Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-3508 |
6.8 (4.0)
|
An Out-of-bounds Read vulnerability in the IOCTL … |
ASUS |
ASUS System Control Interface |
2026-05-08T02:00:53.822Z | 2026-05-08T02:00:53.822Z |
| CVE-2026-6737 |
2 (4.0)
|
An Exposed IOCTL with Insufficient Access Control… |
ASUS |
AsusPTPFilter |
2026-05-08T02:00:26.422Z | 2026-05-08T02:00:26.422Z |
| CVE-2026-8127 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
eladmin Users API Endpoint UserController.java checkLe… |
n/a |
eladmin |
2026-05-08T02:00:14.462Z | 2026-05-08T02:00:14.462Z |
| CVE-2026-8126 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
SourceCodester Comment System post_comment.php sql injection |
SourceCodester |
Comment System |
2026-05-08T01:45:11.083Z | 2026-05-08T01:45:11.083Z |
| CVE-2026-31431 |
7.8 (3.1)
|
crypto: algif_aead - Revert to operating out-of-place |
Linux |
Linux |
2026-04-22T08:15:10.123Z | 2026-05-08T01:35:55.500Z |
| CVE-2026-8125 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Simple Chat System sendMessage.php sql i… |
code-projects |
Simple Chat System |
2026-05-08T01:30:10.489Z | 2026-05-08T01:30:10.489Z |
| CVE-2026-8124 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
GPAC box_code_base.c sidx_box_read allocation of resources |
n/a |
GPAC |
2026-05-08T01:15:10.347Z | 2026-05-08T01:15:10.347Z |
| CVE-2026-8123 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open5GS NSSF message.c ogs_sbi_discovery_option_add_sn… |
n/a |
Open5GS |
2026-05-08T01:00:12.670Z | 2026-05-08T01:00:12.670Z |
| CVE-2026-8122 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open5GS NSSF message.c ogs_sbi_discovery_option_add_se… |
n/a |
Open5GS |
2026-05-08T00:45:09.870Z | 2026-05-08T00:45:09.870Z |
| CVE-2026-8121 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open5GS NSSF conv.c ogs_sbi_parse_plmn_list denial of … |
n/a |
Open5GS |
2026-05-08T00:30:10.368Z | 2026-05-08T00:30:10.368Z |
| CVE-2026-8120 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open5GS NSSF nnssf-handler.c denial of service |
n/a |
Open5GS |
2026-05-08T00:15:09.713Z | 2026-05-08T00:15:09.713Z |
| CVE-2026-8119 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
Open5GS NSSF nghttp2-server.c ogs_sbi_stream_find_by_i… |
n/a |
Open5GS |
2026-05-08T00:00:21.852Z | 2026-05-08T00:00:21.852Z |
| CVE-2026-8117 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
SourceCodester Pizzafy Ecommerce System index.php cros… |
SourceCodester |
Pizzafy Ecommerce System |
2026-05-07T23:45:10.695Z | 2026-05-07T23:45:10.695Z |
| CVE-2026-8116 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
huangjunsen0406 xiaozhi-mcphub dxtController.ts path t… |
huangjunsen0406 |
xiaozhi-mcphub |
2026-05-07T23:30:11.843Z | 2026-05-07T23:30:11.843Z |
| CVE-2026-8115 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
gyoridavid short-video-maker REST API rest.ts path traversal |
gyoridavid |
short-video-maker |
2026-05-07T22:45:11.302Z | 2026-05-07T22:45:11.302Z |
| CVE-2026-6411 |
7.3 (3.1)
|
MAXHUB Pivot Client Application Use of a Broken or Ris… |
MAXHUB |
MAXHUB Pivot client application |
2026-05-07T22:25:54.959Z | 2026-05-07T22:25:54.959Z |
| CVE-2026-42880 |
9.6 (3.1)
|
ArgoCD ServerSideDiff is vulnerable to Kubernetes Secr… |
argoproj |
argo-cd |
2026-05-07T22:20:39.506Z | 2026-05-07T22:20:39.506Z |
| CVE-2026-2710 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-05-07T22:20:00.454Z | |
| CVE-2026-8114 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
JeecgBoot JSON Object loadTreeData sql injection |
n/a |
JeecgBoot |
2026-05-07T22:00:11.288Z | 2026-05-07T22:00:11.288Z |
| CVE-2026-40213 |
7.4 (3.1)
|
OpenStack Cyborg before 16.0.1 uses rule:allow (c… |
OpenStack |
Cyborg |
2026-05-07T00:00:00.000Z | 2026-05-07T21:57:41.910Z |
| CVE-2026-40214 |
6.3 (3.1)
|
In OpenStack Cyborg before 16.0.1, the Accelerato… |
OpenStack |
Cyborg |
2026-05-07T00:00:00.000Z | 2026-05-07T21:54:10.614Z |
| CVE-2026-5121 |
7.5 (3.1)
|
Libarchive: libarchive: arbitrary code execution via i… |
Red Hat |
Red Hat Enterprise Linux 7 Extended Lifecycle Support |
2026-03-30T07:47:28.562Z | 2026-05-07T21:44:13.275Z |
| CVE-2026-4878 |
6.7 (3.1)
|
Libcap: libcap: privilege escalation via toctou race c… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-04-09T14:49:02.942Z | 2026-05-07T21:33:20.039Z |
| CVE-2026-4424 |
7.5 (3.1)
|
Libarchive: libarchive: information disclosure via hea… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-19T13:50:27.294Z | 2026-05-07T21:33:08.308Z |
| CVE-2026-6736 |
6.3 (4.0)
|
Authentication bypass vulnerability in GitHub Enterpri… |
GitHub |
Enterprise Server |
2026-05-07T21:14:33.490Z | 2026-05-07T21:27:45.553Z |
| CVE-2026-4775 |
7.8 (3.1)
|
Libtiff: libtiff: arbitrary code execution or denial o… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-24T14:42:47.529Z | 2026-05-07T21:24:46.165Z |
| CVE-2026-8106 |
5.9 (4.0)
|
Reflected HTML injection vulnerability in GitHub Enter… |
GitHub |
Enterprise Server |
2026-05-07T21:18:59.259Z | 2026-05-07T21:18:59.259Z |
| CVE-2026-8034 |
7.9 (4.0)
|
Server-side request forgery vulnerability in GitHub En… |
GitHub |
Enterprise Server |
2026-05-07T21:18:49.812Z | 2026-05-07T21:18:49.812Z |
| CVE-2026-7541 |
6.3 (4.0)
|
Denial of service vulnerability in GitHub Enterprise S… |
GitHub |
Enterprise Server |
2026-05-07T21:18:35.655Z | 2026-05-07T21:18:35.655Z |
| CVE-2026-8113 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
8421bit MiniClaw executeSkillScript kernel.ts isPathIn… |
8421bit |
MiniClaw |
2026-05-07T21:15:11.899Z | 2026-05-07T21:15:11.899Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-6411 |
7.3 (3.1)
|
MAXHUB Pivot Client Application Use of a Broken or Ris… |
MAXHUB |
MAXHUB Pivot client application |
2026-05-07T22:25:54.959Z | 2026-05-07T22:25:54.959Z |
| CVE-2026-42880 |
9.6 (3.1)
|
ArgoCD ServerSideDiff is vulnerable to Kubernetes Secr… |
argoproj |
argo-cd |
2026-05-07T22:20:39.506Z | 2026-05-07T22:20:39.506Z |
| CVE-2026-2710 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-05-07T22:20:00.454Z | |
| CVE-2026-8114 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
JeecgBoot JSON Object loadTreeData sql injection |
n/a |
JeecgBoot |
2026-05-07T22:00:11.288Z | 2026-05-07T22:00:11.288Z |
| CVE-2026-8113 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
8421bit MiniClaw executeSkillScript kernel.ts isPathIn… |
8421bit |
MiniClaw |
2026-05-07T21:15:11.899Z | 2026-05-07T21:15:11.899Z |
| CVE-2026-8112 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
8421bit MiniClaw kernel.ts executeCognitivePulse os co… |
8421bit |
MiniClaw |
2026-05-07T21:00:13.825Z | 2026-05-07T21:00:13.825Z |
| CVE-2026-8106 |
5.9 (4.0)
|
Reflected HTML injection vulnerability in GitHub Enter… |
GitHub |
Enterprise Server |
2026-05-07T21:18:59.259Z | 2026-05-07T21:18:59.259Z |
| CVE-2026-8034 |
7.9 (4.0)
|
Server-side request forgery vulnerability in GitHub En… |
GitHub |
Enterprise Server |
2026-05-07T21:18:49.812Z | 2026-05-07T21:18:49.812Z |
| CVE-2026-7891 |
9.3 (4.0)
|
The VerySecureApp made by DIVD using Mendix Studi… |
DIVD |
VerySecureApp |
2026-05-07T21:07:22.206Z | 2026-05-07T21:07:22.206Z |
| CVE-2026-7541 |
6.3 (4.0)
|
Denial of service vulnerability in GitHub Enterprise S… |
GitHub |
Enterprise Server |
2026-05-07T21:18:35.655Z | 2026-05-07T21:18:35.655Z |
| CVE-2026-6736 |
6.3 (4.0)
|
Authentication bypass vulnerability in GitHub Enterpri… |
GitHub |
Enterprise Server |
2026-05-07T21:14:33.490Z | 2026-05-07T21:27:45.553Z |
| CVE-2026-5121 |
7.5 (3.1)
|
Libarchive: libarchive: arbitrary code execution via i… |
Red Hat |
Red Hat Enterprise Linux 7 Extended Lifecycle Support |
2026-03-30T07:47:28.562Z | 2026-05-07T21:44:13.275Z |
| CVE-2026-4878 |
6.7 (3.1)
|
Libcap: libcap: privilege escalation via toctou race c… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-04-09T14:49:02.942Z | 2026-05-07T21:33:20.039Z |
| CVE-2026-4775 |
7.8 (3.1)
|
Libtiff: libtiff: arbitrary code execution or denial o… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-24T14:42:47.529Z | 2026-05-07T21:24:46.165Z |
| CVE-2026-4424 |
7.5 (3.1)
|
Libarchive: libarchive: information disclosure via hea… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-19T13:50:27.294Z | 2026-05-07T21:33:08.308Z |
| CVE-2026-42826 |
10 (3.1)
|
Azure DevOps Information Disclosure Vulnerability |
Microsoft |
Azure DevOps |
2026-05-07T20:59:06.979Z | 2026-05-07T20:59:06.979Z |
| CVE-2026-41929 |
5.1 (4.0)
6.1 (3.1)
|
Vvveb < 1.0.8.2 Unauthenticated Reflected XSS via Visu… |
givanz |
Vvveb |
2026-05-07T21:08:50.762Z | 2026-05-07T21:08:50.762Z |
| CVE-2026-41928 |
6.9 (4.0)
5.3 (3.1)
|
Vvveb < 1.0.8.2 Information Disclosure via Cron Controller |
givanz |
Vvveb |
2026-05-07T21:13:13.870Z | 2026-05-07T21:13:13.870Z |
| CVE-2026-41105 |
8.1 (3.1)
|
Azure Monitor Action Group Notification System Elevati… |
Microsoft |
Azure Monitor Action Group notification system |
2026-05-07T20:58:47.705Z | 2026-05-07T20:58:47.705Z |
| CVE-2026-40214 |
6.3 (3.1)
|
In OpenStack Cyborg before 16.0.1, the Accelerato… |
OpenStack |
Cyborg |
2026-05-07T00:00:00.000Z | 2026-05-07T21:54:10.614Z |
| CVE-2026-40213 |
7.4 (3.1)
|
OpenStack Cyborg before 16.0.1 uses rule:allow (c… |
OpenStack |
Cyborg |
2026-05-07T00:00:00.000Z | 2026-05-07T21:57:41.910Z |
| CVE-2026-35435 |
8.6 (3.1)
|
Azure AI Foundry Elevation of Privilege Vulnerability |
Microsoft |
Azure AI Foundry |
2026-05-07T20:58:55.593Z | 2026-05-07T20:58:55.593Z |
| CVE-2026-35428 |
9.6 (3.1)
|
Azure Cloud Shell Spoofing Vulnerability |
Microsoft |
Azure Cloud Shell |
2026-05-07T20:58:58.256Z | 2026-05-07T20:58:58.256Z |
| CVE-2026-34327 |
8.2 (3.1)
|
Microsoft Partner Center Spoofing Vulnerability |
Microsoft |
Microsoft Partner Center |
2026-05-07T20:58:54.185Z | 2026-05-07T20:58:54.185Z |
| CVE-2026-33844 |
9 (3.1)
|
Azure Managed Instance for Apache Cassandra Remote Cod… |
Microsoft |
Azure Managed Instance for Apache Cassandra |
2026-05-07T20:58:52.985Z | 2026-05-07T20:58:52.985Z |
| CVE-2026-33823 |
9.6 (3.1)
|
Microsoft Team Events Portal Information Disclosure Vu… |
Microsoft |
Microsoft Teams |
2026-05-07T20:58:52.175Z | 2026-05-07T20:58:52.175Z |
| CVE-2026-33111 |
7.5 (3.1)
|
Copilot Chat (Microsoft Edge) Information Disclosure V… |
Microsoft |
Copilot Chat (Microsoft Edge) |
2026-05-07T20:58:48.491Z | 2026-05-07T20:58:48.491Z |
| CVE-2026-33109 |
9.9 (3.1)
|
Azure Managed Instance for Apache Cassandra Remote Cod… |
Microsoft |
Azure Managed Instance for Apache Cassandra |
2026-05-07T20:58:49.441Z | 2026-05-07T20:58:49.441Z |
| CVE-2026-32207 |
8.8 (3.1)
|
Azure Machine Learning Notebook Spoofing Vulnerability |
Microsoft |
Azure Machine Learning |
2026-05-07T20:58:51.273Z | 2026-05-07T20:58:51.273Z |
| CVE-2026-26164 |
7.5 (3.1)
|
M365 Copilot Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Copilot's Business Chat |
2026-05-07T20:58:09.538Z | 2026-05-07T20:58:09.538Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-8106 | A reflected HTML injection vulnerability was identified in the GitHub Enterprise Server Management … | 2026-05-07T22:16:37.377 | 2026-05-07T22:16:37.377 |
| fkie_cve-2026-8034 | A server-side request forgery (SSRF) vulnerability was identified in the GitHub Enterprise Server n… | 2026-05-07T22:16:37.230 | 2026-05-07T22:16:37.230 |
| fkie_cve-2026-7891 | The VerySecureApp made by DIVD using Mendix Studio Pro 11.8.0 Beta allows unintended data exposure … | 2026-05-07T22:16:37.070 | 2026-05-07T22:16:37.070 |
| fkie_cve-2026-7541 | A denial of service vulnerability was identified in GitHub Enterprise Server that allowed an unauth… | 2026-05-07T22:16:36.917 | 2026-05-07T22:16:36.917 |
| fkie_cve-2026-6736 | An authentication bypass vulnerability was identified in GitHub Enterprise Server that allowed an u… | 2026-05-07T22:16:36.753 | 2026-05-07T22:16:36.753 |
| fkie_cve-2026-5121 | A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the … | 2026-03-30T08:16:18.780 | 2026-05-07T22:16:36.430 |
| fkie_cve-2026-4878 | A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (T… | 2026-04-09T16:16:31.987 | 2026-05-07T22:16:36.237 |
| fkie_cve-2026-4775 | A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow … | 2026-03-24T15:16:39.693 | 2026-05-07T22:16:36.070 |
| fkie_cve-2026-4424 | A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archiv… | 2026-03-19T15:16:28.300 | 2026-05-07T22:16:35.730 |
| fkie_cve-2026-42826 | Exposure of sensitive information to an unauthorized actor in Azure DevOps allows an unauthorized a… | 2026-05-07T22:16:35.587 | 2026-05-07T22:16:35.587 |
| fkie_cve-2026-41929 | Vvveb before 1.0.8.2 contains an unauthenticated reflected cross-site scripting vulnerability in th… | 2026-05-07T22:16:35.450 | 2026-05-07T22:16:35.450 |
| fkie_cve-2026-41928 | Vvveb before 1.0.8.2 contains an information disclosure vulnerability in the cron controller that a… | 2026-05-07T22:16:35.313 | 2026-05-07T22:16:35.313 |
| fkie_cve-2026-41105 | Server-side request forgery (ssrf) in Azure Notification Service allows an authorized attacker to e… | 2026-05-07T22:16:35.183 | 2026-05-07T22:16:35.183 |
| fkie_cve-2026-40214 | In OpenStack Cyborg before 16.0.1, the Accelerator Request (ARQ) API does not enforce project owner… | 2026-05-07T22:16:35.047 | 2026-05-07T22:16:35.047 |
| fkie_cve-2026-40213 | OpenStack Cyborg before 16.0.1 uses rule:allow (check_str='@') as the default policy for multiple A… | 2026-05-07T22:16:34.910 | 2026-05-07T22:16:34.910 |
| fkie_cve-2026-35435 | Improper access control in Azure AI Foundry M365 published agents allows an unauthorized attacker t… | 2026-05-07T22:16:34.787 | 2026-05-07T22:16:34.787 |
| fkie_cve-2026-35428 | Improper neutralization of special elements used in a command ('command injection') in Azure Cloud … | 2026-05-07T22:16:34.667 | 2026-05-07T22:16:34.667 |
| fkie_cve-2026-34327 | Externally controlled reference to a resource in another sphere in Microsoft Partner Center allows … | 2026-05-07T22:16:34.540 | 2026-05-07T22:16:34.540 |
