Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43454 |
N/A
|
netfilter: nf_tables: Fix for duplicate device in netd… |
Linux |
Linux |
2026-05-08T14:22:18.719Z | 2026-05-08T14:22:18.719Z |
| CVE-2026-43453 |
N/A
|
netfilter: nft_set_pipapo: fix stack out-of-bounds rea… |
Linux |
Linux |
2026-05-08T14:22:18.087Z | 2026-05-08T14:22:18.087Z |
| CVE-2026-43452 |
N/A
|
netfilter: x_tables: guard option walkers against 1-by… |
Linux |
Linux |
2026-05-08T14:22:17.361Z | 2026-05-08T14:22:17.361Z |
| CVE-2026-43451 |
N/A
|
netfilter: nfnetlink_queue: fix entry leak in bridge v… |
Linux |
Linux |
2026-05-08T14:22:16.716Z | 2026-05-08T14:22:16.716Z |
| CVE-2026-43450 |
N/A
|
netfilter: nfnetlink_cthelper: fix OOB read in nfnl_ct… |
Linux |
Linux |
2026-05-08T14:22:15.915Z | 2026-05-08T14:22:15.915Z |
| CVE-2026-43449 |
N/A
|
nvme-pci: Fix slab-out-of-bounds in nvme_dbbuf_set |
Linux |
Linux |
2026-05-08T14:22:15.276Z | 2026-05-08T14:22:15.276Z |
| CVE-2026-43448 |
N/A
|
nvme-pci: Fix race bug in nvme_poll_irqdisable() |
Linux |
Linux |
2026-05-08T14:22:14.633Z | 2026-05-08T14:22:14.633Z |
| CVE-2026-43447 |
N/A
|
iavf: fix PTP use-after-free during reset |
Linux |
Linux |
2026-05-08T14:22:13.988Z | 2026-05-08T14:22:13.988Z |
| CVE-2026-43446 |
N/A
|
accel/amdxdna: Fix runtime suspend deadlock when there… |
Linux |
Linux |
2026-05-08T14:22:13.328Z | 2026-05-08T14:22:13.328Z |
| CVE-2026-43445 |
N/A
|
e1000/e1000e: Fix leak in DMA error cleanup |
Linux |
Linux |
2026-05-08T14:22:12.660Z | 2026-05-08T14:22:12.660Z |
| CVE-2026-43444 |
N/A
|
drm/amdkfd: Unreserve bo if queue update failed |
Linux |
Linux |
2026-05-08T14:22:11.976Z | 2026-05-08T14:22:11.976Z |
| CVE-2026-43443 |
N/A
|
ASoC: amd: acp-mach-common: Add missing error check fo… |
Linux |
Linux |
2026-05-08T14:22:11.303Z | 2026-05-08T14:22:11.303Z |
| CVE-2026-43442 |
N/A
|
io_uring: fix physical SQE bounds check for SQE_MIXED … |
Linux |
Linux |
2026-05-08T14:22:10.656Z | 2026-05-08T14:22:10.656Z |
| CVE-2026-43441 |
N/A
|
net: bonding: Fix nd_tbl NULL dereference when IPv6 is… |
Linux |
Linux |
2026-05-08T14:22:09.982Z | 2026-05-08T14:22:09.982Z |
| CVE-2026-43440 |
N/A
|
net/mana: Null service_wq on setup error to prevent do… |
Linux |
Linux |
2026-05-08T14:22:09.334Z | 2026-05-08T14:22:09.334Z |
| CVE-2026-43439 |
N/A
|
cgroup: fix race between task migration and iteration |
Linux |
Linux |
2026-05-08T14:22:08.626Z | 2026-05-08T14:22:08.626Z |
| CVE-2026-43438 |
N/A
|
sched_ext: Remove redundant css_put() in scx_cgroup_init() |
Linux |
Linux |
2026-05-08T14:22:07.980Z | 2026-05-08T14:22:07.980Z |
| CVE-2026-43437 |
N/A
|
ALSA: pcm: fix use-after-free on linked stream runtime… |
Linux |
Linux |
2026-05-08T14:22:07.314Z | 2026-05-08T14:22:07.314Z |
| CVE-2026-43436 |
N/A
|
ALSA: usb-audio: Check endpoint numbers at parsing Sca… |
Linux |
Linux |
2026-05-08T14:22:06.632Z | 2026-05-08T14:22:06.632Z |
| CVE-2026-43435 |
N/A
|
rust_binder: fix oneway spam detection |
Linux |
Linux |
2026-05-08T14:22:05.921Z | 2026-05-08T14:22:05.921Z |
| CVE-2026-43434 |
N/A
|
rust_binder: check ownership before using vma |
Linux |
Linux |
2026-05-08T14:22:05.269Z | 2026-05-08T14:22:05.269Z |
| CVE-2026-43433 |
N/A
|
rust_binder: avoid reading the written value in offset… |
Linux |
Linux |
2026-05-08T14:22:04.632Z | 2026-05-08T14:22:04.632Z |
| CVE-2026-43432 |
N/A
|
usb: xhci: Fix memory leak in xhci_disable_slot() |
Linux |
Linux |
2026-05-08T14:22:03.985Z | 2026-05-08T14:22:03.985Z |
| CVE-2026-43431 |
N/A
|
xhci: Fix NULL pointer dereference when reading portli… |
Linux |
Linux |
2026-05-08T14:22:03.298Z | 2026-05-08T14:22:03.298Z |
| CVE-2026-43430 |
N/A
|
usb: yurex: fix race in probe |
Linux |
Linux |
2026-05-08T14:22:02.458Z | 2026-05-08T14:22:02.458Z |
| CVE-2026-43429 |
N/A
|
USB: usbtmc: Use usb_bulk_msg_killable() with user-spe… |
Linux |
Linux |
2026-05-08T14:22:01.739Z | 2026-05-08T14:22:01.739Z |
| CVE-2026-43428 |
N/A
|
USB: core: Limit the length of unkillable synchronous … |
Linux |
Linux |
2026-05-08T14:22:01.027Z | 2026-05-08T14:22:01.027Z |
| CVE-2026-43427 |
N/A
|
usb: class: cdc-wdm: fix reordering issue in read code path |
Linux |
Linux |
2026-05-08T14:22:00.345Z | 2026-05-08T14:22:00.345Z |
| CVE-2026-43426 |
N/A
|
usb: renesas_usbhs: fix use-after-free in ISR during d… |
Linux |
Linux |
2026-05-08T14:21:59.668Z | 2026-05-08T14:21:59.668Z |
| CVE-2026-43425 |
N/A
|
usb: image: mdc800: kill download URB on timeout |
Linux |
Linux |
2026-05-08T14:21:59.020Z | 2026-05-08T14:21:59.020Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43448 |
N/A
|
nvme-pci: Fix race bug in nvme_poll_irqdisable() |
Linux |
Linux |
2026-05-08T14:22:14.633Z | 2026-05-08T14:22:14.633Z |
| CVE-2026-43447 |
N/A
|
iavf: fix PTP use-after-free during reset |
Linux |
Linux |
2026-05-08T14:22:13.988Z | 2026-05-08T14:22:13.988Z |
| CVE-2026-43446 |
N/A
|
accel/amdxdna: Fix runtime suspend deadlock when there… |
Linux |
Linux |
2026-05-08T14:22:13.328Z | 2026-05-08T14:22:13.328Z |
| CVE-2026-43445 |
N/A
|
e1000/e1000e: Fix leak in DMA error cleanup |
Linux |
Linux |
2026-05-08T14:22:12.660Z | 2026-05-08T14:22:12.660Z |
| CVE-2026-43444 |
N/A
|
drm/amdkfd: Unreserve bo if queue update failed |
Linux |
Linux |
2026-05-08T14:22:11.976Z | 2026-05-08T14:22:11.976Z |
| CVE-2026-43443 |
N/A
|
ASoC: amd: acp-mach-common: Add missing error check fo… |
Linux |
Linux |
2026-05-08T14:22:11.303Z | 2026-05-08T14:22:11.303Z |
| CVE-2026-43442 |
N/A
|
io_uring: fix physical SQE bounds check for SQE_MIXED … |
Linux |
Linux |
2026-05-08T14:22:10.656Z | 2026-05-08T14:22:10.656Z |
| CVE-2026-43441 |
N/A
|
net: bonding: Fix nd_tbl NULL dereference when IPv6 is… |
Linux |
Linux |
2026-05-08T14:22:09.982Z | 2026-05-08T14:22:09.982Z |
| CVE-2026-43440 |
N/A
|
net/mana: Null service_wq on setup error to prevent do… |
Linux |
Linux |
2026-05-08T14:22:09.334Z | 2026-05-08T14:22:09.334Z |
| CVE-2026-43439 |
N/A
|
cgroup: fix race between task migration and iteration |
Linux |
Linux |
2026-05-08T14:22:08.626Z | 2026-05-08T14:22:08.626Z |
| CVE-2026-43438 |
N/A
|
sched_ext: Remove redundant css_put() in scx_cgroup_init() |
Linux |
Linux |
2026-05-08T14:22:07.980Z | 2026-05-08T14:22:07.980Z |
| CVE-2026-43437 |
N/A
|
ALSA: pcm: fix use-after-free on linked stream runtime… |
Linux |
Linux |
2026-05-08T14:22:07.314Z | 2026-05-08T14:22:07.314Z |
| CVE-2026-43436 |
N/A
|
ALSA: usb-audio: Check endpoint numbers at parsing Sca… |
Linux |
Linux |
2026-05-08T14:22:06.632Z | 2026-05-08T14:22:06.632Z |
| CVE-2026-43435 |
N/A
|
rust_binder: fix oneway spam detection |
Linux |
Linux |
2026-05-08T14:22:05.921Z | 2026-05-08T14:22:05.921Z |
| CVE-2026-43434 |
N/A
|
rust_binder: check ownership before using vma |
Linux |
Linux |
2026-05-08T14:22:05.269Z | 2026-05-08T14:22:05.269Z |
| CVE-2026-43433 |
N/A
|
rust_binder: avoid reading the written value in offset… |
Linux |
Linux |
2026-05-08T14:22:04.632Z | 2026-05-08T14:22:04.632Z |
| CVE-2026-43432 |
N/A
|
usb: xhci: Fix memory leak in xhci_disable_slot() |
Linux |
Linux |
2026-05-08T14:22:03.985Z | 2026-05-08T14:22:03.985Z |
| CVE-2026-43431 |
N/A
|
xhci: Fix NULL pointer dereference when reading portli… |
Linux |
Linux |
2026-05-08T14:22:03.298Z | 2026-05-08T14:22:03.298Z |
| CVE-2026-43430 |
N/A
|
usb: yurex: fix race in probe |
Linux |
Linux |
2026-05-08T14:22:02.458Z | 2026-05-08T14:22:02.458Z |
| CVE-2026-43429 |
N/A
|
USB: usbtmc: Use usb_bulk_msg_killable() with user-spe… |
Linux |
Linux |
2026-05-08T14:22:01.739Z | 2026-05-08T14:22:01.739Z |
| CVE-2026-43428 |
N/A
|
USB: core: Limit the length of unkillable synchronous … |
Linux |
Linux |
2026-05-08T14:22:01.027Z | 2026-05-08T14:22:01.027Z |
| CVE-2026-43427 |
N/A
|
usb: class: cdc-wdm: fix reordering issue in read code path |
Linux |
Linux |
2026-05-08T14:22:00.345Z | 2026-05-08T14:22:00.345Z |
| CVE-2026-43426 |
N/A
|
usb: renesas_usbhs: fix use-after-free in ISR during d… |
Linux |
Linux |
2026-05-08T14:21:59.668Z | 2026-05-08T14:21:59.668Z |
| CVE-2026-43425 |
N/A
|
usb: image: mdc800: kill download URB on timeout |
Linux |
Linux |
2026-05-08T14:21:59.020Z | 2026-05-08T14:21:59.020Z |
| CVE-2026-43424 |
N/A
|
usb: gadget: f_tcm: Fix NULL pointer dereferences in n… |
Linux |
Linux |
2026-05-08T14:21:58.365Z | 2026-05-08T14:21:58.365Z |
| CVE-2026-43423 |
N/A
|
usb: gadget: f_ncm: Fix atomic context locking issue |
Linux |
Linux |
2026-05-08T14:21:57.683Z | 2026-05-08T14:21:57.683Z |
| CVE-2026-43422 |
N/A
|
usb: legacy: ncm: Fix NPE in gncm_bind |
Linux |
Linux |
2026-05-08T14:21:57.031Z | 2026-05-08T14:21:57.031Z |
| CVE-2026-43421 |
N/A
|
usb: gadget: f_ncm: Fix net_device lifecycle with devi… |
Linux |
Linux |
2026-05-08T14:21:56.363Z | 2026-05-08T14:21:56.363Z |
| CVE-2026-43420 |
N/A
|
ceph: fix i_nlink underrun during async unlink |
Linux |
Linux |
2026-05-08T14:21:55.717Z | 2026-05-08T14:21:55.717Z |
| CVE-2026-43419 |
N/A
|
ceph: fix memory leaks in ceph_mdsc_build_path() |
Linux |
Linux |
2026-05-08T14:21:55.037Z | 2026-05-08T14:21:55.037Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-32058 | The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is conn… | 2026-02-15T11:15:52.773 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1793 | The Element Pack Addons for Elementor plugin for WordPress is vulnerable to arbitrary file reads in… | 2026-02-15T04:15:54.260 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1750 | The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Privilege Esc… | 2026-02-15T04:15:54.113 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1490 | The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unautho… | 2026-02-15T04:15:53.783 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-23210 | In the Linux kernel, the following vulnerability has been resolved: ice: Fix PTP NULL pointer dere… | 2026-02-14T17:15:58.910 | 2026-04-02T12:16:19.477 |
| fkie_cve-2026-23209 | In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in… | 2026-02-14T17:15:58.803 | 2026-04-03T14:16:27.493 |
| fkie_cve-2026-23208 | In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Prevent exces… | 2026-02-14T17:15:58.703 | 2026-03-18T20:49:35.557 |
| fkie_cve-2026-23207 | In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect cu… | 2026-02-14T17:15:58.610 | 2026-04-02T12:16:19.293 |
| fkie_cve-2026-23206 | In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: prevent ZERO_SIZ… | 2026-02-14T17:15:58.507 | 2026-03-19T16:34:27.203 |
| fkie_cve-2026-23205 | In the Linux kernel, the following vulnerability has been resolved: smb/client: fix memory leak in… | 2026-02-14T17:15:58.403 | 2026-03-18T17:10:59.223 |
| fkie_cve-2026-23204 | In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_he… | 2026-02-14T17:15:58.297 | 2026-04-03T14:16:27.310 |
| fkie_cve-2026-23203 | In the Linux kernel, the following vulnerability has been resolved: net: cpsw_new: Execute ndo_set… | 2026-02-14T17:15:58.177 | 2026-03-19T16:34:57.810 |
| fkie_cve-2026-23202 | In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect cu… | 2026-02-14T17:15:58.050 | 2026-03-19T16:35:07.930 |
| fkie_cve-2026-23201 | In the Linux kernel, the following vulnerability has been resolved: ceph: fix oops due to invalid … | 2026-02-14T17:15:57.950 | 2026-03-19T16:35:58.490 |
| fkie_cve-2026-23200 | In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix ECMP sibling count m… | 2026-02-14T17:15:57.847 | 2026-03-19T16:41:38.177 |
| fkie_cve-2026-23199 | In the Linux kernel, the following vulnerability has been resolved: procfs: avoid fetching build I… | 2026-02-14T17:15:57.743 | 2026-03-19T16:41:57.087 |
| fkie_cve-2026-23198 | In the Linux kernel, the following vulnerability has been resolved: KVM: Don't clobber irqfd routi… | 2026-02-14T17:15:57.640 | 2026-04-03T14:16:27.073 |
| fkie_cve-2026-23197 | In the Linux kernel, the following vulnerability has been resolved: i2c: imx: preserve error state… | 2026-02-14T17:15:57.540 | 2026-03-19T17:45:01.960 |
| fkie_cve-2026-23196 | In the Linux kernel, the following vulnerability has been resolved: HID: Intel-thc-hid: Intel-thc:… | 2026-02-14T17:15:57.440 | 2026-03-19T17:45:26.697 |
| fkie_cve-2026-23195 | In the Linux kernel, the following vulnerability has been resolved: cgroup/dmem: avoid pool UAF A… | 2026-02-14T17:15:57.337 | 2026-04-03T14:16:26.923 |
| fkie_cve-2026-23194 | In the Linux kernel, the following vulnerability has been resolved: rust_binder: correctly handle … | 2026-02-14T17:15:57.233 | 2026-03-19T17:47:30.513 |
