z |
| alsa-2026:3033 | Important: munge security update | 2026-02-23T00:00:00Z | 2026-02-26T10:51:19Z |
| alsa-2026:3034 | Important: munge security update | 2026-02-23T00:00:00Z | 2026-02-26T10:49:31Z |
| alsa-2026:3035 | Important: grafana-pcp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:48:18Z |
| alsa-2026:3066 | Moderate: kernel security update | 2026-02-23T00:00:00Z | 2026-02-26T10:43:00Z |
| alsa-2026:3067 | Important: freerdp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:36:11Z |
| alsa-2026:3068 | Important: freerdp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:34:44Z |
| alsa-2026:3092 | Important: golang-github-openprinting-ipp-usb security update | 2026-02-23T00:00:00Z | 2026-02-26T10:33:21Z |
| alsa-2026:3189 | Moderate: 389-ds-base security update | 2026-02-24T00:00:00Z | 2026-02-26T10:31:32Z |
| alsa-2026:3208 | Moderate: 389-ds-base security update | 2026-02-24T00:00:00Z | 2026-02-26T10:30:07Z |
| alsa-2026:3291 | Important: runc security update | 2026-02-25T00:00:00Z | 2026-02-26T10:27:56Z |
| alsa-2026:3297 | Important: buildah security update | 2026-02-25T00:00:00Z | 2026-02-26T10:26:55Z |
| alsa-2026:3298 | Important: buildah security update | 2026-02-25T00:00:00Z | 2026-02-26T10:25:19Z |
| alsa-2026:3337 | Important: podman security update | 2026-02-25T00:00:00Z | 2026-02-26T10:23:45Z |
| alsa-2026:3339 | Important: firefox security update | 2026-02-25T00:00:00Z | 2026-02-26T10:21:52Z |
| alsa-2026:3359 | Important: python-pyasn1 security update | 2026-02-25T00:00:00Z | 2026-02-26T10:19:52Z |
| alsa-2026:3361 | Important: firefox security update | 2026-02-25T00:00:00Z | 2026-02-26T10:18:27Z |
| alsa-2026:3334 | Important: freerdp security update | 2026-02-25T00:00:00Z | 2026-02-26T09:39:13Z |
| alsa-2026:3187 | Important: grafana-pcp security update | 2026-02-24T00:00:00Z | 2026-02-24T17:14:01Z |
| alsa-2026:3188 | Important: grafana security update | 2026-02-24T00:00:00Z | 2026-02-24T17:11:47Z |
| alsa-2026:3110 | Important: kernel-rt security update | 2026-02-23T00:00:00Z | 2026-02-24T13:03:08Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-94 | Heap-buffer-overflow in cli_strlcat | 2022-01-27T00:02:12.465969Z | 2026-03-05T14:29:46.831320Z |
| osv-2022-636 | UNKNOWN READ in fp_cmp_mag | 2022-07-27T00:00:35.300337Z | 2026-03-05T14:28:12.890689Z |
| osv-2022-1068 | UNKNOWN READ in fp_cmp_mag | 2022-10-21T00:00:11.246872Z | 2026-03-05T14:25:24.236211Z |
| osv-2024-664 | Heap-buffer-overflow in gf_dash_group_get_template | 2024-07-18T00:13:55.576218Z | 2026-03-04T14:23:21.913306Z |
| osv-2024-659 | Index-out-of-bounds in gf_vvc_parse_nalu_bs | 2024-07-18T00:01:18.765548Z | 2026-03-04T14:23:09.585855Z |
| osv-2024-695 | Stack-buffer-overflow in gf_vvc_parse_nalu_bs | 2024-07-31T00:02:35.217594Z | 2026-03-04T14:22:49.364730Z |
| osv-2024-698 | Heap-use-after-free in xmlCharEncCloseFunc | 2024-07-31T00:12:19.254629Z | 2026-03-04T14:22:14.763970Z |
| osv-2023-1350 | Heap-buffer-overflow in inflate | 2023-12-23T00:12:38.562149Z | 2026-03-04T14:13:52.120050Z |
| osv-2021-777 | Heap-use-after-free in xmlAddNextSibling | 2021-05-20T00:00:30.166614Z | 2026-03-04T14:12:36.851074Z |
| osv-2025-312 | Heap-buffer-overflow in ZSTD_decompressMultiFrame | 2025-05-02T00:14:14.459388Z | 2026-03-03T14:26:14.816532Z |
| osv-2023-606 | Heap-buffer-overflow in ZSTD_decompressMultiFrame | 2023-07-23T14:01:02.159160Z | 2026-03-03T14:18:12.718458Z |
| osv-2023-319 | Heap-buffer-overflow in ZSTD_decompressSequencesLong_bmi2 | 2023-04-16T14:01:58.406534Z | 2026-03-03T14:17:58.673389Z |
| osv-2022-776 | Heap-buffer-overflow in do_job | 2022-08-24T00:00:48.440951Z | 2026-03-03T14:17:50.181134Z |
| osv-2021-1070 | Heap-buffer-overflow in ZSTD_decompressBlock_internal | 2021-07-29T00:01:10.187569Z | 2026-03-03T14:15:27.702500Z |
| osv-2022-1134 | Heap-buffer-overflow in ndlz8_decompress | 2022-11-04T00:02:11.463429Z | 2026-03-03T14:14:17.616154Z |
| osv-2021-1672 | Heap-buffer-overflow in blosc_d | 2021-12-12T00:01:29.747137Z | 2026-03-03T14:13:35.558310Z |
| osv-2026-338 | Use-of-uninitialized-value in pjsip_auth_clt_init_req | 2026-03-03T00:09:55.520965Z | 2026-03-03T00:09:55.521245Z |
| osv-2024-641 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-07-14T00:06:37.034414Z | 2026-03-01T14:16:13.241262Z |
| osv-2024-400 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-05-02T00:03:16.309384Z | 2026-03-01T14:15:59.583852Z |
| osv-2024-696 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-07-31T00:03:10.056663Z | 2026-03-01T14:15:15.222358Z |
| osv-2024-340 | Heap-buffer-overflow in Exiv2::AsfVideo::GUIDTag::GUIDTag | 2024-04-30T00:01:53.406015Z | 2026-03-01T14:15:15.992512Z |
| osv-2024-278 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-04-19T00:12:11.684954Z | 2026-03-01T14:13:49.086499Z |
| osv-2025-202 | UNKNOWN READ in _blit_xrgb32_lerp_spans | 2025-03-15T00:01:51.127135Z | 2026-02-28T14:17:08.171734Z |
| osv-2022-834 | Heap-use-after-free in mk_event_timeout_destroy | 2022-09-04T00:00:31.605787Z | 2026-02-28T14:10:15.177444Z |
