Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-21244 |
7.3 (3.1)
|
Windows Hyper-V Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:43.396Z | 2026-03-16T22:47:31.398Z |
| CVE-2026-21243 |
7.5 (3.1)
|
Windows Lightweight Directory Access Protocol (LDAP) D… |
Microsoft |
Windows Server 2019 |
2026-02-10T17:51:43.963Z | 2026-03-16T22:47:31.958Z |
| CVE-2026-21249 |
3.3 (3.1)
|
Windows NTLM Spoofing Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:42.124Z | 2026-03-16T22:47:30.173Z |
| CVE-2026-21245 |
7.8 (3.1)
|
Windows Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 11 Version 24H2 |
2026-02-10T17:51:42.716Z | 2026-03-16T22:47:30.748Z |
| CVE-2026-21251 |
7.8 (3.1)
|
Cluster Client Failover (CCF) Elevation of Privilege V… |
Microsoft |
Windows Server 2016 |
2026-02-10T17:51:40.939Z | 2026-03-16T22:47:29.014Z |
| CVE-2026-21250 |
7.8 (3.1)
|
Windows HTTP.sys Elevation of Privilege Vulnerability |
Microsoft |
Windows 11 Version 24H2 |
2026-02-10T17:51:41.521Z | 2026-03-16T22:47:29.554Z |
| CVE-2026-21253 |
7 (3.1)
|
Mailslot File System Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:39.411Z | 2026-03-16T22:47:28.451Z |
| CVE-2026-21256 |
8.8 (3.1)
|
GitHub Copilot and Visual Studio Remote Code Execution… |
Microsoft |
Microsoft Visual Studio 2022 version 17.14 |
2026-02-10T17:51:38.364Z | 2026-03-16T22:47:27.112Z |
| CVE-2026-21255 |
8.8 (3.1)
|
Windows Hyper-V Security Feature Bypass Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:38.926Z | 2026-03-16T22:47:27.717Z |
| CVE-2026-21257 |
8 (3.1)
|
GitHub Copilot and Visual Studio Elevation of Privileg… |
Microsoft |
Microsoft Visual Studio 2022 version 17.14 |
2026-02-10T17:51:37.741Z | 2026-03-16T22:47:26.596Z |
| CVE-2026-21508 |
7 (3.1)
|
Windows Storage Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:36.479Z | 2026-03-16T22:47:25.423Z |
| CVE-2026-21261 |
5.5 (3.1)
|
Microsoft Excel Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-02-10T17:51:37.088Z | 2026-03-16T22:47:25.926Z |
| CVE-2026-21516 |
8.8 (3.1)
|
GitHub Copilot for Jetbrains Remote Code Execution Vul… |
Microsoft |
GitHub Copilot Plugin for JetBrains IDEs |
2026-02-10T17:51:35.340Z | 2026-03-16T22:47:24.077Z |
| CVE-2026-21511 |
7.5 (3.1)
|
Microsoft Outlook Spoofing Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-02-10T17:51:35.908Z | 2026-03-16T22:47:24.766Z |
| CVE-2026-21525 |
6.2 (3.1)
|
Windows Remote Access Connection Manager Denial of Ser… |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:34.755Z | 2026-03-16T22:47:23.548Z |
| CVE-2026-21529 |
5.7 (3.1)
|
Azure HDInsight Spoofing Vulnerability |
Microsoft |
Azure HDInsight |
2026-02-10T17:51:33.525Z | 2026-03-16T22:47:22.373Z |
| CVE-2026-21514 |
7.8 (3.1)
|
Microsoft Word Security Feature Bypass Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-02-10T17:51:34.153Z | 2026-03-16T22:47:22.874Z |
| CVE-2026-21537 |
8.8 (3.1)
|
Microsoft Defender for Endpoint Linux Extension Remote… |
Microsoft |
Microsoft Defender for Endpoint for Linux |
2026-02-10T17:51:32.870Z | 2026-03-16T22:47:21.735Z |
| CVE-2026-21510 |
8.8 (3.1)
|
Windows Shell Security Feature Bypass Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:32.210Z | 2026-03-16T22:47:21.007Z |
| CVE-2026-21531 |
9.8 (3.1)
|
Azure SDK for Python Remote Code Execution Vulnerability |
Microsoft |
Azure AI Language Authoring |
2026-02-10T17:51:31.660Z | 2026-03-16T22:47:20.514Z |
| CVE-2026-21528 |
6.5 (3.1)
|
Azure IoT Explorer Information Disclosure Vulnerability |
Microsoft |
Azure IoT Explorer |
2026-02-10T17:51:30.773Z | 2026-03-16T22:47:19.919Z |
| CVE-2026-21527 |
6.5 (3.1)
|
Microsoft Exchange Server Spoofing Vulnerability |
Microsoft |
Microsoft Exchange Server 2016 Cumulative Update 23 |
2026-02-10T17:51:30.280Z | 2026-03-16T22:47:19.274Z |
| CVE-2026-21535 |
8.2 (3.1)
|
Microsoft Teams Information Disclosure Vulnerability |
Microsoft |
Microsoft Teams |
2026-02-19T22:06:20.817Z | 2026-03-16T22:47:18.716Z |
| CVE-2026-0102 |
3.1 (3.1)
|
Microsoft Edge (Chromium-based) Defense in Depth Vulne… |
Microsoft |
Microsoft Edge (Chromium-based) |
2026-02-17T19:14:32.901Z | 2026-03-16T22:47:18.003Z |
| CVE-2026-21522 |
6.7 (3.1)
|
Microsoft ACI Confidential Containers Elevation of Pri… |
Microsoft |
Microsoft ACI Confidential Containers |
2026-02-10T17:51:29.618Z | 2026-03-16T22:47:17.283Z |
| CVE-2026-24302 |
8.6 (3.1)
|
Azure Arc Elevation of Privilege Vulnerability |
Microsoft |
Azure ARC |
2026-02-05T22:13:22.975Z | 2026-03-16T22:47:16.141Z |
| CVE-2026-21532 |
8.2 (3.1)
|
Azure Function Information Disclosure Vulnerability |
Microsoft |
Azure Functions |
2026-02-05T22:13:24.102Z | 2026-03-16T22:47:16.651Z |
| CVE-2026-24300 |
9.8 (3.1)
|
Azure Front Door Elevation of Privilege Vulnerability |
Microsoft |
Azure Front Door |
2026-02-05T22:13:25.676Z | 2026-03-16T22:47:15.557Z |
| CVE-2026-21513 |
8.8 (3.1)
|
MSHTML Framework Security Feature Bypass Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:26.733Z | 2026-03-16T22:47:14.396Z |
| CVE-2026-0391 |
6.5 (3.1)
|
Microsoft Edge (Chromium-based) for Android Spoofing V… |
Microsoft |
Microsoft Edge (Chromium-based) |
2026-02-05T22:13:26.387Z | 2026-03-16T22:47:14.896Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2017-5848 |
N/A
|
The gst_ps_demux_parse_psm function in gst/mpegde… |
n/a |
n/a |
2017-02-09T15:00:00.000Z | 2024-08-05T15:11:48.847Z |
| CVE-2017-5847 |
N/A
|
The gst_asf_demux_process_ext_content_desc functi… |
n/a |
n/a |
2017-02-09T15:00:00.000Z | 2024-08-05T15:11:49.010Z |
| CVE-2017-5846 |
N/A
|
The gst_asf_demux_process_ext_stream_props functi… |
n/a |
n/a |
2017-02-09T15:00:00.000Z | 2024-08-05T15:11:48.839Z |
| CVE-2017-5845 |
N/A
|
The gst_avi_demux_parse_ncdt function in gst/avi/… |
n/a |
n/a |
2017-02-09T15:00:00.000Z | 2024-08-05T15:11:48.919Z |
| CVE-2017-5844 |
N/A
|
The gst_riff_create_audio_caps function in gst-li… |
n/a |
n/a |
2017-02-09T15:00:00.000Z | 2024-08-05T15:11:48.802Z |
| CVE-2017-5843 |
N/A
|
Multiple use-after-free vulnerabilities in the (1… |
n/a |
n/a |
2017-02-09T15:00:00.000Z | 2024-08-05T15:11:48.846Z |
| CVE-2017-5842 |
N/A
|
The html_context_handle_element function in gst/s… |
n/a |
n/a |
2017-02-09T15:00:00.000Z | 2024-08-05T15:11:48.970Z |
| CVE-2017-5841 |
N/A
|
The gst_avi_demux_parse_ncdt function in gst/avi/… |
n/a |
n/a |
2017-02-09T15:00:00.000Z | 2024-08-05T15:11:48.923Z |
| CVE-2017-5840 |
N/A
|
The qtdemux_parse_samples function in gst/isomp4/… |
n/a |
n/a |
2017-02-09T15:00:00.000Z | 2024-08-05T15:11:48.806Z |
| CVE-2017-5839 |
N/A
|
The gst_riff_create_audio_caps function in gst-li… |
n/a |
n/a |
2017-02-09T15:00:00.000Z | 2024-08-05T15:11:48.656Z |
| CVE-2017-5838 |
N/A
|
The gst_date_time_new_from_iso8601_string functio… |
n/a |
n/a |
2017-02-09T15:00:00.000Z | 2024-08-05T15:11:48.841Z |
| CVE-2017-5837 |
N/A
|
The gst_riff_create_audio_caps function in gst-li… |
n/a |
n/a |
2017-02-09T15:00:00.000Z | 2024-08-05T15:11:48.820Z |
| CVE-2016-9447 |
N/A
|
The ROM mappings in the NSF decoder in gstreamer … |
n/a |
n/a |
2017-01-23T21:00:00.000Z | 2024-08-06T02:50:38.384Z |
| CVE-2016-9446 |
N/A
|
The vmnc decoder in the gstreamer does not initia… |
n/a |
n/a |
2017-01-23T21:00:00.000Z | 2024-08-06T02:50:38.682Z |
| CVE-2016-9445 |
N/A
|
Integer overflow in the vmnc decoder in the gstre… |
n/a |
n/a |
2017-01-23T21:00:00.000Z | 2024-08-06T02:50:38.398Z |
| CVE-2016-10199 |
N/A
|
The qtdemux_tag_add_str_full function in gst/isom… |
n/a |
n/a |
2017-02-09T15:00:00.000Z | 2024-08-06T03:14:42.318Z |
| CVE-2016-10198 |
N/A
|
The gst_aac_parse_sink_setcaps function in gst/au… |
n/a |
n/a |
2017-02-09T15:00:00.000Z | 2024-08-06T03:14:42.890Z |
| CVE-2015-0797 |
N/A
|
GStreamer before 1.4.5, as used in Mozilla Firefo… |
n/a |
n/a |
2015-05-14T10:00:00.000Z | 2024-08-06T04:26:10.193Z |
| CVE-2009-0586 |
N/A
|
Integer overflow in the gst_vorbis_tag_add_covera… |
n/a |
n/a |
2009-03-14T18:00:00.000Z | 2024-08-07T04:40:04.340Z |
| CVE-2026-32776 |
4 (3.1)
|
libexpat before 2.7.5 allows a NULL pointer deref… |
libexpat project |
libexpat |
2026-03-16T06:54:20.318Z | 2026-03-16T14:58:38.710Z |
| CVE-2026-30741 |
9.8 (3.1)
|
A remote code execution (RCE) vulnerability in Op… |
n/a |
n/a |
2026-03-11T00:00:00.000Z | 2026-03-12T14:27:31.142Z |
| CVE-2025-37920 |
N/A
|
xsk: Fix race condition in AF_XDP generic RX path |
Linux |
Linux |
2025-05-20T15:21:49.685Z | 2026-02-19T15:39:16.433Z |
| CVE-2025-13460 |
5.3 (3.1)
|
IBM Aspera Console Information Disclosure |
IBM |
Aspera Console |
2026-03-13T19:54:04.254Z | 2026-03-16T13:50:17.157Z |
| CVE-2025-13459 |
2.7 (3.1)
|
IBM Aspera Console Denial of Service |
IBM |
Aspera Console |
2026-03-13T19:54:05.962Z | 2026-03-16T13:51:49.820Z |
| CVE-2025-13212 |
5.3 (3.1)
|
IBM Aspera Console Denial of Service |
IBM |
Aspera Console |
2026-03-13T19:54:10.521Z | 2026-03-16T13:53:57.011Z |
| CVE-2026-27653 |
6.7 (3.0)
5.4 (4.0)
|
The installers for multiple products provided by … |
Soliton Systems K.K. |
Soliton SecureBrowser for OneGate |
2026-02-27T05:39:54.060Z | 2026-02-27T18:52:30.918Z |
| CVE-2025-37926 |
N/A
|
ksmbd: fix use-after-free in ksmbd_session_rpc_open |
Linux |
Linux |
2025-05-20T15:21:53.359Z | 2026-02-06T16:31:04.940Z |
| CVE-2026-24498 |
6 (4.0)
|
Exposure of Sensitive Information to an Unauthori… |
EFM-Networks, Inc. |
ipTIME T5008 |
2026-02-27T02:01:12.377Z | 2026-02-27T16:03:35.360Z |
| CVE-2026-24497 |
8.4 (4.0)
|
Stack-based Buffer Overflow vulnerability in SimT… |
SimTech Systems, Inc. |
ThinkWise |
2026-02-27T01:52:58.847Z | 2026-02-27T16:07:55.454Z |
| CVE-2026-28443 |
6.9 (4.0)
|
OpenReplay: SQL injection in cards/search via unvalida… |
openreplay |
openreplay |
2026-03-05T20:53:17.967Z | 2026-03-06T16:08:11.944Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-3839 | Unraid Authentication Request Path Traversal Authentication Bypass Vulnerability. This vulnerabilit… | 2026-03-16T14:19:53.033 | 2026-03-17T14:19:01.977 |
| fkie_cve-2026-3838 | Unraid Update Request Path Traversal Remote Code Execution Vulnerability. This vulnerability allows… | 2026-03-16T14:19:52.877 | 2026-03-17T14:18:58.587 |
| fkie_cve-2022-50521 | In the Linux kernel, the following vulnerability has been resolved: platform/x86: mxm-wmi: fix mem… | 2025-10-07T16:15:35.883 | 2026-03-17T14:17:13.760 |
| fkie_cve-2026-32415 | Path Traversal: '.../...//' vulnerability in Bogdan Bendziukov Squeeze squeeze allows Path Traversa… | 2026-03-13T19:54:58.787 | 2026-03-17T14:16:16.920 |
| fkie_cve-2026-32405 | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in xtemos … | 2026-03-13T19:54:56.883 | 2026-03-17T14:16:16.733 |
| fkie_cve-2026-32401 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-03-13T19:54:56.160 | 2026-03-17T14:16:16.537 |
| fkie_cve-2026-32393 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-03-13T19:54:54.857 | 2026-03-17T14:16:16.340 |
| fkie_cve-2026-32384 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-03-13T19:54:53.633 | 2026-03-17T14:16:16.150 |
| fkie_cve-2026-32372 | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in RadiusT… | 2026-03-13T19:54:51.673 | 2026-03-17T14:16:15.957 |
| fkie_cve-2026-32364 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-03-13T19:54:50.447 | 2026-03-17T14:16:15.760 |
| fkie_cve-2026-32344 | Cross-Site Request Forgery (CSRF) vulnerability in desertthemes Corpiva corpiva allows Cross Site R… | 2026-03-13T19:54:45.957 | 2026-03-17T14:16:15.557 |
| fkie_cve-2026-31857 | Craft is a content management system (CMS). Prior to 5.9.9 and 4.17.4, a Remote Code Execution vuln… | 2026-03-11T18:16:24.360 | 2026-03-17T14:15:46.283 |
| fkie_cve-2022-50522 | In the Linux kernel, the following vulnerability has been resolved: mcb: mcb-parse: fix error hand… | 2025-10-07T16:15:36.017 | 2026-03-17T14:15:32.657 |
| fkie_cve-2022-50518 | In the Linux kernel, the following vulnerability has been resolved: parisc: Fix locking in pdc_iod… | 2025-10-07T16:15:35.490 | 2026-03-17T14:15:19.117 |
| fkie_cve-2022-50519 | In the Linux kernel, the following vulnerability has been resolved: nilfs2: replace WARN_ONs by ni… | 2025-10-07T16:15:35.610 | 2026-03-17T14:13:35.690 |
| fkie_cve-2022-50520 | In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Fix PCI device ref… | 2025-10-07T16:15:35.747 | 2026-03-17T14:13:15.580 |
| fkie_cve-2022-50516 | In the Linux kernel, the following vulnerability has been resolved: fs: dlm: fix invalid derefence… | 2025-10-07T16:15:35.240 | 2026-03-17T14:12:32.497 |
| fkie_cve-2022-50517 | In the Linux kernel, the following vulnerability has been resolved: mm/huge_memory: do not clobber… | 2025-10-07T16:15:35.367 | 2026-03-17T14:12:03.183 |
| fkie_cve-2022-50514 | In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_hid: fix refcou… | 2025-10-07T16:15:34.983 | 2026-03-17T14:11:49.507 |
| fkie_cve-2022-50515 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix memory leak in… | 2025-10-07T16:15:35.113 | 2026-03-17T14:11:04.813 |
| fkie_cve-2020-5849 | Unraid 6.8.0 allows authentication bypass. | 2020-03-16T18:15:12.790 | 2026-03-17T14:10:26.377 |
| fkie_cve-2020-5847 | Unraid through 6.8.0 allows Remote Code Execution. | 2020-03-16T18:15:12.713 | 2026-03-17T14:10:26.377 |
