Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-21991 |
5.5 (3.1)
|
A DTrace component, dtprobed, allows arbitrary fi… |
Oracle Corporation |
Oracle Linux |
2026-03-16T21:36:44.856Z | 2026-03-17T13:35:45.790Z |
| CVE-2026-4284 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
taoofagi easegen-admin PPT File PPTUtil.java downloadF… |
taoofagi |
easegen-admin |
2026-03-16T23:02:43.594Z | 2026-03-17T13:34:53.412Z |
| CVE-2026-32384 |
7.5 (3.1)
|
WordPress WpBookingly plugin <= 1.2.9 - Local File Inc… |
magepeopleteam |
WpBookingly |
2026-03-13T11:42:09.282Z | 2026-03-17T13:34:28.272Z |
| CVE-2026-4287 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Tiandy Easy7 Integrated Management Platform Endpoint q… |
Tiandy |
Easy7 Integrated Management Platform |
2026-03-16T23:33:17.024Z | 2026-03-17T13:34:00.118Z |
| CVE-2026-4288 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Tiandy Easy7 Integrated Management Platform Endpoint g… |
Tiandy |
Easy7 Integrated Management Platform |
2026-03-17T00:02:39.811Z | 2026-03-17T13:33:29.998Z |
| CVE-2026-4289 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Tiandy Easy7 Integrated Management Platform getRecByTe… |
Tiandy |
Easy7 Integrated Management Platform |
2026-03-17T00:03:10.717Z | 2026-03-17T13:32:52.355Z |
| CVE-2026-32393 |
7.5 (3.1)
|
WordPress Greenly Theme Addons plugin < 8.2 - Local Fi… |
Creatives_Planet |
Greenly Theme Addons |
2026-03-13T11:42:10.976Z | 2026-03-17T13:30:15.377Z |
| CVE-2026-32401 |
7.2 (3.1)
|
WordPress Client Invoicing by Sprout Invoices plugin <… |
BoldGrid |
Client Invoicing by Sprout Invoices |
2026-03-13T11:42:12.509Z | 2026-03-17T13:28:39.690Z |
| CVE-2026-2579 |
7.5 (3.1)
|
WowStore – Store Builder & Product Blocks for WooComme… |
wpxpo |
WowStore – Store Builder & Product Blocks for WooCommerce |
2026-03-17T01:24:28.737Z | 2026-03-17T13:27:36.715Z |
| CVE-2026-0708 |
8.3 (3.1)
|
Libucl: libucl: denial of service via embedded null by… |
libucl |
libucl |
2026-03-17T02:28:08.429Z | 2026-03-17T13:26:47.057Z |
| CVE-2026-4307 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
frdel/agent0ai agent-zero files.py get_abs_path path t… |
frdel |
agent-zero |
2026-03-17T03:32:07.609Z | 2026-03-17T13:25:49.019Z |
| CVE-2026-2373 |
5.3 (3.1)
|
Royal Addons for Elementor – Addons and Templates Kit … |
wproyal |
Royal Addons for Elementor – Addons and Templates Kit for Elementor |
2026-03-17T03:36:25.155Z | 2026-03-17T13:25:15.811Z |
| CVE-2026-4308 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
frdel/agent0ai agent-zero document_query.py handle_pdf… |
frdel |
agent-zero |
2026-03-17T04:02:07.980Z | 2026-03-17T13:22:56.803Z |
| CVE-2026-4258 |
7.5 (3.1)
|
All versions of the package sjcl are vulnerable t… |
n/a |
sjcl |
2026-03-17T05:00:04.199Z | 2026-03-17T13:22:11.049Z |
| CVE-2026-4173 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
CodePhiliaX Chat2DB Database Export DMDBManage.java up… |
CodePhiliaX |
Chat2DB |
2026-03-15T09:02:08.163Z | 2026-03-17T13:20:49.751Z |
| CVE-2026-3237 |
2.3 (4.0)
|
In affected versions of Octopus Server it was pos… |
Octopus Deploy |
Octopus Server |
2026-03-17T06:37:59.369Z | 2026-03-17T13:20:24.029Z |
| CVE-2026-4285 |
5.1 (4.0)
2.7 (3.1)
2.7 (3.0)
|
taoofagi easegen-admin Pdf2MdUtil.java recognizeMarkdo… |
taoofagi |
easegen-admin |
2026-03-16T23:32:42.192Z | 2026-03-17T13:20:20.802Z |
| CVE-2026-4312 |
9.3 (4.0)
9.8 (3.1)
|
DrangSoft|GCB/FCB Audit Software - Missing Authentication |
DrangSoft |
GCB/FCB Audit Software |
2026-03-17T07:29:17.331Z | 2026-03-17T13:19:44.908Z |
| CVE-2026-32405 |
5.3 (3.1)
|
WordPress WoodMart theme <= 8.3.9 - Sensitive Data Exp… |
xtemos |
WoodMart |
2026-03-13T11:42:13.263Z | 2026-03-17T13:18:27.006Z |
| CVE-2026-1323 |
5.2 (4.0)
|
Insecure Deserialization in extension "Mailqueue" (mai… |
TYPO3 |
Extension "Mailqueue" |
2026-03-17T08:33:05.160Z | 2026-03-17T13:18:18.900Z |
| CVE-2026-4202 |
2.3 (4.0)
|
Broken Access Control in extension "Redirect Tab" |
TYPO3 |
Extension "Redirect Tabs" |
2026-03-17T08:33:40.968Z | 2026-03-17T13:17:40.134Z |
| CVE-2026-4208 |
7.7 (4.0)
|
Authentication Bypass in extension "E-Mail MFA Provide… |
TYPO3 |
Extension "E-Mail MFA Provider" |
2026-03-17T08:34:52.141Z | 2026-03-17T13:17:07.532Z |
| CVE-2026-32415 |
5 (3.1)
|
WordPress Squeeze plugin <= 1.7.7 - Directory Traversa… |
Bogdan Bendziukov |
Squeeze |
2026-03-13T11:42:15.203Z | 2026-03-17T13:13:32.052Z |
| CVE-2026-4271 |
5.3 (3.1)
|
Libsoup: libsoup: denial of service via use-after-free… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-17T11:14:21.284Z | 2026-03-17T13:04:28.101Z |
| CVE-2026-3634 |
3.9 (3.1)
|
Libsoup: libsoup: http header injection and response s… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-17T09:44:19.631Z | 2026-03-17T13:03:07.736Z |
| CVE-2026-3632 |
3.9 (3.1)
|
Libsoup: libsoup: http smuggling and server-side reque… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-17T09:44:19.758Z | 2026-03-17T13:02:07.183Z |
| CVE-2026-3633 |
3.9 (3.1)
|
Libsoup: libsoup: header and http request injection vi… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-17T09:44:19.794Z | 2026-03-17T12:59:56.047Z |
| CVE-2026-32586 |
5.3 (3.1)
|
WordPress Booster for WooCommerce plugin < 7.11.3 - Br… |
Pluggabl |
Booster for WooCommerce |
2026-03-17T08:24:13.299Z | 2026-03-17T12:58:30.886Z |
| CVE-2025-31966 |
2.7 (3.1)
|
Boolean-Based SQL Injection in Multiple Unica Components |
HCL |
Sametime |
2026-03-17T11:29:21.144Z | 2026-03-17T12:57:24.795Z |
| CVE-2025-62320 |
4.7 (3.1)
|
HTML Injection Leading to Data Exfiltration to Externa… |
HCL |
Sametime |
2026-03-17T12:02:08.881Z | 2026-03-17T12:56:51.604Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-28779 |
N/A
|
Apache Airflow: Path of session token in cookie does n… |
Apache Software Foundation |
Apache Airflow |
2026-03-17T10:15:59.132Z | 2026-03-17T13:45:02.518Z |
| CVE-2026-28563 |
N/A
|
Apache Airflow: DAG authorization bypass |
Apache Software Foundation |
Apache Airflow |
2026-03-17T10:54:57.439Z | 2026-03-17T15:41:15.403Z |
| CVE-2026-30911 |
N/A
|
Apache Airflow: Execution API HITL Endpoints Missing P… |
Apache Software Foundation |
Apache Airflow |
2026-03-17T10:53:02.587Z | 2026-03-17T13:42:05.272Z |
| CVE-2021-47254 |
N/A
|
gfs2: Fix use-after-free in gfs2_glock_shrink_scan |
Linux |
Linux |
2024-05-21T14:19:49.475Z | 2025-05-21T08:31:40.360Z |
| CVE-2024-42079 |
N/A
|
gfs2: Fix NULL pointer dereference in gfs2_log_flush |
Linux |
Linux |
2024-07-29T15:52:41.360Z | 2026-02-12T08:19:19.560Z |
| CVE-2023-52658 |
N/A
|
Revert "net/mlx5: Block entering switchdev mode with n… |
Linux |
Linux |
2024-05-17T12:01:24.220Z | 2026-02-06T16:30:40.934Z |
| CVE-2024-26798 |
N/A
|
fbcon: always restore the old font data in fbcon_do_se… |
Linux |
Linux |
2024-04-04T08:20:27.195Z | 2026-02-06T16:30:52.928Z |
| CVE-2024-26822 |
N/A
|
smb: client: set correct id, uid and cruid for multius… |
Linux |
Linux |
2024-04-17T09:43:49.221Z | 2026-02-19T15:39:08.700Z |
| CVE-2024-26655 |
N/A
|
Fix memory leak in posix_clock_open() |
Linux |
Linux |
2024-04-01T14:58:20.433Z | 2026-02-06T16:30:51.698Z |
| CVE-2022-50534 |
N/A
|
dm thin: Use last transaction's pmd->root when commit failed |
Linux |
Linux |
2025-10-07T15:19:23.958Z | 2025-10-07T15:19:23.958Z |
| CVE-2026-32705 |
6.8 (3.1)
|
PX4 autopilot BST Device Name Length Can Overflow Driv… |
PX4 |
PX4-Autopilot |
2026-03-13T21:15:55.509Z | 2026-03-17T16:03:00.531Z |
| CVE-2026-26801 |
7.5 (3.1)
|
Server-Side Request Forgery (SSRF) vulnerability … |
n/a |
n/a |
2026-03-10T00:00:00.000Z | 2026-03-17T16:36:36.743Z |
| CVE-2025-70995 |
8.8 (3.1)
|
An issue in Aranda Service Desk Web Edition (ASDK… |
n/a |
n/a |
2026-03-05T00:00:00.000Z | 2026-03-17T16:07:54.123Z |
| CVE-2025-66213 |
9.4 (4.0)
|
Coolify Vulnerable to Authenticated Remote Code Execut… |
coollabsio |
coolify |
2025-12-23T22:06:38.995Z | 2026-03-17T16:16:15.316Z |
| CVE-2025-66212 |
9.4 (4.0)
|
Coolify Vulnerable to Authenticated Remote Code Execut… |
coollabsio |
coolify |
2025-12-23T22:04:18.883Z | 2026-03-17T16:16:59.807Z |
| CVE-2025-66211 |
9.4 (4.0)
|
Coolify Vulnerable to Authenticated Remote Code Execut… |
coollabsio |
coolify |
2025-12-23T22:00:36.081Z | 2026-03-17T16:18:26.310Z |
| CVE-2025-66210 |
9.4 (4.0)
|
Coolify Vulnerable to Authenticated Remote Code Execut… |
coollabsio |
coolify |
2025-12-23T21:49:44.710Z | 2026-03-17T16:20:29.084Z |
| CVE-2025-66209 |
10 (3.1)
|
Coolify Vulnerable to Authenticated Remote Code Execut… |
coollabsio |
coolify |
2025-12-23T21:42:18.324Z | 2026-03-17T16:21:52.380Z |
| CVE-2025-12357 |
6.3 (3.1)
5.3 (4.0)
|
International Standards Organization ISO 15118-2 Impro… |
ISO 15118-2 Network and Application Protocol Requirements |
EV Car Chargers |
2025-10-31T15:33:48.343Z | 2026-03-17T16:05:30.393Z |
| CVE-2022-50535 |
N/A
|
drm/amd/display: Fix potential null-deref in dm_resume |
Linux |
Linux |
2025-10-07T15:21:02.347Z | 2025-12-20T08:50:58.341Z |
| CVE-2022-50533 |
N/A
|
wifi: mac80211: mlme: fix null-ptr deref on failed assoc |
Linux |
Linux |
2025-10-07T15:19:23.277Z | 2025-10-07T15:19:23.277Z |
| CVE-2022-50532 |
N/A
|
scsi: mpt3sas: Fix possible resource leaks in mpt3sas_… |
Linux |
Linux |
2025-10-07T15:19:22.581Z | 2025-10-07T15:19:22.581Z |
| CVE-2026-29120 |
9.2 (4.0)
|
Insecure, Hardcoded Root Password Stored in Anaconda C… |
International Datacasting Corporation |
IDC SFX2100 SuperFlex Satellite Receiver |
2026-03-04T08:10:09.223Z | 2026-03-05T05:56:21.420Z |
| CVE-2026-28777 |
9.2 (4.0)
|
Hardcoded and Insecure Credentials for "User" Local Ac… |
International Datacasting Corporation (IDC) |
SFX2100 Satellite Receiver |
2026-03-04T07:41:29.280Z | 2026-03-05T05:58:56.851Z |
| CVE-2026-28778 |
7.9 (4.0)
|
Hardcoded FTP Credentials and LPE(via Insecure Permiss… |
International Datacasting Corporation (IDC) |
IDC SFX2100 SuperFlex Satellite Receiver |
2026-03-04T07:49:10.824Z | 2026-03-05T05:58:40.991Z |
| CVE-2022-50531 |
N/A
|
tipc: fix an information leak in tipc_topsrv_kern_subscr |
Linux |
Linux |
2025-10-07T15:19:21.911Z | 2025-10-07T15:19:21.911Z |
| CVE-2022-50530 |
N/A
|
blk-mq: fix null pointer dereference in blk_mq_clear_r… |
Linux |
Linux |
2025-10-07T15:19:21.259Z | 2025-10-07T15:19:21.259Z |
| CVE-2022-50529 |
N/A
|
test_firmware: fix memory leak in test_firmware_init() |
Linux |
Linux |
2025-10-07T15:19:20.581Z | 2025-10-07T15:19:20.581Z |
| CVE-2026-29119 |
8.8 (4.0)
|
Hardcoded and Insecure Credentials for "Admin" Account… |
International Datacasting Corporation (IDC) |
SFX2100 Series SuperFlex SatelliteReceiver |
2026-03-04T07:58:16.199Z | 2026-03-05T05:58:16.802Z |
| CVE-2022-50528 |
N/A
|
drm/amdkfd: Fix memory leakage |
Linux |
Linux |
2025-10-07T15:19:19.909Z | 2025-10-07T15:19:19.909Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-15576 | If two sibling jails are restricted to separate filesystem trees, which is to say that neither of t… | 2026-03-09T12:16:11.523 | 2026-03-17T15:54:59.197 |
| fkie_cve-2026-2261 | Due to a programming error, blocklistd leaks a socket descriptor for each adverse event report it r… | 2026-03-09T13:15:57.093 | 2026-03-17T15:54:31.733 |
| fkie_cve-2026-30234 | OpenProject is an open-source, web-based project management software. Prior to 17.2.0, an authentic… | 2026-03-11T16:16:41.383 | 2026-03-17T15:53:21.787 |
| fkie_cve-2026-32778 | libexpat before 2.7.5 allows a NULL pointer dereference in the function setContext on retry after a… | 2026-03-16T14:19:44.970 | 2026-03-17T15:52:53.160 |
| fkie_cve-2026-32777 | libexpat before 2.7.5 allows an infinite loop while parsing DTD content. | 2026-03-16T14:19:44.780 | 2026-03-17T15:52:34.357 |
| fkie_cve-2025-6663 | GStreamer H266 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This … | 2025-07-07T15:15:28.480 | 2026-03-17T15:52:33.870 |
| fkie_cve-2025-47808 | In GStreamer through 1.26.1, the subparse plugin's tmplayer_parse_line function may dereference a N… | 2025-08-07T20:15:27.940 | 2026-03-17T15:52:33.870 |
| fkie_cve-2025-47807 | In GStreamer through 1.26.1, the subparse plugin's subrip_unescape_formatting function may derefere… | 2025-08-07T20:15:27.833 | 2026-03-17T15:52:33.870 |
| fkie_cve-2025-47806 | In GStreamer through 1.26.1, the subparse plugin's parse_subrip_time function may write data past t… | 2025-08-07T20:15:27.730 | 2026-03-17T15:52:33.870 |
| fkie_cve-2025-47219 | In GStreamer through 1.26.1, the isomp4 plugin's qtdemux_parse_trak function may read past the end … | 2025-08-07T20:15:27.627 | 2026-03-17T15:52:33.870 |
| fkie_cve-2025-47183 | In GStreamer through 1.26.1, the isomp4 plugin's qtdemux_parse_tree function may read past the end … | 2025-08-07T20:15:27.507 | 2026-03-17T15:52:33.870 |
| fkie_cve-2025-3887 | GStreamer H265 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This … | 2025-05-22T01:15:54.463 | 2026-03-17T15:52:33.870 |
| fkie_cve-2025-2759 | GStreamer Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerabil… | 2025-05-22T01:15:52.557 | 2026-03-17T15:52:33.870 |
| fkie_cve-2024-47835 | GStreamer is a library for constructing graphs of media-handling components. A null pointer derefer… | 2024-12-12T02:03:43.163 | 2026-03-17T15:52:33.870 |
| fkie_cve-2024-47834 | GStreamer is a library for constructing graphs of media-handling components. An Use-After-Free read… | 2024-12-12T02:03:43.017 | 2026-03-17T15:52:33.870 |
| fkie_cve-2024-47778 | GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerabil… | 2024-12-12T02:03:40.840 | 2026-03-17T15:52:33.870 |
| fkie_cve-2024-47777 | GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerabil… | 2024-12-12T02:03:40.700 | 2026-03-17T15:52:33.870 |
| fkie_cve-2024-47776 | GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been d… | 2024-12-12T02:03:40.557 | 2026-03-17T15:52:33.870 |
| fkie_cve-2024-47775 | GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerabil… | 2024-12-12T02:03:40.430 | 2026-03-17T15:52:33.870 |
