Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-41329 |
9 (4.0)
9.9 (3.1)
|
OpenClaw < 2026.3.31 - Sandbox Bypass via Heartbeat Co… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:16.222Z | 2026-04-21T19:38:16.140Z |
| CVE-2026-41303 |
8.7 (4.0)
8.8 (3.1)
|
OpenClaw < 2026.3.28 - Authorization Bypass in Discord… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:15.511Z | 2026-04-21T13:35:55.924Z |
| CVE-2026-41302 |
4.8 (4.0)
7.6 (3.1)
|
OpenClaw < 2026.3.31 - Server-Side Request Forgery via… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:14.782Z | 2026-04-21T19:49:35.930Z |
| CVE-2026-41301 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw 2026.3.22 < 2026.3.31 - Forged Nostr DM Pairi… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:14.023Z | 2026-04-21T13:33:53.554Z |
| CVE-2026-41300 |
6.9 (4.0)
6.5 (3.1)
|
OpenClaw < 2026.3.31 - Attacker-Discovered Endpoint Pr… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:13.304Z | 2026-04-21T13:03:24.309Z |
| CVE-2026-41299 |
7.1 (4.0)
7.1 (3.1)
|
OpenClaw < 2026.3.28 - Client Identity Spoofing in cha… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:12.586Z | 2026-04-21T13:38:25.512Z |
| CVE-2026-41298 |
5.3 (4.0)
5.4 (3.1)
|
OpenClaw < 2026.4.2 - Authorization Bypass in Session … |
OpenClaw |
OpenClaw |
2026-04-20T23:08:11.787Z | 2026-04-21T17:34:23.419Z |
| CVE-2026-41297 |
4.8 (4.0)
7.6 (3.1)
|
OpenClaw < 2026.3.31 - Server-Side Request Forgery via… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:10.955Z | 2026-04-21T13:41:34.057Z |
| CVE-2026-41296 |
8.8 (4.0)
8.2 (3.1)
|
OpenClaw < 2026.3.31 - Sandbox Escape via TOCTOU Race … |
OpenClaw |
OpenClaw |
2026-04-20T23:08:10.194Z | 2026-04-21T19:49:41.570Z |
| CVE-2026-41295 |
8.5 (4.0)
7.8 (3.1)
|
OpenClaw < 2026.4.2 - Untrusted Workspace Channel Shad… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:09.503Z | 2026-04-21T13:35:47.883Z |
| CVE-2026-41294 |
8.5 (4.0)
8.6 (3.1)
|
OpenClaw < 2026.3.28 - Environment Variable Injection … |
OpenClaw |
OpenClaw |
2026-04-20T23:08:08.795Z | 2026-04-21T13:04:36.188Z |
| CVE-2026-40045 |
5.9 (4.0)
5.7 (3.1)
|
OpenClaw < 2026.4.2 - Cleartext Credential Transmissio… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:07.952Z | 2026-04-21T13:37:43.951Z |
| CVE-2026-34082 |
5.3 (4.0)
|
Dify has IDOR in deleting someone else's chat conversation |
langgenius |
dify |
2026-04-20T23:03:18.158Z | 2026-04-21T13:36:45.614Z |
| CVE-2026-5721 |
4.7 (3.1)
|
wpDataTables – WordPress Data Table, Dynamic Tables & … |
wpdatatables |
wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin |
2026-04-20T22:25:26.695Z | 2026-04-21T19:49:47.411Z |
| CVE-2026-6729 |
5.3 (4.0)
6.3 (3.1)
|
HKUDS OpenHarness Session Key Collision Privilege Escalation |
HKUDS |
OpenHarness |
2026-04-20T22:01:38.766Z | 2026-04-21T17:39:32.967Z |
| CVE-2026-0930 |
2.3 (4.0)
|
Potential wolfSSHd Buffer out-of-bounds Read on Window… |
wolfSSL |
wolfSSH |
2026-04-20T21:28:33.227Z | 2026-04-21T13:37:15.647Z |
| CVE-2026-22051 |
2.3 (4.0)
|
StorageGRID (formerly StorageGRID Webscale) versi… |
NETAPP |
StorageGRID (formerly StorageGRID Webscale) |
2026-04-20T21:27:36.822Z | 2026-04-21T13:40:46.948Z |
| CVE-2026-5450 |
9.8 (3.1)
|
scanf %mc off-by-one heap buffer overflow |
The GNU C Library |
glibc |
2026-04-20T20:55:41.170Z | 2026-04-21T19:49:53.221Z |
| CVE-2026-5928 |
7.5 (3.1)
|
Static buffer overflow in deprecated nis_local_principal |
The GNU C Library |
glibc |
2026-04-20T20:37:31.743Z | 2026-04-21T19:49:59.071Z |
| CVE-2026-5358 |
N/A
|
REJECTED: CVE-2026-5358 is rejected for two reasons. Firstly it has been discovered that no NIS+ client or server was ever released for any Linux-based OS distributions and as such this makes the API provisional and unused. Secondly it has been discovered that the NIS+ cold start cache (/var/nis/NIS_COLD_START) cannot be bypassed and as such the API can only be called with a trusted server from the pre-populated cache. The use of a trusted server means no trust boundary is crossed and this is therefore considered a normal bug. | N/A | N/A | 2026-04-20T20:37:23.178Z | 2026-04-22T13:04:20.656Z |
| CVE-2026-33626 |
7.5 (3.1)
|
LMDeploy Vulnerable to Server-Side Request Forgery (SS… |
InternLM |
lmdeploy |
2026-04-20T20:29:19.558Z | 2026-04-21T19:50:13.326Z |
| CVE-2026-4852 |
6.4 (3.1)
|
Image Source Control Lite – Show Image Credits and Cap… |
webzunft |
Image Source Control Lite – Show Image Credits and Captions |
2026-04-20T20:26:53.256Z | 2026-04-21T13:53:14.507Z |
| CVE-2026-33432 |
7.7 (4.0)
|
Roxy-WI has Pre-Authentication LDAP Injection that Lea… |
roxy-wi |
roxy-wi |
2026-04-20T20:26:52.217Z | 2026-04-21T17:38:09.523Z |
| CVE-2026-33431 |
5.7 (4.0)
|
Roxy-WI Vulnerable to Authenticated Arbitrary File Rea… |
roxy-wi |
roxy-wi |
2026-04-20T20:24:15.319Z | 2026-04-21T13:42:19.802Z |
| CVE-2026-34403 |
5.5 (4.0)
|
Nginx-UI vulnerable to Cross-Site WebSocket Hijacking … |
0xJacky |
nginx-ui |
2026-04-20T20:16:47.597Z | 2026-04-21T13:36:46.510Z |
| CVE-2026-33031 |
8.6 (4.0)
|
Nginx-UI: Disabled users retain full API access throug… |
0xJacky |
nginx-ui |
2026-04-20T20:12:07.905Z | 2026-04-21T13:35:20.144Z |
| CVE-2026-32613 |
10 (3.1)
|
Spinnaker vulnerable to RCE via expression parsing due… |
spinnaker |
spinnaker |
2026-04-20T20:07:24.697Z | 2026-04-22T03:56:18.686Z |
| CVE-2026-32604 |
10 (3.1)
|
Spinnaker vulnerable to RCE when using gitrepo artifac… |
spinnaker |
spinnaker |
2026-04-20T20:00:57.517Z | 2026-04-22T03:56:17.486Z |
| CVE-2026-6249 |
8.7 (4.0)
8.8 (3.1)
|
Vvveb CMS 1.0.8 Remote Code Execution via Media Upload |
Vvveb |
Vvveb CMS |
2026-04-20T19:57:37.655Z | 2026-04-21T13:43:17.635Z |
| CVE-2026-32311 |
9.3 (4.0)
|
Command Injection and Docker container escape allows r… |
reconurge |
flowsint |
2026-04-20T19:56:32.521Z | 2026-04-21T13:44:08.776Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-39386 |
8.8 (3.1)
|
Neko has Self-service Privilege Escalation for Authent… |
m1k1o |
neko |
2026-04-21T00:50:34.656Z | 2026-04-22T03:56:19.795Z |
| CVE-2026-39378 |
6.5 (3.1)
|
nbconvert has an Arbitrary File Read via Path Traversa… |
jupyter |
nbconvert |
2026-04-21T00:17:00.684Z | 2026-04-21T13:43:29.081Z |
| CVE-2026-39377 |
6.5 (3.1)
|
nbconvert has an Arbitrary File Write via Path Travers… |
jupyter |
nbconvert |
2026-04-21T00:14:59.937Z | 2026-04-21T19:49:24.475Z |
| CVE-2026-39320 |
7.5 (3.1)
|
Signal K Server has an Unauthenticated Regular Express… |
SignalK |
signalk-server |
2026-04-21T00:07:10.371Z | 2026-04-21T19:36:54.787Z |
| CVE-2026-41331 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.3.31 - Resource Consumption via Unauth… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:17.653Z | 2026-04-21T20:27:46.881Z |
| CVE-2026-41330 |
2 (4.0)
4.4 (3.1)
|
OpenClaw < 2026.3.31 - Environment Variable Override v… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:16.941Z | 2026-04-21T13:39:27.598Z |
| CVE-2026-41329 |
9 (4.0)
9.9 (3.1)
|
OpenClaw < 2026.3.31 - Sandbox Bypass via Heartbeat Co… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:16.222Z | 2026-04-21T19:38:16.140Z |
| CVE-2026-41303 |
8.7 (4.0)
8.8 (3.1)
|
OpenClaw < 2026.3.28 - Authorization Bypass in Discord… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:15.511Z | 2026-04-21T13:35:55.924Z |
| CVE-2026-41302 |
4.8 (4.0)
7.6 (3.1)
|
OpenClaw < 2026.3.31 - Server-Side Request Forgery via… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:14.782Z | 2026-04-21T19:49:35.930Z |
| CVE-2026-41301 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw 2026.3.22 < 2026.3.31 - Forged Nostr DM Pairi… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:14.023Z | 2026-04-21T13:33:53.554Z |
| CVE-2026-41300 |
6.9 (4.0)
6.5 (3.1)
|
OpenClaw < 2026.3.31 - Attacker-Discovered Endpoint Pr… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:13.304Z | 2026-04-21T13:03:24.309Z |
| CVE-2026-41299 |
7.1 (4.0)
7.1 (3.1)
|
OpenClaw < 2026.3.28 - Client Identity Spoofing in cha… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:12.586Z | 2026-04-21T13:38:25.512Z |
| CVE-2026-41298 |
5.3 (4.0)
5.4 (3.1)
|
OpenClaw < 2026.4.2 - Authorization Bypass in Session … |
OpenClaw |
OpenClaw |
2026-04-20T23:08:11.787Z | 2026-04-21T17:34:23.419Z |
| CVE-2026-41297 |
4.8 (4.0)
7.6 (3.1)
|
OpenClaw < 2026.3.31 - Server-Side Request Forgery via… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:10.955Z | 2026-04-21T13:41:34.057Z |
| CVE-2026-41296 |
8.8 (4.0)
8.2 (3.1)
|
OpenClaw < 2026.3.31 - Sandbox Escape via TOCTOU Race … |
OpenClaw |
OpenClaw |
2026-04-20T23:08:10.194Z | 2026-04-21T19:49:41.570Z |
| CVE-2026-41295 |
8.5 (4.0)
7.8 (3.1)
|
OpenClaw < 2026.4.2 - Untrusted Workspace Channel Shad… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:09.503Z | 2026-04-21T13:35:47.883Z |
| CVE-2026-41294 |
8.5 (4.0)
8.6 (3.1)
|
OpenClaw < 2026.3.28 - Environment Variable Injection … |
OpenClaw |
OpenClaw |
2026-04-20T23:08:08.795Z | 2026-04-21T13:04:36.188Z |
| CVE-2026-41285 |
4.3 (3.1)
|
In OpenBSD through 7.8, the slaacd and rad daemon… |
OpenBSD |
OpenBSD |
2026-04-20T00:00:00.000Z | 2026-04-21T13:27:42.310Z |
| CVE-2026-40045 |
5.9 (4.0)
5.7 (3.1)
|
OpenClaw < 2026.4.2 - Cleartext Credential Transmissio… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:07.952Z | 2026-04-21T13:37:43.951Z |
| CVE-2026-35588 |
6.3 (3.1)
|
Glances has CQL Injection in its Cassandra Export Modu… |
nicolargo |
glances |
2026-04-20T23:20:34.998Z | 2026-04-21T13:35:04.526Z |
| CVE-2026-35587 |
7.3 (4.0)
|
Glances IP Plugin has SSRF via public_api that leads t… |
nicolargo |
glances |
2026-04-20T23:19:02.908Z | 2026-04-22T14:01:47.583Z |
| CVE-2026-35570 |
8.4 (3.1)
|
OpenClaude has Sandbox Bypass via Early-Exit Logic Fla… |
Gitlawb |
openclaude |
2026-04-20T23:24:08.324Z | 2026-04-21T19:49:30.148Z |
| CVE-2026-34839 |
7.7 (4.0)
|
Glances Vulnerable to Cross-Origin Information Disclos… |
nicolargo |
glances |
2026-04-20T23:09:02.551Z | 2026-04-21T19:37:42.399Z |
| CVE-2026-5721 |
4.7 (3.1)
|
wpDataTables – WordPress Data Table, Dynamic Tables & … |
wpdatatables |
wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin |
2026-04-20T22:25:26.695Z | 2026-04-21T19:49:47.411Z |
| CVE-2026-34082 |
5.3 (4.0)
|
Dify has IDOR in deleting someone else's chat conversation |
langgenius |
dify |
2026-04-20T23:03:18.158Z | 2026-04-21T13:36:45.614Z |
| CVE-2026-6729 |
5.3 (4.0)
6.3 (3.1)
|
HKUDS OpenHarness Session Key Collision Privilege Escalation |
HKUDS |
OpenHarness |
2026-04-20T22:01:38.766Z | 2026-04-21T17:39:32.967Z |
| CVE-2026-29643 |
7.1 (3.1)
|
XiangShan (Open-source high-performance RISC-V pr… |
n/a |
n/a |
2026-04-20T00:00:00.000Z | 2026-04-21T19:50:32.463Z |
| CVE-2026-22051 |
2.3 (4.0)
|
StorageGRID (formerly StorageGRID Webscale) versi… |
NETAPP |
StorageGRID (formerly StorageGRID Webscale) |
2026-04-20T21:27:36.822Z | 2026-04-21T13:40:46.948Z |
| CVE-2026-0930 |
2.3 (4.0)
|
Potential wolfSSHd Buffer out-of-bounds Read on Window… |
wolfSSL |
wolfSSH |
2026-04-20T21:28:33.227Z | 2026-04-21T13:37:15.647Z |
| CVE-2026-5928 |
7.5 (3.1)
|
Static buffer overflow in deprecated nis_local_principal |
The GNU C Library |
glibc |
2026-04-20T20:37:31.743Z | 2026-04-21T19:49:59.071Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-h2v9-xpqq-69hx |
7.1 (3.1)
|
ConnectWise has released a security update for ConnectWise Automate™ that addresses a behavior in t… | 2026-04-20T18:31:48Z | 2026-04-20T18:31:48Z |
| ghsa-gv64-vfgp-cgh5 |
4.7 (3.1)
2.0 (4.0)
|
A weakness has been identified in Pagekit CMS up to 1.0.18. This issue affects the function evaluat… | 2026-04-20T18:31:48Z | 2026-04-20T18:31:49Z |
