Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43419 |
N/A
|
ceph: fix memory leaks in ceph_mdsc_build_path() |
Linux |
Linux |
2026-05-08T14:21:55.037Z | 2026-05-08T14:21:55.037Z |
| CVE-2026-43418 |
N/A
|
sched/mmcid: Prevent CID stalls due to concurrent forks |
Linux |
Linux |
2026-05-08T14:21:54.362Z | 2026-05-08T14:21:54.362Z |
| CVE-2026-43417 |
N/A
|
sched/mmcid: Handle vfork()/CLONE_VM correctly |
Linux |
Linux |
2026-05-08T14:21:53.618Z | 2026-05-08T14:21:53.618Z |
| CVE-2026-43416 |
N/A
|
powerpc, perf: Check that current->mm is alive before … |
Linux |
Linux |
2026-05-08T14:21:52.954Z | 2026-05-08T14:21:52.954Z |
| CVE-2026-43415 |
N/A
|
scsi: ufs: core: Fix SError in ufshcd_rtc_work() durin… |
Linux |
Linux |
2026-05-08T14:21:52.293Z | 2026-05-08T14:21:52.293Z |
| CVE-2026-43414 |
N/A
|
scsi: qla2xxx: Completely fix fcport double free |
Linux |
Linux |
2026-05-08T14:21:51.604Z | 2026-05-08T14:21:51.604Z |
| CVE-2026-43413 |
N/A
|
scsi: hisi_sas: Fix NULL pointer exception during user… |
Linux |
Linux |
2026-05-08T14:21:50.923Z | 2026-05-08T14:21:50.923Z |
| CVE-2026-43412 |
N/A
|
ASoC: qcom: qdsp6: Fix q6apm remove ordering during AD… |
Linux |
Linux |
2026-05-08T14:21:50.187Z | 2026-05-08T14:21:50.187Z |
| CVE-2026-43411 |
N/A
|
tipc: fix divide-by-zero in tipc_sk_filter_connect() |
Linux |
Linux |
2026-05-08T14:21:49.543Z | 2026-05-08T14:21:49.543Z |
| CVE-2026-43410 |
N/A
|
firmware: stratix10-rsu: Fix NULL pointer dereference … |
Linux |
Linux |
2026-05-08T14:21:48.885Z | 2026-05-08T14:21:48.885Z |
| CVE-2026-43409 |
N/A
|
kprobes: avoid crash when rmmod/insmod after ftrace killed |
Linux |
Linux |
2026-05-08T14:21:48.239Z | 2026-05-08T14:21:48.239Z |
| CVE-2026-43408 |
N/A
|
ceph: add a bunch of missing ceph_path_info initializers |
Linux |
Linux |
2026-05-08T14:21:47.579Z | 2026-05-08T14:21:47.579Z |
| CVE-2026-43407 |
N/A
|
libceph: Fix potential out-of-bounds access in ceph_ha… |
Linux |
Linux |
2026-05-08T14:21:46.927Z | 2026-05-09T04:10:54.228Z |
| CVE-2026-43406 |
N/A
|
libceph: prevent potential out-of-bounds reads in proc… |
Linux |
Linux |
2026-05-08T14:21:46.246Z | 2026-05-09T04:10:52.241Z |
| CVE-2026-43405 |
N/A
|
libceph: Use u32 for non-negative values in ceph_monma… |
Linux |
Linux |
2026-05-08T14:21:45.581Z | 2026-05-09T04:10:50.413Z |
| CVE-2026-43404 |
N/A
|
mm: Fix a hmm_range_fault() livelock / starvation problem |
Linux |
Linux |
2026-05-08T14:21:44.929Z | 2026-05-08T14:21:44.929Z |
| CVE-2026-43403 |
N/A
|
nsfs: tighten permission checks for ns iteration ioctls |
Linux |
Linux |
2026-05-08T14:21:44.204Z | 2026-05-08T14:21:44.204Z |
| CVE-2026-43402 |
N/A
|
kthread: consolidate kthread exit paths to prevent use… |
Linux |
Linux |
2026-05-08T14:21:43.550Z | 2026-05-08T14:21:43.550Z |
| CVE-2026-43401 |
N/A
|
cpufreq: intel_pstate: Fix NULL pointer dereference in… |
Linux |
Linux |
2026-05-08T14:21:42.876Z | 2026-05-08T14:21:42.876Z |
| CVE-2026-43400 |
N/A
|
drm/amdgpu: add upper bound check on user inputs in si… |
Linux |
Linux |
2026-05-08T14:21:42.225Z | 2026-05-09T04:10:48.826Z |
| CVE-2026-43399 |
N/A
|
drm/amdgpu/userq: Fix reference leak in amdgpu_userq_w… |
Linux |
Linux |
2026-05-08T14:21:41.529Z | 2026-05-08T14:21:41.529Z |
| CVE-2026-43398 |
N/A
|
drm/amdgpu: add upper bound check on user inputs in wa… |
Linux |
Linux |
2026-05-08T14:21:40.895Z | 2026-05-09T04:10:47.202Z |
| CVE-2026-43397 |
N/A
|
drm/bridge: samsung-dsim: Fix memory leak in error path |
Linux |
Linux |
2026-05-08T14:21:40.185Z | 2026-05-08T14:21:40.185Z |
| CVE-2026-43396 |
N/A
|
drm/xe/sync: Fix user fence leak on alloc failure |
Linux |
Linux |
2026-05-08T14:21:39.443Z | 2026-05-08T14:21:39.443Z |
| CVE-2026-43395 |
N/A
|
drm/xe/sync: Cleanup partially initialized sync on par… |
Linux |
Linux |
2026-05-08T14:21:38.756Z | 2026-05-08T14:21:38.756Z |
| CVE-2026-43394 |
N/A
|
nfsd: Fix cred ref leak in nfsd_nl_listener_set_doit(). |
Linux |
Linux |
2026-05-08T14:21:38.127Z | 2026-05-08T14:21:38.127Z |
| CVE-2026-43393 |
N/A
|
btrfs: fix chunk map leak in btrfs_map_block() after b… |
Linux |
Linux |
2026-05-08T14:21:37.368Z | 2026-05-08T14:21:37.368Z |
| CVE-2026-43392 |
N/A
|
sched_ext: Fix starvation of scx_enable() under fair-c… |
Linux |
Linux |
2026-05-08T14:21:36.692Z | 2026-05-08T14:21:36.692Z |
| CVE-2026-43391 |
N/A
|
nsfs: tighten permission checks for handle opening |
Linux |
Linux |
2026-05-08T14:21:36.012Z | 2026-05-08T14:21:36.012Z |
| CVE-2026-43390 |
N/A
|
nstree: tighten permission checks for listing |
Linux |
Linux |
2026-05-08T14:21:35.337Z | 2026-05-08T14:21:35.337Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43412 |
N/A
|
ASoC: qcom: qdsp6: Fix q6apm remove ordering during AD… |
Linux |
Linux |
2026-05-08T14:21:50.187Z | 2026-05-08T14:21:50.187Z |
| CVE-2026-43411 |
N/A
|
tipc: fix divide-by-zero in tipc_sk_filter_connect() |
Linux |
Linux |
2026-05-08T14:21:49.543Z | 2026-05-08T14:21:49.543Z |
| CVE-2026-43410 |
N/A
|
firmware: stratix10-rsu: Fix NULL pointer dereference … |
Linux |
Linux |
2026-05-08T14:21:48.885Z | 2026-05-08T14:21:48.885Z |
| CVE-2026-43409 |
N/A
|
kprobes: avoid crash when rmmod/insmod after ftrace killed |
Linux |
Linux |
2026-05-08T14:21:48.239Z | 2026-05-08T14:21:48.239Z |
| CVE-2026-43408 |
N/A
|
ceph: add a bunch of missing ceph_path_info initializers |
Linux |
Linux |
2026-05-08T14:21:47.579Z | 2026-05-08T14:21:47.579Z |
| CVE-2026-43407 |
N/A
|
libceph: Fix potential out-of-bounds access in ceph_ha… |
Linux |
Linux |
2026-05-08T14:21:46.927Z | 2026-05-09T04:10:54.228Z |
| CVE-2026-43406 |
N/A
|
libceph: prevent potential out-of-bounds reads in proc… |
Linux |
Linux |
2026-05-08T14:21:46.246Z | 2026-05-09T04:10:52.241Z |
| CVE-2026-43405 |
N/A
|
libceph: Use u32 for non-negative values in ceph_monma… |
Linux |
Linux |
2026-05-08T14:21:45.581Z | 2026-05-09T04:10:50.413Z |
| CVE-2026-43404 |
N/A
|
mm: Fix a hmm_range_fault() livelock / starvation problem |
Linux |
Linux |
2026-05-08T14:21:44.929Z | 2026-05-08T14:21:44.929Z |
| CVE-2026-43403 |
N/A
|
nsfs: tighten permission checks for ns iteration ioctls |
Linux |
Linux |
2026-05-08T14:21:44.204Z | 2026-05-08T14:21:44.204Z |
| CVE-2026-43402 |
N/A
|
kthread: consolidate kthread exit paths to prevent use… |
Linux |
Linux |
2026-05-08T14:21:43.550Z | 2026-05-08T14:21:43.550Z |
| CVE-2026-43401 |
N/A
|
cpufreq: intel_pstate: Fix NULL pointer dereference in… |
Linux |
Linux |
2026-05-08T14:21:42.876Z | 2026-05-08T14:21:42.876Z |
| CVE-2026-43400 |
N/A
|
drm/amdgpu: add upper bound check on user inputs in si… |
Linux |
Linux |
2026-05-08T14:21:42.225Z | 2026-05-09T04:10:48.826Z |
| CVE-2026-43399 |
N/A
|
drm/amdgpu/userq: Fix reference leak in amdgpu_userq_w… |
Linux |
Linux |
2026-05-08T14:21:41.529Z | 2026-05-08T14:21:41.529Z |
| CVE-2026-43398 |
N/A
|
drm/amdgpu: add upper bound check on user inputs in wa… |
Linux |
Linux |
2026-05-08T14:21:40.895Z | 2026-05-09T04:10:47.202Z |
| CVE-2026-43397 |
N/A
|
drm/bridge: samsung-dsim: Fix memory leak in error path |
Linux |
Linux |
2026-05-08T14:21:40.185Z | 2026-05-08T14:21:40.185Z |
| CVE-2026-43396 |
N/A
|
drm/xe/sync: Fix user fence leak on alloc failure |
Linux |
Linux |
2026-05-08T14:21:39.443Z | 2026-05-08T14:21:39.443Z |
| CVE-2026-43395 |
N/A
|
drm/xe/sync: Cleanup partially initialized sync on par… |
Linux |
Linux |
2026-05-08T14:21:38.756Z | 2026-05-08T14:21:38.756Z |
| CVE-2026-43394 |
N/A
|
nfsd: Fix cred ref leak in nfsd_nl_listener_set_doit(). |
Linux |
Linux |
2026-05-08T14:21:38.127Z | 2026-05-08T14:21:38.127Z |
| CVE-2026-43393 |
N/A
|
btrfs: fix chunk map leak in btrfs_map_block() after b… |
Linux |
Linux |
2026-05-08T14:21:37.368Z | 2026-05-08T14:21:37.368Z |
| CVE-2026-43392 |
N/A
|
sched_ext: Fix starvation of scx_enable() under fair-c… |
Linux |
Linux |
2026-05-08T14:21:36.692Z | 2026-05-08T14:21:36.692Z |
| CVE-2026-43391 |
N/A
|
nsfs: tighten permission checks for handle opening |
Linux |
Linux |
2026-05-08T14:21:36.012Z | 2026-05-08T14:21:36.012Z |
| CVE-2026-43390 |
N/A
|
nstree: tighten permission checks for listing |
Linux |
Linux |
2026-05-08T14:21:35.337Z | 2026-05-08T14:21:35.337Z |
| CVE-2026-43389 |
N/A
|
mm: memfd_luo: always dirty all folios |
Linux |
Linux |
2026-05-08T14:21:34.658Z | 2026-05-08T14:21:34.658Z |
| CVE-2026-43388 |
N/A
|
mm/damon/core: clear walk_control on inactive context … |
Linux |
Linux |
2026-05-08T14:21:33.966Z | 2026-05-08T14:21:33.966Z |
| CVE-2026-43387 |
N/A
|
staging: rtl8723bs: properly validate the data in rtw_… |
Linux |
Linux |
2026-05-08T14:21:33.323Z | 2026-05-09T04:10:45.532Z |
| CVE-2026-43386 |
N/A
|
staging: rtl8723bs: fix potential out-of-bounds read i… |
Linux |
Linux |
2026-05-08T14:21:32.646Z | 2026-05-08T14:21:32.646Z |
| CVE-2026-43385 |
N/A
|
net: Fix rcu_tasks stall in threaded busypoll |
Linux |
Linux |
2026-05-08T14:21:32.007Z | 2026-05-08T14:21:32.007Z |
| CVE-2026-43384 |
N/A
|
net/tcp-ao: Fix MAC comparison to be constant-time |
Linux |
Linux |
2026-05-08T14:21:31.355Z | 2026-05-08T14:21:31.355Z |
| CVE-2026-43383 |
N/A
|
net/tcp-md5: Fix MAC comparison to be constant-time |
Linux |
Linux |
2026-05-08T14:21:30.704Z | 2026-05-08T14:21:30.704Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-23161 | In the Linux kernel, the following vulnerability has been resolved: mm/shmem, swap: fix race of tr… | 2026-02-14T16:15:56.277 | 2026-04-03T14:16:24.830 |
| fkie_cve-2026-23160 | In the Linux kernel, the following vulnerability has been resolved: octeon_ep: Fix memory leak in … | 2026-02-14T16:15:56.177 | 2026-03-18T14:12:40.197 |
| fkie_cve-2026-23159 | In the Linux kernel, the following vulnerability has been resolved: perf: sched: Fix perf crash wi… | 2026-02-14T16:15:56.070 | 2026-03-18T14:13:18.750 |
| fkie_cve-2026-23158 | In the Linux kernel, the following vulnerability has been resolved: gpio: virtuser: fix UAF in con… | 2026-02-14T16:15:55.967 | 2026-03-18T14:19:55.513 |
| fkie_cve-2026-23157 | In the Linux kernel, the following vulnerability has been resolved: btrfs: do not strictly require… | 2026-02-14T16:15:55.863 | 2026-03-25T11:16:19.570 |
| fkie_cve-2026-23156 | In the Linux kernel, the following vulnerability has been resolved: efivarfs: fix error propagatio… | 2026-02-14T16:15:55.760 | 2026-03-18T14:40:43.860 |
| fkie_cve-2026-23155 | In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bu… | 2026-02-14T16:15:55.653 | 2026-04-18T09:16:14.317 |
| fkie_cve-2026-23154 | In the Linux kernel, the following vulnerability has been resolved: net: fix segmentation of forwa… | 2026-02-14T16:15:55.550 | 2026-03-25T11:16:19.400 |
| fkie_cve-2026-23153 | In the Linux kernel, the following vulnerability has been resolved: firewire: core: fix race condi… | 2026-02-14T16:15:55.443 | 2026-03-18T14:16:24.010 |
| fkie_cve-2026-23152 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: correctly deco… | 2026-02-14T16:15:55.340 | 2026-03-17T21:11:25.373 |
| fkie_cve-2026-23151 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix memory le… | 2026-02-14T16:15:55.233 | 2026-03-17T21:11:37.000 |
| fkie_cve-2026-23150 | In the Linux kernel, the following vulnerability has been resolved: nfc: llcp: Fix memleak in nfc_… | 2026-02-14T16:15:55.123 | 2026-03-17T21:12:01.620 |
| fkie_cve-2026-23149 | In the Linux kernel, the following vulnerability has been resolved: drm: Do not allow userspace to… | 2026-02-14T16:15:55.023 | 2026-03-17T21:12:29.223 |
| fkie_cve-2026-23148 | In the Linux kernel, the following vulnerability has been resolved: nvmet: fix race in nvmet_bio_d… | 2026-02-14T16:15:54.913 | 2026-04-03T14:16:24.630 |
| fkie_cve-2026-23147 | In the Linux kernel, the following vulnerability has been resolved: btrfs: zlib: fix the folio lea… | 2026-02-14T16:15:54.813 | 2026-03-17T21:12:52.717 |
| fkie_cve-2026-23146 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_uart: fix null-… | 2026-02-14T16:15:54.703 | 2026-03-17T21:13:01.070 |
| fkie_cve-2026-23145 | In the Linux kernel, the following vulnerability has been resolved: ext4: fix iloc.bh leak in ext4… | 2026-02-14T16:15:54.597 | 2026-03-17T21:13:17.667 |
| fkie_cve-2026-23144 | In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: cleanup attrs … | 2026-02-14T16:15:54.490 | 2026-03-17T21:13:24.750 |
| fkie_cve-2026-23143 | In the Linux kernel, the following vulnerability has been resolved: virtio_net: Fix misalignment b… | 2026-02-14T16:15:54.383 | 2026-03-17T21:13:32.820 |
| fkie_cve-2026-23142 | In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs-scheme: cleanup… | 2026-02-14T16:15:54.273 | 2026-03-17T21:13:41.900 |
| fkie_cve-2026-23141 | In the Linux kernel, the following vulnerability has been resolved: btrfs: send: check for inline … | 2026-02-14T16:15:54.163 | 2026-03-25T11:16:19.240 |
| fkie_cve-2026-23140 | In the Linux kernel, the following vulnerability has been resolved: bpf, test_run: Subtract size o… | 2026-02-14T16:15:54.060 | 2026-03-17T21:13:55.033 |
| fkie_cve-2026-23139 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conncount: updat… | 2026-02-14T16:15:53.950 | 2026-04-03T14:16:24.440 |
| fkie_cve-2026-23138 | In the Linux kernel, the following vulnerability has been resolved: tracing: Add recursion protect… | 2026-02-14T16:15:53.830 | 2026-03-25T11:16:19.087 |
