Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-6563 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
H3C Magic B1 aspForm SetAPWifiorLedInfoById buffer overflow |
H3C |
Magic B1 |
2026-04-19T08:30:14.248Z | 2026-04-20T14:18:45.761Z |
| CVE-2026-6562 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
dameng100 muucmf index.html getListByPage sql injection |
dameng100 |
muucmf |
2026-04-19T08:15:11.633Z | 2026-04-20T16:06:23.786Z |
| CVE-2026-6561 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
EyouCMS Index.php edit_adminlogo unrestricted upload |
n/a |
EyouCMS |
2026-04-19T07:15:11.267Z | 2026-04-20T14:55:35.698Z |
| CVE-2026-6560 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
H3C Magic B0 aspForm Edit_BasicSSID buffer overflow |
H3C |
Magic B0 |
2026-04-19T06:45:14.514Z | 2026-04-20T15:20:44.443Z |
| CVE-2026-6559 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Wavlink WL-WN579A3 login.cgi sub_401F80 cross site scripting |
Wavlink |
WL-WN579A3 |
2026-04-19T05:15:15.503Z | 2026-04-20T16:07:54.597Z |
| CVE-2026-0868 |
6.4 (3.1)
|
EMC Scheduling Manager <= 4.4 - Authenticated (Contrib… |
turn2honey |
EMC – Easily Embed Calendly Scheduling |
2026-04-19T03:26:14.765Z | 2026-04-20T16:53:24.024Z |
| CVE-2026-41242 |
9.4 (4.0)
|
protobufjs has an arbitrary code execution issue |
protobufjs |
protobuf.js |
2026-04-18T16:18:10.652Z | 2026-04-20T16:03:57.689Z |
| CVE-2026-40948 |
N/A
|
Apache Airflow Providers Keycloak: OAuth Login CSRF — … |
Apache Software Foundation |
Apache Airflow Providers Keycloak |
2026-04-18T13:22:41.577Z | 2026-04-20T16:17:53.543Z |
| CVE-2026-2986 |
6.4 (3.1)
|
Contextual Related Posts <= 4.2.1 - Authenticated (Con… |
ajay |
Contextual Related Posts |
2026-04-18T11:16:10.980Z | 2026-04-20T14:19:06.323Z |
| CVE-2026-2505 |
5.4 (3.1)
|
Categories Images <= 3.3.1 - Authenticated (Contributo… |
elzahlan |
Categories Images |
2026-04-18T09:26:52.654Z | 2026-04-20T13:46:07.918Z |
| CVE-2026-0894 |
6.4 (3.1)
|
Content Blocks (Custom Post Widget) <= 3.3.9 - Authent… |
vanderwijk |
Content Blocks (Custom Post Widget) |
2026-04-18T09:26:52.078Z | 2026-04-20T13:48:40.598Z |
| CVE-2026-41254 |
4 (3.1)
|
Little CMS (lcms2) through 2.18 has an integer ov… |
littlecms |
little cms color engine |
2026-04-18T06:43:13.741Z | 2026-04-20T16:09:45.530Z |
| CVE-2026-32690 |
N/A
|
Apache Airflow: 3.x - Nested Variable Secret Values By… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:22:26.081Z | 2026-04-20T16:11:33.956Z |
| CVE-2026-30898 |
N/A
|
Apache Airflow: Bad example of BashOperator shell inje… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:20:48.647Z | 2026-04-22T03:55:38.783Z |
| CVE-2026-30912 |
N/A
|
Apache Airflow: Exposing stack trace in case of constr… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:20:30.254Z | 2026-04-20T16:26:07.128Z |
| CVE-2026-25917 |
N/A
|
Apache Airflow: API extra-links triggers XCom deserial… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:20:11.187Z | 2026-04-22T13:58:49.807Z |
| CVE-2026-32228 |
N/A
|
Apache Airflow: Users with asset materialization permi… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:19:47.512Z | 2026-04-20T15:54:05.072Z |
| CVE-2026-41253 |
6.9 (3.1)
|
In iTerm2 through 3.6.9, displaying a .txt file c… |
iTerm2 |
iTerm2 |
2026-04-18T05:27:08.202Z | 2026-04-20T15:52:10.357Z |
| CVE-2026-6048 |
6.4 (3.1)
|
Flipbox Addon for Elementor <= 2.1.1 - Authenticated (… |
dragwyb |
Flipbox Addon for Elementor |
2026-04-18T03:37:05.751Z | 2026-04-20T13:46:08.081Z |
| CVE-2026-6518 |
8.8 (3.1)
|
CMP – Coming Soon & Maintenance Plugin by NiteoThemes … |
niteo |
CMP – Coming Soon & Maintenance Plugin by NiteoThemes |
2026-04-18T03:37:04.707Z | 2026-04-20T13:46:08.222Z |
| CVE-2026-4801 |
6.4 (3.1)
|
Page Builder Gutenberg Blocks <= 3.1.16 - Authenticate… |
godaddy |
Page Builder Gutenberg Blocks – CoBlocks |
2026-04-18T03:37:03.859Z | 2026-04-20T14:42:38.120Z |
| CVE-2026-40494 |
9.8 (3.1)
|
SAIL has heap buffer overflow in TGA RLE decoder — raw… |
HappySeaFox |
sail |
2026-04-18T01:42:48.830Z | 2026-04-20T14:55:42.859Z |
| CVE-2026-40493 |
9.8 (3.1)
|
SAIL has heap buffer overflow in PSD decoder — bpp mis… |
HappySeaFox |
sail |
2026-04-18T01:41:14.664Z | 2026-04-20T16:15:22.120Z |
| CVE-2026-40492 |
9.8 (3.1)
|
SAIL has heap buffer overflow in XWD decoder — bits_pe… |
HappySeaFox |
sail |
2026-04-18T01:39:48.056Z | 2026-04-20T15:24:42.029Z |
| CVE-2026-40491 |
6.5 (3.1)
|
