Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-4105 |
7.8 (3.1)
|
Systemd: systemd: privilege escalation via improper ac… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-13T08:52:08.179Z | 2026-03-13T08:52:08.179Z |
| CVE-2026-3999 |
8.8 (4.0)
|
Broken access control vulnerability affecting ID Server |
Pointsharp |
ID Server |
2026-03-13T08:38:59.468Z | 2026-03-13T08:38:59.468Z |
| CVE-2026-3986 |
6.4 (3.1)
|
Calculated Fields Form <= 5.4.5.0 - Authenticated (Con… |
codepeople |
Calculated Fields Form |
2026-03-13T08:25:17.634Z | 2026-03-13T08:25:17.634Z |
| CVE-2026-2888 |
5.3 (3.1)
|
Formidable Forms <= 6.28 - Unauthenticated Payment Amo… |
strategy11team |
Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder |
2026-03-13T08:25:17.249Z | 2026-03-13T08:25:17.249Z |
| CVE-2026-2879 |
5.4 (3.1)
|
GetGenie <= 4.3.2 - Insecure Direct Object Reference t… |
roxnor |
GetGenie – AI Content Writer with Keyword Research & SEO Tracking Tools |
2026-03-13T08:25:16.808Z | 2026-03-13T08:25:16.808Z |
| CVE-2026-2257 |
6.4 (3.1)
|
GetGenie <= 4.3.2 - Insecure Direct Object Reference t… |
roxnor |
GetGenie – AI Content Writer with Keyword Research & SEO Tracking Tools |
2026-03-13T08:25:16.092Z | 2026-03-13T08:25:16.092Z |
| CVE-2025-7195 |
6.4 (3.1)
|
Operator-sdk: privilege escalation due to incorrect pe… |
operator-framework |
operator-sdk |
2025-08-07T19:05:08.756Z | 2026-03-13T08:17:32.114Z |
| CVE-2026-3873 |
7.2 (3.1)
|
Legacy built-in user account |
syslink software AG |
Avantra |
2026-03-13T08:14:29.350Z | 2026-03-13T08:14:29.350Z |
| CVE-2026-2890 |
7.5 (3.1)
|
Formidable Forms <= 6.28 - Missing Authorization to Un… |
strategy11team |
Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder |
2026-03-13T07:23:39.586Z | 2026-03-13T07:23:39.586Z |
| CVE-2026-3045 |
7.5 (3.1)
|
Appointment Booking Calendar <= 1.6.9.29 - Missing Aut… |
croixhaug |
Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin |
2026-03-13T07:23:38.549Z | 2026-03-13T07:23:38.549Z |
| CVE-2026-1704 |
4.3 (3.1)
|
Appointment Booking Calendar <= 1.6.9.29 - Insecure Di… |
croixhaug |
Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin |
2026-03-13T07:23:38.921Z | 2026-03-13T07:23:38.921Z |
| CVE-2026-3891 |
9.8 (3.1)
|
Pix for WooCommerce <= 1.5.0 - Unauthenticated Arbitra… |
linknacional |
Pix for WooCommerce |
2026-03-13T07:23:37.971Z | 2026-03-13T07:23:37.971Z |
| CVE-2025-15515 |
6.9 (4.0)
|
The authentication mechanism for a specific featu… |
vivo |
Easyshare |
2026-03-13T06:43:50.023Z | 2026-03-13T06:43:50.023Z |
| CVE-2026-3926 |
8.8 (3.1)
|
Out of bounds read in V8 in Google Chrome prior t… |
Google |
Chrome |
2026-03-11T22:04:09.295Z | 2026-03-13T03:55:50.935Z |
| CVE-2026-27940 |
7.8 (3.1)
|
llama.cpp has a Heap Buffer Overflow via Integer Overf… |
ggml-org |
llama.cpp |
2026-03-12T16:39:37.463Z | 2026-03-13T03:55:50.269Z |
| CVE-2026-3841 |
8.5 (4.0)
|
Command Injection Vulnerability in Telnet CLI on TP-Li… |
TP-Link Systems Inc. |
TL-MR6400 v5.3 |
2026-03-12T17:25:58.864Z | 2026-03-13T03:55:49.564Z |
| CVE-2026-31900 |
8.7 (4.0)
|
Black's vulnerable version parsing leads to RCE in Git… |
psf |
black |
2026-03-11T19:15:20.822Z | 2026-03-13T03:55:48.806Z |
| CVE-2026-21708 |
10 (3.1)
|
A vulnerability allowing a Backup Viewer to perfo… |
Veeam |
Backup and Recovery |
2026-03-12T16:26:52.931Z | 2026-03-13T03:55:48.114Z |
| CVE-2026-21672 |
8.8 (3.1)
|
A vulnerability allowing local privilege escalati… |
Veeam |
Backup and Recovery |
2026-03-12T16:26:52.213Z | 2026-03-13T03:55:47.412Z |
| CVE-2026-21671 |
9.1 (3.1)
|
A vulnerability allowing an authenticated user wi… |
Veeam |
Software Appliance |
2026-03-12T15:09:39.209Z | 2026-03-13T03:55:46.681Z |
| CVE-2026-21669 |
10 (3.1)
|
A vulnerability allowing an authenticated domain … |
Veeam |
Backup and Replication |
2026-03-12T15:09:39.284Z | 2026-03-13T03:55:45.985Z |
| CVE-2026-21668 |
8.8 (3.1)
|
A vulnerability allowing an authenticated domain … |
Veeam |
Backup and Replication |
2026-03-12T15:09:39.335Z | 2026-03-13T03:55:45.308Z |
| CVE-2026-21667 |
10 (3.1)
|
A vulnerability allowing an authenticated domain … |
Veeam |
Backup and Replication |
2026-03-12T15:09:39.148Z | 2026-03-13T03:55:44.508Z |
| CVE-2026-2514 |
8.6 (4.0)
|
Possibility of unintended actions when viewing malicio… |
Progress Software |
Flowmon ADS |
2026-03-12T13:00:27.353Z | 2026-03-13T03:55:43.039Z |
| CVE-2026-21666 |
10 (3.1)
|
A vulnerability allowing an authenticated domain … |
Veeam |
Backup and Replication |
2026-03-12T15:09:39.180Z | 2026-03-13T03:55:43.772Z |
| CVE-2026-2513 |
8.6 (4.0)
|
Possibility of unintended actions when an administrato… |
Progress Software |
Flowmon ADS |
2026-03-12T12:58:59.894Z | 2026-03-13T03:55:42.297Z |
| CVE-2026-0940 |
8.4 (4.0)
6.7 (3.1)
|
A potential improper initialization vulnerability… |
Lenovo |
ThinkPad T14 Gen 5 BIOS |
2026-03-11T20:21:17.160Z | 2026-03-13T03:55:41.336Z |
| CVE-2026-3936 |
8.8 (3.1)
|
Use after free in WebView in Google Chrome on And… |
Google |
Chrome |
2026-03-11T22:04:14.376Z | 2026-03-13T03:55:40.613Z |
| CVE-2026-3931 |
8.8 (3.1)
|
Heap buffer overflow in Skia in Google Chrome pri… |
Google |
Chrome |
2026-03-11T22:04:12.053Z | 2026-03-13T03:55:39.852Z |
| CVE-2026-1878 |
5.4 (4.0)
|
An Insufficient Integrity Verification vulnerabil… |
ASUS |
Driver( Keyboard & Mouse ) |
2026-03-12T02:02:52.716Z | 2026-03-13T03:55:39.102Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-22052 |
5.3 (4.0)
|
ONTAP versions 9.12.1 and higher with S3 NAS buck… |
NETAPP |
ONTAP 9 |
2026-03-04T23:22:22.957Z | 2026-03-06T18:25:24.078Z |
| CVE-2026-21628 |
10 (4.0)
|
Extension - astroidframe.work - Unauthenticated Remote… |
astroidframe.work |
Astroid Template Framework |
2026-03-05T09:24:47.789Z | 2026-03-05T14:30:16.055Z |
| CVE-2026-3236 |
2.3 (4.0)
|
In affected versions of Octopus Server it was pos… |
Octopus Deploy |
Octopus Server |
2026-03-05T10:37:03.736Z | 2026-03-05T14:17:07.392Z |
| CVE-2025-69534 |
7.5 (3.1)
|
Python-Markdown version 3.8 contain a vulnerabili… |
n/a |
n/a |
2026-03-05T00:00:00.000Z | 2026-03-12T16:18:40.395Z |
| CVE-2026-27748 |
8.5 (4.0)
7.8 (3.1)
|
Avira Internet Security Arbitrary File Deletion via Im… |
Gen Digital Inc. |
Avira Internet Security |
2026-03-05T14:15:48.976Z | 2026-03-06T18:16:46.592Z |
| CVE-2026-27749 |
8.5 (4.0)
7.8 (3.1)
|
Avira Internet Security System Speedup Insecure Deseri… |
Gen Digital Inc. |
Avira Internet Security |
2026-03-05T14:15:35.580Z | 2026-03-06T18:17:15.860Z |
| CVE-2026-27750 |
8.5 (4.0)
7.8 (3.1)
|
Avira Internet Security Optimizer TOCTOU |
Gen Digital Inc. |
Avira Internet Security |
2026-03-05T14:15:23.095Z | 2026-03-06T18:17:44.243Z |
| CVE-2021-35486 |
8.1 (3.1)
|
A Cross-Site Request Forgery (CSRF) vulnerability… |
n/a |
n/a |
2026-03-03T00:00:00.000Z | 2026-03-04T15:16:03.968Z |
| CVE-2026-22866 |
2.7 (4.0)
|
ENS DNSSEC Oracle Vulnerable to RSA Signature Forgery … |
ensdomains |
ens-contracts |
2026-02-25T15:47:16.230Z | 2026-02-25T20:34:05.144Z |
| CVE-2026-27704 |
6.6 (4.0)
|
Dart SDK and Flutter SDK have Zip slip in Dart Pub pac… |
dart-lang |
sdk |
2026-02-25T15:17:26.243Z | 2026-02-25T20:27:35.486Z |
| CVE-2025-48418 |
6.4 (3.1)
|
A hidden functionality vulnerability in Fortinet … |
Fortinet |
FortiAnalyzer |
2026-03-10T16:44:17.571Z | 2026-03-11T13:08:18.809Z |
| CVE-2025-48840 |
5 (3.1)
|
An authentication bypass by spoofing vulnerabilit… |
Fortinet |
FortiWeb |
2026-03-10T16:44:14.182Z | 2026-03-12T14:29:57.399Z |
| CVE-2025-49784 |
5.6 (3.1)
|
An improper neutralization of special elements us… |
Fortinet |
FortiAnalyzer-BigData |
2026-03-10T16:44:16.287Z | 2026-03-11T03:56:55.482Z |
| CVE-2025-53608 |
4.6 (3.1)
|
An Improper Neutralization of Input During Web Pa… |
Fortinet |
FortiSandbox |
2026-03-10T16:44:14.768Z | 2026-03-12T14:28:29.842Z |
| CVE-2025-54820 |
7 (3.1)
|
A Stack-based Buffer Overflow vulnerability [CWE-… |
Fortinet |
FortiManager |
2026-03-10T16:44:11.014Z | 2026-03-12T14:46:35.156Z |
| CVE-2026-3611 |
10 (4.0)
10 (3.1)
|
Honeywell IQ4x BMS Controller Missing authentication f… |
Honeywell |
IQ4E |
2026-03-12T20:06:05.753Z | 2026-03-12T20:06:05.753Z |
| CVE-2026-2581 |
5.9 (3.1)
|
undici is vulnerable to Unbounded Memory Consumption i… |
undici |
undici |
2026-03-12T20:13:19.571Z | 2026-03-12T20:13:19.571Z |
| CVE-2026-2376 |
4.9 (3.1)
|
Mirror-registry: quay: quay: server-side request forge… |
Red Hat |
mirror registry for Red Hat OpenShift |
2026-03-12T19:11:16.569Z | 2026-03-12T20:46:18.921Z |
| CVE-2026-2229 |
7.5 (3.1)
|
undici is vulnerable to Unhandled Exception in undici … |
undici |
undici |
2026-03-12T20:27:05.600Z | 2026-03-12T20:27:05.600Z |
| CVE-2026-1528 |
7.5 (3.1)
|
undici is vulnerable to Malicious WebSocket 64-bit len… |
undici |
undici |
2026-03-12T20:21:57.775Z | 2026-03-12T20:21:57.775Z |
| CVE-2026-1527 |
4.6 (3.1)
|
undici is vulnerable to CRLF Injection via upgrade option |
undici |
undici |
2026-03-12T20:17:18.984Z | 2026-03-12T20:17:18.984Z |
| CVE-2026-1526 |
7.5 (3.1)
|
undici is vulnerable to Unbounded Memory Consumption i… |
undici |
undici |
2026-03-12T20:08:05.950Z | 2026-03-12T20:08:05.950Z |
| CVE-2026-32062 |
8.7 (4.0)
7.5 (3.1)
|
OpenClaw 2026.2.21-2 < 2026.2.22 - Unauthenticated Web… |
openclaw |
openclaw |
2026-03-11T13:32:35.845Z | 2026-03-11T14:36:20.370Z |
| CVE-2026-32061 |
6.7 (4.0)
4.4 (3.1)
|
OpenClaw < 2026.2.17 - Arbitrary File Read via $includ… |
openclaw |
openclaw |
2026-03-11T13:32:34.842Z | 2026-03-11T14:37:31.749Z |
| CVE-2026-32060 |
8.7 (4.0)
8.8 (3.1)
|
OpenClaw < 2026.2.14 - Path Traversal in apply_patch v… |
openclaw |
openclaw |
2026-03-11T13:32:33.790Z | 2026-03-11T14:42:06.135Z |
| CVE-2026-32059 |
8.7 (4.0)
8.8 (3.1)
|
OpenClaw 2026.2.22-2 < 2026.2.23 - Allowlist Bypass vi… |
openclaw |
openclaw |
2026-03-11T13:32:32.449Z | 2026-03-11T14:43:34.408Z |
| CVE-2026-3957 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
xierongwkhd weimai-wetapp Endpoint HomeController.java… |
xierongwkhd |
weimai-wetapp |
2026-03-11T21:02:08.710Z | 2026-03-12T14:19:35.337Z |
| CVE-2026-3956 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
xierongwkhd weimai-wetapp Admin_AdminUserController.ja… |
xierongwkhd |
weimai-wetapp |
2026-03-11T20:32:11.450Z | 2026-03-12T13:59:53.903Z |
| CVE-2026-3955 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
elecV2P jsfile Endpoint wbjs.js runJSFile code injection |
n/a |
elecV2P |
2026-03-11T20:32:08.853Z | 2026-03-12T13:57:25.008Z |
| CVE-2026-3954 |
6.9 (4.0)
6.5 (3.1)
6.5 (3.0)
|
OpenBMB XAgent workspace.py workspace path traversal |
OpenBMB |
XAgent |
2026-03-11T20:02:08.067Z | 2026-03-12T19:51:41.759Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-22052 | ONTAP versions 9.12.1 and higher with S3 NAS buckets are susceptible to an information disclosure v… | 2026-03-05T00:15:56.550 | 2026-03-13T01:37:59.053 |
| fkie_cve-2026-21628 | A improperly secured file management feature allows uploads of dangerous data types for unauthentic… | 2026-03-05T10:15:57.930 | 2026-03-13T01:33:31.743 |
| fkie_cve-2026-3236 | In affected versions of Octopus Server it was possible to create a new API key from an existing acc… | 2026-03-05T11:15:54.400 | 2026-03-13T01:30:06.483 |
| fkie_cve-2025-69534 | Python-Markdown version 3.8 contain a vulnerability where malformed HTML-like sequences can cause h… | 2026-03-05T15:16:11.243 | 2026-03-13T01:25:22.277 |
| fkie_cve-2026-27748 | Avira Internet Security contains an improper link resolution vulnerability in the Software Updater … | 2026-03-05T15:16:11.747 | 2026-03-13T01:22:40.027 |
| fkie_cve-2026-27749 | Avira Internet Security contains a deserialization of untrusted data vulnerability in the System Sp… | 2026-03-05T15:16:11.963 | 2026-03-13T01:21:04.073 |
| fkie_cve-2026-27750 | Avira Internet Security contains a time-of-check time-of-use (TOCTOU) vulnerability in the Optimize… | 2026-03-05T15:16:12.153 | 2026-03-13T01:19:54.817 |
| fkie_cve-2021-35486 | A Cross-Site Request Forgery (CSRF) vulnerability in Nokia IMPACT through 19.11.2.10-20210118042150… | 2026-03-03T18:16:21.050 | 2026-03-13T01:04:48.307 |
| fkie_cve-2026-22866 | Ethereum Name Service (ENS) is a distributed, open, and extensible naming system based on the Ether… | 2026-02-25T16:23:25.277 | 2026-03-13T01:02:53.500 |
| fkie_cve-2026-27704 | The Dart and Flutter SDKs provide software development kits for the Dart programming language. In v… | 2026-02-25T16:23:26.960 | 2026-03-13T00:56:42.250 |
| fkie_cve-2025-48418 | A hidden functionality vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.3, FortiAnalyzer 7… | 2026-03-10T18:17:56.793 | 2026-03-12T21:21:55.010 |
| fkie_cve-2025-48840 | An authentication bypass by spoofing vulnerability in Fortinet FortiWeb 7.6.0 through 7.6.3, FortiW… | 2026-03-10T18:17:57.207 | 2026-03-12T21:20:03.087 |
| fkie_cve-2025-49784 | An improper neutralization of special elements used in an sql command ('sql injection') vulnerabili… | 2026-03-10T18:17:57.427 | 2026-03-12T21:19:23.440 |
| fkie_cve-2025-53608 | An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerabili… | 2026-03-10T18:17:57.970 | 2026-03-12T21:18:33.917 |
| fkie_cve-2025-54820 | A Stack-based Buffer Overflow vulnerability [CWE-121] vulnerability in Fortinet FortiManager 7.4.0 … | 2026-03-10T18:17:58.363 | 2026-03-12T21:17:31.313 |
| fkie_cve-2026-3611 | The Honeywell IQ4x building management controller, exposes its full web-based HMI without authentic… | 2026-03-12T21:16:27.693 | 2026-03-12T21:16:27.693 |
| fkie_cve-2026-2581 | This is an uncontrolled resource consumption vulnerability (CWE-400) that can lead to Denial of Ser… | 2026-03-12T21:16:25.930 | 2026-03-12T21:16:25.930 |
| fkie_cve-2026-2376 | A flaw was found in mirror-registry where an authenticated user can trick the system into accessing… | 2026-03-12T19:16:16.200 | 2026-03-12T21:16:25.780 |
| fkie_cve-2026-2229 | ImpactThe undici WebSocket client is vulnerable to a denial-of-service attack due to improper valid… | 2026-03-12T21:16:25.573 | 2026-03-12T21:16:25.573 |
| fkie_cve-2026-1528 | ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large… | 2026-03-12T21:16:25.330 | 2026-03-12T21:16:25.330 |
| fkie_cve-2026-1527 | ImpactWhen an application passes user-controlled input to the upgrade option of client.request(), a… | 2026-03-12T21:16:25.137 | 2026-03-12T21:16:25.137 |
| fkie_cve-2026-1526 | The undici WebSocket client is vulnerable to a denial-of-service attack via unbounded memory consum… | 2026-03-12T21:16:23.933 | 2026-03-12T21:16:23.933 |
| fkie_cve-2026-32062 | OpenClaw versions2026.2.21-2 prior to 2026.2.22 and @openclaw/voice-call versions 2026.2.21 prior t… | 2026-03-11T14:16:28.340 | 2026-03-12T21:08:35.500 |
| fkie_cve-2026-32061 | OpenClaw versions prior to 2026.2.17 contain a path traversal vulnerability in the $include directi… | 2026-03-11T14:16:28.140 | 2026-03-12T21:08:35.500 |
| fkie_cve-2026-32060 | OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in apply_patch that all… | 2026-03-11T14:16:27.943 | 2026-03-12T21:08:35.500 |
| fkie_cve-2026-32059 | OpenClaw version 2026.2.22-2 prior to 2026.2.23 tools.exec.safeBins validation for sort command fai… | 2026-03-11T14:16:27.743 | 2026-03-12T21:08:35.500 |
| fkie_cve-2026-3957 | A flaw has been found in xierongwkhd weimai-wetapp up to 5fe9e8225be4f73f2c5087f134aff657bdf1c6f2. … | 2026-03-11T21:16:19.700 | 2026-03-12T21:08:22.643 |
| fkie_cve-2026-3956 | A vulnerability was detected in xierongwkhd weimai-wetapp up to 5fe9e8225be4f73f2c5087f134aff657bdf… | 2026-03-11T21:16:19.450 | 2026-03-12T21:08:22.643 |
| fkie_cve-2026-3955 | A security vulnerability has been detected in elecV2P up to 3.8.3. Affected by this issue is the fu… | 2026-03-11T21:16:19.197 | 2026-03-12T21:08:22.643 |
| fkie_cve-2026-3954 | A weakness has been identified in OpenBMB XAgent 1.0.0. Affected by this vulnerability is the funct… | 2026-03-11T20:16:23.477 | 2026-03-12T21:08:22.643 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-mj9m-c5pr-rxw7 |
4.3 (3.1)
2.3 (4.0)
|
In affected versions of Octopus Server it was possible to create a new API key from an existing acc… | 2026-03-05T12:30:30Z | 2026-03-13T03:30:31Z |
| ghsa-9g4r-rvq7-7xrq |
9.8 (3.1)
10.0 (4.0)
|
A improperly secured file management feature allows uploads of dangerous data types for unauthentic… | 2026-03-05T12:30:30Z | 2026-03-13T03:30:30Z |
| ghsa-5vfc-ccj9-49j9 |
4.3 (3.1)
5.3 (4.0)
|
ONTAP versions 9.12.1 and higher with S3 NAS buckets are susceptible to an information disclosure v… | 2026-03-05T00:31:11Z | 2026-03-13T03:30:30Z |
| ghsa-wcpp-3x59-h8vp |
6.9 (4.0)
|
Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerabili… | 2026-03-12T21:34:50Z | 2026-03-12T21:34:51Z |
| ghsa-3p4g-vg78-jqrv |
10.0 (3.1)
10.0 (4.0)
|
The Honeywell IQ4x building management controller, exposes its full web-based HMI without authentic… | 2026-03-12T21:34:51Z | 2026-03-12T21:34:51Z |
| ghsa-p36r-6g67-869c |
|
An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v… | 2026-03-12T21:34:50Z | 2026-03-12T21:34:50Z |
| ghsa-hhcc-5fw6-867j |
9.8 (3.1)
|
GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulnerability via the set… | 2026-03-12T21:34:50Z | 2026-03-12T21:34:50Z |
| ghsa-9w78-x9jw-9c7m |
4.9 (3.1)
|
A flaw was found in mirror-registry where an authenticated user can trick the system into accessing… | 2026-03-12T21:34:50Z | 2026-03-12T21:34:50Z |
| ghsa-39xw-9qh5-7xj4 |
|
Local File Inclusion in Contact Plan, E-Mail, SMS and Fax components in Asseco SEE Live 2.0 allows … | 2026-03-12T21:34:50Z | 2026-03-12T21:34:50Z |
| ghsa-37rg-q294-rgvc |
|
