Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-6311 |
8.3 (3.1)
|
Uninitialized Use in Accessibility in Google Chro… |
Google |
Chrome |
2026-04-15T19:04:53.973Z | 2026-04-15T20:11:02.987Z |
| CVE-2026-6310 |
8.3 (3.1)
|
Use after free in Dawn in Google Chrome prior to … |
Google |
Chrome |
2026-04-15T19:04:53.589Z | 2026-04-15T19:57:58.238Z |
| CVE-2026-6360 |
8.8 (3.1)
|
Use after free in FileSystem in Google Chrome pri… |
Google |
Chrome |
2026-04-15T19:04:53.135Z | 2026-04-15T20:04:52.516Z |
| CVE-2026-6309 |
8.3 (3.1)
|
Use after free in Viz in Google Chrome prior to 1… |
Google |
Chrome |
2026-04-15T19:04:52.730Z | 2026-04-15T19:56:38.792Z |
| CVE-2026-6308 |
N/A
|
Out of bounds read in Media in Google Chrome prio… |
Google |
Chrome |
2026-04-15T19:04:52.265Z | 2026-04-15T19:04:52.265Z |
| CVE-2026-6307 |
8.8 (3.1)
|
Type Confusion in Turbofan in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:51.835Z | 2026-04-15T19:52:08.220Z |
| CVE-2026-6306 |
N/A
|
Heap buffer overflow in PDFium in Google Chrome p… |
Google |
Chrome |
2026-04-15T19:04:51.372Z | 2026-04-15T19:04:51.372Z |
| CVE-2026-6305 |
8.8 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome p… |
Google |
Chrome |
2026-04-15T19:04:50.926Z | 2026-04-15T20:24:31.374Z |
| CVE-2026-6304 |
8.3 (3.1)
|
Use after free in Graphite in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:50.503Z | 2026-04-15T19:55:22.037Z |
| CVE-2026-6303 |
N/A
|
Use after free in Codecs in Google Chrome prior t… |
Google |
Chrome |
2026-04-15T19:04:50.052Z | 2026-04-15T19:04:50.052Z |
| CVE-2026-6302 |
8.8 (3.1)
|
Use after free in Video in Google Chrome prior to… |
Google |
Chrome |
2026-04-15T19:04:49.608Z | 2026-04-15T19:53:24.137Z |
| CVE-2026-6301 |
8.8 (3.1)
|
Type Confusion in Turbofan in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:49.077Z | 2026-04-15T19:51:16.812Z |
| CVE-2026-6300 |
8.8 (3.1)
|
Use after free in CSS in Google Chrome prior to 1… |
Google |
Chrome |
2026-04-15T19:04:48.606Z | 2026-04-15T19:49:57.039Z |
| CVE-2026-6359 |
8.8 (3.1)
|
Use after free in Video in Google Chrome on Windo… |
Google |
Chrome |
2026-04-15T19:04:48.203Z | 2026-04-15T19:48:23.899Z |
| CVE-2026-6358 |
8.8 (3.1)
|
Use after free in XR in Google Chrome on Android … |
Google |
Chrome |
2026-04-15T19:04:47.677Z | 2026-04-15T19:46:06.591Z |
| CVE-2026-6299 |
8.8 (3.1)
|
Use after free in Prerender in Google Chrome prio… |
Google |
Chrome |
2026-04-15T19:04:47.116Z | 2026-04-15T19:44:41.512Z |
| CVE-2026-6298 |
4.3 (3.1)
|
Heap buffer overflow in Skia in Google Chrome pri… |
Google |
Chrome |
2026-04-15T19:04:46.537Z | 2026-04-15T20:25:53.459Z |
| CVE-2026-6297 |
8.3 (3.1)
|
Use after free in Proxy in Google Chrome prior to… |
Google |
Chrome |
2026-04-15T19:04:46.102Z | 2026-04-15T19:43:51.127Z |
| CVE-2026-6296 |
9.6 (3.1)
|
Heap buffer overflow in ANGLE in Google Chrome pr… |
Google |
Chrome |
2026-04-15T19:04:45.229Z | 2026-04-15T20:12:31.786Z |
| CVE-2026-40919 |
6.1 (3.1)
|
Gimp: gimp: denial of service via specially crafted se… |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-04-15T18:59:16.272Z | 2026-04-15T20:01:40.521Z |
| CVE-2026-40918 |
5.5 (3.1)
|
Gimp: gimp: denial of service via crafted pvr image file |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-04-15T18:59:14.823Z | 2026-04-15T18:59:14.823Z |
| CVE-2026-40917 |
5 (3.1)
|
Gimp: gimp: application crashes or information disclos… |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-04-15T18:59:09.003Z | 2026-04-15T19:27:21.721Z |
| CVE-2026-40916 |
5 (3.1)
|
Gimp: gimp: denial of service due to stack buffer over… |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-04-15T18:58:57.615Z | 2026-04-15T19:59:03.461Z |
| CVE-2026-40915 |
5.5 (3.1)
|
Gimp: gimp: heap buffer overflow due to integer overfl… |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-04-15T18:58:52.059Z | 2026-04-15T19:32:55.287Z |
| CVE-2026-21727 |
3.3 (3.1)
|
Grafana Correlations: Cross-Tenant Data Disclosure and… |
Grafana |
Grafana Correlations |
2026-04-15T18:57:25.185Z | 2026-04-15T19:57:25.515Z |
| CVE-2026-5189 |
9.2 (4.0)
|
Nexus Repository 3 - Hardcoded Credential in Internal … |
Sonatype |
Nexus Repository |
2026-04-15T18:43:32.166Z | 2026-04-15T18:58:00.845Z |
| CVE-2026-33667 |
7.4 (3.1)
|
OpenProject: 2FA OTP Verification Missing Rate Limiting |
opf |
openproject |
2026-04-15T18:43:14.130Z | 2026-04-15T20:00:14.503Z |
| CVE-2026-40256 |
5 (3.1)
|
Weblate: Prefix-Based Repository Boundary Check Bypass… |
WeblateOrg |
weblate |
2026-04-15T18:36:44.975Z | 2026-04-15T18:36:44.975Z |
| CVE-2026-34632 |
8.2 (3.1)
|
Photoshop Installer | CWE-427: Uncontrolled Search Pat… |
Adobe |
Adobe Photoshop Installer |
2026-04-15T18:35:52.192Z | 2026-04-15T19:58:18.709Z |
| CVE-2026-6245 |
5.5 (3.1)
|
Sssd: out-of-bounds read in the sssd |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-04-15T18:35:19.401Z | 2026-04-15T20:01:50.488Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-6304 |
8.3 (3.1)
|
Use after free in Graphite in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:50.503Z | 2026-04-15T19:55:22.037Z |
| CVE-2026-6303 |
N/A
|
Use after free in Codecs in Google Chrome prior t… |
Google |
Chrome |
2026-04-15T19:04:50.052Z | 2026-04-15T19:04:50.052Z |
| CVE-2026-6302 |
8.8 (3.1)
|
Use after free in Video in Google Chrome prior to… |
Google |
Chrome |
2026-04-15T19:04:49.608Z | 2026-04-15T19:53:24.137Z |
| CVE-2026-6301 |
8.8 (3.1)
|
Type Confusion in Turbofan in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:49.077Z | 2026-04-15T19:51:16.812Z |
| CVE-2026-6300 |
8.8 (3.1)
|
Use after free in CSS in Google Chrome prior to 1… |
Google |
Chrome |
2026-04-15T19:04:48.606Z | 2026-04-15T19:49:57.039Z |
| CVE-2026-6299 |
8.8 (3.1)
|
Use after free in Prerender in Google Chrome prio… |
Google |
Chrome |
2026-04-15T19:04:47.116Z | 2026-04-15T19:44:41.512Z |
| CVE-2026-6298 |
4.3 (3.1)
|
Heap buffer overflow in Skia in Google Chrome pri… |
Google |
Chrome |
2026-04-15T19:04:46.537Z | 2026-04-15T20:25:53.459Z |
| CVE-2026-6297 |
8.3 (3.1)
|
Use after free in Proxy in Google Chrome prior to… |
Google |
Chrome |
2026-04-15T19:04:46.102Z | 2026-04-15T19:43:51.127Z |
| CVE-2026-6296 |
9.6 (3.1)
|
Heap buffer overflow in ANGLE in Google Chrome pr… |
Google |
Chrome |
2026-04-15T19:04:45.229Z | 2026-04-15T20:12:31.786Z |
| CVE-2026-40919 |
6.1 (3.1)
|
Gimp: gimp: denial of service via specially crafted se… |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-04-15T18:59:16.272Z | 2026-04-15T20:01:40.521Z |
| CVE-2026-40918 |
5.5 (3.1)
|
Gimp: gimp: denial of service via crafted pvr image file |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-04-15T18:59:14.823Z | 2026-04-15T18:59:14.823Z |
| CVE-2026-40917 |
5 (3.1)
|
Gimp: gimp: application crashes or information disclos… |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-04-15T18:59:09.003Z | 2026-04-15T19:27:21.721Z |
| CVE-2026-40916 |
5 (3.1)
|
Gimp: gimp: denial of service due to stack buffer over… |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-04-15T18:58:57.615Z | 2026-04-15T19:59:03.461Z |
| CVE-2026-40915 |
5.5 (3.1)
|
Gimp: gimp: heap buffer overflow due to integer overfl… |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-04-15T18:58:52.059Z | 2026-04-15T19:32:55.287Z |
| CVE-2026-39857 |
5.3 (3.1)
|
Information Disclosure via `choices`/`counts` Query Pa… |
apostrophecms |
apostrophe |
2026-04-15T19:38:57.564Z | 2026-04-15T19:38:57.564Z |
| CVE-2026-35569 |
8.7 (3.1)
|
ApostropheCMS: Stored XSS in SEO Fields Leads to Authe… |
apostrophecms |
apostrophe |
2026-04-15T19:34:23.648Z | 2026-04-15T19:34:23.648Z |
| CVE-2026-33889 |
5.4 (3.1)
|
ApostropheCMS: Stored XSS via CSS Custom Property Inje… |
apostrophecms |
apostrophe |
2026-04-15T19:29:50.899Z | 2026-04-15T19:29:50.899Z |
| CVE-2026-33888 |
5.3 (3.1)
|
ApostropheCMS: publicApiProjection Bypass via `project… |
apostrophecms |
apostrophe |
2026-04-15T19:25:46.262Z | 2026-04-15T20:03:30.594Z |
| CVE-2026-33877 |
3.7 (3.1)
|
ApostropheCMS: User Enumeration via Timing Side Channe… |
apostrophecms |
apostrophe |
2026-04-15T19:11:06.796Z | 2026-04-15T19:30:53.040Z |
| CVE-2026-21727 |
3.3 (3.1)
|
Grafana Correlations: Cross-Tenant Data Disclosure and… |
Grafana |
Grafana Correlations |
2026-04-15T18:57:25.185Z | 2026-04-15T19:57:25.515Z |
| CVE-2026-21726 |
5.3 (3.1)
|
Loki Path Traversal - CVE-2021-36156 Bypass |
Grafana |
Loki |
2026-04-15T19:24:31.268Z | 2026-04-15T20:01:33.375Z |
| CVE-2025-41118 |
9.1 (3.1)
|
Sensitive COS `SecretKey` exposed in plaintext via con… |
Grafana |
Pyroscope |
2026-04-15T19:15:17.689Z | 2026-04-15T19:33:10.329Z |
| CVE-2026-6383 |
5.4 (3.1)
|
Kubevirt: kubevirt: unauthorized subresource access du… |
Red Hat |
Red Hat OpenShift Virtualization 4 |
2026-04-15T18:22:30.589Z | 2026-04-15T18:40:31.052Z |
| CVE-2026-6245 |
5.5 (3.1)
|
Sssd: out-of-bounds read in the sssd |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-04-15T18:35:19.401Z | 2026-04-15T20:01:50.488Z |
| CVE-2026-5189 |
9.2 (4.0)
|
Nexus Repository 3 - Hardcoded Credential in Internal … |
Sonatype |
Nexus Repository |
2026-04-15T18:43:32.166Z | 2026-04-15T18:58:00.845Z |
| CVE-2026-4857 |
8.4 (3.1)
|
SailPoint IdentityIQ Debug UI Incorrect Authorization |
SailPoint Technologies |
IdentityIQ |
2026-04-15T18:08:45.737Z | 2026-04-15T18:32:51.546Z |
| CVE-2026-40256 |
5 (3.1)
|
Weblate: Prefix-Based Repository Boundary Check Bypass… |
WeblateOrg |
weblate |
2026-04-15T18:36:44.975Z | 2026-04-15T18:36:44.975Z |
| CVE-2026-39845 |
4.1 (3.1)
|
Weblate: SSRF via the webhook add-on using unprotected… |
WeblateOrg |
weblate |
2026-04-15T18:26:51.706Z | 2026-04-15T20:01:56.793Z |
| CVE-2026-34632 |
8.2 (3.1)
|
Photoshop Installer | CWE-427: Uncontrolled Search Pat… |
Adobe |
Adobe Photoshop Installer |
2026-04-15T18:35:52.192Z | 2026-04-15T19:58:18.709Z |
| CVE-2026-34393 |
8.8 (3.1)
|
Weblate: Privilege escalation in the user API endpoint |
WeblateOrg |
weblate |
2026-04-15T18:24:30.813Z | 2026-04-15T18:38:53.920Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-vcp6-gxf9-8g4m |
8.4 (3.1)
|
IdentityIQ 8.5, all IdentityIQ 8.5 patch levels prior to 8.5p2, IdentityIQ 8.4, and all IdentityIQ … | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-qh6q-mfp5-q5wr |
5.5 (3.1)
|
A flaw was found in GIMP. Processing a specially crafted PVR image file with large dimensions can l… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-pfc6-jxgq-cf62 |
8.3 (3.1)
|
Use after free in Proxy in Google Chrome prior to 147.0.7727.101 allowed an attacker in a privilege… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-p5x9-j974-rpfp |
3.3 (3.1)
|
--- title: Cross-Tenant Legacy Correlation Disclosure and Deletion draft: false hero: image: /sta… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-m9hq-h476-h2g8 |
9.1 (3.1)
|
Pyroscope is an open-source continuous profiling database. The database supports various storage ba… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-j6cv-3w8p-vrg8 |
5.4 (3.1)
|
A flaw was found in KubeVirt's Role-Based Access Control (RBAC) evaluation logic. The authorization… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-g672-w7xh-qp9j |
5.5 (3.1)
|
A flaw was found in the System Security Services Daemon (SSSD). The pam_passkey_child_read_data() f… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-9w25-v364-3jpm |
8.8 (3.1)
|
Use after free in CSS in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:19Z |
| ghsa-856r-6q67-9x29 |
5.0 (3.1)
|
A flaw was found in GIMP. This vulnerability, a heap buffer over-read in the `icns_slurp()` functio… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-7x7j-88hg-3j82 |
6.1 (3.1)
|
A flaw was found in GIMP. This vulnerability, a buffer overflow in the `file-seattle-filmworks` plu… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-4gcp-x7jh-x4v7 |
9.2 (4.0)
|
CWE-798: Use of Hard-coded Credentials in Sonatype Nexus Repository Manager versions 3.0.0 through … | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-4f9g-vrx9-f8cq |
5.5 (3.1)
|
A flaw was found in GIMP. A remote attacker could exploit an integer overflow vulnerability in the … | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-497x-rrr9-68jp |
5.3 (3.1)
|
The CVE-2021-36156 fix validates the namespace parameter for path traversal sequences after a singl… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-3p5h-985r-gw4g |
4.3 (3.1)
|
Heap buffer overflow in Skia in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to … | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-3347-qjpp-457v |
8.8 (3.1)
|
Use after free in Prerender in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to e… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-xw5x-xgqj-5wfc |
8.2 (3.1)
|
Adobe Photoshop Installer was affected by an Uncontrolled Search Path Element vulnerability that co… | 2026-04-15T21:30:17Z | 2026-04-15T21:30:17Z |
| ghsa-qh43-xrjm-4ggp |
4.3 (3.1)
|
Kimai's User Preferences API allows standard users to modify restricted attributes: hourly_rate, in… | 2026-04-15T19:46:45Z | 2026-04-15T19:46:45Z |
| ghsa-g82g-m9vx-vhjg |
5.4 (3.1)
|
Kimai has Stored XSS via Incomplete HTML Attribute Escaping in Team Member Widget | 2026-04-15T19:46:35Z | 2026-04-15T19:46:35Z |
| ghsa-xjw8-8c5c-9r79 |
9.0 (3.1)
|
Improper neutralization of specific syntax patterns for unauthorized expressions in Thymeleaf | 2026-04-15T19:46:23Z | 2026-04-15T19:46:23Z |
| ghsa-r4v4-5mwr-2fwr |
9.0 (3.1)
|
Improper restriction of the scope of accessible objects in Thymeleaf expressions | 2026-04-15T19:46:04Z | 2026-04-15T19:46:04Z |
| ghsa-mj87-hwqh-73pj |
5.3 (3.1)
|
python-multipart affected by Denial of Service via large multipart preamble or epilogue data | 2026-04-15T19:45:44Z | 2026-04-15T19:45:44Z |
| ghsa-mvvv-v22x-xqwp |
6.4 (4.0)
|
NocoBase has SSRF in Workflow HTTP Request and Custom Request Plugins | 2026-04-15T19:43:50Z | 2026-04-15T19:43:50Z |
| ghsa-xp4f-g2cm-rhg7 |
6.9 (4.0)
|
PocketMine-MP has LogDoS by many junk properties in client data JWT in LoginPacket | 2026-04-15T19:43:33Z | 2026-04-15T19:43:33Z |
| ghsa-jj6c-8h6c-hppx |
4.8 (4.0)
|
pypdf has long runtimes for wrong size values in cross-reference and object streams | 2026-04-15T19:43:09Z | 2026-04-15T19:43:09Z |
| ghsa-g24f-mgc3-jwwc |
7.6 (3.1)
|
OpenRemote has XXE in Velbus Asset Import | 2026-04-15T19:42:23Z | 2026-04-15T21:17:52Z |
| ghsa-xphw-cqx3-667j |
7.3 (3.1)
|
thin-vec: Use-After-Free and Double Free in IntoIter::drop When Element Drop Panics | 2026-04-15T19:24:54Z | 2026-04-15T19:24:54Z |
| ghsa-247c-9743-5963 |
7.5 (3.1)
|
Fastify has a Body Schema Validation Bypass via Leading Space in Content-Type Header | 2026-04-15T19:24:41Z | 2026-04-15T19:24:41Z |
| ghsa-pxq7-h93f-9jrg |
8.2 (3.1)
|
OAuth2 Proxy has an Authentication Bypass via Fragment Confusion in skip_auth_routes and skip_auth_regex | 2026-04-15T19:24:13Z | 2026-04-15T19:24:13Z |
| ghsa-c5c4-8r6x-56w3 |
6.8 (3.1)
|
OAuth2 Proxy has an Authorization Bypass in Email Domain Validation via Malformed Multi-@ Email Claims | 2026-04-15T19:23:54Z | 2026-04-15T19:23:54Z |
| ghsa-7x63-xv5r-3p2x |
9.1 (3.1)
|
OAuth2 Proxy has an Authentication Bypass via X-Forwarded-Uri Header Spoofing | 2026-04-15T19:21:06Z | 2026-04-15T19:21:06Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2025-42 |
9.8 (3.1)
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Ver… | vllm | 2025-04-30T01:15:51+00:00 | 2025-05-28T21:23:12.396609+00:00 |
| pysec-2025-34 |
|
The unsafe globals in Picklescan before 0.0.25 do not include ssl. Consequently, ssl.get_… | picklescan | 2025-04-24T01:15:49+00:00 | 2025-04-24T03:08:15.436691+00:00 |
