Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-5958 |
2.1 (4.0)
|
Race Condition in GNU Sed |
GNU |
Sed |
2026-04-20T11:59:32.214Z | 2026-04-20T13:25:59.530Z |
| CVE-2026-6635 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
rowboatlabs rowboat tools_webhook app.py tool_call imp… |
rowboatlabs |
rowboat |
2026-04-20T11:45:12.769Z | 2026-04-20T13:26:31.802Z |
| CVE-2026-6634 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
usememos UpdateInstanceSetting App.tsx memos_access_to… |
usememos |
memos |
2026-04-20T11:30:13.847Z | 2026-04-20T15:02:48.499Z |
| CVE-2026-6633 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
Yifang CMS Extended Management L_rbac_admin.php store … |
Yifang |
CMS |
2026-04-20T11:15:11.127Z | 2026-04-20T13:01:44.244Z |
| CVE-2026-6632 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F451 httpd SafeClientFilter fromSafeClientFilter… |
Tenda |
F451 |
2026-04-20T11:00:19.795Z | 2026-04-20T15:05:42.179Z |
| CVE-2026-6631 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F451 httpd webExcptypemanFilter fromwebExcptypem… |
Tenda |
F451 |
2026-04-20T10:45:12.978Z | 2026-04-20T15:07:58.242Z |
| CVE-2026-6630 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F451 httpd GstDhcpSetSer fromGstDhcpSetSer buffe… |
Tenda |
F451 |
2026-04-20T10:30:15.493Z | 2026-04-20T13:27:03.711Z |
| CVE-2026-6629 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Metasoft 美特软件 MetaCRM Interface sql.jsp Statement.exec… |
Metasoft 美特软件 |
MetaCRM |
2026-04-20T10:15:19.931Z | 2026-04-20T15:21:18.092Z |
| CVE-2026-6654 |
5.1 (3.1)
|
Use-After-Free and Double-Free in IntoIter::drop when … |
Mozilla |
thin-vec |
2026-04-20T10:05:52.339Z | 2026-04-20T13:14:37.846Z |
| CVE-2026-6628 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
phili67 Ecclesia CRM Query Viewer view ValidateInput s… |
phili67 |
Ecclesia CRM |
2026-04-20T10:00:16.739Z | 2026-04-20T10:54:35.730Z |
| CVE-2026-6626 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Cockpit-HQ Cockpit Asset Handler/Aggregate data query … |
Cockpit-HQ |
Cockpit |
2026-04-20T09:45:12.067Z | 2026-04-20T15:23:47.915Z |
| CVE-2026-31430 |
N/A
|
X.509: Fix out-of-bounds access when parsing extensions |
Linux |
Linux |
2026-04-20T09:43:03.919Z | 2026-04-20T09:43:03.919Z |
| CVE-2026-31429 |
N/A
|
net: skb: fix cross-cache free of KFENCE-allocated skb head |
Linux |
Linux |
2026-04-20T09:43:03.194Z | 2026-04-20T09:43:03.194Z |
| CVE-2026-6625 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
moxi624 Mogu Blog v2 Picture Storage Service LocalFile… |
moxi624 |
Mogu Blog v2 |
2026-04-20T09:30:16.835Z | 2026-04-20T15:27:00.317Z |
| CVE-2026-6624 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
BichitroGan ISP Billing Software Pool List add cross s… |
BichitroGan |
ISP Billing Software |
2026-04-20T09:15:17.533Z | 2026-04-20T13:27:39.595Z |
| CVE-2026-6623 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
BichitroGan ISP Billing Software Profile users-view cr… |
BichitroGan |
ISP Billing Software |
2026-04-20T09:00:20.118Z | 2026-04-20T15:29:21.949Z |
| CVE-2025-13480 |
5.1 (4.0)
|
Incorrect authorization in Fudo Enterprise |
Fudo Security |
Fudo Enterprise |
2026-04-20T09:00:16.259Z | 2026-04-20T13:28:18.280Z |
| CVE-2026-6622 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
BichitroGan ISP Billing Software Customer edit cross s… |
BichitroGan |
ISP Billing Software |
2026-04-20T08:45:20.512Z | 2026-04-20T11:10:22.776Z |
| CVE-2026-6621 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
1024bit extend-deep index.js prototype pollution |
1024bit |
extend-deep |
2026-04-20T08:30:14.457Z | 2026-04-20T15:33:04.684Z |
| CVE-2026-6620 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
SonicCloudOrg sonic-server File Upload Endpoint FileTo… |
SonicCloudOrg |
sonic-server |
2026-04-20T08:15:18.329Z | 2026-04-20T15:35:54.833Z |
| CVE-2026-39454 |
7.8 (3.0)
8.5 (4.0)
|
SKYSEA Client View and SKYMEC IT Manager provided… |
Sky Co.,LTD. |
SKYSEA Client View |
2026-04-20T08:04:56.595Z | 2026-04-20T13:28:56.536Z |
| CVE-2026-6619 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
langgenius dify ImagePreview image-preview.tsx openInN… |
langgenius |
dify |
2026-04-20T08:00:17.267Z | 2026-04-20T13:29:29.634Z |
| CVE-2026-6618 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
langgenius dify ApiBasedToolSchemaParser parser.py par… |
langgenius |
dify |
2026-04-20T07:45:16.985Z | 2026-04-20T16:21:30.799Z |
| CVE-2026-5967 |
8.7 (4.0)
8.8 (3.1)
|
TeamT5|ThreatSonar Anti-Ransomware - Privilege Escalation |
TeamT5 |
ThreatSonar Anti-Ransomware |
2026-04-20T07:44:19.754Z | 2026-04-20T13:29:59.132Z |
| CVE-2026-5966 |
7.2 (4.0)
8.1 (3.1)
|
TeamT5|ThreatSonar Anti-Ransomware - Arbitrary File Deletion |
TeamT5 |
ThreatSonar Anti-Ransomware |
2026-04-20T07:40:33.323Z | 2026-04-20T13:30:25.604Z |
| CVE-2026-5964 |
9.3 (4.0)
9.8 (3.1)
|
Digiwin|EasyFlow .NET - SQL Injection |
Digiwin |
EasyFlow .NET |
2026-04-20T07:36:58.476Z | 2026-04-20T13:38:08.600Z |
| CVE-2026-5963 |
9.3 (4.0)
9.8 (3.1)
|
Digiwin|EasyFlow .NET - SQL Injection |
Digiwin |
EasyFlow .NET |
2026-04-20T07:32:20.443Z | 2026-04-20T13:42:03.062Z |
| CVE-2026-6617 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
langgenius dify ApiToolManageService api_tools_manage_… |
langgenius |
dify |
2026-04-20T07:30:12.357Z | 2026-04-20T11:12:15.089Z |
| CVE-2026-6616 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
TransformerOptimus SuperAGI WebScraperTool webpage_ext… |
TransformerOptimus |
SuperAGI |
2026-04-20T07:15:12.269Z | 2026-04-20T15:54:33.904Z |
| CVE-2026-41282 |
4 (3.1)
|
ProjectDiscovery Nuclei 3 before 3.8.0 allows DSL… |
ProjectDiscovery |
Nuclei |
2026-04-20T07:10:30.246Z | 2026-04-21T00:59:19.998Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-66954 |
6.5 (3.1)
|
A vulnerability exists in the Buffalo Link Statio… |
n/a |
n/a |
2026-04-20T00:00:00.000Z | 2026-04-20T16:54:28.824Z |
| CVE-2026-6652 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
Pagekit CMS StringStorage Template PhpEngine.php evalu… |
Pagekit |
CMS |
2026-04-20T15:00:22.525Z | 2026-04-20T16:14:56.950Z |
| CVE-2026-6651 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
erponline.xyz ERP Online Inventory Edit Item cross sit… |
erponline.xyz |
ERP Online |
2026-04-20T14:45:11.560Z | 2026-04-20T15:21:57.084Z |
| CVE-2026-6650 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
Z-BlogPHP ZBA File app_upload.php UnPack unrestricted upload |
n/a |
Z-BlogPHP |
2026-04-20T14:30:13.825Z | 2026-04-20T16:23:25.105Z |
| CVE-2026-6066 |
7.1 (3.1)
|
Unencrypted Client‑Server Communication in ConnectWise… |
ConnectWise |
Automate |
2026-04-20T15:26:31.843Z | 2026-04-20T16:13:06.767Z |
| CVE-2026-41245 |
5.9 (3.1)
|
Junrar: Path Traversal (Zip-Slip) via Sibling Director… |
junrar |
junrar |
2026-04-20T15:15:24.540Z | 2026-04-20T16:35:09.317Z |
| CVE-2026-40896 |
6.5 (3.1)
|
OpenProject has Cross-Project Meeting Agenda Item Inje… |
opf |
openproject |
2026-04-20T15:12:52.279Z | 2026-04-20T16:13:10.714Z |
| CVE-2026-3219 |
4.6 (4.0)
|
pip doesn't reject concatenated ZIP and tar archives |
Python Packaging Authority |
pip |
2026-04-20T14:55:38.282Z | 2026-04-20T20:15:23.710Z |
| CVE-2026-39918 |
9.2 (4.0)
9.8 (3.1)
|
Vvveb < 1.0.8.1 Code Injection via Installation Endpoint |
givanz |
Vvveb |
2026-04-20T14:46:33.549Z | 2026-04-20T15:36:55.619Z |
| CVE-2026-34429 |
5.1 (4.0)
5.4 (3.1)
|
Vvveb < 1.0.8.1 Stored XSS via Media Upload and Rename |
givanz |
Vvveb |
2026-04-20T13:54:37.019Z | 2026-04-20T14:56:19.205Z |
| CVE-2026-34428 |
8.3 (4.0)
7.7 (3.1)
|
Vvveb < 1.0.8.1 SSRF via oEmbedProxy |
givanz |
Vvveb |
2026-04-20T13:55:36.802Z | 2026-04-20T14:49:33.646Z |
| CVE-2026-34427 |
8.7 (4.0)
8.8 (3.1)
|
Vvveb < 1.0.8.1 Privilege Escalation via admin/user/save |
givanz |
Vvveb |
2026-04-20T13:55:15.311Z | 2026-04-20T14:51:12.245Z |
| CVE-2026-26944 |
8.8 (3.1)
|
Dell PowerProtect Data Domain, versions 7.7.1.0 t… |
Dell |
PowerProtect Data Domain |
2026-04-20T15:51:30.118Z | 2026-04-22T03:55:56.073Z |
| CVE-2026-25883 |
5.8 (3.1)
|
Vexa Webhook Feature has a SSRF Vulnerability |
Vexa-ai |
vexa |
2026-04-20T16:04:36.584Z | 2026-04-20T16:36:21.221Z |
| CVE-2026-25058 |
7.5 (3.1)
|
Vexa's unauthenticated internal transcript endpoint ex… |
Vexa-ai |
vexa |
2026-04-20T16:03:06.639Z | 2026-04-20T16:12:27.988Z |
| CVE-2026-24468 |
5.3 (3.1)
|
OpenAEV Vulnerable to Username/Email Enumeration Throu… |
OpenAEV-Platform |
openaev |
2026-04-20T15:45:48.572Z | 2026-04-20T16:24:44.061Z |
| CVE-2026-24467 |
9.1 (3.1)
|
OpenAEV's Improper Password Reset Token Management Lea… |
OpenAEV-Platform |
openaev |
2026-04-20T15:40:56.203Z | 2026-04-20T16:21:50.299Z |
| CVE-2026-23774 |
7.2 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain |
2026-04-20T15:58:46.965Z | 2026-04-22T03:55:57.514Z |
| CVE-2026-6649 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Qibo CMS headers server-side request forgery |
Qibo |
CMS |
2026-04-20T13:30:41.191Z | 2026-04-20T14:14:18.603Z |
| CVE-2026-6369 |
5.7 (4.0)
|
Exposed Session Token in canonical-livepatch client snap |
Canonical |
canonical-livepatch |
2026-04-20T13:38:13.691Z | 2026-04-20T14:06:18.537Z |
| CVE-2026-5760 |
9.8 (3.1)
|
CVE-2026-5760 |
SGLang |
SGLang |
2026-04-20T13:46:23.603Z | 2026-04-20T15:29:54.098Z |
| CVE-2026-4048 |
8.4 (3.1)
|
OS Command Injection Remote Code Execution Vulnerabili… |
Progress Software |
LoadMaster |
2026-04-20T13:36:49.475Z | 2026-04-22T03:55:54.495Z |
| CVE-2026-3519 |
8.4 (3.1)
|
OS Command Injection Remote Code Execution Vulnerabili… |
Progress Software |
LoadMaster |
2026-04-20T13:32:50.259Z | 2026-04-22T03:55:53.355Z |
| CVE-2026-3518 |
8.4 (3.1)
|
OS Command Injection Remote Code Execution Vulnerabili… |
Progress Software |
LoadMaster |
2026-04-20T13:29:33.794Z | 2026-04-22T03:55:52.242Z |
| CVE-2026-3517 |
8.4 (3.1)
|
OS Command Injection Remote Code Execution Vulnerabili… |
Progress Software |
LoadMaster |
2026-04-20T13:22:54.867Z | 2026-04-22T03:55:51.123Z |
| CVE-2026-33558 |
N/A
|
Apache Kafka, Apache Kafka Clients: Information Exposu… |
Apache Software Foundation |
Apache Kafka |
2026-04-20T13:20:38.059Z | 2026-04-20T14:20:41.640Z |
| CVE-2026-33557 |
N/A
|
Apache Kafka: Missing JWT token validation in OAUTHBEA… |
Apache Software Foundation |
Apache Kafka |
2026-04-20T13:28:43.669Z | 2026-04-20T14:30:30.936Z |
| CVE-2025-66335 |
N/A
|
Apache Doris MCP Server: MCP SQL inject |
Apache Software Foundation |
Apache Doris MCP Server |
2026-04-20T13:27:27.764Z | 2026-04-20T14:17:11.395Z |
| CVE-2026-6648 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
Qibo CMS Internal Message cross site scripting |
Qibo |
CMS |
2026-04-20T13:00:44.627Z | 2026-04-20T14:51:00.368Z |
| CVE-2026-6636 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
p2r3 convert API buildCache.js Bun.serve path traversal |
p2r3 |
convert |
2026-04-20T12:00:17.473Z | 2026-04-20T14:58:24.131Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-c97m-vxhj-p7j6 |
6.1 (3.1)
5.1 (4.0)
|
goldmark vulnerable to Cross-site Scripting (XSS) | 2026-04-17T15:31:17Z | 2026-04-18T01:02:42Z |
| ghsa-5f43-3gvm-hhjm |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was identified in QueryMine sms up to 7ab5a9ea196209611134525ffc18de25c57d9593. Thi… | 2026-04-17T15:31:17Z | 2026-04-17T15:31:17Z |
| ghsa-376w-pjjp-jrvj |
3.5 (3.1)
2.0 (4.0)
|
A vulnerability was detected in classroombookings up to 2.17.0. This impacts the function read of t… | 2026-04-17T15:31:17Z | 2026-04-17T15:31:18Z |
| ghsa-xgpm-2v6j-vx8q |
6.7 (3.1)
|
Dell PowerProtect Data Domain, versions 7.7.1.0 through 8.7.0.0, LTS2025 release versions 8.3.1.0 t… | 2026-04-17T12:31:25Z | 2026-04-17T12:31:25Z |
| ghsa-x63q-987j-jrv7 |
4.3 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-17T12:31:25Z | 2026-04-17T12:31:25Z |
| ghsa-wx63-92xj-ggq5 |
6.2 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-17T12:31:25Z | 2026-04-17T12:31:25Z |
| ghsa-w6h6-qc6q-q65w |
6.6 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-17T12:31:25Z | 2026-04-17T12:31:25Z |
| ghsa-r9x4-2726-c64m |
