Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-4289 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Tiandy Easy7 Integrated Management Platform getRecByTe… |
Tiandy |
Easy7 Integrated Management Platform |
2026-03-17T00:03:10.717Z | 2026-03-17T13:32:52.355Z |
| CVE-2026-32393 |
7.5 (3.1)
|
WordPress Greenly Theme Addons plugin < 8.2 - Local Fi… |
Creatives_Planet |
Greenly Theme Addons |
2026-03-13T11:42:10.976Z | 2026-03-17T13:30:15.377Z |
| CVE-2026-32401 |
7.2 (3.1)
|
WordPress Client Invoicing by Sprout Invoices plugin <… |
BoldGrid |
Client Invoicing by Sprout Invoices |
2026-03-13T11:42:12.509Z | 2026-03-17T13:28:39.690Z |
| CVE-2026-2579 |
7.5 (3.1)
|
WowStore – Store Builder & Product Blocks for WooComme… |
wpxpo |
WowStore – Store Builder & Product Blocks for WooCommerce |
2026-03-17T01:24:28.737Z | 2026-03-17T13:27:36.715Z |
| CVE-2026-0708 |
8.3 (3.1)
|
Libucl: libucl: denial of service via embedded null by… |
libucl |
libucl |
2026-03-17T02:28:08.429Z | 2026-03-17T13:26:47.057Z |
| CVE-2026-4307 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
frdel/agent0ai agent-zero files.py get_abs_path path t… |
frdel |
agent-zero |
2026-03-17T03:32:07.609Z | 2026-03-17T13:25:49.019Z |
| CVE-2026-2373 |
5.3 (3.1)
|
Royal Addons for Elementor – Addons and Templates Kit … |
wproyal |
Royal Addons for Elementor – Addons and Templates Kit for Elementor |
2026-03-17T03:36:25.155Z | 2026-03-17T13:25:15.811Z |
| CVE-2026-4308 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
frdel/agent0ai agent-zero document_query.py handle_pdf… |
frdel |
agent-zero |
2026-03-17T04:02:07.980Z | 2026-03-17T13:22:56.803Z |
| CVE-2026-4258 |
7.5 (3.1)
|
All versions of the package sjcl are vulnerable t… |
n/a |
sjcl |
2026-03-17T05:00:04.199Z | 2026-03-17T13:22:11.049Z |
| CVE-2026-4173 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
CodePhiliaX Chat2DB Database Export DMDBManage.java up… |
CodePhiliaX |
Chat2DB |
2026-03-15T09:02:08.163Z | 2026-03-17T13:20:49.751Z |
| CVE-2026-3237 |
2.3 (4.0)
|
In affected versions of Octopus Server it was pos… |
Octopus Deploy |
Octopus Server |
2026-03-17T06:37:59.369Z | 2026-03-17T13:20:24.029Z |
| CVE-2026-4285 |
5.1 (4.0)
2.7 (3.1)
2.7 (3.0)
|
taoofagi easegen-admin Pdf2MdUtil.java recognizeMarkdo… |
taoofagi |
easegen-admin |
2026-03-16T23:32:42.192Z | 2026-03-17T13:20:20.802Z |
| CVE-2026-4312 |
9.3 (4.0)
9.8 (3.1)
|
DrangSoft|GCB/FCB Audit Software - Missing Authentication |
DrangSoft |
GCB/FCB Audit Software |
2026-03-17T07:29:17.331Z | 2026-03-17T13:19:44.908Z |
| CVE-2026-32405 |
5.3 (3.1)
|
WordPress WoodMart theme <= 8.3.9 - Sensitive Data Exp… |
xtemos |
WoodMart |
2026-03-13T11:42:13.263Z | 2026-03-17T13:18:27.006Z |
| CVE-2026-1323 |
5.2 (4.0)
|
Insecure Deserialization in extension "Mailqueue" (mai… |
TYPO3 |
Extension "Mailqueue" |
2026-03-17T08:33:05.160Z | 2026-03-17T13:18:18.900Z |
| CVE-2026-4202 |
2.3 (4.0)
|
Broken Access Control in extension "Redirect Tab" |
TYPO3 |
Extension "Redirect Tabs" |
2026-03-17T08:33:40.968Z | 2026-03-17T13:17:40.134Z |
| CVE-2026-4208 |
7.7 (4.0)
|
Authentication Bypass in extension "E-Mail MFA Provide… |
TYPO3 |
Extension "E-Mail MFA Provider" |
2026-03-17T08:34:52.141Z | 2026-03-17T13:17:07.532Z |
| CVE-2026-32415 |
5 (3.1)
|
WordPress Squeeze plugin <= 1.7.7 - Directory Traversa… |
Bogdan Bendziukov |
Squeeze |
2026-03-13T11:42:15.203Z | 2026-03-17T13:13:32.052Z |
| CVE-2026-4271 |
5.3 (3.1)
|
Libsoup: libsoup: denial of service via use-after-free… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-17T11:14:21.284Z | 2026-03-17T13:04:28.101Z |
| CVE-2026-3634 |
3.9 (3.1)
|
Libsoup: libsoup: http header injection and response s… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-17T09:44:19.631Z | 2026-03-17T13:03:07.736Z |
| CVE-2026-3632 |
3.9 (3.1)
|
Libsoup: libsoup: http smuggling and server-side reque… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-17T09:44:19.758Z | 2026-03-17T13:02:07.183Z |
| CVE-2026-3633 |
3.9 (3.1)
|
Libsoup: libsoup: header and http request injection vi… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-17T09:44:19.794Z | 2026-03-17T12:59:56.047Z |
| CVE-2026-32586 |
5.3 (3.1)
|
WordPress Booster for WooCommerce plugin < 7.11.3 - Br… |
Pluggabl |
Booster for WooCommerce |
2026-03-17T08:24:13.299Z | 2026-03-17T12:58:30.886Z |
| CVE-2025-31966 |
2.7 (3.1)
|
Boolean-Based SQL Injection in Multiple Unica Components |
HCL |
Sametime |
2026-03-17T11:29:21.144Z | 2026-03-17T12:57:24.795Z |
| CVE-2025-62320 |
4.7 (3.1)
|
HTML Injection Leading to Data Exfiltration to Externa… |
HCL |
Sametime |
2026-03-17T12:02:08.881Z | 2026-03-17T12:56:51.604Z |
| CVE-2026-32745 |
6.3 (3.1)
|
In JetBrains Datalore before 2026.1 session hijac… |
JetBrains |
Datalore |
2026-03-13T15:50:04.434Z | 2026-03-17T12:54:07.103Z |
| CVE-2025-62319 |
9.8 (3.1)
|
Boolean-Based SQL Injection in Multiple Unica Components |
HCL |
Unica |
2026-03-16T15:30:52.165Z | 2026-03-17T12:53:56.374Z |
| CVE-2026-32775 |
7.4 (3.1)
|
libexif through 0.6.25 has a flaw in decoding Mak… |
libexif |
libexif |
2026-03-16T06:31:36.015Z | 2026-03-17T12:53:49.253Z |
| CVE-2026-3082 |
7.8 (3.0)
|
GStreamer JPEG Parser Heap-based Buffer Overflow Remot… |
GStreamer |
GStreamer |
2026-03-13T20:39:33.772Z | 2026-03-17T12:53:18.085Z |
| CVE-2025-54920 |
N/A
|
Apache Spark: Spark History Server Code Execution Vuln… |
Apache Software Foundation |
Apache Spark |
2026-03-14T09:01:50.486Z | 2026-03-17T12:45:29.903Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-25772 |
4.9 (3.1)
|
Wazuh Database Synchronization Vulnerable to Stack-bas… |
wazuh |
wazuh |
2026-03-17T18:11:05.707Z | 2026-03-17T18:55:55.613Z |
| CVE-2026-25771 |
5.3 (3.1)
|
Wazuh Vulnerable to Denial of Service via Synchronous … |
wazuh |
wazuh |
2026-03-17T18:08:53.091Z | 2026-03-17T18:08:53.091Z |
| CVE-2026-25769 |
9.1 (3.1)
|
Wazuh Cluster vulnerable to Remote Code Execution via … |
wazuh |
wazuh |
2026-03-17T17:41:08.640Z | 2026-03-17T18:19:36.652Z |
| CVE-2026-21570 |
8.6 (4.0)
|
This High severity RCE (Remote Code Execution) v… |
Atlassian |
Bamboo Data Center |
2026-03-17T18:00:00.907Z | 2026-03-17T18:21:46.118Z |
| CVE-2026-30868 |
6.3 (3.1)
|
Cross-Site Request Forgery (CSRF) in opnsense/core |
opnsense |
core |
2026-03-11T16:38:12.883Z | 2026-03-11T17:20:20.867Z |
| CVE-2026-32627 |
8.7 (3.1)
|
cpp-httplib has a Silent TLS Certificate Verification … |
yhirose |
cpp-httplib |
2026-03-13T20:48:14.442Z | 2026-03-16T15:41:05.578Z |
| CVE-2026-31853 |
5.7 (3.1)
|
ImageMagick has a heap buffer over-write on 32-bit sys… |
ImageMagick |
ImageMagick |
2026-03-11T17:09:46.196Z | 2026-03-11T17:42:31.029Z |
| CVE-2026-30226 |
6.3 (4.0)
|
devalue has prototype pollution in devalue.parse and d… |
sveltejs |
devalue |
2026-03-11T17:47:40.016Z | 2026-03-12T13:51:34.208Z |
| CVE-2026-31861 |
8.7 (4.0)
|
Shell Command Injection in Git Routes [CloudCLI UI] |
siteboon |
claudecodeui |
2026-03-11T17:22:10.111Z | 2026-03-12T14:07:17.766Z |
| CVE-2026-32630 |
5.3 (3.1)
|
file-type affected by ZIP Decompression Bomb DoS via [… |
sindresorhus |
file-type |
2026-03-13T20:54:16.960Z | 2026-03-16T16:59:36.473Z |
| CVE-2026-31862 |
9.1 (3.1)
|
Cloud CLI has Command Injection via Multiple Parameters |
siteboon |
claudecodeui |
2026-03-11T17:17:47.941Z | 2026-03-12T14:22:04.149Z |
| CVE-2024-8776 |
6.1 (3.1)
|
INTUMIT SmartRobot - Cross-site Scripting |
INTUMIT |
SmartRobot |
2024-09-16T05:39:59.200Z | 2024-09-16T13:06:09.757Z |
| CVE-2026-32704 |
6.5 (3.1)
|
SiYuan renderSprig: missing admin check allows any use… |
siyuan-note |
siyuan |
2026-03-13T21:10:36.613Z | 2026-03-16T16:46:59.090Z |
| CVE-2026-32729 |
8.1 (3.1)
|
Runtipi has a TOTP two-factor authentication bypass vi… |
runtipi |
runtipi |
2026-03-13T21:41:11.699Z | 2026-03-16T20:22:43.613Z |
| CVE-2024-2413 |
9.8 (3.1)
|
Intumit SmartRobot - Use of Hard-coded Cryptographic Key |
Intumit |
SmartRobot |
2024-03-13T02:51:10.886Z | 2025-04-15T15:24:41.891Z |
| CVE-2026-2923 |
7.8 (3.0)
|
GStreamer DVB Subtitles Out-Of-Bounds Write Remote Cod… |
GStreamer |
GStreamer |
2026-03-13T20:39:01.199Z | 2026-03-17T03:55:38.806Z |
| CVE-2026-2922 |
7.8 (3.0)
|
GStreamer RealMedia Demuxer Out-Of-Bounds Write Remote… |
GStreamer |
GStreamer |
2026-03-13T20:38:49.124Z | 2026-03-16T20:24:56.719Z |
| CVE-2026-2921 |
7.8 (3.0)
|
GStreamer RIFF Palette Integer Overflow Remote Code Ex… |
GStreamer |
GStreamer |
2026-03-13T20:41:50.780Z | 2026-03-16T15:41:06.206Z |
| CVE-2026-2920 |
7.8 (3.0)
|
GStreamer ASF Demuxer Heap-based Buffer Overflow Remot… |
GStreamer |
GStreamer |
2026-03-13T20:38:27.802Z | 2026-03-16T20:23:57.712Z |
| CVE-2024-0552 |
9.8 (3.1)
|
Intumit inc. SmartRobot - Remote Code Execution |
Intumit inc. |
SmartRobot |
2024-01-15T04:03:07.044Z | 2024-10-14T06:11:21.141Z |
| CVE-2026-3081 |
7.8 (3.0)
|
GStreamer H.266 Codec Parser Stack-based Buffer Overfl… |
GStreamer |
GStreamer |
2026-03-13T20:39:20.596Z | 2026-03-17T12:43:51.002Z |
| CVE-2026-3082 |
7.8 (3.0)
|
GStreamer JPEG Parser Heap-based Buffer Overflow Remot… |
GStreamer |
GStreamer |
2026-03-13T20:39:33.772Z | 2026-03-17T12:53:18.085Z |
| CVE-2026-3083 |
8.8 (3.0)
|
GStreamer rtpqdm2depay Out-Of-Bounds Write Remote Code… |
GStreamer |
GStreamer |
2026-03-13T20:41:31.185Z | 2026-03-16T15:41:06.349Z |
| CVE-2026-3084 |
7.8 (3.0)
|
GStreamer H.266 Codec Parser Integer Underflow Remote … |
GStreamer |
GStreamer |
2026-03-13T20:42:03.443Z | 2026-03-16T15:41:06.083Z |
| CVE-2026-3085 |
8.8 (3.0)
|
GStreamer rtpqdm2depay Heap-based Buffer Overflow Remo… |
GStreamer |
GStreamer |
2026-03-13T20:40:02.186Z | 2026-03-16T20:25:58.881Z |
| CVE-2026-3086 |
7.8 (3.0)
|
GStreamer H.266 Codec Parser Out-Of-Bounds Write Remot… |
GStreamer |
GStreamer |
2026-03-13T20:40:12.973Z | 2026-03-16T20:26:40.312Z |
| CVE-2026-28430 |
9.3 (4.0)
|
Chamilo LMS Vulnerable to Unauthenticated SQL Injectio… |
chamilo |
chamilo-lms |
2026-03-16T19:13:58.544Z | 2026-03-17T13:38:36.572Z |
| CVE-2026-30875 |
8.8 (3.1)
|
Chamilo LMS: Authenticated RCE via H5P Import |
chamilo |
chamilo-lms |
2026-03-16T19:16:37.936Z | 2026-03-16T20:22:42.979Z |
| CVE-2026-30876 |
6.3 (4.0)
|
Chamilo LMS: User enumeration vulnerability via response |
chamilo |
chamilo-lms |
2026-03-16T19:18:41.508Z | 2026-03-16T20:22:42.799Z |
| CVE-2026-30881 |
8.8 (3.1)
|
Chamilo LMS: SQL Injection in the statistics AJAX endpoint |
chamilo |
chamilo-lms |
2026-03-16T19:19:59.782Z | 2026-03-16T20:22:42.641Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-31853 | ImageMagick is free and open-source software used for editing and manipulating digital images. Prio… | 2026-03-11T17:16:58.760 | 2026-03-17T19:08:12.847 |
| fkie_cve-2026-30226 | Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn'… | 2026-03-11T18:16:22.937 | 2026-03-17T19:07:28.660 |
| fkie_cve-2026-31861 | Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and G… | 2026-03-11T18:16:24.887 | 2026-03-17T19:06:41.493 |
| fkie_cve-2026-32630 | file-type detects the file type of a file, stream, or data. From 20.0.0 to 21.3.1, a crafted ZIP fi… | 2026-03-16T14:19:40.593 | 2026-03-17T19:05:56.580 |
| fkie_cve-2026-31862 | Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and G… | 2026-03-11T18:16:25.073 | 2026-03-17T19:04:29.000 |
| fkie_cve-2024-8776 | SmartRobot from INTUMIT does not properly validate a specific page parameter, allowing unautheticat… | 2024-09-16T06:15:11.023 | 2026-03-17T19:03:05.877 |
| fkie_cve-2026-32704 | SiYuan is a personal knowledge management system. Prior to 3.6.1, POST /api/template/renderSprig la… | 2026-03-16T14:19:41.233 | 2026-03-17T19:02:25.640 |
| fkie_cve-2026-32729 | Runtipi is a personal homeserver orchestrator. Prior to 4.8.1, The Runtipi /api/auth/verify-totp en… | 2026-03-16T14:19:43.400 | 2026-03-17T19:01:54.250 |
| fkie_cve-2024-2413 | Intumit SmartRobot uses a fixed encryption key for authentication. Remote attackers can use this ke… | 2024-03-13T03:15:06.793 | 2026-03-17T19:01:25.253 |
| fkie_cve-2026-2923 | GStreamer DVB Subtitles Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability… | 2026-03-16T14:19:33.013 | 2026-03-17T18:59:35.180 |
| fkie_cve-2026-2922 | GStreamer RealMedia Demuxer Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerabi… | 2026-03-16T14:19:32.877 | 2026-03-17T18:59:21.860 |
| fkie_cve-2026-2921 | GStreamer RIFF Palette Integer Overflow Remote Code Execution Vulnerability. This vulnerability all… | 2026-03-16T14:19:32.730 | 2026-03-17T18:59:00.343 |
| fkie_cve-2026-2920 | GStreamer ASF Demuxer Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerab… | 2026-03-16T14:19:31.637 | 2026-03-17T18:58:45.980 |
| fkie_cve-2024-0552 | Intumit inc. SmartRobot's web framwork has a remote code execution vulnerability. An unauthorized r… | 2024-01-15T04:15:08.260 | 2026-03-17T18:58:29.600 |
| fkie_cve-2026-3081 | GStreamer H.266 Codec Parser Stack-based Buffer Overflow Remote Code Execution Vulnerability. This … | 2026-03-16T14:19:46.047 | 2026-03-17T18:58:06.030 |
| fkie_cve-2026-3082 | GStreamer JPEG Parser Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerab… | 2026-03-16T14:19:46.190 | 2026-03-17T18:57:55.267 |
| fkie_cve-2026-3083 | GStreamer rtpqdm2depay Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability … | 2026-03-16T14:19:46.327 | 2026-03-17T18:57:46.047 |
| fkie_cve-2026-3084 | GStreamer H.266 Codec Parser Integer Underflow Remote Code Execution Vulnerability. This vulnerabil… | 2026-03-16T14:19:46.477 | 2026-03-17T18:57:37.060 |
| fkie_cve-2026-3085 | GStreamer rtpqdm2depay Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnera… | 2026-03-16T14:19:46.620 | 2026-03-17T18:57:21.210 |