| fkie_cve-2022-50512 | In the Linux kernel, the following vulnerability has been resolved: ext4: fix potential memory lea… | 2025-10-07T16:15:34.473 | 2026-03-17T14:08:18.160 |
| fkie_cve-2022-50513 | In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix a pote… | 2025-10-07T16:15:34.860 | 2026-03-17T14:07:23.837 |
| fkie_cve-2022-50510 | In the Linux kernel, the following vulnerability has been resolved: perf/smmuv3: Fix hotplug callb… | 2025-10-07T16:15:34.210 | 2026-03-17T14:06:57.633 |
| fkie_cve-2022-50511 | In the Linux kernel, the following vulnerability has been resolved: lib/fonts: fix undefined behav… | 2025-10-07T16:15:34.337 | 2026-03-17T14:06:31.620 |
| fkie_cve-2026-31858 | Craft is a content management system (CMS). The ElementSearchController::actionSearch() endpoint is… | 2026-03-11T18:16:24.527 | 2026-03-17T14:05:38.050 |
| fkie_cve-2026-31859 | Craft is a content management system (CMS). The fix for CVE-2025-35939 in craftcms/cms introduced a… | 2026-03-11T18:16:24.710 | 2026-03-17T14:03:57.187 |
| fkie_cve-2026-31867 | Craft Commerce is an ecommerce platform for Craft CMS. Prior to 4.11.0 and 5.6.0, An Insecure Direc… | 2026-03-11T18:16:25.663 | 2026-03-17T14:02:48.043 |
| fkie_cve-2022-50509 | In the Linux kernel, the following vulnerability has been resolved: media: coda: Add check for kma… | 2025-10-07T16:15:33.300 | 2026-03-17T13:59:34.587 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-62j4-5x45-jvf3 |
4.8 (3.1)
1.7 (4.0)
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wikimedia Foundation Me… | 2026-02-03T00:30:19Z | 2026-03-16T21:34:30Z |
| ghsa-39fr-2fph-j42r |
4.8 (3.1)
0.0 (4.0)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T00:30:19Z | 2026-03-16T21:34:30Z |
| ghsa-xfq5-fxgc-9grj |
5.5 (3.1)
6.8 (4.0)
|
A NULL Pointer Dereference vulnerability in the chassis daemon (chassisd) of Juniper Networks Junos… | 2026-01-15T21:31:47Z | 2026-03-16T21:34:29Z |
| ghsa-7w79-29qq-c7v3 |
4.8 (3.1)
0.0 (4.0)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T00:30:19Z | 2026-03-16T21:34:29Z |
| ghsa-337w-h8w7-m899 |
4.0 (3.1)
|
A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function tha… | 2026-01-26T21:30:36Z | 2026-03-16T21:34:29Z |
| ghsa-3w3w-pxmm-2w2j |
5.3 (3.1)
|
crypto-js uses insecure random numbers | 2023-06-12T03:30:17Z | 2026-03-16T21:31:59Z |
| ghsa-g375-5wmp-xr78 |
6.5 (3.1)
|
Admidio is Missing Authorization on Forum Topic and Post Deletion | 2026-03-16T21:18:53Z | 2026-03-16T21:18:53Z |
| ghsa-4wr4-f2qf-x5wj |
5.4 (3.1)
|
Admidio has an HTMLPurifier Bypass in eCard Message Allows HTML Email Injection | 2026-03-16T21:18:39Z | 2026-03-16T21:18:39Z |
| ghsa-rmpj-3x5m-9m5f |
9.1 (3.1)
|
Admidio is Missing Authorization and CSRF Protection on Document and Folder Deletion | 2026-03-16T21:18:10Z | 2026-03-16T21:18:10Z |
| ghsa-h8gr-qwr6-m9gx |
5.7 (3.1)
|
Admidio is Missing CSRF Protection on Role Membership Date Changes | 2026-03-16T21:17:34Z | 2026-03-16T21:17:35Z |
| ghsa-wwg8-6ffr-h4q2 |
5.7 (3.1)
|
Admidio is Missing CSRF Validation on Role Delete, Activate, and Deactivate Actions | 2026-03-16T21:17:09Z | 2026-03-16T21:17:09Z |
| ghsa-95cq-p4w2-32w5 |
8.8 (3.1)
|
File Upload(RCE) Vulnerability in admidio | 2026-03-16T21:16:50Z | 2026-03-16T21:16:50Z |
| ghsa-4w98-xf39-23gp |
7.5 (3.1)
|
Loop with Unreachable Exit Condition ('Infinite Loop') in ewe | 2026-03-16T20:49:50Z | 2026-03-16T20:49:50Z |
| ghsa-9w88-79f8-m3vp |
5.3 (3.1)
|
Permissive List of Allowed Inputs in ewe | 2026-03-16T20:49:36Z | 2026-03-16T20:49:36Z |
| ghsa-vvp9-7p8x-rfvv |
8.2 (4.0)
|
lz4_flex's decompression can leak information from uninitialized memory or reused output buffer | 2026-03-16T20:48:08Z | 2026-03-16T20:48:08Z |
| ghsa-j94x-8wcp-x7hm |
5.1 (4.0)
|
Kargo Vulnerable to SSRF in Promotion http/http-download Steps Enables Internal Network Access and … | 2026-03-16T20:47:47Z | 2026-03-16T20:47:47Z |
| ghsa-fgm3-q9r5-43v9 |
7.9 (4.0)
|
Romeo's invalid NetworkPolicy enables a malicious actor to pivot into another namespace | 2026-03-16T20:45:59Z | 2026-03-16T20:45:59Z |
| ghsa-9f3r-2vgw-m8xp |
6.5 (3.1)
|
File Browser has an Access Rule Bypass via Path Traversal in Copy/Rename Destination Parameter | 2026-03-16T20:45:12Z | 2026-03-16T20:45:12Z |
| ghsa-j7wh-x834-p3r7 |
9.8 (3.1)
|
SiYuan: Authorization Bypass Allows Arbitrary SQL Execution via Search API | 2026-03-16T20:44:52Z | 2026-03-16T20:44:52Z |
| ghsa-5gg9-5g7w-hm73 |
10.0 (4.0)
|
File Browser Signup Grants Admin When Default Permissions Include Admin | 2026-03-16T20:44:20Z | 2026-03-16T20:44:20Z |
| ghsa-v3mg-9v85-fcm7 |
5.3 (4.0)
|
SiYuan Vulnerable to Remote Code Execution via Malicious Bazaar Package — Marketplace XSS | 2026-03-16T20:43:49Z | 2026-03-16T20:43:49Z |
| ghsa-ffx7-75gc-jg7c |
5.3 (4.0)
|
File Browser TUS Negative Upload-Length Fires Post-Upload Hooks Prematurely | 2026-03-16T20:43:29Z | 2026-03-16T20:43:29Z |
| ghsa-cmj3-wx7h-ffvg |
8.7 (4.0)
|
Parse Server affected by denial-of-service via unbounded query complexity in REST and GraphQL API | 2026-03-11T00:16:48Z | 2026-03-16T20:42:11Z |
| ghsa-vr7j-g7jv-h5mp |
5.7 (4.0)
|
OpenClaw session transcript files were created without forced user-only permissions | 2026-03-16T20:41:51Z | 2026-03-16T20:41:51Z |
| ghsa-g2f6-pwvx-r275 |
7.2 (4.0)
|
OpneClaw accepts unsanitized iMessage attachment paths which allowed SCP remote-path command injection | 2026-03-16T20:41:12Z | 2026-03-16T20:41:12Z |
| ghsa-jq3f-vjww-8rq7 |
8.7 (4.0)
|
OpenClaw Telegram webhook request bodies were read before secret validation, enabling unauthenticat… | 2026-03-16T20:40:57Z | 2026-03-16T20:40:57Z |
| ghsa-63f5-hhc7-cx6p |
8.6 (4.0)
|
OpenClaw bootstrap setup codes could be replayed to escalate pending pairing scopes before approval | 2026-03-16T20:40:23Z | 2026-03-16T20:40:23Z |
| ghsa-xwcj-hwhf-h378 |
6.9 (4.0)
|
OpenClaw Telegram media fetch errors exposed bot tokens in logged file URLs | 2026-03-16T20:40:13Z | 2026-03-16T20:40:13Z |
| ghsa-4685-c5cp-vp95 |
3.6 (3.1)
|
OpenClaw safeBins stdin-only bypass via sort output and recursive grep flags | 2026-02-19T22:06:00Z | 2026-03-16T19:46:44Z |
| ghsa-qr46-rcv3-4hq3 |
5.1 (4.0)
|
SiYuan Vulnerable to Remote Code Execution via Stored XSS in Notebook Name - Mobile Interface | 2026-03-16T18:47:37Z | 2026-03-16T18:47:37Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-229 |
8.8 (3.1)
|
Hugging Face Transformers Trax Model Deserialization of Untrusted Data Remote Code Execut… | transformers | 2024-11-22T22:15:07+00:00 | 2025-02-10T23:22:41.499413+00:00 |
| pysec-2024-228 |
8.8 (3.1)
|
Hugging Face Transformers MaskFormer Model Deserialization of Untrusted Data Remote Code … | transformers | 2024-11-22T22:15:07+00:00 | 2025-02-10T23:22:41.449105+00:00 |
| pysec-2024-227 |
8.8 (3.1)
|
Hugging Face Transformers MobileViTV2 Deserialization of Untrusted Data Remote Code Execu… | transformers | 2024-11-22T22:15:06+00:00 | 2025-02-10T23:22:41.399021+00:00 |
| pysec-2024-226 |
7.8 (3.1)
|
Pymatgen (Python Materials Genomics) is an open-source Python library for materials analy… | pymatgen | 2024-02-21T17:15:09+00:00 | 2025-02-06T00:34:28.734730+00:00 |
| pysec-2024-225 |
7.5 (3.1)
|
cryptography is a package designed to expose cryptographic primitives and recipes to Pyth… | cryptography | 2024-02-21T17:15:09+00:00 | 2025-02-06T00:34:24.427679+00:00 |
| pysec-2024-224 |
7.0 (3.1)
|
Excessive directory permissions in MLflow leads to local privilege escalation when using … | mlflow | 2024-11-25T14:15:06+00:00 | 2025-02-03T16:23:40.409646+00:00 |
| pysec-2024-27 |
9.8 (3.1)
|
CrateDB 5.5.1 is contains an authentication bypass vulnerability in the Admin UI componen… | crate | 2024-01-30T01:15:00Z | 2025-01-30T22:47:57.847403Z |
| pysec-2019-242 |
5.5 (3.1)
|
Capstone 3.0.4 has an out-of-bounds vulnerability (SEGV caused by a read memory access) i… | capstone | 2019-05-15T14:29:00Z | 2025-01-28T17:34:08.578134Z |
| pysec-2025-2 |
|
uniapi version 1.0.7 introduces code that would execute on import of the module and downl… | uniapi | 2025-01-24T19:56:53+00:00 | |
| pysec-2024-223 |
9.1 (3.1)
|
Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds … | onnx | 2024-02-23T18:15:50+00:00 | 2025-01-22T16:23:22.060512+00:00 |
| pysec-2024-222 |
7.5 (3.1)
|
Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Trav… | onnx | 2024-02-23T18:15:50+00:00 | 2025-01-22T16:23:21.994731+00:00 |
| pysec-2024-221 |
5.3 (3.1)
|
aiosmtpd is a reimplementation of the Python stdlib smtpd.py based on asyncio. aiosmtpd i… | aiosmtpd | 2024-03-12T21:15:58+00:00 | 2025-01-22T16:23:18.042465+00:00 |
| pysec-2024-220 |
5.4 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.972580+00:00 |
| pysec-2024-219 |
9.1 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.897787+00:00 |
| pysec-2024-218 |
8.1 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.803143+00:00 |
| pysec-2024-217 |
7.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This is a **data … | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T22:22:23.723816+00:00 |
| pysec-2024-216 |
7.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T22:22:23.549944+00:00 |
| pysec-2024-215 |
9.8 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:11+00:00 | 2025-01-19T22:22:23.471780+00:00 |
| pysec-2024-214 |
5.4 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T22:22:23.399444+00:00 |
| pysec-2024-213 |
6.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T22:22:23.310301+00:00 |
| pysec-2024-212 |
|
Apache Airflow versions before 2.10.1 have a vulnerability that allows DAG authors to add… | apache-airflow | 2024-09-07T08:15:11+00:00 | 2025-01-19T22:22:22.289672+00:00 |
| pysec-2024-211 |
7.5 (3.1)
|
Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote clien… | waitress | 2024-10-29T15:15:12+00:00 | 2025-01-19T19:19:01.852094+00:00 |
| pysec-2024-210 |
4.8 (3.1)
|
Waitress is a Web Server Gateway Interface server for Python 2 and 3. A remote client may… | waitress | 2024-10-29T15:15:11+00:00 | 2025-01-19T19:19:01.811922+00:00 |
| pysec-2024-209 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-19T19:19:01.689044+00:00 |
| pysec-2024-208 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.647736+00:00 |
| pysec-2024-207 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.605918+00:00 |
| pysec-2024-206 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.566553+00:00 |
| pysec-2024-205 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. When using … | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-19T19:19:01.519824+00:00 |
| pysec-2024-204 |
8.1 (3.1)
|
TorchGeo Remote Code Execution Vulnerability | torchgeo | 2024-11-12T18:15:45+00:00 | 2025-01-19T19:19:01.299352+00:00 |
| pysec-2024-203 |
7.5 (3.1)
|
DuckDB is a SQL database management system. In versions 1.0.0 and prior, content in files… | duckdb | 2024-07-24T18:15:05+00:00 | 2025-01-19T19:18:58.299130+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33799 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.424348Z |
| gsd-2024-33798 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.346901Z |
| gsd-2024-33797 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.530297Z |
| gsd-2024-33796 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.308365Z |
| gsd-2024-33795 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.332784Z |
| gsd-2024-33794 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.557396Z |
| gsd-2024-33793 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.552273Z |
| gsd-2024-33792 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.507383Z |
| gsd-2024-33791 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.488352Z |
| gsd-2024-33790 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.450431Z |
| gsd-2024-33789 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.534336Z |
| gsd-2024-33788 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.591276Z |
| gsd-2024-33787 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.424661Z |
| gsd-2024-33786 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.606155Z |
| gsd-2024-33785 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.387543Z |
| gsd-2024-33784 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.595808Z |
| gsd-2024-33783 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.322051Z |
| gsd-2024-33782 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.322441Z |
| gsd-2024-33781 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.495881Z |
| gsd-2024-33780 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.307884Z |
| gsd-2024-33779 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.507854Z |
| gsd-2024-33778 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.295751Z |
| gsd-2024-33777 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.489805Z |
| gsd-2024-33776 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.587852Z |
| gsd-2024-33775 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.322245Z |
| gsd-2024-33774 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.484899Z |
| gsd-2024-33773 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.560326Z |
