Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-41118 |
9.1 (3.1)
|
Sensitive COS `SecretKey` exposed in plaintext via con… |
Grafana |
Pyroscope |
2026-04-15T19:15:17.689Z | 2026-04-15T19:33:10.329Z |
| CVE-2026-33877 |
3.7 (3.1)
|
ApostropheCMS: User Enumeration via Timing Side Channe… |
apostrophecms |
apostrophe |
2026-04-15T19:11:06.796Z | 2026-04-15T19:30:53.040Z |
| CVE-2026-6384 |
7.3 (3.1)
|
Gimp: gimp: arbitrary code execution or denial of serv… |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-04-15T19:09:10.587Z | 2026-04-16T03:56:19.004Z |
| CVE-2026-6364 |
N/A
|
Out of bounds read in Skia in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:59.385Z | 2026-04-15T19:04:59.385Z |
| CVE-2026-6319 |
N/A
|
Use after free in Payments in Google Chrome on An… |
Google |
Chrome |
2026-04-15T19:04:58.945Z | 2026-04-16T03:55:43.103Z |
| CVE-2026-6318 |
N/A
|
Use after free in Codecs in Google Chrome prior t… |
Google |
Chrome |
2026-04-15T19:04:58.495Z | 2026-04-16T03:55:44.565Z |
| CVE-2026-6363 |
8.8 (3.1)
|
Type Confusion in V8 in Google Chrome prior to 14… |
Google |
Chrome |
2026-04-15T19:04:57.982Z | 2026-04-16T03:55:45.999Z |
| CVE-2026-6317 |
8.8 (3.1)
|
Use after free in Cast in Google Chrome prior to … |
Google |
Chrome |
2026-04-15T19:04:57.557Z | 2026-04-16T03:55:47.518Z |
| CVE-2026-6362 |
N/A
|
Use after free in Codecs in Google Chrome prior t… |
Google |
Chrome |
2026-04-15T19:04:57.143Z | 2026-04-15T19:04:57.143Z |
| CVE-2026-6361 |
7.2 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome o… |
Google |
Chrome |
2026-04-15T19:04:56.740Z | 2026-04-16T03:56:15.725Z |
| CVE-2026-6316 |
8.8 (3.1)
|
Use after free in Forms in Google Chrome prior to… |
Google |
Chrome |
2026-04-15T19:04:56.345Z | 2026-04-16T03:55:49.002Z |
| CVE-2026-6315 |
8.8 (3.1)
|
Use after free in Permissions in Google Chrome on… |
Google |
Chrome |
2026-04-15T19:04:55.935Z | 2026-04-16T03:55:50.553Z |
| CVE-2026-6314 |
8.3 (3.1)
|
Out of bounds write in GPU in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:55.460Z | 2026-04-16T03:56:07.922Z |
| CVE-2026-6313 |
3.1 (3.1)
|
Insufficient policy enforcement in CORS in Google… |
Google |
Chrome |
2026-04-15T19:04:54.889Z | 2026-04-15T20:00:40.125Z |
| CVE-2026-6312 |
3.1 (3.1)
|
Insufficient policy enforcement in Passwords in G… |
Google |
Chrome |
2026-04-15T19:04:54.385Z | 2026-04-15T19:59:44.768Z |
| CVE-2026-6311 |
8.3 (3.1)
|
Uninitialized Use in Accessibility in Google Chro… |
Google |
Chrome |
2026-04-15T19:04:53.973Z | 2026-04-16T03:56:12.695Z |
| CVE-2026-6310 |
8.3 (3.1)
|
Use after free in Dawn in Google Chrome prior to … |
Google |
Chrome |
2026-04-15T19:04:53.589Z | 2026-04-16T03:56:06.808Z |
| CVE-2026-6360 |
8.8 (3.1)
|
Use after free in FileSystem in Google Chrome pri… |
Google |
Chrome |
2026-04-15T19:04:53.135Z | 2026-04-16T03:56:09.052Z |
| CVE-2026-6309 |
8.3 (3.1)
|
Use after free in Viz in Google Chrome prior to 1… |
Google |
Chrome |
2026-04-15T19:04:52.730Z | 2026-04-16T03:56:05.365Z |
| CVE-2026-6308 |
N/A
|
Out of bounds read in Media in Google Chrome prio… |
Google |
Chrome |
2026-04-15T19:04:52.265Z | 2026-04-16T03:56:10.209Z |
| CVE-2026-6307 |
8.8 (3.1)
|
Type Confusion in Turbofan in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:51.835Z | 2026-04-16T03:55:59.049Z |
| CVE-2026-6306 |
N/A
|
Heap buffer overflow in PDFium in Google Chrome p… |
Google |
Chrome |
2026-04-15T19:04:51.372Z | 2026-04-16T03:56:11.556Z |
| CVE-2026-6305 |
8.8 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome p… |
Google |
Chrome |
2026-04-15T19:04:50.926Z | 2026-04-16T03:56:17.490Z |
| CVE-2026-6304 |
8.3 (3.1)
|
Use after free in Graphite in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:50.503Z | 2026-04-16T03:56:03.915Z |
| CVE-2026-6303 |
N/A
|
Use after free in Codecs in Google Chrome prior t… |
Google |
Chrome |
2026-04-15T19:04:50.052Z | 2026-04-16T03:56:02.470Z |
| CVE-2026-6302 |
8.8 (3.1)
|
Use after free in Video in Google Chrome prior to… |
Google |
Chrome |
2026-04-15T19:04:49.608Z | 2026-04-16T03:56:00.581Z |
| CVE-2026-6301 |
8.8 (3.1)
|
Type Confusion in Turbofan in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:49.077Z | 2026-04-16T03:55:57.939Z |
| CVE-2026-6300 |
8.8 (3.1)
|
Use after free in CSS in Google Chrome prior to 1… |
Google |
Chrome |
2026-04-15T19:04:48.606Z | 2026-04-16T03:55:56.815Z |
| CVE-2026-6359 |
8.8 (3.1)
|
Use after free in Video in Google Chrome on Windo… |
Google |
Chrome |
2026-04-15T19:04:48.203Z | 2026-04-16T03:55:55.574Z |
| CVE-2026-6358 |
8.8 (3.1)
|
Use after free in XR in Google Chrome on Android … |
Google |
Chrome |
2026-04-15T19:04:47.677Z | 2026-04-16T03:55:54.349Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-6361 |
7.2 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome o… |
Google |
Chrome |
2026-04-15T19:04:56.740Z | 2026-04-16T03:56:15.725Z |
| CVE-2026-6360 |
8.8 (3.1)
|
Use after free in FileSystem in Google Chrome pri… |
Google |
Chrome |
2026-04-15T19:04:53.135Z | 2026-04-16T03:56:09.052Z |
| CVE-2026-6359 |
8.8 (3.1)
|
Use after free in Video in Google Chrome on Windo… |
Google |
Chrome |
2026-04-15T19:04:48.203Z | 2026-04-16T03:55:55.574Z |
| CVE-2026-6358 |
8.8 (3.1)
|
Use after free in XR in Google Chrome on Android … |
Google |
Chrome |
2026-04-15T19:04:47.677Z | 2026-04-16T03:55:54.349Z |
| CVE-2026-6319 |
N/A
|
Use after free in Payments in Google Chrome on An… |
Google |
Chrome |
2026-04-15T19:04:58.945Z | 2026-04-16T03:55:43.103Z |
| CVE-2026-6318 |
N/A
|
Use after free in Codecs in Google Chrome prior t… |
Google |
Chrome |
2026-04-15T19:04:58.495Z | 2026-04-16T03:55:44.565Z |
| CVE-2026-6317 |
8.8 (3.1)
|
Use after free in Cast in Google Chrome prior to … |
Google |
Chrome |
2026-04-15T19:04:57.557Z | 2026-04-16T03:55:47.518Z |
| CVE-2026-6316 |
8.8 (3.1)
|
Use after free in Forms in Google Chrome prior to… |
Google |
Chrome |
2026-04-15T19:04:56.345Z | 2026-04-16T03:55:49.002Z |
| CVE-2026-6315 |
8.8 (3.1)
|
Use after free in Permissions in Google Chrome on… |
Google |
Chrome |
2026-04-15T19:04:55.935Z | 2026-04-16T03:55:50.553Z |
| CVE-2026-6314 |
8.3 (3.1)
|
Out of bounds write in GPU in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:55.460Z | 2026-04-16T03:56:07.922Z |
| CVE-2026-6313 |
3.1 (3.1)
|
Insufficient policy enforcement in CORS in Google… |
Google |
Chrome |
2026-04-15T19:04:54.889Z | 2026-04-15T20:00:40.125Z |
| CVE-2026-6312 |
3.1 (3.1)
|
Insufficient policy enforcement in Passwords in G… |
Google |
Chrome |
2026-04-15T19:04:54.385Z | 2026-04-15T19:59:44.768Z |
| CVE-2026-6311 |
8.3 (3.1)
|
Uninitialized Use in Accessibility in Google Chro… |
Google |
Chrome |
2026-04-15T19:04:53.973Z | 2026-04-16T03:56:12.695Z |
| CVE-2026-6310 |
8.3 (3.1)
|
Use after free in Dawn in Google Chrome prior to … |
Google |
Chrome |
2026-04-15T19:04:53.589Z | 2026-04-16T03:56:06.808Z |
| CVE-2026-6309 |
8.3 (3.1)
|
Use after free in Viz in Google Chrome prior to 1… |
Google |
Chrome |
2026-04-15T19:04:52.730Z | 2026-04-16T03:56:05.365Z |
| CVE-2026-6308 |
N/A
|
Out of bounds read in Media in Google Chrome prio… |
Google |
Chrome |
2026-04-15T19:04:52.265Z | 2026-04-16T03:56:10.209Z |
| CVE-2026-6307 |
8.8 (3.1)
|
Type Confusion in Turbofan in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:51.835Z | 2026-04-16T03:55:59.049Z |
| CVE-2026-6306 |
N/A
|
Heap buffer overflow in PDFium in Google Chrome p… |
Google |
Chrome |
2026-04-15T19:04:51.372Z | 2026-04-16T03:56:11.556Z |
| CVE-2026-6305 |
8.8 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome p… |
Google |
Chrome |
2026-04-15T19:04:50.926Z | 2026-04-16T03:56:17.490Z |
| CVE-2026-6304 |
8.3 (3.1)
|
Use after free in Graphite in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:50.503Z | 2026-04-16T03:56:03.915Z |
| CVE-2026-6303 |
N/A
|
Use after free in Codecs in Google Chrome prior t… |
Google |
Chrome |
2026-04-15T19:04:50.052Z | 2026-04-16T03:56:02.470Z |
| CVE-2026-6302 |
8.8 (3.1)
|
Use after free in Video in Google Chrome prior to… |
Google |
Chrome |
2026-04-15T19:04:49.608Z | 2026-04-16T03:56:00.581Z |
| CVE-2026-6301 |
8.8 (3.1)
|
Type Confusion in Turbofan in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:49.077Z | 2026-04-16T03:55:57.939Z |
| CVE-2026-6300 |
8.8 (3.1)
|
Use after free in CSS in Google Chrome prior to 1… |
Google |
Chrome |
2026-04-15T19:04:48.606Z | 2026-04-16T03:55:56.815Z |
| CVE-2026-6299 |
8.8 (3.1)
|
Use after free in Prerender in Google Chrome prio… |
Google |
Chrome |
2026-04-15T19:04:47.116Z | 2026-04-16T03:55:53.177Z |
| CVE-2026-6298 |
4.3 (3.1)
|
Heap buffer overflow in Skia in Google Chrome pri… |
Google |
Chrome |
2026-04-15T19:04:46.537Z | 2026-04-15T20:25:53.459Z |
| CVE-2026-6297 |
8.3 (3.1)
|
Use after free in Proxy in Google Chrome prior to… |
Google |
Chrome |
2026-04-15T19:04:46.102Z | 2026-04-16T03:55:52.024Z |
| CVE-2026-6296 |
9.6 (3.1)
|
Heap buffer overflow in ANGLE in Google Chrome pr… |
Google |
Chrome |
2026-04-15T19:04:45.229Z | 2026-04-16T03:56:14.151Z |
| CVE-2026-40919 |
6.1 (3.1)
|
Gimp: gimp: denial of service via specially crafted se… |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-04-15T18:59:16.272Z | 2026-04-15T20:01:40.521Z |
| CVE-2026-40918 |
5.5 (3.1)
|
Gimp: gimp: denial of service via crafted pvr image file |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-04-15T18:59:14.823Z | 2026-04-15T18:59:14.823Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-mvj2-3qfg-7mxp |
8.8 (3.1)
|
Type Confusion in V8 in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentia… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-m8qq-h68v-7p42 |
8.8 (3.1)
|
Use after free in Cast in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execut… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-j7wg-hx8x-r38h |
8.8 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed a remote attacker t… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-hmgp-8pgg-h7pp |
8.8 (3.1)
|
Use after free in Permissions in Google Chrome on Android prior to 147.0.7727.101 allowed a remote … | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-hh8m-xqf2-mgfv |
8.8 (3.1)
|
Use after free in FileSystem in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to … | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-gjmf-r9m5-967q |
8.8 (3.1)
|
Use after free in XR in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker … | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-g6hr-fwwc-8cg8 |
7.8 (3.1)
8.5 (4.0)
|
Barracuda RMM versions prior to 2025.2.2 contain a privilege escalation vulnerability that allows l… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-fmvf-422w-w34q |
|
Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to exec… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-f4mv-qxg4-7wq3 |
|
Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to pote… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-6r59-54c6-3757 |
8.8 (3.1)
|
Use after free in Forms in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execu… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-5hwj-hjjc-gm39 |
8.8 (3.1)
|
Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to ex… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-4hx4-54fm-qc8q |
|
Use after free in Payments in Google Chrome on Android prior to 147.0.7727.101 allowed a remote att… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-3m3g-56cx-59q7 |
8.8 (3.1)
|
Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to ex… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-2rw5-37w7-549x |
8.8 (3.1)
|
Use after free in Video in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attack… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-xcqw-9mv2-wqj3 |
5.0 (3.1)
|
A flaw was found in GIMP. A stack buffer overflow vulnerability in the TIM image loader's 4BPP deco… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-vhp9-v4r9-mxwj |
9.6 (3.1)
|
Heap buffer overflow in ANGLE in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-vcp6-gxf9-8g4m |
8.4 (3.1)
|
IdentityIQ 8.5, all IdentityIQ 8.5 patch levels prior to 8.5p2, IdentityIQ 8.4, and all IdentityIQ … | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-qh6q-mfp5-q5wr |
5.5 (3.1)
|
A flaw was found in GIMP. Processing a specially crafted PVR image file with large dimensions can l… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-pfc6-jxgq-cf62 |
8.3 (3.1)
|
Use after free in Proxy in Google Chrome prior to 147.0.7727.101 allowed an attacker in a privilege… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-p5x9-j974-rpfp |
3.3 (3.1)
|
--- title: Cross-Tenant Legacy Correlation Disclosure and Deletion draft: false hero: image: /sta… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-m9hq-h476-h2g8 |
9.1 (3.1)
|
Pyroscope is an open-source continuous profiling database. The database supports various storage ba… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-j6cv-3w8p-vrg8 |
5.4 (3.1)
|
A flaw was found in KubeVirt's Role-Based Access Control (RBAC) evaluation logic. The authorization… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-g672-w7xh-qp9j |
5.5 (3.1)
|
A flaw was found in the System Security Services Daemon (SSSD). The pam_passkey_child_read_data() f… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-9w25-v364-3jpm |
8.8 (3.1)
|
Use after free in CSS in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:19Z |
| ghsa-856r-6q67-9x29 |
5.0 (3.1)
|
A flaw was found in GIMP. This vulnerability, a heap buffer over-read in the `icns_slurp()` functio… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-7x7j-88hg-3j82 |
6.1 (3.1)
|