gdown Affected by Arbitrary File Write via Path Traver… |
wkentaro |
gdown |
2026-04-18T01:36:47.659Z | 2026-04-20T15:50:02.983Z |
| CVE-2026-40490 |
6.8 (3.1)
|
AsyncHttpClient leaks authorization credentials to unt… |
AsyncHttpClient |
async-http-client |
2026-04-18T01:31:13.860Z | 2026-04-20T14:55:50.254Z |
| CVE-2026-1559 |
6.4 (3.1)
|
Youzify <= 1.3.6 - Authenticated (Subscriber+) Stored … |
youzify |
Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress |
2026-04-18T01:26:05.210Z | 2026-04-20T13:46:08.353Z |
| CVE-2026-1838 |
6.1 (3.1)
|
Hostel <= 1.1.6 - Reflected Cross-Site Scripting via '… |
prasunsen |
Hostel |
2026-04-18T01:26:04.643Z | 2026-04-20T14:19:29.627Z |
| CVE-2026-40489 |
8.6 (4.0)
|
editorconfig-core-c has incomplete fix for CVE-2023-0341 |
editorconfig |
editorconfig-core-c |
2026-04-18T01:24:57.278Z | 2026-04-20T16:15:31.570Z |
| CVE-2026-40487 |
8.9 (3.1)
|
Postiz Has Unrestricted File Upload via MIME Type Spoo… |
gitroomhq |
postiz-app |
2026-04-18T01:19:06.588Z | 2026-04-20T15:25:40.893Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-6586 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
TransformerOptimus SuperAGI Budget Endpoint budget.py … |
TransformerOptimus |
SuperAGI |
2026-04-19T23:45:12.377Z | 2026-04-20T16:33:28.763Z |
| CVE-2026-6585 |
5.3 (4.0)
5.4 (3.1)
5.4 (3.0)
|
TransformerOptimus SuperAGI Organisation Update Endpoi… |
TransformerOptimus |
SuperAGI |
2026-04-19T23:30:14.085Z | 2026-04-20T14:55:07.060Z |
| CVE-2026-6584 |
5.3 (4.0)
5.4 (3.1)
5.4 (3.0)
|
TransformerOptimus SuperAGI User Update Endpoint user.… |
TransformerOptimus |
SuperAGI |
2026-04-19T23:15:16.091Z | 2026-04-20T15:07:48.363Z |
| CVE-2026-6583 |
5.3 (4.0)
5.4 (3.1)
5.4 (3.0)
|
TransformerOptimus SuperAGI API Key Management Endpoin… |
TransformerOptimus |
SuperAGI |
2026-04-19T23:00:20.450Z | 2026-04-20T16:14:10.062Z |
| CVE-2026-6582 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
TransformerOptimus SuperAGI Vector Database Management… |
TransformerOptimus |
SuperAGI |
2026-04-19T22:45:11.780Z | 2026-04-20T14:06:22.007Z |
| CVE-2026-6581 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
H3C Magic B1 aspForm SetMobileAPInfoById buffer overflow |
H3C |
Magic B1 |
2026-04-19T22:30:15.766Z | 2026-04-20T16:30:27.926Z |
| CVE-2026-6580 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
liangliangyy DjangoBlog Amap API Call views.py hard-co… |
liangliangyy |
DjangoBlog |
2026-04-19T22:15:12.387Z | 2026-04-20T14:55:13.830Z |
| CVE-2026-6579 |
6.9 (4.0)
6.5 (3.1)
6.5 (3.0)
|
liangliangyy DjangoBlog Clean Endpoint views.py missin… |
liangliangyy |
DjangoBlog |
2026-04-19T22:00:17.503Z | 2026-04-20T15:18:38.633Z |
| CVE-2026-6578 |
6.3 (4.0)
5.6 (3.1)
5.6 (3.0)
|
liangliangyy DjangoBlog Setting settings.py hard-coded… |
liangliangyy |
DjangoBlog |
2026-04-19T21:15:14.960Z | 2026-04-20T16:12:54.941Z |
| CVE-2026-6577 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
liangliangyy DjangoBlog logtracks Endpoint views.py mi… |
liangliangyy |
DjangoBlog |
2026-04-19T19:30:15.098Z | 2026-04-20T14:06:48.414Z |
| CVE-2026-6576 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
liangliangyy DjangoBlog WeChat Bot commonapi.py Comman… |
liangliangyy |
DjangoBlog |
2026-04-19T19:00:16.264Z | 2026-04-20T16:28:07.032Z |
| CVE-2026-6574 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
osuuu LightPicture API Upload Endpoint lp.sql hard-cod… |
osuuu |
LightPicture |
2026-04-19T13:30:17.265Z | 2026-04-20T14:55:21.489Z |
| CVE-2026-6573 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
PHPEMS Instant Exam Creation exams.master.php temppage… |
n/a |
PHPEMS |
2026-04-19T12:45:14.558Z | 2026-04-20T15:19:11.751Z |
| CVE-2026-6572 |
6.3 (4.0)
5.6 (3.1)
5.6 (3.0)
|
Collabora KodExplorer fileUpload Endpoint share.class.… |
Collabora |
KodExplorer |
2026-04-19T12:15:14.167Z | 2026-04-20T16:11:35.361Z |
| CVE-2026-6571 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
kodcloud KodExplorer systemRole.class.php roleGroupAct… |
kodcloud |
KodExplorer |
2026-04-19T12:00:17.810Z | 2026-04-20T14:18:17.474Z |
| CVE-2026-6570 |
5.1 (4.0)
2.7 (3.1)
2.7 (3.0)
|
kodcloud KodExplorer systemMember.class.php initInstal… |
kodcloud |
KodExplorer |
2026-04-19T11:00:17.545Z | 2026-04-20T16:23:44.786Z |
| CVE-2026-6569 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
kodcloud KodExplorer fileGet Endpoint share.class.php … |
kodcloud |
KodExplorer |
2026-04-19T10:15:11.445Z | 2026-04-20T14:55:28.674Z |
