Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-45130 |
6.6 (3.1)
|
Vim: Heap Buffer Overflow in spell file loading |
vim |
vim |
2026-05-08T22:42:35.097Z | 2026-05-08T22:42:35.097Z |
| CVE-2026-44656 |
4.6 (4.0)
|
Vim: OS Command Injection via 'path' completion |
vim |
vim |
2026-05-08T22:40:49.673Z | 2026-05-08T22:40:49.673Z |
| CVE-2026-8094 |
9.8 (3.1)
|
Other issue in the WebRTC component |
Mozilla |
Firefox |
2026-05-07T12:45:08.185Z | 2026-05-08T22:39:57.667Z |
| CVE-2026-42307 |
4.4 (3.1)
|
Vim: OS Command Injection in netrw |
vim |
vim |
2026-05-08T22:38:53.964Z | 2026-05-08T22:38:53.964Z |
| CVE-2026-42350 |
5.1 (4.0)
|
Kargo: Open Redirect in UI OIDC Login Flow via redirec… |
akuity |
kargo |
2026-05-08T22:35:30.155Z | 2026-05-08T22:35:30.155Z |
| CVE-2026-8091 |
9.8 (3.1)
|
Incorrect boundary conditions in the Audio/Video: Play… |
Mozilla |
Firefox |
2026-05-07T12:45:05.530Z | 2026-05-08T22:33:49.148Z |
| CVE-2026-42352 |
8.6 (3.1)
|
pygeoapi 0.23.x: Unauthenticated SSRF via OGC API - Pr… |
geopython |
pygeoapi |
2026-05-08T22:31:50.110Z | 2026-05-08T22:31:50.110Z |
| CVE-2026-42351 |
7.5 (3.1)
|
pygeoapi: Path Traversal in STAC FileSystemProvider |
geopython |
pygeoapi |
2026-05-08T22:31:18.001Z | 2026-05-08T22:31:18.001Z |
| CVE-2025-63703 |
9.8 (3.1)
|
npm package parse-ini v1.0.6 is vulnerable to Pro… |
n/a |
n/a |
2026-05-07T00:00:00.000Z | 2026-05-08T22:30:22.892Z |
| CVE-2026-42556 |
8.9 (3.1)
|
Postiz stored XSS in public preview page |
gitroomhq |
postiz-app |
2026-05-08T22:28:33.086Z | 2026-05-08T22:28:33.086Z |
| CVE-2026-36458 |
9.8 (3.1)
|
ChestnutCMS v1.5.10 has a SQL injection vulnerabi… |
n/a |
n/a |
2026-05-07T00:00:00.000Z | 2026-05-08T22:27:36.783Z |
| CVE-2026-42346 |
6.5 (3.1)
|
Postiz: TOCTOU DNS rebinding bypasses all SSRF URL val… |
gitroomhq |
postiz-app |
2026-05-08T22:26:50.501Z | 2026-05-08T22:26:50.501Z |
| CVE-2026-42298 |
10 (3.1)
|
Postiz: Arbitrary Code Execution and Token Exfiltratio… |
gitroomhq |
postiz-app |
2026-05-08T22:24:10.249Z | 2026-05-08T22:24:10.249Z |
| CVE-2026-42339 |
7.1 (4.0)
|
New API: SSRF Filter Bypass via 0.0.0.0 |
QuantumNous |
new-api |
2026-05-08T22:21:53.902Z | 2026-05-08T22:21:53.902Z |
| CVE-2026-41432 |
7.1 (3.1)
|
New API: Stripe Webhook Signature Bypass via Empty Sec… |
QuantumNous |
new-api |
2026-05-08T22:21:32.305Z | 2026-05-08T22:21:32.305Z |
| CVE-2026-44286 |
2.3 (4.0)
|
FastGPT: SSRF Vulnerability in Laf Workflow Node via M… |
labring |
FastGPT |
2026-05-08T22:17:17.908Z | 2026-05-08T22:17:17.908Z |
| CVE-2025-67202 |
6.1 (3.1)
|
Sidekiq-cron thru 2.3.1, an open-source schedulin… |
n/a |
n/a |
2026-05-07T00:00:00.000Z | 2026-05-08T22:16:51.261Z |
| CVE-2026-44284 |
6.3 (3.1)
|
FastGPT: Stored MCP tool URL SSRF in FastGPT workflow … |
labring |
FastGPT |
2026-05-08T22:12:39.854Z | 2026-05-08T22:12:39.854Z |
| CVE-2026-42345 |
7.7 (3.1)
|
FastGPT: Cloud metadata endpoint SSRF protection bypas… |
labring |
FastGPT |
2026-05-08T22:11:09.630Z | 2026-05-08T22:11:09.630Z |
| CVE-2026-42344 |
6.3 (3.1)
|
FastGPT: DNS rebinding TOCTOU bypass in isInternalAddr… |
labring |
FastGPT |
2026-05-08T22:10:00.875Z | 2026-05-08T22:10:00.875Z |
| CVE-2026-42343 |
6.3 (4.0)
|
FastGPT: Uncontrolled Resource Consumption leading to … |
labring |
FastGPT |
2026-05-08T22:09:03.156Z | 2026-05-08T22:09:03.156Z |
| CVE-2025-63706 |
9.8 (3.1)
|
NPM package next-npm-version1.0.1 is vulnerable t… |
n/a |
n/a |
2026-05-07T00:00:00.000Z | 2026-05-08T22:08:39.247Z |
| CVE-2026-42302 |
9.8 (3.1)
|
FastGPT: Unauthenticated Remote Code Execution (RCE) v… |
labring |
FastGPT |
2026-05-08T22:05:49.460Z | 2026-05-08T22:05:49.460Z |
| CVE-2026-30496 |
9.8 (3.1)
|
The Optoma CinemaX P2 projector (firmware TVOS-04… |
n/a |
n/a |
2026-05-07T00:00:00.000Z | 2026-05-08T22:04:24.009Z |
| CVE-2026-42224 |
7.6 (3.1)
|
ipl/web is vulnerable to reflected XSS by malformed se… |
Icinga |
ipl-web |
2026-05-08T22:02:52.231Z | 2026-05-08T22:02:52.231Z |
| CVE-2026-30495 |
8.8 (3.1)
|
The Optoma CinemaX P2 projector (firmware TVOS-04… |
n/a |
n/a |
2026-05-07T00:00:00.000Z | 2026-05-08T22:02:49.050Z |
| CVE-2026-41520 |
7.9 (3.1)
|
Cillium exposes sensitive information included in the … |
cilium |
cilium |
2026-05-08T22:01:08.394Z | 2026-05-08T22:01:08.394Z |
| CVE-2026-44987 |
3.8 (3.1)
|
SysReptor: Privilege Escalation from User Admin to Superuser |
Syslifters |
sysreptor |
2026-05-08T21:59:12.204Z | 2026-05-08T21:59:12.204Z |
| CVE-2026-42291 |
6.8 (3.1)
|
SysReptor: Read-write access to personal notes by shar… |
Syslifters |
sysreptor |
2026-05-08T21:57:51.099Z | 2026-05-08T21:57:51.099Z |
| CVE-2026-42206 |
5.7 (4.0)
|
Roadiz OpenID Connect nonce generated but never valida… |
roadiz |
core-bundle-dev-app |
2026-05-08T21:54:32.715Z | 2026-05-08T21:54:32.715Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43263 |
7.8 (3.1)
|
media: chips-media: wave5: Fix Null reference while te… |
Linux |
Linux |
2026-05-06T11:28:50.188Z | 2026-05-08T12:41:40.920Z |
| CVE-2026-43260 |
N/A
|
bnxt_en: Fix RSS context delete logic |
Linux |
Linux |
2026-05-06T11:28:48.113Z | 2026-05-06T11:28:48.113Z |
| CVE-2026-43259 |
N/A
|
phy: fsl-imx8mq-usb: set platform driver data |
Linux |
Linux |
2026-05-06T11:28:47.370Z | 2026-05-06T11:28:47.370Z |
| CVE-2026-8018 |
8.1 (3.1)
|
Insufficient policy enforcement in DevTools in Go… |
Google |
Chrome |
2026-05-06T18:13:14.911Z | 2026-05-08T19:36:40.756Z |
| CVE-2026-7989 |
4.2 (3.1)
|
Insufficient data validation in DataTransfer in G… |
Google |
Chrome |
2026-05-06T18:13:03.971Z | 2026-05-08T19:37:09.872Z |
| CVE-2026-7959 |
3.1 (3.1)
|
Inappropriate implementation in Navigation in Goo… |
Google |
Chrome |
2026-05-06T18:12:52.805Z | 2026-05-08T19:49:03.810Z |
| CVE-2026-7946 |
4.3 (3.1)
|
Insufficient policy enforcement in WebUI in Googl… |
Google |
Chrome |
2026-05-06T18:12:47.542Z | 2026-05-08T19:46:32.547Z |
| CVE-2026-7932 |
4.4 (3.1)
|
Insufficient policy enforcement in Downloads in G… |
Google |
Chrome |
2026-05-06T18:12:38.313Z | 2026-05-08T19:37:58.036Z |
| CVE-2026-7916 |
8.3 (3.1)
|
Insufficient data validation in InterestGroups in… |
Google |
Chrome |
2026-05-06T18:12:32.365Z | 2026-05-08T19:47:59.359Z |
| CVE-2026-7807 |
8.7 (4.0)
8.1 (3.1)
|
SmarterTools SmarterMail < Build 9560 Server Local Fil… |
SmarterTools Inc. |
SmarterMail |
2026-05-08T19:54:33.363Z | 2026-05-09T03:56:11.864Z |
| CVE-2026-6659 |
7.5 (3.1)
|
Crypt::PasswdMD5 versions through 1.42 for Perl genera… |
RSAVAGE |
Crypt::PasswdMD5 |
2026-05-08T17:17:01.357Z | 2026-05-08T19:30:59.696Z |
| CVE-2026-44694 |
7.2 (4.0)
|
n8n-MCP: Authenticated SSRF in n8n-mcp webhook and API… |
czlonkowski |
n8n-mcp |
2026-05-08T19:12:05.326Z | 2026-05-08T19:12:05.326Z |
| CVE-2026-42282 |
4.3 (3.1)
|
n8n-MCP: Sensitive MCP tool-call arguments logged on a… |
czlonkowski |
n8n-mcp |
2026-05-08T19:07:13.823Z | 2026-05-08T19:07:13.823Z |
| CVE-2026-42190 |
5.3 (3.1)
|
RedwoodSDK: Same-site CSRF in in server actions |
redwoodjs |
sdk |
2026-05-08T19:35:17.905Z | 2026-05-08T19:35:17.905Z |
| CVE-2026-42189 |
7.5 (3.1)
|
Russh: Pre-auth DoS via unbounded allocation in keyboa… |
Eugeny |
russh |
2026-05-08T19:49:51.179Z | 2026-05-08T19:49:51.179Z |
| CVE-2026-42185 |
5.5 (3.1)
|
People: Privilege Escalation via Missing Role Ceiling … |
suitenumerique |
people |
2026-05-08T19:23:00.699Z | 2026-05-08T19:53:16.358Z |
| CVE-2026-42181 |
6.5 (3.1)
|
Lemmy: SSRF and internal image disclosure in post link… |
LemmyNet |
lemmy |
2026-05-08T19:26:07.763Z | 2026-05-08T19:26:07.763Z |
| CVE-2026-42180 |
6.3 (3.1)
|
Lemmy: SSRF in /api/v3/post via Webmention dispatch |
LemmyNet |
lemmy |
2026-05-08T19:29:04.132Z | 2026-05-08T19:29:04.132Z |
| CVE-2026-42176 |
6.7 (3.1)
|
Scoold: Persistent Admin Takeover by Overwriting the a… |
Erudika |
scoold |
2026-05-08T19:16:35.701Z | 2026-05-08T19:31:42.697Z |
| CVE-2026-42160 |
10 (4.0)
|
Data Space Portal: Incorrect Authorization and Client-… |
sovity |
dataspace-portal |
2026-05-08T19:46:59.825Z | 2026-05-08T19:46:59.825Z |
| CVE-2026-41887 |
4.9 (3.1)
|
Flarum: Path traversal in LESS parser via theme color … |
flarum |
framework |
2026-05-08T15:50:38.484Z | 2026-05-08T19:26:53.642Z |
| CVE-2026-41495 |
5.3 (3.1)
|
n8n-MCP Logs Sensitive Request Data on Unauthorized /m… |
czlonkowski |
n8n-mcp |
2026-05-08T18:58:24.574Z | 2026-05-08T18:58:24.574Z |
| CVE-2026-29203 |
8.8 (3.1)
|
A chmod call in the cPanel Nova plugin's Cpanel::… |
WebPros |
cPanel |
2026-05-08T18:51:05.541Z | 2026-05-09T03:56:05.260Z |
| CVE-2026-29202 |
8.8 (3.1)
|
Insufficient input validation of the `plugin` par… |
WebPros |
cPanel |
2026-05-08T18:51:05.585Z | 2026-05-09T03:56:06.386Z |
| CVE-2026-29201 |
4.3 (3.1)
|
Insufficient input validation of the feature file… |
WebPros |
cPanel |
2026-05-08T18:51:05.803Z | 2026-05-08T19:52:40.780Z |
| CVE-2024-53326 |
7.3 (3.1)
|
LINQPad before 5.52.01 Pro edition is vulnerable … |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T19:07:17.134Z |
| CVE-2023-46453 |
9.8 (3.1)
|
Certain GL.iNet devices with 4.x firmware allow a… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T18:59:23.304Z |
| CVE-2026-43110 |
8.8 (3.1)
|
wifi: brcmfmac: validate bsscfg indices in IF events |
Linux |
Linux |
2026-05-06T07:40:37.250Z | 2026-05-08T12:40:34.959Z |
| CVE-2026-8084 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
OSGeo gdal HDF-EOS Grid File SWapi.c memmove out-of-bounds |
OSGeo |
gdal |
2026-05-07T18:30:13.275Z | 2026-05-08T22:53:55.692Z |
| CVE-2026-8088 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
OSGeo gdal GDapi.c GDfieldinfo out-of-bounds |
OSGeo |
gdal |
2026-05-07T19:30:11.704Z | 2026-05-08T21:30:21.341Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-43259 | In the Linux kernel, the following vulnerability has been resolved: phy: fsl-imx8mq-usb: set platf… | 2026-05-06T12:16:46.777 | 2026-05-08T20:31:42.360 |
| fkie_cve-2026-8018 | Insufficient policy enforcement in DevTools in Google Chrome prior to 148.0.7778.96 allowed a remot… | 2026-05-06T19:16:52.770 | 2026-05-08T20:16:33.307 |
| fkie_cve-2026-7989 | Insufficient data validation in DataTransfer in Google Chrome prior to 148.0.7778.96 allowed a remo… | 2026-05-06T19:16:49.783 | 2026-05-08T20:16:33.150 |
| fkie_cve-2026-7959 | Inappropriate implementation in Navigation in Google Chrome prior to 148.0.7778.96 allowed a remote… | 2026-05-06T19:16:45.847 | 2026-05-08T20:16:33.000 |
| fkie_cve-2026-7946 | Insufficient policy enforcement in WebUI in Google Chrome on Linux, Mac, Windows, ChromeOS prior to… | 2026-05-06T19:16:42.927 | 2026-05-08T20:16:32.850 |
| fkie_cve-2026-7932 | Insufficient policy enforcement in Downloads in Google Chrome prior to 148.0.7778.96 allowed a loca… | 2026-05-06T19:16:41.540 | 2026-05-08T20:16:32.687 |
| fkie_cve-2026-7916 | Insufficient data validation in InterestGroups in Google Chrome prior to 148.0.7778.96 allowed a re… | 2026-05-06T19:16:39.880 | 2026-05-08T20:16:32.520 |
| fkie_cve-2026-7807 | SmarterTools SmarterMail builds prior to 9560 contain a local file inclusion vulnerability in the /… | 2026-05-08T20:16:32.200 | 2026-05-08T20:16:32.200 |
| fkie_cve-2026-6659 | Crypt::PasswdMD5 versions through 1.42 for Perl generates insecure random values for salts. The bu… | 2026-05-08T18:16:34.183 | 2026-05-08T20:16:32.063 |
| fkie_cve-2026-44694 | n8n-MCP is an MCP server that provides AI assistants access to n8n node documentation, properties, … | 2026-05-08T20:16:31.917 | 2026-05-08T20:16:31.917 |
| fkie_cve-2026-42282 | n8n-MCP is an MCP server that provides AI assistants access to n8n node documentation, properties, … | 2026-05-08T20:16:31.717 | 2026-05-08T20:16:31.717 |
| fkie_cve-2026-42190 | RedwoodSDK is a server-first React framework. From version 1.0.0-beta.50 to before version 1.2.3, s… | 2026-05-08T20:16:31.580 | 2026-05-08T20:16:31.580 |
| fkie_cve-2026-42189 | Russh is a Rust SSH client & server library. Prior to version 0.60.1, a pre-authentication denial-o… | 2026-05-08T20:16:31.443 | 2026-05-08T20:16:31.443 |
| fkie_cve-2026-42185 | People is an application to handle users and teams, and distribute permissions across La Suite. Pri… | 2026-05-08T20:16:31.290 | 2026-05-08T20:16:31.290 |
| fkie_cve-2026-42181 | Lemmy is a link aggregator and forum for the fediverse. Prior to version 0.19.18, Lemmy fetches met… | 2026-05-08T20:16:31.160 | 2026-05-08T20:16:31.160 |
| fkie_cve-2026-42180 | Lemmy is a link aggregator and forum for the fediverse. Prior to version 0.19.18, Lemmy allows an a… | 2026-05-08T20:16:31.023 | 2026-05-08T20:16:31.023 |
| fkie_cve-2026-42176 | Scoold is a Q&A and a knowledge sharing platform for teams. Prior to version 1.67.0, Scoold allows … | 2026-05-08T20:16:30.873 | 2026-05-08T20:16:30.873 |
| fkie_cve-2026-42160 | Data Space Portal is an open-source Software as a Service (SaaS) solution designed to streamline Da… | 2026-05-08T20:16:30.743 | 2026-05-08T20:16:30.743 |
| fkie_cve-2026-41887 | Flarum is open-source forum software. Prior to versions 1.8.16 and 2.0.0-rc.1, Flarum's patch for C… | 2026-05-08T17:16:30.890 | 2026-05-08T20:16:30.580 |
| fkie_cve-2026-41495 | n8n-MCP is an MCP server that provides AI assistants access to n8n node documentation, properties, … | 2026-05-08T20:16:30.323 | 2026-05-08T20:16:30.323 |
| fkie_cve-2026-29203 | A chmod call in the cPanel Nova plugin's Cpanel::Nova::Connector follows symlinks, allowing setting… | 2026-05-08T19:16:30.147 | 2026-05-08T20:16:30.013 |
| fkie_cve-2026-29202 | Insufficient input validation of the `plugin` parameter of the `create_user` plugin allows arbitrar… | 2026-05-08T19:16:30.047 | 2026-05-08T20:16:29.867 |
| fkie_cve-2026-29201 | Insufficient input validation of the feature file name in `feature::LOADFEATUREFILE` adminbin call … | 2026-05-08T19:16:29.930 | 2026-05-08T20:16:29.727 |
