Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-31814 |
8.7 (4.0)
|
Yamux remote Panic via malformed WindowUpdate credit |
libp2p |
rust-yamux |
2026-03-13T19:19:41.879Z | 2026-03-13T19:38:02.290Z |
| CVE-2026-31798 |
5 (3.1)
|
JumpServer Improper Certificate Validation in Custom S… |
jumpserver |
jumpserver |
2026-03-13T19:15:26.081Z | 2026-03-13T19:38:35.576Z |
| CVE-2025-14483 |
4.3 (3.1)
|
IBM Sterling B2B Integrator and IBM Sterling File Gate… |
IBM |
Sterling B2B Integrator |
2026-03-13T19:15:11.844Z | 2026-03-13T19:37:32.919Z |
| CVE-2026-30961 |
4.3 (3.1)
|
Gokapi's File Request MaxSize Limit Bypassed via Multi… |
Forceu |
Gokapi |
2026-03-13T19:09:38.427Z | 2026-03-13T19:39:14.146Z |
| CVE-2025-14504 |
5.4 (3.1)
|
IBM Sterling B2B Integrator and IBM Sterling File Gate… |
IBM |
Sterling B2B Integrator |
2026-03-13T19:08:37.702Z | 2026-03-13T19:37:07.983Z |
| CVE-2026-30955 |
6.5 (3.1)
|
Gokapi vulnerable to DoS in E2E Metadata Parser |
Forceu |
Gokapi |
2026-03-13T19:07:55.836Z | 2026-03-13T19:39:58.108Z |
| CVE-2026-30943 |
4.1 (3.1)
|
Gokapi has Privilege Escalation in File Replace |
Forceu |
Gokapi |
2026-03-13T19:07:01.576Z | 2026-03-13T19:40:38.395Z |
| CVE-2026-30915 |
5.3 (4.0)
|
SFTPGo improperly sanitizes placeholders in group home… |
drakkan |
sftpgo |
2026-03-13T19:04:36.856Z | 2026-03-13T19:41:17.258Z |
| CVE-2026-30914 |
5.3 (4.0)
|
SFTPGo has a Path Traversal and Permission Bypass via … |
drakkan |
sftpgo |
2026-03-13T19:02:28.270Z | 2026-03-13T19:41:55.916Z |
| CVE-2026-30853 |
5 (3.1)
|
calibre has a Path Traversal Leading to Arbitrary File Write |
kovidgoyal |
calibre |
2026-03-13T19:00:09.925Z | 2026-03-13T19:42:26.573Z |
| CVE-2026-0835 |
5.4 (3.1)
|
IBM Sterling B2B Integrator and IBM Sterling File… |
IBM |
Sterling B2B Integrator |
2026-03-13T18:57:35.435Z | 2026-03-13T19:36:39.022Z |
| CVE-2025-71263 |
7.4 (3.1)
|
In UNIX Fourth Research Edition (v4), the su comm… |
AT&T Bell Labs |
UNIX |
2026-03-13T18:38:07.721Z | 2026-03-13T19:36:17.585Z |
| CVE-2025-13702 |
6.1 (3.1)
|
IBM Sterling Partner Engagement Manager Cross-Site Scripting |
IBM |
Sterling Partner Engagement Manager |
2026-03-13T18:33:12.740Z | 2026-03-13T19:35:38.848Z |
| CVE-2025-13718 |
3.7 (3.1)
|
IBM Sterling Partner Engagement Manager Information Di… |
IBM |
Sterling Partner Engagement Manager |
2026-03-13T18:33:07.785Z | 2026-03-13T19:35:14.971Z |
| CVE-2025-13723 |
5.3 (3.1)
|
IBM Sterling Partner Engagement Manager Information Di… |
IBM |
Sterling Partner Engagement Manager |
2026-03-13T18:32:45.559Z | 2026-03-13T19:34:50.670Z |
| CVE-2025-12453 |
5.1 (4.0)
|
Improper neutralization of input during web page gener… |
OpenText™ |
Vertica |
2026-03-13T18:30:53.495Z | 2026-03-13T19:34:21.690Z |
| CVE-2025-12454 |
5.1 (4.0)
|
Improper neutralization of input during web page gener… |
OpenText™ |
Vertica |
2026-03-13T18:30:40.822Z | 2026-03-13T19:33:59.150Z |
| CVE-2025-12455 |
5.1 (4.0)
|
Username Enumeration Observable Response Discrepancy v… |
OpenText™ |
Vertica |
2026-03-13T18:30:27.903Z | 2026-03-13T19:33:40.096Z |
| CVE-2025-13726 |
5.3 (3.1)
|
IBM Sterling Partner Engagement Manager Information Di… |
IBM |
Sterling Partner Engagement Manager |
2026-03-13T18:26:34.401Z | 2026-03-13T19:33:11.395Z |
| CVE-2025-14811 |
3.1 (3.1)
|
IBM Sterling Partner Engagement Manager Information Di… |
IBM |
Sterling Partner Engagement Manager |
2026-03-13T18:22:00.496Z | 2026-03-13T18:44:03.621Z |
| CVE-2026-31897 |
0 (3.1)
|
FreeRDP has an out-of-bounds read in `freerdp_bitmap_d… |
FreeRDP |
FreeRDP |
2026-03-13T17:42:11.932Z | 2026-03-13T18:10:06.909Z |
| CVE-2026-31806 |
9.3 (4.0)
|
FreeRDP has a Heap Buffer Overflow in nsc_process_mess… |
FreeRDP |
FreeRDP |
2026-03-13T17:40:19.920Z | 2026-03-15T01:51:18.600Z |
| CVE-2026-31885 |
6.5 (3.1)
|
FreeRDP has an out-of-bounds read in ADPCM decoders du… |
FreeRDP |
FreeRDP |
2026-03-13T17:38:23.756Z | 2026-03-13T17:38:23.756Z |
| CVE-2026-31884 |
6.5 (3.1)
|
FreeRDP has a division-by-zero in ADPCM decoders when … |
FreeRDP |
FreeRDP |
2026-03-13T17:36:57.722Z | 2026-03-13T17:36:57.722Z |
| CVE-2026-31883 |
6.5 (3.1)
|
FreeRDP has a `size_t` underflow in ADPCM decoder lead… |
FreeRDP |
FreeRDP |
2026-03-13T17:35:17.411Z | 2026-03-13T17:35:17.411Z |
| CVE-2026-29776 |
3.1 (3.1)
|
FreeRDP has an Integer Underflow in update_read_cache_… |
FreeRDP |
FreeRDP |
2026-03-13T17:33:10.360Z | 2026-03-13T17:33:10.360Z |
| CVE-2026-29775 |
5.3 (3.1)
|
FreeRDP has a heap-buffer-overflow in bitmap_cache_put… |
FreeRDP |
FreeRDP |
2026-03-13T17:28:39.641Z | 2026-03-13T17:28:39.641Z |
| CVE-2026-29774 |
5.3 (3.1)
|
FreeRDP has a heap-buffer-overflow in avc420_yuv_to_rg… |
FreeRDP |
FreeRDP |
2026-03-13T17:26:58.208Z | 2026-03-13T17:26:58.208Z |
| CVE-2026-29079 |
8.2 (4.0)
|
Type Confusion in Lexbor Fragment Parser |
lexbor |
lexbor |
2026-03-13T17:19:46.025Z | 2026-03-13T17:19:46.025Z |
| CVE-2026-29078 |
8.2 (4.0)
|
Integer Underflow in Lexbor ISO‑2022‑JP Encoder |
lexbor |
lexbor |
2026-03-13T17:18:47.646Z | 2026-03-13T17:18:47.646Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-22203 |
6.9 (4.0)
4.9 (3.1)
|
wpDiscuz before 7.6.47 - Options Export Leaks OAuth Se… |
gVectors |
wpDiscuz |
2026-03-13T01:18:09.696Z | 2026-03-13T16:07:55.322Z |
| CVE-2026-22202 |
6.1 (4.0)
8.1 (3.1)
|
wpDiscuz before 7.6.47 - Destructive GET Action Delete… |
gVectors |
wpDiscuz |
2026-03-13T01:18:08.762Z | 2026-03-13T16:08:59.351Z |
| CVE-2026-22201 |
6.9 (4.0)
5.3 (3.1)
|
wpDiscuz before 7.6.47 - IP Address Spoofing in getIP() |
gVectors |
wpDiscuz |
2026-03-13T01:18:07.476Z | 2026-03-13T16:09:19.907Z |
| CVE-2026-22199 |
6.9 (4.0)
5.3 (3.1)
|
wpDiscuz before 7.6.47 - Vote Manipulation via Nonce O… |
gVectors |
wpDiscuz |
2026-03-13T01:18:06.507Z | 2026-03-13T16:09:40.962Z |
| CVE-2026-22193 |
9.2 (4.0)
8.1 (3.1)
|
wpDiscuz before 7.6.47 - SQL Injection in getAllSubscr… |
gVectors |
wpDiscuz |
2026-03-13T01:18:05.494Z | 2026-03-13T16:10:03.471Z |
| CVE-2026-22192 |
6.3 (4.0)
6.1 (3.1)
|
wpDiscuz before 7.6.47 - Stored Cross-Site Scripting v… |
gVectors |
wpDiscuz |
2026-03-13T01:18:03.921Z | 2026-03-13T15:04:21.947Z |
| CVE-2026-22191 |
6.9 (4.0)
6.5 (3.1)
|
wpDiscuz before 7.6.47 - Server-Side Shortcode Injecti… |
gVectors |
wpDiscuz |
2026-03-13T01:18:01.962Z | 2026-03-13T14:16:46.945Z |
| CVE-2026-22183 |
5.3 (4.0)
6.1 (3.1)
|
wpDiscuz before 7.6.47 - Stored Cross-Site Scripting i… |
gVectors |
wpDiscuz |
2026-03-13T01:18:00.616Z | 2026-03-13T14:17:15.681Z |
| CVE-2026-22182 |
8.7 (4.0)
7.5 (3.1)
|
wpDiscuz before 7.6.47 - Unauthenticated Email Notific… |
gVectors |
wpDiscuz |
2026-03-13T01:17:59.272Z | 2026-03-13T14:47:20.700Z |
| CVE-2026-1704 |
4.3 (3.1)
|
Appointment Booking Calendar <= 1.6.9.29 - Insecure Di… |
croixhaug |
Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin |
2026-03-13T07:23:38.921Z | 2026-03-13T16:06:31.251Z |
| CVE-2026-1668 |
7.7 (4.0)
|
Input Validation Vulnerability on Multiple Omada Switches |
TP-Link Systems Inc. |
SG2008P 3.2x |
2026-03-13T16:53:23.486Z | 2026-03-13T18:09:29.873Z |
| CVE-2026-0957 |
7.8 (3.1)
8.5 (4.0)
|
Out-Of-Bounds Write in Digilent DASYLab |
Digilent |
DASYLab |
2026-03-13T14:35:08.461Z | 2026-03-15T01:51:19.224Z |
| CVE-2026-0956 |
7.8 (3.1)
8.5 (4.0)
|
Out-Of-Bounds Read in Digilent DASYLab |
Digilent |
DASYLab |
2026-03-13T15:11:31.443Z | 2026-03-15T01:51:18.956Z |
| CVE-2026-0955 |
7.8 (3.1)
8.5 (4.0)
|
Out-Of-Bounds Read When Opening a Corrupt File in Digi… |
Digilent |
DASYLab |
2026-03-13T15:07:36.285Z | 2026-03-15T01:51:19.093Z |
| CVE-2026-0954 |
7.8 (3.1)
8.5 (4.0)
|
Out-Of-Bounds Write When Opening a Corrupt DSB File in… |
Digilent |
DASYLab |
2026-03-13T14:31:25.652Z | 2026-03-15T01:51:19.364Z |
| CVE-2026-0835 |
5.4 (3.1)
|
IBM Sterling B2B Integrator and IBM Sterling File… |
IBM |
Sterling B2B Integrator |
2026-03-13T18:57:35.435Z | 2026-03-13T19:36:39.022Z |
| CVE-2025-8766 |
6.4 (3.1)
|
Noobaa-core: excessive permissions of /etc could lead … |
Red Hat |
Red Hat Openshift Data Foundation 4 |
2026-03-13T02:48:19.748Z | 2026-03-13T14:13:35.211Z |
| CVE-2025-71263 |
7.4 (3.1)
|
In UNIX Fourth Research Edition (v4), the su comm… |
AT&T Bell Labs |
UNIX |
2026-03-13T18:38:07.721Z | 2026-03-13T19:36:17.585Z |
| CVE-2025-66249 |
N/A
|
Apache Livy: Unauthorized directory access |
Apache Software Foundation |
Apache Livy |
2026-03-13T15:21:53.722Z | 2026-03-13T18:11:59.840Z |
| CVE-2025-60012 |
N/A
|
Apache Livy: Restrict file access |
Apache Software Foundation |
Apache Livy |
2026-03-13T15:23:07.334Z | 2026-03-13T18:11:24.588Z |
| CVE-2025-57849 |
6.4 (3.1)
|
Fuse: privilege escalation via excessive /etc/passwd p… |
Red Hat |
Red Hat Fuse 7 |
2026-03-13T03:08:32.594Z | 2026-03-13T14:13:19.030Z |
| CVE-2025-36368 |
6.5 (3.1)
|
IBM Sterling B2B Integrator and IBM Sterling File Gate… |
IBM |
Sterling B2B Integrator |
2026-03-13T19:35:46.030Z | 2026-03-13T19:36:14.607Z |
| CVE-2025-15515 |
6.9 (4.0)
|
The authentication mechanism for a specific featu… |
vivo |
Easyshare |
2026-03-13T06:43:50.023Z | 2026-03-13T14:12:55.422Z |
| CVE-2025-14811 |
3.1 (3.1)
|
IBM Sterling Partner Engagement Manager Information Di… |
IBM |
Sterling Partner Engagement Manager |
2026-03-13T18:22:00.496Z | 2026-03-13T18:44:03.621Z |
| CVE-2025-14504 |
5.4 (3.1)
|
IBM Sterling B2B Integrator and IBM Sterling File Gate… |
IBM |
Sterling B2B Integrator |
2026-03-13T19:08:37.702Z | 2026-03-13T19:37:07.983Z |
| CVE-2025-14483 |
4.3 (3.1)
|
IBM Sterling B2B Integrator and IBM Sterling File Gate… |
IBM |
Sterling B2B Integrator |
2026-03-13T19:15:11.844Z | 2026-03-13T19:37:32.919Z |
| CVE-2025-13779 |
8.3 (3.1)
7.2 (4.0)
|
Configuration Data Spill |
ABB |
AWIN GW100 rev.2 |
2026-03-13T13:11:11.547Z | 2026-03-13T14:11:57.527Z |
| CVE-2025-13778 |
6.5 (3.1)
7.1 (4.0)
|
Device Reboot Control |
ABB |
AWIN GW100 rev.2 |
2026-03-13T13:08:40.380Z | 2026-03-13T13:35:18.364Z |
| CVE-2025-13777 |
8.3 (3.1)
7.2 (4.0)
|
Authentication Bypass due to Improper Session Validation |
ABB |
AWIN GW100 rev.2 |
2026-03-13T13:05:26.329Z | 2026-03-13T13:35:36.115Z |
| CVE-2025-13726 |
5.3 (3.1)
|
IBM Sterling Partner Engagement Manager Information Di… |
IBM |
Sterling Partner Engagement Manager |
2026-03-13T18:26:34.401Z | 2026-03-13T19:33:11.395Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-71202 | In the Linux kernel, the following vulnerability has been resolved: iommu/sva: invalidate stale IO… | 2026-02-14T16:15:52.790 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-71201 | In the Linux kernel, the following vulnerability has been resolved: netfs: Fix early read unlock o… | 2026-02-14T16:15:52.647 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23131 | In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix … | 2026-02-14T15:16:08.387 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23130 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix dead lock wh… | 2026-02-14T15:16:08.277 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23129 | In the Linux kernel, the following vulnerability has been resolved: dpll: Prevent duplicate regist… | 2026-02-14T15:16:08.173 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23128 | In the Linux kernel, the following vulnerability has been resolved: arm64: Set __nocfi on swsusp_a… | 2026-02-14T15:16:08.060 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23127 | In the Linux kernel, the following vulnerability has been resolved: perf: Fix refcount warning on … | 2026-02-14T15:16:07.963 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23126 | In the Linux kernel, the following vulnerability has been resolved: netdevsim: fix a race issue re… | 2026-02-14T15:16:07.853 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23125 | In the Linux kernel, the following vulnerability has been resolved: sctp: move SCTP_CMD_ASSOC_SHKE… | 2026-02-14T15:16:07.740 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23124 | In the Linux kernel, the following vulnerability has been resolved: ipv6: annotate data-race in nd… | 2026-02-14T15:16:07.633 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23123 | In the Linux kernel, the following vulnerability has been resolved: interconnect: debugfs: initial… | 2026-02-14T15:16:07.500 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23122 | In the Linux kernel, the following vulnerability has been resolved: igc: Reduce TSN TX packet buff… | 2026-02-14T15:16:07.390 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23121 | In the Linux kernel, the following vulnerability has been resolved: mISDN: annotate data-race arou… | 2026-02-14T15:16:07.280 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23120 | In the Linux kernel, the following vulnerability has been resolved: l2tp: avoid one data-race in l… | 2026-02-14T15:16:07.157 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23119 | In the Linux kernel, the following vulnerability has been resolved: bonding: provide a net pointer… | 2026-02-14T15:16:07.043 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23118 | In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix data-race warning a… | 2026-02-14T15:16:06.933 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23117 | In the Linux kernel, the following vulnerability has been resolved: ice: add missing ice_deinit_hw… | 2026-02-14T15:16:06.830 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23116 | In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8m-blk-ctrl: Remo… | 2026-02-14T15:16:06.713 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23115 | In the Linux kernel, the following vulnerability has been resolved: serial: Fix not set tty->port … | 2026-02-14T15:16:06.607 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23114 | In the Linux kernel, the following vulnerability has been resolved: arm64/fpsimd: ptrace: Fix SVE … | 2026-02-14T15:16:06.500 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23113 | In the Linux kernel, the following vulnerability has been resolved: io_uring/io-wq: check IO_WQ_BI… | 2026-02-14T15:16:06.380 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-71200 | In the Linux kernel, the following vulnerability has been resolved: mmc: sdhci-of-dwcmshc: Prevent… | 2026-02-14T15:16:05.980 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-2312 | The Media Library Folders plugin for WordPress is vulnerable to Insecure Direct Object Reference in… | 2026-02-14T12:15:56.123 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1512 | The Essential Addons for Elementor – Popular Elementor Templates & Widgets plugin for WordPress is … | 2026-02-14T10:16:06.627 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1843 | The Super Page Cache plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Acti… | 2026-02-14T09:16:12.360 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1258 | The Mail Mint plugin for WordPress is vulnerable to blind SQL Injection via the 'forms', 'automatio… | 2026-02-14T09:16:12.190 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1254 | The Modula Image Gallery – Photo Grid & Video Gallery plugin for WordPress is vulnerable to authori… | 2026-02-14T09:16:12.020 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-1249 | The MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar plugin for WordPress is vulne… | 2026-02-14T09:16:11.850 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-0550 | The myCred plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mycr… | 2026-02-14T09:16:11.683 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-8572 | The Truelysell Core plugin for WordPress is vulnerable to privilege escalation in versions less tha… | 2026-02-14T09:16:11.490 | 2026-02-18T17:52:44.520 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-4j3x-hhg2-fm2x |
6.5 (3.1)
|
SiYuan's renderSprig has a missing admin check that allows any user to read full workspace DB | 2026-03-13T20:56:47Z | 2026-03-13T20:56:47Z |
| ghsa-44vg-5wv2-h2hg |
8.7 (4.0)
|
SimpleEval: Objects (including modules) can leak dangerous modules through to direct access inside … | 2026-03-13T20:56:26Z | 2026-03-13T20:56:27Z |
| ghsa-g93w-mfhg-p222 |
8.6 (4.0)
|
Angular vulnerable to XSS in i18n attribute bindings | 2026-03-13T20:56:18Z | 2026-03-13T20:56:18Z |
| ghsa-j47w-4g3g-c36v |
5.3 (3.1)
|
file-type: ZIP Decompression Bomb DoS via [Content_Types].xml entry | 2026-03-13T20:56:05Z | 2026-03-13T20:56:05Z |
| ghsa-5m9r-p9g7-679c |
6.9 (4.0)
|
OpenClaw: Zalo webhook rate limiting could be bypassed before secret validation | 2026-03-13T20:55:38Z | 2026-03-13T20:55:38Z |
| ghsa-g353-mgv3-8pcj |
8.6 (3.1)
|
OpenClaw: Feishu webhook mode accepted forged events when only `verificationToken` was configured | 2026-03-13T20:55:34Z | 2026-03-13T20:55:34Z |
| ghsa-2rqg-gjgv-84jm |
8.8 (3.1)
|
OpenClaw: Gateway `agent` calls could override the workspace boundary | 2026-03-13T20:55:30Z | 2026-03-13T20:55:30Z |
| ghsa-rqpp-rjj8-7wv8 |
9.9 (3.1)
|
OpenClaw: WebSocket shared-auth connections could self-declare elevated scopes | 2026-03-13T20:55:24Z | 2026-03-13T20:55:24Z |
| ghsa-wcxr-59v9-rxr8 |
8.4 (3.1)
|
`OpenClaw: session_status` let sandboxed subagents access parent or sibling session state | 2026-03-13T20:55:19Z | 2026-03-13T20:55:19Z |
| ghsa-99qw-6mr3-36qr |
8.5 (4.0)
|
OpenClaw: Workspace plugin auto-discovery allowed code execution from cloned repositories | 2026-03-13T20:55:13Z | 2026-03-13T20:55:14Z |
| ghsa-r7vr-gr74-94p8 |
8.8 (3.1)
|
OpenClaw: Command-authorized non-owners could reach owner-only `/config` and `/debug` surfaces | 2026-03-13T20:55:09Z | 2026-03-13T20:55:09Z |
| ghsa-f8r2-vg7x-gh8m |
6.9 (4.0)
|
OpenClaw: Exec approval allowlist patterns overmatched on POSIX paths | 2026-03-13T20:55:03Z | 2026-03-13T20:55:03Z |
| ghsa-m69h-jm2f-2pv8 |
6.9 (4.0)
|
OpenClaw: Feishu reaction events could bypass group authorization and mention gating | 2026-03-13T20:54:30Z | 2026-03-13T20:54:30Z |
| ghsa-vmhq-cqm9-6p7q |
7.1 (3.1)
|
OpenClaw: `browser.request` let `operator.write` persist admin-only browser profile changes | 2026-03-13T20:54:25Z | 2026-03-13T20:54:25Z |
| ghsa-7h7g-x2px-94hj |
6.9 (4.0)
|
OpenClaw: Pairing setup codes exposed long-lived shared gateway credentials instead of short-lived … | 2026-03-13T20:54:18Z | 2026-03-13T20:54:18Z |
| ghsa-f5mf-3r52-r83w |
|
OpenClaw's Zalouser allowlist authorization matched mutable group names by default | 2026-03-13T20:54:00Z | 2026-03-13T20:54:00Z |
| ghsa-pfjj-6f4p-rvmh |
9.9 (3.1)
|
Apollo Federation vulnerable to prototype pollution via incomplete key sanitization | 2026-03-13T20:51:10Z | 2026-03-13T20:51:10Z |
| ghsa-hcch-w73c-jp4m |
5.4 (3.1)
|
Statamic vulnerable to privilege escalation via stored cross-site scripting | 2026-03-13T20:50:51Z | 2026-03-13T20:50:51Z |
| ghsa-8fh9-c4jq-94h4 |
7.5 (3.1)
|
idunno.Bluesky, idunno.AtProto and idunno.AtProto.OAuthCallback Denial of Service Vulnerability | 2026-03-13T20:50:22Z | 2026-03-13T20:50:22Z |
| ghsa-q926-c743-49qj |
0.0 (3.1)
|
Centrifugo's InsecureSkipTokenSignatureVerify flag silently disables JWT verification with no warning | 2026-03-13T20:44:37Z | 2026-03-13T20:44:37Z |
| ghsa-r353-4845-pr5p |
8.2 (3.1)
|
simplesamlphp/xml-security: Missing AES-GCM Authentication Tag Validation on Encrypted Nodes Allows… | 2026-03-13T20:44:21Z | 2026-03-13T20:44:21Z |
| ghsa-vrm6-8vpv-qv8q |
7.5 (3.1)
|
Undici has Unbounded Memory Consumption in WebSocket permessage-deflate Decompression | 2026-03-13T20:41:56Z | 2026-03-13T20:41:56Z |
| ghsa-v9p9-hfj2-hcw8 |
7.5 (3.1)
|
Undici has Unhandled Exception in WebSocket Client Due to Invalid server_max_window_bits Validation | 2026-03-13T20:41:41Z | 2026-03-13T20:41:41Z |
| ghsa-4992-7rv2-5pvq |
4.6 (3.1)
|
Undici has CRLF Injection in undici via `upgrade` option | 2026-03-13T20:41:26Z | 2026-03-13T20:41:26Z |
| ghsa-phc3-fgpg-7m6h |
5.9 (3.1)
|
Undici has Unbounded Memory Consumption in its DeduplicationHandler via Response Buffering that lea… | 2026-03-13T20:37:58Z | 2026-03-13T20:37:58Z |
| ghsa-f269-vfmq-vjvj |
7.5 (3.1)
|
Undici: Malicious WebSocket 64-bit length overflows parser and crashes the client | 2026-03-13T20:07:26Z | 2026-03-13T20:07:26Z |
| ghsa-2mjp-6q6p-2qxm |
6.5 (3.1)
|
Undici has an HTTP Request/Response Smuggling issue | 2026-03-13T20:07:03Z | 2026-03-13T20:07:03Z |
| ghsa-4524-cj9j-g4fj |
6.9 (4.0)
|
OneUptime: Password Reset Token Logged at INFO Level | 2026-03-13T20:05:12Z | 2026-03-13T20:05:13Z |
| ghsa-752w-5fwx-jx9f |
7.5 (3.1)
|
PyJWT accepts unknown `crit` header extensions | 2026-03-13T20:05:04Z | 2026-03-13T20:05:04Z |
| ghsa-p2x3-8689-cwpg |
6.9 (4.0)
|
Parse Server's GraphQL WebSocket endpoint bypasses security middleware | 2026-03-13T20:04:44Z | 2026-03-13T20:04:44Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-209 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-19T19:19:01.689044+00:00 |
| pysec-2024-163 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Prior to ve… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-14T05:22:23.036505+00:00 |
| pysec-2024-208 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.647736+00:00 |
| pysec-2024-207 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.605918+00:00 |
| pysec-2024-206 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.566553+00:00 |
| pysec-2024-246 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Starting in… | vyper | 2024-04-25T17:15:50+00:00 | 2025-05-05T19:21:20.899426+00:00 |
| pysec-2024-50 |
|
Synapse is an open-source Matrix homeserver. A remote Matrix user with malicious intent, … | matrix-synapse | 2024-04-23T18:15:00+00:00 | 2024-04-23T21:18:51.688096+00:00 |
| pysec-2024-250 |
|
Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the component torch/csr… | torch | 2024-04-19T21:15:08+00:00 | 2025-06-03T15:23:56.072490+00:00 |
| pysec-2024-252 |
|
PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in t… | torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T19:22:08.948962+00:00 |
| pysec-2024-251 |
|
Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in… | torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T03:12:59.077932+00:00 |
| pysec-2024-243 |
9.3 (3.1)
|
mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs… | mlflow | 2024-04-16T00:15:12+00:00 | 2025-04-08T10:23:25.044416+00:00 |
| pysec-2024-254 |
4.2 (3.1)
|
A session fixation vulnerability exists in the zenml-io/zenml application, where JWT toke… | zenml | 2024-04-16T00:15:11+00:00 | 2025-06-13T00:48:41.806476+00:00 |
| pysec-2024-247 |
9.9 (3.1)
|
A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically… | zenml | 2024-04-16T00:15:11+00:00 | 2025-05-12T15:23:53.861001+00:00 |
| pysec-2024-49 |
|
Lektor before 3.3.11 does not sanitize DB path traversal. Thus, shell commands might be e… | lektor | 2024-03-27T06:15:00+00:00 | 2024-03-27T11:18:36.506150+00:00 |
| pysec-2024-257 |
7.5 (3.1)
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2024-03-22T23:15:07+00:00 | 2025-06-30T15:23:50.085549+00:00 |
| pysec-2024-234 |
9.8 (3.1)
|
Jupyter Server Proxy allows users to run arbitrary external processes alongside their Jup… | jupyter-server-proxy | 2024-03-20T20:15:08+00:00 | 2025-02-21T18:23:35.992501+00:00 |
| pysec-2024-48 |
|
Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial o… | black | 2024-03-19T05:15:00+00:00 | 2024-03-19T11:18:50.379002+00:00 |
| pysec-2024-179 |
4.8 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-03-18T22:15:07+00:00 | 2025-01-19T01:52:24.377662+00:00 |
| pysec-2024-47 |
|
In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.te… | django | 2024-03-15T20:15:00+00:00 | 2024-03-15T23:20:34.975097+00:00 |
| pysec-2024-46 |
|
Apache Airflow, versions 2.8.0 through 2.8.2, has a vulnerability that allows an authenti… | apache-airflow | 2024-03-14T09:15:00+00:00 | 2024-03-14T11:19:09.515892+00:00 |
| pysec-2024-221 |
5.3 (3.1)
|
aiosmtpd is a reimplementation of the Python stdlib smtpd.py based on asyncio. aiosmtpd i… | aiosmtpd | 2024-03-12T21:15:58+00:00 | 2025-01-22T16:23:18.042465+00:00 |
| pysec-2024-44 |
|
In RPyC before 6.0.0, when a server exposes a method that calls the attribute named __arr… | rpyc | 2024-03-12T16:15:00+00:00 | 2024-03-12T19:19:21.886478+00:00 |
| pysec-2024-45 |
|
LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to contro… | langchain-core | 2024-03-04T00:15:00+00:00 | 2024-03-13T23:20:07.486731+00:00 |
| pysec-2024-43 |
|
LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to contro… | langchain | 2024-03-04T00:15:00+00:00 | 2024-03-05T10:22:15.555734+00:00 |
| pysec-2024-42 |
|
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated Ops … | apache-airflow | 2024-03-01T11:15:00+00:00 | 2024-03-01T14:20:34.498842+00:00 |
| pysec-2024-245 |
|
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated user… | apache-airflow | 2024-02-29T11:15:08+00:00 | 2025-05-01T21:22:38.598048+00:00 |
| pysec-2024-162 |
6.5 (3.1)
|
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the XMLFeedSpider … | scrapy | 2024-02-28T00:15:53+00:00 | 2025-01-14T05:22:21.870348+00:00 |
| pysec-2024-41 |
|
diffoscope before 256 allows directory traversal via an embedded filename in a GPG file. … | diffoscope | 2024-02-27T02:15:00+00:00 | 2024-02-27T07:20:27.954412+00:00 |
| pysec-2024-205 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. When using … | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-19T19:19:01.519824+00:00 |
| pysec-2024-164 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. If an exces… | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-16T21:21:41.436934+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1250 | Malicious code in pear-apps-lib-feedback (npm) | 2026-03-05T15:35:15Z | 2026-03-08T01:39:46Z |
| mal-2026-1256 | Malicious code in pearpass-lib-data-import (npm) | 2026-03-05T15:33:59Z | 2026-03-08T01:39:46Z |
| mal-2026-1246 | Malicious code in pearpass-utils-password-check (npm) | 2026-03-05T15:32:42Z | 2026-03-08T01:39:46Z |
| mal-2026-1245 | Malicious code in nf-referral-backend-placeholder (npm) | 2026-03-05T15:26:23Z | 2026-03-08T01:39:46Z |
| mal-2026-1244 | Malicious code in spectral-corsair-navigator (npm) | 2026-03-05T15:05:48Z | 2026-03-16T01:00:42Z |
| mal-2026-1243 | Malicious code in nf-referral-backend (npm) | 2026-03-05T09:50:28Z | 2026-03-08T01:39:46Z |
| mal-2026-1242 | Malicious code in yaml-manifest-utils-mynarratorai (npm) | 2026-03-04T18:39:41Z | 2026-03-08T01:39:48Z |
| mal-2026-1240 | Malicious code in requests-ml-min (PyPI) | 2026-03-04T17:24:20Z | 2026-03-04T17:24:20Z |
| mal-2026-1238 | Malicious code in pearpass-lib-vault (npm) | 2026-03-04T14:25:47Z | 2026-03-08T01:39:46Z |
| mal-2026-1239 | Malicious code in pearpass-lib-vault-core (npm) | 2026-03-04T14:16:24Z | 2026-03-08T01:39:46Z |
