Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-5363 |
5.4 (4.0)
|
Use of weak cryptographic key in TP-Link Archer C7 |
TP-Link Systems Inc. |
Archer C7 v5 and v5.8 |
2026-04-15T23:45:54.271Z | 2026-04-16T23:10:46.170Z |
| CVE-2026-4880 |
9.8 (3.1)
|
Barcode Scanner (+Mobile App) <= 1.11.0 - Unauthentica… |
ukrsolution |
Barcode Scanner (+Mobile App) – Inventory manager, Order fulfillment system, POS (Point of Sale) |
2026-04-15T23:25:49.596Z | 2026-04-16T14:20:50.654Z |
| CVE-2026-40245 |
7.5 (3.1)
|
Free5GC: UDR nudr-dr influenceData/subs-to-notify leak… |
free5gc |
free5gc |
2026-04-15T23:25:11.589Z | 2026-04-16T12:04:46.694Z |
| CVE-2026-40193 |
8.2 (3.1)
|
Maddy Mail Server: LDAP Filter Injection via Unsanitiz… |
foxcpp |
maddy |
2026-04-15T23:15:25.011Z | 2026-04-16T14:23:52.438Z |
| CVE-2026-40947 |
2.9 (3.1)
|
Yubico libfido2 before 1.17.0, python-fido2 befor… |
Yubico |
libfido2 |
2026-04-15T23:13:38.977Z | 2026-04-16T13:18:13.069Z |
| CVE-2026-40192 |
8.7 (4.0)
|
Pillow is vulnerable to a FITS GZIP decompression bomb |
python-pillow |
Pillow |
2026-04-15T22:53:56.147Z | 2026-04-16T13:37:19.918Z |
| CVE-2026-40316 |
8.8 (3.1)
|
OWASP BLT has RCE in Github Actions via untrusted Djan… |
OWASP-BLT |
BLT |
2026-04-15T22:49:18.636Z | 2026-04-16T14:18:12.374Z |
| CVE-2026-39350 |
5.4 (3.1)
|
Istio AuthorizationPolicy Incorrect Regex Matching of … |
istio |
istio |
2026-04-15T22:42:24.216Z | 2026-04-16T12:04:54.038Z |
| CVE-2026-40179 |
5.3 (4.0)
|
Prometheus: Stored XSS via metric names and label valu… |
prometheus |
prometheus |
2026-04-15T22:26:46.909Z | 2026-04-16T14:21:42.130Z |
| CVE-2026-4949 |
4.3 (3.1)
|
ProfilePress <= 4.16.12 - Missing Authorization to Aut… |
properfraction |
Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress |
2026-04-15T22:26:05.515Z | 2026-04-16T14:19:21.197Z |
| CVE-2026-6388 |
9.1 (3.1)
|
Argocd-image-updater: argocd image updater: cross-name… |
Red Hat |
Red Hat OpenShift GitOps |
2026-04-15T21:34:07.022Z | 2026-04-16T14:26:23.879Z |
| CVE-2026-1711 |
4.8 (4.0)
|
Pega Platform versions 8.1.0 through 25.1.1 are affect… |
Pegasystems |
Pega Infinity |
2026-04-15T21:32:51.821Z | 2026-04-16T14:17:53.761Z |
| CVE-2026-1564 |
5.1 (4.0)
|
Pega Platform versions 8.1.0 through 25.1.1 are affect… |
Pegasystems |
Pega Infinity |
2026-04-15T21:31:19.982Z | 2026-04-16T14:16:54.925Z |
| CVE-2026-40500 |
6.1 (4.0)
6.8 (3.1)
|
ProcessWire CMS SSRF via Add Module From URL |
processwire |
processwire |
2026-04-15T21:25:53.214Z | 2026-04-16T13:38:15.341Z |
| CVE-2026-40261 |
8.8 (3.1)
|
Composer has Command Injection via Malicious Perforce … |
composer |
composer |
2026-04-15T20:56:32.182Z | 2026-04-16T13:41:12.977Z |
| CVE-2026-40176 |
7.8 (3.1)
|
Composer is vulnerable to Command Injection via Malici… |
composer |
composer |
2026-04-15T20:47:39.839Z | 2026-04-16T14:16:39.968Z |
| CVE-2026-22676 |
8.5 (4.0)
7.8 (3.1)
|
Barracuda RMM < 2025.2.2 Privilege Escalation via Inse… |
Barracuda Networks |
RMM |
2026-04-15T20:45:23.918Z | 2026-04-16T12:05:01.880Z |
| CVE-2026-40173 |
9.4 (3.1)
|
Dgraph: Unauthenticated pprof endpoint leaks admin aut… |
dgraph-io |
dgraph |
2026-04-15T20:40:47.186Z | 2026-04-16T12:05:10.186Z |
| CVE-2026-40186 |
6.1 (3.1)
|
ApostropheCMS: sanitize-html allowedTags Bypass via En… |
apostrophecms |
apostrophe |
2026-04-15T20:15:12.333Z | 2026-04-16T14:15:41.275Z |
| CVE-2026-39857 |
5.3 (3.1)
|
Information Disclosure via `choices`/`counts` Query Pa… |
apostrophecms |
apostrophe |
2026-04-15T19:38:57.564Z | 2026-04-16T13:40:17.710Z |
| CVE-2026-35569 |
8.7 (3.1)
|
ApostropheCMS: Stored XSS in SEO Fields Leads to Authe… |
apostrophecms |
apostrophe |
2026-04-15T19:34:23.648Z | 2026-04-16T14:14:58.325Z |
| CVE-2026-33889 |
5.4 (3.1)
|
ApostropheCMS: Stored XSS via CSS Custom Property Inje… |
apostrophecms |
apostrophe |
2026-04-15T19:29:50.899Z | 2026-04-16T12:05:17.734Z |
| CVE-2026-33888 |
5.3 (3.1)
|
ApostropheCMS: publicApiProjection Bypass via `project… |
apostrophecms |
apostrophe |
2026-04-15T19:25:46.262Z | 2026-04-15T20:03:30.594Z |
| CVE-2026-21726 |
5.3 (3.1)
|
Loki Path Traversal - CVE-2021-36156 Bypass |
Grafana |
Loki |
2026-04-15T19:24:31.268Z | 2026-04-15T20:01:33.375Z |
| CVE-2026-6385 |
6.5 (3.1)
|
Ffmpeg: ffmpeg: denial of service and potential arbitr… |
Red Hat |
Lightspeed Core |
2026-04-15T19:18:39.354Z | 2026-04-15T20:01:15.671Z |
| CVE-2025-41118 |
9.1 (3.1)
|
Sensitive COS `SecretKey` exposed in plaintext via con… |
Grafana |
Pyroscope |
2026-04-15T19:15:17.689Z | 2026-04-15T19:33:10.329Z |
| CVE-2026-33877 |
3.7 (3.1)
|
ApostropheCMS: User Enumeration via Timing Side Channe… |
apostrophecms |
apostrophe |
2026-04-15T19:11:06.796Z | 2026-04-15T19:30:53.040Z |
| CVE-2026-6384 |
7.3 (3.1)
|
Gimp: gimp: arbitrary code execution or denial of serv… |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-04-15T19:09:10.587Z | 2026-04-16T03:56:19.004Z |
| CVE-2026-6364 |
6.5 (3.1)
|
Out of bounds read in Skia in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:59.385Z | 2026-04-16T13:53:06.236Z |
| CVE-2026-6319 |
7.5 (3.1)
|
Use after free in Payments in Google Chrome on An… |
Google |
Chrome |
2026-04-15T19:04:58.945Z | 2026-04-16T09:58:55.486Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40959 |
9.3 (3.1)
|
Luanti 5 before 5.15.2, when LuaJIT is used, allo… |
Luanti |
Luanti |
2026-04-16T00:51:19.520Z | 2026-04-16T12:32:04.767Z |
| CVE-2026-40503 |
7.1 (4.0)
6.5 (3.1)
|
OpenHarness Path Traversal Information Disclosure via … |
HKUDS |
OpenHarness |
2026-04-16T00:08:09.535Z | 2026-04-16T13:42:38.789Z |
| CVE-2026-40502 |
8.7 (4.0)
8.8 (3.1)
|
OpenHarness Remote Administrative Command Injection vi… |
HKUDS |
OpenHarness |
2026-04-16T00:08:34.463Z | 2026-04-16T14:19:24.128Z |
| CVE-2026-5363 |
5.4 (4.0)
|
Use of weak cryptographic key in TP-Link Archer C7 |
TP-Link Systems Inc. |
Archer C7 v5 and v5.8 |
2026-04-15T23:45:54.271Z | 2026-04-16T23:10:46.170Z |
| CVE-2026-4880 |
9.8 (3.1)
|
Barcode Scanner (+Mobile App) <= 1.11.0 - Unauthentica… |
ukrsolution |
Barcode Scanner (+Mobile App) – Inventory manager, Order fulfillment system, POS (Point of Sale) |
2026-04-15T23:25:49.596Z | 2026-04-16T14:20:50.654Z |
| CVE-2026-40947 |
2.9 (3.1)
|
Yubico libfido2 before 1.17.0, python-fido2 befor… |
Yubico |
libfido2 |
2026-04-15T23:13:38.977Z | 2026-04-16T13:18:13.069Z |
| CVE-2026-40245 |
7.5 (3.1)
|
Free5GC: UDR nudr-dr influenceData/subs-to-notify leak… |
free5gc |
free5gc |
2026-04-15T23:25:11.589Z | 2026-04-16T12:04:46.694Z |
| CVE-2026-40193 |
8.2 (3.1)
|
Maddy Mail Server: LDAP Filter Injection via Unsanitiz… |
foxcpp |
maddy |
2026-04-15T23:15:25.011Z | 2026-04-16T14:23:52.438Z |
| CVE-2026-4949 |
4.3 (3.1)
|
ProfilePress <= 4.16.12 - Missing Authorization to Aut… |
properfraction |
Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress |
2026-04-15T22:26:05.515Z | 2026-04-16T14:19:21.197Z |
| CVE-2026-40316 |
8.8 (3.1)
|
OWASP BLT has RCE in Github Actions via untrusted Djan… |
OWASP-BLT |
BLT |
2026-04-15T22:49:18.636Z | 2026-04-16T14:18:12.374Z |
| CVE-2026-40192 |
8.7 (4.0)
|
Pillow is vulnerable to a FITS GZIP decompression bomb |
python-pillow |
Pillow |
2026-04-15T22:53:56.147Z | 2026-04-16T13:37:19.918Z |
| CVE-2026-40179 |
5.3 (4.0)
|
Prometheus: Stored XSS via metric names and label valu… |
prometheus |
prometheus |
2026-04-15T22:26:46.909Z | 2026-04-16T14:21:42.130Z |
| CVE-2026-39350 |
5.4 (3.1)
|
Istio AuthorizationPolicy Incorrect Regex Matching of … |
istio |
istio |
2026-04-15T22:42:24.216Z | 2026-04-16T12:04:54.038Z |
| CVE-2026-6388 |
9.1 (3.1)
|
Argocd-image-updater: argocd image updater: cross-name… |
Red Hat |
Red Hat OpenShift GitOps |
2026-04-15T21:34:07.022Z | 2026-04-16T14:26:23.879Z |
| CVE-2026-40500 |
6.1 (4.0)
6.8 (3.1)
|
ProcessWire CMS SSRF via Add Module From URL |
processwire |
processwire |
2026-04-15T21:25:53.214Z | 2026-04-16T13:38:15.341Z |
| CVE-2026-1711 |
4.8 (4.0)
|
Pega Platform versions 8.1.0 through 25.1.1 are affect… |
Pegasystems |
Pega Infinity |
2026-04-15T21:32:51.821Z | 2026-04-16T14:17:53.761Z |
| CVE-2026-1564 |
5.1 (4.0)
|
Pega Platform versions 8.1.0 through 25.1.1 are affect… |
Pegasystems |
Pega Infinity |
2026-04-15T21:31:19.982Z | 2026-04-16T14:16:54.925Z |
| CVE-2026-6398 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. | N/A | N/A | 2026-04-15T20:24:11.160Z | |
| CVE-2026-40261 |
8.8 (3.1)
|
Composer has Command Injection via Malicious Perforce … |
composer |
composer |
2026-04-15T20:56:32.182Z | 2026-04-16T13:41:12.977Z |
| CVE-2026-40186 |
6.1 (3.1)
|
ApostropheCMS: sanitize-html allowedTags Bypass via En… |
apostrophecms |
apostrophe |
2026-04-15T20:15:12.333Z | 2026-04-16T14:15:41.275Z |
| CVE-2026-40176 |
7.8 (3.1)
|
Composer is vulnerable to Command Injection via Malici… |
composer |
composer |
2026-04-15T20:47:39.839Z | 2026-04-16T14:16:39.968Z |
| CVE-2026-40173 |
9.4 (3.1)
|
Dgraph: Unauthenticated pprof endpoint leaks admin aut… |
dgraph-io |
dgraph |
2026-04-15T20:40:47.186Z | 2026-04-16T12:05:10.186Z |
| CVE-2026-22676 |
8.5 (4.0)
7.8 (3.1)
|
Barracuda RMM < 2025.2.2 Privilege Escalation via Inse… |
Barracuda Networks |
RMM |
2026-04-15T20:45:23.918Z | 2026-04-16T12:05:01.880Z |
| CVE-2026-6385 |
6.5 (3.1)
|
Ffmpeg: ffmpeg: denial of service and potential arbitr… |
Red Hat |
Lightspeed Core |
2026-04-15T19:18:39.354Z | 2026-04-15T20:01:15.671Z |
| CVE-2026-6384 |
7.3 (3.1)
|
Gimp: gimp: arbitrary code execution or denial of serv… |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-04-15T19:09:10.587Z | 2026-04-16T03:56:19.004Z |
| CVE-2026-6364 |
6.5 (3.1)
|
Out of bounds read in Skia in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:59.385Z | 2026-04-16T13:53:06.236Z |
| CVE-2026-6363 |
8.8 (3.1)
|
Type Confusion in V8 in Google Chrome prior to 14… |
Google |
Chrome |
2026-04-15T19:04:57.982Z | 2026-04-16T03:55:45.999Z |
| CVE-2026-6362 |
6.3 (3.1)
|
Use after free in Codecs in Google Chrome prior t… |
Google |
Chrome |
2026-04-15T19:04:57.143Z | 2026-04-16T13:23:13.559Z |
| CVE-2026-6361 |
7.2 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome o… |
Google |
Chrome |
2026-04-15T19:04:56.740Z | 2026-04-16T10:00:46.711Z |
| CVE-2026-6360 |
8.8 (3.1)
|
Use after free in FileSystem in Google Chrome pri… |
Google |
Chrome |
2026-04-15T19:04:53.135Z | 2026-04-16T03:56:09.052Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-6f47-h5cp-7cwm |
6.4 (3.1)
|
The Email Encoder – Protect Email Addresses and Phone Numbers plugin for WordPress is vulnerable to… | 2026-04-16T15:31:32Z | 2026-04-16T15:31:32Z |
| ghsa-3xhp-52jc-www8 |
4.7 (3.1)
|
SourceCodester Payroll Management and Information System v1.0 is vulnerable to SQL Injection in the… | 2026-04-16T15:31:32Z | 2026-04-16T18:31:21Z |
| ghsa-3j9x-gmp6-9x73 |
7.3 (3.1)
|
SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL Injection in the file … | 2026-04-16T15:31:32Z | 2026-04-16T18:31:21Z |
| ghsa-3fcv-p6qc-8gvx |
7.2 (3.1)
|
SourceCodester Vehicle Parking Area Management System v1.0 is vulnerable to SQL Injection in the fi… | 2026-04-16T15:31:32Z | 2026-04-18T03:31:05Z |
| ghsa-263f-2q4p-95qq |
9.8 (3.1)
|
SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL Injection in the file … | 2026-04-16T15:31:32Z | 2026-04-18T03:31:05Z |
| ghsa-23m2-3g75-jvc8 |
5.3 (3.1)
|
The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin f… | 2026-04-16T15:31:32Z | 2026-04-16T15:31:32Z |
| ghsa-rpp7-9x22-6v9f |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-04-16T15:31:31Z | 2026-04-16T15:31:31Z |
| ghsa-q2hg-643c-gw8h |
8.1 (3.1)
|
Apache Airflow: RCE by race condition in example_xcom dag | 2026-04-16T15:31:31Z | 2026-04-16T22:57:15Z |
| ghsa-p284-vc5x-jqh4 |
8.5 (3.1)
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-04-16T15:31:31Z | 2026-04-16T15:31:31Z |
| ghsa-f763-m6cv-f596 |
5.4 (3.1)
|
Missing Authorization vulnerability in Themeum Tutor LMS tutor allows Exploiting Incorrectly Config… | 2026-04-16T15:31:31Z | 2026-04-16T15:31:31Z |
| ghsa-8f3x-4qgm-mmjv |
4.3 (3.1)
|
Missing Authorization vulnerability in bPlugins 3D viewer – Embed 3D Models 3d-viewer allows Exploi… | 2026-04-16T15:31:31Z | 2026-04-16T15:31:31Z |
| ghsa-3969-mh7w-g5vp |
5.3 (3.1)
|
Missing Authorization vulnerability in Majestic Support Majestic Support majestic-support allows Ex… | 2026-04-16T15:31:31Z | 2026-04-16T15:31:32Z |
| ghsa-2vc4-7wrh-m68v |
5.3 (3.1)
|
Missing Authorization vulnerability in WP Royal Royal Elementor Addons royal-elementor-addons allow… | 2026-04-16T15:31:31Z | 2026-04-16T15:31:31Z |
