Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-6583 |
5.3 (4.0)
5.4 (3.1)
5.4 (3.0)
|
TransformerOptimus SuperAGI API Key Management Endpoin… |
TransformerOptimus |
SuperAGI |
2026-04-19T23:00:20.450Z | 2026-04-20T16:14:10.062Z |
| CVE-2026-6582 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
TransformerOptimus SuperAGI Vector Database Management… |
TransformerOptimus |
SuperAGI |
2026-04-19T22:45:11.780Z | 2026-04-20T14:06:22.007Z |
| CVE-2026-6581 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
H3C Magic B1 aspForm SetMobileAPInfoById buffer overflow |
H3C |
Magic B1 |
2026-04-19T22:30:15.766Z | 2026-04-20T16:30:27.926Z |
| CVE-2026-6580 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
liangliangyy DjangoBlog Amap API Call views.py hard-co… |
liangliangyy |
DjangoBlog |
2026-04-19T22:15:12.387Z | 2026-04-20T14:55:13.830Z |
| CVE-2026-6579 |
6.9 (4.0)
6.5 (3.1)
6.5 (3.0)
|
liangliangyy DjangoBlog Clean Endpoint views.py missin… |
liangliangyy |
DjangoBlog |
2026-04-19T22:00:17.503Z | 2026-04-20T15:18:38.633Z |
| CVE-2026-6578 |
6.3 (4.0)
5.6 (3.1)
5.6 (3.0)
|
liangliangyy DjangoBlog Setting settings.py hard-coded… |
liangliangyy |
DjangoBlog |
2026-04-19T21:15:14.960Z | 2026-04-20T16:12:54.941Z |
| CVE-2026-6577 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
liangliangyy DjangoBlog logtracks Endpoint views.py mi… |
liangliangyy |
DjangoBlog |
2026-04-19T19:30:15.098Z | 2026-04-20T14:06:48.414Z |
| CVE-2026-6576 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
liangliangyy DjangoBlog WeChat Bot commonapi.py Comman… |
liangliangyy |
DjangoBlog |
2026-04-19T19:00:16.264Z | 2026-04-20T16:28:07.032Z |
| CVE-2026-6574 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
osuuu LightPicture API Upload Endpoint lp.sql hard-cod… |
osuuu |
LightPicture |
2026-04-19T13:30:17.265Z | 2026-04-20T14:55:21.489Z |
| CVE-2026-6573 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
PHPEMS Instant Exam Creation exams.master.php temppage… |
n/a |
PHPEMS |
2026-04-19T12:45:14.558Z | 2026-04-20T15:19:11.751Z |
| CVE-2026-6572 |
6.3 (4.0)
5.6 (3.1)
5.6 (3.0)
|
Collabora KodExplorer fileUpload Endpoint share.class.… |
Collabora |
KodExplorer |
2026-04-19T12:15:14.167Z | 2026-04-20T16:11:35.361Z |
| CVE-2026-6571 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
kodcloud KodExplorer systemRole.class.php roleGroupAct… |
kodcloud |
KodExplorer |
2026-04-19T12:00:17.810Z | 2026-04-20T14:18:17.474Z |
| CVE-2026-6570 |
5.1 (4.0)
2.7 (3.1)
2.7 (3.0)
|
kodcloud KodExplorer systemMember.class.php initInstal… |
kodcloud |
KodExplorer |
2026-04-19T11:00:17.545Z | 2026-04-20T16:23:44.786Z |
| CVE-2026-6569 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
kodcloud KodExplorer fileGet Endpoint share.class.php … |
kodcloud |
KodExplorer |
2026-04-19T10:15:11.445Z | 2026-04-20T14:55:28.674Z |
| CVE-2026-6568 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
kodcloud KodExplorer Public Share share.class.php init… |
kodcloud |
KodExplorer |
2026-04-19T09:45:11.131Z | 2026-04-20T15:20:09.531Z |
| CVE-2026-6564 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
EMQ EMQX Enterprise Session Handling improper authorization |
EMQ |
EMQX Enterprise |
2026-04-19T09:30:15.159Z | 2026-04-20T16:09:52.702Z |
| CVE-2026-6563 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
H3C Magic B1 aspForm SetAPWifiorLedInfoById buffer overflow |
H3C |
Magic B1 |
2026-04-19T08:30:14.248Z | 2026-04-20T14:18:45.761Z |
| CVE-2026-6562 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
dameng100 muucmf index.html getListByPage sql injection |
dameng100 |
muucmf |
2026-04-19T08:15:11.633Z | 2026-04-20T16:06:23.786Z |
| CVE-2026-6561 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
EyouCMS Index.php edit_adminlogo unrestricted upload |
n/a |
EyouCMS |
2026-04-19T07:15:11.267Z | 2026-04-20T14:55:35.698Z |
| CVE-2026-6560 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
H3C Magic B0 aspForm Edit_BasicSSID buffer overflow |
H3C |
Magic B0 |
2026-04-19T06:45:14.514Z | 2026-04-20T15:20:44.443Z |
| CVE-2026-6559 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Wavlink WL-WN579A3 login.cgi sub_401F80 cross site scripting |
Wavlink |
WL-WN579A3 |
2026-04-19T05:15:15.503Z | 2026-04-20T16:07:54.597Z |
| CVE-2026-0868 |
6.4 (3.1)
|
EMC Scheduling Manager <= 4.4 - Authenticated (Contrib… |
turn2honey |
EMC – Easily Embed Calendly Scheduling |
2026-04-19T03:26:14.765Z | 2026-04-20T16:53:24.024Z |
| CVE-2026-41242 |
9.4 (4.0)
|
protobufjs has an arbitrary code execution issue |
protobufjs |
protobuf.js |
2026-04-18T16:18:10.652Z | 2026-04-20T16:03:57.689Z |
| CVE-2026-40948 |
N/A
|
Apache Airflow Providers Keycloak: OAuth Login CSRF — … |
Apache Software Foundation |
Apache Airflow Providers Keycloak |
2026-04-18T13:22:41.577Z | 2026-04-20T16:17:53.543Z |
| CVE-2026-2986 |
6.4 (3.1)
|
Contextual Related Posts <= 4.2.1 - Authenticated (Con… |
ajay |
Contextual Related Posts |
2026-04-18T11:16:10.980Z | 2026-04-20T14:19:06.323Z |
| CVE-2026-2505 |
5.4 (3.1)
|
Categories Images <= 3.3.1 - Authenticated (Contributo… |
elzahlan |
Categories Images |
2026-04-18T09:26:52.654Z | 2026-04-20T13:46:07.918Z |
| CVE-2026-0894 |
6.4 (3.1)
|
Content Blocks (Custom Post Widget) <= 3.3.9 - Authent… |
vanderwijk |
Content Blocks (Custom Post Widget) |
2026-04-18T09:26:52.078Z | 2026-04-20T13:48:40.598Z |
| CVE-2026-41254 |
4 (3.1)
|
Little CMS (lcms2) through 2.18 has an integer ov… |
littlecms |
little cms color engine |
2026-04-18T06:43:13.741Z | 2026-04-20T16:09:45.530Z |
| CVE-2026-32690 |
N/A
|
Apache Airflow: 3.x - Nested Variable Secret Values By… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:22:26.081Z | 2026-04-20T16:11:33.956Z |
| CVE-2026-30898 |
N/A
|
Apache Airflow: Bad example of BashOperator shell inje… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:20:48.647Z | 2026-04-22T03:55:38.783Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-32959 |
5.9 (3.1)
8.2 (4.0)
|
SD-330AC and AMC Manager provided by silex techno… |
silex technology, Inc. |
SD-330AC |
2026-04-20T03:18:56.184Z | 2026-04-20T13:56:27.714Z |
| CVE-2026-32958 |
6.5 (3.1)
6.9 (4.0)
|
SD-330AC and AMC Manager provided by silex techno… |
silex technology, Inc. |
SD-330AC |
2026-04-20T03:19:16.492Z | 2026-04-20T13:19:40.008Z |
| CVE-2026-32957 |
5.3 (3.1)
6.9 (4.0)
|
SD-330AC and AMC Manager provided by silex techno… |
silex technology, Inc. |
SD-330AC |
2026-04-20T03:19:35.581Z | 2026-04-20T13:36:04.975Z |
| CVE-2026-32956 |
9.8 (3.1)
9.3 (4.0)
|
SD-330AC and AMC Manager provided by silex techno… |
silex technology, Inc. |
SD-330AC |
2026-04-20T03:20:01.225Z | 2026-04-20T13:36:04.476Z |
| CVE-2026-32955 |
8.8 (3.1)
8.7 (4.0)
|
SD-330AC and AMC Manager provided by silex techno… |
silex technology, Inc. |
SD-330AC |
2026-04-20T03:19:47.937Z | 2026-04-20T13:36:04.747Z |
| CVE-2026-6597 |
5.1 (4.0)
2.7 (3.1)
2.7 (3.0)
|
langflow-ai langflow Flow Using API core.py has_api_te… |
langflow-ai |
langflow |
2026-04-20T02:30:14.803Z | 2026-04-20T11:42:32.582Z |
| CVE-2026-6596 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
langflow-ai langflow API Endpoint endpoints.py create_… |
langflow-ai |
langflow |
2026-04-20T02:15:13.863Z | 2026-04-20T14:54:40.530Z |
| CVE-2026-6595 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
ProjectsAndPrograms School Management System HTTP GET … |
ProjectsAndPrograms |
School Management System |
2026-04-20T02:00:49.226Z | 2026-04-20T14:54:50.760Z |
| CVE-2026-6594 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
brikcss merge prototype pollution |
brikcss |
merge |
2026-04-20T01:45:12.099Z | 2026-04-20T14:53:13.499Z |
| CVE-2026-6593 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
ComfyUI View Endpoint server.py cross site scripting |
n/a |
ComfyUI |
2026-04-20T01:30:17.995Z | 2026-04-20T16:18:25.910Z |
| CVE-2026-6592 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
ComfyUI userdata Endpoint user_manager.py getuserdata … |
n/a |
ComfyUI |
2026-04-20T01:15:14.548Z | 2026-04-20T11:59:44.227Z |
| CVE-2026-6591 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
ComfyUI LoadImage Node folder_paths.py folder_paths.ge… |
n/a |
ComfyUI |
2026-04-20T01:00:18.496Z | 2026-04-20T16:29:10.370Z |
| CVE-2026-6590 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
ComfyUI Model Preview Endpoint model_manager.py get_mo… |
n/a |
ComfyUI |
2026-04-20T00:45:11.883Z | 2026-04-20T14:54:57.999Z |
| CVE-2026-6589 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
ComfyUI server.py create_origin_only_middleware cross-… |
n/a |
ComfyUI |
2026-04-20T00:30:21.353Z | 2026-04-20T15:02:44.809Z |
| CVE-2026-6588 |
6.9 (4.0)
6.5 (3.1)
6.5 (3.0)
|
serge-chat serge Model API Endpoint model.py delete_mo… |
serge-chat |
serge |
2026-04-20T00:15:12.174Z | 2026-04-20T16:15:13.000Z |
| CVE-2026-6587 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
vibrantlabsai RAGAS Collections util.py _try_process_u… |
vibrantlabsai |
RAGAS |
2026-04-20T00:00:19.515Z | 2026-04-20T12:35:42.222Z |
| CVE-2026-6586 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
TransformerOptimus SuperAGI Budget Endpoint budget.py … |
TransformerOptimus |
SuperAGI |
2026-04-19T23:45:12.377Z | 2026-04-20T16:33:28.763Z |
| CVE-2026-6585 |
5.3 (4.0)
5.4 (3.1)
5.4 (3.0)
|
TransformerOptimus SuperAGI Organisation Update Endpoi… |
TransformerOptimus |
SuperAGI |
2026-04-19T23:30:14.085Z | 2026-04-20T14:55:07.060Z |
| CVE-2026-6584 |
5.3 (4.0)
5.4 (3.1)
5.4 (3.0)
|
TransformerOptimus SuperAGI User Update Endpoint user.… |
TransformerOptimus |
SuperAGI |
2026-04-19T23:15:16.091Z | 2026-04-20T15:07:48.363Z |
| CVE-2026-6583 |
5.3 (4.0)
5.4 (3.1)
5.4 (3.0)
|
TransformerOptimus SuperAGI API Key Management Endpoin… |
TransformerOptimus |
SuperAGI |
2026-04-19T23:00:20.450Z | 2026-04-20T16:14:10.062Z |
| CVE-2026-6582 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
TransformerOptimus SuperAGI Vector Database Management… |
TransformerOptimus |
SuperAGI |