| CVE-2026-6568 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
kodcloud KodExplorer Public Share share.class.php init… |
kodcloud |
KodExplorer |
2026-04-19T09:45:11.131Z | 2026-04-20T15:20:09.531Z |
| CVE-2026-6564 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
EMQ EMQX Enterprise Session Handling improper authorization |
EMQ |
EMQX Enterprise |
2026-04-19T09:30:15.159Z | 2026-04-20T16:09:52.702Z |
| CVE-2026-6563 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
H3C Magic B1 aspForm SetAPWifiorLedInfoById buffer overflow |
H3C |
Magic B1 |
2026-04-19T08:30:14.248Z | 2026-04-20T14:18:45.761Z |
| CVE-2026-6562 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
dameng100 muucmf index.html getListByPage sql injection |
dameng100 |
muucmf |
2026-04-19T08:15:11.633Z | 2026-04-20T16:06:23.786Z |
| CVE-2026-6561 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
EyouCMS Index.php edit_adminlogo unrestricted upload |
n/a |
EyouCMS |
2026-04-19T07:15:11.267Z | 2026-04-20T14:55:35.698Z |
| CVE-2026-6560 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
H3C Magic B0 aspForm Edit_BasicSSID buffer overflow |
H3C |
Magic B0 |
2026-04-19T06:45:14.514Z | 2026-04-20T15:20:44.443Z |
| CVE-2026-6559 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Wavlink WL-WN579A3 login.cgi sub_401F80 cross site scripting |
Wavlink |
WL-WN579A3 |
2026-04-19T05:15:15.503Z | 2026-04-20T16:07:54.597Z |
| CVE-2026-0868 |
6.4 (3.1)
|
EMC Scheduling Manager <= 4.4 - Authenticated (Contrib… |
turn2honey |
EMC – Easily Embed Calendly Scheduling |
2026-04-19T03:26:14.765Z | 2026-04-20T16:53:24.024Z |
| CVE-2026-6056 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-04-18T22:19:26.698Z | |
| CVE-2026-41242 |
9.4 (4.0)
|
protobufjs has an arbitrary code execution issue |
protobufjs |
protobuf.js |
2026-04-18T16:18:10.652Z | 2026-04-20T16:03:57.689Z |
| CVE-2026-40948 |
N/A
|
Apache Airflow Providers Keycloak: OAuth Login CSRF — … |
Apache Software Foundation |
Apache Airflow Providers Keycloak |
2026-04-18T13:22:41.577Z | 2026-04-20T16:17:53.543Z |
| CVE-2026-2986 |
6.4 (3.1)
|
Contextual Related Posts <= 4.2.1 - Authenticated (Con… |
ajay |
Contextual Related Posts |
2026-04-18T11:16:10.980Z | 2026-04-20T14:19:06.323Z |
| CVE-2026-2505 |
5.4 (3.1)
|
Categories Images <= 3.3.1 - Authenticated (Contributo… |
elzahlan |
Categories Images |
2026-04-18T09:26:52.654Z | 2026-04-20T13:46:07.918Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-6f7g-v4pp-r667 |
7.7 (4.0)
|
Flowise: Unauthenticated OAuth 2.0 Access Token Disclosure via Public Chatflow in Flowise | 2026-04-16T21:52:46Z | 2026-04-16T21:52:46Z |
| ghsa-6r77-hqx7-7vw8 |
7.1 (3.1)
|
Flowise: APIChain Prompt Injection SSRF in GET/POST API Chains | 2026-04-16T21:52:11Z | 2026-04-16T21:52:11Z |
| ghsa-2x8m-83vc-6wv4 |
7.1 (3.1)
|
Flowise: SSRF Protection Bypass (TOCTOU & Default Insecure) | 2026-04-16T21:51:00Z | 2026-04-18T00:15:09Z |
| ghsa-xhmj-rg95-44hv |
7.1 (3.1)
|
Flowise: SSRF Protection Bypass via Unprotected Built-in HTTP Modules in Custom Function Sandbox | 2026-04-16T21:50:12Z | 2026-04-16T21:50:12Z |
| ghsa-rh7v-6w34-w2rr |
7.1 (3.1)
|
Flowise: File Upload Validation Bypass in createAttachment | 2026-04-16T21:49:28Z | 2026-04-16T21:49:28Z |
| ghsa-cvrr-qhgw-2mm6 |
7.7 (3.1)
|
Flowise: Parameter Override Bypass Remote Command Execution | 2026-04-16T21:46:39Z | 2026-04-16T21:46:39Z |
| ghsa-4jpm-cgx2-8h37 |
7.7 (4.0)
|
Flowise: Sensitive Data Leak in public-chatbotConfig | 2026-04-16T21:44:49Z | 2026-04-16T21:44:49Z |
| ghsa-48m6-ch88-55mj |
8.1 (3.1)
|
Flowise: Improper Mass Assignment in Account Registration Enables Unauthorized Organization Association | 2026-04-16T21:44:24Z | 2026-04-16T21:44:24Z |
| ghsa-9wc7-mj3f-74xv |
9.4 (4.0)
|
Flowise: Code Injection in CSVAgent leads to Authenticated RCE | 2026-04-16T21:44:15Z | 2026-04-16T21:44:15Z |
| ghsa-f228-chmx-v6j6 |
8.3 (3.1)
|
Flowise: Remote code execution vulnerability in AirtableAgent.ts caused by lack of input verificati… | 2026-04-16T21:43:57Z | 2026-04-16T21:43:57Z |
| ghsa-fgw5-hp8f-xfhc |
5.0 (3.1)
|
Istio: SSRF via RequestAuthentication jwksUri | 2026-04-16T21:38:09Z | 2026-04-16T21:38:09Z |
| ghsa-rp42-5vxx-qpwr |
7.5 (3.1)
|
basic-ftp vulnerable to denial of service via unbounded memory consumption in Client.list() | 2026-04-16T21:37:48Z | 2026-04-16T21:37:48Z |
| ghsa-8wfp-579w-6r25 |
7.7 (3.1)
|
Kyverno apiCall automatically forwards ServiceAccount token to external endpoints (credential leak) | 2026-04-16T21:37:29Z | 2026-04-16T21:37:29Z |