| fkie_cve-2024-53326 | LINQPad before 5.52.01 Pro edition is vulnerable to Unsafe Deserialization in LINQPad.AutoRefManage… | 2026-05-08T06:16:10.223 | 2026-05-08T20:16:29.550 |
| fkie_cve-2023-46453 | Certain GL.iNet devices with 4.x firmware allow authentication bypass (resulting in administrative … | 2026-05-08T07:16:27.850 | 2026-05-08T20:16:28.533 |
| fkie_cve-2026-43110 | In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: validate bsscf… | 2026-05-06T10:16:24.690 | 2026-05-08T20:14:50.097 |
| fkie_cve-2026-8084 | A vulnerability was determined in OSGeo gdal up to 3.13.0dev-4. This vulnerability affects the func… | 2026-05-07T19:16:02.950 | 2026-05-08T20:11:59.013 |
| fkie_cve-2026-8088 | A weakness has been identified in OSGeo gdal up to 3.13.0dev-4. The affected element is the functio… | 2026-05-07T20:16:45.510 | 2026-05-08T20:11:23.747 |
| fkie_cve-2026-8090 | Use-after-free in the DOM: Networking component. This vulnerability was fixed in Firefox 150.0.2, F… | 2026-05-07T13:16:13.967 | 2026-05-08T20:08:50.323 |
| fkie_cve-2026-42271 | LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version … | 2026-05-08T04:16:21.820 | 2026-05-08T20:04:50.543 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-fwqr-8mv5-j4p7 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Fix possible dere… | 2026-05-06T12:30:35Z | 2026-05-08T21:31:21Z |
| ghsa-fgwc-jh8c-45pq |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: media: mtk-mdp: Fix a referenc… | 2026-05-06T12:30:35Z | 2026-05-08T21:31:21Z |
| ghsa-fcq7-vvcv-2qg9 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ceph: supply snapshot context … | 2026-05-06T12:30:36Z | 2026-05-08T21:31:21Z |
| ghsa-c8jc-4xgp-98r9 |
4.7 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Flush excepti… | 2026-05-06T12:30:35Z | 2026-05-08T21:31:21Z |
| ghsa-9wc3-g8j8-wv5q |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: hfsplus: pretend special inode… | 2026-05-06T12:30:35Z | 2026-05-08T21:31:21Z |
| ghsa-9729-xjvh-4qp8 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: drm/atmel-hlcdc: fix memory le… | 2026-05-06T12:30:35Z | 2026-05-08T21:31:21Z |
| ghsa-7vr5-gjv8-9p58 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: media: chips-media: wave5: Fix… | 2026-05-06T12:30:33Z | 2026-05-08T21:31:21Z |
| ghsa-72v5-9fv6-xvr9 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: fbdev: of: display_timing: fix… | 2026-05-06T12:30:35Z | 2026-05-08T21:31:21Z |
| ghsa-3r8g-c43c-9gw2 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: md-cluster: fix NULL pointer d… | 2026-05-06T12:30:35Z | 2026-05-08T21:31:21Z |
| ghsa-xrvp-77wr-x978 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: io_uring/zcrx: fix sgtable lea… | 2026-05-06T12:30:33Z | 2026-05-08T21:31:20Z |
| ghsa-wjhp-5p5w-qmhh |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: use skb_header_pointer() … | 2026-05-01T15:30:37Z | 2026-05-08T21:31:20Z |
| ghsa-w7cv-frw4-84fj |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: sched: cls_api: fix tc_ch… | 2026-05-01T15:30:37Z | 2026-05-08T21:31:20Z |
| ghsa-vpmp-q24v-v7p4 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: qrtr: replace qrtr_tx_flo… | 2026-05-01T15:30:37Z | 2026-05-08T21:31:20Z |
| ghsa-r27m-4434-33fh |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix memory… | 2026-05-06T12:30:33Z | 2026-05-08T21:31:20Z |
| ghsa-g4p6-4x9w-qfq5 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: hfs: Replace BUG_ON with error… | 2026-05-06T12:30:33Z | 2026-05-08T21:31:20Z |
| ghsa-fr73-rvrj-9p6q |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: clocksource/drivers/sh_tmu: Al… | 2026-05-06T12:30:33Z | 2026-05-08T21:31:20Z |
| ghsa-87mg-5j2r-6p32 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: crypto: af-alg - fix NULL poin… | 2026-05-01T15:30:37Z | 2026-05-08T21:31:20Z |
| ghsa-69m6-gcw2-m2rp |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: media: pvrusb2: fix URB leak i… | 2026-05-06T12:30:33Z | 2026-05-08T21:31:20Z |
| ghsa-59pc-r9mr-h2pv |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: ipv6: ndisc: fix ndisc_ra… | 2026-05-01T15:30:37Z | 2026-05-08T21:31:20Z |
| ghsa-2274-3hgr-wxv6 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to… | 2026-04-22T09:31:32Z | 2026-05-08T21:31:20Z |
| ghsa-xxr8-8jrf-7gfq |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: usb: cdns3: gadget: fix state … | 2026-05-01T15:30:34Z | 2026-05-08T21:31:19Z |
| ghsa-w54w-gcfv-p884 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: bnxt_en: set backing store typ… | 2026-05-01T15:30:37Z | 2026-05-08T21:31:19Z |
| ghsa-mpm7-4jvj-fcrv |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: NFC: pn533: bound the UART rec… | 2026-05-01T15:30:37Z | 2026-05-08T21:31:19Z |
| ghsa-gmmh-f7fw-32mm |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: auxdisplay: line-display: fix … | 2026-05-01T15:30:34Z | 2026-05-08T21:31:19Z |
| ghsa-5r68-rpxc-f6cw |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: usb: cdns3: gadget: fix NULL p… | 2026-05-01T15:30:34Z | 2026-05-08T21:31:19Z |
| ghsa-x8vm-v82f-5f3c |
7.8 (3.1)
|
In Progress® Telerik® UI for WinUI versions prior to 2025 Q1 (3.0.0), a command injection attack is… | 2025-02-12T15:32:02Z | 2026-05-08T21:31:18Z |
| ghsa-m9g3-3g99-mhpx |
5.8 (3.1)
|
eventsource-encoder vulnerable to SSE event injection via unsanitized `event` and `id` fields | 2026-05-08T20:49:40Z | 2026-05-08T20:49:40Z |
| ghsa-wfr5-454p-mjc2 |
6.5 (3.1)
|
OpenTelemetry.Exporter.Instana bypasses TLS certificate validation when a proxy is configured | 2026-05-08T20:48:02Z | 2026-05-08T20:48:02Z |
| ghsa-8wxp-xxp2-rcgx |
6.8 (3.1)
|
Volcano's webhook server vulnerable to OOM due to unbounded HTTP request body size | 2026-05-08T20:44:54Z | 2026-05-08T20:44:54Z |
| ghsa-5c57-rqjx-35g2 |
9.6 (3.1)
|
Cline Kanban Server has a Cross-Origin WebSocket Hijacking Vulnerability | 2026-05-08T20:43:17Z | 2026-05-08T20:43:17Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-204 |
8.1 (3.1)
|
TorchGeo Remote Code Execution Vulnerability | torchgeo | 2024-11-12T18:15:45+00:00 | 2025-01-19T19:19:01.299352+00:00 |
| pysec-2024-203 |
7.5 (3.1)
|
DuckDB is a SQL database management system. In versions 1.0.0 and prior, content in files… | duckdb | 2024-07-24T18:15:05+00:00 | 2025-01-19T19:18:58.299130+00:00 |
| pysec-2024-202 |
6.5 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-11-05T19:15:07+00:00 | 2025-01-19T16:22:59.212853+00:00 |
| pysec-2024-201 |
6.1 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-11-05T19:15:05+00:00 | 2025-01-19T16:22:59.154645+00:00 |
| pysec-2024-200 |
7.2 (3.1)
|
JupyterHub is software that allows one to create a multi-user server for Jupyter notebook… | jupyterhub | 2024-08-08T15:15:17+00:00 | 2025-01-19T16:22:58.171761+00:00 |
| pysec-2024-199 |
3.7 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T16:22:57.938459+00:00 |
| pysec-2024-198 |
4.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:11+00:00 | 2025-01-19T16:22:57.845317+00:00 |
| pysec-2024-197 |
5.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T16:22:57.732726+00:00 |
| pysec-2024-196 |
8.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T16:22:57.640183+00:00 |
| pysec-2024-195 |
5.5 (3.1)
|
Use of Web Browser Cache Containing Sensitive Information vulnerability in Apache Airflow… | apache-airflow | 2024-06-14T09:15:09+00:00 | 2025-01-19T16:22:56.419822+00:00 |
| pysec-2024-194 |
6.1 (3.1)
|
A clickjacking vulnerability exists in zenml-io/zenml versions up to and including 0.55.5… | zenml | 2024-06-06T19:15:54+00:00 | 2025-01-19T13:22:31.835293+00:00 |
| pysec-2024-193 |
3.3 (3.1)
|
An issue was discovered in zenml-io/zenml versions up to and including 0.55.4. Due to imp… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-19T13:22:31.701775+00:00 |
| pysec-2024-192 |
|
An issue was discovered in llama_index before 0.10.38. download/integration.py includes a… | llama-index | 2024-08-22T20:15:10+00:00 | 2025-01-19T13:22:29.175614+00:00 |
| pysec-2024-191 |
5.5 (3.1)
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2024-10-24T22:15:04+00:00 | 2025-01-19T10:22:29.812605+00:00 |
| pysec-2024-190 |
8.8 (3.1)
|
Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenti… | apache-airflow | 2024-07-17T08:15:02+00:00 | 2025-01-19T07:21:16.859034+00:00 |
| pysec-2024-189 |
5.4 (3.1)
|
Apache Airflow versions before 2.9.3 have a vulnerability that allows an authenticated at… | apache-airflow | 2024-07-17T08:15:01+00:00 | 2025-01-19T07:21:16.796301+00:00 |
| pysec-2024-188 |
6.1 (3.1)
|
WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Lo… | webob | 2024-08-14T21:15:17+00:00 | 2025-01-19T04:23:01.908824+00:00 |
| pysec-2024-187 |
9.8 (3.1)
|
virtualenv before 20.26.6 allows command injection through the activation scripts for a v… | virtualenv | 2024-11-24T16:15:06+00:00 | 2025-01-19T04:23:01.784352+00:00 |
| pysec-2024-186 |
6.5 (3.1)
|
RestrictedPython is a restricted execution environment for Python to run untrusted code. … | restrictedpython | 2024-09-30T16:15:09+00:00 | 2025-01-19T04:23:01.259448+00:00 |
| pysec-2024-185 |
|
Nebari through 2024.4.1 prints the temporary Keycloak root password. | nebari | 2024-05-06T00:15:10+00:00 | 2025-01-19T04:23:00.951638+00:00 |
| pysec-2024-184 |
7.5 (3.1)
|
A local file inclusion vulnerability exists in the JSON component of gradio-app/gradio ve… | gradio | 2024-06-06T18:15:18+00:00 | 2025-01-19T04:23:00.017053+00:00 |
| pysec-2024-183 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-11-06T15:15:11+00:00 | 2025-01-19T04:22:59.576907+00:00 |
| pysec-2024-182 |
|
Apache Airflow versions before 2.10.3 contain a vulnerability that could expose sensitive… | apache-airflow | 2024-11-15T09:15:14+00:00 | 2025-01-19T04:22:59.398988+00:00 |
| pysec-2024-181 |
6.1 (3.1)
|
Apache Airflow, versions before 2.10.0, have a vulnerability that allows the developer of… | apache-airflow | 2024-08-21T16:15:08+00:00 | 2025-01-19T04:22:59.351008+00:00 |
| pysec-2024-180 |
5.4 (3.1)
|
Stored XSS in organizer and event settings of pretix up to 2024.7.0 allows malicious even… | pretix | 2024-08-23T15:15:17+00:00 | 2025-01-19T01:52:24.493530+00:00 |
| pysec-2024-179 |
4.8 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-03-18T22:15:07+00:00 | 2025-01-19T01:52:24.377662+00:00 |
| pysec-2024-178 |
7.5 (3.1)
|
Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to version 2… | litestar | 2024-11-20T21:15:08+00:00 | 2025-01-19T01:52:23.772726+00:00 |
| pysec-2024-177 |
9.8 (3.1)
|
Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach… | langflow | 2024-06-10T20:15:15+00:00 | 2025-01-19T01:52:23.722576+00:00 |
| pysec-2024-176 |
6.1 (3.1)
|
A reflected Cross-Site Scripting (XSS) vulnerability was identified in zenml-io/zenml ver… | zenml | 2024-06-30T16:15:03+00:00 | 2025-01-18T22:21:45.122426+00:00 |
| pysec-2024-175 |
|
WordOps through 3.20.0 has a wo/cli/plugins/stack_pref.py TOCTOU race condition because t… | wordops | 2024-05-06T00:15:10+00:00 | 2025-01-18T22:21:44.991242+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33769 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.558897Z |
| gsd-2024-33768 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.521409Z |
| gsd-2024-33767 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.454953Z |
| gsd-2024-33766 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.508057Z |
| gsd-2024-33765 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.328589Z |
| gsd-2024-33764 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.348731Z |
| gsd-2024-33763 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.335356Z |
| gsd-2024-33762 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.364877Z |
| gsd-2024-33761 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.399777Z |
| gsd-2024-33760 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.533361Z |
| gsd-2024-33759 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.447890Z |
| gsd-2024-33758 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.500910Z |
| gsd-2024-33757 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.319530Z |
| gsd-2024-33756 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.430035Z |
| gsd-2024-33755 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.436135Z |
| gsd-2024-33754 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.379823Z |
| gsd-2024-33753 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.430763Z |
| gsd-2024-33752 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.406190Z |
| gsd-2024-33751 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.370177Z |
| gsd-2024-33750 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.304976Z |
| gsd-2024-33749 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.584613Z |
| gsd-2024-33748 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.439408Z |
| gsd-2024-33747 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.485640Z |
| gsd-2024-33746 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.376327Z |
| gsd-2024-33745 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.468253Z |
| gsd-2024-33744 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.543395Z |
| gsd-2024-33743 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.488662Z |
| gsd-2024-33742 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.321372Z |
| gsd-2024-33741 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.568527Z |
| gsd-2024-33740 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.479260Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-3064 | Malicious code in @google-pay-trust/init-google-pay (npm) | 2026-04-25T18:05:43Z | 2026-05-04T03:25:18Z |
| mal-2026-3063 | Malicious code in @google-pay-trust/finish (npm) | 2026-04-25T18:05:42Z | 2026-05-04T03:25:18Z |