| osv-2022-1277 | Heap-use-after-free in mk_event_timeout_destroy | 2023-06-26T14:01:01.876870Z | 2026-02-28T14:08:00.377917Z |
| osv-2022-675 | Heap-buffer-overflow in void RDKit::ParseV3000AtomProps<std::__1::vector<std::__1::basic_string_view<cha | 2022-08-06T00:00:51.363676Z | 2026-02-27T14:21:58.571249Z |
| osv-2022-1288 | Stack-buffer-overflow in bool SmilesParseOps::parser::parse_atom_props<std::__1::__wrap_iter<char const*> | 2024-11-04T00:16:22.516312Z | 2026-02-27T14:20:35.360845Z |
| osv-2025-253 | Security exception in org.apache.lucene.analysis.ckb.SoraniNormalizer.normalize | 2025-04-03T00:17:24.000398Z | 2026-02-26T15:05:21.477837Z |
| osv-2022-867 | Heap-buffer-overflow in get_utf_8_string | 2022-09-09T00:01:54.157712Z | 2026-02-26T15:03:06.284832Z |
| osv-2024-1254 | Security exception in org.apache.lucene.util.ArrayUtil.growExact | 2024-11-01T00:07:39.301298Z | 2026-02-26T14:30:06.734190Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2023-0096 | Plaintext exposed in decrypt_in_place_detached even on tag verification failure | 2023-11-22T12:00:00Z | 2025-12-29T13:49:34Z |
| rustsec-2025-0138 | --allow-read / --allow-write permission bypass in `node:sqlite` | 2025-06-03T12:00:00Z | 2025-12-29T10:04:21Z |
| rustsec-2025-0137 | Unsoundness of safe `reciprocal_mg10` | 2025-12-22T12:00:00Z | 2025-12-28T09:42:26Z |
| rustsec-2024-0447 | Panics on Malformed Untrusted Input | 2024-12-05T12:00:00Z | 2025-12-24T14:48:25Z |
| rustsec-2023-0095 | Invalid Slice Split Results in Server Panic | 2023-08-03T12:00:00Z | 2025-12-22T18:53:25Z |
| rustsec-2024-0446 | Shell expansion in custom commands | 2024-07-26T12:00:00Z | 2025-12-22T13:54:49Z |
| rustsec-2022-0103 | Incorrect signature verification on gzip-compressed install images | 2022-03-04T12:00:00Z | 2025-12-21T13:45:28Z |
| rustsec-2024-0445 | cap-primitives doesn't fully sandbox all the Windows device filenames | 2024-11-05T12:00:00Z | 2025-12-19T21:01:24Z |
| rustsec-2024-0444 | Uncaught exception when transitioning the state of `AsyncGenerator` objects from within a property getter of `then` | 2024-08-14T12:00:00Z | 2025-12-19T06:15:15Z |
| rustsec-2022-0042 | malicious crate `rustdecimal` | 2022-05-10T12:00:00Z | 2025-12-17T17:06:41Z |
| rustsec-2021-0082 | vec-const attempts to construct a Vec from a pointer to a const slice | 2021-08-14T12:00:00Z | 2025-12-17T17:06:41Z |
| rustsec-2025-0136 | Underflow in aes_key_unwrap function | 2025-11-07T12:00:00Z | 2025-12-17T06:01:32Z |
| rustsec-2025-0135 | matrix-sdk-base: Denial of service due to custom `m.room.join_rules` events | 2025-12-08T12:00:00Z | 2025-12-08T12:23:54Z |
| rustsec-2025-0133 | Incorrect calculation on aarch64 | 2025-12-04T12:00:00Z | 2025-12-06T07:36:56Z |
| rustsec-2025-0134 | rustls-pemfile is unmaintained | 2025-11-28T12:00:00Z | 2025-12-05T19:07:24Z |
| rustsec-2025-0132 | `Reader::open_mmap` unsoundly marks unsafe memmap operation as safe | 2025-11-28T12:00:00Z | 2025-12-02T06:03:09Z |
| rustsec-2025-0131 | Lack of sufficient checks in public API | 2025-10-31T12:00:00Z | 2025-12-02T06:03:09Z |
| rustsec-2025-0120 | json5 crate is unmaintained | 2025-11-16T12:00:00Z | 2025-11-30T00:15:16Z |
| rustsec-2025-0126 | Heap-buffer-overflow in nftnl::Batch::with_page_size (nftnl-rs) | 2025-10-18T12:00:00Z | 2025-11-27T21:53:33Z |
| rustsec-2025-0130 | Missing check in ZK proof in CGGMP21 Threshold Signing Protocol | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0129 | Missing check in ZK proof in CGGMP21 Threshold Signing Protocol | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0128 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0127 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0125 | Resource Exhaustion (Memory and Handle Leaks) on Windows and macOS | 2025-11-22T12:00:00Z | 2025-11-22T12:29:36Z |
| rustsec-2025-0124 | rand_os crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-19T20:48:42Z |
| rustsec-2025-0123 | opentelemetry-jaeger crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T12:07:07Z |
| rustsec-2025-0122 | cargo-asm crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T09:02:31Z |
| rustsec-2025-0121 | gcc crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:52:10Z |
| rustsec-2025-0119 | number_prefix crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:13:56Z |
| rustsec-2025-0118 | Unsound API access to a WebAssembly shared linear memory | 2025-11-11T12:00:00Z | 2025-11-13T16:55:40Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-parse-2026-30835 | Parse Server: Malformed `$regex` query leaks database error details in API response | 2026-03-11T15:48:54.398Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30229 | Parse Server: Endpoint `/loginAs` allows `readOnlyMasterKey` to gain full read and write access as any user | 2026-03-11T15:48:51.922Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30228 | Parse Server: File creation and deletion bypasses `readOnlyMasterKey` write restriction | 2026-03-11T15:48:49.330Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-29182 | Parse Server: Cloud Hooks and Cloud Jobs bypass `readOnlyMasterKey` write restriction | 2026-03-11T15:48:46.637Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-27804 | Parse Server: Account takeover via JWT algorithm confusion in Google auth adapter | 2026-03-02T11:46:50.810Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2024-29027 | Parse Server crash and RCE via invalid Cloud Function or Cloud Job name | 2024-03-21T07:25:25.649Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2024-27298 | Parse Server literalizeRegexPart SQL Injection | 2024-03-31T18:25:01.637Z | 2026-03-11T18:56:50.865Z |