2026-04-19T22:45:11.780Z | 2026-04-20T14:06:22.007Z |
| CVE-2026-6581 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
H3C Magic B1 aspForm SetMobileAPInfoById buffer overflow |
H3C |
Magic B1 |
2026-04-19T22:30:15.766Z | 2026-04-20T16:30:27.926Z |
| CVE-2026-6580 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
liangliangyy DjangoBlog Amap API Call views.py hard-co… |
liangliangyy |
DjangoBlog |
2026-04-19T22:15:12.387Z | 2026-04-20T14:55:13.830Z |
| CVE-2026-6579 |
6.9 (4.0)
6.5 (3.1)
6.5 (3.0)
|
liangliangyy DjangoBlog Clean Endpoint views.py missin… |
liangliangyy |
DjangoBlog |
2026-04-19T22:00:17.503Z | 2026-04-20T15:18:38.633Z |
| CVE-2026-6578 |
6.3 (4.0)
5.6 (3.1)
5.6 (3.0)
|
liangliangyy DjangoBlog Setting settings.py hard-coded… |
liangliangyy |
DjangoBlog |
2026-04-19T21:15:14.960Z | 2026-04-20T16:12:54.941Z |
| CVE-2026-6577 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
liangliangyy DjangoBlog logtracks Endpoint views.py mi… |
liangliangyy |
DjangoBlog |
2026-04-19T19:30:15.098Z | 2026-04-20T14:06:48.414Z |
| CVE-2026-6576 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
liangliangyy DjangoBlog WeChat Bot commonapi.py Comman… |
liangliangyy |
DjangoBlog |
2026-04-19T19:00:16.264Z | 2026-04-20T16:28:07.032Z |
| CVE-2026-6574 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
osuuu LightPicture API Upload Endpoint lp.sql hard-cod… |
osuuu |
LightPicture |
2026-04-19T13:30:17.265Z | 2026-04-20T14:55:21.489Z |
| CVE-2026-6573 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
PHPEMS Instant Exam Creation exams.master.php temppage… |
n/a |
PHPEMS |
2026-04-19T12:45:14.558Z | 2026-04-20T15:19:11.751Z |
| CVE-2026-6572 |
6.3 (4.0)
5.6 (3.1)
5.6 (3.0)
|
Collabora KodExplorer fileUpload Endpoint share.class.… |
Collabora |
KodExplorer |
2026-04-19T12:15:14.167Z | 2026-04-20T16:11:35.361Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-gqwq-8j5x-ghf8 |
4.3 (3.1)
|
Vision Helpdesk before 5.7.0 (patched in 5.6.10) allows attackers to read user profiles via modifie… | 2026-04-17T00:31:02Z | 2026-04-17T00:31:02Z |
| ghsa-f3g8-9xv5-77gv |
5.1 (4.0)
|
Saltcorn: Open Redirect in `POST /auth/login` due to incomplete `is_relative_url` validation (backs… | 2026-04-16T23:00:45Z | 2026-04-16T23:00:45Z |
| ghsa-r7w7-9xr2-qq2r |
3.1 (3.1)
|
langchain-openai: Image token counting SSRF protection can be bypassed via DNS rebinding | 2026-04-16T23:00:12Z | 2026-04-16T23:00:12Z |
| ghsa-fv5p-p927-qmxr |
6.5 (3.1)
|
LangChain Text Splitters: HTMLHeaderTextSplitter.split_text_from_url SSRF Redirect Bypass | 2026-04-16T22:53:32Z | 2026-04-16T22:53:32Z |
| ghsa-3g92-f9ch-qjcm |
2.9 (4.0)
|
Plonky3: The sponge construction used to get a hash function from a cryptographic permutation is no… | 2026-04-16T22:52:41Z | 2026-04-16T22:52:41Z |
| ghsa-jp74-mfrx-3qvh |
9.9 (3.1)
|
Saltcorn: SQL Injection via Unparameterized Sync Endpoints (maxLoadedId) | 2026-04-16T22:51:43Z | 2026-04-16T22:51:43Z |
| ghsa-f5v8-v6q3-q4h6 |
7.5 (3.1)
|
Meridian: Multiple defense-in-depth gaps (collection/depth caps, telemetry, retry, fan-out) | 2026-04-16T22:50:37Z | 2026-04-16T22:50:37Z |
| ghsa-3xx2-mqjm-hg9x |
9.9 (3.1)
|
Paperclip: Cross-tenant agent API key IDOR in `/agents/:id/keys` routes allows full victim-company … | 2026-04-16T22:49:46Z | 2026-04-16T22:49:46Z |
| ghsa-fpw4-p57j-hqmq |
5.4 (3.1)
|
Paperclip: Stored XSS via javascript: URLs in MarkdownBody — urlTransform override disables react-m… | 2026-04-16T22:49:13Z | 2026-04-16T22:49:13Z |
| ghsa-p7mm-r948-4q3q |
4.3 (3.1)
|
Paperclip: Approval decision attribution spoofing via client-controlled `decidedByUserId` in paperc… | 2026-04-16T22:48:46Z | 2026-04-16T22:48:46Z |
| ghsa-47wq-cj9q-wpmp |
9.9 (3.1)
|
Paperclip: Cross-tenant agent API token minting via missing assertCompanyAccess on /api/agents/:id/keys | 2026-04-16T22:48:32Z | 2026-04-16T22:48:32Z |
| ghsa-vr7g-88fq-vhq3 |
9.8 (3.1)
|
Paperclip: OS Command Injection via Execution Workspace cleanupCommand | 2026-04-16T22:48:09Z | 2026-04-16T22:48:09Z |
| ghsa-gqqj-85qm-8qhf |
8.7 (3.1)
|
Paperclip: codex_local inherited ChatGPT/OpenAI-connected Gmail and was able to send real email | 2026-04-16T22:47:40Z | 2026-04-16T22:47:40Z |
| ghsa-xfqj-r5qw-8g4j |
8.3 (3.1)
|
Paperclip: Unauthenticated Access to Multiple API Endpoints in Authenticated Mode | 2026-04-16T22:47:05Z | 2026-04-16T22:47:05Z |
| ghsa-w8hx-hqjv-vjcq |
7.3 (3.1)
|
Paperclip: Malicious skills able to exfiltrate and destroy all user data | 2026-04-16T22:46:52Z | 2026-04-16T22:46:52Z |
| ghsa-265w-rf2w-cjh4 |
8.8 (3.1)
|
Paperclip: Privilege Escalation via Agent-Controlled workspaceStrategy.provisionCommand Leading to … | 2026-04-16T22:45:26Z | 2026-04-16T22:45:26Z |
| ghsa-3pw3-v88x-xj24 |
6.5 (3.1)
|
Paperclip: Arbitrary File Read via Agent-Controlled adapterConfig.instructionsFilePath | 2026-04-16T22:45:14Z | 2026-04-16T22:45:14Z |
| ghsa-xr8f-h2gw-9xh6 |
8.4 (4.0)
|
OAuth 2.1 Provider: Unprivileged users can register OAuth clients | 2026-04-16T22:44:27Z | 2026-04-16T22:44:28Z |
| ghsa-8783-3wgf-jggf |
9.1 (3.1)
|
Budibase: Authentication Bypass via Unanchored Regex in Public Endpoint Matcher — Unauthenticated A… | 2026-04-16T22:40:59Z | 2026-04-16T22:40:59Z |
| ghsa-29qv-4j9f-fjw5 |
8.8 (3.1)
|
Unsafe object property setter in mathjs | 2026-04-16T22:38:43Z | 2026-04-16T22:38:43Z |
| ghsa-jj8c-mmj3-mmgv |
5.4 (3.1)
|
Authlib: Cross-site request forging when using cache | 2026-04-16T22:38:03Z | 2026-04-16T22:38:03Z |
| ghsa-45q2-gjvg-7973 |
8.7 (4.0)
|
Angular: SSRF via protocol-relative and backslash URLs in Angular Platform-Server | 2026-04-16T22:36:01Z | 2026-04-16T22:36:01Z |
| ghsa-xq3m-2v4x-88gg |
9.4 (4.0)
|
Arbitrary code execution in protobufjs | 2026-04-16T22:34:57Z | 2026-04-18T16:18:23Z |
| ghsa-pr96-94w5-mx2h |
5.3 (3.1)
|
@fastify/static vulnerable to path traversal in directory listing | 2026-04-16T22:34:30Z | 2026-04-16T22:34:30Z |
| ghsa-x428-ghpx-8j92 |
5.9 (3.1)
|
@fastify/static vulnerable to route guard bypass via encoded path separators | 2026-04-16T22:34:03Z | 2026-04-16T22:34:03Z |
| ghsa-72c6-fx6q-fr5w |
9.1 (3.1)
|
@fastify/middie vulnerable to middleware authentication bypass in child plugin scopes | 2026-04-16T22:29:04Z | 2026-04-16T22:29:04Z |
| ghsa-v9ww-2j6r-98q6 |
7.4 (3.1)
|
@fastify/middie vulnerable to middleware bypass via deprecated ignoreDuplicateSlashes option | 2026-04-16T22:28:54Z | 2026-04-16T22:28:54Z |
| ghsa-f6hc-c5jr-878p |
7.7 (4.0)
|
Flowise: resetPassword Authentication Bypass Vulnerability | 2026-04-16T21:55:18Z | 2026-04-16T21:55:18Z |
| ghsa-28g4-38q8-3cwc |
8.7 (4.0)
|
Flowise: Cypher Injection in GraphCypherQAChain | 2026-04-16T21:54:26Z | 2026-04-16T21:54:26Z |
| ghsa-x5w6-38gp-mrqh |
7.5 (4.0)
|
Flowise: Password Reset Link Sent Over Unsecured HTTP | 2026-04-16T21:53:16Z | 2026-04-16T21:53:16Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-341 |
|
Incorrect Access Control in Lin-CMS-Flask v0.1.1 allows remote attackers to obtain sensit… | lin-cms | 2021-08-16T18:15:00Z | 2022-03-16T02:19:50.092963Z |
| pysec-2021-340 |
|
Cross Site Scripting (XSS) in Lin-CMS-Flask v0.1.1 allows remote attackers to execute arb… | lin-cms | 2021-08-16T18:15:00Z | 2022-03-16T02:19:50.038358Z |
| pysec-2021-339 |
|
Improper Authentication in Lin-CMS-Flask v0.1.1 allows remote attackers to launch brute f… | lin-cms | 2021-08-16T18:15:00Z | 2022-03-16T02:19:49.985623Z |
| pysec-2021-336 |
|
Unrestricted Upload of File with Dangerous Type in Django-Widgy v0.8.4 allows remote atta… | django-widgy | 2021-08-16T18:15:00Z | 2021-09-26T23:32:19.117278Z |
| pysec-2021-145 |
|
XML External Entities (XXE) in Quokka v0.4.0 allows remote attackers to execute arbitrary… | quokka | 2021-08-16T18:15:00Z | 2021-08-27T03:22:19.070898Z |
| pysec-2021-144 |
|
XML External Entities (XXE) in Quokka v0.4.0 allows remote attackers to execute arbitrary… | quokka | 2021-08-16T18:15:00Z | 2021-08-27T03:22:19.043898Z |
| pysec-2021-143 |
|
Cross Site Scripting (XSS) in Quokka v0.4.0 allows remote attackers to execute arbitrary … | quokka | 2021-08-16T18:15:00Z | 2021-08-27T03:22:19.002010Z |
| pysec-2021-122 |
|
If remote logging is not used, the worker (in the case of CeleryExecutor) or the schedule… | apache-airflow | 2021-08-16T08:15:00Z | 2021-08-24T14:30:45.545655Z |
| pysec-2021-117 |
|
This affects the package bikeshed before 3.0.0. This can occur when an untrusted source f… | bikeshed | 2021-08-16T08:15:00Z | 2021-08-16T10:33:00.179750Z |
| pysec-2021-116 |
|
This affects the package bikeshed before 3.0.0. This can occur when an untrusted source f… | bikeshed | 2021-08-16T08:15:00Z | 2021-08-16T10:33:00.121184Z |
| pysec-2021-344 |
|
OneFuzz is an open source self-hosted Fuzzing-As-A-Service platform. Starting with OneFuz… | onefuzz | 2021-08-13T21:15:00Z | 2021-09-26T23:32:40.198740Z |
| pysec-2021-801 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-13T00:15:00Z | 2021-12-09T06:35:40.227651Z |
| pysec-2021-603 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-13T00:15:00Z | 2021-12-09T06:35:06.680335Z |
| pysec-2021-312 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-13T00:15:00Z | 2021-08-27T03:22:47.685921Z |
| pysec-2021-803 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:40.404135Z |
| pysec-2021-802 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:40.308304Z |
| pysec-2021-798 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:39.946066Z |
| pysec-2021-796 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:39.778016Z |
| pysec-2021-795 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:39.693273Z |
| pysec-2021-794 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:39.607152Z |
| pysec-2021-793 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:39.522019Z |
| pysec-2021-790 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:39.261433Z |
| pysec-2021-789 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:39.175638Z |
| pysec-2021-788 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:39.087428Z |
