Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43366 |
N/A
|
io_uring/kbuf: check if target buffer list is still le… |
Linux |
Linux |
2026-05-08T14:21:19.191Z | 2026-05-08T14:21:19.191Z |
| CVE-2026-43365 |
N/A
|
xfs: fix undersized l_iclog_roundoff values |
Linux |
Linux |
2026-05-08T14:21:18.405Z | 2026-05-08T14:21:18.405Z |
| CVE-2026-43364 |
N/A
|
ublk: fix NULL pointer dereference in ublk_ctrl_set_size() |
Linux |
Linux |
2026-05-08T14:21:17.654Z | 2026-05-08T14:21:17.654Z |
| CVE-2026-43363 |
N/A
|
x86/apic: Disable x2apic on resume if the kernel expects so |
Linux |
Linux |
2026-05-08T14:21:16.986Z | 2026-05-08T14:21:16.986Z |
| CVE-2026-43362 |
N/A
|
smb: client: fix in-place encryption corruption in SMB… |
Linux |
Linux |
2026-05-08T14:21:16.358Z | 2026-05-09T04:10:40.255Z |
| CVE-2026-43361 |
N/A
|
btrfs: fix transaction abort when snapshotting receive… |
Linux |
Linux |
2026-05-08T14:21:15.683Z | 2026-05-08T14:21:15.683Z |
| CVE-2026-43360 |
N/A
|
btrfs: fix transaction abort on file creation due to n… |
Linux |
Linux |
2026-05-08T14:21:15.008Z | 2026-05-08T14:21:15.008Z |
| CVE-2026-43359 |
N/A
|
btrfs: fix transaction abort on set received ioctl due… |
Linux |
Linux |
2026-05-08T14:21:14.357Z | 2026-05-08T14:21:14.357Z |
| CVE-2026-43358 |
N/A
|
btrfs: add missing RCU unlock in error path in try_rel… |
Linux |
Linux |
2026-05-08T14:21:13.719Z | 2026-05-08T14:21:13.719Z |
| CVE-2026-43357 |
N/A
|
iio: gyro: mpu3050-core: fix pm_runtime error handling |
Linux |
Linux |
2026-05-08T14:21:13.050Z | 2026-05-08T14:21:13.050Z |
| CVE-2026-43356 |
N/A
|
iio: imu: adis: Fix NULL pointer dereference in adis_init |
Linux |
Linux |
2026-05-08T14:21:12.373Z | 2026-05-08T14:21:12.373Z |
| CVE-2026-43355 |
N/A
|
iio: light: bh1780: fix PM runtime leak on error path |
Linux |
Linux |
2026-05-08T14:21:11.609Z | 2026-05-08T14:21:11.609Z |
| CVE-2026-43354 |
N/A
|
iio: proximity: hx9023s: Protect against division by z… |
Linux |
Linux |
2026-05-08T14:21:10.949Z | 2026-05-08T14:21:10.949Z |
| CVE-2026-43353 |
N/A
|
i3c: mipi-i3c-hci: Fix race in DMA ring dequeue |
Linux |
Linux |
2026-05-08T14:21:10.282Z | 2026-05-08T14:21:10.282Z |
| CVE-2026-43352 |
N/A
|
i3c: mipi-i3c-hci: Correct RING_CTRL_ABORT handling in… |
Linux |
Linux |
2026-05-08T14:21:09.552Z | 2026-05-08T14:21:09.552Z |
| CVE-2026-43351 |
N/A
|
KVM: arm64: Eagerly init vgic dist/redist on vgic creation |
Linux |
Linux |
2026-05-08T14:21:08.868Z | 2026-05-08T14:21:08.868Z |
| CVE-2026-41512 |
9.9 (3.1)
|
Remote code execution via JavaScript injection in `Bro… |
0din-ai |
ai-scanner |
2026-05-08T13:52:56.263Z | 2026-05-08T21:27:16.514Z |
| CVE-2026-32803 |
3.3 (3.1)
|
Dell PowerScale OneFS versions 9.5.0.0 through 9.… |
Dell |
PowerScale OneFS |
2026-05-08T13:49:36.194Z | 2026-05-08T14:45:06.182Z |
| CVE-2026-41507 |
9.8 (3.1)
|
Remote Code Execution (RCE) via String Literal Injecti… |
mauriciopoppe |
math-codegen |
2026-05-08T13:49:34.091Z | 2026-05-08T14:20:21.285Z |
| CVE-2026-41509 |
6.9 (4.0)
|
Integer underflow in crypto_sign_open() leads to buffe… |
CROSS-signature |
CROSS-implementation |
2026-05-08T13:47:17.770Z | 2026-05-08T14:15:21.680Z |
| CVE-2026-41506 |
4.7 (3.1)
|
go-git Credential leak via cross-host redirect in smar… |
go-git |
go-git |
2026-05-08T13:43:19.911Z | 2026-05-08T13:43:19.911Z |
| CVE-2026-43350 |
N/A
|
smb: client: require a full NFS mode SID before readin… |
Linux |
Linux |
2026-05-08T13:41:53.276Z | 2026-05-08T13:41:53.276Z |
| CVE-2026-43349 |
N/A
|
f2fs: fix to avoid uninit-value access in f2fs_sanity_… |
Linux |
Linux |
2026-05-08T13:41:52.611Z | 2026-05-08T13:41:52.611Z |
| CVE-2026-43348 |
N/A
|
mshv_vtl: Fix vmemmap_shift exceeding MAX_FOLIO_ORDER |
Linux |
Linux |
2026-05-08T13:41:51.909Z | 2026-05-08T13:41:51.909Z |
| CVE-2026-43347 |
N/A
|
arm64: dts: qcom: monaco: Reserve full Gunyah metadata… |
Linux |
Linux |
2026-05-08T13:39:32.598Z | 2026-05-08T13:39:32.598Z |
| CVE-2026-43346 |
N/A
|
ice: ptp: don't WARN when controlling PF is unavailable |
Linux |
Linux |
2026-05-08T13:39:31.930Z | 2026-05-08T13:39:31.930Z |
| CVE-2026-43345 |
N/A
|
net: ipa: fix event ring index not programmed for IPA v5.0+ |
Linux |
Linux |
2026-05-08T13:39:31.222Z | 2026-05-08T13:39:31.222Z |
| CVE-2026-43344 |
N/A
|
perf/x86/intel/uncore: Fix die ID init and look up bugs |
Linux |
Linux |
2026-05-08T13:39:30.537Z | 2026-05-08T13:39:30.537Z |
| CVE-2026-44340 |
8.7 (4.0)
|
PraisonAI: Symlink-extraction bypass of `_safe_extract… |
MervinPraison |
PraisonAI |
2026-05-08T13:38:47.812Z | 2026-05-08T23:22:36.847Z |
| CVE-2026-39816 |
7.5 (4.0)
|
Apache NiFi: Missing Execute Code Required Permission … |
Apache Software Foundation |
Apache NiFi |
2026-05-08T13:38:12.925Z | 2026-05-09T01:12:19.254Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43358 |
N/A
|
btrfs: add missing RCU unlock in error path in try_rel… |
Linux |
Linux |
2026-05-08T14:21:13.719Z | 2026-05-08T14:21:13.719Z |
| CVE-2026-43357 |
N/A
|
iio: gyro: mpu3050-core: fix pm_runtime error handling |
Linux |
Linux |
2026-05-08T14:21:13.050Z | 2026-05-08T14:21:13.050Z |
| CVE-2026-43356 |
N/A
|
iio: imu: adis: Fix NULL pointer dereference in adis_init |
Linux |
Linux |
2026-05-08T14:21:12.373Z | 2026-05-08T14:21:12.373Z |
| CVE-2026-43355 |
N/A
|
iio: light: bh1780: fix PM runtime leak on error path |
Linux |
Linux |
2026-05-08T14:21:11.609Z | 2026-05-08T14:21:11.609Z |
| CVE-2026-43354 |
N/A
|
iio: proximity: hx9023s: Protect against division by z… |
Linux |
Linux |
2026-05-08T14:21:10.949Z | 2026-05-08T14:21:10.949Z |
| CVE-2026-43353 |
N/A
|
i3c: mipi-i3c-hci: Fix race in DMA ring dequeue |
Linux |
Linux |
2026-05-08T14:21:10.282Z | 2026-05-08T14:21:10.282Z |
| CVE-2026-43352 |
N/A
|
i3c: mipi-i3c-hci: Correct RING_CTRL_ABORT handling in… |
Linux |
Linux |
2026-05-08T14:21:09.552Z | 2026-05-08T14:21:09.552Z |
| CVE-2026-43351 |
N/A
|
KVM: arm64: Eagerly init vgic dist/redist on vgic creation |
Linux |
Linux |
2026-05-08T14:21:08.868Z | 2026-05-08T14:21:08.868Z |
| CVE-2026-41588 |
9 (3.1)
|
RELATE: Timing Attack Vulnerability in course/auth.py … |
inducer |
relate |
2026-05-08T14:51:04.993Z | 2026-05-08T23:27:23.515Z |
| CVE-2026-41585 |
6.9 (4.0)
|
ZEBRA: Denial of Service via Interrupted JSON-RPC Requ… |
ZcashFoundation |
zebra |
2026-05-08T15:06:15.309Z | 2026-05-08T21:27:04.066Z |
| CVE-2026-41584 |
9.2 (4.0)
|
ZEBRA: rk Identity Point Panic in Transaction Verification |
ZcashFoundation |
zebra |
2026-05-08T15:05:06.070Z | 2026-05-08T16:04:49.931Z |
| CVE-2026-41583 |
9.3 (4.0)
|
ZEBRA: Consensus Divergence in Transparent Sighash Has… |
ZcashFoundation |
zebra |
2026-05-08T14:55:50.120Z | 2026-05-08T19:42:57.297Z |
| CVE-2026-41576 |
7.1 (3.1)
|
Ajax30/BraveCMS-2.0: Stored HTML Injection in Contact … |
Ajax30 |
BraveCMS-2.0 |
2026-05-08T14:50:40.956Z | 2026-05-08T14:50:40.956Z |
| CVE-2026-41575 |
6.1 (3.1)
|
th30d4y/IP: DOM-Based Cross-Site Scripting (XSS) Vulne… |
th30d4y |
IP |
2026-05-08T14:42:24.109Z | 2026-05-08T16:41:23.602Z |
| CVE-2026-41574 |
9.3 (4.0)
|
Nhost Vulnerable to Account Takeover via OAuth Email V… |
nhost |
nhost |
2026-05-08T14:40:12.409Z | 2026-05-08T23:25:43.790Z |
| CVE-2026-41570 |
7.8 (3.1)
|
PHPUnit: Argument injection via newline in PHP INI val… |
sebastianbergmann |
phpunit |
2026-05-08T14:33:51.630Z | 2026-05-08T16:01:51.929Z |
| CVE-2026-41524 |
8.7 (3.1)
|
Ajax30/BraveCMS-2.0: Stored XSS in Page / Article Content |
Ajax30 |
BraveCMS-2.0 |
2026-05-08T14:50:26.226Z | 2026-05-08T21:27:10.583Z |
| CVE-2026-41487 |
5.3 (4.0)
|
Langfuse: Improper role-based-access control in Langfu… |
langfuse |
langfuse |
2026-05-08T14:27:48.588Z | 2026-05-08T19:44:31.496Z |
| CVE-2026-41308 |
6.5 (3.1)
|
Password Pusher: JSON API `/p.json` file upload alias … |
pglombardo |
PasswordPusher |
2026-05-08T14:30:37.513Z | 2026-05-08T14:30:37.513Z |
| CVE-2026-38361 |
7.5 (3.1)
|
An issue in fohrloop dash-uploader v.0.1.0 throug… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T18:27:31.102Z |
| CVE-2026-37431 |
9.8 (3.1)
|
Beauty Parlour Management System v1.1 was discove… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T18:13:05.252Z |
| CVE-2025-67486 |
8.6 (4.0)
|
Dolibarr has an Authenticated Remote Code Execution vi… |
Dolibarr |
dolibarr |
2026-05-08T14:21:55.693Z | 2026-05-08T15:09:50.897Z |
| CVE-2026-7864 |
6.9 (4.0)
|
Exposure of Sensitive Information to an Unauthorized Actor |
SEPPmail AG |
Secure Email Gateway |
2026-05-08T13:12:17.617Z | 2026-05-08T21:28:00.437Z |
| CVE-2026-44340 |
8.7 (4.0)
|
PraisonAI: Symlink-extraction bypass of `_safe_extract… |
MervinPraison |
PraisonAI |
2026-05-08T13:38:47.812Z | 2026-05-08T23:22:36.847Z |
| CVE-2026-44339 |
8.6 (3.1)
|
PraisonAI has unsafe tool resolution in `ToolExecution… |
MervinPraison |
PraisonAI |
2026-05-08T13:37:09.706Z | 2026-05-08T21:27:22.924Z |
| CVE-2026-44338 |
7.3 (3.1)
|
PraisonAI ships and generates a legacy API server with… |
MervinPraison |
PraisonAI |
2026-05-08T13:35:44.521Z | 2026-05-08T14:14:43.177Z |
| CVE-2026-44337 |
6.3 (3.1)
|
PraisonAI knowledge-store backends interpolate unvalid… |
MervinPraison |
PraisonAI |
2026-05-08T13:33:51.716Z | 2026-05-08T14:19:46.766Z |
| CVE-2026-44336 |
9.4 (4.0)
|
PraisonAI MCP `tools/call` path-traversal and RCE via … |
MervinPraison |
PraisonAI |
2026-05-08T13:32:33.605Z | 2026-05-08T13:32:33.605Z |
| CVE-2026-44335 |
7.7 (4.0)
|
SSRF bypass in PraisonAI |
MervinPraison |
PraisonAI |
2026-05-08T13:26:48.564Z | 2026-05-08T14:46:13.605Z |
| CVE-2026-44334 |
8.4 (3.1)
|
PraisonAI: Unauthenticated RCE via `tool_override.py` |
MervinPraison |
PraisonAI |
2026-05-08T13:25:32.988Z | 2026-05-08T23:20:28.539Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-2024 | The PhotoStack Gallery plugin for WordPress is vulnerable to SQL Injection via the 'postid' paramet… | 2026-02-14T07:16:13.020 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2022 | The Smart Forms plugin for WordPress is vulnerable to unauthorized access of data due to a missing … | 2026-02-14T07:16:12.847 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1988 | The Flexi Product Slider and Grid for WooCommerce plugin for WordPress is vulnerable to Local File … | 2026-02-14T07:16:12.670 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1987 | The Scheduler Widget plugin for WordPress is vulnerable to Insecure Direct Object Reference in all … | 2026-02-14T07:16:12.493 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1985 | The Press3D plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 3D Model Gute… | 2026-02-14T07:16:12.320 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1944 | The CallbackKiller service widget plugin for WordPress is vulnerable to unauthorized modification o… | 2026-02-14T07:16:12.150 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1939 | The Percent to Infograph plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the … | 2026-02-14T07:16:11.977 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1915 | The Simple Plyr plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'poster' … | 2026-02-14T07:16:11.803 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1910 | The UpMenu – Online ordering for restaurants plugin for WordPress is vulnerable to Stored Cross-Sit… | 2026-02-14T07:16:11.633 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1905 | The Sphere Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'width… | 2026-02-14T07:16:11.460 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1903 | The Ravelry Designs Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via th… | 2026-02-14T07:16:11.283 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1901 | The QuestionPro Surveys plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the '… | 2026-02-14T07:16:11.113 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1796 | The StyleBidet plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the URL pat… | 2026-02-14T07:16:10.903 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1795 | The Address Bar Ads plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the UR… | 2026-02-14T07:16:10.733 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1792 | The Geo Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the URL path i… | 2026-02-14T07:16:10.553 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1394 | The WP Quick Contact Us plugin for WordPress is vulnerable to Cross-Site Request Forgery in all ver… | 2026-02-14T07:16:10.343 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1306 | The midi-Synth plugin for WordPress is vulnerable to arbitrary file uploads due to missing file typ… | 2026-02-14T07:16:10.150 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1303 | The MailChimp Campaigns plugin for WordPress is vulnerable to Missing Authorization in all versions… | 2026-02-14T07:16:09.970 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1187 | The ZoomifyWP Free plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'filen… | 2026-02-14T07:16:09.800 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1096 | The Best-wp-google-map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'l… | 2026-02-14T07:16:09.627 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0753 | The Super Simple Contact Form plugin for WordPress is vulnerable to Reflected Cross-Site Scripting … | 2026-02-14T07:16:09.450 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0751 | The Payment Page | Payment Form for Stripe plugin for WordPress is vulnerable to Stored Cross-Site … | 2026-02-14T07:16:09.283 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0745 | The User Language Switch plugin for WordPress is vulnerable to Server-Side Request Forgery in all v… | 2026-02-14T07:16:09.113 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0736 | The Chatbot for WordPress by Collect.chat plugin for WordPress is vulnerable to Stored Cross-Site S… | 2026-02-14T07:16:08.940 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0735 | The User Language Switch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the … | 2026-02-14T07:16:08.770 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0727 | The Accordion and Accordion Slider plugin for WordPress is vulnerable to authorization bypass in al… | 2026-02-14T07:16:08.590 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0693 | The Allow HTML in Category Descriptions plugin for WordPress is vulnerable to Stored Cross-Site Scr… | 2026-02-14T07:16:08.417 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0559 | The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vul… | 2026-02-14T07:16:08.240 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0557 | The WP Data Access plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin… | 2026-02-14T07:16:08.053 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-6792 | The One to one user Chat by WPGuppy plugin for WordPress is vulnerable to unauthorized access of da… | 2026-02-14T07:16:07.270 | 2026-04-15T00:35:42.020 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-f55f-7vqj-q3f7 |