6.2 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-17T12:31:25Z | 2026-04-17T12:31:25Z |
| ghsa-pc4q-wmj3-q7jg |
6.7 (3.1)
|
Dell PowerProtect Data Domain, versions 7.7.1.0 through 8.7.0.0, LTS2025 release versions 8.3.1.0 t… | 2026-04-17T12:31:25Z | 2026-04-17T12:31:25Z |
| ghsa-jh98-4jxg-c74j |
7.2 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-17T12:31:25Z | 2026-04-17T12:31:25Z |
| ghsa-f2cg-3cww-mcq8 |
6.9 (4.0)
|
GREENmod uses named pipes for communication between plugins, the web portal, and the system service… | 2026-04-17T12:31:25Z | 2026-04-17T12:31:25Z |
| ghsa-7rfm-rcv9-66r2 |
7.2 (3.1)
7.3 (4.0)
|
A vulnerability was found in Wavlink WL-WN530H4 20220721. This vulnerability affects the function s… | 2026-04-17T12:31:25Z | 2026-04-17T12:31:25Z |
| ghsa-7g82-gmhh-22cx |
6.7 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-17T12:31:25Z | 2026-04-17T12:31:25Z |
| ghsa-6w3g-2v88-h993 |
5.9 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-17T12:31:25Z | 2026-04-17T12:31:25Z |
| ghsa-53vq-962v-f9cq |
6.7 (3.1)
|
Dell PowerProtect Data Domain, versions 7.7.1.0 through 8.7.0.0, LTS2025 release versions 8.3.1.0 t… | 2026-04-17T12:31:25Z | 2026-04-17T12:31:25Z |
| ghsa-536m-vwvg-ggr6 |
6.6 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-17T12:31:25Z | 2026-04-17T12:31:25Z |
| ghsa-4229-xrvq-qm47 |
6.7 (3.1)
|
Dell PowerProtect Data Domain, versions 7.7.1.0 through 8.7.0.0, LTS2025 release versions 8.3.1.0 t… | 2026-04-17T12:31:25Z | 2026-04-17T12:31:25Z |
| ghsa-xpp5-4hhp-6qhr |
7.2 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-17T09:31:20Z | 2026-04-17T09:31:20Z |
| ghsa-w42r-7hmw-4854 |
7.6 (3.1)
|
Dell PowerProtect Data Domain appliances with Data Domain Operating System (DD OS) of Feature Relea… | 2026-04-17T09:31:20Z | 2026-04-17T09:31:20Z |
| ghsa-q846-2w2g-p6v6 |
7.8 (3.1)
|
Dell PowerProtect Data Domain BoostFS for client of Feature Release versions 7.7.1.0 through 8.5, L… | 2026-04-17T09:31:20Z | 2026-04-17T09:31:20Z |
| ghsa-gc8m-6q8j-fh75 |
4.4 (3.1)
|
The VideoZen plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to an… | 2026-04-17T09:31:20Z | 2026-04-17T09:31:20Z |
| ghsa-cpjc-5x9w-83h8 |
9.5 (4.0)
|
Unauthenticated user is able to execute arbitrary SQL commands in Sparx Pro Cloud Server database i… | 2026-04-17T09:31:20Z | 2026-04-17T09:31:20Z |
| ghsa-c63q-7gvc-8xq3 |
5.3 (3.1)
|
A flaw was found in the AAP MCP server. An unauthenticated remote attacker can exploit a log inject… | 2026-04-17T09:31:20Z | 2026-04-17T09:31:20Z |
| ghsa-mqmv-fjj3-cwjx |
9.3 (4.0)
|
Exposure of Private Personal Information to an Unauthorized Actor, : Exposure of Sensitive System I… | 2026-04-17T09:31:19Z | 2026-04-17T09:31:19Z |
| ghsa-g7j3-235h-9jvv |
6.2 (4.0)
|
Insufficiently Protected Credentials vulnerability in Sparx Systems Pty Ltd. Sparx Enterprise Archi… | 2026-04-17T09:31:19Z | 2026-04-17T09:31:19Z |
| ghsa-9gf7-444h-6v98 |
9.3 (4.0)
|
Plaintext Storage of a Password vulnerability in Sparx Systems Pty Ltd. Sparx Pro Cloud Server. In… | 2026-04-17T09:31:19Z | 2026-04-17T09:31:19Z |
| ghsa-8mf7-m4px-v9qq |
4.3 (3.1)
|
The cms-fuer-motorrad-werkstaetten plugin for WordPress is vulnerable to Cross-Site Request Forgery… | 2026-04-17T09:31:19Z | 2026-04-17T09:31:19Z |
| ghsa-rq4p-44h8-crv3 |
7.2 (3.1)
|
In JetBrains YouTrack before 2025.3.131383 high privileged user can achieve RCE via sandbox bypass | 2026-04-17T09:31:18Z | 2026-04-17T09:31:18Z |
| ghsa-fwp9-f988-69xr |
5.0 (3.1)
|
Red Magic 11 Pro (NX809J) contains a vulnerability that allows non-privileged applications to trigg… | 2026-04-17T09:31:18Z | 2026-04-17T09:31:18Z |
| ghsa-ch84-4cgh-f3fc |
8.4 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-17T09:31:18Z | 2026-04-17T09:31:18Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-43144 |
9.1 (3.1)
|
Patchelf v0.9 was discovered to contain an out-of-bounds read via the function modifyRPat… | patchelf | 2022-12-19T22:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2022-43016 |
|
A vulnerability, which was classified as problematic, has been found in UBI Reader up to … | ubi-reader | 2022-12-17T02:15:00Z | 2023-05-04T04:29:30.474506Z |
| pysec-2022-42994 |
|
GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to 0.1.5 are v… | guarddog | 2022-12-17T00:15:00Z | 2023-05-04T04:29:25.595529Z |
| pysec-2022-42993 |
|
GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to v0.1.8 are … | guarddog | 2022-12-16T23:15:00Z | 2023-05-04T04:29:25.550921Z |
| pysec-2022-43061 |
6.1 (3.1)
|
A vulnerability was found in django-photologue up to 3.15.1 and classified as problematic… | django-photologue | 2022-12-15T21:15:00+00:00 | 2023-11-07T20:24:24.147635+00:00 |
| pysec-2022-42990 |
|
A vulnerability was found in collective.task up to 3.0.9. It has been classified as probl… | collective-task | 2022-12-15T21:15:00Z | 2023-05-04T04:29:24.403566Z |
| pysec-2022-43060 |
5.9 (3.1)
|
The Apache Bookkeeper Java Client (before 4.14.6 and also 4.15.0) does not close the conn… | apache-bookkeeper-client | 2022-12-15T19:15:00+00:00 | 2023-11-07T20:24:23.853507+00:00 |
| pysec-2022-42989 |
|
A vulnerability, which was classified as problematic, has been found in collective.dms.ba… | collective-dms-basecontent | 2022-12-14T15:15:00Z | 2023-05-04T03:49:45.138352Z |
| pysec-2022-43155 |
5.5 (3.1)
|
wasm3 commit 7890a2097569fde845881e0b352d813573e371f9 was discovered to contain a segment… | pywasm3 | 2022-12-13T23:15:00Z | 2024-11-21T14:23:00.213494Z |
| pysec-2022-43062 |
7.8 (3.1)
|
A vulnerability classified as problematic was found in pacparser up to 1.3.x. Affected by… | pacparser | 2022-12-13T18:15:00+00:00 | 2023-11-07T20:24:25.809231+00:00 |
| pysec-2022-43002 |
|
Improper Privilege Management in GitHub repository ikus060/rdiffweb prior to 2.5.2. | rdiffweb | 2022-12-12T18:15:00Z | 2023-05-04T04:29:29.006053Z |
| pysec-2022-43011 |
|
Sentry is an error tracking and performance monitoring platform. In versions of the sentr… | sentry | 2022-12-10T01:15:00Z | 2023-05-04T04:29:29.699170Z |
| pysec-2022-42986 |
|
Certifi is a curated collection of Root Certificates for validating the trustworthiness o… | certifi | 2022-12-07T22:15:00Z | 2023-05-04T03:49:45.039819Z |
| pysec-2022-43063 |
9.8 (3.1)
|
Code injection in paddle.audio.functional.get_window in PaddlePaddle 2.4.0-rc0 allows arb… | paddlepaddle | 2022-12-07T09:15:00+00:00 | 2024-11-22T12:27:25.862098+00:00 |
| pysec-2022-42998 |
|
A directory traversal vulnerability in the SevenZipFile.extractall() function of the pyth… | py7zr | 2022-12-06T20:15:00Z | 2023-05-04T04:29:28.497759Z |
| pysec-2022-42997 |
|
Passeo is an open source python password generator. Versions prior to 1.0.5 rely on the p… | passeo | 2022-12-06T18:15:00Z | 2023-05-04T04:29:27.942516Z |
| pysec-2022-42992 |
|
All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to im… | gitpython | 2022-12-06T05:15:00Z | 2023-05-04T03:49:45.777062Z |
| pysec-2022-43175 |
6.1 (3.1)
|
Drag and Drop XBlock v2 implements a drag-and-drop style problem, where a learner has to … | xblock-drag-and-drop-v2 | 2022-11-28T21:15:00+00:00 | 2024-11-21T14:23:03.352390+00:00 |
| pysec-2022-43015 |
|
In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary … | torch | 2022-11-26T02:15:00Z | 2023-05-04T03:49:48.383740Z |
| pysec-2022-42996 |
|
MPXJ is an open source library to read and write project plans from a variety of file for… | mpxj | 2022-11-25T19:15:00Z | 2023-05-04T04:29:27.436392Z |
| pysec-2022-42995 |
|
A vulnerability was found in keylime. This security issue happens in some circumstances, … | keylime | 2022-11-22T19:15:00Z | 2023-05-04T04:29:25.773897Z |
| pysec-2022-42987 |
|
CKAN through 2.9.6 account takeovers by unauthenticated users when an existing user id is… | ckan | 2022-11-22T01:15:00Z | 2023-05-04T04:29:23.890366Z |
| pysec-2022-43140 |
6.5 (3.1)
|
A heap buffer overflow in the LIEF::MachO::BinaryParser::parse_dyldinfo_generic_bind func… | lief | 2022-11-17T23:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2022-43001 |
|
Missing Authentication for Critical Function in GitHub repository ikus060/rdiffweb prior … | rdiffweb | 2022-11-16T13:15:00Z | 2023-05-04T04:29:28.960174Z |
| pysec-2022-42984 |
|
In Apache Airflow versions prior to 2.4.3, there was an open redirect in the webserver's … | apache-airflow | 2022-11-15T09:15:00Z | 2023-05-04T04:29:22.748527Z |
| pysec-2022-43000 |
|
Insufficient Session Expiration in GitHub repository ikus060/rdiffweb prior to 2.5.0. | rdiffweb | 2022-11-14T21:15:00Z | 2023-05-04T04:29:28.911542Z |
| pysec-2022-42982 |
|
A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who c… | apache-airflow | 2022-11-14T10:15:00Z | 2023-05-04T04:29:22.645854Z |
| pysec-2022-42981 |
|
A vulnerability in UI of Apache Airflow allows an attacker to view unmasked secrets in re… | apache-airflow | 2022-11-14T10:15:00Z | 2023-05-04T04:29:22.592547Z |
| pysec-2022-42980 |
|
Pillow before 9.3.0 allows denial of service via SAMPLESPERPIXEL. | pillow | 2022-11-14T07:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2022-42979 |
|
Pillow before 9.2.0 performs Improper Handling of Highly Compressed GIF Data (Data Amplif… | pillow | 2022-11-14T07:15:00Z | 2022-11-14T11:29:25.508491Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2251 | Malicious code in testtestsharp (npm) | 2026-03-27T03:07:31Z | 2026-04-16T15:42:10Z |
| mal-2026-2250 | Malicious code in test1sharp (npm) | 2026-03-27T03:07:31Z | 2026-04-16T15:42:10Z |
| mal-2026-2247 | Malicious code in cua-primitives-server (npm) | 2026-03-27T00:51:36Z | 2026-03-31T03:12:01Z |
| mal-2026-2246 | Malicious code in @ev-tech/eva-container-api (npm) | 2026-03-27T00:51:36Z | 2026-04-16T15:42:07Z |
| mal-2026-2248 | Malicious code in shop-republik-ch (npm) | 2026-03-27T00:51:35Z | 2026-03-31T03:12:04Z |
| mal-2026-2245 | Malicious code in requests-testik111 (PyPI) | 2026-03-26T21:35:07Z | 2026-03-27T17:24:17Z |
| mal-2026-2244 | Malicious code in fluxhttp (PyPI) | 2026-03-26T20:49:03Z | 2026-04-08T20:19:39Z |
| mal-2026-2243 | Malicious code in browserstack-electron-forge-include-package-plugin (npm) | 2026-03-26T20:45:39Z | 2026-03-31T03:12:00Z |
| mal-2026-2242 | Malicious code in somepentest-test-package (PyPI) | 2026-03-26T20:06:44Z | 2026-03-26T20:06:44Z |
| mal-2026-2238 | Malicious code in spr-i18n-labels (npm) | 2026-03-26T16:40:45Z | 2026-03-31T03:12:04Z |
| mal-2026-2239 | Malicious code in chaostoolkit-turbulence (PyPI) | 2026-03-26T16:32:17Z | 2026-03-26T23:47:08Z |
| mal-2026-2240 | Malicious code in magtape (PyPI) | 2026-03-26T16:21:03Z | 2026-03-26T23:47:09Z |
| mal-2026-2241 | Malicious code in pacbot (PyPI) | 2026-03-26T16:21:00Z | 2026-03-26T23:47:09Z |
| mal-2026-2237 | Malicious code in jsonify-builder (npm) | 2026-03-26T14:45:36Z | 2026-04-16T15:42:09Z |
| mal-2026-2236 | Malicious code in onboarding-server (npm) | 2026-03-26T14:15:47Z | 2026-03-31T03:12:03Z |
| mal-2026-2235 | Malicious code in srcsrctest (npm) | 2026-03-26T12:05:48Z | 2026-03-31T03:12:04Z |
| mal-2026-2234 | Malicious code in security-install-analytics (npm) | 2026-03-26T11:24:02Z | 2026-03-31T03:12:04Z |
| mal-2026-2233 | Malicious code in lightmock (PyPI) | 2026-03-26T08:27:10Z | 2026-03-26T08:27:10Z |
| mal-2026-2232 | Malicious code in checkmarx.cx-dev-assist (VSCode:https://open-vsx.org) | 2026-03-26T06:18:28Z | 2026-03-26T06:18:28Z |
| mal-2026-2231 | Malicious code in checkmarx.ast-results (VSCode:https://open-vsx.org) | 2026-03-26T06:18:28Z | 2026-03-26T06:18:28Z |
| mal-2026-2230 | Malicious code in aquasecurityofficial.trivy-vulnerability-scanner (VSCode:https://open-vsx.org) | 2026-03-26T04:00:51Z | 2026-03-26T04:00:51Z |
| mal-2026-2229 | Malicious code in @zecho/libsignal (npm) | 2026-03-26T00:57:13Z | 2026-03-31T03:12:00Z |
| mal-2026-2228 | Malicious code in @zecho/baileys-mod (npm) | 2026-03-26T00:57:13Z | 2026-03-31T03:12:00Z |
| mal-2026-2221 | Malicious code in @validator-lut-sdk/v3 (npm) | 2026-03-26T00:52:20Z | 2026-03-31T03:12:00Z |
| mal-2026-2227 | Malicious code in validator-lut-sdk (npm) | 2026-03-26T00:52:19Z | 2026-03-31T03:12:05Z |