| ghsa-fxgc-2fpp-hx5w |
8.8 (3.1)
8.7 (4.0)
|
Vvveb prior to 1.0.8.1 contains a privilege escalation vulnerability in the admin user profile save… | 2026-04-20T18:31:48Z | 2026-04-20T18:31:48Z |
| ghsa-fr6h-4rh3-wc9f |
7.7 (3.1)
8.3 (4.0)
|
Vvveb prior to 1.0.8.1 contains a server-side request forgery vulnerability in the oEmbedProxy acti… | 2026-04-20T18:31:48Z | 2026-04-20T18:31:48Z |
| ghsa-chhv-69jq-q952 |
9.8 (3.1)
9.2 (4.0)
|
Vvveb prior to 1.0.8.1 contains a code injection vulnerability in the installation endpoint where t… | 2026-04-20T18:31:48Z | 2026-04-20T18:31:48Z |
| ghsa-82p8-693h-j5x5 |
2.4 (3.1)
1.9 (4.0)
|
A security flaw has been discovered in erponline.xyz ERP Online up to 4.0.0. This vulnerability aff… | 2026-04-20T18:31:48Z | 2026-04-20T18:31:48Z |
| ghsa-58qw-9mgm-455v |
4.6 (4.0)
|
pip handles concatenated tar and ZIP files as ZIP files regardless of filename or whether a file is… | 2026-04-20T18:31:48Z | 2026-04-20T21:31:43Z |
| ghsa-49mg-4v6p-32w2 |
5.4 (3.1)
5.1 (4.0)
|
Vvveb prior to 1.0.8.1 contains a stored cross-site scripting vulnerability that allows authenticat… | 2026-04-20T18:31:48Z | 2026-04-20T18:31:48Z |
| ghsa-3gjh-jvm6-6pfg |
6.5 (3.1)
|
A vulnerability exists in the Buffalo Link Station version 1.85-0.01 that allows unauthenticated or… | 2026-04-20T18:31:48Z | 2026-04-20T18:31:49Z |
| ghsa-gxrh-c9qf-pf88 |
7.2 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-20T18:31:47Z | 2026-04-20T18:31:47Z |
| ghsa-x2wv-w39c-7c55 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in Qibo CMS 1.0. Affected by this issue is some unknown functionalit… | 2026-04-20T15:31:52Z | 2026-04-20T15:31:52Z |
| ghsa-wvwg-7g9q-g3v4 |
8.4 (3.1)
|
OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an … | 2026-04-20T15:31:52Z | 2026-04-20T15:31:52Z |
| ghsa-wf66-mphr-4c4r |
5.3 (3.1)
|
Information exposure vulnerability has been identified in Apache Kafka. The NetworkClient componen… | 2026-04-20T15:31:52Z | 2026-04-20T18:31:47Z |
| ghsa-rw4j-jhfh-fr2h |
8.4 (3.1)
|
OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an … | 2026-04-20T15:31:52Z | 2026-04-20T15:31:52Z |
| ghsa-qhfq-gvvc-5q6q |
5.3 (3.1)
|
Apache Doris MCP Server versions earlier than 0.6.1 are affected by an improper neutralization flaw… | 2026-04-20T15:31:52Z | 2026-04-20T18:31:46Z |
| ghsa-pwx9-99jm-fx95 |
8.4 (3.1)
|
OS Command Injection Remote Code Execution Vulnerability in UI in Progress ADC Products allows an a… | 2026-04-20T15:31:52Z | 2026-04-20T15:31:52Z |
| ghsa-g4q4-3mm2-2w69 |
8.4 (3.1)
|
OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an … | 2026-04-20T15:31:52Z | 2026-04-20T15:31:52Z |
| ghsa-c8hq-8vfh-x23r |
5.7 (4.0)
|
An improper access control vulnerability in the canonical-livepatch snap client prior to version 10… | 2026-04-20T15:31:52Z | 2026-04-20T15:31:52Z |
| ghsa-7hc9-pw4r-x45r |
3.5 (3.1)
2.0 (4.0)
|
A vulnerability was found in Qibo CMS 1.0. Affected by this vulnerability is an unknown functionali… | 2026-04-20T15:31:52Z | 2026-04-20T15:31:52Z |
| ghsa-2wm4-697g-pfq8 |
9.8 (3.1)
|
SGLang's reranking endpoint (/v1/rerank) achieves Remote Code Execution (RCE) when a model file con… | 2026-04-20T15:31:52Z | 2026-04-20T18:31:47Z |
| ghsa-28jg-cgg7-j4wc |
9.1 (3.1)
|
A possible security vulnerability has been identified in Apache Kafka. By default, the broker prop… | 2026-04-20T15:31:52Z | 2026-04-20T18:31:46Z |
| ghsa-xx6p-3747-7pwp |
2.4 (3.1)
1.9 (4.0)
|
A weakness has been identified in BichitroGan ISP Billing Software 2025.3.20. Affected is an unknow… | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-x42f-vq92-fh92 |
2.4 (3.1)
1.9 (4.0)
|
A vulnerability was identified in BichitroGan ISP Billing Software 2025.3.20. This affects an unkno… | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-wj32-w776-h6m2 |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability was found in Tenda F451 1.0.0.7_cn_svn7958. This issue affects the function fromGst… | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-rgcc-vxwc-jxf9 |
7.3 (3.1)
5.5 (4.0)
|
A security vulnerability has been detected in moxi624 Mogu Blog v2 up to 5.2. Affected by this vuln… | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-q6vj-q94p-g3rc |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability was identified in Tenda F451 1.0.0.7_cn_svn7958. The affected element is the functi… | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-gqp3-hfc3-8q54 |
6.3 (3.1)
2.1 (4.0)
|
A weakness has been identified in usememos memos up to 0.22.1. This affects the function memos_acce… | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-9r7w-j29g-xqx8 |
2.1 (4.0)
|
When sed is invoked with both -i (in-place edit) and --follow-symlinks, the function open_next_file… | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-9qc9-mh55-7xp5 |
6.3 (3.1)
2.1 (4.0)
|
A flaw has been found in phili67 Ecclesia CRM up to 8.0.0. This affects the function ValidateInput … | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-7gjf-f5f3-qqxw |
3.5 (3.1)
2.0 (4.0)
|
A security flaw has been discovered in Yifang CMS up to 2.0.5. The impacted element is the function… | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-42976 |
|
A stored cross-site scripting (XSS) vulnerability in Apache Spark 3.2.1 and earlier, and … | pyspark | 2022-11-01T16:15:00Z | 2022-11-07T01:10:29.334199Z |
| pysec-2022-42978 |
|
Business Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.0a7. | rdiffweb | 2022-10-26T21:15:00Z | 2022-11-10T23:34:43.369321Z |
| pysec-2022-42974 |
|
Jupyter Core is a package for the core common functionality of Jupyter projects. Jupyter … | jupyter-core | 2022-10-26T20:15:00Z | 2022-11-09T01:10:28.819496Z |
| pysec-2022-42972 |
|
Apache IoTDB version 0.12.2 to 0.12.6, 0.13.0 to 0.13.2 are vulnerable to a Denial of Ser… | apache-iotdb | 2022-10-26T16:15:00Z | 2022-11-07T01:10:28.383734Z |
| pysec-2022-43177 |
9.8 (3.1)
|
Azure CLI is the command-line interface for Microsoft Azure. In versions previous to 2.40… | azure-cli | 2022-10-25T17:15:56+00:00 | 2025-04-09T17:27:24.642962+00:00 |
| pysec-2022-42977 |
|
Missing Authentication for Critical Function in GitHub repository ikus060/rdiffweb prior … | rdiffweb | 2022-10-20T00:15:00Z | 2022-11-07T01:10:29.482920Z |
| pysec-2022-42975 |
|
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) i… | octoprint | 2022-10-19T13:15:00Z | 2022-10-20T19:33:00Z |
| pysec-2022-304 |
|
In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized UR… | django | 2022-10-16T06:15:00Z | 2022-10-16T10:47:15.418796Z |
| pysec-2022-43159 |
9.8 (3.1)
|
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffwe… | rdiffweb | 2022-10-14T12:15:00+00:00 | 2024-11-21T14:23:00.456366+00:00 |
| pysec-2022-43161 |
9.8 (3.1)
|
Origin Validation Error in GitHub repository ikus060/rdiffweb prior to 2.5.0a5. | rdiffweb | 2022-10-13T20:15:00+00:00 | 2024-11-21T14:23:00.575892+00:00 |
| pysec-2022-43160 |
9.8 (3.1)
|
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffwe… | rdiffweb | 2022-10-13T20:15:00+00:00 | 2024-11-21T14:23:00.515460+00:00 |
| pysec-2022-43095 |
9.8 (3.1)
|
The d8s-ip-addresses package for Python, as distributed on PyPI, included a potential cod… | democritus-csv | 2022-10-11T22:15:00Z | 2024-11-21T14:22:43.41112Z |
| pysec-2022-43077 |
9.8 (3.1)
|
The d8s-ip-addresses package for Python, as distributed on PyPI, included a potential cod… | d8s-ip-addresses | 2022-10-11T22:15:00Z | 2024-11-21T14:22:42.385746Z |
| pysec-2022-43050 |
|
The d8s-pdfs package for Python, as distributed on PyPI, included a potential code-execut… | democritus-urls | 2022-10-11T22:15:00Z | 2023-06-05T01:12:51.154372Z |
| pysec-2022-43049 |
|
The d8s-utility package for Python, as distributed on PyPI, included a potential code-exe… | democritus-urls | 2022-10-11T22:15:00Z | 2023-06-05T01:12:51.085049Z |
| pysec-2022-43048 |
|
The d8s-html package for Python, as distributed on PyPI, included a potential code-execut… | democritus-urls | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.996077Z |
| pysec-2022-43047 |
|
The d8s-domains package for Python, as distributed on PyPI, included a potential code-exe… | democritus-urls | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.928263Z |
| pysec-2022-43046 |
|
The d8s-asns package for Python, as distributed on PyPI, included a potential code-execut… | democritus-html | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.827897Z |
| pysec-2022-43045 |
|
The d8s-xml package for Python, as distributed on PyPI, included a potential code-executi… | democritus-html | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.748809Z |
| pysec-2022-43044 |
|
The d8s-networking package for Python, as distributed on PyPI, included a potential code-… | democritus-hashes | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.653599Z |
| pysec-2022-43043 |
|
The d8s-file-system package for Python, as distributed on PyPI, included a potential code… | democritus-hashes | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.575571Z |
| pysec-2022-43042 |
|
The d8s-archives package for Python, as distributed on PyPI, included a potential code-ex… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.463544Z |
| pysec-2022-43041 |
|
The d8s-json package for Python, as distributed on PyPI, included a potential code-execut… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.395602Z |
| pysec-2022-43040 |
|
The d8s-utility package for Python, as distributed on PyPI, included a potential code-exe… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.328726Z |
| pysec-2022-43039 |
|
The d8s-yaml package for Python, as distributed on PyPI, included a potential code-execut… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.196757Z |
| pysec-2022-43038 |
|
The d8s-algorithms package for Python, as distributed on PyPI, included a potential code-… | democritus-dicts | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.098821Z |
| pysec-2022-43037 |
|
The d8s-lists package for Python, as distributed on PyPI, included a potential code-execu… | democritus-dicts | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.022993Z |
| pysec-2022-43036 |
|
The d8s-asns package for Python, as distributed on PyPI, included a potential code-execut… | democritus-csv | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.913597Z |
| pysec-2022-43035 |
|
The d8s-urls package for Python, as distributed on PyPI, included a potential code-execut… | democritus-csv | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.835906Z |
| pysec-2022-43034 |
|
The d8s-yaml package for Python, as distributed on PyPI, included a potential code-execut… | d8s-yaml | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.718747Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2193 | Malicious code in @sixcore/baileys (npm) | 2026-03-25T14:14:18Z | 2026-03-31T03:12:00Z |
| mal-2026-2192 | Malicious code in changelog-utils-wrapper (npm) | 2026-03-25T12:42:22Z | 2026-03-31T03:12:01Z |
| mal-2026-2191 | Malicious code in changelog-utils-logger (npm) | 2026-03-25T12:42:22Z | 2026-03-31T03:12:01Z |
| mal-2026-2190 | Malicious code in ts-bign (npm) | 2026-03-25T11:59:23Z | 2026-03-31T03:12:05Z |
| mal-2026-2188 | Malicious code in levex-refa (npm) | 2026-03-25T11:59:23Z | 2026-04-16T15:42:09Z |
| mal-2026-2189 | Malicious code in simple-util-kit (npm) | 2026-03-25T11:38:55Z | 2026-03-31T03:12:04Z |
| mal-2026-2187 | Malicious code in vision-service-python-client-internal (PyPI) | 2026-03-25T06:58:31Z | 2026-03-25T06:58:31Z |
| mal-2026-2186 | Malicious code in vision-service-python-client (PyPI) | 2026-03-25T06:56:22Z | 2026-03-25T06:56:22Z |
