Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-42291 |
6.8 (3.1)
|
SysReptor: Read-write access to personal notes by shar… |
Syslifters |
sysreptor |
2026-05-08T21:57:51.099Z | 2026-05-08T21:57:51.099Z |
| CVE-2026-42206 |
5.7 (4.0)
|
Roadiz OpenID Connect nonce generated but never valida… |
roadiz |
core-bundle-dev-app |
2026-05-08T21:54:32.715Z | 2026-05-08T21:54:32.715Z |
| CVE-2026-42287 |
10 (4.0)
|
Emlog: SQL Injection Vulnerability in log_model.php wi… |
emlog |
emlog |
2026-05-08T21:51:52.652Z | 2026-05-08T21:51:52.652Z |
| CVE-2026-42286 |
8.4 (4.0)
|
Emlog: Cross-Site Request Forgery in Admin Functions |
emlog |
emlog |
2026-05-08T21:51:11.862Z | 2026-05-08T21:51:11.862Z |
| CVE-2026-41517 |
0 (4.0)
|
Emlog: Remote Code Execution via Malicious Plugin Upload |
emlog |
emlog |
2026-05-08T21:50:27.441Z | 2026-05-08T21:50:27.441Z |
| CVE-2026-41486 |
8.9 (4.0)
|
Ray: Remote Code Execution via Parquet Arrow Extension… |
ray-project |
ray |
2026-05-08T21:46:14.442Z | 2026-05-08T21:46:14.442Z |
| CVE-2026-42209 |
6.5 (3.1)
|
FlashMQ: Division by zero crash when using non-default… |
halfgaar |
FlashMQ |
2026-05-08T21:40:43.284Z | 2026-05-08T21:40:43.284Z |
| CVE-2026-42213 |
5.1 (4.0)
|
SolidCAM-GPPL-IDE: Path traversal in `inc` directive e… |
anzory |
SolidCAM-GPPL-IDE |
2026-05-08T21:38:40.860Z | 2026-05-08T21:38:40.860Z |
| CVE-2026-42212 |
7.1 (4.0)
|
SolidCAM-GPPL-IDE: XML External Entity (XXE) and billi… |
anzory |
SolidCAM-GPPL-IDE |
2026-05-08T21:35:29.642Z | 2026-05-08T21:35:29.642Z |
| CVE-2025-63704 |
9.8 (3.1)
|
NPM package query-parser-string 1.0.0 is vulnerab… |
n/a |
n/a |
2026-05-07T00:00:00.000Z | 2026-05-08T21:30:45.836Z |
| CVE-2026-41902 |
9.1 (3.1)
|
FreeScout's user invitation hash never expires: perman… |
freescout-help-desk |
freescout |
2026-05-07T18:03:50.599Z | 2026-05-08T21:30:39.598Z |
| CVE-2026-42241 |
5.3 (3.1)
|
ParquetSharp: Possible Stack Overflow When Reading a P… |
G-Research |
ParquetSharp |
2026-05-07T18:52:06.773Z | 2026-05-08T21:30:27.110Z |
| CVE-2026-8088 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
OSGeo gdal GDapi.c GDfieldinfo out-of-bounds |
OSGeo |
gdal |
2026-05-07T19:30:11.704Z | 2026-05-08T21:30:21.341Z |
| CVE-2026-39836 |
7.5 (3.1)
|
Panic in Dial and LookupPort when handling NUL byte on… |
Go standard library |
net |
2026-05-07T19:41:18.300Z | 2026-05-08T21:30:15.127Z |
| CVE-2026-39825 |
5.3 (3.1)
|
ReverseProxy forwards queries with more than urlmaxque… |
Go standard library |
net/http/httputil |
2026-05-07T19:41:18.453Z | 2026-05-08T21:30:08.872Z |
| CVE-2026-42499 |
7.5 (3.1)
|
Quadratic string concatenation in consumePhrase in net/mail |
Go standard library |
net/mail |
2026-05-07T19:41:18.615Z | 2026-05-08T21:29:59.662Z |
| CVE-2026-39819 |
5.3 (3.1)
|
Invoking "go bug" follows symlinks in predictable temp… |
Go toolchain |
cmd/go |
2026-05-07T19:41:18.849Z | 2026-05-08T21:29:53.674Z |
| CVE-2026-39817 |
5.9 (3.1)
|
Invoking "go tool pack" does not sanitize output paths… |
Go toolchain |
cmd/go |
2026-05-07T19:41:18.993Z | 2026-05-08T21:29:47.246Z |
| CVE-2026-26129 |
7.5 (3.1)
|
M365 Copilot Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Copilot's Business Chat |
2026-05-07T20:58:24.050Z | 2026-05-08T21:29:40.688Z |
| CVE-2026-41928 |
6.9 (4.0)
5.3 (3.1)
|
Vvveb < 1.0.8.2 Information Disclosure via Cron Controller |
givanz |
Vvveb |
2026-05-07T21:13:13.870Z | 2026-05-08T21:29:28.507Z |
| CVE-2026-8115 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
gyoridavid short-video-maker REST API rest.ts path traversal |
gyoridavid |
short-video-maker |
2026-05-07T22:45:11.302Z | 2026-05-08T21:29:22.812Z |
| CVE-2024-33724 |
5.4 (3.1)
|
SOPlanning 1.52.00 is vulnerable to Cross Site Sc… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T21:29:15.895Z |
| CVE-2025-69690 |
9.1 (3.1)
|
Netgate pfSense CE 2.7.2 allows code execution by… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T21:29:10.073Z |
| CVE-2025-69691 |
9.9 (3.1)
|
Netgate pfSense CE 2.8.0 allows code execution in… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T21:29:04.070Z |
| CVE-2026-8122 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open5GS NSSF message.c ogs_sbi_discovery_option_add_se… |
n/a |
Open5GS |
2026-05-08T00:45:09.870Z | 2026-05-08T21:28:56.850Z |
| CVE-2026-8128 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
SourceCodester SUP Online Shopping viewmsg.php sql injection |
SourceCodester |
SUP Online Shopping |
2026-05-08T02:15:09.625Z | 2026-05-08T21:28:51.228Z |
| CVE-2026-43941 |
9.6 (3.1)
|
Unvalidated shell.openExternal in electerm allows arbi… |
electerm |
electerm |
2026-05-08T03:01:12.461Z | 2026-05-08T21:28:44.766Z |
| CVE-2026-42150 |
5.1 (3.1)
|
wlc: print_html outputs API data without HTML escaping… |
WeblateOrg |
wlc |
2026-05-08T03:23:12.234Z | 2026-05-08T21:28:38.342Z |
| CVE-2026-41498 |
3.3 (3.1)
|
Kimai: Team API Missing Object-Level Authorization |
kimai |
kimai |
2026-05-08T03:30:32.310Z | 2026-05-08T21:28:32.582Z |
| CVE-2026-8136 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
SourceCodester Pharmacy Sales and Inventory System ind… |
SourceCodester |
Pharmacy Sales and Inventory System |
2026-05-08T03:45:08.503Z | 2026-05-08T21:28:20.603Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-8088 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
OSGeo gdal GDapi.c GDfieldinfo out-of-bounds |
OSGeo |
gdal |
2026-05-07T19:30:11.704Z | 2026-05-08T21:30:21.341Z |
| CVE-2026-8090 |
7.3 (3.1)
|
Use-after-free in the DOM: Networking component |
Mozilla |
Firefox |
2026-05-07T12:45:04.609Z | 2026-05-08T12:19:00.246Z |
| CVE-2026-42271 |
8.7 (4.0)
|
LiteLLM: Authenticated command execution via MCP stdio… |
BerriAI |
litellm |
2026-05-08T03:35:16.758Z | 2026-05-09T03:55:48.638Z |
| CVE-2026-27644 |
6.5 (3.1)
|
traccar allows CSV formula injection via exported posi… |
traccar |
traccar |
2026-05-05T12:12:49.342Z | 2026-05-05T13:11:01.742Z |
| CVE-2026-27693 |
5.4 (3.1)
|
traccar allows XML injection in KML and GPX exports |
traccar |
traccar |
2026-05-05T12:17:07.898Z | 2026-05-06T12:43:31.211Z |
| CVE-2026-27694 |
5.4 (3.1)
|
traccar allows stored HTML injection in notification emails |
traccar |
traccar |
2026-05-05T12:20:55.174Z | 2026-05-05T14:12:04.800Z |
| CVE-2026-34327 |
8.2 (3.1)
|
Microsoft Partner Center Spoofing Vulnerability |
Microsoft |
Microsoft Partner Center |
2026-05-07T20:58:54.185Z | 2026-05-08T13:51:15.764Z |
| CVE-2026-42275 |
8.7 (3.1)
|
zrok: WebDAV drive backend follows symlinks outside Dr… |
openziti |
zrok |
2026-05-08T03:45:57.209Z | 2026-05-08T12:13:21.216Z |
| CVE-2026-35428 |
9.6 (3.1)
|
Azure Cloud Shell Spoofing Vulnerability |
Microsoft |
Azure Cloud Shell |
2026-05-07T20:58:58.256Z | 2026-05-09T03:55:54.225Z |
| CVE-2026-44298 |
4.1 (3.1)
|
Kimai: Arbitrary file read in invoice PDF renderer (admin) |
kimai |
kimai |
2026-05-08T03:32:06.672Z | 2026-05-08T14:06:31.033Z |
| CVE-2026-43273 |
N/A
|
ceph: supply snapshot context in ceph_zero_partial_object() |
Linux |
Linux |
2026-05-06T11:28:56.851Z | 2026-05-06T11:28:56.851Z |
| CVE-2026-35435 |
8.6 (3.1)
|
Azure AI Foundry Elevation of Privilege Vulnerability |
Microsoft |
Azure AI Foundry |
2026-05-07T20:58:55.593Z | 2026-05-09T03:56:09.680Z |
| CVE-2026-43272 |
N/A
|
ring-buffer: Fix possible dereference of uninitialized… |
Linux |
Linux |
2026-05-06T11:28:56.162Z | 2026-05-06T11:28:56.162Z |
| CVE-2026-43270 |
N/A
|
media: mtk-mdp: Fix a reference leak bug in mtk_mdp_remove() |
Linux |
Linux |
2026-05-06T11:28:54.866Z | 2026-05-06T11:28:54.866Z |
| CVE-2026-43271 |
N/A
|
md-cluster: fix NULL pointer dereference in process_me… |
Linux |
Linux |
2026-05-06T11:28:55.507Z | 2026-05-07T17:15:17.948Z |
| CVE-2026-33823 |
9.6 (3.1)
|
Microsoft Team Events Portal Information Disclosure Vu… |
Microsoft |
Microsoft Teams |
2026-05-07T20:58:52.175Z | 2026-05-08T14:15:02.859Z |
| CVE-2024-46508 |
7.5 (3.1)
|
yeti-platform yeti before 2.1.12 allows attackers… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T18:24:44.897Z |
| CVE-2026-32207 |
8.8 (3.1)
|
Azure Machine Learning Notebook Spoofing Vulnerability |
Microsoft |
Azure Machine Learning |
2026-05-07T20:58:51.273Z | 2026-05-09T03:55:56.457Z |
| CVE-2026-42086 |
4.6 (3.1)
|
OpenC3 COSMOS: Self-XSS in the Command Sender |
OpenC3 |
cosmos |
2026-05-04T17:15:59.239Z | 2026-05-04T19:47:16.828Z |
| CVE-2026-42085 |
4.3 (3.1)
|
OpenC3 COSMOS: Arbitrary write to plugins directory vi… |
OpenC3 |
cosmos |
2026-05-04T17:13:39.277Z | 2026-05-04T18:47:32.584Z |
| CVE-2026-42084 |
8.1 (3.1)
|
OpenC3 COSMOS: Hijacked session token can be used to r… |
OpenC3 |
cosmos |
2026-05-04T17:11:31.853Z | 2026-05-06T13:39:58.104Z |
| CVE-2026-26164 |
7.5 (3.1)
|
M365 Copilot Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Copilot's Business Chat |
2026-05-07T20:58:09.538Z | 2026-05-08T13:52:02.167Z |
| CVE-2026-42087 |
9.6 (3.1)
|
OpenC3 COSMOS: SQL Injection in QuestDB Time-Series Da… |
OpenC3 |
cosmos |
2026-05-04T17:18:02.965Z | 2026-05-05T12:46:14.311Z |
| CVE-2026-26129 |
7.5 (3.1)
|
M365 Copilot Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Copilot's Business Chat |
2026-05-07T20:58:24.050Z | 2026-05-08T21:29:40.688Z |
| CVE-2024-46507 |
7.3 (3.1)
|
A SSTI (server side template injection) vulnerabi… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T17:40:42.362Z |
| CVE-2013-10075 |
9.1 (3.1)
|
Apache::Session versions through 1.94 for Perl re-crea… |
CHORNY |
Apache::Session |
2026-05-08T07:44:13.267Z | 2026-05-08T17:58:32.010Z |
| CVE-2026-42826 |
10 (3.1)
|
Azure DevOps Information Disclosure Vulnerability |
Microsoft |
Azure DevOps |
2026-05-07T20:59:06.979Z | 2026-05-09T03:55:53.107Z |
| CVE-2026-33109 |
9.9 (3.1)
|
Azure Managed Instance for Apache Cassandra Remote Cod… |
Microsoft |
Azure Managed Instance for Apache Cassandra |
2026-05-07T20:58:49.441Z | 2026-05-09T03:56:08.597Z |
| CVE-2026-32803 |
3.3 (3.1)
|
Dell PowerScale OneFS versions 9.5.0.0 through 9.… |
Dell |
PowerScale OneFS |
2026-05-08T13:49:36.194Z | 2026-05-08T14:45:06.182Z |
| CVE-2026-33844 |
9 (3.1)
|
Azure Managed Instance for Apache Cassandra Remote Cod… |
Microsoft |
Azure Managed Instance for Apache Cassandra |
2026-05-07T20:58:52.985Z | 2026-05-09T03:56:10.766Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-8090 | Use-after-free in the DOM: Networking component. This vulnerability was fixed in Firefox 150.0.2, F… | 2026-05-07T13:16:13.967 | 2026-05-08T20:08:50.323 |
| fkie_cve-2026-42271 | LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version … | 2026-05-08T04:16:21.820 | 2026-05-08T20:04:50.543 |
| fkie_cve-2026-27644 | Traccar is an open source GPS tracking system. In versions between 6.11.1 and 6.13.0, the CSV expor… | 2026-05-05T13:16:27.807 | 2026-05-08T20:04:39.237 |
| fkie_cve-2026-27693 | Traccar is an open source GPS tracking system. In org.traccar:traccar versions starting at 6.11.1 b… | 2026-05-05T13:16:28.367 | 2026-05-08T20:04:19.057 |
| fkie_cve-2026-27694 | Traccar is an open source GPS tracking system. In org.traccar:traccar versions starting at 6.11.1 b… | 2026-05-05T13:16:28.513 | 2026-05-08T20:03:41.007 |
| fkie_cve-2026-34327 | Externally controlled reference to a resource in another sphere in Microsoft Partner Center allows … | 2026-05-07T22:16:34.540 | 2026-05-08T20:03:28.287 |
| fkie_cve-2026-42275 | zrok is software for sharing web services, files, and network resources. Prior to version 2.0.2, th… | 2026-05-08T04:16:22.823 | 2026-05-08T20:03:27.130 |
| fkie_cve-2026-35428 | Improper neutralization of special elements used in a command ('command injection') in Azure Cloud … | 2026-05-07T22:16:34.667 | 2026-05-08T20:02:29.777 |
| fkie_cve-2026-44298 | Kimai is an open-source time tracking application. From version 2.32.0 to before version 2.56.0, us… | 2026-05-08T04:16:24.230 | 2026-05-08T20:01:41.847 |
| fkie_cve-2026-43273 | In the Linux kernel, the following vulnerability has been resolved: ceph: supply snapshot context … | 2026-05-06T12:16:48.543 | 2026-05-08T20:01:19.023 |
| fkie_cve-2026-35435 | Improper access control in Azure AI Foundry M365 published agents allows an unauthorized attacker t… | 2026-05-07T22:16:34.787 | 2026-05-08T20:00:59.793 |
| fkie_cve-2026-43272 | In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Fix possible dere… | 2026-05-06T12:16:48.433 | 2026-05-08T20:00:37.403 |
| fkie_cve-2026-43270 | In the Linux kernel, the following vulnerability has been resolved: media: mtk-mdp: Fix a referenc… | 2026-05-06T12:16:48.190 | 2026-05-08T20:00:20.540 |
| fkie_cve-2026-43271 | In the Linux kernel, the following vulnerability has been resolved: md-cluster: fix NULL pointer d… | 2026-05-06T12:16:48.313 | 2026-05-08T20:00:00.693 |
| fkie_cve-2026-33823 | Improper authorization in Microsoft Teams allows an authorized attacker to disclose information ove… | 2026-05-07T22:16:34.283 | 2026-05-08T19:58:39.137 |
| fkie_cve-2024-46508 | yeti-platform yeti before 2.1.12 allows attackers to generate valid JWT tokens is the secret is not… | 2026-05-08T06:16:09.963 | 2026-05-08T19:58:25.380 |
| fkie_cve-2026-32207 | Improper neutralization of input during web page generation ('cross-site scripting') in Azure Machi… | 2026-05-07T22:16:33.900 | 2026-05-08T19:55:25.213 |
| fkie_cve-2026-42086 | OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or mo… | 2026-05-04T18:16:30.667 | 2026-05-08T19:54:39.990 |
| fkie_cve-2026-42085 | OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or mo… | 2026-05-04T18:16:30.510 | 2026-05-08T19:54:30.723 |
| fkie_cve-2026-42084 | OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or mo… | 2026-05-04T18:16:30.357 | 2026-05-08T19:54:14.983 |
| fkie_cve-2026-26164 | Improper neutralization of special elements in output used by a downstream component ('injection') … | 2026-05-07T22:16:33.773 | 2026-05-08T19:53:26.070 |