| fkie_cve-2024-47774 | GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerabil… | 2024-12-12T02:03:40.297 | 2026-03-17T15:52:33.870 |
| fkie_cve-2024-47615 | GStreamer is a library for constructing graphs of media-handling components. An OOB-Write has been … | 2024-12-12T02:03:32.940 | 2026-03-17T15:52:33.870 |
| fkie_cve-2024-47613 | GStreamer is a library for constructing graphs of media-handling components. A null pointer derefer… | 2024-12-12T02:03:32.740 | 2026-03-17T15:52:33.870 |
| fkie_cve-2024-47607 | GStreamer is a library for constructing graphs of media-handling components. stack-buffer overflow… | 2024-12-12T02:03:32.363 | 2026-03-17T15:52:33.870 |
| fkie_cve-2024-47606 | GStreamer is a library for constructing graphs of media-handling components. An integer underflow h… | 2024-12-12T02:03:32.220 | 2026-03-17T15:52:33.870 |
| fkie_cve-2024-47603 | GStreamer is a library for constructing graphs of media-handling components. A null pointer derefer… | 2024-12-12T02:03:32.033 | 2026-03-17T15:52:33.870 |
| fkie_cve-2024-47602 | GStreamer is a library for constructing graphs of media-handling components. A null pointer derefer… | 2024-12-12T02:03:31.893 | 2026-03-17T15:52:33.870 |
| fkie_cve-2024-47601 | GStreamer is a library for constructing graphs of media-handling components. A null pointer derefer… | 2024-12-12T02:03:31.727 | 2026-03-17T15:52:33.870 |
| fkie_cve-2024-47600 | GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerabil… | 2024-12-12T02:03:31.577 | 2026-03-17T15:52:33.870 |
| fkie_cve-2024-47599 | GStreamer is a library for constructing graphs of media-handling components. A null pointer derefer… | 2024-12-12T02:03:31.440 | 2026-03-17T15:52:33.870 |
| fkie_cve-2024-47598 | GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerabil… | 2024-12-12T02:03:31.283 | 2026-03-17T15:52:33.870 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-j47w-4g3g-c36v |
5.3 (3.1)
|
file-type: ZIP Decompression Bomb DoS via [Content_Types].xml entry | 2026-03-13T20:56:05Z | 2026-03-16T21:59:48Z |
| ghsa-3x67-4c2c-w45m |
8.0 (3.1)
|
Admidio has a Second-Order SQL Injection via List Configuration (lsc_special_field, lsc_sort, lsc_filter) | 2026-03-16T21:19:09Z | 2026-03-16T21:58:08Z |
| ghsa-6j68-gcc3-mq73 |
6.8 (3.1)
|
Admidio Vulnerable to SSRF and Local File Read via Unrestricted URL Fetch in SSO Metadata Endpoint | 2026-03-16T21:17:57Z | 2026-03-16T21:57:59Z |
| ghsa-4484-8v2f-5748 |
8.6 (4.0)
|
Craft CMS vulnerable to behavior injection RCE ElementIndexesController and FieldsController | 2026-03-16T18:13:15Z | 2026-03-16T21:57:50Z |
| ghsa-qx2q-q59v-wf3j |
8.6 (4.0)
|
Craft CMS vulnerable to behavior injection RCE via EntryTypesController | 2026-03-16T18:12:32Z | 2026-03-16T21:57:33Z |
| ghsa-472v-j2g4-g9h2 |
5.3 (4.0)
|
Craft CMS has a Path Traversal Vulnerability in AssetsController | 2026-03-16T18:11:49Z | 2026-03-16T21:57:24Z |
| ghsa-8wg7-wm29-2rvg |
8.5 (4.0)
|
RCE via SSTI for users with permissions to access the Craft CMS Webhooks plugin | 2026-03-16T18:11:23Z | 2026-03-16T21:57:13Z |
| ghsa-p799-g7vv-f279 |
8.3 (4.0)
|
Romeo is vulnerable to Archive Slip due to missing checks in sanitization | 2026-03-16T20:47:02Z | 2026-03-16T21:55:45Z |
| ghsa-f7cq-gvh6-qr25 |
8.3 (4.0)
|
Monitoring is vulnerable to Archive Slip due to missing checks in sanitization | 2026-03-16T20:46:48Z | 2026-03-16T21:55:37Z |
| ghsa-hxm7-9q36-c77f |
7.1 (4.0)
|
Fullchain's Invalid NetworkPolicy enables a malicious actor to pivot into another namespace | 2026-03-16T20:47:15Z | 2026-03-16T21:55:30Z |
| ghsa-mw24-f3xh-j3qv |
7.9 (4.0)
|
Chall-Manager's invalid NetworkPolicy enables a malicious actor to pivot into another namespace | 2026-03-16T20:45:34Z | 2026-03-16T21:55:24Z |
| ghsa-5h2m-4q8j-pqpj |
7.4 (4.0)
|
FastMCP OAuth Proxy token reuse across MCP servers | 2026-03-16T15:14:55Z | 2026-03-16T21:55:10Z |
| ghsa-m344-f55w-2m6j |
8.2 (4.0)
|
Authlib: Fail-Open Cryptographic Verification in OIDC Hash Binding | 2026-03-16T16:15:06Z | 2026-03-16T21:54:15Z |
| ghsa-7432-952r-cw78 |
8.3 (4.0)
|
Authlib Vulnerable to JWE RSA1_5 Bleichenbacher Padding Oracle | 2026-03-16T15:17:28Z | 2026-03-16T21:54:05Z |
| ghsa-wvwj-cvrp-7pv5 |
9.1 (3.1)
|
Authlib JWS JWK Header Injection: Signature Verification Bypass | 2026-03-16T15:17:15Z | 2026-03-16T21:53:55Z |
| ghsa-vffc-f7r7-rx2w |
8.6 (4.0)
|
OpenClaw Improperly Neutralizes Line Breaks in systemd Unit Generation Enables Local Command Execut… | 2026-03-03T21:52:54Z | 2026-03-16T21:51:52Z |
| ghsa-r6wf-4xfg-pw66 |
8.7 (4.0)
|
ZwickRoell Test Data Management versions prior to 3.0.8 contain a local file inclusion (LFI) vulner… | 2026-03-16T21:34:33Z | 2026-03-16T21:34:33Z |
| ghsa-q6ph-8227-6m8x |
3.8 (3.1)
|
Mattermost versions 10.11.x <= 10.11.10 fail to properly validate permission requirements in the te… | 2026-03-16T21:34:33Z | 2026-03-16T21:34:33Z |
| ghsa-xmhw-fjw4-m5qf |
4.3 (3.1)
6.9 (4.0)
|
Raytha CMS is vulnerable to Cross-Site Request Forgery across multiple endpoints. Attacker can craf… | 2026-03-16T15:30:41Z | 2026-03-16T21:34:32Z |
| ghsa-wx9p-57x7-7rh9 |
6.1 (3.1)
5.1 (4.0)
|
Raytha CMS is vulnerable to Reflected XSS via returnUrl parameter in logon functionality. An attack… | 2026-03-16T15:30:42Z | 2026-03-16T21:34:32Z |
| ghsa-wmhj-8382-jc9f |
5.9 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-03-13T21:31:51Z | 2026-03-16T21:34:32Z |
| ghsa-qxww-c4qm-jpg8 |
6.1 (3.1)
|
Cross Site scripting vulnerability (XSS) in NetBox 4.3.5 "comment" field on object forms. An attack… | 2026-03-16T18:32:03Z | 2026-03-16T21:34:32Z |
| ghsa-qj5q-vmr2-gmq3 |
8.8 (3.1)
7.5 (4.0)
|
Raytha CMS allows an attacker to spoof `X-Forwarded-Host` or `Host` headers to attacker controlled … | 2026-03-16T15:30:41Z | 2026-03-16T21:34:32Z |
| ghsa-px48-xw9j-r7fx |
2.7 (3.1)
5.1 (4.0)
|
Raytha CMS is vulnerable to Server-Side Request Forgery in the “Themes - Import from URL” feature. … | 2026-03-16T15:30:41Z | 2026-03-16T21:34:32Z |
| ghsa-pvfh-qxvg-vg95 |
9.8 (3.1)
|
A write-what-where condition in p2r3 Bareiron commit 8e4d40 allows unauthenticated attackers to wri… | 2026-03-16T21:34:32Z | 2026-03-16T21:34:32Z |
| ghsa-hr6p-6rx8-fj77 |
6.1 (3.1)
5.1 (4.0)
|
Raytha CMS is vulnerable to reflected XSS via the backToListUrl parameter. An attacker can craft a … | 2026-03-16T15:30:41Z | 2026-03-16T21:34:32Z |
| ghsa-hhx9-gc5w-h4mc |
5.3 (3.1)
6.9 (4.0)
|
Raytha CMS is vulnerable to User Enumeration in password reset functionality. Difference in message… | 2026-03-16T15:30:41Z | 2026-03-16T21:34:32Z |
| ghsa-h8p2-x23p-rfv3 |
5.4 (3.1)
|
Out-of-bounds read in FFmpeg 8.0 and 8.0.1 RV60 video decoder (libavcodec/rv60dec.c). The quantizat… | 2026-03-16T21:34:32Z | 2026-03-16T21:34:32Z |
| ghsa-gmm3-2cc9-gjxv |
7.5 (3.1)
|
SQL Injection vulnerability in Chyrp v.2.5.2 and before allows a remote attacker to obtain sensitiv… | 2026-03-16T18:32:03Z | 2026-03-16T21:34:32Z |
| ghsa-ffgf-qg52-hgm3 |
9.8 (3.1)
6.9 (4.0)
|
Raytha CMS does not have any brute force protection mechanism implemented. It allows an attacker to… | 2026-03-16T15:30:42Z | 2026-03-16T21:34:32Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-202 |
6.5 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-11-05T19:15:07+00:00 | 2025-01-19T16:22:59.212853+00:00 |
| pysec-2024-201 |
6.1 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-11-05T19:15:05+00:00 | 2025-01-19T16:22:59.154645+00:00 |
| pysec-2024-200 |
7.2 (3.1)
|
JupyterHub is software that allows one to create a multi-user server for Jupyter notebook… | jupyterhub | 2024-08-08T15:15:17+00:00 | 2025-01-19T16:22:58.171761+00:00 |
| pysec-2024-199 |
3.7 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T16:22:57.938459+00:00 |
| pysec-2024-198 |
4.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:11+00:00 | 2025-01-19T16:22:57.845317+00:00 |
| pysec-2024-197 |
5.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T16:22:57.732726+00:00 |
| pysec-2024-196 |
8.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T16:22:57.640183+00:00 |
| pysec-2024-195 |
5.5 (3.1)
|
Use of Web Browser Cache Containing Sensitive Information vulnerability in Apache Airflow… | apache-airflow | 2024-06-14T09:15:09+00:00 | 2025-01-19T16:22:56.419822+00:00 |
| pysec-2024-194 |
6.1 (3.1)
|
A clickjacking vulnerability exists in zenml-io/zenml versions up to and including 0.55.5… | zenml | 2024-06-06T19:15:54+00:00 | 2025-01-19T13:22:31.835293+00:00 |
| pysec-2024-193 |
3.3 (3.1)
|
An issue was discovered in zenml-io/zenml versions up to and including 0.55.4. Due to imp… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-19T13:22:31.701775+00:00 |
| pysec-2024-192 |
|
An issue was discovered in llama_index before 0.10.38. download/integration.py includes a… | llama-index | 2024-08-22T20:15:10+00:00 | 2025-01-19T13:22:29.175614+00:00 |
| pysec-2024-191 |
5.5 (3.1)
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2024-10-24T22:15:04+00:00 | 2025-01-19T10:22:29.812605+00:00 |
| pysec-2024-190 |
8.8 (3.1)
|
Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenti… | apache-airflow | 2024-07-17T08:15:02+00:00 | 2025-01-19T07:21:16.859034+00:00 |
| pysec-2024-189 |
5.4 (3.1)
|
Apache Airflow versions before 2.9.3 have a vulnerability that allows an authenticated at… | apache-airflow | 2024-07-17T08:15:01+00:00 | 2025-01-19T07:21:16.796301+00:00 |
| pysec-2024-188 |
6.1 (3.1)
|
WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Lo… | webob | 2024-08-14T21:15:17+00:00 | 2025-01-19T04:23:01.908824+00:00 |
| pysec-2024-187 |
9.8 (3.1)
|
virtualenv before 20.26.6 allows command injection through the activation scripts for a v… | virtualenv | 2024-11-24T16:15:06+00:00 | 2025-01-19T04:23:01.784352+00:00 |
| pysec-2024-186 |
6.5 (3.1)
|
RestrictedPython is a restricted execution environment for Python to run untrusted code. … | restrictedpython | 2024-09-30T16:15:09+00:00 | 2025-01-19T04:23:01.259448+00:00 |
| pysec-2024-185 |
|
Nebari through 2024.4.1 prints the temporary Keycloak root password. | nebari | 2024-05-06T00:15:10+00:00 | 2025-01-19T04:23:00.951638+00:00 |
| pysec-2024-184 |
7.5 (3.1)
|
A local file inclusion vulnerability exists in the JSON component of gradio-app/gradio ve… | gradio | 2024-06-06T18:15:18+00:00 | 2025-01-19T04:23:00.017053+00:00 |
| pysec-2024-183 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-11-06T15:15:11+00:00 | 2025-01-19T04:22:59.576907+00:00 |
| pysec-2024-182 |
|
Apache Airflow versions before 2.10.3 contain a vulnerability that could expose sensitive… | apache-airflow | 2024-11-15T09:15:14+00:00 | 2025-01-19T04:22:59.398988+00:00 |
| pysec-2024-181 |
6.1 (3.1)
|
Apache Airflow, versions before 2.10.0, have a vulnerability that allows the developer of… | apache-airflow | 2024-08-21T16:15:08+00:00 | 2025-01-19T04:22:59.351008+00:00 |
| pysec-2024-180 |
5.4 (3.1)
|
Stored XSS in organizer and event settings of pretix up to 2024.7.0 allows malicious even… | pretix | 2024-08-23T15:15:17+00:00 | 2025-01-19T01:52:24.493530+00:00 |
| pysec-2024-179 |
4.8 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-03-18T22:15:07+00:00 | 2025-01-19T01:52:24.377662+00:00 |
| pysec-2024-178 |
7.5 (3.1)
|
Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to version 2… | litestar | 2024-11-20T21:15:08+00:00 | 2025-01-19T01:52:23.772726+00:00 |
| pysec-2024-177 |
9.8 (3.1)
|
Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach… | langflow | 2024-06-10T20:15:15+00:00 | 2025-01-19T01:52:23.722576+00:00 |
| pysec-2024-176 |
6.1 (3.1)
|
A reflected Cross-Site Scripting (XSS) vulnerability was identified in zenml-io/zenml ver… | zenml | 2024-06-30T16:15:03+00:00 | 2025-01-18T22:21:45.122426+00:00 |
| pysec-2024-175 |
|
WordOps through 3.20.0 has a wo/cli/plugins/stack_pref.py TOCTOU race condition because t… | wordops | 2024-05-06T00:15:10+00:00 | 2025-01-18T22:21:44.991242+00:00 |
| pysec-2024-174 |
4.3 (3.1)
|
Server-Side Request Forgery (SSRF) vulnerability in Apache StreamPipes during installatio… | streampipes | 2024-07-17T09:15:02+00:00 | 2025-01-18T22:21:43.678475+00:00 |
| pysec-2024-173 |
8.8 (3.1)
|
Unrestricted Upload of File with dangerous type vulnerability in Apache StreamPipes. Such… | streampipes | 2024-07-17T10:15:01+00:00 | 2025-01-18T22:21:43.618882+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33769 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.558897Z |
| gsd-2024-33768 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.521409Z |
| gsd-2024-33767 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.454953Z |
| gsd-2024-33766 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.508057Z |
| gsd-2024-33765 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.328589Z |
| gsd-2024-33764 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.348731Z |
| gsd-2024-33763 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.335356Z |
| gsd-2024-33762 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.364877Z |
| gsd-2024-33761 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.399777Z |
| gsd-2024-33760 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.533361Z |
| gsd-2024-33759 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.447890Z |
| gsd-2024-33758 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.500910Z |
| gsd-2024-33757 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.319530Z |
| gsd-2024-33756 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.430035Z |
| gsd-2024-33755 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.436135Z |
| gsd-2024-33754 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.379823Z |
| gsd-2024-33753 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.430763Z |
| gsd-2024-33752 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.406190Z |
| gsd-2024-33751 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.370177Z |