| mal-2026-2185 | Malicious code in hy-api-utilities (PyPI) | 2026-03-25T06:54:07Z | 2026-03-25T06:54:07Z |
| mal-2026-2184 | Malicious code in auth0-ai-ms-agent (PyPI) | 2026-03-25T06:52:53Z | 2026-03-25T06:52:53Z |
| mal-2026-2177 | Malicious code in linting (PyPI) | 2026-03-25T05:07:06Z | 2026-03-25T05:07:06Z |
| mal-2026-2183 | Malicious code in yeshsurya (PyPI) | 2026-03-25T05:06:58Z | 2026-03-25T05:06:58Z |
| mal-2026-2175 | Malicious code in facebookresearch (PyPI) | 2026-03-25T05:06:56Z | 2026-03-25T05:07:03Z |
| mal-2026-2171 | Malicious code in globally (PyPI) | 2026-03-25T05:05:53Z | 2026-03-25T05:54:06Z |
| mal-2026-2170 | Malicious code in fairness-bias (PyPI) | 2026-03-25T05:05:53Z | 2026-03-25T05:54:06Z |
| mal-2026-2172 | Malicious code in v2-8-3 (PyPI) | 2026-03-25T05:05:45Z | 2026-03-25T05:54:06Z |
| mal-2026-2180 | Malicious code in sonic-config-engine (PyPI) | 2026-03-25T05:04:52Z | 2026-03-25T05:04:52Z |
| mal-2026-2182 | Malicious code in sonic-yang-mgmt (PyPI) | 2026-03-25T05:04:50Z | 2026-03-25T05:04:50Z |
| mal-2026-2176 | Malicious code in kusto (PyPI) | 2026-03-25T05:04:47Z | 2026-03-25T05:04:47Z |
| mal-2026-2181 | Malicious code in sonic-platform-common (PyPI) | 2026-03-25T05:04:44Z | 2026-03-25T05:04:44Z |
| mal-2026-2174 | Malicious code in batch-shipyard (PyPI) | 2026-03-25T05:04:42Z | 2026-03-25T05:04:42Z |
| mal-2026-2173 | Malicious code in aristanetworks (PyPI) | 2026-03-25T05:04:39Z | 2026-03-25T05:04:39Z |
| mal-2026-2179 | Malicious code in python-glue (PyPI) | 2026-03-25T05:04:37Z | 2026-03-25T05:04:37Z |
| mal-2026-2178 | Malicious code in lm-sys (PyPI) | 2026-03-25T05:04:34Z | 2026-03-25T05:05:02Z |
| mal-2026-2167 | Malicious code in @shennmine/libsignal-node (npm) | 2026-03-25T03:05:29Z | 2026-03-31T03:12:00Z |
| mal-2026-2166 | Malicious code in @shennmine/baileys (npm) | 2026-03-25T03:05:29Z | 2026-03-31T03:12:00Z |
| mal-2026-2197 | Malicious code in allergan (npm) | 2026-03-25T02:40:45Z | 2026-03-31T03:12:00Z |
| mal-2026-2169 | Malicious code in console-loggers (npm) | 2026-03-25T02:32:02Z | 2026-03-31T03:12:01Z |
| mal-2026-2168 | Malicious code in chai-patch (npm) | 2026-03-25T02:30:41Z | 2026-03-31T03:12:01Z |
| mal-2026-2165 | Malicious code in @rexxtheproject/keyed-db (npm) | 2026-03-25T01:54:00Z | 2026-03-31T03:12:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2634 | Meta WhatsApp: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-11-18T23:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2633 | Aruba AOS-CX: Mehrere Schwachstellen | 2025-11-18T23:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2632 | Fortinet FortiWeb: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-11-18T23:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2631 | Fortinet FortiOS und FortiProxy: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-11-18T23:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2630 | Fortinet FortiMail: Schwachstelle ermöglicht Manipulation von Dateien | 2025-11-18T23:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2629 | xwiki (AdminTools und Pro Macros): Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-11-18T23:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2628 | Fortinet FortiVoice: Schwachstelle ermöglicht Codeausführung | 2025-11-18T23:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2627 | WP Royal Royal Elementor Addons: Schwachstelle ermöglicht Cross-Site Scripting | 2025-11-18T23:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2626 | Liferay Portal und DXP: Schwachstelle ermöglicht Cross-Site Scripting | 2025-11-18T23:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2625 | Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-11-18T23:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2624 | Fortinet FortiOS (CAPWAP daemon): Mehrere Schwachstellen ermöglichen Codeausführung | 2025-11-18T23:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2623 | Fortinet FortiClient (Windows): Mehrere Schwachstellen | 2025-11-18T23:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2622 | Fortinet FortiSandbox: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-11-18T23:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2621 | Fortinet FortiWeb: Schwachstelle ermöglicht Codeausführung | 2025-11-18T23:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2620 | Mattermost Plugins: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-11-17T23:00:00.000+00:00 | 2025-11-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2619 | MISP: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-17T23:00:00.000+00:00 | 2025-11-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2618 | SolarWinds Serv-U: Mehrere Schwachstellen ermöglichen Ausführen von beliebigem Programmcode mit Administratorrechten | 2025-11-17T23:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2617 | Checkmk: Mehrere Schwachstellen | 2025-11-17T23:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2616 | libvirt: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-17T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2615 | SolarWinds Platform: Mehrere Schwachstellen | 2025-11-17T23:00:00.000+00:00 | 2025-11-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2614 | D-LINK DIR-878 Router: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-11-17T23:00:00.000+00:00 | 2025-11-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2613 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung oder DoS | 2025-11-17T23:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2612 | M-Files M-Files Server: Schwachstelle ermöglicht Denial of Service | 2025-11-16T23:00:00.000+00:00 | 2025-11-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2611 | NetApp ActiveIQ Unified Manager (Axios): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-16T23:00:00.000+00:00 | 2025-11-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2610 | Flowise (on-premise): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-11-16T23:00:00.000+00:00 | 2025-11-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2609 | IBM SAN Volume Controller, Storwize und FlashSystem: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-16T23:00:00.000+00:00 | 2025-11-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2608 | Golang Go: Schwachstelle ermöglicht Denial of Service | 2025-11-16T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2607 | Red Hat Enterprise Linux (lasso): Eine Schwachstelle ermöglichen Codeausführung | 2025-11-16T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2606 | Keycloak: Mehrere Schwachstellen | 2025-11-13T23:00:00.000+00:00 | 2025-11-13T23:00:00.000+00:00 |
| wid-sec-w-2025-2605 | IBM AIX: Mehrere Schwachstellen | 2025-11-13T23:00:00.000+00:00 | 2025-11-16T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-305-01 | Rockwell Automation FactoryTalk ThinManager | 2024-10-31T06:00:00.000000Z | 2024-10-31T06:00:00.000000Z |
| icsa-24-303-03 | Delta Electronics InfraSuite Device Master | 2024-10-29T06:00:00.000000Z | 2024-10-29T06:00:00.000000Z |
| icsa-24-303-02 | Solar-Log Base 15 | 2024-10-29T06:00:00.000000Z | 2024-10-29T06:00:00.000000Z |
| icsa-24-298-03 | Deep Sea Electronics DSE855 | 2024-10-24T06:00:00.000000Z | 2024-10-24T06:00:00.000000Z |
| icsa-24-298-02 | iniNet Solutions SpiderControl SCADA PC HMI Editor | 2024-10-24T06:00:00.000000Z | 2024-10-24T06:00:00.000000Z |
| icsa-24-298-01 | VIMESA VHF/FM Transmitter Blue Plus | 2024-10-24T06:00:00.000000Z | 2024-10-24T06:00:00.000000Z |
| icsa-24-303-01 | Siemens InterMesh Subscriber Devices | 2024-10-23T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-296-01 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products (Update C) | 2024-10-22T06:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-24-291-05 | Kieback&Peter DDC4000 Series | 2024-10-17T06:00:00.000000Z | 2024-10-17T06:00:00.000000Z |
| icsa-24-291-04 | HMS Networks EWON FLEXY 202 | 2024-10-17T06:00:00.000000Z | 2024-10-17T06:00:00.000000Z |
| icsa-24-291-03 | Mitsubishi Electric CNC Series (Update C) | 2024-10-17T06:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-24-291-02 | LCDS LAquis SCADA | 2024-10-17T06:00:00.000000Z | 2024-10-17T06:00:00.000000Z |
| icsa-24-291-01 | Elvaco M-Bus Metering Gateway CMe3100 (Update A) | 2024-10-17T06:00:00.000000Z | 2024-11-14T07:00:00.000000Z |
| icsa-24-284-21 | Delta Electronics CNCSoft-G2 | 2024-10-10T06:00:00.000000Z | 2024-10-10T06:00:00.000000Z |
| icsa-24-284-20 | Rockwell Automation ControlLogix | 2024-10-10T06:00:00.000000Z | 2024-10-10T06:00:00.000000Z |
| icsa-24-284-19 | Rockwell Automation PowerFlex 6000T | 2024-10-10T06:00:00.000000Z | 2024-10-10T06:00:00.000000Z |
| icsa-24-284-18 | Rockwell Automation Logix Controllers | 2024-10-10T06:00:00.000000Z | 2024-10-10T06:00:00.000000Z |
| icsa-24-284-17 | Rockwell Automation Verve Asset Manager | 2024-10-10T06:00:00.000000Z | 2024-10-10T06:00:00.000000Z |
| icsa-24-284-16 | Rockwell Automation DataMosaix Private Cloud | 2024-10-10T06:00:00.000000Z | 2024-10-10T06:00:00.000000Z |
| icsa-24-284-15 | Rockwell Automation DataMosaix Private Cloud | 2024-10-10T06:00:00.000000Z | 2024-10-10T06:00:00.000000Z |
| icsa-24-284-14 | Schneider Electric Zelio Soft 2 | 2024-10-10T06:00:00.000000Z | 2024-10-10T06:00:00.000000Z |
| icsa-24-289-01 | Siemens Siveillance Video Camera | 2024-10-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-037-01 | Schneider Electric EcoStruxure Power Monitoring Expert (PME) (Update B) | 2024-10-08T04:00:00.000000Z | 2025-05-13T04:00:00.000000Z |
| icsa-25-030-03 | Schneider Electric System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2024-10-08T00:00:00.000000Z | 2024-10-08T00:00:00.000000Z |
| icsa-25-023-04 | Schneider Electric Easergy Studio | 2024-10-08T00:00:00.000000Z | 2024-10-08T00:00:00.000000Z |
| icsa-25-023-03 | Schneider Electric EVlink Home Smart and Schneider Charge | 2024-10-08T00:00:00.000000Z | 2024-10-08T00:00:00.000000Z |
| icsa-25-016-08 | Schneider Electric Data Center Expert | 2024-10-08T00:00:00.000000Z | 2024-10-08T00:00:00.000000Z |
| icsa-24-289-02 | Schneider Electric Data Center Expert | 2024-10-08T00:00:00.000000Z | 2024-10-08T00:00:00.000000Z |
| icsa-24-284-13 | Siemens Tecnomatix Plant Simulation | 2024-10-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-284-12 | Siemens Sentron Powercenter 1000 | 2024-10-08T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-iosxe-cip-dos-9rtbklt9 | Cisco IOS and IOS XE Software Common Industrial Protocol Request Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-iosxe-6vpe-dos-tjbtf5zv | Cisco IOS XE Software IPv6 VPN over MPLS Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ios-xe-cat-verify-d4neqa6q | Cisco IOS XE Software for Catalyst 9200 Series Switches Arbitrary Code Execution Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ewc-priv-esc-nderyltk | Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points Privilege Escalation Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-duo-macos-bypass-ukznpxe6 | Cisco Duo for macOS Authentication Bypass Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-29T21:21:01+00:00 |
| cisco-sa-cwlc-snmpidv-rnyyqzuz | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Information Disclosure Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-c9800-mob-dos-342yac6j | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Mobility Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-arb-file-delete-vb2rvcqv | Cisco SD-WAN Arbitrary File Deletion Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ap-assoc-dos-egvqton8 | Cisco Catalyst 9100 Series Access Points Association Request Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-alg-dos-ku9z8kfx | Cisco IOS XE Software DNS NAT Protocol Application Layer Gateway Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-vu855201-j3z8cktx | Vulnerabilities in Layer 2 Network Security Controls Affecting Cisco Products: September 2022 | 2022-09-27T16:00:00+00:00 | 2022-10-05T18:16:08+00:00 |