| fkie_cve-2026-33844 | Improper input validation in Azure Managed Instance for Apache Cassandra allows an authorized attac… | 2026-05-07T22:16:34.420 | 2026-05-07T22:16:34.420 |
| fkie_cve-2026-33823 | Improper authorization in Microsoft Teams allows an authorized attacker to disclose information ove… | 2026-05-07T22:16:34.283 | 2026-05-07T22:16:34.283 |
| fkie_cve-2026-33111 | Improper neutralization of special elements used in a command ('command injection') in Copilot Chat… | 2026-05-07T22:16:34.157 | 2026-05-07T22:16:34.157 |
| fkie_cve-2026-33109 | Improper access control in Azure Managed Instance for Apache Cassandra allows an authorized attacke… | 2026-05-07T22:16:34.030 | 2026-05-07T22:16:34.030 |
| fkie_cve-2026-32207 | Improper neutralization of input during web page generation ('cross-site scripting') in Azure Machi… | 2026-05-07T22:16:33.900 | 2026-05-07T22:16:33.900 |
| fkie_cve-2026-26164 | Improper neutralization of special elements in output used by a downstream component ('injection') … | 2026-05-07T22:16:33.773 | 2026-05-07T22:16:33.773 |
| fkie_cve-2026-26129 | Improper neutralization of special elements in M365 Copilot allows an unauthorized attacker to disc… | 2026-05-07T22:16:33.607 | 2026-05-07T22:16:33.607 |
| fkie_cve-2026-8098 | A security vulnerability has been detected in code-projects Feedback System 1.0. Impacted is an unk… | 2026-05-07T21:16:30.900 | 2026-05-07T21:16:30.900 |
| fkie_cve-2026-8097 | A security flaw has been discovered in CodeAstro Online Classroom 1.0. This vulnerability affects u… | 2026-05-07T21:16:30.727 | 2026-05-07T21:16:30.727 |
| fkie_cve-2026-44365 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2026-34429. Reason:… | 2026-05-07T21:16:30.433 | 2026-05-07T21:16:30.433 |
| fkie_cve-2026-44244 | GitPython is a python library used to interact with Git repositories. Prior to version 3.1.49, GitC… | 2026-05-07T19:16:02.357 | 2026-05-07T21:16:30.283 |
| fkie_cve-2026-42449 | n8n-MCP is an MCP server that provides AI assistants access to n8n node documentation, properties, … | 2026-05-07T21:16:30.133 | 2026-05-07T21:16:30.133 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-h65h-28xw-w79q |
6.3 (3.1)
2.1 (4.0)
|
A weakness has been identified in huangjunsen0406 xiaozhi-mcphub up to 1.0.3. This vulnerability af… | 2026-05-08T00:31:35Z | 2026-05-08T00:31:35Z |
| ghsa-935g-9rq5-q95c |
5.3 (3.1)
5.5 (4.0)
|
A security flaw has been discovered in gyoridavid short-video-maker up to 1.3.4. This affects an un… | 2026-05-08T00:31:35Z | 2026-05-08T00:31:35Z |
| ghsa-6f56-6pvf-gp4j |
4.3 (3.1)
2.1 (4.0)
|
A security vulnerability has been detected in SourceCodester Pizzafy Ecommerce System 1.0. This iss… | 2026-05-08T00:31:35Z | 2026-05-08T00:31:35Z |
| ghsa-xqmx-3vx6-fm88 |
5.9 (4.0)
|
A reflected HTML injection vulnerability was identified in the GitHub Enterprise Server Management … | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-w548-vv26-rff6 |
7.9 (4.0)
|
A server-side request forgery (SSRF) vulnerability was identified in the GitHub Enterprise Server n… | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-rrf3-mgv7-cw6m |
9.3 (4.0)
|
The VerySecureApp made by DIVD using Mendix Studio Pro 11.8.0 Beta allows unintended data exposure … | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-q253-8qxh-gx79 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was found in 8421bit MiniClaw up to 223c16a1088e138838dcbd18cd65a37c35ac5a84. Affec… | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-pghv-w792-qvjg |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was identified in JeecgBoot up to 3.9.1. Affected by this issue is some unknown fun… | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-mmpc-xjxr-5hf8 |
6.3 (3.1)
|
In OpenStack Cyborg before 16.0.1, the Accelerator Request (ARQ) API does not enforce project owner… | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-h86r-7gjv-6c7v |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in 8421bit MiniClaw up to 43905b934cf76489ab28e4d17da28ee97970f91f. … | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-gmwx-3xm2-9fx8 |
10.0 (3.1)
|
Exposure of sensitive information to an unauthorized actor in Azure DevOps allows an unauthorized a… | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-96jg-8w8q-qmmc |
8.1 (3.1)
|
Server-side request forgery (ssrf) in Azure Notification Service allows an authorized attacker to e… | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-8rhw-hq84-rcq7 |
5.3 (3.1)
6.9 (4.0)
|
Vvveb before 1.0.8.2 contains an information disclosure vulnerability in the cron controller that a… | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-8hhx-w7p5-q47g |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-3738-jvgh-jh3h |
6.3 (4.0)
|
A denial of service vulnerability was identified in GitHub Enterprise Server that allowed an unauth… | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-2gcr-p5w4-5hh8 |
6.3 (4.0)
|
An authentication bypass vulnerability was identified in GitHub Enterprise Server that allowed an u… | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-w6p3-2c62-jm2g |
9.6 (3.1)
|
Improper authorization in Microsoft Teams allows an authorized attacker to disclose information ove… | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-v3vj-8337-2gq4 |
9.0 (3.1)
|
Improper input validation in Azure Managed Instance for Apache Cassandra allows an authorized attac… | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-qvcj-rgrx-wm72 |
7.5 (3.1)
|
Improper neutralization of special elements in output used by a downstream component ('injection') … | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-mm7j-mhhj-hj36 |
7.4 (3.1)
|
OpenStack Cyborg before 16.0.1 uses rule:allow (check_str='@') as the default policy for multiple A… | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-mgh8-qx2p-mmfj |
9.6 (3.1)
|
Improper neutralization of special elements used in a command ('command injection') in Azure Cloud … | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-jvw8-2m5m-9449 |
8.2 (3.1)
|
Externally controlled reference to a resource in another sphere in Microsoft Partner Center allows … | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-j3m5-fchj-4gfr |
8.6 (3.1)
|
Improper access control in Azure AI Foundry M365 published agents allows an unauthorized attacker t… | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-hpvr-rjcg-4q53 |
7.5 (3.1)
|
Improper neutralization of special elements in M365 Copilot allows an unauthorized attacker to disc… | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-h553-38x2-qp6q |
8.8 (3.1)
|
Improper neutralization of input during web page generation ('cross-site scripting') in Azure Machi… | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-gfjx-9vr9-m736 |
7.5 (3.1)
|
Improper neutralization of special elements used in a command ('command injection') in Copilot Chat… | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-g4xx-6vv3-3x48 |
9.9 (3.1)
|
Improper access control in Azure Managed Instance for Apache Cassandra allows an authorized attacke… | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-c75f-55f6-f63q |
7.5 (3.1)
|
A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archiv… | 2026-03-19T15:31:21Z | 2026-05-08T00:31:33Z |
| ghsa-2vwv-vqpv-v8vc |
9.8 (3.1)
|
A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the … | 2026-03-30T09:31:29Z | 2026-05-08T00:31:33Z |
| ghsa-cm99-m826-vgg7 |
7.8 (3.1)
|
A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow … | 2026-03-24T15:30:29Z | 2026-05-08T00:31:32Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2025-15 |
5.3 (3.1)
|
Flask-AppBuilder is an application development framework. Prior to 4.5.3, Flask-AppBuilde… | flask-appbuilder | 2025-03-03T16:15:41+00:00 | 2025-04-09T17:27:25.227116+00:00 |
| pysec-2025-14 |
|
An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normal… | django | 2025-04-02T13:15:44+00:00 | 2025-04-09T17:27:25.169049+00:00 |
| pysec-2025-13 |
|
An issue was discovered in Django 5.1 before 5.1.7, 5.0 before 5.0.13, and 4.2 before 4.2… | django | 2025-03-06T19:15:27+00:00 | 2025-04-09T17:27:25.095679+00:00 |
| pysec-2022-43178 |
7.5 (3.1)
|
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the cleo … | cleo | 2022-11-09T20:15:10+00:00 | 2025-04-09T17:27:24.793038+00:00 |
| pysec-2022-43177 |
9.8 (3.1)
|
Azure CLI is the command-line interface for Microsoft Azure. In versions previous to 2.40… | azure-cli | 2022-10-25T17:15:56+00:00 | 2025-04-09T17:27:24.642962+00:00 |
| pysec-2024-244 |
7.5 (3.1)
|
A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a by… | mlflow | 2024-05-16T09:15:14+00:00 | 2025-04-08T10:23:25.092581+00:00 |
| pysec-2024-243 |
9.3 (3.1)
|
mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs… | mlflow | 2024-04-16T00:15:12+00:00 | 2025-04-08T10:23:25.044416+00:00 |
| pysec-2024-242 |
7.5 (3.1)
|
A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically … | mlflow | 2024-06-06T19:15:55+00:00 | 2025-04-08T10:23:24.995743+00:00 |
| pysec-2024-241 |
9.6 (3.1)
|
Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untru… | mlflow | 2024-02-23T22:15:55+00:00 | 2025-04-08T10:23:24.946136+00:00 |
| pysec-2024-240 |
9.6 (3.1)
|
Insufficient sanitization in MLflow leads to XSS when running an untrusted recipe. This … | mlflow | 2024-02-23T22:15:55+00:00 | 2025-04-08T10:23:24.900947+00:00 |
| pysec-2024-239 |
8.8 (3.1)
|
A vulnerability in mlflow/mlflow version 8.2.1 allows for remote code execution due to im… | mlflow | 2024-06-06T19:15:51+00:00 | 2025-04-08T10:23:24.852109+00:00 |
| pysec-2025-12 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2025-01-21T15:15:13+00:00 | 2025-04-08T10:23:23.899726+00:00 |
| pysec-2024-238 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-11-06T15:15:11+00:00 | 2025-04-08T10:23:23.857960+00:00 |
| pysec-2025-11 |
5.9 (3.1)
|
A vulnerability in the `KnowledgeBaseWebReader` class of the run-llama/llama_index reposi… | llama-index | 2025-03-20T10:15:31+00:00 | 2025-04-01T23:22:47.294256+00:00 |
| pysec-2025-10 |
9.1 (3.1)
|
A vulnerability in the `download_model` function of the onnx/onnx framework, before and i… | onnx | 2025-03-20T10:15:37+00:00 | 2025-03-26T19:21:38.843396+00:00 |
| pysec-2025-9 |
|
A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through… | invokeai | 2025-03-20T10:15:26+00:00 | 2025-03-20T11:21:37.872971+00:00 |
| pysec-2025-8 |
|
The `pygments-style-solarized` project was removed from PyPI by its owner on 2021-08-26. … | pygments-style-solarized | 2025-03-17T16:35:37+00:00 | |
| pysec-2024-237 |
9.4 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-05-14T16:17:12+00:00 | 2025-03-05T17:22:29.121263+00:00 |
| pysec-2024-236 |
6.1 (3.1)
|
Jupyter Server Proxy allows users to run arbitrary external processes alongside their not… | jupyter-server-proxy | 2024-06-11T22:15:09+00:00 | 2025-02-26T23:22:41.524251+00:00 |
| pysec-2025-7 |
|
Published in 2021, the imblog package is a Python library that scrapes data from a blog p… | imblog | 2025-02-26T21:19:19+00:00 | |
| pysec-2025-6 |
|
Published in 2021, the colabrun package is a Python library that exfiltrates user cookies… | colabrun | 2025-02-26T20:59:48+00:00 | |
| pysec-2025-5 |
|
Published in 2020, the autodzee package is a Python library that bypasses Deezer API rest… | browsercmdhbt2 | 2025-02-26T20:57:11+00:00 | |
| pysec-2025-3 |
|
Published in 2019, the autodzee package is a Python library that bypasses Deezer API rest… | autodzee | 2025-02-26T20:54:20+00:00 | |
| pysec-2025-4 |
|
Published in 2019, the automslc package is a Python library that bypasses Deezer API rest… | automslc | 2025-02-26T19:26:49+00:00 | |
| pysec-2024-235 |
8.1 (3.1)
|
With the following crawler configuration: ```python from bs4 import BeautifulSoup as Sou… | langchain-exa | 2024-02-26T16:27:49+00:00 | 2025-02-26T02:48:56.937312+00:00 |
| pysec-2023-194 |
9.8 (3.1)
|
langchain_experimental 0.0.14 allows an attacker to bypass the CVE-2023-36258 fix and exe… | langchain-experimental | 2023-10-09T20:15:00Z | 2025-02-23T07:46:11Z |
| pysec-2024-234 |
9.8 (3.1)
|
Jupyter Server Proxy allows users to run arbitrary external processes alongside their Jup… | jupyter-server-proxy | 2024-03-20T20:15:08+00:00 | 2025-02-21T18:23:35.992501+00:00 |
| pysec-2023-163 |
9.8 (3.1)
|
An issue in LanChain-ai Langchain v.0.0.245 allows a remote attacker to execute arbitrary… | numexpr | 2023-09-01T16:15:00Z | 2025-02-20T09:11:38.521949Z |
| pysec-2024-233 |
|
python-jose through 3.3.0 allows attackers to cause a denial of service (resource consump… | python-jose | 2024-04-26T00:15:09+00:00 | 2025-02-18T19:20:15.511369+00:00 |
| pysec-2024-232 |
|
python-jose through 3.3.0 has algorithm confusion with OpenSSH ECDSA keys and other key f… | python-jose | 2024-04-26T00:15:09+00:00 | 2025-02-18T19:20:15.468012+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33829 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.511177Z |
| gsd-2024-33828 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.373189Z |
| gsd-2024-33827 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.528643Z |
| gsd-2024-33826 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.371945Z |
| gsd-2024-33825 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.318128Z |
| gsd-2024-33824 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.385552Z |
| gsd-2024-33823 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.350433Z |
| gsd-2024-33822 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.561810Z |
| gsd-2024-33821 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.360168Z |
| gsd-2024-33820 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.334156Z |
| gsd-2024-33819 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.351158Z |
| gsd-2024-33818 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.556720Z |
| gsd-2024-33817 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.323149Z |
| gsd-2024-33816 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.388757Z |