Heap buffer overflow vulnerability in LibreDWG versions v0.13.3.7571 up to v0.13.3.7835 allows a cr… | 2026-03-12T21:34:50Z | 2026-03-12T21:34:50Z |
| ghsa-258q-v95r-6j9p |
|
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/for… | 2026-03-12T21:34:50Z | 2026-03-12T21:34:50Z |
| ghsa-439v-7mv7-5p44 |
6.3 (3.1)
5.4 (4.0)
|
Inductive Automation Ignition Software is vulnerable to an unauthenticated API endpoint exposure th… | 2026-03-12T21:34:49Z | 2026-03-12T21:34:49Z |
| ghsa-jmwc-f9w6-7j8q |
8.8 (3.1)
|
Out of bounds read in V8 in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perfo… | 2026-03-12T00:31:17Z | 2026-03-12T21:34:45Z |
| ghsa-j53j-3fvf-64m5 |
8.8 (3.1)
|
Use after free in WebMCP in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to poten… | 2026-03-12T00:31:17Z | 2026-03-12T21:34:45Z |
| ghsa-744q-86j7-m2q4 |
9.6 (3.1)
|
Out of bounds read in Web Speech in Google Chrome prior to 146.0.7680.71 allowed a remote attacker … | 2026-03-12T00:31:17Z | 2026-03-12T21:34:45Z |
| ghsa-5j2j-j2vj-6m3j |
8.8 (3.1)
|
Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to … | 2026-03-12T00:31:16Z | 2026-03-12T21:34:45Z |
| ghsa-w45q-jfxp-27vq |
4.3 (3.1)
5.3 (4.0)
|
An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server that allowed an… | 2026-03-10T21:32:18Z | 2026-03-12T21:34:40Z |
| ghsa-vg33-x66f-82h4 |
5.4 (3.1)
7.4 (4.0)
|
An improper neutralization of input vulnerability was identified in GitHub Enterprise Server that a… | 2026-03-10T21:32:18Z | 2026-03-12T21:34:40Z |
| ghsa-jpfg-j56h-r5vw |
7.8 (3.1)
2.0 (4.0)
|
A command injection vulnerability has been reported to affect several QNAP operating system version… | 2026-03-11T09:31:54Z | 2026-03-12T21:34:40Z |
| ghsa-ff32-p598-c7q2 |
8.4 (3.1)
|
Tenda i24V3.0si V3.0.0.5 Firmware V3.0.0.5 was discovered to contain a hardcoded password vulnerabi… | 2026-03-10T21:32:18Z | 2026-03-12T21:34:40Z |
| ghsa-9ggx-qhc4-9pww |
4.3 (3.1)
5.3 (4.0)
|
An improper authorization vulnerability was identified in GitHub Enterprise Server that allowed a u… | 2026-03-10T18:31:22Z | 2026-03-12T21:34:40Z |
| ghsa-8x29-qfmf-3r57 |
8.4 (3.1)
|
Tenda G1V3.1si V16.01.7.8 Firmware V16.01.7.8 was discovered to contain a hardcoded password vulner… | 2026-03-10T21:32:18Z | 2026-03-12T21:34:40Z |
| ghsa-64fw-jx9p-5j24 |
8.8 (3.1)
8.7 (4.0)
|
An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Se… | 2026-03-10T18:31:23Z | 2026-03-12T21:34:40Z |
| ghsa-35vp-x4m3-rrq9 |
6.1 (3.1)
|
A Stored Cross-Site Scripting (XSS) vulnerability exists in the PluXml article comments feature for… | 2026-03-10T21:32:17Z | 2026-03-12T21:34:40Z |
| ghsa-ccrw-5hmv-8m52 |
7.5 (3.1)
|
A crafted JavaScript input executed with the QuickJS release 2025-09-13, fixed in commit fcd33c1afa… | 2026-03-06T21:30:37Z | 2026-03-12T21:34:39Z |
| ghsa-9688-9jmc-xf77 |
6.5 (3.1)
7.1 (4.0)
|
A NULL Pointer Dereference vulnerability in TP-Link Archer BE400 V1(802.11 modules) allows an adj… | 2026-01-07T12:31:22Z | 2026-03-12T21:34:39Z |
| ghsa-8q73-2fwv-c9pp |
6.5 (3.1)
|
A crafted JavaScript input can trigger an internal assertion failure in QuickJS release 2025-09-13,… | 2026-03-06T21:30:37Z | 2026-03-12T21:34:39Z |
| ghsa-6v4g-392h-r9mh |
6.5 (3.1)
|
A flaw was found in vsftpd. This vulnerability allows a denial of service (DoS) via an integer over… | 2026-01-14T18:31:36Z | 2026-03-12T21:34:39Z |
| ghsa-hx9q-6w63-j58v |
7.7 (4.0)
|
orjson does not limit recursion for deeply nested JSON documents | 2026-01-22T18:30:33Z | 2026-03-12T20:49:09Z |
| ghsa-j478-p7vq-3347 |
6.5 (3.1)
|
Ella Core: AMF DoS via malformed PathSwitchRequest with empty NR security capability bitstrings | 2026-03-12T20:33:28Z | 2026-03-12T20:33:28Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-85 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-03-03T16:29:37.848846Z |
| pysec-2024-84 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.3.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-03-03T16:29:37.756762Z |
| pysec-2024-83 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-03-03T16:29:37.662671Z |
| pysec-2024-82 |
8.8 (3.1)
|
Deserialization of untrusted data can occur in versions 23.3.2.0 and newer of the MindsDB… | mindsdb | 2024-09-12T13:15:00Z | 2026-03-03T16:29:37.563380Z |
| pysec-2023-278 |
5.3 (3.1)
|
MindsDB connects artificial intelligence models to real time data. Versions prior to 23.1… | mindsdb | 2023-12-11T21:15:00Z | 2026-03-03T16:29:37.448520Z |
| pysec-2023-121 |
|
A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as a… | zstd | 2023-03-31T20:15:00+00:00 | 2026-02-25T19:20:58+00:00 |
| pysec-2026-1 |
|
A PyPI user account compromised by an attacker and was able to upload a malicious version… | dydx-v4-client | 2026-01-28T21:09:02+00:00 | |
| pysec-2025-52 |
|
gateway_proxy_handler in MLflow before 3.1.0 lacks gateway_path validation. | mlflow | 2025-06-23T15:15:29Z | 2025-12-05T13:25:55.146081Z |
| pysec-2020-220 |
|
A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage coll… | ansible | 2020-10-05T14:15:00Z | 2025-10-31T04:43:53.616247Z |
| pysec-2025-72 |
|
The `num2words` project was compromised via a phishing attack and two new versions were u… | num2words | 2025-07-31T14:34:47+00:00 | |
| pysec-2025-71 |
|
Cadwyn creates production-ready community-driven modern Stripe-like API versioning in Fas… | cadwyn | 2025-07-21T21:15:25+00:00 | 2025-07-23T15:24:03.825615+00:00 |
| pysec-2025-70 |
10.0 (3.1)
|
A Server-Side Request Forgery (SSRF) vulnerability exists in the RequestsToolkit componen… | langchain-community | 2025-06-23T21:15:25+00:00 | 2025-07-16T21:23:40.211079+00:00 |
| pysec-2024-259 |
9.8 (3.1)
|
In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by m… | torch | 2024-10-29T21:15:04+00:00 | 2025-07-16T03:09:57.748865+00:00 |
| pysec-2024-258 |
|
In scrapy/scrapy, an issue was identified where the Authorization header is not removed d… | scrapy | 2024-05-20T08:15:08+00:00 | 2025-07-15T17:37:50.051730+00:00 |
| pysec-2025-69 |
|
In Roundup before 2.5.0, XSS can occur via interaction between URLs and issue tracker tem… | roundup | 2025-07-13T20:15:25+00:00 | 2025-07-13T21:23:01.161315+00:00 |
| pysec-2025-68 |
8.0 (3.1)
|
A vulnerability, which was classified as critical, has been found in Upsonic up to 0.55.6… | upsonic | 2025-06-19T21:15:27+00:00 | 2025-07-08T19:22:27.449399+00:00 |
| pysec-2025-67 |
9.8 (3.1)
|
A vulnerability classified as critical was found in Upsonic up to 0.55.6. This vulnerabil… | upsonic | 2025-06-19T21:15:27+00:00 | 2025-07-08T19:22:27.385619+00:00 |
| pysec-2025-66 |
|
Improper privilege management in a REST interface allowed registered users to access unau… | streampipes | 2025-03-03T11:15:11+00:00 | 2025-07-08T15:23:46.628375+00:00 |
| pysec-2025-65 |
|
A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0… | llama-index | 2025-07-07T13:15:28+00:00 | 2025-07-07T15:23:42.730681+00:00 |
| pysec-2025-61 |
|
Pillow is a Python imaging library. In versions 11.2.0 to before 11.3.0, there is a heap … | pillow | 2025-07-01T19:15:27Z | 2025-07-07T14:12:46.226030Z |
| pysec-2025-64 |
9.8 (3.1)
|
A vulnerability classified as critical has been found in themanojdesai python-a2a up to 0… | python-a2a | 2025-06-17T07:15:18+00:00 | 2025-07-02T21:23:13.806273+00:00 |
| pysec-2025-63 |
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Whe… | vllm | 2025-03-19T16:15:32+00:00 | 2025-07-01T23:22:49.176005+00:00 |
| pysec-2025-62 |
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Mal… | vllm | 2025-02-07T20:15:34+00:00 | 2025-07-01T23:22:49.083695+00:00 |
| pysec-2025-60 |
|
Exposure of Sensitive Information to an Unauthorized Actor, Insertion of Sensitive Inform… | apache-iotdb | 2025-05-14T11:16:28+00:00 | 2025-07-01T21:22:47.232036+00:00 |
| pysec-2025-59 |
|
Remote Code Execution with untrusted URI of UDF vulnerability in Apache IoTDB. The attack… | apache-iotdb | 2025-05-14T11:15:47+00:00 | 2025-07-01T21:22:47.177405+00:00 |
| pysec-2024-257 |
7.5 (3.1)
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2024-03-22T23:15:07+00:00 | 2025-06-30T15:23:50.085549+00:00 |
| pysec-2025-58 |
8.8 (3.1)
|
vLLM is a library for LLM inference and serving. vllm/model_executor/weight_utils.py impl… | vllm | 2025-01-27T18:15:41+00:00 | 2025-06-27T21:22:36.583615+00:00 |
| pysec-2025-57 |
|
A Denial of Service (DoS) vulnerability in zenml-io/zenml version 0.66.0 allows unauthent… | zenml | 2025-03-20T10:15:48+00:00 | 2025-06-27T17:22:55.175431+00:00 |
| pysec-2025-56 |
4.3 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. In versions up t… | octoprint | 2025-04-22T18:15:59+00:00 | 2025-06-27T17:22:53.513680+00:00 |
| pysec-2024-256 |
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2024-12-03T16:15:24+00:00 | 2025-06-27T17:22:53.325430+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33903 | In CARLA through 0.9.15.2, the collision sensor mishandles some situations involving pede… | 2024-04-29T05:02:07.295775Z |
| gsd-2024-33902 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.486429Z |
| gsd-2024-33901 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.525896Z |
| gsd-2024-33900 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.290639Z |
| gsd-2024-33899 | RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows attackers to spoof the scr… | 2024-04-29T05:02:07.400574Z |
| gsd-2024-33898 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.287632Z |
| gsd-2024-33897 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.283756Z |
| gsd-2024-33896 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.313250Z |
| gsd-2024-33895 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.493081Z |
| gsd-2024-33894 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.488420Z |
| gsd-2024-33893 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.381761Z |
| gsd-2024-33892 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.378170Z |
| gsd-2024-33891 | Delinea Secret Server before 11.7.000001 allows attackers to bypass authentication via th… | 2024-04-29T05:02:07.412035Z |
| gsd-2024-33890 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.344384Z |
| gsd-2024-33889 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.392587Z |
| gsd-2024-33888 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.468423Z |
| gsd-2024-33887 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.503613Z |
| gsd-2024-33886 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.287167Z |
| gsd-2024-33885 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.441746Z |
| gsd-2024-33884 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.534455Z |
| gsd-2024-33883 | The ejs (aka Embedded JavaScript templates) package before 3.1.10 for Node.js lacks certa… | 2024-04-29T05:02:07.271727Z |
| gsd-2024-4303 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:05.716348Z |
| gsd-2024-4302 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:05.603637Z |
| gsd-2024-4301 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:05.678292Z |
| gsd-2024-4300 | E-WEBInformationCo. FS-EZViewer(Web) exposes sensitive information in the service. A remo… | 2024-04-29T05:02:05.715239Z |
| gsd-2024-4299 | The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSheroc… | 2024-04-29T05:02:05.606402Z |
| gsd-2024-4298 | The email search interface of HGiga iSherlock (including MailSherlock, SpamSherock, Audit… | 2024-04-29T05:02:05.598531Z |
| gsd-2024-4297 | The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSherlo… | 2024-04-29T05:02:05.700888Z |
| gsd-2024-4296 | The account management interface of HGiga iSherlock (including MailSherlock, SpamSherlock… | 2024-04-29T05:02:05.621428Z |
| gsd-2024-33882 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.803998Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1407 | Malicious code in thief-utils (PyPI) | 2026-03-13T08:43:52Z | 2026-03-13T08:43:52Z |
| mal-2026-1406 | Malicious code in makenotion-ppetest (PyPI) | 2026-03-13T08:13:53Z | 2026-03-13T08:13:53Z |
| mal-2026-1400 | Malicious code in solana-pumpfun-sdk (npm) | 2026-03-13T06:55:58Z | 2026-03-13T06:55:58Z |
| mal-2026-1399 | Malicious code in pino-sdk (npm) | 2026-03-13T06:55:58Z | 2026-03-13T06:55:58Z |
| mal-2026-1392 | Malicious code in @dinzid04/libsignal-node (npm) | 2026-03-13T06:54:12Z | 2026-03-13T06:54:13Z |
| mal-2026-1391 | Malicious code in @dinzid04/baileys (npm) | 2026-03-13T06:54:12Z | 2026-03-13T06:54:13Z |
| mal-2026-1401 | Malicious code in tailwindcss-animation-advanced (npm) | 2026-03-13T06:51:42Z | 2026-03-13T06:51:42Z |
| mal-2026-1393 | Malicious code in cortana-md-bot (npm) | 2026-03-13T06:48:27Z | 2026-03-13T06:48:28Z |
| mal-2026-1390 | Malicious code in @depro-tech/cortana-md (npm) | 2026-03-13T06:48:27Z | 2026-03-13T06:48:28Z |
| mal-2026-1404 | Malicious code in whatsapp-core-auth-drzak (npm) | 2026-03-13T06:47:07Z | 2026-03-13T06:47:14Z |
| mal-2026-1398 | Malicious code in meta-internal-logger-drzak (npm) | 2026-03-13T06:47:07Z | 2026-03-13T06:47:14Z |
| mal-2026-1396 | Malicious code in dell-internal-auth-drzak (npm) | 2026-03-13T06:47:06Z | 2026-03-13T06:47:14Z |
| mal-2026-1395 | Malicious code in dell-fusion-core-drzak (npm) | 2026-03-13T06:47:06Z | 2026-03-13T06:47:14Z |
| mal-2026-1394 | Malicious code in dell-emc-internal-api-drzak (npm) | 2026-03-13T06:47:06Z | 2026-03-13T06:47:13Z |
| mal-2026-1405 | Malicious code in whatsapp-fastdesk-utils-drzak (npm) | 2026-03-13T06:47:06Z | 2026-03-13T06:47:07Z |
| mal-2026-1403 | Malicious code in tradepmr-fusion-core-drzak (npm) | 2026-03-13T06:47:06Z | 2026-03-13T06:47:07Z |
| mal-2026-1402 | Malicious code in tradepmr-api-utils-drzak (npm) | 2026-03-13T06:47:06Z | 2026-03-13T06:47:06Z |
| mal-2026-1397 | Malicious code in fusion-internal-common-drzak (npm) | 2026-03-13T06:47:06Z | 2026-03-13T06:47:06Z |
| mal-2026-1382 | Malicious code in @immuta/flag-providers-web (npm) | 2026-03-13T05:53:14Z | 2026-03-13T05:53:14Z |
| mal-2026-1386 | Malicious code in tachyon-spade-reporter (npm) | 2026-03-13T05:39:05Z | 2026-03-13T05:39:05Z |
| mal-2026-1387 | Malicious code in tahoe-tap (npm) | 2026-03-13T05:38:17Z | 2026-03-13T05:38:17Z |
| mal-2026-1388 | Malicious code in tourney-sdk-react (npm) | 2026-03-13T05:37:58Z | 2026-03-13T05:37:58Z |
| mal-2026-1389 | Malicious code in twitch-twilight-intl (npm) | 2026-03-13T05:37:47Z | 2026-03-13T05:37:47Z |
| mal-2026-1385 | Malicious code in conductor-managed-airflow-environment (npm) | 2026-03-13T05:37:35Z | 2026-03-13T05:37:35Z |
| mal-2026-1384 | Malicious code in @lux2/ssr-catalogue-sfcc (npm) | 2026-03-13T05:37:08Z | 2026-03-13T05:37:08Z |
| mal-2026-1381 | Malicious code in @immuta/feature-flags-core (npm) | 2026-03-13T05:34:26Z | 2026-03-13T05:34:26Z |
| mal-2026-1383 | Malicious code in @immuta/pxl-components (npm) | 2026-03-13T05:32:55Z | 2026-03-13T05:32:55Z |
| mal-2026-1379 | Malicious code in 8x8-developer-docs (npm) | 2026-03-13T02:21:45Z | 2026-03-13T02:21:46Z |
| mal-2026-1347 | Malicious code in f0-abstraction-resolver (npm) | 2026-03-11T21:06:33Z | 2026-03-13T01:40:01Z |
| mal-2026-1378 | Malicious code in f0-service-address-doctor (npm) | 2026-03-13T00:40:57Z | 2026-03-13T00:40:57Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| 3adr011536 | AC500 V3 Stack buffer overflow in Cryptographic Message Syntax | 2026-03-12T00:30:00.000Z | 2026-03-12T00:30:00.000Z |
| 3adr011525 | ABB Automation Builder Gateway for Windows with insecure defaults | 2026-02-24T00:30:00.000Z | 2026-02-24T00:30:00.000Z |
| 3adr011524 | AC500 V3 Multiple vulnerabilities | 2026-02-24T00:30:00.000Z | 2026-02-24T00:30:00.000Z |
| sa25p007 | B&R Automation Studio Update of SQLite version | 2026-02-18T00:30:00.000Z | 2026-02-18T00:30:00.000Z |
| sa26p001 | PVI Insertion of Sensitive Information into Logfile | 2026-01-29T00:30:00.000Z | 2026-01-29T00:30:00.000Z |
| sa24p003 | B&R PCs vulnerable to PixieFail attack | 2026-01-29T00:30:00.000Z | 2026-01-29T00:30:00.000Z |
| 7paa013309 | System 800xA SECURITY Advisory - ABB 800xA Base 6.0.x, 6.1.x CSLib communication DoS vulnerability | 2024-06-05T00:30:00.000Z | 2026-01-23T00:30:00.000Z |
| sa25p005 | B&R Automation Runtime Improper Handling of Flooding conditions on ANSL Server | 2026-01-19T00:30:00.000Z | 2026-01-19T00:30:00.000Z |
| sa25p004 | Automation Studio Insufficient Server Certificate Validation | 2026-01-19T00:30:00.000Z | 2026-01-19T00:30:00.000Z |
| 9akk108472a1331 | ABB Ability™ OPTIMAX® Authentication Bypass in Single-Sign On with Azure Active Directory | 2026-01-16T00:30:00.000Z | 2026-01-16T00:30:00.000Z |
| 2crt000009 | WebPro SNMP Card PowerValue Multiple Vulnerabilities | 2026-01-07T00:30:00.000Z | 2026-01-07T00:30:00.000Z |
| 9akk108471a8107 | Terra AC wallbox Heap Memory Corruption Vulnerability | 2025-09-16T00:30:00.000Z | 2025-11-28T08:00:00.000Z |
| 4hzm000603 | ABB Ability Camera Connect Vulnerabilities in outdated 3rd party component (VLC) | 2025-11-27T00:30:00.000Z | 2025-11-28T00:30:00.000Z |
| 7paa022088 | Edgenius Management Portal Authentication Bypass | 2025-11-20T00:30:00.000Z | 2025-11-20T00:30:00.000Z |
| 2nga002813 | PCM600 SharpZip library vulnerability | 2025-11-03T00:30:00.000Z | 2025-11-03T00:30:00.000Z |
| 4tz00000006007 | ALS-mini-S4/S8 IP Missing Authentication Vulnerability and its Mitigations | 2025-10-20T00:30:00.000Z | 2025-10-23T00:30:00.000Z |
| 9akk108471a8948 | Terra AC wallbox Heap Memory Corruption Vulnerability | 2025-10-20T00:30:00.000Z | 2025-10-21T00:30:00.000Z |
| 3kxg200000r4801 | CoreSense™ HM and CoreSense™ M10 File Path Traversal Vulnerability | 2025-04-16T00:30:00.000Z | 2025-10-20T00:30:00.000Z |