A flaw was found in GIMP. This vulnerability, a buffer overflow in the `file-seattle-filmworks` plu… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-4gcp-x7jh-x4v7 |
9.2 (4.0)
|
CWE-798: Use of Hard-coded Credentials in Sonatype Nexus Repository Manager versions 3.0.0 through … | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-4f9g-vrx9-f8cq |
5.5 (3.1)
|
A flaw was found in GIMP. A remote attacker could exploit an integer overflow vulnerability in the … | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-497x-rrr9-68jp |
5.3 (3.1)
|
The CVE-2021-36156 fix validates the namespace parameter for path traversal sequences after a singl… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-3p5h-985r-gw4g |
4.3 (3.1)
|
Heap buffer overflow in Skia in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to … | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2025-3 |
|
Published in 2019, the autodzee package is a Python library that bypasses Deezer API rest… | autodzee | 2025-02-26T20:54:20+00:00 | |
| pysec-2025-4 |
|
Published in 2019, the automslc package is a Python library that bypasses Deezer API rest… | automslc | 2025-02-26T19:26:49+00:00 | |
| pysec-2025-18 |
|
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craf… | picklescan | 2025-02-26T15:15:24+00:00 | 2025-04-09T17:27:26.867210+00:00 |
| pysec-2025-31 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper handles AugAssign statemen… | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.116292+00:00 |
| pysec-2025-30 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Multiple evaluation of a single … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.064106+00:00 |
| pysec-2025-29 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper `sqrt()` builtin uses the … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.005382+00:00 |
| pysec-2025-62 |
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Mal… | vllm | 2025-02-07T20:15:34+00:00 | 2025-07-01T23:22:49.083695+00:00 |
| pysec-2025-28 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.772920+00:00 |
| pysec-2025-27 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.711157+00:00 |
| pysec-2025-26 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.645758+00:00 |
| pysec-2025-58 |
8.8 (3.1)
|
vLLM is a library for LLM inference and serving. vllm/model_executor/weight_utils.py impl… | vllm | 2025-01-27T18:15:41+00:00 | 2025-06-27T21:22:36.583615+00:00 |
| pysec-2025-2 |
|
uniapi version 1.0.7 introduces code that would execute on import of the module and downl… | uniapi | 2025-01-24T19:56:53+00:00 | |
| pysec-2025-12 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2025-01-21T15:15:13+00:00 | 2025-04-08T10:23:23.899726+00:00 |
| pysec-2025-1 |
|
An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2… | django | 2025-01-14T19:15:32+00:00 | 2025-01-14T21:22:18.665005+00:00 |
| pysec-2025-33 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. When the Vyper Compiler uses the… | vyper | 2025-01-14T18:16:05+00:00 | 2025-04-23T21:23:01.322686+00:00 |
| pysec-2024-158 |
|
Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when … | djoser | 2024-12-13T05:15:07+00:00 | 2025-01-14T05:22:11.856636+00:00 |
| pysec-2024-154 |
8.6 (3.1)
8.7 (4.0)
|
Ultralytics has identified a supply chain attack affecting affecting multiple versions of… | ultralytics | 2024-12-10T19:20:27.097505+00:00 | |
| pysec-2024-159 |
|
Versions of the package luigi before 3.6.0 are vulnerable to Arbitrary File Write via Arc… | luigi | 2024-12-10T05:15:07+00:00 | 2025-01-14T05:22:17.204098+00:00 |
| pysec-2024-157 |
|
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2… | django | 2024-12-06T12:15:18+00:00 | 2025-01-14T05:22:11.817473+00:00 |
| pysec-2024-156 |
|
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2… | django | 2024-12-06T12:15:17+00:00 | 2025-01-14T05:22:11.736011+00:00 |
| pysec-2024-256 |
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2024-12-03T16:15:24+00:00 | 2025-06-27T17:22:53.325430+00:00 |
| pysec-2024-161 |
|
Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R packag… | pyarrow | 2024-11-28T17:15:48+00:00 | 2025-01-14T05:22:20.554292+00:00 |
| pysec-2024-152 |
|
aiocpa is a user-facing library for generating color gradients of text. Version 0.1.13 in… | aiocpa | 2024-11-25T19:30:00+00:00 | |
| pysec-2024-224 |
7.0 (3.1)
|
Excessive directory permissions in MLflow leads to local privilege escalation when using … | mlflow | 2024-11-25T14:15:06+00:00 | 2025-02-03T16:23:40.409646+00:00 |
| pysec-2024-187 |
9.8 (3.1)
|
virtualenv before 20.26.6 allows command injection through the activation scripts for a v… | virtualenv | 2024-11-24T16:15:06+00:00 | 2025-01-19T04:23:01.784352+00:00 |
| pysec-2024-229 |
8.8 (3.1)
|
Hugging Face Transformers Trax Model Deserialization of Untrusted Data Remote Code Execut… | transformers | 2024-11-22T22:15:07+00:00 | 2025-02-10T23:22:41.499413+00:00 |
| pysec-2024-228 |
8.8 (3.1)
|
Hugging Face Transformers MaskFormer Model Deserialization of Untrusted Data Remote Code … | transformers | 2024-11-22T22:15:07+00:00 | 2025-02-10T23:22:41.449105+00:00 |
| pysec-2024-227 |
8.8 (3.1)
|
Hugging Face Transformers MobileViTV2 Deserialization of Untrusted Data Remote Code Execu… | transformers | 2024-11-22T22:15:06+00:00 | 2025-02-10T23:22:41.399021+00:00 |
| pysec-2024-178 |
7.5 (3.1)
|
Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to version 2… | litestar | 2024-11-20T21:15:08+00:00 | 2025-01-19T01:52:23.772726+00:00 |
| pysec-2024-160 |
6.1 (3.1)
|
lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.cle… | lxml-html-clean | 2024-11-19T22:15:21+00:00 | 2025-01-14T05:22:17.244267+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2651 | Malicious code in one-translations (npm) | 2026-04-14T11:47:11Z | 2026-04-14T11:47:12Z |
| mal-2026-2655 | Malicious code in tailwind-lines-clamp (npm) | 2026-04-14T11:38:14Z | 2026-04-14T11:38:15Z |
| mal-2026-2636 | Malicious code in seaport-core-16 (npm) | 2026-04-14T11:37:00Z | 2026-04-14T11:37:08Z |
| mal-2026-2635 | Malicious code in pubnub-element (npm) | 2026-04-14T11:37:00Z | 2026-04-14T11:37:01Z |
| mal-2026-2633 | Malicious code in markdownlint-rule-link-pattern (npm) | 2026-04-14T11:37:00Z | 2026-04-14T11:37:00Z |
| mal-2026-2631 | Malicious code in babel-plugin-blocks (npm) | 2026-04-14T11:37:00Z | 2026-04-14T11:37:00Z |
| mal-2026-2632 | Malicious code in magentaa11y (npm) | 2026-04-14T11:31:05Z | 2026-04-14T11:31:12Z |
| mal-2026-2634 | Malicious code in percy-cake-docker (npm) | 2026-04-14T11:31:04Z | 2026-04-14T11:31:05Z |
| mal-2026-2630 | Malicious code in gate-apis (PyPI) | 2026-04-14T10:23:40Z | 2026-04-14T10:23:40Z |
| mal-2026-2629 | Malicious code in stacks-editor (npm) | 2026-04-14T08:55:57Z | 2026-04-14T08:55:57Z |
| mal-2026-2628 | Malicious code in svchost (PyPI) | 2026-04-14T05:42:26Z | 2026-04-14T05:42:26Z |
| mal-2026-2627 | Malicious code in pckg-sv (PyPI) | 2026-04-14T05:35:20Z | 2026-04-14T05:35:20Z |
| mal-2026-2626 | Malicious code in getcardslib (npm) | 2026-04-14T00:07:56Z | 2026-04-14T00:07:56Z |
| mal-2026-2625 | Malicious code in robase-install (PyPI) | 2026-04-13T22:03:44Z | 2026-04-13T22:03:45Z |
| mal-2026-2624 | Malicious code in asciitoart (PyPI) | 2026-04-13T21:26:29Z | 2026-04-13T22:22:34Z |
| mal-2026-2623 | Malicious code in hive-setting (PyPI) | 2026-04-13T16:27:32Z | 2026-04-13T16:27:32Z |
| mal-2026-2588 | Malicious code in @lamoda/seller-ui-kit (npm) | 2026-04-13T15:45:21Z | 2026-04-13T15:45:22Z |
| mal-2026-2619 | Malicious code in upstartloans (npm) | 2026-04-13T15:33:49Z | 2026-04-13T15:33:49Z |
| mal-2026-2618 | Malicious code in upstartdr (npm) | 2026-04-13T15:33:49Z | 2026-04-13T15:33:55Z |
| mal-2026-2616 | Malicious code in upstartapplicationstatus (npm) | 2026-04-13T15:33:49Z | 2026-04-13T15:33:49Z |
| mal-2026-2613 | Malicious code in upstart-offer-container (npm) | 2026-04-13T15:33:49Z | 2026-04-13T15:33:49Z |
| mal-2026-2620 | Malicious code in upstartportal (npm) | 2026-04-13T15:33:48Z | 2026-04-13T15:33:49Z |
| mal-2026-2615 | Malicious code in upstartadmindashboard- (npm) | 2026-04-13T15:33:48Z | 2026-04-13T15:33:48Z |
| mal-2026-2614 | Malicious code in upstart.previewcss (npm) | 2026-04-13T15:33:48Z | 2026-04-13T15:33:48Z |
| mal-2026-2612 | Malicious code in upstart-loan-status (npm) | 2026-04-13T15:33:48Z | 2026-04-13T15:33:49Z |
| mal-2026-2621 | Malicious code in walmart-internal (npm) | 2026-04-13T15:33:47Z | 2026-04-13T15:33:47Z |
| mal-2026-2617 | Malicious code in upstartautoretailadmin (npm) | 2026-04-13T15:33:47Z | 2026-04-13T15:33:48Z |
| mal-2026-2611 | Malicious code in upstart-lending-status (npm) | 2026-04-13T15:33:47Z | 2026-04-13T15:33:48Z |
| mal-2026-2597 | Malicious code in @zgny/onboarding-consumer (npm) | 2026-04-13T15:25:22Z | 2026-04-13T15:25:30Z |
| mal-2026-2596 | Malicious code in @spreadjs/js-calc (npm) | 2026-04-13T15:25:22Z | 2026-04-13T15:25:30Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0821 | Keycloak: Mehrere Schwachstellen | 2026-03-22T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0818 | etcd: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2026-03-22T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0816 | Apache ActiveMQ Artemis: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-22T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0790 | Linux Kernel: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0787 | Keycloak: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0785 | libarchive: Schwachstelle ermöglicht Denial of Service | 2026-03-18T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0782 | WebKitGTK: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0781 | Drupal Automated Logout Extension: Schwachstelle ermöglicht Manipulation von Dateien | 2026-03-18T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0775 | nghttp2: Schwachstelle ermöglicht Denial of Service | 2026-03-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0769 | Red Hat Enterprise Linux (capstone) und OpenShift (rhcos): Mehrere Schwachstellen | 2026-03-17T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0764 | Grafana Tempo: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0761 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Denial of Service | 2026-03-17T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0760 | Xen und Citrix Systems XenServer: Mehrere Schwachstellen | 2026-03-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0756 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Privilegieneskalation und Offenlegung von Informationen | 2026-03-16T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0744 | ImageMagick: Schwachstelle ermöglicht Denial of Service | 2026-03-16T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0743 | OpenClaw: Mehrere Schwachstellen | 2026-03-16T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0736 | NetBox: Schwachstelle ermöglicht Cross-Site Scripting | 2026-03-16T23:00:00.000+00:00 | 2026-03-17T23:00:00.000+00:00 |
| wid-sec-w-2026-0734 | GNU InetUtils: Mehrere Schwachstellen | 2026-03-15T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0733 | libexpat: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-03-15T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0729 | OpenSSL: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-15T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0727 | OpenClaw: Mehrere Schwachstellen | 2026-03-15T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0725 | FreeRDP: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0723 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-03-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0720 | systemd: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0716 | OpenSSH GSSAPI delta: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-03-12T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0711 | OpenClaw: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0705 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2026-03-11T23:00:00.000+00:00 | 2026-03-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0704 | Google Cloud Platform Envoy Proxy, Istio und Service Mesh: Mehrere Schwachstellen | 2026-03-11T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0695 | GNU libc: Schwachstelle ermöglicht Denial of Service | 2026-03-11T23:00:00.000+00:00 | 2026-03-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0692 | Mattermost MS Teams plugin: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-03-10T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-050-02 | Valmet DNA Engineering Web Tools | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-050-01 | EnOcean SmartServer IoT | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-048-04 | Honeywell HIB2PI CCTV Camera (Update B) | 2026-02-17T07:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-048-03 | GE Vernova Enervista UR Setup | 2026-02-17T07:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-048-02 | Delta Electronics ASDA-Soft | 2026-02-17T07:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-043-10 | Airleader Master | 2026-02-12T07:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-076-02 | Schneider Electric SCADAPack and RemoteConnect | 2026-02-10T08:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-055-02 | Schneider Electric EcoStruxure Building Operation Workstation | 2026-02-10T08:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsma-26-041-01 | ZOLL ePCR IOS Mobile Application | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-04 | AVEVA PI to CONNECT Agent | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-03 | AVEVA PI Data Archive | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-02 | ZLAN Information Technology Co. ZLAN5143D | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-01 | Yokogawa FAST/TOOLS | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-048-01 | Siemens Simcenter Femap and Nastran | 2026-02-10T00:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-043-08 | Siemens NX | 2026-02-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-043-07 | Siemens Siveillance Video Management Servers | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-05 | Siemens Solid Edge | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-04 | Siemens Desigo CC Product Family and SENTRON Powermanager | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-02 | Siemens Polarion | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-01 | Siemens SINEC NMS | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-036-04 | Ilevia EVE X1 Server | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-03 | o6 Automation GmbH Open62541 | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-02 | Mitsubishi Electric MELSEC iQ-R Series | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-01 | TP-Link Systems Inc. VIGI Series IP Camera | 2026-02-05T06:00:00.000000Z | 2026-02-11T06:00:00.000000Z |