| gsd-2024-33750 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.304976Z |
| gsd-2024-33749 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.584613Z |
| gsd-2024-33748 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.439408Z |
| gsd-2024-33747 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.485640Z |
| gsd-2024-33746 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.376327Z |
| gsd-2024-33745 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.468253Z |
| gsd-2024-33744 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.543395Z |
| gsd-2024-33743 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.488662Z |
| gsd-2024-33742 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.321372Z |
| gsd-2024-33741 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.568527Z |
| gsd-2024-33740 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.479260Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1360 | Malicious code in npm-doc-build (npm) | 2026-03-12T02:07:51Z | 2026-03-12T02:07:52Z |
| mal-2026-1357 | Malicious code in bign.ts (npm) | 2026-03-12T02:07:51Z | 2026-03-12T02:07:52Z |
| mal-2026-1356 | Malicious code in b2b-common-cb-lib (npm) | 2026-03-12T01:56:30Z | 2026-03-12T01:56:31Z |
| mal-2026-1364 | Malicious code in svg-safety-tool (npm) | 2026-03-12T01:54:01Z | 2026-03-12T01:54:01Z |
| mal-2026-1353 | Malicious code in restrict-imports (npm) | 2026-03-12T01:46:24Z | 2026-03-12T01:46:25Z |
| mal-2026-1352 | Malicious code in jinja-template (npm) | 2026-03-12T01:46:24Z | 2026-03-12T01:46:25Z |
| mal-2026-1295 | Malicious code in tabformerlite (PyPI) | 2026-03-09T17:26:01Z | 2026-03-12T00:30:44Z |
| mal-2026-1350 | Malicious code in falador (PyPI) | 2026-03-11T23:30:12Z | 2026-03-12T00:30:43Z |
| mal-2026-1296 | Malicious code in bpsm (PyPI) | 2026-03-09T17:31:34Z | 2026-03-12T00:30:43Z |
| mal-2026-1294 | Malicious code in causal-canvas (PyPI) | 2026-03-09T17:28:14Z | 2026-03-12T00:30:43Z |
| mal-2026-1144 | Malicious code in roku-aihub (PyPI) | 2026-03-02T23:51:19Z | 2026-03-12T00:30:43Z |
| mal-2026-1351 | Malicious code in faaladorcli (PyPI) | 2026-03-11T23:31:55Z | 2026-03-11T23:31:55Z |
| mal-2026-1348 | Malicious code in locale-clamp-middleware (npm) | 2026-03-11T21:05:46Z | 2026-03-11T21:05:46Z |
| mal-2026-1349 | Malicious code in mabibilabub (npm) | 2026-03-11T20:55:51Z | 2026-03-11T20:55:51Z |
| mal-2026-1346 | Malicious code in ts-lint-builder (npm) | 2026-03-11T16:48:00Z | 2026-03-11T16:48:00Z |
| mal-2026-1345 | Malicious code in npm-builders (npm) | 2026-03-11T16:48:00Z | 2026-03-11T16:48:00Z |
| mal-2026-1344 | Malicious code in bignum-ts (npm) | 2026-03-11T16:48:00Z | 2026-03-11T16:48:00Z |
| mal-2026-1343 | Malicious code in chai-as-flex (npm) | 2026-03-11T13:24:37Z | 2026-03-11T13:24:37Z |
| mal-2026-1342 | Malicious code in collectables (PyPI) | 2026-03-11T12:41:02Z | 2026-03-11T12:41:02Z |
| mal-2026-951 | Malicious code in printrables (PyPI) | 2026-02-20T06:59:50Z | 2026-03-11T10:50:04Z |
| mal-2026-738 | Malicious code in tablescene (PyPI) | 2026-02-04T10:24:43Z | 2026-03-11T10:50:04Z |
| mal-2026-732 | Malicious code in gridifys (PyPI) | 2026-02-04T07:29:56Z | 2026-03-11T10:50:04Z |
| mal-2026-700 | Malicious code in tabulapys (PyPI) | 2026-02-03T10:04:45Z | 2026-03-11T10:50:04Z |
| mal-2026-698 | Malicious code in tableshow (PyPI) | 2026-02-03T09:30:09Z | 2026-03-11T10:50:04Z |
| mal-2026-686 | Malicious code in tableapys (PyPI) | 2026-02-03T07:49:06Z | 2026-03-11T10:50:04Z |
| mal-2026-650 | Malicious code in tableapy (PyPI) | 2026-02-02T12:56:55Z | 2026-03-11T10:50:04Z |
| mal-2026-602 | Malicious code in tableasets (PyPI) | 2026-01-29T11:22:50Z | 2026-03-11T10:50:04Z |
| mal-2026-601 | Malicious code in tableautes (PyPI) | 2026-01-29T10:08:47Z | 2026-03-11T10:50:04Z |
| mal-2026-562 | Malicious code in tabullates (PyPI) | 2026-01-28T07:42:32Z | 2026-03-11T10:50:04Z |
| mal-2026-548 | Malicious code in tabletas (PyPI) | 2026-01-27T18:26:01Z | 2026-03-11T10:50:04Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0116 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-14T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0105 | Red Hat Developer Hub: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0098 | Node.js: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0008 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2026-01-04T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2886 | Red Hat Enterprise Linux (git-lfs, opentelemetry-collector): Mehrere Schwachstellen | 2025-12-18T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2798 | Red Hat OpenShift Service Mesh: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2755 | util-linux: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2025-12-07T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2730 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-02T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2643 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-19T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2637 | Rsync: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-11-18T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2584 | Red Hat Enterprise Linux Ceph Storage: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2518 | Red Hat Enterprise Linux (runc): Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-11-09T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2490 | Red Hat OpenShift Container Platform: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2019-11-20T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2242 | Wireshark: Schwachstelle ermöglicht Denial of Service | 2025-10-08T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2194 | Linux Kernel: Mehrere Schwachstellen | 2025-10-05T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2150 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-09-29T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2045 | expat: Schwachstelle ermöglicht Denial of Service | 2025-09-14T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1932 | Wireshark: Schwachstelle ermöglicht Denial of Service | 2025-08-28T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1883 | Apache Tika: Schwachstelle ermöglicht Infogewinn oder Manipulation | 2025-08-20T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1740 | Golang Go: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-08-06T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1665 | Linux Kernel: Mehrere Schwachstellen | 2025-07-28T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1596 | Linux Kernel: Schwachstelle ermöglicht Denial of Service und nicht spezifizierten Angriff | 2025-07-17T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1350 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-06-17T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1244 | Wireshark: Schwachstelle ermöglicht Denial of Service | 2025-06-04T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1114 | Linux Kernel: Mehrere Schwachstellen | 2025-05-20T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1098 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-05-18T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1034 | screen: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1001 | Intel Prozessoren: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-05-12T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0999 | Linux Kernel: Mehrere Schwachstellen | 2025-05-11T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0991 | Linux Kernel: Mehrere Schwachstellen | 2025-05-08T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-193-02 | Siemens RUGGEDCOM APE 1808 | 2024-07-09T00:00:00.000000Z | 2026-01-14T22:00:11.677616Z |
| icsa-24-074-11 | Siemens RUGGEDCOM APE1808 with Fortigate NGFW Devices | 2024-03-12T00:00:00.000000Z | 2026-01-14T22:00:10.660779Z |
| icsa-24-193-11 | Siemens RUGGEDCOM APE 1808 | 2024-07-09T00:00:00.000000Z | 2026-01-14T22:00:09.701376Z |
| icsa-26-015-09 | Siemens Industrial Edge Device Kit | 2026-01-13T00:00:00.000000Z | 2026-01-14T21:54:58.722065Z |
| icsa-26-013-03 | YoSmart YoLink Smart Hub | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-26-013-02 | Rockwell Automation FactoryTalk DataMosaix Private Cloud | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-26-013-01 | Rockwell Automation 432ES-IG3 Series A | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-25-212-01 | Güralp Systems FMUS Series and MIN Series Devices (Update B) | 2025-07-31T06:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| va-26-013-01 | NSecKrnl driver terminates system processes with crafted IOCTL requests | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| icsa-25-345-03 | AzeoTech DAQFactory (Update A) | 2025-12-11T07:00:00.000000Z | 2026-01-12T07:00:00.000000Z |
| va-26-008-01 | OPEXUS eCASE | 2026-01-08T16:36:15Z | 2026-01-08T16:36:15Z |
| va-26-008-03 | Ideagen DevonWay stored XSS | 2026-01-08T00:00:00Z | 2026-01-08T00:00:00Z |
| icsa-26-008-01 | Hitachi Energy Asset Suite | 2025-12-09T00:00:00.000000Z | 2026-01-07T21:26:16.381953Z |
| va-26-008-02 | OPEXUS eComplaint and eCasePortal IDOR | 2026-01-07T16:35:11Z | 2026-01-07T16:35:11Z |
| icsa-26-006-01 | Columbia Weather Systems MicroServer | 2026-01-06T07:00:00.000000Z | 2026-01-06T07:00:00.000000Z |
| icsma-25-364-01 | WHILL Model C2 Electric Wheelchairs and Model F Power Chairs | 2025-12-30T07:00:00.000000Z | 2025-12-30T07:00:00.000000Z |
| icsa-25-177-01 | Mitsubishi Electric Air Conditioning Systems (Update B) | 2025-06-26T06:00:00.000000Z | 2025-12-23T07:00:00.000000Z |
| icsa-25-352-02 | Schneider Electric EcoStruxure Foxboro DCS Advisor | 2025-12-09T08:00:00.000000Z | 2025-12-18T18:23:06.311869Z |
| icsa-25-352-05 | Siemens Interniche IP-Stack | 2025-12-09T00:00:00.000000Z | 2025-12-18T18:13:59.515670Z |
| icsa-25-352-07 | Rockwell Automation Micro820, Micro850, Micro870 | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-06 | Advantech WebAccess/SCADA | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-04 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electrics Products | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-03 | National Instruments LabView | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-01 | Inductive Automation Ignition | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-24-291-03 | Mitsubishi Electric CNC Series (Update C) | 2024-10-17T06:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| va-25-352-01 | BullWall Ransomware Containment and Server Intrusion Protection multiple vulnerabilities | 2025-12-18T00:00:00Z | 2025-12-18T00:00:00Z |
| icsa-25-350-04 | Mitsubishi Electric GT Designer3 | 2025-12-16T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-25-350-03 | Hitachi Energy AFS, AFR and AFF Series | 2025-12-16T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-25-350-01 | Güralp Systems Fortimus Series, Minimus Series, and Certimus Series | 2025-12-16T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-25-308-01 | Fuji Electric Monitouch V-SFT-6 (Update A) | 2025-11-04T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ucs-ssh-priv-esc-2mzdtdjm | Cisco Integrated Management Controller Privilege Escalation Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-uccx-multi-uhotvpgl | Cisco Unified Contact Center Express Vulnerabilities | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-uccx-editor-rce-ezyyzte8 | Cisco Unified Contact Center Express Editor Remote Code Execution Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-te-endagent-filewrt-zncdqnrj | Cisco ThousandEyes Endpoint Agent for Windows Arbitrary File Delete Vulnerabilities | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ndfc-shkv-snqjtjrp | Cisco Nexus Dashboard Fabric Controller SSH Host Key Validation Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-icm-xss-cfcqhxag | Cisco Unified Intelligent Contact Management Enterprise Cross-Site Scripting Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ccp-info-disc-zygerqpd | Cisco Customer Collaboration Platform Information Disclosure Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-meraki-mx-vpn-dos-qtrhzg2 | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Denial of Service Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:28+00:00 |
| cisco-sa-meraki-mx-vpn-dos-by-qwukqv7x | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Session Takeover and Denial of Service Vulnerability | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:27+00:00 |
| cisco-sa-webex-xss-7teqtfn8 | Cisco Webex Services Cross-Site Scripting Vulnerabilities | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-webex-cache-q4xbkqbg | Cisco Webex Meetings Services HTTP Cache Poisoning Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sna-ssti-dpulqsmz | Cisco Secure Network Analytics Manager Privilege Escalation Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sna-apiacv-4b6x5ysw | Cisco Secure Network Analytics Manager API Authorization Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-ise-restart-ss-uf986g2q | Cisco Identity Services Engine RADIUS Denial of Service Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-duo-ssp-cmd-inj-rcmyrna | Cisco Duo Self-Service Portal Command Injection Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-cuis-priv-esc-3pk96su4 | Cisco Unified Intelligence Center Privilege Escalation Vulnerabilities | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-cucm-kkhzbhr5 | Cisco Unified Communications Products Privilege Escalation Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-contcent-insuffacces-ardovhn8 | Cisco Unified Contact Center Enterprise Cloud Connect Insufficient Access Control Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sdwanarbfile-2zkhkzwj | Cisco Catalyst SD-WAN Manager Arbitrary File Creation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-14T20:04:53+00:00 |