| ghsa-f9g8-6ppc-pqq4 |
8.1 (3.1)
|
Kyverno: ServiceAccount token leaked to external servers via apiCall service URL | 2026-04-16T21:36:20Z | 2026-04-16T21:36:20Z |
| ghsa-cvq5-hhx3-f99p |
7.7 (3.1)
|
Kyverno: Cross-Namespace Read Bypasses RBAC Isolation (CVE-2026-22039 Incomplete Fix) | 2026-04-16T21:35:04Z | 2026-04-16T21:35:04Z |
| ghsa-2mvx-f5qm-v2ch |
8.8 (4.0)
|
Unauthenticated Information Disclosure (IDOR) via Multisite switch_to_blog in My Calendar | 2026-04-16T21:34:40Z | 2026-04-16T21:34:40Z |
| ghsa-vp6r-9m58-5xv8 |
8.1 (3.1)
|
OmniFaces: EL injection via crafted resource name in wildcard CDN mapping | 2026-04-16T21:31:14Z | 2026-04-16T21:31:14Z |
| ghsa-p7qm-4248-g65p |
7.1 (4.0)
|
Incorrect use of boot service in the AMD Platform Configuration Blob (APCB) SMM driver could allow … | 2026-04-16T21:31:13Z | 2026-04-16T21:31:13Z |
| ghsa-p7f2-6479-84wx |
6.6 (3.1)
|
Dell PowerScale OneFS, versions prior to 9.12.0.0, contains an insertion of sensitive information i… | 2026-04-16T21:31:13Z | 2026-04-16T21:31:13Z |
| ghsa-mwrh-fvw2-28c5 |
5.9 (4.0)
|
A missing lock verification in AMD Secure Processor (ASP) firmware may permit a locally authenticat… | 2026-04-16T21:31:13Z | 2026-04-16T21:31:13Z |
| ghsa-26fh-vcwc-mcgv |
8.3 (3.1)
|
Improper validation of bash commands in Snowflake Cortex Code CLI versions prior to 1.0.25 allowed … | 2026-04-16T21:31:13Z | 2026-04-16T21:31:13Z |
| ghsa-c43c-pr38-m5g2 |
5.6 (4.0)
|
Insufficient checks of the RMP on host buffer access in IOMMU may allow an attacker with privileges… | 2026-04-16T21:31:12Z | 2026-04-16T21:31:12Z |
| ghsa-4rvm-g2vh-jm4x |
4.4 (3.1)
|
Dell PowerScale OneFS, versions prior to 9.12.0.0, contains an improper resource shutdown or releas… | 2026-04-16T21:31:12Z | 2026-04-16T21:31:12Z |
| ghsa-x284-j5p8-9c5p |
6.8 (4.0)
|
pypdf: Manipulated FlateDecode image dimensions can exhaust RAM | 2026-04-16T21:30:25Z | 2026-04-16T21:30:25Z |
| ghsa-4pxv-j86v-mhcw |
6.8 (4.0)
|
pypdf: Possible long runtimes for wrong size values in incremental mode | 2026-04-16T21:30:12Z | 2026-04-16T21:30:12Z |
| ghsa-7gw9-cf7v-778f |
6.8 (4.0)
|
pypdf: Manipulated FlateDecode predictor parameters can exhaust RAM | 2026-04-16T21:30:00Z | 2026-04-16T21:30:00Z |
| ghsa-qqx8-2xmm-jrv8 |
8.8 (3.1)
|
ACME Lego: Arbitrary File Write via Path Traversal in Webroot HTTP-01 Provider | 2026-04-16T21:28:55Z | 2026-04-16T21:28:55Z |
| ghsa-33qf-q99x-wpm8 |
5.6 (3.1)
|
Home Assistant Command-line Interface: Handling of user-supplied Jinja2 templates | 2026-04-16T21:28:39Z | 2026-04-16T21:28:39Z |
| ghsa-vqx2-fgx2-5wq9 |
9.1 (3.1)
|
Official Clerk JavaScript SDKs: Middleware-based route protection bypass | 2026-04-16T21:28:26Z | 2026-04-16T21:28:26Z |
| ghsa-4jjr-vmv7-wh4w |
8.1 (3.1)
|
Statamic: Unsafe method invocation via query value resolution allows data destruction | 2026-04-16T21:25:35Z | 2026-04-16T21:25:35Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-776 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:37.987590Z |
| pysec-2021-774 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:37.816605Z |
| pysec-2021-605 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:06.839358Z |
| pysec-2021-604 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:06.759272Z |
| pysec-2021-600 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:06.437026Z |
| pysec-2021-598 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:06.268797Z |
| pysec-2021-597 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:06.188810Z |
| pysec-2021-596 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:06.073182Z |
| pysec-2021-595 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.976648Z |
| pysec-2021-592 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.737030Z |
| pysec-2021-591 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.654112Z |
| pysec-2021-590 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.572307Z |
| pysec-2021-587 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.322708Z |
| pysec-2021-586 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.237190Z |
| pysec-2021-585 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.144273Z |
| pysec-2021-583 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.970183Z |
| pysec-2021-582 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.885089Z |
| pysec-2021-581 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.799643Z |