| fkie_cve-2026-23193 | In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-a… | 2026-02-14T17:15:57.123 | 2026-04-03T14:16:26.713 |
| fkie_cve-2026-23192 | In the Linux kernel, the following vulnerability has been resolved: linkwatch: use __dev_put() in … | 2026-02-14T17:15:57.020 | 2026-04-03T14:16:26.533 |
| fkie_cve-2026-23191 | In the Linux kernel, the following vulnerability has been resolved: ALSA: aloop: Fix racy access a… | 2026-02-14T17:15:56.917 | 2026-04-03T14:16:26.377 |
| fkie_cve-2026-23190 | In the Linux kernel, the following vulnerability has been resolved: ASoC: amd: fix memory leak in … | 2026-02-14T17:15:56.810 | 2026-03-18T17:11:17.490 |
| fkie_cve-2026-23189 | In the Linux kernel, the following vulnerability has been resolved: ceph: fix NULL pointer derefer… | 2026-02-14T17:15:56.703 | 2026-03-18T17:18:58.633 |
| fkie_cve-2026-23188 | In the Linux kernel, the following vulnerability has been resolved: net: usb: r8152: fix resume re… | 2026-02-14T17:15:56.600 | 2026-03-19T18:04:07.167 |
| fkie_cve-2026-23187 | In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8m-blk-ctrl: fix … | 2026-02-14T17:15:56.490 | 2026-03-19T18:04:36.990 |
| fkie_cve-2026-23186 | In the Linux kernel, the following vulnerability has been resolved: hwmon: (acpi_power_meter) Fix … | 2026-02-14T17:15:56.373 | 2026-03-18T15:10:00.913 |
| fkie_cve-2026-23185 | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mld: cancel mlo… | 2026-02-14T17:15:56.273 | 2026-04-03T14:16:26.243 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-45c6-75p6-83cc |
6.1 (3.1)
|
fast-xml-builder Comment Value regex can be bypassed | 2026-05-08T16:27:28Z | 2026-05-08T16:27:28Z |
| ghsa-2cm2-m3w5-gp2f |
5.3 (3.1)
|
vm2 has access to `VM2_INTERNAL_STATE_DO_NOT_USE_OR_PROGRAM_WILL_FAIL` | 2026-05-08T16:22:52Z | 2026-05-08T16:22:52Z |
| ghsa-9vg3-4rfj-wgcm |
9.8 (3.1)
|
vm2 has Sandbox Breakout Through Null Proto Exception | 2026-05-08T16:20:58Z | 2026-05-08T16:20:58Z |
| ghsa-9qj6-qjgg-37qq |
9.8 (3.1)
|
vm2 has sandbox breakout via `neutralizeArraySpeciesBatch` | 2026-05-08T15:58:48Z | 2026-05-08T15:58:48Z |
| ghsa-jp94-3292-c3xv |
6.1 (3.1)
|
Devise has an Open Redirect via Unvalidated `request.referrer` in Timeoutable Session Timeout Handler | 2026-05-08T15:41:47Z | 2026-05-08T15:41:47Z |
| ghsa-w5m6-6h93-74m4 |
|
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix possible … | 2026-05-08T15:31:30Z | 2026-05-08T15:31:30Z |
| ghsa-vgv8-2mh4-qh7r |
|
In the Linux kernel, the following vulnerability has been resolved: unshare: fix unshare_fs() hand… | 2026-05-08T15:31:30Z | 2026-05-08T15:31:30Z |
| ghsa-5rpf-7pmv-82cj |
|
In the Linux kernel, the following vulnerability has been resolved: scsi: storvsc: Fix scheduling … | 2026-05-08T15:31:30Z | 2026-05-08T15:31:30Z |
| ghsa-5h27-3wgq-g9cf |
|
In the Linux kernel, the following vulnerability has been resolved: fs: init flags_valid before ca… | 2026-05-08T15:31:30Z | 2026-05-08T15:31:30Z |
| ghsa-4rpc-8842-rq53 |
|
In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Add NULL checks … | 2026-05-08T15:31:30Z | 2026-05-08T15:31:30Z |
| ghsa-x288-7jx3-2597 |
|
In the Linux kernel, the following vulnerability has been resolved: spi: amlogic: spifc-a4: Fix DM… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-wm82-xv2w-22mm |
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: RX, Fix XDP multi-b… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-qq8v-696h-fhv2 |
|
In the Linux kernel, the following vulnerability has been resolved: mctp: route: hold key->lock in… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-qc73-3qqx-fc2q |
|
In the Linux kernel, the following vulnerability has been resolved: rxrpc, afs: Fix missing error … | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-pfqp-2whq-57g2 |
|
In the Linux kernel, the following vulnerability has been resolved: net: bonding: Fix nd_tbl NULL … | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-mxr7-7p5m-m8xr |
|
In the Linux kernel, the following vulnerability has been resolved: xprtrdma: Decrement re_receivi… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-mr89-jg5f-6pqv |
|
In the Linux kernel, the following vulnerability has been resolved: bonding: fix type confusion in… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-mf99-5486-2jh2 |
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: RX, Fix XDP multi-b… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-jprv-4f6g-4wvm |
|
In the Linux kernel, the following vulnerability has been resolved: nfs: return EISDIR on nfs3_pro… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-hx98-q4r6-mgcv |
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_queue: fi… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-hv7m-w2x8-mf6q |
|
In the Linux kernel, the following vulnerability has been resolved: nvme-pci: Fix slab-out-of-boun… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-hc7j-44jc-q764 |
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: fix… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-fg4c-9xcm-vp9q |
|
In the Linux kernel, the following vulnerability has been resolved: e1000/e1000e: Fix leak in DMA … | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-f5mr-9pc2-5mcw |
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix for … | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-cqh4-jv7g-jr53 |
|
In the Linux kernel, the following vulnerability has been resolved: accel/amdxdna: Fix runtime sus… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-938f-6jj9-x227 |
|
In the Linux kernel, the following vulnerability has been resolved: nvme-pci: Fix race bug in nvme… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-9349-jqww-wh9m |
|
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Unreserve bo if qu… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-7qq3-fmc6-w4w4 |
|
In the Linux kernel, the following vulnerability has been resolved: iavf: fix PTP use-after-free d… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-7gc8-cffq-4r9r |
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix deadlock between… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ghsa-757p-mh2f-rf8w |
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix DMA FIFO desync… | 2026-05-08T15:31:29Z | 2026-05-08T15:31:29Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-100 |
6.1 (3.1)
|
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from… | openc3 | 2024-10-02T20:15:00+00:00 | 2024-10-08T17:22:06.493109+00:00 |
| pysec-2024-186 |
6.5 (3.1)
|
RestrictedPython is a restricted execution environment for Python to run untrusted code. … | restrictedpython | 2024-09-30T16:15:09+00:00 | 2025-01-19T04:23:01.259448+00:00 |
| pysec-2024-171 |
8.0 (3.1)
|
Strawberry GraphQL is a library for creating GraphQL APIs. Prior to version 0.243.0, mult… | strawberry-graphql | 2024-09-25T18:15:05+00:00 | 2025-01-18T22:21:43.412172+00:00 |
| pysec-2024-99 |
7.5 (3.1)
|
OpenSlides 4.0.15 was discovered to be using a weak hashing algorithm to store passwords. | openslides | 2024-09-25T15:15:00+00:00 | 2024-10-01T21:22:35.777428+00:00 |
| pysec-2024-96 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-string | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:56.151249+00:00 |
| pysec-2024-95 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-os-path | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:56.045949+00:00 |
| pysec-2024-94 |
8.1 (3.1)
|
A vulnerability was found in MicroPython 1.22.2. It has been declared as critical. Affect… | micropython-io | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.930133+00:00 |
| pysec-2024-93 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-io | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.864558+00:00 |
| pysec-2024-92 |
8.1 (3.1)
|
A vulnerability was found in MicroPython 1.22.2. It has been declared as critical. Affect… | micropython-copy | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.787891+00:00 |
| pysec-2024-91 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-copy | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.729708+00:00 |
| pysec-2024-89 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected … | micropython-os | 2024-09-17T19:15:00+00:00 | 2024-09-23T21:22:09.689786+00:00 |
| pysec-2024-88 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected … | micropython-io | 2024-09-17T19:15:00+00:00 | 2024-09-23T21:22:09.570550+00:00 |
| pysec-2024-87 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected … | micropython-copy | 2024-09-17T19:15:00+00:00 | 2024-09-23T21:22:09.445188+00:00 |
| pysec-2024-85 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-04-23T07:43:20.598639Z |
| pysec-2024-84 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.3.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-04-23T07:43:20.526718Z |
| pysec-2024-83 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-04-23T07:43:20.456202Z |
| pysec-2024-82 |
8.8 (3.1)
|
Deserialization of untrusted data can occur in versions 23.3.2.0 and newer of the MindsDB… | mindsdb | 2024-09-12T13:15:00Z | 2026-04-23T07:43:20.386659Z |
| pysec-2024-81 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:05.004524+00:00 |
| pysec-2024-80 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.922906+00:00 |
| pysec-2024-79 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.841635+00:00 |
| pysec-2024-78 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.12.4.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.697678+00:00 |
| pysec-2024-77 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.3.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.616691+00:00 |
| pysec-2024-212 |
|
Apache Airflow versions before 2.10.1 have a vulnerability that allows DAG authors to add… | apache-airflow | 2024-09-07T08:15:11+00:00 | 2025-01-19T22:22:22.289672+00:00 |
| pysec-2024-74 |
9.1 (3.1)
|
MindsDB is a platform for building artificial intelligence from enterprise data. Prior to… | mindsdb | 2024-09-05T17:15:00+00:00 | 2024-09-06T15:22:53.971446+00:00 |
| pysec-2024-90 |
6.1 (3.1)
|
Indico is an event management system that uses Flask-Multipass, a multi-backend authentic… | indico | 2024-09-04T20:15:00+00:00 | 2024-09-25T06:23:55.564403+00:00 |
| pysec-2024-180 |
5.4 (3.1)
|
Stored XSS in organizer and event settings of pretix up to 2024.7.0 allows malicious even… | pretix | 2024-08-23T15:15:17+00:00 | 2025-01-19T01:52:24.493530+00:00 |
| pysec-2024-192 |
|
An issue was discovered in llama_index before 0.10.38. download/integration.py includes a… | llama-index | 2024-08-22T20:15:10+00:00 | 2025-01-19T13:22:29.175614+00:00 |
| pysec-2024-181 |
6.1 (3.1)
|
Apache Airflow, versions before 2.10.0, have a vulnerability that allows the developer of… | apache-airflow | 2024-08-21T16:15:08+00:00 | 2025-01-19T04:22:59.351008+00:00 |
| pysec-2024-72 |
8.8 (3.1)
|
LF Edge eKuiper is a lightweight IoT data analytics and stream processing engine running … | ekuiper | 2024-08-20T15:15:00Z | 2024-09-18T07:04:07.042699Z |
| pysec-2024-71 |
7.5 (3.1)
|
A vulnerability in corydolphin/flask-cors up to version 4.0.1 allows the `Access-Control-… | flask-cors | 2024-08-18T19:15:00Z | 2024-09-09T07:59:30.591275Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-3291 | Malicious code in @athena-portal/themes (npm) | 2026-05-03T12:45:35Z | 2026-05-04T23:51:15Z |
| mal-2026-3299 | Malicious code in ally-eagw-identity (npm) | 2026-05-03T12:39:26Z | 2026-05-04T23:51:16Z |
| mal-2026-3295 | Malicious code in ally-antivirus (npm) | 2026-05-03T12:39:19Z | 2026-05-04T23:51:16Z |
| mal-2026-3292 | Malicious code in @breeze-ai/ui-library (npm) | 2026-05-03T12:37:25Z | 2026-05-04T23:51:15Z |
| mal-2026-3293 | Malicious code in @breezeai-frontend/i18n-config (npm) | 2026-05-03T12:35:44Z | 2026-05-04T23:51:15Z |
| mal-2026-3304 | Malicious code in apcyber-test-package (npm) | 2026-05-03T12:35:37Z | 2026-05-04T23:51:16Z |
| mal-2026-3246 | Malicious code in win-update-helper-tool-v2 (PyPI) | 2026-05-03T12:32:29Z | 2026-05-03T12:34:26Z |
| mal-2026-3245 | Malicious code in system-update-tool (PyPI) | 2026-05-03T12:30:31Z | 2026-05-03T12:30:31Z |
| mal-2026-3303 | Malicious code in ally-whitelist (npm) | 2026-05-03T12:29:27Z | 2026-05-04T23:51:16Z |
| mal-2026-3244 | Malicious code in puan4 (PyPI) | 2026-05-03T12:20:21Z | 2026-05-03T21:21:18Z |
| mal-2026-3290 | Malicious code in @allyfinancial/allyfinancial-api (npm) | 2026-05-03T12:19:27Z | 2026-05-04T23:51:15Z |
| mal-2026-3301 | Malicious code in ally-json-threat-protect (npm) | 2026-05-03T12:19:25Z | 2026-05-04T23:51:16Z |
