Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-8076 |
9.3 (4.0)
|
Weak credentials vulnerability in the CashDro 3 web ad… |
CashDro |
CashDro 3 Administration Panel |
2026-05-08T11:55:53.321Z | 2026-05-08T11:55:53.321Z |
| CVE-2026-8153 |
9.8 (3.1)
|
Command injection in Dashboard Server interface |
Universal Robots |
PolyScope 5 |
2026-05-08T11:45:18.462Z | 2026-05-08T11:45:18.462Z |
| CVE-2026-8117 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
SourceCodester Pizzafy Ecommerce System index.php cros… |
SourceCodester |
Pizzafy Ecommerce System |
2026-05-07T23:45:10.695Z | 2026-05-08T11:43:56.619Z |
| CVE-2026-8124 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
GPAC box_code_base.c sidx_box_read allocation of resources |
n/a |
GPAC |
2026-05-08T01:15:10.347Z | 2026-05-08T11:41:38.846Z |
| CVE-2026-8130 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
SourceCodester SUP Online Shopping message.php sql injection |
SourceCodester |
SUP Online Shopping |
2026-05-08T02:45:09.771Z | 2026-05-08T11:29:09.929Z |
| CVE-2026-3318 |
5.3 (4.0)
|
Multiple vulnerabilities in Cradle e-commerce |
Cradle |
e-commerce |
2026-05-08T11:24:53.064Z | 2026-05-08T11:24:53.064Z |
| CVE-2026-41501 |
9.8 (3.1)
|
electerm has Command Injection Vulnerability via runLi… |
electerm |
electerm |
2026-05-08T02:51:10.144Z | 2026-05-08T11:19:54.297Z |
| CVE-2026-43284 |
N/A
|
xfrm: esp: avoid in-place decrypt on shared skb frags |
Linux |
Linux |
2026-05-08T07:21:47.524Z | 2026-05-08T10:51:54.271Z |
| CVE-2026-42208 |
9.3 (4.0)
|
LiteLLM: SQL injection in Proxy API key verification |
BerriAI |
litellm |
2026-05-08T03:38:14.124Z | 2026-05-08T10:50:29.008Z |
| CVE-2026-42273 |
7.8 (4.0)
|
Heimdall: Case-sensitive host matching may lead to pol… |
dadrus |
heimdall |
2026-05-08T03:42:50.312Z | 2026-05-08T10:40:56.541Z |
| CVE-2026-42279 |
5.8 (3.1)
|
solidtime: Time entry update endpoint allows cross-org… |
solidtime-io |
solidtime |
2026-05-08T03:57:31.727Z | 2026-05-08T10:38:51.086Z |
| CVE-2026-8138 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda CX12L SetPptpServerCfg” formSetPPTPServer stack-… |
Tenda |
CX12L |
2026-05-08T04:15:10.228Z | 2026-05-08T10:35:06.800Z |
| CVE-2026-5341 |
6.4 (3.1)
|
NMR Strava activities <= 1.0.14 - Authenticated (Contr… |
mirceatm |
NMR Strava activities |
2026-05-08T09:26:47.283Z | 2026-05-08T10:15:32.703Z |
| CVE-2026-7475 |
6.4 (3.1)
|
Sky Addons <= 3.3.2 - Authenticated (Author+) Stored C… |
wowdevs |
Sky Addons – Elementor Addons with Widgets & Templates |
2026-05-08T09:26:47.644Z | 2026-05-08T09:26:47.644Z |
| CVE-2026-7650 |
6.4 (3.1)
|
E2Pdf – Export Pdf Tool for WordPress <= 1.32.17 - Aut… |
oleksandrz |
E2Pdf – Export Pdf Tool for WordPress |
2026-05-08T09:26:46.732Z | 2026-05-08T09:26:46.732Z |
| CVE-2026-6213 |
10 (4.0)
|
Remote Spark SparkView RCE |
Remote Spark (https://www.remotespark.com/) |
SparkView |
2026-05-08T09:04:24.188Z | 2026-05-08T09:04:24.188Z |
| CVE-2026-7330 |
7.2 (3.1)
|
Auto Affiliate Links <= 6.8.8 - Unauthenticated Stored… |
thedark |
Auto Affiliate Links |
2026-05-08T08:26:33.373Z | 2026-05-08T08:26:33.373Z |
| CVE-2026-5127 |
8.8 (3.1)
|
User Frontend: AI Powered Frontend Posting, User Direc… |
wedevs |
User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration |
2026-05-08T08:26:32.725Z | 2026-05-08T08:26:32.725Z |
| CVE-2013-10075 |
N/A
|
Apache::Session versions through 1.94 for Perl re-crea… |
CHORNY |
Apache::Session |
2026-05-08T07:44:13.267Z | 2026-05-08T07:44:13.267Z |
| CVE-2026-44928 |
2.9 (3.1)
|
In uriparser before 1.0.2, the function family Eq… |
uriparser |
uriparser |
2026-05-08T07:15:28.378Z | 2026-05-08T07:16:05.869Z |
| CVE-2026-44927 |
2.9 (3.1)
|
In uriparser before 1.0.2, there is pointer diffe… |
uriparser |
uriparser |
2026-05-08T07:13:04.720Z | 2026-05-08T07:15:54.036Z |
| CVE-2026-44916 |
3 (3.1)
|
In OpenStack Ironic through 35.x, instance_info['… |
OpenStack |
Ironic |
2026-05-08T06:38:37.279Z | 2026-05-08T06:38:37.279Z |
| CVE-2026-44742 |
7.2 (3.1)
|
Postorius through 1.3.13 does not escape HTML in … |
Postorius project |
Postorius |
2026-05-07T18:09:20.069Z | 2026-05-08T06:25:34.759Z |
| CVE-2023-46453 |
N/A
|
Certain GL.iNet devices with 4.x firmware allow a… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T06:19:11.467Z |
| CVE-2025-69599 |
N/A
|
RayVentory Scan Engine through 12.6 Update 8 allo… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T06:08:35.396Z |
| CVE-2026-8149 |
5.1 (4.0)
|
GCM chunking can lead to bad tag exception on decryption |
Legion of the Bouncy Castle Inc. |
BC-FJA |
2026-05-08T06:01:40.875Z | 2026-05-08T06:01:40.875Z |
| CVE-2026-4935 |
N/A
|
SureTriggers < 1.1.23 – Unauthenticated SQLi |
Unknown |
OttoKit: All-in-One Automation Platform |
2026-05-08T06:00:04.998Z | 2026-05-08T06:00:04.998Z |
| CVE-2026-8069 |
8.5 (4.0)
|
PredatorSense V3: Local Privilege Escalation (LPE) vul… |
Acer |
PredatorSense V3 |
2026-05-08T05:57:22.797Z | 2026-05-08T05:57:22.797Z |
| CVE-2025-69690 |
N/A
|
Netgate pfSense CE 2.7.2 allows code execution by… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T05:56:44.429Z |
| CVE-2025-67888 |
N/A
|
An issue was discovered in Control Web Panel (CWP… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T05:52:30.620Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-8153 |
9.8 (3.1)
|
Command injection in Dashboard Server interface |
Universal Robots |
PolyScope 5 |
2026-05-08T11:45:18.462Z | 2026-05-08T11:45:18.462Z |
| CVE-2026-8076 |
9.3 (4.0)
|
Weak credentials vulnerability in the CashDro 3 web ad… |
CashDro |
CashDro 3 Administration Panel |
2026-05-08T11:55:53.321Z | 2026-05-08T11:55:53.321Z |
| CVE-2026-3318 |
5.3 (4.0)
|
Multiple vulnerabilities in Cradle e-commerce |
Cradle |
e-commerce |
2026-05-08T11:24:53.064Z | 2026-05-08T11:24:53.064Z |
| CVE-2026-31431 |
7.8 (3.1)
|
crypto: algif_aead - Revert to operating out-of-place |
Linux |
Linux |
2026-04-22T08:15:10.123Z | 2026-05-08T01:35:55.500Z |
| CVE-2026-43284 |
N/A
|
xfrm: esp: avoid in-place decrypt on shared skb frags |
Linux |
Linux |
2026-05-08T07:21:47.524Z | 2026-05-08T10:51:54.271Z |
| CVE-2026-42279 |
5.8 (3.1)
|
solidtime: Time entry update endpoint allows cross-org… |
solidtime-io |
solidtime |
2026-05-08T03:57:31.727Z | 2026-05-08T10:38:51.086Z |
| CVE-2026-7650 |
6.4 (3.1)
|
E2Pdf – Export Pdf Tool for WordPress <= 1.32.17 - Aut… |
oleksandrz |
E2Pdf – Export Pdf Tool for WordPress |
2026-05-08T09:26:46.732Z | 2026-05-08T09:26:46.732Z |
| CVE-2026-7475 |
6.4 (3.1)
|
Sky Addons <= 3.3.2 - Authenticated (Author+) Stored C… |
wowdevs |
Sky Addons – Elementor Addons with Widgets & Templates |
2026-05-08T09:26:47.644Z | 2026-05-08T09:26:47.644Z |
| CVE-2026-6213 |
10 (4.0)
|
Remote Spark SparkView RCE |
Remote Spark (https://www.remotespark.com/) |
SparkView |
2026-05-08T09:04:24.188Z | 2026-05-08T09:04:24.188Z |
| CVE-2026-5341 |
6.4 (3.1)
|
NMR Strava activities <= 1.0.14 - Authenticated (Contr… |
mirceatm |
NMR Strava activities |
2026-05-08T09:26:47.283Z | 2026-05-08T10:15:32.703Z |
| CVE-2026-7330 |
7.2 (3.1)
|
Auto Affiliate Links <= 6.8.8 - Unauthenticated Stored… |
thedark |
Auto Affiliate Links |
2026-05-08T08:26:33.373Z | 2026-05-08T08:26:33.373Z |
| CVE-2026-5127 |
8.8 (3.1)
|
User Frontend: AI Powered Frontend Posting, User Direc… |
wedevs |
User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration |
2026-05-08T08:26:32.725Z | 2026-05-08T08:26:32.725Z |
| CVE-2026-44928 |
2.9 (3.1)
|
In uriparser before 1.0.2, the function family Eq… |
uriparser |
uriparser |
2026-05-08T07:15:28.378Z | 2026-05-08T07:16:05.869Z |
| CVE-2026-44927 |
2.9 (3.1)
|
In uriparser before 1.0.2, there is pointer diffe… |
uriparser |
uriparser |
2026-05-08T07:13:04.720Z | 2026-05-08T07:15:54.036Z |
| CVE-2013-10075 |
N/A
|
Apache::Session versions through 1.94 for Perl re-crea… |
CHORNY |
Apache::Session |
2026-05-08T07:44:13.267Z | 2026-05-08T07:44:13.267Z |
| CVE-2026-8149 |
5.1 (4.0)
|
GCM chunking can lead to bad tag exception on decryption |
Legion of the Bouncy Castle Inc. |
BC-FJA |
2026-05-08T06:01:40.875Z | 2026-05-08T06:01:40.875Z |
| CVE-2026-8069 |
8.5 (4.0)
|
PredatorSense V3: Local Privilege Escalation (LPE) vul… |
Acer |
PredatorSense V3 |
2026-05-08T05:57:22.797Z | 2026-05-08T05:57:22.797Z |
| CVE-2026-4935 |
N/A
|
SureTriggers < 1.1.23 – Unauthenticated SQLi |
Unknown |
OttoKit: All-in-One Automation Platform |
2026-05-08T06:00:04.998Z | 2026-05-08T06:00:04.998Z |
| CVE-2026-44916 |
3 (3.1)
|
In OpenStack Ironic through 35.x, instance_info['… |
OpenStack |
Ironic |
2026-05-08T06:38:37.279Z | 2026-05-08T06:38:37.279Z |
| CVE-2025-69691 |
N/A
|
Netgate pfSense CE 2.8.0 allows code execution in… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T05:51:51.358Z |
| CVE-2025-69690 |
N/A
|
Netgate pfSense CE 2.7.2 allows code execution by… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T05:56:44.429Z |
| CVE-2025-69599 |
N/A
|
RayVentory Scan Engine through 12.6 Update 8 allo… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T06:08:35.396Z |
| CVE-2025-67888 |
N/A
|
An issue was discovered in Control Web Panel (CWP… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T05:52:30.620Z |
| CVE-2025-67887 |
N/A
|
1C-Bitrix through 25.100.500 allows Remote Code E… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T05:52:28.158Z |
| CVE-2025-67886 |
N/A
|
Bitrix24 through 25.100.300 allows Remote Code Ex… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T05:52:25.556Z |
| CVE-2025-55449 |
N/A
|
AstrBotDevs AstrBot 3.5.15 has Advanced_System_fo… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T05:40:04.174Z |
| CVE-2023-46453 |
N/A
|
Certain GL.iNet devices with 4.x firmware allow a… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T06:19:11.467Z |
| CVE-2026-5588 |
6.3 (4.0)
|
PKIX draft CompositeVerifier accepts empty signature s… |
Legion of the Bouncy Castle Inc. |
BC-JAVA |
2026-04-15T09:06:15.617Z | 2026-05-08T05:29:40.247Z |
| CVE-2024-53326 |
N/A
|
LINQPad before 5.52.01 Pro edition is vulnerable … |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T05:31:16.573Z |
| CVE-2024-51092 |
N/A
|
LibreNMS before 24.10.0 allows a remote attacker … |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T05:25:09.914Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-43284 | In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decr… | 2026-05-08T08:16:43.827 | 2026-05-08T11:16:29.260 |
| fkie_cve-2026-42279 | solidtime is an open-source time-tracking app. In version 0.12.0, the PUT /api/v1/organizations/{or… | 2026-05-08T05:16:11.063 | 2026-05-08T11:16:28.670 |
| fkie_cve-2026-7650 | The E2Pdf – Export Pdf Tool for WordPress plugin for WordPress is vulnerable to Stored Cross-Site S… | 2026-05-08T10:16:29.577 | 2026-05-08T10:16:29.577 |
| fkie_cve-2026-7475 | The Sky Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `sky-custo… | 2026-05-08T10:16:29.440 | 2026-05-08T10:16:29.440 |
| fkie_cve-2026-6213 | A vulnerability in Remote Spark SparkView before build 1122 allows an attacker to bypasses the loca… | 2026-05-08T10:16:29.270 | 2026-05-08T10:16:29.270 |
| fkie_cve-2026-5341 | The NMR Strava activities plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the… | 2026-05-08T10:16:28.917 | 2026-05-08T10:16:28.917 |
| fkie_cve-2026-7330 | The Auto Affiliate Links plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versi… | 2026-05-08T09:16:10.100 | 2026-05-08T09:16:10.100 |
| fkie_cve-2026-5127 | The User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registra… | 2026-05-08T09:16:08.803 | 2026-05-08T09:16:08.803 |
| fkie_cve-2026-44928 | In uriparser before 1.0.2, the function family EqualsUri can misclassify two unequal URIs as equal. | 2026-05-08T08:16:44.153 | 2026-05-08T08:16:44.153 |
| fkie_cve-2026-44927 | In uriparser before 1.0.2, there is pointer difference truncation to int in various places. | 2026-05-08T08:16:43.973 | 2026-05-08T08:16:43.973 |
| fkie_cve-2013-10075 | Apache::Session versions through 1.94 for Perl re-creates deleted sessions. The session stores Apa… | 2026-05-08T08:16:43.463 | 2026-05-08T08:16:43.463 |
| fkie_cve-2026-8149 | A vulnerability in Legion of the Bouncy Castle Inc. BC-FJA BC-FIPS on Linux, X86_64, AVX, AVX-512f.… | 2026-05-08T07:16:29.603 | 2026-05-08T07:16:29.603 |
| fkie_cve-2026-8069 | PredatorSense version 3.00.3136 to 3.00.3196 contain Local Privilege Escalation (LPE) vulnerability… | 2026-05-08T07:16:29.443 | 2026-05-08T07:16:29.443 |
| fkie_cve-2026-4935 | The OttoKit: All-in-One Automation Platform WordPress plugin before 1.1.23 does not properly saniti… | 2026-05-08T07:16:29.327 | 2026-05-08T07:16:29.327 |
| fkie_cve-2026-44916 | In OpenStack Ironic through 35.x, instance_info['ks_template'] is rendered without sandboxing. | 2026-05-08T07:16:29.163 | 2026-05-08T07:16:29.163 |
| fkie_cve-2025-69691 | Netgate pfSense CE 2.8.0 allows code execution in the XMLRPC API via pfsense.exec_php. NOTE: the Su… | 2026-05-08T07:16:28.880 | 2026-05-08T07:16:28.880 |
| fkie_cve-2025-69690 | Netgate pfSense CE 2.7.2 allows code execution by using the module installer with a backup file wit… | 2026-05-08T07:16:28.750 | 2026-05-08T07:16:28.750 |
| fkie_cve-2025-69599 | RayVentory Scan Engine through 12.6 Update 8 allows attackers to gain privileges if they control th… | 2026-05-08T07:16:28.617 | 2026-05-08T07:16:28.617 |
| fkie_cve-2025-67888 | An issue was discovered in Control Web Panel (CWP) before 0.9.8.1209. User input passed via the "ke… | 2026-05-08T07:16:28.487 | 2026-05-08T07:16:28.487 |
| fkie_cve-2025-67887 | 1C-Bitrix through 25.100.500 allows Remote Code Execution because an actor with SOURCE/WRITE permis… | 2026-05-08T07:16:28.350 | 2026-05-08T07:16:28.350 |
| fkie_cve-2025-67886 | Bitrix24 through 25.100.300 allows Remote Code Execution because an actor with SOURCE/WRITE permiss… | 2026-05-08T07:16:28.180 | 2026-05-08T07:16:28.180 |
| fkie_cve-2025-55449 | AstrBotDevs AstrBot 3.5.15 has Advanced_System_for_Text_Response_and_Bot_Operations_Tool as the har… | 2026-05-08T07:16:28.047 | 2026-05-08T07:16:28.047 |
| fkie_cve-2023-46453 | Certain GL.iNet devices with 4.x firmware allow authentication bypass (resulting in administrative … | 2026-05-08T07:16:27.850 | 2026-05-08T07:16:27.850 |
| fkie_cve-2026-5588 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Legion of the Bouncy Castle Inc. … | 2026-04-15T10:16:49.597 | 2026-05-08T06:16:10.540 |
| fkie_cve-2024-53326 | LINQPad before 5.52.01 Pro edition is vulnerable to Unsafe Deserialization in LINQPad.AutoRefManage… | 2026-05-08T06:16:10.223 | 2026-05-08T06:16:10.223 |
| fkie_cve-2024-51092 | LibreNMS before 24.10.0 allows a remote attacker to execute arbitrary code via OS command injection… | 2026-05-08T06:16:10.090 | 2026-05-08T06:16:10.090 |
| fkie_cve-2024-46508 | yeti-platform yeti before 2.1.12 allows attackers to generate valid JWT tokens is the secret is not… | 2026-05-08T06:16:09.963 | 2026-05-08T06:16:09.963 |
| fkie_cve-2024-46507 | A SSTI (server side template injection) vulnerability in the custom template export function in yet… | 2026-05-08T06:16:09.840 | 2026-05-08T06:16:09.840 |
| fkie_cve-2024-45257 | A Command Injection issue in the payload build page in BYOB (Build Your Own Botnet) 2.0 allows atta… | 2026-05-08T06:16:09.687 | 2026-05-08T06:16:09.687 |
| fkie_cve-2024-33724 | SOPlanning 1.52.00 is vulnerable to Cross Site Scripting (XSS) via the groupe_id parameter to proce… | 2026-05-08T06:16:09.547 | 2026-05-08T06:16:09.547 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-pprv-j56w-x96f |
9.8 (3.1)
|
OS command injection in Dashboard Server interface in Universal Robots PolyScope versions prior to … | 2026-05-08T12:31:57Z | 2026-05-08T12:31:57Z |
| ghsa-m29c-gmm3-c3v9 |
5.3 (4.0)
|
Open redirection vulnerability in the latest demo version of the Cradle eCommerce platform. The vul… | 2026-05-08T12:31:57Z | 2026-05-08T12:31:57Z |
| ghsa-hr4j-j5wc-96jv |
6.4 (3.1)
|
The E2Pdf – Export Pdf Tool for WordPress plugin for WordPress is vulnerable to Stored Cross-Site S… | 2026-05-08T12:31:57Z | 2026-05-08T12:31:57Z |
| ghsa-9x7x-hw35-pfrh |
9.3 (4.0)
|
Weak credentials in the CashDro 3 web administration panel, version 24.01.00.26, where the platform… | 2026-05-08T12:31:57Z | 2026-05-08T12:31:57Z |
| ghsa-59rm-h9h8-h9gh |
6.4 (3.1)
|
The Sky Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `sky-custo… | 2026-05-08T12:31:56Z | 2026-05-08T12:31:57Z |
| ghsa-mmw8-mxmc-8w2r |
|
In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decr… | 2026-05-08T09:31:30Z | 2026-05-08T12:31:56Z |
| ghsa-m9cx-2hp3-5j6q |
10.0 (4.0)
|
A vulnerability in Remote Spark SparkView before build 1122 allows an attacker to bypasses the loca… | 2026-05-08T12:31:56Z | 2026-05-08T12:31:56Z |
| ghsa-7929-xh7v-8jrh |
6.4 (3.1)
|
The NMR Strava activities plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the… | 2026-05-08T12:31:56Z | 2026-05-08T12:31:56Z |
| ghsa-xw5w-xhjv-gf29 |
2.9 (3.1)
|
In uriparser before 1.0.2, the function family EqualsUri can misclassify two unequal URIs as equal. | 2026-05-08T09:31:30Z | 2026-05-08T09:31:30Z |
| ghsa-v3rv-7vgj-hq3v |
7.2 (3.1)
|
The Auto Affiliate Links plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versi… | 2026-05-08T09:31:30Z | 2026-05-08T09:31:30Z |
| ghsa-mx76-r943-rf8g |
5.1 (4.0)
|
A vulnerability in Legion of the Bouncy Castle Inc. BC-FJA BC-FIPS on Linux, X86_64, AVX, AVX-512f.… | 2026-05-08T09:31:30Z | 2026-05-08T09:31:30Z |
| ghsa-jc25-ggg4-hhvw |
8.8 (3.1)
|
The User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registra… | 2026-05-08T09:31:30Z | 2026-05-08T09:31:30Z |
| ghsa-gmxg-5w57-j63q |
2.9 (3.1)
|
In uriparser before 1.0.2, there is pointer difference truncation to int in various places. | 2026-05-08T09:31:29Z | 2026-05-08T09:31:30Z |
| ghsa-c9p5-pwmj-4f88 |
|
Apache::Session versions through 1.94 for Perl re-creates deleted sessions. The session stores Apa… | 2026-05-08T09:31:30Z | 2026-05-08T09:31:30Z |
| ghsa-67h9-58cf-72hp |
8.5 (4.0)
|
PredatorSense version 3.00.3136 to 3.00.3196 contain Local Privilege Escalation (LPE) vulnerability… | 2026-05-08T09:31:29Z | 2026-05-08T09:31:30Z |
| ghsa-vx26-r59q-724x |
|
Certain GL.iNet devices with 4.x firmware allow authentication bypass (resulting in administrative … | 2026-05-08T09:31:29Z | 2026-05-08T09:31:29Z |
| ghsa-gpvp-9x48-h5wv |
|
The OttoKit: All-in-One Automation Platform WordPress plugin before 1.1.23 does not properly saniti… | 2026-05-08T09:31:29Z | 2026-05-08T09:31:29Z |
| ghsa-979m-gf7m-rg53 |
3.0 (3.1)
|
In OpenStack Ironic through 35.x, instance_info['ks_template'] is rendered without sandboxing. | 2026-05-08T09:31:29Z | 2026-05-08T09:31:29Z |
| ghsa-7ww6-9q8h-2g49 |
|
Netgate pfSense CE 2.8.0 allows code execution in the XMLRPC API via pfsense.exec_php. NOTE: the Su… | 2026-05-08T09:31:29Z | 2026-05-08T09:31:29Z |
| ghsa-73qc-9hmq-7x6f |
|
Bitrix24 through 25.100.300 allows Remote Code Execution because an actor with SOURCE/WRITE permiss… | 2026-05-08T09:31:29Z | 2026-05-08T09:31:29Z |
| ghsa-6q25-xprm-2cg4 |
|
An issue was discovered in Control Web Panel (CWP) before 0.9.8.1209. User input passed via the "ke… | 2026-05-08T09:31:29Z | 2026-05-08T09:31:29Z |
| ghsa-5vw7-w2ww-jcfq |
|
Netgate pfSense CE 2.7.2 allows code execution by using the module installer with a backup file wit… | 2026-05-08T09:31:29Z | 2026-05-08T09:31:29Z |
| ghsa-5gxm-mp3j-xhc7 |
|
RayVentory Scan Engine through 12.6 Update 8 allows attackers to gain privileges if they control th… | 2026-05-08T09:31:29Z | 2026-05-08T09:31:29Z |
| ghsa-2636-hvcv-37w8 |
|
1C-Bitrix through 25.100.500 allows Remote Code Execution because an actor with SOURCE/WRITE permis… | 2026-05-08T09:31:29Z | 2026-05-08T09:31:29Z |
| ghsa-xqpp-8rwp-6rcr |
|
In libslic3r/GCode/PostProcessor.cpp in Prusa PrusaSlicer through 2.6.1, a crafted 3mf project file… | 2026-05-08T06:32:38Z | 2026-05-08T06:32:38Z |
| ghsa-vr2c-fpjq-qvp3 |
|
SOPlanning 1.52.00 is vulnerable to SQL Injection by an authenticated user via projets.php with statut[]. | 2026-05-08T06:32:38Z | 2026-05-08T06:32:38Z |
| ghsa-v5fc-fw74-r356 |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability was found in Tenda CX12L 16.03.53.12. This issue affects the function formSetPPTPSe… | 2026-05-08T06:32:38Z | 2026-05-08T06:32:38Z |
| ghsa-rx53-rx95-fqqm |
|
Mikrotik RouterOS (x86) 6.40.5 through 6.49.10 (fixed in 7) allows a remote attacker to cause a den… | 2026-05-08T06:32:38Z | 2026-05-08T06:32:38Z |
| ghsa-hxqg-f8pm-8v2h |
|
LINQPad before 5.52.01 Pro edition is vulnerable to Unsafe Deserialization in LINQPad.AutoRefManage… | 2026-05-08T06:32:38Z | 2026-05-08T06:32:38Z |
| ghsa-hrfc-58jm-6fpc |
|
Prison Management System Using PHP v1.0 was discovered to contain a SQL injection vulnerability via… | 2026-05-08T06:32:38Z | 2026-05-08T06:32:38Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-85 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-04-23T07:43:20.598639Z |
| pysec-2024-84 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.3.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-04-23T07:43:20.526718Z |
| pysec-2024-83 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-04-23T07:43:20.456202Z |
| pysec-2024-82 |
8.8 (3.1)
|
Deserialization of untrusted data can occur in versions 23.3.2.0 and newer of the MindsDB… | mindsdb | 2024-09-12T13:15:00Z | 2026-04-23T07:43:20.386659Z |
| pysec-2023-278 |
5.3 (3.1)
|
MindsDB connects artificial intelligence models to real time data. Versions prior to 23.1… | mindsdb | 2023-12-11T21:15:00Z | 2026-04-23T07:43:20.300009Z |
| pysec-2026-3 |
|
After an API token exposure from an exploited Trivy dependency, two new releases of `teln… | telnyx | 2026-03-27T14:53:14Z | |
| pysec-2026-2 |
|
After an API Token exposure from an exploited Trivy dependency, two new releases of `lite… | litellm | 2026-03-24T15:35:32Z | |
| pysec-2023-121 |
|
A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as a… | zstd | 2023-03-31T20:15:00+00:00 | 2026-02-25T19:20:58+00:00 |
| pysec-2026-1 |
|
A PyPI user account compromised by an attacker and was able to upload a malicious version… | dydx-v4-client | 2026-01-28T21:09:02+00:00 | |
| pysec-2025-52 |
|
gateway_proxy_handler in MLflow before 3.1.0 lacks gateway_path validation. | mlflow | 2025-06-23T15:15:29Z | 2025-12-05T13:25:55.146081Z |
| pysec-2020-220 |
|
A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage coll… | ansible | 2020-10-05T14:15:00Z | 2025-10-31T04:43:53.616247Z |
| pysec-2025-72 |
|
The `num2words` project was compromised via a phishing attack and two new versions were u… | num2words | 2025-07-31T14:34:47+00:00 | |
| pysec-2025-71 |
|
Cadwyn creates production-ready community-driven modern Stripe-like API versioning in Fas… | cadwyn | 2025-07-21T21:15:25+00:00 | 2025-07-23T15:24:03.825615+00:00 |
| pysec-2025-70 |
10.0 (3.1)
|
A Server-Side Request Forgery (SSRF) vulnerability exists in the RequestsToolkit componen… | langchain-community | 2025-06-23T21:15:25+00:00 | 2025-07-16T21:23:40.211079+00:00 |
| pysec-2024-259 |
9.8 (3.1)
|
In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by m… | torch | 2024-10-29T21:15:04+00:00 | 2025-07-16T03:09:57.748865+00:00 |
| pysec-2024-258 |
|
In scrapy/scrapy, an issue was identified where the Authorization header is not removed d… | scrapy | 2024-05-20T08:15:08+00:00 | 2025-07-15T17:37:50.051730+00:00 |
| pysec-2025-69 |
|
In Roundup before 2.5.0, XSS can occur via interaction between URLs and issue tracker tem… | roundup | 2025-07-13T20:15:25+00:00 | 2025-07-13T21:23:01.161315+00:00 |
| pysec-2025-68 |
8.0 (3.1)
|
A vulnerability, which was classified as critical, has been found in Upsonic up to 0.55.6… | upsonic | 2025-06-19T21:15:27+00:00 | 2025-07-08T19:22:27.449399+00:00 |
| pysec-2025-67 |
9.8 (3.1)
|
A vulnerability classified as critical was found in Upsonic up to 0.55.6. This vulnerabil… | upsonic | 2025-06-19T21:15:27+00:00 | 2025-07-08T19:22:27.385619+00:00 |
| pysec-2025-66 |
|
Improper privilege management in a REST interface allowed registered users to access unau… | streampipes | 2025-03-03T11:15:11+00:00 | 2025-07-08T15:23:46.628375+00:00 |
| pysec-2025-65 |
|
A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0… | llama-index | 2025-07-07T13:15:28+00:00 | 2025-07-07T15:23:42.730681+00:00 |
| pysec-2025-61 |
|
Pillow is a Python imaging library. In versions 11.2.0 to before 11.3.0, there is a heap … | pillow | 2025-07-01T19:15:27Z | 2025-07-07T14:12:46.226030Z |
| pysec-2025-64 |
9.8 (3.1)
|