| fkie_cve-2026-23137 | In the Linux kernel, the following vulnerability has been resolved: of: unittest: Fix memory leak … | 2026-02-14T16:15:53.703 | 2026-03-17T21:15:45.090 |
| fkie_cve-2026-23136 | In the Linux kernel, the following vulnerability has been resolved: libceph: reset sparse-read sta… | 2026-02-14T16:15:53.590 | 2026-04-03T14:16:24.267 |
| fkie_cve-2026-23135 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix dma_free_coh… | 2026-02-14T16:15:53.483 | 2026-03-17T21:16:17.760 |
| fkie_cve-2026-23134 | In the Linux kernel, the following vulnerability has been resolved: slab: fix kmalloc_nolock() con… | 2026-02-14T16:15:53.377 | 2026-03-17T21:16:27.177 |
| fkie_cve-2026-23133 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: fix dma_free_coh… | 2026-02-14T16:15:53.270 | 2026-03-17T21:16:34.003 |
| fkie_cve-2026-23132 | In the Linux kernel, the following vulnerability has been resolved: drm/bridge: synopsys: dw-dp: f… | 2026-02-14T16:15:53.163 | 2026-03-17T21:16:41.337 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-h262-73j6-24h2 |
|
In the Linux kernel, the following vulnerability has been resolved: sched_ext: Remove redundant cs… | 2026-05-08T15:31:28Z | 2026-05-08T15:31:28Z |
| ghsa-gvc8-8g78-x3hg |
|
In the Linux kernel, the following vulnerability has been resolved: usb: yurex: fix race in probe … | 2026-05-08T15:31:28Z | 2026-05-08T15:31:28Z |
| ghsa-g84q-9979-4xf8 |
|
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Check endpoin… | 2026-05-08T15:31:28Z | 2026-05-08T15:31:28Z |
| ghsa-f7gv-jp52-6999 |
|
In the Linux kernel, the following vulnerability has been resolved: USB: usbtmc: Use usb_bulk_msg_… | 2026-05-08T15:31:28Z | 2026-05-08T15:31:28Z |
| ghsa-cmw3-52p3-wrx5 |
|
In the Linux kernel, the following vulnerability has been resolved: io_uring: fix physical SQE bou… | 2026-05-08T15:31:28Z | 2026-05-08T15:31:28Z |
| ghsa-9ccw-3qr7-6wpp |
|
In the Linux kernel, the following vulnerability has been resolved: rust_binder: avoid reading the… | 2026-05-08T15:31:28Z | 2026-05-08T15:31:28Z |
| ghsa-8r2v-c988-jpq4 |
|
In the Linux kernel, the following vulnerability has been resolved: rust_binder: check ownership b… | 2026-05-08T15:31:28Z | 2026-05-08T15:31:28Z |
| ghsa-8frp-2m2w-wr4j |
|
In the Linux kernel, the following vulnerability has been resolved: ceph: fix i_nlink underrun dur… | 2026-05-08T15:31:28Z | 2026-05-08T15:31:28Z |
| ghsa-6vj2-gjw9-6mgj |
|
In the Linux kernel, the following vulnerability has been resolved: usb: renesas_usbhs: fix use-af… | 2026-05-08T15:31:28Z | 2026-05-08T15:31:28Z |
| ghsa-5r8w-mfmh-79h7 |
|
In the Linux kernel, the following vulnerability has been resolved: sched/mmcid: Prevent CID stall… | 2026-05-08T15:31:28Z | 2026-05-08T15:31:28Z |
| ghsa-5cw4-rfp6-xjfx |
|
In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: fix use-after-free … | 2026-05-08T15:31:28Z | 2026-05-08T15:31:28Z |
| ghsa-2qqv-8873-jp7p |
|
In the Linux kernel, the following vulnerability has been resolved: usb: legacy: ncm: Fix NPE in g… | 2026-05-08T15:31:28Z | 2026-05-08T15:31:28Z |
| ghsa-267q-r86j-cvg7 |
|
In the Linux kernel, the following vulnerability has been resolved: rust_binder: fix oneway spam d… | 2026-05-08T15:31:28Z | 2026-05-08T15:31:28Z |
| ghsa-25hr-298p-f2jg |
|
In the Linux kernel, the following vulnerability has been resolved: net/mana: Null service_wq on s… | 2026-05-08T15:31:28Z | 2026-05-08T15:31:29Z |
| ghsa-2489-gxhv-vf7c |
|
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix SError in… | 2026-05-08T15:31:28Z | 2026-05-08T15:31:28Z |
| ghsa-xw48-xgg9-9h3g |
|
In the Linux kernel, the following vulnerability has been resolved: powerpc, perf: Check that curr… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:28Z |
| ghsa-wv9h-grcg-85wc |
|
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add upper bound ch… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-wmw9-c68x-2mg9 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/userq: Fix referenc… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-vww6-hvwf-mv33 |
|
In the Linux kernel, the following vulnerability has been resolved: sched_ext: Fix starvation of s… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-v6fj-q6v9-3hmm |
|
In the Linux kernel, the following vulnerability has been resolved: kthread: consolidate kthread e… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-rmwg-23c2-w7hq |
|
In the Linux kernel, the following vulnerability has been resolved: mm: memfd_luo: always dirty al… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-qm6r-96cc-q36w |
|
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Completely fix … | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-q6cw-2hr2-g93j |
|
In the Linux kernel, the following vulnerability has been resolved: firmware: stratix10-rsu: Fix N… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-q4g6-xq34-4jxw |
|
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add upper bound ch… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-prhc-6f6q-3vrj |
|
In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: qdsp6: Fix q6apm r… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-pfxc-r4m8-gw9p |
|
In the Linux kernel, the following vulnerability has been resolved: kprobes: avoid crash when rmmo… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-pfqf-x57j-qhgm |
|
In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-j7hx-vp8g-c83p |
|
In the Linux kernel, the following vulnerability has been resolved: cpufreq: intel_pstate: Fix NUL… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-j5jq-r673-59h3 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/xe/sync: Fix user fence le… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-j574-jvxx-m43q |
|
In the Linux kernel, the following vulnerability has been resolved: nstree: tighten permission che… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-54 |
6.5 (3.1)
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-06-24T18:15:00+00:00 | 2024-06-26T19:19:24.981233+00:00 |
| pysec-2024-53 |
|
langchain_experimental (aka LangChain Experimental) before 0.0.61 for LangChain provides … | langchain-experimental | 2024-06-16T15:15:00+00:00 | 2024-06-16T17:20:32.187558+00:00 |
| pysec-2024-195 |
5.5 (3.1)
|
Use of Web Browser Cache Containing Sensitive Information vulnerability in Apache Airflow… | apache-airflow | 2024-06-14T09:15:09+00:00 | 2025-01-19T16:22:56.419822+00:00 |
| pysec-2024-98 |
9.8 (3.1)
|
** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Submarine… | apache-submarine | 2024-06-12T15:15:00+00:00 | 2024-09-26T17:22:54.526846+00:00 |
| pysec-2024-97 |
9.8 (3.1)
|
** UNSUPPORTED WHEN ASSIGNED ** Improper Authentication vulnerability in Apache Submarine… | apache-submarine | 2024-06-12T14:15:00+00:00 | 2024-09-26T17:22:54.470974+00:00 |
| pysec-2024-236 |
6.1 (3.1)
|
Jupyter Server Proxy allows users to run arbitrary external processes alongside their not… | jupyter-server-proxy | 2024-06-11T22:15:09+00:00 | 2025-02-26T23:22:41.524251+00:00 |
| pysec-2024-177 |
9.8 (3.1)
|
Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach… | langflow | 2024-06-10T20:15:15+00:00 | 2025-01-19T01:52:23.722576+00:00 |
| pysec-2024-52 |
|
lepture Authlib before 1.3.1 has algorithm confusion with asymmetric public keys. Unless … | authlib | 2024-06-09T19:15:00+00:00 | 2024-06-09T21:20:21.309692+00:00 |
| pysec-2024-76 |
7.5 (3.1)
|
An XML External Entity (XXE) vulnerability in the ebookmeta.get_metadata function of eboo… | ebookmeta | 2024-06-07T19:15:00+00:00 | 2024-09-13T21:22:04.531357+00:00 |
| pysec-2024-117 |
9.8 (3.1)
|
man-group/dtale version 3.10.0 is vulnerable to an authentication bypass and remote code … | dtale | 2024-06-06T19:16:00+00:00 | 2024-11-03T20:22:34.425699+00:00 |
| pysec-2024-110 |
4.7 (3.1)
|
A sensitive data leakage vulnerability was identified in scikit-learn's TfidfVectorizer, … | scikit-learn | 2024-06-06T19:16:00+00:00 | 2024-10-24T21:22:05.950602+00:00 |
| pysec-2024-108 |
7.5 (3.1)
|
A path traversal vulnerability exists in the parisneo/lollms application, affecting versi… | lollms | 2024-06-06T19:16:00+00:00 | 2024-10-17T17:21:59.592496+00:00 |
| pysec-2024-242 |
7.5 (3.1)
|
A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically … | mlflow | 2024-06-06T19:15:55+00:00 | 2025-04-08T10:23:24.995743+00:00 |
| pysec-2024-194 |
6.1 (3.1)
|
A clickjacking vulnerability exists in zenml-io/zenml versions up to and including 0.55.5… | zenml | 2024-06-06T19:15:54+00:00 | 2025-01-19T13:22:31.835293+00:00 |
| pysec-2024-193 |
3.3 (3.1)
|
An issue was discovered in zenml-io/zenml versions up to and including 0.55.4. Due to imp… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-19T13:22:31.701775+00:00 |
| pysec-2024-170 |
4.8 (3.1)
|
A stored Cross-Site Scripting (XSS) vulnerability was identified in the zenml-io/zenml re… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-18T19:19:08.253212+00:00 |
| pysec-2024-169 |
6.5 (3.1)
|
An improper authorization vulnerability exists in the zenml-io/zenml repository, specific… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-18T19:19:08.205431+00:00 |
| pysec-2024-239 |
8.8 (3.1)
|
A vulnerability in mlflow/mlflow version 8.2.1 allows for remote code execution due to im… | mlflow | 2024-06-06T19:15:51+00:00 | 2025-04-08T10:23:24.852109+00:00 |
| pysec-2024-118 |
4.7 (3.1)
|
A Denial-of-Service (DoS) vulnerability exists in the `SitemapLoader` class of the `langc… | langchain | 2024-06-06T19:15:00+00:00 | 2024-11-03T20:22:34.854295+00:00 |
| pysec-2024-105 |
3.1 (3.1)
|
A race condition vulnerability exists in zenml-io/zenml versions up to and including 0.55… | zenml | 2024-06-06T19:15:00+00:00 | 2024-10-11T17:21:29.672975+00:00 |
| pysec-2024-184 |
7.5 (3.1)
|
A local file inclusion vulnerability exists in the JSON component of gradio-app/gradio ve… | gradio | 2024-06-06T18:15:18+00:00 | 2025-01-19T04:23:00.017053+00:00 |
| pysec-2024-165 |
7.5 (3.1)
|
The Jupyter Server provides the backend for Jupyter web applications. Jupyter Server on W… | jupyter-server | 2024-06-06T16:15:11+00:00 | 2025-01-18T19:19:04.842426+00:00 |
| pysec-2024-166 |
|
Nautobot is a Network Source of Truth and Network Automation Platform. A user with permis… | nautobot | 2024-05-28T23:15:17+00:00 | 2025-01-18T19:19:06.277166+00:00 |
| pysec-2024-258 |
|
In scrapy/scrapy, an issue was identified where the Authorization header is not removed d… | scrapy | 2024-05-20T08:15:08+00:00 | 2025-07-15T17:37:50.051730+00:00 |
| pysec-2024-244 |
7.5 (3.1)
|
A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a by… | mlflow | 2024-05-16T09:15:14+00:00 | 2025-04-08T10:23:25.092581+00:00 |
| pysec-2024-51 |
|
A broken access control vulnerability exists in mlflow/mlflow versions before 2.10.1, whe… | mlflow | 2024-05-16T09:15:00+00:00 | 2024-05-16T11:19:52.866536+00:00 |
| pysec-2024-237 |
9.4 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-05-14T16:17:12+00:00 | 2025-03-05T17:22:29.121263+00:00 |
| pysec-2024-185 |
|
Nebari through 2024.4.1 prints the temporary Keycloak root password. | nebari | 2024-05-06T00:15:10+00:00 | 2025-01-19T04:23:00.951638+00:00 |
| pysec-2024-175 |
|
WordOps through 3.20.0 has a wo/cli/plugins/stack_pref.py TOCTOU race condition because t… | wordops | 2024-05-06T00:15:10+00:00 | 2025-01-18T22:21:44.991242+00:00 |
| pysec-2024-255 |
|
Gradio before 4.20 allows credential leakage on Windows. | gradio | 2024-05-05T20:15:07+00:00 | 2025-06-17T19:21:48.983901+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-3310 | Malicious code in gweb-build-system (npm) | 2026-05-01T06:10:39Z | 2026-05-05T15:56:13Z |
| mal-2026-3208 | Malicious code in bxiucnxcb (PyPI) | 2026-05-01T00:29:27Z | 2026-05-02T23:49:22Z |
| mal-2026-3206 | Malicious code in currentclock (PyPI) | 2026-04-30T21:48:42Z | 2026-05-02T23:49:22Z |
| mal-2026-3207 | Malicious code in renderctx (PyPI) | 2026-04-30T21:38:14Z | 2026-05-01T14:31:22Z |
| mal-2026-3313 | Malicious code in service-gateway (npm) | 2026-04-30T21:30:37Z | 2026-05-05T15:56:15Z |
| mal-2026-3204 | Malicious code in intercom-client (npm) | 2026-04-30T21:29:27Z | 2026-04-30T22:25:10Z |
| mal-2026-3205 | Malicious code in doisomgcxog (PyPI) | 2026-04-30T21:06:45Z | 2026-05-02T23:49:22Z |
| mal-2026-3203 | Malicious code in buffparser (PyPI) | 2026-04-30T20:37:00Z | 2026-04-30T20:37:00Z |
| mal-2026-3202 | Malicious code in eslint-plugin-skyscanner-dates (npm) | 2026-04-30T17:59:18Z | 2026-05-05T15:56:12Z |
| mal-2026-3201 | Malicious code in lightning (PyPI) | 2026-04-30T16:53:41Z | 2026-04-30T18:38:32Z |
| mal-2026-3200 | Malicious code in sirens-lament (npm) | 2026-04-30T12:00:00Z | 2026-05-01T08:57:03Z |
| mal-2026-3199 | Malicious code in blackbeards-navigator (npm) | 2026-04-30T11:30:45Z | 2026-05-01T08:56:59Z |
| mal-2026-3305 | Malicious code in apple-internal-security-audit-v99 (npm) | 2026-04-30T08:26:11Z | 2026-05-04T03:15:15Z |
| mal-2026-3198 | Malicious code in timecurrently (PyPI) | 2026-04-30T08:05:28Z | 2026-05-02T23:49:22Z |
| mal-2026-3197 | Malicious code in sdoihgio9sudghsiudbg (PyPI) | 2026-04-30T08:04:20Z | 2026-05-02T23:49:22Z |