| mal-2026-2225 | Malicious code in neanderthal-validator (npm) | 2026-03-26T00:52:19Z | 2026-04-16T15:42:09Z |
| mal-2026-2224 | Malicious code in jito-validator-sdk (npm) | 2026-03-26T00:52:19Z | 2026-03-31T03:12:02Z |
| mal-2026-2219 | Malicious code in @solmasterv3/solana-metadata-sdk (npm) | 2026-03-26T00:52:19Z | 2026-03-31T03:12:00Z |
| mal-2026-2218 | Malicious code in @solana-ipfs/sdk (npm) | 2026-03-26T00:52:19Z | 2026-03-31T03:12:00Z |
| mal-2026-2216 | Malicious code in @pumpfun-ipfs/sdk (npm) | 2026-03-26T00:52:19Z | 2026-03-31T03:12:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2696 | expat: Schwachstelle ermöglicht Denial of Service | 2025-11-27T23:00:00.000+00:00 | 2025-11-27T23:00:00.000+00:00 |
| wid-sec-w-2025-2695 | Devolutions Server: Mehrere Schwachstellen | 2025-11-27T23:00:00.000+00:00 | 2025-11-27T23:00:00.000+00:00 |
| wid-sec-w-2025-2694 | MariaDB: Schwachstelle ermöglicht Codeausführung | 2025-11-27T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2693 | CUPS: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-27T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2691 | NCP Secure Enterprise Client: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2025-11-26T23:00:00.000+00:00 | 2025-11-26T23:00:00.000+00:00 |
| wid-sec-w-2025-2690 | MISP: Schwachstelle ermöglicht Offenlegung von Informationen und potenziell Manipulation von Dateien | 2025-11-26T23:00:00.000+00:00 | 2025-11-26T23:00:00.000+00:00 |
| wid-sec-w-2025-2689 | Angular: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-26T23:00:00.000+00:00 | 2025-11-26T23:00:00.000+00:00 |
| wid-sec-w-2025-2688 | Microsoft Azure, SharePoint, Defender, Dynamics: Mehrere Schwachstellen | 2025-11-26T23:00:00.000+00:00 | 2025-11-26T23:00:00.000+00:00 |
| wid-sec-w-2025-2687 | Apache CloudStack: Mehrere Schwachstellen | 2025-11-26T23:00:00.000+00:00 | 2025-11-27T23:00:00.000+00:00 |
| wid-sec-w-2025-2686 | Red Hat JBoss Enterprise Application Platform (Eclipse JGit): Schwachstelle ermöglicht Denial of Service | 2025-11-26T23:00:00.000+00:00 | 2025-12-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2685 | Mattermost: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-11-26T23:00:00.000+00:00 | 2025-11-26T23:00:00.000+00:00 |
| wid-sec-w-2025-2684 | GitLab: Mehrere Schwachstellen | 2025-11-26T23:00:00.000+00:00 | 2025-11-26T23:00:00.000+00:00 |
| wid-sec-w-2025-2683 | Splunk Enterprise (Add-on für Palo Alto Networks): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-26T23:00:00.000+00:00 | 2025-11-26T23:00:00.000+00:00 |
| wid-sec-w-2025-2682 | Tinyproxy: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-11-26T23:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2681 | IBM App Connect Enterprise: Mehrere Schwachstellen | 2025-11-25T23:00:00.000+00:00 | 2025-11-26T23:00:00.000+00:00 |
| wid-sec-w-2025-2680 | OpenSearch: Schwachstelle ermöglicht Denial of Service | 2025-11-25T23:00:00.000+00:00 | 2025-11-25T23:00:00.000+00:00 |
| wid-sec-w-2025-2679 | Contao: Mehrere Schwachstellen | 2025-11-25T23:00:00.000+00:00 | 2025-11-25T23:00:00.000+00:00 |
| wid-sec-w-2025-2678 | Foreman: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-25T23:00:00.000+00:00 | 2025-11-26T23:00:00.000+00:00 |
| wid-sec-w-2025-2677 | OPNsense: Schwachstelle ermöglicht Manipulation von Dateien | 2025-11-25T23:00:00.000+00:00 | 2025-12-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2676 | GeoServer: Mehrere Schwachstellen | 2025-11-25T23:00:00.000+00:00 | 2025-12-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2675 | OpenBao: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2025-11-25T23:00:00.000+00:00 | 2025-11-26T23:00:00.000+00:00 |
| wid-sec-w-2025-2674 | Lenovo PGX Workstation (ThinkStation): Mehrere Schwachstellen | 2025-11-25T23:00:00.000+00:00 | 2025-11-25T23:00:00.000+00:00 |
| wid-sec-w-2025-2673 | Red Hat OpenShift (Trusted Artifact Signer): Schwachstelle ermöglicht Codeausführung | 2025-11-25T23:00:00.000+00:00 | 2025-11-25T23:00:00.000+00:00 |
| wid-sec-w-2025-2672 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-24T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2671 | D-LINK Router: Mehrere Schwachstellen | 2025-11-24T23:00:00.000+00:00 | 2025-11-24T23:00:00.000+00:00 |
| wid-sec-w-2025-2670 | Fluent Bit: Mehrere Schwachstellen | 2025-11-24T23:00:00.000+00:00 | 2025-11-25T23:00:00.000+00:00 |
| wid-sec-w-2025-2669 | MongoDB: Mehrere Schwachstellen | 2025-11-24T23:00:00.000+00:00 | 2025-11-24T23:00:00.000+00:00 |
| wid-sec-w-2025-2668 | Red Hat Enterprise Linux (CivetWeb library): Schwachstelle ermöglicht Denial of Service | 2025-11-24T23:00:00.000+00:00 | 2025-12-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2667 | Janitza UMG 96-PA und UMG 96-PA-MID+: Schwachstelle ermöglicht Denial of Service | 2025-11-23T23:00:00.000+00:00 | 2025-11-24T23:00:00.000+00:00 |
| wid-sec-w-2025-2666 | vllm und PyTorch: Schwachstelle ermöglicht DoS und potenzielle Codeausführung | 2025-11-23T23:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-345-05 | Horner Automation Cscape | 2024-12-10T07:00:00.000000Z | 2024-12-10T07:00:00.000000Z |
| icsa-24-345-04 | National Instruments LabVIEW | 2024-12-10T07:00:00.000000Z | 2024-12-10T07:00:00.000000Z |
| icsa-24-345-01 | MOBATIME Network Master Clock - DTS 4801 | 2024-12-10T07:00:00.000000Z | 2024-12-10T07:00:00.000000Z |
| icsa-24-352-04 | Schneider Electric Modicon | 2024-12-10T05:00:00.000000Z | 2025-10-14T07:00:00.000000Z |
| icsa-25-010-02 | Schneider Electric Harmony HMI and Pro-Face HMI Products | 2024-12-10T00:00:00.000000Z | 2024-12-10T00:00:00.000000Z |
| icsa-25-010-01 | Schneider Electric PowerChute Serial Shutdown | 2024-12-10T00:00:00.000000Z | 2024-12-10T00:00:00.000000Z |
| icsa-24-347-10 | Siemens SENTRON Powercenter 1000 | 2024-12-10T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-24-347-09 | Siemens Teamcenter Visualization | 2024-12-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-347-08 | Siemens COMOS | 2024-12-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-347-07 | Siemens Solid Edge SE2024 | 2024-12-10T00:00:00.000000Z | 2024-12-10T00:00:00.000000Z |
| icsa-24-347-06 | Siemens Simcenter Femap | 2024-12-10T00:00:00.000000Z | 2024-12-10T00:00:00.000000Z |
| icsa-24-347-05 | Siemens Siemens Engineering Platforms | 2024-12-10T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-347-04 | Siemens Parasolid | 2024-12-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-347-03 | Siemens RUGGEDCOM ROX II | 2024-12-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-347-02 | Siemens Engineering Platforms | 2024-12-10T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-24-347-01 | Siemens CPCI85 Central Processing/Communication | 2024-12-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-340-02 | Planet Technology Planet WGS-804HPT | 2024-12-05T07:00:00.000000Z | 2024-12-05T07:00:00.000000Z |
| icsa-24-340-01 | AutomationDirect C-More EA9 Programming Software | 2024-12-05T07:00:00.000000Z | 2024-12-05T07:00:00.000000Z |
| icsa-25-182-03 | FESTO CODESYS | 2024-12-03T11:00:00.000000Z | 2024-12-03T11:00:00.000000Z |
| icsa-24-338-06 | Fuji Electric Tellus Lite V-Simulator (Update A) | 2024-12-03T07:00:00.000000Z | 2025-07-29T06:00:00.000000Z |
| icsa-24-338-05 | Fuji Electric Monitouch V-SFT (Update A) | 2024-12-03T07:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-338-03 | Open Automation Software | 2024-12-03T07:00:00.000000Z | 2024-12-03T07:00:00.000000Z |
| icsa-24-338-01 | Ruijie Reyee OS (Update A) | 2024-12-03T07:00:00.000000Z | 2024-12-10T07:00:00.000000Z |
| icsa-24-338-04 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products (Update C) | 2024-12-03T00:00:00.000000Z | 2026-04-07T06:00:00.000000Z |
| va-24-331-01 | Valor Apps Easy Folder Listing Pro Joomla! extension deserialization vulnerability | 2024-11-26T18:15:49Z | 2024-11-26T18:15:49Z |
| icsa-24-338-02 | Siemens RUGGEDCOM APE1808 | 2024-11-22T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-24-326-07 | mySCADA myPRO Manager | 2024-11-21T07:00:00.000000Z | 2024-11-21T07:00:00.000000Z |
| icsa-24-326-02 | OSCAT Basic Library | 2024-11-21T07:00:00.000000Z | 2024-11-21T07:00:00.000000Z |
| icsa-24-326-01 | Automated Logic WebCTRL Premium Server | 2024-11-21T07:00:00.000000Z | 2024-11-21T07:00:00.000000Z |
| va-24-325-01 | Versa Networks Versa Director insecure default PostgreSQL configuration | 2024-11-20T18:33:57Z | 2024-11-20T18:33:57Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-cxagent-goq9qjqz | Cisco CX Cloud Agent Privilege Escalation Vulnerabilities | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-cuis-xss-omm8jybx | Cisco Unified Intelligence Center Reflected Cross-Site Scripting Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-05-30T14:22:18+00:00 |
| cisco-sa-bw-xss-ezqdxqg4 | Cisco BroadWorks Application Delivery Platform, Application Server, and Xtended Services Platform Cross-Site Scripting Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-bw-dos-hpkeyzp | Cisco BroadWorks Application Delivery Platform and Xtended Services Platform Denial of Service Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-02-06T18:20:29+00:00 |
| cisco-sa-ipp-oobwrite-8cmf5r7u | Cisco IP Phone 7800 and 8800 Series Cisco Discovery Protocol Stack Overflow Vulnerability | 2022-12-08T16:00:00+00:00 | 2023-04-27T21:07:18+00:00 |
| cisco-sa-ise-7q4tnyux | Cisco Identity Services Engine Vulnerabilities | 2022-11-16T16:00:00+00:00 | 2023-03-31T20:41:42+00:00 |
| cisco-sa-ssl-client-dos-ccrqpka | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SSL/TLS Client Denial of Service Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-snort-smb-3nfhjtr | Multiple Cisco Products Snort SMB2 Detection Engine Policy Bypass and Denial of Service Vulnerabilities | 2022-11-09T16:00:00+00:00 | 2022-11-30T21:51:24+00:00 |
| cisco-sa-fw3100-secure-boot-5m8muh26 | Cisco Secure Firewall 3100 Series Secure Boot Bypass Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-ftdsnort3sip-dos-a4chearc | Cisco Firepower Threat Defense Software SIP and Snort 3 Detection Engine Denial of Service Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-ftd-tls-bb-rcgtmy2 | Cisco Firepower Threat Defense Software SSL Decryption Policy Bleichenbacher Attack Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-ftd-mgmt-privesc-7gqr2th | Cisco Firepower Threat Defense Software Privilege Escalation Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-ftd-gre-dos-hmedhqpm | Cisco Firepower Threat Defense Software Generic Routing Encapsulation Denial of Service Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-ftd-fxos-cmd-inj-q9blnsrk | Cisco Firepower Threat Defense Software and Cisco FXOS Software Command Injection Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-fmcsfr-snmp-access-6gqgtj4s | Cisco FirePOWER Software for ASA FirePOWER Module, Firepower Management Center Software, and NGIPS Software SNMP Default Credential Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-fmc-xxe-mzpc4byd | Cisco Firepower Management Center Software XML External Entity Injection Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-fmc-xss-latzyzxs | Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-fmc-info-disc-ughnrrhp | Cisco Firepower Management Center Software Information Disclosure Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-fmc-dos-oweunwjn | Cisco Firepower Management Center and Firepower Threat Defense Software SSH Denial of Service Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-z3b5my35 | Cisco Firepower Management Center Software Command Injection Vulnerabilities | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-asaftd-snmp-dos-qsqbnm6x | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SNMP Denial of Service Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-asa-ftd-vp-authz-n2gckjn6 | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software VPN Authorization Bypass Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-asa-ftd-dap-dos-ghyzbxdu | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Dynamic Access Policies Denial of Service Vulnerability | 2022-11-09T16:00:00+00:00 | 2022-11-09T16:00:00+00:00 |