| sa25p003 | B&R Automation Runtime Vulnerabilities in System Diagnostic Manager (SDM) | 2025-10-07T00:30:00.000Z | 2025-10-14T00:30:00.000Z |
| 4tz00000006008 | LVS MConfig Insecure memory handling | 2025-10-08T00:30:00.000Z | 2025-10-08T00:30:00.000Z |
| sa25p002 | B&R Automation Runtime DoS Vulnerability in System Diagnostics Manager (SDM) | 2025-10-07T00:30:00.000Z | 2025-10-07T00:30:00.000Z |
| 9akk108471a7808 | EIBPORT Reflected XSS | 2025-10-07T00:30:00.000Z | 2025-10-07T00:30:00.000Z |
| 9akk108471a7121 | FLXeon Controllers Multiple vulnerabilities | 2025-09-09T00:30:00.000Z | 2025-09-18T00:30:00.000Z |
| 9akk108471a4462 | ELSB/BLBA ASPECT advisory several CVEs | 2025-08-11T00:30:00.000Z | 2025-09-04T00:30:00.000Z |
| 9akk108471a3623 | RMC - 100 Vulnerabilities in web UI (REST Interface) | 2025-07-03T00:30:00.000Z | 2025-08-18T00:30:00.000Z |
| 2nga002743 | ABB AbilityTM zenon Remote Transport Vulnerability | 2025-08-12T00:30:00.000Z | 2025-08-12T00:30:00.000Z |
| 3adr011407 | ABB Automation Builder Vulnerabilities in user management and access control | 2025-04-30T00:00:00.000Z | 2025-07-25T00:00:00.000Z |
| 3adr011432 | AC500 V2 Buffer overread on Modbus protocol | 2025-07-23T00:30:00.000Z | 2025-07-23T00:30:00.000Z |
| 9akk108471a4556 | Busch-Welcome® 2 wire Door opener actuator by default in compatibility mode. | 2025-07-21T00:30:00.000Z | 2025-07-21T00:30:00.000Z |
| 2crt000008 | Lite Panel Pro Vulnerability in Session Management | 2025-06-26T00:30:00.000Z | 2025-06-26T00:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0705 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2026-03-11T23:00:00.000+00:00 | 2026-03-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0695 | GNU libc: Schwachstelle ermöglicht Denial of Service | 2026-03-11T23:00:00.000+00:00 | 2026-03-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0551 | OpenClaw: Mehrere Schwachstellen | 2026-02-26T23:00:00.000+00:00 | 2026-03-11T23:00:00.000+00:00 |
| wid-sec-w-2026-0490 | OpenClaw: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-11T23:00:00.000+00:00 |
| wid-sec-w-2026-0472 | OpenClaw: Mehrere Schwachstellen | 2026-02-22T23:00:00.000+00:00 | 2026-03-11T23:00:00.000+00:00 |
| wid-sec-w-2026-0660 | Microsoft System Center Operations Manager: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0659 | Microsoft Office und SharePoint Produkte: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0658 | Microsoft SQL Server: Mehrere Schwachstellen ermöglichen Erlangen von Administratorrechten | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0657 | Microsoft ASP.NET und .NET: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0656 | Microsoft Authenticator App: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0655 | Microsoft Azure Komponenten: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0377 | Ivanti Endpoint Manager: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2026-02-10T23:00:00.000+00:00 | 2026-03-09T23:00:00.000+00:00 |
| wid-sec-w-2026-0629 | Zabbix: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0628 | Nextcloud: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0627 | CoreDNS: Mehrere Schwachstellen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0626 | Flowise: Mehrere Schwachstellen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0615 | Red Hat Enterprise Linux (nfs-utils): Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0612 | Google Chrome: Mehrere Schwachstellen | 2026-03-04T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0611 | Eclipse Jetty: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-04T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0579 | Django: Mehrere Schwachstellen | 2026-03-03T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0565 | FreeType: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-03-02T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0548 | Golang Go: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2026-02-26T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0525 | GStreamer: Mehrere Schwachstellen | 2026-02-25T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0507 | util-linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-02-24T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0497 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2026-02-24T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0481 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0452 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2026-02-18T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0427 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2026-02-16T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0362 | Red Hat Enterprise Linux (Lodash): Schwachstelle ermöglicht Denial of Service | 2026-02-10T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0357 | Roundcube: Mehrere Schwachstellen | 2026-02-09T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-071-06 | Inductive Automation Ignition Software | 2026-03-12T06:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-05 | Siemens Heliox EV Chargers | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-04 | Siemens SIMATIC | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-03 | Siemens SIDIS Prime | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-02 | Siemens RUGGEDCOM APE1808 Devices | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-01 | Trane Tracer SC, Tracer SC+, and Tracer Concierge | 2026-03-12T06:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-048-04 | Honeywell HIB2PI CCTV Camera (Update B) | 2026-02-17T07:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-043-08 | Siemens NX | 2026-02-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-043-03 | Siemens COMOS | 2025-12-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-345-05 | Siemens Advanced Licensing (SALT) Toolkit | 2025-12-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-345-04 | Siemens IAM Client | 2025-12-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-254-03 | Siemens SINAMICS Drives | 2025-09-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-231-02 | Siemens Mendix SAML Module | 2025-08-14T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-226-22 | Siemens Web Installer | 2025-08-12T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-162-05 | Siemens SIMATIC S7-1500 CPU Family | 2025-06-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-162-02 | Siemens RUGGEDCOM APE1808 | 2025-06-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-044-06 | Siemens RUGGEDCOM APE1808 | 2025-02-11T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-24-284-06 | Siemens SINEC Security Monitor | 2024-10-08T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-069-03 | Honeywell IQ4x BMS Controller | 2026-03-10T06:00:00.000000Z | 2026-03-10T06:00:00.000000Z |
| icsa-26-069-02 | Lantronix EDS3000PS and EDS5000 | 2026-03-10T06:00:00.000000Z | 2026-03-10T06:00:00.000000Z |
| icsa-26-069-01 | Apeman Cameras | 2026-03-10T06:00:00.000000Z | 2026-03-10T06:00:00.000000Z |
| icsa-26-069-04 | Ceragon Siklu MultiHaul and EtherHaul Series | 2026-03-10T05:00:00.000000Z | 2026-03-10T05:00:00.000000Z |
| icsa-24-338-04 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products (Update B) | 2024-12-03T07:00:00.000000Z | 2026-03-10T00:00:00.000000Z |
| icsa-26-064-01 | Delta Electronics CNCSoft-G2 | 2026-03-05T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| icsa-25-350-02 | Johnson Controls PowerG, IQPanel and IQHub (Update A) | 2025-12-16T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| icsa-25-343-01 | Universal Boot Loader (U-Boot) (Update A) | 2025-12-09T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| icsa-22-020-01 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric HMI SCADA (Update B) | 2022-01-20T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| va-25-297-01 | IBM DOORS Next Generation multiple vulnerabilities | 2025-10-22T18:45:47Z | 2026-03-04T00:00:00Z |
| icsa-26-062-05 | Labkotec LID-3300IP | 2026-03-03T07:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-04 | Portwell Engineering Toolkits | 2026-03-03T07:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-isis-dos-kdmxpszk | Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2026-03-11T16:00:00+00:00 | 2026-03-11T16:00:00+00:00 |
| cisco-sa-iosxr-privesc-bf8d5u4w | Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities | 2026-03-11T16:00:00+00:00 | 2026-03-11T16:00:00+00:00 |
| cisco-sa-cc-xss-mrnah5jh | Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities | 2026-03-11T16:00:00+00:00 | 2026-03-11T16:00:00+00:00 |
| cisco-sa-sdwan-authbp-qwcx8d4v | Cisco Catalyst SD-WAN Vulnerabilities | 2026-02-25T16:00:00+00:00 | 2026-03-05T00:06:17+00:00 |
| cisco-sa-fmc-sql-inject-2enmtc8v | Cisco Secure Firewall Management Center Software SQL Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2026-03-04T16:11:01+00:00 |
| cisco-sa-asaftd-cmd-inj-zjv8wysm | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Command Injection Vulnerability | 2024-04-24T16:00:00+00:00 | 2026-03-04T16:10:59+00:00 |
| cisco-sa-onprem-fmc-authbypass-5jpp45v2 | Cisco Secure Firewall Management Center Software Authentication Bypass Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftdfmc-dir-trav-wergjhwq | Cisco Secure Firewall Management Center and Secure Firewall Threat Defense Software Path Traversal Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-tcp-dos-rhfqnwrg | Cisco Secure Firewall Threat Defense Software TLS with Snort 3 Detection Engine Denial of Service Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-snort-bypass-rlggkzvf | Cisco Secure Firewall Threat Defense Software Snort Deep Inspection Bypass Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-dnd-dos-bpecg7b7 | Cisco Secure Firewall Threat Defense Software SSL Decryption Policy Denial of Service Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-cmd-inj-mtzgzexf | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Authenticated Command Injection Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-fmc-sql-injection-2qh6ccjd | Cisco Secure Firewall Management Center Software SQL Injection Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-fmc-rce-nkhnuljh | Cisco Secure Firewall Management Center Software Remote Code Execution Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-vpn-m9sx6mbc | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-saml-lkttrwzp | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software SAML Reflected Cross-Site Scripting Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-ospf-zh8phbsw | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software OSPF Protocol Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-luainject-vescqgms | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Lua Code Injection Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-ikev2-dos-ebuegdeg | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software IKEv2 Denial of Service Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-desync-n5avzeqw | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Services Client-Side Request Smuggling Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asa-ssh-keybypass-cr5xpusf | Cisco Secure Firewall Adaptive Security Appliance Software SSH Partial Private Key Authentication Bypass Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-sdwan-rpa-ehchtzk | Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-03-03T00:38:56+00:00 |
| cisco-sa-sd-wan-priv-e6e8tedf | Cisco SD-WAN Software Privilege Escalation Vulnerabilities | 2022-09-28T16:00:00+00:00 | 2026-02-25T20:29:00+00:00 |
| cisco-sa-ucsm-cmdinj-gvxlpesb | Cisco UCS Manager Software Command Injection Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsm-afwae-mogufyln | Cisco UCS Manager Software Privilege Escalation Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsfxosxss-7skve8zv | Cisco FXOS and UCS Manager Software Stored Cross-Site Scripting Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsciv-wgytc78q | Cisco FXOS and UCS Manager Software Command Injection Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-nxos-ether-dos-kv8ynwz4 | Cisco Nexus 3600 and 9500-R Series Switching Platforms Layer 2 Loop Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-nxos-dsnmp-cnn39uh | Cisco Nexus 9000 Series Fabric Switches in ACI Mode SNMP Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-nxos-cpdos-qlsv6pfd | Cisco Nexus 9000 Series Fabric Switches in ACI Mode Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-3805 | use after free in SMB connection reuse | 2026-03-02T00:00:00.000Z | 2026-03-13T01:03:13.000Z |
| msrc_cve-2026-3904 | CVE-2026-3904 | 2026-03-02T00:00:00.000Z | 2026-03-13T01:03:00.000Z |
| msrc_cve-2026-23868 | CVE-2026-23868 | 2026-03-02T00:00:00.000Z | 2026-03-13T01:02:54.000Z |
| msrc_cve-2026-3784 | wrong proxy connection reuse with credentials | 2026-03-02T00:00:00.000Z | 2026-03-13T01:02:44.000Z |
| msrc_cve-2026-3783 | token leak with redirect and netrc | 2026-03-02T00:00:00.000Z | 2026-03-13T01:02:16.000Z |
| msrc_cve-2026-1965 | bad reuse of HTTP Negotiate connection | 2026-03-02T00:00:00.000Z | 2026-03-13T01:01:47.000Z |
| msrc_cve-2026-25679 | Incorrect parsing of IPv6 host literals in net/url | 2026-03-02T00:00:00.000Z | 2026-03-12T14:36:21.000Z |
| msrc_cve-2026-27139 | FileInfo can escape from a Root in os | 2026-03-02T00:00:00.000Z | 2026-03-12T14:36:01.000Z |
| msrc_cve-2026-26133 | M365 Copilot Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-12T07:00:00.000Z |
| msrc_cve-2026-20841 | Windows Notepad App Remote Code Execution Vulnerability | 2026-02-10T08:00:00.000Z | 2026-03-12T07:00:00.000Z |
| msrc_cve-2025-61727 | Improper application of excluded DNS name constraints when verifying wildcard names in crypto/x509 | 2025-12-02T00:00:00.000Z | 2026-03-12T01:37:04.000Z |
| msrc_cve-2025-61729 | Excessive resource consumption when printing error string for host certificate validation in crypto/x509 | 2025-12-02T00:00:00.000Z | 2026-03-12T01:36:56.000Z |
| msrc_cve-2025-61725 | Excessive CPU consumption in ParseAddress in net/mail | 2025-10-02T00:00:00.000Z | 2026-03-12T01:36:48.000Z |
| msrc_cve-2025-61724 | Excessive CPU consumption in Reader.ReadResponse in net/textproto | 2025-10-02T00:00:00.000Z | 2026-03-12T01:36:43.000Z |
| msrc_cve-2025-58186 | Lack of limit when parsing cookies can cause memory exhaustion in net/http | 2025-10-02T00:00:00.000Z | 2026-03-12T01:36:37.000Z |
| msrc_cve-2025-58183 | Unbounded allocation when parsing GNU sparse map in archive/tar | 2025-10-02T00:00:00.000Z | 2026-03-12T01:36:32.000Z |
| msrc_cve-2025-58188 | Panic when validating certificates with DSA public keys in crypto/x509 | 2025-10-02T00:00:00.000Z | 2026-03-12T01:36:27.000Z |
| msrc_cve-2026-23240 | tls: Fix race condition in tls_sw_cancel_work_tx() | 2026-03-02T00:00:00.000Z | 2026-03-12T01:01:42.000Z |
| msrc_cve-2026-23239 | espintcp: Fix race condition in espintcp_close() | 2026-03-02T00:00:00.000Z | 2026-03-12T01:01:37.000Z |
| msrc_cve-2024-14027 | xattr: switch to CLASS(fd) | 2026-03-02T00:00:00.000Z | 2026-03-11T14:36:33.000Z |
| msrc_cve-2026-3381 | Compress::Raw::Zlib versions through 2.219 for Perl use potentially insecure versions of zlib | 2026-03-02T00:00:00.000Z | 2026-03-11T14:36:22.000Z |
| msrc_cve-2026-27965 | Vitess users with backup storage access can gain unauthorized access to production deployment environments | 2026-02-02T00:00:00.000Z | 2026-03-11T14:36:03.000Z |
| msrc_cve-2026-27969 | Vitess users with backup storage access can write to arbitrary file paths on restore | 2026-02-02T00:00:00.000Z | 2026-03-11T14:35:56.000Z |
| msrc_cve-2026-28364 | In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data. | 2026-02-02T00:00:00.000Z | 2026-03-11T14:35:49.000Z |
| msrc_cve-2026-26148 | Microsoft Azure AD SSH Login extension for Linux Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-11T07:00:00.000Z |
| msrc_cve-2026-24293 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-11T07:00:00.000Z |
| msrc_cve-2026-23865 | An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions 2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts. This issue is fixed in version 2.14.2. | 2026-03-02T00:00:00.000Z | 2026-03-11T01:40:19.000Z |
| msrc_cve-2026-3713 | pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow | 2026-03-02T00:00:00.000Z | 2026-03-11T01:03:59.000Z |
| msrc_cve-2026-27137 | Incorrect enforcement of email constraints in crypto/x509 | 2026-03-02T00:00:00.000Z | 2026-03-11T01:03:44.000Z |
| msrc_cve-2026-27138 | Panic in name constraint checking for malformed certificates in crypto/x509 | 2026-03-02T00:00:00.000Z | 2026-03-11T01:03:35.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0098 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2026-03-13T08:41:19.155490Z | 2026-03-13T08:41:19.155490Z |
| ncsc-2026-0097 | Kwetsbaarheden verholpen in Google Chrome | 2026-03-13T08:33:43.877125Z | 2026-03-13T08:33:43.877125Z |
| ncsc-2026-0096 | Kwetsbaarheden verholpen in Veeam Backup & Replication | 2026-03-12T14:54:08.200676Z | 2026-03-12T14:54:08.200676Z |
| ncsc-2026-0095 | Kwetsbaarheid verholpen in pac4j-jwt | 2026-03-12T14:45:51.156512Z | 2026-03-12T14:45:51.156512Z |
| ncsc-2026-0094 | Kwetsbaarheden verholpen in Cisco IOS XR | 2026-03-12T14:44:08.106602Z | 2026-03-12T14:44:08.106602Z |
| ncsc-2026-0093 | Kwetsbaarheden verholpen in GitLab | 2026-03-12T14:42:46.936248Z | 2026-03-12T14:42:46.936248Z |
| ncsc-2026-0092 | Kwetsbaarheden verholpen in Fortinet FortiWeb | 2026-03-12T07:46:15.529522Z | 2026-03-12T07:46:15.529522Z |