| gsd-2024-33815 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.295529Z |
| gsd-2024-33814 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.590797Z |
| gsd-2024-33813 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.424031Z |
| gsd-2024-33812 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.367474Z |
| gsd-2024-33811 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.319336Z |
| gsd-2024-33810 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.527741Z |
| gsd-2024-33809 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.516352Z |
| gsd-2024-33808 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.458232Z |
| gsd-2024-33807 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.526483Z |
| gsd-2024-33806 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.291234Z |
| gsd-2024-33805 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.453392Z |
| gsd-2024-33804 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.298401Z |
| gsd-2024-33803 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.369211Z |
| gsd-2024-33802 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.336079Z |
| gsd-2024-33801 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.476298Z |
| gsd-2024-33800 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.371673Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-3184 | Malicious code in @breezeai-frontend/tailwind-config (npm) | 2026-04-29T21:15:52Z | 2026-05-04T23:51:15Z |
| mal-2026-3183 | Malicious code in @breezeai-frontend/cargo-ui (npm) | 2026-04-29T21:25:50Z | 2026-05-04T23:51:15Z |
| mal-2026-3059 | Malicious code in @clearpool/utils (npm) | 2026-04-26T17:25:37Z | 2026-05-04T23:51:15Z |
| mal-2026-3058 | Malicious code in @clearpool/table (npm) | 2026-04-26T17:45:45Z | 2026-05-04T23:51:15Z |
| mal-2026-3057 | Malicious code in @clearpool/streaming (npm) | 2026-04-26T18:08:13Z | 2026-05-04T23:51:15Z |
| mal-2026-3056 | Malicious code in @clearpool/comms (npm) | 2026-04-26T17:35:39Z | 2026-05-04T23:51:15Z |
| mal-2026-3334 | Malicious code in fanduel (npm) | 2026-05-04T21:55:51Z | 2026-05-04T21:55:51Z |
| mal-2026-3333 | Malicious code in rogiant-quick-install (PyPI) | 2026-05-04T21:10:00Z | 2026-05-04T21:10:00Z |
| mal-2026-3332 | Malicious code in rogiant (PyPI) | 2026-05-04T20:53:10Z | 2026-05-04T20:53:50Z |
| mal-2026-3331 | Malicious code in lazyhtml-scripts (npm) | 2026-05-04T19:42:20Z | 2026-05-04T19:42:20Z |
| mal-2026-3338 | Malicious code in ms.analytics-web (npm) | 2026-05-04T19:06:03Z | 2026-05-04T19:06:03Z |
| mal-2026-3328 | Malicious code in pocpoc2626 (npm) | 2026-05-04T16:36:10Z | 2026-05-04T17:38:11Z |
| mal-2026-3329 | Malicious code in api-typings (npm) | 2026-05-04T16:46:38Z | 2026-05-04T16:46:38Z |
| mal-2026-3330 | Malicious code in seek-pass (npm) | 2026-05-04T16:40:53Z | 2026-05-04T16:40:53Z |
| mal-2026-3327 | Malicious code in capacitor-plugin-service-worker (npm) | 2026-05-04T16:15:46Z | 2026-05-04T16:40:52Z |
| mal-2026-2662 | Malicious code in @automation-toolchain/f5-cloud-libs (npm) | 2026-04-14T13:05:55Z | 2026-05-04T13:42:12Z |
| mal-2026-3326 | Malicious code in paychex-common-vendor-lib (npm) | 2026-05-04T13:20:41Z | 2026-05-04T13:20:41Z |
| mal-2026-3325 | Malicious code in cloudauth-sdk (PyPI) | 2026-05-04T11:30:49Z | 2026-05-04T11:30:49Z |
| mal-2026-3309 | Malicious code in google-cloud-secret-manager-config-poc (npm) | 2026-05-03T16:10:57Z | 2026-05-04T10:37:22Z |
| mal-2026-3324 | Malicious code in randomchoicemas (PyPI) | 2026-05-04T10:29:41Z | 2026-05-04T10:29:41Z |
| mal-2026-3337 | Malicious code in @t-in-one/save_application_hid_to_storage (npm) | 2026-05-04T10:10:51Z | 2026-05-04T10:10:51Z |
| mal-2026-3335 | Malicious code in @bank-widgets/whats-new (npm) | 2026-05-04T09:30:54Z | 2026-05-04T09:30:54Z |
| mal-2026-3082 | Malicious code in kl-b2c-ui-kit (npm) | 2026-04-25T15:53:07Z | 2026-05-04T03:25:21Z |
| mal-2026-3117 | Malicious code in @business_promocode/cancel_promocode (npm) | 2026-04-27T14:15:48Z | 2026-05-04T03:25:18Z |
| mal-2026-3116 | Malicious code in @business_promocode/apply_promocode (npm) | 2026-04-27T14:06:02Z | 2026-05-04T03:25:18Z |
| mal-2026-3115 | Malicious code in @b2b_blocker/show_activation_error (npm) | 2026-04-27T14:06:01Z | 2026-05-04T03:25:18Z |
| mal-2026-3114 | Malicious code in @apple-pay-trust/finish (npm) | 2026-04-27T13:57:41Z | 2026-05-04T03:25:18Z |
| mal-2026-3113 | Malicious code in @apple-pay-trust/check-apple-pay-result (npm) | 2026-04-27T13:55:59Z | 2026-05-04T03:25:18Z |
| mal-2026-3111 | Malicious code in @apple-pay-trust/authorize-payment (npm) | 2026-04-27T14:25:57Z | 2026-05-04T03:25:18Z |
| mal-2026-3110 | Malicious code in @apiary-annex/title (npm) | 2026-04-27T13:55:48Z | 2026-05-04T03:25:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0324 | Linux Kernel: Mehrere Schwachstellen | 2026-02-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0309 | NGINX OSS und NGINX Plus: Schwachstelle ermöglicht Manipulation von Dateien | 2026-02-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0302 | Red Hat Enterprise Linux (python-wheel): Schwachstelle ermöglicht Privilegieneskalation und Codeausführung | 2026-02-03T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0280 | Linux Kernel: Mehrere Schwachstellen | 2026-02-01T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0244 | FreeRDP: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0215 | Linux Kernel: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0194 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0184 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0164 | Oracle Java SE: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0145 | FreeRDP: Mehrere Schwachstellen ermöglichen DoS und Codeausführung | 2026-01-19T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0129 | Golang Go: Mehrere Schwachstellen | 2026-01-15T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0119 | Linux Kernel: Mehrere Schwachstellen | 2026-01-14T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0111 | FreeRDP: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0086 | Linux Kernel: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0009 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2941 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-30T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2929 | Linux Kernel: Mehrere Schwachstellen | 2025-12-28T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2920 | Linux Kernel: Mehrere Schwachstellen | 2025-12-23T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2915 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-23T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2914 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-22T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2904 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-18T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2868 | Linux Kernel: Mehrere Schwachstellen | 2025-12-16T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2765 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-08T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2756 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-07T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2747 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2658 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-20T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2651 | GnuTLS: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-11-19T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2637 | Rsync: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-11-18T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2600 | PostgreSQL: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-13T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2595 | Linux Kernel: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-076-04 | Siemens SICAM SIAPP SDK | 2026-03-10T00:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-076-03 | Schneider Electric EcoStruxure Data Center Expert | 2026-03-10T07:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-076-02 | Schneider Electric SCADAPack and RemoteConnect | 2026-02-10T08:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-076-01 | CODESYS in Festo Automation Suite | 2026-02-26T08:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-015-10 | Schneider Electric EcoStruxure Power Build Rapsody (Update A) | 2026-01-13T08:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-25-160-02 | Hitachi Energy Relion 670, 650, SAM600-IO Series (Update A) | 2023-06-27T00:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-25-303-01 | International Standards Organization ISO 15118-2 (Update A) | 2025-10-30T05:00:00.000000Z | 2026-03-17T05:00:00.000000Z |
| icsa-26-071-06 | Inductive Automation Ignition Software | 2026-03-12T06:00:00.000000Z | 2026-03-13T06:00:00.000000Z |
| icsa-26-071-05 | Siemens Heliox EV Chargers | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-04 | Siemens SIMATIC | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-03 | Siemens SIDIS Prime | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-02 | Siemens RUGGEDCOM APE1808 Devices | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-01 | Trane Tracer SC, Tracer SC+, and Tracer Concierge | 2026-03-12T06:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-048-04 | Honeywell HIB2PI CCTV Camera (Update B) | 2026-02-17T07:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-043-08 | Siemens NX | 2026-02-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-043-03 | Siemens COMOS | 2025-12-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-345-05 | Siemens Advanced Licensing (SALT) Toolkit | 2025-12-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-345-04 | Siemens IAM Client | 2025-12-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-254-03 | Siemens SINAMICS Drives | 2025-09-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-231-02 | Siemens Mendix SAML Module | 2025-08-14T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-226-22 | Siemens Web Installer | 2025-08-12T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-162-05 | Siemens SIMATIC S7-1500 CPU Family | 2025-06-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-162-02 | Siemens RUGGEDCOM APE1808 | 2025-06-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-044-06 | Siemens RUGGEDCOM APE1808 | 2025-02-11T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-24-284-06 | Siemens SINEC Security Monitor | 2024-10-08T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-069-03 | Honeywell IQ4x BMS Controller | 2026-03-10T06:00:00.000000Z | 2026-03-10T06:00:00.000000Z |
| icsa-26-069-02 | Lantronix EDS3000PS and EDS5000 | 2026-03-10T06:00:00.000000Z | 2026-03-10T06:00:00.000000Z |
| icsa-26-069-01 | Apeman Cameras | 2026-03-10T06:00:00.000000Z | 2026-03-10T06:00:00.000000Z |
| icsa-26-069-04 | Ceragon Siklu MultiHaul and EtherHaul Series | 2026-03-10T05:00:00.000000Z | 2026-03-10T05:00:00.000000Z |
| icsa-26-064-01 | Delta Electronics CNCSoft-G2 | 2026-03-05T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-sma-attack-n9bf4 | Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager | 2025-12-17T16:00:00+00:00 | 2026-01-15T16:01:43+00:00 |
| cisco-sa-ise-xss-9tdh2kx | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-ise-xss-964cdxw5 | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-epnm-pi-stored-xss-gekx8ywk | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-ise-xxe-jwsbsdkt | Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability | 2026-01-07T16:00:00+00:00 | 2026-01-07T16:00:00+00:00 |
| cisco-sa-react-flight-tyw32ddb | Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 | 2025-12-04T16:00:00+00:00 | 2025-12-17T22:37:17+00:00 |
| cisco-sa-ise-multiple-vulns-o9beswjh | Cisco Identity Services Engine Reflected Cross-Site Scripting and Information Disclosure Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-12-04T14:23:54+00:00 |
| cisco-sa-cc-mult-vuln-gk4tfxsn | Multiple Cisco Contact Center Products Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-11-18T14:49:09+00:00 |
| cisco-sa-privesc-catc-ryjreelu | Cisco Catalyst Center Privilege Escalation Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-dnac-xss-wextvz59 | Cisco Catalyst Center Cross-Site Scripting Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-dnac-ci-zwlqvswt | Cisco Catalyst Center REST API Command Injection Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-catc-priv-esc-vs8eecux | Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-catc-open-redirect-3w5bk3je | Cisco Catalyst Center Virtual Appliance HTTP Open Redirect Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-cc-unauth-rce-qen8h7mq | Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-11-13T12:48:42+00:00 |
| cisco-sa-asaftd-webvpn-yrootuw | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Unauthorized Access Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:55+00:00 |
| cisco-sa-asaftd-webvpn-z5xp8eub | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:54+00:00 |
| cisco-sa-http-code-exec-wmfp3h3o | Cisco Secure Firewall Adaptive Security Appliance Software, Secure Firewall Threat Defense Software, IOS Software, IOS XE Software, and IOS XR Software Web Services Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:51+00:00 |
| cisco-sa-ise-radsupress-dos-8yf3jthh | Cisco Identity Services Engine RADIUS Suppression Denial of Service Vulnerability | 2025-11-05T16:00:00+00:00 | 2025-11-05T16:00:00+00:00 |
| cisco-sa-broadworks-xss-o696ymra | Cisco BroadWorks CommPilot Application Software Cross-Site Scripting Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-10-21T15:13:31+00:00 |
| cisco-sa-roomos-inf-disc-qggsbxam | Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-phone-dos-fpyjlv7a | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-secboot-uqfd8avc | Cisco IOS XE Software Secure Boot Bypass Vulnerabilities | 2025-09-24T16:00:00+00:00 | 2025-10-15T15:57:29+00:00 |