| mal-2026-3302 | Malicious code in ally-starter-api (npm) | 2026-05-03T12:19:19Z | 2026-05-04T23:51:16Z |
| mal-2026-3300 | Malicious code in ally-forms (npm) | 2026-05-03T12:19:18Z | 2026-05-04T23:51:16Z |
| mal-2026-3298 | Malicious code in ally-ccapi (npm) | 2026-05-03T12:19:16Z | 2026-05-04T23:51:16Z |
| mal-2026-3296 | Malicious code in ally-badges (npm) | 2026-05-03T12:19:16Z | 2026-05-04T23:51:16Z |
| mal-2026-3243 | Malicious code in puan3 (PyPI) | 2026-05-03T12:16:07Z | 2026-05-03T21:21:18Z |
| mal-2026-3242 | Malicious code in sf-vmeval-requests (PyPI) | 2026-05-03T08:45:43Z | 2026-05-03T08:45:43Z |
| mal-2026-3241 | Malicious code in nextjs-chat-with-ai-service (npm) | 2026-05-03T06:10:44Z | 2026-05-03T06:10:44Z |
| mal-2026-3240 | Malicious code in timesmcplib (PyPI) | 2026-05-03T03:09:30Z | 2026-05-03T03:09:30Z |
| mal-2026-3239 | Malicious code in timermcplib (PyPI) | 2026-05-02T23:20:30Z | 2026-05-02T23:20:30Z |
| mal-2026-3238 | Malicious code in timemcplib (PyPI) | 2026-05-02T22:45:32Z | 2026-05-02T23:49:22Z |
| mal-2026-3237 | Malicious code in protocol-stub-generator (PyPI) | 2026-05-02T18:32:13Z | 2026-05-02T18:32:13Z |
| mal-2026-3236 | Malicious code in aocl-sparse-v3 (PyPI) | 2026-05-02T15:00:56Z | 2026-05-02T15:00:56Z |
| mal-2026-3235 | Malicious code in apexomni-client (PyPI) | 2026-05-02T10:31:16Z | 2026-05-02T10:31:16Z |
| mal-2026-3234 | Malicious code in apexpro (npm) | 2026-05-02T09:37:09Z | 2026-05-04T03:15:15Z |
| mal-2026-3233 | Malicious code in apexomni (npm) | 2026-05-02T09:05:41Z | 2026-05-02T09:05:41Z |
| mal-2026-3288 | Malicious code in common-tg-service (npm) | 2026-05-02T08:00:00Z | 2026-05-02T08:00:00Z |
| mal-2026-3287 | Malicious code in ams-ssk (npm) | 2026-05-02T08:00:00Z | 2026-05-02T08:00:00Z |
| mal-2026-3232 | Malicious code in codewhisperer-streaming (npm) | 2026-05-02T05:01:14Z | 2026-05-02T05:01:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0733 | libexpat: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-03-15T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0729 | OpenSSL: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-15T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0727 | OpenClaw: Mehrere Schwachstellen | 2026-03-15T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0725 | FreeRDP: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0723 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0720 | systemd: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0716 | OpenSSH GSSAPI delta: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-03-12T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0714 | ImageMagick: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-03-12T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0711 | OpenClaw: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0705 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2026-03-11T23:00:00.000+00:00 | 2026-03-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0704 | Google Cloud Platform Envoy Proxy, Istio und Service Mesh: Mehrere Schwachstellen | 2026-03-11T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0702 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2026-03-11T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0695 | GNU libc: Schwachstelle ermöglicht Denial of Service | 2026-03-11T23:00:00.000+00:00 | 2026-03-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0692 | Mattermost MS Teams plugin: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-03-10T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0691 | OpenClaw: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0690 | cURL: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0688 | cPanel cPanel/WHM: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0660 | Microsoft System Center Operations Manager: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0659 | Microsoft Office und SharePoint Produkte: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0658 | Microsoft SQL Server: Mehrere Schwachstellen ermöglichen Erlangen von Administratorrechten | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0657 | Microsoft ASP.NET und .NET: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0656 | Microsoft Authenticator App: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0655 | Microsoft Azure Komponenten: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0643 | ImageMagick: Mehrere Schwachstellen | 2026-03-09T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0641 | NATS Server: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-03-09T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0629 | Zabbix: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0628 | Nextcloud: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0627 | CoreDNS: Mehrere Schwachstellen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0626 | Flowise: Mehrere Schwachstellen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0615 | Red Hat Enterprise Linux (nfs-utils): Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-029-02 | Rockwell Automation ArmorStart LT | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-26-029-01 | KiloView Encoder Series (Update A) | 2026-01-29T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-125-02 | ABB B&R PVI | 2026-01-29T00:30:00.000000Z | 2026-05-05T06:00:00.000000Z |
| icsa-26-043-06 | Siemens SINEC OS | 2026-01-28T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-26-027-04 | Johnson Controls Metasys Products | 2026-01-27T07:00:00.000000Z | 2026-01-27T07:00:00.000000Z |
| icsa-26-027-01 | iba Systems ibaPDA | 2026-01-27T07:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-26-043-09 | Hitachi Energy SuprOS | 2026-01-27T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-036-06 | Hitachi Energy FOX61x | 2026-01-27T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-05 | Hitachi Energy XMC20 | 2026-01-27T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-022-08 | EVMAPA | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-07 | Delta Electronics DIAView | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-06 | Hubitat Elevation Hubs | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-05 | Weintek cMT X Series HMI EasyWeb Service | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-04 | Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-03 | Rockwell Automation CompactLogix 5370 | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-02 | AutomationDirect CLICK Programmable Logic Controller | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-020-03 | Rockwell Automation Verve Asset Manager | 2026-01-20T07:00:00.000000Z | 2026-01-20T07:00:00.000000Z |
| icsa-26-125-04 | ABB B&R Automation Studio | 2026-01-19T00:30:00.000000Z | 2026-05-05T06:00:00.000000Z |
| icsa-26-125-03 | ABB B&R Automation Runtime | 2026-01-19T00:30:00.000000Z | 2026-05-05T06:00:00.000000Z |
| icsa-26-120-04 | ABB Ability OPTIMAX | 2026-01-16T00:30:00.000000Z | 2026-04-30T06:00:00.000000Z |
| va-26-015-01 | NOAA PMEL Live Access Server (LAS) command injection | 2026-01-15T19:59:37Z | 2026-01-15T19:59:37Z |
| icsa-26-015-01 | AVEVA Process Optimization | 2026-01-15T07:00:00.000000Z | 2026-01-15T07:00:00.000000Z |
| icsa-26-083-03 | "Schneider Electric Plant iT/Brewmaxx" | 2026-01-13T08:00:00.000000Z | 2026-03-24T06:00:00.000000Z |
| icsa-26-027-03 | Schneider Electric Zigbee Products | 2026-01-13T08:00:00.000000Z | 2026-01-27T20:13:34.637968Z |
| icsa-26-022-01 | Schneider Electric | 2026-01-13T08:00:00.000000Z | 2026-01-22T17:29:46.950679Z |
| icsa-26-015-10 | Schneider Electric EcoStruxure Power Build Rapsody (Update A) | 2026-01-13T08:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-013-03 | YoSmart YoLink Smart Hub | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-26-013-02 | Rockwell Automation FactoryTalk DataMosaix Private Cloud | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-26-013-01 | Rockwell Automation 432ES-IG3 Series A | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| va-26-013-01 | NSecKrnl driver terminates system processes with crafted IOCTL requests | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-action-frame-inj-qqcncz8h | Cisco Wireless Access Point Software Device Analytics Action Frame Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-9800cl-openscep-sb4xtxzp | Cisco IOS XE Software for Catalyst 9800 Series Wireless Controller for Cloud Unauthenticated Access to Certificate Enrollment Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-xrsig-uy4zrucg | Cisco IOS XR Software Image Verification Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-iosxr-arp-storm-ejuu55ym | Cisco IOS XR ARP Broadcast Storm Denial of Service Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-acl-packetio-swjhhbtz | Cisco IOS XR Software Management Interface ACL Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-webex-xss-55bv8hhm | Cisco Webex Meetings Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-webex-urlredirect-uk8ddjsz | Cisco Webex Meetings URL Redirection Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-phone-write-g3kcc5df | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-imp-xss-xqgu4hsg | Cisco Unified Communications Manager IM & Presence Service Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epnm-pi-stored-xss-xjqzsycp | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epnm-info-dis-zhppmfgz | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Information Disclosure Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epni-arb-file-upload-jjdm2p83 | Cisco Evolved Programmable Network Manager Arbitrary File Upload Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-cucm-csrf-w762pryd | Cisco Unified Communications Manager Cross-Site Request Forgery Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-ucs-xss-ey6xhyps | Cisco UCS Manager Software Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-vkvmorv-cnkrv7hk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Open Redirect Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-multi-cmdinj-e4ukjyrz | Cisco UCS Manager Software Command Injection Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-kvmsxss-6h7anuyk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxospc-pim6-vg4jfph | Cisco Nexus 3000 and 9000 Series Switches Protocol Independent Multicast Version 6 Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-infodis-tectysfg | Cisco NX-OS Software Sensitive Log Information Disclosure Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-cmdinj-qhnze5ss | Cisco NX-OS Software Command Injection Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nshs-urapi-gjubvfpu | Cisco Nexus Dashboard and Nexus Dashboard Fabric Controller Unauthorized REST API Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nd-ptrs-xu2fm2wb | Cisco Nexus Dashboard Path Traversal Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-n39k-isis-dos-jhja8rfx | Cisco Nexus 3000 and 9000 Series Switches Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-pi-epnm-tet4gxbx | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Sensitive Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-ise-file-upload-qksx6c8g | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:43:01+00:00 |
| cisco-sa-authproxlog-sxczxq63 | Cisco Duo Authentication Proxy Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-ftd-ravpn-geobypass-9h38m37z | Cisco Secure Firewall Threat Defense Software Geolocation Remote Access VPN Bypass Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-ftd-dos-svkhtjgt | Cisco Secure Firewall Threat Defense Software Snort 3 Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fp2k-ipsec-dos-tjwgdzco | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 2100 Series IPv6 over IPsec Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-09T21:22:34+00:00 |
| cisco-sa-fmc-xss-jtnmcusp | Cisco Secure Firewall Management Center Software Cross-Site Scripting Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-31694 | fuse: reject oversized dirents in page cache | 2026-05-02T00:00:00.000Z | 2026-05-04T14:40:23.000Z |
| msrc_cve-2026-29169 | Apache HTTP Server: mod_dav_lock indirect lock crash | 2026-05-02T00:00:00.000Z | 2026-05-07T01:12:05.000Z |
| msrc_cve-2026-29168 | Apache HTTP Server: mod_md unrestricted OCSP response | 2026-05-02T00:00:00.000Z | 2026-05-07T01:12:14.000Z |
| msrc_cve-2026-25589 | RedisBloom RESTORE invalid memory access may allow remote code execution | 2026-05-02T00:00:00.000Z | 2026-05-08T01:02:25.000Z |
