Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43394 |
N/A
|
nfsd: Fix cred ref leak in nfsd_nl_listener_set_doit(). |
Linux |
Linux |
2026-05-08T14:21:38.127Z | 2026-05-08T14:21:38.127Z |
| CVE-2026-43393 |
N/A
|
btrfs: fix chunk map leak in btrfs_map_block() after b… |
Linux |
Linux |
2026-05-08T14:21:37.368Z | 2026-05-08T14:21:37.368Z |
| CVE-2026-43392 |
N/A
|
sched_ext: Fix starvation of scx_enable() under fair-c… |
Linux |
Linux |
2026-05-08T14:21:36.692Z | 2026-05-08T14:21:36.692Z |
| CVE-2026-43391 |
N/A
|
nsfs: tighten permission checks for handle opening |
Linux |
Linux |
2026-05-08T14:21:36.012Z | 2026-05-08T14:21:36.012Z |
| CVE-2026-43390 |
N/A
|
nstree: tighten permission checks for listing |
Linux |
Linux |
2026-05-08T14:21:35.337Z | 2026-05-08T14:21:35.337Z |
| CVE-2026-43389 |
N/A
|
mm: memfd_luo: always dirty all folios |
Linux |
Linux |
2026-05-08T14:21:34.658Z | 2026-05-08T14:21:34.658Z |
| CVE-2026-43388 |
N/A
|
mm/damon/core: clear walk_control on inactive context … |
Linux |
Linux |
2026-05-08T14:21:33.966Z | 2026-05-08T14:21:33.966Z |
| CVE-2026-43387 |
N/A
|
staging: rtl8723bs: properly validate the data in rtw_… |
Linux |
Linux |
2026-05-08T14:21:33.323Z | 2026-05-09T04:10:45.532Z |
| CVE-2026-43386 |
N/A
|
staging: rtl8723bs: fix potential out-of-bounds read i… |
Linux |
Linux |
2026-05-08T14:21:32.646Z | 2026-05-08T14:21:32.646Z |
| CVE-2026-43385 |
N/A
|
net: Fix rcu_tasks stall in threaded busypoll |
Linux |
Linux |
2026-05-08T14:21:32.007Z | 2026-05-08T14:21:32.007Z |
| CVE-2026-43384 |
N/A
|
net/tcp-ao: Fix MAC comparison to be constant-time |
Linux |
Linux |
2026-05-08T14:21:31.355Z | 2026-05-08T14:21:31.355Z |
| CVE-2026-43383 |
N/A
|
net/tcp-md5: Fix MAC comparison to be constant-time |
Linux |
Linux |
2026-05-08T14:21:30.704Z | 2026-05-08T14:21:30.704Z |
| CVE-2026-43382 |
N/A
|
batman-adv: Avoid double-rtnl_lock ELP metric worker |
Linux |
Linux |
2026-05-08T14:21:30.062Z | 2026-05-08T14:21:30.062Z |
| CVE-2026-43381 |
N/A
|
nouveau/dpcd: return EBUSY for aux xfer if the device … |
Linux |
Linux |
2026-05-08T14:21:29.340Z | 2026-05-08T14:21:29.340Z |
| CVE-2026-43380 |
N/A
|
hwmon: (pmbus/q54sj108a2) fix stack overflow in debugfs read |
Linux |
Linux |
2026-05-08T14:21:28.702Z | 2026-05-08T14:21:28.702Z |
| CVE-2026-43379 |
N/A
|
ksmbd: fix use-after-free in smb_lazy_parent_lease_bre… |
Linux |
Linux |
2026-05-08T14:21:28.027Z | 2026-05-08T14:21:28.027Z |
| CVE-2026-43378 |
N/A
|
smb: server: fix use-after-free in smb2_open() |
Linux |
Linux |
2026-05-08T14:21:27.319Z | 2026-05-09T04:10:43.790Z |
| CVE-2026-43377 |
N/A
|
ksmbd: Don't log keys in SMB3 signing and encryption k… |
Linux |
Linux |
2026-05-08T14:21:26.618Z | 2026-05-08T14:21:26.618Z |
| CVE-2026-43376 |
N/A
|
ksmbd: fix use-after-free by using call_rcu() for oplo… |
Linux |
Linux |
2026-05-08T14:21:25.854Z | 2026-05-08T14:21:25.854Z |
| CVE-2026-43375 |
N/A
|
net: mctp: fix device leak on probe failure |
Linux |
Linux |
2026-05-08T14:21:25.193Z | 2026-05-08T14:21:25.193Z |
| CVE-2026-43374 |
N/A
|
net: nexthop: fix percpu use-after-free in remove_nh_g… |
Linux |
Linux |
2026-05-08T14:21:24.537Z | 2026-05-08T14:21:24.537Z |
| CVE-2026-43373 |
N/A
|
net: ncsi: fix skb leak in error paths |
Linux |
Linux |
2026-05-08T14:21:23.875Z | 2026-05-08T14:21:23.875Z |
| CVE-2026-43372 |
N/A
|
net: dsa: microchip: Fix error path in PTP IRQ setup |
Linux |
Linux |
2026-05-08T14:21:23.221Z | 2026-05-08T14:21:23.221Z |
| CVE-2026-43371 |
N/A
|
net: macb: Shuffle the tx ring before enabling tx |
Linux |
Linux |
2026-05-08T14:21:22.577Z | 2026-05-08T14:21:22.577Z |
| CVE-2026-43370 |
N/A
|
drm/amdgpu: Fix use-after-free race in VM acquire |
Linux |
Linux |
2026-05-08T14:21:21.926Z | 2026-05-09T04:10:42.009Z |
| CVE-2026-43369 |
N/A
|
drm/amd: Fix NULL pointer dereference in device cleanup |
Linux |
Linux |
2026-05-08T14:21:21.174Z | 2026-05-08T14:21:21.174Z |
| CVE-2026-43368 |
N/A
|
drm/i915: Fix potential overflow of shmem scatterlist length |
Linux |
Linux |
2026-05-08T14:21:20.500Z | 2026-05-08T14:21:20.500Z |
| CVE-2026-43367 |
N/A
|
drm/amd: Fix a few more NULL pointer dereference in de… |
Linux |
Linux |
2026-05-08T14:21:19.851Z | 2026-05-08T14:21:19.851Z |
| CVE-2026-43366 |
N/A
|
io_uring/kbuf: check if target buffer list is still le… |
Linux |
Linux |
2026-05-08T14:21:19.191Z | 2026-05-08T14:21:19.191Z |
| CVE-2026-43365 |
N/A
|
xfs: fix undersized l_iclog_roundoff values |
Linux |
Linux |
2026-05-08T14:21:18.405Z | 2026-05-08T14:21:18.405Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43387 |
N/A
|
staging: rtl8723bs: properly validate the data in rtw_… |
Linux |
Linux |
2026-05-08T14:21:33.323Z | 2026-05-09T04:10:45.532Z |
| CVE-2026-43386 |
N/A
|
staging: rtl8723bs: fix potential out-of-bounds read i… |
Linux |
Linux |
2026-05-08T14:21:32.646Z | 2026-05-08T14:21:32.646Z |
| CVE-2026-43385 |
N/A
|
net: Fix rcu_tasks stall in threaded busypoll |
Linux |
Linux |
2026-05-08T14:21:32.007Z | 2026-05-08T14:21:32.007Z |
| CVE-2026-43384 |
N/A
|
net/tcp-ao: Fix MAC comparison to be constant-time |
Linux |
Linux |
2026-05-08T14:21:31.355Z | 2026-05-08T14:21:31.355Z |
| CVE-2026-43383 |
N/A
|
net/tcp-md5: Fix MAC comparison to be constant-time |
Linux |
Linux |
2026-05-08T14:21:30.704Z | 2026-05-08T14:21:30.704Z |
| CVE-2026-43382 |
N/A
|
batman-adv: Avoid double-rtnl_lock ELP metric worker |
Linux |
Linux |
2026-05-08T14:21:30.062Z | 2026-05-08T14:21:30.062Z |
| CVE-2026-43381 |
N/A
|
nouveau/dpcd: return EBUSY for aux xfer if the device … |
Linux |
Linux |
2026-05-08T14:21:29.340Z | 2026-05-08T14:21:29.340Z |
| CVE-2026-43380 |
N/A
|
hwmon: (pmbus/q54sj108a2) fix stack overflow in debugfs read |
Linux |
Linux |
2026-05-08T14:21:28.702Z | 2026-05-08T14:21:28.702Z |
| CVE-2026-43379 |
N/A
|
ksmbd: fix use-after-free in smb_lazy_parent_lease_bre… |
Linux |
Linux |
2026-05-08T14:21:28.027Z | 2026-05-08T14:21:28.027Z |
| CVE-2026-43378 |
N/A
|
smb: server: fix use-after-free in smb2_open() |
Linux |
Linux |
2026-05-08T14:21:27.319Z | 2026-05-09T04:10:43.790Z |
| CVE-2026-43377 |
N/A
|
ksmbd: Don't log keys in SMB3 signing and encryption k… |
Linux |
Linux |
2026-05-08T14:21:26.618Z | 2026-05-08T14:21:26.618Z |
| CVE-2026-43376 |
N/A
|
ksmbd: fix use-after-free by using call_rcu() for oplo… |
Linux |
Linux |
2026-05-08T14:21:25.854Z | 2026-05-08T14:21:25.854Z |
| CVE-2026-43375 |
N/A
|
net: mctp: fix device leak on probe failure |
Linux |
Linux |
2026-05-08T14:21:25.193Z | 2026-05-08T14:21:25.193Z |
| CVE-2026-43374 |
N/A
|
net: nexthop: fix percpu use-after-free in remove_nh_g… |
Linux |
Linux |
2026-05-08T14:21:24.537Z | 2026-05-08T14:21:24.537Z |
| CVE-2026-43373 |
N/A
|
net: ncsi: fix skb leak in error paths |
Linux |
Linux |
2026-05-08T14:21:23.875Z | 2026-05-08T14:21:23.875Z |
| CVE-2026-43372 |
N/A
|
net: dsa: microchip: Fix error path in PTP IRQ setup |
Linux |
Linux |
2026-05-08T14:21:23.221Z | 2026-05-08T14:21:23.221Z |
| CVE-2026-43371 |
N/A
|
net: macb: Shuffle the tx ring before enabling tx |
Linux |
Linux |
2026-05-08T14:21:22.577Z | 2026-05-08T14:21:22.577Z |
| CVE-2026-43370 |
N/A
|
drm/amdgpu: Fix use-after-free race in VM acquire |
Linux |
Linux |
2026-05-08T14:21:21.926Z | 2026-05-09T04:10:42.009Z |
| CVE-2026-43369 |
N/A
|
drm/amd: Fix NULL pointer dereference in device cleanup |
Linux |
Linux |
2026-05-08T14:21:21.174Z | 2026-05-08T14:21:21.174Z |
| CVE-2026-43368 |
N/A
|
drm/i915: Fix potential overflow of shmem scatterlist length |
Linux |
Linux |
2026-05-08T14:21:20.500Z | 2026-05-08T14:21:20.500Z |
| CVE-2026-43367 |
N/A
|
drm/amd: Fix a few more NULL pointer dereference in de… |
Linux |
Linux |
2026-05-08T14:21:19.851Z | 2026-05-08T14:21:19.851Z |
| CVE-2026-43366 |
N/A
|
io_uring/kbuf: check if target buffer list is still le… |
Linux |
Linux |
2026-05-08T14:21:19.191Z | 2026-05-08T14:21:19.191Z |
| CVE-2026-43365 |
N/A
|
xfs: fix undersized l_iclog_roundoff values |
Linux |
Linux |
2026-05-08T14:21:18.405Z | 2026-05-08T14:21:18.405Z |
| CVE-2026-43364 |
N/A
|
ublk: fix NULL pointer dereference in ublk_ctrl_set_size() |
Linux |
Linux |
2026-05-08T14:21:17.654Z | 2026-05-08T14:21:17.654Z |
| CVE-2026-43363 |
N/A
|
x86/apic: Disable x2apic on resume if the kernel expects so |
Linux |
Linux |
2026-05-08T14:21:16.986Z | 2026-05-08T14:21:16.986Z |
| CVE-2026-43362 |
N/A
|
smb: client: fix in-place encryption corruption in SMB… |
Linux |
Linux |
2026-05-08T14:21:16.358Z | 2026-05-09T04:10:40.255Z |
| CVE-2026-43361 |
N/A
|
btrfs: fix transaction abort when snapshotting receive… |
Linux |
Linux |
2026-05-08T14:21:15.683Z | 2026-05-08T14:21:15.683Z |
| CVE-2026-43360 |
N/A
|
btrfs: fix transaction abort on file creation due to n… |
Linux |
Linux |
2026-05-08T14:21:15.008Z | 2026-05-08T14:21:15.008Z |
| CVE-2026-43359 |
N/A
|
btrfs: fix transaction abort on set received ioctl due… |
Linux |
Linux |
2026-05-08T14:21:14.357Z | 2026-05-08T14:21:14.357Z |
| CVE-2026-43358 |
N/A
|
btrfs: add missing RCU unlock in error path in try_rel… |
Linux |
Linux |
2026-05-08T14:21:13.719Z | 2026-05-08T14:21:13.719Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-71202 | In the Linux kernel, the following vulnerability has been resolved: iommu/sva: invalidate stale IO… | 2026-02-14T16:15:52.790 | 2026-03-17T21:16:48.270 |
| fkie_cve-2025-71201 | In the Linux kernel, the following vulnerability has been resolved: netfs: Fix early read unlock o… | 2026-02-14T16:15:52.647 | 2026-03-17T21:16:55.887 |
| fkie_cve-2026-23131 | In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix … | 2026-02-14T15:16:08.387 | 2026-03-17T21:17:04.773 |
| fkie_cve-2026-23130 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix dead lock wh… | 2026-02-14T15:16:08.277 | 2026-03-17T21:17:11.440 |
| fkie_cve-2026-23129 | In the Linux kernel, the following vulnerability has been resolved: dpll: Prevent duplicate regist… | 2026-02-14T15:16:08.173 | 2026-03-18T14:17:11.903 |
| fkie_cve-2026-23128 | In the Linux kernel, the following vulnerability has been resolved: arm64: Set __nocfi on swsusp_a… | 2026-02-14T15:16:08.060 | 2026-03-18T14:46:26.907 |
| fkie_cve-2026-23127 | In the Linux kernel, the following vulnerability has been resolved: perf: Fix refcount warning on … | 2026-02-14T15:16:07.963 | 2026-03-18T14:49:58.400 |
| fkie_cve-2026-23126 | In the Linux kernel, the following vulnerability has been resolved: netdevsim: fix a race issue re… | 2026-02-14T15:16:07.853 | 2026-03-18T14:50:12.257 |
| fkie_cve-2026-23125 | In the Linux kernel, the following vulnerability has been resolved: sctp: move SCTP_CMD_ASSOC_SHKE… | 2026-02-14T15:16:07.740 | 2026-03-18T14:50:20.100 |
| fkie_cve-2026-23124 | In the Linux kernel, the following vulnerability has been resolved: ipv6: annotate data-race in nd… | 2026-02-14T15:16:07.633 | 2026-03-18T14:50:31.123 |
| fkie_cve-2026-23123 | In the Linux kernel, the following vulnerability has been resolved: interconnect: debugfs: initial… | 2026-02-14T15:16:07.500 | 2026-03-18T14:50:40.470 |
| fkie_cve-2026-23122 | In the Linux kernel, the following vulnerability has been resolved: igc: Reduce TSN TX packet buff… | 2026-02-14T15:16:07.390 | 2026-03-18T14:50:49.260 |
| fkie_cve-2026-23121 | In the Linux kernel, the following vulnerability has been resolved: mISDN: annotate data-race arou… | 2026-02-14T15:16:07.280 | 2026-03-18T13:39:23.070 |
| fkie_cve-2026-23120 | In the Linux kernel, the following vulnerability has been resolved: l2tp: avoid one data-race in l… | 2026-02-14T15:16:07.157 | 2026-03-18T13:39:35.227 |
| fkie_cve-2026-23119 | In the Linux kernel, the following vulnerability has been resolved: bonding: provide a net pointer… | 2026-02-14T15:16:07.043 | 2026-03-18T13:39:51.890 |
| fkie_cve-2026-23118 | In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix data-race warning a… | 2026-02-14T15:16:06.933 | 2026-03-25T11:16:18.923 |
| fkie_cve-2026-23117 | In the Linux kernel, the following vulnerability has been resolved: ice: add missing ice_deinit_hw… | 2026-02-14T15:16:06.830 | 2026-03-18T13:40:23.590 |
| fkie_cve-2026-23116 | In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8m-blk-ctrl: Remo… | 2026-02-14T15:16:06.713 | 2026-03-18T13:40:31.990 |
| fkie_cve-2026-23115 | In the Linux kernel, the following vulnerability has been resolved: serial: Fix not set tty->port … | 2026-02-14T15:16:06.607 | 2026-03-18T13:41:27.780 |
| fkie_cve-2026-23114 | In the Linux kernel, the following vulnerability has been resolved: arm64/fpsimd: ptrace: Fix SVE … | 2026-02-14T15:16:06.500 | 2026-03-18T13:41:42.553 |
| fkie_cve-2026-23113 | In the Linux kernel, the following vulnerability has been resolved: io_uring/io-wq: check IO_WQ_BI… | 2026-02-14T15:16:06.380 | 2026-04-18T09:16:14.100 |
| fkie_cve-2025-71200 | In the Linux kernel, the following vulnerability has been resolved: mmc: sdhci-of-dwcmshc: Prevent… | 2026-02-14T15:16:05.980 | 2026-03-18T13:42:10.163 |
| fkie_cve-2026-2312 | The Media Library Folders plugin for WordPress is vulnerable to Insecure Direct Object Reference in… | 2026-02-14T12:15:56.123 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1512 | The Essential Addons for Elementor – Popular Elementor Templates & Widgets plugin for WordPress is … | 2026-02-14T10:16:06.627 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1843 | The Super Page Cache plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Acti… | 2026-02-14T09:16:12.360 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1258 | The Mail Mint plugin for WordPress is vulnerable to blind SQL Injection via the 'forms', 'automatio… | 2026-02-14T09:16:12.190 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1254 | The Modula Image Gallery – Photo Grid & Video Gallery plugin for WordPress is vulnerable to authori… | 2026-02-14T09:16:12.020 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1249 | The MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar plugin for WordPress is vulne… | 2026-02-14T09:16:11.850 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0550 | The myCred plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mycr… | 2026-02-14T09:16:11.683 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-8572 | The Truelysell Core plugin for WordPress is vulnerable to privilege escalation in versions less tha… | 2026-02-14T09:16:11.490 | 2026-04-15T00:35:42.020 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-j7hx-vp8g-c83p |