| icsa-26-034-04 | Synectix LAN 232 TRIO | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-03 | RISS SRL MOMA Seismic Station | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-02 | *Avation Light Engine Pro * | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-01 | Mitsubishi Electric FREQSHIP-mini for Windows | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-029-03 | Rockwell Automation ControlLogix | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-26-029-02 | Rockwell Automation ArmorStart LT | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-n3kn9k_aci_lldp_dos-ndgrrra3 | Cisco NX-OS Software Link Layer Discovery Protocol Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-apic-dos-rnus8efw | Cisco Application Policy Infrastructure Controller Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-wsa-archive-bypass-scx2e8zf | Cisco Secure Web Appliance Real-Time Scanning Archive File Bypass Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-20T21:08:47+00:00 |
| cisco-sa-tce-roomos-dos-9v9jrc2q | Cisco TelePresence Collaboration Endpoint Software and RoomOS Software Denial of Service Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-12T17:37:39+00:00 |
| cisco-sa-pi-xss-byevkcd | Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-epnm-pi-redirect-6sx82dn | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Open Redirect Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-cmm-file-up-ky47n8kk | Cisco Meeting Management Arbitrary File Upload Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-voice-rce-morhqy4b | Cisco Unified Communications Products Remote Code Execution Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-02-13T15:21:01+00:00 |
| cisco-sa-ucce-pcce-xss-2jvyg3ud | Cisco Packaged Contact Center Enterprise and Cisco Unified Contact Center Enterprise Cross-Site Scripting Vulnerabilities | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-intersight-privesc-p6tbm6jk | Cisco Intersight Virtual Appliance Privilege Escalation Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-iec6400-pem5uq7v | Cisco IEC6400 Wireless Backhaul Edge Compute Software SSH Denial of Service Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-ise-xss-9tdh2kx | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-ise-xss-964cdxw5 | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-epnm-pi-stored-xss-gekx8ywk | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-snort3-dcerpc-vulns-j9hnf4th | Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities | 2026-01-07T16:00:00+00:00 | 2026-02-10T20:42:07+00:00 |
| cisco-sa-ise-xxe-jwsbsdkt | Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability | 2026-01-07T16:00:00+00:00 | 2026-01-07T16:00:00+00:00 |
| cisco-sa-sma-attack-n9bf4 | Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager | 2025-12-17T16:00:00+00:00 | 2026-01-15T16:01:43+00:00 |
| cisco-sa-react-flight-tyw32ddb | Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 | 2025-12-04T16:00:00+00:00 | 2025-12-17T22:37:17+00:00 |
| cisco-sa-privesc-catc-ryjreelu | Cisco Catalyst Center Privilege Escalation Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-dnac-xss-wextvz59 | Cisco Catalyst Center Cross-Site Scripting Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-dnac-ci-zwlqvswt | Cisco Catalyst Center REST API Command Injection Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-catc-priv-esc-vs8eecux | Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-catc-open-redirect-3w5bk3je | Cisco Catalyst Center Virtual Appliance HTTP Open Redirect Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-ise-radsupress-dos-8yf3jthh | Cisco Identity Services Engine RADIUS Suppression Denial of Service Vulnerability | 2025-11-05T16:00:00+00:00 | 2025-11-05T16:00:00+00:00 |
| cisco-sa-ise-multiple-vulns-o9beswjh | Cisco Identity Services Engine Reflected Cross-Site Scripting and Information Disclosure Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-12-04T14:23:54+00:00 |
| cisco-sa-cc-unauth-rce-qen8h7mq | Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-11-13T12:48:42+00:00 |
| cisco-sa-cc-mult-vuln-gk4tfxsn | Multiple Cisco Contact Center Products Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-11-18T14:49:09+00:00 |
| cisco-sa-snort3-mime-vulns-ttl8pgvh | Multiple Cisco Products Snort 3 MIME Denial of Service Vulnerabilities | 2025-10-15T16:00:00+00:00 | 2026-02-12T18:38:13+00:00 |
| cisco-sa-roomos-inf-disc-qggsbxam | Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-phone-dos-fpyjlv7a | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-32157 | Remote Desktop Client Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32156 | Windows UPnP Device Host Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32155 | Desktop Window Manager Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32154 | Desktop Window Manager Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32153 | Windows Speech Runtime Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32152 | Desktop Window Manager Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32151 | Windows Shell Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32150 | Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32149 | Windows Hyper-V Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32093 | Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32091 | Microsoft Brokering File System Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32090 | Windows Speech Brokered Api Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32089 | Windows Speech Brokered Api Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32088 | Windows Biometric Service Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32087 | Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32086 | Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32085 | Remote Procedure Call Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32084 | Windows Print Spooler Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32083 | Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32082 | Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32081 | Package Catalog Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32080 | Windows WalletService Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32079 | Web Account Manager Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32078 | Windows Projected File System Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32077 | Windows UPnP Device Host Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32076 | Windows Storage Spaces Controller Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32075 | Windows UPnP Device Host Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32074 | Windows Projected File System Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32073 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32072 | Active Directory Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0061 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2026-02-11T11:34:50.888067Z | 2026-02-11T11:34:50.888067Z |
| ncsc-2026-0060 | Kwetsbaarheden verholpen in Fortinet FortiSandbox, FortiAuthenticator en FortiClient | 2026-02-11T11:34:36.684955Z | 2026-02-11T11:34:36.684955Z |
| ncsc-2026-0059 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2026-02-11T08:16:27.583936Z | 2026-03-10T14:20:48.176282Z |
| ncsc-2026-0058 | Kwetsbaarheden verholpen in Microsoft Office | 2026-02-10T19:11:42.825147Z | 2026-02-10T19:11:42.825147Z |
| ncsc-2026-0057 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-02-10T19:08:27.878305Z | 2026-02-10T19:08:27.878305Z |
| ncsc-2026-0056 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2026-02-10T19:07:16.028511Z | 2026-02-10T19:07:16.028511Z |
| ncsc-2026-0055 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-02-10T19:05:45.729972Z | 2026-02-10T19:05:45.729972Z |
| ncsc-2026-0054 | Kwetsbaarheid verholpen in Microsoft Exchange | 2026-02-10T19:04:51.366294Z | 2026-02-10T19:04:51.366294Z |
| ncsc-2026-0053 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-02-10T19:01:45.561771Z | 2026-02-10T19:01:45.561771Z |
| ncsc-2026-0052 | Kwetsbaarheden verholpen in SAP producten | 2026-02-10T12:28:40.531069Z | 2026-02-10T12:28:40.531069Z |
| ncsc-2026-0051 | Kwetsbaarheden verholpen in Siemens producten | 2026-02-10T12:27:40.637581Z | 2026-02-10T12:27:40.637581Z |
| ncsc-2026-0050 | Kwetsbaarheid verholpen in PEAR | 2026-02-09T10:41:43.856342Z | 2026-02-09T10:41:43.856342Z |
| ncsc-2026-0049 | Kwetsbaarheden verholpen in n8n | 2026-02-09T10:39:40.792744Z | 2026-02-09T10:39:40.792744Z |
| ncsc-2026-0048 | Kwetsbaarheid verholpen in BeyondTrust Remote Support | 2026-02-09T10:27:57.867529Z | 2026-02-13T12:54:32.614217Z |
| ncsc-2026-0047 | Kwetsbaarheid verholpen in Fortinet FortiClient EMS | 2026-02-09T10:16:18.048622Z | 2026-03-30T11:36:22.656910Z |
| ncsc-2026-0046 | Kwetsbaarheden verholpen in Samsung mobile | 2026-02-09T07:48:28.751473Z | 2026-02-09T07:48:28.751473Z |
| ncsc-2026-0045 | Kwetsbaarheid verholpen in Cisco Meeting Management | 2026-02-06T09:22:16.831778Z | 2026-02-06T09:22:16.831778Z |
| ncsc-2026-0044 | Kwetsbaarheid verholpen in Cisco TelePresence Collaboration Endpoint | 2026-02-06T09:20:11.629058Z | 2026-02-06T09:20:11.629058Z |
| ncsc-2026-0043 | Zeroday-kwetsbaarheden verholpen in Ivanti Endpoint Manager Mobile | 2026-01-29T19:15:04.575371Z | 2026-02-20T14:47:02.047999Z |
| ncsc-2026-0042 | Kwetsbaarheden verholpen in SolarWinds Web Help Desk | 2026-01-28T16:37:21.114054Z | 2026-02-02T09:47:54.857445Z |
| ncsc-2026-0041 | Kwetsbaarheid verholpen in Fortinet producten | 2026-01-28T09:32:41.752905Z | 2026-01-28T09:32:41.752905Z |
| ncsc-2026-0040 | Kwetsbaarheid verholpen in SmarterTools SmarterMail | 2026-01-27T10:51:39.476320Z | 2026-02-06T09:25:57.008166Z |
| ncsc-2026-0039 | ZeroDay kwetsbaarheid verholpen in Microsoft Office | 2026-01-27T07:27:52.867415Z | 2026-01-27T07:27:52.867415Z |
| ncsc-2026-0038 | Kwetsbaarheid verholpen in BIND 9 | 2026-01-23T08:54:43.506215Z | 2026-01-23T08:54:43.506215Z |
| ncsc-2026-0037 | Kwetsbaarheden verholpen in GitLab Community Edition en Enterprise Edition | 2026-01-22T12:35:30.505659Z | 2026-01-22T12:35:30.505659Z |
| ncsc-2026-0036 | Kwetsbaarheden verholpen in Cisco Unified Communications producten | 2026-01-22T09:49:39.156365Z | 2026-01-22T09:49:39.156365Z |
| ncsc-2026-0035 | Kwetsbaarheid verholpen in Palo Alto Networks PAN-OS | 2026-01-22T09:22:36.433609Z | 2026-01-22T09:22:36.433609Z |
| ncsc-2026-0034 | Kwetsbaarheden verholpen in Atlassian producten | 2026-01-22T09:03:42.667958Z | 2026-01-22T09:03:42.667958Z |
| ncsc-2026-0033 | Kwetsbaarheid verholpen in GNU Inetutils telnetd | 2026-01-21T14:15:46.424529Z | 2026-01-21T14:15:46.424529Z |
| ncsc-2026-0032 | Kwetsbaarheden verholpen in Oracle MySQL | 2026-01-21T10:12:24.844869Z | 2026-01-21T10:12:24.844869Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10437-1 | libnghttp2-14-1.68.1-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10436-1 | freeipmi-1.6.17-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10435-1 | cpp-httplib-devel-0.38.0-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10434-1 | chromedriver-146.0.7680.164-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10433-1 | LibVNCServer-devel-0.9.15-2.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10419-1 | rclone-1.73.3-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10418-1 | python311-jsonpath-ng-1.8.0-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10417-1 | python311-deepdiff-8.6.2-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10416-1 | python313-PyMuPDF-1.27.2.2-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10415-1 | glances-common-4.5.2-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10414-1 | perl-Crypt-URandom-0.550.0-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10413-1 | firefox-esr-140.9.0-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10406-1 | lemon-3.51.3-1.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10405-1 | python314-3.14.3-3.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10404-1 | python310-3.10.20-2.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10403-1 | python311-pypdf-6.9.1-1.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10402-1 | python311-PyPDF2-2.11.1-8.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10401-1 | freeciv-3.2.4-1.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10400-1 | chromedriver-146.0.7680.153-2.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10399-1 | GraphicsMagick-1.3.46-4.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10398-1 | python311-3.11.15-3.1 on GA media | 2026-03-20T00:00:00Z | 2026-03-20T00:00:00Z |