| pysec-2025-56 |
4.3 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. In versions up t… | octoprint | 2025-04-22T18:15:59+00:00 | 2025-06-27T17:22:53.513680+00:00 |
| pysec-2025-41 |
9.8 (3.1)
|
PyTorch is a Python package that provides tensor computation with strong GPU acceleration… | torch | 2025-04-18T16:15:23+00:00 | 2025-05-28T15:23:37.843138+00:00 |
| pysec-2025-35 |
7.5 (3.1)
|
Weblate is a web based localization tool. Prior to version 5.11, when creating a new comp… | weblate | 2025-04-15T21:16:04+00:00 | 2025-04-30T17:22:51.467257+00:00 |
| pysec-2025-32 |
9.8 (3.1)
|
BentoML is a Python library for building online serving systems optimized for AI apps and… | bentoml | 2025-04-09T16:15:25+00:00 | 2025-04-22T19:21:34.073355+00:00 |
| pysec-2025-36 |
9.8 (3.1)
|
Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/valida… | langflow | 2025-04-07T15:15:44+00:00 | 2025-05-07T19:22:44.993642+00:00 |
| pysec-2025-16 |
7.5 (3.1)
|
LNbits is a Lightning wallet and accounts system. A Server-Side Request Forgery (SSRF) vu… | lnbits | 2025-04-06T20:15:15+00:00 | 2025-04-09T17:27:25.872691+00:00 |
| pysec-2025-14 |
|
An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normal… | django | 2025-04-02T13:15:44+00:00 | 2025-04-09T17:27:25.169049+00:00 |
| pysec-2025-48 |
9.8 (3.1)
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2025-03-31T17:15:42+00:00 | 2025-06-12T22:23:10.476087+00:00 |
| pysec-2025-17 |
5.5 (3.1)
|
In mlflow/mlflow version 2.18, an admin is able to create a new user account without sett… | mlflow | 2025-03-20T10:15:54+00:00 | 2025-04-09T17:27:26.322333+00:00 |
| pysec-2025-57 |
|
A Denial of Service (DoS) vulnerability in zenml-io/zenml version 0.66.0 allows unauthent… | zenml | 2025-03-20T10:15:48+00:00 | 2025-06-27T17:22:55.175431+00:00 |
| pysec-2025-10 |
9.1 (3.1)
|
A vulnerability in the `download_model` function of the onnx/onnx framework, before and i… | onnx | 2025-03-20T10:15:37+00:00 | 2025-03-26T19:21:38.843396+00:00 |
| pysec-2025-11 |
5.9 (3.1)
|
A vulnerability in the `KnowledgeBaseWebReader` class of the run-llama/llama_index reposi… | llama-index | 2025-03-20T10:15:31+00:00 | 2025-04-01T23:22:47.294256+00:00 |
| pysec-2025-9 |
|
A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through… | invokeai | 2025-03-20T10:15:26+00:00 | 2025-03-20T11:21:37.872971+00:00 |
| pysec-2025-63 |
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Whe… | vllm | 2025-03-19T16:15:32+00:00 | 2025-07-01T23:22:49.176005+00:00 |
| pysec-2025-8 |
|
The `pygments-style-solarized` project was removed from PyPI by its owner on 2021-08-26. … | pygments-style-solarized | 2025-03-17T16:35:37+00:00 | |
| pysec-2025-22 |
9.8 (3.1)
|
A vulnerability, that could result in Remote Code Execution (RCE), has been found in Plot… | plotai | 2025-03-10T14:15:24+00:00 | 2025-04-09T17:27:27.203714+00:00 |
| pysec-2025-21 |
9.8 (3.1)
|
picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model arch… | picklescan | 2025-03-10T12:15:12+00:00 | 2025-04-09T17:27:27.016747+00:00 |
| pysec-2025-20 |
6.5 (3.1)
|
picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes i… | picklescan | 2025-03-10T12:15:10+00:00 | 2025-04-09T17:27:26.966215+00:00 |
| pysec-2025-13 |
|
An issue was discovered in Django 5.1 before 5.1.7, 5.0 before 5.0.13, and 4.2 before 4.2… | django | 2025-03-06T19:15:27+00:00 | 2025-04-09T17:27:25.095679+00:00 |
| pysec-2025-23 |
|
Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Inform… | ray | 2025-03-06T05:15:16+00:00 | 2025-04-09T17:27:27.434099+00:00 |
| pysec-2025-19 |
9.8 (3.1)
|
picklescan before 0.0.22 only considers standard pickle file extensions in the scope for … | picklescan | 2025-03-03T19:15:34+00:00 | 2025-04-09T17:27:26.916350+00:00 |
| pysec-2025-25 |
6.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the CORS middle… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.532849+00:00 |
| pysec-2025-24 |
7.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the /api/remove… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.486485+00:00 |
| pysec-2025-15 |
5.3 (3.1)
|
Flask-AppBuilder is an application development framework. Prior to 4.5.3, Flask-AppBuilde… | flask-appbuilder | 2025-03-03T16:15:41+00:00 | 2025-04-09T17:27:25.227116+00:00 |
| pysec-2025-66 |
|
Improper privilege management in a REST interface allowed registered users to access unau… | streampipes | 2025-03-03T11:15:11+00:00 | 2025-07-08T15:23:46.628375+00:00 |
| pysec-2025-7 |
|
Published in 2021, the imblog package is a Python library that scrapes data from a blog p… | imblog | 2025-02-26T21:19:19+00:00 | |
| pysec-2025-6 |
|
Published in 2021, the colabrun package is a Python library that exfiltrates user cookies… | colabrun | 2025-02-26T20:59:48+00:00 | |
| pysec-2025-5 |
|
Published in 2020, the autodzee package is a Python library that bypasses Deezer API rest… | browsercmdhbt2 | 2025-02-26T20:57:11+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2668 | Malicious code in pnpm-workspaces (npm) | 2026-04-14T19:36:06Z | 2026-04-14T19:36:06Z |
| mal-2026-2667 | Malicious code in ckeditor5-minimap (npm) | 2026-04-14T19:06:02Z | 2026-04-14T19:06:02Z |
| mal-2026-2666 | Malicious code in moooo (PyPI) | 2026-04-14T15:21:49Z | 2026-04-14T15:21:49Z |
| mal-2026-2664 | Malicious code in buildenv-telemetry (PyPI) | 2026-04-14T14:28:02Z | 2026-04-14T14:28:02Z |
| mal-2026-2665 | Malicious code in hive-os-settings (PyPI) | 2026-04-14T14:27:24Z | 2026-04-14T14:27:24Z |
| mal-2026-2663 | Malicious code in tether-wrk-base (npm) | 2026-04-14T13:36:19Z | 2026-04-15T15:43:53Z |
| mal-2026-2662 | Malicious code in @automation-toolchain/f5-cloud-libs (npm) | 2026-04-14T13:05:55Z | 2026-04-14T13:40:00Z |
| mal-2026-2658 | Malicious code in tailwindcss-style-typography (npm) | 2026-04-14T12:12:36Z | 2026-04-14T12:12:37Z |
| mal-2026-2657 | Malicious code in tailwind-typ (npm) | 2026-04-14T12:01:40Z | 2026-04-14T12:01:41Z |
| mal-2026-2656 | Malicious code in tailwind-stylecss-typography (npm) | 2026-04-14T11:52:39Z | 2026-04-14T11:52:40Z |
| mal-2026-2641 | Malicious code in chai-as-refined (npm) | 2026-04-14T11:48:44Z | 2026-04-14T11:48:44Z |
| mal-2026-2659 | Malicious code in ui-utils-udhay-alerts (npm) | 2026-04-14T11:47:49Z | 2026-04-14T11:47:49Z |
| mal-2026-2644 | Malicious code in node-unpnotifyserv (npm) | 2026-04-14T11:47:49Z | 2026-04-14T11:47:50Z |
| mal-2026-2654 | Malicious code in pinstatsd (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:19Z |
| mal-2026-2653 | Malicious code in pinlogger (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:19Z |
| mal-2026-2649 | Malicious code in okxglobal (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:13Z |
| mal-2026-2648 | Malicious code in okx-nav (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:19Z |
| mal-2026-2647 | Malicious code in okx-data (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:14Z |
| mal-2026-2646 | Malicious code in okfe-serverless-conf (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:19Z |
| mal-2026-2645 | Malicious code in okassistant (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:19Z |
| mal-2026-2642 | Malicious code in chatbotloader (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:19Z |
| mal-2026-2637 | Malicious code in apmfe (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:19Z |
| mal-2026-2661 | Malicious code in vip-landing (npm) | 2026-04-14T11:47:12Z | 2026-04-14T11:47:19Z |
| mal-2026-2660 | Malicious code in use-feature-flags-plugin (npm) | 2026-04-14T11:47:12Z | 2026-04-14T11:47:19Z |
| mal-2026-2652 | Malicious code in onewin-landing (npm) | 2026-04-14T11:47:12Z | 2026-04-14T11:47:19Z |
| mal-2026-2650 | Malicious code in one-sdui (npm) | 2026-04-14T11:47:12Z | 2026-04-14T11:47:12Z |
| mal-2026-2643 | Malicious code in ms-affiliate-links (npm) | 2026-04-14T11:47:12Z | 2026-04-14T11:47:19Z |
| mal-2026-2640 | Malicious code in bytefrontier-core (npm) | 2026-04-14T11:47:12Z | 2026-04-14T11:47:18Z |
| mal-2026-2639 | Malicious code in bytefrontier (npm) | 2026-04-14T11:47:12Z | 2026-04-14T11:47:19Z |
| mal-2026-2638 | Malicious code in billing-paywidget (npm) | 2026-04-14T11:47:12Z | 2026-04-14T11:47:12Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| 9akk108471a3623 | RMC - 100 Vulnerabilities in web UI (REST Interface) | 2025-07-03T00:30:00.000Z | 2025-08-18T00:30:00.000Z |
| 2crt000008 | Lite Panel Pro Vulnerability in Session Management | 2025-06-26T00:30:00.000Z | 2025-06-26T00:30:00.000Z |
| 9akk108471a1621 | EIBPORT Session Management Fail | 2025-06-02T00:30:00.000Z | 2025-06-04T00:30:00.000Z |
| 9akk108470a8948 | ELSB/Home Solutions Outdated SW Components in ABB Welcome IP-Gateway. | 2025-05-29T00:30:00.000Z | 2025-06-05T00:30:00.000Z |
| 9akk108471a0021 | ELSB/BLBA ASPECT advisory several CVEs | 2025-05-22T00:30:00.000Z | 2025-05-23T10:30:00.000Z |
| 2crt000006 | ANC – ABB Network Card Multiple vulnerabilities in ANC | 2025-04-30T00:30:00.000Z | 2025-04-30T00:30:00.000Z |
| 3adr011407 | ABB Automation Builder Vulnerabilities in user management and access control | 2025-04-30T00:00:00.000Z | 2025-07-25T00:00:00.000Z |
| 2crt000007 | Ekip Com IEC61850 Vulnerability in 3rd Party Library | 2025-04-29T00:30:00.000Z | 2025-04-29T00:30:00.000Z |
| 3kxg200000r4801 | CoreSense™ HM and CoreSense™ M10 File Path Traversal Vulnerability | 2025-04-16T00:30:00.000Z | 2025-10-20T00:30:00.000Z |
| 9akk108470a9989 | ABB MV Drives Affected by CODESYS RTS (Runtime System) Vulnerabilities | 2025-04-10T08:30:00.000Z | 2025-04-10T08:30:00.000Z |
| 2nga002579 | ABB Arctic communication solution ARM600 Vulnerabilities | 2025-04-07T10:30:00.000Z | 2025-04-07T10:30:00.000Z |
| 2nga002427 | ABB Arctic ARG600, ARC600, ARR600, ARP600 Arctic Wireless Gateway Modem Module and OpenSSH vulnerabilities | 2025-04-07T10:30:00.000Z | 2025-04-07T10:30:00.000Z |
| 9akk108470a9494 | Low Voltage DC Drives and Power Controllers CODESYS RTS Vulnerabilities | 2025-03-26T00:30:00.000Z | 2025-03-27T00:30:00.000Z |
| 9akk108470a9491 | ABB ACS880 +N8010 Drives CODESYS RTS Vulnerabilities | 2025-03-26T00:30:00.000Z | 2025-03-27T00:30:00.000Z |
| sa24p015 | B&R APROL Potential Privilege Escalation and Information Disclosure | 2025-03-24T00:30:00.000Z | 2025-03-24T00:30:00.000Z |
| 9akk108470a8565 | RMC-100 Vulnerability in the Web UI (REST Interface) | 2025-03-11T00:30:00.000Z | 2025-03-11T00:30:00.000Z |
| 7paa012159 | System 800xA 5.1.x, 6.0.3.x, 6.1.1.x, 6.2.x - VideONet Camera passwords stored in clear text | 2025-02-10T00:30:00.000Z | 2025-02-10T00:30:00.000Z |
| 9akk108470a6775 | Hardcoded credentials in ASPECT Energy Management System | 2025-02-05T00:30:00.000Z | 2025-02-06T00:30:00.000Z |
| 9akk108470a5466 | Drive Composer Path Traversal Vulnerability | 2025-02-05T00:30:00.000Z | 2025-01-10T00:30:00.000Z |
| 9akk108470a5684 | FLXeon Controllers Cyber Security Advisory | 2025-01-20T00:30:00.000Z | 2025-02-14T00:30:00.000Z |
| sa25p001 | Automation Runtime and mapp View Use of insecure algorithm for self-signed certificates | 2025-01-15T00:30:00.000Z | 2025-01-16T00:30:00.000Z |
| 3adr011377 | AC500 V3 Multiple vulnerabilities | 2025-01-07T00:30:00.000Z | 2025-01-07T00:30:00.000Z |
| 7paa013309 | System 800xA SECURITY Advisory - ABB 800xA Base 6.0.x, 6.1.x CSLib communication DoS vulnerability | 2024-06-05T00:30:00.000Z | 2026-01-23T00:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0878 | FreeBSD Project FreeBSD OS: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0875 | Red Hat Enterprise Linux (ncurses): Schwachstelle ermöglicht Codeausführung | 2026-03-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0873 | docker: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0870 | libpng: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0869 | SolarWinds Platform: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0865 | Keycloak: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0864 | OpenBao: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0863 | Internet Systems Consortium BIND: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0861 | Linux Kernel: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0860 | NGINX und NGINX Plus: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0858 | NATS Server: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0856 | OpenClaw: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-04-12T22:00:00.000+00:00 |
| wid-sec-w-2026-0855 | Xen: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0854 | Squid: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0851 | IBM InfoSphere Information Server: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0850 | Mozilla Firefox und Mozilla Thunderbird: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0849 | ImageMagick: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-03-24T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0847 | GitLab: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0845 | IBM WebSphere Application Server Liberty: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0844 | Hitachi Ops Center: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0843 | Node.js: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0837 | Google Chrome: Mehrere Schwachstellen | 2026-03-23T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0833 | Ruby on Rails: Mehrere Schwachstellen | 2026-03-23T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0831 | systemd: Mehrere Schwachstellen | 2026-03-23T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0826 | Znuny: Schwachstelle ermöglicht Cross-Site Scripting | 2026-03-23T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0825 | strongSwan: Schwachstelle ermöglicht Denial of Service | 2026-03-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0824 | Python: Schwachstelle ermöglicht Codeausführung | 2026-03-22T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0822 | PTC FlexPLM und Windchill: Schwachstelle ermöglicht Codeausführung | 2026-03-22T23:00:00.000+00:00 | 2026-03-23T23:00:00.000+00:00 |
| wid-sec-w-2026-0821 | Keycloak: Mehrere Schwachstellen | 2026-03-22T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0818 | etcd: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2026-03-22T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-076-04 | Siemens SICAM SIAPP SDK | 2026-03-10T00:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-071-05 | Siemens Heliox EV Chargers | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-04 | Siemens SIMATIC | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-03 | Siemens SIDIS Prime | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-02 | Siemens RUGGEDCOM APE1808 Devices | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-064-01 | Delta Electronics CNCSoft-G2 | 2026-03-05T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| icsa-26-062-05 | Labkotec LID-3300IP | 2026-03-03T07:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-04 | Portwell Engineering Toolkits | 2026-03-03T07:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-08 | Everon OCPP Backends | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-062-07 | ePower epower.ie | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-062-06 | Mobiliti e-mobi.hu | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-062-01 | Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module | 2026-03-03T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-076-01 | CODESYS in Festo Automation Suite | 2026-02-26T08:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-057-10 | Copeland XWEB and XWEB Pro | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-09 | Yokogawa CENTUM VP R6, R7 | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-08 | Mobility46 mobility46.se | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-07 | EV Energy ev.energy | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-06 | SWITCH EV swtchenergy.com | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-05 | Chargemap chargemap.com | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-04 | EV2GO ev2go.io | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-03 | CloudCharge cloudcharge.se | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-02 | Pelco, Inc. Sarix Pro 3 Series IP Cameras | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-01 | Johnson Controls, Inc. Frick Controls Quantum HD | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-055-01 | InSAT MasterSCADA BUK-TS | 2026-02-24T07:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-26-055-03 | Gardyn Home Kit (Update A) | 2026-02-24T06:00:00.000000Z | 2026-04-02T05:00:00.000000Z |
