Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-5928 |
7.5 (3.1)
|
Static buffer overflow in deprecated nis_local_principal |
The GNU C Library |
glibc |
2026-04-20T20:37:31.743Z | 2026-04-21T19:49:59.071Z |
| CVE-2026-5358 |
N/A
|
REJECTED: CVE-2026-5358 is rejected for two reasons. Firstly it has been discovered that no NIS+ client or server was ever released for any Linux-based OS distributions and as such this makes the API provisional and unused. Secondly it has been discovered that the NIS+ cold start cache (/var/nis/NIS_COLD_START) cannot be bypassed and as such the API can only be called with a trusted server from the pre-populated cache. The use of a trusted server means no trust boundary is crossed and this is therefore considered a normal bug. | N/A | N/A | 2026-04-20T20:37:23.178Z | 2026-04-22T13:04:20.656Z |
| CVE-2026-33626 |
7.5 (3.1)
|
LMDeploy Vulnerable to Server-Side Request Forgery (SS… |
InternLM |
lmdeploy |
2026-04-20T20:29:19.558Z | 2026-04-21T19:50:13.326Z |
| CVE-2026-4852 |
6.4 (3.1)
|
Image Source Control Lite – Show Image Credits and Cap… |
webzunft |
Image Source Control Lite – Show Image Credits and Captions |
2026-04-20T20:26:53.256Z | 2026-04-21T13:53:14.507Z |
| CVE-2026-33432 |
7.7 (4.0)
|
Roxy-WI has Pre-Authentication LDAP Injection that Lea… |
roxy-wi |
roxy-wi |
2026-04-20T20:26:52.217Z | 2026-04-21T17:38:09.523Z |
| CVE-2026-33431 |
5.7 (4.0)
|
Roxy-WI Vulnerable to Authenticated Arbitrary File Rea… |
roxy-wi |
roxy-wi |
2026-04-20T20:24:15.319Z | 2026-04-21T13:42:19.802Z |
| CVE-2026-34403 |
5.5 (4.0)
|
Nginx-UI vulnerable to Cross-Site WebSocket Hijacking … |
0xJacky |
nginx-ui |
2026-04-20T20:16:47.597Z | 2026-04-21T13:36:46.510Z |
| CVE-2026-33031 |
8.6 (4.0)
|
Nginx-UI: Disabled users retain full API access throug… |
0xJacky |
nginx-ui |
2026-04-20T20:12:07.905Z | 2026-04-21T13:35:20.144Z |
| CVE-2026-32613 |
10 (3.1)
|
Spinnaker vulnerable to RCE via expression parsing due… |
spinnaker |
spinnaker |
2026-04-20T20:07:24.697Z | 2026-04-22T03:56:18.686Z |
| CVE-2026-32604 |
10 (3.1)
|
Spinnaker vulnerable to RCE when using gitrepo artifac… |
spinnaker |
spinnaker |
2026-04-20T20:00:57.517Z | 2026-04-22T03:56:17.486Z |
| CVE-2026-6249 |
8.7 (4.0)
8.8 (3.1)
|
Vvveb CMS 1.0.8 Remote Code Execution via Media Upload |
Vvveb |
Vvveb CMS |
2026-04-20T19:57:37.655Z | 2026-04-21T13:43:17.635Z |
| CVE-2026-32311 |
9.3 (4.0)
|
Command Injection and Docker container escape allows r… |
reconurge |
flowsint |
2026-04-20T19:56:32.521Z | 2026-04-21T13:44:08.776Z |
| CVE-2026-5478 |
8.1 (3.1)
|
Everest Forms <= 3.4.4 - Unauthenticated Arbitrary Fil… |
wpeverest |
Everest Forms – Contact Form, Payment Form, Quiz, Survey & Custom Form Builder |
2026-04-20T19:27:08.159Z | 2026-04-21T13:33:57.569Z |
| CVE-2026-32135 |
7.7 (4.0)
|
NanoMQ has Heap Buffer Overflow in URI Parameter Parsing |
nanomq |
nanomq |
2026-04-20T19:23:09.704Z | 2026-04-21T13:33:14.607Z |
| CVE-2026-6550 |
4.7 (3.1)
5.7 (4.0)
|
Key commitment policy bypass via shared key cache in A… |
AWS |
AWS Encryption SDK for Python |
2026-04-20T19:20:23.383Z | 2026-04-20T19:44:11.685Z |
| CVE-2026-6257 |
9.2 (4.0)
9.1 (3.1)
|
Vvveb CMS v1.0.8 Remote Code Execution via Media Management |
Vvveb |
Vvveb CMS |
2026-04-20T19:09:45.927Z | 2026-04-21T19:50:26.897Z |
| CVE-2026-6248 |
8.1 (3.1)
|
wpForo Forum <= 3.0.5 - Authenticated (Subscriber+) Ar… |
tomdever |
wpForo Forum |
2026-04-20T18:31:33.290Z | 2026-04-21T17:35:30.317Z |
| CVE-2026-6060 |
4.5 (3.1)
|
Possible DoS via SQL Box |
OTRS AG |
OTRS |
2026-04-20T18:20:01.664Z | 2026-04-20T18:48:48.185Z |
| CVE-2026-41389 |
6.3 (4.0)
5.8 (3.1)
|
OpenClaw 2026.4.7 < 2026.4.15 - Arbitrary File Read vi… |
OpenClaw |
OpenClaw |
2026-04-20T17:48:43.704Z | 2026-04-20T18:05:03.103Z |
| CVE-2026-23753 |
4.8 (4.0)
4.8 (3.1)
|
GFI HelpDesk < 4.99.9 Stored XSS via charset Parameter |
GFI Software |
HelpDesk |
2026-04-20T17:33:59.134Z | 2026-04-21T13:31:13.580Z |
| CVE-2026-23752 |
4.8 (4.0)
4.8 (3.1)
|
GFI HelpDesk < 4.99.9 Stored XSS via companyname Parameter |
GFI Software |
HelpDesk |
2026-04-20T17:33:23.424Z | 2026-04-20T18:09:59.603Z |
| CVE-2026-23756 |
5.1 (4.0)
5.4 (3.1)
|
GFI HelpDesk < 4.99.9 Stored XSS via Troubleshooter St… |
GFI Software |
HelpDesk |
2026-04-20T17:30:51.162Z | 2026-04-20T18:08:49.925Z |
| CVE-2026-23758 |
5.1 (4.0)
6.4 (4.0)
|
GFI HelpDesk < 4.99.9 Stored XSS via editsubject Parameter |
GFI Software |
HelpDesk |
2026-04-20T17:30:06.853Z | 2026-04-20T17:45:55.788Z |
| CVE-2026-23757 |
5.1 (4.0)
5.4 (3.1)
|
GFI HelpDesk < 4.99.10 Stored XSS via Reports Module |
GFI Software |
HelpDesk |
2026-04-20T17:27:56.067Z | 2026-04-20T18:07:01.630Z |
| CVE-2026-6662 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
ericc-ch copilot-api Token Endpoint server.ts cors cro… |
ericc-ch |
copilot-api |
2026-04-20T17:00:17.800Z | 2026-04-20T18:09:27.691Z |
| CVE-2026-35154 |
6.3 (3.1)
|
Dell PowerProtect Data Domain appliances, version… |
Dell |
PowerProtect Data Domain appliances |
2026-04-20T16:50:56.856Z | 2026-04-22T03:56:08.697Z |
| CVE-2026-26951 |
6.7 (3.1)
|
Dell PowerProtect Data Domain, versions 7.7.1.0 t… |
Dell |
PowerProtect Data Domain |
2026-04-20T16:44:49.612Z | 2026-04-22T03:56:07.580Z |
| CVE-2026-22761 |
6.7 (3.1)
|
Dell PowerProtect Data Domain, versions 8.5 throu… |
Dell |
PowerProtect Data Domain |
2026-04-20T16:39:40.268Z | 2026-04-22T03:56:06.445Z |
| CVE-2026-26942 |
6.7 (3.1)
|
Dell PowerProtect Data Domain, versions 8.5 throu… |
Dell |
PowerProtect Data Domain |
2026-04-20T16:34:43.219Z | 2026-04-22T03:56:05.261Z |
| CVE-2026-26943 |
7.2 (3.1)
|
Dell PowerProtect Data Domain, versions 7.7.1.0 t… |
Dell |
PowerProtect Data Domain |
2026-04-20T16:28:53.110Z | 2026-04-22T03:56:04.147Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-41298 |
5.3 (4.0)
5.4 (3.1)
|
OpenClaw < 2026.4.2 - Authorization Bypass in Session … |
OpenClaw |
OpenClaw |
2026-04-20T23:08:11.787Z | 2026-04-21T17:34:23.419Z |
| CVE-2026-41297 |
4.8 (4.0)
7.6 (3.1)
|
OpenClaw < 2026.3.31 - Server-Side Request Forgery via… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:10.955Z | 2026-04-21T13:41:34.057Z |
| CVE-2026-41296 |
8.8 (4.0)
8.2 (3.1)
|
OpenClaw < 2026.3.31 - Sandbox Escape via TOCTOU Race … |
OpenClaw |
OpenClaw |
2026-04-20T23:08:10.194Z | 2026-04-21T19:49:41.570Z |
| CVE-2026-41295 |
8.5 (4.0)
7.8 (3.1)
|
OpenClaw < 2026.4.2 - Untrusted Workspace Channel Shad… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:09.503Z | 2026-04-21T13:35:47.883Z |
| CVE-2026-41294 |
8.5 (4.0)
8.6 (3.1)
|
OpenClaw < 2026.3.28 - Environment Variable Injection … |
OpenClaw |
OpenClaw |
2026-04-20T23:08:08.795Z | 2026-04-21T13:04:36.188Z |
| CVE-2026-41285 |
4.3 (3.1)
|
In OpenBSD through 7.8, the slaacd and rad daemon… |
OpenBSD |
OpenBSD |
2026-04-20T00:00:00.000Z | 2026-04-21T13:27:42.310Z |
| CVE-2026-40045 |
5.9 (4.0)
5.7 (3.1)
|
OpenClaw < 2026.4.2 - Cleartext Credential Transmissio… |
OpenClaw |
OpenClaw |
2026-04-20T23:08:07.952Z | 2026-04-21T13:37:43.951Z |
| CVE-2026-35588 |
6.3 (3.1)
|
Glances has CQL Injection in its Cassandra Export Modu… |
nicolargo |
glances |
2026-04-20T23:20:34.998Z | 2026-04-21T13:35:04.526Z |
| CVE-2026-35587 |
7.3 (4.0)
|
Glances IP Plugin has SSRF via public_api that leads t… |
nicolargo |
glances |
2026-04-20T23:19:02.908Z | 2026-04-22T14:01:47.583Z |
| CVE-2026-35570 |
8.4 (3.1)
|
OpenClaude has Sandbox Bypass via Early-Exit Logic Fla… |
Gitlawb |
openclaude |
2026-04-20T23:24:08.324Z | 2026-04-21T19:49:30.148Z |
| CVE-2026-34839 |
7.7 (4.0)
|
Glances Vulnerable to Cross-Origin Information Disclos… |
nicolargo |
glances |
2026-04-20T23:09:02.551Z | 2026-04-21T19:37:42.399Z |
| CVE-2026-5721 |
4.7 (3.1)
|
wpDataTables – WordPress Data Table, Dynamic Tables & … |
wpdatatables |
wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin |
2026-04-20T22:25:26.695Z | 2026-04-21T19:49:47.411Z |
| CVE-2026-34082 |
5.3 (4.0)
|
Dify has IDOR in deleting someone else's chat conversation |
langgenius |
dify |
2026-04-20T23:03:18.158Z | 2026-04-21T13:36:45.614Z |
| CVE-2026-6729 |
5.3 (4.0)
6.3 (3.1)
|
HKUDS OpenHarness Session Key Collision Privilege Escalation |
HKUDS |
OpenHarness |
2026-04-20T22:01:38.766Z | 2026-04-21T17:39:32.967Z |
| CVE-2026-29643 |
7.1 (3.1)
|
XiangShan (Open-source high-performance RISC-V pr… |
n/a |
n/a |
2026-04-20T00:00:00.000Z | 2026-04-21T19:50:32.463Z |
| CVE-2026-22051 |
2.3 (4.0)
|
StorageGRID (formerly StorageGRID Webscale) versi… |
NETAPP |
StorageGRID (formerly StorageGRID Webscale) |
2026-04-20T21:27:36.822Z | 2026-04-21T13:40:46.948Z |
| CVE-2026-0930 |
2.3 (4.0)
|
Potential wolfSSHd Buffer out-of-bounds Read on Window… |
wolfSSL |
wolfSSH |
2026-04-20T21:28:33.227Z | 2026-04-21T13:37:15.647Z |
| CVE-2026-5928 |
7.5 (3.1)
|
Static buffer overflow in deprecated nis_local_principal |
The GNU C Library |
glibc |
2026-04-20T20:37:31.743Z | 2026-04-21T19:49:59.071Z |
| CVE-2026-5450 |
9.8 (3.1)
|
scanf %mc off-by-one heap buffer overflow |
The GNU C Library |
glibc |
2026-04-20T20:55:41.170Z | 2026-04-21T19:49:53.221Z |
| CVE-2026-5358 |
N/A
|
REJECTED: CVE-2026-5358 is rejected for two reasons. Firstly it has been discovered that no NIS+ client or server was ever released for any Linux-based OS distributions and as such this makes the API provisional and unused. Secondly it has been discovered that the NIS+ cold start cache (/var/nis/NIS_COLD_START) cannot be bypassed and as such the API can only be called with a trusted server from the pre-populated cache. The use of a trusted server means no trust boundary is crossed and this is therefore considered a normal bug. | N/A | N/A | 2026-04-20T20:37:23.178Z | 2026-04-22T13:04:20.656Z |
| CVE-2026-4852 |
6.4 (3.1)
|
Image Source Control Lite – Show Image Credits and Cap… |
webzunft |
Image Source Control Lite – Show Image Credits and Captions |
2026-04-20T20:26:53.256Z | 2026-04-21T13:53:14.507Z |
| CVE-2026-34403 |
5.5 (4.0)
|
Nginx-UI vulnerable to Cross-Site WebSocket Hijacking … |
0xJacky |
nginx-ui |
2026-04-20T20:16:47.597Z | 2026-04-21T13:36:46.510Z |
| CVE-2026-33626 |
7.5 (3.1)
|
LMDeploy Vulnerable to Server-Side Request Forgery (SS… |
InternLM |
lmdeploy |
2026-04-20T20:29:19.558Z | 2026-04-21T19:50:13.326Z |
| CVE-2026-33432 |
7.7 (4.0)
|
Roxy-WI has Pre-Authentication LDAP Injection that Lea… |
roxy-wi |
roxy-wi |
2026-04-20T20:26:52.217Z | 2026-04-21T17:38:09.523Z |
| CVE-2026-33431 |
5.7 (4.0)
|
Roxy-WI Vulnerable to Authenticated Arbitrary File Rea… |
roxy-wi |
roxy-wi |
2026-04-20T20:24:15.319Z | 2026-04-21T13:42:19.802Z |
| CVE-2026-33031 |
8.6 (4.0)
|
Nginx-UI: Disabled users retain full API access throug… |
0xJacky |
nginx-ui |
2026-04-20T20:12:07.905Z | 2026-04-21T13:35:20.144Z |
| CVE-2026-32613 |
10 (3.1)
|
Spinnaker vulnerable to RCE via expression parsing due… |
spinnaker |
spinnaker |
2026-04-20T20:07:24.697Z | 2026-04-22T03:56:18.686Z |
| CVE-2026-32604 |
10 (3.1)
|
Spinnaker vulnerable to RCE when using gitrepo artifac… |
spinnaker |
spinnaker |
2026-04-20T20:00:57.517Z | 2026-04-22T03:56:17.486Z |
| CVE-2026-29648 |
8.8 (3.1)
|
In OpenXiangShan NEMU, when Smstateen is enabled,… |
n/a |
n/a |
2026-04-20T00:00:00.000Z | 2026-04-21T19:50:38.197Z |
| CVE-2026-29647 |
6.5 (3.1)
|
In OpenXiangShan NEMU, insufficient Smstateen per… |
n/a |
n/a |
2026-04-20T00:00:00.000Z | 2026-04-21T19:50:43.685Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-rgcc-vxwc-jxf9 |
7.3 (3.1)
5.5 (4.0)
|
A security vulnerability has been detected in moxi624 Mogu Blog v2 up to 5.2. Affected by this vuln… | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-q6vj-q94p-g3rc |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability was identified in Tenda F451 1.0.0.7_cn_svn7958. The affected element is the functi… | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-gqp3-hfc3-8q54 |
6.3 (3.1)
2.1 (4.0)
|
A weakness has been identified in usememos memos up to 0.22.1. This affects the function memos_acce… | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-9r7w-j29g-xqx8 |
