Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-3369 |
5.4 (3.1)
|
Better Find and Replace – AI-Powered Suggestions <= 1.… |
codesolz |
Better Find and Replace – AI-Powered Suggestions |
2026-04-16T11:21:21.822Z | 2026-04-16T14:04:23.811Z |
| CVE-2026-3489 |
7.5 (3.1)
|
DirectoryPress – Business Directory And Classified Ad … |
designinvento |
DirectoryPress – Business Directory And Classified Ad Listing |
2026-04-16T11:21:21.179Z | 2026-04-16T14:05:03.740Z |
| CVE-2025-12624 |
6 (3.1)
|
Improper Token Invalidation in WSO2 Identity Server Al… |
WSO2 |
WSO2 Identity Server |
2026-04-16T10:25:19.789Z | 2026-04-16T12:30:14.886Z |
| CVE-2025-6024 |
6.1 (3.1)
|
Cross-Site Scripting via Authentication Endpoint in Mu… |
WSO2 |
WSO2 API Manager |
2026-04-16T09:48:45.244Z | 2026-04-16T12:30:22.824Z |
| CVE-2024-10242 |
6.1 (3.1)
|
Reflected Cross-Site Scripting via Authentication Endp… |
WSO2 |
WSO2 API Manager |
2026-04-16T09:45:46.115Z | 2026-04-16T12:30:30.619Z |
| CVE-2024-8010 |
3.5 (3.1)
|
XML External Entity Injection via Publisher in WSO2 AP… |
WSO2 |
WSO2 API Manager |
2026-04-16T09:39:20.130Z | 2026-04-16T12:30:36.466Z |
| CVE-2024-4867 |
5.4 (3.1)
|
Cross-Site Scripting via Developer Portal in WSO2 API … |
WSO2 |
WSO2 API Manager |
2026-04-16T09:32:40.941Z | 2026-04-16T12:30:42.568Z |
| CVE-2026-23772 |
7.3 (3.1)
|
Dell Storage Manager - Replay Manager for Microso… |
Dell |
Storage Manager |
2026-04-16T08:30:56.774Z | 2026-04-17T03:55:13.852Z |
| CVE-2024-2374 |
7.5 (3.1)
|
XML External Entity Injection in Multiple WSO2 Product… |
WSO2 |
WSO2 API Manager |
2026-04-16T08:12:58.247Z | 2026-04-16T12:30:49.250Z |
| CVE-2026-0718 |
5.3 (3.1)
|
Post Grid Gutenberg Blocks for News, Magazines, Blog W… |
wpxpo |
Post Grid Gutenberg Blocks for News, Magazines, Blog Websites – PostX |
2026-04-16T07:39:50.799Z | 2026-04-16T12:55:16.326Z |
| CVE-2025-14868 |
8.8 (3.1)
|
Career Section <= 1.6 - Cross-Site Request Forgery to … |
shahinurislam |
Career Section |
2026-04-16T07:39:49.576Z | 2026-04-16T12:52:42.034Z |
| CVE-2026-41035 |
7.4 (3.1)
|
In rsync 3.0.1 through 3.4.1, receive_xattr relie… |
Samba |
rsync |
2026-04-16T06:53:05.237Z | 2026-04-16T20:16:00.985Z |
| CVE-2026-3876 |
7.2 (3.1)
|
Prismatic <= 3.7.3 - Unauthenticated Stored Cross-Site… |
specialk |
Prismatic |
2026-04-16T06:44:53.787Z | 2026-04-16T14:13:20.711Z |
| CVE-2026-3355 |
6.1 (3.1)
|
Customer Reviews for WooCommerce <= 5.101.0 - Reflecte… |
ivole |
Customer Reviews for WooCommerce |
2026-04-16T06:44:53.276Z | 2026-04-16T14:25:11.362Z |
| CVE-2025-13364 |
6.4 (3.1)
|
WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapb… |
flippercode |
WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters |
2026-04-16T06:44:52.144Z | 2026-04-16T12:04:16.719Z |
| CVE-2026-3875 |
6.4 (3.1)
|
BetterDocs <= 4.3.8 - Authenticated (Contributor+) Sto… |
wpdevteam |
BetterDocs – Knowledge Base Docs & FAQ Solution for Elementor & Block Editor |
2026-04-16T06:44:51.744Z | 2026-04-16T13:41:59.186Z |
| CVE-2026-3995 |
4.4 (3.1)
|
OPEN-BRAIN <= 0.5.0 - Authenticated (Administrator+) S… |
faridsaniee |
OPEN-BRAIN |
2026-04-16T06:44:51.340Z | 2026-04-16T12:04:24.073Z |
| CVE-2026-1572 |
6.4 (3.1)
|
Livemesh Addons by Elementor <= 9.0 - Missing Authoriz… |
livemesh |
Livemesh Addons by Elementor |
2026-04-16T06:44:50.911Z | 2026-04-16T12:55:37.314Z |
| CVE-2026-1620 |
8.8 (3.1)
|
Livemesh Addons by Elementor <= 9.0 - Authenticated (C… |
livemesh |
Livemesh Addons by Elementor |
2026-04-16T06:44:50.305Z | 2026-04-16T12:55:49.055Z |
| CVE-2026-41034 |
5 (3.1)
|
ONLYOFFICE DocumentServer before 9.3.0 has an unt… |
Ascensio |
ONLYOFFICE DocumentServer |
2026-04-16T06:06:44.570Z | 2026-04-16T12:31:05.251Z |
| CVE-2026-3861 |
6.5 (3.1)
|
LINE client for iOS versions prior to 26.3.0 cont… |
LINE Corporation |
LINE client for iOS |
2026-04-16T05:54:05.194Z | 2026-04-16T12:31:11.953Z |
| CVE-2026-41030 |
6.2 (3.1)
|
In ONLYOFFICE DesktopEditors before 9.3.0, the up… |
Ascensio |
ONLYOFFICE DesktopEditors |
2026-04-16T05:51:21.338Z | 2026-04-16T12:31:19.989Z |
| CVE-2026-3581 |
5.3 (3.1)
|
Basic Google Maps Placemarks <= 1.10.7 - Missing Autho… |
iandunn |
Basic Google Maps Placemarks |
2026-04-16T05:29:55.137Z | 2026-04-16T13:44:00.613Z |
| CVE-2026-3773 |
6.5 (3.1)
|
Accessibility Suite by Ability, Inc <= 4.20 - Authenti… |
onlineada |
Accessibility Suite by Ability, Inc |
2026-04-16T05:29:54.754Z | 2026-04-16T13:42:08.243Z |
| CVE-2026-3614 |
8.8 (3.1)
|
AcyMailing 9.11.0 - 10.8.1 - Missing Authorization to … |
acyba |
AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution for WordPress |
2026-04-16T05:29:54.350Z | 2026-04-16T13:42:14.595Z |
| CVE-2026-3599 |
7.5 (3.1)
|
Riaxe Product Customizer <= 2.1.2 - Unauthenticated SQ… |
imprintnext |
Riaxe Product Customizer |
2026-04-16T05:29:53.971Z | 2026-04-16T12:58:22.965Z |
| CVE-2026-5050 |
7.5 (3.1)
|
Payment Gateway for Redsys & WooCommerce Lite <= 7.0.0… |
jconti |
Payment Gateway for Redsys & WooCommerce Lite |
2026-04-16T05:29:53.590Z | 2026-04-16T13:42:20.364Z |
| CVE-2026-3551 |
4.4 (3.1)
|
Custom New User Notification <= 1.2.0 - Authenticated … |
rafasashi |
Custom New User Notification |
2026-04-16T05:29:53.185Z | 2026-04-16T13:42:26.444Z |
| CVE-2026-3595 |
5.3 (3.1)
|
Riaxe Product Customizer <= 2.1.2 - Unauthenticated Ar… |
imprintnext |
Riaxe Product Customizer |
2026-04-16T05:29:52.794Z | 2026-04-16T12:04:31.317Z |
| CVE-2026-3596 |
9.8 (3.1)
|
Riaxe Product Customizer <= 2.1.2 - Missing Authorizat… |
imprintnext |
Riaxe Product Customizer |
2026-04-16T05:29:52.265Z | 2026-04-16T12:56:20.193Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-37338 |
9.4 (3.1)
|
SourceCodester Simple Music Cloud Community Syste… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T15:49:41.995Z |
| CVE-2026-37337 |
7.3 (3.1)
|
SourceCodester Simple Music Cloud Community Syste… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T17:26:11.625Z |
| CVE-2026-37336 |
7.3 (3.1)
|
SourceCodester Simple Music Cloud Community Syste… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T17:28:46.565Z |
| CVE-2026-33804 |
7.4 (3.1)
|
@fastify/middie vulnerable to middleware bypass via de… |
@fastify/middie |
@fastify/middie |
2026-04-16T13:56:56.176Z | 2026-04-16T14:41:48.659Z |
| CVE-2026-30656 |
7.5 (3.1)
|
A NULL pointer dereference vulnerability exists i… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T17:33:52.962Z |
| CVE-2026-30459 |
7.1 (3.1)
|
An issue in the Forgot Password feature of Daylig… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T15:16:57.348Z |
| CVE-2026-2840 |
6.4 (3.1)
|
Email Encoder – Protect Email Addresses and Phone Numb… |
onlineoptimisation |
Email Encoder – Protect Email Addresses and Phone Numbers |
2026-04-16T14:10:29.114Z | 2026-04-16T14:42:53.905Z |
| CVE-2026-6410 |
5.3 (3.1)
|
@fastify/static vulnerable to path traversal in direct… |
@fastify/static |
@fastify/static |
2026-04-16T13:29:08.120Z | 2026-04-16T14:19:36.780Z |
| CVE-2026-6270 |
9.1 (3.1)
|
@fastify/middie vulnerable to middleware authenticatio… |
@fastify/middie |
@fastify/middie |
2026-04-16T13:44:46.322Z | 2026-04-16T14:24:26.764Z |
| CVE-2026-5785 |
8.1 (3.1)
|
SQL Injection |
Zohocorp |
ManageEngine PAM360 |
2026-04-16T13:46:28.313Z | 2026-04-17T03:55:15.059Z |
| CVE-2026-4160 |
5.3 (3.1)
|
Fluent Forms – Customizable Contact Forms, Survey, Qui… |
techjewel |
Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder |
2026-04-16T13:27:09.207Z | 2026-04-16T14:12:35.951Z |
| CVE-2026-31987 |
N/A
|
Apache Airflow: JWT token appearing in logs |
Apache Software Foundation |
Apache Airflow |
2026-04-16T13:31:52.336Z | 2026-04-18T02:28:44.770Z |
| CVE-2026-6414 |
5.9 (3.1)
|
@fastify/static vulnerable to route guard bypass via e… |
@fastify/static |
@fastify/static |
2026-04-16T13:09:03.526Z | 2026-04-16T13:48:52.393Z |
| CVE-2026-5968 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. | N/A | N/A | 2026-04-16T12:36:56.881Z | |
| CVE-2026-31843 |
10 (4.0)
9.8 (3.1)
|
The goodoneuz/pay-uz Laravel package (<= 2.2.24) … |
goodoneuz |
pay-uz |
2026-04-16T13:02:55.701Z | 2026-04-16T19:30:21.203Z |
| CVE-2025-15621 |
5.7 (4.0)
|
Sparx Enterprise Architect Client does not verify the … |
Sparx Systems Pty Ltd. |
Sparx Enterprise Architect |
2026-04-16T12:40:08.962Z | 2026-04-16T12:51:51.633Z |
| CVE-2026-3489 |
7.5 (3.1)
|
DirectoryPress – Business Directory And Classified Ad … |
designinvento |
DirectoryPress – Business Directory And Classified Ad Listing |
2026-04-16T11:21:21.179Z | 2026-04-16T14:05:03.740Z |
| CVE-2026-3369 |
5.4 (3.1)
|
Better Find and Replace – AI-Powered Suggestions <= 1.… |
codesolz |
Better Find and Replace – AI-Powered Suggestions |
2026-04-16T11:21:21.822Z | 2026-04-16T14:04:23.811Z |
| CVE-2026-3155 |
3.1 (3.1)
|
OneSignal – Web Push Notifications <= 3.8.0 - Missing … |
onesignal |
OneSignal – Web Push Notifications |
2026-04-16T11:21:22.226Z | 2026-04-16T14:00:56.681Z |
| CVE-2025-12624 |
6 (3.1)
|
Improper Token Invalidation in WSO2 Identity Server Al… |
WSO2 |
WSO2 Identity Server |
2026-04-16T10:25:19.789Z | 2026-04-16T12:30:14.886Z |
| CVE-2025-6024 |
6.1 (3.1)
|
Cross-Site Scripting via Authentication Endpoint in Mu… |
WSO2 |
WSO2 API Manager |
2026-04-16T09:48:45.244Z | 2026-04-16T12:30:22.824Z |
| CVE-2024-8010 |
3.5 (3.1)
|
XML External Entity Injection via Publisher in WSO2 AP… |
WSO2 |
WSO2 API Manager |
2026-04-16T09:39:20.130Z | 2026-04-16T12:30:36.466Z |
| CVE-2024-4867 |
5.4 (3.1)
|
Cross-Site Scripting via Developer Portal in WSO2 API … |
WSO2 |
WSO2 API Manager |
2026-04-16T09:32:40.941Z | 2026-04-16T12:30:42.568Z |
| CVE-2024-10242 |
6.1 (3.1)
|
Reflected Cross-Site Scripting via Authentication Endp… |
WSO2 |
WSO2 API Manager |
2026-04-16T09:45:46.115Z | 2026-04-16T12:30:30.619Z |
| CVE-2026-23772 |
7.3 (3.1)
|
Dell Storage Manager - Replay Manager for Microso… |
Dell |
Storage Manager |
2026-04-16T08:30:56.774Z | 2026-04-17T03:55:13.852Z |
| CVE-2024-2374 |
7.5 (3.1)
|
XML External Entity Injection in Multiple WSO2 Product… |
WSO2 |
WSO2 API Manager |
2026-04-16T08:12:58.247Z | 2026-04-16T12:30:49.250Z |
| CVE-2026-0718 |
5.3 (3.1)
|
Post Grid Gutenberg Blocks for News, Magazines, Blog W… |
wpxpo |
Post Grid Gutenberg Blocks for News, Magazines, Blog Websites – PostX |
2026-04-16T07:39:50.799Z | 2026-04-16T12:55:16.326Z |
| CVE-2025-14868 |
8.8 (3.1)
|
Career Section <= 1.6 - Cross-Site Request Forgery to … |
shahinurislam |
Career Section |
2026-04-16T07:39:49.576Z | 2026-04-16T12:52:42.034Z |
| CVE-2026-41035 |
7.4 (3.1)
|
In rsync 3.0.1 through 3.4.1, receive_xattr relie… |
Samba |
rsync |
2026-04-16T06:53:05.237Z | 2026-04-16T20:16:00.985Z |
| CVE-2026-41034 |
5 (3.1)
|
ONLYOFFICE DocumentServer before 9.3.0 has an unt… |
Ascensio |
ONLYOFFICE DocumentServer |
2026-04-16T06:06:44.570Z | 2026-04-16T12:31:05.251Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-q42f-8h4q-g7mm |
6.2 (3.1)
|
In ONLYOFFICE DesktopEditors before 9.3.0, the update service allows attackers to perform actions o… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-pq6h-83gw-pj9p |
4.4 (3.1)
|
The OPEN-BRAIN plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'API Key' … | 2026-04-16T09:31:44Z | 2026-04-16T09:31:45Z |
| ghsa-m34r-4v3r-pp9v |
7.4 (3.1)
|
In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call… | 2026-04-16T09:31:44Z | 2026-04-16T21:31:12Z |
| ghsa-j38x-p248-237v |
8.8 (3.1)
|
The Career Section plugin for WordPress is vulnerable to Cross-Site Request Forgery leading to Path… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-8jmv-f2mx-h22c |
5.3 (3.1)
|
The Post Grid Gutenberg Blocks for News, Magazines, Blog Websites – PostX plugin for WordPress is v… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-4mcf-jj9c-gvp6 |
7.2 (3.1)
|
The Prismatic plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'prismatic_… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-2jv9-g2gr-pf4j |
6.4 (3.1)
|
The BetterDocs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'betterdoc… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-28j6-w975-f9x7 |
5.0 (3.1)
|
ONLYOFFICE DocumentServer before 9.3.0 has an untrusted pointer dereference in XLS processing/conve… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-jvgv-2979-qhcj |