A vulnerability classified as critical has been found in themanojdesai python-a2a up to 0… | python-a2a | 2025-06-17T07:15:18+00:00 | 2025-07-02T21:23:13.806273+00:00 |
| pysec-2025-63 |
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Whe… | vllm | 2025-03-19T16:15:32+00:00 | 2025-07-01T23:22:49.176005+00:00 |
| pysec-2025-62 |
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Mal… | vllm | 2025-02-07T20:15:34+00:00 | 2025-07-01T23:22:49.083695+00:00 |
| pysec-2025-60 |
|
Exposure of Sensitive Information to an Unauthorized Actor, Insertion of Sensitive Inform… | apache-iotdb | 2025-05-14T11:16:28+00:00 | 2025-07-01T21:22:47.232036+00:00 |
| pysec-2025-59 |
|
Remote Code Execution with untrusted URI of UDF vulnerability in Apache IoTDB. The attack… | apache-iotdb | 2025-05-14T11:15:47+00:00 | 2025-07-01T21:22:47.177405+00:00 |
| pysec-2024-257 |
7.5 (3.1)
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2024-03-22T23:15:07+00:00 | 2025-06-30T15:23:50.085549+00:00 |
| pysec-2025-58 |
8.8 (3.1)
|
vLLM is a library for LLM inference and serving. vllm/model_executor/weight_utils.py impl… | vllm | 2025-01-27T18:15:41+00:00 | 2025-06-27T21:22:36.583615+00:00 |
| pysec-2025-57 |
|
A Denial of Service (DoS) vulnerability in zenml-io/zenml version 0.66.0 allows unauthent… | zenml | 2025-03-20T10:15:48+00:00 | 2025-06-27T17:22:55.175431+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33903 | In CARLA through 0.9.15.2, the collision sensor mishandles some situations involving pede… | 2024-04-29T05:02:07.295775Z |
| gsd-2024-33902 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.486429Z |
| gsd-2024-33901 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.525896Z |
| gsd-2024-33900 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.290639Z |
| gsd-2024-33899 | RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows attackers to spoof the scr… | 2024-04-29T05:02:07.400574Z |
| gsd-2024-33898 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.287632Z |
| gsd-2024-33897 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.283756Z |
| gsd-2024-33896 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.313250Z |
| gsd-2024-33895 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.493081Z |
| gsd-2024-33894 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.488420Z |
| gsd-2024-33893 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.381761Z |
| gsd-2024-33892 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.378170Z |
| gsd-2024-33891 | Delinea Secret Server before 11.7.000001 allows attackers to bypass authentication via th… | 2024-04-29T05:02:07.412035Z |
| gsd-2024-33890 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.344384Z |
| gsd-2024-33889 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.392587Z |
| gsd-2024-33888 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.468423Z |
| gsd-2024-33887 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.503613Z |
| gsd-2024-33886 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.287167Z |
| gsd-2024-33885 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.441746Z |
| gsd-2024-33884 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.534455Z |
| gsd-2024-33883 | The ejs (aka Embedded JavaScript templates) package before 3.1.10 for Node.js lacks certa… | 2024-04-29T05:02:07.271727Z |
| gsd-2024-4303 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:05.716348Z |
| gsd-2024-4302 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:05.603637Z |
| gsd-2024-4301 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:05.678292Z |
| gsd-2024-4300 | E-WEBInformationCo. FS-EZViewer(Web) exposes sensitive information in the service. A remo… | 2024-04-29T05:02:05.715239Z |
| gsd-2024-4299 | The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSheroc… | 2024-04-29T05:02:05.606402Z |
| gsd-2024-4298 | The email search interface of HGiga iSherlock (including MailSherlock, SpamSherock, Audit… | 2024-04-29T05:02:05.598531Z |
| gsd-2024-4297 | The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSherlo… | 2024-04-29T05:02:05.700888Z |
| gsd-2024-4296 | The account management interface of HGiga iSherlock (including MailSherlock, SpamSherlock… | 2024-04-29T05:02:05.621428Z |
| gsd-2024-33882 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.803998Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-3394 | Malicious code in @gaia-codesearch/gaia-api-typescript (npm) | 2026-05-08T10:05:46Z | 2026-05-08T10:05:46Z |
| mal-2026-3387 | Malicious code in @gaia-codesearch/gaia-api-python (npm) | 2026-05-08T09:26:32Z | 2026-05-08T09:26:32Z |
| mal-2026-3389 | Malicious code in eth-wallet-kit (PyPI) | 2026-05-08T09:04:03Z | 2026-05-08T09:04:03Z |
| mal-2026-3392 | Malicious code in wallet-scanner-pro (PyPI) | 2026-05-08T09:03:23Z | 2026-05-08T09:03:23Z |
| mal-2026-3391 | Malicious code in tron-energy-sdk (PyPI) | 2026-05-08T09:02:46Z | 2026-05-08T09:02:46Z |
| mal-2026-3388 | Malicious code in crypto-bot-utils (PyPI) | 2026-05-08T09:02:06Z | 2026-05-08T09:02:06Z |
| mal-2026-3393 | Malicious code in web3-tool-sdk (PyPI) | 2026-05-08T09:01:32Z | 2026-05-08T09:01:32Z |
| mal-2026-3390 | Malicious code in solana-py-sdk (PyPI) | 2026-05-08T09:00:43Z | 2026-05-08T09:00:43Z |
| mal-2026-3376 | Malicious code in solana-wallet-sdk (PyPI) | 2026-05-08T07:13:29Z | 2026-05-08T08:39:48Z |
| mal-2026-3375 | Malicious code in crypto-kit-pro (PyPI) | 2026-05-08T07:19:06Z | 2026-05-08T08:39:48Z |
| mal-2026-3367 | Malicious code in crayrandomiz (PyPI) | 2026-05-07T18:43:03Z | 2026-05-08T08:39:48Z |
| mal-2026-3380 | Malicious code in justinleaguekems (PyPI) | 2026-05-08T07:38:02Z | 2026-05-08T07:38:02Z |
| mal-2026-3386 | Malicious code in yeahmankema (PyPI) | 2026-05-08T07:35:43Z | 2026-05-08T07:35:43Z |
| mal-2026-3383 | Malicious code in wallet-utils-pro (PyPI) | 2026-05-08T07:29:44Z | 2026-05-08T07:29:44Z |
| mal-2026-3381 | Malicious code in solana-scanner (PyPI) | 2026-05-08T07:28:52Z | 2026-05-08T07:28:52Z |
| mal-2026-3378 | Malicious code in eth-toolkit (PyPI) | 2026-05-08T07:27:58Z | 2026-05-08T07:27:58Z |
| mal-2026-3377 | Malicious code in crypto-wallet-utils (PyPI) | 2026-05-08T07:26:52Z | 2026-05-08T07:26:52Z |
| mal-2026-3385 | Malicious code in web3-helper (PyPI) | 2026-05-08T07:25:34Z | 2026-05-08T07:25:34Z |
| mal-2026-3384 | Malicious code in web3-connect (PyPI) | 2026-05-08T07:24:43Z | 2026-05-08T07:24:43Z |
| mal-2026-3382 | Malicious code in solana-wallet-utils (PyPI) | 2026-05-08T07:23:20Z | 2026-05-08T07:23:20Z |
| mal-2026-3379 | Malicious code in eth-web3-utils (PyPI) | 2026-05-08T07:20:13Z | 2026-05-08T07:20:13Z |
| mal-2024-12093 | Malicious code in conversations-embed (npm) | 2024-12-22T04:50:51Z | 2026-05-08T05:46:35Z |
| mal-2026-3374 | Malicious code in playgod (npm) | 2026-05-08T05:16:26Z | 2026-05-08T05:16:26Z |
| mal-2026-3372 | Malicious code in ninja-core-utils (PyPI) | 2026-05-07T21:25:50Z | 2026-05-07T21:25:50Z |
| mal-2026-3371 | Malicious code in pycacheopt (PyPI) | 2026-05-07T20:07:37Z | 2026-05-07T20:07:37Z |
| mal-2026-3247 | Malicious code in metoopro (PyPI) | 2026-05-03T13:42:23Z | 2026-05-07T20:04:36Z |
| mal-2026-3370 | Malicious code in sufiagent (PyPI) | 2026-05-07T19:18:44Z | 2026-05-07T19:18:44Z |
| mal-2026-3369 | Malicious code in dabrius (PyPI) | 2026-05-07T19:12:49Z | 2026-05-07T19:12:49Z |
| mal-2026-3368 | Malicious code in yc-depconf-test-807dff (PyPI) | 2026-05-07T17:55:20Z | 2026-05-07T17:55:20Z |
| mal-2026-3373 | Malicious code in owa-analytics-utils (npm) | 2026-05-07T16:08:35Z | 2026-05-07T16:08:35Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| 7paa020125 | Denial of Service Vulnerabilities in System 800xA, Symphony® Plus IEC 61850 communication stack | 2026-04-13T00:30:00.000Z | 2026-04-13T00:30:00.000Z |
| 7paa017341 | PostgreSQL vulnerabilities in ABB Ability™ Symphony® Plus Engineering | 2026-04-13T00:30:00.000Z | 2026-04-13T00:30:00.000Z |
| 7paa023732 | System 800xA affected by 3rd party component vulnerabilities | 2026-03-31T00:30:00.000Z | 2026-03-31T00:30:00.000Z |
| 4hzm000604 | ABB Ability Camera Connect Vulnerabilities in outdated 3rd party component (SQLite 3.2.4) | 2026-03-26T00:30:00.000Z | 2026-03-26T00:30:00.000Z |
| 4jno000329 | AWIN Gateways Vulnerabilities in Embedded Webserver | 2026-03-13T00:30:00.000Z | 2026-03-13T00:30:00.000Z |
| 3adr011536 | AC500 V3 Stack buffer overflow in Cryptographic Message Syntax | 2026-03-12T00:30:00.000Z | 2026-03-12T00:30:00.000Z |
| 3adr011525 | ABB Automation Builder Gateway for Windows with insecure defaults | 2026-02-24T00:30:00.000Z | 2026-02-24T00:30:00.000Z |
| 3adr011524 | AC500 V3 Multiple vulnerabilities | 2026-02-24T00:30:00.000Z | 2026-02-24T00:30:00.000Z |
| sa25p007 | B&R Automation Studio Update of SQLite version | 2026-02-18T00:30:00.000Z | 2026-02-18T00:30:00.000Z |
| sa26p001 | PVI Insertion of Sensitive Information into Logfile | 2026-01-29T00:30:00.000Z | 2026-01-29T00:30:00.000Z |
| sa24p003 | B&R PCs vulnerable to PixieFail attack | 2026-01-29T00:30:00.000Z | 2026-01-29T00:30:00.000Z |
| 7paa013309 | System 800xA SECURITY Advisory - ABB 800xA Base 6.0.x, 6.1.x CSLib communication DoS vulnerability | 2024-06-05T00:30:00.000Z | 2026-01-23T00:30:00.000Z |
| sa25p005 | B&R Automation Runtime Improper Handling of Flooding conditions on ANSL Server | 2026-01-19T00:30:00.000Z | 2026-01-19T00:30:00.000Z |
| sa25p004 | Automation Studio Insufficient Server Certificate Validation | 2026-01-19T00:30:00.000Z | 2026-01-19T00:30:00.000Z |
| 9akk108472a1331 | ABB Ability™ OPTIMAX® Authentication Bypass in Single-Sign On with Azure Active Directory | 2026-01-16T00:30:00.000Z | 2026-01-16T00:30:00.000Z |
| 2crt000009 | WebPro SNMP Card PowerValue Multiple Vulnerabilities | 2026-01-07T00:30:00.000Z | 2026-01-07T00:30:00.000Z |
| 9akk108471a8107 | Terra AC wallbox Heap Memory Corruption Vulnerability | 2025-09-16T00:30:00.000Z | 2025-11-28T08:00:00.000Z |
| 4hzm000603 | ABB Ability Camera Connect Vulnerabilities in outdated 3rd party component (VLC) | 2025-11-27T00:30:00.000Z | 2025-11-28T00:30:00.000Z |
| 7paa022088 | Edgenius Management Portal Authentication Bypass | 2025-11-20T00:30:00.000Z | 2025-11-20T00:30:00.000Z |
| 2nga002813 | PCM600 SharpZip library vulnerability | 2025-11-03T00:30:00.000Z | 2025-11-03T00:30:00.000Z |
| 4tz00000006007 | ALS-mini-S4/S8 IP Missing Authentication Vulnerability and its Mitigations | 2025-10-20T00:30:00.000Z | 2025-10-23T00:30:00.000Z |
| 9akk108471a8948 | Terra AC wallbox Heap Memory Corruption Vulnerability | 2025-10-20T00:30:00.000Z | 2025-10-21T00:30:00.000Z |
| 3kxg200000r4801 | CoreSense™ HM and CoreSense™ M10 File Path Traversal Vulnerability | 2025-04-16T00:30:00.000Z | 2025-10-20T00:30:00.000Z |
| sa25p003 | B&R Automation Runtime Vulnerabilities in System Diagnostic Manager (SDM) | 2025-10-07T00:30:00.000Z | 2025-10-14T00:30:00.000Z |
| 4tz00000006008 | LVS MConfig Insecure memory handling | 2025-10-08T00:30:00.000Z | 2025-10-08T00:30:00.000Z |
| sa25p002 | B&R Automation Runtime DoS Vulnerability in System Diagnostics Manager (SDM) | 2025-10-07T00:30:00.000Z | 2025-10-07T00:30:00.000Z |
| 9akk108471a7808 | EIBPORT Reflected XSS | 2025-10-07T00:30:00.000Z | 2025-10-07T00:30:00.000Z |
| 9akk108471a7121 | FLXeon Controllers Multiple vulnerabilities | 2025-09-09T00:30:00.000Z | 2025-09-18T00:30:00.000Z |
| 9akk108471a4462 | ELSB/BLBA ASPECT advisory several CVEs | 2025-08-11T00:30:00.000Z | 2025-09-04T00:30:00.000Z |
| 9akk108471a3623 | RMC - 100 Vulnerabilities in web UI (REST Interface) | 2025-07-03T00:30:00.000Z | 2025-08-18T00:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-1394 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2026-05-06T22:00:00.000+00:00 | 2026-05-07T22:00:00.000+00:00 |
| wid-sec-w-2026-1253 | OpenClaw: Mehrere Schwachstellen | 2026-04-23T22:00:00.000+00:00 | 2026-05-06T22:00:00.000+00:00 |
| wid-sec-w-2026-1227 | OpenClaw: Mehrere Schwachstellen | 2026-04-21T22:00:00.000+00:00 | 2026-05-06T22:00:00.000+00:00 |
| wid-sec-w-2026-1161 | OpenClaw: Mehrere Schwachstellen | 2026-04-16T22:00:00.000+00:00 | 2026-05-06T22:00:00.000+00:00 |
| wid-sec-w-2026-1174 | OpenClaw: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-04-19T22:00:00.000+00:00 | 2026-05-05T22:00:00.000+00:00 |
| wid-sec-w-2026-1349 | vm2: Mehrere Schwachstellen | 2026-05-03T22:00:00.000+00:00 | 2026-05-04T22:00:00.000+00:00 |
| wid-sec-w-2026-1334 | Exim und cPanel/WHM: Mehrere Schwachstellen | 2026-05-03T22:00:00.000+00:00 | 2026-05-04T22:00:00.000+00:00 |
| wid-sec-w-2026-1319 | LiteLLM: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-04-29T22:00:00.000+00:00 | 2026-05-04T22:00:00.000+00:00 |
| wid-sec-w-2026-1312 | GnuTLS: Mehrere Schwachstellen | 2026-04-29T22:00:00.000+00:00 | 2026-05-04T22:00:00.000+00:00 |
| wid-sec-w-2026-1307 | cURL: Mehrere Schwachstellen | 2026-04-28T22:00:00.000+00:00 | 2026-05-04T22:00:00.000+00:00 |
| wid-sec-w-2026-1306 | Xen und Citrix Systems XenServer: Mehrere Schwachstellen | 2026-04-28T22:00:00.000+00:00 | 2026-05-04T22:00:00.000+00:00 |
| wid-sec-w-2026-1304 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2026-04-28T22:00:00.000+00:00 | 2026-05-04T22:00:00.000+00:00 |
| wid-sec-w-2026-1296 | Mozilla Firefox und Firefox ESR: Mehrere Schwachstellen | 2026-04-28T22:00:00.000+00:00 | 2026-05-04T22:00:00.000+00:00 |
| wid-sec-w-2026-1292 | Prometheus: Mehrere Schwachstellen | 2026-04-27T22:00:00.000+00:00 | 2026-05-04T22:00:00.000+00:00 |
| wid-sec-w-2026-1232 | Linux Kernel: Mehrere Schwachstellen | 2026-04-21T22:00:00.000+00:00 | 2026-05-03T22:00:00.000+00:00 |
| wid-sec-w-2026-1260 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2026-04-23T22:00:00.000+00:00 | 2026-04-29T22:00:00.000+00:00 |
| wid-sec-w-2026-1035 | OpenClaw: Mehrere Schwachstellen | 2026-04-08T22:00:00.000+00:00 | 2026-04-28T22:00:00.000+00:00 |
| wid-sec-w-2026-1005 | OpenClaw: Mehrere Schwachstellen | 2026-04-07T22:00:00.000+00:00 | 2026-04-28T22:00:00.000+00:00 |
| wid-sec-w-2026-0980 | OpenClaw: Mehrere Schwachstellen | 2026-04-06T22:00:00.000+00:00 | 2026-04-28T22:00:00.000+00:00 |
| wid-sec-w-2026-0948 | OpenClaw: Mehrere Schwachstellen | 2026-03-31T22:00:00.000+00:00 | 2026-04-28T22:00:00.000+00:00 |
| wid-sec-w-2026-0930 | OpenClaw: Mehrere Schwachstellen | 2026-03-30T22:00:00.000+00:00 | 2026-04-28T22:00:00.000+00:00 |
| wid-sec-w-2026-1278 | SmarterTools SmarterMail: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2026-04-26T22:00:00.000+00:00 | 2026-04-27T22:00:00.000+00:00 |
| wid-sec-w-2026-1258 | Apache ActiveMQ: Mehrere Schwachstellen | 2026-04-23T22:00:00.000+00:00 | 2026-04-26T22:00:00.000+00:00 |
| wid-sec-w-2026-1256 | Microsoft Cloud-Produkte: Mehrere Schwachstellen | 2026-04-23T22:00:00.000+00:00 | 2026-04-26T22:00:00.000+00:00 |
| wid-sec-w-2026-1233 | PackageKit: Schwachstelle ermöglicht Privilegieneskalation | 2026-04-21T22:00:00.000+00:00 | 2026-04-26T22:00:00.000+00:00 |
| wid-sec-w-2026-1228 | Mozilla Thunderbird, Firefox ESR und Firefox: Mehrere Schwachstellen | 2026-04-21T22:00:00.000+00:00 | 2026-04-26T22:00:00.000+00:00 |
| wid-sec-w-2026-1223 | OpenBSD: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-04-21T22:00:00.000+00:00 | 2026-04-26T22:00:00.000+00:00 |
| wid-sec-w-2026-1219 | lxml: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-04-21T22:00:00.000+00:00 | 2026-04-26T22:00:00.000+00:00 |
| wid-sec-w-2026-1201 | Oracle Java SE: Mehrere Schwachstellen | 2026-04-21T22:00:00.000+00:00 | 2026-04-26T22:00:00.000+00:00 |
| wid-sec-w-2026-1160 | Red Hat Enterprise Linux und Satellite (satellite/iop-remediations-rhel9 container image): Mehrere Schwachstellen | 2026-04-16T22:00:00.000+00:00 | 2026-04-26T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-062-01 | Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet Module (Update A) | 2026-03-03T00:00:00.000000Z | 2026-05-07T06:00:00.000000Z |
| icsa-26-125-05 | Johnson Controls CEM AC2000 | 2026-05-05T06:00:00.000000Z | 2026-05-05T06:00:00.000000Z |
| icsa-26-125-04 | ABB B&R Automation Studio | 2026-01-19T00:30:00.000000Z | 2026-05-05T06:00:00.000000Z |
| icsa-26-125-03 | ABB B&R Automation Runtime | 2026-01-19T00:30:00.000000Z | 2026-05-05T06:00:00.000000Z |
| icsa-26-125-02 | ABB B&R PVI | 2026-01-29T00:30:00.000000Z | 2026-05-05T06:00:00.000000Z |
| icsa-26-125-01 | Hitachi Energy PCM600 | 2026-04-28T00:00:00.000000Z | 2026-05-05T06:00:00.000000Z |
| icsa-24-319-16 | Hitachi Energy MSM (Update A) | 2024-10-29T00:00:00.000000Z | 2026-05-05T06:00:00.000000Z |
| icsa-23-227-01 | Schneider Electric EcoStruxure Control Expert, Process Expert, Modicon M340, M580 and M580 CPU (Update A) | 2023-01-10T00:00:00.000000Z | 2026-05-05T06:00:00.000000Z |
| icsa-26-120-06 | ABB Ability Symphony Plus Engineering | 2026-04-13T00:30:00.000000Z | 2026-04-30T06:00:00.000000Z |
| icsa-26-120-05 | ABB AWIN Gateways | 2026-03-13T00:30:00.000000Z | 2026-04-30T06:00:00.000000Z |
| icsa-26-120-04 | ABB Ability OPTIMAX | 2026-01-16T00:30:00.000000Z | 2026-04-30T06:00:00.000000Z |
| icsa-26-120-03 | ABB Edgenius Management Portal | 2025-11-20T00:30:00.000000Z | 2026-04-30T06:00:00.000000Z |
| icsa-26-120-02 | AABB PCM600 | 2025-11-03T00:30:00.000000Z | 2026-04-30T06:00:00.000000Z |
| icsa-26-120-01 | ABB System 800xA, Symphony Plus IEC 61850 | 2026-04-13T00:30:00.000000Z | 2026-04-30T06:00:00.000000Z |
| icsa-25-128-03 | Mitsubishi Electric Multiple FA Products (Update C) | 2025-04-25T03:00:00.000000Z | 2026-04-30T06:00:00.000000Z |
| va-26-119-02 | TP-Link WR841N Router multiple vulnerabilities | 2026-04-29T14:27:50Z | 2026-04-29T14:27:50Z |
| va-26-119-01 | CryptPad unbounded WebSocket frame flood | 2026-04-29T00:00:00Z | 2026-04-29T00:00:00Z |
| icsa-26-118-01 | NSA GRASSMARLIN | 2026-04-28T06:00:00.000000Z | 2026-04-28T06:00:00.000000Z |
| icsa-26-113-06 | Intrado 911 Emergency Gateway (EGW) | 2026-04-23T06:00:00.000000Z | 2026-04-23T06:00:00.000000Z |
| icsa-26-113-05 | Hangzhou Xiongmai Technology Co., Ltd XM530 IP Camera | 2026-04-23T06:00:00.000000Z | 2026-04-23T06:00:00.000000Z |
| icsa-26-113-04 | SpiceJet Online Booking System | 2026-04-23T06:00:00.000000Z | 2026-04-23T06:00:00.000000Z |
| icsa-26-113-03 | Milesight Cameras | 2026-04-23T06:00:00.000000Z | 2026-04-23T06:00:00.000000Z |
| icsa-26-113-02 | Carlson Software VASCO-B GNSS Receiver | 2026-04-23T06:00:00.000000Z | 2026-04-23T06:00:00.000000Z |
| icsa-26-113-01 | Yadea T5 Electric Bicycle | 2026-04-23T06:00:00.000000Z | 2026-04-23T06:00:00.000000Z |
| icsa-25-114-01 | Schneider Electric Modicon Controllers (Update A) | 2019-05-14T16:48:40.000000Z | 2026-04-23T06:00:00.000000Z |
| icsa-26-111-12 | SenseLive X3050 | 2026-04-21T06:00:00.000000Z | 2026-04-21T06:00:00.000000Z |
| icsa-26-111-11 | Siemens Industrial Edge Management | 2026-04-14T00:00:00.000000Z | 2026-04-21T06:00:00.000000Z |
| icsa-26-111-10 | Silex Technology SD-330AC and AMC Manager | 2026-04-21T06:00:00.000000Z | 2026-04-21T06:00:00.000000Z |
| icsa-26-111-09 | Siemens SINEC NMS | 2026-04-14T00:00:00.000000Z | 2026-04-21T06:00:00.000000Z |
| icsa-26-111-08 | Siemens RUGGEDCOM CROSSBOW Station Access Controller (SAC) | 2026-04-14T00:00:00.000000Z | 2026-04-21T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-unity-rce-ssrf-henhuasy | Cisco Unity Connection Remote Code Execution and Server-Side Request Forgery Vulnerabilities | 2026-05-06T16:00:00+00:00 | 2026-05-06T16:00:00+00:00 |
| cisco-sa-slido-idor-cpsfmkxn | Cisco Slido Insecure Direct Object Reference Vulnerability | 2026-05-06T16:00:00+00:00 | 2026-05-06T16:00:00+00:00 |
| cisco-sa-sg350-snmp-dos-gefzr2tj | Cisco SG350 and SG350X Series Managed Switches SNMP Denial of Service Vulnerability | 2026-05-06T16:00:00+00:00 | 2026-05-06T16:00:00+00:00 |
| cisco-sa-pi-unauth-infodiscl-lfnlgmey | Cisco Prime Infrastructure Information Disclosure Vulnerability | 2026-05-06T16:00:00+00:00 | 2026-05-06T16:00:00+00:00 |
| cisco-sa-nso-dos-7egqyc | Cisco Crosswork Network Controller and Cisco Network Services Orchestrator Connection Exhaustion Denial of Service Vulnerability | 2026-05-06T16:00:00+00:00 | 2026-05-06T16:00:00+00:00 |
| cisco-sa-ise-unauth-bypass-uxjrxgpb | Cisco Identity Services Engine Authentication Bypass Vulnerabilities | 2026-05-06T16:00:00+00:00 | 2026-05-06T16:00:00+00:00 |
| cisco-sa-iot-fnd-dos-n8n26q4u | Cisco IoT Field Network Director Vulnerabilities | 2026-05-06T16:00:00+00:00 | 2026-05-06T16:00:00+00:00 |
| cisco-sa-ece-lite-agent-bcgsn8eb | Cisco Enterprise Chat and Email Lite Agent File Upload Vulnerability | 2026-05-06T16:00:00+00:00 | 2026-05-06T16:00:00+00:00 |
| cisco-sa-ise-xss-42tgsdmg | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2026-05-05T18:21:38+00:00 |
| cisco-sa-asaftd-persist-cisaed25-03 | Continued Evolution of Persistence Mechanism Against Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense | 2026-04-23T15:00:00+00:00 | 2026-04-30T18:57:23+00:00 |
| cisco-sa-ise-rce-traversal-8byndvrz | Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities | 2026-04-15T16:00:00+00:00 | 2026-04-28T14:33:18+00:00 |
| cisco-sa-aci-cloudsec-enc-vs5wn2sx | Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability | 2023-07-05T16:00:00+00:00 | 2026-04-24T13:05:36+00:00 |
| cisco-sa-cimc-xss-a2tkgvab | Cisco Integrated Management Controller Cross-Site Scripting Vulnerabilities | 2026-04-01T16:00:00+00:00 | 2026-04-22T18:05:52+00:00 |
| cisco-sa-cimc-cmd-inj-3hkn3bvt | Cisco Integrated Management Controller Command Injection and Remote Code Execution Vulnerabilities | 2026-04-01T16:00:00+00:00 | 2026-04-22T18:01:40+00:00 |
| cisco-sa-sdwan-authbp-qwcx8d4v | Cisco Catalyst SD-WAN Vulnerabilities | 2026-02-25T16:00:00+00:00 | 2026-04-22T15:10:56+00:00 |
| cisco-sa-webex-cui-cert-8jszyhwl | Cisco Webex Services Certificate Validation Vulnerability | 2026-04-15T16:00:00+00:00 | 2026-04-16T18:52:15+00:00 |
| cisco-sa-wsa-auth-bypass-6yzktqhd | Cisco Secure Web Appliance Authentication Bypass Vulnerability | 2026-04-15T16:00:00+00:00 | 2026-04-16T13:14:04+00:00 |
| cisco-sa-webexcc-xss-wex5nuna | Cisco Webex Contact Center Cross-Site Scripting Vulnerability | 2026-04-15T16:00:00+00:00 | 2026-04-15T16:00:00+00:00 |
| cisco-sa-unity-vulns-n2ejsbbw | Cisco Unity Connection Cross-Site Scripting, Open Redirect, and SQL Injection Vulnerabilities | 2026-04-15T16:00:00+00:00 | 2026-04-15T16:00:00+00:00 |
| cisco-sa-unity-file-download-rmkevwpx | Cisco Unity Connection Arbitrary File Download Vulnerabilities | 2026-04-15T16:00:00+00:00 | 2026-04-15T16:00:00+00:00 |
| cisco-sa-te-agentfilewrite-tquw3smu | Cisco ThousandEyes Enterprise Agent Arbitrary File Overwrite Vulnerability | 2026-04-15T16:00:00+00:00 | 2026-04-15T16:00:00+00:00 |
| cisco-sa-isexss-bs8cte7u | Cisco Identity Services Engine Multiple Cross-Site Scripting Vulnerabilities | 2026-04-15T16:00:00+00:00 | 2026-04-15T16:00:00+00:00 |
| cisco-sa-ise-rce-4fverepv | Cisco Identity Services Engine Remote Code Execution Vulnerabilities | 2026-04-15T16:00:00+00:00 | 2026-04-15T16:00:00+00:00 |
| cisco-sa-ise-cmd-inj-5wsjcyjb | Cisco Identity Services Engine Authenticated Privilege Escalation Vulnerability | 2026-04-15T16:00:00+00:00 | 2026-04-15T16:00:00+00:00 |
| cisco-sa-iosxe-mntc-dos-lzweqcyq | Cisco IOS XE Software Denial of Service Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-04-02T19:43:54+00:00 |
| cisco-sa-ssm-cli-execution-chucwunr | Cisco Smart Software Manager On-Prem Arbitrary Command Execution Vulnerability | 2026-04-01T16:00:00+00:00 | 2026-04-01T16:00:00+00:00 |
| cisco-sa-ndi-afw-rjurc5dz | Cisco Nexus Dashboard Insights Arbitrary File Write Vulnerability | 2026-04-01T16:00:00+00:00 | 2026-04-01T16:00:00+00:00 |
| cisco-sa-nd-ssrf-naen4o7r | Cisco Nexus Dashboard and Nexus Dashboard Insights Server-Side Request Forgery Vulnerability | 2026-04-01T16:00:00+00:00 | 2026-04-01T16:00:00+00:00 |
| cisco-sa-nd-cbid-5yqkoshu | Cisco Nexus Dashboard Configuration Backup REST API Unauthorized Access Vulnerability | 2026-04-01T16:00:00+00:00 | 2026-04-01T16:00:00+00:00 |
| cisco-sa-epnm-improp-auth-muwfwuu3 | Cisco Evolved Programmable Network Manager Improper Authorization Vulnerability | 2026-04-01T16:00:00+00:00 | 2026-04-01T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-71289 | fs/ntfs3: handle attr_set_size() errors when truncating files | 2026-05-02T00:00:00.000Z | 2026-05-08T01:44:19.000Z |
| msrc_cve-2026-43274 | mailbox: mchp-ipc-sbi: fix out-of-bounds access in mchp_ipc_get_cluster_aggr_irq() | 2026-05-02T00:00:00.000Z | 2026-05-08T01:44:07.000Z |