| opensuse-su-2026:10397-1 | python311-PyJWT-2.12.1-1.1 on GA media | 2026-03-20T00:00:00Z | 2026-03-20T00:00:00Z |
| opensuse-su-2026:10396-1 | openbao-2.5.1-1.1 on GA media | 2026-03-20T00:00:00Z | 2026-03-20T00:00:00Z |
| opensuse-su-2026:10395-1 | qemu-10.2.2-1.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10394-1 | python313-3.13.12-2.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10393-1 | python311-pyasn1-0.6.3-1.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10392-1 | python311-pyOpenSSL-26.0.0-1.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10391-1 | GraphicsMagick-1.3.46-3.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10390-1 | tempo-cli-2.10.3-1.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:10389-1 | python311-salt-3006.0-56.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:7302 | Red Hat Security Advisory: nodejs:22 security update | 2026-04-09T13:04:58+00:00 | 2026-04-14T07:28:26+00:00 |
| rhsa-2026:6565 | Red Hat Security Advisory: OpenShift Container Platform 4.20.18 security and extras update | 2026-04-09T12:37:01+00:00 | 2026-04-10T15:33:35+00:00 |
| rhsa-2026:7292 | Red Hat Security Advisory: freerdp security update | 2026-04-09T12:12:02+00:00 | 2026-04-09T14:38:14+00:00 |
| rhsa-2026:6492 | Red Hat Security Advisory: OpenShift Container Platform 4.12.87 bug fix and security update | 2026-04-09T11:24:01+00:00 | 2026-04-09T14:38:09+00:00 |
| rhsa-2026:6493 | Red Hat Security Advisory: OpenShift Container Platform 4.12.87 bug fix and security update | 2026-04-09T11:02:04+00:00 | 2026-04-14T07:59:35+00:00 |
| rhsa-2026:7259 | Red Hat Security Advisory: git-lfs security update | 2026-04-09T09:55:16+00:00 | 2026-04-14T07:28:03+00:00 |
| rhsa-2026:7244 | Red Hat Security Advisory: python3.12 security update | 2026-04-09T09:06:16+00:00 | 2026-04-13T00:22:08+00:00 |
| rhsa-2026:6552 | Red Hat Security Advisory: OpenShift Container Platform 4.18.37 packages and security update | 2026-04-09T08:35:05+00:00 | 2026-04-13T14:47:03+00:00 |
| rhsa-2026:6553 | Red Hat Security Advisory: OpenShift Container Platform 4.18.37 bug fix and security update | 2026-04-09T08:27:05+00:00 | 2026-04-09T14:38:11+00:00 |
| rhsa-2026:6554 | Red Hat Security Advisory: OpenShift Container Platform 4.18.37 bug fix and security update | 2026-04-09T07:52:48+00:00 | 2026-04-14T07:59:35+00:00 |
| rhsa-2026:6555 | Red Hat Security Advisory: OpenShift Container Platform 4.18.37 security and extras update | 2026-04-09T07:15:48+00:00 | 2026-04-10T15:33:34+00:00 |
| rhsa-2026:7123 | Red Hat Security Advisory: nodejs:22 security update | 2026-04-08T18:17:58+00:00 | 2026-04-14T07:28:14+00:00 |
| rhsa-2026:7128 | Red Hat Security Advisory: RHACS 4.9.5 security and bug fix update | 2026-04-08T17:43:53+00:00 | 2026-04-13T12:42:42+00:00 |
| rhsa-2026:7106 | Red Hat Security Advisory: libarchive security update | 2026-04-08T17:01:18+00:00 | 2026-04-09T20:37:33+00:00 |
| rhsa-2026:7105 | Red Hat Security Advisory: libarchive security update | 2026-04-08T16:59:33+00:00 | 2026-04-09T20:37:33+00:00 |
| rhsa-2026:7107 | Red Hat Security Advisory: openssh security update | 2026-04-08T16:43:28+00:00 | 2026-04-09T23:07:40+00:00 |
| rhsa-2026:7110 | Red Hat Security Advisory: RHACS 4.8.10 security and bug fix update | 2026-04-08T16:37:57+00:00 | 2026-04-13T12:42:42+00:00 |
| rhsa-2026:7100 | Red Hat Security Advisory: kernel-rt security update | 2026-04-08T15:45:13+00:00 | 2026-04-13T07:08:53+00:00 |
| rhsa-2026:7093 | Red Hat Security Advisory: libarchive security update | 2026-04-08T14:29:28+00:00 | 2026-04-09T20:37:33+00:00 |
| rhsa-2026:7081 | Red Hat Security Advisory: libtiff security update | 2026-04-08T14:09:08+00:00 | 2026-04-09T20:37:08+00:00 |
| rhsa-2026:7010 | Red Hat Security Advisory: python3.12 security update | 2026-04-08T14:07:33+00:00 | 2026-04-13T00:22:08+00:00 |
| rhsa-2026:7080 | Red Hat Security Advisory: nodejs22 security update | 2026-04-08T13:58:58+00:00 | 2026-04-14T07:28:07+00:00 |
| rhsa-2026:7011 | Red Hat Security Advisory: grafana security update | 2026-04-08T13:36:08+00:00 | 2026-04-14T07:28:29+00:00 |
| rhsa-2026:7009 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-08T13:35:28+00:00 | 2026-04-14T07:28:30+00:00 |
| rhsa-2026:7035 | Red Hat Security Advisory: libpng12 security update | 2026-04-08T12:41:42+00:00 | 2026-04-09T14:38:04+00:00 |
| rhsa-2026:7052 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.0.14 | 2026-04-08T12:26:52+00:00 | 2026-04-14T09:46:57+00:00 |
| rhsa-2026:7013 | Red Hat Security Advisory: kernel security update | 2026-04-08T12:16:32+00:00 | 2026-04-13T07:08:53+00:00 |
| rhsa-2026:7032 | Red Hat Security Advisory: libpng12 security update | 2026-04-08T12:15:17+00:00 | 2026-04-09T14:38:03+00:00 |
| rhsa-2026:7033 | Red Hat Security Advisory: libpng12 security update | 2026-04-08T12:14:27+00:00 | 2026-04-09T14:38:03+00:00 |
| rhsa-2026:7034 | Red Hat Security Advisory: libpng12 security update | 2026-04-08T12:04:23+00:00 | 2026-04-09T14:38:03+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2024-317-03 | Modicon Controllers M340 / Momentum / MC80 | 2024-11-12T05:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2024-317-04 | EcoStruxure™ IT Gateway | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-317-02 | Modicon Controllers M340 / Momentum / MC80 & EcoStruxure™ Control Expert | 2024-11-12T00:00:00.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2024-317-01 | PowerLogic PM5300 Series | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-282-05 | EcoStruxure™ Power Monitoring Expert (PME) | 2024-10-08T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2024-282-08 | EcoStruxure EV Charging Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-07 | System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-06 | Zelio Soft 2 | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-04 | EVlink Home Smart and Schneider Charge | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-03 | Easergy Studio | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-02 | Harmony iPC – HMIBSC IIoT Edge Box Core | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-01 | Data Center Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-254-02 | EcoStruxure™ Power Monitoring Expert and EcoStruxure™ Power Operation or EcoStruxure™ Power SCADA Operation with Advanced Reporting and Dashboards | 2024-09-10T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2024-254-01 | Vijeo Designer | 2024-09-10T00:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2024-226-02 | EcoStruxure™ Machine SCADA Expert / BLUE Open Studio | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2024-226-01 | Accutech Manager | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2024-191-04 | Modicon Controllers M241/ M251, M258 / LMC058 and M262 | 2024-07-09T00:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2024-191-03 | EcoStruxure Foxboro SCADA FoxRTU Station | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-191-02 | EcoStruxureTM Foxboro DCS Core Control Services | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-191-01 | Wiser Home Controller WHC-5918A | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-163-05 | SAGE RTU | 2024-06-11T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-163-04 | SpaceLogic AS-P and AS-B Automation Servers | 2024-06-11T00:00:00.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2024-163-03 | EVlink Home Smart | 2024-06-11T00:00:00.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2024-163-02 | PowerLogic P5 | 2024-06-11T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2024-163-01 | Modicon M340, Modbus/TCP Ethernet Modicon M340 module, and Modbus/TCP Ethernet Modicon M340 FactoryCast module | 2024-06-11T00:00:00.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2024-100-01 | Easergy Studio | 2024-04-09T00:00:00.000Z | 2024-04-09T00:00:00.000Z |
| sevd-2024-072-01 | Easergy T200 Multiple Vulnerabilities | 2024-03-12T07:02:04.000Z | 2024-03-12T07:02:04.000Z |
| sevd-2024-072-02 | EcoStruxure Power Design - Ecodial | 2024-03-12T05:00:00.000Z | 2024-03-12T05:00:00.000Z |
| sevd-2024-044-01 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon M340, M580 and M580 Safety PLCs | 2024-02-13T12:41:43.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2024-044-03 | EcoStruxure IT Gateway | 2024-02-13T12:21:44.000Z | 2024-02-13T12:21:44.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2020-0002 | Vulnerabilities in SICK Package Analytics | 2020-08-07T10:00:00.000Z | 2020-07-28T10:00:00.000Z |
| sca-2020-0001 | Security Information Regarding "Profile Programming" | 2020-05-31T10:00:00.000Z | 2020-05-31T10:00:00.000Z |
| sca-2019-0002 | Vulnerability in SICK FX0-GENT00000 and SICK FX0-GPNT00000 | 2019-09-20T10:00:00.000Z | 2019-09-20T10:00:00.000Z |
| sca-2019-0001 | MSC800 affected by hard-coded credentials vulnerability | 2019-06-21T10:00:00.000Z | 2019-06-21T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-978177 | SSA-978177: Vulnerability in Nozomi Guardian/CMC Before 25.4.0 on RUGGEDCOM APE1808 Devices | 2025-08-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-693808 | SSA-693808: Deserialization Vulnerability in Siemens Engineering Platforms | 2025-08-12T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-613116 | SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1 | 2025-08-12T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-517338 | SSA-517338: Multiple Vulnerabilities in SINEC Traffic Analyzer Before V3.0 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-493396 | SSA-493396: Deserialization Vulnerability in Siemens Engineering Platforms | 2025-08-12T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-355557 | SSA-355557: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.2 | 2025-08-12T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-282044 | SSA-282044: DLL Hijacking Vulnerability in Siemens Web Installer used by the Online Software Delivery | 2025-08-12T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-186293 | SSA-186293: XML External Entity (XXE) Injection Vulnerability in SIMOTION SCOUT, SIMOTION SCOUT TIA and SINAMICS STARTER | 2025-08-12T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-938066 | SSA-938066: Remote Code Execution Vulnerability in SENTRON Powermanager and Desigo CC | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-904646 | SSA-904646: Sensitive Data Exposure Vulnerability in SIPROTEC 5 Devices | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-183963 | SSA-183963: Certificate Validation Vulnerabilities in SICAM TOOLBOX II Before V07.11 | 2025-07-08T00:00:00Z | 2025-07-18T00:00:00Z |
| ssa-083019 | SSA-083019: Multiple Vulnerabilities in RUGGEDCOM ROS Devices | 2025-07-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-693776 | SSA-693776: Multiple Vulnerabilities in Industrial Communication Devices based on SINEC OS before V3.2 | 2025-06-10T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-513708 | SSA-513708: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices | 2025-06-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-345750 | SSA-345750: Default Credentials in Energy Services Using Elspec G5DFR | 2025-06-10T00:00:00Z | 2025-06-16T00:00:00Z |
| ssa-082556 | SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 | 2025-06-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-367714 | SSA-367714: Improper Integrity Check of Firmware Updates in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2025-05-23T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-864900 | SSA-864900: Multiple Vulnerabilities in Fortigate NGFW on RUGGEDCOM APE1808 Devices | 2025-05-13T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-794185 | SSA-794185: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SIPROTEC, SICAM and Related Products | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-726617 | SSA-726617: Incorrect Privilege Assignment Vulnerability in Mendix OIDC SSO Module | 2025-05-13T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-614723 | SSA-614723: Denial of Service Vulnerabilities in User Management Component (UMC) | 2025-05-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-301229 | SSA-301229: Client-Side Enforcement of Server-Side Security Vulnerabilities in RUGGEDCOM ROX II | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-817234 | SSA-817234: Multiple Kubernetes Ingress NGINX Controller Vulnerabilities in Insights Hub Private Cloud | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-525431 | SSA-525431: Privilege Escalation Vulnerabilities in Siemens License Server Before V4.3 | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-920092 | SSA-920092: Memory Corruption Vulnerability in Simcenter Femap | 2025-03-13T00:00:00Z | 2025-03-13T00:00:00Z |