| bit-zookeeper-2026-24308 | Apache ZooKeeper: Sensitive information disclosure in client configuration handling | 2026-03-10T08:52:17.946Z | 2026-03-11T09:11:40.352Z |
| bit-zookeeper-2026-24281 | Apache ZooKeeper: Reverse-DNS fallback enables hostname verification bypass in ZooKeeper ZKTrustManager | 2026-03-10T08:52:16.699Z | 2026-03-11T09:11:40.352Z |
| bit-golang-2026-27142 | URLs in meta content attribute actions are not escaped in html/template | 2026-03-10T08:44:16.859Z | 2026-03-11T09:11:40.352Z |
| bit-golang-2026-27138 | Panic in name constraint checking for malformed certificates in crypto/x509 | 2026-03-10T08:44:12.992Z | 2026-03-11T09:11:40.352Z |
| bit-golang-2026-27137 | Incorrect enforcement of email constraints in crypto/x509 | 2026-03-10T08:44:11.145Z | 2026-03-11T09:11:40.352Z |
| bit-golang-2026-25679 | Incorrect parsing of IPv6 host literals in net/url | 2026-03-10T08:44:09.300Z | 2026-03-11T09:11:40.352Z |
| bit-airflow-2026-24098 | Apache Airflow: Assigning single DAG permission leaked all DAGs Import Errors | 2026-02-12T08:39:03.920Z | 2026-03-11T09:11:40.352Z |
| bit-maven-2021-26291 | block repositories using http by default | 2026-03-10T08:44:08.742Z | 2026-03-10T09:11:39.609Z |
| bit-mariadb-2026-3494 | MariaDB Server Audit Plugin Comment Handling Bypass | 2026-03-10T08:46:18.025Z | 2026-03-10T09:11:39.609Z |
| bit-golang-2026-27139 | FileInfo can escape from a Root in os | 2026-03-10T08:44:14.844Z | 2026-03-10T09:11:39.609Z |
| bit-ghost-2026-29784 | Ghost: Incomplete CSRF protections around OTC use | 2026-03-10T08:40:17.691Z | 2026-03-10T09:11:39.609Z |
| bit-ghost-2026-29053 | Ghost Vulnerable to Remote Code Execution via Malicious Themes | 2026-03-07T08:42:59.400Z | 2026-03-10T09:11:39.609Z |
| bit-ghost-2025-9862 | Ghost 6.0.6 - SSRF via oEmbed Bookmark | 2026-01-29T20:40:02.993Z | 2026-03-09T12:11:07.851Z |
| bit-python-2026-2297 | SourcelessFileLoader does not use io.open_code() | 2026-03-06T08:50:18.397Z | 2026-03-06T09:10:26.160Z |
| bit-moodle-2025-67847 | Moodle: moodle: remote code execution via insufficient restore input validation | 2026-03-06T08:50:20.446Z | 2026-03-06T09:10:26.160Z |
| bit-moodle-2021-47857 | Moodle 3.10.3 - 'label' Persistent Cross Site Scripting | 2026-03-06T08:46:28.845Z | 2026-03-06T09:10:26.160Z |
| bit-libpython-2026-2297 | SourcelessFileLoader does not use io.open_code() | 2026-03-06T08:43:26.501Z | 2026-03-06T09:10:26.160Z |
| bit-django-2026-25674 | Potential incorrect permissions on newly created file system objects | 2026-03-06T08:38:51.644Z | 2026-03-06T09:10:26.160Z |
| bit-django-2026-25673 | Potential denial-of-service vulnerability in URLField via Unicode normalization on Windows | 2026-03-06T08:38:49.880Z | 2026-03-06T09:10:26.160Z |
| bit-activemq-2025-66168 | Apache ActiveMQ, Apache ActiveMQ All Module, Apache ActiveMQ MQTT Module: MQTT control packet remaining length field is not properly validated | 2026-03-06T08:36:37.326Z | 2026-03-06T09:10:26.160Z |
| bit-python-2026-0865 | wsgiref.headers.Headers allows header newline injection | 2026-01-26T14:50:04.789Z | 2026-03-04T14:21:20.421Z |
| bit-python-2025-13837 | Out-of-memory when loading Plist | 2025-12-05T11:13:08.742Z | 2026-03-04T14:21:20.421Z |
| bit-python-2025-11468 | Folding email comments of unfoldable characters doesn't preserve parenthesis | 2026-01-26T14:49:32.088Z | 2026-03-04T14:21:20.421Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-pn58989 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-24T00:45:20.977848Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-lm41397 | node-tar is a full-featured Tar for Node | 2026-02-24T00:40:50.950958Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-io04548 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-24T00:44:50.498217Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-hw19594 | Within HostnameError | 2026-02-24T00:45:50.891263Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-cl79805 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 0.8.4-r0 | 2026-02-24T00:38:50.220255Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-yn08405 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 7.1.1-r7 | 2026-02-19T00:39:05.944714Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-oj16660 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-434x-w66g-qw3r, GHSA-r6v5-fh4h-64xc, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0 | 2026-02-19T00:39:07.225007Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-nn87556 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-434x-w66g-qw3r, GHSA-r6v5-fh4h-64xc, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.29.0-r0 | 2026-02-19T00:39:07.788394Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-ln12820 | vulnerability has been identified in Node | 2026-02-19T00:58:49.154512Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-kn34553 | vulnerability has been identified in Node | 2026-02-19T00:58:48.926519Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-kn30288 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-434x-w66g-qw3r, GHSA-r6v5-fh4h-64xc, GHSA-rhfx-m35p-ff5j, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0 | 2026-02-19T00:39:07.163109Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-zt77083 | When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers | 2026-02-18T00:40:43.959662Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-rs39538 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-18T00:37:41.553514Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-lr19699 | Within HostnameError | 2026-02-18T00:37:41.636616Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-dt95939 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-18T00:37:41.674179Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-at88149 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-18T00:37:41.548996Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-xv54160 | Within HostnameError | 2026-02-17T00:41:15.330012Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-vg57433 | Within HostnameError | 2026-02-17T00:39:45.599344Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-uh39784 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-17T00:40:45.017480Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-jr03360 | Within HostnameError | 2026-02-17T00:39:45.300172Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-gg58376 | Within HostnameError | 2026-02-17T00:41:15.939977Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-bs57244 | Within HostnameError | 2026-02-17T00:39:44.907078Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-pr84319 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-r6v5-fh4h-64xc, GHSA-rhfx-m35p-ff5j, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0 | 2026-02-14T00:37:23.085740Z | 2026-02-13T12:28:27Z |
| cleanstart-2026-kk07808 | issue has been found in third-party PNM decoding associated with libpng 1 | 2026-02-14T00:37:45.311656Z | 2026-02-13T12:28:27Z |
| cleanstart-2026-wv76464 | libexpat in Expat before 2 | 2026-02-13T00:43:45.311968Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-tr92727 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-13T00:41:14.875956Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-qi35149 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-13T00:39:44.259950Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-mh09144 | issue was discovered in libexpat before 2 | 2026-02-13T00:45:17.459930Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-jb30245 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 0.47.2-r0 | 2026-02-13T00:39:45.274258Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-gv85693 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-13T00:40:14.240914Z | 2026-02-12T13:07:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2024-ALE-002 | [MàJ] Multiples Vulnérabilités dans GitLab | 2024-01-12T00:00:00.000000 | 2024-02-22T00:00:00.000000 |
| certfr-2023-ale-013 | Vulnérabilité dans Apache Struts 2 | 2023-12-13T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-012 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-10-23T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-011 | [MàJ] Multiples vulnérabilités dans Cisco IOS XE | 2023-10-17T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-010 | Multiples vulnérabilités dans Exim | 2023-10-02T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-013 | Vulnérabilité dans Apache Struts 2 | 2023-12-13T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-012 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-10-23T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-011 | [MàJ] Multiples vulnérabilités dans Cisco IOS XE | 2023-10-17T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-010 | Multiples vulnérabilités dans Exim | 2023-10-02T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-008 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-07-19T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-007 | [MàJ] Vulnérabilité dans Zimbra Collaboration Suite | 2023-07-17T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| CERTFR-2023-ALE-008 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-07-19T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| CERTFR-2023-ALE-007 | [MàJ] Vulnérabilité dans Zimbra Collaboration Suite | 2023-07-17T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-006 | Vulnérabilité dans les produits Microsoft | 2023-12-12T00:00:00.000000 | 2023-07-12T00:00:00.000000 |