| mal-2026-1237 | Malicious code in pearpass-lib-ui-theme-provider (npm) | 2026-03-04T14:15:03Z | 2026-03-08T01:39:46Z |
| mal-2026-1241 | Malicious code in @get-wrecked/overlay (npm) | 2026-03-04T14:02:28Z | 2026-03-08T01:39:42Z |
| mal-2026-1236 | Malicious code in @molb-prelogin/gobiz-config (npm) | 2026-03-04T12:28:05Z | 2026-03-08T01:39:42Z |
| mal-2026-1235 | Malicious code in dakhara (PyPI) | 2026-03-03T23:29:16Z | 2026-03-03T23:37:58Z |
| mal-2026-1226 | Malicious code in qwery-core (PyPI) | 2026-03-03T19:19:13Z | 2026-03-03T19:19:13Z |
| mal-2026-1224 | Malicious code in spark-ml-utilities (PyPI) | 2026-03-03T18:13:56Z | 2026-03-03T20:14:02Z |
| mal-2026-1223 | Malicious code in risk-utilities (PyPI) | 2026-03-03T18:10:56Z | 2026-03-03T20:14:02Z |
| mal-2026-1222 | Malicious code in optimal-spark-config (PyPI) | 2026-03-03T18:02:59Z | 2026-03-03T20:14:02Z |
| mal-2026-1225 | Malicious code in urllib-slim (PyPI) | 2026-03-03T17:51:17Z | 2026-03-03T20:14:02Z |
| mal-2026-1220 | Malicious code in corp-build-utils-poc (npm) | 2026-03-03T16:11:08Z | 2026-03-08T01:39:43Z |
| mal-2026-1221 | Malicious code in xrpl-dev-portal (npm) | 2026-03-03T15:37:29Z | 2026-03-08T01:39:48Z |
| mal-2026-1219 | Malicious code in demo-pipelinetest (npm) | 2026-03-03T15:23:39Z | 2026-03-08T01:39:43Z |
| mal-2026-1217 | Malicious code in @vk-cloud-billing/common (npm) | 2026-03-03T13:35:20Z | 2026-03-08T01:39:42Z |
| mal-2026-1218 | Malicious code in chai-as-confirmed (npm) | 2026-03-03T12:46:54Z | 2026-03-08T01:39:43Z |
| mal-2026-1227 | Malicious code in gaia-marionette (npm) | 2026-03-03T11:19:33Z | 2026-03-08T01:39:44Z |
| mal-2026-1216 | Malicious code in pdfjs-dist-v5 (npm) | 2026-03-03T08:21:23Z | 2026-03-08T01:39:46Z |
| mal-2026-1215 | Malicious code in whop-sdk (npm) | 2026-03-03T06:54:17Z | 2026-03-08T01:39:48Z |
| mal-2026-1206 | Malicious code in polymarket-trade-bot-api (npm) | 2026-03-03T06:54:17Z | 2026-03-08T01:39:46Z |
| mal-2026-1203 | Malicious code in polmarket (npm) | 2026-03-03T06:54:17Z | 2026-03-08T01:39:46Z |
| mal-2026-1192 | Malicious code in chai-as-proofed (npm) | 2026-03-03T06:51:52Z | 2026-03-08T01:39:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2854 | Roundcube: Mehrere Schwachstellen | 2025-12-15T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2849 | Red Hat Enterprise Linux (Keylime): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-12-15T23:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2846 | strongSwan (NetworkManager-Plugin): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-12-14T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2840 | Exim: Schwachstelle ermöglicht Codeausführung | 2025-12-14T23:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2836 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2025-12-14T23:00:00.000+00:00 | 2026-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2830 | Red Hat Enterprise Linux (libsoup): Schwachstelle ermöglicht Denial of Service | 2025-12-11T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2825 | MediaWiki: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-12-10T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2823 | Drupal (Acquia Content Hub): Schwachstelle ermöglicht Darstellen falscher Informationen | 2025-12-10T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2816 | ImageMagick: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-10T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2814 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-12-10T23:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2812 | Mozilla Firefox: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2807 | TianoCore EDK2: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-09T23:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2025-2805 | TianoCore EDK2: Schwachstelle ermöglicht Codeausführung | 2025-12-09T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2802 | Notepad++: Schwachstelle ermöglicht Codeausführung | 2025-12-09T23:00:00.000+00:00 | 2026-02-03T23:00:00.000+00:00 |
| wid-sec-w-2025-2798 | Red Hat OpenShift Service Mesh: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2789 | Adobe Experience Manager: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2781 | Microsoft Windows: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-2765 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-08T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2759 | IBM WebSphere Application Server: Schwachstelle ermöglicht Cross-Site Scripting | 2025-12-08T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-2756 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-07T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2755 | util-linux: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2025-12-07T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2751 | WebKitGTK: Mehrere Schwachstellen | 2025-12-04T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2750 | Apache HTTP Server: Mehrere Schwachstellen | 2025-12-04T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2747 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-04T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2746 | IBM InfoSphere Information Server: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-04T23:00:00.000+00:00 | 2025-12-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2741 | cPython: Schwachstelle ermöglicht Denial of Service | 2025-12-03T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2740 | ffmpeg: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-12-03T23:00:00.000+00:00 | 2026-01-27T23:00:00.000+00:00 |
| wid-sec-w-2025-2738 | Vercel Next.js und React Server Components (React2Shell): Schwachstelle ermöglicht Codeausführung | 2025-12-03T23:00:00.000+00:00 | 2025-12-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2737 | libpng: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2025-12-03T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2025-2736 | QT (Declarative module): Schwachstelle ermöglicht Denial of Service | 2025-12-03T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-289-06 | Siemens SiPass Integrated | 2025-10-14T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-289-05 | Siemens Solid Edge | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| va-25-282-01 | Newforma Project Center multiple vulnerabilities | 2025-10-09T19:50:00Z | 2025-10-09T19:50:00Z |
| icsa-25-282-03 | Rockwell Automation Stratix | 2025-10-09T06:00:00.000000Z | 2025-10-09T06:00:00.000000Z |
| icsa-25-282-02 | Rockwell Automation Lifecycle Services with Cisco | 2025-10-09T06:00:00.000000Z | 2025-10-09T06:00:00.000000Z |
| va-25-280-01 | OPEXUS FOIAXpress stored XSS | 2025-10-07T22:50:29Z | 2025-10-07T22:50:29Z |
| icsa-25-280-01 | Delta Electronics DIAScreen | 2025-10-07T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-275-01 | Raise3D Pro2 Series 3D Printers** | 2025-10-02T05:00:00.000000Z | 2025-10-02T05:00:00.000000Z |
| icsa-25-289-11 | Hitachi Energy MACH GWS | 2025-09-30T12:50:29.000000Z | 2025-09-30T12:50:29.000000Z |
| icsa-25-275-02 | Hitachi Energy MSM | 2025-09-30T09:02:31.000000Z | 2025-09-30T09:02:31.000000Z |
| icsa-25-282-01 | Hitachi Energy Asset Suite (Update A) | 2025-09-30T08:50:13.000000Z | 2025-10-28T09:50:00.000000Z |
| icsa-25-273-06 | National Instruments Circuit Design Suite | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-05 | OpenPLC_V3 | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-04 | Festo Controller CECC-S,-LK,-D Family Firmware (Update A) | 2025-09-30T06:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-273-01 | MegaSys Enterprises Telenium Online Web Application | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-07 | LG Innotek Camera Multiple Models | 2025-09-30T05:00:00.000000Z | 2025-09-30T05:00:00.000000Z |
| va-25-273-01 | Microsoft Windows inconsistent driver blocking | 2025-09-30T00:00:00Z | 2025-09-30T00:00:00Z |
| va-25-272-01 | Medical Informatics Engineering Enterprise Health multiple vulnerabilities | 2025-09-29T00:00:00Z | 2025-09-29T00:00:00Z |
| icsa-25-268-01 | Dingtian DT-R002 | 2025-09-25T06:00:00.000000Z | 2025-09-25T06:00:00.000000Z |
| icsa-25-266-04 | Viessmann Vitogate 300 | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| icsa-25-266-02 | Mitsubishi Electric MELSEC-Q Series CPU Module | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| icsa-25-266-01 | AutomationDirect CLICK PLUS | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| va-25-265-01 | Airship AI MFA bypass and default credentials vulnerabilities | 2025-09-22T14:06:13Z | 2025-09-22T14:06:13Z |
| icsa-25-261-07 | Dover Fueling Solutions ProGauge MagLink LX4 Devices | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-06 | Cognex In-Sight Explorer and In-Sight Camera Firmware | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-03 | Schneider Electric Saitel DR & Saitel DP Remote Terminal Unit | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-02 | Westermo Network Technologies WeOS 5 | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-01 | Westermo Network Technologies WeOS 5 | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-259-07 | Delta Electronics DIALink | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-06 | Siemens Multiple Industrial Products | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-phone-info-disc-yyxswstk | Cisco Video Phone 8875 and Desk Phone 9800 Series Information Disclosure Vulnerability | 2025-02-19T16:00:00+00:00 | 2025-02-19T16:00:00+00:00 |
| cisco-sa-esa-mailpol-bypass-5nvcjzmw | Cisco Secure Email Gateway Email Filter Bypass Vulnerability | 2025-02-19T16:00:00+00:00 | 2025-02-19T16:00:00+00:00 |
| cisco-sa-broadworks-xss-gdpgj58p | Cisco BroadWorks Application Delivery Platform Cross-Site Scripting Vulnerability | 2025-02-19T16:00:00+00:00 | 2025-02-19T16:00:00+00:00 |
| cisco-sa-swa-range-bypass-2bsehysu | Cisco Secure Web Appliance Range Request Bypass Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-snmp-dos-sdxnsucw | Cisco IOS, IOS XE, and IOS XR Software SNMP Denial of Service Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-03-12T15:22:33+00:00 |
| cisco-sa-ise-xss-42tgsdmg | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-ise-multivuls-ftw9aoxf | Cisco Identity Services Engine Insecure Java Deserialization and Authorization Bypass Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-02-10T20:23:50+00:00 |
| cisco-sa-expressway-xss-uexuzrew | Cisco Expressway Series Cross-Site Scripting Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-esa-sma-xss-wck2wcug | Cisco Secure Email and Web Manager and Secure Email Gateway Cross-Site Scripting Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-esa-sma-wsa-snmp-inf-fqpvl8sx | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance SNMP Polling Information Disclosure Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-esa-sma-wsa-multi-ykujhs34 | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-02-07T19:21:57+00:00 |
| cisco-sa-cmm-privesc-uy2vf8pc | Cisco Meeting Management REST API Privilege Escalation Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-clamav-ole2-h549rpha | ClamAV OLE2 File Format Decryption Denial of Service Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-bw-sip-dos-msysbrmt | Cisco BroadWorks SIP Denial of Service Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-xwork-xss-kccg7wwu | Cisco Crosswork Network Controller Stored Cross-Site Scripting Vulnerabilities | 2025-01-08T16:00:00+00:00 | 2025-01-08T16:00:00+00:00 |
| cisco-sa-thousandeyes-cert-pqtjuv9n | Cisco ThousandEyes Endpoint Agent for MacOS and RoomOS Certificate Validation Vulnerability | 2025-01-08T16:00:00+00:00 | 2025-01-13T22:15:18+00:00 |
| cisco-sa-cspc-xss-cdojzyh | Cisco Common Services Platform Collector Cross-Site Scripting Vulnerabilities | 2025-01-08T16:00:00+00:00 | 2025-01-08T16:00:00+00:00 |
| cisco-sa-nxos-image-sig-bypas-pqdrqvjl | Cisco NX-OS Software Image Verification Bypass Vulnerability | 2024-12-04T16:00:00+00:00 | 2025-04-07T16:43:32+00:00 |
| cisco-sa-phone-infodisc-sbyqqvbg | Cisco 7800, 8800, and 9800 Series Phones Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ndfc-sqli-cyppaxrl | Cisco Nexus Dashboard Fabric Controller SQL Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-mpp-xss-8tav2tvf | Cisco 6800, 7800, 8800, and 9800 Series Phones with Multiplatform Firmware Stored Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vulns-af544ed5 | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vuln-dbqdwry | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-auth-bypass-bbrf7mke | Cisco Identity Services Engine Authorization Bypass and Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-imp-inf-disc-cupkua5n | Cisco Unified Communications Manager IM & Presence Service Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-esa-wsa-sma-xss-zym3f49n | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-epnmpi-sxss-yyf2zkxs | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ece-dos-oqb9ufev | Cisco Enterprise Chat and Email Denial of Service Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-cucm-xss-svckmmw | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-cmm-info-disc-9zemahga | Cisco Meeting Management Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-23229 | crypto: virtio - Add spinlock protection with virtqueue notification | 2026-02-02T00:00:00.000Z | 2026-02-26T01:37:21.000Z |
