Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-4424 |
7.5 (3.1)
|
Libarchive: libarchive: information disclosure via hea… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-19T13:50:27.294Z | 2026-05-09T00:08:34.287Z |
| CVE-2026-42353 |
8.2 (3.1)
|
Path traversal / SSRF in i18next-http-middleware via u… |
i18next |
i18next-http-middleware |
2026-05-08T15:29:55.900Z | 2026-05-08T23:30:15.045Z |
| CVE-2026-41683 |
8.6 (3.1)
|
HTTP response splitting and DoS in i18next-http-middle… |
i18next |
i18next-http-middleware |
2026-05-08T15:27:05.036Z | 2026-05-08T23:29:00.230Z |
| CVE-2026-41588 |
9 (3.1)
|
RELATE: Timing Attack Vulnerability in course/auth.py … |
inducer |
relate |
2026-05-08T14:51:04.993Z | 2026-05-08T23:27:23.515Z |
| CVE-2026-41574 |
9.3 (4.0)
|
Nhost Vulnerable to Account Takeover via OAuth Email V… |
nhost |
nhost |
2026-05-08T14:40:12.409Z | 2026-05-08T23:25:43.790Z |
| CVE-2026-44340 |
8.7 (4.0)
|
PraisonAI: Symlink-extraction bypass of `_safe_extract… |
MervinPraison |
PraisonAI |
2026-05-08T13:38:47.812Z | 2026-05-08T23:22:36.847Z |
| CVE-2026-44334 |
8.4 (3.1)
|
PraisonAI: Unauthenticated RCE via `tool_override.py` |
MervinPraison |
PraisonAI |
2026-05-08T13:25:32.988Z | 2026-05-08T23:20:28.539Z |
| CVE-2026-41496 |
8.1 (3.1)
|
PraisonAI: SQL Injection via unvalidated `table_prefix… |
MervinPraison |
PraisonAI |
2026-05-08T13:19:10.753Z | 2026-05-08T23:18:11.328Z |
| CVE-2026-42278 |
8.8 (4.0)
|
UltraDAG: Smart Account Spending Policy Bypass via Pockets |
UltraDAGcom |
core |
2026-05-08T03:55:01.093Z | 2026-05-08T23:16:05.807Z |
| CVE-2026-42272 |
7.8 (4.0)
|
Heimdall: Case-sensitive handling of URL-encoded slash… |
dadrus |
heimdall |
2026-05-08T03:40:17.541Z | 2026-05-08T23:12:35.366Z |
| CVE-2026-42455 |
8.8 (4.0)
|
LinkWarden: Stored XSS via Client-Side Archive Upload … |
linkwarden |
linkwarden |
2026-05-08T23:10:11.218Z | 2026-05-08T23:10:11.218Z |
| CVE-2026-43942 |
5.5 (3.1)
|
electerm: Full process.env exposed to renderer via win… |
electerm |
electerm |
2026-05-08T03:03:54.752Z | 2026-05-08T23:09:52.223Z |
| CVE-2026-8131 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
SourceCodester SUP Online Shopping replymsg.php sql in… |
SourceCodester |
SUP Online Shopping |
2026-05-08T03:00:18.891Z | 2026-05-08T23:08:50.680Z |
| CVE-2026-44313 |
9.1 (3.1)
|
LinkWarden: Server-Side Request Forgery (SSRF) in Link… |
linkwarden |
linkwarden |
2026-05-08T23:08:42.424Z | 2026-05-08T23:08:42.424Z |
| CVE-2026-41500 |
9.8 (3.1)
|
electerm has Command Injection Vulnerability via runMa… |
electerm |
electerm |
2026-05-08T02:53:44.494Z | 2026-05-08T23:06:39.245Z |
| CVE-2026-8125 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Simple Chat System sendMessage.php sql i… |
code-projects |
Simple Chat System |
2026-05-08T01:30:10.489Z | 2026-05-08T23:04:28.126Z |
| CVE-2026-8119 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
Open5GS NSSF nghttp2-server.c ogs_sbi_stream_find_by_i… |
n/a |
Open5GS |
2026-05-08T00:00:21.852Z | 2026-05-08T23:02:53.147Z |
| CVE-2026-8112 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
8421bit MiniClaw kernel.ts executeCognitivePulse os co… |
8421bit |
MiniClaw |
2026-05-07T21:00:13.825Z | 2026-05-08T23:01:39.515Z |
| CVE-2026-42456 |
4.3 (3.1)
|
AnythingLLM: Cross-User TTS Audio Disclosure via Chat … |
Mintplex-Labs |
anything-llm |
2026-05-08T23:01:30.213Z | 2026-05-08T23:01:30.213Z |
| CVE-2026-42354 |
9.1 (3.1)
|
Sentry: Improper authentication on SAML SSO process al… |
getsentry |
sentry |
2026-05-08T22:58:33.659Z | 2026-05-08T22:58:33.659Z |
| CVE-2026-42259 |
5.1 (4.0)
|
Saltcorn: Open Redirect in `POST /auth/login` due to i… |
saltcorn |
saltcorn |
2026-05-07T18:54:57.234Z | 2026-05-08T22:56:33.661Z |
| CVE-2026-42454 |
9.9 (3.1)
|
Termix: OS Command Injection in Docker Container Manag… |
Termix-SSH |
Termix |
2026-05-08T22:56:17.619Z | 2026-05-08T22:56:17.619Z |
| CVE-2026-42453 |
8.7 (4.0)
|
Termix: Command injection in extractArchive/compressFi… |
Termix-SSH |
Termix |
2026-05-08T22:55:30.242Z | 2026-05-08T22:55:30.242Z |
| CVE-2026-42452 |
8.1 (3.1)
|
Termix: Pending-TOTP temporary token can regenerate ba… |
Termix-SSH |
Termix |
2026-05-08T22:54:12.121Z | 2026-05-08T22:54:12.121Z |
| CVE-2026-8084 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
OSGeo gdal HDF-EOS Grid File SWapi.c memmove out-of-bounds |
OSGeo |
gdal |
2026-05-07T18:30:13.275Z | 2026-05-08T22:53:55.692Z |
| CVE-2026-42451 |
6.3 (3.1)
|
Grimmory: Stored XSS via Malicious EPUB Enables Sessio… |
grimmory-tools |
grimmory |
2026-05-08T22:51:21.920Z | 2026-05-08T22:51:21.920Z |
| CVE-2026-41903 |
5.4 (3.1)
|
FreeScout IDOR Vulnerability: PERM_EDIT_USERS allows m… |
freescout-help-desk |
freescout |
2026-05-07T18:02:01.058Z | 2026-05-08T22:49:23.844Z |
| CVE-2026-41682 |
6.9 (4.0)
|
pupnp: Port truncation via atoi() cast in parse_uri() … |
pupnp |
pupnp |
2026-05-08T22:47:37.494Z | 2026-05-08T22:47:37.494Z |
| CVE-2026-7413 |
7.2 (3.1)
|
Persistent undocumented backdoor access in Yarbo robot |
Yarbo |
Firmware |
2026-05-07T16:09:26.134Z | 2026-05-08T22:46:29.192Z |
| CVE-2026-45130 |
6.6 (3.1)
|
Vim: Heap Buffer Overflow in spell file loading |
vim |
vim |
2026-05-08T22:42:35.097Z | 2026-05-08T22:42:35.097Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-39836 |
7.5 (3.1)
|
Panic in Dial and LookupPort when handling NUL byte on… |
Go standard library |
net |
2026-05-07T19:41:18.300Z | 2026-05-08T21:30:15.127Z |
| CVE-2026-39825 |
5.3 (3.1)
|
ReverseProxy forwards queries with more than urlmaxque… |
Go standard library |
net/http/httputil |
2026-05-07T19:41:18.453Z | 2026-05-08T21:30:08.872Z |
| CVE-2026-39819 |
5.3 (3.1)
|
Invoking "go bug" follows symlinks in predictable temp… |
Go toolchain |
cmd/go |
2026-05-07T19:41:18.849Z | 2026-05-08T21:29:53.674Z |
| CVE-2026-39817 |
5.9 (3.1)
|
Invoking "go tool pack" does not sanitize output paths… |
Go toolchain |
cmd/go |
2026-05-07T19:41:18.993Z | 2026-05-08T21:29:47.246Z |
| CVE-2025-69691 |
9.9 (3.1)
|
Netgate pfSense CE 2.8.0 allows code execution in… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T21:29:04.070Z |
| CVE-2025-69690 |
9.1 (3.1)
|
Netgate pfSense CE 2.7.2 allows code execution by… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T21:29:10.073Z |
| CVE-2025-63704 |
9.8 (3.1)
|
NPM package query-parser-string 1.0.0 is vulnerab… |
n/a |
n/a |
2026-05-07T00:00:00.000Z | 2026-05-08T21:30:45.836Z |
| CVE-2024-33724 |
5.4 (3.1)
|
SOPlanning 1.52.00 is vulnerable to Cross Site Sc… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T21:29:15.895Z |
| CVE-2026-43225 |
N/A
|
staging: rtl8723bs: fix memory leak on failure path |
Linux |
Linux |
2026-05-06T11:28:24.289Z | 2026-05-07T17:14:49.605Z |
| CVE-2026-43230 |
7.5 (3.1)
|
net/rds: Clear reconnect pending bit |
Linux |
Linux |
2026-05-06T11:28:27.620Z | 2026-05-08T12:41:25.826Z |
| CVE-2026-43226 |
7.5 (3.1)
|
net/rds: No shortcut out of RDS_CONN_ERROR |
Linux |
Linux |
2026-05-06T11:28:24.952Z | 2026-05-08T12:41:24.699Z |
| CVE-2026-8120 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open5GS NSSF nnssf-handler.c denial of service |
n/a |
Open5GS |
2026-05-08T00:15:09.713Z | 2026-05-08T20:19:08.468Z |
| CVE-2026-44400 |
8.7 (4.0)
8.1 (3.1)
|
MailEnable Enterprise Premium < 10.55 Authorization By… |
MailEnable |
MailEnable Enterprise Premium |
2026-05-08T20:22:43.554Z | 2026-05-08T20:22:43.554Z |
| CVE-2026-31431 |
7.8 (3.1)
|
crypto: algif_aead - Revert to operating out-of-place |
Linux |
Linux |
2026-04-22T08:15:10.123Z | 2026-05-08T20:21:41.291Z |
| CVE-2024-12251 |
7.8 (3.1)
|
Improper neutralization special element in hyperlinks |
Progress Software |
Telerik UI for WinUI |
2025-02-12T15:09:46.306Z | 2026-05-08T20:18:38.291Z |
| CVE-2026-43228 |
N/A
|
hfs: Replace BUG_ON with error handling for CNID count… |
Linux |
Linux |
2026-05-06T11:28:26.292Z | 2026-05-07T17:14:53.111Z |
| CVE-2026-43223 |
N/A
|
media: pvrusb2: fix URB leak in pvr2_send_request_ex |
Linux |
Linux |
2026-05-06T11:28:22.952Z | 2026-05-07T17:14:48.459Z |
| CVE-2026-43224 |
N/A
|
io_uring/zcrx: fix sgtable leak on mapping failures |
Linux |
Linux |
2026-05-06T11:28:23.620Z | 2026-05-06T11:28:23.620Z |
| CVE-2026-43222 |
7.8 (3.1)
|
media: verisilicon: AV1: Fix tile info buffer size |
Linux |
Linux |
2026-05-06T11:28:22.291Z | 2026-05-08T12:41:23.505Z |
| CVE-2026-43227 |
N/A
|
clocksource/drivers/sh_tmu: Always leave device runnin… |
Linux |
Linux |
2026-05-06T11:28:25.629Z | 2026-05-07T17:14:51.949Z |
| CVE-2026-43231 |
N/A
|
media: radio-keene: fix memory leak in error path |
Linux |
Linux |
2026-05-06T11:28:28.268Z | 2026-05-06T11:28:28.268Z |
| CVE-2026-43229 |
N/A
|
media: chips-media: wave5: Fix device cleanup order to… |
Linux |
Linux |
2026-05-06T11:28:26.951Z | 2026-05-06T11:28:26.951Z |
| CVE-2026-43267 |
N/A
|
wifi: rtw89: fix potential zero beacon interval in bea… |
Linux |
Linux |
2026-05-06T11:28:52.887Z | 2026-05-07T17:15:14.362Z |
| CVE-2026-43268 |
N/A
|
hfsplus: pretend special inodes as regular files |
Linux |
Linux |
2026-05-06T11:28:53.534Z | 2026-05-07T17:15:15.634Z |
| CVE-2026-43266 |
N/A
|
EFI/CPER: don't go past the ARM processor CPER record buffer |
Linux |
Linux |
2026-05-06T11:28:52.238Z | 2026-05-07T17:15:13.111Z |
| CVE-2026-43262 |
N/A
|
gfs2: fiemap page fault fix |
Linux |
Linux |
2026-05-06T11:28:49.480Z | 2026-05-07T17:15:11.973Z |
| CVE-2026-43261 |
N/A
|
arm64: Add support for TSV110 Spectre-BHB mitigation |
Linux |
Linux |
2026-05-06T11:28:48.823Z | 2026-05-07T17:15:10.837Z |
| CVE-2026-43265 |
N/A
|
KVM: x86: Ignore -EBUSY when checking nested events fr… |
Linux |
Linux |
2026-05-06T11:28:51.552Z | 2026-05-06T11:28:51.552Z |
| CVE-2026-43264 |
N/A
|
fbdev: of: display_timing: fix refcount leak in of_get… |
Linux |
Linux |
2026-05-06T11:28:50.867Z | 2026-05-06T11:28:50.867Z |
| CVE-2026-43263 |
7.8 (3.1)
|
media: chips-media: wave5: Fix Null reference while te… |
Linux |
Linux |
2026-05-06T11:28:50.188Z | 2026-05-08T12:41:40.920Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-39825 | ReverseProxy can forward queries containing parameters not visible to Rewrite functions. When used … | 2026-05-07T20:16:43.390 | 2026-05-08T22:16:29.547 |
| fkie_cve-2026-39819 | The "go bug" command writes to two files with predictable names in the system temporary directory (… | 2026-05-07T20:16:43.083 | 2026-05-08T22:16:29.360 |
| fkie_cve-2026-39817 | The "go tool pack" subcommand (usually used only by the compiler as an internal tool with known-goo… | 2026-05-07T20:16:42.983 | 2026-05-08T22:16:29.180 |
| fkie_cve-2025-69691 | Netgate pfSense CE 2.8.0 allows code execution in the XMLRPC API via pfsense.exec_php. NOTE: the Su… | 2026-05-08T07:16:28.880 | 2026-05-08T22:16:28.813 |
| fkie_cve-2025-69690 | Netgate pfSense CE 2.7.2 allows code execution by using the module installer with a backup file wit… | 2026-05-08T07:16:28.750 | 2026-05-08T22:16:28.617 |
| fkie_cve-2025-63704 | NPM package query-parser-string 1.0.0 is vulnerable to Prototype Pollution. The package does not pr… | 2026-05-07T16:16:17.697 | 2026-05-08T22:16:28.440 |
| fkie_cve-2024-33724 | SOPlanning 1.52.00 is vulnerable to Cross Site Scripting (XSS) via the groupe_id parameter to proce… | 2026-05-08T06:16:09.547 | 2026-05-08T22:16:28.227 |
| fkie_cve-2026-43225 | In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix memory… | 2026-05-06T12:16:42.270 | 2026-05-08T21:22:38.057 |
| fkie_cve-2026-43230 | In the Linux kernel, the following vulnerability has been resolved: net/rds: Clear reconnect pendi… | 2026-05-06T12:16:42.957 | 2026-05-08T21:19:05.897 |
| fkie_cve-2026-43226 | In the Linux kernel, the following vulnerability has been resolved: net/rds: No shortcut out of RD… | 2026-05-06T12:16:42.393 | 2026-05-08T21:17:34.370 |
| fkie_cve-2026-8120 | A flaw has been found in Open5GS up to 2.7.7. The affected element is the function nssf_nnrf_nssele… | 2026-05-08T01:16:09.643 | 2026-05-08T21:16:28.573 |
| fkie_cve-2026-44400 | MailEnable Enterprise Premium 10.55 and earlier contains an improper authorization vulnerability in… | 2026-05-08T21:16:28.260 | 2026-05-08T21:16:28.260 |
| fkie_cve-2026-31431 | In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to… | 2026-04-22T09:16:21.270 | 2026-05-08T21:16:27.937 |
| fkie_cve-2024-12251 | In Progress Telerik UI for WinUI versions prior to 2025 Q1 (3.0.0), a command injection attack is p… | 2025-02-12T15:15:12.370 | 2026-05-08T21:16:26.890 |
| fkie_cve-2026-43228 | In the Linux kernel, the following vulnerability has been resolved: hfs: Replace BUG_ON with error… | 2026-05-06T12:16:42.710 | 2026-05-08T21:16:13.633 |
| fkie_cve-2026-43223 | In the Linux kernel, the following vulnerability has been resolved: media: pvrusb2: fix URB leak i… | 2026-05-06T12:16:42.020 | 2026-05-08T21:14:54.480 |
| fkie_cve-2026-43224 | In the Linux kernel, the following vulnerability has been resolved: io_uring/zcrx: fix sgtable lea… | 2026-05-06T12:16:42.153 | 2026-05-08T21:13:21.063 |
| fkie_cve-2026-43222 | In the Linux kernel, the following vulnerability has been resolved: media: verisilicon: AV1: Fix t… | 2026-05-06T12:16:41.900 | 2026-05-08T21:12:57.527 |
