Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-24504 |
7.2 (3.1)
|
Dell PowerProtect Data Domain, versions 7.7.1.0 t… |
Dell |
PowerProtect Data Domain |
2026-04-20T16:08:35.314Z | 2026-04-22T03:55:59.007Z |
| CVE-2026-25883 |
5.8 (3.1)
|
Vexa Webhook Feature has a SSRF Vulnerability |
Vexa-ai |
vexa |
2026-04-20T16:04:36.584Z | 2026-04-20T16:36:21.221Z |
| CVE-2026-25058 |
7.5 (3.1)
|
Vexa's unauthenticated internal transcript endpoint ex… |
Vexa-ai |
vexa |
2026-04-20T16:03:06.639Z | 2026-04-20T16:12:27.988Z |
| CVE-2026-23774 |
7.2 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain |
2026-04-20T15:58:46.965Z | 2026-04-22T03:55:57.514Z |
| CVE-2026-26944 |
8.8 (3.1)
|
Dell PowerProtect Data Domain, versions 7.7.1.0 t… |
Dell |
PowerProtect Data Domain |
2026-04-20T15:51:30.118Z | 2026-04-22T03:55:56.073Z |
| CVE-2026-24468 |
5.3 (3.1)
|
OpenAEV Vulnerable to Username/Email Enumeration Throu… |
OpenAEV-Platform |
openaev |
2026-04-20T15:45:48.572Z | 2026-04-20T16:24:44.061Z |
| CVE-2026-24467 |
9.1 (3.1)
|
OpenAEV's Improper Password Reset Token Management Lea… |
OpenAEV-Platform |
openaev |
2026-04-20T15:40:56.203Z | 2026-04-20T16:21:50.299Z |
| CVE-2026-6066 |
7.1 (3.1)
|
Unencrypted Client‑Server Communication in ConnectWise… |
ConnectWise |
Automate |
2026-04-20T15:26:31.843Z | 2026-04-20T16:13:06.767Z |
| CVE-2026-41245 |
5.9 (3.1)
|
Junrar: Path Traversal (Zip-Slip) via Sibling Director… |
junrar |
junrar |
2026-04-20T15:15:24.540Z | 2026-04-20T16:35:09.317Z |
| CVE-2026-40896 |
6.5 (3.1)
|
OpenProject has Cross-Project Meeting Agenda Item Inje… |
opf |
openproject |
2026-04-20T15:12:52.279Z | 2026-04-20T16:13:10.714Z |
| CVE-2026-6652 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
Pagekit CMS StringStorage Template PhpEngine.php evalu… |
Pagekit |
CMS |
2026-04-20T15:00:22.525Z | 2026-04-20T16:14:56.950Z |
| CVE-2026-3219 |
4.6 (4.0)
|
pip doesn't reject concatenated ZIP and tar archives |
Python Packaging Authority |
pip |
2026-04-20T14:55:38.282Z | 2026-04-20T20:15:23.710Z |
| CVE-2026-39918 |
9.2 (4.0)
9.8 (3.1)
|
Vvveb < 1.0.8.1 Code Injection via Installation Endpoint |
givanz |
Vvveb |
2026-04-20T14:46:33.549Z | 2026-04-20T15:36:55.619Z |
| CVE-2026-6651 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
erponline.xyz ERP Online Inventory Edit Item cross sit… |
erponline.xyz |
ERP Online |
2026-04-20T14:45:11.560Z | 2026-04-20T15:21:57.084Z |
| CVE-2026-6650 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
Z-BlogPHP ZBA File app_upload.php UnPack unrestricted upload |
n/a |
Z-BlogPHP |
2026-04-20T14:30:13.825Z | 2026-04-20T16:23:25.105Z |
| CVE-2026-34428 |
8.3 (4.0)
7.7 (3.1)
|
Vvveb < 1.0.8.1 SSRF via oEmbedProxy |
givanz |
Vvveb |
2026-04-20T13:55:36.802Z | 2026-04-20T14:49:33.646Z |
| CVE-2026-34427 |
8.7 (4.0)
8.8 (3.1)
|
Vvveb < 1.0.8.1 Privilege Escalation via admin/user/save |
givanz |
Vvveb |
2026-04-20T13:55:15.311Z | 2026-04-20T14:51:12.245Z |
| CVE-2026-34429 |
5.1 (4.0)
5.4 (3.1)
|
Vvveb < 1.0.8.1 Stored XSS via Media Upload and Rename |
givanz |
Vvveb |
2026-04-20T13:54:37.019Z | 2026-04-20T14:56:19.205Z |
| CVE-2026-5760 |
9.8 (3.1)
|
CVE-2026-5760 |
SGLang |
SGLang |
2026-04-20T13:46:23.603Z | 2026-04-20T15:29:54.098Z |
| CVE-2026-6369 |
5.7 (4.0)
|
Exposed Session Token in canonical-livepatch client snap |
Canonical |
canonical-livepatch |
2026-04-20T13:38:13.691Z | 2026-04-20T14:06:18.537Z |
| CVE-2026-4048 |
8.4 (3.1)
|
OS Command Injection Remote Code Execution Vulnerabili… |
Progress Software |
LoadMaster |
2026-04-20T13:36:49.475Z | 2026-04-22T03:55:54.495Z |
| CVE-2026-3519 |
8.4 (3.1)
|
OS Command Injection Remote Code Execution Vulnerabili… |
Progress Software |
LoadMaster |
2026-04-20T13:32:50.259Z | 2026-04-22T03:55:53.355Z |
| CVE-2026-6649 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Qibo CMS headers server-side request forgery |
Qibo |
CMS |
2026-04-20T13:30:41.191Z | 2026-04-20T14:14:18.603Z |
| CVE-2026-3518 |
8.4 (3.1)
|
OS Command Injection Remote Code Execution Vulnerabili… |
Progress Software |
LoadMaster |
2026-04-20T13:29:33.794Z | 2026-04-22T03:55:52.242Z |
| CVE-2026-33557 |
N/A
|
Apache Kafka: Missing JWT token validation in OAUTHBEA… |
Apache Software Foundation |
Apache Kafka |
2026-04-20T13:28:43.669Z | 2026-04-20T14:30:30.936Z |
| CVE-2025-66335 |
N/A
|
Apache Doris MCP Server: MCP SQL inject |
Apache Software Foundation |
Apache Doris MCP Server |
2026-04-20T13:27:27.764Z | 2026-04-20T14:17:11.395Z |
| CVE-2026-3517 |
8.4 (3.1)
|
OS Command Injection Remote Code Execution Vulnerabili… |
Progress Software |
LoadMaster |
2026-04-20T13:22:54.867Z | 2026-04-22T03:55:51.123Z |
| CVE-2026-33558 |
N/A
|
Apache Kafka, Apache Kafka Clients: Information Exposu… |
Apache Software Foundation |
Apache Kafka |
2026-04-20T13:20:38.059Z | 2026-04-20T14:20:41.640Z |
| CVE-2026-6648 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
Qibo CMS Internal Message cross site scripting |
Qibo |
CMS |
2026-04-20T13:00:44.627Z | 2026-04-20T14:51:00.368Z |
| CVE-2026-6636 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
p2r3 convert API buildCache.js Bun.serve path traversal |
p2r3 |
convert |
2026-04-20T12:00:17.473Z | 2026-04-20T14:58:24.131Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-32135 |
7.7 (4.0)
|
NanoMQ has Heap Buffer Overflow in URI Parameter Parsing |
nanomq |
nanomq |
2026-04-20T19:23:09.704Z | 2026-04-21T13:33:14.607Z |
| CVE-2026-29649 |
9.8 (3.1)
|
NEMU contains an implementation flaw in its RISC-… |
n/a |
n/a |
2026-04-20T00:00:00.000Z | 2026-04-21T19:51:00.279Z |
| CVE-2026-29645 |
7.5 (3.1)
|
NEMU (OpenXiangShan/NEMU) before v2025.12.r2 cont… |
n/a |
n/a |
2026-04-20T00:00:00.000Z | 2026-04-21T19:51:06.424Z |
| CVE-2026-6248 |
8.1 (3.1)
|
wpForo Forum <= 3.0.5 - Authenticated (Subscriber+) Ar… |
tomdever |
wpForo Forum |
2026-04-20T18:31:33.290Z | 2026-04-21T17:35:30.317Z |
| CVE-2026-6060 |
4.5 (3.1)
|
Possible DoS via SQL Box |
OTRS AG |
OTRS |
2026-04-20T18:20:01.664Z | 2026-04-20T18:48:48.185Z |
| CVE-2025-11249 |
N/A
|
This CVE id was assigned as a duplicate of CVE-2025-66414. | N/A | N/A | 2026-04-20T18:52:18.108Z | |
| CVE-2026-41389 |
6.3 (4.0)
5.8 (3.1)
|
OpenClaw 2026.4.7 < 2026.4.15 - Arbitrary File Read vi… |
OpenClaw |
OpenClaw |
2026-04-20T17:48:43.704Z | 2026-04-20T18:05:03.103Z |
| CVE-2026-39112 |
5.4 (3.1)
|
Cross Site Scripting vulnerability in Apartment V… |
n/a |
n/a |
2026-04-20T00:00:00.000Z | 2026-04-20T18:07:53.479Z |
| CVE-2026-39111 |
7.5 (3.1)
|
SQL Injection vulnerability in Apartment Visitors… |
n/a |
n/a |
2026-04-20T00:00:00.000Z | 2026-04-20T18:12:54.038Z |
| CVE-2026-39110 |
8.2 (3.1)
|
SQL Injection vulnerability in Apartment Visitors… |
n/a |
n/a |
2026-04-20T00:00:00.000Z | 2026-04-20T18:34:55.729Z |
| CVE-2026-39109 |
9.4 (3.1)
|
SQL Injection vulnerability in Apartment Visitors… |
n/a |
n/a |
2026-04-20T00:00:00.000Z | 2026-04-20T18:31:04.461Z |
| CVE-2026-26399 |
5.3 (3.1)
|
A stack-use-after-return issue exists in the Ardu… |
n/a |
n/a |
2026-04-20T00:00:00.000Z | 2026-04-22T19:53:16.622Z |
| CVE-2026-23758 |
5.1 (4.0)
6.4 (4.0)
|
GFI HelpDesk < 4.99.9 Stored XSS via editsubject Parameter |
GFI Software |
HelpDesk |
2026-04-20T17:30:06.853Z | 2026-04-20T17:45:55.788Z |
| CVE-2026-23757 |
5.1 (4.0)
5.4 (3.1)
|
GFI HelpDesk < 4.99.10 Stored XSS via Reports Module |
GFI Software |
HelpDesk |
2026-04-20T17:27:56.067Z | 2026-04-20T18:07:01.630Z |
| CVE-2026-23756 |
5.1 (4.0)
5.4 (3.1)
|
GFI HelpDesk < 4.99.9 Stored XSS via Troubleshooter St… |
GFI Software |
HelpDesk |
2026-04-20T17:30:51.162Z | 2026-04-20T18:08:49.925Z |
| CVE-2026-23753 |
4.8 (4.0)
4.8 (3.1)
|
GFI HelpDesk < 4.99.9 Stored XSS via charset Parameter |
GFI Software |
HelpDesk |
2026-04-20T17:33:59.134Z | 2026-04-21T13:31:13.580Z |
| CVE-2026-23752 |
4.8 (4.0)
4.8 (3.1)
|
GFI HelpDesk < 4.99.9 Stored XSS via companyname Parameter |
GFI Software |
HelpDesk |
2026-04-20T17:33:23.424Z | 2026-04-20T18:09:59.603Z |
| CVE-2026-6662 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
ericc-ch copilot-api Token Endpoint server.ts cors cro… |
ericc-ch |
copilot-api |
2026-04-20T17:00:17.800Z | 2026-04-20T18:09:27.691Z |
| CVE-2026-41445 |
8.7 (4.0)
8.8 (3.1)
|
KissFFT Integer Overflow Heap Buffer Overflow via kiss… |
mborgerding |
kissfft |
2026-04-20T16:18:50.371Z | 2026-04-20T17:57:10.156Z |
| CVE-2026-40488 |
8.7 (4.0)
|
OpenMage LTS has Customer File Upload Extension Blockl… |
OpenMage |
magento-lts |
2026-04-20T16:23:07.429Z | 2026-04-20T16:55:05.724Z |
| CVE-2026-40098 |
5.3 (4.0)
|
OpenMage LTS imports cross-user wishlist item via shar… |
OpenMage |
magento-lts |
2026-04-20T16:19:55.157Z | 2026-04-20T18:10:44.490Z |
| CVE-2026-35154 |
6.3 (3.1)
|
Dell PowerProtect Data Domain appliances, version… |
Dell |
PowerProtect Data Domain appliances |
2026-04-20T16:50:56.856Z | 2026-04-22T03:56:08.697Z |
| CVE-2026-30269 |
9.9 (3.1)
|
Improper access control in Doorman v0.1.0 and v1.… |
n/a |
n/a |
2026-04-20T00:00:00.000Z | 2026-04-20T18:23:39.346Z |
| CVE-2026-30266 |
7.8 (3.1)
|
Insecure Permissions vulnerability in DeepCool De… |
n/a |
n/a |
2026-04-20T00:00:00.000Z | 2026-04-23T13:40:34.695Z |
| CVE-2026-28684 |
6.6 (3.1)
|
python-dotenv: Symlink following in set_key allows arb… |
theskumar |
python-dotenv |
2026-04-20T16:25:12.302Z | 2026-04-20T17:43:09.477Z |
| CVE-2026-26951 |
6.7 (3.1)
|
Dell PowerProtect Data Domain, versions 7.7.1.0 t… |
Dell |
PowerProtect Data Domain |
2026-04-20T16:44:49.612Z | 2026-04-22T03:56:07.580Z |
| CVE-2026-26943 |
7.2 (3.1)
|
Dell PowerProtect Data Domain, versions 7.7.1.0 t… |
Dell |
PowerProtect Data Domain |
2026-04-20T16:28:53.110Z | 2026-04-22T03:56:04.147Z |
| CVE-2026-26942 |
6.7 (3.1)
|
Dell PowerProtect Data Domain, versions 8.5 throu… |
Dell |
PowerProtect Data Domain |
2026-04-20T16:34:43.219Z | 2026-04-22T03:56:05.261Z |
| CVE-2026-25525 |
4.9 (3.1)
|
OpenMage LTS has Path Traversal Filter Bypass in Dataf… |
OpenMage |