| ncsc-2026-0091 | Kwetsbaarheden verholpen in SAP-producten | 2026-03-12T07:24:16.575638Z | 2026-03-12T07:24:16.575638Z |
| ncsc-2026-0090 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2026-03-12T07:12:51.952931Z | 2026-03-12T07:12:51.952931Z |
| ncsc-2026-0089 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2026-03-12T07:03:24.148324Z | 2026-03-12T07:03:24.148324Z |
| ncsc-2026-0088 | Kwetsbaarheden verholpen in Adobe Illustrator | 2026-03-12T06:55:39.712240Z | 2026-03-12T06:55:39.712240Z |
| ncsc-2026-0087 | Kwetsbaarheden verholpen in Adobe Commerce | 2026-03-12T06:49:56.459199Z | 2026-03-12T06:49:56.459199Z |
| ncsc-2026-0086 | Kwetsbaarheden verholpen in Fortinet FortiManager en FortiAnalyzer | 2026-03-11T09:19:38.777277Z | 2026-03-11T09:19:38.777277Z |
| ncsc-2026-0085 | Kwetsbaarheden verholpen in Microsoft Developer tools | 2026-03-10T20:35:10.478398Z | 2026-03-10T20:35:10.478398Z |
| ncsc-2026-0084 | Kwetsbaarheden verholpen in Microsoft Office | 2026-03-10T20:20:08.157658Z | 2026-03-10T20:20:08.157658Z |
| ncsc-2026-0083 | Kwetsbaarheid verholpen in Microsoft Authenticator app | 2026-03-10T20:18:35.792755Z | 2026-03-10T20:18:35.792755Z |
| ncsc-2026-0082 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-03-10T20:15:41.528951Z | 2026-03-10T20:15:41.528951Z |
| ncsc-2026-0081 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2026-03-10T20:12:56.032261Z | 2026-03-10T20:12:56.032261Z |
| ncsc-2026-0080 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-03-10T20:07:55.976638Z | 2026-03-10T20:07:55.976638Z |
| ncsc-2026-0059 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2026-02-11T08:16:27.583936Z | 2026-03-10T14:20:48.176282Z |
| ncsc-2026-0079 | Kwetsbaarheden verholpen in Siemens producten | 2026-03-10T12:39:14.474522Z | 2026-03-10T12:39:14.474522Z |
| ncsc-2026-0071 | Kwetsbaarheden verholpen in Cisco Catalyst SD-WAN Manager | 2026-02-25T17:11:09.013125Z | 2026-03-06T12:07:02.595940Z |
| ncsc-2026-0078 | Kwetsbaarheden verholpen in Kibana | 2026-03-05T09:36:49.056247Z | 2026-03-05T09:36:49.056247Z |
| ncsc-2026-0077 | Kwetsbaarheden verholpen in Cisco Secure Firewall systemen | 2026-03-05T09:05:21.646499Z | 2026-03-05T09:05:21.646499Z |
| ncsc-2026-0076 | Kwetsbaarheden verholpen in Cisco Secure Firewall Management Center | 2026-03-04T20:49:12.211658Z | 2026-03-04T20:49:12.211658Z |
| ncsc-2026-0075 | Kwetsbaarheid verholpen in n8n Automation Platform | 2026-03-04T14:03:54.207583Z | 2026-03-04T14:03:54.207583Z |
| ncsc-2026-0070 | Kwetsbaarheden verholpen in VMware Aria Operations | 2026-02-25T11:24:46.807867Z | 2026-03-04T08:54:08.940512Z |
| ncsc-2026-0074 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2026-03-03T09:07:09.279353Z | 2026-03-03T09:07:09.279353Z |
| ncsc-2026-0073 | Kwetsbaarheid verholpen in Juniper Junos OS Evolved | 2026-02-27T09:48:51.845864Z | 2026-02-27T09:48:51.845864Z |
| ncsc-2026-0072 | Kwetsbaarheden verholpen in GitLab | 2026-02-27T07:15:18.318821Z | 2026-02-27T07:15:18.318821Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2025:18-01 | Lack of TLS certificate validation when connecting Arc to a Guardian or CMC, in Arc before v2.2.0 | 2026-03-04T11:00:00.000Z | 2026-03-04T11:00:00.000Z |
| nn-2025:17-01 | HTML injection in Sensor Map in CMC before 25.6.0 | 2026-03-04T11:00:00.000Z | 2026-03-04T11:00:00.000Z |
| nn-2025:16-01 | HTML injection in Alerted Nodes Dashboard in Guardian/CMC before 25.6.0 | 2026-03-04T11:00:00.000Z | 2026-03-04T11:00:00.000Z |
| nn-2025:15-01 | Path traversal in Import Arc data archive functionality in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:14-01 | HTML injection in Asset List in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:13-01 | Stored Cross-Site Scripting (XSS) in Reports in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:12-01 | HTML injection in in Time Machine functionality in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:11-01 | Stored Cross-Site Scripting (XSS) in Dashboards in Guardian/CMC before 25.4.0 | 2025-11-25T11:00:00.000Z | 2025-11-26T11:00:00.000Z |
| nn-2025:9-01 | Path traversal in Time Machine functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:8-01 | Authenticated SQL Injection on Alert functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:7-01 | Authenticated SQL Injection on Alert functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:6-01 | Authenticated SQL Injection on Smart Polling functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:5-01 | Incorrect authorization for CLI in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:4-01 | Client-side path traversal in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:10-01 | Authenticated SQL Injection on CLI functionality in Guardian/CMC before 25.3.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:3-01 | Incorrect authorization for traces request/download in CMC before 25.1.0 | 2025-08-26T11:00:00.000Z | 2025-08-26T11:00:00.000Z |
| nn-2025:2-01 | Privilege escalation in Guardian/CMC before 24.6.0 | 2025-06-10T11:00:00.000Z | 2025-06-10T11:00:00.000Z |
| nn-2025:1-01 | Authenticated RCE in update functionality in Guardian/CMC before 24.6.0 | 2025-06-10T11:00:00.000Z | 2025-06-10T11:00:00.000Z |
| nn-2023_17-01 | Information disclosure via audit records for OpenAPI requests in Guardian/CMC before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-04-11T11:00:00.000Z |
| nn-2023:17-01 | Information disclosure via audit records for OpenAPI requests in Guardian/CMC before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-04-11T11:00:00.000Z |
| nn-2024_1-01 | DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-04-10T11:00:00.000Z |
| nn-2024:1-01 | DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-04-10T11:00:00.000Z |
| nn-2023_12-01 | Check Point IoT integration: WebSocket returns assets data without authentication in Guardian/CMC before 23.3.0 | 2024-01-15T11:00:00.000Z | 2024-01-16T11:00:00.000Z |
| nn-2023:12-01 | Check Point IoT integration: WebSocket returns assets data without authentication in Guardian/CMC before 23.3.0 | 2024-01-15T11:00:00.000Z | 2024-01-16T11:00:00.000Z |
| nn-2023_9-01 | Authenticated SQL Injection on Query functionality in Guardian/CMC before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_8-01 | Session Fixation in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_7-01 | DoS via SAML configuration in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_6-01 | Partial DoS on Reports section due to null report name in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_5-01 | Information disclosure via the debug function in assertions in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_4-01 | Stored Cross-Site Scripting (XSS) in Threat Intelligence rules in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20348-1 | Security update for python-PyPDF2 | 2026-03-11T20:15:02Z | 2026-03-11T20:15:02Z |
| opensuse-su-2026:20345-1 | Security update for python-lxml_html_clean | 2026-03-11T18:05:18Z | 2026-03-11T18:05:18Z |
| opensuse-su-2026:10323-1 | traefik-3.6.10-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10322-1 | python311-lxml_html_clean-0.4.4-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10321-1 | python311-PyPDF2-2.11.1-6.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10320-1 | perl-Compress-Raw-Zlib-2.222-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10319-1 | helm3-3.20.0-2.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10318-1 | helm-4.1.1-3.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10317-1 | grype-0.109.1-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10316-1 | ghostty-1.3.0-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10315-1 | GraphicsMagick-1.3.46-2.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10311-1 | corepack24-24.13.0-4.1 on GA media | 2026-03-08T00:00:00Z | 2026-03-08T00:00:00Z |
| opensuse-su-2026:10310-1 | go1.25-1.25.8-1.1 on GA media | 2026-03-08T00:00:00Z | 2026-03-08T00:00:00Z |
| opensuse-su-2026:20332-1 | Security update for chromium | 2026-03-07T12:59:14Z | 2026-03-07T12:59:14Z |
| opensuse-su-2026:10309-1 | weblate-5.16.1-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10308-1 | virtiofsd-1.13.2-2.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10307-1 | tomcat11-11.0.18-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10306-1 | tomcat10-10.1.52-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10305-1 | tomcat-9.0.115-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10304-1 | python311-nltk-3.9.3-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10303-1 | libIex-3_4-33-3.4.6-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10302-1 | kubeshark-cli-53.1.0-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10301-1 | kernel-devel-longterm-6.18.16-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10300-1 | jetty-annotations-9.4.58-3.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10299-1 | go1.26-1.26.1-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10298-1 | exiv2-0.28.8-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10297-1 | coredns-1.14.2-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10296-1 | chromedriver-145.0.7632.159-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10295-1 | NetworkManager-applet-strongswan-1.6.4-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:20333-1 | Security update for python-PyPDF2 | 2026-03-06T21:01:39Z | 2026-03-06T21:01:39Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| oxdc-adv-2025-0001 | OX Dovecot Pro Security Advisory OXDC-ADV-2025-0001 | 2025-10-31T00:00:00+00:00 | 2025-11-27T00:00:00+00:00 |
| oxas-adv-2025-0003 | OX App Suite Security Advisory OXAS-ADV-2025-0003 | 2025-09-24T00:00:00+02:00 | 2025-11-27T00:00:00+00:00 |
| oxas-adv-2025-0002 | OX App Suite Security Advisory OXAS-ADV-2025-0002 | 2025-08-12T00:00:00+02:00 | 2025-10-31T00:00:00+00:00 |
| oxas-adv-2025-0001 | OX App Suite Security Advisory OXAS-ADV-2025-0001 | 2025-01-27T00:00:00+01:00 | 2025-04-07T00:00:00+00:00 |
| oxdc-adv-2024-0003 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0003 | 2024-09-10T00:00:00+02:00 | 2024-09-10T00:00:00+00:00 |
| oxdc-adv-2024-0002 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0002 | 2024-09-10T00:00:00+02:00 | 2024-09-10T00:00:00+00:00 |
| oxas-adv-2024-0005 | OX App Suite Security Advisory OXAS-ADV-2024-0005 | 2024-07-08T00:00:00+02:00 | 2024-09-09T00:00:00+00:00 |
| oxdc-adv-2024-0001 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0001 | 2024-09-02T00:00:00+02:00 | 2024-09-06T00:00:00+00:00 |
| oxas-adv-2024-0004 | OX App Suite Security Advisory OXAS-ADV-2024-0004 | 2024-06-13T00:00:00+02:00 | 2024-08-19T00:00:00+00:00 |
| oxas-adv-2024-0003 | OX App Suite Security Advisory OXAS-ADV-2024-0003 | 2024-04-24T00:00:00+02:00 | 2024-08-19T00:00:00+00:00 |
| oxas-adv-2024-0002 | OX App Suite Security Advisory OXAS-ADV-2024-0002 | 2024-03-06T00:00:00+01:00 | 2024-05-06T00:00:00+00:00 |
| oxas-adv-2024-0001 | OX App Suite Security Advisory OXAS-ADV-2024-0001 | 2024-02-08T00:00:00+01:00 | 2024-04-25T00:00:00+00:00 |
| oxas-adv-2023-0007 | OX App Suite Security Advisory OXAS-ADV-2023-0007 | 2023-12-11T00:00:00+01:00 | 2024-02-16T00:00:00+00:00 |
| oxas-adv-2023-0006 | OX App Suite Security Advisory OXAS-ADV-2023-0006 | 2023-09-25T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0005 | OX App Suite Security Advisory OXAS-ADV-2023-0005 | 2023-09-19T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0004 | OX App Suite Security Advisory OXAS-ADV-2023-0004 | 2023-08-01T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0003 | OX App Suite Security Advisory OXAS-ADV-2023-0003 | 2023-05-02T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0002 | OX App Suite Security Advisory OXAS-ADV-2023-0002 | 2023-03-20T00:00:00+01:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0001 | OX App Suite Security Advisory OXAS-ADV-2023-0001 | 2023-02-06T00:00:00+01:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2022-0002 | OX App Suite Security Advisory OXAS-ADV-2022-0002 | 2022-11-02T00:00:00+01:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2022-0001 | OX App Suite Security Advisory OXAS-ADV-2022-0001 | 2022-08-10T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:2572 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.14.2 security update | 2026-02-11T16:14:44+00:00 | 2026-03-13T09:07:44+00:00 |
| rhsa-2026:0737 | Red Hat Security Advisory: OpenShift Compliance Operator bug fix and enhancement update | 2026-01-15T23:39:47+00:00 | 2026-03-13T09:07:44+00:00 |
| rhsa-2026:0722 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.8.4 security update | 2026-01-15T17:23:06+00:00 | 2026-03-13T09:07:44+00:00 |
| rhsa-2026:0718 | Red Hat Security Advisory: Moderate: Red Hat Advanced Cluster Management for Kubernetes v2.13.5 security update | 2026-01-15T15:59:28+00:00 | 2026-03-13T09:07:43+00:00 |
| rhsa-2026:0627 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.13.5 security update | 2026-01-14T18:37:52+00:00 | 2026-03-13T09:07:42+00:00 |
| rhsa-2025:23542 | Red Hat Security Advisory: OpenShift File Integrity Operator bug fix and enhancement update | 2025-12-17T16:35:07+00:00 | 2026-03-13T09:07:42+00:00 |
| rhsa-2025:23529 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes 2.11.9 security update | 2025-12-17T14:58:47+00:00 | 2026-03-13T09:07:41+00:00 |
| rhsa-2025:23528 | Red Hat Security Advisory: multicluster engine for Kubernetes 2.6 security update | 2025-12-17T14:58:16+00:00 | 2026-03-13T09:07:41+00:00 |
| rhsa-2025:22684 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes 2.12.6 security update | 2025-12-03T23:53:32+00:00 | 2026-03-13T09:07:40+00:00 |
| rhsa-2025:22683 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.7.7 security update | 2025-12-03T22:50:31+00:00 | 2026-03-13T09:07:40+00:00 |
| rhsa-2025:22420 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.14 security, enhancement & bug fix update | 2025-12-01T12:14:05+00:00 | 2026-03-13T09:07:39+00:00 |
| rhsa-2025:22418 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.15 security, enhancement & bug fix update | 2025-12-01T12:10:52+00:00 | 2026-03-13T09:07:39+00:00 |
| rhsa-2025:22416 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16 security, enhancement & bug fix update | 2025-12-01T12:00:04+00:00 | 2026-03-13T09:07:38+00:00 |
| rhsa-2025:22415 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.17 security, enhancement & bug fix update | 2025-12-01T11:59:39+00:00 | 2026-03-13T09:07:37+00:00 |
| rhsa-2025:21885 | Red Hat Security Advisory: OpenShift Compliance Operator bug fix and enhancement update | 2025-11-20T19:56:52+00:00 | 2026-03-13T09:07:36+00:00 |
| rhsa-2025:21368 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.18 security, enhancement & bug fix update | 2025-11-13T17:36:32+00:00 | 2026-03-13T09:07:36+00:00 |
| rhsa-2025:19961 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes 2.12.6 security update | 2025-11-10T01:30:28+00:00 | 2026-03-13T09:07:35+00:00 |
| rhsa-2025:19958 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.7.7 security update | 2025-11-10T01:14:14+00:00 | 2026-03-13T09:07:34+00:00 |
| rhsa-2025:19335 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes 2.14.1 security update | 2025-10-30T12:58:23+00:00 | 2026-03-13T09:07:34+00:00 |
| rhsa-2025:19332 | Red Hat Security Advisory: multicluster engine for Kubernetes 2.9.1 security update | 2025-10-30T12:27:36+00:00 | 2026-03-13T09:07:32+00:00 |
| rhea-2026:0129 | Red Hat Enhancement Advisory: OpenShift Virtualization 4.17.39 Images | 2026-01-06T11:25:38+00:00 | 2026-03-13T09:07:29+00:00 |
| rhea-2025:23478 | Red Hat Enhancement Advisory: OpenShift Virtualization 4.18.25 Images | 2025-12-17T11:33:21+00:00 | 2026-03-13T09:07:29+00:00 |
| rhea-2025:23406 | Red Hat Enhancement Advisory: OpenShift Virtualization 4.20.3 Images | 2025-12-16T21:20:03+00:00 | 2026-03-13T09:07:29+00:00 |
| rhsa-2026:4500 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.2.9 | 2026-03-12T14:45:08+00:00 | 2026-03-13T08:44:21+00:00 |
| rhsa-2026:4498 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.4.3 | 2026-03-12T14:43:54+00:00 | 2026-03-13T08:44:20+00:00 |
| rhsa-2026:4467 | Red Hat Security Advisory: RHACS 4.9.4 security and bug fix update | 2026-03-12T11:53:58+00:00 | 2026-03-13T08:44:20+00:00 |
| rhsa-2026:4466 | Red Hat Security Advisory: RHACS 4.8.9 security and bug fix update | 2026-03-12T11:53:42+00:00 | 2026-03-13T08:44:20+00:00 |
| rhsa-2026:4276 | Red Hat Security Advisory: RHTAS 1.3.2 - Tech Preview Release Of the Model Validation Operator | 2026-03-11T09:11:34+00:00 | 2026-03-13T08:44:19+00:00 |
| rhsa-2026:4270 | Red Hat Security Advisory: OpenShift Source To Image 1.6.0 | 2026-03-11T07:52:06+00:00 | 2026-03-13T08:44:19+00:00 |
| rhsa-2026:4267 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-03-11T07:39:06+00:00 | 2026-03-13T08:44:19+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2026-069-03 | Deserialization of Untrusted Data vulnerability on EcoStruxure™ Foxboro DCS | 2026-03-10T07:00:00.000Z | 2026-03-13T07:00:00.000Z |