6.4 (3.1)
|
The Livemesh Addons for Elementor plugin for WordPress is vulnerable to unauthorized modification o… | 2026-04-16T09:31:43Z | 2026-04-16T09:31:43Z |
| ghsa-9726-56v6-8wh4 |
6.4 (3.1)
|
The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for… | 2026-04-16T09:31:43Z | 2026-04-16T09:31:43Z |
| ghsa-xcvh-9j7m-6vw3 |
6.5 (3.1)
|
Eaton Intelligent Power Protector (IPP) software allows repeated authentication attempts against th… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-w622-v92m-9f53 |
6.0 (3.1)
|
Due to improper input validation in one of the Eaton Intelligent Power Protector (IPP) XML, it is p… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-w3cg-4gfc-vw5x |
7.8 (3.1)
|
Eaton Intelligent Power Protector (IPP) is affected by insecure library loading in its executable, … | 2026-04-16T06:31:23Z | 2026-04-16T15:31:32Z |
| ghsa-rhf4-34xg-3v3j |
6.3 (3.1)
5.1 (4.0)
|
UDP Console provided by Arcserve contains an incorrectly specified destination in a communication c… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-rg9x-pgh3-3gwf |
6.5 (3.1)
|
The Accessibility Suite by Ability, Inc plugin for WordPress is vulnerable to SQL Injection via the… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-m6jh-hgc7-xggx |
5.7 (3.1)
|
Eaton Intelligent Power Protector (IPP) uses an insecure cookie configuration, which could allow a … | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-jp62-r24w-285j |
6.4 (3.1)
|
The WP Docs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpdocs_optio… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-hjc2-4gp6-gj54 |
4.3 (3.1)
|
In Wago Smart Designer in versions up to 2.33.1 a low privileged remote attacker may enumerate proj… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-gp63-xp8x-53g4 |
8.8 (3.1)
|
In products of the MSE6 product-family by Festo a remote authenticated, low privileged attacker cou… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-9ghh-rh79-4vmr |
5.9 (3.1)
|
A security misconfiguration was identified in Eaton Intelligent Power Protector (IPP), where an HTT… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-8m7q-ggj7-m3wx |
7.5 (3.1)
|
The Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection via the 'options' … | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-83mq-cmhp-6pvq |
6.1 (3.1)
|
The CodeColorer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' p… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-742g-5jmq-x7cr |
6.4 (3.1)
|
The Vantage theme for WordPress is vulnerable to Stored Cross-Site Scripting via Gallery block text… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-6pcx-jf98-3w2h |
7.5 (3.1)
|
The Payment Gateway for Redsys & WooCommerce Lite plugin for WordPress is vulnerable to Improper Ve… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-6cjg-w4wg-37mh |
9.8 (3.1)
|
The Riaxe Product Customizer plugin for WordPress is vulnerable to Privilege Escalation in all vers… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-4xx2-h7jh-g7ph |
4.4 (3.1)
|
The Custom New User Notification plugin for WordPress is vulnerable to Stored Cross-Site Scripting … | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-4g9p-x8vm-f7qg |
5.3 (3.1)
|
The Riaxe Product Customizer plugin for WordPress is vulnerable to authorization bypass in all vers… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-45x5-433g-pc2h |
5.3 (3.1)
|
The Basic Google Maps Placemarks plugin for WordPress is vulnerable to authorization bypass in vers… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-3phr-p473-vc8q |
8.8 (3.1)
|
The AcyMailing plugin for WordPress is vulnerable to privilege escalation in all versions From 9.11… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-wxm2-x9x9-x5mj |
9.3 (3.1)
|
Luanti 5 before 5.15.2, when LuaJIT is used, allows a Lua sandbox escape via a crafted mod. | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-91 |
|
Langchain 0.0.171 is vulnerable to Arbitrary Code Execution. | langchain | 2023-06-14T15:15:00Z | 2023-08-28T16:50:25.676144Z |
| pysec-2023-88 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2023-06-08T21:15:00Z | 2023-06-16T18:28:10.272383Z |
| pysec-2023-90 |
|
Gradio is an open-source Python library that is used to build machine learning and data s… | gradio | 2023-06-08T00:15:00Z | 2023-06-21T05:27:13.352872Z |
| pysec-2023-85 |
|
Synapse is a Matrix protocol homeserver written in Python with the Twisted framework. A d… | matrix-synapse | 2023-06-06T19:15:00Z | 2023-06-13T20:24:13.764030Z |
| pysec-2023-84 |
|
Synapse is a Matrix protocol homeserver written in Python with the Twisted framework. In … | matrix-synapse | 2023-06-06T19:15:00Z | 2023-06-13T18:28:46.812103Z |
| pysec-2023-83 |
|
Directory traversal vulnerability in Starlette versions 0.13.5 and later and prior to 0.2… | starlette | 2023-06-01T02:15:00Z | 2023-06-08T05:25:54.818459Z |
| pysec-2023-81 |
|
A vulnerability classified as problematic was found in MindSpore 2.0.0-alpha/2.0.0-rc1. T… | mindspore | 2023-05-30T06:16:00Z | 2023-06-16T08:29:55.937187Z |
| pysec-2023-82 |
|
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail… | django-ses | 2023-05-26T21:15:00Z | 2023-06-06T20:23:42.892470Z |
| pysec-2023-74 |
|
Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authori… | requests | 2023-05-26T18:15:00Z | 2023-06-05T01:13:00.534973Z |
| pysec-2023-67 |
|
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foun… | matrix-synapse | 2023-05-26T14:15:00Z | 2023-06-05T01:12:54.808327Z |
| pysec-2023-66 |
|
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foun… | matrix-synapse | 2023-05-26T14:15:00Z | 2023-06-05T01:12:54.698222Z |
| pysec-2023-65 |
|
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foun… | matrix-synapse | 2023-05-26T14:15:00Z | 2023-06-05T01:12:54.592327Z |
| pysec-2023-75 |
|
Open redirect vulnerability in Tornado versions 6.3.1 and earlier allows a remote unauthe… | tornado | 2023-05-25T10:15:00Z | 2023-06-05T01:13:01.694311Z |
| pysec-2023-80 |
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In contract… | vyper | 2023-05-19T20:15:00Z | 2023-06-05T01:13:03.140034Z |
| pysec-2023-73 |
|
redis-7.0.10 was discovered to contain a segmentation violation. | redis | 2023-05-18T20:15:00Z | 2023-06-27T18:49:56.911238Z |
| pysec-2023-299 |
4.7 (3.1)
|
Insecure Temporary File in GitHub repository huggingface/transformers prior to 4.30.0. | transformers | 2023-05-18T17:15:00+00:00 | 2024-11-21T14:23:01.805729+00:00 |
| pysec-2023-69 |
|
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.3.1. | mlflow | 2023-05-17T21:15:00Z | 2023-06-05T01:12:55.503398Z |
| pysec-2023-71 |
|
Planet is software that provides satellite data. The secret file stores the user's Planet… | planet | 2023-05-12T21:15:00Z | 2023-06-05T01:12:57.755283Z |
| pysec-2023-79 |
|
Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to ve… | vyper | 2023-05-11T22:15:00Z | 2023-06-05T01:13:03.051477Z |
| pysec-2023-78 |
|
Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to ve… | vyper | 2023-05-11T21:15:00Z | 2023-06-05T01:13:02.949990Z |
| pysec-2023-77 |
|
Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to ve… | vyper | 2023-05-11T21:15:00Z | 2023-06-05T01:13:02.500642Z |
| pysec-2023-70 |
|
A directory traversal vulnerability in the /get-artifact API method of the mlflow platfor… | mlflow | 2023-05-11T02:15:00Z | 2023-06-05T01:12:55.587142Z |
| pysec-2023-63 |
|
in-toto is a framework to protect supply chain integrity. The in-toto configuration is re… | in-toto | 2023-05-10T18:15:00Z | 2023-06-05T01:12:53.259453Z |
| pysec-2023-64 |
|
mage-ai is an open-source data pipeline tool for transforming and integrating data. Those… | mage-ai | 2023-05-09T15:15:00Z | 2023-06-05T01:12:54.165512Z |
| pysec-2023-76 |
|
Vyper is a pythonic smart contract language for the EVM. The storage allocator does not g… | vyper | 2023-05-08T17:15:00Z | 2023-06-05T01:13:02.407312Z |
| pysec-2023-59 |
|
Privilege Context Switching Error vulnerability in Apache Software Foundation Apache Airf… | apache-airflow | 2023-05-08T12:15:00Z | 2023-06-05T01:12:45.655810Z |
| pysec-2023-60 |
|
Task instance details page in the UI is vulnerable to a stored XSS.This issue affects Apa… | apache-airflow | 2023-05-08T10:15:00Z | 2023-06-05T01:12:45.763850Z |
| pysec-2023-61 |
|
In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to b… | django | 2023-05-07T02:15:00Z | 2023-06-05T01:12:51.525399Z |
| pysec-2023-62 |
|
Flask is a lightweight WSGI web application framework. When all of the following conditio… | flask | 2023-05-02T18:15:00Z | 2023-06-05T01:12:52.229549Z |
| pysec-2023-72 |
|
** UNSUPPORTED WHEN ASSIGNED ** The Apache Spark UI offers the possibility to enable ACLs… | pyspark | 2023-05-02T09:15:00Z | 2023-06-05T01:12:58.679776Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2426 | Malicious code in partner-tracker (npm) | 2026-04-02T12:10:54Z | 2026-04-14T12:40:54Z |
| mal-2026-2423 | Malicious code in bytefrontier-partner (npm) | 2026-04-02T12:10:52Z | 2026-04-14T12:40:51Z |
| mal-2026-2422 | Malicious code in bytefrontier-api (npm) | 2026-04-02T12:10:50Z | 2026-04-14T12:40:51Z |
| mal-2026-2427 | Malicious code in partner-tracker-api (npm) | 2026-04-02T12:10:47Z | 2026-04-14T12:40:54Z |
| mal-2026-2429 | Malicious code in vv-ftend-core (npm) | 2026-04-02T12:10:43Z | 2026-04-14T12:40:55Z |
| mal-2026-2421 | Malicious code in @mgcrae/pino-pretty-logger (npm) | 2026-04-02T11:28:24Z | 2026-04-16T15:42:07Z |
| mal-2026-2419 | Malicious code in express-session-js (npm) | 2026-04-02T09:56:44Z | 2026-04-07T14:41:21Z |
| mal-2026-2420 | Malicious code in @_wnpm/wnpm-cli (npm) | 2026-04-02T09:53:07Z | 2026-04-07T14:41:19Z |
| mal-2026-2405 | Malicious code in eht-account (PyPI) | 2026-04-01T17:49:00Z | 2026-04-01T17:49:00Z |
| mal-2026-2404 | Malicious code in ether-account (PyPI) | 2026-04-01T16:32:11Z | 2026-04-01T16:32:11Z |
| mal-2026-2403 | Malicious code in polymarkets-sdk (PyPI) | 2026-04-01T15:30:14Z | 2026-04-01T16:27:32Z |
| mal-2026-2400 | Malicious code in kube-node-health (PyPI) | 2026-04-01T11:46:16Z | 2026-04-01T11:46:16Z |
| mal-2026-2328 | Malicious code in mcp-server-todo (npm) | 2026-04-01T11:23:23Z | 2026-04-07T14:41:23Z |
| mal-2026-2327 | Malicious code in kube-health-tools (PyPI) | 2026-04-01T09:47:27Z | 2026-04-01T09:47:27Z |
| mal-2026-2326 | Malicious code in raydium-bs58 (npm) | 2026-04-01T09:11:09Z | 2026-04-07T14:41:24Z |
| mal-2026-2323 | Malicious code in ethersproject-wallet (npm) | 2026-04-01T09:11:09Z | 2026-04-07T14:41:21Z |
| mal-2026-2322 | Malicious code in bs58-basic (npm) | 2026-04-01T09:11:09Z | 2026-04-07T14:41:20Z |
| mal-2026-2320 | Malicious code in base-x-64 (npm) | 2026-04-01T09:11:08Z | 2026-04-07T14:41:20Z |
| mal-2026-2325 | Malicious code in jonas-prettier-logger (npm) | 2026-04-01T09:10:18Z | 2026-04-07T14:41:22Z |
| mal-2026-2324 | Malicious code in jellyfi-pino-pretty-logger (npm) | 2026-04-01T09:10:18Z | 2026-04-07T14:41:22Z |
| mal-2026-2321 | Malicious code in base58-engine (npm) | 2026-04-01T09:10:18Z | 2026-04-07T14:41:20Z |
| mal-2026-2319 | Malicious code in base-or-engine (npm) | 2026-04-01T09:10:18Z | 2026-04-07T14:41:20Z |
| mal-2026-2318 | Malicious code in @logcore/pino-pretty-logger (npm) | 2026-04-01T09:10:18Z | 2026-04-07T14:41:19Z |
| mal-2026-2316 | Malicious code in openai-async-helpers (PyPI) | 2026-04-01T06:00:26Z | 2026-04-01T06:00:27Z |
| mal-2026-2317 | Malicious code in pygithub-async-utils (PyPI) | 2026-04-01T05:58:39Z | 2026-04-01T05:58:40Z |
| mal-2026-2315 | Malicious code in latinum-wallet-mcp (PyPI) | 2026-03-31T20:37:05Z | 2026-03-31T21:18:58Z |
| mal-2026-2314 | Malicious code in @c8o/nimbus-core (npm) | 2026-03-31T18:13:08Z | 2026-04-07T14:41:19Z |
| mal-2026-2313 | Malicious code in coredxloader (PyPI) | 2026-03-31T17:07:08Z | 2026-03-31T17:07:08Z |
| mal-2026-2312 | Malicious code in tailwindcss-typeface-inter (npm) | 2026-03-31T14:56:07Z | 2026-04-07T14:41:25Z |