| ssa-858251 | SSA-858251: Authentication Bypass Vulnerabilities in OPC UA | 2025-03-11T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-216014 | SSA-216014: Vulnerabilities in EFI variable of SIMATIC IPCs, SIMATIC Tablet PCs, and SIMATIC Field PGs | 2025-03-11T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-073066 | SSA-073066: Multiple Vulnerabilities in SINEMA Remote Connect Server Before V3.2 SP3 | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-050438 | SSA-050438: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and Tecnomatix Plant Simulation | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-770770 | SSA-770770: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.7 on RUGGEDCOM APE1808 Devices | 2025-02-11T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1251-1 | Security update for cockpit-podman | 2026-04-10T11:36:50Z | 2026-04-10T11:36:50Z |
| suse-su-2026:1250-1 | Security update for cockpit-tukit | 2026-04-10T11:36:40Z | 2026-04-10T11:36:40Z |
| suse-su-2026:1249-1 | Security update for cockpit-machines | 2026-04-10T11:36:32Z | 2026-04-10T11:36:32Z |
| suse-su-2026:21021-1 | Security update for python-cryptography | 2026-04-10T11:26:32Z | 2026-04-10T11:26:32Z |
| suse-su-2026:1247-1 | Security update for nghttp2 | 2026-04-10T10:34:43Z | 2026-04-10T10:34:43Z |
| suse-su-2026:1248-1 | Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T09:13:03Z | 2026-04-10T09:13:03Z |
| suse-su-2026:21020-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-04-10T08:14:40Z | 2026-04-10T08:14:40Z |
| suse-su-2026:1244-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2026-04-10T08:04:54Z | 2026-04-10T08:04:54Z |
| suse-su-2026:1242-1 | Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T07:04:48Z | 2026-04-10T07:04:48Z |
| suse-su-2026:21019-1 | Security update for glibc | 2026-04-10T06:44:31Z | 2026-04-10T06:44:31Z |
| suse-su-2026:1239-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise 15 SP6) | 2026-04-09T19:04:33Z | 2026-04-09T19:04:33Z |
| suse-su-2026:1237-1 | Security update for the Linux Kernel (Live Patch 47 for SUSE Linux Enterprise 15 SP4) | 2026-04-09T17:04:59Z | 2026-04-09T17:04:59Z |
| suse-su-2026:21018-1 | Security update for ovmf | 2026-04-09T15:10:40Z | 2026-04-09T15:10:40Z |
| suse-su-2026:1236-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6) | 2026-04-09T14:22:32Z | 2026-04-09T14:22:32Z |
| suse-su-2026:21091-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21090-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21061-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21060-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21089-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21088-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21059-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21058-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21087-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| suse-su-2026:21086-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| suse-su-2026:21057-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| suse-su-2026:21056-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| suse-su-2026:21085-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21084-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21083-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21082-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:4728 | Important: libpng security update | 2026-03-17T00:00:00Z | 2026-03-19T12:37:34Z |
| alsa-2026:4723 | Moderate: kernel security update | 2026-03-17T00:00:00Z | 2026-03-19T14:50:26Z |
| alsa-2026:4717 | Moderate: opencryptoki security update | 2026-03-17T00:00:00Z | 2026-03-19T15:03:25Z |
| alsa-2026:4715 | Moderate: vim security update | 2026-03-17T00:00:00Z | 2026-03-20T07:17:19Z |
| alsa-2026:4713 | Moderate: python3.12 security update | 2026-03-17T00:00:00Z | 2026-03-19T14:56:58Z |
| alsa-2026:4705 | Moderate: nginx security update | 2026-03-17T00:00:00Z | 2026-03-19T12:47:53Z |
| alsa-2026:4672 | Important: container-tools:rhel8 security update | 2026-03-17T00:00:00Z | 2026-03-17T10:17:22Z |
| alsa-2026:4649 | Moderate: grub2 security update | 2026-03-16T00:00:00Z | 2026-03-19T15:01:35Z |
| alsa-2026:4648 | Moderate: grub2 security update | 2026-03-16T00:00:00Z | 2026-03-17T10:24:06Z |
| alsa-2026:4629 | Important: libvpx security update | 2026-03-16T00:00:00Z | 2026-03-19T12:45:22Z |
| alsa-2026:4473 | Moderate: python3.11 security update | 2026-03-12T00:00:00Z | 2026-03-19T12:33:18Z |
| alsa-2026:4472 | Moderate: compat-openssl11 security update | 2026-03-12T00:00:00Z | 2026-03-16T16:49:36Z |
| alsa-2026:4463 | Moderate: python3.12 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:03:59Z |
| alsa-2026:4458 | Important: .NET 10.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:14:44Z |
| alsa-2026:4456 | Important: .NET 9.0 security update | 2026-03-12T00:00:00Z | 2026-03-16T16:41:08Z |
| alsa-2026:4455 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:11:49Z |
| alsa-2026:4454 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:17:27Z |
| alsa-2026:4453 | Important: .NET 10.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:32:40Z |
| alsa-2026:4451 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:34:29Z |
| alsa-2026:4450 | Important: .NET 9.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:36:54Z |
| alsa-2026:4447 | Important: libvpx security update | 2026-03-12T00:00:00Z | 2026-03-16T16:46:00Z |
| alsa-2026:4445 | Important: .NET 10.0 security update | 2026-03-12T00:00:00Z | 2026-03-16T16:52:17Z |
| alsa-2026:4443 | Important: .NET 9.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:01:07Z |
| alsa-2026:4442 | Moderate: vim security update | 2026-03-12T00:00:00Z | 2026-03-12T14:47:41Z |
| alsa-2026:4306 | Important: mingw-libpng security update | 2026-03-11T00:00:00Z | 2026-03-13T12:35:26Z |
| alsa-2026:4235 | Moderate: nginx:1.26 security update | 2026-03-10T00:00:00Z | 2026-03-11T11:13:12Z |
| alsa-2026:4216 | Moderate: python3.11 security update | 2026-03-10T00:00:00Z | 2026-03-13T09:19:57Z |
| alsa-2026:4188 | Moderate: gnutls security update | 2026-03-10T00:00:00Z | 2026-03-13T09:21:59Z |
| alsa-2026:4177 | Important: opentelemetry-collector security update | 2026-03-10T00:00:00Z | 2026-03-13T09:23:39Z |
| alsa-2026:4174 | Important: opentelemetry-collector security update | 2026-03-10T00:00:00Z | 2026-03-11T17:46:34Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2026-86 | Security exception in java.base/java.util.Arrays.copyOfRange | 2026-01-18T00:18:18.214799Z | 2026-01-18T00:18:18.215108Z |
| osv-2025-1061 | Security exception in org.apache.poi.hssf.record.aggregates.SharedValueManager$SharedFormulaGroup.<ini | 2026-01-18T00:03:40.245475Z | 2026-01-21T14:26:21.135983Z |
| osv-2026-74 | Heap-buffer-overflow in ___interceptor_strtol | 2026-01-17T00:19:48.575833Z | 2026-01-17T00:19:48.576151Z |
| osv-2026-57 | Heap-buffer-overflow in mkv::matroska_segment_c::TrackInit | 2026-01-15T00:19:47.203374Z | 2026-01-15T00:19:47.203695Z |
| osv-2026-55 | Use-of-uninitialized-value in vp9_quantize_fp_avx2 | 2026-01-15T00:19:29.465463Z | 2026-01-15T00:19:29.465794Z |
| osv-2026-54 | Heap-use-after-free in _dwarf_exec_frame_instr | 2026-01-15T00:17:17.477757Z | 2026-01-15T00:17:17.478056Z |
| osv-2026-53 | Heap-use-after-free in graph::LigatureSubstFormat1::shrink | 2026-01-15T00:16:26.117926Z | 2026-01-15T00:16:26.118291Z |
| osv-2026-49 | Heap-buffer-overflow in check_sync_pes | 2026-01-15T00:11:33.030721Z | 2026-01-15T00:11:33.030957Z |
| osv-2026-44 | UNKNOWN READ in MP4_TrackSeek | 2026-01-14T00:20:29.876694Z | 2026-01-14T00:20:29.877019Z |
| osv-2026-36 | Heap-buffer-overflow in iTUNTripletCallback | 2026-01-13T00:01:43.125437Z | 2026-01-13T00:01:43.125952Z |
| osv-2026-30 | Use-of-uninitialized-value in vp9_quantize_fp_avx2 | 2026-01-11T00:08:32.391680Z | 2026-01-11T00:08:32.392050Z |
| osv-2026-21 | Use-of-uninitialized-value in processTLSBlock | 2026-01-09T00:20:25.200679Z | 2026-01-09T00:20:25.201303Z |
| osv-2026-2 | Heap-buffer-overflow in cmt_mpack_consume_uint_tag | 2026-01-03T00:15:15.907754Z | 2026-01-03T00:15:15.908130Z |
| osv-2025-1049 | Heap-buffer-overflow in unsigned char* std::__1::vector<unsigned char, std::__1::allocator<unsigned char | 2025-12-31T00:18:06.669541Z | 2025-12-31T00:18:06.670109Z |
| osv-2025-1039 | UNKNOWN WRITE in fuzz_regexp | 2025-12-29T00:18:31.417791Z | 2025-12-29T00:18:31.418390Z |
| osv-2025-1020 | Heap-buffer-overflow in mmcall | 2025-12-25T00:17:49.020029Z | 2025-12-25T00:17:49.020471Z |
| osv-2025-1018 | Stack-buffer-overflow in lre_exec | 2025-12-25T00:02:56.807884Z | 2025-12-25T00:02:56.808867Z |
| osv-2025-1016 | Use-of-uninitialized-value in js_create_function | 2025-12-24T00:15:30.844439Z | 2025-12-24T00:15:30.844983Z |
| osv-2025-1004 | Security exception in com.code_intelligence.jazzer.sanitizers.RegexInjection.hookInternal | 2025-12-21T00:18:27.214786Z | 2025-12-21T00:18:27.215115Z |
| osv-2025-1001 | Dynamic-stack-buffer-overflow in _ox_err_set_with_location | 2025-12-21T00:04:56.743119Z | 2025-12-21T00:04:56.743638Z |
| osv-2025-994 | Heap-buffer-overflow in rx_icmp | 2025-12-18T00:00:43.710332Z | 2025-12-21T14:32:46.078182Z |
| osv-2025-989 | Bad-cast to UT_hash_bucket' (aka 'struct UT_hash_bucket')password_file__cleanup | 2025-12-17T00:01:12.806838Z | 2025-12-17T00:01:12.807184Z |
| osv-2025-983 | Dynamic-stack-buffer-overflow in _ox_err_set_with_location | 2025-12-14T00:14:21.963982Z | 2025-12-14T00:14:21.964726Z |
| osv-2025-970 | Heap-buffer-overflow in check_sync_pes | 2025-12-05T00:18:22.703657Z | 2025-12-05T00:18:22.704029Z |
| osv-2025-965 | Stack-use-after-scope in Assimp::FBX::FBXExportProperty::FBXExportProperty | 2025-12-04T00:10:11.975493Z | 2025-12-04T00:10:11.975920Z |
| osv-2025-959 | Heap-buffer-overflow in re_parse_term | 2025-11-29T00:18:54.036831Z | 2025-11-29T00:18:54.037236Z |
| osv-2025-955 | Use-of-uninitialized-value in decoder_context::construct_reference_picture_lists | 2025-11-29T00:15:46.812919Z | 2025-11-29T00:15:46.813402Z |
| osv-2025-938 | Use-of-uninitialized-value in comp_func_SourceOver_avx2 | 2025-11-23T00:03:38.943405Z | 2025-11-23T00:03:38.943780Z |
| osv-2025-932 | Heap-use-after-free in password_file__cleanup | 2025-11-22T00:01:32.642847Z | 2025-11-22T00:01:32.643269Z |
| osv-2025-926 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.statement | 2025-11-21T00:05:31.621567Z | 2025-11-21T00:05:31.621958Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0032 | `dnp3times` was removed from crates.io due to malicious code | 2026-03-04T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0031 | `time_calibrators` was removed from crates.io due to malicious code | 2026-03-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0030 | `time_calibrator` was removed from crates.io due to malicious code | 2026-03-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0047 | PKCS7_verify Signature Validation Bypass in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0046 | PKCS7_verify Certificate Chain Validation Bypass in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0045 | Timing Side-Channel in AES-CCM Tag Verification in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0043 | Timing Side-Channel in AES-CCM Tag Verification in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0029 | Double-free and use-after-free for Hive | 2026-02-26T12:00:00Z | 2026-03-01T06:01:36Z |
| rustsec-2026-0028 | `tracing_checks` was removed from crates.io for transitively including malicious code | 2026-02-26T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0027 | `tracings` was removed from crates.io for malicious code | 2026-02-26T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0022 | Panic when dropping a `[Typed]Func::call_async` future | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0021 | Panic adding excessive fields to a `wasi:http/types.fields` instance | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0020 | Guest-controlled resource exhaustion in WASI implementations | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0019 | `tracing-check` was removed from crates.io for malicious code | 2026-02-24T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0018 | `rpc-check` was removed from crates.io for malicious code | 2026-02-24T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0017 | `clob-sdk` was removed from crates.io for malicious code | 2026-02-20T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0016 | `polymarkets-rs-clob-client` was removed from crates.io for malicious code | 2026-02-20T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0015 | `polymarkets-client-sdk` was removed from crates.io for malicious code | 2026-02-19T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0014 | `rpc-check` was removed from crates.io for malicious code | 2026-02-19T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0013 | Type confusion when accessing data from sublasses of subclasses of native types with `abi3` feature targeting Python 3.12 and up | 2026-02-18T12:00:00Z | 2026-02-23T07:15:28Z |
| rustsec-2026-0011 | `polymarket-client-sdks` was removed from crates.io for malicious code | 2026-02-13T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0012 | Unsoundness in opt-in ARMv8 assembly backend for `keccak` | 2026-02-12T12:00:00Z | 2026-02-20T04:00:15Z |
| rustsec-2026-0070 | Panic When Opening or Sealing on Export-Only Context | 2026-02-11T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0069 | Incorrect Length Encoding on KDF Export | 2026-02-11T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0025 | Panic in `libcrux-psq` on decryption of malformed AES-GCM ciphertext | 2026-02-08T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0010 | `polymarket-clients-sdk` was removed from crates.io for malicious code | 2026-02-06T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0071 | Nonce Reuse in HPKE Context | 2026-02-05T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0026 | Unnecessary clamping of seed reduces seed entropy to 251 bits | 2026-02-05T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0009 | Denial of Service via Stack Exhaustion | 2026-02-05T12:00:00Z | 2026-02-06T09:12:16Z |
