Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43459 |
N/A
|
ASoC: soc-core: flush delayed work before removing DAI… |
Linux |
Linux |
2026-05-08T14:22:22.651Z | 2026-05-08T14:22:22.651Z |
| CVE-2026-43458 |
N/A
|
serial: caif: hold tty->link reference in ldisc_open a… |
Linux |
Linux |
2026-05-08T14:22:21.997Z | 2026-05-08T14:22:21.997Z |
| CVE-2026-43457 |
N/A
|
mctp: i2c: fix skb memory leak in receive path |
Linux |
Linux |
2026-05-08T14:22:20.725Z | 2026-05-08T14:22:20.725Z |
| CVE-2026-43456 |
N/A
|
bonding: fix type confusion in bond_setup_by_slave() |
Linux |
Linux |
2026-05-08T14:22:20.036Z | 2026-05-08T14:22:20.036Z |
| CVE-2026-43455 |
N/A
|
mctp: route: hold key->lock in mctp_flow_prepare_output() |
Linux |
Linux |
2026-05-08T14:22:19.375Z | 2026-05-08T14:22:19.375Z |
| CVE-2026-43454 |
N/A
|
netfilter: nf_tables: Fix for duplicate device in netd… |
Linux |
Linux |
2026-05-08T14:22:18.719Z | 2026-05-08T14:22:18.719Z |
| CVE-2026-43453 |
N/A
|
netfilter: nft_set_pipapo: fix stack out-of-bounds rea… |
Linux |
Linux |
2026-05-08T14:22:18.087Z | 2026-05-08T14:22:18.087Z |
| CVE-2026-43452 |
N/A
|
netfilter: x_tables: guard option walkers against 1-by… |
Linux |
Linux |
2026-05-08T14:22:17.361Z | 2026-05-08T14:22:17.361Z |
| CVE-2026-43451 |
N/A
|
netfilter: nfnetlink_queue: fix entry leak in bridge v… |
Linux |
Linux |
2026-05-08T14:22:16.716Z | 2026-05-08T14:22:16.716Z |
| CVE-2026-43450 |
N/A
|
netfilter: nfnetlink_cthelper: fix OOB read in nfnl_ct… |
Linux |
Linux |
2026-05-08T14:22:15.915Z | 2026-05-08T14:22:15.915Z |
| CVE-2026-43449 |
N/A
|
nvme-pci: Fix slab-out-of-bounds in nvme_dbbuf_set |
Linux |
Linux |
2026-05-08T14:22:15.276Z | 2026-05-08T14:22:15.276Z |
| CVE-2026-43448 |
N/A
|
nvme-pci: Fix race bug in nvme_poll_irqdisable() |
Linux |
Linux |
2026-05-08T14:22:14.633Z | 2026-05-08T14:22:14.633Z |
| CVE-2026-43447 |
N/A
|
iavf: fix PTP use-after-free during reset |
Linux |
Linux |
2026-05-08T14:22:13.988Z | 2026-05-08T14:22:13.988Z |
| CVE-2026-43446 |
N/A
|
accel/amdxdna: Fix runtime suspend deadlock when there… |
Linux |
Linux |
2026-05-08T14:22:13.328Z | 2026-05-08T14:22:13.328Z |
| CVE-2026-43445 |
N/A
|
e1000/e1000e: Fix leak in DMA error cleanup |
Linux |
Linux |
2026-05-08T14:22:12.660Z | 2026-05-08T14:22:12.660Z |
| CVE-2026-43444 |
N/A
|
drm/amdkfd: Unreserve bo if queue update failed |
Linux |
Linux |
2026-05-08T14:22:11.976Z | 2026-05-08T14:22:11.976Z |
| CVE-2026-43443 |
N/A
|
ASoC: amd: acp-mach-common: Add missing error check fo… |
Linux |
Linux |
2026-05-08T14:22:11.303Z | 2026-05-08T14:22:11.303Z |
| CVE-2026-43442 |
N/A
|
io_uring: fix physical SQE bounds check for SQE_MIXED … |
Linux |
Linux |
2026-05-08T14:22:10.656Z | 2026-05-08T14:22:10.656Z |
| CVE-2026-43441 |
N/A
|
net: bonding: Fix nd_tbl NULL dereference when IPv6 is… |
Linux |
Linux |
2026-05-08T14:22:09.982Z | 2026-05-08T14:22:09.982Z |
| CVE-2026-43440 |
N/A
|
net/mana: Null service_wq on setup error to prevent do… |
Linux |
Linux |
2026-05-08T14:22:09.334Z | 2026-05-08T14:22:09.334Z |
| CVE-2026-43439 |
N/A
|
cgroup: fix race between task migration and iteration |
Linux |
Linux |
2026-05-08T14:22:08.626Z | 2026-05-08T14:22:08.626Z |
| CVE-2026-43438 |
N/A
|
sched_ext: Remove redundant css_put() in scx_cgroup_init() |
Linux |
Linux |
2026-05-08T14:22:07.980Z | 2026-05-08T14:22:07.980Z |
| CVE-2026-43437 |
N/A
|
ALSA: pcm: fix use-after-free on linked stream runtime… |
Linux |
Linux |
2026-05-08T14:22:07.314Z | 2026-05-08T14:22:07.314Z |
| CVE-2026-43436 |
N/A
|
ALSA: usb-audio: Check endpoint numbers at parsing Sca… |
Linux |
Linux |
2026-05-08T14:22:06.632Z | 2026-05-08T14:22:06.632Z |
| CVE-2026-43435 |
N/A
|
rust_binder: fix oneway spam detection |
Linux |
Linux |
2026-05-08T14:22:05.921Z | 2026-05-08T14:22:05.921Z |
| CVE-2026-43434 |
N/A
|
rust_binder: check ownership before using vma |
Linux |
Linux |
2026-05-08T14:22:05.269Z | 2026-05-08T14:22:05.269Z |
| CVE-2026-43433 |
N/A
|
rust_binder: avoid reading the written value in offset… |
Linux |
Linux |
2026-05-08T14:22:04.632Z | 2026-05-08T14:22:04.632Z |
| CVE-2026-43432 |
N/A
|
usb: xhci: Fix memory leak in xhci_disable_slot() |
Linux |
Linux |
2026-05-08T14:22:03.985Z | 2026-05-08T14:22:03.985Z |
| CVE-2026-43431 |
N/A
|
xhci: Fix NULL pointer dereference when reading portli… |
Linux |
Linux |
2026-05-08T14:22:03.298Z | 2026-05-08T14:22:03.298Z |
| CVE-2026-43430 |
N/A
|
usb: yurex: fix race in probe |
Linux |
Linux |
2026-05-08T14:22:02.458Z | 2026-05-08T14:22:02.458Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43443 |
N/A
|
ASoC: amd: acp-mach-common: Add missing error check fo… |
Linux |
Linux |
2026-05-08T14:22:11.303Z | 2026-05-08T14:22:11.303Z |
| CVE-2026-43442 |
N/A
|
io_uring: fix physical SQE bounds check for SQE_MIXED … |
Linux |
Linux |
2026-05-08T14:22:10.656Z | 2026-05-08T14:22:10.656Z |
| CVE-2026-43441 |
N/A
|
net: bonding: Fix nd_tbl NULL dereference when IPv6 is… |
Linux |
Linux |
2026-05-08T14:22:09.982Z | 2026-05-08T14:22:09.982Z |
| CVE-2026-43440 |
N/A
|
net/mana: Null service_wq on setup error to prevent do… |
Linux |
Linux |
2026-05-08T14:22:09.334Z | 2026-05-08T14:22:09.334Z |
| CVE-2026-43439 |
N/A
|
cgroup: fix race between task migration and iteration |
Linux |
Linux |
2026-05-08T14:22:08.626Z | 2026-05-08T14:22:08.626Z |
| CVE-2026-43438 |
N/A
|
sched_ext: Remove redundant css_put() in scx_cgroup_init() |
Linux |
Linux |
2026-05-08T14:22:07.980Z | 2026-05-08T14:22:07.980Z |
| CVE-2026-43437 |
N/A
|
ALSA: pcm: fix use-after-free on linked stream runtime… |
Linux |
Linux |
2026-05-08T14:22:07.314Z | 2026-05-08T14:22:07.314Z |
| CVE-2026-43436 |
N/A
|
ALSA: usb-audio: Check endpoint numbers at parsing Sca… |
Linux |
Linux |
2026-05-08T14:22:06.632Z | 2026-05-08T14:22:06.632Z |
| CVE-2026-43435 |
N/A
|
rust_binder: fix oneway spam detection |
Linux |
Linux |
2026-05-08T14:22:05.921Z | 2026-05-08T14:22:05.921Z |
| CVE-2026-43434 |
N/A
|
rust_binder: check ownership before using vma |
Linux |
Linux |
2026-05-08T14:22:05.269Z | 2026-05-08T14:22:05.269Z |
| CVE-2026-43433 |
N/A
|
rust_binder: avoid reading the written value in offset… |
Linux |
Linux |
2026-05-08T14:22:04.632Z | 2026-05-08T14:22:04.632Z |
| CVE-2026-43432 |
N/A
|
usb: xhci: Fix memory leak in xhci_disable_slot() |
Linux |
Linux |
2026-05-08T14:22:03.985Z | 2026-05-08T14:22:03.985Z |
| CVE-2026-43431 |
N/A
|
xhci: Fix NULL pointer dereference when reading portli… |
Linux |
Linux |
2026-05-08T14:22:03.298Z | 2026-05-08T14:22:03.298Z |
| CVE-2026-43430 |
N/A
|
usb: yurex: fix race in probe |
Linux |
Linux |
2026-05-08T14:22:02.458Z | 2026-05-08T14:22:02.458Z |
| CVE-2026-43429 |
N/A
|
USB: usbtmc: Use usb_bulk_msg_killable() with user-spe… |
Linux |
Linux |
2026-05-08T14:22:01.739Z | 2026-05-08T14:22:01.739Z |
| CVE-2026-43428 |
N/A
|
USB: core: Limit the length of unkillable synchronous … |
Linux |
Linux |
2026-05-08T14:22:01.027Z | 2026-05-08T14:22:01.027Z |
| CVE-2026-43427 |
N/A
|
usb: class: cdc-wdm: fix reordering issue in read code path |
Linux |
Linux |
2026-05-08T14:22:00.345Z | 2026-05-08T14:22:00.345Z |
| CVE-2026-43426 |
N/A
|
usb: renesas_usbhs: fix use-after-free in ISR during d… |
Linux |
Linux |
2026-05-08T14:21:59.668Z | 2026-05-08T14:21:59.668Z |
| CVE-2026-43425 |
N/A
|
usb: image: mdc800: kill download URB on timeout |
Linux |
Linux |
2026-05-08T14:21:59.020Z | 2026-05-08T14:21:59.020Z |
| CVE-2026-43424 |
N/A
|
usb: gadget: f_tcm: Fix NULL pointer dereferences in n… |
Linux |
Linux |
2026-05-08T14:21:58.365Z | 2026-05-08T14:21:58.365Z |
| CVE-2026-43423 |
N/A
|
usb: gadget: f_ncm: Fix atomic context locking issue |
Linux |
Linux |
2026-05-08T14:21:57.683Z | 2026-05-08T14:21:57.683Z |
| CVE-2026-43422 |
N/A
|
usb: legacy: ncm: Fix NPE in gncm_bind |
Linux |
Linux |
2026-05-08T14:21:57.031Z | 2026-05-08T14:21:57.031Z |
| CVE-2026-43421 |
N/A
|
usb: gadget: f_ncm: Fix net_device lifecycle with devi… |
Linux |
Linux |
2026-05-08T14:21:56.363Z | 2026-05-08T14:21:56.363Z |
| CVE-2026-43420 |
N/A
|
ceph: fix i_nlink underrun during async unlink |
Linux |
Linux |
2026-05-08T14:21:55.717Z | 2026-05-08T14:21:55.717Z |
| CVE-2026-43419 |
N/A
|
ceph: fix memory leaks in ceph_mdsc_build_path() |
Linux |
Linux |
2026-05-08T14:21:55.037Z | 2026-05-08T14:21:55.037Z |
| CVE-2026-43418 |
N/A
|
sched/mmcid: Prevent CID stalls due to concurrent forks |
Linux |
Linux |
2026-05-08T14:21:54.362Z | 2026-05-08T14:21:54.362Z |
| CVE-2026-43417 |
N/A
|
sched/mmcid: Handle vfork()/CLONE_VM correctly |
Linux |
Linux |
2026-05-08T14:21:53.618Z | 2026-05-08T14:21:53.618Z |
| CVE-2026-43416 |
N/A
|
powerpc, perf: Check that current->mm is alive before … |
Linux |
Linux |
2026-05-08T14:21:52.954Z | 2026-05-08T14:21:52.954Z |
| CVE-2026-43415 |
N/A
|
scsi: ufs: core: Fix SError in ufshcd_rtc_work() durin… |
Linux |
Linux |
2026-05-08T14:21:52.293Z | 2026-05-08T14:21:52.293Z |
| CVE-2026-43414 |
N/A
|
scsi: qla2xxx: Completely fix fcport double free |
Linux |
Linux |
2026-05-08T14:21:51.604Z | 2026-05-08T14:21:51.604Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-2525 | A vulnerability has been found in Free5GC up to 4.1.0. This affects an unknown function of the comp… | 2026-02-16T02:16:06.153 | 2026-02-19T19:48:12.000 |
| fkie_cve-2026-2524 | A flaw has been found in Open5GS 2.7.6. The impacted element is the function mme_s11_handle_create_… | 2026-02-16T01:15:54.000 | 2026-02-18T19:07:38.287 |
| fkie_cve-2026-2523 | A vulnerability was detected in Open5GS up to 2.7.6. The affected element is the function smf_gn_ha… | 2026-02-16T01:15:53.767 | 2026-02-18T19:07:48.960 |
| fkie_cve-2026-2522 | A security vulnerability has been detected in Open5GS up to 2.7.6. Impacted is an unknown function … | 2026-02-16T00:16:07.550 | 2026-02-18T19:42:15.990 |
| fkie_cve-2026-2521 | A weakness has been identified in Open5GS up to 2.7.6. This issue affects the function sgwc_s5c_han… | 2026-02-15T23:16:05.803 | 2026-02-18T19:42:51.673 |
| fkie_cve-2026-26369 | eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insuffi… | 2026-02-15T16:15:54.407 | 2026-02-28T01:34:28.150 |
| fkie_cve-2026-26368 | eNet SMART HOME server 2.2.1 and 2.3.1 contains a missing authorization vulnerability in the resetU… | 2026-02-15T16:15:54.237 | 2026-02-28T01:33:46.257 |
| fkie_cve-2026-26367 | eNet SMART HOME server 2.2.1 and 2.3.1 contains a missing authorization vulnerability in the delete… | 2026-02-15T16:15:54.060 | 2026-03-02T15:16:35.977 |
| fkie_cve-2026-26366 | eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that… | 2026-02-15T16:15:53.870 | 2026-02-26T22:44:42.813 |
| fkie_cve-2019-25377 | OPNsense 19.1 contains a reflected cross-site scripting vulnerability in the system_advanced_sysctl… | 2026-02-15T14:16:07.763 | 2026-02-18T19:08:16.513 |
| fkie_cve-2019-25376 | OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows unauthenticated a… | 2026-02-15T14:16:07.590 | 2026-02-18T19:10:16.477 |
| fkie_cve-2019-25375 | OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows unauthenticated a… | 2026-02-15T14:16:07.417 | 2026-02-18T19:11:03.210 |
| fkie_cve-2019-25374 | OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows attackers to inje… | 2026-02-15T14:16:07.243 | 2026-02-18T19:12:06.493 |
| fkie_cve-2019-25373 | OPNsense 19.1 contains a stored cross-site scripting vulnerability that allows authenticated attack… | 2026-02-15T14:16:07.067 | 2026-02-18T19:13:06.080 |
| fkie_cve-2019-25372 | OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows unauthenticated a… | 2026-02-15T14:16:06.897 | 2026-02-18T19:13:34.990 |
| fkie_cve-2019-25371 | OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows unauthenticated a… | 2026-02-15T14:16:06.723 | 2026-02-18T19:14:24.603 |
| fkie_cve-2019-25370 | OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows attackers to inje… | 2026-02-15T14:16:06.550 | 2026-02-18T19:15:01.213 |
| fkie_cve-2019-25369 | OPNsense 19.1 contains a stored cross-site scripting vulnerability in the system_advanced_sysctl.ph… | 2026-02-15T14:16:06.370 | 2026-02-18T19:15:41.980 |
| fkie_cve-2019-25368 | OPNsense 19.1 contains multiple cross-site scripting vulnerabilities in the diag_backup.php endpoin… | 2026-02-15T14:16:06.190 | 2026-02-18T19:16:55.773 |
| fkie_cve-2019-25367 | ArangoDB Community Edition 3.4.2-1 contains multiple cross-site scripting vulnerabilities in the Aa… | 2026-02-15T14:16:05.083 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2517 | A security flaw has been discovered in Open5GS up to 2.7.6. This vulnerability affects the function… | 2026-02-15T13:16:16.690 | 2026-02-18T20:48:40.650 |
| fkie_cve-2026-2516 | A vulnerability was identified in Unidocs ezPDF DRM Reader and ezPDF Reader 2.0/3.0.0.4. This affec… | 2026-02-15T13:16:16.423 | 2026-04-29T01:00:01.613 |
| fkie_cve-2026-2541 | The Micca KE700 system relies on a 6-bit portion of an identifier for authentication within rolling… | 2026-02-15T11:15:55.223 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2540 | The Micca KE700 system contains flawed resynchronization logic and is vulnerable to replay attacks.… | 2026-02-15T11:15:55.070 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2539 | The RF communication protocol in the Micca KE700 car alarm system does not encrypt its data frames.… | 2026-02-15T11:15:54.897 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-32063 | There is a misconfiguration vulnerability inside the Infotainment ECU manufactured by BOSCH. The vu… | 2026-02-15T11:15:54.443 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-32062 | The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment EC… | 2026-02-15T11:15:54.307 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-32061 | The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment EC… | 2026-02-15T11:15:54.170 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-32060 | The system suffers from the absence of a kernel module signature verification. If an attacker can e… | 2026-02-15T11:15:54.023 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-32059 | The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment EC… | 2026-02-15T11:15:53.880 | 2026-04-15T00:35:42.020 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-4rpc-8842-rq53 |