| gsd-2024-33772 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.282306Z |
| gsd-2024-33771 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.366201Z |
| gsd-2024-33770 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.514460Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1382 | Malicious code in @immuta/flag-providers-web (npm) | 2026-03-13T05:53:14Z | 2026-03-13T05:53:14Z |
| mal-2026-1384 | Malicious code in @lux2/ssr-catalogue-sfcc (npm) | 2026-03-13T05:37:08Z | 2026-03-13T05:37:08Z |
| mal-2026-1381 | Malicious code in @immuta/feature-flags-core (npm) | 2026-03-13T05:34:26Z | 2026-03-13T05:34:26Z |
| mal-2026-1383 | Malicious code in @immuta/pxl-components (npm) | 2026-03-13T05:32:55Z | 2026-03-13T05:32:55Z |
| mal-2026-1379 | Malicious code in 8x8-developer-docs (npm) | 2026-03-13T02:21:45Z | 2026-03-13T02:21:46Z |
| mal-2026-1347 | Malicious code in f0-abstraction-resolver (npm) | 2026-03-11T21:06:33Z | 2026-03-13T01:40:01Z |
| mal-2026-1378 | Malicious code in f0-service-address-doctor (npm) | 2026-03-13T00:40:57Z | 2026-03-13T00:40:57Z |
| mal-2026-1377 | Malicious code in adroit-websdk-server (npm) | 2026-03-13T00:40:56Z | 2026-03-13T00:40:56Z |
| mal-2026-1375 | Malicious code in @adamallana0909/apple-research-test (npm) | 2026-03-12T14:05:43Z | 2026-03-12T22:45:40Z |
| mal-2026-1380 | Malicious code in cline (npm) | 2026-03-12T22:33:41Z | 2026-03-12T22:33:41Z |
| mal-2026-1260 | Malicious code in webmd-url (npm) | 2026-03-06T07:28:40Z | 2026-03-12T16:38:55Z |
| mal-2026-1373 | Malicious code in @sky-it-livedata-libraries/livedata-commons-client (npm) | 2026-03-12T15:46:36Z | 2026-03-12T15:46:36Z |
| mal-2026-1372 | Malicious code in @sky-it-livedata-libraries/livedata-commons (npm) | 2026-03-12T15:46:35Z | 2026-03-12T15:46:36Z |
| mal-2026-1371 | Malicious code in collecters (PyPI) | 2026-03-12T15:25:30Z | 2026-03-12T15:25:30Z |
| mal-2026-1376 | Malicious code in @appleseed-apple/ac-sasskit (npm) | 2026-03-12T11:35:51Z | 2026-03-12T11:35:51Z |
| mal-2026-1368 | Malicious code in json-specparse (npm) | 2026-03-12T05:15:33Z | 2026-03-12T05:15:39Z |
| mal-2026-1370 | Malicious code in mezukabil (npm) | 2026-03-12T05:14:53Z | 2026-03-12T05:14:54Z |
| mal-2026-1369 | Malicious code in kinggupong (npm) | 2026-03-12T05:13:07Z | 2026-03-12T05:13:13Z |
| mal-2026-1367 | Malicious code in @kinggupong/libsignal-node (npm) | 2026-03-12T05:13:07Z | 2026-03-12T05:13:13Z |
| mal-2026-1366 | Malicious code in @kinggupong/baileys (npm) | 2026-03-12T05:13:07Z | 2026-03-12T05:13:08Z |
| mal-2026-778 | Malicious code in ac-dom-nodes (npm) | 2026-02-06T02:07:02Z | 2026-03-12T04:19:52Z |
| mal-2026-1365 | Malicious code in unibody (npm) | 2026-03-12T02:18:38Z | 2026-03-12T02:18:48Z |
| mal-2026-1362 | Malicious code in praxis-scripts (npm) | 2026-03-12T02:18:38Z | 2026-03-12T02:18:48Z |
| mal-2026-1361 | Malicious code in pcl-build-docroot (npm) | 2026-03-12T02:18:38Z | 2026-03-12T02:18:48Z |
| mal-2026-1359 | Malicious code in libsignal-mod (npm) | 2026-03-12T02:18:02Z | 2026-03-12T02:18:02Z |
| mal-2026-1358 | Malicious code in dappa-libsignal (npm) | 2026-03-12T02:18:02Z | 2026-03-12T02:18:02Z |
| mal-2026-1355 | Malicious code in @dappaoffc/baileys-mod (npm) | 2026-03-12T02:18:01Z | 2026-03-12T02:18:02Z |
| mal-2026-1354 | Malicious code in @dappaoffc/baileys (npm) | 2026-03-12T02:18:01Z | 2026-03-12T02:18:01Z |
| mal-2026-1363 | Malicious code in react-svg-anchor (npm) | 2026-03-12T02:12:32Z | 2026-03-12T02:12:33Z |
| mal-2026-1360 | Malicious code in npm-doc-build (npm) | 2026-03-12T02:07:51Z | 2026-03-12T02:07:52Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2301 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2025-10-14T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2129 | GIMP: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-09-24T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2002 | libssh: Schwachstelle ermöglicht Denial of Service | 2025-09-09T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-1976 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-04T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-1653 | Linux Kernel: Mehrere Schwachstellen | 2025-07-27T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-1517 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-08T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-0734 | GIMP: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-04-07T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2026-0203 | SmarterTools SmarterMail: Schwachstelle ermöglicht Umgehung | 2026-01-22T23:00:00.000+00:00 | 2026-02-22T23:00:00.000+00:00 |
| wid-sec-w-2025-1208 | Roundcube: Schwachstelle ermöglicht Codeausführung | 2025-06-01T22:00:00.000+00:00 | 2026-02-22T23:00:00.000+00:00 |
| wid-sec-w-2026-0347 | Red Hat Build of Keycloak: Mehrere Schwachstellen | 2026-02-09T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0209 | Cpython: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0196 | CPython: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-01-21T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0083 | Microsoft Windows : Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2025-2929 | Linux Kernel: Mehrere Schwachstellen | 2025-12-28T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0437 | Dell RecoverPoint for Virtual Machines: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und potenziell Privilegieneskalation | 2026-02-17T23:00:00.000+00:00 | 2026-02-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0420 | Google Chrome und Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2026-02-15T23:00:00.000+00:00 | 2026-02-17T23:00:00.000+00:00 |
| wid-sec-w-2026-0426 | Apache Traffic Server: Mehrere Schwachstellen ermöglichen Denial of Service | 2019-08-14T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0401 | Google Chrome: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0378 | IBM WebSphere Application Server: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-02-10T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0367 | Microsoft DeveloperTools (Visual Studio Code und .NET): Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0306 | Red Hat Enterprise Linux (pyasn1): Schwachstelle ermöglicht Denial of Service | 2026-02-04T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0304 | patch: Schwachstelle ermöglicht Denial of Service | 2021-12-22T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0302 | Red Hat Enterprise Linux (python-wheel): Schwachstelle ermöglicht Privilegieneskalation und Codeausführung | 2026-02-03T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0243 | Red Hat OpenShift Container Platform: Schwachstelle ermöglicht Denial of Service | 2026-01-27T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0231 | GnuPG und Gpg4win: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0207 | Red Hat Enterprise Linux (urllib3): Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-25T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0199 | Red Hat OpenShift Pipelines Operator (Fulcio): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0198 | Red Hat OpenShift und OpenShift AI (urllib3): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0145 | FreeRDP: Mehrere Schwachstellen ermöglichen DoS und Codeausführung | 2026-01-19T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0136 | AMD EPYC-Prozessoren: Schwachstelle ermöglicht Manipulation von Daten | 2026-01-15T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-022-04 | Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-03 | Rockwell Automation CompactLogix 5370 | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-02 | AutomationDirect CLICK Programmable Logic Controller | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-25-352-08 | Axis Communications Camera Station Pro, Camera Station, and Device Manager (Update B) | 2025-12-18T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-24-326-04 | Schneider Electric Modicon M340, MC80, and Momentum Unity M1E (Update B) | 2024-11-12T05:00:00.000000Z | 2026-01-20T15:49:53.166459Z |
| icsa-26-020-02 | Schneider Electric devices using CODESYS Runtime | 2023-07-11T07:15:18.000000Z | 2026-01-20T15:49:51.778731Z |
| icsa-26-020-03 | Rockwell Automation Verve Asset Manager | 2026-01-20T07:00:00.000000Z | 2026-01-20T07:00:00.000000Z |
| va-26-015-01 | NOAA PMEL Live Access Server (LAS) command injection | 2026-01-15T19:59:37Z | 2026-01-15T19:59:37Z |
| icsa-26-015-01 | AVEVA Process Optimization | 2026-01-15T07:00:00.000000Z | 2026-01-15T07:00:00.000000Z |
| icsa-24-135-04 | Mitsubishi Electric Multiple FA Engineering Software Products (Update E) | 2024-05-14T06:00:00.000000Z | 2026-01-15T07:00:00.000000Z |
| icsa-26-015-08 | Siemens Industrial Edge Devices | 2026-01-13T00:00:00.000000Z | 2026-01-14T23:03:52.355094Z |
| icsa-26-015-02 | Festo Firmware | 2022-11-29T11:49:00.000000Z | 2026-01-14T22:46:49.184310Z |
| icsa-26-015-07 | Siemens RUGGEDCOM APE1808 Devices | 2026-01-13T00:00:00.000000Z | 2026-01-14T22:35:44.478578Z |
| icsa-26-015-06 | Siemens SINEC Security Monitor | 2025-12-09T00:00:00.000000Z | 2026-01-14T22:35:44.907344Z |
| icsa-26-015-05 | Siemens RUGGEDCOM ROS | 2025-12-09T00:00:00.000000Z | 2026-01-14T22:35:44.058931Z |
| icsa-26-015-10 | Schneider Electric EcoStruxure Power Build Rapsody | 2026-01-13T08:00:00.000000Z | 2026-01-14T22:35:43.622072Z |
| icsa-26-015-03 | Siemens TeleControl Server Basic | 2026-01-13T00:00:00.000000Z | 2026-01-14T22:32:36.777247Z |
| icsa-25-226-09 | Siemens RUGGEDCOM APE1808 | 2025-08-12T00:00:00.000000Z | 2026-01-14T22:05:42.880807Z |
| icsa-25-072-09 | Siemens OPC UA | 2025-03-11T00:00:00.000000Z | 2026-01-14T22:05:42.018496Z |
| icsa-24-354-04 | Siemens User Management Component | 2024-12-16T00:00:00.000000Z | 2026-01-14T22:05:42.437898Z |
| icsa-25-289-10 | Siemens HyperLynx and Industrial Edge App Publisher | 2025-10-14T00:00:00.000000Z | 2026-01-14T22:05:41.165529Z |
| icsa-25-162-04 | Siemens SCALANCE and RUGGEDCOM | 2025-06-10T00:00:00.000000Z | 2026-01-14T22:05:41.593078Z |
| icsa-24-074-05 | Siemens RUGGEDCOM APE1808 | 2024-03-12T00:00:00.000000Z | 2026-01-14T22:00:12.208787Z |
| icsa-24-193-02 | Siemens RUGGEDCOM APE 1808 | 2024-07-09T00:00:00.000000Z | 2026-01-14T22:00:11.677616Z |
| icsa-24-074-11 | Siemens RUGGEDCOM APE1808 with Fortigate NGFW Devices | 2024-03-12T00:00:00.000000Z | 2026-01-14T22:00:10.660779Z |
| icsa-24-193-11 | Siemens RUGGEDCOM APE 1808 | 2024-07-09T00:00:00.000000Z | 2026-01-14T22:00:09.701376Z |
| icsa-26-015-09 | Siemens Industrial Edge Device Kit | 2026-01-13T00:00:00.000000Z | 2026-01-14T21:54:58.722065Z |
| icsa-26-013-03 | YoSmart YoLink Smart Hub | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-26-013-02 | Rockwell Automation FactoryTalk DataMosaix Private Cloud | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-26-013-01 | Rockwell Automation 432ES-IG3 Series A | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-fmc-authz-bypass-m7xhnau | Cisco Secure Firewall Management Center Software Authorization Bypass Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpnwebs-dos-hjbhmbsx | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access VPN Web Server Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpn-dos-mfpeka6e | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-nat-dns-dos-bqhynhtm | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Network Address Translation DNS Inspection Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-http-file-huyx2jl4 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Server Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-dhcp-qj7ngs4n | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software DHCP Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-cmdinj-vehfezq3 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Authenticated Command Injection Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-ftd-ios-dos-doeshwhy | Cisco IOS, IOS XE, Secure Firewall Adaptive Security Appliance, and Secure Firewall Threat Defense Software IKEv2 Denial of Service Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-ftd-acl-bypass-mtpze9yh | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Access Control Rules Bypass Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-buffer-overflow-pyruhwbc | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Web Services Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-webex-join-ynxfqhk4 | Cisco Webex Meeting Client Join Certificate Validation Vulnerability | 2025-08-06T16:00:00+00:00 | 2025-08-06T16:00:00+00:00 |
| cisco-sa-ise_xss_acc_cont-ysr4ut4u | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2025-08-06T16:00:00+00:00 | 2025-08-06T16:00:00+00:00 |
| cisco-sa-20170629-snmp | SNMP Remote Code Execution Vulnerabilities in Cisco IOS and IOS XE Software | 2017-06-29T16:00:00+00:00 | 2025-07-30T16:27:06+00:00 |
| cisco-sa-ise-unauth-rce-zad2gnj6 | Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities | 2025-06-25T16:00:00+00:00 | 2025-07-24T23:30:31+00:00 |