| ghsa-27h3-crw2-q36w |
7.5 (3.1)
|
SkyWalking OAP /debugging/config/dump endpoint may leak sensitive configuration information | 2026-04-16T15:31:31Z | 2026-04-16T22:57:31Z |
| ghsa-q4m3-x4h7-c3c2 |
7.5 (3.1)
|
The DirectoryPress – Business Directory And Classified Ad Listing plugin for WordPress is vulnerabl… | 2026-04-16T12:31:42Z | 2026-04-16T12:31:42Z |
| ghsa-242m-692q-2xxx |
5.4 (3.1)
|
The Better Find and Replace – AI-Powered Suggestions plugin for WordPress is vulnerable to Stored C… | 2026-04-16T12:31:42Z | 2026-04-16T12:31:42Z |
| ghsa-qw58-mhg6-q49h |
3.1 (3.1)
|
The OneSignal – Web Push Notifications plugin for WordPress is vulnerable to authorization bypass i… | 2026-04-16T12:31:41Z | 2026-04-16T12:31:41Z |
| ghsa-ppc7-gg9m-7hwq |
6.1 (3.1)
|
The authentication endpoint fails to encode user-supplied input before rendering it in the web page… | 2026-04-16T12:31:41Z | 2026-04-16T12:31:41Z |
| ghsa-gw5f-5fmc-2xp2 |
6.0 (3.1)
|
Active access tokens are not revoked or invalidated when a user account is locked within WSO2 Ident… | 2026-04-16T12:31:41Z | 2026-04-16T12:31:41Z |
| ghsa-6f87-4ph2-cp38 |
6.1 (3.1)
|
The authentication endpoint fails to adequately validate user-supplied input before reflecting it b… | 2026-04-16T12:31:41Z | 2026-04-16T12:31:41Z |
| ghsa-4fxw-3p35-q323 |
3.5 (3.1)
|
The component accepts XML input through the publisher without disabling external entity resolution.… | 2026-04-16T12:31:41Z | 2026-04-16T12:31:41Z |
| ghsa-2xxp-g6g6-xch7 |
5.4 (3.1)
|
The WSO2 API Manager developer portal accepts user-supplied input without enforcing expected valida… | 2026-04-16T12:31:41Z | 2026-04-16T12:31:41Z |
| ghsa-c2m4-xc4p-9x32 |
7.3 (3.1)
|
Dell Storage Manager - Replay Manager for Microsoft Servers, version(s) 8.0, contain(s) an Improper… | 2026-04-16T09:31:45Z | 2026-04-16T09:31:45Z |
| ghsa-98jv-r7r8-3rqm |
7.5 (3.1)
|
The XML parsers within multiple WSO2 products accept user-supplied XML data without properly config… | 2026-04-16T09:31:45Z | 2026-04-16T09:31:45Z |
| ghsa-x998-f64j-xppw |
6.1 (3.1)
|
The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scr… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-v677-rmj8-wwf4 |
8.8 (3.1)
|
The Livemesh Addons for Elementor plugin for WordPress is vulnerable to Local File Inclusion in all… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-rc35-963c-p69f |
6.5 (3.1)
|
LINE client for iOS versions prior to 26.3.0 contains a vulnerability in the in-app browser where o… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-q42f-8h4q-g7mm |
6.2 (3.1)
|
In ONLYOFFICE DesktopEditors before 9.3.0, the update service allows attackers to perform actions o… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-pq6h-83gw-pj9p |
4.4 (3.1)
|
The OPEN-BRAIN plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'API Key' … | 2026-04-16T09:31:44Z | 2026-04-16T09:31:45Z |
| ghsa-m34r-4v3r-pp9v |
7.4 (3.1)
|
In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call… | 2026-04-16T09:31:44Z | 2026-04-16T21:31:12Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-131 |
7.5 (3.1)
|
Nullptr in paddle.dot in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash a… | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:57.485379+00:00 |
| pysec-2024-130 |
7.5 (3.1)
|
FPE in paddle.linalg.matrix_rank in PaddlePaddle before 2.6.0. This flaw can cause a runt… | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:57.427583+00:00 |
| pysec-2024-129 |
7.5 (3.1)
|
FPE in paddle.nanmedian in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash… | paddlepaddle | 2024-01-03T09:15:00+00:00 | 2024-11-21T14:22:57.364643+00:00 |
| pysec-2023-271 |
5.3 (3.1)
|
Hail is an open-source, general-purpose, Python-based data analysis tool with additional … | hail | 2023-12-29T17:16:00+00:00 | 2024-11-21T14:22:51.672042+00:00 |
| pysec-2023-259 |
9.8 (3.1)
|
A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1… | micropython-select | 2023-12-29T05:15:00+00:00 | 2024-02-29T07:20:31.851255+00:00 |
| pysec-2023-258 |
9.8 (3.1)
|
A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1… | micropython-os | 2023-12-29T05:15:00+00:00 | 2024-02-29T07:20:31.721783+00:00 |
| pysec-2023-257 |
9.8 (3.1)
|
A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1… | micropython-io | 2023-12-29T05:15:00+00:00 | 2024-02-29T07:20:31.603749+00:00 |
| pysec-2023-256 |
9.8 (3.1)
|
A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1… | micropython-copy | 2023-12-29T05:15:00+00:00 | 2024-02-29T07:20:31.464203+00:00 |
| pysec-2023-248 |
6.1 (3.1)
|
An open redirect vulnerability in the python package Flask-Security-Too <=5.3.2 allows at… | flask-security-too | 2023-12-26T22:15:00+00:00 | 2024-01-17T11:19:18.188431+00:00 |
| pysec-2023-279 |
9.1 (3.1)
|
MindsDB is a SQL Server for artificial intelligence. Prior to version 23.11.4.1, the `put… | mindsdb | 2023-12-22T21:15:00+00:00 | 2024-11-21T14:22:54.549778+00:00 |
| pysec-2023-249 |
7.5 (3.1)
|
Gradio is an open-source Python package that allows you to quickly build a demo or web ap… | gradio | 2023-12-22T21:15:00+00:00 | 2024-01-17T11:19:18.252182+00:00 |
| pysec-2023-287 |
4.3 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-12-22T17:15:00+00:00 | 2024-11-21T14:22:55.764934+00:00 |
| pysec-2023-267 |
6.5 (3.1)
|
Apache Airflow, versions before 2.8.0, is affected by a vulnerability that allows an auth… | apache-airflow | 2023-12-21T10:15:00+00:00 | 2024-11-21T14:22:40.744438+00:00 |
| pysec-2023-266 |
6.5 (3.1)
|
Apache Airflow, version 2.7.0 through 2.7.3, has a vulnerability that allows an attacker … | apache-airflow | 2023-12-21T10:15:00+00:00 | 2024-11-21T14:22:40.683792+00:00 |
| pysec-2023-265 |
4.3 (3.1)
|
Apache Airflow, in versions prior to 2.8.0, contains a security vulnerability that allows… | apache-airflow | 2023-12-21T10:15:00+00:00 | 2024-11-21T14:22:40.621314+00:00 |
| pysec-2023-264 |
5.4 (3.1)
|
Apache Airflow, versions 2.6.0 through 2.7.3 has a stored XSS vulnerability that allows a… | apache-airflow | 2023-12-21T10:15:00+00:00 | 2024-11-21T14:22:40.559945+00:00 |
| pysec-2023-301 |
7.8 (3.1)
|
Deserialization of Untrusted Data in GitHub repository huggingface/transformers prior to 4.36. | transformers | 2023-12-20T17:15:00+00:00 | 2024-11-21T14:23:01.933055+00:00 |
| pysec-2023-300 |
8.8 (3.1)
|
Deserialization of Untrusted Data in GitHub repository huggingface/transformers prior to 4.36. | transformers | 2023-12-19T13:15:00+00:00 | 2024-11-21T14:23:01.871022+00:00 |
| pysec-2023-252 |
7.5 (3.1)
|
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-18T04:15:00+00:00 | 2024-02-06T22:20:23.832000+00:00 |
| pysec-2023-253 |
8.1 (3.1)
|
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-15T01:15:00+00:00 | 2024-02-14T00:26:12.242703+00:00 |
| pysec-2023-255 |
8.1 (3.1)
|
Command Injection in GitHub repository gradio-app/gradio prior to main. | gradio | 2023-12-14T14:15:00+00:00 | 2024-02-28T16:22:37.359017+00:00 |
| pysec-2023-307 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). Contr… | vyper | 2023-12-13T20:15:00+00:00 | 2024-11-21T14:23:02.808922+00:00 |
| pysec-2023-297 |
7.5 (3.1)
|
A path traversal vulnerability has been detected in Repox, which allows an attacker to re… | repox | 2023-12-13T10:15:00Z | 2024-11-21T14:23:00.892241Z |
| pysec-2023-296 |
7.5 (3.1)
|
An XEE vulnerability has been found in Repox, which allows a remote attacker to interfere… | repox | 2023-12-13T10:15:00Z | 2024-11-21T14:23:00.841929Z |
| pysec-2023-295 |
5.4 (3.1)
|
An XSS vulnerability stored in Repox has been identified, which allows a local attacker t… | repox | 2023-12-13T10:15:00Z | 2024-11-21T14:23:00.792103Z |
| pysec-2023-294 |
6.1 (3.1)
|
An XSS vulnerability has been detected in Repox, which allows an attacker to compromise i… | repox | 2023-12-13T10:15:00Z | 2024-11-21T14:23:00.74018Z |
| pysec-2023-293 |
7.5 (3.1)
|
An authentication bypass vulnerability has been found in Repox, which allows a remote use… | repox | 2023-12-13T09:15:00Z | 2024-11-21T14:23:00.689595Z |
| pysec-2023-309 |
8.8 (3.1)
|
Path Traversal in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-13T00:15:07+00:00 | 2025-04-09T17:27:26.271200+00:00 |
| pysec-2023-286 |
5.3 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-12-12T23:15:00+00:00 | 2024-11-21T14:22:55.664554+00:00 |
| pysec-2023-262 |
9.8 (3.1)
|
main.py in Searchor before 2.4.2 uses eval on CLI input, which may cause unexpected code … | searchor | 2023-12-12T18:15:00+00:00 | 2024-10-09T19:20:24.594458+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2823 | Malicious code in @genoma-ui/components (npm) | 2026-04-10T07:07:32Z | 2026-04-10T07:07:32Z |
| mal-2026-2527 | Malicious code in sjs-biginteger (npm) | 2026-04-09T14:05:08Z | 2026-04-10T17:23:36Z |
| mal-2026-2528 | Malicious code in sjs-lint-build1 (npm) | 2026-04-09T14:04:30Z | 2026-04-10T17:23:36Z |
| mal-2026-2522 | Malicious code in st-payment (PyPI) | 2026-04-09T13:30:26Z | 2026-04-09T13:30:26Z |
| mal-2026-2521 | Malicious code in gc-grocery-api (PyPI) | 2026-04-09T13:29:38Z | 2026-04-09T13:29:38Z |
| mal-2026-2520 | Malicious code in @signals-notebook/utils (npm) | 2026-04-09T11:05:56Z | 2026-04-10T17:23:32Z |
| mal-2026-2523 | Malicious code in @telekom-wfa/auth-core (npm) | 2026-04-09T08:25:05Z | 2026-04-10T17:23:32Z |
| mal-2026-2519 | Malicious code in just4testlm (PyPI) | 2026-04-09T07:28:17Z | 2026-04-09T08:40:08Z |
| mal-2026-2518 | Malicious code in viewer-assets-generator (npm) | 2026-04-09T03:10:01Z | 2026-04-13T15:48:07Z |
| mal-2026-2517 | Malicious code in kraken-trader (PyPI) | 2026-04-08T20:22:02Z | 2026-04-08T20:22:02Z |
| mal-2026-2516 | Malicious code in sentinel-tool (PyPI) | 2026-04-08T16:31:08Z | 2026-04-08T16:31:08Z |
| mal-2026-2515 | Malicious code in granulate-utils (PyPI) | 2026-04-08T12:34:04Z | 2026-04-08T12:34:04Z |
| mal-2026-2514 | Malicious code in gprofiler-logging (PyPI) | 2026-04-08T12:33:58Z | 2026-04-08T12:33:58Z |
| mal-2026-2513 | Malicious code in gprofiler (npm) | 2026-04-08T11:45:58Z | 2026-04-14T12:40:52Z |
| mal-2026-2512 | Malicious code in roboat-utils (PyPI) | 2026-04-08T09:50:08Z | 2026-04-16T07:40:04Z |
| mal-2026-2510 | Malicious code in @velora-dex/sdk (npm) | 2026-04-08T04:29:51Z | 2026-04-10T17:23:32Z |
| mal-2026-2506 | Malicious code in @fairwords/encryption (npm) | 2026-04-08T04:19:17Z | 2026-04-10T17:23:32Z |
| mal-2026-2507 | Malicious code in @fairwords/loopback-connector-es (npm) | 2026-04-08T04:19:03Z | 2026-04-10T17:23:32Z |
| mal-2026-2508 | Malicious code in @fairwords/websocket (npm) | 2026-04-08T04:18:49Z | 2026-04-10T17:23:32Z |
| mal-2026-2504 | Malicious code in strapi-plugin-cache (npm) | 2026-04-07T16:01:07Z | 2026-04-10T17:23:36Z |
| mal-2026-2505 | Malicious code in @aspect-security/argon2 (npm) | 2026-04-07T12:16:51Z | 2026-04-10T17:23:32Z |
| mal-2026-2511 | Malicious code in argon2-napi (npm) | 2026-04-07T12:15:56Z | 2026-04-10T17:23:32Z |
| mal-2026-2509 | Malicious code in @langgraphjs/toolkit (npm) | 2026-04-07T12:15:13Z | 2026-04-10T17:23:32Z |
| mal-2026-2503 | Malicious code in genesis-1p-tools-rpm-bundle (PyPI) | 2026-04-07T09:41:03Z | 2026-04-07T09:41:03Z |
| mal-2026-2502 | Malicious code in databasenaps (PyPI) | 2026-04-07T04:39:13Z | 2026-04-16T07:40:04Z |
| mal-2026-2501 | Malicious code in databaselooks (PyPI) | 2026-04-07T04:00:02Z | 2026-04-16T07:40:04Z |
| mal-2026-2525 | Malicious code in frontend-backoffice (npm) | 2026-04-06T16:24:27Z | 2026-04-10T17:23:34Z |
| mal-2026-2529 | Malicious code in use-form-builder-plugin (npm) | 2026-04-06T16:16:50Z | 2026-04-14T12:40:55Z |
| mal-2026-2524 | Malicious code in a2a-chat-canvas (npm) | 2026-04-06T16:13:05Z | 2026-04-10T17:23:32Z |