| cisco-sa-sdwan-fileoverwrite-uc9txwh | Cisco Catalyst SD-WAN Manager Arbitrary File Overwrite Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-08T15:55:57+00:00 |
| cisco-sa-wlc-wncd-p6gvt6hl | Cisco IOS XE Software for WLC Wireless IPv6 Clients Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-webui-multi-arnhm4v6 | Cisco IOS XE Software Web-Based Management Interface Vulnerabilities | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-webui-cmdinj-gvn3oknc | Cisco IOS XE Software Web-Based Management Interface Command Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-vmanage-xss-xhn8m5jt | Cisco Catalyst SD-WAN Manager Stored Cross-Site Scripting Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-vmanage-html-inj-gxvtk6zj | Cisco Catalyst SD-WAN Manager Reflected HTML Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-twamp-kv4fhugn | Cisco IOS, IOS XE, and IOS XR Software TWAMP Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-snmpv3-qkeyvzsy | Cisco IOS and IOS XE Software SNMPv3 Configuration Restriction Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-sisf-dos-zgwt4ddy | Multiple Cisco Products Switch Integrated Security Features DHCPv6 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-sdwan-priviesc-wck7bmmt | Cisco Catalyst SD-WAN Manager Privilege Escalation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-netconf-nacm-bypass-tgzv9pmq | Cisco IOS XE Software Model-Driven Programmability Authorization Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-28418 | Vim has Heap-based Buffer Overflow in Emacs tags parsing | 2026-02-02T00:00:00.000Z | 2026-03-10T01:36:41.000Z |
| msrc_cve-2026-28417 | Vim has OS Command Injection in netrw | 2026-02-02T00:00:00.000Z | 2026-03-10T01:36:31.000Z |
| msrc_cve-2026-2297 | SourcelessFileLoader does not use io.open_code() | 2026-03-02T00:00:00.000Z | 2026-03-07T01:04:51.000Z |
| msrc_cve-2026-0031 | In multiple functions of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2026-03-02T00:00:00.000Z | 2026-03-07T01:04:34.000Z |
| msrc_cve-2026-0032 | In multiple functions of mem_protect.c, there is a possible out-of-bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2026-03-02T00:00:00.000Z | 2026-03-07T01:04:27.000Z |
| msrc_cve-2026-27601 | Underscore.js has unlimited recursion in _.flatten and _.isEqual, potential for DoS attack | 2026-03-02T00:00:00.000Z | 2026-03-07T01:04:18.000Z |
| msrc_cve-2026-22701 | filelock Time-of-Check-Time-of-Use (TOCTOU) Symlink Vulnerability in SoftFileLock | 2026-01-02T00:00:00.000Z | 2026-03-07T01:01:21.000Z |
| msrc_cve-2025-68146 | filelock has TOCTOU race condition that allows symlink attacks during lock file creation | 2025-12-02T00:00:00.000Z | 2026-03-07T01:01:15.000Z |
| msrc_cve-2026-26124 | Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability | 2026-03-05T08:00:00.000Z | 2026-03-06T08:00:00.000Z |
| msrc_cve-2026-26122 | Microsoft ACI Confidential Containers Information Disclosure Vulnerability | 2026-03-05T08:00:00.000Z | 2026-03-06T08:00:00.000Z |
| msrc_cve-2026-23651 | Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability | 2026-03-05T08:00:00.000Z | 2026-03-06T08:00:00.000Z |
| msrc_cve-2026-3336 | PKCS7_verify Certificate Chain Validation Bypass in AWS-LC | 2026-03-02T00:00:00.000Z | 2026-03-06T01:38:19.000Z |
| msrc_cve-2026-3338 | PKCS7_verify Signature Validation Bypass in AWS-LC | 2026-03-02T00:00:00.000Z | 2026-03-06T01:38:11.000Z |
| msrc_cve-2026-24821 | A heap-based buffer over-read that might affect a system that compiles untrusted Lua code in turanszkij/WickedEngine. | 2026-01-02T00:00:00.000Z | 2026-03-06T01:38:03.000Z |
| msrc_cve-2026-23238 | romfs: check sb_set_blocksize() return value | 2026-03-02T00:00:00.000Z | 2026-03-06T01:37:52.000Z |
| msrc_cve-2026-23237 | platform/x86: classmate-laptop: Add missing NULL pointer checks | 2026-03-02T00:00:00.000Z | 2026-03-06T01:37:47.000Z |
| msrc_cve-2026-23235 | f2fs: fix out-of-bounds access in sysfs attribute read/write | 2026-03-02T00:00:00.000Z | 2026-03-06T01:37:42.000Z |
| msrc_cve-2026-23234 | f2fs: fix to avoid UAF in f2fs_write_end_io() | 2026-03-02T00:00:00.000Z | 2026-03-06T01:37:37.000Z |
| msrc_cve-2026-26125 | Payment Orchestrator Service Elevation of Privilege Vulnerability | 2026-03-05T08:00:00.000Z | 2026-03-05T08:00:00.000Z |
| msrc_cve-2026-21536 | Microsoft Devices Pricing Program Remote Code Execution Vulnerability | 2026-03-05T08:00:00.000Z | 2026-03-05T08:00:00.000Z |
| msrc_cve-2024-42317 | mm/huge_memory: avoid PMD-size page cache if needed | 2024-08-02T00:00:00.000Z | 2026-03-05T01:42:00.000Z |
| msrc_cve-2024-24856 | NULL pointer deference in acpi_db_convert_to_package of Linux acpi module | 2024-04-02T07:00:00.000Z | 2026-03-05T01:41:50.000Z |
| msrc_cve-2025-37745 | PM: hibernate: Avoid deadlock in hibernate_compressor_param_set() | 2025-05-02T00:00:00.000Z | 2026-03-05T01:41:34.000Z |
| msrc_cve-2025-21985 | drm/amd/display: Fix out-of-bound accesses | 2025-04-02T00:00:00.000Z | 2026-03-05T01:41:14.000Z |
| msrc_cve-2024-57875 | block: RCU protect disk->conv_zones_bitmap | 2025-01-02T00:00:00.000Z | 2026-03-05T01:41:01.000Z |
| msrc_cve-2024-46754 | bpf: Remove tst_run from lwt_seg6local_prog_ops. | 2024-09-01T07:00:00.000Z | 2026-03-05T01:40:37.000Z |
| msrc_cve-2024-53219 | virtiofs: use pages instead of pointer for kernel direct IO | 2024-12-02T00:00:00.000Z | 2026-03-05T01:40:05.000Z |
| msrc_cve-2025-38656 | wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start() | 2025-08-02T00:00:00.000Z | 2026-03-05T01:36:24.000Z |
| msrc_cve-2022-4543 | A flaw named "EntryBleed" was found in the Linux Kernel Page Table Isolation (KPTI). This issue could allow a local attacker to leak KASLR base via prefetch side-channels based on TLB timing for Intel systems. | 2023-01-04T00:00:00.000Z | 2026-03-05T01:35:59.000Z |
| msrc_cve-2025-68121 | Unexpected session resumption in crypto/tls | 2026-02-02T00:00:00.000Z | 2026-03-05T01:09:17.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0354 | Kwetsbaarheid verholpen in Cisco Identity Services Engine | 2025-11-06T12:36:51.591695Z | 2025-11-06T12:36:51.591695Z |
| ncsc-2025-0353 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-11-04T15:03:48.630084Z | 2025-11-04T15:03:48.630084Z |
| ncsc-2025-0352 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-11-04T12:53:15.358078Z | 2025-11-04T12:53:15.358078Z |
| ncsc-2025-0351 | Kwetsbaarheden verholpen in Apple MacOS | 2025-11-04T12:44:25.439757Z | 2025-11-04T12:44:25.439757Z |
| ncsc-2025-0350 | Kwetsbaarheid verholpen in CFMOTO Ride voertuigdatabeheer systemen | 2025-11-04T10:27:59.187171Z | 2025-11-04T10:27:59.187171Z |
| ncsc-2025-0349 | Kwetsbaarheden verholpen in Nagios XI | 2025-11-03T08:27:42.052256Z | 2025-11-03T08:27:42.052256Z |
| ncsc-2025-0348 | Kwetsbaarheden verholpen in Arista Networks producten | 2025-11-03T08:26:39.905306Z | 2025-11-03T08:26:39.905306Z |
| ncsc-2025-0347 | Kwetsbaarheden verholpen in IBM QRadar SIEM | 2025-11-03T08:17:18.981494Z | 2025-11-03T08:17:18.981494Z |
| ncsc-2025-0346 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2025-11-03T08:14:02.972842Z | 2025-11-03T08:14:02.972842Z |
| ncsc-2025-0345 | Kwetsbaarheden verholpen in Rockwell Automation FactoryTalk | 2025-10-31T09:35:00.469498Z | 2025-10-31T09:35:00.469498Z |
| ncsc-2025-0344 | Kwetsbaarheden verholpen in Rockwell Automation COMMS | 2025-10-31T09:34:05.069339Z | 2025-10-31T09:34:05.069339Z |
| ncsc-2025-0343 | Kwetsbaarheid verholpen in Mozilla Firefox | 2025-10-31T09:31:53.270725Z | 2025-10-31T09:31:53.270725Z |
| ncsc-2025-0342 | Kwetsbaarheden verholpen in GitLab Enterprise en Community Edition | 2025-10-27T08:08:17.974767Z | 2025-10-27T09:38:47.073257Z |
| ncsc-2025-0341 | Kwetsbaarheden verholpen in BIND 9 | 2025-10-24T08:19:45.232307Z | 2025-10-27T08:24:03.796638Z |
| ncsc-2025-0310 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-10-14T18:03:45.875739Z | 2025-10-24T11:09:29.790442Z |
| ncsc-2025-0340 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2025-10-23T14:13:39.969386Z | 2025-10-23T14:13:39.969386Z |
| ncsc-2025-0339 | Kwetsbaarheden verholpen in Oracle MySQL | 2025-10-23T14:11:30.111892Z | 2025-10-23T14:11:30.111892Z |
| ncsc-2025-0338 | Kwetsbaarheden verholpen in Oracle JD Edwards EnterpriseOne Tools | 2025-10-23T13:53:27.268400Z | 2025-10-23T13:53:27.268400Z |
| ncsc-2025-0337 | Kwetsbaarheden verholpen in Oracle Java | 2025-10-23T13:51:40.686406Z | 2025-10-23T13:51:40.686406Z |
| ncsc-2025-0336 | Kwetsbaarheden verholpen in Oracle Hyperion | 2025-10-23T13:49:44.344049Z | 2025-10-23T13:49:44.344049Z |
| ncsc-2025-0335 | Kwetsbaarheden verholpen in Oracle Analytics | 2025-10-23T13:45:06.747933Z | 2025-10-23T13:45:06.747933Z |
| ncsc-2025-0333 | Kwetsbaarheden verholpen in Oracle Financial Services | 2025-10-23T13:35:32.902231Z | 2025-10-23T13:35:32.902231Z |
| ncsc-2025-0332 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2025-10-23T13:26:49.210414Z | 2025-10-23T13:26:49.210414Z |
| ncsc-2025-0331 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2025-10-23T13:23:20.471568Z | 2025-10-23T13:23:20.471568Z |
| ncsc-2025-0330 | Kwetsbaarheden verholpen in Oracle Communications producten | 2025-10-23T13:20:15.363063Z | 2025-10-23T13:20:15.363063Z |
| ncsc-2025-0329 | Kwetsbaarheden verholpen in Oracle Commerce | 2025-10-23T07:20:51.213314Z | 2025-10-23T07:20:51.213314Z |
| ncsc-2025-0328 | Kwetsbaarheden verholpen in Oracle Database producten | 2025-10-23T07:19:57.652532Z | 2025-10-23T07:19:57.652532Z |
| ncsc-2025-0327 | Kwetsbaarheden verholpen in Zohocorp's ManageEngine | 2025-10-23T07:18:47.274781Z | 2025-10-23T07:18:47.274781Z |
| ncsc-2025-0326 | Kwetsbaarheden verholpen in Moxa’s netwerkbeveiligingsapparaten | 2025-10-20T13:03:34.436477Z | 2025-10-20T13:03:34.436477Z |
| ncsc-2025-0325 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2025-10-20T12:59:06.729067Z | 2025-10-20T12:59:06.729067Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20273-1 | Security update for 7zip | 2026-02-26T11:53:30Z | 2026-02-26T11:53:30Z |
| opensuse-su-2026:20277-1 | Security update for chromium | 2026-02-26T11:50:46Z | 2026-02-26T11:50:46Z |
| opensuse-su-2026:20271-1 | Security update for python-urllib3_1 | 2026-02-26T09:45:23Z | 2026-02-26T09:45:23Z |
| opensuse-su-2026:20270-1 | Security update for autogen | 2026-02-26T09:10:10Z | 2026-02-26T09:10:10Z |
| opensuse-su-2026:10266-1 | valkey-9.0.3-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10265-1 | qemu-10.2.1-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10264-1 | python311-Flask-3.1.3-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10263-1 | heroic-games-launcher-2.20.0-2.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10262-1 | evolution-data-server-3.58.3-2.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10261-1 | docker-29.2.1_ce-37.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10260-1 | digger-cli-0.6.143-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10259-1 | chromedriver-145.0.7632.116-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10258-1 | busybox-1.37.0-10.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10257-1 | MozillaFirefox-148.0-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:20275-1 | Security update for gimp | 2026-02-25T10:52:32Z | 2026-02-25T10:52:32Z |
| opensuse-su-2026:10256-1 | regclient-0.11.2-1.1 on GA media | 2026-02-25T00:00:00Z | 2026-02-25T00:00:00Z |
| opensuse-su-2026:10255-1 | docker-stable-24.0.9_ce-17.1 on GA media | 2026-02-25T00:00:00Z | 2026-02-25T00:00:00Z |
| opensuse-su-2026:10254-1 | cockpit-tukit-0.1.7~git0.61e54f1-3.1 on GA media | 2026-02-25T00:00:00Z | 2026-02-25T00:00:00Z |
| opensuse-su-2026:10253-1 | cockpit-subscriptions-14.4-4.1 on GA media | 2026-02-25T00:00:00Z | 2026-02-25T00:00:00Z |
| opensuse-su-2026:10252-1 | cockpit-repos-4.7-4.1 on GA media | 2026-02-25T00:00:00Z | 2026-02-25T00:00:00Z |
| opensuse-su-2026:10251-1 | cockpit-packages-4.1-4.1 on GA media | 2026-02-25T00:00:00Z | 2026-02-25T00:00:00Z |
| opensuse-su-2026:10250-1 | cockpit-machines-348-1.1 on GA media | 2026-02-25T00:00:00Z | 2026-02-25T00:00:00Z |
| opensuse-su-2026:10249-1 | cmctl-2.4.1-1.1 on GA media | 2026-02-25T00:00:00Z | 2026-02-25T00:00:00Z |
| opensuse-su-2026:10248-1 | MozillaThunderbird-140.8.0-1.1 on GA media | 2026-02-25T00:00:00Z | 2026-02-25T00:00:00Z |
| opensuse-su-2026:10247-1 | python311-Django4-4.2.28-1.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:10246-1 | libsoup-2_4-1-2.74.3-17.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:10245-1 | libsoup-3_0-0-3.6.6-1.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:10244-1 | libsignal-protocol-c-devel-2.3.3-2.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:10243-1 | freerdp2-2.11.7-5.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:10242-1 | firefox-esr-140.8.0-1.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:10027 | Red Hat Security Advisory: pam security update | 2025-07-01T14:00:54+00:00 | 2026-03-17T15:04:38+00:00 |
| rhsa-2025:10024 | Red Hat Security Advisory: pam security update | 2025-07-01T13:25:43+00:00 | 2026-03-17T15:04:36+00:00 |
| rhsa-2026:4745 | Red Hat Security Advisory: kernel security update | 2026-03-17T15:00:53+00:00 | 2026-03-17T15:02:02+00:00 |
| rhsa-2026:4246 | Red Hat Security Advisory: kernel security update | 2026-03-11T01:14:40+00:00 | 2026-03-17T15:02:02+00:00 |
| rhsa-2026:3964 | Red Hat Security Advisory: kernel-rt security update | 2026-03-09T00:23:12+00:00 | 2026-03-17T15:01:59+00:00 |
| rhsa-2026:3963 | Red Hat Security Advisory: kernel security update | 2026-03-09T00:51:57+00:00 | 2026-03-17T15:01:58+00:00 |
| rhsa-2026:3488 | Red Hat Security Advisory: kernel security update | 2026-03-02T03:27:37+00:00 | 2026-03-17T15:01:58+00:00 |