| msrc_cve-2026-23228 | smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() | 2026-02-02T00:00:00.000Z | 2026-03-03T01:37:34.000Z |
| msrc_cve-2026-23227 | drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free | 2026-02-02T00:00:00.000Z | 2026-02-21T04:29:44.000Z |
| msrc_cve-2026-23226 | ksmbd: add chann_lock to protect ksmbd_chann_list xarray | 2026-02-02T00:00:00.000Z | 2026-02-21T04:29:02.000Z |
| msrc_cve-2026-23225 | sched/mmcid: Don't assume CID is CPU owned on mode switch | 2026-02-02T00:00:00.000Z | 2026-02-26T01:37:47.000Z |
| msrc_cve-2026-23224 | erofs: fix UAF issue for file-backed mounts w/ directio option | 2026-02-02T00:00:00.000Z | 2026-03-03T01:37:50.000Z |
| msrc_cve-2026-23223 | xfs: fix UAF in xchk_btree_check_block_owner | 2026-02-02T00:00:00.000Z | 2026-02-26T01:37:34.000Z |
| msrc_cve-2026-23222 | crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly | 2026-02-02T00:00:00.000Z | 2026-03-03T01:37:23.000Z |
| msrc_cve-2026-23221 | bus: fsl-mc: fix use-after-free in driver_override_show() | 2026-02-02T00:00:00.000Z | 2026-03-04T14:37:42.000Z |
| msrc_cve-2026-23220 | ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths | 2026-02-02T00:00:00.000Z | 2026-03-03T01:37:39.000Z |
| msrc_cve-2026-23217 | riscv: trace: fix snapshot deadlock with sbi ecall | 2026-02-02T00:00:00.000Z | 2026-03-03T01:37:01.000Z |
| msrc_cve-2026-23216 | scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() | 2026-02-02T00:00:00.000Z | 2026-02-28T01:38:18.000Z |
| msrc_cve-2026-23215 | x86/vmware: Fix hypercall clobbers | 2026-02-02T00:00:00.000Z | 2026-02-21T04:27:00.000Z |
| msrc_cve-2026-23214 | btrfs: reject new transactions if the fs is fully read-only | 2026-02-02T00:00:00.000Z | 2026-03-04T14:37:11.000Z |
| msrc_cve-2026-23213 | drm/amd/pm: Disable MMIO access during SMU Mode 1 reset | 2026-02-02T00:00:00.000Z | 2026-03-04T14:36:54.000Z |
| msrc_cve-2026-23212 | bonding: annotate data-races around slave->last_rx | 2026-02-02T00:00:00.000Z | 2026-02-28T01:38:24.000Z |
| msrc_cve-2026-2243 | Qemu-kvm: heap buffer out-of-bounds read in vmdk compressed grain parsing | 2026-02-02T00:00:00.000Z | 2026-02-24T14:04:04.000Z |
| msrc_cve-2026-21863 | Malformed Valkey Cluster bus message can lead to Remote DoS | 2026-02-02T00:00:00.000Z | 2026-02-26T14:36:37.000Z |
| msrc_cve-2026-21620 | TFTP Path Traversal | 2026-02-02T00:00:00.000Z | 2026-03-03T01:38:17.000Z |
| msrc_cve-2026-1979 | mruby JMPNOT-to-JMPIF Optimization vm.c mrb_vm_exec use after free | 2026-02-02T00:00:00.000Z | 2026-03-03T01:37:17.000Z |
| msrc_cve-2026-1703 | Limited path traversal when installing wheel archives | 2026-02-02T00:00:00.000Z | 2026-02-21T04:28:04.000Z |
| msrc_cve-2025-71237 | nilfs2: Fix potential block overflow that cause system hang | 2026-02-02T00:00:00.000Z | 2026-03-03T01:37:45.000Z |
| msrc_cve-2025-71236 | scsi: qla2xxx: Validate sp before freeing associated memory | 2026-02-02T00:00:00.000Z | 2026-02-21T04:29:23.000Z |
| msrc_cve-2025-71235 | scsi: qla2xxx: Delay module unload while fabric scan in progress | 2026-02-02T00:00:00.000Z | 2026-02-28T01:38:41.000Z |
| msrc_cve-2025-71234 | wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add | 2026-02-02T00:00:00.000Z | 2026-02-21T04:29:07.000Z |
| msrc_cve-2025-71233 | PCI: endpoint: Avoid creating sub-groups asynchronously | 2026-02-02T00:00:00.000Z | 2026-03-04T14:37:51.000Z |
| msrc_cve-2025-71232 | scsi: qla2xxx: Free sp in error path to fix system crash | 2026-02-02T00:00:00.000Z | 2026-02-28T01:39:04.000Z |
| msrc_cve-2025-71231 | crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode | 2026-02-02T00:00:00.000Z | 2026-02-21T04:28:41.000Z |
| msrc_cve-2025-71230 | hfs: ensure sb->s_fs_info is always cleaned up | 2026-02-02T00:00:00.000Z | 2026-03-03T01:37:28.000Z |
| msrc_cve-2025-71229 | wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon() | 2026-02-02T00:00:00.000Z | 2026-02-28T01:38:47.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0293 | Kwetsbaarheden verholpen in Spring Framework | 2025-09-16T13:38:44.960337Z | 2025-09-16T13:38:44.960337Z |
| ncsc-2025-0292 | Kwetsbaarheden verholpen in Ivanti producten | 2025-09-16T12:21:50.959347Z | 2025-09-16T12:21:50.959347Z |
| ncsc-2025-0291 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-09-16T11:17:27.365694Z | 2025-09-16T11:17:27.365694Z |
| ncsc-2025-0290 | Kwetsbaarheden verholpen in Apple macOS | 2025-09-16T11:16:20.572265Z | 2025-09-16T11:16:20.572265Z |
| ncsc-2025-0289 | Kwetsbaarheden verholpen in Omnissa Workspace ONE UEM | 2025-09-12T15:23:20.359090Z | 2025-09-12T15:23:20.359090Z |
| ncsc-2025-0288 | Kwetsbaarheden verholpen in GitLab CE/EE | 2025-09-12T14:49:52.285990Z | 2025-09-12T14:49:52.285990Z |
| ncsc-2025-0287 | Kwetsbaarheden verholpen in Cisco NX-OS Software | 2025-09-11T08:18:37.706725Z | 2025-09-11T08:18:37.706725Z |
| ncsc-2025-0286 | Kwetsbaarheden verholpen in Cisco IOS XR Software | 2025-09-11T08:14:36.960621Z | 2025-09-11T08:14:36.960621Z |
| ncsc-2025-0285 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-09-10T11:01:43.415733Z | 2025-09-10T11:01:43.415733Z |
| ncsc-2025-0284 | Kwetsbaarheid verholpen in Adobe Commerce en Magento | 2025-09-10T10:49:56.787627Z | 2025-09-10T10:49:56.787627Z |
| ncsc-2025-0283 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-09-10T10:46:54.808276Z | 2025-09-10T10:46:54.808276Z |
| ncsc-2025-0282 | Kwetsbaarheid verholpen in Adobe Dreamweaver | 2025-09-10T10:38:24.553749Z | 2025-09-10T10:38:24.553749Z |
| ncsc-2025-0281 | Kwetsbaarheid verholpen in Adobe ColdFusion | 2025-09-10T10:24:09.409410Z | 2025-09-10T10:24:09.409410Z |
| ncsc-2025-0280 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2025-09-09T18:27:39.956624Z | 2025-09-09T18:27:39.956624Z |
| ncsc-2025-0279 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-09-09T18:25:53.539582Z | 2025-09-09T18:25:53.539582Z |
| ncsc-2025-0278 | Kwetsbaarheden verholpen in Microsoft Office | 2025-09-09T18:23:23.763765Z | 2025-09-09T18:23:23.763765Z |
| ncsc-2025-0277 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-09-09T18:22:30.766030Z | 2025-09-09T18:22:30.766030Z |
| ncsc-2025-0276 | Kwetsbaarheden verholpen in Schneider Electric Saitel | 2025-09-09T15:16:00.122647Z | 2025-09-09T15:16:00.122647Z |
| ncsc-2025-0275 | Kwetsbaarheden verholpen in SAP producten | 2025-09-09T11:12:22.945466Z | 2025-09-09T11:12:22.945466Z |
| ncsc-2025-0274 | Kwetsbaarheden verholpen in Siemens producten | 2025-09-09T11:06:34.785987Z | 2025-09-09T11:06:34.785987Z |
| ncsc-2025-0273 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-09-04T08:15:14.806733Z | 2025-09-04T08:15:14.806733Z |
| ncsc-2025-0272 | Kwetsbaarheid verholpen in FreePBX | 2025-08-29T08:37:54.893549Z | 2025-08-29T08:37:54.893549Z |
| ncsc-2025-0271 | Kwetsbaarheden verholpen in Arcserve Unified Data Protection | 2025-08-28T12:56:02.228992Z | 2025-08-28T12:56:02.228992Z |
| ncsc-2025-0270 | Kwetsbaarheden verholpen in Cisco NX-OS Software | 2025-08-28T08:36:20.358948Z | 2025-08-28T08:36:20.358948Z |
| ncsc-2025-0269 | Kwetsbaarheden verholpen in IBM Cognos Command Center | 2025-08-27T13:10:59.965070Z | 2025-08-27T13:10:59.965070Z |
| ncsc-2025-0268 | Kwetsbaarheden verholpen in Citrix NetScaler ADC en Gateway | 2025-08-26T13:11:42.925280Z | 2025-08-26T17:34:30.428328Z |
| ncsc-2025-0267 | Kwetsbaarheden verholpen in Foxit Reader | 2025-08-25T11:26:17.380689Z | 2025-08-25T11:26:17.380689Z |
| ncsc-2025-0266 | Kwetsbaarheid verholpen in Apple MacOS, iOS en iPadOS | 2025-08-22T05:49:07.556948Z | 2025-08-25T12:16:10.430485Z |
| ncsc-2025-0265 | Kwetsbaarheden verholpen in Commvault | 2025-08-20T12:15:48.655099Z | 2025-08-20T12:15:48.655099Z |
| ncsc-2025-0264 | Kwetsbaarheden verholpen in Cisco Secure Firewall Software | 2025-08-15T08:52:41.012811Z | 2025-08-15T08:52:41.012811Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10142-1 | traefik-3.6.7-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10141-1 | rizin-0.8.2-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10140-1 | patch-2.8-2.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10139-1 | libsoup-3_0-0-3.6.5-12.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10138-1 | java-25-openj9-25.0.2.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10137-1 | java-21-openj9-21.0.10.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10136-1 | java-1_8_0-openjdk-1.8.0.482-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10135-1 | java-1_8_0-openj9-1.8.0.482-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10134-1 | java-17-openj9-17.0.18.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10133-1 | java-11-openj9-11.0.30.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10132-1 | freerdp-3.22.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:20156-1 | Security update for chromium | 2026-02-02T17:20:43Z | 2026-02-02T17:20:43Z |
| opensuse-su-2026:20152-1 | Security update for openssl-3 | 2026-02-02T13:00:02Z | 2026-02-02T13:00:02Z |
| opensuse-su-2026:20151-1 | Security update for wireshark | 2026-02-02T12:56:02Z | 2026-02-02T12:56:02Z |
| opensuse-su-2026:20150-1 | Security update for glib2 | 2026-02-02T12:41:24Z | 2026-02-02T12:41:24Z |
| opensuse-su-2026:20145-1 | Security update for the Linux Kernel | 2026-02-02T11:54:26Z | 2026-02-02T11:54:26Z |
| opensuse-su-2026:20148-1 | Security update for dpdk | 2026-02-02T11:12:33Z | 2026-02-02T11:12:33Z |
| opensuse-su-2026:20147-1 | Security update for python-wheel | 2026-02-02T09:49:12Z | 2026-02-02T09:49:12Z |
| opensuse-su-2026:10131-1 | trivy-0.69.0-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10130-1 | python311-PyNaCl-1.6.2-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10129-1 | libmlt++-7-7-7.36.1-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10128-1 | MozillaThunderbird-140.7.1-1.1 on GA media | 2026-01-31T00:00:00Z | 2026-01-31T00:00:00Z |
| opensuse-su-2026:20144-1 | Security update for python-filelock | 2026-01-30T21:24:37Z | 2026-01-30T21:24:37Z |
| opensuse-su-2026:20143-1 | Security update for java-25-openjdk | 2026-01-30T15:55:47Z | 2026-01-30T15:55:47Z |
| opensuse-su-2026:20140-1 | Security update for alloy | 2026-01-30T14:38:31Z | 2026-01-30T14:38:31Z |
| opensuse-su-2026:20141-1 | Security update for udisks2 | 2026-01-30T14:30:57Z | 2026-01-30T14:30:57Z |
| opensuse-su-2026:20142-1 | Security update for libsoup | 2026-01-30T14:27:58Z | 2026-01-30T14:27:58Z |
| opensuse-su-2026:20139-1 | Security update for unbound | 2026-01-30T10:05:07Z | 2026-01-30T10:05:07Z |
| opensuse-su-2026:20138-1 | Security update for jasper | 2026-01-30T09:59:14Z | 2026-01-30T09:59:14Z |
| opensuse-su-2026:10127-1 | rekor-1.5.0-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:3423 | Red Hat Security Advisory: OpenShift Container Platform 4.13.64 security and extras update | 2026-03-05T09:42:37+00:00 | 2026-03-13T01:02:38+00:00 |
| rhsa-2026:3841 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:37:53+00:00 | 2026-03-16T06:41:37+00:00 |
| rhsa-2026:3836 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:03:15+00:00 | 2026-03-16T06:41:37+00:00 |
| rhsa-2026:3835 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:01:36+00:00 | 2026-03-16T06:41:36+00:00 |
| rhsa-2026:3833 | Red Hat Security Advisory: grafana security update | 2026-03-05T08:23:57+00:00 | 2026-03-16T06:41:35+00:00 |
| rhsa-2026:3831 | Red Hat Security Advisory: grafana security update | 2026-03-05T07:55:46+00:00 | 2026-03-16T06:41:35+00:00 |
| rhsa-2026:3827 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.20.3 | 2026-03-05T07:31:32+00:00 | 2026-03-16T06:41:35+00:00 |
| rhsa-2026:3825 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.20.3 | 2026-03-05T07:08:51+00:00 | 2026-03-16T06:41:39+00:00 |
| rhsa-2026:3822 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:53:01+00:00 | 2026-03-16T06:41:35+00:00 |
| rhsa-2026:3821 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:51:55+00:00 | 2026-03-16T06:41:35+00:00 |
| rhsa-2026:3817 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:25:53+00:00 | 2026-03-16T06:41:38+00:00 |
| rhsa-2026:3820 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:19:06+00:00 | 2026-03-16T06:41:34+00:00 |
| rhsa-2026:3818 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:11:00+00:00 | 2026-03-16T06:41:34+00:00 |
| rhsa-2026:3816 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T05:42:24+00:00 | 2026-03-16T06:41:33+00:00 |
| rhsa-2026:3815 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T05:32:24+00:00 | 2026-03-16T06:41:33+00:00 |
| rhsa-2026:3813 | Red Hat Security Advisory: go-rpm-macros security update | 2026-03-05T05:30:04+00:00 | 2026-03-16T00:41:17+00:00 |
| rhsa-2026:3812 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T04:13:33+00:00 | 2026-03-16T06:41:27+00:00 |
| rhsa-2026:3810 | Red Hat Security Advisory: kernel security update | 2026-03-05T03:22:49+00:00 | 2026-03-05T08:40:12+00:00 |
| rhsa-2026:3782 | Red Hat Security Advisory: RHOAI 2.25.3 - Red Hat OpenShift AI | 2026-03-04T18:23:40+00:00 | 2026-03-16T06:41:27+00:00 |
| rhsa-2026:3391 | Red Hat Security Advisory: OpenShift Container Platform 4.19.25 packages and security update | 2026-03-04T15:54:04+00:00 | 2026-03-16T06:41:20+00:00 |
| rhsa-2026:3753 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-04T15:52:29+00:00 | 2026-03-16T06:41:27+00:00 |