| msrc_cve-2026-43116 | netfilter: ctnetlink: ensure safe access to master conntrack | 2026-05-02T00:00:00.000Z | 2026-05-08T01:44:02.000Z |
| msrc_cve-2026-43153 | xfs: remove xfs_attr_leaf_hasname | 2026-05-02T00:00:00.000Z | 2026-05-08T01:43:55.000Z |
| msrc_cve-2025-71273 | wifi: rtw88: Use devm_kmemdup() in rtw_set_supported_band() | 2026-05-02T00:00:00.000Z | 2026-05-08T01:43:50.000Z |
| msrc_cve-2026-43172 | wifi: iwlwifi: fix 22000 series SMEM parsing | 2026-05-02T00:00:00.000Z | 2026-05-08T01:43:38.000Z |
| msrc_cve-2026-43245 | ntfs: ->d_compare() must not block | 2026-05-02T00:00:00.000Z | 2026-05-08T01:43:24.000Z |
| msrc_cve-2026-43198 | tcp: fix potential race in tcp_v6_syn_recv_sock() | 2026-05-02T00:00:00.000Z | 2026-05-08T01:43:19.000Z |
| msrc_cve-2026-43161 | iommu/vt-d: Skip dev-iotlb flush for inaccessible PCIe device without scalable mode | 2026-05-02T00:00:00.000Z | 2026-05-08T01:43:14.000Z |
| msrc_cve-2026-43248 | vhost: move vdpa group bound check to vhost_vdpa | 2026-05-02T00:00:00.000Z | 2026-05-08T01:42:58.000Z |
| msrc_cve-2026-43125 | dlm: validate length in dlm_search_rsb_tree | 2026-05-02T00:00:00.000Z | 2026-05-08T01:42:53.000Z |
| msrc_cve-2026-37457 | CVE-2026-37457 | 2026-05-02T00:00:00.000Z | 2026-05-08T01:42:40.000Z |
| msrc_cve-2026-6843 | Nano: nano: format string vulnerability leads to denial of service | 2026-04-02T00:00:00.000Z | 2026-05-08T01:42:31.000Z |
| msrc_cve-2026-6842 | Nano: nano: local attacker can inject malicious .desktop launcher due to insecure directory permissions | 2026-04-02T00:00:00.000Z | 2026-05-08T01:42:25.000Z |
| msrc_cve-2026-3219 | pip doesn't reject concatenated ZIP and tar archives | 2026-04-02T00:00:00.000Z | 2026-05-08T01:40:39.000Z |
| msrc_cve-2026-43083 | net: ioam6: fix OOB and missing lock | 2026-05-02T00:00:00.000Z | 2026-05-08T01:40:04.000Z |
| msrc_cve-2026-43199 | net/mlx5e: Fix "scheduling while atomic" in IPsec MAC address query | 2026-05-02T00:00:00.000Z | 2026-05-08T01:39:58.000Z |
| msrc_cve-2026-43101 | ipv6: ioam: fix potential NULL dereferences in __ioam6_fill_trace_data() | 2026-05-02T00:00:00.000Z | 2026-05-08T01:39:53.000Z |
| msrc_cve-2026-43119 | Bluetooth: hci_sync: annotate data-races around hdev->req_status | 2026-05-02T00:00:00.000Z | 2026-05-08T01:39:44.000Z |
| msrc_cve-2026-43195 | drm/amdgpu: validate user queue size constraints | 2026-05-02T00:00:00.000Z | 2026-05-08T01:39:28.000Z |
| msrc_cve-2026-43250 | usb: chipidea: udc: fix DMA and SG cleanup in _ep_nuke() | 2026-05-02T00:00:00.000Z | 2026-05-08T01:39:12.000Z |
| msrc_cve-2026-25589 | RedisBloom RESTORE invalid memory access may allow remote code execution | 2026-05-02T00:00:00.000Z | 2026-05-08T01:02:25.000Z |
| msrc_cve-2026-25588 | RedisTimeSeries RESTORE invalid memory access may allow remote code execution | 2026-05-02T00:00:00.000Z | 2026-05-08T01:02:19.000Z |
| msrc_cve-2026-23479 | redis-server use-after-free in unblock client flow may allow remote code execution | 2026-05-02T00:00:00.000Z | 2026-05-08T01:02:14.000Z |
| msrc_cve-2026-31718 | ksmbd: fix use-after-free in __ksmbd_close_fd() via durable scavenger | 2026-05-02T00:00:00.000Z | 2026-05-08T01:02:08.000Z |
| msrc_cve-2026-31717 | ksmbd: validate owner of durable handle on reconnect | 2026-05-02T00:00:00.000Z | 2026-05-08T01:02:02.000Z |
| msrc_cve-2026-23631 | redis-server Lua use-after-free may allow remote code execution | 2026-05-02T00:00:00.000Z | 2026-05-08T01:01:51.000Z |
| msrc_cve-2026-25243 | redis-server RESTORE invalid memory access may allow remote code execution | 2026-05-02T00:00:00.000Z | 2026-05-08T01:01:46.000Z |
| msrc_cve-2026-41673 | xmldom: Denial of service via uncontrolled recursion in XML serialization | 2026-05-02T00:00:00.000Z | 2026-05-08T01:01:40.000Z |
| msrc_cve-2026-41675 | xmldom: XML node injection through unvalidated processing instruction serialization | 2026-05-02T00:00:00.000Z | 2026-05-08T01:01:35.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0135 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager Mobile | 2026-05-07T16:17:26.313490Z | 2026-05-07T16:17:26.313490Z |
| ncsc-2026-0134 | Kwetsbaarheden verholpen in Apache HTTP Server | 2026-05-06T11:33:26.390004Z | 2026-05-06T11:33:26.390004Z |
| ncsc-2026-0133 | Kwetsbaarheden verholpen in Progress MOVEit Automation | 2026-05-06T09:18:44.336770Z | 2026-05-06T09:18:44.336770Z |
| ncsc-2026-0132 | Kwetsbaarheid verholpen in Palo Alto Networks PAN-OS | 2026-05-06T08:38:23.996672Z | 2026-05-06T08:42:18.423397Z |
| ncsc-2026-0131 | Kwetsbaarheid verholpen in Linux kernel cryptographic subsystem | 2026-05-01T06:13:56.267237Z | 2026-05-01T06:13:56.267237Z |
| ncsc-2026-0130 | Kwetsbaarheid verholpen in cPanel en WHM | 2026-04-30T08:00:11.291177Z | 2026-04-30T08:00:11.291177Z |
| ncsc-2026-0129 | Kwetsbaarheden verholpen in Apache Camel | 2026-04-29T08:12:14.412477Z | 2026-04-29T08:12:14.412477Z |
| ncsc-2026-0128 | Kwetsbaarheden verholpen in GitLab EE en CE | 2026-04-23T11:21:11.080481Z | 2026-04-23T11:21:11.080481Z |
| ncsc-2026-0127 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2026-04-22T14:10:36.199130Z | 2026-04-22T14:10:36.199130Z |
| ncsc-2026-0126 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2026-04-22T12:56:26.266249Z | 2026-04-22T12:56:26.266249Z |
| ncsc-2026-0125 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2026-04-22T12:46:17.624971Z | 2026-04-22T12:46:17.624971Z |
| ncsc-2026-0124 | Kwetsbaarheden verholpen in Oracle Identity Manager Connector | 2026-04-22T11:33:45.816246Z | 2026-04-22T11:33:45.816246Z |
| ncsc-2026-0123 | Kwetsbaarheid verholpen in ASP.NET Core van Microsoft | 2026-04-22T09:40:27.334869Z | 2026-04-22T09:40:27.334869Z |
| ncsc-2026-0122 | Kwetsbaarheid verholpen in Cisco Webex Services | 2026-04-17T08:37:31.398143Z | 2026-04-17T08:37:31.398143Z |
| ncsc-2026-0121 | Kwetsbaarheden verholpen in Fortinet FortiSandbox | 2026-04-15T12:23:16.801183Z | 2026-04-15T12:23:16.801183Z |
| ncsc-2026-0120 | Kwetsbaarheden verholpen in Fortinet FortiAnalyzer en FortiManager | 2026-04-15T12:20:38.675602Z | 2026-04-15T12:20:38.675602Z |
| ncsc-2026-0115 | Kwetsbaarheid verholpen in Microsoft Defender | 2026-04-14T19:19:48.691858Z | 2026-04-15T08:54:16.881135Z |
| ncsc-2026-0119 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-04-15T08:53:38.926894Z | 2026-04-15T08:53:38.926894Z |
| ncsc-2026-0118 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2026-04-14T19:24:22.610160Z | 2026-04-14T19:24:22.610160Z |
| ncsc-2026-0117 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-04-14T19:23:30.733725Z | 2026-04-14T19:23:30.733725Z |
| ncsc-2026-0116 | Kwetsbaarheden verholpen in Microsoft Office | 2026-04-14T19:20:56.343558Z | 2026-04-14T19:20:56.343558Z |
| ncsc-2026-0114 | Kwetsbaarheden verholpen in Microsoft Developer tools | 2026-04-14T19:18:58.666745Z | 2026-04-14T19:18:58.666745Z |
| ncsc-2026-0113 | Kwetsbaarheden verholpen in SAP-producten | 2026-04-14T12:55:40.388960Z | 2026-04-14T12:55:40.388960Z |
| ncsc-2026-0112 | Kwetsbaarheden verholpen in Siemens producten | 2026-04-14T11:37:21.682429Z | 2026-04-14T11:37:21.682429Z |
| ncsc-2026-0111 | Kwetsbaarheid verholpen in Adobe Acrobat | 2026-04-12T08:42:18.844193Z | 2026-04-13T09:38:04.129352Z |
| ncsc-2026-0110 | Kwetsbaarheid verholpen in Cisco Smart Software Manager On-Prem | 2026-04-10T14:28:58.703642Z | 2026-04-10T14:28:58.703642Z |
| ncsc-2026-0007 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-01-13T19:16:30.720079Z | 2026-04-10T12:53:42.521564Z |
| ncsc-2026-0109 | Kwetsbaarheden verholpen in Synology SSL VPN Client | 2026-04-10T12:11:00.859799Z | 2026-04-10T12:11:00.859799Z |
| ncsc-2026-0108 | Kwetsbaarheid verholpen in Juniper Networks Junos OS Evolved | 2026-04-10T12:06:13.479822Z | 2026-04-10T12:06:13.479822Z |
| ncsc-2026-0107 | Kwetsbaarheid verholpen in FortiClient EMS van Fortinet | 2026-04-04T13:49:19.002116Z | 2026-04-04T13:49:19.002116Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2026:2-01 | Stored Cross-Site Scripting (XSS) in Assets and Nodes in Guardian/CMC before 26.0.0 | 2026-04-15T11:00:00.000Z | 2026-04-15T11:00:00.000Z |
| nn-2026:1-01 | Incorrect authorization for Threat Intelligence in Guardian/CMC before 26.0.0 | 2026-04-15T11:00:00.000Z | 2026-04-15T11:00:00.000Z |
| nn-2025:18-01 | Lack of TLS certificate validation when connecting Arc to a Guardian or CMC, in Arc before v2.2.0 | 2026-03-04T11:00:00.000Z | 2026-03-04T11:00:00.000Z |
| nn-2025:17-01 | HTML injection in Sensor Map in CMC before 25.6.0 | 2026-03-04T11:00:00.000Z | 2026-03-04T11:00:00.000Z |
| nn-2025:16-01 | HTML injection in Alerted Nodes Dashboard in Guardian/CMC before 25.6.0 | 2026-03-04T11:00:00.000Z | 2026-03-04T11:00:00.000Z |
| nn-2025:15-01 | Path traversal in Import Arc data archive functionality in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:14-01 | HTML injection in Asset List in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:13-01 | Stored Cross-Site Scripting (XSS) in Reports in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:12-01 | HTML injection in in Time Machine functionality in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:11-01 | Stored Cross-Site Scripting (XSS) in Dashboards in Guardian/CMC before 25.4.0 | 2025-11-25T11:00:00.000Z | 2025-11-26T11:00:00.000Z |
| nn-2025:9-01 | Path traversal in Time Machine functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:8-01 | Authenticated SQL Injection on Alert functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:7-01 | Authenticated SQL Injection on Alert functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:6-01 | Authenticated SQL Injection on Smart Polling functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:5-01 | Incorrect authorization for CLI in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:4-01 | Client-side path traversal in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:10-01 | Authenticated SQL Injection on CLI functionality in Guardian/CMC before 25.3.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:3-01 | Incorrect authorization for traces request/download in CMC before 25.1.0 | 2025-08-26T11:00:00.000Z | 2025-08-26T11:00:00.000Z |
| nn-2025:2-01 | Privilege escalation in Guardian/CMC before 24.6.0 | 2025-06-10T11:00:00.000Z | 2025-06-10T11:00:00.000Z |
| nn-2025:1-01 | Authenticated RCE in update functionality in Guardian/CMC before 24.6.0 | 2025-06-10T11:00:00.000Z | 2025-06-10T11:00:00.000Z |
| nn-2023_17-01 | Information disclosure via audit records for OpenAPI requests in Guardian/CMC before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-04-11T11:00:00.000Z |
| nn-2023:17-01 | Information disclosure via audit records for OpenAPI requests in Guardian/CMC before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-04-11T11:00:00.000Z |
| nn-2024_1-01 | DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-04-10T11:00:00.000Z |
| nn-2024:1-01 | DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-04-10T11:00:00.000Z |
| nn-2023_12-01 | Check Point IoT integration: WebSocket returns assets data without authentication in Guardian/CMC before 23.3.0 | 2024-01-15T11:00:00.000Z | 2024-01-16T11:00:00.000Z |
| nn-2023:12-01 | Check Point IoT integration: WebSocket returns assets data without authentication in Guardian/CMC before 23.3.0 | 2024-01-15T11:00:00.000Z | 2024-01-16T11:00:00.000Z |
| nn-2023_9-01 | Authenticated SQL Injection on Query functionality in Guardian/CMC before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_8-01 | Session Fixation in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_7-01 | DoS via SAML configuration in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_6-01 | Partial DoS on Reports section due to null report name in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10715-1 | libtree-sitter0_26-0.26.8-2.1 on GA media | 2026-05-06T00:00:00Z | 2026-05-06T00:00:00Z |
| opensuse-su-2026:10714-1 | traefik2-2.11.45-1.1 on GA media | 2026-05-06T00:00:00Z | 2026-05-06T00:00:00Z |
| opensuse-su-2026:10713-1 | traefik-3.6.16-1.1 on GA media | 2026-05-06T00:00:00Z | 2026-05-06T00:00:00Z |
| opensuse-su-2026:10712-1 | semaphore-2.18.1-1.1 on GA media | 2026-05-06T00:00:00Z | 2026-05-06T00:00:00Z |
| opensuse-su-2026:10711-1 | redis-8.6.3-1.1 on GA media | 2026-05-06T00:00:00Z | 2026-05-06T00:00:00Z |
| opensuse-su-2026:10710-1 | python311-jupyter-server-2.18.1-1.1 on GA media | 2026-05-06T00:00:00Z | 2026-05-06T00:00:00Z |
| opensuse-su-2026:10709-1 | python313-Django6-6.0.5-1.1 on GA media | 2026-05-06T00:00:00Z | 2026-05-06T00:00:00Z |
| opensuse-su-2026:10708-1 | python311-Django4-4.2.30-2.1 on GA media | 2026-05-06T00:00:00Z | 2026-05-06T00:00:00Z |
| opensuse-su-2026:10707-1 | postfix-3.11.2-1.1 on GA media | 2026-05-06T00:00:00Z | 2026-05-06T00:00:00Z |
| opensuse-su-2026:10706-1 | podman-5.8.2-1.1 on GA media | 2026-05-06T00:00:00Z | 2026-05-06T00:00:00Z |
| opensuse-su-2026:10705-1 | libpcp-devel-6.3.8-1.1 on GA media | 2026-05-06T00:00:00Z | 2026-05-06T00:00:00Z |
| opensuse-su-2026:10704-1 | micropython-1.28.0-2.1 on GA media | 2026-05-06T00:00:00Z | 2026-05-06T00:00:00Z |
| opensuse-su-2026:10703-1 | kernel-devel-7.0.3-1.1 on GA media | 2026-05-06T00:00:00Z | 2026-05-06T00:00:00Z |
| opensuse-su-2026:10702-1 | hauler-1.4.3-1.1 on GA media | 2026-05-06T00:00:00Z | 2026-05-06T00:00:00Z |
| opensuse-su-2026:10701-1 | avahi-0.8-44.1 on GA media | 2026-05-06T00:00:00Z | 2026-05-06T00:00:00Z |
| opensuse-su-2026:10700-1 | apptainer-1.4.5-4.1 on GA media | 2026-05-06T00:00:00Z | 2026-05-06T00:00:00Z |
| opensuse-su-2026:10699-1 | amazon-cloudwatch-agent-1.300066.1-1.1 on GA media | 2026-05-06T00:00:00Z | 2026-05-06T00:00:00Z |
| opensuse-su-2026:20681-1 | Security update for java-21-openjdk | 2026-05-05T16:02:08Z | 2026-05-05T16:02:08Z |
| opensuse-su-2026:20680-1 | Security update for java-17-openjdk | 2026-05-05T15:49:16Z | 2026-05-05T15:49:16Z |
| opensuse-su-2026:20683-1 | Security update for opencc | 2026-05-05T15:14:20Z | 2026-05-05T15:14:20Z |
| opensuse-su-2026:20682-1 | Security update for frr | 2026-05-05T14:33:42Z | 2026-05-05T14:33:42Z |
| opensuse-su-2026:10686-1 | libwireshark19-4.6.5-1.1 on GA media | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| opensuse-su-2026:10685-1 | libthrift-0_23_0-0.23.0-1.1 on GA media | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| opensuse-su-2026:10684-1 | teleport-17.7.23-1.1 on GA media | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| opensuse-su-2026:10683-1 | skim-4.6.1-1.1 on GA media | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| opensuse-su-2026:10682-1 | rclone-1.74.0-1.1 on GA media | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| opensuse-su-2026:10681-1 | python311-social-auth-core-4.8.7-1.1 on GA media | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| opensuse-su-2026:10680-1 | python311-django-allauth-65.16.1-2.1 on GA media | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| opensuse-su-2026:10679-1 | net-tools-3.14~alpha~git.20251212.7011617-1.1 on GA media | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| opensuse-su-2026:10678-1 | liblxc-devel-7.0.0-1.1 on GA media | 2026-05-04T00:00:00Z | 2026-05-04T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| oxdc-adv-2026-0001 | OX Dovecot Security Advisory OXDC-ADV-2026-0001 | 2026-03-27T00:00:00+00:00 | 2026-03-27T00:00:00+00:00 |
| oxdc-adv-2025-0001 | OX Dovecot Pro Security Advisory OXDC-ADV-2025-0001 | 2025-10-31T00:00:00+00:00 | 2025-11-27T00:00:00+00:00 |
| oxas-adv-2025-0003 | OX App Suite Security Advisory OXAS-ADV-2025-0003 | 2025-09-24T00:00:00+02:00 | 2025-11-27T00:00:00+00:00 |
| oxas-adv-2025-0002 | OX App Suite Security Advisory OXAS-ADV-2025-0002 | 2025-08-12T00:00:00+02:00 | 2025-10-31T00:00:00+00:00 |
| oxas-adv-2025-0001 | OX App Suite Security Advisory OXAS-ADV-2025-0001 | 2025-01-27T00:00:00+01:00 | 2025-04-07T00:00:00+00:00 |
| oxdc-adv-2024-0003 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0003 | 2024-09-10T00:00:00+02:00 | 2024-09-10T00:00:00+00:00 |
| oxdc-adv-2024-0002 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0002 | 2024-09-10T00:00:00+02:00 | 2024-09-10T00:00:00+00:00 |
| oxas-adv-2024-0005 | OX App Suite Security Advisory OXAS-ADV-2024-0005 | 2024-07-08T00:00:00+02:00 | 2024-09-09T00:00:00+00:00 |
| oxdc-adv-2024-0001 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0001 | 2024-09-02T00:00:00+02:00 | 2024-09-06T00:00:00+00:00 |
| oxas-adv-2024-0004 | OX App Suite Security Advisory OXAS-ADV-2024-0004 | 2024-06-13T00:00:00+02:00 | 2024-08-19T00:00:00+00:00 |
| oxas-adv-2024-0003 | OX App Suite Security Advisory OXAS-ADV-2024-0003 | 2024-04-24T00:00:00+02:00 | 2024-08-19T00:00:00+00:00 |
| oxas-adv-2024-0002 | OX App Suite Security Advisory OXAS-ADV-2024-0002 | 2024-03-06T00:00:00+01:00 | 2024-05-06T00:00:00+00:00 |
| oxas-adv-2024-0001 | OX App Suite Security Advisory OXAS-ADV-2024-0001 | 2024-02-08T00:00:00+01:00 | 2024-04-25T00:00:00+00:00 |
| oxas-adv-2023-0007 | OX App Suite Security Advisory OXAS-ADV-2023-0007 | 2023-12-11T00:00:00+01:00 | 2024-02-16T00:00:00+00:00 |
| oxas-adv-2023-0006 | OX App Suite Security Advisory OXAS-ADV-2023-0006 | 2023-09-25T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0005 | OX App Suite Security Advisory OXAS-ADV-2023-0005 | 2023-09-19T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0004 | OX App Suite Security Advisory OXAS-ADV-2023-0004 | 2023-08-01T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0003 | OX App Suite Security Advisory OXAS-ADV-2023-0003 | 2023-05-02T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0002 | OX App Suite Security Advisory OXAS-ADV-2023-0002 | 2023-03-20T00:00:00+01:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0001 | OX App Suite Security Advisory OXAS-ADV-2023-0001 | 2023-02-06T00:00:00+01:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2022-0002 | OX App Suite Security Advisory OXAS-ADV-2022-0002 | 2022-11-02T00:00:00+01:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2022-0001 | OX App Suite Security Advisory OXAS-ADV-2022-0001 | 2022-08-10T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:6428 | Red Hat Security Advisory: Network Observability 1.11.1 for OpenShift | 2026-04-02T07:50:38+00:00 | 2026-05-08T12:24:20+00:00 |
| rhsa-2026:6226 | Red Hat Security Advisory: Multicluster Global Hub 1.6.2 security update | 2026-03-31T02:53:32+00:00 | 2026-05-08T12:24:20+00:00 |
| rhsa-2026:5968 | Red Hat Security Advisory: Satellite 6.18.4 Async Update | 2026-03-26T19:47:53+00:00 | 2026-05-08T12:24:20+00:00 |
| rhsa-2026:6192 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.27.0 Release. | 2026-03-30T15:41:48+00:00 | 2026-05-08T12:24:19+00:00 |
| rhsa-2026:6184 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.19.13 security, enhancement & bug fix update | 2026-03-30T13:41:49+00:00 | 2026-05-08T12:24:19+00:00 |
| rhsa-2026:6174 | Red Hat Security Advisory: Red Hat Developer Hub 1.8.5 release. | 2026-03-30T12:51:47+00:00 | 2026-05-08T12:24:18+00:00 |
| rhsa-2026:5866 | Red Hat Security Advisory: OpenShift Container Platform 4.17.52 packages and security update | 2026-04-01T09:29:07+00:00 | 2026-05-08T12:24:18+00:00 |
| rhsa-2026:5853 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-26T01:05:19+00:00 | 2026-05-08T12:24:18+00:00 |
| rhsa-2026:5852 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-26T00:58:34+00:00 | 2026-05-08T12:24:17+00:00 |
| rhsa-2026:5851 | Red Hat Security Advisory: DevWorkspace Operator 0.40.0 release. | 2026-03-25T23:56:41+00:00 | 2026-05-08T12:24:16+00:00 |
| rhsa-2026:5807 | Red Hat Security Advisory: RHOAI 2.16.4 - Red Hat OpenShift AI | 2026-03-25T12:32:51+00:00 | 2026-05-08T12:24:16+00:00 |
| rhsa-2026:5645 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.17.1 | 2026-03-24T15:38:55+00:00 | 2026-05-08T12:24:15+00:00 |
| rhsa-2026:5079 | Red Hat Security Advisory: rhc security update | 2026-03-19T09:49:36+00:00 | 2026-05-08T12:24:15+00:00 |
| rhsa-2026:5636 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.7.9 security update | 2026-03-24T14:23:47+00:00 | 2026-05-08T12:24:14+00:00 |
| rhsa-2026:5544 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-24T06:55:51+00:00 | 2026-05-08T12:24:14+00:00 |
| rhsa-2026:5533 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-24T04:02:36+00:00 | 2026-05-08T12:24:14+00:00 |
| rhsa-2026:5461 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-23T17:44:49+00:00 | 2026-05-08T12:24:13+00:00 |
| rhsa-2026:5394 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 director Operator container images | 2026-03-23T13:04:11+00:00 | 2026-05-08T12:24:12+00:00 |
| rhsa-2026:5327 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-23T07:40:40+00:00 | 2026-05-08T12:24:12+00:00 |
| rhsa-2026:5146 | Red Hat Security Advisory: yggdrasil security update | 2026-03-19T16:04:46+00:00 | 2026-05-08T12:24:11+00:00 |
| rhsa-2026:5110 | Red Hat Security Advisory: Multicluster Global Hub 1.5.4 security update | 2026-03-19T10:27:09+00:00 | 2026-05-08T12:24:11+00:00 |
| rhsa-2026:5078 | Red Hat Security Advisory: rhc security update | 2026-03-19T21:11:27+00:00 | 2026-05-08T12:24:10+00:00 |
| rhsa-2026:5077 | Red Hat Security Advisory: rhc security update | 2026-03-19T23:49:18+00:00 | 2026-05-08T12:24:10+00:00 |
| rhsa-2026:5076 | Red Hat Security Advisory: rhc security update | 2026-03-19T21:34:22+00:00 | 2026-05-08T12:24:09+00:00 |
| rhsa-2026:5031 | Red Hat Security Advisory: rhc security update | 2026-03-19T05:19:39+00:00 | 2026-05-08T12:24:09+00:00 |
| rhsa-2026:5030 | Red Hat Security Advisory: rhc security update | 2026-03-19T05:15:04+00:00 | 2026-05-08T12:24:09+00:00 |
| rhsa-2026:4510 | Red Hat Security Advisory: OpenShift Container Platform 4.17.51 bug fix and security update | 2026-03-19T02:31:44+00:00 | 2026-05-08T12:24:08+00:00 |
| rhsa-2026:5022 | Red Hat Security Advisory: rhc security update | 2026-03-19T05:02:24+00:00 | 2026-05-08T12:24:07+00:00 |
| rhsa-2026:4952 | Red Hat Security Advisory: rhc security update | 2026-03-18T21:13:13+00:00 | 2026-05-08T12:24:07+00:00 |
| rhsa-2026:4942 | Red Hat Security Advisory: Red Hat Quay 3.12.15 | 2026-03-18T16:21:15+00:00 | 2026-05-08T12:24:07+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2026-104-03 | Use of Hard-coded Credentials vulnerability on Easergy MiCOM Px40 Series | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2026-104-02 | Third-Party vulnerability on Modicon Networking Managed Switches | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2026-104-01 | Multiple Vulnerabilities on PowerChute™ Serial Shutdown | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2025-224-05 | Modicon M340 Controller and Communication Modules | 2025-08-12T04:00:00.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2025-014-05 | Web Server on Modicon M340, Modbus/TCP Ethernet Modicon M340 module, Modbus/TCP Ethernet Modicon M340 FactoryCast module and Ethernet / Serial RTU communication modules | 2025-01-14T00:00:00.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2024-317-02 | Modicon Controllers M340 / Momentum / MC80 & EcoStruxure™ Control Expert | 2024-11-12T00:00:00.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2024-163-01 | Modicon M340, Modbus/TCP Ethernet Modicon M340 module, and Modbus/TCP Ethernet Modicon M340 FactoryCast module | 2024-06-11T00:00:00.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2024-044-01 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon M340, M580 and M580 Safety PLCs | 2024-02-13T12:41:43.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2023-010-06 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon M340, M580 and M580 CPU Safety | 2023-01-10T00:00:00.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2019-134-11 | Multiple Vulnerabilities in Modicon Controller Products | 2019-05-14T16:48:40.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2026-069-02 | Improper Neutralization vulnerability in Multiple Products | 2026-03-10T07:00:00.000Z | 2026-03-31T07:00:00.000Z |
| sevd-2026-069-01 | Improper Resource Shutdown or Release vulnerability in Multiple Products | 2026-03-10T07:00:00.000Z | 2026-03-31T07:00:00.000Z |
| sevd-2026-069-03 | Deserialization of Untrusted Data vulnerability on EcoStruxure™ Foxboro DCS | 2026-03-10T07:00:00.000Z | 2026-03-13T07:00:00.000Z |