|
In the Linux kernel, the following vulnerability has been resolved: cpufreq: intel_pstate: Fix NUL… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-j5jq-r673-59h3 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/xe/sync: Fix user fence le… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-j574-jvxx-m43q |
|
In the Linux kernel, the following vulnerability has been resolved: nstree: tighten permission che… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-hjwg-8c2j-jq5p |
|
In the Linux kernel, the following vulnerability has been resolved: sched/mmcid: Handle vfork()/CL… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:28Z |
| ghsa-h5f4-6rm7-58wm |
|
In the Linux kernel, the following vulnerability has been resolved: nfsd: Fix cred ref leak in nfs… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-g5m7-8jmr-xx94 |
|
In the Linux kernel, the following vulnerability has been resolved: libceph: Fix potential out-of-… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-ffq9-g2vv-386p |
|
In the Linux kernel, the following vulnerability has been resolved: mm: Fix a hmm_range_fault() li… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-f4g6-fp8v-f3h5 |
|
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: properly v… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-986c-6cjh-r8fc |
|
In the Linux kernel, the following vulnerability has been resolved: nsfs: tighten permission check… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-97qv-cc94-mr6w |
|
In the Linux kernel, the following vulnerability has been resolved: ceph: add a bunch of missing c… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-945j-p452-jcmx |
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix chunk map leak in b… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-6ghr-3376-w3mq |
|
In the Linux kernel, the following vulnerability has been resolved: nsfs: tighten permission check… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-5r63-pv2h-4jqg |
|
In the Linux kernel, the following vulnerability has been resolved: libceph: Use u32 for non-negat… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-5396-3j5p-9gg2 |
|
In the Linux kernel, the following vulnerability has been resolved: tipc: fix divide-by-zero in ti… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-3crh-xxfm-7qqg |
|
In the Linux kernel, the following vulnerability has been resolved: scsi: hisi_sas: Fix NULL point… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:28Z |
| ghsa-2v48-6xmq-vxhp |
|
In the Linux kernel, the following vulnerability has been resolved: drm/xe/sync: Cleanup partially… | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-25rf-28xv-w8h2 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/bridge: samsung-dsim: Fix … | 2026-05-08T15:31:27Z | 2026-05-08T15:31:27Z |
| ghsa-wvq8-6v44-2qvw |
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in s… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-rm7m-cqfw-43rf |
|
In the Linux kernel, the following vulnerability has been resolved: drm/i915: Fix potential overfl… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-qqh8-qfc3-4qg9 |
|
In the Linux kernel, the following vulnerability has been resolved: net: dsa: microchip: Fix error… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-m4fq-qc69-83h9 |
|
In the Linux kernel, the following vulnerability has been resolved: net/tcp-md5: Fix MAC compariso… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-j96g-282q-pp54 |
|
In the Linux kernel, the following vulnerability has been resolved: x86/apic: Disable x2apic on re… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-h43w-g7p8-4g9g |
|
In the Linux kernel, the following vulnerability has been resolved: net: mctp: fix device leak on … | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-gwm9-34wj-g7pc |
|
In the Linux kernel, the following vulnerability has been resolved: nouveau/dpcd: return EBUSY for… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-gf37-6wm7-r3cm |
|
In the Linux kernel, the following vulnerability has been resolved: xfs: fix undersized l_iclog_ro… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-g6hq-4292-hhwx |
|
In the Linux kernel, the following vulnerability has been resolved: io_uring/kbuf: check if target… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-f593-x5jj-v2pg |
|
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix use-after-free… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-f55f-7vqj-q3f7 |
|
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix potent… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-f4x6-g3j5-68gm |
|
In the Linux kernel, the following vulnerability has been resolved: ublk: fix NULL pointer derefer… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-cc5x-4c4f-8gxf |
|
In the Linux kernel, the following vulnerability has been resolved: net: ncsi: fix skb leak in err… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-233 |
|
python-jose through 3.3.0 allows attackers to cause a denial of service (resource consump… | python-jose | 2024-04-26T00:15:09+00:00 | 2025-02-18T19:20:15.511369+00:00 |
| pysec-2024-232 |
|
python-jose through 3.3.0 has algorithm confusion with OpenSSH ECDSA keys and other key f… | python-jose | 2024-04-26T00:15:09+00:00 | 2025-02-18T19:20:15.468012+00:00 |
| pysec-2024-209 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-19T19:19:01.689044+00:00 |
| pysec-2024-163 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Prior to ve… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-14T05:22:23.036505+00:00 |
| pysec-2024-208 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.647736+00:00 |
| pysec-2024-207 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.605918+00:00 |
| pysec-2024-206 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.566553+00:00 |
| pysec-2024-246 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Starting in… | vyper | 2024-04-25T17:15:50+00:00 | 2025-05-05T19:21:20.899426+00:00 |
| pysec-2024-50 |
|
Synapse is an open-source Matrix homeserver. A remote Matrix user with malicious intent, … | matrix-synapse | 2024-04-23T18:15:00+00:00 | 2024-04-23T21:18:51.688096+00:00 |
| pysec-2024-250 |
|
Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the component torch/csr… | torch | 2024-04-19T21:15:08+00:00 | 2025-06-03T15:23:56.072490+00:00 |
| pysec-2024-252 |
|
PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in t… | torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T19:22:08.948962+00:00 |
| pysec-2024-251 |
|
Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in… | torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T03:12:59.077932+00:00 |
| pysec-2024-243 |
9.3 (3.1)
|
mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs… | mlflow | 2024-04-16T00:15:12+00:00 | 2025-04-08T10:23:25.044416+00:00 |
| pysec-2024-254 |
4.2 (3.1)
|
A session fixation vulnerability exists in the zenml-io/zenml application, where JWT toke… | zenml | 2024-04-16T00:15:11+00:00 | 2025-06-13T00:48:41.806476+00:00 |
| pysec-2024-247 |
9.9 (3.1)
|
A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically… | zenml | 2024-04-16T00:15:11+00:00 | 2025-05-12T15:23:53.861001+00:00 |
| pysec-2024-49 |
|
Lektor before 3.3.11 does not sanitize DB path traversal. Thus, shell commands might be e… | lektor | 2024-03-27T06:15:00+00:00 | 2024-03-27T11:18:36.506150+00:00 |
| pysec-2024-257 |
7.5 (3.1)
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2024-03-22T23:15:07+00:00 | 2025-06-30T15:23:50.085549+00:00 |
| pysec-2024-234 |
9.8 (3.1)
|
Jupyter Server Proxy allows users to run arbitrary external processes alongside their Jup… | jupyter-server-proxy | 2024-03-20T20:15:08+00:00 | 2025-02-21T18:23:35.992501+00:00 |
| pysec-2024-48 |
|
Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial o… | black | 2024-03-19T05:15:00+00:00 | 2024-03-19T11:18:50.379002+00:00 |
| pysec-2024-179 |
4.8 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-03-18T22:15:07+00:00 | 2025-01-19T01:52:24.377662+00:00 |
| pysec-2024-47 |
|
In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.te… | django | 2024-03-15T20:15:00+00:00 | 2024-03-15T23:20:34.975097+00:00 |
| pysec-2024-46 |
|
Apache Airflow, versions 2.8.0 through 2.8.2, has a vulnerability that allows an authenti… | apache-airflow | 2024-03-14T09:15:00+00:00 | 2024-03-14T11:19:09.515892+00:00 |
| pysec-2024-221 |
5.3 (3.1)
|
aiosmtpd is a reimplementation of the Python stdlib smtpd.py based on asyncio. aiosmtpd i… | aiosmtpd | 2024-03-12T21:15:58+00:00 | 2025-01-22T16:23:18.042465+00:00 |
| pysec-2024-44 |
|
In RPyC before 6.0.0, when a server exposes a method that calls the attribute named __arr… | rpyc | 2024-03-12T16:15:00+00:00 | 2024-03-12T19:19:21.886478+00:00 |
| pysec-2024-45 |
|
LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to contro… | langchain-core | 2024-03-04T00:15:00+00:00 | 2024-03-13T23:20:07.486731+00:00 |
| pysec-2024-43 |
|
LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to contro… | langchain | 2024-03-04T00:15:00+00:00 | 2024-03-05T10:22:15.555734+00:00 |
| pysec-2024-42 |
|
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated Ops … | apache-airflow | 2024-03-01T11:15:00+00:00 | 2024-03-01T14:20:34.498842+00:00 |
| pysec-2024-245 |
|
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated user… | apache-airflow | 2024-02-29T11:15:08+00:00 | 2025-05-01T21:22:38.598048+00:00 |
| pysec-2024-162 |
6.5 (3.1)
|
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the XMLFeedSpider … | scrapy | 2024-02-28T00:15:53+00:00 | 2025-01-14T05:22:21.870348+00:00 |
| pysec-2024-41 |
|
diffoscope before 256 allows directory traversal via an embedded filename in a GPG file. … | diffoscope | 2024-02-27T02:15:00+00:00 | 2024-02-27T07:20:27.954412+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-3171 | Malicious code in frank-newton3-final-audit (npm) | 2026-04-29T14:40:01Z | 2026-04-30T22:25:09Z |
| mal-2026-3170 | Malicious code in frank-newton3-db-poc (npm) | 2026-04-29T14:40:01Z | 2026-04-30T22:25:09Z |
| mal-2026-3169 | Malicious code in frank-newton3-db-final (npm) | 2026-04-29T14:40:01Z | 2026-04-30T22:25:09Z |
| mal-2026-3168 | Malicious code in apple-internal-config (npm) | 2026-04-29T14:40:01Z | 2026-04-30T22:25:08Z |
| mal-2026-3167 | Malicious code in apple-infra-stealth-audit (npm) | 2026-04-29T14:40:01Z | 2026-04-30T22:25:08Z |
| mal-2026-3166 | Malicious code in apple-infra-escape-audit (npm) | 2026-04-29T14:40:01Z | 2026-04-30T22:25:08Z |
| mal-2026-3262 | Malicious code in react-native-parallax-scroll-view-updated (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:15Z |
| mal-2026-3261 | Malicious code in internal-auth-provider (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:13Z |
| mal-2026-3260 | Malicious code in google-storage-cloud (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:13Z |
| mal-2026-3259 | Malicious code in enterprise-auth-gateway-core (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:12Z |
| mal-2026-3258 | Malicious code in @tech-global/internal-gateway-core (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:11Z |
| mal-2026-3257 | Malicious code in @omni-corp-infra/sso-bridge-core (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:10Z |
| mal-2026-3256 | Malicious code in @internal-infra/core-sso-bridge (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:10Z |
| mal-2026-3255 | Malicious code in @enterprise-core/auth-gateway-bridge (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:10Z |
| mal-2026-3254 | Malicious code in @corp-infra/sso-gateway-core (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:10Z |
| mal-2026-3195 | Malicious code in secrets-manager-wrapper (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:15Z |
| mal-2026-3189 | Malicious code in react-video-canvas (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:15Z |
| mal-2026-3185 | Malicious code in @saif777/codemirror5 (npm) | 2026-04-29T14:00:00Z | 2026-05-05T15:56:11Z |
| mal-2026-3164 | Malicious code in chai-as-char (npm) | 2026-04-29T12:41:25Z | 2026-04-30T22:25:08Z |
| mal-2026-3165 | Malicious code in chai-as-redeployed (npm) | 2026-04-29T12:29:50Z | 2026-04-30T22:25:08Z |
| mal-2026-3182 | Malicious code in redeem-onchain-sdk (npm) | 2026-04-29T12:00:00Z | 2026-04-30T22:25:12Z |
| mal-2026-3181 | Malicious code in period-newline (npm) | 2026-04-29T12:00:00Z | 2026-04-30T22:25:11Z |
| mal-2026-3180 | Malicious code in nicegui (npm) | 2026-04-29T12:00:00Z | 2026-04-30T22:25:11Z |
| mal-2026-3179 | Malicious code in mbt (npm) | 2026-04-29T10:00:00Z | 2026-04-30T22:32:11Z |
| mal-2026-3178 | Malicious code in @cap-js/sqlite (npm) | 2026-04-29T10:00:00Z | 2026-04-30T22:32:07Z |
| mal-2026-3177 | Malicious code in @cap-js/postgres (npm) | 2026-04-29T10:00:00Z | 2026-04-30T22:32:07Z |
| mal-2026-3176 | Malicious code in @cap-js/db-service (npm) | 2026-04-29T10:00:00Z | 2026-04-30T22:32:07Z |
| mal-2026-3148 | Malicious code in amazon-boto (PyPI) | 2026-04-29T08:58:04Z | 2026-04-29T08:58:04Z |
| mal-2026-3163 | Malicious code in npm-global-util (npm) | 2026-04-29T08:00:00Z | 2026-04-30T22:25:11Z |
| mal-2026-3162 | Malicious code in apple-pki-cert-validator (npm) | 2026-04-29T08:00:00Z | 2026-04-30T22:25:08Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0401 | Google Chrome: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0397 | Drupal Module (UI Icons, Quick Edit): Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2026-02-11T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0388 | Synacor Zimbra: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0383 | AMD Radeon: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0379 | Intel Prozessoren: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0378 | IBM WebSphere Application Server: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-02-10T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0377 | Ivanti Endpoint Manager: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2026-02-10T23:00:00.000+00:00 | 2026-03-09T23:00:00.000+00:00 |