| cisco-sa-umbrella-xss-lfeyqv3 | Cisco Umbrella Stored Cross-Site Scripting Vulnerability | 2022-11-02T16:00:00+00:00 | 2022-11-02T16:00:00+00:00 |
| cisco-sa-ise-stor-xss-kprbwxy | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | 2022-11-02T16:00:00+00:00 | 2022-11-23T15:29:06+00:00 |
| cisco-sa-ise-sec-atk-dos-zw5rcuyp | Cisco Identity Services Engine Software Resource Exhaustion Vulnerability | 2022-11-02T16:00:00+00:00 | 2022-11-02T16:00:00+00:00 |
| cisco-sa-ise-path-trav-f6m7cs6r | Cisco Identity Services Engine Path Traversal Vulnerability | 2022-11-02T16:00:00+00:00 | 2022-11-23T14:40:22+00:00 |
| cisco-sa-ise-csrf-vgnttpas | Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability | 2022-11-02T16:00:00+00:00 | 2022-11-23T15:26:05+00:00 |
| cisco-sa-ise-access-contol-eeufsucx | Cisco Identity Services Engine Insufficient Access Control Vulnerability | 2022-11-02T16:00:00+00:00 | 2023-03-31T21:21:42+00:00 |
| cisco-sa-esasmawsa-vulns-yrusw5md | Cisco Email Security Appliance, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Next Generation Management Vulnerabilities | 2022-11-02T16:00:00+00:00 | 2022-11-30T12:49:53+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-0032 | In multiple functions of mem_protect.c, there is a possible out-of-bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2026-03-02T00:00:00.000Z | 2026-03-07T01:04:27.000Z |
| msrc_cve-2026-0031 | In multiple functions of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2026-03-02T00:00:00.000Z | 2026-03-07T01:04:34.000Z |
| msrc_cve-2025-71269 | btrfs: do not free data reservation in fallback from inline due to -ENOSPC | 2026-03-02T00:00:00.000Z | 2026-04-18T14:37:04.000Z |
| msrc_cve-2025-71267 | fs: ntfs3: fix infinite loop triggered by zero-sized ATTR_LIST | 2026-03-02T00:00:00.000Z | 2026-03-27T14:37:50.000Z |
| msrc_cve-2025-71266 | fs: ntfs3: check return value of indx_find to avoid infinite loop | 2026-03-02T00:00:00.000Z | 2026-03-27T14:37:45.000Z |
| msrc_cve-2025-71265 | fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata | 2026-03-02T00:00:00.000Z | 2026-03-27T14:38:15.000Z |
| msrc_cve-2025-71239 | audit: add fchmodat2() to change attributes class | 2026-03-02T00:00:00.000Z | 2026-03-27T14:37:21.000Z |
| msrc_cve-2025-71238 | scsi: qla2xxx: Fix bsg_done() causing double free | 2026-03-02T00:00:00.000Z | 2026-03-31T01:38:12.000Z |
| msrc_cve-2025-70888 | CVE-2025-70888 | 2026-03-02T00:00:00.000Z | 2026-03-30T14:38:57.000Z |
| msrc_cve-2025-70873 | CVE-2025-70873 | 2026-03-02T00:00:00.000Z | 2026-04-18T14:41:29.000Z |
| msrc_cve-2025-69720 | CVE-2025-69720 | 2026-03-02T00:00:00.000Z | 2026-03-31T15:18:12.000Z |
| msrc_cve-2025-69652 | GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an abort (SIGABRT) when processing a crafted ELF binary with malformed DWARF abbrev or debug information. Due to incomplete state cleanup in process_debug_info(), an invalid debug_info_p state may propagate into DWARF attribute parsing routines. When certain malformed attributes result in an unexpected data length of zero, byte_get_little_endian() triggers a fatal abort. No evidence of memory corruption or code execution was observed; the impact is limited to denial of service. | 2026-03-02T00:00:00.000Z | 2026-04-14T14:39:55.000Z |
| msrc_cve-2025-69651 | GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an invalid pointer free when processing a crafted ELF binary with malformed relocation or symbol data. If dump_relocations returns early due to parsing errors, the internal all_relocations array may remain partially uninitialized. Later, process_got_section_contents() may attempt to free an invalid r_symbol pointer, triggering memory corruption checks in glibc and causing the program to terminate with SIGABRT. No evidence of further memory corruption or code execution was observed; the impact is limited to denial of service. | 2026-03-02T00:00:00.000Z | 2026-03-11T01:02:49.000Z |
| msrc_cve-2025-69650 | GNU Binutils thru 2.46 readelf contains a double free vulnerability when processing a crafted ELF binary with malformed relocation data. During GOT relocation handling, dump_relocations may return early without initializing the all_relocations array. As a result, process_got_section_contents() may pass an uninitialized r_symbol pointer to free(), leading to a double free and terminating the program with SIGABRT. No evidence of exploitable memory corruption or code execution was observed; the impact is limited to denial of service. | 2026-03-02T00:00:00.000Z | 2026-03-11T01:02:17.000Z |
| msrc_cve-2025-69649 | GNU Binutils thru 2.46 readelf contains a null pointer dereference vulnerability when processing a crafted ELF binary with malformed header fields. During relocation processing, an invalid or null section pointer may be passed into display_relocations(), resulting in a segmentation fault (SIGSEGV) and abrupt termination. No evidence of memory corruption beyond the null pointer dereference, nor any possibility of code execution, was observed. | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:06.000Z |
| msrc_cve-2025-69648 | CVE-2025-69648 | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:44.000Z |
| msrc_cve-2025-69647 | CVE-2025-69647 | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:39.000Z |
| msrc_cve-2025-69646 | Binutils objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed DWARF debug_rnglists data. A logic error in the handling of the debug_rnglists header can cause objdump to repeatedly print the same warning message and fail to terminate, resulting in an unbounded logging loop until the process is interrupted. The issue was observed in binutils 2.44. A local attacker can exploit this vulnerability by supplying a malicious input file, leading to excessive CPU and I/O usage and preventing completion of the objdump analysis. | 2026-03-02T00:00:00.000Z | 2026-04-14T14:39:49.000Z |
| msrc_cve-2025-69645 | Binutils objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed DWARF debug information. A logic error in the handling of DWARF compilation units can result in an invalid offset_size value being used inside byte_get_little_endian, leading to an abort (SIGABRT). The issue was observed in binutils 2.44. A local attacker can trigger the crash by supplying a malicious input file. | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:00.000Z |
| msrc_cve-2025-69644 | An issue was discovered in Binutils before 2.46. The objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed debug information. A logic flaw in the handling of DWARF location list headers can cause objdump to enter an unbounded loop and produce endless output until manually interrupted. This issue affects versions prior to the upstream fix and allows a local attacker to cause excessive resource consumption by supplying a malicious input file. | 2026-03-02T00:00:00.000Z | 2026-03-11T01:02:56.000Z |
| msrc_cve-2025-67030 | CVE-2025-67030 | 2026-03-02T00:00:00.000Z | 2026-04-01T01:57:06.000Z |
| msrc_cve-2025-66413 | Git for Windows leaks NTLM hash when cloning from an attacker-controlled server | 2026-03-02T00:00:00.000Z | 2026-03-27T01:39:51.000Z |
| msrc_cve-2025-66215 | OpenSC: Stack-buffer-overflow WRITE in card-oberthur | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:25.000Z |
| msrc_cve-2025-66038 | OpenSC: `sc_compacttlv_find_tag` can return out-of-bounds pointers | 2026-03-02T00:00:00.000Z | 2026-04-14T14:43:34.000Z |
| msrc_cve-2025-66037 | OpenSC: Out of Bounds vulnerability | 2026-03-02T00:00:00.000Z | 2026-04-09T01:39:31.000Z |
| msrc_cve-2025-49010 | OpenSC: Stack-buffer-overflow WRITE in GET RESPONSE | 2026-03-02T00:00:00.000Z | 2026-04-14T14:43:29.000Z |
| msrc_cve-2025-13462 | tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling | 2026-03-02T00:00:00.000Z | 2026-03-31T15:18:28.000Z |
| msrc_cve-2024-14027 | xattr: switch to CLASS(fd) | 2026-03-02T00:00:00.000Z | 2026-03-11T14:36:33.000Z |
| msrc_cve-2006-10003 | XML::Parser versions through 2.47 for Perl has an off-by-one heap buffer overflow in st_serial_stack | 2026-03-02T00:00:00.000Z | 2026-04-08T01:40:48.000Z |
| msrc_cve-2006-10002 | XML::Parser versions through 2.47 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes | 2026-03-02T00:00:00.000Z | 2026-03-20T01:04:46.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0372 | Kwetsbaarheden verholpen in Citrix Workspace App for Windows | 2024-09-13T08:42:05.882665Z | 2024-09-13T08:42:05.882665Z |
| ncsc-2024-0371 | Kwetsbaarheden verholpen in Cisco IOS XR | 2024-09-13T08:40:26.656280Z | 2024-09-13T08:40:26.656280Z |
| ncsc-2024-0370 | Kwetsbaarheden verholpen in Solarwinds Access Rights Manager | 2024-09-13T08:30:38.806820Z | 2024-09-13T08:30:38.806820Z |
| ncsc-2024-0369 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2024-09-11T09:39:20.224400Z | 2024-09-13T17:00:35.302643Z |
| ncsc-2024-0368 | Kwetsbaarheden verholpen in Adobe producten | 2024-09-11T09:31:21.515977Z | 2024-09-11T09:31:21.515977Z |
| ncsc-2024-0367 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2024-09-10T18:28:04.110959Z | 2024-09-10T18:28:04.110959Z |
| ncsc-2024-0366 | Kwetsbaarheden verholpen in Microsoft Azure | 2024-09-10T18:27:15.880741Z | 2024-09-10T18:27:15.880741Z |
| ncsc-2024-0365 | Kwetsbaarheden verholpen in Microsoft Office | 2024-09-10T18:23:10.239728Z | 2024-09-10T18:23:10.239728Z |
| ncsc-2024-0364 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2024-09-10T18:22:18.355522Z | 2024-09-10T18:22:18.355522Z |
| ncsc-2024-0363 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-09-10T18:21:28.305189Z | 2024-09-10T18:21:28.305189Z |
| ncsc-2024-0362 | Kwetsbaarheden verholpen in Siemens producten | 2024-09-10T18:20:41.668720Z | 2024-09-10T18:20:41.668720Z |
| ncsc-2024-0361 | Kwetsbaarheden verholpen in QNAP QTS en QTS Hero | 2024-09-10T10:56:51.207746Z | 2024-09-10T10:56:51.207746Z |
| ncsc-2024-0360 | Kwetsbaarheid verholpen in Kemp LoadMaster | 2024-09-06T08:02:25.414309Z | 2024-09-06T08:02:25.414309Z |
| ncsc-2024-0359 | Kwetsbaarheden verholpen in diverse producten van Veeam. | 2024-09-06T08:01:04.558202Z | 2024-10-11T09:18:53.784374Z |
| ncsc-2024-0358 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-09-05T12:02:20.203769Z | 2024-09-05T12:02:20.203769Z |
| ncsc-2024-0357 | Kwetsbaarheden verholpen in Zyxel Flex en USG Firewalls | 2024-09-03T09:51:27.134213Z | 2024-09-03T09:51:27.134213Z |
| ncsc-2024-0356 | Kwetsbaarheid verholpen in Zyxel Access Points en Secure Routers | 2024-09-03T09:45:01.012004Z | 2024-09-03T09:45:01.012004Z |
| ncsc-2024-0355 | Kwetsbaarheden verholpen in Progress WhatsUp Gold | 2024-08-30T13:44:34.239519Z | 2024-09-02T11:51:17.688561Z |
| ncsc-2024-0354 | Kwetsbaarheden verholpen in Progress WS_FTP server | 2024-08-30T13:42:50.517100Z | 2024-08-30T13:42:50.517100Z |
| ncsc-2024-0353 | Kwetsbaarheid verholpen in Sonicwall SonicOS | 2024-08-27T12:45:37.679365Z | 2024-09-10T12:34:18.650826Z |
| ncsc-2024-0352 | Kwetsbaarheden verholpen in Solarwinds Web Helpdesk | 2024-08-22T13:05:56.658579Z | 2024-08-22T13:05:56.658579Z |
| ncsc-2024-0351 | Kwetsbaarheden verholpen in Google Chrome, Chromium & Microsoft Edge | 2024-08-22T11:42:49.629133Z | 2024-08-23T12:59:41.787815Z |
| ncsc-2024-0350 | Kwetsbaarheden verholpen in GitHub Enterprise Server | 2024-08-22T11:40:38.472495Z | 2024-08-22T11:40:38.472495Z |
| ncsc-2024-0349 | Kwetsbaarheid verholpen in Kubernetes | 2024-08-19T11:37:30.925578Z | 2024-08-19T11:37:30.925578Z |
| ncsc-2024-0348 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2024-08-14T12:58:38.046219Z | 2024-08-14T12:58:38.046219Z |
| ncsc-2024-0347 | Kwetsbaarheden verholpen in Adobe Acrobat en Acrobat Reader | 2024-08-14T12:52:29.316273Z | 2024-08-14T12:52:29.316273Z |
| ncsc-2024-0346 | Kwetsbaarheden verholpen in Adobe InDesign | 2024-08-14T12:47:08.240249Z | 2024-08-14T12:47:08.240249Z |
| ncsc-2024-0345 | Kwetsbaarheid verholpen in Adobe Photoshop | 2024-08-14T12:44:49.541083Z | 2024-08-14T12:44:49.541083Z |
| ncsc-2024-0344 | Kwetsbaarheden verholpen in Adobe Dimension | 2024-08-14T12:42:00.097800Z | 2024-08-14T12:42:00.097800Z |