| cisco-sa-apvlan-tdttb4fy | Cisco Access Points VLAN Bypass from Native VLAN Vulnerability | 2022-09-27T16:00:00+00:00 | 2022-10-04T13:22:46+00:00 |
| cisco-sa-xr-cdp-wnalzvt2 | Cisco IOS XR Software Cisco Discovery Protocol Denial of Service Vulnerability | 2022-09-14T16:00:00+00:00 | 2022-09-14T16:00:00+00:00 |
| cisco-sa-ncs4k-tl1-gnnlwc6 | Cisco Network Convergence System 4000 Series TL1 Denial of Service Vulnerability | 2022-09-14T16:00:00+00:00 | 2022-09-14T16:00:00+00:00 |
| cisco-sa-iosxr-bng-gmg5gxt | Cisco IOS XR Software Broadband Network Gateway PPP over Ethernet Denial of Service Vulnerability | 2022-09-14T16:00:00+00:00 | 2022-09-14T16:00:00+00:00 |
| cisco-sa-webex-app-qrto6yc2 | Cisco Webex Meetings App Character Interface Manipulation Vulnerability | 2022-09-07T16:00:00+00:00 | 2023-02-24T15:40:30+00:00 |
| cisco-sa-vmanage-msg-serv-aqtup7vs | Cisco SD-WAN vManage Software Unauthenticated Access to Messaging Services Vulnerability | 2022-09-07T16:00:00+00:00 | 2022-09-27T21:40:31+00:00 |
| cisco-sa-sb-rv-vpnbypass-cpheup9o | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers IPSec VPN Server Authentication Bypass Vulnerability | 2022-09-07T16:00:00+00:00 | 2022-09-07T16:00:00+00:00 |
| cisco-sa-mlx5-jbpcrqd8 | Vulnerability in NVIDIA Data Plane Development Kit Affecting Cisco Products: August 2022 | 2022-09-07T16:00:00+00:00 | 2022-09-07T16:00:00+00:00 |
| cisco-sa-meraki-config-ab3da | Cisco Meraki MR Series Splash Page Insecure Configuration Option | 2022-09-07T16:00:00+00:00 | 2022-09-07T16:00:00+00:00 |
| cisco-sa-nxos-ospfv3-dos-48qutcu | Cisco NX-OS Software OSPFv3 Denial of Service Vulnerability | 2022-08-24T16:00:00+00:00 | 2022-08-24T16:00:00+00:00 |
| cisco-sa-nxos-cdp-dos-ce-wwvpucc9 | Cisco FXOS and NX-OS Software Cisco Discovery Protocol Denial of Service and Arbitrary Code Execution Vulnerability | 2022-08-24T16:00:00+00:00 | 2022-08-24T16:00:00+00:00 |
| cisco-sa-mso-prvesc-bpfp9czs | Cisco ACI Multi-Site Orchestrator Privilege Escalation Vulnerability | 2022-08-24T16:00:00+00:00 | 2022-08-24T16:00:00+00:00 |
| cisco-sa-fxos-cmdinj-txclnznh | Cisco FXOS Software Command Injection Vulnerability | 2022-08-24T16:00:00+00:00 | 2022-08-24T16:00:00+00:00 |
| cisco-sa-wsa-prv-esc-8pdru8t8 | Cisco Secure Web Appliance Privilege Escalation Vulnerability | 2022-08-17T16:00:00+00:00 | 2022-10-03T18:13:53+00:00 |
| cisco-sa-asaftd-rsa-key-leak-ms7uefzz | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software RSA Private Key Leak Vulnerability | 2022-08-10T16:00:00+00:00 | 2022-08-10T16:00:00+00:00 |
| cisco-sa-asa-webvpn-loeksnmo | Cisco Adaptive Security Appliance and Firepower Threat Defense Software VPN Web Client Services Client-Side Request Smuggling Vulnerability | 2022-08-10T16:00:00+00:00 | 2023-11-01T16:00:01+00:00 |
| cisco-sa-webex-xss-frmhijck-ko3wmkus | Cisco Webex Meetings Web Interface Vulnerabilities | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-sb-mult-vuln-cbvp4sur | Cisco Small Business RV Series Routers Vulnerabilities | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-ise-pwd-wh64ahqf | Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-21261 | Microsoft Excel Information Disclosure Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21260 | Microsoft Outlook Spoofing Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21259 | Microsoft Excel Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21258 | Microsoft Excel Information Disclosure Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21257 | GitHub Copilot and Visual Studio Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-03-13T07:00:00.000Z |
| msrc_cve-2026-21256 | GitHub Copilot and Visual Studio Remote Code Execution Vulnerability | 2026-02-10T08:00:00.000Z | 2026-03-13T07:00:00.000Z |
| msrc_cve-2026-21255 | Windows Hyper-V Security Feature Bypass Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21253 | Mailslot File System Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21251 | Cluster Client Failover (CCF) Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21250 | Windows HTTP.sys Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21249 | Windows NTLM Spoofing Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21248 | Windows Hyper-V Remote Code Execution Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21247 | Windows Hyper-V Remote Code Execution Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21246 | Windows Graphics Component Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21245 | Windows Kernel Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21244 | Windows Hyper-V Remote Code Execution Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21243 | Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21242 | Windows Subsystem for Linux Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21241 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21240 | Windows HTTP.sys Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21239 | Windows Kernel Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21238 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21237 | Windows Subsystem for Linux Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21236 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21235 | Windows Graphics Component Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21234 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21232 | Windows HTTP.sys Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21231 | Windows Kernel Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21229 | Power BI Remote Code Execution Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21228 | Azure Local Remote Code Execution Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0312 | Kwetsbaarheden verholpen in Solarwinds Platform | 2024-07-18T13:23:55.561789Z | 2024-07-18T13:23:55.561789Z |
| ncsc-2024-0311 | Kwetsbaarheden verholpen in Cisco Secure Email Gateway | 2024-07-18T12:46:34.019785Z | 2024-07-18T12:46:34.019785Z |
| ncsc-2024-0310 | Kwetsbaarheid verholpen in SonicOS | 2024-07-18T12:25:06.813302Z | 2024-07-18T12:25:06.813302Z |
| ncsc-2024-0309 | Kwetsbaarheid gevonden in Ivanti Endpoint Manager | 2024-07-18T12:00:25.689314Z | 2024-07-18T12:00:25.689314Z |
| ncsc-2024-0308 | Kwetsbaarheden verholpen in Oracle Virtualization | 2024-07-17T13:55:57.768494Z | 2024-07-17T13:55:57.768494Z |
| ncsc-2024-0307 | Kwetsbaarheden verholpen in Oracle Systems | 2024-07-17T13:55:53.343378Z | 2024-07-17T13:55:53.343378Z |
| ncsc-2024-0306 | Kwetsbaarheden verholpen in Oracle Supply Chain | 2024-07-17T13:55:37.062720Z | 2024-07-17T13:55:37.062720Z |
| ncsc-2024-0305 | Kwetsbaarheden verholpen in Oracle Siebel CRM | 2024-07-17T13:55:31.923970Z | 2024-07-17T13:55:31.923970Z |
| ncsc-2024-0304 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2024-07-17T13:55:12.225033Z | 2024-07-17T13:55:12.225033Z |
| ncsc-2024-0303 | Kwetsbaarheden verholpen in Oracle MySQL | 2024-07-17T13:54:56.036488Z | 2024-07-17T13:54:56.036488Z |
| ncsc-2024-0302 | Kwetsbaarheden verholpen in Oracle JD Edwards | 2024-07-17T13:54:52.031796Z | 2024-07-17T13:54:52.031796Z |
| ncsc-2024-0301 | Kwetsbaarheden verholpen in Oracle Java SE | 2024-07-17T13:54:46.188033Z | 2024-07-17T13:54:46.188033Z |
| ncsc-2024-0300 | Kwetsbaarheid verholpen in Oracle Hyperion | 2024-07-17T13:54:07.536172Z | 2024-07-17T13:54:07.536172Z |
| ncsc-2024-0299 | Kwetsbaarheden verholpen in Oracle Analytics | 2024-07-17T13:54:03.545073Z | 2024-07-17T13:54:03.545073Z |
| ncsc-2024-0298 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2024-07-17T13:54:00.411174Z | 2024-07-17T13:54:00.411174Z |
| ncsc-2024-0297 | Kwetsbaarheden verholpen in Oracle Financial Services Applications | 2024-07-17T13:53:54.655859Z | 2024-07-17T13:53:54.655859Z |
| ncsc-2024-0296 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2024-07-17T13:53:28.440252Z | 2024-07-17T13:53:28.440252Z |
| ncsc-2024-0295 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2024-07-17T13:53:22.662201Z | 2024-07-17T13:53:22.662201Z |
| ncsc-2024-0294 | Kwetsbaarheden verholpen in Oracle Communications | 2024-07-17T13:52:53.293003Z | 2024-07-17T13:52:53.293003Z |
| ncsc-2024-0293 | Kwetsbaarheden verholpen in Oracle Communications Applications | 2024-07-17T13:52:33.045762Z | 2024-07-17T13:52:33.045762Z |
| ncsc-2024-0292 | Kwetsbaarheden verholpen in Oracle Essbase | 2024-07-17T13:52:18.885359Z | 2024-07-17T13:52:18.885359Z |
| ncsc-2024-0291 | Kwetsbaarheden verholpen in Oracle Database Server | 2024-07-17T13:51:54.185475Z | 2024-07-17T13:51:54.185475Z |
| ncsc-2024-0290 | Kwetsbaarheden verholpen in Juniper Junos OS en Junos OS Evolved | 2024-07-12T11:43:27.625950Z | 2024-07-12T11:43:27.625950Z |
| ncsc-2024-0289 | Kwetsbaarheid verholpen in GitLab CE/EE | 2024-07-11T08:22:44.417794Z | 2024-07-11T08:22:44.417794Z |
| ncsc-2024-0288 | Kwetsbaarheden verholpen in Citrix Workspace, NetScaler ADC en NetScaler Gateway | 2024-07-10T13:54:21.933605Z | 2024-07-11T15:05:36.608570Z |
| ncsc-2024-0287 | Kwetsbaarheden verholpen in Fortinet | 2024-07-10T08:27:35.622919Z | 2024-07-10T08:27:35.622919Z |
| ncsc-2024-0286 | Kwetsbaarheid verholpen in Microsoft System Center Defender for IoT | 2024-07-09T19:39:17.911628Z | 2024-07-09T19:39:17.911628Z |
| ncsc-2024-0285 | Kwetsbaarheden verholpen in Microsoft Azure | 2024-07-09T19:38:21.052004Z | 2024-07-09T19:38:21.052004Z |
| ncsc-2024-0284 | Kwetsbaarheden verholpen in Microsoft Office | 2024-07-09T19:37:26.015768Z | 2024-07-09T19:37:26.015768Z |
| ncsc-2024-0283 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2024-07-09T18:46:27.237285Z | 2024-07-09T18:46:27.237285Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15847-1 | anubis-1.24.0-1.1 on GA media | 2025-12-28T00:00:00Z | 2025-12-28T00:00:00Z |
| opensuse-su-2025:15846-1 | python39-3.9.25-2.1 on GA media | 2025-12-24T00:00:00Z | 2025-12-24T00:00:00Z |
| opensuse-su-2025:15845-1 | podman-5.7.1-1.1 on GA media | 2025-12-24T00:00:00Z | 2025-12-24T00:00:00Z |
| opensuse-su-2025:15844-1 | cpp-httplib-devel-0.28.0-1.1 on GA media | 2025-12-24T00:00:00Z | 2025-12-24T00:00:00Z |
| opensuse-su-2025:15843-1 | buildah-1.42.2-1.1 on GA media | 2025-12-24T00:00:00Z | 2025-12-24T00:00:00Z |
| opensuse-su-2026:20000-1 | Security update for salt | 2025-12-23T09:11:50Z | 2025-12-23T09:11:50Z |
| opensuse-su-2025:15842-1 | libnbd-1.24.0-2.1 on GA media | 2025-12-23T00:00:00Z | 2025-12-23T00:00:00Z |
| opensuse-su-2025:20175-1 | Security update for mariadb | 2025-12-22T11:44:04Z | 2025-12-22T11:44:04Z |
| opensuse-su-2025:20174-1 | Security update for fontforge | 2025-12-22T10:04:31Z | 2025-12-22T10:04:31Z |
| opensuse-su-2025:15841-1 | zk-0.15.2-1.1 on GA media | 2025-12-22T00:00:00Z | 2025-12-22T00:00:00Z |
| opensuse-su-2025:15840-1 | python315-3.15.0~a3-1.1 on GA media | 2025-12-22T00:00:00Z | 2025-12-22T00:00:00Z |
| opensuse-su-2025:15839-1 | python310-3.10.19-3.1 on GA media | 2025-12-22T00:00:00Z | 2025-12-22T00:00:00Z |
| opensuse-su-2025:15838-1 | python311-tornado6-6.5.4-1.1 on GA media | 2025-12-20T00:00:00Z | 2025-12-20T00:00:00Z |
| opensuse-su-2025:15837-1 | php8-8.4.16-1.1 on GA media | 2025-12-20T00:00:00Z | 2025-12-20T00:00:00Z |