| mal-2026-3062 | Malicious code in @google-pay-trust/cancelled (npm) | 2026-04-25T18:15:50Z | 2026-05-04T03:25:18Z |
| mal-2026-3061 | Malicious code in @google-pay-trust/authorize-payment (npm) | 2026-04-25T18:06:02Z | 2026-05-04T03:25:18Z |
| mal-2026-3055 | Malicious code in @apple-pay-trust/validate-merchant (npm) | 2026-04-25T18:05:42Z | 2026-05-04T03:25:18Z |
| mal-2026-3054 | Malicious code in @apple-pay-trust/start (npm) | 2026-04-25T18:05:52Z | 2026-05-04T03:25:18Z |
| mal-2026-3053 | Malicious code in @apple-pay-trust/merchant-session (npm) | 2026-04-25T18:16:00Z | 2026-05-04T03:25:18Z |
| mal-2026-3052 | Malicious code in @alfa.life.mapp/app.web (npm) | 2026-04-24T20:06:24Z | 2026-05-04T03:25:18Z |
| mal-2026-3315 | Malicious code in update-db (npm) | 2026-05-01T15:01:41Z | 2026-05-04T03:15:20Z |
| mal-2026-2930 | Malicious code in path-internal (npm) | 2026-04-14T10:53:25Z | 2026-05-04T03:15:19Z |
| mal-2026-3305 | Malicious code in apple-internal-security-audit-v99 (npm) | 2026-04-30T08:26:11Z | 2026-05-04T03:15:15Z |
| mal-2026-3234 | Malicious code in apexpro (npm) | 2026-05-02T09:37:09Z | 2026-05-04T03:15:15Z |
| mal-2026-3321 | Malicious code in @montanatonytest/app.web (npm) | 2026-05-04T03:02:53Z | 2026-05-04T03:02:59Z |
| mal-2026-3320 | Malicious code in @google-pay-trust/start (npm) | 2026-05-04T03:02:53Z | 2026-05-04T03:02:59Z |
| mal-2026-3319 | Malicious code in @google-pay-trust/init-google-pay-result (npm) | 2026-05-04T03:02:53Z | 2026-05-04T03:02:59Z |
| mal-2026-3318 | Malicious code in @b2b_blocker/hide_activation_error (npm) | 2026-05-04T03:02:53Z | 2026-05-04T03:02:59Z |
| mal-2026-3316 | Malicious code in @apple-pay-trust/check-apple-pay (npm) | 2026-05-04T03:02:53Z | 2026-05-04T03:02:59Z |
| mal-2026-3317 | Malicious code in @apple-pay-trust/destroy (npm) | 2026-05-04T03:02:53Z | 2026-05-04T03:02:54Z |
| mal-2026-2884 | Malicious code in forge-jsx (npm) | 2026-04-15T18:37:07Z | 2026-05-04T01:57:07Z |
| mal-2026-3276 | Malicious code in accesso-angular-cache-buster (npm) | 2026-05-04T01:51:22Z | 2026-05-04T01:51:27Z |
| mal-2026-3286 | Malicious code in wagner-horizon (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:36Z |
| mal-2026-3284 | Malicious code in tinfoil-shops (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:36Z |
| mal-2026-3285 | Malicious code in vpi-guides (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| mal-2026-3283 | Malicious code in temhe-dev (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| mal-2026-3282 | Malicious code in shopify-draggable (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| mal-2026-3281 | Malicious code in pos-next-react-native (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| mal-2026-3280 | Malicious code in pi-exa-mcp (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| mal-2026-3279 | Malicious code in muenxo (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| mal-2026-3278 | Malicious code in honcho-theme (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| mal-2026-3277 | Malicious code in edj-shopify-theme (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1976 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-04T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1898 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und Privilegieneskalation | 2025-08-24T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1869 | Linux Kernel: Mehrere Schwachstellen | 2025-08-19T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1858 | Linux Kernel: Mehrere Schwachstellen | 2025-08-17T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1653 | Linux Kernel: Mehrere Schwachstellen | 2025-07-27T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1517 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-08T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1481 | Linux Kernel: Mehrere Schwachstellen | 2025-07-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1465 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-06T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1452 | Linux Kernel: Mehrere Schwachstellen | 2025-07-02T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1350 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-06-17T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0861 | Linux Kernel: Mehrere Schwachstellen | 2025-04-21T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0844 | Linux Kernel: Mehrere Schwachstellen | 2025-04-16T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0837 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-04-15T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0545 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-03-11T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0499 | Linux Kernel: Mehrere Schwachstellen | 2025-03-06T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0453 | Linux Kernel: Mehrere Schwachstellen | 2025-02-26T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3762 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-12-29T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3575 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-12-02T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3251 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-10-21T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3134 | Linux Kernel: Mehrere Schwachstellen | 2024-10-09T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3050 | Linux Kernel: Mehrere Schwachstellen | 2024-09-29T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-2173 | Linux Kernel: Mehrere Schwachstellen | 2024-09-17T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1721 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-07-28T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1451 | Linux Kernel: Mehrere Schwachstellen | 2024-06-25T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1259 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifischen Angriff | 2024-05-30T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0585 | Grafana: Schwachstelle ermöglicht Privilegieneskalation | 2024-03-07T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0219 | libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-01-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2023-3004 | libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-11-26T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2022-0463 | NGINX: Schwachstelle ermöglicht Denial of Service | 2021-05-25T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0879 | Linux Kernel: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-04-08T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-070-01 | Schneider Electric Uni-Telway Driver (Update C) | 2025-02-11T05:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-24-296-01 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products (Update C) | 2024-10-22T06:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-22-202-04 | ICONICS Suite and Mitsubishi Electric MC Works64 Products (Update C) | 2022-07-26T06:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-26-020-01 | Schneider Electric EcoStruxure Foxboro DCS (Update A) | 2025-12-09T08:00:00.000000Z | 2026-02-24T06:00:00.000000Z |
| icsa-26-050-04 | Welker OdorEyes EcoSystem Pulse Bypass System with XL4 Controller | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-050-03 | Jinan USR IOT Technology Limited (PUSR) USR-W610 | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-050-02 | Valmet DNA Engineering Web Tools | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-050-01 | EnOcean SmartServer IoT | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-24-263-02 | IDEC Products (Update A) | 2024-09-19T06:00:00.000000Z | 2026-02-18T07:00:00.000000Z |
| icsa-26-048-03 | GE Vernova Enervista UR Setup | 2026-02-17T07:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-048-02 | Delta Electronics ASDA-Soft | 2026-02-17T07:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-048-01 | Siemens Simcenter Femap and Nastran | 2026-02-10T00:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-043-10 | Airleader Master | 2026-02-12T07:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-09 | Hitachi Energy SuprOS | 2026-01-27T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-07 | Siemens Siveillance Video Management Servers | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-05 | Siemens Solid Edge | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-04 | Siemens Desigo CC Product Family and SENTRON Powermanager | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-02 | Siemens Polarion | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-015-04 | Siemens SIMATIC and SIPLUS products | 2026-01-13T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-289-06 | Siemens SiPass Integrated | 2025-10-14T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-135-01 | Siemens RUGGEDCOM APE1808 Devices | 2025-05-13T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-24-102-01 | Siemens SIMATIC S7-1500 | 2024-04-09T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-12-349-01 | Siemens Automation License Manager Uncontrolled Resource Consumption | 2012-12-12T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-036-01 | TP-Link Systems Inc. VIGI Series IP Camera | 2026-02-05T06:00:00.000000Z | 2026-02-11T06:00:00.000000Z |
| icsma-26-041-01 | ZOLL ePCR IOS Mobile Application | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-04 | AVEVA PI to CONNECT Agent | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-03 | AVEVA PI Data Archive | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-02 | ZLAN Information Technology Co. ZLAN5143D | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-01 | Yokogawa FAST/TOOLS | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-036-06 | Hitachi Energy FOX61x | 2026-01-27T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-nshs-urapi-gjubvfpu | Cisco Nexus Dashboard and Nexus Dashboard Fabric Controller Unauthorized REST API Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nd-ptrs-xu2fm2wb | Cisco Nexus Dashboard Path Traversal Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-n39k-isis-dos-jhja8rfx | Cisco Nexus 3000 and 9000 Series Switches Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ise-file-upload-qksx6c8g | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:43:01+00:00 |
| cisco-sa-pi-epnm-tet4gxbx | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Sensitive Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-authproxlog-sxczxq63 | Cisco Duo Authentication Proxy Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-20180328-smi2 | Cisco IOS and IOS XE Software Smart Install Remote Code Execution Vulnerability | 2018-03-28T16:00:00+00:00 | 2025-08-20T14:26:26+00:00 |
| cisco-sa-asaftd-ssltls-dos-ehw76vze | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software SSL/TLS Certificate Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-19T16:32:05+00:00 |
| cisco-sa-ftd-ravpn-geobypass-9h38m37z | Cisco Secure Firewall Threat Defense Software Geolocation Remote Access VPN Bypass Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-ftd-dos-svkhtjgt | Cisco Secure Firewall Threat Defense Software Snort 3 Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-xss-jtnmcusp | Cisco Secure Firewall Management Center Software Cross-Site Scripting Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-xpathinj-corthdmb | Cisco Secure Firewall Management Center Software XPATH Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-radius-rce-tnbkf79 | Cisco Secure Firewall Management Center Software RADIUS Remote Code Execution Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-html-inj-mqjrzrny | Cisco Secure Firewall Management Center Software HTML Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-ftd-cmdinj-phe7kmt | Cisco Secure Firewall Management Center and Secure Firewall Threat Defense Software Command Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-hcrlpfyn | Cisco Secure Firewall Management Center Software Command Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-authz-bypass-m7xhnau | Cisco Secure Firewall Management Center Software Authorization Bypass Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpnwebs-dos-hjbhmbsx | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access VPN Web Server Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpn-dos-mfpeka6e | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-nat-dns-dos-bqhynhtm | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Network Address Translation DNS Inspection Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-http-file-huyx2jl4 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Server Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-dhcp-qj7ngs4n | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software DHCP Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-cmdinj-vehfezq3 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Authenticated Command Injection Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-ftd-ios-dos-doeshwhy | Cisco IOS, IOS XE, Secure Firewall Adaptive Security Appliance, and Secure Firewall Threat Defense Software IKEv2 Denial of Service Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-ftd-acl-bypass-mtpze9yh | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Access Control Rules Bypass Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-buffer-overflow-pyruhwbc | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Web Services Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-webex-join-ynxfqhk4 | Cisco Webex Meeting Client Join Certificate Validation Vulnerability | 2025-08-06T16:00:00+00:00 | 2025-08-06T16:00:00+00:00 |