| pysec-2021-785 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:38.809791Z |
| pysec-2021-784 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:38.706561Z |
| pysec-2021-783 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:38.609873Z |
| pysec-2021-781 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:38.435010Z |
| pysec-2021-780 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:38.342648Z |
| pysec-2021-779 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:38.256317Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1631 | Malicious code in @nxt-costco-com/forge-components (npm) | 2026-03-18T12:29:56Z | 2026-03-23T05:16:24Z |
| mal-2026-1630 | Malicious code in @measures/responsive (npm) | 2026-03-18T12:29:40Z | 2026-03-23T05:16:24Z |
| mal-2026-1629 | Malicious code in @legacy-utils/core (npm) | 2026-03-18T12:28:52Z | 2026-03-23T05:16:24Z |
| mal-2026-1628 | Malicious code in @legacy-ui/core (npm) | 2026-03-18T12:28:51Z | 2026-03-23T05:16:24Z |
| mal-2026-1627 | Malicious code in @legacy-components/core (npm) | 2026-03-18T12:28:44Z | 2026-03-23T05:16:24Z |
| mal-2026-1626 | Malicious code in @kui-react/table (npm) | 2026-03-18T12:28:29Z | 2026-03-23T05:16:24Z |
| mal-2026-1625 | Malicious code in @kui-react/button (npm) | 2026-03-18T12:28:28Z | 2026-03-23T05:16:24Z |
| mal-2026-1624 | Malicious code in @inter-ikea-gallery/integration (npm) | 2026-03-18T12:28:23Z | 2026-03-23T05:16:24Z |
| mal-2026-1623 | Malicious code in @f5rest/odata-v4-service-metadata (npm) | 2026-03-18T12:27:28Z | 2026-03-23T05:16:24Z |
| mal-2026-1622 | Malicious code in @f5rest/odata-v4-server (npm) | 2026-03-18T12:27:27Z | 2026-03-23T05:16:24Z |
| mal-2026-1621 | Malicious code in @f5rest/odata-v4-parser (npm) | 2026-03-18T12:27:26Z | 2026-03-23T05:16:24Z |
| mal-2026-1620 | Malicious code in @f5rest/odata-v4-metadata (npm) | 2026-03-18T12:27:26Z | 2026-03-23T05:16:24Z |
| mal-2026-1619 | Malicious code in @f5rest/odata-v4-inmemory (npm) | 2026-03-18T12:27:25Z | 2026-03-23T05:16:24Z |
| mal-2026-1618 | Malicious code in @f5rest/odata-lens (npm) | 2026-03-18T12:27:23Z | 2026-03-23T05:16:24Z |
| mal-2026-1617 | Malicious code in @f5rest/icr-odata-adapter (npm) | 2026-03-18T12:27:22Z | 2026-03-23T05:16:24Z |
| mal-2026-1616 | Malicious code in @f5rest/icr-metadata-generator (npm) | 2026-03-18T12:27:21Z | 2026-03-23T05:16:24Z |
| mal-2026-1615 | Malicious code in @emerald-react/menu (npm) | 2026-03-18T12:26:05Z | 2026-03-23T05:16:24Z |
| mal-2026-1614 | Malicious code in @emerald-react/list (npm) | 2026-03-18T12:25:58Z | 2026-03-23T05:16:24Z |
| mal-2026-1613 | Malicious code in @emerald-react/label (npm) | 2026-03-18T12:25:57Z | 2026-03-23T05:16:24Z |
| mal-2026-1612 | Malicious code in @emerald-react/input (npm) | 2026-03-18T12:25:57Z | 2026-03-23T05:16:24Z |
| mal-2026-1611 | Malicious code in @emerald-react/icon-button (npm) | 2026-03-18T12:25:56Z | 2026-03-23T05:16:24Z |
| mal-2026-1610 | Malicious code in @emerald-react/icon (npm) | 2026-03-18T12:25:55Z | 2026-03-23T05:16:24Z |
| mal-2026-1609 | Malicious code in @emerald-react/ellis-ai-icon (npm) | 2026-03-18T12:25:54Z | 2026-03-23T05:16:24Z |
| mal-2026-1608 | Malicious code in @emerald-react/dropdown (npm) | 2026-03-18T12:25:53Z | 2026-03-23T05:16:24Z |
| mal-2026-1607 | Malicious code in @emerald-react/divider (npm) | 2026-03-18T12:25:52Z | 2026-03-23T05:16:24Z |
| mal-2026-1606 | Malicious code in @emerald-react/datepicker (npm) | 2026-03-18T12:25:51Z | 2026-03-23T05:16:24Z |
| mal-2026-1605 | Malicious code in @emerald-react/data-table (npm) | 2026-03-18T12:25:50Z | 2026-03-23T05:16:24Z |
| mal-2026-1604 | Malicious code in @emerald-react/core (npm) | 2026-03-18T12:25:44Z | 2026-03-23T05:16:24Z |
| mal-2026-1603 | Malicious code in @emerald-react/checkbox (npm) | 2026-03-18T12:25:43Z | 2026-03-23T05:16:24Z |
| mal-2026-1602 | Malicious code in @emerald-react/chat-bot (npm) | 2026-03-18T12:25:42Z | 2026-03-23T05:16:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1930 | HCL BigFix: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-08-28T22:00:00.000+00:00 | 2025-08-28T22:00:00.000+00:00 |
| wid-sec-w-2025-1929 | IBM App Connect Enterprise: Mehrere Schwachstellen | 2025-08-28T22:00:00.000+00:00 | 2025-09-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1928 | Linux UDisks Daemon: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-28T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1927 | Synology RADIUS Server für Synology Router Manager: Schwachstelle ermöglicht Offenlegung und Manipulation von Dateien | 2025-08-28T22:00:00.000+00:00 | 2025-08-28T22:00:00.000+00:00 |
| wid-sec-w-2025-1926 | Asterisk: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-08-28T22:00:00.000+00:00 | 2025-10-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1925 | Hashicorp Vault: Schwachstelle ermöglicht Denial of Service | 2025-08-28T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1924 | Acronis Cyber Protect: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-28T22:00:00.000+00:00 | 2025-08-28T22:00:00.000+00:00 |
| wid-sec-w-2025-1923 | Kibana: Schwachstelle ermöglicht Umgehen von Sicherheitsmechanismen | 2025-08-28T22:00:00.000+00:00 | 2025-08-28T22:00:00.000+00:00 |
| wid-sec-w-2025-1922 | Rancher: Schwachstelle ermöglicht Denial of Service | 2025-08-28T22:00:00.000+00:00 | 2025-09-02T22:00:00.000+00:00 |
| wid-sec-w-2025-1921 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-08-27T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1920 | Contao: Mehrere Schwachstellen | 2025-08-27T22:00:00.000+00:00 | 2025-08-28T22:00:00.000+00:00 |
| wid-sec-w-2025-1919 | xwiki (PDF Export): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-08-27T22:00:00.000+00:00 | 2025-08-28T22:00:00.000+00:00 |
| wid-sec-w-2025-1918 | Drupal Extensions: Mehrere Schwachstellen | 2025-08-27T22:00:00.000+00:00 | 2025-10-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1917 | Cisco UCS und IMC: Mehrere Schwachstellen | 2025-08-27T22:00:00.000+00:00 | 2025-08-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1916 | GitLab: Mehrere Schwachstellen | 2025-08-27T22:00:00.000+00:00 | 2025-08-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1915 | Cisco Nexus, Dashboard, NX-OS: Mehrere Schwachstellen | 2025-08-27T22:00:00.000+00:00 | 2025-08-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1914 | Linux Kernel: Schwachstelle ermöglicht Codeausführung | 2025-08-26T22:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1913 | Google Chrome und Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2025-08-26T22:00:00.000+00:00 | 2025-11-24T23:00:00.000+00:00 |
| wid-sec-w-2025-1912 | Shibboleth Identity Provider: Schwachstelle ermöglicht Cross-Site Scripting | 2025-08-26T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1911 | ILIAS: Mehrere Schwachstellen | 2025-08-26T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1910 | Citrix Systems ADC und NetScaler Gateway: Mehrere Schwachstellen | 2025-08-26T22:00:00.000+00:00 | 2025-08-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1909 | Nagios Enterprises Nagios XI: Schwachstelle ermöglicht Cross-Site Scripting | 2025-08-26T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1908 | TeamViewer: Schwachstelle ermöglicht Manipulation von Dateien | 2025-08-25T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1907 | QNAP NAS (File Station 5): Mehrere Schwachstellen | 2025-08-25T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1906 | ImageMagick: Mehrere Schwachstellen | 2025-08-25T22:00:00.000+00:00 | 2025-12-18T23:00:00.000+00:00 |
| wid-sec-w-2025-1905 | IBM QRadar SIEM Komponente: Mehrere Schwachstellen | 2025-08-25T22:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1904 | OpenText Enterprise Security Manager: Schwachstelle ermöglicht Cross-Site Scripting | 2025-08-25T22:00:00.000+00:00 | 2025-08-25T22:00:00.000+00:00 |
| wid-sec-w-2025-1903 | Microsoft GitHub Enterprise: Mehrere Schwachstellen | 2025-08-25T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1902 | D-LINK Router DI-7400G+ und DIR-650IN: Mehrere Schwachstellen | 2025-08-25T22:00:00.000+00:00 | 2025-08-25T22:00:00.000+00:00 |
| wid-sec-w-2025-1901 | Red Hat Enterprise Linux (aide): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-08-24T22:00:00.000+00:00 | 2025-11-25T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-23-101-01 | FANUC ROBOGUIDE-HandlingPRO | 2023-04-18T19:27:35.008841Z | 2023-04-18T19:27:35.008841Z |
| icsa-23-108-02 | Schneider Electric APC Easy UPS Online Monitoring Software (Update A) | 2023-04-18T06:00:00.000000Z | 2024-06-11T06:00:00.000000Z |
| icsa-23-103-15 | Mitsubishi Electric GOC35 Series | 2023-04-14T20:06:05.726567Z | 2023-04-14T20:06:05.726567Z |
| icsa-24-102-08 | Siemens OPC Foundation Local Discovery Server Affecting Siemens Products | 2023-04-11T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| icsa-23-103-13 | Siemens SCALANCE Switch Families | 2023-04-11T00:00:00.000000Z | 2024-08-13T00:00:00.000000Z |
| icsa-23-103-12 | Siemens Polarion ALM | 2023-04-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-103-11 | Siemens Teamcenter Visualization and JT2Go | 2023-04-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-103-10 | Siemens Industrial Products | 2023-04-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-103-09 | Siemens SCALANCE XCM332 | 2023-04-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-103-07 | Siemens CPCI85 Firmware of SICAM A8000 Devices | 2023-04-11T00:00:00.000000Z | 2023-04-11T00:00:00.000000Z |
| icsa-23-103-06 | Siemens SIPROTEC 5 Devices | 2023-04-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-23-103-05 | Siemens SCALANCE X-200IRT Devices | 2023-04-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-103-04 | Siemens TIA Portal | 2023-04-11T00:00:00.000000Z | 2024-08-13T00:00:00.000000Z |