| fkie_cve-2026-42087 | OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or mo… | 2026-05-04T18:16:30.830 | 2026-05-08T19:53:16.883 |
| fkie_cve-2026-26129 | Improper neutralization of special elements in M365 Copilot allows an unauthorized attacker to disc… | 2026-05-07T22:16:33.607 | 2026-05-08T19:53:02.500 |
| fkie_cve-2024-46507 | A SSTI (server side template injection) vulnerability in the custom template export function in yet… | 2026-05-08T06:16:09.840 | 2026-05-08T19:52:49.787 |
| fkie_cve-2013-10075 | Apache::Session versions through 1.94 for Perl re-creates deleted sessions. The session stores Apa… | 2026-05-08T08:16:43.463 | 2026-05-08T19:51:16.810 |
| fkie_cve-2026-42826 | Exposure of sensitive information to an unauthorized actor in Azure DevOps allows an unauthorized a… | 2026-05-07T22:16:35.587 | 2026-05-08T19:50:24.040 |
| fkie_cve-2026-33109 | Improper access control in Azure Managed Instance for Apache Cassandra allows an authorized attacke… | 2026-05-07T22:16:34.030 | 2026-05-08T19:48:54.647 |
| fkie_cve-2026-32803 | Dell PowerScale OneFS versions 9.5.0.0 through 9.5.1.6, 9.6.0.0 through 9.7.1.13, 9.8.0.0 through 9… | 2026-05-08T14:16:31.787 | 2026-05-08T19:48:35.453 |
| fkie_cve-2026-33844 | Improper input validation in Azure Managed Instance for Apache Cassandra allows an authorized attac… | 2026-05-07T22:16:34.420 | 2026-05-08T19:48:15.363 |
| fkie_cve-2026-41570 | PHPUnit is a testing framework for PHP. In versions 12.5.21 and 13.1.5, PHPUnit forwards PHP INI se… | 2026-05-08T15:16:40.420 | 2026-05-08T19:45:25.910 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-wfr5-454p-mjc2 |
6.5 (3.1)
|
OpenTelemetry.Exporter.Instana bypasses TLS certificate validation when a proxy is configured | 2026-05-08T20:48:02Z | 2026-05-08T20:48:02Z |
| ghsa-8wxp-xxp2-rcgx |
6.8 (3.1)
|
Volcano's webhook server vulnerable to OOM due to unbounded HTTP request body size | 2026-05-08T20:44:54Z | 2026-05-08T20:44:54Z |
| ghsa-5c57-rqjx-35g2 |
9.6 (3.1)
|
Cline Kanban Server has a Cross-Origin WebSocket Hijacking Vulnerability | 2026-05-08T20:43:17Z | 2026-05-08T20:43:17Z |
| ghsa-p3w2-64xm-833j |
7.5 (3.1)
|
GoBGP has a panic in AdjRib.Update via malformed BGP Update message (Nil Pointer Dereference) | 2026-05-05T20:57:14Z | 2026-05-08T20:42:39Z |
| ghsa-29v9-frvh-c426 |
8.3 (4.0)
|
monetr: Server-side request forgery in Lunch Flow link creation and refresh | 2026-04-22T19:57:54Z | 2026-05-08T20:42:34Z |
| ghsa-8rxh-r2p6-7f2q |
7.5 (3.1)
|
GoBGP has Remote Denial of Service (Panic) in UpdatePathAttrs4ByteAs via Malformed BGP UPDATE | 2026-04-29T20:44:04Z | 2026-05-08T20:42:30Z |
| ghsa-7235-89m6-f4px |
7.5 (3.1)
|
GoBGP has Remote Denial of Service (Panic) via Malformed Well-known Path Attribute | 2026-04-29T20:43:36Z | 2026-05-08T20:42:26Z |
| ghsa-4g6q-77j7-vvjc |
4.0 (3.1)
|
Logging of the firestore key within nodejs-firestore | 2023-12-04T15:31:55Z | 2026-05-08T20:42:22Z |
| ghsa-g6v3-wv4j-x9hg |
4.9 (3.1)
|
October Rain has Environment Variable Exfiltration via INI Parser Interpolation | 2026-04-14T22:29:41Z | 2026-05-08T20:41:58Z |
| ghsa-gcqv-f29m-67gr |
4.8 (3.1)
4.8 (4.0)
|
October Rain has Stored XSS via SVG Filter Bypass | 2026-04-14T22:29:50Z | 2026-05-08T20:41:49Z |
| ghsa-gphh-9q3h-jgpp |
7.5 (3.1)
|
banks has Critical Remote Code Execution (RCE) via Jinja2 SSTI | 2026-05-08T20:36:22Z | 2026-05-08T20:36:22Z |
| ghsa-fv7c-fp4j-7gwp |
8.2 (3.1)
|
@babel/plugin-transform-modules-systemjs generates arbitrary code when compiling malicious input | 2026-05-08T20:34:07Z | 2026-05-08T20:34:07Z |
| ghsa-628h-q48j-jr6q |
8.7 (4.0)
|
Phoenix: Long-poll NDJSON body splitting causes large memory allocation | 2026-05-08T20:24:15Z | 2026-05-08T20:24:15Z |
| ghsa-67rv-mg8q-5pf3 |
6.5 (3.1)
|
Wagtail has improper permission handling when copying pages | 2026-05-08T20:23:11Z | 2026-05-08T20:23:11Z |
| ghsa-p5gm-92h4-6pv6 |
5.3 (3.1)
|
Wagtail has improper restriction handling on Documents and Images API | 2026-05-08T20:21:38Z | 2026-05-08T20:21:38Z |
| ghsa-pwm3-7fv4-g6xx |
6.5 (3.1)
|
Wagtail has improper permission handling when deleting form submissions | 2026-05-08T20:20:12Z | 2026-05-08T20:20:12Z |
| ghsa-c4mr-889m-vgf6 |
4.3 (3.1)
|
Wagtail has improper permission handling when viewing page history | 2026-05-08T20:19:08Z | 2026-05-08T20:19:08Z |
| ghsa-j7w6-vpvq-j3gm |
8.8 (3.1)
|
Diffusers has a `trust_remote_code` bypass via `custom_pipeline` and local custom components | 2026-05-07T02:24:22Z | 2026-05-08T20:17:57Z |
| ghsa-c6wj-9vcj-75pj |
6.5 (3.1)
|
Wagtail has improper permission handling when comparing revisions | 2026-05-08T20:17:31Z | 2026-05-08T20:17:31Z |
| ghsa-q49m-57vm-c8cc |
8.2 (4.0)
|
Kata Container has CopyFile Policy Subversion via Symlinks | 2026-05-04T19:32:20Z | 2026-05-08T20:14:54Z |
| ghsa-hcjj-chvw-fmw9 |
6.8 (3.1)
|
Admidio has an incomplete fix for CVE-2026-32812 (SSRF) | 2026-05-05T20:03:46Z | 2026-05-08T20:14:44Z |
| ghsa-5hfv-c864-qcq9 |
5.3 (4.0)
|
CI4MS has a Deactivated User Session Bypass (active=0) | 2026-05-04T20:50:55Z | 2026-05-08T20:14:41Z |
| ghsa-vgrf-pr28-vf98 |
6.9 (4.0)
|
CI4MS Vulnerable to Arbitrary Database Table Drop via Theme deleteProcess | 2026-05-04T20:50:10Z | 2026-05-08T20:14:36Z |
| ghsa-9xx5-cv6j-x533 |
6.8 (3.1)
|
Admidio: OIDC Token Introspection Endpoint Returns Active for All Tokens Without Validation | 2026-04-29T21:58:56Z | 2026-05-08T20:14:32Z |
| ghsa-p9w9-87c8-m235 |
8.2 (3.1)
|
Admidio Sends SAML Response to Unvalidated Assertion Consumer Service URL from AuthnRequest | 2026-04-29T21:57:30Z | 2026-05-08T20:14:29Z |
| ghsa-25cw-98hg-g3cg |
8.2 (3.1)
|
Admidio Ignores SAML Signature Validation Result, Processes Forged AuthnRequests and LogoutRequests | 2026-04-29T21:56:13Z | 2026-05-08T20:14:26Z |
| ghsa-rw74-vc9h-534j |
3.5 (3.1)
|
Admidio has CSRF on Admin Preferences that Triggers Unauthorized Backup, .htaccess Write, and Email Send | 2026-04-29T21:54:30Z | 2026-05-08T20:13:59Z |
| ghsa-c7xm-r6vj-8vg6 |
5.2 (3.1)
|
Admidio Missing Minimum Administrator Check in Role Membership Removal | 2026-04-29T21:53:20Z | 2026-05-08T20:13:55Z |
| ghsa-gq27-fc8w-vcmp |
6.1 (3.1)
|
Admidio vulnerable to reflected XSS in msg_window.php via Square Bracket to HTML Tag Conversion | 2026-04-29T21:51:13Z | 2026-05-08T20:13:52Z |
| ghsa-68pr-7prh-mpv4 |
2.7 (3.1)
|
Admidio Leaks Hidden Profile Field Values via Blind Search Oracle in Member Assignment | 2026-04-29T21:47:29Z | 2026-05-08T20:13:48Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-174 |
4.3 (3.1)
|
Server-Side Request Forgery (SSRF) vulnerability in Apache StreamPipes during installatio… | streampipes | 2024-07-17T09:15:02+00:00 | 2025-01-18T22:21:43.678475+00:00 |
| pysec-2024-173 |
8.8 (3.1)
|
Unrestricted Upload of File with dangerous type vulnerability in Apache StreamPipes. Such… | streampipes | 2024-07-17T10:15:01+00:00 | 2025-01-18T22:21:43.618882+00:00 |
| pysec-2024-172 |
3.7 (3.1)
|
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache StreamPipes in … | streampipes | 2024-07-17T09:15:02+00:00 | 2025-01-18T22:21:43.557516+00:00 |
| pysec-2024-171 |
8.0 (3.1)
|
Strawberry GraphQL is a library for creating GraphQL APIs. Prior to version 0.243.0, mult… | strawberry-graphql | 2024-09-25T18:15:05+00:00 | 2025-01-18T22:21:43.412172+00:00 |
| pysec-2024-170 |
4.8 (3.1)
|
A stored Cross-Site Scripting (XSS) vulnerability was identified in the zenml-io/zenml re… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-18T19:19:08.253212+00:00 |
| pysec-2024-169 |
6.5 (3.1)
|
An improper authorization vulnerability exists in the zenml-io/zenml repository, specific… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-18T19:19:08.205431+00:00 |
| pysec-2024-168 |
6.5 (3.1)
|
Taipy is an open-source Python library for easy, end-to-end application development for d… | taipy | 2024-10-09T19:15:14+00:00 | 2025-01-18T19:19:07.718423+00:00 |
| pysec-2024-167 |
|
NLTK through 3.8.1 allows remote code execution if untrusted packages have pickled Python… | nltk | 2024-06-27T22:15:10+00:00 | 2025-01-18T19:19:06.317325+00:00 |
| pysec-2024-166 |
|
Nautobot is a Network Source of Truth and Network Automation Platform. A user with permis… | nautobot | 2024-05-28T23:15:17+00:00 | 2025-01-18T19:19:06.277166+00:00 |
| pysec-2024-165 |
7.5 (3.1)
|
The Jupyter Server provides the backend for Jupyter web applications. Jupyter Server on W… | jupyter-server | 2024-06-06T16:15:11+00:00 | 2025-01-18T19:19:04.842426+00:00 |
| pysec-2024-164 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. If an exces… | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-16T21:21:41.436934+00:00 |
| pysec-2025-1 |
|
An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2… | django | 2025-01-14T19:15:32+00:00 | 2025-01-14T21:22:18.665005+00:00 |
| pysec-2024-163 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Prior to ve… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-14T05:22:23.036505+00:00 |
| pysec-2024-162 |
6.5 (3.1)
|
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the XMLFeedSpider … | scrapy | 2024-02-28T00:15:53+00:00 | 2025-01-14T05:22:21.870348+00:00 |
| pysec-2024-161 |
|
Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R packag… | pyarrow | 2024-11-28T17:15:48+00:00 | 2025-01-14T05:22:20.554292+00:00 |
| pysec-2024-160 |
6.1 (3.1)
|
lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.cle… | lxml-html-clean | 2024-11-19T22:15:21+00:00 | 2025-01-14T05:22:17.244267+00:00 |
| pysec-2024-159 |
|
Versions of the package luigi before 3.6.0 are vulnerable to Arbitrary File Write via Arc… | luigi | 2024-12-10T05:15:07+00:00 | 2025-01-14T05:22:17.204098+00:00 |
| pysec-2024-158 |
|
Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when … | djoser | 2024-12-13T05:15:07+00:00 | 2025-01-14T05:22:11.856636+00:00 |
| pysec-2024-157 |
|
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2… | django | 2024-12-06T12:15:18+00:00 | 2025-01-14T05:22:11.817473+00:00 |
| pysec-2024-156 |
|
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2… | django | 2024-12-06T12:15:17+00:00 | 2025-01-14T05:22:11.736011+00:00 |
| pysec-2024-155 |
7.5 (3.1)
|
cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) … | cbor2 | 2024-02-19T23:15:07+00:00 | 2025-01-14T05:22:09.226388+00:00 |
| pysec-2019-255 |
6.1 (3.1)
|
data/interfaces/default/history.html in Tautulli 2.1.26 has XSS via a crafted Plex userna… | tautulli | 2019-02-19T16:29:00Z | 2025-01-12T05:34:20.550037Z |
| pysec-2019-254 |
6.5 (3.1)
|
In Tautulli 2.1.9, CSRF in the /shutdown URI allows an attacker to shut down the remote m… | tautulli | 2019-12-18T18:15:00Z | 2025-01-12T05:34:20.505254Z |
| pysec-2022-43131 |
6.5 (3.1)
|
diplib v3.0.0 is vulnerable to Double Free. | diplib | 2022-11-04T17:15:00Z | 2024-12-27T22:48:17.996707Z |
| pysec-2022-43162 |
7.5 (3.1)
|
Redis v7.0 was discovered to contain a memory leak via the component streamGetEdgeID. | redis | 2022-06-23T17:15:00Z | 2024-12-23T11:33:23.546447Z |
| pysec-2019-253 |
7.4 (3.1)
|
Tahoe-LAFS 1.9.0 fails to ensure integrity which allows remote attackers to corrupt mutab… | tahoe-lafs | 2019-11-07T18:15:00Z | 2024-12-19T05:47:49.035329Z |
| pysec-2020-343 |
7.8 (3.1)
|
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when the… | blosc2 | 2020-11-27T20:15:00Z | 2024-12-12T14:22:45.450508Z |
| pysec-2024-154 |
8.6 (3.1)
8.7 (4.0)
|
Ultralytics has identified a supply chain attack affecting affecting multiple versions of… | ultralytics | 2024-12-10T19:20:27.097505+00:00 | |
| pysec-2015-42 |
|
providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.… | ipsilon | 2015-11-17T15:59:00Z | 2024-12-05T09:35:27.751929Z |
| pysec-2015-41 |
|
providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.… | ipsilon | 2015-11-17T15:59:00Z | 2024-12-05T09:35:27.711043Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33739 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.344696Z |
| gsd-2024-33738 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.562140Z |
| gsd-2024-33737 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.285475Z |
| gsd-2024-33736 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.346507Z |
| gsd-2024-33735 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.410261Z |
| gsd-2024-33734 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.482444Z |
| gsd-2024-33733 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.577869Z |
| gsd-2024-33732 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.513959Z |
| gsd-2024-33731 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.328794Z |
| gsd-2024-33730 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.396940Z |
| gsd-2024-33729 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.527542Z |
| gsd-2024-33728 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.380564Z |
| gsd-2024-33727 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.514916Z |
| gsd-2024-33726 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.327193Z |
| gsd-2024-33725 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.300660Z |
| gsd-2024-33724 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.429383Z |
| gsd-2024-33723 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.361754Z |
| gsd-2024-33722 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.598142Z |
| gsd-2024-33721 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.408369Z |
| gsd-2024-33720 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.519711Z |
| gsd-2024-33719 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.344333Z |
| gsd-2024-33718 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.360853Z |
| gsd-2024-33717 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.429699Z |
| gsd-2024-33716 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.371227Z |