| cisco-sa-piepnm-bsi-25jjqsbb | Cisco Prime Infrastructure and Evolved Programmable Network Manager Blind SQL Injection Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-ise-multi-3vpsxoxo | Cisco Identity Services Engine Authenticated Remote Code Execution and Authorization Bypass Vulnerabilities | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-cuis-ssrf-jsudjev | Cisco Unified Intelligence Center Server-Side Request Forgery Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-cuis-file-upload-uhnetstm | Cisco Unified Intelligence Center Arbitrary File Upload Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-spaces-conn-privesc-kgd2ccdu | Cisco Spaces Connector Privilege Escalation Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-ece-xss-cbtkteyc | Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-cucm-ssh-m4ubdpe7 | Cisco Unified Communications Manager Static SSH Credentials Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-ise-stored-xss-yff54m73 | Cisco Identity Services Stored Cross-Site Scripting Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-06-30T15:08:59+00:00 |
| cisco-sa-ise-auth-bypass-mvfkvqau | Cisco Identity Services Engine Authorization Bypass Vulnerability | 2025-06-25T16:00:00+00:00 | 2025-06-25T16:00:00+00:00 |
| cisco-sa-ise-file-upload-p4m8vwxy | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-23T19:16:21+00:00 |
| cisco-sa-meraki-mx-vpn-dos-sm5gcfm7 | Cisco Meraki MX and Z Series AnyConnect VPN with Client Certificate Authentication Denial of Service Vulnerability | 2025-06-18T16:00:00+00:00 | 2025-06-18T16:00:00+00:00 |
| cisco-sa-clamav-udf-hmwd9ndy | ClamAV UDF File Parsing Out-of-Bounds Read Information Disclosure Vulnerability | 2025-06-18T16:00:00+00:00 | 2025-06-18T16:00:00+00:00 |
| cisco-sa-erlang-otp-ssh-xyzzy | Multiple Cisco Products Unauthenticated Remote Code Execution in Erlang/OTP SSH Server: April 2025 | 2025-04-22T21:45:00+00:00 | 2025-06-11T14:40:37+00:00 |
| cisco-sa-wlc-file-uplpd-rhzg9ufc | Cisco IOS XE Wireless Controller Software Arbitrary File Upload Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-06-06T20:02:48+00:00 |
| cisco-sa-ise-aws-static-cred-fpmjucm7 | Cisco Identity Services Engine on Cloud Platforms Static Credential Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-05T17:26:25+00:00 |
| cisco-sa-vos-command-inject-65s2ucyy | Cisco Unified Communications Products Command Injection Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-24292 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24291 | Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24290 | Windows Projected File System Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24289 | Windows Kernel Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24288 | Windows Mobile Broadband Driver Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24287 | Windows Kernel Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24285 | Win32k Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24283 | Multiple UNC Provider Kernel Driver Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-24282 | Push message Routing Service Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23674 | MapUrlToZone Security Feature Bypass Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23673 | Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23672 | Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23671 | Windows Bluetooth RFCOM Protocol Driver Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23669 | Windows Print Spooler Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23668 | Windows Graphics Component Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23667 | Broadcast DVR Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23665 | Linux Azure Diagnostic extension (LAD) Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23664 | Azure IoT Explorer Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23662 | Azure IoT Explorer Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23661 | Azure IoT Explorer Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23660 | Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-23654 | GitHub: Zero Shot SCFoundation Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-21262 | SQL Server Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-20967 | System Center Operations Manager (SCOM) Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2025-14524 | bearer token leak on cross-protocol redirect | 2026-01-02T00:00:00.000Z | 2026-03-10T01:38:55.000Z |
| msrc_cve-2025-10966 | missing SFTP host verification with wolfSSH | 2025-11-02T00:00:00.000Z | 2026-03-10T01:37:28.000Z |
| msrc_cve-2026-28422 | Vim has stack-buffer-overflow in build_stl_str_hl() | 2026-02-02T00:00:00.000Z | 2026-03-10T01:37:19.000Z |
| msrc_cve-2026-28421 | Vim has a heap-buffer-overflow and a segmentation fault | 2026-02-02T00:00:00.000Z | 2026-03-10T01:37:08.000Z |
| msrc_cve-2026-28420 | Vim has Heap-based Buffer Overflow and OOB Read in :terminal | 2026-02-02T00:00:00.000Z | 2026-03-10T01:36:59.000Z |
| msrc_cve-2026-28419 | Vim has Heap-based Buffer Underflow in Emacs tags parsing | 2026-02-02T00:00:00.000Z | 2026-03-10T01:36:50.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0383 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-12-09T18:39:18.152251Z | 2025-12-09T18:39:18.152251Z |
| ncsc-2025-0382 | Kwetsbaarheden verholpen in Siemens producten | 2025-12-09T13:15:05.391966Z | 2025-12-09T13:15:05.391966Z |
| ncsc-2025-0381 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2025-12-08T08:23:21.965599Z | 2025-12-08T08:23:21.965599Z |
| ncsc-2025-0380 | Kwetsbaarheden verholpen in React Server Components | 2025-12-03T20:11:57.728117Z | 2025-12-05T12:13:36.590522Z |
| ncsc-2025-0379 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-12-02T13:25:17.745981Z | 2025-12-02T13:25:17.745981Z |
| ncsc-2025-0378 | Kwetsbaarheden verholpen in Mattermost | 2025-11-28T09:53:42.334621Z | 2025-11-28T09:53:42.334621Z |
| ncsc-2025-0377 | Kwetsbaarheden verholpen in GitLab | 2025-11-27T13:35:09.121804Z | 2025-11-27T13:35:09.121804Z |
| ncsc-2025-0376 | Kwetsbaarheden verholpen in SonicWall Email Security appliances | 2025-11-21T16:06:33.949861Z | 2025-11-21T16:06:33.949861Z |
| ncsc-2025-0375 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2025-11-21T16:06:14.387571Z | 2025-11-21T16:06:14.387571Z |
| ncsc-2025-0334 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2025-10-23T13:42:11.992643Z | 2025-11-21T16:03:18.991100Z |
| ncsc-2025-0374 | Kwetsbaarheden verholpen in Arista EOS | 2025-11-20T11:48:20.126141Z | 2025-11-20T11:48:20.126141Z |
| ncsc-2025-0373 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2025-11-19T08:35:31.999400Z | 2025-11-19T08:35:31.999400Z |
| ncsc-2025-0372 | Kwetsbaarheid verholpen in Fortinet FortiWeb | 2025-11-19T08:34:59.616354Z | 2025-11-19T08:34:59.616354Z |
| ncsc-2025-0371 | Kwetsbaarheden verholpen in Google Chrome | 2025-11-18T09:01:31.984222Z | 2025-11-18T09:01:31.984222Z |
| ncsc-2025-0370 | Kwetsbaarheden verholpen in Cisco Unified Contact Center Express | 2025-11-18T07:04:55.173157Z | 2025-11-18T07:04:55.173157Z |
| ncsc-2025-0369 | Kwetsbaarheden verholpen in IBM AIX | 2025-11-18T07:03:55.766335Z | 2025-11-18T07:03:55.766335Z |
| ncsc-2025-0368 | Kwetsbaarheden verholpen in Zoom Workplace en Zoom Clients | 2025-11-18T07:02:36.696426Z | 2025-11-18T07:02:36.696426Z |
| ncsc-2025-0367 | Kwetsbaarheden verholpen in GitLab | 2025-11-18T07:01:35.502522Z | 2025-11-18T07:01:35.502522Z |
| ncsc-2025-0366 | Kwetsbaarheid verholpen in Fortinet FortiWeb | 2025-11-15T14:57:33.774388Z | 2025-11-15T14:57:33.774388Z |
| ncsc-2025-0365 | Kwetsbaarheden verholpen in Cisco Catalyst Center | 2025-11-14T12:55:27.227262Z | 2025-11-14T12:55:27.227262Z |
| ncsc-2025-0364 | Kwetsbaarheid verholpen in Adobe Photoshop | 2025-11-12T12:17:16.207233Z | 2025-11-12T12:17:16.207233Z |
| ncsc-2025-0363 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-11-12T11:52:08.634593Z | 2025-11-12T11:56:09.924799Z |
| ncsc-2025-0362 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2025-11-11T18:35:40.376220Z | 2025-11-11T18:35:40.376220Z |
| ncsc-2025-0361 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2025-11-11T18:34:39.453615Z | 2025-11-11T18:34:39.453615Z |
| ncsc-2025-0360 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2025-11-11T18:33:13.936830Z | 2025-11-11T18:33:13.936830Z |
| ncsc-2025-0359 | Kwetsbaarheden verholpen in Microsoft Office | 2025-11-11T18:31:27.092072Z | 2025-11-11T18:31:27.092072Z |
| ncsc-2025-0358 | Kwetsbaartheden verholpen in Microsoft Windows | 2025-11-11T18:29:38.918562Z | 2025-11-11T18:29:38.918562Z |
| ncsc-2025-0357 | Kwetsbaarheden verholpen in Siemens producten | 2025-11-11T18:14:44.487803Z | 2025-11-11T18:14:44.487803Z |
| ncsc-2025-0356 | Kwetsbaarheden verholpen in SAP-producten | 2025-11-11T12:15:53.615720Z | 2025-11-11T12:15:53.615720Z |
| ncsc-2025-0355 | Kwetsbaarheden verholpen in Fortinet FortiOS en FortiProxy | 2025-11-07T10:07:28.475542Z | 2025-11-07T10:07:28.475542Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20235-1 | Security update for fontforge | 2026-02-14T21:30:01Z | 2026-02-14T21:30:01Z |
| opensuse-su-2026:10206-1 | python314-3.14.3-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10205-1 | python311-cryptography-46.0.5-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10204-1 | openjfx-17.0.18.0-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10203-1 | libssh-config-0.11.4-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10202-1 | himmelblau-2.3.5+git0.9dd526c-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10201-1 | chromedriver-145.0.7632.45-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:20233-1 | Security update for openCryptoki | 2026-02-13T17:42:04Z | 2026-02-13T17:42:04Z |
| opensuse-su-2026:20227-1 | Security update for patch | 2026-02-13T16:41:43Z | 2026-02-13T16:41:43Z |
| opensuse-su-2026:20219-1 | Security update for htmldoc | 2026-02-13T16:07:48Z | 2026-02-13T16:07:48Z |
| opensuse-su-2026:20220-1 | Security update for go1.24 | 2026-02-13T11:53:30Z | 2026-02-13T11:53:30Z |
| opensuse-su-2026:20214-1 | Security update for go1.25 | 2026-02-13T10:08:14Z | 2026-02-13T10:08:14Z |
| opensuse-su-2026:20206-1 | Security update for kepler | 2026-02-13T08:53:10Z | 2026-02-13T08:53:10Z |
| opensuse-su-2026:10200-1 | python310-3.10.19-4.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10199-1 | python311-pymssql-2.3.12-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10198-1 | python311-Pillow-12.1.1-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10197-1 | libecpg6-18.2-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10196-1 | matrix-synapse-1.147.1-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10195-1 | gimp-3.0.8-2.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10194-1 | cargo-audit-advisory-db-20260213-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:20205-1 | Security update for rust1.93 | 2026-02-12T15:13:26Z | 2026-02-12T15:13:26Z |
| opensuse-su-2026:20204-1 | Security update for python-aiohttp, python-Brotli | 2026-02-12T14:01:04Z | 2026-02-12T14:01:04Z |
| opensuse-su-2026:10193-1 | postgresql17-17.8-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10192-1 | postgresql16-16.12-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10191-1 | postgresql15-15.16-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10190-1 | postgresql14-14.21-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10189-1 | libowncloudsync-devel-6.0.3-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10188-1 | libpng16-16-1.6.55-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10187-1 | haproxy-3.3.3+git0.465d8e2fc-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10186-1 | gnome-remote-desktop-49.2-2.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:1047 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 for OpenShift image security and enhancement update | 2023-03-01T21:46:46+00:00 | 2026-03-17T14:39:55+00:00 |
| rhsa-2023:0321 | Red Hat Security Advisory: nodejs and nodejs-nodemon security, bug fix, and enhancement update | 2023-01-23T15:20:34+00:00 | 2026-03-17T14:39:55+00:00 |
| rhsa-2023:1045 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update on RHEL 9 | 2023-03-01T21:45:17+00:00 | 2026-03-17T14:39:54+00:00 |
| rhsa-2023:1044 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update on RHEL 8 | 2023-03-01T21:45:12+00:00 | 2026-03-17T14:39:54+00:00 |
| rhsa-2023:1043 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update on RHEL 7 | 2023-03-01T22:02:40+00:00 | 2026-03-17T14:39:52+00:00 |
| rhsa-2023:0612 | Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update | 2023-02-06T19:42:24+00:00 | 2026-03-17T14:39:51+00:00 |
| rhsa-2023:0050 | Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update | 2023-01-09T14:55:37+00:00 | 2026-03-17T14:39:49+00:00 |
| rhsa-2022:8652 | Red Hat Security Advisory: Red Hat Fuse 7.11.1 release and security update | 2022-11-28T14:39:27+00:00 | 2026-03-17T14:39:49+00:00 |
| rhsa-2022:9073 | Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update | 2022-12-15T16:20:58+00:00 | 2026-03-17T14:39:48+00:00 |