| fkie_cve-2026-43227 | In the Linux kernel, the following vulnerability has been resolved: clocksource/drivers/sh_tmu: Al… | 2026-05-06T12:16:42.537 | 2026-05-08T21:11:53.367 |
| fkie_cve-2026-43231 | In the Linux kernel, the following vulnerability has been resolved: media: radio-keene: fix memory… | 2026-05-06T12:16:43.083 | 2026-05-08T21:09:10.137 |
| fkie_cve-2026-43229 | In the Linux kernel, the following vulnerability has been resolved: media: chips-media: wave5: Fix… | 2026-05-06T12:16:42.830 | 2026-05-08T21:08:53.743 |
| fkie_cve-2026-43267 | In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix potential zer… | 2026-05-06T12:16:47.810 | 2026-05-08T21:03:42.570 |
| fkie_cve-2026-43268 | In the Linux kernel, the following vulnerability has been resolved: hfsplus: pretend special inode… | 2026-05-06T12:16:47.930 | 2026-05-08T21:02:20.383 |
| fkie_cve-2026-43266 | In the Linux kernel, the following vulnerability has been resolved: EFI/CPER: don't go past the AR… | 2026-05-06T12:16:47.647 | 2026-05-08T20:46:52.477 |
| fkie_cve-2026-43262 | In the Linux kernel, the following vulnerability has been resolved: gfs2: fiemap page fault fix I… | 2026-05-06T12:16:47.133 | 2026-05-08T20:41:51.240 |
| fkie_cve-2026-43261 | In the Linux kernel, the following vulnerability has been resolved: arm64: Add support for TSV110 … | 2026-05-06T12:16:47.003 | 2026-05-08T20:37:34.800 |
| fkie_cve-2026-43265 | In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Ignore -EBUSY when c… | 2026-05-06T12:16:47.510 | 2026-05-08T20:33:43.293 |
| fkie_cve-2026-43264 | In the Linux kernel, the following vulnerability has been resolved: fbdev: of: display_timing: fix… | 2026-05-06T12:16:47.373 | 2026-05-08T20:33:27.567 |
| fkie_cve-2026-43263 | In the Linux kernel, the following vulnerability has been resolved: media: chips-media: wave5: Fix… | 2026-05-06T12:16:47.257 | 2026-05-08T20:33:12.230 |
| fkie_cve-2026-43260 | In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix RSS context delet… | 2026-05-06T12:16:46.883 | 2026-05-08T20:31:55.037 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-fwj8-62r8-8p8m |
6.5 (3.1)
|
Incus has Nil-Pointer Dereference via S3 Bucket Import | 2026-05-04T19:38:48Z | 2026-05-08T21:47:04Z |
| ghsa-xjvp-7243-rg9h |
9.6 (3.1)
|
Wish has SCP Path Traversal that allows arbitrary file read/write | 2026-04-18T01:09:46Z | 2026-05-08T21:47:01Z |
| ghsa-mjw2-v2hm-wj34 |
8.3 (3.1)
|
Dagster Vulnerable to SQL Injection via Dynamic Partition Keys in Database I/O Manager Integrations | 2026-04-18T01:07:59Z | 2026-05-08T21:46:57Z |
| ghsa-qhw2-rfvc-fvrq |
8.1 (3.1)
8.7 (4.0)
|
SmarterTools SmarterMail builds prior to 9560 contain a local file inclusion vulnerability in the /… | 2026-05-08T21:31:26Z | 2026-05-08T21:31:26Z |
| ghsa-f3v7-jqh4-whf5 |
8.1 (3.1)
8.7 (4.0)
|
MailEnable Enterprise Premium 10.55 and earlier contains an improper authorization vulnerability in… | 2026-05-08T21:31:26Z | 2026-05-08T21:31:26Z |
| ghsa-xp7f-v245-w3w8 |
7.5 (3.1)
|
An issue in fohrloop dash-uploader v.0.1.0 through v.0.7.0a2 allows a remote attacker to execute ar… | 2026-05-08T15:31:25Z | 2026-05-08T21:31:25Z |
| ghsa-j539-xxc6-73wf |
7.5 (3.1)
|
Crypt::PasswdMD5 versions through 1.42 for Perl generates insecure random values for salts. The bu… | 2026-05-08T18:31:36Z | 2026-05-08T21:31:25Z |
| ghsa-hr45-w7f7-w9j6 |
7.5 (3.1)
|
lwjson 1.8.1 contains an improper input validation vulnerability in the streaming JSON parser (lwjs… | 2026-05-08T18:31:34Z | 2026-05-08T21:31:25Z |
| ghsa-fmp3-3p2g-4h8r |
9.8 (3.1)
|
Beauty Parlour Management System v1.1 was discovered to contain a SQL injection vulnerability via t… | 2026-05-08T15:31:25Z | 2026-05-08T21:31:25Z |
| ghsa-c3fx-j4hr-97w5 |
4.3 (3.1)
|
Insufficient input validation of the feature file name in `feature::LOADFEATUREFILE` adminbin call … | 2026-05-08T21:31:25Z | 2026-05-08T21:31:25Z |
| ghsa-9p5f-57xg-vg2m |
7.5 (3.1)
|
An issue was discovered in kosma minmea 0.3.0. The minmea_scan functions format specifier copies NM… | 2026-05-08T18:31:34Z | 2026-05-08T21:31:25Z |
| ghsa-4jrh-q927-mvfj |
8.8 (3.1)
|
Insufficient input validation of the `plugin` parameter of the `create_user` plugin allows arbitrar… | 2026-05-08T21:31:25Z | 2026-05-08T21:31:25Z |
| ghsa-3x6m-3grh-599c |
8.8 (3.1)
|
A chmod call in the cPanel Nova plugin's Cpanel::Nova::Connector follows symlinks, allowing setting… | 2026-05-08T21:31:25Z | 2026-05-08T21:31:25Z |
| ghsa-3rf6-x59v-5jfv |
9.8 (3.1)
|
Directory Traversal vulnerability in fohrloop dash-uploader v.0.1.0 through v.0.7.0a2 allows a remo… | 2026-05-08T18:31:35Z | 2026-05-08T21:31:25Z |
| ghsa-vx26-r59q-724x |
9.8 (3.1)
|
Certain GL.iNet devices with 4.x firmware allow authentication bypass (resulting in administrative … | 2026-05-08T09:31:29Z | 2026-05-08T21:31:24Z |
| ghsa-hxqg-f8pm-8v2h |
7.3 (3.1)
|
LINQPad before 5.52.01 Pro edition is vulnerable to Unsafe Deserialization in LINQPad.AutoRefManage… | 2026-05-08T06:32:38Z | 2026-05-08T21:31:24Z |
| ghsa-c9p5-pwmj-4f88 |
9.1 (3.1)
|
Apache::Session versions through 1.94 for Perl re-creates deleted sessions. The session stores Apa… | 2026-05-08T09:31:30Z | 2026-05-08T21:31:24Z |
| ghsa-9r2v-r8jf-9prp |
7.8 (3.1)
|
NAVER MYBOX Explorer for Windows before 3.0.11.160 allows a local attacker to escalate privileges t… | 2026-05-08T06:32:38Z | 2026-05-08T21:31:23Z |
| ghsa-jphw-vq37-q7ww |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: APEI/GHES: ensure that won't g… | 2026-05-06T12:30:35Z | 2026-05-08T21:31:22Z |
| ghsa-78gq-46gf-2hpp |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: mailbox: Prevent out-of-bounds… | 2026-05-06T12:30:35Z | 2026-05-08T21:31:22Z |
| ghsa-5g7g-fprm-cgpp |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: RDMA/ionic: Fix potential NULL… | 2026-05-06T12:30:36Z | 2026-05-08T21:31:22Z |
| ghsa-wqxw-h6xc-72x8 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: phy: fsl-imx8mq-usb: set platf… | 2026-05-06T12:30:35Z | 2026-05-08T21:31:21Z |
| ghsa-w6jm-j85g-vpgj |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix RSS context delet… | 2026-05-06T12:30:35Z | 2026-05-08T21:31:21Z |
| ghsa-r9ph-9m45-xj6w |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: EFI/CPER: don't go past the AR… | 2026-05-06T12:30:35Z | 2026-05-08T21:31:21Z |
| ghsa-q2m9-5gr9-rjw9 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: arm64: Add support for TSV110 … | 2026-05-06T12:30:35Z | 2026-05-08T21:31:21Z |
| ghsa-p7j5-r5cq-h6qj |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Ignore -EBUSY when c… | 2026-05-06T12:30:35Z | 2026-05-08T21:31:21Z |
| ghsa-jgp7-74rh-r6jv |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix potential zer… | 2026-05-06T12:30:35Z | 2026-05-08T21:31:21Z |
| ghsa-hv6m-q2m2-vxvr |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix double destroy_… | 2026-05-06T12:30:35Z | 2026-05-08T21:31:21Z |
| ghsa-h2mh-m9gx-72x5 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: gfs2: fiemap page fault fix I… | 2026-05-06T12:30:35Z | 2026-05-08T21:31:21Z |
| ghsa-gqg8-ww6w-xc5v |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: media: radio-keene: fix memory… | 2026-05-06T12:30:33Z | 2026-05-08T21:31:21Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-231 |
8.1 (3.1)
|
LightGBM Remote Code Execution Vulnerability | lightgbm | 2024-11-12T18:15:28+00:00 | 2025-02-15T07:20:34.246161+00:00 |
| pysec-2024-230 |
7.5 (3.1)
|
Certifi is a curated collection of Root Certificates for validating the trustworthiness o… | certifi | 2024-07-05T19:15:10+00:00 | 2025-02-12T21:21:51.559667+00:00 |
| pysec-2024-229 |
8.8 (3.1)
|
Hugging Face Transformers Trax Model Deserialization of Untrusted Data Remote Code Execut… | transformers | 2024-11-22T22:15:07+00:00 | 2025-02-10T23:22:41.499413+00:00 |
| pysec-2024-228 |
8.8 (3.1)
|
Hugging Face Transformers MaskFormer Model Deserialization of Untrusted Data Remote Code … | transformers | 2024-11-22T22:15:07+00:00 | 2025-02-10T23:22:41.449105+00:00 |
| pysec-2024-227 |
8.8 (3.1)
|
Hugging Face Transformers MobileViTV2 Deserialization of Untrusted Data Remote Code Execu… | transformers | 2024-11-22T22:15:06+00:00 | 2025-02-10T23:22:41.399021+00:00 |
| pysec-2024-226 |
7.8 (3.1)
|
Pymatgen (Python Materials Genomics) is an open-source Python library for materials analy… | pymatgen | 2024-02-21T17:15:09+00:00 | 2025-02-06T00:34:28.734730+00:00 |
| pysec-2024-225 |
7.5 (3.1)
|
cryptography is a package designed to expose cryptographic primitives and recipes to Pyth… | cryptography | 2024-02-21T17:15:09+00:00 | 2025-02-06T00:34:24.427679+00:00 |
| pysec-2024-224 |
7.0 (3.1)
|
Excessive directory permissions in MLflow leads to local privilege escalation when using … | mlflow | 2024-11-25T14:15:06+00:00 | 2025-02-03T16:23:40.409646+00:00 |
| pysec-2024-27 |
9.8 (3.1)
|
CrateDB 5.5.1 is contains an authentication bypass vulnerability in the Admin UI componen… | crate | 2024-01-30T01:15:00Z | 2025-01-30T22:47:57.847403Z |
| pysec-2019-242 |
5.5 (3.1)
|
Capstone 3.0.4 has an out-of-bounds vulnerability (SEGV caused by a read memory access) i… | capstone | 2019-05-15T14:29:00Z | 2025-01-28T17:34:08.578134Z |
| pysec-2025-2 |
|
uniapi version 1.0.7 introduces code that would execute on import of the module and downl… | uniapi | 2025-01-24T19:56:53+00:00 | |
| pysec-2024-223 |
9.1 (3.1)
|
Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds … | onnx | 2024-02-23T18:15:50+00:00 | 2025-01-22T16:23:22.060512+00:00 |
| pysec-2024-222 |
7.5 (3.1)
|
Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Trav… | onnx | 2024-02-23T18:15:50+00:00 | 2025-01-22T16:23:21.994731+00:00 |
| pysec-2024-221 |
5.3 (3.1)
|
aiosmtpd is a reimplementation of the Python stdlib smtpd.py based on asyncio. aiosmtpd i… | aiosmtpd | 2024-03-12T21:15:58+00:00 | 2025-01-22T16:23:18.042465+00:00 |
| pysec-2024-220 |
5.4 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.972580+00:00 |
| pysec-2024-219 |
9.1 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.897787+00:00 |
| pysec-2024-218 |
8.1 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.803143+00:00 |
| pysec-2024-217 |
7.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This is a **data … | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T22:22:23.723816+00:00 |
| pysec-2024-216 |
7.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T22:22:23.549944+00:00 |
| pysec-2024-215 |
9.8 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:11+00:00 | 2025-01-19T22:22:23.471780+00:00 |
| pysec-2024-214 |
5.4 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T22:22:23.399444+00:00 |
| pysec-2024-213 |
6.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T22:22:23.310301+00:00 |
| pysec-2024-212 |
|
Apache Airflow versions before 2.10.1 have a vulnerability that allows DAG authors to add… | apache-airflow | 2024-09-07T08:15:11+00:00 | 2025-01-19T22:22:22.289672+00:00 |
| pysec-2024-211 |
7.5 (3.1)
|
Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote clien… | waitress | 2024-10-29T15:15:12+00:00 | 2025-01-19T19:19:01.852094+00:00 |
| pysec-2024-210 |
4.8 (3.1)
|
Waitress is a Web Server Gateway Interface server for Python 2 and 3. A remote client may… | waitress | 2024-10-29T15:15:11+00:00 | 2025-01-19T19:19:01.811922+00:00 |
| pysec-2024-209 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-19T19:19:01.689044+00:00 |
| pysec-2024-208 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.647736+00:00 |
| pysec-2024-207 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.605918+00:00 |
| pysec-2024-206 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.566553+00:00 |
| pysec-2024-205 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. When using … | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-19T19:19:01.519824+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33799 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.424348Z |
| gsd-2024-33798 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.346901Z |
| gsd-2024-33797 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.530297Z |
| gsd-2024-33796 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.308365Z |
| gsd-2024-33795 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.332784Z |
| gsd-2024-33794 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.557396Z |
| gsd-2024-33793 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.552273Z |
| gsd-2024-33792 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.507383Z |
| gsd-2024-33791 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.488352Z |
| gsd-2024-33790 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.450431Z |
| gsd-2024-33789 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.534336Z |
| gsd-2024-33788 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.591276Z |
| gsd-2024-33787 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.424661Z |
| gsd-2024-33786 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.606155Z |
| gsd-2024-33785 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.387543Z |
| gsd-2024-33784 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.595808Z |
| gsd-2024-33783 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.322051Z |