| pysec-2021-578 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.523711Z |
| pysec-2021-576 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.358938Z |
| pysec-2021-314 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:47.865620Z |
| pysec-2021-313 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:47.774010Z |
| pysec-2021-309 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:47.431884Z |
| pysec-2021-307 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:47.234797Z |
| pysec-2021-306 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:47.149147Z |
| pysec-2021-305 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:47.052583Z |
| pysec-2021-304 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:46.967506Z |
| pysec-2021-301 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:46.691143Z |
| pysec-2021-300 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:46.598549Z |
| pysec-2021-299 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:46.477427Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1601 | Malicious code in @emerald-react/button (npm) | 2026-03-18T12:25:41Z | 2026-03-23T05:16:24Z |
| mal-2026-1600 | Malicious code in @emerald-react/banner (npm) | 2026-03-18T12:25:40Z | 2026-03-23T05:16:24Z |
| mal-2026-1599 | Malicious code in @emerald-react/badge (npm) | 2026-03-18T12:25:39Z | 2026-03-23T05:16:24Z |
| mal-2026-1598 | Malicious code in @emerald-react/avatar (npm) | 2026-03-18T12:25:38Z | 2026-03-23T05:16:24Z |
| mal-2026-1597 | Malicious code in @emerald-react/autocomplete (npm) | 2026-03-18T12:25:37Z | 2026-03-23T05:16:24Z |
| mal-2026-1596 | Malicious code in @emerald-react/app-header (npm) | 2026-03-18T12:25:36Z | 2026-03-23T05:16:24Z |
| mal-2026-1595 | Malicious code in @commonschema/blackstone-core (npm) | 2026-03-18T12:24:55Z | 2026-03-23T05:16:24Z |
| mal-2026-1594 | Malicious code in @cewe-onsitesearch/schemas (npm) | 2026-03-18T12:24:38Z | 2026-03-23T05:16:24Z |
| mal-2026-1593 | Malicious code in @cbreone/utilities (npm) | 2026-03-18T12:24:36Z | 2026-03-23T05:16:24Z |
| mal-2026-1592 | Malicious code in @cbreone/survey-ui (npm) | 2026-03-18T12:24:35Z | 2026-03-23T05:16:24Z |
| mal-2026-1591 | Malicious code in @cbreone/micro-ui-survey (npm) | 2026-03-18T12:24:29Z | 2026-03-23T05:16:24Z |
| mal-2026-1590 | Malicious code in @cbreone/core-ui (npm) | 2026-03-18T12:24:28Z | 2026-03-23T05:16:24Z |
| mal-2026-1589 | Malicious code in @cbreone/core-services (npm) | 2026-03-18T12:24:27Z | 2026-03-23T05:16:24Z |
| mal-2026-1588 | Malicious code in @bingads-webui-help/apex.core.v3.min (npm) | 2026-03-18T12:24:13Z | 2026-03-23T05:16:24Z |
| mal-2026-1587 | Malicious code in @bingads-webui-cc-react/edit-primary-contact (npm) | 2026-03-18T12:24:12Z | 2026-03-23T05:16:24Z |
| mal-2026-1586 | Malicious code in @at-point/valiant-widgets-v2 (npm) | 2026-03-18T12:24:09Z | 2026-03-23T05:16:24Z |
| mal-2026-1585 | Malicious code in @anchor-ds/core (npm) | 2026-03-18T12:22:58Z | 2026-03-23T05:16:24Z |
| mal-2026-1924 | Malicious code in testcatplzignore (RubyGems) | 2026-03-18T12:22:03Z | 2026-03-18T12:22:03Z |
| mal-2026-1923 | Malicious code in sq-minimal-feature-flags (RubyGems) | 2026-03-18T12:22:01Z | 2026-03-18T12:22:01Z |
| mal-2026-1922 | Malicious code in rubylogger (RubyGems) | 2026-03-18T12:21:58Z | 2026-03-18T12:21:58Z |
| mal-2026-1921 | Malicious code in resolvrtest (RubyGems) | 2026-03-18T12:21:56Z | 2026-03-18T12:21:56Z |
| mal-2026-1920 | Malicious code in rails_structured_logging (RubyGems) | 2026-03-18T12:21:55Z | 2026-03-18T12:21:55Z |
| mal-2026-1919 | Malicious code in rafka-rb (RubyGems) | 2026-03-18T12:21:54Z | 2026-03-18T12:21:54Z |
| mal-2026-1918 | Malicious code in newlogger (RubyGems) | 2026-03-18T12:21:53Z | 2026-03-18T12:21:53Z |
| mal-2026-1917 | Malicious code in kaleido (RubyGems) | 2026-03-18T12:21:51Z | 2026-03-18T12:21:51Z |
| mal-2026-1916 | Malicious code in freshworks-ruby (RubyGems) | 2026-03-18T12:21:49Z | 2026-03-18T12:21:49Z |
| mal-2026-1915 | Malicious code in doctolib (RubyGems) | 2026-03-18T12:21:49Z | 2026-03-18T12:21:49Z |
| mal-2026-1914 | Malicious code in tabullate (PyPI) | 2026-03-18T12:19:17Z | 2026-03-18T12:19:17Z |
| mal-2026-1913 | Malicious code in suficloud (PyPI) | 2026-03-18T12:19:06Z | 2026-03-18T12:19:06Z |
| mal-2026-1912 | Malicious code in quantumania (PyPI) | 2026-03-18T12:17:56Z | 2026-03-18T12:17:56Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1900 | Liferay Portal: Mehrere Schwachstellen | 2025-08-24T22:00:00.000+00:00 | 2025-08-24T22:00:00.000+00:00 |