| opensuse-su-2025:15836-1 | kernel-devel-6.18.2-1.1 on GA media | 2025-12-20T00:00:00Z | 2025-12-20T00:00:00Z |
| opensuse-su-2025:15835-1 | duc-1.4.6-1.1 on GA media | 2025-12-20T00:00:00Z | 2025-12-20T00:00:00Z |
| opensuse-su-2025:15834-1 | busybox-1.37.0-8.1 on GA media | 2025-12-20T00:00:00Z | 2025-12-20T00:00:00Z |
| opensuse-su-2025:15833-1 | MozillaFirefox-146.0.1-1.1 on GA media | 2025-12-20T00:00:00Z | 2025-12-20T00:00:00Z |
| opensuse-su-2025:20172-1 | Security update for the Linux Kernel | 2025-12-19T17:38:16Z | 2025-12-19T17:38:16Z |
| opensuse-su-2025:15832-1 | coredns-for-k8s1.35-1.13.1-2.1 on GA media | 2025-12-19T00:00:00Z | 2025-12-19T00:00:00Z |
| opensuse-su-2025:15831-1 | chromedriver-143.0.7499.146-1.1 on GA media | 2025-12-19T00:00:00Z | 2025-12-19T00:00:00Z |
| opensuse-su-2025:15830-1 | alloy-1.12.0-2.1 on GA media | 2025-12-19T00:00:00Z | 2025-12-19T00:00:00Z |
| opensuse-su-2025:15829-1 | ImageMagick-7.1.2.10-2.1 on GA media | 2025-12-19T00:00:00Z | 2025-12-19T00:00:00Z |
| opensuse-su-2025:20171-1 | Security update for qemu | 2025-12-18T12:42:03Z | 2025-12-18T12:42:03Z |
| opensuse-su-2025:20177-1 | Security update for cheat | 2025-12-18T00:17:52Z | 2025-12-18T00:17:52Z |
| opensuse-su-2025:15828-1 | libruby3_4-3_4-3.4.8-1.1 on GA media | 2025-12-18T00:00:00Z | 2025-12-18T00:00:00Z |
| opensuse-su-2025:15827-1 | rsync-3.4.1-4.1 on GA media | 2025-12-18T00:00:00Z | 2025-12-18T00:00:00Z |
| opensuse-su-2025:15826-1 | coredns-for-k8s1.34-1.12.1-2.1 on GA media | 2025-12-18T00:00:00Z | 2025-12-18T00:00:00Z |
| opensuse-su-2025:15825-1 | coredns-for-k8s1.33-1.12.0-2.1 on GA media | 2025-12-18T00:00:00Z | 2025-12-18T00:00:00Z |
| opensuse-su-2025:15824-1 | netty-4.1.130-1.1 on GA media | 2025-12-17T00:00:00Z | 2025-12-17T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:3577 | Red Hat Security Advisory: libpng security update | 2026-03-03T12:51:32+00:00 | 2026-04-09T23:05:20+00:00 |
| rhsa-2026:3638 | Red Hat Security Advisory: nginx:1.24 security update | 2026-03-03T11:35:14+00:00 | 2026-04-08T14:06:16+00:00 |
| rhsa-2026:3634 | Red Hat Security Advisory: kernel-rt security update | 2026-03-03T09:54:06+00:00 | 2026-04-01T19:24:14+00:00 |
| rhsa-2026:3402 | Red Hat Security Advisory: OpenShift Container Platform 4.21.4 bug fix and security update | 2026-03-03T09:24:45+00:00 | 2026-04-01T03:53:01+00:00 |
| rhsa-2026:3576 | Red Hat Security Advisory: libpng security update | 2026-03-03T01:15:24+00:00 | 2026-04-09T23:05:19+00:00 |
| rhsa-2026:3574 | Red Hat Security Advisory: libpng security update | 2026-03-03T00:52:00+00:00 | 2026-04-09T23:05:24+00:00 |
| rhsa-2026:3575 | Red Hat Security Advisory: libpng security update | 2026-03-03T00:14:50+00:00 | 2026-04-09T23:05:19+00:00 |
| rhsa-2026:3579 | Red Hat Security Advisory: kernel security update | 2026-03-03T00:14:24+00:00 | 2026-04-01T20:03:08+00:00 |
| rhsa-2026:3573 | Red Hat Security Advisory: libpng security update | 2026-03-02T19:59:45+00:00 | 2026-04-09T23:05:19+00:00 |
| rhsa-2026:3559 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.14 | 2026-03-02T17:03:40+00:00 | 2026-04-14T07:58:33+00:00 |
| rhsa-2026:3556 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.14 | 2026-03-02T16:52:33+00:00 | 2026-04-14T07:58:33+00:00 |
| rhsa-2026:3551 | Red Hat Security Advisory: libpng security update | 2026-03-02T15:36:28+00:00 | 2026-04-09T23:05:18+00:00 |
| rhsa-2026:3529 | Red Hat Security Advisory: grafana security update | 2026-03-02T11:51:06+00:00 | 2026-03-24T14:16:25+00:00 |
| rhsa-2026:3520 | Red Hat Security Advisory: kernel security update | 2026-03-02T11:46:17+00:00 | 2026-04-13T06:21:52+00:00 |
| rhsa-2026:3516 | Red Hat Security Advisory: thunderbird security update | 2026-03-02T11:08:39+00:00 | 2026-03-23T13:08:32+00:00 |
| rhsa-2026:3517 | Red Hat Security Advisory: thunderbird security update | 2026-03-02T11:06:17+00:00 | 2026-03-23T13:08:33+00:00 |
| rhsa-2026:3515 | Red Hat Security Advisory: thunderbird security update | 2026-03-02T10:59:32+00:00 | 2026-03-23T13:08:33+00:00 |
| rhsa-2026:3477 | Red Hat Security Advisory: gnutls security update | 2026-03-02T09:19:32+00:00 | 2026-04-13T18:42:11+00:00 |
| rhsa-2026:3496 | Red Hat Security Advisory: firefox security update | 2026-03-02T09:15:42+00:00 | 2026-03-23T13:08:28+00:00 |
| rhsa-2026:3507 | Red Hat Security Advisory: valkey security update | 2026-03-02T08:05:16+00:00 | 2026-04-09T14:39:59+00:00 |
| rhsa-2026:3506 | Red Hat Security Advisory: yggdrasil security update | 2026-03-02T06:45:32+00:00 | 2026-04-14T09:46:27+00:00 |
| rhsa-2026:3504 | Red Hat Security Advisory: 389-ds-base security update | 2026-03-02T06:33:01+00:00 | 2026-03-31T17:18:00+00:00 |
| rhsa-2026:3497 | Red Hat Security Advisory: firefox security update | 2026-03-02T06:15:46+00:00 | 2026-03-23T13:08:31+00:00 |
| rhsa-2026:3495 | Red Hat Security Advisory: firefox security update | 2026-03-02T05:58:26+00:00 | 2026-03-23T13:08:26+00:00 |
| rhsa-2026:3494 | Red Hat Security Advisory: firefox security update | 2026-03-02T05:57:51+00:00 | 2026-03-23T13:08:27+00:00 |
| rhsa-2026:3493 | Red Hat Security Advisory: firefox security update | 2026-03-02T05:52:16+00:00 | 2026-03-23T13:08:25+00:00 |
| rhsa-2026:3492 | Red Hat Security Advisory: firefox security update | 2026-03-02T05:45:10+00:00 | 2026-03-23T13:08:25+00:00 |
| rhsa-2026:3491 | Red Hat Security Advisory: firefox security update | 2026-03-02T05:44:56+00:00 | 2026-03-23T13:08:25+00:00 |
| rhsa-2026:3488 | Red Hat Security Advisory: kernel security update | 2026-03-02T03:27:37+00:00 | 2026-04-08T13:33:36+00:00 |
| rhsa-2026:3489 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T02:56:16+00:00 | 2026-04-14T07:58:33+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20730-1 | Security update for freetype2 | 2026-03-16T13:23:56Z | 2026-03-16T13:23:56Z |
| suse-su-2026:20726-1 | Security update for freetype2 | 2026-03-16T09:25:21Z | 2026-03-16T09:25:21Z |
| suse-su-2026:0900-1 | Security update for python-black | 2026-03-13T18:33:38Z | 2026-03-13T18:33:38Z |
| suse-su-2026:0898-1 | Security update for libpng15 | 2026-03-13T15:26:30Z | 2026-03-13T15:26:30Z |
| suse-su-2026:0897-1 | Security update for python3 | 2026-03-13T15:26:14Z | 2026-03-13T15:26:14Z |
| suse-su-2026:0896-1 | Security update for glibc | 2026-03-13T15:25:13Z | 2026-03-13T15:25:13Z |
| suse-su-2026:0894-1 | Security update for libsoup | 2026-03-13T13:48:31Z | 2026-03-13T13:48:31Z |
| suse-su-2026:20693-1 | Security update for qemu | 2026-03-13T10:41:36Z | 2026-03-13T10:41:36Z |
| suse-su-2026:20727-1 | Security update for libsoup | 2026-03-13T09:07:20Z | 2026-03-13T09:07:20Z |
| suse-su-2026:0892-1 | Security update for busybox | 2026-03-13T09:05:08Z | 2026-03-13T09:05:08Z |
| suse-su-2026:0891-1 | Security update for python | 2026-03-13T09:04:54Z | 2026-03-13T09:04:54Z |
| suse-su-2026:0890-1 | Security update for tomcat10 | 2026-03-13T08:57:08Z | 2026-03-13T08:57:08Z |
| suse-su-2026:0889-1 | Security update for qemu | 2026-03-13T07:58:55Z | 2026-03-13T07:58:55Z |
| suse-su-2026:0888-1 | Security update for dnsdist | 2026-03-13T07:08:03Z | 2026-03-13T07:08:03Z |
| suse-su-2026:0886-1 | Security update for libsoup2 | 2026-03-12T14:50:32Z | 2026-03-12T14:50:32Z |
| suse-su-2026:0885-1 | Security update for curl | 2026-03-12T14:50:17Z | 2026-03-12T14:50:17Z |
| suse-su-2026:0884-1 | Security update for python36 | 2026-03-12T10:20:30Z | 2026-03-12T10:20:30Z |
| suse-su-2026:0883-1 | Security update for postgresql17 | 2026-03-12T10:20:03Z | 2026-03-12T10:20:03Z |
| suse-su-2026:0882-1 | Security update for postgresql16 | 2026-03-12T10:19:26Z | 2026-03-12T10:19:26Z |
| suse-su-2026:0881-1 | Security update for postgresql18 | 2026-03-12T10:18:52Z | 2026-03-12T10:18:52Z |
| suse-su-2026:0880-1 | Security update for MozillaThunderbird | 2026-03-12T10:18:33Z | 2026-03-12T10:18:33Z |
| suse-su-2026:0879-1 | Security update for curl | 2026-03-12T10:04:20Z | 2026-03-12T10:04:20Z |
| suse-su-2026:20668-1 | Security update for curl | 2026-03-12T10:04:10Z | 2026-03-12T10:04:10Z |
| suse-su-2026:20723-1 | Security update for virtiofsd | 2026-03-12T09:52:06Z | 2026-03-12T09:52:06Z |
| suse-su-2026:20722-1 | Security update for curl | 2026-03-12T09:40:37Z | 2026-03-12T09:40:37Z |
| suse-su-2026:0877-1 | Security update for tomcat11 | 2026-03-12T05:39:40Z | 2026-03-12T05:39:40Z |
| suse-su-2026:0876-1 | Security update for go1.26 | 2026-03-11T18:35:26Z | 2026-03-11T18:35:26Z |
| suse-su-2026:0875-1 | Security update for go1.25 | 2026-03-11T18:34:13Z | 2026-03-11T18:34:13Z |
| suse-su-2026:0874-1 | Security update for GraphicsMagick | 2026-03-11T17:07:29Z | 2026-03-11T17:07:29Z |
| suse-su-2026:0873-1 | Security update for python | 2026-03-11T17:07:11Z | 2026-03-11T17:07:11Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:15608 | Important: python3.12-cryptography security update | 2025-09-10T00:00:00Z | 2025-09-10T18:06:18Z |
| alsa-2025:15472 | Important: kernel-rt security update | 2025-09-08T00:00:00Z | 2025-09-09T07:30:13Z |
| alsa-2025:15471 | Important: kernel security update | 2025-09-08T00:00:00Z | 2025-09-09T09:32:18Z |
| alsa-2025:15447 | Important: kernel security update | 2025-09-08T00:00:00Z | 2025-09-15T08:57:56Z |
| alsa-2025:15429 | Important: kernel security update | 2025-09-08T00:00:00Z | 2025-09-15T09:02:39Z |
| alsa-2025:15123 | Moderate: httpd:2.4 security update | 2025-09-03T00:00:00Z | 2025-09-04T10:27:23Z |
| alsa-2025:15115 | Important: postgresql:12 security update | 2025-09-03T00:00:00Z | 2025-09-03T11:08:48Z |
| alsa-2025:15099 | Important: pam security update | 2025-09-03T00:00:00Z | 2025-09-03T08:51:39Z |
| alsa-2025:15095 | Moderate: httpd security update | 2025-09-02T00:00:00Z | 2025-09-03T08:58:50Z |
| alsa-2025:15023 | Moderate: httpd security update | 2025-09-02T00:00:00Z | 2025-09-29T09:03:21Z |
| alsa-2025:15022 | Important: postgresql:15 security update | 2025-09-02T00:00:00Z | 2025-09-29T09:08:26Z |
| alsa-2025:15021 | Important: postgresql:13 security update | 2025-09-02T00:00:00Z | 2025-09-29T09:05:39Z |
| alsa-2025:15020 | Important: udisks2 security update | 2025-09-02T00:00:00Z | 2025-09-29T09:12:40Z |
| alsa-2025:15019 | Moderate: python3.9 security update | 2025-09-02T00:00:00Z | 2025-09-29T09:10:40Z |
| alsa-2025:15018 | Important: udisks2 security update | 2025-09-02T00:00:00Z | 2025-09-29T09:14:00Z |
| alsa-2025:15017 | Important: udisks2 security update | 2025-09-02T00:00:00Z | 2025-09-29T09:15:52Z |
| alsa-2025:15011 | Important: kernel security update | 2025-09-02T00:00:00Z | 2025-09-29T09:19:38Z |
| alsa-2025:15010 | Moderate: python3.11 security update | 2025-09-02T00:00:00Z | 2025-09-29T09:21:37Z |
| alsa-2025:15009 | Moderate: kernel-rt security update | 2025-09-02T00:00:00Z | 2025-09-02T12:21:56Z |
| alsa-2025:15008 | Moderate: kernel security update | 2025-09-02T00:00:00Z | 2025-09-09T09:28:32Z |
| alsa-2025:15007 | Moderate: python3.12 security update | 2025-09-02T00:00:00Z | 2025-09-29T09:23:49Z |
| alsa-2025:15005 | Moderate: kernel security update | 2025-09-02T00:00:00Z | 2025-09-29T09:34:42Z |
| alsa-2025:14999 | Moderate: resource-agents security update | 2025-09-02T00:00:00Z | 2026-01-05T21:07:54Z |
| alsa-2025:14984 | Moderate: python3.12 security update | 2025-09-02T00:00:00Z | 2025-09-29T09:30:31Z |
| alsa-2025:14983 | Moderate: mod_http2 security update | 2025-09-02T00:00:00Z | 2025-09-02T10:38:04Z |
| alsa-2025:14900 | Moderate: python39:3.9 security update | 2025-08-28T00:00:00Z | 2025-09-01T12:34:36Z |
| alsa-2025:14899 | Important: postgresql:16 security update | 2025-08-28T00:00:00Z | 2025-08-29T10:40:22Z |