| mal-2026-2311 | Malicious code in officepyai (PyPI) | 2026-03-31T09:26:34Z | 2026-03-31T09:28:16Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2825 | MediaWiki: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-12-10T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2824 | pgAdmin: Schwachstelle ermöglicht Codeausführung | 2025-12-10T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-2823 | Drupal (Acquia Content Hub): Schwachstelle ermöglicht Darstellen falscher Informationen | 2025-12-10T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2822 | GitLab: Mehrere Schwachstellen | 2025-12-10T23:00:00.000+00:00 | 2025-12-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2821 | Gogs: Schwachstelle ermöglicht Codeausführung | 2025-12-10T23:00:00.000+00:00 | 2025-12-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2820 | Red Hat Enterprise Linux (luksmeta): Schwachstelle ermöglicht Manipulation von Dateien | 2025-12-10T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-2819 | Jenkins: Mehrere Schwachstellen | 2025-12-10T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2818 | Pega Platform: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-10T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2817 | Exim: Schwachstelle ermöglicht Codeausführung | 2025-12-10T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2816 | ImageMagick: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-10T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2815 | xwiki: Schwachstelle ermöglicht Codeausführung | 2025-12-10T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2814 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-12-10T23:00:00.000+00:00 | 2025-12-22T23:00:00.000+00:00 |
| wid-sec-w-2025-2813 | Webmin: Schwachstelle ermöglicht Codeausführung | 2025-12-10T23:00:00.000+00:00 | 2025-12-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2812 | Mozilla Firefox: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2811 | xwiki: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2810 | Bitdefender Antivirus, Total Security und Internet Security: Schwachstelle ermöglicht Privilegieneskalation | 2025-12-09T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2809 | AMD- und Intel-Prozessoren (PCIe IDE): Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2025-12-09T23:00:00.000+00:00 |
| wid-sec-w-2025-2808 | Insyde UEFI Firmware: Schwachstelle ermöglicht Codeausführung | 2025-12-09T23:00:00.000+00:00 | 2025-12-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2807 | TianoCore EDK2: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-09T23:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2025-2806 | Fortinet FortiAuthenticator: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-12-09T23:00:00.000+00:00 | 2025-12-09T23:00:00.000+00:00 |
| wid-sec-w-2025-2805 | TianoCore EDK2: Schwachstelle ermöglicht Codeausführung | 2025-12-09T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2804 | Moxa MXsecurity: Schwachstelle ermöglicht Manipulation von Dateien | 2025-12-09T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2803 | MongoDB: Schwachstelle ermöglicht Beeinträchtigung von Integrität und Verfügbarkeit | 2025-12-09T23:00:00.000+00:00 | 2025-12-09T23:00:00.000+00:00 |
| wid-sec-w-2025-2802 | Notepad++: Schwachstelle ermöglicht Codeausführung | 2025-12-09T23:00:00.000+00:00 | 2026-02-03T23:00:00.000+00:00 |
| wid-sec-w-2025-2801 | Adobe Acrobat und Reader: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2025-12-09T23:00:00.000+00:00 |
| wid-sec-w-2025-2800 | Adobe ColdFusion: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2025-12-09T23:00:00.000+00:00 |
| wid-sec-w-2025-2799 | Docker Desktop: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-09T23:00:00.000+00:00 | 2025-12-09T23:00:00.000+00:00 |
| wid-sec-w-2025-2798 | Red Hat OpenShift Service Mesh: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-2797 | Zoom Video Communications Rooms: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2796 | Ivanti Endpoint Manager: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2025-12-09T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-077-04 | Schneider Electric EcoStruxure Panel Server | 2025-03-11T04:00:00.000000Z | 2025-03-11T04:00:00.000000Z |
| icsa-25-077-03 | Schneider Electric EcoStruxure Power Automation System | 2025-03-11T04:00:00.000000Z | 2025-03-11T04:00:00.000000Z |
| icsa-25-084-01 | ABB RMC-100 | 2025-03-11T00:30:00.000000Z | 2025-03-11T00:30:00.000000Z |
| icsa-25-072-11 | Siemens SIMATIC IPC Family, ITP1000, and Field PGs | 2025-03-11T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-25-072-10 | Siemens SINEMA Remote Connect Client | 2025-03-11T00:00:00.000000Z | 2025-03-11T00:00:00.000000Z |
| icsa-25-072-09 | Siemens OPC UA | 2025-03-11T00:00:00.000000Z | 2026-01-14T22:05:42.018496Z |
| icsa-25-072-08 | Siemens Tecnomatix Plant Simulation | 2025-03-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-072-07 | Siemens SCALANCE M-800 and SC-600 Families | 2025-03-11T00:00:00.000000Z | 2025-03-11T00:00:00.000000Z |
| icsa-25-072-06 | Siemens SCALANCE LPE9403 | 2025-03-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-072-05 | Siemens SINAMICS S200 | 2025-03-11T00:00:00.000000Z | 2025-03-11T00:00:00.000000Z |
| icsa-25-072-04 | Siemens SiPass integrated AC5102/ACC-G2 and ACC-AP | 2025-03-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-072-03 | Siemens SIMATIC S7-1500 TM MFP | 2025-03-11T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| icsa-25-072-02 | Siemens SINEMA Remote Connect Server | 2025-03-11T00:00:00.000000Z | 2025-03-11T00:00:00.000000Z |
| icsa-25-072-01 | Siemens Teamcenter Visualization and Tecnomatix | 2025-03-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-063-08 | Edimax IC-7100 IP Camera | 2025-03-04T07:00:00.000000Z | 2025-03-04T07:00:00.000000Z |
| icsa-25-063-07 | GMOD Apollo | 2025-03-04T07:00:00.000000Z | 2025-03-04T07:00:00.000000Z |
| icsa-25-063-06 | Delta Electronics CNCSoft-G2 | 2025-03-04T07:00:00.000000Z | 2025-03-04T07:00:00.000000Z |
| icsa-25-063-02 | Keysight Ixia Vision Product Family (Update A) | 2025-03-04T07:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-063-01 | Carrier Block Load | 2025-03-04T07:00:00.000000Z | 2025-03-04T07:00:00.000000Z |
| icsma-25-058-01 | Dario Health USB-C Blood Glucose Monitoring System Starter Kit Android Application | 2025-02-27T07:00:00.000000Z | 2025-02-27T07:00:00.000000Z |
| icsa-25-058-01 | Schneider Electric communication modules for Modicon M580 and Quantum controllers (Update B) | 2025-02-27T07:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-133-03 | Hitachi Energy MACH GWS products | 2025-02-25T13:30:00.000000Z | 2025-02-25T13:30:00.000000Z |
| icsa-25-133-01 | Hitachi Energy Service Suite | 2025-02-25T13:30:00.000000Z | 2025-02-25T13:30:00.000000Z |
| icsa-25-065-01 | Hitachi Energy PCU400 | 2025-02-25T13:30:00.000000Z | 2025-02-25T13:30:00.000000Z |
| icsa-25-063-03 | Hitachi Energy MACH PS700 | 2025-02-25T13:30:00.000000Z | 2025-02-25T13:30:00.000000Z |
| icsa-25-056-01 | Rockwell Automation PowerFlex 755 | 2025-02-25T07:00:00.000000Z | 2025-02-25T07:00:00.000000Z |
| icsma-25-051-01 | Medixant RadiAnt DICOM Viewer | 2025-02-20T07:00:00.000000Z | 2025-02-20T07:00:00.000000Z |
| icsa-25-051-05 | Rapid Response Monitoring My Security Account App | 2025-02-20T07:00:00.000000Z | 2025-02-20T07:00:00.000000Z |
| icsa-25-051-03 | Carrier Block Load | 2025-02-20T07:00:00.000000Z | 2025-02-20T07:00:00.000000Z |
| icsa-25-051-06 | Elseta Vinci Protocol Analyzer | 2025-02-18T07:00:00.000000Z | 2025-02-18T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-thoueye-privesc-nvhhgwb3 | Cisco ThousandEyes Enterprise Agent Virtual Appliance Privilege Escalation Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-17T21:54:23+00:00 |
| cisco-sa-te-va-priv-esc-pudgrx8e | Cisco ThousandEyes Enterprise Agent Virtual Appliance Privilege Escalation Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-17T22:00:29+00:00 |
| cisco-sa-pi-epnm-storedxss-ttjo62r | Cisco Prime Infrastructure and Evolved Programmable Network Manager Stored Cross-Site Scripting Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-pi-epnm-bfjsrjp5 | Cisco Prime Infrastructure and Evolved Programmable Network Manager Cross-Site Scripting Vulnerabilities | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-ivpa-cmdinj-c5xrbboy | Cisco Intersight Private Virtual Appliance Command Injection Vulnerabilities | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-ise-credentials-tkto3h3 | Cisco Identity Services Engine Device Credential Information Disclosure Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-ipphone-csrf-hocmxw2c | Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Request Forgery Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-intersight-forward-c45ncgqb | Cisco Intersight Virtual Appliance Unauthenticated Port Forwarding Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-expressway-injection-x475ebtq | Cisco Expressway Series and Cisco TelePresence Video Communication Server Command Injection Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-duo-dha-filewrite-xpmbmzak | Cisco Duo Device Health Application for Windows Arbitrary File Write Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-cucm-injection-g6mbwh2 | Cisco Unified Communications Manager SQL Injection Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-cucm-imp-xss-qtt4vdsk | Cisco Unified Communications Products Cross-Site Scripting Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-clamav-rnwneeee | ClamAV HFS+ File Scanning Infinite Loop Denial of Service Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-25T16:08:02+00:00 |
| cisco-sa-clamav-dos-ftkhqmwz | ClamAV AutoIt Module Denial of Service Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-cimc-xss-umytyetr | Cisco Integrated Management Controller Cross-Site Scripting Vulnerability | 2023-08-16T16:00:00+00:00 | 2024-02-22T20:57:19+00:00 |
| cisco-sa-ac-leak-sew6g2kd | Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables Affecting Cisco AnyConnect Secure Mobility Client and Cisco Secure Client | 2023-08-08T15:00:00+00:00 | 2023-08-08T15:00:00+00:00 |
| cisco-sa-wsa-bypass-vxvqwzsj | Cisco Secure Web Appliance Content Encoding Filter Bypass Vulnerability | 2023-08-02T16:00:00+00:00 | 2024-08-14T14:27:30+00:00 |
| cisco-sa-commpilot-xss-jc46sezf | Cisco BroadWorks CommPilot Application Software Cross-Site Scripting Vulnerability | 2023-08-02T16:00:00+00:00 | 2023-08-30T19:34:29+00:00 |
| cisco-sa-asaftd-aclconfig-wvk52f3z | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software ACLs Not Installed upon Reload | 2023-07-27T16:00:00+00:00 | 2023-07-27T16:38:54+00:00 |
| cisco-sa-spa-web-multi-7kvpmu2f | Cisco Small Business SPA500 Series IP Phones Web UI Vulnerabilities | 2023-07-19T16:00:00+00:00 | 2023-07-19T16:00:00+00:00 |
| cisco-sa-bw-priv-esc-qtguzosq | Cisco BroadWorks Privilege Escalation Vulnerability | 2023-07-19T16:00:00+00:00 | 2023-07-20T17:42:21+00:00 |
| cisco-sa-vmanage-unauthapi-sphclypa | Cisco SD-WAN vManage Unauthenticated REST API Access Vulnerability | 2023-07-12T16:00:00+00:00 | 2024-03-12T18:21:23+00:00 |
| cisco-sa-sxsscsrf-2l24bbx6 | Cisco Webex Meetings Web UI Vulnerabilities | 2023-07-05T16:00:00+00:00 | 2023-07-05T16:00:00+00:00 |
| cisco-sa-duo-auth-info-jgkswblz | Cisco Duo Authentication Proxy Information Disclosure Vulnerability | 2023-07-05T16:00:00+00:00 | 2023-07-07T15:45:19+00:00 |
| cisco-sa-bw-privesc-yw4ekrxw | Cisco BroadWorks Privilege Escalation Vulnerability | 2023-07-05T16:00:00+00:00 | 2023-07-05T16:00:00+00:00 |
| cisco-sa-aci-cloudsec-enc-vs5wn2sx | Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability | 2023-07-05T16:00:00+00:00 | 2023-07-08T14:43:43+00:00 |
| cisco-sa-esa-sma-wsa-xss-cp9duemq | Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities | 2023-06-21T16:00:00+00:00 | 2023-07-11T16:43:10+00:00 |
| cisco-sa-duo-mac-bypass-oyzpvpnx | Cisco Duo Two-Factor Authentication for macOS Authentication Bypass Vulnerability | 2023-06-21T16:00:00+00:00 | 2023-06-21T16:00:00+00:00 |
| cisco-sa-smb-sxss-opyjzume | Cisco Small Business 200, 300, and 500 Series Switches Web-Based Management Stored Cross-Site Scripting Vulnerability | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| cisco-sa-expressway-priv-esc-ls2b9t7b | Cisco Expressway Series and Cisco TelePresence Video Communication Server Privilege Escalation Vulnerabilities | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-23392 | netfilter: nf_tables: release flowtable after rcu grace period on error | 2026-03-02T00:00:00.000Z | 2026-03-27T14:40:15.000Z |