| CERTFR-2023-ALE-006 | Vulnérabilité dans les produits Microsoft | 2023-12-12T00:00:00.000000 | 2023-07-12T00:00:00.000000 |
| certfr-2023-ale-009 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2023-07-26T00:00:00.000000 | 2023-09-15T00:00:00.000000 |
| CERTFR-2023-ALE-009 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2023-07-26T00:00:00.000000 | 2023-09-15T00:00:00.000000 |
| certfr-2023-ale-005 | Synthèse sur l'exploitation d'une vulnérabilité dans MOVEit Transfer | 2023-07-05T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-004 | Vulnérabilité dans les produits Fortinet | 2023-06-13T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2022-ale-014 | Multiples vulnérabilités dans AMI MegaRAC | 2022-12-16T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2023-ALE-005 | Synthèse sur l'exploitation d'une vulnérabilité dans MOVEit Transfer | 2023-07-05T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2023-ALE-004 | Vulnérabilité dans les produits Fortinet | 2023-06-13T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2022-ALE-014 | Multiples vulnérabilités dans AMI MegaRAC | 2022-12-16T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-002 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2023-03-15T00:00:00.000000 | 2023-05-11T00:00:00.000000 |
| CERTFR-2023-ALE-002 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2023-03-15T00:00:00.000000 | 2023-05-11T00:00:00.000000 |
| certfr-2023-ale-003 | [MàJ] Compromission de l'application 3CX Desktop App | 2023-03-31T00:00:00.000000 | 2023-04-12T00:00:00.000000 |
| CERTFR-2023-ALE-003 | [MàJ] Compromission de l'application 3CX Desktop App | 2023-03-31T00:00:00.000000 | 2023-04-12T00:00:00.000000 |
| certfr-2023-ale-015 | [MàJ] Campagne d'exploitation d'une vulnérabilité affectant VMware ESXi | 2023-02-03T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2023-ale-001 | Vulnérabilité dans Fortinet FortiOS | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-013 | [MàJ] Vulnérabilité dans Citrix ADC et Gateway | 2022-12-13T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0239 | Multiples vulnérabilités dans Google Chrome | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0238 | Vulnérabilité dans NetApp ONTAP 9 | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0237 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0236 | Multiples vulnérabilités dans Traefik | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0235 | Multiples vulnérabilités dans HPE Aruba Networking AOS | 2026-03-04T00:00:00.000000 | 2026-03-04T00:00:00.000000 |
| certfr-2026-avi-0234 | Vulnérabilité dans Tenable Nessus Manager | 2026-03-04T00:00:00.000000 | 2026-03-04T00:00:00.000000 |
| certfr-2026-avi-0233 | Multiples vulnérabilités dans Google Pixel | 2026-03-04T00:00:00.000000 | 2026-03-04T00:00:00.000000 |
| certfr-2026-avi-0232 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-03T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0231 | Multiples vulnérabilités dans Google Android | 2026-03-03T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0230 | Multiples vulnérabilités dans Docker Desktop | 2026-03-03T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0217 | Multiples vulnérabilités dans SPIP | 2026-02-26T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0229 | Multiples vulnérabilités dans MISP | 2026-03-02T00:00:00.000000 | 2026-03-02T00:00:00.000000 |
| certfr-2026-avi-0228 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-02T00:00:00.000000 | 2026-03-02T00:00:00.000000 |
| certfr-2026-avi-0227 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0226 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0225 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0224 | Multiples vulnérabilités dans les produits IBM | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0223 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0222 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0221 | Multiples vulnérabilités dans les produits Centreon | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0220 | Multiples vulnérabilités dans les produits Elastic | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0219 | Vulnérabilité dans Stormshield Network Security | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0218 | Multiples vulnérabilités dans les produits VMware | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0216 | Vulnérabilité dans PostgreSQL | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0215 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0214 | Vulnérabilité dans Juniper Networks Junos OS Evolved | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0213 | Multiples vulnérabilités dans les produits Cisco | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0212 | Multiples vulnérabilités dans les produits Centreon | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0211 | Multiples vulnérabilités dans Wireshark | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0210 | Multiples vulnérabilités dans Cisco Catalyst SD-WAN | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-000002 | Multiple vulnerabilities in multiple NEC branded projectors manufactured by Sharp Display Solutions, Ltd. | 2026-01-07T14:10+09:00 | 2026-01-14T16:54+09:00 |