| wid-sec-w-2025-1899 | OpenText Enterprise Security Manager: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-08-24T22:00:00.000+00:00 | 2025-08-25T22:00:00.000+00:00 |
| wid-sec-w-2025-1898 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und Privilegieneskalation | 2025-08-24T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1897 | vim: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-08-24T22:00:00.000+00:00 | 2025-08-25T22:00:00.000+00:00 |
| wid-sec-w-2025-1896 | Tableau Server und Desktop: Mehrere Schwachstellen | 2025-08-24T22:00:00.000+00:00 | 2025-08-24T22:00:00.000+00:00 |
| wid-sec-w-2025-1895 | Bouncy Castle: Mehrere Schwachstellen | 2025-08-21T22:00:00.000+00:00 | 2025-08-24T22:00:00.000+00:00 |
| wid-sec-w-2025-1894 | Liferay Portal und DXP: Mehrere Schwachstellen | 2025-08-21T22:00:00.000+00:00 | 2025-08-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1893 | IBM App Connect Enterprise (xmldom): Schwachstelle ermöglicht Manipulation von Daten | 2025-08-21T22:00:00.000+00:00 | 2025-08-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1892 | Keycloak: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-08-21T22:00:00.000+00:00 | 2025-09-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1891 | Microsoft Windows: Mehrere Schwachstellen | 2025-08-21T22:00:00.000+00:00 | 2025-08-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1890 | libsndfile: Schwachstelle ermöglicht Codeausführung und DoS | 2025-08-21T22:00:00.000+00:00 | 2025-08-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1889 | Dell iDRAC (iSM): Mehrere Schwachstellen | 2025-08-21T22:00:00.000+00:00 | 2025-08-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1888 | IBM QRadar SIEM: Mehrere Schwachstellen | 2025-08-21T22:00:00.000+00:00 | 2025-08-24T22:00:00.000+00:00 |
| wid-sec-w-2025-1887 | cPanel cPanel/WHM: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-08-21T22:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-1886 | nmap: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-21T22:00:00.000+00:00 | 2025-08-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1885 | JetBrains TeamCity: Mehrere Schwachstellen | 2025-08-20T22:00:00.000+00:00 | 2025-08-20T22:00:00.000+00:00 |
| wid-sec-w-2025-1884 | JetBrains IntelliJ IDEA: Mehrere Schwachstellen | 2025-08-20T22:00:00.000+00:00 | 2025-08-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1883 | Apache Tika: Schwachstelle ermöglicht Infogewinn oder Manipulation | 2025-08-20T22:00:00.000+00:00 | 2025-12-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1882 | Moodle: Mehrere Schwachstellen | 2025-08-20T22:00:00.000+00:00 | 2025-08-20T22:00:00.000+00:00 |
| wid-sec-w-2025-1881 | Arcserve Unified Data Protection: Mehrere Schwachstellen | 2025-08-20T22:00:00.000+00:00 | 2025-08-28T22:00:00.000+00:00 |
| wid-sec-w-2025-1880 | xwiki: Mehrere Schwachstellen | 2025-08-20T22:00:00.000+00:00 | 2025-08-20T22:00:00.000+00:00 |
| wid-sec-w-2025-1879 | ProFTPD: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2025-08-20T22:00:00.000+00:00 | 2025-08-20T22:00:00.000+00:00 |
| wid-sec-w-2025-1878 | Lexmark Universal Print Driver: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-08-20T22:00:00.000+00:00 | 2025-08-20T22:00:00.000+00:00 |
| wid-sec-w-2025-1877 | Liferay Portal und DXP: Mehrere Schwachstellen | 2025-08-20T22:00:00.000+00:00 | 2025-08-20T22:00:00.000+00:00 |
| wid-sec-w-2025-1876 | Apple iOS, iPadOS und macOS: Schwachstelle ermöglicht Codeausführung | 2025-08-20T22:00:00.000+00:00 | 2025-09-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1875 | Cisco EPNM und Prime Infrastructure Schwachstelle ermöglicht Offenlegung von Informationen | 2025-08-20T22:00:00.000+00:00 | 2025-08-20T22:00:00.000+00:00 |
| wid-sec-w-2025-1874 | Cisco Identity Services Engine (ISE): Schwachstelle ermöglicht das Hochladen beliebiger Dateien | 2025-08-20T22:00:00.000+00:00 | 2025-08-20T22:00:00.000+00:00 |
| wid-sec-w-2025-1873 | Docker Desktop: Schwachstelle ermöglicht Umgehen von Sicherheitsmechanismen | 2025-08-20T22:00:00.000+00:00 | 2025-08-24T22:00:00.000+00:00 |
| wid-sec-w-2025-1870 | Keycloak: Schwachstelle ermöglicht Versand beliebiger E-Mails | 2025-08-19T22:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2025-1869 | Linux Kernel: Mehrere Schwachstellen | 2025-08-19T22:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-23-080-06 | Rockwell Automation ThinManager | 2023-03-31T19:07:05.264096Z | 2023-03-31T19:07:05.264096Z |