| msrc_cve-2026-23391 | netfilter: xt_CT: drop pending enqueued packets on template removal | 2026-03-02T00:00:00.000Z | 2026-03-27T14:39:55.000Z |
| msrc_cve-2026-23390 | tracing/dma: Cap dma_map_sg tracepoint arrays to prevent buffer overflow | 2026-03-02T00:00:00.000Z | 2026-03-27T14:41:06.000Z |
| msrc_cve-2026-23389 | ice: Fix memory leak in ice_set_ringparam() | 2026-03-02T00:00:00.000Z | 2026-03-31T14:50:20.000Z |
| msrc_cve-2026-23388 | Squashfs: check metadata block offset is within range | 2026-03-02T00:00:00.000Z | 2026-03-27T14:40:35.000Z |
| msrc_cve-2026-23386 | gve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL | 2026-03-02T00:00:00.000Z | 2026-03-27T01:37:16.000Z |
| msrc_cve-2026-23383 | bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing | 2026-03-02T00:00:00.000Z | 2026-03-31T14:42:31.000Z |
| msrc_cve-2026-23382 | HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them | 2026-03-02T00:00:00.000Z | 2026-03-27T14:39:41.000Z |
| msrc_cve-2026-23381 | net: bridge: fix nd_tbl NULL dereference when IPv6 is disabled | 2026-03-02T00:00:00.000Z | 2026-03-27T14:43:07.000Z |
| msrc_cve-2026-23379 | net/sched: ets: fix divide by zero in the offload path | 2026-03-02T00:00:00.000Z | 2026-03-27T14:44:27.000Z |
| msrc_cve-2026-23378 | net/sched: act_ife: Fix metalist update behavior | 2026-03-02T00:00:00.000Z | 2026-03-27T01:36:43.000Z |
| msrc_cve-2026-23377 | ice: change XDP RxQ frag_size from DMA write length to xdp.frame_sz | 2026-03-02T00:00:00.000Z | 2026-03-31T14:39:00.000Z |
| msrc_cve-2026-23374 | blktrace: fix __this_cpu_read/write in preemptible context | 2026-03-02T00:00:00.000Z | 2026-03-31T14:48:26.000Z |
| msrc_cve-2026-23372 | nfc: rawsock: cancel tx_work before socket teardown | 2026-03-02T00:00:00.000Z | 2026-03-27T01:43:20.000Z |
| msrc_cve-2026-23371 | sched/deadline: Fix missing ENQUEUE_REPLENISH during PI de-boosting | 2026-03-02T00:00:00.000Z | 2026-03-31T14:45:31.000Z |
| msrc_cve-2026-23370 | platform/x86: dell-wmi-sysman: Don't hex dump plaintext password data | 2026-03-02T00:00:00.000Z | 2026-03-27T14:39:28.000Z |
| msrc_cve-2026-23368 | net: phy: register phy led_triggers during probe to avoid AB-BA deadlock | 2026-03-02T00:00:00.000Z | 2026-03-27T14:40:55.000Z |
| msrc_cve-2026-23367 | wifi: radiotap: reject radiotap with unknown bits | 2026-03-02T00:00:00.000Z | 2026-03-27T14:44:07.000Z |
| msrc_cve-2026-23365 | net: usb: kalmia: validate USB endpoints | 2026-03-02T00:00:00.000Z | 2026-03-27T14:44:33.000Z |
| msrc_cve-2026-23364 | ksmbd: Compare MACs in constant time | 2026-03-02T00:00:00.000Z | 2026-03-27T14:41:20.000Z |
| msrc_cve-2026-23361 | PCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry | 2026-03-02T00:00:00.000Z | 2026-03-31T14:38:36.000Z |
| msrc_cve-2026-23359 | bpf: Fix stack-out-of-bounds write in devmap | 2026-03-02T00:00:00.000Z | 2026-03-27T14:40:21.000Z |
| msrc_cve-2026-23357 | can: mcp251x: fix deadlock in error path of mcp251x_open | 2026-03-02T00:00:00.000Z | 2026-03-27T14:42:33.000Z |
| msrc_cve-2026-23356 | drbd: fix "LOGIC BUG" in drbd_al_begin_io_nonblock() | 2026-03-02T00:00:00.000Z | 2026-03-27T14:43:54.000Z |
| msrc_cve-2026-23352 | x86/efi: defer freeing of boot services memory | 2026-03-02T00:00:00.000Z | 2026-03-27T14:41:33.000Z |
| msrc_cve-2026-23351 | netfilter: nft_set_pipapo: split gc into unlink and reclaim phase | 2026-03-02T00:00:00.000Z | 2026-03-27T14:42:20.000Z |
| msrc_cve-2026-23348 | cxl: Fix race of nvdimm_bus object when creating nvdimm objects | 2026-03-02T00:00:00.000Z | 2026-03-31T14:43:33.000Z |
| msrc_cve-2026-23347 | can: usb: f81604: correctly anchor the urb in the read bulk callback | 2026-03-02T00:00:00.000Z | 2026-03-27T14:43:34.000Z |
| msrc_cve-2026-23346 | arm64: io: Extract user memory type in ioremap_prot() | 2026-03-02T00:00:00.000Z | 2026-03-31T14:43:09.000Z |
| msrc_cve-2026-23343 | xdp: produce a warning when calculated tailroom is negative | 2026-03-02T00:00:00.000Z | 2026-03-27T14:44:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0487 | Kwetsbaarheden verholpen in Apple iPadOS en iOS | 2024-12-12T10:30:17.550009Z | 2024-12-12T10:30:17.550009Z |
| ncsc-2024-0486 | Kwetsbaarheden verholpen in Ivanti Cloud Security Appliance | 2024-12-11T08:58:00.974296Z | 2024-12-11T08:58:00.974296Z |
| ncsc-2024-0485 | Kwetsbaarheid verholpen in Splunk Enterprise | 2024-12-11T08:53:56.285002Z | 2024-12-11T08:53:56.285002Z |
| ncsc-2024-0484 | Kwetsbaarheden verholpen in Ivanti Connect Secure en Policy Secure | 2024-12-11T08:50:15.463062Z | 2025-01-08T11:00:21.273985Z |
| ncsc-2024-0483 | Kwetsbaarheden verholpen in Adobe Connect | 2024-12-11T08:46:09.788540Z | 2024-12-11T08:46:09.788540Z |
| ncsc-2024-0482 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2024-12-11T08:42:21.663200Z | 2024-12-11T08:42:21.663200Z |
| ncsc-2024-0481 | Kwetsbaarheden verholpen in Adobe Illustrator | 2024-12-11T08:37:21.228987Z | 2024-12-11T08:37:21.228987Z |
| ncsc-2024-0480 | Kwetsbaarheid verholpen in Adobe After Effects | 2024-12-11T08:34:49.812349Z | 2024-12-11T08:34:49.812349Z |
| ncsc-2024-0479 | Kwetsbaarheden verholpen in Animate | 2024-12-11T08:31:02.174506Z | 2024-12-11T08:31:02.174506Z |
| ncsc-2024-0478 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2024-12-11T08:20:20.778758Z | 2024-12-11T08:20:20.778758Z |
| ncsc-2024-0477 | Kwetsbaarheid verholpen in Adobe Photoshop | 2024-12-11T08:17:46.923581Z | 2024-12-11T08:17:46.923581Z |
| ncsc-2024-0476 | Kwetsbaarheid verholpen in Adobe Premiere Pro | 2024-12-11T08:12:35.655333Z | 2024-12-11T08:12:35.655333Z |
| ncsc-2024-0475 | Kwetsbaarheid verholpen in Adobe Framemaker | 2024-12-11T08:06:34.387394Z | 2024-12-11T08:06:34.387394Z |
| ncsc-2024-0474 | Kwetsbaarheden verholpen in Drupal Core | 2024-12-10T19:35:37.345875Z | 2024-12-10T19:35:37.345875Z |
| ncsc-2024-0473 | Kwetsbaarheden verholpen in Siemens producten | 2024-12-10T19:34:53.515240Z | 2024-12-10T19:34:53.515240Z |
| ncsc-2024-0472 | Kwetsbaarheden verholpen in SAP producten | 2024-12-10T19:34:10.105945Z | 2024-12-10T19:34:10.105945Z |
| ncsc-2024-0471 | Kwetsbaarheden verholpen in Microsoft Office | 2024-12-10T19:33:29.415423Z | 2024-12-10T19:33:29.415423Z |
| ncsc-2024-0470 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-12-10T19:32:38.846024Z | 2025-01-06T07:30:29.655717Z |
| ncsc-2024-0469 | Kwetsbaarheden verholpen in Qlik Sense Enterprise voor Windows | 2024-12-09T13:38:50.887753Z | 2024-12-09T13:38:50.887753Z |
| ncsc-2024-0468 | Kwetsbaarheden verholpen in Mitel MiCollab | 2024-12-09T13:37:33.039167Z | 2024-12-09T13:37:33.039167Z |
| ncsc-2024-0467 | Kwetsbaarheden verholpen in QNAP besturingssystemen | 2024-12-09T13:36:33.362104Z | 2024-12-09T13:36:33.362104Z |
| ncsc-2024-0466 | Kwetsbaarheden verholpen in Atlassian producten | 2024-12-06T13:05:55.904619Z | 2024-12-06T13:05:55.904619Z |
| ncsc-2024-0465 | Kwetsbaarheden verholpen in ABB ASPECT, NEXUS Series en MATRIX Series | 2024-12-06T11:49:21.695542Z | 2024-12-06T11:49:21.695542Z |
| ncsc-2024-0464 | Kwetsbaarheden verholpen in SonicWall SMA100 SSLVPN | 2024-12-06T11:48:08.461746Z | 2024-12-06T11:48:08.461746Z |
| ncsc-2024-0463 | Kwetsbaarheden verholpen in Veeam Backup & Replication | 2024-12-06T11:47:19.699742Z | 2024-12-06T11:47:19.699742Z |
| ncsc-2024-0462 | Kwetsbaarheden verholpen in Zabbix | 2024-12-02T12:51:47.361749Z | 2024-12-02T12:51:47.361749Z |
| ncsc-2024-0461 | Kwetsbaarheden verholpen in IBM Security Verify Access Appliance | 2024-12-02T10:55:14.978137Z | 2024-12-02T10:55:14.978137Z |
| ncsc-2024-0460 | Kwetsbaarheid verholpen in Zabbix | 2024-11-28T14:24:11.654121Z | 2024-11-28T14:24:11.654121Z |
| ncsc-2024-0459 | Kwetsbaarheden verholpen in VMware Aria Operations | 2024-11-26T13:25:37.944485Z | 2024-11-26T13:25:37.944485Z |
| ncsc-2024-0458 | Kwetsbaarheden ontdekt in Veritas Enterprise Vault | 2024-11-25T09:04:34.013551Z | 2024-11-25T09:04:34.013551Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20097-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-01-23T16:43:58Z | 2026-01-23T16:43:58Z |
| opensuse-su-2026:20095-1 | Security update for python-jaraco.context | 2026-01-23T10:43:43Z | 2026-01-23T10:43:43Z |
| opensuse-su-2026:20105-1 | Security update for sbctl | 2026-01-23T10:02:42Z | 2026-01-23T10:02:42Z |
| opensuse-su-2026:10087-1 | tdom-0.9.6-1.1 on GA media | 2026-01-23T00:00:00Z | 2026-01-23T00:00:00Z |
| opensuse-su-2026:10086-1 | openCryptoki-3.26.0-4.1 on GA media | 2026-01-23T00:00:00Z | 2026-01-23T00:00:00Z |
| opensuse-su-2026:10085-1 | libxml2-16-2.14.5-2.1 on GA media | 2026-01-23T00:00:00Z | 2026-01-23T00:00:00Z |
| opensuse-su-2026:10084-1 | chromedriver-144.0.7559.96-1.1 on GA media | 2026-01-23T00:00:00Z | 2026-01-23T00:00:00Z |
| opensuse-su-2026:20091-1 | Security update for bind | 2026-01-22T16:45:35Z | 2026-01-22T16:45:35Z |
| opensuse-su-2026:20090-1 | Security update for busybox | 2026-01-22T16:45:35Z | 2026-01-22T16:45:35Z |
| opensuse-su-2026:20089-1 | Security update for python-pyasn1 | 2026-01-22T16:42:14Z | 2026-01-22T16:42:14Z |
| opensuse-su-2026:20088-1 | Security update for python-urllib3 | 2026-01-22T15:55:37Z | 2026-01-22T15:55:37Z |
| opensuse-su-2026:20086-1 | Security update for python-virtualenv | 2026-01-22T15:55:37Z | 2026-01-22T15:55:37Z |
| opensuse-su-2026:20087-1 | Security update for python-marshmallow | 2026-01-22T15:55:36Z | 2026-01-22T15:55:36Z |
| opensuse-su-2026:20085-1 | Security update for go1.25 | 2026-01-22T15:49:20Z | 2026-01-22T15:49:20Z |
| opensuse-su-2026:20084-1 | Security update for gdk-pixbuf | 2026-01-22T14:36:57Z | 2026-01-22T14:36:57Z |
| opensuse-su-2026:20083-1 | Security update for libpng16 | 2026-01-22T14:29:42Z | 2026-01-22T14:29:42Z |
| opensuse-su-2026:20082-1 | Security update for rabbitmq-server | 2026-01-22T13:47:27Z | 2026-01-22T13:47:27Z |
| opensuse-su-2026:20081-1 | Security update for python313 | 2026-01-22T13:47:27Z | 2026-01-22T13:47:27Z |
| opensuse-su-2026:20080-1 | Security update for buildah | 2026-01-22T13:00:13Z | 2026-01-22T13:00:13Z |
| opensuse-su-2026:20077-1 | Security update for go1.24 | 2026-01-22T12:53:33Z | 2026-01-22T12:53:33Z |
| opensuse-su-2026:20076-1 | Security update for libheif | 2026-01-22T11:00:42Z | 2026-01-22T11:00:42Z |
| opensuse-su-2026:20075-1 | Security update for libpcap | 2026-01-22T10:13:12Z | 2026-01-22T10:13:12Z |
| opensuse-su-2026:10083-1 | vlang-0.5-2.1 on GA media | 2026-01-22T00:00:00Z | 2026-01-22T00:00:00Z |
| opensuse-su-2026:10082-1 | libsuricata8_0_3-8.0.3-1.1 on GA media | 2026-01-22T00:00:00Z | 2026-01-22T00:00:00Z |
| opensuse-su-2026:10081-1 | libsubid-devel-4.19.2-2.1 on GA media | 2026-01-22T00:00:00Z | 2026-01-22T00:00:00Z |
| opensuse-su-2026:10080-1 | bind-9.20.18-1.1 on GA media | 2026-01-22T00:00:00Z | 2026-01-22T00:00:00Z |
| opensuse-su-2026:20100-1 | Security update for gimp | 2026-01-21T13:31:29Z | 2026-01-21T13:31:29Z |
| opensuse-su-2026:20072-1 | Security update for podman | 2026-01-21T11:06:30Z | 2026-01-21T11:06:30Z |
| opensuse-su-2026:10079-1 | python311-weasyprint-68.0-1.1 on GA media | 2026-01-21T00:00:00Z | 2026-01-21T00:00:00Z |
| opensuse-su-2026:10078-1 | python311-pyasn1-0.6.2-1.1 on GA media | 2026-01-21T00:00:00Z | 2026-01-21T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:4266 | Red Hat Security Advisory: php security update | 2026-03-11T06:56:11+00:00 | 2026-04-08T16:38:03+00:00 |
| rhsa-2026:4264 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-03-11T06:05:36+00:00 | 2026-04-14T07:58:59+00:00 |
| rhsa-2026:4260 | Red Hat Security Advisory: thunderbird security update | 2026-03-11T05:56:46+00:00 | 2026-03-23T13:12:13+00:00 |
| rhsa-2026:3851 | Red Hat Security Advisory: OpenShift Container Platform 4.20.16 packages and security update | 2026-03-11T05:24:06+00:00 | 2026-04-14T07:58:44+00:00 |
| rhsa-2026:4256 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-03-11T05:17:15+00:00 | 2026-04-14T07:58:59+00:00 |