| mal-2026-2526 | Malicious code in request-js-validator (npm) | 2026-04-06T16:07:02Z | 2026-04-10T17:23:36Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0190 | vllm: Mehrere Schwachstellen | 2026-01-21T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0188 | Internet Systems Consortium BIND: Schwachstelle ermöglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0187 | Red Hat Enterprise Linux (glib): Schwachstelle ermöglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0185 | M-Files M-Files Server: Schwachstelle ermöglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0184 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0183 | InetUtils (telnetd): Schwachstelle ermöglicht Erlangen von Administratorrechten | 2026-01-20T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0182 | Apache Solr: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0179 | GNU libc: Schwachstelle ermöglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0177 | Atlassian Bamboo, Bitbucket, Confluence und Jira: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0176 | Google Chrome/Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2026-01-20T23:00:00.000+00:00 | 2026-01-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0174 | Oracle Systems: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0172 | Oracle Virtualization: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0168 | Oracle MySQL: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0164 | Oracle Java SE: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0159 | Oracle E-Business Suite: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0149 | Red Hat OpenStack (keystonemiddleware): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und potenziell Privilegieneskalation | 2026-01-19T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0148 | ImageMagick: Mehrere Schwachstellen | 2026-01-19T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0147 | Keycloak (SAML brokering): Schwachstelle ermöglicht Manipulation von Dateien | 2026-01-19T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0145 | FreeRDP: Mehrere Schwachstellen ermöglichen DoS und Codeausführung | 2026-01-19T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0144 | n8n: Schwachstelle ermöglicht Codeausführung | 2026-01-18T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0138 | Red Hat Enterprise Linux (gpsd): Mehrere Schwachstellen | 2026-01-18T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0136 | AMD EPYC-Prozessoren: Schwachstelle ermöglicht Manipulation von Daten | 2026-01-15T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0135 | Google Fast Pair Bluetooth Protokoll: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-15T23:00:00.000+00:00 | 2026-01-20T23:00:00.000+00:00 |
| wid-sec-w-2026-0132 | GNU libc: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-15T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0129 | Golang Go: Mehrere Schwachstellen | 2026-01-15T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0126 | libxml2: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-15T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0125 | Red Hat Enterprise Linux (transfig): Schwachstelle ermöglicht Codeausführung | 2026-01-14T23:00:00.000+00:00 | 2026-01-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0121 | Drupal Module: Mehrere Schwachstellen | 2026-01-14T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0120 | Red Hat Satellite (satellite/foreman-mcp-server-rhel9): Mehrere Schwachstellen | 2026-01-14T23:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2026-0119 | Linux Kernel: Mehrere Schwachstellen | 2026-01-14T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-226-22 | Siemens Web Installer | 2025-08-12T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-226-21 | Siemens BFCClient | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-20 | Siemens RUGGEDCOM ROX II | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-19 | Siemens SINUMERIK | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-18 | Siemens SIMOTION SCOUT, SIMOTION SCOUT TIA, and SINAMICS STARTER | 2025-08-12T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-25-226-17 | Siemens SINEC Traffic Analyzer | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-16 | Siemens SICAM Q100/Q200 | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-15 | Siemens SINEC OS | 2025-08-12T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-25-226-14 | Siemens RUGGEDCOM ROX II | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-13 | Siemens SIMATIC RTLS Locating Manager | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-12 | Siemens SIPROTEC 4 and SIPROTEC 4 Compact | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-11 | Siemens SIMATIC S7-PLCSIM | 2025-08-12T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-226-10 | Siemens SIPROTEC 5 | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-09 | Siemens RUGGEDCOM APE1808 | 2025-08-12T00:00:00.000000Z | 2026-01-14T22:05:42.880807Z |
| icsa-25-226-08 | Siemens RUGGEDCOM CROSSBOW Station Access Controller | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-07 | Siemens Third-Party Components in SINEC OS | 2025-08-12T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-25-226-06 | Siemens Opcenter Quality | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-05 | Siemens WIBU CodeMeter Runtime | 2025-08-12T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| icsa-25-226-04 | Siemens Simcenter Femap | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-03 | Siemens SIMATIC S7-PLCSIM | 2025-08-12T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-226-02 | Siemens COMOS | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-01 | Siemens SIMATIC RTLS Locating Manager | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-219-08 | Yealink IP Phones and RPS (Redirect and Provisioning Service) | 2025-08-07T06:00:00.000000Z | 2025-08-07T06:00:00.000000Z |
| icsa-25-219-07 | EG4 Electronics EG4 Inverters (Update B) | 2025-08-07T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-219-05 | Packet Power EMX and EG | 2025-08-07T06:00:00.000000Z | 2025-08-07T06:00:00.000000Z |
| icsa-25-219-04 | Rockwell Automation Arena | 2025-08-07T06:00:00.000000Z | 2025-08-07T06:00:00.000000Z |
| icsa-25-219-03 | Burk Technology ARC Solo | 2025-08-07T06:00:00.000000Z | 2025-08-07T06:00:00.000000Z |
| icsa-25-219-02 | Johnson Controls FX Server, FX80 and FX90 (Update A) | 2025-08-07T06:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-219-01 | Delta Electronics DIAView | 2025-08-07T06:00:00.000000Z | 2025-08-07T06:00:00.000000Z |
| icsa-25-219-06 | Dreame Technology iOS and Android Mobile Applications | 2025-08-07T04:00:00.000000Z | 2025-08-07T04:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-utd-snort3-dos-bypas-b4ouewxd | Cisco Unified Threat Defense Snort Intrusion Prevention System Engine for Cisco IOS XE Software Security Policy Bypass and Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-sdwan-xss-zq4kpvyd | Cisco Catalyst SD-WAN Manager Cross-Site Scripting Vulnerability | 2024-09-25T16:00:00+00:00 | 2025-03-28T18:38:53+00:00 |
| cisco-sa-sdwan-utd-dos-hdatqxs | Cisco Catalyst SD-WAN Routers Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-sdw-vedos-kqffhps3 | Cisco SD-WAN vEdge Software UDP Packet Validation Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-rsvp-dos-oypvgvzf | Cisco IOS and IOS XE Software Resource Reservation Protocol Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-repacl-9exgnbpd | Cisco IOS Software on Cisco Industrial Ethernet Series Switches Access Control List Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-pim-apbvfysj | Cisco IOS XE Software Protocol Independent Multicast Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-xe-sda-edge-dos-mbcbg9k | Cisco IOS XE Software SD-Access Fabric Edge Node Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-webui-hfwnrgk | Cisco IOS and IOS XE Software Web UI Cross-Site Request Forgery Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-httpsrvr-dos-yozthut | Cisco IOS XE Software HTTP Server Telephony Services Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-dnac-ssh-e4uodasj | Cisco Catalyst Center Static SSH Host Key Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-cpp-vfr-dos-nhhkggo | Cisco IOS XE Software IPv4 Fragmentation Reassembly Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-c9800-cwa-acl-npsbhsna | Cisco IOS XE Software for Wireless Controllers CWA Pre-Authentication ACL Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-pak-mem-exhst-3ke9fefy | Cisco IOS XR Software UDP Packet Memory Exhaustion Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-nso-auth-bypass-qnteesp | Multiple Cisco Products Web-Based Management Interface Privilege Escalation Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-25T13:05:54+00:00 |
| cisco-sa-l2services-2mvhdnuc | Cisco IOS XR Software Network Convergence System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-isis-xehpbvne | Cisco IOS XR Software Segment Routing for Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-xml-tcpdos-zexvru2s | Cisco IOS XR Software Dedicated XML Agent TCP Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-shellutil-hcb278wd | Cisco IOS XR Software CLI Arbitrary File Read Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-priv-esc-crg5vhcq | Cisco IOS XR Software CLI Privilege Escalation Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-ponctlr-ci-ohchmsfl | Cisco Routed Passive Optical Network Controller Vulnerabilities | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-meraki-agent-dll-hj-ptn7ptke | Cisco Meraki Systems Manager Agent for Windows Privilege Escalation Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-ise-injection-6kn9tsxm | Cisco Identity Services Engine Command Injection Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-expressway-auth-kdfrcz2j | Cisco Expressway Edge Improper Authorization Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-duo-epic-info-sdlv6h8y | Cisco Duo Epic for Hyperdrive Information Disclosure Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-cslu-7ghmzwmw | Cisco Smart Licensing Utility Vulnerabilities | 2024-09-04T16:00:00+00:00 | 2025-04-04T17:44:00+00:00 |
| cisco-sa-nxos-psbe-ce-yvbtn5du | Cisco NX-OS Software Python Sandbox Escape Vulnerabilities | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-nxos-dhcp6-relay-dos-zneaa6xn | Cisco NX-OS Software DHCPv6 Relay Agent Denial of Service Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-nxos-cmdinj-lq6jszhh | Cisco NX-OS Software Command Injection Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-nxos-bshacepe-bapehsx7 | Cisco NX-OS Software Bash Arbitrary Code Execution and Privilege Escalation Vulnerabilities | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-26112 | Microsoft Excel Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26111 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-13T07:00:00.000Z |
| msrc_cve-2026-26110 | Microsoft Office Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26109 | Microsoft Excel Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26108 | Microsoft Excel Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26107 | Microsoft Excel Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26106 | Microsoft SharePoint Server Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26105 | Microsoft SharePoint Server Spoofing Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25190 | GDI Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25189 | Windows DWM Core Library Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25188 | Windows Telephony Service Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25187 | Winlogon Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25186 | Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25185 | Windows Shell Link Processing Spoofing Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25181 | GDI+ Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25180 | Windows Graphics Component Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25179 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25178 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25177 | Active Directory Domain Services Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25176 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25175 | Windows NTFS Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25174 | Windows Extensible File Allocation Table Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25173 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-13T07:00:00.000Z |
| msrc_cve-2026-25172 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-13T07:00:00.000Z |
| msrc_cve-2026-25171 | Windows Authentication Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25170 | Windows Hyper-V Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25169 | Windows Graphics Component Denial of Service Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25168 | Windows Graphics Component Denial of Service Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25167 | Microsoft Brokering File System Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25166 | Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0197 | Kwetsbaarheid verholpen in GeoServer | 2025-06-18T10:17:42.472544Z | 2025-06-18T10:17:42.472544Z |