2.1 (4.0)
|
When sed is invoked with both -i (in-place edit) and --follow-symlinks, the function open_next_file… | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-9qc9-mh55-7xp5 |
6.3 (3.1)
2.1 (4.0)
|
A flaw has been found in phili67 Ecclesia CRM up to 8.0.0. This affects the function ValidateInput … | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-7gjf-f5f3-qqxw |
3.5 (3.1)
2.0 (4.0)
|
A security flaw has been discovered in Yifang CMS up to 2.0.5. The impacted element is the function… | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-6c34-3mhj-jwxw |
7.3 (3.1)
5.5 (4.0)
|
A security vulnerability has been detected in rowboatlabs rowboat up to 0.1.67. This impacts the fu… | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-5pv2-86qj-5jf9 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was detected in Cockpit-HQ Cockpit up to 2.13.5. Affected by this issue is some unk… | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-42cc-jrr3-ghpw |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was detected in p2r3 convert up to 6998584ace3e11db66dff0b423612a5cf91de75b. Affect… | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-38x4-r8qv-j5v2 |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability has been found in Metasoft 美特软件 MetaCRM up to 6.4.0. This vulnerability affects the… | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-293r-hxw5-cfmj |
2.4 (3.1)
4.8 (4.0)
|
A security flaw has been discovered in BichitroGan ISP Billing Software 2025.3.20. This impacts an … | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-2836-hmqw-wf98 |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability was determined in Tenda F451 1.0.0.7_cn_svn7958. Impacted is the function fromwebEx… | 2026-04-20T12:32:01Z | 2026-04-20T12:32:01Z |
| ghsa-vqjc-m5xh-jhx3 |
|
In the Linux kernel, the following vulnerability has been resolved: net: skb: fix cross-cache free… | 2026-04-20T12:32:00Z | 2026-04-20T12:32:00Z |
| ghsa-q7h9-pvj5-g9fp |
|
In the Linux kernel, the following vulnerability has been resolved: X.509: Fix out-of-bounds acces… | 2026-04-20T12:32:00Z | 2026-04-20T12:32:00Z |
| ghsa-x858-8gr5-586m |
5.1 (4.0)
|
Fudo Enterprise in versions from 5.5.0 through 5.6.2 allows low privileged users to access certain … | 2026-04-20T12:31:59Z | 2026-04-20T12:31:59Z |
| ghsa-vrr8-h7fq-ghr8 |
4.0 (3.1)
|
ProjectDiscovery Nuclei 3 before 3.8.0 allows DSL expression injection. This affects use of -env-va… | 2026-04-20T09:30:45Z | 2026-04-20T09:30:45Z |
| ghsa-vr46-pfqh-wpf8 |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was determined in 1024bit extend-deep up to 0.1.6. The impacted element is an unkno… | 2026-04-20T09:30:45Z | 2026-04-20T09:30:45Z |
| ghsa-q2rh-xrfv-8x3m |
9.8 (3.1)
9.3 (4.0)
|
EasyFlow .NET developed by Digiwin has a SQL Injection vulnerability, allowing unauthenticated remo… | 2026-04-20T09:30:45Z | 2026-04-20T09:30:45Z |
| ghsa-p78m-rc6g-qfwc |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was detected in langgenius dify up to 0.6.9. This vulnerability affects the functio… | 2026-04-20T09:30:45Z | 2026-04-20T09:30:45Z |
| ghsa-jp7c-75vm-9jwh |
3.5 (3.1)
2.0 (4.0)
|
A vulnerability has been found in langgenius dify up to 1.13.3. Impacted is the function openInNewT… | 2026-04-20T09:30:45Z | 2026-04-20T09:30:45Z |
| ghsa-f5h4-jpqg-93m3 |
9.8 (3.1)
9.3 (4.0)
|
EasyFlow .NET developed by Digiwin has a SQL Injection vulnerability, allowing unauthenticated remo… | 2026-04-20T09:30:45Z | 2026-04-20T09:30:45Z |
| ghsa-8v5m-jghx-mmxr |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was found in SonicCloudOrg sonic-server up to 2.0.0. The affected element is the fu… | 2026-04-20T09:30:45Z | 2026-04-20T09:30:45Z |
| ghsa-7gm3-fv82-7h98 |
6.3 (3.1)
2.1 (4.0)
|
A security vulnerability has been detected in TransformerOptimus SuperAGI up to 0.0.14. This affect… | 2026-04-20T09:30:45Z | 2026-04-20T09:30:45Z |
| ghsa-5qr4-57wv-4r2w |
7.3 (3.1)
5.5 (4.0)
|
A weakness has been identified in TransformerOptimus SuperAGI up to 0.0.14. Affected by this issue … | 2026-04-20T09:30:45Z | 2026-04-20T09:30:45Z |
| ghsa-544v-v93w-x43g |
8.1 (3.1)
7.2 (4.0)
|
ThreatSonar Anti-Ransomware developed by TeamT5 has an Arbitrary File Deletion vulnerability. Authe… | 2026-04-20T09:30:45Z | 2026-04-20T09:30:45Z |
| ghsa-49hc-46g6-4c47 |
8.8 (3.1)
8.7 (4.0)
|
ThreatSonar Anti-Ransomware developed by TeamT5 has an Privilege Escalation vulnerability. Authenti… | 2026-04-20T09:30:45Z | 2026-04-20T09:30:45Z |
| ghsa-337w-xf2q-h5w2 |
6.3 (3.1)
2.1 (4.0)
|
A flaw has been found in langgenius dify up to 1.13.3. This issue affects the function parse_openai… | 2026-04-20T09:30:45Z | 2026-04-20T09:30:45Z |
| ghsa-32w9-6rwg-p96w |
9.1 (3.1)
9.4 (4.0)
|
A command injection vulnerability was found in the PPTP VPN Clients on the ADM. The vulnerability a… | 2026-04-20T09:30:45Z | 2026-04-22T15:31:33Z |
| ghsa-3224-28wc-whrh |
7.8 (3.1)
8.5 (4.0)
|
SKYSEA Client View and SKYMEC IT Manager provided by Sky Co.,LTD. configure the installation folder… | 2026-04-20T09:30:45Z | 2026-04-20T09:30:45Z |
| ghsa-2chg-78hj-c2w2 |
6.3 (3.1)
2.1 (4.0)
|
A security flaw has been discovered in TransformerOptimus SuperAGI up to 0.0.14. Affected by this v… | 2026-04-20T09:30:45Z | 2026-04-20T09:30:45Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-43033 |
|
The d8s-xml package for Python, as distributed on PyPI, included a potential code-executi… | d8s-xml | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.587712Z |
| pysec-2022-43032 |
|
The d8s-utility package for Python, as distributed on PyPI, included a potential code-exe… | d8s-utility | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.473097Z |
| pysec-2022-43031 |
|
The d8s-utility package for Python, as distributed on PyPI, included a potential code-exe… | d8s-utility | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.395893Z |
| pysec-2022-43030 |
|
The d8s-urls package for Python, as distributed on PyPI, included a potential code-execut… | d8s-urls | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.291206Z |
| pysec-2022-43029 |
|
The d8s-pdfs package for Python, as distributed on PyPI, included a potential code-execut… | d8s-pdfs | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.177857Z |
| pysec-2022-43028 |
|
The d8s-networking package for Python, as distributed on PyPI, included a potential code-… | d8s-networking | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.075232Z |
| pysec-2022-43027 |
|
The d8s-lists package for Python, as distributed on PyPI, included a potential code-execu… | d8s-lists | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.913872Z |
| pysec-2022-43026 |
|
The d8s-json package for Python, as distributed on PyPI, included a potential code-execut… | d8s-json | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.769675Z |
| pysec-2022-43025 |
|
The d8s-html package for Python, as distributed on PyPI, included a potential code-execut… | d8s-html | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.578719Z |
| pysec-2022-43024 |
|
The d8s-file-system package for Python, as distributed on PyPI, included a potential code… | d8s-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.460219Z |
| pysec-2022-43023 |
|
The d8s-domains package for Python, as distributed on PyPI, included a potential code-exe… | d8s-domains | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.349619Z |
| pysec-2022-43022 |
|
The d8s-asns package for Python, as distributed on PyPI, included a potential code-execut… | d8s-asns | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.247277Z |
| pysec-2022-43021 |
|
The d8s-asns package for Python, as distributed on PyPI, included a potential code-execut… | d8s-asns | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.172299Z |
| pysec-2022-43020 |
|
The d8s-archives package for Python, as distributed on PyPI, included a potential code-ex… | d8s-archives | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.057391Z |
| pysec-2022-43019 |
|
The d8s-algorithms package for Python, as distributed on PyPI, included a potential code-… | d8s-algorithms | 2022-10-11T22:15:00Z | 2023-06-05T01:12:47.946780Z |
| pysec-2022-303 |
|
mfa/FIDO2.py in django-mfa2 before 2.5.1 and 2.6.x before 2.6.1 allows a replay attack th… | django-mfa2 | 2022-10-11T14:15:00Z | 2022-10-11T19:05:00Z |
| pysec-2022-43158 |
6.1 (3.1)
|
Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.0a4. | rdiffweb | 2022-10-10T12:15:00+00:00 | 2024-11-21T14:23:00.394851+00:00 |
| pysec-2022-42983 |
|
In Apache Airflow, prior to version 2.4.1, deactivating a user wouldn't prevent an alread… | apache-airflow | 2022-10-07T07:15:00Z | 2023-05-04T04:29:22.696589Z |
| pysec-2022-43157 |
5.3 (3.1)
|
Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.5.0a4. | rdiffweb | 2022-10-06T18:16:00+00:00 | 2024-11-21T14:23:00.333240+00:00 |
| pysec-2022-43156 |
9.8 (3.1)
|
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffwe… | rdiffweb | 2022-10-06T18:16:00+00:00 | 2024-11-21T14:23:00.273706+00:00 |
| pysec-2022-302 |
|
Path Traversal in GitHub repository ikus060/rdiffweb prior to 2.4.10. | rdiffweb | 2022-10-06T18:16:00Z | 2022-10-06T23:36:00Z |
| pysec-2022-301 |
|
dparse is a parser for Python dependency files. dparse in versions before 0.5.2 contain a… | dparse | 2022-10-06T18:16:00Z | 2022-10-06T20:46:42.790036Z |
| pysec-2022-43138 |
6.5 (3.1)
|
A vulnerability in the LIEF::MachO::BinaryParser::init_and_parse function of LIEF v0.12.1… | lief | 2022-10-03T13:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2022-300 |
|
A Server Side Request Forgery (SSRF) in the Data Import module in Heartex - Label Studio … | label-studio | 2022-10-03T12:15:00Z | 2022-10-04T22:46:41.362638Z |
| pysec-2022-43139 |
6.5 (3.1)
|
A vulnerability in the LIEF::MachO::SegmentCommand::virtual_address function of LIEF v0.1… | lief | 2022-09-30T19:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2022-299 |
|
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffwe… | rdiffweb | 2022-09-30T14:15:00Z | 2022-10-04T16:30:00Z |
| pysec-2022-298 |
|
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffwe… | rdiffweb | 2022-09-29T21:15:00Z | 2022-10-04T13:14:00Z |
| pysec-2022-297 |
|
Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.4.9. | rdiffweb | 2022-09-29T00:15:00Z | 2022-10-03T14:07:00Z |
| pysec-2022-296 |
|
Use of Cache Containing Sensitive Information in GitHub repository ikus060/rdiffweb prior… | rdiffweb | 2022-09-28T21:15:00Z | 2022-09-30T17:34:00Z |
| pysec-2022-294 |
|
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffwe… | rdiffweb | 2022-09-26T22:15:00Z | 2022-09-28T18:56:44.617660Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2176 | Malicious code in kusto (PyPI) | 2026-03-25T05:04:47Z | 2026-03-25T05:04:47Z |
| mal-2026-2181 | Malicious code in sonic-platform-common (PyPI) | 2026-03-25T05:04:44Z | 2026-03-25T05:04:44Z |
| mal-2026-2174 | Malicious code in batch-shipyard (PyPI) | 2026-03-25T05:04:42Z | 2026-03-25T05:04:42Z |
| mal-2026-2173 | Malicious code in aristanetworks (PyPI) | 2026-03-25T05:04:39Z | 2026-03-25T05:04:39Z |
| mal-2026-2179 | Malicious code in python-glue (PyPI) | 2026-03-25T05:04:37Z | 2026-03-25T05:04:37Z |
| mal-2026-2178 | Malicious code in lm-sys (PyPI) | 2026-03-25T05:04:34Z | 2026-03-25T05:05:02Z |
| mal-2026-2167 | Malicious code in @shennmine/libsignal-node (npm) | 2026-03-25T03:05:29Z | 2026-03-31T03:12:00Z |
| mal-2026-2166 | Malicious code in @shennmine/baileys (npm) | 2026-03-25T03:05:29Z | 2026-03-31T03:12:00Z |
| mal-2026-2197 | Malicious code in allergan (npm) | 2026-03-25T02:40:45Z | 2026-03-31T03:12:00Z |
| mal-2026-2169 | Malicious code in console-loggers (npm) | 2026-03-25T02:32:02Z | 2026-03-31T03:12:01Z |
| mal-2026-2168 | Malicious code in chai-patch (npm) | 2026-03-25T02:30:41Z | 2026-03-31T03:12:01Z |