| mal-2026-3196 | Malicious code in react-dnd-14 (npm) | 2026-04-30T05:41:31Z | 2026-04-30T22:25:12Z |
| mal-2026-3194 | Malicious code in robase-dnb (PyPI) | 2026-04-30T00:02:39Z | 2026-05-03T20:49:49Z |
| mal-2026-3193 | Malicious code in rblx-http (PyPI) | 2026-04-29T23:31:35Z | 2026-05-03T20:49:49Z |
| mal-2026-3191 | Malicious code in rblx-https (PyPI) | 2026-04-29T23:24:14Z | 2026-05-03T20:49:49Z |
| mal-2026-3192 | Malicious code in ro-db (PyPI) | 2026-04-29T23:10:19Z | 2026-05-03T20:49:49Z |
| mal-2026-3190 | Malicious code in tanstack (npm) | 2026-04-29T22:44:03Z | 2026-04-30T22:25:12Z |
| mal-2026-3183 | Malicious code in @breezeai-frontend/cargo-ui (npm) | 2026-04-29T21:25:50Z | 2026-05-04T23:51:15Z |
| mal-2026-3184 | Malicious code in @breezeai-frontend/tailwind-config (npm) | 2026-04-29T21:15:52Z | 2026-05-04T23:51:15Z |
| mal-2026-3186 | Malicious code in ac-sasskit-beta (npm) | 2026-04-29T16:25:45Z | 2026-04-30T22:25:08Z |
| mal-2026-3187 | Malicious code in apple-appstore-full-library-utility (npm) | 2026-04-29T16:01:20Z | 2026-04-30T22:25:08Z |
| mal-2026-3188 | Malicious code in apple-security-internal-scanner-v3 (npm) | 2026-04-29T15:46:00Z | 2026-04-30T22:25:08Z |
| mal-2026-3175 | Malicious code in bbranger (PyPI) | 2026-04-29T15:33:26Z | 2026-04-29T15:33:26Z |
| mal-2026-3174 | Malicious code in internal-sys-audit-check (npm) | 2026-04-29T14:40:01Z | 2026-04-30T22:25:10Z |
| mal-2026-3173 | Malicious code in gcp-internal-research-poc (npm) | 2026-04-29T14:40:01Z | 2026-04-30T22:25:09Z |
| mal-2026-3172 | Malicious code in frank-newton3-user-hunt (npm) | 2026-04-29T14:40:01Z | 2026-04-30T22:25:09Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0484 | ImageMagick: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0482 | libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0481 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0480 | Red Hat Enterprise Linux (Python Protobuf): Schwachstelle ermöglicht Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0479 | Red Hat OpenShift Service Mesh (Kiali): Schwachstelle ermöglicht Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0472 | OpenClaw: Mehrere Schwachstellen | 2026-02-22T23:00:00.000+00:00 | 2026-04-12T22:00:00.000+00:00 |
| wid-sec-w-2026-0469 | GIMP: Mehrere Schwachstellen ermöglichen Codeausführung | 2026-02-19T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0462 | Linux Kernel: Mehrere Schwachstellen | 2026-02-18T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0452 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2026-02-18T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0448 | Red Hat Enterprise Linux (MUNGE): Schwachstelle ermöglicht Privilegieneskalation | 2026-02-17T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2026-0446 | libssh: Mehrere Schwachstellen ermöglichen Manipulation von Dateien und DoS | 2026-02-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0443 | Apache Tomcat und Tomcat Native: Mehrere Schwachstellen | 2026-02-17T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0441 | OpenClaw: Mehrere Schwachstellen | 2026-02-17T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0437 | Dell RecoverPoint for Virtual Machines: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und potenziell Privilegieneskalation | 2026-02-17T23:00:00.000+00:00 | 2026-02-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0427 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2026-02-16T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0425 | SmarterTools SmarterMail: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0424 | OpenClaw: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0423 | Gogs: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0422 | Mattermost: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0421 | Linux Kernel: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0420 | Google Chrome und Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2026-02-15T23:00:00.000+00:00 | 2026-02-17T23:00:00.000+00:00 |
| wid-sec-w-2026-0419 | vim (NetBeans): Schwachstelle ermöglicht Codeausführung | 2026-02-15T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0418 | Google Cloud Platform (Apigee): Schwachstelle ermöglicht Privilegieneskalation | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0417 | IBM Sterling Connect:Direct: Schwachstelle ermöglicht Denial of Service | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0416 | Keycloak: Schwachstelle ermöglicht Denial of Service | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0410 | HAProxy Enterprise, Community und ALOHA (QUIC): Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-12T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0409 | PostgreSQL: Mehrere Schwachstellen | 2026-02-12T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0405 | Grafana: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0403 | Apple macOS Tahoe, Sequoia und Sonoma: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-03-24T23:00:00.000+00:00 |
| wid-sec-w-2026-0402 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-03-24T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-352-02 | Schneider Electric EcoStruxure Foxboro DCS Advisor | 2025-12-09T08:00:00.000000Z | 2025-12-18T18:23:06.311869Z |
| icsa-25-343-01 | Universal Boot Loader (U-Boot) (Update A) | 2025-12-09T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| icsa-25-343-03 | Multiple India-based CCTV Cameras (Update A)** | 2025-12-09T06:00:00.000000Z | 2026-02-05T06:00:00.000000Z |
| icsa-26-043-03 | Siemens COMOS | 2025-12-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-015-12 | Siemens SIMATIC CN 4100 | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-26-015-11 | Siemens RUGGEDCOM ROX II | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-26-015-06 | Siemens SINEC Security Monitor | 2025-12-09T00:00:00.000000Z | 2026-01-14T22:35:44.907344Z |
| icsa-26-015-05 | Siemens RUGGEDCOM ROS | 2025-12-09T00:00:00.000000Z | 2026-01-14T22:35:44.058931Z |
| icsa-26-008-01 | Hitachi Energy Asset Suite | 2025-12-09T00:00:00.000000Z | 2026-01-07T21:26:16.381953Z |
| icsa-25-352-05 | Siemens Interniche IP-Stack | 2025-12-09T00:00:00.000000Z | 2025-12-18T18:13:59.515670Z |
| icsa-25-345-09 | Siemens Gridscale X Prepay | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-08 | Siemens Energy Services | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-07 | Siemens Building X - Security Manager Edge Controller | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-06 | Siemens SINEMA Remote Connect Server | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-05 | Siemens Advanced Licensing (SALT) Toolkit | 2025-12-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-345-04 | Siemens IAM Client | 2025-12-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-338-07 | Advantech iView | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-06 | SolisCloud Monitoring Platform | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-05 | Sunbird DCIM dcTrack and Power IQ | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-04 | Johnson Controls iSTAR | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-03 | Johnson Controls OpenBlue Mobile Web Application for OpenBlue Workplace | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-02 | MAXHUB Pivot | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-01 | Mitsubishi Electric GX Works2 | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsma-25-336-01 | Mirion Medical EC2 Software NMIS BioDose | 2025-12-02T07:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-25-336-02 | Iskra iHUB and iHUB Lite | 2025-12-02T07:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-25-336-01 | Industrial Video & Control Longwatch | 2025-12-02T07:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-25-329-06 | SiRcom SMART Alert (SiSA) | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-05 | Festo Compact Vision System, Control Block, Controller, and Operator Unit products | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-03 | Zenitel TCIV-3+ | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-02 | Rockwell Automation Arena Simulation | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-clamav-udf-hmwd9ndy | ClamAV UDF File Parsing Out-of-Bounds Read Information Disclosure Vulnerability | 2025-06-18T16:00:00+00:00 | 2025-06-18T16:00:00+00:00 |
| cisco-sa-vos-command-inject-65s2ucyy | Cisco Unified Communications Products Command Injection Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ucs-ssh-priv-esc-2mzdtdjm | Cisco Integrated Management Controller Privilege Escalation Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-uccx-multi-uhotvpgl | Cisco Unified Contact Center Express Vulnerabilities | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-uccx-editor-rce-ezyyzte8 | Cisco Unified Contact Center Express Editor Remote Code Execution Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-te-endagent-filewrt-zncdqnrj | Cisco ThousandEyes Endpoint Agent for Windows Arbitrary File Delete Vulnerabilities | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ndfc-shkv-snqjtjrp | Cisco Nexus Dashboard Fabric Controller SSH Host Key Validation Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ise-file-upload-p4m8vwxy | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-23T19:16:21+00:00 |
| cisco-sa-ise-aws-static-cred-fpmjucm7 | Cisco Identity Services Engine on Cloud Platforms Static Credential Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-05T17:26:25+00:00 |
| cisco-sa-icm-xss-cfcqhxag | Cisco Unified Intelligent Contact Management Enterprise Cross-Site Scripting Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ccp-info-disc-zygerqpd | Cisco Customer Collaboration Platform Information Disclosure Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-webex-xss-7teqtfn8 | Cisco Webex Services Cross-Site Scripting Vulnerabilities | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-webex-cache-q4xbkqbg | Cisco Webex Meetings Services HTTP Cache Poisoning Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sna-ssti-dpulqsmz | Cisco Secure Network Analytics Manager Privilege Escalation Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sna-apiacv-4b6x5ysw | Cisco Secure Network Analytics Manager API Authorization Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-ise-stored-xss-yff54m73 | Cisco Identity Services Stored Cross-Site Scripting Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-06-30T15:08:59+00:00 |
| cisco-sa-ise-restart-ss-uf986g2q | Cisco Identity Services Engine RADIUS Denial of Service Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-duo-ssp-cmd-inj-rcmyrna | Cisco Duo Self-Service Portal Command Injection Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-cuis-priv-esc-3pk96su4 | Cisco Unified Intelligence Center Privilege Escalation Vulnerabilities | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-cucm-kkhzbhr5 | Cisco Unified Communications Products Privilege Escalation Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-contcent-insuffacces-ardovhn8 | Cisco Unified Contact Center Enterprise Cloud Connect Insufficient Access Control Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-wlc-wncd-p6gvt6hl | Cisco IOS XE Software for WLC Wireless IPv6 Clients Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-wlc-file-uplpd-rhzg9ufc | Cisco IOS XE Wireless Controller Software Arbitrary File Upload Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-06-06T20:02:48+00:00 |
| cisco-sa-webui-multi-arnhm4v6 | Cisco IOS XE Software Web-Based Management Interface Vulnerabilities | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-webui-cmdinj-gvn3oknc | Cisco IOS XE Software Web-Based Management Interface Command Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-vmanage-xss-xhn8m5jt | Cisco Catalyst SD-WAN Manager Stored Cross-Site Scripting Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-vmanage-html-inj-gxvtk6zj | Cisco Catalyst SD-WAN Manager Reflected HTML Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-twamp-kv4fhugn | Cisco IOS, IOS XE, and IOS XR Software TWAMP Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-snmpv3-qkeyvzsy | Cisco IOS and IOS XE Software SNMPv3 Configuration Restriction Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-snmp-bypass-hhuvujdn | Cisco IOS XE SD-WAN Software Packet Filtering Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-09-22T14:12:28+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-32198 | Microsoft Excel Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32197 | Microsoft Excel Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32196 | Windows Admin Center Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32195 | Windows Kernel Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32192 | Azure Monitor Agent Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32190 | Microsoft Office Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32189 | Microsoft Excel Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32188 | Microsoft Excel Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32184 | Microsoft High Performance Compute (HPC) Pack Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32183 | Windows Snipping Tool Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32181 | Connected User Experiences and Telemetry Service Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32178 | .NET Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32176 | SQL Server Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32172 | Microsoft Power Apps Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-23T07:00:00.000Z |