|
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix potent… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-f4x6-g3j5-68gm |
|
In the Linux kernel, the following vulnerability has been resolved: ublk: fix NULL pointer derefer… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-cc5x-4c4f-8gxf |
|
In the Linux kernel, the following vulnerability has been resolved: net: ncsi: fix skb leak in err… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-c4q6-6h64-7hfv |
|
In the Linux kernel, the following vulnerability has been resolved: net: Fix rcu_tasks stall in th… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-c2gp-49q2-6jxp |
|
In the Linux kernel, the following vulnerability has been resolved: mm/damon/core: clear walk_cont… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:27Z |
| ghsa-9m9h-79g2-4xrr |
|
In the Linux kernel, the following vulnerability has been resolved: drm/amd: Fix NULL pointer dere… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-95vc-3rg6-xgp2 |
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: Don't log keys in SMB3 … | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-8cfc-95hv-9rqj |
|
In the Linux kernel, the following vulnerability has been resolved: smb: server: fix use-after-fre… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-7c6h-fgvg-xw96 |
|
In the Linux kernel, the following vulnerability has been resolved: hwmon: (pmbus/q54sj108a2) fix … | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-6782-3g9q-cmg4 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/amd: Fix a few more NULL p… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-53cc-xh3p-4x9v |
|
In the Linux kernel, the following vulnerability has been resolved: net: macb: Shuffle the tx ring… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-4gvv-jqvc-49j6 |
|
In the Linux kernel, the following vulnerability has been resolved: net: nexthop: fix percpu use-a… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-3xxf-f9pw-rwm5 |
|
In the Linux kernel, the following vulnerability has been resolved: net/tcp-ao: Fix MAC comparison… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-3v8x-c22j-hv4q |
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free by u… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-36qq-553f-w4ww |
|
In the Linux kernel, the following vulnerability has been resolved: batman-adv: Avoid double-rtnl_… | 2026-05-08T15:31:26Z | 2026-05-08T15:31:26Z |
| ghsa-xp7f-v245-w3w8 |
7.5 (3.1)
|
An issue in fohrloop dash-uploader v.0.1.0 through v.0.7.0a2 allows a remote attacker to execute ar… | 2026-05-08T15:31:25Z | 2026-05-08T21:31:25Z |
| ghsa-xp2v-4799-gxpw |
|
In the Linux kernel, the following vulnerability has been resolved: iio: gyro: mpu3050-core: fix p… | 2026-05-08T15:31:25Z | 2026-05-08T15:31:25Z |
| ghsa-v9r8-chwp-vmrm |
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix transaction abort w… | 2026-05-08T15:31:25Z | 2026-05-08T15:31:26Z |
| ghsa-r4j8-j92h-3745 |
|
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Eagerly init vgic … | 2026-05-08T15:31:25Z | 2026-05-08T15:31:25Z |
| ghsa-qwc4-m3m3-3g83 |
|
In the Linux kernel, the following vulnerability has been resolved: i3c: mipi-i3c-hci: Correct RIN… | 2026-05-08T15:31:25Z | 2026-05-08T15:31:25Z |
| ghsa-hgfh-gxxh-hw2v |
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: add missing RCU unlock … | 2026-05-08T15:31:25Z | 2026-05-08T15:31:25Z |
| ghsa-fmp3-3p2g-4h8r |
9.8 (3.1)
|
Beauty Parlour Management System v1.1 was discovered to contain a SQL injection vulnerability via t… | 2026-05-08T15:31:25Z | 2026-05-08T21:31:25Z |
| ghsa-fg9p-q72c-pr97 |
|
In the Linux kernel, the following vulnerability has been resolved: iio: light: bh1780: fix PM run… | 2026-05-08T15:31:25Z | 2026-05-08T15:31:25Z |
| ghsa-987g-rmgr-mpfx |
6.9 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.4 exposes server environment variables through an… | 2026-05-08T15:31:25Z | 2026-05-08T15:31:25Z |
| ghsa-72h7-9v8w-vg6c |
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix transaction abort o… | 2026-05-08T15:31:25Z | 2026-05-08T15:31:25Z |
| ghsa-6g6f-cc29-q2wg |
|
In the Linux kernel, the following vulnerability has been resolved: iio: imu: adis: Fix NULL point… | 2026-05-08T15:31:25Z | 2026-05-08T15:31:25Z |
| ghsa-63hq-hrgx-pfwm |
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix transaction abort o… | 2026-05-08T15:31:25Z | 2026-05-08T15:31:26Z |
| ghsa-473v-h78r-2j73 |
|
In the Linux kernel, the following vulnerability has been resolved: i3c: mipi-i3c-hci: Fix race in… | 2026-05-08T15:31:25Z | 2026-05-08T15:31:25Z |
| ghsa-3mqh-w39c-q3pj |
|
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix in-place encr… | 2026-05-08T15:31:25Z | 2026-05-08T15:31:26Z |
| ghsa-354w-x6pj-669w |
|
In the Linux kernel, the following vulnerability has been resolved: iio: proximity: hx9023s: Prote… | 2026-05-08T15:31:25Z | 2026-05-08T15:31:25Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-205 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. When using … | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-19T19:19:01.519824+00:00 |
| pysec-2024-164 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. If an exces… | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-16T21:21:41.436934+00:00 |
| pysec-2024-40 |
|
orjson.loads in orjson before 3.9.15 does not limit recursion for deeply nested JSON documents. | orjson | 2024-02-26T16:28:00+00:00 | 2024-02-26T18:22:26.039698+00:00 |
| pysec-2024-253 |
|
pretix before 2024.1.1 mishandles file validation. | pretix | 2024-02-26T16:28:00+00:00 | 2025-06-11T15:23:51.683422+00:00 |
| pysec-2024-235 |
8.1 (3.1)
|
With the following crawler configuration: ```python from bs4 import BeautifulSoup as Sou… | langchain-exa | 2024-02-26T16:27:49+00:00 | 2025-02-26T02:48:56.937312+00:00 |
| pysec-2024-39 |
|
Versions of the package fastecdsa before 2.3.2 are vulnerable to Use of Uninitialized Var… | fastecdsa | 2024-02-24T05:15:00+00:00 | 2024-02-24T07:19:09.418536+00:00 |
| pysec-2024-241 |
9.6 (3.1)
|
Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untru… | mlflow | 2024-02-23T22:15:55+00:00 | 2025-04-08T10:23:24.946136+00:00 |
| pysec-2024-240 |
9.6 (3.1)
|
Insufficient sanitization in MLflow leads to XSS when running an untrusted recipe. This … | mlflow | 2024-02-23T22:15:55+00:00 | 2025-04-08T10:23:24.900947+00:00 |
| pysec-2024-223 |
9.1 (3.1)
|
Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds … | onnx | 2024-02-23T18:15:50+00:00 | 2025-01-22T16:23:22.060512+00:00 |
| pysec-2024-222 |
7.5 (3.1)
|
Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Trav… | onnx | 2024-02-23T18:15:50+00:00 | 2025-01-22T16:23:21.994731+00:00 |
| pysec-2024-249 |
6.1 (3.1)
|
### Summary On all Label Studio versions prior to 1.11.0, data imported via file upload f… | label-studio | 2024-02-22T22:15:47+00:00 | 2025-05-19T11:22:35.312280+00:00 |
| pysec-2024-226 |
7.8 (3.1)
|
Pymatgen (Python Materials Genomics) is an open-source Python library for materials analy… | pymatgen | 2024-02-21T17:15:09+00:00 | 2025-02-06T00:34:28.734730+00:00 |
| pysec-2024-225 |
7.5 (3.1)
|
cryptography is a package designed to expose cryptographic primitives and recipes to Pyth… | cryptography | 2024-02-21T17:15:09+00:00 | 2025-02-06T00:34:24.427679+00:00 |
| pysec-2024-155 |
7.5 (3.1)
|
cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) … | cbor2 | 2024-02-19T23:15:07+00:00 | 2025-01-14T05:22:09.226388+00:00 |
| pysec-2024-107 |
5.0 (3.1)
|
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modif… | exiv2 | 2024-02-12T23:15:00+00:00 | 2024-10-23T00:00:00+00:00 |
| pysec-2024-106 |
5.0 (3.1)
|
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modif… | exiv2 | 2024-02-12T23:15:00+00:00 | 2024-10-23T00:00:00+00:00 |
| pysec-2024-104 |
5.3 (3.1)
|
A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of … | jwcrypto | 2024-02-12T14:15:00+00:00 | 2024-10-10T17:22:00.587279+00:00 |
| pysec-2024-37 |
6.5 (3.1)
|
nonebot2 is a cross-platform Python asynchronous chatbot framework written in Python. Thi… | nonebot2 | 2024-02-09T23:15:00+00:00 | 2024-02-16T16:22:37.389642+00:00 |
| pysec-2024-125 |
7.5 (3.1)
|
DIRAC is a distributed resource framework. In affected versions any user could get a toke… | dirac | 2024-02-09T00:15:00+00:00 | 2024-11-21T14:22:45.495938+00:00 |
| pysec-2024-150 |
9.8 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. Arrays can … | vyper | 2024-02-07T17:15:00+00:00 | 2024-11-21T14:23:03.024978+00:00 |
| pysec-2024-28 |
|
An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 be… | django | 2024-02-06T22:16:00+00:00 | 2024-02-07T00:25:46.826634+00:00 |
| pysec-2024-36 |
5.5 (3.1)
|
An information disclosure flaw was found in ansible-core due to a failure to respect the … | ansible-core | 2024-02-06T12:15:00+00:00 | 2024-02-14T07:20:09.911618+00:00 |
| pysec-2024-147 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. There is an error in the stack m… | vyper | 2024-02-05T21:15:00+00:00 | 2024-11-21T14:23:02.864019+00:00 |
| pysec-2024-38 |
7.5 (3.1)
|
FastAPI is a web framework for building APIs with Python 3.8+ based on standard Python ty… | fastapi | 2024-02-05T15:15:00+00:00 | 2024-02-16T18:22:32.607118+00:00 |
| pysec-2024-148 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. When calls … | vyper | 2024-02-02T17:15:00+00:00 | 2024-11-21T14:23:02.917464+00:00 |
| pysec-2024-35 |
5.4 (3.1)
|
Versions of the package dash-core-components before 2.13.0; all versions of the package d… | dash | 2024-02-02T05:15:00+00:00 | 2024-02-10T07:18:43.563257+00:00 |
| pysec-2024-149 |
9.8 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In versions… | vyper | 2024-02-01T17:15:00+00:00 | 2024-11-21T14:23:02.970591+00:00 |
| pysec-2024-29 |
4.9 (3.1)
|
OctoPrint is a web interface for 3D printer.s OctoPrint versions up until and including 1… | octoprint | 2024-01-31T18:15:00+00:00 | 2024-02-08T07:19:40.535297+00:00 |
| pysec-2024-127 |
5.3 (3.1)
|
Label Studio is a popular open source data labeling tool. The vulnerability affects all v… | label-studio | 2024-01-31T17:15:00+00:00 | 2024-11-21T14:22:53.294472+00:00 |
| pysec-2024-151 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. Vyper compi… | vyper | 2024-01-30T21:15:00+00:00 | 2024-11-21T14:23:03.091183+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-3161 | Malicious code in apple-internal-telemetry-service (npm) | 2026-04-29T08:00:00Z | 2026-04-30T22:25:08Z |
| mal-2026-3160 | Malicious code in apple-internal-pki-utils (npm) | 2026-04-29T08:00:00Z | 2026-04-30T22:25:08Z |
| mal-2026-3159 | Malicious code in apple-internal-pki-trust-v5 (npm) | 2026-04-29T08:00:00Z | 2026-04-30T22:25:08Z |
| mal-2026-3158 | Malicious code in apple-internal-pki-trust (npm) | 2026-04-29T08:00:00Z | 2026-04-30T22:25:08Z |
| mal-2026-3157 | Malicious code in apple-internal-auth-v3 (npm) | 2026-04-29T08:00:00Z | 2026-04-30T22:25:08Z |
| mal-2026-3156 | Malicious code in apple-infra-ultimate-bypass (npm) | 2026-04-29T08:00:00Z | 2026-04-30T22:25:08Z |
| mal-2026-3155 | Malicious code in apple-infra-network-v2 (npm) | 2026-04-29T08:00:00Z | 2026-04-30T22:25:08Z |
| mal-2026-3154 | Malicious code in apple-infra-gcp-leak (npm) | 2026-04-29T08:00:00Z | 2026-04-30T22:25:08Z |
| mal-2026-3153 | Malicious code in apple-infra-final-escape (npm) | 2026-04-29T08:00:00Z | 2026-04-30T22:25:08Z |
| mal-2026-3152 | Malicious code in apple-coredata-internal-service (npm) | 2026-04-29T08:00:00Z | 2026-04-30T22:25:08Z |
| mal-2026-3151 | Malicious code in apple-cloud-infrastructure-monitor (npm) | 2026-04-29T08:00:00Z | 2026-04-30T22:25:08Z |
| mal-2026-3150 | Malicious code in apple-cktool-api-v2 (npm) | 2026-04-29T08:00:00Z | 2026-04-30T22:25:08Z |
| mal-2026-3149 | Malicious code in agents-a365-runtime (npm) | 2026-04-29T08:00:00Z | 2026-04-30T22:25:08Z |
| mal-2026-3147 | Malicious code in coinmate-typescript-client (npm) | 2026-04-29T06:50:48Z | 2026-04-30T22:25:09Z |
| mal-2026-3146 | Malicious code in timenow-py (PyPI) | 2026-04-29T05:38:44Z | 2026-05-02T23:49:22Z |
| mal-2026-3145 | Malicious code in timenow (PyPI) | 2026-04-29T05:37:53Z | 2026-05-02T23:49:22Z |