| sevd-2026-069-06 | Deserialization of Untrusted Data vulnerability on Multiple Products | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2026-069-05 | Use of Hard-coded Credentials vulnerability in EcoStruxure™ IT Data Center Expert | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2026-069-04 | Improper Control of Generation of Code ('Code Injection') vulnerability on EcoStruxure™ Automation Expert | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2026-013-04 | Multiple Vulnerabilities on EcoStruxure Power Build Rapsody | 2026-01-13T08:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2026-013-01 | Multiple Third-Party Vulnerabilities on ProLeiT Plant iT/Brewmaxx | 2026-01-13T08:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2025-014-07 | FlexNet Publisher Vulnerability | 2025-01-14T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2026-041-02 | Multiple Vulnerabilities on EcoStruxure™ Building Operation Workstation and EcoStruxure™ Building Operation Webstation | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2026-041-01 | Improper Check for Unusual or Exceptional Conditions on Multiple Products | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2025-343-01 | EcoStruxure™ Foxboro DCS | 2025-12-09T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2025-189-03 | EcoStruxure™ Power Operation | 2025-07-08T04:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2025-042-02 | Improper Input Validation Vulnerability in Uni-Telway Driver | 2025-02-11T05:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2026-013-03 | Multiple Vulnerabilities on Zigbee Products | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2026-013-02 | Incorrect Default Permissions Vulnerability on EcoStruxure™ Process Expert | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2025-014-06 | RemoteConnect and SCADAPack™ x70 Utilities | 2025-01-14T00:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2024-317-03 | Modicon Controllers M340 / Momentum / MC80 | 2024-11-12T05:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2025-343-02 | EcoStruxure™ Foxboro DCS Advisor | 2025-12-09T08:00:00.000Z | 2025-12-09T08:00:00.000Z |
| sevd-2025-252-01 | Multiple Altivar Process Drives and Communication Modules | 2025-09-09T04:00:00.000Z | 2025-12-09T08:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2026-0007 | Sudo vulnerability affects Endress+Hauser MCS200HW | 2026-04-21T13:00:00.000Z | 2026-04-21T13:00:00.000Z |
| sca-2025-0003 | FreeRTOS Vulnerabilities have no impact on SICK Products | 2025-02-28T00:00:00.000Z | 2026-04-17T11:00:00.000Z |
| sca-2026-0006 | Vulnerabilities affecting SICK Lector85x and SICK Lector83x | 2026-03-06T14:00:00.000Z | 2026-03-06T14:00:00.000Z |
| sca-2026-0005 | Vulnerabilities affecting SICK LMS1000 and SICK MRS1000 | 2026-02-27T14:00:00.000Z | 2026-02-27T14:00:00.000Z |
| sca-2026-0004 | Eclipse Cyclone DDS Vulnerabilities have no impact on SICK picoScan150 & SICK picoScan120 products | 2026-02-13T14:00:00.000Z | 2026-02-13T14:00:00.000Z |
| sca-2026-0003 | Vulnerability affecting SICK nanoScan3 and microScan3 | 2026-01-26T14:00:00.000Z | 2026-01-26T14:00:00.000Z |
| sca-2026-0002 | Vulnerabilities affecting SICK Incoming Goods Suite | 2026-01-15T14:00:00.000Z | 2026-01-22T19:00:00.000Z |
| sca-2026-0001 | Vulnerabilities affecting SICK TDC-X401GL | 2026-01-15T14:00:00.000Z | 2026-01-15T14:00:00.000Z |
| sca-2025-0013 | Vulnerabilities affecting SICK TLOC100-100 | 2025-10-27T14:00:00.000Z | 2025-11-11T14:00:00.000Z |
| sca-2025-0014 | CodeMeter vulnerablity affects SICK CODE-LOC and SICK LIDAR-LOC | 2025-11-03T11:00:00.000Z | 2025-11-03T14:00:00.000Z |
| sca-2025-0012 | Sudo vulnerability affects SICK SID products | 2025-10-27T11:00:00.000Z | 2025-10-27T14:00:00.000Z |
| sca-2025-0011 | Vulnerabilities affecting Endress+Hauser SSG-E210GC | 2025-10-02T13:00:00.000Z | 2025-10-02T13:00:00.000Z |
| sca-2025-0010 | Multiple vulnerabilities in SICK Enterprise Analytics and SICK Logistic Analytics Products | 2025-10-02T13:00:00.000Z | 2025-10-02T13:00:00.000Z |
| sca-2025-0009 | Vulnerabilities affecting SICK TDC-E210GC | 2025-08-01T13:00:00.000Z | 2025-08-01T13:00:00.000Z |
| sca-2025-0008 | Multiple vulnerabilities in Endress+Hauser MEAC300-FNADE4 | 2025-07-03T13:00:00.000Z | 2025-07-03T13:00:00.000Z |
| sca-2025-0007 | Multiple vulnerabilities in SICK Field Analytics and SICK Media Server | 2025-06-12T13:00:00.000Z | 2025-06-12T13:00:00.000Z |
| sca-2025-0006 | Vulnerability affecting picoScan and multiScan | 2025-04-28T13:00:00.000Z | 2025-04-28T13:00:00.000Z |
| sca-2025-0005 | Vulnerabilities in SICK Flexi Compact | 2025-04-28T10:00:00.000Z | 2025-04-28T10:00:00.000Z |
| sca-2025-0004 | Critical vulnerabilities in SICK DL100-2xxxxxxx | 2025-03-14T11:00:00.000Z | 2025-03-14T11:00:00.000Z |
| sca-2025-0001 | Multiple vulnerabilities in SICK MEAC300 | 2025-02-14T14:00:00.000Z | 2025-02-21T14:00:00.000Z |
| sca-2025-0002 | Vulnerability in SICK Lector8xx and SICK InspectorP8xx | 2025-02-14T10:19:00.000Z | 2025-02-14T10:19:00.000Z |
| sca-2024-0007 | Vulnerability in SICK OLM | 2024-12-31T00:00:00.000Z | 2024-12-31T00:00:00.000Z |
| sca-2024-0006 | Critical vulnerabilities in SICK InspectorP61x, InspectorP62x and TiM3xx | 2024-12-06T00:00:00.000Z | 2024-12-06T00:00:00.000Z |
| sca-2024-0005 | Vulnerability in SICK Incoming Goods Suite | 2024-11-19T00:00:00.000Z | 2024-11-19T00:00:00.000Z |
| sca-2024-0004 | Third party vulnerabilities in SICK CDE-100 | 2024-11-07T12:00:00.000Z | 2024-11-07T12:00:00.000Z |
| sca-2024-0003 | Critical vulnerability in multiple SICK products | 2024-10-17T13:00:00.000Z | 2024-10-17T13:00:00.000Z |
| sca-2024-0002 | Vulnerability in SICK MSC800 | 2024-09-11T23:00:00.000Z | 2024-09-11T23:00:00.000Z |
| sca-2024-0001 | Vulnerability in SICK Logistics Analytics Products and SICK Field Analytics | 2024-01-29T00:00:00.000Z | 2024-01-29T00:00:00.000Z |
| sca-2023-0011 | Vulnerability in multiple SICK Flexi Soft Gateways | 2023-10-23T11:00:00.000Z | 2023-10-23T11:00:00.000Z |
| SCA-2023-0011 | Vulnerability in multiple SICK Flexi Soft Gateways | 2023-10-23T11:00:00.000Z | 2023-10-23T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-981622 | SSA-981622: Improper Certificate Validation Vulnerability in Siemens Analytics Toolkit | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-913875 | SSA-913875: Frame Aggregation and Fragmentation Vulnerabilities in 802.11 | 2021-07-13T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-827968 | SSA-827968: Vulnerability in Nozomi Guardian/CMC on RUGGEDCOM APE1808 Devices | 2026-01-13T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-801704 | SSA-801704: Authentication Bypass Vulnerability in SINEC NMS | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-741509 | SSA-741509: Privilege Escalation Vulnerability in RUGGEDCOM CROSSBOW Secure Access Manager Primary Before V5.8 | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-726834 | SSA-726834: Denial of Service Vulnerability in the RADIUS Client of SIPROTEC 5 Devices | 2023-03-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-726617 | SSA-726617: Incorrect Privilege Assignment Vulnerability in Mendix OIDC SSO Module | 2025-05-13T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-712929 | SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products | 2022-06-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-710008 | SSA-710008: Multiple Web Vulnerabilities in SCALANCE Products | 2022-08-09T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-628843 | SSA-628843: Out of Bound Read Vulnerability in TPM 2.0 | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-609469 | SSA-609469: Authorization Bypass Vulnerability in Industrial Edge Management | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-605717 | SSA-605717: Authorization Bypass Vulnerability in SINEC NMS Before V4.0 SP3 | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-599968 | SSA-599968: Denial of Service Vulnerability in Profinet Devices | 2021-07-13T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-552702 | SSA-552702: Privilege Escalation Vulnerability in the Web Interface of SCALANCE and RUGGEDCOM Products | 2022-10-11T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-408105 | SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products | 2022-12-13T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-311973 | SSA-311973: Multiple Local Privilege Escalation Vulnerabilities in SINEC NMS and User Management Component (UMC) | 2026-02-10T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-244969 | SSA-244969: OpenSSL Vulnerability in Industrial Products | 2022-02-08T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-225816 | SSA-225816: Memory Corruption Vulnerability in RUGGEDCOM CROSSBOW Station Access Controller Before V5.8 | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-216014 | SSA-216014: Vulnerabilities in EFI variable of SIMATIC IPCs, SIMATIC Tablet PCs, and SIMATIC Field PGs | 2025-03-11T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-186293 | SSA-186293: XML External Entity (XXE) Injection Vulnerability in SIMOTION SCOUT, SIMOTION SCOUT TIA and SINAMICS STARTER | 2025-08-12T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-019200 | SSA-019200: Multiple Vulnerabilities in SCALANCE W-700 IEEE 802.11n Devices Before V6.6.0 | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-246443 | SSA-246443: Multiple Vulnerabilities in SICAM 8 Products | 2026-03-26T00:00:00.000Z | 2026-03-26T00:00:00.000Z |
| ssa-452276 | SSA-452276: Eval Injection Vulnerability in SIMATIC S7-1500 | 2026-03-10T00:00:00.000Z | 2026-03-19T00:00:00.000Z |
| ssa-975644 | SSA-975644: Multiple Vulnerabilities in Fortigate NGFW on RUGGEDCOM APE1808 Devices | 2026-03-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-903736 | SSA-903736: Multiple vulnerabilities in SICAM SIAPP SDK before V2.1.7 | 2026-03-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-868571 | SSA-868571: Missing Server Certificate Validation in IAM Client | 2025-12-09T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-770770 | SSA-770770: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.7 on RUGGEDCOM APE1808 Devices | 2025-02-11T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-710408 | SSA-710408: Missing Server Certificate Validation in Siemens Advanced Licensing (SALT) Toolkit | 2025-12-09T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-535115 | SSA-535115: Data Validation Vulnerability in NX Before V2512 | 2026-02-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-513708 | SSA-513708: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices | 2025-06-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1755-1 | Security update for freeipmi | 2026-05-07T13:55:13Z | 2026-05-07T13:55:13Z |
| suse-su-2026:1754-1 | Security update for freeipmi | 2026-05-07T13:54:28Z | 2026-05-07T13:54:28Z |
| suse-su-2026:1753-1 | Security update for 389-ds | 2026-05-07T13:54:14Z | 2026-05-07T13:54:14Z |
| suse-su-2026:1751-1 | Security update for jetty-minimal | 2026-05-07T11:53:44Z | 2026-05-07T11:53:44Z |
| suse-su-2026:1750-1 | Security update for librsvg | 2026-05-07T11:52:25Z | 2026-05-07T11:52:25Z |
| suse-su-2026:1745-1 | Security update for rmt-server | 2026-05-07T07:22:43Z | 2026-05-07T07:22:43Z |
| suse-su-2026:1744-1 | Security update for python-pytest | 2026-05-07T07:17:06Z | 2026-05-07T07:17:06Z |
| suse-su-2026:1743-1 | Security update for xen | 2026-05-07T07:15:57Z | 2026-05-07T07:15:57Z |
| suse-su-2026:1742-1 | Security update for mozjs52 | 2026-05-07T07:15:48Z | 2026-05-07T07:15:48Z |
| suse-su-2026:1741-1 | Security update for MozillaThunderbird | 2026-05-07T07:01:06Z | 2026-05-07T07:01:06Z |
| suse-su-2026:1740-1 | Security update for python-Django | 2026-05-07T07:00:32Z | 2026-05-07T07:00:32Z |
| suse-su-2026:1733-1 | Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) | 2026-05-07T02:35:26Z | 2026-05-07T02:35:26Z |
| suse-su-2026:1732-1 | Security update for java-17-openjdk | 2026-05-07T00:43:48Z | 2026-05-07T00:43:48Z |
| suse-su-2026:1731-1 | Security update for java-11-openjdk | 2026-05-07T00:42:22Z | 2026-05-07T00:42:22Z |
| suse-su-2026:1736-1 | Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP6) | 2026-05-06T21:38:09Z | 2026-05-06T21:38:09Z |
| suse-su-2026:1728-1 | Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise 15 SP6) | 2026-05-06T21:37:53Z | 2026-05-06T21:37:53Z |
| suse-su-2026:1735-1 | Security update for the Linux Kernel (Live Patch 20 for SUSE Linux Enterprise 15 SP6) | 2026-05-06T21:09:59Z | 2026-05-06T21:09:59Z |
| suse-su-2026:1726-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP7) | 2026-05-06T16:04:15Z | 2026-05-06T16:04:15Z |
| suse-su-2026:1725-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-05-06T16:04:08Z | 2026-05-06T16:04:08Z |
| suse-su-2026:1724-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP7) | 2026-05-06T15:05:00Z | 2026-05-06T15:05:00Z |
| suse-su-2026:1723-1 | Security update for openCryptoki | 2026-05-06T14:57:30Z | 2026-05-06T14:57:30Z |
| suse-su-2026:1718-1 | Security update for the Linux Kernel (Live Patch 40 for SUSE Linux Enterprise 15 SP4) | 2026-05-06T12:33:52Z | 2026-05-06T12:33:52Z |
| suse-su-2026:1717-1 | Security update for curl | 2026-05-06T12:13:54Z | 2026-05-06T12:13:54Z |
| suse-su-2026:1716-1 | Security update for libpng12 | 2026-05-06T12:11:50Z | 2026-05-06T12:11:50Z |
| suse-su-2026:1715-1 | Security update for python3 | 2026-05-06T12:09:50Z | 2026-05-06T12:09:50Z |
| suse-su-2026:1714-1 | Security update for erlang | 2026-05-06T12:08:10Z | 2026-05-06T12:08:10Z |
| suse-su-2026:1713-1 | Security update for flatpak | 2026-05-06T12:06:52Z | 2026-05-06T12:06:52Z |
| suse-su-2026:1712-1 | Security update for openexr | 2026-05-06T12:06:44Z | 2026-05-06T12:06:44Z |
| suse-su-2026:1711-1 | Security update for openssl-3 | 2026-05-06T12:04:47Z | 2026-05-06T12:04:47Z |
| suse-su-2026:1710-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7) | 2026-05-06T11:38:10Z | 2026-05-06T11:38:10Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:14929 | Important: mingw-libtiff security update | 2026-05-07T00:00:00Z | 2026-05-07T23:01:39Z |
| alsa-2026:14087 | Moderate: libsoup security update | 2026-05-06T00:00:00Z | 2026-05-07T11:43:04Z |
| alsa-2026:13565 | Important: kernel security update | 2026-05-04T00:00:00Z | 2026-05-07T00:12:38Z |
| alsa-2026:13566 | Important: kernel security update | 2026-05-04T00:00:00Z | 2026-05-06T23:00:55Z |
| alsa-2026:13917 | Important: fence-agents security update | 2026-05-06T00:00:00Z | 2026-05-06T21:16:01Z |
| alsa-2026:13978 | Moderate: libsoup security update | 2026-05-06T00:00:00Z | 2026-05-06T21:14:44Z |
| alsa-2026:13857 | Important: dovecot security update | 2026-05-05T00:00:00Z | 2026-05-06T21:14:44Z |
| alsa-2026:14200 | Important: git-lfs security update | 2026-05-06T00:00:00Z | 2026-05-06T21:14:42Z |
| alsa-2026:13916 | Important: fence-agents security update | 2026-05-06T00:00:00Z | 2026-05-06T15:28:30Z |
| alsa-2026:13642 | Important: image-builder security update | 2026-05-05T00:00:00Z | 2026-05-06T12:45:30Z |
| alsa-2026:13498 | Important: dovecot security update | 2026-05-04T00:00:00Z | 2026-05-06T09:59:41Z |
| alsa-2026:13515 | Moderate: freeipmi security update | 2026-05-04T00:00:00Z | 2026-05-06T09:58:01Z |
| alsa-2026:13641 | Moderate: python-tornado security update | 2026-05-05T00:00:00Z | 2026-05-06T09:55:57Z |
| alsa-2026:13643 | Important: osbuild-composer security update | 2026-05-05T00:00:00Z | 2026-05-06T09:54:22Z |
| alsa-2026:13902 | Important: resource-agents security update | 2026-05-06T00:00:00Z | 2026-05-06T09:10:55Z |
| alsa-2026:13670 | Moderate: python-tornado security update | 2026-05-05T00:00:00Z | 2026-05-06T08:48:26Z |
| alsa-2026:13657 | Moderate: corosync security update | 2026-05-05T00:00:00Z | 2026-05-06T08:44:52Z |
| alsa-2026:13651 | Moderate: systemd security update | 2026-05-05T00:00:00Z | 2026-05-05T19:29:01Z |
| alsa-2026:13677 | Moderate: systemd security update | 2026-05-05T00:00:00Z | 2026-05-05T19:25:12Z |
| alsa-2026:13830 | Important: dovecot security update | 2026-05-05T00:00:00Z | 2026-05-05T19:20:58Z |
| alsa-2026:13671 | Important: image-builder security update | 2026-05-05T00:00:00Z | 2026-05-05T17:13:15Z |
| alsa-2026:3840 | Important: image-builder security update | 2026-03-05T00:00:00Z | 2026-05-05T17:11:52Z |
| alsa-2026:1838 | Moderate: image-builder security update | 2026-02-03T00:00:00Z | 2026-05-05T17:10:17Z |
| alsa-2026:3839 | Important: image-builder security update | 2026-03-05T00:00:00Z | 2026-05-05T11:43:10Z |
| alsa-2026:13578 | Important: kernel-rt security update | 2026-05-05T00:00:00Z | 2026-05-05T10:47:31Z |
| alsa-2026:13537 | Important: thunderbird security update | 2026-05-04T00:00:00Z | 2026-05-05T10:39:20Z |
| alsa-2026:13414 | Important: tigervnc security update | 2026-05-04T00:00:00Z | 2026-05-05T10:37:05Z |
| alsa-2026:13577 | Important: kernel security update | 2026-05-05T00:00:00Z | 2026-05-05T10:33:06Z |
| alsa-2026:13284 | Important: LibRaw security update | 2026-05-04T00:00:00Z | 2026-05-05T09:25:57Z |
| alsa-2026:13285 | Important: libcap security update | 2026-05-04T00:00:00Z | 2026-05-04T20:52:05Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| hsec-2026-0006 | Cabal deletes project source files during configure | 2026-04-08T14:23:27Z | 2026-04-08T14:23:27Z |
| hsec-2026-0004 | Hackage package metadata stored XSS vulnerability | 2026-03-28T16:05:12Z | 2026-03-28T16:05:12Z |
| hsec-2026-0002 | Hackage CSRF vulnerability | 2026-03-28T16:04:58Z | 2026-03-28T16:04:58Z |
| hsec-2024-0004 | Hackage package and doc upload stored XSS vulnerability | 2026-01-16T11:18:20Z | 2026-01-16T11:18:20Z |
| hsec-2025-0007 | cmark-gfm: resource exhaustion due to quadratic complexity in parser | 2025-12-27T08:58:56Z | 2025-12-27T08:58:56Z |
| hsec-2025-0006 | Private key leak via inherited file descriptor | 2025-11-17T02:22:38Z | 2025-11-17T02:22:38Z |
| hsec-2025-0005 | cabal-install dependency confusion | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2025-0004 | Broken Path Sanitization in spacecookie Library | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2025-0003 | Use after free in multithreaded lzma (.xz) decoder | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2025-0002 | Double Public Key Signing Function Oracle Attack on Ed25519 | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2025-0001 | Subword division operations may produce incorrect results | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0009 | Public key confusion in third-party blocks | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0008 | Sign extension error in the PPC64le FFI | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0007 | Sign extension error in the AArch64 NCG | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0006 | fromIntegral: conversion error | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0003 | process: command injection via argument list on Windows | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0002 | out-of-bounds write when there are many bzip2 selectors | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0001 | Reflected XSS vulnerability in keter | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0015 | cabal-install uses expired key policies | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0014 | Arbitrary file write is possible when using PDF output or --extract-media with untrusted input | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0013 | git-annex plaintext storage of embedded credentials on encrypted remotes | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0012 | git-annex checksum exposure to encrypted special remotes | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0011 | git-annex GPG decryption attack via compromised remote | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0010 | git-annex private data exfiltration to compromised remote | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0009 | git-annex command injection via malicious SSH hostname | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0008 | Stored XSS in hledger-web | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0007 | readFloat: memory exhaustion with large exponent | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0006 | x509-validation does not enforce pathLenConstraint | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0005 | tls-extra: certificate validation does not check Basic Constraints | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0004 | xml-conduit unbounded entity expansion | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osec-2026-03 | opam install sandbox escape | 2026-04-15T22:00:00Z | 2026-04-16T21:00:00Z |
| osec-2026-01 | Buffer Over-Read in OCaml Marshal Deserialization | 2026-02-17T13:30:00Z | 2026-02-27T09:30:00Z |
| osec-2026-02 | ARP unbounded memory usage | 2026-02-18T10:30:00Z | 2026-02-18T10:30:00Z |
| osec-2022-01 | Infinite loop in console output on xen | 2022-12-07T00:00:00Z | 2026-02-18T09:30:00Z |
| osec-2025-01 | Albatross console out of memory | 2025-08-15T00:18:22Z | 2026-01-13T12:00:00Z |
| osec-2019-02 | Grant unshare vulnerability in mirage-xen | 2019-04-26T00:00:00Z | 2026-01-13T12:00:00Z |
| osec-2019-01 | Memory disclosure in mirage-net-xen | 2019-03-21T00:00:00Z | 2026-01-13T12:00:00Z |
| osec-2016-02 | Memory disclosure in mirage-net-xen | 2016-05-03T00:00:00Z | 2026-01-13T12:00:00Z |
| osec-2023-01 | Time of check time of use issue in opam's cache | 2023-05-25T12:00:00Z | 2026-01-09T12:00:00Z |
| osec-2016-01 | Buffer overflow and information leak in OCaml < 4.03.0 | 2016-04-29T00:18:22Z | 2026-01-01T12:00:00Z |
| osec-2018-01 | An integer overflow in the `bigarray` serialization module leads to arbitrary code execution | 2018-04-06T18:29:00Z | 2025-12-16T12:00:00Z |
| osec-2017-01 | Local privilege escalation issue with ocaml binaries | 2017-06-23T15:19:47Z | 2025-12-16T12:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2026-699 | Use-of-uninitialized-value in Mat_VarGetSize | 2026-05-08T00:20:46.769191Z | 2026-05-08T00:20:46.769443Z |
| osv-2023-307 | Heap-buffer-overflow in bit_read_BB | 2023-04-13T14:02:09.774988Z | 2026-05-07T14:17:01.342020Z |
| osv-2022-714 | Heap-buffer-overflow in dynapi_set_helper | 2022-08-15T00:00:47.794062Z | 2026-05-07T14:13:31.834583Z |
| osv-2022-653 | Heap-double-free in dwg_free_common_entity_data | 2022-07-30T00:01:52.491112Z | 2026-05-07T14:13:24.635002Z |
| osv-2022-1259 | Heap-buffer-overflow in dwg_decode_INSERT_private | 2022-12-13T13:00:46.870838Z | 2026-05-07T14:10:02.070092Z |
| osv-2022-1198 | Heap-buffer-overflow in dwg_json_LTYPE | 2022-11-23T13:02:06.623044Z | 2026-05-07T14:09:47.448031Z |
| osv-2022-1176 | Heap-double-free in dwg_free | 2022-11-18T13:00:26.857477Z | 2026-05-07T14:08:05.880700Z |
| osv-2022-1165 | Heap-buffer-overflow in parse_content_length | 2022-11-12T13:00:05.964113Z | 2026-05-07T14:07:27.321654Z |
| osv-2021-1343 | Heap-buffer-overflow in get_next_owned_entity | 2021-09-21T00:01:33.177403Z | 2026-05-07T14:07:09.424954Z |
| osv-2022-400 | Heap-double-free in dwg_free_XRECORD_private | 2022-05-08T00:00:40.782520Z | 2026-05-07T14:07:07.574564Z |
| osv-2021-1086 | Heap-buffer-overflow in dwg_convert_SAB_to_SAT1 | 2021-08-02T00:00:31.888461Z | 2026-05-07T14:07:06.078048Z |
| osv-2022-388 | Segv on unknown address in dwg_ref_get_object | 2022-05-01T00:01:54.904711Z | 2026-05-07T14:07:03.424302Z |
| osv-2022-379 | Segv on unknown address in bit_write_TV | 2022-04-27T00:00:44.539231Z | 2026-05-07T14:07:00.834986Z |
| osv-2022-372 | Heap-buffer-overflow in dwg_encode_VERTEX_2D | 2022-04-26T00:00:09.352798Z | 2026-05-07T14:04:57.284808Z |
| osv-2024-719 | Heap-buffer-overflow in hevc_ref_pic_lists_modification | 2024-08-07T00:05:22.699506Z | 2026-05-06T14:47:57.671872Z |
| osv-2024-695 | Stack-buffer-overflow in gf_vvc_parse_nalu_bs | 2024-07-31T00:02:35.217594Z | 2026-05-06T14:46:48.762980Z |
| osv-2024-664 | Heap-buffer-overflow in gf_dash_group_get_template | 2024-07-18T00:13:55.576218Z | 2026-05-06T14:44:38.886623Z |
| osv-2024-659 | Index-out-of-bounds in gf_vvc_parse_nalu_bs | 2024-07-18T00:01:18.765548Z | 2026-05-06T14:43:22.128420Z |
| osv-2026-76 | Security exception in org.htmlunit.cyberneko.HTMLTagBalancer.endElement | 2026-01-18T00:02:11.715201Z | 2026-05-06T14:36:18.326705Z |
| osv-2022-1235 | Heap-buffer-overflow in _rrparse | 2022-12-04T13:00:30.303410Z | 2026-05-06T14:23:13.848368Z |
| osv-2022-882 | Use-of-uninitialized-value in SfxEntry::test_condition | 2022-09-11T00:01:48.463118Z | 2026-05-05T14:11:40.775630Z |