| fkie_cve-2026-3086 | GStreamer H.266 Codec Parser Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerab… | 2026-03-16T14:19:46.767 | 2026-03-17T18:56:36.537 |
| fkie_cve-2026-28430 | Chamilo LMS is a learning management system. Prior to version 1.11.34, there is an unauthenticated … | 2026-03-16T20:16:17.957 | 2026-03-17T18:53:49.153 |
| fkie_cve-2026-30875 | Chamilo LMS is a learning management system. Prior to version 1.11.36, an arbitrary file upload vul… | 2026-03-16T20:16:18.330 | 2026-03-17T18:53:29.480 |
| fkie_cve-2026-30876 | Chamilo LMS is a learning management system. Prior to version 1.11.36, Chamilo is vulnerable to use… | 2026-03-16T20:16:18.490 | 2026-03-17T18:53:03.027 |
| fkie_cve-2026-30881 | Chamilo LMS is a learning management system. Version 1.11.34 and prior contains a SQL Injection vul… | 2026-03-16T20:16:18.640 | 2026-03-17T18:52:41.947 |
| fkie_cve-2026-30882 | Chamilo LMS is a learning management system. Chamilo LMS version 1.11.34 and prior contains a Refle… | 2026-03-16T20:16:18.790 | 2026-03-17T18:52:21.880 |
| fkie_cve-2026-3824 | IFTOP developed by WellChoose has an Open redirect vulnerability, allowing authenticated remote att… | 2026-03-11T07:16:59.717 | 2026-03-17T18:48:24.363 |
| fkie_cve-2026-28343 | CKEditor 5 is a modern JavaScript rich-text editor with an MVC architecture. Prior to version 47.6.… | 2026-03-05T20:16:16.017 | 2026-03-17T18:39:49.140 |
| fkie_cve-2026-22723 | Inappropriate user token revocation due to a logic error in the token revocation endpoint implement… | 2026-03-05T21:16:14.610 | 2026-03-17T18:35:29.637 |
| fkie_cve-2026-28413 | Products.isurlinportal is a replacement for isURLInPortal method in Plone. Prior to versions 2.1.0,… | 2026-03-05T21:16:22.023 | 2026-03-17T18:32:49.883 |
| fkie_cve-2026-21622 | Insufficient Session Expiration vulnerability in hexpm hexpm/hexpm ('Elixir.Hexpm.Accounts.Password… | 2026-03-05T22:16:12.963 | 2026-03-17T18:27:15.337 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-4w8j-4c9q-3cj8 |
7.5 (3.1)
|
Doom Launcher 3.8.1.0 is vulnerable to Directory Traversal due to missing file path validation duri… | 2026-03-16T18:32:03Z | 2026-03-17T15:36:22Z |
| ghsa-4fhm-p86v-hwpx |
7.5 (3.1)
|
Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ rega… | 2026-03-17T12:30:20Z | 2026-03-17T15:36:22Z |
| ghsa-3wp7-xc34-h3f8 |
7.8 (3.1)
|
A local attacker can bypass OpenEDR's 2.5.1.0 self-defense mechanism by renaming a malicious execut… | 2026-03-16T18:32:03Z | 2026-03-17T15:36:21Z |
| ghsa-w5p6-gfqf-hh2r |
8.8 (3.1)
8.6 (4.0)
|
"Functions" module in Raytha CMS allows privileged users to write custom code to add functionality … | 2026-03-16T15:30:41Z | 2026-03-17T15:36:19Z |
| ghsa-w59g-5675-pp8h |
5.3 (3.1)
|
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in xtemos … | 2026-03-13T21:31:49Z | 2026-03-17T15:36:19Z |
| ghsa-rhj3-mf5j-8rx2 |
7.5 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-03-13T21:31:49Z | 2026-03-17T15:36:19Z |
| ghsa-r84h-59vq-9r9m |
7.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-03-13T21:31:49Z | 2026-03-17T15:36:19Z |
| ghsa-f2cx-fh2v-c92p |
7.5 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-03-13T21:31:49Z | 2026-03-17T15:36:19Z |
| ghsa-9cmf-qgf8-jfxf |
5.0 (3.1)
|
Path Traversal: '.../...//' vulnerability in Bogdan Bendziukov Squeeze squeeze allows Path Traversa… | 2026-03-13T21:31:49Z | 2026-03-17T15:36:19Z |
| ghsa-q336-5c62-jqr6 |
7.5 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-03-13T21:31:48Z | 2026-03-17T15:36:18Z |
| ghsa-p8mg-5f3g-25qc |
5.3 (3.1)
|
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in RadiusT… | 2026-03-13T21:31:48Z | 2026-03-17T15:36:18Z |
| ghsa-mq87-vh9m-w8jp |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in desertthemes Corpiva corpiva allows Cross Site R… | 2026-03-13T21:31:48Z | 2026-03-17T15:36:18Z |
| ghsa-jwpp-jwg5-pq7x |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in Ays Pro Quiz Maker quiz-maker allows Cross Site … | 2026-03-13T21:31:47Z | 2026-03-17T15:36:18Z |
| ghsa-xh35-43pp-33v2 |
3.1 (3.1)
0.0 (4.0)
|
Vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program file… | 2026-02-03T00:30:19Z | 2026-03-17T15:36:17Z |
| ghsa-mq59-m269-xvcx |
5.3 (4.0)
|
Next.js: null origin can bypass Server Actions CSRF checks | 2026-03-17T15:30:14Z | 2026-03-17T15:30:14Z |
| ghsa-jcc7-9wpm-mj36 |
2.3 (4.0)
|
Next.js: null origin can bypass dev HMR websocket CSRF checks | 2026-03-17T15:29:48Z | 2026-03-17T15:29:48Z |
| ghsa-cc7p-2j3x-x7xf |
7.7 (4.0)
|
Craft CMS Vulnerable to Privilege Escalation/Bypass through UsersController->actionImpersonateWithToken() | 2026-03-16T18:44:20Z | 2026-03-17T15:23:51Z |
| ghsa-4mx9-3c2h-hwhg |
9.3 (3.1)
|
SiYuan has a SanitizeSVG bypass via data:text/xml in getDynamicIcon (incomplete fix for CVE-2026-29183) | 2026-03-17T14:08:11Z | 2026-03-17T14:08:12Z |
| ghsa-fq2j-j8hc-8vw8 |
9.9 (3.1)
|
SiYuan Vulnerable to Arbitrary File Read in Desktop Publish Service | 2026-03-17T14:07:57Z | 2026-03-17T14:07:57Z |
| ghsa-v7cf-c9rm-wm3j |
7.1 (4.0)
|
Uncontrolled recursion DoS in JustHTML() via deeply nested HTML | 2026-03-17T14:07:38Z | 2026-03-17T14:07:38Z |
| ghsa-xxmc-fm3p-q3x8 |
5.3 (3.1)
|
A flaw was found in libsoup, a library for handling HTTP requests. This vulnerability, known as a U… | 2026-03-17T12:30:20Z | 2026-03-17T12:30:20Z |
| ghsa-f5f8-5jp8-vj3c |
2.7 (3.1)
|
HCL Sametime is vulnerable to broken server-side validation. While the application performs client-… | 2026-03-17T12:30:20Z | 2026-03-17T12:30:20Z |
| ghsa-v5mp-vx4p-jwp6 |
3.9 (3.1)
|
A flaw was found in libsoup, a library used by applications to send network requests. This vulnerab… | 2026-03-17T12:30:19Z | 2026-03-17T12:30:19Z |
| ghsa-q4hc-vp2m-fr47 |
7.2 (3.1)
|
A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `sch… | 2026-02-23T18:32:02Z | 2026-03-17T12:30:19Z |
| ghsa-jx6g-363c-pprr |
3.9 (3.1)
|
A flaw was found in libsoup. An attacker controlling the value used to set the Content-Type header … | 2026-03-17T12:30:19Z | 2026-03-17T12:30:19Z |
| ghsa-h5q3-ggp6-vf4c |
|
In the Linux kernel, the following vulnerability has been resolved: audit: add fchmodat2() to chan… | 2026-03-17T12:30:19Z | 2026-03-17T12:30:19Z |
| ghsa-c2fm-fx6j-95j7 |
|
In the Linux kernel, the following vulnerability has been resolved: audit: add missing syscalls to… | 2026-03-17T12:30:19Z | 2026-03-17T12:30:19Z |
| ghsa-6p72-283f-crv2 |
3.9 (3.1)
|
A flaw was found in libsoup. A remote attacker, by controlling the method parameter of the `soup_me… | 2026-03-17T12:30:19Z | 2026-03-17T12:30:19Z |
| ghsa-wc8x-254r-w3mh |
7.5 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-02-19T18:31:53Z | 2026-03-17T09:31:28Z |
| ghsa-q8w5-c2m8-wxrx |
2.3 (4.0)
|
In affected versions of Octopus Server it was possible for a low privileged user to manipulate an A… | 2026-03-17T09:31:28Z | 2026-03-17T09:31:28Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-172 |
3.7 (3.1)
|
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache StreamPipes in … | streampipes | 2024-07-17T09:15:02+00:00 | 2025-01-18T22:21:43.557516+00:00 |
| pysec-2024-171 |
8.0 (3.1)
|
Strawberry GraphQL is a library for creating GraphQL APIs. Prior to version 0.243.0, mult… | strawberry-graphql | 2024-09-25T18:15:05+00:00 | 2025-01-18T22:21:43.412172+00:00 |
| pysec-2024-170 |
4.8 (3.1)
|
A stored Cross-Site Scripting (XSS) vulnerability was identified in the zenml-io/zenml re… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-18T19:19:08.253212+00:00 |
| pysec-2024-169 |
6.5 (3.1)
|
An improper authorization vulnerability exists in the zenml-io/zenml repository, specific… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-18T19:19:08.205431+00:00 |
| pysec-2024-168 |
6.5 (3.1)
|
Taipy is an open-source Python library for easy, end-to-end application development for d… | taipy | 2024-10-09T19:15:14+00:00 | 2025-01-18T19:19:07.718423+00:00 |
| pysec-2024-167 |
|
NLTK through 3.8.1 allows remote code execution if untrusted packages have pickled Python… | nltk | 2024-06-27T22:15:10+00:00 | 2025-01-18T19:19:06.317325+00:00 |
| pysec-2024-166 |
|
Nautobot is a Network Source of Truth and Network Automation Platform. A user with permis… | nautobot | 2024-05-28T23:15:17+00:00 | 2025-01-18T19:19:06.277166+00:00 |
| pysec-2024-165 |
7.5 (3.1)
|
The Jupyter Server provides the backend for Jupyter web applications. Jupyter Server on W… | jupyter-server | 2024-06-06T16:15:11+00:00 | 2025-01-18T19:19:04.842426+00:00 |
| pysec-2024-164 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. If an exces… | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-16T21:21:41.436934+00:00 |
| pysec-2025-1 |
|
An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2… | django | 2025-01-14T19:15:32+00:00 | 2025-01-14T21:22:18.665005+00:00 |
| pysec-2024-163 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Prior to ve… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-14T05:22:23.036505+00:00 |
| pysec-2024-162 |
6.5 (3.1)
|
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the XMLFeedSpider … | scrapy | 2024-02-28T00:15:53+00:00 | 2025-01-14T05:22:21.870348+00:00 |
| pysec-2024-161 |
|
Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R packag… | pyarrow | 2024-11-28T17:15:48+00:00 | 2025-01-14T05:22:20.554292+00:00 |
| pysec-2024-160 |
6.1 (3.1)
|
lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.cle… | lxml-html-clean | 2024-11-19T22:15:21+00:00 | 2025-01-14T05:22:17.244267+00:00 |
| pysec-2024-159 |
|
Versions of the package luigi before 3.6.0 are vulnerable to Arbitrary File Write via Arc… | luigi | 2024-12-10T05:15:07+00:00 | 2025-01-14T05:22:17.204098+00:00 |
| pysec-2024-158 |
|
Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when … | djoser | 2024-12-13T05:15:07+00:00 | 2025-01-14T05:22:11.856636+00:00 |
| pysec-2024-157 |
|
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2… | django | 2024-12-06T12:15:18+00:00 | 2025-01-14T05:22:11.817473+00:00 |
| pysec-2024-156 |
|
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2… | django | 2024-12-06T12:15:17+00:00 | 2025-01-14T05:22:11.736011+00:00 |
| pysec-2024-155 |
7.5 (3.1)
|
cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) … | cbor2 | 2024-02-19T23:15:07+00:00 | 2025-01-14T05:22:09.226388+00:00 |
| pysec-2019-255 |
6.1 (3.1)
|
data/interfaces/default/history.html in Tautulli 2.1.26 has XSS via a crafted Plex userna… | tautulli | 2019-02-19T16:29:00Z | 2025-01-12T05:34:20.550037Z |
| pysec-2019-254 |
6.5 (3.1)
|
In Tautulli 2.1.9, CSRF in the /shutdown URI allows an attacker to shut down the remote m… | tautulli | 2019-12-18T18:15:00Z | 2025-01-12T05:34:20.505254Z |
| pysec-2022-43131 |
6.5 (3.1)
|
diplib v3.0.0 is vulnerable to Double Free. | diplib | 2022-11-04T17:15:00Z | 2024-12-27T22:48:17.996707Z |
| pysec-2022-43162 |
7.5 (3.1)
|
Redis v7.0 was discovered to contain a memory leak via the component streamGetEdgeID. | redis | 2022-06-23T17:15:00Z | 2024-12-23T11:33:23.546447Z |
| pysec-2019-253 |
7.4 (3.1)
|
Tahoe-LAFS 1.9.0 fails to ensure integrity which allows remote attackers to corrupt mutab… | tahoe-lafs | 2019-11-07T18:15:00Z | 2024-12-19T05:47:49.035329Z |
| pysec-2020-343 |
7.8 (3.1)
|
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when the… | blosc2 | 2020-11-27T20:15:00Z | 2024-12-12T14:22:45.450508Z |
| pysec-2024-154 |
8.6 (3.1)
8.7 (4.0)
|
Ultralytics has identified a supply chain attack affecting affecting multiple versions of… | ultralytics | 2024-12-10T19:20:27.097505+00:00 | |
| pysec-2015-42 |
|
providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.… | ipsilon | 2015-11-17T15:59:00Z | 2024-12-05T09:35:27.751929Z |
| pysec-2015-41 |
|
providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.… | ipsilon | 2015-11-17T15:59:00Z | 2024-12-05T09:35:27.711043Z |
| pysec-2021-125 |
|
A flaw was found in Ansible where the secret information present in async_files are getti… | ansible | 2021-06-09T12:15:00Z | 2024-12-03T18:23:29.400148Z |
| pysec-2019-251 |
7.5 (3.1)
|
The modoboa-dmarc plugin 1.1.0 for Modoboa is vulnerable to an XML External Entity Inject… | modoboa | 2019-12-10T20:15:00Z | 2024-12-02T10:49:36.349040Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33739 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.344696Z |
| gsd-2024-33738 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.562140Z |
| gsd-2024-33737 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.285475Z |
| gsd-2024-33736 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.346507Z |
| gsd-2024-33735 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.410261Z |
| gsd-2024-33734 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.482444Z |
| gsd-2024-33733 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.577869Z |
| gsd-2024-33732 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.513959Z |
| gsd-2024-33731 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.328794Z |
| gsd-2024-33730 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.396940Z |
| gsd-2024-33729 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.527542Z |
| gsd-2024-33728 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.380564Z |
| gsd-2024-33727 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.514916Z |
| gsd-2024-33726 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.327193Z |
| gsd-2024-33725 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.300660Z |
| gsd-2024-33724 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.429383Z |
| gsd-2024-33723 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.361754Z |
| gsd-2024-33722 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.598142Z |
| gsd-2024-33721 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.408369Z |