| sevd-2026-069-06 | Deserialization of Untrusted Data vulnerability on Multiple Products | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2026-069-05 | Use of Hard-coded Credentials vulnerability in EcoStruxure™ IT Data Center Expert | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2026-069-04 | Improper Control of Generation of Code ('Code Injection') vulnerability on EcoStruxure™ Automation Expert | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2026-069-02 | Improper Neutralization in Multiple Products | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2026-069-01 | Improper Resource Shutdown or Release vulnerability in Multiple Products | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2026-013-04 | Multiple Vulnerabilities on EcoStruxure Power Build Rapsody | 2026-01-13T08:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2026-013-01 | Multiple Third-Party Vulnerabilities on ProLeiT Plant iT/Brewmaxx | 2026-01-13T08:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2025-014-07 | FlexNet Publisher Vulnerability | 2025-01-14T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2026-041-02 | Multiple Vulnerabilities on EcoStruxure™ Building Operation Workstation and EcoStruxure™ Building Operation Webstation | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2026-041-01 | Improper Check for Unusual or Exceptional Conditions on Multiple Products | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2025-343-01 | EcoStruxure™ Foxboro DCS | 2025-12-09T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2025-189-03 | EcoStruxure™ Power Operation | 2025-07-08T04:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2025-042-02 | Improper Input Validation Vulnerability in Uni-Telway Driver | 2025-02-11T05:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2026-013-03 | Multiple Vulnerabilities on Zigbee Products | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2026-013-02 | Incorrect Default Permissions Vulnerability on EcoStruxure™ Process Expert | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2025-014-06 | RemoteConnect and SCADAPack™ x70 Utilities | 2025-01-14T00:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2024-317-03 | Modicon Controllers M340 / Momentum / MC80 | 2024-11-12T05:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2025-343-02 | EcoStruxure™ Foxboro DCS Advisor | 2025-12-09T08:00:00.000Z | 2025-12-09T08:00:00.000Z |
| sevd-2025-252-01 | Multiple Altivar Process Drives and Communication Modules | 2025-09-09T04:00:00.000Z | 2025-12-09T08:00:00.000Z |
| sevd-2023-192-04 | CODESYS Runtime Vulnerabilities | 2023-07-11T07:15:18.000Z | 2025-12-09T08:00:00.000Z |
| sevd-2021-159-04 | ISaGRAF Vulnerabilities in IEC 61131-3 Programming and Engineering Tools | 2021-06-08T04:36:25.000Z | 2025-11-15T00:00:00.000Z |
| sevd-2022-284-03 | ISaGRAF Workbench for SAGE RTU | 2022-10-10T22:13:16.000Z | 2025-11-14T06:30:00.000Z |
| sevd-2025-315-02 | EcoStruxure™ Machine SCADA Expert & Pro-face BLUE Open Studio | 2025-11-11T08:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-315-01 | PowerChute™ Serial Shutdown | 2025-11-11T08:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-224-02 | EcoStruxure™ Power Monitoring Expert Software & EcoStruxure™ Power Operation (EPO) and EcoStruxure™ Power SCADA Operation (PSO) | 2025-08-12T04:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-224-01 | Saitel DR & Saitel DP Remote Terminal Unit | 2025-08-12T04:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-287-01 | EcoStruxure™ OPC UA Server Expert and EcoStruxure™ Modicon Communication Server | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2025-133-01 | Modicon Controllers M241/M251/M258/LMC058 | 2025-05-13T04:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2024-345-03 | Modicon M241 / M251 / M258 / LMC058 | 2024-12-10T05:00:00.000Z | 2025-10-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2026-0006 | Vulnerabilities affecting SICK Lector85x and SICK Lector83x | 2026-03-06T14:00:00.000Z | 2026-03-06T14:00:00.000Z |
| sca-2026-0005 | Vulnerabilities affecting SICK LMS1000 and SICK MRS1000 | 2026-02-27T14:00:00.000Z | 2026-02-27T14:00:00.000Z |
| sca-2026-0004 | Eclipse Cyclone DDS Vulnerabilities have no impact on SICK picoScan150 & SICK picoScan120 products | 2026-02-13T14:00:00.000Z | 2026-02-13T14:00:00.000Z |
| sca-2026-0003 | Vulnerability affecting SICK nanoScan3 and microScan3 | 2026-01-26T14:00:00.000Z | 2026-01-26T14:00:00.000Z |
| sca-2026-0002 | Vulnerabilities affecting SICK Incoming Goods Suite | 2026-01-15T14:00:00.000Z | 2026-01-22T19:00:00.000Z |
| sca-2026-0001 | Vulnerabilities affecting SICK TDC-X401GL | 2026-01-15T14:00:00.000Z | 2026-01-15T14:00:00.000Z |
| sca-2025-0013 | Vulnerabilities affecting SICK TLOC100-100 | 2025-10-27T14:00:00.000Z | 2025-11-11T14:00:00.000Z |
| sca-2025-0014 | CodeMeter vulnerablity affects SICK CODE-LOC and SICK LIDAR-LOC | 2025-11-03T11:00:00.000Z | 2025-11-03T14:00:00.000Z |
| sca-2025-0012 | Sudo vulnerability affects SICK SID products | 2025-10-27T11:00:00.000Z | 2025-10-27T14:00:00.000Z |
| sca-2025-0011 | Vulnerabilities affecting Endress+Hauser SSG-E210GC | 2025-10-02T13:00:00.000Z | 2025-10-02T13:00:00.000Z |
| sca-2025-0010 | Multiple vulnerabilities in SICK Enterprise Analytics and SICK Logistic Analytics Products | 2025-10-02T13:00:00.000Z | 2025-10-02T13:00:00.000Z |
| sca-2025-0009 | Vulnerabilities affecting SICK TDC-E210GC | 2025-08-01T13:00:00.000Z | 2025-08-01T13:00:00.000Z |
| sca-2025-0008 | Multiple vulnerabilities in Endress+Hauser MEAC300-FNADE4 | 2025-07-03T13:00:00.000Z | 2025-07-03T13:00:00.000Z |
| sca-2025-0007 | Multiple vulnerabilities in SICK Field Analytics and SICK Media Server | 2025-06-12T13:00:00.000Z | 2025-06-12T13:00:00.000Z |
| sca-2025-0003 | FreeRTOS Vulnerabilities have no impact on SICK Products | 2025-02-28T00:00:00.000Z | 2025-05-20T11:00:00.000Z |
| sca-2025-0006 | Vulnerability affecting picoScan and multiScan | 2025-04-28T13:00:00.000Z | 2025-04-28T13:00:00.000Z |
| sca-2025-0005 | Vulnerabilities in SICK Flexi Compact | 2025-04-28T10:00:00.000Z | 2025-04-28T10:00:00.000Z |
| sca-2025-0004 | Critical vulnerabilities in SICK DL100-2xxxxxxx | 2025-03-14T11:00:00.000Z | 2025-03-14T11:00:00.000Z |
| sca-2025-0001 | Multiple vulnerabilities in SICK MEAC300 | 2025-02-14T14:00:00.000Z | 2025-02-21T14:00:00.000Z |
| sca-2025-0002 | Vulnerability in SICK Lector8xx and SICK InspectorP8xx | 2025-02-14T10:19:00.000Z | 2025-02-14T10:19:00.000Z |
| sca-2024-0007 | Vulnerability in SICK OLM | 2024-12-31T00:00:00.000Z | 2024-12-31T00:00:00.000Z |
| sca-2024-0006 | Critical vulnerabilities in SICK InspectorP61x, InspectorP62x and TiM3xx | 2024-12-06T00:00:00.000Z | 2024-12-06T00:00:00.000Z |
| sca-2024-0005 | Vulnerability in SICK Incoming Goods Suite | 2024-11-19T00:00:00.000Z | 2024-11-19T00:00:00.000Z |
| sca-2024-0004 | Third party vulnerabilities in SICK CDE-100 | 2024-11-07T12:00:00.000Z | 2024-11-07T12:00:00.000Z |
| sca-2024-0003 | Critical vulnerability in multiple SICK products | 2024-10-17T13:00:00.000Z | 2024-10-17T13:00:00.000Z |
| sca-2024-0002 | Vulnerability in SICK MSC800 | 2024-09-11T23:00:00.000Z | 2024-09-11T23:00:00.000Z |
| sca-2024-0001 | Vulnerability in SICK Logistics Analytics Products and SICK Field Analytics | 2024-01-29T00:00:00.000Z | 2024-01-29T00:00:00.000Z |
| sca-2023-0011 | Vulnerability in multiple SICK Flexi Soft Gateways | 2023-10-23T11:00:00.000Z | 2023-10-23T11:00:00.000Z |
| SCA-2023-0011 | Vulnerability in multiple SICK Flexi Soft Gateways | 2023-10-23T11:00:00.000Z | 2023-10-23T11:00:00.000Z |
| sca-2023-0010 | Vulnerabilities in SICK Application Processing Unit | 2023-10-09T11:00:00.000Z | 2023-10-09T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-975644 | SSA-975644: Multiple Vulnerabilities in Fortigate NGFW on RUGGEDCOM APE1808 Devices | 2026-03-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-903736 | SSA-903736: Multiple vulnerabilities in SICAM SIAPP SDK before V2.1.7 | 2026-03-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-868571 | SSA-868571: Missing Server Certificate Validation in IAM Client | 2025-12-09T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-770770 | SSA-770770: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.7 on RUGGEDCOM APE1808 Devices | 2025-02-11T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-710408 | SSA-710408: Missing Server Certificate Validation in Siemens Advanced Licensing (SALT) Toolkit | 2025-12-09T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-535115 | SSA-535115: Data Validation Vulnerability in NX Before V2512 | 2026-02-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-513708 | SSA-513708: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices | 2025-06-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-485750 | SSA-485750: Multiple Vulnerabilities in SIDIS Prime Before V4.0.800 | 2026-03-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-452276 | SSA-452276: Stored Cross-Site Scripting Vulnerability in SIMATIC S7-1500 | 2026-03-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-430425 | SSA-430425: Multiple Vulnerabilities in SINEC Security Monitor before V4.9.0 | 2024-10-08T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-282044 | SSA-282044: DLL Hijacking Vulnerability in Siemens Web Installer used by the Online Software Delivery | 2025-08-12T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-212953 | SSA-212953: Multiple Vulnerabilities in COMOS | 2025-12-09T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-201595 | SSA-201595: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager | 2025-08-14T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-126399 | SSA-126399: Improper Access Control Vulnerability in Heliox EV Chargers | 2026-03-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-082556 | SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 | 2025-06-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-027652 | SSA-027652: Privilege Escalation Vulnerability in SINAMICS Drives | 2025-09-09T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-613116 | SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1 | 2025-08-12T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-355557 | SSA-355557: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.2 | 2025-08-12T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-089022 | SSA-089022: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.3 | 2026-01-28T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-965753 | SSA-965753: Multiple File Parsing Vulnerabilities in Simcenter Femap and Nastran Before V2512 | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-864900 | SSA-864900: Multiple Vulnerabilities in Fortigate NGFW on RUGGEDCOM APE1808 Devices | 2025-05-13T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-783261 | SSA-783261: Denial of Service Vulnerability in Automation License Manager (ALM) Before V5.2 | 2012-12-12T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-674753 | SSA-674753: Denial-of-Service Vulnerability in ET 200 Devices | 2026-01-13T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-625934 | SSA-625934: Improper Access Control Vulnerability in the Webhooks Implementation of Siveillance Video Management Servers | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-599451 | SSA-599451: Multiple Vulnerabilities in SiPass integrated | 2025-10-14T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-507364 | SSA-507364: Heap Based Buffer Overflow Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-445819 | SSA-445819: Out of Bounds Read in PS/IGES Parasolid Translator Component in Solid Edge | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-311973 | SSA-311973: Multiple Local Privilege Escalation Vulnerabilities in SINEC NMS and User Management Component (UMC) | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-265688 | SSA-265688: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1 | 2024-04-09T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-216014 | SSA-216014: Vulnerabilities in EFI variable of SIMATIC IPCs, SIMATIC Tablet PCs, and SIMATIC Field PGs | 2025-03-11T00:00:00Z | 2026-02-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0886-1 | Security update for libsoup2 | 2026-03-12T14:50:32Z | 2026-03-12T14:50:32Z |
| suse-su-2026:0885-1 | Security update for curl | 2026-03-12T14:50:17Z | 2026-03-12T14:50:17Z |
| suse-su-2026:0884-1 | Security update for python36 | 2026-03-12T10:20:30Z | 2026-03-12T10:20:30Z |
| suse-su-2026:0883-1 | Security update for postgresql17 | 2026-03-12T10:20:03Z | 2026-03-12T10:20:03Z |
| suse-su-2026:0882-1 | Security update for postgresql16 | 2026-03-12T10:19:26Z | 2026-03-12T10:19:26Z |
| suse-su-2026:0881-1 | Security update for postgresql18 | 2026-03-12T10:18:52Z | 2026-03-12T10:18:52Z |
| suse-su-2026:0880-1 | Security update for MozillaThunderbird | 2026-03-12T10:18:33Z | 2026-03-12T10:18:33Z |
| suse-su-2026:0879-1 | Security update for curl | 2026-03-12T10:04:20Z | 2026-03-12T10:04:20Z |
| suse-su-2026:0862-1 | Security update for gnutls | 2026-03-11T10:00:03Z | 2026-03-11T10:00:03Z |
| suse-su-2026:0858-1 | Security update for python-aiohttp | 2026-03-10T12:38:39Z | 2026-03-10T12:38:39Z |
| suse-su-2026:0857-1 | Security update for util-linux | 2026-03-10T11:01:32Z | 2026-03-10T11:01:32Z |
| suse-su-2026:0856-1 | Security update for util-linux | 2026-03-10T08:35:29Z | 2026-03-10T08:35:29Z |
| suse-su-2026:0855-1 | Security update for c3p0 and mchange-commons | 2026-03-10T05:06:36Z | 2026-03-10T05:06:36Z |
| suse-su-2026:0848-1 | Security update for valkey | 2026-03-07T18:18:45Z | 2026-03-07T18:18:45Z |
| suse-su-2026:0847-1 | Security update for libsoup | 2026-03-07T01:34:36Z | 2026-03-07T01:34:36Z |
| suse-su-2026:0846-1 | Security update for python-Markdown | 2026-03-06T17:04:39Z | 2026-03-06T17:04:39Z |
| suse-su-2026:0831-1 | Security update for openvpn | 2026-03-05T15:18:06Z | 2026-03-05T15:18:06Z |
| suse-su-2026:0830-1 | Security update for ocaml | 2026-03-05T15:17:30Z | 2026-03-05T15:17:30Z |
| suse-su-2026:0829-1 | Security update for gnutls | 2026-03-05T15:17:09Z | 2026-03-05T15:17:09Z |
| suse-su-2026:0828-1 | Security update for python-Authlib | 2026-03-05T15:16:58Z | 2026-03-05T15:16:58Z |
| suse-su-2026:0827-1 | Security update for glibc-livepatches | 2026-03-05T15:16:49Z | 2026-03-05T15:16:49Z |
| suse-su-2026:0826-1 | Security update for expat | 2026-03-05T15:16:40Z | 2026-03-05T15:16:40Z |
| suse-su-2026:0825-1 | Security update for php-composer2 | 2026-03-05T15:16:16Z | 2026-03-05T15:16:16Z |
| suse-su-2026:0824-1 | Security update for openCryptoki | 2026-03-05T15:16:07Z | 2026-03-05T15:16:07Z |
| suse-su-2026:0821-1 | Security update for python-Django | 2026-03-05T11:43:12Z | 2026-03-05T11:43:12Z |
| suse-su-2026:0819-1 | Security update for virtiofsd | 2026-03-05T10:49:51Z | 2026-03-05T10:49:51Z |
| suse-su-2026:0817-1 | Security update for wireshark | 2026-03-05T09:51:15Z | 2026-03-05T09:51:15Z |
| suse-su-2026:0816-1 | Security update for virtiofsd | 2026-03-05T09:50:59Z | 2026-03-05T09:50:59Z |
| suse-su-2026:0814-1 | Security update for mozilla-nss | 2026-03-05T09:06:46Z | 2026-03-05T09:06:46Z |
| suse-su-2026:0813-1 | Security update for mozilla-nss | 2026-03-05T08:34:14Z | 2026-03-05T08:34:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:4174 | Important: opentelemetry-collector security update | 2026-03-10T00:00:00Z | 2026-03-11T17:46:34Z |
| alsa-2026:4235 | Moderate: nginx:1.26 security update | 2026-03-10T00:00:00Z | 2026-03-11T11:13:12Z |
| alsa-2026:3966 | Moderate: kernel security update | 2026-03-09T00:00:00Z | 2026-03-11T10:10:37Z |
| alsa-2026:3730 | Important: postgresql security update | 2026-03-04T00:00:00Z | 2026-03-11T10:01:08Z |
| alsa-2026:3752 | Important: osbuild-composer security update | 2026-03-04T00:00:00Z | 2026-03-11T09:57:01Z |
| alsa-2026:3898 | Important: osbuild-composer security update | 2026-03-05T00:00:00Z | 2026-03-11T09:54:32Z |
| alsa-2026:4024 | Important: postgresql:13 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:52:09Z |
| alsa-2026:4059 | Important: postgresql:15 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:49:31Z |
| alsa-2026:4063 | Important: postgresql:16 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:46:43Z |
| alsa-2026:4162 | Moderate: mysql8.4 security update | 2026-03-10T00:00:00Z | 2026-03-11T09:43:31Z |
| alsa-2026:3939 | Moderate: nfs-utils security update | 2026-03-05T00:00:00Z | 2026-03-11T09:35:33Z |
| alsa-2026:4164 | Important: git-lfs security update | 2026-03-10T00:00:00Z | 2026-03-11T09:33:00Z |
| alsa-2026:4064 | Important: postgresql:12 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:29:57Z |
| alsa-2026:3040 | Important: grafana-pcp security update | 2026-02-23T00:00:00Z | 2026-03-10T20:11:50Z |
| alsa-2026:4165 | Moderate: python3.12 security update | 2026-03-10T00:00:00Z | 2026-03-10T20:09:00Z |
| alsa-2026:4173 | Important: gimp security update | 2026-03-10T00:00:00Z | 2026-03-10T19:59:39Z |
| alsa-2026:4110 | Important: postgresql:16 security update | 2026-03-09T00:00:00Z | 2026-03-10T19:55:53Z |
| alsa-2026:3896 | Important: postgresql:15 security update | 2026-03-05T00:00:00Z | 2026-03-10T19:52:06Z |
| alsa-2026:3753 | Important: osbuild-composer security update | 2026-03-04T00:00:00Z | 2026-03-10T19:47:08Z |
| alsa-2026:4146 | Important: python-pyasn1 security update | 2026-03-10T00:00:00Z | 2026-03-10T08:51:50Z |
| alsa-2026:3964 | Moderate: kernel-rt security update | 2026-03-09T00:00:00Z | 2026-03-10T02:07:14Z |
| alsa-2026:3963 | Moderate: kernel security update | 2026-03-09T00:00:00Z | 2026-03-10T02:04:41Z |
| alsa-2026:3938 | Moderate: nfs-utils security update | 2026-03-05T00:00:00Z | 2026-03-10T01:58:47Z |
| alsa-2026:3967 | Important: libvpx security update | 2026-03-09T00:00:00Z | 2026-03-10T01:53:59Z |
| alsa-2026:3887 | Important: postgresql16 security update | 2026-03-05T00:00:00Z | 2026-03-06T13:21:51Z |
| alsa-2026:3864 | Important: delve security update | 2026-03-05T00:00:00Z | 2026-03-06T13:19:09Z |