| mal-2026-3143 | Malicious code in timemcp-utils (PyPI) | 2026-04-29T05:37:02Z | 2026-05-02T23:49:22Z |
| mal-2026-3144 | Malicious code in timemcp190825790125120985125 (PyPI) | 2026-04-29T05:35:44Z | 2026-05-02T23:49:22Z |
| mal-2026-3142 | Malicious code in timemcp-client (PyPI) | 2026-04-29T05:32:51Z | 2026-05-02T23:49:22Z |
| mal-2026-3141 | Malicious code in coinmate-api (PyPI) | 2026-04-29T05:28:32Z | 2026-04-29T05:28:32Z |
| mal-2026-3137 | Malicious code in core-roblox-utils (PyPI) | 2026-04-28T22:00:06Z | 2026-05-03T20:49:49Z |
| mal-2026-3139 | Malicious code in robase-start (PyPI) | 2026-04-28T21:54:42Z | 2026-05-03T20:49:49Z |
| mal-2026-3138 | Malicious code in robase-apis (PyPI) | 2026-04-28T21:43:59Z | 2026-05-03T20:49:49Z |
| mal-2026-3135 | Malicious code in sf-th-requests (PyPI) | 2026-04-28T21:39:08Z | 2026-05-03T09:57:33Z |
| mal-2026-3136 | Malicious code in timestamp-py (PyPI) | 2026-04-28T21:29:07Z | 2026-05-02T23:49:22Z |
| mal-2026-3134 | Malicious code in timemcp-py (PyPI) | 2026-04-28T20:04:58Z | 2026-05-02T23:49:22Z |
| mal-2026-3133 | Malicious code in fetchapi-syncdata-pypi (PyPI) | 2026-04-28T18:46:19Z | 2026-04-28T18:46:19Z |
| mal-2026-3132 | Malicious code in timemcp (PyPI) | 2026-04-28T18:21:56Z | 2026-05-02T23:49:22Z |
| mal-2026-3140 | Malicious code in fivem-monitor (npm) | 2026-04-28T18:14:53Z | 2026-04-30T22:25:09Z |
| mal-2026-3131 | Malicious code in kcvlib (PyPI) | 2026-04-28T17:24:08Z | 2026-04-28T17:24:08Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0307 | Cisco Prime Infrastructure: Schwachstelle ermöglicht Cross-Site Scripting | 2026-02-04T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0306 | Red Hat Enterprise Linux (pyasn1): Schwachstelle ermöglicht Denial of Service | 2026-02-04T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0305 | Red Hat Enterprise Linux (libsoup): Mehrere Schwachstellen | 2026-02-04T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0303 | OpenClaw: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-02-03T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0302 | Red Hat Enterprise Linux (python-wheel): Schwachstelle ermöglicht Privilegieneskalation und Codeausführung | 2026-02-03T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0297 | Django: Mehrere Schwachstellen | 2026-02-03T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0291 | OpenClaw/Clawdbot: Mehrere Schwachstellen ermöglichen Codeausführung | 2026-02-02T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0290 | Samsung Android: Mehrere Schwachstellen | 2026-02-02T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0289 | Kubernetes (ingress-nginx): Mehrere Schwachstellen | 2026-02-02T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0284 | libxml2 (xmllint): Schwachstelle ermöglicht Denial of Service | 2026-02-02T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| bsi-2026-0001 | Unauthorized access affects VibroLine and AvibiaLine devices | 2026-02-02T13:00:00.000Z | 2026-02-02T13:00:00.000Z |
| wid-sec-w-2026-0280 | Linux Kernel: Mehrere Schwachstellen | 2026-02-01T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0279 | GIMP: Schwachstelle ermöglicht Codeausführung | 2026-02-01T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0278 | OpenClaw: Schwachstelle ermöglicht Codeausführung | 2026-02-01T23:00:00.000+00:00 | 2026-03-01T23:00:00.000+00:00 |
| wid-sec-w-2026-0271 | Keycloak (Admin API): Schwachstelle ermöglicht Offenlegung von Informationen | 2026-02-01T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0269 | SaltStack Salt: Mehrere Schwachstellen | 2026-02-01T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0265 | expat: Schwachstelle ermöglicht Codeausführung | 2026-01-29T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0258 | Red Hat Enterprise Linux (iperf3): Schwachstelle ermöglicht Codeausführung | 2026-01-29T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0250 | Drupal Canvas und CAS: Mehrere Schwachstellen | 2026-01-28T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0246 | Lexmark Laser Printers: Mehrere Schwachstellen ermöglichen Ausführen von beliebigem Programmcode mit Benutzerrechten | 2026-01-28T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0244 | FreeRDP: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0243 | Red Hat OpenShift Container Platform: Schwachstelle ermöglicht Denial of Service | 2026-01-27T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0237 | libpng: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-27T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0235 | Nvidia Treiber: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0234 | OpenSSL: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0233 | vllm: Schwachstelle ermöglicht Offenlegung von Informationen und DoS | 2026-01-27T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0231 | GnuPG und Gpg4win: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0230 | Mozilla Thunderbird: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-27T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0229 | Citrix Systems XenServer und Xen: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-27T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0225 | Xen: Mehrere Schwachstellen | 2026-01-26T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-310-02 | Ubia Ubox (Update A) | 2025-11-06T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-310-01 | Advantech DeviceOn/iEdge | 2025-11-06T07:00:00.000000Z | 2025-11-06T07:00:00.000000Z |
| icsa-25-308-05 | IDIS ICM Viewer | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-04 | Radiometrics VizAir | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-03 | Delta Electronics CNCSoft-G2 | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-02 | Survision License Plate Recognition Camera | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-01 | Fuji Electric Monitouch V-SFT-6 (Update A) | 2025-11-04T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-26-120-02 | AABB PCM600 | 2025-11-03T00:30:00.000000Z | 2026-04-30T06:00:00.000000Z |
| va-25-304-02 | Restaurant Brands International assistant platform multiple vulnerabilities | 2025-10-31T17:02:13Z | 2025-10-31T17:02:13Z |
| va-25-304-01 | ELOG multiple vulnerabilities | 2025-10-31T16:57:24Z | 2025-10-31T16:57:24Z |
| icsa-25-303-02 | Hitachi Energy TropOS | 2025-10-30T06:00:00.000000Z | 2025-10-30T06:00:00.000000Z |
| icsa-25-303-01 | International Standards Organization ISO 15118-2 (Update A) | 2025-10-30T05:00:00.000000Z | 2026-03-17T05:00:00.000000Z |
| icsma-25-301-01 | Vertikal Systems Hospital Manager Backend Services | 2025-10-28T06:00:00.000000Z | 2025-10-28T06:00:00.000000Z |
| icsma-25-296-01 | NIHON KOHDEN Central Monitor CNS-6201 | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-04 | Delta Electronics ASDA-Soft | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-03 | Veeder-Root TLS4B Automatic Tank Gauge System | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-02 | ASKI Energy ALS-Mini-S8 and ALS-Mini-S4 | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-01 | AutomationDirect Productivity Suite | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| va-25-296-01 | Frontier Airlines website publicly available email address validation | 2025-10-23T00:00:00Z | 2025-10-23T00:00:00Z |
| va-25-297-01 | IBM DOORS Next Generation multiple vulnerabilities | 2025-10-22T18:45:47Z | 2026-03-04T00:00:00Z |
| icsma-25-294-01 | Oxford Nanopore Technologies MinKNOW | 2025-10-21T06:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| icsa-25-294-06 | Raisecomm RAX701-GC Series | 2025-10-21T06:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| icsa-25-294-05 | CloudEdge Online Cameras and App | 2025-10-21T06:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| icsa-25-294-02 | Rockwell Automation Compact GuardLogix 5370 | 2025-10-21T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-294-01 | Rockwell Automation 1783-NATR | 2025-10-21T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| va-25-289-01 | OPEXUS FOIAXpress unauthenticated administrator password reset | 2025-10-16T16:43:55Z | 2025-10-16T16:43:55Z |
| icsa-25-289-04 | Rockwell Automation ArmorStart AOP | 2025-10-16T06:00:00.000000Z | 2025-10-16T06:00:00.000000Z |
| icsa-25-289-03 | Rockwell Automation FactoryTalk ViewPoint | 2025-10-16T06:00:00.000000Z | 2025-10-16T06:00:00.000000Z |
| icsa-25-289-02 | Rockwell Automation FactoryTalk Linx | 2025-10-16T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-289-01 | Rockwell Automation FactoryTalk View Machine Edition and PanelView Plus 7 | 2025-10-16T06:00:00.000000Z | 2025-10-16T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ncs-hybridacl-crmzffkq | Cisco IOS XR Software Hybrid Access Control List Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-multicast-ermrsvq7 | Cisco IOS XR Software for ASR 9000 Series Routers Layer 3 Multicast Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-modular-acl-u5mepxmm | Cisco IOS XR Software Access Control List Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-ipv4uni-lfm3cfbu | Cisco IOS XR Software for ASR 9000 Series Routers IPv4 Unicast Packets Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-iosxr-priv-esc-gfqjxvof | Cisco IOS XR Software CLI Privilege Escalation Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-iosxr-bgp-dos-o7stephx | Cisco IOS XR Software Border Gateway Protocol Confederation Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-ios-xr-verii-bypass-hhpwqrvx | Cisco IOS XR Software Image Verification Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-tms-xss-vuln-wbtcywxg | Cisco TelePresence Management Suite Cross-Site Scripting Vulnerability | 2025-03-05T16:00:00+00:00 | 2025-03-05T16:44:57+00:00 |
| cisco-sa-secure-dll-injection-aoyzeqsg | Cisco Secure Client for Windows with Secure Firewall Posture Engine DLL Hijacking Vulnerability | 2025-03-05T16:00:00+00:00 | 2025-03-05T16:00:00+00:00 |
| cisco-sa-webex-credexp-xmn85y6 | Cisco Webex for BroadWorks Credential Exposure Vulnerability | 2025-03-04T16:00:00+00:00 | 2025-04-01T13:40:00+00:00 |
| cisco-sa-nxos-ici-dpojbwxk | Cisco Nexus 3000 and 9000 Series Switches Command Injection Vulnerability | 2025-02-26T16:00:00+00:00 | 2025-02-26T16:00:00+00:00 |
| cisco-sa-n3kn9k-healthdos-eoqswk4g | Cisco Nexus 3000 and 9000 Series Switches Health Monitoring Diagnostics Denial of Service Vulnerability | 2025-02-26T16:00:00+00:00 | 2025-02-26T16:00:00+00:00 |
| cisco-sa-apic-multi-vulns-9ummtg5 | Cisco Application Policy Infrastructure Controller Vulnerabilities | 2025-02-26T16:00:00+00:00 | 2025-02-26T16:00:00+00:00 |
| cisco-sa-phone-info-disc-yyxswstk | Cisco Video Phone 8875 and Desk Phone 9800 Series Information Disclosure Vulnerability | 2025-02-19T16:00:00+00:00 | 2025-02-19T16:00:00+00:00 |
| cisco-sa-esa-mailpol-bypass-5nvcjzmw | Cisco Secure Email Gateway Email Filter Bypass Vulnerability | 2025-02-19T16:00:00+00:00 | 2025-02-19T16:00:00+00:00 |
| cisco-sa-broadworks-xss-gdpgj58p | Cisco BroadWorks Application Delivery Platform Cross-Site Scripting Vulnerability | 2025-02-19T16:00:00+00:00 | 2025-02-19T16:00:00+00:00 |
| cisco-sa-swa-range-bypass-2bsehysu | Cisco Secure Web Appliance Range Request Bypass Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-snmp-dos-sdxnsucw | Cisco IOS, IOS XE, and IOS XR Software SNMP Denial of Service Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-03-12T15:22:33+00:00 |
| cisco-sa-ise-xss-42tgsdmg | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2026-05-05T18:21:38+00:00 |
| cisco-sa-ise-multivuls-ftw9aoxf | Cisco Identity Services Engine Insecure Java Deserialization and Authorization Bypass Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-02-10T20:23:50+00:00 |
| cisco-sa-expressway-xss-uexuzrew | Cisco Expressway Series Cross-Site Scripting Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-esa-sma-xss-wck2wcug | Cisco Secure Email and Web Manager and Secure Email Gateway Cross-Site Scripting Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-esa-sma-wsa-snmp-inf-fqpvl8sx | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance SNMP Polling Information Disclosure Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-esa-sma-wsa-multi-ykujhs34 | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-02-07T19:21:57+00:00 |
| cisco-sa-cmm-privesc-uy2vf8pc | Cisco Meeting Management REST API Privilege Escalation Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-clamav-ole2-h549rpha | ClamAV OLE2 File Format Decryption Denial of Service Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-bw-sip-dos-msysbrmt | Cisco BroadWorks SIP Denial of Service Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-xwork-xss-kccg7wwu | Cisco Crosswork Network Controller Stored Cross-Site Scripting Vulnerabilities | 2025-01-08T16:00:00+00:00 | 2025-01-08T16:00:00+00:00 |
| cisco-sa-thousandeyes-cert-pqtjuv9n | Cisco ThousandEyes Endpoint Agent for MacOS and RoomOS Certificate Validation Vulnerability | 2025-01-08T16:00:00+00:00 | 2025-01-13T22:15:18+00:00 |