| cisco-sa-snmp-x4lphte | Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-06T18:27:02+00:00 |
| cisco-sa-ios-tacacs-hdb7thjw | Cisco IOS and IOS XE Software TACACS+ Authentication Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-01T16:39:50+00:00 |
| cisco-sa-cv-xss-rwrakaj9 | Cisco Cyber Vision Center Stored Cross-Site Scripting Vulnerabilities | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-cucm-stored-xss-fnj66yly | Cisco Unified Communications Manager Stored Cross-Site Scripting Vulnerability | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-cat9k-ptmd7bgy | Cisco IOS XE Software for Catalyst 9000 Series Switches Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-30T14:26:46+00:00 |
| cisco-sa-ap-ipv6-gw-tuazpn9o | Cisco Access Point Software Intermittent IPv6 Gateway Change Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:51+00:00 |
| cisco-sa-webui-xss-vwydgjou | Cisco IOS XE Software Web Authentication Reflected Cross-Site Scripting Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:50+00:00 |
| cisco-sa-snmpwred-x3mjyf5m | Cisco IOS XE Software Simple Network Management Protocol Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-33006 | Apache HTTP Server: mod_auth_digest timing attack | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:49.000Z |
| msrc_cve-2026-24072 | Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:41.000Z |
| msrc_cve-2026-34032 | Apache HTTP Server: mod_proxy_ajp: Heap Buffer Over-Read Due to Missing Null-Termination Check (ajp_msg_get_string) | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:33.000Z |
| msrc_cve-2026-34059 | Apache HTTP Server: mod_proxy_ajp: Heap Over-Read and memory disclosure in ajp_parse_data() | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:25.000Z |
| msrc_cve-2026-23918 | Apache HTTP Server: http2: double free and possible RCE on early reset | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:17.000Z |
| msrc_cve-2026-33523 | Apache HTTP Server: multiple modules: HTTP response splitting forwarding malicious status line | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:09.000Z |
| msrc_cve-2026-3832 | Gnutls: gnutls: security bypass allows acceptance of revoked server certificates via crafted ocsp response | 2026-04-02T00:00:00.000Z | 2026-05-07T01:11:00.000Z |
| msrc_cve-2026-3833 | Gnutls: gnutls: policy bypass due to case-sensitive nameconstraints comparison | 2026-04-02T00:00:00.000Z | 2026-05-07T01:10:52.000Z |
| msrc_cve-2026-33845 | Gnutls: gnutls: denial of service via dtls zero-length fragment | 2026-04-02T00:00:00.000Z | 2026-05-07T01:10:44.000Z |
| msrc_cve-2026-28810 | Predictable DNS Transaction IDs Enable Cache Poisoning in Built-in Resolver | 2026-04-02T00:00:00.000Z | 2026-05-07T01:10:02.000Z |
| msrc_cve-2026-43868 | Apache Thrift: Rust implementation vulnerable to CVE-2020-13949 pattern | 2026-05-02T00:00:00.000Z | 2026-05-07T01:09:57.000Z |
| msrc_cve-2026-43870 | Apache Thrift: Node.js web_server.js multi-vulnerability | 2026-05-02T00:00:00.000Z | 2026-05-07T01:09:49.000Z |
| msrc_cve-2026-43088 | net: af_key: zero aligned sockaddr tail in PF_KEY exports | 2026-05-02T00:00:00.000Z | 2026-05-07T01:08:44.000Z |
| msrc_cve-2026-43201 | APEI/GHES: ARM processor Error: don't go past allocated memory | 2026-05-02T00:00:00.000Z | 2026-05-07T01:08:28.000Z |
| msrc_cve-2026-43109 | x86: shadow stacks: proper error handling for mmap lock | 2026-05-02T00:00:00.000Z | 2026-05-07T01:07:11.000Z |
| msrc_cve-2026-43118 | btrfs: fix zero size inode with non-zero size after log replay | 2026-05-02T00:00:00.000Z | 2026-05-07T01:07:05.000Z |
| msrc_cve-2025-71285 | net: qrtr: Drop the MHI auto_queue feature for IPCR DL channels | 2026-05-02T00:00:00.000Z | 2026-05-07T01:06:39.000Z |
| msrc_cve-2025-71293 | drm/amdgpu/ras: Move ras data alloc before bad page check | 2026-05-02T00:00:00.000Z | 2026-05-07T01:06:24.000Z |
| msrc_cve-2026-42154 | Prometheus: remote read endpoint allows denial of service via crafted snappy payload | 2026-05-02T00:00:00.000Z | 2026-05-07T01:03:58.000Z |
| msrc_cve-2026-42151 | Prometheus Azure AD remote write OAuth client secret exposed via config API | 2026-05-02T00:00:00.000Z | 2026-05-07T01:03:49.000Z |
| msrc_cve-2026-34319 | CVE-2026-34319 | 2026-04-02T00:00:00.000Z | 2026-05-07T01:03:41.000Z |
| msrc_cve-2026-34318 | CVE-2026-34318 | 2026-04-02T00:00:00.000Z | 2026-05-07T01:03:34.000Z |
| msrc_cve-2026-34317 | CVE-2026-34317 | 2026-04-02T00:00:00.000Z | 2026-05-07T01:03:27.000Z |
| msrc_cve-2026-31455 | xfs: stop reclaim before pushing AIL during unmount | 2026-04-02T00:00:00.000Z | 2026-05-07T01:03:18.000Z |
| msrc_cve-2026-43073 | x86-64: rename misleadingly named '__copy_user_nocache()' function | 2026-05-02T00:00:00.000Z | 2026-05-07T01:03:11.000Z |
| msrc_cve-2026-35579 | CoreDNS TSIG authentication bypass on gRPC, QUIC, DoH, and DoH3 transports | 2026-05-02T00:00:00.000Z | 2026-05-07T01:03:04.000Z |
| msrc_cve-2026-32934 | CoreDNS DNS-over-QUIC unbounded goroutine growth leads to denial of service | 2026-05-02T00:00:00.000Z | 2026-05-07T01:02:56.000Z |
| msrc_cve-2026-32936 | CoreDNS DoH GET path missing size validation causes CPU and memory amplification | 2026-05-02T00:00:00.000Z | 2026-05-07T01:02:48.000Z |
| msrc_cve-2026-33489 | CoreDNS transfer plugin subzone ACL bypass via lexicographic zone comparison | 2026-05-02T00:00:00.000Z | 2026-05-07T01:02:40.000Z |
| msrc_cve-2026-33190 | CoreDNS TSIG authentication bypass on encrypted DNS transports | 2026-05-02T00:00:00.000Z | 2026-05-07T01:02:32.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0051 | Kwetsbaarheden verholpen in Siemens producten | 2026-02-10T12:27:40.637581Z | 2026-02-10T12:27:40.637581Z |
| ncsc-2026-0050 | Kwetsbaarheid verholpen in PEAR | 2026-02-09T10:41:43.856342Z | 2026-02-09T10:41:43.856342Z |
| ncsc-2026-0049 | Kwetsbaarheden verholpen in n8n | 2026-02-09T10:39:40.792744Z | 2026-02-09T10:39:40.792744Z |
| ncsc-2026-0046 | Kwetsbaarheden verholpen in Samsung mobile | 2026-02-09T07:48:28.751473Z | 2026-02-09T07:48:28.751473Z |
| ncsc-2026-0040 | Kwetsbaarheid verholpen in SmarterTools SmarterMail | 2026-01-27T10:51:39.476320Z | 2026-02-06T09:25:57.008166Z |
| ncsc-2026-0045 | Kwetsbaarheid verholpen in Cisco Meeting Management | 2026-02-06T09:22:16.831778Z | 2026-02-06T09:22:16.831778Z |
| ncsc-2026-0044 | Kwetsbaarheid verholpen in Cisco TelePresence Collaboration Endpoint | 2026-02-06T09:20:11.629058Z | 2026-02-06T09:20:11.629058Z |
| ncsc-2026-0042 | Kwetsbaarheden verholpen in SolarWinds Web Help Desk | 2026-01-28T16:37:21.114054Z | 2026-02-02T09:47:54.857445Z |
| ncsc-2025-0386 | Kwetsbaarheden verholpen in Fortinet producten | 2025-12-10T09:51:34.918202Z | 2026-01-28T15:46:10.814803Z |
| ncsc-2026-0041 | Kwetsbaarheid verholpen in Fortinet producten | 2026-01-28T09:32:41.752905Z | 2026-01-28T09:32:41.752905Z |
| ncsc-2026-0039 | ZeroDay kwetsbaarheid verholpen in Microsoft Office | 2026-01-27T07:27:52.867415Z | 2026-01-27T07:27:52.867415Z |
| ncsc-2026-0038 | Kwetsbaarheid verholpen in BIND 9 | 2026-01-23T08:54:43.506215Z | 2026-01-23T08:54:43.506215Z |
| ncsc-2026-0037 | Kwetsbaarheden verholpen in GitLab Community Edition en Enterprise Edition | 2026-01-22T12:35:30.505659Z | 2026-01-22T12:35:30.505659Z |
| ncsc-2026-0036 | Kwetsbaarheden verholpen in Cisco Unified Communications producten | 2026-01-22T09:49:39.156365Z | 2026-01-22T09:49:39.156365Z |
| ncsc-2026-0035 | Kwetsbaarheid verholpen in Palo Alto Networks PAN-OS | 2026-01-22T09:22:36.433609Z | 2026-01-22T09:22:36.433609Z |
| ncsc-2026-0034 | Kwetsbaarheden verholpen in Atlassian producten | 2026-01-22T09:03:42.667958Z | 2026-01-22T09:03:42.667958Z |
| ncsc-2026-0033 | Kwetsbaarheid verholpen in GNU Inetutils telnetd | 2026-01-21T14:15:46.424529Z | 2026-01-21T14:15:46.424529Z |
| ncsc-2026-0032 | Kwetsbaarheden verholpen in Oracle MySQL | 2026-01-21T10:12:24.844869Z | 2026-01-21T10:12:24.844869Z |
| ncsc-2026-0031 | Kwetsbaarheden verholpen in Oracle JD Edwards | 2026-01-21T10:12:00.674214Z | 2026-01-21T10:12:00.674214Z |
| ncsc-2026-0030 | Kwetsbaarheden verholpen in Oracle Java | 2026-01-21T10:11:39.759123Z | 2026-01-21T10:11:39.759123Z |
| ncsc-2026-0029 | Kwetsbaarheden verholpen in Oracle Hyperion | 2026-01-21T10:10:46.297433Z | 2026-01-21T10:10:46.297433Z |
| ncsc-2026-0028 | Kwetsbaarheden verholpen in Oracle Analytics | 2026-01-21T10:10:15.985753Z | 2026-01-21T10:10:15.985753Z |
| ncsc-2026-0027 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2026-01-21T10:08:59.379774Z | 2026-01-21T10:08:59.379774Z |
| ncsc-2026-0026 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2026-01-21T10:06:27.920991Z | 2026-01-21T10:06:27.920991Z |
| ncsc-2026-0025 | Kwetsbaarheden verholpen in Oracle Financial Services | 2026-01-21T09:55:33.889125Z | 2026-01-21T09:55:33.889125Z |
| ncsc-2026-0024 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2026-01-21T09:29:38.334428Z | 2026-01-21T09:29:38.334428Z |
| ncsc-2026-0023 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2026-01-21T09:27:58.715578Z | 2026-01-21T09:27:58.715578Z |
| ncsc-2026-0022 | Kwetsbaarheden verholpen in Oracle Communications producten | 2026-01-21T09:25:39.876330Z | 2026-01-21T09:25:39.876330Z |
| ncsc-2026-0021 | Kwetsbaarheden verholpen in Oracle Database Server producten | 2026-01-21T09:19:00.000449Z | 2026-01-21T09:19:00.000449Z |
| ncsc-2026-0020 | Kwetsbaarheden verholpen in Oracle Commerce | 2026-01-21T09:18:16.268788Z | 2026-01-21T09:18:16.268788Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20619-1 | Security update for coredns | 2026-04-23T16:09:35Z | 2026-04-23T16:09:35Z |
| opensuse-su-2026:10604-1 | ruby4.0-rubygem-rack-session-2.1.2-1.1 on GA media | 2026-04-22T00:00:00Z | 2026-04-22T00:00:00Z |
| opensuse-su-2026:10603-1 | jupyter-nbconvert-7.17.1-1.1 on GA media | 2026-04-22T00:00:00Z | 2026-04-22T00:00:00Z |
| opensuse-su-2026:10602-1 | glances-common-4.5.4-1.1 on GA media | 2026-04-22T00:00:00Z | 2026-04-22T00:00:00Z |
| opensuse-su-2026:10601-1 | grafana-11.6.14+security01-1.1 on GA media | 2026-04-22T00:00:00Z | 2026-04-22T00:00:00Z |
| opensuse-su-2026:10600-1 | csync2-2.0+git.1600444747.83b3644-3.1 on GA media | 2026-04-22T00:00:00Z | 2026-04-22T00:00:00Z |
| opensuse-su-2026:10599-1 | cacti-1.2.30+git306.82d5aef5-1.1 on GA media | 2026-04-22T00:00:00Z | 2026-04-22T00:00:00Z |
| opensuse-su-2026:20595-1 | Security update for tomcat11 | 2026-04-21T11:43:18Z | 2026-04-21T11:43:18Z |
| opensuse-su-2026:20593-1 | Security update for libpng16 | 2026-04-21T09:59:18Z | 2026-04-21T09:59:18Z |
| opensuse-su-2026:20591-1 | Security update for GraphicsMagick | 2026-04-21T09:49:40Z | 2026-04-21T09:49:40Z |
| opensuse-su-2026:20592-1 | Security update for ghostscript | 2026-04-21T09:49:39Z | 2026-04-21T09:49:39Z |
| opensuse-su-2026:20598-1 | Security update for python-PyPDF2 | 2026-04-21T09:43:19Z | 2026-04-21T09:43:19Z |
| opensuse-su-2026:20590-1 | Security update for gnome-remote-desktop | 2026-04-21T09:37:03Z | 2026-04-21T09:37:03Z |
| opensuse-su-2026:10584-1 | rclone-1.73.5-1.1 on GA media | 2026-04-20T00:00:00Z | 2026-04-20T00:00:00Z |
| opensuse-su-2026:10583-1 | python311-pypdf-6.10.2-1.1 on GA media | 2026-04-20T00:00:00Z | 2026-04-20T00:00:00Z |
| opensuse-su-2026:10582-1 | python311-PyPDF2-2.11.1-9.1 on GA media | 2026-04-20T00:00:00Z | 2026-04-20T00:00:00Z |
| opensuse-su-2026:10581-1 | haproxy-3.3.6+git91.af5637e93-1.1 on GA media | 2026-04-20T00:00:00Z | 2026-04-20T00:00:00Z |
| opensuse-su-2026:10578-1 | tempo-cli-2.10.4-1.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10577-1 | skopeo-1.22.1-1.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10576-1 | python311-jwcrypto-1.5.7-2.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10575-1 | python311-Pillow-12.2.0-2.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10574-1 | jetty-annotations-9.4.58-4.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10573-1 | cpp-httplib-devel-0.42.0-1.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10572-1 | chromedriver-147.0.7727.101-1.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10571-1 | bouncycastle-1.84-1.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10570-1 | aardvark-dns-1.17.1-1.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10567-1 | python311-Django-5.2.13-1.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10566-1 | liblog4cxx-devel-1.7.0-2.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10565-1 | libraw-devel-0.22.1-1.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10564-1 | libpng16-16-1.6.57-1.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:6192 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.27.0 Release. | 2026-03-30T15:41:48+00:00 | 2026-05-08T09:03:56+00:00 |
| rhsa-2026:6191 | Red Hat Security Advisory: container-tools:rhel8 security update | 2026-03-30T16:08:31+00:00 | 2026-05-08T09:03:56+00:00 |
| rhsa-2026:6184 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.19.13 security, enhancement & bug fix update | 2026-03-30T13:41:49+00:00 | 2026-05-08T09:03:56+00:00 |
| rhsa-2026:6170 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.21.1 | 2026-03-30T12:14:24+00:00 | 2026-05-08T09:03:56+00:00 |
| rhsa-2026:5876 | Red Hat Security Advisory: OpenShift Container Platform 4.19.27 packages and security update | 2026-04-01T10:19:18+00:00 | 2026-05-08T09:03:56+00:00 |
| rhsa-2026:6166 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.21.1 | 2026-03-30T10:40:40+00:00 | 2026-05-08T09:03:55+00:00 |
| rhsa-2026:6055 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.7.1 | 2026-03-30T07:07:31+00:00 | 2026-05-08T09:03:55+00:00 |
| rhsa-2026:5968 | Red Hat Security Advisory: Satellite 6.18.4 Async Update | 2026-03-26T19:47:53+00:00 | 2026-05-08T09:03:54+00:00 |
| rhsa-2026:5952 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.2.3 | 2026-03-26T15:03:15+00:00 | 2026-05-08T09:03:54+00:00 |