| icsa-26-092-03 | Hitachi Energy Ellipse | 2026-02-24T00:00:00.000000Z | 2026-04-02T06:00:00.000000Z |
| icsa-26-062-03 | Hitachi Energy RTU500 Product | 2026-02-24T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-02 | Hitachi Energy Relion REB500 Product | 2026-02-24T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-050-04 | Welker OdorEyes EcoSystem Pulse Bypass System with XL4 Controller | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-050-03 | Jinan USR IOT Technology Limited (PUSR) USR-W610 | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ftd-dnd-dos-bpecg7b7 | Cisco Secure Firewall Threat Defense Software SSL Decryption Policy Denial of Service Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-cmd-inj-mtzgzexf | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Authenticated Command Injection Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-fmc-sql-injection-2qh6ccjd | Cisco Secure Firewall Management Center Software SQL Injection Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-fmc-rce-nkhnuljh | Cisco Secure Firewall Management Center Software Remote Code Execution Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-25T14:21:24+00:00 |
| cisco-sa-asaftd-vpn-m9sx6mbc | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-saml-lkttrwzp | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software SAML Reflected Cross-Site Scripting Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-ospf-zh8phbsw | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software OSPF Protocol Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-luainject-vescqgms | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Lua Code Injection Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-ikev2-dos-ebuegdeg | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software IKEv2 Denial of Service Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-desync-n5avzeqw | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Services Client-Side Request Smuggling Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asa-ssh-keybypass-cr5xpusf | Cisco Secure Firewall Adaptive Security Appliance Software SSH Partial Private Key Authentication Bypass Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ucsm-cmdinj-gvxlpesb | Cisco UCS Manager Software Command Injection Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsm-afwae-mogufyln | Cisco UCS Manager Software Privilege Escalation Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsfxosxss-7skve8zv | Cisco FXOS and UCS Manager Software Stored Cross-Site Scripting Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsciv-wgytc78q | Cisco FXOS and UCS Manager Software Command Injection Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-sdwan-rpa-ehchtzk | Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-03-03T00:38:56+00:00 |
| cisco-sa-sdwan-authbp-qwcx8d4v | Cisco Catalyst SD-WAN Vulnerabilities | 2026-02-25T16:00:00+00:00 | 2026-03-18T01:06:38+00:00 |
| cisco-sa-nxos-ether-dos-kv8ynwz4 | Cisco Nexus 3600 and 9500-R Series Switching Platforms Layer 2 Loop Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-nxos-dsnmp-cnn39uh | Cisco Nexus 9000 Series Fabric Switches in ACI Mode SNMP Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-nxos-cpdos-qlsv6pfd | Cisco Nexus 9000 Series Fabric Switches in ACI Mode Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-n3kn9k_aci_lldp_dos-ndgrrra3 | Cisco NX-OS Software Link Layer Discovery Protocol Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-apic-dos-rnus8efw | Cisco Application Policy Infrastructure Controller Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-wsa-archive-bypass-scx2e8zf | Cisco Secure Web Appliance Real-Time Scanning Archive File Bypass Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-20T21:08:47+00:00 |
| cisco-sa-tce-roomos-dos-9v9jrc2q | Cisco TelePresence Collaboration Endpoint Software and RoomOS Software Denial of Service Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-12T17:37:39+00:00 |
| cisco-sa-pi-xss-byevkcd | Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-epnm-pi-redirect-6sx82dn | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Open Redirect Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-cmm-file-up-ky47n8kk | Cisco Meeting Management Arbitrary File Upload Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-voice-rce-morhqy4b | Cisco Unified Communications Products Remote Code Execution Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-02-13T15:21:01+00:00 |
| cisco-sa-ucce-pcce-xss-2jvyg3ud | Cisco Packaged Contact Center Enterprise and Cisco Unified Contact Center Enterprise Cross-Site Scripting Vulnerabilities | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-intersight-privesc-p6tbm6jk | Cisco Intersight Virtual Appliance Privilege Escalation Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-32214 | Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32212 | Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32203 | .NET and Visual Studio Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32202 | Windows Shell Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32201 | Microsoft SharePoint Server Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32200 | Microsoft PowerPoint Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32199 | Microsoft Excel Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32198 | Microsoft Excel Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32197 | Microsoft Excel Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32196 | Windows Admin Center Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32195 | Windows Kernel Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32192 | Azure Monitor Agent Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32190 | Microsoft Office Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32189 | Microsoft Excel Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32188 | Microsoft Excel Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32184 | Microsoft High Performance Compute (HPC) Pack Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32183 | Windows Snipping Tool Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32181 | Connected User Experiences and Telemetry Service Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32178 | .NET Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32176 | SQL Server Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32171 | Azure Logic Apps Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32168 | Azure Monitor Agent Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32167 | SQL Server Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32165 | Windows User Interface Core Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32164 | Windows User Interface Core Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32163 | Windows User Interface Core Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32162 | Windows COM Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32160 | Windows Push Notifications Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32159 | Windows Push Notifications Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32158 | Windows Push Notifications Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0091 | Kwetsbaarheden verholpen in SAP-producten | 2026-03-12T07:24:16.575638Z | 2026-03-12T07:24:16.575638Z |
| ncsc-2026-0090 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2026-03-12T07:12:51.952931Z | 2026-03-12T07:12:51.952931Z |
| ncsc-2026-0089 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2026-03-12T07:03:24.148324Z | 2026-03-12T07:03:24.148324Z |
| ncsc-2026-0088 | Kwetsbaarheden verholpen in Adobe Illustrator | 2026-03-12T06:55:39.712240Z | 2026-03-12T06:55:39.712240Z |
| ncsc-2026-0087 | Kwetsbaarheden verholpen in Adobe Commerce | 2026-03-12T06:49:56.459199Z | 2026-03-12T06:49:56.459199Z |
| ncsc-2026-0086 | Kwetsbaarheden verholpen in Fortinet FortiManager en FortiAnalyzer | 2026-03-11T09:19:38.777277Z | 2026-03-11T09:19:38.777277Z |
| ncsc-2026-0085 | Kwetsbaarheden verholpen in Microsoft Developer tools | 2026-03-10T20:35:10.478398Z | 2026-03-10T20:35:10.478398Z |
| ncsc-2026-0084 | Kwetsbaarheden verholpen in Microsoft Office | 2026-03-10T20:20:08.157658Z | 2026-03-10T20:20:08.157658Z |
| ncsc-2026-0083 | Kwetsbaarheid verholpen in Microsoft Authenticator app | 2026-03-10T20:18:35.792755Z | 2026-03-10T20:18:35.792755Z |
| ncsc-2026-0082 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-03-10T20:15:41.528951Z | 2026-03-10T20:15:41.528951Z |
| ncsc-2026-0081 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2026-03-10T20:12:56.032261Z | 2026-03-10T20:12:56.032261Z |
| ncsc-2026-0080 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-03-10T20:07:55.976638Z | 2026-03-10T20:07:55.976638Z |
| ncsc-2026-0079 | Kwetsbaarheden verholpen in Siemens producten | 2026-03-10T12:39:14.474522Z | 2026-03-10T12:39:14.474522Z |
| ncsc-2026-0078 | Kwetsbaarheden verholpen in Kibana | 2026-03-05T09:36:49.056247Z | 2026-03-05T09:36:49.056247Z |
| ncsc-2026-0077 | Kwetsbaarheden verholpen in Cisco Secure Firewall systemen | 2026-03-05T09:05:21.646499Z | 2026-03-05T09:05:21.646499Z |
| ncsc-2026-0076 | Kwetsbaarheden verholpen in Cisco Secure Firewall Management Center | 2026-03-04T20:49:12.211658Z | 2026-03-19T11:48:18.917205Z |
| ncsc-2026-0075 | Kwetsbaarheid verholpen in n8n Automation Platform | 2026-03-04T14:03:54.207583Z | 2026-03-04T14:03:54.207583Z |
| ncsc-2026-0074 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2026-03-03T09:07:09.279353Z | 2026-03-03T09:07:09.279353Z |
| ncsc-2026-0073 | Kwetsbaarheid verholpen in Juniper Junos OS Evolved | 2026-02-27T09:48:51.845864Z | 2026-02-27T09:48:51.845864Z |
| ncsc-2026-0072 | Kwetsbaarheden verholpen in GitLab | 2026-02-27T07:15:18.318821Z | 2026-02-27T07:15:18.318821Z |
| ncsc-2026-0071 | Kwetsbaarheden verholpen in Cisco Catalyst SD-WAN Manager | 2026-02-25T17:11:09.013125Z | 2026-03-06T12:07:02.595940Z |
| ncsc-2026-0070 | Kwetsbaarheden verholpen in VMware Aria Operations | 2026-02-25T11:24:46.807867Z | 2026-03-04T08:54:08.940512Z |
| ncsc-2026-0069 | Kwetsbaarheden verholpen in SolarWinds Serv-U | 2026-02-25T10:39:38.154815Z | 2026-02-25T10:39:38.154815Z |
| ncsc-2026-0068 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2026-02-23T14:27:28.865278Z | 2026-02-23T14:27:28.865278Z |
| ncsc-2026-0067 | Kwetsbaarheden verholpen in GitHub Enterprise Server | 2026-02-20T10:13:39.540778Z | 2026-02-20T10:13:39.540778Z |
| ncsc-2026-0066 | Kwetsbaarheid verholpen in Google Chrome | 2026-02-19T08:29:30.712590Z | 2026-02-19T08:29:30.712590Z |
| ncsc-2026-0065 | Kwetsbaarheid verholpen in Dell RecoverPoint for Virtual Machines | 2026-02-18T13:18:23.815384Z | 2026-02-18T13:18:23.815384Z |
| ncsc-2026-0064 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2026-02-13T13:35:03.870920Z | 2026-02-13T13:35:03.870920Z |
| ncsc-2026-0063 | Kwetsbaarheden verholpen in Apple macOS | 2026-02-13T13:24:06.433550Z | 2026-02-13T13:24:06.433550Z |
| ncsc-2026-0062 | Kwetsbaarheden verholpen in GitLab CE/EE | 2026-02-11T11:45:05.986313Z | 2026-02-11T11:45:05.986313Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2023:10-01 | DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:8-01 | Session Fixation in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:7-01 | DoS via SAML configuration in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:6-01 | Partial DoS on Reports section due to null report name in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:5-01 | Information disclosure via the debug function in assertions in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2023:4-01 | Stored Cross-Site Scripting (XSS) in Threat Intelligence rules in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:3-01 | Authenticated Blind SQL Injection on alerts count in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:2-01 | Authenticated Blind SQL Injection on sorting in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:1-01 | Authenticated SQL Injection on Alerts in Guardian/CMC before 22.5.2 | 2023-05-03T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2022:2-02 | Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2022:2-01 | Authenticated RCE on logo report upload in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2021:2-01 | Authenticated command path traversal on timezone settings in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2021:1-01 | Authenticated command injection when changing date settings or hostname in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2020:3-01 | Angular template injection on custom report name field | 2020-05-26T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2020:2-01 | Cross-site request forgery attack on change password form | 2020-05-26T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2019:2-01 | CSV Injection on node label | 2019-11-11T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2019:1-01 | Stored XSS in field name data model | 2019-11-11T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10483-1 | himmelblau-2.3.9+git0.a9fd29b-1.1 on GA media | 2026-04-03T00:00:00Z | 2026-04-03T00:00:00Z |
| opensuse-su-2026:10481-1 | python314-3.14.3-4.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10480-1 | python313-3.13.12-3.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10479-1 | python312-3.12.13-4.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10478-1 | python311-3.11.15-4.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10477-1 | python310-3.10.20-3.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10476-1 | python311-Pygments-2.20.0-2.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10475-1 | opensc-0.27.1-1.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10474-1 | ignition-2.26.0-3.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10473-1 | dnsdist-2.0.3-1.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10472-1 | conftest-0.67.1-2.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10464-1 | python311-pypdf-6.9.2-1.1 on GA media | 2026-03-30T00:00:00Z | 2026-03-30T00:00:00Z |
| opensuse-su-2026:10463-1 | netty-4.1.132-1.1 on GA media | 2026-03-30T00:00:00Z | 2026-03-30T00:00:00Z |
| opensuse-su-2026:10462-1 | heroic-games-launcher-2.20.1-4.1 on GA media | 2026-03-30T00:00:00Z | 2026-03-30T00:00:00Z |