| gsd-2024-33715 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.440563Z |
| gsd-2024-33714 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.510684Z |
| gsd-2024-33713 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.522989Z |
| gsd-2024-33712 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.587066Z |
| gsd-2024-33711 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.452695Z |
| gsd-2024-33710 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.499457Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-3279 | Malicious code in muenxo (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| mal-2026-3278 | Malicious code in honcho-theme (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| mal-2026-3277 | Malicious code in edj-shopify-theme (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| mal-2026-3275 | Malicious code in @kills_sh/bootstrap (npm) | 2026-05-04T01:43:31Z | 2026-05-04T01:43:32Z |
| mal-2026-3122 | Malicious code in @w3m-frame/session_update (npm) | 2026-04-27T18:30:51Z | 2026-05-04T01:13:44Z |
| mal-2026-3121 | Malicious code in @taxmoninor/taxmon (npm) | 2026-04-27T15:10:55Z | 2026-05-04T01:13:44Z |
| mal-2026-3120 | Malicious code in @pyme-web/web-api (npm) | 2026-04-27T17:55:52Z | 2026-05-04T01:13:44Z |
| mal-2026-3119 | Malicious code in @pyme-web/ui-widget (npm) | 2026-04-27T17:46:10Z | 2026-05-04T01:13:44Z |
| mal-2026-3118 | Malicious code in @pyme-web/ui-base (npm) | 2026-04-27T17:46:02Z | 2026-05-04T01:13:44Z |
| mal-2026-3273 | Malicious code in @w3m-app/is_connected (npm) | 2026-05-04T00:01:02Z | 2026-05-04T00:01:07Z |
| mal-2026-3272 | Malicious code in @w3m-app/get_chain_id (npm) | 2026-05-04T00:01:02Z | 2026-05-04T00:01:07Z |
| mal-2026-3274 | Malicious code in @w3m-app/switch_network (npm) | 2026-05-04T00:01:02Z | 2026-05-04T00:01:02Z |
| mal-2026-3271 | Malicious code in @bcs-ui/theme (npm) | 2026-05-04T00:01:01Z | 2026-05-04T00:01:01Z |
| mal-2026-3270 | Malicious code in @bcs-react-ui/select (npm) | 2026-05-04T00:01:01Z | 2026-05-04T00:01:01Z |
| mal-2026-3269 | Malicious code in @bcs-react-ui/context-menu (npm) | 2026-05-04T00:01:00Z | 2026-05-04T00:01:01Z |
| mal-2026-3268 | Malicious code in @bcs-mi/store (npm) | 2026-05-04T00:01:00Z | 2026-05-04T00:01:01Z |
| mal-2026-3267 | Malicious code in @bcs-bank-react-ui/swiper-slider (npm) | 2026-05-04T00:01:00Z | 2026-05-04T00:01:01Z |
| mal-2026-3266 | Malicious code in @bcs-bank/init (npm) | 2026-05-04T00:01:00Z | 2026-05-04T00:01:00Z |
| mal-2026-3265 | Malicious code in @bcs-bank/common-constants (npm) | 2026-05-04T00:01:00Z | 2026-05-04T00:01:00Z |
| mal-2026-3264 | Malicious code in @bcs-adapters/keycloak-api-adapter (npm) | 2026-05-04T00:00:59Z | 2026-05-04T00:01:00Z |
| mal-2026-3263 | Malicious code in @bcs-adapters/core-adapter (npm) | 2026-05-04T00:00:59Z | 2026-05-04T00:00:59Z |
| mal-2026-3323 | Malicious code in paypal-payouts-bridge (npm) | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| mal-2026-3322 | Malicious code in microsoft-agents-auth-service (npm) | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| mal-2026-3253 | Malicious code in feature-flag-service (npm) | 2026-05-03T22:30:37Z | 2026-05-03T22:49:55Z |
| mal-2026-3252 | Malicious code in gauth-client (PyPI) | 2026-05-03T21:26:25Z | 2026-05-03T21:26:25Z |
| mal-2026-3244 | Malicious code in puan4 (PyPI) | 2026-05-03T12:20:21Z | 2026-05-03T21:21:18Z |
| mal-2026-3243 | Malicious code in puan3 (PyPI) | 2026-05-03T12:16:07Z | 2026-05-03T21:21:18Z |
| mal-2026-3251 | Malicious code in puan31 (PyPI) | 2026-05-03T20:58:02Z | 2026-05-03T20:58:02Z |
| mal-2026-3194 | Malicious code in robase-dnb (PyPI) | 2026-04-30T00:02:39Z | 2026-05-03T20:49:49Z |
| mal-2026-3193 | Malicious code in rblx-http (PyPI) | 2026-04-29T23:31:35Z | 2026-05-03T20:49:49Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0982 | OpenBSD: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-04-06T22:00:00.000+00:00 | 2026-04-07T22:00:00.000+00:00 |
| wid-sec-w-2026-0937 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2026-03-31T22:00:00.000+00:00 | 2026-04-06T22:00:00.000+00:00 |
| wid-sec-w-2026-0789 | Roundcube: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-04-06T22:00:00.000+00:00 |
| wid-sec-w-2025-2310 | F5 BIG-IP und F5OS: Mehrere Schwachstellen | 2025-10-15T22:00:00.000+00:00 | 2026-03-31T22:00:00.000+00:00 |
| wid-sec-w-2026-0909 | Tinyproxy: Schwachstelle ermöglicht Denial of Service | 2026-03-29T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0904 | vim: Schwachstelle ermöglicht Codeausführung | 2026-03-29T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0892 | WatchGuard Firebox: Mehrere Schwachstellen | 2026-03-26T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0891 | Dovecot: Mehrere Schwachstellen | 2026-03-26T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0880 | FreeRDP: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0864 | OpenBao: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0825 | strongSwan: Schwachstelle ermöglicht Denial of Service | 2026-03-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0782 | WebKitGTK: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0761 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Denial of Service | 2026-03-17T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0756 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Privilegieneskalation und Offenlegung von Informationen | 2026-03-16T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0744 | ImageMagick: Schwachstelle ermöglicht Denial of Service | 2026-03-16T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0688 | cPanel cPanel/WHM: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0643 | ImageMagick: Mehrere Schwachstellen | 2026-03-09T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0494 | Red Hat Enterprise Linux (389-ds-base): Schwachstelle ermöglicht Codeausführung und potenziell Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0484 | ImageMagick: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0479 | Red Hat OpenShift Service Mesh (Kiali): Schwachstelle ermöglicht Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0462 | Linux Kernel: Mehrere Schwachstellen | 2026-02-18T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0405 | Grafana: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0362 | Red Hat Enterprise Linux (Lodash): Schwachstelle ermöglicht Denial of Service | 2026-02-10T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0345 | Golang Go: Mehrere Schwachstellen | 2026-02-08T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0327 | Asterisk: Mehrere Schwachstellen | 2026-02-05T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0326 | Red Hat Self-service automation portal for Ansible Automation Platform: Schwachstelle ermöglicht Manipulation von Dateien | 2026-02-05T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0306 | Red Hat Enterprise Linux (pyasn1): Schwachstelle ermöglicht Denial of Service | 2026-02-04T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0269 | SaltStack Salt: Mehrere Schwachstellen | 2026-02-01T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0743 | OpenClaw: Mehrere Schwachstellen | 2026-03-16T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0727 | OpenClaw: Mehrere Schwachstellen | 2026-03-15T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-036-05 | Hitachi Energy XMC20 | 2026-01-27T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-04 | Ilevia EVE X1 Server | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-03 | o6 Automation GmbH Open62541 | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-02 | Mitsubishi Electric MELSEC iQ-R Series | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-029-01 | KiloView Encoder Series (Update A) | 2026-01-29T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-25-184-03 | Mitsubishi Electric MELSOFT Update Manager (Update B) | 2025-07-03T06:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-25-184-01 | Hitachi Energy Relion 670/650 and SAM600-IO Series | 2025-06-24T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-25-343-03 | Multiple India-based CCTV Cameras (Update A)** | 2025-12-09T06:00:00.000000Z | 2026-02-05T06:00:00.000000Z |
| icsa-26-034-04 | Synectix LAN 232 TRIO | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-03 | RISS SRL MOMA Seismic Station | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-02 | *Avation Light Engine Pro * | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-01 | Mitsubishi Electric FREQSHIP-mini for Windows | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-310-02 | Ubia Ubox (Update A) | 2025-11-06T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-24-345-06 | Rockwell Automation Arena (Update B) | 2024-12-10T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-23-089-01 | Hitachi Energy IEC 61850 MMS-Server (Update B) | 2023-02-14T13:30:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-23-068-05 | Hitachi Energy Relion 670, 650 and SAM600-IO Series | 2023-02-28T13:30:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-112-03 | Schneider Electric Wiser Home Controller WHC-5918A | 2024-07-09T00:00:00.000000Z | 2026-01-30T07:00:00.000000Z |
| icsa-26-029-03 | Rockwell Automation ControlLogix | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-26-029-02 | Rockwell Automation ArmorStart LT | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-205-01 | Mitsubishi Electric CNC Series (Update B) | 2025-07-24T06:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-028-06 | Schneider Electric RemoteConnect and SCADAPack x70 Utilities (Update A) | 2025-01-14T00:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-26-027-03 | Schneider Electric Zigbee Products | 2026-01-13T08:00:00.000000Z | 2026-01-27T20:13:34.637968Z |
| icsa-26-027-02 | Festo Didactic SE MES PC | 2024-02-27T12:00:00.000000Z | 2026-01-27T16:20:28.099631Z |
| icsa-26-027-04 | Johnson Controls Metasys Products | 2026-01-27T07:00:00.000000Z | 2026-01-27T07:00:00.000000Z |
| icsa-26-022-01 | Schneider Electric | 2026-01-13T08:00:00.000000Z | 2026-01-22T17:29:46.950679Z |
| icsa-26-022-08 | EVMAPA | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-07 | Delta Electronics DIAView | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-06 | Hubitat Elevation Hubs | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-05 | Weintek cMT X Series HMI EasyWeb Service | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-04 | Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-piepnm-bsi-25jjqsbb | Cisco Prime Infrastructure and Evolved Programmable Network Manager Blind SQL Injection Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-ise-multi-3vpsxoxo | Cisco Identity Services Engine Authenticated Remote Code Execution and Authorization Bypass Vulnerabilities | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-cuis-ssrf-jsudjev | Cisco Unified Intelligence Center Server-Side Request Forgery Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-cuis-file-upload-uhnetstm | Cisco Unified Intelligence Center Arbitrary File Upload Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-spaces-conn-privesc-kgd2ccdu | Cisco Spaces Connector Privilege Escalation Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-ece-xss-cbtkteyc | Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-cucm-ssh-m4ubdpe7 | Cisco Unified Communications Manager Static SSH Credentials Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-ise-stored-xss-yff54m73 | Cisco Identity Services Stored Cross-Site Scripting Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-06-30T15:08:59+00:00 |
| cisco-sa-ise-auth-bypass-mvfkvqau | Cisco Identity Services Engine Authorization Bypass Vulnerability | 2025-06-25T16:00:00+00:00 | 2025-06-25T16:00:00+00:00 |
| cisco-sa-ise-file-upload-p4m8vwxy | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-23T19:16:21+00:00 |
| cisco-sa-meraki-mx-vpn-dos-sm5gcfm7 | Cisco Meraki MX and Z Series AnyConnect VPN with Client Certificate Authentication Denial of Service Vulnerability | 2025-06-18T16:00:00+00:00 | 2025-06-18T16:00:00+00:00 |
| cisco-sa-clamav-udf-hmwd9ndy | ClamAV UDF File Parsing Out-of-Bounds Read Information Disclosure Vulnerability | 2025-06-18T16:00:00+00:00 | 2025-06-18T16:00:00+00:00 |
| cisco-sa-erlang-otp-ssh-xyzzy | Multiple Cisco Products Unauthenticated Remote Code Execution in Erlang/OTP SSH Server: April 2025 | 2025-04-22T21:45:00+00:00 | 2025-06-11T14:40:37+00:00 |
| cisco-sa-wlc-file-uplpd-rhzg9ufc | Cisco IOS XE Wireless Controller Software Arbitrary File Upload Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-06-06T20:02:48+00:00 |
| cisco-sa-ise-aws-static-cred-fpmjucm7 | Cisco Identity Services Engine on Cloud Platforms Static Credential Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-05T17:26:25+00:00 |
| cisco-sa-vos-command-inject-65s2ucyy | Cisco Unified Communications Products Command Injection Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ucs-ssh-priv-esc-2mzdtdjm | Cisco Integrated Management Controller Privilege Escalation Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-uccx-multi-uhotvpgl | Cisco Unified Contact Center Express Vulnerabilities | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-uccx-editor-rce-ezyyzte8 | Cisco Unified Contact Center Express Editor Remote Code Execution Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-te-endagent-filewrt-zncdqnrj | Cisco ThousandEyes Endpoint Agent for Windows Arbitrary File Delete Vulnerabilities | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ndfc-shkv-snqjtjrp | Cisco Nexus Dashboard Fabric Controller SSH Host Key Validation Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-icm-xss-cfcqhxag | Cisco Unified Intelligent Contact Management Enterprise Cross-Site Scripting Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ccp-info-disc-zygerqpd | Cisco Customer Collaboration Platform Information Disclosure Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-meraki-mx-vpn-dos-qtrhzg2 | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Denial of Service Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:28+00:00 |