| cisco-sa-cspc-xss-cdojzyh | Cisco Common Services Platform Collector Cross-Site Scripting Vulnerabilities | 2025-01-08T16:00:00+00:00 | 2025-01-08T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-27929 | Windows LUA File Virtualization Filter Driver Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27928 | Windows Hello Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27927 | Windows Projected File System Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27926 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27925 | Windows UPnP Device Host Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27924 | Desktop Window Manager Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27923 | Desktop Window Manager Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27922 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27921 | Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27920 | Windows UPnP Device Host Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27919 | Windows UPnP Device Host Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27918 | Windows Shell Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27917 | Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27916 | Windows UPnP Device Host Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27915 | Windows UPnP Device Host Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27914 | Microsoft Management Console Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27913 | Windows BitLocker Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27912 | Windows Kerberos Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27911 | Windows User Interface Core Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27910 | Windows Installer Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27909 | Windows Search Service Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27908 | Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27907 | Windows Storage Spaces Controller Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27906 | Windows Hello Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26184 | Windows Projected File System Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26183 | Remote Access Management service/API (RPC server) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26182 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26181 | Microsoft Brokering File System Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26180 | Windows Kernel Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26179 | Windows Kernel Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0301 | Kwetsbaarheden verholpen in VMware NSX | 2025-09-30T08:29:24.969885Z | 2025-09-30T08:29:24.969885Z |
| ncsc-2025-0300 | Kwetsbaarheden verholpen in GitLab EE & CE | 2025-09-29T09:40:53.033373Z | 2025-09-29T09:40:53.033373Z |
| ncsc-2025-0299 | Kwetsbaarheden verholpen in Zenitel ICX500 en ICX510 Gateway | 2025-09-26T07:00:18.729367Z | 2025-09-26T07:00:18.729367Z |
| ncsc-2025-0298 | Kwetsbaarheden verholpen in Cisco Secure Firewall ASA en FTD | 2025-09-25T18:17:20.040958Z | 2025-09-25T18:17:20.040958Z |
| ncsc-2025-0297 | Kwetsbaarheden verholpen in Cisco IOS en Cisco IOS XE Software | 2025-09-25T09:20:07.678881Z | 2025-09-25T10:42:19.129323Z |
| ncsc-2025-0296 | Kwetsbaarheid verholpen in WatchGuard Fireware OS | 2025-09-19T13:31:26.392203Z | 2025-10-17T08:19:28.145953Z |
| ncsc-2025-0295 | Kwetsbaarheid verholpen in Fortra's GoAnywhere MFT | 2025-09-19T12:26:42.186246Z | 2025-09-19T12:26:42.186246Z |
| ncsc-2025-0294 | Kwetsbaarheden verholpen in HPE Aruba Networking EdgeConnect SD-WAN Gateways | 2025-09-18T12:02:45.239087Z | 2025-09-18T12:02:45.239087Z |
| ncsc-2025-0293 | Kwetsbaarheden verholpen in Spring Framework | 2025-09-16T13:38:44.960337Z | 2025-09-16T13:38:44.960337Z |
| ncsc-2025-0292 | Kwetsbaarheden verholpen in Ivanti producten | 2025-09-16T12:21:50.959347Z | 2025-09-16T12:21:50.959347Z |
| ncsc-2025-0291 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-09-16T11:17:27.365694Z | 2025-09-16T11:17:27.365694Z |
| ncsc-2025-0290 | Kwetsbaarheden verholpen in Apple macOS | 2025-09-16T11:16:20.572265Z | 2025-09-16T11:16:20.572265Z |
| ncsc-2025-0289 | Kwetsbaarheden verholpen in Omnissa Workspace ONE UEM | 2025-09-12T15:23:20.359090Z | 2025-09-12T15:23:20.359090Z |
| ncsc-2025-0288 | Kwetsbaarheden verholpen in GitLab CE/EE | 2025-09-12T14:49:52.285990Z | 2025-09-12T14:49:52.285990Z |
| ncsc-2025-0287 | Kwetsbaarheden verholpen in Cisco NX-OS Software | 2025-09-11T08:18:37.706725Z | 2025-09-11T08:18:37.706725Z |
| ncsc-2025-0286 | Kwetsbaarheden verholpen in Cisco IOS XR Software | 2025-09-11T08:14:36.960621Z | 2025-09-11T08:14:36.960621Z |
| ncsc-2025-0285 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-09-10T11:01:43.415733Z | 2025-09-10T11:01:43.415733Z |
| ncsc-2025-0284 | Kwetsbaarheid verholpen in Adobe Commerce en Magento | 2025-09-10T10:49:56.787627Z | 2025-09-10T10:49:56.787627Z |
| ncsc-2025-0283 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-09-10T10:46:54.808276Z | 2025-09-10T10:46:54.808276Z |
| ncsc-2025-0282 | Kwetsbaarheid verholpen in Adobe Dreamweaver | 2025-09-10T10:38:24.553749Z | 2025-09-10T10:38:24.553749Z |
| ncsc-2025-0281 | Kwetsbaarheid verholpen in Adobe ColdFusion | 2025-09-10T10:24:09.409410Z | 2025-09-10T10:24:09.409410Z |
| ncsc-2025-0280 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2025-09-09T18:27:39.956624Z | 2025-09-09T18:27:39.956624Z |
| ncsc-2025-0279 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-09-09T18:25:53.539582Z | 2025-09-09T18:25:53.539582Z |
| ncsc-2025-0278 | Kwetsbaarheden verholpen in Microsoft Office | 2025-09-09T18:23:23.763765Z | 2025-09-09T18:23:23.763765Z |
| ncsc-2025-0277 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-09-09T18:22:30.766030Z | 2025-09-09T18:22:30.766030Z |
| ncsc-2025-0276 | Kwetsbaarheden verholpen in Schneider Electric Saitel | 2025-09-09T15:16:00.122647Z | 2025-09-09T15:16:00.122647Z |
| ncsc-2025-0275 | Kwetsbaarheden verholpen in SAP producten | 2025-09-09T11:12:22.945466Z | 2025-09-09T11:12:22.945466Z |
| ncsc-2025-0274 | Kwetsbaarheden verholpen in Siemens producten | 2025-09-09T11:06:34.785987Z | 2025-09-09T11:06:34.785987Z |
| ncsc-2025-0273 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-09-04T08:15:14.806733Z | 2025-09-04T08:15:14.806733Z |
| ncsc-2025-0272 | Kwetsbaarheid verholpen in FreePBX | 2025-08-29T08:37:54.893549Z | 2025-08-29T08:37:54.893549Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10464-1 | python311-pypdf-6.9.2-1.1 on GA media | 2026-03-30T00:00:00Z | 2026-03-30T00:00:00Z |
| opensuse-su-2026:10463-1 | netty-4.1.132-1.1 on GA media | 2026-03-30T00:00:00Z | 2026-03-30T00:00:00Z |
| opensuse-su-2026:10462-1 | heroic-games-launcher-2.20.1-4.1 on GA media | 2026-03-30T00:00:00Z | 2026-03-30T00:00:00Z |
| opensuse-su-2026:10461-1 | python311-nltk-3.9.4-1.1 on GA media | 2026-03-29T00:00:00Z | 2026-03-29T00:00:00Z |
| opensuse-su-2026:10460-1 | gdk-pixbuf-loader-libheif-1.21.2-2.1 on GA media | 2026-03-29T00:00:00Z | 2026-03-29T00:00:00Z |
| opensuse-su-2026:10459-1 | freerdp2-2.11.7-6.1 on GA media | 2026-03-29T00:00:00Z | 2026-03-29T00:00:00Z |
| opensuse-su-2026:10458-1 | MozillaFirefox-149.0-1.1 on GA media | 2026-03-29T00:00:00Z | 2026-03-29T00:00:00Z |
| opensuse-su-2026:10457-1 | xen-4.21.1_02-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10456-1 | tailscale-1.96.4-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10455-1 | python311-requests-2.33.0-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10454-1 | python311-cryptography-46.0.6-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10453-1 | libpolkit-agent-1-0-127-3.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10452-1 | libjavamapscript-8.6.1-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10451-1 | libpng16-16-1.6.56-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10450-1 | incus-6.23-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10449-1 | gsl-2.8-5.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10448-1 | bind-9.20.21-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10447-1 | MozillaThunderbird-140.9.0-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10446-1 | ImageMagick-7.1.2.18-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:20439-1 | Security update for MozillaFirefox | 2026-03-27T12:32:55Z | 2026-03-27T12:32:55Z |
| opensuse-su-2026:20441-1 | Security update for GraphicsMagick | 2026-03-27T12:17:58Z | 2026-03-27T12:17:58Z |
| opensuse-su-2026:20438-1 | Security update for docker-compose | 2026-03-27T10:04:45Z | 2026-03-27T10:04:45Z |
| opensuse-su-2026:10445-1 | traefik2-2.11.42-1.1 on GA media | 2026-03-27T00:00:00Z | 2026-03-27T00:00:00Z |
| opensuse-su-2026:10444-1 | traefik-3.6.12-1.1 on GA media | 2026-03-27T00:00:00Z | 2026-03-27T00:00:00Z |
| opensuse-su-2026:10443-1 | libsuricata8_0_4-8.0.4-1.1 on GA media | 2026-03-27T00:00:00Z | 2026-03-27T00:00:00Z |
| opensuse-su-2026:10442-1 | dovecot24-2.4.3-1.1 on GA media | 2026-03-27T00:00:00Z | 2026-03-27T00:00:00Z |
| opensuse-su-2026:20437-1 | Security update for net-tools | 2026-03-26T15:12:43Z | 2026-03-26T15:12:43Z |
| opensuse-su-2026:20433-1 | Security update for openexr | 2026-03-26T10:03:06Z | 2026-03-26T10:03:06Z |
| opensuse-su-2026:20432-1 | Security update for fetchmail | 2026-03-26T09:57:56Z | 2026-03-26T09:57:56Z |
| opensuse-su-2026:20427-1 | Security update for chromium | 2026-03-26T06:02:22Z | 2026-03-26T06:02:22Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:11698 | Red Hat Security Advisory: ovn23.09 security update | 2026-04-29T12:42:46+00:00 | 2026-04-29T18:27:21+00:00 |
| rhsa-2026:11696 | Red Hat Security Advisory: ovn23.06 security update | 2026-04-29T12:42:46+00:00 | 2026-04-29T18:27:19+00:00 |
| rhsa-2026:11695 | Red Hat Security Advisory: ovn23.06 security update | 2026-04-29T12:41:00+00:00 | 2026-04-29T18:27:19+00:00 |
| rhsa-2026:11694 | Red Hat Security Advisory: ovn-2021 security update | 2026-04-29T12:40:50+00:00 | 2026-04-29T18:27:19+00:00 |
| rhsa-2026:11688 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.15 | 2026-04-29T12:20:23+00:00 | 2026-05-08T19:47:46+00:00 |
| rhsa-2026:11656 | Red Hat Security Advisory: xorg-x11-server-Xwayland security update | 2026-04-29T12:10:30+00:00 | 2026-05-04T21:18:10+00:00 |
| rhsa-2026:11686 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.15 | 2026-04-29T12:06:04+00:00 | 2026-05-08T14:59:14+00:00 |
| rhsa-2026:11649 | Red Hat Security Advisory: freerdp security update | 2026-04-29T11:31:19+00:00 | 2026-04-30T21:35:12+00:00 |
| rhsa-2026:11635 | Red Hat Security Advisory: PackageKit security update | 2026-04-29T11:30:40+00:00 | 2026-05-04T21:18:22+00:00 |
| rhsa-2026:11651 | Red Hat Security Advisory: freerdp security update | 2026-04-29T11:27:39+00:00 | 2026-04-30T21:35:12+00:00 |
| rhsa-2026:11655 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-29T11:14:59+00:00 | 2026-05-04T21:23:50+00:00 |
| rhsa-2026:10081 | Red Hat Security Advisory: OpenShift Container Platform 4.19.29 bug fix and security update | 2026-04-29T08:54:49+00:00 | 2026-05-08T20:34:04+00:00 |
| rhsa-2026:11509 | Red Hat Security Advisory: vim security update | 2026-04-29T08:26:34+00:00 | 2026-05-04T21:18:21+00:00 |
| rhsa-2026:11521 | Red Hat Security Advisory: sudo security update | 2026-04-29T08:17:54+00:00 | 2026-05-07T02:28:58+00:00 |
| rhsa-2026:11514 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-29T08:11:59+00:00 | 2026-05-07T15:35:38+00:00 |
| rhsa-2026:10093 | Red Hat Security Advisory: OpenShift Container Platform 4.19.29 bug fix and security update | 2026-04-29T08:06:12+00:00 | 2026-05-09T08:54:23+00:00 |
| rhsa-2026:11516 | Red Hat Security Advisory: pcs security update | 2026-04-29T07:45:09+00:00 | 2026-05-07T21:42:44+00:00 |
| rhsa-2026:11507 | Red Hat Security Advisory: grafana security update | 2026-04-29T07:37:39+00:00 | 2026-05-07T15:35:38+00:00 |
| rhsa-2026:11510 | Red Hat Security Advisory: vim security update | 2026-04-29T07:37:34+00:00 | 2026-05-04T21:18:21+00:00 |
| rhsa-2026:10094 | Red Hat Security Advisory: OpenShift Container Platform 4.19.29 security and extras update | 2026-04-29T07:27:54+00:00 | 2026-05-09T08:54:23+00:00 |
| rhsa-2026:11512 | Red Hat Security Advisory: Assisted Installer RHEL 9 components for Multicluster Engine for Kubernetes 2.7.10 | 2026-04-29T07:00:38+00:00 | 2026-05-08T19:47:45+00:00 |
| rhsa-2026:11511 | Red Hat Security Advisory: Assisted Installer RHEL 8 components for Multicluster Engine for Kubernetes 2.7.10 | 2026-04-29T06:59:14+00:00 | 2026-05-07T06:28:32+00:00 |
| rhsa-2026:11504 | Red Hat Security Advisory: PackageKit security update | 2026-04-29T06:33:49+00:00 | 2026-05-04T21:18:22+00:00 |
| rhsa-2026:11493 | Red Hat Security Advisory: pcs security update | 2026-04-29T06:17:04+00:00 | 2026-05-07T21:42:43+00:00 |
| rhsa-2026:11469 | Red Hat Security Advisory: pcs security update | 2026-04-29T06:01:34+00:00 | 2026-05-07T21:42:41+00:00 |
| rhsa-2026:11503 | Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update | 2026-04-29T05:59:17+00:00 | 2026-05-05T14:07:19+00:00 |
| rhsa-2026:11495 | Red Hat Security Advisory: pcs security update | 2026-04-29T05:59:14+00:00 | 2026-05-07T21:42:47+00:00 |
| rhsa-2026:11494 | Red Hat Security Advisory: pcs security update | 2026-04-29T05:57:29+00:00 | 2026-05-07T21:42:43+00:00 |
| rhsa-2026:11471 | Red Hat Security Advisory: pcs security update | 2026-04-29T05:49:04+00:00 | 2026-05-07T21:42:45+00:00 |
| rhsa-2026:11470 | Red Hat Security Advisory: pcs security update | 2026-04-29T05:40:49+00:00 | 2026-05-07T21:42:42+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2020-287-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-10-13T00:00:00.000Z | 2025-06-10T04:00:00.000Z |
| sevd-2020-252-01 | SCADAPack x70 Remote Connect and SCADAPack x70 Security Administrator | 2020-09-08T00:00:00.000Z | 2021-02-09T00:00:00.000Z |
| sevd-2020-224-08 | Schneider Electric PACTware | 2020-08-11T00:00:00.000Z | 2020-08-13T00:00:00.000Z |