| cisco-sa-ise_xss_acc_cont-ysr4ut4u | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2025-08-06T16:00:00+00:00 | 2025-08-06T16:00:00+00:00 |
| cisco-sa-20170629-snmp | SNMP Remote Code Execution Vulnerabilities in Cisco IOS and IOS XE Software | 2017-06-29T16:00:00+00:00 | 2025-07-30T16:27:06+00:00 |
| cisco-sa-ise-unauth-rce-zad2gnj6 | Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities | 2025-06-25T16:00:00+00:00 | 2025-07-24T23:30:31+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-38591 | bpf: Reject narrower access to pointer ctx fields | 2025-08-02T00:00:00.000Z | 2026-05-06T14:52:10.000Z |
| msrc_cve-2026-31419 | net: bonding: fix use-after-free in bond_xmit_broadcast() | 2026-04-02T00:00:00.000Z | 2026-05-06T14:52:08.000Z |
| msrc_cve-2024-53201 | drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe | 2024-12-02T00:00:00.000Z | 2026-05-06T14:52:04.000Z |
| msrc_cve-2025-38359 | s390/mm: Fix in_atomic() handling in do_secure_storage_access() | 2025-07-02T00:00:00.000Z | 2026-05-06T14:52:01.000Z |
| msrc_cve-2023-52485 | drm/amd/display: Wake DMCUB before sending a command | 2024-02-02T08:00:00.000Z | 2026-05-06T14:51:56.000Z |
| msrc_cve-2025-38311 | iavf: get rid of the crit lock | 2025-07-02T00:00:00.000Z | 2026-05-06T14:51:54.000Z |
| msrc_cve-2024-42107 | ice: Don't process extts if PTP is disabled | 2024-07-01T07:00:00.000Z | 2026-05-06T14:51:48.000Z |
| msrc_cve-2025-38272 | net: dsa: b53: do not enable EEE on bcm63xx | 2025-07-02T00:00:00.000Z | 2026-05-06T14:51:46.000Z |
| msrc_cve-2026-39882 | OpenTelemetry-Go OTLP HTTP exporters read unbounded HTTP response bodies | 2026-04-02T00:00:00.000Z | 2026-05-06T14:51:41.000Z |
| msrc_cve-2025-38269 | btrfs: exit after state insertion failure at btrfs_convert_extent_bit() | 2025-07-02T00:00:00.000Z | 2026-05-06T14:51:38.000Z |
| msrc_cve-2024-56712 | udmabuf: fix memory leak on last export_udmabuf() error path | 2024-12-02T00:00:00.000Z | 2026-05-06T14:51:34.000Z |
| msrc_cve-2025-38279 | bpf: Do not include stack ptr register in precision backtracking bookkeeping | 2025-07-02T00:00:00.000Z | 2026-05-06T14:51:32.000Z |
| msrc_cve-2024-56647 | net: Fix icmp host relookup triggering ip_rt_bug | 2024-12-02T00:00:00.000Z | 2026-05-06T14:51:26.000Z |
| msrc_cve-2026-23468 | drm/amdgpu: Limit BO list entry count to prevent resource exhaustion | 2026-04-02T00:00:00.000Z | 2026-05-06T14:51:24.000Z |
| msrc_cve-2025-38303 | Bluetooth: eir: Fix possible crashes on eir_create_adv_data | 2025-07-02T00:00:00.000Z | 2026-05-06T14:51:24.000Z |
| msrc_cve-2024-53089 | LoongArch: KVM: Mark hrtimer to expire in hard interrupt context | 2024-11-02T00:00:00.000Z | 2026-05-06T14:51:19.000Z |
| msrc_cve-2026-23472 | serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN | 2026-04-02T00:00:00.000Z | 2026-05-06T14:51:17.000Z |
| msrc_cve-2025-38333 | f2fs: fix to bail out in get_new_segment() | 2025-07-02T00:00:00.000Z | 2026-05-06T14:51:17.000Z |
| msrc_cve-2024-53090 | afs: Fix lock recursion | 2024-11-02T00:00:00.000Z | 2026-05-06T14:51:12.000Z |
| msrc_cve-2025-38264 | nvme-tcp: sanitize request list handling | 2025-07-02T00:00:00.000Z | 2026-05-06T14:51:10.000Z |
| msrc_cve-2026-5107 | FRRouting FRR EVPN Type-2 Route bgp_evpn.c process_type2_route access control | 2026-03-02T00:00:00.000Z | 2026-05-06T14:51:06.000Z |
| msrc_cve-2025-38096 | wifi: iwlwifi: don't warn when if there is a FW error | 2025-07-02T00:00:00.000Z | 2026-05-06T14:51:03.000Z |
| msrc_cve-2025-38140 | dm: limit swapping tables for devices with zone write plugs | 2025-07-02T00:00:00.000Z | 2026-05-06T14:50:55.000Z |
| msrc_cve-2026-23371 | sched/deadline: Fix missing ENQUEUE_REPLENISH during PI de-boosting | 2026-03-02T00:00:00.000Z | 2026-05-06T14:50:51.000Z |
| msrc_cve-2024-53114 | x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client | 2024-12-02T00:00:00.000Z | 2026-05-06T14:50:50.000Z |
| msrc_cve-2025-38029 | kasan: avoid sleepable page allocation from atomic context | 2025-06-02T00:00:00.000Z | 2026-05-06T14:50:48.000Z |
| msrc_cve-2026-23346 | arm64: io: Extract user memory type in ioremap_prot() | 2026-03-02T00:00:00.000Z | 2026-05-06T14:50:43.000Z |
| msrc_cve-2025-38064 | virtio: break and reset virtio devices on device_shutdown() | 2025-06-02T00:00:00.000Z | 2026-05-06T14:50:40.000Z |
| msrc_cve-2026-23383 | bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing | 2026-03-02T00:00:00.000Z | 2026-05-06T14:50:37.000Z |
| msrc_cve-2024-42134 | virtio-pci: Check if is_avq is NULL | 2024-07-01T07:00:00.000Z | 2026-05-06T14:50:35.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0393 | Kwetsbaarheid verholpen in GeoServer | 2025-12-12T08:12:18.831044Z | 2025-12-12T09:02:27.681292Z |
| ncsc-2025-0392 | Kwetsbaarheid verholpen in Barracuda Service Center | 2025-12-11T13:53:23.819008Z | 2025-12-11T13:53:23.819008Z |
| ncsc-2025-0391 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2025-12-11T13:51:55.178462Z | 2025-12-11T13:51:55.178462Z |
| ncsc-2025-0390 | Kwetsbaarheden verholpen in GitLab CE/EE | 2025-12-11T09:22:54.841848Z | 2025-12-11T09:22:54.841848Z |
| ncsc-2025-0389 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-12-10T14:59:57.911864Z | 2025-12-10T14:59:57.911864Z |
| ncsc-2025-0388 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-12-10T13:35:58.314547Z | 2025-12-10T13:35:58.314547Z |
| ncsc-2025-0387 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2025-12-10T13:34:08.908897Z | 2025-12-10T13:34:08.908897Z |
| ncsc-2025-0385 | Kwetsbaarheden verholpen in Microsoft Exchange | 2025-12-09T18:42:32.332749Z | 2025-12-09T18:42:32.332749Z |
| ncsc-2025-0384 | Kwetsbaarheden verholpen in Microsoft Office | 2025-12-09T18:40:33.839342Z | 2025-12-09T18:40:33.839342Z |
| ncsc-2025-0383 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-12-09T18:39:18.152251Z | 2025-12-09T18:39:18.152251Z |
| ncsc-2025-0382 | Kwetsbaarheden verholpen in Siemens producten | 2025-12-09T13:15:05.391966Z | 2025-12-09T13:15:05.391966Z |
| ncsc-2025-0381 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2025-12-08T08:23:21.965599Z | 2025-12-08T08:23:21.965599Z |
| ncsc-2025-0380 | Kwetsbaarheden verholpen in React Server Components | 2025-12-03T20:11:57.728117Z | 2025-12-05T12:13:36.590522Z |
| ncsc-2025-0379 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-12-02T13:25:17.745981Z | 2025-12-02T13:25:17.745981Z |
| ncsc-2025-0378 | Kwetsbaarheden verholpen in Mattermost | 2025-11-28T09:53:42.334621Z | 2025-11-28T09:53:42.334621Z |
| ncsc-2025-0377 | Kwetsbaarheden verholpen in GitLab | 2025-11-27T13:35:09.121804Z | 2025-11-27T13:35:09.121804Z |
| ncsc-2025-0376 | Kwetsbaarheden verholpen in SonicWall Email Security appliances | 2025-11-21T16:06:33.949861Z | 2025-11-21T16:06:33.949861Z |
| ncsc-2025-0375 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2025-11-21T16:06:14.387571Z | 2025-11-21T16:06:14.387571Z |
| ncsc-2025-0334 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2025-10-23T13:42:11.992643Z | 2025-11-21T16:03:18.991100Z |
| ncsc-2025-0374 | Kwetsbaarheden verholpen in Arista EOS | 2025-11-20T11:48:20.126141Z | 2025-11-20T11:48:20.126141Z |
| ncsc-2025-0373 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2025-11-19T08:35:31.999400Z | 2025-11-19T08:35:31.999400Z |
| ncsc-2025-0372 | Kwetsbaarheid verholpen in Fortinet FortiWeb | 2025-11-19T08:34:59.616354Z | 2025-11-19T08:34:59.616354Z |
| ncsc-2025-0371 | Kwetsbaarheden verholpen in Google Chrome | 2025-11-18T09:01:31.984222Z | 2025-11-18T09:01:31.984222Z |
| ncsc-2025-0370 | Kwetsbaarheden verholpen in Cisco Unified Contact Center Express | 2025-11-18T07:04:55.173157Z | 2025-11-18T07:04:55.173157Z |
| ncsc-2025-0369 | Kwetsbaarheden verholpen in IBM AIX | 2025-11-18T07:03:55.766335Z | 2025-11-18T07:03:55.766335Z |
| ncsc-2025-0368 | Kwetsbaarheden verholpen in Zoom Workplace en Zoom Clients | 2025-11-18T07:02:36.696426Z | 2025-11-18T07:02:36.696426Z |
| ncsc-2025-0367 | Kwetsbaarheden verholpen in GitLab | 2025-11-18T07:01:35.502522Z | 2025-11-18T07:01:35.502522Z |
| ncsc-2025-0366 | Kwetsbaarheid verholpen in Fortinet FortiWeb | 2025-11-15T14:57:33.774388Z | 2025-11-15T14:57:33.774388Z |
| ncsc-2025-0365 | Kwetsbaarheden verholpen in Cisco Catalyst Center | 2025-11-14T12:55:27.227262Z | 2025-11-14T12:55:27.227262Z |
| ncsc-2025-0364 | Kwetsbaarheid verholpen in Adobe Photoshop | 2025-11-12T12:17:16.207233Z | 2025-11-12T12:17:16.207233Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10546-1 | python311-rfc3161-client-1.0.6-1.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| opensuse-su-2026:10545-1 | python311-aiohttp-3.13.5-3.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| opensuse-su-2026:10544-1 | log4j-2.20.0-2.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| opensuse-su-2026:10543-1 | kubo-0.40.1-1.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| opensuse-su-2026:10542-1 | goshs-2.0.0-1.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| opensuse-su-2026:10541-1 | flatpak-1.16.6-1.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| opensuse-su-2026:10540-1 | Botan-3.11.1-1.1 on GA media | 2026-04-14T00:00:00Z | 2026-04-14T00:00:00Z |
| opensuse-su-2026:10537-1 | python311-biopython-1.87-1.1 on GA media | 2026-04-12T00:00:00Z | 2026-04-12T00:00:00Z |
| opensuse-su-2026:10536-1 | libcap-devel-2.78-1.1 on GA media | 2026-04-12T00:00:00Z | 2026-04-12T00:00:00Z |
| opensuse-su-2026:10522-1 | python315-3.15.0~a8-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10521-1 | python312-3.12.13-5.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10520-1 | python310-3.10.20-4.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10519-1 | glances-common-4.5.3-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10518-1 | python311-Flask-HTTPAuth-4.8.1-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10517-1 | python313-Django6-6.0.4-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10516-1 | python311-Django4-4.2.30-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10515-1 | libprotobuf-lite34_1_0-32bit-34.1-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10514-1 | go1.25-1.25.9-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10513-1 | fontforge-20251009-6.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10512-1 | aws-c-event-stream-devel-0.7.0-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10511-1 | MozillaFirefox-149.0.2-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:20477-1 | Security update for aws-c-event-stream | 2026-04-08T13:03:50Z | 2026-04-08T13:03:50Z |
| opensuse-su-2026:10510-1 | sudo-1.9.17p2-2.1 on GA media | 2026-04-08T00:00:00Z | 2026-04-08T00:00:00Z |
| opensuse-su-2026:10509-1 | steampipe-2.4.1-1.1 on GA media | 2026-04-08T00:00:00Z | 2026-04-08T00:00:00Z |
| opensuse-su-2026:10508-1 | ruby4.0-rubygem-rack-2.2-2.2.23-1.1 on GA media | 2026-04-08T00:00:00Z | 2026-04-08T00:00:00Z |
| opensuse-su-2026:10507-1 | python311-lupa-2.7-1.1 on GA media | 2026-04-08T00:00:00Z | 2026-04-08T00:00:00Z |
| opensuse-su-2026:10506-1 | jupyter-jupyterlab-templates-0.5.3-1.1 on GA media | 2026-04-08T00:00:00Z | 2026-04-08T00:00:00Z |
| opensuse-su-2026:10505-1 | libIex-3_4-33-3.4.9-1.1 on GA media | 2026-04-08T00:00:00Z | 2026-04-08T00:00:00Z |
| opensuse-su-2026:10504-1 | corepack24-24.14.1-1.1 on GA media | 2026-04-08T00:00:00Z | 2026-04-08T00:00:00Z |
| opensuse-su-2026:10503-1 | firefox-esr-140.9.1-1.1 on GA media | 2026-04-08T00:00:00Z | 2026-04-08T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:3973 | Red Hat Security Advisory: git-lfs security update | 2026-03-09T01:30:22+00:00 | 2026-05-09T15:03:47+00:00 |
| rhsa-2026:3972 | Red Hat Security Advisory: git-lfs security update | 2026-03-09T01:55:26+00:00 | 2026-05-09T15:03:46+00:00 |
| rhsa-2026:3971 | Red Hat Security Advisory: rhc-worker-playbook security update | 2026-03-09T01:33:17+00:00 | 2026-05-09T15:03:45+00:00 |
| rhsa-2026:3970 | Red Hat Security Advisory: rhc-worker-playbook security update | 2026-03-09T01:29:32+00:00 | 2026-05-09T15:03:44+00:00 |
| rhsa-2026:3960 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2026-03-06T11:24:38+00:00 | 2026-05-09T15:03:44+00:00 |
| rhsa-2026:3959 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2026-03-06T16:36:31+00:00 | 2026-05-09T15:03:44+00:00 |
| rhsa-2026:3958 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Product Security and Bug Fix Update | 2026-03-06T11:00:27+00:00 | 2026-05-09T15:03:44+00:00 |
| rhsa-2026:3932 | Red Hat Security Advisory: git-lfs security update | 2026-03-05T16:08:17+00:00 | 2026-05-09T15:03:43+00:00 |
| rhsa-2026:3931 | Red Hat Security Advisory: git-lfs security update | 2026-03-05T16:12:11+00:00 | 2026-05-09T15:03:42+00:00 |
| rhsa-2026:3930 | Red Hat Security Advisory: git-lfs security update | 2026-03-05T17:14:14+00:00 | 2026-05-09T15:03:42+00:00 |
| rhsa-2026:3929 | Red Hat Security Advisory: git-lfs security update | 2026-03-05T17:28:44+00:00 | 2026-05-09T15:03:41+00:00 |
| rhsa-2026:3928 | Red Hat Security Advisory: git-lfs security update | 2026-03-05T16:42:20+00:00 | 2026-05-09T15:03:41+00:00 |
| rhsa-2026:3906 | Red Hat Security Advisory: OpenShift Container Platform 4.18.35 security and extras update | 2026-03-11T03:54:55+00:00 | 2026-05-09T15:03:41+00:00 |
| rhsa-2026:3874 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.18.4 security update | 2026-03-05T11:31:22+00:00 | 2026-05-09T15:03:41+00:00 |
| rhsa-2026:3905 | Red Hat Security Advisory: OpenShift Container Platform 4.18.35 bug fix and security update | 2026-03-11T04:27:58+00:00 | 2026-05-09T15:03:40+00:00 |
| rhsa-2026:3898 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-05T14:35:19+00:00 | 2026-05-09T15:03:40+00:00 |
| rhsa-2026:3884 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.19.2 security update | 2026-03-05T12:07:11+00:00 | 2026-05-09T15:03:40+00:00 |