| gsd-2024-33782 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.322441Z |
| gsd-2024-33781 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.495881Z |
| gsd-2024-33780 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.307884Z |
| gsd-2024-33779 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.507854Z |
| gsd-2024-33778 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.295751Z |
| gsd-2024-33777 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.489805Z |
| gsd-2024-33776 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.587852Z |
| gsd-2024-33775 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.322245Z |
| gsd-2024-33774 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.484899Z |
| gsd-2024-33773 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.560326Z |
| gsd-2024-33772 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.282306Z |
| gsd-2024-33771 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.366201Z |
| gsd-2024-33770 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.514460Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-3326 | Malicious code in paychex-common-vendor-lib (npm) | 2026-05-04T13:20:41Z | 2026-05-04T13:20:41Z |
| mal-2026-3325 | Malicious code in cloudauth-sdk (PyPI) | 2026-05-04T11:30:49Z | 2026-05-04T11:30:49Z |
| mal-2026-3309 | Malicious code in google-cloud-secret-manager-config-poc (npm) | 2026-05-03T16:10:57Z | 2026-05-04T10:37:22Z |
| mal-2026-3324 | Malicious code in randomchoicemas (PyPI) | 2026-05-04T10:29:41Z | 2026-05-04T10:29:41Z |
| mal-2026-3337 | Malicious code in @t-in-one/save_application_hid_to_storage (npm) | 2026-05-04T10:10:51Z | 2026-05-04T10:10:51Z |
| mal-2026-3335 | Malicious code in @bank-widgets/whats-new (npm) | 2026-05-04T09:30:54Z | 2026-05-04T09:30:54Z |
| mal-2026-3082 | Malicious code in kl-b2c-ui-kit (npm) | 2026-04-25T15:53:07Z | 2026-05-04T03:25:21Z |
| mal-2026-3117 | Malicious code in @business_promocode/cancel_promocode (npm) | 2026-04-27T14:15:48Z | 2026-05-04T03:25:18Z |
| mal-2026-3116 | Malicious code in @business_promocode/apply_promocode (npm) | 2026-04-27T14:06:02Z | 2026-05-04T03:25:18Z |
| mal-2026-3115 | Malicious code in @b2b_blocker/show_activation_error (npm) | 2026-04-27T14:06:01Z | 2026-05-04T03:25:18Z |
| mal-2026-3114 | Malicious code in @apple-pay-trust/finish (npm) | 2026-04-27T13:57:41Z | 2026-05-04T03:25:18Z |
| mal-2026-3113 | Malicious code in @apple-pay-trust/check-apple-pay-result (npm) | 2026-04-27T13:55:59Z | 2026-05-04T03:25:18Z |
| mal-2026-3111 | Malicious code in @apple-pay-trust/authorize-payment (npm) | 2026-04-27T14:25:57Z | 2026-05-04T03:25:18Z |
| mal-2026-3110 | Malicious code in @apiary-annex/title (npm) | 2026-04-27T13:55:48Z | 2026-05-04T03:25:18Z |
| mal-2026-3109 | Malicious code in @apiary-annex/meta (npm) | 2026-04-27T14:15:52Z | 2026-05-04T03:25:18Z |
| mal-2026-3108 | Malicious code in @activation_code/success (npm) | 2026-04-27T14:15:59Z | 2026-05-04T03:25:18Z |
| mal-2026-3107 | Malicious code in @activation_code/error (npm) | 2026-04-27T14:05:51Z | 2026-05-04T03:25:18Z |
| mal-2026-3106 | Malicious code in @activation_code/activate (npm) | 2026-04-27T14:06:06Z | 2026-05-04T03:25:18Z |
| mal-2026-3073 | Malicious code in @tw-utils/static (npm) | 2026-04-25T17:15:57Z | 2026-05-04T03:25:18Z |
| mal-2026-3072 | Malicious code in @tw-models/storage (npm) | 2026-04-25T17:25:59Z | 2026-05-04T03:25:18Z |
| mal-2026-3071 | Malicious code in @tw-marionette/input (npm) | 2026-04-25T17:17:50Z | 2026-05-04T03:25:18Z |
| mal-2026-3070 | Malicious code in @tw-marionette/clipboard (npm) | 2026-04-26T12:49:53Z | 2026-05-04T03:25:18Z |
| mal-2026-3069 | Malicious code in @tochka-ui/foundation (npm) | 2026-04-24T22:55:55Z | 2026-05-04T03:25:18Z |
| mal-2026-3068 | Malicious code in @sbt_gitverse/analytics-client (npm) | 2026-04-25T14:20:49Z | 2026-05-04T03:25:18Z |
| mal-2026-3067 | Malicious code in @ozon-complt/split (npm) | 2026-04-26T12:39:46Z | 2026-05-04T03:25:18Z |
| mal-2026-3066 | Malicious code in @ozon-complt/antibot-handler (npm) | 2026-04-26T12:49:53Z | 2026-05-04T03:25:18Z |
| mal-2026-3065 | Malicious code in @m0ntana/app.web (npm) | 2026-04-24T18:21:08Z | 2026-05-04T03:25:18Z |
| mal-2026-3064 | Malicious code in @google-pay-trust/init-google-pay (npm) | 2026-04-25T18:05:43Z | 2026-05-04T03:25:18Z |
| mal-2026-3063 | Malicious code in @google-pay-trust/finish (npm) | 2026-04-25T18:05:42Z | 2026-05-04T03:25:18Z |
| mal-2026-3062 | Malicious code in @google-pay-trust/cancelled (npm) | 2026-04-25T18:15:50Z | 2026-05-04T03:25:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2579 | Linux Kernel: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2568 | Red Hat Enterprise Linux (kea): Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-11T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2531 | Linux Kernel: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-11-09T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2483 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-11-03T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2450 | Linux Kernel: Mehrere Schwachstellen | 2025-10-29T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2441 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-29T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2431 | Linux Kernel: Mehrere Schwachstellen | 2025-10-28T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2430 | Linux Kernel: Mehrere Schwachstellen | 2025-10-27T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2420 | Apache Tomcat: Mehrere Schwachstellen | 2025-10-27T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2407 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-26T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2365 | Oracle Java SE: Mehrere Schwachstellen | 2025-10-21T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2350 | Linux Kernel: Mehrere Schwachstellen | 2025-10-20T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2340 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-19T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2329 | cPanel/WHM (PostgreSQL, Perl): Mehrere Schwachstellen | 2025-10-16T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2298 | Linux Kernel: Mehrere Schwachstellen | 2025-10-14T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2268 | Linux Kernel: Mehrere Schwachstellen | 2025-10-13T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2249 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-09T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2246 | Linux Kernel: Mehrere Schwachstellen | 2025-10-08T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2229 | Linux Kernel: Mehrere Schwachstellen | 2025-10-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2227 | Golang Go: Mehrere Schwachstellen | 2025-10-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2212 | OpenSSH: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-10-06T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2194 | Linux Kernel: Mehrere Schwachstellen | 2025-10-05T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2187 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-01T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2170 | Linux Kernel: Mehrere Schwachstellen | 2025-09-30T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2112 | DNSdist: Schwachstelle ermöglicht Denial of Service | 2025-09-23T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2107 | Linux Kernel: Mehrere Schwachstellen | 2025-09-22T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2099 | Linux Kernel: Mehrere Schwachstellen | 2025-09-21T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2092 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-18T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2077 | Linux Kernel: Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1988 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-350-02 | Johnson Controls PowerG, IQPanel and IQHub (Update A) | 2025-12-16T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| icsa-25-343-01 | Universal Boot Loader (U-Boot) (Update A) | 2025-12-09T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| icsa-22-020-01 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric HMI SCADA (Update B) | 2022-01-20T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| va-25-297-01 | IBM DOORS Next Generation multiple vulnerabilities | 2025-10-22T18:45:47Z | 2026-03-04T00:00:00Z |
| icsa-26-062-05 | Labkotec LID-3300IP | 2026-03-03T07:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-04 | Portwell Engineering Toolkits | 2026-03-03T07:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-03 | Hitachi Energy RTU500 Product | 2026-02-24T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-02 | Hitachi Energy Relion REB500 Product | 2026-02-24T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-25-023-02 | Hitachi Energy RTU500 Series Product (Update B) | 2024-04-30T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-08 | Everon OCPP Backends | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-062-07 | ePower epower.ie | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-062-06 | Mobiliti e-mobi.hu | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-057-10 | Copeland XWEB and XWEB Pro | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-09 | Yokogawa CENTUM VP R6, R7 | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-08 | Mobility46 mobility46.se | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-07 | EV Energy ev.energy | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-06 | SWITCH EV swtchenergy.com | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-05 | Chargemap chargemap.com | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-04 | EV2GO ev2go.io | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-03 | CloudCharge cloudcharge.se | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-02 | Pelco, Inc. Sarix Pro 3 Series IP Cameras | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-01 | Johnson Controls, Inc. Frick Controls Quantum HD | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-25-133-02 | Hitachi Energy Relion 670/650/SAM600-IO Series (Update C) | 2023-11-28T00:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-043-06 | Siemens SINEC OS | 2026-01-28T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-26-027-01 | iba Systems ibaPDA | 2026-01-27T07:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-25-226-15 | Siemens SINEC OS | 2025-08-12T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-25-226-07 | Siemens Third-Party Components in SINEC OS | 2025-08-12T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-25-203-04 | Schneider Electric EcoStruxure Power Operation (Update A) | 2025-07-22T06:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-26-055-02 | Schneider Electric EcoStruxure Building Operation Workstation | 2026-02-10T08:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-26-055-01 | InSAT MasterSCADA BUK-TS | 2026-02-24T07:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-nbar-dos-lavwtmet | Cisco IOS XE Software Network-Based Application Recognition Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-arg-inject-eyddbh4e | Cisco IOS XE Software CLI Argument Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-xe-cmd-inject-rpjm8bgl | Cisco IOS XE Software HTTP API Command Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-invalid-url-dos-nvxszf6u | Cisco IOS Software Industrial Ethernet Switch Device Manager Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-cli-eb7cz6yo | Cisco IOS and IOS XE Software CLI Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-defaultacl-psjk9nvf | Cisco SD-WAN vEdge Software Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-cat9k-acl-l4k7vxgd | Cisco IOS XE Software on Cisco Catalyst 9500X and 9600X Series Switches Virtual Interface Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-action-frame-inj-qqcncz8h | Cisco Wireless Access Point Software Device Analytics Action Frame Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-9800cl-openscep-sb4xtxzp | Cisco IOS XE Software for Catalyst 9800 Series Wireless Controller for Cloud Unauthenticated Access to Certificate Enrollment Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-snmp-bypass-hhuvujdn | Cisco IOS XE SD-WAN Software Packet Filtering Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-09-22T14:12:28+00:00 |
| cisco-sa-xrsig-uy4zrucg | Cisco IOS XR Software Image Verification Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-iosxr-arp-storm-ejuu55ym | Cisco IOS XR ARP Broadcast Storm Denial of Service Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-acl-packetio-swjhhbtz | Cisco IOS XR Software Management Interface ACL Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-fp2k-ipsec-dos-tjwgdzco | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 2100 Series IPv6 over IPsec Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-09T21:22:34+00:00 |