magento-lts |
2026-04-20T16:14:14.366Z | 2026-04-21T13:27:55.707Z |
| CVE-2026-25524 |
8.1 (3.1)
|
OpenMage LTS's Phar Deserialization leads to Remote Co… |
OpenMage |
magento-lts |
2026-04-20T16:11:16.922Z | 2026-04-20T16:54:43.603Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-85gx-3qv6-4463 |
8.1 (3.1)
|
Dapr: Service Invocation path traversal ACL bypass | 2026-04-17T22:20:40Z | 2026-04-17T22:20:40Z |
| ghsa-5cwg-9f6j-9jvx |
5.4 (4.0)
|
Claude Code: Insecure System-Wide Configuration Loading Enables Local Privilege Escalation on Windows | 2026-04-17T22:19:38Z | 2026-04-17T22:19:38Z |
| ghsa-f7fh-qg34-x2xh |
6.3 (4.0)
|
OpenClaw: CDP /json/version WebSocket URL could pivot to untrusted second-hop targets | 2026-04-17T22:18:28Z | 2026-04-17T22:18:28Z |
| ghsa-jhpv-5j76-m56h |
6.0 (4.0)
|
OpenClaw: Sender policy bypass in host media attachment reads allows unauthorized local file disclosure | 2026-04-17T22:17:57Z | 2026-04-17T22:17:57Z |
| ghsa-66r7-m7xm-v49h |
7.1 (4.0)
|
OpenClaw: QQBot media tags could read arbitrary local files through reply text | 2026-04-17T22:17:05Z | 2026-04-17T22:17:05Z |
| ghsa-2cq5-mf3v-mx44 |
8.6 (4.0)
|
OpenClaw: busybox and toybox applet execution weakened exec approval binding | 2026-04-17T22:16:04Z | 2026-04-17T22:16:04Z |
| ghsa-7jp6-r74r-995q |
7.1 (4.0)
|
OpenClaw: Matrix profile config persistence was reachable from operator.write message tools | 2026-04-17T22:15:27Z | 2026-04-17T22:15:27Z |
| ghsa-736r-jwj6-4w23 |
8.3 (4.0)
|
OpenClaw: Sandboxed agents could escape exec routing via host=node override | 2026-04-17T22:14:56Z | 2026-04-17T22:14:56Z |
| ghsa-536q-mj95-h29h |
5.3 (4.0)
|
OpenClaw: Browser press/type interaction routes missed complete navigation guard coverage | 2026-04-17T22:14:29Z | 2026-04-17T22:14:29Z |
| ghsa-qmwg-qprg-3j38 |
5.9 (4.0)
|
OpenClaw: Browser interaction routes could pivot into local CDP and regain file reads | 2026-04-17T22:14:20Z | 2026-04-17T22:14:20Z |
| ghsa-939r-rj45-g2rj |
8.6 (4.0)
|
OpenClaw: Workspace provider auth choices could auto-enable untrusted provider plugins | 2026-04-17T22:12:49Z | 2026-04-17T22:12:49Z |
| ghsa-527m-976r-jf79 |
6.3 (4.0)
|
OpenClaw: Existing-session browser interaction routes bypassed SSRF policy enforcement | 2026-04-17T22:11:33Z | 2026-04-17T22:11:33Z |
| ghsa-rj2p-j66c-mgqh |
6.9 (4.0)
|
OpenClaw: Browser tabs action select and close routes bypassed SSRF policy | 2026-04-17T22:01:57Z | 2026-04-17T22:01:57Z |
| ghsa-f3h5-h452-vp3j |
5.3 (4.0)
|
OpenClaw: Nostr profile mutation routes allowed operator.write config persistence | 2026-04-17T22:00:59Z | 2026-04-17T22:00:59Z |
| ghsa-525j-hqq2-66r4 |
7.5 (4.0)
|
OpenClaw: Sandbox browser CDP relay could expose DevTools protocol on 0.0.0.0 | 2026-04-17T21:59:55Z | 2026-04-17T21:59:55Z |
| ghsa-82qx-6vj7-p8m2 |
7.1 (4.0)
|
OpenClaw: Channel setup catalog lookups could include untrusted workspace plugin shadows | 2026-04-17T21:58:46Z | 2026-04-17T21:58:46Z |
| ghsa-jf25-7968-h2h5 |
5.3 (4.0)
|
OpenClaw: screen_record outPath bypassed workspace-only filesystem guard | 2026-04-17T21:58:24Z | 2026-04-17T21:58:24Z |
| ghsa-53vx-pmqw-863c |
6.9 (4.0)
|
OpenClaw: Browser SSRF policy default allowed private-network navigation | 2026-04-17T21:58:15Z | 2026-04-17T21:58:15Z |
| ghsa-xq94-r468-qwgj |
6.3 (4.0)
|
OpenClaw: Browser SSRF hostname validation could be bypassed by DNS rebinding | 2026-04-17T21:58:01Z | 2026-04-17T21:58:01Z |
| ghsa-2767-2q9v-9326 |
5.3 (4.0)
|
OpenClaw: QQBot reply media URL handling could trigger SSRF and re-upload fetched bytes | 2026-04-17T21:57:31Z | 2026-04-17T21:57:31Z |
| ghsa-7wv4-cc7p-jhxc |
6.8 (4.0)
|
OpenClaw: Workspace .env could inject OpenClaw runtime-control variables | 2026-04-17T21:56:12Z | 2026-04-17T21:56:12Z |
| ghsa-c9h3-5p7r-mrjh |
5.3 (4.0)
|
OpenClaw: Discord event cover images bypassed sandbox media normalization | 2026-04-17T21:56:04Z | 2026-04-17T21:56:04Z |
| ghsa-49cg-279w-m73x |
6.0 (4.0)
|
OpenClaw: Empty approver lists could grant explicit approval authorization | 2026-04-17T21:55:54Z | 2026-04-17T21:55:54Z |
| ghsa-7g8c-cfr3-vqqr |
6.6 (4.0)
|
OpenClaw: Agent hook events could enqueue trusted system events from unsanitized external input | 2026-04-17T21:55:20Z | 2026-04-17T21:55:21Z |
| ghsa-vfp4-8x56-j7c5 |
7.1 (4.0)
|
OpenClaw: Exec environment denylist missed high-risk interpreter startup variables | 2026-04-17T21:54:20Z | 2026-04-17T21:54:21Z |
| ghsa-j6c7-3h5x-99g9 |
6.3 (4.0)
|
OpenClaw: Shell-wrapper detection missed env-argv assignment injection forms | 2026-04-17T21:53:36Z | 2026-04-17T21:53:36Z |
| ghsa-5gjc-grvm-m88j |
4.9 (4.0)
|
OpenClaw: Memory dreaming config persistence was reachable from operator.write commands | 2026-04-17T21:53:17Z | 2026-04-17T21:53:17Z |
| ghsa-gc9r-867r-j85f |
1.7 (4.0)
|
OpenClaw: Microsoft Teams SSO invoke handler missed sender authorization checks | 2026-04-17T21:51:04Z | 2026-04-17T21:51:04Z |
| ghsa-r77c-2cmr-7p47 |
2.3 (4.0)
|
OpenClaw: Delivery queue recovery could lose group tool-policy context for media replay | 2026-04-17T21:50:55Z | 2026-04-17T21:50:55Z |
| ghsa-g375-h3v6-4873 |
6.0 (4.0)
|
OpenClaw: Heartbeat owner downgrade missed local async exec completion events | 2026-04-17T21:48:57Z | 2026-04-17T21:48:57Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-816 |
|
TensorFlow is an open source platform for machine learning. In affected versions the impl… | tensorflow-gpu | 2021-11-05T22:15:00Z | 2021-12-09T06:35:42.527822Z |
| pysec-2021-815 |
|
TensorFlow is an open source platform for machine learning. In affected versions the code… | tensorflow-gpu | 2021-11-05T22:15:00Z | 2021-12-09T06:35:42.346240Z |
| pysec-2021-814 |
|
TensorFlow is an open source platform for machine learning. In affected versions the impl… | tensorflow-gpu | 2021-11-05T22:15:00Z | 2021-12-09T06:35:42.190672Z |
| pysec-2021-810 |
|
TensorFlow is an open source platform for machine learning. In affected versions while ca… | tensorflow-gpu | 2021-11-05T22:15:00Z | 2021-12-09T06:35:41.560413Z |
| pysec-2021-627 |
|
TensorFlow is an open source platform for machine learning. In affected versions the shap… | tensorflow-cpu | 2021-11-05T22:15:00Z | 2021-12-09T06:35:10.125473Z |
| pysec-2021-618 |
|
TensorFlow is an open source platform for machine learning. In affected versions the impl… | tensorflow-cpu | 2021-11-05T22:15:00Z | 2021-12-09T06:35:08.821435Z |
| pysec-2021-617 |
|
TensorFlow is an open source platform for machine learning. In affected versions the code… | tensorflow-cpu | 2021-11-05T22:15:00Z | 2021-12-09T06:35:08.671870Z |
| pysec-2021-616 |
|
TensorFlow is an open source platform for machine learning. In affected versions the impl… | tensorflow-cpu | 2021-11-05T22:15:00Z | 2021-12-09T06:35:08.527679Z |
| pysec-2021-612 |
|
TensorFlow is an open source platform for machine learning. In affected versions while ca… | tensorflow-cpu | 2021-11-05T22:15:00Z | 2021-12-09T06:35:07.917442Z |
| pysec-2021-410 |
|
TensorFlow is an open source platform for machine learning. In affected versions the shap… | tensorflow | 2021-11-05T22:15:00Z | 2021-11-13T06:52:44.955817Z |
| pysec-2021-401 |
|
TensorFlow is an open source platform for machine learning. In affected versions the impl… | tensorflow | 2021-11-05T22:15:00Z | 2021-11-13T06:52:43.607331Z |
| pysec-2021-400 |
|
TensorFlow is an open source platform for machine learning. In affected versions the code… | tensorflow | 2021-11-05T22:15:00Z | 2021-11-13T06:52:43.429056Z |
| pysec-2021-399 |
|
TensorFlow is an open source platform for machine learning. In affected versions the impl… | tensorflow | 2021-11-05T22:15:00Z | 2021-11-13T06:52:43.264871Z |
| pysec-2021-395 |
|
TensorFlow is an open source platform for machine learning. In affected versions while ca… | tensorflow | 2021-11-05T22:15:00Z | 2021-11-13T06:52:42.645758Z |
| pysec-2021-833 |
|
TensorFlow is an open source platform for machine learning. In affected versions the impl… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:45.112404Z |
| pysec-2021-831 |
|
TensorFlow is an open source platform for machine learning. In affected versions the impl… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:44.787766Z |
| pysec-2021-830 |
|
TensorFlow is an open source platform for machine learning. In affected versions the impl… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:44.623762Z |
| pysec-2021-826 |
|
TensorFlow is an open source platform for machine learning. In affected versions the code… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:44.063409Z |
| pysec-2021-824 |
|
TensorFlow is an open source platform for machine learning. In affected versions the proc… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:43.751303Z |
| pysec-2021-822 |
|
TensorFlow is an open source platform for machine learning. In affected versions the shap… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:43.442119Z |
| pysec-2021-821 |
|
TensorFlow is an open source platform for machine learning. In affected versions the shap… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:43.281523Z |
| pysec-2021-819 |
|
TensorFlow is an open source platform for machine learning. In affected versions the shap… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:42.944198Z |
| pysec-2021-818 |
|
TensorFlow is an open source platform for machine learning. In affected versions the shap… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:42.767652Z |
| pysec-2021-813 |
|
TensorFlow is an open source platform for machine learning. In affected versions the shap… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:42.034732Z |
| pysec-2021-812 |
|
TensorFlow is an open source platform for machine learning. In affected versions during T… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:41.878388Z |
| pysec-2021-811 |
|
TensorFlow is an open source platform for machine learning. In affected versions an attac… | tensorflow-gpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:41.718393Z |