| msrc_cve-2026-25588 | RedisTimeSeries RESTORE invalid memory access may allow remote code execution | 2026-05-02T00:00:00.000Z | 2026-05-08T01:02:19.000Z |
| msrc_cve-2026-25243 | redis-server RESTORE invalid memory access may allow remote code execution | 2026-05-02T00:00:00.000Z | 2026-05-08T01:01:46.000Z |
| msrc_cve-2026-24072 | Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:41.000Z |
| msrc_cve-2026-23918 | Apache HTTP Server: http2: double free and possible RCE on early reset | 2026-05-02T00:00:00.000Z | 2026-05-07T01:11:17.000Z |
| msrc_cve-2026-23631 | redis-server Lua use-after-free may allow remote code execution | 2026-05-02T00:00:00.000Z | 2026-05-08T01:01:51.000Z |
| msrc_cve-2026-23479 | redis-server use-after-free in unblock client flow may allow remote code execution | 2026-05-02T00:00:00.000Z | 2026-05-08T01:02:14.000Z |
| msrc_cve-2025-71294 | drm/amdgpu: fix NULL pointer issue buffer funcs | 2026-05-02T00:00:00.000Z | 2026-05-07T14:41:16.000Z |
| msrc_cve-2025-71293 | drm/amdgpu/ras: Move ras data alloc before bad page check | 2026-05-02T00:00:00.000Z | 2026-05-07T01:06:24.000Z |
| msrc_cve-2025-71290 | misc: ti_fpc202: fix a potential memory leak in probe function | 2026-05-02T00:00:00.000Z | 2026-05-07T14:39:41.000Z |
| msrc_cve-2025-71289 | fs/ntfs3: handle attr_set_size() errors when truncating files | 2026-05-02T00:00:00.000Z | 2026-05-08T01:44:19.000Z |
| msrc_cve-2025-71285 | net: qrtr: Drop the MHI auto_queue feature for IPCR DL channels | 2026-05-02T00:00:00.000Z | 2026-05-07T01:06:39.000Z |
| msrc_cve-2025-71273 | wifi: rtw88: Use devm_kmemdup() in rtw_set_supported_band() | 2026-05-02T00:00:00.000Z | 2026-05-08T01:43:50.000Z |
| msrc_cve-2025-71272 | most: core: fix resource leak in most_register_interface error paths | 2026-05-02T00:00:00.000Z | 2026-05-07T14:41:46.000Z |
| msrc_cve-2026-40416 | CVE-2026-40416 | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-40372 | ASP.NET Core Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-28T07:00:00.000Z |
| msrc_cve-2026-35431 | Microsoft Entra ID Entitlement Management Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-23T07:00:00.000Z |
| msrc_cve-2026-33829 | Windows Snipping Tool Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33827 | Windows TCP/IP Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33826 | Windows Active Directory Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33825 | Microsoft Defender Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-30T07:00:00.000Z |
| msrc_cve-2026-33824 | Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33822 | Microsoft Word Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33819 | Microsoft Bing Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-23T07:00:00.000Z |
| msrc_cve-2026-33120 | Microsoft SQL Server Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33116 | .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33115 | Microsoft Word Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0016 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS | 2026-01-16T09:44:20.575860Z | 2026-01-16T09:44:20.575860Z |
| ncsc-2026-0015 | Kwetsbaarheid verholpen in Fortinet FortiOS | 2026-01-15T12:31:57.265723Z | 2026-01-15T12:31:57.265723Z |
| ncsc-2026-0014 | Kwetsbaarheden verholpen in Adobe Illustrator | 2026-01-15T12:16:05.427141Z | 2026-01-15T12:16:05.427141Z |
| ncsc-2026-0013 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2026-01-14T13:45:48.530782Z | 2026-01-14T13:45:48.530782Z |
| ncsc-2026-0012 | Kwetsbaarheden verholpen in Adobe Dreamweaver Desktop | 2026-01-14T13:41:56.261778Z | 2026-01-14T13:41:56.261778Z |
| ncsc-2026-0011 | Kwetsbaarheid verholpen in Microsoft Developer Tools | 2026-01-13T19:19:27.690900Z | 2026-01-13T19:19:27.690900Z |
| ncsc-2026-0010 | Kwetsbaarheden verholpen in Microsoft Office | 2026-01-13T19:18:45.984019Z | 2026-03-20T14:03:59.225773Z |
| ncsc-2026-0009 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-01-13T19:17:59.629364Z | 2026-01-13T19:17:59.629364Z |
| ncsc-2026-0008 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-01-13T19:17:18.848673Z | 2026-01-13T19:17:18.848673Z |
| ncsc-2026-0007 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-01-13T19:16:30.720079Z | 2026-04-10T12:53:42.521564Z |
| ncsc-2026-0006 | Kwetsbaarheden verholpen in SAP producten | 2026-01-13T14:42:24.621603Z | 2026-01-13T14:42:24.621603Z |
| ncsc-2026-0005 | Kwetsbaarheden verholpen in Siemens producten | 2026-01-13T12:05:57.353070Z | 2026-01-13T12:05:57.353070Z |
| ncsc-2026-0004 | Kwetsbaarheden verholpen in Trend Micro Apex Central | 2026-01-09T11:14:58.910197Z | 2026-01-09T11:14:58.910197Z |
| ncsc-2026-0003 | Kwetsbaarheden verholpen in GitLab | 2026-01-09T11:11:48.308357Z | 2026-01-09T11:11:48.308357Z |
| ncsc-2026-0002 | Kwetsbaarheid verholpen in n8n | 2026-01-08T12:34:29.315681Z | 2026-01-08T12:34:29.315681Z |
| ncsc-2026-0001 | Kwetsbaarheden verholpen in Hanwha camera systemen | 2026-01-08T12:28:21.446188Z | 2026-01-08T12:28:21.446188Z |
| ncsc-2025-0405 | Kwetsbaarheid verholpen in Roundcube Webmail | 2025-12-31T14:29:26.821576Z | 2025-12-31T14:29:26.821576Z |
| ncsc-2025-0404 | Kwetsbaarheid verholpen in SmarterMail | 2025-12-31T14:19:01.847364Z | 2025-12-31T14:19:01.847364Z |
| ncsc-2025-0403 | Kwetsbaarheden verholpen in QNAP besturingssystemen | 2025-12-29T09:17:28.385450Z | 2025-12-29T09:17:28.385450Z |
| ncsc-2025-0402 | Kwetsbaarheid verholpen in MongoDB | 2025-12-27T11:38:11.514349Z | 2025-12-27T11:38:11.514349Z |
| ncsc-2025-0401 | Kwetsbaarheden verholpen in Foxit PDF Reader | 2025-12-24T09:14:56.590353Z | 2025-12-24T09:14:56.590353Z |
| ncsc-2025-0400 | Kwetsbaarheid verholpen in WatchGuard Firebox | 2025-12-19T11:16:01.438518Z | 2025-12-19T11:16:01.438518Z |
| ncsc-2025-0399 | Kwetsbaarheid verholpen in HPE OneView Software | 2025-12-18T18:38:20.794784Z | 2025-12-24T11:29:46.123674Z |
| ncsc-2025-0398 | Kwetsbaarheid in Cisco AsyncOS | 2025-12-17T19:47:00.346651Z | 2025-12-17T19:47:00.346651Z |
| ncsc-2025-0397 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-12-15T09:08:39.804149Z | 2025-12-15T09:08:39.804149Z |
| ncsc-2025-0396 | Kwetsbaarheden verholpen in Apple macOS | 2025-12-15T09:06:36.450655Z | 2025-12-15T09:06:36.450655Z |
| ncsc-2025-0395 | Kwetsbaarheden verholpen in SAP Software | 2025-12-12T09:29:08.429888Z | 2025-12-12T09:29:08.429888Z |
| ncsc-2025-0394 | Kwetsbaarheden verholpen in React Server Components | 2025-12-12T09:04:19.324080Z | 2025-12-12T10:46:34.688189Z |
| ncsc-2025-0393 | Kwetsbaarheid verholpen in GeoServer | 2025-12-12T08:12:18.831044Z | 2025-12-12T09:02:27.681292Z |
| ncsc-2025-0392 | Kwetsbaarheid verholpen in Barracuda Service Center | 2025-12-11T13:53:23.819008Z | 2025-12-11T13:53:23.819008Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10563-1 | leancrypto-devel-1.7.2-1.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10562-1 | flannel-0.28.4-1.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10561-1 | firecracker-1.15.1-1.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10560-1 | blender-5.1-5.1.1-1.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10559-1 | ImageMagick-7.1.2.19-1.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10558-1 | GraphicsMagick-1.3.46-5.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10549-1 | tomcat11-11.0.21-1.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| opensuse-su-2026:10548-1 | tomcat10-10.1.54-1.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| opensuse-su-2026:10547-1 | tomcat-9.0.117-1.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| opensuse-su-2026:10546-1 | python311-rfc3161-client-1.0.6-1.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| opensuse-su-2026:10545-1 | python311-aiohttp-3.13.5-3.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| opensuse-su-2026:10544-1 | log4j-2.20.0-2.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| opensuse-su-2026:10543-1 | kubo-0.40.1-1.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| opensuse-su-2026:10542-1 | goshs-2.0.0-1.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| opensuse-su-2026:10541-1 | flatpak-1.16.6-1.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| opensuse-su-2026:10540-1 | Botan-3.11.1-1.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| opensuse-su-2026:10537-1 | python311-biopython-1.87-1.1 on GA media | 2026-04-12T00:00:00Z | 2026-04-12T00:00:00Z |
| opensuse-su-2026:10536-1 | libcap-devel-2.78-1.1 on GA media | 2026-04-12T00:00:00Z | 2026-04-12T00:00:00Z |
| opensuse-su-2026:10522-1 | python315-3.15.0~a8-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10521-1 | python312-3.12.13-5.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10520-1 | python310-3.10.20-4.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10519-1 | glances-common-4.5.3-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10518-1 | python311-Flask-HTTPAuth-4.8.1-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10517-1 | python313-Django6-6.0.4-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10516-1 | python311-Django4-4.2.30-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10515-1 | libprotobuf-lite34_1_0-32bit-34.1-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10514-1 | go1.25-1.25.9-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10513-1 | fontforge-20251009-6.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10512-1 | aws-c-event-stream-devel-0.7.0-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10511-1 | MozillaFirefox-149.0.2-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:13681 | Red Hat Security Advisory: kernel security update | 2026-05-05T10:20:32+00:00 | 2026-05-08T20:34:04+00:00 |
| rhsa-2026:13682 | Red Hat Security Advisory: firefox security update | 2026-05-05T10:18:37+00:00 | 2026-05-07T21:42:19+00:00 |
| rhsa-2026:13664 | Red Hat Security Advisory: kernel security update | 2026-05-05T09:38:12+00:00 | 2026-05-07T21:42:06+00:00 |
| rhsa-2026:13644 | Red Hat Security Advisory: corosync security update | 2026-05-05T09:31:59+00:00 | 2026-05-06T20:37:08+00:00 |
| rhsa-2026:13651 | Red Hat Security Advisory: systemd security update | 2026-05-05T09:30:27+00:00 | 2026-05-07T14:34:43+00:00 |
| rhsa-2026:13665 | Red Hat Security Advisory: firefox security update | 2026-05-05T09:29:37+00:00 | 2026-05-07T21:42:19+00:00 |
| rhsa-2026:13643 | Red Hat Security Advisory: osbuild-composer security update | 2026-05-05T09:28:37+00:00 | 2026-05-08T14:59:18+00:00 |
| rhsa-2026:13642 | Red Hat Security Advisory: image-builder security update | 2026-05-05T09:23:22+00:00 | 2026-05-08T14:59:17+00:00 |
| rhsa-2026:13641 | Red Hat Security Advisory: python-tornado security update | 2026-05-05T09:22:38+00:00 | 2026-05-05T14:44:23+00:00 |
| rhsa-2026:13634 | Red Hat Security Advisory: nginx security update | 2026-05-05T08:41:26+00:00 | 2026-05-07T21:42:16+00:00 |
| rhsa-2026:13631 | Red Hat Security Advisory: Red Hat Build of Apache Camel 4.14 for Quarkus 3.27 update is now available (RHBQ 3.27.3.SP1) | 2026-05-05T07:56:59+00:00 | 2026-05-08T17:27:07+00:00 |
| rhsa-2026:13630 | Red Hat Security Advisory: OpenShift Virtualization v4.20 Images | 2026-05-05T07:44:49+00:00 | 2026-05-07T18:22:06+00:00 |
| rhsa-2026:13600 | Red Hat Security Advisory: firefox security update | 2026-05-05T06:50:56+00:00 | 2026-05-07T21:42:21+00:00 |
| rhsa-2026:13583 | Red Hat Security Advisory: firefox security update | 2026-05-05T06:47:11+00:00 | 2026-05-07T21:42:18+00:00 |
| rhsa-2026:13582 | Red Hat Security Advisory: firefox security update | 2026-05-05T06:40:16+00:00 | 2026-05-07T21:42:19+00:00 |
| rhsa-2026:13596 | Red Hat Security Advisory: firefox security update | 2026-05-05T06:33:31+00:00 | 2026-05-07T21:42:19+00:00 |
| rhsa-2026:13577 | Red Hat Security Advisory: kernel security update | 2026-05-05T05:58:11+00:00 | 2026-05-08T20:34:03+00:00 |
| rhsa-2026:13578 | Red Hat Security Advisory: kernel-rt security update | 2026-05-05T05:31:31+00:00 | 2026-05-08T20:34:01+00:00 |
| rhsa-2026:11720 | Red Hat Security Advisory: Red Hat build of Quarkus 3.20.6.SP1 security update | 2026-05-05T03:47:27+00:00 | 2026-05-08T17:27:00+00:00 |
| rhsa-2026:11721 | Red Hat Security Advisory: Red Hat build of Quarkus 3.27.3.SP1 security update | 2026-05-05T03:47:16+00:00 | 2026-05-08T17:27:00+00:00 |
| rhsa-2026:13571 | Red Hat Security Advisory: Streams for Apache Kafka 3.2.0 release and security update | 2026-05-04T23:37:19+00:00 | 2026-05-08T20:59:27+00:00 |
| rhsa-2026:13566 | Red Hat Security Advisory: kernel security update | 2026-05-04T22:20:00+00:00 | 2026-05-08T20:34:07+00:00 |