| osv-2024-680 | Security exception in com.github.javaparser.GeneratedJavaParser.Expression | 2024-07-26T00:06:29.761307Z | 2026-05-04T14:22:08.224431Z |
| osv-2024-675 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-07-24T00:07:37.523933Z | 2026-05-04T14:21:28.619874Z |
| osv-2024-662 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-07-18T00:06:40.832938Z | 2026-05-04T14:21:15.393865Z |
| osv-2024-248 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-04-10T00:06:40.907073Z | 2026-05-04T14:19:23.695308Z |
| osv-2024-195 | Security exception in com.github.javaparser.ast.validator.TreeVisitorValidator.accept | 2024-03-24T00:14:24.746452Z | 2026-05-04T14:18:35.195926Z |
| osv-2023-606 | Heap-buffer-overflow in ZSTD_decompressMultiFrame | 2023-07-23T14:01:02.159160Z | 2026-05-04T14:15:29.176008Z |
| osv-2023-1350 | Heap-buffer-overflow in inflate | 2023-12-23T00:12:38.562149Z | 2026-05-04T14:15:26.036213Z |
| osv-2023-319 | Heap-buffer-overflow in ZSTD_decompressSequencesLong_bmi2 | 2023-04-16T14:01:58.406534Z | 2026-05-04T14:14:52.268260Z |
| osv-2022-1134 | Heap-buffer-overflow in ndlz8_decompress | 2022-11-04T00:02:11.463429Z | 2026-05-04T14:09:28.582818Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0120 | NSEC3 closest-encloser proof validation enters unbounded loop on cross-zone responses | 2026-05-01T12:00:00Z | 2026-05-07T08:56:41Z |
| rustsec-2026-0119 | CPU exhaustion during message encoding due to O(n²) name compression | 2026-05-01T12:00:00Z | 2026-05-07T08:56:41Z |
| rustsec-2026-0118 | NSEC3 closest-encloser proof validation enters unbounded loop on cross-zone responses | 2026-05-01T12:00:00Z | 2026-05-07T08:56:41Z |
| rustsec-2026-0117 | Fragile bounds check when sampling from image | 2026-05-01T12:00:00Z | 2026-05-07T08:56:41Z |
| rustsec-2026-0116 | Improper check of an invariant resulting in incorrect bounds checks | 2026-05-01T12:00:00Z | 2026-05-07T08:56:41Z |
| rustsec-2026-0115 | Fragile bounds check when sampling from image | 2026-05-01T12:00:00Z | 2026-05-07T08:56:41Z |
| rustsec-2026-0114 | Panic when allocating a table exceeding the size of the host's address space | 2026-04-30T12:00:00Z | 2026-05-07T08:56:41Z |
| rustsec-2026-0121 | Denial of service in Steamworks game clients/servers using P2P authentication | 2026-05-05T12:00:00Z | 2026-05-06T13:41:21Z |
| rustsec-2026-0111 | Possible UTF-8 corruption in Diesels SQLite backend | 2026-04-24T12:00:00Z | 2026-05-06T06:32:50Z |
| rustsec-2026-0109 | Broken hard revocation handling | 2026-04-21T12:00:00Z | 2026-05-06T06:32:50Z |
| rustsec-2026-0108 | `sui-execution-cut` was removed from crates.io for malicious code | 2026-04-23T12:00:00Z | 2026-05-06T06:32:50Z |
| rustsec-2026-0107 | `mysten-metrics` was removed from crates.io for malicious code | 2026-04-22T12:00:00Z | 2026-05-06T06:32:50Z |
| rustsec-2026-0113 | `unpack_in` can chmod arbitrary directories by following symlinks | 2026-04-27T12:00:00Z | 2026-04-28T13:17:23Z |
| rustsec-2026-0112 | PAX Header Desynchronization in astral-tokio-tar | 2026-04-27T12:00:00Z | 2026-04-28T13:17:23Z |
| rustsec-2026-0103 | Use-After-Free and Double Free in IntoIter::drop When Element Drop Panics | 2026-04-14T12:00:00Z | 2026-04-27T20:28:03Z |
| rustsec-2026-0105 | core2 is unmaintained, all versions yanked | 2026-04-14T12:00:00Z | 2026-04-25T15:01:07Z |
| rustsec-2026-0078 | Symbol confusion after hasher panic in `intaglio` interners | 2026-03-30T12:00:00Z | 2026-04-25T07:25:22Z |
| rustsec-2023-0071 | Marvin Attack: potential key recovery through timing sidechannels | 2023-11-22T12:00:00Z | 2026-04-25T06:40:09Z |
| rustsec-2026-0110 | bare-metal is deprecated | 2026-04-23T12:00:00Z | 2026-04-24T09:37:01Z |
| rustsec-2026-0106 | Record cache accepts AUTHORITY section NS from sibling zone via parent-pool zone-context elevation | 2026-04-22T12:00:00Z | 2026-04-22T19:53:31Z |
| rustsec-2026-0104 | Reachable panic in certificate revocation list parsing | 2026-04-22T12:00:00Z | 2026-04-22T08:56:10Z |
| rustsec-2026-0097 | Rand is unsound with a custom logger using `rand::rng()` | 2026-04-09T12:00:00Z | 2026-04-17T15:55:25Z |
| rustsec-2026-0102 | `microsoftsystem64` was removed from crates.io for malicious code | 2026-04-13T12:00:00Z | 2026-04-15T21:38:09Z |
| rustsec-2026-0101 | `safe-agent-rs` was removed from crates.io for being affiliated with malicious code | 2026-04-13T12:00:00Z | 2026-04-15T21:38:09Z |
| rustsec-2026-0100 | `pretty-changelog-logger` was removed from crates.io for malicious code | 2026-04-13T12:00:00Z | 2026-04-15T21:38:09Z |
| rustsec-2026-0099 | Name constraints were accepted for certificates asserting a wildcard name | 2026-04-14T12:00:00Z | 2026-04-15T09:57:12Z |
| rustsec-2026-0098 | Name constraints for URI names were incorrectly accepted | 2026-04-14T12:00:00Z | 2026-04-15T07:36:20Z |
| rustsec-2025-0161 | libsecp256k1 is unmaintained | 2025-01-14T12:00:00Z | 2026-04-14T11:24:03Z |
| rustsec-2026-0096 | Miscompiled guest heap access enables sandbox escape on aarch64 Cranelift | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0095 | Wasmtime with Winch compiler backend may allow a sandbox-escaping memory access | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-python-2025-13836 | Excessive read buffering DoS in http.client | 2026-05-08T11:49:10.815Z | 2026-05-08T12:11:24.507Z |
| bit-python-2025-12084 | Quadratic complexity in node ID cache clearing | 2026-05-08T11:49:07.407Z | 2026-05-08T12:11:24.507Z |
| bit-powershell-2026-26171 | .NET Denial of Service Vulnerability | 2026-05-08T08:53:22.543Z | 2026-05-08T09:12:36.228Z |
| bit-mongodb-2026-6915 | Flaw in the updateUser Command May Allow Unauthorized Configuration Change | 2026-05-08T08:50:40.921Z | 2026-05-08T09:12:36.228Z |
| bit-mongodb-2026-6914 | MD5 checksum creation may cause availability loss | 2026-05-08T08:50:39.362Z | 2026-05-08T09:12:36.228Z |
| bit-dotnet-2026-32178 | .NET Spoofing Vulnerability | 2026-05-08T08:41:33.705Z | 2026-05-08T09:12:36.228Z |
| bit-dotnet-2026-26171 | .NET Denial of Service Vulnerability | 2026-05-08T08:41:31.547Z | 2026-05-08T09:12:36.228Z |
| bit-django-2026-6907 | Potential exposure of private data due to incorrect handling of Vary: * in UpdateCacheMiddleware | 2026-05-08T08:41:22.298Z | 2026-05-08T09:12:36.228Z |
| bit-django-2026-5766 | Potential denial-of-service vulnerability in ASGI requests via file upload limit bypass | 2026-05-08T08:41:20.289Z | 2026-05-08T09:12:36.228Z |
| bit-django-2026-35192 | Session fixation via public cached pages and SESSION_SAVE_EVERY_REQUEST | 2026-05-08T08:41:12.109Z | 2026-05-08T09:12:36.228Z |
| bit-valkey-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:19:55.260Z | 2026-05-08T06:11:36.072Z |
| bit-valkey-2025-49112 | 2025-10-16T09:19:52.847Z | 2026-05-08T06:11:36.072Z | |
| bit-valkey-2025-48367 | Redis DoS Vulnerability due to bad connection error handling | 2025-10-16T12:08:13.783Z | 2026-05-08T06:11:36.072Z |
| bit-valkey-2025-46819 | Redis is vulnerable to DoS via specially crafted LUA scripts | 2025-10-08T08:52:39.220Z | 2026-05-08T06:11:36.072Z |
| bit-valkey-2025-46818 | Redis: Authenticated users can execute LUA scripts as a different user | 2025-10-08T08:52:37.720Z | 2026-05-08T06:11:36.072Z |
| bit-valkey-2025-46817 | Lua library commands may lead to integer overflow and potential RCE | 2025-10-08T08:52:36.400Z | 2026-05-08T06:11:36.072Z |
| bit-valkey-2025-32023 | Redis allows out of bounds writes in hyperloglog commands leading to RCE | 2025-10-16T12:07:58.321Z | 2026-05-08T06:11:36.072Z |
| bit-valkey-2025-27151 | redis-check-aof may lead to stack overflow and potential RCE | 2025-05-31T06:02:22.962Z | 2026-05-08T06:11:36.072Z |
| bit-valkey-2025-21605 | Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client | 2025-04-25T07:27:01.789Z | 2026-05-08T06:11:36.072Z |
| bit-valkey-2024-51741 | Redis allows denial-of-service due to malformed ACL selectors | 2025-01-08T07:22:23.019Z | 2026-05-08T06:11:36.072Z |
| bit-valkey-2024-46981 | Redis' Lua library commands may lead to remote code execution | 2025-01-08T07:22:30.615Z | 2026-05-08T06:11:36.072Z |
| bit-valkey-2024-31449 | Lua library commands may lead to stack overflow and RCE in Redis | 2024-10-09T16:44:28.833Z | 2026-05-08T06:11:36.072Z |
| bit-valkey-2024-31228 | Denial-of-service due to unbounded pattern matching in Redis | 2024-10-09T16:44:40.936Z | 2026-05-08T06:11:36.072Z |
| bit-valkey-2024-31227 | Denial-of-service due to malformed ACL selectors in Redis | 2024-10-09T16:44:53.016Z | 2026-05-08T06:11:36.072Z |
| bit-jre-2026-34282 | 2026-05-08T05:48:02.416Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2026-34268 | 2026-05-08T05:48:01.101Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2026-23865 | 2026-05-08T05:47:59.556Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2026-22021 | 2026-05-08T05:47:58.202Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2026-22018 | 2026-05-08T05:47:56.734Z | 2026-05-08T06:11:36.072Z | |
| bit-jre-2026-22016 | 2026-05-08T05:47:55.288Z | 2026-05-08T06:11:36.072Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-gn46454 | When applications specify HTTP response headers for servlet applications using Spring Security, there is the possibility that the HTTP Headers will not be written | 2026-04-30T00:36:57.162497Z | 2026-04-29T13:34:44Z |
| cleanstart-2026-fu04414 | Docker CLI for Windows searches for plugin binaries in C:\\ProgramData\\Docker\\cli-plugins, a directory that does not exist by default | 2026-04-30T00:38:58.272669Z | 2026-04-29T09:22:25Z |
| cleanstart-2026-cz07385 | Docker CLI for Windows searches for plugin binaries in C:\\ProgramData\\Docker\\cli-plugins, a directory that does not exist by default | 2026-04-30T00:39:59.023250Z | 2026-04-29T09:21:35Z |
| cleanstart-2026-fk30234 | Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web To... | 2026-04-30T00:36:57.018431Z | 2026-04-29T09:20:07Z |
| cleanstart-2026-cn84623 | Within HostnameError | 2026-04-30T00:53:26.653377Z | 2026-04-29T09:12:44Z |
| cleanstart-2026-gy48351 | Within HostnameError | 2026-04-30T00:53:26.601522Z | 2026-04-29T09:10:13Z |
| cleanstart-2026-mi12470 | Within HostnameError | 2026-04-30T00:49:56.616377Z | 2026-04-29T09:05:33Z |
| cleanstart-2026-fr97108 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-30T00:58:27.074156Z | 2026-04-29T07:50:05Z |
| cleanstart-2026-kt28044 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-30T01:03:26.906365Z | 2026-04-29T07:43:21Z |
| cleanstart-2026-hq88036 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-30T01:00:58.604637Z | 2026-04-29T07:41:49Z |
| cleanstart-2026-do31246 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-30T01:04:59.604515Z | 2026-04-29T07:38:43Z |
| cleanstart-2026-dn20646 | spdystream is a Go library for multiplexing streams over SPDY connections | 2026-04-30T01:01:32.482507Z | 2026-04-29T07:32:10Z |
| cleanstart-2026-md91760 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-30T01:00:59.806172Z | 2026-04-29T07:27:32Z |
| cleanstart-2026-hv96032 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-30T01:01:32.104241Z | 2026-04-29T07:26:58Z |
| cleanstart-2026-cz64396 | Security fixes for ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-wjrx-6529-hcj3 applied in versions: 0.37.1-r1 | 2026-04-30T01:01:28.425053Z | 2026-04-29T07:22:17Z |
| cleanstart-2026-lz84631 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-30T01:01:45.829893Z | 2026-04-29T07:14:23Z |
| cleanstart-2026-bu99819 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-29T00:37:56.608985Z | 2026-04-28T06:46:53Z |
| cleanstart-2026-ms93111 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-28T00:36:04.248443Z | 2026-04-27T10:21:39Z |
| cleanstart-2026-kl42544 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-28T00:36:04.463924Z | 2026-04-27T10:21:39Z |
| cleanstart-2026-jp09281 | In libexpat before 2 | 2026-04-28T00:36:34.505244Z | 2026-04-27T10:21:39Z |
| cleanstart-2026-dj93523 | In libexpat before 2 | 2026-04-28T00:37:35.208500Z | 2026-04-27T10:21:39Z |
| cleanstart-2026-hq78610 | Aircompressor is a library with ports of the Snappy, LZO, LZ4, and Zstandard compression algorithms to Java | 2026-04-25T00:45:02.559999Z | 2026-04-24T22:46:48Z |
| cleanstart-2026-ly60131 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-25T00:38:42.064940Z | 2026-04-24T13:16:02Z |
| cleanstart-2026-ij61309 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-25T00:38:42.251779Z | 2026-04-24T13:16:02Z |
| cleanstart-2026-kx82113 | In libexpat before 2 | 2026-04-23T00:37:25.300123Z | 2026-04-22T09:49:02Z |
| cleanstart-2026-hm96194 | In libexpat before 2 | 2026-04-23T00:37:25.660354Z | 2026-04-22T09:49:02Z |
| cleanstart-2026-is05941 | CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native | 2026-04-23T00:39:55.461024Z | 2026-04-22T06:13:27Z |
| cleanstart-2026-fo49462 | Security fixes for ghsa-3xc5-wrhm-f963 applied in versions: 1.31.1-r0 | 2026-04-22T00:36:28.593230Z | 2026-04-21T09:53:20Z |
| cleanstart-2026-kb76878 | When applications specify HTTP response headers for servlet applications using Spring Security, there is the possibility that the HTTP Headers will not be written | 2026-04-22T00:39:59.241183Z | 2026-04-21T09:47:18Z |
| cleanstart-2026-al68245 | filippo | 2026-04-22T00:37:28.755649Z | 2026-04-21T09:29:42Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2026-033 | 2026-04-22T17:47:43.000Z | 2026-04-22T17:47:43.000Z | |
| drupal-contrib-2026-032 | 2026-04-08T16:09:54.000Z | 2026-04-10T16:51:06.000Z | |
| drupal-contrib-2026-031 | 2026-04-01T16:38:14.000Z | 2026-04-02T14:13:13.000Z | |
| drupal-contrib-2026-029 | 2026-03-11T16:35:02.000Z | 2026-03-26T19:50:52.000Z | |
| drupal-contrib-2026-028 | 2026-03-11T16:33:14.000Z | 2026-03-26T19:43:59.000Z | |
| drupal-contrib-2026-030 | 2026-03-18T16:10:00.000Z | 2026-03-18T16:10:00.000Z | |
| drupal-contrib-2026-015 | 2026-02-25T18:47:57.000Z | 2026-03-17T13:20:54.000Z | |
| drupal-contrib-2026-024 | 2026-03-04T17:59:51.000Z | 2026-03-05T14:03:05.000Z | |
| drupal-contrib-2026-027 | 2026-03-04T18:02:59.000Z | 2026-03-04T18:02:59.000Z | |
| drupal-contrib-2026-026 | 2026-03-04T18:02:14.000Z | 2026-03-04T18:02:14.000Z | |
| drupal-contrib-2026-025 | 2026-03-04T18:00:41.000Z | 2026-03-04T18:00:41.000Z | |
| drupal-contrib-2026-023 | 2026-03-04T17:58:55.000Z | 2026-03-04T17:58:55.000Z | |
| drupal-contrib-2026-022 | 2026-03-04T17:57:58.000Z | 2026-03-04T17:57:58.000Z | |
| drupal-contrib-2026-021 | 2026-03-04T17:56:18.000Z | 2026-03-04T17:56:18.000Z | |
| drupal-contrib-2026-020 | 2026-03-04T17:54:27.000Z | 2026-03-04T17:54:27.000Z | |
| drupal-contrib-2026-016 | 2026-02-25T18:49:59.000Z | 2026-02-25T19:30:03.000Z | |
| drupal-contrib-2026-019 | 2026-02-25T18:51:43.000Z | 2026-02-25T18:51:43.000Z | |
| drupal-contrib-2026-018 | 2026-02-25T18:51:26.000Z | 2026-02-25T18:51:26.000Z | |
| drupal-contrib-2026-017 | 2026-02-25T18:51:01.000Z | 2026-02-25T18:51:01.000Z | |
| drupal-contrib-2026-014 | 2026-02-25T18:46:10.000Z | 2026-02-25T18:46:10.000Z | |
| drupal-contrib-2026-013 | 2026-02-25T18:45:13.000Z | 2026-02-25T18:45:13.000Z | |
| drupal-contrib-2026-012 | 2026-02-25T18:44:38.000Z | 2026-02-25T18:44:38.000Z | |
| drupal-contrib-2026-011 | 2026-02-25T18:43:32.000Z | 2026-02-25T18:43:32.000Z | |
| drupal-contrib-2026-010 | 2026-02-11T16:54:18.000Z | 2026-02-25T17:17:46.000Z | |
| drupal-contrib-2026-009 | 2026-02-11T16:53:32.000Z | 2026-02-12T15:37:20.000Z | |
| drupal-contrib-2026-008 | 2026-02-04T17:23:40.000Z | 2026-02-04T17:23:40.000Z | |
| drupal-contrib-2025-110 | 2025-09-24T17:27:41.000Z | 2025-09-24T17:27:41.000Z |
| ID | Description | Updated |
|---|---|---|
| ts-2026-001 | TS-2026-001 | 2026-01-15T00:00 |
| ts-2025-008 | TS-2025-008 | 2025-11-19T00:00 |
| ts-2025-007 | TS-2025-007 | 2025-11-07T00:00 |
| ts-2025-006 | TS-2025-006 | 2025-10-28T00:00 |
| ts-2025-005 | TS-2025-005 | 2025-08-07T00:00 |
| ts-2025-004 | TS-2025-004 | 2025-05-27T00:00 |
| ts-2025-003 | TS-2025-003 | 2025-05-21T00:00 |
| ts-2025-002 | TS-2025-002 | 2025-05-15T00:00 |
| ts-2025-001 | TS-2025-001 | 2025-03-07T00:00 |
| ts-2024-013 | TS-2024-013 | 2024-12-04T00:00 |
| ts-2024-012 | TS-2024-012 | 2024-10-02T00:00 |
| ts-2024-011 | TS-2024-011 | 2024-07-22T00:00 |
| ts-2024-010 | TS-2024-010 | 2024-07-19T00:00 |
| ts-2024-009 | TS-2024-009 | 2024-06-27T00:00 |
| ts-2024-008 | TS-2024-008 | 2024-06-14T00:00 |
| ts-2024-007 | TS-2024-007 | 2024-06-12T00:00 |
| ts-2024-006 | TS-2024-006 | 2024-05-22T00:00 |
| ts-2024-005 | TS-2024-005 | 2024-05-08T00:00 |
| ts-2024-004 | TS-2024-004 | 2024-05-06T00:00 |
| ts-2024-003 | TS-2024-003 | 2024-04-23T00:00 |
| ts-2024-002 | TS-2024-002 | 2024-01-30T00:00 |
| ts-2024-001 | TS-2024-001 | 2024-01-08T00:00 |
| ts-2023-009 | TS-2023-009 | 2023-12-22T00:00 |
| ts-2023-008 | TS-2023-008 | 2023-11-01T00:00 |
| ts-2023-007 | TS-2023-007 | 2023-10-26T00:00 |
| ts-2023-006 | TS-2023-006 | 2023-08-22T00:00 |
| ts-2023-005 | TS-2023-005 | 2023-04-28T00:00 |
| ts-2023-004 | TS-2023-004 | 2023-04-04T00:00 |
| ts-2023-003 | TS-2023-003 | 2023-03-22T00:00 |
| ts-2023-002 | TS-2023-002 | 2023-01-24T00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-ale-003 | Note d’alerte – Ciblage des messageries instantanées | 2026-03-20T00:00:00.000000 | 2026-04-20T00:00:00.000000 |
| certfr-2026-ale-004 | Vulnérabilité dans F5 BIG-IP Access Policy Manager | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-ale-002 | [MàJ] Vulnérabilité dans Cisco Catalyst SD-WAN | 2026-02-25T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2025-ale-014 | [MàJ] Vulnérabilité dans React Server Components | 2025-12-05T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2025-ALE-014 | [MàJ] Vulnérabilité dans React Server Components | 2025-12-05T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-ale-001 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2026-01-30T00:00:00.000000 | 2026-02-03T00:00:00.000000 |
| CERTFR-2026-ALE-001 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2026-01-30T00:00:00.000000 | 2026-02-03T00:00:00.000000 |
| certfr-2025-ale-013 | [MàJ] Multiples vulnérabilités dans Cisco ASA et FTD | 2025-09-25T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| CERTFR-2025-ALE-013 | [MàJ] Multiples vulnérabilités dans Cisco ASA et FTD | 2025-09-25T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-ale-012 | Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2025-08-26T00:00:00.000000 | 2025-09-26T00:00:00.000000 |
| CERTFR-2025-ALE-012 | Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2025-08-26T00:00:00.000000 | 2025-09-26T00:00:00.000000 |
| certfr-2025-ale-010 | [MàJ] Multiples vulnérabilités dans Microsoft SharePoint | 2025-07-21T00:00:00.000000 | 2025-08-26T00:00:00.000000 |
| CERTFR-2025-ALE-010 | [MàJ] Multiples vulnérabilités dans Microsoft SharePoint | 2025-07-21T00:00:00.000000 | 2025-08-26T00:00:00.000000 |
| certfr-2025-ale-011 | Incidents de sécurité dans les pare-feux SonicWall | 2025-08-05T00:00:00.000000 | 2025-08-18T00:00:00.000000 |
| certfr-2025-ale-009 | Multiples vulnérabilités dans Citrix NetScaler ADC et NetScaler Gateway | 2025-07-01T00:00:00.000000 | 2025-07-17T00:00:00.000000 |
| CERTFR-2025-ALE-011 | Incidents de sécurité dans les pare-feux SonicWall | 2025-08-05T00:00:00.000000 | 2025-08-18T00:00:00.000000 |
| CERTFR-2025-ALE-009 | Multiples vulnérabilités dans Citrix NetScaler ADC et NetScaler Gateway | 2025-07-01T00:00:00.000000 | 2025-07-17T00:00:00.000000 |
| certfr-2025-ale-004 | Activités de post-exploitation dans Fortinet FortiGate | 2025-04-11T00:00:00.000000 | 2025-08-07T00:00:00.000000 |
| CERTFR-2025-ALE-004 | Activités de post-exploitation dans Fortinet FortiGate | 2025-04-11T00:00:00.000000 | 2025-08-07T00:00:00.000000 |
| certfr-2025-ale-008 | [MàJ] Vulnérabilité dans Roundcube | 2025-06-05T00:00:00.000000 | 2025-07-21T00:00:00.000000 |
| CERTFR-2025-ALE-008 | [MàJ] Vulnérabilité dans Roundcube | 2025-06-05T00:00:00.000000 | 2025-07-21T00:00:00.000000 |
| certfr-2025-ale-007 | Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile (EPMM) | 2025-05-14T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-006 | Vulnérabilité dans les produits Fortinet | 2025-05-13T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-005 | Vulnérabilité dans SAP NetWeaver | 2025-04-28T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-003 | [MàJ] Vulnérabilité dans les produits Ivanti | 2025-04-04T00:00:00.000000 | 2025-04-11T00:00:00.000000 |
| CERTFR-2025-ALE-007 | Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile (EPMM) | 2025-05-14T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| CERTFR-2025-ALE-006 | Vulnérabilité dans les produits Fortinet | 2025-05-13T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| CERTFR-2025-ALE-005 | Vulnérabilité dans SAP NetWeaver | 2025-04-28T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| CERTFR-2025-ALE-003 | [MàJ] Vulnérabilité dans les produits Ivanti | 2025-04-04T00:00:00.000000 | 2025-04-11T00:00:00.000000 |
| certfr-2025-ale-002 | [MàJ] Vulnérabilité dans les produits Fortinet | 2025-05-07T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0552 | Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2026-05-07T00:00:00.000000 | 2026-05-07T00:00:00.000000 |
| certfr-2026-avi-0551 | Multiples vulnérabilités dans GLPI | 2026-05-07T00:00:00.000000 | 2026-05-07T00:00:00.000000 |
| certfr-2026-avi-0550 | Multiples vulnérabilités dans les produits IBM | 2026-05-07T00:00:00.000000 | 2026-05-07T00:00:00.000000 |
| certfr-2026-avi-0549 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-05-07T00:00:00.000000 | 2026-05-07T00:00:00.000000 |
| certfr-2026-avi-0548 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-05-07T00:00:00.000000 | 2026-05-07T00:00:00.000000 |
| certfr-2026-avi-0547 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-05-07T00:00:00.000000 | 2026-05-07T00:00:00.000000 |
| certfr-2026-avi-0546 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-05-07T00:00:00.000000 | 2026-05-07T00:00:00.000000 |
| certfr-2026-avi-0545 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-05-07T00:00:00.000000 | 2026-05-07T00:00:00.000000 |
| certfr-2026-avi-0544 | Multiples vulnérabilités dans les produits Cisco | 2026-05-07T00:00:00.000000 | 2026-05-07T00:00:00.000000 |
| certfr-2026-avi-0543 | Multiples vulnérabilités dans Spring Cloud Config | 2026-05-07T00:00:00.000000 | 2026-05-07T00:00:00.000000 |
| certfr-2026-avi-0542 | Multiples vulnérabilités dans Progress Telerik | 2026-05-06T00:00:00.000000 | 2026-05-06T00:00:00.000000 |
| certfr-2026-avi-0541 | Multiples vulnérabilités dans Zabbix | 2026-05-06T00:00:00.000000 | 2026-05-06T00:00:00.000000 |
| certfr-2026-avi-0540 | Multiples vulnérabilités dans VMware Tanzu Gemfire | 2026-05-06T00:00:00.000000 | 2026-05-06T00:00:00.000000 |
| certfr-2026-avi-0539 | Multiples vulnérabilités dans Juniper Networks Secure Analytics | 2026-05-06T00:00:00.000000 | 2026-05-06T00:00:00.000000 |
| certfr-2026-avi-0538 | Multiples vulnérabilités dans Asterisk | 2026-05-06T00:00:00.000000 | 2026-05-06T00:00:00.000000 |
| certfr-2026-avi-0537 | Vulnérabilité dans Palo Alto Networks User-ID Authentication Portal | 2026-05-06T00:00:00.000000 | 2026-05-06T00:00:00.000000 |
| certfr-2026-avi-0536 | Multiples vulnérabilités dans Redis | 2026-05-06T00:00:00.000000 | 2026-05-06T00:00:00.000000 |
| certfr-2026-avi-0535 | Multiples vulnérabilités dans Google Chrome | 2026-05-06T00:00:00.000000 | 2026-05-06T00:00:00.000000 |
| certfr-2026-avi-0534 | Vulnérabilité dans Google Android | 2026-05-05T00:00:00.000000 | 2026-05-05T00:00:00.000000 |
| certfr-2026-avi-0533 | Multiples vulnérabilités dans Papercut | 2026-05-05T00:00:00.000000 | 2026-05-05T00:00:00.000000 |
| certfr-2026-avi-0532 | Multiples vulnérabilités dans Progress MOVEit Automation | 2026-05-05T00:00:00.000000 | 2026-05-05T00:00:00.000000 |
| certfr-2026-avi-0531 | Vulnérabilité dans Traefik | 2026-05-05T00:00:00.000000 | 2026-05-05T00:00:00.000000 |
| certfr-2026-avi-0530 | Multiples vulnérabilités dans Apache HTTP Server | 2026-05-05T00:00:00.000000 | 2026-05-05T00:00:00.000000 |
| certfr-2026-avi-0529 | Multiples vulnérabilités dans Mozilla Thunderbird | 2026-05-04T00:00:00.000000 | 2026-05-04T00:00:00.000000 |
| certfr-2026-avi-0528 | Vulnérabilité dans Qnap QTS | 2026-05-04T00:00:00.000000 | 2026-05-04T00:00:00.000000 |
| certfr-2026-avi-0527 | Multiples vulnérabilités dans VMware Tanzu Kubernetes Runtime | 2026-05-04T00:00:00.000000 | 2026-05-04T00:00:00.000000 |