| cisco-sa-meraki-mx-vpn-dos-by-qwukqv7x | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Session Takeover and Denial of Service Vulnerability | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:27+00:00 |
| cisco-sa-webex-xss-7teqtfn8 | Cisco Webex Services Cross-Site Scripting Vulnerabilities | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-webex-cache-q4xbkqbg | Cisco Webex Meetings Services HTTP Cache Poisoning Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sna-ssti-dpulqsmz | Cisco Secure Network Analytics Manager Privilege Escalation Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sna-apiacv-4b6x5ysw | Cisco Secure Network Analytics Manager API Authorization Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-ise-restart-ss-uf986g2q | Cisco Identity Services Engine RADIUS Denial of Service Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-38041 | clk: sunxi-ng: h616: Reparent GPU clock during frequency changes | 2025-06-02T00:00:00.000Z | 2026-05-06T14:50:32.000Z |
| msrc_cve-2026-23377 | ice: change XDP RxQ frag_size from DMA write length to xdp.frame_sz | 2026-03-02T00:00:00.000Z | 2026-05-06T14:50:02.000Z |
| msrc_cve-2024-53133 | drm/amd/display: Handle dml allocation failure to avoid crash | 2024-12-02T00:00:00.000Z | 2026-05-06T14:50:00.000Z |
| msrc_cve-2024-41008 | drm/amdgpu: change vm->task_info handling | 2024-07-01T07:00:00.000Z | 2026-05-06T14:49:58.000Z |
| msrc_cve-2026-23361 | PCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry | 2026-03-02T00:00:00.000Z | 2026-05-06T14:49:55.000Z |
| msrc_cve-2024-42151 | bpf: mark bpf_dummy_struct_ops.test_1 parameter as nullable | 2024-07-01T07:00:00.000Z | 2026-05-06T14:49:52.000Z |
| msrc_cve-2025-21870 | ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers | 2025-03-02T00:00:00.000Z | 2026-05-06T14:49:50.000Z |
| msrc_cve-2024-50177 | drm/amd/display: fix a UBSAN warning in DML2.1 | 2024-11-02T00:00:00.000Z | 2026-05-06T14:49:45.000Z |
| msrc_cve-2025-21888 | RDMA/mlx5: Fix a WARN during dereg_mr for DM type | 2025-03-02T00:00:00.000Z | 2026-05-06T14:49:43.000Z |
| msrc_cve-2026-23276 | net: add xmit recursion limit to tunnel xmit functions | 2026-03-02T00:00:00.000Z | 2026-05-06T14:49:41.000Z |
| msrc_cve-2024-53050 | drm/i915/hdcp: Add encoder check in hdcp2_get_capability | 2024-11-02T00:00:00.000Z | 2026-05-06T14:49:38.000Z |
| msrc_cve-2024-35808 | md/dm-raid: don't call md_reap_sync_thread() directly | 2024-05-02T07:00:00.000Z | 2026-05-06T14:49:36.000Z |
| msrc_cve-2026-23272 | netfilter: nf_tables: unconditionally bump set->nelems before insertion | 2026-03-02T00:00:00.000Z | 2026-05-06T14:49:34.000Z |
| msrc_cve-2026-23278 | netfilter: nf_tables: always walk all pending catchall elements | 2026-03-02T00:00:00.000Z | 2026-05-06T14:49:26.000Z |
| msrc_cve-2025-21976 | fbdev: hyperv_fb: Allow graceful removal of framebuffer | 2025-04-02T00:00:00.000Z | 2026-05-06T14:49:26.000Z |
| msrc_cve-2026-23207 | spi: tegra210-quad: Protect curr_xfer check in IRQ handler | 2026-02-02T00:00:00.000Z | 2026-05-06T14:49:18.000Z |
| msrc_cve-2025-37907 | accel/ivpu: Fix locking order in ivpu_job_submit | 2025-05-02T00:00:00.000Z | 2026-05-06T14:49:17.000Z |
| msrc_cve-2024-36024 | drm/amd/display: Disable idle reallow as part of command/gpint execution | 2024-05-02T07:00:00.000Z | 2026-05-06T14:49:08.000Z |
| msrc_cve-2026-23247 | tcp: secure_seq: add back ports to TS offset | 2026-03-02T00:00:00.000Z | 2026-05-06T14:49:05.000Z |
| msrc_cve-2024-50277 | dm: fix a crash if blk_alloc_disk fails | 2024-11-02T00:00:00.000Z | 2026-05-06T14:49:04.000Z |
| msrc_cve-2024-26914 | drm/amd/display: fix incorrect mpc_combine array size | 2024-04-02T07:00:00.000Z | 2026-05-06T14:48:59.000Z |
| msrc_cve-2025-23131 | dlm: prevent NPD when writing a positive value to event_done | 2025-04-02T00:00:00.000Z | 2026-05-06T14:48:52.000Z |
| msrc_cve-2026-43058 | media: vidtv: fix pass-by-value structs causing MSAN warnings | 2026-05-02T00:00:00.000Z | 2026-05-06T14:48:50.000Z |
| msrc_cve-2026-23240 | tls: Fix race condition in tls_sw_cancel_work_tx() | 2026-03-02T00:00:00.000Z | 2026-05-06T14:48:48.000Z |
| msrc_cve-2025-40325 | md/raid10: wait barrier before returning discard request with REQ_NOWAIT | 2025-04-02T00:00:00.000Z | 2026-05-06T14:48:42.000Z |
| msrc_cve-2026-7598 | libssh2 userauth.c userauth_password integer overflow | 2026-05-02T00:00:00.000Z | 2026-05-06T14:48:35.000Z |
| msrc_cve-2025-71227 | wifi: mac80211: don't WARN for connections on invalid channels | 2026-02-02T00:00:00.000Z | 2026-05-06T14:48:35.000Z |
| msrc_cve-2024-58006 | PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar() | 2025-02-02T00:00:00.000Z | 2026-05-06T14:48:34.000Z |
| msrc_cve-2026-23214 | btrfs: reject new transactions if the fs is fully read-only | 2026-02-02T00:00:00.000Z | 2026-05-06T14:48:26.000Z |
| msrc_cve-2025-37882 | usb: xhci: Fix isochronous Ring Underrun/Overrun event handling | 2025-05-02T00:00:00.000Z | 2026-05-06T14:48:25.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0363 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-11-12T11:52:08.634593Z | 2025-11-12T11:56:09.924799Z |
| ncsc-2025-0362 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2025-11-11T18:35:40.376220Z | 2025-11-11T18:35:40.376220Z |
| ncsc-2025-0361 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2025-11-11T18:34:39.453615Z | 2025-11-11T18:34:39.453615Z |
| ncsc-2025-0360 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2025-11-11T18:33:13.936830Z | 2025-11-11T18:33:13.936830Z |
| ncsc-2025-0359 | Kwetsbaarheden verholpen in Microsoft Office | 2025-11-11T18:31:27.092072Z | 2025-11-11T18:31:27.092072Z |
| ncsc-2025-0358 | Kwetsbaartheden verholpen in Microsoft Windows | 2025-11-11T18:29:38.918562Z | 2025-11-11T18:29:38.918562Z |
| ncsc-2025-0357 | Kwetsbaarheden verholpen in Siemens producten | 2025-11-11T18:14:44.487803Z | 2025-11-11T18:14:44.487803Z |
| ncsc-2025-0356 | Kwetsbaarheden verholpen in SAP-producten | 2025-11-11T12:15:53.615720Z | 2025-11-11T12:15:53.615720Z |
| ncsc-2025-0355 | Kwetsbaarheden verholpen in Fortinet FortiOS en FortiProxy | 2025-11-07T10:07:28.475542Z | 2025-11-07T10:07:28.475542Z |
| ncsc-2025-0354 | Kwetsbaarheid verholpen in Cisco Identity Services Engine | 2025-11-06T12:36:51.591695Z | 2025-11-06T12:36:51.591695Z |
| ncsc-2025-0353 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-11-04T15:03:48.630084Z | 2025-11-04T15:03:48.630084Z |
| ncsc-2025-0352 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-11-04T12:53:15.358078Z | 2025-11-04T12:53:15.358078Z |
| ncsc-2025-0351 | Kwetsbaarheden verholpen in Apple MacOS | 2025-11-04T12:44:25.439757Z | 2025-11-04T12:44:25.439757Z |
| ncsc-2025-0350 | Kwetsbaarheid verholpen in CFMOTO Ride voertuigdatabeheer systemen | 2025-11-04T10:27:59.187171Z | 2025-11-04T10:27:59.187171Z |
| ncsc-2025-0349 | Kwetsbaarheden verholpen in Nagios XI | 2025-11-03T08:27:42.052256Z | 2025-11-03T08:27:42.052256Z |
| ncsc-2025-0348 | Kwetsbaarheden verholpen in Arista Networks producten | 2025-11-03T08:26:39.905306Z | 2025-11-03T08:26:39.905306Z |
| ncsc-2025-0347 | Kwetsbaarheden verholpen in IBM QRadar SIEM | 2025-11-03T08:17:18.981494Z | 2025-11-03T08:17:18.981494Z |
| ncsc-2025-0346 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2025-11-03T08:14:02.972842Z | 2025-11-03T08:14:02.972842Z |
| ncsc-2025-0345 | Kwetsbaarheden verholpen in Rockwell Automation FactoryTalk | 2025-10-31T09:35:00.469498Z | 2025-10-31T09:35:00.469498Z |
| ncsc-2025-0344 | Kwetsbaarheden verholpen in Rockwell Automation COMMS | 2025-10-31T09:34:05.069339Z | 2025-10-31T09:34:05.069339Z |
| ncsc-2025-0343 | Kwetsbaarheid verholpen in Mozilla Firefox | 2025-10-31T09:31:53.270725Z | 2025-10-31T09:31:53.270725Z |
| ncsc-2025-0342 | Kwetsbaarheden verholpen in GitLab Enterprise en Community Edition | 2025-10-27T08:08:17.974767Z | 2025-10-27T09:38:47.073257Z |
| ncsc-2025-0341 | Kwetsbaarheden verholpen in BIND 9 | 2025-10-24T08:19:45.232307Z | 2025-10-27T08:24:03.796638Z |
| ncsc-2025-0310 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-10-14T18:03:45.875739Z | 2025-10-24T11:09:29.790442Z |
| ncsc-2025-0340 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2025-10-23T14:13:39.969386Z | 2025-10-23T14:13:39.969386Z |
| ncsc-2025-0339 | Kwetsbaarheden verholpen in Oracle MySQL | 2025-10-23T14:11:30.111892Z | 2025-10-23T14:11:30.111892Z |
| ncsc-2025-0338 | Kwetsbaarheden verholpen in Oracle JD Edwards EnterpriseOne Tools | 2025-10-23T13:53:27.268400Z | 2025-10-23T13:53:27.268400Z |
| ncsc-2025-0337 | Kwetsbaarheden verholpen in Oracle Java | 2025-10-23T13:51:40.686406Z | 2025-10-23T13:51:40.686406Z |
| ncsc-2025-0336 | Kwetsbaarheden verholpen in Oracle Hyperion | 2025-10-23T13:49:44.344049Z | 2025-10-23T13:49:44.344049Z |
| ncsc-2025-0335 | Kwetsbaarheden verholpen in Oracle Analytics | 2025-10-23T13:45:06.747933Z | 2025-10-23T13:45:06.747933Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10502-1 | dcmtk-3.7.0-2.1 on GA media | 2026-04-08T00:00:00Z | 2026-04-08T00:00:00Z |
| opensuse-su-2026:10501-1 | MozillaThunderbird-140.9.1-1.1 on GA media | 2026-04-08T00:00:00Z | 2026-04-08T00:00:00Z |
| opensuse-su-2026:10500-1 | 389-ds-3.1.4+e2562f589-1.1 on GA media | 2026-04-08T00:00:00Z | 2026-04-08T00:00:00Z |
| opensuse-su-2026:20476-1 | Security update for mapserver | 2026-04-07T15:33:59Z | 2026-04-07T15:33:59Z |
| opensuse-su-2026:20471-1 | Security update for systemd | 2026-04-07T15:17:05Z | 2026-04-07T15:17:05Z |
| opensuse-su-2026:20472-1 | Security update for tar | 2026-04-07T14:58:07Z | 2026-04-07T14:58:07Z |
| opensuse-su-2026:20470-1 | Security update for libtasn1 | 2026-04-07T14:33:05Z | 2026-04-07T14:33:05Z |
| opensuse-su-2026:20469-1 | Security update for cockpit-packages | 2026-04-07T13:03:46Z | 2026-04-07T13:03:46Z |
| opensuse-su-2026:20465-1 | Security update for tigervnc | 2026-04-07T12:21:55Z | 2026-04-07T12:21:55Z |
| opensuse-su-2026:20468-1 | Security update for python-cbor2 | 2026-04-07T11:57:38Z | 2026-04-07T11:57:38Z |
| opensuse-su-2026:20466-1 | Security update for libpng16 | 2026-04-07T11:57:38Z | 2026-04-07T11:57:38Z |
| opensuse-su-2026:20473-1 | Security update for osslsigncode | 2026-04-07T07:50:40Z | 2026-04-07T07:50:40Z |
| opensuse-su-2026:10499-1 | python311-social-auth-app-django-5.7.0-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10498-1 | libeverest-3.6.6-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10497-1 | heroic-games-launcher-2.20.1-5.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10496-1 | git-cliff-2.12.0-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10495-1 | ckermit-9.0.302-20.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10494-1 | SDL2_image-devel-2.8.10-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:20464-1 | Security update for cockpit-repos | 2026-04-05T02:50:21Z | 2026-04-05T02:50:21Z |
| opensuse-su-2026:10493-1 | SDL3_image-devel-3.4.2-1.1 on GA media | 2026-04-05T00:00:00Z | 2026-04-05T00:00:00Z |
| opensuse-su-2026:10492-1 | liblzma5-32bit-5.8.3-1.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10491-1 | python311-scitokens-1.8.1-2.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10490-1 | python311-aiohttp-3.13.5-2.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10489-1 | libinput-devel-1.31.1-1.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10488-1 | corosync-3.1.10-4.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10487-1 | chromedriver-146.0.7680.177-1.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10486-1 | amazon-ssm-agent-3.3.4121.0-1.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:20460-1 | Security update for chromium | 2026-04-03T06:09:23Z | 2026-04-03T06:09:23Z |
| opensuse-su-2026:10485-1 | python311-Flask-Cors-6.0.2-1.1 on GA media | 2026-04-03T00:00:00Z | 2026-04-03T00:00:00Z |
| opensuse-su-2026:10484-1 | k6-1.7.1-1.1 on GA media | 2026-04-03T00:00:00Z | 2026-04-03T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:3821 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:51:55+00:00 | 2026-05-09T15:03:35+00:00 |
| rhsa-2026:3838 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:44:33+00:00 | 2026-05-09T15:03:34+00:00 |
| rhsa-2026:3836 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:03:15+00:00 | 2026-05-09T15:03:34+00:00 |
| rhsa-2026:3835 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:01:36+00:00 | 2026-05-09T15:03:33+00:00 |
| rhsa-2026:3833 | Red Hat Security Advisory: grafana security update | 2026-03-05T08:23:57+00:00 | 2026-05-09T15:03:33+00:00 |
| rhsa-2026:3831 | Red Hat Security Advisory: grafana security update | 2026-03-05T07:55:46+00:00 | 2026-05-09T15:03:33+00:00 |
| rhsa-2026:3814 | Red Hat Security Advisory: go-rpm-macros security update | 2026-03-05T11:07:45+00:00 | 2026-05-09T15:03:32+00:00 |
| rhsa-2026:3827 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.20.3 | 2026-03-05T07:31:32+00:00 | 2026-05-09T15:03:31+00:00 |
| rhsa-2026:3825 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.20.3 | 2026-03-05T07:08:51+00:00 | 2026-05-09T15:03:31+00:00 |
| rhsa-2026:3822 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:53:01+00:00 | 2026-05-09T15:03:31+00:00 |
| rhsa-2026:3820 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:19:06+00:00 | 2026-05-09T15:03:29+00:00 |
| rhsa-2026:3818 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:11:00+00:00 | 2026-05-09T15:03:29+00:00 |