| icsa-23-103-03 | Siemens in OPC Foundation Local Discovery Server | 2023-04-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-103-02 | Siemens JT Open and JT Utilities | 2023-04-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-103-01 | Siemens Adaptec Maxview Application | 2023-04-11T00:00:00.000000Z | 2023-04-11T00:00:00.000000Z |
| icsa-23-096-06 | mySCADA myPRO | 2023-04-10T17:28:36.056143Z | 2023-04-10T17:28:36.056143Z |
| icsa-23-096-03 | JTEKT ELECTRONICS Kostac PLC Programming Software | 2023-04-10T16:34:33.527289Z | 2023-04-10T16:34:33.527289Z |
| icsa-23-096-02 | JTEKT ELECTRONICS Screen Creator Advance 2 | 2023-04-10T16:26:09.913765Z | 2023-04-10T16:26:09.913765Z |
| icsa-23-096-01 | Industrial Control Links ScadaFlex II SCADA Controllers | 2023-04-10T16:19:19.857614Z | 2023-04-10T16:19:19.857614Z |
| icsa-23-096-04 | Korenix Jetwave | 2023-04-10T16:08:00.934924Z | 2023-04-10T16:08:00.934924Z |
| icsa-23-096-05 | Hitachi Energy MicroSCADA System Data Manager SDM600 | 2023-04-10T15:37:08.398013Z | 2023-04-10T15:37:08.398013Z |
| icsa-23-094-01 | Nexx Smart Home Device | 2023-04-04T17:20:10.507650Z | 2023-04-04T17:20:10.507650Z |
| icsa-23-082-04 | Schneider Electric IGSS | 2023-04-03T19:38:42.642957Z | 2023-04-03T19:38:42.642957Z |
| icsa-23-082-03 | SAUTER EY-modulo 5 Building Automation Stations | 2023-04-03T19:38:42.612958Z | 2023-04-03T19:38:42.612958Z |
| icsa-23-080-05 | VISAM VBASE Automation Base | 2023-04-03T19:38:42.524396Z | 2023-04-03T19:38:42.524396Z |
| icsa-23-075-06 | Honeywell OneWireless Wireless Device Manager | 2023-04-03T18:20:44.880953Z | 2023-04-03T18:20:44.880953Z |
| icsa-23-068-03 | ABB Ability Symphony Plus | 2023-04-03T13:25:41.249897Z | 2023-04-03T13:25:41.249897Z |
| icsa-23-082-01 | RoboDK | 2023-03-31T19:07:05.310067Z | 2023-03-31T19:07:05.310067Z |
| icsa-23-082-05 | ABB Pulsar Plus Controller | 2023-03-31T19:07:05.278945Z | 2023-03-31T19:07:05.278945Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-webui-auth-bypass-6j2byuc7 | Cisco IOS XE Software Web UI Authorization Bypass Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-web-ui-exnfmcpo | Cisco IOS XE Software Web UI Improper Input Validation Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-unauth-file-access-ebtwkkvw | Cisco IOS XE Software Guest Shell Unauthorized File System Access Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-splitdns-spwqpdgw | Cisco IOS and IOS XE Software Split DNS Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-rommon-secboot-7jgvlvyc | Cisco IOS XE ROM Monitor Software Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-profinet-j9qmchpb | Cisco IOS and IOS XE Software PROFINET Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-12-09T15:09:18+00:00 |
| cisco-sa-mdns-dos-3th6ca9j | Cisco IOS XE Software for Catalyst 9800 Series Wireless Controllers Multicast DNS Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-le-drtob625 | Cisco IOS XE Software Ethernet Frame Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-jp-dos-g5ffgm8y | Cisco Catalyst 9200 Series Switches Jumbo Frame Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-isr4461-gkkurohx | Cisco IOS XE Software for Cisco 4461 Integrated Services Routers Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ipsla-jw2djmsv | Cisco IOS XE Software IP Service Level Agreements Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iox-usb-guestshell-wmevscdj | Cisco IOS XE Software IOx Guest Shell USB SSD Namespace Protection Privilege Escalation Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-wlc-fnfv9-evraqpnx | Cisco IOS XE Software for Catalyst 9800 Series and Cisco AireOS Software for Cisco WLC Flexible NetFlow Version 9 Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-umbrella-dos-t2qmux37 | Cisco IOS XE Software for Catalyst 9200 Series Switches Umbrella Connector Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-rsp3-rce-jvhg8z7c | Cisco IOS XE Software for Cisco ASR 900 Series Route Switch Processor 3 Arbitrary Code Execution Vulnerabilities | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-isdn-q931-dos-67euzbtf | Cisco IOS and IOS XE Software ISDN Q.931 Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-iox-app-host-mczcnsbt | Cisco IOS XE Software IOx Application Hosting Privilege Escalation Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-ewlc-snmp-dos-wnkedg9k | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Trap Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-dhcp-dos-jsckx43h | Cisco IOS XE Software for Cisco cBR-8 Converged Broadband Routers DHCP Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-ctbypass-7qhafhkk | Cisco IOS XE Software Consent Token Bypass Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-cmdinj-2mzhjm6k | Cisco IOS XE Software Command Injection Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-xe-webui-multi-vftkk7yr | Cisco IOS XE Software Web Management Framework Vulnerabilities | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-webui-priv-esc-k8zvewm | Cisco IOS XE Software Privilege Escalation Vulnerabilities | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-profinet-dos-65qyg3w5 | Cisco IOS and IOS XE Software PROFINET Link Layer Discovery Protocol Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-12-09T15:23:48+00:00 |
| cisco-sa-ios-lua-rce-7vejx4f | Cisco IOS XE Software Arbitrary Code Execution Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-lpwa-access-cxsd7pra | Cisco IOS Software for Cisco Industrial Routers Virtual-LPWA Unauthorized Access Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-bgp-evpn-dos-lnfyjxff | Cisco IOS and IOS XE Software MP-BGP EVPN Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-info-disclosure-v4bmjbnf | Cisco IOS and IOS XE Software Information Disclosure Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-file-overwrite-ynu5prjd | Cisco IOS XE Software Arbitrary File Overwrite Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ewlc-icmpv6-qb9eyycr | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family Improper Access Control Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-68327 | usb: renesas_usbhs: Fix synchronous external abort on unbind | 2025-12-02T00:00:00.000Z | 2026-01-07T14:40:47.000Z |
| msrc_cve-2025-68324 | scsi: imm: Fix use-after-free bug caused by unfinished delayed work | 2025-12-02T00:00:00.000Z | 2026-03-31T14:55:08.000Z |
| msrc_cve-2025-68322 | parisc: Avoid crash due to unaligned access in unwinder | 2025-12-02T00:00:00.000Z | 2026-01-13T01:39:07.000Z |
| msrc_cve-2025-68318 | clk: thead: th1520-ap: set all AXI clocks to CLK_IS_CRITICAL | 2025-12-02T00:00:00.000Z | 2026-01-13T14:37:11.000Z |
| msrc_cve-2025-68317 | io_uring/zctx: check chained notif contexts | 2025-12-02T00:00:00.000Z | 2025-12-18T01:03:25.000Z |
| msrc_cve-2025-68315 | f2fs: fix to detect potential corrupted nid in free_nid_list | 2025-12-02T00:00:00.000Z | 2026-01-08T14:49:31.000Z |
| msrc_cve-2025-68313 | x86/CPU/AMD: Add RDSEED fix for Zen5 | 2025-12-02T00:00:00.000Z | 2025-12-18T01:02:58.000Z |
| msrc_cve-2025-68311 | tty: serial: ip22zilog: Use platform device for probing | 2025-12-02T00:00:00.000Z | 2026-01-08T14:48:57.000Z |
| msrc_cve-2025-68309 | PCI/AER: Fix NULL pointer access by aer_info | 2025-12-02T00:00:00.000Z | 2025-12-18T01:03:30.000Z |
| msrc_cve-2025-68308 | can: kvaser_usb: leaf: Fix potential infinite loop in command parsers | 2025-12-02T00:00:00.000Z | 2026-01-07T14:40:11.000Z |
| msrc_cve-2025-68307 | can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs | 2025-12-02T00:00:00.000Z | 2026-01-07T14:39:31.000Z |
| msrc_cve-2025-68304 | Bluetooth: hci_core: lookup hci_conn on RX path on protocol side | 2025-12-02T00:00:00.000Z | 2026-03-31T14:52:44.000Z |
| msrc_cve-2025-68303 | platform/x86: intel: punit_ipc: fix memory corruption | 2025-12-02T00:00:00.000Z | 2026-01-08T01:38:41.000Z |
| msrc_cve-2025-68302 | net: sxgbe: fix potential NULL dereference in sxgbe_rx() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:40:31.000Z |
| msrc_cve-2025-68301 | net: atlantic: fix fragment overflow handling in RX path | 2025-12-02T00:00:00.000Z | 2026-01-08T01:38:53.000Z |
| msrc_cve-2025-68297 | ceph: fix crash in process_v2_sparse_read() for encrypted directories | 2025-12-02T00:00:00.000Z | 2025-12-18T01:02:32.000Z |
| msrc_cve-2025-68296 | drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup | 2025-12-02T00:00:00.000Z | 2026-03-31T14:53:06.000Z |
| msrc_cve-2025-68295 | smb: client: fix memory leak in cifs_construct_tcon() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:39:44.000Z |
| msrc_cve-2025-68291 | mptcp: Initialise rcv_mss before calling tcp_send_active_reset() in mptcp_do_fastclose(). | 2025-12-02T00:00:00.000Z | 2026-02-18T14:06:12.000Z |
| msrc_cve-2025-68290 | most: usb: fix double free on late probe failure | 2025-12-02T00:00:00.000Z | 2026-01-08T01:38:59.000Z |
| msrc_cve-2025-68289 | usb: gadget: f_eem: Fix memory leak in eem_unwrap | 2025-12-02T00:00:00.000Z | 2026-01-13T14:37:17.000Z |
| msrc_cve-2025-68288 | usb: storage: Fix memory leak in USB bulk transport | 2025-12-02T00:00:00.000Z | 2026-01-07T14:39:51.000Z |
| msrc_cve-2025-68287 | usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths | 2025-12-02T00:00:00.000Z | 2026-01-08T01:39:04.000Z |
| msrc_cve-2025-68286 | drm/amd/display: Check NULL before accessing | 2025-12-02T00:00:00.000Z | 2026-01-07T14:39:38.000Z |
| msrc_cve-2025-68285 | libceph: fix potential use-after-free in have_mon_and_osd_map() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:39:18.000Z |
| msrc_cve-2025-68284 | libceph: prevent potential out-of-bounds writes in handle_auth_session_key() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:39:57.000Z |
| msrc_cve-2025-68283 | libceph: replace BUG_ON with bounds check for map->max_osd | 2025-12-02T00:00:00.000Z | 2026-01-07T14:39:25.000Z |
| msrc_cve-2025-68282 | usb: gadget: udc: fix use-after-free in usb_gadget_state_work | 2025-12-02T00:00:00.000Z | 2026-01-07T14:39:11.000Z |
| msrc_cve-2025-68281 | ASoC: SDCA: bug fix while parsing mipi-sdca-control-cn-list | 2025-12-02T00:00:00.000Z | 2026-01-13T14:36:51.000Z |