| certfr-2026-avi-0526 | Multiples vulnérabilités dans les produits Microsoft | 2026-05-04T00:00:00.000000 | 2026-05-04T00:00:00.000000 |
| certfr-2026-avi-0525 | Multiples vulnérabilités dans Microsoft Edge | 2026-05-04T00:00:00.000000 | 2026-05-04T00:00:00.000000 |
| certfr-2026-avi-0524 | Multiples vulnérabilités dans Exim | 2026-04-30T00:00:00.000000 | 2026-04-30T00:00:00.000000 |
| certfr-2026-avi-0523 | Multiples vulnérabilités dans les produits IBM | 2026-04-30T00:00:00.000000 | 2026-04-30T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-000066 | Open redirect vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor | 2026-04-30T17:02+09:00 | 2026-04-30T17:02+09:00 |
| jvndb-2026-000064 | GROWI vulnerable to Regular expression Denial-of-Service (ReDoS) | 2026-04-23T16:57+09:00 | 2026-04-30T12:19+09:00 |
| jvndb-2026-006408 | Apache ActiveMQ series improper validation of MQTT packets [AMQ-9810] | 2026-04-24T17:56+09:00 | 2026-04-24T17:56+09:00 |
| jvndb-2026-012056 | Multiple vulnerabilities in silex technology SD-330AC and AMC Manager | 2026-04-21T15:27+09:00 | 2026-04-23T17:57+09:00 |
| jvndb-2026-000063 | IP Setting Software may insecurely load Dynamic Link Libraries | 2026-04-23T16:57+09:00 | 2026-04-23T16:57+09:00 |
| jvndb-2026-000062 | CMS ALAYA vulnerable to SQL injection | 2026-04-23T16:57+09:00 | 2026-04-23T16:57+09:00 |
| jvndb-2026-000059 | Multiple vulnerabilities in LogonTracer | 2026-04-23T16:57+09:00 | 2026-04-23T16:57+09:00 |
| jvndb-2026-000061 | Installers of LiveOn Meet Client for Windows and its plugin may insecurely load Dynamic Link Libraries | 2026-04-22T15:45+09:00 | 2026-04-22T15:45+09:00 |
| jvndb-2026-000060 | DeepL Chrome browser extension vulnerable to cross-site scripting | 2026-04-22T15:45+09:00 | 2026-04-22T15:45+09:00 |
| jvndb-2026-000058 | Ziostation2 vulnerable to path traversal | 2026-04-22T15:45+09:00 | 2026-04-22T15:45+09:00 |
| jvndb-2026-000051 | SKYSEA Client View and SKYMEC IT Manager improper file access permission settings | 2026-04-20T14:47+09:00 | 2026-04-20T14:47+09:00 |
| jvndb-2026-011472 | OMRON UPS (Uninterruptible Power Supply) management application may insecurely load Dynamic Link Libraries | 2026-04-17T14:54+09:00 | 2026-04-17T14:54+09:00 |
| jvndb-2026-000057 | Multiple vulnerabilities in CubeCart | 2026-04-17T13:32+09:00 | 2026-04-17T13:32+09:00 |
| jvndb-2026-000056 | Arcserve UDP Console vulnerable to redirect to a dummy URL | 2026-04-16T17:29+09:00 | 2026-04-16T17:29+09:00 |
| jvndb-2026-000055 | GROWI vulnerable to stored cross-site scripting | 2026-04-15T17:21+09:00 | 2026-04-15T17:21+09:00 |
| jvndb-2026-010851 | Stack-based buffer overflow vulnerability in Dynabook Bluetooth ACPI Drivers | 2026-04-14T18:13+09:00 | 2026-04-14T18:13+09:00 |
| jvndb-2026-000053 | EmoCheck loads Dynamic Link Libraries insecurely | 2026-04-10T13:38+09:00 | 2026-04-10T13:38+09:00 |
| jvndb-2026-007973 | Multiple vulnerabilities in Xerox FreeFlow Core (XRX26-005) | 2026-03-23T14:54+09:00 | 2026-04-09T13:55+09:00 |
| jvndb-2026-000052 | Multiple vulnerabilities in MATCHA series | 2026-04-08T16:15+09:00 | 2026-04-08T16:15+09:00 |
| jvndb-2026-000050 | Multiple vulnerabilities in Movable Type | 2026-04-08T16:15+09:00 | 2026-04-08T16:15+09:00 |
| jvndb-2026-010301 | Multiple Vulnerabilities in JP1/IT Desktop Management 2 and JP1/NETM/DM | 2026-04-08T12:11+09:00 | 2026-04-08T12:11+09:00 |
| jvndb-2026-010300 | Multiple Vulnerabilities in Hitachi Ops Center Viewpoint | 2026-04-08T12:11+09:00 | 2026-04-08T12:11+09:00 |
| jvndb-2026-010299 | Multiple Vulnerabilities in Hitachi Ops Center Common Services | 2026-04-08T12:11+09:00 | 2026-04-08T12:11+09:00 |
| jvndb-2026-009720 | Multiple vulnerabilities in FUJI Electric V-SFT (April 2026) | 2026-04-02T14:58+09:00 | 2026-04-03T15:50+09:00 |
| jvndb-2026-000049 | Multiple vulnerabilities in NEC Aterm series (NV26-001) | 2026-04-03T15:09+09:00 | 2026-04-03T15:09+09:00 |
| jvndb-2026-009412 | Security information for Hitachi Disk Array Systems | 2026-03-31T15:53+09:00 | 2026-03-31T15:53+09:00 |
| jvndb-2026-009411 | Security information for Hitachi Disk Array Systems | 2026-03-31T15:53+09:00 | 2026-03-31T15:53+09:00 |
| jvndb-2026-009410 | Security information for Hitachi Disk Array Systems | 2026-03-31T15:53+09:00 | 2026-03-31T15:53+09:00 |
| jvndb-2026-009409 | Security information for Hitachi Disk Array Systems | 2026-03-31T15:53+09:00 | 2026-03-31T15:53+09:00 |
| jvndb-2026-009408 | Security information for Hitachi Disk Array Systems | 2026-03-31T15:53+09:00 | 2026-03-31T15:53+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-19056 | Google Android权限提升漏洞(CNVD-2026-19056) | 2026-03-06 | 2026-04-30 |
| cnvd-2026-19046 | WordPress插件WCFM Marketplace SQL注入漏洞 | 2026-04-21 | 2026-04-30 |
| cnvd-2026-19045 | 多款Apple产品拒绝服务漏洞(CNVD-2026-19045) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19044 | Linux kernel本地权限提升漏洞(CNVD-2026-19044) | 2026-04-23 | 2026-04-30 |
| cnvd-2026-19043 | Apple macOS Tahoe存在未明漏洞(CNVD-2026-19043) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19042 | Apple macOS Tahoe存在未明漏洞(CNVD-2026-19042) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19041 | Apple macOS Tahoe存在未明漏洞(CNVD-2026-19041) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19040 | Apple macOS Tahoe存在未明漏洞(CNVD-2026-19040) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19039 | Apple macOS Tahoe堆缓冲区溢出漏洞 | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19038 | Apple macOS Tahoe存在未明漏洞(CNVD-2026-19038) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19037 | Apple macOS存在未明漏洞(CNVD-2026-19037) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19036 | Apple macOS Tahoe存在未明漏洞(CNVD-2026-19036) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19035 | Apple macOS Tahoe存在未明漏洞(CNVD-2026-19035) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19034 | Apple macOS存在未明漏洞(CNVD-2026-19034) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19033 | Apple macOS信息泄露漏洞(CNVD-2026-19033) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19032 | Apple macOS拒绝服务漏洞(CNVD-2026-19032) | 2026-03-31 | 2026-04-30 |
| cnvd-2026-19031 | WordPress插件YouTube Showcase跨站脚本漏洞 | 2026-04-21 | 2026-04-30 |
| cnvd-2026-19030 | OpenClaw存在未明漏洞(CNVD-2026-19030) | 2026-04-28 | 2026-04-30 |
| cnvd-2026-19029 | OpenClaw存在未明漏洞(CNVD-2026-19029) | 2026-04-28 | 2026-04-30 |
| cnvd-2026-19028 | OpenClaw后置链接漏洞(CNVD-2026-19028) | 2026-04-28 | 2026-04-30 |
| cnvd-2026-19027 | OpenClaw路径遍历漏洞(CNVD-2026-19027) | 2026-04-28 | 2026-04-30 |
| cnvd-2026-19026 | OpenClaw存在未明漏洞(CNVD-2026-19026) | 2026-04-28 | 2026-04-30 |
| cnvd-2026-19025 | Flowise信息泄露漏洞 | 2026-04-24 | 2026-04-30 |
| cnvd-2026-19013 | Delta Electronics AS320T拒绝服务漏洞 | 2026-04-25 | 2026-04-29 |
| cnvd-2026-18831 | TOTOLINK A3300R password参数命令注入漏洞 | 2026-04-24 | 2026-04-29 |
| cnvd-2026-18823 | TOTOLINK A3300R provider参数命令注入漏洞 | 2026-04-24 | 2026-04-29 |
| cnvd-2026-18822 | TOTOLINK A3300R ttlWay参数命令注入漏洞 | 2026-04-24 | 2026-04-29 |
| cnvd-2026-18821 | TOTOLINK A3300R dhcpMtu参数命令注入漏洞 | 2026-04-24 | 2026-04-29 |
| cnvd-2026-18820 | TOTOLINK A3300R pppoeMtu参数命令注入漏洞 | 2026-04-24 | 2026-04-29 |
| cnvd-2026-18819 | TOTOLINK A3300R pppoeServiceName参数命令注入漏洞 | 2026-04-24 | 2026-04-29 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01844 | Уязвимость сервиса безопасности Advanced DNS Security (ADNS) операционной системы PAN-OS,… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01843 | Уязвимость функции loadRLE() загрузчика TGA-изображений (PluginTARGA.cpp) графической биб… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01842 | Уязвимость функции ws_user_gerList() сценария pwg.users.php системы управления контентом … | 16.02.2026 | 16.02.2026 |
| bdu:2026-01841 | Уязвимость компонента Updater облачной платформы управления контейнерами Arcane, позволяю… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01840 | Уязвимость ИИ-агента OpenClaw (ранее - ClawdBot или MoltBot), связанная с отсутствием про… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01839 | Уязвимость функции blocked_path() пакета Python для создания приложений для моделей машин… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01838 | Уязвимость драйверов графических процессоров NVIDIA NVS, Quadro, NVIDIA RTX, GeForce, свя… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01837 | Уязвимость микропрограммного обеспечения графических процессоров Imagination, позволяющая… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01836 | Уязвимость микропрограммного обеспечения графических процессоров Imagination, позволяющая… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01835 | Уязвимость драйвера ESXi base микропрограммного обеспечения сетевых контроллеров Intel 80… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01834 | Уязвимость микропрограммного обеспечения контроллеров Intel Ethernet серии E810, связанна… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01833 | Уязвимость технологий Intel Active Management Technology (AMT) и Intel Standard Manageabi… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01832 | Уязвимость технологий Intel Active Management Technology (AMT) и Intel Standard Manageabi… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01831 | Уязвимость технологий Intel Active Management Technology (AMT) и Intel Standard Manageabi… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01830 | Уязвимость компонента File input браузера Google Chrome, позволяющая нарушителю осуществи… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01829 | Уязвимость компонента PictureInPicture браузера Google Chrome, позволяющая нарушителю ока… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01828 | Уязвимость компонента Animation браузера Google Chrome, позволяющая нарушителю оказать во… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01827 | Уязвимость функции конфиденциальности Fenced Frames браузера Google Chrome, позволяющая н… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01826 | Уязвимость компонента WebGPU браузера Google Chrome, позволяющая нарушителю вызвать отказ… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01825 | Уязвимость программной платформы на базе git для совместной работы над кодом GitLab, связ… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01824 | Уязвимость программной платформы на базе git для совместной работы над кодом GitLab, связ… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01823 | Уязвимость функции межсетевых экранов SSL-VPN операционных систем Fortinet FortiOS, позво… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01822 | Уязвимость операционных систем Fortinet FortiOS, связанная с недостаточной проверкой исто… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01821 | Уязвимость функции межсетевых экранов SSL-VPN операционных систем Fortinet FortiOS, позво… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01820 | Уязвимость интерфейса командной строки операционных систем Fortinet FortiOS, позволяющая … | 16.02.2026 | 16.02.2026 |
| bdu:2026-01819 | Уязвимость графического пользовательского интерфейса операционных систем Fortinet FortiOS… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01818 | Уязвимость программного обеспечения для разработки 3D-моделей Autodesk Fusion, связанная … | 16.02.2026 | 16.02.2026 |
| bdu:2026-01817 | Уязвимость программного обеспечения для разработки 3D-моделей Autodesk Fusion, связанная … | 16.02.2026 | 16.02.2026 |
| bdu:2026-01816 | Уязвимость программного обеспечения для разработки 3D-моделей Autodesk Fusion, связанная … | 16.02.2026 | 16.02.2026 |
| bdu:2026-01815 | Уязвимость программного обеспечения Microsoft ACI Confidential Containers, связанная с не… | 16.02.2026 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202407-2188 | Siemens (China) Co., Ltd. is a company focusing on electrification, automation and digita… | 2024-07-23T22:46:32.699000Z |
| var-202406-3119 | Beijing StarNet Ruijie Network Technology Co., Ltd. EG3220 is a new generation of multi-s… | 2024-07-23T22:46:22.685000Z |
| var-202407-1740 | NBR6135-E is a router. Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR6135-E ha… | 2024-07-23T22:46:18.378000Z |
| var-202407-1417 | Siemens (China) Co., Ltd. is a company focusing on electrification, automation and digita… | 2024-07-23T22:46:07.784000Z |
| var-202407-1103 | Siemens (China) Co., Ltd. is a company focusing on electrification, automation and digita… | 2024-07-23T22:46:01.992000Z |
| var-202407-0957 | WinCC is a SCADA system suitable for all walks of life. It can access devices from mobile… | 2024-07-23T22:45:59.391000Z |
| var-202407-0819 | SIMATIC S7-1500 is a modular control system suitable for various automation applications … | 2024-07-23T22:45:56.958000Z |
| var-202407-0818 | NBR6210-E is a router product. Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR6… | 2024-07-23T22:45:56.946000Z |
| var-202407-0779 | Tenda i29V1.0 V1.0.0.5 was discovered to contain a hardcoded password for root. Tenda of … | 2024-07-23T22:45:56.150000Z |
| var-202407-0778 | Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnera… | 2024-07-23T22:45:56.131000Z |
| var-202407-0745 | Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnera… | 2024-07-23T22:45:55.498000Z |
| var-202305-1479 | D-Link DIR-2150 SetTriggerPPPoEValidate Username Command Injection Remote Code Execution … | 2024-07-23T22:45:09.335000Z |
| var-202108-1158 | A race condition was addressed with improved locking. This issue is fixed in macOS Monter… | 2024-07-23T22:44:06.976000Z |
| var-201109-0089 | Multiple unspecified vulnerabilities in Cisco Unified Service Monitor before 8.6, as used… | 2024-07-23T22:43:49.590000Z |
| var-200702-0378 | Stack-based buffer overflow in the DCE/RPC preprocessor in Snort before 2.6.1.3, and 2.7 … | 2024-07-23T22:43:25.614000Z |
| var-201011-0225 | Multiple stack-based buffer overflows in agent.exe in Setup Manager in Cisco Intelligent … | 2024-07-23T22:41:43.584000Z |
| var-201112-0297 | Multiple cross-site scripting (XSS) vulnerabilities in the Virus Scan Interface in SAP Ne… | 2024-07-23T22:41:20.004000Z |
| var-201507-0645 | D-Link is an internationally renowned provider of network equipment and solutions, includ… | 2024-07-23T22:41:18.832000Z |
| var-201803-1810 | A Stack-based Buffer Overflow issue was discovered in Delta Electronics Delta Industrial … | 2024-07-23T22:41:17.171000Z |
| var-201809-0087 | WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vul… | 2024-07-23T22:41:16.554000Z |
| var-200607-0396 | Multiple stack-based buffer overflows in eIQnetworks Enterprise Security Analyzer (ESA) b… | 2024-07-23T22:41:04.279000Z |
| var-201702-0423 | An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft… | 2024-07-23T22:40:53.160000Z |
| var-202305-1588 | D-Link DIR-2150 SetNTPServerSettings Command Injection Remote Code Execution Vulnerabilit… | 2024-07-23T22:40:05.297000Z |
| var-201112-0173 | The default configuration of the HP CM8060 Color MFP with Edgeline; Color LaserJet 3xxx, … | 2024-07-23T22:39:32.535000Z |
| var-201103-0371 | SAP Crystal Reports Server is a complete reporting solution for creating, managing, and d… | 2024-07-23T22:39:32.874000Z |
| var-201706-0017 | In FortiClientWindows 5.4.1 and 5.4.2, an attacker may escalate privilege via a FortiClie… | 2024-07-23T22:38:34.494000Z |
| var-202305-1520 | D-Link DIR-2150 SetSysEmailSettings EmailFrom Command Injection Remote Code Execution Vul… | 2024-07-23T22:38:26.576000Z |
| var-202407-0490 | A vulnerability has been identified in SIMATIC PCS neo V4.0 (All versions), SIMATIC STEP … | 2024-07-23T22:38:24.768000Z |
| var-201810-0396 | Advantech WebAccess 8.3.1 and earlier has several stack-based buffer overflow vulnerabili… | 2024-07-23T22:37:44.850000Z |
| var-202001-0833 | A Denial of Service vulnerability exists in the WRITE_C function in the msg_server.exe mo… | 2024-07-23T22:37:43.471000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-028 | Draeger: ICMHelper is vulnerable to a privilege escalation | 2025-08-05T10:00:00.000Z | 2026-01-06T11:00:00.000Z |
| vde-2019-012 | TECSON/GOK: Improper Authentication and Access Control on multiple devices | 2019-06-04T13:21:00.000Z | 2025-05-14T13:00:14.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2026-023 | Phoenix Contact: Several products are affected by vulnerabilities found in OpenSSL | 2026-04-22T08:00:00.000Z | 2026-04-22T08:00:00.000Z |
| vde-2025-104 | Phoenix Contact: Multiple Vulnerabilities in FL SWITCH 2xxx, FL SWITCH TSN 23xx and FL SWITCH 59xx Firmware | 2026-03-18T08:00:00.000Z | 2026-03-18T08:00:00.000Z |
| vde-2025-109 | Phoenix Contact: Unbounded growth of the session cache in TCP encapsulation service in FL MGUARD 2xxx and 4xxx firmware | 2026-02-10T08:00:00.000Z | 2026-02-23T14:00:00.000Z |
| vde-2025-073 | Phoenix Contact: Security Advisory for TC ROUTER and CLOUD CLIENT Industrial mobile network routers | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| vde-2025-071 | Phoenix Contact: Multiple Vulnerabilities in FL SWITCH 2xxx Firmware | 2025-12-09T08:00:00.000Z | 2026-01-12T08:00:00.000Z |
| vde-2025-074 | Phoenix Contact: Security Advisory for CHARX SEC-3xxx charging controllers | 2025-10-14T10:00:00.000Z | 2025-10-15T10:00:00.000Z |
| vde-2025-072 | Phoenix Contact: Security Advisory for QUINT4-UPS EIP | 2025-10-14T06:00:00.000Z | 2025-10-14T06:00:00.000Z |
| vde-2018-003 | PHOENIX CONTACT: addressing Meltdown and Spectre vulnerabilities | 2018-03-23T09:43:00.000Z | 2025-10-01T08:00:00.000Z |
| vde-2025-077 | Phoenix Contact: Two vulnerabilities in the jq JSON processor utilized by FL MGUARD 110x devices | 2025-09-09T10:00:00.000Z | 2025-09-09T10:00:00.000Z |
| vde-2025-064 | Phoenix Contact: Products utilizing WIBU-SYSTEMS CodeMeter Runtime Windows Installer have a privilege escalation | 2025-09-09T07:00:00.000Z | 2025-09-09T07:00:00.000Z |
| vde-2024-039 | Phoenix Contact: Multiple Vulnerabilities in mGuard devices | 2024-09-10T10:00:00.000Z | 2025-08-27T10:00:00.000Z |
| vde-2024-022 | Phoenix Contact: Security Advisory for CHARX-SEC3xxx Charge controllers | 2024-08-13T10:00:00.000Z | 2025-08-27T10:00:00.000Z |
| vde-2025-063 | Phoenix Contact: Device and Update Management Windows Installer Privilege Escalation | 2025-08-12T10:00:00.000Z | 2025-08-12T10:00:00.000Z |
| vde-2025-019 | Phoenix Contact: Security Advisory for CHARX SEC-3xxx charging controllers | 2025-07-08T10:00:00.000Z | 2025-07-22T08:00:00.000Z |
| vde-2019-015 | PHOENIX CONTACT: Security Advisory for multiple Industrial Controllers | 2019-08-07T00:00:00.000Z | 2025-07-11T07:00:00.000Z |
| vde-2025-054 | Phoenix Contact: Multiple Vulnerabilities in PLCnext Firmware | 2025-07-08T10:00:00.000Z | 2025-07-08T10:00:00.000Z |
| vde-2025-053 | Phoenix Contact: Multiple Vulnerabilities in PLCnext Firmware | 2025-07-08T10:00:00.000Z | 2025-07-08T10:00:00.000Z |
| vde-2025-014 | Phoenix Contact: Security Advisory for CHARX SEC-3xxx charging controllers | 2025-07-08T10:00:00.000Z | 2025-07-08T10:00:00.000Z |
| vde-2023-057 | Phoenix Contact: Classic line industrial controllers prone to inadequate integrity check of PLC | 2023-12-12T07:00:00.000Z | 2025-06-05T13:28:12.000Z |
| vde-2023-001 | PHOENIX CONTACT: Multiple Vulnerabilities in PLCnext Firmware | 2023-02-14T07:50:00.000Z | 2025-06-05T13:28:12.000Z |
| vde-2020-002 | PHOENIX CONTACT: Advisory for multiple FL Switch GHS utilising VxWorks | 2020-02-25T09:07:00.000Z | 2025-06-05T13:28:12.000Z |
| vde-2024-073 | Phoenix Contact: Multiple Vulnerabilities in PLCnext Firmware | 2024-12-09T11:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2024-071 | Phoenix Contact: Multiple Vulnerabilities in PLCnext Firmware | 2024-12-09T11:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-058 | Phoenix Contact: PLCnext Control prone to download of code without integrity check | 2023-12-12T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-056 | Phoenix Contact: PLCnext prone to Incorrect Permission Assignment for Critical Resource | 2023-12-12T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-054 | Phoenix Contact: ProConOS prone to Download of Code Without Integrity Check | 2023-12-12T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-051 | Phoenix Contact: MULTIPROG Engineering tool and ProConOS eCLR SDK prone to CWE-732 | 2023-12-12T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-018 | Phoenix Contact: Multiple vulnerabilities in WP 6xxx Web panels | 2023-08-08T06:41:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-017 | Phoenix Contact: Multiple vulnerabilities in TC ROUTER, TC CLOUD CLIENT and CLOUD CLIENT devices | 2023-08-08T04:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-016 | Phoenix Contact: PLCnext Engineer Vulnerabilities in LibGit2Sharp/LibGit2 | 2023-08-08T06:00:00.000Z | 2025-05-22T13:03:10.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-085 | Welotec: Path Traversal in SmartEMS Upload Handling | 2025-09-10T07:00:00.000Z | 2025-09-22T08:00:00.000Z |
| vde-2025-076 | Welotec: Hard-coded JWT secret in egOS WebGUI | 2025-08-26T07:00:00.000Z | 2025-08-26T07:00:00.000Z |
| vde-2024-009 | Welotec: Two vulnerabilities in TK500v1 router series | 2024-04-09T08:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2024-043 | Welotec: Multiple products are vulnerable to regreSSHion | 2024-08-22T06:00:00.000Z | 2024-08-22T06:00:00.000Z |
| vde-2024-023 | Welotec: Clickjacking Vulnerability in WebUI | 2024-04-23T08:00:00.000Z | 2024-04-23T08:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| advisory2026-04_vde-2026-040 | CODESYS EtherNetIP - Improper timeout handling | 2026-04-23T12:00:00.000Z | 2026-04-23T12:00:00.000Z |
| advisory2026-03_vde-2026-018 | CODESYS Control V3 - Externally-controlled format string in Auditlog | 2026-03-24T08:00:00.000Z | 2026-03-24T08:00:00.000Z |
| advisory2026-02_vde-2026-011 | CODESYS Control V3 - Untrusted boot application | 2026-03-24T08:00:00.000Z | 2026-03-24T08:00:00.000Z |
| advisory2026-01_vde-2026-012 | CODESYS Installer - Possible Privilege Escalation | 2026-03-10T10:00:00.000Z | 2026-03-10T10:00:00.000Z |
| advisory2025-10_vde-2025-100 | CODESYS Control - Invalid type usage in visualization | 2025-12-01T10:00:00.000Z | 2026-02-12T11:00:00.000Z |
| advisory2025-09_vde-2025-099 | CODESYS Control - Linux/QNX SysSocket flaw | 2025-12-01T11:00:00.000Z | 2026-02-12T11:00:00.000Z |
| advisory2025-11_vde-2025-101 | CODESYS Development System - Deserialization of Untrusted Data | 2025-12-01T10:00:00.000Z | 2025-12-01T10:00:00.000Z |
| advisory2025-08_vde-2025-070 | CODESYS Control V3 - NULL pointer dereference | 2025-08-04T08:00:00.000Z | 2025-10-14T08:00:00.000Z |
| advisory2025-07_vde-2025-051 | CODESYS Control V3 - Exposed PKI folder | 2025-08-04T10:00:00.000Z | 2025-09-01T10:00:00.000Z |
| advisory2025-06_vde-2025-049 | CODESYS Control V3 - Insecure default permissions | 2025-08-04T10:00:00.000Z | 2025-08-04T10:00:00.000Z |
| advisory2025-04_vde-2025-022 | CODESYS Control V3 - OPC UA Server Authentication bypass | 2025-03-18T11:00:00.000Z | 2025-06-05T13:31:01.000Z |
| advisory2025-03_vde-2025-015 | CODESYS Control V3 removable media path traversal | 2025-03-18T11:00:00.000Z | 2025-06-05T13:31:01.000Z |
| advisory2025-02_vde-2025-013 | CODESYS (Edge) Gateway for Windows insecure default | 2025-03-18T11:00:00.000Z | 2025-06-05T13:31:01.000Z |
| advisory2025-01_vde-2025-001 | CODESYS Key physical side-channel vulnerability | 2025-01-21T11:00:00.000Z | 2025-06-05T13:31:01.000Z |
| vde-2024-024 | CODESYS: Development System V2.3 affected by two vulnerabilities through corrupted project files | 2024-05-06T08:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2024-027 | CODESYS: Vulnerability in multiple products through exposure of resource to wrong sphere | 2024-06-04T06:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2024-026 | CODESYS: Vulnerability can cause a DoS on CODESYS OPC UA products | 2024-06-04T08:00:00.000Z | 2025-05-14T13:00:14.000Z |
| advisory2025-05_vde-2025-027 | CODESYS Visualization user management bypass in WebVisu | 2025-04-23T10:00:00.000Z | 2025-04-23T10:00:00.000Z |
| advisory2024-05_vde-2024-057 | CODESYS: CODESYS web server vulnerable to DoS | 2024-09-25T21:59:00.000Z | 2025-04-03T10:00:00.000Z |
| vde-2024-046 | OSCAT: Out-of-bounds read in OSCAT Basic library | 2024-09-10T14:00:00.000Z | 2024-09-10T14:00:00.000Z |
| vde-2023-066 | CODESYS: OS Command Injection Vulnerability in multiple CODESYS Control products | 2023-12-05T14:25:00.000Z | 2023-12-05T14:25:00.000Z |