| rhsa-2026:3880 | Red Hat Security Advisory: grafana security update | 2026-03-05T12:20:43+00:00 | 2026-05-09T15:03:38+00:00 |
| rhsa-2026:3879 | Red Hat Security Advisory: grafana security update | 2026-03-05T12:15:12+00:00 | 2026-05-09T15:03:38+00:00 |
| rhsa-2026:3869 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.17.5 security update | 2026-03-05T11:15:16+00:00 | 2026-05-09T15:03:38+00:00 |
| rhsa-2026:3875 | Red Hat Security Advisory: OpenShift Container Platform 4.18.35 packages and security update | 2026-03-11T05:09:45+00:00 | 2026-05-09T15:03:37+00:00 |
| rhsa-2026:3864 | Red Hat Security Advisory: delve security update | 2026-03-05T11:35:47+00:00 | 2026-05-09T15:03:36+00:00 |
| rhsa-2026:3856 | Red Hat Security Advisory: OpenShift Container Platform 4.20.16 security and extras update | 2026-03-11T03:54:47+00:00 | 2026-05-09T15:03:36+00:00 |
| rhsa-2026:3855 | Red Hat Security Advisory: OpenShift Container Platform 4.20.16 bug fix and security update | 2026-03-11T04:54:31+00:00 | 2026-05-09T15:03:36+00:00 |
| rhsa-2026:3851 | Red Hat Security Advisory: OpenShift Container Platform 4.20.16 packages and security update | 2026-03-11T05:24:06+00:00 | 2026-05-09T15:03:36+00:00 |
| rhsa-2026:3839 | Red Hat Security Advisory: image-builder security update | 2026-03-05T10:11:47+00:00 | 2026-05-09T15:03:36+00:00 |
| rhsa-2026:3854 | Red Hat Security Advisory: grafana security update | 2026-03-05T11:07:41+00:00 | 2026-05-09T15:03:35+00:00 |
| rhsa-2026:3843 | Red Hat Security Advisory: delve security update | 2026-03-05T09:56:17+00:00 | 2026-05-09T15:03:35+00:00 |
| rhsa-2026:3841 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:37:53+00:00 | 2026-05-09T15:03:35+00:00 |
| rhsa-2026:3840 | Red Hat Security Advisory: image-builder security update | 2026-03-05T09:44:51+00:00 | 2026-05-09T15:03:35+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2022-312-01 | NetBotz 4 - 355/450/455/550/570 | 2022-11-08T06:53:24.000Z | 2023-02-14T06:30:00.000Z |
| sevd-2023-045-01 | EcoStruxureTM Geo SCADA Expert | 2023-02-14T06:02:05.000Z | 2023-02-14T06:02:05.000Z |
| sevd-2022-347-01 | APC Easy UPS Online Monitoring Software | 2022-12-13T06:09:04.000Z | 2023-01-11T00:00:00.000Z |
| sevd-2023-010-03 | EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 | 2023-01-10T17:44:20.000Z | 2023-01-10T17:44:20.000Z |
| sevd-2023-010-04 | EcoStruxure™ Power SCADA Anywhere | 2023-01-10T10:28:35.000Z | 2023-01-10T10:28:35.000Z |
| sevd-2023-010-01 | EcoStruxureTM Machine Expert – HVAC (formerly SoMachine - HVAC) | 2023-01-10T09:28:52.000Z | 2023-01-10T09:28:52.000Z |
| sevd-2022-347-03 | EcoStruxure Power Commission | 2022-12-13T04:28:00.000Z | 2022-12-13T04:28:00.000Z |
| sevd-2022-347-02 | Saitel DR RTU | 2022-12-13T04:12:25.000Z | 2022-12-13T04:12:25.000Z |
| sevd-2021-103-01 | C-Bus Toolkit and C-Gate Server | 2021-04-13T11:17:13.000Z | 2022-11-08T11:17:13.000Z |
| sevd-2021-130-04 | homeLYnk (Wiser For KNX) and spaceLYnk | 2021-05-11T07:30:55.000Z | 2022-11-08T07:30:55.000Z |
| sevd-2022-284-04 | EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 | 2022-10-11T10:45:15.000Z | 2022-10-14T10:45:15.000Z |
| sevd-2022-284-02 | EcoStruxure™ Panel Server Box (PAS900) | 2022-10-11T10:05:49.000Z | 2022-10-11T10:05:49.000Z |
| sevd-2022-284-01 | EcoStruxure™ Operator Terminal Expert and Pro-face BLUE | 2022-10-11T09:48:46.000Z | 2022-10-11T09:48:46.000Z |
| sevd-2020-343-05 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and Associated Communication Modules | 2020-12-08T21:04:43.000Z | 2022-09-13T20:04:43.000Z |
| sevd-2020-343-07 | SNMP Service on Modicon M340 and Associated Communication Modules | 2020-12-08T05:49:51.000Z | 2022-09-13T05:49:51.000Z |
| sevd-2022-256-01 | EcoStruxure Machine SCADA Expert and Pro-face BLUE Open Studio | 2022-09-13T05:45:41.000Z | 2022-09-13T05:45:41.000Z |
| sesb-2019-214-01 | Wind River VxWorks Vulnerabilities (URGENT/11) | 2019-08-02T00:00:00.000Z | 2022-09-13T00:00:00.000Z |
| sevd-2022-193-01 | OPC UA and X80 advanced RTU Modicon Communication Modules | 2022-07-12T04:00:00.000Z | 2022-08-19T06:30:00.000Z |
| sesb-2021-347-01 | Apache Log4j Vulnerabilities (Log4Shell) | 2021-12-13T09:22:58.000Z | 2022-08-09T09:22:58.000Z |
| sevd-2022-221-03 | EcoStruxure™ Control Expert | 2022-08-09T09:14:27.000Z | 2022-08-09T09:14:27.000Z |
| sevd-2020-175-01 | Treck TCP/IP Vulnerabilities (Ripple20) | 2020-06-23T16:00:00.000Z | 2022-08-08T13:57:08.970Z |
| sevd-2022-193-03 | Acti9 PowerTag Link C | 2022-07-12T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2022-193-02 | SpaceLogic C-Bus Home Controller, formerly known as C-Bus Wiser Home Controller MK2 | 2022-07-12T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2021-257-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ for x70 | 2021-09-14T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2021-222-02 | AT&T Labs Compressor (XMilI) and Decompressor (XDemill) used by EcoStruxureTM Control Expert, EcoStruxureTM Process Expert and SCADAPack RemoteConnect™ for x70 | 2021-08-01T07:25:51.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2022-193-04 | Easergy P5 | 2022-07-12T08:55:42.000Z | 2022-07-12T08:55:42.000Z |
| sevd-2022-102-01 | IGSS (Interactive Graphical SCADA System) | 2022-04-12T08:47:25.000Z | 2022-07-12T08:47:25.000Z |
| sevd-2022-067-02 | APC Smart-UPS SMT, SMC, SMX, SCL, SRC, XU, XP, CSH2, SURTD, SMTL, SRT, and select SRTL Series | 2022-03-08T06:30:00.000Z | 2022-06-16T18:30:00.000Z |
| sevd-2022-165-08 | EcoStruxure™ Cybersecurity Admin Expert | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-07 | CanBRASS | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-177847 | SSA-177847: Improper VNC Password Check Vulnerability in SINUMERIK Controllers | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-170375 | SSA-170375: Multiple Vulnerabilities in RUGGEDCOM ROS Before V5.9 | 2024-07-09T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-097435 | SSA-097435: Usernames Disclosure Vulnerability in Mendix Runtime | 2024-09-10T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-094954 | SSA-094954: Authentication Bypass Vulnerability in BIST mode of RUGGEDCOM ROX II | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-725549 | SSA-725549: Denial of Service of ICMP in Industrial Devices | 2025-04-08T00:00:00Z | 2025-07-21T00:00:00Z |
| ssa-183963 | SSA-183963: Certificate Validation Vulnerabilities in SICAM TOOLBOX II Before V07.11 | 2025-07-08T00:00:00Z | 2025-07-18T00:00:00Z |
| ssa-938066 | SSA-938066: Remote Code Execution Vulnerability in SENTRON Powermanager and Desigo CC | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-904646 | SSA-904646: Sensitive Data Exposure Vulnerability in SIPROTEC 5 Devices | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-763427 | SSA-763427: Authentication Bypass Vulnerability in SIMATIC CP and TIM Devices | 2015-11-27T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-634640 | SSA-634640: Weak Authentication Vulnerability in Siemens Industrial Edge Devices | 2025-04-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-627195 | SSA-627195: Zip Path Traversal Vulnerability in Mendix Studio Pro's Module Installation Process | 2025-06-12T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-626991 | SSA-626991: Denial of Service Vulnerability in SIMATIC CN 4100 before V4.0 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-593272 | SSA-593272: SegmentSmack in Interniche IP-Stack based Industrial Devices | 2020-04-14T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-573669 | SSA-573669: Multiple Vulnerabilities in TIA Administrator Before V3.0.6 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-446545 | SSA-446545: Impact of RegreSSHion (CVE-2024-6387) in Siemens Industrial Products | 2024-09-10T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-327438 | SSA-327438: Multiple Vulnerabilities in SCALANCE LPE9403 | 2025-05-13T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-091753 | SSA-091753: Multiple Vulnerabilities in Solid Edge Before SE2025 Update 5 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-078892 | SSA-078892: Multiple Vulnerabilities in SINEC NMS Before V4.0 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-426509 | SSA-426509: Multiple Local Code Execution Vulnerabilities in Questa and ModelSim | 2024-10-08T00:00:00Z | 2025-06-17T00:00:00Z |
| ssa-345750 | SSA-345750: Default Credentials in Energy Services Using Elspec G5DFR | 2025-06-10T00:00:00Z | 2025-06-16T00:00:00Z |
| ssa-874353 | SSA-874353: Entity Enumeration Vulnerability in Mendix Runtime | 2025-04-08T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-656895 | SSA-656895: Open Redirect Vulnerability in Teamcenter | 2025-02-11T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-633269 | SSA-633269: Incorrect Authorization Check Vulnerability in Industrial Communication Devices based on SINEC OS before V3.1 | 2025-06-10T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-620799 | SSA-620799: Denial of Service Vulnerability During BLE Pairing in SENTRON Powercenter 1000/1100 | 2024-12-10T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-497656 | SSA-497656: Multiple NTP Vulnerabilities in TIM 4R-IE Devices | 2021-04-13T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-486186 | SSA-486186: Out of Bounds Read Vulnerability in Tecnomatix Plant Simulation Before 2404 | 2025-06-10T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-354569 | SSA-354569: Multiple Vulnerabilities in Palo Alto Networks PAN-OS on RUGGEDCOM APE1808 Devices | 2024-11-22T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-340240 | SSA-340240: Denial of Service Vulnerability in SIRIUS 3RV2921-5M | 2024-10-08T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-162506 | SSA-162506: DHCP Client Vulnerability in SIMOTICS CONNECT 400, Desigo PXC/PXM, APOGEE MEC/MBC/PXC, APOGEE PXC Series, and TALON TC Series | 2020-04-14T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-041082 | SSA-041082: Out of Bounds Read Vulnerability in SiPass Integrated Before V2.95.3.18 | 2025-05-23T00:00:00Z | 2025-05-23T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21417-1 | Security update for avahi | 2026-04-29T11:16:55Z | 2026-04-29T11:16:55Z |
| suse-su-2026:1659-1 | Security update for sed | 2026-04-29T11:09:09Z | 2026-04-29T11:09:09Z |
| suse-su-2026:1658-1 | Security update for openCryptoki | 2026-04-29T11:08:07Z | 2026-04-29T11:08:07Z |
| suse-su-2026:1657-1 | Security update for xen | 2026-04-29T11:06:54Z | 2026-04-29T11:06:54Z |
| suse-su-2026:21427-1 | Security update for PackageKit | 2026-04-29T09:45:09Z | 2026-04-29T09:45:09Z |
| suse-su-2026:1655-1 | Security update for polkit | 2026-04-29T08:43:12Z | 2026-04-29T08:43:12Z |
| suse-su-2026:21426-1 | Security update for python-Mako | 2026-04-29T08:17:04Z | 2026-04-29T08:17:04Z |
| suse-su-2026:21425-1 | Security update for python-jwcrypto | 2026-04-29T08:14:32Z | 2026-04-29T08:14:32Z |
| suse-su-2026:1653-1 | Security update for protobuf | 2026-04-29T00:45:31Z | 2026-04-29T00:45:31Z |
| suse-su-2026:1650-1 | Security update for MozillaFirefox | 2026-04-28T18:52:50Z | 2026-04-28T18:52:50Z |
| suse-su-2026:1649-1 | Security update for MozillaFirefox | 2026-04-28T18:52:35Z | 2026-04-28T18:52:35Z |
| suse-su-2026:1648-1 | Security update for webkit2gtk3 | 2026-04-28T18:07:02Z | 2026-04-28T18:07:02Z |
| suse-su-2026:1647-1 | Security update for python-requests | 2026-04-28T18:03:06Z | 2026-04-28T18:03:06Z |
| suse-su-2026:1646-1 | Security update for gnome-remote-desktop | 2026-04-28T18:01:32Z | 2026-04-28T18:01:32Z |
| suse-su-2026:21424-1 | Security update for glibc-livepatches | 2026-04-28T16:23:13Z | 2026-04-28T16:23:13Z |
| suse-su-2026:21395-1 | Security update for glibc-livepatches | 2026-04-28T16:23:13Z | 2026-04-28T16:23:13Z |
| suse-su-2026:20608-1 | Security update for glibc-livepatches | 2026-04-28T16:18:32Z | 2026-04-28T16:18:32Z |
| suse-su-2026:20544-1 | Security update for glibc-livepatches | 2026-04-28T16:18:32Z | 2026-04-28T16:18:32Z |
| suse-su-2026:21422-1 | Security update for libsodium | 2026-04-28T15:28:13Z | 2026-04-28T15:28:13Z |
| suse-su-2026:21393-1 | Security update for libsodium | 2026-04-28T15:28:13Z | 2026-04-28T15:28:13Z |
| suse-su-2026:21415-1 | Security update for python311 | 2026-04-28T15:06:45Z | 2026-04-28T15:06:45Z |
| suse-su-2026:1645-1 | Security update for xen | 2026-04-28T14:46:52Z | 2026-04-28T14:46:52Z |
| suse-su-2026:21414-1 | Security update for vim | 2026-04-28T14:32:34Z | 2026-04-28T14:32:34Z |
| suse-su-2026:1644-1 | Security update for python-requests | 2026-04-28T13:31:42Z | 2026-04-28T13:31:42Z |
| suse-su-2026:1643-1 | Security update for the Linux Kernel | 2026-04-28T13:27:21Z | 2026-04-28T13:27:21Z |
| suse-su-2026:1641-1 | Security update for dovecot22 | 2026-04-28T11:53:47Z | 2026-04-28T11:53:47Z |
| suse-su-2026:1640-1 | Security update for freerdp2 | 2026-04-28T11:33:58Z | 2026-04-28T11:33:58Z |
| suse-su-2026:1639-1 | Security update for bouncycastle | 2026-04-28T11:10:37Z | 2026-04-28T11:10:37Z |
| suse-su-2026:21419-1 | Security update for openCryptoki | 2026-04-28T10:44:27Z | 2026-04-28T10:44:27Z |
| suse-su-2026:21413-1 | Security update for sed | 2026-04-27T17:25:16Z | 2026-04-27T17:25:16Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:8155 | Important: bind9.16 security update | 2026-04-14T00:00:00Z | 2026-04-15T07:13:08Z |
| alsa-2026:7675 | Important: nodejs24 security update | 2026-04-13T00:00:00Z | 2026-04-14T13:07:01Z |
| alsa-2026:7682 | Important: openexr security update | 2026-04-13T00:00:00Z | 2026-04-14T12:33:23Z |
| alsa-2026:7711 | Important: vim security update | 2026-04-13T00:00:00Z | 2026-04-14T12:18:44Z |