| rhsa-2026:3817 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:25:53+00:00 | 2026-05-09T15:03:29+00:00 |
| rhsa-2026:3816 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T05:42:24+00:00 | 2026-05-09T15:03:29+00:00 |
| rhsa-2026:3815 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T05:32:24+00:00 | 2026-05-09T15:03:28+00:00 |
| rhsa-2026:3813 | Red Hat Security Advisory: go-rpm-macros security update | 2026-03-05T05:30:04+00:00 | 2026-05-09T15:03:28+00:00 |
| rhsa-2026:3812 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T04:13:33+00:00 | 2026-05-09T15:03:27+00:00 |
| rhsa-2026:3782 | Red Hat Security Advisory: RHOAI 2.25.3 - Red Hat OpenShift AI | 2026-03-04T18:23:40+00:00 | 2026-05-09T15:03:26+00:00 |
| rhsa-2026:3753 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-04T15:52:29+00:00 | 2026-05-09T15:03:26+00:00 |
| rhsa-2026:3752 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-04T15:29:36+00:00 | 2026-05-09T15:03:26+00:00 |
| rhsa-2026:3723 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.15.4 | 2026-03-04T08:59:26+00:00 | 2026-05-09T15:03:26+00:00 |
| rhsa-2026:3718 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.15.4 | 2026-03-04T07:52:57+00:00 | 2026-05-09T15:03:25+00:00 |
| rhsa-2026:3713 | Red Hat Security Advisory: RHOAI 3.3 - Red Hat OpenShift AI | 2026-03-04T07:18:30+00:00 | 2026-05-09T15:03:24+00:00 |
| rhsa-2026:3712 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.15.4 | 2026-03-04T07:12:04+00:00 | 2026-05-09T15:03:24+00:00 |
| rhsa-2026:3710 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.15.3 | 2026-03-04T06:00:07+00:00 | 2026-05-09T15:03:24+00:00 |
| rhsa-2026:3699 | Red Hat Security Advisory: yggdrasil-worker-package-manager security update | 2026-03-04T05:15:19+00:00 | 2026-05-09T15:03:24+00:00 |
| rhsa-2026:3669 | Red Hat Security Advisory: go-rpm-macros security update | 2026-03-03T15:33:23+00:00 | 2026-05-09T15:03:24+00:00 |
| rhsa-2026:3470 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T01:22:15+00:00 | 2026-05-09T15:03:24+00:00 |
| rhsa-2026:3668 | Red Hat Security Advisory: go-rpm-macros security update | 2026-03-03T16:17:02+00:00 | 2026-05-09T15:03:23+00:00 |
| rhsa-2026:3559 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.14 | 2026-03-02T17:03:40+00:00 | 2026-05-09T15:03:23+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2022-165-06 | Schneider Electric C-Bus Home Automation Products | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-05 | EcoStruxure Power Commission | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-04 | Data Center Expert | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-03 | Conext™ Combox | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-02 | Geo SCADA Mobile | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-067-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ for x70 | 2022-03-08T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2021-012-02 | EcoStruxure Power Build - Rapsody | 2021-01-12T08:32:35.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-130-03 | Wiser Smart | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-130-02 | Saitel DP RTU | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-130-01 | PowerLogic ION Setup | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2021-313-03 | APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices | 2021-11-09T06:30:00.000Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-039-04 | spaceLYnk, Wiser For KNX, fellerLYnk | 2022-02-08T20:32:52.000Z | 2022-03-08T20:32:52.000Z |
| sevd-2022-067-03 | Ritto Wiser™ Door | 2022-03-08T10:12:35.000Z | 2022-03-08T10:12:35.000Z |
| sevd-2021-313-04 | Windows Print Spooler embedded in EcoStruxure™ Process Expert | 2021-11-09T08:45:48.000Z | 2022-03-08T08:45:48.000Z |
| sevd-2022-011-03 | Easergy P5 | 2022-01-11T11:05:25.000Z | 2022-03-02T11:05:25.000Z |
| sevd-2022-039-06 | Harmony/Magelis iPC Series HMI, Vijeo Designer and Vijeo Designer Basic | 2022-02-08T23:25:23.000Z | 2022-02-08T23:25:23.000Z |
| sevd-2022-039-03 | Easergy P40 | 2022-02-08T17:58:55.000Z | 2022-02-08T17:58:55.000Z |
| sevd-2022-039-05 | EcoStruxure Geo SCADA Expert | 2022-02-08T17:33:44.000Z | 2022-02-08T17:33:44.000Z |
| sevd-2022-039-02 | EcoStruxure EV Charging Expert | 2022-02-08T12:36:59.000Z | 2022-02-08T12:36:59.000Z |
| sevd-2022-039-01 | IGSS (Interactive Graphical SCADA System) | 2022-02-08T07:29:58.000Z | 2022-02-08T07:29:58.000Z |
| sevd-2022-011-07 | EcoStruxure™ Power Monitoring Expert | 2022-01-11T13:20:28.000Z | 2022-01-11T13:20:28.000Z |
| sevd-2022-011-05 | ConneXium Tofino Firewall and Loadable Security Modules | 2022-01-11T12:53:54.000Z | 2022-01-11T12:53:54.000Z |
| sevd-2022-011-04 | Easergy P3 | 2022-01-11T11:28:56.000Z | 2022-01-11T11:28:56.000Z |
| sevd-2022-011-02 | Easergy T300 | 2022-01-11T10:48:02.000Z | 2022-01-11T10:48:02.000Z |
| sevd-2022-011-01 | Ethernet and Web server on Modicon M340 controller and Communication Modules | 2022-01-11T07:53:07.000Z | 2022-01-11T07:53:07.000Z |
| sevd-2021-348-04 | APC by Schneider Electric Rack PDU | 2021-12-14T00:00:00.000Z | 2021-12-21T00:00:00.000Z |
| sevd-2021-348-02 | EVlink City / Parking / Smart Wallbox Charging Stations | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sevd-2021-348-01 | IGSS (Interactive Graphical SCADA System) | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sevd-2021-313-07 | Eurotherm GUIcon | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-313-02 | Schneider Electric Software Update | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-556937 | SSA-556937: Multiple Vulnerabilities in VersiCharge AC Series EV Chargers | 2025-05-13T00:00:00Z | 2025-05-14T00:00:00Z |
| ssa-552330 | SSA-552330: System Configuration Password Reset in Siveillance Video V2024 R1 | 2025-05-14T00:00:00Z | 2025-05-14T00:00:00Z |
| ssa-935500 | SSA-935500: Denial of Service Vulnerability in FTP Server of Nucleus RTOS based APOGEE, TALON and Desigo PXC/PXM Products | 2022-10-11T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-901508 | SSA-901508: Multiple Vulnerabilities in INTRALOG WMS Before V5 | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-828116 | SSA-828116: Denial of Service Vulnerability in BACnet ATEC Devices | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-819629 | SSA-819629: Weak Authentication Vulnerability in Industrial Edge Device Kit | 2025-04-08T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-718393 | SSA-718393: Partial Denial of Service Vulnerability in APOGEE PXC and TALON TC Series (BACnet) Devices | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-668154 | SSA-668154: Denial of Service Vulnerability in MS/TP Point Pickup Module | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-542540 | SSA-542540: Out of Bounds Read Vulnerability in Teamcenter Visualization | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-523418 | SSA-523418: Information Disclosure Vulnerability in Desigo CC | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-455250 | SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.2-h3 | 2024-04-09T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-339086 | SSA-339086: Insufficient Session Expiration Vulnerability in SIMATIC PCS neo | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-222768 | SSA-222768: Multiple Vulnerabilities in SIRIUS 3SK2 Safety Relays and 3RK3 Modular Safety Systems | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-162255 | SSA-162255: Multiple Vulnerabilities in Polarion Before V2410 | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-103653 | SSA-103653: Denial-of-Service Vulnerability in Automation License Manager | 2024-09-10T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-047424 | SSA-047424: Code Execution and SQL Injection Vulnerabilities in OZW Web Servers | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-443402 | SSA-443402: Multiple SQL Injection Vulnerabilities in TeleControl Server Basic before V3.1.2.2 | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| ssa-395348 | SSA-395348: Improper Handling of Length Parameter Inconsistency Vulnerability in TeleControl Server Basic before V3.1.2.2 | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| ssa-817234 | SSA-817234: Multiple Kubernetes Ingress NGINX Controller Vulnerabilities in Insights Hub Private Cloud | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-686975 | SSA-686975: IPU 2022.3 Vulnerabilities in Siemens Industrial Products using Intel CPUs | 2023-02-14T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-672923 | SSA-672923: Out of Bounds Write Vulnerability in Solid Edge | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-525431 | SSA-525431: Privilege Escalation Vulnerabilities in Siemens License Server Before V4.3 | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-369369 | SSA-369369: Weak Registry Permission Vulnerability in SIMATIC IPC DiagBase and SIMATIC IPC DiagMonitor | 2025-02-11T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-306654 | SSA-306654: Insyde BIOS Vulnerabilities in Siemens Industrial Products | 2022-02-22T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-277137 | SSA-277137: Multiple Vulnerabilities in SIDIS Prime Before V4.0.700 | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-195895 | SSA-195895: User Enumeration Vulnerability in the Webserver of SIMATIC Products | 2025-02-11T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-187636 | SSA-187636: Multiple Vulnerabilities in SENTRON 7KT PAC1260 Data Manager | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-920092 | SSA-920092: Memory Corruption Vulnerability in Simcenter Femap | 2025-03-13T00:00:00Z | 2025-03-13T00:00:00Z |
| ssa-787280 | SSA-787280: Unlocked Bootloader Vulnerability in SINAMICS S200 | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-620288 | SSA-620288: Multiple Vulnerabilities (NUCLEUS:13) in Capital Embedded AR Classic | 2021-12-14T00:00:00Z | 2025-03-11T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21448-1 | Security update for sed | 2026-04-27T17:15:37Z | 2026-04-27T17:15:37Z |
| suse-su-2026:1637-1 | Security update for strongswan | 2026-04-27T16:59:38Z | 2026-04-27T16:59:38Z |
| suse-su-2026:1636-1 | Security update for fontforge | 2026-04-27T16:55:27Z | 2026-04-27T16:55:27Z |
| suse-su-2026:21407-1 | Security update for mariadb | 2026-04-27T14:02:32Z | 2026-04-27T14:02:32Z |
| suse-su-2026:21447-1 | Security update for python311 | 2026-04-27T12:47:02Z | 2026-04-27T12:47:02Z |
| suse-su-2026:21445-1 | Security update for avahi | 2026-04-27T12:41:42Z | 2026-04-27T12:41:42Z |
| suse-su-2026:21446-1 | Security update for freeipmi | 2026-04-27T12:27:43Z | 2026-04-27T12:27:43Z |
| suse-su-2026:1635-1 | Security update for freerdp | 2026-04-27T12:06:35Z | 2026-04-27T12:06:35Z |
| suse-su-2026:1634-1 | Security update for freerdp | 2026-04-27T12:06:21Z | 2026-04-27T12:06:21Z |
| suse-su-2026:1633-1 | Security update for freerdp | 2026-04-27T12:05:30Z | 2026-04-27T12:05:30Z |
| suse-su-2026:1632-1 | Security update for freerdp | 2026-04-27T12:04:30Z | 2026-04-27T12:04:30Z |
| suse-su-2026:21455-1 | Security update for openCryptoki | 2026-04-27T12:00:49Z | 2026-04-27T12:00:49Z |
| suse-su-2026:21405-1 | Security update for container-suseconnect | 2026-04-27T11:20:43Z | 2026-04-27T11:20:43Z |
| suse-su-2026:1631-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 15 SP7) | 2026-04-27T08:04:29Z | 2026-04-27T08:04:29Z |
| suse-su-2026:1630-1 | Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) | 2026-04-27T08:04:19Z | 2026-04-27T08:04:19Z |
| suse-su-2026:1629-1 | Security update for the Linux Kernel (Live Patch 70 for SUSE Linux Enterprise 12 SP5) | 2026-04-25T08:33:50Z | 2026-04-25T08:33:50Z |
| suse-su-2026:1622-1 | Security update for the Linux Kernel (Live Patch 25 for SUSE Linux Enterprise 15 SP5) | 2026-04-25T04:04:34Z | 2026-04-25T04:04:34Z |
| suse-su-2026:1621-1 | Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5) | 2026-04-24T18:33:52Z | 2026-04-24T18:33:52Z |
| suse-su-2026:21404-1 | Security update for bouncycastle | 2026-04-24T15:54:52Z | 2026-04-24T15:54:52Z |
| suse-su-2026:1618-1 | Security update for dnsdist | 2026-04-24T14:25:54Z | 2026-04-24T14:25:54Z |
| suse-su-2026:1617-1 | Security update for cups | 2026-04-24T14:25:14Z | 2026-04-24T14:25:14Z |
| suse-su-2026:1611-1 | Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5) | 2026-04-24T14:05:51Z | 2026-04-24T14:05:51Z |
| suse-su-2026:1613-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6) | 2026-04-24T13:34:09Z | 2026-04-24T13:34:09Z |
| suse-su-2026:21412-1 | Security update for Mesa | 2026-04-24T13:11:17Z | 2026-04-24T13:11:17Z |
| suse-su-2026:21440-1 | Security update for ovmf | 2026-04-24T13:08:28Z | 2026-04-24T13:08:28Z |
| suse-su-2026:1608-1 | Security update for python-ecdsa | 2026-04-24T11:51:39Z | 2026-04-24T11:51:39Z |
| suse-su-2026:1607-1 | Security update for vim | 2026-04-24T11:50:57Z | 2026-04-24T11:50:57Z |
| suse-su-2026:1606-1 | Security update for the Linux Kernel | 2026-04-24T11:50:23Z | 2026-04-24T11:50:23Z |
| suse-su-2026:1605-1 | Security update for openssl-3 | 2026-04-24T11:48:58Z | 2026-04-24T11:48:58Z |
| suse-su-2026:1604-1 | Security update for tomcat | 2026-04-24T11:48:42Z | 2026-04-24T11:48:42Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:6435 | Moderate: mariadb:10.11 security update | 2026-04-02T00:00:00Z | 2026-04-09T09:01:32Z |
| alsa-2026:6463 | Important: openssh security update | 2026-04-02T00:00:00Z | 2026-04-09T08:50:06Z |
| alsa-2026:6462 | Important: openssh security update | 2026-04-02T00:00:00Z | 2026-04-09T08:39:22Z |
| alsa-2026:6461 | Important: openssh security update | 2026-04-02T00:00:00Z | 2026-04-09T08:28:49Z |
| alsa-2026:7080 | Important: nodejs22 security update | 2026-04-08T00:00:00Z | 2026-04-09T02:15:49Z |