| jvndb-2026-000005 | Multiple vulnerabilities in EATON UPS Companion | 2026-01-13T19:01+09:00 | 2026-01-13T19:01+09:00 |
| jvndb-2026-000003 | RICOH Streamline NX vulnerable to improper authorization | 2026-01-09T18:17+09:00 | 2026-01-09T18:17+09:00 |
| jvndb-2026-000004 | The installers for multiple PIONEER products may insecurely load Dynamic Link Libraries | 2026-01-08T13:47+09:00 | 2026-01-08T13:47+09:00 |
| jvndb-2026-000001 | Origin validation error vulnerability in Fujitsu Security Solution AuthConductor Client Basic V2 | 2026-01-07T14:19+09:00 | 2026-01-07T14:19+09:00 |
| jvndb-2026-001001 | Authentication bypass vulnerability in OpenBlocks series | 2026-01-07T10:46+09:00 | 2026-01-07T10:46+09:00 |
| jvndb-2025-019621 | EPSON WebConfig / Epson Web Control for SEIKO EPSON Projector Products do not restrict excessive authentication attempts | 2025-11-21T15:31+09:00 | 2025-12-24T10:54+09:00 |
| jvndb-2025-014967 | Multiple vulnerabilities in multiple Keyence products | 2025-10-03T11:19+09:00 | 2025-12-23T14:36+09:00 |
| jvndb-2025-000117 | SEIKO EPSON printer Web Config vulnerable to stack-based buffer overflow | 2025-12-16T15:31+09:00 | 2025-12-23T11:57+09:00 |
| jvndb-2025-022400 | Ruijie Networks AP180 Series vulnerable to OS command injection | 2025-12-19T12:33+09:00 | 2025-12-19T12:33+09:00 |
| jvndb-2025-000118 | GROWI vulnerable to cross-site request forgery | 2025-12-17T13:04+09:00 | 2025-12-17T13:04+09:00 |
| jvndb-2025-022062 | Multiple vulnerabilities in CHOCO TEI WATCHER mini | 2025-12-17T11:28+09:00 | 2025-12-17T11:28+09:00 |
| jvndb-2025-000115 | QND vulnerable to privilege escalation | 2025-12-11T14:33+09:00 | 2025-12-11T14:33+09:00 |
| jvndb-2025-000113 | Multiple vulnerabilities in GroupSession | 2025-12-08T17:48+09:00 | 2025-12-11T11:30+09:00 |
| jvndb-2025-000091 | Multiple I-O DATA NAS management applications register Windows services with unquoted file paths | 2025-10-22T15:04+09:00 | 2025-12-10T16:20+09:00 |
| jvndb-2021-000081 | Multiple vulnerabilities in Sharp NEC Display Solutions' public displays | 2021-09-17T15:13+09:00 | 2025-12-10T10:24+09:00 |
| jvndb-2025-021305 | Android App "Brother iPrint&Scan" improper use of an external cache directory | 2025-12-09T17:25+09:00 | 2025-12-09T17:25+09:00 |
| jvndb-2025-000114 | ELECOM Clone for Windows registers a Windows service with an unquoted file path | 2025-12-09T17:16+09:00 | 2025-12-09T17:16+09:00 |
| jvndb-2025-000116 | GS Yuasa FULLBACK Manager Pro registers Windows services with unquoted file paths | 2025-12-08T14:06+09:00 | 2025-12-08T14:06+09:00 |
| jvndb-2025-000094 | Multiple vulnerabilities in ABB Terra AC Wallbox | 2025-12-05T14:12+09:00 | 2025-12-05T14:12+09:00 |
| jvndb-2025-000112 | Installer of INZONE Hub may insecurely load Dynamic Link Libraries | 2025-11-28T13:36+09:00 | 2025-11-28T13:36+09:00 |
| jvndb-2025-000111 | SwitchBot Smart Video Doorbell vulnerable to active debug code | 2025-11-26T14:35+09:00 | 2025-11-26T14:35+09:00 |
| jvndb-2025-000110 | Multiple vulnerabilities in Security Point (Windows) of MaLion | 2025-11-25T17:17+09:00 | 2025-11-25T17:17+09:00 |
| jvndb-2025-000109 | Multiple vulnerabilities in SNC-CX600W | 2025-11-25T14:59+09:00 | 2025-11-25T14:59+09:00 |
| jvndb-2025-000108 | "FOD" App uses hard-coded cryptographic keys | 2025-11-25T14:15+09:00 | 2025-11-25T14:15+09:00 |
| jvndb-2025-000106 | Multiple vulnerabilities in LogStare Collector | 2025-11-21T16:27+09:00 | 2025-11-21T16:27+09:00 |
| jvndb-2025-000107 | Installer of RakurakuMusen Start EX for Windows may insecurely load Dynamic Link Libraries | 2025-11-19T16:22+09:00 | 2025-11-19T16:22+09:00 |
| jvndb-2025-000097 | "Dejira" App for iOS vulnerable to improper server certificate verification | 2025-11-17T14:09+09:00 | 2025-11-17T14:09+09:00 |
| jvndb-2025-000105 | NCP-HG100 vulnerable to OS command injection | 2025-11-14T15:26+09:00 | 2025-11-14T15:26+09:00 |
| jvndb-2025-000104 | Multiple vulnerabilities in GNU Libmicrohttpd | 2025-11-10T15:07+09:00 | 2025-11-10T15:07+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-13373 | OpenClaw操作系统命令注入漏洞(CNVD-2026-13373) | 2026-03-02 | 2026-03-12 |
| cnvd-2026-13372 | OpenClaw操作系统命令注入漏洞(CNVD-2026-13372) | 2026-03-02 | 2026-03-12 |
| cnvd-2026-13371 | OpenClaw存在未明漏洞(CNVD-2026-13371) | 2026-03-04 | 2026-03-12 |
| cnvd-2026-13370 | OpenClaw信息泄露漏洞(CNVD-2026-13370) | 2026-03-06 | 2026-03-12 |
| cnvd-2026-13836 | NocoDB访问控制错误漏洞 | 2026-03-10 | 2026-03-11 |
| cnvd-2026-13835 | SonicWALL SonicOS缓冲区溢出漏洞 | 2026-03-11 | 2026-03-11 |
| cnvd-2026-13834 | SPIP SQL注入漏洞 | 2026-03-11 | 2026-03-11 |
| cnvd-2026-13536 | Tenda AC15 goform/formSetIptv文件命令注入漏洞 | 2026-03-11 | 2026-03-11 |