| alsa-2026:6907 | Important: nginx:1.24 security update | 2026-04-07T00:00:00Z | 2026-04-14T11:33:03Z |
| alsa-2026:1241 | Important: resource-agents security update | 2026-01-26T00:00:00Z | 2026-04-14T07:53:22Z |
| alsa-2026:7681 | Important: perl-XML-Parser security update | 2026-04-13T00:00:00Z | 2026-04-14T07:40:45Z |
| alsa-2026:7667 | Important: nghttp2 security update | 2026-04-13T00:00:00Z | 2026-04-14T07:31:34Z |
| alsa-2026:6632 | Moderate: kernel security update | 2026-04-06T00:00:00Z | 2026-04-10T16:50:39Z |
| alsa-2026:6799 | Important: freerdp security update | 2026-04-07T00:00:00Z | 2026-04-09T20:01:55Z |
| alsa-2026:6923 | Important: nginx:1.24 security update | 2026-04-07T00:00:00Z | 2026-04-09T19:55:44Z |
| alsa-2026:6766 | Important: python3.9 security update | 2026-04-07T00:00:00Z | 2026-04-09T19:44:34Z |
| alsa-2025:3026 | Important: kernel security update | 2025-03-19T00:00:00Z | 2026-04-09T19:27:31Z |
| alsa-2025:2872 | Important: pcs security update | 2025-03-17T00:00:00Z | 2026-04-09T19:08:56Z |
| alsa-2024:10987 | Moderate: pcs security update | 2024-12-12T00:00:00Z | 2026-04-09T19:04:08Z |
| alsa-2025:3027 | Important: kernel-rt security update | 2025-03-19T00:00:00Z | 2026-04-09T18:58:43Z |
| alsa-2025:3210 | Important: container-tools:rhel8 security update | 2025-03-26T00:00:00Z | 2026-04-09T18:51:49Z |
| alsa-2025:3388 | Important: python-jinja2 security update | 2025-03-31T00:00:00Z | 2026-04-09T18:19:12Z |
| alsa-2025:4048 | Moderate: xmlrpc-c security update | 2025-04-22T00:00:00Z | 2026-04-09T18:11:53Z |
| alsa-2025:4049 | Moderate: libtasn1 security update | 2025-04-22T00:00:00Z | 2026-04-09T18:00:49Z |
| alsa-2025:8254 | Important: pcs security update | 2025-05-28T00:00:00Z | 2026-04-09T17:52:37Z |
| alsa-2025:4063 | Moderate: ruby:3.1 security update | 2025-04-22T00:00:00Z | 2026-04-09T17:45:54Z |
| alsa-2025:11047 | Moderate: pcs security update | 2025-07-15T00:00:00Z | 2026-04-09T15:41:47Z |
| alsa-2025:12527 | Moderate: virt:rhel and virt-devel:rhel security update | 2025-08-04T00:00:00Z | 2026-04-09T15:30:58Z |
| alsa-2026:6750 | Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update | 2026-04-07T00:00:00Z | 2026-04-09T12:29:46Z |
| alsa-2026:6949 | Important: go-toolset:rhel8 security update | 2026-04-08T00:00:00Z | 2026-04-09T12:17:43Z |
| alsa-2026:6915 | Important: vim security update | 2026-04-07T00:00:00Z | 2026-04-09T11:41:21Z |
| alsa-2026:6906 | Important: nginx security update | 2026-04-07T00:00:00Z | 2026-04-09T11:12:05Z |
| alsa-2026:6918 | Important: freerdp security update | 2026-04-07T00:00:00Z | 2026-04-09T10:20:55Z |
| alsa-2026:6391 | Moderate: mysql:8.4 security update | 2026-04-01T00:00:00Z | 2026-04-09T10:00:41Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-1328 | Stack-buffer-overflow in icu_75::TZDBTimeZoneNames::getMetaZoneNames | 2023-12-18T00:13:09.643640Z | 2026-03-18T19:49:20.841276Z |
| osv-2024-728 | Negative-size-param in pdf_resize_resource_arrays | 2024-08-08T00:09:33.935595Z | 2026-03-18T14:32:58.071449Z |
| osv-2024-677 | Segv on unknown address in gs_gc_reclaim | 2024-07-25T00:06:43.762625Z | 2026-03-18T14:32:20.684770Z |
| osv-2025-202 | UNKNOWN READ in _blit_xrgb32_lerp_spans | 2025-03-15T00:01:51.127135Z | 2026-03-18T14:26:56.370221Z |
| osv-2023-34 | Heap-use-after-free in gc_trace | 2023-01-29T13:00:17.773387Z | 2026-03-18T14:25:32.218330Z |
| osv-2022-73 | Heap-use-after-free in pdfi_cspace_free_callback | 2022-01-22T00:00:41.413569Z | 2026-03-18T14:24:03.137574Z |
| osv-2022-524 | Heap-buffer-overflow in Ins_JROF | 2022-07-01T00:01:43.353257Z | 2026-03-18T14:22:41.236746Z |
| osv-2026-417 | Segv on unknown address in arrow::Array::IsNull | 2026-03-18T00:18:35.139866Z | 2026-03-18T00:18:35.140154Z |
| osv-2023-1307 | UNKNOWN READ in init_struct_ops_maps | 2023-12-15T00:12:51.528155Z | 2026-03-17T14:24:53.158428Z |
| osv-2023-1267 | Heap-buffer-overflow in dwg_free_object | 2023-12-08T00:11:02.971903Z | 2026-03-16T14:18:18.473266Z |
| osv-2026-350 | UNKNOWN READ in bfd_getl32 | 2026-03-04T00:14:56.651284Z | 2026-03-14T18:43:19.427139Z |
| osv-2026-371 | Heap-buffer-overflow in tinyobj::tryParseDouble | 2026-03-09T00:09:41.689616Z | 2026-03-09T00:09:41.689926Z |
| osv-2024-838 | Bad-cast to RDKit::AtomRDKit::ROMol::initFromOther | 2024-08-16T00:03:32.029853Z | 2026-03-07T14:34:10.603763Z |
| osv-2026-359 | Segv on unknown address in gpsd_vlog | 2026-03-07T00:03:40.062221Z | 2026-03-07T00:03:40.062505Z |
| osv-2025-62 | UNKNOWN READ in RDKit::Dict::reset | 2025-01-27T00:01:51.692636Z | 2026-03-06T14:31:24.229549Z |
| osv-2022-94 | Heap-buffer-overflow in cli_strlcat | 2022-01-27T00:02:12.465969Z | 2026-03-05T14:29:46.831320Z |
| osv-2022-636 | UNKNOWN READ in fp_cmp_mag | 2022-07-27T00:00:35.300337Z | 2026-03-05T14:28:12.890689Z |
| osv-2022-1068 | UNKNOWN READ in fp_cmp_mag | 2022-10-21T00:00:11.246872Z | 2026-03-05T14:25:24.236211Z |
| osv-2026-344 | UNKNOWN READ in void Assimp::Blender::ConvertDispatcher<float> | 2026-03-03T00:20:14.572365Z | 2026-03-03T00:20:14.572706Z |
| osv-2026-341 | Security exception in com.code_intelligence.jazzer.sanitizers.RegexInjection.hookInternal | 2026-03-03T00:17:38.109294Z | 2026-03-03T00:17:38.109635Z |
| osv-2026-338 | Use-of-uninitialized-value in pjsip_auth_clt_init_req | 2026-03-03T00:09:55.520965Z | 2026-03-03T00:09:55.521245Z |
| osv-2024-340 | Heap-buffer-overflow in Exiv2::AsfVideo::GUIDTag::GUIDTag | 2024-04-30T00:01:53.406015Z | 2026-03-01T14:15:15.992512Z |
| osv-2025-253 | Security exception in org.apache.lucene.analysis.ckb.SoraniNormalizer.normalize | 2025-04-03T00:17:24.000398Z | 2026-02-26T15:05:21.477837Z |
| osv-2024-1254 | Security exception in org.apache.lucene.util.ArrayUtil.growExact | 2024-11-01T00:07:39.301298Z | 2026-02-26T14:30:06.734190Z |
| osv-2026-311 | UNKNOWN READ in strncasecmp | 2026-02-26T00:16:50.091819Z | 2026-02-26T00:16:50.092121Z |
| osv-2026-308 | Heap-buffer-overflow in vcardstructured_new_from_string | 2026-02-25T00:19:49.963815Z | 2026-02-25T00:19:49.964188Z |
| osv-2026-307 | Global-buffer-overflow in navcom_parse | 2026-02-25T00:16:23.864362Z | 2026-02-25T00:16:23.864694Z |
| osv-2026-304 | Heap-use-after-free in tf::Executor::_invoke | 2026-02-25T00:09:10.290694Z | 2026-02-25T00:09:10.291030Z |
| osv-2026-302 | Use-of-uninitialized-value in BIO_new_file | 2026-02-25T00:07:20.338981Z | 2026-02-25T00:07:20.339278Z |
| osv-2026-300 | UNKNOWN WRITE in nmeaid_to_prn | 2026-02-25T00:06:00.225480Z | 2026-02-25T00:06:00.225972Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0140 | Non-utf8 String can be created with `TimeBuf::as_str` | 2025-12-29T12:00:00Z | 2026-03-04T07:42:48Z |
| rustsec-2026-0029 | Double-free and use-after-free for Hive | 2026-02-26T12:00:00Z | 2026-03-01T06:01:36Z |
| rustsec-2025-0153 | hexchat crate is unsound and unmaintained | 2025-11-17T12:00:00Z | 2026-02-26T06:11:28Z |
| rustsec-2026-0026 | Unnecessary clamping of seed reduces seed entropy to 251 bits | 2026-02-05T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0025 | Panic in `libcrux-psq` on decryption of malformed AES-GCM ciphertext | 2026-02-08T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0024 | Incorrect X25519 clamping check rejects all secrets on import | 2026-01-26T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0023 | X25519 secret validation did not check buffer length or clamping | 2026-01-26T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0022 | Panic when dropping a `[Typed]Func::call_async` future | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0021 | Panic adding excessive fields to a `wasi:http/types.fields` instance | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0020 | Guest-controlled resource exhaustion in WASI implementations | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0013 | Type confusion when accessing data from sublasses of subclasses of native types with `abi3` feature targeting Python 3.12 and up | 2026-02-18T12:00:00Z | 2026-02-23T07:15:28Z |
| rustsec-2026-0012 | Unsoundness in opt-in ARMv8 assembly backend for `keccak` | 2026-02-12T12:00:00Z | 2026-02-20T04:00:15Z |
| rustsec-2025-0142 | Segmentation fault and invalid memory read in `mnl::cb_run` | 2025-10-18T12:00:00Z | 2026-02-10T13:23:41Z |
| rustsec-2025-0149 | World Writable Directory in /var/log/below Allows Local Privilege Escalation | 2025-03-12T12:00:00Z | 2026-02-08T07:26:28Z |
| rustsec-2026-0009 | Denial of Service via Stack Exhaustion | 2026-02-05T12:00:00Z | 2026-02-06T09:12:16Z |
| rustsec-2026-0008 | Potential undefined behavior when dereferencing Buf struct | 2026-02-02T12:00:00Z | 2026-02-05T06:08:13Z |
| rustsec-2026-0007 | Integer overflow in `BytesMut::reserve` | 2026-02-03T12:00:00Z | 2026-02-04T06:56:11Z |
| rustsec-2026-0006 | Wasmtime segfault or unused out-of-sandbox load with `f64.copysign` operator on x86-64 | 2026-01-26T12:00:00Z | 2026-01-30T05:41:11Z |
| rustsec-2025-0143 | Unsound APIs of public `constant::Reader` and `StructSchema` | 2025-12-24T12:00:00Z | 2026-01-29T05:56:50Z |
| rustsec-2025-0144 | Timing side-channel in ML-DSA decomposition | 2025-12-12T12:00:00Z | 2026-01-27T22:28:37Z |
| rustsec-2024-0436 | paste - no longer maintained | 2024-10-07T12:00:00Z | 2026-01-27T21:51:15Z |
| rustsec-2026-0005 | Potential use-after-free in `oneshot` when used asynchronously | 2026-01-25T12:00:00Z | 2026-01-27T05:50:51Z |
| rustsec-2026-0004 | Triton VM Soundness Vulnerability due to Improper Sampling of Randomness | 2026-01-21T12:00:00Z | 2026-01-23T05:50:29Z |
| rustsec-2021-0155 | Use After Free in lucet-runtime | 2021-11-30T12:00:00Z | 2026-01-17T19:50:19Z |
| rustsec-2025-0111 | `tokio-tar` parses PAX extended headers incorrectly, allows file smuggling | 2025-10-21T12:00:00Z | 2026-01-17T07:44:05Z |
| rustsec-2025-0141 | Bincode is unmaintained | 2025-12-16T12:00:00Z | 2026-01-16T11:04:42Z |
| rustsec-2026-0003 | Non-constant-time code generation on ARM32 targets | 2026-01-14T12:00:00Z | 2026-01-15T17:45:42Z |
| rustsec-2026-0002 | `IterMut` violates Stacked Borrows by invalidating internal pointer | 2026-01-07T12:00:00Z | 2026-01-08T05:46:06Z |
| rustsec-2026-0001 | Potential Undefined Behaviors in `Arc<T>`/`Rc<T>` impls of `from_value` on OOM | 2026-01-05T12:00:00Z | 2026-01-06T15:33:19Z |
| rustsec-2025-0139 | theshit vulnerable to unsafe loading of user-owned Python rules when running as root | 2025-12-30T12:00:00Z | 2026-01-04T20:34:25Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-jre-2022-21541 | 2026-05-08T05:44:48.839Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21540 | 2026-05-08T05:44:47.364Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21476 | 2026-05-08T05:44:45.725Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21449 | 2026-05-08T05:44:44.330Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21434 | 2026-05-08T05:44:42.848Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21426 | 2026-05-08T05:44:41.337Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21366 | 2026-05-08T05:44:39.694Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21365 | 2026-05-08T05:44:38.148Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21360 | 2026-05-08T05:44:36.668Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21349 | 2026-05-08T05:44:35.321Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21341 | 2026-05-08T05:44:33.864Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21340 | 2026-05-08T05:44:32.506Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21305 | 2026-05-08T05:44:30.972Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21299 | 2026-05-08T05:44:29.483Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21296 | 2026-05-08T05:44:28.006Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21294 | 2026-05-08T05:44:26.632Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21293 | 2026-05-08T05:44:25.151Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21291 | 2026-05-08T05:44:23.527Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21283 | 2026-05-08T05:44:22.108Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21282 | 2026-05-08T05:44:20.719Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21277 | 2026-05-08T05:44:19.141Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21271 | 2026-05-08T05:44:17.657Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2022-21248 | 2026-05-08T05:44:16.097Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2021-35603 | 2026-05-08T05:44:14.463Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2021-35588 | 2026-05-08T05:44:12.917Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2021-35586 | 2026-05-08T05:44:11.295Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2021-35578 | 2026-05-08T05:44:09.885Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2021-35567 | 2026-05-08T05:44:08.559Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2021-35565 | 2026-05-08T05:44:07.095Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2021-35564 | 2026-05-08T05:44:05.707Z | 2026-05-08T06:11:36.072Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-lc01167 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-p77j-4mvh-x3m3 applied in versions: 8.4.0-r0, 8.4.0-r1, 8.4.0-r2 | 2026-04-06T02:48:42.431061Z | 2026-04-03T06:52:41Z |
| cleanstart-2026-gm09342 | Security fixes for CVE-2025-68121, CVE-2026-26958, ghsa-fw7p-63qq-7hpr, ghsa-mqqf-5wvp-8fh8 applied in versions: 0.29.0-r0, 0.29.0-r1 | 2026-04-06T02:48:25.848581Z | 2026-04-03T06:51:44Z |
| cleanstart-2026-hl08143 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-06T02:48:38.996528Z | 2026-04-03T06:50:37Z |
| cleanstart-2026-gn22652 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq applied in versions: 3.7.2-r4, 3.7.2-r5 | 2026-04-06T02:48:55.605608Z | 2026-04-03T06:50:37Z |