| ncsc-2024-0343 | Kwetsbaarheden verholpen in Adobe Illustrator | 2024-08-14T12:38:58.918490Z | 2024-08-14T12:38:58.918490Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20014-1 | Security update for MozillaFirefox | 2026-01-12T11:35:13Z | 2026-01-12T11:35:13Z |
| opensuse-su-2026:20017-1 | Security update for libpng16 | 2026-01-12T11:14:46Z | 2026-01-12T11:14:46Z |
| opensuse-su-2026:20016-1 | Security update for libmicrohttpd | 2026-01-12T11:14:46Z | 2026-01-12T11:14:46Z |
| opensuse-su-2026:20015-1 | Security update for python-tornado6 | 2026-01-12T10:29:37Z | 2026-01-12T10:29:37Z |
| opensuse-su-2026:10035-1 | teleport-17.7.13-1.1 on GA media | 2026-01-12T00:00:00Z | 2026-01-12T00:00:00Z |
| opensuse-su-2026:10034-1 | python311-Authlib-1.6.6-1.1 on GA media | 2026-01-12T00:00:00Z | 2026-01-12T00:00:00Z |
| opensuse-su-2026:10033-1 | libtasn1-6-32bit-4.21.0-1.1 on GA media | 2026-01-12T00:00:00Z | 2026-01-12T00:00:00Z |
| opensuse-su-2026:10032-1 | libpcap-devel-1.10.6-1.1 on GA media | 2026-01-12T00:00:00Z | 2026-01-12T00:00:00Z |
| opensuse-su-2026:10031-1 | kubelogin-0.2.14-1.1 on GA media | 2026-01-12T00:00:00Z | 2026-01-12T00:00:00Z |
| opensuse-su-2026:10030-1 | k6-1.5.0-1.1 on GA media | 2026-01-12T00:00:00Z | 2026-01-12T00:00:00Z |
| opensuse-su-2026:10029-1 | istioctl-1.28.2-1.1 on GA media | 2026-01-12T00:00:00Z | 2026-01-12T00:00:00Z |
| opensuse-su-2026:10028-1 | ffmpeg-7-7.1.3-1.1 on GA media | 2026-01-12T00:00:00Z | 2026-01-12T00:00:00Z |
| opensuse-su-2026:10027-1 | ffmpeg-4-4.4.6-10.1 on GA media | 2026-01-12T00:00:00Z | 2026-01-12T00:00:00Z |
| opensuse-su-2026:20022-1 | Security update for matio | 2026-01-11T17:15:13Z | 2026-01-11T17:15:13Z |
| opensuse-su-2026:20013-1 | Security update for avahi | 2026-01-11T16:54:00Z | 2026-01-11T16:54:00Z |
| opensuse-su-2026:20020-1 | Security update for chromium | 2026-01-10T02:17:54Z | 2026-01-10T02:17:54Z |
| opensuse-su-2026:10026-1 | python311-urllib3-2.6.2-1.1 on GA media | 2026-01-09T00:00:00Z | 2026-01-09T00:00:00Z |
| opensuse-su-2026:10025-1 | python311-aiohttp-3.13.3-1.1 on GA media | 2026-01-09T00:00:00Z | 2026-01-09T00:00:00Z |
| opensuse-su-2026:10024-1 | libsoup-2_4-1-2.74.3-13.1 on GA media | 2026-01-09T00:00:00Z | 2026-01-09T00:00:00Z |
| opensuse-su-2026:10023-1 | libsoup-3_0-0-3.6.5-10.1 on GA media | 2026-01-09T00:00:00Z | 2026-01-09T00:00:00Z |
| opensuse-su-2026:10022-1 | libsodium-devel-1.0.21-1.1 on GA media | 2026-01-09T00:00:00Z | 2026-01-09T00:00:00Z |
| opensuse-su-2026:10021-1 | coredns-1.14.0-1.1 on GA media | 2026-01-09T00:00:00Z | 2026-01-09T00:00:00Z |
| opensuse-ru-2026:20010-1 | Recommended update for trivy | 2026-01-08T14:37:24Z | 2026-01-08T14:37:24Z |
| opensuse-su-2026:10020-1 | traefik-3.6.6-1.1 on GA media | 2026-01-08T00:00:00Z | 2026-01-08T00:00:00Z |
| opensuse-su-2026:10019-1 | gdk-pixbuf-loader-libheif-1.21.1-1.1 on GA media | 2026-01-08T00:00:00Z | 2026-01-08T00:00:00Z |
| opensuse-su-2026:10018-1 | gimp-3.0.6-4.1 on GA media | 2026-01-08T00:00:00Z | 2026-01-08T00:00:00Z |
| opensuse-su-2026:10017-1 | curl-8.18.0-1.1 on GA media | 2026-01-08T00:00:00Z | 2026-01-08T00:00:00Z |
| opensuse-su-2026:10016-1 | chromedriver-143.0.7499.192-1.1 on GA media | 2026-01-08T00:00:00Z | 2026-01-08T00:00:00Z |
| opensuse-su-2026:20003-1 | Security update of valkey | 2026-01-07T09:43:28Z | 2026-01-07T09:43:28Z |
| opensuse-su-2026:10015-1 | libwget4-2.2.1-1.1 on GA media | 2026-01-07T00:00:00Z | 2026-01-07T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:3880 | Red Hat Security Advisory: grafana security update | 2026-03-05T12:20:43+00:00 | 2026-04-14T09:46:37+00:00 |
| rhsa-2026:3879 | Red Hat Security Advisory: grafana security update | 2026-03-05T12:15:12+00:00 | 2026-04-14T09:46:37+00:00 |
| rhsa-2026:3884 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.19.2 security update | 2026-03-05T12:07:11+00:00 | 2026-04-14T09:46:37+00:00 |
| rhsa-2026:3868 | Red Hat Security Advisory: kpatch-patch-5_14_0-570_17_1, kpatch-patch-5_14_0-570_39_1, and kpatch-patch-5_14_0-570_66_1 security update | 2026-03-05T11:52:12+00:00 | 2026-03-18T03:18:41+00:00 |
| rhsa-2026:3867 | Red Hat Security Advisory: kpatch-patch-5_14_0-427_100_1, kpatch-patch-5_14_0-427_44_1, kpatch-patch-5_14_0-427_55_1, kpatch-patch-5_14_0-427_68_2, and kpatch-patch-5_14_0-427_84_1 security update | 2026-03-05T11:48:52+00:00 | 2026-03-18T03:18:44+00:00 |
| rhsa-2026:3865 | Red Hat Security Advisory: kpatch-patch-4_18_0-477_107_1, kpatch-patch-4_18_0-477_120_1, kpatch-patch-4_18_0-477_81_1, kpatch-patch-4_18_0-477_89_1, and kpatch-patch-4_18_0-477_97_1 security update | 2026-03-05T11:42:03+00:00 | 2026-03-18T03:19:02+00:00 |
| rhsa-2026:3873 | Red Hat Security Advisory: kpatch-patch-5_14_0-70_121_1, kpatch-patch-5_14_0-70_124_1, kpatch-patch-5_14_0-70_132_1, kpatch-patch-5_14_0-70_144_1, and kpatch-patch-5_14_0-70_155_1 security update | 2026-03-05T11:40:01+00:00 | 2026-03-18T03:18:58+00:00 |
| rhsa-2026:3866 | Red Hat Security Advisory: kpatch-patch-4_18_0-372_131_1, kpatch-patch-4_18_0-372_137_1, kpatch-patch-4_18_0-372_145_1, kpatch-patch-4_18_0-372_158_1, and kpatch-patch-4_18_0-372_170_1 security update | 2026-03-05T11:38:37+00:00 | 2026-03-18T03:18:58+00:00 |
| rhsa-2026:3864 | Red Hat Security Advisory: delve security update | 2026-03-05T11:35:47+00:00 | 2026-04-14T09:46:36+00:00 |
| rhsa-2026:3874 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.18.4 security update | 2026-03-05T11:31:22+00:00 | 2026-04-14T07:58:46+00:00 |
| rhsa-2026:3415 | Red Hat Security Advisory: OpenShift Container Platform 4.13.64 bug fix and security update | 2026-03-05T11:25:42+00:00 | 2026-04-13T20:14:34+00:00 |
| rhsa-2026:3842 | Red Hat Security Advisory: delve security update | 2026-03-05T11:24:36+00:00 | 2026-04-13T14:46:54+00:00 |
| rhsa-2026:3869 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.17.5 security update | 2026-03-05T11:15:16+00:00 | 2026-04-14T07:58:45+00:00 |
| rhsa-2026:3814 | Red Hat Security Advisory: go-rpm-macros security update | 2026-03-05T11:07:45+00:00 | 2026-04-14T07:58:37+00:00 |
| rhsa-2026:3854 | Red Hat Security Advisory: grafana security update | 2026-03-05T11:07:41+00:00 | 2026-04-14T09:46:36+00:00 |
| rhsa-2026:3848 | Red Hat Security Advisory: kpatch-patch-4_18_0-553_30_1, kpatch-patch-4_18_0-553_40_1, kpatch-patch-4_18_0-553_53_1, kpatch-patch-4_18_0-553_72_1, and kpatch-patch-4_18_0-553_85_1 security update | 2026-03-05T10:59:36+00:00 | 2026-03-18T03:18:56+00:00 |
| rhsa-2026:3422 | Red Hat Security Advisory: OpenShift Container Platform 4.13.64 bug fix and security update | 2026-03-05T10:40:18+00:00 | 2026-04-13T16:00:21+00:00 |
| rhsa-2026:3839 | Red Hat Security Advisory: image-builder security update | 2026-03-05T10:11:47+00:00 | 2026-04-14T09:46:35+00:00 |
| rhsa-2026:3843 | Red Hat Security Advisory: delve security update | 2026-03-05T09:56:17+00:00 | 2026-04-14T09:46:36+00:00 |
| rhsa-2026:3840 | Red Hat Security Advisory: image-builder security update | 2026-03-05T09:44:51+00:00 | 2026-04-14T09:46:35+00:00 |
| rhsa-2026:3838 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:44:33+00:00 | 2026-04-14T09:46:34+00:00 |
| rhsa-2026:3423 | Red Hat Security Advisory: OpenShift Container Platform 4.13.64 security and extras update | 2026-03-05T09:42:37+00:00 | 2026-04-10T21:19:39+00:00 |
| rhsa-2026:3841 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:37:53+00:00 | 2026-04-14T09:46:35+00:00 |
| rhsa-2026:3836 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:03:15+00:00 | 2026-04-14T09:46:33+00:00 |
| rhsa-2026:3835 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:01:36+00:00 | 2026-04-14T09:46:33+00:00 |
| rhsa-2026:3833 | Red Hat Security Advisory: grafana security update | 2026-03-05T08:23:57+00:00 | 2026-04-14T09:46:33+00:00 |
| rhsa-2026:3831 | Red Hat Security Advisory: grafana security update | 2026-03-05T07:55:46+00:00 | 2026-04-14T09:46:32+00:00 |
| rhsa-2026:3827 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.20.3 | 2026-03-05T07:31:32+00:00 | 2026-04-14T09:46:31+00:00 |
| rhsa-2026:3825 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.20.3 | 2026-03-05T07:08:51+00:00 | 2026-04-14T09:16:57+00:00 |
| rhsa-2026:3822 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:53:01+00:00 | 2026-04-14T09:46:31+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-625789 | SSA-625789: Multiple Vulnerabilities in SIMATIC S7-1200 CPU V1/V2 Devices | 2011-06-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20769-1 | Security update for ovmf | 2026-03-20T11:57:43Z | 2026-03-20T11:57:43Z |
| suse-su-2026:20768-1 | Security update for python311 | 2026-03-20T11:48:44Z | 2026-03-20T11:48:44Z |
| suse-su-2026:20919-1 | Security update for python-tornado6 | 2026-03-20T10:55:14Z | 2026-03-20T10:55:14Z |
| suse-su-2026:20761-1 | Security update for python-tornado6 | 2026-03-20T10:55:14Z | 2026-03-20T10:55:14Z |
| suse-su-2026:20918-1 | Security update for curl | 2026-03-20T09:37:16Z | 2026-03-20T09:37:16Z |
| suse-su-2026:20760-1 | Security update for curl | 2026-03-20T09:37:16Z | 2026-03-20T09:37:16Z |
| suse-su-2026:20917-1 | Security update for ImageMagick | 2026-03-20T09:31:53Z | 2026-03-20T09:31:53Z |
| suse-su-2026:0936-1 | Security update for libssh | 2026-03-20T07:46:48Z | 2026-03-20T07:46:48Z |
| suse-su-2026:20916-1 | Security update for vim | 2026-03-20T03:15:49Z | 2026-03-20T03:15:49Z |
| suse-su-2026:20759-1 | Security update for vim | 2026-03-20T03:15:49Z | 2026-03-20T03:15:49Z |
| suse-su-2026:20915-1 | Security update for gstreamer-plugins-ugly | 2026-03-19T13:48:27Z | 2026-03-19T13:48:27Z |
| suse-su-2026:20796-1 | Security update for python311 | 2026-03-19T12:47:35Z | 2026-03-19T12:47:35Z |
| suse-su-2026:20795-1 | Security update for dpkg | 2026-03-19T12:23:49Z | 2026-03-19T12:23:49Z |
| suse-su-2026:20794-1 | Security update for sqlite3 | 2026-03-19T12:20:26Z | 2026-03-19T12:20:26Z |
| suse-su-2026:20767-1 | Security update for libssh | 2026-03-19T11:23:34Z | 2026-03-19T11:23:34Z |
| suse-su-2026:20766-1 | Security update for dpkg | 2026-03-19T11:22:45Z | 2026-03-19T11:22:45Z |
| suse-su-2026:0933-1 | Security update for freerdp | 2026-03-19T10:34:05Z | 2026-03-19T10:34:05Z |
| suse-su-2026:0932-1 | Security update for tomcat | 2026-03-19T10:26:49Z | 2026-03-19T10:26:49Z |
| suse-su-2026:20941-1 | Security update for ucode-intel | 2026-03-19T09:31:38Z | 2026-03-19T09:31:38Z |
| suse-su-2026:20758-1 | Security update for ucode-intel | 2026-03-19T09:31:38Z | 2026-03-19T09:31:38Z |
| suse-su-2026:0931-1 | Security update for jq | 2026-03-19T08:23:28Z | 2026-03-19T08:23:28Z |
| suse-su-2026:20912-1 | Security update for keylime | 2026-03-19T08:18:07Z | 2026-03-19T08:18:07Z |
| suse-su-2026:20913-1 | Security update for libsodium | 2026-03-19T08:17:20Z | 2026-03-19T08:17:20Z |
| suse-su-2026:20756-1 | Security update for libsodium | 2026-03-19T08:17:20Z | 2026-03-19T08:17:20Z |
| suse-su-2026:20911-1 | Security update for poppler | 2026-03-19T08:11:56Z | 2026-03-19T08:11:56Z |
| suse-su-2026:20910-1 | Security update for librsvg | 2026-03-19T08:09:57Z | 2026-03-19T08:09:57Z |
| suse-su-2026:20755-1 | Security update for librsvg | 2026-03-19T08:09:57Z | 2026-03-19T08:09:57Z |
| suse-su-2026:0930-1 | Security update for krb5-appl | 2026-03-18T23:08:02Z | 2026-03-18T23:08:02Z |
| suse-su-2026:20907-1 | Security update for protobuf | 2026-03-18T18:11:52Z | 2026-03-18T18:11:52Z |
| suse-su-2026:20753-1 | Security update for protobuf | 2026-03-18T18:11:52Z | 2026-03-18T18:11:52Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:17797 | Moderate: kernel security update | 2025-10-13T00:00:00Z | 2025-10-14T10:15:00Z |
| alsa-2025:17776 | Moderate: kernel security update | 2025-10-13T00:00:00Z | 2025-10-17T09:45:53Z |
| alsa-2025:17760 | Moderate: kernel security update | 2025-10-13T00:00:00Z | 2025-10-16T07:33:20Z |
| alsa-2025:17742 | Moderate: vim security update | 2025-10-13T00:00:00Z | 2025-10-14T13:35:06Z |
| alsa-2025:17715 | Moderate: vim security update | 2025-10-09T00:00:00Z | 2025-10-13T08:30:41Z |