| rustsec-2026-0072 | Missing Check for All-Zero X25519 Shared Secret | 2026-02-04T12:00:00Z | 2026-03-24T08:16:07Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-activemq-2026-33227 | Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ Web, Apache ActiveMQ: Improper Limitation of a Pathname to a Restricted Classpath Directory | 2026-04-09T08:36:51.132Z | 2026-04-09T09:13:50.652Z |
| bit-cassandra-2026-27315 | Apache Cassandra: cqlsh history sensitive information leak | 2026-04-09T08:36:45.141Z | 2026-04-10T09:26:18.172Z |
| bit-parse-2026-35200 | Parse Server has a file upload Content-Type override via extension mismatch | 2026-04-08T14:51:33.993Z | 2026-04-08T15:15:28.618Z |
| bit-discourse-2026-34947 | Discourse: Staged user custom fields are exposed on public invite pages | 2026-04-08T14:45:19.092Z | 2026-04-08T15:15:28.618Z |
| bit-discourse-2026-27481 | Discourse: Hidden tag visibility bypass on tag routes | 2026-04-08T14:43:31.143Z | 2026-04-08T15:15:28.618Z |
| bit-jupyterhub-2026-33709 | JupyterHub has an Open Redirect Vulnerability | 2026-04-08T08:40:42.508Z | 2026-04-08T09:14:18.943Z |
| bit-discourse-2026-33415 | Discourse: Improper Access Control in discourse-ai Allows Unauthorized Category Content Exposure | 2026-04-07T08:44:29.473Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33300 | Discourse: Hidden group names and access metadata are exposed to moderators through the `category-chatables` endpoint | 2026-04-07T08:44:13.358Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33185 | Discourse: Group SMTP test endpoint susceptible to SSRF | 2026-04-07T08:44:07.641Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33074 | Discourse: Vulnerability in discourse-subscriptions plugin allowing users to self-grant to higher tier subscriptions | 2026-04-07T08:44:05.677Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33073 | discourse-subscriptions plugin leaking stripe API key in multisite environment | 2026-04-07T08:44:03.688Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32951 | Discourse: Authorization bypass in oneboxer via user-controlled category id | 2026-04-07T08:44:01.614Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32620 | Discourse: Missing post-level authorization allows whisper metadata disclosure | 2026-04-07T08:43:59.465Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32619 | Discourse: Insufficient topic visibility check allows unauthorized poll manipulation in private categories | 2026-04-07T08:43:57.232Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32618 | Discourse: Unauthorized channel membership inference via excluded_memberships_channel_id | 2026-04-07T08:43:55.159Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32615 | Discourse: Category group moderators can perform actions on topics in restricted categories without read access | 2026-04-07T08:43:53.093Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32607 | Discourse: Stored XSS via unescaped assignee name | 2026-04-07T08:43:50.897Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32273 | Discourse: XSS on category description update via API | 2026-04-07T08:43:48.997Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32243 | Discourse: Stored XSS in discourse-ai shared conversations onebox | 2026-04-07T08:43:46.857Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32143 | Discourse: Admin-only report can be exported by moderators | 2026-04-07T08:43:44.810Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32113 | Discourse: Open redirect via `sso_destination_url` cookie in `enter` | 2026-04-07T08:43:40.581Z | 2026-04-07T09:14:25.218Z |
| bit-parse-2026-34784 | Parse Server: Streaming file download bypasses afterFind file trigger authorization | 2026-04-06T14:49:38.726Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34595 | Parse Server: LiveQuery protected-field guard bypass via array-like logical operator value | 2026-04-06T14:49:36.710Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34574 | Parse Server: Session field immutability bypass via falsy-value guard | 2026-04-06T14:49:34.810Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34573 | Parse Server: GraphQL complexity validator exponential fragment traversal DoS | 2026-04-06T14:49:33.069Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34532 | Parse Server: Cloud function validator bypass via prototype chain traversal | 2026-04-06T14:49:31.298Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34373 | Parse Server: GraphQL API endpoint ignores CORS origin restriction | 2026-04-06T14:49:29.676Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34363 | Parse Server: LiveQuery protected field leak via shared mutable state across concurrent subscribers | 2026-04-06T14:49:27.983Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34224 | Parse Server: MFA single-use token bypass via concurrent authData login requests | 2026-04-06T14:49:26.245Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34215 | Parse Server: Auth data exposed via verify password endpoint | 2026-04-06T14:49:24.609Z | 2026-04-06T15:13:09.641Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-bd18029 | Docker CLI for Windows searches for plugin binaries in C:\\\\\\\\ProgramData\\\\\\\\Docker\\\\\\\\cli-plugins, a directory that does not exist by default | 2026-04-09T00:45:07.480117Z | 2026-04-08T09:49:10Z |
| cleanstart-2026-nv37937 | Docker CLI for Windows searches for plugin binaries in C:\\\\\\\\ProgramData\\\\\\\\Docker\\\\\\\\cli-plugins, a directory that does not exist by default | 2026-04-09T00:44:07.747698Z | 2026-04-08T09:58:55Z |
| cleanstart-2026-ly88807 | Docker CLI for Windows searches for plugin binaries in C:\\\\\\\\ProgramData\\\\\\\\Docker\\\\\\\\cli-plugins, a directory that does not exist by default | 2026-04-09T00:43:37.430373Z | 2026-04-08T10:02:31Z |
| cleanstart-2026-ku98579 | gRPC-Go is the Go language implementation of gRPC | 2026-04-09T00:42:07.643397Z | 2026-04-08T10:07:21Z |
| cleanstart-2026-iw23933 | gRPC-Go is the Go language implementation of gRPC | 2026-04-09T00:42:07.594705Z | 2026-04-08T10:12:34Z |
| cleanstart-2026-fz55932 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-04-09T00:41:07.286953Z | 2026-04-08T10:10:33Z |
| cleanstart-2026-af52025 | In libexpat before 2 | 2026-04-08T00:39:48.013620Z | 2026-04-07T05:54:38Z |
| cleanstart-2026-pd43534 | In libexpat before 2 | 2026-04-08T00:39:47.879615Z | 2026-04-07T05:54:38Z |
| cleanstart-2026-mp09743 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-08T00:37:59.326932Z | 2026-04-07T05:54:38Z |
| cleanstart-2026-bb02574 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-08T00:37:58.971684Z | 2026-04-07T05:54:38Z |
| cleanstart-2026-fu47971 | protojson | 2026-04-07T00:47:07.546790Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-hx94762 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-07T00:45:34.962189Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-ej93145 | attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames | 2026-04-07T00:44:04.086276Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-dp59378 | In libexpat before 2 | 2026-04-07T00:42:33.537935Z | 2026-04-06T06:37:58Z |
| cleanstart-2026-fe32006 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-07T00:41:34.518345Z | 2026-04-06T06:37:58Z |
| cleanstart-2026-gg94489 | go-retryablehttp prior to 0 | 2026-04-07T00:41:33.578433Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-aj47488 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-04-07T00:40:03.631106Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-bk17545 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-07T00:38:33.362093Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-kf75900 | In libexpat before 2 | 2026-04-06T06:20:25.150640Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-jl41223 | In libexpat before 2 | 2026-04-06T06:19:55.229801Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-ob18608 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T06:19:25.639311Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-dz75075 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-06T06:19:24.775093Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-jg79570 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T06:19:24.747052Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-mu54962 | Security fixes for ghsa-527x-5wrf-22m2, ghsa-g754-hx8w-x2g6, ghsa-jgfp-53c3-624w, ghsa-px8v-pp82-rcvr, ghsa-vv39-3w5q-974q applied in versions: 1.25.0-r0, 1.26.7-r0 | 2026-04-06T02:54:48.662994Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-hj96712 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq applied in versions: 3.7.2-r4, 3.7.2-r5 | 2026-04-06T02:53:02.079256Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-po55014 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-06T02:53:00.589014Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-bl95928 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T02:52:47.736498Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-kc06018 | Security fixes for CVE-2017-12158, CVE-2017-12159, ghsa-3p8m-j85q-pgmj, ghsa-45p5-v273-3qqr, ghsa-4cx2-fc23-5wg6, ghsa-5rfx-cp42-p624, ghsa-72hv-8253-57qq, ghsa-84h7-rjj3-6jx4, ghsa-9342-92gg-6v29, ghsa-cbdj-484d-3x9q, ghsa-fghv-69vj-qj49, ghsa-h5fg-jpgr-rv9c, ghsa-hq9p-pm7w-8p54, ghsa-j288-q9x7-2f5v, ghsa-pwqr-wmgm-9rr8, ghsa-w9fj-cfpg-grvv applied in versions: 26.1.4-r1, 26.5.0-r0, 26.5.0-r1, 26.5.0-r2, 26.5.6-r3 | 2026-04-06T02:52:37.677608Z | 2026-04-01T11:37:49Z |
| cleanstart-2026-nb78893 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-64715, CVE-2025-68119, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, CVE-2026-33726 applied in versions: 0.13.3-r0, 0.13.3-r1 | 2026-04-06T02:52:24.792809Z | 2026-04-01T13:08:16Z |
| cleanstart-2026-mq18886 | Security fixes for CVE-2026-22735, CVE-2026-22737 applied in versions: 6.2.3-r0 | 2026-04-06T02:52:03.544300Z | 2026-04-01T11:39:45Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2025-098 | 2025-08-27T17:19:14.000Z | 2025-08-27T17:19:14.000Z | |
| drupal-contrib-2025-097 | 2025-08-13T17:33:34.000Z | 2025-09-03T18:53:10.000Z | |
| drupal-contrib-2025-096 | 2025-08-13T17:33:24.000Z | 2025-08-13T20:10:05.000Z | |
| drupal-contrib-2025-095 | 2025-08-06T16:50:43.000Z | 2025-08-06T16:50:43.000Z | |
| drupal-contrib-2025-094 | 2025-07-30T16:31:23.000Z | 2025-07-30T16:31:23.000Z | |
| drupal-contrib-2025-093 | 2025-07-30T16:30:44.000Z | 2025-07-30T16:30:44.000Z | |
| drupal-contrib-2025-092 | 2025-07-23T17:10:19.000Z | 2025-07-23T17:10:19.000Z | |
| drupal-contrib-2025-091 | 2025-07-16T16:46:49.000Z | 2025-07-17T14:42:36.000Z | |
| drupal-contrib-2025-090 | 2025-07-16T16:46:26.000Z | 2025-07-16T16:46:26.000Z | |
| drupal-contrib-2025-089 | 2025-07-16T16:46:08.000Z | 2025-07-16T16:46:08.000Z | |
| drupal-contrib-2025-088 | 2025-07-09T16:37:40.000Z | 2025-11-22T09:22:47.000Z | |
| drupal-contrib-2025-087 | 2025-07-09T16:37:27.000Z | 2025-07-09T16:37:27.000Z | |
| drupal-contrib-2025-086 | 2025-07-02T17:37:13.000Z | 2025-07-02T17:37:13.000Z | |
| drupal-contrib-2025-085 | 2025-07-02T17:37:03.000Z | 2025-07-02T17:37:03.000Z | |
| drupal-contrib-2025-084 | 2025-06-25T18:43:00.000Z | 2025-06-25T18:43:00.000Z | |
| drupal-contrib-2025-083 | 2025-06-25T18:42:38.000Z | 2025-06-25T18:42:38.000Z | |
| drupal-contrib-2025-082 | 2025-06-25T18:42:17.000Z | 2025-06-25T18:42:17.000Z | |
| drupal-contrib-2025-081 | 2025-06-25T18:42:06.000Z | 2025-06-26T18:17:29.000Z | |
| drupal-contrib-2025-080 | 2025-06-25T18:41:56.000Z | 2025-06-25T18:41:56.000Z | |
| drupal-contrib-2025-079 | 2025-06-25T18:41:34.000Z | 2025-06-25T18:41:34.000Z | |
| drupal-contrib-2025-078 | 2025-06-25T18:41:20.000Z | 2025-06-25T18:41:20.000Z | |
| drupal-contrib-2025-077 | 2025-06-25T18:41:06.000Z | 2025-06-25T18:41:06.000Z | |
| drupal-contrib-2025-076 | 2025-05-28T17:46:09.000Z | 2025-05-29T18:15:56.000Z | |
| drupal-contrib-2025-075 | 2025-05-28T17:45:37.000Z | 2025-05-29T18:16:19.000Z | |
| drupal-contrib-2025-074 | 2025-05-28T17:44:33.000Z | 2025-05-29T18:16:36.000Z | |
| drupal-contrib-2025-073 | 2025-05-28T17:44:12.000Z | 2025-05-29T18:16:49.000Z | |
| drupal-contrib-2025-072 | 2025-05-28T17:43:44.000Z | 2025-05-29T18:16:59.000Z | |
| drupal-contrib-2025-071 | 2025-05-28T17:43:23.000Z | 2025-05-29T18:17:12.000Z | |
| drupal-contrib-2025-070 | 2025-05-28T17:41:20.000Z | 2025-05-29T18:17:25.000Z | |
| drupal-contrib-2025-069 | 2025-05-21T17:29:25.000Z | 2025-05-29T18:17:38.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2022-ale-001 | [MaJ] Vulnérabilité dans Microsoft Windows | 2022-01-12T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-022 | [MaJ] Vulnérabilité dans Apache Log4j | 2021-12-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-021 | Vulnérabilité dans Microsoft Exchange | 2021-11-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-019 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-09-08T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-017 | Multiples vulnérabilités dans Microsoft Exchange | 2021-08-27T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| certfr-2021-ale-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| certfr-2021-ale-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| certfr-2021-ale-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-007 | [MàJ] Vulnérabilité dans Pulse Connect Secure | 2021-04-20T00:00:00.000000 | 2021-06-21T00:00:00.000000 |