| rhsa-2026:3066 | Red Hat Security Advisory: kernel security update | 2026-02-23T10:50:56+00:00 | 2026-03-17T15:01:52+00:00 |
| rhsa-2026:2722 | Red Hat Security Advisory: kernel security update | 2026-02-16T12:28:13+00:00 | 2026-03-17T15:01:51+00:00 |
| rhsa-2026:2535 | Red Hat Security Advisory: kernel security update | 2026-02-11T11:58:06+00:00 | 2026-03-17T15:01:48+00:00 |
| rhsa-2026:2282 | Red Hat Security Advisory: kernel security update | 2026-02-09T09:51:59+00:00 | 2026-03-17T15:01:47+00:00 |
| rhsa-2026:1727 | Red Hat Security Advisory: kernel security update | 2026-02-02T15:41:49+00:00 | 2026-03-17T15:01:45+00:00 |
| rhsa-2026:0453 | Red Hat Security Advisory: kernel security update | 2026-01-12T09:30:19+00:00 | 2026-03-17T15:01:45+00:00 |
| rhsa-2026:0445 | Red Hat Security Advisory: kernel security update | 2026-01-12T05:08:44+00:00 | 2026-03-17T15:01:44+00:00 |
| rhsa-2026:0444 | Red Hat Security Advisory: kernel security update | 2026-01-12T03:40:43+00:00 | 2026-03-17T15:01:42+00:00 |
| rhsa-2026:0443 | Red Hat Security Advisory: kernel-rt security update | 2026-01-12T02:42:33+00:00 | 2026-03-17T15:01:42+00:00 |
| rhsa-2025:20518 | Red Hat Security Advisory: kernel security update | 2025-11-11T09:13:24+00:00 | 2026-03-17T15:01:38+00:00 |
| rhsa-2024:2944 | Red Hat Security Advisory: AMQ Broker 7.12.0.OPR.1.GA Container Images release and security update | 2024-05-21T14:04:45+00:00 | 2026-03-17T14:49:44+00:00 |
| rhsa-2022:8938 | Red Hat Security Advisory: Release of OpenShift Serverless 1.26.0 | 2022-12-13T02:11:29+00:00 | 2026-03-17T14:49:44+00:00 |
| rhsa-2022:5673 | Red Hat Security Advisory: Release of containers for OSP 16.2.z director operator tech preview | 2022-07-20T15:48:31+00:00 | 2026-03-17T14:49:42+00:00 |
| rhsa-2022:5201 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.5 security updates and bug fixes | 2022-06-27T19:32:42+00:00 | 2026-03-17T14:49:42+00:00 |
| rhsa-2022:5188 | Red Hat Security Advisory: RHACS 3.69 security update | 2022-06-24T19:42:45+00:00 | 2026-03-17T14:49:42+00:00 |
| rhsa-2022:5069 | Red Hat Security Advisory: OpenShift Container Platform 4.11.0 bug fix and security update | 2022-08-10T10:32:53+00:00 | 2026-03-17T14:49:39+00:00 |
| rhsa-2022:5068 | Red Hat Security Advisory: OpenShift Container Platform 4.11.0 packages and security update | 2022-08-10T10:13:03+00:00 | 2026-03-17T14:49:39+00:00 |
| rhsa-2022:4956 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5 security updates, images, and bug fixes | 2022-06-09T02:03:35+00:00 | 2026-03-17T14:49:37+00:00 |
| rhsa-2022:1681 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.4 security updates and bug fixes | 2022-05-03T16:42:03+00:00 | 2026-03-17T14:49:37+00:00 |
| rhsa-2022:1476 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.3 security updates and bug fixes | 2022-04-21T02:42:32+00:00 | 2026-03-17T14:49:36+00:00 |
| rhsa-2022:1372 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.10.0 enhancement, security & bug fix update | 2022-04-13T18:48:58+00:00 | 2026-03-17T14:49:36+00:00 |
| rhsa-2022:1361 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.10.0 RPM security,enhancement&bugfix update | 2022-04-13T15:33:28+00:00 | 2026-03-17T14:49:34+00:00 |
| rhsa-2022:1276 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.9 security update | 2022-04-07T18:02:07+00:00 | 2026-03-17T14:49:34+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2023-010-03 | EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 | 2023-01-10T17:44:20.000Z | 2023-01-10T17:44:20.000Z |
| sevd-2023-010-04 | EcoStruxure™ Power SCADA Anywhere | 2023-01-10T10:28:35.000Z | 2023-01-10T10:28:35.000Z |
| sevd-2023-010-01 | EcoStruxureTM Machine Expert – HVAC (formerly SoMachine - HVAC) | 2023-01-10T09:28:52.000Z | 2023-01-10T09:28:52.000Z |
| sevd-2022-347-03 | EcoStruxure Power Commission | 2022-12-13T04:28:00.000Z | 2022-12-13T04:28:00.000Z |
| sevd-2022-347-02 | Saitel DR RTU | 2022-12-13T04:12:25.000Z | 2022-12-13T04:12:25.000Z |
| sevd-2021-103-01 | C-Bus Toolkit and C-Gate Server | 2021-04-13T11:17:13.000Z | 2022-11-08T11:17:13.000Z |
| sevd-2021-130-04 | homeLYnk (Wiser For KNX) and spaceLYnk | 2021-05-11T07:30:55.000Z | 2022-11-08T07:30:55.000Z |
| sevd-2022-284-04 | EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 | 2022-10-11T10:45:15.000Z | 2022-10-14T10:45:15.000Z |
| sevd-2022-284-02 | EcoStruxure™ Panel Server Box (PAS900) | 2022-10-11T10:05:49.000Z | 2022-10-11T10:05:49.000Z |
| sevd-2022-284-01 | EcoStruxure™ Operator Terminal Expert and Pro-face BLUE | 2022-10-11T09:48:46.000Z | 2022-10-11T09:48:46.000Z |
| sevd-2020-343-05 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and Associated Communication Modules | 2020-12-08T21:04:43.000Z | 2022-09-13T20:04:43.000Z |
| sevd-2020-343-07 | SNMP Service on Modicon M340 and Associated Communication Modules | 2020-12-08T05:49:51.000Z | 2022-09-13T05:49:51.000Z |
| sevd-2022-256-01 | EcoStruxure Machine SCADA Expert and Pro-face BLUE Open Studio | 2022-09-13T05:45:41.000Z | 2022-09-13T05:45:41.000Z |
| sesb-2019-214-01 | Wind River VxWorks Vulnerabilities (URGENT/11) | 2019-08-02T00:00:00.000Z | 2022-09-13T00:00:00.000Z |
| sevd-2022-193-01 | OPC UA and X80 advanced RTU Modicon Communication Modules | 2022-07-12T04:00:00.000Z | 2022-08-19T06:30:00.000Z |
| sesb-2021-347-01 | Apache Log4j Vulnerabilities (Log4Shell) | 2021-12-13T09:22:58.000Z | 2022-08-09T09:22:58.000Z |
| sevd-2022-221-03 | EcoStruxure™ Control Expert | 2022-08-09T09:14:27.000Z | 2022-08-09T09:14:27.000Z |
| sevd-2020-175-01 | Treck TCP/IP Vulnerabilities (Ripple20) | 2020-06-23T16:00:00.000Z | 2022-08-08T13:57:08.970Z |
| sevd-2022-193-03 | Acti9 PowerTag Link C | 2022-07-12T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2022-193-02 | SpaceLogic C-Bus Home Controller, formerly known as C-Bus Wiser Home Controller MK2 | 2022-07-12T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2021-257-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ for x70 | 2021-09-14T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2021-222-02 | AT&T Labs Compressor (XMilI) and Decompressor (XDemill) used by EcoStruxureTM Control Expert, EcoStruxureTM Process Expert and SCADAPack RemoteConnect™ for x70 | 2021-08-01T07:25:51.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2022-193-04 | Easergy P5 | 2022-07-12T08:55:42.000Z | 2022-07-12T08:55:42.000Z |
| sevd-2022-102-01 | IGSS (Interactive Graphical SCADA System) | 2022-04-12T08:47:25.000Z | 2022-07-12T08:47:25.000Z |
| sevd-2022-067-02 | APC Smart-UPS SMT, SMC, SMX, SCL, SRC, XU, XP, CSH2, SURTD, SMTL, SRT, and select SRTL Series | 2022-03-08T06:30:00.000Z | 2022-06-16T18:30:00.000Z |
| sevd-2022-165-08 | EcoStruxure™ Cybersecurity Admin Expert | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-07 | CanBRASS | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-06 | Schneider Electric C-Bus Home Automation Products | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-05 | EcoStruxure Power Commission | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-04 | Data Center Expert | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-327438 | SSA-327438: Multiple Vulnerabilities in SCALANCE LPE9403 | 2025-05-13T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-091753 | SSA-091753: Multiple Vulnerabilities in Solid Edge Before SE2025 Update 5 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-078892 | SSA-078892: Multiple Vulnerabilities in SINEC NMS Before V4.0 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-426509 | SSA-426509: Multiple Local Code Execution Vulnerabilities in Questa and ModelSim | 2024-10-08T00:00:00Z | 2025-06-17T00:00:00Z |
| ssa-345750 | SSA-345750: Default Credentials in Energy Services Using Elspec G5DFR | 2025-06-10T00:00:00Z | 2025-06-16T00:00:00Z |
| ssa-874353 | SSA-874353: Entity Enumeration Vulnerability in Mendix Runtime | 2025-04-08T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-656895 | SSA-656895: Open Redirect Vulnerability in Teamcenter | 2025-02-11T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-633269 | SSA-633269: Incorrect Authorization Check Vulnerability in Industrial Communication Devices based on SINEC OS before V3.1 | 2025-06-10T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-620799 | SSA-620799: Denial of Service Vulnerability During BLE Pairing in SENTRON Powercenter 1000/1100 | 2024-12-10T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-497656 | SSA-497656: Multiple NTP Vulnerabilities in TIM 4R-IE Devices | 2021-04-13T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-486186 | SSA-486186: Out of Bounds Read Vulnerability in Tecnomatix Plant Simulation Before 2404 | 2025-06-10T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-354569 | SSA-354569: Multiple Vulnerabilities in Palo Alto Networks PAN-OS on RUGGEDCOM APE1808 Devices | 2024-11-22T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-340240 | SSA-340240: Denial of Service Vulnerability in SIRIUS 3RV2921-5M | 2024-10-08T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-162506 | SSA-162506: DHCP Client Vulnerability in SIMOTICS CONNECT 400, Desigo PXC/PXM, APOGEE MEC/MBC/PXC, APOGEE PXC Series, and TALON TC Series | 2020-04-14T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-041082 | SSA-041082: Out of Bounds Read Vulnerability in SiPass Integrated Before V2.95.3.18 | 2025-05-23T00:00:00Z | 2025-05-23T00:00:00Z |
| ssa-556937 | SSA-556937: Multiple Vulnerabilities in VersiCharge AC Series EV Chargers | 2025-05-13T00:00:00Z | 2025-05-14T00:00:00Z |
| ssa-552330 | SSA-552330: System Configuration Password Reset in Siveillance Video V2024 R1 | 2025-05-14T00:00:00Z | 2025-05-14T00:00:00Z |
| ssa-935500 | SSA-935500: Denial of Service Vulnerability in FTP Server of Nucleus RTOS based APOGEE, TALON and Desigo PXC/PXM Products | 2022-10-11T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-901508 | SSA-901508: Multiple Vulnerabilities in INTRALOG WMS Before V5 | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-828116 | SSA-828116: Denial of Service Vulnerability in BACnet ATEC Devices | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-819629 | SSA-819629: Weak Authentication Vulnerability in Industrial Edge Device Kit | 2025-04-08T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-718393 | SSA-718393: Partial Denial of Service Vulnerability in APOGEE PXC and TALON TC Series (BACnet) Devices | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-668154 | SSA-668154: Denial of Service Vulnerability in MS/TP Point Pickup Module | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-542540 | SSA-542540: Out of Bounds Read Vulnerability in Teamcenter Visualization | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-523418 | SSA-523418: Information Disclosure Vulnerability in Desigo CC | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-455250 | SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.2-h3 | 2024-04-09T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-339086 | SSA-339086: Insufficient Session Expiration Vulnerability in SIMATIC PCS neo | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-222768 | SSA-222768: Multiple Vulnerabilities in SIRIUS 3SK2 Safety Relays and 3RK3 Modular Safety Systems | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-162255 | SSA-162255: Multiple Vulnerabilities in Polarion Before V2410 | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-103653 | SSA-103653: Denial-of-Service Vulnerability in Automation License Manager | 2024-09-10T00:00:00Z | 2025-05-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0690-1 | Security update for libsoup | 2026-02-27T15:11:03Z | 2026-02-27T15:11:03Z |
| suse-su-2026:0689-1 | Security update for libsoup | 2026-02-27T15:10:48Z | 2026-02-27T15:10:48Z |
| suse-su-2026:0688-1 | Security update for the Linux Kernel | 2026-02-27T15:09:04Z | 2026-02-27T15:09:04Z |
| suse-su-2026:0687-1 | Security update for go1 | 2026-02-27T15:08:16Z | 2026-02-27T15:08:16Z |
| suse-su-2026:20616-1 | Security update for haproxy | 2026-02-27T13:16:38Z | 2026-02-27T13:16:38Z |
| suse-su-2026:20620-1 | Security update for haproxy | 2026-02-27T13:15:05Z | 2026-02-27T13:15:05Z |
| suse-su-2026:20557-1 | Security update for haproxy | 2026-02-27T13:15:05Z | 2026-02-27T13:15:05Z |
| suse-su-2026:0685-1 | Security update for valkey | 2026-02-27T11:53:26Z | 2026-02-27T11:53:26Z |
| suse-su-2026:20599-1 | Security update for the Linux Kernel | 2026-02-27T11:51:02Z | 2026-02-27T11:51:02Z |
| suse-su-2026:20555-1 | Security update for the Linux Kernel | 2026-02-27T11:51:02Z | 2026-02-27T11:51:02Z |
| suse-su-2026:20611-1 | Security update for the initial kernel livepatch | 2026-02-27T11:50:22Z | 2026-02-27T11:50:22Z |
| suse-su-2026:20556-1 | Security update for the initial kernel livepatch | 2026-02-27T11:50:22Z | 2026-02-27T11:50:22Z |
| suse-su-2026:20615-1 | Security update for the Linux Kernel | 2026-02-27T11:32:45Z | 2026-02-27T11:32:45Z |
| suse-su-2026:0684-1 | Security update for gimp | 2026-02-27T10:43:59Z | 2026-02-27T10:43:59Z |
| suse-su-2026:0683-1 | Security update for freerdp2 | 2026-02-27T10:42:32Z | 2026-02-27T10:42:32Z |
| suse-su-2026:0680-1 | Security update for glibc | 2026-02-27T10:17:05Z | 2026-02-27T10:17:05Z |
| suse-su-2026:20610-1 | Security update for kubevirt | 2026-02-27T08:49:48Z | 2026-02-27T08:49:48Z |
| suse-su-2026:20551-1 | Security update for kubevirt | 2026-02-27T08:49:48Z | 2026-02-27T08:49:48Z |
| suse-su-2026:0674-1 | Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-02-27T07:04:14Z | 2026-02-27T07:04:14Z |
| suse-su-2026:20550-1 | Security update for containerized-data-importer | 2026-02-26T16:03:48Z | 2026-02-26T16:03:48Z |
| suse-su-2026:0670-1 | Security update for ucode-intel | 2026-02-26T15:21:41Z | 2026-02-26T15:21:41Z |
| suse-su-2026:0669-1 | Security update for ucode-intel | 2026-02-26T15:21:31Z | 2026-02-26T15:21:31Z |