| ncsc-2025-0196 | Kwetsbaarheden verholpen in Citrix NetScaler ADC en NetScaler Gateway | 2025-06-18T08:32:32.792202Z | 2025-07-18T09:51:52.738778Z |
| ncsc-2025-0195 | Kwetsbaarheden verholpen in Apache Tomcat | 2025-06-18T08:01:06.984131Z | 2025-06-18T08:01:06.984131Z |
| ncsc-2025-0194 | Kwetsbaarheden verholpen in Trend Micro Apex One en Apex Central | 2025-06-12T11:12:33.408725Z | 2025-06-12T11:12:33.408725Z |
| ncsc-2025-0193 | Kwetsbaarheden verholpen in Ivanti Workspace Control | 2025-06-12T11:08:41.247215Z | 2025-06-12T11:08:41.247215Z |
| ncsc-2025-0192 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2025-06-12T11:04:45.167843Z | 2025-06-12T11:04:45.167843Z |
| ncsc-2025-0191 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2025-06-11T06:58:19.840921Z | 2025-06-11T06:58:19.840921Z |
| ncsc-2025-0190 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-06-10T18:46:10.932182Z | 2025-06-10T18:46:10.932182Z |
| ncsc-2025-0189 | Kwetsbaarheden verholpen in Microsoft Office | 2025-06-10T18:45:25.061778Z | 2025-06-10T18:45:25.061778Z |
| ncsc-2025-0188 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-06-10T18:43:18.187461Z | 2025-06-10T18:43:18.187461Z |
| ncsc-2025-0187 | Kwetsbaarheden verholpen in Siemens producten | 2025-06-10T13:11:56.672768Z | 2025-06-10T13:11:56.672768Z |
| ncsc-2025-0186 | Kwetsbaarheden verholpen in SAP Producten | 2025-06-10T10:15:56.898255Z | 2025-06-10T10:15:56.898255Z |
| ncsc-2025-0185 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-06-10T07:19:02.701613Z | 2025-06-10T07:19:02.701613Z |
| ncsc-2025-0184 | Kwetsbaarheden verholpen in HPE StoreOnce Software | 2025-06-05T10:37:04.196801Z | 2025-06-05T10:37:04.196801Z |
| ncsc-2025-0183 | Kwetsbaarheid verholpen in Cisco Identity Services Engine voor cloudplatformen | 2025-06-05T10:25:46.291683Z | 2025-06-05T10:25:46.291683Z |
| ncsc-2025-0182 | Kwetsbaarheden verholpen in Google Chrome en Microsoft Edge | 2025-06-03T07:52:36.009178Z | 2025-06-10T18:44:36.060357Z |
| ncsc-2025-0181 | Kwetsbaarheid verholpen in Roundcube Webmail | 2025-06-02T09:04:58.900416Z | 2025-06-05T14:19:00.303593Z |
| ncsc-2025-0180 | Kwetsbaarheid verholpen in IBM Tivoli Monitoring | 2025-06-02T09:00:25.515472Z | 2025-06-02T09:00:25.515472Z |
| ncsc-2025-0179 | Kwetsbaarheid verholpen in Siemens SiPass Integrated | 2025-05-27T11:42:46.878569Z | 2025-05-27T11:42:46.878569Z |
| ncsc-2025-0178 | Kwetsbaarheden verholpen in Infoblox NETMRI | 2025-05-23T08:55:37.586046Z | 2025-05-23T08:55:37.586046Z |
| ncsc-2025-0177 | Kwetsbaarheden verholpen in ABB ASPECT-productlijn | 2025-05-23T08:40:56.272804Z | 2025-05-23T08:40:56.272804Z |
| ncsc-2025-0176 | Kwetsbaarheden verholpen in GitLab | 2025-05-23T08:38:34.688022Z | 2025-05-23T08:38:34.688022Z |
| ncsc-2025-0175 | Kwetsbaarheden verholpen in Trend Micro Apex Central | 2025-05-23T08:28:52.215347Z | 2025-05-23T08:28:52.215347Z |
| ncsc-2025-0174 | Kwetsbaarheden verholpen in Cisco Unified Intelligence Center | 2025-05-22T08:14:14.245836Z | 2025-05-22T08:14:14.245836Z |
| ncsc-2025-0173 | Kwetsbaarheid verholpen in Cisco Identity Services Engine | 2025-05-22T08:14:06.046824Z | 2025-05-22T08:14:06.046824Z |
| ncsc-2025-0172 | Kwetsbaarheden verholpen in Cisco Webex | 2025-05-22T08:13:51.228348Z | 2025-05-22T08:13:51.228348Z |
| ncsc-2025-0171 | Kwetsbaarheden verholpen in VMware producten | 2025-05-21T13:08:22.714183Z | 2025-05-21T13:08:22.714183Z |
| ncsc-2025-0170 | Kwetsbaarheden verholpen in VMware Cloud Foundation | 2025-05-21T09:12:05.676292Z | 2025-05-21T09:12:05.676292Z |
| ncsc-2025-0169 | Kwetsbaarheden verholpen in Google Chrome | 2025-05-16T12:41:47.685095Z | 2025-05-16T12:41:47.685095Z |
| ncsc-2025-0168 | Kwetsbaarheid verholpen in FortiVoice | 2025-05-14T13:50:54.001151Z | 2025-05-14T13:50:54.001151Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10224-1 | rclone-1.73.1-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10223-1 | python313-3.13.12-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10222-1 | python312-3.12.12-5.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10221-1 | python311-3.11.14-4.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10220-1 | istioctl-1.28.4-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10219-1 | dnsdist-2.0.2-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10218-1 | MozillaThunderbird-140.7.2-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:20244-1 | Security update for cockpit-machines, cockpit | 2026-02-17T14:20:44Z | 2026-02-17T14:20:44Z |
| opensuse-su-2026:20245-1 | Security update for wicked2nm | 2026-02-17T14:08:05Z | 2026-02-17T14:08:05Z |
| opensuse-su-2026:20239-1 | Security update for golang-github-prometheus-prometheus | 2026-02-17T09:54:15Z | 2026-02-17T09:54:15Z |
| opensuse-su-2026:10217-1 | traefik-3.6.8-1.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10216-1 | python311-asgiref-3.11.1-1.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10215-1 | owntone-29.0-2.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10214-1 | mupdf-1.27.1-1.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10213-1 | libxml2-16-2.14.5-4.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10212-1 | firefox-esr-140.7.1-1.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10211-1 | azure-cli-core-2.83.0-2.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10210-1 | python311-pip-26.0.1-1.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10209-1 | libsoup-2_4-1-2.74.3-16.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10208-1 | libsoup-3_0-0-3.6.5-13.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10207-1 | frr-10.2.1-4.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:20236-1 | Security update for nodejs22 | 2026-02-15T09:26:17Z | 2026-02-15T09:26:17Z |
| opensuse-su-2026:20235-1 | Security update for fontforge | 2026-02-14T21:30:01Z | 2026-02-14T21:30:01Z |
| opensuse-su-2026:10206-1 | python314-3.14.3-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10205-1 | python311-cryptography-46.0.5-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10204-1 | openjfx-17.0.18.0-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10203-1 | libssh-config-0.11.4-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10202-1 | himmelblau-2.3.5+git0.9dd526c-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10201-1 | chromedriver-145.0.7632.45-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:20233-1 | Security update for openCryptoki | 2026-02-13T17:42:04Z | 2026-02-13T17:42:04Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:5445 | Red Hat Security Advisory: valkey security update | 2026-03-23T17:49:33+00:00 | 2026-04-09T14:40:02+00:00 |
| rhsa-2026:5461 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-23T17:44:49+00:00 | 2026-04-14T09:46:51+00:00 |
| rhsa-2026:5463 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T16:40:06+00:00 | 2026-04-14T07:59:25+00:00 |
| rhsa-2026:5459 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T16:21:50+00:00 | 2026-04-12T14:08:53+00:00 |
| rhsa-2026:5452 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T16:13:04+00:00 | 2026-04-14T07:59:24+00:00 |
| rhsa-2026:5399 | Red Hat Security Advisory: python3.12 security update | 2026-03-23T16:06:09+00:00 | 2026-04-09T15:17:13+00:00 |
| rhsa-2026:5447 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T16:03:55+00:00 | 2026-04-14T07:59:24+00:00 |
| rhsa-2026:5444 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T15:45:35+00:00 | 2026-04-14T07:59:24+00:00 |
| rhsa-2026:5434 | Red Hat Security Advisory: gimp:2.8 security update | 2026-03-23T15:40:39+00:00 | 2026-03-23T19:18:24+00:00 |
| rhsa-2026:5439 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T15:37:52+00:00 | 2026-04-14T07:59:24+00:00 |
| rhsa-2026:5437 | Red Hat Security Advisory: gimp:2.8 security update | 2026-03-23T15:37:44+00:00 | 2026-03-23T19:18:24+00:00 |
| rhsa-2026:5436 | Red Hat Security Advisory: gimp:2.8 security update | 2026-03-23T15:26:50+00:00 | 2026-03-23T19:18:24+00:00 |
| rhsa-2026:5435 | Red Hat Security Advisory: gimp:2.8 security update | 2026-03-23T15:26:49+00:00 | 2026-03-23T19:18:24+00:00 |
| rhsa-2026:5391 | Red Hat Security Advisory: gimp security update | 2026-03-23T15:14:34+00:00 | 2026-03-23T19:18:22+00:00 |
| rhsa-2026:5393 | Red Hat Security Advisory: python security update | 2026-03-23T14:28:39+00:00 | 2026-04-09T15:17:08+00:00 |
| rhsa-2026:5394 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 director Operator container images | 2026-03-23T13:04:11+00:00 | 2026-04-14T09:46:50+00:00 |
| rhsa-2026:5389 | Red Hat Security Advisory: gimp security update | 2026-03-23T13:03:19+00:00 | 2026-03-23T19:18:24+00:00 |
| rhsa-2026:5390 | Red Hat Security Advisory: gimp security update | 2026-03-23T13:02:14+00:00 | 2026-03-23T19:18:24+00:00 |
| rhsa-2026:5388 | Red Hat Security Advisory: gimp security update | 2026-03-23T12:57:44+00:00 | 2026-03-23T19:18:19+00:00 |
| rhsa-2026:5327 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-23T07:40:40+00:00 | 2026-04-14T09:46:50+00:00 |
| rhsa-2026:5326 | Red Hat Security Advisory: libvpx security update | 2026-03-23T07:17:43+00:00 | 2026-03-23T13:12:21+00:00 |
| rhsa-2026:5324 | Red Hat Security Advisory: libvpx security update | 2026-03-23T06:53:03+00:00 | 2026-03-23T13:12:20+00:00 |
| rhsa-2026:5320 | Red Hat Security Advisory: libvpx security update | 2026-03-23T06:51:33+00:00 | 2026-03-23T13:12:23+00:00 |
| rhsa-2026:5323 | Red Hat Security Advisory: libvpx security update | 2026-03-23T06:44:58+00:00 | 2026-03-23T13:12:21+00:00 |
| rhsa-2026:5319 | Red Hat Security Advisory: libvpx security update | 2026-03-23T06:27:12+00:00 | 2026-03-23T13:12:23+00:00 |
| rhsa-2026:5315 | Red Hat Security Advisory: python3.12 security update | 2026-03-23T05:31:13+00:00 | 2026-04-09T15:17:07+00:00 |
| rhsa-2026:5231 | Red Hat Security Advisory: libvpx security update | 2026-03-23T04:03:52+00:00 | 2026-03-23T13:12:19+00:00 |
| rhsa-2026:5226 | Red Hat Security Advisory: python3.9 security update | 2026-03-23T04:02:32+00:00 | 2026-04-09T15:17:07+00:00 |
| rhsa-2026:5225 | Red Hat Security Advisory: python3.9 security update | 2026-03-23T03:31:47+00:00 | 2026-04-09T15:17:07+00:00 |
| rhsa-2026:5229 | Red Hat Security Advisory: libvpx security update | 2026-03-23T03:09:47+00:00 | 2026-03-23T13:12:21+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-836777 | SSA-836777: JT File Parsing Vulnerabilities in JT Open, JT Utilities and Parasolid | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-744259 | SSA-744259: Golang Vulnerabilities in Brownfield Connectivity - Gateway before V1.10.1 | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-686975 | SSA-686975: IPU 2022.3 Vulnerabilities in Siemens Industrial Products using Intel CPUs | 2023-02-14T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-658793 | SSA-658793: Command Injection Vulnerability in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-640968 | SSA-640968: Untrusted Search Path Vulnerability in TIA Project-Server formerly known as TIA Multiuser Server | 2023-02-14T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-617755 | SSA-617755: Denial of Service Vulnerability in the SNMP Agent of SCALANCE X-200IRT Products | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-565356 | SSA-565356: X_T File Parsing Vulnerabilities in Simcenter Femap before V2023.1 | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-491245 | SSA-491245: Multiple File Parsing Vulnerabilities in Solid Edge | 2023-02-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-450613 | SSA-450613: Insyde BIOS Vulnerabilities in RUGGEDCOM APE1808 Product Family | 2023-02-14T00:00:00Z | 2023-09-12T00:00:00Z |
| ssa-252808 | SSA-252808: XPath Constraint Vulnerability in Mendix Runtime | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-997779 | SSA-997779: File Parsing Vulnerability in Solid Edge before V2023 MP1 | 2023-01-10T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-936212 | SSA-936212: JT File Parsing Vulnerabilities in JT Open, JT Utilities and Solid Edge | 2023-01-10T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-496604 | SSA-496604: Cross-Site Scripting Vulnerability in Mendix SAML Module | 2023-01-10T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-482757 | SSA-482757: Missing Immutable Root of Trust in S7-1500 CPU devices | 2023-01-10T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-476715 | SSA-476715: Two Vulnerabilities in Automation License Manager | 2023-01-10T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-332410 | SSA-332410: Multiple Vulnerabilities in SINEC INS before V1.0 SP2 Update 1 | 2023-01-10T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-930100 | SSA-930100: Privilege Escalation Vulnerability in Simcenter STAR-CCM+ | 2022-12-13T00:00:00Z | 2023-07-11T00:00:00Z |