|
In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Add NULL checks … | 2026-05-08T15:31:30Z | 2026-05-08T15:31:30Z |
| ghsa-x288-7jx3-2597 |
|
In the Linux kernel, the following vulnerability has been resolved: spi: amlogic: spifc-a4: Fix DM… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-wm82-xv2w-22mm |
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: RX, Fix XDP multi-b… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-qq8v-696h-fhv2 |
|
In the Linux kernel, the following vulnerability has been resolved: mctp: route: hold key->lock in… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-qc73-3qqx-fc2q |
|
In the Linux kernel, the following vulnerability has been resolved: rxrpc, afs: Fix missing error … | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-pfqp-2whq-57g2 |
|
In the Linux kernel, the following vulnerability has been resolved: net: bonding: Fix nd_tbl NULL … | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-mxr7-7p5m-m8xr |
|
In the Linux kernel, the following vulnerability has been resolved: xprtrdma: Decrement re_receivi… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-mr89-jg5f-6pqv |
|
In the Linux kernel, the following vulnerability has been resolved: bonding: fix type confusion in… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-mf99-5486-2jh2 |
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: RX, Fix XDP multi-b… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-jprv-4f6g-4wvm |
|
In the Linux kernel, the following vulnerability has been resolved: nfs: return EISDIR on nfs3_pro… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-hx98-q4r6-mgcv |
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_queue: fi… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-hv7m-w2x8-mf6q |
|
In the Linux kernel, the following vulnerability has been resolved: nvme-pci: Fix slab-out-of-boun… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-hc7j-44jc-q764 |
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: fix… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-fg4c-9xcm-vp9q |
|
In the Linux kernel, the following vulnerability has been resolved: e1000/e1000e: Fix leak in DMA … | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-f5mr-9pc2-5mcw |
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix for … | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-cqh4-jv7g-jr53 |
|
In the Linux kernel, the following vulnerability has been resolved: accel/amdxdna: Fix runtime sus… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-938f-6jj9-x227 |
|
In the Linux kernel, the following vulnerability has been resolved: nvme-pci: Fix race bug in nvme… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-9349-jqww-wh9m |
|
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Unreserve bo if qu… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-7qq3-fmc6-w4w4 |
|
In the Linux kernel, the following vulnerability has been resolved: iavf: fix PTP use-after-free d… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-7gc8-cffq-4r9r |
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix deadlock between… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-757p-mh2f-rf8w |
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix DMA FIFO desync… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-6hfg-rmc6-8cvm |
|
In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-core: flush delayed … | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-5qcc-ffcx-c8mp |
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix crash when movin… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-53qp-89jc-q338 |
|
In the Linux kernel, the following vulnerability has been resolved: cgroup: fix race between task … | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-4xqj-6g2r-4ggr |
|
In the Linux kernel, the following vulnerability has been resolved: spi: rockchip-sfc: Fix double-… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-4jv3-xpmj-f4vf |
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_cthelper:… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-3jfw-v6mf-ccwx |
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: guard opt… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-2xr2-hxv5-9jxf |
|
In the Linux kernel, the following vulnerability has been resolved: net: spacemit: Fix error handl… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-2mxh-qrpv-mfvx |
|
In the Linux kernel, the following vulnerability has been resolved: mctp: i2c: fix skb memory leak… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-27j8-6q5h-m6jx |
|
In the Linux kernel, the following vulnerability has been resolved: serial: caif: hold tty->link r… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-259 |
9.8 (3.1)
|
In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by m… | torch | 2024-10-29T21:15:04+00:00 | 2025-07-16T03:09:57.748865+00:00 |
| pysec-2024-211 |
7.5 (3.1)
|
Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote clien… | waitress | 2024-10-29T15:15:12+00:00 | 2025-01-19T19:19:01.852094+00:00 |
| pysec-2024-210 |
4.8 (3.1)
|
Waitress is a Web Server Gateway Interface server for Python 2 and 3. A remote client may… | waitress | 2024-10-29T15:15:11+00:00 | 2025-01-19T19:19:01.811922+00:00 |
| pysec-2024-119 |
7.5 (3.1)
|
A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240628 allows for a Denial of Ser… | chuanhuchatgpt | 2024-10-29T13:15:00+00:00 | 2024-11-04T22:22:08.835024+00:00 |
| pysec-2024-116 |
9.0 (3.1)
|
A vulnerability in the discussion image upload function of the Lollms application, versio… | lollms | 2024-10-29T13:15:00+00:00 | 2024-11-01T21:22:09.060172+00:00 |
| pysec-2024-114 |
9.8 (3.1)
|
A vulnerability in the GraphCypherQAChain class of langchain-ai/langchainjs versions 0.2.… | langchain | 2024-10-29T13:15:00Z | 2024-11-04T19:21:44.923698Z |
| pysec-2024-113 |
4.3 (3.1)
|
In the latest version (20240628) of gaizhenbiao/chuanhuchatgpt, an issue exists in the /f… | chuanhuchatgpt | 2024-10-29T13:15:00+00:00 | 2024-10-31T19:20:49.353218+00:00 |
| pysec-2024-112 |
7.5 (3.1)
|
An arbitrary file read vulnerability exists in gaizhenbiao/chuanhuchatgpt version 2024062… | chuanhuchatgpt | 2024-10-29T13:15:00+00:00 | 2024-10-31T19:20:49.309758+00:00 |
| pysec-2024-111 |
9.1 (3.1)
|
A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langcha… | langchain | 2024-10-29T13:15:00Z | 2025-05-02T18:39:47.588215Z |
| pysec-2024-191 |
5.5 (3.1)
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2024-10-24T22:15:04+00:00 | 2025-01-19T10:22:29.812605+00:00 |
| pysec-2024-120 |
7.8 (3.1)
|
An issue in assimp v.5.4.3 allows a local attacker to execute arbitrary code via the Call… | pyassimp | 2024-10-24T21:15:00+00:00 | 2024-11-05T20:22:53.185968+00:00 |
| pysec-2024-248 |
7.8 (3.1)
|
OpenCanary, a multi-protocol network honeypot, directly executed commands taken from its … | opencanary | 2024-10-14T21:15:12+00:00 | 2025-05-16T14:23:05.150356+00:00 |
| pysec-2024-122 |
4.4 (3.1)
|
A path traversal vulnerability exists in the api open_personality_folder endpoint of pari… | lollms | 2024-10-11T16:15:00+00:00 | 2024-11-15T20:23:01.816492+00:00 |
| pysec-2024-220 |
5.4 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.972580+00:00 |
| pysec-2024-219 |
9.1 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.897787+00:00 |
| pysec-2024-218 |
8.1 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.803143+00:00 |
| pysec-2024-217 |
7.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This is a **data … | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T22:22:23.723816+00:00 |
| pysec-2024-216 |
7.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T22:22:23.549944+00:00 |
| pysec-2024-199 |
3.7 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T16:22:57.938459+00:00 |
| pysec-2024-215 |
9.8 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:11+00:00 | 2025-01-19T22:22:23.471780+00:00 |
| pysec-2024-198 |
4.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:11+00:00 | 2025-01-19T16:22:57.845317+00:00 |
| pysec-2024-214 |
5.4 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T22:22:23.399444+00:00 |
| pysec-2024-213 |
6.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T22:22:23.310301+00:00 |
| pysec-2024-197 |
5.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T16:22:57.732726+00:00 |
| pysec-2024-196 |
8.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T16:22:57.640183+00:00 |
| pysec-2024-168 |
6.5 (3.1)
|
Taipy is an open-source Python library for easy, end-to-end application development for d… | taipy | 2024-10-09T19:15:14+00:00 | 2025-01-18T19:19:07.718423+00:00 |
| pysec-2024-109 |
7.8 (3.1)
|
DeepSpeed Remote Code Execution Vulnerability | deepspeed | 2024-10-08T18:15:00+00:00 | 2024-10-17T23:22:43.000269+00:00 |
| pysec-2024-102 |
|
An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.… | django | 2024-10-08T16:15:00+00:00 | 2024-10-08T19:19:01.400873+00:00 |
| pysec-2024-121 |
6.5 (3.1)
|
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from… | openc3 | 2024-10-02T20:15:00+00:00 | 2024-11-13T20:22:56.434107+00:00 |
| pysec-2024-101 |
6.5 (3.1)
|
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from… | openc3 | 2024-10-02T20:15:00+00:00 | 2024-10-08T17:22:06.539206+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-3280 | Malicious code in pi-exa-mcp (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| mal-2026-3279 | Malicious code in muenxo (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| mal-2026-3278 | Malicious code in honcho-theme (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| mal-2026-3277 | Malicious code in edj-shopify-theme (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| mal-2026-3275 | Malicious code in @kills_sh/bootstrap (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| mal-2026-3274 | Malicious code in @w3m-app/switch_network (npm) | 2026-05-04T00:01:02Z | 2026-05-04T00:01:02Z |
| mal-2026-3273 | Malicious code in @w3m-app/is_connected (npm) | 2026-05-04T00:01:02Z | 2026-05-04T00:01:07Z |
| mal-2026-3272 | Malicious code in @w3m-app/get_chain_id (npm) | 2026-05-04T00:01:02Z | 2026-05-04T00:01:07Z |
| mal-2026-3271 | Malicious code in @bcs-ui/theme (npm) | 2026-05-04T00:01:01Z | 2026-05-04T00:01:01Z |
| mal-2026-3270 | Malicious code in @bcs-react-ui/select (npm) | 2026-05-04T00:01:01Z | 2026-05-04T00:01:01Z |
| mal-2026-3269 | Malicious code in @bcs-react-ui/context-menu (npm) | 2026-05-04T00:01:00Z | 2026-05-04T00:01:01Z |
| mal-2026-3268 | Malicious code in @bcs-mi/store (npm) | 2026-05-04T00:01:00Z | 2026-05-04T00:01:01Z |
| mal-2026-3267 | Malicious code in @bcs-bank-react-ui/swiper-slider (npm) | 2026-05-04T00:01:00Z | 2026-05-04T00:01:01Z |
| mal-2026-3266 | Malicious code in @bcs-bank/init (npm) | 2026-05-04T00:01:00Z | 2026-05-04T00:01:00Z |
| mal-2026-3265 | Malicious code in @bcs-bank/common-constants (npm) | 2026-05-04T00:01:00Z | 2026-05-04T00:01:00Z |
| mal-2026-3264 | Malicious code in @bcs-adapters/keycloak-api-adapter (npm) | 2026-05-04T00:00:59Z | 2026-05-04T00:01:00Z |
| mal-2026-3263 | Malicious code in @bcs-adapters/core-adapter (npm) | 2026-05-04T00:00:59Z | 2026-05-04T00:00:59Z |
| mal-2026-3323 | Malicious code in paypal-payouts-bridge (npm) | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| mal-2026-3322 | Malicious code in microsoft-agents-auth-service (npm) | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| mal-2026-3253 | Malicious code in feature-flag-service (npm) | 2026-05-03T22:30:37Z | 2026-05-03T22:49:55Z |
| mal-2026-3252 | Malicious code in gauth-client (PyPI) | 2026-05-03T21:26:25Z | 2026-05-03T21:26:25Z |
| mal-2026-3251 | Malicious code in puan31 (PyPI) | 2026-05-03T20:58:02Z | 2026-05-03T20:58:02Z |
| mal-2026-3250 | Malicious code in rostilesolver (PyPI) | 2026-05-03T20:23:48Z | 2026-05-03T20:24:20Z |
| mal-2026-3309 | Malicious code in google-cloud-secret-manager-config-poc (npm) | 2026-05-03T16:10:57Z | 2026-05-04T10:37:22Z |
| mal-2026-3249 | Malicious code in internal-company-module-test-1337 (npm) | 2026-05-03T15:33:36Z | 2026-05-03T16:21:44Z |
| mal-2026-3248 | Malicious code in pwn-control (PyPI) | 2026-05-03T13:49:59Z | 2026-05-03T13:49:59Z |
| mal-2026-3247 | Malicious code in metoopro (PyPI) | 2026-05-03T13:42:23Z | 2026-05-07T20:04:36Z |
| mal-2026-3297 | Malicious code in ally-call-wait-time (npm) | 2026-05-03T12:59:35Z | 2026-05-04T23:51:16Z |
| mal-2026-3289 | Malicious code in @allybank/ally-sdk (npm) | 2026-05-03T12:59:27Z | 2026-05-04T23:51:15Z |