| icsa-23-082-02 | CP Plus KVMS Pro | 2023-03-31T19:07:05.255213Z | 2023-03-31T19:07:05.255213Z |
| icsa-23-075-07 | Rockwell Automation Modbus TCP AOI Server | 2023-03-31T16:10:45.648316Z | 2023-03-31T16:10:45.648316Z |
| icsa-23-073-01 | Omron CJ1M PLC | 2023-03-31T15:58:39.527124Z | 2023-03-31T15:58:39.527124Z |
| icsa-23-073-03 | GE iFIX | 2023-03-29T18:59:20.240657Z | 2023-03-29T18:59:20.240657Z |
| icsa-23-073-02 | Autodesk FBX SDK | 2023-03-29T18:59:20.225092Z | 2023-03-29T18:59:20.225092Z |
| icsa-23-073-04 | AVEVA Plant SCADA and AVEVA Telemetry Server | 2023-03-29T18:39:49.233100Z | 2023-03-29T18:39:49.233100Z |
| icsa-23-068-01 | Akuvox E11 | 2023-03-29T18:39:49.192244Z | 2023-03-29T18:39:49.192244Z |
| icsa-23-068-02 | B&R Systems Diagnostics Manager | 2023-03-29T17:05:20.993768Z | 2023-03-29T17:05:20.993768Z |
| icsa-23-068-04 | Step Tools Third-Party | 2023-03-29T16:55:34.194688Z | 2023-03-29T16:55:34.194688Z |
| icsa-23-080-01 | Keysight N6845A Geolocation Server | 2023-03-29T16:37:57.399870Z | 2023-03-29T16:37:57.399870Z |
| icsa-23-080-02 | Delta Electronics InfraSuite Device Master | 2023-03-29T16:33:08.768690Z | 2023-03-29T16:33:08.768690Z |
| icsa-23-082-06 | ProPump and Controls Osprey Pump Controller (Update A) | 2023-03-23T06:00:00.000000Z | 2024-02-08T07:00:00.000000Z |
| icsa-23-080-07 | Siemens SCALANCE Third-Party | 2023-03-14T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-23-080-04 | Siemens RADIUS Client of SIPROTEC 5 Devices | 2023-03-14T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-23-075-05 | Siemens Mendix SAML Module | 2023-03-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-075-04 | Siemens SCALANCE W1750D Devices | 2023-03-14T00:00:00.000000Z | 2024-04-09T00:00:00.000000Z |
| icsa-23-075-03 | Siemens RUGGEDCOM CROSSBOW V5.2 | 2023-03-14T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-23-075-02 | Siemens RUGGEDCOM CROSSBOW V5.3 | 2023-03-14T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-23-075-01 | Siemens SCALANCE, RUGGEDCOM Third-Party | 2023-03-14T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-23-061-03 | Rittal CMC III Access systems | 2023-03-06T19:52:26.297982Z | 2023-03-06T19:52:26.297982Z |
| icsa-23-059-01 | Hitachi Energy Gateway Station | 2023-03-06T19:52:26.287374Z | 2023-03-06T19:52:26.287374Z |
| icsa-23-059-02 | Hitachi Energy Gateway Station | 2023-03-06T19:52:26.266848Z | 2023-03-06T19:52:26.266848Z |
| icsma-23-061-01 | Medtronic Micro Clinician and InterStim Apps | 2023-03-06T16:35:54.956247Z | 2023-03-06T16:35:54.956247Z |
| icsa-23-061-02 | Baicells Nova | 2023-03-02T07:00:00.000000Z | 2023-03-02T07:00:00.000000Z |
| icsa-23-061-01 | Mitsubishi Electric MELSEC iQ-F Series | 2023-03-02T07:00:00.000000Z | 2023-06-20T06:00:00.000000Z |
| icsa-23-068-05 | Hitachi Energy Relion 670, 650 and SAM600-IO Series | 2023-02-28T13:30:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-23-054-01 | PTC ThingWorx Edge | 2023-02-27T20:46:39.753316Z | 2023-02-27T20:46:39.753316Z |
| icsa-23-052-01 | Mitsubishi Electric MELSOFT iQ AppPortal | 2023-02-27T20:46:39.744091Z | 2023-02-27T20:46:39.744091Z |
| icsa-23-047-13 | Sub-IoT DASH 7 Alliance Protocol stack implementation | 2023-02-20T23:30:33.558518Z | 2023-02-20T23:30:33.558518Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-esp20-arp-dos-gvhvggqj | Cisco IOS XE Software for Cisco ASR 1000 Series 20-Gbps Embedded Services Processor IP ARP Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-dclass-dos-vkh9d8k3 | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family WLAN Local Profiling Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-cops-vld-mpbtvgew | Cisco IOS XE Software Common Open Policy Service Engine Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-confacl-hbptfsuo | Cisco IOS XE Software RESTCONF and NETCONF-YANG Access Control List Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-capwap-dos-tpdntdyq | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerabilities | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-capwap-dos-shfzxf | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ap-ethport-dos-xtjtt8py | Cisco Aironet Access Points Ethernet Wired Clients Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-30T15:49:49+00:00 |