| ssa-849072 | SSA-849072: Several Vulnerabilities in SICAM PAS before V8.06 | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-792594 | SSA-792594: Host Header Injection Vulnerability in Polarion ALM | 2022-12-13T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-700053 | SSA-700053: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2022-12-13T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-588101 | SSA-588101: Multiple File Parsing Vulnerabilities in Parasolid | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-552874 | SSA-552874: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2022-12-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-547714 | SSA-547714: Argument Injection Vulnerability in SIMATIC WinCC OA Ultralight Client | 2022-12-13T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-436469 | SSA-436469: TCP Vulnerability in APOGEE/TALON Field Panels | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-413565 | SSA-413565: Multiple Vulnerabilities in SCALANCE Products | 2022-12-13T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-412672 | SSA-412672: Multiple OpenSSL and OpenSSH Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-408105 | SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products | 2022-12-13T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-382653 | SSA-382653: Multiple Denial of Service Vulnerabilities in Industrial Products | 2022-12-13T00:00:00Z | 2023-09-12T00:00:00Z |
| ssa-363821 | SSA-363821: Multiple Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-360681 | SSA-360681: Datalogics File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20983-1 | Security update for postgresql16 | 2026-03-30T14:26:12Z | 2026-03-30T14:26:12Z |
| suse-su-2026:1149-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T13:44:05Z | 2026-03-30T13:44:05Z |
| suse-su-2026:1148-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T11:21:20Z | 2026-03-30T11:21:20Z |
| suse-su-2026:1146-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:17:48Z | 2026-03-30T09:17:48Z |
| suse-su-2026:1142-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:16:26Z | 2026-03-30T09:16:26Z |
| suse-su-2026:1141-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:16:08Z | 2026-03-30T09:16:08Z |
| suse-su-2026:1140-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:15:49Z | 2026-03-30T09:15:49Z |
| suse-su-2026:1139-1 | Security update for webkit2gtk3 | 2026-03-30T09:13:58Z | 2026-03-30T09:13:58Z |
| suse-su-2026:20982-1 | Security update for tomcat10 | 2026-03-30T08:17:19Z | 2026-03-30T08:17:19Z |
| suse-su-2026:1137-1 | Security update for expat | 2026-03-28T02:34:02Z | 2026-03-28T02:34:02Z |
| suse-su-2026:1136-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T18:04:04Z | 2026-03-27T18:04:04Z |
| suse-su-2026:20978-1 | Security update for MozillaFirefox | 2026-03-27T17:19:44Z | 2026-03-27T17:19:44Z |
| suse-su-2026:1132-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T16:04:11Z | 2026-03-27T16:04:11Z |
| suse-su-2026:1131-1 | Security update for the Linux Kernel | 2026-03-27T16:02:21Z | 2026-03-27T16:02:21Z |
| suse-su-2026:1130-1 | Security update for the Linux Kernel | 2026-03-27T15:47:44Z | 2026-03-27T15:47:44Z |
| suse-su-2026:1129-1 | Security update for freerdp | 2026-03-27T15:05:09Z | 2026-03-27T15:05:09Z |
| suse-su-2026:1127-1 | Security update for MozillaFirefox | 2026-03-27T14:43:04Z | 2026-03-27T14:43:04Z |
| suse-su-2026:1126-1 | Security update for MozillaFirefox | 2026-03-27T14:42:09Z | 2026-03-27T14:42:09Z |
| suse-su-2026:1124-1 | Security update for LibVNCServer | 2026-03-27T14:22:08Z | 2026-03-27T14:22:08Z |
| suse-su-2026:1125-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T14:04:13Z | 2026-03-27T14:04:13Z |
| suse-su-2026:1118-1 | Security update for docker-stable | 2026-03-27T12:26:18Z | 2026-03-27T12:26:18Z |
| suse-su-2026:1117-1 | Security update for python311 | 2026-03-27T11:34:35Z | 2026-03-27T11:34:35Z |
| suse-su-2026:20976-1 | Security update for docker-compose | 2026-03-27T10:09:30Z | 2026-03-27T10:09:30Z |
| suse-su-2026:20949-1 | Security update for docker-compose | 2026-03-27T10:09:30Z | 2026-03-27T10:09:30Z |
| suse-su-2026:20950-1 | Security update for nghttp2 | 2026-03-27T09:43:31Z | 2026-03-27T09:43:31Z |
| suse-su-2026:1107-1 | Security update for python312 | 2026-03-27T09:04:01Z | 2026-03-27T09:04:01Z |
| suse-su-2026:1102-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T08:05:21Z | 2026-03-27T08:05:21Z |
| suse-su-2026:1105-1 | Security update for containerd | 2026-03-27T07:03:20Z | 2026-03-27T07:03:20Z |
| suse-su-2026:1099-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T04:33:50Z | 2026-03-27T04:33:50Z |
| suse-su-2026:1096-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T04:04:40Z | 2026-03-27T04:04:40Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:1344 | Important: grafana security update | 2026-01-27T00:00:00Z | 2026-01-29T12:12:24Z |
| alsa-2026:1334 | Moderate: glibc security update | 2026-01-27T00:00:00Z | 2026-01-29T12:29:45Z |
| alsa-2026:1254 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-29T12:14:07Z |
| alsa-2026:1241 | Important: resource-agents security update | 2026-01-26T00:00:00Z | 2026-04-14T07:53:22Z |
| alsa-2026:1240 | Important: fence-agents security update | 2026-01-26T00:00:00Z | 2026-04-15T07:17:05Z |
| alsa-2026:1239 | Important: fence-agents security update | 2026-01-26T00:00:00Z | 2026-02-02T11:30:59Z |
| alsa-2026:1226 | Important: python3.12-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:21:23Z |
| alsa-2026:1224 | Important: python3.11-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:28:50Z |
| alsa-2026:1178 | Moderate: kernel security update | 2026-01-26T00:00:00Z | 2026-02-02T11:36:10Z |
| alsa-2026:1148 | Important: kernel-rt security update | 2026-01-26T00:00:00Z | 2026-01-26T13:52:56Z |
| alsa-2026:1143 | Important: kernel security update | 2026-01-26T00:00:00Z | 2026-01-30T09:51:59Z |
| alsa-2026:1142 | Important: kernel security update | 2026-01-26T00:00:00Z | 2026-01-26T13:49:21Z |
| alsa-2026:1089 | Important: python3.11-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:15:08Z |
| alsa-2026:1088 | Important: python3.12-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:17:27Z |
| alsa-2026:1087 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:19:22Z |
| alsa-2026:1086 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-26T13:16:32Z |
| alsa-2026:0933 | Important: java-25-openjdk security update | 2026-01-26T00:00:00Z | 2026-01-28T14:39:55Z |
| alsa-2026:0932 | Important: java-1.8.0-openjdk security update | 2026-01-26T00:00:00Z | 2026-01-29T13:07:43Z |
| alsa-2026:0991 | Moderate: glib2 security update | 2026-01-22T00:00:00Z | 2026-01-24T01:40:03Z |
| alsa-2026:0975 | Moderate: glib2 security update | 2026-01-22T00:00:00Z | 2026-01-23T23:34:09Z |
| alsa-2026:0928 | Important: java-21-openjdk security update | 2026-01-22T00:00:00Z | 2026-01-26T11:04:56Z |
| alsa-2026:0927 | Important: java-17-openjdk security update | 2026-01-22T00:00:00Z | 2026-01-24T01:52:06Z |
| alsa-2026:0936 | Moderate: glib2 security update | 2026-01-21T00:00:00Z | 2026-01-24T01:44:09Z |
| alsa-2026:0930 | Moderate: pcs security update | 2026-01-21T00:00:00Z | 2026-01-24T01:46:11Z |
| alsa-2026:0924 | Important: thunderbird security update | 2026-01-21T00:00:00Z | 2026-01-24T01:47:12Z |
| alsa-2026:0923 | Important: golang security update | 2026-01-21T00:00:00Z | 2026-01-24T01:54:58Z |
| alsa-2026:0922 | Important: golang security update | 2026-01-21T00:00:00Z | 2026-01-23T23:39:55Z |
| alsa-2026:0921 | Important: go-toolset:rhel8 security update | 2026-01-21T00:00:00Z | 2026-01-26T10:07:11Z |
| alsa-2026:0914 | Important: gimp security update | 2026-01-21T00:00:00Z | 2026-01-26T10:10:46Z |
| alsa-2026:0845 | Important: brotli security update | 2026-01-20T00:00:00Z | 2026-01-21T10:45:25Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-1310 | Use-of-uninitialized-value in decompress_yuv.cc | 2024-11-15T00:03:32.569897Z | 2024-11-15T00:03:32.570195Z |
| osv-2024-1297 | Heap-buffer-overflow in rijndaelSetupEncrypt | 2024-11-09T00:13:03.370689Z | 2024-11-09T00:13:03.371200Z |
| osv-2024-1293 | Use-of-uninitialized-value in k5_hashtab_add | 2024-11-08T00:16:09.025852Z | 2024-11-08T00:16:09.026399Z |
| osv-2024-1282 | Segv on unknown address in udiv | 2024-11-05T00:16:47.572692Z | 2024-11-05T00:16:47.573042Z |
| osv-2024-1279 | Heap-buffer-overflow in opj_j2k_read_tile_header | 2024-11-05T00:12:57.052133Z | 2024-11-05T00:12:57.052585Z |
| osv-2024-1274 | Segv on unknown address in yara_yyparse | 2024-11-05T00:04:03.220856Z | 2025-06-03T14:42:15.782999Z |
| osv-2024-1272 | Segv on unknown address in std::__1::ios_base::~ios_base | 2024-11-05T00:03:30.787980Z | 2025-04-17T14:38:30.981292Z |
| osv-2022-1288 | Stack-buffer-overflow in bool SmilesParseOps::parser::parse_atom_props<std::__1::__wrap_iter<char const*> | 2024-11-04T00:16:22.516312Z | 2026-03-27T14:17:53.064285Z |
| osv-2024-1266 | UNKNOWN READ in llama_output_reserve | 2024-11-03T00:14:31.568857Z | 2024-11-03T00:14:31.569247Z |
| osv-2024-1261 | Stack-buffer-overflow in _pcre2_compile_class_not_nested_16 | 2024-11-02T00:11:51.445365Z | 2024-11-02T00:11:51.445768Z |
| osv-2024-1254 | Security exception in org.apache.lucene.util.ArrayUtil.growExact | 2024-11-01T00:07:39.301298Z | 2026-02-26T14:30:06.734190Z |
| osv-2024-1253 | Segv on unknown address in llama_output_reserve | 2024-11-01T00:03:18.217276Z | 2024-11-01T00:03:18.217677Z |
| osv-2023-1398 | Heap-buffer-overflow in load_1 | 2024-11-01T00:02:38.719507Z | 2024-11-01T00:02:38.719949Z |
| osv-2024-1251 | UNKNOWN WRITE in s_DCTD_process | 2024-11-01T00:02:31.749497Z | 2025-04-29T14:29:01.935923Z |
| osv-2024-1249 | Heap-buffer-overflow in extract_ice_option | 2024-10-30T00:15:55.709182Z | 2025-03-18T00:40:00.171776Z |
| osv-2024-1244 | Heap-buffer-overflow in extract_fmtp | 2024-10-27T00:10:45.337287Z | 2024-11-06T14:24:14.483448Z |
| osv-2024-1241 | Heap-buffer-overflow in polygonToCellsExperimental | 2024-10-25T00:13:57.330581Z | 2024-10-25T00:13:57.331154Z |
| osv-2024-1239 | Heap-buffer-overflow in convsamp | 2024-10-24T00:06:22.931512Z | 2024-10-25T14:18:35.097668Z |
| osv-2024-1237 | Use-of-uninitialized-value in jit_compile | 2024-10-22T00:13:19.495791Z | 2024-10-22T00:13:19.496460Z |
| osv-2024-1232 | Segv on unknown address in cranelift_filetests::function_runner::Trampoline::call::hb2e77cf3a13ebaf4 | 2024-10-19T00:15:15.010866Z | 2024-10-19T00:15:15.011237Z |
| osv-2024-1230 | Heap-buffer-overflow in extract_rtpmap | 2024-10-19T00:00:26.792754Z | 2025-01-10T05:21:03.406469Z |
| osv-2024-1220 | UNKNOWN READ in Assimp::NDOImporter::InternReadFile | 2024-10-14T00:17:45.088625Z | 2026-01-25T14:14:41.961973Z |
| osv-2024-1218 | UNKNOWN READ in Poco::UTF16Encoding::queryConvert | 2024-10-14T00:08:40.382545Z | 2025-04-10T14:48:52.198172Z |
| osv-2024-1216 | Use-of-uninitialized-value in Poco::Net::NTLMCredentials::parseChallengeMessage | 2024-10-13T00:11:43.323181Z | 2025-03-18T00:32:42.736858Z |
| osv-2024-1212 | Heap-buffer-overflow in cram_encode_container | 2024-10-11T00:16:27.350249Z | 2024-10-11T00:16:27.350643Z |
| osv-2024-1210 | Heap-buffer-overflow in parse_mixed_content | 2024-10-11T00:15:50.054920Z | 2025-01-10T05:11:11.351763Z |
| osv-2024-1209 | Heap-use-after-free in xmlValidateOneElement | 2024-10-11T00:15:43.610812Z | 2025-03-18T00:30:11.577855Z |
| osv-2024-1206 | Heap-buffer-overflow in extract_sendrecv_mode | 2024-10-11T00:13:47.835312Z | 2025-01-10T05:11:09.130549Z |
| osv-2024-1205 | Memcpy-param-overlap in repeat | 2024-10-11T00:12:59.211479Z | 2025-06-02T14:22:48.890155Z |
| osv-2024-1203 | Global-buffer-overflow in AnnouncePunctuation | 2024-10-11T00:02:53.598773Z | 2024-10-11T00:02:53.599146Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0356 | `UserIdentity::is_verified` not checking verification status of own user identity while performing the check | 2024-07-18T12:00:00Z | 2024-07-19T10:11:38Z |
| rustsec-2024-0355 | gix-path can use a fake program files location | 2024-07-18T12:00:00Z | 2024-07-18T16:46:06Z |