| rhsa-2026:5950 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.1.6 | 2026-03-26T14:51:43+00:00 | 2026-05-08T09:03:54+00:00 |
| rhsa-2026:5948 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.0.9 | 2026-03-26T14:31:40+00:00 | 2026-05-08T09:03:54+00:00 |
| rhsa-2026:5866 | Red Hat Security Advisory: OpenShift Container Platform 4.17.52 packages and security update | 2026-04-01T09:29:07+00:00 | 2026-05-08T09:03:54+00:00 |
| rhsa-2026:5649 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-03-24T16:17:51+00:00 | 2026-05-08T09:03:54+00:00 |
| rhsa-2026:5853 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-26T01:05:19+00:00 | 2026-05-08T09:03:53+00:00 |
| rhsa-2026:5533 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-24T04:02:36+00:00 | 2026-05-08T09:03:53+00:00 |
| rhsa-2026:5852 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-26T00:58:34+00:00 | 2026-05-08T09:03:52+00:00 |
| rhsa-2026:5851 | Red Hat Security Advisory: DevWorkspace Operator 0.40.0 release. | 2026-03-25T23:56:41+00:00 | 2026-05-08T09:03:52+00:00 |
| rhsa-2026:5807 | Red Hat Security Advisory: RHOAI 2.16.4 - Red Hat OpenShift AI | 2026-03-25T12:32:51+00:00 | 2026-05-08T09:03:52+00:00 |
| rhsa-2026:5665 | Red Hat Security Advisory: Red Hat Quay 3.10.19 | 2026-03-24T18:02:58+00:00 | 2026-05-08T09:03:51+00:00 |
| rhsa-2026:5327 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-23T07:40:40+00:00 | 2026-05-08T09:03:51+00:00 |
| rhsa-2026:5645 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.17.1 | 2026-03-24T15:38:55+00:00 | 2026-05-08T09:03:50+00:00 |
| rhsa-2026:5636 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.7.9 security update | 2026-03-24T14:23:47+00:00 | 2026-05-08T09:03:50+00:00 |
| rhsa-2026:5633 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.12.8 security update | 2026-03-24T14:07:27+00:00 | 2026-05-08T09:03:50+00:00 |
| rhsa-2026:5549 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.6.4 | 2026-03-24T07:31:25+00:00 | 2026-05-08T09:03:50+00:00 |
| rhsa-2026:5544 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-24T06:55:51+00:00 | 2026-05-08T09:03:49+00:00 |
| rhsa-2026:5463 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T16:40:06+00:00 | 2026-05-08T09:03:49+00:00 |
| rhsa-2026:5461 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-23T17:44:49+00:00 | 2026-05-08T09:03:49+00:00 |
| rhsa-2026:5459 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T16:21:50+00:00 | 2026-05-08T09:03:49+00:00 |
| rhsa-2026:5145 | Red Hat Security Advisory: yggdrasil-worker-package-manager security update | 2026-03-19T15:42:26+00:00 | 2026-05-08T09:03:49+00:00 |
| rhsa-2026:5452 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T16:13:04+00:00 | 2026-05-08T09:03:48+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2024-226-01 | Accutech Manager | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-101-05 | Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-04-11T09:46:26.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-05 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-01-10T15:41:57.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-04 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-02 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, and Modicon Controllers M580 and M340 | 2022-08-09T10:58:35.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-222-04 | Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert | 2021-08-10T02:27:39.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-194-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ x70, and Modicon Controllers M580 and M340 | 2021-07-13T08:22:02.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2019-281-02 | Modicon Controllers | 2019-09-26T12:53:28.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2018-081-01 | Embedded FTP Servers for Modicon PAC Controllers | 2018-03-22T03:39:21.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2024-191-03 | EcoStruxure Foxboro SCADA FoxRTU Station | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-191-02 | EcoStruxureTM Foxboro DCS Core Control Services | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-191-01 | Wiser Home Controller WHC-5918A | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-163-05 | SAGE RTU | 2024-06-11T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-163-04 | SpaceLogic AS-P and AS-B Automation Servers | 2024-06-11T00:00:00.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2024-163-03 | EVlink Home Smart | 2024-06-11T00:00:00.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2023-101-04 | Easy UPS Online Monitoring Software | 2023-04-11T14:09:13.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2024-100-01 | Easergy Studio | 2024-04-09T00:00:00.000Z | 2024-04-09T00:00:00.000Z |
| sevd-2023-346-01 | Trio™ Licensed and License-free Data Radios | 2023-12-12T00:00:00.000Z | 2024-04-09T00:00:00.000Z |
| sevd-2023-318-03 | Galaxy VS and Galaxy VL | 2023-11-14T08:28:19.000Z | 2024-04-09T00:00:00.000Z |
| sevd-2024-072-01 | Easergy T200 Multiple Vulnerabilities | 2024-03-12T07:02:04.000Z | 2024-03-12T07:02:04.000Z |
| sevd-2024-072-02 | EcoStruxure Power Design - Ecodial | 2024-03-12T05:00:00.000Z | 2024-03-12T05:00:00.000Z |
| sevd-2024-044-03 | EcoStruxure IT Gateway | 2024-02-13T12:21:44.000Z | 2024-02-13T12:21:44.000Z |
| sevd-2024-044-02 | Harmony Relay NFC | 2024-02-13T04:05:07.000Z | 2024-02-13T04:05:07.000Z |
| sevd-2024-009-02 | Easergy Studio | 2024-01-09T14:51:40.000Z | 2024-01-09T14:51:40.000Z |
| sevd-2023-101-01 | CODESYS Runtime Vulnerabilities | 2023-04-11T13:31:49.000Z | 2024-01-09T13:31:00.000Z |
| sevd-2023-101-03 | EcoStruxure™ Control Expert | 2023-04-11T10:14:15.000Z | 2024-01-09T10:14:00.000Z |
| sevd-2019-225-01 | Harmony (formerly known as Magelis) HMI Panels | 2019-08-13T09:59:02.000Z | 2024-01-09T09:59:02.000Z |
| sevd-2023-346-03 | Easy UPS Online Monitoring Software | 2023-12-12T00:00:00.000Z | 2023-12-12T00:00:00.000Z |
| sevd-2023-346-02 | ProLeiT Plant iT/Brewmaxx | 2023-12-12T00:00:00.000Z | 2023-12-12T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-552874 | SSA-552874: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2022-12-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-522291 | SSA-522291: Improper Certificate Validation Vulnerability in Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-514895 | SSA-514895: Multiple Vulnerabilities in Altair Grid Engine V2025.1.0 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-365596 | SSA-365596: DLL Hijacking Vulnerability in Siemens Software Center and Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-339694 | SSA-339694: Multiple Vulnerabilities in Spectrum Power 4 Before v4.70 SP12 Security Patch 2 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-322980 | SSA-322980: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2023-04-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-301229 | SSA-301229: Client-Side Enforcement of Server-Side Security Vulnerabilities in RUGGEDCOM ROX II | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-267056 | SSA-267056: Multiple Vulnerabilities in LOGO! 8 BM Devices | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-225578 | SSA-225578: Improper Access Control Vulnerability in SICAM GridEdge Before V2.7.3 | 2022-07-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-201498 | SSA-201498: Multiple Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices Before V3.11 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-194557 | SSA-194557: Improper Limitation of Filesystem Access through Web Server Vulnerability in SIPROTEC 5 | 2025-01-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-876787 | SSA-876787: Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-722410 | SSA-722410: Multiple Vulnerabilities in User Management Component (UMC) | 2025-09-09T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-625789 | SSA-625789: Multiple Vulnerabilities in SIMATIC S7-1200 CPU V1/V2 Devices | 2011-06-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-614723 | SSA-614723: Denial of Service Vulnerabilities in User Management Component (UMC) | 2025-05-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-541582 | SSA-541582: Multiple File Parsing Vulnerabilities in Solid Edge | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-486936 | SSA-486936: Authentication Vulnerability in SIMATIC ET 200SP Communication Processors | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-373591 | SSA-373591: Buffer Overflow Vulnerability in RUGGEDCOM ROS Devices | 2021-07-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-367714 | SSA-367714: Improper Integrity Check of Firmware Updates in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2025-05-23T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-318832 | SSA-318832: SQL Injection Vulnerability in SINEC NMS | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-279823 | SSA-279823: Cross-Site Scripting Vulnerability in SIMATIC S7-1200 CPU V2/V3 Before V3.0.2 | 2012-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-240718 | SSA-240718: Insecure Storage of HTTPS CA Certificate in SIMATIC S7-1200 CPU V2 | 2012-09-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-083019 | SSA-083019: Multiple Vulnerabilities in RUGGEDCOM ROS Devices | 2025-07-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-062309 | SSA-062309: Information Disclosure Vulnerability in TeleControl Server Basic V3.1 | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-054046 | SSA-054046: Unauthenticated Information Disclosure in Web Server of SIMATIC S7-1500 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-039007 | SSA-039007: Heap-based Buffer Overflow Vulnerability in User Management Component (UMC) | 2024-09-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-916339 | SSA-916339: Information Disclosure Vulnerability in Apogee PXC and Talon TC Devices | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-691715 | SSA-691715: Vulnerability in OPC Foundation Local Discovery Server Affecting Siemens Products | 2023-04-11T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-640476 | SSA-640476: Denial of Service Vulnerability in Industrial Edge Management | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-563922 | SSA-563922: Local Privilege Escalation Vulnerability in SIMOTION Tools | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21467-1 | Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise Micro 6.0) | 2026-05-05T12:51:00Z | 2026-05-05T12:51:00Z |
| suse-su-2026:1692-1 | Security update for xen | 2026-05-05T08:03:58Z | 2026-05-05T08:03:58Z |
| suse-su-2026:1691-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise 15 SP7) | 2026-05-05T07:04:40Z | 2026-05-05T07:04:40Z |
| suse-su-2026:1690-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise 15 SP7) | 2026-05-05T06:34:37Z | 2026-05-05T06:34:37Z |
| suse-su-2026:1689-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise 15 SP7) | 2026-05-05T06:34:34Z | 2026-05-05T06:34:34Z |
| suse-su-2026:1686-1 | Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 15 SP7) | 2026-05-05T06:34:25Z | 2026-05-05T06:34:25Z |
| suse-su-2026:1684-1 | Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-05-05T06:34:20Z | 2026-05-05T06:34:20Z |
| suse-su-2026:1671-2 | Security update for the Linux Kernel | 2026-05-04T09:19:31Z | 2026-05-04T09:19:31Z |
| suse-su-2026:1678-1 | Security update for the Linux Kernel | 2026-05-02T10:27:10Z | 2026-05-02T10:27:10Z |
| suse-su-2026:1677-1 | Security update for the Linux Kernel | 2026-05-02T10:26:10Z | 2026-05-02T10:26:10Z |
| suse-su-2026:21443-1 | Security update for the Linux Kernel | 2026-05-02T10:03:34Z | 2026-05-02T10:03:34Z |
| suse-su-2026:21457-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_20 | 2026-05-02T08:51:37Z | 2026-05-02T08:51:37Z |
| suse-su-2026:21444-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_20 | 2026-05-02T08:51:37Z | 2026-05-02T08:51:37Z |
| suse-su-2026:21463-1 | Security update for the Linux Kernel | 2026-05-02T08:18:13Z | 2026-05-02T08:18:13Z |
| suse-su-2026:21439-1 | Security update for the Linux Kernel | 2026-05-02T08:18:13Z | 2026-05-02T08:18:13Z |
| suse-su-2026:21454-1 | Security update for the Linux Kernel | 2026-05-02T08:10:07Z | 2026-05-02T08:10:07Z |
| suse-su-2026:1676-1 | Security update for the Linux Kernel | 2026-05-02T07:19:34Z | 2026-05-02T07:19:34Z |
| suse-su-2026:1675-1 | Security update for the Linux Kernel | 2026-05-02T07:19:20Z | 2026-05-02T07:19:20Z |
| suse-su-2026:1674-1 | Security update for the Linux Kernel | 2026-05-02T07:19:11Z | 2026-05-02T07:19:11Z |
| suse-su-2026:21421-1 | Security update for the Linux Kernel | 2026-05-02T07:09:30Z | 2026-05-02T07:09:30Z |
| suse-su-2026:1672-1 | Security update for the Linux Kernel | 2026-05-02T06:02:50Z | 2026-05-02T06:02:50Z |
| suse-su-2026:1671-1 | Security update for the Linux Kernel | 2026-05-02T06:01:05Z | 2026-05-02T06:01:05Z |
| suse-su-2026:1670-1 | Security update for the Linux Kernel | 2026-05-02T05:53:40Z | 2026-05-02T05:53:40Z |
| suse-su-2026:1669-1 | Security update for the Linux Kernel | 2026-05-02T05:38:43Z | 2026-05-02T05:38:43Z |
| suse-su-2026:21442-1 | Security update for the Linux Kernel | 2026-05-01T23:16:53Z | 2026-05-01T23:16:53Z |
| suse-su-2026:21453-1 | Security update for the Linux Kernel | 2026-05-01T22:29:58Z | 2026-05-01T22:29:58Z |
| suse-su-2026:21456-1 | Security update for kernel-livepatch-MICRO-6-0_Update_19 | 2026-05-01T21:26:43Z | 2026-05-01T21:26:43Z |
| suse-su-2026:21441-1 | Security update for kernel-livepatch-MICRO-6-0_Update_19 | 2026-05-01T21:26:43Z | 2026-05-01T21:26:43Z |
| suse-su-2026:1668-1 | Security update for the Linux Kernel | 2026-05-01T08:37:51Z | 2026-05-01T08:37:51Z |
| suse-su-2026:1667-1 | Security update for python-Pygments | 2026-04-30T17:22:44Z | 2026-04-30T17:22:44Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:9135 | Important: kernel-rt security update | 2026-04-20T00:00:00Z | 2026-04-21T08:48:27Z |