| cisco-sa-webex-xss-55bv8hhm | Cisco Webex Meetings Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-webex-urlredirect-uk8ddjsz | Cisco Webex Meetings URL Redirection Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-phone-write-g3kcc5df | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-imp-xss-xqgu4hsg | Cisco Unified Communications Manager IM & Presence Service Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epnm-pi-stored-xss-xjqzsycp | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epnm-info-dis-zhppmfgz | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Information Disclosure Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epni-arb-file-upload-jjdm2p83 | Cisco Evolved Programmable Network Manager Arbitrary File Upload Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-cucm-csrf-w762pryd | Cisco Unified Communications Manager Cross-Site Request Forgery Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-3100_4200_tlsdos-2ynscd54 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 3100 and 4200 Series TLS 1.3 Cipher Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-03T13:37:50+00:00 |
| cisco-sa-ucs-xss-ey6xhyps | Cisco UCS Manager Software Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-vkvmorv-cnkrv7hk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Open Redirect Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-multi-cmdinj-e4ukjyrz | Cisco UCS Manager Software Command Injection Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-kvmsxss-6h7anuyk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxospc-pim6-vg4jfph | Cisco Nexus 3000 and 9000 Series Switches Protocol Independent Multicast Version 6 Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-infodis-tectysfg | Cisco NX-OS Software Sensitive Log Information Disclosure Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-cmdinj-qhnze5ss | Cisco NX-OS Software Command Injection Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-33489 | CoreDNS transfer plugin subzone ACL bypass via lexicographic zone comparison | 2026-05-02T00:00:00.000Z | 2026-05-07T01:02:40.000Z |
| msrc_cve-2026-33190 | CoreDNS TSIG authentication bypass on encrypted DNS transports | 2026-05-02T00:00:00.000Z | 2026-05-07T01:02:32.000Z |
| msrc_cve-2025-39762 | drm/amd/display: add null check | 2025-09-02T00:00:00.000Z | 2026-05-06T14:53:39.000Z |
| msrc_cve-2025-21635 | rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy | 2025-01-02T00:00:00.000Z | 2026-05-06T14:53:35.000Z |
| msrc_cve-2025-39754 | mm/smaps: fix race between smaps_hugetlb_range and migration | 2025-09-02T00:00:00.000Z | 2026-05-06T14:53:34.000Z |
| msrc_cve-2025-39779 | btrfs: subpage: keep TOWRITE tag until folio is cleaned | 2025-09-02T00:00:00.000Z | 2026-05-06T14:53:28.000Z |
| msrc_cve-2023-52586 | drm/msm/dpu: Add mutex lock in control vblank irq | 2024-03-02T08:00:00.000Z | 2026-05-06T14:53:28.000Z |
| msrc_cve-2025-39707 | drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities | 2025-09-02T00:00:00.000Z | 2026-05-06T14:53:22.000Z |
| msrc_cve-2025-21696 | mm: clear uffd-wp PTE/PMD state on mremap() | 2025-02-02T00:00:00.000Z | 2026-05-06T14:53:22.000Z |
| msrc_cve-2025-21672 | afs: Fix merge preference rule failure condition | 2025-01-02T00:00:00.000Z | 2026-05-06T14:53:16.000Z |
| msrc_cve-2025-39677 | net/sched: Fix backlog accounting in qdisc_dequeue_internal | 2025-09-02T00:00:00.000Z | 2026-05-06T14:53:15.000Z |
| msrc_cve-2025-21634 | cgroup/cpuset: remove kernfs active break | 2025-01-02T00:00:00.000Z | 2026-05-06T14:53:10.000Z |
| msrc_cve-2025-39705 | drm/amd/display: fix a Null pointer dereference vulnerability | 2025-09-02T00:00:00.000Z | 2026-05-06T14:53:09.000Z |
| msrc_cve-2025-38717 | net: kcm: Fix race condition in kcm_unattach() | 2025-09-02T00:00:00.000Z | 2026-05-06T14:53:04.000Z |
| msrc_cve-2026-31506 | net: bcmasp: fix double free of WoL irq | 2026-04-02T00:00:00.000Z | 2026-05-06T14:52:57.000Z |
| msrc_cve-2025-38722 | habanalabs: fix UAF in export_dmabuf() | 2025-09-02T00:00:00.000Z | 2026-05-06T14:52:56.000Z |
| msrc_cve-2026-31488 | drm/amd/display: Do not skip unrelated mode changes in DSC validation | 2026-04-02T00:00:00.000Z | 2026-05-06T14:52:49.000Z |
| msrc_cve-2025-38705 | drm/amd/pm: fix null pointer access | 2025-09-02T00:00:00.000Z | 2026-05-06T14:52:49.000Z |
| msrc_cve-2025-21649 | net: hns3: fix kernel crash when 1588 is sent on HIP08 devices | 2025-01-02T00:00:00.000Z | 2026-05-06T14:52:49.000Z |
| msrc_cve-2026-31516 | xfrm: prevent policy_hthresh.work from racing with netns teardown | 2026-04-02T00:00:00.000Z | 2026-05-06T14:52:42.000Z |
| msrc_cve-2025-38636 | rv: Use strings in da monitors tracepoints | 2025-08-02T00:00:00.000Z | 2026-05-06T14:52:42.000Z |
| msrc_cve-2024-57872 | scsi: ufs: pltfrm: Dellocate HBA during ufshcd_pltfrm_remove() | 2025-01-02T00:00:00.000Z | 2026-05-06T14:52:42.000Z |
| msrc_cve-2026-31487 | spi: use generic driver_override infrastructure | 2026-04-02T00:00:00.000Z | 2026-05-06T14:52:35.000Z |
| msrc_cve-2025-38660 | [ceph] parse_longname(): strrchr() expects NUL-terminated string | 2025-08-02T00:00:00.000Z | 2026-05-06T14:52:34.000Z |
| msrc_cve-2026-31486 | hwmon: (pmbus/core) Protect regulator operations with mutex | 2026-04-02T00:00:00.000Z | 2026-05-06T14:52:27.000Z |
| msrc_cve-2025-38584 | padata: Fix pd UAF once and for all | 2025-08-02T00:00:00.000Z | 2026-05-06T14:52:26.000Z |
| msrc_cve-2026-27820 | zlib: Buffer Overflow in Zlib::GzipReader ungetc via large input leads to memory corruption | 2026-04-02T00:00:00.000Z | 2026-05-06T14:52:20.000Z |
| msrc_cve-2024-56782 | ACPI: x86: Add adev NULL check to acpi_quirk_skip_serdev_enumeration() | 2025-01-02T00:00:00.000Z | 2026-05-06T14:52:19.000Z |
| msrc_cve-2025-38585 | staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int() | 2025-08-02T00:00:00.000Z | 2026-05-06T14:52:18.000Z |
| msrc_cve-2024-56775 | drm/amd/display: Fix handling of plane refcount | 2025-01-02T00:00:00.000Z | 2026-05-06T14:52:12.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0020 | Kwetsbaarheden verholpen in Oracle Commerce | 2026-01-21T09:18:16.268788Z | 2026-01-21T09:18:16.268788Z |
| ncsc-2026-0019 | Kwetsbaarheid verholpen in Fortinet FortiSIEM | 2026-01-16T13:34:34.467426Z | 2026-01-16T13:34:34.467426Z |
| ncsc-2026-0018 | Kwetsbaarheden verholpen in TYPO3 CMS | 2026-01-16T10:11:37.524826Z | 2026-01-16T10:11:37.524826Z |
| ncsc-2026-0017 | Kwetsbaarheden verholpen in Juniper Networks JunOS | 2026-01-16T10:07:39.310560Z | 2026-01-16T10:07:39.310560Z |
| ncsc-2026-0016 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS | 2026-01-16T09:44:20.575860Z | 2026-01-16T09:44:20.575860Z |
| ncsc-2026-0015 | Kwetsbaarheid verholpen in Fortinet FortiOS | 2026-01-15T12:31:57.265723Z | 2026-01-15T12:31:57.265723Z |
| ncsc-2026-0014 | Kwetsbaarheden verholpen in Adobe Illustrator | 2026-01-15T12:16:05.427141Z | 2026-01-15T12:16:05.427141Z |
| ncsc-2026-0013 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2026-01-14T13:45:48.530782Z | 2026-01-14T13:45:48.530782Z |
| ncsc-2026-0012 | Kwetsbaarheden verholpen in Adobe Dreamweaver Desktop | 2026-01-14T13:41:56.261778Z | 2026-01-14T13:41:56.261778Z |
| ncsc-2026-0011 | Kwetsbaarheid verholpen in Microsoft Developer Tools | 2026-01-13T19:19:27.690900Z | 2026-01-13T19:19:27.690900Z |
| ncsc-2026-0009 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-01-13T19:17:59.629364Z | 2026-01-13T19:17:59.629364Z |
| ncsc-2026-0008 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-01-13T19:17:18.848673Z | 2026-01-13T19:17:18.848673Z |
| ncsc-2026-0006 | Kwetsbaarheden verholpen in SAP producten | 2026-01-13T14:42:24.621603Z | 2026-01-13T14:42:24.621603Z |
| ncsc-2026-0005 | Kwetsbaarheden verholpen in Siemens producten | 2026-01-13T12:05:57.353070Z | 2026-01-13T12:05:57.353070Z |
| ncsc-2026-0004 | Kwetsbaarheden verholpen in Trend Micro Apex Central | 2026-01-09T11:14:58.910197Z | 2026-01-09T11:14:58.910197Z |
| ncsc-2026-0003 | Kwetsbaarheden verholpen in GitLab | 2026-01-09T11:11:48.308357Z | 2026-01-09T11:11:48.308357Z |
| ncsc-2026-0002 | Kwetsbaarheid verholpen in n8n | 2026-01-08T12:34:29.315681Z | 2026-01-08T12:34:29.315681Z |
| ncsc-2026-0001 | Kwetsbaarheden verholpen in Hanwha camera systemen | 2026-01-08T12:28:21.446188Z | 2026-01-08T12:28:21.446188Z |
| ncsc-2025-0405 | Kwetsbaarheid verholpen in Roundcube Webmail | 2025-12-31T14:29:26.821576Z | 2025-12-31T14:29:26.821576Z |
| ncsc-2025-0404 | Kwetsbaarheid verholpen in SmarterMail | 2025-12-31T14:19:01.847364Z | 2025-12-31T14:19:01.847364Z |
| ncsc-2025-0403 | Kwetsbaarheden verholpen in QNAP besturingssystemen | 2025-12-29T09:17:28.385450Z | 2025-12-29T09:17:28.385450Z |
| ncsc-2025-0402 | Kwetsbaarheid verholpen in MongoDB | 2025-12-27T11:38:11.514349Z | 2025-12-27T11:38:11.514349Z |
| ncsc-2025-0399 | Kwetsbaarheid verholpen in HPE OneView Software | 2025-12-18T18:38:20.794784Z | 2025-12-24T11:29:46.123674Z |
| ncsc-2025-0401 | Kwetsbaarheden verholpen in Foxit PDF Reader | 2025-12-24T09:14:56.590353Z | 2025-12-24T09:14:56.590353Z |
| ncsc-2025-0400 | Kwetsbaarheid verholpen in WatchGuard Firebox | 2025-12-19T11:16:01.438518Z | 2025-12-19T11:16:01.438518Z |
| ncsc-2025-0398 | Kwetsbaarheid in Cisco AsyncOS | 2025-12-17T19:47:00.346651Z | 2025-12-17T19:47:00.346651Z |
| ncsc-2025-0397 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-12-15T09:08:39.804149Z | 2025-12-15T09:08:39.804149Z |
| ncsc-2025-0396 | Kwetsbaarheden verholpen in Apple macOS | 2025-12-15T09:06:36.450655Z | 2025-12-15T09:06:36.450655Z |
| ncsc-2025-0394 | Kwetsbaarheden verholpen in React Server Components | 2025-12-12T09:04:19.324080Z | 2025-12-12T10:46:34.688189Z |
| ncsc-2025-0395 | Kwetsbaarheden verholpen in SAP Software | 2025-12-12T09:29:08.429888Z | 2025-12-12T09:29:08.429888Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20591-1 | Security update for GraphicsMagick | 2026-04-21T09:49:40Z | 2026-04-21T09:49:40Z |
| opensuse-su-2026:20592-1 | Security update for ghostscript | 2026-04-21T09:49:39Z | 2026-04-21T09:49:39Z |
| opensuse-su-2026:20598-1 | Security update for python-PyPDF2 | 2026-04-21T09:43:19Z | 2026-04-21T09:43:19Z |
| opensuse-su-2026:20590-1 | Security update for gnome-remote-desktop | 2026-04-21T09:37:03Z | 2026-04-21T09:37:03Z |
| opensuse-su-2026:10584-1 | rclone-1.73.5-1.1 on GA media | 2026-04-20T00:00:00Z | 2026-04-20T00:00:00Z |
| opensuse-su-2026:10583-1 | python311-pypdf-6.10.2-1.1 on GA media | 2026-04-20T00:00:00Z | 2026-04-20T00:00:00Z |
| opensuse-su-2026:10582-1 | python311-PyPDF2-2.11.1-9.1 on GA media | 2026-04-20T00:00:00Z | 2026-04-20T00:00:00Z |
| opensuse-su-2026:10581-1 | haproxy-3.3.6+git91.af5637e93-1.1 on GA media | 2026-04-20T00:00:00Z | 2026-04-20T00:00:00Z |
| opensuse-su-2026:10578-1 | tempo-cli-2.10.4-1.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10577-1 | skopeo-1.22.1-1.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10576-1 | python311-jwcrypto-1.5.7-2.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10575-1 | python311-Pillow-12.2.0-2.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10574-1 | jetty-annotations-9.4.58-4.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10573-1 | cpp-httplib-devel-0.42.0-1.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10572-1 | chromedriver-147.0.7727.101-1.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10571-1 | bouncycastle-1.84-1.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10570-1 | aardvark-dns-1.17.1-1.1 on GA media | 2026-04-18T00:00:00Z | 2026-04-18T00:00:00Z |
| opensuse-su-2026:10567-1 | python311-Django-5.2.13-1.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10566-1 | liblog4cxx-devel-1.7.0-2.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10565-1 | libraw-devel-0.22.1-1.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10564-1 | libpng16-16-1.6.57-1.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10563-1 | leancrypto-devel-1.7.2-1.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10562-1 | flannel-0.28.4-1.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10561-1 | firecracker-1.15.1-1.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10560-1 | blender-5.1-5.1.1-1.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10559-1 | ImageMagick-7.1.2.19-1.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10558-1 | GraphicsMagick-1.3.46-5.1 on GA media | 2026-04-16T00:00:00Z | 2026-04-16T00:00:00Z |
| opensuse-su-2026:10549-1 | tomcat11-11.0.21-1.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| opensuse-su-2026:10548-1 | tomcat10-10.1.54-1.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| opensuse-su-2026:10547-1 | tomcat-9.0.117-1.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:4510 | Red Hat Security Advisory: OpenShift Container Platform 4.17.51 bug fix and security update | 2026-03-19T02:31:44+00:00 | 2026-05-09T15:04:04+00:00 |
| rhsa-2026:4500 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.2.9 | 2026-03-12T14:45:08+00:00 | 2026-05-09T15:04:03+00:00 |
| rhsa-2026:4482 | Red Hat Security Advisory: OpenShift Container Platform 4.16.58 bug fix and security update | 2026-03-19T07:09:17+00:00 | 2026-05-09T15:04:03+00:00 |
| rhsa-2026:4498 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.4.3 | 2026-03-12T14:43:54+00:00 | 2026-05-09T15:04:01+00:00 |