| msrc_cve-2025-68266 | bfs: Reconstruct file type when loading from disk | 2025-12-02T00:00:00.000Z | 2026-01-08T14:45:54.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15266-1 | pure-ftpd-1.0.51-5.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15265-1 | libprotobuf-lite31_1_0-31.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15264-1 | postgresql-jdbc-42.7.7-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15263-1 | polaris-9.6.4-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15262-1 | podman-5.5.2-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15261-1 | perl-YAML-LibYAML-0.904.0-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15260-1 | perl-File-Find-Rule-0.350.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15259-1 | perl-CryptX-0.87.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15258-1 | perl-32bit-5.40.2-3.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15257-1 | pam_pkcs11-0.6.13-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15256-1 | pam-1.7.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15255-1 | ovmf-202505-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15254-1 | openbao-2.3.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15253-1 | opa-1.6.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15252-1 | oci-cli-3.61.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15251-1 | nova-3.11.4-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15250-1 | corepack22-22.15.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15249-1 | nodejs-electron-35.6.0-1.2 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15248-1 | nix-2.29.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15247-1 | moarvm-2025.05-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15246-1 | mirrorsorcerer-0.1.3~1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15245-1 | ggml-devel-5699-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15244-1 | libtpms-devel-0.10.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15243-1 | libssh-config-0.11.2-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15242-1 | libsoup-2_4-1-2.74.3-12.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15241-1 | libsoup-3_0-0-3.6.5-6.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15240-1 | libQt5Bootstrap-devel-static-32bit-5.15.17+kde122-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15239-1 | libgcrypt-devel-1.11.1-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15238-1 | libetebase-devel-0.5.8-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15237-1 | libbd_btrfs-devel-3.1.1-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:1088 | Red Hat Security Advisory: python3.12-urllib3 security update | 2026-01-26T14:19:44+00:00 | 2026-04-12T14:07:05+00:00 |
| rhsa-2026:1089 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-01-26T14:11:43+00:00 | 2026-04-12T14:07:06+00:00 |
| rhsa-2026:1142 | Red Hat Security Advisory: kernel security update | 2026-01-26T13:44:48+00:00 | 2026-03-18T03:16:21+00:00 |
| rhsa-2026:0901 | Red Hat Security Advisory: OpenJDK 25.0.2 Security Update for Portable Linux Builds | 2026-01-26T13:42:41+00:00 | 2026-04-13T20:00:44+00:00 |
| rhsa-2026:0900 | Red Hat Security Advisory: OpenJDK 21.0.10 Security Update for Windows Builds | 2026-01-26T13:41:51+00:00 | 2026-03-18T03:16:45+00:00 |
| rhsa-2026:0899 | Red Hat Security Advisory: OpenJDK 21.0.10 Security Update for Portable Linux Builds | 2026-01-26T13:41:39+00:00 | 2026-04-13T20:00:44+00:00 |
| rhsa-2026:0898 | Red Hat Security Advisory: OpenJDK 17.0.18 Security Update for Windows Builds | 2026-01-26T13:39:49+00:00 | 2026-03-18T03:16:43+00:00 |
| rhsa-2026:0897 | Red Hat Security Advisory: OpenJDK 17.0.18 Security Update for Portable Linux Builds | 2026-01-26T13:39:39+00:00 | 2026-04-13T20:00:43+00:00 |
| rhsa-2026:0895 | Red Hat Security Advisory: OpenJDK 8u482 Security Update for Portable Linux Builds | 2026-01-26T13:38:53+00:00 | 2026-04-13T20:00:43+00:00 |
| rhsa-2026:0896 | Red Hat Security Advisory: OpenJDK 8u482 Windows Security Update | 2026-01-26T13:38:38+00:00 | 2026-03-18T03:16:46+00:00 |
| rhsa-2026:1087 | Red Hat Security Advisory: python-urllib3 security update | 2026-01-26T13:09:48+00:00 | 2026-04-12T14:07:04+00:00 |
| rhsa-2026:1190 | Red Hat Security Advisory: php:8.3 security update | 2026-01-26T13:00:21+00:00 | 2026-04-08T16:37:49+00:00 |
| rhsa-2026:1086 | Red Hat Security Advisory: python-urllib3 security update | 2026-01-26T12:44:33+00:00 | 2026-04-12T14:07:04+00:00 |
| rhsa-2026:1090 | Red Hat Security Advisory: poppler security update | 2026-01-26T12:42:08+00:00 | 2026-03-18T03:16:59+00:00 |
| rhsa-2026:1091 | Red Hat Security Advisory: poppler security update | 2026-01-26T12:36:38+00:00 | 2026-03-18T03:16:59+00:00 |
| rhsa-2026:1187 | Red Hat Security Advisory: php:8.2 security update | 2026-01-26T12:19:28+00:00 | 2026-04-08T16:37:52+00:00 |
| rhsa-2026:1185 | Red Hat Security Advisory: php security update | 2026-01-26T11:43:38+00:00 | 2026-04-08T16:37:52+00:00 |
| rhsa-2026:1178 | Red Hat Security Advisory: kernel security update | 2026-01-26T10:58:58+00:00 | 2026-03-18T03:16:58+00:00 |
| rhsa-2026:1169 | Red Hat Security Advisory: php:8.2 security update | 2026-01-26T10:37:48+00:00 | 2026-04-08T16:37:47+00:00 |
| rhsa-2026:1176 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.18.1 | 2026-01-26T10:17:05+00:00 | 2026-04-12T14:07:10+00:00 |
| rhsa-2026:1168 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.18.1 | 2026-01-26T09:54:57+00:00 | 2026-04-14T09:46:04+00:00 |
| rhsa-2026:1166 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.18.1 | 2026-01-26T09:50:40+00:00 | 2026-04-14T09:46:04+00:00 |
| rhsa-2026:1148 | Red Hat Security Advisory: kernel-rt security update | 2026-01-26T07:50:32+00:00 | 2026-03-18T03:16:19+00:00 |
| rhsa-2026:1072 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.15.1 security update | 2026-01-25T22:43:46+00:00 | 2026-04-14T07:57:54+00:00 |
| rhsa-2026:1071 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.10.1 security update | 2026-01-25T22:31:05+00:00 | 2026-04-14T07:57:55+00:00 |
| rhsa-2026:1067 | Red Hat Security Advisory: Assisted Installer RHEL 9 components for Multicluster Engine for Kubernetes 2.10.1 | 2026-01-23T16:45:25+00:00 | 2026-04-14T07:57:53+00:00 |
| rhsa-2026:1049 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.21.0 | 2026-01-22T21:04:37+00:00 | 2026-04-14T07:57:53+00:00 |
| rhsa-2026:0674 | Red Hat Security Advisory: OpenShift Container Platform 4.19.22 bug fix and security update | 2026-01-22T21:01:40+00:00 | 2026-04-13T20:14:10+00:00 |
| rhsa-2026:0677 | Red Hat Security Advisory: OpenShift Container Platform 4.13.63 bug fix and security update | 2026-01-22T20:18:18+00:00 | 2026-04-13T20:14:10+00:00 |
| rhsa-2026:0676 | Red Hat Security Advisory: OpenShift Container Platform 4.13.63 packages and security update | 2026-01-22T19:53:23+00:00 | 2026-04-14T02:03:19+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20222-1 | Security update for wireshark | 2026-02-02T12:45:13Z | 2026-02-02T12:45:13Z |
| suse-su-2026:20221-1 | Security update for glib2 | 2026-02-02T12:37:18Z | 2026-02-02T12:37:18Z |
| suse-su-2026:20210-1 | Security update for glib2 | 2026-02-02T12:37:18Z | 2026-02-02T12:37:18Z |
| suse-su-2026:20218-1 | Security update for dpdk | 2026-02-02T10:21:13Z | 2026-02-02T10:21:13Z |
| suse-su-2026:20209-1 | Security update for dpdk | 2026-02-02T10:21:13Z | 2026-02-02T10:21:13Z |
| suse-su-2026:20220-1 | Security update for the Linux Kernel | 2026-02-02T10:12:16Z | 2026-02-02T10:12:16Z |
| suse-su-2026:20207-1 | Security update for the Linux Kernel | 2026-02-02T10:12:16Z | 2026-02-02T10:12:16Z |
| suse-su-2026:0360-1 | Security update for openssl-1_1 | 2026-02-02T09:55:48Z | 2026-02-02T09:55:48Z |
| suse-su-2026:0359-1 | Security update for openssl-1_1 | 2026-02-02T09:55:09Z | 2026-02-02T09:55:09Z |
| suse-su-2026:0358-1 | Security update for openssl-1_1 | 2026-02-02T09:54:23Z | 2026-02-02T09:54:23Z |
| suse-su-2026:20217-1 | Security update for python-wheel | 2026-02-02T09:48:25Z | 2026-02-02T09:48:25Z |
| suse-su-2026:20228-1 | Security update for the Linux Kernel | 2026-02-02T09:27:27Z | 2026-02-02T09:27:27Z |
| suse-su-2026:0356-1 | Security update for qemu | 2026-02-01T21:18:57Z | 2026-02-01T21:18:57Z |
| suse-su-2026:0355-1 | Security update for glib2 | 2026-01-31T02:04:37Z | 2026-01-31T02:04:37Z |
| suse-su-2026:20216-1 | Security update for python-filelock | 2026-01-30T21:26:21Z | 2026-01-30T21:26:21Z |
| suse-su-2026:20215-1 | Security update for java-25-openjdk | 2026-01-30T15:26:50Z | 2026-01-30T15:26:50Z |
| suse-su-2026:20214-1 | Security update for alloy | 2026-01-30T14:35:10Z | 2026-01-30T14:35:10Z |
| suse-su-2026:20213-1 | Security update for udisks2 | 2026-01-30T14:28:35Z | 2026-01-30T14:28:35Z |
| suse-su-2026:20206-1 | Security update for udisks2 | 2026-01-30T14:28:35Z | 2026-01-30T14:28:35Z |
| suse-su-2026:20212-1 | Security update for libsoup | 2026-01-30T14:27:53Z | 2026-01-30T14:27:53Z |
| suse-su-2026:20205-1 | Security update for libsoup | 2026-01-30T14:27:53Z | 2026-01-30T14:27:53Z |
| suse-su-2026:0352-1 | Security update for the Linux Kernel | 2026-01-30T14:05:23Z | 2026-01-30T14:05:23Z |
| suse-su-2026:0351-1 | Security update for openCryptoki | 2026-01-30T14:04:38Z | 2026-01-30T14:04:38Z |
| suse-su-2026:0350-1 | Security update for the Linux Kernel | 2026-01-30T13:42:59Z | 2026-01-30T13:42:59Z |
| suse-su-2026:0348-1 | Security update for bind | 2026-01-30T11:17:07Z | 2026-01-30T11:17:07Z |
| suse-su-2026:0347-1 | Security update for glibc-livepatches | 2026-01-30T10:36:11Z | 2026-01-30T10:36:11Z |
| suse-su-2026:20201-1 | Security update for unbound | 2026-01-30T10:04:18Z | 2026-01-30T10:04:18Z |
| suse-su-2026:20180-1 | Security update for unbound | 2026-01-30T10:04:18Z | 2026-01-30T10:04:18Z |
| suse-su-2026:20200-1 | Security update for jasper | 2026-01-30T09:58:44Z | 2026-01-30T09:58:44Z |