| cnvd-2026-13431 | OpenClaw访问控制错误漏洞(CNVD-2026-13431) | 2026-02-11 | 2026-03-11 |
| cnvd-2026-13430 | OpenClaw数据伪造问题漏洞(CNVD-2026-13430) | 2026-03-02 | 2026-03-11 |
| cnvd-2026-13429 | OpenClaw数据伪造问题漏洞 | 2026-03-02 | 2026-03-11 |
| cnvd-2026-13409 | Apache Tomcat客户端证书验证缺陷漏洞 | 2026-03-11 | 2026-03-11 |
| cnvd-2026-13400 | OpenClaw服务端请求伪造漏洞 | 2026-03-02 | 2026-03-11 |
| cnvd-2026-13295 | OpenClaw路径遍历漏洞 | 2026-03-02 | 2026-03-11 |
| cnvd-2026-13294 | OpenClaw代码问题漏洞 | 2026-03-02 | 2026-03-11 |
| cnvd-2026-13293 | OpenClaw信息泄露漏洞 | 2026-02-10 | 2026-03-11 |
| cnvd-2026-13292 | OpenClaw命令注入漏洞 | 2026-03-02 | 2026-03-11 |
| cnvd-2026-13291 | OpenClaw操作系统命令注入漏洞(CNVD-2026-13291) | 2026-02-10 | 2026-03-11 |
| cnvd-2026-13290 | OpenClaw操作系统命令注入漏洞 | 2026-02-11 | 2026-03-11 |
| cnvd-2026-13289 | OpenClaw存在未明漏洞 | 2026-02-05 | 2026-03-11 |
| cnvd-2026-13238 | WordPress插件The Events Calendar信息泄露漏洞 | 2025-11-11 | 2026-03-11 |
| cnvd-2026-13236 | WordPress插件FunnelKit Automations信息泄露漏洞 | 2025-11-11 | 2026-03-11 |
| cnvd-2026-13235 | 多款Advantech产品跨站脚本漏洞 | 2025-07-04 | 2026-03-11 |
| cnvd-2026-13233 | 多款Advantech产品拒绝服务漏洞(CNVD-2026-13233) | 2025-07-04 | 2026-03-11 |
| cnvd-2026-13232 | 多款Advantech产品代码执行漏洞 | 2025-07-04 | 2026-03-11 |
| cnvd-2026-13231 | 多款Advantech产品文件上传漏洞 | 2025-07-04 | 2026-03-11 |
| cnvd-2026-13230 | 多款Advantech产品命令执行漏洞 | 2025-07-04 | 2026-03-11 |
| cnvd-2026-13229 | 多款Advantech产品拒绝服务漏洞 | 2025-07-04 | 2026-03-11 |
| cnvd-2026-13228 | 多款Advantech产品信息泄露漏洞 | 2025-07-04 | 2026-03-11 |
| cnvd-2026-13227 | TOTOLINK A950RG缓冲区溢出漏洞 | 2026-02-11 | 2026-03-11 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15829 | Уязвимость системы управления базами данных MySQL и MariaDB, связанная с раскрытием инфор… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15825 | Уязвимость компонентов mm ядра операционной системы Linux, позволяющая нарушителю получит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15824 | Уязвимость компонента hugetlb.c ядра операционной системы Linux, позволяющая нарушителю п… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15822 | Уязвимость ядра операционной системы Linux, связанная с неправильной проверкой возвращаем… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15821 | Уязвимость компонента drm/sched ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15820 | Уязвимость компонента pinctrl-msm ядра операционной системы Linux, позволяющая нарушителю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15816 | Уязвимость компонента smb ядра операционной системы Linux, позволяющая нарушителю нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15815 | Уязвимость ядра операционной системы Linux, связанная с чтением за допустимыми границами … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15814 | Уязвимость ядра операционной системы Linux, связанная с чтением за границами буфера данны… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15811 | Уязвимость компонента xusb ядра операционной системы Linux, позволяющая нарушителю вызват… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15810 | Уязвимость ядра операционной системы Linux, связанная с одновременным выполнением с испол… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15809 | Уязвимость компонента appletalk ядра операционной системы Linux, позволяющая нарушителю н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15808 | Уязвимость компонента drm/tegra ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15806 | Уязвимость компонента atm ядра операционной системы Linux, позволяющая нарушителю вызвать… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15804 | Уязвимость компонента mcast ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15803 | Уязвимость компонентов tmptcp ядра операционной системы Linux, позволяющая нарушителю пол… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15802 | Уязвимость компонента perf/core ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15800 | Уязвимость компонента mm/vmalloc.c ядра операционной системы Linux, позволяющая нарушител… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15799 | Уязвимость модуля powerpc/eeh ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15798 | Уязвимость компонента crypto ядра операционной системы Linux, позволяющая нарушителю вызв… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15797 | Уязвимость компонента xilinx ядра операционной системы Linux, позволяющая нарушителю вызв… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15796 | Уязвимость компонента iwlwifi ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15795 | Уязвимость ядра операционной системы Linux, связанная с ошибками разыменования указателя,… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15794 | Уязвимость компонента dtpm_cpu ядра операционной системы Linux, позволяющая нарушителю вы… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15793 | Уязвимость компонента fbtft ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15792 | Уязвимость компонента net/tls ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15791 | Уязвимость компонента net/packet/af_packet.c ядра операционной системы Linux, позволяющая… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15790 | Уязвимость компонента net ядра операционной системы Linux, позволяющая нарушителю вызвать… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15789 | Уязвимость компонента pnv_php операционной системы Linux, позволяющая нарушителю вызвать … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15788 | Уязвимость компонента pnv_php ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201402-0026 | Buffer overflow in the process_ra function in the router advertisement daemon (radvd) bef… | 2024-07-23T22:25:48.682000Z |