| rhsa-2022:7044 | Red Hat Security Advisory: rh-nodejs14-nodejs security update | 2022-10-19T10:12:45+00:00 | 2026-03-17T14:39:47+00:00 |
| rhsa-2022:6813 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.1 security update | 2022-10-05T10:44:49+00:00 | 2026-03-17T14:39:46+00:00 |
| rhsa-2022:5928 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update | 2022-08-08T19:43:57+00:00 | 2026-03-17T14:39:45+00:00 |
| rhsa-2022:5894 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update. | 2022-08-03T18:02:24+00:00 | 2026-03-17T14:39:45+00:00 |
| rhsa-2022:5893 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update | 2022-08-03T18:01:48+00:00 | 2026-03-17T14:39:43+00:00 |
| rhsa-2022:5892 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update | 2022-08-03T18:01:54+00:00 | 2026-03-17T14:39:43+00:00 |
| rhsa-2022:4914 | Red Hat Security Advisory: rh-nodejs12-nodejs security, bug fix, and enhancement update | 2022-06-06T09:29:16+00:00 | 2026-03-17T14:39:43+00:00 |
| rhsa-2022:1739 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.2.1 containers security update | 2022-05-05T18:02:37+00:00 | 2026-03-17T14:39:43+00:00 |
| rhsa-2023:0408 | Red Hat Security Advisory: OpenShift Virtualization 4.12.0 Images security update | 2023-01-25T11:11:29+00:00 | 2026-03-17T14:35:03+00:00 |
| rhsa-2023:1529 | Red Hat Security Advisory: Service Telemetry Framework 1.5 security update | 2023-03-30T00:42:39+00:00 | 2026-03-17T14:35:02+00:00 |
| rhsa-2022:6526 | Red Hat Security Advisory: OpenShift Virtualization 4.11.0 Images security and bug fix update | 2022-09-14T19:28:51+00:00 | 2026-03-17T14:34:59+00:00 |
| rhsa-2022:6156 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.0 security, enhancement, & bugfix update | 2022-08-24T13:45:52+00:00 | 2026-03-17T14:34:58+00:00 |
| rhsa-2022:6094 | Red Hat Security Advisory: OpenShift Container Platform 4.10.28 packages and security update | 2022-08-23T18:15:46+00:00 | 2026-03-17T14:34:58+00:00 |
| rhsa-2022:5875 | Red Hat Security Advisory: OpenShift Container Platform 4.10.26 security update | 2022-08-09T02:34:48+00:00 | 2026-03-17T14:34:57+00:00 |
| rhsa-2022:5729 | Red Hat Security Advisory: OpenShift Container Platform 4.10.25 security update | 2022-08-01T11:18:52+00:00 | 2026-03-17T14:34:55+00:00 |
| rhsa-2022:5006 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.3 Containers security update | 2022-06-13T12:43:57+00:00 | 2026-03-17T14:34:51+00:00 |
| rhsa-2026:4630 | Red Hat Security Advisory: Red Hat Data Grid 8.6.0 security update | 2026-03-16T17:11:00+00:00 | 2026-03-17T14:18:03+00:00 |
| rhsa-2026:4782 | Red Hat Security Advisory: Cluster Observability Operator 1.4.0 | 2026-03-17T14:16:04+00:00 | 2026-03-17T14:18:00+00:00 |
| rhsa-2026:4467 | Red Hat Security Advisory: RHACS 4.9.4 security and bug fix update | 2026-03-12T11:53:58+00:00 | 2026-03-17T14:17:57+00:00 |
| rhsa-2026:4466 | Red Hat Security Advisory: RHACS 4.8.9 security and bug fix update | 2026-03-12T11:53:42+00:00 | 2026-03-17T14:17:57+00:00 |
| rhsa-2026:3962 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update | 2026-03-06T13:33:22+00:00 | 2026-03-17T14:17:56+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2023-283-01 | SpaceLogic C-Bus Toolkit | 2023-10-10T12:00:34.000Z | 2023-10-10T12:00:34.000Z |
| sevd-2023-255-01 | IGSS (Interactive Graphical SCADA System) | 2023-09-12T10:52:23.000Z | 2023-09-12T10:52:23.000Z |
| sevd-2023-220-01 | Pro-face GP-Pro EX | 2023-08-08T06:32:38.000Z | 2023-08-08T06:32:38.000Z |
| sevd-2023-192-01 | StruxureWare Data Center Expert | 2023-07-11T07:37:38.000Z | 2023-07-11T07:37:38.000Z |
| sevd-2023-192-03 | Accutech Manager | 2023-07-11T06:49:15.000Z | 2023-07-11T06:49:15.000Z |
| sevd-2023-164-03 | Foxboro SCADA | 2023-06-13T12:34:32.000Z | 2023-06-13T12:34:32.000Z |
| sevd-2023-164-02 | IGSS (Interactive Graphical SCADA System) | 2023-06-13T11:43:59.000Z | 2023-06-13T11:43:59.000Z |
| sevd-2023-164-04 | EcoStruxureTM Foxboro DCS Control Core Services | 2023-06-13T09:20:49.000Z | 2023-06-13T09:20:49.000Z |
| sevd-2023-164-01 | EcoStruxure™ Operator Terminal Expert and Pro-face BLUE | 2023-06-13T09:08:30.000Z | 2023-06-13T09:08:30.000Z |
| sevd-2023-129-01 | OPC Factory Server | 2023-05-09T16:33:38.000Z | 2023-05-09T16:33:38.000Z |
| sevd-2023-129-03 | PowerLogic ION7400 / PM8000 / ION9000 Power Meters | 2023-05-09T16:02:26.000Z | 2023-05-09T16:02:26.000Z |
| sevd-2023-129-02 | EcoStruxure™ Power SCADA Operation | 2023-05-09T11:52:40.000Z | 2023-05-09T11:52:40.000Z |
| sevd-2023-129-04 | Power SCADA Anywhere | 2023-05-09T08:00:55.000Z | 2023-05-09T08:00:55.000Z |
| sevd-2021-217-01 | NicheStack TCP/IP Vulnerabilities (INFRA:HALT) in Lexium ILE, ILA, ILS, and Communication Option Boards for Altivar and Lexium32 drives | 2021-08-05T06:29:08.000Z | 2023-05-09T06:29:00.000Z |
| sevd-2023-101-06 | Easergy Builder | 2023-04-11T14:20:02.000Z | 2023-04-11T14:20:02.000Z |
| sevd-2023-101-02 | Conext™ Gateway/ InsightHome and InsightFacility | 2023-04-11T14:01:38.000Z | 2023-04-11T14:01:38.000Z |
| sevd-2022-087-01 | SCADAPack Workbench | 2022-03-28T13:51:11.000Z | 2023-04-11T13:51:11.000Z |
| sevd-2022-011-06 | CODESYS V3 Runtime, Development System, and Gateway Vulnerabilities | 2022-01-11T07:08:13.000Z | 2023-04-11T11:30:00.000Z |
| sevd-2020-315-07 | PLC Simulator on EcoStruxure™ Control Expert and Process Expert | 2020-11-10T15:07:11.000Z | 2023-03-14T15:07:11.000Z |
| sevd-2023-073-04 | IGSS (Interactive Graphical SCADA System) | 2023-03-14T10:58:24.000Z | 2023-03-14T10:58:24.000Z |
| sevd-2023-073-02 | PowerLogic™ HDPM6000 | 2023-03-14T09:26:56.000Z | 2023-03-14T09:26:56.000Z |
| sevd-2023-010-02 | EcoStruxure Geo SCADA Expert | 2023-01-10T16:24:00.000Z | 2023-03-13T18:30:00.000Z |
| sevd-2022-165-01 | IGSS (Interactive Graphical SCADA System) | 2022-06-14T18:30:00.000Z | 2023-03-13T18:30:00.000Z |
| sevd-2021-257-02 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Premium and Associated Communication Modules | 2021-09-14T20:04:00.000Z | 2023-02-14T20:04:43.000Z |
| sevd-2020-315-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-11-10T12:05:04.000Z | 2023-02-14T12:05:00.000Z |
| sevd-2023-045-02 | StruxureWare Data Center Expert | 2023-02-14T08:05:19.000Z | 2023-02-14T08:05:19.000Z |
| sevd-2023-045-03 | Merten KNX devices | 2023-02-14T07:24:05.000Z | 2023-02-14T07:24:05.000Z |
| sevd-2022-312-01 | NetBotz 4 - 355/450/455/550/570 | 2022-11-08T06:53:24.000Z | 2023-02-14T06:30:00.000Z |
| sevd-2023-045-01 | EcoStruxureTM Geo SCADA Expert | 2023-02-14T06:02:05.000Z | 2023-02-14T06:02:05.000Z |
| sevd-2022-347-01 | APC Easy UPS Online Monitoring Software | 2022-12-13T06:09:04.000Z | 2023-01-11T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-769791 | SSA-769791: Local Arbitrary Code Execution Vulnerability in COMOS Before V10.6 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-767615 | SSA-767615: Information Disclosure Vulnerability in SIPROTEC 5 Devices | 2025-02-11T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-764417 | SSA-764417: Weak Encryption Vulnerability in RUGGEDCOM ROS Devices | 2022-03-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-674084 | SSA-674084: File Parsing Vulnerabilities in Simcenter Femap Before V2506 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-665108 | SSA-665108: Arbitrary File Upload Vulnerability in RUGGEDCOM ROX II | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-529291 | SSA-529291: Information Disclosure Vulnerabilities in SICAM Q100/Q200 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-517338 | SSA-517338: Multiple Vulnerabilities in SINEC Traffic Analyzer Before V3.0 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-493787 | SSA-493787: Arbitrary Code Execution Vulnerability in SIMATIC RTLS Locating Manager Before V3.2 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-460466 | SSA-460466: Denial of Service Vulnerability in TIA Project-Server and TIA Portal | 2025-07-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-446307 | SSA-446307: Authentication Bypass Vulnerability in BMC (CVE-2024-54085) affects SIMATIC IPC RS-828A | 2025-05-13T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-400089 | SSA-400089: Denial of Service Vulnerability in SIPROTEC 4 and SIPROTEC 4 Compact | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-398330 | SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP >= V3.1.0 and < V3.1.5 | 2023-12-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-382999 | SSA-382999: Multiple Vulnerabilities in Opcenter Quality Before V2506 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-353002 | SSA-353002: Multiple Vulnerabilities in SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family | 2024-03-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-256353 | SSA-256353: Third-Party Component Vulnerabilities in RUGGEDCOM ROS | 2022-03-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-177847 | SSA-177847: Improper VNC Password Check Vulnerability in SINUMERIK Controllers | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-170375 | SSA-170375: Multiple Vulnerabilities in RUGGEDCOM ROS Before V5.9 | 2024-07-09T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-097435 | SSA-097435: Usernames Disclosure Vulnerability in Mendix Runtime | 2024-09-10T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-094954 | SSA-094954: Authentication Bypass Vulnerability in BIST mode of RUGGEDCOM ROX II | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-725549 | SSA-725549: Denial of Service of ICMP in Industrial Devices | 2025-04-08T00:00:00Z | 2025-07-21T00:00:00Z |
| ssa-183963 | SSA-183963: Certificate Validation Vulnerabilities in SICAM TOOLBOX II Before V07.11 | 2025-07-08T00:00:00Z | 2025-07-18T00:00:00Z |
| ssa-938066 | SSA-938066: Remote Code Execution Vulnerability in SENTRON Powermanager and Desigo CC | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-904646 | SSA-904646: Sensitive Data Exposure Vulnerability in SIPROTEC 5 Devices | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-763427 | SSA-763427: Authentication Bypass Vulnerability in SIMATIC CP and TIM Devices | 2015-11-27T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-634640 | SSA-634640: Weak Authentication Vulnerability in Siemens Industrial Edge Devices | 2025-04-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-627195 | SSA-627195: Zip Path Traversal Vulnerability in Mendix Studio Pro's Module Installation Process | 2025-06-12T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-626991 | SSA-626991: Denial of Service Vulnerability in SIMATIC CN 4100 before V4.0 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-593272 | SSA-593272: SegmentSmack in Interniche IP-Stack based Industrial Devices | 2020-04-14T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-573669 | SSA-573669: Multiple Vulnerabilities in TIA Administrator Before V3.0.6 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-446545 | SSA-446545: Impact of RegreSSHion (CVE-2024-6387) in Siemens Industrial Products | 2024-09-10T00:00:00Z | 2025-07-08T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0588-1 | Security update for postgresql16 | 2026-02-20T10:05:15Z | 2026-02-20T10:05:15Z |
| suse-su-2026:0587-1 | Security update for the Linux Kernel | 2026-02-20T10:04:28Z | 2026-02-20T10:04:28Z |
| suse-su-2026:0586-1 | Security update for postgresql17 | 2026-02-20T10:04:16Z | 2026-02-20T10:04:16Z |
| suse-su-2026:0585-1 | Security update for postgresql18 | 2026-02-20T10:03:34Z | 2026-02-20T10:03:34Z |
| suse-su-2026:0584-1 | Security update for postgresql18 | 2026-02-20T10:03:22Z | 2026-02-20T10:03:22Z |
| suse-su-2026:0583-1 | Security update for libpng16 | 2026-02-20T10:02:34Z | 2026-02-20T10:02:34Z |
| suse-su-2026:0582-1 | Security update for snpguest | 2026-02-20T10:02:23Z | 2026-02-20T10:02:23Z |
| suse-su-2026:0581-1 | Security update for openCryptoki | 2026-02-20T06:38:26Z | 2026-02-20T06:38:26Z |
| suse-su-2026:0577-1 | Security update for avahi | 2026-02-18T15:49:23Z | 2026-02-18T15:49:23Z |
| suse-su-2026:0573-1 | Security update for kubernetes-old | 2026-02-17T18:47:26Z | 2026-02-17T18:47:26Z |
| suse-su-2026:0572-1 | Security update for kubernetes | 2026-02-17T18:47:08Z | 2026-02-17T18:47:08Z |
| suse-su-2026:0571-1 | Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer | 2026-02-17T18:46:54Z | 2026-02-17T18:46:54Z |
| suse-su-2026:0570-1 | Security update for libxml2 | 2026-02-17T16:38:51Z | 2026-02-17T16:38:51Z |
| suse-su-2026:0561-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T12:33:41Z | 2026-02-16T12:33:41Z |
| suse-su-2026:0560-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T12:03:47Z | 2026-02-16T12:03:47Z |
| suse-su-2026:0559-1 | Security update for freerdp | 2026-02-16T11:43:04Z | 2026-02-16T11:43:04Z |
| suse-su-2026:0558-1 | Security update for libnvidia-container | 2026-02-16T11:42:25Z | 2026-02-16T11:42:25Z |
| suse-su-2026:0557-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T10:33:36Z | 2026-02-16T10:33:36Z |
| suse-su-2026:0556-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T10:03:47Z | 2026-02-16T10:03:47Z |