| suse-su-2026:0346-1 | Security update for openssl-1_1 | 2026-01-30T09:01:28Z | 2026-01-30T09:01:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:10791 | Important: postgresql security update | 2024-12-04T00:00:00Z | 2024-12-05T14:23:53Z |
| alsa-2024:10788 | Important: postgresql:16 security update | 2024-12-04T00:00:00Z | 2024-12-05T14:26:18Z |
| alsa-2024:10787 | Important: postgresql:15 security update | 2024-12-04T00:00:00Z | 2024-12-05T14:30:14Z |
| alsa-2024:10785 | Important: postgresql:12 security update | 2024-12-04T00:00:00Z | 2024-12-05T14:31:43Z |
| alsa-2024:10779 | Moderate: python3:3.6.8 security update | 2024-12-04T00:00:00Z | 2024-12-05T14:41:26Z |
| alsa-2024:10752 | Important: firefox security update | 2024-12-03T00:00:00Z | 2024-12-05T14:27:13Z |
| alsa-2024:10702 | Important: firefox security update | 2024-12-02T00:00:00Z | 2024-12-05T14:28:42Z |
| alsa-2024:10592 | Important: thunderbird security update | 2024-12-02T00:00:00Z | 2024-12-03T14:16:19Z |
| alsa-2024:10591 | Important: thunderbird security update | 2024-12-02T00:00:00Z | 2024-12-03T18:10:32Z |
| alsa-2024:10590 | Important: python-tornado security update | 2024-12-02T00:00:00Z | 2024-12-03T08:37:48Z |
| alsa-2024:10481 | Important: webkit2gtk3 security update | 2024-11-27T00:00:00Z | 2024-12-02T10:32:19Z |
| alsa-2024:10472 | Important: webkit2gtk3 security update | 2024-11-27T00:00:00Z | 2024-12-02T10:34:31Z |
| alsa-2024:10384 | Important: tuned security update | 2024-11-26T00:00:00Z | 2024-12-02T10:37:46Z |
| alsa-2024:10379 | Important: pam security update | 2024-11-26T00:00:00Z | 2024-12-02T10:39:16Z |
| alsa-2024:10289 | Moderate: container-tools:rhel8 security update | 2024-11-26T00:00:00Z | 2024-12-02T10:50:29Z |
| alsa-2024:10282 | Low: kernel-rt:4.18.0 security update | 2024-11-26T00:00:00Z | 2024-12-02T10:40:48Z |
| alsa-2024:10281 | Moderate: kernel:4.18.0 security update | 2024-11-26T00:00:00Z | 2024-12-02T10:44:15Z |
| alsa-2024:10274 | Moderate: kernel security update | 2024-11-26T00:00:00Z | 2024-12-03T07:57:58Z |
| alsa-2024:10244 | Important: pam:1.5.1 security update | 2024-11-25T00:00:00Z | 2024-12-02T10:41:43Z |
| alsa-2024:10219 | Moderate: perl-App-cpanminus:1.7044 security update | 2024-11-25T00:00:00Z | 2024-12-02T10:52:55Z |
| alsa-2024:10218 | Moderate: perl-App-cpanminus security update | 2024-11-25T00:00:00Z | 2024-12-02T10:45:53Z |
| alsa-2024:10090 | Important: tigervnc security update | 2024-11-20T00:00:00Z | 2024-12-02T10:47:57Z |
| alsa-2024:9827 | Moderate: libvpx security update | 2024-11-18T00:00:00Z | 2024-11-18T11:47:38Z |
| alsa-2024:9689 | Low: binutils security update | 2024-11-14T00:00:00Z | 2024-11-15T12:45:11Z |
| alsa-2024:9644 | Important: squid:4 security update | 2024-11-14T00:00:00Z | 2024-11-15T12:51:05Z |
| alsa-2024:9636 | Important: webkit2gtk3 security update | 2024-11-14T00:00:00Z | 2024-11-15T12:47:22Z |
| alsa-2024:9625 | Important: squid security update | 2024-11-14T00:00:00Z | 2024-11-18T11:47:07Z |
| alsa-2024:9605 | Moderate: kernel security update | 2024-11-14T00:00:00Z | 2024-11-20T15:31:22Z |
| alsa-2024:9573 | Important: libsoup security update | 2024-11-13T00:00:00Z | 2024-11-14T08:09:34Z |
| alsa-2024:9559 | Important: libsoup security update | 2024-11-13T00:00:00Z | 2024-11-18T11:49:25Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-904 | Heap-use-after-free in std::__1::pair<std::__1::__tree_iterator<std::__1::__value_type<geos::geom::Coor | 2022-09-17T00:02:05.375997Z | 2023-07-11T14:17:31.116763Z |
| osv-2022-903 | Heap-buffer-overflow in AffixMgr::compound_check | 2022-09-17T00:01:06.305940Z | 2022-09-17T00:01:06.306200Z |
| osv-2022-902 | Invalid-free in function signature specialization <Arg | 2022-09-17T00:00:27.434825Z | 2022-09-17T00:00:27.435079Z |
| osv-2022-901 | Heap-double-free in HashMgr::~HashMgr | 2022-09-17T00:00:27.034470Z | 2022-09-17T00:00:27.034726Z |
| osv-2022-899 | Heap-buffer-overflow in std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<ch | 2022-09-16T00:00:59.054256Z | 2022-09-16T00:00:59.054490Z |
| osv-2022-896 | Segv on unknown address in Sass::unifyComplex | 2022-09-15T00:02:01.621945Z | 2023-12-22T14:15:53.864807Z |
| osv-2022-893 | UNKNOWN READ in AffixMgr::suffix_check | 2022-09-14T00:02:00.622371Z | 2022-09-14T00:02:00.622886Z |
| osv-2022-892 | Segv on unknown address in ddsi_config_init | 2022-09-14T00:00:47.567090Z | 2022-09-14T00:00:47.567334Z |
| osv-2022-891 | Stack-buffer-overflow in flb_env_var_translate | 2022-09-14T00:00:07.226430Z | 2023-02-24T01:24:28.948286Z |
| osv-2022-889 | Heap-use-after-free in AffixMgr::prefix_check | 2022-09-13T00:02:00.776572Z | 2022-09-13T00:02:00.776827Z |
| osv-2022-888 | Stack-buffer-overflow in gs_type2_interpret | 2022-09-13T00:00:12.414307Z | 2022-09-22T00:53:14.457923Z |
| osv-2022-886 | Heap-buffer-overflow in SfxEntry::add | 2022-09-12T00:00:26.866357Z | 2022-09-12T00:00:26.866618Z |
| osv-2022-883 | Segv on unknown address in HashMgr::add_word | 2022-09-11T00:01:56.479432Z | 2022-09-11T00:01:56.479808Z |
| osv-2022-882 | Use-of-uninitialized-value in SfxEntry::test_condition | 2022-09-11T00:01:48.463118Z | 2022-12-30T00:12:51.945769Z |
| osv-2022-881 | Heap-use-after-free in AcquireCodePageWithCapacity | 2022-09-11T00:00:52.269838Z | 2025-12-20T14:17:45.282070Z |
| osv-2022-880 | Global-buffer-overflow in _getBaseCellNeighbor | 2022-09-11T00:00:31.857265Z | 2022-09-11T00:00:31.857517Z |
| osv-2022-878 | Heap-double-free in flb_sds_destroy | 2022-09-10T00:02:19.362070Z | 2023-02-24T01:36:55.526867Z |
| osv-2022-874 | UNKNOWN WRITE in from8to16 | 2022-09-10T00:00:51.813984Z | 2022-09-10T00:00:51.814238Z |
| osv-2022-872 | Stack-buffer-overflow in PfxEntry::test_condition | 2022-09-10T00:00:29.690253Z | 2022-09-10T00:00:29.690509Z |
| osv-2022-871 | Security exception in java.base/java.util.Collections$UnmodifiableCollection.forEach | 2022-09-10T00:00:24.780487Z | 2024-08-27T14:15:10.826875Z |
| osv-2022-868 | Heap-buffer-overflow in AffixMgr::redundant_condition | 2022-09-10T00:00:11.270144Z | 2022-09-10T00:00:11.270409Z |
| osv-2022-867 | Heap-buffer-overflow in get_utf_8_string | 2022-09-09T00:01:54.157712Z | 2026-02-26T15:03:06.284832Z |
| osv-2022-866 | Stack-buffer-underflow in gs_type2_interpret | 2022-09-09T00:01:50.507792Z | 2022-09-22T01:06:12.582731Z |
| osv-2022-865 | Security exception in com.ctc.wstx.dtd.FullDTDReader.readContentSpec | 2022-09-09T00:01:50.175872Z | 2022-09-09T00:01:50.176112Z |
| osv-2022-864 | Heap-buffer-overflow in SuggestMgr::badcharkey_utf | 2022-09-09T00:00:10.507172Z | 2022-09-09T00:00:10.507431Z |
| osv-2022-863 | Heap-use-after-free in user_wrapper_opendir | 2022-09-08T00:02:36.883642Z | 2022-09-15T02:50:36.298826Z |
| osv-2022-861 | Heap-use-after-free in std::__1::pair<std::__1::__tree_iterator<std::__1::__value_type<geos::geom::Coor | 2022-09-08T00:02:26.218765Z | 2022-09-08T00:02:26.219053Z |
| osv-2022-859 | UNKNOWN READ in write_key | 2022-09-08T00:00:41.893865Z | 2024-11-03T14:10:16.487872Z |
| osv-2022-857 | Heap-double-free in fuzz_textfile.c | 2022-09-08T00:00:14.898621Z | 2022-09-08T00:00:14.898884Z |
| osv-2022-855 | UNKNOWN WRITE in Ins_ISECT | 2022-09-07T00:01:52.674790Z | 2022-09-20T00:53:10.048964Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-moodle-2024-33998 | moodle: stored XSS via user's name on participants page when opening some options | 2025-05-31T05:57:10.769Z | 2025-05-31T06:15:48.797Z |
| bit-moodle-2024-33997 | moodle: stored XSS risk when editing another user's equation in equation editor | 2025-05-31T05:57:07.361Z | 2025-05-31T06:15:48.797Z |
| bit-moodle-2024-33996 | moodle: broken access control when setting calendar event type | 2025-05-31T05:57:03.857Z | 2025-05-31T06:15:48.797Z |
| bit-keydb-2025-27151 | redis-check-aof may lead to stack overflow and potential RCE | 2025-05-31T05:45:47.374Z | 2025-08-22T06:06:45.932Z |
| bit-pytorch-2025-3001 | PyTorch torch.lstm_cell memory corruption | 2025-05-30T05:57:06.043Z | 2025-05-30T06:16:06.723Z |
| bit-pytorch-2025-3000 | PyTorch torch.jit.script memory corruption | 2025-05-30T05:57:02.547Z | 2025-05-30T06:16:06.723Z |
| bit-pytorch-2025-2999 | PyTorch torch.nn.utils.rnn.unpack_sequence memory corruption | 2025-05-30T05:56:59.244Z | 2025-05-30T06:16:06.723Z |
| bit-pytorch-2025-2998 | PyTorch torch.nn.utils.rnn.pad_packed_sequence memory corruption | 2025-05-30T05:56:55.766Z | 2025-05-30T06:16:06.723Z |
| bit-pytorch-2025-3730 | PyTorch LossCTC.cpp torch.nn.functional.ctc_loss denial of service | 2025-05-29T12:18:15.090Z | 2025-05-29T12:44:55.860Z |
| bit-pytorch-2025-3136 | PyTorch CUDACachingAllocator.cpp torch.cuda.memory.caching_allocator_delete memory corruption | 2025-05-29T12:17:56.494Z | 2025-05-29T12:44:55.860Z |
| bit-gitlab-2024-9163 | User Interface (UI) Misrepresentation of Critical Information in GitLab | 2025-05-28T12:12:54.375Z | 2025-08-11T00:06:06.142Z |
| bit-gitlab-2024-7803 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-05-28T12:12:16.561Z | 2025-08-11T00:06:06.142Z |
| bit-varnish-2025-47905 | 2025-05-28T11:59:55.247Z | 2025-05-30T06:16:06.723Z | |
| bit-pytorch-2025-3121 | PyTorch torch.jit.jit_module_from_flatbuffer memory corruption | 2025-05-28T11:55:44.258Z | 2025-05-28T12:14:51.629Z |
| bit-grafana-2025-3580 | 2025-05-28T11:44:30.552Z | 2025-10-16T11:24:40.537Z | |
| bit-gitlab-2025-4979 | Insufficient Granularity of Access Control in GitLab | 2025-05-26T07:43:31.883Z | 2025-08-11T00:06:06.142Z |
| bit-gitlab-2025-3111 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-05-26T07:43:30.470Z | 2025-06-02T18:14:59.426Z |
| bit-gitlab-2025-2853 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-05-26T07:43:29.030Z | 2025-06-02T18:14:59.426Z |
| bit-gitlab-2025-1110 | Insufficient Granularity of Access Control in GitLab | 2025-05-26T07:43:07.324Z | 2025-06-02T18:14:59.426Z |
| bit-gitlab-2025-0993 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-05-26T07:43:02.994Z | 2025-06-02T18:14:59.426Z |