| rhsa-2026:3392 | Red Hat Security Advisory: OpenShift Container Platform 4.19.25 bug fix and security update | 2026-03-04T15:36:49+00:00 | 2026-03-12T19:08:48+00:00 |
| rhsa-2026:3752 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-04T15:29:36+00:00 | 2026-03-16T06:41:27+00:00 |
| rhsa-2026:3751 | Red Hat Security Advisory: Red Hat Developer Hub 1.9.0 release. | 2026-03-04T15:00:31+00:00 | 2026-03-04T15:14:14+00:00 |
| rhsa-2026:3730 | Red Hat Security Advisory: postgresql security update | 2026-03-04T14:32:11+00:00 | 2026-03-13T00:33:00+00:00 |
| rhsa-2026:3416 | Red Hat Security Advisory: OpenShift Container Platform 4.17.50 packages and security update | 2026-03-04T09:07:15+00:00 | 2026-03-16T06:41:21+00:00 |
| rhsa-2026:3723 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.15.4 | 2026-03-04T08:59:26+00:00 | 2026-03-16T06:41:27+00:00 |
| rhsa-2026:3417 | Red Hat Security Advisory: OpenShift Container Platform 4.17.50 bug fix and security update | 2026-03-04T08:55:38+00:00 | 2026-03-12T19:08:49+00:00 |
| rhsa-2026:3418 | Red Hat Security Advisory: OpenShift Container Platform 4.17.50 bug fix and security update | 2026-03-04T08:33:38+00:00 | 2026-03-13T01:02:37+00:00 |
| rhsa-2026:3718 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.15.4 | 2026-03-04T07:52:57+00:00 | 2026-03-16T06:41:27+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2021-130-05 | Modicon M241 & M251 Logic Controllers | 2021-05-11T00:00:00.000Z | 2021-05-11T00:00:00.000Z |
| sevd-2021-130-01 | Modicon Managed Switch | 2021-05-11T00:00:00.000Z | 2021-05-11T00:00:00.000Z |
| sevd-2021-103-01 | C-Bus Toolkit and C-Gate Server | 2021-04-13T11:17:13.000Z | 2022-11-08T11:17:13.000Z |
| sevd-2021-068-02 | PowerLogic ION7400 / PM8000 / ION9000 Power Meters | 2021-03-09T00:00:00.000Z | 2021-03-09T00:00:00.000Z |
| sevd-2021-068-01 | IGSS (Interactive Graphical SCADA System) | 2021-03-09T00:00:00.000Z | 2021-03-09T00:00:00.000Z |
| sevd-2021-040-01 | PowerLogic Power Metering Products | 2021-02-08T00:00:00.000Z | 2021-02-08T00:00:00.000Z |
| sevd-2021-012-02 | EcoStruxure Power Build - Rapsody | 2021-01-12T08:32:35.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2020-353-02 | Treck HTTP Server Vulnerability on TM3 Bus Coupler Modules (V2.0) | 2020-12-18T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2020-343-05 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and Associated Communication Modules | 2020-12-08T21:04:43.000Z | 2022-09-13T20:04:43.000Z |
| sevd-2020-343-06 | Web Server on Modicon M340, Legacy Offers Modicon Quantum Modicon Premium and associated Communication Modules | 2020-12-08T09:08:01.000Z | 2020-12-08T09:08:01.000Z |
| sevd-2020-343-07 | SNMP Service on Modicon M340 and Associated Communication Modules | 2020-12-08T05:49:51.000Z | 2022-09-13T05:49:51.000Z |
| sevd-2020-343-09 | Modicon M258 Logic Controllers and SoMachine/ SoMachine Motion Software | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-343-08 | Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-343-04 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules | 2020-12-08T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2020-343-03 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (V2.0) | 2020-12-08T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2020-343-02 | EcoStruxure Geo SCADA Expert | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-343-01 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and RemoteConnect™ | 2020-12-08T00:00:00.000Z | 2021-07-13T00:00:00.000Z |
| sevd-2020-315-07 | PLC Simulator on EcoStruxure™ Control Expert and Process Expert | 2020-11-10T15:07:11.000Z | 2023-03-14T15:07:11.000Z |
| sevd-2020-315-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-11-10T12:05:04.000Z | 2023-02-14T12:05:00.000Z |
| sevd-2020-315-06 | Easergy T300 | 2020-11-10T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-315-05 | Modicon M100/M200/M221 Programmable Logic Controller | 2020-11-10T00:00:00.000Z | 2021-01-12T00:00:00.000Z |
| sevd-2020-315-04 | EcoStruxure Building Operation (EBO) | 2020-11-10T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| sevd-2020-315-03 | Interactive Graphical SCADA System (IGSS) | 2020-11-10T00:00:00.000Z | 2021-04-15T00:00:00.000Z |
| sevd-2020-315-02 | EcoStruxure™ Operator Terminal Expert (Vijeo XD), Pro-face BLUE and WinGP runtime | 2020-11-09T00:00:00.000Z | 2021-01-11T00:00:00.000Z |
| sevd-2020-287-04 | EcoStruxure™ and SmartStruxure™ Power Monitoring and SCADA Software | 2020-10-13T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-287-03 | Smartlink, PowerTag, and Wiser Series Gateways | 2020-10-13T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-287-02 | Wibu-Systems CodeMeter Vulnerabilities | 2020-10-13T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-287-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-10-13T00:00:00.000Z | 2025-06-10T04:00:00.000Z |
| sevd-2020-252-01 | SCADAPack x70 Remote Connect and SCADAPack x70 Security Administrator | 2020-09-08T00:00:00.000Z | 2021-02-09T00:00:00.000Z |
| sevd-2020-224-08 | Schneider Electric PACTware | 2020-08-11T00:00:00.000Z | 2020-08-13T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-417159 | SSA-417159: Multiple Vulnerabilities in SINEMA Remote Connect Client Before V3.2 SP2 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-359713 | SSA-359713: Authorization Bypass Vulnerability in Industrial Edge Management | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-342438 | SSA-342438: Privilege Escalation Vulnerability in SINUMERIK ONE, SINUMERIK 840D and SINUMERIK 828D | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-103653 | SSA-103653: Denial-of-Service Vulnerability in Automation License Manager | 2024-09-10T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-097786 | SSA-097786: Insertion of Sensitive Information into Log File Vulnerability in SINUMERIK systems | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-097435 | SSA-097435: Usernames Disclosure Vulnerability in Mendix Runtime | 2024-09-10T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-039007 | SSA-039007: Heap-based Buffer Overflow Vulnerability in User Management Component (UMC) | 2024-09-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-921449 | SSA-921449: Plaintext Storage of a Password Vulnerability in LOGO! V8.3 BM Devices | 2024-08-13T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-856475 | SSA-856475: X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-784301 | SSA-784301: Multiple Vulnerabilities in SINEC NMS Before V3.0 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-720392 | SSA-720392: Multiple Vulnerabilities in Third-Party Components in Location Intelligence Before V4.4 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-716317 | SSA-716317: Multiple Vulnerability in SINEC Traffic Analyzer Before V2.0 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-659443 | SSA-659443: Local Code Execution Vulnerabilities in COMOS Before V10.5 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-417547 | SSA-417547: Multiple Vulnerabilities in INTRALOG WMS Before V4 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-357412 | SSA-357412: PRT File Parsing Vulnerability in NX Before V2406.3000 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-087301 | SSA-087301: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.1 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-857368 | SSA-857368: Multiple Vulnerabilities in Omnivise T3000 | 2024-08-02T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-071402 | SSA-071402: Multiple Vulnerabilities in SICAM Products | 2024-07-22T00:00:00Z | 2024-07-22T00:00:00Z |
| ssa-998949 | SSA-998949: Hard-coded Default Encryption Key in Mendix Encryption Module V10.0.0 and V10.0.1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-928781 | SSA-928781: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 HF1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-883918 | SSA-883918: Information Disclosure Vulnerability in SIMATIC WinCC | 2024-07-09T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-868282 | SSA-868282: Multiple Vulnerabilities in SINEMA Remote Connect Client before V3.2 HF1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-825651 | SSA-825651: Deserialization Vulnerability in SIMATIC STEP 7 (TIA Portal) before V18 Update 2 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-824889 | SSA-824889: XML File Parsing Vulnerabilities in JT Open and PLM XML SDK | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-779936 | SSA-779936: Catalog-Profile Deserialization Vulnerability in Siemens Engineering Platforms before V19 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-750499 | SSA-750499: Weak Encryption Vulnerability in SIPROTEC 5 Devices | 2024-07-09T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-723487 | SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products | 2024-07-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-722010 | SSA-722010: Datalogics File Parsing Vulnerability in Teamcenter Visualization and JT2Go | 2024-07-09T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-698820 | SSA-698820: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.4 on RUGGEDCOM APE1808 Devices | 2024-07-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-381581 | SSA-381581: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 SP1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0341-1 | Security update for java-11-openjdk | 2026-01-29T14:58:19Z | 2026-01-29T14:58:19Z |
| suse-su-2026:0338-1 | Security update for abseil-cpp | 2026-01-29T10:35:48Z | 2026-01-29T10:35:48Z |
| suse-su-2026:0337-1 | Security update for python | 2026-01-29T10:34:17Z | 2026-01-29T10:34:17Z |
| suse-su-2026:0336-1 | Security update for libxml2 | 2026-01-29T10:16:20Z | 2026-01-29T10:16:20Z |
| suse-su-2026:0335-1 | Security update for python-filelock | 2026-01-29T10:15:42Z | 2026-01-29T10:15:42Z |
| suse-su-2026:0334-1 | Security update for libxml2 | 2026-01-29T10:01:36Z | 2026-01-29T10:01:36Z |
| suse-su-2026:0333-1 | Security update for openssl-1_0_0 | 2026-01-29T08:16:22Z | 2026-01-29T08:16:22Z |
| suse-su-2026:0332-1 | Security update for openssl-1_0_0 | 2026-01-29T06:04:36Z | 2026-01-29T06:04:36Z |
| suse-su-2026:0331-1 | Security update for openssl-1_1 | 2026-01-28T17:13:03Z | 2026-01-28T17:13:03Z |
| suse-su-2026:0330-1 | Security update for openjpeg2 | 2026-01-28T16:27:12Z | 2026-01-28T16:27:12Z |
| suse-su-2026:20175-1 | Security update for python-urllib3 | 2026-01-28T16:03:29Z | 2026-01-28T16:03:29Z |
| suse-su-2026:20173-1 | Security update for ucode-amd | 2026-01-28T16:01:59Z | 2026-01-28T16:01:59Z |
| suse-su-2026:0329-1 | Security update for xen | 2026-01-28T15:39:40Z | 2026-01-28T15:39:40Z |
| suse-su-2026:0328-1 | Security update for xen | 2026-01-28T15:39:28Z | 2026-01-28T15:39:28Z |
| suse-su-2026:0327-1 | Security update for alloy | 2026-01-28T15:38:58Z | 2026-01-28T15:38:58Z |
| suse-su-2026:0326-1 | Security update for helm | 2026-01-28T14:55:01Z | 2026-01-28T14:55:01Z |
| suse-su-2026:0325-1 | Security update for kubernetes | 2026-01-28T14:54:08Z | 2026-01-28T14:54:08Z |
| suse-su-2026:0320-1 | Security update for openjpeg2 | 2026-01-28T14:40:09Z | 2026-01-28T14:40:09Z |
| suse-su-2026:0319-1 | Security update for container-suseconnect | 2026-01-28T14:40:01Z | 2026-01-28T14:40:01Z |
| suse-su-2026:0317-1 | Security update for the Linux Kernel | 2026-01-28T14:37:02Z | 2026-01-28T14:37:02Z |
| suse-su-2026:0316-1 | Security update for the Linux Kernel | 2026-01-28T14:35:14Z | 2026-01-28T14:35:14Z |
| suse-su-2026:0315-1 | Security update for the Linux Kernel | 2026-01-28T14:34:30Z | 2026-01-28T14:34:30Z |
| suse-su-2026:0314-1 | Security update for python311 | 2026-01-28T13:28:48Z | 2026-01-28T13:28:48Z |
| suse-su-2026:20171-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-01-28T10:27:58Z | 2026-01-28T10:27:58Z |
| suse-su-2026:0313-1 | Security update for gimp | 2026-01-28T10:13:29Z | 2026-01-28T10:13:29Z |
| suse-su-2026:0312-1 | Security update for openssl-3 | 2026-01-28T09:37:56Z | 2026-01-28T09:37:56Z |
| suse-su-2026:0311-1 | Security update for openssl-3 | 2026-01-28T09:37:48Z | 2026-01-28T09:37:48Z |
| suse-su-2026:0310-1 | Security update for openssl-3 | 2026-01-28T09:37:26Z | 2026-01-28T09:37:26Z |
| suse-su-2026:0309-1 | Security update for openssl-3 | 2026-01-28T09:36:37Z | 2026-01-28T09:36:37Z |
| suse-su-2026:0308-1 | Security update for go1.24-openssl | 2026-01-28T08:38:40Z | 2026-01-28T08:38:40Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:0924 | Important: thunderbird security update | 2026-01-21T00:00:00Z | 2026-01-24T01:47:12Z |
| alsa-2026:0923 | Important: golang security update | 2026-01-21T00:00:00Z | 2026-01-24T01:54:58Z |
| alsa-2026:0922 | Important: golang security update | 2026-01-21T00:00:00Z | 2026-01-23T23:39:55Z |
| alsa-2026:0921 | Important: go-toolset:rhel8 security update | 2026-01-21T00:00:00Z | 2026-01-26T10:07:11Z |
| alsa-2026:0914 | Important: gimp security update | 2026-01-21T00:00:00Z | 2026-01-26T10:10:46Z |
| alsa-2026:0845 | Important: brotli security update | 2026-01-20T00:00:00Z | 2026-01-21T10:45:25Z |
| alsa-2026:0793 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-23T13:22:18Z |