| pysec-2021-635 |
|
TensorFlow is an open source platform for machine learning. In affected versions the impl… | tensorflow-cpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:11.266312Z |
| pysec-2021-633 |
|
TensorFlow is an open source platform for machine learning. In affected versions the impl… | tensorflow-cpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:10.967537Z |
| pysec-2021-632 |
|
TensorFlow is an open source platform for machine learning. In affected versions the impl… | tensorflow-cpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:10.813181Z |
| pysec-2021-628 |
|
TensorFlow is an open source platform for machine learning. In affected versions the code… | tensorflow-cpu | 2021-11-05T21:15:00Z | 2021-12-09T06:35:10.275299Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1768 | Malicious code in legacy-shared-frontend (npm) | 2026-03-18T12:57:11Z | 2026-03-23T05:16:28Z |
| mal-2026-1767 | Malicious code in kmnb (npm) | 2026-03-18T12:56:55Z | 2026-03-23T05:16:28Z |
| mal-2026-1766 | Malicious code in kkkaremnnn (npm) | 2026-03-18T12:56:54Z | 2026-03-23T05:16:28Z |
| mal-2026-1765 | Malicious code in kkkaremnn (npm) | 2026-03-18T12:56:53Z | 2026-03-23T05:16:28Z |
| mal-2026-1764 | Malicious code in kkkaremm (npm) | 2026-03-18T12:56:52Z | 2026-03-23T05:16:28Z |
| mal-2026-1763 | Malicious code in karemzz (npm) | 2026-03-18T12:56:40Z | 2026-03-23T05:16:28Z |
| mal-2026-1762 | Malicious code in karemm4 (npm) | 2026-03-18T12:56:39Z | 2026-03-23T05:16:28Z |
| mal-2026-1761 | Malicious code in karem9 (npm) | 2026-03-18T12:56:38Z | 2026-03-23T05:16:28Z |
| mal-2026-1760 | Malicious code in karem3 (npm) | 2026-03-18T12:56:38Z | 2026-03-23T05:16:28Z |
| mal-2026-1759 | Malicious code in karem2 (npm) | 2026-03-18T12:56:37Z | 2026-03-23T05:16:28Z |
| mal-2026-1758 | Malicious code in jwtenv (npm) | 2026-03-18T12:56:27Z | 2026-03-23T05:16:28Z |
| mal-2026-1757 | Malicious code in jsondatahandle (npm) | 2026-03-18T12:56:07Z | 2026-03-23T05:16:28Z |
| mal-2026-1756 | Malicious code in js-to-solve (npm) | 2026-03-18T12:55:50Z | 2026-03-23T05:16:28Z |
| mal-2026-1755 | Malicious code in iron-demo-helpers (npm) | 2026-03-18T12:55:10Z | 2026-03-23T05:16:28Z |
| mal-2026-1754 | Malicious code in ipherr (npm) | 2026-03-18T12:55:09Z | 2026-03-23T05:16:28Z |
| mal-2026-1753 | Malicious code in internal-secret-project-1234 (npm) | 2026-03-18T12:54:57Z | 2026-03-23T05:16:28Z |
| mal-2026-1752 | Malicious code in internal-api-insights (npm) | 2026-03-18T12:54:54Z | 2026-03-23T05:16:28Z |
| mal-2026-1751 | Malicious code in inter-site-components (npm) | 2026-03-18T12:54:54Z | 2026-03-23T05:16:28Z |
| mal-2026-1750 | Malicious code in integration-icons (npm) | 2026-03-18T12:54:53Z | 2026-03-23T05:16:28Z |
| mal-2026-1749 | Malicious code in initial-path32 (npm) | 2026-03-18T12:54:51Z | 2026-03-23T05:16:28Z |
| mal-2026-1748 | Malicious code in initial-path21 (npm) | 2026-03-18T12:54:42Z | 2026-03-23T05:16:28Z |
| mal-2026-1747 | Malicious code in iconicwp-website (npm) | 2026-03-18T12:54:26Z | 2026-03-23T05:16:27Z |
| mal-2026-1746 | Malicious code in hydra-node-consent-sdk (npm) | 2026-03-18T12:54:22Z | 2026-03-23T05:16:27Z |
| mal-2026-1745 | Malicious code in hydra-consent-sdk (npm) | 2026-03-18T12:54:21Z | 2026-03-23T05:16:27Z |
| mal-2026-1744 | Malicious code in house-click (npm) | 2026-03-18T12:54:07Z | 2026-03-23T05:16:27Z |
| mal-2026-1743 | Malicious code in haodesk-ui (npm) | 2026-03-18T12:53:39Z | 2026-03-23T05:16:27Z |
| mal-2026-1742 | Malicious code in google-audit-tool (npm) | 2026-03-18T12:53:06Z | 2026-03-23T05:16:27Z |
| mal-2026-1741 | Malicious code in frontastic (npm) | 2026-03-18T12:52:10Z | 2026-03-23T05:16:27Z |
| mal-2026-1740 | Malicious code in fixerpabo_jkbts (npm) | 2026-03-18T12:51:38Z | 2026-03-23T05:16:27Z |
| mal-2026-1739 | Malicious code in fhgfhgfhfghhffhfgh (npm) | 2026-03-18T12:51:21Z | 2026-03-23T05:16:27Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2086 | Jenkins: Mehrere Schwachstellen | 2025-09-17T22:00:00.000+00:00 | 2025-09-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2085 | Red Hat OpenShift Service Mesh: Mehrere Schwachstellen | 2025-09-17T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2084 | Aruba ClearPass Policy Manager: Schwachstelle ermöglicht Cross Site Scripting | 2025-09-17T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-2083 | Ruby: Schwachstelle ermöglicht Denial of Service | 2025-09-17T22:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2025-2082 | Proxmox Virtual Environment: Schwachstelle ermöglicht Man-in-the-Middle-Angriffe | 2025-09-17T22:00:00.000+00:00 | 2025-11-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2081 | cPanel cPanel/WHM: Schwachstelle ermöglicht Denial of Service | 2025-09-17T22:00:00.000+00:00 | 2025-09-30T22:00:00.000+00:00 |
| wid-sec-w-2025-2080 | Google Chrome / Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-09-17T22:00:00.000+00:00 | 2025-11-24T23:00:00.000+00:00 |
| wid-sec-w-2025-2079 | JetBrains TeamCity: Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-2078 | Red Hat Enterprise Linux (Developer Hub): Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2025-2077 | Linux Kernel: Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-2076 | Liferay Portal: Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-2075 | Podman: Schwachstelle ermöglicht Manipulation von Dateien | 2025-09-16T22:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2074 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2025-12-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2073 | ESRI ArcGIS: Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2025-09-29T22:00:00.000+00:00 |
| wid-sec-w-2025-2072 | IBM App Connect Enterprise: Schwachstelle ermöglicht Denial of Service | 2025-09-16T22:00:00.000+00:00 | 2025-09-16T22:00:00.000+00:00 |
| wid-sec-w-2025-2071 | WatchGuard Firebox: Schwachstelle ermöglicht Codeausführung | 2025-09-16T22:00:00.000+00:00 | 2025-11-12T23:00:00.000+00:00 |
| wid-sec-w-2025-2070 | Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-09-16T22:00:00.000+00:00 | 2025-09-16T22:00:00.000+00:00 |
| wid-sec-w-2025-2069 | Microsoft Edge (Android): Schwachstelle ermöglicht Darstellen falscher Informationen | 2025-09-16T22:00:00.000+00:00 | 2025-09-16T22:00:00.000+00:00 |
| wid-sec-w-2025-2068 | Aruba EdgeConnect: Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-2067 | JasPer: Schwachstelle ermöglicht Codeausführung | 2025-09-16T22:00:00.000+00:00 | 2025-09-16T22:00:00.000+00:00 |
| wid-sec-w-2025-2066 | Autodesk AutoCAD: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-09-16T22:00:00.000+00:00 | 2025-09-16T22:00:00.000+00:00 |
| wid-sec-w-2025-2065 | IBM AIX: Schwachstelle ermöglicht ermöglicht Privilegieneskalation | 2025-09-16T22:00:00.000+00:00 | 2025-09-16T22:00:00.000+00:00 |
| wid-sec-w-2025-2064 | Liferay Portal und DXP: Mehrere Schwachstellen | 2025-09-15T22:00:00.000+00:00 | 2025-09-15T22:00:00.000+00:00 |
| wid-sec-w-2025-2063 | Apple macOS Sequoia, Sonoma und Tahoe: Mehrere Schwachstellen | 2025-09-15T22:00:00.000+00:00 | 2025-10-12T22:00:00.000+00:00 |
| wid-sec-w-2025-2062 | TYPO3 Extension: Mehrere Schwachstellen | 2025-09-15T22:00:00.000+00:00 | 2025-09-16T22:00:00.000+00:00 |
| wid-sec-w-2025-2061 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2025-09-15T22:00:00.000+00:00 | 2025-09-16T22:00:00.000+00:00 |
| wid-sec-w-2025-2060 | VMware Tanzu Spring Framework und Spring Security: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-09-15T22:00:00.000+00:00 | 2025-12-07T23:00:00.000+00:00 |
| wid-sec-w-2025-2059 | Apple Xcode: Mehrere Schwachstellen | 2025-09-15T22:00:00.000+00:00 | 2025-09-15T22:00:00.000+00:00 |
| wid-sec-w-2025-2058 | Apple Safari: Mehrere Schwachstellen | 2025-09-15T22:00:00.000+00:00 | 2025-11-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2057 | IBM App Connect Enterprise: Schwachstelle ermöglicht Darstellen falscher Informationen | 2025-09-15T22:00:00.000+00:00 | 2025-09-15T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-23-257-03 | Siemans QMS Automotive | 2023-09-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-257-02 | Siemens Parasolid | 2023-09-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-257-01 | Siemens SIMATIC, SIPLUS Products | 2023-09-12T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-23-250-03 | Socomec MOD3GP-SY-120K | 2023-09-07T06:00:00.000000Z | 2023-09-07T06:00:00.000000Z |
| icsa-23-250-02 | Phoenix Contact TC ROUTER and TC CLOUD CLIENT | 2023-09-07T06:00:00.000000Z | 2023-09-07T06:00:00.000000Z |
| icsa-23-250-01 | Dover Fueling Solutions MAGLINK LX Console | 2023-09-07T06:00:00.000000Z | 2023-09-07T06:00:00.000000Z |
| icsa-25-324-04 | Festo MSE6-C2M/D2M/E2M | 2023-09-05T10:00:00.000000Z | 2025-10-01T10:00:00.000000Z |
| icsma-23-248-01 | Softneta MedDream PACS Premium | 2023-09-05T06:00:00.000000Z | 2023-09-05T06:00:00.000000Z |
| icsa-23-248-01 | Fujitsu Limited Real-time Video Transmission Gear "IP series" | 2023-09-05T06:00:00.000000Z | 2023-09-05T06:00:00.000000Z |
| icsa-23-243-04 | Digi RealPort Protocol | 2023-08-31T06:00:00.000000Z | 2023-08-31T06:00:00.000000Z |
| icsa-23-243-03 | PTC Kepware KepServerEX (Update A) | 2023-08-31T06:00:00.000000Z | 2023-10-12T06:00:00.000000Z |
| icsa-23-243-02 | GE Digital CIMPLICITY | 2023-08-31T06:00:00.000000Z | 2023-08-31T06:00:00.000000Z |
| icsa-23-243-01 | ARDEREG Sistemas SCADA | 2023-08-31T06:00:00.000000Z | 2023-08-31T06:00:00.000000Z |
| icsa-25-343-02 | Festo LX Appliance | 2023-08-29T10:00:00.000000Z | 2025-10-01T10:00:00.000000Z |
| icsa-23-241-01 | PTC Codebeamer | 2023-08-29T06:00:00.000000Z | 2023-08-29T06:00:00.000000Z |
| icsa-23-236-06 | Rockwell Automation Select Distributed I/O Communication Modules | 2023-08-24T06:00:00.000000Z | 2023-08-24T06:00:00.000000Z |
| icsa-23-236-05 | CODESYS Development System | 2023-08-24T06:00:00.000000Z | 2023-08-24T06:00:00.000000Z |