| rhsa-2026:13565 | Red Hat Security Advisory: kernel security update | 2026-05-04T21:46:51+00:00 | 2026-05-08T20:34:05+00:00 |
| rhsa-2026:13553 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update | 2026-05-04T17:23:21+00:00 | 2026-05-07T21:42:11+00:00 |
| rhsa-2026:13548 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.15.2 security update | 2026-05-04T17:19:48+00:00 | 2026-05-08T23:52:18+00:00 |
| rhsa-2026:13545 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2026-05-04T17:14:54+00:00 | 2026-05-08T14:58:57+00:00 |
| rhsa-2026:13537 | Red Hat Security Advisory: thunderbird security update | 2026-05-04T16:55:59+00:00 | 2026-05-04T21:18:53+00:00 |
| rhsa-2026:13542 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.10.2 security update | 2026-05-04T16:50:36+00:00 | 2026-05-08T20:59:27+00:00 |
| rhsa-2026:13533 | Red Hat Security Advisory: thunderbird security update | 2026-05-04T15:58:34+00:00 | 2026-05-07T21:42:21+00:00 |
| rhsa-2026:13512 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2026-05-04T14:31:09+00:00 | 2026-05-08T14:59:17+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2023-073-04 | IGSS (Interactive Graphical SCADA System) | 2023-03-14T10:58:24.000Z | 2023-03-14T10:58:24.000Z |
| sevd-2023-073-02 | PowerLogic™ HDPM6000 | 2023-03-14T09:26:56.000Z | 2023-03-14T09:26:56.000Z |
| sevd-2023-073-01 | EcoStruxure™ Power Monitoring Expert | 2023-03-14T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2023-045-02 | StruxureWare Data Center Expert | 2023-02-14T08:05:19.000Z | 2023-02-14T08:05:19.000Z |
| sevd-2023-045-03 | Merten KNX devices | 2023-02-14T07:24:05.000Z | 2023-02-14T07:24:05.000Z |
| sevd-2023-045-01 | EcoStruxureTM Geo SCADA Expert | 2023-02-14T06:02:05.000Z | 2023-02-14T06:02:05.000Z |
| sevd-2023-010-03 | EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 | 2023-01-10T17:44:20.000Z | 2023-01-10T17:44:20.000Z |
| sevd-2023-010-02 | EcoStruxure Geo SCADA Expert | 2023-01-10T16:24:00.000Z | 2023-03-13T18:30:00.000Z |
| sevd-2023-010-05 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-01-10T15:41:57.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-04 | EcoStruxure™ Power SCADA Anywhere | 2023-01-10T10:28:35.000Z | 2023-01-10T10:28:35.000Z |
| sevd-2023-010-01 | EcoStruxureTM Machine Expert – HVAC (formerly SoMachine - HVAC) | 2023-01-10T09:28:52.000Z | 2023-01-10T09:28:52.000Z |
| sevd-2023-010-06 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon M340, M580 and M580 CPU Safety | 2023-01-10T00:00:00.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2022-347-01 | APC Easy UPS Online Monitoring Software | 2022-12-13T06:09:04.000Z | 2023-01-11T00:00:00.000Z |
| sevd-2022-347-03 | EcoStruxure Power Commission | 2022-12-13T04:28:00.000Z | 2022-12-13T04:28:00.000Z |
| sevd-2022-347-02 | Saitel DR RTU | 2022-12-13T04:12:25.000Z | 2022-12-13T04:12:25.000Z |
| sevd-2022-312-01 | NetBotz 4 - 355/450/455/550/570 | 2022-11-08T06:53:24.000Z | 2023-02-14T06:30:00.000Z |
| sevd-2022-284-04 | EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 | 2022-10-11T10:45:15.000Z | 2022-10-14T10:45:15.000Z |
| sevd-2022-284-02 | EcoStruxure™ Panel Server Box (PAS900) | 2022-10-11T10:05:49.000Z | 2022-10-11T10:05:49.000Z |
| sevd-2022-284-01 | EcoStruxure™ Operator Terminal Expert and Pro-face BLUE | 2022-10-11T09:48:46.000Z | 2022-10-11T09:48:46.000Z |
| sevd-2022-284-03 | ISaGRAF Workbench for SAGE RTU | 2022-10-10T22:13:16.000Z | 2025-11-14T06:30:00.000Z |
| sevd-2022-256-01 | EcoStruxure Machine SCADA Expert and Pro-face BLUE Open Studio | 2022-09-13T05:45:41.000Z | 2022-09-13T05:45:41.000Z |
| sevd-2022-221-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, and Modicon Controllers M580 and M340 | 2022-08-09T10:58:35.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-03 | EcoStruxure™ Control Expert | 2022-08-09T09:14:27.000Z | 2022-08-09T09:14:27.000Z |
| sevd-2022-221-04 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-02 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-193-03 | Acti9 PowerTag Link C | 2022-07-12T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2022-193-02 | SpaceLogic C-Bus Home Controller, formerly known as C-Bus Wiser Home Controller MK2 | 2022-07-12T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2022-193-04 | Easergy P5 | 2022-07-12T08:55:42.000Z | 2022-07-12T08:55:42.000Z |
| sevd-2022-193-01 | OPC UA and X80 advanced RTU Modicon Communication Modules | 2022-07-12T04:00:00.000Z | 2022-08-19T06:30:00.000Z |
| sevd-2022-165-08 | EcoStruxure™ Cybersecurity Admin Expert | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-327438 | SSA-327438: Multiple Vulnerabilities in SCALANCE LPE9403 | 2025-05-13T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-301229 | SSA-301229: Client-Side Enforcement of Server-Side Security Vulnerabilities in RUGGEDCOM ROX II | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-222768 | SSA-222768: Multiple Vulnerabilities in SIRIUS 3SK2 Safety Relays and 3RK3 Modular Safety Systems | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-162255 | SSA-162255: Multiple Vulnerabilities in Polarion Before V2410 | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-047424 | SSA-047424: Code Execution and SQL Injection Vulnerabilities in OZW Web Servers | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-443402 | SSA-443402: Multiple SQL Injection Vulnerabilities in TeleControl Server Basic before V3.1.2.2 | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| ssa-395348 | SSA-395348: Improper Handling of Length Parameter Inconsistency Vulnerability in TeleControl Server Basic before V3.1.2.2 | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| ssa-874353 | SSA-874353: Entity Enumeration Vulnerability in Mendix Runtime | 2025-04-08T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-819629 | SSA-819629: Weak Authentication Vulnerability in Industrial Edge Device Kit | 2025-04-08T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-817234 | SSA-817234: Multiple Kubernetes Ingress NGINX Controller Vulnerabilities in Insights Hub Private Cloud | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-725549 | SSA-725549: Denial of Service of ICMP in Industrial Devices | 2025-04-08T00:00:00Z | 2025-07-21T00:00:00Z |
| ssa-672923 | SSA-672923: Out of Bounds Write Vulnerability in Solid Edge | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-634640 | SSA-634640: Weak Authentication Vulnerability in Siemens Industrial Edge Devices | 2025-04-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-525431 | SSA-525431: Privilege Escalation Vulnerabilities in Siemens License Server Before V4.3 | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-277137 | SSA-277137: Multiple Vulnerabilities in SIDIS Prime Before V4.0.700 | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-187636 | SSA-187636: Multiple Vulnerabilities in SENTRON 7KT PAC1260 Data Manager | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-920092 | SSA-920092: Memory Corruption Vulnerability in Simcenter Femap | 2025-03-13T00:00:00Z | 2025-03-13T00:00:00Z |
| ssa-858251 | SSA-858251: Authentication Bypass Vulnerabilities in OPC UA | 2025-03-11T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-787280 | SSA-787280: Unlocked Bootloader Vulnerability in SINAMICS S200 | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-615740 | SSA-615740: Multiple Vulnerabilities in SINEMA Remote Connect Client Before V3.2 SP3 | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-515903 | SSA-515903: Multiple Vulnerabilities in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-507653 | SSA-507653: Improper Access Control Vulnerabilities in Tecnomatix Plant Simulation | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-503939 | SSA-503939: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP | 2025-03-11T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-280834 | SSA-280834: Improper OpenVPN Credential Validation Vulnerability in SCALANCE M-800 and SC-600 Families | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-216014 | SSA-216014: Vulnerabilities in EFI variable of SIMATIC IPCs, SIMATIC Tablet PCs, and SIMATIC Field PGs | 2025-03-11T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-075201 | SSA-075201: Multiple Vulnerabilities in SCALANCE LPE9403 Before V4.0 | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-073066 | SSA-073066: Multiple Vulnerabilities in SINEMA Remote Connect Server Before V3.2 SP3 | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-050438 | SSA-050438: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and Tecnomatix Plant Simulation | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-992434 | SSA-992434: Directory Traversal Vulnerability in Third-Party Component in SiPass integrated | 2025-02-17T00:00:00Z | 2025-02-17T00:00:00Z |
| ssa-770770 | SSA-770770: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.7 on RUGGEDCOM APE1808 Devices | 2025-02-11T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1666-1 | Security update for python-Pygments | 2026-04-30T17:22:16Z | 2026-04-30T17:22:16Z |
| suse-su-2026:21437-1 | Security update for himmelblau | 2026-04-30T17:06:48Z | 2026-04-30T17:06:48Z |
| suse-su-2026:21436-1 | Security update for freerdp | 2026-04-30T16:54:05Z | 2026-04-30T16:54:05Z |
| suse-su-2026:21452-1 | Security update for curl | 2026-04-30T14:46:10Z | 2026-04-30T14:46:10Z |
| suse-su-2026:21461-1 | Security update for helm | 2026-04-30T13:22:50Z | 2026-04-30T13:22:50Z |
| suse-su-2026:21434-1 | Security update for helm | 2026-04-30T13:22:50Z | 2026-04-30T13:22:50Z |
| suse-su-2026:1662-1 | Security update for glibc-livepatches | 2026-04-30T13:16:20Z | 2026-04-30T13:16:20Z |
| suse-su-2026:1661-1 | Security update for the Linux Kernel | 2026-04-30T12:05:10Z | 2026-04-30T12:05:10Z |
| suse-su-2026:21428-1 | Security update for libssh | 2026-04-30T09:40:57Z | 2026-04-30T09:40:57Z |
| suse-su-2026:21396-1 | Security update for libssh | 2026-04-30T09:40:57Z | 2026-04-30T09:40:57Z |
| suse-su-2026:1660-1 | Security update for libheif | 2026-04-29T14:38:03Z | 2026-04-29T14:38:03Z |
| suse-su-2026:21433-1 | Security update for openexr | 2026-04-29T14:30:55Z | 2026-04-29T14:30:55Z |
| suse-su-2026:21432-1 | Security update for ntfs-3g_ntfsprogs | 2026-04-29T14:20:44Z | 2026-04-29T14:20:44Z |
| suse-su-2026:21431-1 | Security update for python-PyNaCl | 2026-04-29T14:15:39Z | 2026-04-29T14:15:39Z |
| suse-su-2026:21450-1 | Security update for vim | 2026-04-29T11:30:37Z | 2026-04-29T11:30:37Z |
| suse-su-2026:21418-1 | Security update for firewalld | 2026-04-29T11:25:06Z | 2026-04-29T11:25:06Z |
| suse-su-2026:21417-1 | Security update for avahi | 2026-04-29T11:16:55Z | 2026-04-29T11:16:55Z |
| suse-su-2026:1659-1 | Security update for sed | 2026-04-29T11:09:09Z | 2026-04-29T11:09:09Z |
| suse-su-2026:1658-1 | Security update for openCryptoki | 2026-04-29T11:08:07Z | 2026-04-29T11:08:07Z |
| suse-su-2026:1657-1 | Security update for xen | 2026-04-29T11:06:54Z | 2026-04-29T11:06:54Z |
| suse-su-2026:21427-1 | Security update for PackageKit | 2026-04-29T09:45:09Z | 2026-04-29T09:45:09Z |
| suse-su-2026:1655-1 | Security update for polkit | 2026-04-29T08:43:12Z | 2026-04-29T08:43:12Z |
| suse-su-2026:21426-1 | Security update for python-Mako | 2026-04-29T08:17:04Z | 2026-04-29T08:17:04Z |
| suse-su-2026:21425-1 | Security update for python-jwcrypto | 2026-04-29T08:14:32Z | 2026-04-29T08:14:32Z |
| suse-su-2026:1653-1 | Security update for protobuf | 2026-04-29T00:45:31Z | 2026-04-29T00:45:31Z |
| suse-su-2026:1650-1 | Security update for MozillaFirefox | 2026-04-28T18:52:50Z | 2026-04-28T18:52:50Z |
| suse-su-2026:1649-1 | Security update for MozillaFirefox | 2026-04-28T18:52:35Z | 2026-04-28T18:52:35Z |
| suse-su-2026:1648-1 | Security update for webkit2gtk3 | 2026-04-28T18:07:02Z | 2026-04-28T18:07:02Z |
| suse-su-2026:1647-1 | Security update for python-requests | 2026-04-28T18:03:06Z | 2026-04-28T18:03:06Z |
| suse-su-2026:1646-1 | Security update for gnome-remote-desktop | 2026-04-28T18:01:32Z | 2026-04-28T18:01:32Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:8052 | Important: firefox security update | 2026-04-14T00:00:00Z | 2026-04-15T13:12:54Z |
| alsa-2026:7992 | Important: golang-github-openprinting-ipp-usb security update | 2026-04-14T00:00:00Z | 2026-04-15T07:46:43Z |
| alsa-2026:7915 | Important: bind9.18 security update | 2026-04-13T00:00:00Z | 2026-04-15T08:47:47Z |
| alsa-2026:7896 | Important: nodejs:20 security update | 2026-04-13T00:00:00Z | 2026-04-15T07:58:05Z |