| alsa-2025:14878 | Important: postgresql security update | 2025-08-28T00:00:00Z | 2025-08-29T06:49:12Z |
| alsa-2025:14862 | Important: postgresql:15 security update | 2025-08-28T00:00:00Z | 2025-09-02T10:40:42Z |
| alsa-2025:14844 | Important: thunderbird security update | 2025-08-28T00:00:00Z | 2025-08-29T13:15:41Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-1240 | UNKNOWN READ in MqttProps_Free | 2023-11-30T13:03:05.050780Z | 2023-11-30T13:03:05.051057Z |
| osv-2023-1239 | Heap-buffer-overflow in decToString | 2023-11-30T13:00:20.622604Z | 2023-11-30T13:00:20.622871Z |
| osv-2023-1232 | Heap-buffer-overflow in pcpp::TLSECPointFormatExtension::getECPointFormatList | 2023-11-28T13:01:23.208343Z | 2025-12-22T14:15:49.713990Z |
| osv-2023-1231 | Global-buffer-overflow in iaace_estimate_scfs_chan | 2023-11-28T13:01:01.666771Z | 2023-11-28T13:01:01.667048Z |
| osv-2023-1228 | Stack-buffer-overflow in asn1_decode_entry | 2023-11-27T13:03:26.289859Z | 2023-11-27T13:03:26.290112Z |
| osv-2023-1227 | Stack-buffer-overflow in io_memory_read | 2023-11-27T13:03:22.969939Z | 2023-11-29T14:21:41.958752Z |
| osv-2023-1223 | Heap-buffer-overflow in H5O__shared_decode | 2023-11-27T13:01:18.977198Z | 2025-03-18T00:47:06.884278Z |
| osv-2023-1222 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2023-11-27T13:00:10.105607Z | 2023-11-27T13:00:10.105869Z |
| osv-2023-1221 | Security exception in jaz.Zer.reportFinding | 2023-11-26T13:02:48.995906Z | 2024-08-27T14:16:27.390478Z |
| osv-2023-1214 | Heap-buffer-overflow in NetworkInterface::dissectPacket | 2023-11-25T13:00:09.439553Z | 2023-11-25T13:00:09.439802Z |
| osv-2023-1208 | Heap-buffer-overflow in ih264d_format_convert | 2023-11-24T13:01:18.411662Z | 2023-11-24T13:01:18.411934Z |
| osv-2023-1207 | Heap-buffer-overflow in isvcd_start_of_pic | 2023-11-24T13:00:50.874577Z | 2023-11-24T13:00:50.874889Z |
| osv-2023-1206 | Heap-buffer-overflow in ih264d_format_convert | 2023-11-24T13:00:18.041607Z | 2023-11-24T13:00:18.041977Z |
| osv-2023-1205 | Heap-buffer-overflow in isvcd_populate_res_prms | 2023-11-24T13:00:14.783667Z | 2025-01-10T05:07:48.976928Z |
| osv-2023-1203 | Global-buffer-overflow in dissect_zcl_read_attr_struct | 2023-11-23T13:02:42.762508Z | 2023-11-23T13:02:42.762762Z |
| osv-2023-1201 | Negative-size-param in pcpp::RawPacket::insertData | 2023-11-23T13:01:26.936730Z | 2025-01-13T14:49:54.727943Z |
| osv-2023-1195 | Security exception in java.base/java.util.HashMap.resize | 2023-11-22T13:03:08.334211Z | 2024-04-29T11:21:55.852772Z |
| osv-2023-1186 | Heap-use-after-free in dxf_tables_read | 2023-11-20T13:02:13.320596Z | 2024-04-27T14:07:56.082417Z |
| osv-2023-1184 | Global-buffer-overflow in dissect_zcl_read_attr_struct | 2023-11-20T13:00:42.304213Z | 2023-11-20T13:00:42.304481Z |
| osv-2023-1180 | Heap-buffer-overflow in ih264d_sev | 2023-11-19T13:01:31.125934Z | 2023-11-19T13:01:31.126224Z |
| osv-2023-1179 | Index-out-of-bounds in iaace_calc_sfb_dist | 2023-11-18T13:02:51.211821Z | 2023-11-18T13:02:51.213081Z |
| osv-2023-1177 | Heap-buffer-overflow in Gfx::ICC::TextDescriptionTagData::from_bytes | 2023-11-18T13:01:39.155430Z | 2023-11-18T13:01:39.155768Z |
| osv-2023-1174 | Stack-buffer-overflow in std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<ch | 2023-11-17T13:00:58.541560Z | 2023-11-17T13:00:58.541823Z |
| osv-2023-1173 | Heap-buffer-overflow in fill_lines | 2023-11-17T13:00:49.902117Z | 2023-11-17T13:00:49.902383Z |
| osv-2023-1172 | Heap-buffer-overflow in pcpp::TLVRecordReader<pcpp::TcpOption>::getTLVRecord | 2023-11-16T13:03:00.976378Z | 2023-11-16T13:03:00.976647Z |
| osv-2023-1171 | Heap-buffer-overflow in pcpp::SomeIpSdLayer::SomeIpSdLayer | 2023-11-16T13:02:56.384461Z | 2023-11-16T13:02:56.384702Z |
| osv-2023-1170 | UNKNOWN READ in loader_log | 2023-11-16T13:02:54.951826Z | 2025-01-10T05:15:17.036441Z |
| osv-2023-1169 | Heap-buffer-overflow in epassNUMBER_pkcs15_generate_key | 2023-11-16T13:02:37.833543Z | 2023-11-16T13:02:37.833956Z |
| osv-2023-1168 | Heap-buffer-overflow in pcpp::PPP_PPTPLayer::computeCalculateFields | 2023-11-16T13:00:57.037733Z | 2025-03-28T14:23:56.681348Z |
| osv-2023-1167 | UNKNOWN WRITE in php_strip_url_passwd | 2023-11-16T13:00:21.458665Z | 2023-11-23T16:50:04.455264Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2021-0037 | Fix a use-after-free bug in diesels Sqlite backend | 2021-03-05T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0035 | `quinn` invalidly assumes the memory layout of std::net::SocketAddr | 2021-03-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0036 | Intern<T>: Data race allowed on T | 2021-03-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0032 | Deserializing an array can drop uninitialized memory on panic | 2021-03-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0062 | project abandoned; migrate to the `aes-siv` crate | 2021-02-28T12:00:00Z | 2021-05-03T19:05:09Z |
| rustsec-2021-0052 | Multiple functions can cause double-frees | 2021-02-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0050 | swap_index can write out of bounds and return uninitialized memory | 2021-02-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0033 | push_cloned can drop uninitialized memory or double free on panic | 2021-02-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0026 | XSS in `comrak` | 2021-02-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0048 | StackVec::extend can write out of bounds when size_hint is incorrect | 2021-02-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0047 | SliceDeque::drain_filter can double drop an element if the predicate panics | 2021-02-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0028 | Multiple memory safety issues in insert_row | 2021-02-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0049 | `through` and `through_and` causes a double free if the map function panics | 2021-02-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0030 | move_elements can double-free objects on panic | 2021-02-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0112 | `Read` on uninitialized buffer may cause UB ('tectonic_xdv' crate) | 2021-02-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0046 | misc::vec_with_size() can drop uninitialized memory if clone panics | 2021-02-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0043 | PartialReader passes uninitialized memory to user-provided Read | 2021-02-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0029 | Tape::take_bytes exposes uninitialized memory to a user-provided Read | 2021-02-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0025 | crate has been renamed to `qjsonrpc` | 2021-02-15T12:00:00Z | 2021-02-15T16:43:30Z |
| rustsec-2021-0024 | crate has been renamed to `sn_api` | 2021-02-15T12:00:00Z | 2021-02-15T16:43:30Z |
| rustsec-2021-0021 | `nb-connect` invalidly assumes the memory layout of std::net::SocketAddr | 2021-02-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0023 | Incorrect check on buffer length when seeding RNGs | 2021-02-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0044 | Use after free possible in `uri::Formatter` on panic | 2021-02-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0022 | Use-after-free in `subscript_next` and `subscript_prev` wrappers | 2021-02-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0020 | Multiple Transfer-Encoding headers misinterprets request payload | 2021-02-05T12:00:00Z | 2021-10-19T22:14:35Z |
| rustsec-2021-0034 | office is unmaintained, use calamine instead | 2021-02-04T12:00:00Z | 2021-03-03T18:06:07Z |
| rustsec-2021-0019 | Multiple soundness issues | 2021-02-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0094 | Window can read out of bounds if Read instance returns more bytes than buffer size | 2021-02-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0018 | insert_slice_clone can double drop if Clone panics. | 2021-02-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0051 | KeyValueReader passes uninitialized memory to Read instance | 2021-01-31T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-mongodb-2025-11979 | Use-after-free in the MongoDB server query planner may lead to crash or undefined behavior | 2025-12-06T11:42:46.232Z | 2025-12-06T12:06:23.267Z |
| bit-golang-2025-61727 | Improper application of excluded DNS name constraints when verifying wildcard names in crypto/x509 | 2025-12-06T11:41:09.464Z | 2025-12-06T12:06:23.267Z |
| bit-envoy-2025-66220 | Envoy’s TLS certificate matcher for `match_typed_subject_alt_names` may incorrectly treat certificates containing an embedded null byte | 2025-12-06T11:38:21.122Z | 2025-12-09T12:08:00.393Z |
| bit-envoy-2025-64763 | Envoy forwards early CONNECT data in TCP proxy mode | 2025-12-06T11:38:19.488Z | 2025-12-09T12:08:00.393Z |
| bit-envoy-2025-64527 | Envoy crashes when JWT authentication is configured with the remote JWKS fetching | 2025-12-06T11:38:17.923Z | 2025-12-09T12:08:00.393Z |
| bit-python-2025-6075 | Quadratic complexity in os.path.expandvars() with user-controlled template | 2025-12-05T11:13:34.373Z | 2026-04-10T09:26:18.172Z |
| bit-python-2025-13837 | Out-of-memory when loading Plist | 2025-12-05T11:13:08.742Z | 2026-03-04T14:21:20.421Z |
| bit-python-2025-13836 | Excessive read buffering DoS in http.client | 2025-12-05T11:13:05.077Z | 2026-01-27T09:14:53.416Z |
| bit-libpython-2025-6075 | Quadratic complexity in os.path.expandvars() with user-controlled template | 2025-12-05T11:08:28.184Z | 2026-04-10T09:26:18.172Z |
| bit-libpython-2025-13837 | Out-of-memory when loading Plist | 2025-12-05T11:07:43.325Z | 2026-03-04T14:21:20.421Z |
| bit-libpython-2025-13836 | Excessive read buffering DoS in http.client | 2025-12-05T11:07:36.854Z | 2026-01-27T09:14:53.416Z |
| bit-golang-2025-61729 | Excessive resource consumption when printing error string for host certificate validation in crypto/x509 | 2025-12-04T11:41:52.637Z | 2025-12-04T12:07:39.656Z |
| bit-activemq-2025-27533 | Apache ActiveMQ: Unchecked buffer length can cause excessive memory allocation | 2025-12-03T14:35:40.173Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2023-46604 | Apache ActiveMQ, Apache ActiveMQ Legacy OpenWire Module: Unbounded deserialization causes ActiveMQ to be vulnerable to a remote code execution (RCE) attack | 2025-12-03T14:35:38.733Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2022-41678 | Apache ActiveMQ: Insufficient API restrictions on Jolokia allow authenticated users to perform RCE | 2025-12-03T14:35:37.010Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-26117 | ActiveMQ: LDAP-Authentication does not verify passwords on servers with anonymous bind | 2025-12-03T14:35:35.296Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21351 | XStream is vulnerable to an Arbitrary Code Execution attack | 2025-12-03T14:35:33.786Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21350 | XStream is vulnerable to an Arbitrary Code Execution attack | 2025-12-03T14:35:32.295Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21349 | A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host | 2025-12-03T14:35:30.789Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21348 | XStream is vulnerable to an attack using Regular Expression for a Denial of Service (ReDos) | 2025-12-03T14:35:29.299Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21347 | XStream is vulnerable to an Arbitrary Code Execution attack | 2025-12-03T14:35:27.664Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21346 | XStream is vulnerable to an Arbitrary Code Execution attack | 2025-12-03T14:35:26.027Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21345 | XStream is vulnerable to a Remote Command Execution attack | 2025-12-03T14:35:24.382Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21344 | XStream is vulnerable to an Arbitrary Code Execution attack | 2025-12-03T14:35:22.678Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21343 | XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling as long as the executing process has sufficient rights | 2025-12-03T14:35:21.073Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21342 | A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host | 2025-12-03T14:35:19.481Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21341 | XStream can cause a Denial of Service | 2025-12-03T14:35:17.881Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2020-26217 | Remote Code Execution in XStream | 2025-12-03T14:35:16.352Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2020-1941 | 2025-12-03T14:35:14.779Z | 2025-12-03T15:08:24.036Z | |