| rustsec-2024-0354 | Usage of non-constant time base64 decoder could lead to leakage of secret key material | 2024-07-17T12:00:00Z | 2024-07-18T11:24:58Z |
| rustsec-2024-0369 | phonenumber: panic on parsing crafted phonenumber inputs | 2024-07-07T12:00:00Z | 2024-09-05T13:40:37Z |
| rustsec-2024-0442 | Dump Undefined Memory by `JitDumpFile` | 2024-07-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0389 | `openslide` is unmaintained | 2024-07-03T12:00:00Z | 2024-11-10T13:42:14Z |
| rustsec-2024-0387 | `opentelemetry_api` has been merged into the `opentelemetry` crate | 2024-07-03T12:00:00Z | 2024-11-10T13:29:25Z |
| rustsec-2024-0347 | Incorrect usage of `#[repr(packed)]` | 2024-07-01T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0346 | Incorrect usage of `#[repr(packed)]` | 2024-07-01T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0388 | `derivative` is unmaintained; consider using an alternative | 2024-06-26T12:00:00Z | 2024-11-10T13:34:40Z |
| rustsec-2024-0345 | Low severity (DoS) vulnerability in sequoia-openpgp | 2024-06-26T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0395 | The maintainer of chrono-english is unresponsive | 2024-06-24T12:00:00Z | 2024-11-10T20:38:56Z |
| rustsec-2024-0344 | Timing variability in `curve25519-dalek`'s `Scalar29::sub`/`Scalar52::sub` | 2024-06-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0394 | mmap unmaintained | 2024-06-10T12:00:00Z | 2024-11-10T14:06:58Z |
| rustsec-2024-0343 | Reduced entropy due to inadequate character set usage | 2024-06-03T12:00:00Z | 2024-06-15T13:11:33Z |
| rustsec-2024-0353 | Refs and paths with reserved Windows device names access the devices | 2024-05-22T12:00:00Z | 2024-07-08T15:14:36Z |
| rustsec-2024-0352 | Refs and paths with reserved Windows device names access the devices | 2024-05-22T12:00:00Z | 2024-07-08T15:14:36Z |
| rustsec-2024-0351 | Refs and paths with reserved Windows device names access the devices | 2024-05-22T12:00:00Z | 2024-07-08T15:14:36Z |
| rustsec-2024-0350 | Traversal outside working tree enables arbitrary code execution | 2024-05-22T12:00:00Z | 2024-07-08T15:12:43Z |
| rustsec-2024-0349 | Traversal outside working tree enables arbitrary code execution | 2024-05-22T12:00:00Z | 2024-07-08T15:12:43Z |
| rustsec-2024-0348 | Traversal outside working tree enables arbitrary code execution | 2024-05-22T12:00:00Z | 2024-07-08T15:12:43Z |
| rustsec-2024-0406 | BTreeMap memory leak when deallocating nodes with overflows | 2024-05-17T12:00:00Z | 2024-12-04T12:44:24Z |
| rustsec-2024-0340 | Tor path lengths too short when "full Vanguards" configured | 2024-05-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0339 | Tor path lengths too short when "Vanguards lite" configured | 2024-05-15T12:00:00Z | 2024-05-21T02:12:32Z |
| rustsec-2024-0342 | Degraded secret zeroization capabilities | 2024-05-02T12:00:00Z | 2024-05-20T15:25:56Z |
| rustsec-2024-0338 | Arithmetic overflows in cosmwasm-std | 2024-04-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0337 | The crate `zip_next` has been renamed to `zip`. | 2024-04-20T12:00:00Z | 2024-04-24T14:13:51Z |
| rustsec-2024-0336 | `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network input | 2024-04-19T12:00:00Z | 2024-04-20T02:21:14Z |
| rustsec-2024-0335 | gix-transport indirect code execution via malicious username | 2024-04-13T12:00:00Z | 2024-07-02T23:39:37Z |
| rustsec-2024-0333 | `rsa-export` is unmaintained | 2024-04-06T12:00:00Z | 2024-04-12T16:29:46Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2025-12697 | Improper Encoding or Escaping of Output in GitLab | 2026-03-13T09:30:53.383Z | 2026-03-18T09:23:06.258Z |
| bit-gitlab-2025-12576 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-13T09:30:49.795Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-12555 | Incorrect Authorization in GitLab | 2026-03-13T09:30:40.688Z | 2026-03-13T09:37:20.375Z |
| bit-wordpress-2026-3906 | WordPress 6.9 - 6.9.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Note Creation via REST API | 2026-03-13T09:17:59.157Z | 2026-03-13T09:37:20.375Z |
| bit-consul-2026-2808 | Consul vulnerable to arbitrary file reads through the vault kubernetes authentication provider | 2026-03-13T09:02:37.072Z | 2026-03-13T09:37:20.375Z |
| bit-parse-2026-31828 | Parse Server has an LDAP injection via unsanitized user input in DN and group filter construction | 2026-03-12T14:48:18.251Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-31800 | Parse Server: Classes `_GraphQLConfig` and `_Audience` master key bypass via generic class routes | 2026-03-12T14:48:16.613Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30972 | Parse Server has a rate limit bypass via batch request endpoint | 2026-03-12T14:48:14.900Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30967 | Parse Server OAuth2 authentication adapter account takeover via identity spoofing | 2026-03-12T14:48:13.390Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30966 | Parse Server role escalation and CLP bypass via direct `_Join` table write | 2026-03-12T14:48:11.522Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30965 | Parse Server session token exfiltration via `redirectClassNameForKey` query parameter | 2026-03-12T14:48:09.696Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30962 | Parse Server has a protected fields bypass via logical query operators | 2026-03-12T14:48:07.977Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30949 | Parse Server is missing audience validation in Keycloak authentication adapter | 2026-03-12T14:48:06.075Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30948 | Parse Server has stored cross-site scripting (XSS) via SVG file upload | 2026-03-12T14:48:04.274Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30947 | Parse Server ha a bypass of class-level permissions in LiveQuery | 2026-03-12T14:48:02.496Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30946 | Parse Server affected by denial-of-service via unbounded query complexity in REST and GraphQL API | 2026-03-12T14:48:00.783Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30941 | Parse Server has a NoSQL injection via token type in password reset and email verification endpoints | 2026-03-12T14:47:58.977Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30939 | Parse Server has Denial of Service (DoS) and Cloud Function Dispatch Bypass via Prototype Chain Resolution | 2026-03-12T14:47:57.281Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30938 | Parse Server has denylist `requestKeywordDenylist` keyword scan bypass through nested object placement | 2026-03-12T14:47:55.401Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30925 | Parse Server affected by Regular Expression Denial of Service (ReDoS) via `$regex` query in LiveQuery | 2026-03-12T14:47:53.415Z | 2026-03-20T09:47:33.381Z |
| bit-envoy-2026-26330 | Envoy global rate limit may crash when the response phase limit is enabled and the response phase request is failed directly | 2026-03-12T08:39:47.564Z | 2026-03-12T09:10:07.191Z |
| bit-envoy-2026-26311 | Envoy HTTP: filter chain execution on reset streams causing UAF crash | 2026-03-12T08:39:46.109Z | 2026-03-12T09:10:07.191Z |
| bit-envoy-2026-26310 | Crash for scoped ip address in Envoy during DNS | 2026-03-12T08:39:44.551Z | 2026-03-12T09:10:07.191Z |
| bit-envoy-2026-26309 | Envoy has an off-by-one write in JsonEscaper::escapeString() | 2026-03-12T08:39:42.871Z | 2026-03-12T09:10:07.191Z |
| bit-envoy-2026-26308 | Envoy has an RBAC Header Validation Bypass via Multi-Value Header Concatenation | 2026-03-12T08:39:41.078Z | 2026-03-12T09:10:07.191Z |
| bit-appsmith-2026-30862 | Critical Stored XSS & Privilege Escalation in Appsmith | 2026-03-12T08:36:03.908Z | 2026-03-12T09:10:07.191Z |
| bit-parse-2026-30863 | Parse Server: JWT audience validation bypass in Google, Apple, and Facebook authentication adapters | 2026-03-11T15:49:05.551Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30854 | Parse Server: GraphQL `__type` introspection bypass via inline fragments when public introspection is disabled | 2026-03-11T15:49:02.829Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30850 | Parse Server: File metadata endpoint bypasses `beforeFind` / `afterFind` trigger authorization | 2026-03-11T15:48:59.848Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30848 | Parse Server: `PagesRouter` path traversal allows reading files outside configured pages directory | 2026-03-11T15:48:57.194Z | 2026-03-11T18:56:50.865Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-af35851 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T01:02:37.708854Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-qk48981 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T01:00:35.988532Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-zv38826 | Within HostnameError | 2026-03-10T01:00:05.764793Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-jz91219 | Within HostnameError | 2026-03-10T00:59:35.590693Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-mo83449 | Within HostnameError | 2026-03-10T00:59:35.550450Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-od98869 | Within HostnameError | 2026-03-10T00:59:05.580952Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-ab04032 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-03-10T00:58:35.570783Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-dt66006 | Within HostnameError | 2026-03-10T00:58:35.493841Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-oh74241 | Security fixes for GHSA-MQQF-5WVP-8FH8 applied in versions: 0.122-r0 | 2026-03-10T00:58:07.551022Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-xh31600 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:58:05.974960Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-av02020 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:58:05.928030Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-ra63757 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:56:05.142237Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-ir62391 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:48:33.059735Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-qy24299 | @octokit/endpoint turns REST API endpoints into generic request options | 2026-03-07T00:39:47.646997Z | 2026-03-06T13:08:41Z |
| cleanstart-2026-gi57625 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-03-07T00:39:46.578400Z | 2026-03-06T13:08:41Z |
| cleanstart-2026-pp62083 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-03-07T00:39:46.558367Z | 2026-03-06T13:08:41Z |
| cleanstart-2026-sm37781 | Due to missing nil check, sending 0x0a-0x0f HTTP/2 frames will cause a running server to panic | 2026-03-04T00:45:05.719125Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-ay29369 | Redis is an open source, in-memory database that persists on disk | 2026-03-04T00:43:31.868035Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-xj84245 | Rack is a modular Ruby web server interface | 2026-03-04T00:43:02.364521Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-cq83284 | Redis is an open source, in-memory database that persists on disk | 2026-03-04T00:43:01.818359Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-yp32652 | Redis is an open source, in-memory database that persists on disk | 2026-03-04T00:42:01.150900Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-na21773 | GNU patch through 2 | 2026-03-04T00:42:01.122309Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-bz70876 | Redis is an open source, in-memory database that persists on disk | 2026-03-04T00:42:00.996564Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-wy43835 | PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access | 2026-03-04T00:41:31.079681Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-ew93264 | Security fixes for GHSA-4CX2-FC23-5WG6, GHSA-6XW4-3V39-52MM, GHSA-72QJ-48G4-5XGX, GHSA-MR3Q-G2MV-MR4Q, GHSA-P543-XPFM-54CP, GHSA-VC5P-V9HR-52MJ, GHSA-VQG5-3255-V292 applied in versions: 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-03-04T00:39:32.590174Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-vc01496 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 0.8.4-r0 | 2026-03-04T00:39:30.734261Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-by85815 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-03-03T00:39:03.275022Z | 2026-03-02T17:13:50Z |
| cleanstart-2026-mw73882 | filippo | 2026-03-03T00:39:03.237072Z | 2026-03-02T17:13:50Z |