| alsa-2026:0786 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-23T07:53:26Z |
| alsa-2026:0771 | Important: gpsd-minimal security update | 2026-01-19T00:00:00Z | 2026-01-20T11:54:05Z |
| alsa-2026:0770 | Important: gpsd security update | 2026-01-19T00:00:00Z | 2026-01-21T10:46:37Z |
| alsa-2026:0760 | Important: kernel-rt security update | 2026-01-19T00:00:00Z | 2026-01-20T08:13:58Z |
| alsa-2026:0759 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-20T08:07:16Z |
| alsa-2026:0756 | Moderate: transfig security update | 2026-01-19T00:00:00Z | 2026-01-19T10:24:15Z |
| alsa-2026:0753 | Important: container-tools:rhel8 security update | 2026-01-19T00:00:00Z | 2026-01-21T09:07:00Z |
| alsa-2026:0752 | Important: jmc security update | 2026-01-19T00:00:00Z | 2026-01-20T11:59:21Z |
| alsa-2026:0750 | Important: net-snmp security update | 2026-01-19T00:00:00Z | 2026-01-20T07:38:35Z |
| alsa-2026:0728 | Important: gnupg2 security update | 2026-01-15T00:00:00Z | 2026-01-16T08:41:48Z |
| alsa-2026:0719 | Important: gnupg2 security update | 2026-01-15T00:00:00Z | 2026-01-16T08:23:06Z |
| alsa-2026:0700 | Moderate: transfig security update | 2026-01-15T00:00:00Z | 2026-01-16T14:46:41Z |
| alsa-2026:0697 | Important: gnupg2 security update | 2026-01-15T00:00:00Z | 2026-01-16T08:52:59Z |
| alsa-2026:0696 | Important: net-snmp security update | 2026-01-15T00:00:00Z | 2026-01-26T10:04:02Z |
| alsa-2026:0695 | Moderate: libpq security update | 2026-01-15T00:00:00Z | 2026-01-16T14:48:26Z |
| alsa-2026:0694 | Important: firefox security update | 2026-01-15T00:00:00Z | 2026-01-16T14:51:10Z |
| alsa-2026:0668 | Important: net-snmp security update | 2026-01-15T00:00:00Z | 2026-01-16T14:53:15Z |
| alsa-2026:0667 | Important: firefox security update | 2026-01-15T00:00:00Z | 2026-02-12T10:37:47Z |
| alsa-2026:0608 | Moderate: vsftpd security update | 2026-01-14T00:00:00Z | 2026-01-16T14:54:25Z |
| alsa-2026:0606 | Moderate: vsftpd security update | 2026-01-14T00:00:00Z | 2026-01-16T14:56:39Z |
| alsa-2026:0605 | Moderate: vsftpd security update | 2026-01-14T00:00:00Z | 2026-01-16T14:57:43Z |
| alsa-2026:0596 | Moderate: cups security update | 2026-01-14T00:00:00Z | 2026-01-16T14:59:53Z |
| alsa-2026:0594 | Moderate: libpq security update | 2026-01-14T00:00:00Z | 2026-01-16T15:02:50Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-251 | Heap-buffer-overflow in icu_78::RegexMatcher::MatchChunkAt | 2025-04-02T00:16:00.337471Z | 2025-04-02T00:16:00.337850Z |
| osv-2025-249 | Heap-use-after-free in lj_strfmt_pushvf | 2025-04-02T00:09:53.120387Z | 2025-07-23T14:23:01.826780Z |
| osv-2025-248 | Heap-buffer-overflow in cli_bm_addpatt | 2025-04-02T00:00:13.427589Z | 2025-04-02T00:00:13.428120Z |
| osv-2025-240 | Security exception in com.powsybl.commons.xml.XmlUtil.lambda$skipSubElements$0 | 2025-03-28T00:05:50.145107Z | 2025-03-30T14:32:19.516483Z |
| osv-2025-230 | Heap-buffer-overflow in wasm_loader_prepare_bytecode | 2025-03-22T00:05:22.916187Z | 2025-03-22T00:05:22.916485Z |
| osv-2025-226 | UNKNOWN READ in extract_sess_version | 2025-03-21T00:19:10.852617Z | 2025-03-21T00:19:10.852969Z |
| osv-2025-219 | Heap-buffer-overflow in opj_j2k_read_tile_header | 2025-03-18T00:18:30.566980Z | 2026-02-11T14:21:43.026699Z |
| osv-2025-215 | Security exception in graphql.parser.GraphqlAntlrToLanguage.createType | 2025-03-18T00:09:36.655072Z | 2025-03-18T00:09:36.655425Z |
| osv-2025-207 | Security exception in org.apache.lucene.analysis.tokenattributes.CharTermAttributeImpl.clone | 2025-03-16T00:02:33.765869Z | 2025-06-20T17:14:14.229009Z |
| osv-2025-202 | UNKNOWN READ in _blit_xrgb32_lerp_spans | 2025-03-15T00:01:51.127135Z | 2026-02-28T14:17:08.171734Z |
| osv-2025-190 | Heap-buffer-overflow in std::__1::__function::__func<cv::PngDecoder::compose_frame | 2025-03-11T00:04:32.361664Z | 2025-03-11T00:04:32.362119Z |
| osv-2025-178 | Heap-buffer-overflow in usm_set_user_password | 2025-02-28T00:16:54.655227Z | 2025-02-28T00:16:54.655745Z |
| osv-2025-177 | Segv on unknown address in chunk_free_object | 2025-02-28T00:16:24.018716Z | 2025-02-28T00:16:24.019131Z |
| osv-2025-175 | UNKNOWN READ in insert_free | 2025-02-28T00:12:26.919208Z | 2025-02-28T00:12:26.919553Z |
| osv-2025-174 | Heap-use-after-free in gc_trace | 2025-02-28T00:12:25.140274Z | 2025-02-28T00:12:25.140618Z |
| osv-2025-173 | UNKNOWN READ in chunk_obj_alloc | 2025-02-28T00:11:40.566459Z | 2025-02-28T00:11:40.566797Z |
| osv-2025-169 | Stack-buffer-overflow in utf8_in2 | 2025-02-27T00:07:08.029075Z | 2025-02-27T00:07:08.029655Z |
| osv-2025-165 | Index-out-of-bounds in dwg_decode_eed | 2025-02-26T00:17:27.930225Z | 2025-02-26T00:17:27.930707Z |
| osv-2025-162 | Heap-buffer-overflow in snmp_in_options | 2025-02-24T00:15:40.967551Z | 2025-03-18T00:30:24.116747Z |
| osv-2025-161 | Heap-buffer-overflow in se_add_pair | 2025-02-24T00:15:33.662895Z | 2025-03-18T00:37:12.676515Z |
| osv-2025-160 | UNKNOWN WRITE in ndpi_free_flow_data | 2025-02-24T00:07:49.495615Z | 2025-02-24T00:07:49.495976Z |
| osv-2025-156 | Check failed in CheckUnwind | 2025-02-23T00:16:50.073196Z | 2025-02-23T00:16:50.073520Z |
| osv-2025-154 | UNKNOWN READ in ndpi_strdup | 2025-02-23T00:13:05.487818Z | 2025-02-23T00:13:05.488183Z |
| osv-2025-149 | UNKNOWN READ in processClientServerHello | 2025-02-23T00:00:50.236281Z | 2025-02-23T00:00:50.236700Z |
| osv-2025-148 | Heap-buffer-overflow in setup_engineID | 2025-02-23T00:00:36.951152Z | 2025-03-18T00:22:22.817245Z |
| osv-2025-147 | UNKNOWN WRITE in ndpi_free_flow_data | 2025-02-22T00:18:07.814416Z | 2025-02-22T00:18:07.814726Z |
| osv-2025-145 | Heap-buffer-overflow in ___interceptor_strncat | 2025-02-22T00:14:15.620085Z | 2025-02-22T00:14:15.620535Z |
| osv-2025-133 | Stack-buffer-overflow in se_read_conf | 2025-02-17T00:02:18.986364Z | 2025-03-18T00:27:33.917908Z |
| osv-2025-132 | Heap-use-after-free in netsnmp_hex_to_binary | 2025-02-17T00:01:01.920904Z | 2025-03-18T00:33:26.648884Z |
| osv-2025-131 | Heap-buffer-overflow in vips_foreign_save_heif_write_block | 2025-02-16T00:13:44.282887Z | 2025-03-18T00:32:21.245932Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0399 | rustls network-reachable panic in `Acceptor::accept` | 2024-11-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0398 | Bias of Polynomial Coefficients in Secret Sharing | 2024-11-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0401 | Denial of service because of stack overflow with malicious decompression input | 2024-11-14T12:00:00Z | 2024-12-04T12:13:35Z |
| rustsec-2024-0445 | cap-primitives doesn't fully sandbox all the Windows device filenames | 2024-11-05T12:00:00Z | 2025-12-19T21:01:24Z |
| rustsec-2024-0438 | Wasmtime doesn't fully sandbox all the Windows device filenames | 2024-11-02T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0379 | Multiple soundness issues | 2024-10-31T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0381 | Replaced by `pqcrypto-mlkem` | 2024-10-24T12:00:00Z | 2024-11-10T12:05:32Z |
| rustsec-2024-0380 | Replaced by `pqcrypto-mldsa` | 2024-10-24T12:00:00Z | 2024-11-10T12:05:32Z |
| rustsec-2024-0378 | Risk of use-after-free in `borrowed` reads from Python weak references | 2024-10-12T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0402 | Borsh serialization of HashMap is non-canonical | 2024-10-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0436 | paste - no longer maintained | 2024-10-07T12:00:00Z | 2026-01-27T21:51:15Z |
| rustsec-2024-0377 | Heap Buffer overflow using c_chars_to_str function | 2024-10-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0439 | Race condition could lead to WebAssembly control-flow integrity and type safety violations | 2024-10-03T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0440 | Runtime crash when combining tail calls with stack traces | 2024-10-02T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0376 | Remotely exploitable Denial of Service in Tonic | 2024-10-01T12:00:00Z | 2025-09-11T07:02:22Z |
| rustsec-2024-0375 | `atty` is unmaintained | 2024-09-25T12:00:00Z | 2024-09-26T12:26:22Z |
| rustsec-2024-0374 | Segmentation fault due to use of uninitialized memory | 2024-09-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0427 | get-size-derive is unmaintained | 2024-09-15T12:00:00Z | 2024-12-22T09:01:06Z |
| rustsec-2024-0425 | get-size is unmaintained | 2024-09-15T12:00:00Z | 2024-12-22T09:01:06Z |
| rustsec-2024-0404 | Unsoundness in anstream | 2024-09-08T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0443 | webp crate may expose memory contents when encoding an image | 2024-09-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0371 | gix-path improperly resolves configuration path reported by Git | 2024-09-06T12:00:00Z | 2024-09-07T01:48:33Z |
| rustsec-2024-0372 | Memory leak when calling a canister method via `ic_cdk::call` | 2024-09-05T12:00:00Z | 2024-09-07T18:23:36Z |
| rustsec-2024-0386 | strason is unmaintained | 2024-09-04T12:00:00Z | 2024-11-10T13:16:48Z |
| rustsec-2024-0383 | bcc is unmaintained | 2024-09-04T12:00:00Z | 2024-11-10T12:53:21Z |
| rustsec-2024-0382 | hwloc is unmaintained | 2024-09-04T12:00:00Z | 2024-11-10T12:52:40Z |
| rustsec-2024-0373 | `Endpoint::retry()` calls can lead to panicking | 2024-09-02T12:00:00Z | 2024-09-08T01:47:13Z |
| rustsec-2024-0368 | olm-sys: wrapped library unmaintained, potentially vulnerable | 2024-09-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0384 | `instant` is unmaintained | 2024-09-01T12:00:00Z | 2024-11-10T13:10:28Z |
| rustsec-2024-0370 | proc-macro-error is unmaintained | 2024-09-01T12:00:00Z | 2024-09-09T12:08:37Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-kyverno-2026-23881 | Kyverno Denial of Service via Context Variable Amplification in Policy Engine | 2026-02-03T08:42:39.101Z | 2026-02-03T09:12:55.720Z |
| bit-kyverno-2026-22039 | Kyverno Cross-Namespace Privilege Escalation via Policy apiCall | 2026-02-03T08:42:37.380Z | 2026-02-03T09:12:55.720Z |
| bit-ghost-2026-24778 | Ghost vulnerable to XSS via malicious Portal preview links | 2026-02-03T08:40:51.583Z | 2026-02-03T09:12:55.720Z |
| bit-discourse-2026-24742 | Discourse staff action logs expose sensitive information to moderators | 2026-02-02T08:42:31.943Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2026-21865 | Discourse topic conversion permission vulnerability for moderators | 2026-02-02T08:42:28.354Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-69289 | Discourse has insecure default configuration that allows non-admin moderators to takeover any non-staff account via email change | 2026-02-02T08:42:26.675Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-69218 | Discourse moderators can access admin-only reports exposing private upload URLs | 2026-02-02T08:42:24.998Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68934 | Discourse Has Denial of Service (DoS) Vulnerability in Drafts Creation Endpoint | 2026-02-02T08:42:23.259Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68933 | Discourse non-admin moderators can exfiltrate private content via post ownership transfer | 2026-02-02T08:42:21.302Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68666 | Discourse users archives leaked to users with moderation privileges | 2026-02-02T08:42:19.452Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68662 | FinalDestination hostname matching allows SSRF protection bypass | 2026-02-02T08:42:17.844Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68660 | Discourse AI Discover's continue conversation allows threat actor to impersonate user | 2026-02-02T08:42:16.289Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68659 | Discourse has DoS vulnerability in username change endpoint | 2026-02-02T08:42:14.606Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68479 | Discourse subscriptions are susceptible to takeover | 2026-02-02T08:42:12.613Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-67723 | Discourse vulnerable to stored Cross-site Scripting via Katex in discourse-math plugin | 2026-02-02T08:42:10.509Z | 2026-02-10T09:16:50.296Z |
| bit-discourse-2025-66488 | Discourse allows script execution in uploaded HTML/XML files on S3 | 2026-02-02T08:42:08.194Z | 2026-02-02T09:12:04.887Z |
| bit-golang-2025-68119 | Unexpected code execution when invoking toolchain in cmd/go | 2026-01-31T08:43:40.539Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61731 | Arbitrary file write using cgo pkg-config directive in cmd/go | 2026-01-31T08:43:38.643Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61730 | Handshake messages may be processed at the incorrect encryption level in crypto/tls | 2026-01-31T08:43:36.684Z | 2026-02-03T09:12:55.720Z |
| bit-joomla-2025-63083 | Joomla! Core - [20260102] - XSS vector in the pagebreak plugin | 2026-01-31T08:43:33.433Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61728 | Excessive CPU consumption when building archive index in archive/zip | 2026-01-31T08:43:32.870Z | 2026-01-31T09:09:11.750Z |
| bit-joomla-2025-63082 | Joomla! Core - [20260101] - Inadequate content filtering for data URLs | 2026-01-31T08:43:31.962Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61726 | Memory exhaustion in query parameter parsing in net/url | 2026-01-31T08:43:29.079Z | 2026-01-31T09:09:11.750Z |
| bit-mastodon-2026-23964 | Mastodon has insufficient access control to push notification settings | 2026-01-31T08:43:24.123Z | 2026-02-03T09:12:55.720Z |