| bit-activemq-2020-13947 | 2025-12-03T14:35:13.393Z | 2025-12-03T15:08:24.036Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-fz95989 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:40:52.734894Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-la33013 | Within HostnameError | 2026-01-30T14:40:22.526589Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mz27698 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:39:52.940858Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jm36781 | Within HostnameError | 2026-01-30T14:37:22.513933Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fr00621 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:36:52.496829Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dl37890 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:36:22.812571Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pk92575 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T14:35:52.456913Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gs30434 | Within HostnameError | 2026-01-30T14:35:22.588418Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ym75307 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:34:22.430652Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-di78859 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:24:51.733190Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ng71279 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:23:51.400746Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ez98723 | Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a ... | 2026-01-30T14:21:51.714006Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ju65303 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:18:21.426991Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nj87139 | vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device | 2026-01-30T14:17:21.473350Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yl27116 | tar | 2026-01-30T14:08:51.064236Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-py85990 | tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing | 2026-01-30T14:07:50.722290Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ym28538 | Prometheus Blackbox Exporter through 0 | 2026-01-30T14:06:20.601766Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zl24388 | Prometheus Blackbox Exporter through 0 | 2026-01-30T14:05:50.598465Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-la13761 | vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device | 2026-01-30T14:05:50.594365Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xz45798 | Within HostnameError | 2026-01-30T14:05:20.961893Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-th00404 | Within HostnameError | 2026-01-30T14:04:20.735662Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xb70091 | Within HostnameError | 2026-01-30T14:03:50.560679Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pd99018 | Within HostnameError | 2026-01-30T14:02:50.913977Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kg18353 | Within HostnameError | 2026-01-30T14:02:50.542288Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cd92481 | Within HostnameError | 2026-01-30T14:01:20.457302Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yk82785 | Within HostnameError | 2026-01-30T14:01:20.108833Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sg80587 | It was found that the cookie used for CSRF prevention in Keycloak was not unique to each session | 2026-01-30T14:00:21.027172Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bk59402 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T14:00:20.262469Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gy69323 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T14:00:20.037168Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mj64494 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T13:59:20.370058Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0902 | Multiples vulnérabilités dans Xen | 2025-10-22T00:00:00.000000 | 2025-10-22T00:00:00.000000 |
| certfr-2025-avi-0901 | Vulnérabilité dans Google Chrome | 2025-10-22T00:00:00.000000 | 2025-10-22T00:00:00.000000 |
| certfr-2025-avi-0900 | Multiples vulnérabilités dans Centreon Web | 2025-10-22T00:00:00.000000 | 2025-10-22T00:00:00.000000 |
| certfr-2025-avi-0899 | Multiples vulnérabilités dans les produits Microsoft | 2025-10-20T00:00:00.000000 | 2025-10-20T00:00:00.000000 |
| certfr-2025-avi-0898 | Vulnérabilité dans Microsoft Edge | 2025-10-20T00:00:00.000000 | 2025-10-20T00:00:00.000000 |
| certfr-2025-avi-0897 | Multiples vulnérabilités dans Tenable Identity Exposure | 2025-10-20T00:00:00.000000 | 2025-10-20T00:00:00.000000 |
| certfr-2025-avi-0896 | Multiples vulnérabilités dans les produits IBM | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| certfr-2025-avi-0895 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| certfr-2025-avi-0894 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| certfr-2025-avi-0893 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| certfr-2025-avi-0892 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| certfr-2025-avi-0891 | Vulnérabilité dans MongoDB Connector for BI pour Windows | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| certfr-2025-avi-0890 | Multiples vulnérabilités dans les produits Moxa | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| certfr-2025-avi-0889 | Vulnérabilité dans Squid | 2025-10-17T00:00:00.000000 | 2025-10-17T00:00:00.000000 |
| certfr-2025-avi-0888 | Multiples vulnérabilités dans les produits Mattermost | 2025-10-16T00:00:00.000000 | 2025-11-14T00:00:00.000000 |
| certfr-2025-avi-0887 | Vulnérabilité dans Synacor Zimbra Collaboration | 2025-10-16T00:00:00.000000 | 2025-10-16T00:00:00.000000 |
| certfr-2025-avi-0886 | Multiples vulnérabilités dans les produits F5 | 2025-10-16T00:00:00.000000 | 2025-10-16T00:00:00.000000 |
| certfr-2025-avi-0885 | Multiples vulnérabilités dans Samba | 2025-10-16T00:00:00.000000 | 2025-10-16T00:00:00.000000 |
| certfr-2025-avi-0884 | Multiples vulnérabilités dans les produits Cisco | 2025-10-16T00:00:00.000000 | 2025-10-16T00:00:00.000000 |
| certfr-2025-avi-0883 | Multiples vulnérabilités dans les produits Spring | 2025-10-16T00:00:00.000000 | 2025-10-16T00:00:00.000000 |
| certfr-2025-avi-0882 | Multiples vulnérabilités dans les produits Microsoft | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| certfr-2025-avi-0881 | Multiples vulnérabilités dans Microsoft Azure | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| certfr-2025-avi-0880 | Multiples vulnérabilités dans Microsoft .Net | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| certfr-2025-avi-0879 | Multiples vulnérabilités dans Microsoft Windows | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| certfr-2025-avi-0878 | Multiples vulnérabilités dans Microsoft Office | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| certfr-2025-avi-0877 | Multiples vulnérabilités dans les produits Ivanti | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| certfr-2025-avi-0876 | Multiples vulnérabilités dans les produits Adobe | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| certfr-2025-avi-0875 | Vulnérabilité dans Google Chrome | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| certfr-2025-avi-0874 | Vulnérabilité dans Schneider Electric EcoStruxure | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| certfr-2025-avi-0873 | Multiples vulnérabilités dans les produits Mozilla | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2022-002691 | Multiple vulnerabilities in OMRON products | 2022-11-10T09:46+09:00 | 2022-11-10T09:46+09:00 |
| jvndb-2022-000085 | WordPress Plugin "Salon booking system" vulnerable to cross-site scripting | 2022-11-08T15:07+09:00 | 2024-06-05T18:07+09:00 |
| jvndb-2022-000087 | Multiple vulnerabilities in WordPress | 2022-11-08T14:59+09:00 | 2024-06-06T16:27+09:00 |
| jvndb-2022-000079 | Multiple vulnerabilities in the web interfaces of Kyocera Document Solutions MFPs and printers | 2022-11-01T14:51+09:00 | 2024-06-06T17:01+09:00 |
| jvndb-2022-000084 | Multiple vulnerabilities in FUJI SOFT network devices | 2022-10-28T15:12+09:00 | 2024-06-06T16:48+09:00 |
| jvndb-2022-000083 | Multiple vulnerabilities in SHIRASAGI | 2022-10-25T15:10+09:00 | 2024-06-05T16:06+09:00 |
| jvndb-2022-000082 | Multiple vulnerabilities in nadesiko3 | 2022-10-20T16:58+09:00 | 2024-06-05T17:28+09:00 |
| jvndb-2022-002544 | Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service | 2022-10-20T16:18+09:00 | 2024-06-13T13:58+09:00 |
| jvndb-2022-002537 | Stack-based buffer overflow vulnerability in Yokogawa Test & Measurement WTViewerE | 2022-10-19T16:23+09:00 | 2024-06-12T16:54+09:00 |
| jvndb-2022-000081 | Lemon8 App fails to restrict access permissions | 2022-10-19T14:08+09:00 | 2024-06-12T16:39+09:00 |
| jvndb-2022-000080 | Android App "IIJ SmartKey" vulnerable to information disclosure | 2022-10-14T13:57+09:00 | 2024-06-27T13:40+09:00 |
| jvndb-2022-002451 | Multiple vulnerabilities in SVMPC1 and SVMPC2 | 2022-10-13T17:27+09:00 | 2024-05-30T16:38+09:00 |
| jvndb-2022-000078 | bingo!CMS vulnerable to authentication bypass | 2022-10-11T17:49+09:00 | 2024-05-30T17:57+09:00 |
| jvndb-2022-002448 | Multiple vulnerabilities in Trend Micro Deep Security and Cloud One - Workload Security agents for Windows | 2022-10-11T17:02+09:00 | 2024-06-13T14:30+09:00 |
| jvndb-2022-000077 | The installer of Sony Content Transfer may insecurely load Dynamic Link Libraries | 2022-10-11T15:08+09:00 | 2024-06-12T12:12+09:00 |
| jvndb-2022-000076 | Growi vulnerable to improper access control | 2022-10-07T14:30+09:00 | 2024-06-12T12:04+09:00 |
| jvndb-2022-000075 | IPFire WebUI vulnerable to cross-site scripting | 2022-10-06T13:05+09:00 | 2024-06-12T14:28+09:00 |
| jvndb-2022-002444 | Multiple vulnerabilities in Buffalo network devices | 2022-10-05T17:44+09:00 | 2022-10-13T16:28+09:00 |
| jvndb-2022-002443 | Privilege Escalation Vulnerability in Hitachi Storage Plug-in for VMware vCenter | 2022-10-05T17:28+09:00 | 2022-10-05T17:28+09:00 |
| jvndb-2022-000074 | BookStack vulnerable to cross-site scripting | 2022-09-30T14:48+09:00 | 2024-06-12T14:07+09:00 |
| jvndb-2022-002367 | OpenAM (OpenAM Consortium Edition) vulnerable to open redirect | 2022-09-16T15:30+09:00 | 2024-06-13T11:39+09:00 |
| jvndb-2022-000073 | Multiple vulnerabilities in EC-CUBE | 2022-09-15T16:30+09:00 | 2024-06-13T11:09+09:00 |
| jvndb-2022-000072 | EC-CUBE plugin "Product Image Bulk Upload Plugin" vulnerable to insufficient verification in uploading files | 2022-09-15T16:13+09:00 | 2024-06-13T11:03+09:00 |