| cleanstart-2026-jy06700 | vulnerability has been identified in Node | 2026-02-27T01:09:46.914639Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-zg64300 | Within HostnameError | 2026-02-27T01:05:11.090007Z | 2026-02-26T12:09:56Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2021-033 | 2021-09-22T16:55:24.000Z | 2023-08-11T17:05:59.000Z | |
| drupal-contrib-2021-032 | 2021-09-22T16:51:57.000Z | 2023-08-11T17:04:59.000Z | |
| drupal-contrib-2021-031 | 2021-09-22T16:49:24.000Z | 2023-08-11T17:04:21.000Z | |
| drupal-contrib-2021-030 | 2021-09-22T16:43:17.000Z | 2023-08-11T17:03:36.000Z | |
| drupal-contrib-2021-029 | 2021-09-15T15:30:15.000Z | 2023-08-11T17:03:09.000Z | |
| drupal-contrib-2021-028 | 2021-09-15T15:28:04.000Z | 2023-08-11T17:02:11.000Z | |
| drupal-contrib-2021-026 | 2021-08-25T15:27:54.000Z | 2023-08-11T17:01:51.000Z | |
| drupal-contrib-2021-025 | 2021-08-25T14:36:25.000Z | 2023-08-11T16:59:37.000Z | |
| drupal-contrib-2021-024 | 2021-07-28T16:39:17.000Z | 2023-08-11T16:58:13.000Z | |
| drupal-contrib-2021-023 | 2021-07-21T16:51:57.000Z | 2023-08-11T16:57:55.000Z | |
| drupal-contrib-2021-022 | 2021-06-30T16:46:21.000Z | 2023-08-11T17:12:21.000Z | |
| drupal-contrib-2021-021 | 2021-06-30T16:43:19.000Z | 2023-08-11T17:11:42.000Z | |
| drupal-contrib-2021-020 | 2021-06-30T16:39:06.000Z | 2023-08-11T17:11:13.000Z | |
| drupal-contrib-2021-019 | 2021-06-23T16:51:26.000Z | 2023-08-11T17:10:31.000Z | |
| drupal-contrib-2021-018 | 2021-06-23T16:47:59.000Z | 2023-08-11T17:09:57.000Z | |
| drupal-contrib-2021-017 | 2021-06-16T16:15:21.000Z | 2023-08-11T17:09:04.000Z | |
| drupal-contrib-2021-016 | 2021-06-16T16:05:14.000Z | 2023-08-11T17:08:37.000Z | |
| drupal-contrib-2021-015 | 2021-06-16T15:58:47.000Z | 2023-08-11T17:08:06.000Z | |
| drupal-contrib-2021-014 | 2021-06-02T16:59:12.000Z | 2023-08-11T17:07:36.000Z | |
| drupal-contrib-2021-013 | 2021-06-02T16:56:19.000Z | 2023-08-11T17:07:00.000Z | |
| drupal-contrib-2021-011 | 2021-06-02T16:51:10.000Z | 2023-08-11T17:22:44.000Z | |
| drupal-contrib-2021-010 | 2021-06-02T16:49:49.000Z | 2023-08-11T17:21:33.000Z | |
| drupal-contrib-2021-009 | 2021-05-12T16:23:23.000Z | 2023-08-11T17:18:42.000Z | |
| drupal-contrib-2021-008 | 2021-05-12T16:14:35.000Z | 2023-08-11T17:17:58.000Z | |
| drupal-contrib-2021-007 | 2021-05-12T16:08:34.000Z | 2023-08-11T17:17:34.000Z | |
| drupal-contrib-2021-006 | 2021-04-28T16:47:09.000Z | 2023-08-11T17:16:38.000Z | |
| drupal-contrib-2021-005 | 2021-03-17T18:36:07.000Z | 2023-08-11T17:15:48.000Z | |
| drupal-contrib-2021-004 | 2021-03-03T16:49:33.000Z | 2023-08-11T17:15:22.000Z | |
| drupal-contrib-2021-003 | 2021-01-27T17:53:09.000Z | 2023-08-11T17:13:06.000Z | |
| drupal-contrib-2021-002 | 2021-01-27T17:27:57.000Z | 2023-08-11T17:25:36.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2004-ale-013 | Vulnérabilité dans le composant ActiveX DHTML Edit d'Internet Explorer | 2004-12-20T00:00:00.000000 | 2004-12-20T00:00:00.000000 |
| certa-2004-ale-012 | Vulnérabilité d'Internet Explorer | 2004-11-09T00:00:00.000000 | 2004-12-02T00:00:00.000000 |
| certa-2004-ale-011 | Diffusion de programmes exploitant la faille GDI+ | 2004-09-23T00:00:00.000000 | 2004-09-23T00:00:00.000000 |
| certa-2004-ale-010 | Vulnérabilité du service Telnet de Cisco IOS | 2004-08-30T00:00:00.000000 | 2004-08-30T00:00:00.000000 |
| certa-2004-ale-009 | Vulnérabilités d'Internet Explorer | 2004-06-09T00:00:00.000000 | 2004-08-03T00:00:00.000000 |
| certa-2004-ale-008 | Vulnérabilité de Safari | 2004-05-19T00:00:00.000000 | 2004-05-24T00:00:00.000000 |
| certa-2004-ale-007 | Exploitation de la vulnérabilité LSASS sous Windows : appration du ver Sasser | 2004-05-02T00:00:00.000000 | 2004-05-02T00:00:00.000000 |
| certa-2004-ale-006 | Vulnérabilité SMB sous Windows | 2004-04-28T00:00:00.000000 | 2004-04-28T00:00:00.000000 |
| certa-2004-ale-005 | Vulnérabilité d'Internet Explorer | 2004-04-09T00:00:00.000000 | 2004-04-15T00:00:00.000000 |
| certa-2004-ale-004 | Vulnérabilité du composant dtlogin de CDE | 2004-03-26T00:00:00.000000 | 2004-08-05T00:00:00.000000 |
| certa-2004-ale-003 | Propagation du ver Phatbot | 2004-03-19T00:00:00.000000 | 2004-03-19T00:00:00.000000 |
| certa-2004-ale-002 | Propagation du virux Bizex | 2004-02-26T00:00:00.000000 | 2004-02-26T00:00:00.000000 |
| certa-2004-ale-001 | Obstacles à la résolution d'incidents | 2004-01-30T00:00:00.000000 | 2004-01-30T00:00:00.000000 |
| certa-2003-ale-006 | Vulnérabilité dans l'affichage des adresses réticulaires | 2003-12-19T00:00:00.000000 | 2004-02-03T00:00:00.000000 |
| certa-2003-ale-005 | Vulnérabilité de sadmind sur Solaris | 2003-09-19T00:00:00.000000 | 2003-09-19T00:00:00.000000 |
| certa-2003-ale-004 | Vulnérabilité d'Internet Explorer | 2003-09-10T00:00:00.000000 | 2003-10-06T00:00:00.000000 |
| certa-2003-ale-003 | Exploitation massive de la vulnérabilité « include PHP » | 2003-09-09T00:00:00.000000 | 2003-09-09T00:00:00.000000 |
| certa-2003-ale-002 | Exploitation d'une faille de Windows RPC | 2003-08-01T00:00:00.000000 | 2003-08-19T00:00:00.000000 |
| certa-2003-ale-001 | Vulnérabilité dans l'implémentation des logiciels de lecture des documents PDF | 2003-06-23T00:00:00.000000 | 2003-07-04T00:00:00.000000 |
| certa-2002-ale-007 | Cédérom Pages Pro | 2002-09-04T00:00:00.000000 | 2002-09-04T00:00:00.000000 |
| certa-2002-ale-006 | Propagation du ver Spida (Microsoft SQL Server) | 2002-05-22T00:00:00.000000 | 2002-06-04T00:00:00.000000 |
| certa-2002-ale-005 | Risque de compromission des auto-commutateurs (PABX) ALCATEL 4400 | 2002-02-20T00:00:00.000000 | 2002-02-20T00:00:00.000000 |
| certa-2002-ale-004 | Multiples implémentations de SNMP V1 vulnérables | 2002-02-13T00:00:00.000000 | 2002-02-13T00:00:00.000000 |
| certa-2002-ale-003 | Propagation importante du virus « W32.Myparty@mm » | 2002-01-29T00:00:00.000000 | 2002-01-29T00:00:00.000000 |
| certa-2002-ale-002 | Exploitation d'une faille de wu-ftpd | 2002-01-28T00:00:00.000000 | 2002-01-28T00:00:00.000000 |
| certa-2002-ale-001 | Exploitation massive d'une faille de CDE | 2002-01-24T00:00:00.000000 | 2002-01-24T00:00:00.000000 |
| certa-2001-ale-016 | Propagation du ver badtrans - variante B | 2001-11-27T00:00:00.000000 | 2001-11-27T00:00:00.000000 |
| certa-2001-ale-015 | Exploitation massive d'une ancienne vulnérabilité de SSH | 2001-11-19T00:00:00.000000 | 2001-11-19T00:00:00.000000 |
| certa-2001-ale-014 | Risque de divulgation de données personnelles/confidentielles par des produits Microsoft | 2001-10-19T00:00:00.000000 | 2001-10-19T00:00:00.000000 |
| certa-2001-ale-013 | Propagation du ver/virus NIMDA (Concept Virus) | 2001-09-19T00:00:00.000000 | 2001-09-19T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0126 | Vulnérabilité dans ESET Management Agent | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0125 | Multiples vulnérabilités dans les produits Moxa | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0124 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0123 | Multiples vulnérabilités dans Asterisk | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0122 | Multiples vulnérabilités dans Tenable Nessus | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0121 | Vulnérabilité dans les produits Juniper Networks | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0120 | Multiples vulnérabilités dans les produits F5 | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0119 | Multiples vulnérabilités dans les produits Cisco | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0118 | Multiples vulnérabilités dans les produits Splunk | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0117 | Multiples vulnérabilités dans GLPI | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0116 | Vulnérabilité dans les produits Moxa | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0115 | Multiples vulnérabilités dans Tenable Identity Exposure | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0114 | Multiples vulnérabilités dans Google Chrome | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0113 | Vulnérabilité dans Google Pixel | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0112 | Multiples vulnérabilités dans les produits VMware | 2026-02-02T00:00:00.000000 | 2026-02-02T00:00:00.000000 |
| certfr-2026-avi-0111 | Vulnérabilité dans ESET Inspect Connector | 2026-02-02T00:00:00.000000 | 2026-02-02T00:00:00.000000 |
| certfr-2026-avi-0110 | Multiples vulnérabilités Ivanti Endpoint Manager Mobile (EPMM) | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0109 | Multiples vulnérabilités dans les produits IBM | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0108 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0107 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0106 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0105 | Vulnérabilité dans Microsoft Edge | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0104 | Vulnérabilité dans Qnap QTS | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0103 | Multiples vulnérabilités dans Node.js | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0102 | Vulnérabilité dans Splunk Enterprise | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0101 | Multiples vulnérabilités dans les produits Siemens | 2026-01-29T00:00:00.000000 | 2026-01-29T00:00:00.000000 |
| certfr-2026-avi-0100 | Multiples vulnérabilités dans les produits WithSecure | 2026-01-29T00:00:00.000000 | 2026-01-29T00:00:00.000000 |
| certfr-2026-avi-0099 | Multiples vulnérabilités dans SolarWinds Web Help Desk | 2026-01-28T00:00:00.000000 | 2026-01-29T00:00:00.000000 |
| certfr-2026-avi-0098 | Vulnérabilité dans les produits Symfony | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0097 | Vulnérabilité dans les produits Fortinet | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-000096 | Pgpool-II vulnerable to information disclosure | 2024-09-09T14:58+09:00 | 2024-09-09T14:58+09:00 |
| jvndb-2024-000094 | "@cosme" App fails to restrict custom URL schemes properly | 2024-09-09T14:20+09:00 | 2024-09-09T14:20+09:00 |
| jvndb-2024-000097 | WordPress Plugin "Forminator" vulnerable to cross-site scripting | 2024-09-09T13:51+09:00 | 2024-09-09T13:51+09:00 |
| jvndb-2024-000098 | Multiple products from KINGSOFT JAPAN vulnerable to path traversal | 2024-09-06T15:07+09:00 | 2024-09-06T15:07+09:00 |
| jvndb-2024-000090 | Secure Boot bypass Vulnerability in PRIMERGY | 2024-09-06T14:39+09:00 | 2024-09-06T14:39+09:00 |
| jvndb-2024-000093 | WordPress Plugin "Advanced Custom Fields" vulnerable to cross-site scripting | 2024-09-04T13:01+09:00 | 2024-09-04T13:01+09:00 |
| jvndb-2024-007002 | Panasonic Control FPWIN Pro7 vulnerable to stack-based buffer overflow | 2024-09-02T14:57+09:00 | 2024-09-02T14:57+09:00 |
| jvndb-2024-000091 | IPCOM vulnerable to information disclosure | 2024-08-30T14:56+09:00 | 2024-08-30T14:56+09:00 |
| jvndb-2024-000092 | Multiple vulnerabilities in WordPress plugin "Carousel Slider" | 2024-08-30T13:58+09:00 | 2024-08-30T13:58+09:00 |
| jvndb-2024-000089 | WindLDR and WindO/I-NV4 store sensitive information in cleartext | 2024-08-29T15:08+09:00 | 2024-09-24T17:14+09:00 |
| jvndb-2024-006787 | xfpt vulnerable to stack-based buffer overflow | 2024-08-29T14:07+09:00 | 2024-08-29T14:07+09:00 |
| jvndb-2024-000088 | Multiple vulnerabilities in ELECOM wireless LAN routers and access points | 2024-08-27T14:40+09:00 | 2024-11-26T15:17+09:00 |
| jvndb-2024-006646 | Authentication Bypass Vulnerability in Hitachi Ops Center Common Services | 2024-08-27T12:01+09:00 | 2024-08-27T12:01+09:00 |
| jvndb-2024-006367 | Unquoted Service Path in Hitachi Device Manager | 2024-08-26T16:27+09:00 | 2024-08-26T16:27+09:00 |
| jvndb-2024-000087 | BUFFALO wireless LAN routers and wireless LAN repeaters vulnerable to OS command injection | 2024-08-23T14:17+09:00 | 2024-08-23T14:17+09:00 |
| jvndb-2024-000086 | Multiple Safie products vulnerable to improper server certificate verification | 2024-08-22T13:51+09:00 | 2024-08-29T12:23+09:00 |
| jvndb-2020-007305 | Installer of Trend Micro Security 2020 (Consumer) may insecurely load Dynamic Link Libraries | 2024-08-22T11:33+09:00 | 2024-08-22T11:33+09:00 |
| jvndb-2017-009536 | Packetbeat vulnerable to denial-of-service (DoS) | 2024-08-21T17:54+09:00 | 2024-08-21T17:54+09:00 |
| jvndb-2018-009127 | Multiple vulnerabilities in LogonTracer | 2024-08-21T17:37+09:00 | 2024-08-21T17:37+09:00 |
| jvndb-2020-002957 | A vulnerability in TOYOTA MOTOR's DCU (Display Control Unit) | 2024-08-20T18:12+09:00 | 2024-08-20T18:12+09:00 |
| jvndb-2020-007306 | Trend Micro Security (Consumer) Driver vulnerable to Out-of-bounds Read | 2024-08-20T17:52+09:00 | 2024-08-20T17:52+09:00 |