| rhsa-2026:4467 | Red Hat Security Advisory: RHACS 4.9.4 security and bug fix update | 2026-03-12T11:53:58+00:00 | 2026-05-09T15:04:00+00:00 |
| rhsa-2026:4466 | Red Hat Security Advisory: RHACS 4.8.9 security and bug fix update | 2026-03-12T11:53:42+00:00 | 2026-05-09T15:03:59+00:00 |
| rhsa-2026:4423 | Red Hat Security Advisory: OpenShift Container Platform 4.15.62 bug fix and security update | 2026-03-19T05:29:11+00:00 | 2026-05-09T15:03:58+00:00 |
| rhsa-2026:4464 | Red Hat Security Advisory: OpenShift Container Platform 4.16.58 packages and security update | 2026-03-19T07:51:30+00:00 | 2026-05-09T15:03:57+00:00 |
| rhsa-2026:4460 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | 2026-03-12T11:03:20+00:00 | 2026-05-09T15:03:56+00:00 |
| rhsa-2026:4435 | Red Hat Security Advisory: OpenShift Container Platform 4.19.26 security and extras update | 2026-03-18T08:00:04+00:00 | 2026-05-09T15:03:56+00:00 |
| rhsa-2026:4434 | Red Hat Security Advisory: OpenShift Container Platform 4.19.26 bug fix and security update | 2026-03-18T18:31:59+00:00 | 2026-05-09T15:03:55+00:00 |
| rhsa-2026:4418 | Red Hat Security Advisory: OpenShift Container Platform 4.15.62 packages and security update | 2026-03-19T05:59:29+00:00 | 2026-05-09T15:03:55+00:00 |
| rhsa-2026:4276 | Red Hat Security Advisory: RHTAS 1.3.2 - Tech Preview Release Of the Model Validation Operator | 2026-03-11T09:11:34+00:00 | 2026-05-09T15:03:54+00:00 |
| rhsa-2026:4271 | Red Hat Security Advisory: RHTAS 1.3.2 - Tech Preview Release of Model Transparency | 2026-03-11T09:02:58+00:00 | 2026-05-09T15:03:54+00:00 |
| rhsa-2026:4270 | Red Hat Security Advisory: OpenShift Source To Image 1.6.0 | 2026-03-11T07:52:06+00:00 | 2026-05-09T15:03:54+00:00 |
| rhsa-2026:4267 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-03-11T07:39:06+00:00 | 2026-05-09T15:03:54+00:00 |
| rhsa-2026:4264 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-03-11T06:05:36+00:00 | 2026-05-09T15:03:53+00:00 |
| rhsa-2026:4256 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-03-11T05:17:15+00:00 | 2026-05-09T15:03:53+00:00 |
| rhsa-2026:4220 | Red Hat Security Advisory: Red Hat Lightspeed (formerly Insights) for Runtimes security update | 2026-03-10T17:00:10+00:00 | 2026-05-09T15:03:52+00:00 |
| rhsa-2026:4215 | Red Hat Security Advisory: Red Hat Quay 3.14.6 | 2026-03-10T15:34:38+00:00 | 2026-05-09T15:03:52+00:00 |
| rhsa-2026:4211 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-10T22:25:59+00:00 | 2026-05-09T15:03:52+00:00 |
| rhsa-2026:4185 | Red Hat Security Advisory: Red Hat Quay 3.13.11 | 2026-03-10T13:57:02+00:00 | 2026-05-09T15:03:52+00:00 |
| rhsa-2026:4177 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-03-10T19:22:05+00:00 | 2026-05-09T15:03:50+00:00 |
| rhsa-2026:4174 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-03-10T12:12:43+00:00 | 2026-05-09T15:03:50+00:00 |
| rhsa-2026:4170 | Red Hat Security Advisory: Red Hat OpenShift API for Data Protection | 2026-03-10T10:02:11+00:00 | 2026-05-09T15:03:50+00:00 |
| rhsa-2026:4166 | Red Hat Security Advisory: git-lfs security update | 2026-03-10T09:26:33+00:00 | 2026-05-09T15:03:50+00:00 |
| rhsa-2026:4164 | Red Hat Security Advisory: git-lfs security update | 2026-03-10T09:29:17+00:00 | 2026-05-09T15:03:48+00:00 |
| rhsa-2026:3985 | Red Hat Security Advisory: git-lfs security update | 2026-03-09T02:13:04+00:00 | 2026-05-09T15:03:48+00:00 |
| rhsa-2026:3977 | Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update | 2026-03-09T01:52:37+00:00 | 2026-05-09T15:03:48+00:00 |
| rhsa-2026:3974 | Red Hat Security Advisory: git-lfs security update | 2026-03-09T01:51:17+00:00 | 2026-05-09T15:03:48+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2023-318-01 | PowerLogic ION8650, PowerLogic ION8800 | 2023-11-14T00:00:00.000Z | 2023-12-12T00:00:00.000Z |
| sevd-2023-318-02 | EcoStruxure Power Monitoring Expert and EcoStruxure™ Power Operation with Advanced Reporting and Dashboards Module | 2023-11-14T00:00:00.000Z | 2023-11-14T00:00:00.000Z |
| sevd-2023-283-02 | EcoStruxure Power Monitoring Expert and EcoStruxure™ Power | 2023-10-10T12:17:45.000Z | 2023-10-10T12:17:45.000Z |
| sevd-2023-283-01 | SpaceLogic C-Bus Toolkit | 2023-10-10T12:00:34.000Z | 2023-10-10T12:00:34.000Z |
| sevd-2023-255-01 | IGSS (Interactive Graphical SCADA System) | 2023-09-12T10:52:23.000Z | 2023-09-12T10:52:23.000Z |
| sevd-2023-220-01 | Pro-face GP-Pro EX | 2023-08-08T06:32:38.000Z | 2023-08-08T06:32:38.000Z |
| sevd-2023-192-01 | StruxureWare Data Center Expert | 2023-07-11T07:37:38.000Z | 2023-07-11T07:37:38.000Z |
| sevd-2023-192-03 | Accutech Manager | 2023-07-11T06:49:15.000Z | 2023-07-11T06:49:15.000Z |
| sevd-2023-164-03 | Foxboro SCADA | 2023-06-13T12:34:32.000Z | 2023-06-13T12:34:32.000Z |
| sevd-2023-164-02 | IGSS (Interactive Graphical SCADA System) | 2023-06-13T11:43:59.000Z | 2023-06-13T11:43:59.000Z |
| sevd-2023-164-04 | EcoStruxureTM Foxboro DCS Control Core Services | 2023-06-13T09:20:49.000Z | 2023-06-13T09:20:49.000Z |
| sevd-2023-164-01 | EcoStruxure™ Operator Terminal Expert and Pro-face BLUE | 2023-06-13T09:08:30.000Z | 2023-06-13T09:08:30.000Z |
| sevd-2023-129-01 | OPC Factory Server | 2023-05-09T16:33:38.000Z | 2023-05-09T16:33:38.000Z |
| sevd-2023-129-03 | PowerLogic ION7400 / PM8000 / ION9000 Power Meters | 2023-05-09T16:02:26.000Z | 2023-05-09T16:02:26.000Z |
| sevd-2023-129-02 | EcoStruxure™ Power SCADA Operation | 2023-05-09T11:52:40.000Z | 2023-05-09T11:52:40.000Z |
| sevd-2023-129-04 | Power SCADA Anywhere | 2023-05-09T08:00:55.000Z | 2023-05-09T08:00:55.000Z |
| sevd-2021-217-01 | NicheStack TCP/IP Vulnerabilities (INFRA:HALT) in Lexium ILE, ILA, ILS, and Communication Option Boards for Altivar and Lexium32 drives | 2021-08-05T06:29:08.000Z | 2023-05-09T06:29:00.000Z |
| sevd-2023-101-06 | Easergy Builder | 2023-04-11T14:20:02.000Z | 2023-04-11T14:20:02.000Z |
| sevd-2023-101-02 | Conext™ Gateway/ InsightHome and InsightFacility | 2023-04-11T14:01:38.000Z | 2023-04-11T14:01:38.000Z |
| sevd-2022-087-01 | SCADAPack Workbench | 2022-03-28T13:51:11.000Z | 2023-04-11T13:51:11.000Z |
| sevd-2022-011-06 | CODESYS V3 Runtime, Development System, and Gateway Vulnerabilities | 2022-01-11T07:08:13.000Z | 2023-04-11T11:30:00.000Z |
| sevd-2020-315-07 | PLC Simulator on EcoStruxure™ Control Expert and Process Expert | 2020-11-10T15:07:11.000Z | 2023-03-14T15:07:11.000Z |
| sevd-2023-073-04 | IGSS (Interactive Graphical SCADA System) | 2023-03-14T10:58:24.000Z | 2023-03-14T10:58:24.000Z |
| sevd-2023-073-02 | PowerLogic™ HDPM6000 | 2023-03-14T09:26:56.000Z | 2023-03-14T09:26:56.000Z |
| sevd-2023-010-02 | EcoStruxure Geo SCADA Expert | 2023-01-10T16:24:00.000Z | 2023-03-13T18:30:00.000Z |
| sevd-2022-165-01 | IGSS (Interactive Graphical SCADA System) | 2022-06-14T18:30:00.000Z | 2023-03-13T18:30:00.000Z |
| sevd-2021-257-02 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Premium and Associated Communication Modules | 2021-09-14T20:04:00.000Z | 2023-02-14T20:04:43.000Z |
| sevd-2020-315-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-11-10T12:05:04.000Z | 2023-02-14T12:05:00.000Z |
| sevd-2023-045-02 | StruxureWare Data Center Expert | 2023-02-14T08:05:19.000Z | 2023-02-14T08:05:19.000Z |
| sevd-2023-045-03 | Merten KNX devices | 2023-02-14T07:24:05.000Z | 2023-02-14T07:24:05.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-534283 | SSA-534283: Insecure File Share Vulnerability in SIMATIC Virtualization as a Service (SIVaaS) | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-503939 | SSA-503939: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP | 2025-03-11T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-494539 | SSA-494539: Multiple Vulnerabilities in SINEC OS | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-331739 | SSA-331739: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting Siemens Products | 2025-08-12T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-707630 | SSA-707630: Multiple Vulnerabilities in SIMATIC RTLS Locating Manager Before V3.3 | 2025-08-12T00:00:00Z | 2025-08-26T00:00:00Z |
| ssa-395458 | SSA-395458: Account Hijacking Vulnerability in Mendix SAML Module | 2025-08-14T00:00:00Z | 2025-08-14T00:00:00Z |
| ssa-028723 | SSA-028723: Multiple OpenSSL Vulnerabilities in BFCClient Before V2.17 | 2025-08-12T00:00:00Z | 2025-08-13T00:00:00Z |
| ssa-994087 | SSA-994087: Multiple SQLite Vulnerabilities in RUGGEDCOM CROSSBOW Station Access Controller Before V5.7 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-914892 | SSA-914892: Race Condition Vulnerability in Basic Authentication Implementation of Mendix Runtime | 2024-11-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-908185 | SSA-908185: Mirror Port Isolation Vulnerability in RUGGEDCOM ROS Devices | 2023-08-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-894058 | SSA-894058: Improper Bandwidth Limitation of Network Packets Over Local USB Port Vulnerability in SIPROTEC 5 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-856721 | SSA-856721: Vulnerability in RUGGEDCOM Discovery Protocol (RCDP) of Industrial Communication Devices | 2017-09-28T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-840800 | SSA-840800: Code Injection Vulnerability in RUGGEDCOM ROS | 2022-07-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-787941 | SSA-787941: Denial of Service Vulnerability in RUGGEDCOM ROS devices | 2022-11-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-770902 | SSA-770902: Denial of Service Vulnerability in the Web Server of RUGGEDCOM ROS Devices | 2023-08-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-769791 | SSA-769791: Local Arbitrary Code Execution Vulnerability in COMOS Before V10.6 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-767615 | SSA-767615: Information Disclosure Vulnerability in SIPROTEC 5 Devices | 2025-02-11T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-764417 | SSA-764417: Weak Encryption Vulnerability in RUGGEDCOM ROS Devices | 2022-03-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-674084 | SSA-674084: File Parsing Vulnerabilities in Simcenter Femap Before V2506 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-665108 | SSA-665108: Arbitrary File Upload Vulnerability in RUGGEDCOM ROX II | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-529291 | SSA-529291: Information Disclosure Vulnerabilities in SICAM Q100/Q200 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-517338 | SSA-517338: Multiple Vulnerabilities in SINEC Traffic Analyzer Before V3.0 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-493787 | SSA-493787: Arbitrary Code Execution Vulnerability in SIMATIC RTLS Locating Manager Before V3.2 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-460466 | SSA-460466: Denial of Service Vulnerability in TIA Project-Server and TIA Portal | 2025-07-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-446307 | SSA-446307: Authentication Bypass Vulnerability in BMC (CVE-2024-54085) affects SIMATIC IPC RS-828A | 2025-05-13T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-400089 | SSA-400089: Denial of Service Vulnerability in SIPROTEC 4 and SIPROTEC 4 Compact | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-398330 | SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP >= V3.1.0 and < V3.1.5 | 2023-12-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-382999 | SSA-382999: Multiple Vulnerabilities in Opcenter Quality Before V2506 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-353002 | SSA-353002: Multiple Vulnerabilities in SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family | 2024-03-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-256353 | SSA-256353: Third-Party Component Vulnerabilities in RUGGEDCOM ROS | 2022-03-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1676-1 | Security update for the Linux Kernel | 2026-05-02T07:19:34Z | 2026-05-02T07:19:34Z |
| suse-su-2026:1675-1 | Security update for the Linux Kernel | 2026-05-02T07:19:20Z | 2026-05-02T07:19:20Z |
| suse-su-2026:1674-1 | Security update for the Linux Kernel | 2026-05-02T07:19:11Z | 2026-05-02T07:19:11Z |
| suse-su-2026:21421-1 | Security update for the Linux Kernel | 2026-05-02T07:09:30Z | 2026-05-02T07:09:30Z |
| suse-su-2026:1672-1 | Security update for the Linux Kernel | 2026-05-02T06:02:50Z | 2026-05-02T06:02:50Z |
| suse-su-2026:1671-1 | Security update for the Linux Kernel | 2026-05-02T06:01:05Z | 2026-05-02T06:01:05Z |
| suse-su-2026:1670-1 | Security update for the Linux Kernel | 2026-05-02T05:53:40Z | 2026-05-02T05:53:40Z |
| suse-su-2026:1669-1 | Security update for the Linux Kernel | 2026-05-02T05:38:43Z | 2026-05-02T05:38:43Z |
| suse-su-2026:21442-1 | Security update for the Linux Kernel | 2026-05-01T23:16:53Z | 2026-05-01T23:16:53Z |
| suse-su-2026:21453-1 | Security update for the Linux Kernel | 2026-05-01T22:29:58Z | 2026-05-01T22:29:58Z |
| suse-su-2026:21456-1 | Security update for kernel-livepatch-MICRO-6-0_Update_19 | 2026-05-01T21:26:43Z | 2026-05-01T21:26:43Z |
| suse-su-2026:21441-1 | Security update for kernel-livepatch-MICRO-6-0_Update_19 | 2026-05-01T21:26:43Z | 2026-05-01T21:26:43Z |