| alsa-2026:7711 | Important: vim security update | 2026-04-13T00:00:00Z | 2026-04-14T12:18:44Z |
| alsa-2026:7682 | Important: openexr security update | 2026-04-13T00:00:00Z | 2026-04-14T12:33:23Z |
| alsa-2026:7681 | Important: perl-XML-Parser security update | 2026-04-13T00:00:00Z | 2026-04-14T07:40:45Z |
| alsa-2026:7680 | Important: perl-XML-Parser security update | 2026-04-13T00:00:00Z | 2026-04-15T07:45:45Z |
| alsa-2026:7679 | Important: perl-XML-Parser security update | 2026-04-13T00:00:00Z | 2026-04-15T08:00:20Z |
| alsa-2026:7677 | Important: fontforge security update | 2026-04-13T00:00:00Z | 2026-04-15T07:47:47Z |
| alsa-2026:7675 | Important: nodejs24 security update | 2026-04-13T00:00:00Z | 2026-04-14T13:07:01Z |
| alsa-2026:7672 | Important: firefox security update | 2026-04-13T00:00:00Z | 2026-04-15T07:44:48Z |
| alsa-2026:7671 | Important: firefox security update | 2026-04-13T00:00:00Z | 2026-04-15T08:01:54Z |
| alsa-2026:7670 | Important: nodejs:24 security update | 2026-04-13T00:00:00Z | 2026-04-15T07:50:26Z |
| alsa-2026:7668 | Important: nghttp2 security update | 2026-04-13T00:00:00Z | 2026-04-15T08:03:54Z |
| alsa-2026:7667 | Important: nghttp2 security update | 2026-04-13T00:00:00Z | 2026-04-14T07:31:34Z |
| alsa-2026:7666 | Important: nghttp2 security update | 2026-04-13T00:00:00Z | 2026-04-15T07:43:49Z |
| alsa-2026:7384 | Critical: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection | 2026-04-10T00:00:00Z | 2026-04-15T08:06:18Z |
| alsa-2026:7383 | Critical: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection | 2026-04-10T00:00:00Z | 2026-04-15T07:41:21Z |
| alsa-2026:7350 | Important: nodejs:24 security update | 2026-04-09T00:00:00Z | 2026-04-15T08:09:29Z |
| alsa-2026:7343 | Important: nginx:1.26 security update | 2026-04-09T00:00:00Z | 2026-04-15T08:12:13Z |
| alsa-2026:7342 | Important: kea security update | 2026-04-09T00:00:00Z | 2026-04-15T07:38:09Z |
| alsa-2026:7259 | Important: git-lfs security update | 2026-04-09T00:00:00Z | 2026-04-15T08:21:23Z |
| alsa-2026:7123 | Important: nodejs:22 security update | 2026-04-08T00:00:00Z | 2026-04-15T08:45:14Z |
| alsa-2026:7081 | Moderate: libtiff security update | 2026-04-08T00:00:00Z | 2026-04-09T02:00:14Z |
| alsa-2026:7080 | Important: nodejs22 security update | 2026-04-08T00:00:00Z | 2026-04-09T02:15:49Z |
| alsa-2026:7011 | Important: grafana security update | 2026-04-08T00:00:00Z | 2026-04-15T07:52:08Z |
| alsa-2026:7009 | Important: grafana-pcp security update | 2026-04-08T00:00:00Z | 2026-04-15T07:53:46Z |
| alsa-2026:7005 | Important: git-lfs security update | 2026-04-08T00:00:00Z | 2026-04-15T07:35:05Z |
| alsa-2026:7002 | Important: nginx security update | 2026-04-08T00:00:00Z | 2026-04-15T08:21:45Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-938 | Use-of-uninitialized-value in comp_func_SourceOver_avx2 | 2025-11-23T00:03:38.943405Z | 2025-11-23T00:03:38.943780Z |
| osv-2025-932 | Heap-use-after-free in password_file__cleanup | 2025-11-22T00:01:32.642847Z | 2025-11-22T00:01:32.643269Z |
| osv-2025-926 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.statement | 2025-11-21T00:05:31.621567Z | 2025-11-21T00:05:31.621958Z |
| osv-2025-906 | Use-of-uninitialized-value in QImage::pixel | 2025-11-18T00:08:20.557059Z | 2025-11-18T00:08:20.557392Z |
| osv-2025-901 | Heap-use-after-free in apache::thrift::protocol::TCompactProtocolT<apache::thrift::transport::TMemoryBu | 2025-11-17T00:02:08.125421Z | 2025-11-17T00:02:08.125970Z |
| osv-2025-900 | Heap-buffer-overflow in DecodeFrame | 2025-11-15T00:18:33.800030Z | 2025-11-15T00:18:33.800379Z |
| osv-2025-890 | Heap-buffer-overflow in icalmemory_tmp_copy | 2025-11-10T00:03:23.954817Z | 2025-11-10T00:03:23.955223Z |
| osv-2025-884 | Heap-use-after-free in JS_DefineProperty | 2025-11-08T00:17:46.632315Z | 2025-11-08T00:17:46.633033Z |
| osv-2025-879 | Use-of-uninitialized-value in JS_DefineProperty | 2025-11-06T00:00:41.075031Z | 2025-11-06T00:00:41.075637Z |
| osv-2025-876 | Stack-buffer-overflow in snmp_input | 2025-11-04T00:06:41.671822Z | 2025-11-04T00:06:41.672467Z |
| osv-2025-871 | UNKNOWN READ in ojph::local::param_cod::~param_cod | 2025-11-03T00:01:55.461376Z | 2025-11-16T14:04:09.695272Z |
| osv-2025-865 | Heap-buffer-overflow in generic_unpack | 2025-10-31T00:01:02.631036Z | 2025-11-05T14:31:24.646623Z |
| osv-2025-858 | Use-of-uninitialized-value in pcpp::byteArrayToHexString | 2025-10-26T00:13:16.483999Z | 2025-10-26T00:13:16.484559Z |
| osv-2025-857 | Global-buffer-overflow in void jxl::N_AVX2::WriteToOutputStage::StoreUnsignedRow<unsigned char> | 2025-10-25T00:05:52.218420Z | 2025-10-25T00:05:52.218807Z |
| osv-2025-855 | Use-of-uninitialized-value in AlphaReplace_SSE2 | 2025-10-24T00:16:50.919877Z | 2025-10-24T00:16:50.920218Z |
| osv-2025-852 | Heap-buffer-overflow in std::__1::pair<int, arrow::util::RleBitPackedParser::ControlFlow> arrow::util::R | 2025-10-23T00:13:16.148747Z | 2025-10-24T14:23:38.843951Z |
| osv-2025-846 | Use-of-uninitialized-value in js_create_function | 2025-10-20T00:03:40.943765Z | 2025-10-20T00:03:40.944363Z |
| osv-2025-845 | Global-buffer-overflow in icaltime_day_of_year | 2025-10-19T00:19:40.541109Z | 2025-10-19T00:19:40.541746Z |
| osv-2025-835 | Heap-use-after-free in JS_DefineProperty | 2025-10-14T00:11:08.472824Z | 2025-10-14T00:11:08.473391Z |
| osv-2025-834 | Heap-buffer-overflow in std::__1::pair<int, arrow::util::RleBitPackedParser::ControlFlow> arrow::util::R | 2025-10-14T00:10:52.861723Z | 2025-10-24T14:22:07.938287Z |
| osv-2025-827 | Global-buffer-overflow in void jxl::N_SSE4::WriteToOutputStage::StoreUnsignedRow<unsigned char> | 2025-10-10T00:09:16.816189Z | 2025-10-10T00:09:16.816846Z |
| osv-2025-825 | UNKNOWN WRITE in RescalerImportRowExpand_SSE2 | 2025-10-09T00:14:42.650822Z | 2025-10-09T00:14:42.651395Z |
| osv-2025-824 | Use-of-uninitialized-value in JS_DefineProperty | 2025-10-08T00:04:16.630040Z | 2025-10-08T00:04:16.630688Z |
| osv-2025-819 | Use-of-uninitialized-value in HasAlpha32b_SSE2 | 2025-10-07T00:04:07.544365Z | 2025-10-07T00:04:07.544831Z |
| osv-2025-818 | Heap-buffer-overflow in std::__1::pair<int, arrow::util::RleBitPackedParser::ControlFlow> arrow::util::R | 2025-10-07T00:03:45.262747Z | 2025-10-10T14:38:33.479652Z |
| osv-2025-809 | Use-of-uninitialized-value in WebPCleanupTransparentArea | 2025-10-05T00:04:29.576718Z | 2025-10-05T00:04:29.577250Z |
| osv-2025-808 | Use-of-uninitialized-value in WebPMultRow_C | 2025-10-04T00:07:11.139186Z | 2025-10-04T00:07:11.139704Z |
| osv-2025-803 | Global-buffer-overflow in icaltime_day_of_year | 2025-10-02T00:11:54.061581Z | 2025-10-02T00:11:54.061989Z |
| osv-2025-797 | Heap-buffer-overflow in ProcessRows | 2025-09-30T00:07:53.914184Z | 2025-09-30T00:07:53.914578Z |
| osv-2025-796 | Heap-buffer-overflow in AddGreenToBlueAndRed_AVX2 | 2025-09-30T00:07:08.673173Z | 2025-09-30T00:07:08.673608Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0001 | Potential Undefined Behaviors in `Arc<T>`/`Rc<T>` impls of `from_value` on OOM | 2026-01-05T12:00:00Z | 2026-01-06T15:33:19Z |
| rustsec-2025-0139 | theshit vulnerable to unsafe loading of user-owned Python rules when running as root | 2025-12-30T12:00:00Z | 2026-01-04T20:34:25Z |
| rustsec-2025-0140 | Non-utf8 String can be created with `TimeBuf::as_str` | 2025-12-29T12:00:00Z | 2026-03-04T07:42:48Z |
| rustsec-2025-0143 | Unsound APIs of public `constant::Reader` and `StructSchema` | 2025-12-24T12:00:00Z | 2026-01-29T05:56:50Z |
| rustsec-2025-0137 | Unsoundness of safe `reciprocal_mg10` | 2025-12-22T12:00:00Z | 2025-12-28T09:42:26Z |
| rustsec-2025-0141 | Bincode is unmaintained | 2025-12-16T12:00:00Z | 2026-01-16T11:04:42Z |
| rustsec-2025-0144 | Timing side-channel in ML-DSA decomposition | 2025-12-12T12:00:00Z | 2026-01-27T22:28:37Z |
| rustsec-2025-0152 | `finch_cli_rust` was removed from crates.io for malicious code | 2025-12-09T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0151 | `sha-rst` was removed from crates.io for malicious code | 2025-12-09T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0150 | `finch-rst` was removed from crates.io for malicious code | 2025-12-09T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0135 | matrix-sdk-base: Denial of service due to custom `m.room.join_rules` events | 2025-12-08T12:00:00Z | 2025-12-08T12:23:54Z |
| rustsec-2025-0148 | `finch-rust` was removed from crates.io for malicious code | 2025-12-05T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0146 | `sha-rust` was removed from crates.io for malicious code | 2025-12-05T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0133 | Incorrect calculation on aarch64 | 2025-12-04T12:00:00Z | 2025-12-06T07:36:56Z |
| rustsec-2025-0147 | `evm-units` was removed from crates.io for malicious code | 2025-12-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0145 | `uniswap-utils` was removed from crates.io for malicious code | 2025-12-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0134 | rustls-pemfile is unmaintained | 2025-11-28T12:00:00Z | 2025-12-05T19:07:24Z |
| rustsec-2025-0132 | `Reader::open_mmap` unsoundly marks unsafe memmap operation as safe | 2025-11-28T12:00:00Z | 2025-12-02T06:03:09Z |
| rustsec-2025-0130 | Missing check in ZK proof in CGGMP21 Threshold Signing Protocol | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0129 | Missing check in ZK proof in CGGMP21 Threshold Signing Protocol | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0128 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0127 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0125 | Resource Exhaustion (Memory and Handle Leaks) on Windows and macOS | 2025-11-22T12:00:00Z | 2025-11-22T12:29:36Z |
| rustsec-2025-0153 | hexchat crate is unsound and unmaintained | 2025-11-17T12:00:00Z | 2026-02-26T06:11:28Z |
| rustsec-2025-0124 | rand_os crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-19T20:48:42Z |
| rustsec-2025-0123 | opentelemetry-jaeger crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T12:07:07Z |
| rustsec-2025-0122 | cargo-asm crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T09:02:31Z |
| rustsec-2025-0121 | gcc crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:52:10Z |
| rustsec-2025-0119 | number_prefix crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:13:56Z |
| rustsec-2025-0120 | json5 crate is unmaintained | 2025-11-16T12:00:00Z | 2025-11-30T00:15:16Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-jre-2023-21954 | 2026-05-08T05:45:13.515Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-21939 | 2026-05-08T05:45:11.875Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-21938 | 2026-05-08T05:45:10.126Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-21937 | 2026-05-08T05:45:08.518Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-21930 | 2026-05-08T05:45:06.968Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-21843 | 2026-05-08T05:45:05.416Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-21835 | 2026-05-08T05:45:03.808Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-21830 | 2026-05-08T05:45:02.284Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-39399 | 2026-05-08T05:45:00.691Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-34169 | Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets | 2026-05-08T05:44:59.270Z | 2026-05-08T06:11:36.072Z |
| bit-jre-2022-21628 | 2026-05-08T05:44:57.716Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21626 | 2026-05-08T05:44:56.231Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21624 | 2026-05-08T05:44:54.818Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21619 | 2026-05-08T05:44:53.392Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21618 | 2026-05-08T05:44:52.051Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21549 | 2026-05-08T05:44:50.472Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21541 | 2026-05-08T05:44:48.839Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21540 | 2026-05-08T05:44:47.364Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21476 | 2026-05-08T05:44:45.725Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21449 | 2026-05-08T05:44:44.330Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21434 | 2026-05-08T05:44:42.848Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21426 | 2026-05-08T05:44:41.337Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21366 | 2026-05-08T05:44:39.694Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21365 | 2026-05-08T05:44:38.148Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21360 | 2026-05-08T05:44:36.668Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21349 | 2026-05-08T05:44:35.321Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21341 | 2026-05-08T05:44:33.864Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21340 | 2026-05-08T05:44:32.506Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21305 | 2026-05-08T05:44:30.972Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21299 | 2026-05-08T05:44:29.483Z | 2026-05-08T06:11:36.072Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ly88807 | Docker CLI for Windows searches for plugin binaries in C:\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ProgramData\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\Docker\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\cli-plugins, a directory that does not exist by default | 2026-04-09T00:43:37.430373Z | 2026-04-08T10:02:31Z |