| opensuse-su-2026:10457-1 | xen-4.21.1_02-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10456-1 | tailscale-1.96.4-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10455-1 | python311-requests-2.33.0-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10454-1 | python311-cryptography-46.0.6-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10453-1 | libpolkit-agent-1-0-127-3.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10452-1 | libjavamapscript-8.6.1-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10451-1 | libpng16-16-1.6.56-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10450-1 | incus-6.23-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10449-1 | gsl-2.8-5.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10448-1 | bind-9.20.21-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10447-1 | MozillaThunderbird-140.9.0-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10446-1 | ImageMagick-7.1.2.18-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10441-1 | strongswan-6.0.5-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10440-1 | jupyter-nbclassic-1.3.3-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10439-1 | plexus-utils-4.0.2-2.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10438-1 | openbao-2.5.2-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:7671 | Red Hat Security Advisory: firefox security update | 2026-04-13T02:29:51+00:00 | 2026-04-13T14:56:55+00:00 |
| rhsa-2026:7665 | Red Hat Security Advisory: rhc security update | 2026-04-13T02:29:01+00:00 | 2026-04-14T07:30:00+00:00 |
| rhsa-2026:7677 | Red Hat Security Advisory: fontforge security update | 2026-04-13T02:27:37+00:00 | 2026-04-13T08:42:42+00:00 |
| rhsa-2026:7675 | Red Hat Security Advisory: nodejs24 security update | 2026-04-13T02:27:36+00:00 | 2026-04-14T07:28:28+00:00 |
| rhsa-2026:7678 | Red Hat Security Advisory: openexr security update | 2026-04-13T02:25:56+00:00 | 2026-04-13T08:42:34+00:00 |
| rhsa-2026:7667 | Red Hat Security Advisory: nghttp2 security update | 2026-04-13T02:25:06+00:00 | 2026-04-14T07:29:54+00:00 |
| rhsa-2026:7680 | Red Hat Security Advisory: perl-XML-Parser security update | 2026-04-13T02:23:46+00:00 | 2026-04-13T08:42:39+00:00 |
| rhsa-2026:7672 | Red Hat Security Advisory: firefox security update | 2026-04-13T02:23:37+00:00 | 2026-04-13T14:56:56+00:00 |
| rhsa-2026:7676 | Red Hat Security Advisory: rhc security update | 2026-04-13T02:21:56+00:00 | 2026-04-14T09:46:56+00:00 |
| rhsa-2026:7669 | Red Hat Security Advisory: rhc security update | 2026-04-13T02:01:06+00:00 | 2026-04-14T07:29:51+00:00 |
| rhsa-2026:7666 | Red Hat Security Advisory: nghttp2 security update | 2026-04-13T01:43:07+00:00 | 2026-04-14T07:29:56+00:00 |
| rhsa-2026:7404 | Red Hat Security Advisory: RHOAI 3.2 - Red Hat OpenShift AI | 2026-04-10T18:15:43+00:00 | 2026-04-10T21:19:47+00:00 |
| rhsa-2026:7403 | Red Hat Security Advisory: RHOAI 3.3.1 - Red Hat OpenShift AI | 2026-04-10T18:15:41+00:00 | 2026-04-10T21:19:47+00:00 |
| rhsa-2026:7398 | Red Hat Security Advisory: RHOAI 2.25.4 - Red Hat OpenShift AI | 2026-04-10T17:33:41+00:00 | 2026-04-10T21:19:46+00:00 |
| rhsa-2026:7397 | Red Hat Security Advisory: RHOAI 2.16.4 - Red Hat OpenShift AI | 2026-04-10T17:33:17+00:00 | 2026-04-10T21:19:47+00:00 |
| rhsa-2026:7382 | Red Hat Security Advisory: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection | 2026-04-10T15:11:45+00:00 | 2026-04-10T21:19:45+00:00 |
| rhsa-2026:7384 | Red Hat Security Advisory: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection | 2026-04-10T15:07:15+00:00 | 2026-04-10T21:19:45+00:00 |
| rhsa-2026:7383 | Red Hat Security Advisory: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection | 2026-04-10T14:30:44+00:00 | 2026-04-10T21:19:45+00:00 |
| rhsa-2026:7381 | Red Hat Security Advisory: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection | 2026-04-10T14:23:39+00:00 | 2026-04-10T21:19:45+00:00 |
| rhsa-2026:7350 | Red Hat Security Advisory: nodejs:24 security update | 2026-04-09T20:27:37+00:00 | 2026-04-14T07:28:28+00:00 |
| rhsa-2026:7343 | Red Hat Security Advisory: nginx:1.26 security update | 2026-04-09T19:00:58+00:00 | 2026-04-10T01:26:15+00:00 |
| rhsa-2026:7342 | Red Hat Security Advisory: kea security update | 2026-04-09T18:33:12+00:00 | 2026-04-09T20:37:08+00:00 |
| rhsa-2026:7335 | Red Hat Security Advisory: Red Hat AI Inference Server 3.2.2 (CUDA) | 2026-04-09T17:18:44+00:00 | 2026-04-13T08:56:04+00:00 |
| rhsa-2026:7328 | Red Hat Security Advisory: rhc security update | 2026-04-09T15:29:16+00:00 | 2026-04-14T07:29:51+00:00 |
| rhsa-2026:7329 | Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage | 2026-04-09T15:14:31+00:00 | 2026-04-13T18:42:37+00:00 |
| rhsa-2026:7315 | Red Hat Security Advisory: rhc security update | 2026-04-09T14:48:57+00:00 | 2026-04-14T07:28:26+00:00 |
| rhsa-2026:7314 | Red Hat Security Advisory: Red Hat Quay 3.14.7 | 2026-04-09T13:39:27+00:00 | 2026-04-14T09:52:37+00:00 |
| rhsa-2026:7310 | Red Hat Security Advisory: nodejs22 security update | 2026-04-09T13:38:21+00:00 | 2026-04-14T07:29:40+00:00 |
| rhsa-2026:7304 | Red Hat Security Advisory: libtiff security update | 2026-04-09T13:21:12+00:00 | 2026-04-09T20:34:29+00:00 |
| rhsa-2026:6564 | Red Hat Security Advisory: OpenShift Container Platform 4.20.18 bug fix and security update | 2026-04-09T13:13:19+00:00 | 2026-04-14T07:59:36+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2025-189-01 | EcoStruxure™ IT Data Center Expert | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-03 | EVLink WallBox | 2025-06-10T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-02 | Modicon Controllers M241/M251/M258/LMC058/M262 | 2025-06-10T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-01 | Insight Home and Insight Facility | 2025-06-10T04:00:00.000Z | 2025-06-10T04:00:00.000Z |
| sevd-2025-133-05 | Galaxy VS, Galaxy VL, Galaxy VXL | 2025-05-13T04:00:00.000Z | 2025-09-24T04:00:00.000Z |
| sevd-2025-133-04 | Schneider Electric PrismaSeT Active - Wireless Panel Server | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-133-03 | EcoStruxure Power Build Rapsody | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-133-02 | Wiser Home Automation | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-133-01 | Modicon Controllers M241/M251/M258/LMC058 | 2025-05-13T04:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2025-098-02 | Trio™ Q Licensed Data Radios | 2025-04-08T04:00:00.000Z | 2025-04-08T04:00:00.000Z |
| sevd-2025-098-01 | ConneXium Network Manager Software | 2025-04-08T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-070-03 | WebHMI Component For EcoStruxure™ Power Automation System User Interface and EcoStruxure™ Microgrid Operation Large | 2025-03-11T04:00:00.000Z | 2025-03-11T04:00:00.000Z |
| sevd-2025-070-02 | EPAS-UI & EcoSUI | 2025-03-11T04:00:00.000Z | 2025-03-11T04:00:00.000Z |
| sevd-2025-070-01 | EcoStruxure™ Panel Server | 2025-03-11T04:00:00.000Z | 2025-03-11T04:00:00.000Z |
| sevd-2025-042-04 | Enerlin'X IFE and eIFE | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-042-03 | EcoStruxure™ Process Expert, EcoStruxure™ Process Expert for AVEVA System Platform | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-042-01 | ASCO 5310 / 5350 Remote Annunciator | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-042-02 | Improper Input Validation Vulnerability in Uni-Telway Driver | 2025-02-11T05:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2025-014-07 | FlexNet Publisher Vulnerability | 2025-01-14T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2025-014-03 | Wind River VxWorks DHCP Server Vulnerability | 2025-01-14T05:00:00.000Z | 2025-08-12T04:00:00.000Z |
| sevd-2025-014-01 | Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC | 2025-01-14T05:00:00.000Z | 2025-04-08T04:00:00.000Z |
| sevd-2025-014-09 | EcoStruxure™ Power Build Rapsody | 2025-01-14T00:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-014-08 | Power Logic HDPM6000 High-Density Metering System | 2025-01-14T00:00:00.000Z | 2025-01-14T00:00:00.000Z |
| sevd-2025-014-06 | RemoteConnect and SCADAPack™ x70 Utilities | 2025-01-14T00:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2025-014-05 | Web Server on Modicon M340, Modbus/TCP Ethernet Modicon M340 module, Modbus/TCP Ethernet Modicon M340 FactoryCast module and Ethernet / Serial RTU communication modules | 2025-01-14T00:00:00.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2025-014-04 | Web Designer for Modicon Communication Modules | 2025-01-14T00:00:00.000Z | 2025-01-14T00:00:00.000Z |
| sevd-2025-014-02 | Pro-face GP-Pro EX and Remote HMI | 2025-01-14T00:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2024-345-03 | Modicon M241 / M251 / M258 / LMC058 | 2024-12-10T05:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2024-345-02 | Harmony HMI and Pro-face HMI products | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| sevd-2024-345-01 | PowerChute Serial Shutdown | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2023-0009 | Vulnerability in Wibu-Systems CodeMeter Runtime affects multiple SICK products | 2023-09-29T10:00:00.000Z | 2023-09-29T10:00:00.000Z |
| sca-2023-0007 | Vulnerabilities in SICK LMS5xx | 2023-08-25T11:00:00.000Z | 2023-08-25T11:00:00.000Z |
| sca-2023-0006 | Vulnerabilities in SICK ICR890-4 | 2023-07-10T13:00:00.000Z | 2023-07-10T13:00:00.000Z |
| sca-2023-0005 | Vulnerabilities in SICK EventCam App | 2023-06-19T11:00:00.000Z | 2023-06-19T11:00:00.000Z |
| sca-2023-0004 | Vulnerabilities in SICK FTMg | 2023-05-11T13:00:00.000Z | 2023-05-11T13:00:00.000Z |
| sca-2023-0003 | Vulnerability in SICK Flexi Soft and Flexi Classic Gateways | 2023-05-03T13:00:00.000Z | 2023-05-03T13:00:00.000Z |
| sca-2023-0002 | Use of Telnet in multiple SICK Flexi Soft and Flexi Classic Gateways | 2023-04-11T10:00:00.000Z | 2023-04-11T10:00:00.000Z |
| sca-2023-0001 | Bootloader mode vulnerability in Flexi Soft Gateways v3 | 2023-02-20T14:00:00.000Z | 2023-02-20T14:00:00.000Z |
| sca-2022-0015 | Use of a Broken or Risky Cryptographic Algorithm in SICK RFU6xx RADIO FREQUEN. SENSOR | 2022-12-08T16:00:00.000Z | 2022-12-08T16:00:00.000Z |
| sca-2022-0014 | SICK FlexiCompact affected by Denial of Service vulnerability | 2022-10-31T11:00:00.000Z | 2022-10-31T11:00:00.000Z |
| sca-2022-0013 | Password recovery vulnerability affects multiple SICK SIMs | 2022-10-21T13:00:00.000Z | 2022-11-04T14:00:00.000Z |
| sca-2022-0012 | OpenSSL vulnerability affects multiple SICK SIMs | 2022-08-08T13:00:00.000Z | 2022-08-03T13:00:00.000Z |
| sca-2022-0011 | Vulnerabilities in SICK Package Analytics | 2022-06-08T15:00:00.000Z | 2022-06-08T15:00:00.000Z |
| sca-2022-0010 | Vulnerability in SICK Flexi Soft Designer & Safety Designer | 2022-05-16T10:00:00.000Z | 2022-07-19T10:00:00.000Z |
| sca-2022-0009 | Vulnerability in SICK Flexi Soft PROFINET IO Gateway FX0-GPNT and SICK microScan3 PROFINET | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
| sca-2022-0008 | Vulnerability in SICK Gateways for Flexi Soft, Flexi Compact, SICK EFI Gateway UE4740, SICK microScan3 and outdoorScan3 | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
| sca-2022-0007 | Vulnerabilities in SICK MARSIC300 | 2022-04-21T15:00:00.000Z | 2022-04-21T15:00:00.000Z |
| sca-2022-0006 | Vulnerability in SICK MSC800 | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
| sca-2022-0005 | Vulnerability in SICK Overall Equipment Effectiveness (OEE) | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
| sca-2022-0004 | Microsoft vulnerability affects multiple SICK IPCs with SICK MEAC | 2022-04-11T15:00:00.000Z | 2022-03-31T15:00:00.000Z |
| sca-2022-0003 | Vulnerabilities in SICK FTMg | 2022-03-31T15:00:00.000Z | 2022-03-31T15:00:00.000Z |
| sca-2022-0002 | PwnKit vulnerability affects multiple SICK IPCs | 2022-02-23T16:00:00.000Z | 2022-02-23T16:00:00.000Z |
| sca-2022-0001 | Vulnerability in SICK FieldEcho | 2022-02-17T16:00:00.000Z | 2022-02-17T16:00:00.000Z |
| sca-2021-0004 | Vulnerabilities in SICK SOPAS ET | 2021-12-16T08:00:00.000Z | 2021-12-17T08:00:00.000Z |
| sca-2021-0003 | SICK Security Advisory for Apache Log4j (CVE-2021-44228) | 2021-12-14T17:00:00.000Z | 2021-12-17T12:00:00.000Z |
| sca-2021-0002 | MEAC affected by Windows SMBv1 vulnerability | 2021-08-04T10:00:00.000Z | 2021-08-04T10:00:00.000Z |
| sca-2021-0001 | Inadequate SSH configuration in SICK Visionary-S CX | 2021-06-25T10:00:00.000Z | 2021-06-25T10:00:00.000Z |
| sca-2020-0005 | Package Analytics affected by Windows TCP/IP vulnerability | 2020-10-29T11:00:00.000Z | 2020-10-29T11:00:00.000Z |
| sca-2020-0004 | Vulnerability in Platform Mechanism AutoIP | 2020-08-31T10:00:00.000Z | 2020-08-31T10:00:00.000Z |
| sca-2020-0003 | MEAC affected by Windows SMBv3 vulnerability | 2020-08-07T10:00:00.000Z | 2020-08-07T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-882673 | SSA-882673: Multiple Vulnerabilities in SINEC Security Monitor before V4.10.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-868571 | SSA-868571: Missing Server Certificate Validation in IAM Client | 2025-12-09T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-763474 | SSA-763474: Denial of Service Vulnerability in Ruggedcom ROS devices before V5.10.1 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-734261 | SSA-734261: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-710408 | SSA-710408: Missing Server Certificate Validation in Siemens Advanced Licensing (SALT) Toolkit | 2025-12-09T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-626856 | SSA-626856: Multiple Vulnerabilities in SINEMA Remote Connect Sever Before V3.2 SP4 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-471761 | SSA-471761: Multiple Vulnerabilities in SICAM T Before V3.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-420375 | SSA-420375: Improper Integrity Check of Firmware Updates in Building X - Security Manager Edge Controller (ACC-AP) | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-416652 | SSA-416652: Multiple Vulnerabilities in SIMATIC CN 4100 Before V4.0.1 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-356310 | SSA-356310: Multiple Vulnerabilities in Gridscale X Prepay | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-212953 | SSA-212953: Multiple Vulnerabilities in COMOS | 2025-12-09T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-202008 | SSA-202008: Multiple Vulnerabilities in Ruggedcom Rox Before V2.17.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-241605 | SSA-241605: Out of Bounds Read in PS/IGES Parasolid Translator Component Before V29.0.258 | 2025-11-17T00:00:00Z | 2025-11-17T00:00:00Z |
| ssa-190588 | SSA-190588: Cross-Site Scripting Vulnerability in Mendix Rich Text Widget | 2025-11-17T00:00:00Z | 2025-11-17T00:00:00Z |