| sevd-2020-224-07 | SoMove | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-06 | Harmony® eXLhoist | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-05 | PowerChute Business Edition | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-04 | APC Easy UPS On-Line Software | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-03 | Modicon M218 Logic Controller | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-02 | spaceLYnk & Wiser for KNX (formerly homeLYnk) | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-01 | Schneider Electric Modbus Serial Driver | 2020-08-11T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-196-01 | Schneider Electric Software Update (SESU) | 2020-07-14T00:00:00.000Z | 2020-07-14T00:00:00.000Z |
| sevd-2020-175-01 | Treck TCP/IP Vulnerabilities (Ripple20) | 2020-06-23T16:00:00.000Z | 2022-08-08T13:57:08.970Z |
| sevd-2020-174-01 | APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices | 2020-06-22T00:00:00.000Z | 2021-06-30T00:00:00.000Z |
| sevd-2020-161-05 | Easergy Builder | 2020-06-09T00:00:00.000Z | 2021-05-13T00:00:00.000Z |
| sevd-2020-161-04 | Easergy T300 | 2020-06-09T00:00:00.000Z | 2021-05-13T00:00:00.000Z |
| sevd-2020-161-03 | Modicon LMC078 Logic Controller additional URGENT/11 Fix | 2020-06-09T00:00:00.000Z | 2020-06-09T00:00:00.000Z |
| sevd-2020-161-01 | Modicon M218 Logic Controller | 2020-06-09T00:00:00.000Z | 2020-06-09T00:00:00.000Z |
| sevd-2020-133-03 | U.motion Servers and Touch Panels | 2020-05-12T00:00:00.000Z | 2021-04-15T00:00:00.000Z |
| sevd-2020-133-02 | Vijeo Designer and Vijeo Designer Basic Software | 2020-05-12T00:00:00.000Z | 2020-08-14T00:00:00.000Z |
| sevd-2020-105-03 | Vijeo Designer and Vijeo Designer Basic | 2020-04-14T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-105-02 | Modicon M218/M241/M251/M258 Logic Controllers,SoMachine/SoMachine Motion, EcoStruxure™ Machine Expert | 2020-04-14T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| sevd-2020-105-01 | Modicon M100/M200/M221 controllers, SoMachine Basic and EcoStruxure Machine Expert - Basic Programming Software | 2020-04-14T00:00:00.000Z | 2020-04-14T00:00:00.000Z |
| sevd-2020-080-01 | Modicon Controllers, EcoStruxure™ Control Expert and Unity Pro Programming Software | 2020-03-20T00:00:00.000Z | 2021-05-11T00:00:00.000Z |
| sevd-2020-070-04 | Andover Continuum System | 2020-03-10T00:00:00.000Z | 2020-05-12T00:00:00.000Z |
| sevd-2020-070-03 | ZigBee Installation Toolkit | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-070-02 | Modicon Quantum Ethernet Network module and Quantum / Premium COPRO | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-070-01 | IGSS (Interactive Graphical SCADA System) | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-042-01 | ProSoft Configurator for Modicon PMEPXM0100 (H) | 2020-02-11T00:00:00.000Z | 2020-02-11T00:00:00.000Z |
| sevd-2020-014-01 | MSX Configurator | 2020-01-14T00:00:00.000Z | 2020-01-14T00:00:00.000Z |
| sevd-2019-281-02 | Modicon Controllers | 2019-09-26T12:53:28.000Z | 2024-08-13T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-868282 | SSA-868282: Multiple Vulnerabilities in SINEMA Remote Connect Client before V3.2 HF1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-825651 | SSA-825651: Deserialization Vulnerability in SIMATIC STEP 7 (TIA Portal) before V18 Update 2 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-824889 | SSA-824889: XML File Parsing Vulnerabilities in JT Open and PLM XML SDK | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-779936 | SSA-779936: Catalog-Profile Deserialization Vulnerability in Siemens Engineering Platforms before V19 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-750499 | SSA-750499: Weak Encryption Vulnerability in SIPROTEC 5 Devices | 2024-07-09T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-723487 | SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products | 2024-07-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-722010 | SSA-722010: Datalogics File Parsing Vulnerability in Teamcenter Visualization and JT2Go | 2024-07-09T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-698820 | SSA-698820: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.4 on RUGGEDCOM APE1808 Devices | 2024-07-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-381581 | SSA-381581: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 SP1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-364175 | SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 | 2024-07-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-313039 | SSA-313039: Deserialization Vulnerability in STEP 7 Safety before V19 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-170375 | SSA-170375: Multiple Vulnerabilities in RUGGEDCOM ROS Before V5.9 | 2024-07-09T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-088132 | SSA-088132: Denial of Service Vulnerability in the OPC UA Server Implementations of Several Industrial Products | 2024-07-09T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-064222 | SSA-064222: Multiple File Parsing Vulnerabilities in Simcenter Femap before V2406 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-900277 | SSA-900277: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0012 and V2024.0001 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-879734 | SSA-879734: Multiple Vulnerabilities in SCALANCE XM-400/XR-500 before V6.6.1 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-771940 | SSA-771940: X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-06-11T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-690517 | SSA-690517: Multiple Vulnerabilities in SCALANCE W-700 IEEE 802.11ax Family | 2024-06-11T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-625862 | SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-620338 | SSA-620338: Buffer Overflow Vulnerability in SICAM AK3 / BC / TM | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-540640 | SSA-540640: Improper Privilege Management Vulnerability in Mendix Runtime | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-481506 | SSA-481506: Information Disclosure Vulnerability in SIMATIC S7-200 SMART Devices | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-341067 | SSA-341067: Multiple vulnerabilities in third-party components in ST7 ScadaConnect before V1.1 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-337522 | SSA-337522: Multiple Vulnerabilities in TIM 1531 IRC before V2.4.8 | 2024-06-11T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-319319 | SSA-319319: Denial of Service Vulnerability in TIA Administrator | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-238730 | SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-196737 | SSA-196737: Multiple Vulnerabilities in SINEC Traffic Analyzer Before V1.2 | 2024-06-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-024584 | SSA-024584: Authentication Bypass Vulnerability in PowerSys before V3.11 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-976324 | SSA-976324: Multiple IGS File Parsing Vulnerabilities in PS/IGES Parasolid Translator Component before V27.1.215 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-962515 | SSA-962515: Out of Bounds Read Vulnerability in Industrial Products | 2024-05-14T00:00:00Z | 2024-12-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21291-1 | Security update for podman | 2026-04-23T12:23:33Z | 2026-04-23T12:23:33Z |
| suse-su-2026:21292-1 | Security update for Mesa | 2026-04-23T12:23:32Z | 2026-04-23T12:23:32Z |
| suse-su-2026:21317-1 | Security update for glibc-livepatches | 2026-04-23T12:23:23Z | 2026-04-23T12:23:23Z |
| suse-su-2026:1568-1 | Security update for haproxy | 2026-04-23T12:11:11Z | 2026-04-23T12:11:11Z |
| suse-su-2026:1567-1 | Security update for perl | 2026-04-23T12:10:55Z | 2026-04-23T12:10:55Z |
| suse-su-2026:21290-1 | Security update for gdk-pixbuf | 2026-04-23T12:06:05Z | 2026-04-23T12:06:05Z |
| suse-su-2026:21388-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 16) | 2026-04-23T08:17:31Z | 2026-04-23T08:17:31Z |
| suse-su-2026:21282-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 16) | 2026-04-23T08:17:31Z | 2026-04-23T08:17:31Z |
| suse-su-2026:21387-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 16) | 2026-04-23T08:07:27Z | 2026-04-23T08:07:27Z |
| suse-su-2026:21281-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 16) | 2026-04-23T08:07:27Z | 2026-04-23T08:07:27Z |
| suse-su-2026:21353-1 | Security update for haproxy | 2026-04-23T08:06:25Z | 2026-04-23T08:06:25Z |
| suse-su-2026:21390-1 | Security update for haproxy | 2026-04-23T08:05:16Z | 2026-04-23T08:05:16Z |
| suse-su-2026:21280-1 | Security update for haproxy | 2026-04-23T08:05:16Z | 2026-04-23T08:05:16Z |
| suse-su-2026:1565-1 | Security update for libssh | 2026-04-23T07:08:38Z | 2026-04-23T07:08:38Z |
| suse-su-2026:1563-1 | Security update for the Linux Kernel | 2026-04-23T07:08:02Z | 2026-04-23T07:08:02Z |
| suse-su-2026:1562-1 | Security update for openssl-1_1 | 2026-04-23T07:06:07Z | 2026-04-23T07:06:07Z |
| suse-su-2026:21386-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-04-23T06:55:28Z | 2026-04-23T06:55:28Z |
| suse-su-2026:21279-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-04-23T06:55:28Z | 2026-04-23T06:55:28Z |
| suse-su-2026:1560-1 | Security update for the Linux Kernel (Live Patch 32 for SUSE Linux Enterprise 15 SP5) | 2026-04-23T05:47:32Z | 2026-04-23T05:47:32Z |
| suse-su-2026:21385-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-04-22T23:23:37Z | 2026-04-22T23:23:37Z |
| suse-su-2026:21278-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-04-22T23:23:37Z | 2026-04-22T23:23:37Z |
| suse-su-2026:21382-1 | Security update for python-Pillow | 2026-04-22T21:48:22Z | 2026-04-22T21:48:22Z |
| suse-su-2026:21277-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise 16) | 2026-04-22T21:44:23Z | 2026-04-22T21:44:23Z |
| suse-su-2026:21289-1 | Security update for haproxy | 2026-04-22T17:41:39Z | 2026-04-22T17:41:39Z |
| suse-su-2026:21345-1 | Security update for the Linux Kernel (Live Patch 17 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:23:10Z | 2026-04-22T17:23:10Z |
| suse-su-2026:21304-1 | Security update for the Linux Kernel (Live Patch 17 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:23:10Z | 2026-04-22T17:23:10Z |
| suse-su-2026:21344-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:23:09Z | 2026-04-22T17:23:09Z |
| suse-su-2026:21343-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:23:09Z | 2026-04-22T17:23:09Z |
| suse-su-2026:21303-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:23:09Z | 2026-04-22T17:23:09Z |
| suse-su-2026:21302-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-22T17:23:09Z | 2026-04-22T17:23:09Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:4629 | Important: libvpx security update | 2026-03-16T00:00:00Z | 2026-03-19T12:45:22Z |
| alsa-2026:4473 | Moderate: python3.11 security update | 2026-03-12T00:00:00Z | 2026-03-19T12:33:18Z |
| alsa-2026:4472 | Moderate: compat-openssl11 security update | 2026-03-12T00:00:00Z | 2026-03-16T16:49:36Z |
| alsa-2026:4463 | Moderate: python3.12 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:03:59Z |
| alsa-2026:4458 | Important: .NET 10.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:14:44Z |
| alsa-2026:4456 | Important: .NET 9.0 security update | 2026-03-12T00:00:00Z | 2026-03-16T16:41:08Z |
| alsa-2026:4455 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:11:49Z |
| alsa-2026:4454 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:17:27Z |
| alsa-2026:4453 | Important: .NET 10.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:32:40Z |
| alsa-2026:4451 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:34:29Z |
| alsa-2026:4450 | Important: .NET 9.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:36:54Z |
| alsa-2026:4447 | Important: libvpx security update | 2026-03-12T00:00:00Z | 2026-03-16T16:46:00Z |
| alsa-2026:4445 | Important: .NET 10.0 security update | 2026-03-12T00:00:00Z | 2026-03-16T16:52:17Z |
| alsa-2026:4443 | Important: .NET 9.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:01:07Z |
| alsa-2026:4442 | Moderate: vim security update | 2026-03-12T00:00:00Z | 2026-03-12T14:47:41Z |
| alsa-2026:4306 | Important: mingw-libpng security update | 2026-03-11T00:00:00Z | 2026-03-13T12:35:26Z |
| alsa-2026:4235 | Moderate: nginx:1.26 security update | 2026-03-10T00:00:00Z | 2026-03-11T11:13:12Z |
| alsa-2026:4216 | Moderate: python3.11 security update | 2026-03-10T00:00:00Z | 2026-03-13T09:19:57Z |
| alsa-2026:4188 | Moderate: gnutls security update | 2026-03-10T00:00:00Z | 2026-03-13T09:21:59Z |
| alsa-2026:4177 | Important: opentelemetry-collector security update | 2026-03-10T00:00:00Z | 2026-03-13T09:23:39Z |
| alsa-2026:4174 | Important: opentelemetry-collector security update | 2026-03-10T00:00:00Z | 2026-03-11T17:46:34Z |
| alsa-2026:4173 | Important: gimp security update | 2026-03-10T00:00:00Z | 2026-03-10T19:59:39Z |
| alsa-2026:4168 | Moderate: python3.9 security update | 2026-03-10T00:00:00Z | 2026-03-13T09:26:02Z |
| alsa-2026:4165 | Moderate: python3.12 security update | 2026-03-10T00:00:00Z | 2026-03-10T20:09:00Z |
| alsa-2026:4164 | Important: git-lfs security update | 2026-03-10T00:00:00Z | 2026-03-11T09:33:00Z |
| alsa-2026:4162 | Moderate: mysql8.4 security update | 2026-03-10T00:00:00Z | 2026-03-11T09:43:31Z |
| alsa-2026:4146 | Important: python-pyasn1 security update | 2026-03-10T00:00:00Z | 2026-03-10T08:51:50Z |
| alsa-2026:4110 | Important: postgresql:16 security update | 2026-03-09T00:00:00Z | 2026-03-10T19:55:53Z |