| mal-2026-3294 | Malicious code in ally-allowlist (npm) | 2026-05-03T12:49:22Z | 2026-05-04T23:51:16Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0837 | Google Chrome: Mehrere Schwachstellen | 2026-03-23T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0833 | Ruby on Rails: Mehrere Schwachstellen | 2026-03-23T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0831 | systemd: Mehrere Schwachstellen | 2026-03-23T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0826 | Znuny: Schwachstelle ermöglicht Cross-Site Scripting | 2026-03-23T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0825 | strongSwan: Schwachstelle ermöglicht Denial of Service | 2026-03-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0824 | Python: Schwachstelle ermöglicht Codeausführung | 2026-03-22T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0822 | PTC FlexPLM und Windchill: Schwachstelle ermöglicht Codeausführung | 2026-03-22T23:00:00.000+00:00 | 2026-03-23T23:00:00.000+00:00 |
| wid-sec-w-2026-0821 | Keycloak: Mehrere Schwachstellen | 2026-03-22T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0816 | Apache ActiveMQ Artemis: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-22T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0794 | Microsoft Azure DevOps, Data Factory and Cloud Shell: Mehrere Schwachstellen | 2026-03-19T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0793 | Netwrix Password Secure: Mehrere Schwachstellen | 2026-03-19T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0792 | SuiteCRM: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0790 | Linux Kernel: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0789 | Roundcube: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-04-06T22:00:00.000+00:00 |
| wid-sec-w-2026-0787 | Keycloak: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0785 | libarchive: Schwachstelle ermöglicht Denial of Service | 2026-03-18T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0784 | Ubiquiti UniFi Network Application: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2026-03-18T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0782 | WebKitGTK: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0781 | Drupal Automated Logout Extension: Schwachstelle ermöglicht Manipulation von Dateien | 2026-03-18T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0775 | nghttp2: Schwachstelle ermöglicht Denial of Service | 2026-03-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0769 | Red Hat Enterprise Linux (capstone) und OpenShift (rhcos): Mehrere Schwachstellen | 2026-03-17T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0764 | Grafana Tempo: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0761 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Denial of Service | 2026-03-17T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0760 | Xen und Citrix Systems XenServer: Mehrere Schwachstellen | 2026-03-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0758 | Canonical Snap: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2026-03-17T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0756 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Privilegieneskalation und Offenlegung von Informationen | 2026-03-16T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0744 | ImageMagick: Schwachstelle ermöglicht Denial of Service | 2026-03-16T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0743 | OpenClaw: Mehrere Schwachstellen | 2026-03-16T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0736 | NetBox: Schwachstelle ermöglicht Cross-Site Scripting | 2026-03-16T23:00:00.000+00:00 | 2026-03-17T23:00:00.000+00:00 |
| wid-sec-w-2026-0734 | GNU InetUtils: Mehrere Schwachstellen | 2026-03-15T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-050-03 | Jinan USR IOT Technology Limited (PUSR) USR-W610 | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-050-02 | Valmet DNA Engineering Web Tools | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-050-01 | EnOcean SmartServer IoT | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-048-04 | Honeywell HIB2PI CCTV Camera (Update B) | 2026-02-17T07:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-048-03 | GE Vernova Enervista UR Setup | 2026-02-17T07:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-048-02 | Delta Electronics ASDA-Soft | 2026-02-17T07:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-043-10 | Airleader Master | 2026-02-12T07:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-076-02 | Schneider Electric SCADAPack and RemoteConnect | 2026-02-10T08:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-055-02 | Schneider Electric EcoStruxure Building Operation Workstation | 2026-02-10T08:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsma-26-041-01 | ZOLL ePCR IOS Mobile Application | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-04 | AVEVA PI to CONNECT Agent | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-03 | AVEVA PI Data Archive | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-02 | ZLAN Information Technology Co. ZLAN5143D | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-01 | Yokogawa FAST/TOOLS | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-048-01 | Siemens Simcenter Femap and Nastran | 2026-02-10T00:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-043-08 | Siemens NX | 2026-02-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-043-07 | Siemens Siveillance Video Management Servers | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-05 | Siemens Solid Edge | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-04 | Siemens Desigo CC Product Family and SENTRON Powermanager | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-02 | Siemens Polarion | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-01 | Siemens SINEC NMS | 2026-02-10T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-26-036-04 | Ilevia EVE X1 Server | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-03 | o6 Automation GmbH Open62541 | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-02 | Mitsubishi Electric MELSEC iQ-R Series | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-01 | TP-Link Systems Inc. VIGI Series IP Camera | 2026-02-05T06:00:00.000000Z | 2026-02-11T06:00:00.000000Z |
| icsa-26-034-04 | Synectix LAN 232 TRIO | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-03 | RISS SRL MOMA Seismic Station | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-02 | *Avation Light Engine Pro * | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-01 | Mitsubishi Electric FREQSHIP-mini for Windows | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-029-03 | Rockwell Automation ControlLogix | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-dnac-xss-wextvz59 | Cisco Catalyst Center Cross-Site Scripting Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-dnac-ci-zwlqvswt | Cisco Catalyst Center REST API Command Injection Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-catc-priv-esc-vs8eecux | Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-catc-open-redirect-3w5bk3je | Cisco Catalyst Center Virtual Appliance HTTP Open Redirect Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-ise-radsupress-dos-8yf3jthh | Cisco Identity Services Engine RADIUS Suppression Denial of Service Vulnerability | 2025-11-05T16:00:00+00:00 | 2025-11-05T16:00:00+00:00 |
| cisco-sa-ise-multiple-vulns-o9beswjh | Cisco Identity Services Engine Reflected Cross-Site Scripting and Information Disclosure Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-12-04T14:23:54+00:00 |
| cisco-sa-cc-unauth-rce-qen8h7mq | Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-11-13T12:48:42+00:00 |
| cisco-sa-cc-mult-vuln-gk4tfxsn | Multiple Cisco Contact Center Products Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-11-18T14:49:09+00:00 |
| cisco-sa-snort3-mime-vulns-ttl8pgvh | Multiple Cisco Products Snort 3 MIME Denial of Service Vulnerabilities | 2025-10-15T16:00:00+00:00 | 2026-02-12T18:38:13+00:00 |
| cisco-sa-roomos-inf-disc-qggsbxam | Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-phone-dos-fpyjlv7a | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-cv-xss-rwrakaj9 | Cisco Cyber Vision Center Stored Cross-Site Scripting Vulnerabilities | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-cucm-stored-xss-fnj66yly | Cisco Unified Communications Manager Stored Cross-Site Scripting Vulnerability | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-http-code-exec-wmfp3h3o | Cisco Secure Firewall Adaptive Security Appliance Software, Secure Firewall Threat Defense Software, IOS Software, IOS XE Software, and IOS XR Software Web Services Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:51+00:00 |
| cisco-sa-asaftd-webvpn-z5xp8eub | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:54+00:00 |
| cisco-sa-asaftd-webvpn-yrootuw | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Unauthorized Access Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:55+00:00 |
| cisco-sa-webui-xss-vwydgjou | Cisco IOS XE Software Web Authentication Reflected Cross-Site Scripting Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:50+00:00 |
| cisco-sa-snmpwred-x3mjyf5m | Cisco IOS XE Software Simple Network Management Protocol Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-snmp-x4lphte | Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-06T18:27:02+00:00 |
| cisco-sa-secboot-uqfd8avc | Cisco IOS XE Software Secure Boot Bypass Vulnerabilities | 2025-09-24T16:00:00+00:00 | 2025-10-15T15:57:29+00:00 |
| cisco-sa-nbar-dos-lavwtmet | Cisco IOS XE Software Network-Based Application Recognition Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-arg-inject-eyddbh4e | Cisco IOS XE Software CLI Argument Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-xe-cmd-inject-rpjm8bgl | Cisco IOS XE Software HTTP API Command Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-tacacs-hdb7thjw | Cisco IOS and IOS XE Software TACACS+ Authentication Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-01T16:39:50+00:00 |
| cisco-sa-ios-invalid-url-dos-nvxszf6u | Cisco IOS Software Industrial Ethernet Switch Device Manager Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-cli-eb7cz6yo | Cisco IOS and IOS XE Software CLI Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-defaultacl-psjk9nvf | Cisco SD-WAN vEdge Software Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-cat9k-ptmd7bgy | Cisco IOS XE Software for Catalyst 9000 Series Switches Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-30T14:26:46+00:00 |
| cisco-sa-cat9k-acl-l4k7vxgd | Cisco IOS XE Software on Cisco Catalyst 9500X and 9600X Series Switches Virtual Interface Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ap-ipv6-gw-tuazpn9o | Cisco Access Point Software Intermittent IPv6 Gateway Change Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:51+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-33007 | Apache HTTP Server: mod_authn_socache crash | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:57.000Z |
| msrc_cve-2026-33006 | Apache HTTP Server: mod_auth_digest timing attack | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:49.000Z |
| msrc_cve-2026-32936 | CoreDNS DoH GET path missing size validation causes CPU and memory amplification | 2026-05-02T00:00:00.000Z | 2026-05-07T01:02:48.000Z |
| msrc_cve-2026-32934 | CoreDNS DNS-over-QUIC unbounded goroutine growth leads to denial of service | 2026-05-02T00:00:00.000Z | 2026-05-07T01:02:56.000Z |
| msrc_cve-2026-31777 | ALSA: ctxfi: Check the error for index mapping | 2026-05-02T00:00:00.000Z | 2026-05-06T14:46:07.000Z |
| msrc_cve-2026-31771 | Bluetooth: hci_event: move wake reason storage into validated event handlers | 2026-05-02T00:00:00.000Z | 2026-05-06T14:47:09.000Z |
| msrc_cve-2026-31769 | gpib: fix use-after-free in IO ioctl handlers | 2026-05-02T00:00:00.000Z | 2026-05-02T01:02:20.000Z |
| msrc_cve-2026-31729 | usb: typec: ucsi: validate connector number in ucsi_notify_common() | 2026-05-02T00:00:00.000Z | 2026-05-06T14:48:01.000Z |
| msrc_cve-2026-31725 | usb: gadget: f_ecm: Fix net_device lifecycle with device_move | 2026-05-02T00:00:00.000Z | 2026-05-06T14:46:41.000Z |
| msrc_cve-2026-31724 | usb: gadget: f_eem: Fix net_device lifecycle with device_move | 2026-05-02T00:00:00.000Z | 2026-05-06T14:45:40.000Z |
| msrc_cve-2026-31723 | usb: gadget: f_subset: Fix net_device lifecycle with device_move | 2026-05-02T00:00:00.000Z | 2026-05-06T14:45:32.000Z |
| msrc_cve-2026-31722 | usb: gadget: f_rndis: Fix net_device lifecycle with device_move | 2026-05-02T00:00:00.000Z | 2026-05-06T14:46:15.000Z |
| msrc_cve-2026-31721 | usb: gadget: f_hid: move list and spinlock inits from bind to alloc | 2026-05-02T00:00:00.000Z | 2026-05-04T14:40:05.000Z |
| msrc_cve-2026-31718 | ksmbd: fix use-after-free in __ksmbd_close_fd() via durable scavenger | 2026-05-02T00:00:00.000Z | 2026-05-08T01:02:08.000Z |
| msrc_cve-2026-31717 | ksmbd: validate owner of durable handle on reconnect | 2026-05-02T00:00:00.000Z | 2026-05-08T01:02:02.000Z |
| msrc_cve-2026-31715 | f2fs: fix UAF caused by decrementing sbi->nr_pages[] in f2fs_write_end_io() | 2026-05-02T00:00:00.000Z | 2026-05-06T14:48:18.000Z |
| msrc_cve-2026-31712 | ksmbd: require minimum ACE size in smb_check_perm_dacl() | 2026-05-02T00:00:00.000Z | 2026-05-06T14:47:35.000Z |
| msrc_cve-2026-31711 | smb: server: fix active_num_conn leak on transport allocation failure | 2026-05-02T00:00:00.000Z | 2026-05-04T14:40:11.000Z |
| msrc_cve-2026-31709 | smb: client: validate the whole DACL before rewriting it in cifsacl | 2026-05-02T00:00:00.000Z | 2026-05-06T14:47:26.000Z |
| msrc_cve-2026-31708 | smb: client: fix OOB read in smb2_ioctl_query_info QUERY_INFO path | 2026-05-02T00:00:00.000Z | 2026-05-04T14:41:08.000Z |
| msrc_cve-2026-31707 | ksmbd: validate response sizes in ipc_validate_msg() | 2026-05-02T00:00:00.000Z | 2026-05-06T14:46:33.000Z |