| alsa-2025:17675 | Important: compat-libtiff3 security update | 2025-10-09T00:00:00Z | 2025-10-13T10:06:16Z |
| alsa-2025:17558 | Moderate: iputils security update | 2025-10-08T00:00:00Z | 2025-10-13T08:54:54Z |
| alsa-2025:17509 | Important: open-vm-tools security update | 2025-10-07T00:00:00Z | 2025-10-08T10:29:36Z |
| alsa-2025:17429 | Important: open-vm-tools security update | 2025-10-07T00:00:00Z | 2025-10-08T11:21:49Z |
| alsa-2025:17428 | Important: open-vm-tools security update | 2025-10-07T00:00:00Z | 2025-10-13T08:28:00Z |
| alsa-2025:17415 | Moderate: gnutls security, bug fix, and enhancement update | 2025-10-07T00:00:00Z | 2025-10-08T10:07:51Z |
| alsa-2025:17398 | Moderate: kernel-rt security update | 2025-10-06T00:00:00Z | 2025-10-08T10:05:33Z |
| alsa-2025:17397 | Moderate: kernel security update | 2025-10-06T00:00:00Z | 2025-10-08T10:24:28Z |
| alsa-2025:17396 | Moderate: kernel security update | 2025-10-06T00:00:00Z | 2025-10-09T07:54:11Z |
| alsa-2025:17377 | Moderate: kernel security update | 2025-10-06T00:00:00Z | 2025-10-09T07:42:18Z |
| alsa-2025:17163 | Moderate: perl-JSON-XS security update | 2025-10-01T00:00:00Z | 2025-10-20T12:34:11Z |
| alsa-2025:17162 | Moderate: perl-JSON-XS security update | 2025-10-01T00:00:00Z | 2025-10-20T12:33:11Z |
| alsa-2025:17129 | Important: idm:DL1 security update | 2025-10-01T00:00:00Z | 2025-10-03T08:44:05Z |
| alsa-2025:17119 | Moderate: perl-JSON-XS security update | 2025-09-30T00:00:00Z | 2025-10-01T12:21:59Z |
| alsa-2025:17084 | Important: ipa security update | 2025-09-30T00:00:00Z | 2025-10-22T13:15:47Z |
| alsa-2025:16920 | Moderate: kernel-rt security update | 2025-09-29T00:00:00Z | 2025-10-01T08:47:05Z |
| alsa-2025:16919 | Moderate: kernel security update | 2025-09-29T00:00:00Z | 2025-10-01T09:28:42Z |
| alsa-2025:16904 | Moderate: kernel security update | 2025-09-29T00:00:00Z | 2025-10-03T09:19:26Z |
| alsa-2025:16880 | Moderate: kernel security update | 2025-09-29T00:00:00Z | 2025-10-01T09:18:26Z |
| alsa-2025:16861 | Moderate: mysql:8.0 security update | 2025-09-29T00:00:00Z | 2025-10-01T08:52:50Z |
| alsa-2025:16823 | Moderate: openssh security update | 2025-09-25T00:00:00Z | 2025-10-01T08:38:24Z |
| alsa-2025:16589 | Important: thunderbird security update | 2025-09-24T00:00:00Z | 2025-09-25T15:05:39Z |
| alsa-2025:16441 | Moderate: avahi security update | 2025-09-23T00:00:00Z | 2025-09-29T08:38:23Z |
| alsa-2025:16432 | Moderate: opentelemetry-collector security update | 2025-09-23T00:00:00Z | 2025-09-29T09:41:45Z |
| alsa-2025:16428 | Moderate: libtpms security update | 2025-09-23T00:00:00Z | 2025-09-29T08:40:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-6 | Global-buffer-overflow in void jxl::N_AVX2::WriteToOutputStage::StoreUnsignedRow<unsigned char> | 2024-01-06T00:11:05.929725Z | 2024-03-08T14:19:24.750958Z |
| osv-2024-4 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-01-04T00:13:53.974088Z | 2024-04-01T14:13:38.051217Z |
| osv-2024-3 | Stack-buffer-overflow in icu_75::TZDBTimeZoneNames::getMetaZoneNames | 2024-01-04T00:03:08.480968Z | 2024-04-17T16:20:49.591813Z |
| osv-2023-1382 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-01-01T00:12:36.633204Z | 2024-01-01T00:12:36.633589Z |
| osv-2023-1381 | Heap-buffer-overflow in NetworkInterface::processPacket | 2024-01-01T00:03:49.670656Z | 2024-01-01T00:03:49.671160Z |
| osv-2023-1378 | Heap-buffer-overflow in ih264d_get_bits_h264 | 2023-12-31T00:13:35.510537Z | 2024-04-25T14:13:38.925666Z |
| osv-2023-1375 | Heap-buffer-overflow in IEC104Stats::processPacket | 2023-12-31T00:10:56.069235Z | 2023-12-31T00:10:56.069852Z |
| osv-2023-1373 | Heap-use-after-free in xmlRemoveID | 2023-12-31T00:01:26.816109Z | 2023-12-31T00:01:26.816606Z |
| osv-2023-1372 | Heap-use-after-free in JS_NewObjectFromShape | 2023-12-30T00:04:10.276049Z | 2023-12-30T00:04:10.276482Z |
| osv-2023-1370 | Heap-buffer-overflow in process_one_read | 2023-12-29T00:14:11.001809Z | 2025-01-10T05:09:49.377670Z |
| osv-2023-1365 | Heap-use-after-free in xmlStaticCopyNode | 2023-12-28T00:07:29.258949Z | 2023-12-28T00:07:29.259296Z |
| osv-2023-1364 | Heap-buffer-overflow in processClientServerHello | 2023-12-28T00:01:38.624999Z | 2023-12-28T00:01:38.625414Z |
| osv-2023-1361 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2023-12-27T00:01:27.841254Z | 2023-12-27T00:01:27.841623Z |
| osv-2023-1360 | Heap-buffer-overflow in NetworkInterface::dissectPacket | 2023-12-27T00:00:10.846266Z | 2023-12-27T00:00:10.846829Z |
| osv-2023-1358 | Heap-buffer-overflow in js_free_function_def | 2023-12-26T00:04:18.300258Z | 2023-12-26T00:04:18.300779Z |
| osv-2023-1357 | Heap-buffer-overflow in processClientServerHello | 2023-12-25T00:13:45.414227Z | 2023-12-25T00:13:45.414669Z |
| osv-2023-1356 | Heap-buffer-overflow in rawspeed::DngDecoder::parseWhiteBalance | 2023-12-25T00:10:36.482844Z | 2023-12-25T00:10:36.483166Z |
| osv-2023-1354 | Heap-buffer-overflow in processClientServerHello | 2023-12-25T00:03:08.530303Z | 2023-12-25T00:03:08.530510Z |
| osv-2023-1353 | Security exception in org.apache.poi.ddf.EscherContainerRecord.fillFields | 2023-12-25T00:03:02.003193Z | 2023-12-25T00:03:02.003829Z |
| osv-2023-1352 | Heap-buffer-overflow in Flow::dissectMDNS | 2023-12-24T00:05:23.975196Z | 2023-12-24T00:05:23.975551Z |
| osv-2023-1350 | Heap-buffer-overflow in inflate | 2023-12-23T00:12:38.562149Z | 2026-03-27T14:16:43.884162Z |
| osv-2023-1344 | Heap-buffer-overflow in jv_string_vfmt | 2023-12-22T00:11:40.065456Z | 2025-03-05T14:16:07.938645Z |
| osv-2023-1343 | Heap-buffer-overflow in _libssh2_kex_agree_instr | 2023-12-22T00:10:36.346763Z | 2023-12-22T00:10:36.347283Z |
| osv-2023-1329 | Stack-buffer-overflow in decNaNs | 2023-12-18T00:13:42.545765Z | 2025-02-17T14:14:20.492923Z |
| osv-2023-1328 | Stack-buffer-overflow in icu_75::TZDBTimeZoneNames::getMetaZoneNames | 2023-12-18T00:13:09.643640Z | 2026-03-18T19:49:20.841276Z |
| osv-2023-1327 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2023-12-18T00:10:41.666920Z | 2023-12-18T00:10:41.667465Z |
| osv-2023-1326 | Security exception in java.base/java.lang.reflect.Array.newArray | 2023-12-18T00:05:04.854273Z | 2024-08-27T14:16:42.028102Z |
| osv-2023-1325 | UNKNOWN WRITE in zero | 2023-12-18T00:04:49.365880Z | 2023-12-18T00:04:49.366308Z |
| osv-2023-1324 | Heap-use-after-free in memory_bclose | 2023-12-18T00:03:27.139777Z | 2023-12-18T00:03:27.140220Z |
| osv-2023-1322 | UNKNOWN READ in ih264d_filter_boundary_left_nonmbaff | 2023-12-18T00:01:44.796567Z | 2024-04-29T11:16:39.254259Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2021-0118 | `FixedSizeBinaryArray` does not perform bound checks on accessing values and offsets | 2021-09-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0117 | `DecimalArray` does not perform bound checks on accessing values and offsets | 2021-09-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0116 | `BinaryArray` does not perform bound checks on reading values and offsets | 2021-09-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0154 | Uninitalized memory read & leak caused by fuser crate | 2021-09-10T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2021-0100 | Miscomputed results when using AVX2 backend | 2021-09-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0147 | `daemonize` is Unmaintained | 2021-09-01T12:00:00Z | 2023-04-08T19:49:55Z |
| rustsec-2021-0099 | Crate has been renamed to `cosmrs` | 2021-08-25T12:00:00Z | 2021-08-25T14:54:10Z |
| rustsec-2021-0098 | Read buffer overruns processing ASN.1 strings | 2021-08-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0097 | SM2 Decryption Buffer Overflow | 2021-08-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0139 | ansi_term is Unmaintained | 2021-08-18T12:00:00Z | 2023-09-06T22:52:31Z |
| rustsec-2021-0096 | spirv_headers is unmaintained, use spirv instead | 2021-08-16T12:00:00Z | 2021-08-23T14:34:15Z |
| rustsec-2021-0127 | serde_cbor is unmaintained | 2021-08-15T12:00:00Z | 2021-12-01T14:04:55Z |
| rustsec-2021-0082 | vec-const attempts to construct a Vec from a pointer to a const slice | 2021-08-14T12:00:00Z | 2025-12-17T17:06:41Z |
| rustsec-2021-0103 | Partial read is incorrect in molecule | 2021-07-30T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0093 | Data race in crossbeam-deque | 2021-07-30T12:00:00Z | 2021-10-19T22:14:35Z |
| rustsec-2021-0109 | Process crashes when the cell used as DepGroup is not alive | 2021-07-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0108 | Remote memory exhaustion in ckb | 2021-07-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0107 | Miner fails to get block template when a cell used as a cell dep has been destroyed. | 2021-07-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0077 | `better-macro` has deliberate RCE to prove a point | 2021-07-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0080 | Links in archive can create arbitrary directories | 2021-07-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0106 | Uncontrolled Search Path Element in sharkdp/bat | 2021-07-15T12:00:00Z | 2021-09-10T16:11:09Z |
| rustsec-2021-0076 | libsecp256k1 allows overflowing signatures | 2021-07-13T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0105 | Relative Path Traversal in git-delta | 2021-07-12T12:00:00Z | 2021-09-10T16:04:49Z |
| rustsec-2021-0075 | Flaw in `FieldVar::mul_by_inverse` allows unsound R1CS constraint systems | 2021-07-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0074 | Incorrect handling of embedded SVG and MathML leads to mutation XSS | 2021-07-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0073 | Conversion from `prost_types::Timestamp` to `SystemTime` can cause an overflow and panic | 2021-07-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0079 | Integer overflow in `hyper`'s parsing of the `Transfer-Encoding` header leads to data loss | 2021-07-07T12:00:00Z | 2021-10-19T22:14:35Z |
| rustsec-2021-0078 | Lenient `hyper` header parsing of `Content-Length` could allow request smuggling | 2021-07-07T12:00:00Z | 2021-10-19T22:14:35Z |
| rustsec-2021-0072 | Task dropped in wrong thread when aborting `LocalSet` task | 2021-07-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0145 | Potential unaligned read | 2021-07-04T12:00:00Z | 2023-07-08T12:30:19Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-pebble-2024-3250 | 2026-01-02T17:44:20.392Z | 2026-01-02T18:06:33.396Z | |
| bit-gitea-2025-68946 | 2026-01-01T11:37:50.117Z | 2026-01-01T12:06:33.381Z | |
| bit-gitea-2025-68945 | 2026-01-01T11:37:48.522Z | 2026-01-01T12:06:33.381Z | |
| bit-gitea-2025-68944 | 2026-01-01T11:37:47.146Z | 2026-01-01T12:06:33.381Z | |
| bit-gitea-2025-68943 | 2026-01-01T11:37:45.731Z | 2026-01-01T12:06:33.381Z | |
| bit-nifi-2025-66524 | Apache NiFi: Deserialization of Untrusted Data in GetAsanaObject Processor | 2025-12-23T11:44:08.985Z | 2025-12-23T12:07:14.245Z |
| bit-kibana-2025-68422 | Kibana Improper Authorization | 2025-12-20T11:39:27.247Z | 2025-12-20T12:06:39.262Z |
| bit-kibana-2025-68389 | Kibana Allocation of Resources Without Limits or Throttling | 2025-12-20T11:39:25.644Z | 2025-12-20T12:06:39.262Z |
| bit-kibana-2025-68387 | Kibana Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | 2025-12-20T11:39:24.143Z | 2025-12-20T12:06:39.262Z |
| bit-kibana-2025-68386 | Kibana Improper Authorization | 2025-12-20T11:39:22.798Z | 2025-12-20T12:06:39.262Z |
| bit-kibana-2025-68385 | Kibana Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | 2025-12-20T11:39:21.164Z | 2025-12-24T12:08:49.467Z |
| bit-haproxy-2025-11230 | Denial of service vulnerability in HAProxy mjson library | 2025-12-20T11:38:08.173Z | 2025-12-20T12:06:39.262Z |
| bit-elk-2025-68422 | Kibana Improper Authorization | 2025-12-20T11:36:41.895Z | 2025-12-20T12:06:39.262Z |
| bit-elk-2025-68389 | Kibana Allocation of Resources Without Limits or Throttling | 2025-12-20T11:36:40.368Z | 2025-12-20T12:06:39.262Z |
| bit-elk-2025-68387 | Kibana Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | 2025-12-20T11:36:38.841Z | 2025-12-20T12:06:39.262Z |