| msrc_cve-2026-32171 | Azure Logic Apps Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32168 | Azure Monitor Agent Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32167 | SQL Server Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32165 | Windows User Interface Core Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32164 | Windows User Interface Core Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32163 | Windows User Interface Core Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32162 | Windows COM Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32160 | Windows Push Notifications Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32159 | Windows Push Notifications Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32158 | Windows Push Notifications Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32157 | Remote Desktop Client Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32156 | Windows UPnP Device Host Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32155 | Desktop Window Manager Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32154 | Desktop Window Manager Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32153 | Windows Speech Runtime Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32152 | Desktop Window Manager Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0361 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2025-11-11T18:34:39.453615Z | 2025-11-11T18:34:39.453615Z |
| ncsc-2025-0360 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2025-11-11T18:33:13.936830Z | 2025-11-11T18:33:13.936830Z |
| ncsc-2025-0359 | Kwetsbaarheden verholpen in Microsoft Office | 2025-11-11T18:31:27.092072Z | 2025-11-11T18:31:27.092072Z |
| ncsc-2025-0358 | Kwetsbaartheden verholpen in Microsoft Windows | 2025-11-11T18:29:38.918562Z | 2025-11-11T18:29:38.918562Z |
| ncsc-2025-0357 | Kwetsbaarheden verholpen in Siemens producten | 2025-11-11T18:14:44.487803Z | 2025-11-11T18:14:44.487803Z |
| ncsc-2025-0356 | Kwetsbaarheden verholpen in SAP-producten | 2025-11-11T12:15:53.615720Z | 2025-11-11T12:15:53.615720Z |
| ncsc-2025-0355 | Kwetsbaarheden verholpen in Fortinet FortiOS en FortiProxy | 2025-11-07T10:07:28.475542Z | 2025-11-07T10:07:28.475542Z |
| ncsc-2025-0354 | Kwetsbaarheid verholpen in Cisco Identity Services Engine | 2025-11-06T12:36:51.591695Z | 2025-11-06T12:36:51.591695Z |
| ncsc-2025-0353 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-11-04T15:03:48.630084Z | 2025-11-04T15:03:48.630084Z |
| ncsc-2025-0352 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-11-04T12:53:15.358078Z | 2025-11-04T12:53:15.358078Z |
| ncsc-2025-0351 | Kwetsbaarheden verholpen in Apple MacOS | 2025-11-04T12:44:25.439757Z | 2025-11-04T12:44:25.439757Z |
| ncsc-2025-0350 | Kwetsbaarheid verholpen in CFMOTO Ride voertuigdatabeheer systemen | 2025-11-04T10:27:59.187171Z | 2025-11-04T10:27:59.187171Z |
| ncsc-2025-0349 | Kwetsbaarheden verholpen in Nagios XI | 2025-11-03T08:27:42.052256Z | 2025-11-03T08:27:42.052256Z |
| ncsc-2025-0348 | Kwetsbaarheden verholpen in Arista Networks producten | 2025-11-03T08:26:39.905306Z | 2025-11-03T08:26:39.905306Z |
| ncsc-2025-0347 | Kwetsbaarheden verholpen in IBM QRadar SIEM | 2025-11-03T08:17:18.981494Z | 2025-11-03T08:17:18.981494Z |
| ncsc-2025-0346 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2025-11-03T08:14:02.972842Z | 2025-11-03T08:14:02.972842Z |
| ncsc-2025-0345 | Kwetsbaarheden verholpen in Rockwell Automation FactoryTalk | 2025-10-31T09:35:00.469498Z | 2025-10-31T09:35:00.469498Z |
| ncsc-2025-0344 | Kwetsbaarheden verholpen in Rockwell Automation COMMS | 2025-10-31T09:34:05.069339Z | 2025-10-31T09:34:05.069339Z |
| ncsc-2025-0343 | Kwetsbaarheid verholpen in Mozilla Firefox | 2025-10-31T09:31:53.270725Z | 2025-10-31T09:31:53.270725Z |
| ncsc-2025-0342 | Kwetsbaarheden verholpen in GitLab Enterprise en Community Edition | 2025-10-27T08:08:17.974767Z | 2025-10-27T09:38:47.073257Z |
| ncsc-2025-0341 | Kwetsbaarheden verholpen in BIND 9 | 2025-10-24T08:19:45.232307Z | 2025-10-27T08:24:03.796638Z |
| ncsc-2025-0340 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2025-10-23T14:13:39.969386Z | 2025-10-23T14:13:39.969386Z |
| ncsc-2025-0339 | Kwetsbaarheden verholpen in Oracle MySQL | 2025-10-23T14:11:30.111892Z | 2025-10-23T14:11:30.111892Z |
| ncsc-2025-0338 | Kwetsbaarheden verholpen in Oracle JD Edwards EnterpriseOne Tools | 2025-10-23T13:53:27.268400Z | 2025-10-23T13:53:27.268400Z |
| ncsc-2025-0337 | Kwetsbaarheden verholpen in Oracle Java | 2025-10-23T13:51:40.686406Z | 2025-10-23T13:51:40.686406Z |
| ncsc-2025-0336 | Kwetsbaarheden verholpen in Oracle Hyperion | 2025-10-23T13:49:44.344049Z | 2025-10-23T13:49:44.344049Z |
| ncsc-2025-0335 | Kwetsbaarheden verholpen in Oracle Analytics | 2025-10-23T13:45:06.747933Z | 2025-10-23T13:45:06.747933Z |
| ncsc-2025-0334 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2025-10-23T13:42:11.992643Z | 2025-11-21T16:03:18.991100Z |
| ncsc-2025-0333 | Kwetsbaarheden verholpen in Oracle Financial Services | 2025-10-23T13:35:32.902231Z | 2025-10-23T13:35:32.902231Z |
| ncsc-2025-0332 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2025-10-23T13:26:49.210414Z | 2025-10-23T13:26:49.210414Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10502-1 | dcmtk-3.7.0-2.1 on GA media | 2026-04-08T00:00:00Z | 2026-04-08T00:00:00Z |
| opensuse-su-2026:10501-1 | MozillaThunderbird-140.9.1-1.1 on GA media | 2026-04-08T00:00:00Z | 2026-04-08T00:00:00Z |
| opensuse-su-2026:10500-1 | 389-ds-3.1.4+e2562f589-1.1 on GA media | 2026-04-08T00:00:00Z | 2026-04-08T00:00:00Z |
| opensuse-su-2026:20476-1 | Security update for mapserver | 2026-04-07T15:33:59Z | 2026-04-07T15:33:59Z |
| opensuse-su-2026:20471-1 | Security update for systemd | 2026-04-07T15:17:05Z | 2026-04-07T15:17:05Z |
| opensuse-su-2026:20472-1 | Security update for tar | 2026-04-07T14:58:07Z | 2026-04-07T14:58:07Z |
| opensuse-su-2026:20470-1 | Security update for libtasn1 | 2026-04-07T14:33:05Z | 2026-04-07T14:33:05Z |
| opensuse-su-2026:20469-1 | Security update for cockpit-packages | 2026-04-07T13:03:46Z | 2026-04-07T13:03:46Z |
| opensuse-su-2026:20465-1 | Security update for tigervnc | 2026-04-07T12:21:55Z | 2026-04-07T12:21:55Z |
| opensuse-su-2026:20468-1 | Security update for python-cbor2 | 2026-04-07T11:57:38Z | 2026-04-07T11:57:38Z |
| opensuse-su-2026:20466-1 | Security update for libpng16 | 2026-04-07T11:57:38Z | 2026-04-07T11:57:38Z |
| opensuse-su-2026:20473-1 | Security update for osslsigncode | 2026-04-07T07:50:40Z | 2026-04-07T07:50:40Z |
| opensuse-su-2026:10499-1 | python311-social-auth-app-django-5.7.0-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10498-1 | libeverest-3.6.6-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10497-1 | heroic-games-launcher-2.20.1-5.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10496-1 | git-cliff-2.12.0-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10495-1 | ckermit-9.0.302-20.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10494-1 | SDL2_image-devel-2.8.10-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:20464-1 | Security update for cockpit-repos | 2026-04-05T02:50:21Z | 2026-04-05T02:50:21Z |
| opensuse-su-2026:10493-1 | SDL3_image-devel-3.4.2-1.1 on GA media | 2026-04-05T00:00:00Z | 2026-04-05T00:00:00Z |
| opensuse-su-2026:10492-1 | liblzma5-32bit-5.8.3-1.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10491-1 | python311-scitokens-1.8.1-2.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10490-1 | python311-aiohttp-3.13.5-2.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10489-1 | libinput-devel-1.31.1-1.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10488-1 | corosync-3.1.10-4.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10487-1 | chromedriver-146.0.7680.177-1.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10486-1 | amazon-ssm-agent-3.3.4121.0-1.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:20460-1 | Security update for chromium | 2026-04-03T06:09:23Z | 2026-04-03T06:09:23Z |
| opensuse-su-2026:10485-1 | python311-Flask-Cors-6.0.2-1.1 on GA media | 2026-04-03T00:00:00Z | 2026-04-03T00:00:00Z |
| opensuse-su-2026:10484-1 | k6-1.7.1-1.1 on GA media | 2026-04-03T00:00:00Z | 2026-04-03T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:12310 | Red Hat Security Advisory: sudo security update | 2026-04-30T15:53:24+00:00 | 2026-05-07T02:29:00+00:00 |
| rhsa-2026:12339 | Red Hat Security Advisory: OpenEXR security update | 2026-04-30T15:26:09+00:00 | 2026-04-30T21:35:10+00:00 |
| rhsa-2026:12341 | Red Hat Security Advisory: OpenEXR security update | 2026-04-30T14:34:33+00:00 | 2026-04-30T21:35:11+00:00 |
| rhsa-2026:12340 | Red Hat Security Advisory: OpenEXR security update | 2026-04-30T14:33:24+00:00 | 2026-04-30T21:35:11+00:00 |
| rhsa-2026:12271 | Red Hat Security Advisory: libtiff security update | 2026-04-30T14:22:48+00:00 | 2026-05-08T02:25:23+00:00 |
| rhsa-2026:12194 | Red Hat Security Advisory: Red Hat JBoss Web Server 6.2.2 release and security update | 2026-04-30T14:02:58+00:00 | 2026-04-30T21:34:38+00:00 |
| rhsa-2026:12195 | Red Hat Security Advisory: Red Hat JBoss Web Server 6.2.2 release and security update | 2026-04-30T13:58:23+00:00 | 2026-05-05T17:49:47+00:00 |
| rhsa-2026:12285 | Red Hat Security Advisory: thunderbird security update | 2026-04-30T13:55:03+00:00 | 2026-05-04T21:18:50+00:00 |
| rhsa-2026:12337 | Red Hat Security Advisory: Assisted Installer RHEL 9 components for Multicluster Engine for Kubernetes 2.11.1 | 2026-04-30T13:40:21+00:00 | 2026-05-09T08:54:44+00:00 |
| rhsa-2026:10096 | Red Hat Security Advisory: OpenShift Container Platform 4.16.60 packages and security update | 2026-04-30T12:29:03+00:00 | 2026-05-09T03:03:12+00:00 |
| rhsa-2026:12265 | Red Hat Security Advisory: libtiff security update | 2026-04-30T12:26:28+00:00 | 2026-05-08T02:25:50+00:00 |
| rhsa-2026:10097 | Red Hat Security Advisory: OpenShift Container Platform 4.16.60 bug fix and security update | 2026-04-30T12:11:28+00:00 | 2026-05-09T02:37:28+00:00 |
| rhsa-2026:12264 | Red Hat Security Advisory: thunderbird security update | 2026-04-30T11:51:53+00:00 | 2026-05-07T21:42:16+00:00 |
| rhsa-2026:12279 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.19.15 security, enhancement & bug fix update | 2026-04-30T11:36:26+00:00 | 2026-05-09T08:54:41+00:00 |
| rhsa-2026:10104 | Red Hat Security Advisory: OpenShift Container Platform 4.16.60 bug fix and security update | 2026-04-30T11:31:34+00:00 | 2026-05-09T08:54:23+00:00 |
| rhsa-2026:12277 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.20.10 security, enhancement & bug fix update | 2026-04-30T11:25:14+00:00 | 2026-05-09T08:54:40+00:00 |
| rhsa-2026:12267 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.24 security update | 2026-04-30T11:14:58+00:00 | 2026-05-05T14:02:16+00:00 |
| rhsa-2026:12269 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.24 security update | 2026-04-30T11:09:52+00:00 | 2026-05-05T14:02:16+00:00 |
| rhsa-2026:10105 | Red Hat Security Advisory: OpenShift Container Platform 4.16.60 security and extras update | 2026-04-30T10:57:19+00:00 | 2026-05-09T08:54:23+00:00 |
| rhsa-2026:12176 | Red Hat Security Advisory: fence-agents security update | 2026-04-30T10:22:28+00:00 | 2026-05-06T15:01:44+00:00 |
| rhsa-2026:12220 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-30T09:30:23+00:00 | 2026-05-04T14:56:54+00:00 |
| rhsa-2026:12115 | Red Hat Security Advisory: gdk-pixbuf2 security update | 2026-04-30T07:20:04+00:00 | 2026-04-30T16:32:38+00:00 |
| rhsa-2026:12114 | Red Hat Security Advisory: gdk-pixbuf2 security update | 2026-04-30T07:13:52+00:00 | 2026-04-30T16:32:39+00:00 |
| rhsa-2026:12116 | Red Hat Security Advisory: Assisted Installer RHEL 9 components for Multicluster Engine for Kubernetes 2.10.2 | 2026-04-30T06:52:26+00:00 | 2026-05-09T08:54:40+00:00 |
| rhsa-2026:12062 | Red Hat Security Advisory: gdk-pixbuf2 security update | 2026-04-30T05:01:04+00:00 | 2026-04-30T16:32:38+00:00 |
| rhsa-2026:12061 | Red Hat Security Advisory: gdk-pixbuf2 security update | 2026-04-30T04:55:59+00:00 | 2026-04-30T16:32:39+00:00 |
| rhsa-2026:12060 | Red Hat Security Advisory: gdk-pixbuf2 security update | 2026-04-30T04:55:53+00:00 | 2026-04-30T16:32:37+00:00 |
| rhsa-2026:12033 | Red Hat Security Advisory: gvisor-tap-vsock security update | 2026-04-30T03:35:28+00:00 | 2026-05-09T08:54:39+00:00 |
| rhsa-2026:12032 | Red Hat Security Advisory: containernetworking-plugins security update | 2026-04-30T03:33:54+00:00 | 2026-05-09T08:54:39+00:00 |