| wid-sec-w-2026-0369 | Microsoft Windows: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0367 | Microsoft DeveloperTools (Visual Studio Code und .NET): Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0364 | Microsoft Defender für Endpoint Linux Extension: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2026-02-10T23:00:00.000+00:00 | 2026-02-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0363 | Microsoft Power BI: Schwachstelle ermöglicht Erlangen von Benutzerrechten und Codeausführung | 2026-02-10T23:00:00.000+00:00 | 2026-02-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0362 | Red Hat Enterprise Linux (Lodash): Schwachstelle ermöglicht Denial of Service | 2026-02-10T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0361 | GIMP: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0359 | GnuTLS: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0357 | Roundcube: Mehrere Schwachstellen | 2026-02-09T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0355 | PowerDNS Recursor: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0353 | libpng: Schwachstelle ermöglicht Codeausführung | 2026-02-09T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0347 | Red Hat Build of Keycloak: Mehrere Schwachstellen | 2026-02-09T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0345 | Golang Go: Mehrere Schwachstellen | 2026-02-08T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0342 | GIMP: Schwachstelle ermöglicht Denial of Service | 2026-02-08T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0335 | vim: Schwachstelle ermöglicht Codeausführung | 2026-02-05T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0331 | BeyondTrust Privileged Remote Access und Remote Support: Schwachstelle ermöglicht Codeausführung | 2026-02-05T23:00:00.000+00:00 | 2026-02-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0327 | Asterisk: Mehrere Schwachstellen | 2026-02-05T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0326 | Red Hat Self-service automation portal for Ansible Automation Platform: Schwachstelle ermöglicht Manipulation von Dateien | 2026-02-05T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0324 | Linux Kernel: Mehrere Schwachstellen | 2026-02-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0318 | n8n: Mehrere Schwachstellen | 2026-02-04T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0312 | Drupal (Login Disable): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-02-04T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0310 | Cisco TelePresence Collaboration Endpoint Software: Schwachstelle ermöglicht Denial of Service | 2026-02-04T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0309 | NGINX OSS und NGINX Plus: Schwachstelle ermöglicht Manipulation von Dateien | 2026-02-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0308 | Cisco Evolved Programmable Network Manager und Prime Infrastructure: Schwachstelle ermöglicht Darstellen falscher Informationen | 2026-02-04T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-329-01 | Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, Cobalt Share | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-04 | Opto 22 groov View | 2025-11-25T06:00:00.000000Z | 2025-11-25T06:00:00.000000Z |
| icsa-25-324-06 | Emerson Appleton UPSMON-PRO | 2025-11-20T07:00:00.000000Z | 2025-11-20T07:00:00.000000Z |
| icsa-25-324-01 | Automated Logic WebCTRL Premium Server | 2025-11-20T07:00:00.000000Z | 2025-11-20T07:00:00.000000Z |
| icsa-25-324-03 | Opto 22 GRV-EPIC and groov RIO | 2025-11-20T06:00:00.000000Z | 2025-11-20T06:00:00.000000Z |
| icsa-25-324-02 | ICAM365 CCTV Camera Multiple Models | 2025-11-20T06:00:00.000000Z | 2025-11-20T06:00:00.000000Z |
| icsa-26-120-03 | ABB Edgenius Management Portal | 2025-11-20T00:30:00.000000Z | 2026-04-30T06:00:00.000000Z |
| icsa-25-322-05 | METZ CONNECT EWIO2 | 2025-11-18T12:00:00.000000Z | 2025-11-18T12:00:00.000000Z |
| icsa-25-322-03 | Shelly Pro 3EM | 2025-11-18T07:00:00.000000Z | 2025-11-18T07:00:00.000000Z |
| icsa-25-322-02 | Shelly Pro 4PM | 2025-11-18T07:00:00.000000Z | 2025-11-18T07:00:00.000000Z |
| icsa-25-317-12 | Siemens Spectrum Power 4 | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-11 | Siemens SICAM P850 family and SICAM P855 family | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-10 | *Rockwell Automation AADvance-Trusted SIS Workstation * | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-09 | Rockwell Automation FactoryTalk Policy Manager | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-08 | General Industrial Controls Lynx+ Gateway | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-07 | Rockwell Automation FactoryTalk DataMosaix Private Cloud | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-06 | Rockwell Automation Studio 5000 Simulation Interface | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-05 | Rockwell Automation Verve Asset Manager | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-04 | Brightpick Mission Control / Internal Logic Control | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-03 | AVEVA Edge | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-02 | AVEVA Application Server IDE | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-01 | Mitsubishi Electric MELSEC iQ-F Series | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-322-04 | Schneider Electric PowerChute Serial Shutdown | 2025-11-11T08:00:00.000000Z | 2025-11-11T08:00:00.000000Z |
| icsa-25-322-01 | Schneider Electric EcoStruxure Machine SCADA Expert & Pro-face BLUE Open Studio | 2025-11-11T08:00:00.000000Z | 2025-11-11T08:00:00.000000Z |
| icsa-25-317-17 | Siemens Software Center and Solid Edge | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-16 | Siemens Altair Grid Engine | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-15 | Siemens COMOS | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-14 | Siemens Solid Edge | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-13 | Siemens LOGO! 8 BM Devices | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-310-03 | ABB FLXeon Controllers | 2025-11-06T07:00:00.000000Z | 2025-11-06T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-sisf-dos-zgwt4ddy | Multiple Cisco Products Switch Integrated Security Features DHCPv6 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-sdwanarbfile-2zkhkzwj | Cisco Catalyst SD-WAN Manager Arbitrary File Creation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-14T20:04:53+00:00 |
| cisco-sa-sdwan-priviesc-wck7bmmt | Cisco Catalyst SD-WAN Manager Privilege Escalation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-sdwan-fileoverwrite-uc9txwh | Cisco Catalyst SD-WAN Manager Arbitrary File Overwrite Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-08T15:55:57+00:00 |
| cisco-sa-netconf-nacm-bypass-tgzv9pmq | Cisco IOS XE Software Model-Driven Programmability Authorization Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-multiprod-ikev2-dos-gpctuqv2 | Cisco Adaptive Security Appliance Software, Firepower Threat Defense Software, IOS Software, and IOS XE Software IKEv2 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ipsgacl-pg6qfzk | Cisco IOS Software on Cisco Catalyst 1000 and 2960L Switches Access Control List Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iox-dos-95fqnf7b | Cisco IOx Application Hosting Environment Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-privesc-su7scvdp | Cisco IOS XE Software Privilege Escalation Vulnerabilities | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-ikev1-dos-xhk3hzfc | Cisco IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-dhcpsn-dos-xbn8mtks | Cisco IOS XE Software DHCP Snooping Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ios-http-privesc-wcrd5e3 | Cisco IOS Software Industrial Ethernet Switch Device Manager Privilege Escalation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ewlc-user-del-hqxmpudj | Cisco IOS XE Wireless Controller Software Unauthorized User Deletion Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ewlc-cdp-dos-fpeks9k | Cisco IOS XE Wireless Controller Software Cisco Discovery Protocol Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-dnac-api-nbpzcjcm | Cisco Catalyst Center Unauthenticated API Access Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-03-26T16:00:00+00:00 |
| cisco-sa-catc-insec-acc-mtt8eheb | Cisco Catalyst Center Insufficient Access Control Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-catalyst-tls-pqnd5kej | Cisco Catalyst SD-WAN Manager Certificate Validation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-c2960-3560-sboot-ztqadrhq | Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches Secure Boot Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-bootstrap-kfgxygdh | Cisco IOS XE Software Bootstrap Arbitrary File Write Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-asr903-rsp3-arp-dos-wmfzdvjz | Cisco IOS XE Software for Cisco ASR 903 Aggregation Services Routers ARP Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-erlang-otp-ssh-xyzzy | Multiple Cisco Products Unauthenticated Remote Code Execution in Erlang/OTP SSH Server: April 2025 | 2025-04-22T21:45:00+00:00 | 2025-06-11T14:40:37+00:00 |
| cisco-sa-webex-app-client-rce-ufymmylc | Cisco Webex App Client-Side Remote Code Execution Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-sna-prvesc-4bqmk33z | Cisco Secure Network Analytics Privilege Escalation Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-nd-unenum-2xffh472 | Cisco Nexus Dashboard LDAP Username Enumeration Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-meraki-mx-vpn-dos-vnrpdvfb | Cisco Meraki MX and Z Series AnyConnect VPN Denial of Service Vulnerability | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-epnmpi-sxss-gsscpgy4 | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerabilities | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-ece-dos-tc6m9gz8 | Cisco Enterprise Chat and Email Denial of Service Vulnerability | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-xrike-9wygprgq | Cisco IOS XR Software Internet Key Exchange Version 2 Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-xr792-bwfvdpy | Cisco IOS XR Software Release 7.9.2 Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-sb-lkm-znerzjbz | Cisco IOS XR Software Secure Boot Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-32151 | Windows Shell Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32150 | Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32149 | Windows Hyper-V Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32093 | Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32091 | Microsoft Brokering File System Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32090 | Windows Speech Brokered Api Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32089 | Windows Speech Brokered Api Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32088 | Windows Biometric Service Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32087 | Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32086 | Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32085 | Remote Procedure Call Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32084 | Windows Print Spooler Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32083 | Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32082 | Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32081 | Package Catalog Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32080 | Windows WalletService Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32079 | Web Account Manager Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32078 | Windows Projected File System Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32077 | Windows UPnP Device Host Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-20T07:00:00.000Z |
| msrc_cve-2026-32076 | Windows Storage Spaces Controller Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32075 | Windows UPnP Device Host Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32074 | Windows Projected File System Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32073 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32072 | Active Directory Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32071 | Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32070 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32069 | Windows Projected File System Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32068 | Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27931 | Windows GDI Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27930 | Windows GDI Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0331 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2025-10-23T13:23:20.471568Z | 2025-10-23T13:23:20.471568Z |
| ncsc-2025-0330 | Kwetsbaarheden verholpen in Oracle Communications producten | 2025-10-23T13:20:15.363063Z | 2025-10-23T13:20:15.363063Z |
| ncsc-2025-0329 | Kwetsbaarheden verholpen in Oracle Commerce | 2025-10-23T07:20:51.213314Z | 2025-10-23T07:20:51.213314Z |
| ncsc-2025-0328 | Kwetsbaarheden verholpen in Oracle Database producten | 2025-10-23T07:19:57.652532Z | 2025-10-23T07:19:57.652532Z |
| ncsc-2025-0327 | Kwetsbaarheden verholpen in Zohocorp's ManageEngine | 2025-10-23T07:18:47.274781Z | 2025-10-23T07:18:47.274781Z |
| ncsc-2025-0326 | Kwetsbaarheden verholpen in Moxa’s netwerkbeveiligingsapparaten | 2025-10-20T13:03:34.436477Z | 2025-10-20T13:03:34.436477Z |
| ncsc-2025-0325 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2025-10-20T12:59:06.729067Z | 2025-10-20T12:59:06.729067Z |
| ncsc-2025-0324 | Kwetsbaarheid verholpen in FortiOS | 2025-10-17T08:42:51.624827Z | 2025-10-17T08:42:51.624827Z |
| ncsc-2025-0323 | Kwetsbaarheden verholpen in SAP Producten | 2025-10-17T08:04:54.828451Z | 2025-10-17T08:04:54.828451Z |
| ncsc-2025-0322 | Kwetsbaarheden verholpen in Adobe Commerce | 2025-10-16T06:32:33.597617Z | 2025-10-16T06:32:33.597617Z |
| ncsc-2025-0321 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-10-16T06:27:14.019367Z | 2025-10-16T06:27:14.019367Z |
| ncsc-2025-0320 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-10-16T06:25:05.618348Z | 2025-10-16T06:25:05.618348Z |
| ncsc-2025-0319 | Kwetsbaarheden verholpen in F5 Networks BIG-IP, F5OS en NGINX App Protect WAF | 2025-10-15T15:21:14.871532Z | 2026-03-27T18:09:03.259108Z |
| ncsc-2025-0318 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2025-10-15T06:22:07.027110Z | 2025-10-15T06:22:07.027110Z |
| ncsc-2025-0317 | Kwetsbaarheden verholpen in Veeam Backup & Replication | 2025-10-15T06:13:55.126030Z | 2025-10-15T06:13:55.126030Z |