| suse-su-2026:0668-1 | Security update for ucode-intel | 2026-02-26T15:21:13Z | 2026-02-26T15:21:13Z |
| suse-su-2026:0667-1 | Security update for redis7 | 2026-02-26T15:19:55Z | 2026-02-26T15:19:55Z |
| suse-su-2026:0666-1 | Security update for docker | 2026-02-26T15:17:25Z | 2026-02-26T15:17:25Z |
| suse-su-2026:0665-1 | Security update for frr | 2026-02-26T15:16:24Z | 2026-02-26T15:16:24Z |
| suse-su-2026:0664-1 | Security update for python3 | 2026-02-26T15:15:20Z | 2026-02-26T15:15:20Z |
| suse-su-2026:0663-1 | Security update for python | 2026-02-26T15:13:11Z | 2026-02-26T15:13:11Z |
| suse-su-2026:0662-1 | Security update for qemu | 2026-02-26T15:12:26Z | 2026-02-26T15:12:26Z |
| suse-su-2026:0661-1 | Security update for erlang | 2026-02-26T15:10:09Z | 2026-02-26T15:10:09Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:1831 | Moderate: qemu-kvm security update | 2026-02-03T00:00:00Z | 2026-02-06T17:34:44Z |
| alsa-2026:1837 | Moderate: osbuild-composer security update | 2026-02-03T00:00:00Z | 2026-02-06T17:33:01Z |
| alsa-2026:2182 | Important: libsoup3 security update | 2026-02-05T00:00:00Z | 2026-02-06T17:31:52Z |
| alsa-2026:1842 | Important: nodejs24 security update | 2026-02-03T00:00:00Z | 2026-02-06T17:30:17Z |
| alsa-2026:1843 | Important: nodejs22 security update | 2026-02-03T00:00:00Z | 2026-02-06T17:27:45Z |
| alsa-2026:2081 | Important: freerdp security update | 2026-02-05T00:00:00Z | 2026-02-06T08:53:33Z |
| alsa-2026:2090 | Important: python3.12-wheel security update | 2026-02-05T00:00:00Z | 2026-02-06T08:49:17Z |
| alsa-2026:2128 | Moderate: python3 security update | 2026-02-05T00:00:00Z | 2026-02-06T08:39:22Z |
| alsa-2026:1617 | Moderate: kernel security update | 2026-02-02T00:00:00Z | 2026-02-06T08:24:53Z |
| alsa-2026:2042 | Important: brotli security update | 2026-02-05T00:00:00Z | 2026-02-05T12:08:23Z |
| alsa-2026:1690 | Important: kernel security update | 2026-02-02T00:00:00Z | 2026-02-05T09:56:48Z |
| alsa-2026:1902 | Important: python-wheel security update | 2026-02-04T00:00:00Z | 2026-02-05T09:52:44Z |
| alsa-2026:1825 | Moderate: curl security update | 2026-02-03T00:00:00Z | 2026-02-05T09:50:43Z |
| alsa-2026:1828 | Moderate: python3.12 security update | 2026-02-03T00:00:00Z | 2026-02-05T09:48:47Z |
| alsa-2026:1696 | Moderate: util-linux security update | 2026-02-02T00:00:00Z | 2026-02-03T11:05:12Z |
| alsa-2026:1715 | Important: golang-github-openprinting-ipp-usb security update | 2026-02-02T00:00:00Z | 2026-02-03T11:03:28Z |
| alsa-2026:1714 | Moderate: wireshark security update | 2026-02-02T00:00:00Z | 2026-02-03T11:02:21Z |
| alsa-2026:1662 | Moderate: kernel security update | 2026-02-02T00:00:00Z | 2026-02-02T13:45:57Z |
| alsa-2026:1661 | Moderate: kernel-rt security update | 2026-02-02T00:00:00Z | 2026-02-02T13:40:07Z |
| alsa-2026:1631 | Moderate: python3 security update | 2026-02-02T00:00:00Z | 2026-02-02T12:08:18Z |
| alsa-2026:1592 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T11:56:57Z |
| alsa-2026:1178 | Moderate: kernel security update | 2026-01-26T00:00:00Z | 2026-02-02T11:36:10Z |
| alsa-2026:1239 | Important: fence-agents security update | 2026-01-26T00:00:00Z | 2026-02-02T11:30:59Z |
| alsa-2026:1359 | Moderate: gcc-toolset-15-binutils security update | 2026-01-27T00:00:00Z | 2026-02-02T11:23:42Z |
| alsa-2026:1381 | Moderate: osbuild-composer security update | 2026-01-27T00:00:00Z | 2026-02-02T11:22:03Z |
| alsa-2026:1409 | Important: php:8.2 security update | 2026-01-27T00:00:00Z | 2026-02-02T11:20:21Z |
| alsa-2026:1412 | Important: php:8.2 security update | 2026-01-27T00:00:00Z | 2026-02-02T11:16:18Z |
| alsa-2026:1473 | Important: openssl security update | 2026-01-28T00:00:00Z | 2026-02-02T11:12:21Z |
| alsa-2026:1595 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T10:01:50Z |
| alsa-2026:1597 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T10:00:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2026-144 | Use-of-uninitialized-value in initFilter | 2026-01-26T00:05:57.473672Z | 2026-01-26T00:05:57.473958Z |
| osv-2026-141 | Segv on unknown address in yuv2rgb4_X_c | 2026-01-26T00:03:47.552290Z | 2026-01-26T00:03:47.552807Z |
| osv-2025-280 | Heap-buffer-overflow in Assimp::SceneCombiner::CopyScene | 2025-04-15T00:04:03.423453Z | 2026-01-25T14:19:05.873424Z |
| osv-2025-580 | UNKNOWN READ in signed char Assimp::StreamReader<false, false>::Get<signed char> | 2025-07-29T00:16:41.422221Z | 2026-01-25T14:18:57.285875Z |
| osv-2024-1220 | UNKNOWN READ in Assimp::NDOImporter::InternReadFile | 2024-10-14T00:17:45.088625Z | 2026-01-25T14:14:41.961973Z |
| osv-2023-869 | Heap-buffer-overflow in Assimp::MD5::MD5MeshParser::MD5MeshParser | 2023-09-17T14:01:25.028324Z | 2026-01-25T14:13:45.937535Z |
| osv-2026-136 | Memcpy-param-overlap in grk::memStreamRead | 2026-01-25T00:10:48.352834Z | 2026-01-25T00:10:48.353140Z |
| osv-2026-121 | Use-of-uninitialized-value in trySubset | 2026-01-24T00:15:22.824642Z | 2026-01-24T14:24:01.498986Z |
| osv-2026-122 | Use-of-uninitialized-value in rtcm2_unpack | 2026-01-24T00:18:15.169881Z | 2026-01-24T00:18:15.170285Z |
| osv-2026-119 | Segv on unknown address in gpsd_poll | 2026-01-23T00:09:08.434854Z | 2026-01-23T00:09:08.435286Z |
| osv-2026-112 | Use-of-uninitialized-value in PrintSERPacket | 2026-01-23T00:01:50.403598Z | 2026-01-23T00:01:50.404362Z |
| osv-2026-105 | Use-of-uninitialized-value in pcpp::SSLServerHelloMessage::ServerHelloTLSFingerprint::toString | 2026-01-22T00:08:03.696405Z | 2026-01-22T00:08:03.696709Z |
| osv-2025-1061 | Security exception in org.apache.poi.hssf.record.aggregates.SharedValueManager$SharedFormulaGroup.<ini | 2026-01-18T00:03:40.245475Z | 2026-01-21T14:26:21.135983Z |
| osv-2026-98 | Heap-buffer-overflow in hostname_issubdomain | 2026-01-21T00:16:59.551255Z | 2026-01-21T00:16:59.551548Z |
| osv-2026-87 | Security exception in org.apache.poi.util.IOUtils.safelyAllocate | 2026-01-18T00:18:36.932063Z | 2026-01-20T14:24:38.539978Z |
| osv-2026-91 | Use-after-poison in compress.cc | 2026-01-20T00:09:07.159786Z | 2026-01-20T00:09:07.160128Z |
| osv-2026-86 | Security exception in java.base/java.util.Arrays.copyOfRange | 2026-01-18T00:18:18.214799Z | 2026-01-18T00:18:18.215108Z |
| osv-2026-74 | Heap-buffer-overflow in ___interceptor_strtol | 2026-01-17T00:19:48.575833Z | 2026-01-17T00:19:48.576151Z |
| osv-2023-1129 | UNKNOWN READ in HeifPixelImage::overlay | 2023-11-09T13:00:44.441721Z | 2026-01-16T14:20:00.488466Z |
| osv-2020-2308 | Heap-buffer-overflow in derive_collocated_motion_vectors | 2021-02-10T00:00:17.357392Z | 2026-01-16T14:15:52.974687Z |
| osv-2026-55 | Use-of-uninitialized-value in vp9_quantize_fp_avx2 | 2026-01-15T00:19:29.465463Z | 2026-01-15T00:19:29.465794Z |
| osv-2026-54 | Heap-use-after-free in _dwarf_exec_frame_instr | 2026-01-15T00:17:17.477757Z | 2026-01-15T00:17:17.478056Z |
| osv-2026-53 | Heap-use-after-free in graph::LigatureSubstFormat1::shrink | 2026-01-15T00:16:26.117926Z | 2026-01-15T00:16:26.118291Z |
| osv-2024-195 | Security exception in com.github.javaparser.ast.validator.TreeVisitorValidator.accept | 2024-03-24T00:14:24.746452Z | 2026-01-13T14:21:46.144635Z |
| osv-2023-1328 | Stack-buffer-overflow in icu_75::TZDBTimeZoneNames::getMetaZoneNames | 2023-12-18T00:13:09.643640Z | 2026-01-13T10:59:58.280849Z |
| osv-2024-662 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-07-18T00:06:40.832938Z | 2026-01-13T04:48:14.077313Z |
| osv-2020-786 | UNKNOWN READ in H5T__bit_find | 2020-07-14T05:37:33.311187Z | 2026-01-13T04:47:48.710766Z |
| osv-2024-85 | Security exception in com.github.javaparser.ast.validator.TreeVisitorValidator.accept | 2024-02-08T00:13:58.690460Z | 2026-01-13T04:47:29.127821Z |
| osv-2024-680 | Security exception in com.github.javaparser.GeneratedJavaParser.Expression | 2024-07-26T00:06:29.761307Z | 2026-01-13T04:46:21.094915Z |
| osv-2024-675 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-07-24T00:07:37.523933Z | 2026-01-13T04:45:52.716176Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0409 | Build corruption when using `PYO3_CONFIG_FILE` environment variable | 2024-12-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0408 | Unsound usages of `std::slice::from_raw_parts` | 2024-12-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0407 | Fails to ensure slice elements match the slice's declared type | 2024-03-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0405 | op_panic in the base runtime can force a panic in the runtime's containing thread | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0404 | Unsoundness in anstream | 2024-09-08T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0403 | op_panic in the base runtime can force a panic in the runtime's containing thread | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0402 | Borsh serialization of HashMap is non-canonical | 2024-10-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0400 | `ruzstd` uninit and out-of-bounds memory reads | 2024-11-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0399 | rustls network-reachable panic in `Acceptor::accept` | 2024-11-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0398 | Bias of Polynomial Coefficients in Secret Sharing | 2024-11-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0393 | Ambiguous challenge derivation | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0392 | Ambiguous challenge derivation | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0391 | Ambiguous challenge derivation | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0379 | Multiple soundness issues | 2024-10-31T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0378 | Risk of use-after-free in `borrowed` reads from Python weak references | 2024-10-12T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0377 | Heap Buffer overflow using c_chars_to_str function | 2024-10-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0374 | Segmentation fault due to use of uninitialized memory | 2024-09-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0368 | olm-sys: wrapped library unmaintained, potentially vulnerable | 2024-09-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0366 | CWA-2023-004: Excessive number of function parameters in compiled Wasm | 2024-08-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0365 | Binary Protocol Misinterpretation caused by Truncating or Overflowing Casts | 2024-08-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0363 | Binary Protocol Misinterpretation caused by Truncating or Overflowing Casts | 2024-08-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0362 | Stack overflow when parsing specially crafted JSON ABI strings | 2024-07-30T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0360 | `XmpFile::close` can trigger UB | 2024-07-26T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0358 | Apache Arrow Rust Object Store: AWS WebIdentityToken exposure in log files | 2024-07-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0357 | `MemBio::get_buf` has undefined behavior with empty buffers | 2024-07-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0347 | Incorrect usage of `#[repr(packed)]` | 2024-07-01T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0346 | Incorrect usage of `#[repr(packed)]` | 2024-07-01T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0345 | Low severity (DoS) vulnerability in sequoia-openpgp | 2024-06-26T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0344 | Timing variability in `curve25519-dalek`'s `Scalar29::sub`/`Scalar52::sub` | 2024-06-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0340 | Tor path lengths too short when "full Vanguards" configured | 2024-05-15T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-valkey-2025-67733 | Valkey Affected by RESP Protocol Injection via Lua error_reply | 2026-02-26T08:53:18.978Z | 2026-02-26T09:13:58.886Z |
| bit-superset-2026-23983 | Apache Superset: Sensitive Data Exposure via REST API (disabled by default) | 2026-02-26T08:54:03.107Z | 2026-02-26T09:13:58.886Z |
| bit-superset-2026-23982 | Apache Superset: Improper Authorization in Dataset Creation Allows Access Control Bypass | 2026-02-26T08:54:01.397Z | 2026-02-26T09:13:58.886Z |
| bit-superset-2026-23980 | Apache Superset: Improper Neutralization of Special Elements used in a SQL Command | 2026-02-26T08:53:59.760Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-25613 | An unsafe cast in the MongoDB query planner can result in a segmentation fault. | 2026-02-26T08:47:48.322Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-25610 | Invalid $geoNear index hint may cause server crash | 2026-02-26T08:47:46.620Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-25609 | profile command may permit unauthorized configuration | 2026-02-26T08:47:44.983Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-1850 | An authorized user may disable the MongoDB server by issuing a certain type of complex query due to boolean expression simplification | 2026-02-26T08:47:43.390Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-1849 | Mongod can run out of stack memory when expressions create deeply nested documents | 2026-02-26T08:47:41.788Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-1848 | Connections received from the proxy port may not count towards total accepted connections | 2026-02-26T08:47:40.094Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-1847 | MongoDB Server may crash when inserting large documents | 2026-02-26T08:47:38.190Z | 2026-02-26T09:13:58.886Z |
| bit-bpftool-2025-29481 | 2025-04-16T07:06:29.453Z | 2026-02-26T09:13:58.886Z | |
| bit-appsmith-2026-24042 | Appsmith public apps can execute unpublished actions (viewMode confusion) | 2026-01-29T08:36:35.250Z | 2026-02-26T09:13:58.886Z |