| mal-2026-2165 | Malicious code in @rexxtheproject/keyed-db (npm) | 2026-03-25T01:54:00Z | 2026-03-31T03:12:00Z |
| mal-2026-2164 | Malicious code in @rexxtheproject/elaina-libsignal (npm) | 2026-03-25T01:54:00Z | 2026-03-31T03:12:00Z |
| mal-2026-2163 | Malicious code in @rexxtheproject/elaina-baileys (npm) | 2026-03-25T01:54:00Z | 2026-03-31T03:12:00Z |
| mal-2026-2160 | Malicious code in chai-as-chain (npm) | 2026-03-25T01:52:23Z | 2026-04-16T15:42:08Z |
| mal-2026-2161 | Malicious code in path-external (npm) | 2026-03-25T01:50:59Z | 2026-04-16T15:42:09Z |
| mal-2026-2159 | Malicious code in @eric-orderbuddyinfo/react-noval (npm) | 2026-03-25T01:50:59Z | 2026-03-31T03:12:00Z |
| mal-2026-2162 | Malicious code in svg-sizer-responsive (npm) | 2026-03-25T01:49:22Z | 2026-03-31T03:12:05Z |
| mal-2026-2158 | Malicious code in torchunmix (PyPI) | 2026-03-25T01:23:44Z | 2026-03-25T01:40:59Z |
| mal-2026-2154 | Malicious code in chai-as-emitted (npm) | 2026-03-25T00:37:35Z | 2026-04-16T15:42:08Z |
| mal-2026-2155 | Malicious code in pino-pretty-log (npm) | 2026-03-25T00:36:47Z | 2026-04-16T15:42:09Z |
| mal-2026-2156 | Malicious code in tailwind-animationbasis (npm) | 2026-03-25T00:35:42Z | 2026-03-31T03:12:05Z |
| mal-2026-2157 | Malicious code in transitive_lib (npm) | 2026-03-25T00:31:36Z | 2026-03-31T03:12:05Z |
| mal-2026-2153 | Malicious code in @xvortexsockets/baileys (npm) | 2026-03-25T00:11:34Z | 2026-03-31T03:12:00Z |
| mal-2026-2148 | Malicious code in mattermost-data-warehouse (PyPI) | 2026-03-24T22:23:16Z | 2026-03-24T22:23:16Z |
| mal-2026-2150 | Malicious code in snooty (PyPI) | 2026-03-24T22:23:01Z | 2026-03-24T23:14:27Z |
| mal-2026-2149 | Malicious code in sentry-filter-forks (PyPI) | 2026-03-24T22:22:42Z | 2026-03-24T22:22:42Z |
| mal-2026-2147 | Malicious code in mattermost-airflow (PyPI) | 2026-03-24T22:21:52Z | 2026-03-24T22:21:52Z |
| mal-2026-2146 | Malicious code in databricks-clean-room-orchestrator (PyPI) | 2026-03-24T22:21:37Z | 2026-03-24T22:21:37Z |
| mal-2026-2145 | Malicious code in compose-rl (PyPI) | 2026-03-24T22:21:23Z | 2026-03-24T23:14:27Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2605 | IBM AIX: Mehrere Schwachstellen | 2025-11-13T23:00:00.000+00:00 | 2025-11-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2604 | Linksys Router (E1200, E7350, RE700): Mehrere Schwachstellen | 2025-11-13T23:00:00.000+00:00 | 2025-11-13T23:00:00.000+00:00 |
| wid-sec-w-2025-2603 | Fortinet FortiWeb: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2025-11-13T23:00:00.000+00:00 | 2025-11-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2602 | Cisco Catalyst Center Virtual Appliance: Mehrere Schwachstellen | 2025-11-13T23:00:00.000+00:00 | 2025-11-13T23:00:00.000+00:00 |
| wid-sec-w-2025-2601 | Cisco Catalyst Center: Mehrere Schwachstellen | 2025-11-13T23:00:00.000+00:00 | 2025-11-13T23:00:00.000+00:00 |
| wid-sec-w-2025-2600 | PostgreSQL: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-13T23:00:00.000+00:00 | 2026-03-09T23:00:00.000+00:00 |
| wid-sec-w-2025-2599 | HP LaserJet: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-11-13T23:00:00.000+00:00 | 2025-11-13T23:00:00.000+00:00 |
| wid-sec-w-2025-2598 | CUPS (Filters): Mehrere Schwachstellen | 2025-11-13T23:00:00.000+00:00 | 2025-12-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2597 | Trellix Agent: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-11-13T23:00:00.000+00:00 | 2025-11-13T23:00:00.000+00:00 |
| wid-sec-w-2025-2596 | Autodesk 3ds Max: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-11-12T23:00:00.000+00:00 | 2025-11-12T23:00:00.000+00:00 |
| wid-sec-w-2025-2595 | Linux Kernel: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-2594 | Omnissa Workspace ONE UEM: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-12T23:00:00.000+00:00 | 2025-11-12T23:00:00.000+00:00 |
| wid-sec-w-2025-2593 | pgAdmin: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2592 | IBM QRadar SIEM: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2025-11-13T23:00:00.000+00:00 |
| wid-sec-w-2025-2591 | Flowise: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-11-12T23:00:00.000+00:00 | 2025-11-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2590 | Drupal Core: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2589 | PyTorch: Schwachstelle ermöglicht Denial of Service | 2025-11-12T23:00:00.000+00:00 | 2025-11-12T23:00:00.000+00:00 |
| wid-sec-w-2025-2588 | Splunk Splunk Enterprise: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2025-11-12T23:00:00.000+00:00 |
| wid-sec-w-2025-2587 | GitLab: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2025-11-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2586 | Red Hat Enterprise Linux (python-kdcproxy): Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2585 | Red Hat OpenShift AI: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-12T23:00:00.000+00:00 | 2025-11-12T23:00:00.000+00:00 |
| wid-sec-w-2025-2584 | Red Hat Enterprise Linux Ceph Storage: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2583 | Palo Alto Networks PAN-OS: Schwachstelle ermöglicht Denial of Service | 2025-11-12T23:00:00.000+00:00 | 2025-11-13T23:00:00.000+00:00 |
| wid-sec-w-2025-2581 | TYPO3 Extensions: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2025-11-12T23:00:00.000+00:00 |
| wid-sec-w-2025-2580 | Google Chrome/Microsoft Edge: Schwachstelle ermöglicht nicht näher beschriebene Auswirkungen | 2025-11-11T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-2579 | Linux Kernel: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-2578 | ZScaler Client Connector: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-11-11T23:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2577 | Apache OpenOffice: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2025-11-12T23:00:00.000+00:00 |
| wid-sec-w-2025-2576 | Kibana: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2025-11-13T23:00:00.000+00:00 |
| wid-sec-w-2025-2575 | Ivanti Endpoint Manager: Schwachstelle ermöglicht Manipulation von Dateien | 2025-11-11T23:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-284-11 | Siemens RUGGEDCOM APE1808 | 2024-10-08T00:00:00.000000Z | 2024-10-08T00:00:00.000000Z |
| icsa-24-284-10 | Siemens SIMATIC S7-1500 CPUs | 2024-10-08T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-24-284-09 | Siemens PSS SINCAL | 2024-10-08T00:00:00.000000Z | 2024-10-08T00:00:00.000000Z |
| icsa-24-284-08 | Siemens HiMed Cockpit | 2024-10-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-284-07 | Siemens JT2Go | 2024-10-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-284-06 | Siemens SINEC Security Monitor | 2024-10-08T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-24-284-05 | Siemens Questa and ModelSim | 2024-10-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-284-04 | Siemens SENTRON PAC3200 Devices | 2024-10-08T00:00:00.000000Z | 2024-10-08T00:00:00.000000Z |
| icsa-24-284-03 | Siemens Teamcenter Visualization and JT2Go | 2024-10-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-284-02 | Siemens Simcenter Nastran | 2024-10-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-284-01 | Siemens SIMATIC S7-1500 and S7-1200 CPUs | 2024-10-08T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-24-277-03 | Delta Electronics DIAEnergie | 2024-10-03T06:00:00.000000Z | 2024-10-03T06:00:00.000000Z |
| icsa-24-277-01 | TEM Opera Plus FM Family Transmitter | 2024-10-03T06:00:00.000000Z | 2024-10-03T06:00:00.000000Z |
| icsa-24-277-02 | Subnet Solutions Inc. PowerSYSTEM Center | 2024-10-01T06:00:00.000000Z | 2024-10-01T06:00:00.000000Z |
| icsa-24-275-02 | Mitsubishi Electric MELSEC iQ-F FX5-OPC | 2024-10-01T06:00:00.000000Z | 2024-10-01T06:00:00.000000Z |
| icsa-24-275-01 | Optigo Networks ONS-S8 - Spectra Aggregation Switch | 2024-10-01T06:00:00.000000Z | 2024-10-01T06:00:00.000000Z |
| icsa-24-270-05 | goTenna Pro ATAK Plugin (Update A) | 2024-09-26T06:00:00.000000Z | 2024-10-17T06:00:00.000000Z |
| icsa-24-270-04 | goTenna Pro X and Pro X2 (Update A) | 2024-09-26T06:00:00.000000Z | 2024-10-17T06:00:00.000000Z |
| icsa-24-270-03 | Atelmo Atemio AM 520 HD Full HD Satellite Receiver | 2024-09-26T06:00:00.000000Z | 2024-09-26T06:00:00.000000Z |
| icsa-24-270-02 | Advantech ADAM 5630 | 2024-09-26T06:00:00.000000Z | 2024-09-26T06:00:00.000000Z |
| icsa-24-270-01 | Advantech ADAM-5550 | 2024-09-26T06:00:00.000000Z | 2024-09-26T06:00:00.000000Z |
| icsa-24-268-06 | OMNTEC Proteus Tank Monitoring (Update A) | 2024-09-24T06:00:00.000000Z | 2024-10-24T06:00:00.000000Z |
| icsa-24-268-05 | Moxa MXview One | 2024-09-24T06:00:00.000000Z | 2024-09-24T06:00:00.000000Z |
| icsa-24-268-04 | Dover Fueling Solutions ProGauge MAGLINK LX CONSOLE | 2024-09-24T06:00:00.000000Z | 2024-09-24T06:00:00.000000Z |
| icsa-24-268-03 | Franklin Fueling Systems TS-550 EVO | 2024-09-24T06:00:00.000000Z | 2024-09-24T06:00:00.000000Z |
| icsa-24-268-02 | Alisonic Sibylla | 2024-09-24T06:00:00.000000Z | 2024-09-24T06:00:00.000000Z |
| icsa-24-268-01 | OPW Fuel Management Systems SiteSentinel | 2024-09-24T06:00:00.000000Z | 2024-09-24T06:00:00.000000Z |
| va-24-262-01 | Planet Fitness Workouts mobile apps do not properly validate TLS certificates | 2024-09-23T00:00:00Z | 2025-02-28T00:00:00Z |
| icsa-24-263-05 | Kastle Systems Access Control System | 2024-09-19T06:00:00.000000Z | 2024-09-19T06:00:00.000000Z |
| icsa-24-263-04 | MegaSys Computer Technologies Telenium Online Web Application (Update A) | 2024-09-19T06:00:00.000000Z | 2025-08-12T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-cucm-file-delete-n2vpmone | Cisco Unified Communications Manager Arbitrary File Deletion Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-broadworks-xss-xbhfr4cd | Cisco BroadWorks Application Delivery Platform Software Cross-Site Scripting Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-sb-rv-rce-overflow-yghbyak | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-mprvesc-emhdgxe5 | Cisco Nexus Dashboard Privilege Escalation Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-mhcvuln-vpsbpj9y | Cisco Nexus Dashboard Unauthorized Access Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-afw-2mt9tb99 | Cisco Nexus Dashboard Arbitrary File Write Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-nd-tlsvld-tbaqlp3n | Cisco Nexus Dashboard SSL Certificate Validation Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ise-lifetime-pwd-gpcs76mb | Cisco Identity Services Engine Administrator Password Lifetime Expiration Issue | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-iotcc-xss-wqrclrvd | Cisco IoT Control Center Cross-Site Scripting Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ucm-timing-jvbhecok | Cisco Unified Communications Products Timing Attack Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-ucm-file-read-qgjhec3a | Cisco Unified Communications Manager Arbitrary File Read Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-ucm-access-dmkvv2dy | Cisco Unified Communications Products Access Control Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-roomos-infodisc-yotz9ct7 | Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-onprem-privesc-tp6unzos | Cisco Smart Software Manager On-Prem Denial of Service Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-expressway-overwrite-3buqw8lh | Cisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilities | 2022-07-06T16:00:00+00:00 | 2023-04-04T20:50:42+00:00 |
| cisco-sa-cucm-xss-rgh7mpka | Cisco Unified Communications Products Cross-Site Scripting Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-cucm-xss-kskd5yfa | Cisco Unified Communications Products Cross-Site Scripting Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-cucm-imp-afr-ybflnyzd | Cisco Unified Communications Products Arbitrary File Read Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-asasfr-cmd-inject-pe4gfdg | Cisco FirePOWER Software for ASA FirePOWER Module Command Injection Vulnerability | 2022-06-22T16:00:00+00:00 | 2022-06-22T16:00:00+00:00 |