| alsa-2026:9131 | Important: kernel security update | 2026-04-20T00:00:00Z | 2026-04-21T08:45:35Z |
| alsa-2026:8945 | Important: freerdp security update | 2026-04-20T00:00:00Z | 2026-04-20T12:43:14Z |
| alsa-2026:8468 | Important: .NET 8.0 security update | 2026-04-16T00:00:00Z | 2026-04-20T08:45:13Z |
| alsa-2026:8473 | Important: .NET 10.0 security update | 2026-04-16T00:00:00Z | 2026-04-20T08:43:11Z |
| alsa-2026:8475 | Important: .NET 9.0 security update | 2026-04-16T00:00:00Z | 2026-04-20T08:40:30Z |
| alsa-2026:8534 | Important: libarchive security update | 2026-04-16T00:00:00Z | 2026-04-20T08:36:26Z |
| alsa-2026:8840 | Important: go-rpm-macros security update | 2026-04-20T00:00:00Z | 2026-04-20T08:35:06Z |
| alsa-2026:8841 | Important: go-rpm-macros security update | 2026-04-20T00:00:00Z | 2026-04-20T08:33:18Z |
| alsa-2026:8842 | Important: delve security update | 2026-04-20T00:00:00Z | 2026-04-20T08:31:59Z |
| alsa-2026:8888 | Important: openexr security update | 2026-04-20T00:00:00Z | 2026-04-20T08:30:11Z |
| alsa-2026:8858 | Important: giflib security update | 2026-04-20T00:00:00Z | 2026-04-20T08:28:56Z |
| alsa-2026:8457 | Important: freerdp security update | 2026-04-16T00:00:00Z | 2026-04-17T12:08:37Z |
| alsa-2026:8459 | Important: thunderbird security update | 2026-04-16T00:00:00Z | 2026-04-17T12:06:47Z |
| alsa-2026:8469 | Important: .NET 8.0 security update | 2026-04-16T00:00:00Z | 2026-04-17T11:12:30Z |
| alsa-2026:8510 | Important: libarchive security update | 2026-04-16T00:00:00Z | 2026-04-17T11:10:09Z |
| alsa-2026:8458 | Important: freerdp security update | 2026-04-16T00:00:00Z | 2026-04-17T09:35:48Z |
| alsa-2026:8470 | Important: .NET 8.0 security update | 2026-04-16T00:00:00Z | 2026-04-17T09:34:29Z |
| alsa-2026:8472 | Important: .NET 9.0 security update | 2026-04-16T00:00:00Z | 2026-04-17T09:30:19Z |
| alsa-2026:8492 | Important: libarchive security update | 2026-04-16T00:00:00Z | 2026-04-17T09:27:24Z |
| alsa-2026:8339 | Important: nodejs:20 security update | 2026-04-15T00:00:00Z | 2026-04-16T10:12:34Z |
| alsa-2026:8093 | Moderate: pcs security update | 2026-04-14T00:00:00Z | 2026-04-16T10:10:22Z |
| alsa-2026:8312 | Important: bind security update | 2026-04-15T00:00:00Z | 2026-04-16T10:09:13Z |
| alsa-2026:8317 | Important: squid:4 security update | 2026-04-15T00:00:00Z | 2026-04-16T10:06:56Z |
| alsa-2026:8352 | Important: bind security update | 2026-04-15T00:00:00Z | 2026-04-16T10:03:27Z |
| alsa-2026:8052 | Important: firefox security update | 2026-04-14T00:00:00Z | 2026-04-15T13:12:54Z |
| alsa-2026:8259 | Important: vim security update | 2026-04-15T00:00:00Z | 2026-04-15T10:37:43Z |
| alsa-2026:8096 | Moderate: perl:5.32 security update | 2026-04-14T00:00:00Z | 2026-04-15T10:32:31Z |
| alsa-2026:7915 | Important: bind9.18 security update | 2026-04-13T00:00:00Z | 2026-04-15T08:47:47Z |
| alsa-2026:7123 | Important: nodejs:22 security update | 2026-04-08T00:00:00Z | 2026-04-15T08:45:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-126 | Heap-buffer-overflow in md_analyze_inlines | 2022-02-07T00:00:05.720107Z | 2026-04-20T14:05:37.342162Z |
| osv-2026-595 | UNKNOWN WRITE in std::__1::istreambuf_iterator<char, std::__1::char_traits<char>> std::__1::num_g | 2026-04-20T00:05:53.121612Z | 2026-04-20T00:05:53.121886Z |
| osv-2026-589 | Heap-double-free in coap_new_oscore_conf | 2026-04-19T00:09:04.852781Z | 2026-04-19T00:09:04.853106Z |
| osv-2022-360 | Invalid-free in igl::MshLoader::~MshLoader | 2022-04-20T00:01:28.065887Z | 2026-04-18T14:16:11.274912Z |
| osv-2026-582 | Use-of-uninitialized-value in H5S_select_hyperslab | 2026-04-17T00:06:23.619732Z | 2026-04-17T00:06:23.620035Z |
| osv-2024-698 | Heap-use-after-free in xmlCharEncCloseFunc | 2024-07-31T00:12:19.254629Z | 2026-04-16T14:30:06.495743Z |
| osv-2021-777 | Heap-use-after-free in xmlAddNextSibling | 2021-05-20T00:00:30.166614Z | 2026-04-16T14:20:10.040296Z |
| osv-2022-150 | Heap-buffer-overflow in coap_split_uri_sub | 2022-02-14T00:00:50.308933Z | 2026-04-14T14:11:39.559701Z |
| osv-2023-35 | Heap-buffer-overflow in parse_classes_64 | 2023-01-29T13:01:45.762871Z | 2026-04-13T14:21:54.947682Z |
| osv-2023-96 | Heap-buffer-overflow in load_buffer | 2023-02-23T13:00:28.515290Z | 2026-04-13T14:21:48.708753Z |
| osv-2022-1137 | Heap-buffer-overflow in io_memory_read | 2022-11-05T00:00:44.243862Z | 2026-04-13T14:16:27.408482Z |
| osv-2022-993 | Stack-use-after-return in check_buffer | 2022-09-29T00:02:10.256639Z | 2026-04-13T14:16:10.642347Z |
| osv-2026-565 | Heap-buffer-overflow in xmlFAParsePosCharGroup | 2026-04-12T00:05:45.925380Z | 2026-04-12T00:05:45.925675Z |
| osv-2026-563 | UNKNOWN READ in bfd_getl32 | 2026-04-12T00:03:38.879591Z | 2026-04-12T00:03:38.879927Z |
| osv-2026-561 | Global-buffer-overflow in nameMatch | 2026-04-11T00:21:08.852326Z | 2026-04-11T00:21:08.852713Z |
| osv-2023-877 | Heap-buffer-overflow in btf_ensure_modifiable | 2023-09-18T14:02:44.989260Z | 2026-04-10T14:13:13.162417Z |
| osv-2022-842 | Stack-buffer-overflow in wc_Shake256_Final | 2022-09-05T00:00:28.251072Z | 2026-04-09T14:36:35.503150Z |
| osv-2023-107 | Heap-buffer-overflow in DecodeBasicOcspResponse | 2023-02-25T13:00:07.390537Z | 2026-04-09T14:34:49.566404Z |
| osv-2024-269 | Security exception in java.base/java.util.stream.AbstractPipeline.evaluate | 2024-04-18T00:04:02.456948Z | 2026-04-09T14:31:24.951720Z |
| osv-2021-1135 | Heap-use-after-free in prvTidyInsertedToken | 2021-08-16T00:01:09.422775Z | 2026-04-05T14:14:03.564509Z |
| osv-2026-535 | Security exception in org.htmlunit.cyberneko.HTMLTagBalancer.endElement | 2026-04-05T00:10:08.687399Z | 2026-04-05T00:10:08.687736Z |
| osv-2026-534 | Heap-buffer-overflow in cram_encode_container | 2026-04-05T00:10:00.162903Z | 2026-04-05T00:10:00.163328Z |
| osv-2026-532 | Heap-buffer-overflow in regsub | 2026-04-05T00:06:36.291055Z | 2026-04-05T00:06:36.291504Z |
| osv-2022-394 | Incorrect-function-pointer-type in cv::split | 2022-05-04T00:00:27.326853Z | 2026-04-04T14:23:39.520277Z |
| osv-2024-451 | Use-of-uninitialized-value in XpackDynamicTable::_make_space | 2024-05-08T00:14:48.544622Z | 2026-04-03T14:17:40.819969Z |
| osv-2026-518 | Use-of-uninitialized-value in ne_read_block | 2026-04-03T00:21:06.950773Z | 2026-04-03T00:21:06.951035Z |
| osv-2026-514 | Heap-buffer-overflow in format_expand1 | 2026-04-03T00:09:42.155641Z | 2026-04-03T00:09:42.155954Z |
| osv-2026-512 | Heap-buffer-overflow in g_utf8_get_char | 2026-04-03T00:07:59.707776Z | 2026-04-03T00:07:59.708039Z |
| osv-2026-505 | UNKNOWN READ in unsigned int Assimp::StreamReader<true, true>::Get<unsigned int> | 2026-04-02T00:19:34.148188Z | 2026-04-02T00:19:34.148494Z |
| osv-2026-504 | Heap-use-after-free in ObjectStream::getObject | 2026-04-02T00:16:28.228723Z | 2026-04-02T00:16:28.229037Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0045 | Timing Side-Channel in AES-CCM Tag Verification in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0043 | Timing Side-Channel in AES-CCM Tag Verification in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0065 | `tokio-signal` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0064 | `tokio-udp` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0063 | `tokio-executor` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0062 | `tokio-compat` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0061 | `tokio-fs` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0060 | `tokio-timer` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0059 | `tokio-tcp` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0058 | `tokio-io` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0057 | `tokio-reactor` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0056 | `tokio-codec` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0055 | `tokio-process` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0054 | `tokio-current-thread` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0053 | `tokio-tls` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0052 | `tokio-sync` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0051 | `tokio-threadpool` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0050 | `tokio-uds` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0048 | CRL Distribution Point Scope Check Logic Error in AWS-LC | 2026-03-19T12:00:00Z | 2026-03-20T17:11:58Z |
| rustsec-2026-0044 | AWS-LC X.509 Name Constraints Bypass via Wildcard/Unicode CN | 2026-03-19T12:00:00Z | 2026-03-20T17:11:58Z |
| rustsec-2026-0042 | CRL Distribution Point Scope Check Logic Error in AWS-LC | 2026-03-19T12:00:00Z | 2026-03-20T17:11:58Z |
| rustsec-2023-0103 | `postgress` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0102 | `serd` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0101 | `oncecell` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0100 | `xrvrv` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0099 | `envlogger` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0098 | `if-cfg` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0097 | `lazystatic` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2026-0040 | `tracing-ethers` was removed from crates.io due to malicious code | 2026-03-14T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0039 | `chrono_anchor` was removed from crates.io due to malicious code | 2026-03-10T12:00:00Z | 2026-03-17T22:31:38Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-jre-2024-21147 | 2026-05-08T05:46:18.207Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21145 | 2026-05-08T05:46:16.717Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21144 | 2026-05-08T05:46:15.285Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21140 | 2026-05-08T05:46:13.859Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21138 | 2026-05-08T05:46:12.364Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21131 | 2026-05-08T05:46:10.579Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21094 | 2026-05-08T05:46:08.864Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21085 | 2026-05-08T05:46:07.309Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21068 | 2026-05-08T05:46:05.655Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21012 | 2026-05-08T05:46:04.208Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21011 | 2026-05-08T05:46:02.790Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21005 | 2026-05-08T05:46:01.318Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21004 | 2026-05-08T05:45:59.846Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21003 | 2026-05-08T05:45:58.214Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-21002 | 2026-05-08T05:45:56.727Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20952 | 2026-05-08T05:45:55.153Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20945 | 2026-05-08T05:45:53.506Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20932 | 2026-05-08T05:45:52.171Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20926 | 2026-05-08T05:45:50.722Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20925 | 2026-05-08T05:45:49.200Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20923 | 2026-05-08T05:45:47.675Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20922 | 2026-05-08T05:45:46.134Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20921 | 2026-05-08T05:45:44.579Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20919 | 2026-05-08T05:45:43.034Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2024-20918 | 2026-05-08T05:45:41.638Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-42950 | 2026-05-08T05:45:40.029Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-42917 | 2026-05-08T05:45:38.575Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-41993 | 2026-05-08T05:45:36.919Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-41074 | 2026-05-08T05:45:35.287Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-25193 | 2026-05-08T05:45:33.646Z | 2026-05-08T06:11:36.072Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-mu81308 | gRPC-Go is the Go language implementation of gRPC | 2026-04-10T00:56:28.601214Z | 2026-04-09T11:29:32Z |
| cleanstart-2026-nx54250 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-10T01:03:29.003448Z | 2026-04-09T09:59:33Z |
| cleanstart-2026-ac01087 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-10T01:03:59.042951Z | 2026-04-09T09:55:12Z |
| cleanstart-2026-nz97711 | gRPC-Go is the Go language implementation of gRPC | 2026-04-10T01:00:58.666965Z | 2026-04-09T09:33:10Z |
| cleanstart-2026-hm40094 | filippo | 2026-04-10T01:03:28.912174Z | 2026-04-09T09:27:45Z |
| cleanstart-2026-dm93480 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-10T01:06:00.088585Z | 2026-04-09T09:11:04Z |
| cleanstart-2026-kl76732 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-10T01:03:58.949308Z | 2026-04-09T09:05:28Z |
| cleanstart-2026-dp55969 | Security fixes for ghsa-389x-839f-4rhx, ghsa-3p8m-j85q-pgmj, ghsa-4cx2-fc23-5wg6, ghsa-4g8c-wm8x-jfhw, ghsa-735f-pc8j-v9w8, ghsa-fghv-69vj-qj49, ghsa-prj3-ccx8-p6x4, ghsa-xq3w-v528-46rv applied in versions: 0.12.0-r16 | 2026-04-10T01:04:00.139766Z | 2026-04-09T09:00:58Z |
| cleanstart-2026-aa51484 | Security fixes for ghsa-389x-839f-4rhx, ghsa-3p8m-j85q-pgmj, ghsa-4cx2-fc23-5wg6, ghsa-4g8c-wm8x-jfhw, ghsa-735f-pc8j-v9w8, ghsa-fghv-69vj-qj49, ghsa-prj3-ccx8-p6x4, ghsa-xq3w-v528-46rv applied in versions: 0.12.0-r16 | 2026-04-10T01:04:01.115500Z | 2026-04-09T08:58:26Z |
| cleanstart-2026-jm69747 | Security fixes for ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 25.10.0-r1 | 2026-04-10T01:04:01.248430Z | 2026-04-09T08:55:52Z |
| cleanstart-2026-av56399 | Security fixes for ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 25.10.0-r1 | 2026-04-10T01:04:01.910374Z | 2026-04-09T08:54:48Z |
| cleanstart-2026-oc72960 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-10T01:04:28.955253Z | 2026-04-09T08:54:07Z |
| cleanstart-2026-iw23933 | gRPC-Go is the Go language implementation of gRPC | 2026-04-09T00:42:07.594705Z | 2026-04-08T10:12:34Z |