| ncsc-2025-0316 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2025-10-14T18:52:06.487996Z | 2025-10-14T18:52:06.487996Z |
| ncsc-2025-0315 | Kwetsbaarheden verholpen in Microsoft Office | 2025-10-14T18:38:05.692251Z | 2025-10-14T18:38:05.692251Z |
| ncsc-2025-0314 | Kwetsbaarheden verholpen in Microsoft System Center | 2025-10-14T18:27:56.075338Z | 2025-10-14T18:27:56.075338Z |
| ncsc-2025-0313 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-10-14T18:21:47.576457Z | 2025-10-14T18:21:47.576457Z |
| ncsc-2025-0312 | Kwetsbaarheden verholpen in Microsoft Exchange | 2025-10-14T18:16:12.274468Z | 2025-10-14T18:16:12.274468Z |
| ncsc-2025-0311 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-10-14T18:13:41.244373Z | 2025-10-14T18:13:41.244373Z |
| ncsc-2025-0310 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-10-14T18:03:45.875739Z | 2025-10-24T11:09:29.790442Z |
| ncsc-2025-0309 | Kwetsbaarheden verholpen in Siemens producten | 2025-10-14T11:22:10.254089Z | 2025-10-14T11:22:10.254089Z |
| ncsc-2025-0308 | Kwetsbaarheden verholpen in Juniper Networks Junos Space | 2025-10-13T08:31:03.235596Z | 2025-10-13T08:31:03.235596Z |
| ncsc-2025-0307 | Kwetsbaarheid verholpen in Oracle E-Business Suite | 2025-10-13T07:52:22.500853Z | 2025-10-13T07:52:22.500853Z |
| ncsc-2025-0306 | Kwetsbaarheden verholpen in GitLab | 2025-10-13T07:25:32.225768Z | 2025-10-13T07:25:32.225768Z |
| ncsc-2025-0305 | Kwetsbaarheden verholpen in Juniper Networks Junos OS | 2025-10-13T07:17:00.445318Z | 2025-10-13T07:17:00.445318Z |
| ncsc-2025-0304 | Kwetsbaarheden verholpen in Redis | 2025-10-08T11:43:37.331971Z | 2025-10-08T11:43:37.331971Z |
| ncsc-2025-0303 | Kwetsbaarheid verholpen in Oracle E-Business Suite | 2025-10-05T09:07:57.122302Z | 2025-10-08T13:03:30.836713Z |
| ncsc-2025-0302 | Kwetsbaarheid verholpen in IBM InfoSphere | 2025-09-30T08:31:27.582962Z | 2025-09-30T08:31:27.582962Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10483-1 | himmelblau-2.3.9+git0.a9fd29b-1.1 on GA media | 2026-04-03T00:00:00Z | 2026-04-03T00:00:00Z |
| opensuse-su-2026:20461-1 | Security update for dnsdist | 2026-04-02T09:11:51Z | 2026-04-02T09:11:51Z |
| opensuse-su-2026:10482-1 | osslsigncode-2.13-1.1 on GA media | 2026-04-02T00:00:00Z | 2026-04-02T00:00:00Z |
| opensuse-su-2026:20459-1 | Security update for perl-XML-Parser | 2026-04-01T16:23:38Z | 2026-04-01T16:23:38Z |
| opensuse-su-2026:20456-1 | Security update for tinyproxy | 2026-04-01T16:15:06Z | 2026-04-01T16:15:06Z |
| opensuse-su-2026:20458-1 | Security update for python-Pillow | 2026-04-01T14:57:29Z | 2026-04-01T14:57:29Z |
| opensuse-su-2026:20452-1 | Security update for kea | 2026-04-01T09:24:21Z | 2026-04-01T09:24:21Z |
| opensuse-su-2026:10481-1 | python314-3.14.3-4.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10480-1 | python313-3.13.12-3.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10479-1 | python312-3.12.13-4.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10478-1 | python311-3.11.15-4.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10477-1 | python310-3.10.20-3.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10476-1 | python311-Pygments-2.20.0-2.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10475-1 | opensc-0.27.1-1.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10474-1 | ignition-2.26.0-3.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10473-1 | dnsdist-2.0.3-1.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10472-1 | conftest-0.67.1-2.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:20451-1 | Security update for gnome-online-accounts, gvfs | 2026-03-31T09:11:58Z | 2026-03-31T09:11:58Z |
| opensuse-su-2026:10471-1 | tinyproxy-1.11.3-2.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10470-1 | libXvnc-devel-1.16.1-2.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10469-1 | python315-3.15.0~a7-3.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10468-1 | python311-ecdsa-0.19.2-1.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10467-1 | ovmf-202602-6.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10466-1 | expat-2.7.5-1.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10465-1 | ImageMagick-7.1.2.18-2.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:20449-1 | Security update for postgresql13 | 2026-03-30T15:14:07Z | 2026-03-30T15:14:07Z |
| opensuse-su-2026:20448-1 | Security update for expat | 2026-03-30T14:59:16Z | 2026-03-30T14:59:16Z |
| opensuse-su-2026:20446-1 | Security update for gnutls | 2026-03-30T14:36:07Z | 2026-03-30T14:36:07Z |
| opensuse-su-2026:20447-1 | Security update for postgresql16 | 2026-03-30T14:27:44Z | 2026-03-30T14:27:44Z |
| opensuse-su-2026:20444-1 | Security update for tomcat10 | 2026-03-30T08:13:22Z | 2026-03-30T08:13:22Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:12031 | Red Hat Security Advisory: runc security update | 2026-04-30T03:29:55+00:00 | 2026-05-09T08:54:39+00:00 |
| rhsa-2026:12028 | Red Hat Security Advisory: podman security update | 2026-04-30T03:03:35+00:00 | 2026-05-09T08:54:38+00:00 |
| rhsa-2026:12029 | Red Hat Security Advisory: skopeo security update | 2026-04-30T03:01:07+00:00 | 2026-05-09T08:54:38+00:00 |
| rhsa-2026:11996 | Red Hat Security Advisory: Red Hat Quay 3.9.21 | 2026-04-30T01:20:06+00:00 | 2026-05-09T08:54:38+00:00 |
| rhsa-2026:11916 | Red Hat Security Advisory: Red Hat Quay 3.10.21 | 2026-04-29T21:18:39+00:00 | 2026-05-09T08:54:38+00:00 |
| rhsa-2026:11901 | Red Hat Security Advisory: squid security update | 2026-04-29T20:26:31+00:00 | 2026-04-30T02:55:13+00:00 |
| rhsa-2026:11902 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-29T20:21:25+00:00 | 2026-05-04T21:19:57+00:00 |
| rhsa-2026:11881 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-29T19:06:36+00:00 | 2026-05-07T15:04:20+00:00 |
| rhsa-2026:11863 | Red Hat Security Advisory: rhc-worker-playbook security update | 2026-04-29T17:54:26+00:00 | 2026-05-07T15:35:43+00:00 |
| rhsa-2026:11858 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.7.10 security update | 2026-04-29T17:12:47+00:00 | 2026-05-07T09:01:23+00:00 |
| rhsa-2026:11856 | Red Hat Security Advisory: Red Hat Quay 3.12.17 | 2026-04-29T17:11:19+00:00 | 2026-05-09T08:54:38+00:00 |
| rhsa-2026:11829 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-29T16:49:39+00:00 | 2026-05-04T21:23:51+00:00 |
| rhsa-2026:11814 | Red Hat Security Advisory: webkit2gtk3 security update | 2026-04-29T16:17:30+00:00 | 2026-05-07T08:27:13+00:00 |
| rhsa-2026:11813 | Red Hat Security Advisory: thunderbird security update | 2026-04-29T16:12:50+00:00 | 2026-05-07T21:42:17+00:00 |
| rhsa-2026:11804 | Red Hat Security Advisory: oci-seccomp-bpf-hook security update | 2026-04-29T15:55:55+00:00 | 2026-05-09T02:37:25+00:00 |
| rhsa-2026:11806 | Red Hat Security Advisory: gdk-pixbuf2 security update | 2026-04-29T15:46:10+00:00 | 2026-04-30T16:32:38+00:00 |
| rhsa-2026:11805 | Red Hat Security Advisory: firefox security update | 2026-04-29T15:44:30+00:00 | 2026-05-07T21:42:17+00:00 |
| rhsa-2026:11803 | Red Hat Security Advisory: VolSync v0.15 security fixes and container updates | 2026-04-29T15:35:02+00:00 | 2026-05-09T08:54:38+00:00 |
| rhsa-2026:11800 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.2.10 | 2026-04-29T15:26:45+00:00 | 2026-05-08T14:59:15+00:00 |
| rhsa-2026:11749 | Red Hat Security Advisory: buildah security update | 2026-04-29T14:31:52+00:00 | 2026-05-09T08:54:38+00:00 |
| rhsa-2026:11768 | Red Hat Security Advisory: Red Hat Update Infrastructure 5.2 Technology Preview security update | 2026-04-29T14:26:51+00:00 | 2026-05-09T00:09:21+00:00 |
| rhsa-2026:11747 | Red Hat Security Advisory: Release of containers for RHOSO 18.0.18 security update | 2026-04-29T13:59:22+00:00 | 2026-05-09T03:03:28+00:00 |
| rhsa-2026:11711 | Red Hat Security Advisory: grafana security update | 2026-04-29T13:32:55+00:00 | 2026-05-07T15:35:40+00:00 |
| rhsa-2026:11722 | Red Hat Security Advisory: python-urllib3 security update | 2026-04-29T13:26:50+00:00 | 2026-05-07T21:43:29+00:00 |
| rhsa-2026:11692 | Red Hat Security Advisory: xorg-x11-server security update | 2026-04-29T13:20:55+00:00 | 2026-05-04T21:18:08+00:00 |
| rhsa-2026:11712 | Red Hat Security Advisory: grafana security update | 2026-04-29T13:13:50+00:00 | 2026-05-07T15:35:41+00:00 |
| rhsa-2026:11704 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-29T13:09:25+00:00 | 2026-05-07T15:35:40+00:00 |
| rhsa-2026:11700 | Red Hat Security Advisory: ovn24.03 security update | 2026-04-29T12:45:25+00:00 | 2026-04-29T18:27:21+00:00 |
| rhsa-2026:11702 | Red Hat Security Advisory: ovn25.09 security update | 2026-04-29T12:45:05+00:00 | 2026-04-29T18:27:21+00:00 |
| rhsa-2026:11701 | Red Hat Security Advisory: ovn25.03 security update | 2026-04-29T12:44:55+00:00 | 2026-04-29T18:27:22+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2021-159-01 | IGSS (Interactive Graphical SCADA System) | 2021-06-08T00:00:00.000Z | 2021-06-08T00:00:00.000Z |
| sevd-2021-130-04 | homeLYnk (Wiser For KNX) and spaceLYnk | 2021-05-11T07:30:55.000Z | 2022-11-08T07:30:55.000Z |
| sevd-2021-130-07 | EcoStruxure Geo SCADA Expert | 2021-05-11T00:00:00.000Z | 2021-05-11T00:00:00.000Z |
| sevd-2021-130-05 | Modicon M241 & M251 Logic Controllers | 2021-05-11T00:00:00.000Z | 2021-05-11T00:00:00.000Z |
| sevd-2021-130-01 | Modicon Managed Switch | 2021-05-11T00:00:00.000Z | 2021-05-11T00:00:00.000Z |
| sevd-2021-103-01 | C-Bus Toolkit and C-Gate Server | 2021-04-13T11:17:13.000Z | 2022-11-08T11:17:13.000Z |
| sevd-2021-068-02 | PowerLogic ION7400 / PM8000 / ION9000 Power Meters | 2021-03-09T00:00:00.000Z | 2021-03-09T00:00:00.000Z |
| sevd-2021-068-01 | IGSS (Interactive Graphical SCADA System) | 2021-03-09T00:00:00.000Z | 2021-03-09T00:00:00.000Z |
| sevd-2021-040-01 | PowerLogic Power Metering Products | 2021-02-08T00:00:00.000Z | 2021-02-08T00:00:00.000Z |
| sevd-2021-012-02 | EcoStruxure Power Build - Rapsody | 2021-01-12T08:32:35.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2020-353-02 | Treck HTTP Server Vulnerability on TM3 Bus Coupler Modules (V2.0) | 2020-12-18T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2020-343-05 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and Associated Communication Modules | 2020-12-08T21:04:43.000Z | 2022-09-13T20:04:43.000Z |
| sevd-2020-343-06 | Web Server on Modicon M340, Legacy Offers Modicon Quantum Modicon Premium and associated Communication Modules | 2020-12-08T09:08:01.000Z | 2020-12-08T09:08:01.000Z |
| sevd-2020-343-07 | SNMP Service on Modicon M340 and Associated Communication Modules | 2020-12-08T05:49:51.000Z | 2022-09-13T05:49:51.000Z |
| sevd-2020-343-09 | Modicon M258 Logic Controllers and SoMachine/ SoMachine Motion Software | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-343-08 | Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-343-04 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules | 2020-12-08T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2020-343-03 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (V2.0) | 2020-12-08T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2020-343-02 | EcoStruxure Geo SCADA Expert | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-343-01 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and RemoteConnect™ | 2020-12-08T00:00:00.000Z | 2021-07-13T00:00:00.000Z |
| sevd-2020-315-07 | PLC Simulator on EcoStruxure™ Control Expert and Process Expert | 2020-11-10T15:07:11.000Z | 2023-03-14T15:07:11.000Z |
| sevd-2020-315-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-11-10T12:05:04.000Z | 2023-02-14T12:05:00.000Z |
| sevd-2020-315-06 | Easergy T300 | 2020-11-10T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-315-05 | Modicon M100/M200/M221 Programmable Logic Controller | 2020-11-10T00:00:00.000Z | 2021-01-12T00:00:00.000Z |
| sevd-2020-315-04 | EcoStruxure Building Operation (EBO) | 2020-11-10T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| sevd-2020-315-03 | Interactive Graphical SCADA System (IGSS) | 2020-11-10T00:00:00.000Z | 2021-04-15T00:00:00.000Z |
| sevd-2020-315-02 | EcoStruxure™ Operator Terminal Expert (Vijeo XD), Pro-face BLUE and WinGP runtime | 2020-11-09T00:00:00.000Z | 2021-01-11T00:00:00.000Z |