| bit-elk-2025-68386 | Kibana Improper Authorization | 2025-12-20T11:36:37.419Z | 2025-12-20T12:06:39.262Z |
| bit-elasticsearch-2025-68390 | Elasticsearch Allocation of Resources Without Limits or Throttling | 2025-12-20T11:36:36.080Z | 2025-12-20T12:06:39.262Z |
| bit-elk-2025-68385 | Kibana Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | 2025-12-20T11:36:36.041Z | 2025-12-24T12:08:49.467Z |
| bit-elasticsearch-2025-68384 | Elasticsearch Allocation of Resources Without Limits or Throttling | 2025-12-20T11:36:34.496Z | 2025-12-20T12:06:39.262Z |
| bit-mongodb-2025-14847 | Zlib compressed protocol header length confusion may allow memory read | 2025-12-19T11:15:49.277Z | 2025-12-30T00:15:51.160Z |
| bit-gitlab-2025-8405 | Improper Encoding or Escaping of Output in GitLab | 2025-12-18T12:06:48.009Z | 2025-12-18T12:08:20.703Z |
| bit-gitlab-2025-4097 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-12-18T12:05:44.981Z | 2025-12-18T12:08:20.703Z |
| bit-gitlab-2025-14157 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-12-18T12:04:46.334Z | 2025-12-18T12:08:20.703Z |
| bit-gitlab-2025-13978 | Generation of Error Message Containing Sensitive Information in GitLab | 2025-12-18T12:04:44.454Z | 2025-12-18T12:08:20.703Z |
| bit-gitlab-2025-12734 | Improper Encoding or Escaping of Output in GitLab | 2025-12-18T12:04:35.112Z | 2025-12-18T12:08:20.703Z |
| bit-gitlab-2025-12716 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2025-12-18T12:04:33.134Z | 2025-12-18T12:08:20.703Z |
| bit-gitlab-2025-12562 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-12-18T12:04:25.675Z | 2025-12-18T12:08:20.703Z |
| bit-gitlab-2025-12029 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2025-12-18T12:04:20.332Z | 2025-12-18T12:08:20.703Z |
| bit-gitlab-2025-11984 | Authentication Bypass Using an Alternate Path or Channel in GitLab | 2025-12-18T12:04:14.698Z | 2025-12-18T12:08:20.703Z |
| bit-gitlab-2025-11247 | Authorization Bypass Through User-Controlled Key in GitLab | 2025-12-18T12:03:59.823Z | 2025-12-18T12:08:20.703Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ni96678 | Within HostnameError | 2026-01-30T15:06:52.947220Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ib05679 | Within HostnameError | 2026-01-30T15:06:23.436295Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kk41938 | Within HostnameError | 2026-01-30T15:06:23.375949Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jx43631 | Within HostnameError | 2026-01-30T15:06:23.337190Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sh75345 | Cancelling a query (e | 2026-01-30T15:05:23.442396Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bh03809 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:04:53.009971Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vl83369 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:53.758258Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rj88561 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:53.732429Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-lp38773 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:53.100242Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uj17204 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:52.998379Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pi00621 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:52.974587Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-py88758 | Cancelling a query (e | 2026-01-30T15:02:53.130919Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hw39798 | Cancelling a query (e | 2026-01-30T15:02:52.970576Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fd27182 | Cancelling a query (e | 2026-01-30T15:02:52.949683Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hu01783 | Cancelling a query (e | 2026-01-30T15:02:52.911074Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-co80279 | Within HostnameError | 2026-01-30T15:02:52.896368Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ti76190 | Cancelling a query (e | 2026-01-30T15:02:23.296683Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-di91874 | Cancelling a query (e | 2026-01-30T15:02:23.274144Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vc16841 | Within HostnameError | 2026-01-30T15:02:22.944744Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sq13072 | Moby is an open source container framework developed by Docker Inc | 2026-01-30T15:02:22.907312Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kq33111 | Cancelling a query (e | 2026-01-30T15:02:22.834896Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rl45001 | tar | 2026-01-30T15:01:22.967754Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ys66739 | Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3 | 2026-01-30T15:00:53.250874Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oo42606 | Cancelling a query (e | 2026-01-30T15:00:52.876848Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xs24366 | Cancelling a query (e | 2026-01-30T15:00:52.862887Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bj28314 | Within HostnameError | 2026-01-30T15:00:22.906070Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pd17156 | Cancelling a query (e | 2026-01-30T15:00:22.872625Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bj35875 | tar | 2026-01-30T14:59:52.925710Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yj61997 | Cancelling a query (e | 2026-01-30T14:59:52.788649Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nd19988 | Cancelling a query (e | 2026-01-30T14:59:22.824513Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0962 | Vulnérabilité dans Dovecot | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| certfr-2025-avi-0961 | Multiples vulnérabilités dans les produits Apple | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| certfr-2025-avi-0960 | Multiples vulnérabilités dans VMware Tanzu | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| certfr-2025-avi-0959 | Vulnérabilité dans Python | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| certfr-2025-avi-0958 | Multiples vulnérabilités dans Tenable Identity Exposure | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| certfr-2025-avi-0957 | Multiples vulnérabilités dans Moodle | 2025-11-03T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| certfr-2025-avi-0956 | Multiples vulnérabilités dans MariaDB | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| certfr-2025-avi-0955 | Multiples vulnérabilités dans Microsoft Edge | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| certfr-2025-avi-0954 | Multiples vulnérabilités dans Liferay | 2025-11-03T00:00:00.000000 | 2025-11-14T00:00:00.000000 |
| certfr-2025-avi-0953 | Vulnérabilité dans Elastic Cloud Enterprise | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| certfr-2025-avi-0952 | Vulnérabilité dans Mattermost Server | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| certfr-2025-avi-0951 | Multiples vulnérabilités dans Axis OS | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| certfr-2025-avi-0950 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| certfr-2025-avi-0949 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| certfr-2025-avi-0948 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| certfr-2025-avi-0947 | Multiples vulnérabilités dans les produits IBM | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| certfr-2025-avi-0946 | Vulnérabilité dans Sonicwall Secure Mobile Access | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| certfr-2025-avi-0945 | Vulnérabilité dans Qnap NetBak PC Agent | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| certfr-2025-avi-0944 | Vulnérabilité dans Liferay | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| certfr-2025-avi-0943 | Multiples vulnérabilités dans les produits Centreon | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| certfr-2025-avi-0942 | Vulnérabilité dans Dovecot | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| certfr-2025-avi-0941 | Multiples vulnérabilités dans les produits Microsoft | 2025-10-30T00:00:00.000000 | 2025-10-30T00:00:00.000000 |
| certfr-2025-avi-0940 | Vulnérabilité dans Liferay | 2025-10-30T00:00:00.000000 | 2025-10-30T00:00:00.000000 |
| certfr-2025-avi-0939 | Multiples vulnérabilités dans les produits Splunk | 2025-10-30T00:00:00.000000 | 2025-10-30T00:00:00.000000 |
| certfr-2025-avi-0938 | Multiples vulnérabilités dans les produits VMware | 2025-10-30T00:00:00.000000 | 2025-10-30T00:00:00.000000 |
| certfr-2025-avi-0937 | Multiples vulnérabilités dans Google Chrome | 2025-10-30T00:00:00.000000 | 2025-10-30T00:00:00.000000 |
| certfr-2025-avi-0936 | Multiples vulnérabilités dans Mattermost Server | 2025-10-29T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-0935 | Multiples vulnérabilités dans les produits VMware | 2025-10-29T00:00:00.000000 | 2025-10-29T00:00:00.000000 |
| certfr-2025-avi-0934 | Vulnérabilité dans les produits Mozilla | 2025-10-29T00:00:00.000000 | 2025-10-29T00:00:00.000000 |
| certfr-2025-avi-0933 | Multiples vulnérabilités dans Apache Tomcat | 2025-10-28T00:00:00.000000 | 2025-10-28T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2023-000023 | Multiple vulnerabilities in PostgreSQL extension module pg_ivm | 2023-03-06T15:22+09:00 | 2024-06-10T16:41+09:00 |
| jvndb-2023-001291 | Multiple vulnerabilities in Trend Micro Maximum Security | 2023-03-03T11:10+09:00 | 2024-06-13T17:06+09:00 |
| jvndb-2023-001292 | Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service | 2023-03-02T17:33+09:00 | 2024-06-07T16:59+09:00 |
| jvndb-2023-001269 | File and Directory Permissions Vulnerability in Hitachi Automation Director, Hitachi Infrastructure Analytics Advisor, Hitachi Ops Center | 2023-03-01T16:59+09:00 | 2024-06-11T16:42+09:00 |
| jvndb-2023-000021 | Multiple vulnerabilities in SS1 and Rakuraku PC Cloud | 2023-03-01T15:57+09:00 | 2024-06-06T18:02+09:00 |
| jvndb-2023-000019 | Multiple cross-site scripting vulnerabilities in EC-CUBE | 2023-02-28T16:38+09:00 | 2024-06-10T17:28+09:00 |
| jvndb-2023-000020 | web2py development tool vulnerable to open redirect | 2023-02-28T15:00+09:00 | 2024-06-07T16:31+09:00 |
| jvndb-2023-000018 | Multiple cross-site scripting vulnerabilities in SHIRASAGI | 2023-02-22T15:16+09:00 | 2024-06-10T17:18+09:00 |
| jvndb-2023-000017 | Improper restriction of XML external entity reference (XXE) vulnerability in tsClinical Define.xml Generator and tsClinical Metadata Desktop Tools | 2023-02-14T17:00+09:00 | 2024-06-12T11:15+09:00 |
| jvndb-2023-000016 | The installers of ELECOM Camera Assistant and QuickFileDealer may insecurely load Dynamic Link Libraries | 2023-02-14T17:00+09:00 | 2023-02-14T17:00+09:00 |
| jvndb-2023-000015 | Multiple vulnerabilities in PLANEX COMMUNICATIONS Network Camera CS-WMV02G | 2023-02-13T14:48+09:00 | 2024-06-12T17:03+09:00 |
| jvndb-2023-001215 | Zuken Elmic KASAGO uses insufficient random values for TCP Initial Sequence Numbers | 2023-02-13T14:18+09:00 | 2024-06-14T15:45+09:00 |
| jvndb-2023-000014 | NEC PC Settings Tool vulnerable to missing authentication for critical function | 2023-02-10T14:43+09:00 | 2024-06-10T18:13+09:00 |
| jvndb-2023-001212 | Multiple vulnerabilities in JTEKT ELECTRONICS Screen Creator Advance 2 | 2023-02-08T12:46+09:00 | 2024-06-10T17:25+09:00 |
| jvndb-2023-000013 | Ichiran App vulnerable to improper server certificate verification | 2023-02-06T14:31+09:00 | 2024-06-12T14:25+09:00 |
| jvndb-2023-000012 | Vulnerability in Driver Distributor where passwords are stored in a recoverable format | 2023-01-31T14:14+09:00 | 2024-06-12T11:07+09:00 |
| jvndb-2023-000011 | SUSHIRO App for Android outputs sensitive information to the log file | 2023-01-31T14:10+09:00 | 2024-06-11T17:35+09:00 |
| jvndb-2023-001110 | Improper restriction of XML external entity reference (XXE) vulnerability in OMRON CX-Motion Pro | 2023-01-25T14:28+09:00 | 2023-01-25T14:28+09:00 |
| jvndb-2023-000010 | pgAdmin 4 vulnerable to directory traversal | 2023-01-24T16:00+09:00 | 2024-06-05T16:22+09:00 |
| jvndb-2023-000009 | EasyMail vulnerable to cross-site scripting | 2023-01-24T16:00+09:00 | 2023-01-24T16:00+09:00 |