| ssa-682326 | SSA-682326: Multiple Vulnerabilities in COMOS before V10.4.5 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-522291 | SSA-522291: Improper Certificate Validation Vulnerability in Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-514895 | SSA-514895: Multiple Vulnerabilities in Altair Grid Engine V2025.1.0 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-365596 | SSA-365596: DLL Hijacking Vulnerability in Siemens Software Center and Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-339694 | SSA-339694: Multiple Vulnerabilities in Spectrum Power 4 Before v4.70 SP12 Security Patch 2 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-267056 | SSA-267056: Multiple Vulnerabilities in LOGO! 8 BM Devices | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-201498 | SSA-201498: Multiple Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices Before V3.11 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-599451 | SSA-599451: Multiple Vulnerabilities in SiPass integrated | 2025-10-14T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-541582 | SSA-541582: Multiple File Parsing Vulnerabilities in Solid Edge | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-486936 | SSA-486936: Authentication Vulnerability in SIMATIC ET 200SP Communication Processors | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-365200 | SSA-365200: Google Chrome Type Confusion Vulnerability in Siemens Products | 2025-10-14T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-318832 | SSA-318832: SQL Injection Vulnerability in SINEC NMS | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-062309 | SSA-062309: Information Disclosure Vulnerability in TeleControl Server Basic V3.1 | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-722410 | SSA-722410: Multiple Vulnerabilities in User Management Component (UMC) | 2025-09-09T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-027652 | SSA-027652: Privilege Escalation Vulnerability in SINAMICS Drives | 2025-09-09T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-201595 | SSA-201595: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager | 2025-08-14T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1287-1 | Security update for the Linux Kernel (Live Patch 70 for SUSE Linux Enterprise 12 SP5) | 2026-04-12T23:15:16Z | 2026-04-12T23:15:16Z |
| suse-su-2026:1285-1 | Security update for the Linux Kernel (Live Patch 68 for SUSE Linux Enterprise 12 SP5) | 2026-04-12T19:04:23Z | 2026-04-12T19:04:23Z |
| suse-su-2026:1284-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP7) | 2026-04-12T10:34:11Z | 2026-04-12T10:34:11Z |
| suse-su-2026:1283-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-04-12T10:34:05Z | 2026-04-12T10:34:05Z |
| suse-su-2026:1281-1 | Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4) | 2026-04-12T08:35:33Z | 2026-04-12T08:35:33Z |
| suse-su-2026:1280-1 | Security update for the Linux Kernel (Live Patch 41 for SUSE Linux Enterprise 15 SP4) | 2026-04-12T02:04:36Z | 2026-04-12T02:04:36Z |
| suse-su-2026:1279-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP7) | 2026-04-12T00:08:13Z | 2026-04-12T00:08:13Z |
| suse-su-2026:1278-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7) | 2026-04-12T00:08:07Z | 2026-04-12T00:08:07Z |
| suse-su-2026:1274-1 | Security update for the Linux Kernel (Live Patch 19 for SUSE Linux Enterprise 15 SP6) | 2026-04-11T20:04:33Z | 2026-04-11T20:04:33Z |
| suse-su-2026:1273-1 | Security update for MozillaFirefox | 2026-04-11T19:04:46Z | 2026-04-11T19:04:46Z |
| suse-su-2026:1272-1 | Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise 15 SP6) | 2026-04-11T18:04:50Z | 2026-04-11T18:04:50Z |
| suse-su-2026:1271-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6) | 2026-04-11T18:04:43Z | 2026-04-11T18:04:43Z |
| suse-su-2026:1270-1 | Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP5) | 2026-04-11T16:34:14Z | 2026-04-11T16:34:14Z |
| suse-su-2026:1269-1 | Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4) | 2026-04-11T16:04:45Z | 2026-04-11T16:04:45Z |
| suse-su-2026:1268-1 | Security update for the Linux Kernel (Live Patch 38 for SUSE Linux Enterprise 15 SP4) | 2026-04-11T14:04:40Z | 2026-04-11T14:04:40Z |
| suse-su-2026:1266-1 | Security update for the Linux Kernel (Live Patch 20 for SUSE Linux Enterprise 15 SP6) | 2026-04-11T11:04:41Z | 2026-04-11T11:04:41Z |
| suse-su-2026:1265-1 | Security update for the Linux Kernel (Live Patch 46 for SUSE Linux Enterprise 15 SP4) | 2026-04-11T04:34:33Z | 2026-04-11T04:34:33Z |
| suse-su-2026:1263-1 | Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T22:35:17Z | 2026-04-10T22:35:17Z |
| suse-su-2026:1262-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP7) | 2026-04-10T21:43:55Z | 2026-04-10T21:43:55Z |
| suse-su-2026:1261-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP7) | 2026-04-10T19:34:46Z | 2026-04-10T19:34:46Z |
| suse-su-2026:1259-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6) | 2026-04-10T17:35:15Z | 2026-04-10T17:35:15Z |
| suse-su-2026:1258-1 | Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T17:35:09Z | 2026-04-10T17:35:09Z |
| suse-su-2026:1257-1 | Security update for openssl-1_1 | 2026-04-10T15:06:36Z | 2026-04-10T15:06:36Z |
| suse-su-2026:1256-1 | Security update for openssl-1_0_0 | 2026-04-10T14:57:18Z | 2026-04-10T14:57:18Z |
| suse-su-2026:1255-1 | Security update for openssl-1_1 | 2026-04-10T14:56:12Z | 2026-04-10T14:56:12Z |
| suse-su-2026:1254-1 | Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T14:04:42Z | 2026-04-10T14:04:42Z |
| suse-su-2026:21023-1 | Security update for cockpit-podman | 2026-04-10T11:54:16Z | 2026-04-10T11:54:16Z |
| suse-su-2026:21024-1 | Security update for cockpit-machines | 2026-04-10T11:53:13Z | 2026-04-10T11:53:13Z |
| suse-su-2026:21022-1 | Security update for cockpit | 2026-04-10T11:42:11Z | 2026-04-10T11:42:11Z |
| suse-su-2026:1252-1 | Security update for tigervnc | 2026-04-10T11:36:58Z | 2026-04-10T11:36:58Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:6005 | Important: freerdp security update | 2026-03-30T00:00:00Z | 2026-04-02T09:00:17Z |
| alsa-2026:6004 | Important: freerdp security update | 2026-03-30T00:00:00Z | 2026-03-31T08:19:51Z |
| alsa-2026:5942 | Important: golang security update | 2026-03-26T00:00:00Z | 2026-03-27T10:17:44Z |
| alsa-2026:5941 | Important: golang security update | 2026-03-26T00:00:00Z | 2026-03-27T10:26:32Z |
| alsa-2026:5939 | Important: freerdp security update | 2026-03-26T00:00:00Z | 2026-03-27T10:28:32Z |
| alsa-2026:5932 | Important: firefox security update | 2026-03-26T00:00:00Z | 2026-03-30T10:46:04Z |
| alsa-2026:5931 | Important: firefox security update | 2026-03-26T00:00:00Z | 2026-03-30T10:43:43Z |
| alsa-2026:5930 | Important: firefox security update | 2026-03-26T00:00:00Z | 2026-03-30T11:00:48Z |
| alsa-2026:5913 | Moderate: ncurses security update | 2026-03-26T00:00:00Z | 2026-03-27T10:30:59Z |
| alsa-2026:5640 | Moderate: mysql:8.4 security update | 2026-03-24T00:00:00Z | 2026-03-26T11:56:07Z |
| alsa-2026:5603 | Moderate: opencryptoki security update | 2026-03-24T00:00:00Z | 2026-03-26T10:00:53Z |
| alsa-2026:5602 | Moderate: vim security update | 2026-03-24T00:00:00Z | 2026-03-26T10:18:47Z |
| alsa-2026:5599 | Moderate: nginx security update | 2026-03-24T00:00:00Z | 2026-03-26T13:22:57Z |
| alsa-2026:5588 | Moderate: python3 security update | 2026-03-24T00:00:00Z | 2026-03-26T10:36:35Z |
| alsa-2026:5587 | Moderate: opencryptoki security update | 2026-03-24T00:00:00Z | 2026-03-26T10:48:17Z |
| alsa-2026:5585 | Moderate: gnutls security update | 2026-03-24T00:00:00Z | 2026-03-26T11:01:10Z |
| alsa-2026:5581 | Moderate: nginx:1.24 security update | 2026-03-24T00:00:00Z | 2026-03-26T13:17:49Z |
| alsa-2026:5580 | Moderate: mysql:8.0 security update | 2026-03-24T00:00:00Z | 2026-03-26T11:12:21Z |
| alsa-2026:5578 | Moderate: virt:rhel and virt-devel:rhel security update | 2026-03-24T00:00:00Z | 2026-03-26T13:09:57Z |
| alsa-2026:5513 | Moderate: 389-ds:1.4 security update | 2026-03-24T00:00:00Z | 2026-03-26T11:22:25Z |
| alsa-2026:5146 | Important: yggdrasil security update | 2026-03-19T00:00:00Z | 2026-03-20T07:36:24Z |
| alsa-2026:5145 | Important: yggdrasil-worker-package-manager security update | 2026-03-19T00:00:00Z | 2026-03-20T07:40:23Z |
| alsa-2026:5113 | Important: gimp:2.8 security update | 2026-03-19T00:00:00Z | 2026-03-20T13:31:59Z |
| alsa-2026:5080 | Important: libarchive security update | 2026-03-19T00:00:00Z | 2026-03-20T07:21:56Z |
| alsa-2026:5063 | Important: libarchive security update | 2026-03-19T00:00:00Z | 2026-03-20T07:26:23Z |
| alsa-2026:4898 | Important: capstone security update | 2026-03-18T00:00:00Z | 2026-03-19T15:08:06Z |
| alsa-2026:4828 | Moderate: mysql security update | 2026-03-17T00:00:00Z | 2026-03-19T15:05:35Z |
| alsa-2026:4772 | Moderate: glibc security update | 2026-03-17T00:00:00Z | 2026-03-19T12:43:04Z |
| alsa-2026:4760 | Moderate: grub2 security update | 2026-03-17T00:00:00Z | 2026-03-19T14:40:59Z |
| alsa-2026:4759 | Moderate: kernel security update | 2026-03-17T00:00:00Z | 2026-03-20T07:32:09Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| hsec-2023-0003 | code injection in xmonad-contrib | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0002 | Improper Verification of Cryptographic Signature | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0001 | Hash flooding vulnerability in aeson | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2026-216 | Heap-buffer-overflow in mg_mqtt_next_prop | 2026-02-10T00:08:51.349946Z | 2026-02-11T14:08:38.238200Z |
| osv-2026-215 | UNKNOWN READ in getTypeCacheHashTableBucket | 2026-02-10T00:07:25.477890Z | 2026-02-10T00:07:25.478286Z |
| osv-2026-212 | UNKNOWN READ in gpsd_poll | 2026-02-09T00:15:09.775765Z | 2026-02-09T00:15:09.776491Z |
| osv-2026-209 | Use-of-uninitialized-value in ntrip_parse_url | 2026-02-08T00:06:08.137216Z | 2026-02-08T00:06:08.137699Z |
| osv-2026-205 | UNKNOWN READ in gpsd_poll | 2026-02-07T00:03:03.099317Z | 2026-02-07T00:03:03.099778Z |
| osv-2026-204 | Segv on unknown address in icalarray_append | 2026-02-06T00:20:37.969087Z | 2026-02-06T00:20:37.969390Z |
| osv-2026-203 | Segv on unknown address in glslang::TIntermediate::addSymbol | 2026-02-06T00:20:30.779951Z | 2026-02-06T00:20:30.780234Z |
| osv-2026-200 | Global-buffer-overflow in nameMatch | 2026-02-06T00:15:58.927791Z | 2026-02-06T00:15:58.928058Z |
| osv-2026-196 | Null-dereference READ in ubsan_GetStackTrace | 2026-02-06T00:06:05.778394Z | 2026-02-06T00:06:05.778867Z |
| osv-2026-195 | Use-of-uninitialized-value in vcardstructured_free | 2026-02-05T00:15:22.587525Z | 2026-02-05T00:15:22.587818Z |
| osv-2026-189 | Global-buffer-overflow in gpsd_poll | 2026-02-04T00:05:14.950372Z | 2026-02-04T00:05:14.950857Z |
| osv-2026-182 | Use-of-uninitialized-value in json_internal_read_object | 2026-02-03T00:11:05.023029Z | 2026-02-03T00:11:05.023344Z |
| osv-2026-177 | Security exception in org.apache.poi.util.IOUtils.safelyAllocate | 2026-02-02T00:20:01.368972Z | 2026-02-02T00:20:01.369362Z |
| osv-2026-169 | Null-dereference READ in execute_post_instantiate_functions | 2026-02-01T00:01:05.927662Z | 2026-02-01T00:01:05.927997Z |
| osv-2026-167 | Use-of-uninitialized-value in aivdm_analyze | 2026-01-31T00:10:49.750917Z | 2026-01-31T00:10:49.751204Z |
| osv-2026-166 | Use-of-uninitialized-value in ntrip_parse_url | 2026-01-31T00:10:39.163525Z | 2026-01-31T00:10:39.163931Z |
| osv-2026-156 | Segv on unknown address in aivdm_analyze | 2026-01-28T00:06:24.327227Z | 2026-01-28T00:06:24.327712Z |
| osv-2026-150 | Null-dereference READ in wasm_runtime_invoke_native | 2026-01-27T00:02:06.850780Z | 2026-01-27T00:02:06.851098Z |
| osv-2026-144 | Use-of-uninitialized-value in initFilter | 2026-01-26T00:05:57.473672Z | 2026-01-26T00:05:57.473958Z |
| osv-2026-141 | Segv on unknown address in yuv2rgb4_X_c | 2026-01-26T00:03:47.552290Z | 2026-01-26T00:03:47.552807Z |
| osv-2026-136 | Memcpy-param-overlap in grk::memStreamRead | 2026-01-25T00:10:48.352834Z | 2026-01-25T00:10:48.353140Z |
| osv-2026-122 | Use-of-uninitialized-value in rtcm2_unpack | 2026-01-24T00:18:15.169881Z | 2026-01-24T00:18:15.170285Z |
| osv-2026-121 | Use-of-uninitialized-value in trySubset | 2026-01-24T00:15:22.824642Z | 2026-01-24T14:24:01.498986Z |
| osv-2026-119 | Segv on unknown address in gpsd_poll | 2026-01-23T00:09:08.434854Z | 2026-01-23T00:09:08.435286Z |
| osv-2026-112 | Use-of-uninitialized-value in PrintSERPacket | 2026-01-23T00:01:50.403598Z | 2026-01-23T00:01:50.404362Z |
| osv-2026-105 | Use-of-uninitialized-value in pcpp::SSLServerHelloMessage::ServerHelloTLSFingerprint::toString | 2026-01-22T00:08:03.696405Z | 2026-01-22T00:08:03.696709Z |
| osv-2026-98 | Heap-buffer-overflow in hostname_issubdomain | 2026-01-21T00:16:59.551255Z | 2026-01-21T00:16:59.551548Z |
| osv-2026-97 | Heap-buffer-overflow in vpx_wb_write_literal | 2026-01-21T00:09:09.897624Z | 2026-01-28T14:23:52.198239Z |
| osv-2026-91 | Use-after-poison in compress.cc | 2026-01-20T00:09:07.159786Z | 2026-01-20T00:09:07.160128Z |
| osv-2026-87 | Security exception in org.apache.poi.util.IOUtils.safelyAllocate | 2026-01-18T00:18:36.932063Z | 2026-01-20T14:24:38.539978Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0058 | `tokio-io` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0057 | `tokio-reactor` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0056 | `tokio-codec` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0055 | `tokio-process` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0054 | `tokio-current-thread` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0053 | `tokio-tls` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0052 | `tokio-sync` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0051 | `tokio-threadpool` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0050 | `tokio-uds` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0049 | CRLs not considered authoritative by Distribution Point due to faulty matching logic | 2026-03-20T12:00:00Z | 2026-03-24T08:22:29Z |
| rustsec-2026-0068 | tar-rs incorrectly ignores PAX size headers if header size is nonzero | 2026-03-19T12:00:00Z | 2026-03-23T09:31:59Z |
| rustsec-2026-0067 | `unpack_in` can chmod arbitrary directories by following symlinks | 2026-03-19T12:00:00Z | 2026-03-23T09:31:59Z |
| rustsec-2026-0048 | CRL Distribution Point Scope Check Logic Error in AWS-LC | 2026-03-19T12:00:00Z | 2026-03-20T17:11:58Z |
| rustsec-2026-0044 | AWS-LC X.509 Name Constraints Bypass via Wildcard/Unicode CN | 2026-03-19T12:00:00Z | 2026-03-20T17:11:58Z |
| rustsec-2026-0042 | CRL Distribution Point Scope Check Logic Error in AWS-LC | 2026-03-19T12:00:00Z | 2026-03-20T17:11:58Z |
| rustsec-2026-0066 | Insufficient validation of PAX extensions during extraction | 2026-03-17T12:00:00Z | 2026-03-23T09:31:59Z |
| rustsec-2026-0041 | Decompressing invalid data can leak information from uninitialized memory or reused output buffer | 2026-03-17T12:00:00Z | 2026-03-17T16:08:45Z |
| rustsec-2026-0040 | `tracing-ethers` was removed from crates.io due to malicious code | 2026-03-14T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0039 | `chrono_anchor` was removed from crates.io due to malicious code | 2026-03-10T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0037 | Denial of service in Quinn endpoints | 2026-03-09T12:00:00Z | 2026-03-14T07:21:57Z |
| rustsec-2026-0038 | RustSec Advisory | 2026-03-08T12:00:00Z | 2026-03-11T06:21:51Z |
| rustsec-2026-0077 | Incorrect Check of Signer Response Norm During Verification | 2026-03-04T12:00:00Z | 2026-03-27T05:55:06Z |
| rustsec-2026-0076 | Panic in Signature Hint Decoding During Verification | 2026-03-04T12:00:00Z | 2026-03-27T05:55:06Z |
| rustsec-2026-0075 | All-Zero Key Generation on Catastrophic RNG Failure | 2026-03-04T12:00:00Z | 2026-03-27T05:55:06Z |
| rustsec-2026-0074 | Incorrect Output of Incremental Portable SHAKE API | 2026-03-04T12:00:00Z | 2026-03-27T05:55:06Z |
| rustsec-2026-0073 | Panic in Standalone MAC Operations | 2026-03-04T12:00:00Z | 2026-03-27T05:55:06Z |
| rustsec-2026-0036 | `time-sync` was removed from crates.io due to malicious code | 2026-03-04T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0035 | Cache poisoning via insecure-by-default cache key | 2026-03-04T12:00:00Z | 2026-03-09T20:53:55Z |
| rustsec-2026-0034 | HTTP Request Smuggling via HTTP/1.0 and Transfer-Encoding Misparsing | 2026-03-04T12:00:00Z | 2026-03-09T20:53:55Z |