| alsa-2026:7081 | Moderate: libtiff security update | 2026-04-08T00:00:00Z | 2026-04-09T02:00:14Z |
| alsa-2026:6628 | Important: fontforge security update | 2026-04-06T00:00:00Z | 2026-04-08T23:11:48Z |
| alsa-2026:6631 | Important: fontforge security update | 2026-04-06T00:00:00Z | 2026-04-08T20:50:37Z |
| alsa-2026:6572 | Moderate: kernel-rt security update | 2026-04-06T00:00:00Z | 2026-04-06T09:38:16Z |
| alsa-2026:6571 | Moderate: kernel security update | 2026-04-06T00:00:00Z | 2026-04-06T09:27:57Z |
| alsa-2026:6621 | Moderate: crun security update | 2026-04-06T00:00:00Z | 2026-04-06T08:42:59Z |
| alsa-2026:6622 | Moderate: crun security update | 2026-04-06T00:00:00Z | 2026-04-06T08:36:15Z |
| alsa-2026:6300 | Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update | 2026-03-31T00:00:00Z | 2026-04-03T17:13:38Z |
| alsa-2026:6436 | Moderate: rsync security update | 2026-04-02T00:00:00Z | 2026-04-03T12:29:15Z |
| alsa-2026:6439 | Important: libpng15 security update | 2026-04-02T00:00:00Z | 2026-04-03T12:19:53Z |
| alsa-2026:6445 | Important: libpng12 security update | 2026-04-02T00:00:00Z | 2026-04-03T12:13:28Z |
| alsa-2026:6470 | Important: perl-YAML-Syck security update | 2026-04-02T00:00:00Z | 2026-04-03T12:07:59Z |
| alsa-2026:6473 | Important: python3 security update | 2026-04-02T00:00:00Z | 2026-04-03T12:02:03Z |
| alsa-2026:6388 | Important: grafana-pcp security update | 2026-04-01T00:00:00Z | 2026-04-03T10:02:10Z |
| alsa-2026:6344 | Important: grafana security update | 2026-04-01T00:00:00Z | 2026-04-03T09:56:37Z |
| alsa-2026:6259 | Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update | 2026-03-31T00:00:00Z | 2026-04-03T09:45:31Z |
| alsa-2026:6053 | Moderate: kernel security update | 2026-03-30T00:00:00Z | 2026-04-03T09:23:17Z |
| alsa-2026:6390 | Moderate: rsync security update | 2026-04-01T00:00:00Z | 2026-04-02T09:23:33Z |
| alsa-2026:6383 | Important: grafana-pcp security update | 2026-04-01T00:00:00Z | 2026-04-02T09:15:46Z |
| alsa-2026:6382 | Important: grafana security update | 2026-04-01T00:00:00Z | 2026-04-02T09:12:36Z |
| alsa-2026:6340 | Important: freerdp security update | 2026-04-01T00:00:00Z | 2026-04-02T09:09:13Z |
| alsa-2026:6005 | Important: freerdp security update | 2026-03-30T00:00:00Z | 2026-04-02T09:00:17Z |
| alsa-2026:6153 | Moderate: kernel security update | 2026-03-30T00:00:00Z | 2026-04-02T08:46:53Z |
| alsa-2026:6188 | Important: thunderbird security update | 2026-03-30T00:00:00Z | 2026-04-02T08:18:50Z |
| alsa-2026:6342 | Important: thunderbird security update | 2026-04-01T00:00:00Z | 2026-04-01T11:59:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2026-297 | Security exception in org.apache.poi.util.IOUtils.safelyAllocate | 2026-02-24T00:02:29.789817Z | 2026-02-24T00:02:29.790144Z |
| osv-2026-292 | UNKNOWN WRITE in <wasmtime::runtime::func::Func>::call_unchecked_raw::< | 2026-02-23T00:19:15.717984Z | 2026-02-23T00:19:15.718280Z |
| osv-2026-272 | Heap-use-after-free in vcardproperty_get_value | 2026-02-21T00:20:10.455944Z | 2026-02-21T00:20:10.456357Z |
| osv-2026-261 | Segv on unknown address in ___interceptor_strtol | 2026-02-19T00:09:21.893775Z | 2026-02-19T00:09:21.894076Z |
| osv-2026-259 | Use-of-uninitialized-value in tsip_parse_input | 2026-02-18T00:14:29.378028Z | 2026-02-18T00:14:29.378341Z |
| osv-2023-819 | Heap-buffer-overflow in ucl_object_dtor_unref_single | 2023-09-09T14:01:07.368928Z | 2026-02-17T14:21:16.973749Z |
| osv-2023-78 | Heap-buffer-overflow in ucl_object_dtor_unref_single | 2023-02-18T13:01:01.445224Z | 2026-02-17T14:21:11.808505Z |
| osv-2021-1261 | UNKNOWN READ in kh_get_ucl_hash_node | 2021-09-15T00:00:41.384284Z | 2026-02-17T14:15:50.348749Z |
| osv-2026-255 | UNKNOWN WRITE in nmeaid_to_prn | 2026-02-17T00:17:19.574579Z | 2026-02-17T00:17:19.574905Z |
| osv-2026-244 | Use-of-uninitialized-value in ihevcd_fmt_conv | 2026-02-15T00:03:36.246033Z | 2026-02-15T00:03:36.246568Z |
| osv-2026-242 | Use-of-uninitialized-value in ntrip_parse_url | 2026-02-14T00:17:42.945923Z | 2026-02-14T00:17:42.946299Z |
| osv-2026-240 | Use-of-uninitialized-value in packet_get1 | 2026-02-14T00:09:50.559032Z | 2026-02-14T00:09:50.559326Z |
| osv-2025-219 | Heap-buffer-overflow in opj_j2k_read_tile_header | 2025-03-18T00:18:30.566980Z | 2026-02-11T14:21:43.026699Z |
| osv-2022-725 | Heap-buffer-overflow in jxl::N_EMU128::WriteToU8Stage::ProcessRow | 2022-08-18T00:01:05.918943Z | 2026-02-11T14:11:54.187880Z |
| osv-2022-608 | Heap-use-after-free in jxl::WriteToPixelCallbackStage::ProcessRow | 2022-07-21T00:01:50.967627Z | 2026-02-11T14:11:11.571040Z |
| osv-2026-216 | Heap-buffer-overflow in mg_mqtt_next_prop | 2026-02-10T00:08:51.349946Z | 2026-02-11T14:08:38.238200Z |
| osv-2026-229 | Segv on unknown address in aiAnimation::~aiAnimation | 2026-02-11T00:12:18.313233Z | 2026-02-11T00:12:18.313574Z |
| osv-2026-226 | UNKNOWN WRITE in decode_xa2_00 | 2026-02-11T00:10:08.757600Z | 2026-02-11T00:10:08.757920Z |
| osv-2026-215 | UNKNOWN READ in getTypeCacheHashTableBucket | 2026-02-10T00:07:25.477890Z | 2026-02-10T00:07:25.478286Z |
| osv-2026-212 | UNKNOWN READ in gpsd_poll | 2026-02-09T00:15:09.775765Z | 2026-02-09T00:15:09.776491Z |
| osv-2022-519 | Stack-buffer-overflow in LookupThousands | 2022-06-29T00:00:24.107785Z | 2026-02-08T14:10:55.777894Z |
| osv-2022-462 | Stack-buffer-overflow in strcat | 2022-06-07T00:01:47.521548Z | 2026-02-08T14:10:42.909724Z |
| osv-2021-802 | Stack-buffer-overflow in InterpretCondition | 2021-05-27T00:00:31.797718Z | 2026-02-08T14:08:02.526845Z |
| osv-2021-1110 | Stack-buffer-overflow in TranslateWord2 | 2021-08-08T00:02:17.026887Z | 2026-02-08T14:07:47.971880Z |
| osv-2026-209 | Use-of-uninitialized-value in ntrip_parse_url | 2026-02-08T00:06:08.137216Z | 2026-02-08T00:06:08.137699Z |
| osv-2025-547 | Security exception in com.alibaba.fastjson2.JSONReader.readArray | 2025-07-15T00:09:03.936493Z | 2026-02-07T14:17:37.720783Z |
| osv-2023-197 | Global-buffer-overflow in base_C_MessageEncryptInit | 2023-03-18T13:00:57.254906Z | 2026-02-07T14:09:46.773524Z |
| osv-2026-205 | UNKNOWN READ in gpsd_poll | 2026-02-07T00:03:03.099317Z | 2026-02-07T00:03:03.099778Z |
| osv-2026-204 | Segv on unknown address in icalarray_append | 2026-02-06T00:20:37.969087Z | 2026-02-06T00:20:37.969390Z |
| osv-2026-203 | Segv on unknown address in glslang::TIntermediate::addSymbol | 2026-02-06T00:20:30.779951Z | 2026-02-06T00:20:30.780234Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2023-0096 | Plaintext exposed in decrypt_in_place_detached even on tag verification failure | 2023-11-22T12:00:00Z | 2025-12-29T13:49:34Z |
| rustsec-2025-0138 | --allow-read / --allow-write permission bypass in `node:sqlite` | 2025-06-03T12:00:00Z | 2025-12-29T10:04:21Z |
| rustsec-2025-0137 | Unsoundness of safe `reciprocal_mg10` | 2025-12-22T12:00:00Z | 2025-12-28T09:42:26Z |
| rustsec-2024-0447 | Panics on Malformed Untrusted Input | 2024-12-05T12:00:00Z | 2025-12-24T14:48:25Z |
| rustsec-2023-0095 | Invalid Slice Split Results in Server Panic | 2023-08-03T12:00:00Z | 2025-12-22T18:53:25Z |
| rustsec-2024-0446 | Shell expansion in custom commands | 2024-07-26T12:00:00Z | 2025-12-22T13:54:49Z |
| rustsec-2022-0103 | Incorrect signature verification on gzip-compressed install images | 2022-03-04T12:00:00Z | 2025-12-21T13:45:28Z |
| rustsec-2024-0445 | cap-primitives doesn't fully sandbox all the Windows device filenames | 2024-11-05T12:00:00Z | 2025-12-19T21:01:24Z |
| rustsec-2024-0444 | Uncaught exception when transitioning the state of `AsyncGenerator` objects from within a property getter of `then` | 2024-08-14T12:00:00Z | 2025-12-19T06:15:15Z |
| rustsec-2021-0082 | vec-const attempts to construct a Vec from a pointer to a const slice | 2021-08-14T12:00:00Z | 2025-12-17T17:06:41Z |
| rustsec-2025-0136 | Underflow in aes_key_unwrap function | 2025-11-07T12:00:00Z | 2025-12-17T06:01:32Z |
| rustsec-2025-0135 | matrix-sdk-base: Denial of service due to custom `m.room.join_rules` events | 2025-12-08T12:00:00Z | 2025-12-08T12:23:54Z |
| rustsec-2025-0133 | Incorrect calculation on aarch64 | 2025-12-04T12:00:00Z | 2025-12-06T07:36:56Z |
| rustsec-2025-0134 | rustls-pemfile is unmaintained | 2025-11-28T12:00:00Z | 2025-12-05T19:07:24Z |
| rustsec-2025-0132 | `Reader::open_mmap` unsoundly marks unsafe memmap operation as safe | 2025-11-28T12:00:00Z | 2025-12-02T06:03:09Z |
| rustsec-2025-0131 | Lack of sufficient checks in public API | 2025-10-31T12:00:00Z | 2025-12-02T06:03:09Z |
| rustsec-2025-0120 | json5 crate is unmaintained | 2025-11-16T12:00:00Z | 2025-11-30T00:15:16Z |
| rustsec-2025-0126 | Heap-buffer-overflow in nftnl::Batch::with_page_size (nftnl-rs) | 2025-10-18T12:00:00Z | 2025-11-27T21:53:33Z |
| rustsec-2025-0130 | Missing check in ZK proof in CGGMP21 Threshold Signing Protocol | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0129 | Missing check in ZK proof in CGGMP21 Threshold Signing Protocol | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0128 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0127 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0125 | Resource Exhaustion (Memory and Handle Leaks) on Windows and macOS | 2025-11-22T12:00:00Z | 2025-11-22T12:29:36Z |
| rustsec-2025-0124 | rand_os crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-19T20:48:42Z |
| rustsec-2025-0123 | opentelemetry-jaeger crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T12:07:07Z |
| rustsec-2025-0122 | cargo-asm crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T09:02:31Z |
| rustsec-2025-0121 | gcc crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:52:10Z |
| rustsec-2025-0119 | number_prefix crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:13:56Z |
| rustsec-2025-0118 | Unsound API access to a WebAssembly shared linear memory | 2025-11-11T12:00:00Z | 2025-11-13T16:55:40Z |
| rustsec-2025-0117 | tandem is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-jre-2021-35561 | 2026-05-08T05:44:04.237Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2021-35560 | 2026-05-08T05:44:02.693Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2021-35559 | 2026-05-08T05:44:01.184Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2021-35556 | 2026-05-08T05:43:59.659Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2021-35550 | 2026-05-08T05:43:58.139Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2021-2432 | 2026-05-08T05:43:56.704Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2021-2388 | 2026-05-08T05:43:55.106Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2021-2369 | 2026-05-08T05:43:53.510Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2021-2341 | 2026-05-08T05:43:52.006Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2021-2163 | 2026-05-08T05:43:50.537Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2021-2161 | 2026-05-08T05:43:49.190Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2830 | 2026-05-08T05:43:47.818Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2816 | 2026-05-08T05:43:46.430Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2805 | 2026-05-08T05:43:44.947Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2803 | 2026-05-08T05:43:43.528Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2800 | 2026-05-08T05:43:42.068Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2781 | 2026-05-08T05:43:40.437Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2778 | 2026-05-08T05:43:38.855Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2773 | 2026-05-08T05:43:37.408Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2767 | 2026-05-08T05:43:35.862Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2757 | 2026-05-08T05:43:34.438Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2756 | 2026-05-08T05:43:33.125Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2755 | 2026-05-08T05:43:31.714Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2754 | 2026-05-08T05:43:30.218Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2659 | 2026-05-08T05:43:28.757Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2655 | 2026-05-08T05:43:27.139Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2654 | 2026-05-08T05:43:25.570Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2604 | 2026-05-08T05:43:24.013Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2601 | 2026-05-08T05:43:22.521Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-2593 | 2026-05-08T05:43:21.153Z | 2026-05-08T06:11:36.072Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-dg06447 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.12.2-r0, 2.12.2-r1 | 2026-04-01T09:10:38.729051Z | 2026-03-28T10:04:36Z |
| cleanstart-2026-gq31133 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-527x-5wrf-22m2, ghsa-9h8m-3fm2-qjrq, ghsa-c9v3-4pv7-87pr, ghsa-h75p-j8xm-m278, ghsa-p77j-4mvh-x3m3 applied in versions: 1.26.7-r0, 1.26.7-r1, 1.26.7-r2 | 2026-04-01T09:10:41.066012Z | 2026-03-28T10:03:10Z |
| cleanstart-2026-mj07404 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-527x-5wrf-22m2, ghsa-9h8m-3fm2-qjrq, ghsa-c9v3-4pv7-87pr, ghsa-h75p-j8xm-m278, ghsa-p77j-4mvh-x3m3 applied in versions: 1.26.7-r0, 1.26.7-r1, 1.26.7-r2 | 2026-04-01T09:10:45.280620Z | 2026-03-28T10:02:34Z |
| cleanstart-2026-kj02127 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.8.6-r0, 1.8.6-r1 | 2026-04-01T09:11:01.446923Z | 2026-03-28T10:00:21Z |
| cleanstart-2026-cg86499 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 3.6.5-r0 | 2026-04-01T09:11:07.076579Z | 2026-03-28T09:58:50Z |
| cleanstart-2026-gz72045 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 3.51.2-r0 | 2026-04-01T09:11:42.310345Z | 2026-03-28T09:54:58Z |
| cleanstart-2026-oj21550 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2026-24051, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 1.34.2-r0, 1.35.0-r0, 1.35.3-r0 | 2026-04-01T09:12:23.484446Z | 2026-03-28T09:40:45Z |