| msrc_cve-2026-31706 | ksmbd: validate num_aces and harden ACE walk in smb_inherit_dacl() | 2026-05-02T00:00:00.000Z | 2026-05-06T14:44:59.000Z |
| msrc_cve-2026-31705 | ksmbd: fix out-of-bounds write in smb2_get_ea() EA alignment | 2026-05-02T00:00:00.000Z | 2026-05-04T14:40:30.000Z |
| msrc_cve-2026-31704 | ksmbd: use check_add_overflow() to prevent u16 DACL size overflow | 2026-05-02T00:00:00.000Z | 2026-05-04T14:40:55.000Z |
| msrc_cve-2026-31702 | f2fs: fix use-after-free of sbi in f2fs_compress_write_end_io() | 2026-05-02T00:00:00.000Z | 2026-05-04T14:41:01.000Z |
| msrc_cve-2026-31700 | net/packet: fix TOCTOU race on mmap'd vnet_hdr in tpacket_snd() | 2026-05-02T00:00:00.000Z | 2026-05-04T14:41:14.000Z |
| msrc_cve-2026-31699 | crypto: ccp: Don't attempt to copy CSR to userspace if PSP command failed | 2026-05-02T00:00:00.000Z | 2026-05-04T14:40:17.000Z |
| msrc_cve-2026-31698 | crypto: ccp: Don't attempt to copy PDH cert to userspace if PSP command failed | 2026-05-02T00:00:00.000Z | 2026-05-04T14:40:49.000Z |
| msrc_cve-2026-31697 | crypto: ccp: Don't attempt to copy ID to userspace if PSP command failed | 2026-05-02T00:00:00.000Z | 2026-05-04T14:39:59.000Z |
| msrc_cve-2026-31696 | rxrpc: Fix missing validation of ticket length in non-XDR key preparsing | 2026-05-02T00:00:00.000Z | 2026-05-04T14:40:43.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0046 | Kwetsbaarheden verholpen in Samsung mobile | 2026-02-09T07:48:28.751473Z | 2026-02-09T07:48:28.751473Z |
| ncsc-2026-0045 | Kwetsbaarheid verholpen in Cisco Meeting Management | 2026-02-06T09:22:16.831778Z | 2026-02-06T09:22:16.831778Z |
| ncsc-2026-0044 | Kwetsbaarheid verholpen in Cisco TelePresence Collaboration Endpoint | 2026-02-06T09:20:11.629058Z | 2026-02-06T09:20:11.629058Z |
| ncsc-2026-0043 | Zeroday-kwetsbaarheden verholpen in Ivanti Endpoint Manager Mobile | 2026-01-29T19:15:04.575371Z | 2026-02-20T14:47:02.047999Z |
| ncsc-2026-0042 | Kwetsbaarheden verholpen in SolarWinds Web Help Desk | 2026-01-28T16:37:21.114054Z | 2026-02-02T09:47:54.857445Z |
| ncsc-2026-0041 | Kwetsbaarheid verholpen in Fortinet producten | 2026-01-28T09:32:41.752905Z | 2026-01-28T09:32:41.752905Z |
| ncsc-2026-0040 | Kwetsbaarheid verholpen in SmarterTools SmarterMail | 2026-01-27T10:51:39.476320Z | 2026-02-06T09:25:57.008166Z |
| ncsc-2026-0039 | ZeroDay kwetsbaarheid verholpen in Microsoft Office | 2026-01-27T07:27:52.867415Z | 2026-01-27T07:27:52.867415Z |
| ncsc-2026-0038 | Kwetsbaarheid verholpen in BIND 9 | 2026-01-23T08:54:43.506215Z | 2026-01-23T08:54:43.506215Z |
| ncsc-2026-0037 | Kwetsbaarheden verholpen in GitLab Community Edition en Enterprise Edition | 2026-01-22T12:35:30.505659Z | 2026-01-22T12:35:30.505659Z |
| ncsc-2026-0036 | Kwetsbaarheden verholpen in Cisco Unified Communications producten | 2026-01-22T09:49:39.156365Z | 2026-01-22T09:49:39.156365Z |
| ncsc-2026-0035 | Kwetsbaarheid verholpen in Palo Alto Networks PAN-OS | 2026-01-22T09:22:36.433609Z | 2026-01-22T09:22:36.433609Z |
| ncsc-2026-0034 | Kwetsbaarheden verholpen in Atlassian producten | 2026-01-22T09:03:42.667958Z | 2026-01-22T09:03:42.667958Z |
| ncsc-2026-0033 | Kwetsbaarheid verholpen in GNU Inetutils telnetd | 2026-01-21T14:15:46.424529Z | 2026-01-21T14:15:46.424529Z |
| ncsc-2026-0032 | Kwetsbaarheden verholpen in Oracle MySQL | 2026-01-21T10:12:24.844869Z | 2026-01-21T10:12:24.844869Z |
| ncsc-2026-0031 | Kwetsbaarheden verholpen in Oracle JD Edwards | 2026-01-21T10:12:00.674214Z | 2026-01-21T10:12:00.674214Z |
| ncsc-2026-0030 | Kwetsbaarheden verholpen in Oracle Java | 2026-01-21T10:11:39.759123Z | 2026-01-21T10:11:39.759123Z |
| ncsc-2026-0029 | Kwetsbaarheden verholpen in Oracle Hyperion | 2026-01-21T10:10:46.297433Z | 2026-01-21T10:10:46.297433Z |
| ncsc-2026-0028 | Kwetsbaarheden verholpen in Oracle Analytics | 2026-01-21T10:10:15.985753Z | 2026-01-21T10:10:15.985753Z |
| ncsc-2026-0027 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2026-01-21T10:08:59.379774Z | 2026-01-21T10:08:59.379774Z |
| ncsc-2026-0026 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2026-01-21T10:06:27.920991Z | 2026-01-21T10:06:27.920991Z |
| ncsc-2026-0025 | Kwetsbaarheden verholpen in Oracle Financial Services | 2026-01-21T09:55:33.889125Z | 2026-01-21T09:55:33.889125Z |
| ncsc-2026-0024 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2026-01-21T09:29:38.334428Z | 2026-01-21T09:29:38.334428Z |
| ncsc-2026-0023 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2026-01-21T09:27:58.715578Z | 2026-01-21T09:27:58.715578Z |
| ncsc-2026-0022 | Kwetsbaarheden verholpen in Oracle Communications producten | 2026-01-21T09:25:39.876330Z | 2026-01-21T09:25:39.876330Z |
| ncsc-2026-0021 | Kwetsbaarheden verholpen in Oracle Database Server producten | 2026-01-21T09:19:00.000449Z | 2026-01-21T09:19:00.000449Z |
| ncsc-2026-0020 | Kwetsbaarheden verholpen in Oracle Commerce | 2026-01-21T09:18:16.268788Z | 2026-01-21T09:18:16.268788Z |
| ncsc-2026-0019 | Kwetsbaarheid verholpen in Fortinet FortiSIEM | 2026-01-16T13:34:34.467426Z | 2026-01-16T13:34:34.467426Z |
| ncsc-2026-0018 | Kwetsbaarheden verholpen in TYPO3 CMS | 2026-01-16T10:11:37.524826Z | 2026-01-16T10:11:37.524826Z |
| ncsc-2026-0017 | Kwetsbaarheden verholpen in Juniper Networks JunOS | 2026-01-16T10:07:39.310560Z | 2026-01-16T10:07:39.310560Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20619-1 | Security update for coredns | 2026-04-23T16:09:35Z | 2026-04-23T16:09:35Z |
| opensuse-su-2026:10604-1 | ruby4.0-rubygem-rack-session-2.1.2-1.1 on GA media | 2026-04-22T00:00:00Z | 2026-04-22T00:00:00Z |
| opensuse-su-2026:10603-1 | jupyter-nbconvert-7.17.1-1.1 on GA media | 2026-04-22T00:00:00Z | 2026-04-22T00:00:00Z |
| opensuse-su-2026:10602-1 | glances-common-4.5.4-1.1 on GA media | 2026-04-22T00:00:00Z | 2026-04-22T00:00:00Z |
| opensuse-su-2026:10601-1 | grafana-11.6.14+security01-1.1 on GA media | 2026-04-22T00:00:00Z | 2026-04-22T00:00:00Z |
| opensuse-su-2026:10600-1 | csync2-2.0+git.1600444747.83b3644-3.1 on GA media | 2026-04-22T00:00:00Z | 2026-04-22T00:00:00Z |
| opensuse-su-2026:10599-1 | cacti-1.2.30+git306.82d5aef5-1.1 on GA media | 2026-04-22T00:00:00Z | 2026-04-22T00:00:00Z |
| opensuse-su-2026:20595-1 | Security update for tomcat11 | 2026-04-21T11:43:18Z | 2026-04-21T11:43:18Z |
| opensuse-su-2026:20593-1 | Security update for libpng16 | 2026-04-21T09:59:18Z | 2026-04-21T09:59:18Z |
| opensuse-su-2026:20591-1 | Security update for GraphicsMagick | 2026-04-21T09:49:40Z | 2026-04-21T09:49:40Z |
| opensuse-su-2026:20592-1 | Security update for ghostscript | 2026-04-21T09:49:39Z | 2026-04-21T09:49:39Z |
| opensuse-su-2026:20598-1 | Security update for python-PyPDF2 | 2026-04-21T09:43:19Z | 2026-04-21T09:43:19Z |
| opensuse-su-2026:20590-1 | Security update for gnome-remote-desktop | 2026-04-21T09:37:03Z | 2026-04-21T09:37:03Z |
| opensuse-su-2026:10584-1 | rclone-1.73.5-1.1 on GA media | 2026-04-20T00:00:00Z | 2026-04-20T00:00:00Z |
| opensuse-su-2026:10583-1 | python311-pypdf-6.10.2-1.1 on GA media | 2026-04-20T00:00:00Z | 2026-04-20T00:00:00Z |
| opensuse-su-2026:10582-1 | python311-PyPDF2-2.11.1-9.1 on GA media | 2026-04-20T00:00:00Z | 2026-04-20T00:00:00Z |
| opensuse-su-2026:10581-1 | haproxy-3.3.6+git91.af5637e93-1.1 on GA media | 2026-04-20T00:00:00Z | 2026-04-20T00:00:00Z |
| opensuse-su-2026:10578-1 | tempo-cli-2.10.4-1.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10577-1 | skopeo-1.22.1-1.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10576-1 | python311-jwcrypto-1.5.7-2.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10575-1 | python311-Pillow-12.2.0-2.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10574-1 | jetty-annotations-9.4.58-4.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10573-1 | cpp-httplib-devel-0.42.0-1.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10572-1 | chromedriver-147.0.7727.101-1.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10571-1 | bouncycastle-1.84-1.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10570-1 | aardvark-dns-1.17.1-1.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10567-1 | python311-Django-5.2.13-1.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10566-1 | liblog4cxx-devel-1.7.0-2.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10565-1 | libraw-devel-0.22.1-1.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10564-1 | libpng16-16-1.6.57-1.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:13867 | Red Hat Security Advisory: rh-podman-desktop security update | 2026-05-05T19:15:48+00:00 | 2026-05-05T20:28:50+00:00 |
| rhsa-2026:13860 | Red Hat Security Advisory: LibRaw security update | 2026-05-05T19:06:18+00:00 | 2026-05-07T08:28:37+00:00 |
| rhsa-2026:13854 | Red Hat Security Advisory: LibRaw security update | 2026-05-05T18:59:39+00:00 | 2026-05-07T08:27:22+00:00 |
| rhsa-2026:13853 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.11.0 General Availability | 2026-05-05T18:18:49+00:00 | 2026-05-07T09:01:41+00:00 |
| rhsa-2026:13839 | Red Hat Security Advisory: nginx security update | 2026-05-05T18:16:43+00:00 | 2026-05-07T21:42:21+00:00 |
| rhsa-2026:13845 | Red Hat Security Advisory: webkit2gtk3 security update | 2026-05-05T18:15:28+00:00 | 2026-05-07T08:27:22+00:00 |
| rhsa-2026:13847 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.16.1 security update | 2026-05-05T17:55:36+00:00 | 2026-05-07T09:01:40+00:00 |
| rhsa-2026:13812 | Red Hat Security Advisory: updated RHEL-8 based Middleware Containers container images | 2026-05-05T17:47:50+00:00 | 2026-05-08T20:34:07+00:00 |
| rhsa-2026:13830 | Red Hat Security Advisory: dovecot security update | 2026-05-05T17:23:28+00:00 | 2026-05-05T20:30:36+00:00 |
| rhsa-2026:13831 | Red Hat Security Advisory: Red Hat Hardened Images RPMs Security Update | 2026-05-05T16:49:54+00:00 | 2026-05-05T20:36:13+00:00 |
| rhsa-2026:13829 | Red Hat Security Advisory: RHACS 4.10.2 security and bug fix update | 2026-05-05T16:27:09+00:00 | 2026-05-08T22:52:35+00:00 |
| rhsa-2026:13826 | Red Hat Security Advisory: Red Hat Developer Hub 1.9.4 release. | 2026-05-05T16:10:46+00:00 | 2026-05-07T21:42:17+00:00 |
| rhsa-2026:13791 | Red Hat Security Advisory: RHACS 4.9.6 security and bug fix update | 2026-05-05T15:33:29+00:00 | 2026-05-08T22:52:28+00:00 |
| rhsa-2026:13750 | Red Hat Security Advisory: openssh security update | 2026-05-05T14:30:03+00:00 | 2026-05-08T20:34:06+00:00 |
| rhsa-2026:13734 | Red Hat Security Advisory: kernel security update | 2026-05-05T13:20:25+00:00 | 2026-05-08T20:34:02+00:00 |
| rhsa-2026:13731 | Red Hat Security Advisory: sudo security update | 2026-05-05T12:40:12+00:00 | 2026-05-07T02:29:04+00:00 |
| rhsa-2026:13722 | Red Hat Security Advisory: Red Hat Hardened Images RPMs Security Update | 2026-05-05T11:37:28+00:00 | 2026-05-05T11:40:08+00:00 |
| rhsa-2026:13719 | Red Hat Security Advisory: Red Hat Hardened Images RPMs Security Update | 2026-05-05T11:30:45+00:00 | 2026-05-05T11:43:34+00:00 |
| rhsa-2026:13693 | Red Hat Security Advisory: .NET 8.0 security update | 2026-05-05T11:26:27+00:00 | 2026-05-05T14:49:52+00:00 |
| rhsa-2026:13692 | Red Hat Security Advisory: python3.11 security update | 2026-05-05T11:18:07+00:00 | 2026-05-07T08:27:16+00:00 |
| rhsa-2026:13677 | Red Hat Security Advisory: systemd security update | 2026-05-05T10:40:02+00:00 | 2026-05-07T14:34:43+00:00 |
| rhsa-2026:13680 | Red Hat Security Advisory: nginx security update | 2026-05-05T10:38:02+00:00 | 2026-05-07T21:42:17+00:00 |
| rhsa-2026:13673 | Red Hat Security Advisory: corosync security update | 2026-05-05T10:35:12+00:00 | 2026-05-06T20:37:06+00:00 |
| rhsa-2026:13672 | Red Hat Security Advisory: fence-agents security update | 2026-05-05T10:32:57+00:00 | 2026-05-06T09:05:51+00:00 |
| rhsa-2026:13671 | Red Hat Security Advisory: image-builder security update | 2026-05-05T10:29:37+00:00 | 2026-05-08T14:59:18+00:00 |
| rhsa-2026:13670 | Red Hat Security Advisory: python-tornado security update | 2026-05-05T10:29:23+00:00 | 2026-05-05T14:44:23+00:00 |
| rhsa-2026:13683 | Red Hat Security Advisory: firefox security update | 2026-05-05T10:25:39+00:00 | 2026-05-07T21:42:21+00:00 |
| rhsa-2026:13657 | Red Hat Security Advisory: corosync security update | 2026-05-05T10:22:37+00:00 | 2026-05-06T20:37:05+00:00 |
| rhsa-2026:13681 | Red Hat Security Advisory: kernel security update | 2026-05-05T10:20:32+00:00 | 2026-05-08T20:34:04+00:00 |
| rhsa-2026:13682 | Red Hat Security Advisory: firefox security update | 2026-05-05T10:18:37+00:00 | 2026-05-07T21:42:19+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2024-044-02 | Harmony Relay NFC | 2024-02-13T04:05:07.000Z | 2024-02-13T04:05:07.000Z |
| sevd-2024-009-02 | Easergy Studio | 2024-01-09T14:51:40.000Z | 2024-01-09T14:51:40.000Z |
| sevd-2023-346-03 | Easy UPS Online Monitoring Software | 2023-12-12T00:00:00.000Z | 2023-12-12T00:00:00.000Z |
| sevd-2023-346-02 | ProLeiT Plant iT/Brewmaxx | 2023-12-12T00:00:00.000Z | 2023-12-12T00:00:00.000Z |
| sevd-2023-346-01 | Trio™ Licensed and License-free Data Radios | 2023-12-12T00:00:00.000Z | 2024-04-09T00:00:00.000Z |
| sevd-2023-318-03 | Galaxy VS and Galaxy VL | 2023-11-14T08:28:19.000Z | 2024-04-09T00:00:00.000Z |
| sevd-2023-318-02 | EcoStruxure Power Monitoring Expert and EcoStruxure™ Power Operation with Advanced Reporting and Dashboards Module | 2023-11-14T00:00:00.000Z | 2023-11-14T00:00:00.000Z |
| sevd-2023-318-01 | PowerLogic ION8650, PowerLogic ION8800 | 2023-11-14T00:00:00.000Z | 2023-12-12T00:00:00.000Z |
| sevd-2023-283-02 | EcoStruxure Power Monitoring Expert and EcoStruxure™ Power | 2023-10-10T12:17:45.000Z | 2023-10-10T12:17:45.000Z |