| gsd-2024-33720 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.519711Z |
| gsd-2024-33719 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.344333Z |
| gsd-2024-33718 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.360853Z |
| gsd-2024-33717 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.429699Z |
| gsd-2024-33716 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.371227Z |
| gsd-2024-33715 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.440563Z |
| gsd-2024-33714 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.510684Z |
| gsd-2024-33713 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.522989Z |
| gsd-2024-33712 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.587066Z |
| gsd-2024-33711 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.452695Z |
| gsd-2024-33710 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.499457Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1343 | Malicious code in chai-as-flex (npm) | 2026-03-11T13:24:37Z | 2026-03-11T13:24:37Z |
| mal-2026-1342 | Malicious code in collectables (PyPI) | 2026-03-11T12:41:02Z | 2026-03-11T12:41:02Z |
| mal-2026-951 | Malicious code in printrables (PyPI) | 2026-02-20T06:59:50Z | 2026-03-11T10:50:04Z |
| mal-2026-738 | Malicious code in tablescene (PyPI) | 2026-02-04T10:24:43Z | 2026-03-11T10:50:04Z |
| mal-2026-732 | Malicious code in gridifys (PyPI) | 2026-02-04T07:29:56Z | 2026-03-11T10:50:04Z |
| mal-2026-700 | Malicious code in tabulapys (PyPI) | 2026-02-03T10:04:45Z | 2026-03-11T10:50:04Z |
| mal-2026-698 | Malicious code in tableshow (PyPI) | 2026-02-03T09:30:09Z | 2026-03-11T10:50:04Z |
| mal-2026-686 | Malicious code in tableapys (PyPI) | 2026-02-03T07:49:06Z | 2026-03-11T10:50:04Z |
| mal-2026-650 | Malicious code in tableapy (PyPI) | 2026-02-02T12:56:55Z | 2026-03-11T10:50:04Z |
| mal-2026-602 | Malicious code in tableasets (PyPI) | 2026-01-29T11:22:50Z | 2026-03-11T10:50:04Z |
| mal-2026-601 | Malicious code in tableautes (PyPI) | 2026-01-29T10:08:47Z | 2026-03-11T10:50:04Z |
| mal-2026-562 | Malicious code in tabullates (PyPI) | 2026-01-28T07:42:32Z | 2026-03-11T10:50:04Z |
| mal-2026-548 | Malicious code in tabletas (PyPI) | 2026-01-27T18:26:01Z | 2026-03-11T10:50:04Z |
| mal-2026-492 | Malicious code in tableates (PyPI) | 2026-01-23T13:57:05Z | 2026-03-11T10:50:04Z |
| mal-2026-490 | Malicious code in tabletes (PyPI) | 2026-01-23T10:19:25Z | 2026-03-11T10:50:04Z |
| mal-2026-441 | Malicious code in spellcheckpy (PyPI) | 2026-01-21T08:10:26Z | 2026-03-11T10:50:04Z |
| mal-2026-375 | Malicious code in spellcheckerpy (PyPI) | 2026-01-20T19:06:25Z | 2026-03-11T10:50:04Z |
| mal-2025-193013 | Malicious code in tablixs (PyPI) | 2026-02-11T10:04:22Z | 2026-03-11T10:50:04Z |
| mal-2025-193012 | Malicious code in gridifies (PyPI) | 2026-02-06T14:04:11Z | 2026-03-11T10:50:04Z |
| mal-2025-191535 | Malicious code in tableate (PyPI) | 2025-11-25T11:06:37Z | 2026-03-11T10:50:04Z |
| mal-2025-191534 | Malicious code in tablates (PyPI) | 2025-11-26T10:20:42Z | 2026-03-11T10:50:04Z |
| mal-2025-191533 | Malicious code in spellcheckers (PyPI) | 2025-11-15T18:49:10Z | 2026-03-11T10:50:04Z |
| mal-2026-1341 | Malicious code in collects (PyPI) | 2026-03-11T10:17:52Z | 2026-03-11T10:17:53Z |
| mal-2026-1339 | Malicious code in anontest123 (PyPI) | 2026-03-11T07:44:14Z | 2026-03-11T07:44:14Z |
| mal-2026-1340 | Malicious code in safetest123 (PyPI) | 2026-03-11T07:43:06Z | 2026-03-11T07:43:06Z |
| mal-2026-1335 | Malicious code in tailwindcss-animate-framer (npm) | 2026-03-11T06:26:49Z | 2026-03-11T06:26:59Z |
| mal-2026-1338 | Malicious code in vite-chunker (npm) | 2026-03-11T06:26:49Z | 2026-03-11T06:26:49Z |
| mal-2026-1336 | Malicious code in tailwindcss-forms-bundler (npm) | 2026-03-11T06:26:49Z | 2026-03-11T06:26:49Z |
| mal-2026-1333 | Malicious code in polygon-gamma-api (npm) | 2026-03-11T06:26:49Z | 2026-03-11T06:26:49Z |
| mal-2026-1328 | Malicious code in gamma-api-provider (npm) | 2026-03-11T06:26:49Z | 2026-03-11T06:26:49Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-0975 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-05-07T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0953 | Golang Go: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-05-06T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0945 | Linux Kernel: Mehrere Schwachstellen | 2025-05-05T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0932 | Linux Kernel: Mehrere Schwachstellen | 2025-05-04T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0922 | Linux Kernel: Mehrere Schwachstellen | 2025-05-01T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0904 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-04-29T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0861 | Linux Kernel: Mehrere Schwachstellen | 2025-04-21T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0844 | Linux Kernel: Mehrere Schwachstellen | 2025-04-16T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0837 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-04-15T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0831 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-04-15T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0732 | Linux Kernel: Mehrere Schwachstellen | 2025-04-07T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0698 | Linux Kernel: Mehrere Schwachstellen | 2025-04-02T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1422 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-06-20T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1418 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-06-19T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1322 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe | 2024-06-09T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1259 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifischen Angriff | 2024-05-30T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1251 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-05-28T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1197 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe | 2024-05-21T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1188 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-05-20T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1083 | Linux Kernel: Mehrere Schwachstellen | 2024-05-09T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1008 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-05-01T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-0964 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-04-24T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-0920 | Linux Kernel: Mehrere Schwachstellen | 2024-04-17T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-0804 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-04-04T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-0773 | Linux Kernel: Mehrere Schwachstellen | 2024-04-03T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-0749 | Linux Kernel: Mehrere Schwachstellen | 2024-04-01T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-0654 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe | 2024-03-17T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-0534 | Linux Kernel: Mehrere Schwachstellen | 2024-03-03T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-0527 | Linux Kernel: Mehrere Schwachstellen | 2024-02-29T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-0475 | Linux-Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe | 2024-02-25T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-224-02 | Johnson Controls iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra G2, iSTAR Ultra G2 SE, iSTAR Edge G2 (Update A) | 2025-08-12T06:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| va-25-345-01 | CISA Software Acquisition Guide Supplier Response Web Tool XSS | 2025-12-12T20:27:47Z | 2025-12-12T20:27:47Z |
| icsma-25-345-02 | Varex Imaging Panoramic Dental Imaging Software | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| icsma-25-345-01 | Grassroots DICOM (GDCM) | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| icsa-25-345-10 | OpenPLC_V3 | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| icsa-25-345-02 | Johnson Controls iSTAR Ultra | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| icsa-25-345-01 | Johnson Controls iSTAR | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| va-25-343-01 | Windscribe for Linux 'changeMTU' local privilege escalation | 2025-12-10T16:46:41Z | 2025-12-10T16:46:41Z |
| icsa-26-015-12 | Siemens SIMATIC CN 4100 | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-26-015-11 | Siemens RUGGEDCOM ROX II | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-09 | Siemens Gridscale X Prepay | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-08 | Siemens Energy Services | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-07 | Siemens Building X - Security Manager Edge Controller | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-06 | Siemens SINEMA Remote Connect Server | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-226-11 | Siemens SIMATIC S7-PLCSIM | 2025-08-12T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-226-03 | Siemens SIMATIC S7-PLCSIM | 2025-08-12T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-24-347-02 | Siemens Engineering Platforms | 2024-12-10T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-24-256-16 | Siemens Third-Party Component in SICAM and SITIPE Products | 2024-09-10T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-24-193-05 | Siemens SCALANCE, RUGGEDCOM | 2024-07-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-22-349-09 | Siemens OpenSSL 3.0 Affecting Products | 2022-12-13T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-338-07 | Advantech iView | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-06 | SolisCloud Monitoring Platform | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-05 | Sunbird DCIM dcTrack and Power IQ | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-04 | Johnson Controls iSTAR | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-03 | Johnson Controls OpenBlue Mobile Web Application for OpenBlue Workplace | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-02 | MAXHUB Pivot | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-01 | Mitsubishi Electric GX Works2 | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-219-02 | Johnson Controls FX Server, FX80 and FX90 (Update A) | 2025-08-07T06:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-148-03 | Consilium Safety CS5000 Fire Panel (Update A) | 2025-05-29T06:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsma-25-336-01 | Mirion Medical EC2 Software NMIS BioDose | 2025-12-02T07:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-multiprod-ikev2-dos-gpctuqv2 | Cisco Adaptive Security Appliance Software, Firepower Threat Defense Software, IOS Software, and IOS XE Software IKEv2 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ipsgacl-pg6qfzk | Cisco IOS Software on Cisco Catalyst 1000 and 2960L Switches Access Control List Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iox-dos-95fqnf7b | Cisco IOx Application Hosting Environment Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-privesc-su7scvdp | Cisco IOS XE Software Privilege Escalation Vulnerabilities | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-ikev1-dos-xhk3hzfc | Cisco IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-dhcpsn-dos-xbn8mtks | Cisco IOS XE Software DHCP Snooping Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ios-http-privesc-wcrd5e3 | Cisco IOS Software Industrial Ethernet Switch Device Manager Privilege Escalation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ewlc-user-del-hqxmpudj | Cisco IOS XE Wireless Controller Software Unauthorized User Deletion Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ewlc-cdp-dos-fpeks9k | Cisco IOS XE Wireless Controller Software Cisco Discovery Protocol Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-catc-insec-acc-mtt8eheb | Cisco Catalyst Center Insufficient Access Control Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-catalyst-tls-pqnd5kej | Cisco Catalyst SD-WAN Manager Certificate Validation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-c2960-3560-sboot-ztqadrhq | Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches Secure Boot Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-bootstrap-kfgxygdh | Cisco IOS XE Software Bootstrap Arbitrary File Write Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-asr903-rsp3-arp-dos-wmfzdvjz | Cisco IOS XE Software for Cisco ASR 903 Aggregation Services Routers ARP Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-webex-app-client-rce-ufymmylc | Cisco Webex App Client-Side Remote Code Execution Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-sna-prvesc-4bqmk33z | Cisco Secure Network Analytics Privilege Escalation Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-nd-unenum-2xffh472 | Cisco Nexus Dashboard LDAP Username Enumeration Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-nxos-image-sig-bypas-pqdrqvjl | Cisco NX-OS Software Image Verification Bypass Vulnerability | 2024-12-04T16:00:00+00:00 | 2025-04-07T16:43:32+00:00 |
| cisco-sa-cslu-7ghmzwmw | Cisco Smart Licensing Utility Vulnerabilities | 2024-09-04T16:00:00+00:00 | 2025-04-04T17:44:00+00:00 |
| cisco-sa-meraki-mx-vpn-dos-vnrpdvfb | Cisco Meraki MX and Z Series AnyConnect VPN Denial of Service Vulnerability | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-epnmpi-sxss-gsscpgy4 | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerabilities | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-ece-dos-tc6m9gz8 | Cisco Enterprise Chat and Email Denial of Service Vulnerability | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-webex-credexp-xmn85y6 | Cisco Webex for BroadWorks Credential Exposure Vulnerability | 2025-03-04T16:00:00+00:00 | 2025-04-01T13:40:00+00:00 |