| cleanstart-2026-ku98579 | gRPC-Go is the Go language implementation of gRPC | 2026-04-09T00:42:07.643397Z | 2026-04-08T10:07:21Z |
| cleanstart-2026-iw23933 | gRPC-Go is the Go language implementation of gRPC | 2026-04-09T00:42:07.594705Z | 2026-04-08T10:12:34Z |
| cleanstart-2026-fz55932 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-04-09T00:41:07.286953Z | 2026-04-08T10:10:33Z |
| cleanstart-2026-af52025 | In libexpat before 2 | 2026-04-08T00:39:48.013620Z | 2026-04-07T05:54:38Z |
| cleanstart-2026-pd43534 | In libexpat before 2 | 2026-04-08T00:39:47.879615Z | 2026-04-07T05:54:38Z |
| cleanstart-2026-mp09743 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-08T00:37:59.326932Z | 2026-04-07T05:54:38Z |
| cleanstart-2026-bb02574 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-08T00:37:58.971684Z | 2026-04-07T05:54:38Z |
| cleanstart-2026-fu47971 | protojson | 2026-04-07T00:47:07.546790Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-hx94762 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-07T00:45:34.962189Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-ej93145 | attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames | 2026-04-07T00:44:04.086276Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-dp59378 | In libexpat before 2 | 2026-04-07T00:42:33.537935Z | 2026-04-06T06:37:58Z |
| cleanstart-2026-fe32006 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-07T00:41:34.518345Z | 2026-04-06T06:37:58Z |
| cleanstart-2026-gg94489 | go-retryablehttp prior to 0 | 2026-04-07T00:41:33.578433Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-aj47488 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-04-07T00:40:03.631106Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-bk17545 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-07T00:38:33.362093Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-kf75900 | In libexpat before 2 | 2026-04-06T06:20:25.150640Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-jl41223 | In libexpat before 2 | 2026-04-06T06:19:55.229801Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-ob18608 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T06:19:25.639311Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-jg79570 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T06:19:24.747052Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-dz75075 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-06T06:19:24.775093Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-mu54962 | Security fixes for ghsa-527x-5wrf-22m2, ghsa-g754-hx8w-x2g6, ghsa-jgfp-53c3-624w, ghsa-px8v-pp82-rcvr, ghsa-vv39-3w5q-974q applied in versions: 1.25.0-r0, 1.26.7-r0 | 2026-04-06T02:54:48.662994Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-hj96712 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq applied in versions: 3.7.2-r4, 3.7.2-r5 | 2026-04-06T02:53:02.079256Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-po55014 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-06T02:53:00.589014Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-bl95928 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T02:52:47.736498Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-kc06018 | Security fixes for CVE-2017-12158, CVE-2017-12159, ghsa-3p8m-j85q-pgmj, ghsa-45p5-v273-3qqr, ghsa-4cx2-fc23-5wg6, ghsa-5rfx-cp42-p624, ghsa-72hv-8253-57qq, ghsa-84h7-rjj3-6jx4, ghsa-9342-92gg-6v29, ghsa-cbdj-484d-3x9q, ghsa-fghv-69vj-qj49, ghsa-h5fg-jpgr-rv9c, ghsa-hq9p-pm7w-8p54, ghsa-j288-q9x7-2f5v, ghsa-pwqr-wmgm-9rr8, ghsa-w9fj-cfpg-grvv applied in versions: 26.1.4-r1, 26.5.0-r0, 26.5.0-r1, 26.5.0-r2, 26.5.6-r3 | 2026-04-06T02:52:37.677608Z | 2026-04-01T11:37:49Z |
| cleanstart-2026-nb78893 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-64715, CVE-2025-68119, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, CVE-2026-33726 applied in versions: 0.13.3-r0, 0.13.3-r1 | 2026-04-06T02:52:24.792809Z | 2026-04-01T13:08:16Z |
| cleanstart-2026-mq18886 | Security fixes for CVE-2026-22735, CVE-2026-22737 applied in versions: 6.2.3-r0 | 2026-04-06T02:52:03.544300Z | 2026-04-01T11:39:45Z |
| cleanstart-2026-ip72442 | Security fixes for CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1 | 2026-04-06T02:52:00.185166Z | 2026-04-01T14:41:16Z |
| cleanstart-2026-ly39171 | Security fixes for CVE-2026-33186 applied in versions: 3.1.4-r0 | 2026-04-06T02:51:58.911697Z | 2026-04-01T11:39:45Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2021-ALE-022 | [MaJ] Vulnérabilité dans Apache Log4j | 2021-12-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-021 | Vulnérabilité dans Microsoft Exchange | 2021-11-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-021 | Vulnérabilité dans Microsoft Exchange | 2021-11-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-019 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-09-08T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-019 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-09-08T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-017 | Multiples vulnérabilités dans Microsoft Exchange | 2021-08-27T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-017 | Multiples vulnérabilités dans Microsoft Exchange | 2021-08-27T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| CERTFR-2021-ALE-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| certfr-2021-ale-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| CERTFR-2021-ALE-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| certfr-2021-ale-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| certfr-2021-ale-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| CERTFR-2021-ALE-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| CERTFR-2021-ALE-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| CERTFR-2021-ALE-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-007 | [MàJ] Vulnérabilité dans Pulse Connect Secure | 2021-04-20T00:00:00.000000 | 2021-06-21T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0432 | Multiples vulnérabilités dans les produits Siemens | 2026-04-14T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| certfr-2026-avi-0431 | Multiples vulnérabilités dans Synology SSL VPN Client | 2026-04-14T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| certfr-2026-avi-0430 | Multiples vulnérabilités dans Python | 2026-04-14T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| certfr-2026-avi-0429 | Vulnérabilité dans Adobe Acrobat | 2026-04-13T00:00:00.000000 | 2026-04-13T00:00:00.000000 |
| certfr-2026-avi-0428 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-13T00:00:00.000000 | 2026-04-13T00:00:00.000000 |
| certfr-2026-avi-0427 | Multiples vulnérabilités dans Microsoft Edge | 2026-04-13T00:00:00.000000 | 2026-04-13T00:00:00.000000 |
| certfr-2026-avi-0426 | Multiples vulnérabilités dans Python | 2026-04-13T00:00:00.000000 | 2026-04-13T00:00:00.000000 |
| certfr-2026-avi-0425 | Vulnérabilité dans Foxit PDF Services API | 2026-04-13T00:00:00.000000 | 2026-04-13T00:00:00.000000 |
| certfr-2026-avi-0424 | Multiples vulnérabilités dans les produits IBM | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0423 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0422 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0421 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0420 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0419 | Multiples vulnérabilités dans Mattermost Desktop App | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0418 | Multiples vulnérabilités dans Apache Tomcat | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0417 | Vulnérabilité dans Spring Cloud Gateway | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0416 | Vulnérabilité dans les produits Juniper Networks | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0415 | Multiples vulnérabilités dans Tenable Security Center | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0414 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0413 | Multiples vulnérabilités dans les produits Elastic | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0412 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0411 | Multiples vulnérabilités dans Mitel MiCollab | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0410 | Multiples vulnérabilités dans GitLab | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0409 | Multiples vulnérabilités dans Sonicwall Secure Mobile Access | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0408 | Multiples vulnérabilités dans les produits Juniper Networks | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0407 | Multiples vulnérabilités dans Google Chrome | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0406 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-08T00:00:00.000000 | 2026-04-08T00:00:00.000000 |
| certfr-2026-avi-0405 | Vulnérabilité dans les produits Moxa | 2026-04-08T00:00:00.000000 | 2026-04-08T00:00:00.000000 |
| certfr-2026-avi-0404 | Multiples vulnérabilités dans les produits Mozilla | 2026-04-08T00:00:00.000000 | 2026-04-08T00:00:00.000000 |
| certfr-2026-avi-0403 | Multiples vulnérabilités dans OpenSSL | 2026-04-08T00:00:00.000000 | 2026-04-08T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000110 | Multiple vulnerabilities in Security Point (Windows) of MaLion | 2025-11-25T17:17+09:00 | 2025-11-25T17:17+09:00 |
| jvndb-2025-000109 | Multiple vulnerabilities in SNC-CX600W | 2025-11-25T14:59+09:00 | 2025-11-25T14:59+09:00 |
| jvndb-2025-000108 | "FOD" App uses hard-coded cryptographic keys | 2025-11-25T14:15+09:00 | 2025-11-25T14:15+09:00 |
| jvndb-2025-000106 | Multiple vulnerabilities in LogStare Collector | 2025-11-21T16:27+09:00 | 2025-11-21T16:27+09:00 |
| jvndb-2025-019621 | EPSON WebConfig / Epson Web Control for SEIKO EPSON Projector Products do not restrict excessive authentication attempts | 2025-11-21T15:31+09:00 | 2025-12-24T10:54+09:00 |
| jvndb-2025-000107 | Installer of RakurakuMusen Start EX for Windows may insecurely load Dynamic Link Libraries | 2025-11-19T16:22+09:00 | 2025-11-19T16:22+09:00 |
| jvndb-2025-000097 | "Dejira" App for iOS vulnerable to improper server certificate verification | 2025-11-17T14:09+09:00 | 2025-11-17T14:09+09:00 |
| jvndb-2025-000105 | NCP-HG100 vulnerable to OS command injection | 2025-11-14T15:26+09:00 | 2025-11-14T15:26+09:00 |
| jvndb-2025-000104 | Multiple vulnerabilities in GNU Libmicrohttpd | 2025-11-10T15:07+09:00 | 2025-11-10T15:07+09:00 |
| jvndb-2025-000103 | Use of password hash with insufficient computational effort vulnerability in BUFFALO Wi-Fi router "WSR-1800AX4 series" | 2025-11-07T15:39+09:00 | 2025-11-07T15:39+09:00 |
| jvndb-2025-000102 | CLUSTERPRO X and EXPRESSCLUSTER X vulnerable to OS command injection | 2025-11-07T14:55+09:00 | 2025-11-07T14:55+09:00 |
| jvndb-2025-000101 | GROWI vulnerable to stored cross-site scripting | 2025-11-06T13:45+09:00 | 2025-11-06T13:45+09:00 |
| jvndb-2025-017972 | Multiple vulnerabilities in Century Systems FutureNet MA and IP-K series | 2025-11-04T16:37+09:00 | 2025-11-04T16:37+09:00 |
| jvndb-2025-000100 | Multiple Roboticsware products register Windows services with unquoted file paths | 2025-11-04T14:17+09:00 | 2025-11-04T14:17+09:00 |
| jvndb-2025-000098 | Optical Disc Archive Software (for Windows) registers a Windows service with an unquoted file path | 2025-11-04T13:51+09:00 | 2025-11-04T13:51+09:00 |
| jvndb-2025-000099 | Progress Flowmon vulnerable to authenticated OS command injection | 2025-11-04T12:47+09:00 | 2025-11-04T12:47+09:00 |
| jvndb-2025-000096 | Installer of WTW EAGLE (for Windows) may insecurely load Dynamic Link Libraries | 2025-10-29T14:17+09:00 | 2025-10-29T14:17+09:00 |