| alsa-2026:3928 | Important: git-lfs security update | 2026-03-05T00:00:00Z | 2026-03-06T13:16:21Z |
| alsa-2026:3443 | Important: valkey security update | 2026-02-26T00:00:00Z | 2026-03-05T07:52:10Z |
| alsa-2026:3476 | Important: udisks2 security update | 2026-03-02T00:00:00Z | 2026-03-05T07:49:03Z |
| alsa-2026:3517 | Important: thunderbird security update | 2026-03-02T00:00:00Z | 2026-03-05T07:45:44Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| hsec-2024-0004 | Hackage package and doc upload stored XSS vulnerability | 2026-01-16T11:18:20Z | 2026-01-16T11:18:20Z |
| hsec-2025-0007 | cmark-gfm: resource exhaustion due to quadratic complexity in parser | 2025-12-27T08:58:56Z | 2025-12-27T08:58:56Z |
| hsec-2025-0006 | Private key leak via inherited file descriptor | 2025-11-17T02:22:38Z | 2025-11-17T02:22:38Z |
| hsec-2025-0005 | cabal-install dependency confusion | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2025-0004 | Broken Path Sanitization in spacecookie Library | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2025-0003 | Use after free in multithreaded lzma (.xz) decoder | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2025-0002 | Double Public Key Signing Function Oracle Attack on Ed25519 | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2025-0001 | Subword division operations may produce incorrect results | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0009 | Public key confusion in third-party blocks | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0008 | Sign extension error in the PPC64le FFI | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0007 | Sign extension error in the AArch64 NCG | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0006 | fromIntegral: conversion error | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0003 | process: command injection via argument list on Windows | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0002 | out-of-bounds write when there are many bzip2 selectors | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0001 | Reflected XSS vulnerability in keter | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0015 | cabal-install uses expired key policies | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0014 | Arbitrary file write is possible when using PDF output or --extract-media with untrusted input | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0013 | git-annex plaintext storage of embedded credentials on encrypted remotes | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0012 | git-annex checksum exposure to encrypted special remotes | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0011 | git-annex GPG decryption attack via compromised remote | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0010 | git-annex private data exfiltration to compromised remote | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0009 | git-annex command injection via malicious SSH hostname | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0008 | Stored XSS in hledger-web | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0007 | readFloat: memory exhaustion with large exponent | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0006 | x509-validation does not enforce pathLenConstraint | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0005 | tls-extra: certificate validation does not check Basic Constraints | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0004 | xml-conduit unbounded entity expansion | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0003 | code injection in xmonad-contrib | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0002 | Improper Verification of Cryptographic Signature | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0001 | Hash flooding vulnerability in aeson | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osec-2026-01 | Buffer Over-Read in OCaml Marshal Deserialization | 2026-02-17T13:30:00Z | 2026-02-27T09:30:00Z |
| osec-2026-02 | ARP unbounded memory usage | 2026-02-18T10:30:00Z | 2026-02-18T10:30:00Z |
| osec-2022-01 | Infinite loop in console output on xen | 2022-12-07T00:00:00Z | 2026-02-18T09:30:00Z |
| osec-2025-01 | Albatross console out of memory | 2025-08-15T00:18:22Z | 2026-01-13T12:00:00Z |
| osec-2019-02 | Grant unshare vulnerability in mirage-xen | 2019-04-26T00:00:00Z | 2026-01-13T12:00:00Z |
| osec-2019-01 | Memory disclosure in mirage-net-xen | 2019-03-21T00:00:00Z | 2026-01-13T12:00:00Z |
| osec-2016-02 | Memory disclosure in mirage-net-xen | 2016-05-03T00:00:00Z | 2026-01-13T12:00:00Z |
| osec-2023-01 | Time of check time of use issue in opam's cache | 2023-05-25T12:00:00Z | 2026-01-09T12:00:00Z |
| osec-2016-01 | Buffer overflow and information leak in OCaml < 4.03.0 | 2016-04-29T00:18:22Z | 2026-01-01T12:00:00Z |
| osec-2018-01 | An integer overflow in the `bigarray` serialization module leads to arbitrary code execution | 2018-04-06T18:29:00Z | 2025-12-16T12:00:00Z |
| osec-2017-01 | Local privilege escalation issue with ocaml binaries | 2017-06-23T15:19:47Z | 2025-12-16T12:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-679 | Heap-buffer-overflow in udiv | 2022-08-07T00:01:59.645310Z | 2026-03-12T14:11:18.872565Z |
| osv-2022-652 | Use-of-uninitialized-value in udiv | 2022-07-29T00:02:04.321859Z | 2026-03-12T14:10:54.010553Z |
| osv-2022-599 | Use-of-uninitialized-value in mrb_bint_as_int | 2022-07-20T00:00:11.865502Z | 2026-03-12T14:10:24.439358Z |
| osv-2024-914 | UNKNOWN READ in boost::re_detail_500::basic_regex_formatter<std::__1::ostream_iterator<char, cha | 2024-08-16T00:08:20.277708Z | 2026-03-11T14:30:35.738187Z |
| osv-2024-398 | Use-of-uninitialized-value in wabt::BinaryReaderObjdump::PrintInitExpr | 2024-05-01T00:11:38.602555Z | 2026-03-11T14:28:35.396657Z |
| osv-2024-112 | Stack-overflow in boost::read_graphviz_detail::parser::parse_subgraph | 2024-02-16T00:05:47.896843Z | 2026-03-11T14:26:22.626694Z |
| osv-2023-346 | UNKNOWN WRITE in void std::__1::allocator_traits<std::__1::allocator<wabt::interp::HandlerDesc> > | 2023-04-27T14:02:25.286668Z | 2026-03-11T14:24:45.211720Z |
| osv-2022-916 | Container-overflow in wabt::interp::BinaryReaderInterp::BeginFunctionBody | 2022-09-20T00:00:42.122902Z | 2026-03-11T14:23:47.282795Z |
| osv-2022-1263 | Null-dereference READ | 2022-12-20T13:01:53.219707Z | 2026-03-11T14:20:54.166339Z |
| osv-2026-371 | Heap-buffer-overflow in tinyobj::tryParseDouble | 2026-03-09T00:09:41.689616Z | 2026-03-09T00:09:41.689926Z |
| osv-2024-679 | Heap-buffer-overflow in readImage4v2 | 2024-07-25T00:14:34.485446Z | 2026-03-08T14:18:45.577624Z |
| osv-2023-800 | Heap-buffer-overflow in XCFImageFormat::loadTileRLE | 2023-09-07T14:00:27.693270Z | 2026-03-08T14:16:08.430525Z |
| osv-2023-55 | Index-out-of-bounds in LibRaw::apply_tiff | 2023-02-07T13:00:07.438565Z | 2026-03-08T14:15:24.123209Z |
| osv-2022-1018 | Index-out-of-bounds in LibRaw::kodak_radc_load_raw | 2022-10-06T00:02:27.511658Z | 2026-03-08T14:10:27.975536Z |
| osv-2021-972 | UNKNOWN READ in void mc_chroma<unsigned short> | 2021-07-13T00:00:16.631711Z | 2026-03-08T14:10:26.939094Z |
| osv-2021-948 | Use-of-uninitialized-value in residual_coding | 2021-07-10T00:01:12.890029Z | 2026-03-08T14:10:20.407968Z |
| osv-2021-735 | Use-of-uninitialized-value in decode_CABAC_FL_bypass | 2021-05-08T00:00:14.355747Z | 2026-03-08T14:10:17.768174Z |
| osv-2021-586 | Use-of-uninitialized-value in void intra_prediction_angular<unsigned short> | 2021-03-31T00:01:03.787831Z | 2026-03-08T14:10:13.373645Z |
| osv-2021-525 | Use-of-uninitialized-value in void edge_filtering_chroma_internal<unsigned char> | 2021-03-16T00:00:19.176877Z | 2026-03-08T14:10:12.077710Z |
| osv-2020-876 | Use-of-uninitialized-value in XCFImageFormat::mergeRGBToRGB | 2020-07-14T22:13:55.541274Z | 2026-03-08T14:09:40.994434Z |
| osv-2020-868 | Use-of-uninitialized-value in fetchARGB32ToRGBA64PM_avx2 | 2020-07-14T22:13:50.828646Z | 2026-03-08T14:09:39.894800Z |
| osv-2024-838 | Bad-cast to RDKit::AtomRDKit::ROMol::initFromOther | 2024-08-16T00:03:32.029853Z | 2026-03-07T14:34:10.603763Z |
| osv-2025-62 | UNKNOWN READ in RDKit::Dict::reset | 2025-01-27T00:01:51.692636Z | 2026-03-06T14:31:24.229549Z |
| osv-2023-133 | Heap-buffer-overflow in H5L__extern_traverse | 2023-03-02T13:02:08.499899Z | 2026-03-05T15:50:03.549911Z |
| osv-2023-359 | Heap-buffer-overflow in H5MM_memcpy | 2023-05-01T14:02:33.841821Z | 2026-03-05T15:30:27.737619Z |
| osv-2023-76 | Heap-buffer-overflow in H5SM_delete | 2023-02-18T13:00:50.471845Z | 2026-03-05T15:16:28.198333Z |
| osv-2023-89 | Heap-buffer-overflow in H5O__mtime_new_encode | 2023-02-21T13:00:30.347876Z | 2026-03-05T14:51:38.032364Z |
| osv-2023-430 | Heap-buffer-overflow in H5MM_xstrdup | 2023-05-26T14:00:26.078002Z | 2026-03-05T14:50:31.048848Z |
| osv-2023-392 | Negative-size-param in H5MM_memcpy | 2023-05-13T14:00:26.093088Z | 2026-03-05T14:50:14.844074Z |
| osv-2023-370 | Heap-buffer-overflow in H5FS__sect_link | 2023-05-06T14:01:04.165113Z | 2026-03-05T14:50:11.421136Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2023-0083 | blurhash: panic on parsing crafted blurhash inputs | 2023-09-19T12:00:00Z | 2026-03-11T10:51:38Z |
| rustsec-2023-0082 | phonenumber: panic on parsing crafted RF3966 phonenumber inputs | 2023-09-19T12:00:00Z | 2026-03-11T10:37:17Z |
| rustsec-2026-0038 | RustSec Advisory | 2026-03-08T12:00:00Z | 2026-03-11T06:21:51Z |
| rustsec-2026-0039 | `chrono_anchor` was removed from crates.io due to malicious code | 2026-03-10T12:00:00Z | 2026-03-10T20:34:44Z |
| rustsec-2026-0037 | Denial of service in Quinn endpoints | 2026-03-09T12:00:00Z | 2026-03-09T23:32:50Z |
| rustsec-2026-0035 | Cache poisoning via insecure-by-default cache key | 2026-03-04T12:00:00Z | 2026-03-09T20:53:55Z |
| rustsec-2026-0034 | HTTP Request Smuggling via HTTP/1.0 and Transfer-Encoding Misparsing | 2026-03-04T12:00:00Z | 2026-03-09T20:53:55Z |
| rustsec-2026-0033 | HTTP Request Smuggling via Premature Upgrade | 2026-03-04T12:00:00Z | 2026-03-09T20:53:55Z |
| rustsec-2026-0036 | `time-sync` was removed from crates.io due to malicious code | 2026-03-04T12:00:00Z | 2026-03-06T06:03:13Z |
| rustsec-2026-0032 | `dnp3times` was removed from crates.io due to malicious code | 2026-03-04T12:00:00Z | 2026-03-05T05:53:11Z |
| rustsec-2026-0031 | `time_calibrators` was removed from crates.io due to malicious code | 2026-03-03T12:00:00Z | 2026-03-05T05:53:11Z |
| rustsec-2026-0030 | `time_calibrator` was removed from crates.io due to malicious code | 2026-03-03T12:00:00Z | 2026-03-05T05:53:11Z |
| rustsec-2026-0019 | `tracing-check` was removed from crates.io for malicious code | 2026-02-24T12:00:00Z | 2026-03-05T05:53:11Z |
| rustsec-2025-0140 | Non-utf8 String can be created with `TimeBuf::as_str` | 2025-12-29T12:00:00Z | 2026-03-04T07:42:48Z |
| rustsec-2026-0029 | Double-free and use-after-free for Hive | 2026-02-26T12:00:00Z | 2026-03-01T06:01:36Z |
| rustsec-2026-0028 | `tracing_checks` was removed from crates.io for transitively including malicious code | 2026-02-26T12:00:00Z | 2026-02-26T21:11:05Z |
| rustsec-2026-0027 | `tracings` was removed from crates.io for malicious code | 2026-02-26T12:00:00Z | 2026-02-26T21:11:05Z |
| rustsec-2025-0153 | hexchat crate is unsound and unmaintained | 2025-11-17T12:00:00Z | 2026-02-26T06:11:28Z |
| rustsec-2026-0026 | Unnecessary clamping of seed reduces seed entropy to 251 bits | 2026-02-05T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0025 | Panic in `libcrux-psq` on decryption of malformed AES-GCM ciphertext | 2026-02-08T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0024 | Incorrect X25519 clamping check rejects all secrets on import | 2026-01-26T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0023 | X25519 secret validation did not check buffer length or clamping | 2026-01-26T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0022 | Panic when dropping a `[Typed]Func::call_async` future | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0021 | Panic adding excessive fields to a `wasi:http/types.fields` instance | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0020 | Guest-controlled resource exhaustion in WASI implementations | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0018 | `rpc-check` was removed from crates.io for malicious code | 2026-02-24T12:00:00Z | 2026-02-24T16:32:13Z |
| rustsec-2026-0013 | Type confusion when accessing data from sublasses of subclasses of native types with `abi3` feature targeting Python 3.12 and up | 2026-02-18T12:00:00Z | 2026-02-23T07:15:28Z |
| rustsec-2026-0010 | `polymarket-clients-sdk` was removed from crates.io for malicious code | 2026-02-06T12:00:00Z | 2026-02-23T07:15:28Z |
| rustsec-2025-0148 | `finch-rust` was removed from crates.io for malicious code | 2025-12-05T12:00:00Z | 2026-02-23T07:15:28Z |
| rustsec-2025-0147 | `evm-units` was removed from crates.io for malicious code | 2025-12-03T12:00:00Z | 2026-02-23T07:15:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-wordpress-2026-3906 | WordPress 6.9 - 6.9.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Note Creation via REST API | 2026-03-13T09:17:59.157Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-3848 | Improper Neutralization of CRLF Sequences ('CRLF Injection') in GitLab | 2026-03-13T09:35:49.642Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-1732 | Improper Removal of Sensitive Information Before Storage or Transfer in GitLab | 2026-03-13T09:35:40.993Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-1663 | Missing Authorization in GitLab | 2026-03-13T09:35:36.922Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-1230 | Use of Incorrectly-Resolved Name or Reference in GitLab | 2026-03-13T09:35:23.537Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-1090 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-03-13T09:35:17.166Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-1069 | Uncontrolled Recursion in GitLab | 2026-03-13T09:35:15.010Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-0602 | Authentication Bypass Using an Alternate Path or Channel in GitLab | 2026-03-13T09:35:05.636Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-14513 | Improper Validation of Specified Quantity in Input in GitLab | 2026-03-13T09:31:32.729Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-13929 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-13T09:31:23.093Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-13690 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-13T09:31:10.589Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-12704 | Missing Authorization in GitLab | 2026-03-13T09:30:55.187Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-12697 | Improper Encoding or Escaping of Output in GitLab | 2026-03-13T09:30:53.383Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-12576 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-13T09:30:49.795Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-12555 | Incorrect Authorization in GitLab | 2026-03-13T09:30:40.688Z | 2026-03-13T09:37:20.375Z |
| bit-consul-2026-2808 | Consul vulnerable to arbitrary file reads through the vault kubernetes authentication provider | 2026-03-13T09:02:37.072Z | 2026-03-13T09:37:20.375Z |
| bit-parse-2026-31828 | Parse Server has an LDAP injection via unsanitized user input in DN and group filter construction | 2026-03-12T14:48:18.251Z | 2026-03-12T15:11:51.041Z |
| bit-parse-2026-31800 | Parse Server: Classes `_GraphQLConfig` and `_Audience` master key bypass via generic class routes | 2026-03-12T14:48:16.613Z | 2026-03-12T15:11:51.041Z |
| bit-parse-2026-30972 | Parse Server has a rate limit bypass via batch request endpoint | 2026-03-12T14:48:14.900Z | 2026-03-12T15:11:51.041Z |
| bit-parse-2026-30967 | Parse Server OAuth2 authentication adapter account takeover via identity spoofing | 2026-03-12T14:48:13.390Z | 2026-03-12T15:11:51.041Z |
| bit-parse-2026-30966 | Parse Server role escalation and CLP bypass via direct `_Join` table write | 2026-03-12T14:48:11.522Z | 2026-03-12T15:11:51.041Z |
| bit-parse-2026-30965 | Parse Server session token exfiltration via `redirectClassNameForKey` query parameter | 2026-03-12T14:48:09.696Z | 2026-03-12T15:11:51.041Z |
| bit-parse-2026-30962 | Parse Server has a protected fields bypass via logical query operators | 2026-03-12T14:48:07.977Z | 2026-03-12T15:11:51.041Z |
| bit-parse-2026-30949 | Parse Server is missing audience validation in Keycloak authentication adapter | 2026-03-12T14:48:06.075Z | 2026-03-12T15:11:51.041Z |
| bit-parse-2026-30948 | Parse Server has stored cross-site scripting (XSS) via SVG file upload | 2026-03-12T14:48:04.274Z | 2026-03-12T15:11:51.041Z |
| bit-parse-2026-30947 | Parse Server ha a bypass of class-level permissions in LiveQuery | 2026-03-12T14:48:02.496Z | 2026-03-12T15:11:51.041Z |
| bit-parse-2026-30946 | Parse Server affected by denial-of-service via unbounded query complexity in REST and GraphQL API | 2026-03-12T14:48:00.783Z | 2026-03-12T15:11:51.041Z |
| bit-parse-2026-30941 | Parse Server has a NoSQL injection via token type in password reset and email verification endpoints | 2026-03-12T14:47:58.977Z | 2026-03-12T15:11:51.041Z |
| bit-parse-2026-30939 | Parse Server has Denial of Service (DoS) and Cloud Function Dispatch Bypass via Prototype Chain Resolution | 2026-03-12T14:47:57.281Z | 2026-03-12T15:11:51.041Z |