| sevd-2020-287-04 | EcoStruxure™ and SmartStruxure™ Power Monitoring and SCADA Software | 2020-10-13T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-287-03 | Smartlink, PowerTag, and Wiser Series Gateways | 2020-10-13T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-287-02 | Wibu-Systems CodeMeter Vulnerabilities | 2020-10-13T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-869574 | SSA-869574: Multiple Vulnerabilities in SINEMA Remote Connect Server Before V3.2 SP2 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-773256 | SSA-773256: Impact of Socket.IO CVE-2024-38355 on Siemens Industrial Products | 2024-09-10T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-765405 | SSA-765405: Multiple Vulnerabilities in SIMATIC RFID Readers | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-721642 | SSA-721642: Injection Vulnerability in SCALANCE W700 802.11 AX Family Before V2.4 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-673996 | SSA-673996: Buffer Overflow Vulnerability in Third-Party Component in SICAM and SITIPE Products | 2024-09-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-629254 | SSA-629254: Remote Code Execution Vulnerability in SIMATIC SCADA and PCS 7 systems | 2024-09-10T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-446545 | SSA-446545: Impact of RegreSSHion (CVE-2024-6387) in Siemens Industrial Products | 2024-09-10T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-427715 | SSA-427715: Stack-Based Buffer Overflow Vulnerability in Tecnomatix Plant Simulation | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-423808 | SSA-423808: Multiple NULL Pointer Dereference Vulnerabilities in Industrial Products | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-417159 | SSA-417159: Multiple Vulnerabilities in SINEMA Remote Connect Client Before V3.2 SP2 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-359713 | SSA-359713: Authorization Bypass Vulnerability in Industrial Edge Management | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-342438 | SSA-342438: Privilege Escalation Vulnerability in SINUMERIK ONE, SINUMERIK 840D and SINUMERIK 828D | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-103653 | SSA-103653: Denial-of-Service Vulnerability in Automation License Manager | 2024-09-10T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-097786 | SSA-097786: Insertion of Sensitive Information into Log File Vulnerability in SINUMERIK systems | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-097435 | SSA-097435: Usernames Disclosure Vulnerability in Mendix Runtime | 2024-09-10T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-039007 | SSA-039007: Heap-based Buffer Overflow Vulnerability in User Management Component (UMC) | 2024-09-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-921449 | SSA-921449: Plaintext Storage of a Password Vulnerability in LOGO! V8.3 BM Devices | 2024-08-13T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-856475 | SSA-856475: X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-784301 | SSA-784301: Multiple Vulnerabilities in SINEC NMS Before V3.0 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-720392 | SSA-720392: Multiple Vulnerabilities in Third-Party Components in Location Intelligence Before V4.4 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-716317 | SSA-716317: Multiple Vulnerability in SINEC Traffic Analyzer Before V2.0 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-659443 | SSA-659443: Local Code Execution Vulnerabilities in COMOS Before V10.5 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-417547 | SSA-417547: Multiple Vulnerabilities in INTRALOG WMS Before V4 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-357412 | SSA-357412: PRT File Parsing Vulnerability in NX Before V2406.3000 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-087301 | SSA-087301: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.1 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-857368 | SSA-857368: Multiple Vulnerabilities in Omnivise T3000 | 2024-08-02T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-071402 | SSA-071402: Multiple Vulnerabilities in SICAM Products | 2024-07-22T00:00:00Z | 2024-07-22T00:00:00Z |
| ssa-998949 | SSA-998949: Hard-coded Default Encryption Key in Mendix Encryption Module V10.0.0 and V10.0.1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-928781 | SSA-928781: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 HF1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-883918 | SSA-883918: Information Disclosure Vulnerability in SIMATIC WinCC | 2024-07-09T00:00:00Z | 2024-11-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1603-1 | Security update for tomcat10 | 2026-04-24T11:47:20Z | 2026-04-24T11:47:20Z |
| suse-su-2026:1602-1 | Security update for libpng16 | 2026-04-24T11:46:29Z | 2026-04-24T11:46:29Z |
| suse-su-2026:1601-1 | Security update for libpng16 | 2026-04-24T11:46:16Z | 2026-04-24T11:46:16Z |
| suse-su-2026:1600-1 | Security update for flatpak | 2026-04-24T11:46:10Z | 2026-04-24T11:46:10Z |
| suse-su-2026:1599-1 | Security update for librsvg | 2026-04-24T11:45:47Z | 2026-04-24T11:45:47Z |
| suse-su-2026:1598-1 | Security update for ImageMagick | 2026-04-24T11:44:43Z | 2026-04-24T11:44:43Z |
| suse-su-2026:1597-1 | Security update for ImageMagick | 2026-04-24T11:44:19Z | 2026-04-24T11:44:19Z |
| suse-su-2026:1596-1 | Security update for ImageMagick | 2026-04-24T11:44:05Z | 2026-04-24T11:44:05Z |
| suse-su-2026:21401-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-04-24T10:09:33Z | 2026-04-24T10:09:33Z |
| suse-su-2026:21348-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-04-24T10:09:33Z | 2026-04-24T10:09:33Z |
| suse-su-2026:21402-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-04-24T10:08:56Z | 2026-04-24T10:08:56Z |
| suse-su-2026:21349-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-04-24T10:08:56Z | 2026-04-24T10:08:56Z |
| suse-su-2026:21399-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 16) | 2026-04-24T10:02:01Z | 2026-04-24T10:02:01Z |
| suse-su-2026:21347-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 16) | 2026-04-24T10:02:01Z | 2026-04-24T10:02:01Z |
| suse-su-2026:1592-1 | Security update for the Linux Kernel (Live Patch 48 for SUSE Linux Enterprise 15 SP4) | 2026-04-24T09:04:09Z | 2026-04-24T09:04:09Z |
| suse-su-2026:1584-1 | Security update for the Linux Kernel (Live Patch 47 for SUSE Linux Enterprise 15 SP4) | 2026-04-24T06:34:01Z | 2026-04-24T06:34:01Z |
| suse-su-2026:1583-1 | Security update for the Linux Kernel (Live Patch 17 for SUSE Linux Enterprise 15 SP6) | 2026-04-23T17:04:03Z | 2026-04-23T17:04:03Z |
| suse-su-2026:1582-1 | Security update for python-pyOpenSSL | 2026-04-23T16:48:46Z | 2026-04-23T16:48:46Z |
| suse-su-2026:1581-1 | Security update for go1.25-openssl | 2026-04-23T16:39:19Z | 2026-04-23T16:39:19Z |
| suse-su-2026:1580-1 | Security update for go1.26-openssl | 2026-04-23T16:38:35Z | 2026-04-23T16:38:35Z |
| suse-su-2026:1578-1 | Security update for the Linux Kernel (Live Patch 38 for SUSE Linux Enterprise 15 SP4) | 2026-04-23T16:06:07Z | 2026-04-23T16:06:07Z |
| suse-su-2026:1577-1 | Security update for openssl-1_1 | 2026-04-23T15:53:50Z | 2026-04-23T15:53:50Z |
| suse-su-2026:1576-1 | Security update for gdk-pixbuf | 2026-04-23T15:53:31Z | 2026-04-23T15:53:31Z |
| suse-su-2026:1575-1 | Security update for the Linux Kernel | 2026-04-23T15:53:10Z | 2026-04-23T15:53:10Z |
| suse-su-2026:1574-1 | Security update for the Linux Kernel | 2026-04-23T15:52:59Z | 2026-04-23T15:52:59Z |
| suse-su-2026:1573-1 | Security update for the Linux Kernel | 2026-04-23T15:52:40Z | 2026-04-23T15:52:40Z |
| suse-su-2026:1572-1 | Security update for tomcat | 2026-04-23T15:52:25Z | 2026-04-23T15:52:25Z |
| suse-su-2026:1571-1 | Security update for ntfs-3g_ntfsprogs | 2026-04-23T15:52:09Z | 2026-04-23T15:52:09Z |
| suse-su-2026:21383-1 | Security update for MozillaFirefox | 2026-04-23T15:41:47Z | 2026-04-23T15:41:47Z |
| suse-su-2026:21411-1 | Security update for gdk-pixbuf | 2026-04-23T12:57:37Z | 2026-04-23T12:57:37Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:5640 | Moderate: mysql:8.4 security update | 2026-03-24T00:00:00Z | 2026-03-26T11:56:07Z |
| alsa-2026:5603 | Moderate: opencryptoki security update | 2026-03-24T00:00:00Z | 2026-03-26T10:00:53Z |
| alsa-2026:5602 | Moderate: vim security update | 2026-03-24T00:00:00Z | 2026-03-26T10:18:47Z |
| alsa-2026:5599 | Moderate: nginx security update | 2026-03-24T00:00:00Z | 2026-03-26T13:22:57Z |
| alsa-2026:5588 | Moderate: python3 security update | 2026-03-24T00:00:00Z | 2026-03-26T10:36:35Z |
| alsa-2026:5587 | Moderate: opencryptoki security update | 2026-03-24T00:00:00Z | 2026-03-26T10:48:17Z |
| alsa-2026:5585 | Moderate: gnutls security update | 2026-03-24T00:00:00Z | 2026-03-26T11:01:10Z |
| alsa-2026:5581 | Moderate: nginx:1.24 security update | 2026-03-24T00:00:00Z | 2026-03-26T13:17:49Z |
| alsa-2026:5580 | Moderate: mysql:8.0 security update | 2026-03-24T00:00:00Z | 2026-03-26T11:12:21Z |
| alsa-2026:5578 | Moderate: virt:rhel and virt-devel:rhel security update | 2026-03-24T00:00:00Z | 2026-03-26T13:09:57Z |
| alsa-2026:5513 | Moderate: 389-ds:1.4 security update | 2026-03-24T00:00:00Z | 2026-03-26T11:22:25Z |
| alsa-2026:5146 | Important: yggdrasil security update | 2026-03-19T00:00:00Z | 2026-03-20T07:36:24Z |
| alsa-2026:5145 | Important: yggdrasil-worker-package-manager security update | 2026-03-19T00:00:00Z | 2026-03-20T07:40:23Z |
| alsa-2026:5113 | Important: gimp:2.8 security update | 2026-03-19T00:00:00Z | 2026-03-20T13:31:59Z |
| alsa-2026:5080 | Important: libarchive security update | 2026-03-19T00:00:00Z | 2026-03-20T07:21:56Z |
| alsa-2026:5063 | Important: libarchive security update | 2026-03-19T00:00:00Z | 2026-03-20T07:26:23Z |
| alsa-2026:4898 | Important: capstone security update | 2026-03-18T00:00:00Z | 2026-03-19T15:08:06Z |
| alsa-2026:4828 | Moderate: mysql security update | 2026-03-17T00:00:00Z | 2026-03-19T15:05:35Z |
| alsa-2026:4772 | Moderate: glibc security update | 2026-03-17T00:00:00Z | 2026-03-19T12:43:04Z |
| alsa-2026:4760 | Moderate: grub2 security update | 2026-03-17T00:00:00Z | 2026-03-19T14:40:59Z |
| alsa-2026:4759 | Moderate: kernel security update | 2026-03-17T00:00:00Z | 2026-03-20T07:32:09Z |
| alsa-2026:4728 | Important: libpng security update | 2026-03-17T00:00:00Z | 2026-03-19T12:37:34Z |
| alsa-2026:4723 | Moderate: kernel security update | 2026-03-17T00:00:00Z | 2026-03-19T14:50:26Z |
| alsa-2026:4717 | Moderate: opencryptoki security update | 2026-03-17T00:00:00Z | 2026-03-19T15:03:25Z |
| alsa-2026:4715 | Moderate: vim security update | 2026-03-17T00:00:00Z | 2026-03-20T07:17:19Z |
| alsa-2026:4713 | Moderate: python3.12 security update | 2026-03-17T00:00:00Z | 2026-03-19T14:56:58Z |
| alsa-2026:4705 | Moderate: nginx security update | 2026-03-17T00:00:00Z | 2026-03-19T12:47:53Z |
| alsa-2026:4672 | Important: container-tools:rhel8 security update | 2026-03-17T00:00:00Z | 2026-03-17T10:17:22Z |
| alsa-2026:4649 | Moderate: grub2 security update | 2026-03-16T00:00:00Z | 2026-03-19T15:01:35Z |
| alsa-2026:4648 | Moderate: grub2 security update | 2026-03-16T00:00:00Z | 2026-03-17T10:24:06Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-484 | Heap-buffer-overflow in load_protocols_file_fd | 2025-06-23T00:14:46.656195Z | 2025-06-23T00:14:46.656704Z |
| osv-2025-481 | Stack-buffer-overflow in void glz::from<10000u, int>::op<glz::opts_csv{10000u, | 2025-06-20T00:15:46.185029Z | 2025-06-20T00:15:46.185445Z |
| osv-2025-480 | Stack-buffer-overflow in void glz::from<10000u, std::__1::__bit_reference<std::__1::vector<bool, std::__1 | 2025-06-20T00:14:17.007847Z | 2025-06-20T00:14:17.008310Z |
| osv-2025-469 | Use-of-uninitialized-value in ndpi_strdup | 2025-06-16T00:17:21.776120Z | 2025-06-16T00:17:21.776520Z |
| osv-2025-465 | Heap-buffer-overflow in xmlParsePubidLiteral | 2025-06-15T00:09:20.387117Z | 2025-06-15T00:09:20.387490Z |
| osv-2025-461 | Heap-buffer-overflow in xmlParsePubidLiteral | 2025-06-14T00:10:49.391511Z | 2025-06-14T00:10:49.391787Z |
| osv-2025-457 | Heap-buffer-overflow in xmlParsePubidLiteral | 2025-06-14T00:04:11.416575Z | 2025-06-14T00:04:11.417116Z |
| osv-2025-456 | Use-of-uninitialized-value in ppd_hash_option | 2025-06-12T00:10:52.355312Z | 2025-06-12T00:10:52.355684Z |
| osv-2025-454 | Use-of-uninitialized-value in _cups_strcasecmp | 2025-06-11T00:12:12.952969Z | 2025-06-11T00:12:12.953357Z |
| osv-2025-449 | Heap-buffer-overflow in check_content_type_and_change_protocol | 2025-06-10T00:16:50.624468Z | 2025-06-10T00:16:50.624907Z |
| osv-2025-447 | Use-of-uninitialized-value in spvtools::EmitNumericLiteral | 2025-06-09T00:05:11.128452Z | 2025-09-24T14:18:33.220549Z |
| osv-2024-1446 | Segv on unknown address in glslang::TIntermediate::addSymbol | 2025-06-06T00:12:59.981959Z | 2025-06-06T00:12:59.982286Z |
| osv-2025-442 | Security exception in org.jsoup.parser.HtmlTreeBuilder.process | 2025-06-06T00:12:40.427852Z | 2025-06-06T00:12:40.428189Z |
| osv-2025-437 | Heap-buffer-overflow in mmcall | 2025-06-05T00:18:59.402795Z | 2025-06-05T00:18:59.403189Z |
| osv-2025-436 | Security exception in graphql.parser.GraphqlAntlrToLanguage.createNonNullType | 2025-06-05T00:11:24.382209Z | 2025-06-05T00:11:24.382444Z |
| osv-2025-433 | Null-dereference READ in _libssh2_packet_add | 2025-06-05T00:02:57.199903Z | 2025-06-05T00:02:57.200566Z |
| osv-2025-424 | UNKNOWN READ in RDKit::RDValue::destroy | 2025-06-03T00:12:35.236863Z | 2025-09-24T14:19:44.921114Z |
| osv-2025-412 | UNKNOWN WRITE in luaL_newstate | 2025-05-28T00:06:09.320289Z | 2025-05-28T00:06:09.320970Z |
| osv-2025-408 | Heap-buffer-overflow in sav_parse_long_variable_names_record | 2025-05-27T00:12:59.401698Z | 2025-05-27T00:12:59.402180Z |
| osv-2025-406 | Security exception in com.puppycrawl.tools.checkstyle.JavaAstVisitor.getInnerBopAst | 2025-05-27T00:01:44.628210Z | 2025-05-27T00:01:44.628747Z |
| osv-2025-404 | Use-of-uninitialized-value in JS_FreeRuntime | 2025-05-23T00:14:00.218149Z | 2025-05-23T00:14:00.218494Z |
| osv-2025-401 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-05-23T00:07:37.622395Z | 2025-05-23T00:07:37.622817Z |
| osv-2025-396 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-05-22T00:16:08.210127Z | 2025-05-22T00:16:08.210510Z |
| osv-2025-384 | Segv on unknown address in rtpp_refcnt_decref | 2025-05-20T00:04:47.616424Z | 2025-05-20T00:04:47.617104Z |
| osv-2025-374 | Use-of-uninitialized-value in pcpp::SomeIpSdEntry::SomeIpSdEntry | 2025-05-17T00:16:26.661924Z | 2025-05-17T00:16:26.662355Z |
| osv-2025-373 | Heap-use-after-free in aiMesh::~aiMesh | 2025-05-17T00:11:17.621374Z | 2025-08-22T19:20:38.723565Z |
| osv-2025-371 | Index-out-of-bounds in tcp_analyze_sequence_number | 2025-05-16T00:16:16.300219Z | 2025-05-16T00:16:16.300689Z |
| osv-2025-369 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-05-15T00:19:04.752117Z | 2025-05-15T00:19:04.752522Z |
| osv-2025-368 | Heap-buffer-overflow in __parse_options | 2025-05-15T00:03:04.543640Z | 2025-05-15T00:03:04.544159Z |
| osv-2025-363 | Heap-buffer-overflow in jv_string_vfmt | 2025-05-14T00:03:23.388719Z | 2025-05-14T00:03:23.389224Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0059 | servo-fontconfig crate is unmaintained | 2025-09-08T12:00:00Z | 2025-09-08T09:09:54Z |
| rustsec-2025-0058 | custom_derive crate is unmaintained | 2025-09-07T12:00:00Z | 2025-09-07T08:38:20Z |
| rustsec-2025-0057 | fxhash - no longer maintained | 2025-09-05T12:00:00Z | 2025-09-05T19:09:01Z |
| rustsec-2025-0056 | adler crate is unmaintained, use adler2 instead | 2025-09-05T12:00:00Z | 2025-09-05T09:05:48Z |
| rustsec-2025-0055 | Logging user input may result in poisoning logs with ANSI escape sequences | 2025-08-29T12:00:00Z | 2025-09-02T11:05:02Z |
| rustsec-2025-0157 | `statsrelay-protobuf` was removed from crates.io for malicious code | 2025-08-26T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0052 | async-std has been discontinued | 2025-08-24T12:00:00Z | 2025-08-27T11:36:30Z |
| rustsec-2025-0054 | ArrayQueue::push_front is not panic-safe | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0053 | Multiple memory corruption vulnerabilities in safe APIs | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0050 | IdMap::from_iter may lead to uninitialized memory being freed on drop | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0049 | User-defined implementations of the safe trait scratchpad::Tracking can cause heap buffer overflows | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0047 | Out-of-bounds access in `get_disjoint_mut` due to incorrect bounds check | 2025-08-12T12:00:00Z | 2025-08-12T09:41:13Z |