| jvndb-2023-001108 | Contec CONPROSYS HMI System (CHS) vulnerable to multiple SQL injections | 2023-01-24T13:38+09:00 | 2023-01-24T13:38+09:00 |
| jvndb-2023-000008 | Pgpool-II vulnerable to information disclosure | 2023-01-23T16:35+09:00 | 2024-06-20T17:54+09:00 |
| jvndb-2023-001008 | File and Directory Permissions Vulnerability in Hitachi Tuning Manager | 2023-01-18T13:51+09:00 | 2023-01-18T13:51+09:00 |
| jvndb-2023-000007 | WordPress plugin "Welcart e-Commerce" vulnerable to directory traversal | 2023-01-17T14:17+09:00 | 2023-01-17T14:17+09:00 |
| jvndb-2023-001005 | Active debug code vulnerability in OMRON CP1L-EL20DR-D | 2023-01-12T15:53+09:00 | 2023-01-12T15:53+09:00 |
| jvndb-2023-001003 | Access of uninitialized pointer vulnerability in OMRON CX-Motion-MCH | 2023-01-12T15:06+09:00 | 2023-01-12T15:06+09:00 |
| jvndb-2023-000006 | Multiple vulnerabilities in PIXELA PIX-RT100 | 2023-01-12T14:50+09:00 | 2023-01-12T14:50+09:00 |
| jvndb-2023-001002 | OpenAM Web Policy Agent (OpenAM Consortium Edition) vulnerable to path traversal | 2023-01-11T17:07+09:00 | 2023-01-11T17:07+09:00 |
| jvndb-2023-000005 | Multiple vulnerabilities in MAHO-PBX NetDevancer series | 2023-01-11T16:11+09:00 | 2023-01-11T16:11+09:00 |
| jvndb-2023-000003 | TP-Link SG105PE vulnerable to authentication bypass | 2023-01-11T15:04+09:00 | 2023-01-11T15:04+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-13408 | OpenClaw访问控制错误漏洞(CNVD-2026-13408) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13400 | OpenClaw服务端请求伪造漏洞 | 2026-03-02 | 2026-03-11 |
| cnvd-2026-13392 | OpenClaw访问控制错误漏洞(CNVD-2026-13392) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13391 | OpenClaw访问控制错误漏洞 | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13390 | OpenClaw代码注入漏洞 | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13389 | OpenClaw存在未明漏洞(CNVD-2026-13389) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13388 | OpenClaw代码问题漏洞(CNVD-2026-13388) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13383 | OpenClaw存在未明漏洞(CNVD-2026-13383) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13382 | OpenClaw存在未明漏洞(CNVD-2026-13382) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13381 | OpenClaw存在未明漏洞(CNVD-2026-13381) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13380 | OpenClaw存在未明漏洞(CNVD-2026-13380) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13379 | OpenClaw存在未明漏洞(CNVD-2026-13379) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13378 | OpenClaw存在未明漏洞(CNVD-2026-13378) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13377 | OpenClaw存在未明漏洞(CNVD-2026-13377) | 2026-03-02 | 2026-03-13 |
| cnvd-2026-13376 | OpenClaw存在未明漏洞(CNVD-2026-13376) | 2026-03-02 | 2026-03-12 |
| cnvd-2026-13375 | OpenClaw存在未明漏洞(CNVD-2026-13375) | 2026-03-02 | 2026-03-12 |
| cnvd-2026-13374 | OpenClaw资源管理错误漏洞(CNVD-2026-13374) | 2026-03-02 | 2026-03-12 |
| cnvd-2026-13373 | OpenClaw操作系统命令注入漏洞(CNVD-2026-13373) | 2026-03-02 | 2026-03-12 |
| cnvd-2026-13372 | OpenClaw操作系统命令注入漏洞(CNVD-2026-13372) | 2026-03-02 | 2026-03-12 |
| cnvd-2026-13295 | OpenClaw路径遍历漏洞 | 2026-03-02 | 2026-03-11 |
| cnvd-2026-13294 | OpenClaw代码问题漏洞 | 2026-03-02 | 2026-03-11 |
| cnvd-2026-13292 | OpenClaw命令注入漏洞 | 2026-03-02 | 2026-03-11 |
| cnvd-2026-12892 | Apache Shiro身份验证绕过漏洞 | 2026-03-02 | 2026-03-04 |
| cnvd-2026-12770 | WordPress插件Web Accessibility by accessiBe信息泄露漏洞 | 2026-03-02 | 2026-03-06 |
| cnvd-2026-12769 | WordPress插件Simple Ajax Chat信息泄露漏洞 | 2026-03-02 | 2026-03-06 |
| cnvd-2026-12768 | WordPress插件Context Blog信息泄露漏洞 | 2026-03-02 | 2026-03-06 |
| cnvd-2026-12767 | D-Link DWR-M960 formDdns文件缓冲区溢出漏洞 | 2026-03-02 | 2026-03-06 |
| cnvd-2026-12763 | Google Chrome缓冲区溢出漏洞(CNVD-2026-12763) | 2026-03-02 | 2026-03-06 |
| cnvd-2026-12702 | Adobe After Effects存在内存释放后使用漏洞 | 2026-03-02 | 2026-03-04 |
| cnvd-2026-12701 | Adobe After Effects存在二进制漏洞 | 2026-03-02 | 2026-03-04 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01006 | Уязвимость компонента Brookstrut Sample App образцовых приложений для демонстрации функци… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01005 | Уязвимость компонента Java VM системы управления базами данных Oracle Database Server, по… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01004 | Уязвимость компонента SQLcl системы управления базами данных Oracle Database Server, позв… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01003 | Уязвимость компонента General масштабируемого фреймворка для создания и развёртывания при… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01002 | Уязвимость компонента Platform инструмента для разработки клинических исследований Oracle… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01001 | Уязвимость подкомпонента Core компонента Oracle Configurator системы автоматизации деятел… | 30.01.2026 | 30.01.2026 |
| bdu:2026-01000 | Уязвимость компонента Scripting Admin программного средства для создания и обработки сцен… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00999 | Уязвимость безопасности системы для защиты баз данных Oracle Zero Data Loss Recovery Appl… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00998 | Уязвимость компонента Workflow Loader системы для управления бизнес-процессами Oracle Wor… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00997 | Уязвимость компонента Relationship Pricing системы банковского обслуживания Oracle FLEXCU… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00996 | Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Ser… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00995 | Уязвимость компонента Product Quality Management приложения Oracle Agile Product Lifecycl… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00994 | Уязвимость компонента Integration Broker пакета бизнес-приложений Oracle PeopleSoft Enter… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00993 | Уязвимость метода getInformation класса FortEquipmentNodeController системы управления ИТ… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00992 | Уязвимость метода portValidate класса IpOrPortController системы управления ИТ-инфраструк… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00991 | Уязвимость компонентов Company Dir / Org Chart Viewer, Employee Snapshot платформы для уп… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00990 | Уязвимость программной платформы на базе git для совместной работы над кодом GitLab, связ… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00989 | Уязвимость конфигурации программной платформы на базе git для совместной работы над кодом… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00988 | Уязвимость компонента canonical/get-workflow-version-action платформы для автоматизации р… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00987 | Уязвимость программной платформы комплексного сетевого управления D-Link D-View, связанна… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00986 | Уязвимость компонента File Name Handler антивирусного программного обеспечения Comodo Int… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00985 | Уязвимость компонента Update Handler антивирусного программного обеспечения Comodo Intern… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00984 | Уязвимость функции safe_extract() платформы машинного обучения ClearML, позволяющая наруш… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00983 | Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая наруши… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00982 | Уязвимость программной платформы на базе git для совместной работы над кодом GitLab CE/EE… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00981 | Уязвимость веб-инструмента администрирования СУБД PostgreSQL phpPgAdmin, связанная с непр… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00980 | Уязвимость программной платформы комплексного сетевого управления D-Link D-View, связанна… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00979 | Уязвимость программной платформы на базе git для совместной работы над кодом GitLab CE/EE… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00978 | Уязвимость поля субтитров событий календаря виртуальной обучающей среды Moodle, позволяющ… | 30.01.2026 | 30.01.2026 |
| bdu:2026-00977 | Уязвимость компонента Filesystems системы хранения данных Oracle ZFS Storage Appliance Ki… | 30.01.2026 | 30.01.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202109-1330 | A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6,… | 2026-04-10T21:43:40.834000Z |
| var-200703-0026 | The SSH key generation process in OpenSSH in Apple Mac OS X 10.3.9 and 10.4 through 10.4.… | 2026-04-10T21:43:10.061000Z |
| var-201203-0200 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2026-04-10T21:43:09.962000Z |
| var-201404-0378 | Unspecified vulnerability in Oracle Java SE 5.0u61, SE 6u71, 7u51, and 8; JRockit R27.8.1… | 2026-04-10T21:42:31.784000Z |
| var-200806-0575 | SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and … | 2026-04-10T21:42:31.704000Z |
| var-200805-0585 | OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the… | 2026-04-10T21:42:00.646000Z |
| var-201110-0451 | The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d i… | 2026-04-10T21:41:29.989000Z |
| var-200702-0382 | Format string vulnerability in iMovie HD 6.0.3, and Safari in Apple Mac OS X 10.4 through… | 2026-04-10T21:41:27.998000Z |
| var-201609-0595 | The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly … | 2026-04-10T21:41:26.281000Z |
| var-201606-0135 | The XML parser in Expat does not use sufficient entropy for hash initialization, which al… | 2026-04-10T21:40:47.435000Z |
| var-201912-0603 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-04-10T21:40:46.123000Z |
| var-200906-0618 | Multiple integer overflows in Xpdf 2.x and 3.x and Poppler 0.x, as used in the pdftops fi… | 2026-04-10T21:40:15.433000Z |
| var-202603-1017 | A vulnerability was determined in Tenda FH451 1.0.0.9. Affected is the function sub_3C434… | 2026-03-09T23:54:57.504000Z |
| var-202603-0913 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affecte… | 2026-03-09T23:53:52.758000Z |
| var-202509-3918 | An issue was discovered in DIR-823 firmware 20250416. There is an RCE vulnerability in th… | 2026-03-09T23:52:25.566000Z |
| var-202603-0527 | Nokia IMPACT through 19.11.2.10-20210118042150283 allows an authenticated user to perform… | 2026-03-09T23:51:31.837000Z |
| var-202603-0907 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affecte… | 2026-03-09T23:51:31.712000Z |
| var-202603-0928 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affecte… | 2026-03-09T23:51:31.700000Z |
| var-202603-0854 | The Applications component of Nokia IMPACT version through 19.11.2.10-20210118042150283 a… | 2026-03-09T23:50:02.265000Z |
| var-202603-0956 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affecte… | 2026-03-09T23:49:39.350000Z |
| var-202601-4617 | FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, do… | 2026-03-09T23:47:50.003000Z |
| var-202602-4602 | A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manag… | 2026-03-09T23:47:49.683000Z |
| var-202603-0595 | The Applications component of Nokia IMPACT version through 19.11.2.10-20210118042150283 a… | 2026-03-09T23:47:49.548000Z |
| var-202603-0936 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affecte… | 2026-03-09T23:47:24.755000Z |
| var-202602-4478 | A vulnerability in Cisco Catalyst SD-WAN Manager could allow an authenticated, local atta… | 2026-03-09T23:46:19.733000Z |
| var-202603-0912 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affecte… | 2026-03-09T23:44:44.895000Z |
| var-202602-4354 | A vulnerability in Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote a… | 2026-03-09T23:41:43.191000Z |
| var-202603-0926 | This vulnerability allows network-adjacent attackers to bypass authentication on affected… | 2026-03-09T23:41:42.948000Z |
| var-202601-4765 | FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, ex… | 2026-03-09T23:40:28.326000Z |
| var-202602-3835 | A vulnerability in the API user authentication of Cisco Catalyst SD-WAN Manager could all… | 2026-03-09T23:40:28.093000Z |