| suse-su-2026:1668-1 | Security update for the Linux Kernel | 2026-05-01T08:37:51Z | 2026-05-01T08:37:51Z |
| suse-su-2026:1667-1 | Security update for python-Pygments | 2026-04-30T17:22:44Z | 2026-04-30T17:22:44Z |
| suse-su-2026:1666-1 | Security update for python-Pygments | 2026-04-30T17:22:16Z | 2026-04-30T17:22:16Z |
| suse-su-2026:21437-1 | Security update for himmelblau | 2026-04-30T17:06:48Z | 2026-04-30T17:06:48Z |
| suse-su-2026:21436-1 | Security update for freerdp | 2026-04-30T16:54:05Z | 2026-04-30T16:54:05Z |
| suse-su-2026:21452-1 | Security update for curl | 2026-04-30T14:46:10Z | 2026-04-30T14:46:10Z |
| suse-su-2026:21461-1 | Security update for helm | 2026-04-30T13:22:50Z | 2026-04-30T13:22:50Z |
| suse-su-2026:21434-1 | Security update for helm | 2026-04-30T13:22:50Z | 2026-04-30T13:22:50Z |
| suse-su-2026:1662-1 | Security update for glibc-livepatches | 2026-04-30T13:16:20Z | 2026-04-30T13:16:20Z |
| suse-su-2026:1661-1 | Security update for the Linux Kernel | 2026-04-30T12:05:10Z | 2026-04-30T12:05:10Z |
| suse-su-2026:21428-1 | Security update for libssh | 2026-04-30T09:40:57Z | 2026-04-30T09:40:57Z |
| suse-su-2026:21396-1 | Security update for libssh | 2026-04-30T09:40:57Z | 2026-04-30T09:40:57Z |
| suse-su-2026:1660-1 | Security update for libheif | 2026-04-29T14:38:03Z | 2026-04-29T14:38:03Z |
| suse-su-2026:21433-1 | Security update for openexr | 2026-04-29T14:30:55Z | 2026-04-29T14:30:55Z |
| suse-su-2026:21432-1 | Security update for ntfs-3g_ntfsprogs | 2026-04-29T14:20:44Z | 2026-04-29T14:20:44Z |
| suse-su-2026:21431-1 | Security update for python-PyNaCl | 2026-04-29T14:15:39Z | 2026-04-29T14:15:39Z |
| suse-su-2026:21450-1 | Security update for vim | 2026-04-29T11:30:37Z | 2026-04-29T11:30:37Z |
| suse-su-2026:21418-1 | Security update for firewalld | 2026-04-29T11:25:06Z | 2026-04-29T11:25:06Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:8096 | Moderate: perl:5.32 security update | 2026-04-14T00:00:00Z | 2026-04-15T10:32:31Z |
| alsa-2026:7915 | Important: bind9.18 security update | 2026-04-13T00:00:00Z | 2026-04-15T08:47:47Z |
| alsa-2026:7123 | Important: nodejs:22 security update | 2026-04-08T00:00:00Z | 2026-04-15T08:45:14Z |
| alsa-2026:8075 | Important: bind security update | 2026-04-14T00:00:00Z | 2026-04-15T08:24:53Z |
| alsa-2026:6570 | Moderate: kernel security update | 2026-04-06T00:00:00Z | 2026-04-15T08:21:57Z |
| alsa-2026:7002 | Important: nginx security update | 2026-04-08T00:00:00Z | 2026-04-15T08:21:45Z |
| alsa-2026:7259 | Important: git-lfs security update | 2026-04-09T00:00:00Z | 2026-04-15T08:21:23Z |
| alsa-2026:7343 | Important: nginx:1.26 security update | 2026-04-09T00:00:00Z | 2026-04-15T08:12:13Z |
| alsa-2026:7350 | Important: nodejs:24 security update | 2026-04-09T00:00:00Z | 2026-04-15T08:09:29Z |
| alsa-2026:7384 | Critical: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection | 2026-04-10T00:00:00Z | 2026-04-15T08:06:18Z |
| alsa-2026:7668 | Important: nghttp2 security update | 2026-04-13T00:00:00Z | 2026-04-15T08:03:54Z |
| alsa-2026:7671 | Important: firefox security update | 2026-04-13T00:00:00Z | 2026-04-15T08:01:54Z |
| alsa-2026:7679 | Important: perl-XML-Parser security update | 2026-04-13T00:00:00Z | 2026-04-15T08:00:20Z |
| alsa-2026:7896 | Important: nodejs:20 security update | 2026-04-13T00:00:00Z | 2026-04-15T07:58:05Z |
| alsa-2026:6917 | Important: thunderbird security update | 2026-04-07T00:00:00Z | 2026-04-15T07:55:19Z |
| alsa-2026:7009 | Important: grafana-pcp security update | 2026-04-08T00:00:00Z | 2026-04-15T07:53:46Z |
| alsa-2026:7011 | Important: grafana security update | 2026-04-08T00:00:00Z | 2026-04-15T07:52:08Z |
| alsa-2026:7670 | Important: nodejs:24 security update | 2026-04-13T00:00:00Z | 2026-04-15T07:50:26Z |
| alsa-2026:7677 | Important: fontforge security update | 2026-04-13T00:00:00Z | 2026-04-15T07:47:47Z |
| alsa-2026:7992 | Important: golang-github-openprinting-ipp-usb security update | 2026-04-14T00:00:00Z | 2026-04-15T07:46:43Z |
| alsa-2026:7680 | Important: perl-XML-Parser security update | 2026-04-13T00:00:00Z | 2026-04-15T07:45:45Z |
| alsa-2026:7672 | Important: firefox security update | 2026-04-13T00:00:00Z | 2026-04-15T07:44:48Z |
| alsa-2026:7666 | Important: nghttp2 security update | 2026-04-13T00:00:00Z | 2026-04-15T07:43:49Z |
| alsa-2026:7383 | Critical: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection | 2026-04-10T00:00:00Z | 2026-04-15T07:41:21Z |
| alsa-2026:7342 | Important: kea security update | 2026-04-09T00:00:00Z | 2026-04-15T07:38:09Z |
| alsa-2026:7005 | Important: git-lfs security update | 2026-04-08T00:00:00Z | 2026-04-15T07:35:05Z |
| alsa-2026:6817 | Important: capstone security update | 2026-04-07T00:00:00Z | 2026-04-15T07:33:58Z |
| alsa-2026:6825 | Moderate: rsync security update | 2026-04-07T00:00:00Z | 2026-04-15T07:31:08Z |
| alsa-2026:8119 | Important: squid security update | 2026-04-14T00:00:00Z | 2026-04-15T07:19:29Z |
| alsa-2026:1240 | Important: fence-agents security update | 2026-01-26T00:00:00Z | 2026-04-15T07:17:05Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2021-1135 | Heap-use-after-free in prvTidyInsertedToken | 2021-08-16T00:01:09.422775Z | 2026-04-05T14:14:03.564509Z |
| osv-2026-535 | Security exception in org.htmlunit.cyberneko.HTMLTagBalancer.endElement | 2026-04-05T00:10:08.687399Z | 2026-04-05T00:10:08.687736Z |
| osv-2026-534 | Heap-buffer-overflow in cram_encode_container | 2026-04-05T00:10:00.162903Z | 2026-04-05T00:10:00.163328Z |
| osv-2026-532 | Heap-buffer-overflow in regsub | 2026-04-05T00:06:36.291055Z | 2026-04-05T00:06:36.291504Z |
| osv-2022-394 | Incorrect-function-pointer-type in cv::split | 2022-05-04T00:00:27.326853Z | 2026-04-04T14:23:39.520277Z |
| osv-2024-451 | Use-of-uninitialized-value in XpackDynamicTable::_make_space | 2024-05-08T00:14:48.544622Z | 2026-04-03T14:17:40.819969Z |
| osv-2026-518 | Use-of-uninitialized-value in ne_read_block | 2026-04-03T00:21:06.950773Z | 2026-04-03T00:21:06.951035Z |
| osv-2026-514 | Heap-buffer-overflow in format_expand1 | 2026-04-03T00:09:42.155641Z | 2026-04-03T00:09:42.155954Z |
| osv-2026-512 | Heap-buffer-overflow in g_utf8_get_char | 2026-04-03T00:07:59.707776Z | 2026-04-03T00:07:59.708039Z |
| osv-2026-505 | UNKNOWN READ in unsigned int Assimp::StreamReader<true, true>::Get<unsigned int> | 2026-04-02T00:19:34.148188Z | 2026-04-02T00:19:34.148494Z |
| osv-2026-504 | Heap-use-after-free in ObjectStream::getObject | 2026-04-02T00:16:28.228723Z | 2026-04-02T00:16:28.229037Z |
| osv-2022-937 | Use-after-poison in rx_ip | 2022-09-23T00:02:21.434097Z | 2026-04-01T14:27:42.367988Z |
| osv-2022-1201 | Stack-buffer-overflow in msc_zero_object | 2022-11-24T13:00:10.344351Z | 2026-03-31T14:04:55.969741Z |
| osv-2022-1188 | Stack-buffer-overflow in authentic_get_tagged_data | 2022-11-20T13:01:57.719130Z | 2026-03-31T14:04:55.181202Z |
| osv-2023-395 | Stack-buffer-overflow in sc_path_print | 2023-05-14T14:00:57.078498Z | 2026-03-31T14:04:53.759303Z |
| osv-2022-776 | Heap-buffer-overflow in do_job | 2022-08-24T00:00:48.440951Z | 2026-03-28T14:13:55.545096Z |
| osv-2026-461 | UNKNOWN READ in XRef::constructObjectEntry | 2026-03-26T00:17:47.551046Z | 2026-03-26T00:17:47.551361Z |
| osv-2026-455 | UNKNOWN READ in mkv::matroska_segment_c::TrackInit | 2026-03-25T00:20:51.448743Z | 2026-03-25T00:20:51.449185Z |
| osv-2023-216 | Heap-buffer-overflow in H5G__node_cmp3 | 2023-03-23T13:00:48.081705Z | 2026-03-24T16:17:49.377032Z |
| osv-2023-76 | Heap-buffer-overflow in H5SM_delete | 2023-02-18T13:00:50.471845Z | 2026-03-24T15:56:21.323480Z |
| osv-2023-359 | Heap-buffer-overflow in H5MM_memcpy | 2023-05-01T14:02:33.841821Z | 2026-03-24T15:52:15.056909Z |
| osv-2023-392 | Negative-size-param in H5MM_memcpy | 2023-05-13T14:00:26.093088Z | 2026-03-24T15:13:27.688997Z |
| osv-2023-370 | Heap-buffer-overflow in H5FS__sect_link | 2023-05-06T14:01:04.165113Z | 2026-03-24T15:11:55.539963Z |
| osv-2024-387 | Heap-buffer-overflow in H5F_addr_encode | 2024-04-30T00:13:39.184262Z | 2026-03-24T15:11:37.246096Z |
| osv-2023-381 | UNKNOWN READ in H5FL__blk_gc_list | 2023-05-08T14:02:04.934252Z | 2026-03-24T15:11:28.111319Z |
| osv-2023-133 | Heap-buffer-overflow in H5L__extern_traverse | 2023-03-02T13:02:08.499899Z | 2026-03-24T15:07:47.335644Z |
| osv-2023-89 | Heap-buffer-overflow in H5O__mtime_new_encode | 2023-02-21T13:00:30.347876Z | 2026-03-24T14:48:44.199364Z |
| osv-2023-430 | Heap-buffer-overflow in H5MM_xstrdup | 2023-05-26T14:00:26.078002Z | 2026-03-24T14:48:04.919113Z |
| osv-2026-437 | Heap-use-after-free in tf::Executor::_invoke | 2026-03-23T00:02:28.277984Z | 2026-03-23T14:25:41.819255Z |
| osv-2025-169 | Stack-buffer-overflow in utf8_in2 | 2025-02-27T00:07:08.029075Z | 2026-03-21T14:18:54.197384Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0036 | `time-sync` was removed from crates.io due to malicious code | 2026-03-04T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0032 | `dnp3times` was removed from crates.io due to malicious code | 2026-03-04T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0031 | `time_calibrators` was removed from crates.io due to malicious code | 2026-03-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0030 | `time_calibrator` was removed from crates.io due to malicious code | 2026-03-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0028 | `tracing_checks` was removed from crates.io for transitively including malicious code | 2026-02-26T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0027 | `tracings` was removed from crates.io for malicious code | 2026-02-26T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0019 | `tracing-check` was removed from crates.io for malicious code | 2026-02-24T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0018 | `rpc-check` was removed from crates.io for malicious code | 2026-02-24T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0017 | `clob-sdk` was removed from crates.io for malicious code | 2026-02-20T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0016 | `polymarkets-rs-clob-client` was removed from crates.io for malicious code | 2026-02-20T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0015 | `polymarkets-client-sdk` was removed from crates.io for malicious code | 2026-02-19T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0014 | `rpc-check` was removed from crates.io for malicious code | 2026-02-19T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0011 | `polymarket-client-sdks` was removed from crates.io for malicious code | 2026-02-13T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0010 | `polymarket-clients-sdk` was removed from crates.io for malicious code | 2026-02-06T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0152 | `finch_cli_rust` was removed from crates.io for malicious code | 2025-12-09T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0151 | `sha-rst` was removed from crates.io for malicious code | 2025-12-09T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0150 | `finch-rst` was removed from crates.io for malicious code | 2025-12-09T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0148 | `finch-rust` was removed from crates.io for malicious code | 2025-12-05T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0147 | `evm-units` was removed from crates.io for malicious code | 2025-12-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0146 | `sha-rust` was removed from crates.io for malicious code | 2025-12-05T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0145 | `uniswap-utils` was removed from crates.io for malicious code | 2025-12-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2022-0042 | malicious crate `rustdecimal` | 2022-05-10T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0041 | Decompressing invalid data can leak information from uninitialized memory or reused output buffer | 2026-03-17T12:00:00Z | 2026-03-17T16:08:45Z |
| rustsec-2026-0037 | Denial of service in Quinn endpoints | 2026-03-09T12:00:00Z | 2026-03-14T07:21:57Z |
| rustsec-2023-0083 | blurhash: panic on parsing crafted blurhash inputs | 2023-09-19T12:00:00Z | 2026-03-11T10:51:38Z |
| rustsec-2023-0082 | phonenumber: panic on parsing crafted RF3966 phonenumber inputs | 2023-09-19T12:00:00Z | 2026-03-11T10:37:17Z |
| rustsec-2026-0038 | RustSec Advisory | 2026-03-08T12:00:00Z | 2026-03-11T06:21:51Z |
| rustsec-2026-0035 | Cache poisoning via insecure-by-default cache key | 2026-03-04T12:00:00Z | 2026-03-09T20:53:55Z |
| rustsec-2026-0034 | HTTP Request Smuggling via HTTP/1.0 and Transfer-Encoding Misparsing | 2026-03-04T12:00:00Z | 2026-03-09T20:53:55Z |