| cisco-sa-asa-asdm-sig-npkvwdjm | Cisco Adaptive Security Device Manager and Adaptive Security Appliance Software Client-side Arbitrary Code Execution Vulnerability | 2022-06-22T16:00:00+00:00 | 2022-08-17T12:48:01+00:00 |
| cisco-sa-sma-esa-auth-bypass-66kecxqd | Cisco Email Security Appliance and Cisco Secure Email and Web Manager External Authentication Bypass Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-08-02T13:07:47+00:00 |
| cisco-sa-sb-rv-overflow-s2r82p9v | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-06-15T16:00:00+00:00 |
| cisco-sa-ise-saml-nuukmpf9 | Cisco Identity Services Engine Authentication Bypass Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-07-13T14:42:14+00:00 |
| cisco-sa-ise-info-disclosure-os6fsd6n | Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-06-15T16:00:00+00:00 |
| cisco-sa-esasma-info-dsc-q9tluovm | Cisco Email Security Appliance and Cisco Secure Email and Web Manager Information Disclosure Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-06-21T20:29:34+00:00 |
| cisco-sa-cp6901-dup-cert-82jdjge4 | Cisco IP Phone Duplicate Key Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-06-15T16:00:00+00:00 |
| cisco-sa-appd-contrl-athzn-bp-blypgsbu | Cisco AppDynamics Controller Authorization Bypass Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-06-15T16:00:00+00:00 |
| cisco-sa-iosxr-redis-abjye5xk | Cisco IOS XR Software Health Check Open Port Vulnerability | 2022-05-20T16:00:00+00:00 | 2024-03-15T16:55:47+00:00 |
| cisco-sa-ucs-xss-uqsme3l7 | Cisco UCS Director JavaScript Cross-Site Scripting Vulnerability | 2022-05-18T16:00:00+00:00 | 2022-05-18T16:00:00+00:00 |
| cisco-sa-stealth-rce-2hyb9kfk | Cisco Secure Network Analytics Remote Code Execution Vulnerability | 2022-05-18T16:00:00+00:00 | 2023-04-03T18:50:18+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-21710 | CVE-2026-21710 | 2026-03-02T00:00:00.000Z | 2026-04-09T01:40:13.000Z |
| msrc_cve-2026-2100 | P11-kit: p11-kit: null dereference via c_derivekey with specific null parameters | 2026-03-02T00:00:00.000Z | 2026-04-03T01:39:20.000Z |
| msrc_cve-2026-1965 | bad reuse of HTTP Negotiate connection | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:28.000Z |
| msrc_cve-2026-1519 | Excessive NSEC3 iterations cause high CPU load during insecure delegation validation | 2026-03-02T00:00:00.000Z | 2026-04-15T01:38:23.000Z |
| msrc_cve-2026-1005 | Integer underflow leads to out-of-bounds access in sniffer AES-GCM/CCM/ARIA-GCM decrypt path | 2026-03-02T00:00:00.000Z | 2026-03-31T15:14:58.000Z |
| msrc_cve-2026-0968 | Libssh: libssh: denial of service due to malformed sftp message | 2026-03-02T00:00:00.000Z | 2026-04-14T14:44:45.000Z |
| msrc_cve-2026-0967 | Libssh: libssh: denial of service via inefficient regular expression processing | 2026-03-02T00:00:00.000Z | 2026-04-14T14:43:05.000Z |
| msrc_cve-2026-0966 | Libssh: buffer underflow in ssh_get_hexa() on invalid input | 2026-03-02T00:00:00.000Z | 2026-04-14T14:43:10.000Z |
| msrc_cve-2026-0965 | Libssh: libssh: denial of service via improper configuration file handling | 2026-03-02T00:00:00.000Z | 2026-04-14T14:42:59.000Z |
| msrc_cve-2026-0964 | Libssh: improper sanitation of paths received from scp servers | 2026-03-02T00:00:00.000Z | 2026-04-14T14:43:16.000Z |
| msrc_cve-2026-0819 | Stack buffer overflow in PKCS7 SignedData encoding with custom signed attributes | 2026-03-02T00:00:00.000Z | 2026-04-22T01:38:45.000Z |
| msrc_cve-2026-0038 | In multiple functions of mem_protect.c, there is a possible way to execute arbitrary code due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2026-03-02T00:00:00.000Z | 2026-03-05T01:09:10.000Z |
| msrc_cve-2026-0032 | In multiple functions of mem_protect.c, there is a possible out-of-bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2026-03-02T00:00:00.000Z | 2026-03-07T01:04:27.000Z |
| msrc_cve-2026-0031 | In multiple functions of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2026-03-02T00:00:00.000Z | 2026-03-07T01:04:34.000Z |
| msrc_cve-2025-71269 | btrfs: do not free data reservation in fallback from inline due to -ENOSPC | 2026-03-02T00:00:00.000Z | 2026-04-18T14:37:04.000Z |
| msrc_cve-2025-71267 | fs: ntfs3: fix infinite loop triggered by zero-sized ATTR_LIST | 2026-03-02T00:00:00.000Z | 2026-03-27T14:37:50.000Z |
| msrc_cve-2025-71266 | fs: ntfs3: check return value of indx_find to avoid infinite loop | 2026-03-02T00:00:00.000Z | 2026-03-27T14:37:45.000Z |
| msrc_cve-2025-71265 | fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata | 2026-03-02T00:00:00.000Z | 2026-03-27T14:38:15.000Z |
| msrc_cve-2025-71239 | audit: add fchmodat2() to change attributes class | 2026-03-02T00:00:00.000Z | 2026-03-27T14:37:21.000Z |
| msrc_cve-2025-71238 | scsi: qla2xxx: Fix bsg_done() causing double free | 2026-03-02T00:00:00.000Z | 2026-03-31T01:38:12.000Z |
| msrc_cve-2025-70888 | CVE-2025-70888 | 2026-03-02T00:00:00.000Z | 2026-03-30T14:38:57.000Z |
| msrc_cve-2025-70873 | CVE-2025-70873 | 2026-03-02T00:00:00.000Z | 2026-04-18T14:41:29.000Z |
| msrc_cve-2025-69720 | CVE-2025-69720 | 2026-03-02T00:00:00.000Z | 2026-03-31T15:18:12.000Z |
| msrc_cve-2025-69652 | GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an abort (SIGABRT) when processing a crafted ELF binary with malformed DWARF abbrev or debug information. Due to incomplete state cleanup in process_debug_info(), an invalid debug_info_p state may propagate into DWARF attribute parsing routines. When certain malformed attributes result in an unexpected data length of zero, byte_get_little_endian() triggers a fatal abort. No evidence of memory corruption or code execution was observed; the impact is limited to denial of service. | 2026-03-02T00:00:00.000Z | 2026-04-14T14:39:55.000Z |
| msrc_cve-2025-69651 | GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an invalid pointer free when processing a crafted ELF binary with malformed relocation or symbol data. If dump_relocations returns early due to parsing errors, the internal all_relocations array may remain partially uninitialized. Later, process_got_section_contents() may attempt to free an invalid r_symbol pointer, triggering memory corruption checks in glibc and causing the program to terminate with SIGABRT. No evidence of further memory corruption or code execution was observed; the impact is limited to denial of service. | 2026-03-02T00:00:00.000Z | 2026-03-11T01:02:49.000Z |
| msrc_cve-2025-69650 | GNU Binutils thru 2.46 readelf contains a double free vulnerability when processing a crafted ELF binary with malformed relocation data. During GOT relocation handling, dump_relocations may return early without initializing the all_relocations array. As a result, process_got_section_contents() may pass an uninitialized r_symbol pointer to free(), leading to a double free and terminating the program with SIGABRT. No evidence of exploitable memory corruption or code execution was observed; the impact is limited to denial of service. | 2026-03-02T00:00:00.000Z | 2026-03-11T01:02:17.000Z |
| msrc_cve-2025-69649 | GNU Binutils thru 2.46 readelf contains a null pointer dereference vulnerability when processing a crafted ELF binary with malformed header fields. During relocation processing, an invalid or null section pointer may be passed into display_relocations(), resulting in a segmentation fault (SIGSEGV) and abrupt termination. No evidence of memory corruption beyond the null pointer dereference, nor any possibility of code execution, was observed. | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:06.000Z |
| msrc_cve-2025-69648 | CVE-2025-69648 | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:44.000Z |
| msrc_cve-2025-69647 | CVE-2025-69647 | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:39.000Z |
| msrc_cve-2025-69646 | Binutils objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed DWARF debug_rnglists data. A logic error in the handling of the debug_rnglists header can cause objdump to repeatedly print the same warning message and fail to terminate, resulting in an unbounded logging loop until the process is interrupted. The issue was observed in binutils 2.44. A local attacker can exploit this vulnerability by supplying a malicious input file, leading to excessive CPU and I/O usage and preventing completion of the objdump analysis. | 2026-03-02T00:00:00.000Z | 2026-04-14T14:39:49.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0282 | Kwetsbaarheden verholpen in Siemens Producten | 2024-07-09T18:40:57.534939Z | 2024-07-09T18:40:57.534939Z |
| ncsc-2024-0281 | Kwetsbaarheden verholpen in Microsoft Windows SQL Server | 2024-07-09T18:40:47.989197Z | 2024-07-09T18:40:47.989197Z |
| ncsc-2024-0280 | Kwetsbaarheid verholpen in Microsoft Dynamics | 2024-07-09T18:40:31.321704Z | 2024-07-09T18:40:31.321704Z |
| ncsc-2024-0279 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-07-09T18:40:21.043319Z | 2024-07-09T18:40:21.043319Z |
| ncsc-2024-0278 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-07-03T07:21:50.013074Z | 2024-07-03T07:21:50.013074Z |
| ncsc-2024-0277 | Kwetsbaarheid verholpen in Juniper JunOS | 2024-07-03T07:16:21.498075Z | 2024-07-03T07:16:21.498075Z |
| ncsc-2024-0276 | Kwetsbaarheden verholpen in Splunk | 2024-07-02T13:15:06.374293Z | 2024-07-02T13:15:06.374293Z |
| ncsc-2024-0275 | Kwetsbaarheden verholpen in Apache HHTP-server | 2024-07-02T11:44:22.653047Z | 2024-07-02T11:44:22.653047Z |
| ncsc-2024-0274 | Kwetsbaarheid verholpen in GeoServer | 2024-07-02T11:40:34.048090Z | 2024-07-05T09:41:10.197056Z |
| ncsc-2024-0273 | Kwetsbaarheden ontdekt in Kiloview P1 4G Video Encoder en P2 4G Video Encoder | 2024-07-02T07:04:39.395441Z | 2024-07-02T07:04:39.395441Z |
| ncsc-2024-0272 | Kwetsbaarheid verholpen in OpenSSH | 2024-07-01T12:21:57.127505Z | 2024-07-01T15:37:23.231069Z |
| ncsc-2024-0271 | Kwetsbaarheid verholpen in Juniper Session Smart Router | 2024-06-28T09:55:17.082602Z | 2024-06-28T09:55:17.082602Z |
| ncsc-2024-0270 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-06-27T13:09:06.950898Z | 2024-07-04T06:45:26.935999Z |
| ncsc-2024-0269 | Kwetsbaarheden verholpen in VMware ESXi en vCenter Server | 2024-06-26T09:02:10.988453Z | 2024-07-30T09:32:13.311694Z |
| ncsc-2024-0268 | Kwetsbaarheden verholpen in Progress WhatsUp Gold | 2024-06-26T07:43:11.795773Z | 2024-08-08T07:50:41.453544Z |
| ncsc-2024-0267 | Kwetsbaarheden verholpen in Progress MOVEit | 2024-06-26T07:27:55.195431Z | 2024-06-26T08:58:01.371553Z |
| ncsc-2024-0266 | Kwetsbaarheden verholpen in WordPress | 2024-06-25T12:19:50.298884Z | 2024-06-25T12:19:50.298884Z |
| ncsc-2024-0265 | Kwetsbaarheid verholpen in XWiki | 2024-06-25T10:17:56.645201Z | 2024-06-25T10:17:56.645201Z |
| ncsc-2024-0264 | Kwetsbaarheden verholpen in Avaya IP Office | 2024-06-25T10:17:16.686897Z | 2024-06-25T10:17:16.686897Z |
| ncsc-2024-0263 | Kwetsbaarheden verholpen in Autodesk Autocad | 2024-06-20T14:09:54.121906Z | 2024-06-20T14:09:54.121906Z |
| ncsc-2024-0262 | Kwetsbaarheden verholpen in VMware vCenter | 2024-06-18T11:46:03.858476Z | 2024-06-18T11:46:03.858476Z |
| ncsc-2024-0261 | Kwetsbaarheid verholpen in Fortinet FortiOS | 2024-06-14T09:59:56.652183Z | 2024-06-14T09:59:56.652183Z |
| ncsc-2024-0260 | Kwetsbaarheden verholpen in Nvidia GPU Drivers | 2024-06-14T06:34:54.620125Z | 2024-06-14T06:34:54.620125Z |
| ncsc-2024-0259 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2024-06-14T06:30:30.926535Z | 2024-06-14T06:30:30.926535Z |
| ncsc-2024-0258 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-06-14T06:28:31.318295Z | 2024-06-14T06:28:31.318295Z |
| ncsc-2024-0257 | Kwetsbaarheid verholpen in Adobe Creative Cloud Desktop Application | 2024-06-14T06:27:08.002611Z | 2024-06-14T06:27:08.002611Z |
| ncsc-2024-0256 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2024-06-13T13:37:57.490381Z | 2024-06-13T13:37:57.490381Z |