| bit-apache-2021-41773 | Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 | 2024-03-06T10:54:39.310Z | 2026-02-26T09:13:58.886Z |
| bit-airflow-2025-68675 | Apache Airflow: proxy credentials for various providers might leak in task logs | 2026-01-21T08:39:24.383Z | 2026-02-26T09:13:58.886Z |
| bit-airflow-2025-27555 | Apache Airflow: Connection Secrets not masked in UI when Connection are added via Airflow cli | 2026-02-26T08:39:17.851Z | 2026-02-26T09:13:58.886Z |
| bit-airflow-2024-56373 | Apache Airflow: SSTI to Code Execution in Airflow through Shared DB Information | 2026-02-26T08:39:15.266Z | 2026-02-26T09:13:58.886Z |
| bit-apache-2022-28614 | read beyond bounds via ap_rwrite() | 2024-03-06T10:52:51.677Z | 2026-02-25T15:48:08.458Z |
| bit-tensorflow-2021-37691 | Division by zero in LSH in TensorFlow Lite | 2024-03-06T11:16:41.709Z | 2026-02-24T21:09:55.900Z |
| bit-superset-2021-37839 | Improper access to dataset metadata information | 2025-02-05T07:29:47.009Z | 2026-02-24T21:09:55.900Z |
| bit-grafana-2021-39226 | Snapshot authentication bypass in grafana | 2024-03-06T10:59:36.715Z | 2026-02-24T21:09:55.900Z |
| bit-superset-2021-28125 | Apache Superset Open Redirect | 2025-02-05T07:29:54.416Z | 2026-02-24T18:11:25.008Z |
| bit-airflow-2025-65995 | Apache Airflow: Disclosure of secrets to UI via kwargs | 2026-02-24T08:38:47.831Z | 2026-02-24T09:11:39.593Z |
| bit-python-2026-1299 | email BytesGenerator header injection due to unquoted newlines | 2026-02-03T08:53:00.053Z | 2026-02-23T12:55:58.474Z |
| bit-python-2025-15282 | Header injection via newlines in data URL mediatype | 2026-01-26T14:49:40.631Z | 2026-02-23T12:55:58.474Z |
| bit-libpython-2026-1299 | email BytesGenerator header injection due to unquoted newlines | 2026-02-03T08:45:06.015Z | 2026-02-23T12:55:58.474Z |
| bit-libpython-2025-15282 | Header injection via newlines in data URL mediatype | 2026-01-26T14:43:08.856Z | 2026-02-23T12:55:58.474Z |
| bit-ghost-2026-26980 | Ghost has a SQL Injection in its Content API | 2026-02-21T08:39:22.999Z | 2026-02-21T09:08:21.332Z |
| bit-cosign-2026-24122 | Cosign Certificate Chain Expiry Validation Issue Allows Issuing Certificate Expiry to Be Overlooked | 2026-02-21T08:36:39.661Z | 2026-02-21T09:08:21.332Z |
| bit-cilium-2026-26963 | Cilium may not enforce host firewall policies when Native Routing, WireGuard and Node Encryption are enabled | 2026-02-21T08:36:53.368Z | 2026-02-21T09:08:21.332Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-xo49545 | Within HostnameError | 2026-01-30T16:21:25.500719Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xl45869 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T16:57:56.432971Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xi02879 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:18:55.578686Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xd92996 | Cancelling a query (e | 2026-01-30T15:46:24.650971Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xb70091 | Within HostnameError | 2026-01-30T14:03:50.560679Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xb16901 | When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers | 2026-01-30T17:13:56.781902Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wq07901 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:01:54.911193Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wp20592 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:05:24.814830Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wi75198 | vulnerability has been identified in Node | 2026-01-30T17:34:27.754206Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wi17406 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T17:35:28.375848Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wg18689 | attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests | 2026-01-30T16:29:25.690410Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-we92783 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:05:24.753007Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wa03785 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:05:24.799763Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vv68546 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:35:55.883570Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vs64679 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T16:35:25.680295Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vl83369 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:53.758258Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vf66781 | Within HostnameError | 2026-01-30T14:57:22.763452Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vc16841 | Within HostnameError | 2026-01-30T15:02:22.944744Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uz73015 | Cancelling a query (e | 2026-01-30T16:09:25.315533Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uy85485 | Within HostnameError | 2026-01-30T14:45:52.628542Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uy81473 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:44:54.187987Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uu56048 | Within HostnameError | 2026-01-30T15:16:53.077326Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uu20906 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:48:52.774829Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ur80185 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:30:24.609590Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-um63521 | Within HostnameError | 2026-01-30T16:12:25.029065Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ul17352 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:29:25.464127Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uj17204 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:52.998379Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ui65993 | Within HostnameError | 2026-01-30T16:21:25.457624Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ty78539 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T16:35:55.295657Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ts42581 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:29:23.600518Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2021-ALE-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-005 | Multiples vulnérabilités dans Microsoft DNS server | 2021-03-12T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-003 | [MàJ] Vulnérabilité dans VMware vCenter Server | 2021-02-25T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-001 | |MàJ] Vulnérabilité dans SonicWall SMA100 | 2021-02-02T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| CERTFR-2021-ALE-005 | Multiples vulnérabilités dans Microsoft DNS server | 2021-03-12T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| CERTFR-2021-ALE-003 | [MàJ] Vulnérabilité dans VMware vCenter Server | 2021-02-25T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| CERTFR-2021-ALE-001 | |MàJ] Vulnérabilité dans SonicWall SMA100 | 2021-02-02T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-006 | [MàJ] Vulnérabilité dans F5 BIG-IP | 2021-03-22T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2020-ale-026 | [MaJ] Présence de code malveillant dans SolarWinds Orion | 2020-12-14T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| CERTFR-2021-ALE-006 | [MàJ] Vulnérabilité dans F5 BIG-IP | 2021-03-22T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| CERTFR-2020-ALE-026 | [MaJ] Présence de code malveillant dans SolarWinds Orion | 2020-12-14T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2021-ale-002 | [MàJ] Vulnérabilité dans Google Chrome et Microsoft Edge | 2021-02-05T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-021 | Vulnérabilité dans Samba | 2020-09-18T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-020 | [MàJ] Vulnérabilité dans Microsoft Netlogon | 2020-09-15T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| CERTFR-2021-ALE-002 | [MàJ] Vulnérabilité dans Google Chrome et Microsoft Edge | 2021-02-05T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| CERTFR-2020-ALE-021 | Vulnérabilité dans Samba | 2020-09-18T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| CERTFR-2020-ALE-020 | [MàJ] Vulnérabilité dans Microsoft Netlogon | 2020-09-15T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-019 | Recrudescence d'activité Emotet en France | 2020-09-07T00:00:00.000000 | 2021-02-09T00:00:00.000000 |
| CERTFR-2020-ALE-019 | Recrudescence d'activité Emotet en France | 2020-09-07T00:00:00.000000 | 2021-02-09T00:00:00.000000 |
| certfr-2020-ale-025 | Vulnérabilité dans Fortinet FortiOS SSL-VPN | 2020-11-27T00:00:00.000000 | 2021-02-08T00:00:00.000000 |
| CERTFR-2020-ALE-025 | Vulnérabilité dans Fortinet FortiOS SSL-VPN | 2020-11-27T00:00:00.000000 | 2021-02-08T00:00:00.000000 |
| certfr-2020-ale-024 | [MaJ] Vulnérabilité dans les produits VMware | 2020-11-24T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-022 | [MàJ] Vulnérabilité dans Oracle Weblogic | 2020-10-30T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| CERTFR-2020-ALE-024 | [MaJ] Vulnérabilité dans les produits VMware | 2020-11-24T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| CERTFR-2020-ALE-022 | [MàJ] Vulnérabilité dans Oracle Weblogic | 2020-10-30T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-023 | Multiples vulnérabilités dans Google Chrome | 2020-11-12T00:00:00.000000 | 2020-12-04T00:00:00.000000 |
| CERTFR-2020-ALE-023 | Multiples vulnérabilités dans Google Chrome | 2020-11-12T00:00:00.000000 | 2020-12-04T00:00:00.000000 |
| certfr-2020-ale-018 | Vulnérabilité dans Cisco ASA et FTD | 2020-07-28T00:00:00.000000 | 2020-11-05T00:00:00.000000 |
| CERTFR-2020-ALE-018 | Vulnérabilité dans Cisco ASA et FTD | 2020-07-28T00:00:00.000000 | 2020-11-05T00:00:00.000000 |
| certfr-2020-ale-017 | Multiples vulnérabilités dans SAP Netweaver AS JAVA | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0164 | Multiples vulnérabilités dans PostgreSQL | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0163 | Multiples vulnérabilités dans HAProxy | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0162 | Multiples vulnérabilités dans Juniper Networks Secure Analytics | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0161 | Vulnérabilité dans Tenable Nessus Agent | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0144 | Multiples vulnérabilités dans Ivanti Endpoint Manager | 2026-02-11T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0171 | Multiples vulnérabilités dans les produits IBM | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0170 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0169 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0168 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0167 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0166 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0165 | Vulnérabilité dans Mattermost Server | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0164 | Multiples vulnérabilités dans PostgreSQL | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0163 | Multiples vulnérabilités dans HAProxy | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0162 | Multiples vulnérabilités dans Juniper Networks Secure Analytics | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0161 | Vulnérabilité dans Tenable Nessus Agent | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0144 | Multiples vulnérabilités dans Ivanti Endpoint Manager | 2026-02-11T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0160 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0159 | Multiples vulnérabilités dans Keycloak | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0158 | Multiples vulnérabilités dans les produits Apple | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0157 | Multiples vulnérabilités dans les produits Qnap | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0156 | Multiples vulnérabilités dans Google Chrome | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0154 | Vulnérabilité dans Traefik | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0160 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0159 | Multiples vulnérabilités dans Keycloak | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0158 | Multiples vulnérabilités dans les produits Apple | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0157 | Multiples vulnérabilités dans les produits Qnap | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0156 | Multiples vulnérabilités dans Google Chrome | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0155 | Multiples vulnérabilités dans SPIP | 2026-02-12T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| CERTFR-2026-AVI-0154 | Vulnérabilité dans Traefik | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-007521 | Multiple Brother driver installers for Windows vulnerable to privilege escalation | 2025-06-27T09:37+09:00 | 2025-08-19T11:29+09:00 |
| jvndb-2025-000060 | PgManage vulnerable to injection | 2025-08-18T13:40+09:00 | 2025-08-18T13:40+09:00 |
| jvndb-2025-000058 | WordPress plugin "Advanced Custom Fields" vulnerable to HTML injection | 2025-08-08T15:29+09:00 | 2025-08-08T15:29+09:00 |
| jvndb-2025-010972 | Multiple SEIKO EPSON products use weak initial passwords | 2025-08-08T14:50+09:00 | 2025-08-08T14:50+09:00 |
| jvndb-2025-000057 | Multiple vulnerabilities in Mubit Powered BLUE 870 | 2025-08-08T14:47+09:00 | 2025-08-08T14:47+09:00 |
| jvndb-2025-000056 | Multiple vulnerabilities in Sato label printers CL4/6NX Plus and CL4/6NX-J Plus series | 2025-08-06T16:38+09:00 | 2025-08-06T16:38+09:00 |
| jvndb-2025-010603 | Out-of-bounds write vulnerability in FUJIFILM Business Innovation MFPs | 2025-08-05T11:29+09:00 | 2025-08-05T11:29+09:00 |
| jvndb-2025-010408 | Multiple vulnerabilities in PowerCMS | 2025-08-01T12:05+09:00 | 2025-08-01T12:05+09:00 |