| bit-parse-2026-30938 | Parse Server has denylist `requestKeywordDenylist` keyword scan bypass through nested object placement | 2026-03-12T14:47:55.401Z | 2026-03-12T15:11:51.041Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-zv38826 | Within HostnameError | 2026-03-10T01:00:05.764793Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-qy24299 | @octokit/endpoint turns REST API endpoints into generic request options | 2026-03-07T00:39:47.646997Z | 2026-03-06T13:08:41Z |
| cleanstart-2026-pp62083 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-03-07T00:39:46.558367Z | 2026-03-06T13:08:41Z |
| cleanstart-2026-gi57625 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-03-07T00:39:46.578400Z | 2026-03-06T13:08:41Z |
| cleanstart-2026-yp32652 | Redis is an open source, in-memory database that persists on disk | 2026-03-04T00:42:01.150900Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-xj84245 | Rack is a modular Ruby web server interface | 2026-03-04T00:43:02.364521Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-wy43835 | PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access | 2026-03-04T00:41:31.079681Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-vc01496 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 0.8.4-r0 | 2026-03-04T00:39:30.734261Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-sm37781 | Due to missing nil check, sending 0x0a-0x0f HTTP/2 frames will cause a running server to panic | 2026-03-04T00:45:05.719125Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-na21773 | GNU patch through 2 | 2026-03-04T00:42:01.122309Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-ew93264 | Security fixes for GHSA-4cx2-fc23-5wg6, GHSA-6xw4-3v39-52mm, GHSA-72qj-48g4-5xgx, GHSA-mr3q-g2mv-mr4q, GHSA-p543-xpfm-54cp, GHSA-vc5p-v9hr-52mj, GHSA-vqg5-3255-v292 applied in versions: 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-03-04T00:39:32.590174Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-cq83284 | Redis is an open source, in-memory database that persists on disk | 2026-03-04T00:43:01.818359Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-bz70876 | Redis is an open source, in-memory database that persists on disk | 2026-03-04T00:42:00.996564Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-ay29369 | Redis is an open source, in-memory database that persists on disk | 2026-03-04T00:43:31.868035Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-mw73882 | filippo | 2026-03-03T00:39:03.237072Z | 2026-03-02T17:13:50Z |
| cleanstart-2026-by85815 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-03-03T00:39:03.275022Z | 2026-03-02T17:13:50Z |
| cleanstart-2026-zn32454 | When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers | 2026-02-27T00:50:08.716833Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-zg64300 | Within HostnameError | 2026-02-27T01:05:11.090007Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-yw12690 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-27T01:01:12.144914Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-xz04425 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-27T00:43:38.553069Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-wp10148 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-27T00:57:40.231450Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-qc30410 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-27T01:01:12.325618Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-ny12442 | node-tar is a full-featured Tar for Node | 2026-02-27T00:41:38.733387Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-ls98939 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-27T01:04:10.463954Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-jy06700 | vulnerability has been identified in Node | 2026-02-27T01:09:46.914639Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-id51598 | Cancelling a query (e | 2026-02-27T01:01:11.850782Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-hf45264 | filippo | 2026-02-27T01:03:40.135210Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-ff98917 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-27T00:51:38.790691Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-er93728 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-27T00:46:38.846728Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-dz05206 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-27T01:00:40.158214Z | 2026-02-26T12:09:56Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2026-029 | 2026-03-11T16:35:02.000Z | 2026-03-11T16:35:02.000Z | |
| drupal-contrib-2026-028 | 2026-03-11T16:33:14.000Z | 2026-03-11T16:33:14.000Z | |
| drupal-contrib-2026-024 | 2026-03-04T17:59:51.000Z | 2026-03-05T14:03:05.000Z | |
| drupal-contrib-2026-027 | 2026-03-04T18:02:59.000Z | 2026-03-04T18:02:59.000Z | |
| drupal-contrib-2026-026 | 2026-03-04T18:02:14.000Z | 2026-03-04T18:02:14.000Z | |
| drupal-contrib-2026-025 | 2026-03-04T18:00:41.000Z | 2026-03-04T18:00:41.000Z | |
| drupal-contrib-2026-023 | 2026-03-04T17:58:55.000Z | 2026-03-04T17:58:55.000Z | |
| drupal-contrib-2026-022 | 2026-03-04T17:57:58.000Z | 2026-03-04T17:57:58.000Z | |
| drupal-contrib-2026-021 | 2026-03-04T17:56:18.000Z | 2026-03-04T17:56:18.000Z | |
| drupal-contrib-2026-020 | 2026-03-04T17:54:27.000Z | 2026-03-04T17:54:27.000Z | |
| drupal-contrib-2026-016 | 2026-02-25T18:49:59.000Z | 2026-02-25T19:30:03.000Z | |
| drupal-contrib-2026-015 | 2026-02-25T18:47:57.000Z | 2026-02-25T19:07:00.000Z | |
| drupal-contrib-2026-019 | 2026-02-25T18:51:43.000Z | 2026-02-25T18:51:43.000Z | |
| drupal-contrib-2026-018 | 2026-02-25T18:51:26.000Z | 2026-02-25T18:51:26.000Z | |
| drupal-contrib-2026-017 | 2026-02-25T18:51:01.000Z | 2026-02-25T18:51:01.000Z | |
| drupal-contrib-2026-014 | 2026-02-25T18:46:10.000Z | 2026-02-25T18:46:10.000Z | |
| drupal-contrib-2026-013 | 2026-02-25T18:45:13.000Z | 2026-02-25T18:45:13.000Z | |
| drupal-contrib-2026-012 | 2026-02-25T18:44:38.000Z | 2026-02-25T18:44:38.000Z | |
| drupal-contrib-2026-011 | 2026-02-25T18:43:32.000Z | 2026-02-25T18:43:32.000Z | |
| drupal-contrib-2026-010 | 2026-02-11T16:54:18.000Z | 2026-02-25T17:17:46.000Z | |
| drupal-contrib-2026-009 | 2026-02-11T16:53:32.000Z | 2026-02-12T15:37:20.000Z | |
| drupal-contrib-2026-008 | 2026-02-04T17:23:40.000Z | 2026-02-04T17:23:40.000Z |
| ID | Description | Updated |
|---|---|---|
| ts-2026-001 | TS-2026-001 | 2026-01-15T00:00 |
| ts-2025-008 | TS-2025-008 | 2025-11-19T00:00 |
| ts-2025-007 | TS-2025-007 | 2025-11-07T00:00 |
| ts-2025-006 | TS-2025-006 | 2025-10-28T00:00 |
| ts-2025-005 | TS-2025-005 | 2025-08-07T00:00 |
| ts-2025-004 | TS-2025-004 | 2025-05-27T00:00 |
| ts-2025-003 | TS-2025-003 | 2025-05-21T00:00 |
| ts-2025-002 | TS-2025-002 | 2025-05-15T00:00 |
| ts-2025-001 | TS-2025-001 | 2025-03-07T00:00 |
| ts-2024-013 | TS-2024-013 | 2024-12-04T00:00 |
| ts-2024-012 | TS-2024-012 | 2024-10-02T00:00 |
| ts-2024-011 | TS-2024-011 | 2024-07-22T00:00 |
| ts-2024-010 | TS-2024-010 | 2024-07-19T00:00 |
| ts-2024-009 | TS-2024-009 | 2024-06-27T00:00 |
| ts-2024-008 | TS-2024-008 | 2024-06-14T00:00 |
| ts-2024-007 | TS-2024-007 | 2024-06-12T00:00 |
| ts-2024-006 | TS-2024-006 | 2024-05-22T00:00 |
| ts-2024-005 | TS-2024-005 | 2024-05-08T00:00 |
| ts-2024-004 | TS-2024-004 | 2024-05-06T00:00 |
| ts-2024-003 | TS-2024-003 | 2024-04-23T00:00 |
| ts-2024-002 | TS-2024-002 | 2024-01-30T00:00 |
| ts-2024-001 | TS-2024-001 | 2024-01-08T00:00 |
| ts-2023-009 | TS-2023-009 | 2023-12-22T00:00 |
| ts-2023-008 | TS-2023-008 | 2023-11-01T00:00 |
| ts-2023-007 | TS-2023-007 | 2023-10-26T00:00 |
| ts-2023-006 | TS-2023-006 | 2023-08-22T00:00 |
| ts-2023-005 | TS-2023-005 | 2023-04-28T00:00 |
| ts-2023-004 | TS-2023-004 | 2023-04-04T00:00 |
| ts-2023-003 | TS-2023-003 | 2023-03-22T00:00 |
| ts-2023-002 | TS-2023-002 | 2023-01-24T00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-ale-002 | [MàJ] Vulnérabilité dans Cisco Catalyst SD-WAN | 2026-02-25T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2025-ale-014 | [MàJ] Vulnérabilité dans React Server Components | 2025-12-05T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2025-ALE-014 | [MàJ] Vulnérabilité dans React Server Components | 2025-12-05T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-ale-001 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2026-01-30T00:00:00.000000 | 2026-02-03T00:00:00.000000 |
| CERTFR-2026-ALE-001 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2026-01-30T00:00:00.000000 | 2026-02-03T00:00:00.000000 |
| certfr-2025-ale-013 | [MàJ] Multiples vulnérabilités dans Cisco ASA et FTD | 2025-09-25T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| CERTFR-2025-ALE-013 | [MàJ] Multiples vulnérabilités dans Cisco ASA et FTD | 2025-09-25T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-ale-012 | Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2025-08-26T00:00:00.000000 | 2025-09-26T00:00:00.000000 |
| CERTFR-2025-ALE-012 | Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2025-08-26T00:00:00.000000 | 2025-09-26T00:00:00.000000 |
| certfr-2025-ale-010 | [MàJ] Multiples vulnérabilités dans Microsoft SharePoint | 2025-07-21T00:00:00.000000 | 2025-08-26T00:00:00.000000 |
| CERTFR-2025-ALE-010 | [MàJ] Multiples vulnérabilités dans Microsoft SharePoint | 2025-07-21T00:00:00.000000 | 2025-08-26T00:00:00.000000 |
| certfr-2025-ale-011 | Incidents de sécurité dans les pare-feux SonicWall | 2025-08-05T00:00:00.000000 | 2025-08-18T00:00:00.000000 |
| certfr-2025-ale-009 | Multiples vulnérabilités dans Citrix NetScaler ADC et NetScaler Gateway | 2025-07-01T00:00:00.000000 | 2025-07-17T00:00:00.000000 |
| CERTFR-2025-ALE-011 | Incidents de sécurité dans les pare-feux SonicWall | 2025-08-05T00:00:00.000000 | 2025-08-18T00:00:00.000000 |
| CERTFR-2025-ALE-009 | Multiples vulnérabilités dans Citrix NetScaler ADC et NetScaler Gateway | 2025-07-01T00:00:00.000000 | 2025-07-17T00:00:00.000000 |
| certfr-2025-ale-004 | Activités de post-exploitation dans Fortinet FortiGate | 2025-04-11T00:00:00.000000 | 2025-08-07T00:00:00.000000 |
| CERTFR-2025-ALE-004 | Activités de post-exploitation dans Fortinet FortiGate | 2025-04-11T00:00:00.000000 | 2025-08-07T00:00:00.000000 |
| certfr-2025-ale-008 | [MàJ] Vulnérabilité dans Roundcube | 2025-06-05T00:00:00.000000 | 2025-07-21T00:00:00.000000 |
| CERTFR-2025-ALE-008 | [MàJ] Vulnérabilité dans Roundcube | 2025-06-05T00:00:00.000000 | 2025-07-21T00:00:00.000000 |
| certfr-2025-ale-007 | Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile (EPMM) | 2025-05-14T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-006 | Vulnérabilité dans les produits Fortinet | 2025-05-13T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-005 | Vulnérabilité dans SAP NetWeaver | 2025-04-28T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-003 | [MàJ] Vulnérabilité dans les produits Ivanti | 2025-04-04T00:00:00.000000 | 2025-04-11T00:00:00.000000 |
| CERTFR-2025-ALE-007 | Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile (EPMM) | 2025-05-14T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| CERTFR-2025-ALE-006 | Vulnérabilité dans les produits Fortinet | 2025-05-13T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| CERTFR-2025-ALE-005 | Vulnérabilité dans SAP NetWeaver | 2025-04-28T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| CERTFR-2025-ALE-003 | [MàJ] Vulnérabilité dans les produits Ivanti | 2025-04-04T00:00:00.000000 | 2025-04-11T00:00:00.000000 |
| certfr-2025-ale-002 | [MàJ] Vulnérabilité dans les produits Fortinet | 2025-05-07T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| certfr-2025-ale-001 | [MàJ] Vulnérabilité dans les produits Ivanti | 2025-01-09T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| CERTFR-2025-ALE-002 | [MàJ] Vulnérabilité dans les produits Fortinet | 2025-05-07T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0284 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0283 | Vulnérabilité dans Microsoft Edge | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0282 | Multiples vulnérabilités dans Veeam Backup & Replication | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0281 | Multiples vulnérabilités dans les produits Splunk | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0280 | Multiples vulnérabilités dans les produits Apple | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0279 | Multiples vulnérabilités dans Cisco IOS XR | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0278 | Multiples vulnérabilités dans Google Chrome | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0277 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0276 | Multiples vulnérabilités dans GitLab | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0275 | Vulnérabilité dans GLPI | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0274 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0273 | Multiples vulnérabilités dans Microsoft Azure | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0272 | Multiples vulnérabilités dans Microsoft .Net | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0271 | Multiples vulnérabilités dans Microsoft Windows | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0270 | Multiples vulnérabilités dans Microsoft Office | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0269 | Multiples vulnérabilités dans Curl | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0268 | Multiples vulnérabilités dans Traefik | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0267 | Multiples vulnérabilités dans Mozilla Firefox | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0266 | Multiples vulnérabilités dans VMware Tanzu | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0265 | Multiples vulnérabilités dans les produits Fortinet | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0264 | Multiples vulnérabilités dans les produits Adobe | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0263 | Vulnérabilité dans Ivanti Desktop and Server Management (DSM) | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0262 | Multiples vulnérabilités dans HPE Aruba Networking AOS-CX | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0261 | Multiples vulnérabilités dans les produits Intel | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0260 | Multiples vulnérabilités dans WordPress | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0259 | Multiples vulnérabilités dans Stormshield Network Security | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0258 | Vulnérabilité dans Microsoft CBL-Mariner | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0257 | Vulnérabilité dans Mozilla Focus | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0256 | Multiples vulnérabilités dans les produits SAP | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0255 | Multiples vulnérabilités dans les produits Siemens | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-006887 | Multiple vulnerabilities in Micro Research MR-GM5L-S1 and MR-GM5A-L1 | 2026-03-12T17:22+09:00 | 2026-03-12T17:22+09:00 |
| jvndb-2026-000036 | Improper file access permission settings in multiple Digital Arts products | 2026-03-09T14:57+09:00 | 2026-03-09T16:23+09:00 |
| jvndb-2026-000035 | Installer for Qsee Client may insecurely load Dynamic Link Libraries | 2026-03-09T14:57+09:00 | 2026-03-09T14:57+09:00 |
| jvndb-2026-006102 | Security issues in ESC/POS | 2026-03-06T10:31+09:00 | 2026-03-06T10:31+09:00 |
| jvndb-2026-000034 | django-allauth vulnerable to open redirect | 2026-03-05T12:36+09:00 | 2026-03-05T12:36+09:00 |
| jvndb-2026-000033 | EC-CUBE vulnerable to multi-factor authentication bypass | 2026-03-05T12:36+09:00 | 2026-03-05T12:36+09:00 |
| jvndb-2026-000032 | Multiple vulnerabilities in Dell UPS Multi-UPS Management Console (MUMC) | 2026-03-04T12:20+09:00 | 2026-03-04T12:20+09:00 |
| jvndb-2026-005746 | Multiple vulnerabilities in Trend Micro Endpoint security products for enterprises (February 2026) | 2026-03-04T10:40+09:00 | 2026-03-04T10:40+09:00 |
| jvndb-2026-005744 | Canon IJ Scan Utility registers Windows services with unquoted file paths | 2026-03-04T10:40+09:00 | 2026-03-04T10:40+09:00 |
| jvndb-2026-000030 | IM-LogicDesigner module of intra-mart Accel Platform vulnerable to untrusted data deserialization | 2026-02-27T15:41+09:00 | 2026-03-03T10:06+09:00 |
| jvndb-2026-005259 | Out-of-bounds write vulnerability in Fujitsu BIOS Driver (fbiosdrv.sys) | 2026-03-02T11:46+09:00 | 2026-03-02T11:46+09:00 |
| jvndb-2026-000031 | Improper file access permission settings in the installers for multiple Soliton Systems products | 2026-02-27T15:41+09:00 | 2026-02-27T15:41+09:00 |
| jvndb-2026-000029 | Multiple vulnerabilities in the installer of FinalCode Client | 2026-02-26T14:24+09:00 | 2026-02-26T14:24+09:00 |
| jvndb-2026-004811 | Vulnerability in Hitachi Configuration Manager and Hitachi Ops Center API Configuration Manager | 2026-02-26T11:02+09:00 | 2026-02-26T11:02+09:00 |
| jvndb-2026-004810 | Vulnerability in Hitachi Configuration Manager and Hitachi Ops Center API Configuration Manager | 2026-02-26T11:02+09:00 | 2026-02-26T11:02+09:00 |
| jvndb-2026-000026 | Lanscope Endpoint Manager (On-Premises) vulnerable to path traversal | 2026-02-25T15:14+09:00 | 2026-02-25T15:14+09:00 |
| jvndb-2026-004359 | Security information for Hitachi Disk Array Systems | 2026-02-20T18:35+09:00 | 2026-02-20T18:35+09:00 |
| jvndb-2026-000027 | WordPress Plugin "Survey Maker" vulnerable to cross-site scripting | 2026-02-20T12:32+09:00 | 2026-02-20T12:32+09:00 |
| jvndb-2026-000028 | Installer for Job log aggregation/analysis software RICOH Job Log Aggregation Tool may insecurely load Dynamic Link Libraries | 2026-02-20T12:31+09:00 | 2026-02-20T12:31+09:00 |