| rhsa-2026:3875 | Red Hat Security Advisory: OpenShift Container Platform 4.18.35 packages and security update | 2026-03-11T05:09:45+00:00 | 2026-04-14T07:58:46+00:00 |
| rhsa-2026:3876 | Red Hat Security Advisory: OpenShift Container Platform 4.18.35 bug fix and security update | 2026-03-11T05:01:57+00:00 | 2026-04-09T14:35:59+00:00 |
| rhsa-2026:3855 | Red Hat Security Advisory: OpenShift Container Platform 4.20.16 bug fix and security update | 2026-03-11T04:54:31+00:00 | 2026-04-14T07:58:45+00:00 |
| rhsa-2026:3905 | Red Hat Security Advisory: OpenShift Container Platform 4.18.35 bug fix and security update | 2026-03-11T04:27:58+00:00 | 2026-04-14T09:46:43+00:00 |
| rhsa-2026:3906 | Red Hat Security Advisory: OpenShift Container Platform 4.18.35 security and extras update | 2026-03-11T03:54:55+00:00 | 2026-04-14T07:58:49+00:00 |
| rhsa-2026:3856 | Red Hat Security Advisory: OpenShift Container Platform 4.20.16 security and extras update | 2026-03-11T03:54:47+00:00 | 2026-04-14T07:58:45+00:00 |
| rhsa-2026:4254 | Red Hat Security Advisory: postgresql:15 security update | 2026-03-11T03:43:15+00:00 | 2026-04-10T21:16:34+00:00 |
| rhsa-2026:4246 | Red Hat Security Advisory: kernel security update | 2026-03-11T01:14:40+00:00 | 2026-04-13T08:42:30+00:00 |
| rhsa-2026:4243 | Red Hat Security Advisory: kernel security update | 2026-03-11T00:55:20+00:00 | 2026-04-13T08:35:49+00:00 |
| rhsa-2026:4242 | Red Hat Security Advisory: kernel security update | 2026-03-11T00:49:15+00:00 | 2026-04-13T08:35:47+00:00 |
| rhsa-2026:4245 | Red Hat Security Advisory: kernel security update | 2026-03-11T00:49:10+00:00 | 2026-04-13T08:40:23+00:00 |
| rhsa-2026:4244 | Red Hat Security Advisory: kernel-rt security update | 2026-03-11T00:12:55+00:00 | 2026-04-13T08:40:22+00:00 |
| rhsa-2026:4188 | Red Hat Security Advisory: gnutls security update | 2026-03-10T23:45:15+00:00 | 2026-04-13T18:42:13+00:00 |
| rhsa-2026:4235 | Red Hat Security Advisory: nginx:1.26 security update | 2026-03-10T22:41:04+00:00 | 2026-04-08T14:06:36+00:00 |
| rhsa-2026:4216 | Red Hat Security Advisory: python3.11 security update | 2026-03-10T22:38:00+00:00 | 2026-04-09T15:16:58+00:00 |
| rhsa-2026:4211 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-10T22:25:59+00:00 | 2026-04-14T09:46:40+00:00 |
| rhsa-2026:4207 | Red Hat Security Advisory: 389-ds-base security update | 2026-03-10T22:08:24+00:00 | 2026-03-31T17:24:17+00:00 |
| rhsa-2026:4177 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-03-10T19:22:05+00:00 | 2026-04-14T07:58:56+00:00 |
| rhsa-2026:4221 | Red Hat Security Advisory: libpng15 security update | 2026-03-10T18:24:49+00:00 | 2026-04-09T14:36:07+00:00 |
| rhsa-2026:4214 | Red Hat Security Advisory: openssl security update | 2026-03-10T17:59:04+00:00 | 2026-04-09T23:05:48+00:00 |
| rhsa-2026:4222 | Red Hat Security Advisory: libpng15 security update | 2026-03-10T17:58:09+00:00 | 2026-04-09T14:36:08+00:00 |
| rhsa-2026:4212 | Red Hat Security Advisory: php security update | 2026-03-10T17:34:04+00:00 | 2026-04-08T16:38:02+00:00 |
| rhsa-2026:4220 | Red Hat Security Advisory: Red Hat Lightspeed (formerly Insights) for Runtimes security update | 2026-03-10T17:00:10+00:00 | 2026-04-14T07:58:58+00:00 |
| rhsa-2026:4215 | Red Hat Security Advisory: Red Hat Quay 3.14.6 | 2026-03-10T15:34:38+00:00 | 2026-04-14T09:46:41+00:00 |
| rhsa-2026:4185 | Red Hat Security Advisory: Red Hat Quay 3.13.11 | 2026-03-10T13:57:02+00:00 | 2026-04-14T09:46:40+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-365397 | SSA-365397: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.2.0.1 | 2021-08-10T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-309571 | SSA-309571: IPU 2021.1 Vulnerabilities in Siemens Industrial Products using Intel CPUs (June 2021) | 2021-08-10T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-158827 | SSA-158827: Denial-of-Service Vulnerability in Automation License Manager | 2021-08-10T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-789208 | SSA-789208: Multiple Vulnerabilities (INFRA:HALT) in Interniche IP-Stack based Low Voltage Devices | 2021-08-04T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-941426 | SSA-941426: Multiple LLDP Vulnerabilities in Industrial Products | 2021-07-13T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-913875 | SSA-913875: Frame Aggregation and Fragmentation Vulnerabilities in 802.11 | 2021-07-13T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-772220 | SSA-772220: OpenSSL Vulnerabilities in Industrial Products | 2021-07-13T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-729965 | SSA-729965: TLS Certificate Validation Vulnerability in SINUMERIK Integrate Operate Client | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-675303 | SSA-675303: WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens Products | 2021-07-13T00:00:00Z | 2022-02-08T00:00:00Z |
| ssa-661034 | SSA-661034: Incorrect Permission Assignment in Multiple SIMATIC Software Products | 2021-07-13T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-641963 | SSA-641963: Remote Code Execution Vulnerability in Multiple SIMATIC Software Products | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-622535 | SSA-622535: Multiple Vulnerabilities in Teamcenter Active Workspace | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-599968 | SSA-599968: Denial of Service Vulnerability in Profinet Devices | 2021-07-13T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-560465 | SSA-560465: DHCP Client Vulnerability in VxWorks-based Industrial Products | 2021-07-13T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-483182 | SSA-483182: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.2 | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-448291 | SSA-448291: Denial-of-Service Vulnerability in ARP Protocol of RWG Universal Controllers | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-434536 | SSA-434536: Memory Protection Bypass Vulnerability in SINUMERIK ONE and SINUMERIK MC | 2021-07-13T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-434535 | SSA-434535: Memory Protection Bypass Vulnerability in SINAMICS PERFECT HARMONY GH180 Drives | 2021-07-13T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-373591 | SSA-373591: Buffer Overflow Vulnerability in RUGGEDCOM ROS Devices | 2021-07-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-352521 | SSA-352521: Access Check Bypass Vulnerability in Mendix | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-209268 | SSA-209268: Multiple JT File Parsing Vulnerabilities in JT Utilities before V13.0.2.0 | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-173615 | SSA-173615: Multiple PAR and ASM File Parsing Vulnerabilities in Solid Edge | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-787292 | SSA-787292: Denial of Service Vulnerability in SIMATIC RFID Readers | 2021-06-08T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-645530 | SSA-645530: TIFF File Parsing Vulnerability in JT2Go and Teamcenter Visualization before V13.1.0.3 | 2021-06-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-522654 | SSA-522654: Privilege Escalation Vulnerability in Mendix SAML Module | 2021-06-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-419820 | SSA-419820: Denial-of-Service Vulnerability in TIM 1531 IRC | 2021-06-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-211752 | SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA | 2021-06-08T00:00:00Z | 2022-02-08T00:00:00Z |
| ssa-208356 | SSA-208356: DFT File Parsing Vulnerabilities in Solid Edge | 2021-06-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-200951 | SSA-200951: Multiple Vulnerabilities in Third-Party Component libcurl of TIM Devices | 2021-06-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-133038 | SSA-133038: Multiple Modfem File Parsing Vulnerabilities in Simcenter Femap | 2021-06-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0983-1 | Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4) | 2026-03-23T17:08:57Z | 2026-03-23T17:08:57Z |
| suse-su-2026:0982-1 | Security update for util-linux | 2026-03-23T16:48:30Z | 2026-03-23T16:48:30Z |
| suse-su-2026:0981-1 | Security update for strongswan | 2026-03-23T16:47:22Z | 2026-03-23T16:47:22Z |
| suse-su-2026:0980-1 | Security update for strongswan | 2026-03-23T16:46:54Z | 2026-03-23T16:46:54Z |
| suse-su-2026:0979-1 | Security update for strongswan | 2026-03-23T16:46:31Z | 2026-03-23T16:46:31Z |
| suse-su-2026:0978-1 | Security update for strongswan | 2026-03-23T16:46:24Z | 2026-03-23T16:46:24Z |
| suse-su-2026:0977-1 | Security update for go1.25-openssl | 2026-03-23T16:35:10Z | 2026-03-23T16:35:10Z |
| suse-su-2026:0976-1 | Security update for go1.26-openssl | 2026-03-23T16:34:53Z | 2026-03-23T16:34:53Z |
| suse-su-2026:0975-1 | Security update for python-Authlib | 2026-03-23T16:34:37Z | 2026-03-23T16:34:37Z |
| suse-su-2026:0972-1 | Security update for docker-stable | 2026-03-23T15:21:42Z | 2026-03-23T15:21:42Z |
| suse-su-2026:0971-1 | Security update for python39 | 2026-03-23T14:35:04Z | 2026-03-23T14:35:04Z |
| suse-su-2026:0970-1 | Security update for the Linux Kernel (Live Patch 73 for SUSE Linux Enterprise 12 SP5) | 2026-03-23T14:34:54Z | 2026-03-23T14:34:54Z |
| suse-su-2026:0969-1 | Security update for freerdp | 2026-03-23T14:18:11Z | 2026-03-23T14:18:11Z |
| suse-su-2026:0968-1 | Security update for freerdp2 | 2026-03-23T14:18:05Z | 2026-03-23T14:18:05Z |
| suse-su-2026:0967-1 | Security update for the Linux Kernel (Live Patch 76 for SUSE Linux Enterprise 12 SP5) | 2026-03-23T14:04:34Z | 2026-03-23T14:04:34Z |
| suse-su-2026:0964-1 | Security update for the Linux Kernel (Live Patch 75 for SUSE Linux Enterprise 12 SP5) | 2026-03-23T13:05:59Z | 2026-03-23T13:05:59Z |
| suse-su-2026:20771-1 | Security update for sqlite3 | 2026-03-23T09:46:42Z | 2026-03-23T09:46:42Z |
| suse-su-2026:20923-1 | Security update for exiv2 | 2026-03-23T09:43:19Z | 2026-03-23T09:43:19Z |
| suse-su-2026:20770-1 | Security update for python-tornado6 | 2026-03-23T09:36:33Z | 2026-03-23T09:36:33Z |
| suse-su-2026:20797-1 | Security update for python-tornado6 | 2026-03-23T09:16:44Z | 2026-03-23T09:16:44Z |
| suse-su-2026:0962-1 | Security update for the Linux Kernel | 2026-03-23T09:09:02Z | 2026-03-23T09:09:02Z |
| suse-su-2026:0961-1 | Security update for the Linux Kernel | 2026-03-23T09:08:52Z | 2026-03-23T09:08:52Z |
| suse-su-2026:0960-1 | Security update for gvfs | 2026-03-23T08:50:48Z | 2026-03-23T08:50:48Z |
| suse-su-2026:0958-1 | Security update for the Linux Kernel (Live Patch 72 for SUSE Linux Enterprise 12 SP5) | 2026-03-23T08:06:02Z | 2026-03-23T08:06:02Z |
| suse-su-2026:0955-1 | Security update for sqlite3 | 2026-03-23T02:34:14Z | 2026-03-23T02:34:14Z |
| suse-su-2026:0954-1 | Security update for the Linux Kernel (Live Patch 68 for SUSE Linux Enterprise 12 SP5) | 2026-03-22T23:04:26Z | 2026-03-22T23:04:26Z |
| suse-su-2026:0939-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7 RT) | 2026-03-22T22:49:14Z | 2026-03-22T22:49:14Z |
| suse-su-2026:0940-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7 RT) | 2026-03-22T22:49:08Z | 2026-03-22T22:49:08Z |
| suse-su-2026:0951-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 15 SP7 RT) | 2026-03-22T22:49:05Z | 2026-03-22T22:49:05Z |
| suse-su-2026:0941-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 15 SP7 RT) | 2026-03-22T22:49:05Z | 2026-03-22T22:49:05Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:21462 | Critical: lasso security update | 2025-11-17T00:00:00Z | 2025-11-19T09:40:25Z |
| alsa-2025:21398 | Moderate: kernel security update | 2025-11-17T00:00:00Z | 2025-11-19T14:49:27Z |
| alsa-2025:21397 | Moderate: kernel-rt security update | 2025-11-17T00:00:00Z | 2025-11-19T14:52:45Z |
| alsa-2025:21281 | Important: firefox security update | 2025-11-13T00:00:00Z | 2025-11-25T09:59:17Z |
| alsa-2025:21280 | Important: firefox security update | 2025-11-13T00:00:00Z | 2025-11-24T12:36:14Z |
| alsa-2025:21255 | Moderate: openssl security update | 2025-11-13T00:00:00Z | 2025-12-01T08:04:03Z |
| alsa-2025:21248 | Moderate: openssl security update | 2025-11-13T00:00:00Z | 2025-11-25T09:31:36Z |
| alsa-2025:21232 | Important: container-tools:rhel8 security update | 2025-11-13T00:00:00Z | 2025-11-20T10:07:52Z |