| jvndb-2025-000055 | ZXHN-F660T and ZXHN-F660A use a common credential for all installations | 2025-07-31T15:12+09:00 | 2025-07-31T15:12+09:00 |
| jvndb-2025-000054 | Apache Jena Fuseki vulnerable to path traversal | 2025-07-30T14:17+09:00 | 2025-07-30T14:17+09:00 |
| jvndb-2025-000053 | "SwitchBot" App vulnerable to insertion of sensitive information into log file | 2025-07-29T13:44+09:00 | 2025-07-29T13:44+09:00 |
| jvndb-2025-010056 | TP-Link VIGI NVR1104H-4P and VIGI NVR2016H-16MP vulnerable to OS command injection | 2025-07-28T17:53+09:00 | 2025-07-28T17:53+09:00 |
| jvndb-2025-000052 | TP-Link Archer C1200 vulnerable to clickjacking | 2025-07-24T14:16+09:00 | 2025-07-24T14:16+09:00 |
| jvndb-2025-000051 | Real-time Bus Tracking System vulnerable to improper validation of specified quantity in input | 2025-07-23T13:54+09:00 | 2025-07-23T13:54+09:00 |
| jvndb-2025-009576 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2025-07-23T11:13+09:00 | 2025-07-23T11:13+09:00 |
| jvndb-2025-000050 | "region PAY" App for Android vulnerable to insertion of sensitive information into log file | 2025-07-22T13:33+09:00 | 2025-07-22T13:33+09:00 |
| jvndb-2025-009150 | Security updates for Trend Micro products (June 2025) | 2025-07-17T17:03+09:00 | 2025-07-17T17:03+09:00 |
| jvndb-2025-000030 | Reflected cross-site scripting vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor | 2025-05-12T18:00+09:00 | 2025-07-17T10:06+09:00 |
| jvndb-2025-000049 | ZWX-2000CSW2-HN and ZWX-2000CS2-HN vulnerable to use of hard-coded credentials | 2025-07-16T13:54+09:00 | 2025-07-16T13:54+09:00 |
| jvndb-2025-008881 | Least Privilege Violation Vulnerability in the communications functions of NJ/NX series Machine Automation Controllers | 2025-07-15T15:54+09:00 | 2025-07-15T15:54+09:00 |
| jvndb-2025-008783 | Firebox T15 contains an issue with hidden functionality | 2025-07-14T17:22+09:00 | 2025-07-14T17:22+09:00 |
| jvndb-2025-008145 | Epson Web Installer for Mac vulnerable to missing authentication for critical function | 2025-07-08T14:08+09:00 | 2025-07-08T14:08+09:00 |
| jvndb-2025-008106 | Heap-based buffer overflow vulnerability in V-SFT and TELLUS | 2025-07-07T16:26+09:00 | 2025-07-07T16:26+09:00 |
| jvndb-2025-008105 | Windows shortcut following (.LNK) vulnerability in Trend Micro Security for Windows (CVE-2025-52521) | 2025-07-07T16:04+09:00 | 2025-07-07T16:04+09:00 |
| jvndb-2025-000047 | Multiple vulnerabilities in Nimesa Backup and Recovery | 2025-07-07T15:26+09:00 | 2025-07-07T15:26+09:00 |
| jvndb-2025-007978 | Multiple vulnerabilities in Trend Micro Password Manager for Windows (CVE-2025-48443, CVE-2025-52837) | 2025-07-04T13:28+09:00 | 2025-07-04T13:28+09:00 |
| jvndb-2025-000045 | Multiple vulnerabilities in Active! mail | 2025-07-02T14:13+09:00 | 2025-07-02T14:13+09:00 |
| jvndb-2025-007754 | Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS) | 2025-07-02T11:31+09:00 | 2025-07-02T11:31+09:00 |
| jvndb-2025-007607 | Pass-Back Attack vulnerability in Konica Minorta bizhub series | 2025-07-01T14:09+09:00 | 2025-07-01T14:09+09:00 |
| jvndb-2025-007595 | Multiple vulnerabilities in Web Connection of Konica Minolta MFPs | 2025-07-01T14:02+09:00 | 2025-07-01T14:02+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-12875 | Adobe Substance3D Designer缓冲区溢出漏洞(CNVD-2026-12875) | 2026-02-24 | 2026-03-09 |
| cnvd-2026-12874 | Adobe Substance3D Designer代码问题漏洞 | 2026-02-24 | 2026-03-09 |
| cnvd-2026-12873 | Adobe Audition缓冲区溢出漏洞 | 2026-02-24 | 2026-03-09 |
| cnvd-2026-12872 | Adobe Substance3D Designer缓冲区溢出漏洞(CNVD-2026-12872) | 2026-02-24 | 2026-03-09 |
| cnvd-2026-12871 | Adobe DNG SDK缓冲区溢出漏洞 | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12870 | Adobe After Effects缓冲区溢出漏洞(CNVD-2026-12870) | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12869 | Adobe After Effects资源管理错误漏洞(CNVD-2026-12869) | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12868 | Adobe After Effects资源管理错误漏洞(CNVD-2026-12868) | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12867 | Adobe After Effects资源管理错误漏洞 | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12866 | Adobe After Effects输入验证错误漏洞(CNVD-2026-12866) | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12865 | Adobe After Effects类型混淆漏洞 | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12897 | Apache Traffic Server(ATS)环境问题漏洞 | 2025-05-08 | 2026-03-06 |
| cnvd-2026-12778 | Fiber安全特征问题漏洞 | 2026-03-04 | 2026-03-06 |
| cnvd-2026-12777 | FreeRDP缓冲区溢出漏洞(CNVD-2026-12777) | 2026-03-06 | 2026-03-06 |
| cnvd-2026-12776 | Textream资源管理错误漏洞 | 2026-03-06 | 2026-03-06 |
| cnvd-2026-12773 | WordPress插件New User Approve信息泄露漏洞 | 2025-11-21 | 2026-03-06 |
| cnvd-2026-12772 | WordPress插件Uncanny Automator信息泄露漏洞 | 2025-11-25 | 2026-03-06 |
| cnvd-2026-12770 | WordPress插件Web Accessibility by accessiBe信息泄露漏洞 | 2026-03-02 | 2026-03-06 |
| cnvd-2026-12769 | WordPress插件Simple Ajax Chat信息泄露漏洞 | 2026-03-02 | 2026-03-06 |
| cnvd-2026-12768 | WordPress插件Context Blog信息泄露漏洞 | 2026-03-02 | 2026-03-06 |
| cnvd-2026-12767 | D-Link DWR-M960 formDdns文件缓冲区溢出漏洞 | 2026-03-02 | 2026-03-06 |
| cnvd-2026-12766 | Huawei EMUI和Huawei HarmonyOS通信模块地址读取漏洞 | 2026-02-11 | 2026-03-06 |
| cnvd-2026-12765 | Huawei EMUI和Huawei HarmonyOS AMS模块权限控制类漏洞 | 2026-02-11 | 2026-03-06 |
| cnvd-2026-12764 | Huawei HarmonyOS HDC模块缓冲区溢出漏洞 | 2026-02-11 | 2026-03-06 |
| cnvd-2026-12763 | Google Chrome缓冲区溢出漏洞(CNVD-2026-12763) | 2026-03-02 | 2026-03-06 |
| cnvd-2026-12697 | Adobe Substance 3D Stager存在越界写入漏洞(CNVD-2026-12697) | 2026-03-02 | 2026-03-05 |
| cnvd-2026-12687 | IBM PowerVM Hypervisor存在未明漏洞 | 2026-02-11 | 2026-03-05 |
| cnvd-2026-12685 | IBM Concert存在信息泄露漏洞 | 2026-02-11 | 2026-03-05 |
| cnvd-2026-12684 | Cisco NX-OS Software操作系统命令注入漏洞 | 2025-09-09 | 2026-03-05 |
| cnvd-2026-12683 | Cisco IOS XE Software跨站脚本漏洞 | 2025-09-28 | 2026-03-05 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15695 | Уязвимость компонента drivers/gpu/drm/hisilicon/hibmc/hibmc_drm_drv.c ядра операционной с… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15694 | Уязвимость функции br_multicast_query_expired() компонента net/bridge/br_multicast.c ядра… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15693 | Уязвимость функции destroy_args() компонента mm/debug_vm_pgtable.c ядра операционной сист… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15692 | Уязвимость компонента ufs-exynos.c ядра операционной системы Linux, позволяющая нарушител… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15690 | Уязвимость компонента drivers/bus ядра операционной системы Linux, позволяющая нарушителю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15688 | Уязвимость компонента fs/nfs ядра операционной системы Linux, позволяющая нарушителю полу… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15687 | Уязвимость компонента dwc3 ядра операционной системы Linux, позволяющая нарушителю вызват… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15686 | Уязвимость функции mt_report_fixup() ядра операционной системы Linux, позволяющая нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15683 | Уязвимость функции trace_printk_seq() ядра операционной системы Linux, связанная с неконт… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15682 | Уязвимость компонента efivarfs ядра операционной системы Linux, позволяющая нарушителю вы… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15680 | Уязвимость компонента fs/smb ядра операционной системы Linux, позволяющая нарушителю вызв… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15679 | Уязвимость компонента inode.c ядра операционной системы Linux, позволяющая нарушителю пол… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15678 | Уязвимость компонентов rose ядра операционной системы Linux, позволяющая нарушителю получ… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15677 | Уязвимость компонента rose_route.c ядра операционной системы Linux, позволяющая нарушител… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15676 | Уязвимость компонента xfs ядра операционной системы Linux, позволяющая нарушителю вызвать… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15674 | Уязвимость модуля wifi ядра операционной системы Linux, позволяющая нарушителю получить д… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15669 | Уязвимость компонента slub.c ядра операционной системы Linux, позволяющая нарушителю вызв… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15667 | Уязвимость функции do_validate_mem() компонента rsrc_nonstatic.c ядра операционной систем… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15665 | Уязвимость компонента arch/x86 ядра операционной системы Linux, позволяющая нарушителю по… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15660 | Уязвимость компонента fs/hfsplus/unicode.c ядра операционной системы Linux, позволяющая н… | 14.12.2025 | 16.02.2026 |
| bdu:2025-15659 | Уязвимость компонента fs/hfsplus/bnode.c ядра операционной системы Linux, позволяющая нар… | 14.12.2025 | 16.02.2026 |
| bdu:2025-15658 | Уязвимость компонента netfilter ядра операционной системы Linux, позволяющая нарушителю в… | 14.12.2025 | 16.02.2026 |
| bdu:2025-15559 | Уязвимость функции sqlite3KeyInfoFromExprList системы управления базами данных SQLite, по… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15558 | Уязвимость реализации протокола IEEE 802.11 ядра операционной системы Linux, позволяющая … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15556 | Уязвимость компонента jfs_imap.c ядра операционной системы Linux, позволяющая нарушителю … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15555 | Уязвимость компонента ksmbd ядра операционной системы Linux, позволяющая нарушителю вызва… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15554 | Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | 11.12.2025 | 16.02.2026 |
| bdu:2025-15553 | Уязвимость компонента net/sched ядра операционной системы Linux, позволяющая нарушителю в… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15552 | Уязвимость компонента eventpoll ядра операционной системы Linux, позволяющая нарушителю в… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15551 | Уязвимость функции nf_tables_updchain компонента net/netfilter/nf_tables_api.c ядра опера… | 11.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201404-0378 | Unspecified vulnerability in Oracle Java SE 5.0u61, SE 6u71, 7u51, and 8; JRockit R27.8.1… | 2024-07-23T22:08:28.541000Z |
| var-201908-0264 | Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a den… | 2024-07-23T22:07:30.228000Z |
| var-201702-0469 | An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari be… | 2024-07-23T22:06:53.547000Z |
| var-200703-0016 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted at… | 2024-07-23T22:06:48.011000Z |
| var-201609-0595 | The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly … | 2024-07-23T22:06:46.651000Z |
| var-202004-1974 | A type confusion issue was addressed with improved memory handling. This issue is fixed i… | 2024-07-23T22:06:44.403000Z |
| var-201705-3790 | In Open vSwitch (OvS) v2.7.0, there is a buffer over-read while parsing the group mod Ope… | 2024-07-23T22:06:43.841000Z |
| var-202109-1802 | A crafted request uri-path can cause mod_proxy to forward the request to an origin server… | 2024-07-23T22:06:13.520000Z |
| var-202110-1622 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:06:10.313000Z |
| var-200905-0043 | Integer underflow in QuickDraw Manager in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7, … | 2024-07-23T22:06:10.145000Z |
| var-202203-0129 | A cookie management issue was addressed with improved state management. This issue is fix… | 2024-07-23T22:06:09.291000Z |
| var-200210-0102 | Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a deni… | 2024-07-23T22:06:08.093000Z |
| var-202009-0037 | A flaw was discovered in all versions of Undertow before Undertow 2.2.0.Final, where HTTP… | 2024-07-23T22:06:07.991000Z |
| var-201912-0619 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:06:04.230000Z |
| var-200809-0566 | Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2… | 2024-07-23T22:06:03.293000Z |
| var-202201-0424 | A validation issue was addressed with improved input sanitization. This issue is fixed in… | 2024-07-23T22:06:01.833000Z |
| var-200604-0201 | Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary c… | 2024-07-23T22:05:29.066000Z |
| var-201201-0025 | Use-after-free vulnerability in Google Chrome before 16.0.912.77 allows remote attackers … | 2024-07-23T22:05:28.758000Z |
| var-201808-0957 | Systems with microprocessors utilizing speculative execution and address translations may… | 2024-07-23T22:05:21.889000Z |
| var-202203-1400 | jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of servic… | 2024-07-23T22:05:19.247000Z |
| var-201912-0640 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:05:19.907000Z |
| var-201904-1343 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:05:19.745000Z |
| var-201007-0949 | WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before… | 2024-07-23T22:05:19.065000Z |
| var-201912-1856 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:04:56.028000Z |
| var-200904-0821 | The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products… | 2024-07-23T22:04:56.133000Z |
| var-200603-0282 | Unspecified vulnerability in Safari, LaunchServices, and/or CoreTypes in Apple Mac OS X 1… | 2024-07-23T22:04:24.723000Z |
| var-201912-0509 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:03:53.293000Z |
| var-200806-0575 | SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and … | 2024-07-23T22:03:53.151000Z |
| var-200703-0024 | Unspecified vulnerability in the authentication feature for DirectoryService (DS Plug-Ins… | 2024-07-23T22:03:53.866000Z |
| var-202005-1054 | dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by d… | 2024-07-23T22:03:49.580000Z |