| icsa-23-236-04 | CODESYS Development System | 2023-08-24T06:00:00.000000Z | 2023-08-24T06:00:00.000000Z |
| icsa-23-236-03 | CODESYS Development System | 2023-08-24T06:00:00.000000Z | 2023-08-24T06:00:00.000000Z |
| icsa-23-236-02 | OPTO 22 SNAP PAC S1 | 2023-08-24T06:00:00.000000Z | 2023-08-24T06:00:00.000000Z |
| icsa-23-236-01 | KNX Protocol | 2023-08-24T06:00:00.000000Z | 2023-08-24T06:00:00.000000Z |
| icsa-23-234-03 | Rockwell Automation ThinManager ThinServer | 2023-08-22T06:00:00.000000Z | 2023-08-22T06:00:00.000000Z |
| icsa-23-234-02 | Trane Thermostats | 2023-08-22T06:00:00.000000Z | 2023-08-22T06:00:00.000000Z |
| icsa-23-234-01 | Hitachi Energy AFF66x | 2023-08-22T06:00:00.000000Z | 2023-08-22T06:00:00.000000Z |
| icsa-23-229-03 | Schneider Electric PowerLogic ION7400 / PM8000 / ION8650 / ION8800 / ION9000 Power Meters | 2023-08-17T06:00:00.000000Z | 2023-08-17T06:00:00.000000Z |
| icsa-23-229-01 | ICONICS and Mitsubishi Electric Products | 2023-08-17T06:00:00.000000Z | 2023-08-17T06:00:00.000000Z |
| icsa-23-227-02 | Rockwell Automation Armor PowerFlex | 2023-08-15T06:00:00.000000Z | 2023-08-15T06:00:00.000000Z |
| icsa-23-227-01 | Schneider Electric EcoStruxure Control Expert, Process Expert, Modicon M340, M580 and M580 CPU | 2023-08-15T06:00:00.000000Z | 2023-08-15T06:00:00.000000Z |
| icsa-23-220-02 | Hitachi Energy RTU500 series | 2023-08-08T06:00:00.000000Z | 2023-08-08T06:00:00.000000Z |
| icsa-23-220-01 | Schneider Electric IGSS | 2023-08-08T06:00:00.000000Z | 2023-10-12T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-dcnm-xss-vulns-guuj39gh | Cisco Data Center Network Manager Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-ssrf-f2vx6q5p | Cisco Data Center Network Manager Server-Side Request Forgery Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-sql-inj-oaqoobp | Cisco Data Center Network Manager SQL Injection Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-info-disc-qcsjb6yg | Cisco Data Center Network Manager Information Disclosure Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-cert-check-bdzzv9t3 | Cisco Data Center Network Manager Certificate Validation Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-authbypass-ohbpbxu | Cisco Data Center Network Manager Authorization Bypass Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-api-path-tptapx2p | Cisco Data Center Network Manager REST API Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssmor-mdcwkt2x | Cisco Smart Software Manager Satellite Open Redirect Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssm-sqi-h5fdvzwp | Cisco Smart Software Manager Satellite SQL Injection Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssm-sc-jd42d4tq | Cisco Smart Software Manager Satellite Static Credential Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssm-multici-pgg5wm5a | Cisco Smart Software Manager Satellite Web UI Command Injection Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-asr-mem-leak-dos-mtwghkk3 | Cisco StarOS IPv4 Denial of Service Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-amp-imm-dll-5paz3hrv | Cisco Advanced Malware Protection for Endpoints and Immunet for Windows DLL Hijacking Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dnsmasq-dns-2021-c5mrdf3g | Multiple Vulnerabilities in dnsmasq DNS Forwarder Affecting Cisco Products: January 2021 | 2021-01-19T12:15:00+00:00 | 2021-08-30T17:24:42+00:00 |
| cisco-sa-webex-teams-7zmcxg99 | Cisco Jabber and Webex Client Software Shared File Manipulation Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-06-16T15:29:27+00:00 |
| cisco-sa-webex-open-redirect-pwvbq2q | Cisco Webex Meetings Open Redirect Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-webex-brutef-hostkey-fwrmxvf | Cisco Webex Meetings and Cisco Webex Meetings Server Host Key Brute Forcing Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-staros-file-read-l3rdvtey | Cisco StarOS for Cisco ASR 5000 Series Routers Arbitrary File Read Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-snort-tfo-bypass-mmzzrtes | Multiple Cisco Products Snort TCP Fast Open File Policy Bypass Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-05-20T13:27:19+00:00 |
| cisco-sa-snort-filepolbypass-67dewme2 | Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-04-30T16:09:05+00:00 |
| cisco-sa-snort-app-bypass-csbycatq | Multiple Cisco Products Snort Application Detection Engine Policy Bypass Vulnerability | 2021-01-13T16:00:00+00:00 | 2022-05-16T18:45:16+00:00 |
| cisco-sa-rv-stored-xss-lptq3eqc | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Stored Cross-Site Scripting Vulnerabilities | 2021-01-13T16:00:00+00:00 | 2021-01-14T15:25:16+00:00 |
| cisco-sa-rv-overflow-wunugv4u | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilities | 2021-01-13T16:00:00+00:00 | 2021-01-19T16:21:32+00:00 |
| cisco-sa-rv-command-inject-lbdq2krn | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Command Injection Vulnerabilities | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-proximity-dll-uvw4vhpm | Cisco Proximity Desktop for Windows DLL Hijacking Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-nfvis-xss-smsz5vhb | Cisco Enterprise NFV Infrastructure Software Cross-Site Scripting Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-multi-vuln-finesse-qp6gbuo2 | Multiple Cisco Products OpenSocial Gadget Editor Vulnerabilities | 2021-01-13T16:00:00+00:00 | 2024-09-03T13:04:54+00:00 |
| cisco-sa-ipcameras-dos-9zdzcufq | Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Denial of Service Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-fmc-xee-dfzardcs | Cisco Firepower Management Center XML Entity Expansion Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-fmc-stored-xss-djkfczf2 | Cisco Firepower Management Center Stored Cross-Site Scripting Vulnerabilities | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-68767 | hfsplus: Verify inode mode when loading from disk | 2026-01-02T00:00:00.000Z | 2026-02-18T14:15:40.000Z |
| msrc_cve-2025-68766 | irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc() | 2026-01-02T00:00:00.000Z | 2026-02-21T04:08:11.000Z |
| msrc_cve-2025-68765 | mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add() | 2026-01-02T00:00:00.000Z | 2026-02-18T02:51:33.000Z |
| msrc_cve-2025-68764 | NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags | 2026-01-02T00:00:00.000Z | 2026-02-18T02:50:46.000Z |
| msrc_cve-2025-68763 | crypto: starfive - Correctly handle return of sg_nents_for_len | 2026-01-02T00:00:00.000Z | 2026-02-21T04:08:57.000Z |
| msrc_cve-2025-68759 | wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring() | 2026-01-02T00:00:00.000Z | 2026-02-18T02:52:26.000Z |
| msrc_cve-2025-68758 | backlight: led-bl: Add devlink to supplier LEDs | 2026-01-02T00:00:00.000Z | 2026-02-21T04:09:56.000Z |
| msrc_cve-2025-68757 | drm/vgem-fence: Fix potential deadlock on release | 2026-01-02T00:00:00.000Z | 2026-02-18T02:53:29.000Z |
| msrc_cve-2025-68756 | block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set->tag_list_lock | 2026-01-02T00:00:00.000Z | 2026-02-18T02:54:14.000Z |
| msrc_cve-2025-68755 | staging: most: remove broken i2c driver | 2026-01-02T00:00:00.000Z | 2026-02-21T04:05:35.000Z |
| msrc_cve-2025-68753 | ALSA: firewire-motu: add bounds check in put_user loop for DSP events | 2026-01-02T00:00:00.000Z | 2026-02-21T04:06:54.000Z |
| msrc_cve-2025-68471 | Avahi has a reachable assertion in lookup_start | 2026-01-02T00:00:00.000Z | 2026-02-18T14:12:53.000Z |
| msrc_cve-2025-68468 | Avahi has a reachable assertion in lookup_multicast_callback | 2026-01-02T00:00:00.000Z | 2026-02-18T14:12:12.000Z |
| msrc_cve-2025-68276 | Avahi has a reachable assertion in avahi_wide_area_scan_cache | 2026-01-02T00:00:00.000Z | 2026-02-18T14:11:33.000Z |
| msrc_cve-2025-68151 | CoreDNS gRPC/HTTPS/HTTP3 servers lack resource limits, enabling DoS via unbounded connections and oversized messages | 2026-01-02T00:00:00.000Z | 2026-02-19T01:14:17.000Z |
| msrc_cve-2025-62291 | In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious EAP-MSCHAPv2 server can send a crafted message of size 6 through 8, and cause an integer underflow that potentially results in a heap-based buffer overflow. | 2026-01-02T00:00:00.000Z | 2026-02-18T14:53:23.000Z |
| msrc_cve-2025-56226 | Libsndfile <=1.2.2 contains a memory leak vulnerability in the mpeg_l3_encoder_init() function within the mpeg_l3_encode.c file. | 2026-01-02T00:00:00.000Z | 2026-02-18T15:03:32.000Z |
| msrc_cve-2025-24528 | In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash. | 2026-01-02T00:00:00.000Z | 2026-02-18T15:03:11.000Z |
| msrc_cve-2025-15444 | Crypt::Sodium::XS module versions prior to 0.000042, for Perl, include a vulnerable version of libsodium | 2026-01-02T00:00:00.000Z | 2026-02-21T03:41:16.000Z |
| msrc_cve-2025-15281 | wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory | 2026-01-02T00:00:00.000Z | 2026-02-18T15:01:17.000Z |
| msrc_cve-2025-15224 | libssh key passphrase bypass without agent set | 2026-01-02T00:00:00.000Z | 2026-03-03T01:36:39.000Z |
| msrc_cve-2025-15079 | libssh global known_hosts override | 2026-01-02T00:00:00.000Z | 2026-03-03T01:36:49.000Z |
| msrc_cve-2025-14819 | OpenSSL partial chain store policy bypass | 2026-01-02T00:00:00.000Z | 2026-02-21T03:37:04.000Z |
| msrc_cve-2025-14524 | bearer token leak on cross-protocol redirect | 2026-01-02T00:00:00.000Z | 2026-03-10T01:38:55.000Z |
| msrc_cve-2025-14017 | broken TLS options for threaded LDAPS | 2026-01-02T00:00:00.000Z | 2026-02-21T03:15:49.000Z |
| msrc_cve-2025-13151 | CVE-2025-13151 | 2026-01-02T00:00:00.000Z | 2026-02-19T01:11:53.000Z |
| msrc_cve-2025-13034 | No QUIC certificate pinning with GnuTLS | 2026-01-02T00:00:00.000Z | 2026-02-21T04:14:52.000Z |
| msrc_cve-2025-14174 | Chromium: CVE-2025-14174 Out of bounds memory access in ANGLE | 2025-12-09T08:00:00.000Z | 2025-12-15T08:00:00.000Z |