| alsa-2026:4064 | Important: postgresql:12 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:29:57Z |
| alsa-2026:4063 | Important: postgresql:16 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:46:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-357 | Segv on unknown address in pcpp::Packet::computeCalculateFields | 2025-05-12T00:13:14.901744Z | 2025-09-10T14:24:05.862334Z |
| osv-2025-354 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.statement | 2025-05-11T00:17:30.348393Z | 2025-05-11T00:17:30.348809Z |
| osv-2025-352 | Use-of-uninitialized-value in JS_FreeRuntime | 2025-05-10T00:17:01.243609Z | 2025-05-10T00:17:01.243981Z |
| osv-2025-346 | Heap-buffer-overflow in JS_CallInternal | 2025-05-09T00:16:48.213077Z | 2025-05-09T00:16:48.213425Z |
| osv-2025-326 | Heap-use-after-free in __JS_FreeValueRT | 2025-05-05T00:17:02.285374Z | 2025-05-05T00:17:02.285666Z |
| osv-2025-324 | Index-out-of-bounds in dwg_decode_eed | 2025-05-05T00:11:42.580777Z | 2025-05-05T00:11:42.581345Z |
| osv-2025-323 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-05-04T00:19:17.568436Z | 2025-05-04T00:19:17.568755Z |
| osv-2025-321 | Use-of-uninitialized-value in JS_DefineProperty | 2025-05-04T00:16:03.249115Z | 2025-05-04T00:16:03.249427Z |
| osv-2025-312 | Heap-buffer-overflow in ZSTD_decompressMultiFrame | 2025-05-02T00:14:14.459388Z | 2026-04-23T14:09:47.792625Z |
| osv-2025-300 | Negative-size-param in recurse_update_offsets | 2025-04-26T00:15:04.274172Z | 2025-04-26T00:15:04.274471Z |
| osv-2025-298 | Heap-buffer-overflow in i18n::phonenumbers::UnicodeText::const_iterator::operator-- | 2025-04-26T00:02:46.771719Z | 2025-10-11T14:20:31.062038Z |
| osv-2025-291 | Use-of-uninitialized-value in Poco::Net::NTLMCredentials::parseChallengeMessage | 2025-04-20T00:07:34.286645Z | 2025-04-20T00:07:34.287298Z |
| osv-2025-290 | Heap-buffer-overflow in pcpp::TelnetLayer::toString | 2025-04-19T00:05:45.140280Z | 2025-09-25T14:31:44.695948Z |
| osv-2025-289 | Stack-buffer-overflow in ot::Cli::Utils::OutputLine | 2025-04-19T00:05:17.593162Z | 2025-04-19T00:05:17.593788Z |
| osv-2025-280 | Heap-buffer-overflow in Assimp::SceneCombiner::CopyScene | 2025-04-15T00:04:03.423453Z | 2026-05-01T14:27:37.508431Z |
| osv-2025-275 | UNKNOWN READ in void std::__1::vector<unsigned char, std::__1::allocator<unsigned char>>::__cons | 2025-04-14T00:02:37.519708Z | 2025-04-17T14:43:50.559313Z |
| osv-2025-271 | Use-of-uninitialized-value in luaS_new | 2025-04-11T00:04:20.869490Z | 2025-04-11T00:04:20.869967Z |
| osv-2025-267 | Stack-buffer-overflow in snap_usedef | 2025-04-08T00:17:16.034122Z | 2025-07-23T14:22:40.655455Z |
| osv-2025-266 | Heap-buffer-overflow in lj_buf_ruleb128 | 2025-04-08T00:17:06.279554Z | 2026-04-23T14:27:49.452133Z |
| osv-2025-264 | Security exception in org.joni.Parser.parseCharClass | 2025-04-08T00:00:08.174777Z | 2025-04-08T00:00:08.175341Z |
| osv-2025-262 | UNKNOWN WRITE in _lou_handlePassVariableAction | 2025-04-07T00:02:21.621602Z | 2025-09-25T14:33:42.888095Z |
| osv-2025-260 | Heap-buffer-overflow in bfd_getb16 | 2025-04-06T00:00:51.202273Z | 2025-04-06T00:00:51.202704Z |
| osv-2025-258 | Global-buffer-overflow in parseExtraField | 2025-04-05T00:05:58.760780Z | 2025-04-05T00:05:58.761154Z |
| osv-2025-256 | Global-buffer-overflow in QByteArray::QByteArray | 2025-04-05T00:02:36.742745Z | 2025-04-05T00:02:36.743233Z |
| osv-2025-253 | Security exception in org.apache.lucene.analysis.ckb.SoraniNormalizer.normalize | 2025-04-03T00:17:24.000398Z | 2026-02-26T15:05:21.477837Z |
| osv-2025-251 | Heap-buffer-overflow in icu_78::RegexMatcher::MatchChunkAt | 2025-04-02T00:16:00.337471Z | 2025-04-02T00:16:00.337850Z |
| osv-2025-249 | Heap-use-after-free in lj_strfmt_pushvf | 2025-04-02T00:09:53.120387Z | 2025-07-23T14:23:01.826780Z |
| osv-2025-248 | Heap-buffer-overflow in cli_bm_addpatt | 2025-04-02T00:00:13.427589Z | 2025-04-02T00:00:13.428120Z |
| osv-2025-240 | Security exception in com.powsybl.commons.xml.XmlUtil.lambda$skipSubElements$0 | 2025-03-28T00:05:50.145107Z | 2025-03-30T14:32:19.516483Z |
| osv-2025-230 | Heap-buffer-overflow in wasm_loader_prepare_bytecode | 2025-03-22T00:05:22.916187Z | 2025-03-22T00:05:22.916485Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0025 | rustc-serialize is unmaintained | 2025-04-28T12:00:00Z | 2025-04-28T13:38:14Z |
| rustsec-2025-0063 | Possible unsound public API | 2025-04-25T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0038 | Out of bounds access in public safe API | 2025-04-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0031 | Unsound public API in unmaintained crate | 2025-04-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0035 | Multiple soundness issues in `macroquad` | 2025-04-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0024 | crossbeam-channel: double free on Drop | 2025-04-08T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0023 | Broadcast channel calls clone in parallel, but does not require `Sync` | 2025-04-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0022 | Use-After-Free in `Md::fetch` and `Cipher::fetch` | 2025-04-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0021 | SHA-1 collision attacks are not detected | 2025-04-03T12:00:00Z | 2025-04-08T07:10:04Z |
| rustsec-2025-0020 | Risk of buffer overflow in `PyString::from_object` | 2025-04-01T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0033 | Public API without sufficient bounds checking | 2025-03-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0032 | Safe API can cause heap-buffer-overflow | 2025-03-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0019 | `array-init-cursor` in version 0.2.0 and below is unsound when used with types that implement `Drop` | 2025-03-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0018 | Potential out-of-bounds read with a malformed ELF file and the HashTable API. | 2025-03-26T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0017 | The `trust-dns` project has been rebranded to `hickory-dns` | 2025-03-23T12:00:00Z | 2025-03-23T07:00:21Z |
| rustsec-2025-0016 | Use after free in `Parc` and `Prc` due to missing lifetime constraints | 2025-03-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0149 | World Writable Directory in /var/log/below Allows Local Privilege Escalation | 2025-03-12T12:00:00Z | 2026-02-08T07:26:28Z |
| rustsec-2025-0156 | `tree-sitter-pkl` was removed from crates.io for malicious code | 2025-03-10T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0014 | humantime is unmaintained | 2025-03-08T12:00:00Z | 2025-03-13T00:41:50Z |
| rustsec-2025-0009 | Some AES functions may panic when overflow checking is enabled. | 2025-03-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0010 | Versions of *ring* prior to 0.17 are unmaintained. | 2025-03-05T12:00:00Z | 2025-03-07T15:46:47Z |
| rustsec-2025-0012 | `backoff` is unmaintained. | 2025-03-04T12:00:00Z | 2025-08-06T09:33:04Z |
| rustsec-2025-0011 | `openpgp-card-sequoia` is unmaintained. | 2025-03-04T12:00:00Z | 2025-03-07T15:47:21Z |
| rustsec-2025-0008 | Openh264 Decoding Functions Heap Overflow Vulnerability | 2025-02-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0013 | resolve is unmaintained | 2025-02-21T12:00:00Z | 2025-03-07T15:52:15Z |
| rustsec-2025-0007 | *ring* is unmaintained | 2025-02-20T12:00:00Z | 2025-03-06T21:16:59Z |
| rustsec-2025-0015 | Denial of Service via malicious Web Push endpoint | 2025-02-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0159 | `sophosfirewall-python` was removed from crates.io for malicious code | 2025-02-15T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0155 | `rands` was removed from crates.io for malicious code | 2025-02-10T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2025-0030 | totally-safe-transmute allows transmuting any type to any other type in safe Rust | 2025-02-10T12:00:00Z | 2025-05-06T20:14:30Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-java-2026-34282 | 2026-05-06T14:46:19.457Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-34268 | 2026-05-06T14:46:17.850Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-23865 | 2026-05-06T14:46:16.250Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-22021 | 2026-05-06T14:46:14.835Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-22018 | 2026-05-06T14:46:13.467Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-22016 | 2026-05-06T14:46:12.241Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-22013 | 2026-05-06T14:46:10.852Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-22008 | 2026-05-06T14:46:09.450Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-22007 | 2026-05-06T14:46:08.064Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-22003 | 2026-05-06T14:46:06.719Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-21947 | 2026-05-06T14:46:05.330Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-21945 | 2026-05-06T14:46:04.020Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-21933 | 2026-05-06T14:46:02.521Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-21932 | 2026-05-06T14:46:01.161Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-21925 | 2026-05-06T14:45:59.793Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-20676 | 2026-05-06T14:45:58.323Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-20652 | 2026-05-06T14:45:56.875Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-20644 | 2026-05-06T14:45:55.295Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-20636 | 2026-05-06T14:45:53.825Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-20635 | 2026-05-06T14:45:52.367Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2026-20608 | 2026-05-06T14:45:51.105Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-7425 | Libxslt: libxml2: heap use-after-free in libxslt caused by atype corruption in xmlattrptr | 2026-05-06T14:45:49.607Z | 2026-05-08T06:11:36.072Z |
| bit-java-2025-7424 | Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes | 2026-05-06T14:45:48.138Z | 2026-05-08T06:11:36.072Z |
| bit-java-2025-61748 | 2026-05-06T14:45:46.797Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-6052 | Glib: integer overflow in g_string_maybe_expand() leading to potential buffer overflow in glib gstring | 2026-05-06T14:45:45.337Z | 2026-05-08T06:11:36.072Z |
| bit-java-2025-6021 | Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2 | 2026-05-06T14:45:43.734Z | 2026-05-08T06:11:36.072Z |
| bit-java-2025-53066 | 2026-05-06T14:45:42.187Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-53057 | 2026-05-06T14:45:40.894Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-50106 | 2026-05-06T14:45:39.505Z | 2026-05-08T06:11:36.072Z | |
| bit-java-2025-50063 | 2026-05-06T14:45:38.294Z | 2026-05-08T06:11:36.072Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ei62818 | Security fixes for ghsa-3677-xxcr-wjqv, ghsa-qqpg-mvqg-649v, ghsa-x44p-gvrj-pj2r applied in versions: 2.7.2-r0 | 2026-04-01T09:45:31.119946Z | 2026-03-18T05:57:33Z |
| cleanstart-2026-ow14897 | Security fixes for CVE-2025-25285, CVE-2025-69873, CVE-2026-21637, ghsa-23c5-xmqv-rm74, ghsa-72xf-g2v4-qvf3, ghsa-7r86-cg39-jmmj, ghsa-pfrx-2q88-qq97, ghsa-rc47-6667-2j5j, ghsa-rmvr-2pp2-xj38 applied in versions: 2.5.10-r2, 2.5.10-r3, 2.6.0-r1 | 2026-04-01T09:45:25.624227Z | 2026-03-18T07:42:00Z |
| cleanstart-2026-ox88144 | Security fixes for CVE-2025-47911, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61732, CVE-2026-27139 applied in versions: 1.34.1-r0, 1.34.1-r2 | 2026-04-01T09:45:10.149925Z | 2026-03-18T13:13:46Z |
| cleanstart-2026-pk48502 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-68121 applied in versions: 2.3.0-r0 | 2026-04-01T09:45:06.972039Z | 2026-03-18T08:57:33Z |
| cleanstart-2026-gr86205 | Security fixes for CVE-2022-23181, CVE-2022-29885, CVE-2022-34305, CVE-2022-42252, CVE-2022-45143, CVE-2023-24998, CVE-2023-28708, CVE-2026-24515, CVE-2026-25210 applied in versions: 11.0.18-r0, 9.0.58-r0, 9.0.63-r0, 9.0.64-r0, 9.0.68-r0, 9.0.70-r0, 9.0.71-r0, 9.0.73-r0, 9.0.80-r0 | 2026-04-01T09:45:02.431388Z | 2026-03-19T05:47:18Z |
| cleanstart-2026-iy78242 | Security fixes for CVE-2025-61729, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-273p-m2cw-6833, ghsa-4c4x-jm2x-pf9j, ghsa-4qg8-fj49-pxjh, ghsa-59jp-pj84-45mr, ghsa-72c7-4g63-hpw5, ghsa-846p-jg2w-w324, ghsa-9h8m-3fm2-qjrq, ghsa-f6x5-jh6r-wrfv, ghsa-f83f-xpx7-ffpw, ghsa-fcv2-xgw5-pqxf, ghsa-fphv-w9fq-2525, ghsa-fw7p-63qq-7hpr, ghsa-j5w8-q4qc-rx2x, ghsa-jqc5-w2xx-5vq4, ghsa-p436-gjf2-799p, ghsa-whqx-f9j3-ch6m applied in versions: 0.26.0-r0, 0.26.0-r1, 0.26.0-r2, 0.26.0-r3, 0.26.0-r4 | 2026-04-01T09:44:29.089231Z | 2026-03-19T06:58:14Z |
| cleanstart-2026-pj76318 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, ghsa-273p-m2cw-6833, ghsa-4c4x-jm2x-pf9j, ghsa-4qg8-fj49-pxjh, ghsa-846p-jg2w-w324, ghsa-fcv2-xgw5-pqxf, ghsa-fphv-w9fq-2525, ghsa-jqc5-w2xx-5vq4, ghsa-whqx-f9j3-ch6m applied in versions: 1.14.1-r0, 1.14.1-r1, 1.14.1-r2, 1.14.1-r3 | 2026-04-01T09:44:23.291711Z | 2026-03-19T06:56:15Z |
| cleanstart-2026-mq21261 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142 applied in versions: 1.5.1-r0, 1.5.1-r1, 1.5.1-r2, 1.5.1-r3 | 2026-04-01T09:43:56.426341Z | 2026-03-19T07:05:59Z |
| cleanstart-2026-bt99405 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.29.2-r0, 1.29.2-r1 | 2026-04-01T09:43:54.267145Z | 2026-03-19T07:01:48Z |
| cleanstart-2026-qb67682 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.2-r1, 3.3.3-r0 | 2026-04-01T09:43:42.917590Z | 2026-03-19T07:11:57Z |