| rustsec-2025-0051 | `xcb::Connection::connect_to_fd*` functions violate I/O safety | 2025-08-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0048 | tsify-next is unmaintained, use tsify instead | 2025-07-29T12:00:00Z | 2025-08-13T14:05:32Z |
| rustsec-2025-0112 | Possible host crash with host-to-wasm component intrinsics | 2025-07-18T12:00:00Z | 2025-10-25T11:20:30Z |
| rustsec-2025-0046 | Host panic with `fd_renumber` WASIp1 function | 2025-07-18T12:00:00Z | 2025-07-18T19:48:13Z |
| rustsec-2025-0045 | ConstStaticCell could have been used to pass non-Send values to another thread | 2025-07-17T12:00:00Z | 2025-07-17T14:38:11Z |
| rustsec-2025-0043 | matrix-sdk-sqlite: SQL injection vulnerability in `SqliteEventCacheStore::find_event_with_relations` | 2025-07-11T12:00:00Z | 2025-07-11T15:30:12Z |
| rustsec-2025-0042 | Uninitialized read after allocating MemBump | 2025-07-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0044 | Four unique double-free vulnerabilities triggered via safe APIs | 2025-06-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0041 | matrix-sdk-crypto vulnerable to encrypted event sender spoofing by homeserver administrator | 2025-06-11T12:00:00Z | 2025-06-12T09:17:43Z |
| rustsec-2025-0138 | --allow-read / --allow-write permission bypass in `node:sqlite` | 2025-06-03T12:00:00Z | 2025-12-29T10:04:21Z |
| rustsec-2025-0062 | Heap Buffer Overflow in the DrainCol Destructor | 2025-05-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0037 | Pingora Request Smuggling and Cache Poisoning | 2025-05-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0036 | surf is unmaintained | 2025-05-17T12:00:00Z | 2025-05-17T13:43:35Z |
| rustsec-2025-0113 | soundness issue and unmaintained | 2025-05-06T12:00:00Z | 2025-11-04T06:10:22Z |
| rustsec-2025-0064 | soundness issue and unmaintained | 2025-05-06T12:00:00Z | 2025-09-11T07:03:09Z |
| rustsec-2025-0039 | Lack of sufficient checks in public API | 2025-05-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0034 | soundness issue and unmaintained | 2025-05-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0027 | Panic in mp3-metadata due to the lack of bounds checking | 2025-04-28T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-jre-2020-14583 | 2026-05-08T05:42:58.038Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-14581 | 2026-05-08T05:42:56.387Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-14579 | 2026-05-08T05:42:54.803Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-14578 | 2026-05-08T05:42:53.272Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-14577 | 2026-05-08T05:42:51.873Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-14573 | 2026-05-08T05:42:50.502Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-14562 | 2026-05-08T05:42:49.095Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2020-14556 | 2026-05-08T05:42:47.389Z | 2026-05-08T06:11:36.072Z | |
| bit-valkey-2026-25243 | redis-server RESTORE invalid memory access may allow remote code execution | 2026-05-07T11:52:00.374Z | 2026-05-07T12:11:36.665Z |
| bit-valkey-2026-23631 | redis-server Lua use-after-free may allow remote code execution | 2026-05-07T11:51:58.626Z | 2026-05-07T12:11:36.665Z |
| bit-valkey-2026-23479 | redis-server use-after-free in unblock client flow may allow remote code execution | 2026-05-07T11:51:56.838Z | 2026-05-07T12:11:36.665Z |
| bit-redis-2026-25243 | redis-server RESTORE invalid memory access may allow remote code execution | 2026-05-07T11:51:17.557Z | 2026-05-07T12:11:36.665Z |
| bit-keydb-2026-25243 | redis-server RESTORE invalid memory access may allow remote code execution | 2026-05-07T11:43:05.710Z | 2026-05-07T12:11:36.665Z |
| bit-thrift-2026-43870 | Apache Thrift: Node.js web_server.js multi-vulnerability | 2026-05-07T08:53:18.614Z | 2026-05-07T09:12:02.780Z |
| bit-thrift-2026-43869 | Apache Thrift: TSSLTransportFactory.java hostname verification | 2026-05-07T08:53:17.253Z | 2026-05-07T09:12:02.780Z |
| bit-thrift-2026-43868 | Apache Thrift: Rust implementation vulnerable to CVE-2020-13949 pattern | 2026-05-07T08:53:15.762Z | 2026-05-07T09:12:02.780Z |
| bit-redis-2026-25589 | RedisBloom RESTORE invalid memory access may allow remote code execution | 2026-05-07T08:53:11.906Z | 2026-05-07T09:12:02.780Z |
| bit-redis-2026-25588 | RedisTimeSeries RESTORE invalid memory access may allow remote code execution | 2026-05-07T08:53:10.146Z | 2026-05-07T09:12:02.780Z |
| bit-redis-2026-23631 | redis-server Lua use-after-free may allow remote code execution | 2026-05-07T08:53:06.760Z | 2026-05-07T09:12:02.780Z |
| bit-redis-2026-23479 | redis-server use-after-free in unblock client flow may allow remote code execution | 2026-05-07T08:53:05.164Z | 2026-05-07T09:12:02.780Z |
| bit-modsecurity2-2026-30923 | libModSecurity3 denial of service via segfault when using t:hexDecode on single-character query strings | 2026-05-07T08:46:02.356Z | 2026-05-07T09:12:02.780Z |
| bit-modsecurity-2026-30923 | libModSecurity3 denial of service via segfault when using t:hexDecode on single-character query strings | 2026-05-07T08:45:59.405Z | 2026-05-07T09:12:02.780Z |
| bit-keydb-2026-25589 | RedisBloom RESTORE invalid memory access may allow remote code execution | 2026-05-07T08:42:59.502Z | 2026-05-07T09:12:02.780Z |
| bit-keydb-2026-25588 | RedisTimeSeries RESTORE invalid memory access may allow remote code execution | 2026-05-07T08:42:57.726Z | 2026-05-07T09:12:02.780Z |
| bit-keydb-2026-23631 | redis-server Lua use-after-free may allow remote code execution | 2026-05-07T08:42:54.096Z | 2026-05-07T09:12:02.780Z |
| bit-keydb-2026-23479 | redis-server use-after-free in unblock client flow may allow remote code execution | 2026-05-07T08:42:52.441Z | 2026-05-07T09:12:02.780Z |
| bit-dotnet-2026-33116 | .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | 2026-05-07T08:39:34.257Z | 2026-05-07T09:12:02.780Z |
| bit-dotnet-2026-32203 | .NET and Visual Studio Denial of Service Vulnerability | 2026-05-07T08:39:32.547Z | 2026-05-07T09:12:02.780Z |
| bit-apache-2026-29168 | Apache HTTP Server: mod_md unrestricted OCSP response | 2026-05-07T08:38:45.362Z | 2026-05-07T09:12:02.780Z |
| bit-apache-2026-28780 | Apache HTTP Server: buffer overflow in mod_proxy_ajp via ajp_msg_check_header() | 2026-05-07T08:38:43.651Z | 2026-05-07T09:12:02.780Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-bp32212 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-61732, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.87.0-r0, 0.87.0-r1, 0.88.0-r0 | 2026-04-01T09:58:48.421220Z | 2026-03-11T10:14:30Z |
| cleanstart-2026-mq02912 | Security fixes for CVE-2017-7529, CVE-2018-16845, CVE-2019-20372, CVE-2019-9511, CVE-2019-9513, CVE-2019-9516, CVE-2021-23017, CVE-2021-46461, CVE-2021-46462, CVE-2021-46463, CVE-2022-25139, CVE-2022-3638, CVE-2022-41741, CVE-2022-41742, CVE-2023-44487, CVE-2024-31079, CVE-2024-32760, CVE-2024-34161, CVE-2024-35200, CVE-2024-7347, CVE-2025-23419 applied in versions: 0, 1.12.1-r0, 1.14.1-r0, 1.16.1-r0, 1.16.1-r6, 1.20.1-r0, 1.20.1-r1, 1.20.2-r2, 1.22.1-r0, 1.24.0-r12, 1.26.2-r0, 1.26.3-r0 | 2026-04-01T09:58:43.603060Z | 2026-03-12T13:09:34Z |
| cleanstart-2026-jd75482 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0 | 2026-04-01T09:58:30.410416Z | 2026-03-12T13:09:34Z |
| cleanstart-2026-jo01099 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-24051, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.3-r0 | 2026-04-01T09:58:23.141059Z | 2026-03-12T13:09:34Z |
| cleanstart-2026-du32240 | Security fixes for CVE-2026-2391, CVE-2026-26960, CVE-2026-29786, CVE-2026-31802, ghsa-34x7-hfp2-rc4v, ghsa-5359-pvf2-pw78, ghsa-73rr-hh4g-fpgx, ghsa-8qq5-rm4j-mr97, ghsa-r6q2-hw4h-h46w applied in versions: 4.2.1.1-r1, 4.2.1.1-r2, 4.3.0.1-r0, 4.3.1-r0 | 2026-04-01T09:57:23.228226Z | 2026-03-12T13:10:45Z |
| cleanstart-2026-of85770 | Security fixes for CVE-2014-0138, CVE-2014-0139, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9594, CVE-2017-1000099, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000257, CVE-2017-2629, CVE-2017-7407, CVE-2017-7468, CVE-2017-8816, CVE-2017-8817, CVE-2017-8818, CVE-2018-0500, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000300, CVE-2018-1000301, CVE-2018-14618, CVE-2018-16839, CVE-2018-16840, CVE-2018-16842, CVE-2018-16890, CVE-2019-3822, CVE-2019-3823, CVE-2019-5435, CVE-2019-5436, CVE-2019-5481, CVE-2019-5482, CVE-2020-8169, CVE-2020-8177, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2021-22876, CVE-2021-22890, CVE-2021-22897, CVE-2021-22898, CVE-2021-22901, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2022-22576, CVE-2022-27774, CVE-2022-27775, CVE-2022-27776, CVE-2022-27778, CVE-2022-27779, CVE-2022-27780, CVE-2022-27781, CVE-2022-27782, CVE-2022-30115, CVE-2022-32205, CVE-2022-32206, CVE-2022-32207, CVE-2022-32208, CVE-2022-32221, CVE-2022-35252, CVE-2022-35260, CVE-2022-42915, CVE-2022-42916, CVE-2022-43551, CVE-2022-43552, CVE-2023-23914, CVE-2023-23915, CVE-2023-23916, CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27537, CVE-2023-27538, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-38039, CVE-2023-38545, CVE-2023-38546, CVE-2023-46218, CVE-2023-46219, CVE-2024-0853, CVE-2024-11053, CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-6197, CVE-2024-6874, CVE-2024-7264, CVE-2024-8096, CVE-2024-9681, CVE-2025-0167, CVE-2025-0665, CVE-2025-0725, CVE-2025-10148, CVE-2025-4947, CVE-2025-5025, CVE-2025-5399, CVE-2025-9086 applied in versions: 0, 7.36.0-r0, 7.50.1-r0, 7.50.2-r0, 7.50.3-r0, 7.51.0-r0, 7.52.1-r0, 7.53.0-r0, 7.53.1-r2, 7.54.0-r0, 7.55.0-r0, 7.56.1-r0, 7.57.0-r0, 7.59.0-r0, 7.60.0-r0, 7.61.0-r0, 7.61.1-r0, 7.62.0-r0, 7.64.0-r0, 7.65.0-r0, 7.66.0-r0, 7.71.0-r0, 7.72.0-r0, 7.74.0-r0, 7.76.0-r0, 7.77.0-r0, 7.78.0-r0, 7.79.0-r0, 7.83.0-r0, 7.83.1-r0, 7.84.0-r0, 7.85.0-r0, 7.86.0-r0, 7.87.0-r0, 7.88.0-r0, 8.0.0-r0, 8.1.0-r0, 8.10.0-r0, 8.11.0-r0, 8.11.1-r0, 8.12.0-r0, 8.14.0-r0, 8.14.1-r0, 8.15.0-r0, 8.3.0-r0, 8.4.0-r0, 8.5.0-r0, 8.6.0-r0, 8.7.1-r0, 8.9.0-r0, 8.9.1-r0 | 2026-04-01T09:57:04.724781Z | 2026-03-13T12:43:33Z |
| cleanstart-2026-gq03231 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-24051, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.2.7-r1 | 2026-04-01T09:56:49.752050Z | 2026-03-13T12:42:57Z |
| cleanstart-2026-nj43712 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.1-r0, 3.3.1-r1 | 2026-04-01T09:56:40.531114Z | 2026-03-13T12:42:57Z |
| cleanstart-2026-gv56027 | Security fixes for ghsa-58pv-8j8x-9vj2, ghsa-jm66-cg57-jjv5, ghsa-mrfv-m5wm-5w6w applied in versions: 2.81.0-r0 | 2026-04-01T09:56:19.014864Z | 2026-03-13T07:11:43Z |
| cleanstart-2026-bw46578 | Security fixes for CVE-2014-0138, CVE-2014-0139, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9594, CVE-2017-1000099, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000257, CVE-2017-2629, CVE-2017-7407, CVE-2017-7468, CVE-2017-8816, CVE-2017-8817, CVE-2017-8818, CVE-2018-0500, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000300, CVE-2018-1000301, CVE-2018-14618, CVE-2018-16839, CVE-2018-16840, CVE-2018-16842, CVE-2018-16890, CVE-2019-3822, CVE-2019-3823, CVE-2019-5435, CVE-2019-5436, CVE-2019-5481, CVE-2019-5482, CVE-2020-8169, CVE-2020-8177, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2021-22876, CVE-2021-22890, CVE-2021-22897, CVE-2021-22898, CVE-2021-22901, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2022-22576, CVE-2022-27774, CVE-2022-27775, CVE-2022-27776, CVE-2022-27778, CVE-2022-27779, CVE-2022-27780, CVE-2022-27781, CVE-2022-27782, CVE-2022-30115, CVE-2022-32205, CVE-2022-32206, CVE-2022-32207, CVE-2022-32208, CVE-2022-32221, CVE-2022-35252, CVE-2022-35260, CVE-2022-42915, CVE-2022-42916, CVE-2022-43551, CVE-2022-43552, CVE-2023-23914, CVE-2023-23915, CVE-2023-23916, CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27537, CVE-2023-27538, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-38039, CVE-2023-38545, CVE-2023-38546, CVE-2023-46218, CVE-2023-46219, CVE-2024-0853, CVE-2024-11053, CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-6197, CVE-2024-6874, CVE-2024-7264, CVE-2024-8096, CVE-2024-9681, CVE-2025-0167, CVE-2025-0665, CVE-2025-0725, CVE-2025-10148, CVE-2025-4947, CVE-2025-5025, CVE-2025-5399, CVE-2025-9086, CVE-2026-24515, CVE-2026-25210 applied in versions: 0, 7.36.0-r0, 7.50.1-r0, 7.50.2-r0, 7.50.3-r0, 7.51.0-r0, 7.52.1-r0, 7.53.0-r0, 7.53.1-r2, 7.54.0-r0, 7.55.0-r0, 7.56.1-r0, 7.57.0-r0, 7.59.0-r0, 7.60.0-r0, 7.61.0-r0, 7.61.1-r0, 7.62.0-r0, 7.64.0-r0, 7.65.0-r0, 7.66.0-r0, 7.71.0-r0, 7.72.0-r0, 7.74.0-r0, 7.76.0-r0, 7.77.0-r0, 7.78.0-r0, 7.79.0-r0, 7.83.0-r0, 7.83.1-r0, 7.84.0-r0, 7.85.0-r0, 7.86.0-r0, 7.87.0-r0, 7.88.0-r0, 8.0.0-r0, 8.1.0-r0, 8.10.0-r0, 8.11.0-r0, 8.11.1-r0, 8.12.0-r0, 8.14.0-r0, 8.14.1-r0, 8.15.0-r0, 8.16.0-r0, 8.3.0-r0, 8.4.0-r0, 8.5.0-r0, 8.6.0-r0, 8.7.1-r0, 8.9.0-r0, 8.9.1-r0 | 2026-04-01T09:55:26.061155Z | 2026-03-16T17:22:25Z |