| ncsc-2024-0255 | Kwetsbaarheden verholpen in Adobe Commerce | 2024-06-13T13:36:13.246216Z | 2024-07-01T07:10:59.549847Z |
| ncsc-2024-0254 | Kwetsbaarheden verholpen in Adobe FrameMaker Publishing Server | 2024-06-13T13:34:41.831468Z | 2024-06-13T13:34:41.831468Z |
| ncsc-2024-0253 | Kwetsbaarheid verholpen in Adobe Photoshop | 2024-06-13T13:31:15.643260Z | 2024-06-13T13:31:15.643260Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15823-1 | clair-4.9.0-1.1 on GA media | 2025-12-17T00:00:00Z | 2025-12-17T00:00:00Z |
| opensuse-su-2025:20164-1 | Security update for openssl-3 | 2025-12-15T18:16:15Z | 2025-12-15T18:16:15Z |
| opensuse-su-2025:20163-1 | Security update for grub2 | 2025-12-15T12:52:50Z | 2025-12-15T12:52:50Z |
| opensuse-su-2025:20162-1 | Security update for ImageMagick | 2025-12-15T09:55:25Z | 2025-12-15T09:55:25Z |
| opensuse-su-2025:15822-1 | strongswan-6.0.4-1.1 on GA media | 2025-12-15T00:00:00Z | 2025-12-15T00:00:00Z |
| opensuse-su-2025:15821-1 | qemu-10.1.3-1.1 on GA media | 2025-12-15T00:00:00Z | 2025-12-15T00:00:00Z |
| opensuse-su-2025:15820-1 | chromedriver-143.0.7499.109-1.1 on GA media | 2025-12-13T00:00:00Z | 2025-12-13T00:00:00Z |
| opensuse-su-2025:20150-1 | Security update for binutils | 2025-12-12T15:58:27Z | 2025-12-12T15:58:27Z |
| opensuse-su-2025:20161-1 | Security update for chromium | 2025-12-12T15:30:17Z | 2025-12-12T15:30:17Z |
| opensuse-su-2025:20160-1 | Security update for hauler | 2025-12-12T13:20:11Z | 2025-12-12T13:20:11Z |
| opensuse-su-2025:20159-1 | Security update for keylime | 2025-12-12T09:46:01Z | 2025-12-12T09:46:01Z |
| opensuse-su-2025:20158-1 | Security update for go1.24 | 2025-12-12T07:45:01Z | 2025-12-12T07:45:01Z |
| opensuse-su-2025:20157-1 | Security update for go1.25 | 2025-12-12T07:23:58Z | 2025-12-12T07:23:58Z |
| opensuse-su-2025:15819-1 | libruby4_0-4_0-4.0.0~preview2-1.1 on GA media | 2025-12-12T00:00:00Z | 2025-12-12T00:00:00Z |
| opensuse-su-2025:15818-1 | pgadmin4-9.11-1.1 on GA media | 2025-12-12T00:00:00Z | 2025-12-12T00:00:00Z |
| opensuse-su-2025:15817-1 | buildpacks-cli-0.39.1-1.1 on GA media | 2025-12-12T00:00:00Z | 2025-12-12T00:00:00Z |
| opensuse-su-2025:15816-1 | ImageMagick-7.1.2.10-1.1 on GA media | 2025-12-12T00:00:00Z | 2025-12-12T00:00:00Z |
| opensuse-su-2025:15815-1 | xkbcomp-1.5.0-1.1 on GA media | 2025-12-11T00:00:00Z | 2025-12-11T00:00:00Z |
| opensuse-su-2025:15814-1 | MozillaThunderbird-140.6.0-1.1 on GA media | 2025-12-11T00:00:00Z | 2025-12-11T00:00:00Z |
| opensuse-su-2025:15813-1 | MozillaFirefox-146.0-1.1 on GA media | 2025-12-11T00:00:00Z | 2025-12-11T00:00:00Z |
| opensuse-su-2025:15812-1 | libpoppler-cpp2-25.09.1-4.1 on GA media | 2025-12-10T00:00:00Z | 2025-12-10T00:00:00Z |
| opensuse-su-2025:15811-1 | keylime-config-7.13.0+40-1.1 on GA media | 2025-12-10T00:00:00Z | 2025-12-10T00:00:00Z |
| opensuse-su-2025:15810-1 | gio-branding-upstream-2.86.3-1.1 on GA media | 2025-12-10T00:00:00Z | 2025-12-10T00:00:00Z |
| opensuse-su-2025:15809-1 | firefox-esr-140.6.0-1.1 on GA media | 2025-12-10T00:00:00Z | 2025-12-10T00:00:00Z |
| opensuse-su-2025:15808-1 | apache2-2.4.66-1.1 on GA media | 2025-12-10T00:00:00Z | 2025-12-10T00:00:00Z |
| opensuse-su-2025:20148-1 | Security update for openexr | 2025-12-09T16:32:45Z | 2025-12-09T16:32:45Z |
| opensuse-su-2025:20153-1 | Security update for python-Django | 2025-12-09T13:43:55Z | 2025-12-09T13:43:55Z |
| opensuse-su-2025:15807-1 | regclient-0.11.1-1.1 on GA media | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| opensuse-su-2025:15806-1 | python311-Django4-4.2.27-1.1 on GA media | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| opensuse-su-2025:15805-1 | python311-Django-5.2.9-1.1 on GA media | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:3476 | Red Hat Security Advisory: udisks2 security update | 2026-03-02T01:43:50+00:00 | 2026-03-26T00:03:31+00:00 |
| rhsa-2026:3471 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T01:35:05+00:00 | 2026-04-14T07:58:32+00:00 |
| rhsa-2026:3469 | Red Hat Security Advisory: golang security update | 2026-03-02T01:34:30+00:00 | 2026-04-14T07:58:31+00:00 |
| rhsa-2026:3472 | Red Hat Security Advisory: golang security update | 2026-03-02T01:26:30+00:00 | 2026-04-14T07:58:32+00:00 |
| rhsa-2026:3468 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T01:25:20+00:00 | 2026-04-14T07:58:31+00:00 |
| rhsa-2026:3473 | Red Hat Security Advisory: golang security update | 2026-03-02T01:23:25+00:00 | 2026-04-14T07:58:32+00:00 |
| rhsa-2026:3470 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T01:22:15+00:00 | 2026-04-14T07:58:31+00:00 |
| rhsa-2026:3464 | Red Hat Security Advisory: kernel security update | 2026-03-02T00:50:06+00:00 | 2026-03-18T16:09:04+00:00 |
| rhsa-2026:3463 | Red Hat Security Advisory: kernel-rt security update | 2026-03-02T00:18:20+00:00 | 2026-03-18T16:09:04+00:00 |
| rhsa-2026:3462 | Red Hat Security Advisory: Red Hat AI Inference Server 3.2.2 (ROCm) | 2026-02-27T14:55:49+00:00 | 2026-04-14T09:39:15+00:00 |
| rhsa-2026:3461 | Red Hat Security Advisory: Red Hat AI Inference Server 3.2.2 (CUDA) | 2026-02-27T14:54:46+00:00 | 2026-04-14T09:39:16+00:00 |
| rhsa-2026:3459 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.9.0 release | 2026-02-26T19:58:40+00:00 | 2026-04-14T09:46:27+00:00 |
| rhsa-2026:3443 | Red Hat Security Advisory: valkey security update | 2026-02-26T15:21:30+00:00 | 2026-04-09T14:39:59+00:00 |
| rhsa-2026:3444 | Red Hat Security Advisory: Red Hat OpenShift API for Data Protection | 2026-02-26T15:08:47+00:00 | 2026-04-12T14:07:54+00:00 |
| rhsa-2026:2973 | Red Hat Security Advisory: OpenShift Container Platform 4.14.62 packages and security update | 2026-02-26T14:53:52+00:00 | 2026-04-10T21:19:31+00:00 |
| rhsa-2026:3437 | Red Hat Security Advisory: openssl security update | 2026-02-26T14:44:06+00:00 | 2026-04-09T23:05:13+00:00 |
| rhsa-2026:2974 | Red Hat Security Advisory: OpenShift Container Platform 4.14.62 bug fix and security update | 2026-02-26T14:43:45+00:00 | 2026-04-13T20:14:27+00:00 |
| rhsa-2026:3428 | Red Hat Security Advisory: container-tools:rhel8 security update | 2026-02-26T14:36:45+00:00 | 2026-04-14T09:46:27+00:00 |
| rhsa-2026:3407 | Red Hat Security Advisory: mingw-fontconfig security update | 2026-02-26T14:19:55+00:00 | 2026-04-13T20:14:34+00:00 |
| rhsa-2026:2990 | Red Hat Security Advisory: OpenShift Container Platform 4.14.62 bug fix and security update | 2026-02-26T14:04:36+00:00 | 2026-04-13T16:00:20+00:00 |
| rhsa-2026:2991 | Red Hat Security Advisory: OpenShift Container Platform 4.14.62 security and extras update | 2026-02-26T13:29:07+00:00 | 2026-04-10T21:19:35+00:00 |
| rhsa-2026:3427 | Red Hat Security Advisory: Red Hat build of OpenTelemetry 3.9.0 release | 2026-02-26T11:02:21+00:00 | 2026-04-14T07:58:30+00:00 |
| rhsa-2026:3405 | Red Hat Security Advisory: libpng security update | 2026-02-26T07:35:43+00:00 | 2026-04-09T23:05:12+00:00 |
| rhsa-2026:3406 | Red Hat Security Advisory: New container image: rhceph-9.0 | 2026-02-26T07:14:51+00:00 | 2026-04-14T07:58:29+00:00 |
| rhsa-2026:3388 | Red Hat Security Advisory: kernel security update | 2026-02-26T04:25:43+00:00 | 2026-04-01T19:46:50+00:00 |
| rhsa-2026:3186 | Red Hat Security Advisory: Red Hat build of Cryostat 4.1.1: new RHEL 9 container image security update | 2026-02-26T02:56:36+00:00 | 2026-04-14T07:58:26+00:00 |
| rhsa-2026:3379 | Red Hat Security Advisory: Red Hat Directory Server 13.1 container image available as a Technology Preview | 2026-02-25T20:03:51+00:00 | 2026-03-31T15:40:01+00:00 |
| rhsa-2026:3375 | Red Hat Security Advisory: kernel-rt security update | 2026-02-25T19:01:32+00:00 | 2026-04-01T19:46:50+00:00 |
| rhsa-2026:3364 | Red Hat Security Advisory: openssl security update | 2026-02-25T15:55:52+00:00 | 2026-04-09T23:05:12+00:00 |
| rhsa-2026:3361 | Red Hat Security Advisory: firefox security update | 2026-02-25T15:25:01+00:00 | 2026-03-23T13:08:29+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0882-1 | Security update for postgresql16 | 2026-03-12T10:19:26Z | 2026-03-12T10:19:26Z |
| suse-su-2026:0881-1 | Security update for postgresql18 | 2026-03-12T10:18:52Z | 2026-03-12T10:18:52Z |
| suse-su-2026:0880-1 | Security update for MozillaThunderbird | 2026-03-12T10:18:33Z | 2026-03-12T10:18:33Z |
| suse-su-2026:0879-1 | Security update for curl | 2026-03-12T10:04:20Z | 2026-03-12T10:04:20Z |
| suse-su-2026:20668-1 | Security update for curl | 2026-03-12T10:04:10Z | 2026-03-12T10:04:10Z |
| suse-su-2026:20723-1 | Security update for virtiofsd | 2026-03-12T09:52:06Z | 2026-03-12T09:52:06Z |
| suse-su-2026:20722-1 | Security update for curl | 2026-03-12T09:40:37Z | 2026-03-12T09:40:37Z |
| suse-su-2026:0877-1 | Security update for tomcat11 | 2026-03-12T05:39:40Z | 2026-03-12T05:39:40Z |
| suse-su-2026:0876-1 | Security update for go1.26 | 2026-03-11T18:35:26Z | 2026-03-11T18:35:26Z |
| suse-su-2026:0875-1 | Security update for go1.25 | 2026-03-11T18:34:13Z | 2026-03-11T18:34:13Z |
| suse-su-2026:0874-1 | Security update for GraphicsMagick | 2026-03-11T17:07:29Z | 2026-03-11T17:07:29Z |
| suse-su-2026:0873-1 | Security update for python | 2026-03-11T17:07:11Z | 2026-03-11T17:07:11Z |
| suse-su-2026:0872-1 | Security update for busybox | 2026-03-11T17:06:34Z | 2026-03-11T17:06:34Z |
| suse-su-2026:0871-1 | Security update for MozillaFirefox | 2026-03-11T17:05:23Z | 2026-03-11T17:05:23Z |
| suse-su-2026:0870-1 | Security update for ImageMagick | 2026-03-11T16:45:31Z | 2026-03-11T16:45:31Z |
| suse-su-2026:20720-1 | Security update for the Linux Kernel | 2026-03-11T16:03:14Z | 2026-03-11T16:03:14Z |
| suse-su-2026:20667-1 | Security update for the Linux Kernel | 2026-03-11T15:14:55Z | 2026-03-11T15:14:55Z |
| suse-su-2026:20719-1 | Security update for kernel-livepatch-MICRO-6-0_Update_17 | 2026-03-11T14:11:48Z | 2026-03-11T14:11:48Z |
| suse-su-2026:20676-1 | Security update for kernel-livepatch-MICRO-6-0_Update_17 | 2026-03-11T14:11:48Z | 2026-03-11T14:11:48Z |
| suse-su-2026:20666-1 | Security update for qemu | 2026-03-11T11:28:39Z | 2026-03-11T11:28:39Z |
| suse-su-2026:20717-1 | Security update for vim | 2026-03-11T11:16:01Z | 2026-03-11T11:16:01Z |
| suse-su-2026:0862-1 | Security update for gnutls | 2026-03-11T10:00:03Z | 2026-03-11T10:00:03Z |
| suse-su-2026:20665-1 | Security update for python311 | 2026-03-10T18:54:29Z | 2026-03-10T18:54:29Z |
| suse-su-2026:20664-1 | Security update for util-linux | 2026-03-10T18:35:27Z | 2026-03-10T18:35:27Z |
| suse-su-2026:20662-1 | Security update for openssh | 2026-03-10T18:35:27Z | 2026-03-10T18:35:27Z |
| suse-su-2026:20661-1 | Security update for virtiofsd | 2026-03-10T18:35:27Z | 2026-03-10T18:35:27Z |
| suse-su-2026:20716-1 | Security update for qemu | 2026-03-10T18:34:11Z | 2026-03-10T18:34:11Z |
| suse-su-2026:0860-1 | Security update for python-maturin | 2026-03-10T16:46:52Z | 2026-03-10T16:46:52Z |
| suse-su-2026:0859-1 | Security update for python-aiohttp | 2026-03-10T16:05:00Z | 2026-03-10T16:05:00Z |
| suse-su-2026:0858-1 | Security update for python-aiohttp | 2026-03-10T12:38:39Z | 2026-03-10T12:38:39Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:14841 | Moderate: python3.11 security update | 2025-08-28T00:00:00Z | 2025-08-29T06:51:33Z |
| alsa-2025:14827 | Important: postgresql:16 security update | 2025-08-28T00:00:00Z | 2025-08-29T10:43:07Z |
| alsa-2025:14826 | Important: postgresql16 security update | 2025-08-28T00:00:00Z | 2025-08-29T10:46:22Z |
| alsa-2025:14750 | Moderate: fence-agents security update | 2025-08-27T00:00:00Z | 2025-08-28T07:14:58Z |
| alsa-2025:14743 | Important: thunderbird security update | 2025-08-27T00:00:00Z | 2025-08-28T07:17:59Z |
| alsa-2025:14640 | Important: thunderbird security update | 2025-08-26T00:00:00Z | 2025-08-29T13:02:26Z |
| alsa-2025:14625 | Moderate: mod_http2 security update | 2025-08-26T00:00:00Z | 2025-08-27T11:49:37Z |
| alsa-2025:14592 | Important: aide security update | 2025-08-26T00:00:00Z | 2025-08-27T13:34:06Z |