| certfr-2021-ale-006 | [MàJ] Vulnérabilité dans F5 BIG-IP | 2021-03-22T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2021-ale-005 | Multiples vulnérabilités dans Microsoft DNS server | 2021-03-12T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-004 | [MàJ] Multiples vulnérabilités dans Microsoft Exchange Server | 2021-03-03T00:00:00.000000 | 2021-07-16T00:00:00.000000 |
| certfr-2021-ale-003 | [MàJ] Vulnérabilité dans VMware vCenter Server | 2021-02-25T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-002 | [MàJ] Vulnérabilité dans Google Chrome et Microsoft Edge | 2021-02-05T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2021-ale-001 | |MàJ] Vulnérabilité dans SonicWall SMA100 | 2021-02-02T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2020-ale-026 | [MaJ] Présence de code malveillant dans SolarWinds Orion | 2020-12-14T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2020-ale-025 | Vulnérabilité dans Fortinet FortiOS SSL-VPN | 2020-11-27T00:00:00.000000 | 2021-02-08T00:00:00.000000 |
| certfr-2020-ale-024 | [MaJ] Vulnérabilité dans les produits VMware | 2020-11-24T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-023 | Multiples vulnérabilités dans Google Chrome | 2020-11-12T00:00:00.000000 | 2020-12-04T00:00:00.000000 |
| certfr-2020-ale-022 | [MàJ] Vulnérabilité dans Oracle Weblogic | 2020-10-30T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-021 | Vulnérabilité dans Samba | 2020-09-18T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-020 | [MàJ] Vulnérabilité dans Microsoft Netlogon | 2020-09-15T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0385 | Multiples vulnérabilités dans Google Chrome | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| certfr-2026-avi-0384 | Multiples vulnérabilités dans Joomla! | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| certfr-2026-avi-0383 | Multiples vulnérabilités dans Sonicwall Email Security | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| certfr-2026-avi-0382 | Multiples vulnérabilités dans les produits FoxIT | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0381 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0380 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0379 | Vulnérabilité dans Elastic OpenTelemetry Java | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0378 | Vulnérabilité dans Symantec Data Loss Prevention (DLP) | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0377 | Multiples vulnérabilités dans Papercut | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0376 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-30T00:00:00.000000 | 2026-03-30T00:00:00.000000 |
| certfr-2026-avi-0375 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-30T00:00:00.000000 | 2026-03-30T00:00:00.000000 |
| certfr-2026-avi-0374 | Vulnérabilité dans Docker Desktop | 2026-03-30T00:00:00.000000 | 2026-03-30T00:00:00.000000 |
| certfr-2026-avi-0373 | Vulnérabilité dans Roundcube | 2026-03-30T00:00:00.000000 | 2026-04-08T00:00:00.000000 |
| certfr-2026-avi-0372 | Multiples vulnérabilités dans les produits IBM | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0371 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0370 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0369 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0368 | Vulnérabilité dans les produits Microsoft | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0367 | Multiples vulnérabilités dans Zabbix | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0366 | Multiples vulnérabilités dans Traefik | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0365 | Multiples vulnérabilités dans Spring AI | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0364 | Multiples vulnérabilités dans les produits Siemens | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0363 | Multiples vulnérabilités dans les produits NetApp | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0362 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0361 | Multiples vulnérabilités dans Cisco IOS et IOS XE | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0360 | Multiples vulnérabilités dans ISC BIND | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0359 | Multiples vulnérabilités dans Grafana | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0358 | Vulnérabilité dans Citrix XenServer | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0357 | Multiples vulnérabilités dans GitLab | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0356 | Vulnérabilité dans ISC Kea | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-000024 | Installer of M-Audio M-Track Duo HD may insecurely load Dynamic Link Libraries | 2026-02-12T13:32+09:00 | 2026-02-12T13:32+09:00 |
| jvndb-2026-000022 | Oki Electric Industry products and OEM products register Windows services with unquoted file paths | 2026-02-09T15:21+09:00 | 2026-02-09T15:21+09:00 |
| jvndb-2026-000021 | web2py vulnerable to open redirect | 2026-02-05T15:01+09:00 | 2026-02-05T15:01+09:00 |
| jvndb-2026-000020 | Multiple vulnerabilities in Movable Type | 2026-02-04T16:15+09:00 | 2026-02-04T16:15+09:00 |
| jvndb-2026-000019 | Multiple vulnerabilities in ELECOM wireless LAN products | 2026-02-03T14:57+09:00 | 2026-02-03T14:57+09:00 |
| jvndb-2026-000017 | Improper file access permission settings in Mitsubishi Small-Capacity UPS Shutdown Software FREQSHIP-mini for Windows | 2026-02-03T14:57+09:00 | 2026-02-05T14:41+09:00 |
| jvndb-2026-000016 | Installer for Roland Cloud Manager may insecurely load Dynamic Link Libraries | 2026-02-03T14:57+09:00 | 2026-02-04T12:39+09:00 |
| jvndb-2026-000015 | Sonatype Nexus Repository vulnerable to server-side request forgery | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000014 | OS command injection in raspap-webgui | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000013 | Multiple Microsoft Office products vulnerable to untrusted search path | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000012 | Multiple vulnerabilities in Cybozu Garoon | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000018 | Undocumented "TelnetEnable" functionality of End of Service NETGEAR products | 2026-01-30T14:23+09:00 | 2026-01-30T14:23+09:00 |
| jvndb-2026-002119 | Multiple vulnerabilities in BROTHER MFPs (multifunction printers) | 2026-01-30T11:26+09:00 | 2026-01-30T11:26+09:00 |
| jvndb-2026-002030 | Multiple Vulnerabilities in Cosminexus | 2026-01-29T10:32+09:00 | 2026-01-29T10:32+09:00 |
| jvndb-2026-001972 | Archer MR600 vulnerable to OS command injection | 2026-01-28T10:41+09:00 | 2026-01-28T10:41+09:00 |
| jvndb-2026-000011 | beat-access for Windows may insecurely load Dynamic Link Libraries | 2026-01-27T18:22+09:00 | 2026-01-27T18:22+09:00 |
| jvndb-2026-001732 | Multiple Brother software installers may insecurely load Dynamic Link Libraries | 2026-01-26T16:04+09:00 | 2026-01-26T16:04+09:00 |
| jvndb-2026-000010 | Command injection vulnerability in ASUS routers | 2026-01-23T15:22+09:00 | 2026-01-23T15:22+09:00 |
| jvndb-2026-001663 | "iRMC S5/S6" implemented in PRIMERGY vulnerable to incorrect authorization | 2026-01-23T11:29+09:00 | 2026-01-23T11:29+09:00 |
| jvndb-2026-001662 | Multiple vulnerabilities in Trend Micro Apex Central (January 2026) | 2026-01-23T11:29+09:00 | 2026-01-23T11:29+09:00 |
| jvndb-2026-000009 | Installer of Fujitsu ServerView Agents for Windows may insecurely load Dynamic Link Libraries | 2026-01-21T15:17+09:00 | 2026-01-21T15:17+09:00 |
| jvndb-2026-000008 | Ruijie Networks AP180 series vulnerable to OS command injection | 2026-01-21T15:17+09:00 | 2026-01-21T15:17+09:00 |
| jvndb-2026-001582 | Security information for Hitachi Disk Array Systems | 2026-01-21T12:11+09:00 | 2026-01-21T12:11+09:00 |
| jvndb-2026-001578 | ETERNUS SF vulnerable to insertion of sensitive information into maintenance data | 2026-01-20T20:00+09:00 | 2026-01-20T20:00+09:00 |
| jvndb-2026-001380 | Multiple vulnerabilities in Canon Small Office Multifunction Printers and Laser Printers | 2026-01-19T10:08+09:00 | 2026-01-19T10:08+09:00 |
| jvndb-2026-000007 | Multiple Vulnerabilities in TOA Network Cameras TRIFORA 3 series | 2026-01-16T15:06+09:00 | 2026-01-16T15:06+09:00 |
| jvndb-2026-000006 | Chainlit vulnerable to improper access restriction | 2026-01-14T17:03+09:00 | 2026-01-14T17:03+09:00 |
| jvndb-2026-000005 | Multiple vulnerabilities in EATON UPS Companion | 2026-01-13T19:01+09:00 | 2026-01-13T19:01+09:00 |
| jvndb-2026-000003 | RICOH Streamline NX vulnerable to improper authorization | 2026-01-09T18:17+09:00 | 2026-01-09T18:17+09:00 |
| jvndb-2026-000004 | The installers for multiple PIONEER products may insecurely load Dynamic Link Libraries | 2026-01-08T13:47+09:00 | 2026-01-08T13:47+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-16041 | OpenClaw访问控制错误漏洞(CNVD-2026-16041) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-15860 | Canva Affinity越界读取漏洞(CNVD-2026-15860) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15859 | Canva Affinity越界读取漏洞(CNVD-2026-15859) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15858 | Canva Affinity越界读取漏洞(CNVD-2026-15858) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15857 | Canva Affinity类型混淆漏洞 | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15856 | Canva Affinity越界读取漏洞(CNVD-2026-15856) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15855 | Canva Affinity越界读取漏洞(CNVD-2026-15855) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15854 | Canva Affinity越界读取漏洞(CNVD-2026-15854) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15853 | Canva Affinity越界读取漏洞(CNVD-2026-15853) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15852 | Canva Affinity越界写入漏洞 | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15851 | Canva Affinity越界读取漏洞(CNVD-2026-15851) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15850 | Canva Affinity越界读取漏洞(CNVD-2026-15850) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15849 | Canva Affinity越界读取漏洞(CNVD-2026-15849) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15848 | Canva Affinity越界读取漏洞(CNVD-2026-15848) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15847 | Canva Affinity越界读取漏洞(CNVD-2026-15847) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15846 | Canva Affinity越界读取漏洞(CNVD-2026-15846) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15845 | Canva Affinity越界读取漏洞(CNVD-2026-15845) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15844 | Canva Affinity越界读取漏洞 | 2026-03-26 | 2026-04-01 |
| cnvd-2026-15407 | Google Chrome存在未明漏洞(CNVD-2026-15407) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15406 | Google Chrome堆缓冲区溢出漏洞(CNVD-2026-15406) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15405 | Google Chrome整数溢出漏洞(CNVD-2026-15405) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15404 | Google Chrome内存错误引用漏洞(CNVD-2026-15404) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15403 | Google Chrome堆缓冲区溢出漏洞(CNVD-2026-15403) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15402 | Google Chrome越界读取漏洞(CNVD-2026-15402) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15401 | Google Chrome越界读取漏洞(CNVD-2026-15401) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15400 | Google Chrome FedCM内存错误引用漏洞 | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15395 | Google Chrome资源管理错误漏洞(CNVD-2026-15395) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15152 | OpenClaw拒绝服务漏洞(CNVD-2026-15152) | 2026-03-26 | 2026-03-27 |
| cnvd-2026-15058 | OpenClaw命令注入漏洞(CNVD-2026-15058) | 2026-03-26 | 2026-03-26 |
| cnvd-2026-15057 | OpenClaw加密问题漏洞(CNVD-2026-15057) | 2026-03-26 | 2026-03-26 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01783 | Уязвимость почтового клиента Microsoft Outlook, пакетов программ Microsoft Office, Excel … | 13.02.2026 | 13.02.2026 |
| bdu:2026-01782 | Уязвимость пакетов программ Microsoft Office, Excel и 365 Apps for Enterprise, связанная … | 13.02.2026 | 13.02.2026 |
| bdu:2026-01781 | Уязвимость пакетов программ Microsoft Office, Excel и 365 Apps for Enterprise, связанная … | 13.02.2026 | 13.02.2026 |