| vde-2023-035 | CODESYS: Multiple products affected by WIBU Codemeter vulnerability | 2023-12-05T07:00:00.000Z | 2023-12-05T07:00:00.000Z |
| vde-2023-025 | CODESYS: Control runtime system memory and integrity check vulnerabilities | 2023-08-03T11:18:00.000Z | 2023-08-03T11:18:00.000Z |
| vde-2023-023 | CODESYS: Missing Brute-Force protection in CODESYS Development System | 2023-08-03T11:08:00.000Z | 2023-08-03T11:08:00.000Z |
| vde-2023-022 | CODESYS: Missing integrity check in CODESYS Development System | 2023-08-03T10:52:00.000Z | 2023-08-03T10:52:00.000Z |
| vde-2023-021 | CODESYS: Vulnerability in CODESYS Development System allows execution of binaries | 2023-08-03T10:48:00.000Z | 2023-08-03T10:48:00.000Z |
| vde-2023-019 | CODESYS: Multiple Vulnerabilities in CmpApp CmpAppBP and CmpAppForce | 2023-08-03T10:42:00.000Z | 2023-08-03T10:42:00.000Z |
| vde-2023-024 | CODESYS: Vulnerability in CODESYS Development System and CODESYS Scripting | 2023-07-28T07:45:00.000Z | 2023-07-28T07:45:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-067 | Wiesemann & Theis: Motherbox 3 allows unauthenticated read-only DB access | 2025-08-10T10:00:00.000Z | 2025-08-25T10:00:00.000Z |
| vde-2022-057 | Wiesemann & Theis multiple products prone to web interface vulnerability | 2022-12-13T07:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2024-018 | Wiesemann & Theis: Multiple products prone to unquoted search path | 2024-02-28T07:00:00.000Z | 2025-05-14T12:36:39.000Z |
| vde-2025-024 | Wiesemann & Theis: Multiple products from Wiesemann & Theis support deprecated jQuery version | 2025-05-13T10:00:00.000Z | 2025-05-13T10:00:00.000Z |
| vde-2025-032 | Wiesemann & Theis: Multiple W&T Products are vulnerable to cross-site-scripting | 2025-05-06T10:00:00.000Z | 2025-05-06T10:00:00.000Z |
| vde-2025-031 | Wiesemann & Theis: Multiple products from Wiesemann & Theis support deprecated TLS protocol versions | 2025-04-28T10:00:00.000Z | 2025-04-28T10:00:00.000Z |
| vde-2022-043 | Wiesemann & Theis: Multiple Vulnerabilities in the Com-Server Family | 2022-11-07T11:43:00.000Z | 2022-11-07T12:14:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2026-030 | MB connect line: Multiple Vulnerabilities in mbCONNECT24/mymbCONNECT24 | 2026-04-02T11:00:00.000Z | 2026-04-02T11:00:00.000Z |
| vde-2026-024 | MB connect line: Multiple Vulnerabilities in mbCONNECT24/mymbCONNECT24 | 2026-03-23T12:00:00.000Z | 2026-03-23T12:00:00.000Z |
| vde-2024-068 | MB connect line: Multiple Vulnerabilities in MB connect line Products | 2024-10-15T08:00:00.000Z | 2026-03-06T08:00:00.000Z |
| vde-2024-056 | MB connect line: Multiple Vulnerabilities in mbNET.mini Product | 2024-10-15T08:00:00.000Z | 2025-08-27T10:00:00.000Z |
| vde-2024-010 | Vulnerabilities in mbCONNECT24/mymbCONNECT24 | 2025-03-18T11:00:00.000Z | 2025-08-27T10:00:00.000Z |
| vde-2025-065 | MB connect line: Sandbox escape in mbNET's LUA interpreter | 2025-07-31T10:00:00.000Z | 2025-07-31T10:00:00.000Z |
| vde-2025-058 | MB connect line: Multiple vulnerabilities in mbNET.mini | 2025-07-21T10:00:00.000Z | 2025-07-21T10:00:00.000Z |
| vde-2025-035 | Vulnerabilities in mbCONNECT24/mymbCONNECT24 | 2025-06-24T10:00:00.000Z | 2025-06-24T10:00:00.000Z |
| vde-2025-034 | Vulnerabilities in mbCONNECT24/mymbCONNECT24 | 2025-06-24T10:00:00.000Z | 2025-06-24T10:00:00.000Z |
| vde-2021-030 | MB connect line: two vulnerabilities in mymbCONNECT24, mbCONNECT24 (Update A) | 2022-09-07T10:48:00.000Z | 2025-06-06T07:00:00.000Z |
| vde-2023-002 | MB Connect Line: Multiple vulnerabilities in mbConnect24 and mymbConnect24 | 2023-05-15T14:06:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-037 | MB connect line: Remote user enumeration in mbCONNECT24/mymbCONNECT24 | 2021-10-27T10:15:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-031 | MB connect line: Apache Guacamole related vulnerabilities in mbCONNECT24 | 2021-07-22T11:33:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-017 | MB connect line: Privilege escalation in mbDIALUP | 2021-07-22T11:35:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-012 | MB connect line: multiple products partially affected by DNSpooq | 2021-04-26T08:04:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-035 | MB connect line: Multiple Vulnerabilities in mymbCONNECT24 and mbCONNECT24 <= v2.6.1 | 2020-09-18T12:30:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2024-030 | MB connect line: mbNET.mini vulnerable to OS command injection | 2024-07-03T09:00:00.000Z | 2024-07-03T09:00:00.000Z |
| vde-2023-041 | MB connect line: Vulnerability allows access to non-critical information in mbCONNECT24 and mymbCONNECT24 | 2023-10-16T08:38:00.000Z | 2023-10-16T08:38:00.000Z |
| vde-2024-042 | MB connect line: Multiple products are vulnerable to regreSSHion | 2023-08-17T12:00:00.000Z | 2023-08-17T12:00:00.000Z |
| vde-2023-012 | MB connect line: Cross-site Scripting vulnerability in mbNET/mbNET.rokey | 2023-08-17T12:00:00.000Z | 2023-08-17T12:00:00.000Z |
| vde-2022-011 | MB connect line: Unauthenticated user enumeration in mbCONNECT24 and mymbCONNECT24 | 2022-09-07T12:50:00.000Z | 2022-09-07T12:50:00.000Z |
| vde-2021-003 | MB connect line: Multiple vulnerabilites in mymbCONNECT24 and mbCONNECT24 (Update A) | 2022-09-07T10:46:00.000Z | 2022-09-07T10:46:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2026-015 | Helmholz: Use of a Broken or Risky Cryptographic Algorithm | 2026-04-21T10:00:00.000Z | 2026-04-21T12:00:00.000Z |
| vde-2026-043 | Helmholz: Multiple Vulnerabilities in myREX24V2/myREX24V2.virtual | 2026-04-13T11:00:00.000Z | 2026-04-13T11:00:00.000Z |
| vde-2026-013 | Helmholz: Use of a Broken or Risky Cryptographic Algorithm | 2026-04-07T08:00:00.000Z | 2026-04-07T08:00:00.000Z |
| vde-2026-025 | Helmholz: Multiple Vulnerabilities in myREX24V2 / myREX24V2.virtual | 2026-03-23T12:00:00.000Z | 2026-03-23T12:00:00.000Z |
| vde-2024-069 | Helmholz: Multiple Vulnerabilities in Helmholz products | 2024-10-15T08:00:00.000Z | 2026-03-06T08:00:00.000Z |
| vde-2024-066 | Helmholz: Multiple Vulnerabilities in Helmholz REX100 Product | 2024-10-15T08:00:00.000Z | 2025-08-27T10:00:00.000Z |
| vde-2025-069 | Helmholz: Sandbox escape in REX200/250 LUA interpreter | 2025-07-31T10:00:00.000Z | 2025-07-31T10:00:00.000Z |
| vde-2025-059 | Helmholz: Multiple vulnerabilities in REX 100 | 2025-07-21T10:00:00.000Z | 2025-07-21T10:00:00.000Z |
| vde-2025-038 | Vulnerabilities in myREX24/myREX24.virtual | 2025-06-24T10:00:00.000Z | 2025-06-24T10:00:00.000Z |
| vde-2025-037 | Vulnerabilities in myREX24/myREX24.virtual | 2025-06-24T10:00:00.000Z | 2025-06-24T10:00:00.000Z |
| vde-2021-057 | Helmholz: Privilege Escalation in shDialup (Update A) | 2021-03-28T13:03:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2024-031 | Helmholz: Vulnerabilities in myREX24 V2/myREX24.virtual | 2025-03-18T11:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2022-017 | Helmholz: Unauthenticated user enumeration in myREX24 and myREX24.virtual | 2022-09-07T12:54:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-058 | Helmholz: Remote user enumeration in myREX24/myREX24-virtual | 2021-12-08T13:04:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2024-044 | Helmholz: Multiple products are vulnerable to regreSSHion | 2024-07-31T08:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2024-032 | Helmholz: REX 100 vulnerable to OS command injection | 2024-07-03T09:00:00.000Z | 2024-07-03T13:33:00.000Z |
| vde-2023-043 | Helmholz: Vulnerability allows access to non-critical information in myREX24 and myREX24.virtual | 2023-10-16T08:38:00.000Z | 2023-10-16T08:38:00.000Z |
| vde-2023-029 | Helmholz: Cross-site Scripting vulnerability in REX 200/REX 250 | 2023-08-17T12:00:00.000Z | 2023-08-17T12:00:00.000Z |
| vde-2023-008 | Helmholz: Multiple vulnerabilites in myREX24 and myREX24.virtual | 2023-05-15T12:06:00.000Z | 2023-05-15T12:06:00.000Z |
| vde-2022-039 | Helmholz: Multiple vulnerabilites in myREX24 and myREX24.virtual | 2022-09-07T10:56:00.000Z | 2022-09-07T10:56:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fsa-202601 | Several CODESYS vulnerabilities in Festo Automation Suite | 2026-02-26T08:00:00.000Z | 2026-02-26T08:00:00.000Z |
| fsa-202302 | Festo: Several vulnerabilities in FactoryViews | 2023-07-10T10:00:00.000Z | 2026-02-02T08:00:00.000Z |
| fsa-202402 | Several Vulnerabilities in MES PC (Windows 10) | 2024-02-27T12:00:00.000Z | 2025-12-08T07:00:00.000Z |
| fsa-202405 | Festo: Siemens S7-1500/ET200SP CPU used in Festo Didactic products contains a memory protection bypass vulnerability | 2024-09-09T07:00:00.000Z | 2025-11-05T08:00:00.000Z |
| fsa-202401 | Festo: Multiple products contain CoDe16 vulnerability | 2024-01-30T07:00:00.000Z | 2025-11-04T11:00:00.000Z |
| fsa-202202 | Festo: Controller CECC-S,LK,D family <= 2.3.8.1 - multiple vulnerabilities in CODESYS V3 runtime system | 2022-07-18T10:00:00.000Z | 2025-11-03T11:00:00.000Z |
| fsa-202209 | Festo: Incomplete documentation of remote accessible functions and protocols in Festo products | 2022-11-29T11:49:00.000Z | 2025-11-03T10:00:00.000Z |
| fsa-202208 | Festo: Multiple Festo products contain an unsafe default Codesys configuration | 2022-11-29T11:41:00.000Z | 2025-10-28T11:00:00.000Z |
| fsa-202206 | Festo: Vulnerable WIBU-SYSTEMS CodeMeter Runtime in multiple products | 2022-12-13T11:50:00.000Z | 2025-10-01T10:50:00.000Z |
| fsa-202304 | Festo: MSE6-C2M/D2M/E2M Incomplete User Documentation of Remote Accessible Functions | 2023-09-05T10:00:00.000Z | 2025-10-01T10:00:00.000Z |
| fsa-202301 | Festo: Cross-Site-Scripting (XSS) vulnerability in LX-Appliance | 2023-08-29T10:00:00.000Z | 2025-10-01T10:00:00.000Z |
| fsa-202303 | Festo: Vulnerable Siemens TIA-Portal in multiple Festo Didactic products | 2023-10-17T06:00:00.000Z | 2025-10-01T06:00:00.000Z |
| fsa-202101 | Festo: Multiple vulnerabilities in Ethernet/IP Stack of SBRD-Q/SBOC-Q/SBOI-Q | 2021-09-22T11:13:00.000Z | 2025-08-26T10:00:00.000Z |
| fsa-202207 | Festo: CPX-CEC-C1 and CPX-CMXX, Missing Authentication for Critical Webpage Function | 2022-09-20T10:00:00.000Z | 2025-07-28T10:00:00.000Z |
| fsa-202203 | Festo: Controller CECC-S,LK,D family firmware 2.4.2.0 - multiple vulnerabilities in CODESYS V3 runtime system | 2022-07-18T10:00:00.000Z | 2025-07-10T10:00:00.000Z |
| fsa-202201 | Festo: CECC-X-M1 - command injection vulnerabilities | 2022-07-06T07:00:00.000Z | 2025-06-23T08:00:00.000Z |
| fsa-202305 | Festo: Vulnerable WIBU-SYSTEMS CodeMeter Runtime in several products | 2023-11-28T07:00:00.000Z | 2025-05-13T10:00:00.000Z |
| fsa-202406 | Several Codesys Gateway v2 vulnerabilities in Codesys provided by Festo | 2024-12-03T11:00:00.000Z | 2024-12-03T14:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-011 | PEPPERL+FUCHS: Profinet Gateway LB8122A.1.EL – Device is affected by XSS vulnerability and information disclosure | 2025-05-26T10:00:00.000Z | 2025-08-27T10:00:00.000Z |
| vde-2024-038 | Pepperl+Fuchs: Anonymous FTP server and Telnet access allows information disclosure and manipulation | 2024-07-10T06:00:00.000Z | 2025-08-27T10:00:00.000Z |
| vde-2025-002 | PEPPERL+FUCHS: HMI – devices are affected by Windows RCE | 2025-02-25T11:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2024-017 | Pepperl+Fuchs: ICE2- * and ICE3- * are affected by multiple vulnerabilities | 2024-04-10T06:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-021 | Pepperl+Fuchs: RSM-EX devices - Multiple Bluetooth vulnerabilities | 2022-05-16T14:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-041 | Pepperl+Fuchs: Multiple DTM and VisuNet Software affected by log4net vulnerability | 2021-10-26T13:35:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-053 | Pepperl+Fuchs: Comtrol RocketLinx ICRL-M - Multiple Vulnerabilities | 2021-03-08T13:44:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-017 | Pepperl+Fuchs, PACTware: Two password vulnerabilities found | 2020-05-29T10:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2024-033 | PEPPERL+FUCHS: Device Master ICDM-RX/* – Vulnerability may allow unauthenticated remote attacker information disclosure and denial of service | 2024-08-13T12:00:00.000Z | 2025-05-14T14:34:17.000Z |
| vde-2020-014 | Pepperl+Fuchs: Kr00k vulnerabilities in Broadcom Wi-Fi chipsets | 2020-03-31T13:30:00.000Z | 2025-05-14T14:34:17.000Z |
| vde-2021-006 | Pepperl+Fuchs: Multiple Products - Vulnerability may allow remote attackers to cause a Denial Of Service | 2021-11-16T14:53:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2020-050 | Pepperl+Fuchs: Multiple Products - Vulnerability may allow remote attackers to cause a Denial Of Service | 2021-02-15T13:33:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2021-028 | Pepperl+Fuchs: Multiple VDM100-Distance Ethernet-IP sensors with multiple vulnerabilities | 2021-08-16T12:01:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-027 | Pepperl+Fuchs: WirelessHART-Gateway - Vulnerability may allow remote attackers to cause a Denial Of Service | 2021-10-16T12:00:00.001Z | 2025-05-14T13:00:14.000Z |
| vde-2020-038 | Pepperl+Fuchs: Multiple vulnerabilites in Comtrol IO-Link Master | 2021-01-04T13:01:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2019-002 | Pepperl+Fuchs: Path traversal in WirelessHART Gateway | 2019-03-06T10:35:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-007 | Pepperl+Fuchs: Multiple Products - Vulnerability may allow remote attackers to cause a Denial Of Service | 2021-02-16T14:53:00.000Z | 2025-05-14T12:53:43.000Z |
| vde-2024-065 | PEPPERL+FUCHS: HMI devices are affected by Insecure Platform Key | 2024-11-26T11:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2024-063 | PEPPERL+FUCHS: Multiple products are affected by regreSSHion | 2024-10-08T12:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-001 | Pepperl+Fuchs: Vulnerability allowing code-excution in PACTware <=5.0.5.31 | 2021-01-15T12:41:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2018-016 | Pepperl+Fuchs: ecom Mobile devices prone to Android privilege elevation vulnerability | 2018-10-19T10:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2018-002 | Pepperl+Fuchs: HMI devices vulnerable to Meltdown and Spectre Attacks | 2018-02-14T08:50:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2024-037 | Pepperl+Fuchs: Use after free vulnerability in Smart-Ex 02 and Smart-Ex 03 | 2024-07-10T06:00:00.000Z | 2024-07-10T06:00:00.000Z |
| vde-2022-012 | Pepperl+Fuchs: Vulnerability in multiple VisuNet devices | 2022-04-26T12:00:00.000Z | 2022-05-16T14:15:00.000Z |
| vde-2021-034 | Pepperl+Fuchs: Security Advisory for PrintNightmare Vulnerability in multiple HMI Devices | 2021-07-30T07:55:00.000Z | 2021-07-30T07:55:00.000Z |
| vde-2021-018 | Pepperl+Fuchs: Multiple vulnerabilites in ICE1 Ethernet IO Modules | 2021-05-12T08:57:00.000Z | 2021-05-12T08:57:00.000Z |
| vde-2020-040 | Pepperl+Fuchs: Multiple Products prone to multiple vulnerabilities in Comtrol RocketLinux | 2020-10-05T12:00:00.000Z | 2020-10-05T12:00:00.000Z |
| vde-2020-034 | Pepperl+Fuchs: VMT MSS and VMT IS - Several vulnerabilities in products utilizing WIBU-SYSTEMS CodeMeter components | 2020-09-10T13:22:00.000Z | 2020-09-10T13:22:00.000Z |
| vde-2019-011 | Pepperl+Fuchs: Remote code execution vulnerability in HMI devices | 2019-05-29T07:35:00.000Z | 2019-10-07T10:00:00.000Z |
| vde-2019-004 | Pepperl+Fuchs: ecom Mobile Devices prone to BlueBorne Attack | 2019-03-14T07:52:00.000Z | 2019-03-14T07:52:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ppsa-2026-002 | Pilz: Vulnerability affecting PASvisu Runtime | 2026-04-23T12:00:00.000Z | 2026-04-23T12:00:00.000Z |
| ppsa-2026-001 | Pilz: Multiple Vulnerabilities affecting the PIT User Authentication Service | 2026-02-02T08:00:00.000Z | 2026-02-02T10:00:00.000Z |
| ppsa-2025-004 | Pilz: Vulnerability affecting PASvisu Runtime | 2025-10-20T10:00:00.000Z | 2025-10-20T10:00:00.000Z |
| ppsa-2025-003 | Pilz: Authentication Bypass in IndustrialPI Webstatus | 2025-07-01T10:00:00.000Z | 2025-07-01T10:00:00.000Z |
| ppsa-2025-002 | Pilz: Missing Authentication in Node-RED integration | 2025-07-01T10:00:00.000Z | 2025-07-01T10:00:00.000Z |
| ppsa-2025-001 | Pilz: Authentication Bypass and Cross-Site-Scripting in PiCtory | 2025-06-30T10:00:00.000Z | 2025-06-30T10:00:00.000Z |
| vde-2022-044 | Pilz: Multiple products affected by ZipSlip | 2022-11-24T09:00:00.000Z | 2025-06-05T13:28:13.000Z |
| vde-2023-048 | Pilz: Multiple products prone to libwebp vulnerability | 2023-12-05T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-033 | Pilz: WIBU Vulnerabilitiy in multiple Products | 2023-10-12T06:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-045 | Pilz: PAS 4000 prone to ZipSlip | 2022-11-24T09:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-009 | Pilz: Multiple products prone to Niche Ethernet Stack vulnerabilities | 2021-09-20T11:56:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-033 | Pilz: Multiple products prone to WIBU-SYSTEMS CodeMeter vulnerabilities | 2020-09-10T13:18:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2023-050 | Pilz: Vulnerability in PASvisu and PMI v8xx | 2024-01-30T07:00:00.000Z | 2025-04-10T13:00:00.000Z |
| vde-2024-002 | Pilz: Multiple products affected by uC/HTTP vulnerability | 2024-02-06T07:00:00.000Z | 2024-02-06T07:00:00.000Z |
| vde-2023-059 | Pilz: Electron Vulnerabilities in PASvisu and PMI v8xx | 2023-12-05T07:06:00.000Z | 2023-12-05T07:06:00.000Z |
| vde-2022-033 | Pilz: PASvisu and PMI affected by multiple vulnerabilities | 2022-11-24T09:00:00.000Z | 2022-11-24T09:00:00.000Z |
| vde-2021-061 | Pilz: PMC programming tool 3.x.x affected by multiple vulnerabilities | 2022-04-26T10:00:00.000Z | 2022-04-26T10:00:00.000Z |
| vde-2021-055 | Pilz: PMC programming tool 2.x.x affected by multiple vulnerabilities | 2022-04-26T10:00:00.000Z | 2022-04-26T10:00:00.000Z |
| vde-2021-054 | Pilz: Multiple vulnerabilities in CODESYS V2 and V3 runtime system | 2022-04-26T10:00:00.000Z | 2022-04-26T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2024-008 | Wago: Vulnerability in WBM through Open VPN | 2026-04-08T07:00:00.000Z | 2026-04-08T07:00:00.000Z |
| vde-2026-021 | WAGO: Multiple Vulnerabilities in WAGO VC Hub | 2026-03-30T07:00:00.000Z | 2026-03-30T07:00:00.000Z |
| vde-2026-010 | WAGO: Multiple Vulnerabilities in WAGO Solution Builder and WAGO Device Sphere | 2026-03-30T07:00:00.000Z | 2026-03-30T07:00:00.000Z |
| vde-2026-020 | WAGO: Vulnerability in managed switches | 2026-03-23T08:00:00.000Z | 2026-03-23T08:00:00.000Z |
| vde-2026-004 | WAGO: Vulnerabilities in Managed Switch | 2026-02-09T08:00:00.000Z | 2026-02-09T08:00:00.000Z |
| vde-2025-095 | WAGO: Vulnerabilities in WAGO Industrial-Managed Switches | 2025-12-10T10:00:00.000Z | 2026-01-19T08:00:00.000Z |
| vde-2025-018 | WAGO: Vulnerabilities in WAGO Device Manager | 2025-06-16T10:00:00.000Z | 2025-11-21T12:00:00.000Z |
| vde-2025-062 | WAGO: Multiple Vulnerabilities in CODESYS components | 2025-11-03T11:00:00.000Z | 2025-11-03T11:00:00.000Z |
| vde-2025-087 | WAGO: Vulnerabilities in Device Sphere and Solution Builder | 2025-09-24T09:00:00.000Z | 2025-09-24T09:00:00.000Z |
| vde-2018-013 | WAGO: 750-8xx Controller Denial of Service | 2018-08-17T09:45:00.000Z | 2025-09-22T10:00:00.000Z |
| vde-2025-083 | WAGO: Vulnerability in hardware switch circuit | 2025-09-15T08:00:00.000Z | 2025-09-15T08:00:00.000Z |
| vde-2025-080 | WAGO: Multiple Vulnerabilities in I/O-Check Service | 2025-09-09T10:00:00.000Z | 2025-09-09T10:00:00.000Z |
| vde-2025-082 | WAGO: Critical sudo Vulnerability in Multiple Products | 2025-09-08T07:00:00.000Z | 2025-09-08T07:00:00.000Z |
| vde-2025-048 | WAGO: Escalation of Privileges in Coupler Firmware | 2025-09-08T07:00:00.000Z | 2025-09-08T07:00:00.000Z |
| vde-2025-057 | WAGO: Vulnerability in WAGO Device Sphere | 2025-06-23T10:00:00.000Z | 2025-07-07T06:15:00.000Z |
| vde-2025-040 | WAGO: Vulnerabilities in ctrlX OS app | 2025-06-16T10:00:00.000Z | 2025-06-16T10:00:00.000Z |
| vde-2024-014 | WAGO: Multiple products affected by Terrapin | 2024-02-22T07:00:00.000Z | 2025-06-05T13:28:13.000Z |
| vde-2025-020 | WAGO: Switches affected by year 2k38 problem | 2025-06-02T06:00:00.000Z | 2025-06-02T06:00:00.000Z |
| vde-2024-047 | WAGO: Multiple vulnerabilities in docker configuration | 2024-11-18T11:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-026 | WAGO: Multiple products prone to multiple vulnerabilities in e!Runtime / CODESYS V3 Runtime | 2023-07-31T07:36:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-007 | WAGO: Unauthenticated command execution via Web-based-management UPDATE A | 2023-05-15T08:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-009 | WAGO: Multiple Products affected by Linux Kernel Vulnerability Dirty Pipe | 2022-04-06T07:30:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-002 | WAGO: Vulnerable WIBU-SYSTEMS Codemeter installed through e!COCKPIT and WAGO-I/O-Pro | 2022-01-31T13:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-060 | WAGO: Smart Script affected by Log4Shell Vulnerability | 2022-01-05T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-049 | WAGO: Denial of Service Vulnerability in CODESYS Runtime 2.3 | 2021-11-16T12:05:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-014 | WAGO: Multiple Vulnerabilities in CODESYS Runtime 2.3 | 2021-05-20T09:08:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-011 | WAGO: Multiple Vulnerabilities in I/O-Check Service | 2020-03-09T09:30:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-009 | WAGO: e!Cockpit Two Update Package Vulnerabilities | 2020-03-09T09:18:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2018-010 | WAGO: Multiple vulnerabilities in e!DISPLAY products | 2018-07-10T09:50:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2025-008 | WAGO: Vulnerabilities in CODESYS Control | 2025-02-04T11:00:00.000Z | 2025-05-14T13:00:15.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2026-005 | ifm: Multiple Vulnerabilities in CR3171 | 2026-05-06T08:00:00.000Z | 2026-05-06T08:00:00.000Z |
| vde-2024-061 | ifm: Improper Access Control vulnerability | 2025-06-30T10:00:00.000Z | 2026-02-18T08:00:00.000Z |
| vde-2024-028 | ifm moneo password reset can be exploited | 2024-05-06T10:00:00.000Z | 2026-01-15T11:00:00.000Z |
| vde-2024-012 | ifm: Vulnerabilities in ifm AC14 firmware | 2024-07-09T07:00:00.000Z | 2026-01-15T11:00:00.000Z |
| vde-2022-050 | IFM: weak password recovery vulnerability in moneo appliance | 2022-12-12T11:00:00.000Z | 2026-01-06T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-106 | Beckhoff: XSS Vulnerability in TwinCAT 3 HMI Server | 2026-01-26T10:00:00.000Z | 2026-02-12T09:00:00.000Z |
| vde-2025-092 | Beckhoff: Privilege escalation and information leak via Beckhoff Device Manager | 2026-01-27T11:00:00.000Z | 2026-01-27T11:00:00.000Z |
| vde-2025-075 | Beckhoff: Deserialization of untrusted data by TwinCAT 3 Engineering | 2025-09-09T10:00:00.000Z | 2025-09-09T10:00:00.000Z |
| vde-2022-003 | BECKHOFF: Null Pointer Dereference vulnerability in products with OPC UA technology | 2022-03-01T12:34:00.000Z | 2025-06-05T13:28:13.000Z |
| vde-2024-050 | Beckhoff: Denial-of-Service vulnerability in the MDP package included in TwinCAT/BSD operating system | 2024-08-27T08:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2024-049 | Beckhoff: Denial-of-Service vulnerability in the IPC-Diagnostics package included in TwinCAT/BSD operating system | 2024-08-27T08:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2024-048 | Beckhoff: Improper neutralization of input in IPC-Diagnostics-www package included in TwinCAT/BSD operating system | 2024-08-27T08:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2024-045 | Beckhoff: Local authentication bypass in IPC-Diagnostics package included in TwinCAT/BSD operating system | 2024-08-27T08:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-067 | Beckhoff: Open redirect in TwinCAT/BSD package authelia-bhf | 2023-12-13T08:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-051 | Beckhoff: Relative path traversal vulnerability through TwinCAT OPC UA Server | 2021-11-04T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-008 | Beckhoff: Stack Overflow and XXE vulnerability in various OPC UA products | 2024-10-21T08:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-037 | Beckhoff: Privilege Escalation through TwinCat System Tray (TcSysUI.exe) | 2020-11-19T13:41:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-019 | Beckhoff: EtherLeak in TwinCAT RT network driver | 2020-06-16T08:31:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-005 | Beckhoff: BK9000 couplers - Denial of service inhibits function | 2020-03-10T13:17:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2019-019 | Beckhoff: TwinCAT Denial-of-Service in Profinet driver | 2019-10-09T10:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2024-064 | Beckhoff: Local command injection via TwinCAT Package Manager | 2024-10-31T11:00:00.000Z | 2025-04-11T07:00:00.000Z |