| msrc_cve-2025-65046 | Microsoft Edge (Chromium-based) Spoofing Vulnerability | 2025-12-09T00:00:00.000Z | 2026-02-20T08:00:00.000Z |
| msrc_cve-2025-65041 | Microsoft Partner Center Elevation of Privilege Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-18T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15416-1 | libpoppler-cpp2-25.08.0-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15415-1 | libIex-3_3-32-3.3.5-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15414-1 | iperf-3.19.1-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15413-1 | ghostscript-10.05.1-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15412-1 | agama-17+60.68fdb92ec-26.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15411-1 | gnutls-3.8.10-1.1 on GA media | 2025-08-05T00:00:00Z | 2025-08-05T00:00:00Z |
| opensuse-su-2025:15410-1 | erlang-rabbitmq-client-3.13.7-5.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15409-1 | python313-3.13.5-4.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15408-1 | python312-3.12.11-4.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15407-1 | python311-3.11.13-4.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15406-1 | kubeshark-cli-52.8.0-1.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15405-1 | govulncheck-vulndb-0.0.20250730T213748-1.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15404-1 | python39-3.9.23-4.1 on GA media | 2025-08-03T00:00:00Z | 2025-08-03T00:00:00Z |
| opensuse-su-2025:15403-1 | python314-3.14.0~rc1-2.1 on GA media | 2025-08-03T00:00:00Z | 2025-08-03T00:00:00Z |
| opensuse-su-2025:15402-1 | python310-3.10.18-4.1 on GA media | 2025-08-03T00:00:00Z | 2025-08-03T00:00:00Z |
| opensuse-su-2025:15401-1 | liblua5_5-5-5.5.0~beta1-1.1 on GA media | 2025-08-03T00:00:00Z | 2025-08-03T00:00:00Z |
| opensuse-su-2025:15400-1 | grub2-2.12-56.1 on GA media | 2025-08-03T00:00:00Z | 2025-08-03T00:00:00Z |
| opensuse-su-2025:15399-1 | chromedriver-138.0.7204.183-1.1 on GA media | 2025-08-01T00:00:00Z | 2025-08-01T00:00:00Z |
| opensuse-su-2025:15398-1 | kwctl-1.27.1-1.1 on GA media | 2025-07-31T00:00:00Z | 2025-07-31T00:00:00Z |
| opensuse-su-2025:15397-1 | gdk-pixbuf-devel-2.42.12-4.1 on GA media | 2025-07-31T00:00:00Z | 2025-07-31T00:00:00Z |
| opensuse-su-2025:15396-1 | ffmpeg-7-7.1.1-8.1 on GA media | 2025-07-30T00:00:00Z | 2025-07-30T00:00:00Z |
| opensuse-su-2025:15395-1 | docker-28.3.3_ce-26.1 on GA media | 2025-07-30T00:00:00Z | 2025-07-30T00:00:00Z |
| opensuse-su-2025:15394-1 | libsuricata8_0_0-8.0.0-1.1 on GA media | 2025-07-28T00:00:00Z | 2025-07-28T00:00:00Z |
| opensuse-su-2025:15393-1 | java-21-openj9-21.0.8.0-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
| opensuse-su-2025:15392-1 | java-1_8_0-openj9-1.8.0.462-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
| opensuse-su-2025:15391-1 | java-17-openj9-17.0.16.0-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
| opensuse-su-2025:15390-1 | java-11-openj9-11.0.28.0-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
| opensuse-su-2025:15389-1 | forgejo-longterm-11.0.3-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
| opensuse-su-2025:15388-1 | rpi-imager-1.9.5-1.1 on GA media | 2025-07-26T00:00:00Z | 2025-07-26T00:00:00Z |
| opensuse-su-2025:15387-1 | libmozjs-128-0-128.13.0-1.1 on GA media | 2025-07-26T00:00:00Z | 2025-07-26T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:1714 | Red Hat Security Advisory: wireshark security update | 2026-02-02T13:03:43+00:00 | 2026-03-18T03:17:13+00:00 |
| rhsa-2026:1706 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T12:38:43+00:00 | 2026-04-12T14:07:21+00:00 |
| rhsa-2026:1704 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-02-02T11:50:53+00:00 | 2026-04-12T14:07:20+00:00 |
| rhsa-2026:1705 | Red Hat Security Advisory: gnupg2 security update | 2026-02-02T11:41:03+00:00 | 2026-04-02T23:30:15+00:00 |
| rhsa-2026:1703 | Red Hat Security Advisory: kernel security update | 2026-02-02T11:40:43+00:00 | 2026-03-18T03:17:11+00:00 |
| rhsa-2026:1702 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T10:57:18+00:00 | 2026-04-11T01:57:54+00:00 |
| rhsa-2026:1701 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T10:53:47+00:00 | 2026-04-11T01:57:53+00:00 |
| rhsa-2026:1696 | Red Hat Security Advisory: util-linux security update | 2026-02-02T10:18:28+00:00 | 2026-04-08T16:37:53+00:00 |
| rhsa-2026:1690 | Red Hat Security Advisory: kernel security update | 2026-02-02T10:10:13+00:00 | 2026-04-01T19:46:41+00:00 |
| rhsa-2026:1693 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T10:02:03+00:00 | 2026-04-12T14:07:22+00:00 |
| rhsa-2026:1617 | Red Hat Security Advisory: kernel security update | 2026-02-02T09:30:38+00:00 | 2026-03-18T03:16:54+00:00 |
| rhsa-2026:1678 | Red Hat Security Advisory: openssh security update | 2026-02-02T08:15:22+00:00 | 2026-04-13T20:01:58+00:00 |
| rhsa-2026:1677 | Red Hat Security Advisory: gnupg2 security update | 2026-02-02T07:37:37+00:00 | 2026-04-02T23:28:46+00:00 |
| rhsa-2026:1676 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-02-02T06:53:02+00:00 | 2026-04-12T14:07:19+00:00 |
| rhsa-2026:1674 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T06:47:53+00:00 | 2026-04-12T14:07:19+00:00 |
| rhsa-2026:1662 | Red Hat Security Advisory: kernel security update | 2026-02-02T04:06:07+00:00 | 2026-04-12T16:34:53+00:00 |
| rhsa-2026:1661 | Red Hat Security Advisory: kernel-rt security update | 2026-02-02T03:27:17+00:00 | 2026-04-12T16:34:50+00:00 |
| rhsa-2026:1652 | Red Hat Security Advisory: Red Hat Ceph Storage | 2026-02-02T02:51:27+00:00 | 2026-04-13T20:14:21+00:00 |
| rhsa-2026:1631 | Red Hat Security Advisory: python3 security update | 2026-02-02T02:14:51+00:00 | 2026-04-13T20:01:56+00:00 |
| rhsa-2026:1619 | Red Hat Security Advisory: python3.12-urllib3 security update | 2026-02-02T01:58:41+00:00 | 2026-04-12T14:07:17+00:00 |
| rhsa-2026:1629 | Red Hat Security Advisory: gnupg2 security update | 2026-02-02T01:57:21+00:00 | 2026-04-02T23:28:46+00:00 |
| rhsa-2026:1628 | Red Hat Security Advisory: php security update | 2026-02-02T01:57:01+00:00 | 2026-04-08T16:37:52+00:00 |
| rhsa-2026:1608 | Red Hat Security Advisory: glib2 security update | 2026-02-02T01:55:56+00:00 | 2026-04-13T20:14:19+00:00 |
| rhsa-2026:1625 | Red Hat Security Advisory: glib2 security update | 2026-02-02T01:53:11+00:00 | 2026-04-13T20:14:20+00:00 |
| rhsa-2026:1621 | Red Hat Security Advisory: gpsd security update | 2026-02-02T01:52:11+00:00 | 2026-03-18T03:17:17+00:00 |
| rhsa-2026:1624 | Red Hat Security Advisory: glib2 security update | 2026-02-02T01:49:21+00:00 | 2026-04-13T20:14:20+00:00 |
| rhsa-2026:1627 | Red Hat Security Advisory: glib2 security update | 2026-02-02T01:40:16+00:00 | 2026-04-13T20:14:21+00:00 |
| rhsa-2026:1626 | Red Hat Security Advisory: glib2 security update | 2026-02-02T01:36:56+00:00 | 2026-04-13T20:14:20+00:00 |
| rhsa-2026:1620 | Red Hat Security Advisory: python3 security update | 2026-02-02T01:25:56+00:00 | 2026-04-13T20:01:55+00:00 |
| rhsa-2026:1618 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T01:17:06+00:00 | 2026-04-12T14:07:17+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0539-1 | Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T13:33:40Z | 2026-02-15T13:33:40Z |
| suse-su-2026:0535-1 | Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T11:04:06Z | 2026-02-15T11:04:06Z |
| suse-su-2026:20436-1 | Security update for nodejs22 | 2026-02-15T08:45:21Z | 2026-02-15T08:45:21Z |
| suse-su-2026:0528-1 | Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T06:33:50Z | 2026-02-15T06:33:50Z |
| suse-su-2026:0533-1 | Security update for the Linux Kernel (Live Patch 45 for SUSE Linux Enterprise 15 SP4) | 2026-02-15T06:33:38Z | 2026-02-15T06:33:38Z |
| suse-su-2026:20435-1 | Security update for fontforge | 2026-02-14T21:30:08Z | 2026-02-14T21:30:08Z |
| suse-su-2026:0526-1 | Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4) | 2026-02-14T19:33:43Z | 2026-02-14T19:33:43Z |
| suse-su-2026:0525-1 | Security update for the Linux Kernel (Live Patch 73 for SUSE Linux Enterprise 12 SP5) | 2026-02-14T17:04:03Z | 2026-02-14T17:04:03Z |
| suse-su-2026:0524-1 | Security update for the Linux Kernel (Live Patch 72 for SUSE Linux Enterprise 12 SP5) | 2026-02-14T17:03:57Z | 2026-02-14T17:03:57Z |
| suse-su-2026:0521-1 | Security update for the Linux Kernel (Live Patch 69 for SUSE Linux Enterprise 12 SP5) | 2026-02-14T12:03:47Z | 2026-02-14T12:03:47Z |
| suse-su-2026:0518-1 | Security update for the Linux Kernel (Live Patch 64 for SUSE Linux Enterprise 12 SP5) | 2026-02-14T09:03:51Z | 2026-02-14T09:03:51Z |
| suse-su-2026:0517-1 | Security update for protobuf | 2026-02-14T08:25:01Z | 2026-02-14T08:25:01Z |
| suse-su-2026:0515-1 | Security update for the Linux Kernel (Live Patch 65 for SUSE Linux Enterprise 12 SP5) | 2026-02-13T23:04:09Z | 2026-02-13T23:04:09Z |
| suse-su-2026:20434-1 | Security update for openCryptoki | 2026-02-13T17:44:22Z | 2026-02-13T17:44:22Z |
| suse-su-2026:20345-1 | Security update for openCryptoki | 2026-02-13T17:42:31Z | 2026-02-13T17:42:31Z |
| suse-su-2026:20352-1 | Security update for protobuf | 2026-02-13T16:56:15Z | 2026-02-13T16:56:15Z |
| suse-su-2026:20350-1 | Security update for expat | 2026-02-13T16:46:23Z | 2026-02-13T16:46:23Z |
| suse-su-2026:20431-1 | Security update for patch | 2026-02-13T16:41:48Z | 2026-02-13T16:41:48Z |
| suse-su-2026:20343-1 | Security update for patch | 2026-02-13T16:41:48Z | 2026-02-13T16:41:48Z |
| suse-su-2026:0514-1 | Security update for cargo-auditable | 2026-02-13T14:57:18Z | 2026-02-13T14:57:18Z |
| suse-su-2026:0510-1 | Security update for util-linux | 2026-02-13T14:52:46Z | 2026-02-13T14:52:46Z |
| suse-su-2026:0508-1 | Security update for curl | 2026-02-13T14:50:33Z | 2026-02-13T14:50:33Z |
| suse-su-2026:0506-1 | Security update for cargo-auditable | 2026-02-13T14:32:17Z | 2026-02-13T14:32:17Z |
| suse-su-2026:0505-1 | Security update for cargo-auditable | 2026-02-13T14:31:50Z | 2026-02-13T14:31:50Z |