| rhsa-2026:12030 | Red Hat Security Advisory: buildah security update | 2026-04-30T03:33:47+00:00 | 2026-05-09T08:54:39+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2021-348-02 | EVlink City / Parking / Smart Wallbox Charging Stations | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sevd-2021-348-01 | IGSS (Interactive Graphical SCADA System) | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sesb-2021-347-01 | Apache Log4j Vulnerabilities (Log4Shell) | 2021-12-13T09:22:58.000Z | 2022-08-09T09:22:58.000Z |
| sevd-2021-313-04 | Windows Print Spooler embedded in EcoStruxure™ Process Expert | 2021-11-09T08:45:48.000Z | 2022-03-08T08:45:48.000Z |
| sevd-2021-313-03 | APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices | 2021-11-09T06:30:00.000Z | 2022-05-10T00:00:00.00Z |
| sevd-2021-313-05 | BadAlloc Vulnerabilities | 2021-11-09T05:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2021-313-07 | Eurotherm GUIcon | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-313-02 | Schneider Electric Software Update | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-313-01 | SCADAPack 300E Series RTU | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-285-05 | Conext™ Advisor & Conext™ Control V2 | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-04 | Modicon M218 Logic Controller | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-03 | IGSS (Interactive Graphical SCADA System) | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-02 | ConneXium Network Manager (CNM) Software | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-01 | spaceLYnk, Wiser For KNX, fellerLYnk | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-257-02 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Premium and Associated Communication Modules | 2021-09-14T20:04:00.000Z | 2023-02-14T20:04:43.000Z |
| sevd-2021-257-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ for x70 | 2021-09-14T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2021-257-03 | StruxureWare Data Center Expert | 2021-09-14T00:00:00.000Z | 2021-09-14T00:00:00.000Z |
| sevd-2021-222-04 | Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert | 2021-08-10T02:27:39.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-222-06 | CODESYS V2 Vulnerabilities in Programmable Automation Controller (PacDrive) M | 2021-08-10T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2021-222-05 | AccuSine PCSn/PCS+/PFV+ | 2021-08-10T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2021-222-03 | Pro-face GP-Pro EX | 2021-08-10T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2021-217-01 | NicheStack TCP/IP Vulnerabilities (INFRA:HALT) in Lexium ILE, ILA, ILS, and Communication Option Boards for Altivar and Lexium32 drives | 2021-08-05T06:29:08.000Z | 2023-05-09T06:29:00.000Z |
| sevd-2021-222-02 | AT&T Labs Compressor (XMilI) and Decompressor (XDemill) used by EcoStruxureTM Control Expert, EcoStruxureTM Process Expert and SCADAPack RemoteConnect™ for x70 | 2021-08-01T07:25:51.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2021-194-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ x70, and Modicon Controllers M580 and M340 | 2021-07-13T08:22:02.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-194-05 | Easergy T200 | 2021-07-13T00:00:00.000Z | 2021-07-13T00:00:00.000Z |
| sevd-2021-194-04 | C-Bus Toolkit | 2021-07-13T00:00:00.000Z | 2021-07-13T00:00:00.000Z |
| sevd-2021-194-03 | SoSafe Configurable | 2021-07-13T00:00:00.000Z | 2021-07-13T00:00:00.000Z |
| sevd-2021-159-04 | ISaGRAF Vulnerabilities in IEC 61131-3 Programming and Engineering Tools | 2021-06-08T04:36:25.000Z | 2025-11-15T00:00:00.000Z |
| sevd-2021-159-03 | PowerLogic EGX100 and PowerLogicEGX300 | 2021-06-08T00:00:00.000Z | 2021-06-08T00:00:00.000Z |
| sevd-2021-159-02 | PowerLogic PM5500 and PowerLogic PM8ECC | 2021-06-08T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-824503 | SSA-824503: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation Before V2302.0018 and V2404.0007 | 2024-11-18T00:00:00Z | 2024-11-18T00:00:00Z |
| ssa-472448 | SSA-472448: Security Bypass Vulnerability in the SQL Client-Server Communication in Siveillance Video | 2024-11-13T00:00:00Z | 2024-11-13T00:00:00Z |
| ssa-915275 | SSA-915275: Multiple Vulnerabilities in SINEC INS Before V1.0 SP2 Update 3 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-914892 | SSA-914892: Race Condition Vulnerability in Basic Authentication Implementation of Mendix Runtime | 2024-11-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-871035 | SSA-871035: Session-Memory Deserialization Vulnerability in Siemens Engineering Platforms Before V19 | 2024-11-12T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-654798 | SSA-654798: Incorrect Authorization Vulnerability in SIMATIC CP 1543-1 Devices | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-616032 | SSA-616032: Local Privilege Escalation Vulnerability in Spectrum Power 7 Before V24Q3 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-454789 | SSA-454789: Deserialization Vulnerability in TeleControl Server Basic V3.1 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-354112 | SSA-354112: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.2 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-351178 | SSA-351178: Multiple Vulnerabilities in Solid Edge Before SE2024 Update 9 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-331112 | SSA-331112: Multiple Vulnerabilities in SINEC NMS Before V3.0 SP1 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-230445 | SSA-230445: Stored XSS Vulnerability in OZW Web Servers Before V5.2 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-064257 | SSA-064257: Privilege Escalation Vulnerability in SIPORT Before V3.4.0 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-000297 | SSA-000297: Multiple SQLite Vulnerabilities in RUGGEDCOM CROSSBOW Station Access Controller Before V5.6 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-333468 | SSA-333468: Multiple Vulnerabilities in InterMesh Subscriber Devices | 2024-10-23T00:00:00Z | 2024-10-23T00:00:00Z |
| ssa-438590 | SSA-438590: Buffer Overflow Vulnerability in Siveillance Video Camera Drivers | 2024-10-10T00:00:00Z | 2024-10-10T00:00:00Z |
| ssa-959281 | SSA-959281: XML File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-876787 | SSA-876787: Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-852501 | SSA-852501: Multiple Memory Corruption Vulnerabilities in Simcenter Nastran Before 2406.5000 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-850560 | SSA-850560: Use of 4-Digit PIN in SENTRON PAC3200 Devices | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-626178 | SSA-626178: Stack-Based Buffer Overflow Vulnerability in JT2Go Before V2406.0003 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-583523 | SSA-583523: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2024-10-08T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-540493 | SSA-540493: Kiosk Mode Escape Vulnerability in HiMed Cockpit Devices Before V11.6.2 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-430425 | SSA-430425: Multiple Vulnerabilities in SINEC Security Monitor before V4.9.0 | 2024-10-08T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-426509 | SSA-426509: Multiple Local Code Execution Vulnerabilities in Questa and ModelSim | 2024-10-08T00:00:00Z | 2025-06-17T00:00:00Z |
| ssa-368868 | SSA-368868: Multiple Vulnerabilities in WibuKey for Windows | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-340240 | SSA-340240: Denial of Service Vulnerability in SIRIUS 3RV2921-5M | 2024-10-08T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-254396 | SSA-254396: Vulnerability in Nozomi Guardian/CMC Before 24.3.1 on RUGGEDCOM APE1808 Devices | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-054046 | SSA-054046: Unauthenticated Information Disclosure in Web Server of SIMATIC S7-1500 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-969738 | SSA-969738: Denial of Service Vulnerability in SIMATIC S7-200 SMART Devices | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21448-1 | Security update for sed | 2026-04-27T17:15:37Z | 2026-04-27T17:15:37Z |
| suse-su-2026:1637-1 | Security update for strongswan | 2026-04-27T16:59:38Z | 2026-04-27T16:59:38Z |
| suse-su-2026:1636-1 | Security update for fontforge | 2026-04-27T16:55:27Z | 2026-04-27T16:55:27Z |
| suse-su-2026:21407-1 | Security update for mariadb | 2026-04-27T14:02:32Z | 2026-04-27T14:02:32Z |
| suse-su-2026:21447-1 | Security update for python311 | 2026-04-27T12:47:02Z | 2026-04-27T12:47:02Z |
| suse-su-2026:21445-1 | Security update for avahi | 2026-04-27T12:41:42Z | 2026-04-27T12:41:42Z |
| suse-su-2026:21446-1 | Security update for freeipmi | 2026-04-27T12:27:43Z | 2026-04-27T12:27:43Z |
| suse-su-2026:1635-1 | Security update for freerdp | 2026-04-27T12:06:35Z | 2026-04-27T12:06:35Z |
| suse-su-2026:1634-1 | Security update for freerdp | 2026-04-27T12:06:21Z | 2026-04-27T12:06:21Z |
| suse-su-2026:1633-1 | Security update for freerdp | 2026-04-27T12:05:30Z | 2026-04-27T12:05:30Z |
| suse-su-2026:1632-1 | Security update for freerdp | 2026-04-27T12:04:30Z | 2026-04-27T12:04:30Z |
| suse-su-2026:21455-1 | Security update for openCryptoki | 2026-04-27T12:00:49Z | 2026-04-27T12:00:49Z |
| suse-su-2026:21405-1 | Security update for container-suseconnect | 2026-04-27T11:20:43Z | 2026-04-27T11:20:43Z |
| suse-su-2026:1631-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 15 SP7) | 2026-04-27T08:04:29Z | 2026-04-27T08:04:29Z |
| suse-su-2026:1630-1 | Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) | 2026-04-27T08:04:19Z | 2026-04-27T08:04:19Z |
| suse-su-2026:1629-1 | Security update for the Linux Kernel (Live Patch 70 for SUSE Linux Enterprise 12 SP5) | 2026-04-25T08:33:50Z | 2026-04-25T08:33:50Z |
| suse-su-2026:1622-1 | Security update for the Linux Kernel (Live Patch 25 for SUSE Linux Enterprise 15 SP5) | 2026-04-25T04:04:34Z | 2026-04-25T04:04:34Z |
| suse-su-2026:1621-1 | Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5) | 2026-04-24T18:33:52Z | 2026-04-24T18:33:52Z |
| suse-su-2026:21404-1 | Security update for bouncycastle | 2026-04-24T15:54:52Z | 2026-04-24T15:54:52Z |
| suse-su-2026:1618-1 | Security update for dnsdist | 2026-04-24T14:25:54Z | 2026-04-24T14:25:54Z |
| suse-su-2026:1617-1 | Security update for cups | 2026-04-24T14:25:14Z | 2026-04-24T14:25:14Z |
| suse-su-2026:1611-1 | Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5) | 2026-04-24T14:05:51Z | 2026-04-24T14:05:51Z |
| suse-su-2026:1613-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6) | 2026-04-24T13:34:09Z | 2026-04-24T13:34:09Z |
| suse-su-2026:21412-1 | Security update for Mesa | 2026-04-24T13:11:17Z | 2026-04-24T13:11:17Z |
| suse-su-2026:21440-1 | Security update for ovmf | 2026-04-24T13:08:28Z | 2026-04-24T13:08:28Z |
| suse-su-2026:1608-1 | Security update for python-ecdsa | 2026-04-24T11:51:39Z | 2026-04-24T11:51:39Z |
| suse-su-2026:1607-1 | Security update for vim | 2026-04-24T11:50:57Z | 2026-04-24T11:50:57Z |
| suse-su-2026:1606-1 | Security update for the Linux Kernel | 2026-04-24T11:50:23Z | 2026-04-24T11:50:23Z |
| suse-su-2026:1605-1 | Security update for openssl-3 | 2026-04-24T11:48:58Z | 2026-04-24T11:48:58Z |
| suse-su-2026:1604-1 | Security update for tomcat | 2026-04-24T11:48:42Z | 2026-04-24T11:48:42Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:6390 | Moderate: rsync security update | 2026-04-01T00:00:00Z | 2026-04-02T09:23:33Z |
| alsa-2026:6388 | Important: grafana-pcp security update | 2026-04-01T00:00:00Z | 2026-04-03T10:02:10Z |
| alsa-2026:6383 | Important: grafana-pcp security update | 2026-04-01T00:00:00Z | 2026-04-02T09:15:46Z |
| alsa-2026:6382 | Important: grafana security update | 2026-04-01T00:00:00Z | 2026-04-02T09:12:36Z |
| alsa-2026:6344 | Important: grafana security update | 2026-04-01T00:00:00Z | 2026-04-03T09:56:37Z |
| alsa-2026:6342 | Important: thunderbird security update | 2026-04-01T00:00:00Z | 2026-04-01T11:59:47Z |
| alsa-2026:6340 | Important: freerdp security update | 2026-04-01T00:00:00Z | 2026-04-02T09:09:13Z |
| alsa-2026:6301 | Important: squid security update | 2026-03-31T00:00:00Z | 2026-04-01T09:27:45Z |
| alsa-2026:6300 | Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update | 2026-03-31T00:00:00Z | 2026-04-03T17:13:38Z |
| alsa-2026:6286 | Important: python3.11 security update | 2026-03-31T00:00:00Z | 2026-04-01T09:15:24Z |
| alsa-2026:6285 | Important: python3.12 security update | 2026-03-31T00:00:00Z | 2026-04-01T09:07:09Z |
| alsa-2026:6283 | Important: python3.12 security update | 2026-03-31T00:00:00Z | 2026-04-01T08:56:58Z |
| alsa-2026:6281 | Important: python3.11 security update | 2026-03-31T00:00:00Z | 2026-04-01T08:52:26Z |
| alsa-2026:6266 | Moderate: libxslt security update | 2026-03-31T00:00:00Z | 2026-04-01T09:19:08Z |
| alsa-2026:6259 | Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update | 2026-03-31T00:00:00Z | 2026-04-03T09:45:31Z |
| alsa-2026:6256 | Important: python3.12 security update | 2026-03-31T00:00:00Z | 2026-04-01T09:23:35Z |
| alsa-2026:6188 | Important: thunderbird security update | 2026-03-30T00:00:00Z | 2026-04-02T08:18:50Z |
| alsa-2026:6153 | Moderate: kernel security update | 2026-03-30T00:00:00Z | 2026-04-02T08:46:53Z |
| alsa-2026:6053 | Moderate: kernel security update | 2026-03-30T00:00:00Z | 2026-04-03T09:23:17Z |