| rustsec-2026-0033 | HTTP Request Smuggling via Premature Upgrade | 2026-03-04T12:00:00Z | 2026-03-09T20:53:55Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-golang-2026-32281 | Inefficient policy validation in crypto/x509 | 2026-04-13T05:43:40.495Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-32280 | Unexpected work during chain building in crypto/x509 | 2026-04-13T05:43:38.849Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-27140 | Code execution vulnerability in SWIG code generation in cmd/go | 2026-04-13T05:43:35.566Z | 2026-04-13T06:11:47.324Z |
| bit-logstash-2026-33466 | Improper Limitation of a Pathname to a Restricted Directory in Logstash Leading to Arbitrary File Write | 2026-04-13T05:42:10.653Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-4498 | Execution with Unnecessary Privileges in Kibana Leading to reading index data beyond their direct Elasticsearch RBAC scope | 2026-04-13T05:42:05.042Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-33461 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:42:03.441Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-33460 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:42:01.870Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-33459 | Uncontrolled Resource Consumption in Kibana Leading to Denial of Service | 2026-04-13T05:42:00.230Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-33458 | Server-Side Request Forgery (SSRF) in Kibana One Workflow Leading to Information Disclosure | 2026-04-13T05:41:58.634Z | 2026-04-13T06:11:47.324Z |
| bit-helm-2026-35206 | Helm Chart extraction output directory collapse via `Chart.yaml` name dot-segment | 2026-04-13T05:40:36.770Z | 2026-04-13T06:11:47.324Z |
| bit-helm-2026-35205 | Helm's plugin verification fails open when .prov is missing, allowing unsigned plugin install | 2026-04-13T05:40:35.063Z | 2026-04-13T06:11:47.324Z |
| bit-helm-2026-35204 | Helm has a path traversal in plugin metadata version enables arbitrary file write outside Helm plugin directory | 2026-04-13T05:40:33.104Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-4498 | Execution with Unnecessary Privileges in Kibana Leading to reading index data beyond their direct Elasticsearch RBAC scope | 2026-04-13T05:38:40.214Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-33461 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:38:38.805Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-33460 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:38:37.022Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-33459 | Uncontrolled Resource Consumption in Kibana Leading to Denial of Service | 2026-04-13T05:38:35.203Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-33458 | Server-Side Request Forgery (SSRF) in Kibana One Workflow Leading to Information Disclosure | 2026-04-13T05:38:33.681Z | 2026-04-13T06:11:47.324Z |
| bit-airflow-2026-34538 | Apache Airflow: Authorization bypass in DagRun wait endpoint (XCom exposure) | 2026-04-13T05:38:18.100Z | 2026-04-13T06:11:47.324Z |
| bit-airflow-2025-57735 | Apache Airflow: Airflow Logout Not Invalidating JWT | 2026-04-13T05:37:57.108Z | 2026-04-13T06:11:47.324Z |
| bit-activemq-2026-40046 | Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT: Missing fix for CVE-2025-66168: MQTT control packet remaining length field is not properly validated | 2026-04-13T05:36:23.428Z | 2026-04-13T06:11:47.324Z |
| bit-joomla-2026-23899 | Joomla! Core - [20260306] - Improper access check in webservice endpoints | 2026-04-10T08:49:24.143Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-23898 | Joomla! Core - [20260305] - Arbitrary file deletion in com_joomlaupdate | 2026-04-10T08:49:22.196Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21632 | Joomla! Core - [20260304] - XSS vectors in various article title outputs | 2026-04-10T08:49:20.111Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21631 | Joomla! Core - [20260303] - XSS vector in com_associations comparison view | 2026-04-10T08:49:17.625Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21630 | Joomla! Core - [20260302] - SQL injection in com_content articles webservice endpoint | 2026-04-10T08:49:15.352Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21629 | Joomla! Core - [20260301] - ACL hardening in com_ajax | 2026-04-10T08:49:13.196Z | 2026-04-10T09:26:18.172Z |
| bit-parse-2026-39381 | Parse Server's Endpoint `/sessions/me` bypasses `_Session` `protectedFields` | 2026-04-09T14:37:43.255Z | 2026-04-09T15:05:10.890Z |
| bit-parse-2026-39321 | Parse Server has a login timing side-channel reveals user existence | 2026-04-09T14:37:40.125Z | 2026-04-09T15:05:10.890Z |
| bit-cosign-2026-39395 | Cosign's verify-blob-attestation reports false positive when payload parsing fails | 2026-04-09T08:37:13.235Z | 2026-04-09T09:13:50.652Z |
| bit-activemq-2026-34197 | Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ: Authenticated users could perform RCE via Jolokia MBeans | 2026-04-09T08:36:52.749Z | 2026-04-09T09:13:50.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-nx54250 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-10T01:03:29.003448Z | 2026-04-09T09:59:33Z |
| cleanstart-2026-hm40094 | filippo | 2026-04-10T01:03:28.912174Z | 2026-04-09T09:27:45Z |
| cleanstart-2026-nz97711 | gRPC-Go is the Go language implementation of gRPC | 2026-04-10T01:00:58.666965Z | 2026-04-09T09:33:10Z |
| cleanstart-2026-mu81308 | gRPC-Go is the Go language implementation of gRPC | 2026-04-10T00:56:28.601214Z | 2026-04-09T11:29:32Z |
| cleanstart-2026-ng75665 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-10T00:56:28.527348Z | 2026-04-09T11:53:35Z |
| cleanstart-2026-in87004 | In libexpat before 2 | 2026-04-10T00:52:28.484967Z | 2026-04-09T11:45:48Z |
| cleanstart-2026-bm53321 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-10T00:51:58.426076Z | 2026-04-09T11:53:35Z |
| cleanstart-2026-ag20129 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-10T00:51:29.221302Z | 2026-04-09T11:45:48Z |
| cleanstart-2026-dk61762 | filippo | 2026-04-10T00:51:28.611547Z | 2026-04-09T11:46:58Z |
| cleanstart-2026-ar20742 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-10T00:51:28.608050Z | 2026-04-09T11:46:58Z |
| cleanstart-2026-cd13174 | gRPC-Go is the Go language implementation of gRPC | 2026-04-10T00:49:58.731115Z | 2026-04-09T11:52:13Z |
| cleanstart-2026-ng28268 | gRPC-Go is the Go language implementation of gRPC | 2026-04-10T00:47:58.418185Z | 2026-04-09T11:52:13Z |
| cleanstart-2026-jy63371 | Delete function fails to properly validate offsets when processing malformed JSON input | 2026-04-10T00:45:58.478015Z | 2026-04-09T11:52:13Z |
| cleanstart-2026-ay21238 | security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions enforced by network policies during namespace deletion | 2026-04-10T00:37:58.214935Z | 2026-04-09T11:56:50Z |
| cleanstart-2026-ge08280 | Ruby JSON is a JSON implementation for Ruby | 2026-04-09T01:01:38.909372Z | 2026-04-08T08:04:46Z |
| cleanstart-2026-ij23041 | In libexpat before 2 | 2026-04-09T01:01:38.269615Z | 2026-04-08T06:46:14Z |
| cleanstart-2026-mw52739 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-09T00:59:39.080550Z | 2026-04-08T06:46:14Z |
| cleanstart-2026-ki25096 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-09T00:59:38.592849Z | 2026-04-08T06:46:14Z |
| cleanstart-2026-gy86690 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-09T00:57:57.606656Z | 2026-04-08T06:46:14Z |
| cleanstart-2026-ba09462 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-04-09T00:57:38.077873Z | 2026-04-08T07:00:07Z |
| cleanstart-2026-ot38160 | url | 2026-04-09T00:55:38.018075Z | 2026-04-08T07:36:24Z |
| cleanstart-2026-cq39708 | Netty is an asynchronous, event-driven network application framework | 2026-04-09T00:53:38.262441Z | 2026-04-08T08:11:56Z |
| cleanstart-2026-iw08736 | Uncontrolled Recursion vulnerability in Apache Commons Lang | 2026-04-09T00:53:08.467045Z | 2026-04-08T09:19:34Z |
| cleanstart-2026-oq84658 | Netty is an asynchronous, event-driven network application framework | 2026-04-09T00:52:07.697782Z | 2026-04-08T08:14:27Z |
| cleanstart-2026-bg72514 | Uncontrolled Recursion vulnerability in Apache Commons Lang | 2026-04-09T00:49:38.775284Z | 2026-04-08T09:13:42Z |
| cleanstart-2026-mo53190 | gRPC-Go is the Go language implementation of gRPC | 2026-04-09T00:49:37.904336Z | 2026-04-08T09:47:14Z |
| cleanstart-2026-mi26424 | net/url package does not set a limit on the number of query parameters in a query | 2026-04-09T00:48:07.244191Z | 2026-04-08T09:30:12Z |
| cleanstart-2026-by59711 | gRPC-Go is the Go language implementation of gRPC | 2026-04-09T00:47:37.687304Z | 2026-04-08T09:36:51Z |
| cleanstart-2026-co68219 | Docker CLI for Windows searches for plugin binaries in C:\\\\\\\\ProgramData\\\\\\\\Docker\\\\\\\\cli-plugins, a directory that does not exist by default | 2026-04-09T00:47:37.444297Z | 2026-04-08T09:44:10Z |
| cleanstart-2026-hz73294 | Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service | 2026-04-09T00:45:08.400884Z | 2026-04-08T10:12:22Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2026-002 | 2026-01-14T17:54:33.000Z | 2026-01-14T17:54:33.000Z | |
| drupal-contrib-2026-001 | 2026-01-14T17:53:33.000Z | 2026-01-14T17:53:33.000Z | |
| drupal-contrib-2025-126 | 2025-12-17T17:47:13.000Z | 2025-12-17T17:47:13.000Z | |
| drupal-contrib-2025-125 | 2025-12-10T17:53:01.000Z | 2025-12-10T19:09:57.000Z | |
| drupal-contrib-2025-124 | 2025-12-03T18:49:57.000Z | 2025-12-03T18:49:57.000Z | |
| drupal-contrib-2025-123 | 2025-12-03T18:49:40.000Z | 2025-12-03T18:49:40.000Z | |
| drupal-contrib-2025-122 | 2025-12-03T18:49:18.000Z | 2025-12-03T18:49:18.000Z | |
| drupal-contrib-2025-121 | 2025-12-03T18:48:57.000Z | 2025-12-03T18:48:57.000Z | |
| drupal-contrib-2025-120 | 2025-12-03T18:48:37.000Z | 2025-12-03T18:48:37.000Z | |
| drupal-contrib-2025-119 | 2025-12-03T18:48:23.000Z | 2025-12-03T19:05:53.000Z | |
| drupal-contrib-2025-118 | 2025-12-03T18:48:10.000Z | 2025-12-03T18:48:10.000Z | |
| drupal-contrib-2025-117 | 2025-12-03T18:47:37.000Z | 2025-12-03T18:47:37.000Z | |
| drupal-contrib-2025-116 | 2025-11-05T18:09:13.000Z | 2025-11-05T18:09:13.000Z | |
| drupal-contrib-2025-115 | 2025-11-05T18:08:01.000Z | 2025-11-05T18:08:01.000Z | |
| drupal-contrib-2025-114 | 2025-10-29T16:44:39.000Z | 2025-10-29T20:15:52.000Z | |
| drupal-contrib-2025-113 | 2025-10-22T16:35:12.000Z | 2025-10-22T16:35:12.000Z | |
| drupal-contrib-2025-112 | 2025-10-22T16:34:46.000Z | 2025-10-22T16:34:46.000Z | |
| drupal-contrib-2025-111 | 2025-09-24T17:28:05.000Z | 2025-09-24T17:28:05.000Z | |
| drupal-contrib-2025-110 | 2025-09-24T17:27:41.000Z | 2025-09-24T17:27:41.000Z | |
| drupal-contrib-2025-109 | 2025-09-24T17:27:33.000Z | 2025-09-24T17:27:33.000Z | |
| drupal-contrib-2025-108 | 2025-09-24T17:27:20.000Z | 2025-09-24T17:27:20.000Z | |
| drupal-contrib-2025-107 | 2025-09-24T17:18:08.000Z | 2025-09-24T17:18:08.000Z | |
| drupal-contrib-2025-106 | 2025-09-24T17:16:20.000Z | 2025-09-24T17:16:20.000Z | |
| drupal-contrib-2025-105 | 2025-09-03T16:15:48.000Z | 2025-09-03T16:15:48.000Z | |
| drupal-contrib-2025-104 | 2025-08-27T17:20:41.000Z | 2025-08-27T17:20:41.000Z | |
| drupal-contrib-2025-103 | 2025-08-27T17:20:16.000Z | 2025-08-27T17:20:16.000Z | |
| drupal-contrib-2025-102 | 2025-08-27T17:20:11.000Z | 2025-08-27T17:20:11.000Z | |
| drupal-contrib-2025-101 | 2025-08-27T17:19:59.000Z | 2025-09-03T18:55:46.000Z | |
| drupal-contrib-2025-100 | 2025-08-27T17:19:45.000Z | 2025-08-27T17:23:11.000Z | |
| drupal-contrib-2025-099 | 2025-08-27T17:19:24.000Z | 2025-08-27T17:19:24.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2024-ale-003 | [MàJ] Incident affectant les solutions AnyDesk | 2024-02-05T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-002 | [MàJ] Multiples Vulnérabilités dans GitLab | 2024-01-12T00:00:00.000000 | 2024-02-22T00:00:00.000000 |
| certfr-2024-ale-001 | [MàJ] Multiples vulnérabilités dans Ivanti Connect Secure et Policy Secure Gateways | 2024-01-11T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2023-ale-013 | Vulnérabilité dans Apache Struts 2 | 2023-12-13T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-006 | Vulnérabilité dans les produits Microsoft | 2023-12-12T00:00:00.000000 | 2023-07-12T00:00:00.000000 |
| certfr-2023-ale-012 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-10-23T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-011 | [MàJ] Multiples vulnérabilités dans Cisco IOS XE | 2023-10-17T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-010 | Multiples vulnérabilités dans Exim | 2023-10-02T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-009 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2023-07-26T00:00:00.000000 | 2023-09-15T00:00:00.000000 |
| certfr-2023-ale-008 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-07-19T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-007 | [MàJ] Vulnérabilité dans Zimbra Collaboration Suite | 2023-07-17T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-005 | Synthèse sur l'exploitation d'une vulnérabilité dans MOVEit Transfer | 2023-07-05T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-004 | Vulnérabilité dans les produits Fortinet | 2023-06-13T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-003 | [MàJ] Compromission de l'application 3CX Desktop App | 2023-03-31T00:00:00.000000 | 2023-04-12T00:00:00.000000 |
| certfr-2023-ale-002 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2023-03-15T00:00:00.000000 | 2023-05-11T00:00:00.000000 |
| certfr-2023-ale-001 | Vulnérabilité dans Fortinet FortiOS | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2023-ale-015 | [MàJ] Campagne d'exploitation d'une vulnérabilité affectant VMware ESXi | 2023-02-03T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-014 | Multiples vulnérabilités dans AMI MegaRAC | 2022-12-16T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2022-ale-013 | [MàJ] Vulnérabilité dans Citrix ADC et Gateway | 2022-12-13T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-012 | [MàJ] Vulnérabilité dans FortiOS SSL-VPN | 2022-12-13T00:00:00.000000 | 2022-12-20T00:00:00.000000 |
| certfr-2022-ale-011 | Vulnérabilité dans les produits Fortinet | 2022-10-14T00:00:00.000000 | 2022-10-14T00:00:00.000000 |
| certfr-2022-ale-010 | Multiples vulnérabilités dans GLPI | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-009 | [MaJ] Vulnérabilité dans Zimbra Collaboration | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-008 | [MaJ] Multiples vulnérabilités dans Microsoft Exchange | 2022-09-30T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-007 | Multiples vulnérabilités dans Microsoft Windows | 2022-09-16T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-006 | [MàJ] Vulnérabilité dans Atlassian Confluence | 2022-06-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| certfr-2022-ale-005 | [MàJ] Vulnérabilité dans Microsoft Windows | 2022-05-31T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| certfr-2022-ale-004 | Vulnérabilité dans F5 BIG-IP | 2022-05-11T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| certfr-2022-ale-003 | [MàJ] Vulnérabilité dans l'implémentation du protocole RPC par Microsoft | 2022-04-13T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2022-ale-002 | Vulnérabilité dans VMware Spring Cloud Gateway | 2022-03-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0415 | Multiples vulnérabilités dans Tenable Security Center | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0414 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0413 | Multiples vulnérabilités dans les produits Elastic | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0412 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0411 | Multiples vulnérabilités dans Mitel MiCollab | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0410 | Multiples vulnérabilités dans GitLab | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0409 | Multiples vulnérabilités dans Sonicwall Secure Mobile Access | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0408 | Multiples vulnérabilités dans les produits Juniper Networks | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0407 | Multiples vulnérabilités dans Google Chrome | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0406 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-08T00:00:00.000000 | 2026-04-08T00:00:00.000000 |