| alsa-2025:21220 | Important: podman security update | 2025-11-13T00:00:00Z | 2025-11-25T10:45:01Z |
| alsa-2025:21142 | Important: python-kdcproxy security update | 2025-11-12T00:00:00Z | 2025-11-24T12:51:27Z |
| alsa-2025:21140 | Important: idm:DL1 security update | 2025-11-12T00:00:00Z | 2025-11-20T09:13:27Z |
| alsa-2025:21139 | Important: python-kdcproxy security update | 2025-11-12T00:00:00Z | 2025-11-19T09:41:31Z |
| alsa-2025:21111 | Important: bind9.18 security update | 2025-11-12T00:00:00Z | 2025-12-01T08:06:30Z |
| alsa-2025:21110 | Important: bind security update | 2025-11-12T00:00:00Z | 2025-11-19T09:39:10Z |
| alsa-2025:21038 | Important: kea security update | 2025-11-11T00:00:00Z | 2025-12-05T08:28:57Z |
| alsa-2025:21036 | Important: pcs security update | 2025-11-11T00:00:00Z | 2025-12-05T08:31:28Z |
| alsa-2025:21035 | Moderate: xorg-x11-server-Xwayland security update | 2025-11-11T00:00:00Z | 2025-11-24T09:01:21Z |
| alsa-2025:21034 | Important: bind security update | 2025-11-11T00:00:00Z | 2025-11-24T09:00:19Z |
| alsa-2025:21032 | Important: libsoup3 security update | 2025-11-11T00:00:00Z | 2025-11-24T08:58:48Z |
| alsa-2025:21030 | Important: expat security update | 2025-11-11T00:00:00Z | 2025-11-24T08:57:33Z |
| alsa-2025:21020 | Important: sssd security update | 2025-11-11T00:00:00Z | 2026-01-14T12:41:29Z |
| alsa-2025:21015 | Moderate: vim security update | 2025-11-11T00:00:00Z | 2025-11-24T08:56:33Z |
| alsa-2025:21013 | Moderate: libssh security update | 2025-11-11T00:00:00Z | 2025-11-24T08:54:57Z |
| alsa-2025:21002 | Important: squid security update | 2025-11-11T00:00:00Z | 2025-11-24T08:53:45Z |
| alsa-2025:20998 | Important: libtiff security update | 2025-11-11T00:00:00Z | 2025-11-24T08:51:54Z |
| alsa-2025:20994 | Important: ipa security update | 2025-11-11T00:00:00Z | 2025-12-05T09:05:25Z |
| alsa-2025:20983 | Important: podman security update | 2025-11-11T00:00:00Z | 2025-11-25T10:54:40Z |
| alsa-2025:20963 | Moderate: qt5-qt3d security update | 2025-11-11T00:00:00Z | 2025-11-19T09:37:23Z |
| alsa-2025:20962 | Important: pcs security update | 2025-11-11T00:00:00Z | 2025-12-01T08:09:09Z |
| alsa-2025:20961 | Moderate: xorg-x11-server security update | 2025-11-11T00:00:00Z | 2025-11-19T09:36:21Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-360 | Heap-buffer-overflow in pcpp::TelnetLayer::getFieldLen | 2024-04-30T00:05:53.016170Z | 2025-12-22T14:20:47.423159Z |
| osv-2024-359 | Security exception in graphql.schema.GraphQLTypeUtil.simplePrint | 2024-04-30T00:05:50.949087Z | 2024-04-30T00:05:50.949438Z |
| osv-2024-352 | Heap-buffer-overflow in __parse_options | 2024-04-30T00:04:28.080620Z | 2025-03-19T14:25:45.717598Z |
| osv-2024-351 | UNKNOWN READ in H5SL__release_common | 2024-04-30T00:03:47.754456Z | 2025-10-11T15:15:24.788105Z |
| osv-2024-349 | Security exception in java.base/java.lang.AbstractStringBuilder.<init> | 2024-04-30T00:03:33.576785Z | 2024-08-27T14:19:50.205074Z |
| osv-2024-345 | Use-of-uninitialized-value in aesEncryptBlock | 2024-04-30T00:03:14.686810Z | 2024-05-27T14:03:03.110153Z |
| osv-2024-343 | Heap-buffer-overflow in pcpp::BgpUpdateMessageLayer::setPathAttributes | 2024-04-30T00:02:38.268026Z | 2025-01-13T14:51:10.266632Z |
| osv-2024-341 | UNKNOWN READ in PointerVector.h | 2024-04-30T00:02:07.034555Z | 2025-05-14T14:20:00.536472Z |
| osv-2024-340 | Heap-buffer-overflow in Exiv2::AsfVideo::GUIDTag::GUIDTag | 2024-04-30T00:01:53.406015Z | 2026-03-01T14:15:15.992512Z |
| osv-2024-334 | Heap-buffer-overflow in readParsedPacket | 2024-04-30T00:01:24.720399Z | 2025-12-22T14:20:39.449858Z |
| osv-2024-333 | UNKNOWN READ in Mat_VarPrint | 2024-04-30T00:01:20.039792Z | 2024-05-27T14:01:03.854129Z |
| osv-2024-330 | UNKNOWN READ in std::__1::__POW10_SPLIT_2 | 2024-04-30T00:00:31.577722Z | 2024-05-27T14:01:02.168724Z |
| osv-2024-326 | Heap-buffer-overflow in GfxFont::readFontDescriptor | 2024-04-29T05:42:32.273970Z | 2024-08-12T14:13:53.709919Z |
| osv-2024-324 | Use-of-uninitialized-value in do_callout_jit | 2024-04-29T05:41:58.770090Z | 2024-11-19T21:52:42.928598Z |
| osv-2024-323 | Security exception in com.puppycrawl.tools.checkstyle.JavaAstVisitor.getInnerBopAst | 2024-04-29T05:41:42.743610Z | 2024-05-27T14:02:31.976819Z |
| osv-2024-322 | Container-overflow in strtol | 2024-04-29T05:41:35.504634Z | 2024-04-29T05:41:35.505031Z |
| osv-2024-319 | Stack-buffer-underflow in filter_apply_chain | 2024-04-29T05:39:39.042459Z | 2024-04-29T05:39:39.043467Z |
| osv-2024-314 | Heap-buffer-overflow in config__add_listener | 2024-04-29T05:32:04.759568Z | 2024-04-29T05:32:04.759906Z |
| osv-2024-309 | Use-of-uninitialized-value in fast_forward_first_n_chars | 2024-04-29T00:00:29.630732Z | 2024-04-29T00:00:29.631359Z |
| osv-2024-294 | Segv on unknown address in gx_device_forward_finalize | 2024-04-24T00:03:38.661938Z | 2024-05-02T14:25:23.611452Z |
| osv-2024-293 | Stack-buffer-overflow in shoco_decompress | 2024-04-24T00:02:46.009671Z | 2024-04-24T00:02:46.010298Z |
| osv-2024-288 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-04-22T00:13:27.517680Z | 2024-04-22T00:13:27.518159Z |
| osv-2024-283 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.statement | 2024-04-20T00:16:06.569828Z | 2024-04-20T00:16:06.570262Z |
| osv-2024-278 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-04-19T00:12:11.684954Z | 2026-03-30T14:17:53.191446Z |
| osv-2024-274 | Heap-use-after-free in Mat_VarFree | 2024-04-18T00:09:21.577754Z | 2024-04-20T14:21:22.678715Z |
| osv-2024-272 | Heap-buffer-overflow in DDS_Security_Deserialize_ParticipantBuiltinTopicData | 2024-04-18T00:05:58.463730Z | 2024-04-18T00:05:58.464184Z |
| osv-2024-269 | Security exception in java.base/java.util.stream.AbstractPipeline.evaluate | 2024-04-18T00:04:02.456948Z | 2026-04-09T14:31:24.951720Z |
| osv-2024-267 | Heap-buffer-overflow in SetDataFormat | 2024-04-18T00:02:12.015129Z | 2024-04-29T11:29:45.142411Z |
| osv-2024-265 | Heap-buffer-overflow in Mat_VarDuplicate | 2024-04-17T00:14:05.583203Z | 2024-04-20T14:21:17.305195Z |
| osv-2024-264 | UNKNOWN READ in cli_html_normalise | 2024-04-17T00:06:11.717243Z | 2024-04-29T11:34:58.355901Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2022-0075 | Bug in pooling instance allocator | 2022-11-10T12:00:00Z | 2023-01-14T00:56:30Z |
| rustsec-2022-0097 | Out of bounds write in `wasmtime_trap_code` C API function | 2022-11-07T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0102 | Out of bounds read/write with zero-memory-pages configuration | 2022-11-05T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0098 | Data leakage between instances in the pooling allocator | 2022-11-05T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0065 | X.509 Email Address Variable Length Buffer Overflow | 2022-11-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0064 | X.509 Email Address 4-byte Buffer Overflow | 2022-11-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0079 | ELF header parsing library doesn't check for valid offset | 2022-10-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0066 | Denial of Service from unchecked request length | 2022-10-30T12:00:00Z | 2022-11-02T22:38:38Z |
| rustsec-2022-0083 | evm incorrect state transition | 2022-10-25T12:00:00Z | 2023-02-02T11:20:42Z |
| rustsec-2022-0062 | matrix-sdk 0.6.0 logs access tokens | 2022-10-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0067 | Invalid use of `mem::uninitialized` causes `use-of-uninitialized-value` | 2022-10-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0060 | orbtk is Unmaintained | 2022-10-13T12:00:00Z | 2022-10-19T01:14:12Z |
| rustsec-2022-0059 | Using a Custom Cipher with `NID_undef` may lead to NULL encryption | 2022-10-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0087 | Slack Webhooks secrets leak in debug logs | 2022-10-10T12:00:00Z | 2023-02-02T11:45:24Z |
| rustsec-2022-0061 | Crate `parity-wasm` deprecated by the author | 2022-10-01T12:00:00Z | 2022-10-23T11:05:06Z |
| rustsec-2022-0085 | matrix-sdk Impersonation of room keys | 2022-09-29T12:00:00Z | 2023-02-02T11:35:31Z |
| rustsec-2022-0058 | Library exclusively intended to inject UB into safe Rust. | 2022-09-28T12:00:00Z | 2022-10-11T10:32:22Z |
| rustsec-2022-0091 | `tauri` filesystem scope partial bypass | 2022-09-19T12:00:00Z | 2023-02-25T15:16:50Z |
| rustsec-2022-0063 | Multiple vulnerabilities resulting in out-of-bounds writes | 2022-09-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0057 | badge is Unmaintained | 2022-08-31T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2022-0055 | No default limit put on request bodies | 2022-08-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0052 | `os_socketaddr` invalidly assumes the memory layout of std::net::SocketAddr | 2022-08-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0051 | Memory corruption in liblz4 | 2022-08-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0053 | mapr is Unmaintained | 2022-08-24T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2022-0049 | Use after free in MacOS / iOS implementation | 2022-08-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0088 | `tauri`'s `readDir` endpoint allows possible enumeration outside of filesystem scope | 2022-08-07T12:00:00Z | 2023-02-05T18:48:17Z |
| rustsec-2022-0050 | Interledger is Unmaintained | 2022-08-04T12:00:00Z | 2022-08-19T05:34:11Z |
| rustsec-2022-0090 | `libsqlite3-sys` via C SQLite CVE-2022-35737 | 2022-08-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0035 | Unbounded memory allocation based on untrusted length | 2022-08-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0045 | Post-Quantum Key Encapsulation Mechanism SIKE broken | 2022-07-30T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-discourse-2025-67723 | Discourse vulnerable to stored Cross-site Scripting via Katex in discourse-math plugin | 2026-02-02T08:42:10.509Z | 2026-02-10T09:16:50.296Z |
| bit-discourse-2025-66488 | Discourse allows script execution in uploaded HTML/XML files on S3 | 2026-02-02T08:42:08.194Z | 2026-02-02T09:12:04.887Z |
| bit-golang-2025-68119 | Unexpected code execution when invoking toolchain in cmd/go | 2026-01-31T08:43:40.539Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61731 | Arbitrary file write using cgo pkg-config directive in cmd/go | 2026-01-31T08:43:38.643Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61730 | Handshake messages may be processed at the incorrect encryption level in crypto/tls | 2026-01-31T08:43:36.684Z | 2026-02-03T09:12:55.720Z |
| bit-joomla-2025-63083 | Joomla! Core - [20260102] - XSS vector in the pagebreak plugin | 2026-01-31T08:43:33.433Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61728 | Excessive CPU consumption when building archive index in archive/zip | 2026-01-31T08:43:32.870Z | 2026-01-31T09:09:11.750Z |
| bit-joomla-2025-63082 | Joomla! Core - [20260101] - Inadequate content filtering for data URLs | 2026-01-31T08:43:31.962Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61726 | Memory exhaustion in query parameter parsing in net/url | 2026-01-31T08:43:29.079Z | 2026-01-31T09:09:11.750Z |
| bit-mastodon-2026-23964 | Mastodon has insufficient access control to push notification settings | 2026-01-31T08:43:24.123Z | 2026-02-03T09:12:55.720Z |
| bit-discourse-2026-23743 | Discourse allows permalinks to restricted resources to leak resource slugs to unauthorized users | 2026-01-31T08:42:04.050Z | 2026-01-31T09:09:11.750Z |