| cleanstart-2026-cf63743 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2026-24051, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 1.34.2-r0, 1.34.6-r0 | 2026-04-01T09:12:16.516536Z | 2026-03-28T09:39:54Z |
| cleanstart-2026-jf28061 | Security fixes for CVE-2026-24051, CVE-2026-26958, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 2.19.0-r0, 2.19.0-r1 | 2026-04-01T09:12:22.444974Z | 2026-03-27T12:52:14Z |
| cleanstart-2026-ac65885 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25518, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 1.18.0-r0, 1.18.0-r1, 1.18.0-r2, 1.18.0-r3 | 2026-04-01T09:13:17.231184Z | 2026-03-27T06:25:28Z |
| cleanstart-2026-kz45320 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:16:45.727713Z | 2026-03-26T18:22:34Z |
| cleanstart-2026-bd71263 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:17:26.065920Z | 2026-03-26T17:04:08Z |
| cleanstart-2026-jr35772 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:17:37.864227Z | 2026-03-26T15:01:29Z |
| cleanstart-2026-ow78143 | Security fixes for CVE-2025-68156, CVE-2026-24051, CVE-2026-26958, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 2.18.3-r0, 2.18.3-r1 | 2026-04-01T09:14:00.541150Z | 2026-03-26T14:38:42Z |
| cleanstart-2026-eq25508 | Security fixes for CVE-2025-11082, CVE-2025-11083 applied in versions: 2.46.0-r0 | 2026-04-01T09:16:21.124779Z | 2026-03-26T13:10:59Z |
| cleanstart-2026-em10970 | Security fixes for CVE-2017-9233, CVE-2019-15903, CVE-2021-45960, CVE-2021-46143, CVE-2022-22822, CVE-2022-22823, CVE-2022-22824, CVE-2022-22825, CVE-2022-22826, CVE-2022-22827, CVE-2022-23852, CVE-2022-23990, CVE-2022-25235, CVE-2022-25236, CVE-2022-25313, CVE-2022-25314, CVE-2022-25315, CVE-2022-40674, CVE-2022-43680, CVE-2023-52425, CVE-2023-52426, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-50602, CVE-2026-24515, CVE-2026-25210, CVE-2026-32767 applied in versions: 2.2.0-r1, 2.2.7-r0, 2.2.7-r1, 2.4.3-r0, 2.4.4-r0, 2.4.5-r0, 2.4.9-r0, 2.5.0-r0, 2.6.0-r0, 2.6.2-r0, 2.6.3-r0, 2.6.4-r0, 2.7.2-r0, 2.7.5-r0 | 2026-04-01T09:16:01.861201Z | 2026-03-26T13:10:59Z |
| cleanstart-2026-ma32024 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, CVE-2026-33186, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.2-r1, 3.3.3-r0, 3.3.4-r0 | 2026-04-01T09:19:21.169476Z | 2026-03-26T07:01:17Z |
| cleanstart-2026-gi40937 | Security fixes for CVE-2023-5870, CVE-2024-7348, CVE-2025-8713, CVE-2025-8714, CVE-2025-8715 applied in versions: 16.1-r0, 16.2-r0, 16.4-r0, 17.6-r0 | 2026-04-01T09:18:12.444694Z | 2026-03-26T07:01:17Z |
| cleanstart-2026-mx45462 | Security fixes for CVE-2025-61729 applied in versions: 1.1.0-r0 | 2026-04-01T09:18:16.445023Z | 2026-03-25T14:24:33Z |
| cleanstart-2026-ae87452 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.20.12-r0, 1.20.12-r1, 1.20.12-r2 | 2026-04-01T09:19:15.219275Z | 2026-03-25T14:22:43Z |
| cleanstart-2026-ha09227 | Security fixes for CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.18.0-r0, 0.18.0-r1 | 2026-04-01T09:19:28.951475Z | 2026-03-25T14:21:54Z |
| cleanstart-2026-gm63718 | Security fixes for CVE-2025-15558, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-25934, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-q9hv-hpm4-hj6x applied in versions: 1.39.0-r0, 1.39.0-r1, 1.39.0-r2, 1.39.0-r3 | 2026-04-01T09:19:09.281060Z | 2026-03-25T14:21:09Z |
| cleanstart-2026-ls12576 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 1.16.2-r2, 1.17.2-r0, 1.17.2-r1, 1.18.0-r0 | 2026-04-01T09:19:50.661957Z | 2026-03-25T14:09:04Z |
| cleanstart-2026-pn56882 | Security fixes for CVE-2026-24051 applied in versions: 1.65.0-r0 | 2026-04-01T09:19:27.916186Z | 2026-03-25T14:07:29Z |
| cleanstart-2026-jg61689 | Security fixes for CVE-2025-15558, CVE-2026-33186, ghsa-p436-gjf2-799p applied in versions: 1.29.0-r0, 1.29.0-r1 | 2026-04-01T09:19:48.393428Z | 2026-03-25T13:59:35Z |
| cleanstart-2026-ic68874 | Security fixes for CVE-2025-15558, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.13.4-r0, 2.13.4-r1 | 2026-04-01T09:20:18.599218Z | 2026-03-25T11:32:52Z |
| cleanstart-2026-gm18965 | Security fixes for CVE-2025-15558, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.14.2-r2 | 2026-04-01T09:20:25.238160Z | 2026-03-25T11:27:12Z |
| cleanstart-2026-at91215 | Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2x5j-vhc8-9cwm, ghsa-6m8w-jc87-6cr7, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-vvgc-356p-c3xw applied in versions: 1.14.4-r1, 1.14.4-r2, 1.15.3-r1, 1.15.3-r2 | 2026-04-01T09:20:36.013002Z | 2026-03-25T11:15:10Z |
| cleanstart-2026-gk29346 | Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2025-66564, CVE-2026-1229, CVE-2026-22039, CVE-2026-22703, CVE-2026-22772, CVE-2026-23831, CVE-2026-23881, CVE-2026-24051, CVE-2026-24117, CVE-2026-24137, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-29wx-vh33-7x7r, ghsa-2x5j-vhc8-9cwm, ghsa-459x-q9hg-4gpq, ghsa-4qg8-fj49-pxjh, ghsa-4vq8-7jfc-9cvp, ghsa-6m8w-jc87-6cr7, ghsa-88jx-383q-w4qc, ghsa-95pr-fxf5-86gv, ghsa-c5q2-7r4c-mv6g, ghsa-c6gw-w398-hv78, ghsa-c77r-fh37-x2px, ghsa-f83f-xpx7-ffpw, ghsa-fv92-fjc5-jj9h, ghsa-jrr2-x33p-6hvc, ghsa-mh63-6h87-95cp, ghsa-mqqf-5wvp-8fh8, ghsa-p77j-4mvh-x3m3, ghsa-qjvc-p88j-j9rm, ghsa-r5p3-955p-5ggq, ghsa-v23v-6jw2-98fq, ghsa-v6v8-xj6m-xwqh, ghsa-xw73-rw38-6vjc applied in versions: 1.4.2-r2, 1.4.2-r4, 1.4.2-r6, 1.4.2-r7 | 2026-04-01T09:22:17.389111Z | 2026-03-25T11:02:44Z |
| cleanstart-2026-ce02533 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2025-62820, CVE-2026-30836, CVE-2026-33186, ghsa-p77j-4mvh-x3m3, ghsa-q4r8-xm5f-56gw applied in versions: 0.10.1-r0, 0.9.10-r0, 0.9.9-r0, 0.9.9-r1 | 2026-04-01T09:21:33.459909Z | 2026-03-25T10:51:25Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2020-ALE-018 | Vulnérabilité dans Cisco ASA et FTD | 2020-07-28T00:00:00.000000 | 2020-11-05T00:00:00.000000 |
| certfr-2020-ale-017 | Multiples vulnérabilités dans SAP Netweaver AS JAVA | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| certfr-2020-ale-016 | Vulnérabilité dans Microsoft Domain Name System (DNS) Server | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| CERTFR-2020-ALE-017 | Multiples vulnérabilités dans SAP Netweaver AS JAVA | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| CERTFR-2020-ALE-016 | Vulnérabilité dans Microsoft Domain Name System (DNS) Server | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| certfr-2020-ale-015 | Vulnérabilité dans F5 BIG-IP | 2020-07-05T00:00:00.000000 | 2020-09-15T00:00:00.000000 |
| CERTFR-2020-ALE-015 | Vulnérabilité dans F5 BIG-IP | 2020-07-05T00:00:00.000000 | 2020-09-15T00:00:00.000000 |
| certfr-2020-ale-014 | Vulnérabilité dans Palo Alto Networks PAN-OS | 2020-07-03T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-012 | Multiples vulnérabilités dans SaltStack | 2020-05-04T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-008 | Vulnérabilité dans l'implémentation du protocole SMB par Microsoft | 2020-03-11T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-002 | Vulnérabilité dans les produits Citrix ADC et Citrix Gateway | 2020-01-09T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-014 | Vulnérabilité dans Palo Alto Networks PAN-OS | 2020-07-03T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-012 | Multiples vulnérabilités dans SaltStack | 2020-05-04T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-008 | Vulnérabilité dans l'implémentation du protocole SMB par Microsoft | 2020-03-11T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-002 | Vulnérabilité dans les produits Citrix ADC et Citrix Gateway | 2020-01-09T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-013 | Multiples vulnérabilités dans Microsoft Windows | 2020-07-01T00:00:00.000000 | 2020-07-05T00:00:00.000000 |
| CERTFR-2020-ALE-013 | Multiples vulnérabilités dans Microsoft Windows | 2020-07-01T00:00:00.000000 | 2020-07-05T00:00:00.000000 |
| certfr-2020-ale-011 | Multiples vulnérabilités dans les produits Microsoft qui utilisent la bibliothèque Autodesk FBX | 2020-04-22T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-ale-009 | Multiples vulnérabilités dans Microsoft Windows | 2020-03-24T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| CERTFR-2020-ALE-011 | Multiples vulnérabilités dans les produits Microsoft qui utilisent la bibliothèque Autodesk FBX | 2020-04-22T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| CERTFR-2020-ALE-009 | Multiples vulnérabilités dans Microsoft Windows | 2020-03-24T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-ale-010 | Multiples vulnérabilités dans Mozilla Firefox | 2020-04-06T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-007 | Vulnérabilité dans Microsoft Exchange Server | 2020-02-27T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-001 | Multiples vulnérabilités dans les produits de Pulse Secure | 2020-01-09T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| CERTFR-2020-ALE-010 | Multiples vulnérabilités dans Mozilla Firefox | 2020-04-06T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| CERTFR-2020-ALE-007 | Vulnérabilité dans Microsoft Exchange Server | 2020-02-27T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| CERTFR-2020-ALE-001 | Multiples vulnérabilités dans les produits de Pulse Secure | 2020-01-09T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2020-01-20T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-ale-005 | Multiples vulnérabilités dans le serveur de passerelle RDP de Windows | 2020-01-14T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| CERTFR-2020-ALE-006 | Vulnérabilité dans Microsoft Internet Explorer | 2020-01-20T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0375 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-30T00:00:00.000000 | 2026-03-30T00:00:00.000000 |
| certfr-2026-avi-0374 | Vulnérabilité dans Docker Desktop | 2026-03-30T00:00:00.000000 | 2026-03-30T00:00:00.000000 |
| certfr-2026-avi-0372 | Multiples vulnérabilités dans les produits IBM | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0371 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0370 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0369 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0368 | Vulnérabilité dans les produits Microsoft | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0367 | Multiples vulnérabilités dans Zabbix | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0366 | Multiples vulnérabilités dans Traefik | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0365 | Multiples vulnérabilités dans Spring AI | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0364 | Multiples vulnérabilités dans les produits Siemens | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0363 | Multiples vulnérabilités dans les produits NetApp | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0300 | Multiples vulnérabilités dans Mattermost Server | 2026-03-17T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0133 | Multiples vulnérabilités dans Roundcube | 2026-02-09T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0362 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0361 | Multiples vulnérabilités dans Cisco IOS et IOS XE | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0360 | Multiples vulnérabilités dans ISC BIND | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0359 | Multiples vulnérabilités dans Grafana | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0201 | Multiples vulnérabilités dans Mattermost Server | 2026-02-24T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0358 | Vulnérabilité dans Citrix XenServer | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0357 | Multiples vulnérabilités dans GitLab | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0356 | Vulnérabilité dans ISC Kea | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0355 | Multiples vulnérabilités dans les produits Apple | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0354 | Multiples vulnérabilités dans les produits Mozilla | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0353 | Multiples vulnérabilités dans Zabbix | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0352 | Multiples vulnérabilités dans les produits F5 | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0351 | Vulnérabilité dans Tenable OT Platform | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0350 | Multiples vulnérabilités dans Squid | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0349 | Multiples vulnérabilités dans Ruby on Rails | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0348 | Vulnérabilité dans Trend Micro Deep Discovery Inspector | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000068 | Seiko Solutions SkyBridge BASIC MB-A130 vulnerable to OS command injection | 2025-09-01T16:21+09:00 | 2025-09-01T16:21+09:00 |
| jvndb-2025-012659 | Denial-of-service (DoS) vulnerability in Konica Minolta bizhub series | 2025-09-01T15:22+09:00 | 2025-09-01T15:22+09:00 |
| jvndb-2025-000067 | Multiple vulnerabilities in multiple iND products | 2025-08-29T14:47+09:00 | 2025-08-29T14:47+09:00 |
| jvndb-2025-000064 | Multiple vulnerabilities in SS1 | 2025-08-27T15:13+09:00 | 2025-08-27T15:13+09:00 |
| jvndb-2025-000065 | ScanSnap Manager installers vulnerable to privilege escalation | 2025-08-27T14:22+09:00 | 2025-08-27T14:22+09:00 |
| jvndb-2025-011884 | FUJIFILM Healthcare Americas Synapse Mobility vulnerable to Privilege Escalation | 2025-08-21T11:49+09:00 | 2025-08-25T10:38+09:00 |
| jvndb-2025-000063 | Western Digital Kitfox registers a Windows service with an unquoted file path | 2025-08-22T13:37+09:00 | 2025-08-22T13:37+09:00 |
| jvndb-2025-000062 | Multiple vulnerabilities in Group-Office | 2025-08-21T14:03+09:00 | 2025-08-21T14:03+09:00 |