| cleanstart-2026-gs57401 | Security fixes for CVE-2025-69873, CVE-2026-1525, CVE-2026-1526, CVE-2026-1527, CVE-2026-1528, CVE-2026-2229, CVE-2026-2327, CVE-2026-2391, CVE-2026-25128, CVE-2026-25547, CVE-2026-2581, CVE-2026-25896, CVE-2026-26278, CVE-2026-26960, CVE-2026-27601, CVE-2026-27903, CVE-2026-27904, CVE-2026-27942, CVE-2026-28292, CVE-2026-29786, CVE-2026-31802, CVE-2026-32141, CVE-2026-33036, ghsa-23c5-xmqv-rm74, ghsa-25h7-pfq9-p65f, ghsa-2g4f-4pwh-qvx6, ghsa-2mjp-6q6p-2qxm, ghsa-37qj-frw5-hhjh, ghsa-38c4-r59v-3vqw, ghsa-3ppc-4f35-3m26, ghsa-4992-7rv2-5pvq, ghsa-7h2j-956f-4vf2, ghsa-7r86-cg39-jmmj, ghsa-83g3-92jg-28cx, ghsa-8gc5-j5rx-235r, ghsa-8wc6-vgrq-x6cf, ghsa-9ppj-qmqm-q256, ghsa-f269-vfmq-vjvj, ghsa-fj3w-jwp8-x2g3, ghsa-jmr7-xgp7-cmfj, ghsa-m7jm-9gc2-mpf2, ghsa-phc3-fgpg-7m6h, ghsa-qffp-2rhf-9h96, ghsa-qpx9-hpmf-5gmw, ghsa-r275-fr43-pm7q, ghsa-v9p9-hfj2-hcw8, ghsa-vrm6-8vpv-qv8q, ghsa-w7fw-mjwx-w883 applied in versions: 43.4.3-r1 | 2026-04-01T09:43:24.793409Z | 2026-03-19T07:48:38Z |
| cleanstart-2026-gc37751 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-66jq-2c23-2xh5, ghsa-9h8m-3fm2-qjrq applied in versions: 0.65.0-r0, 0.65.0-r1 | 2026-04-01T09:43:05.536029Z | 2026-03-19T07:09:40Z |
| cleanstart-2026-ck42797 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-1229, CVE-2026-25679, CVE-2026-25934, CVE-2026-27139, CVE-2026-27142, ghsa-37cx-329c-33x3 applied in versions: 0.18.0-r1, 1.16.0-r0 | 2026-04-01T09:42:37.879665Z | 2026-03-19T07:29:02Z |
| cleanstart-2026-jd68539 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61732, CVE-2025-68121, ghsa-vvgc-356p-c3xw applied in versions: 1.7.0-r0 | 2026-04-01T09:42:09.713315Z | 2026-03-19T07:35:12Z |
| cleanstart-2026-gx29850 | Security fixes for CVE-2025-61732, CVE-2025-68121 applied in versions: 1.132.0-r0, 1.132.0-r1 | 2026-04-01T09:42:09.716696Z | 2026-03-19T07:32:54Z |
| cleanstart-2026-em40436 | Security fixes for ghsa-8v2v-wjwg-vx6r applied in versions: 1.16.3-r0 | 2026-04-01T09:42:07.970704Z | 2026-03-19T07:29:54Z |
| cleanstart-2026-kj56465 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 5.4.8-r0 | 2026-04-01T09:41:55.075579Z | 2026-03-19T07:57:48Z |
| cleanstart-2026-ax74442 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-01T09:41:13.499618Z | 2026-03-19T12:02:36Z |
| cleanstart-2026-ib04141 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq applied in versions: 3.7.2-r4, 3.7.2-r5 | 2026-04-01T09:40:40.529278Z | 2026-03-19T12:02:36Z |
| cleanstart-2026-qi69220 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-01T09:40:21.793084Z | 2026-03-19T12:02:36Z |
| cleanstart-2026-kt54860 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-01T09:40:18.425287Z | 2026-03-19T12:02:36Z |
| cleanstart-2026-il36032 | Security fixes for CVE-2025-30218, CVE-2025-49005, CVE-2025-65945, ghsa-2mjp-6q6p-2qxm, ghsa-33vc-wfww-vjfv, ghsa-43fc-jf86-j433, ghsa-4992-7rv2-5pvq, ghsa-4hjh-wcwx-xvwj, ghsa-554w-wpv2-vw27, ghsa-5gfm-wpxj-wjgq, ghsa-5jpx-9hw9-2fx4, ghsa-65ch-62r8-g69g, ghsa-869p-cjfg-cm3x, ghsa-968p-4wvh-cqc8, ghsa-9g9p-9gw9-jx7f, ghsa-9qr9-h5gf-34mp, ghsa-f269-vfmq-vjvj, ghsa-fjxv-7rqg-78g4, ghsa-g9mf-h72j-4rw9, ghsa-h25m-26qc-wcjf, ghsa-jmr7-xgp7-cmfj, ghsa-m7jm-9gc2-mpf2, ghsa-mwv6-3258-q52c, ghsa-rcmh-qjqh-p98v, ghsa-v9p9-hfj2-hcw8, ghsa-vrm6-8vpv-qv8q, ghsa-w37m-7fhw-fmv9, ghsa-xxjr-mmjv-4gpg applied in versions: 2.11.0-r0, 2.11.0-r2 | 2026-04-01T09:39:16.823043Z | 2026-03-19T12:59:29Z |
| cleanstart-2026-ix47217 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-26958, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.18.0-r0, 0.19.0-r0 | 2026-04-01T09:39:04.589001Z | 2026-03-19T12:57:20Z |
| cleanstart-2026-ad71344 | Security fixes for CVE-2024-10005, CVE-2024-10006, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.10.7-r1, 1.10.9-r0, 1.10.9-r1, 1.10.9-r2, 1.10.9-r3, 1.9.4-r0 | 2026-04-01T09:38:56.500937Z | 2026-03-20T04:46:15Z |
| cleanstart-2026-di15427 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-26958, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.18.0-r0, 0.19.0-r0 | 2026-04-01T09:38:54.759545Z | 2026-03-19T12:58:08Z |
| cleanstart-2026-dp35743 | Security fixes for CVE-2024-10005, CVE-2024-10006, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24051, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.7.10-r0, 1.7.10-r1, 1.7.10-r2, 1.7.10-r3, 1.9.4-r0 | 2026-04-01T09:38:30.680533Z | 2026-03-20T04:50:14Z |
| cleanstart-2026-om95908 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-qxp5-gwg8-xv66, ghsa-r92c-9c7f-3pj8, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.10.7-r1, 1.11.4-r0, 1.11.5-r0, 1.11.5-r1, 1.11.5-r2, 1.9.4-r0 | 2026-04-01T09:38:28.220463Z | 2026-03-20T04:48:45Z |
| cleanstart-2026-kd93706 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.25.0-r0 | 2026-04-01T09:38:28.023266Z | 2026-03-19T12:59:29Z |
| cleanstart-2026-ls00044 | Security fixes for CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-54410, CVE-2025-58181, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.3.2-r4, 2.3.2-r5, 2.4.4-r2, 2.5.0-r0, 2.5.0-r1 | 2026-04-01T09:38:02.432087Z | 2026-03-20T11:37:58Z |
| cleanstart-2026-hx97842 | Security fixes for CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-54410, CVE-2025-58181, CVE-2025-58190, CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.2.2-r6, 2.3.2-r4, 2.4.4-r2, 2.5.0-r0, 2.5.0-r1 | 2026-04-01T09:37:55.704076Z | 2026-03-20T11:37:58Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2019-ALE-003 | Campagnes de rançongiciels | 2019-01-31T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| certfr-2019-ale-002 | Vulnérabilités affectant l'écosystème Microsoft Exchange et Active Directory | 2019-01-30T00:00:00.000000 | 2019-03-06T00:00:00.000000 |
| CERTFR-2019-ALE-002 | Vulnérabilités affectant l'écosystème Microsoft Exchange et Active Directory | 2019-01-30T00:00:00.000000 | 2019-03-06T00:00:00.000000 |
| certfr-2019-ale-001 | Vulnérabilité dans le gestionnaire de paquets APT | 2019-01-22T00:00:00.000000 | 2019-02-27T00:00:00.000000 |
| CERTFR-2019-ALE-001 | Vulnérabilité dans le gestionnaire de paquets APT | 2019-01-22T00:00:00.000000 | 2019-02-27T00:00:00.000000 |
| certfr-2018-ale-013 | Vulnérabilité dans Microsoft Internet Explorer | 2018-12-20T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| CERTFR-2018-ALE-013 | Vulnérabilité dans Microsoft Internet Explorer | 2018-12-20T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| certfr-2018-ale-012 | Vulnérabilité dans Wallix AdminBastion | 2018-10-26T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| CERTFR-2018-ALE-012 | Vulnérabilité dans Wallix AdminBastion | 2018-10-26T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| certfr-2018-ale-011 | Vulnérabilité dans le client Git | 2018-10-08T00:00:00.000000 | 2018-10-12T00:00:00.000000 |
| CERTFR-2018-ALE-011 | Vulnérabilité dans le client Git | 2018-10-08T00:00:00.000000 | 2018-10-12T00:00:00.000000 |
| certfr-2018-ale-010 | Vulnérabilité activement exploitée dans le framework STRUTS 2 | 2018-08-29T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-009 | Vulnérabilité dans Microsoft Windows | 2018-08-29T00:00:00.000000 | 2018-09-17T00:00:00.000000 |
| CERTFR-2018-ALE-010 | Vulnérabilité activement exploitée dans le framework STRUTS 2 | 2018-08-29T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| CERTFR-2018-ALE-009 | Vulnérabilité dans Microsoft Windows | 2018-08-29T00:00:00.000000 | 2018-09-17T00:00:00.000000 |
| certfr-2018-ale-008 | Campagne de messages électroniques non sollicités de type Locky Locker | 2018-08-03T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| CERTFR-2018-ALE-008 | Campagne de messages électroniques non sollicités de type Locky Locker | 2018-08-03T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-007 | Multiples vulnérabilités dans S/MIME et OpenPGP | 2018-05-14T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| CERTFR-2018-ALE-007 | Multiples vulnérabilités dans S/MIME et OpenPGP | 2018-05-14T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-006 | Vulnérabilité dans Cisco IOS et IOS XE Smart Install Client | 2018-04-06T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| CERTFR-2018-ALE-006 | Vulnérabilité dans Cisco IOS et IOS XE Smart Install Client | 2018-04-06T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-005 | Multiples vulnérabilités dans Drupal | 2018-03-29T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| CERTFR-2018-ALE-005 | Multiples vulnérabilités dans Drupal | 2018-03-29T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-004 | Vulnérabilité dans le serveur de messagerie Exim | 2018-03-07T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| CERTFR-2018-ALE-004 | Vulnérabilité dans le serveur de messagerie Exim | 2018-03-07T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-003 | Vulnérabilité dans Adobe Flash Player | 2018-02-02T00:00:00.000000 | 2018-02-07T00:00:00.000000 |
| CERTFR-2018-ALE-003 | Vulnérabilité dans Adobe Flash Player | 2018-02-02T00:00:00.000000 | 2018-02-07T00:00:00.000000 |
| certfr-2018-ale-002 | Vulnérabilité dans Cisco Adaptive Security Appliance | 2018-02-01T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| CERTFR-2018-ALE-002 | Vulnérabilité dans Cisco Adaptive Security Appliance | 2018-02-01T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| certfr-2018-ale-001 | Multiples vulnérabilités de fuite d'informations dans des processeurs | 2018-01-04T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0312 | Multiples vulnérabilités dans GLPI | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0311 | Vulnérabilité dans Citrix XenServer | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0310 | Multiples vulnérabilités dans MongoDB | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0309 | Multiples vulnérabilités dans Suricata | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0308 | Multiples vulnérabilités dans Node.js | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0307 | Vulnérabilité dans les produits Microsoft | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0306 | Multiples vulnérabilités dans Redmine | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0305 | Multiples vulnérabilités dans Spring AI | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0304 | Multiples vulnérabilités dans Xen | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0303 | Vulnérabilité dans Microsoft Edge | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0302 | Multiples vulnérabilités dans Python | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0301 | Multiples vulnérabilités dans les produits Kaspersky | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0300 | Multiples vulnérabilités dans Mattermost Server | 2026-03-17T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0299 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0298 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0297 | Vulnérabilité dans Google Chrome | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0296 | Vulnérabilité dans OpenSSL | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0295 | Vulnérabilité dans les produits Microsoft | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0294 | Vulnérabilité dans Microsoft Office | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0293 | Vulnérabilité dans Microsoft Edge | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0292 | Multiples vulnérabilités dans les produits IBM | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0291 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0290 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0289 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0288 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0287 | Multiples vulnérabilités dans les produits NetApp | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0286 | Multiples vulnérabilités dans Google Chrome | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0285 | Vulnérabilité dans Python | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0284 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0283 | Vulnérabilité dans Microsoft Edge | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000029 | Multiple vulnerabilities in Quick Agent | 2025-04-25T13:49+09:00 | 2025-04-25T13:49+09:00 |
| jvndb-2025-000028 | i-PRO Configuration Tool vulnerable to use of hard-coded cryptographic key | 2025-04-24T13:50+09:00 | 2025-04-24T13:50+09:00 |
| jvndb-2025-000027 | Active! mail vulnerable to stack-based buffer overflow | 2025-04-18T16:50+09:00 | 2025-04-18T16:50+09:00 |
| jvndb-2025-003213 | TP-Link Deco BE65 Pro vulnerable to OS command injection | 2025-04-11T13:52+09:00 | 2025-04-11T13:52+09:00 |
| jvndb-2025-000026 | Multiple vulnerabilities in BizRobo! | 2025-04-10T15:36+09:00 | 2025-04-10T15:36+09:00 |
| jvndb-2025-003091 | Multiple vulnerabilities in Trend Micro Endpoint security products for enterprises (April 2025) | 2025-04-09T14:55+09:00 | 2025-04-09T14:55+09:00 |
| jvndb-2025-002990 | Multiple vulnerabilities in Inaba Denki Sangyo Wi-Fi AP UNIT 'AC-WPS-11ac series' | 2025-04-07T17:44+09:00 | 2025-04-07T17:44+09:00 |
| jvndb-2025-000025 | WinRAR vulnerable to the symbolic link based "Mark of the Web" check bypass | 2025-04-03T12:29+09:00 | 2025-04-03T12:29+09:00 |
| jvndb-2025-000022 | Multiple vulnerabilities in JTEKT ELECTRONICS CORPORATION's products | 2025-04-02T15:12+09:00 | 2025-04-02T15:12+09:00 |
| jvndb-2025-002790 | Out-of-bounds Write vulnerabilities in Canon Printer Drivers for Production Printers, Office/Small Office Multifunction Printers and Laser Printers | 2025-04-02T15:05+09:00 | 2025-04-02T15:05+09:00 |
| jvndb-2025-000023 | WordPress plugin "Welcart e-Commerce" vulnerable to untrusted data deserialization | 2025-04-01T14:20+09:00 | 2025-04-01T14:20+09:00 |