| bit-gitea-2026-20912 | Gitea: Cross-Repository Authorization Bypass via Release Attachment Linking Leads to Private Attachment Disclosure | 2026-01-30T08:40:49.607Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20904 | Gitea: Broken access control in OpenID visibility toggle enables cross-user visibility changes | 2026-01-30T08:40:47.849Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20897 | Gitea Git LFS Lock Deletion Broken Access Control (Cross-Repo IDOR) | 2026-01-30T08:40:45.840Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20888 | Gitea Pull Requests Auto-Merge: Read-Only Users Can Cancel Scheduled Auto-Merge via Web Endpoint (Authorization Bypass) | 2026-01-30T08:40:43.950Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20883 | Gitea Stopwatch API Missing Authorization Check Leads to Post-Revocation Information Disclosure | 2026-01-30T08:40:41.879Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20800 | Notification API Leaks Private Repository Issue Titles After Collaborator Permission Revocation | 2026-01-30T08:40:39.688Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20750 | Gitea Organization Projects Cross-Organization Authorization Bypass via Project ID (IDOR) | 2026-01-30T08:40:37.768Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20736 | Gitea Web Attachment Deletion: Cross-Repository Unauthorized Deletion via Missing Repo Ownership Check | 2026-01-30T08:40:35.702Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-0798 | Gitea Release Email Notifications Leak Private Repository Release Details After Access Revocation | 2026-01-30T08:40:33.870Z | 2026-01-30T09:12:31.676Z |
| bit-rum-2022-50806 | 4images 1.9 - Remote Command Execution (RCE) | 2026-01-29T20:50:41.024Z | 2026-01-29T21:11:31.203Z |
| bit-ghost-2025-9862 | Ghost 6.0.6 - SSRF via oEmbed Bookmark | 2026-01-29T20:40:02.993Z | 2026-03-09T12:11:07.851Z |
| bit-pytorch-2026-24747 | PyTorch Vulnerable to Remote Code Execution via Untrusted Checkpoint Files | 2026-01-29T08:50:25.994Z | 2026-01-29T09:11:54.406Z |
| bit-appsmith-2026-24042 | Appsmith public apps can execute unpublished actions (viewMode confusion) | 2026-01-29T08:36:35.250Z | 2026-02-26T09:13:58.886Z |
| bit-gitlab-2026-1102 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-01-27T09:13:24.685Z | 2026-01-27T09:14:53.416Z |
| bit-gitlab-2026-0723 | Unchecked Return Value in GitLab | 2026-01-27T09:13:22.812Z | 2026-01-27T09:14:53.416Z |
| bit-gitlab-2025-13928 | Incorrect Authorization in GitLab | 2026-01-27T09:10:58.706Z | 2026-01-27T09:14:53.416Z |
| bit-gitlab-2025-13927 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-01-27T09:10:56.771Z | 2026-01-27T09:14:53.416Z |
| bit-gitlab-2025-13335 | Loop with Unreachable Exit Condition ('Infinite Loop') in GitLab | 2026-01-27T09:10:47.144Z | 2026-01-27T09:14:53.416Z |
| bit-python-2026-0865 | wsgiref.headers.Headers allows header newline injection | 2026-01-26T14:50:04.789Z | 2026-04-10T09:26:18.172Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-pt11267 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:22:25.604414Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nr68832 | libexpat in Expat before 2 | 2026-01-30T16:22:25.447471Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xo49545 | Within HostnameError | 2026-01-30T16:21:25.500719Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ui65993 | Within HostnameError | 2026-01-30T16:21:25.457624Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ml51665 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:20:55.711028Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nd18869 | tar | 2026-01-30T16:20:55.683557Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zm84646 | Within HostnameError | 2026-01-30T16:20:55.488130Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pk62208 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:20:55.127319Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ch38544 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:19:55.527550Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kz60560 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:19:55.200542Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xi02879 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:18:55.578686Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xp58111 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:18:55.480183Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sj80413 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:16:55.110567Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cd66042 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:16:25.085708Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ku65968 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:15:25.445497Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xp03839 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:14:55.099611Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qm19832 | Moby is an open source container framework developed by Docker Inc | 2026-01-30T16:13:25.141915Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-um63521 | Within HostnameError | 2026-01-30T16:12:25.029065Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-so95938 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:11:25.480356Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cz81512 | Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes | 2026-01-30T16:11:25.451968Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jr48309 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:11:25.334563Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xr17407 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:11:25.270681Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uz73015 | Cancelling a query (e | 2026-01-30T16:09:25.315533Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pk69606 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:08:25.435888Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gl70025 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:08:25.191230Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zm51114 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:08:25.157380Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ps30901 | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes | 2026-01-30T16:07:55.053827Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wp20592 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:05:24.814830Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wa03785 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:05:24.799763Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-we92783 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:05:24.753007Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-1065 | Multiples vulnérabilités dans NetApp ONTAP | 2025-12-05T00:00:00.000000 | 2025-12-05T00:00:00.000000 |
| certfr-2025-avi-1064 | Multiples vulnérabilités dans les produits Microsoft | 2025-12-04T00:00:00.000000 | 2025-12-04T00:00:00.000000 |
| certfr-2025-avi-1063 | Multiples vulnérabilités dans les produits Splunk | 2025-12-04T00:00:00.000000 | 2025-12-04T00:00:00.000000 |
| certfr-2025-avi-1062 | Multiples vulnérabilités dans Wireshark | 2025-12-04T00:00:00.000000 | 2025-12-04T00:00:00.000000 |
| certfr-2025-avi-1061 | Vulnérabilité dans PostgreSQL PgBouncer | 2025-12-04T00:00:00.000000 | 2025-12-04T00:00:00.000000 |
| certfr-2025-avi-1060 | Multiples vulnérabilités dans Python | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| certfr-2025-avi-1059 | Multiples vulnérabilités dans Google Pixel | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| certfr-2025-avi-1058 | Multiples vulnérabilités dans Google Chrome | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| certfr-2025-avi-1057 | Multiples vulnérabilités dans les produits VMware | 2025-12-02T00:00:00.000000 | 2025-12-02T00:00:00.000000 |
| certfr-2025-avi-1056 | Multiples vulnérabilités dans Google Android | 2025-12-02T00:00:00.000000 | 2025-12-02T00:00:00.000000 |
| certfr-2025-avi-1055 | Multiples vulnérabilités dans Zabbix | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-1054 | Multiples vulnérabilités dans les produits VMware | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-1053 | Vulnérabilité dans Stormshield Network VPN Client | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-1052 | Vulnérabilité dans Mattermost Server | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-1051 | Multiples vulnérabilités dans les produits IBM | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1050 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1049 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1048 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1047 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1046 | Multiples vulnérabilités dans les produits Moxa | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1045 | Vulnérabilité dans MISP | 2025-11-27T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1044 | Vulnérabilité dans Mattermost Server | 2025-11-27T00:00:00.000000 | 2025-11-27T00:00:00.000000 |
| certfr-2025-avi-1043 | Multiples vulnérabilités dans les produits Splunk | 2025-11-27T00:00:00.000000 | 2025-11-27T00:00:00.000000 |
| certfr-2025-avi-1042 | Multiples vulnérabilités dans GitLab | 2025-11-27T00:00:00.000000 | 2025-11-27T00:00:00.000000 |
| certfr-2025-avi-1041 | Vulnérabilité dans Synology ActiveProtect Agent | 2025-11-26T00:00:00.000000 | 2025-11-26T00:00:00.000000 |
| certfr-2025-avi-1040 | Vulnérabilité dans Postfix | 2025-11-26T00:00:00.000000 | 2025-11-26T00:00:00.000000 |
| certfr-2025-avi-1039 | Vulnérabilité dans Kaspersky Security Center | 2025-11-25T00:00:00.000000 | 2025-11-25T00:00:00.000000 |
| certfr-2025-avi-1038 | Vulnérabilité dans les produits PrimX | 2025-11-25T00:00:00.000000 | 2025-11-25T00:00:00.000000 |
| certfr-2025-avi-1037 | Multiples vulnérabilités dans Progress MOVEit Transfer | 2025-11-25T00:00:00.000000 | 2025-11-25T00:00:00.000000 |
| certfr-2025-avi-1036 | Multiples vulnérabilités dans les produits VMware | 2025-11-24T00:00:00.000000 | 2025-11-24T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2023-003769 | Information Exposure Vulnerability in Hitachi Ops Center Administrator | 2023-10-04T15:23+09:00 | 2024-05-22T15:20+09:00 |
| jvndb-2023-000097 | Citadel WebCit vulnerable to cross-site scripting on Instant Messaging facility | 2023-10-04T14:07+09:00 | 2024-05-21T17:08+09:00 |
| jvndb-2023-003767 | Multiple vulnerabilities in multiple FURUNO SYSTEMS wireless LAN access point devices in ST(Standalone) mode | 2023-10-03T14:26+09:00 | 2024-05-22T18:01+09:00 |
| jvndb-2023-000096 | Improper restriction of XML external entity references (XXE) in FD Application | 2023-10-02T12:36+09:00 | 2024-05-22T15:37+09:00 |
| jvndb-2023-003764 | Multiple vulnerabilities in Panasonic KW Watcher | 2023-09-27T14:44+09:00 | 2023-09-27T14:44+09:00 |
| jvndb-2023-000095 | Shihonkanri Plus vulnerable to relative path traversal | 2023-09-27T13:49+09:00 | 2024-05-21T17:16+09:00 |
| jvndb-2023-003757 | Trend Micro Mobile Security vulnerable to cross-site scripting | 2023-09-26T11:30+09:00 | 2024-03-13T18:07+09:00 |
| jvndb-2023-000094 | Multiple vulnerabilities in WordPress plugin "Welcart e-Commerce" | 2023-09-22T13:51+09:00 | 2024-07-11T16:49+09:00 |
| jvndb-2023-003721 | Trend Micro Endpoint security products for enterprises vulnerable to arbitrary code execution | 2023-09-20T13:58+09:00 | 2024-05-09T18:22+09:00 |
| jvndb-2023-003592 | Multiple vulnerabilities in JTEKT ELECTRONICS Kostac PLC Programming Software | 2023-09-13T15:02+09:00 | 2023-09-13T15:02+09:00 |
| jvndb-2023-000093 | Pyramid vulnerable to directory traversal | 2023-09-11T13:53+09:00 | 2024-05-16T16:52+09:00 |
| jvndb-2023-003335 | Vulnerability in JP1/VERITAS | 2023-09-06T15:35+09:00 | 2023-09-06T15:35+09:00 |
| jvndb-2023-000092 | "direct" Desktop App for macOS fails to restrict access permissions | 2023-09-06T14:33+09:00 | 2023-09-06T14:33+09:00 |
| jvndb-2023-000091 | Multiple vulnerabilities in F-RevoCRM | 2023-09-05T15:51+09:00 | 2024-05-14T18:06+09:00 |
| jvndb-2023-000090 | Multiple vulnerabilities in CGIs of PMailServer and PMailServer2 | 2023-09-05T14:55+09:00 | 2023-09-05T14:55+09:00 |
| jvndb-2023-000088 | Multiple vulnerabilities in SHIRASAGI | 2023-09-04T13:41+09:00 | 2024-05-14T17:58+09:00 |
| jvndb-2023-000089 | Multiple vulnerabilities in i-PRO VI Web Client | 2023-08-31T14:13+09:00 | 2024-05-14T18:05+09:00 |
| jvndb-2023-003028 | Phoenix Technologies Windows kernel driver vulnerable to insufficient access control on its IOCTL | 2023-08-30T10:05+09:00 | 2024-04-24T11:43+09:00 |
| jvndb-2023-003023 | Vulnerability in HiRDB | 2023-08-29T15:55+09:00 | 2023-09-06T15:45+09:00 |
| jvndb-2023-000087 | SYNCK GRAPHICA Mailform Pro CGI vulnerable to Regular expression Denial-of-Service (ReDoS) | 2023-08-24T14:12+09:00 | 2024-05-15T17:12+09:00 |