| suse-su-2026:0555-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T09:04:29Z | 2026-02-16T09:04:29Z |
| suse-su-2026:0554-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T08:33:36Z | 2026-02-16T08:33:36Z |
| suse-su-2026:0551-1 | Security update for the Linux Kernel (Live Patch 15 for SUSE Linux Enterprise 15 SP6) | 2026-02-16T06:33:35Z | 2026-02-16T06:33:35Z |
| suse-su-2026:0550-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6) | 2026-02-16T05:33:34Z | 2026-02-16T05:33:34Z |
| suse-su-2026:0548-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6) | 2026-02-16T03:33:34Z | 2026-02-16T03:33:34Z |
| suse-su-2026:0546-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6) | 2026-02-15T19:33:42Z | 2026-02-15T19:33:42Z |
| suse-su-2026:0544-1 | Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T18:03:51Z | 2026-02-15T18:03:51Z |
| suse-su-2026:0543-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6) | 2026-02-15T17:33:36Z | 2026-02-15T17:33:36Z |
| suse-su-2026:0542-1 | Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T16:03:51Z | 2026-02-15T16:03:51Z |
| suse-su-2026:0539-1 | Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T13:33:40Z | 2026-02-15T13:33:40Z |
| suse-su-2026:0535-1 | Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T11:04:06Z | 2026-02-15T11:04:06Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:2438 | Important: pcs security update | 2026-02-10T00:00:00Z | 2026-02-12T10:14:13Z |
| alsa-2026:2452 | Important: pcs security update | 2026-02-10T00:00:00Z | 2026-02-12T10:12:36Z |
| alsa-2026:2470 | Moderate: php:7.4 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:10:23Z |
| alsa-2026:2419 | Moderate: python3.12 security update | 2026-02-10T00:00:00Z | 2026-02-11T15:30:15Z |
| alsa-2026:2410 | Important: libsoup3 security update | 2026-02-10T00:00:00Z | 2026-02-11T15:26:55Z |
| alsa-2026:2224 | Critical: keylime security update | 2026-02-09T00:00:00Z | 2026-02-11T15:22:49Z |
| alsa-2026:2389 | Important: brotli security update | 2026-02-10T00:00:00Z | 2026-02-11T11:06:48Z |
| alsa-2026:2323 | Important: git-lfs security update | 2026-02-09T00:00:00Z | 2026-02-11T11:02:49Z |
| alsa-2026:2216 | Important: libsoup security update | 2026-02-09T00:00:00Z | 2026-02-10T10:37:43Z |
| alsa-2026:2222 | Important: freerdp security update | 2026-02-09T00:00:00Z | 2026-02-10T10:08:14Z |
| alsa-2026:2225 | Critical: keylime security update | 2026-02-09T00:00:00Z | 2026-02-10T10:06:14Z |
| alsa-2026:2230 | Important: fontforge security update | 2026-02-09T00:00:00Z | 2026-02-10T10:04:33Z |
| alsa-2026:2378 | Moderate: kernel-rt security update | 2026-02-10T00:00:00Z | 2026-02-10T09:34:16Z |
| alsa-2026:1852 | Moderate: util-linux security update | 2026-02-03T00:00:00Z | 2026-02-10T08:33:43Z |
| alsa-2026:1903 | Important: fence-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:31:08Z |
| alsa-2026:1904 | Important: resource-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:22:54Z |
| alsa-2026:1905 | Important: fence-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:20:49Z |
| alsa-2026:1906 | Important: fence-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:07:49Z |
| alsa-2026:1907 | Important: opentelemetry-collector security update | 2026-02-04T00:00:00Z | 2026-02-10T07:58:47Z |
| alsa-2026:1908 | Important: opentelemetry-collector security update | 2026-02-04T00:00:00Z | 2026-02-10T07:56:31Z |
| alsa-2026:1913 | Moderate: util-linux security update | 2026-02-04T00:00:00Z | 2026-02-10T07:54:49Z |
| alsa-2026:1939 | Important: python3.12-wheel security update | 2026-02-04T00:00:00Z | 2026-02-10T07:52:01Z |
| alsa-2026:2048 | Important: freerdp security update | 2026-02-05T00:00:00Z | 2026-02-10T07:49:11Z |
| alsa-2026:2220 | Important: thunderbird security update | 2026-02-09T00:00:00Z | 2026-02-10T07:45:12Z |
| alsa-2026:2286 | Important: thunderbird security update | 2026-02-09T00:00:00Z | 2026-02-09T12:36:11Z |
| alsa-2026:2264 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-09T11:47:42Z |
| alsa-2026:2271 | Important: firefox security update | 2026-02-09T00:00:00Z | 2026-02-09T11:39:07Z |
| alsa-2026:2215 | Important: libsoup security update | 2026-02-09T00:00:00Z | 2026-02-09T11:36:21Z |
| alsa-2026:2124 | Important: osbuild-composer security update | 2026-02-05T00:00:00Z | 2026-02-09T11:33:23Z |
| alsa-2026:2039 | Important: fontforge security update | 2026-02-05T00:00:00Z | 2026-02-06T21:29:46Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-219 | Heap-buffer-overflow in opj_j2k_read_tile_header | 2025-03-18T00:18:30.566980Z | 2026-02-11T14:21:43.026699Z |
| osv-2022-725 | Heap-buffer-overflow in jxl::N_EMU128::WriteToU8Stage::ProcessRow | 2022-08-18T00:01:05.918943Z | 2026-02-11T14:11:54.187880Z |
| osv-2022-608 | Heap-use-after-free in jxl::WriteToPixelCallbackStage::ProcessRow | 2022-07-21T00:01:50.967627Z | 2026-02-11T14:11:11.571040Z |
| osv-2026-216 | Heap-buffer-overflow in mg_mqtt_next_prop | 2026-02-10T00:08:51.349946Z | 2026-02-11T14:08:38.238200Z |
| osv-2026-229 | Segv on unknown address in aiAnimation::~aiAnimation | 2026-02-11T00:12:18.313233Z | 2026-02-11T00:12:18.313574Z |
| osv-2026-226 | UNKNOWN WRITE in decode_xa2_00 | 2026-02-11T00:10:08.757600Z | 2026-02-11T00:10:08.757920Z |
| osv-2026-212 | UNKNOWN READ in gpsd_poll | 2026-02-09T00:15:09.775765Z | 2026-02-09T00:15:09.776491Z |
| osv-2022-519 | Stack-buffer-overflow in LookupThousands | 2022-06-29T00:00:24.107785Z | 2026-02-08T14:10:55.777894Z |
| osv-2022-462 | Stack-buffer-overflow in strcat | 2022-06-07T00:01:47.521548Z | 2026-02-08T14:10:42.909724Z |
| osv-2021-802 | Stack-buffer-overflow in InterpretCondition | 2021-05-27T00:00:31.797718Z | 2026-02-08T14:08:02.526845Z |
| osv-2021-1110 | Stack-buffer-overflow in TranslateWord2 | 2021-08-08T00:02:17.026887Z | 2026-02-08T14:07:47.971880Z |
| osv-2026-209 | Use-of-uninitialized-value in ntrip_parse_url | 2026-02-08T00:06:08.137216Z | 2026-02-08T00:06:08.137699Z |
| osv-2025-547 | Security exception in com.alibaba.fastjson2.JSONReader.readArray | 2025-07-15T00:09:03.936493Z | 2026-02-07T14:17:37.720783Z |
| osv-2023-197 | Global-buffer-overflow in base_C_MessageEncryptInit | 2023-03-18T13:00:57.254906Z | 2026-02-07T14:09:46.773524Z |
| osv-2026-205 | UNKNOWN READ in gpsd_poll | 2026-02-07T00:03:03.099317Z | 2026-02-07T00:03:03.099778Z |
| osv-2026-204 | Segv on unknown address in icalarray_append | 2026-02-06T00:20:37.969087Z | 2026-02-06T00:20:37.969390Z |
| osv-2026-200 | Global-buffer-overflow in nameMatch | 2026-02-06T00:15:58.927791Z | 2026-02-06T00:15:58.928058Z |
| osv-2026-195 | Use-of-uninitialized-value in vcardstructured_free | 2026-02-05T00:15:22.587525Z | 2026-02-05T00:15:22.587818Z |
| osv-2026-189 | Global-buffer-overflow in gpsd_poll | 2026-02-04T00:05:14.950372Z | 2026-02-04T00:05:14.950857Z |
| osv-2026-182 | Use-of-uninitialized-value in json_internal_read_object | 2026-02-03T00:11:05.023029Z | 2026-02-03T00:11:05.023344Z |
| osv-2026-177 | Security exception in org.apache.poi.util.IOUtils.safelyAllocate | 2026-02-02T00:20:01.368972Z | 2026-02-02T00:20:01.369362Z |
| osv-2022-1003 | Index-out-of-bounds in LibRaw::ahd_interpolate_r_and_b_in_rgb_and_convert_to_cielab | 2022-09-30T00:02:10.026151Z | 2026-01-31T14:08:33.420267Z |
| osv-2026-167 | Use-of-uninitialized-value in aivdm_analyze | 2026-01-31T00:10:49.750917Z | 2026-01-31T00:10:49.751204Z |
| osv-2026-166 | Use-of-uninitialized-value in ntrip_parse_url | 2026-01-31T00:10:39.163525Z | 2026-01-31T00:10:39.163931Z |
| osv-2023-235 | Use-of-uninitialized-value in complexity_RC_reset_marking | 2023-03-26T13:00:16.681780Z | 2026-01-29T14:14:41.215909Z |
| osv-2023-234 | Use-of-uninitialized-value in ihevce_enc_frm_proc_slave_thrd | 2023-03-26T13:00:12.135289Z | 2026-01-29T14:14:40.129452Z |
| osv-2023-239 | Use-of-uninitialized-value in ihevce_strm_fill_done | 2023-03-26T13:02:03.445119Z | 2026-01-29T14:14:38.558891Z |
| osv-2026-97 | Heap-buffer-overflow in vpx_wb_write_literal | 2026-01-21T00:09:09.897624Z | 2026-01-28T14:23:52.198239Z |
| osv-2026-156 | Segv on unknown address in aivdm_analyze | 2026-01-28T00:06:24.327227Z | 2026-01-28T00:06:24.327712Z |
| osv-2026-150 | Null-dereference READ in wasm_runtime_invoke_native | 2026-01-27T00:02:06.850780Z | 2026-01-27T00:02:06.851098Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0033 | Public API without sufficient bounds checking | 2025-03-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0032 | Safe API can cause heap-buffer-overflow | 2025-03-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0031 | Unsound public API in unmaintained crate | 2025-04-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0027 | Panic in mp3-metadata due to the lack of bounds checking | 2025-04-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0024 | crossbeam-channel: double free on Drop | 2025-04-08T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0023 | Broadcast channel calls clone in parallel, but does not require `Sync` | 2025-04-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0022 | Use-After-Free in `Md::fetch` and `Cipher::fetch` | 2025-04-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0020 | Risk of buffer overflow in `PyString::from_object` | 2025-04-01T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0019 | `array-init-cursor` in version 0.2.0 and below is unsound when used with types that implement `Drop` | 2025-03-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0018 | Potential out-of-bounds read with a malformed ELF file and the HashTable API. | 2025-03-26T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0016 | Use after free in `Parc` and `Prc` due to missing lifetime constraints | 2025-03-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0015 | Denial of Service via malicious Web Push endpoint | 2025-02-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0009 | Some AES functions may panic when overflow checking is enabled. | 2025-03-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0008 | Openh264 Decoding Functions Heap Overflow Vulnerability | 2025-02-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0006 | Hickory DNS failure to verify self-signed RRSIG for DNSKEYs | 2025-02-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0005 | Out of bounds write triggered by crafted coverage data | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0004 | ssl::select_next_proto use after free | 2025-02-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0003 | Segmentation fault due to lack of bound check | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0002 | Segmentation fault due to lack of bound check | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0443 | webp crate may expose memory contents when encoding an image | 2024-09-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0442 | Dump Undefined Memory by `JitDumpFile` | 2024-07-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0437 | Crash due to uncontrolled recursion in protobuf crate | 2024-12-12T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0435 | Unsound usages of `Vec::from_raw_parts` | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0431 | Unsound usages of `core::slice::from_raw_parts` | 2024-12-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0430 | Use of insecure cryptographic algorithms | 2024-12-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0429 | Unsoundness in `Iterator` and `DoubleEndedIterator` impls for `glib::VariantStrIter` | 2024-03-30T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0428 | Undefined behaviour in `kvm_ioctls::ioctls::vm::VmFd::create_device` | 2024-12-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0426 | Unsound usages of `u8` type casting | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0424 | Unsound usages of `core::slice::from_raw_parts_mut` | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0421 | `idna` accepts Punycode labels that do not produce any non-ASCII when decoded | 2024-12-09T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-elk-2026-26938 | Improper Neutralization of Special Elements Used in a Template Engine in Kibana Workflows Leading to Server-Side Request Forgery (SSRF) | 2026-03-03T08:40:14.378Z | 2026-03-03T09:19:06.344Z |
| bit-elk-2026-26937 | Uncontrolled Resource Consumption in Kibana Leading to Denial of Service | 2026-03-03T08:40:12.613Z | 2026-03-03T09:19:06.344Z |
| bit-elk-2026-26936 | Inefficient Regular Expression Complexity in Kibana Leading to Denial of Service | 2026-03-03T08:40:11.205Z | 2026-03-03T09:19:06.344Z |
| bit-elk-2026-26935 | Improper Input Validation in Kibana Leading to Denial of Service | 2026-03-03T08:40:09.731Z | 2026-03-03T09:19:06.344Z |
| bit-elk-2026-26934 | Improper Validation of Specified Quantity in Input in Kibana Leading to Denial of Service | 2026-03-03T08:40:08.176Z | 2026-03-03T09:19:06.344Z |
| bit-nats-2026-27571 | nats-server websockets are vulnerable to pre-auth memory DoS | 2026-03-02T11:44:25.393Z | 2026-03-02T12:11:51.083Z |
| bit-superset-2026-23969 | Apache Superset: Exposure of Sensitive Information via Incomplete ClickHouse Function Filtering | 2026-03-02T08:51:03.240Z | 2026-03-02T09:10:16.414Z |