| alsa-2026:6037 | Moderate: kernel security update | 2026-03-30T00:00:00Z | 2026-03-30T10:55:07Z |
| alsa-2026:6036 | Moderate: kernel-rt security update | 2026-03-30T00:00:00Z | 2026-03-30T10:51:16Z |
| alsa-2026:6005 | Important: freerdp security update | 2026-03-30T00:00:00Z | 2026-04-02T09:00:17Z |
| alsa-2026:6004 | Important: freerdp security update | 2026-03-30T00:00:00Z | 2026-03-31T08:19:51Z |
| alsa-2026:5942 | Important: golang security update | 2026-03-26T00:00:00Z | 2026-03-27T10:17:44Z |
| alsa-2026:5941 | Important: golang security update | 2026-03-26T00:00:00Z | 2026-03-27T10:26:32Z |
| alsa-2026:5939 | Important: freerdp security update | 2026-03-26T00:00:00Z | 2026-03-27T10:28:32Z |
| alsa-2026:5932 | Important: firefox security update | 2026-03-26T00:00:00Z | 2026-03-30T10:46:04Z |
| alsa-2026:5931 | Important: firefox security update | 2026-03-26T00:00:00Z | 2026-03-30T10:43:43Z |
| alsa-2026:5930 | Important: firefox security update | 2026-03-26T00:00:00Z | 2026-03-30T11:00:48Z |
| alsa-2026:5913 | Moderate: ncurses security update | 2026-03-26T00:00:00Z | 2026-03-27T10:30:59Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-614 | Heap-buffer-overflow in hevc_hvcC_to_AnnexB_NAL | 2025-08-12T00:00:36.634849Z | 2025-08-12T00:00:36.635239Z |
| osv-2025-613 | Heap-buffer-overflow in check_sync_pes | 2025-08-12T00:00:33.354786Z | 2025-08-12T00:00:33.355391Z |
| osv-2025-608 | Heap-buffer-overflow in _dwarf_memcpy_noswap_bytes | 2025-08-09T00:02:00.092320Z | 2025-08-11T14:17:56.957704Z |
| osv-2025-600 | Heap-buffer-overflow in generic_unpack | 2025-08-05T00:10:00.536266Z | 2025-08-05T00:10:00.536669Z |
| osv-2025-597 | Heap-buffer-overflow in generic_unpack | 2025-08-04T00:08:26.345735Z | 2025-08-04T00:08:26.346368Z |
| osv-2025-593 | Heap-buffer-overflow in mmcall | 2025-08-02T00:16:19.626747Z | 2025-12-20T14:30:41.473113Z |
| osv-2025-591 | UNKNOWN READ in mov_read_header | 2025-08-02T00:02:00.509459Z | 2025-08-02T00:02:00.510035Z |
| osv-2025-589 | Heap-buffer-overflow in isvcd_decode_recon_tfr_nmb_base_lyr | 2025-08-01T00:10:54.848946Z | 2025-08-01T00:10:54.849286Z |
| osv-2025-584 | Heap-buffer-overflow in isvcd_mark_err_slice_skip | 2025-07-31T00:09:08.538145Z | 2025-07-31T00:09:08.538507Z |
| osv-2025-580 | UNKNOWN READ in signed char Assimp::StreamReader<false, false>::Get<signed char> | 2025-07-29T00:16:41.422221Z | 2026-04-30T14:29:31.343013Z |
| osv-2025-570 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-07-23T00:17:34.356115Z | 2025-07-23T00:17:34.356449Z |
| osv-2025-565 | Heap-buffer-overflow in pcpp::IPv6Address::IPv6Address | 2025-07-21T00:09:57.314960Z | 2025-12-22T14:22:23.333531Z |
| osv-2025-564 | Heap-buffer-overflow in ndpi_match_host_subprotocol | 2025-07-21T00:03:40.000875Z | 2025-07-21T00:03:40.001170Z |
| osv-2025-550 | Use-of-uninitialized-value in CFF::cff2_cs_opset_t<cff2_cs_opset_subr_subset_t, CFF::subr_subset_param_t, CFF: | 2025-07-16T00:09:08.050994Z | 2025-07-16T00:09:08.051469Z |
| osv-2025-547 | Security exception in com.alibaba.fastjson2.JSONReader.readArray | 2025-07-15T00:09:03.936493Z | 2026-02-07T14:17:37.720783Z |
| osv-2025-544 | Heap-buffer-overflow in N_BELE_RTP::LEPolicy::get32 | 2025-07-11T00:16:53.687776Z | 2025-07-11T00:16:53.688703Z |
| osv-2025-542 | Use-of-uninitialized-value in httpEncode64_3 | 2025-07-10T00:07:45.698070Z | 2025-07-10T00:07:45.698655Z |
| osv-2025-541 | Heap-buffer-overflow in js_create_function | 2025-07-09T00:20:09.455729Z | 2025-07-09T00:20:09.456170Z |
| osv-2025-538 | Heap-double-free in policydb_destroy | 2025-07-09T00:05:37.052433Z | 2025-12-20T14:25:14.356814Z |
| osv-2025-534 | Heap-use-after-free in ih264_inter_pred_luma_horz_ssse3 | 2025-07-08T00:08:11.218515Z | 2025-07-08T00:08:11.218991Z |
| osv-2025-530 | Invalid-free in cli_pdf | 2025-07-07T00:17:21.884018Z | 2025-07-07T00:17:21.884367Z |
| osv-2025-528 | Heap-buffer-overflow in xmlnode_parser_structural_error_libxml | 2025-07-07T00:10:42.902465Z | 2025-07-07T00:10:42.902766Z |
| osv-2025-525 | UNKNOWN READ in std::__1::__function::__func<cv::PngDecoder::compose_frame | 2025-07-06T00:18:54.304371Z | 2025-07-06T00:18:54.304891Z |
| osv-2025-524 | Heap-buffer-overflow in JS_CallInternal | 2025-07-05T00:19:21.758513Z | 2025-07-05T00:19:21.758880Z |
| osv-2025-515 | Use-of-uninitialized-value in JS_DefineProperty | 2025-07-03T00:16:17.481972Z | 2025-07-03T00:16:17.482410Z |
| osv-2025-512 | Invalid-free in pdf_decodestream | 2025-07-03T00:00:40.745577Z | 2025-07-03T00:00:40.746200Z |
| osv-2025-500 | UNKNOWN READ in getUShort | 2025-06-29T00:08:49.553890Z | 2025-06-29T00:08:49.554520Z |
| osv-2025-491 | Heap-buffer-overflow in libssl.soNUMBER | 2025-06-27T00:16:09.822144Z | 2025-06-27T00:16:09.822510Z |
| osv-2025-486 | Bad-cast to cv::PngDecoder from invalid vptr | 2025-06-24T00:16:24.786334Z | 2025-06-24T00:16:24.786690Z |
| osv-2025-485 | Use-of-uninitialized-value in pcpp::IDnsResource::decodeName | 2025-06-24T00:11:04.762139Z | 2025-06-24T00:11:04.762681Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0091 | `unic-utils` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0090 | `unic-emoji-char` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0089 | `unic-ucd-name_aliases` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0088 | `unic-idna-punycode` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0087 | `unic-cli` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0086 | `unic-char` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0085 | `unic-idna` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0084 | `unic-emoji` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0083 | `unic-ucd-bidi` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0082 | `unic-normal` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0081 | `unic-char-property` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0080 | `unic-common` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0079 | `unic-ucd-hangul` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0078 | `unic-ucd-normal` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0077 | `unic-ucd` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0076 | `unic-ucd-name` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0075 | `unic-char-range` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-22T14:41:04Z |
| rustsec-2025-0074 | `unic-segment` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0073 | DoS vulnerability on `alloy_dyn_abi::TypedData` hashing | 2025-10-15T12:00:00Z | 2025-10-15T13:11:39Z |
| rustsec-2025-0072 | soundness issue and unmaintained | 2025-10-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0071 | Incorrect handling of embedded SVG and MathML leads to mutation XSS after removal | 2025-09-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0070 | Pingora MadeYouReset HTTP/2 vulnerability | 2025-09-17T12:00:00Z | 2025-09-18T07:10:31Z |
| rustsec-2025-0069 | `daemonize` is Unmaintained | 2025-09-14T12:00:00Z | 2025-09-15T14:42:32Z |
| rustsec-2025-0068 | serde_yml crate is unsound and unmaintained | 2025-09-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0067 | `libyml::string::yaml_string_extend` is unsound and unmaintained | 2025-09-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0065 | matrix-sdk-base: Panic in the `RoomMember::normalized_power_level()` method | 2025-09-11T12:00:00Z | 2025-09-11T12:21:52Z |
| rustsec-2025-0000 | matrix-sdk-base: Panic in the `RoomMember::normalized_power_level()` method | 2025-09-11T12:00:00Z | 2025-09-11T12:10:54Z |
| rustsec-2025-0066 | The `google-apis-rs` project is now unmaintained | 2025-09-09T12:00:00Z | 2025-09-11T16:34:38Z |
| rustsec-2025-0061 | iron crate is unmaintained | 2025-09-08T12:00:00Z | 2025-09-08T09:09:54Z |
| rustsec-2025-0060 | crypto-hash crate is unmaintained | 2025-09-08T12:00:00Z | 2025-09-08T09:09:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-jre-2020-2803 | 2026-05-08T05:43:43.528Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2800 | 2026-05-08T05:43:42.068Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2781 | 2026-05-08T05:43:40.437Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2778 | 2026-05-08T05:43:38.855Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2773 | 2026-05-08T05:43:37.408Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2767 | 2026-05-08T05:43:35.862Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2757 | 2026-05-08T05:43:34.438Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2756 | 2026-05-08T05:43:33.125Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2755 | 2026-05-08T05:43:31.714Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2754 | 2026-05-08T05:43:30.218Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2659 | 2026-05-08T05:43:28.757Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2655 | 2026-05-08T05:43:27.139Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2654 | 2026-05-08T05:43:25.570Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2604 | 2026-05-08T05:43:24.013Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2601 | 2026-05-08T05:43:22.521Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2593 | 2026-05-08T05:43:21.153Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2590 | 2026-05-08T05:43:19.541Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2585 | 2026-05-08T05:43:17.957Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2583 | 2026-05-08T05:43:16.191Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-14803 | 2026-05-08T05:43:14.537Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-14798 | 2026-05-08T05:43:13.086Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-14797 | 2026-05-08T05:43:11.396Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-14796 | 2026-05-08T05:43:09.799Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-14792 | 2026-05-08T05:43:08.322Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-14782 | 2026-05-08T05:43:06.866Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-14781 | 2026-05-08T05:43:05.510Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-14779 | 2026-05-08T05:43:03.952Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-14664 | 2026-05-08T05:43:02.418Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-14621 | 2026-05-08T05:43:00.944Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-14593 | 2026-05-08T05:42:59.535Z | 2026-05-08T06:11:36.072Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ck64127 | Security fixes for ghsa-6rw7-vpxm-498p, ghsa-73rr-hh4g-fpgx, ghsa-8qq5-rm4j-mr97, ghsa-wqch-xfxh-vrr4 applied in versions: 4.2.1.1-r1 | 2026-04-01T10:06:15.177169Z | 2026-03-06T11:36:37Z |
| cleanstart-2026-fn55648 | Security fixes for CVE-2025-25285, CVE-2026-21637, ghsa-23c5-xmqv-rm74, ghsa-72xf-g2v4-qvf3, ghsa-7r86-cg39-jmmj, ghsa-fj3w-jwp8-x2g3, ghsa-pfrx-2q88-qq97, ghsa-rc47-6667-2j5j, ghsa-rmvr-2pp2-xj38 applied in versions: 2.6.0-r1, 2.7.0-r0 | 2026-04-01T10:06:10.961683Z | 2026-03-06T13:00:09Z |
| cleanstart-2026-qx99194 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:06:00.100216Z | 2026-03-07T09:08:53Z |
| cleanstart-2026-pr27884 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:52.407214Z | 2026-03-07T09:10:08Z |
| cleanstart-2026-lu31244 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:46.726872Z | 2026-03-07T09:10:59Z |
| cleanstart-2026-jr53141 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:46.660054Z | 2026-03-07T09:11:28Z |
| cleanstart-2026-ff20499 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0 | 2026-04-01T10:04:06.598747Z | 2026-03-09T11:52:12Z |
| cleanstart-2026-ar56257 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 1.0.16-r0 | 2026-04-01T10:03:58.074474Z | 2026-03-07T09:14:16Z |
| cleanstart-2026-bf73214 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 1.0.17-r0 | 2026-04-01T10:03:56.655073Z | 2026-03-07T09:14:49Z |
| cleanstart-2026-df22934 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, ghsa-6v2p-p543-phr9, ghsa-f6x5-jh6r-wrfv, ghsa-hcg3-q754-cr77, ghsa-j5w8-q4qc-rx2x, ghsa-qxp5-gwg8-xv66, ghsa-v778-237x-gjrc, ghsa-vvgc-356p-c3xw applied in versions: 0.28.0-r0, 0.28.0-r1 | 2026-04-01T10:03:39.072806Z | 2026-03-09T13:31:49Z |
| cleanstart-2026-ew27017 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.10.0-r0, 1.10.0-r1 | 2026-04-01T10:03:13.124366Z | 2026-03-09T13:26:38Z |
| cleanstart-2026-ds01292 | Security fixes for CVE-2025-47910, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2026-24051, CVE-2026-27141, ghsa-9h8m-3fm2-qjrq applied in versions: 1.19.1-r0, 1.19.2-r0, 1.19.2-r1 | 2026-04-01T10:03:13.135534Z | 2026-03-10T06:29:01Z |
| cleanstart-2026-fo41609 | Security fixes for CVE-2025-48924, ghsa-22h5-pq3x-2gf2, ghsa-33mh-2634-fwr2, ghsa-4cx2-fc23-5wg6, ghsa-6xw4-3v39-52mm, ghsa-72hv-8253-57qq, ghsa-72qj-48g4-5xgx, ghsa-c2f4-jgmc-q2r5, ghsa-gh9q-2xrm-x6qv, ghsa-j288-q9x7-2f5v, ghsa-j4pr-3wm6-xx2r, ghsa-mhwm-jh88-3gjf, ghsa-mr3q-g2mv-mr4q, ghsa-p543-xpfm-54cp, ghsa-vc5p-v9hr-52mj, ghsa-vqg5-3255-v292, ghsa-w9pc-fmgc-vxvw, ghsa-wpv5-97wm-hp9c applied in versions: 8.19.12-r0, 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-04-01T10:02:50.908381Z | 2026-03-10T06:14:42Z |