| jvndb-2026-003912 | Vulnerability in Cosminexus HTTP Server and Hitachi Web Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003911 | Vulnerability in Cosminexus HTTP Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003910 | Multiple Vulnerabilities in Cosminexus HTTP Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003909 | Multiple Vulnerabilities in Hitachi Command Suite products | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003908 | Multiple Vulnerabilities in Hitachi Command Suite, Hitachi Automation Director, Hitachi Configuration Manager, Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003907 | Multiple Vulnerabilities in JP1 | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003906 | Multiple Vulnerabilities in Cosminexus | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003905 | Multiple Vulnerabilities in Cosminexus HTTP Server and Hitachi Web Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-000025 | Joomla! CMS vulnerable to cross-site scripting | 2026-02-17T12:46+09:00 | 2026-02-17T12:46+09:00 |
| jvndb-2026-000023 | FileZen vulnerable to OS command injection | 2026-02-13T16:51+09:00 | 2026-02-13T17:08+09:00 |
| jvndb-2026-000024 | Installer of M-Audio M-Track Duo HD may insecurely load Dynamic Link Libraries | 2026-02-12T13:32+09:00 | 2026-02-12T13:32+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-12897 | Apache Traffic Server(ATS)环境问题漏洞 | 2025-05-08 | 2026-03-06 |
| cnvd-2026-12778 | Fiber安全特征问题漏洞 | 2026-03-04 | 2026-03-06 |
| cnvd-2026-12777 | FreeRDP缓冲区溢出漏洞(CNVD-2026-12777) | 2026-03-06 | 2026-03-06 |
| cnvd-2026-12776 | Textream资源管理错误漏洞 | 2026-03-06 | 2026-03-06 |
| cnvd-2026-12773 | WordPress插件New User Approve信息泄露漏洞 | 2025-11-21 | 2026-03-06 |
| cnvd-2026-12772 | WordPress插件Uncanny Automator信息泄露漏洞 | 2025-11-25 | 2026-03-06 |
| cnvd-2026-12770 | WordPress插件Web Accessibility by accessiBe信息泄露漏洞 | 2026-03-02 | 2026-03-06 |
| cnvd-2026-12769 | WordPress插件Simple Ajax Chat信息泄露漏洞 | 2026-03-02 | 2026-03-06 |
| cnvd-2026-12768 | WordPress插件Context Blog信息泄露漏洞 | 2026-03-02 | 2026-03-06 |
| cnvd-2026-12767 | D-Link DWR-M960 formDdns文件缓冲区溢出漏洞 | 2026-03-02 | 2026-03-06 |
| cnvd-2026-12766 | Huawei EMUI和Huawei HarmonyOS通信模块地址读取漏洞 | 2026-02-11 | 2026-03-06 |
| cnvd-2026-12765 | Huawei EMUI和Huawei HarmonyOS AMS模块权限控制类漏洞 | 2026-02-11 | 2026-03-06 |
| cnvd-2026-12764 | Huawei HarmonyOS HDC模块缓冲区溢出漏洞 | 2026-02-11 | 2026-03-06 |
| cnvd-2026-12763 | Google Chrome缓冲区溢出漏洞(CNVD-2026-12763) | 2026-03-02 | 2026-03-06 |
| cnvd-2026-12697 | Adobe Substance 3D Stager存在越界写入漏洞(CNVD-2026-12697) | 2026-03-02 | 2026-03-05 |
| cnvd-2026-12687 | IBM PowerVM Hypervisor存在未明漏洞 | 2026-02-11 | 2026-03-05 |
| cnvd-2026-12685 | IBM Concert存在信息泄露漏洞 | 2026-02-11 | 2026-03-05 |
| cnvd-2026-12684 | Cisco NX-OS Software操作系统命令注入漏洞 | 2025-09-09 | 2026-03-05 |
| cnvd-2026-12683 | Cisco IOS XE Software跨站脚本漏洞 | 2025-09-28 | 2026-03-05 |
| cnvd-2026-12682 | Cisco IOS XE Software代码问题漏洞 | 2025-09-28 | 2026-03-05 |
| cnvd-2026-12681 | Cisco Unified Contact Center Express代码问题漏洞 | 2025-11-10 | 2026-03-05 |
| cnvd-2026-12680 | Cisco Unified Contact Center Express路径遍历漏洞 | 2025-11-10 | 2026-03-05 |
| cnvd-2026-12679 | Cisco Unified Contact Center Express代码问题漏洞 | 2025-11-10 | 2026-03-05 |
| cnvd-2026-12678 | Cisco Unified Contact Center Express代码问题漏洞 | 2025-11-10 | 2026-03-05 |
| cnvd-2026-12677 | Cisco Catalyst Center操作系统命令注入漏洞 | 2025-11-28 | 2026-03-05 |
| cnvd-2026-12676 | Cisco Catalyst Center跨站脚本漏洞 | 2025-11-28 | 2026-03-05 |
| cnvd-2026-12675 | Cisco Catalyst Center Virtual Appliance输入验证错误漏洞 | 2025-11-28 | 2026-03-05 |
| cnvd-2026-12674 | Cisco Identity Services Engine跨站脚本漏洞(CNVD-2026-12674) | 2026-02-04 | 2026-03-05 |
| cnvd-2026-12673 | Cisco Meeting Management(CMM)代码问题漏洞 | 2026-02-06 | 2026-03-05 |
| cnvd-2026-12672 | IBM Cloud Pak for Business Automation存在XSS漏洞 | 2026-02-11 | 2026-03-05 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01844 | Уязвимость сервиса безопасности Advanced DNS Security (ADNS) операционной системы PAN-OS,… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01843 | Уязвимость функции loadRLE() загрузчика TGA-изображений (PluginTARGA.cpp) графической биб… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01842 | Уязвимость функции ws_user_gerList() сценария pwg.users.php системы управления контентом … | 16.02.2026 | 16.02.2026 |
| bdu:2026-01841 | Уязвимость компонента Updater облачной платформы управления контейнерами Arcane, позволяю… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01840 | Уязвимость ИИ-агента OpenClaw (ранее - ClawdBot или MoltBot), связанная с отсутствием про… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01839 | Уязвимость функции blocked_path() пакета Python для создания приложений для моделей машин… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01838 | Уязвимость драйверов графических процессоров NVIDIA NVS, Quadro, NVIDIA RTX, GeForce, свя… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01837 | Уязвимость микропрограммного обеспечения графических процессоров Imagination, позволяющая… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01836 | Уязвимость микропрограммного обеспечения графических процессоров Imagination, позволяющая… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01835 | Уязвимость драйвера ESXi base микропрограммного обеспечения сетевых контроллеров Intel 80… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01834 | Уязвимость микропрограммного обеспечения контроллеров Intel Ethernet серии E810, связанна… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01833 | Уязвимость технологий Intel Active Management Technology (AMT) и Intel Standard Manageabi… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01832 | Уязвимость технологий Intel Active Management Technology (AMT) и Intel Standard Manageabi… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01831 | Уязвимость технологий Intel Active Management Technology (AMT) и Intel Standard Manageabi… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01830 | Уязвимость компонента File input браузера Google Chrome, позволяющая нарушителю осуществи… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01829 | Уязвимость компонента PictureInPicture браузера Google Chrome, позволяющая нарушителю ока… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01828 | Уязвимость компонента Animation браузера Google Chrome, позволяющая нарушителю оказать во… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01827 | Уязвимость функции конфиденциальности Fenced Frames браузера Google Chrome, позволяющая н… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01826 | Уязвимость компонента WebGPU браузера Google Chrome, позволяющая нарушителю вызвать отказ… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01825 | Уязвимость программной платформы на базе git для совместной работы над кодом GitLab, связ… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01824 | Уязвимость программной платформы на базе git для совместной работы над кодом GitLab, связ… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01823 | Уязвимость функции межсетевых экранов SSL-VPN операционных систем Fortinet FortiOS, позво… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01822 | Уязвимость операционных систем Fortinet FortiOS, связанная с недостаточной проверкой исто… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01821 | Уязвимость функции межсетевых экранов SSL-VPN операционных систем Fortinet FortiOS, позво… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01820 | Уязвимость интерфейса командной строки операционных систем Fortinet FortiOS, позволяющая … | 16.02.2026 | 16.02.2026 |
| bdu:2026-01819 | Уязвимость графического пользовательского интерфейса операционных систем Fortinet FortiOS… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01818 | Уязвимость программного обеспечения для разработки 3D-моделей Autodesk Fusion, связанная … | 16.02.2026 | 16.02.2026 |
| bdu:2026-01817 | Уязвимость программного обеспечения для разработки 3D-моделей Autodesk Fusion, связанная … | 16.02.2026 | 16.02.2026 |
| bdu:2026-01816 | Уязвимость программного обеспечения для разработки 3D-моделей Autodesk Fusion, связанная … | 16.02.2026 | 16.02.2026 |
| bdu:2026-01815 | Уязвимость программного обеспечения Microsoft ACI Confidential Containers, связанная с не… | 16.02.2026 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202407-2188 | Siemens (China) Co., Ltd. is a company focusing on electrification, automation and digita… | 2024-07-23T22:46:32.699000Z |
| var-202406-3119 | Beijing StarNet Ruijie Network Technology Co., Ltd. EG3220 is a new generation of multi-s… | 2024-07-23T22:46:22.685000Z |
| var-202407-1740 | NBR6135-E is a router. Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR6135-E ha… | 2024-07-23T22:46:18.378000Z |
| var-202407-1417 | Siemens (China) Co., Ltd. is a company focusing on electrification, automation and digita… | 2024-07-23T22:46:07.784000Z |
| var-202407-1103 | Siemens (China) Co., Ltd. is a company focusing on electrification, automation and digita… | 2024-07-23T22:46:01.992000Z |
| var-202407-0957 | WinCC is a SCADA system suitable for all walks of life. It can access devices from mobile… | 2024-07-23T22:45:59.391000Z |
| var-202407-0819 | SIMATIC S7-1500 is a modular control system suitable for various automation applications … | 2024-07-23T22:45:56.958000Z |
| var-202407-0818 | NBR6210-E is a router product. Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR6… | 2024-07-23T22:45:56.946000Z |
| var-202407-0779 | Tenda i29V1.0 V1.0.0.5 was discovered to contain a hardcoded password for root. Tenda of … | 2024-07-23T22:45:56.150000Z |
| var-202407-0778 | Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnera… | 2024-07-23T22:45:56.131000Z |
| var-202407-0745 | Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnera… | 2024-07-23T22:45:55.498000Z |
| var-202305-1479 | D-Link DIR-2150 SetTriggerPPPoEValidate Username Command Injection Remote Code Execution … | 2024-07-23T22:45:09.335000Z |
| var-202108-1158 | A race condition was addressed with improved locking. This issue is fixed in macOS Monter… | 2024-07-23T22:44:06.976000Z |
| var-201109-0089 | Multiple unspecified vulnerabilities in Cisco Unified Service Monitor before 8.6, as used… | 2024-07-23T22:43:49.590000Z |
| var-200702-0378 | Stack-based buffer overflow in the DCE/RPC preprocessor in Snort before 2.6.1.3, and 2.7 … | 2024-07-23T22:43:25.614000Z |
| var-201011-0225 | Multiple stack-based buffer overflows in agent.exe in Setup Manager in Cisco Intelligent … | 2024-07-23T22:41:43.584000Z |
| var-201112-0297 | Multiple cross-site scripting (XSS) vulnerabilities in the Virus Scan Interface in SAP Ne… | 2024-07-23T22:41:20.004000Z |
| var-201507-0645 | D-Link is an internationally renowned provider of network equipment and solutions, includ… | 2024-07-23T22:41:18.832000Z |
| var-201803-1810 | A Stack-based Buffer Overflow issue was discovered in Delta Electronics Delta Industrial … | 2024-07-23T22:41:17.171000Z |
| var-201809-0087 | WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vul… | 2024-07-23T22:41:16.554000Z |
| var-200607-0396 | Multiple stack-based buffer overflows in eIQnetworks Enterprise Security Analyzer (ESA) b… | 2024-07-23T22:41:04.279000Z |
| var-201702-0423 | An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft… | 2024-07-23T22:40:53.160000Z |
| var-202305-1588 | D-Link DIR-2150 SetNTPServerSettings Command Injection Remote Code Execution Vulnerabilit… | 2024-07-23T22:40:05.297000Z |
| var-201112-0173 | The default configuration of the HP CM8060 Color MFP with Edgeline; Color LaserJet 3xxx, … | 2024-07-23T22:39:32.535000Z |
| var-201103-0371 | SAP Crystal Reports Server is a complete reporting solution for creating, managing, and d… | 2024-07-23T22:39:32.874000Z |
| var-201706-0017 | In FortiClientWindows 5.4.1 and 5.4.2, an attacker may escalate privilege via a FortiClie… | 2024-07-23T22:38:34.494000Z |
| var-202305-1520 | D-Link DIR-2150 SetSysEmailSettings EmailFrom Command Injection Remote Code Execution Vul… | 2024-07-23T22:38:26.576000Z |
| var-202407-0490 | A vulnerability has been identified in SIMATIC PCS neo V4.0 (All versions), SIMATIC STEP … | 2024-07-23T22:38:24.768000Z |
| var-201810-0396 | Advantech WebAccess 8.3.1 and earlier has several stack-based buffer overflow vulnerabili… | 2024-07-23T22:37:44.850000Z |
| var-202001-0833 | A Denial of Service vulnerability exists in the WRITE_C function in the msg_server.exe mo… | 2024-07-23T22:37:43.471000Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| GCVE-1-2026-0020 |
10 (4.0)
|
Remote Code Execution Attack Against Eircom D1000 Router |
Eir |
D1000 |
2026-03-11T14:12:00.000Z | 2026-03-11T14:23:24.609831Z |
| GCVE-1-2026-0019 |
6.4 (4.0)
|
Improper URL validation in MISP dashboard button widge… |
misp |
misp |
2026-02-27T14:55:00.000Z | 2026-02-27T15:44:29.998063Z |
| GCVE-1-2026-0018 |
6.5 (4.0)
|
Improper access control in MISP user contact form allo… |
misp |
misp |
2026-02-27T13:25:32.632362Z | 2026-02-27T13:25:32.632362Z |
| GCVE-1-2026-0017 |
7.2 (4.0)
|
Improper Neutralization of Raw HTML in MISP modules Ma… |
misp |
misp-modules |
2026-02-27T13:10:24.641948Z | 2026-02-27T13:10:24.641948Z |
| GCVE-1-2026-0016 |
7 (4.0)
|
Server-Side Request Forgery via Event Report Import Fr… |
misp |
misp |
2026-02-27T10:56:32.745676Z | 2026-02-27T10:56:32.745676Z |
| GCVE-1-2026-0015 |
7.2 (4.0)
|
Threat actors use FortiCloud SSO bypass to collect LDA… |
fortinet |
fortios |
2026-02-09T09:09:00.000Z | 2026-02-09T09:14:59.004089Z |
| GCVE-1-2026-0014 |
7.4 (4.0)
|
Missing Authorization Check Allows Unauthorized Modifi… |
vulnerability-lookup |
vulnerability-lookup |
2026-02-04T19:32:14.341383Z | 2026-02-04T19:32:14.341383Z |
| GCVE-1-2026-0013 |
2.1 (4.0)
|
Flask Application Username Route Collision Allows Rese… |
vulnerability-lookup |
vulnerability-lookup |
2026-02-04T19:27:00.000Z | 2026-02-04T19:32:49.787763Z |
| GCVE-1-2026-0012 |
2.1 (4.0)
|
Authentication Error Message Allows Email Address Enum… |
vulnerability-lookup |
vulnerability-lookup |
2026-02-04T19:21:34.411344Z | 2026-02-04T19:21:34.411344Z |
| GCVE-1-2026-0011 |
8.7 (4.0)
|
Out-of-bounds memory write in the network packet … |
EA Games |
Command & Conquer: Generals |
2026-01-29T14:37:00.000Z | 2026-01-29T14:39:17.728822Z |
| GCVE-1-2026-0010 |
9.3 (4.0)
|
Improper input validation in the file transfer ha… |
EA Games |
Command & Conquer: Generals |
2026-01-29T14:33:18.822829Z | 2026-01-29T14:33:18.822829Z |
| GCVE-1-2026-0009 |
9.3 (4.0)
|
Stack-based buffer overflow in the multiplayer ne… |
EA Games |
Command & Conquer: Generals |
2026-01-29T14:30:38.596928Z | 2026-01-29T14:30:38.596928Z |
| GCVE-1-2026-0008 |
10 (4.0)
|
gpg-agent stack buffer overflow in pkdecrypt using KEM |
gnupg |
gpg-agent |
2026-01-28T13:48:12.350509Z | 2026-01-28T13:48:12.350509Z |
| GCVE-1-2026-0007 |
10 (4.0)
|
GNU InetUtils Security Advisory: remote authentication… |
gnu |
InetUtils |
2026-01-20T20:57:00.000Z | 2026-01-26T16:32:40.831364Z |
| GCVE-1-2026-0006 |
8.5 (4.0)
|
Improper Access Control in Cerebrate AuthKey and Encry… |
cerebrate |
cerebrate |
2026-01-13T15:37:17.337254Z | 2026-01-13T15:37:17.337254Z |
| GCVE-1-2026-0005 |
8.5 (4.0)
|
Improper Access Control in Cerebrate Alignment Model A… |
cerebrate |
cerebrate |
2026-01-13T15:31:00.000Z | 2026-01-13T15:38:02.888546Z |
| GCVE-1-2026-0004 |
8.5 (4.0)
|
Authorization Bypass in Cerebrate IndividualsControlle… |
cerebrate |
cerebrate |
2026-01-13T15:28:00.000Z | 2026-01-13T15:38:37.744618Z |
| GCVE-1-2026-0003 |
6.3 (4.0)
|
Stored/Reflected XSS via Unsanitized Parameters in URL… |
misp |
misp |
2026-01-13T10:50:00.000Z | 2026-01-13T10:54:13.659223Z |
| GCVE-1-2026-0002 |
10 (4.0)
|
Heap-buffer-overflow in EXIF writer for extra IFD tags |
ffmpeg |
ffmpeg |
2026-01-02T19:50:00.000Z | 2026-01-02T20:05:27.269877Z |
| GCVE-1-2026-0001 |
N/A
|
Bundle reference to gpg.fail |
gnupg |
gnupg |
2026-01-02T10:20:00.000Z | 2026-01-02T13:31:14.359346Z |
| GCVE-1-2025-0041 |
6.4 (4.0)
|
[online services] Reflected Cross-Site Scripting (XSS)… |
typo3 |
typo3 |
2025-12-19T14:25:00.000Z | 2025-12-19T14:54:51.594645Z |
| GCVE-1-2025-0031 |
7.1 (4.0)
|
A cross-site scripting (XSS) vulnerability was identif… |
misp |
misp |
2025-12-03T10:58:00.000Z | 2025-12-16T09:36:09.594750Z |
| GCVE-1-2025-0040 |
7.2 (4.0)
|
A cross-site scripting (XSS) vulnerability was id… |
misp |
misp |
2025-12-13T08:44:32.378924Z | 2025-12-13T08:44:32.378924Z |
| GCVE-1-2025-0039 |
8.5 (4.0)
|
XSS Reintroduced in MISP Dashboard World Map Widget Du… |
misp |
misp |
2025-12-10T14:33:52.856734Z | 2025-12-10T14:33:52.856734Z |
| GCVE-1-2025-0038 |
5 (4.0)
|
Reflected XSS in MISP Template Tag Removal and MISP Ad… |
misp |
misp |
2025-12-10T14:10:00.000Z | 2025-12-10T14:16:55.918270Z |
| GCVE-1-2025-0037 |
7 (4.0)
|
Reflected XSS in MISP Dashboard Widgets via Unescaped … |
misp |
misp |
2025-12-10T14:01:03.200804Z | 2025-12-10T14:01:03.200804Z |
| GCVE-1-2025-0036 |
8.3 (4.0)
|
A reflected cross-site scripting (XSS) vulnerability w… |
misp |
misp |
2025-12-10T13:46:07.170083Z | 2025-12-10T13:46:07.170083Z |
| GCVE-1-2025-0035 |
8.3 (4.0)
|
Insufficient sanitization of bundle metadata (availabl… |
CIRCL |
vulnerability-lookup |
2025-12-08T10:25:00.000Z | 2025-12-08T12:14:06.307298Z |
| GCVE-1-2025-0034 |
7 (4.0)
|
Missing CSRF protection on state-changing endpoints in… |
CIRCL |
vulnerability-lookup |
2025-12-08T10:19:00.000Z | 2025-12-08T12:13:24.197294Z |
| GCVE-1-2025-0033 |
8.1 (4.0)
|
Vulnerability-lookup did not track or limit failed One… |
CIRCL |
vulnerability-lookup |
2025-12-08T10:11:00.000Z | 2025-12-08T12:12:53.235996Z |