| jvndb-2025-002714 | Improper symbolic link file handling in FutureNet NXR series, VXR series and WXR series routers | 2025-03-31T16:59+09:00 | 2025-04-03T15:19+09:00 |
| jvndb-2025-000024 | a-blog cms vulnerable to untrusted data deserialization | 2025-03-28T10:46+09:00 | 2025-03-28T10:46+09:00 |
| jvndb-2025-000021 | Multiple vulnerabilities in PowerCMS | 2025-03-26T18:13+09:00 | 2025-03-26T18:13+09:00 |
| jvndb-2025-002592 | Multiple vulnerabilities in CHOCO TEI WATCHER mini | 2025-03-26T13:25+09:00 | 2025-03-26T13:25+09:00 |
| jvndb-2025-000019 | Multiple vulnerabilities in AssetView | 2025-03-25T17:10+09:00 | 2025-03-25T17:10+09:00 |
| jvndb-2025-000018 | Multiple vulnerabilities in home gateway HGW-BL1500HM | 2025-03-19T15:33+09:00 | 2025-03-28T11:48+09:00 |
| jvndb-2025-000020 | +F FS010M vulnerable to OS command injection | 2025-03-18T15:01+09:00 | 2025-03-18T15:01+09:00 |
| jvndb-2025-000017 | hostapd vulnerable to improper processing of RADIUS packets | 2025-03-12T14:19+09:00 | 2025-03-12T14:19+09:00 |
| jvndb-2025-000016 | Multiple vulnerabilities in RemoteView Agent (for Windows) | 2025-03-06T14:27+09:00 | 2025-03-10T15:22+09:00 |
| jvndb-2025-001898 | Multiple vulnerabilities in FutureNet AS series (Industrial Routers) and FA series (Protocol Conversion Machine) | 2025-03-04T14:56+09:00 | 2025-03-04T14:56+09:00 |
| jvndb-2025-001605 | "RoboForm Password Manager" App for Android vulnerable to authentication bypass using an alternate path or channel | 2025-02-20T20:15+09:00 | 2025-02-20T20:15+09:00 |
| jvndb-2025-000014 | Multiple cross-site scripting vulnerabilities in Movable Type | 2025-02-19T16:19+09:00 | 2025-02-19T16:19+09:00 |
| jvndb-2025-000015 | RevoWorks SCVX and RevoWorks Browser vulnerable to incorrect resource transfer between spheres | 2025-02-19T14:51+09:00 | 2025-02-19T14:51+09:00 |
| jvndb-2025-001563 | Out-of-bounds write vulnerability in FUJIFILM Business Innovation Corp. MFPs | 2025-02-18T16:33+09:00 | 2025-02-18T16:33+09:00 |
| jvndb-2025-001562 | Out-of-bounds read vulnerability in OMRON CX-Programmer | 2025-02-18T16:24+09:00 | 2025-02-18T16:24+09:00 |
| jvndb-2025-001548 | Out-of-bounds read vulnerability in Cente middleware | 2025-02-17T18:22+09:00 | 2025-02-17T18:22+09:00 |
| jvndb-2025-000012 | Multiple vulnerabilities in The LuxCal Web Calendar | 2025-02-17T13:43+09:00 | 2025-02-17T13:43+09:00 |
| jvndb-2025-000013 | acmailer CGI and acmailer DB vulnerable to OS command injection | 2025-02-14T16:39+09:00 | 2025-02-14T16:39+09:00 |
| jvndb-2025-000002 | Multiple vulnerabilities in NEC Aterm series (NV25-003) | 2025-02-14T15:48+09:00 | 2025-02-14T15:48+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-16695 | OpenClaw存在未明漏洞(CNVD-2026-16695) | 2026-04-08 | 2026-04-10 |
| cnvd-2026-16694 | OpenClaw存在未明漏洞(CNVD-2026-16694) | 2026-04-08 | 2026-04-10 |
| cnvd-2026-16691 | OpenClaw存在未明漏洞(CNVD-2026-16691) | 2026-04-08 | 2026-04-10 |
| cnvd-2026-16680 | Totolink A3300R命令注入漏洞(CNVD-2026-16680) | 2026-04-08 | 2026-04-09 |
| cnvd-2026-16679 | OpenClaw授权问题漏洞(CNVD-2026-16679) | 2026-04-08 | 2026-04-09 |
| cnvd-2026-16624 | OpenClaw访问控制错误漏洞(CNVD-2026-16624) | 2026-04-08 | 2026-04-09 |
| cnvd-2026-16623 | OpenClaw访问控制错误漏洞(CNVD-2026-16623) | 2026-04-08 | 2026-04-09 |
| cnvd-2026-16622 | OpenClaw授权问题漏洞(CNVD-2026-16622) | 2026-04-08 | 2026-04-09 |
| cnvd-2026-16621 | OpenClaw授权问题漏洞(CNVD-2026-16621) | 2026-04-08 | 2026-04-09 |
| cnvd-2026-16590 | Totolink A3300R命令注入漏洞 | 2026-04-08 | 2026-04-09 |
| cnvd-2026-18424 | Endian Firewall DATE参数操作系统命令注入漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18423 | Endian Firewall DATE参数操作系统命令注入漏洞(CNVD-2026-18423) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18422 | Endian Firewall DATE参数操作系统命令注入漏洞(CNVD-2026-18422) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18419 | Endian Firewall DATE参数操作系统命令注入漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18418 | Endian Firewall remark参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18417 | Endian Firewall remark参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18416 | Endian Firewall NAME参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18415 | Endian Firewall remark参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18414 | Endian Firewall name参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18413 | Endian Firewall name参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18412 | Endian Firewall dscp参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18411 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18411) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18410 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18410) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18409 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18409) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18403 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18403) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18402 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18402) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18401 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18401) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18400 | Endian Firewall remark参数跨站脚本漏洞(CNVD-2026-18400) | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18399 | Endian Firewall mimetypes参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| cnvd-2026-18398 | Endian Firewall user参数跨站脚本漏洞 | 2026-04-07 | 2026-04-24 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01454 | Уязвимость функции rcu_tasks_rude_wait_gp() модуля kernel/rcu/tasks.h ядра операционной с… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01453 | Уязвимость функции gfs2_show_options() модуля fs/gfs2/super.c файловой системы GFS2 ядра … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01452 | Уязвимость функции show_ipi_list() модуля arch/loongarch/kernel/smp.c поддержки архитекту… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01451 | Уязвимость функции ucsi_read_message_in() модуля drivers/usb/typec/ucsi/ucsi.c драйвера п… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01450 | Уязвимость определения структуры imx8mp_blk_ctrl_domain_data{} модуля drivers/pmdomain/im… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01449 | Уязвимость функции free_netvsc_device() модуля drivers/net/hyperv/netvsc.c драйвера подде… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01448 | Уязвимость функции iwl_txq_reclaim() модуля drivers/net/wireless/intel/iwlwifi/queue/tx.c… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01447 | Уязвимость функции x86_android_tablet_remove() модуля drivers/platform/x86/x86-android-ta… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01446 | Уязвимость функции __ext4_fill_super() модуля fs/ext4/super.c ядра операционной системы L… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01445 | Уязвимость функции ena_com_cdesc_rx_pkt_get() модуля drivers/net/ethernet/amazon/ena/ena_… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01444 | Уязвимость функции scrub_submit_extent_sector_read() модуля fs/btrfs/scrub.c поддержки фа… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01443 | Уязвимость функции nvmf_reg_read32() модуля drivers/nvme/host/fabrics.c драйвера поддержк… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01442 | Уязвимость функции kvm_get_mode() модуля arch/arm64/include/asm/kvm_host.h поддержки плат… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01441 | Уязвимость компонента RDMA/mlx5 ядра операционной системы Linux, позволяющая нарушителю в… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01440 | Уязвимость команды WMI_TXSTATUS_EVENTID ядра операционной системы Linux, позволяющая нару… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01439 | Уязвимость компонента smb ядра операционной системы Linux, позволяющая нарушителю оказать… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01438 | Уязвимость функции stbi__convert_format библиотек для C/C++ Libstb, позволяющая нарушител… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01437 | Уязвимость компонента kdc/do_tgs_req.c сетевого протокола аутентификации Kerberos, позвол… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01436 | Уязвимость программной платформы Node.js, связанная с неконтролируемым расходом ресурсов,… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01435 | Уязвимость функций Buffer.fill() и Buffer.alloc() программной платформы Node.js, позволяю… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01434 | Уязвимость компонентов node_http2 программной платформы Node.js, позволяющая нарушителю в… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01433 | Уязвимость сетевого протокола аутентификации Kerberos, связанная с непринятием мер по ней… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01432 | Уязвимость сетевого протокола аутентификации Kerberos, связанная с недостатком использова… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01431 | Уязвимость программной платформы для разработки и управления веб-приложениями Symfony, св… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01430 | Уязвимость функции url.parse() программной платформы Node.js, позволяющая нарушителю оказ… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01429 | Уязвимость компонентов http программной платформы Node.js, позволяющая нарушителю вызвать… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01428 | Уязвимость кодировки UCS-2 программной платформы Node.js, позволяющая нарушителю вызвать … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01427 | Уязвимость функции GetImagePixelCache компонента MagickCore/cache.c консольного графическ… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01426 | Уязвимость функции WriteTIFFImage компонента coders/tiff.c консольного графического редак… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01425 | Уязвимость функции MontageImageCommand компонента MagickWand/montage.c консольного графич… | 09.02.2026 | 09.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200610-0022 | User interface inconsistency in Workgroup Manager in Apple Mac OS X 10.4 through 10.4.7 a… | 2024-07-23T21:56:15.078000Z |
| var-200905-0505 | Array index error in the insertItemBefore method in WebKit, as used in Apple Safari befor… | 2024-07-23T21:56:07.125000Z |
| var-201912-0618 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:55:36.712000Z |
| var-202112-2011 | Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 an… | 2024-07-23T21:55:35.394000Z |
| var-201810-0932 | The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side chan… | 2024-07-23T21:55:35.727000Z |
| var-201210-0063 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:55:35.147000Z |
| var-200809-0182 | ImageIO in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows context-dependent attack… | 2024-07-23T21:55:33.188000Z |
| var-201903-0417 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:55:16.315000Z |
| var-201912-0597 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:55:13.309000Z |
| var-200809-0009 | ImageIO in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows context-dependent attack… | 2024-07-23T21:55:12.610000Z |
| var-201704-1589 | In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server t… | 2024-07-23T21:55:11.835000Z |
| var-200911-0398 | The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Int… | 2024-07-23T21:54:40.707000Z |
| var-201912-0128 | A logic issue was addressed with improved state management. This issue is fixed in watchO… | 2024-07-23T21:54:39.274000Z |
| var-201502-0366 | named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when D… | 2024-07-23T21:54:05.549000Z |
| var-201006-1183 | WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4… | 2024-07-23T21:53:56.790000Z |
| var-202003-1784 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:53:51.536000Z |
| var-201302-0132 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:53:51.971000Z |
| var-201711-0447 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T21:53:49.059000Z |
| var-201805-0963 | Systems with microprocessors utilizing speculative execution and speculative execution of… | 2024-07-23T21:53:48.206000Z |
| var-200102-0104 | "Multiple Users" Control Panel in Mac OS 9 allows Normal users to gain Owner privileges b… | 2024-07-23T21:53:48.441000Z |
| var-201403-0387 | Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python … | 2024-07-23T21:53:47.789000Z |
| var-201208-0344 | libxml2 2.9.0-rc1 and earlier, as used in Google Chrome before 21.0.1180.89, does not pro… | 2024-07-23T21:53:17.145000Z |
| var-201910-1495 | The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print… | 2024-07-23T21:53:16.217000Z |
| var-201912-0579 | A logic issue existed in the handling of synchronous page loads. This issue was addressed… | 2024-07-23T21:53:15.777000Z |
| var-200905-0196 | racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denia… | 2024-07-23T21:53:12.318000Z |
| var-200609-0315 | Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary c… | 2024-07-23T21:53:10.410000Z |
| var-202212-1751 | A type confusion issue was addressed with improved state handling. This issue is fixed in… | 2024-07-23T21:52:34.161000Z |
| var-201404-0398 | Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 an… | 2024-07-23T21:52:34.093000Z |
| var-201008-0172 | Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType befor… | 2024-07-23T21:52:33.872000Z |
| var-202108-2172 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:52:30.241000Z |