| sevd-2023-283-01 | SpaceLogic C-Bus Toolkit | 2023-10-10T12:00:34.000Z | 2023-10-10T12:00:34.000Z |
| sevd-2023-255-01 | IGSS (Interactive Graphical SCADA System) | 2023-09-12T10:52:23.000Z | 2023-09-12T10:52:23.000Z |
| sevd-2023-220-01 | Pro-face GP-Pro EX | 2023-08-08T06:32:38.000Z | 2023-08-08T06:32:38.000Z |
| sevd-2023-192-01 | StruxureWare Data Center Expert | 2023-07-11T07:37:38.000Z | 2023-07-11T07:37:38.000Z |
| sevd-2023-192-04 | CODESYS Runtime Vulnerabilities | 2023-07-11T07:15:18.000Z | 2025-12-09T08:00:00.000Z |
| sevd-2023-192-02 | EcoStruxure™ OPC UA Server Expert | 2023-07-11T07:01:56.000Z | 2024-08-13T07:00:00.000Z |
| sevd-2023-192-03 | Accutech Manager | 2023-07-11T06:49:15.000Z | 2023-07-11T06:49:15.000Z |
| sevd-2023-164-03 | Foxboro SCADA | 2023-06-13T12:34:32.000Z | 2023-06-13T12:34:32.000Z |
| sevd-2023-164-02 | IGSS (Interactive Graphical SCADA System) | 2023-06-13T11:43:59.000Z | 2023-06-13T11:43:59.000Z |
| sevd-2023-164-04 | EcoStruxureTM Foxboro DCS Control Core Services | 2023-06-13T09:20:49.000Z | 2023-06-13T09:20:49.000Z |
| sevd-2023-164-01 | EcoStruxure™ Operator Terminal Expert and Pro-face BLUE | 2023-06-13T09:08:30.000Z | 2023-06-13T09:08:30.000Z |
| sevd-2023-129-01 | OPC Factory Server | 2023-05-09T16:33:38.000Z | 2023-05-09T16:33:38.000Z |
| sevd-2023-129-03 | PowerLogic ION7400 / PM8000 / ION9000 Power Meters | 2023-05-09T16:02:26.000Z | 2023-05-09T16:02:26.000Z |
| sevd-2023-129-02 | EcoStruxure™ Power SCADA Operation | 2023-05-09T11:52:40.000Z | 2023-05-09T11:52:40.000Z |
| sevd-2023-129-04 | Power SCADA Anywhere | 2023-05-09T08:00:55.000Z | 2023-05-09T08:00:55.000Z |
| sevd-2023-101-06 | Easergy Builder | 2023-04-11T14:20:02.000Z | 2023-04-11T14:20:02.000Z |
| sevd-2023-101-04 | Easy UPS Online Monitoring Software | 2023-04-11T14:09:13.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2023-101-02 | Conext™ Gateway/ InsightHome and InsightFacility | 2023-04-11T14:01:38.000Z | 2023-04-11T14:01:38.000Z |
| sevd-2023-101-01 | CODESYS Runtime Vulnerabilities | 2023-04-11T13:31:49.000Z | 2024-01-09T13:31:00.000Z |
| sevd-2023-101-03 | EcoStruxure™ Control Expert | 2023-04-11T10:14:15.000Z | 2024-01-09T10:14:00.000Z |
| sevd-2023-101-05 | Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-04-11T09:46:26.000Z | 2024-08-13T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-626991 | SSA-626991: Denial of Service Vulnerability in SIMATIC CN 4100 before V4.0 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-573669 | SSA-573669: Multiple Vulnerabilities in TIA Administrator Before V3.0.6 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-460466 | SSA-460466: Denial of Service Vulnerability in TIA Project-Server and TIA Portal | 2025-07-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-183963 | SSA-183963: Certificate Validation Vulnerabilities in SICAM TOOLBOX II Before V07.11 | 2025-07-08T00:00:00Z | 2025-07-18T00:00:00Z |
| ssa-091753 | SSA-091753: Multiple Vulnerabilities in Solid Edge Before SE2025 Update 5 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-083019 | SSA-083019: Multiple Vulnerabilities in RUGGEDCOM ROS Devices | 2025-07-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-078892 | SSA-078892: Multiple Vulnerabilities in SINEC NMS Before V4.0 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-627195 | SSA-627195: Zip Path Traversal Vulnerability in Mendix Studio Pro's Module Installation Process | 2025-06-12T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-693776 | SSA-693776: Multiple Vulnerabilities in Industrial Communication Devices based on SINEC OS before V3.2 | 2025-06-10T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-633269 | SSA-633269: Incorrect Authorization Check Vulnerability in Industrial Communication Devices based on SINEC OS before V3.1 | 2025-06-10T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-513708 | SSA-513708: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices | 2025-06-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-486186 | SSA-486186: Out of Bounds Read Vulnerability in Tecnomatix Plant Simulation Before 2404 | 2025-06-10T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-345750 | SSA-345750: Default Credentials in Energy Services Using Elspec G5DFR | 2025-06-10T00:00:00Z | 2025-06-16T00:00:00Z |
| ssa-082556 | SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 | 2025-06-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-367714 | SSA-367714: Improper Integrity Check of Firmware Updates in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2025-05-23T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-041082 | SSA-041082: Out of Bounds Read Vulnerability in SiPass Integrated Before V2.95.3.18 | 2025-05-23T00:00:00Z | 2025-05-23T00:00:00Z |
| ssa-552330 | SSA-552330: System Configuration Password Reset in Siveillance Video V2024 R1 | 2025-05-14T00:00:00Z | 2025-05-14T00:00:00Z |
| ssa-901508 | SSA-901508: Multiple Vulnerabilities in INTRALOG WMS Before V5 | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-864900 | SSA-864900: Multiple Vulnerabilities in Fortigate NGFW on RUGGEDCOM APE1808 Devices | 2025-05-13T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-828116 | SSA-828116: Denial of Service Vulnerability in BACnet ATEC Devices | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-794185 | SSA-794185: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SIPROTEC, SICAM and Related Products | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-726617 | SSA-726617: Incorrect Privilege Assignment Vulnerability in Mendix OIDC SSO Module | 2025-05-13T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-718393 | SSA-718393: Partial Denial of Service Vulnerability in APOGEE PXC and TALON TC Series (BACnet) Devices | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-668154 | SSA-668154: Denial of Service Vulnerability in MS/TP Point Pickup Module | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-614723 | SSA-614723: Denial of Service Vulnerabilities in User Management Component (UMC) | 2025-05-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-556937 | SSA-556937: Multiple Vulnerabilities in VersiCharge AC Series EV Chargers | 2025-05-13T00:00:00Z | 2025-05-14T00:00:00Z |
| ssa-542540 | SSA-542540: Out of Bounds Read Vulnerability in Teamcenter Visualization | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-523418 | SSA-523418: Information Disclosure Vulnerability in Desigo CC | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-446307 | SSA-446307: Authentication Bypass Vulnerability in BMC (CVE-2024-54085) affects SIMATIC IPC RS-828A | 2025-05-13T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-339086 | SSA-339086: Insufficient Session Expiration Vulnerability in SIMATIC PCS neo | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21467-1 | Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T12:51:00Z | 2026-05-05T12:51:00Z |
| suse-su-2026:1692-1 | Security update for xen | 2026-05-05T08:03:58Z | 2026-05-05T08:03:58Z |
| suse-su-2026:1691-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise 15 SP7) | 2026-05-05T07:04:40Z | 2026-05-05T07:04:40Z |
| suse-su-2026:1690-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise 15 SP7) | 2026-05-05T06:34:37Z | 2026-05-05T06:34:37Z |
| suse-su-2026:1689-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise 15 SP7) | 2026-05-05T06:34:34Z | 2026-05-05T06:34:34Z |
| suse-su-2026:1686-1 | Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 15 SP7) | 2026-05-05T06:34:25Z | 2026-05-05T06:34:25Z |
| suse-su-2026:1684-1 | Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-05-05T06:34:20Z | 2026-05-05T06:34:20Z |
| suse-su-2026:1671-2 | Security update for the Linux Kernel | 2026-05-04T09:19:31Z | 2026-05-04T09:19:31Z |
| suse-su-2026:1678-1 | Security update for the Linux Kernel | 2026-05-02T10:27:10Z | 2026-05-02T10:27:10Z |
| suse-su-2026:1677-1 | Security update for the Linux Kernel | 2026-05-02T10:26:10Z | 2026-05-02T10:26:10Z |
| suse-su-2026:21443-1 | Security update for the Linux Kernel | 2026-05-02T10:03:34Z | 2026-05-02T10:03:34Z |
| suse-su-2026:21457-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_20 | 2026-05-02T08:51:37Z | 2026-05-02T08:51:37Z |
| suse-su-2026:21444-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_20 | 2026-05-02T08:51:37Z | 2026-05-02T08:51:37Z |
| suse-su-2026:21463-1 | Security update for the Linux Kernel | 2026-05-02T08:18:13Z | 2026-05-02T08:18:13Z |
| suse-su-2026:21439-1 | Security update for the Linux Kernel | 2026-05-02T08:18:13Z | 2026-05-02T08:18:13Z |
| suse-su-2026:21454-1 | Security update for the Linux Kernel | 2026-05-02T08:10:07Z | 2026-05-02T08:10:07Z |
| suse-su-2026:1676-1 | Security update for the Linux Kernel | 2026-05-02T07:19:34Z | 2026-05-02T07:19:34Z |
| suse-su-2026:1675-1 | Security update for the Linux Kernel | 2026-05-02T07:19:20Z | 2026-05-02T07:19:20Z |
| suse-su-2026:1674-1 | Security update for the Linux Kernel | 2026-05-02T07:19:11Z | 2026-05-02T07:19:11Z |
| suse-su-2026:21421-1 | Security update for the Linux Kernel | 2026-05-02T07:09:30Z | 2026-05-02T07:09:30Z |
| suse-su-2026:1672-1 | Security update for the Linux Kernel | 2026-05-02T06:02:50Z | 2026-05-02T06:02:50Z |
| suse-su-2026:1671-1 | Security update for the Linux Kernel | 2026-05-02T06:01:05Z | 2026-05-02T06:01:05Z |
| suse-su-2026:1670-1 | Security update for the Linux Kernel | 2026-05-02T05:53:40Z | 2026-05-02T05:53:40Z |
| suse-su-2026:1669-1 | Security update for the Linux Kernel | 2026-05-02T05:38:43Z | 2026-05-02T05:38:43Z |
| suse-su-2026:21442-1 | Security update for the Linux Kernel | 2026-05-01T23:16:53Z | 2026-05-01T23:16:53Z |
| suse-su-2026:21453-1 | Security update for the Linux Kernel | 2026-05-01T22:29:58Z | 2026-05-01T22:29:58Z |
| suse-su-2026:21456-1 | Security update for kernel-livepatch-MICRO-6-0_Update_19 | 2026-05-01T21:26:43Z | 2026-05-01T21:26:43Z |
| suse-su-2026:21441-1 | Security update for kernel-livepatch-MICRO-6-0_Update_19 | 2026-05-01T21:26:43Z | 2026-05-01T21:26:43Z |
| suse-su-2026:1668-1 | Security update for the Linux Kernel | 2026-05-01T08:37:51Z | 2026-05-01T08:37:51Z |
| suse-su-2026:1667-1 | Security update for python-Pygments | 2026-04-30T17:22:44Z | 2026-04-30T17:22:44Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:8863 | Important: OpenEXR security update | 2026-04-20T00:00:00Z | 2026-04-30T07:37:50Z |
| alsa-2026:8861 | Important: giflib security update | 2026-04-20T00:00:00Z | 2026-04-30T07:36:08Z |
| alsa-2026:8859 | Important: giflib security update | 2026-04-20T00:00:00Z | 2026-04-30T07:34:34Z |
| alsa-2026:8858 | Important: giflib security update | 2026-04-20T00:00:00Z | 2026-04-20T08:28:56Z |
| alsa-2026:8842 | Important: delve security update | 2026-04-20T00:00:00Z | 2026-04-20T08:31:59Z |
| alsa-2026:8841 | Important: go-rpm-macros security update | 2026-04-20T00:00:00Z | 2026-04-20T08:33:18Z |
| alsa-2026:8840 | Important: go-rpm-macros security update | 2026-04-20T00:00:00Z | 2026-04-20T08:35:06Z |
| alsa-2026:8534 | Important: libarchive security update | 2026-04-16T00:00:00Z | 2026-04-20T08:36:26Z |
| alsa-2026:8510 | Important: libarchive security update | 2026-04-16T00:00:00Z | 2026-04-17T11:10:09Z |
| alsa-2026:8492 | Important: libarchive security update | 2026-04-16T00:00:00Z | 2026-04-17T09:27:24Z |
| alsa-2026:8475 | Important: .NET 9.0 security update | 2026-04-16T00:00:00Z | 2026-04-20T08:40:30Z |
| alsa-2026:8473 | Important: .NET 10.0 security update | 2026-04-16T00:00:00Z | 2026-04-20T08:43:11Z |
| alsa-2026:8472 | Important: .NET 9.0 security update | 2026-04-16T00:00:00Z | 2026-04-17T09:30:19Z |
| alsa-2026:8470 | Important: .NET 8.0 security update | 2026-04-16T00:00:00Z | 2026-04-17T09:34:29Z |
| alsa-2026:8469 | Important: .NET 8.0 security update | 2026-04-16T00:00:00Z | 2026-04-17T11:12:30Z |
| alsa-2026:8468 | Important: .NET 8.0 security update | 2026-04-16T00:00:00Z | 2026-04-20T08:45:13Z |
| alsa-2026:8459 | Important: thunderbird security update | 2026-04-16T00:00:00Z | 2026-04-17T12:06:47Z |
| alsa-2026:8458 | Important: freerdp security update | 2026-04-16T00:00:00Z | 2026-04-17T09:35:48Z |
| alsa-2026:8457 | Important: freerdp security update | 2026-04-16T00:00:00Z | 2026-04-17T12:08:37Z |
| alsa-2026:8456 | Important: osbuild-composer security update | 2026-04-16T00:00:00Z | 2026-04-24T10:09:11Z |
| alsa-2026:8352 | Important: bind security update | 2026-04-15T00:00:00Z | 2026-04-16T10:03:27Z |
| alsa-2026:8339 | Important: nodejs:20 security update | 2026-04-15T00:00:00Z | 2026-04-16T10:12:34Z |
| alsa-2026:8317 | Important: squid:4 security update | 2026-04-15T00:00:00Z | 2026-04-16T10:06:56Z |
| alsa-2026:8312 | Important: bind security update | 2026-04-15T00:00:00Z | 2026-04-16T10:09:13Z |
| alsa-2026:8259 | Important: vim security update | 2026-04-15T00:00:00Z | 2026-04-15T10:37:43Z |
| alsa-2026:8155 | Important: bind9.16 security update | 2026-04-14T00:00:00Z | 2026-04-15T07:13:08Z |
| alsa-2026:8119 | Important: squid security update | 2026-04-14T00:00:00Z | 2026-04-15T07:19:29Z |
| alsa-2026:8096 | Moderate: perl:5.32 security update | 2026-04-14T00:00:00Z | 2026-04-15T10:32:31Z |
| alsa-2026:8093 | Moderate: pcs security update | 2026-04-14T00:00:00Z | 2026-04-16T10:10:22Z |
| alsa-2026:8075 | Important: bind security update | 2026-04-14T00:00:00Z | 2026-04-15T08:24:53Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2026-87 | Security exception in org.apache.poi.util.IOUtils.safelyAllocate | 2026-01-18T00:18:36.932063Z | 2026-01-20T14:24:38.539978Z |