| suse-su-2026:0504-1 | Security update for java-1_8_0-openjdk | 2026-02-13T14:24:00Z | 2026-02-13T14:24:00Z |
| suse-su-2026:0503-1 | Security update for ImageMagick | 2026-02-13T14:23:00Z | 2026-02-13T14:23:00Z |
| suse-su-2026:20429-1 | Security update for go1.24 | 2026-02-13T11:58:52Z | 2026-02-13T11:58:52Z |
| suse-su-2026:0499-1 | Security update for glibc-livepatches | 2026-02-13T11:42:17Z | 2026-02-13T11:42:17Z |
| suse-su-2026:0498-1 | Security update for openssl1 | 2026-02-13T10:56:54Z | 2026-02-13T10:56:54Z |
| suse-su-2026:0497-1 | Security update for libsoup2 | 2026-02-13T10:56:05Z | 2026-02-13T10:56:05Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:2668 | Important: .NET 9.0 security, bug fix, and enhancement update | 2025-03-11T00:00:00Z | 2025-03-17T22:25:33Z |
| alsa-2025:2667 | Important: .NET 9.0 security, bug fix, and enhancement update | 2025-03-11T00:00:00Z | 2025-03-17T22:23:13Z |
| alsa-2025:2627 | Important: kernel security update | 2025-03-11T00:00:00Z | 2025-03-14T09:33:24Z |
| alsa-2025:2600 | Moderate: rsync security update | 2025-03-11T00:00:00Z | 2025-03-17T22:20:37Z |
| alsa-2025:2502 | Important: tigervnc security update | 2025-03-10T00:00:00Z | 2025-03-17T22:17:32Z |
| alsa-2025:2500 | Important: tigervnc security update | 2025-03-10T00:00:00Z | 2025-03-17T22:11:28Z |
| alsa-2025:2474 | Important: kernel-rt security update | 2025-03-10T00:00:00Z | 2025-03-11T12:11:16Z |
| alsa-2025:2473 | Important: kernel security update | 2025-03-10T00:00:00Z | 2025-03-11T12:09:37Z |
| alsa-2025:2452 | Important: firefox security update | 2025-03-06T00:00:00Z | 2025-03-11T12:07:11Z |
| alsa-2025:2359 | Important: firefox security update | 2025-03-05T00:00:00Z | 2025-03-21T12:18:58Z |
| alsa-2025:2035 | Important: webkit2gtk3 security update | 2025-03-03T00:00:00Z | 2025-03-11T12:06:01Z |
| alsa-2025:2034 | Important: webkit2gtk3 security update | 2025-03-03T00:00:00Z | 2025-03-11T12:02:58Z |
| alsa-2025:1917 | Important: emacs security update | 2025-02-27T00:00:00Z | 2025-03-18T07:08:51Z |
| alsa-2025:1915 | Important: emacs security update | 2025-02-27T00:00:00Z | 2025-03-18T07:05:20Z |
| alsa-2025:1743 | Important: postgresql:16 security update | 2025-02-20T00:00:00Z | 2025-02-24T10:49:59Z |
| alsa-2025:1742 | Important: postgresql security update | 2025-02-20T00:00:00Z | 2025-02-21T13:11:16Z |
| alsa-2025:1741 | Important: postgresql:15 security update | 2025-02-20T00:00:00Z | 2025-02-21T13:13:38Z |
| alsa-2025:1740 | Important: postgresql:16 security update | 2025-02-20T00:00:00Z | 2025-02-21T13:00:40Z |
| alsa-2025:1739 | Important: postgresql:15 security update | 2025-02-20T00:00:00Z | 2025-02-21T13:05:30Z |
| alsa-2025:1738 | Important: libpq security update | 2025-02-20T00:00:00Z | 2025-02-21T13:14:35Z |
| alsa-2025:1737 | Important: libpq security update | 2025-02-20T00:00:00Z | 2025-02-21T13:07:02Z |
| alsa-2025:1736 | Important: postgresql:13 security update | 2025-02-20T00:00:00Z | 2025-02-21T13:09:04Z |
| alsa-2025:1681 | Important: bind security update | 2025-02-19T00:00:00Z | 2025-02-20T12:03:24Z |
| alsa-2025:1676 | Important: bind9.16 security update | 2025-02-19T00:00:00Z | 2025-02-20T11:19:02Z |
| alsa-2025:1675 | Important: bind security update | 2025-02-19T00:00:00Z | 2025-02-20T14:49:41Z |
| alsa-2025:1673 | Important: mysql:8.0 security update | 2025-02-19T00:00:00Z | 2025-02-20T11:16:10Z |
| alsa-2025:1671 | Important: mysql security update | 2025-02-19T00:00:00Z | 2025-02-20T14:55:32Z |
| alsa-2025:1670 | Important: bind9.18 security update | 2025-02-19T00:00:00Z | 2025-02-24T10:51:31Z |
| alsa-2025:1659 | Moderate: kernel security update | 2025-02-19T00:00:00Z | 2025-03-04T08:50:23Z |
| alsa-2025:1613 | Important: nodejs:22 security update | 2025-02-17T00:00:00Z | 2025-02-18T12:04:07Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-1212 | Heap-buffer-overflow in OT::hb_ot_apply_context_t::skipping_iterator_t::next | 2022-11-26T13:00:53.392207Z | 2022-11-26T13:00:53.392505Z |
| osv-2022-1211 | Heap-buffer-overflow in bit_calc_CRC | 2022-11-26T13:00:13.775523Z | 2022-11-26T13:00:13.775771Z |
| osv-2022-1209 | Heap-buffer-overflow in OT::hb_ot_apply_context_t::skipping_iterator_t::next | 2022-11-25T13:00:49.966315Z | 2022-11-25T13:00:49.966564Z |
| osv-2022-1208 | Stack-buffer-overflow in cmap_put_ranges | 2022-11-25T13:00:40.523526Z | 2022-11-25T13:00:40.523768Z |
| osv-2022-1207 | Security exception in java.desktop/java.awt.image.DataBufferInt.<init> | 2022-11-25T13:00:24.374896Z | 2022-11-25T13:00:24.375136Z |
| osv-2022-1201 | Stack-buffer-overflow in msc_zero_object | 2022-11-24T13:00:10.344351Z | 2026-03-31T14:04:55.969741Z |
| osv-2022-1199 | Use-of-uninitialized-value in rawspeed::RawImageData::checkRowIsInitialized | 2022-11-23T13:02:10.345362Z | 2022-11-23T13:02:10.345722Z |
| osv-2022-1198 | Heap-buffer-overflow in dwg_json_LTYPE | 2022-11-23T13:02:06.623044Z | 2026-04-24T14:12:47.289879Z |
| osv-2022-1194 | Heap-buffer-overflow in sputs | 2022-11-23T13:00:27.864744Z | 2022-11-23T13:00:27.864987Z |
| osv-2022-1193 | Heap-buffer-overflow in archive_read_has_encrypted_entries | 2022-11-22T13:02:17.631310Z | 2022-11-22T13:02:17.631547Z |
| osv-2022-1188 | Stack-buffer-overflow in authentic_get_tagged_data | 2022-11-20T13:01:57.719130Z | 2026-03-31T14:04:55.181202Z |
| osv-2022-1181 | Heap-use-after-free in template_execute | 2022-11-18T13:02:20.167230Z | 2022-11-28T00:14:28.341608Z |
| osv-2022-1180 | Heap-buffer-overflow in json_common_entity_data | 2022-11-18T13:02:18.978213Z | 2022-11-18T13:02:18.978476Z |
| osv-2022-1178 | Heap-buffer-overflow in bytes_copy_rectangle_zero_padding | 2022-11-18T13:00:40.887717Z | 2022-11-27T00:20:07.053947Z |
| osv-2022-1177 | Stack-buffer-overflow in FLAC::Decoder::FuzzerDecoder::metadata_callback | 2022-11-18T13:00:31.496514Z | 2022-11-18T13:00:31.496753Z |
| osv-2022-1176 | Heap-double-free in dwg_free | 2022-11-18T13:00:26.857477Z | 2026-04-24T14:12:36.973285Z |
| osv-2022-1175 | Stack-buffer-overflow in sc_path_print | 2022-11-16T13:02:16.773258Z | 2023-04-20T22:51:33.493906Z |
| osv-2022-1174 | Heap-buffer-overflow in crc64_clmul | 2022-11-16T13:02:12.420492Z | 2023-10-19T14:04:15.204368Z |
| osv-2022-1173 | Heap-buffer-overflow in parse_content_length | 2022-11-16T13:00:11.675811Z | 2023-02-15T22:52:54.957958Z |
| osv-2022-1172 | UNKNOWN WRITE in instantiate_many::_::run::hb58bf0fc7b8817e5 | 2022-11-15T13:00:11.461532Z | 2023-02-24T02:08:37.177254Z |
| osv-2022-1169 | Heap-use-after-free in output_thread | 2022-11-12T13:02:27.360322Z | 2022-11-12T13:02:27.360588Z |
| osv-2022-1168 | Heap-buffer-overflow in parse_subrip | 2022-11-12T13:00:43.599907Z | 2023-06-22T14:16:08.910225Z |
| osv-2022-1166 | Use-of-uninitialized-value in TLSDecodeHandshakeHello | 2022-11-12T13:00:09.891864Z | 2022-11-12T13:00:09.892117Z |
| osv-2022-1165 | Heap-buffer-overflow in parse_content_length | 2022-11-12T13:00:05.964113Z | 2026-04-23T14:13:17.790957Z |
| osv-2022-1164 | Heap-buffer-overflow in virtio_net_queue_enable | 2022-11-11T13:02:08.720876Z | 2022-11-11T13:02:08.721115Z |
| osv-2022-1163 | Negative-size-param in mrb_str_format | 2022-11-11T13:01:06.175780Z | 2022-11-11T13:01:06.176039Z |
| osv-2022-1162 | Null-dereference READ | 2022-11-11T13:00:54.864747Z | 2022-11-11T13:00:54.864997Z |
| osv-2022-1161 | UNKNOWN READ in pack_unpack | 2022-11-10T13:02:30.999392Z | 2022-11-10T13:02:30.999645Z |
| osv-2022-1160 | Index-out-of-bounds in str_init_embed | 2022-11-10T13:02:30.022816Z | 2022-11-10T13:02:30.023077Z |
| osv-2022-1159 | Heap-buffer-overflow in LibRaw_buffer_datastream::read | 2022-11-10T13:02:24.758084Z | 2022-11-10T13:02:24.758462Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-tomcat-2023-44487 | 2025-07-17T08:09:39.495Z | 2026-02-11T09:09:18.507Z | |
| bit-sqlite-2025-6965 | Integer Truncation on SQLite | 2025-07-16T18:03:02.187Z | 2026-04-17T00:10:47.507Z |
| bit-gitlab-2025-6948 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2025-07-16T08:36:38.309Z | 2025-07-26T15:05:50.024Z |
| bit-gitlab-2025-6168 | Incorrect Authorization in GitLab | 2025-07-16T08:36:36.915Z | 2025-07-16T08:37:34.844Z |
| bit-gitlab-2025-4972 | Incorrect Authorization in GitLab | 2025-07-16T08:36:25.447Z | 2025-07-16T08:37:34.844Z |
| bit-gitlab-2025-3396 | Incorrect Authorization in GitLab | 2025-07-16T08:36:22.641Z | 2025-07-16T08:37:34.844Z |
| bit-php-2025-6491 | NULL Pointer Dereference in PHP SOAP Extension via Large XML Namespace Prefix | 2025-07-16T08:19:30.475Z | 2025-11-06T13:25:46.476Z |
| bit-php-2025-1735 | pgsql extension does not check for errors during escaping | 2025-07-16T08:19:20.063Z | 2025-11-06T13:25:46.476Z |
| bit-php-2025-1220 | Null byte termination in hostnames | 2025-07-16T08:19:12.163Z | 2025-11-06T13:25:46.476Z |
| bit-tomcat-2025-53506 | Apache Tomcat: DoS via excessive h2 streams at connection start | 2025-07-16T08:19:04.361Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2025-52520 | Apache Tomcat: DoS via integer overflow in multipart file upload | 2025-07-16T08:19:00.271Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-52434 | Apache Tomcat: APR/Native Connector crash leading to DoS | 2025-07-16T08:18:56.172Z | 2025-11-06T13:25:46.476Z |
| bit-mariadb-2025-30722 | 2025-07-16T08:17:21.862Z | 2025-11-06T13:25:46.476Z | |
| bit-mariadb-2025-30693 | 2025-07-16T08:17:14.760Z | 2025-11-06T13:25:46.476Z | |
| bit-parse-2025-53364 | Parse Server exposes the data schema via GraphQL API | 2025-07-16T08:08:21.164Z | 2025-07-16T08:37:34.844Z |
| bit-pytorch-2024-48063 | 2025-07-16T08:07:39.762Z | 2025-07-16T08:37:34.844Z | |