| bit-gitlab-2025-0679 | Exposure of Private Personal Information to an Unauthorized Actor in GitLab | 2025-05-26T07:43:00.261Z | 2025-06-02T18:14:59.426Z |
| bit-gitlab-2025-0605 | Weak Authentication in GitLab | 2025-05-26T07:42:56.002Z | 2025-06-02T18:14:59.426Z |
| bit-gitlab-2024-12093 | Improper Validation of Consistency within Input in GitLab | 2025-05-26T07:39:36.069Z | 2025-06-02T18:14:59.426Z |
| bit-jenkins-2021-43859 | Denial of Service by injecting highly recursive collections or maps in XStream | 2025-05-26T07:13:32.699Z | 2025-11-06T13:25:46.476Z |
| bit-grafana-2025-4123 | 2025-05-26T07:12:09.889Z | 2025-08-18T08:35:59.174Z | |
| bit-modsecurity2-2025-47947 | ModSecurity Has Possible DoS Vulnerability | 2025-05-26T07:11:20.691Z | 2025-05-27T15:14:44.132Z |
| bit-modsecurity-2025-47947 | ModSecurity Has Possible DoS Vulnerability | 2025-05-26T07:11:15.892Z | 2025-05-26T07:44:26.501Z |
| bit-node-2025-23167 | 2025-05-21T06:00:30.697Z | 2025-05-21T06:18:45.476Z | |
| bit-node-2025-23166 | 2025-05-21T06:00:25.492Z | 2025-05-21T06:18:45.476Z | |
| bit-node-2025-23165 | 2025-05-21T06:00:20.189Z | 2025-05-21T06:18:45.476Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0259 | Multiples vulnérabilités dans les produits Fortinet | 2025-04-01T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| certfr-2025-avi-0258 | Multiples vulnérabilités dans les produits Apple | 2025-04-01T00:00:00.000000 | 2025-04-30T00:00:00.000000 |
| certfr-2025-avi-0257 | Vulnérabilité dans Synology Mail Server | 2025-03-31T00:00:00.000000 | 2025-03-31T00:00:00.000000 |
| certfr-2025-avi-0256 | Multiples vulnérabilités dans Broadcom VMware Tanzu Greenplum | 2025-03-31T00:00:00.000000 | 2025-03-31T00:00:00.000000 |
| certfr-2025-avi-0255 | Multiples vulnérabilités dans les produits IBM | 2025-03-28T00:00:00.000000 | 2025-03-28T00:00:00.000000 |
| certfr-2025-avi-0254 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-03-28T00:00:00.000000 | 2025-03-28T00:00:00.000000 |
| certfr-2025-avi-0253 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-03-28T00:00:00.000000 | 2025-03-28T00:00:00.000000 |
| certfr-2025-avi-0252 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-03-28T00:00:00.000000 | 2025-03-28T00:00:00.000000 |
| certfr-2025-avi-0251 | Vulnérabilité dans Mozilla Firefox | 2025-03-28T00:00:00.000000 | 2025-03-28T00:00:00.000000 |
| certfr-2025-avi-0250 | Multiples vulnérabilités dans StormShield Network Security | 2025-03-28T00:00:00.000000 | 2025-03-28T00:00:00.000000 |
| certfr-2025-avi-0249 | Vulnérabilité dans StormShield Network Security | 2025-03-27T00:00:00.000000 | 2025-03-27T00:00:00.000000 |
| certfr-2025-avi-0248 | Multiples vulnérabilités dans GitLab | 2025-03-27T00:00:00.000000 | 2025-03-27T00:00:00.000000 |
| certfr-2025-avi-0247 | Vulnérabilité dans Microsoft Edge | 2025-03-27T00:00:00.000000 | 2025-03-27T00:00:00.000000 |
| certfr-2025-avi-0246 | Vulnérabilité dans Mitel MiContact Center Business | 2025-03-27T00:00:00.000000 | 2025-03-27T00:00:00.000000 |
| certfr-2025-avi-0245 | Multiples vulnérabilités dans les produits Splunk | 2025-03-27T00:00:00.000000 | 2025-03-27T00:00:00.000000 |
| certfr-2025-avi-0244 | Vulnérabilité dans Exim | 2025-03-27T00:00:00.000000 | 2025-03-27T00:00:00.000000 |
| certfr-2025-avi-0243 | Multiples vulnérabilités dans VMware Tanzu Gemfire | 2025-03-27T00:00:00.000000 | 2025-03-27T00:00:00.000000 |
| certfr-2025-avi-0242 | Multiples vulnérabilités dans Moodle | 2025-03-26T00:00:00.000000 | 2025-03-26T00:00:00.000000 |
| certfr-2025-avi-0241 | Vulnérabilité dans Google Chrome | 2025-03-26T00:00:00.000000 | 2025-03-26T00:00:00.000000 |
| certfr-2025-avi-0240 | Vulnérabilité dans les produits VMware | 2025-03-26T00:00:00.000000 | 2025-03-26T00:00:00.000000 |
| certfr-2025-avi-0239 | Multiples vulnérabilités dans Microsoft Azure Kubernetes Service | 2025-03-25T00:00:00.000000 | 2025-03-25T00:00:00.000000 |
| certfr-2025-avi-0238 | Multiples vulnérabilités dans Laravel | 2025-03-25T00:00:00.000000 | 2025-03-25T00:00:00.000000 |
| certfr-2025-avi-0237 | Multiples vulnérabilités dans Microsoft Edge | 2025-03-24T00:00:00.000000 | 2025-03-24T00:00:00.000000 |
| certfr-2025-avi-0236 | Vulnérabilité dans Qnap NAKIVO Backup & Replication | 2025-03-24T00:00:00.000000 | 2025-03-24T00:00:00.000000 |
| certfr-2025-avi-0235 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-03-21T00:00:00.000000 | 2025-03-21T00:00:00.000000 |
| certfr-2025-avi-0234 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-03-21T00:00:00.000000 | 2025-03-21T00:00:00.000000 |
| certfr-2025-avi-0233 | Multiples vulnérabilités dans les produits IBM | 2025-03-21T00:00:00.000000 | 2025-03-21T00:00:00.000000 |
| certfr-2025-avi-0232 | Vulnérabilité dans Liferay | 2025-03-21T00:00:00.000000 | 2025-03-21T00:00:00.000000 |
| certfr-2025-avi-0231 | Vulnérabilité dans Microsoft Office | 2025-03-21T00:00:00.000000 | 2025-03-21T00:00:00.000000 |
| certfr-2025-avi-0230 | Vulnérabilité dans Tenable Nessus Agent | 2025-03-21T00:00:00.000000 | 2025-03-21T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2017-004607 | Deep Discovery Email Inspector vulnerable to arbitrary code execution | 2018-01-31T13:43+09:00 | 2018-01-31T13:43+09:00 |
| jvndb-2018-000005 | WordPress plugin "WP Retina 2x" vulnerable to cross-site scripting | 2018-01-30T12:30+09:00 | 2018-04-11T11:53+09:00 |
| jvndb-2018-000004 | The installer of "FLET'S VIRUS CLEAR Easy Setup & Application Tool" and "FLET'S VIRUS CLEAR v6 Easy Setup & Application Tool" may insecurely load Dynamic Link Libraries | 2018-01-22T14:17+09:00 | 2018-04-11T11:44+09:00 |
| jvndb-2018-000003 | GroupSession vulnerable to open redirect | 2018-01-19T14:19+09:00 | 2018-04-11T11:37+09:00 |
| jvndb-2018-000002 | Nootka App for Android vulnerable to OS command injection | 2018-01-19T14:19+09:00 | 2018-04-11T11:46+09:00 |
| jvndb-2017-005606 | Multiple vulnerabilities in Deep Discovery Email Inspector | 2018-01-17T16:15+09:00 | 2018-01-17T16:15+09:00 |
| jvndb-2017-002290 | Trend Micro Control Manager vulnerable to SQL injection | 2018-01-17T16:15+09:00 | 2018-01-17T16:15+09:00 |
| jvndb-2017-010584 | AssetView and AssetView PLATINUM contain multiple vulnerabilities | 2018-01-12T15:32+09:00 | 2018-01-12T15:32+09:00 |
| jvndb-2017-010236 | Cross-site Scripting Vulnerability in Fujitsu NetCOBOL | 2018-01-12T15:07+09:00 | 2018-01-12T15:07+09:00 |
| jvndb-2017-004687 | Cross-site Scripting Vulnerability in Fujitsu Interstage List Works | 2018-01-12T14:58+09:00 | 2018-01-12T14:58+09:00 |
| jvndb-2018-000001 | Lhaplus vulnerable to improper verification when expanding ZIP64 archives | 2018-01-11T14:18+09:00 | 2018-04-04T12:33+09:00 |
| jvndb-2017-000252 | MQTT.js issue in handling PUBLISH packets | 2017-12-25T14:00+09:00 | 2018-04-04T14:02+09:00 |
| jvndb-2017-000251 | The installer of Content Manager Assistant for PlayStation may insecurely load Dynamic Link Libraries | 2017-12-22T15:50+09:00 | 2018-04-04T14:04+09:00 |
| jvndb-2017-000250 | The installer of Music Center for PC may insecurely load Dynamic Link Libraries | 2017-12-22T15:50+09:00 | 2018-04-04T13:53+09:00 |
| jvndb-2017-000248 | OneThird CMS vulnerable to directory traversal | 2017-12-19T13:48+09:00 | 2018-04-04T13:58+09:00 |
| jvndb-2017-000249 | Multiple vulnerabilities in H2O | 2017-12-18T15:17+09:00 | 2018-04-04T13:49+09:00 |
| jvndb-2017-010280 | Fluentd vulenrable to escape sequence injection | 2017-12-11T14:13+09:00 | 2017-12-11T14:13+09:00 |
| jvndb-2017-000247 | Qt for Android environment variables alteration | 2017-12-11T13:40+09:00 | 2018-03-14T13:44+09:00 |
| jvndb-2017-000246 | Qt for Android vulnerable to OS command injection | 2017-12-11T13:40+09:00 | 2018-03-14T13:48+09:00 |
| jvndb-2017-010275 | Cross-site Scripting Vulnerability in JP1/Service Support and JP1/Integrated Management - Service Support | 2017-12-11T11:46+09:00 | 2017-12-20T11:09+09:00 |
| jvndb-2017-000245 | The installer of The Public Certification Service for Individuals "The JPKI user's software" may insecurely load Dynamic Link Libraries | 2017-12-06T14:42+09:00 | 2018-03-14T14:07+09:00 |
| jvndb-2017-000244 | Multiple vulnerabilities in multiple Buffalo broadband routers | 2017-12-01T16:17+09:00 | 2018-03-14T14:15+09:00 |
| jvndb-2017-010043 | Cross-site Scripting Vulnerability in JP1/Operations Analytics | 2017-12-01T14:59+09:00 | 2017-12-20T11:09+09:00 |
| jvndb-2017-000243 | Movable Type plugin A-Member and A-Reserve vulnerable to SQL injection | 2017-11-30T15:50+09:00 | 2018-03-14T14:20+09:00 |
| jvndb-2017-000241 | Multiple vulnerabilities in Wireless mobile storage "Digizo ShAirDisk" PTW-WMS1 | 2017-11-30T15:45+09:00 | 2018-03-14T14:13+09:00 |
| jvndb-2017-000242 | StreamRelay.net.exe and sDNSProxy.exe vulnerable to denial-of-service (DoS) | 2017-11-29T14:54+09:00 | 2018-03-14T14:26+09:00 |
| jvndb-2017-009884 | QND Advance/Standard vulnerable to directory traversal | 2017-11-28T11:26+09:00 | 2018-03-14T14:17+09:00 |
| jvndb-2017-000240 | PWR-Q200 vulnerable to DNS cache poisoning attacks | 2017-11-22T13:51+09:00 | 2018-03-14T14:19+09:00 |
| jvndb-2017-000239 | The installer of Media Go and Music Center for PC may insecurely load Dynamic Link Libraries | 2017-11-21T15:40+09:00 | 2018-03-14T14:25+09:00 |
| jvndb-2017-000238 | Robotic appliance COCOROBO vulnerable to session management | 2017-11-16T14:03+09:00 | 2018-03-14T14:09+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-31332 | WordPress GPXpress plugin跨站脚本漏洞 | 2025-12-22 | 2025-12-25 |
| cnvd-2025-31331 | WordPress FX Currency Converter plugin跨站脚本漏洞 | 2025-12-22 | 2025-12-25 |
| cnvd-2025-31330 | WordPress Freshchat plugin跨站请求伪造漏洞 | 2025-12-22 | 2025-12-25 |
| cnvd-2025-31329 | WordPress Fix Media Library plugin信息泄露漏洞 | 2025-12-22 | 2025-12-25 |
| cnvd-2025-31328 | WordPress Filebird Plugin缺少授权漏洞 | 2025-12-22 | 2025-12-25 |
| cnvd-2025-31327 | WordPress FileBird Pro plugin缺失授权漏洞 | 2025-12-22 | 2025-12-25 |
| cnvd-2025-31115 | WordPress Fancy Product Designer plugin信息泄露漏洞 | 2025-12-22 | 2025-12-23 |