| bit-moodle-2026-26047 | Moodle: moodle: uncontrolled resource consumption in tex formula editor leading to denial of service | 2026-03-02T08:50:27.185Z | 2026-03-02T09:10:16.414Z |
| bit-moodle-2026-26046 | Moodle: moodle: improper input sanitization in tex filter administration setting | 2026-03-02T08:50:25.461Z | 2026-03-02T09:10:16.414Z |
| bit-moodle-2026-26045 | Moodle: moodle: improper validation in file restore functionality leading to remote code execution | 2026-03-02T08:50:23.910Z | 2026-03-02T09:10:16.414Z |
| bit-mastodon-2026-27477 | Mastodon has SSRF via unvalidated FASP Provider base_url | 2026-03-02T08:42:58.043Z | 2026-03-02T09:10:16.414Z |
| bit-mastodon-2026-27468 | Mastodon may allow unconfirmed FASP to make subscriptions | 2026-03-02T08:42:56.320Z | 2026-03-02T09:10:16.414Z |
| bit-grafana-2026-21725 | Authorization Bypass via TOCTOU in Grafana Datasource Deletion by Name | 2026-03-02T08:41:16.926Z | 2026-03-02T09:10:16.414Z |
| bit-grafana-2026-21722 | Public Dashboards time range restriction on annotations can be bypassed | 2026-02-20T08:41:29.411Z | 2026-03-02T09:10:16.414Z |
| bit-grafana-2026-21721 | Dashboard Permissions Scope Bypass Enables Cross‑Dashboard Privilege Escalation | 2026-02-20T08:41:27.652Z | 2026-03-02T09:10:16.414Z |
| bit-grafana-2025-41117 | XSS in Grafana Explore stack trace | 2026-02-20T08:41:19.089Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2026-2845 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-02T09:08:47.577Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2026-1747 | Authentication Bypass Using an Alternate Path or Channel in GitLab | 2026-03-02T09:08:43.992Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2026-1725 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-02T09:08:42.293Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2026-1662 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-02T09:08:40.525Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2026-1388 | Inefficient Regular Expression Complexity in GitLab | 2026-03-02T09:08:35.227Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2026-0752 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-03-02T09:08:25.612Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2025-3525 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-02T09:06:54.236Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2025-14511 | Improper Validation of Specified Quantity in Input in GitLab | 2026-03-02T09:05:49.359Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2025-14103 | Missing Authorization in GitLab | 2026-03-02T09:05:45.582Z | 2026-03-02T09:10:16.414Z |
| bit-pytorch-2025-2149 | PyTorch Quantized Sigmoid Module nnq_Sigmoid initialization | 2026-02-26T15:23:05.500Z | 2026-02-26T15:46:51.306Z |
| bit-pytorch-2025-2148 | PyTorch Tuple torch.ops.profiler._call_end_callbacks_on_jit_fut memory corruption | 2026-02-26T15:23:02.496Z | 2026-02-26T15:46:51.306Z |
| bit-neo4j-2026-1337 | Insufficient escaping of unicode characters in query log | 2026-02-26T15:16:17.899Z | 2026-02-26T15:46:51.306Z |
| bit-valkey-2026-27623 | Valkey has Pre-Authentication DOS from malformed RESP request | 2026-02-26T08:53:22.415Z | 2026-02-26T09:13:58.886Z |
| bit-valkey-2026-21863 | Malformed Valkey Cluster bus message can lead to Remote DoS | 2026-02-26T08:53:20.799Z | 2026-02-26T09:13:58.886Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-zr62045 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-01-30T16:56:56.696859Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zp68963 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:47:54.288582Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zo91195 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:30:24.594235Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zm84646 | Within HostnameError | 2026-01-30T16:20:55.488130Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zm51114 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:08:25.157380Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zl24388 | Prometheus Blackbox Exporter through 0 | 2026-01-30T14:05:50.598465Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zd89666 | Within HostnameError | 2026-01-30T17:26:56.612763Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zc18474 | PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access | 2026-01-30T17:04:56.559720Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yu60015 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:08:53.316314Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yt18139 | issue was discovered in libexpat before 2 | 2026-01-30T17:26:57.202658Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ys66739 | Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3 | 2026-01-30T15:00:53.250874Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ym75307 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:34:22.430652Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ym28538 | Prometheus Blackbox Exporter through 0 | 2026-01-30T14:06:20.601766Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yl27116 | tar | 2026-01-30T14:08:51.064236Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yk82785 | Within HostnameError | 2026-01-30T14:01:20.108833Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yk54840 | Within HostnameError | 2026-01-30T16:30:55.324232Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yj61997 | Cancelling a query (e | 2026-01-30T14:59:52.788649Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yg94604 | Within HostnameError | 2026-01-30T17:24:56.864393Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yd87381 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:22:55.178631Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yd51202 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:09:23.124967Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yc48827 | Within HostnameError | 2026-01-30T15:56:24.532632Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yb44027 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T17:04:26.396860Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xz45798 | Within HostnameError | 2026-01-30T14:05:20.961893Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xx70537 | Cancelling a query (e | 2026-01-30T15:32:24.053481Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xs24366 | Cancelling a query (e | 2026-01-30T15:00:52.862887Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xr85161 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:02:54.934169Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xr17407 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:11:25.270681Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xp58111 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:18:55.480183Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xp03839 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:14:55.099611Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xo66167 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:49:52.662006Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2022-ALE-001 | [MaJ] Vulnérabilité dans Microsoft Windows | 2022-01-12T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-022 | [MaJ] Vulnérabilité dans Apache Log4j | 2021-12-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-021 | Vulnérabilité dans Microsoft Exchange | 2021-11-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-019 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-09-08T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-017 | Multiples vulnérabilités dans Microsoft Exchange | 2021-08-27T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| CERTFR-2021-ALE-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| certfr-2021-ale-004 | [MàJ] Multiples vulnérabilités dans Microsoft Exchange Server | 2021-03-03T00:00:00.000000 | 2021-07-16T00:00:00.000000 |
| CERTFR-2021-ALE-004 | [MàJ] Multiples vulnérabilités dans Microsoft Exchange Server | 2021-03-03T00:00:00.000000 | 2021-07-16T00:00:00.000000 |
| certfr-2021-ale-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| CERTFR-2021-ALE-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| certfr-2021-ale-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| CERTFR-2021-ALE-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| certfr-2021-ale-007 | [MàJ] Vulnérabilité dans Pulse Connect Secure | 2021-04-20T00:00:00.000000 | 2021-06-21T00:00:00.000000 |
| CERTFR-2021-ALE-007 | [MàJ] Vulnérabilité dans Pulse Connect Secure | 2021-04-20T00:00:00.000000 | 2021-06-21T00:00:00.000000 |
| certfr-2021-ale-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| CERTFR-2021-ALE-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0194 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0193 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0192 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0191 | Vulnérabilité dans Traefik | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0190 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0189 | Vulnérabilité dans F5 BIG-IP | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0188 | Multiples vulnérabilités dans les produits Splunk | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0186 | Multiples vulnérabilités dans Google Chrome | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0185 | Vulnérabilité dans Microsoft Windows | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0184 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0183 | Vulnérabilité dans HPE Aruba Networking ClearPass Policy Manager | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0182 | Multiples vulnérabilités dans Atlassian Confluence | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0181 | Vulnérabilité dans Apache Tomcat | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0180 | Vulnérabilité dans NetApp StorageGRID | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0178 | Multiples vulnérabilités dans Tenable Security Center | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0177 | Multiples vulnérabilités dans Moodle | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0175 | Multiples vulnérabilités dans les produits Mozilla | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0174 | Multiples vulnérabilités dans LibreNMS | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2024-avi-0858 | Multiples vulnérabilités dans Mitel Micollab | 2024-10-10T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0172 | Vulnérabilité dans Google Chrome | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| CERTFR-2026-AVI-0173 | Multiples vulnérabilités dans les produits Mattermost | 2026-02-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| CERTFR-2026-AVI-0172 | Vulnérabilité dans Google Chrome | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| CERTFR-2026-AVI-0052 | Multiples vulnérabilités dans Mattermost Server | 2026-01-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0171 | Multiples vulnérabilités dans les produits IBM | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0170 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0169 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0168 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0167 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0166 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0165 | Vulnérabilité dans Mattermost Server | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000082 | The installers of DENSO TEN drive recorder viewer may insecurely load Dynamic Link Libraries | 2025-10-06T15:38+09:00 | 2025-10-06T15:38+09:00 |
| jvndb-2025-015061 | Trend Micro Antivirus for Mac vulnerable to Local Privilege Escalation | 2025-10-06T13:52+09:00 | 2025-10-06T13:52+09:00 |
| jvndb-2025-000044 | Denial-of-service (DoS) vulnerabilities in multiple Apache products | 2025-06-26T14:41+09:00 | 2025-10-01T14:18+09:00 |
| jvndb-2025-014642 | Multiple vulnerabilities in Canon Printer Drivers for Production Printers, Office/Small Office Multifunction Printers and Laser Printers | 2025-09-30T11:50+09:00 | 2025-09-30T11:50+09:00 |
| jvndb-2025-000066 | Improper file access permission settings in multiple i-FILTER products | 2025-08-27T19:50+09:00 | 2025-09-29T13:45+09:00 |
| jvndb-2025-000077 | RICOH Streamline NX vulnerable to tampering with operation history | 2025-09-08T13:42+09:00 | 2025-09-24T16:53+09:00 |
| jvndb-2025-007519 | Multiple vulnerabilities in multiple BROTHER products | 2025-06-26T18:15+09:00 | 2025-09-22T10:16+09:00 |
| jvndb-2025-014105 | OMRON SOCIAL SOLUTIONS Uninterruptible Power Supply (UPS) management application registers a Windows service with an unquoted file path | 2025-09-19T16:21+09:00 | 2025-09-19T16:21+09:00 |
| jvndb-2025-014104 | Multiple vulnerabilities in I-O DATA wireless LAN routers | 2025-09-19T14:58+09:00 | 2025-09-19T14:58+09:00 |
| jvndb-2025-014081 | Multiple Brother and its OEM products with weak initial administrator passwords | 2025-09-19T10:52+09:00 | 2025-09-19T10:52+09:00 |