| cleanstart-2026-hz73294 | Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service | 2026-04-09T00:45:08.400884Z | 2026-04-08T10:12:22Z |
| cleanstart-2026-fz55932 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-04-09T00:41:07.286953Z | 2026-04-08T10:10:33Z |
| cleanstart-2026-ku98579 | gRPC-Go is the Go language implementation of gRPC | 2026-04-09T00:42:07.643397Z | 2026-04-08T10:07:21Z |
| cleanstart-2026-ly88807 | Docker CLI for Windows searches for plugin binaries in C:\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ProgramData\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\Docker\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\cli-plugins, a directory that does not exist by default | 2026-04-09T00:43:37.430373Z | 2026-04-08T10:02:31Z |
| cleanstart-2026-nv37937 | Docker CLI for Windows searches for plugin binaries in C:\\\\\\\\ProgramData\\\\\\\\Docker\\\\\\\\cli-plugins, a directory that does not exist by default | 2026-04-09T00:44:07.747698Z | 2026-04-08T09:58:55Z |
| cleanstart-2026-bd18029 | Docker CLI for Windows searches for plugin binaries in C:\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ProgramData\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\Docker\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\cli-plugins, a directory that does not exist by default | 2026-04-09T00:45:07.480117Z | 2026-04-08T09:49:10Z |
| cleanstart-2026-mo53190 | gRPC-Go is the Go language implementation of gRPC | 2026-04-09T00:49:37.904336Z | 2026-04-08T09:47:14Z |
| cleanstart-2026-co68219 | Docker CLI for Windows searches for plugin binaries in C:\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ProgramData\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\Docker\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\cli-plugins, a directory that does not exist by default | 2026-04-09T00:47:37.444297Z | 2026-04-08T09:44:10Z |
| cleanstart-2026-by59711 | gRPC-Go is the Go language implementation of gRPC | 2026-04-09T00:47:37.687304Z | 2026-04-08T09:36:51Z |
| cleanstart-2026-mi26424 | net/url package does not set a limit on the number of query parameters in a query | 2026-04-09T00:48:07.244191Z | 2026-04-08T09:30:12Z |
| cleanstart-2026-iw08736 | Uncontrolled Recursion vulnerability in Apache Commons Lang | 2026-04-09T00:53:08.467045Z | 2026-04-08T09:19:34Z |
| cleanstart-2026-bg72514 | Uncontrolled Recursion vulnerability in Apache Commons Lang | 2026-04-09T00:49:38.775284Z | 2026-04-08T09:13:42Z |
| cleanstart-2026-oq84658 | Netty is an asynchronous, event-driven network application framework | 2026-04-09T00:52:07.697782Z | 2026-04-08T08:14:27Z |
| cleanstart-2026-cq39708 | Netty is an asynchronous, event-driven network application framework | 2026-04-09T00:53:38.262441Z | 2026-04-08T08:11:56Z |
| cleanstart-2026-ge08280 | Ruby JSON is a JSON implementation for Ruby | 2026-04-09T01:01:38.909372Z | 2026-04-08T08:04:46Z |
| cleanstart-2026-ot38160 | url | 2026-04-09T00:55:38.018075Z | 2026-04-08T07:36:24Z |
| cleanstart-2026-ba09462 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-04-09T00:57:38.077873Z | 2026-04-08T07:00:07Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2023-ale-001 | Vulnérabilité dans Fortinet FortiOS | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-013 | [MàJ] Vulnérabilité dans Citrix ADC et Gateway | 2022-12-13T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-010 | Multiples vulnérabilités dans GLPI | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-009 | [MaJ] Vulnérabilité dans Zimbra Collaboration | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-008 | [MaJ] Multiples vulnérabilités dans Microsoft Exchange | 2022-09-30T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-007 | Multiples vulnérabilités dans Microsoft Windows | 2022-09-16T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2023-ALE-015 | [MàJ] Campagne d'exploitation d'une vulnérabilité affectant VMware ESXi | 2023-02-03T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2023-ALE-001 | Vulnérabilité dans Fortinet FortiOS | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-013 | [MàJ] Vulnérabilité dans Citrix ADC et Gateway | 2022-12-13T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-010 | Multiples vulnérabilités dans GLPI | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-009 | [MaJ] Vulnérabilité dans Zimbra Collaboration | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-008 | [MaJ] Multiples vulnérabilités dans Microsoft Exchange | 2022-09-30T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-007 | Multiples vulnérabilités dans Microsoft Windows | 2022-09-16T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-012 | [MàJ] Vulnérabilité dans FortiOS SSL-VPN | 2022-12-13T00:00:00.000000 | 2022-12-20T00:00:00.000000 |
| CERTFR-2022-ALE-012 | [MàJ] Vulnérabilité dans FortiOS SSL-VPN | 2022-12-13T00:00:00.000000 | 2022-12-20T00:00:00.000000 |
| certfr-2022-ale-011 | Vulnérabilité dans les produits Fortinet | 2022-10-14T00:00:00.000000 | 2022-10-14T00:00:00.000000 |
| CERTFR-2022-ALE-011 | Vulnérabilité dans les produits Fortinet | 2022-10-14T00:00:00.000000 | 2022-10-14T00:00:00.000000 |
| certfr-2022-ale-006 | [MàJ] Vulnérabilité dans Atlassian Confluence | 2022-06-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| certfr-2022-ale-002 | Vulnérabilité dans VMware Spring Cloud Gateway | 2022-03-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| CERTFR-2022-ALE-006 | [MàJ] Vulnérabilité dans Atlassian Confluence | 2022-06-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| CERTFR-2022-ALE-002 | Vulnérabilité dans VMware Spring Cloud Gateway | 2022-03-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| certfr-2022-ale-005 | [MàJ] Vulnérabilité dans Microsoft Windows | 2022-05-31T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| certfr-2022-ale-004 | Vulnérabilité dans F5 BIG-IP | 2022-05-11T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| CERTFR-2022-ALE-005 | [MàJ] Vulnérabilité dans Microsoft Windows | 2022-05-31T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| CERTFR-2022-ALE-004 | Vulnérabilité dans F5 BIG-IP | 2022-05-11T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| certfr-2022-ale-003 | [MàJ] Vulnérabilité dans l'implémentation du protocole RPC par Microsoft | 2022-04-13T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2022-ale-001 | [MaJ] Vulnérabilité dans Microsoft Windows | 2022-01-12T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-022 | [MaJ] Vulnérabilité dans Apache Log4j | 2021-12-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-021 | Vulnérabilité dans Microsoft Exchange | 2021-11-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-019 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-09-08T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0462 | Multiples vulnérabilités dans Microsoft Edge | 2026-04-20T00:00:00.000000 | 2026-04-20T00:00:00.000000 |
| certfr-2026-avi-0461 | Multiples vulnérabilités dans Apache Kafka | 2026-04-20T00:00:00.000000 | 2026-04-20T00:00:00.000000 |
| certfr-2026-avi-0460 | Vulnérabilité dans Xen | 2026-04-20T00:00:00.000000 | 2026-04-20T00:00:00.000000 |
| certfr-2026-avi-0459 | Vulnérabilité dans Mattermost Server | 2026-04-20T00:00:00.000000 | 2026-04-20T00:00:00.000000 |
| certfr-2026-avi-0458 | Vulnérabilité dans les produits Moxa | 2026-04-20T00:00:00.000000 | 2026-04-20T00:00:00.000000 |
| certfr-2026-avi-0457 | Multiples vulnérabilités dans Spring Framework | 2026-04-20T00:00:00.000000 | 2026-04-20T00:00:00.000000 |
| certfr-2026-avi-0243 | Vulnérabilité dans SPIP | 2026-03-06T00:00:00.000000 | 2026-04-20T00:00:00.000000 |
| certfr-2026-avi-0456 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-17T00:00:00.000000 | 2026-04-17T00:00:00.000000 |
| certfr-2026-avi-0455 | Multiples vulnérabilités dans IBM QRadar | 2026-04-17T00:00:00.000000 | 2026-04-17T00:00:00.000000 |
| certfr-2026-avi-0454 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-04-17T00:00:00.000000 | 2026-04-17T00:00:00.000000 |
| certfr-2026-avi-0453 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-04-17T00:00:00.000000 | 2026-04-17T00:00:00.000000 |
| certfr-2026-avi-0452 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-04-17T00:00:00.000000 | 2026-04-17T00:00:00.000000 |
| certfr-2026-avi-0446 | Multiples vulnérabilités dans Mattermost Server | 2026-04-16T00:00:00.000000 | 2026-04-17T00:00:00.000000 |
| certfr-2026-avi-0451 | Multiples vulnérabilités dans les produits Cisco | 2026-04-16T00:00:00.000000 | 2026-04-16T00:00:00.000000 |
| certfr-2026-avi-0450 | Multiples vulnérabilités dans les produits Splunk | 2026-04-16T00:00:00.000000 | 2026-04-16T00:00:00.000000 |
| certfr-2026-avi-0449 | Vulnérabilité dans Apache Kafka | 2026-04-16T00:00:00.000000 | 2026-04-16T00:00:00.000000 |
| certfr-2026-avi-0448 | Multiples vulnérabilités dans Google Chrome | 2026-04-16T00:00:00.000000 | 2026-04-16T00:00:00.000000 |
| certfr-2026-avi-0447 | Multiples vulnérabilités dans Drupal | 2026-04-16T00:00:00.000000 | 2026-04-16T00:00:00.000000 |
| certfr-2026-avi-0436 | Multiples vulnérabilités dans Tenable Identity Exposure | 2026-04-15T00:00:00.000000 | 2026-04-16T00:00:00.000000 |
| certfr-2026-avi-0445 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-15T00:00:00.000000 | 2026-04-15T00:00:00.000000 |
| certfr-2026-avi-0444 | Multiples vulnérabilités dans Microsoft Azure | 2026-04-15T00:00:00.000000 | 2026-04-15T00:00:00.000000 |
| certfr-2026-avi-0443 | Multiples vulnérabilités dans Microsoft .Net | 2026-04-15T00:00:00.000000 | 2026-04-15T00:00:00.000000 |
| certfr-2026-avi-0442 | Multiples vulnérabilités dans Microsoft Windows | 2026-04-15T00:00:00.000000 | 2026-04-15T00:00:00.000000 |
| certfr-2026-avi-0441 | Multiples vulnérabilités dans Microsoft Office | 2026-04-15T00:00:00.000000 | 2026-04-15T00:00:00.000000 |
| certfr-2026-avi-0440 | Multiples vulnérabilités dans les produits Fortinet | 2026-04-15T00:00:00.000000 | 2026-04-15T00:00:00.000000 |
| certfr-2026-avi-0439 | Multiples vulnérabilités dans Ivanti Neurons | 2026-04-15T00:00:00.000000 | 2026-04-15T00:00:00.000000 |
| certfr-2026-avi-0438 | Multiples vulnérabilités dans les produits Adobe | 2026-04-15T00:00:00.000000 | 2026-04-15T00:00:00.000000 |
| certfr-2026-avi-0437 | Vulnérabilité dans Python | 2026-04-15T00:00:00.000000 | 2026-04-15T00:00:00.000000 |
| certfr-2026-avi-0435 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-14T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| certfr-2026-avi-0434 | Multiples vulnérabilités dans les produits SAP | 2026-04-14T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-002030 | Multiple Vulnerabilities in Cosminexus | 2026-01-29T10:32+09:00 | 2026-01-29T10:32+09:00 |
| jvndb-2026-001972 | Archer MR600 vulnerable to OS command injection | 2026-01-28T10:41+09:00 | 2026-01-28T10:41+09:00 |
| jvndb-2026-000011 | beat-access for Windows may insecurely load Dynamic Link Libraries | 2026-01-27T18:22+09:00 | 2026-01-27T18:22+09:00 |
| jvndb-2026-001732 | Multiple Brother software installers may insecurely load Dynamic Link Libraries | 2026-01-26T16:04+09:00 | 2026-01-26T16:04+09:00 |
| jvndb-2026-000010 | Command injection vulnerability in ASUS routers | 2026-01-23T15:22+09:00 | 2026-01-23T15:22+09:00 |
| jvndb-2026-001663 | "iRMC S5/S6" implemented in PRIMERGY vulnerable to incorrect authorization | 2026-01-23T11:29+09:00 | 2026-01-23T11:29+09:00 |
| jvndb-2026-001662 | Multiple vulnerabilities in Trend Micro Apex Central (January 2026) | 2026-01-23T11:29+09:00 | 2026-01-23T11:29+09:00 |
| jvndb-2026-000009 | Installer of Fujitsu ServerView Agents for Windows may insecurely load Dynamic Link Libraries | 2026-01-21T15:17+09:00 | 2026-01-21T15:17+09:00 |
| jvndb-2026-000008 | Ruijie Networks AP180 series vulnerable to OS command injection | 2026-01-21T15:17+09:00 | 2026-01-21T15:17+09:00 |
| jvndb-2026-001582 | Security information for Hitachi Disk Array Systems | 2026-01-21T12:11+09:00 | 2026-01-21T12:11+09:00 |
| jvndb-2026-001578 | ETERNUS SF vulnerable to insertion of sensitive information into maintenance data | 2026-01-20T20:00+09:00 | 2026-01-20T20:00+09:00 |
| jvndb-2026-001380 | Multiple vulnerabilities in Canon Small Office Multifunction Printers and Laser Printers | 2026-01-19T10:08+09:00 | 2026-01-19T10:08+09:00 |
| jvndb-2026-000007 | Multiple Vulnerabilities in TOA Network Cameras TRIFORA 3 series | 2026-01-16T15:06+09:00 | 2026-01-16T15:06+09:00 |
| jvndb-2025-022878 | Media Player MP-01 vulnerable to Missing Authentication for Critical Function | 2025-12-24T11:10+09:00 | 2026-01-15T11:10+09:00 |
| jvndb-2026-000006 | Chainlit vulnerable to improper access restriction | 2026-01-14T17:03+09:00 | 2026-01-14T17:03+09:00 |
| jvndb-2026-000002 | Multiple vulnerabilities in multiple NEC branded projectors manufactured by Sharp Display Solutions, Ltd. | 2026-01-07T14:10+09:00 | 2026-01-14T16:54+09:00 |
| jvndb-2026-000005 | Multiple vulnerabilities in EATON UPS Companion | 2026-01-13T19:01+09:00 | 2026-01-13T19:01+09:00 |
| jvndb-2026-000003 | RICOH Streamline NX vulnerable to improper authorization | 2026-01-09T18:17+09:00 | 2026-01-09T18:17+09:00 |
| jvndb-2026-000004 | The installers for multiple PIONEER products may insecurely load Dynamic Link Libraries | 2026-01-08T13:47+09:00 | 2026-01-08T13:47+09:00 |
| jvndb-2026-000001 | Origin validation error vulnerability in Fujitsu Security Solution AuthConductor Client Basic V2 | 2026-01-07T14:19+09:00 | 2026-01-07T14:19+09:00 |
| jvndb-2026-001001 | Authentication bypass vulnerability in OpenBlocks series | 2026-01-07T10:46+09:00 | 2026-01-07T10:46+09:00 |
| jvndb-2025-019621 | EPSON WebConfig / Epson Web Control for SEIKO EPSON Projector Products do not restrict excessive authentication attempts | 2025-11-21T15:31+09:00 | 2025-12-24T10:54+09:00 |
| jvndb-2025-014967 | Multiple vulnerabilities in multiple Keyence products | 2025-10-03T11:19+09:00 | 2025-12-23T14:36+09:00 |