| cisco-sa-sdwan-xss-zq4kpvyd | Cisco Catalyst SD-WAN Manager Cross-Site Scripting Vulnerability | 2024-09-25T16:00:00+00:00 | 2025-03-28T18:38:53+00:00 |
| cisco-sa-dnac-api-nbpzcjcm | Cisco Catalyst Center Unauthenticated API Access Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-03-26T16:00:00+00:00 |
| cisco-sa-xrike-9wygprgq | Cisco IOS XR Software Internet Key Exchange Version 2 Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-xr792-bwfvdpy | Cisco IOS XR Software Release 7.9.2 Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-sb-lkm-znerzjbz | Cisco IOS XR Software Secure Boot Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-ncs-hybridacl-crmzffkq | Cisco IOS XR Software Hybrid Access Control List Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-multicast-ermrsvq7 | Cisco IOS XR Software for ASR 9000 Series Routers Layer 3 Multicast Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-0038 | In multiple functions of mem_protect.c, there is a possible way to execute arbitrary code due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2026-03-02T00:00:00.000Z | 2026-03-05T01:09:10.000Z |
| msrc_cve-2026-23231 | netfilter: nf_tables: fix use-after-free in nf_tables_addchain() | 2026-03-02T00:00:00.000Z | 2026-03-05T01:04:52.000Z |
| msrc_cve-2025-71238 | scsi: qla2xxx: Fix bsg_done() causing double free | 2026-03-02T00:00:00.000Z | 2026-03-05T01:04:46.000Z |
| msrc_cve-2026-23236 | fbdev: smscufx: properly copy ioctl memory to kernelspace | 2026-03-02T00:00:00.000Z | 2026-03-05T01:04:17.000Z |
| msrc_cve-2025-8732 | libxml2 xmlcatalog xmlParseSGMLCatalog recursion | 2025-08-02T00:00:00.000Z | 2026-03-05T01:03:00.000Z |
| msrc_cve-2025-71072 | shmem: fix recovery on rename failures | 2026-01-02T00:00:00.000Z | 2026-03-04T14:47:39.000Z |
| msrc_cve-2025-68768 | inet: frags: flush pending skbs in fqdir_pre_exit() | 2026-01-02T00:00:00.000Z | 2026-03-04T14:47:34.000Z |
| msrc_cve-2025-71073 | Input: lkkbd - disable pending work before freeing device | 2026-01-02T00:00:00.000Z | 2026-03-04T14:47:28.000Z |
| msrc_cve-2025-38359 | s390/mm: Fix in_atomic() handling in do_secure_storage_access() | 2025-07-02T00:00:00.000Z | 2026-03-04T14:47:23.000Z |
| msrc_cve-2025-68822 | Input: alps - fix use-after-free bugs caused by dev3_register_work | 2026-01-02T00:00:00.000Z | 2026-03-04T14:47:22.000Z |
| msrc_cve-2025-21649 | net: hns3: fix kernel crash when 1588 is sent on HIP08 devices | 2025-01-02T00:00:00.000Z | 2026-03-04T14:47:17.000Z |
| msrc_cve-2025-38426 | drm/amdgpu: Add basic validation for RAS header | 2025-07-02T00:00:00.000Z | 2026-03-04T14:47:15.000Z |
| msrc_cve-2024-57872 | scsi: ufs: pltfrm: Dellocate HBA during ufshcd_pltfrm_remove() | 2025-01-02T00:00:00.000Z | 2026-03-04T14:47:10.000Z |
| msrc_cve-2025-51480 | Path Traversal vulnerability in onnx.external_data_helper.save_external_data in ONNX 1.17.0 allows attackers to overwrite arbitrary files by supplying crafted external_data.location paths containing traversal sequences, bypassing intended directory restrictions. | 2025-07-02T00:00:00.000Z | 2026-03-04T14:47:07.000Z |
| msrc_cve-2025-38311 | iavf: get rid of the crit lock | 2025-07-02T00:00:00.000Z | 2026-03-04T14:47:00.000Z |
| msrc_cve-2025-38272 | net: dsa: b53: do not enable EEE on bcm63xx | 2025-07-02T00:00:00.000Z | 2026-03-04T14:46:53.000Z |
| msrc_cve-2024-56782 | ACPI: x86: Add adev NULL check to acpi_quirk_skip_serdev_enumeration() | 2025-01-02T00:00:00.000Z | 2026-03-04T14:46:49.000Z |
| msrc_cve-2025-38269 | btrfs: exit after state insertion failure at btrfs_convert_extent_bit() | 2025-07-02T00:00:00.000Z | 2026-03-04T14:46:46.000Z |
| msrc_cve-2024-56775 | drm/amd/display: Fix handling of plane refcount | 2025-01-02T00:00:00.000Z | 2026-03-04T14:46:42.000Z |
| msrc_cve-2025-68374 | md: fix rcu protection in md_wakeup_thread | 2025-12-02T00:00:00.000Z | 2026-03-04T14:46:41.000Z |
| msrc_cve-2025-38279 | bpf: Do not include stack ptr register in precision backtracking bookkeeping | 2025-07-02T00:00:00.000Z | 2026-03-04T14:46:39.000Z |
| msrc_cve-2024-53201 | drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe | 2024-12-02T00:00:00.000Z | 2026-03-04T14:46:35.000Z |
| msrc_cve-2025-68378 | bpf: Fix stackmap overflow check in __bpf_get_stackid() | 2025-12-02T00:00:00.000Z | 2026-03-04T14:46:33.000Z |
| msrc_cve-2025-38303 | Bluetooth: eir: Fix possible crashes on eir_create_adv_data | 2025-07-02T00:00:00.000Z | 2026-03-04T14:46:32.000Z |
| msrc_cve-2023-52485 | drm/amd/display: Wake DMCUB before sending a command | 2024-02-02T08:00:00.000Z | 2026-03-04T14:46:28.000Z |
| msrc_cve-2025-68356 | gfs2: Prevent recursive memory reclaim | 2025-12-02T00:00:00.000Z | 2026-03-04T14:46:26.000Z |
| msrc_cve-2025-38333 | f2fs: fix to bail out in get_new_segment() | 2025-07-02T00:00:00.000Z | 2026-03-04T14:46:26.000Z |
| msrc_cve-2024-42107 | ice: Don't process extts if PTP is disabled | 2024-07-01T07:00:00.000Z | 2026-03-04T14:46:21.000Z |
| msrc_cve-2025-68745 | scsi: qla2xxx: Clear cmds after chip reset | 2025-12-02T00:00:00.000Z | 2026-03-04T14:46:19.000Z |
| msrc_cve-2025-38264 | nvme-tcp: sanitize request list handling | 2025-07-02T00:00:00.000Z | 2026-03-04T14:46:19.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0241 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-08-06T12:11:46.234849Z | 2025-10-17T10:44:55.312550Z |
| ncsc-2025-0324 | Kwetsbaarheid verholpen in FortiOS | 2025-10-17T08:42:51.624827Z | 2025-10-17T08:42:51.624827Z |
| ncsc-2025-0296 | Kwetsbaarheid verholpen in WatchGuard Fireware OS | 2025-09-19T13:31:26.392203Z | 2025-10-17T08:19:28.145953Z |
| ncsc-2025-0323 | Kwetsbaarheden verholpen in SAP Producten | 2025-10-17T08:04:54.828451Z | 2025-10-17T08:04:54.828451Z |
| ncsc-2025-0322 | Kwetsbaarheden verholpen in Adobe Commerce | 2025-10-16T06:32:33.597617Z | 2025-10-16T06:32:33.597617Z |
| ncsc-2025-0321 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-10-16T06:27:14.019367Z | 2025-10-16T06:27:14.019367Z |
| ncsc-2025-0320 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-10-16T06:25:05.618348Z | 2025-10-16T06:25:05.618348Z |
| ncsc-2025-0319 | Kwetsbaarheden verholpen in F5 Networks BIG-IP, F5OS en NGINX App Protect WAF | 2025-10-15T15:21:14.871532Z | 2025-10-15T15:21:14.871532Z |
| ncsc-2025-0318 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2025-10-15T06:22:07.027110Z | 2025-10-15T06:22:07.027110Z |
| ncsc-2025-0317 | Kwetsbaarheden verholpen in Veeam Backup & Replication | 2025-10-15T06:13:55.126030Z | 2025-10-15T06:13:55.126030Z |
| ncsc-2025-0316 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2025-10-14T18:52:06.487996Z | 2025-10-14T18:52:06.487996Z |
| ncsc-2025-0315 | Kwetsbaarheden verholpen in Microsoft Office | 2025-10-14T18:38:05.692251Z | 2025-10-14T18:38:05.692251Z |
| ncsc-2025-0314 | Kwetsbaarheden verholpen in Microsoft System Center | 2025-10-14T18:27:56.075338Z | 2025-10-14T18:27:56.075338Z |
| ncsc-2025-0313 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-10-14T18:21:47.576457Z | 2025-10-14T18:21:47.576457Z |
| ncsc-2025-0312 | Kwetsbaarheden verholpen in Microsoft Exchange | 2025-10-14T18:16:12.274468Z | 2025-10-14T18:16:12.274468Z |
| ncsc-2025-0311 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-10-14T18:13:41.244373Z | 2025-10-14T18:13:41.244373Z |
| ncsc-2025-0309 | Kwetsbaarheden verholpen in Siemens producten | 2025-10-14T11:22:10.254089Z | 2025-10-14T11:22:10.254089Z |
| ncsc-2025-0308 | Kwetsbaarheden verholpen in Juniper Networks Junos Space | 2025-10-13T08:31:03.235596Z | 2025-10-13T08:31:03.235596Z |
| ncsc-2025-0307 | Kwetsbaarheid verholpen in Oracle E-Business Suite | 2025-10-13T07:52:22.500853Z | 2025-10-13T07:52:22.500853Z |
| ncsc-2025-0306 | Kwetsbaarheden verholpen in GitLab | 2025-10-13T07:25:32.225768Z | 2025-10-13T07:25:32.225768Z |
| ncsc-2025-0305 | Kwetsbaarheden verholpen in Juniper Networks Junos OS | 2025-10-13T07:17:00.445318Z | 2025-10-13T07:17:00.445318Z |
| ncsc-2025-0303 | Kwetsbaarheid verholpen in Oracle E-Business Suite | 2025-10-05T09:07:57.122302Z | 2025-10-08T13:03:30.836713Z |
| ncsc-2025-0304 | Kwetsbaarheden verholpen in Redis | 2025-10-08T11:43:37.331971Z | 2025-10-08T11:43:37.331971Z |
| ncsc-2025-0302 | Kwetsbaarheid verholpen in IBM InfoSphere | 2025-09-30T08:31:27.582962Z | 2025-09-30T08:31:27.582962Z |
| ncsc-2025-0301 | Kwetsbaarheden verholpen in VMware NSX | 2025-09-30T08:29:24.969885Z | 2025-09-30T08:29:24.969885Z |
| ncsc-2025-0300 | Kwetsbaarheden verholpen in GitLab EE & CE | 2025-09-29T09:40:53.033373Z | 2025-09-29T09:40:53.033373Z |
| ncsc-2025-0299 | Kwetsbaarheden verholpen in Zenitel ICX500 en ICX510 Gateway | 2025-09-26T07:00:18.729367Z | 2025-09-26T07:00:18.729367Z |
| ncsc-2025-0298 | Kwetsbaarheden verholpen in Cisco Secure Firewall ASA en FTD | 2025-09-25T18:17:20.040958Z | 2025-09-25T18:17:20.040958Z |
| ncsc-2025-0297 | Kwetsbaarheden verholpen in Cisco IOS en Cisco IOS XE Software | 2025-09-25T09:20:07.678881Z | 2025-09-25T10:42:19.129323Z |
| ncsc-2025-0295 | Kwetsbaarheid verholpen in Fortra's GoAnywhere MFT | 2025-09-19T12:26:42.186246Z | 2025-09-19T12:26:42.186246Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10241-1 | cacti-1.2.30+git231.bca15e70c-1.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:20261-1 | Security update for openQA, os-autoinst, openQA-devel-container | 2026-02-23T19:35:27Z | 2026-02-23T19:35:27Z |
| opensuse-su-2026:20260-1 | Security update for mosquitto | 2026-02-23T18:17:43Z | 2026-02-23T18:17:43Z |
| opensuse-su-2026:10240-1 | weblate-5.16-1.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10239-1 | warewulf4-4.6.5-2.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10238-1 | python311-PyPDF2-2.11.1-4.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10237-1 | libopenssl-3-devel-3.5.3-2.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10236-1 | heroic-games-launcher-2.20.0-1.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10235-1 | cosign-3.0.5-1.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:20258-1 | Security update for chromium | 2026-02-21T02:15:40Z | 2026-02-21T02:15:40Z |
| opensuse-su-2026:10234-1 | chromedriver-145.0.7632.109-1.1 on GA media | 2026-02-21T00:00:00Z | 2026-02-21T00:00:00Z |
| opensuse-su-2026:20266-1 | Security update for postgresql15 | 2026-02-20T16:18:08Z | 2026-02-20T16:18:08Z |
| opensuse-su-2026:20265-1 | Security update for postgresql14 | 2026-02-20T16:14:27Z | 2026-02-20T16:14:27Z |
| opensuse-su-2026:20262-1 | Security update for docker-stable | 2026-02-20T15:40:19Z | 2026-02-20T15:40:19Z |
| opensuse-su-2026:10233-1 | kyverno-1.17.1-1.1 on GA media | 2026-02-20T00:00:00Z | 2026-02-20T00:00:00Z |
| opensuse-su-2026:10232-1 | cosign-3.0.4-2.1 on GA media | 2026-02-20T00:00:00Z | 2026-02-20T00:00:00Z |
| opensuse-su-2026:10231-1 | busybox-1.37.0-9.1 on GA media | 2026-02-20T00:00:00Z | 2026-02-20T00:00:00Z |
| opensuse-su-2026:20257-1 | Security update for python-Authlib | 2026-02-19T13:21:50Z | 2026-02-19T13:21:50Z |
| opensuse-su-2026:20253-1 | Security update for MozillaFirefox | 2026-02-19T11:09:58Z | 2026-02-19T11:09:58Z |
| opensuse-su-2026:20254-1 | Security update for python313 | 2026-02-19T10:31:04Z | 2026-02-19T10:31:04Z |
| opensuse-su-2026:20248-1 | Security update for chromium | 2026-02-19T02:43:57Z | 2026-02-19T02:43:57Z |
| opensuse-su-2026:10230-1 | vexctl-0.4.1+git78.f951e3a-1.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| opensuse-su-2026:10229-1 | ucode-intel-20260210-1.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| opensuse-su-2026:10228-1 | syft-1.42.1-1.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| opensuse-su-2026:10227-1 | python311-py7zr-1.1.0-1.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| opensuse-su-2026:10226-1 | python311-nltk-3.9.1-3.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| opensuse-su-2026:10225-1 | MozillaFirefox-147.0.4-1.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| opensuse-su-2026:20252-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-02-18T16:14:15Z | 2026-02-18T16:14:15Z |
| opensuse-su-2026:20251-1 | Security update for cockpit-repos | 2026-02-18T11:22:31Z | 2026-02-18T11:22:31Z |
| opensuse-su-2026:20249-1 | Security update for docker | 2026-02-18T09:41:33Z | 2026-02-18T09:41:33Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2022:0735 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.2 security updates and bug fixes | 2022-03-03T15:19:13+00:00 | 2026-03-17T14:49:34+00:00 |
| rhsa-2023:1742 | Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update | 2023-04-12T15:04:47+00:00 | 2026-03-17T14:39:57+00:00 |
| rhsa-2023:1533 | Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update | 2023-03-30T13:06:07+00:00 | 2026-03-17T14:39:57+00:00 |
| rhsa-2023:1049 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update | 2023-03-01T21:58:17+00:00 | 2026-03-17T14:39:55+00:00 |
| rhsa-2023:1047 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 for OpenShift image security and enhancement update | 2023-03-01T21:46:46+00:00 | 2026-03-17T14:39:55+00:00 |
| rhsa-2023:0321 | Red Hat Security Advisory: nodejs and nodejs-nodemon security, bug fix, and enhancement update | 2023-01-23T15:20:34+00:00 | 2026-03-17T14:39:55+00:00 |
| rhsa-2023:1045 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update on RHEL 9 | 2023-03-01T21:45:17+00:00 | 2026-03-17T14:39:54+00:00 |