| jvndb-2023-000085 | "Skylark" App fails to restrict custom URL schemes properly | 2023-08-24T13:34+09:00 | 2024-12-03T15:51+09:00 |
| jvndb-2023-000086 | Rakuten WiFi Pocket vulnerable to improper authentication | 2023-08-23T12:42+09:00 | 2024-03-27T13:43+09:00 |
| jvndb-2023-002906 | Multiple vulnerabilities in Panasonic Control FPWIN Pro7 | 2023-08-22T18:02+09:00 | 2024-04-18T17:31+09:00 |
| jvndb-2023-002905 | Multiple vulnerabilities in CBC digital video recorders | 2023-08-22T17:35+09:00 | 2024-04-10T17:39+09:00 |
| jvndb-2023-000084 | WordPress Plugin "Advanced Custom Fields" vulnerable to cross-site scripting | 2023-08-21T14:05+09:00 | 2024-03-25T17:55+09:00 |
| jvndb-2023-000083 | Multiple vulnerabilities in LuxCal Web Calendar | 2023-08-21T13:29+09:00 | 2024-03-26T17:09+09:00 |
| jvndb-2023-000078 | Multiple vulnerabilities in Proself | 2023-08-18T13:47+09:00 | 2024-03-28T17:43+09:00 |
| jvndb-2023-000082 | EC-CUBE 2 series vulnerable to cross-site scripting | 2023-08-17T15:12+09:00 | 2024-03-25T18:07+09:00 |
| jvndb-2023-002797 | Multiple vulnerabilities in ELECOM and LOGITEC network devices | 2023-08-15T11:54+09:00 | 2025-02-13T15:21+09:00 |
| jvndb-2023-002796 | Multiple server-side request forgery vulnerabilities in Trend Micro Apex Central (July 2023) | 2023-08-10T16:04+09:00 | 2024-03-13T17:58+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14276 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14276) | 2026-03-02 | 2026-03-20 |
| cnvd-2026-14275 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14275) | 2026-03-02 | 2026-03-19 |
| cnvd-2026-14274 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14274) | 2026-03-02 | 2026-03-19 |
| cnvd-2026-14273 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14273) | 2026-03-02 | 2026-03-19 |
| cnvd-2026-14272 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14272) | 2026-03-02 | 2026-03-19 |
| cnvd-2026-14271 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14271) | 2026-03-02 | 2026-03-19 |
| cnvd-2026-13430 | OpenClaw数据伪造问题漏洞(CNVD-2026-13430) | 2026-03-02 | 2026-03-11 |
| cnvd-2026-13429 | OpenClaw数据伪造问题漏洞 | 2026-03-02 | 2026-03-11 |
| cnvd-2026-13428 | OpenClaw路径遍历漏洞(CNVD-2026-13428) | 2026-03-02 | 2026-03-12 |
| cnvd-2026-13427 | OpenClaw路径遍历漏洞(CNVD-2026-13427) | 2026-03-02 | 2026-03-12 |
| cnvd-2026-13426 | OpenClaw跨站请求伪造漏洞 | 2026-03-02 | 2026-03-12 |
| cnvd-2026-13425 | OpenClaw跨站脚本漏洞 | 2026-03-02 | 2026-03-12 |
| cnvd-2026-13408 | OpenClaw访问控制错误漏洞(CNVD-2026-13408) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13400 | OpenClaw服务端请求伪造漏洞 | 2026-03-02 | 2026-03-11 |
| cnvd-2026-13392 | OpenClaw访问控制错误漏洞(CNVD-2026-13392) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13391 | OpenClaw访问控制错误漏洞 | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13390 | OpenClaw代码注入漏洞 | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13389 | OpenClaw存在未明漏洞(CNVD-2026-13389) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13388 | OpenClaw代码问题漏洞(CNVD-2026-13388) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13383 | OpenClaw存在未明漏洞(CNVD-2026-13383) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13382 | OpenClaw存在未明漏洞(CNVD-2026-13382) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13381 | OpenClaw存在未明漏洞(CNVD-2026-13381) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13380 | OpenClaw存在未明漏洞(CNVD-2026-13380) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13379 | OpenClaw存在未明漏洞(CNVD-2026-13379) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13378 | OpenClaw存在未明漏洞(CNVD-2026-13378) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13377 | OpenClaw存在未明漏洞(CNVD-2026-13377) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13376 | OpenClaw存在未明漏洞(CNVD-2026-13376) | 2026-03-02 | 2026-03-12 |
| cnvd-2026-13375 | OpenClaw存在未明漏洞(CNVD-2026-13375) | 2026-03-02 | 2026-03-12 |
| cnvd-2026-13374 | OpenClaw资源管理错误漏洞(CNVD-2026-13374) | 2026-03-02 | 2026-03-12 |
| cnvd-2026-13373 | OpenClaw操作系统命令注入漏洞(CNVD-2026-13373) | 2026-03-02 | 2026-03-12 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01152 | Уязвимость функции change_memory_common() модуля arch/arm64/mm/pageattr.c ядра операционн… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01151 | Уязвимость функции ima_match_rules() модуля security/integrity/ima/ima_policy.c подсистем… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01150 | Уязвимость функции qla2xxx_process_purls_iocb() модуля drivers/scsi/qla2xxx/qla_nvme.c др… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01149 | Уязвимость функции ivpu_gem_bo_free() модуля drivers/accel/ivpu/ivpu_gem.c драйвера нейро… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01148 | Уязвимость функции iwl_mei_rx_filter() модуля drivers/net/wireless/intel/iwlwifi/mei/net.… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01147 | Уязвимость функции mt7921_acpi_read() модуля drivers/net/wireless/mediatek/mt76/mt7921/ac… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01146 | Уязвимость функции begin_cpu_udmabuf() модуля drivers/dma-buf/udmabuf.c 2 ядра операционн… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01145 | Уязвимость функции ssip_pn_open() модуля drivers/hsi/clients/ssi_protocol.c драйвера высо… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01144 | Уязвимость функции efct_device_init() модуля drivers/scsi/elx/efct/efct_driver.c драйвера… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01143 | Уязвимость функции ntfs_fill_super() модуля fs/ntfs3/super.c файловой системы NTFS 3 ядра… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01142 | Уязвимость функции print_wrapper_info() модуля drivers/media/platform/nxp/imx-jpeg/mxc-jp… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01141 | Уязвимость функции arch_kimage_file_post_load_cleanup() модуля arch/riscv/kernel/elf_kexe… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01140 | Уязвимость функции virtual_nci_send() модуля drivers/nfc/virtual_ncidev.c драйвера NFC яд… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01139 | Уязвимость функции dpu_rm_get_assigned_resources() модуля drivers/gpu/drm/msm/disp/dpu1/d… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01138 | Уязвимость функции __iio_device_register() модуля drivers/iio/industrialio-core.c ядра оп… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01137 | Уязвимость функции svs_probe() модуля drivers/soc/mediatek/mtk-svs.c ядра операционной си… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01136 | Уязвимость функции f2fs_write_raw_pages() модуля fs/f2fs/compress.c файловой системы F2FS… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01135 | Уязвимость функции ntfs_read_mft() модуля fs/ntfs3/inode.c ядра операционной системы Lin… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01134 | Уязвимость веб-интерфейса для управления и взаимодействия с базой данных Cassandra Web, с… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01133 | Уязвимость функции nvmet_tcp_handle_h2c_data_pdu() ядра операционной системы Linux, позво… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01132 | Уязвимость функции inet6_addr_del() ядра операционной системы Linux, позволяющая нарушите… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01131 | Уязвимость функции загрузки прошивки микропрограммного обеспечения роутеров TOTOLINK EX20… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01130 | Уязвимость службы Content Distribution Service (NomadBranch.exe) программной платформы дл… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01129 | Уязвимость функции sub_4298C0() микропрограммного обеспечения IP-камер D-Link DCS700l, по… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01128 | Уязвимость службы Music File Upload Service микропрограммного обеспечения IP-камер D-Link… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01127 | Уязвимость сценария /set_temp_nodes.php микропрограммного обеспечения маршрутизаторов DIR… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01126 | Уязвимость встроенного веб-сервера boa (/boafrm/formLtefotaUpgradeFibocom) микропрограммн… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01125 | Уязвимость функции sub_4250E0() (/boafrm/formSmsManage) микропрограммного обеспечения мар… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01124 | Уязвимость функции checkUserFromLanOrWan() (/boaform/admin/formLogin) микропрограммного о… | 03.02.2026 | 03.02.2026 |
| bdu:2026-01123 | Уязвимость приложения для управления жизненным циклом мобильных устройств и мобильных при… | 03.02.2026 | 03.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201411-0450 | parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when ent… | 2026-04-10T22:07:37.667000Z |
| var-202010-1327 | A logic issue was addressed with improved validation. This issue is fixed in iCloud for W… | 2026-04-10T22:07:29.284000Z |
| var-201108-0147 | Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before … | 2026-04-10T22:06:52.974000Z |
| var-201607-0235 | Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52… | 2026-04-10T22:06:52.469000Z |
| var-201006-1151 | The Cascading Style Sheets (CSS) implementation in WebKit in Apple Safari before 5.0 on M… | 2026-04-10T22:06:52.259000Z |
| var-200701-0340 | The Bonjour functionality in mDNSResponder, iChat 3.1.6, and InstantMessage framework 428… | 2026-04-10T22:06:50.642000Z |
| var-200907-0717 | WebKit in Apple Safari before 4.0.2, as used on iPhone OS before 3.1, iPhone OS before 3.… | 2026-04-10T22:06:50.165000Z |
| var-201809-0686 | curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication c… | 2026-04-10T22:06:12.419000Z |
| var-201801-1708 | The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before… | 2026-04-10T22:06:11.772000Z |
| var-200107-0173 | Cisco CBOS 2.3.0.053 sends output of the "sh nat" (aka "show nat") command to the termina… | 2026-04-10T22:05:38.698000Z |
| var-200704-0214 | fsck, as used by the AirPort Disk feature of the AirPort Extreme Base Station with 802.11… | 2026-04-10T22:05:08.528000Z |
| var-202112-2011 | Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 an… | 2026-04-10T22:05:08.199000Z |
| var-201102-0280 | The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Jav… | 2026-04-10T22:05:07.810000Z |
| var-201008-1003 | The INCLUDE_SECURITY functionality in Wind River VxWorks 6.x, 5.x, and earlier uses the L… | 2026-04-10T22:04:36.136000Z |
| var-201812-0273 | Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers … | 2026-04-10T22:03:54.723000Z |
| var-202204-0432 | Subversion's mod_dav_svn is vulnerable to memory corruption. While looking up path-based … | 2026-04-10T22:03:54.420000Z |
| var-202201-0326 | defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflo… | 2026-04-10T22:03:54.341000Z |
| var-200711-0538 | Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header fro… | 2026-04-10T22:03:36.333000Z |
| var-201007-0943 | WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before… | 2026-04-10T22:03:34.331000Z |
| var-201904-1472 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-04-10T22:03:33.994000Z |
| var-201302-0309 | Use-after-free vulnerability in Adobe Flash Player before 10.3.183.63 and 11.x before 11.… | 2026-04-10T22:03:27.942000Z |
| var-200904-0798 | The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.1… | 2026-04-10T22:03:27.212000Z |
| var-201203-0191 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2026-04-10T22:03:25.687000Z |
| var-200807-0012 | WebCore in Apple Safari does not properly perform garbage collection of JavaScript docume… | 2026-04-10T22:03:23.510000Z |
| var-200607-0664 | Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to … | 2026-04-10T22:03:19.398000Z |
| var-201302-0132 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-04-10T22:02:54.943000Z |
| var-201306-0147 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-04-10T22:02:54.595000Z |
| var-202203-0111 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2026-04-10T22:02:53.664000Z |
| var-202310-0175 | The HTTP/2 protocol allows a denial of service (server resource consumption) because requ… | 2026-04-10T22:02:50.262000Z |
| var-202002-1458 | eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_requ… | 2026-04-10T22:02:50.171000Z |