| alsa-2025:14573 | Important: aide security update | 2025-08-26T00:00:00Z | 2025-08-27T11:47:08Z |
| alsa-2025:14560 | Moderate: python3 security update | 2025-08-26T00:00:00Z | 2025-09-29T09:37:04Z |
| alsa-2025:14557 | Important: pam security update | 2025-08-26T00:00:00Z | 2025-09-04T09:35:13Z |
| alsa-2025:14553 | Moderate: python-cryptography security update | 2025-08-26T00:00:00Z | 2025-08-27T11:50:33Z |
| alsa-2025:14546 | Moderate: python3.12 security update | 2025-08-26T00:00:00Z | 2025-09-04T09:38:54Z |
| alsa-2025:14510 | Important: kernel security update | 2025-08-25T00:00:00Z | 2025-09-01T12:39:52Z |
| alsa-2025:14493 | Important: aide security update | 2025-08-25T00:00:00Z | 2025-08-27T11:45:24Z |
| alsa-2025:14442 | Important: firefox security update | 2025-08-25T00:00:00Z | 2025-08-27T11:52:34Z |
| alsa-2025:14439 | Moderate: kernel-rt security update | 2025-08-25T00:00:00Z | 2025-08-27T11:54:32Z |
| alsa-2025:14438 | Moderate: kernel security update | 2025-08-25T00:00:00Z | 2025-09-02T10:12:10Z |
| alsa-2025:14420 | Important: kernel security update | 2025-08-25T00:00:00Z | 2025-08-27T12:00:58Z |
| alsa-2025:14417 | Important: firefox security update | 2025-08-25T00:00:00Z | 2025-08-27T11:55:25Z |
| alsa-2025:14416 | Important: firefox security update | 2025-08-25T00:00:00Z | 2025-08-27T11:56:36Z |
| alsa-2025:14181 | Important: tomcat security update | 2025-08-20T00:00:00Z | 2025-08-22T11:25:23Z |
| alsa-2025:14178 | Important: tomcat9 security update | 2025-08-20T00:00:00Z | 2025-08-22T10:20:42Z |
| alsa-2025:14177 | Important: tomcat security update | 2025-08-20T00:00:00Z | 2025-08-21T10:09:15Z |
| alsa-2025:14137 | Important: libarchive security update | 2025-08-20T00:00:00Z | 2025-08-20T14:01:11Z |
| alsa-2025:14135 | Important: libarchive security update | 2025-08-20T00:00:00Z | 2025-08-21T05:47:20Z |
| alsa-2025:14130 | Important: libarchive security update | 2025-08-20T00:00:00Z | 2025-08-20T14:02:20Z |
| alsa-2025:14126 | Important: pki-deps:10.6 security update | 2025-08-20T00:00:00Z | 2025-08-20T12:28:21Z |
| alsa-2025:14101 | Important: mingw-sqlite security update | 2025-08-19T00:00:00Z | 2025-08-20T12:24:33Z |
| alsa-2025:14075 | Moderate: xterm security update | 2025-08-19T00:00:00Z | 2025-08-19T10:24:09Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-1164 | Heap-buffer-overflow in WriteCLUT | 2023-11-15T13:00:55.717548Z | 2024-04-29T11:24:21.233113Z |
| osv-2023-1163 | Invalid-free in sc_file_clear_acl_entries | 2023-11-15T13:00:41.204460Z | 2023-11-15T13:00:41.204717Z |
| osv-2023-1161 | Heap-buffer-overflow in std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<ch | 2023-11-14T13:03:13.962614Z | 2025-03-18T00:34:06.623648Z |
| osv-2023-1160 | Heap-buffer-overflow in IEC104Stats::processPacket | 2023-11-14T13:03:05.864884Z | 2023-11-14T13:03:05.865182Z |
| osv-2023-1154 | Heap-buffer-overflow in pcpp::SomeIpSdEntry::SomeIpSdEntry | 2023-11-13T13:03:20.948897Z | 2023-11-13T13:03:20.949199Z |
| osv-2023-1153 | Heap-buffer-overflow in pcpp::SSLClientHelloMessage::getCipherSuite | 2023-11-13T13:03:01.636510Z | 2023-11-13T13:03:01.636801Z |
| osv-2023-1152 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2023-11-13T13:02:00.256484Z | 2023-11-13T13:02:00.256878Z |
| osv-2023-1150 | Heap-buffer-overflow in pcpp::computeChecksum | 2023-11-13T13:01:45.923889Z | 2025-12-22T14:15:48.387128Z |
| osv-2023-1149 | Heap-buffer-overflow in bit_read_fixed | 2023-11-13T13:01:37.087461Z | 2023-11-13T13:01:37.087873Z |
| osv-2023-1147 | Heap-buffer-overflow in parse_by_block_type | 2023-11-13T13:00:50.800524Z | 2025-05-14T14:15:31.789989Z |
| osv-2023-1146 | Negative-size-param in pcpp::RawPacket::insertData | 2023-11-13T13:00:39.716145Z | 2023-11-13T13:00:39.716577Z |
| osv-2023-1145 | Heap-buffer-overflow in pcpp::GREv1Layer::computeCalculateFields | 2023-11-13T13:00:35.546722Z | 2023-11-13T13:00:35.547021Z |
| osv-2023-1140 | Heap-buffer-overflow in H5MM_strdup | 2023-11-12T13:01:29.798132Z | 2024-04-29T11:24:13.839064Z |
| osv-2023-1136 | Security exception in org.apache.poi.hssf.record.crypto.Biff8DecryptingStream.isNeverEncryptedRecord | 2023-11-11T13:00:42.865311Z | 2023-11-11T13:00:42.865622Z |
| osv-2023-1135 | Segv on unknown address in flb_sds_cat_safe | 2023-11-11T13:00:21.019255Z | 2025-04-24T14:23:15.311238Z |
| osv-2023-1129 | UNKNOWN READ in HeifPixelImage::overlay | 2023-11-09T13:00:44.441721Z | 2026-01-16T14:20:00.488466Z |
| osv-2023-1126 | Heap-buffer-overflow in iasecc_parse_acls | 2023-11-08T13:03:19.402769Z | 2023-11-08T13:03:19.403118Z |
| osv-2023-1124 | UNKNOWN READ in cmsIT8GetDataRowColDbl | 2023-11-08T13:00:59.655386Z | 2023-11-08T13:00:59.655691Z |
| osv-2023-1122 | Stack-buffer-overflow in dxf_header_read | 2023-11-07T13:01:32.550733Z | 2023-11-10T14:16:56.272618Z |
| osv-2023-1119 | Segv on unknown address in FunctionCompiler::compileReturn | 2023-11-06T13:02:57.494372Z | 2023-11-06T13:02:57.494689Z |
| osv-2023-1117 | Heap-buffer-overflow in cmsMLUsetWide | 2023-11-05T13:02:43.507558Z | 2023-11-05T13:02:43.507897Z |
| osv-2023-1115 | Use-of-uninitialized-value in fp_uninit | 2023-11-05T13:01:21.842426Z | 2023-11-05T13:01:21.842714Z |
| osv-2023-1110 | Stack-buffer-overflow in dynapi_set_helper | 2023-11-04T13:01:06.700754Z | 2023-11-04T13:01:06.701003Z |
| osv-2023-1104 | Heap-buffer-overflow in bit_read_RC | 2023-11-03T13:00:39.940872Z | 2023-11-03T13:00:39.941107Z |
| osv-2023-1103 | Heap-buffer-overflow in OpenType::be_u32 | 2023-11-03T13:00:16.931853Z | 2023-11-03T13:00:16.932069Z |
| osv-2023-1101 | Heap-buffer-overflow in decode_preR13_entities | 2023-11-02T13:00:18.006273Z | 2023-11-02T13:00:18.006480Z |
| osv-2023-1099 | Heap-buffer-overflow in dwg_geojson_object | 2023-11-01T13:01:34.665175Z | 2023-11-01T13:01:34.665590Z |
| osv-2023-1098 | Segv on unknown address in ZEND_HANDLE_EXCEPTION_SPEC_HANDLER | 2023-11-01T13:01:21.266355Z | 2023-11-01T13:01:21.266677Z |
| osv-2023-1097 | Security exception in com.puppycrawl.tools.checkstyle.JavaAstVisitor.getInnerBopAst | 2023-11-01T13:00:52.071904Z | 2023-11-01T13:00:52.072463Z |
| osv-2023-1095 | Heap-use-after-free in zend_jit_trace_execute | 2023-10-31T13:03:18.357724Z | 2023-11-01T17:42:22.538231Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2021-0031 | split_at allows obtaining multiple mutable references to the same data | 2021-01-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0017 | `Read` on uninitialized buffer may cause UB (`impl Walue for Vec<u8>`) | 2021-01-30T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0151 | ncollide2d is unmaintained | 2021-01-29T12:00:00Z | 2023-03-12T06:47:41Z |
| rustsec-2021-0150 | ncollide3d is unmaintained | 2021-01-29T12:00:00Z | 2023-03-12T06:47:41Z |
| rustsec-2021-0149 | nphysics2d is unmaintained | 2021-01-29T12:00:00Z | 2023-03-11T22:34:14Z |
| rustsec-2021-0148 | nphysics3d is unmaintained | 2021-01-29T12:00:00Z | 2023-03-11T22:34:14Z |
| rustsec-2021-0092 | Deserialization functions pass uninitialized memory to user-provided Read | 2021-01-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0042 | insert_many can drop elements twice on panic | 2021-01-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0016 | `IoReader::read()`: user-provided `Read` on uninitialized buffer may cause UB | 2021-01-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0014 | Record::read : Custom `Read` on uninitialized buffer may cause UB | 2021-01-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0135 | Improper validation of Windows paths could lead to directory traversal attack | 2021-01-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0152 | `out_reference::Out::from_raw` should be `unsafe` | 2021-01-20T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0089 | Optional `Deserialize` implementations lacking validation | 2021-01-20T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0083 | QueryInterface should call AddRef before returning pointer | 2021-01-20T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0013 | Soundness issues in `raw-cpuid` | 2021-01-20T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0004 | Missing Send bound for Lazy | 2021-01-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0040 | panic safety: double drop or uninitialized drop of T upon panic | 2021-01-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0010 | panic safety: double drop may happen within `util::{mutate, mutate2}` | 2021-01-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0045 | FromIterator implementation for Vector/Matrix can drop uninitialized memory | 2021-01-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0009 | panic safety issue in `impl TransformContent<S, D> for [S; (2|3|4)]` | 2021-01-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0005 | Double drop upon panic in 'fn map_array()' | 2021-01-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0003 | Buffer overflow in SmallVec::insert_many | 2021-01-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0091 | Reading on uninitialized buffer may cause UB ( `gfx_auxil::read_spirv()` ) | 2021-01-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0090 | Reading on uninitialized memory may cause UB ( `util::read_spv()` ) | 2021-01-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0087 | columnar: `Read` on uninitialized buffer may cause UB (ColumnarReadExt::read_typed_vec()) | 2021-01-07T12:00:00Z | 2025-02-01T00:07:11Z |
| rustsec-2021-0086 | `Read` on uninitialized buffer may cause UB ( `read_entry()` ) | 2021-01-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0027 | Loading a bgzip block can write out of bounds if size overflows. | 2021-01-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0007 | `Frame::copy_from_raw_parts` can lead to segfault without `unsafe` | 2021-01-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0015 | `Sectors::get` accesses unclaimed/uninitialized memory | 2021-01-06T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0088 | `Read` on uninitialized memory may cause UB (fn preamble_skipcount()) | 2021-01-05T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-activemq-2020-13920 | 2025-12-03T14:35:12.171Z | 2025-12-03T15:08:24.036Z | |
| bit-activemq-2020-11998 | 2025-12-03T14:35:10.504Z | 2025-12-03T15:08:24.036Z | |
| bit-flux-2022-39272 | Flux2 vulnerable to Denial of Service due to Improper use of metav1.Duration | 2025-12-02T17:37:01.043Z | 2025-12-02T18:06:28.296Z |
| bit-flux-2022-36049 | Flux2 Helm Controller denial of service | 2025-12-02T17:36:59.799Z | 2025-12-02T18:06:28.296Z |
| bit-flux-2022-36035 | Flux CLI Workload Injection | 2025-12-02T17:36:58.339Z | 2025-12-02T18:06:28.296Z |
| bit-flux-2022-24878 | Improper path handling in Kustomization files allows for denial of service | 2025-12-02T17:36:56.954Z | 2025-12-02T18:06:28.296Z |
| bit-flux-2022-24877 | Improper path handling in kustomization files allows path traversal | 2025-12-02T17:36:55.459Z | 2025-12-02T18:06:28.296Z |
| bit-flux-2022-24817 | Improper kubeconfig validation allows arbitrary code execution | 2025-12-02T17:36:53.808Z | 2025-12-02T18:06:28.296Z |
| bit-gitlab-2025-7449 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-12-02T12:05:42.978Z | 2025-12-11T12:06:55.559Z |
| bit-gitlab-2025-6195 | Direct Request ('Forced Browsing') in GitLab | 2025-12-02T12:05:25.518Z | 2025-12-11T12:06:55.559Z |
| bit-gitlab-2025-13611 | Insertion of Sensitive Information into Log File in GitLab | 2025-12-02T12:03:48.649Z | 2026-04-01T09:11:42.692Z |
| bit-gitlab-2025-12653 | Authentication Bypass by Spoofing in GitLab | 2025-12-02T12:03:41.060Z | 2025-12-11T12:06:55.559Z |
| bit-gitlab-2025-12571 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-12-02T12:03:39.208Z | 2025-12-11T12:06:55.559Z |
| bit-cilium-2025-64715 | Cilium with misconfigured toGroups in policies can lead to unrestricted egress traffic | 2025-12-02T11:35:57.032Z | 2025-12-06T12:06:23.267Z |
| bit-gitlab-2025-9825 | Missing Authorization in GitLab | 2025-11-25T18:25:02.547Z | 2025-12-03T12:08:06.927Z |