| cleanstart-2026-jo97977 | Security fixes for ghsa-22h5-pq3x-2gf2, ghsa-33mh-2634-fwr2, ghsa-4cx2-fc23-5wg6, ghsa-6xw4-3v39-52mm, ghsa-72hv-8253-57qq, ghsa-72qj-48g4-5xgx, ghsa-c2f4-jgmc-q2r5, ghsa-gh9q-2xrm-x6qv, ghsa-j4pr-3wm6-xx2r, ghsa-mhwm-jh88-3gjf, ghsa-mr3q-g2mv-mr4q, ghsa-p543-xpfm-54cp, ghsa-vc5p-v9hr-52mj, ghsa-vqg5-3255-v292, ghsa-w9pc-fmgc-vxvw, ghsa-wpv5-97wm-hp9c applied in versions: 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-04-01T10:02:43.649563Z | 2026-03-10T06:18:32Z |
| cleanstart-2026-fz71456 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 1.0.18-r0 | 2026-04-01T10:02:32.121585Z | 2026-03-10T06:07:45Z |
| cleanstart-2026-al75891 | Security fixes for CVE-2026-24051, ghsa-9h8m-3fm2-qjrq applied in versions: 1.19.2-r0 | 2026-04-01T10:02:21.610635Z | 2026-03-10T06:30:49Z |
| cleanstart-2026-jk38734 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121 applied in versions: 1.80.1-r1 | 2026-04-01T10:02:16.597211Z | 2026-03-10T06:53:47Z |
| cleanstart-2026-ei44621 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.27.4-r0, 1.27.4-r1, 1.27.7-r0 | 2026-04-01T10:02:07.249071Z | 2026-03-10T11:28:54Z |
| cleanstart-2026-bm51903 | Security fixes for CVE-2015-20107, CVE-2015-2104, CVE-2019-16056, CVE-2019-16935, CVE-2019-20907, CVE-2019-5010, CVE-2020-14422, CVE-2020-8492, CVE-2021-23336, CVE-2021-29921, CVE-2021-3177, CVE-2022-45061, CVE-2023-27043, CVE-2024-6232, CVE-2024-6923, CVE-2025-59375 applied in versions: 3.10.5-r0, 3.11.1-r0, 3.11.5-r0, 3.12.12-r0, 3.12.3-r2, 3.12.6-r0, 3.6.8-r1, 3.7.5-r0, 3.8.2-r0, 3.8.4-r0, 3.8.5-r0, 3.8.7-r2, 3.8.8-r0, 3.9.4-r0, 3.9.5-r0 | 2026-04-01T10:02:05.179897Z | 2026-03-10T11:38:44Z |
| cleanstart-2026-lu81821 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.28.3-r1 | 2026-04-01T10:02:04.894450Z | 2026-03-10T11:29:14Z |
| cleanstart-2026-dr75226 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.2-r1 | 2026-04-01T10:01:44.354704Z | 2026-03-10T12:28:42Z |
| cleanstart-2026-pp64690 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-1229, CVE-2026-25934, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-q9hv-hpm4-hj6x applied in versions: 0.20.4-r1, 0.20.4-r2, 0.20.4-r3 | 2026-04-01T10:01:43.950159Z | 2026-03-10T11:34:26Z |
| cleanstart-2026-iy77127 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.29.0-r0 | 2026-04-01T10:01:36.492383Z | 2026-03-10T11:31:41Z |
| cleanstart-2026-pm59896 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729 applied in versions: 1.41.1-r0, 1.41.1-r1 | 2026-04-01T10:00:44.608929Z | 2026-03-11T05:51:53Z |
| cleanstart-2026-mk01488 | Security fixes for CVE-2025-15558, CVE-2025-61729, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-27141, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-9h8m-3fm2-qjrq, ghsa-fv92-fjc5-jj9h, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p applied in versions: 3.6.16-r0, 3.7.10-r0, 3.7.10-r1, 3.7.10-r2, 3.7.10-r3, 3.7.10-r4, 3.7.4-r0, 3.7.9-r0 | 2026-04-01T10:00:43.919294Z | 2026-03-10T12:46:44Z |
| cleanstart-2026-bb17877 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.87.1-r0, 0.89.0-r0 | 2026-04-01T10:00:31.981994Z | 2026-03-11T05:53:58Z |
| cleanstart-2026-lz54652 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729 applied in versions: 1.7.0-r0, 1.7.1-r0 | 2026-04-01T10:00:12.081449Z | 2026-03-11T07:18:17Z |
| cleanstart-2026-jw58725 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2x5j-vhc8-9cwm, ghsa-2xsj-vh29-9cwm, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r, ghsa-r6j8-c6r2-37rr applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.0.22-r0, 3.0.23-r0, 3.0.23-r1, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4 | 2026-04-01T10:00:01.222759Z | 2026-03-11T10:01:48Z |
| cleanstart-2026-ju62670 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2x5j-vhc8-9cwm, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2gw2-vh5m, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-c6gw-w398-hv78, ghsa-cfpf-hrx2-8rv6, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-jgfp-53c3-624w, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r, ghsa-pwhc-rpq9-4c8w, ghsa-r6j8-c6r2-37rr, ghsa-vv39-3w5q-974q applied in versions: 2.13.9-r0, 2.14.20-r0, 2.14.20-r1, 3.0.16-r0, 3.0.19-r0, 3.0.20-r2, 3.0.21-r0, 3.0.21-r1, 3.1.4-r0, 3.1.8.-r0 | 2026-04-01T10:00:01.931332Z | 2026-03-11T10:03:00Z |
| cleanstart-2026-np19113 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.10-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4 | 2026-04-01T09:59:46.805882Z | 2026-03-11T10:03:22Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2020-ALE-018 | Vulnérabilité dans Cisco ASA et FTD | 2020-07-28T00:00:00.000000 | 2020-11-05T00:00:00.000000 |
| certfr-2020-ale-017 | Multiples vulnérabilités dans SAP Netweaver AS JAVA | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| certfr-2020-ale-016 | Vulnérabilité dans Microsoft Domain Name System (DNS) Server | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| CERTFR-2020-ALE-017 | Multiples vulnérabilités dans SAP Netweaver AS JAVA | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| CERTFR-2020-ALE-016 | Vulnérabilité dans Microsoft Domain Name System (DNS) Server | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| certfr-2020-ale-015 | Vulnérabilité dans F5 BIG-IP | 2020-07-05T00:00:00.000000 | 2020-09-15T00:00:00.000000 |
| CERTFR-2020-ALE-015 | Vulnérabilité dans F5 BIG-IP | 2020-07-05T00:00:00.000000 | 2020-09-15T00:00:00.000000 |
| certfr-2020-ale-014 | Vulnérabilité dans Palo Alto Networks PAN-OS | 2020-07-03T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-014 | Vulnérabilité dans Palo Alto Networks PAN-OS | 2020-07-03T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-013 | Multiples vulnérabilités dans Microsoft Windows | 2020-07-01T00:00:00.000000 | 2020-07-05T00:00:00.000000 |
| CERTFR-2020-ALE-013 | Multiples vulnérabilités dans Microsoft Windows | 2020-07-01T00:00:00.000000 | 2020-07-05T00:00:00.000000 |
| certfr-2020-ale-012 | Multiples vulnérabilités dans SaltStack | 2020-05-04T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-012 | Multiples vulnérabilités dans SaltStack | 2020-05-04T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-011 | Multiples vulnérabilités dans les produits Microsoft qui utilisent la bibliothèque Autodesk FBX | 2020-04-22T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| CERTFR-2020-ALE-011 | Multiples vulnérabilités dans les produits Microsoft qui utilisent la bibliothèque Autodesk FBX | 2020-04-22T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-ale-010 | Multiples vulnérabilités dans Mozilla Firefox | 2020-04-06T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| CERTFR-2020-ALE-010 | Multiples vulnérabilités dans Mozilla Firefox | 2020-04-06T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-009 | Multiples vulnérabilités dans Microsoft Windows | 2020-03-24T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| CERTFR-2020-ALE-009 | Multiples vulnérabilités dans Microsoft Windows | 2020-03-24T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-ale-008 | Vulnérabilité dans l'implémentation du protocole SMB par Microsoft | 2020-03-11T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-008 | Vulnérabilité dans l'implémentation du protocole SMB par Microsoft | 2020-03-11T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-007 | Vulnérabilité dans Microsoft Exchange Server | 2020-02-27T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| CERTFR-2020-ALE-007 | Vulnérabilité dans Microsoft Exchange Server | 2020-02-27T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2020-01-20T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| CERTFR-2020-ALE-006 | Vulnérabilité dans Microsoft Internet Explorer | 2020-01-20T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-ale-005 | Multiples vulnérabilités dans le serveur de passerelle RDP de Windows | 2020-01-14T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-ale-004 | Vulnérabilité dans Microsoft Windows | 2020-01-14T00:00:00.000000 | 2020-01-17T00:00:00.000000 |
| CERTFR-2020-ALE-005 | Multiples vulnérabilités dans le serveur de passerelle RDP de Windows | 2020-01-14T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| CERTFR-2020-ALE-004 | Vulnérabilité dans Microsoft Windows | 2020-01-14T00:00:00.000000 | 2020-01-17T00:00:00.000000 |
| certfr-2020-ale-003 | Vulnérabilité dans les produits Mozilla | 2020-01-09T00:00:00.000000 | 2020-01-20T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0372 | Multiples vulnérabilités dans les produits IBM | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0371 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0370 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0369 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0368 | Vulnérabilité dans les produits Microsoft | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0367 | Multiples vulnérabilités dans Zabbix | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0366 | Multiples vulnérabilités dans Traefik | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0365 | Multiples vulnérabilités dans Spring AI | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0364 | Multiples vulnérabilités dans les produits Siemens | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0363 | Multiples vulnérabilités dans les produits NetApp | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0362 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0361 | Multiples vulnérabilités dans Cisco IOS et IOS XE | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0360 | Multiples vulnérabilités dans ISC BIND | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0359 | Multiples vulnérabilités dans Grafana | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0358 | Vulnérabilité dans Citrix XenServer | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0357 | Multiples vulnérabilités dans GitLab | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0356 | Vulnérabilité dans ISC Kea | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0355 | Multiples vulnérabilités dans les produits Apple | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0354 | Multiples vulnérabilités dans les produits Mozilla | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0353 | Multiples vulnérabilités dans Zabbix | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0352 | Multiples vulnérabilités dans les produits F5 | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0351 | Vulnérabilité dans Tenable OT Platform | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0350 | Multiples vulnérabilités dans Squid | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0349 | Multiples vulnérabilités dans Ruby on Rails | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0348 | Vulnérabilité dans Trend Micro Deep Discovery Inspector | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0347 | Vulnérabilité dans Xen | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0346 | Vulnérabilité dans VMware Tanzu pour Postgres | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0345 | Vulnérabilité dans LibreNMS | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0344 | Vulnérabilité dans strongSwan | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0343 | Vulnérabilité dans Spring Cloud Config | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-011884 | FUJIFILM Healthcare Americas Synapse Mobility vulnerable to Privilege Escalation | 2025-08-21T11:49+09:00 | 2025-08-25T10:38+09:00 |
| jvndb-2025-000061 | Multiple vulnerabilities in Movable Type | 2025-08-20T15:30+09:00 | 2025-08-20T15:30+09:00 |
| jvndb-2025-000060 | PgManage vulnerable to injection | 2025-08-18T13:40+09:00 | 2025-08-18T13:40+09:00 |
| jvndb-2025-000059 | Seagate Toolkit registers a Windows service with an unquoted file path | 2025-08-14T12:32+09:00 | 2025-08-19T14:40+09:00 |
| jvndb-2025-000058 | WordPress plugin "Advanced Custom Fields" vulnerable to HTML injection | 2025-08-08T15:29+09:00 | 2025-08-08T15:29+09:00 |
| jvndb-2025-010972 | Multiple SEIKO EPSON products use weak initial passwords | 2025-08-08T14:50+09:00 | 2025-08-08T14:50+09:00 |
| jvndb-2025-000057 | Multiple vulnerabilities in Mubit Powered BLUE 870 | 2025-08-08T14:47+09:00 | 2025-08-08T14:47+09:00 |
| jvndb-2025-010854 | Trend Micro Endpoint security products for enterprises vulnerable to multiple OS command injection | 2025-08-07T12:25+09:00 | 2025-08-19T11:36+09:00 |
| jvndb-2025-000056 | Multiple vulnerabilities in Sato label printers CL4/6NX Plus and CL4/6NX-J Plus series | 2025-08-06T16:38+09:00 | 2025-08-06T16:38+09:00 |
| jvndb-2025-010603 | Out-of-bounds write vulnerability in FUJIFILM Business Innovation MFPs | 2025-08-05T11:29+09:00 | 2025-08-05T11:29+09:00 |
| jvndb-2025-010408 | Multiple vulnerabilities in PowerCMS | 2025-08-01T12:05+09:00 | 2025-08-01T12:05+09:00 |
| jvndb-2025-000055 | ZXHN-F660T and ZXHN-F660A use a common credential for all installations | 2025-07-31T15:12+09:00 | 2025-07-31T15:12+09:00 |
| jvndb-2025-000054 | Apache Jena Fuseki vulnerable to path traversal | 2025-07-30T14:17+09:00 | 2025-07-30T14:17+09:00 |
| jvndb-2025-000053 | "SwitchBot" App vulnerable to insertion of sensitive information into log file | 2025-07-29T13:44+09:00 | 2025-07-29T13:44+09:00 |