| vde-2020-051 | Beckhoff: DoS-Vulnerability for TwinCAT OPC UA Server and IPC Diagnostics UA Server | 2021-04-27T08:08:00.000Z | 2021-05-11T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2026-007 | TRUMPF: Multiple products affected by Wibu CodeMeter vulnerability | 2026-02-23T08:00:00.000Z | 2026-02-23T08:00:00.000Z |
| vde-2021-011 | TRUMPF Laser GmbH: TruControl 2.14.0 to 3.14.0 affected by recent sudo vulnerability | 2021-03-22T08:59:00.000Z | 2026-02-02T14:25:00.000Z |
| vde-2025-078 | TRUMPF: Remote support uses an outdated encryption algorithm | 2025-08-25T06:00:00.000Z | 2025-08-29T10:00:00.000Z |
| vde-2024-005 | TRUMPF: Multiple products contain vulnerable version of 7-zip | 2024-01-23T07:00:00.000Z | 2025-06-05T13:28:12.000Z |
| vde-2024-004 | TRUMPF: Multiple products affected by log4net vulnerability | 2025-04-22T10:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2024-003 | TRUMPF: Multiple products include a vulnerable version of Notepad++ | 2024-01-23T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-049 | TRUMPF: Multiple products prone to X.Org server vulnerabilities | 2022-11-07T11:43:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-039 | TRUMPF: Multiple products prone to WIBU CodeMeter vulnerabilities | 2020-10-27T10:28:00.000Z | 2025-05-14T12:36:39.000Z |
| vde-2024-040 | Multiple TRUMPF products prone to regreSSHion OpenSSH server vulnerabilities | 2024-06-25T10:00:00.000Z | 2025-04-10T13:00:00.000Z |
| vde-2024-034 | Multiple TRUMPF products prone to nftables server vulnerabilities | 2024-06-25T10:00:00.000Z | 2025-04-10T13:00:00.000Z |
| vde-2024-001 | TRUMPF: Multiple products contain WIBU CodeMeter vulnerabilities | 2024-01-29T07:00:00.000Z | 2024-01-29T07:00:00.000Z |
| vde-2024-006 | TRUMPF: Oseon contains vulnerable version of OpenSSL 1.1.x | 2024-01-23T07:00:00.000Z | 2024-01-23T07:00:00.000Z |
| vde-2023-031 | Trumpf: Multiple Products affected by WIBU Codemeter Vulnerability | 2023-09-13T10:00:00.000Z | 2023-11-13T11:00:00.000Z |
| vde-2022-023 | TRUMPF TruTops prone to improper access control | 2022-10-17T10:00:00.000Z | 2022-10-17T10:00:00.000Z |
| vde-2022-034 | TRUMPF: Products prone to Unified Automation vulnerabilities | 2022-08-15T10:00:00.000Z | 2022-08-15T10:00:00.000Z |
| vde-2022-016 | TRUMPF: TruTops Fab, TruTops Boost prone to vulnerability | 2022-05-02T10:00:00.000Z | 2022-05-02T10:00:00.000Z |
| vde-2021-033 | TRUMPF Laser GmbH: multiple products prone to codesys runtime vulnerabilities | 2021-08-12T13:02:00.001Z | 2021-08-12T13:02:00.001Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-043 | Lenze: PLC Designer V4 with insecure storage of sensitive information | 2025-06-25T10:00:00.000Z | 2025-06-25T10:00:00.000Z |
| vde-2025-042 | Lenze: VPN Client Privilege Escalation in combination with Lenze x500 IoT Gateway | 2025-05-27T09:00:00.000Z | 2025-05-27T09:00:00.000Z |
| vde-2024-053 | Lenze: Install Directory with insufficient permissions | 2024-09-03T08:00:00.000Z | 2025-03-13T11:30:00.000Z |
| vde-2022-030 | Lenze: Vulnerability in the OPC-UA authentification connection in the firmware | 2022-07-11T10:00:00.000Z | 2022-07-11T10:00:00.000Z |
| vde-2021-048 | Lenze: Multiple Vulnerabilities in CODESYS Control V2 communication | 2021-10-04T12:33:00.000Z | 2021-10-04T12:33:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2022-029 | Carlo Gavazzi Controls: Multiple Vulnerabilities in Controller UWP 3.0 | 2022-09-26T08:00:00.000Z | 2026-03-02T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-047 | AUMA: Incorrect delivery status of the Bluetooth configuration | 2025-06-10T10:00:00.000Z | 2025-06-10T10:00:00.000Z |
| vde-2023-028 | AUMA: SIMA Master Station affected by WRECK vulnerability | 2023-08-07T11:35:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-024 | Auma: SIMA² Master Station Denial of Service Vulnerability on Automation Runtime Webserver | 2022-06-15T10:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2025-026 | AUMA Riester: Buffer overflow in service telegram | 2025-05-12T10:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2023-027 | AUMA: Reflected Cross-Site Scripting Vulnerability in SIMA Master Stations | 2023-08-07T09:35:00.000Z | 2023-08-07T09:35:00.000Z |
| vde-2022-032 | AUMA: Multiple Vulnerabilities in Automation Runtime NTP Service | 2022-08-09T08:00:00.000Z | 2022-08-09T08:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-084 | Bender Charge Controller Vulnerability - Unsecure Communication | 2025-09-08T07:00:00.000Z | 2025-09-08T07:00:00.000Z |
| vde-2025-061 | Bender Charge Controller Vulnerability - Disclosure Of Stored Credentials When Authenticated | 2025-09-08T07:00:00.000Z | 2025-09-08T07:00:00.000Z |
| vde-2021-047 | Bender/ebee: Multiple Charge Controller Vulnerabilities | 2022-04-26T10:00:00.000Z | 2022-04-26T10:00:00.000Z |
| vde-2020-043 | Bender: COMTRAXX < 4.2.0 affected by inadquate credentials check vulnerability | 2020-10-16T06:54:00.000Z | 2020-10-16T06:54:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2026-032 | Endress+Hauser: sudo vulnerability affects Endress+Hauser MCS200HW | 2026-04-21T07:00:00.000Z | 2026-04-21T07:00:00.000Z |
| vde-2025-107 | Endress+Hauser: Multiple products affected by Qualcomm vulnerabilities | 2025-12-05T11:00:00.000Z | 2026-04-02T10:00:00.000Z |
| vde-2026-003 | Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime | 2026-03-31T08:00:00.000Z | 2026-04-01T11:00:00.000Z |
| vde-2026-002 | Endress+Hauser: buffer overflow in glibc ld.so leading to privilege escalation | 2026-03-02T07:00:00.000Z | 2026-03-02T07:00:00.000Z |
| vde-2025-068 | Endress+Hauser: Proline 10 Maintenance credentials may be exposed under certain conditions | 2025-09-02T10:00:00.000Z | 2026-02-20T09:00:00.000Z |
| vde-2025-105 | Endress+Hauser: Multiple products affected by Wibu-Systems CodeMeter Vulnerability | 2025-12-08T09:00:00.000Z | 2025-12-08T09:00:00.000Z |
| vde-2024-054 | Endress+Hauser: Netilion Network Insights is affected by multiple vulnerabilities | 2024-10-21T08:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-044 | Endress+Hauser: Multiple products affected by log4net vulnerability | 2022-01-20T08:06:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-005 | Endress+Hauser: Multiple Devices affected by fdtContainer vulnerability | 2021-03-01T06:39:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-031 | Endress+Hauser: Multiple products prone to WIBU CodeMeter vulnerabilities | 2020-10-27T13:10:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-022 | Endress+Hauser: Ecograph T utilizing Webserver firmware version 2.x exposes sensitive information | 2020-11-19T14:48:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-040 | Endress+Hauser: Promass 83 with EtherNet/IP affected by a stack-based buffer overflow | 2021-10-04T12:30:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-010 | Endress+Hauser: products utilizing WPA2 vulnerable to KRACK attacks | 2021-05-18T09:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-021 | Endress+Hauser: Ecograph T utilizing Webserver firmware version 1.x suffers from improper privilege management | 2020-11-19T14:48:00.000Z | 2025-04-11T07:00:00.000Z |
| vde-2025-036 | Multiple vulnerabilities in Endress+Hauser MEAC300-FNADE4 | 2025-03-06T14:00:00.000Z | 2025-03-06T14:00:00.000Z |
| vde-2024-041 | Endress+Hauser: Multiple products are vulnerable to code injection | 2024-09-10T08:00:00.000Z | 2024-09-10T08:00:00.000Z |
| vde-2022-019 | Endress+Hauser: Multiple products utilizing vulnerable WIBU-SYSTEMS CodeMeter components | 2022-06-02T15:11:00.000Z | 2022-06-02T15:11:00.000Z |
| vde-2022-006 | Endress+Hauser: FieldPort SFP50 Memory Corruption in Bluetooth Controller Firmware | 2022-03-24T10:48:00.000Z | 2022-03-24T10:48:00.000Z |
| vde-2019-005 | Endress+Hauser: WIFI enabled products utilising WPA2 | 2019-03-19T15:34:00.000Z | 2019-03-19T15:34:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-030 | Frauscher: FDS101, FDS-SNMP101 and FDS102 for FAdC/FAdCi are Vulnerable to OS Command Injection Vulnerability | 2025-07-07T10:00:00.000Z | 2025-07-29T10:00:00.000Z |
| vde-2023-049 | Frauscher: FDS102 for FAdC/FAdCi remote code execution vulnerability | 2023-12-11T07:00:00.000Z | 2023-12-11T07:00:00.000Z |
| vde-2023-038 | Frauscher: Multiple Vulnerabilities in FDS101 | 2023-09-21T06:00:00.000Z | 2023-09-21T06:00:00.000Z |
| vde-2023-011 | Frauscher: Diagnostic System FDS001 for FAdC/FAdCi Path Traversal vulnerability | 2023-07-05T08:00:00.000Z | 2023-07-05T08:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2019-010 | Miele: Multiple Vulnerabilities in XGW 3000 ZigBee Gateway | 2019-05-20T06:58:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2020-024 | Miele: Treck TCP/IP Vulnerabilities (Ripple20) affecting Communication Module XKM3000 L MED | 2020-07-08T07:29:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2022-052 | Miele: Vulnerability in ease2pay cloud service used by appWash | 2022-11-21T09:00:00.000Z | 2022-11-21T09:00:00.000Z |
| vde-2022-015 | Miele: Security vulnerability in Benchmark Programming Tool | 2022-04-27T12:00:00.000Z | 2022-04-27T12:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-096 | Weidmueller: Multiple vulnerabilities in Energy Meter 750-24 and Energy Meter 750-230 | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| vde-2025-044 | Weidmueller: Industrial ethernet switches are affected by multiple vulnerabilities | 2025-05-27T09:00:00.000Z | 2025-08-27T10:00:00.000Z |
| vde-2025-052 | Weidmueller: Security routers IE-SR-2TX are affected by multiple vulnerabilities | 2025-06-11T10:00:00.000Z | 2025-07-23T10:00:00.000Z |
| vde-2023-032 | Weidmueller: WIBU Vulnerability in multiple Products | 2023-11-09T07:42:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2019-018 | Weidmueller: multiple vulnerabilities in various Industrial Ethernet managed switches | 2019-12-05T12:03:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2025-041 | Weidmueller: ResMa is affected by a Vulnerability for ASP.NET AJAX | 2025-05-19T09:00:00.000Z | 2025-05-19T09:00:00.000Z |
| vde-2025-021 | Weidmueller: Authentication Vulnerability in PROCON-WIN 5 | 2025-03-05T09:00:00.000Z | 2025-05-14T13:26:53.000Z |
| vde-2021-026 | Weidmueller: Multiple vulnerabilities in Industrial WLAN devices | 2021-06-23T11:04:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2021-042 | Weidmueller: Remote I/O fieldbus couplers (IP20) affected by INFRA:HALT vulnerabilities | 2021-10-18T08:24:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-016 | Weidmueller: Accidentally open network port in u-controls and IoT-Gateways | 2021-05-04T08:17:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-002 | Weidmueller: WI Manager affected by fdtContainer vulnerability | 2021-01-20T13:32:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-041 | Weidmueller: u-create studio < 1.20.2 affected by WIBU-SYSTEMS CodeMeter vulnerabilities | 2020-10-12T09:14:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2025-023 | Weidmueller: OpenSSL vulnerability in industrial ethernet switches | 2025-03-05T08:00:00.000Z | 2025-03-05T11:00:00.000Z |
| vde-2022-056 | Weidmueller: Multiple IoT and control products affected by JavaScript injection vulnerability | 2022-12-14T07:00:00.000Z | 2022-12-14T07:00:00.000Z |
| vde-2021-004 | Weidmueller: EtherNet/IP Fieldbus Coupler out-of-bounds write | 2022-06-21T08:00:00.000Z | 2022-06-21T08:00:00.000Z |
| vde-2022-008 | WEIDMUELLER: Multiple vulnerabilities in Modbus TCP/RTU Gateways | 2022-04-07T06:00:00.000Z | 2022-04-07T06:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-066 | SMA: Directory Traversal in Sunny Boy | 2025-08-27T08:00:00.000Z | 2025-08-27T08:00:00.000Z |
| vde-2025-050 | SMA: Sunny Portal limited disclosure of personal data of registered users to an authenticated user | 2025-08-19T10:00:00.000Z | 2025-08-19T10:00:00.000Z |
| vde-2024-075 | SMA: Sunny Webbox clickjacking vulnerability | 2025-01-27T13:00:00.000Z | 2025-06-17T06:00:00.000Z |
| vde-2025-012 | SMA: Sunny Portal Remote Code Execution | 2025-02-26T11:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2025-010 | SMA: Sunny Portal demo system privilege escalation | 2025-05-13T11:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2024-074 | SMA: SQL injection in Sunny Central UP | 2024-11-27T09:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2024-020 | SMA: Cluster Controller CSRF vulnerability | 2025-01-27T13:00:00.000Z | 2025-02-12T16:48:47.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2024-013 | HIMA: Multiple products affected by DoS and Port-Based-VLAN Crossing | 2024-02-13T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-059 | HIMA: unquoted path vulnerabilities in X-OPC and X-OTS | 2023-01-16T09:00:00.000Z | 2025-05-22T13:03:10.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-091 | Murrelektronik: Cleartext Transmission of Sensitive Information in IMPACT67 Pro | 2025-10-14T10:00:00.000Z | 2025-10-14T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2020-016 | SWARCO: Critical Vulnerability in CPU LS4000 | 2020-05-28T13:00:00.000Z | 2020-05-28T13:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2024-016 | ADS-TEC Industrial IT: Docker vulnerability affects multiple products | 2024-02-19T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2025-033 | ads-tec Industrial IT: Mosquitto MQTT Client Vulnerability in ADS-TEC IRF Products | 2025-04-14T10:00:00.000Z | 2025-04-14T10:00:00.000Z |
| vde-2023-009 | ads-tec: Multiple Vulnerabilities in IRF1000, IRF2000 and IRF3000 | 2023-05-08T13:37:00.000Z | 2023-05-08T13:37:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2022-061 | VARTA: Multiple devices prone to hard-coded credentials | 2023-03-15T09:00:00.000Z | 2023-03-15T09:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-060 | Sauter: Multiple vulnerabilities in SAUTER modulo 6 | 2025-10-21T10:00:00.000Z | 2025-10-27T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-079 | Janitza: Multiple vulnerabilities in UMG 96RM-E | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| vde-2025-094 | Janitza: Vulnerability in Modbus interface of UMG 96-PA and UMG 96-PA-MID+ | 2025-11-24T12:00:00.000Z | 2025-11-24T12:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2026-029 | METTLER TOLEDO: OpenSSL vulnerability in MX and MR balances | 2026-04-23T10:00:00.000Z | 2026-04-23T10:00:00.000Z |
| vde-2026-001 | METTLER TOLEDO: ASP.NET core vulnerability in LabX | 2026-03-04T07:00:00.000Z | 2026-03-04T07:00:00.000Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| MOKSHA-2026-0089 |
2.3 (3.1)
5.3 (4.0)
|
Raw kbps Value Exposure in Private Xenstore via VIF.qo… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0088 |
2.3 (3.1)
5.3 (4.0)
|
Int64 Overflow in bytes_per_interval via VIF.qos_algor… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0087 |
2.3 (3.1)
5.3 (4.0)
|
QEMU Device Model Selection via VM.platform device-mod… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0086 |
2.3 (3.1)
4.6 (4.0)
|
License Expiry Manipulation via Host.license_params expiry |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0085 |
2.3 (3.1)
4.6 (4.0)
|
Feature Restriction Bypass via Host.license_params res… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0084 |
3.1 (3.1)
5.3 (4.0)
|
Firmware Type Denial of Service via VM.HVM_boot_params… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0083 |
3.1 (3.1)
5.3 (4.0)
|
Boot Order Manipulation via VM.HVM_boot_params order |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0082 |
3.1 (3.1)
5.3 (4.0)
|
VDI Lifecycle Behavior Manipulation via VDI.other_conf… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0081 |
3.1 (3.1)
5.3 (4.0)
|
I/O Polling Parameter Manipulation via VBD.other_confi… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0080 |
3.8 (3.1)
5.1 (4.0)
|
I/O Scheduler Sysfs Injection via SR.other_config scheduler |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0079 |
4.1 (3.1)
5.1 (4.0)
|
Network Sharing Bypass via Network.other_config assume… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0078 |
4.3 (3.1)
2.3 (4.0)
|
Guest Clock Manipulation via VDI.other_config timeoffset |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0077 |
4.3 (3.1)
5.3 (4.0)
|
VIF NIC Offload Disablement via VIF.other_config ethto… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0076 |
4.9 (3.1)
5.1 (4.0)
|
Network Offload Disablement via PIF.other_config ethto… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0075 |
4.9 (3.1)
5.1 (4.0)
|
Memory Ratio Bounds Relaxation via Pool.other_config |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0074 |
4.9 (3.1)
6.9 (4.0)
|
GC and Coalesce Disablement via SR.other_config |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0073 |
4.9 (3.1)
5.1 (4.0)
|
SR Destruction Protection Bypass and DoS via SR.other_… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0072 |
4.9 (3.1)
5.1 (4.0)
|
SR Scan Interval Manipulation via Host.other_config au… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0071 |
4.9 (3.1)
5.1 (4.0)
|
OVS In-Band Management Disablement via Network.other_config |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0070 |
5.0 (3.1)
5.3 (4.0)
|
Infrastructure Metadata Leak via SR-IOV VIF Xenstore P… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0069 |
5.3 (3.1)
5.3 (4.0)
|
Hypervisor Security Feature Manipulation via VM.platfo… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0068 |
5.3 (3.1)
5.3 (4.0)
|
Guest Xenstore Data Injection via VM.platform Map |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0067 |
5.3 (3.1)
5.3 (4.0)
|
Cross-Pool Metadata Injection via VDI.xenstore_data on… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0066 |
5.3 (3.1)
5.3 (4.0)
|
Metadata Propagation via VDI Snapshot and Clone Operations |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0065 |
5.3 (3.1)
5.3 (4.0)
|
SCSI Identity Forgery in XAPI Database via VDI.xenstore_data |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0064 |
5.3 (3.1)
5.3 (4.0)
|
Database Field Poisoning via VDI.xenstore_data Arbitra… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0063 |
5.3 (3.1)
5.3 (4.0)
|
Negative kbps Injection in VIF.qos_algorithm_params |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0062 |
5.3 (3.1)
5.3 (4.0)
|
Rate Limit Removal via kbps=0 in VIF.qos_algorithm_params |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0061 |
5.3 (3.1)
5.3 (4.0)
|
I/O Scheduling Downgrade to Idle Class via VBD.qos_alg… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z | |
| MOKSHA-2026-0060 |
5.3 (3.1)
5.3 (4.0)
|
Arbitrary Integer Passthrough to ionice via VBD.qos_al… |
Cloud Software Group |
XenServer |
2026-04-24T06:00:00Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| GCVE-1-2026-0032 |
6.8 (4.0)
|
MISP core - Stored XSS in MISP template (old engine) e… |
misp |
misp |
2026-05-07T12:09:04.093898Z | 2026-05-07T12:09:04.093898Z |
| GCVE-1-2026-0031 |
9.4 (4.0)
|
MISP - SQL injection via unvalidated ordering paramete… |
misp |
misp |
2026-04-29T20:14:00.000Z | 2026-05-06T16:00:13.755114Z |
| GCVE-1-2026-0030 |
9.3 (4.0)
|
MISP - Improper access control in auth key reset allow… |
misp |
misp |
2026-04-29T20:10:00.000Z | 2026-05-06T16:01:17.334511Z |
| GCVE-1-2026-0029 |
6.3 (4.0)
|
Improper UUID validation in MISP Collections |
misp |
misp |
2026-04-29T20:03:00.000Z | 2026-05-06T16:01:52.283022Z |
| GCVE-1-2026-0028 |
9.3 (4.0)
|
LookyLoo - PlaywrightCapture permits access to local f… |
LookyLoo |
PlaywrightCapture |
2026-04-29T19:28:00.000Z | 2026-04-29T19:28:44.316023Z |
| GCVE-1-2026-0027 |
5.8 (4.0)
|
Unsafe remote resource fetching in expansion misp-modules |
misp |
misp-modules |
2026-04-29T12:05:00.000Z | 2026-05-06T16:03:40.556833Z |
| GCVE-1-2026-0026 |
9.3 (4.0)
|
misp-modules website - Missing CSRF protection in the … |
misp |
misp-modules |
2026-04-29T09:24:00.000Z | 2026-05-06T16:04:44.788582Z |
| GCVE-1-2026-0025 |
6.9 (4.0)
|
RansomLook - Improper Filtering of Private Location En… |
ransomlook |
ransomlook |
2026-04-12T15:22:00.000Z | 2026-04-15T20:29:51.794609Z |
| GCVE-1-2026-0024 |
8.8 (4.0)
|
LDAP injection in MISP ApacheAuthenticate when using a… |
misp |
misp |
2026-04-08T08:28:00.000Z | 2026-04-09T04:44:04.936665Z |
| GCVE-1-2026-0023 |
8.5 (4.0)
|
Stored XSS in modal item preview for long item content… |
ail-project |
ail-framework |
2026-04-07T06:29:00.000Z | 2026-04-08T04:22:15.084342Z |
| GCVE-1-2026-0022 |
6.4 (4.0)
|
MISP - Beta Overmind UI Stored Cross-Site Scripting in… |
misp |
misp |
2026-03-30T09:48:36.968649Z | 2026-03-30T09:48:36.968649Z |
| GCVE-1-2026-0021 |
10 (4.0)
|
Critical RCE Vulnerability reported in Windchill |
windchill |
FlexPLM |
2026-03-23T12:30:40.249187Z | 2026-03-23T12:30:40.249187Z |
| GCVE-1-2026-0020 |
10 (4.0)
|
Remote Code Execution Attack Against Eircom D1000 Router |
Eir |
D1000 |
2026-03-11T14:12:00.000Z | 2026-03-11T14:23:24.609831Z |
| GCVE-1-2026-0019 |
6.4 (4.0)
|
Improper URL validation in MISP dashboard button widge… |
misp |
misp |
2026-02-27T14:55:00.000Z | 2026-02-27T15:44:29.998063Z |
| GCVE-1-2026-0018 |
6.5 (4.0)
|
Improper access control in MISP user contact form allo… |
misp |
misp |
2026-02-27T13:25:32.632362Z | 2026-02-27T13:25:32.632362Z |
| GCVE-1-2026-0017 |
7.2 (4.0)
|
Improper Neutralization of Raw HTML in MISP modules Ma… |
misp |
misp-modules |
2026-02-27T13:10:24.641948Z | 2026-02-27T13:10:24.641948Z |
| GCVE-1-2026-0016 |
7 (4.0)
|
Server-Side Request Forgery via Event Report Import Fr… |
misp |
misp |
2026-02-27T10:56:32.745676Z | 2026-02-27T10:56:32.745676Z |
| GCVE-1-2026-0015 |
7.2 (4.0)
|
Threat actors use FortiCloud SSO bypass to collect LDA… |
fortinet |
fortios |
2026-02-09T09:09:00.000Z | 2026-02-09T09:14:59.004089Z |
| GCVE-1-2026-0014 |
7.4 (4.0)
|
Missing Authorization Check Allows Unauthorized Modifi… |
vulnerability-lookup |
vulnerability-lookup |
2026-02-04T19:32:14.341383Z | 2026-02-04T19:32:14.341383Z |
| GCVE-1-2026-0013 |
2.1 (4.0)
|
Flask Application Username Route Collision Allows Rese… |
vulnerability-lookup |
vulnerability-lookup |
2026-02-04T19:27:00.000Z | 2026-02-04T19:32:49.787763Z |
| GCVE-1-2026-0012 |
2.1 (4.0)
|
Authentication Error Message Allows Email Address Enum… |
vulnerability-lookup |
vulnerability-lookup |
2026-02-04T19:21:34.411344Z | 2026-02-04T19:21:34.411344Z |
| GCVE-1-2026-0011 |
8.7 (4.0)
|
Out-of-bounds memory write in the network packet … |
EA Games |
Command & Conquer: Generals |
2026-01-29T14:37:00.000Z | 2026-01-29T14:39:17.728822Z |
| GCVE-1-2026-0010 |
9.3 (4.0)
|
Improper input validation in the file transfer ha… |
EA Games |
Command & Conquer: Generals |
2026-01-29T14:33:18.822829Z | 2026-01-29T14:33:18.822829Z |
| GCVE-1-2026-0009 |
9.3 (4.0)
|
Stack-based buffer overflow in the multiplayer ne… |
EA Games |
Command & Conquer: Generals |
2026-01-29T14:30:38.596928Z | 2026-01-29T14:30:38.596928Z |
| GCVE-1-2026-0008 |
10 (4.0)
|
gpg-agent stack buffer overflow in pkdecrypt using KEM |
gnupg |
gpg-agent |
2026-01-28T13:48:12.350509Z | 2026-01-28T13:48:12.350509Z |
| GCVE-1-2026-0007 |
10 (4.0)
|
GNU InetUtils Security Advisory: remote authentication… |
gnu |
InetUtils |
2026-01-20T20:57:00.000Z | 2026-01-26T16:32:40.831364Z |
| GCVE-1-2026-0006 |
8.5 (4.0)
|
Improper Access Control in Cerebrate AuthKey and Encry… |
cerebrate |
cerebrate |
2026-01-13T15:37:17.337254Z | 2026-01-13T15:37:17.337254Z |
| GCVE-1-2026-0005 |
8.5 (4.0)
|
Improper Access Control in Cerebrate Alignment Model A… |
cerebrate |
cerebrate |
2026-01-13T15:31:00.000Z | 2026-01-13T15:38:02.888546Z |
| GCVE-1-2026-0004 |
8.5 (4.0)
|
Authorization Bypass in Cerebrate IndividualsControlle… |
cerebrate |
cerebrate |
2026-01-13T15:28:00.000Z | 2026-01-13T15:38:37.744618Z |
| GCVE-1-2026-0003 |
6.3 (4.0)
|
Stored/Reflected XSS via Unsanitized Parameters in URL… |
misp |
misp |
2026-01-13T10:50:00.000Z | 2026-01-13T10:54:13.659223Z |