| rustsec-2026-0033 | HTTP Request Smuggling via Premature Upgrade | 2026-03-04T12:00:00Z | 2026-03-09T20:53:55Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-jre-2023-41074 | 2026-05-08T05:45:35.287Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-25193 | 2026-05-08T05:45:33.646Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22081 | 2026-05-08T05:45:31.965Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22067 | 2026-05-08T05:45:30.427Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22049 | 2026-05-08T05:45:28.960Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22045 | 2026-05-08T05:45:27.443Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22044 | 2026-05-08T05:45:25.769Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22043 | 2026-05-08T05:45:24.280Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22041 | 2026-05-08T05:45:22.740Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22036 | 2026-05-08T05:45:21.195Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22025 | 2026-05-08T05:45:19.703Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-22006 | 2026-05-08T05:45:18.121Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-21968 | 2026-05-08T05:45:16.564Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-21967 | 2026-05-08T05:45:14.997Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-21954 | 2026-05-08T05:45:13.515Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-21939 | 2026-05-08T05:45:11.875Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-21938 | 2026-05-08T05:45:10.126Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-21937 | 2026-05-08T05:45:08.518Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-21930 | 2026-05-08T05:45:06.968Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-21843 | 2026-05-08T05:45:05.416Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-21835 | 2026-05-08T05:45:03.808Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2023-21830 | 2026-05-08T05:45:02.284Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-39399 | 2026-05-08T05:45:00.691Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-34169 | Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets | 2026-05-08T05:44:59.270Z | 2026-05-08T06:11:36.072Z |
| bit-jre-2022-21628 | 2026-05-08T05:44:57.716Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21626 | 2026-05-08T05:44:56.231Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21624 | 2026-05-08T05:44:54.818Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21619 | 2026-05-08T05:44:53.392Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21618 | 2026-05-08T05:44:52.051Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21549 | 2026-05-08T05:44:50.472Z | 2026-05-08T06:11:36.072Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-mw52739 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-09T00:59:39.080550Z | 2026-04-08T06:46:14Z |
| cleanstart-2026-ki25096 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-09T00:59:38.592849Z | 2026-04-08T06:46:14Z |
| cleanstart-2026-ij23041 | In libexpat before 2 | 2026-04-09T01:01:38.269615Z | 2026-04-08T06:46:14Z |
| cleanstart-2026-gy86690 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-09T00:57:57.606656Z | 2026-04-08T06:46:14Z |
| cleanstart-2026-pd43534 | In libexpat before 2 | 2026-04-08T00:39:47.879615Z | 2026-04-07T05:54:38Z |
| cleanstart-2026-mp09743 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-08T00:37:59.326932Z | 2026-04-07T05:54:38Z |
| cleanstart-2026-bb02574 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-08T00:37:58.971684Z | 2026-04-07T05:54:38Z |
| cleanstart-2026-af52025 | In libexpat before 2 | 2026-04-08T00:39:48.013620Z | 2026-04-07T05:54:38Z |
| cleanstart-2026-hx94762 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-07T00:45:34.962189Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-gg94489 | go-retryablehttp prior to 0 | 2026-04-07T00:41:33.578433Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-fu47971 | protojson | 2026-04-07T00:47:07.546790Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-ej93145 | attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames | 2026-04-07T00:44:04.086276Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-bk17545 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-07T00:38:33.362093Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-aj47488 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-04-07T00:40:03.631106Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-fe32006 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-07T00:41:34.518345Z | 2026-04-06T06:37:58Z |
| cleanstart-2026-dp59378 | In libexpat before 2 | 2026-04-07T00:42:33.537935Z | 2026-04-06T06:37:58Z |
| cleanstart-2026-ob18608 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T06:19:25.639311Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-kf75900 | In libexpat before 2 | 2026-04-06T06:20:25.150640Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-jl41223 | In libexpat before 2 | 2026-04-06T06:19:55.229801Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-jg79570 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T06:19:24.747052Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-dz75075 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-06T06:19:24.775093Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-nu19941 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 5.19.3-r1 | 2026-04-06T02:44:20.354882Z | 2026-04-03T13:09:27Z |
| cleanstart-2026-kt07616 | Security fixes for CVE-2026-22735, CVE-2026-22737 applied in versions: 6.2.3-r0 | 2026-04-06T02:44:27.120329Z | 2026-04-03T13:09:27Z |
| cleanstart-2026-kt25851 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-61732, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.87.0-r0, 0.87.0-r1, 0.88.0-r1 | 2026-04-06T02:44:54.790204Z | 2026-04-03T08:04:33Z |
| cleanstart-2026-dq17669 | Security fixes for CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-32287, CVE-2026-33186, CVE-2026-33762, CVE-2026-34165, ghsa-37cx-329c-33x3, ghsa-6g7g-w4f8-9c9x, ghsa-fw7p-63qq-7hpr applied in versions: 1.13.2-r0, 1.14.1-r0, 1.14.1-r1 | 2026-04-06T02:45:34.659600Z | 2026-04-03T07:13:53Z |
| cleanstart-2026-ml41879 | Security fixes for CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-32287, CVE-2026-33186, CVE-2026-33762, CVE-2026-34165, ghsa-37cx-329c-33x3, ghsa-6g7g-w4f8-9c9x, ghsa-fw7p-63qq-7hpr applied in versions: 1.13.2-r0, 1.14.0-r0, 1.14.0-r1, 1.14.1-r0 | 2026-04-06T02:45:36.057138Z | 2026-04-03T07:11:16Z |
| cleanstart-2026-nd57973 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T02:45:57.693609Z | 2026-04-03T07:10:19Z |
| cleanstart-2026-lr09759 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-06T02:46:06.138686Z | 2026-04-03T07:10:19Z |
| cleanstart-2026-li54613 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T02:45:58.881296Z | 2026-04-03T07:10:19Z |
| cleanstart-2026-dm62512 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.35.0-r0 | 2026-04-06T02:48:21.440386Z | 2026-04-03T06:57:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-ale-017 | Multiples vulnérabilités dans Microsoft Exchange | 2021-08-27T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2022-ALE-003 | [MàJ] Vulnérabilité dans l'implémentation du protocole RPC par Microsoft | 2022-04-13T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2022-ALE-001 | [MaJ] Vulnérabilité dans Microsoft Windows | 2022-01-12T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-022 | [MaJ] Vulnérabilité dans Apache Log4j | 2021-12-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-021 | Vulnérabilité dans Microsoft Exchange | 2021-11-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-019 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-09-08T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-017 | Multiples vulnérabilités dans Microsoft Exchange | 2021-08-27T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| CERTFR-2021-ALE-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| certfr-2021-ale-004 | [MàJ] Multiples vulnérabilités dans Microsoft Exchange Server | 2021-03-03T00:00:00.000000 | 2021-07-16T00:00:00.000000 |
| CERTFR-2021-ALE-004 | [MàJ] Multiples vulnérabilités dans Microsoft Exchange Server | 2021-03-03T00:00:00.000000 | 2021-07-16T00:00:00.000000 |
| certfr-2021-ale-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| CERTFR-2021-ALE-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| certfr-2021-ale-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| CERTFR-2021-ALE-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| certfr-2021-ale-007 | [MàJ] Vulnérabilité dans Pulse Connect Secure | 2021-04-20T00:00:00.000000 | 2021-06-21T00:00:00.000000 |
| CERTFR-2021-ALE-007 | [MàJ] Vulnérabilité dans Pulse Connect Secure | 2021-04-20T00:00:00.000000 | 2021-06-21T00:00:00.000000 |
| certfr-2021-ale-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0433 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-04-14T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| certfr-2026-avi-0432 | Multiples vulnérabilités dans les produits Siemens | 2026-04-14T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| certfr-2026-avi-0431 | Multiples vulnérabilités dans Synology SSL VPN Client | 2026-04-14T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| certfr-2026-avi-0430 | Multiples vulnérabilités dans Python | 2026-04-14T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| certfr-2026-avi-0320 | Multiples vulnérabilités dans Roundcube | 2026-03-19T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| certfr-2026-avi-0429 | Vulnérabilité dans Adobe Acrobat | 2026-04-13T00:00:00.000000 | 2026-04-13T00:00:00.000000 |
| certfr-2026-avi-0428 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-13T00:00:00.000000 | 2026-04-13T00:00:00.000000 |
| certfr-2026-avi-0427 | Multiples vulnérabilités dans Microsoft Edge | 2026-04-13T00:00:00.000000 | 2026-04-13T00:00:00.000000 |
| certfr-2026-avi-0426 | Multiples vulnérabilités dans Python | 2026-04-13T00:00:00.000000 | 2026-04-13T00:00:00.000000 |
| certfr-2026-avi-0425 | Vulnérabilité dans Foxit PDF Services API | 2026-04-13T00:00:00.000000 | 2026-04-13T00:00:00.000000 |
| certfr-2026-avi-0424 | Multiples vulnérabilités dans les produits IBM | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0423 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0422 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0421 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0420 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0419 | Multiples vulnérabilités dans Mattermost Desktop App | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0418 | Multiples vulnérabilités dans Apache Tomcat | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0417 | Vulnérabilité dans Spring Cloud Gateway | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0416 | Vulnérabilité dans les produits Juniper Networks | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0415 | Multiples vulnérabilités dans Tenable Security Center | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0414 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0413 | Multiples vulnérabilités dans les produits Elastic | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0412 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0411 | Multiples vulnérabilités dans Mitel MiCollab | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0410 | Multiples vulnérabilités dans GitLab | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0409 | Multiples vulnérabilités dans Sonicwall Secure Mobile Access | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0408 | Multiples vulnérabilités dans les produits Juniper Networks | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0407 | Multiples vulnérabilités dans Google Chrome | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0406 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-08T00:00:00.000000 | 2026-04-08T00:00:00.000000 |
| certfr-2026-avi-0405 | Vulnérabilité dans les produits Moxa | 2026-04-08T00:00:00.000000 | 2026-04-08T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2021-000081 | Multiple vulnerabilities in Sharp NEC Display Solutions' public displays | 2021-09-17T15:13+09:00 | 2025-12-10T10:24+09:00 |
| jvndb-2025-021305 | Android App "Brother iPrint&Scan" improper use of an external cache directory | 2025-12-09T17:25+09:00 | 2025-12-09T17:25+09:00 |
| jvndb-2025-000114 | ELECOM Clone for Windows registers a Windows service with an unquoted file path | 2025-12-09T17:16+09:00 | 2025-12-09T17:16+09:00 |
| jvndb-2025-000116 | GS Yuasa FULLBACK Manager Pro registers Windows services with unquoted file paths | 2025-12-08T14:06+09:00 | 2025-12-08T14:06+09:00 |
| jvndb-2025-000094 | Multiple vulnerabilities in ABB Terra AC Wallbox | 2025-12-05T14:12+09:00 | 2025-12-05T14:12+09:00 |
| jvndb-2025-000112 | Installer of INZONE Hub may insecurely load Dynamic Link Libraries | 2025-11-28T13:36+09:00 | 2025-11-28T13:36+09:00 |
| jvndb-2025-000111 | SwitchBot Smart Video Doorbell vulnerable to active debug code | 2025-11-26T14:35+09:00 | 2025-11-26T14:35+09:00 |
| jvndb-2025-000110 | Multiple vulnerabilities in Security Point (Windows) of MaLion | 2025-11-25T17:17+09:00 | 2025-11-25T17:17+09:00 |
| jvndb-2025-000109 | Multiple vulnerabilities in SNC-CX600W | 2025-11-25T14:59+09:00 | 2025-11-25T14:59+09:00 |
| jvndb-2025-000108 | "FOD" App uses hard-coded cryptographic keys | 2025-11-25T14:15+09:00 | 2025-11-25T14:15+09:00 |
| jvndb-2025-000106 | Multiple vulnerabilities in LogStare Collector | 2025-11-21T16:27+09:00 | 2025-11-21T16:27+09:00 |
| jvndb-2025-000107 | Installer of RakurakuMusen Start EX for Windows may insecurely load Dynamic Link Libraries | 2025-11-19T16:22+09:00 | 2025-11-19T16:22+09:00 |