| certfr-2026-avi-0405 | Vulnérabilité dans les produits Moxa | 2026-04-08T00:00:00.000000 | 2026-04-08T00:00:00.000000 |
| certfr-2026-avi-0404 | Multiples vulnérabilités dans les produits Mozilla | 2026-04-08T00:00:00.000000 | 2026-04-08T00:00:00.000000 |
| certfr-2026-avi-0403 | Multiples vulnérabilités dans OpenSSL | 2026-04-08T00:00:00.000000 | 2026-04-08T00:00:00.000000 |
| certfr-2026-avi-0402 | Vulnérabilité dans HPE Aruba Networking Private 5G Core | 2026-04-08T00:00:00.000000 | 2026-04-08T00:00:00.000000 |
| certfr-2026-avi-0401 | Multiples vulnérabilités dans GLPI | 2026-04-07T00:00:00.000000 | 2026-04-07T00:00:00.000000 |
| certfr-2026-avi-0400 | Vulnérabilité dans Fortinet FortiClientEMS | 2026-04-07T00:00:00.000000 | 2026-04-07T00:00:00.000000 |
| certfr-2026-avi-0399 | Multiples vulnérabilités dans Google Android | 2026-04-07T00:00:00.000000 | 2026-04-07T00:00:00.000000 |
| certfr-2026-avi-0398 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0397 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0396 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0395 | Multiples vulnérabilités dans les produits IBM | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0394 | Multiples vulnérabilités dans VMware Tanzu | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0393 | Vulnérabilité dans Synology Mail Station | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0392 | Multiples vulnérabilités dans Microsoft Edge | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0391 | Multiples vulnérabilités dans OpenSSH | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0390 | Multiples vulnérabilités dans Belden NetModule Router Software | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0389 | Vulnérabilité dans Microsoft Azure Linux | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0388 | Multiples vulnérabilités dans les produits Cisco | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0387 | Multiples vulnérabilités dans les produits Netgate | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0386 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-006887 | Multiple vulnerabilities in Micro Research MR-GM5L-S1 and MR-GM5A-L1 | 2026-03-12T17:22+09:00 | 2026-03-12T17:22+09:00 |
| jvndb-2026-000036 | Improper file access permission settings in multiple Digital Arts products | 2026-03-09T14:57+09:00 | 2026-03-09T16:23+09:00 |
| jvndb-2026-000035 | Installer for Qsee Client may insecurely load Dynamic Link Libraries | 2026-03-09T14:57+09:00 | 2026-03-09T14:57+09:00 |
| jvndb-2026-006102 | Security issues in ESC/POS | 2026-03-06T10:31+09:00 | 2026-03-06T10:31+09:00 |
| jvndb-2026-000034 | django-allauth vulnerable to open redirect | 2026-03-05T12:36+09:00 | 2026-03-05T12:36+09:00 |
| jvndb-2026-000033 | EC-CUBE vulnerable to multi-factor authentication bypass | 2026-03-05T12:36+09:00 | 2026-03-05T12:36+09:00 |
| jvndb-2026-000032 | Multiple vulnerabilities in Dell UPS Multi-UPS Management Console (MUMC) | 2026-03-04T12:20+09:00 | 2026-03-04T12:20+09:00 |
| jvndb-2026-005746 | Multiple vulnerabilities in Trend Micro Endpoint security products for enterprises (February 2026) | 2026-03-04T10:40+09:00 | 2026-03-04T10:40+09:00 |
| jvndb-2026-005744 | Canon IJ Scan Utility registers Windows services with unquoted file paths | 2026-03-04T10:40+09:00 | 2026-03-04T10:40+09:00 |
| jvndb-2026-005259 | Out-of-bounds write vulnerability in Fujitsu BIOS Driver (fbiosdrv.sys) | 2026-03-02T11:46+09:00 | 2026-03-02T11:46+09:00 |
| jvndb-2026-000031 | Improper file access permission settings in the installers for multiple Soliton Systems products | 2026-02-27T15:41+09:00 | 2026-02-27T15:41+09:00 |
| jvndb-2026-000030 | IM-LogicDesigner module of intra-mart Accel Platform vulnerable to untrusted data deserialization | 2026-02-27T15:41+09:00 | 2026-03-03T10:06+09:00 |
| jvndb-2026-000029 | Multiple vulnerabilities in the installer of FinalCode Client | 2026-02-26T14:24+09:00 | 2026-02-26T14:24+09:00 |
| jvndb-2026-004811 | Vulnerability in Hitachi Configuration Manager and Hitachi Ops Center API Configuration Manager | 2026-02-26T11:02+09:00 | 2026-02-26T11:02+09:00 |
| jvndb-2026-004810 | Vulnerability in Hitachi Configuration Manager and Hitachi Ops Center API Configuration Manager | 2026-02-26T11:02+09:00 | 2026-02-26T11:02+09:00 |
| jvndb-2026-000026 | Lanscope Endpoint Manager (On-Premises) vulnerable to path traversal | 2026-02-25T15:14+09:00 | 2026-02-25T15:14+09:00 |
| jvndb-2026-004359 | Security information for Hitachi Disk Array Systems | 2026-02-20T18:35+09:00 | 2026-02-20T18:35+09:00 |
| jvndb-2026-000027 | WordPress Plugin "Survey Maker" vulnerable to cross-site scripting | 2026-02-20T12:32+09:00 | 2026-02-20T12:32+09:00 |
| jvndb-2026-000028 | Installer for Job log aggregation/analysis software RICOH Job Log Aggregation Tool may insecurely load Dynamic Link Libraries | 2026-02-20T12:31+09:00 | 2026-02-20T12:31+09:00 |
| jvndb-2026-003912 | Vulnerability in Cosminexus HTTP Server and Hitachi Web Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003911 | Vulnerability in Cosminexus HTTP Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003910 | Multiple Vulnerabilities in Cosminexus HTTP Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003909 | Multiple Vulnerabilities in Hitachi Command Suite products | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003908 | Multiple Vulnerabilities in Hitachi Command Suite, Hitachi Automation Director, Hitachi Configuration Manager, Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003907 | Multiple Vulnerabilities in JP1 | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003906 | Multiple Vulnerabilities in Cosminexus | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003905 | Multiple Vulnerabilities in Cosminexus HTTP Server and Hitachi Web Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-000025 | Joomla! CMS vulnerable to cross-site scripting | 2026-02-17T12:46+09:00 | 2026-02-17T12:46+09:00 |
| jvndb-2026-000023 | FileZen vulnerable to OS command injection | 2026-02-13T16:51+09:00 | 2026-02-13T17:08+09:00 |
| jvndb-2026-000024 | Installer of M-Audio M-Track Duo HD may insecurely load Dynamic Link Libraries | 2026-02-12T13:32+09:00 | 2026-02-12T13:32+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-15835 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15835) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15834 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15834) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15833 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15833) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15832 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15832) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15831 | HCL Aftermarket DPC会话固定漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15830 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15830) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15829 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15829) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15828 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15828) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15827 | HCL Aftermarket DPC存在未明漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15826 | HCL Aftermarket DPC跨源资源共享漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15825 | HCL Aftermarket DPC SQL注入漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-16066 | WordPress插件King Addons for Elementor信息泄露漏洞 | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16065 | WordPress插件Download Manager信息泄露漏洞 | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16063 | GNU BinUtils缓冲区溢出漏洞(CNVD-2026-16063) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16057 | OpenClaw路径遍历漏洞(CNVD-2026-16057) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16056 | OpenClaw安全绕过漏洞(CNVD-2026-16056) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16055 | OpenClaw安全绕过漏洞(CNVD-2026-16055) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16054 | OpenClaw命令执行漏洞(CNVD-2026-16054) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16053 | OpenClaw拒绝服务漏洞(CNVD-2026-16053) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16052 | OpenClaw访问控制错误漏洞(CNVD-2026-16052) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16051 | OpenClaw安全绕过漏洞(CNVD-2026-16051) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16050 | OpenClaw操作系统命令注入漏洞(CNVD-2026-16050) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16049 | OpenClaw存在未明漏洞(CNVD-2026-16049) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16048 | OpenClaw存在未明漏洞(CNVD-2026-16048) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16047 | OpenClaw代码执行漏洞(CNVD-2026-16047) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16046 | OpenClaw命令执行漏洞(CNVD-2026-16046) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16045 | OpenClaw安全绕过漏洞(CNVD-2026-16045) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16044 | OpenClaw操作系统命令注入漏洞(CNVD-2026-16044) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16043 | OpenClaw操作系统命令注入漏洞(CNVD-2026-16043) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16042 | OpenClaw路径遍历漏洞(CNVD-2026-16042) | 2026-03-26 | 2026-04-03 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01814 | Уязвимость программного обеспечения Microsoft ACI Confidential Containers, связанная с хр… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01813 | Уязвимость программного обеспечения Azure IoT Explorer, связанная с привязкой к открытым … | 16.02.2026 | 16.02.2026 |
| bdu:2026-01812 | Уязвимость почтового сервера Microsoft Exchange Server, связанная с ошибками представлени… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01811 | Уязвимость службы аналитики данных Azure HDInsights, связанная с непринятием мер по защит… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01810 | Уязвимость редактора электронных таблиц Microsoft Excel пакетов программ Microsoft Office… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01809 | Уязвимость службы хранилища данных Windows Storage Services операционных систем Windows, … | 16.02.2026 | 16.02.2026 |
| bdu:2026-01808 | Уязвимость реализации протокола NTLM операционных систем Windows, позволяющая нарушителю … | 16.02.2026 | 16.02.2026 |
| bdu:2026-01807 | Уязвимость системы аппаратной виртуализации Hyper-V операционной системы Windows, позволя… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01806 | Уязвимость механизма CCF (Cluster Client Failover) операционных систем Windows, позволяющ… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01805 | Уязвимость драйвера HTTP.sys операционных систем Windows, позволяющая нарушителю повысить… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01804 | Уязвимость ядра операционных систем Windows, позволяющая нарушителю повысить свои привилегии | 16.02.2026 | 16.02.2026 |
| bdu:2026-01803 | Уязвимость драйвера WinSock операционных систем Windows, позволяющая нарушителю повысить … | 16.02.2026 | 16.02.2026 |
| bdu:2026-01802 | Уязвимость ядра операционных систем Windows, позволяющая нарушителю повысить свои привилегии | 16.02.2026 | 16.02.2026 |
| bdu:2026-01801 | Уязвимость драйвера HTTP.sys операционных систем Windows, позволяющая нарушителю повысить… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01800 | Уязвимость ядра операционных систем Windows, позволяющая нарушителю повысить свои привилегии | 16.02.2026 | 16.02.2026 |
| bdu:2026-01799 | Уязвимость ядра операционных систем Windows, позволяющая нарушителю раскрыть защищаемую и… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01798 | Уязвимость программы для шифрования информации и создания электронных цифровых подписей G… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01797 | Уязвимость функции _bfd_elf_slurp_version_tables() компонента bfd/elf.c программного сред… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01796 | Уязвимость компонента libbfd.c программного средства разработки GNU Binutils, позволяющая… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01795 | Уязвимость программного средства управления конечными точками Ivanti Endpoint Manager, св… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01794 | Уязвимость функции usbg_make_tpg() модуля drivers/usb/gadget/function/f_tcm.c драйвера га… | 16.02.2026 | 16.02.2026 |
| bdu:2026-01792 | Уязвимость программного средства локальной инфраструктуры Azure Local, связанная с ошибка… | 13.02.2026 | 16.02.2026 |
| bdu:2026-01791 | Уязвимость средства разработки программного обеспечения Microsoft Visual Studio, связанна… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01790 | Уязвимость Защитника Microsoft (Microsoft Defender for Endpoint) операционных систем Linu… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01789 | Уязвимость редактора исходного кода Microsoft Visual Studio Code, связанная с ошибками си… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01788 | Уязвимость сервиса Azure AI Language Authoring, связанная с недостатками механизма десери… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01787 | Уязвимость средства разработки программного обеспечения Microsoft Visual Studio, связанна… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01786 | Уязвимость компонента Windows Installer приложения Windows App, позволяющая нарушителю по… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01785 | Уязвимость редактора исходного кода Microsoft Visual Studio Code, связанная с непринятием… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01784 | Уязвимость средства разработки программного обеспечения Azure DevOps Server, связанная с … | 13.02.2026 | 13.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202604-0974 | A security vulnerability has been detected in Tenda G103 1.0.0.5. The affected element is… | 2026-04-10T23:50:37.355000Z |
| var-200702-0378 | Stack-based buffer overflow in the DCE/RPC preprocessor in Snort before 2.6.1.3, and 2.7 … | 2026-04-10T23:50:14.187000Z |
| var-201805-1147 | WPLSoft in Delta Electronics versions 2.45.0 and prior utilizes a fixed length heap buffe… | 2026-04-10T23:48:01.556000Z |
| var-201109-0081 | Buffer overflow in the gopherToHTML function in gopher.cc in the Gopher reply parser in S… | 2026-04-10T23:46:00.609000Z |
| var-201112-0097 | Stack-based buffer overflow in the CmpWebServer component in 3S CoDeSys 3.4 SP4 Patch 2 a… | 2026-04-10T23:46:00.136000Z |
| var-201601-0038 | Multiple stack-based buffer overflows in Advantech WebAccess before 8.1 allow remote atta… | 2026-04-10T23:45:45.755000Z |
| var-201801-0151 | A Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior … | 2026-04-10T23:45:40.671000Z |
| var-201801-0152 | An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions pri… | 2026-04-10T23:45:36.615000Z |