| rhsa-2023:1044 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update on RHEL 8 | 2023-03-01T21:45:12+00:00 | 2026-03-17T14:39:54+00:00 |
| rhsa-2023:1043 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update on RHEL 7 | 2023-03-01T22:02:40+00:00 | 2026-03-17T14:39:52+00:00 |
| rhsa-2023:0612 | Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update | 2023-02-06T19:42:24+00:00 | 2026-03-17T14:39:51+00:00 |
| rhsa-2023:0050 | Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update | 2023-01-09T14:55:37+00:00 | 2026-03-17T14:39:49+00:00 |
| rhsa-2022:8652 | Red Hat Security Advisory: Red Hat Fuse 7.11.1 release and security update | 2022-11-28T14:39:27+00:00 | 2026-03-17T14:39:49+00:00 |
| rhsa-2022:9073 | Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update | 2022-12-15T16:20:58+00:00 | 2026-03-17T14:39:48+00:00 |
| rhsa-2022:7044 | Red Hat Security Advisory: rh-nodejs14-nodejs security update | 2022-10-19T10:12:45+00:00 | 2026-03-17T14:39:47+00:00 |
| rhsa-2022:6813 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.1 security update | 2022-10-05T10:44:49+00:00 | 2026-03-17T14:39:46+00:00 |
| rhsa-2022:5928 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update | 2022-08-08T19:43:57+00:00 | 2026-03-17T14:39:45+00:00 |
| rhsa-2022:5894 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update. | 2022-08-03T18:02:24+00:00 | 2026-03-17T14:39:45+00:00 |
| rhsa-2022:5893 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update | 2022-08-03T18:01:48+00:00 | 2026-03-17T14:39:43+00:00 |
| rhsa-2022:5892 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update | 2022-08-03T18:01:54+00:00 | 2026-03-17T14:39:43+00:00 |
| rhsa-2022:4914 | Red Hat Security Advisory: rh-nodejs12-nodejs security, bug fix, and enhancement update | 2022-06-06T09:29:16+00:00 | 2026-03-17T14:39:43+00:00 |
| rhsa-2022:1739 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.2.1 containers security update | 2022-05-05T18:02:37+00:00 | 2026-03-17T14:39:43+00:00 |
| rhsa-2023:0408 | Red Hat Security Advisory: OpenShift Virtualization 4.12.0 Images security update | 2023-01-25T11:11:29+00:00 | 2026-03-17T14:35:03+00:00 |
| rhsa-2023:1529 | Red Hat Security Advisory: Service Telemetry Framework 1.5 security update | 2023-03-30T00:42:39+00:00 | 2026-03-17T14:35:02+00:00 |
| rhsa-2022:6526 | Red Hat Security Advisory: OpenShift Virtualization 4.11.0 Images security and bug fix update | 2022-09-14T19:28:51+00:00 | 2026-03-17T14:34:59+00:00 |
| rhsa-2022:6156 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.0 security, enhancement, & bugfix update | 2022-08-24T13:45:52+00:00 | 2026-03-17T14:34:58+00:00 |
| rhsa-2022:6094 | Red Hat Security Advisory: OpenShift Container Platform 4.10.28 packages and security update | 2022-08-23T18:15:46+00:00 | 2026-03-17T14:34:58+00:00 |
| rhsa-2022:5875 | Red Hat Security Advisory: OpenShift Container Platform 4.10.26 security update | 2022-08-09T02:34:48+00:00 | 2026-03-17T14:34:57+00:00 |
| rhsa-2022:5729 | Red Hat Security Advisory: OpenShift Container Platform 4.10.25 security update | 2022-08-01T11:18:52+00:00 | 2026-03-17T14:34:55+00:00 |
| rhsa-2022:5006 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.3 Containers security update | 2022-06-13T12:43:57+00:00 | 2026-03-17T14:34:51+00:00 |
| rhsa-2026:4630 | Red Hat Security Advisory: Red Hat Data Grid 8.6.0 security update | 2026-03-16T17:11:00+00:00 | 2026-03-17T14:18:03+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2022-165-03 | Conext™ Combox | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-02 | Geo SCADA Mobile | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-067-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ for x70 | 2022-03-08T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2021-012-02 | EcoStruxure Power Build - Rapsody | 2021-01-12T08:32:35.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-130-03 | Wiser Smart | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-130-02 | Saitel DP RTU | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-130-01 | PowerLogic ION Setup | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2021-313-03 | APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices | 2021-11-09T06:30:00.000Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-039-04 | spaceLYnk, Wiser For KNX, fellerLYnk | 2022-02-08T20:32:52.000Z | 2022-03-08T20:32:52.000Z |
| sevd-2022-067-03 | Ritto Wiser™ Door | 2022-03-08T10:12:35.000Z | 2022-03-08T10:12:35.000Z |
| sevd-2021-313-04 | Windows Print Spooler embedded in EcoStruxure™ Process Expert | 2021-11-09T08:45:48.000Z | 2022-03-08T08:45:48.000Z |
| sevd-2022-011-03 | Easergy P5 | 2022-01-11T11:05:25.000Z | 2022-03-02T11:05:25.000Z |
| sevd-2022-039-06 | Harmony/Magelis iPC Series HMI, Vijeo Designer and Vijeo Designer Basic | 2022-02-08T23:25:23.000Z | 2022-02-08T23:25:23.000Z |
| sevd-2022-039-03 | Easergy P40 | 2022-02-08T17:58:55.000Z | 2022-02-08T17:58:55.000Z |
| sevd-2022-039-05 | EcoStruxure Geo SCADA Expert | 2022-02-08T17:33:44.000Z | 2022-02-08T17:33:44.000Z |
| sevd-2022-039-02 | EcoStruxure EV Charging Expert | 2022-02-08T12:36:59.000Z | 2022-02-08T12:36:59.000Z |
| sevd-2022-039-01 | IGSS (Interactive Graphical SCADA System) | 2022-02-08T07:29:58.000Z | 2022-02-08T07:29:58.000Z |
| sevd-2022-011-07 | EcoStruxure™ Power Monitoring Expert | 2022-01-11T13:20:28.000Z | 2022-01-11T13:20:28.000Z |
| sevd-2022-011-05 | ConneXium Tofino Firewall and Loadable Security Modules | 2022-01-11T12:53:54.000Z | 2022-01-11T12:53:54.000Z |
| sevd-2022-011-04 | Easergy P3 | 2022-01-11T11:28:56.000Z | 2022-01-11T11:28:56.000Z |
| sevd-2022-011-02 | Easergy T300 | 2022-01-11T10:48:02.000Z | 2022-01-11T10:48:02.000Z |
| sevd-2022-011-01 | Ethernet and Web server on Modicon M340 controller and Communication Modules | 2022-01-11T07:53:07.000Z | 2022-01-11T07:53:07.000Z |
| sevd-2021-348-04 | APC by Schneider Electric Rack PDU | 2021-12-14T00:00:00.000Z | 2021-12-21T00:00:00.000Z |
| sevd-2021-348-02 | EVlink City / Parking / Smart Wallbox Charging Stations | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sevd-2021-348-01 | IGSS (Interactive Graphical SCADA System) | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sevd-2021-313-07 | Eurotherm GUIcon | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-313-02 | Schneider Electric Software Update | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-313-01 | SCADAPack 300E Series RTU | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-285-05 | Conext™ Advisor & Conext™ Control V2 | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-04 | Modicon M218 Logic Controller | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-047424 | SSA-047424: Code Execution and SQL Injection Vulnerabilities in OZW Web Servers | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-443402 | SSA-443402: Multiple SQL Injection Vulnerabilities in TeleControl Server Basic before V3.1.2.2 | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| ssa-395348 | SSA-395348: Improper Handling of Length Parameter Inconsistency Vulnerability in TeleControl Server Basic before V3.1.2.2 | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| ssa-913875 | SSA-913875: Frame Aggregation and Fragmentation Vulnerabilities in 802.11 | 2021-07-13T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-817234 | SSA-817234: Multiple Kubernetes Ingress NGINX Controller Vulnerabilities in Insights Hub Private Cloud | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-686975 | SSA-686975: IPU 2022.3 Vulnerabilities in Siemens Industrial Products using Intel CPUs | 2023-02-14T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-672923 | SSA-672923: Out of Bounds Write Vulnerability in Solid Edge | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-525431 | SSA-525431: Privilege Escalation Vulnerabilities in Siemens License Server Before V4.3 | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-369369 | SSA-369369: Weak Registry Permission Vulnerability in SIMATIC IPC DiagBase and SIMATIC IPC DiagMonitor | 2025-02-11T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-306654 | SSA-306654: Insyde BIOS Vulnerabilities in Siemens Industrial Products | 2022-02-22T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-277137 | SSA-277137: Multiple Vulnerabilities in SIDIS Prime Before V4.0.700 | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-195895 | SSA-195895: User Enumeration Vulnerability in the Webserver of SIMATIC Products | 2025-02-11T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-187636 | SSA-187636: Multiple Vulnerabilities in SENTRON 7KT PAC1260 Data Manager | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-920092 | SSA-920092: Memory Corruption Vulnerability in Simcenter Femap | 2025-03-13T00:00:00Z | 2025-03-13T00:00:00Z |
| ssa-787280 | SSA-787280: Unlocked Bootloader Vulnerability in SINAMICS S200 | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-620288 | SSA-620288: Multiple Vulnerabilities (NUCLEUS:13) in Capital Embedded AR Classic | 2021-12-14T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-615740 | SSA-615740: Multiple Vulnerabilities in SINEMA Remote Connect Client Before V3.2 SP3 | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-515903 | SSA-515903: Multiple Vulnerabilities in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-507653 | SSA-507653: Improper Access Control Vulnerabilities in Tecnomatix Plant Simulation | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-434032 | SSA-434032: Input Validation Vulnerability in the DHCP Client of Nucleus RTOS | 2019-11-12T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-280834 | SSA-280834: Improper OpenVPN Credential Validation Vulnerability in SCALANCE M-800 and SC-600 Families | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-248289 | SSA-248289: Denial of Service Vulnerabilities in the IPv6 Stack of Nucleus RTOS | 2021-04-13T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-075201 | SSA-075201: Multiple Vulnerabilities in SCALANCE LPE9403 Before V4.0 | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-073066 | SSA-073066: Multiple Vulnerabilities in SINEMA Remote Connect Server Before V3.2 SP3 | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-050438 | SSA-050438: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and Tecnomatix Plant Simulation | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-992434 | SSA-992434: Directory Traversal Vulnerability in Third-Party Component in SiPass integrated | 2025-02-17T00:00:00Z | 2025-02-17T00:00:00Z |
| ssa-246355 | SSA-246355: Multiple Vulnerabilities in Tableau Server Component of Opcenter Intelligence | 2025-02-11T00:00:00Z | 2025-02-14T00:00:00Z |
| ssa-769027 | SSA-769027: Multiple Vulnerabilities fixed in SCALANCE W700 IEEE 802.11ax devices before V3.0.0 | 2025-02-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-697140 | SSA-697140: Denial of Service Vulnerability in the TCP Event Service of SCALANCE and RUGGEDCOM Products | 2022-10-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-647005 | SSA-647005: Memory Corruption Vulnerability in OpenV2G | 2025-02-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0659-1 | Security update for docker-stable | 2026-02-26T15:08:37Z | 2026-02-26T15:08:37Z |
| suse-su-2026:0658-1 | Security update for libsoup | 2026-02-26T15:07:42Z | 2026-02-26T15:07:42Z |
| suse-su-2026:0657-1 | Security update for libsoup2 | 2026-02-26T15:07:11Z | 2026-02-26T15:07:11Z |
| suse-su-2026:0656-1 | Security update for freerdp | 2026-02-26T15:06:36Z | 2026-02-26T15:06:36Z |
| suse-su-2026:20592-1 | Security update for 7zip | 2026-02-26T13:17:48Z | 2026-02-26T13:17:48Z |
| suse-su-2026:0642-1 | Security update for python313 | 2026-02-26T11:53:34Z | 2026-02-26T11:53:34Z |
| suse-su-2026:20527-1 | Security update for glibc | 2026-02-26T11:33:53Z | 2026-02-26T11:33:53Z |
| suse-su-2026:20531-1 | Security update for libssh | 2026-02-26T11:27:41Z | 2026-02-26T11:27:41Z |
| suse-su-2026:20530-1 | Security update for libpng16 | 2026-02-26T11:26:10Z | 2026-02-26T11:26:10Z |
| suse-su-2026:20526-1 | Security update for rust-keylime | 2026-02-26T11:08:16Z | 2026-02-26T11:08:16Z |
| suse-su-2026:20524-1 | Security update for libssh | 2026-02-26T11:08:16Z | 2026-02-26T11:08:16Z |
| suse-su-2026:20525-1 | Security update for avahi | 2026-02-26T10:54:54Z | 2026-02-26T10:54:54Z |
| suse-su-2026:20523-1 | Security update for libpng16 | 2026-02-26T10:51:48Z | 2026-02-26T10:51:48Z |
| suse-su-2026:20522-1 | Security update for ucode-intel | 2026-02-26T10:48:45Z | 2026-02-26T10:48:45Z |
| suse-su-2026:20591-1 | Security update for python-urllib3_1 | 2026-02-26T09:44:49Z | 2026-02-26T09:44:49Z |
| suse-su-2026:20590-1 | Security update for autogen | 2026-02-26T09:10:42Z | 2026-02-26T09:10:42Z |
| suse-su-2026:0650-1 | Security update for redis | 2026-02-25T16:33:31Z | 2026-02-25T16:33:31Z |
| suse-su-2026:0649-1 | Security update for freerdp | 2026-02-25T16:31:37Z | 2026-02-25T16:31:37Z |
| suse-su-2026:0648-1 | Security update for libjxl | 2026-02-25T16:30:57Z | 2026-02-25T16:30:57Z |
| suse-su-2026:0647-1 | Security update for expat | 2026-02-25T16:30:09Z | 2026-02-25T16:30:09Z |
| suse-su-2026:0646-1 | Security update for expat | 2026-02-25T16:29:24Z | 2026-02-25T16:29:24Z |
| suse-su-2026:0645-1 | Security update for python3 | 2026-02-25T16:29:02Z | 2026-02-25T16:29:02Z |
| suse-su-2026:0644-1 | Security update for python312 | 2026-02-25T16:28:23Z | 2026-02-25T16:28:23Z |
| suse-su-2026:0643-1 | Security update for python39 | 2026-02-25T16:27:51Z | 2026-02-25T16:27:51Z |
| suse-su-2026:0641-1 | Security update for docker-stable | 2026-02-25T16:25:10Z | 2026-02-25T16:25:10Z |