| jvndb-2025-000097 | "Dejira" App for iOS vulnerable to improper server certificate verification | 2025-11-17T14:09+09:00 | 2025-11-17T14:09+09:00 |
| jvndb-2025-000105 | NCP-HG100 vulnerable to OS command injection | 2025-11-14T15:26+09:00 | 2025-11-14T15:26+09:00 |
| jvndb-2025-000104 | Multiple vulnerabilities in GNU Libmicrohttpd | 2025-11-10T15:07+09:00 | 2025-11-10T15:07+09:00 |
| jvndb-2025-000103 | Use of password hash with insufficient computational effort vulnerability in BUFFALO Wi-Fi router "WSR-1800AX4 series" | 2025-11-07T15:39+09:00 | 2025-11-07T15:39+09:00 |
| jvndb-2025-000102 | CLUSTERPRO X and EXPRESSCLUSTER X vulnerable to OS command injection | 2025-11-07T14:55+09:00 | 2025-11-07T14:55+09:00 |
| jvndb-2025-000101 | GROWI vulnerable to stored cross-site scripting | 2025-11-06T13:45+09:00 | 2025-11-06T13:45+09:00 |
| jvndb-2024-013260 | Multiple vulnerabilities in Edgecross Basic Software for Windows | 2024-11-22T10:59+09:00 | 2025-11-04T16:41+09:00 |
| jvndb-2025-017972 | Multiple vulnerabilities in Century Systems FutureNet MA and IP-K series | 2025-11-04T16:37+09:00 | 2025-11-04T16:37+09:00 |
| jvndb-2025-000100 | Multiple Roboticsware products register Windows services with unquoted file paths | 2025-11-04T14:17+09:00 | 2025-11-04T14:17+09:00 |
| jvndb-2025-000098 | Optical Disc Archive Software (for Windows) registers a Windows service with an unquoted file path | 2025-11-04T13:51+09:00 | 2025-11-04T13:51+09:00 |
| jvndb-2025-000099 | Progress Flowmon vulnerable to authenticated OS command injection | 2025-11-04T12:47+09:00 | 2025-11-04T12:47+09:00 |
| jvndb-2025-000096 | Installer of WTW EAGLE (for Windows) may insecurely load Dynamic Link Libraries | 2025-10-29T14:17+09:00 | 2025-10-29T14:17+09:00 |
| jvndb-2025-000095 | MZK-DP300N uses hard-coded credentials | 2025-10-28T14:04+09:00 | 2025-10-28T14:04+09:00 |
| jvndb-2025-014793 | NIHON KOHDEN Central Monitor CNS-6201 vulnerable to NULL pointer dereference | 2025-10-01T11:35+09:00 | 2025-10-27T12:28+09:00 |
| jvndb-2025-000093 | Multiple stored cross-site scripting vulnerabilities in Pleasanter | 2025-10-24T15:11+09:00 | 2025-10-24T15:11+09:00 |
| jvndb-2025-000084 | GROWI vulnerable to cross-site scripting | 2025-10-22T15:44+09:00 | 2025-10-22T15:44+09:00 |
| jvndb-2025-000090 | Multiple stored cross-site scripting vulnerabilities in Movable Type | 2025-10-22T13:54+09:00 | 2025-10-22T13:54+09:00 |
| jvndb-2025-000088 | Lanscope Endpoint Manager (On-Premises) vulnerable to improper verification of source of a communication channel | 2025-10-20T16:17+09:00 | 2025-10-22T10:06+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-18378 | Endian Firewall ADDRESS BCC参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18377 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18377) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18376 | Endian Firewall REMARK参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18375 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18375) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18373 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18373) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18370 | Endian Firewall new_cert_name参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18365 | Endian Firewall remark参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18568 | ToToLink A3300R cstecgi.cgi url参数命令注入漏洞 | 2026-04-24 | 2026-04-23 |
| cnvd-2026-18335 | Schneider Electric EcoStruxure Foxboro DCS代码问题漏洞 | 2026-03-17 | 2026-04-23 |
| cnvd-2026-18334 | Schneider Electric EcoStruxure Automation Expert代码注入漏洞 | 2026-03-17 | 2026-04-23 |
| cnvd-2026-18333 | Delta Electronics ASDA-Soft栈缓冲区溢出漏洞 | 2026-04-09 | 2026-04-23 |
| cnvd-2026-18332 | Schneider Electric PowerChute Serial Shutdown路径遍历漏洞 | 2026-04-15 | 2026-04-23 |
| cnvd-2026-18331 | Schneider Electric PowerChute Serial Shutdown CRLF注入漏洞 | 2026-04-15 | 2026-04-23 |
| cnvd-2026-18330 | Schneider Electric PowerChute Serial Shutdown日志信息泄露漏洞 | 2026-04-15 | 2026-04-23 |
| cnvd-2026-18329 | Schneider Electric PowerChute Serial Shutdown拒绝服务漏洞 | 2026-04-15 | 2026-04-23 |
| cnvd-2026-18328 | Schneider Electric PowerChute Serial Shutdown安全绕过漏洞(CNVD-2026-18328) | 2026-04-15 | 2026-04-23 |
| cnvd-2026-18327 | Schneider Electric PowerChute Serial Shutdown安全绕过漏洞 | 2026-04-15 | 2026-04-23 |
| cnvd-2026-18326 | Schneider Electric PowerChute Serial Shutdown资源管理错误漏洞 | 2026-04-15 | 2026-04-23 |
| cnvd-2026-18155 | StudioCMS信息泄露漏洞(CNVD-2026-18155) | 2026-02-03 | 2026-04-22 |
| cnvd-2026-18154 | StudioCMS存在未明漏洞(CNVD-2026-18154) | 2026-03-17 | 2026-04-22 |
| cnvd-2026-18153 | StudioCMS存在未明漏洞(CNVD-2026-18153) | 2026-03-17 | 2026-04-22 |
| cnvd-2026-18152 | StudioCMS授权问题漏洞 | 2026-03-17 | 2026-04-22 |
| cnvd-2026-18151 | StudioCMS存在未明漏洞(CNVD-2026-18151) | 2026-03-17 | 2026-04-22 |
| cnvd-2026-18150 | StudioCMS存在未明漏洞(CNVD-2026-18150) | 2026-03-17 | 2026-04-22 |
| cnvd-2026-18149 | StudioCMS存在未明漏洞 | 2026-03-17 | 2026-04-22 |
| cnvd-2026-18148 | StudioCMS信息泄露漏洞 | 2026-03-20 | 2026-04-22 |
| cnvd-2026-18147 | PraisonAI存在未明漏洞(CNVD-2026-18147) | 2026-04-20 | 2026-04-22 |
| cnvd-2026-18146 | PraisonAI存在未明漏洞 | 2026-04-20 | 2026-04-22 |
| cnvd-2026-18145 | PraisonAI操作系统命令注入漏洞(CNVD-2026-18145) | 2026-04-20 | 2026-04-22 |
| cnvd-2026-18144 | PraisonAI SQL注入漏洞 | 2026-04-20 | 2026-04-22 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15748 | Уязвимость драйвера net/usb/asix_devices.c ядра операционной системы Linux, позволяющая н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15746 | Уязвимость компонента net/netlink/af_netlink.c ядра операционной системы Linux, позволяющ… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15745 | Уязвимость компонента fs/smb/client/smb2ops.c ядра операционной системы Linux, позволяюща… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15744 | Уязвимость компонента sound/usb/validate.c ядра операционной системы Linux, позволяющая н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15743 | Уязвимость компонента netfilter ядра операционной системы Linux, позволяющая нарушителю п… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15741 | Уязвимость драйвера ppp ядра операционной системы Linux, позволяющая нарушителю вызвать о… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15740 | Уязвимость компонента drm/amd/display ядра операционной системы Linux, позволяющая наруши… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15739 | Уязвимость функции qla4xxx_get_ep_fwdb() драйвера qla4xxx ядра операционной системы Linux… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15733 | Уязвимость компонента trace ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15732 | Уязвимость компонента comedi/drivers/pcl726.c ядра операционной системы Linux, позволяюща… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15731 | Уязвимость драйвера comedi ядра операционной системы Linux, позволяющая нарушителю вызват… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15730 | Уязвимость модуля smb ядра операционной системы Linux, позволяющая нарушителю вызвать отк… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15729 | Уязвимость компонента amdgpu_dm.c ядра операционной системы Linux, позволяющая нарушителю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15728 | Уязвимость компонента s390/char/sclp.c ядра операционной системы Linux, позволяющая наруш… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15724 | Уязвимость компонента NFS ядра операционной системы Linux, позволяющая нарушителю вызвать… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15717 | Уязвимость драйвера acpi/pfr_update.c ядра операционной системы Linux, позволяющая наруши… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15716 | Уязвимость компонента net/ipv6/seg6_hmac.c ядра операционной системы Linux, позволяющая н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15715 | Уязвимость компонента net/hsr/hsr_slave.c ядра операционной системы Linux, позволяющая на… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15714 | Уязвимость компонента drm/amdkfd ядра операционной системы Linux, позволяющая нарушителю … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15713 | Уязвимость компонента qcom/venus/hfi_venus.c ядра операционной системы Linux, позволяющая… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15712 | Уязвимость драйвера rainshadow-cec ядра операционной системы Linux, позволяющая нарушител… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15711 | Уязвимость компонента iio/imu/bno055/bno055.c ядра операционной системы Linux, позволяюща… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15708 | Уязвимость компонента drivers/tty/serial/8250 ядра операционной системы Linux, позволяюща… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15706 | Уязвимость функции nfs_fh_to_dentry() компонента fs/nfs/export.c ядра операционной систем… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15705 | Уязвимость компонента fs/f2fs ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15704 | Уязвимость функции __kmemleak_do_cleanup() компонента mm/kmemleak.c ядра операционной сис… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15703 | Уязвимость компонента fs/btrfs ядра операционной системы Linux, позволяющая нарушителю на… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15702 | Уязвимость компонента fs/jfs ядра операционной системы Linux, позволяющая нарушителю полу… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15701 | Уязвимость функции rcu_preempt_deferred_qs_handler() компонента kernel/rcu/tree_plugin.h … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15696 | Уязвимость компонента net/sched ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202010-1511 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T22:14:35.686000Z |
| var-201912-1854 | An issue existed in the drawing of web page elements. The issue was addressed with improv… | 2024-07-23T22:14:33.774000Z |
| var-200511-0019 | The Internet Key Exchange version 1 (IKEv1) implementation in Check Point products allows… | 2024-07-23T22:14:03.297000Z |
| var-201008-0270 | The WDB target agent debug service in Wind River VxWorks 6.x, 5.x, and earlier, as used o… | 2024-07-23T22:14:01.941000Z |
| var-200904-0819 | Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.… | 2024-07-23T22:12:51.678000Z |
| var-201711-0446 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T22:12:50.009000Z |
| var-201912-0506 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:12:49.908000Z |
| var-200609-0311 | Heap-based buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote at… | 2024-07-23T22:12:46.615000Z |
| var-201905-1248 | Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some m… | 2024-07-23T22:12:08.666000Z |
| var-202007-1133 | Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an … | 2024-07-23T22:12:07.961000Z |
| var-201009-0230 | bgpd in Quagga before 0.99.17 does not properly parse AS paths, which allows remote attac… | 2024-07-23T22:12:06.629000Z |
| var-201806-1488 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T22:12:00.711000Z |
| var-201405-0244 | The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEA… | 2024-07-23T22:12:00.239000Z |
| var-200611-0368 | The (1) Password Manager in Mozilla Firefox 2.0, and 1.5.0.8 and earlier; and the (2) Pas… | 2024-07-23T22:11:59.300000Z |
| var-201806-1436 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T22:11:27.007000Z |
| var-201702-0879 | An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari … | 2024-07-23T22:10:32.463000Z |
| var-200703-0010 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted at… | 2024-07-23T22:10:30.778000Z |
| var-201902-0855 | png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_im… | 2024-07-23T22:10:27.196000Z |
| var-202010-1294 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T22:10:25.978000Z |
| var-201506-0038 | Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to exe… | 2024-07-23T22:10:25.193000Z |
| var-200805-0585 | OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the… | 2024-07-23T22:10:24.233000Z |
| var-202012-1547 | A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel thr… | 2024-07-23T22:10:23.557000Z |
| var-201302-0236 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:10:22.448000Z |
| var-202004-2191 | In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untru… | 2024-07-23T22:10:21.285000Z |
| var-201904-0742 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:10:15.079000Z |
| var-200608-0030 | Unspecified vulnerability in the "compression state handling" in Bom for Apple Mac OS X 1… | 2024-07-23T22:10:15.377000Z |
| var-201912-0608 | A memory corruption issue was addressed with improved input validation. This issue is fix… | 2024-07-23T22:09:37.183000Z |
| var-200505-0162 | Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based … | 2024-07-23T22:09:05.800000Z |
| var-202003-1771 | A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-pro… | 2024-07-23T22:09:01.387000Z |
| var-201506-0465 | The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.… | 2024-07-23T22:08:28.995000Z |