| cleanstart-2026-dm25112 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T02:48:32.316783Z | 2026-04-03T06:50:37Z |
| cleanstart-2026-ny32236 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T02:49:48.749661Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-io43826 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T02:49:47.698715Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-an95970 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-06T02:49:57.502118Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-ag21538 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-06T02:50:01.578746Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-ip72442 | Security fixes for CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1 | 2026-04-06T02:52:00.185166Z | 2026-04-01T14:41:16Z |
| cleanstart-2026-nb78893 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-64715, CVE-2025-68119, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, CVE-2026-33726 applied in versions: 0.13.3-r0, 0.13.3-r1 | 2026-04-06T02:52:24.792809Z | 2026-04-01T13:08:16Z |
| cleanstart-2026-mq18886 | Security fixes for CVE-2026-22735, CVE-2026-22737 applied in versions: 6.2.3-r0 | 2026-04-06T02:52:03.544300Z | 2026-04-01T11:39:45Z |
| cleanstart-2026-ly39171 | Security fixes for CVE-2026-33186 applied in versions: 3.1.4-r0 | 2026-04-06T02:51:58.911697Z | 2026-04-01T11:39:45Z |
| cleanstart-2026-kc06018 | Security fixes for CVE-2017-12158, CVE-2017-12159, ghsa-3p8m-j85q-pgmj, ghsa-45p5-v273-3qqr, ghsa-4cx2-fc23-5wg6, ghsa-5rfx-cp42-p624, ghsa-72hv-8253-57qq, ghsa-84h7-rjj3-6jx4, ghsa-9342-92gg-6v29, ghsa-cbdj-484d-3x9q, ghsa-fghv-69vj-qj49, ghsa-h5fg-jpgr-rv9c, ghsa-hq9p-pm7w-8p54, ghsa-j288-q9x7-2f5v, ghsa-pwqr-wmgm-9rr8, ghsa-w9fj-cfpg-grvv applied in versions: 26.1.4-r1, 26.5.0-r0, 26.5.0-r1, 26.5.0-r2, 26.5.6-r3 | 2026-04-06T02:52:37.677608Z | 2026-04-01T11:37:49Z |
| cleanstart-2026-po55014 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-06T02:53:00.589014Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-mu54962 | Security fixes for ghsa-527x-5wrf-22m2, ghsa-g754-hx8w-x2g6, ghsa-jgfp-53c3-624w, ghsa-px8v-pp82-rcvr, ghsa-vv39-3w5q-974q applied in versions: 1.25.0-r0, 1.26.7-r0 | 2026-04-06T02:54:48.662994Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-hj96712 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq applied in versions: 3.7.2-r4, 3.7.2-r5 | 2026-04-06T02:53:02.079256Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-bl95928 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T02:52:47.736498Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-eb74978 | Security fixes for CVE-2020-8912, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1 | 2026-04-01T09:05:49.917651Z | 2026-03-31T15:18:53Z |
| cleanstart-2026-bk28579 | Security fixes for CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1 | 2026-04-01T09:05:31.827204Z | 2026-03-31T15:16:59Z |
| cleanstart-2026-is43446 | Security fixes for ghsa-25qh-j22f-pwp8, ghsa-389x-839f-4rhx, ghsa-3p8m-j85q-pgmj, ghsa-4g8c-wm8x-jfhw, ghsa-5jpm-x58v-624v, ghsa-72hv-8253-57qq, ghsa-84h7-rjj3-6jx4, ghsa-fghv-69vj-qj49, ghsa-jq43-27x9-3v86, ghsa-pwqr-wmgm-9rr8, ghsa-qqpg-mvqg-649v, ghsa-w9fj-cfpg-grvv, ghsa-xq3w-v528-46rv applied in versions: 0.1.109-r0, 0.1.109-r1, 0.1.111-r2 | 2026-04-01T09:05:58.458627Z | 2026-03-31T07:55:31Z |
| cleanstart-2026-ch77232 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 18.7.1-r0 | 2026-04-01T09:06:04.906254Z | 2026-03-31T07:29:33Z |
| cleanstart-2026-is74202 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:09:55.185988Z | 2026-03-31T04:38:08Z |
| cleanstart-2026-ls30652 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-47914, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-33186, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-p84v-gxvw-73pf applied in versions: 3.7.0-r0, 3.7.11-r0, 3.7.3-r0, 3.7.4-r0, 3.7.6-r0, 3.7.9-r0, 3.7.9-r1, 3.7.9-r2, 4.0.2-r0 | 2026-04-01T09:07:01.631355Z | 2026-03-30T12:04:05Z |
| cleanstart-2026-hk71313 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw applied in versions: 0.12.0-r0, 0.12.0-r1, 0.12.0-r2 | 2026-04-01T09:06:39.410428Z | 2026-03-30T06:53:15Z |
| cleanstart-2026-li04631 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.79.0-r0, 1.79.0-r2, 1.79.0-r3 | 2026-04-01T09:08:44.082129Z | 2026-03-28T10:16:19Z |
| cleanstart-2026-bk44511 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.78.0-r0, 1.78.0-r2, 1.78.0-r3 | 2026-04-01T09:08:47.105116Z | 2026-03-28T10:16:01Z |
| cleanstart-2026-ld15132 | Security fixes for CVE-2020-8912, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-6g7g-w4f8-9c9x, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 0.142.0-r0, 0.144.0-r0, 0.144.0-r1, 0.144.0-r2, 0.144.0-r3 | 2026-04-01T09:09:25.500286Z | 2026-03-28T10:14:28Z |
| cleanstart-2026-jk84667 | Security fixes for CVE-2025-0913, CVE-2025-4673, CVE-2025-47907, CVE-2025-47911, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-58190, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.7.0-r7, 2.7.0-r8 | 2026-04-01T09:10:09.429544Z | 2026-03-28T10:13:46Z |
| cleanstart-2026-cb01846 | Security fixes for CVE-2025-0913, CVE-2025-4673, CVE-2025-47907, CVE-2025-47911, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-58190, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.6.1-r0, 2.6.1-r1, 2.6.1-r7 | 2026-04-01T09:10:27.866703Z | 2026-03-28T10:13:21Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-ale-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| CERTFR-2021-ALE-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| CERTFR-2021-ALE-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-005 | Multiples vulnérabilités dans Microsoft DNS server | 2021-03-12T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-003 | [MàJ] Vulnérabilité dans VMware vCenter Server | 2021-02-25T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-001 | |MàJ] Vulnérabilité dans SonicWall SMA100 | 2021-02-02T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| CERTFR-2021-ALE-005 | Multiples vulnérabilités dans Microsoft DNS server | 2021-03-12T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| CERTFR-2021-ALE-003 | [MàJ] Vulnérabilité dans VMware vCenter Server | 2021-02-25T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| CERTFR-2021-ALE-001 | |MàJ] Vulnérabilité dans SonicWall SMA100 | 2021-02-02T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-006 | [MàJ] Vulnérabilité dans F5 BIG-IP | 2021-03-22T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2020-ale-026 | [MaJ] Présence de code malveillant dans SolarWinds Orion | 2020-12-14T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| CERTFR-2021-ALE-006 | [MàJ] Vulnérabilité dans F5 BIG-IP | 2021-03-22T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| CERTFR-2020-ALE-026 | [MaJ] Présence de code malveillant dans SolarWinds Orion | 2020-12-14T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2021-ale-002 | [MàJ] Vulnérabilité dans Google Chrome et Microsoft Edge | 2021-02-05T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-021 | Vulnérabilité dans Samba | 2020-09-18T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-020 | [MàJ] Vulnérabilité dans Microsoft Netlogon | 2020-09-15T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| CERTFR-2021-ALE-002 | [MàJ] Vulnérabilité dans Google Chrome et Microsoft Edge | 2021-02-05T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| CERTFR-2020-ALE-021 | Vulnérabilité dans Samba | 2020-09-18T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| CERTFR-2020-ALE-020 | [MàJ] Vulnérabilité dans Microsoft Netlogon | 2020-09-15T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-019 | Recrudescence d'activité Emotet en France | 2020-09-07T00:00:00.000000 | 2021-02-09T00:00:00.000000 |
| CERTFR-2020-ALE-019 | Recrudescence d'activité Emotet en France | 2020-09-07T00:00:00.000000 | 2021-02-09T00:00:00.000000 |
| certfr-2020-ale-025 | Vulnérabilité dans Fortinet FortiOS SSL-VPN | 2020-11-27T00:00:00.000000 | 2021-02-08T00:00:00.000000 |
| CERTFR-2020-ALE-025 | Vulnérabilité dans Fortinet FortiOS SSL-VPN | 2020-11-27T00:00:00.000000 | 2021-02-08T00:00:00.000000 |
| certfr-2020-ale-024 | [MaJ] Vulnérabilité dans les produits VMware | 2020-11-24T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-022 | [MàJ] Vulnérabilité dans Oracle Weblogic | 2020-10-30T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| CERTFR-2020-ALE-024 | [MaJ] Vulnérabilité dans les produits VMware | 2020-11-24T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| CERTFR-2020-ALE-022 | [MàJ] Vulnérabilité dans Oracle Weblogic | 2020-10-30T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-023 | Multiples vulnérabilités dans Google Chrome | 2020-11-12T00:00:00.000000 | 2020-12-04T00:00:00.000000 |
| CERTFR-2020-ALE-023 | Multiples vulnérabilités dans Google Chrome | 2020-11-12T00:00:00.000000 | 2020-12-04T00:00:00.000000 |
| certfr-2020-ale-018 | Vulnérabilité dans Cisco ASA et FTD | 2020-07-28T00:00:00.000000 | 2020-11-05T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0404 | Multiples vulnérabilités dans les produits Mozilla | 2026-04-08T00:00:00.000000 | 2026-04-08T00:00:00.000000 |
| certfr-2026-avi-0403 | Multiples vulnérabilités dans OpenSSL | 2026-04-08T00:00:00.000000 | 2026-04-08T00:00:00.000000 |
| certfr-2026-avi-0402 | Vulnérabilité dans HPE Aruba Networking Private 5G Core | 2026-04-08T00:00:00.000000 | 2026-04-08T00:00:00.000000 |
| certfr-2026-avi-0373 | Vulnérabilité dans Roundcube | 2026-03-30T00:00:00.000000 | 2026-04-08T00:00:00.000000 |
| certfr-2026-avi-0401 | Multiples vulnérabilités dans GLPI | 2026-04-07T00:00:00.000000 | 2026-04-07T00:00:00.000000 |
| certfr-2026-avi-0400 | Vulnérabilité dans Fortinet FortiClientEMS | 2026-04-07T00:00:00.000000 | 2026-04-07T00:00:00.000000 |
| certfr-2026-avi-0399 | Multiples vulnérabilités dans Google Android | 2026-04-07T00:00:00.000000 | 2026-04-07T00:00:00.000000 |
| certfr-2026-avi-0398 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0397 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0396 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0395 | Multiples vulnérabilités dans les produits IBM | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0394 | Multiples vulnérabilités dans VMware Tanzu | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0393 | Vulnérabilité dans Synology Mail Station | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0392 | Multiples vulnérabilités dans Microsoft Edge | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0391 | Multiples vulnérabilités dans OpenSSH | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0390 | Multiples vulnérabilités dans Belden NetModule Router Software | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0389 | Vulnérabilité dans Microsoft Azure Linux | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0388 | Multiples vulnérabilités dans les produits Cisco | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0387 | Multiples vulnérabilités dans les produits Netgate | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0386 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| certfr-2026-avi-0385 | Multiples vulnérabilités dans Google Chrome | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| certfr-2026-avi-0384 | Multiples vulnérabilités dans Joomla! | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| certfr-2026-avi-0383 | Multiples vulnérabilités dans Sonicwall Email Security | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| certfr-2026-avi-0382 | Multiples vulnérabilités dans les produits FoxIT | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0381 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0380 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0379 | Vulnérabilité dans Elastic OpenTelemetry Java | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0378 | Vulnérabilité dans Symantec Data Loss Prevention (DLP) | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0377 | Multiples vulnérabilités dans Papercut | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0376 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-30T00:00:00.000000 | 2026-03-30T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000092 | ETERNUS SF vulnerable to incorrect default permissions | 2025-10-20T14:20+09:00 | 2025-10-20T14:20+09:00 |
| jvndb-2025-000089 | Installer of AutoDownloader may insecurely load Dynamic Link Libraries | 2025-10-17T13:38+09:00 | 2025-10-17T13:38+09:00 |
| jvndb-2025-000074 | Multiple vulnerabilities in desknet's NEO | 2025-10-16T17:30+09:00 | 2025-10-16T17:30+09:00 |
| jvndb-2025-000076 | Multiple vulnerabilities in ChatLuck | 2025-10-16T17:17+09:00 | 2025-10-16T17:17+09:00 |
| jvndb-2025-000087 | Ruijie Networks RG-EST300 undocumented SSH functionality | 2025-10-16T14:19+09:00 | 2025-10-16T14:19+09:00 |
| jvndb-2025-016124 | Buffalo Wi-Fi router WXR9300BE6P series vulnerable to path traversal | 2025-10-16T11:16+09:00 | 2025-10-16T11:16+09:00 |
| jvndb-2025-000085 | Multiple RSUPPORT products may insecurely load Dynamic Link Libraries | 2025-10-15T15:55+09:00 | 2025-10-15T15:55+09:00 |
| jvndb-2025-000086 | Phoenix Contact CHARX SEC-3xxx vulnerable to code injection | 2025-10-15T15:54+09:00 | 2025-10-15T15:54+09:00 |
| jvndb-2025-000083 | BUFFALO NAS Navigator2 registers a Windows service with an unquoted file path | 2025-10-10T13:56+09:00 | 2025-10-10T13:56+09:00 |
| jvndb-2025-015451 | Multiple vulnerabilities in FUJI Electric V-SFT | 2025-10-09T13:39+09:00 | 2025-10-09T13:39+09:00 |
| jvndb-2025-000081 | DataSpider Servista improper restriction of XML external entity references | 2025-09-29T14:44+09:00 | 2025-10-07T16:54+09:00 |