| suse-su-2026:0635-1 | Security update for python-urllib3_1 | 2026-02-25T11:12:53Z | 2026-02-25T11:12:53Z |
| suse-su-2026:0631-1 | Security update 5.1.2 for Multi-Linux Manager Salt Bundle | 2026-02-25T09:47:24Z | 2026-02-25T09:47:24Z |
| suse-su-2026:0630-1 | Security update 5.1.2 for Multi-Linux Manager Client Tools | 2026-02-25T09:46:12Z | 2026-02-25T09:46:12Z |
| suse-su-2026:0629-1 | Security update 5.1.2 for Multi-Linux Manager Salt Bundle | 2026-02-25T09:45:33Z | 2026-02-25T09:45:33Z |
| suse-su-2026:0628-1 | Security update 5.1.2 for Multi-Linux Manager Client Tools | 2026-02-25T09:44:32Z | 2026-02-25T09:44:32Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:1628 | Important: php security update | 2026-02-02T00:00:00Z | 2026-02-02T09:59:40Z |
| alsa-2026:1143 | Important: kernel security update | 2026-01-26T00:00:00Z | 2026-01-30T09:51:59Z |
| alsa-2026:1574 | Important: gimp:2.8 security update | 2026-01-29T00:00:00Z | 2026-01-29T14:07:36Z |
| alsa-2026:0932 | Important: java-1.8.0-openjdk security update | 2026-01-26T00:00:00Z | 2026-01-29T13:07:43Z |
| alsa-2026:1518 | Important: grafana-pcp security update | 2026-01-28T00:00:00Z | 2026-01-29T12:32:40Z |
| alsa-2026:1350 | Moderate: curl security update | 2026-01-27T00:00:00Z | 2026-01-29T12:31:06Z |
| alsa-2026:1334 | Moderate: glibc security update | 2026-01-27T00:00:00Z | 2026-01-29T12:29:45Z |
| alsa-2026:1254 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-29T12:14:07Z |
| alsa-2026:1344 | Important: grafana security update | 2026-01-27T00:00:00Z | 2026-01-29T12:12:24Z |
| alsa-2026:1374 | Moderate: python3.11 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:10:37Z |
| alsa-2026:1380 | Moderate: osbuild-composer security update | 2026-01-27T00:00:00Z | 2026-01-29T12:07:35Z |
| alsa-2026:1408 | Moderate: python3.12 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:05:44Z |
| alsa-2026:1410 | Moderate: python3.11 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:02:18Z |
| alsa-2026:1429 | Important: php:8.3 security update | 2026-01-27T00:00:00Z | 2026-01-29T11:59:57Z |
| alsa-2026:1472 | Important: openssl security update | 2026-01-28T00:00:00Z | 2026-01-28T19:58:47Z |
| alsa-2026:1478 | Moderate: python3.9 security update | 2026-01-28T00:00:00Z | 2026-01-28T19:56:37Z |
| alsa-2026:0933 | Important: java-25-openjdk security update | 2026-01-26T00:00:00Z | 2026-01-28T14:35:03Z |
| alsa-2026:1224 | Important: python3.11-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:28:50Z |
| alsa-2026:1226 | Important: python3.12-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:21:23Z |
| alsa-2026:1087 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:19:22Z |
| alsa-2026:1088 | Important: python3.12-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:17:27Z |
| alsa-2026:1089 | Important: python3.11-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:15:08Z |
| alsa-2026:1148 | Important: kernel-rt security update | 2026-01-26T00:00:00Z | 2026-01-26T13:52:56Z |
| alsa-2026:1142 | Important: kernel security update | 2026-01-26T00:00:00Z | 2026-01-26T13:49:21Z |
| alsa-2026:1086 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-26T13:16:32Z |
| alsa-2026:0928 | Important: java-21-openjdk security update | 2026-01-22T00:00:00Z | 2026-01-26T11:04:56Z |
| alsa-2026:0914 | Important: gimp security update | 2026-01-21T00:00:00Z | 2026-01-26T10:10:46Z |
| alsa-2026:0921 | Important: go-toolset:rhel8 security update | 2026-01-21T00:00:00Z | 2026-01-26T10:07:11Z |
| alsa-2026:0696 | Important: net-snmp security update | 2026-01-15T00:00:00Z | 2026-01-26T10:04:02Z |
| alsa-2026:0923 | Important: golang security update | 2026-01-21T00:00:00Z | 2026-01-24T01:54:58Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-248 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-04-10T00:06:40.907073Z | 2026-01-13T04:44:52.454141Z |
| osv-2024-239 | Use-of-uninitialized-value in H5G__ent_to_link | 2024-04-06T00:11:00.845086Z | 2026-01-13T04:44:11.568412Z |
| osv-2024-223 | UNKNOWN READ in H5HG_read | 2024-04-01T00:01:29.989664Z | 2026-01-13T04:44:02.988515Z |
| osv-2023-1256 | Heap-buffer-overflow in H5T__bit_copy | 2023-12-03T13:02:43.376076Z | 2026-01-13T04:40:40.198673Z |
| osv-2023-1073 | Heap-buffer-overflow in H5D__scatter_mem | 2023-10-27T13:00:49.296462Z | 2026-01-13T04:40:23.305571Z |
| osv-2021-363 | Heap-buffer-overflow in H5HG_read | 2021-02-11T00:00:41.682350Z | 2026-01-13T04:33:24.937147Z |
| osv-2021-219 | UNKNOWN READ in H5HG__cache_heap_deserialize | 2021-01-22T00:01:04.834439Z | 2026-01-13T04:32:50.029402Z |
| osv-2021-184 | Heap-buffer-overflow in H5HL__fl_deserialize | 2021-01-15T00:00:16.202094Z | 2026-01-13T04:27:53.975862Z |
| osv-2026-30 | Use-of-uninitialized-value in vp9_quantize_fp_avx2 | 2026-01-11T00:08:32.391680Z | 2026-01-11T00:08:32.392050Z |
| osv-2026-21 | Use-of-uninitialized-value in processTLSBlock | 2026-01-09T00:20:25.200679Z | 2026-01-09T00:20:25.201303Z |
| osv-2026-2 | Heap-buffer-overflow in cmt_mpack_consume_uint_tag | 2026-01-03T00:15:15.907754Z | 2026-01-03T00:15:15.908130Z |
| osv-2024-395 | Use-of-uninitialized-value in pcapint_filter_with_aux_data | 2024-05-01T00:04:54.392345Z | 2025-12-31T14:19:24.719836Z |
| osv-2024-793 | Heap-buffer-overflow in H5HL__fl_deserialize | 2024-08-16T00:01:45.237305Z | 2025-12-31T14:19:11.515108Z |
| osv-2023-444 | Heap-buffer-overflow in opj_jp2_apply_pclr | 2023-05-31T14:02:00.753503Z | 2025-12-31T14:18:46.286556Z |
| osv-2022-394 | Incorrect-function-pointer-type in cv::split | 2022-05-04T00:00:27.326853Z | 2025-12-31T14:15:38.077191Z |
| osv-2025-1049 | Heap-buffer-overflow in unsigned char* std::__1::vector<unsigned char, std::__1::allocator<unsigned char | 2025-12-31T00:18:06.669541Z | 2025-12-31T00:18:06.670109Z |
| osv-2023-137 | Heap-buffer-overflow in OT::Layout::Common::Coverage::get_population | 2023-03-03T13:00:38.278632Z | 2025-12-28T14:11:53.546267Z |
| osv-2024-1348 | Heap-buffer-overflow in glslang::HlslGrammar::acceptDeclaration | 2024-12-10T00:00:50.788Z | 2025-12-23T15:50:48.626100Z |
| osv-2024-1355 | UNKNOWN READ in glslang::TInfoSinkBase::location | 2024-12-10T00:08:00.540533Z | 2025-12-23T15:50:47.917708Z |
| osv-2024-1346 | UNKNOWN READ in glslang::HlslTokenStream::advanceToken | 2024-12-10T00:00:20.380006Z | 2025-12-23T15:50:47.126469Z |
| osv-2024-1343 | Container-overflow in glslang::HlslParseContext::decomposeIntrinsic | 2024-11-27T00:13:21.103465Z | 2025-12-23T15:50:45.708425Z |
| osv-2025-565 | Heap-buffer-overflow in pcpp::IPv6Address::IPv6Address | 2025-07-21T00:09:57.314960Z | 2025-12-22T14:22:23.333531Z |
| osv-2024-953 | UNKNOWN READ in pcpp::PcapNgFileReaderDevice::getNextPacket | 2024-08-16T00:13:41.933683Z | 2025-12-22T14:21:34.886075Z |
| osv-2024-954 | Use-of-uninitialized-value in pcpp::MplsLayer::toString | 2024-08-16T00:13:43.824630Z | 2025-12-22T14:21:33.246456Z |
| osv-2024-816 | Use-of-uninitialized-value in pcpp::SSLClientHelloMessage::ClientHelloTLSFingerprint::toString | 2024-08-16T00:02:36.618439Z | 2025-12-22T14:21:20.173609Z |
| osv-2024-812 | Use-of-uninitialized-value in pcpp::PcapFileWriterDevice::writePacket | 2024-08-16T00:02:26.387902Z | 2025-12-22T14:21:19.473015Z |
| osv-2024-360 | Heap-buffer-overflow in pcpp::TelnetLayer::getFieldLen | 2024-04-30T00:05:53.016170Z | 2025-12-22T14:20:47.423159Z |
| osv-2024-369 | Segv on unknown address in pcpp::IPv6Layer::~IPv6Layer | 2024-04-30T00:07:01.572543Z | 2025-12-22T14:20:46.950585Z |
| osv-2024-334 | Heap-buffer-overflow in readParsedPacket | 2024-04-30T00:01:24.720399Z | 2025-12-22T14:20:39.449858Z |
| osv-2023-952 | Heap-buffer-overflow in back_passDoAction | 2023-10-02T13:03:05.682426Z | 2025-12-22T14:19:45.912864Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0338 | Arithmetic overflows in cosmwasm-std | 2024-04-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0012 | Stack overflow during recursive JSON parsing | 2024-01-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0011 | Unauthenticated Nonce Increment in snow | 2024-01-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0006 | Multiple issues involving quote API | 2024-01-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0087 | `MaybeUninit` misuse in `simd-json-derive` | 2023-10-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0086 | Multiple soundness issues | 2023-09-03T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0080 | Buffer overflow due to integer overflow in `transpose` | 2023-12-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0077 | Remotely exploitable DoS condition in Rosenpass <=0.2.0 | 2023-11-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0068 | Sequential calls of encryption API (`encrypt`, `wrap`, and `dump`) result in nonce reuse | 2023-10-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0064 | gix-transport code execution vulnerability | 2023-09-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0044 | `openssl` `X509VerifyParamRef::set_host` buffer over-read | 2023-06-20T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0039 | Out-of-bounds array access leads to panic | 2023-05-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0038 | Out-of-bounds array access leads to panic | 2023-05-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2022-0101 | Miscompilation of constant values in division on AArch64 | 2022-07-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2022-0096 | Invalid drop of VMExternRef from partially-initialized instances in the pooling instance allocator | 2022-02-17T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2022-0094 | Mimalloc Can Allocate Memory with Bad Alignment | 2022-11-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2022-0093 | Double Public Key Signing Function Oracle Attack on `ed25519-dalek` | 2022-06-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2021-0154 | Uninitalized memory read & leak caused by fuser crate | 2021-09-10T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2021-0132 | Integer overflow in the bundled Brotli C library | 2021-12-20T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0112 | Possible host crash with host-to-wasm component intrinsics | 2025-07-18T12:00:00Z | 2025-10-25T11:20:30Z |
| rustsec-2025-0110 | astral-tokio-tar Vulnerable to PAX Header Desynchronization | 2025-10-21T12:00:00Z | 2025-10-25T11:18:52Z |
| rustsec-2025-0075 | `unic-char-range` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-22T14:41:04Z |
| rustsec-2025-0104 | `unic-ucd-segment` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0103 | `unic-ucd-core` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0102 | `unic-ucd-age` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0101 | `unic-ucd-common` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0100 | `unic-ucd-ident` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0099 | `unic-ucd-block` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0098 | `unic-ucd-version` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0097 | `unic-idna-mapping` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-python-2026-0672 | Header injection in http.cookies.Morsel | 2026-01-26T14:50:03.015Z | 2026-02-20T15:52:56.451Z |
| bit-libpython-2026-0672 | Header injection in http.cookies.Morsel | 2026-01-26T14:43:32.238Z | 2026-02-20T15:52:56.451Z |
| bit-nifi-2026-25903 | Apache NiFi: Missing Authorization of Restricted Permissions for Component Updates | 2026-02-20T08:45:57.883Z | 2026-02-20T09:09:49.097Z |
| bit-milvus-2025-64513 | Milvus Proxy has Critical Authentication Bypass Vulnerability | 2026-02-20T08:43:34.608Z | 2026-02-20T09:09:49.097Z |
| bit-jenkins-2026-27100 | 2026-02-20T08:43:34.823Z | 2026-02-20T09:09:49.097Z | |
| bit-jenkins-2026-27099 | 2026-02-20T08:43:33.019Z | 2026-02-20T09:09:49.097Z | |
| bit-milvus-2026-26190 | Milvus Allows Unauthenticated Access to Restful API on Metrics Port (9091) Leads to Critical System Compromise | 2026-02-19T08:47:10.808Z | 2026-02-19T09:13:37.164Z |
| bit-gitlab-2021-22175 | 2024-03-06T11:20:35.887Z | 2026-02-19T09:13:37.164Z | |
| bit-grafana-2026-21720 | Unauthenticated DoS: avatar cache leaks goroutines when /avatar/:hash requests time out | 2026-02-18T17:41:21.379Z | 2026-02-18T18:09:39.057Z |
| bit-postgresql-2026-2007 | PostgreSQL pg_trgm heap buffer overflow writes pattern onto server memory | 2026-02-16T16:03:46.313Z | 2026-02-16T16:32:40.318Z |
| bit-postgresql-2026-2006 | PostgreSQL missing validation of multibyte character length executes arbitrary code | 2026-02-16T16:03:41.880Z | 2026-02-16T16:32:40.318Z |
| bit-postgresql-2026-2005 | PostgreSQL pgcrypto heap buffer overflow executes arbitrary code | 2026-02-16T16:03:36.943Z | 2026-02-16T16:32:40.318Z |
| bit-postgresql-2026-2004 | PostgreSQL intarray missing validation of type of input to selectivity estimator executes arbitrary code | 2026-02-16T16:03:32.935Z | 2026-02-16T16:32:40.318Z |
| bit-postgresql-2026-2003 | PostgreSQL oidvector discloses a few bytes of memory | 2026-02-16T16:03:27.354Z | 2026-02-16T16:32:40.318Z |
| bit-pip-2026-1703 | Limited path traversal when installing wheel archives | 2026-02-16T15:59:06.080Z | 2026-02-16T16:32:40.318Z |