| jvndb-2022-000071 | Multiple vulnerabilities in Trend Micro Apex One and Trend Micro Apex One as a Service | 2022-09-14T18:15+09:00 | 2024-06-13T11:34+09:00 |
| jvndb-2022-002364 | DoS Vulnerability in uCosminexus TP1/Client/J and Cosminexus Service Coordinator | 2022-09-14T11:34+09:00 | 2022-09-14T11:34+09:00 |
| jvndb-2022-000070 | Movable Type plugin A-Form vulnerable to cross-site scripting | 2022-09-09T15:01+09:00 | 2024-06-13T13:49+09:00 |
| jvndb-2022-000068 | SYNCK GRAPHICA Mailform Pro CGI vulnerable to information disclosure | 2022-09-05T15:22+09:00 | 2024-06-13T16:00+09:00 |
| jvndb-2022-002346 | Multiple vulnerabilities in Contec FLEXLAN FX3000 and FX2000 series | 2022-09-02T18:08+09:00 | 2022-09-02T18:08+09:00 |
| jvndb-2022-000069 | PowerCMS XMLRPC API vulnerable to command injection | 2022-09-02T15:49+09:00 | 2024-06-13T11:44+09:00 |
| jvndb-2022-000066 | Multiple vulnerabilities in CentreCOM AR260S V2 | 2022-08-29T17:37+09:00 | 2024-06-13T16:21+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-12871 | Adobe DNG SDK缓冲区溢出漏洞 | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12870 | Adobe After Effects缓冲区溢出漏洞(CNVD-2026-12870) | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12869 | Adobe After Effects资源管理错误漏洞(CNVD-2026-12869) | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12868 | Adobe After Effects资源管理错误漏洞(CNVD-2026-12868) | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12867 | Adobe After Effects资源管理错误漏洞 | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12866 | Adobe After Effects输入验证错误漏洞(CNVD-2026-12866) | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12865 | Adobe After Effects类型混淆漏洞 | 2026-02-25 | 2026-03-09 |
| cnvd-2026-12561 | Microsoft Defender for Linux代码执行漏洞 | 2026-02-25 | 2026-03-04 |
| cnvd-2026-14508 | Adobe Audition越界写入漏洞(CNVD-2026-14508) | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14507 | Adobe Substance3D Designer越界写入漏洞 | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14506 | Adobe Audition越界读取漏洞(CNVD-2026-14506) | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14505 | Adobe Audition缓冲区溢出漏洞(CNVD-2026-14505) | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14504 | Adobe Substance3D Designer缓冲区溢出漏洞(CNVD-2026-14504) | 2026-02-24 | 2026-03-23 |
| cnvd-2026-12875 | Adobe Substance3D Designer缓冲区溢出漏洞(CNVD-2026-12875) | 2026-02-24 | 2026-03-09 |
| cnvd-2026-12874 | Adobe Substance3D Designer代码问题漏洞 | 2026-02-24 | 2026-03-09 |
| cnvd-2026-12873 | Adobe Audition缓冲区溢出漏洞 | 2026-02-24 | 2026-03-09 |
| cnvd-2026-12872 | Adobe Substance3D Designer缓冲区溢出漏洞(CNVD-2026-12872) | 2026-02-24 | 2026-03-09 |
| cnvd-2026-12894 | Apache Druid认证绕过漏洞 | 2026-02-13 | 2026-03-04 |
| cnvd-2026-16403 | HCL AION信息泄露漏洞(CNVD-2026-16403) | 2026-02-11 | 2026-04-09 |
| cnvd-2026-16402 | HCL AION存在未明漏洞(CNVD-2026-16402) | 2026-02-11 | 2026-04-09 |
| cnvd-2026-16401 | HCL AION跨站请求伪造漏洞 | 2026-02-11 | 2026-04-08 |
| cnvd-2026-16400 | HCL AION跨站脚本漏洞 | 2026-02-11 | 2026-04-08 |
| cnvd-2026-16399 | HCL AION存在未明漏洞(CNVD-2026-16399) | 2026-02-11 | 2026-04-08 |
| cnvd-2026-16398 | HCL AION命令注入漏洞 | 2026-02-11 | 2026-04-08 |
| cnvd-2026-16397 | HCL AION信息泄露漏洞(CNVD-2026-16397) | 2026-02-11 | 2026-04-08 |
| cnvd-2026-16067 | WordPress插件ELEX WordPress HelpDesk & Customer Ticketing System存在未明漏洞 | 2026-02-11 | 2026-04-03 |
| cnvd-2026-15249 | TOTOLINK WA300操作系统命令注入漏洞 | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14679 | IBM Db2拒绝服务漏洞(CNVD-2026-14679) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14678 | IBM Db2拒绝服务漏洞(CNVD-2026-14678) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14677 | IBM Db2存在未明漏洞(CNVD-2026-14677) | 2026-02-11 | 2026-03-24 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-00946 | Уязвимость функции formSetIptv() микропрограммного обеспечения маршрутизаторов Tenda AX3,… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00945 | Уязвимость функции sub_727F4() микропрограммного обеспечения маршрутизаторов Tenda AX-180… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00944 | Уязвимость функции sub_60CFC() микропрограммного обеспечения маршрутизаторов Tenda AX-180… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00943 | Уязвимость микропрограммного обеспечения беспроводных Wi-Fi маршрутизаторов Tenda W30E, с… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00942 | Уязвимость механизма CORS микропрограммного обеспечения беспроводных Wi-Fi маршрутизаторо… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00941 | Уязвимость микропрограммного обеспечения беспроводных Wi-Fi маршрутизаторов Tenda W30E, с… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00940 | Уязвимость микропрограммного обеспечения маршрутизаторов Tenda AC23, связанная с выходом … | 29.01.2026 | 29.01.2026 |
| bdu:2026-00939 | Уязвимость микропрограммного обеспечения беспроводных Wi-Fi маршрутизаторов Tenda W30E, с… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00938 | Уязвимость микропрограммного обеспечения беспроводных Wi-Fi маршрутизаторов Tenda W30E, с… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00937 | Уязвимость микропрограммного обеспечения беспроводных Wi-Fi маршрутизаторов Tenda W30E, с… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00936 | Уязвимость функции sub_41E2A0() файла /goform/set_mode микропрограммного обеспечения марш… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00935 | Уязвимость функции setUnloadUserData() сценария /cgi-bin/cstecgi.cgi микропрограммного об… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00934 | Уязвимость программного обеспечения управления ИТ-инфраструктурой SolarWinds Web Help Des… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00933 | Уязвимость программного обеспечения управления ИТ-инфраструктурой SolarWinds Web Help Des… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00932 | Уязвимость программного обеспечения управления ИТ-инфраструктурой SolarWinds Web Help Des… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00931 | Уязвимость программного обеспечения управления ИТ-инфраструктурой SolarWinds Web Help Des… | 29.01.2026 | 29.01.2026 |
| bdu:2026-00930 | Уязвимость программного обеспечения управления ИТ-инфраструктурой SolarWinds Web Help Des… | 29.01.2026 | 13.02.2026 |
| bdu:2026-00929 | Уязвимость DSP-сервиса микропрограммного обеспечения встраиваемых плат Qualcomm, позволяю… | 29.01.2026 | 04.02.2026 |
| bdu:2026-00928 | Уязвимость прошивки WLAN микропрограммного обеспечения встраиваемых плат Qualcomm, позвол… | 29.01.2026 | 04.02.2026 |
| bdu:2026-00927 | Уязвимость прошивки WLAN микропрограммного обеспечения встраиваемых плат Qualcomm, позвол… | 29.01.2026 | 04.02.2026 |
| bdu:2026-00926 | Уязвимость микропрограммного обеспечения встраиваемых плат Qualcomm, связанная с чтением … | 29.01.2026 | 04.02.2026 |
| bdu:2026-00925 | Уязвимость прошивки WLAN микропрограммного обеспечения встраиваемых плат Qualcomm, позвол… | 29.01.2026 | 04.02.2026 |
| bdu:2026-00924 | Уязвимость драйвера камеры микропрограммного обеспечения встраиваемых плат Qualcomm, позв… | 29.01.2026 | 04.02.2026 |
| bdu:2026-00923 | Уязвимость микропрограммного обеспечения встраиваемых плат Qualcomm, вызванная переполнен… | 29.01.2026 | 04.02.2026 |
| bdu:2026-00922 | Уязвимость службы DSP (Digital Signal Processor) микропрограммного обеспечения встраиваем… | 29.01.2026 | 04.02.2026 |
| bdu:2026-00921 | Уязвимость программного обеспечения для удалённого доступа и управления RuDesktop, связан… | 29.01.2026 | 13.02.2026 |
| bdu:2026-00920 | Уязвимость программного обеспечения для удалённого доступа и управления RuDesktop, сущест… | 29.01.2026 | 13.02.2026 |
| bdu:2026-00919 | Уязвимость программного обеспечения для удалённого доступа и управления RuDesktop, сущест… | 29.01.2026 | 13.02.2026 |
| bdu:2026-00918 | Уязвимость программного обеспечения для удалённого доступа и управления RuDesktop, связан… | 29.01.2026 | 13.02.2026 |
| bdu:2026-00917 | Уязвимость микропрограммного обеспечения беспроводных Wi-Fi маршрутизаторов Tenda W30E, с… | 28.01.2026 | 28.01.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200701-0398 | Format string vulnerability in Apple Installer 2.1.5 on Mac OS X 10.4.8 allows user-assis… | 2026-03-09T23:20:47.746000Z |
| var-200103-0056 | Network Dynamic Data Exchange (DDE) in Windows 2000 allows local users to gain SYSTEM pri… | 2026-03-09T23:20:37.419000Z |
| var-201302-0406 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-09T23:20:23.411000Z |
| var-201902-0855 | png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_im… | 2026-03-09T23:19:31.919000Z |
| var-202112-0566 | Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2… | 2026-03-09T23:19:31.555000Z |
| var-200609-0310 | Multiple buffer overflows in Apple QuickTime before 7.1.3 allow user-assisted remote atta… | 2026-03-09T23:19:31.248000Z |
| var-201904-1410 | A use after free issue was addressed with improved memory management. This issue affected… | 2026-03-09T23:19:25.414000Z |
| var-201710-1403 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari befo… | 2026-03-09T23:19:24.139000Z |
| var-201007-0320 | WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before… | 2026-03-09T23:19:24.078000Z |
| var-201302-0249 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-09T23:19:23.548000Z |
| var-200701-0400 | crashdump in Apple Mac OS X 10.4.8 allows local users in the admin group to modify arbitr… | 2026-03-09T23:19:15.361000Z |
| var-201605-0077 | The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consi… | 2026-03-09T23:19:14.369000Z |
| var-201707-1241 | In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]A… | 2026-03-09T23:18:28.982000Z |
| var-201511-0126 | Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpn… | 2026-03-09T23:18:25.753000Z |
| var-201206-0053 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-09T23:18:23.287000Z |
| var-202105-1311 | A flaw was found in Wildfly in versions before 23.0.2.Final while creating a new role in … | 2026-03-09T23:18:14.743000Z |
| var-201904-0755 | A use after free issue was addressed with improved memory management. This issue affected… | 2026-03-09T23:17:44.178000Z |
| var-200608-0030 | Unspecified vulnerability in the "compression state handling" in Bom for Apple Mac OS X 1… | 2026-03-09T23:17:40.552000Z |
| var-201211-0356 | Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml… | 2026-03-09T23:17:40.167000Z |
| var-201306-0259 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-09T23:17:01.807000Z |
| var-202006-1831 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2026-03-09T23:16:23.977000Z |
| var-202201-0304 | A logic issue was addressed with improved state management. This issue is fixed in iOS 15… | 2026-03-09T23:16:23.720000Z |
| var-201011-0019 | libxml2 before 2.7.8, as used in Google Chrome before 7.0.517.44, Apple Safari 5.0.2 and … | 2026-03-09T23:16:18.745000Z |
| var-201808-1002 | Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo… | 2026-03-09T23:16:18.403000Z |
| var-201302-0137 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-09T23:15:40.873000Z |
| var-202010-1265 | A command injection issue existed in Web Inspector. This issue was addressed with improve… | 2026-03-09T23:15:40.634000Z |
| var-201006-1241 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 throug… | 2026-03-09T23:15:03.538000Z |
| var-201304-0372 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-09T23:15:03.303000Z |
| var-200602-0446 | The "Open 'safe' files after downloading" option in Safari on Apple Mac OS X allows remot… | 2026-03-09T23:14:43.450000Z |
| var-201009-0229 | Stack-based buffer overflow in the bgp_route_refresh_receive function in bgp_packet.c in … | 2026-03-09T23:14:11.354000Z |