| osv-2026-86 | Security exception in java.base/java.util.Arrays.copyOfRange | 2026-01-18T00:18:18.214799Z | 2026-01-18T00:18:18.215108Z |
| osv-2025-1061 | Security exception in org.apache.poi.hssf.record.aggregates.SharedValueManager$SharedFormulaGroup.<ini | 2026-01-18T00:03:40.245475Z | 2026-01-21T14:26:21.135983Z |
| osv-2025-1059 | Security exception in com.google.re2j.Machine.add | 2026-01-18T00:02:23.827422Z | 2026-04-20T14:15:42.315180Z |
| osv-2026-76 | Security exception in org.htmlunit.cyberneko.HTMLTagBalancer.endElement | 2026-01-18T00:02:11.715201Z | 2026-05-06T14:36:18.326705Z |
| osv-2026-74 | Heap-buffer-overflow in ___interceptor_strtol | 2026-01-17T00:19:48.575833Z | 2026-01-17T00:19:48.576151Z |
| osv-2026-57 | Heap-buffer-overflow in mkv::matroska_segment_c::TrackInit | 2026-01-15T00:19:47.203374Z | 2026-01-15T00:19:47.203695Z |
| osv-2026-55 | Use-of-uninitialized-value in vp9_quantize_fp_avx2 | 2026-01-15T00:19:29.465463Z | 2026-01-15T00:19:29.465794Z |
| osv-2026-54 | Heap-use-after-free in _dwarf_exec_frame_instr | 2026-01-15T00:17:17.477757Z | 2026-01-15T00:17:17.478056Z |
| osv-2026-53 | Heap-use-after-free in graph::LigatureSubstFormat1::shrink | 2026-01-15T00:16:26.117926Z | 2026-01-15T00:16:26.118291Z |
| osv-2026-49 | Heap-buffer-overflow in check_sync_pes | 2026-01-15T00:11:33.030721Z | 2026-01-15T00:11:33.030957Z |
| osv-2026-44 | UNKNOWN READ in MP4_TrackSeek | 2026-01-14T00:20:29.876694Z | 2026-01-14T00:20:29.877019Z |
| osv-2026-36 | Heap-buffer-overflow in iTUNTripletCallback | 2026-01-13T00:01:43.125437Z | 2026-01-13T00:01:43.125952Z |
| osv-2026-30 | Use-of-uninitialized-value in vp9_quantize_fp_avx2 | 2026-01-11T00:08:32.391680Z | 2026-01-11T00:08:32.392050Z |
| osv-2026-21 | Use-of-uninitialized-value in processTLSBlock | 2026-01-09T00:20:25.200679Z | 2026-01-09T00:20:25.201303Z |
| osv-2026-2 | Heap-buffer-overflow in cmt_mpack_consume_uint_tag | 2026-01-03T00:15:15.907754Z | 2026-01-03T00:15:15.908130Z |
| osv-2025-1049 | Heap-buffer-overflow in unsigned char* std::__1::vector<unsigned char, std::__1::allocator<unsigned char | 2025-12-31T00:18:06.669541Z | 2025-12-31T00:18:06.670109Z |
| osv-2025-1039 | UNKNOWN WRITE in fuzz_regexp | 2025-12-29T00:18:31.417791Z | 2025-12-29T00:18:31.418390Z |
| osv-2025-1020 | Heap-buffer-overflow in mmcall | 2025-12-25T00:17:49.020029Z | 2026-04-23T14:26:53.545771Z |
| osv-2025-1018 | Stack-buffer-overflow in lre_exec | 2025-12-25T00:02:56.807884Z | 2025-12-25T00:02:56.808867Z |
| osv-2025-1016 | Use-of-uninitialized-value in js_create_function | 2025-12-24T00:15:30.844439Z | 2025-12-24T00:15:30.844983Z |
| osv-2025-1004 | Security exception in com.code_intelligence.jazzer.sanitizers.RegexInjection.hookInternal | 2025-12-21T00:18:27.214786Z | 2025-12-21T00:18:27.215115Z |
| osv-2025-1001 | Dynamic-stack-buffer-overflow in _ox_err_set_with_location | 2025-12-21T00:04:56.743119Z | 2025-12-21T00:04:56.743638Z |
| osv-2025-994 | Heap-buffer-overflow in rx_icmp | 2025-12-18T00:00:43.710332Z | 2025-12-21T14:32:46.078182Z |
| osv-2025-989 | Bad-cast to UT_hash_bucket' (aka 'struct UT_hash_bucket')password_file__cleanup | 2025-12-17T00:01:12.806838Z | 2025-12-17T00:01:12.807184Z |
| osv-2025-983 | Dynamic-stack-buffer-overflow in _ox_err_set_with_location | 2025-12-14T00:14:21.963982Z | 2025-12-14T00:14:21.964726Z |
| osv-2025-970 | Heap-buffer-overflow in check_sync_pes | 2025-12-05T00:18:22.703657Z | 2025-12-05T00:18:22.704029Z |
| osv-2025-965 | Stack-use-after-scope in Assimp::FBX::FBXExportProperty::FBXExportProperty | 2025-12-04T00:10:11.975493Z | 2025-12-04T00:10:11.975920Z |
| osv-2025-959 | Heap-buffer-overflow in re_parse_term | 2025-11-29T00:18:54.036831Z | 2025-11-29T00:18:54.037236Z |
| osv-2025-955 | Use-of-uninitialized-value in decoder_context::construct_reference_picture_lists | 2025-11-29T00:15:46.812919Z | 2025-11-29T00:15:46.813402Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0021 | Panic adding excessive fields to a `wasi:http/types.fields` instance | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0020 | Guest-controlled resource exhaustion in WASI implementations | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0019 | `tracing-check` was removed from crates.io for malicious code | 2026-02-24T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0018 | `rpc-check` was removed from crates.io for malicious code | 2026-02-24T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0017 | `clob-sdk` was removed from crates.io for malicious code | 2026-02-20T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0016 | `polymarkets-rs-clob-client` was removed from crates.io for malicious code | 2026-02-20T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0015 | `polymarkets-client-sdk` was removed from crates.io for malicious code | 2026-02-19T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0014 | `rpc-check` was removed from crates.io for malicious code | 2026-02-19T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0013 | Type confusion when accessing data from sublasses of subclasses of native types with `abi3` feature targeting Python 3.12 and up | 2026-02-18T12:00:00Z | 2026-02-23T07:15:28Z |
| rustsec-2026-0011 | `polymarket-client-sdks` was removed from crates.io for malicious code | 2026-02-13T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0012 | Unsoundness in opt-in ARMv8 assembly backend for `keccak` | 2026-02-12T12:00:00Z | 2026-02-20T04:00:15Z |
| rustsec-2026-0070 | Panic When Opening or Sealing on Export-Only Context | 2026-02-11T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0069 | Incorrect Length Encoding on KDF Export | 2026-02-11T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0025 | Panic in `libcrux-psq` on decryption of malformed AES-GCM ciphertext | 2026-02-08T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0010 | `polymarket-clients-sdk` was removed from crates.io for malicious code | 2026-02-06T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0071 | Nonce Reuse in HPKE Context | 2026-02-05T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0026 | Unnecessary clamping of seed reduces seed entropy to 251 bits | 2026-02-05T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0009 | Denial of Service via Stack Exhaustion | 2026-02-05T12:00:00Z | 2026-02-06T09:12:16Z |
| rustsec-2026-0072 | Missing Check for All-Zero X25519 Shared Secret | 2026-02-04T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0007 | Integer overflow in `BytesMut::reserve` | 2026-02-03T12:00:00Z | 2026-02-04T06:56:11Z |
| rustsec-2026-0008 | Potential undefined behavior when dereferencing Buf struct | 2026-02-02T12:00:00Z | 2026-02-05T06:08:13Z |
| rustsec-2026-0024 | Incorrect X25519 clamping check rejects all secrets on import | 2026-01-26T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0023 | X25519 secret validation did not check buffer length or clamping | 2026-01-26T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0006 | Wasmtime segfault or unused out-of-sandbox load with `f64.copysign` operator on x86-64 | 2026-01-26T12:00:00Z | 2026-01-30T05:41:11Z |
| rustsec-2026-0005 | Potential use-after-free in `oneshot` when used asynchronously | 2026-01-25T12:00:00Z | 2026-01-27T05:50:51Z |
| rustsec-2026-0079 | `DynFuture` drop can construct a dangling reference | 2026-01-21T12:00:00Z | 2026-04-05T05:30:42Z |
| rustsec-2026-0004 | Triton VM Soundness Vulnerability due to Improper Sampling of Randomness | 2026-01-21T12:00:00Z | 2026-01-23T05:50:29Z |
| rustsec-2026-0080 | Multiple soundness issues in `scaly` safe APIs | 2026-01-19T12:00:00Z | 2026-04-05T05:30:42Z |
| rustsec-2026-0003 | Non-constant-time code generation on ARM32 targets | 2026-01-14T12:00:00Z | 2026-01-15T17:45:42Z |
| rustsec-2026-0002 | `IterMut` violates Stacked Borrows by invalidating internal pointer | 2026-01-07T12:00:00Z | 2026-01-08T05:46:06Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-jre-2024-21004 | 2026-05-08T05:45:59.846Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21003 | 2026-05-08T05:45:58.214Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21002 | 2026-05-08T05:45:56.727Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20952 | 2026-05-08T05:45:55.153Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20945 | 2026-05-08T05:45:53.506Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20932 | 2026-05-08T05:45:52.171Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20926 | 2026-05-08T05:45:50.722Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20925 | 2026-05-08T05:45:49.200Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20923 | 2026-05-08T05:45:47.675Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20922 | 2026-05-08T05:45:46.134Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20921 | 2026-05-08T05:45:44.579Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20919 | 2026-05-08T05:45:43.034Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20918 | 2026-05-08T05:45:41.638Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-42950 | 2026-05-08T05:45:40.029Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-42917 | 2026-05-08T05:45:38.575Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-41993 | 2026-05-08T05:45:36.919Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-41074 | 2026-05-08T05:45:35.287Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-25193 | 2026-05-08T05:45:33.646Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22081 | 2026-05-08T05:45:31.965Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22067 | 2026-05-08T05:45:30.427Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22049 | 2026-05-08T05:45:28.960Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22045 | 2026-05-08T05:45:27.443Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22044 | 2026-05-08T05:45:25.769Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22043 | 2026-05-08T05:45:24.280Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22041 | 2026-05-08T05:45:22.740Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22036 | 2026-05-08T05:45:21.195Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22025 | 2026-05-08T05:45:19.703Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22006 | 2026-05-08T05:45:18.121Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-21968 | 2026-05-08T05:45:16.564Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-21967 | 2026-05-08T05:45:14.997Z | 2026-05-08T06:11:36.072Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-nz97711 | gRPC-Go is the Go language implementation of gRPC | 2026-04-10T01:00:58.666965Z | 2026-04-09T09:33:10Z |
| cleanstart-2026-mu81308 | gRPC-Go is the Go language implementation of gRPC | 2026-04-10T00:56:28.601214Z | 2026-04-09T11:29:32Z |
| cleanstart-2026-ng75665 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-10T00:56:28.527348Z | 2026-04-09T11:53:35Z |
| cleanstart-2026-in87004 | In libexpat before 2 | 2026-04-10T00:52:28.484967Z | 2026-04-09T11:45:48Z |
| cleanstart-2026-bm53321 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-10T00:51:58.426076Z | 2026-04-09T11:53:35Z |
| cleanstart-2026-ag20129 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-10T00:51:29.221302Z | 2026-04-09T11:45:48Z |
| cleanstart-2026-dk61762 | filippo | 2026-04-10T00:51:28.611547Z | 2026-04-09T11:46:58Z |
| cleanstart-2026-ar20742 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-10T00:51:28.608050Z | 2026-04-09T11:46:58Z |
| cleanstart-2026-cd13174 | gRPC-Go is the Go language implementation of gRPC | 2026-04-10T00:49:58.731115Z | 2026-04-09T11:52:13Z |
| cleanstart-2026-ng28268 | gRPC-Go is the Go language implementation of gRPC | 2026-04-10T00:47:58.418185Z | 2026-04-09T11:52:13Z |
| cleanstart-2026-jy63371 | Delete function fails to properly validate offsets when processing malformed JSON input | 2026-04-10T00:45:58.478015Z | 2026-04-09T11:52:13Z |
| cleanstart-2026-ay21238 | security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions enforced by network policies during namespace deletion | 2026-04-10T00:37:58.214935Z | 2026-04-09T11:56:50Z |
| cleanstart-2026-ij23041 | In libexpat before 2 | 2026-04-09T01:01:38.269615Z | 2026-04-08T06:46:14Z |
| cleanstart-2026-ge08280 | Ruby JSON is a JSON implementation for Ruby | 2026-04-09T01:01:38.909372Z | 2026-04-08T08:04:46Z |
| cleanstart-2026-mw52739 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-09T00:59:39.080550Z | 2026-04-08T06:46:14Z |
| cleanstart-2026-ki25096 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-09T00:59:38.592849Z | 2026-04-08T06:46:14Z |
| cleanstart-2026-gy86690 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-09T00:57:57.606656Z | 2026-04-08T06:46:14Z |
| cleanstart-2026-ba09462 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-04-09T00:57:38.077873Z | 2026-04-08T07:00:07Z |
| cleanstart-2026-ot38160 | url | 2026-04-09T00:55:38.018075Z | 2026-04-08T07:36:24Z |
| cleanstart-2026-cq39708 | Netty is an asynchronous, event-driven network application framework | 2026-04-09T00:53:38.262441Z | 2026-04-08T08:11:56Z |
| cleanstart-2026-iw08736 | Uncontrolled Recursion vulnerability in Apache Commons Lang | 2026-04-09T00:53:08.467045Z | 2026-04-08T09:19:34Z |
| cleanstart-2026-oq84658 | Netty is an asynchronous, event-driven network application framework | 2026-04-09T00:52:07.697782Z | 2026-04-08T08:14:27Z |
| cleanstart-2026-bg72514 | Uncontrolled Recursion vulnerability in Apache Commons Lang | 2026-04-09T00:49:38.775284Z | 2026-04-08T09:13:42Z |
| cleanstart-2026-mo53190 | gRPC-Go is the Go language implementation of gRPC | 2026-04-09T00:49:37.904336Z | 2026-04-08T09:47:14Z |