| bit-apache-2025-53020 | Apache HTTP Server: HTTP/2 DoS by Memory Increase | 2025-07-16T07:56:41.763Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2025-49812 | Apache HTTP Server: mod_ssl TLS upgrade attack | 2025-07-16T07:56:35.377Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2025-49630 | Apache HTTP Server: mod_proxy_http2 denial of service | 2025-07-16T07:56:28.763Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2025-23048 | Apache HTTP Server: mod_ssl access control bypass with session resumption | 2025-07-16T07:56:19.860Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2024-47252 | Apache HTTP Server: mod_ssl error log variable escaping | 2025-07-16T07:56:11.862Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2024-43394 | Apache HTTP Server: SSRF on Windows due to UNC paths | 2025-07-16T07:56:03.162Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2024-43204 | Apache HTTP Server: SSRF with mod_headers setting Content-Type header | 2025-07-16T07:55:53.967Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2024-42516 | Apache HTTP Server: HTTP response splitting | 2025-07-16T07:55:45.463Z | 2025-11-06T13:25:46.476Z |
| bit-apisix-2025-27446 | Apache APISIX Java Plugin Runner: Local listening file permissions in APISIX plugin runner allow a local attacker to elevate privileges | 2025-07-16T07:50:40.089Z | 2025-11-06T13:25:46.476Z |
| bit-kafka-2025-27817 | Apache Kafka Client: Arbitrary file read and SSRF vulnerability | 2025-07-12T05:43:25.320Z | 2025-07-12T06:15:43.482Z |
| bit-mariadb-2024-27766 | 2025-07-11T05:52:49.130Z | 2025-08-20T09:06:12.327Z | |
| bit-mariadb-2023-39593 | 2025-07-11T05:52:25.837Z | 2025-07-11T06:17:37.698Z | |
| bit-mariadb-2023-26785 | 2025-07-11T05:52:22.539Z | 2025-07-11T06:17:37.698Z | |
| bit-dotnet-2025-30399 | .NET and Visual Studio Remote Code Execution Vulnerability | 2025-07-11T05:41:36.318Z | 2025-07-11T06:17:37.698Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0409 | Multiples vulnérabilités dans SonicWall Secure Mobile Access | 2025-05-15T00:00:00.000000 | 2025-05-15T00:00:00.000000 |
| certfr-2025-avi-0408 | Multiples vulnérabilités dans les produits Microsoft | 2025-05-14T00:00:00.000000 | 2025-05-14T00:00:00.000000 |
| certfr-2025-avi-0407 | Multiples vulnérabilités dans Microsoft Azure | 2025-05-14T00:00:00.000000 | 2025-05-14T00:00:00.000000 |
| certfr-2025-avi-0406 | Vulnérabilité dans Microsoft .Net | 2025-05-14T00:00:00.000000 | 2025-05-14T00:00:00.000000 |
| certfr-2025-avi-0405 | Multiples vulnérabilités dans Microsoft Windows | 2025-05-14T00:00:00.000000 | 2025-05-14T00:00:00.000000 |
| certfr-2025-avi-0404 | Multiples vulnérabilités dans Microsoft Office | 2025-05-14T00:00:00.000000 | 2025-05-14T00:00:00.000000 |
| certfr-2025-avi-0403 | Multiples vulnérabilités dans les produits Ivanti | 2025-05-14T00:00:00.000000 | 2025-05-14T00:00:00.000000 |
| certfr-2025-avi-0402 | Multiples vulnérabilités dans les produits Intel | 2025-05-14T00:00:00.000000 | 2025-05-14T00:00:00.000000 |
| certfr-2025-avi-0401 | Multiples vulnérabilités dans Juniper Networks Secure Analytics | 2025-05-14T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| certfr-2025-avi-0400 | Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile (EPMM) | 2025-05-13T00:00:00.000000 | 2025-05-13T00:00:00.000000 |
| certfr-2025-avi-0399 | Multiples vulnérabilités dans les produits Fortinet | 2025-05-13T00:00:00.000000 | 2025-05-13T00:00:00.000000 |
| certfr-2025-avi-0398 | Vulnérabilité dans les produits Schneider Electric | 2025-05-13T00:00:00.000000 | 2025-05-13T00:00:00.000000 |
| certfr-2025-avi-0397 | Multiples vulnérabilités dans les produits Siemens | 2025-05-13T00:00:00.000000 | 2025-05-13T00:00:00.000000 |
| certfr-2025-avi-0396 | Multiples vulnérabilités dans les produits SAP | 2025-05-13T00:00:00.000000 | 2025-06-12T00:00:00.000000 |
| certfr-2025-avi-0395 | Vulnérabilité dans les produits Citrix | 2025-05-13T00:00:00.000000 | 2025-05-13T00:00:00.000000 |
| certfr-2025-avi-0394 | Multiples vulnérabilités dans les produits Intel | 2025-05-13T00:00:00.000000 | 2025-05-13T00:00:00.000000 |
| certfr-2025-avi-0393 | Multiples vulnérabilités dans les produits Apple | 2025-05-13T00:00:00.000000 | 2025-05-13T00:00:00.000000 |
| certfr-2025-avi-0392 | Multiples vulnérabilités dans Mattermost Server | 2025-05-13T00:00:00.000000 | 2025-06-12T00:00:00.000000 |
| certfr-2025-avi-0391 | Vulnérabilité dans Xen | 2025-05-13T00:00:00.000000 | 2025-05-13T00:00:00.000000 |
| certfr-2025-avi-0390 | Vulnérabilité dans les produits VMware | 2025-05-13T00:00:00.000000 | 2025-05-13T00:00:00.000000 |
| certfr-2025-avi-0389 | Vulnérabilité dans les produits VMware | 2025-05-12T00:00:00.000000 | 2025-05-12T00:00:00.000000 |
| certfr-2025-avi-0388 | Multiples vulnérabilités dans les produits Mitel | 2025-05-12T00:00:00.000000 | 2025-05-12T00:00:00.000000 |
| certfr-2025-avi-0387 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-05-09T00:00:00.000000 | 2025-05-09T00:00:00.000000 |
| certfr-2025-avi-0386 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-05-09T00:00:00.000000 | 2025-05-09T00:00:00.000000 |
| certfr-2025-avi-0385 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-05-09T00:00:00.000000 | 2025-05-09T00:00:00.000000 |
| certfr-2025-avi-0384 | Multiples vulnérabilités dans les produits IBM | 2025-05-09T00:00:00.000000 | 2025-05-09T00:00:00.000000 |
| certfr-2025-avi-0383 | Vulnérabilité dans Microsoft Edge | 2025-05-09T00:00:00.000000 | 2025-05-09T00:00:00.000000 |
| certfr-2025-avi-0382 | Multiples vulnérabilités dans les produits F5 | 2025-05-09T00:00:00.000000 | 2025-05-09T00:00:00.000000 |
| certfr-2025-avi-0381 | Multiples vulnérabilités dans GitLab | 2025-05-09T00:00:00.000000 | 2025-05-09T00:00:00.000000 |
| certfr-2025-avi-0380 | Vulnérabilité dans PostgreSQL | 2025-05-09T00:00:00.000000 | 2025-05-09T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2018-010851 | Clickjacking Vulnerability in Hitachi Automation Director | 2018-12-26T12:09+09:00 | 2019-01-24T18:37+09:00 |
| jvndb-2018-000135 | WordPress plugin "Google XML Sitemaps" vulnerable to cross-site scripting | 2018-12-25T16:19+09:00 | 2019-08-27T15:12+09:00 |
| jvndb-2018-000136 | Installer of Mapping Tool may insecurely load Dynamic Link Libraries | 2018-12-25T16:18+09:00 | 2019-08-27T16:36+09:00 |
| jvndb-2018-000133 | cordova-plugin-ionic-webview vulnerable to path traversal | 2018-12-21T14:17+09:00 | 2019-08-28T10:04+09:00 |
| jvndb-2018-000134 | PgpoolAdmin fails to restrict access permissions | 2018-12-21T14:10+09:00 | 2019-08-27T17:41+09:00 |
| jvndb-2018-000132 | Multiple vulnerabilities in Toshiba Lighting & Technology Corporation Home gateway | 2018-12-19T15:20+09:00 | 2019-08-28T10:45+09:00 |
| jvndb-2018-000131 | Multiple vulnerabilities in Aterm WF1200CR and Aterm WG1200CR | 2018-12-14T14:53+09:00 | 2019-08-27T11:33+09:00 |
| jvndb-2018-000126 | Multiple vulnerabilities in Cybozu Remote Service | 2018-12-10T14:26+09:00 | 2019-08-27T11:48+09:00 |
| jvndb-2018-000130 | Cybozu Garoon access restriction bypass vulnerability | 2018-12-10T14:14+09:00 | 2019-08-27T16:54+09:00 |
| jvndb-2018-000129 | Multiple vulnerabilities in i-FILTER | 2018-12-07T14:30+09:00 | 2019-08-27T11:45+09:00 |
| jvndb-2018-000128 | Multiple vulnerabilities in multiple SEIKO EPSON printers and scanners | 2018-12-06T16:19+09:00 | 2019-09-27T09:55+09:00 |
| jvndb-2018-010028 | Multiple Vulnerabilities in Hitachi Infrastructure Analytics Advisor | 2018-12-04T16:53+09:00 | 2019-01-24T18:35+09:00 |
| jvndb-2018-010027 | Problem with directory permissions in JP1/Operations Analytics | 2018-12-04T16:53+09:00 | 2019-01-24T18:36+09:00 |
| jvndb-2018-000123 | Panasonic applications register unquoted service paths | 2018-11-29T14:45+09:00 | 2019-09-27T10:31+09:00 |
| jvndb-2018-000125 | The installer of MARKET SPEED may insecurely load Dynamic Link Libraries | 2018-11-28T17:27+09:00 | 2019-08-28T10:01+09:00 |
| jvndb-2018-000127 | EC-CUBE vulnerable to open redirect | 2018-11-28T17:24+09:00 | 2019-08-28T09:42+09:00 |
| jvndb-2018-000124 | Multiple vulnerabilities in RICOH Interactive Whiteboard | 2018-11-27T15:26+09:00 | 2019-08-27T17:01+09:00 |
| jvndb-2018-009387 | Mizuho Bank Mizuho Direct App for Android fails to verify SSL server certificates | 2018-11-19T15:44+09:00 | 2019-08-27T16:48+09:00 |
| jvndb-2018-009328 | Multiple Vulnerabilities in JP1/VERITAS | 2018-11-15T17:16+09:00 | 2018-11-20T18:16+09:00 |
| jvndb-2018-000121 | Cybozu Dezie vulnerable to directory traversal | 2018-11-14T15:42+09:00 | 2019-08-27T12:25+09:00 |
| jvndb-2018-000120 | Multiple directory traversal vulnerabilities in Cybozu Office | 2018-11-14T15:38+09:00 | 2019-08-27T12:28+09:00 |
| jvndb-2018-000119 | Cybozu Mailwise vulnerable to directory traversal | 2018-11-14T15:34+09:00 | 2019-08-27T13:37+09:00 |
| jvndb-2018-000118 | The installer of Windows10 Fall Creators Update Modify module for Security Measures tool may insecurely load Dynamic Link Libraries | 2018-11-09T16:13+09:00 | 2019-08-27T18:03+09:00 |
| jvndb-2018-000117 | Multiple vulnerabilities in WordPress plugin "LearnPress" | 2018-11-09T16:13+09:00 | 2019-08-27T11:35+09:00 |
| jvndb-2018-000115 | WordPress plugin "Event Calendar WD" vulnerable to cross-site scripting | 2018-11-02T14:56+09:00 | 2019-08-27T15:15+09:00 |
| jvndb-2018-000116 | Mail app for iOS vulnerable to denial-of-service (DoS) | 2018-11-02T14:42+09:00 | 2018-11-02T14:42+09:00 |
| jvndb-2018-000114 | Confluence Server vulnerable to script injection | 2018-10-29T13:36+09:00 | 2018-10-29T13:36+09:00 |
| jvndb-2018-000113 | Multiple vulnerabilities in OpenDolphin | 2018-10-26T16:16+09:00 | 2019-07-26T14:35+09:00 |
| jvndb-2018-000111 | BlueStacks App Player fails to restrict access permissions | 2018-10-24T16:13+09:00 | 2019-08-27T10:35+09:00 |
| jvndb-2018-000112 | SecureCore Standard Edition vulnerable to authentication bypass | 2018-10-24T16:07+09:00 | 2019-08-06T17:34+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-02639 | CMSimple_XH代码执行漏洞 | 2025-12-29 | 2026-01-08 |
| cnvd-2026-00824 | CMSimple跨站脚本漏洞(CNVD-2026-0082457) | 2025-12-29 | 2026-01-06 |
| cnvd-2026-00823 | CMSimple跨站脚本漏洞 | 2025-12-29 | 2026-01-06 |
| cnvd-2026-00822 | CMSimple文件包含漏洞 | 2025-12-29 | 2026-01-06 |