| jvndb-2025-000117 | SEIKO EPSON printer Web Config vulnerable to stack-based buffer overflow | 2025-12-16T15:31+09:00 | 2025-12-23T11:57+09:00 |
| jvndb-2025-022400 | Ruijie Networks AP180 Series vulnerable to OS command injection | 2025-12-19T12:33+09:00 | 2025-12-19T12:33+09:00 |
| jvndb-2025-000118 | GROWI vulnerable to cross-site request forgery | 2025-12-17T13:04+09:00 | 2025-12-17T13:04+09:00 |
| jvndb-2025-022062 | Multiple vulnerabilities in CHOCO TEI WATCHER mini | 2025-12-17T11:28+09:00 | 2025-12-17T11:28+09:00 |
| jvndb-2025-000115 | QND vulnerable to privilege escalation | 2025-12-11T14:33+09:00 | 2025-12-11T14:33+09:00 |
| jvndb-2025-000113 | Multiple vulnerabilities in GroupSession | 2025-12-08T17:48+09:00 | 2025-12-11T11:30+09:00 |
| jvndb-2025-000091 | Multiple I-O DATA NAS management applications register Windows services with unquoted file paths | 2025-10-22T15:04+09:00 | 2025-12-10T16:20+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-18429 | Oracle MySQL Server DML组件拒绝服务漏洞 | 2026-04-22 | 2026-04-24 |
| cnvd-2026-18428 | Oracle MySQL Server Optimizer拒绝服务漏洞(CNVD-2026-18428) | 2026-04-22 | 2026-04-24 |
| cnvd-2026-18427 | Oracle VM VirtualBox Core组件权限提升漏洞(CNVD-2026-18427) | 2026-04-22 | 2026-04-24 |
| cnvd-2026-18426 | Oracle VM VirtualBox Core组件内存破坏漏洞(CNVD-2026-18426) | 2026-04-22 | 2026-04-24 |
| cnvd-2026-18425 | Oracle VM VirtualBox Core组件权限提升漏洞(CNVD-2026-18425) | 2026-04-22 | 2026-04-24 |
| cnvd-2026-18424 | Endian Firewall DATE参数操作系统命令注入漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18423 | Endian Firewall DATE参数操作系统命令注入漏洞(CNVD-2026-18423) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18422 | Endian Firewall DATE参数操作系统命令注入漏洞(CNVD-2026-18422) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18419 | Endian Firewall DATE参数操作系统命令注入漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18418 | Endian Firewall remark参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18417 | Endian Firewall remark参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18416 | Endian Firewall NAME参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18415 | Endian Firewall remark参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18414 | Endian Firewall name参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18413 | Endian Firewall name参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18412 | Endian Firewall dscp参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18411 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18411) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18410 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18410) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18409 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18409) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18408 | Oracle VM VirtualBox Core组件内存破坏漏洞 | 2026-04-22 | 2026-04-24 |
| cnvd-2026-18407 | Oracle VM VirtualBox Core组件拒绝服务漏洞 | 2026-04-22 | 2026-04-24 |
| cnvd-2026-18403 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18403) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18402 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18402) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18401 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18401) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18400 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18400) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18399 | Endian Firewall mimetypes参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18398 | Endian Firewall user参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18394 | Endian Firewall group参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18390 | Endian Firewall DOMAIN参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18382 | Endian Firewall domain参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15785 | Уязвимость компонента imxfb ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15782 | Уязвимость компонента cpcap-charger ядра операционной системы Linux, позволяющая нарушите… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15781 | Уязвимость компонента davinci ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15780 | Уязвимость компонента net/netfilter/xt_nfacct.c ядра операционной системы Linux, позволяю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15779 | Уязвимость компонента net/mac80211/tdls.c ядра операционной системы Linux, позволяющая на… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15778 | Уязвимость компонента net/mlx5 ядра операционной системы Linux, позволяющая нарушителю вы… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15776 | Уязвимость компонента fs/f2fs/f2fs.h ядра операционной системы Linux, позволяющая нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15773 | Уязвимость компонента ice/ice_ddp.c ядра операционной системы Linux, позволяющая нарушите… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15772 | Уязвимость компонента netlink ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15771 | Уязвимость компонента drivers/regulator/core.c ядра операционной системы Linux, позволяющ… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15770 | Уязвимость компонента arm64/entry ядра операционной системы Linux, позволяющая нарушителю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15769 | Уязвимость компонента drivers/i2c/busses/i2c-qup.c ядра операционной системы Linux, позво… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15767 | Уязвимость ядра операционной системы Linux, связанная с чтением за границами буфера памят… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15766 | Уязвимость компонента venus ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15765 | Уязвимость компонента uvcvideo ядра операционной системы Linux, позволяющая нарушителю вы… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15764 | Уязвимость компонента mm/ptdump ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15763 | Уязвимость компонента hv_netvsc ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15762 | Уязвимость компонента net/sched ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15761 | Уязвимость компонента media ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15760 | Уязвимость компонента media/dvb-frontends/dib7000p.c ядра операционной системы Linux, поз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15759 | Уязвимость компонента lpfc/lpfc_scsi.c ядра операционной системы Linux, позволяющая наруш… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15758 | Уязвимость компонента mips/kernel/process.c ядра операционной системы Linux, позволяющая … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15757 | Уязвимость компонента jfs/jfs_dmap.c ядра операционной системы Linux, позволяющая нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15756 | Уязвимость компонента scsi/bfa/bfad_im.c ядра операционной системы Linux, позволяющая нар… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15755 | Уязвимость компонента scsi/libiscsi.c ядра операционной системы Linux, позволяющая наруши… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15753 | Уязвимость компонента sound/soc/soc-core.c ядра операционной системы Linux, позволяющая н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15752 | Уязвимость компонента fs/hfsplus/xattr.c ядра операционной системы Linux, позволяющая нар… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15751 | Уязвимость компонента fs/hfs/bnode.c ядра операционной системы Linux, позволяющая нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15750 | Уязвимость компонента nf_conntrack_netlink.c ядра операционной системы Linux, позволяющая… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15749 | Уязвимость компонента fs/nfsd/nfs4state.c ядра операционной системы Linux, позволяющая на… | 15.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202308-3129 | D-Link DAP-2622 DDP Set AG Profile Auth Username Stack-based Buffer Overflow Remote Code … | 2024-07-23T22:20:12.344000Z |
| var-202308-3114 | D-Link DAP-2622 DDP Reset Auth Password Stack-based Buffer Overflow Remote Code Execution… | 2024-07-23T22:20:12.516000Z |
| var-202308-3113 | D-Link DAP-2622 DDP Configuration Backup Server Address Stack-based Buffer Overflow Remot… | 2024-07-23T22:20:12.318000Z |
| var-202308-3105 | D-Link DAP-2622 DDP Reset Factory Auth Username Stack-based Buffer Overflow Remote Code E… | 2024-07-23T22:20:12.284000Z |
| var-202008-1238 | In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.… | 2024-07-23T22:19:51.232000Z |
| var-201302-0307 | Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on … | 2024-07-23T22:19:51.408000Z |
| var-201804-1162 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T22:19:50.233000Z |
| var-201912-0592 | An input validation issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:19:49.641000Z |
| var-201302-0224 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:19:19.153000Z |
| var-201711-0476 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T22:19:18.201000Z |
| var-202108-1141 | An access issue was addressed with improved access restrictions. This issue is fixed in m… | 2024-07-23T22:19:17.980000Z |
| var-200609-0314 | Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to… | 2024-07-23T22:19:17.031000Z |
| var-202005-0222 | ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related … | 2024-07-23T22:19:16.422000Z |
| var-202006-1653 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 a… | 2024-07-23T22:19:15.782000Z |
| var-201205-0312 | sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI… | 2024-07-23T22:18:38.885000Z |
| var-201903-0424 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:18:36.709000Z |
| var-201401-0254 | The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.… | 2024-07-23T22:18:17.213000Z |
| var-201806-1449 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T22:18:16.692000Z |
| var-202201-0405 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. vim/vim Exists in a… | 2024-07-23T22:17:38.807000Z |
| var-201711-0450 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T22:17:38.652000Z |
| var-200701-0510 | The Adobe PDF specification 1.3, as implemented by Apple Mac OS X Preview, allows remote … | 2024-07-23T22:17:06.694000Z |
| var-201904-1360 | A cookie management issue was addressed with improved checks. This issue affected version… | 2024-07-23T22:16:09.056000Z |
| var-201108-0236 | The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF de… | 2024-07-23T22:16:08.579000Z |
| var-200107-0173 | Cisco CBOS 2.3.0.053 sends output of the "sh nat" (aka "show nat") command to the termina… | 2024-07-23T22:16:08.756000Z |
| var-201206-0055 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:14:46.537000Z |
| var-201901-1586 | In Safari before 11.1.2, iTunes before 12.8 for Windows, iOS before 11.4.1, tvOS before 1… | 2024-07-23T22:14:43.295000Z |
| var-201903-0423 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:14:42.527000Z |
| var-201304-0373 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:14:42.081000Z |
| var-200701-0061 | Finder 10.4.6 on Apple Mac OS X 10.4.8 allows user-assisted remote attackers to cause a d… | 2024-07-23T22:14:37.008000Z |
| var-200502-0025 | The der_chop script in the openssl package in Trustix Secure Linux 1.5 through 2.1 and ot… | 2024-07-23T22:14:37.244000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2017-003 | PHOENIX CONTACT: WLAN enabled devices utilising WPA2 encryption | 2017-11-09T16:20:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2024-029 | Phoenix Contact: Unbounded growth of OpenSSL session cache in multiple FL MGUARD devices | 2024-06-11T06:00:00.000Z | 2024-06-11T06:00:00.000Z |
| vde-2024-019 | Phoenix Contact: Multiple vulnerabilities in the Firmware of CHARX SEC charge controllers | 2024-05-14T06:00:00.000Z | 2024-05-14T06:00:00.000Z |
| vde-2024-011 | PHOENIX CONTACT: Multiple vulnerabilities in CHARX SEC charge controllers | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| vde-2023-055 | Phoenix Contact: Automation Worx and classic line controllers prone to Incorrect Permission Assignment for Critical Resource | 2023-12-12T07:00:00.000Z | 2023-12-12T07:00:00.000Z |
| vde-2023-062 | Phoenix Contact: WIBU-SYSTEMS CodeMeter Runtime vulnerabilities in multiple products | 2023-11-21T08:15:00.000Z | 2023-11-21T08:15:00.000Z |
| vde-2023-030 | Phoenix Contact: Multiple products affected by WIBU Codemeter Vulnerability (Update A) | 2023-09-19T06:50:00.000Z | 2023-11-13T11:00:00.000Z |
| vde-2023-004 | Phoenix Contact: Directory Traversal Vulnerability in ENERGY AXC PU Web service | 2023-04-11T08:00:00.000Z | 2023-04-11T08:00:00.000Z |
| vde-2022-018 | PHOENIX CONTACT: Multiple vulnerabilities in RAD-ISM-900-EN-BD devices | 2022-05-11T14:20:00.000Z | 2022-05-11T14:20:00.000Z |
| vde-2021-046 | PHOENIX CONTACT: XSS and memory-leak in FL MGUARD 1102/1105 | 2021-11-10T07:23:00.000Z | 2021-11-10T07:23:00.000Z |
| vde-2020-049 | Phoenix Contact: Multiple vulnerabilities in PLCnext Control devices < 2021.0 LTS | 2020-12-17T09:00:00.000Z | 2020-12-17T09:00:00.000Z |
| vde-2020-030 | PHOENIX CONTACT: Products utilizing WIBU-SYSTEMS CodeMeter components | 2020-09-09T06:22:00.000Z | 2020-09-09T06:22:00.000Z |
| vde-2020-018 | PHOENIX CONTACT: FL MGUARD, TC MGUARD, TC ROUTER and TC CLOUD CLIENT: PPPD vulnerable to CVE-2020-8597 | 2020-06-02T08:42:00.000Z | 2020-06-02T08:42:00.000Z |
| vde-2020-013 | PHOENIX CONTACT: Local Privilege Escalation in Portico Remote desktop control software | 2020-03-27T09:48:00.000Z | 2020-03-27T09:48:00.000Z |
| vde-2018-015 | Phoenix Contact: AXL F BK PN Denial of Service Vulnerability | 2018-09-21T07:03:00.000Z | 2018-09-21T07:03:00.000Z |
| vde-2018-012 | PHOENIX CONTACT: ILC 1x1 ETH Denial of Service | 2018-08-13T11:55:00.000Z | 2018-08-13T11:55:00.000Z |
| vde-2018-005 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series through 1.33 allows Information Exposure | 2018-05-16T05:35:00.000Z | 2018-05-16T05:35:00.000Z |