| cleanstart-2026-mi26424 | net/url package does not set a limit on the number of query parameters in a query | 2026-04-09T00:48:07.244191Z | 2026-04-08T09:30:12Z |
| cleanstart-2026-co68219 | Docker CLI for Windows searches for plugin binaries in C:\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ProgramData\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\Docker\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\cli-plugins, a directory that does not exist by default | 2026-04-09T00:47:37.444297Z | 2026-04-08T09:44:10Z |
| cleanstart-2026-by59711 | gRPC-Go is the Go language implementation of gRPC | 2026-04-09T00:47:37.687304Z | 2026-04-08T09:36:51Z |
| cleanstart-2026-hz73294 | Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service | 2026-04-09T00:45:08.400884Z | 2026-04-08T10:12:22Z |
| cleanstart-2026-bd18029 | Docker CLI for Windows searches for plugin binaries in C:\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ProgramData\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\Docker\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\cli-plugins, a directory that does not exist by default | 2026-04-09T00:45:07.480117Z | 2026-04-08T09:49:10Z |
| cleanstart-2026-nv37937 | Docker CLI for Windows searches for plugin binaries in C:\\\\\\\\ProgramData\\\\\\\\Docker\\\\\\\\cli-plugins, a directory that does not exist by default | 2026-04-09T00:44:07.747698Z | 2026-04-08T09:58:55Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2023-ALE-015 | [MàJ] Campagne d'exploitation d'une vulnérabilité affectant VMware ESXi | 2023-02-03T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-014 | Multiples vulnérabilités dans AMI MegaRAC | 2022-12-16T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2022-ALE-014 | Multiples vulnérabilités dans AMI MegaRAC | 2022-12-16T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2022-ale-013 | [MàJ] Vulnérabilité dans Citrix ADC et Gateway | 2022-12-13T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-012 | [MàJ] Vulnérabilité dans FortiOS SSL-VPN | 2022-12-13T00:00:00.000000 | 2022-12-20T00:00:00.000000 |
| CERTFR-2022-ALE-013 | [MàJ] Vulnérabilité dans Citrix ADC et Gateway | 2022-12-13T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-012 | [MàJ] Vulnérabilité dans FortiOS SSL-VPN | 2022-12-13T00:00:00.000000 | 2022-12-20T00:00:00.000000 |
| certfr-2022-ale-011 | Vulnérabilité dans les produits Fortinet | 2022-10-14T00:00:00.000000 | 2022-10-14T00:00:00.000000 |
| CERTFR-2022-ALE-011 | Vulnérabilité dans les produits Fortinet | 2022-10-14T00:00:00.000000 | 2022-10-14T00:00:00.000000 |
| certfr-2022-ale-010 | Multiples vulnérabilités dans GLPI | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-009 | [MaJ] Vulnérabilité dans Zimbra Collaboration | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-010 | Multiples vulnérabilités dans GLPI | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-009 | [MaJ] Vulnérabilité dans Zimbra Collaboration | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-008 | [MaJ] Multiples vulnérabilités dans Microsoft Exchange | 2022-09-30T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-008 | [MaJ] Multiples vulnérabilités dans Microsoft Exchange | 2022-09-30T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-007 | Multiples vulnérabilités dans Microsoft Windows | 2022-09-16T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-007 | Multiples vulnérabilités dans Microsoft Windows | 2022-09-16T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-006 | [MàJ] Vulnérabilité dans Atlassian Confluence | 2022-06-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| CERTFR-2022-ALE-006 | [MàJ] Vulnérabilité dans Atlassian Confluence | 2022-06-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| certfr-2022-ale-005 | [MàJ] Vulnérabilité dans Microsoft Windows | 2022-05-31T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| CERTFR-2022-ALE-005 | [MàJ] Vulnérabilité dans Microsoft Windows | 2022-05-31T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| certfr-2022-ale-004 | Vulnérabilité dans F5 BIG-IP | 2022-05-11T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| CERTFR-2022-ALE-004 | Vulnérabilité dans F5 BIG-IP | 2022-05-11T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| certfr-2022-ale-003 | [MàJ] Vulnérabilité dans l'implémentation du protocole RPC par Microsoft | 2022-04-13T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2022-ALE-003 | [MàJ] Vulnérabilité dans l'implémentation du protocole RPC par Microsoft | 2022-04-13T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2022-ale-002 | Vulnérabilité dans VMware Spring Cloud Gateway | 2022-03-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| CERTFR-2022-ALE-002 | Vulnérabilité dans VMware Spring Cloud Gateway | 2022-03-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| certfr-2022-ale-001 | [MaJ] Vulnérabilité dans Microsoft Windows | 2022-01-12T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2022-ALE-001 | [MaJ] Vulnérabilité dans Microsoft Windows | 2022-01-12T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-022 | [MaJ] Vulnérabilité dans Apache Log4j | 2021-12-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0462 | Multiples vulnérabilités dans Microsoft Edge | 2026-04-20T00:00:00.000000 | 2026-04-20T00:00:00.000000 |
| certfr-2026-avi-0461 | Multiples vulnérabilités dans Apache Kafka | 2026-04-20T00:00:00.000000 | 2026-04-20T00:00:00.000000 |
| certfr-2026-avi-0460 | Vulnérabilité dans Xen | 2026-04-20T00:00:00.000000 | 2026-04-20T00:00:00.000000 |
| certfr-2026-avi-0459 | Vulnérabilité dans Mattermost Server | 2026-04-20T00:00:00.000000 | 2026-04-20T00:00:00.000000 |
| certfr-2026-avi-0458 | Vulnérabilité dans les produits Moxa | 2026-04-20T00:00:00.000000 | 2026-04-20T00:00:00.000000 |
| certfr-2026-avi-0457 | Multiples vulnérabilités dans Spring Framework | 2026-04-20T00:00:00.000000 | 2026-04-20T00:00:00.000000 |
| certfr-2026-avi-0456 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-17T00:00:00.000000 | 2026-04-17T00:00:00.000000 |
| certfr-2026-avi-0455 | Multiples vulnérabilités dans IBM QRadar | 2026-04-17T00:00:00.000000 | 2026-04-17T00:00:00.000000 |
| certfr-2026-avi-0454 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-04-17T00:00:00.000000 | 2026-04-17T00:00:00.000000 |
| certfr-2026-avi-0453 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-04-17T00:00:00.000000 | 2026-04-17T00:00:00.000000 |
| certfr-2026-avi-0452 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-04-17T00:00:00.000000 | 2026-04-17T00:00:00.000000 |
| certfr-2026-avi-0451 | Multiples vulnérabilités dans les produits Cisco | 2026-04-16T00:00:00.000000 | 2026-04-16T00:00:00.000000 |
| certfr-2026-avi-0450 | Multiples vulnérabilités dans les produits Splunk | 2026-04-16T00:00:00.000000 | 2026-04-16T00:00:00.000000 |
| certfr-2026-avi-0449 | Vulnérabilité dans Apache Kafka | 2026-04-16T00:00:00.000000 | 2026-04-16T00:00:00.000000 |
| certfr-2026-avi-0448 | Multiples vulnérabilités dans Google Chrome | 2026-04-16T00:00:00.000000 | 2026-04-16T00:00:00.000000 |
| certfr-2026-avi-0447 | Multiples vulnérabilités dans Drupal | 2026-04-16T00:00:00.000000 | 2026-04-16T00:00:00.000000 |
| certfr-2026-avi-0446 | Multiples vulnérabilités dans Mattermost Server | 2026-04-16T00:00:00.000000 | 2026-04-17T00:00:00.000000 |
| certfr-2026-avi-0445 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-15T00:00:00.000000 | 2026-04-15T00:00:00.000000 |
| certfr-2026-avi-0444 | Multiples vulnérabilités dans Microsoft Azure | 2026-04-15T00:00:00.000000 | 2026-04-15T00:00:00.000000 |
| certfr-2026-avi-0443 | Multiples vulnérabilités dans Microsoft .Net | 2026-04-15T00:00:00.000000 | 2026-04-15T00:00:00.000000 |
| certfr-2026-avi-0442 | Multiples vulnérabilités dans Microsoft Windows | 2026-04-15T00:00:00.000000 | 2026-04-15T00:00:00.000000 |
| certfr-2026-avi-0441 | Multiples vulnérabilités dans Microsoft Office | 2026-04-15T00:00:00.000000 | 2026-04-15T00:00:00.000000 |
| certfr-2026-avi-0440 | Multiples vulnérabilités dans les produits Fortinet | 2026-04-15T00:00:00.000000 | 2026-04-15T00:00:00.000000 |
| certfr-2026-avi-0439 | Multiples vulnérabilités dans Ivanti Neurons | 2026-04-15T00:00:00.000000 | 2026-04-15T00:00:00.000000 |
| certfr-2026-avi-0438 | Multiples vulnérabilités dans les produits Adobe | 2026-04-15T00:00:00.000000 | 2026-04-15T00:00:00.000000 |
| certfr-2026-avi-0437 | Vulnérabilité dans Python | 2026-04-15T00:00:00.000000 | 2026-04-15T00:00:00.000000 |
| certfr-2026-avi-0436 | Multiples vulnérabilités dans Tenable Identity Exposure | 2026-04-15T00:00:00.000000 | 2026-04-16T00:00:00.000000 |
| certfr-2026-avi-0435 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-14T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| certfr-2026-avi-0434 | Multiples vulnérabilités dans les produits SAP | 2026-04-14T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| certfr-2026-avi-0433 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-04-14T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-001732 | Multiple Brother software installers may insecurely load Dynamic Link Libraries | 2026-01-26T16:04+09:00 | 2026-01-26T16:04+09:00 |
| jvndb-2026-000010 | Command injection vulnerability in ASUS routers | 2026-01-23T15:22+09:00 | 2026-01-23T15:22+09:00 |
| jvndb-2026-001663 | "iRMC S5/S6" implemented in PRIMERGY vulnerable to incorrect authorization | 2026-01-23T11:29+09:00 | 2026-01-23T11:29+09:00 |
| jvndb-2026-001662 | Multiple vulnerabilities in Trend Micro Apex Central (January 2026) | 2026-01-23T11:29+09:00 | 2026-01-23T11:29+09:00 |
| jvndb-2026-000009 | Installer of Fujitsu ServerView Agents for Windows may insecurely load Dynamic Link Libraries | 2026-01-21T15:17+09:00 | 2026-01-21T15:17+09:00 |
| jvndb-2026-000008 | Ruijie Networks AP180 series vulnerable to OS command injection | 2026-01-21T15:17+09:00 | 2026-01-21T15:17+09:00 |
| jvndb-2026-001582 | Security information for Hitachi Disk Array Systems | 2026-01-21T12:11+09:00 | 2026-01-21T12:11+09:00 |
| jvndb-2026-001578 | ETERNUS SF vulnerable to insertion of sensitive information into maintenance data | 2026-01-20T20:00+09:00 | 2026-01-20T20:00+09:00 |
| jvndb-2026-001380 | Multiple vulnerabilities in Canon Small Office Multifunction Printers and Laser Printers | 2026-01-19T10:08+09:00 | 2026-01-19T10:08+09:00 |
| jvndb-2026-000007 | Multiple Vulnerabilities in TOA Network Cameras TRIFORA 3 series | 2026-01-16T15:06+09:00 | 2026-01-16T15:06+09:00 |
| jvndb-2026-000006 | Chainlit vulnerable to improper access restriction | 2026-01-14T17:03+09:00 | 2026-01-14T17:03+09:00 |
| jvndb-2026-000005 | Multiple vulnerabilities in EATON UPS Companion | 2026-01-13T19:01+09:00 | 2026-01-13T19:01+09:00 |
| jvndb-2026-000003 | RICOH Streamline NX vulnerable to improper authorization | 2026-01-09T18:17+09:00 | 2026-01-09T18:17+09:00 |
| jvndb-2026-000004 | The installers for multiple PIONEER products may insecurely load Dynamic Link Libraries | 2026-01-08T13:47+09:00 | 2026-01-08T13:47+09:00 |
| jvndb-2026-000001 | Origin validation error vulnerability in Fujitsu Security Solution AuthConductor Client Basic V2 | 2026-01-07T14:19+09:00 | 2026-01-07T14:19+09:00 |
| jvndb-2026-000002 | Multiple vulnerabilities in multiple NEC branded projectors manufactured by Sharp Display Solutions, Ltd. | 2026-01-07T14:10+09:00 | 2026-01-14T16:54+09:00 |
| jvndb-2026-001001 | Authentication bypass vulnerability in OpenBlocks series | 2026-01-07T10:46+09:00 | 2026-01-07T10:46+09:00 |
| jvndb-2025-022878 | Media Player MP-01 vulnerable to Missing Authentication for Critical Function | 2025-12-24T11:10+09:00 | 2026-01-15T11:10+09:00 |
| jvndb-2025-022400 | Ruijie Networks AP180 Series vulnerable to OS command injection | 2025-12-19T12:33+09:00 | 2025-12-19T12:33+09:00 |
| jvndb-2025-000118 | GROWI vulnerable to cross-site request forgery | 2025-12-17T13:04+09:00 | 2025-12-17T13:04+09:00 |
| jvndb-2025-022062 | Multiple vulnerabilities in CHOCO TEI WATCHER mini | 2025-12-17T11:28+09:00 | 2025-12-17T11:28+09:00 |
| jvndb-2025-000117 | SEIKO EPSON printer Web Config vulnerable to stack-based buffer overflow | 2025-12-16T15:31+09:00 | 2025-12-23T11:57+09:00 |
| jvndb-2025-000115 | QND vulnerable to privilege escalation | 2025-12-11T14:33+09:00 | 2025-12-11T14:33+09:00 |
| jvndb-2025-021305 | Android App "Brother iPrint&Scan" improper use of an external cache directory | 2025-12-09T17:25+09:00 | 2025-12-09T17:25+09:00 |
| jvndb-2025-000114 | ELECOM Clone for Windows registers a Windows service with an unquoted file path | 2025-12-09T17:16+09:00 | 2025-12-09T17:16+09:00 |
| jvndb-2025-000113 | Multiple vulnerabilities in GroupSession | 2025-12-08T17:48+09:00 | 2025-12-11T11:30+09:00 |
| jvndb-2025-000116 | GS Yuasa FULLBACK Manager Pro registers Windows services with unquoted file paths | 2025-12-08T14:06+09:00 | 2025-12-08T14:06+09:00 |
| jvndb-2025-000094 | Multiple vulnerabilities in ABB Terra AC Wallbox | 2025-12-05T14:12+09:00 | 2025-12-05T14:12+09:00 |
| jvndb-2025-000112 | Installer of INZONE Hub may insecurely load Dynamic Link Libraries | 2025-11-28T13:36+09:00 | 2025-11-28T13:36+09:00 |
| jvndb-2025-000111 | SwitchBot Smart Video Doorbell vulnerable to active debug code | 2025-11-26T14:35+09:00 | 2025-11-26T14:35+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-17813 | Google Chrome Codecs组件内存错误引用漏洞 | 2026-04-16 | 2026-04-20 |
| cnvd-2026-17812 | Google Chrome Skia组件越界读取漏洞 | 2026-04-16 | 2026-04-20 |