| jvndb-2024-000085 | "Rakuten Ichiba App" fails to restrict custom URL schemes properly | 2024-08-20T16:56+09:00 | 2024-08-20T16:56+09:00 |
| jvndb-2024-005167 | EL Injection Vulnerability in Hitachi Tuning Manager | 2024-08-15T09:38+09:00 | 2024-08-15T09:38+09:00 |
| jvndb-2016-000124 | WAON service app for Android fails to verify SSL server certificates | 2024-08-15T09:36+09:00 | 2024-08-15T09:36+09:00 |
| jvndb-2024-000083 | Firmware update for RICOH JavaTM Platform resets the TLS configuration | 2024-08-06T15:13+09:00 | 2024-08-06T15:13+09:00 |
| jvndb-2024-000079 | Cybozu Office vulnerable to bypass browsing restrictions in Custom App | 2024-08-06T14:59+09:00 | 2024-08-06T14:59+09:00 |
| jvndb-2024-000082 | Pimax Play and PiTool accept WebSocket connections from unintended endpoints | 2024-08-05T13:58+09:00 | 2024-08-05T13:58+09:00 |
| jvndb-2024-000084 | Multiple vulnerabilities in ZEXELON ZWX-2000CSW2-HN | 2024-08-05T13:46+09:00 | 2024-08-05T13:46+09:00 |
| jvndb-2024-000077 | FFRI AMC vulnerable to OS command injection | 2024-07-30T16:40+09:00 | 2024-07-30T16:40+09:00 |
| jvndb-2024-000078 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2024-07-30T15:34+09:00 | 2026-02-03T15:35+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-13957 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13957) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13956 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13956) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13955 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13955) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13954 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13954) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13953 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13953) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13952 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13952) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13951 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13951) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13950 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13950) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13949 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13949) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13948 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13948) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13947 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13947) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13946 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13946) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13945 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13945) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13944 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13944) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13943 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13943) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-15381 | Huawei HarmonyOS cellular_data模块权限控制漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15380 | Huawei HarmonyOS证书管理模块路径遍历漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15379 | Huawei HarmonyOS维测模块条件竞争漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15378 | Huawei HarmonyOS蓝牙字符越界读漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15377 | Huawei HarmonyOS权限管理服务条件竞争漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15376 | Huawei HarmonyOS安全控件条件竞争漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15375 | Huawei HarmonyOS扫描模块访问未初始化指针漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15250 | Huawei HarmonyOS证书管理模块数据处理漏洞 | 2026-03-12 | 2026-03-25 |
| cnvd-2026-15248 | Huawei HarmonyOS设备认证模块认证绕过漏洞 | 2026-03-12 | 2026-03-23 |
| cnvd-2026-14397 | OpenClaw安全绕过漏洞 | 2026-03-12 | 2026-03-20 |
| cnvd-2026-14396 | OpenClaw文件包含漏洞 | 2026-03-12 | 2026-03-20 |
| cnvd-2026-14395 | OpenClaw访问控制错误漏洞(CNVD-2026-14395) | 2026-03-12 | 2026-03-20 |
| cnvd-2026-13832 | OpenClaw拒绝服务漏洞(CNVD-2026-13832) | 2026-03-12 | 2026-03-16 |
| cnvd-2026-13801 | OpenClaw命令注入漏洞(CNVD-2026-13801) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13800 | OpenClaw拒绝服务漏洞(CNVD-2026-13800) | 2026-03-12 | 2026-03-12 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01364 | Уязвимость функции ffs_func_eps_enable() модуля drivers/usb/gadget/function/f_fs.c драйве… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01363 | Уязвимость функции multiq3_attach() модуля drivers/comedi/drivers/multiq3.c поддержки уст… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01362 | Уязвимость функции dc_stream_get_scanoutpos() модуля drivers/gpu/drm/amd/display/dc/core/… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01361 | Уязвимость функции f2fs_alloc_nid() модуля fs/f2fs/node.c файловой системы F2FS ядра опер… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01360 | Уязвимость функции find_sdca_entity_control() модуля sound/soc/sdca/sdca_functions.c подд… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01359 | Уязвимость функции mptcp_do_fastclose() модуля net/mptcp/protocol.c ядра операционной сис… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01358 | Уязвимость функции pci_aer_init() модуля drivers/pci/pcie/aer.c драйвера устройств PCI я… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01357 | Уязвимость функции init_amd_zen4() модуля arch/x86/kernel/cpu/amd.c поддержки платформы x… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01356 | Уязвимость функции __page_pool_alloc_netmems_slow() модуля net/core/page_pool.c поддержки… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01355 | Уязвимость функции copy_highpage() модуля arch/arm64/mm/copypage.c поддержки платформы AR… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01354 | Уязвимость функции devlink_notify_unregister() модуля net/devlink/leftover.c реализации с… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01353 | Уязвимость механизма обеспечения безопасности программной платформы Node.js, позволяющая … | 06.02.2026 | 06.02.2026 |
| bdu:2026-01352 | Уязвимость функции stmmac_rx() ядра операционной системы Linux, позволяющая нарушителю, д… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01351 | Уязвимость функции blkg_conf_prep() модуля block/blk-cgroup.c поддержки блочного уровня я… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01350 | Уязвимость функции ufs_qcom_suspend() модуля drivers/ufs/host/ufs-qcom.c поддержки хост-к… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01349 | Уязвимость функции ext4_destroy_inline_data_nolock() модуля fs/ext4/inline.c файловой си… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01348 | Уязвимость функции ieee80211_register_hw() ядра операционной системы Linux, позволяющая н… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01347 | Уязвимость функции ext4_prepare_inline_data() модуля fs/ext4/inline.c файловой системы Ex… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01346 | Уязвимость функции stripe_io_hints() ядра операционной системы Linux, позволяющая нарушит… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01345 | Уязвимость функции bfs_iget() модуля fs/bfs/inode.c файловой системы ядра операционной си… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01344 | Уязвимость функций appendChild() и _clear_id_cache() интерпретатора языка программировани… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01343 | Уязвимость функции l2cap_connect_create_rsp() ядра операционной системы Linux, позволяюща… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01342 | Уязвимость функции machine_crash_nonpanic_core() модуля arch/arm/kernel/machine_kexec.c п… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01341 | Уязвимость функции SMB2_negotiate() ядра операционной системы Linux, позволяющая нарушите… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01340 | Уязвимость функции hfsplus_iget() модуля fs/hfsplus/super.c поддержки расширенной файлово… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01339 | Уязвимость функции hdr_find_e() ядра операционной системы Linux, позволяющая нарушителю п… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01338 | Уязвимость функции txInit() модуля fs/jfs/jfs_txnmgr.c файловой системы JFS ядра операцио… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01337 | Уязвимость функции ftrace_module_enable() модуля kernel/trace/ftrace.c поддержки трассиро… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01336 | Уязвимость функции drm_gem_dma_free() модуля drivers/gpu/drm/drm_gem_dma_helper.c драйвер… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01335 | Уязвимость функции hfs_asc2mac() ядра операционной системы Linux, позволяющая нарушителю … | 06.02.2026 | 06.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201604-0129 | Xen and the Linux kernel through 4.5.x do not properly suppress hugetlbfs support in x86 … | 2026-04-10T22:42:13.961000Z |
| var-201003-0281 | The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f through 0.9.8m allows remo… | 2026-04-10T22:41:40.970000Z |
| var-201306-0258 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-04-10T22:41:34.817000Z |
| var-200412-0902 | Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 a… | 2026-04-10T22:41:33.816000Z |
| var-201108-0185 | Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and… | 2026-04-10T22:40:55.909000Z |
| var-201207-0370 | Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows… | 2026-04-10T22:40:54.885000Z |
| var-201302-0404 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE 7 U… | 2026-04-10T22:40:53.911000Z |
| var-202012-1527 | The X.509 GeneralName type is a generic type for representing different types of names. O… | 2026-04-10T22:40:10.893000Z |
| var-201203-0177 | Google Chrome before 17.0.963.83 allows remote attackers to bypass the Same Origin Policy… | 2026-04-10T22:40:06.110000Z |
| var-201203-0196 | Google Chrome before 17.0.963.65 does not properly handle text, which allows remote attac… | 2026-04-10T22:40:02.356000Z |
| var-201805-0950 | A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Softw… | 2026-04-10T22:40:01.857000Z |
| var-201109-0209 | Google Chrome before 14.0.835.163 does not properly handle Cascading Style Sheets (CSS) t… | 2026-04-10T22:39:23.261000Z |
| var-200609-0315 | Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary c… | 2026-04-10T22:39:17.955000Z |
| var-200504-0292 | Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote … | 2026-04-10T22:39:14.182000Z |
| var-200901-0719 | Use-after-free vulnerability in the garbage-collection implementation in WebCore in WebKi… | 2026-04-10T22:39:12.399000Z |
| var-200110-0170 | The Legion of the Bouncy Castle Java Cryptography API before release 1.38, as used in Cry… | 2026-04-10T22:39:12.079000Z |
| var-202105-0904 | A flaw was found in the Linux kernel in versions before 5.12. The value of internal.ndata… | 2026-04-10T22:39:10.303000Z |
| var-202204-0692 | Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability … | 2026-04-10T22:39:09.994000Z |
| var-201904-0756 | A memory corruption issue was addressed with improved memory handling. This issue affecte… | 2026-04-10T22:39:00.595000Z |
| var-201710-0206 | Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key… | 2026-04-10T22:39:00.479000Z |
| var-202010-1294 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2026-04-10T22:39:00.277000Z |
| var-201302-0398 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-04-10T22:38:59.674000Z |
| var-201007-0319 | The counters functionality in the Cascading Style Sheets (CSS) implementation in WebKit i… | 2026-04-10T22:38:59.502000Z |
| var-201210-0053 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-04-10T22:38:58.547000Z |
| var-202201-0073 | In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exist… | 2026-04-10T22:38:57.986000Z |
| var-202104-0752 | A memory corruption issue was addressed with improved validation. This issue is fixed in … | 2026-04-10T22:38:57.892000Z |
| var-200309-0035 | A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may… | 2026-04-10T22:38:42.068000Z |
| var-201507-0303 | Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.23 and earlie… | 2026-04-10T22:38:20.631000Z |
| var-201501-0434 | The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 befor… | 2026-04-10T22:38:15.110000Z |
| var-201302-0303 | Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on … | 2026-04-10T22:38:12.619000Z |