| jvndb-2025-000079 | UNIVERGE IX/IX-R/IX-V series routers provided by NEC Corporation vulnerable to cross-site scripting | 2025-09-18T17:43+09:00 | 2025-09-18T17:43+09:00 |
| jvndb-2025-000078 | Century HW RAID Manager registers a Windows service with an unquoted file path | 2025-09-17T13:45+09:00 | 2025-09-17T13:45+09:00 |
| jvndb-2025-000048 | WTW-EAGLE App vulnerable to improper server certificate validation | 2025-09-12T13:57+09:00 | 2025-09-12T13:57+09:00 |
| jvndb-2025-000070 | "Gunosy" App vulnerable to insertion of sensitive information into sent data | 2025-09-02T14:20+09:00 | 2025-09-09T09:51+09:00 |
| jvndb-2025-000072 | Obsidian GitHub Copilot Plugin stores sensitive information in cleartext | 2025-09-05T16:52+09:00 | 2025-09-05T16:52+09:00 |
| jvndb-2025-000073 | RATOC RAID Monitoring Manager for Windows registers a Windows service with an unquoted file path | 2025-09-05T16:20+09:00 | 2025-09-05T16:20+09:00 |
| jvndb-2025-000071 | "Yahoo! Shopping" App for Android fails to restrict custom URL schemes properly | 2025-09-05T15:12+09:00 | 2025-09-05T15:12+09:00 |
| jvndb-2025-000075 | Multiple vulnerabilities in TkEasyGUI | 2025-09-05T14:53+09:00 | 2025-09-05T14:53+09:00 |
| jvndb-2025-000069 | Web Caster V130 vulnerable to cross-site request forgery | 2025-09-03T14:23+09:00 | 2025-09-03T14:23+09:00 |
| jvndb-2025-000068 | Seiko Solutions SkyBridge BASIC MB-A130 vulnerable to OS command injection | 2025-09-01T16:21+09:00 | 2025-09-01T16:21+09:00 |
| jvndb-2025-012659 | Denial-of-service (DoS) vulnerability in Konica Minolta bizhub series | 2025-09-01T15:22+09:00 | 2025-09-01T15:22+09:00 |
| jvndb-2025-000067 | Multiple vulnerabilities in multiple iND products | 2025-08-29T14:47+09:00 | 2025-08-29T14:47+09:00 |
| jvndb-2025-000064 | Multiple vulnerabilities in SS1 | 2025-08-27T15:13+09:00 | 2025-08-27T15:13+09:00 |
| jvndb-2025-000065 | ScanSnap Manager installers vulnerable to privilege escalation | 2025-08-27T14:22+09:00 | 2025-08-27T14:22+09:00 |
| jvndb-2025-011884 | FUJIFILM Healthcare Americas Synapse Mobility vulnerable to Privilege Escalation | 2025-08-21T11:49+09:00 | 2025-08-25T10:38+09:00 |
| jvndb-2025-000063 | Western Digital Kitfox registers a Windows service with an unquoted file path | 2025-08-22T13:37+09:00 | 2025-08-22T13:37+09:00 |
| jvndb-2025-000062 | Multiple vulnerabilities in Group-Office | 2025-08-21T14:03+09:00 | 2025-08-21T14:03+09:00 |
| jvndb-2025-000061 | Multiple vulnerabilities in Movable Type | 2025-08-20T15:30+09:00 | 2025-08-20T15:30+09:00 |
| jvndb-2025-000059 | Seagate Toolkit registers a Windows service with an unquoted file path | 2025-08-14T12:32+09:00 | 2025-08-19T14:40+09:00 |
| jvndb-2025-010854 | Trend Micro Endpoint security products for enterprises vulnerable to multiple OS command injection | 2025-08-07T12:25+09:00 | 2025-08-19T11:36+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-13237 | WordPress插件integrate-google-drive信息泄露漏洞 | 2025-11-11 | 2026-03-10 |
| cnvd-2026-13234 | 多款Advantech产品存在未明漏洞 | 2025-07-04 | 2026-03-10 |
| cnvd-2026-13151 | Google Android存在未明漏洞(CNVD-2026-13151) | 2026-03-09 | 2026-03-10 |
| cnvd-2026-13150 | Google Android拒绝服务漏洞(CNVD-2026-13150) | 2026-03-09 | 2026-03-10 |
| cnvd-2026-13149 | Google Android权限提升漏洞(CNVD-2026-13149) | 2026-03-09 | 2026-03-10 |
| cnvd-2026-13148 | Google Android权限提升漏洞(CNVD-2026-13148) | 2026-03-09 | 2026-03-10 |
| cnvd-2026-13147 | Google Android拒绝服务漏洞(CNVD-2026-13147) | 2026-03-09 | 2026-03-10 |
| cnvd-2026-13146 | Google Android权限提升漏洞(CNVD-2026-13146) | 2026-03-09 | 2026-03-10 |
| cnvd-2026-13145 | Google Android权限提升漏洞(CNVD-2026-13145) | 2026-03-09 | 2026-03-10 |
| cnvd-2026-13144 | Google Android权限提升漏洞(CNVD-2026-13144) | 2026-03-09 | 2026-03-10 |
| cnvd-2026-13143 | Google Android存在未明漏洞(CNVD-2026-13143) | 2026-03-09 | 2026-03-10 |
| cnvd-2026-13142 | Google Android信息泄露漏洞(CNVD-2026-13142) | 2026-03-09 | 2026-03-10 |
| cnvd-2026-13797 | Google Chrome Skia整数溢出漏洞(CNVD-2026-13797) | 2026-03-09 | 2026-03-09 |
| cnvd-2026-13796 | Google Chrome DevTools堆破坏漏洞 | 2026-03-09 | 2026-03-09 |
| cnvd-2026-13795 | Google Chrome WebAudio内存越界访问漏洞 | 2026-03-09 | 2026-03-09 |
| cnvd-2026-13794 | Google Chrome CSS内存越界读漏洞 | 2026-03-09 | 2026-03-09 |
| cnvd-2026-13793 | Google Chrome WebAssembly内存越界访问漏洞 | 2026-03-09 | 2026-03-09 |
| cnvd-2026-13792 | Google Chrome V8内存越界访问漏洞(CNVD-2026-13792) | 2026-03-09 | 2026-03-09 |
| cnvd-2026-13791 | Google Chrome WebCodecs堆溢出漏洞 | 2026-03-09 | 2026-03-09 |
| cnvd-2026-13790 | Google Android权限提升漏洞(CNVD-2026-13790) | 2026-03-09 | 2026-03-09 |
| cnvd-2026-12911 | Microsoft Windows Admin Center授权问题漏洞 | 2026-03-04 | 2026-03-09 |
| cnvd-2026-12910 | Microsoft Teams访问控制错误漏洞 | 2026-03-04 | 2026-03-09 |
| cnvd-2026-12909 | Microsoft Semantic Kernel代码注入漏洞 | 2026-03-06 | 2026-03-09 |
| cnvd-2026-12908 | Microsoft Azure Arc访问控制错误漏洞 | 2026-03-06 | 2026-03-09 |
| cnvd-2026-12907 | Microsoft Azure Functions信息泄露漏洞 | 2026-03-06 | 2026-03-09 |
| cnvd-2026-12906 | Microsoft Azure Front Door访问控制错误漏洞 | 2026-03-06 | 2026-03-09 |
| cnvd-2026-12905 | Microsoft ACI Confidential Containers特权提升漏洞 | 2026-03-09 | 2026-03-09 |
| cnvd-2026-12904 | Microsoft ACI Confidential Containers信息泄露漏洞 | 2026-03-09 | 2026-03-09 |
| cnvd-2026-12903 | Microsoft Payment Orchestrator Service访问控制错误漏洞 | 2026-03-09 | 2026-03-09 |
| cnvd-2026-12902 | Microsoft Devices Pricing Program代码问题漏洞 | 2026-03-09 | 2026-03-09 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15748 | Уязвимость драйвера net/usb/asix_devices.c ядра операционной системы Linux, позволяющая н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15746 | Уязвимость компонента net/netlink/af_netlink.c ядра операционной системы Linux, позволяющ… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15745 | Уязвимость компонента fs/smb/client/smb2ops.c ядра операционной системы Linux, позволяюща… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15744 | Уязвимость компонента sound/usb/validate.c ядра операционной системы Linux, позволяющая н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15743 | Уязвимость компонента netfilter ядра операционной системы Linux, позволяющая нарушителю п… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15741 | Уязвимость драйвера ppp ядра операционной системы Linux, позволяющая нарушителю вызвать о… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15740 | Уязвимость компонента drm/amd/display ядра операционной системы Linux, позволяющая наруши… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15739 | Уязвимость функции qla4xxx_get_ep_fwdb() драйвера qla4xxx ядра операционной системы Linux… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15733 | Уязвимость компонента trace ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15732 | Уязвимость компонента comedi/drivers/pcl726.c ядра операционной системы Linux, позволяюща… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15731 | Уязвимость драйвера comedi ядра операционной системы Linux, позволяющая нарушителю вызват… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15730 | Уязвимость модуля smb ядра операционной системы Linux, позволяющая нарушителю вызвать отк… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15729 | Уязвимость компонента amdgpu_dm.c ядра операционной системы Linux, позволяющая нарушителю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15728 | Уязвимость компонента s390/char/sclp.c ядра операционной системы Linux, позволяющая наруш… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15724 | Уязвимость компонента NFS ядра операционной системы Linux, позволяющая нарушителю вызвать… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15717 | Уязвимость драйвера acpi/pfr_update.c ядра операционной системы Linux, позволяющая наруши… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15716 | Уязвимость компонента net/ipv6/seg6_hmac.c ядра операционной системы Linux, позволяющая н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15715 | Уязвимость компонента net/hsr/hsr_slave.c ядра операционной системы Linux, позволяющая на… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15714 | Уязвимость компонента drm/amdkfd ядра операционной системы Linux, позволяющая нарушителю … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15713 | Уязвимость компонента qcom/venus/hfi_venus.c ядра операционной системы Linux, позволяющая… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15712 | Уязвимость драйвера rainshadow-cec ядра операционной системы Linux, позволяющая нарушител… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15711 | Уязвимость компонента iio/imu/bno055/bno055.c ядра операционной системы Linux, позволяюща… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15708 | Уязвимость компонента drivers/tty/serial/8250 ядра операционной системы Linux, позволяюща… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15706 | Уязвимость функции nfs_fh_to_dentry() компонента fs/nfs/export.c ядра операционной систем… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15705 | Уязвимость компонента fs/f2fs ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15704 | Уязвимость функции __kmemleak_do_cleanup() компонента mm/kmemleak.c ядра операционной сис… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15703 | Уязвимость компонента fs/btrfs ядра операционной системы Linux, позволяющая нарушителю на… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15702 | Уязвимость компонента fs/jfs ядра операционной системы Linux, позволяющая нарушителю полу… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15701 | Уязвимость функции rcu_preempt_deferred_qs_handler() компонента kernel/rcu/tree_plugin.h … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15696 | Уязвимость компонента net/sched ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202010-1511 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T22:14:35.686000Z |
| var-201912-1854 | An issue existed in the drawing of web page elements. The issue was addressed with improv… | 2024-07-23T22:14:33.774000Z |
| var-200511-0019 | The Internet Key Exchange version 1 (IKEv1) implementation in Check Point products allows… | 2024-07-23T22:14:03.297000Z |
| var-201008-0270 | The WDB target agent debug service in Wind River VxWorks 6.x, 5.x, and earlier, as used o… | 2024-07-23T22:14:01.941000Z |
| var-200904-0819 | Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.… | 2024-07-23T22:12:51.678000Z |
| var-201711-0446 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T22:12:50.009000Z |
| var-201912-0506 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:12:49.908000Z |
| var-200609-0311 | Heap-based buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote at… | 2024-07-23T22:12:46.615000Z |
| var-201905-1248 | Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some m… | 2024-07-23T22:12:08.666000Z |
| var-202007-1133 | Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an … | 2024-07-23T22:12:07.961000Z |
| var-201009-0230 | bgpd in Quagga before 0.99.17 does not properly parse AS paths, which allows remote attac… | 2024-07-23T22:12:06.629000Z |
| var-201806-1488 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T22:12:00.711000Z |
| var-201405-0244 | The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEA… | 2024-07-23T22:12:00.239000Z |
| var-200611-0368 | The (1) Password Manager in Mozilla Firefox 2.0, and 1.5.0.8 and earlier; and the (2) Pas… | 2024-07-23T22:11:59.300000Z |
| var-201806-1436 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T22:11:27.007000Z |
| var-201702-0879 | An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari … | 2024-07-23T22:10:32.463000Z |
| var-200703-0010 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted at… | 2024-07-23T22:10:30.778000Z |
| var-201902-0855 | png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_im… | 2024-07-23T22:10:27.196000Z |
| var-202010-1294 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T22:10:25.978000Z |
| var-201506-0038 | Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to exe… | 2024-07-23T22:10:25.193000Z |
| var-200805-0585 | OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the… | 2024-07-23T22:10:24.233000Z |
| var-202012-1547 | A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel thr… | 2024-07-23T22:10:23.557000Z |
| var-201302-0236 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:10:22.448000Z |
| var-202004-2191 | In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untru… | 2024-07-23T22:10:21.285000Z |
| var-201904-0742 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:10:15.079000Z |
| var-200608-0030 | Unspecified vulnerability in the "compression state handling" in Bom for Apple Mac OS X 1… | 2024-07-23T22:10:15.377000Z |
| var-201912-0608 | A memory corruption issue was addressed with improved input validation. This issue is fix… | 2024-07-23T22:09:37.183000Z |
| var-200505-0162 | Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based … | 2024-07-23T22:09:05.800000Z |
| var-202003-1771 | A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-pro… | 2024-07-23T22:09:01.387000Z |
| var-201506-0465 | The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.… | 2024-07-23T22:08:28.995000Z |