| jvndb-2025-010056 | TP-Link VIGI NVR1104H-4P and VIGI NVR2016H-16MP vulnerable to OS command injection | 2025-07-28T17:53+09:00 | 2025-07-28T17:53+09:00 |
| jvndb-2025-000052 | TP-Link Archer C1200 vulnerable to clickjacking | 2025-07-24T14:16+09:00 | 2025-07-24T14:16+09:00 |
| jvndb-2025-000051 | Real-time Bus Tracking System vulnerable to improper validation of specified quantity in input | 2025-07-23T13:54+09:00 | 2025-07-23T13:54+09:00 |
| jvndb-2025-009576 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2025-07-23T11:13+09:00 | 2025-07-23T11:13+09:00 |
| jvndb-2025-000050 | "region PAY" App for Android vulnerable to insertion of sensitive information into log file | 2025-07-22T13:33+09:00 | 2025-07-22T13:33+09:00 |
| jvndb-2025-009150 | Security updates for Trend Micro products (June 2025) | 2025-07-17T17:03+09:00 | 2025-07-17T17:03+09:00 |
| jvndb-2025-000049 | ZWX-2000CSW2-HN and ZWX-2000CS2-HN vulnerable to use of hard-coded credentials | 2025-07-16T13:54+09:00 | 2025-07-16T13:54+09:00 |
| jvndb-2025-008881 | Least Privilege Violation Vulnerability in the communications functions of NJ/NX series Machine Automation Controllers | 2025-07-15T15:54+09:00 | 2025-07-15T15:54+09:00 |
| jvndb-2025-008783 | Firebox T15 contains an issue with hidden functionality | 2025-07-14T17:22+09:00 | 2025-07-14T17:22+09:00 |
| jvndb-2025-008145 | Epson Web Installer for Mac vulnerable to missing authentication for critical function | 2025-07-08T14:08+09:00 | 2025-07-08T14:08+09:00 |
| jvndb-2025-008106 | Heap-based buffer overflow vulnerability in V-SFT and TELLUS | 2025-07-07T16:26+09:00 | 2025-07-07T16:26+09:00 |
| jvndb-2025-008105 | Windows shortcut following (.LNK) vulnerability in Trend Micro Security for Windows (CVE-2025-52521) | 2025-07-07T16:04+09:00 | 2025-07-07T16:04+09:00 |
| jvndb-2025-000047 | Multiple vulnerabilities in Nimesa Backup and Recovery | 2025-07-07T15:26+09:00 | 2025-07-07T15:26+09:00 |
| jvndb-2025-007978 | Multiple vulnerabilities in Trend Micro Password Manager for Windows (CVE-2025-48443, CVE-2025-52837) | 2025-07-04T13:28+09:00 | 2025-07-04T13:28+09:00 |
| jvndb-2025-000045 | Multiple vulnerabilities in Active! mail | 2025-07-02T14:13+09:00 | 2025-07-02T14:13+09:00 |
| jvndb-2025-007754 | Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS) | 2025-07-02T11:31+09:00 | 2025-07-02T11:31+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-17277 | Dell AppSync权限提升漏洞(CNVD-2026-17277) | 2026-04-10 | 2026-04-15 |
| cnvd-2026-17263 | Discourse跨站脚本漏洞(CNVD-2026-17263) | 2026-04-10 | 2026-04-16 |
| cnvd-2026-17262 | Discourse授权问题漏洞(CNVD-2026-17262) | 2026-04-10 | 2026-04-16 |
| cnvd-2026-17261 | Discourse代码问题漏洞(CNVD-2026-17261) | 2026-04-10 | 2026-04-16 |
| cnvd-2026-17260 | Discourse输入验证错误漏洞(CNVD-2026-17260) | 2026-04-10 | 2026-04-16 |
| cnvd-2026-17259 | Discourse授权问题漏洞(CNVD-2026-17259) | 2026-04-10 | 2026-04-16 |
| cnvd-2026-17258 | Discourse信息泄露漏洞(CNVD-2026-17258) | 2026-04-10 | 2026-04-16 |
| cnvd-2026-17257 | Discourse信息泄露漏洞(CNVD-2026-17257) | 2026-04-10 | 2026-04-15 |
| cnvd-2026-17256 | Discourse信息泄露漏洞(CNVD-2026-17256) | 2026-04-10 | 2026-04-15 |
| cnvd-2026-17255 | Discourse信息泄露漏洞(CNVD-2026-17255) | 2026-04-10 | 2026-04-15 |
| cnvd-2026-17254 | Discourse授权问题漏洞(CNVD-2026-17254) | 2026-04-10 | 2026-04-15 |
| cnvd-2026-17253 | Discourse跨站脚本漏洞(CNVD-2026-17253) | 2026-04-10 | 2026-04-15 |
| cnvd-2026-17250 | Discourse信息泄露漏洞(CNVD-2026-17250) | 2026-04-10 | 2026-04-15 |
| cnvd-2026-17249 | Discourse信息泄露漏洞(CNVD-2026-17249) | 2026-04-10 | 2026-04-15 |
| cnvd-2026-17248 | Discourse跨站脚本漏洞 | 2026-04-10 | 2026-04-15 |
| cnvd-2026-17187 | OpenClaw存在未明漏洞(CNVD-2026-17187) | 2026-04-10 | 2026-04-15 |
| cnvd-2026-17186 | OpenClaw存在未明漏洞(CNVD-2026-17186) | 2026-04-10 | 2026-04-15 |
| cnvd-2026-17185 | OpenClaw存在未明漏洞(CNVD-2026-17185) | 2026-04-10 | 2026-04-15 |
| cnvd-2026-17184 | OpenClaw存在未明漏洞(CNVD-2026-17184) | 2026-04-10 | 2026-04-15 |
| cnvd-2026-17183 | OpenClaw存在未明漏洞(CNVD-2026-17183) | 2026-04-10 | 2026-04-15 |
| cnvd-2026-17182 | OpenClaw存在未明漏洞(CNVD-2026-17182) | 2026-04-10 | 2026-04-14 |
| cnvd-2026-17161 | Linux kernel缓冲区溢出漏洞(CNVD-2026-17161) | 2026-04-10 | 2026-04-10 |
| cnvd-2026-16874 | IBM Aspera Shares输入验证错误漏洞(CNVD-2026-16874) | 2026-04-10 | 2026-04-10 |
| cnvd-2026-16873 | IBM Aspera Shares加密问题漏洞(CNVD-2026-16873) | 2026-04-10 | 2026-04-10 |
| cnvd-2026-16872 | IBM Aspera Shares访问控制错误漏洞 | 2026-04-10 | 2026-04-10 |
| cnvd-2026-16871 | Google Chrome WebGL组件内存错误引用漏洞 | 2026-04-10 | 2026-04-10 |
| cnvd-2026-16870 | Google Chrome WebCodecs组件越界读取漏洞 | 2026-04-10 | 2026-04-10 |
| cnvd-2026-16869 | Google Chrome WebCodecs组件内存错误引用漏洞 | 2026-04-10 | 2026-04-10 |
| cnvd-2026-16868 | Google Chrome Web MIDI组件内存错误引用漏洞 | 2026-04-10 | 2026-04-10 |
| cnvd-2026-16867 | Google Chrome PDF组件内存错误引用漏洞 | 2026-04-10 | 2026-04-10 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01534 | Уязвимость функции smtcfb_write() модуля drivers/video/fbdev/sm712fb.c драйвера поддержки… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01533 | Уязвимость функции mt8183_da7219_max98357_dev_probe() модуля sound/soc/mediatek/mt8183/mt… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01532 | Уязвимость функции qla2x00_bsg_job_done() модуля drivers/scsi/qla2xxx/qla_bsg.c драйвера … | 10.02.2026 | 10.02.2026 |
| bdu:2026-01531 | Уязвимость функции __udf_iget() модуля fs/udf/inode.c файловой системы ядра операционной … | 10.02.2026 | 10.02.2026 |
| bdu:2026-01530 | Уязвимость функции mt7601u_rx_next_seg_len() модуля drivers/net/wireless/mediatek/mt7601u… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01529 | Уязвимость функции lio_target_nacl_info_show() модуля drivers/target/iscsi/iscsi_target_c… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01528 | Уязвимость функции bnxt_get_nvram_directory() модуля drivers/net/ethernet/broadcom/bnxt/b… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01527 | Уязвимость функции ext4_iget_extra_inode() модуля fs/ext4/inode.c файловой системы Ext4 я… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01526 | Уязвимость функции ieee80211_probe_client() модуля net/mac80211/cfg.c реализации стека ma… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01525 | Уязвимость функции brcmf_c_preinit_dcmds() модуля drivers/net/wireless/broadcom/brcm80211… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01524 | Уязвимость функции prepare_to_relocate() ядра операционной системы Linux, позволяющая нар… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01523 | Уязвимость функций lpfc_debugfs_multixripools_write() и lpfc_debugfs_nvmestat_write() ядр… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01522 | Уязвимость функции raid5_end_write_request() ядра операционной системы Linux, позволяющая… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01521 | Уязвимость функций ext4_mb_clear_bb() и ext4_free_blocks() ядра операционной системы Linu… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01520 | Уязвимость функции usb_udc_uevent() ядра операционной системы Linux, позволяющая нарушите… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01516 | Уязвимость функции convert___skb_to_skb() ядра операционной системы Linux, позволяющая на… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01515 | Уязвимость операционной системы HPE Alletra, системы хранения данных HPE Nimble Storage A… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01514 | Уязвимость функции optc1_enable_optc_clock() ядра операционной системы Linux, позволяющая… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01510 | Уязвимость функции __ieee80211_scan_completed() ядра операционной системы Linux, позволяю… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01509 | Уязвимость функций nilfs_relax_pressure_in_lock() и nilfs_construct_segment() ядра операц… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01508 | Уязвимость функции cpe_mime_handlers() микропрограммного обеспечения маршрутизаторов Link… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01507 | Уязвимость функции ntfs_read_inode_mount() ядра операционной системы Linux, позволяющая н… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01506 | Уязвимость функции formSetWanDiag() микропрограммного обеспечения маршрутизаторов Tenda G… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01505 | Уязвимость функции null_init_tag_set() модуля drivers/block/null_blk/main.c драйвера блоч… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01504 | Уязвимость функции pot_hole() ядра операционной системы Linux, позволяющая нарушителю ока… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01503 | Уязвимость функции usbnet_probe () модуля drivers/net/usb/usbnet.c драйвера сетевых адапт… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01502 | Уязвимость функции bcmgenet_desc_rx() модуля drivers/net/ethernet/broadcom/genet/bcmgenet… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01501 | Уязвимость функции snd_pcm_oss_period_size() ядра операционной системы Linux, позволяющая… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01500 | Уязвимость функции sja1105_table_delete_entry() модуля drivers/net/dsa/sja1105/sja1105_st… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01499 | Уязвимость функции jfs_link() модуля fs/jfs/namei.c файловой системы JFS ядра операционно… | 09.02.2026 | 09.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201106-0026 | Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.181.22 on Wind… | 2024-07-23T22:03:48.916000Z |
| var-202005-1028 | A malicious actor who intentionally exploits this lack of effective limitation on the num… | 2024-07-23T22:03:40.061000Z |
| var-201911-1619 | Improper invalidation for page table updates by a virtual guest operating system for mult… | 2024-07-23T22:03:40.870000Z |
| var-201505-0337 | The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorit… | 2024-07-23T22:03:40.995000Z |
| var-201912-0533 | This issue was addressed with improved transparency. This issue is fixed in iOS 12.2. A u… | 2024-07-23T22:03:39.534000Z |
| var-201908-0265 | Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a … | 2024-07-23T22:03:39.695000Z |
| var-200103-0056 | Network Dynamic Data Exchange (DDE) in Windows 2000 allows local users to gain SYSTEM pri… | 2024-07-23T22:03:07.478000Z |
| var-202109-1368 | A type confusion issue was addressed with improved state handling. This issue is fixed in… | 2024-07-23T22:03:02.962000Z |
| var-200609-1249 | The Security Framework in Apple Mac OS X 10.3.9, and 10.4.x before 10.4.7, does not prope… | 2024-07-23T22:03:02.065000Z |
| var-201904-1344 | Multiple memory corruption issues were addressed with improved input validation. This iss… | 2024-07-23T22:03:00.873000Z |
| var-202108-2039 | A logic issue was addressed with improved state management. This issue is fixed in macOS … | 2024-07-23T22:02:34.481000Z |
| var-201006-1259 | Double free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 1… | 2024-07-23T22:02:34.562000Z |
| var-201707-0592 | Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre att… | 2024-07-23T22:02:33.954000Z |
| var-201109-0190 | Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allow… | 2024-07-23T22:02:33.523000Z |
| var-200803-0016 | CFNetwork in Apple Mac OS X 10.4.11 allows remote HTTPS proxy servers to spoof secure web… | 2024-07-23T22:01:55.420000Z |
| var-201912-1850 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:01:51.188000Z |
| var-200609-1027 | Buffer overflow in PPP on Apple Mac OS X 10.4.x up to 10.4.8 and 10.3.x up to 10.3.9, whe… | 2024-07-23T22:01:14.362000Z |
| var-201904-1408 | A memory corruption issue was addressed with improved state management. This issue affect… | 2024-07-23T22:01:11.971000Z |
| var-202201-0372 | lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. The vu… | 2024-07-23T22:01:10.106000Z |
| var-200612-0136 | Buffer overflow in the glob implementation (glob.c) in libc in NetBSD-current before 2005… | 2024-07-23T22:01:10.008000Z |
| var-201609-0593 | Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.… | 2024-07-23T22:01:08.857000Z |
| var-201304-0375 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:01:08.426000Z |
| var-201210-0270 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:01:08.344000Z |
| var-200603-0279 | Directory traversal vulnerability in the BOM framework in Mac OS X 10.x before 10.3.9 and… | 2024-07-23T22:01:08.748000Z |
| var-201904-1397 | An input validation issue was addressed with improved input validation. This issue affect… | 2024-07-23T22:01:07.123000Z |
| var-200704-0213 | load_webdav in Apple Mac OS X 10.3.9 through 10.4.9 does not properly clean the environme… | 2024-07-23T22:00:36.528000Z |
| var-201711-0480 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T21:59:32.421000Z |
| var-200102-0030 | The Web interface to Cisco 600 routers running CBOS 2.4.1 and earlier allow remote attack… | 2024-07-23T21:59:32.267000Z |
| var-202207-0381 | A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.20.0, <18.5… | 2024-07-23T21:59:00.866000Z |
| var-201801-1708 | The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before… | 2024-07-23T21:58:56.016000Z |