| cnvd-2026-00821 | UTT 进取 512W缓冲区溢出漏洞 | 2025-12-29 | 2026-01-07 |
| cnvd-2026-00793 | UTT 进取 512W缓冲区溢出漏洞(CNVD-2026-0079375) | 2025-12-29 | 2026-01-08 |
| cnvd-2026-00792 | UTT 进取 512W缓冲区溢出漏洞(CNVD-2026-0079277) | 2025-12-29 | 2026-01-08 |
| cnvd-2026-00791 | UTT 进取 512W缓冲区溢出漏洞(CNVD-2026-0079178) | 2025-12-29 | 2026-01-08 |
| cnvd-2026-00557 | CMSimple代码执行漏洞 | 2025-12-29 | 2026-01-06 |
| cnvd-2026-04455 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-1203509) | 2025-12-27 | 2026-01-21 |
| cnvd-2026-12361 | WordPress Vimeotheque跨站请求伪造漏洞 | 2025-12-26 | 2026-03-02 |
| cnvd-2026-12360 | WordPress Fast User Switching跨站请求伪造漏洞 | 2025-12-26 | 2026-03-02 |
| cnvd-2026-12359 | WordPress Funnelforms Free缺少授权漏洞 | 2025-12-26 | 2026-03-02 |
| cnvd-2026-12357 | WordPress My auctions allegro跨站脚本漏洞 | 2025-12-26 | 2026-03-02 |
| cnvd-2026-12356 | WordPress Category Icon跨站脚本漏洞 | 2025-12-26 | 2026-03-02 |
| cnvd-2026-12355 | WordPress Spiffy Calendar缺少授权漏洞 | 2025-12-26 | 2026-03-02 |
| cnvd-2026-12354 | WordPress WpStream缺少授权漏洞 | 2025-12-26 | 2026-03-02 |
| cnvd-2026-16059 | Apple macOS信息泄露漏洞(CNVD-2026-16059) | 2025-12-25 | 2026-04-03 |
| cnvd-2026-12372 | NVIDIA Nemo Framework代码问题漏洞(CNVD-2026-1237200) | 2025-12-25 | 2026-03-03 |
| cnvd-2026-12371 | NVIDIA Nemo Framework代码问题漏洞 | 2025-12-25 | 2026-03-03 |
| cnvd-2026-12362 | Scholars Tracking System delete_user.php文件SQL注入漏洞 | 2025-12-25 | 2026-03-02 |
| cnvd-2026-11781 | Advantech WebAccess/SCADA目录遍历漏洞(CNVD-2026-11781) | 2025-12-25 | 2026-02-27 |
| cnvd-2026-10343 | D-Link DAP-1325访问控制错误漏洞 | 2025-12-25 | 2026-02-05 |
| cnvd-2026-07555 | WordPress插件eRoom信息泄露漏洞 | 2025-12-25 | 2026-01-28 |
| cnvd-2026-06567 | 中科方德软件有限公司方德桌面操作系统存在本地提权漏洞 | 2025-12-25 | 2026-01-31 |
| cnvd-2026-05360 | ChurchCRM跨站脚本漏洞(CNVD-2026-0536090) | 2025-12-25 | 2026-01-19 |
| cnvd-2026-05359 | ChurchCRM信息泄露漏洞 | 2025-12-25 | 2026-01-19 |
| cnvd-2026-05358 | ChurchCRM代码执行漏洞(CNVD-2026-0535893) | 2025-12-25 | 2026-01-19 |
| cnvd-2026-05357 | ChurchCRM 事件参与者编辑器SQL注入漏洞 | 2025-12-25 | 2026-01-19 |
| cnvd-2026-05356 | ChurchCRM访问控制错误漏洞 | 2025-12-25 | 2026-01-19 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-00419 | Уязвимость сценария /admin/coreconfigsnapshots.php программного обеспечения NagiosXI, поз… | 15.01.2026 | 15.01.2026 |
| bdu:2026-00418 | Уязвимость программного обеспечения NagiosXI, связанная с непринятием мер по защите струк… | 15.01.2026 | 15.01.2026 |
| bdu:2026-00417 | Уязвимость службы Click-to-Run (C2R) пакетов программ Microsoft Office и Microsoft ShareP… | 15.01.2026 | 15.01.2026 |
| bdu:2026-00416 | Уязвимость компонента Inbox COM Objects операционных систем Windows, позволяющая нарушите… | 15.01.2026 | 15.01.2026 |
| bdu:2026-00415 | Уязвимость доверенной среды выполнения Virtualization-Based Security (VBS) Enclave операц… | 15.01.2026 | 15.01.2026 |
| bdu:2026-00414 | Уязвимость среды выполнения запросов GraphQL программной платформы на базе git для совмес… | 15.01.2026 | 15.01.2026 |
| bdu:2026-00413 | Уязвимость программной платформы на базе git для совместной работы над кодом GitLab, связ… | 15.01.2026 | 15.01.2026 |
| bdu:2026-00412 | Уязвимость программного средства управления серверами и виртуальными машинами Azure Conne… | 14.01.2026 | 14.01.2026 |
| bdu:2026-00411 | Уязвимость инструмента управления службами Windows Management Services операционных систе… | 14.01.2026 | 14.01.2026 |
| bdu:2026-00410 | Уязвимость подсистемы Win32 Kernel операционных систем Windows, позволяющая нарушителю по… | 14.01.2026 | 14.01.2026 |
| bdu:2026-00409 | Уязвимость инструмента управления службами Windows Management Services операционных систе… | 14.01.2026 | 19.01.2026 |
| bdu:2026-00408 | Уязвимость инструмента управления службами Windows Management Services операционных систе… | 14.01.2026 | 19.01.2026 |
| bdu:2026-00407 | Уязвимость драйвера HTTP.sys операционных систем Windows, позволяющая нарушителю повысить… | 14.01.2026 | 19.01.2026 |
| bdu:2026-00406 | Уязвимость доверенной среды выполнения Virtualization-Based Security (VBS) операционных с… | 14.01.2026 | 19.01.2026 |
| bdu:2026-00405 | Уязвимость проводника Windows (Windows File Explorer) операционных систем Windows, позвол… | 14.01.2026 | 19.01.2026 |
| bdu:2026-00404 | Уязвимость проводника Windows (Windows File Explorer) операционных систем Windows, позвол… | 14.01.2026 | 19.01.2026 |
| bdu:2026-00403 | Уязвимость исполняемых файлов taskhost.exe/taskhostw.exe операционных систем Windows, поз… | 14.01.2026 | 19.01.2026 |
| bdu:2026-00402 | Уязвимость пакетов программ Microsoft Office и Microsoft 365 Apps for Enterprise, связанн… | 14.01.2026 | 19.01.2026 |
| bdu:2026-00401 | Уязвимость пакетов программ Microsoft Office, Excel и 365 Apps for Enterprise, связанная … | 14.01.2026 | 19.01.2026 |
| bdu:2026-00400 | Уязвимость пакетов программ Microsoft SharePoint Server, Microsoft SharePoint Server Subs… | 14.01.2026 | 28.01.2026 |
| bdu:2026-00399 | Уязвимость службы маршрутизации и удаленного доступа Windows RRAS операционных систем Win… | 14.01.2026 | 14.01.2026 |
| bdu:2026-00398 | Уязвимость реализации протокола NTLM (NT LAN Manager) операционных систем Windows, позвол… | 14.01.2026 | 14.01.2026 |
| bdu:2026-00397 | Уязвимость инструмента управления службами Windows Management Services операционных систе… | 14.01.2026 | 14.01.2026 |
| bdu:2026-00396 | Уязвимость инструмента управления службами Windows Management Services операционных систе… | 14.01.2026 | 14.01.2026 |
| bdu:2026-00395 | Уязвимость службы Local Security Authority Subsystem Service (LSASS) операционных систем … | 14.01.2026 | 14.01.2026 |
| bdu:2026-00394 | Уязвимость драйвера Windows Cloud Files Mini Filter Driver операционной системы Windows, … | 14.01.2026 | 14.01.2026 |
| bdu:2026-00393 | Уязвимость проводника Windows (Windows File Explorer) операционных систем Windows, позвол… | 14.01.2026 | 14.01.2026 |
| bdu:2026-00392 | Уязвимость компонента SMB Server операционной системы Windows, позволяющая нарушителю выз… | 14.01.2026 | 14.01.2026 |
| bdu:2026-00391 | Уязвимость пакета программ Microsoft SharePoint Server, связанная с непринятием мер по за… | 14.01.2026 | 14.01.2026 |
| bdu:2026-00390 | Уязвимость пакетов программ Microsoft Office и Microsoft 365 Apps for Enterprise, связанн… | 14.01.2026 | 14.01.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201706-0361 | The error page mechanism of the Java Servlet Specification requires that, when an error o… | 2026-03-09T20:49:49.009000Z |
| var-201605-0133 | The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo compo… | 2026-03-09T20:47:55.968000Z |
| var-202210-1528 | A type confusion issue was addressed with improved memory handling. This issue is fixed i… | 2026-03-09T20:47:55.676000Z |
| var-201810-0932 | The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side chan… | 2026-03-09T20:46:49.430000Z |
| var-201310-0345 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, 6u60 and earlier, 5.0u51 an… | 2026-03-09T20:46:09.891000Z |
| var-201912-1847 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-03-09T20:45:42.478000Z |
| var-202302-0195 | The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "na… | 2026-03-09T20:45:42.392000Z |
| var-202107-1361 | fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly res… | 2026-03-09T20:45:16.848000Z |
| var-201007-0321 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 thro… | 2026-03-09T20:45:15.522000Z |
| var-201202-0069 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-09T20:44:08.372000Z |
| var-201510-0529 | Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51;… | 2026-03-09T20:44:06.967000Z |
| var-201202-0206 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-09T20:44:06.314000Z |
| var-201210-0266 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-09T20:44:05.117000Z |
| var-200609-1418 | WebKit in Apple Mac OS X 10.3.x through 10.3.9 and 10.4 through 10.4.8 allows remote atta… | 2026-03-09T20:44:04.814000Z |
| var-201406-0230 | The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel… | 2026-03-09T20:41:40.592000Z |
| var-201912-0626 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-03-09T20:40:53.410000Z |
| var-202006-1838 | Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested… | 2026-03-09T20:40:36.276000Z |
| var-201210-0145 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-09T20:40:04.084000Z |
| var-202201-0414 | addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. Ex… | 2026-03-09T20:39:46.667000Z |
| var-202005-1028 | A malicious actor who intentionally exploits this lack of effective limitation on the num… | 2026-03-09T20:39:46.016000Z |
| var-200609-0887 | The Security Framework in Apple Mac OS X 10.3.x up to 10.3.9 does not properly prioritize… | 2026-03-09T20:39:11.515000Z |
| var-200701-0341 | The Bonjour functionality in mDNSResponder, iChat 3.1.6, and InstantMessage framework 428… | 2026-03-09T20:39:10.852000Z |
| var-200704-0740 | The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 t… | 2026-03-09T20:39:10.149000Z |
| var-201909-0695 | A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kern… | 2026-03-09T20:38:57.948000Z |
| var-200609-0703 | The Installer application in Apple Mac OS X 10.4.8 and earlier, when used by a user with … | 2026-03-09T20:38:57.417000Z |
| var-201808-0958 | Systems with microprocessors utilizing speculative execution and address translations may… | 2026-03-09T20:38:45.862000Z |
| var-202006-1832 | A memory corruption issue was addressed with improved validation. This issue is fixed in … | 2026-03-09T20:38:17.205000Z |
| var-201705-3788 | In Open vSwitch (OvS) 2.7.0, while parsing an OpenFlow role status message, there is a ca… | 2026-03-09T20:38:16.301000Z |
| var-201006-1124 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 throug… | 2026-03-09T20:38:15.770000Z |
| var-200106-0092 | Cisco PIX Firewall 515 and 520 with 5.1.4 OS running aaa authentication to a TACACS+ serv… | 2026-03-09T20:38:09.301000Z |