| jvndb-2025-000061 | Multiple vulnerabilities in Movable Type | 2025-08-20T15:30+09:00 | 2025-08-20T15:30+09:00 |
| jvndb-2025-000059 | Seagate Toolkit registers a Windows service with an unquoted file path | 2025-08-14T12:32+09:00 | 2025-08-19T14:40+09:00 |
| jvndb-2025-010854 | Trend Micro Endpoint security products for enterprises vulnerable to multiple OS command injection | 2025-08-07T12:25+09:00 | 2025-08-19T11:36+09:00 |
| jvndb-2025-007521 | Multiple Brother driver installers for Windows vulnerable to privilege escalation | 2025-06-27T09:37+09:00 | 2025-08-19T11:29+09:00 |
| jvndb-2025-000060 | PgManage vulnerable to injection | 2025-08-18T13:40+09:00 | 2025-08-18T13:40+09:00 |
| jvndb-2025-000058 | WordPress plugin "Advanced Custom Fields" vulnerable to HTML injection | 2025-08-08T15:29+09:00 | 2025-08-08T15:29+09:00 |
| jvndb-2025-010972 | Multiple SEIKO EPSON products use weak initial passwords | 2025-08-08T14:50+09:00 | 2025-08-08T14:50+09:00 |
| jvndb-2025-000057 | Multiple vulnerabilities in Mubit Powered BLUE 870 | 2025-08-08T14:47+09:00 | 2025-08-08T14:47+09:00 |
| jvndb-2025-000056 | Multiple vulnerabilities in Sato label printers CL4/6NX Plus and CL4/6NX-J Plus series | 2025-08-06T16:38+09:00 | 2025-08-06T16:38+09:00 |
| jvndb-2025-010603 | Out-of-bounds write vulnerability in FUJIFILM Business Innovation MFPs | 2025-08-05T11:29+09:00 | 2025-08-05T11:29+09:00 |
| jvndb-2025-010408 | Multiple vulnerabilities in PowerCMS | 2025-08-01T12:05+09:00 | 2025-08-01T12:05+09:00 |
| jvndb-2025-000055 | ZXHN-F660T and ZXHN-F660A use a common credential for all installations | 2025-07-31T15:12+09:00 | 2025-07-31T15:12+09:00 |
| jvndb-2025-000054 | Apache Jena Fuseki vulnerable to path traversal | 2025-07-30T14:17+09:00 | 2025-07-30T14:17+09:00 |
| jvndb-2025-000053 | "SwitchBot" App vulnerable to insertion of sensitive information into log file | 2025-07-29T13:44+09:00 | 2025-07-29T13:44+09:00 |
| jvndb-2025-010056 | TP-Link VIGI NVR1104H-4P and VIGI NVR2016H-16MP vulnerable to OS command injection | 2025-07-28T17:53+09:00 | 2025-07-28T17:53+09:00 |
| jvndb-2025-000052 | TP-Link Archer C1200 vulnerable to clickjacking | 2025-07-24T14:16+09:00 | 2025-07-24T14:16+09:00 |
| jvndb-2025-000051 | Real-time Bus Tracking System vulnerable to improper validation of specified quantity in input | 2025-07-23T13:54+09:00 | 2025-07-23T13:54+09:00 |
| jvndb-2025-009576 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2025-07-23T11:13+09:00 | 2025-07-23T11:13+09:00 |
| jvndb-2025-000050 | "region PAY" App for Android vulnerable to insertion of sensitive information into log file | 2025-07-22T13:33+09:00 | 2025-07-22T13:33+09:00 |
| jvndb-2025-009150 | Security updates for Trend Micro products (June 2025) | 2025-07-17T17:03+09:00 | 2025-07-17T17:03+09:00 |
| jvndb-2025-000030 | Reflected cross-site scripting vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor | 2025-05-12T18:00+09:00 | 2025-07-17T10:06+09:00 |
| jvndb-2025-000049 | ZWX-2000CSW2-HN and ZWX-2000CS2-HN vulnerable to use of hard-coded credentials | 2025-07-16T13:54+09:00 | 2025-07-16T13:54+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-17909 | WordPress插件ElementsKit Elementor Addons and Templates跨站脚本漏洞 | 2026-04-10 | 2026-04-21 |
| cnvd-2026-17908 | Google Chrome代码执行漏洞(CNVD-2026-17908) | 2026-04-10 | 2026-04-21 |
| cnvd-2026-17907 | Apple macOS拒绝服务漏洞(CNVD-2026-17907) | 2026-04-10 | 2026-04-21 |
| cnvd-2026-17906 | Apple macOS拒绝服务漏洞(CNVD-2026-17906) | 2026-04-10 | 2026-04-21 |
| cnvd-2026-17905 | Apple macOS Sequoia安全绕过漏洞 | 2026-04-10 | 2026-04-21 |
| cnvd-2026-17904 | Apple macOS Sequoia存在未明漏洞(CNVD-2026-17904) | 2026-04-10 | 2026-04-21 |
| cnvd-2026-17903 | TRENDnet TEW-713RE命令注入漏洞 | 2026-04-10 | 2026-04-21 |
| cnvd-2026-17902 | TRENDnet TEW-657BRM vpn_drop函数操作系统命令注入漏洞 | 2026-04-10 | 2026-04-21 |
| cnvd-2026-17901 | TRENDnet TEW-657BRM update_pcdb函数堆栈缓冲区溢出漏洞 | 2026-04-10 | 2026-04-21 |
| cnvd-2026-17900 | TRENDnet TEW-657BRM add_wps_client函数操作系统命令注入漏洞 | 2026-04-10 | 2026-04-21 |
| cnvd-2026-17899 | TRENDnet TEW-657BRM add_apcdb函数堆栈溢出漏洞 | 2026-04-10 | 2026-04-21 |
| cnvd-2026-17898 | Dell Alienware Command Center访问控制错误漏洞 | 2026-03-17 | 2026-04-21 |
| cnvd-2026-17897 | OpenClaw存在未明漏洞(CNVD-2026-17897) | 2026-04-10 | 2026-04-21 |
| cnvd-2026-17896 | OpenClaw审批绕过漏洞 | 2026-04-10 | 2026-04-21 |
| cnvd-2026-17895 | OpenClaw存在未明漏洞(CNVD-2026-17895) | 2026-04-10 | 2026-04-21 |
| cnvd-2026-17894 | OpenClaw发送者策略绕过漏洞 | 2026-04-10 | 2026-04-21 |
| cnvd-2026-17893 | OpenClaw权限提升漏洞(CNVD-2026-17893) | 2026-04-10 | 2026-04-21 |
| cnvd-2026-17892 | OpenClaw沙盒绕过漏洞 | 2026-04-10 | 2026-04-21 |
| cnvd-2026-17891 | IBM Tivoli Netcool Impact日志信息泄露漏洞 | 2026-04-16 | 2026-04-21 |
| cnvd-2026-17890 | Apache Airflow安全绕过漏洞 | 2026-04-16 | 2026-04-21 |
| cnvd-2026-17889 | Siemens SICAM SIAPP SDK路径遍历漏洞 | 2026-03-17 | 2026-04-21 |
| cnvd-2026-17888 | Siemens SICAM SIAPP SDK命令执行漏洞 | 2026-03-17 | 2026-04-21 |
| cnvd-2026-17887 | Siemens SICAM SIAPP SDK拒绝服务漏洞 | 2026-03-17 | 2026-04-21 |
| cnvd-2026-17886 | Siemens SICAM SIAPP SDK堆栈缓冲区溢出漏洞 | 2026-03-17 | 2026-04-21 |
| cnvd-2026-17885 | Siemens SICAM SIAPP SDK越界写入漏洞 | 2026-03-17 | 2026-04-21 |
| cnvd-2026-17822 | Google Chrome on Windows未初始化使用漏洞 | 2026-04-16 | 2026-04-20 |
| cnvd-2026-17821 | Google Chrome存在未明漏洞(CNVD-2026-17821) | 2026-04-16 | 2026-04-20 |
| cnvd-2026-17820 | Google Chrome访问控制错误漏洞(CNVD-2026-17820) | 2026-04-16 | 2026-04-20 |
| cnvd-2026-17819 | Google Chrome Permissions组件内存错误引用漏洞 | 2026-04-16 | 2026-04-20 |
| cnvd-2026-17818 | Google Chrome Forms组件内存错误引用漏洞(CNVD-2026-17818) | 2026-04-16 | 2026-04-20 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15548 | Уязвимость компонента jfs/file.c ядра операционной системы Linux, позволяющая нарушителю … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15547 | Уязвимость компонента fs/ext4/inline.c ядра операционной системы Linux, позволяющая наруш… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15546 | Уязвимость драйвера gve ядра операционной системы Linux, позволяющая нарушителю вызвать о… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15545 | Уязвимость компонента arch/parisc/kernel/syscall.S ядра операционной системы Linux, позво… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15544 | Уязвимость компонента arch/parisc/include/asm/uaccess.h ядра операционной системы Linux, … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15543 | Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | 11.12.2025 | 16.02.2026 |
| bdu:2025-15289 | Уязвимость функции atmtcp_recv_control() ядра операционной системы Linux, позволяющая нар… | 08.12.2025 | 16.02.2026 |
| bdu:2025-15261 | Уязвимость компонента hid-asus.c ядра операционной системы Linux, позволяющая нарушителю … | 05.12.2025 | 16.02.2026 |
| bdu:2025-15252 | Уязвимость функции sctp_v6_from_sk() ядра операционной системы Linux, позволяющая нарушит… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15248 | Уязвимость функции btrfs_copy_root() компонента btrfs ядра операционной системы Linux, по… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15240 | Уязвимость функции blk_stack_limits() компонента block/blk-settings.c ядра операционной с… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15238 | Уязвимость библиотеки resolv языка программирования Ruby, позволяющая нарушителю вызвать … | 05.12.2025 | 16.02.2026 |
| bdu:2025-15231 | Уязвимость функции tls_do_decryption() (net/tls/tls_sw.c) ядра операционной системы Linux… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15230 | Уязвимость функций ovl_encode_real_fh() (fs/overlayfs/copy_up.c) и show_mark_fhandle() (f… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15228 | Уязвимость системы мониторинга ИТ-инфраструктуры Zabbix, связанная с хранением пароля в н… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15227 | Уязвимость ядра операционной системы Linux, связанная с ошибками инициализации памяти, по… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15226 | Уязвимость компонента drivers/soc/qcom/mdt_loader.c ядра операционной системы Linux, позв… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15225 | Уязвимость модуля vfs_streams_xattr пакета программ сетевого взаимодействия Samba, позвол… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15224 | Уязвимость функции Item_direct_view_ref::derived_field_transformer_for_where системы упра… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15223 | Уязвимость функции pci_epf_remove_cfs() компонента drivers/pci/endpoint/pci-epf-core.c яд… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15222 | Уязвимость функции JOIN::fix_all_splittings_in_plan системы управления базами данных Mari… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15221 | Уязвимость системы управления базами данных MariaDB, связанная с неправильным порядком по… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15220 | Уязвимость функции jbd2_log_do_checkpoint() компонента fs/jbd2/checkpoint.c ядра операцио… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15218 | Уязвимость функции relocate_one_folio() модуля fs/btrfs/relocation.c поддержки файловой с… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15216 | Уязвимость функций EXPORT_SYMBOL(), destroy_cm_id() и cm_work_handler() ядра операционной… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15213 | Уязвимость функции usb_parse_ss_endpoint_companion() компонента drivers/usb/core/config.c… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15212 | Уязвимость компонента fs/btrfs/qgroup.c ядра операционной системы Linux, позволяющая нару… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15211 | Уязвимость компонента fs ядра операционной системы Linux, позволяющая нарушителю вызвать … | 05.12.2025 | 16.02.2026 |
| bdu:2025-15209 | Уязвимость компонента media/usb/usbtv/usbtv-video.c ядра операционной системы Linux, позв… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15201 | Уязвимость компонента qcom/venus/core.c ядра операционной системы Linux, позволяющая нару… | 05.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201106-0026 | Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.181.22 on Wind… | 2024-07-23T22:03:48.916000Z |
| var-202005-1028 | A malicious actor who intentionally exploits this lack of effective limitation on the num… | 2024-07-23T22:03:40.061000Z |
| var-201911-1619 | Improper invalidation for page table updates by a virtual guest operating system for mult… | 2024-07-23T22:03:40.870000Z |
| var-201505-0337 | The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorit… | 2024-07-23T22:03:40.995000Z |
| var-201912-0533 | This issue was addressed with improved transparency. This issue is fixed in iOS 12.2. A u… | 2024-07-23T22:03:39.534000Z |
| var-201908-0265 | Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a … | 2024-07-23T22:03:39.695000Z |
| var-200103-0056 | Network Dynamic Data Exchange (DDE) in Windows 2000 allows local users to gain SYSTEM pri… | 2024-07-23T22:03:07.478000Z |
| var-202109-1368 | A type confusion issue was addressed with improved state handling. This issue is fixed in… | 2024-07-23T22:03:02.962000Z |
| var-200609-1249 | The Security Framework in Apple Mac OS X 10.3.9, and 10.4.x before 10.4.7, does not prope… | 2024-07-23T22:03:02.065000Z |
| var-201904-1344 | Multiple memory corruption issues were addressed with improved input validation. This iss… | 2024-07-23T22:03:00.873000Z |
| var-202108-2039 | A logic issue was addressed with improved state management. This issue is fixed in macOS … | 2024-07-23T22:02:34.481000Z |
| var-201006-1259 | Double free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 1… | 2024-07-23T22:02:34.562000Z |
| var-201707-0592 | Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre att… | 2024-07-23T22:02:33.954000Z |
| var-201109-0190 | Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allow… | 2024-07-23T22:02:33.523000Z |
| var-200803-0016 | CFNetwork in Apple Mac OS X 10.4.11 allows remote HTTPS proxy servers to spoof secure web… | 2024-07-23T22:01:55.420000Z |
| var-201912-1850 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:01:51.188000Z |
| var-200609-1027 | Buffer overflow in PPP on Apple Mac OS X 10.4.x up to 10.4.8 and 10.3.x up to 10.3.9, whe… | 2024-07-23T22:01:14.362000Z |
| var-201904-1408 | A memory corruption issue was addressed with improved state management. This issue affect… | 2024-07-23T22:01:11.971000Z |
| var-202201-0372 | lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. The vu… | 2024-07-23T22:01:10.106000Z |
| var-200612-0136 | Buffer overflow in the glob implementation (glob.c) in libc in NetBSD-current before 2005… | 2024-07-23T22:01:10.008000Z |
| var-201609-0593 | Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.… | 2024-07-23T22:01:08.857000Z |
| var-201304-0375 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:01:08.426000Z |
| var-201210-0270 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:01:08.344000Z |
| var-200603-0279 | Directory traversal vulnerability in the BOM framework in Mac OS X 10.x before 10.3.9 and… | 2024-07-23T22:01:08.748000Z |
| var-201904-1397 | An input validation issue was addressed with improved input validation. This issue affect… | 2024-07-23T22:01:07.123000Z |
| var-200704-0213 | load_webdav in Apple Mac OS X 10.3.9 through 10.4.9 does not properly clean the environme… | 2024-07-23T22:00:36.528000Z |
| var-201711-0480 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T21:59:32.421000Z |
| var-200102-0030 | The Web interface to Cisco 600 routers running CBOS 2.4.1 and earlier allow remote attack… | 2024-07-23T21:59:32.267000Z |
| var-202207-0381 | A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.20.0, <18.5… | 2024-07-23T21:59:00.866000Z |
| var-201801-1708 | The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before… | 2024-07-23T21:58:56.016000Z |