| bit-drupal-2025-13083 | Drupal core - Moderately critical - Information disclosure - SA-CORE-2025-008 | 2025-11-25T17:56:46.824Z | 2026-01-10T12:08:11.327Z |
| bit-drupal-2025-13082 | Drupal core - Moderately critical - Defacement - SA-CORE-2025-007 | 2025-11-25T17:56:45.040Z | 2025-11-25T18:26:29.568Z |
| bit-drupal-2025-13081 | Drupal core - Moderately critical - Gadget chain - SA-CORE-2025-006 | 2025-11-25T17:56:43.353Z | 2025-11-25T18:26:29.568Z |
| bit-drupal-2025-13080 | Drupal core - Moderately critical - Denial of Service - SA-CORE-2025-005 | 2025-11-25T17:56:41.671Z | 2025-11-25T18:26:29.568Z |
| bit-gitlab-2025-7000 | Insertion of Sensitive Information Into Sent Data in GitLab | 2025-11-21T09:04:35.128Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-6945 | Improper Neutralization of Special Elements used in a Command ('Command Injection') in GitLab | 2025-11-21T09:04:31.573Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-6171 | Missing Authorization in GitLab | 2025-11-21T09:04:22.209Z | 2025-11-21T09:06:15.683Z |
| bit-postgresql-2025-12818 | PostgreSQL libpq undersizes allocations, via integer wraparound | 2025-11-21T08:47:38.070Z | 2025-11-21T09:06:15.683Z |
| bit-postgresql-2025-12817 | PostgreSQL CREATE STATISTICS does not check for schema CREATE privilege | 2025-11-21T08:47:36.690Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-7736 | Incorrect Authorization in GitLab | 2025-11-20T09:05:14.844Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-2615 | Insertion of Sensitive Information Into Sent Data in GitLab | 2025-11-20T09:04:09.576Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-12983 | Memory Allocation with Excessive Size Value in GitLab | 2025-11-20T09:03:27.972Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-11990 | Improper Handling of URL Encoding (Hex Encoding) in GitLab | 2025-11-20T09:03:19.328Z | 2025-11-20T09:06:46.640Z |
| bit-gitlab-2025-11865 | Incorrect Authorization in GitLab | 2025-11-20T09:03:10.744Z | 2025-11-20T09:06:46.640Z |
| bit-moodle-2025-62401 | Moodle: possible to bypass timer in timed assignments | 2025-11-17T23:47:50.898Z | 2025-11-18T00:06:24.423Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-bx37171 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:43:22.549529Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gv62494 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:41:53.003431Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-di05920 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:41:22.824254Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kz63902 | tar | 2026-01-30T14:41:22.559595Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fz95989 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:40:52.734894Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-la33013 | Within HostnameError | 2026-01-30T14:40:22.526589Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mz27698 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:39:52.940858Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jm36781 | Within HostnameError | 2026-01-30T14:37:22.513933Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fr00621 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:36:52.496829Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dl37890 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:36:22.812571Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pk92575 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T14:35:52.456913Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gs30434 | Within HostnameError | 2026-01-30T14:35:22.588418Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ym75307 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:34:22.430652Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-di78859 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:24:51.733190Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ng71279 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:23:51.400746Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ez98723 | Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a ... | 2026-01-30T14:21:51.714006Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ju65303 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:18:21.426991Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nj87139 | vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device | 2026-01-30T14:17:21.473350Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yl27116 | tar | 2026-01-30T14:08:51.064236Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-py85990 | tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing | 2026-01-30T14:07:50.722290Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ym28538 | Prometheus Blackbox Exporter through 0 | 2026-01-30T14:06:20.601766Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zl24388 | Prometheus Blackbox Exporter through 0 | 2026-01-30T14:05:50.598465Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-la13761 | vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device | 2026-01-30T14:05:50.594365Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xz45798 | Within HostnameError | 2026-01-30T14:05:20.961893Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-th00404 | Within HostnameError | 2026-01-30T14:04:20.735662Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xb70091 | Within HostnameError | 2026-01-30T14:03:50.560679Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pd99018 | Within HostnameError | 2026-01-30T14:02:50.913977Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kg18353 | Within HostnameError | 2026-01-30T14:02:50.542288Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cd92481 | Within HostnameError | 2026-01-30T14:01:20.457302Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yk82785 | Within HostnameError | 2026-01-30T14:01:20.108833Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0872 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| certfr-2025-avi-0871 | Multiples vulnérabilités dans les produits Fortinet | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| certfr-2025-avi-0870 | Vulnérabilité dans Microsoft Azure | 2025-10-14T00:00:00.000000 | 2025-10-14T00:00:00.000000 |
| certfr-2025-avi-0869 | Multiples vulnérabilités dans les produits Veeam | 2025-10-14T00:00:00.000000 | 2025-10-14T00:00:00.000000 |
| certfr-2025-avi-0868 | Vulnérabilité dans Siemens SIMATIC | 2025-10-14T00:00:00.000000 | 2025-10-14T00:00:00.000000 |
| certfr-2025-avi-0867 | Multiples vulnérabilités dans les produits SAP | 2025-10-14T00:00:00.000000 | 2025-10-14T00:00:00.000000 |
| certfr-2025-avi-0866 | Vulnérabilité dans Elastic Cloud Enterprise | 2025-10-14T00:00:00.000000 | 2025-10-14T00:00:00.000000 |
| certfr-2025-avi-0865 | Vulnérabilité dans Oracle E-Business Suite | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| certfr-2025-avi-0864 | Multiples vulnérabilités dans VMware Tanzu | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| certfr-2025-avi-0863 | Vulnérabilité dans Belden HiOS Switch Platform | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| certfr-2025-avi-0862 | Multiples vulnérabilités dans Microsoft Edge | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0861 | Multiples vulnérabilités dans les produits IBM | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0860 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0859 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0858 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0857 | Vulnérabilité dans Wireshark | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0856 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0855 | Multiples vulnérabilités dans les produits Juniper Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0854 | Vulnérabilité dans les produits Moxa | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0853 | Multiples vulnérabilités dans GitLab | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0852 | Vulnérabilité dans Tenable Security Center | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0851 | Vulnérabilité dans Python | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0850 | Multiples vulnérabilités dans Google Chrome | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0849 | Multiples vulnérabilités dans les produits Elastic | 2025-10-07T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| certfr-2025-avi-0848 | Vulnérabilité dans OpenSSH | 2025-10-06T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| certfr-2025-avi-0847 | Vulnérabilité dans les produits Liferay | 2025-10-06T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0846 | Multiples vulnérabilités dans les produits Qnap | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-avi-0845 | Multiples vulnérabilités dans Zabbix | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-avi-0844 | Multiples vulnérabilités dans IBM Sterling Connect | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0843 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2022-000067 | Installer of Ricoh Device Software Manager may insecurely load Dynamic Link Libraries | 2022-08-29T15:57+09:00 | 2024-06-13T13:53+09:00 |
| jvndb-2022-000064 | Movable Type XMLRPC API vulnerable to command injection | 2022-08-24T15:58+09:00 | 2024-06-13T18:11+09:00 |
| jvndb-2022-000065 | Multiple vulnerabilities in Exment | 2022-08-24T14:23+09:00 | 2024-06-14T11:09+09:00 |
| jvndb-2022-002339 | Multiple vulnerabilities in PukiWiki | 2022-08-24T14:17+09:00 | 2024-06-14T11:55+09:00 |
| jvndb-2022-002338 | PLANEX MZK-DP150N contains hidden administrative functionality | 2022-08-23T15:02+09:00 | 2024-06-14T14:06+09:00 |
| jvndb-2022-000063 | PukiWiki vulnerable to cross-site scripting | 2022-08-23T14:40+09:00 | 2024-06-14T12:00+09:00 |
| jvndb-2022-002337 | UNIMO Technology digital video recorders vulnerable to missing authentication for critical functions | 2022-08-23T14:31+09:00 | 2024-06-14T10:24+09:00 |
| jvndb-2022-002295 | Multiple vulnerabilities in Trend Micro Security | 2022-08-19T11:42+09:00 | 2022-08-19T11:42+09:00 |
| jvndb-2022-002265 | Trend Micro Endpoint security products for enterprises vulnerable to Link Following Local Privilege Escalation | 2022-08-18T15:45+09:00 | 2024-06-14T17:11+09:00 |
| jvndb-2022-000062 | Kaitai Struct: compiler vulnerable to denial-of-service (DoS) | 2022-08-04T15:14+09:00 | 2022-08-04T15:14+09:00 |
| jvndb-2022-002112 | CONTEC SolarView Compact vulnerable to insufficient verification in uploading files | 2022-08-03T17:40+09:00 | 2024-06-14T15:21+09:00 |
| jvndb-2022-002143 | Information Disclosure Vulnerability in Hitachi Automation Director and Hitachi Ops Center Automator | 2022-08-01T17:10+09:00 | 2022-08-01T17:10+09:00 |
| jvndb-2022-000056 | Multiple vulnerabilities in Nintendo Wi-Fi Network Adaptor WAP-001 | 2022-07-29T13:43+09:00 | 2024-06-14T16:27+09:00 |
| jvndb-2022-000061 | "JustSystems JUST Online Update for J-License" starts a program with an unquoted file path | 2022-07-28T13:40+09:00 | 2022-07-28T13:40+09:00 |
| jvndb-2022-000060 | "Hulu" App for iOS vulnerable to improper server certificate verification | 2022-07-28T09:51+09:00 | 2024-06-14T12:25+09:00 |
| jvndb-2022-000059 | "Hulu" App for Android uses a hard-coded API key for an external service | 2022-07-28T09:14+09:00 | 2024-06-14T14:42+09:00 |
| jvndb-2022-000057 | WordPress Plugin "Newsletter" vulnerable to cross-site scripting | 2022-07-25T14:30+09:00 | 2024-06-18T11:21+09:00 |
| jvndb-2022-000058 | Multiple vulnerabilities in untangle | 2022-07-25T14:18+09:00 | 2024-06-17T11:03+09:00 |
| jvndb-2022-000055 | Booked vulnerable to open redirect | 2022-07-22T13:40+09:00 | 2024-06-14T17:43+09:00 |
| jvndb-2022-000054 | Multiple vulnerabilities in Cybozu Office | 2022-07-20T17:28+09:00 | 2024-06-14T14:02+09:00 |
| jvndb-2022-002017 | U-Boot squashfs filesystem implementation vulnerable to heap-based buffer overflow | 2022-07-14T15:59+09:00 | 2024-06-14T17:53+09:00 |