| jvndb-2025-000095 | MZK-DP300N uses hard-coded credentials | 2025-10-28T14:04+09:00 | 2025-10-28T14:04+09:00 |
| jvndb-2025-000093 | Multiple stored cross-site scripting vulnerabilities in Pleasanter | 2025-10-24T15:11+09:00 | 2025-10-24T15:11+09:00 |
| jvndb-2025-000084 | GROWI vulnerable to cross-site scripting | 2025-10-22T15:44+09:00 | 2025-10-22T15:44+09:00 |
| jvndb-2025-000091 | Multiple I-O DATA NAS management applications register Windows services with unquoted file paths | 2025-10-22T15:04+09:00 | 2025-12-10T16:20+09:00 |
| jvndb-2025-000090 | Multiple stored cross-site scripting vulnerabilities in Movable Type | 2025-10-22T13:54+09:00 | 2025-10-22T13:54+09:00 |
| jvndb-2025-000088 | Lanscope Endpoint Manager (On-Premises) vulnerable to improper verification of source of a communication channel | 2025-10-20T16:17+09:00 | 2025-10-22T10:06+09:00 |
| jvndb-2025-000092 | ETERNUS SF vulnerable to incorrect default permissions | 2025-10-20T14:20+09:00 | 2025-10-20T14:20+09:00 |
| jvndb-2025-000089 | Installer of AutoDownloader may insecurely load Dynamic Link Libraries | 2025-10-17T13:38+09:00 | 2025-10-17T13:38+09:00 |
| jvndb-2025-000074 | Multiple vulnerabilities in desknet's NEO | 2025-10-16T17:30+09:00 | 2025-10-16T17:30+09:00 |
| jvndb-2025-000076 | Multiple vulnerabilities in ChatLuck | 2025-10-16T17:17+09:00 | 2025-10-16T17:17+09:00 |
| jvndb-2025-000087 | Ruijie Networks RG-EST300 undocumented SSH functionality | 2025-10-16T14:19+09:00 | 2025-10-16T14:19+09:00 |
| jvndb-2025-016124 | Buffalo Wi-Fi router WXR9300BE6P series vulnerable to path traversal | 2025-10-16T11:16+09:00 | 2025-10-16T11:16+09:00 |
| jvndb-2025-000085 | Multiple RSUPPORT products may insecurely load Dynamic Link Libraries | 2025-10-15T15:55+09:00 | 2025-10-15T15:55+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-18679 | Adobe Bridge数字错误漏洞 | 2026-04-15 | 2026-04-27 |
| cnvd-2026-18678 | Adobe Connect跨站脚本漏洞(CNVD-2026-18678) | 2026-04-15 | 2026-04-27 |
| cnvd-2026-18332 | Schneider Electric PowerChute Serial Shutdown路径遍历漏洞 | 2026-04-15 | 2026-04-23 |
| cnvd-2026-18331 | Schneider Electric PowerChute Serial Shutdown CRLF注入漏洞 | 2026-04-15 | 2026-04-23 |
| cnvd-2026-18330 | Schneider Electric PowerChute Serial Shutdown日志信息泄露漏洞 | 2026-04-15 | 2026-04-23 |
| cnvd-2026-18329 | Schneider Electric PowerChute Serial Shutdown拒绝服务漏洞 | 2026-04-15 | 2026-04-23 |
| cnvd-2026-18328 | Schneider Electric PowerChute Serial Shutdown安全绕过漏洞(CNVD-2026-18328) | 2026-04-15 | 2026-04-23 |
| cnvd-2026-18327 | Schneider Electric PowerChute Serial Shutdown安全绕过漏洞 | 2026-04-15 | 2026-04-23 |
| cnvd-2026-18326 | Schneider Electric PowerChute Serial Shutdown资源管理错误漏洞 | 2026-04-15 | 2026-04-23 |
| cnvd-2026-17785 | Adobe InDesign Desktop堆缓冲区溢出漏洞(CNVD-2026-17785) | 2026-04-15 | 2026-04-20 |
| cnvd-2026-17774 | Adobe InDesign Desktop堆缓冲区溢出漏洞(CNVD-2026-17774) | 2026-04-15 | 2026-04-20 |
| cnvd-2026-17742 | Adobe Bridge堆缓冲区溢出漏洞(CNVD-2026-17742) | 2026-04-15 | 2026-04-20 |
| cnvd-2026-17735 | Adobe Bridge堆缓冲区溢出漏洞(CNVD-2026-17735) | 2026-04-15 | 2026-04-20 |
| cnvd-2026-17718 | Adobe Bridge堆缓冲区溢出漏洞(CNVD-2026-17718) | 2026-04-15 | 2026-04-20 |
| cnvd-2026-17717 | Adobe Bridge堆缓冲区溢出漏洞(CNVD-2026-17717) | 2026-04-15 | 2026-04-20 |
| cnvd-2026-18797 | Huawei HarmonyOS屏幕管理模块内存错误引用漏洞 | 2026-04-14 | 2026-04-28 |
| cnvd-2026-18796 | Huawei HarmonyOS通知服务竞争条件漏洞 | 2026-04-14 | 2026-04-28 |
| cnvd-2026-18795 | Huawei HarmonyOS事件通知模块竞争条件漏洞 | 2026-04-14 | 2026-04-28 |
| cnvd-2026-17368 | FFmpeg read_global_param()函数越界读取漏洞 | 2026-04-14 | 2026-04-15 |
| cnvd-2026-17275 | FFmpeg av_bprint_finalize()函数堆缓冲区溢出漏洞 | 2026-04-14 | 2026-04-15 |
| cnvd-2026-17274 | TOTOLINK A7000R cstecgi.cgi setWiFiEasyGuestCfg函数ssid5g参数栈缓冲区溢出漏洞 | 2026-04-14 | 2026-04-15 |
| cnvd-2026-17273 | Totolink A3002MU formWlanSetup文件wan-url参数栈缓冲区溢出漏洞 | 2026-04-14 | 2026-04-15 |
| cnvd-2026-17247 | WordPress插件Product Filter for WooCommerce by WBW存在未明漏洞 | 2026-04-14 | 2026-04-15 |
| cnvd-2026-17246 | WordPress插件User Registration & Membership输入验证错误漏洞 | 2026-04-14 | 2026-04-15 |
| cnvd-2026-17179 | Huawei HarmonyOS和EMUI LBS模块权限绕过访问漏洞 | 2026-04-14 | 2026-04-14 |
| cnvd-2026-17178 | Huawei HarmonyOS媒体平台栈溢出漏洞 | 2026-04-14 | 2026-04-14 |
| cnvd-2026-17177 | Huawei HarmonyOS和EMUI kernel模块内存错误引用漏洞(CNVD-2026-17177) | 2026-04-14 | 2026-04-14 |
| cnvd-2026-17176 | Huawei HarmonyOS和EMUI kernel模块越界写入漏洞 | 2026-04-14 | 2026-04-14 |
| cnvd-2026-17175 | Huawei HarmonyOS通信模块内存错误引用漏洞 | 2026-04-14 | 2026-04-14 |
| cnvd-2026-17174 | Huawei HarmonyOS和EMUI kernel模块内存错误引用漏洞 | 2026-04-14 | 2026-04-14 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01708 | Уязвимость функции commonprefix() модуля pip языка программирования Python, позволяющая н… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01707 | Уязвимость библиотеки обработки JSON-данных Json-smart, связанная с неконтролируемой реку… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01706 | Уязвимость функции toFixed() среды выполнения JavaScript-кода Rhino, позволяющая нарушите… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01705 | Уязвимость классов ManifestParser и AmazonS3 системы контроля версий Git на языке Java Ec… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01704 | Уязвимость компонента JSON Web Token Handler программного средства для управления иденти… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01703 | Уязвимость функции h2v2_merged_upsample_internal() библиотеки libjpeg-turbo, позволяющая … | 11.02.2026 | 11.02.2026 |
| bdu:2026-01702 | Уязвимость диспетчера окон рабочего стола (Desktop Window Manager) операционных систем Wi… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01701 | Уязвимость службы удаленного рабочего стола Remote Desktop Services (RDS) операционных си… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01700 | Уязвимость компонента MSHTML операционных систем Windows, позволяющая нарушителю обойти ф… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01699 | Уязвимость пакета программ Microsoft Office, связанная с использованием ненадежных входны… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01698 | Уязвимость службы Remote Access Connection Manager (RASMan) операционной системы Windows,… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01639 | Уязвимость функций virtio_queue_rqs() и virtblk_poll() модуля drivers/block/virtio_blk.c … | 11.02.2026 | 11.02.2026 |
| bdu:2026-01636 | Уязвимость функции felix_change_tag_protocol() модуля drivers/net/dsa/ocelot/felix.c драй… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01635 | Уязвимость анализатора XML-файлов Xerces2 Java, связанная с ошибками управления ресурсом,… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01634 | Уязвимость библиотеки синтаксического анализа XML Apache Xerces, связанная с выполнением … | 11.02.2026 | 11.02.2026 |
| bdu:2026-01633 | Уязвимость функции gfx_v9_0_hw_fini() модуля drivers/gpu/drm/amd/amdgpu/gfx_v9_0.c драйве… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01632 | Уязвимость компонента io.netty.handler.codec.http.HttpRequestEncoder сетевого программног… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01631 | Уязвимость функции nouveau_gem_prime_import_sg_table() модуля drivers/gpu/drm/nouveau/nou… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01630 | Уязвимость командной оболочки Shell операционных систем Windows, позволяющая нарушителю о… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01629 | Уязвимость функции efivar_ssdt_load() модуля drivers/firmware/efi/efi.c драйвера прошивок… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01628 | Уязвимость функции irdma_net_event() модуля drivers/infiniband/hw/irdma/utils.c драйвера … | 11.02.2026 | 11.02.2026 |
| bdu:2026-01627 | Уязвимость функции kimage_map_segment() модуля kernel/kexec_core.c ядра операционной сист… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01626 | Уязвимость функций rtw89_core_register_hw(), rtw89_pci_probe() модуля drivers/net/wireles… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01625 | Уязвимость инструмента создания сценариев веб-клиента системы для управления взаимоотноше… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01599 | Уязвимость функции drain_obj_stock() модуля mm/memcontrol.c подсистемы управления памятью… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01598 | Уязвимость функции f2fs_put_super() модуля fs/f2fs/super.c файловой системы F2FS ядра опе… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01570 | Уязвимость функции a7xx_patch_pwrup_reglist() модуля drivers/gpu/drm/msm/adreno/a6xx_gpu… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01569 | Уязвимость функции exynos_clkout_probe() модуля drivers/clk/samsung/clk-exynos-clkout.c д… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01568 | Уязвимость функции adv7842_cp_log_status() модуля drivers/media/i2c/adv7842.c драйвера му… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01567 | Уязвимость функции raid1_remove_disk() модуля drivers/md/raid1.c драйвера нескольких устр… | 11.02.2026 | 11.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202010-1511 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T22:14:35.686000Z |
| var-201912-1854 | An issue existed in the drawing of web page elements. The issue was addressed with improv… | 2024-07-23T22:14:33.774000Z |
| var-200511-0019 | The Internet Key Exchange version 1 (IKEv1) implementation in Check Point products allows… | 2024-07-23T22:14:03.297000Z |
| var-201008-0270 | The WDB target agent debug service in Wind River VxWorks 6.x, 5.x, and earlier, as used o… | 2024-07-23T22:14:01.941000Z |
| var-200904-0819 | Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.… | 2024-07-23T22:12:51.678000Z |
| var-201711-0446 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T22:12:50.009000Z |
| var-201912-0506 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:12:49.908000Z |
| var-200609-0311 | Heap-based buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote at… | 2024-07-23T22:12:46.615000Z |
| var-201905-1248 | Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some m… | 2024-07-23T22:12:08.666000Z |
| var-202007-1133 | Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an … | 2024-07-23T22:12:07.961000Z |
| var-201009-0230 | bgpd in Quagga before 0.99.17 does not properly parse AS paths, which allows remote attac… | 2024-07-23T22:12:06.629000Z |
| var-201806-1488 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T22:12:00.711000Z |
| var-201405-0244 | The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEA… | 2024-07-23T22:12:00.239000Z |
| var-200611-0368 | The (1) Password Manager in Mozilla Firefox 2.0, and 1.5.0.8 and earlier; and the (2) Pas… | 2024-07-23T22:11:59.300000Z |
| var-201806-1436 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T22:11:27.007000Z |
| var-201702-0879 | An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari … | 2024-07-23T22:10:32.463000Z |
| var-200703-0010 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted at… | 2024-07-23T22:10:30.778000Z |
| var-201902-0855 | png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_im… | 2024-07-23T22:10:27.196000Z |
| var-202010-1294 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T22:10:25.978000Z |
| var-201506-0038 | Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to exe… | 2024-07-23T22:10:25.193000Z |
| var-200805-0585 | OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the… | 2024-07-23T22:10:24.233000Z |
| var-202012-1547 | A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel thr… | 2024-07-23T22:10:23.557000Z |
| var-201302-0236 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:10:22.448000Z |
| var-202004-2191 | In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untru… | 2024-07-23T22:10:21.285000Z |
| var-201904-0742 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:10:15.079000Z |
| var-200608-0030 | Unspecified vulnerability in the "compression state handling" in Bom for Apple Mac OS X 1… | 2024-07-23T22:10:15.377000Z |
| var-201912-0608 | A memory corruption issue was addressed with improved input validation. This issue is fix… | 2024-07-23T22:09:37.183000Z |
| var-200505-0162 | Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based … | 2024-07-23T22:09:05.800000Z |
| var-202003-1771 | A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-pro… | 2024-07-23T22:09:01.387000Z |
| var-201506-0465 | The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.… | 2024-07-23T22:08:28.995000Z |