| bit-pillow-2026-25990 | Pillow has an out-of-bounds write when loading PSD images | 2026-02-16T16:02:06.871Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-1458 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-02-16T16:31:06.973Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-1456 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-02-16T16:31:05.146Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-1282 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in GitLab | 2026-02-16T16:31:03.017Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-1094 | Improper Validation of Unsafe Equivalence in Input in GitLab | 2026-02-16T16:30:59.417Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-0958 | Interpretation Conflict in GitLab | 2026-02-16T16:30:57.233Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-0595 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-02-16T16:30:53.679Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-8099 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-02-16T16:30:40.312Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-7659 | Origin Validation Error in GitLab | 2026-02-16T16:30:29.449Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-14594 | Authorization Bypass Through User-Controlled Key in GitLab | 2026-02-16T16:28:35.547Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-14592 | Missing Authorization in GitLab | 2026-02-16T16:28:33.785Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-14560 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-02-16T16:28:32.048Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-12073 | Server-Side Request Forgery (SSRF) in GitLab | 2026-02-16T16:27:53.661Z | 2026-02-16T16:32:40.318Z |
| bit-dotnet-2026-21218 | .NET Spoofing Vulnerability | 2026-02-16T15:58:16.593Z | 2026-02-16T16:32:40.318Z |
| bit-moodle-2025-67857 | Moodle: moodle: data exposure of user identifiers in urls | 2026-02-12T08:51:13.591Z | 2026-02-12T09:10:24.600Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ts12850 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:17:53.937628Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tr11635 | Cancelling a query (e | 2026-01-30T15:46:54.229170Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tl71584 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:23:53.438748Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tk38210 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:46:25.995358Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ti76190 | Cancelling a query (e | 2026-01-30T15:02:23.296683Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-th00404 | Within HostnameError | 2026-01-30T14:04:20.735662Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tf52804 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:08:23.107112Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tf33105 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:29:25.639055Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sy95837 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:28:53.594094Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sw55801 | Within HostnameError | 2026-01-30T16:24:55.642434Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sv79070 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:47:54.520743Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-su64392 | Cancelling a query (e | 2026-01-30T15:07:22.975031Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sq13072 | Moby is an open source container framework developed by Docker Inc | 2026-01-30T15:02:22.907312Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-so95938 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:11:25.480356Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-so17846 | Within HostnameError | 2026-01-30T16:30:25.764771Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-so16176 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:39:24.255623Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sj80413 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:16:55.110567Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sh75345 | Cancelling a query (e | 2026-01-30T15:05:23.442396Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sg80587 | It was found that the cookie used for CSRF prevention in Keycloak was not unique to each session | 2026-01-30T14:00:21.027172Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sb85645 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T17:00:56.485426Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sb25660 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T16:44:27.197226Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ry09679 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:31:53.660443Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rx06615 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:45:24.056160Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rw65075 | Within HostnameError | 2026-01-30T15:35:53.815887Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ru37859 | Cancelling a query (e | 2026-01-30T15:39:24.210234Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rt10702 | Within HostnameError | 2026-01-30T16:30:25.697056Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rr90125 | Cancelling a query (e | 2026-01-30T15:32:53.790454Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rq53330 | Within HostnameError | 2026-01-30T15:17:53.658995Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rn77098 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:25:55.300453Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rl45001 | tar | 2026-01-30T15:01:22.967754Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2020-ale-016 | Vulnérabilité dans Microsoft Domain Name System (DNS) Server | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| CERTFR-2020-ALE-017 | Multiples vulnérabilités dans SAP Netweaver AS JAVA | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| CERTFR-2020-ALE-016 | Vulnérabilité dans Microsoft Domain Name System (DNS) Server | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| certfr-2020-ale-015 | Vulnérabilité dans F5 BIG-IP | 2020-07-05T00:00:00.000000 | 2020-09-15T00:00:00.000000 |
| CERTFR-2020-ALE-015 | Vulnérabilité dans F5 BIG-IP | 2020-07-05T00:00:00.000000 | 2020-09-15T00:00:00.000000 |
| certfr-2020-ale-014 | Vulnérabilité dans Palo Alto Networks PAN-OS | 2020-07-03T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-012 | Multiples vulnérabilités dans SaltStack | 2020-05-04T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-008 | Vulnérabilité dans l'implémentation du protocole SMB par Microsoft | 2020-03-11T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-002 | Vulnérabilité dans les produits Citrix ADC et Citrix Gateway | 2020-01-09T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-014 | Vulnérabilité dans Palo Alto Networks PAN-OS | 2020-07-03T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-012 | Multiples vulnérabilités dans SaltStack | 2020-05-04T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-008 | Vulnérabilité dans l'implémentation du protocole SMB par Microsoft | 2020-03-11T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-002 | Vulnérabilité dans les produits Citrix ADC et Citrix Gateway | 2020-01-09T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-013 | Multiples vulnérabilités dans Microsoft Windows | 2020-07-01T00:00:00.000000 | 2020-07-05T00:00:00.000000 |
| CERTFR-2020-ALE-013 | Multiples vulnérabilités dans Microsoft Windows | 2020-07-01T00:00:00.000000 | 2020-07-05T00:00:00.000000 |
| certfr-2020-ale-011 | Multiples vulnérabilités dans les produits Microsoft qui utilisent la bibliothèque Autodesk FBX | 2020-04-22T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-ale-009 | Multiples vulnérabilités dans Microsoft Windows | 2020-03-24T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| CERTFR-2020-ALE-011 | Multiples vulnérabilités dans les produits Microsoft qui utilisent la bibliothèque Autodesk FBX | 2020-04-22T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| CERTFR-2020-ALE-009 | Multiples vulnérabilités dans Microsoft Windows | 2020-03-24T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-ale-010 | Multiples vulnérabilités dans Mozilla Firefox | 2020-04-06T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-007 | Vulnérabilité dans Microsoft Exchange Server | 2020-02-27T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-001 | Multiples vulnérabilités dans les produits de Pulse Secure | 2020-01-09T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| CERTFR-2020-ALE-010 | Multiples vulnérabilités dans Mozilla Firefox | 2020-04-06T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| CERTFR-2020-ALE-007 | Vulnérabilité dans Microsoft Exchange Server | 2020-02-27T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| CERTFR-2020-ALE-001 | Multiples vulnérabilités dans les produits de Pulse Secure | 2020-01-09T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2020-01-20T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-ale-005 | Multiples vulnérabilités dans le serveur de passerelle RDP de Windows | 2020-01-14T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| CERTFR-2020-ALE-006 | Vulnérabilité dans Microsoft Internet Explorer | 2020-01-20T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| CERTFR-2020-ALE-005 | Multiples vulnérabilités dans le serveur de passerelle RDP de Windows | 2020-01-14T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-ale-003 | Vulnérabilité dans les produits Mozilla | 2020-01-09T00:00:00.000000 | 2020-01-20T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0153 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0152 | Multiples vulnérabilités dans Microsoft Azure | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0151 | Vulnérabilité dans Microsoft .Net | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0150 | Multiples vulnérabilités dans Microsoft Windows | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0149 | Multiples vulnérabilités dans Microsoft Office | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0148 | Multiples vulnérabilités dans les produits Intel | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0147 | Multiples vulnérabilités dans les produits Fortinet | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0146 | Multiples vulnérabilités dans GitLab | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0145 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0143 | Multiples vulnérabilités dans Synology Storage Manager | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0142 | Multiples vulnérabilités dans MongoDB | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0153 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0152 | Multiples vulnérabilités dans Microsoft Azure | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0151 | Vulnérabilité dans Microsoft .Net | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0150 | Multiples vulnérabilités dans Microsoft Windows | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0149 | Multiples vulnérabilités dans Microsoft Office | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0148 | Multiples vulnérabilités dans les produits Intel | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0147 | Multiples vulnérabilités dans les produits Fortinet | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0146 | Multiples vulnérabilités dans GitLab | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0145 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0143 | Multiples vulnérabilités dans Synology Storage Manager | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0142 | Multiples vulnérabilités dans MongoDB | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0141 | Multiples vulnérabilités dans les produits SAP | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0140 | Multiples vulnérabilités dans les produits Axis | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0139 | Multiples vulnérabilités dans les produits Siemens | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0138 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0137 | Multiples vulnérabilités dans GnuTLS | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0133 | Multiples vulnérabilités dans Roundcube | 2026-02-09T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| CERTFR-2026-AVI-0141 | Multiples vulnérabilités dans les produits SAP | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| CERTFR-2026-AVI-0140 | Multiples vulnérabilités dans les produits Axis | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000046 | SLNX Help Documentation of RICOH Streamline NX vulnerable to reflected cross-site scripting | 2025-06-30T15:45+09:00 | 2025-06-30T15:45+09:00 |
| jvndb-2025-007552 | Multiple vulnerabilities in TB-eye network recorders and AHD recorders | 2025-06-30T14:45+09:00 | 2025-06-30T14:45+09:00 |
| jvndb-2024-004595 | Multiple vulnerabilities in FutureNet NXR series, VXR series and WXR series | 2024-07-29T17:51+09:00 | 2025-06-30T09:56+09:00 |
| jvndb-2025-000043 | Multiple vulnerabilities in iroha Board | 2025-06-26T15:13+09:00 | 2025-06-26T15:13+09:00 |
| jvndb-2025-000042 | Inefficient regular expressions in GROWI | 2025-06-24T15:25+09:00 | 2025-06-24T15:25+09:00 |
| jvndb-2025-007390 | Trend Micro Internet Security and Trend Micro Maximum Security vulnerable to link following local privilege escalation (CVE-2025-49384, CVE-2025-49385) | 2025-06-24T11:18+09:00 | 2025-06-24T11:18+09:00 |
| jvndb-2025-000040 | KCM3100 vulnerable to authentication bypass using an alternate path or channel | 2025-06-18T13:42+09:00 | 2025-06-18T13:42+09:00 |
| jvndb-2025-000039 | Multiple vulnerabilities in RICOH Streamline NX PC Client | 2025-06-13T16:09+09:00 | 2025-06-13T16:09+09:00 |
| jvndb-2025-000038 | UpdateNavi vulnerable to improper restriction of communication channel to intended endpoints | 2025-06-12T15:56+09:00 | 2025-06-12T15:56+09:00 |
| jvndb-2025-000037 | Multiple surveillance cameras provided by i-PRO Co., Ltd. vulnerable to cross-site request forgery | 2025-06-06T13:56+09:00 | 2025-06-06T13:56+09:00 |