| cnvd-2025-31114 | WordPress Fancy Product Designer plugin服务器端请求伪造漏洞 | 2025-12-22 | 2025-12-23 |
| cnvd-2025-31113 | WordPress Events Manager Plugin信息泄露漏洞 | 2025-12-22 | 2025-12-23 |
| cnvd-2026-05361 | ChurchCRM legacy端点SQL注入漏洞 | 2025-12-19 | 2026-01-19 |
| cnvd-2026-04239 | Apple macOS Tahoe安全绕过漏洞(CNVD-2026-04239) | 2025-12-19 | 2026-01-16 |
| cnvd-2025-31154 | Apple macOS Tahoe权限问题漏洞 | 2025-12-19 | 2025-12-22 |
| cnvd-2025-31153 | Apple macOS Tahoe符号链接处理不当漏洞(CNVD-2025-3115302) | 2025-12-19 | 2025-12-22 |
| cnvd-2025-31152 | Apple macOS Tahoe注入漏洞 | 2025-12-19 | 2025-12-22 |
| cnvd-2025-31151 | Apple macOS Tahoe内存处理不当漏洞 | 2025-12-19 | 2025-12-22 |
| cnvd-2025-31150 | Apple macOS Tahoe沙盒限制不足漏洞 | 2025-12-19 | 2025-12-22 |
| cnvd-2025-31149 | Apple macOS Tahoe逻辑限制不足漏洞 | 2025-12-19 | 2025-12-23 |
| cnvd-2025-31148 | Apple macOS Tahoe符号链接验证不足漏洞 | 2025-12-19 | 2025-12-23 |
| cnvd-2025-31147 | Apple macOS Tahoe验证不足漏洞 | 2025-12-19 | 2025-12-23 |
| cnvd-2025-31146 | Apple macOS Tahoe检查不足漏洞(CNVD-2025-3114612) | 2025-12-19 | 2025-12-23 |
| cnvd-2025-31145 | Apple macOS Tahoe权限限制不足漏洞 | 2025-12-19 | 2025-12-23 |
| cnvd-2025-31144 | Apple macOS Tahoe检查不足漏洞 | 2025-12-19 | 2025-12-23 |
| cnvd-2026-14407 | TeamViewer DEX Client权限提升漏洞 | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14406 | MailEnable不安全DLL加载漏洞(CNVD-2026-14406) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14405 | MailEnableMailEnableMailEnable不安全DLL加载漏洞(CNVD-2026-14405) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14404 | MailEnableMailEnable不安全DLL加载漏洞(CNVD-2026-14404) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14403 | MailEnableMailEnable不安全DLL加载漏洞(CNVD-2026-14403) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14402 | MailEnable不安全DLL加载漏洞(CNVD-2026-14402) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14401 | MailEnable不安全DLL加载漏洞(CNVD-2026-14401) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14400 | MailEnable不安全DLL加载漏洞(CNVD-2026-14400) | 2025-12-18 | 2026-03-20 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-00267 | Уязвимость системы сбора данных Logstash программного средства мониторинга и анализа лого… | 12.01.2026 | 12.01.2026 |
| bdu:2026-00266 | Уязвимость функции strcpy() микропрограммного обеспечения маршрутизаторов UTT 512W, позво… | 12.01.2026 | 12.01.2026 |
| bdu:2026-00265 | Уязвимость системы внутренней связи и экстренного оповещения Zenitel VS-IS, связанная с н… | 12.01.2026 | 12.01.2026 |
| bdu:2026-00264 | Уязвимость httpd-демона (/usr/sbin/httpd) микропрограммного обеспечения роутеров Tenda 4G… | 12.01.2026 | 12.01.2026 |
| bdu:2026-00263 | Уязвимость веб-интерфейса микропрограммного обеспечения роутеров Tenda 4G03 Pro, позволяю… | 12.01.2026 | 12.01.2026 |
| bdu:2026-00262 | Уязвимость корпоративной системы управления электронной почтой Zimbra Collaboration Suite… | 12.01.2026 | 12.01.2026 |
| bdu:2025-16159 | Уязвимость функции usbnet_resume_rx() модуля drivers/net/usb/usbnet.c ядра операционной с… | 12.01.2026 | 27.01.2026 |
| bdu:2026-00261 | Уязвимость ядра HTTP-сервера Undertow, связанная с ошибками механизма проверки входных да… | 09.01.2026 | 12.01.2026 |
| bdu:2026-00260 | Уязвимость среды разработки программного обеспечения систем автоматизации технологических… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00259 | Уязвимость межсетевого экрана Wangshen SecGate 3600, связанная с неверным ограничением им… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00258 | Уязвимость программного обеспечения для управления, контроля и организации процессов печа… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00257 | Уязвимость программного пакета UniSharp laravel-filemanager, связанная с неверным управле… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00256 | Уязвимость программной платформы для управления сетевым оборудованием Ubiquiti Ubiquiti U… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00255 | Уязвимость программного средства UniFi Network, связанная с недостатками процедуры аутент… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00254 | Уязвимость программного обеспечения для управления электрозарядными станциями UniFi Conne… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00253 | Уязвимость системы контроля доступа UniFi Access, связанная с недостатками процедуры ауте… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00252 | Уязвимость PHP-фреймворка Laravel, связанная с непринятием мер по защите структуры веб-ст… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00251 | Уязвимость программного обеспечения сетевого мониторинга и управления ИТ-инфраструктурой … | 09.01.2026 | 09.01.2026 |
| bdu:2026-00250 | Уязвимость фреймворка для веб-краулинга Scrapy, связанная с неконтролируемым расходом рес… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00249 | Уязвимость программного средства управления промышленными процессами EcoStruxure OPC UA S… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00248 | Уязвимость DNS-сервера PowerDNS Recursor, связанная с непринятием мер по нейтрализации ос… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00247 | Уязвимость DNS-сервера PowerDNS Recursor, связанная с непринятием мер по нейтрализации ос… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00246 | Уязвимость компонента nghttp2 Provider программного обеспечения PowerDNS DNSdist, позволя… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00245 | Уязвимость набор продуктов для упрощения приема факсимильных сообщений MICI Network NetFa… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00244 | Уязвимость набор продуктов для упрощения приема факсимильных сообщений MICI Network NetFa… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00243 | Уязвимость MCP- сервера Framelink Figma MCP Server, связанная с использованием незащищенн… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00242 | Уязвимость платформы для анализа киберугроз OpenCTI, связанная с неверным управлением ген… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00241 | Уязвимость плагина источника данных платформа с открытым исходным кодом для мониторинга и… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00240 | Уязвимость плагина источника данных платформа с открытым исходным кодом для мониторинга и… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00239 | Уязвимость библиотеки cpp-httplib языка программирования C++, позволяющая нарушителю вызв… | 09.01.2026 | 09.01.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201912-0510 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-03-09T20:07:12.460000Z |
| var-201202-0137 | Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote at… | 2026-03-09T20:07:10.016000Z |
| var-201908-0422 | Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denia… | 2026-03-09T20:06:59.480000Z |
| var-201110-0444 | Heap-based buffer overflow in the ecommunity_ecom2str function in bgp_ecommunity.c in bgp… | 2026-03-09T20:06:58.414000Z |
| var-201105-0094 | The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library … | 2026-03-09T20:06:56.785000Z |
| var-200102-0040 | Mac OS Runtime for Java (MRJ) 2.2.3 allows remote attackers to use malicious applets to r… | 2026-03-09T20:06:23.881000Z |
| var-201404-0246 | Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and… | 2026-03-09T20:05:14.278000Z |
| var-200804-0038 | Cross-site scripting (XSS) vulnerability in Apple WebKit, as used in Safari before 3.1.1,… | 2026-03-09T20:04:35.176000Z |
| var-200511-0015 | Multiple unspecified vulnerabilities in the Internet Key Exchange version 1 (IKEv1) imple… | 2026-03-09T20:04:28.216000Z |
| var-200112-0223 | Alcatel ADSL modems allow remote attackers to access the Trivial File Transfer Protocol (… | 2026-03-09T20:04:27.784000Z |
| var-202003-1784 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2026-03-09T20:04:27.314000Z |
| var-201108-0184 | Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and … | 2026-03-09T20:04:20.532000Z |
| var-201010-0168 | Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache… | 2026-03-09T20:04:19.824000Z |
| var-200506-0133 | Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow r… | 2026-03-09T20:04:07.619000Z |
| var-201712-0264 | An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari be… | 2026-03-09T20:04:03.611000Z |
| var-200904-0821 | The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products… | 2026-03-09T20:03:58.377000Z |
| var-200703-0024 | Unspecified vulnerability in the authentication feature for DirectoryService (DS Plug-Ins… | 2026-03-09T20:03:26.238000Z |
| var-201110-0393 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2026-03-09T20:03:25.633000Z |
| var-201006-0308 | The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1… | 2026-03-09T20:03:20.406000Z |
| var-201302-0250 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-09T20:03:19.683000Z |
| var-201912-0484 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2026-03-09T20:03:12.812000Z |
| var-201501-0442 | OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce cer… | 2026-03-09T20:03:12.372000Z |
| var-200706-0666 | Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apac… | 2026-03-09T20:03:11.768000Z |
| var-201904-1323 | A memory corruption issue was addressed with improved memory handling. This issue affecte… | 2026-03-09T20:03:10.516000Z |
| var-201311-0379 | The scan function in ext/date/lib/parse_iso_intervals.c in PHP through 5.5.6 does not pro… | 2026-03-09T20:03:10.246000Z |
| var-200810-0395 | Weblog in Mac OS X Server 10.4.11 does not properly check an error condition when a weblo… | 2026-03-09T20:02:36.441000Z |
| var-201302-0065 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-09T20:02:27.636000Z |
| var-201711-0446 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2026-03-09T20:02:26.641000Z |
| var-200711-0064 | Mail in Apple Mac OS X Leopard (10.5.1) allows user-assisted remote attackers to execute … | 2026-03-09T20:01:38.739000Z |
| var-201306-0238 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-09T20:01:36.303000Z |