| var-201805-1144 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2024-07-23T22:25:33.529000Z |
| var-201805-1143 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2024-07-23T22:25:33.635000Z |
| var-202005-0008 | Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buf… | 2024-07-23T22:25:28.455000Z |
| var-202407-0704 | A vulnerability has been identified in CPCI85 Central Processing/Communication (All versi… | 2024-07-23T22:25:01.735000Z |
| var-200107-0035 | slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cau… | 2024-07-23T22:24:58.858000Z |
| var-200512-0643 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2024-07-23T22:24:53.371000Z |
| var-200512-0611 | Multiple heap-based buffer overflows in QuickTime.qts in Apple QuickTime Player 7.0.3 and… | 2024-07-23T22:24:53.455000Z |
| var-200512-0300 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2024-07-23T22:24:53.297000Z |
| var-200512-0297 | Integer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbit… | 2024-07-23T22:24:53.525000Z |
| var-200512-0294 | Buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbitr… | 2024-07-23T22:24:53.234000Z |
| var-201407-0233 | Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote atta… | 2024-07-23T22:22:21.013000Z |
| var-201601-0038 | Multiple stack-based buffer overflows in Advantech WebAccess before 8.1 allow remote atta… | 2024-07-23T22:22:04.421000Z |
| var-201801-0394 | TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbi… | 2024-07-23T22:21:46.499000Z |
| var-201904-0181 | Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow… | 2024-07-23T22:21:36.530000Z |
| var-202108-1160 | Description: A permissions issue was addressed with improved validation. This issue is fi… | 2024-07-23T22:20:46.081000Z |
| var-202305-0218 | D-Link DAP-1360 webproc WEB_DisplayPage Stack-based Buffer Overflow Remote Code Execution… | 2024-07-23T22:20:18.349000Z |
| var-202305-0217 | D-Link DAP-1360 Hardcoded Credentials Authentication Bypass Vulnerability. This vulnerabi… | 2024-07-23T22:20:18.369000Z |
| var-202305-0216 | D-Link DAP-1360 Multiple Parameters Stack-Based Buffer Overflow Remote Code Execution Vul… | 2024-07-23T22:20:18.413000Z |
| var-202305-0177 | D-Link DAP-1360 webproc Stack-based Buffer Overflow Remote Code Execution Vulnerability. … | 2024-07-23T22:20:18.434000Z |
| var-202305-0176 | D-Link DAP-1360 webproc var:sys_Token Heap-based Buffer Overflow Remote Code Execution Vu… | 2024-07-23T22:20:18.458000Z |
| var-202305-0166 | D-Link DAP-1360 webproc var:menu Stack-based Buffer Overflow Remote Code Execution Vulner… | 2024-07-23T22:20:18.326000Z |
| var-202305-0154 | D-Link DAP-1360 webproc var:page Stack-based Buffer Overflow Remote Code Execution Vulner… | 2024-07-23T22:20:18.503000Z |
| var-202305-0153 | D-Link DAP-1360 webupg UPGCGI_CheckAuth Numeric Truncation Remote Code Execution Vulnerab… | 2024-07-23T22:20:18.392000Z |
| var-202305-0071 | D-Link DAP-1360 webproc Heap-based Buffer Overflow Remote Code Execution Vulnerability. T… | 2024-07-23T22:20:18.481000Z |
| var-202305-0070 | D-Link DAP-1360 webproc COMM_MakeCustomMsg Stack-based Buffer Overflow Remote Code Execut… | 2024-07-23T22:20:18.303000Z |
| var-202308-3323 | D-Link DAP-2622 DDP Change ID Password Auth Username Stack-based Buffer Overflow Remote C… | 2024-07-23T22:20:12.387000Z |
| var-202308-3185 | D-Link DAP-2622 DDP Configuration Backup Filename Stack-based Buffer Overflow Remote Code… | 2024-07-23T22:20:12.455000Z |
| var-202308-3131 | D-Link DAP-2622 DDP Reset Factory Auth Password Stack-based Buffer Overflow Remote Code E… | 2024-07-23T22:20:12.487000Z |
| var-202308-3130 | D-Link DAP-2622 DDP Configuration Restore Auth Username Stack-based Buffer Overflow Remot… | 2024-07-23T22:20:12.431000Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| GCVE-1-2025-0003 |
9.3 (4.0)
|
Incorrect ACL for user settings edit, which previ… |
cerebrate |
cerebrate |
2025-08-22T12:33:00.000Z | 2025-08-23T07:55:10.950332Z |
| GCVE-1-2025-0002 |
8.9 (4.0)
|
Command Injection in Cl0p Exfiltration Python Script |
Cl0p ransomware |
exfiltration |
2025-07-01T08:19:00.000Z | 2025-07-01T10:58:58.443468Z |
| GCVE-1-2025-0001 |
5.3 (4.0)
|
The absence of a password confirmation step when deact… |
CIRCL |
Vulnerability-Lookup |
2025-05-27T08:58:00.000Z | 2025-05-30T14:27:56.273945Z |