| jvndb-2025-000036 | TimeWorks vulnerable to path traversal | 2025-06-03T15:35+09:00 | 2025-06-03T15:35+09:00 |
| jvndb-2025-000035 | Improper file access permission settings in PC Time Tracer | 2025-06-03T14:40+09:00 | 2025-06-03T14:40+09:00 |
| jvndb-2025-000034 | Multiple vulnerabilities in wivia 5 | 2025-05-30T15:57+09:00 | 2025-05-30T15:57+09:00 |
| jvndb-2025-001238 | Multiple out-of-bounds write vulnerabilities in Canon Office/Small Office Multifunction Printers and Laser Printers | 2025-01-29T13:41+09:00 | 2025-05-27T16:06+09:00 |
| jvndb-2025-000032 | Mailform Pro CGI generating error messages containing sensitive information | 2025-05-26T14:22+09:00 | 2025-05-26T14:22+09:00 |
| jvndb-2025-000033 | Improper pattern file validation in i-FILTER optional feature 'Anti-Virus & Sandbox' | 2025-05-23T15:36+09:00 | 2025-05-23T15:36+09:00 |
| jvndb-2025-005467 | Passback vulnerabilities in Canon Production Printers, Office/Small Office Multifunction Printers, and Laser Printers | 2025-05-22T15:03+09:00 | 2025-05-22T15:03+09:00 |
| jvndb-2024-000117 | Stack-based buffer overflow vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor | 2024-10-31T16:44+09:00 | 2025-05-19T17:59+09:00 |
| jvndb-2025-005107 | Multiple vulnerabilities in V-SFT | 2025-05-16T14:32+09:00 | 2025-05-16T14:32+09:00 |
| jvndb-2025-005057 | Multiple vulnerabilities in I-O DATA network attached hard disk 'HDL-T Series' | 2025-05-15T18:27+09:00 | 2025-05-15T18:27+09:00 |
| jvndb-2025-005050 | Multiple vulnerabilities in a-blog cms | 2025-05-15T18:11+09:00 | 2025-05-15T18:11+09:00 |
| jvndb-2025-000031 | Pgpool-II vulnerable to authentication bypass by primary weakness | 2025-05-15T16:14+09:00 | 2025-05-15T16:14+09:00 |
| jvndb-2025-004863 | Panasonic IR Control Hub vulnerable to Unauthorised firmware loading | 2025-05-14T11:30+09:00 | 2025-05-14T11:30+09:00 |
| jvndb-2025-004671 | Multiple vulnerabilities in GL-MT2500 and GL-MT2500A | 2025-05-12T17:52+09:00 | 2025-05-12T17:52+09:00 |
| jvndb-2025-001016 | OMRON NJ/NX series vulnerable to path traversal | 2025-02-06T18:27+09:00 | 2025-05-08T17:44+09:00 |
| jvndb-2025-004079 | Improper access permission settings in multiple SEIKO EPSON printer drivers for Windows OS | 2025-04-30T11:46+09:00 | 2025-04-30T11:46+09:00 |
| jvndb-2025-004076 | Security Update for Trend Micro Trend Vision One (April 2025) | 2025-04-30T10:38+09:00 | 2025-04-30T10:38+09:00 |
| jvndb-2025-000029 | Multiple vulnerabilities in Quick Agent | 2025-04-25T13:49+09:00 | 2025-04-25T13:49+09:00 |
| jvndb-2025-000028 | i-PRO Configuration Tool vulnerable to use of hard-coded cryptographic key | 2025-04-24T13:50+09:00 | 2025-04-24T13:50+09:00 |
| jvndb-2025-000027 | Active! mail vulnerable to stack-based buffer overflow | 2025-04-18T16:50+09:00 | 2025-04-18T16:50+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-12682 | Cisco IOS XE Software代码问题漏洞 | 2025-09-28 | 2026-03-05 |
| cnvd-2026-12681 | Cisco Unified Contact Center Express代码问题漏洞 | 2025-11-10 | 2026-03-05 |
| cnvd-2026-12680 | Cisco Unified Contact Center Express路径遍历漏洞 | 2025-11-10 | 2026-03-05 |
| cnvd-2026-12679 | Cisco Unified Contact Center Express代码问题漏洞 | 2025-11-10 | 2026-03-05 |
| cnvd-2026-12678 | Cisco Unified Contact Center Express代码问题漏洞 | 2025-11-10 | 2026-03-05 |
| cnvd-2026-12677 | Cisco Catalyst Center操作系统命令注入漏洞 | 2025-11-28 | 2026-03-05 |
| cnvd-2026-12676 | Cisco Catalyst Center跨站脚本漏洞 | 2025-11-28 | 2026-03-05 |
| cnvd-2026-12675 | Cisco Catalyst Center Virtual Appliance输入验证错误漏洞 | 2025-11-28 | 2026-03-05 |
| cnvd-2026-12674 | Cisco Identity Services Engine跨站脚本漏洞(CNVD-2026-12674) | 2026-02-04 | 2026-03-05 |
| cnvd-2026-12673 | Cisco Meeting Management(CMM)代码问题漏洞 | 2026-02-06 | 2026-03-05 |
| cnvd-2026-12672 | IBM Cloud Pak for Business Automation存在XSS漏洞 | 2026-02-11 | 2026-03-05 |
| cnvd-2026-12671 | IBM Concert存在弱密码算法漏洞 | 2026-02-11 | 2026-03-05 |
| cnvd-2026-12670 | IBM Cloud Pak for Business Automation存在拒绝服务漏洞 | 2026-02-11 | 2026-03-05 |
| cnvd-2026-12669 | IBM Business Automation Workflow containers和IBM Business Automation Workflow traditional存… | 2026-02-11 | 2026-03-05 |
| cnvd-2026-12668 | IBM webMethods Integration Server存在HTML注入漏洞 | 2026-03-02 | 2026-03-05 |
| cnvd-2026-12667 | IBM Sterling B2B Integrator和IBM Sterling File Gateway存在信息泄露漏洞 | 2026-03-02 | 2026-03-05 |
| cnvd-2026-12666 | IBM MQ Operator和IBM‑supplied MQ Advanced container images存在日志注入漏洞 | 2026-03-02 | 2026-03-05 |
| cnvd-2026-12665 | IBM Db2存在拒绝服务漏洞 | 2026-03-02 | 2026-03-05 |
| cnvd-2026-12664 | IBM Db2存在XML外部实体注入漏洞 | 2026-03-02 | 2026-03-05 |
| cnvd-2026-12663 | IBM Concert存在弱密码算法漏洞 | 2026-03-02 | 2026-03-05 |
| cnvd-2026-12896 | Apache Syncope代码问题漏洞 | 2026-02-10 | 2026-03-04 |
| cnvd-2026-12895 | Apache Syncope跨站脚本漏洞 | 2026-02-10 | 2026-03-04 |
| cnvd-2026-12894 | Apache Druid认证绕过漏洞 | 2026-02-13 | 2026-03-04 |
| cnvd-2026-12893 | Apache Superset输入验证漏洞 | 2026-02-27 | 2026-03-04 |
| cnvd-2026-12892 | Apache Shiro身份验证绕过漏洞 | 2026-03-02 | 2026-03-04 |
| cnvd-2026-12702 | Adobe After Effects存在内存释放后使用漏洞 | 2026-03-02 | 2026-03-04 |
| cnvd-2026-12701 | Adobe After Effects存在二进制漏洞 | 2026-03-02 | 2026-03-04 |
| cnvd-2026-12700 | Adobe Substance 3D Stager存在越界读取漏洞 | 2026-03-02 | 2026-03-04 |
| cnvd-2026-12699 | Adobe Substance 3D Stager存在越界读取漏洞(CNVD-2026-12699) | 2026-03-02 | 2026-03-04 |
| cnvd-2026-12698 | Adobe Substance 3D Stager存在越界写入漏洞 | 2026-03-02 | 2026-03-04 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15548 | Уязвимость компонента jfs/file.c ядра операционной системы Linux, позволяющая нарушителю … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15547 | Уязвимость компонента fs/ext4/inline.c ядра операционной системы Linux, позволяющая наруш… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15546 | Уязвимость драйвера gve ядра операционной системы Linux, позволяющая нарушителю вызвать о… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15545 | Уязвимость компонента arch/parisc/kernel/syscall.S ядра операционной системы Linux, позво… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15544 | Уязвимость компонента arch/parisc/include/asm/uaccess.h ядра операционной системы Linux, … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15543 | Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | 11.12.2025 | 16.02.2026 |
| bdu:2025-15289 | Уязвимость функции atmtcp_recv_control() ядра операционной системы Linux, позволяющая нар… | 08.12.2025 | 16.02.2026 |
| bdu:2025-15261 | Уязвимость компонента hid-asus.c ядра операционной системы Linux, позволяющая нарушителю … | 05.12.2025 | 16.02.2026 |
| bdu:2025-15252 | Уязвимость функции sctp_v6_from_sk() ядра операционной системы Linux, позволяющая нарушит… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15248 | Уязвимость функции btrfs_copy_root() компонента btrfs ядра операционной системы Linux, по… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15240 | Уязвимость функции blk_stack_limits() компонента block/blk-settings.c ядра операционной с… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15238 | Уязвимость библиотеки resolv языка программирования Ruby, позволяющая нарушителю вызвать … | 05.12.2025 | 16.02.2026 |
| bdu:2025-15231 | Уязвимость функции tls_do_decryption() (net/tls/tls_sw.c) ядра операционной системы Linux… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15230 | Уязвимость функций ovl_encode_real_fh() (fs/overlayfs/copy_up.c) и show_mark_fhandle() (f… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15228 | Уязвимость системы мониторинга ИТ-инфраструктуры Zabbix, связанная с хранением пароля в н… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15227 | Уязвимость ядра операционной системы Linux, связанная с ошибками инициализации памяти, по… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15226 | Уязвимость компонента drivers/soc/qcom/mdt_loader.c ядра операционной системы Linux, позв… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15225 | Уязвимость модуля vfs_streams_xattr пакета программ сетевого взаимодействия Samba, позвол… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15224 | Уязвимость функции Item_direct_view_ref::derived_field_transformer_for_where системы упра… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15223 | Уязвимость функции pci_epf_remove_cfs() компонента drivers/pci/endpoint/pci-epf-core.c яд… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15222 | Уязвимость функции JOIN::fix_all_splittings_in_plan системы управления базами данных Mari… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15221 | Уязвимость системы управления базами данных MariaDB, связанная с неправильным порядком по… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15220 | Уязвимость функции jbd2_log_do_checkpoint() компонента fs/jbd2/checkpoint.c ядра операцио… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15218 | Уязвимость функции relocate_one_folio() модуля fs/btrfs/relocation.c поддержки файловой с… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15216 | Уязвимость функций EXPORT_SYMBOL(), destroy_cm_id() и cm_work_handler() ядра операционной… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15213 | Уязвимость функции usb_parse_ss_endpoint_companion() компонента drivers/usb/core/config.c… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15212 | Уязвимость компонента fs/btrfs/qgroup.c ядра операционной системы Linux, позволяющая нару… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15211 | Уязвимость компонента fs ядра операционной системы Linux, позволяющая нарушителю вызвать … | 05.12.2025 | 16.02.2026 |
| bdu:2025-15209 | Уязвимость компонента media/usb/usbtv/usbtv-video.c ядра операционной системы Linux, позв… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15201 | Уязвимость компонента qcom/venus/core.c ядра операционной системы Linux, позволяющая нару… | 05.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201106-0026 | Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.181.22 on Wind… | 2024-07-23T22:03:48.916000Z |
| var-202005-1028 | A malicious actor who intentionally exploits this lack of effective limitation on the num… | 2024-07-23T22:03:40.061000Z |
| var-201911-1619 | Improper invalidation for page table updates by a virtual guest operating system for mult… | 2024-07-23T22:03:40.870000Z |
| var-201505-0337 | The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorit… | 2024-07-23T22:03:40.995000Z |
| var-201912-0533 | This issue was addressed with improved transparency. This issue is fixed in iOS 12.2. A u… | 2024-07-23T22:03:39.534000Z |
| var-201908-0265 | Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a … | 2024-07-23T22:03:39.695000Z |
| var-200103-0056 | Network Dynamic Data Exchange (DDE) in Windows 2000 allows local users to gain SYSTEM pri… | 2024-07-23T22:03:07.478000Z |
| var-202109-1368 | A type confusion issue was addressed with improved state handling. This issue is fixed in… | 2024-07-23T22:03:02.962000Z |
| var-200609-1249 | The Security Framework in Apple Mac OS X 10.3.9, and 10.4.x before 10.4.7, does not prope… | 2024-07-23T22:03:02.065000Z |
| var-201904-1344 | Multiple memory corruption issues were addressed with improved input validation. This iss… | 2024-07-23T22:03:00.873000Z |
| var-202108-2039 | A logic issue was addressed with improved state management. This issue is fixed in macOS … | 2024-07-23T22:02:34.481000Z |
| var-201006-1259 | Double free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 1… | 2024-07-23T22:02:34.562000Z |
| var-201707-0592 | Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre att… | 2024-07-23T22:02:33.954000Z |
| var-201109-0190 | Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allow… | 2024-07-23T22:02:33.523000Z |
| var-200803-0016 | CFNetwork in Apple Mac OS X 10.4.11 allows remote HTTPS proxy servers to spoof secure web… | 2024-07-23T22:01:55.420000Z |
| var-201912-1850 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:01:51.188000Z |
| var-200609-1027 | Buffer overflow in PPP on Apple Mac OS X 10.4.x up to 10.4.8 and 10.3.x up to 10.3.9, whe… | 2024-07-23T22:01:14.362000Z |
| var-201904-1408 | A memory corruption issue was addressed with improved state management. This issue affect… | 2024-07-23T22:01:11.971000Z |
| var-202201-0372 | lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. The vu… | 2024-07-23T22:01:10.106000Z |
| var-200612-0136 | Buffer overflow in the glob implementation (glob.c) in libc in NetBSD-current before 2005… | 2024-07-23T22:01:10.008000Z |
| var-201609-0593 | Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.… | 2024-07-23T22:01:08.857000Z |
| var-201304-0375 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:01:08.426000Z |
| var-201210-0270 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:01:08.344000Z |
| var-200603-0279 | Directory traversal vulnerability in the BOM framework in Mac OS X 10.x before 10.3.9 and… | 2024-07-23T22:01:08.748000Z |
| var-201904-1397 | An input validation issue was addressed with improved input validation. This issue affect… | 2024-07-23T22:01:07.123000Z |
| var-200704-0213 | load_webdav in Apple Mac OS X 10.3.9 through 10.4.9 does not properly clean the environme… | 2024-07-23T22:00:36.528000Z |
| var-201711-0480 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T21:59:32.421000Z |
| var-200102-0030 | The Web interface to Cisco 600 routers running CBOS 2.4.1 and earlier allow remote attack… | 2024-07-23T21:59:32.267000Z |
| var-202207-0381 | A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.20.0, <18.5… | 2024-07-23T21:59:00.866000Z |
| var-201801-1708 | The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before… | 2024-07-23T21:58:56.016000Z |