| var-201805-1143 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2026-04-10T23:45:35.471000Z |
| var-201805-1144 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2026-04-10T23:45:35.332000Z |
| var-200107-0035 | slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cau… | 2026-04-10T23:43:14.623000Z |
| var-200512-0294 | Buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbitr… | 2026-04-10T23:42:35.752000Z |
| var-200512-0611 | Multiple heap-based buffer overflows in QuickTime.qts in Apple QuickTime Player 7.0.3 and… | 2026-04-10T23:42:35.677000Z |
| var-200512-0643 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2026-04-10T23:42:35.610000Z |
| var-200512-0300 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2026-04-10T23:42:35.534000Z |
| var-200512-0297 | Integer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbit… | 2026-04-10T23:42:35.468000Z |
| var-201407-0233 | Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote atta… | 2026-04-10T23:39:25.669000Z |
| var-201801-0394 | TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbi… | 2026-04-10T23:38:47.573000Z |
| var-201902-0647 | LCDS Laquis SCADA prior to version 4.1.0.4150 allows execution of script code by opening … | 2026-04-10T23:38:41.598000Z |
| var-201906-1029 | In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulne… | 2026-04-10T23:38:39.157000Z |
| var-202004-0077 | There are multiple ways an unauthenticated attacker could perform SQL injection on WebAcc… | 2026-04-10T23:38:34.550000Z |
| var-201304-0385 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-04-10T23:38:07.421000Z |
| var-201801-1712 | Systems with microprocessors utilizing speculative execution and branch prediction may al… | 2026-04-10T23:37:25.913000Z |
| var-202203-0145 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed … | 2026-04-10T23:37:20.905000Z |
| var-201205-0246 | sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI… | 2026-04-10T23:37:20.576000Z |
| var-200703-0010 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted at… | 2026-04-10T23:37:20.491000Z |
| var-202006-1807 | Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)]… | 2026-04-10T23:37:19.624000Z |
| var-200807-0062 | JavaScriptCore in WebKit on Apple iPhone before 2.0 and iPod touch before 2.0 does not pr… | 2026-04-10T23:37:13.791000Z |
| var-200807-0283 | Integer signedness error in Safari on Apple iPhone before 2.0 and iPod touch before 2.0 a… | 2026-04-10T23:36:43.164000Z |
| var-201006-0051 | Cross-site request forgery (CSRF) vulnerability in the web interface in CUPS before 1.4.4… | 2026-04-10T23:36:13.997000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2023-054 | Phoenix Contact: ProConOS prone to Download of Code Without Integrity Check | 2023-12-12T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-051 | Phoenix Contact: MULTIPROG Engineering tool and ProConOS eCLR SDK prone to CWE-732 | 2023-12-12T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-062 | Phoenix Contact: WIBU-SYSTEMS CodeMeter Runtime vulnerabilities in multiple products | 2023-11-21T08:15:00.000Z | 2023-11-21T08:15:00.000Z |
| vde-2023-030 | Phoenix Contact: Multiple products affected by WIBU Codemeter Vulnerability (Update A) | 2023-09-19T06:50:00.000Z | 2023-11-13T11:00:00.000Z |
| vde-2023-018 | Phoenix Contact: Multiple vulnerabilities in WP 6xxx Web panels | 2023-08-08T06:41:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-016 | Phoenix Contact: PLCnext Engineer Vulnerabilities in LibGit2Sharp/LibGit2 | 2023-08-08T06:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-017 | Phoenix Contact: Multiple vulnerabilities in TC ROUTER, TC CLOUD CLIENT and CLOUD CLIENT devices | 2023-08-08T04:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-010 | PHOENIX CONTACT: FL MGUARD affected by two vulnerabilities | 2023-06-13T06:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2023-004 | Phoenix Contact: Directory Traversal Vulnerability in ENERGY AXC PU Web service | 2023-04-11T08:00:00.000Z | 2023-04-11T08:00:00.000Z |
| vde-2023-003 | PHOENIX CONTACT: Multiple vulnerabilities in ENERGY AXC PU | 2023-03-14T09:14:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-053 | PHOENIX CONTACT: Advisory for TC ROUTER and CLOUD CLIENT | 2023-03-07T07:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2023-001 | PHOENIX CONTACT: Multiple Vulnerabilities in PLCnext Firmware | 2023-02-14T07:50:00.000Z | 2025-06-05T13:28:12.000Z |
| vde-2022-058 | PHOENIX CONTACT: Profinet SDK libexpat vulnerabilities | 2022-12-13T07:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-051 | PHOENIX CONTACT: Denial-of-Service vulnerability in mGuard product family | 2022-11-15T09:27:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-048 | PHOENIX CONTACT: Automationworx BCP File Parsing Vulnerabilities | 2022-11-15T09:25:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-046 | PHOENIX CONTACT: Multiple Linux component vulnerabilities in PLCnext Firmware | 2022-11-10T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-028 | PHOENIX CONTACT: Missing Authentication in ProConOS/ProConOS eCLR SDK and MULTIPROG Engineering tool | 2022-06-21T05:18:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-026 | PHOENIX CONTACT: Vulnerability in ProConOS/ProConOS eCLR SDK and MULTIPROG Engineering tool | 2022-06-21T05:16:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-025 | PHOENIX CONTACT: Vulnerability in classic line industrial controllers | 2022-06-21T05:15:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-018 | PHOENIX CONTACT: Multiple vulnerabilities in RAD-ISM-900-EN-BD devices | 2022-05-11T14:20:00.000Z | 2022-05-11T14:20:00.000Z |
| vde-2022-014 | PHOENIX CONTACT: mGuard Device Manager affected by HTTP Request Smuggling of Apache Webserver | 2022-04-12T06:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-013 | PHOENIX CONTACT: Multiple products affected by possible infinite loop within OpenSSL library | 2022-04-12T06:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-010 | PHOENIX CONTACT: Multiple Linux component vulnerabilities fixed in latest AXC F x152 LTS release | 2022-04-12T06:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-005 | PHOENIX CONTACT: Vulnerabilities in XML parser library Expat (libexpat) | 2022-03-30T07:30:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-007 | PHOENIX CONTACT: Path Traversal in Library of PLCnext Technology Toolchain and FL Network Manager | 2022-03-22T07:43:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-001 | PHOENIX CONTACT: FL SWITCH 2xxx series incorrect privilege assignment | 2022-01-25T08:05:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-059 | PHOENIX CONTACT: BLUEMARK X1 / LED / CLED printers utilizing the Siemens Nucleus RTOS TCP/IP Stack | 2022-01-11T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-056 | WAGO: Multiple Vulnerabilities in CODESYS Runtime 2.3 and WebVisualisation | 2021-11-16T14:11:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-046 | PHOENIX CONTACT: XSS and memory-leak in FL MGUARD 1102/1105 | 2021-11-10T07:23:00.000Z | 2021-11-10T07:23:00.000Z |
| vde-2021-052 | PHOENIX CONTACT: PC Worx/-Express prone to improper input validation vulnerability | 2021-11-03T09:45:00.000Z | 2025-05-22T13:03:10.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2018-008 | Pepperl+Fuchs: Remote Code Execution Vulnerability in HMI Devices | 2018-07-06T13:37:00.000Z | 2018-07-06T13:37:00.000Z |
| vde-2018-002 | Pepperl+Fuchs: HMI devices vulnerable to Meltdown and Spectre Attacks | 2018-02-14T08:50:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2017-005 | Pepperl+Fuchs / ecom instruments: WLAN enabled products utilizing WPA2 encryption | 2017-12-11T13:26:00.000Z | 2018-10-23T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2023-015 | WAGO: Improper privilege management in web-based management | 2023-11-20T07:00:00.000Z | 2023-11-20T07:00:00.000Z |
| vde-2023-046 | WAGO: Multiple products vulnerable to local file inclusion | 2023-10-23T10:00:00.000Z | 2025-04-28T10:00:00.000Z |
| vde-2023-042 | Wago: Vulnerable WIBU-SYSTEMS Codemeter installed through e!COCKPIT and WAGO-I/O-Pro (UPDATE B) | 2023-09-25T10:00:00.000Z | 2024-11-20T11:00:00.000Z |
| vde-2023-026 | WAGO: Multiple products prone to multiple vulnerabilities in e!Runtime / CODESYS V3 Runtime | 2023-07-31T07:36:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-014 | WAGO: Bluetooth LE vulnerability in WLAN-ETHERNET-Gateway | 2023-07-31T07:00:00.000Z | 2023-07-31T07:00:00.000Z |
| vde-2023-006 | WAGO: Controller with CODESYS 2.3 Runtime Denial-of-Service | 2023-06-25T06:00:00.000Z | 2024-07-08T10:00:00.000Z |
| vde-2023-005 | WAGO: Series 750-3x/-8x prone to MODBUS server DoS | 2023-06-25T06:00:00.000Z | 2023-06-25T06:00:00.000Z |
| vde-2023-007 | WAGO: Unauthenticated command execution via Web-based-management UPDATE A | 2023-05-15T08:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-060 | WAGO: Multiple vulnerabilities in web-based management of multiple products | 2023-02-27T11:00:00.000Z | 2023-02-27T11:00:00.000Z |
| vde-2022-055 | WAGO: Exposure of configuration interface in unmanaged switches | 2023-02-16T13:43:00.000Z | 2023-02-16T13:43:00.000Z |
| vde-2022-054 | WAGO: Unauthenticated Configuration Export in web-based management in multiple devices | 2023-01-12T07:52:00.000Z | 2023-01-12T07:52:00.000Z |
| vde-2022-042 | WAGO: Multiple products - Loss of MAC-Address-Filtering after reboot | 2022-10-17T08:00:00.000Z | 2022-10-17T08:00:00.000Z |
| vde-2022-040 | WAGO: Multiple Vulnerabilities in Controller with WAGO I/O-Pro / CODESYS 2.3 Runtime | 2022-10-17T08:00:00.000Z | 2023-09-22T12:39:00.000Z |
| vde-2022-047 | WAGO: FTP-Server - Denial-of-Service | 2022-10-12T08:00:00.000Z | 2022-10-12T08:00:00.000Z |
| vde-2022-035 | WAGO: Multiple product series affected by multiple CODESYS vulnerabilities | 2022-08-17T08:00:00.000Z | 2022-08-17T08:00:00.000Z |
| vde-2022-031 | WAGO: Multiple Products Series affected by multiple CODESYS vulnerabilities | 2022-08-17T08:00:00.000Z | 2022-08-17T08:00:00.000Z |
| vde-2022-009 | WAGO: Multiple Products affected by Linux Kernel Vulnerability Dirty Pipe | 2022-04-06T07:30:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-004 | WAGO: Web-Based Management Cross-Site Scripting | 2022-03-09T07:00:00.000Z | 2022-03-09T07:00:00.000Z |
| vde-2022-002 | WAGO: Vulnerable WIBU-SYSTEMS Codemeter installed through e!COCKPIT and WAGO-I/O-Pro | 2022-01-31T13:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-060 | WAGO: Smart Script affected by Log4Shell Vulnerability | 2022-01-05T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-049 | WAGO: Denial of Service Vulnerability in CODESYS Runtime 2.3 | 2021-11-16T12:05:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-050 | WAGO: Multiple devices affected by Vulnerabilities in NUCLEUS TCP Stack. | 2021-11-16T11:02:00.000Z | 2021-11-16T11:02:00.000Z |
| vde-2021-043 | WAGO: Vulnerable WIBU-SYSTEMS Codemeter installed through e!COCKPIT and WAGO-I/O-Pro | 2021-08-31T07:02:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-044 | WAGO: Web-Based Management Authentication Vulnerability in WAGO 750-36X and WAGO 750-8XX | 2021-08-31T07:01:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-038 | WAGO: OpenSSL DoS Vulnerability in PLCs | 2021-08-31T07:00:00.000Z | 2025-05-14T12:53:43.000Z |
| vde-2020-036 | WAGO: Multiple Vulnerabilities in I/O-Check Service | 2021-06-29T10:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2021-014 | WAGO: Multiple Vulnerabilities in CODESYS Runtime 2.3 | 2021-05-20T09:08:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-013 | WAGO: Multiple Vulnerabilities in the Web-Based Management Interface | 2021-05-05T08:54:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-048 | M&M Software (WAGO): Deserialisation of untrusted data in fdtContainer | 2021-01-14T14:57:00.000Z | 2021-01-14T14:57:00.000Z |
| vde-2020-045 | WAGO: Command Injection Vulnerability in I/O-Check Service of multiple products | 2020-12-17T09:02:00.000Z | 2025-05-14T12:53:43.000Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| GCVE-1-2025-0036 |
8.3 (4.0)
|
A reflected cross-site scripting (XSS) vulnerability w… |
misp |
misp |
2025-12-10T13:46:07.170083Z | 2025-12-10T13:46:07.170083Z |
| GCVE-1-2025-0035 |
8.3 (4.0)
|
Insufficient sanitization of bundle metadata (availabl… |
CIRCL |
vulnerability-lookup |
2025-12-08T10:25:00.000Z | 2025-12-08T12:14:06.307298Z |
| GCVE-1-2025-0034 |
7 (4.0)
|
Missing CSRF protection on state-changing endpoints in… |
CIRCL |
vulnerability-lookup |
2025-12-08T10:19:00.000Z | 2025-12-08T12:13:24.197294Z |
| GCVE-1-2025-0033 |
8.1 (4.0)
|
Vulnerability-lookup did not track or limit failed One… |
CIRCL |
vulnerability-lookup |
2025-12-08T10:11:00.000Z | 2025-12-08T12:12:53.235996Z |
| GCVE-1-2025-0032 |
10 (4.0)
|
The default configuration of WatchGuard Firebox device… |
watchguard |
firebox |
2025-12-03T16:25:00.000Z | 2025-12-19T13:48:34.570799Z |
| GCVE-1-2025-0031 |
7.1 (4.0)
|
A cross-site scripting (XSS) vulnerability was identif… |
misp |
misp |
2025-12-03T10:58:00.000Z | 2025-12-16T09:36:09.594750Z |
| GCVE-1-2025-0030 |
6.2 (4.0)
|
A cross-site scripting (XSS) vulnerability in the MISP… |
misp |
misp |
2025-12-03T10:53:00.000Z | 2025-12-03T10:58:55.845341Z |
| GCVE-1-2025-0029 |
6.3 (4.0)
|
Reflected cross-site scripting (XSS) vulnerabilities i… |
misp |
misp |
2025-11-27T12:41:00.000Z | 2025-11-27T12:48:51.085860Z |
| GCVE-1-2025-0028 |
8.5 (4.0)
|
Information leakage vulnerability in the MISP Feed con… |
misp |
misp |
2025-11-27T07:23:00.000Z | 2025-12-02T08:51:35.429494Z |
| GCVE-1-2025-0027 |
9.4 (4.0)
|
Reflected cross-site scripting (XSS) vulnerability in … |
misp |
misp |
2025-11-27T07:17:00.000Z | 2025-12-02T08:51:04.323899Z |
| GCVE-1-2025-0026 |
9.4 (4.0)
|
Reflected cross-site scripting (XSS) vulnerability in … |
misp |
misp |
2025-11-26T16:35:00.000Z | 2025-12-02T08:50:46.381572Z |
| GCVE-1-2025-0025 |
9.4 (4.0)
|
Reflected cross-site scripting (XSS) vulnerability in … |
misp |
misp |
2025-11-26T16:27:00.000Z | 2025-12-02T08:50:18.897756Z |
| GCVE-1-2025-0024 |
9.4 (4.0)
|
cross-site scripting (XSS) vulnerability in the MISP s… |
misp |
misp |
2025-11-26T16:14:00.000Z | 2025-12-02T08:50:01.482327Z |
| GCVE-1-2025-0023 |
9.4 (4.0)
|
XSS in MISP server comparison tool |
misp |
misp |
2025-11-26T16:10:00.000Z | 2025-12-02T08:49:24.626168Z |
| GCVE-1-2025-0022 |
9.4 (4.0)
|
Clarified setting's impact on download_attachments_on_load |
misp |
misp |
2025-11-26T16:04:00.000Z | 2025-12-02T08:49:04.510294Z |
| GCVE-1-2025-0021 |
9.4 (4.0)
|
XSS in MISP ReST client in HTML view |
misp |
misp |
2025-11-26T15:55:00.000Z | 2025-12-02T08:48:41.869838Z |
| GCVE-1-2025-0020 |
9.4 (4.0)
|
cross-site scripting (XSS) in Galaxy element JSON view |
misp |
misp |
2025-11-26T15:49:00.000Z | 2025-12-02T08:47:41.151429Z |
| GCVE-1-2025-0019 |
4 (4.0)
|
Path traversal vulnerability in EventReport for site-admin |
misp |
misp |
2025-11-26T14:47:00.000Z | 2025-11-28T07:27:42.721350Z |
| GCVE-1-2025-0018 |
9.4 (4.0)
|
HTML injection issue was identified in Lookyloo’s web … |
lookyloo |
lookyloo |
2025-11-18T15:33:00.000Z | 2025-11-18T20:39:45.579295Z |
| GCVE-1-2025-0017 |
9.4 (4.0)
|
Privilege escalation in Cerebrate allows an authentica… |
cerebrate |
cerebrate |
2025-11-12T08:15:00.000Z | 2025-11-28T07:22:08.205835Z |
| GCVE-1-2025-0016 |
6 (4.0)
|
Local file inclusion in [ImportFromUrl() URL hand… |
misp |
misp |
2025-11-04T09:20:00.000Z | 2025-11-04T09:56:38.383646Z |