| jvndb-2025-000082 | The installers of DENSO TEN drive recorder viewer may insecurely load Dynamic Link Libraries | 2025-10-06T15:38+09:00 | 2025-10-06T15:38+09:00 |
| jvndb-2025-015061 | Trend Micro Antivirus for Mac vulnerable to Local Privilege Escalation | 2025-10-06T13:52+09:00 | 2025-10-06T13:52+09:00 |
| jvndb-2025-000044 | Denial-of-service (DoS) vulnerabilities in multiple Apache products | 2025-06-26T14:41+09:00 | 2025-10-01T14:18+09:00 |
| jvndb-2025-014642 | Multiple vulnerabilities in Canon Printer Drivers for Production Printers, Office/Small Office Multifunction Printers and Laser Printers | 2025-09-30T11:50+09:00 | 2025-09-30T11:50+09:00 |
| jvndb-2025-000066 | Improper file access permission settings in multiple i-FILTER products | 2025-08-27T19:50+09:00 | 2025-09-29T13:45+09:00 |
| jvndb-2025-000077 | RICOH Streamline NX vulnerable to tampering with operation history | 2025-09-08T13:42+09:00 | 2025-09-24T16:53+09:00 |
| jvndb-2025-007519 | Multiple vulnerabilities in multiple BROTHER products | 2025-06-26T18:15+09:00 | 2025-09-22T10:16+09:00 |
| jvndb-2025-014105 | OMRON SOCIAL SOLUTIONS Uninterruptible Power Supply (UPS) management application registers a Windows service with an unquoted file path | 2025-09-19T16:21+09:00 | 2025-09-19T16:21+09:00 |
| jvndb-2025-014104 | Multiple vulnerabilities in I-O DATA wireless LAN routers | 2025-09-19T14:58+09:00 | 2025-09-19T14:58+09:00 |
| jvndb-2025-014081 | Multiple Brother and its OEM products with weak initial administrator passwords | 2025-09-19T10:52+09:00 | 2025-09-19T10:52+09:00 |
| jvndb-2025-000079 | UNIVERGE IX/IX-R/IX-V series routers provided by NEC Corporation vulnerable to cross-site scripting | 2025-09-18T17:43+09:00 | 2025-09-18T17:43+09:00 |
| jvndb-2025-000078 | Century HW RAID Manager registers a Windows service with an unquoted file path | 2025-09-17T13:45+09:00 | 2025-09-17T13:45+09:00 |
| jvndb-2025-000048 | WTW-EAGLE App vulnerable to improper server certificate validation | 2025-09-12T13:57+09:00 | 2025-09-12T13:57+09:00 |
| jvndb-2025-000070 | "Gunosy" App vulnerable to insertion of sensitive information into sent data | 2025-09-02T14:20+09:00 | 2025-09-09T09:51+09:00 |
| jvndb-2025-000072 | Obsidian GitHub Copilot Plugin stores sensitive information in cleartext | 2025-09-05T16:52+09:00 | 2025-09-05T16:52+09:00 |
| jvndb-2025-000073 | RATOC RAID Monitoring Manager for Windows registers a Windows service with an unquoted file path | 2025-09-05T16:20+09:00 | 2025-09-05T16:20+09:00 |
| jvndb-2025-000071 | "Yahoo! Shopping" App for Android fails to restrict custom URL schemes properly | 2025-09-05T15:12+09:00 | 2025-09-05T15:12+09:00 |
| jvndb-2025-000075 | Multiple vulnerabilities in TkEasyGUI | 2025-09-05T14:53+09:00 | 2025-09-05T14:53+09:00 |
| jvndb-2025-000069 | Web Caster V130 vulnerable to cross-site request forgery | 2025-09-03T14:23+09:00 | 2025-09-03T14:23+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-18143 | PraisonAI操作系统命令注入漏洞 | 2026-04-20 | 2026-04-22 |
| cnvd-2026-18142 | PraisonAI代码问题漏洞 | 2026-04-20 | 2026-04-22 |
| cnvd-2026-18600 | Microsoft Excel缓冲区溢出漏洞(CNVD-2026-18600) | 2026-04-21 | 2026-04-21 |
| cnvd-2026-18599 | Microsoft Desktop Windows Manager资源管理错误漏洞(CNVD-2026-18599) | 2026-04-21 | 2026-04-21 |
| cnvd-2026-18598 | Microsoft Desktop Windows Manager资源管理错误漏洞(CNVD-2026-18598) | 2026-04-21 | 2026-04-21 |
| cnvd-2026-18597 | Microsoft Desktop Windows Manager资源管理错误漏洞 | 2026-04-21 | 2026-04-21 |
| cnvd-2026-18596 | Microsoft Desktop Windows Manager资源管理错误漏洞(CNVD-2026-18596) | 2026-04-21 | 2026-04-21 |
| cnvd-2026-18595 | Microsoft Brokering File System资源管理错误漏洞 | 2026-04-21 | 2026-04-21 |
| cnvd-2026-18594 | Microsoft Azure Monitor Agent代码问题漏洞(CNVD-2026-18594) | 2026-04-21 | 2026-04-21 |
| cnvd-2026-18593 | Microsoft Azure Monitor Agent输入验证错误漏洞(CNVD-2026-18593) | 2026-04-21 | 2026-04-21 |
| cnvd-2026-18592 | Microsoft .NET Framework拒绝服务漏洞 | 2026-04-21 | 2026-04-21 |
| cnvd-2026-18590 | Dell PowerProtect Data Domain操作系统命令注入漏洞(CNVD-2026-18590) | 2026-01-19 | 2026-04-21 |
| cnvd-2026-18589 | Dell PowerScale OneFS资源管理错误漏洞 | 2026-02-05 | 2026-04-21 |
| cnvd-2026-18588 | Dell PremierColor Panel Driver访问控制错误漏洞 | 2026-02-05 | 2026-04-21 |
| cnvd-2026-18587 | Dell Secure Connect Gateway路径遍历漏洞 | 2026-04-10 | 2026-04-21 |
| cnvd-2026-18586 | Dell PowerProtect Data Domain信息泄露漏洞(CNVD-2026-18586) | 2026-04-20 | 2026-04-21 |
| cnvd-2026-18585 | Dell PowerProtect Data Domain Data Domain Operating System命令注入漏洞 | 2026-04-20 | 2026-04-21 |
| cnvd-2026-18584 | Dell PowerProtect Data Domain Data Domain Operating System命令注入漏洞(CNVD-2026-18584) | 2026-04-20 | 2026-04-21 |
| cnvd-2026-18583 | Dell PowerProtect Data Domain跨站脚本漏洞(CNVD-2026-18583) | 2026-04-20 | 2026-04-21 |
| cnvd-2026-18582 | Dell PowerProtect Data Domain OS命令注入漏洞(CNVD-2026-18582) | 2026-04-20 | 2026-04-21 |
| cnvd-2026-18581 | Dell PowerProtect Data Domain OS命令注入漏洞(CNVD-2026-18581) | 2026-04-20 | 2026-04-21 |
| cnvd-2026-18580 | Dell PowerProtect Data Domain OS命令注入漏洞 | 2026-04-20 | 2026-04-21 |
| cnvd-2026-18542 | Dell Integrated Dell Remote Access Controller信息泄露漏洞 | 2026-03-26 | 2026-04-21 |
| cnvd-2026-18541 | Dell Integrated Dell Remote Access Controller代码执行漏洞 | 2026-03-26 | 2026-04-21 |
| cnvd-2026-18540 | Dell PowerProtect Data Domain参数注入漏洞(CNVD-2026-18540) | 2026-04-20 | 2026-04-21 |
| cnvd-2026-17914 | 多款Mozilla产品存在未明漏洞(CNVD-2026-17914) | 2026-03-31 | 2026-04-21 |
| cnvd-2026-17913 | 多款Mozilla产品内存错误引用漏洞(CNVD-2026-17913) | 2026-03-31 | 2026-04-21 |
| cnvd-2026-17912 | 多款Apple产品存在未明漏洞(CNVD-2026-17912) | 2026-03-31 | 2026-04-21 |
| cnvd-2026-17911 | 多款Apple产品越界访问漏洞 | 2026-03-31 | 2026-04-21 |
| cnvd-2026-17910 | WordPress插件Listeo Core存在未明漏洞 | 2026-04-10 | 2026-04-21 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15695 | Уязвимость компонента drivers/gpu/drm/hisilicon/hibmc/hibmc_drm_drv.c ядра операционной с… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15694 | Уязвимость функции br_multicast_query_expired() компонента net/bridge/br_multicast.c ядра… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15693 | Уязвимость функции destroy_args() компонента mm/debug_vm_pgtable.c ядра операционной сист… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15692 | Уязвимость компонента ufs-exynos.c ядра операционной системы Linux, позволяющая нарушител… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15690 | Уязвимость компонента drivers/bus ядра операционной системы Linux, позволяющая нарушителю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15688 | Уязвимость компонента fs/nfs ядра операционной системы Linux, позволяющая нарушителю полу… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15687 | Уязвимость компонента dwc3 ядра операционной системы Linux, позволяющая нарушителю вызват… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15686 | Уязвимость функции mt_report_fixup() ядра операционной системы Linux, позволяющая нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15683 | Уязвимость функции trace_printk_seq() ядра операционной системы Linux, связанная с неконт… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15682 | Уязвимость компонента efivarfs ядра операционной системы Linux, позволяющая нарушителю вы… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15680 | Уязвимость компонента fs/smb ядра операционной системы Linux, позволяющая нарушителю вызв… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15679 | Уязвимость компонента inode.c ядра операционной системы Linux, позволяющая нарушителю пол… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15678 | Уязвимость компонентов rose ядра операционной системы Linux, позволяющая нарушителю получ… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15677 | Уязвимость компонента rose_route.c ядра операционной системы Linux, позволяющая нарушител… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15676 | Уязвимость компонента xfs ядра операционной системы Linux, позволяющая нарушителю вызвать… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15674 | Уязвимость модуля wifi ядра операционной системы Linux, позволяющая нарушителю получить д… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15669 | Уязвимость компонента slub.c ядра операционной системы Linux, позволяющая нарушителю вызв… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15667 | Уязвимость функции do_validate_mem() компонента rsrc_nonstatic.c ядра операционной систем… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15665 | Уязвимость компонента arch/x86 ядра операционной системы Linux, позволяющая нарушителю по… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15660 | Уязвимость компонента fs/hfsplus/unicode.c ядра операционной системы Linux, позволяющая н… | 14.12.2025 | 16.02.2026 |
| bdu:2025-15659 | Уязвимость компонента fs/hfsplus/bnode.c ядра операционной системы Linux, позволяющая нар… | 14.12.2025 | 16.02.2026 |
| bdu:2025-15658 | Уязвимость компонента netfilter ядра операционной системы Linux, позволяющая нарушителю в… | 14.12.2025 | 16.02.2026 |
| bdu:2025-15559 | Уязвимость функции sqlite3KeyInfoFromExprList системы управления базами данных SQLite, по… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15558 | Уязвимость реализации протокола IEEE 802.11 ядра операционной системы Linux, позволяющая … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15556 | Уязвимость компонента jfs_imap.c ядра операционной системы Linux, позволяющая нарушителю … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15555 | Уязвимость компонента ksmbd ядра операционной системы Linux, позволяющая нарушителю вызва… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15554 | Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | 11.12.2025 | 16.02.2026 |
| bdu:2025-15553 | Уязвимость компонента net/sched ядра операционной системы Linux, позволяющая нарушителю в… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15552 | Уязвимость компонента eventpoll ядра операционной системы Linux, позволяющая нарушителю в… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15551 | Уязвимость функции nf_tables_updchain компонента net/netfilter/nf_tables_api.c ядра опера… | 11.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201404-0378 | Unspecified vulnerability in Oracle Java SE 5.0u61, SE 6u71, 7u51, and 8; JRockit R27.8.1… | 2024-07-23T22:08:28.541000Z |
| var-201908-0264 | Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a den… | 2024-07-23T22:07:30.228000Z |
| var-201702-0469 | An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari be… | 2024-07-23T22:06:53.547000Z |
| var-200703-0016 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted at… | 2024-07-23T22:06:48.011000Z |
| var-201609-0595 | The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly … | 2024-07-23T22:06:46.651000Z |
| var-202004-1974 | A type confusion issue was addressed with improved memory handling. This issue is fixed i… | 2024-07-23T22:06:44.403000Z |
| var-201705-3790 | In Open vSwitch (OvS) v2.7.0, there is a buffer over-read while parsing the group mod Ope… | 2024-07-23T22:06:43.841000Z |
| var-202109-1802 | A crafted request uri-path can cause mod_proxy to forward the request to an origin server… | 2024-07-23T22:06:13.520000Z |
| var-202110-1622 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:06:10.313000Z |
| var-200905-0043 | Integer underflow in QuickDraw Manager in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7, … | 2024-07-23T22:06:10.145000Z |
| var-202203-0129 | A cookie management issue was addressed with improved state management. This issue is fix… | 2024-07-23T22:06:09.291000Z |
| var-200210-0102 | Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a deni… | 2024-07-23T22:06:08.093000Z |
| var-202009-0037 | A flaw was discovered in all versions of Undertow before Undertow 2.2.0.Final, where HTTP… | 2024-07-23T22:06:07.991000Z |
| var-201912-0619 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:06:04.230000Z |
| var-200809-0566 | Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2… | 2024-07-23T22:06:03.293000Z |
| var-202201-0424 | A validation issue was addressed with improved input sanitization. This issue is fixed in… | 2024-07-23T22:06:01.833000Z |
| var-200604-0201 | Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary c… | 2024-07-23T22:05:29.066000Z |
| var-201201-0025 | Use-after-free vulnerability in Google Chrome before 16.0.912.77 allows remote attackers … | 2024-07-23T22:05:28.758000Z |
| var-201808-0957 | Systems with microprocessors utilizing speculative execution and address translations may… | 2024-07-23T22:05:21.889000Z |
| var-202203-1400 | jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of servic… | 2024-07-23T22:05:19.247000Z |
| var-201912-0640 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:05:19.907000Z |
| var-201904-1343 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:05:19.745000Z |
| var-201007-0949 | WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before… | 2024-07-23T22:05:19.065000Z |
| var-201912-1856 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:04:56.028000Z |
| var-200904-0821 | The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products… | 2024-07-23T22:04:56.133000Z |
| var-200603-0282 | Unspecified vulnerability in Safari, LaunchServices, and/or CoreTypes in Apple Mac OS X 1… | 2024-07-23T22:04:24.723000Z |
| var-201912-0509 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:03:53.293000Z |
| var-200806-0575 | SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and … | 2024-07-23T22:03:53.151000Z |
| var-200703-0024 | Unspecified vulnerability in the authentication feature for DirectoryService (DS Plug-Ins… | 2024-07-23T22:03:53.866000Z |
| var-202005-1054 | dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by d… | 2024-07-23T22:03:49.580000Z |