| cnvd-2026-17803 | Cisco Unity Connection Web管理界面SQL注入漏洞 | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17802 | Cisco Webex Contact Center桌面代理跨站脚本漏洞 | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17698 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17698) | 2026-04-16 | 2026-04-20 |
| cnvd-2026-17696 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17696) | 2026-04-16 | 2026-04-20 |
| cnvd-2026-17658 | D-Link DI-8003和DI-8003G缓冲区溢出漏洞 | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17657 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17657) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17656 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17656) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17655 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17655) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17654 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17654) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17652 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17652) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17650 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17650) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17648 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17648) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17643 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17643) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17638 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17638) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17635 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17635) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17634 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17634) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17633 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17633) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17632 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17632) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17631 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17631) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17630 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17630) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17628 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17628) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17627 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17627) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17624 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17624) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17623 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17623) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17622 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17622) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-17537 | D-Link DI-8003缓冲区溢出漏洞(CNVD-2026-17537) | 2026-04-16 | 2026-04-17 |
| cnvd-2026-18681 | Adobe Connect跨站脚本漏洞(CNVD-2026-18681) | 2026-04-15 | 2026-04-27 |
| cnvd-2026-18680 | Adobe Connect跨站脚本漏洞(CNVD-2026-18680) | 2026-04-15 | 2026-04-27 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01753 | Уязвимость компонента GDI+ операционной системы Windows, позволяющая нарушителю вызвать о… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01752 | Уязвимость компонента Hyper-V операционной системы Windows, позволяющая нарушителю выполн… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01751 | Уязвимость службы Connected Devices Platform Service операционных систем Windows, позволя… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01750 | Уязвимость компонента Hyper-V операционной системы Windows, позволяющая нарушителю выполн… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01749 | Уязвимость драйвера Ancillary Function Driver for WinSock операционных систем Windows, по… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01748 | Уязвимость драйвера HTTP.sys операционных систем Windows, позволяющая нарушителю повысить… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01747 | Уязвимость реализации протокола службы каталогов LDAP (Lightweight Directory Access Proto… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01746 | Уязвимость компонента Hyper-V операционной системы Windows, позволяющая нарушителю выполн… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01745 | Уязвимость компонента Mailslot File System операционных систем Windows, позволяющая наруш… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01744 | Уязвимость пакета программ Microsoft Office, связанная с недостатками механизма десериали… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01743 | Уязвимость расширения GitHub Copilot для Jetbrains, связанная с непринятием мер по очистк… | 12.02.2026 | 12.02.2026 |
| bdu:2026-01742 | Уязвимость текстового редактора Notepad операционных систем Windows, позволяющая нарушите… | 12.02.2026 | 13.02.2026 |
| bdu:2026-01727 | Уязвимость функции оценки избирательности расширения Intarray системы управления базами д… | 11.02.2026 | 16.02.2026 |
| bdu:2026-01726 | Уязвимость функции обработки типов данных oidvector системы управления базами данных Post… | 11.02.2026 | 16.02.2026 |
| bdu:2026-01725 | Уязвимость веб-интерфейса системы выявления и устранения угроз FortiSandbox, позволяющая … | 11.02.2026 | 11.02.2026 |
| bdu:2026-01724 | Уязвимость компонента pg_trgm системы управления базами данных PostgreSQL, позволяющая на… | 11.02.2026 | 16.02.2026 |
| bdu:2026-01723 | Уязвимость системы управления базами данных PostgreSQL, связанная с неверным индексирован… | 11.02.2026 | 16.02.2026 |
| bdu:2026-01722 | Уязвимость компонента pgcrypto системы управления базами данных PostgreSQL, позволяющая н… | 11.02.2026 | 16.02.2026 |
| bdu:2026-01721 | Уязвимость веб-интерфейса управления микропрограммного обеспечения промышленных управляем… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01720 | Уязвимость компонента API-endpoint /api/domains/<domainid>/users/<userid>/aliases корпора… | 11.02.2026 | 13.02.2026 |
| bdu:2026-01718 | Уязвимость библиотеки juliangruber/brace-expansion программной платформы Node.js, позволя… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01717 | Уязвимость библиотеки diff (jsdiff) программной платформы Node.js, позволяющая нарушителю… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01716 | Уязвимость функции foregroundChild() библиотеки для поиска файлов и директорий Glob прогр… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01715 | Уязвимость функции expand() библиотеки juliangruber/brace-expansion программной платформы… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01714 | Уязвимость библиотеки node-tar программной платформы Node.js, позволяющая нарушителю раск… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01713 | Уязвимость библиотеки node-tar программной платформы Node.js, позволяющая нарушителю полу… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01712 | Уязвимость интерфейса командной строки программной платформы Node.js, позволяющая нарушит… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01711 | Уязвимость реализации алгоритма цифровой подписи EdDSA EdDSA-Java (ed25519-java), связан… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01710 | Уязвимость системы управления базами данных HyperSQL DataBase (HSQLDB), связанная с приме… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01709 | Уязвимость компонента org.assertj.core.util.xml.XmlStringPrettyFormatter Java-библиотеки … | 11.02.2026 | 11.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202308-3129 | D-Link DAP-2622 DDP Set AG Profile Auth Username Stack-based Buffer Overflow Remote Code … | 2024-07-23T22:20:12.344000Z |
| var-202308-3114 | D-Link DAP-2622 DDP Reset Auth Password Stack-based Buffer Overflow Remote Code Execution… | 2024-07-23T22:20:12.516000Z |
| var-202308-3113 | D-Link DAP-2622 DDP Configuration Backup Server Address Stack-based Buffer Overflow Remot… | 2024-07-23T22:20:12.318000Z |
| var-202308-3105 | D-Link DAP-2622 DDP Reset Factory Auth Username Stack-based Buffer Overflow Remote Code E… | 2024-07-23T22:20:12.284000Z |
| var-202008-1238 | In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.… | 2024-07-23T22:19:51.232000Z |
| var-201302-0307 | Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on … | 2024-07-23T22:19:51.408000Z |
| var-201804-1162 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T22:19:50.233000Z |
| var-201912-0592 | An input validation issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:19:49.641000Z |
| var-201302-0224 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:19:19.153000Z |
| var-201711-0476 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T22:19:18.201000Z |
| var-202108-1141 | An access issue was addressed with improved access restrictions. This issue is fixed in m… | 2024-07-23T22:19:17.980000Z |
| var-200609-0314 | Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to… | 2024-07-23T22:19:17.031000Z |
| var-202005-0222 | ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related … | 2024-07-23T22:19:16.422000Z |
| var-202006-1653 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 a… | 2024-07-23T22:19:15.782000Z |
| var-201205-0312 | sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI… | 2024-07-23T22:18:38.885000Z |
| var-201903-0424 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:18:36.709000Z |
| var-201401-0254 | The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.… | 2024-07-23T22:18:17.213000Z |
| var-201806-1449 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T22:18:16.692000Z |
| var-202201-0405 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. vim/vim Exists in a… | 2024-07-23T22:17:38.807000Z |
| var-201711-0450 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T22:17:38.652000Z |
| var-200701-0510 | The Adobe PDF specification 1.3, as implemented by Apple Mac OS X Preview, allows remote … | 2024-07-23T22:17:06.694000Z |
| var-201904-1360 | A cookie management issue was addressed with improved checks. This issue affected version… | 2024-07-23T22:16:09.056000Z |
| var-201108-0236 | The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF de… | 2024-07-23T22:16:08.579000Z |
| var-200107-0173 | Cisco CBOS 2.3.0.053 sends output of the "sh nat" (aka "show nat") command to the termina… | 2024-07-23T22:16:08.756000Z |
| var-201206-0055 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:14:46.537000Z |
| var-201901-1586 | In Safari before 11.1.2, iTunes before 12.8 for Windows, iOS before 11.4.1, tvOS before 1… | 2024-07-23T22:14:43.295000Z |
| var-201903-0423 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:14:42.527000Z |
| var-201304-0373 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:14:42.081000Z |
| var-200701-0061 | Finder 10.4.6 on Apple Mac OS X 10.4.8 allows user-assisted remote attackers to cause a d… | 2024-07-23T22:14:37.008000Z |
| var-200502-0025 | The der_chop script in the openssl package in Trustix Secure Linux 1.5 through 2.1 and ot… | 2024-07-23T22:14:37.244000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2019-007 | PHOENIX CONTACT: command injection on RAD-80211-XD(/HP-BUS) | 2019-03-25T11:45:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-006 | PHOENIX CONTACT: unauthorized access to WEB-UI on FL NAT SMx | 2019-03-25T11:40:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-003 | PHOENIX CONTACT: Multiple Vulnerabilities in MEVIEW3 | 2019-03-05T10:35:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2019-001 | PHOENIX CONTACT: Multiple Vulnerabilities in FL SWITCH 3xxx, 4xxx and 48xx | 2019-01-23T12:02:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2018-015 | Phoenix Contact: AXL F BK PN Denial of Service Vulnerability | 2018-09-21T07:03:00.000Z | 2018-09-21T07:03:00.000Z |
| vde-2018-012 | PHOENIX CONTACT: ILC 1x1 ETH Denial of Service | 2018-08-13T11:55:00.000Z | 2018-08-13T11:55:00.000Z |
| vde-2018-007 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series - Stack-based Buffer Overflow in shared object file | 2018-05-16T10:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2018-006 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series through 1.33 has a Stack-based Buffer Overflow | 2018-05-16T10:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2018-005 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series through 1.33 allows Information Exposure | 2018-05-16T05:35:00.000Z | 2018-05-16T05:35:00.000Z |
| vde-2018-004 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series through 1.33 allows Command Injection | 2018-05-16T05:35:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2018-003 | PHOENIX CONTACT: addressing Meltdown and Spectre vulnerabilities | 2018-03-23T09:43:00.000Z | 2025-10-01T08:00:00.000Z |
| vde-2018-001 | PHOENIX CONTACT: Advisory for mGuard products | 2018-01-30T09:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2017-006 | PHOENIX CONTACT: FL SWITCH 3xxx/4xxx/48xx series web-service authentication bypass | 2018-01-10T09:36:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2017-004 | PHOENIX CONTACT: FL COMSERVER cross-site scripting (XSS) vulnerability | 2017-12-05T08:50:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2017-003 | PHOENIX CONTACT: WLAN enabled devices utilising WPA2 encryption | 2017-11-09T16:20:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2017-002 | PHOENIX CONTACT: mGuard device manager (mdm) multiple vulnerabilities in Java SE | 2017-09-07T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2017-001 | PHOENIX CONTACT: mGuard IKE daemon remote denial of service | 2017-03-07T11:05:00.000Z | 2025-05-22T13:03:10.000Z |