| bit-discourse-2026-23743 | Discourse allows permalinks to restricted resources to leak resource slugs to unauthorized users | 2026-01-31T08:42:04.050Z | 2026-01-31T09:09:11.750Z |
| bit-gitea-2026-20912 | Gitea: Cross-Repository Authorization Bypass via Release Attachment Linking Leads to Private Attachment Disclosure | 2026-01-30T08:40:49.607Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20904 | Gitea: Broken access control in OpenID visibility toggle enables cross-user visibility changes | 2026-01-30T08:40:47.849Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20897 | Gitea Git LFS Lock Deletion Broken Access Control (Cross-Repo IDOR) | 2026-01-30T08:40:45.840Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20888 | Gitea Pull Requests Auto-Merge: Read-Only Users Can Cancel Scheduled Auto-Merge via Web Endpoint (Authorization Bypass) | 2026-01-30T08:40:43.950Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20883 | Gitea Stopwatch API Missing Authorization Check Leads to Post-Revocation Information Disclosure | 2026-01-30T08:40:41.879Z | 2026-01-30T09:12:31.676Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-sj80413 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:16:55.110567Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cd66042 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:16:25.085708Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ku65968 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:15:25.445497Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xp03839 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:14:55.099611Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qm19832 | Moby is an open source container framework developed by Docker Inc | 2026-01-30T16:13:25.141915Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-um63521 | Within HostnameError | 2026-01-30T16:12:25.029065Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xr17407 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:11:25.270681Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-so95938 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:11:25.480356Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jr48309 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:11:25.334563Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cz81512 | Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes | 2026-01-30T16:11:25.451968Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uz73015 | Cancelling a query (e | 2026-01-30T16:09:25.315533Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zm51114 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:08:25.157380Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pk69606 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:08:25.435888Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gl70025 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:08:25.191230Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ps30901 | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes | 2026-01-30T16:07:55.053827Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wp20592 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:05:24.814830Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-we92783 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:05:24.753007Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wa03785 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:05:24.799763Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nv34418 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:04:54.566695Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qv26039 | Within HostnameError | 2026-01-30T16:03:24.653963Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mf93723 | Within HostnameError | 2026-01-30T16:03:24.521286Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xr85161 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:02:54.934169Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ec15228 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:02:54.964872Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bd53293 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:02:54.709597Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wq07901 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:01:54.911193Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-np17404 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:58:24.395667Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oa33370 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:57:24.977544Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yc48827 | Within HostnameError | 2026-01-30T15:56:24.532632Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hv28992 | Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3 | 2026-01-30T15:55:24.450018Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dp30290 | processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input | 2026-01-30T15:52:54.729374Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2020-ALE-003 | Vulnérabilité dans les produits Mozilla | 2020-01-09T00:00:00.000000 | 2020-01-20T00:00:00.000000 |
| CERTFR-2020-ALE-002 | Vulnérabilité dans les produits Citrix ADC et Citrix Gateway | 2020-01-09T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-001 | Multiples vulnérabilités dans les produits de Pulse Secure | 2020-01-09T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2019-ale-015 | Multiples vulnérabilités dans Google Chrome | 2019-11-04T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| CERTFR-2019-ALE-015 | Multiples vulnérabilités dans Google Chrome | 2019-11-04T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2019-ale-014 | Vulnérabilité dans PHP | 2019-10-29T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| CERTFR-2019-ALE-014 | Vulnérabilité dans PHP | 2019-10-29T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2019-ale-013 | Vulnérabilité dans Microsoft Internet Explorer | 2019-09-24T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| CERTFR-2019-ALE-013 | Vulnérabilité dans Microsoft Internet Explorer | 2019-09-24T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-012 | Multiples vulnérabilités dans Microsoft Remote Desktop Services | 2019-08-14T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| CERTFR-2019-ALE-012 | Multiples vulnérabilités dans Microsoft Remote Desktop Services | 2019-08-14T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-011 | Vulnérabilité dans Oracle WebLogic | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-010 | Vulnérabilité dans Mozilla Firefox | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| CERTFR-2019-ALE-011 | Vulnérabilité dans Oracle WebLogic | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| CERTFR-2019-ALE-010 | Vulnérabilité dans Mozilla Firefox | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-009 | Vulnérabilité dans Exim | 2019-06-11T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| CERTFR-2019-ALE-009 | Vulnérabilité dans Exim | 2019-06-11T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-008 | Vulnérabilité dans Microsoft SharePoint Server | 2019-05-29T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| CERTFR-2019-ALE-008 | Vulnérabilité dans Microsoft SharePoint Server | 2019-05-29T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-006 | Vulnérabilité dans Microsoft Remote Desktop Services | 2019-05-22T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| CERTFR-2019-ALE-006 | Vulnérabilité dans Microsoft Remote Desktop Services | 2019-05-22T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-007 | Vulnérabilité dans le serveur DHCP de Windows | 2019-05-15T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| CERTFR-2019-ALE-007 | Vulnérabilité dans le serveur DHCP de Windows | 2019-05-15T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| certfr-2019-ale-005 | Vulnérabilité dans Oracle WebLogic | 2019-04-26T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| CERTFR-2019-ALE-005 | Vulnérabilité dans Oracle WebLogic | 2019-04-26T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| certfr-2019-ale-004 | Multiples vulnérabilités dans Microsoft Edge et Internet Explorer | 2019-04-01T00:00:00.000000 | 2019-04-17T00:00:00.000000 |
| CERTFR-2019-ALE-004 | Multiples vulnérabilités dans Microsoft Edge et Internet Explorer | 2019-04-01T00:00:00.000000 | 2019-04-17T00:00:00.000000 |
| certfr-2019-ale-003 | Campagnes de rançongiciels | 2019-01-31T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| CERTFR-2019-ALE-003 | Campagnes de rançongiciels | 2019-01-31T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| certfr-2019-ale-002 | Vulnérabilités affectant l'écosystème Microsoft Exchange et Active Directory | 2019-01-30T00:00:00.000000 | 2019-03-06T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0127 | Vulnérabilité dans NetApp ONTAP 9 | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0126 | Vulnérabilité dans ESET Management Agent | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0125 | Multiples vulnérabilités dans les produits Moxa | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0124 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0123 | Multiples vulnérabilités dans Asterisk | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0122 | Multiples vulnérabilités dans Tenable Nessus | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0121 | Vulnérabilité dans les produits Juniper Networks | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0131 | Multiples vulnérabilités dans les produits IBM | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0130 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0129 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0128 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0127 | Vulnérabilité dans NetApp ONTAP 9 | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0126 | Vulnérabilité dans ESET Management Agent | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0125 | Multiples vulnérabilités dans les produits Moxa | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0124 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0123 | Multiples vulnérabilités dans Asterisk | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0122 | Multiples vulnérabilités dans Tenable Nessus | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0121 | Vulnérabilité dans les produits Juniper Networks | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0120 | Multiples vulnérabilités dans les produits F5 | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0119 | Multiples vulnérabilités dans les produits Cisco | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0118 | Multiples vulnérabilités dans les produits Splunk | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| CERTFR-2026-AVI-0120 | Multiples vulnérabilités dans les produits F5 | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| CERTFR-2026-AVI-0119 | Multiples vulnérabilités dans les produits Cisco | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| CERTFR-2026-AVI-0118 | Multiples vulnérabilités dans les produits Splunk | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0117 | Multiples vulnérabilités dans GLPI | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0116 | Vulnérabilité dans les produits Moxa | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0115 | Multiples vulnérabilités dans Tenable Identity Exposure | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0114 | Multiples vulnérabilités dans Google Chrome | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0113 | Vulnérabilité dans Google Pixel | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| CERTFR-2026-AVI-0117 | Multiples vulnérabilités dans GLPI | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000019 | Multiple vulnerabilities in AssetView | 2025-03-25T17:10+09:00 | 2025-03-25T17:10+09:00 |
| jvndb-2025-000018 | Multiple vulnerabilities in home gateway HGW-BL1500HM | 2025-03-19T15:33+09:00 | 2025-03-28T11:48+09:00 |
| jvndb-2025-000020 | +F FS010M vulnerable to OS command injection | 2025-03-18T15:01+09:00 | 2025-03-18T15:01+09:00 |
| jvndb-2025-000017 | hostapd vulnerable to improper processing of RADIUS packets | 2025-03-12T14:19+09:00 | 2025-03-12T14:19+09:00 |
| jvndb-2025-000016 | Multiple vulnerabilities in RemoteView Agent (for Windows) | 2025-03-06T14:27+09:00 | 2025-03-10T15:22+09:00 |
| jvndb-2025-001898 | Multiple vulnerabilities in FutureNet AS series (Industrial Routers) and FA series (Protocol Conversion Machine) | 2025-03-04T14:56+09:00 | 2025-03-04T14:56+09:00 |
| jvndb-2025-001605 | "RoboForm Password Manager" App for Android vulnerable to authentication bypass using an alternate path or channel | 2025-02-20T20:15+09:00 | 2025-02-20T20:15+09:00 |
| jvndb-2025-000014 | Multiple cross-site scripting vulnerabilities in Movable Type | 2025-02-19T16:19+09:00 | 2025-02-19T16:19+09:00 |
| jvndb-2025-000015 | RevoWorks SCVX and RevoWorks Browser vulnerable to incorrect resource transfer between spheres | 2025-02-19T14:51+09:00 | 2025-02-19T14:51+09:00 |
| jvndb-2025-001563 | Out-of-bounds write vulnerability in FUJIFILM Business Innovation Corp. MFPs | 2025-02-18T16:33+09:00 | 2025-02-18T16:33+09:00 |
| jvndb-2025-001562 | Out-of-bounds read vulnerability in OMRON CX-Programmer | 2025-02-18T16:24+09:00 | 2025-02-18T16:24+09:00 |