| jvndb-2022-000053 | Django Extract and Trunc functions vulnerable to SQL injection | 2022-07-12T13:47+09:00 | 2024-06-18T11:57+09:00 |
| jvndb-2022-000052 | Passage Drive vulnerable to insufficient data verification | 2022-07-08T13:42+09:00 | 2024-06-14T17:48+09:00 |
| jvndb-2022-000051 | Multiple vulnerabilities in Cybozu Garoon | 2022-07-04T14:17+09:00 | 2024-06-17T16:49+09:00 |
| jvndb-2022-000050 | LiteCart vulnerable to cross-site scripting | 2022-07-04T14:12+09:00 | 2024-06-17T10:39+09:00 |
| jvndb-2022-000049 | HOME SPOT CUBE2 vulnerable to OS command injection | 2022-06-29T13:42+09:00 | 2024-06-17T10:45+09:00 |
| jvndb-2022-000048 | L2Blocker Sensor setup screen vulnerable to authentication bypass | 2022-06-24T14:21+09:00 | 2024-06-18T10:45+09:00 |
| jvndb-2022-000047 | web2py vulnerable to open redirect | 2022-06-23T14:21+09:00 | 2024-06-18T10:48+09:00 |
| jvndb-2022-000046 | Gitlab vulnerable to server-side request forgery | 2022-06-17T12:26+09:00 | 2024-06-20T15:39+09:00 |
| jvndb-2022-001953 | Growi vulnerable to weak password requirements | 2022-06-15T17:47+09:00 | 2022-06-15T17:47+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14676 | IBM Db2拒绝服务漏洞(CNVD-2026-14676) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14675 | IBM Db2拒绝服务漏洞(CNVD-2026-14675) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14674 | IBM Db2拒绝服务漏洞(CNVD-2026-14674) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14673 | IBM Db2拒绝服务漏洞(CNVD-2026-14673) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14672 | IBM Db2拒绝服务漏洞(CNVD-2026-14672) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14671 | IBM Db2拒绝服务漏洞(CNVD-2026-14671) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14670 | IBM Db2拒绝服务漏洞(CNVD-2026-14670) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14669 | IBM Db2拒绝服务漏洞(CNVD-2026-14669) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14668 | IBM Db2拒绝服务漏洞(CNVD-2026-14668) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14667 | IBM Db2拒绝服务漏洞(CNVD-2026-14667) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14666 | IBM Db2拒绝服务漏洞(CNVD-2026-14666) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14665 | IBM Db2 Big SQL on Cloud Pak for Data资源管理错误漏洞 | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14653 | Rockwell Automation Studio 5000 Logix Designer代码问题漏洞 | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14409 | UTT 520W goform/formIpGroupConfig文件缓冲区溢出漏洞 | 2026-02-11 | 2026-03-20 |
| cnvd-2026-13789 | IBM Db2资源管理错误漏洞(CNVD-2026-13789) | 2026-02-11 | 2026-03-16 |
| cnvd-2026-13788 | IBM Concert跨站脚本漏洞(CNVD-2026-13788) | 2026-02-11 | 2026-03-16 |
| cnvd-2026-13787 | IBM Concert访问控制错误漏洞(CNVD-2026-13787) | 2026-02-11 | 2026-03-16 |
| cnvd-2026-13431 | OpenClaw访问控制错误漏洞(CNVD-2026-13431) | 2026-02-11 | 2026-03-11 |
| cnvd-2026-13290 | OpenClaw操作系统命令注入漏洞 | 2026-02-11 | 2026-03-11 |
| cnvd-2026-13227 | TOTOLINK A950RG缓冲区溢出漏洞 | 2026-02-11 | 2026-03-11 |
| cnvd-2026-13225 | TOTOLINK A950RG堆栈缓冲区溢出漏洞 | 2026-02-11 | 2026-03-11 |
| cnvd-2026-12766 | Huawei EMUI和Huawei HarmonyOS通信模块地址读取漏洞 | 2026-02-11 | 2026-03-06 |
| cnvd-2026-12765 | Huawei EMUI和Huawei HarmonyOS AMS模块权限控制类漏洞 | 2026-02-11 | 2026-03-06 |
| cnvd-2026-12764 | Huawei HarmonyOS HDC模块缓冲区溢出漏洞 | 2026-02-11 | 2026-03-06 |
| cnvd-2026-12687 | IBM PowerVM Hypervisor存在未明漏洞 | 2026-02-11 | 2026-03-05 |
| cnvd-2026-12685 | IBM Concert存在信息泄露漏洞 | 2026-02-11 | 2026-03-05 |
| cnvd-2026-12672 | IBM Cloud Pak for Business Automation存在XSS漏洞 | 2026-02-11 | 2026-03-05 |
| cnvd-2026-12671 | IBM Concert存在弱密码算法漏洞 | 2026-02-11 | 2026-03-05 |
| cnvd-2026-12670 | IBM Cloud Pak for Business Automation存在拒绝服务漏洞 | 2026-02-11 | 2026-03-05 |
| cnvd-2026-12669 | IBM Business Automation Workflow containers和IBM Business Automation Workflow traditional存… | 2026-02-11 | 2026-03-05 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-00916 | Уязвимость платформы для автоматизации рабочих процессов N8n, связанная с неверным управл… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00915 | Уязвимость функций memalign(), posix_memalign(), aligned_alloc(), valloc(), pvalloc() сис… | 28.01.2026 | 04.02.2026 |
| bdu:2026-00914 | Уязвимость библиотеки libtpms, связанная с использованием криптографических алгоритмов, с… | 28.01.2026 | 04.02.2026 |
| bdu:2026-00913 | Уязвимость менеджера загрузок GNU Wget2, связанная с неверным ограничением имени пути к к… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00912 | Уязвимость компонента LivewireFilemanagerComponent.php файлового менеджера Livewire Filem… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00911 | Уязвимость драйвера механизма межпроцессного взаимодействия Rust Binder ядра операционной… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00910 | Уязвимость драйвера модема Motorola SM56 Modem WDM Driver (SmSerl64.sys) операционной сис… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00909 | Уязвимость микропрограммного обеспечения UEFI материнских плат ASRock на базе чипсетов In… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00908 | Уязвимость микропрограммного обеспечения UEFI материнских плат MSI на базе чипсетов Intel… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00907 | Уязвимость микропрограммного обеспечения UEFI материнских плат ASUS на базе чипсетов Inte… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00906 | Уязвимость почтового сервера Exim, связанная с переполнением буфера в динамической памяти… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00905 | Уязвимость интерфейса управления API Team Manager веб-хостинга cPanel, позволяющая наруши… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00904 | Уязвимость функции mt7615_mcu_wtbl_sta_add() ядра операционной системы Linux, позволяющая… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00903 | Уязвимость функции mchp_eic_domain_alloc() ядра операционной системы Linux, позволяющая н… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00902 | Уязвимость функции starfive_hash_digest() ядра операционной системы Linux, позволяющая на… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00901 | Уязвимость функции rtl8180_init_rx_ring() ядра операционной системы Linux, позволяющая на… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00900 | Уязвимость функции timer_delete_sync() ядра операционной системы Linux, позволяющая наруш… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00899 | Уязвимость драйвера I2C MOST ядра операционной системы Linux, позволяющая нарушителю выпо… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00898 | Уязвимость компонента NFS ядра операционной системы Linux, позволяющая нарушителю вызвать… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00897 | Уязвимость компонента devlink ядра операционной системы Linux, позволяющая нарушителю выз… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00896 | Уязвимость функции put_user() ядра операционной системы Linux, позволяющая нарушителю вып… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00895 | Уязвимость функции blk_mq_{add,del}_queue_tag_set() ядра операционной системы Linux, позв… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00894 | Уязвимость модулей tika-core, tika-pdf-module и tika-parsers среды обнаружения и анализа … | 28.01.2026 | 28.01.2026 |
| bdu:2026-00893 | Уязвимость микропрограммного обеспечения UEFI материнских плат GIGABYTE на базе чипсетов … | 28.01.2026 | 28.01.2026 |
| bdu:2026-00892 | Уязвимость реализации защитного механизма SEV-SNP микропрограммного обеспечения графическ… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00891 | Уязвимость библиотеки node-tar программной платформы Node.js, позволяющая нарушителю обой… | 28.01.2026 | 10.02.2026 |
| bdu:2026-00890 | Уязвимость обработчика CMS-сообщений криптографической библиотеки OpenSSL, позволяющая на… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00889 | Уязвимость функции push_nsh() ядра операционной системы Linux, позволяющая нарушителю выз… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00888 | Уязвимость функции btrfs_log_new_name() ядра операционной системы Linux, позволяющая нару… | 28.01.2026 | 28.01.2026 |
| bdu:2026-00887 | Уязвимость компонента для отображения веб-страниц WebView браузера Google Chrome, позволя… | 28.01.2026 | 02.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200609-0931 | The Security Framework in Apple Mac OS X 10.4 through 10.4.8 allows remote attackers to c… | 2026-03-09T23:14:09.181000Z |
| var-201512-0325 | The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml… | 2026-03-09T23:14:08.806000Z |
| var-202208-2263 | When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies … | 2026-03-09T23:13:33.194000Z |
| var-201912-0647 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-03-09T23:13:32.803000Z |
| var-201304-0184 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-09T23:13:32.350000Z |
| var-201908-0265 | Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a … | 2026-03-09T23:11:32.559000Z |
| var-200110-0206 | The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.… | 2026-03-09T23:10:59.953000Z |
| var-201210-0280 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-09T23:09:51.658000Z |
| var-201208-0343 | libxslt 1.1.26 and earlier, as used in Google Chrome before 21.0.1180.89, does not proper… | 2026-03-09T23:09:50.845000Z |
| var-201904-0745 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-03-09T23:09:49.414000Z |
| var-202110-1622 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2026-03-09T23:09:45.858000Z |
| var-201606-0382 | Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified … | 2026-03-09T23:08:49.434000Z |
| var-200106-0035 | Buffer overflow in Internet Printing ISAPI extension in Windows 2000 allows remote attack… | 2026-03-09T23:08:47.953000Z |
| var-201912-0592 | An input validation issue was addressed with improved memory handling. This issue is fixe… | 2026-03-09T23:08:47.381000Z |
| var-201109-0208 | Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers… | 2026-03-09T23:06:45.663000Z |
| var-200609-1595 | Buffer overflow in PPP on Apple Mac OS X 10.4.x up to 10.4.8 and 10.3.x up to 10.3.9, whe… | 2026-03-09T23:05:40.775000Z |
| var-202202-0101 | In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString. Expat i… | 2026-03-09T23:05:37.731000Z |
| var-201908-0261 | Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leadin… | 2026-03-09T23:05:37.646000Z |
| var-200512-0299 | Heap-based buffer overflow in rsync in Mac OS X 10.4 through 10.4.5 allows remote authent… | 2026-03-09T23:05:05.520000Z |
| var-201605-0467 | Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4… | 2026-03-09T23:04:27.846000Z |
| var-202301-1703 | The issue was addressed with improved memory handling. This issue is fixed in macOS Monte… | 2026-03-09T23:03:52.706000Z |
| var-201605-0465 | The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple … | 2026-03-09T23:03:52.635000Z |
| var-200904-0819 | Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.… | 2026-03-09T23:03:47.521000Z |
| var-200810-0140 | Unspecified vulnerability in Finder in Mac OS X 10.5.5 allows user-assisted attackers to … | 2026-03-09T23:03:14.551000Z |
| var-201302-0301 | Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on … | 2026-03-09T23:03:09.710000Z |
| var-201710-1406 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari befo… | 2026-03-09T23:02:37.241000Z |
| var-202010-1512 | An input validation issue was addressed with improved input validation. This issue is fix… | 2026-03-09T23:02:37.149000Z |
| var-200604-0209 | Unspecified vulnerability in Microsoft Internet Explorer 5.01 through 6 allows remote att… | 2026-03-09T23:02:36.176000Z |
| var-201903-0388 | An integer overflow flaw which could lead to an out of bounds write was discovered in lib… | 2026-03-09T23:02:33.701000Z |
| var-201208-0141 | Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in … | 2026-03-09T23:02:24.921000Z |