| cleanstart-2026-ay18527 | Security fixes for CVE-2014-0138, CVE-2014-0139, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9594, CVE-2017-1000099, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000257, CVE-2017-2629, CVE-2017-7407, CVE-2017-7468, CVE-2017-8816, CVE-2017-8817, CVE-2017-8818, CVE-2018-0500, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000300, CVE-2018-1000301, CVE-2018-14618, CVE-2018-16839, CVE-2018-16840, CVE-2018-16842, CVE-2018-16890, CVE-2019-3822, CVE-2019-3823, CVE-2019-5435, CVE-2019-5436, CVE-2019-5481, CVE-2019-5482, CVE-2020-8169, CVE-2020-8177, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2021-22876, CVE-2021-22890, CVE-2021-22897, CVE-2021-22898, CVE-2021-22901, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2022-22576, CVE-2022-27774, CVE-2022-27775, CVE-2022-27776, CVE-2022-27778, CVE-2022-27779, CVE-2022-27780, CVE-2022-27781, CVE-2022-27782, CVE-2022-30115, CVE-2022-32205, CVE-2022-32206, CVE-2022-32207, CVE-2022-32208, CVE-2022-32221, CVE-2022-35252, CVE-2022-35260, CVE-2022-42915, CVE-2022-42916, CVE-2022-43551, CVE-2022-43552, CVE-2023-23914, CVE-2023-23915, CVE-2023-23916, CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27537, CVE-2023-27538, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-38039, CVE-2023-38545, CVE-2023-38546, CVE-2023-46218, CVE-2023-46219, CVE-2024-0853, CVE-2024-11053, CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-6197, CVE-2024-6874, CVE-2024-7264, CVE-2024-8096, CVE-2024-9681, CVE-2025-0167, CVE-2025-0665, CVE-2025-0725, CVE-2025-10148, CVE-2025-4947, CVE-2025-5025, CVE-2025-5399, CVE-2025-9086, CVE-2026-24515, CVE-2026-25210 applied in versions: 0, 7.36.0-r0, 7.50.1-r0, 7.50.2-r0, 7.50.3-r0, 7.51.0-r0, 7.52.1-r0, 7.53.0-r0, 7.53.1-r2, 7.54.0-r0, 7.55.0-r0, 7.56.1-r0, 7.57.0-r0, 7.59.0-r0, 7.60.0-r0, 7.61.0-r0, 7.61.1-r0, 7.62.0-r0, 7.64.0-r0, 7.65.0-r0, 7.66.0-r0, 7.71.0-r0, 7.72.0-r0, 7.74.0-r0, 7.76.0-r0, 7.77.0-r0, 7.78.0-r0, 7.79.0-r0, 7.83.0-r0, 7.83.1-r0, 7.84.0-r0, 7.85.0-r0, 7.86.0-r0, 7.87.0-r0, 7.88.0-r0, 8.0.0-r0, 8.1.0-r0, 8.10.0-r0, 8.11.0-r0, 8.11.1-r0, 8.12.0-r0, 8.14.0-r0, 8.14.1-r0, 8.15.0-r0, 8.17.0-r0, 8.3.0-r0, 8.4.0-r0, 8.5.0-r0, 8.6.0-r0, 8.7.1-r0, 8.9.0-r0, 8.9.1-r0 | 2026-04-01T09:55:26.067667Z | 2026-03-16T17:21:19Z |
| cleanstart-2026-lq42192 | Security fixes for CVE-2014-0138, CVE-2014-0139, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9594, CVE-2017-1000099, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000257, CVE-2017-2629, CVE-2017-7407, CVE-2017-7468, CVE-2017-8816, CVE-2017-8817, CVE-2017-8818, CVE-2018-0500, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000300, CVE-2018-1000301, CVE-2018-14618, CVE-2018-16839, CVE-2018-16840, CVE-2018-16842, CVE-2018-16890, CVE-2019-3822, CVE-2019-3823, CVE-2019-5435, CVE-2019-5436, CVE-2019-5481, CVE-2019-5482, CVE-2020-8169, CVE-2020-8177, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2021-22876, CVE-2021-22890, CVE-2021-22897, CVE-2021-22898, CVE-2021-22901, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2022-22576, CVE-2022-27774, CVE-2022-27775, CVE-2022-27776, CVE-2022-27778, CVE-2022-27779, CVE-2022-27780, CVE-2022-27781, CVE-2022-27782, CVE-2022-30115, CVE-2022-32205, CVE-2022-32206, CVE-2022-32207, CVE-2022-32208, CVE-2022-32221, CVE-2022-35252, CVE-2022-35260, CVE-2022-42915, CVE-2022-42916, CVE-2022-43551, CVE-2022-43552, CVE-2023-23914, CVE-2023-23915, CVE-2023-23916, CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27537, CVE-2023-27538, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-38039, CVE-2023-38545, CVE-2023-38546, CVE-2023-46218, CVE-2023-46219, CVE-2024-0853, CVE-2024-11053, CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-6197, CVE-2024-6874, CVE-2024-7264, CVE-2024-8096, CVE-2024-9681, CVE-2025-0167, CVE-2025-0665, CVE-2025-0725, CVE-2025-10148, CVE-2025-4947, CVE-2025-5025, CVE-2025-5399, CVE-2025-9086, CVE-2026-24515, CVE-2026-25210 applied in versions: 0, 7.36.0-r0, 7.50.1-r0, 7.50.2-r0, 7.50.3-r0, 7.51.0-r0, 7.52.1-r0, 7.53.0-r0, 7.53.1-r2, 7.54.0-r0, 7.55.0-r0, 7.56.1-r0, 7.57.0-r0, 7.59.0-r0, 7.60.0-r0, 7.61.0-r0, 7.61.1-r0, 7.62.0-r0, 7.64.0-r0, 7.65.0-r0, 7.66.0-r0, 7.71.0-r0, 7.72.0-r0, 7.74.0-r0, 7.76.0-r0, 7.77.0-r0, 7.78.0-r0, 7.79.0-r0, 7.83.0-r0, 7.83.1-r0, 7.84.0-r0, 7.85.0-r0, 7.86.0-r0, 7.87.0-r0, 7.88.0-r0, 8.0.0-r0, 8.1.0-r0, 8.10.0-r0, 8.11.0-r0, 8.11.1-r0, 8.12.0-r0, 8.14.0-r0, 8.14.1-r0, 8.15.0-r0, 8.18.0-r0, 8.3.0-r0, 8.4.0-r0, 8.5.0-r0, 8.6.0-r0, 8.7.1-r0, 8.9.0-r0, 8.9.1-r0 | 2026-04-01T09:55:24.898216Z | 2026-03-16T17:19:31Z |
| cleanstart-2026-qk02462 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.2.7-r1 | 2026-04-01T09:54:36.812395Z | 2026-03-13T12:42:57Z |
| cleanstart-2026-ox06978 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.1-r1 | 2026-04-01T09:53:21.567659Z | 2026-03-13T12:42:57Z |
| cleanstart-2026-qa91937 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-r6j8-c6r2-37rr applied in versions: 0.18.3-r1, 0.18.3-r2 | 2026-04-01T09:52:00.878696Z | 2026-03-13T12:44:37Z |
| cleanstart-2026-nv84668 | Security fixes for ghsa-84h7-rjj3-6jx4, ghsa-vc5p-v9hr-52mj applied in versions: 4.1.1-r1 | 2026-04-01T09:51:29.848674Z | 2026-03-13T13:15:35Z |
| cleanstart-2026-na08955 | Security fixes for ghsa-84h7-rjj3-6jx4, ghsa-vc5p-v9hr-52mj applied in versions: 4.1.1-r1 | 2026-04-01T09:51:24.306982Z | 2026-03-13T13:15:35Z |
| cleanstart-2026-fb05615 | Security fixes for CVE-2025-15558, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2026-27141, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x, ghsa-p436-gjf2-799p applied in versions: 2.13.4-r0, 2.13.4-r1, 2.13.4-r2 | 2026-04-01T09:50:57.277339Z | 2026-03-15T13:46:33Z |
| cleanstart-2026-mk39503 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-1229, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 3.19.0-r0, 4.0.1-r0, 4.1.0-r0, 4.1.0-r1 | 2026-04-01T09:50:25.337048Z | 2026-03-16T05:34:59Z |
| cleanstart-2026-aq75465 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-1229, CVE-2026-27141 applied in versions: 3.19.0-r0, 4.0.0-r0, 4.0.1-r0, 4.1.1-r1 | 2026-04-01T09:50:20.419820Z | 2026-03-16T05:35:26Z |
| cleanstart-2026-jk47870 | Security fixes for CVE-2025-66614, CVE-2026-1225, CVE-2026-24281, CVE-2026-24308, CVE-2026-24733, ghsa-6rw7-vpxm-498p, ghsa-73rr-hh4g-fpgx, ghsa-8qq5-rm4j-mr97, ghsa-wqch-xfxh-vrr4 applied in versions: 4.2.1.1-r1, 4.3.1-r0 | 2026-04-01T09:49:35.155892Z | 2026-03-16T09:42:46Z |
| cleanstart-2026-fj01373 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68119, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-9h8m-3fm2-qjrq, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.34.0-r0, 0.34.0-r1, 0.34.0-r2 | 2026-04-01T09:49:20.210015Z | 2026-03-16T11:05:40Z |
| cleanstart-2026-ol32822 | Security fixes for CVE-2024-36537, CVE-2025-47910, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2026-25518, ghsa-gx3x-vq4p-mhhv applied in versions: 2.4.0-r1, 2.4.0-r2 | 2026-04-01T09:48:17.130268Z | 2026-03-16T16:39:54Z |
| cleanstart-2026-kw35511 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 5.0.18-r6, 5.0.18-r7 | 2026-04-01T09:48:16.623063Z | 2026-03-16T16:36:08Z |
| cleanstart-2026-do09088 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-67721, CVE-2025-68119, CVE-2025-68121, CVE-2026-1225, CVE-2026-1605, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-72hv-8253-57qq applied in versions: 479-r0 | 2026-04-01T09:47:03.615107Z | 2026-03-17T07:41:03Z |
| cleanstart-2026-fz57809 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.15.1-r0 | 2026-04-01T09:46:36.079269Z | 2026-03-17T05:43:20Z |
| cleanstart-2026-kr58137 | Security fixes for CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, ghsa-6v2p-p543-phr9 applied in versions: 0.8.19-r0, 0.8.19-r1, 0.8.19-r2 | 2026-04-01T09:46:06.671153Z | 2026-03-17T13:57:04Z |
| cleanstart-2026-ie15850 | Security fixes for CVE-2023-32762, CVE-2023-32763 applied in versions: 6.5.0-r5 | 2026-04-01T09:45:56.402696Z | 2026-03-17T13:11:05Z |
| cleanstart-2026-fx51482 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.5.1-r0, 1.5.1-r1 | 2026-04-01T09:45:37.795716Z | 2026-03-18T07:43:14Z |
| cleanstart-2026-lm72903 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 4.5.1-r0 | 2026-04-01T09:45:35.196573Z | 2026-03-18T05:58:10Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2020-ale-002 | Vulnérabilité dans les produits Citrix ADC et Citrix Gateway | 2020-01-09T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-001 | Multiples vulnérabilités dans les produits de Pulse Secure | 2020-01-09T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| CERTFR-2020-ALE-003 | Vulnérabilité dans les produits Mozilla | 2020-01-09T00:00:00.000000 | 2020-01-20T00:00:00.000000 |
| CERTFR-2020-ALE-002 | Vulnérabilité dans les produits Citrix ADC et Citrix Gateway | 2020-01-09T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-001 | Multiples vulnérabilités dans les produits de Pulse Secure | 2020-01-09T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2019-ale-015 | Multiples vulnérabilités dans Google Chrome | 2019-11-04T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| CERTFR-2019-ALE-015 | Multiples vulnérabilités dans Google Chrome | 2019-11-04T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2019-ale-014 | Vulnérabilité dans PHP | 2019-10-29T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| CERTFR-2019-ALE-014 | Vulnérabilité dans PHP | 2019-10-29T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2019-ale-013 | Vulnérabilité dans Microsoft Internet Explorer | 2019-09-24T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| CERTFR-2019-ALE-013 | Vulnérabilité dans Microsoft Internet Explorer | 2019-09-24T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-012 | Multiples vulnérabilités dans Microsoft Remote Desktop Services | 2019-08-14T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| CERTFR-2019-ALE-012 | Multiples vulnérabilités dans Microsoft Remote Desktop Services | 2019-08-14T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-011 | Vulnérabilité dans Oracle WebLogic | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-010 | Vulnérabilité dans Mozilla Firefox | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| CERTFR-2019-ALE-011 | Vulnérabilité dans Oracle WebLogic | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| CERTFR-2019-ALE-010 | Vulnérabilité dans Mozilla Firefox | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-009 | Vulnérabilité dans Exim | 2019-06-11T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| CERTFR-2019-ALE-009 | Vulnérabilité dans Exim | 2019-06-11T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-008 | Vulnérabilité dans Microsoft SharePoint Server | 2019-05-29T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| CERTFR-2019-ALE-008 | Vulnérabilité dans Microsoft SharePoint Server | 2019-05-29T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-006 | Vulnérabilité dans Microsoft Remote Desktop Services | 2019-05-22T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| CERTFR-2019-ALE-006 | Vulnérabilité dans Microsoft Remote Desktop Services | 2019-05-22T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-007 | Vulnérabilité dans le serveur DHCP de Windows | 2019-05-15T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| CERTFR-2019-ALE-007 | Vulnérabilité dans le serveur DHCP de Windows | 2019-05-15T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| certfr-2019-ale-005 | Vulnérabilité dans Oracle WebLogic | 2019-04-26T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| CERTFR-2019-ALE-005 | Vulnérabilité dans Oracle WebLogic | 2019-04-26T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| certfr-2019-ale-004 | Multiples vulnérabilités dans Microsoft Edge et Internet Explorer | 2019-04-01T00:00:00.000000 | 2019-04-17T00:00:00.000000 |
| CERTFR-2019-ALE-004 | Multiples vulnérabilités dans Microsoft Edge et Internet Explorer | 2019-04-01T00:00:00.000000 | 2019-04-17T00:00:00.000000 |
| certfr-2019-ale-003 | Campagnes de rançongiciels | 2019-01-31T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0342 | Multiples vulnérabilités dans Google Chrome | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0341 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0340 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0339 | Multiples vulnérabilités dans les produits VMware | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0338 | Vulnérabilité dans les produits Synology | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0337 | Multiples vulnérabilités dans les produits Citrix | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0336 | Multiples vulnérabilités dans les produits Qnap | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0335 | Vulnérabilité dans CPython | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0334 | Vulnérabilité dans les produits Microsoft | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0333 | Multiples vulnérabilités dans Traefik | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0332 | Vulnérabilité dans Oracle Identity Manager et Web Services Manager | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0331 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0330 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0329 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0328 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0327 | Multiples vulnérabilités dans les produits IBM | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0326 | Multiples vulnérabilités dans les produits VMware | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0325 | Multiples vulnérabilités dans les produits Elastic | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0324 | Multiples vulnérabilités dans Google Chrome | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0323 | Multiples vulnérabilités dans les produits Spring | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0322 | Multiples vulnérabilités dans les produits VMware | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0321 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0320 | Multiples vulnérabilités dans Roundcube | 2026-03-19T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| certfr-2026-avi-0319 | Vulnérabilité dans les produits Mitel | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0318 | Multiples vulnérabilités dans Splunk Universal Forwarder | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0317 | Vulnérabilité dans Python | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0316 | Multiples vulnérabilités dans les produits VMware | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0315 | Multiples vulnérabilités dans les produits VMware | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0314 | Multiples vulnérabilités dans les produits Atlassian | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0313 | Vulnérabilité dans les produits Apple | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-007607 | Pass-Back Attack vulnerability in Konica Minorta bizhub series | 2025-07-01T14:09+09:00 | 2025-07-01T14:09+09:00 |
| jvndb-2025-007595 | Multiple vulnerabilities in Web Connection of Konica Minolta MFPs | 2025-07-01T14:02+09:00 | 2025-07-01T14:02+09:00 |
| jvndb-2025-000046 | SLNX Help Documentation of RICOH Streamline NX vulnerable to reflected cross-site scripting | 2025-06-30T15:45+09:00 | 2025-06-30T15:45+09:00 |