| jvndb-2025-001548 | Out-of-bounds read vulnerability in Cente middleware | 2025-02-17T18:22+09:00 | 2025-02-17T18:22+09:00 |
| jvndb-2025-000012 | Multiple vulnerabilities in The LuxCal Web Calendar | 2025-02-17T13:43+09:00 | 2025-02-17T13:43+09:00 |
| jvndb-2025-000013 | acmailer CGI and acmailer DB vulnerable to OS command injection | 2025-02-14T16:39+09:00 | 2025-02-14T16:39+09:00 |
| jvndb-2025-000002 | Multiple vulnerabilities in NEC Aterm series (NV25-003) | 2025-02-14T15:48+09:00 | 2025-02-14T15:48+09:00 |
| jvndb-2025-000011 | Multiple vulnerabilities in FileMegane | 2025-02-13T13:39+09:00 | 2025-02-13T13:39+09:00 |
| jvndb-2025-000010 | acmailer vulnerable to cross-site scripting | 2025-02-12T15:05+09:00 | 2025-02-12T15:05+09:00 |
| jvndb-2025-001017 | Multiple vulnerabilities in STEALTHONE D220/D340/D440 | 2025-02-06T18:27+09:00 | 2025-02-06T18:27+09:00 |
| jvndb-2025-001016 | OMRON NJ/NX series vulnerable to path traversal | 2025-02-06T18:27+09:00 | 2025-05-08T17:44+09:00 |
| jvndb-2025-001018 | Improper restriction of XML external entity reference (XXE) vulnerability in OMRON NB-Designer | 2025-02-06T18:26+09:00 | 2025-02-06T18:26+09:00 |
| jvndb-2025-000008 | Multiple vulnerabilities in Defense Platform Home Edition | 2025-02-05T14:06+09:00 | 2025-02-05T14:06+09:00 |
| jvndb-2025-000009 | WordPress Plugin "Activity Log WinterLock" vulnerable to cross-site request forgery | 2025-02-04T13:58+09:00 | 2025-02-04T13:58+09:00 |
| jvndb-2025-001244 | Clickjacking Vulnerability in JP1/ServerConductor/Deployment Manager | 2025-01-30T18:19+09:00 | 2025-01-30T18:19+09:00 |
| jvndb-2025-000007 | SXF Common Library vulnerable to improper input data handling | 2025-01-29T14:57+09:00 | 2025-01-29T14:57+09:00 |
| jvndb-2025-001238 | Multiple out-of-bounds write vulnerabilities in Canon Office/Small Office Multifunction Printers and Laser Printers | 2025-01-29T13:41+09:00 | 2025-05-27T16:06+09:00 |
| jvndb-2025-000006 | WordPress Plugin "Simple Image Sizes" vulnerable to cross-site scripting | 2025-01-28T13:44+09:00 | 2025-01-28T13:44+09:00 |
| jvndb-2025-000005 | EXIF Viewer Classic vulnerable to cross-site scripting | 2025-01-27T14:25+09:00 | 2025-01-27T14:25+09:00 |
| jvndb-2025-000004 | Multiple vulnerabilities in I-O DATA router UD-LT2 | 2025-01-22T13:55+09:00 | 2025-02-20T15:55+09:00 |
| jvndb-2025-000003 | FortiWeb vulnerable to SQL injection | 2025-01-21T15:59+09:00 | 2025-01-21T15:59+09:00 |
| jvndb-2025-001027 | Linux Ratfor vulnerable to stack-based buffer overflow | 2025-01-16T13:27+09:00 | 2025-01-16T13:27+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-08750 | Microsoft Graphics Kernel竞争条件问题漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-08749 | Microsoft Graphics Component资源管理错误漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-08748 | Microsoft Excel访问控制错误漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-08747 | Microsoft Excel代码执行漏洞(CNVD-2026-08747) | 2026-01-19 | 2026-01-22 |
| cnvd-2026-08746 | Microsoft Excel代码执行漏洞(CNVD-2026-08746) | 2026-01-19 | 2026-01-22 |
| cnvd-2026-08444 | Online Course Registration System /manage-students.php文件SQL注入漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08443 | Online Course Registration System /enroll.php文件SQL注入漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08435 | iccDEV CIccSingleSampledeCurveXml类的类型混淆漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08434 | iccDEV CIccCLUT::Init函数未定义行为漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08433 | iccDEV未定义行为漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08432 | iccDEV内存泄漏漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08431 | iccDEV CIccXmlArrayType::ParseTextCountNum函数整数溢出漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08430 | iccDEV CIccXform::Create函数释放后重用漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08429 | iccDEV Unicode缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08428 | iccDEV CIccTagText::Read函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08427 | iccDEV CIccTagLut8::Validate函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08426 | iccDEV CIccTagLut16::Validate函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08425 | iccDEV CIccSparseMatrix::CIccSparseMatrix函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08424 | iccDEV CIccProfile::LoadTag函数输入验证不当漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08423 | iccDEV CIccMBB::Validate函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08422 | iccDEV CIccCalculatorFunc::SequenceNeedTempReset函数越界读取漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08421 | iccDEV ICC颜色配置文件未定义行为漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08420 | iccDEV计算器解析器堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08419 | iccDEV CIccProfileXml::ParseBasic函数空指针取消引用漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07954 | iccDEV拒绝服务漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07953 | iccDEV空指针成员调用漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07952 | iccDEV未知标签解析器空指针取消引用漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07951 | iccDEV ICC色彩配置文件空指针取消引用漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07950 | iccDEV数字错误漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07949 | iccDEV CIccTagLutAtoB::Validate函数未定义行为漏洞 | 2026-01-19 | 2026-01-26 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01498 | Уязвимость функции si_parse_power_table() ядра операционной системы Linux, позволяющая на… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01497 | Уязвимость плагина Rule Based Authorization Plugin поискового сервера Apache Solr, позвол… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01496 | Уязвимость функции radeon_atombios_fini() модуля drivers/gpu/drm/radeon/radeon_device.c д… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01495 | Уязвимость функции fromSetWifiGusetBasic() микропрограммного обеспечения маршрутизаторов … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01494 | Уязвимость функции type_show() ядра операционной системы Linux, позволяющая нарушителю ок… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01493 | Уязвимость функции sanity_check_curseg() ядра операционной системы Linux, позволяющая нар… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01492 | Уязвимость веб-интерфейса сервера для управления программами Fortinet FortiClient Enterpr… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01491 | Уязвимость функции fc_exch_abts_resp() ядра операционной системы Linux, позволяющая наруш… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01490 | Уязвимость функции ipc_msg_send_request() ядра операционной системы Linux, позволяющая на… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01489 | Уязвимость функции OnAssocReq() ядра операционной системы Linux, позволяющая нарушителю о… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01488 | Уязвимость функции ext4_truncate() модуля fs/ext4/inode.c файловой системы Ext4 ядра опер… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01487 | Уязвимость функции swap_inode_boot_loader() модуля fs/ext4/ioctl.c файловой системы Ext4 … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01486 | Уязвимость функции pci_device_is_present() модуля drivers/pci/pci.c драйвера устройств PC… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01485 | Уязвимость функции ath11k_dp_rx_mon_deliver() модуля drivers/net/wireless/ath/ath11k/dp_r… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01484 | Уязвимость функций raid0_run() (drivers/md/raid0.c) и raid10_run() (drivers/md/raid10.c) … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01483 | Уязвимость функции _regulator_do_enable() модуля drivers/regulator/core.c драйвера регуля… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01468 | Уязвимость библиотеки преобразования путей path-to-regexp, связанная с неэффективной вычи… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01467 | Уязвимость сервера для разработки Metro Development Server, связанная с непринятием мер п… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01466 | Уязвимость компонента Duo Workflow Service сервиса для взаимодействия с внешними LLM-пров… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01465 | Уязвимость функции lookup_ioctl() модуля drivers/md/dm-ioctl.c драйвера поддержки несколь… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01464 | Уязвимость функции __mcheck_cpu_apply_quirks() модуля arch/x86/kernel/cpu/mce/core.c подд… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01463 | Уязвимость функции nwl_dsi_bridge_mode_set() модуля drivers/gpu/drm/bridge/nwl-dsi.c драй… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01462 | Уязвимость функции status_resync() модуля drivers/md/md.c драйвера нескольких устройств (… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01461 | Уязвимость функции vb2ops_vdec_queue_setup() модуля drivers/media/platform/mediatek/vcode… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01460 | Уязвимость функции nilfs_evict_inode() модуля fs/nilfs2/inode.c файловой системы NILFS2 я… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01459 | Уязвимость функции mpi_cmp_ui() модуля lib/crypto/mpi/mpi-cmp.c ядра операционной системы… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01458 | Уязвимость функции f2fs_abort_atomic_write() модуля fs/f2fs/segment.c файловой системы F2… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01457 | Уязвимость функции nilfs_bmap_lookup_at_level() модуля fs/nilfs2/bmap.c файловой системы … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01456 | Уязвимость функции __hfs_bnode_create() модуля fs/hfs/bnode.c файловой системы ядра опера… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01455 | Уязвимость функции nilfs_prepare_segment_for_recovery() модуля fs/nilfs2/recovery.c подде… | 09.02.2026 | 09.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202210-1888 | When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_R… | 2024-07-23T21:58:55.307000Z |
| var-202004-0061 | The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7… | 2024-07-23T21:58:31.314000Z |
| var-201804-1185 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T21:58:31.021000Z |
| var-201012-0287 | Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome b… | 2024-07-23T21:58:30.837000Z |
| var-202112-0566 | Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2… | 2024-07-23T21:58:00.289000Z |
| var-201903-0926 | An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9… | 2024-07-23T21:57:59.201000Z |
| var-200110-0192 | OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key… | 2024-07-23T21:57:58.746000Z |
| var-202012-1529 | A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion se… | 2024-07-23T21:57:50.923000Z |
| var-201711-0007 | A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1… | 2024-07-23T21:57:50.988000Z |
| var-201904-1414 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:57:11.524000Z |
| var-202206-1157 | Incomplete cleanup in specific special register write operations for some Intel(R) Proces… | 2024-07-23T21:57:10.821000Z |
| var-200810-0140 | Unspecified vulnerability in Finder in Mac OS X 10.5.5 allows user-assisted attackers to … | 2024-07-23T21:57:09.157000Z |
| var-201108-0184 | Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and … | 2024-07-23T21:56:59.027000Z |
| var-200809-0176 | sys/netinet6/icmp6.c in the kernel in FreeBSD 6.3 through 7.1, NetBSD 3.0 through 4.0, an… | 2024-07-23T21:56:59.282000Z |
| var-202210-1203 | Git is an open source, scalable, distributed revision control system. `git shell` is a re… | 2024-07-23T21:56:58.153000Z |
| var-201304-0178 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:56:58.917000Z |
| var-200703-0011 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted at… | 2024-07-23T21:56:58.629000Z |
| var-201904-0746 | A race condition was addressed with additional validation. This issue affected versions p… | 2024-07-23T21:56:56.832000Z |
| var-201406-0230 | The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel… | 2024-07-23T21:56:56.921000Z |
| var-201110-0443 | The ospf_flood function in ospf_flood.c in ospfd in Quagga before 0.99.19 allows remote a… | 2024-07-23T21:56:49.016000Z |
| var-201912-1864 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:56:48.951000Z |
| var-201806-1445 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2024-07-23T21:56:47.636000Z |
| var-201708-1547 | The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers… | 2024-07-23T21:56:47.739000Z |
| var-201712-0280 | An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari be… | 2024-07-23T21:56:39.563000Z |
| var-200609-1276 | The Security Framework in Apple Mac OS X 10.4 through 10.4.8 allows remote attackers to c… | 2024-07-23T21:56:38.677000Z |
| var-202203-0131 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:56:37.654000Z |
| var-201412-0613 | Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers … | 2024-07-23T21:56:37.541000Z |
| var-200703-0012 | Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to… | 2024-07-23T21:56:37.438000Z |
| var-200906-0617 | The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly ini… | 2024-07-23T21:56:36.646000Z |
| var-200701-0517 | Untrusted search path vulnerability in writeconfig in Apple Mac OS X 10.4.8 allows local … | 2024-07-23T21:56:15.579000Z |