| bdu:2026-01780 | Уязвимость компонента Graphics операционных систем Windows, позволяющая нарушителю повыси… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01779 | Уязвимость подсистемы совместимости для запуска Linux-приложений Windows Subsystem for Li… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01778 | Уязвимость драйвера Windows Ancillary Function Driver for WinSock операционных систем Win… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01777 | Уязвимость компонента Graphics операционных систем Windows, позволяющая нарушителю повыси… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01776 | Уязвимость сервера отчетов Power BI Report Server, связанная с недостаточной проверкой вв… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01775 | Уязвимость программной платформы .NET, связанная с некорректной обработкой отсутствующего… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01774 | Уязвимость функции png_set_quantize() библиотеки для работы с растровой графикой в формат… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01773 | Уязвимость системы автоматизации технологических процессов EcoStruxure Process Expert и E… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01772 | Уязвимость программного обеспечения Gridscale X Prepay, связанная с несоответствием ответ… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01771 | Уязвимость сетевого программного обеспечения Siemens, связанная с неконтролируемым элемен… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01770 | Уязвимость программного обеспечения контроля лицензий CodeMeter, связанная с недостатками… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01769 | Уязвимость системного демона chassisd операционной системы Juniper Networks Junos маршрут… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01768 | Уязвимость веб-интерфейса управления системы обработки вызовов Cisco Unified Communicatio… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01767 | Уязвимость веб-интерфейса управления системы мониторинга и управления сетевым оборудовани… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01766 | Уязвимость микропрограммного обеспечения Cisco SIP IP-телефонов Cisco Video Phone 8875, D… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01765 | Уязвимость микропрограммного обеспечения Cisco SIP IP-телефонов Cisco Video Phone 8875, D… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01764 | Уязвимость веб-интерфейса средства унифицированного управления Cisco Unified Computing Sy… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01763 | Уязвимость программных продуктов Cisco Unified Contact Center Enterprise и Cisco Packaged… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01762 | Уязвимость SSH службы технологии Cisco Ultra-Reliable Wireless Backhaul (URWB) сетевых ус… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01761 | Уязвимость оболочки обслуживания программного средства управления облачными системами Cis… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01760 | Уязвимость программных продуктов Cisco Unified Contact Center Enterprise и Cisco Packaged… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01759 | Уязвимость веб-интерфейса управления системы мониторинга и управления сетевым оборудовани… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01758 | Уязвимость веб-интерфейса платформы управления политиками соединений Cisco Identity Servi… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01757 | Уязвимость веб-интерфейса платформы управления политиками соединений Cisco Identity Servi… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01756 | Уязвимость механизма обнаружения Snort программного межсетевого экрана Cisco Secure Firew… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01755 | Уязвимость механизма обнаружения Snort программного межсетевого экрана Cisco Secure Firew… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01754 | Уязвимость ядра подсистемы совместимости для запуска Linux-приложений Windows Subsystem f… | 13.02.2026 | 13.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202112-1782 | Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not pro… | 2026-04-10T23:35:45.033000Z |
| var-202003-1779 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2026-04-10T23:35:44.701000Z |
| var-201007-0948 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 thro… | 2026-04-10T23:35:43.785000Z |
| var-202102-0068 | Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before … | 2026-04-10T23:35:43.590000Z |
| var-201903-0423 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2026-04-10T23:35:09.270000Z |
| var-201404-0592 | The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly h… | 2026-04-10T23:34:59.841000Z |
| var-201410-1418 | The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeter… | 2026-04-10T23:34:59.740000Z |
| var-200810-0141 | Heap-based buffer overflow in the local IPC component in the EAPOLController plugin for c… | 2026-04-10T23:34:59.011000Z |
| var-201006-1253 | WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, Apple Safari… | 2026-04-10T23:34:53.625000Z |
| var-200809-0193 | Time Machine in Apple Mac OS X 10.5 through 10.5.4 uses weak permissions for Time Machine… | 2026-04-10T23:34:22.491000Z |
| var-201410-1217 | Use-after-free vulnerability in the ProcessingInstruction::setXSLStyleSheet function in c… | 2026-04-10T23:34:07.569000Z |
| var-201806-1470 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2026-04-10T23:34:04.094000Z |
| var-201912-1844 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-04-10T23:34:03.130000Z |
| var-201710-1433 | Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a deni… | 2026-04-10T23:34:02.101000Z |
| var-201908-0260 | Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, poten… | 2026-04-10T23:34:01.956000Z |
| var-202004-2199 | In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containi… | 2026-04-10T23:34:01.350000Z |
| var-202209-0773 | The issue was addressed with improved memory handling. This issue is fixed in macOS Monte… | 2026-04-10T23:33:59.696000Z |
| var-202105-1451 | An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas i… | 2026-04-10T23:33:59.314000Z |
| var-201912-0597 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-04-10T23:33:58.659000Z |
| var-201806-1436 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2026-04-10T23:33:58.495000Z |
| var-200810-0144 | Heap-based buffer overflow in the read_rle16 function in imagetops in CUPS before 1.3.9 a… | 2026-04-10T23:33:23.023000Z |
| var-201910-1646 | By design, BIND is intended to limit the number of TCP clients that can be connected at a… | 2026-04-10T23:32:51.564000Z |
| var-200809-0176 | sys/netinet6/icmp6.c in the kernel in FreeBSD 6.3 through 7.1, NetBSD 3.0 through 4.0, an… | 2026-04-10T23:32:51.513000Z |
| var-201711-0476 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2026-04-10T23:32:44.188000Z |
| var-201506-0038 | Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to exe… | 2026-04-10T23:32:30.204000Z |
| var-201912-0545 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-04-10T23:31:27.957000Z |
| var-202008-1238 | In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.… | 2026-04-10T23:30:57.138000Z |
| var-201109-0200 | Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers… | 2026-04-10T23:30:56.602000Z |
| var-200704-0226 | Apple File Protocol (AFP) Client in Apple Mac OS X 10.3.9 through 10.4.9 does not properl… | 2026-04-10T23:30:53.630000Z |
| var-202404-0120 | Faulty input validation in the core of Apache allows malicious or exploitable backend/con… | 2026-04-10T23:30:53.560000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2021-035 | PHOENIX CONTACT: FL MGUARD DM version 1.12.0 and 1.13.0 Improper Privilege Management | 2021-08-11T07:59:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-029 | PHOENIX CONTACT: DoS for PLCnext Control devices in versions <2021.0.5 LTS | 2021-08-04T07:58:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-032 | PHOENIX CONTACT: Niche Ethernet Stack for ILC1x0, ILC1x1 and AXC 1050 Industrial controllers and CHARX control DC | 2021-08-04T07:57:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-036 | PHOENIX CONTACT: Products utilizing WIBU SYSTEMS CodeMeter components in versions prior to V7.21a | 2021-08-04T07:56:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-025 | PHOENIX CONTACT: Security Advisory for PLCNext, ILC 2050 BI, FL MGUARD DM UNLIMITED, TC ROUTER und CLOUD CLIENT products | 2021-06-23T12:19:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-023 | PHOENIX CONTACT: Security Advisory for FL SWITCH SMCS series | 2021-06-23T12:17:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-022 | PHOENIX CONTACT: Security Advisory for FL COMSERVER UNI | 2021-06-23T12:16:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-019 | PHOENIX CONTACT: Security Advisory for ILC1x1 Industrial controllers | 2021-06-23T12:16:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-021 | PHOENIX CONTACT: Security Advisory for AXL F BK and IL BK products | 2021-06-23T12:15:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-020 | PHOENIX CONTACT: Security Advisory for Automation Worx Software Suite | 2021-06-23T11:10:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-024 | PHOENIX CONTACT: Security Advisory for PLCNext, SMARTRTU AXC, CHARX control modular and EEM-SB37x | 2021-05-04T08:17:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-046 | PHOENIX CONTACT: mGuard <8.8.3 products missing initialization of resource | 2020-12-17T09:01:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-049 | Phoenix Contact: Multiple vulnerabilities in PLCnext Control devices < 2021.0 LTS | 2020-12-17T09:00:00.000Z | 2020-12-17T09:00:00.000Z |
| vde-2020-047 | PHOENIX CONTACT: BTP Touch Panels uncontrolled resource consumption | 2020-12-02T09:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-030 | PHOENIX CONTACT: Products utilizing WIBU-SYSTEMS CodeMeter components | 2020-09-09T06:22:00.000Z | 2020-09-09T06:22:00.000Z |
| vde-2020-026 | PHOENIX CONTACT: Denial-of-Service vulnerabilty in Emalytics, ILC 2050 BI and ILC 2050 BI-L | 2020-08-20T07:11:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-025 | PHOENIX CONTACT: Improper path sanitation on import of project files in PLCnext Engineer | 2020-07-21T09:38:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-023 | PHOENIX CONTACT: Two Vulnerabilities in Automation Worx Suite | 2020-07-01T08:25:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-018 | PHOENIX CONTACT: FL MGUARD, TC MGUARD, TC ROUTER and TC CLOUD CLIENT: PPPD vulnerable to CVE-2020-8597 | 2020-06-02T08:42:00.000Z | 2020-06-02T08:42:00.000Z |
| vde-2020-013 | PHOENIX CONTACT: Local Privilege Escalation in Portico Remote desktop control software | 2020-03-27T09:48:00.000Z | 2020-03-27T09:48:00.000Z |
| vde-2020-012 | PHOENIX CONTACT: Local Privilege Escalation in PC WORX SRT | 2020-03-27T09:47:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-003 | PHOENIX CONTACT: TC Router and TC Cloud Client multiple vulnerabilities | 2020-03-05T15:58:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-002 | PHOENIX CONTACT: Advisory for multiple FL Switch GHS utilising VxWorks | 2020-02-25T09:07:00.000Z | 2025-06-05T13:28:12.000Z |
| vde-2020-001 | PHOENIX CONTACT: Emalytics Controller ILC 2050 BI(L) allows unauthorised read and write access to the configuration file | 2020-02-17T08:10:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2019-020 | PHOENIX CONTACT: improper access control exists on FL NAT devices when using MAC-based port security | 2019-10-29T10:56:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2019-016 | PHOENIX CONTACT: Security Advisory for Automation Worx Software Suite | 2019-10-15T06:17:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-015 | PHOENIX CONTACT: Security Advisory for multiple Industrial Controllers | 2019-08-07T00:00:00.000Z | 2025-07-11T07:00:00.000Z |
| vde-2019-014 | PHOENIX CONTACT: Multiple Vulnerabilities in Automation Worx Software Suite | 2019-06-19T12:41:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-009 | PHOENIX CONTACT: Multiple Vulnerabilities in AXC F 2152 | 2019-06-04T10:22:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2019-007 | PHOENIX CONTACT: command injection on RAD-80211-XD(/HP-BUS) | 2019-03-25T11:45:00.000Z | 2025-05-14T12:28:19.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2020-042 | WAGO: PLC families 750-88x and 750-352 prone to DoS attack, versions < FW10 (Update A) | 2020-10-27T10:28:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-029 | WAGO: XSS vulnerability in Web-UI in WAGO 750-88X and WAGO 750-89X | 2020-09-30T11:11:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-028 | WAGO: Authentication Bypass Vulnerability in WAGO 750-36X and WAGO 750-8XX Version <= FW03 | 2020-09-30T11:08:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-027 | WAGO: Vulnerability in web-based authentication in WAGO 750-8XX Version <= FW07 | 2020-09-30T11:06:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-032 | WAGO: Vulnerable WIBU-SYSTEMS Codemeter installed through e!COCKPIT | 2020-09-09T06:23:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-020 | WAGO: PPPD in PFC100 and PFC200 Series is vulnerable to CVE-2020-8597 | 2020-06-10T10:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-015 | WAGO: Web Based Management - Code Execution Vulnerability | 2020-06-10T08:00:00.000Z | 2020-06-10T08:00:00.000Z |
| vde-2020-006 | WAGO: Web-Based Management Authentication Vulnerabilities | 2020-03-09T11:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-011 | WAGO: Multiple Vulnerabilities in I/O-Check Service | 2020-03-09T09:30:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-010 | WAGO: Cloud Connectivity Remote Code Execution Vulnerability | 2020-03-09T09:25:00.000Z | 2020-03-09T09:25:00.000Z |
| vde-2020-009 | WAGO: e!Cockpit Two Update Package Vulnerabilities | 2020-03-09T09:18:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-008 | WAGO: Cloud Connectivity Multiple Vulnerabilities | 2020-03-09T09:15:00.000Z | 2025-05-14T12:53:43.000Z |
| vde-2020-007 | WAGO: Web-Based Management Denial of Service | 2020-03-09T09:10:00.000Z | 2020-03-09T09:10:00.000Z |
| vde-2020-004 | WAGO: e!Cockpit cleartext communication and hardcoded key | 2020-03-09T09:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2019-022 | WAGO: Multiple Vulnerabilities in I/O-Check Service in Multiple Devices | 2019-12-16T09:00:00.000Z | 2019-12-16T09:00:00.000Z |
| vde-2019-017 | WAGO: Series PFC100/PFC200 Information Disclosure | 2019-09-18T11:25:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-013 | WAGO: Multiple Vulnerabilities in industrial managed switches | 2019-06-12T10:25:00.000Z | 2019-06-12T10:25:00.000Z |
| vde-2018-013 | WAGO: 750-8xx Controller Denial of Service | 2018-08-17T09:45:00.000Z | 2025-09-22T10:00:00.000Z |
| vde-2018-010 | WAGO: Multiple vulnerabilities in e!DISPLAY products | 2018-07-10T09:50:00.000Z | 2025-05-22T13:03:10.000Z |