| jvndb-2025-007552 | Multiple vulnerabilities in TB-eye network recorders and AHD recorders | 2025-06-30T14:45+09:00 | 2025-06-30T14:45+09:00 |
| jvndb-2025-007521 | Multiple Brother driver installers for Windows vulnerable to privilege escalation | 2025-06-27T09:37+09:00 | 2025-08-19T11:29+09:00 |
| jvndb-2025-007519 | Multiple vulnerabilities in multiple BROTHER products | 2025-06-26T18:15+09:00 | 2025-09-22T10:16+09:00 |
| jvndb-2025-000043 | Multiple vulnerabilities in iroha Board | 2025-06-26T15:13+09:00 | 2025-06-26T15:13+09:00 |
| jvndb-2025-000044 | Denial-of-service (DoS) vulnerabilities in multiple Apache products | 2025-06-26T14:41+09:00 | 2025-10-01T14:18+09:00 |
| jvndb-2025-000042 | Inefficient regular expressions in GROWI | 2025-06-24T15:25+09:00 | 2025-06-24T15:25+09:00 |
| jvndb-2025-000041 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2025-06-24T14:50+09:00 | 2026-02-03T15:35+09:00 |
| jvndb-2025-007390 | Trend Micro Internet Security and Trend Micro Maximum Security vulnerable to link following local privilege escalation (CVE-2025-49384, CVE-2025-49385) | 2025-06-24T11:18+09:00 | 2025-06-24T11:18+09:00 |
| jvndb-2025-000040 | KCM3100 vulnerable to authentication bypass using an alternate path or channel | 2025-06-18T13:42+09:00 | 2025-06-18T13:42+09:00 |
| jvndb-2025-000039 | Multiple vulnerabilities in RICOH Streamline NX PC Client | 2025-06-13T16:09+09:00 | 2025-06-13T16:09+09:00 |
| jvndb-2025-000038 | UpdateNavi vulnerable to improper restriction of communication channel to intended endpoints | 2025-06-12T15:56+09:00 | 2025-06-12T15:56+09:00 |
| jvndb-2025-000037 | Multiple surveillance cameras provided by i-PRO Co., Ltd. vulnerable to cross-site request forgery | 2025-06-06T13:56+09:00 | 2025-06-06T13:56+09:00 |
| jvndb-2025-000036 | TimeWorks vulnerable to path traversal | 2025-06-03T15:35+09:00 | 2025-06-03T15:35+09:00 |
| jvndb-2025-000035 | Improper file access permission settings in PC Time Tracer | 2025-06-03T14:40+09:00 | 2025-06-03T14:40+09:00 |
| jvndb-2025-000034 | Multiple vulnerabilities in wivia 5 | 2025-05-30T15:57+09:00 | 2025-05-30T15:57+09:00 |
| jvndb-2025-000032 | Mailform Pro CGI generating error messages containing sensitive information | 2025-05-26T14:22+09:00 | 2025-05-26T14:22+09:00 |
| jvndb-2025-000033 | Improper pattern file validation in i-FILTER optional feature 'Anti-Virus & Sandbox' | 2025-05-23T15:36+09:00 | 2025-05-23T15:36+09:00 |
| jvndb-2025-005467 | Passback vulnerabilities in Canon Production Printers, Office/Small Office Multifunction Printers, and Laser Printers | 2025-05-22T15:03+09:00 | 2025-05-22T15:03+09:00 |
| jvndb-2025-005107 | Multiple vulnerabilities in V-SFT | 2025-05-16T14:32+09:00 | 2025-05-16T14:32+09:00 |
| jvndb-2025-005057 | Multiple vulnerabilities in I-O DATA network attached hard disk 'HDL-T Series' | 2025-05-15T18:27+09:00 | 2025-05-15T18:27+09:00 |
| jvndb-2025-005050 | Multiple vulnerabilities in a-blog cms | 2025-05-15T18:11+09:00 | 2025-05-15T18:11+09:00 |
| jvndb-2025-000031 | Pgpool-II vulnerable to authentication bypass by primary weakness | 2025-05-15T16:14+09:00 | 2025-05-15T16:14+09:00 |
| jvndb-2025-004863 | Panasonic IR Control Hub vulnerable to Unauthorised firmware loading | 2025-05-14T11:30+09:00 | 2025-05-14T11:30+09:00 |
| jvndb-2025-000030 | Reflected cross-site scripting vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor | 2025-05-12T18:00+09:00 | 2025-07-17T10:06+09:00 |
| jvndb-2025-004671 | Multiple vulnerabilities in GL-MT2500 and GL-MT2500A | 2025-05-12T17:52+09:00 | 2025-05-12T17:52+09:00 |
| jvndb-2025-004079 | Improper access permission settings in multiple SEIKO EPSON printer drivers for Windows OS | 2025-04-30T11:46+09:00 | 2025-04-30T11:46+09:00 |
| jvndb-2025-004076 | Security Update for Trend Micro Trend Vision One (April 2025) | 2025-04-30T10:38+09:00 | 2025-04-30T10:38+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-16866 | Google Chrome GPU堆缓冲区溢出漏洞 | 2026-04-10 | 2026-04-10 |
| cnvd-2026-16865 | Google Chrome Dawn组件内存错误引用漏洞 | 2026-04-10 | 2026-04-10 |
| cnvd-2026-16864 | Google Chrome Compositing组件内存错误引用漏洞 | 2026-04-10 | 2026-04-10 |
| cnvd-2026-16863 | Google Chrome ANGLE组件整数溢出漏洞 | 2026-04-10 | 2026-04-10 |
| cnvd-2026-16862 | Google Chrome ANGLE堆缓冲区溢出漏洞(CNVD-2026-16862) | 2026-04-10 | 2026-04-10 |
| cnvd-2026-16831 | NanoMQ缓冲区溢出漏洞(CNVD-2026-16831) | 2026-04-10 | 2026-04-10 |
| cnvd-2026-18333 | Delta Electronics ASDA-Soft栈缓冲区溢出漏洞 | 2026-04-09 | 2026-04-23 |
| cnvd-2026-16892 | Fleet拒绝服务漏洞(CNVD-2026-16892) | 2026-04-09 | 2026-04-09 |
| cnvd-2026-16891 | Fleet操作系统命令注入漏洞 | 2026-04-09 | 2026-04-09 |
| cnvd-2026-16890 | Tenda AC7 SetSysTimeCfg文件缓冲区溢出漏洞 | 2026-04-09 | 2026-04-09 |
| cnvd-2026-16889 | Tenda AC6 goform/QuickIndex文件缓冲区溢出漏洞 | 2026-04-09 | 2026-04-09 |
| cnvd-2026-16832 | Xenforo授权问题漏洞(CNVD-2026-16832) | 2026-04-09 | 2026-04-10 |
| cnvd-2026-16826 | Adobe Substance3D Stager资源管理错误漏洞(CNVD-2026-16826) | 2026-04-09 | 2026-04-10 |
| cnvd-2026-16814 | Fleet访问控制错误漏洞(CNVD-2026-16814) | 2026-04-09 | 2026-04-09 |
| cnvd-2026-16690 | OpenClaw输入验证错误漏洞(CNVD-2026-16690) | 2026-04-09 | 2026-04-10 |
| cnvd-2026-16689 | OpenClaw数据伪造问题漏洞(CNVD-2026-16689) | 2026-04-09 | 2026-04-10 |
| cnvd-2026-16686 | OpenClaw存在未明漏洞(CNVD-2026-16686) | 2026-04-09 | 2026-04-10 |
| cnvd-2026-16685 | OpenClaw授权绕过漏洞(CNVD-2026-16685) | 2026-04-09 | 2026-04-10 |
| cnvd-2026-16678 | TOTOLINK A3600R setNoticeCfg函数命令注入漏洞 | 2026-04-09 | 2026-04-09 |
| cnvd-2026-16677 | OpenUI跨站脚本漏洞 | 2026-04-09 | 2026-04-10 |
| cnvd-2026-17369 | Apache ActiveMQ Broker Jolokia MBeans远程代码执行漏洞 | 2026-04-08 | 2026-04-10 |
| cnvd-2026-16994 | 多款Mozilla产品内存破坏漏洞(CNVD-2026-16994) | 2026-04-08 | 2026-04-13 |
| cnvd-2026-16993 | 多款Mozilla产品整数溢出漏洞(CNVD-2026-16993) | 2026-04-08 | 2026-04-13 |
| cnvd-2026-16992 | Mozilla Firefox和Mozilla Thunderbird缓冲区溢出漏洞(CNVD-2026-16992) | 2026-04-08 | 2026-04-13 |
| cnvd-2026-16894 | OpenClaw输入验证错误漏洞 | 2026-04-08 | 2026-04-09 |
| cnvd-2026-16893 | OpenClaw资源管理错误漏洞(CNVD-2026-16893) | 2026-04-08 | 2026-04-09 |
| cnvd-2026-16699 | OpenClaw存在未明漏洞(CNVD-2026-16699) | 2026-04-08 | 2026-04-10 |
| cnvd-2026-16698 | OpenClaw存在未明漏洞(CNVD-2026-16698) | 2026-04-08 | 2026-04-10 |
| cnvd-2026-16697 | OpenClaw存在未明漏洞(CNVD-2026-16697) | 2026-04-08 | 2026-04-10 |
| cnvd-2026-16696 | OpenClaw存在未明漏洞(CNVD-2026-16696) | 2026-04-08 | 2026-04-10 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01498 | Уязвимость функции si_parse_power_table() ядра операционной системы Linux, позволяющая на… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01497 | Уязвимость плагина Rule Based Authorization Plugin поискового сервера Apache Solr, позвол… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01496 | Уязвимость функции radeon_atombios_fini() модуля drivers/gpu/drm/radeon/radeon_device.c д… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01495 | Уязвимость функции fromSetWifiGusetBasic() микропрограммного обеспечения маршрутизаторов … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01494 | Уязвимость функции type_show() ядра операционной системы Linux, позволяющая нарушителю ок… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01493 | Уязвимость функции sanity_check_curseg() ядра операционной системы Linux, позволяющая нар… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01492 | Уязвимость веб-интерфейса сервера для управления программами Fortinet FortiClient Enterpr… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01491 | Уязвимость функции fc_exch_abts_resp() ядра операционной системы Linux, позволяющая наруш… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01490 | Уязвимость функции ipc_msg_send_request() ядра операционной системы Linux, позволяющая на… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01489 | Уязвимость функции OnAssocReq() ядра операционной системы Linux, позволяющая нарушителю о… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01488 | Уязвимость функции ext4_truncate() модуля fs/ext4/inode.c файловой системы Ext4 ядра опер… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01487 | Уязвимость функции swap_inode_boot_loader() модуля fs/ext4/ioctl.c файловой системы Ext4 … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01486 | Уязвимость функции pci_device_is_present() модуля drivers/pci/pci.c драйвера устройств PC… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01485 | Уязвимость функции ath11k_dp_rx_mon_deliver() модуля drivers/net/wireless/ath/ath11k/dp_r… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01484 | Уязвимость функций raid0_run() (drivers/md/raid0.c) и raid10_run() (drivers/md/raid10.c) … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01483 | Уязвимость функции _regulator_do_enable() модуля drivers/regulator/core.c драйвера регуля… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01468 | Уязвимость библиотеки преобразования путей path-to-regexp, связанная с неэффективной вычи… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01467 | Уязвимость сервера для разработки Metro Development Server, связанная с непринятием мер п… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01466 | Уязвимость компонента Duo Workflow Service сервиса для взаимодействия с внешними LLM-пров… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01465 | Уязвимость функции lookup_ioctl() модуля drivers/md/dm-ioctl.c драйвера поддержки несколь… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01464 | Уязвимость функции __mcheck_cpu_apply_quirks() модуля arch/x86/kernel/cpu/mce/core.c подд… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01463 | Уязвимость функции nwl_dsi_bridge_mode_set() модуля drivers/gpu/drm/bridge/nwl-dsi.c драй… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01462 | Уязвимость функции status_resync() модуля drivers/md/md.c драйвера нескольких устройств (… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01461 | Уязвимость функции vb2ops_vdec_queue_setup() модуля drivers/media/platform/mediatek/vcode… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01460 | Уязвимость функции nilfs_evict_inode() модуля fs/nilfs2/inode.c файловой системы NILFS2 я… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01459 | Уязвимость функции mpi_cmp_ui() модуля lib/crypto/mpi/mpi-cmp.c ядра операционной системы… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01458 | Уязвимость функции f2fs_abort_atomic_write() модуля fs/f2fs/segment.c файловой системы F2… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01457 | Уязвимость функции nilfs_bmap_lookup_at_level() модуля fs/nilfs2/bmap.c файловой системы … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01456 | Уязвимость функции __hfs_bnode_create() модуля fs/hfs/bnode.c файловой системы ядра опера… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01455 | Уязвимость функции nilfs_prepare_segment_for_recovery() модуля fs/nilfs2/recovery.c подде… | 09.02.2026 | 09.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202210-1888 | When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_R… | 2024-07-23T21:58:55.307000Z |
| var-202004-0061 | The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7… | 2024-07-23T21:58:31.314000Z |
| var-201804-1185 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T21:58:31.021000Z |
| var-201012-0287 | Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome b… | 2024-07-23T21:58:30.837000Z |
| var-202112-0566 | Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2… | 2024-07-23T21:58:00.289000Z |
| var-201903-0926 | An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9… | 2024-07-23T21:57:59.201000Z |
| var-200110-0192 | OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key… | 2024-07-23T21:57:58.746000Z |
| var-202012-1529 | A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion se… | 2024-07-23T21:57:50.923000Z |
| var-201711-0007 | A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1… | 2024-07-23T21:57:50.988000Z |
| var-201904-1414 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:57:11.524000Z |
| var-202206-1157 | Incomplete cleanup in specific special register write operations for some Intel(R) Proces… | 2024-07-23T21:57:10.821000Z |
| var-200810-0140 | Unspecified vulnerability in Finder in Mac OS X 10.5.5 allows user-assisted attackers to … | 2024-07-23T21:57:09.157000Z |
| var-201108-0184 | Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and … | 2024-07-23T21:56:59.027000Z |
| var-200809-0176 | sys/netinet6/icmp6.c in the kernel in FreeBSD 6.3 through 7.1, NetBSD 3.0 through 4.0, an… | 2024-07-23T21:56:59.282000Z |
| var-202210-1203 | Git is an open source, scalable, distributed revision control system. `git shell` is a re… | 2024-07-23T21:56:58.153000Z |
| var-201304-0178 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:56:58.917000Z |
| var-200703-0011 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted at… | 2024-07-23T21:56:58.629000Z |
| var-201904-0746 | A race condition was addressed with additional validation. This issue affected versions p… | 2024-07-23T21:56:56.832000Z |
| var-201406-0230 | The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel… | 2024-07-23T21:56:56.921000Z |
| var-201110-0443 | The ospf_flood function in ospf_flood.c in ospfd in Quagga before 0.99.19 allows remote a… | 2024-07-23T21:56:49.016000Z |
| var-201912-1864 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:56:48.951000Z |
| var-201806-1445 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2024-07-23T21:56:47.636000Z |
| var-201708-1547 | The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers… | 2024-07-23T21:56:47.739000Z |
| var-201712-0280 | An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari be… | 2024-07-23T21:56:39.563000Z |
| var-200609-1276 | The Security Framework in Apple Mac OS X 10.4 through 10.4.8 allows remote attackers to c… | 2024-07-23T21:56:38.677000Z |
| var-202203-0131 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:56:37.654000Z |
| var-201412-0613 | Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers … | 2024-07-23T21:56:37.541000Z |
| var-200703-0012 | Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to… | 2024-07-23T21:56:37.438000Z |
| var-200906-0617 | The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly ini… | 2024-07-23T21:56:36.646000Z |
| var-200701-0517 | Untrusted search path vulnerability in writeconfig in Apple Mac OS X 10.4.8 allows local … | 2024-07-23T21:56:15.579000Z |