| cisco-sa-aironet-dos-vhr2zg9y | Cisco Aironet Access Points UDP Flooding Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-aironet-dos-h3dculxw | Cisco Aironet Access Point Authentication Flood Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-webex-meetings-utbwor4q | Cisco Webex Training Unauthorized Meeting Join Vulnerability | 2020-09-02T16:00:00+00:00 | 2020-09-02T16:00:00+00:00 |
| cisco-sa-webex-media-znjfwhd6 | Cisco Webex Meetings Client for Windows, Webex Meetings Desktop App, and Webex Teams Information Disclosure Vulnerability | 2020-09-02T16:00:00+00:00 | 2020-09-02T16:00:00+00:00 |
| cisco-sa-sma-wsa-esa-info-dis-vsvpzohp | Cisco Content Security Management Appliance and Cisco Web Security Appliance Information Disclosure Vulnerability | 2020-09-02T16:00:00+00:00 | 2022-02-02T21:31:49+00:00 |
| cisco-sa-rv-osinj-rce-pwtkpcjv | Cisco Small Business RV340 Series Routers Command Injection and Remote Code Execution Vulnerabilities | 2020-09-02T16:00:00+00:00 | 2020-09-30T19:35:24+00:00 |
| cisco-sa-nfvis-path-emy79oc2 | Cisco Enterprise NFV Infrastructure Software Path Traversal Vulnerability | 2020-09-02T16:00:00+00:00 | 2020-09-02T16:00:00+00:00 |
| cisco-sa-nfvis-file-overwrite-uonzpmkr | Cisco Enterprise NFV Infrastructure Software File Overwrite Vulnerability | 2020-09-02T16:00:00+00:00 | 2020-09-02T16:00:00+00:00 |
| cisco-sa-jabber-vy8m4kgb | Cisco Jabber for Windows Protocol Handler Command Injection Vulnerability | 2020-09-02T16:00:00+00:00 | 2020-09-02T16:00:00+00:00 |
| cisco-sa-jabber-uytkcpgg | Cisco Jabber for Windows Message Handling Arbitrary Code Execution Vulnerability | 2020-09-02T16:00:00+00:00 | 2020-09-02T16:00:00+00:00 |
| cisco-sa-jabber-ttcgb9r3 | Cisco Jabber for Windows Information Disclosure Vulnerability | 2020-09-02T16:00:00+00:00 | 2020-09-02T16:00:00+00:00 |
| cisco-sa-jabber-g3nsjpn7 | Cisco Jabber for Windows Universal Naming Convention Link Handling Vulnerability | 2020-09-02T16:00:00+00:00 | 2020-09-02T16:00:00+00:00 |
| cisco-sa-iosxr-ljtnfjen | Cisco IOS XR Software Authenticated User Privilege Escalation Vulnerability | 2020-09-02T16:00:00+00:00 | 2020-09-02T16:00:00+00:00 |
| cisco-sa-iosxr-cli-privescl-sdvemhqv | Cisco IOS XR Authenticated User Privilege Escalation Vulnerability | 2020-09-02T16:00:00+00:00 | 2020-09-02T16:00:00+00:00 |
| cisco-sa-fxos-buffer-csdmfwut | Cisco FXOS Software Buffer Overflow Vulnerability | 2020-09-02T16:00:00+00:00 | 2020-09-02T16:00:00+00:00 |
| cisco-sa-esa-tls-dos-xw53tbhb | Cisco Email Security Appliance Denial of Service Vulnerability | 2020-09-02T16:00:00+00:00 | 2020-09-02T16:00:00+00:00 |
| cisco-sa-esa-info-disclosure-vmjmmgj | Cisco Email Security Appliance Information Disclosure Vulnerability | 2020-09-02T16:00:00+00:00 | 2020-09-02T16:00:00+00:00 |
| cisco-sa-iosxr-dvmrp-memexh-dsmpdvfz | Cisco IOS XR Software DVMRP Memory Exhaustion Vulnerabilities | 2020-08-29T03:00:00+00:00 | 2020-09-28T21:36:50+00:00 |
| cisco-sa-ucs-cli-dos-gquxcnte | Cisco UCS Manager Software Local Management CLI Denial of Service Vulnerability | 2020-08-26T16:00:00+00:00 | 2020-08-26T16:00:00+00:00 |
| cisco-sa-nxosbgp-nlri-dos-458rg2oq | Cisco NX-OS Software Border Gateway Protocol Multicast VPN Denial of Service Vulnerability | 2020-08-26T16:00:00+00:00 | 2020-08-26T20:54:18+00:00 |
| cisco-sa-nxosbgp-mvpn-dos-k8kbcrjp | Cisco NX-OS Software Border Gateway Protocol Multicast VPN Session Denial of Service Vulnerability | 2020-08-26T16:00:00+00:00 | 2020-08-26T20:56:48+00:00 |
| cisco-sa-nxos-pim-memleak-dos-tc8ep7uw | Cisco NX-OS Software IPv6 Protocol Independent Multicast Denial of Service Vulnerability | 2020-08-26T16:00:00+00:00 | 2020-08-26T20:42:53+00:00 |
| cisco-sa-nxos-dme-rce-cbe3nhzs | Cisco NX-OS Software Data Management Engine Remote Code Execution Vulnerability | 2020-08-26T16:00:00+00:00 | 2020-08-26T21:13:38+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-62556 | Microsoft Excel Remote Code Execution Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-17T00:00:00.000Z |
| msrc_cve-2025-62555 | Microsoft Word Remote Code Execution Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-17T00:00:00.000Z |
| msrc_cve-2025-62554 | Microsoft Office Remote Code Execution Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-17T00:00:00.000Z |
| msrc_cve-2025-62553 | Microsoft Excel Remote Code Execution Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62552 | Microsoft Access Remote Code Execution Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62550 | Azure Monitor Agent Remote Code Execution Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62549 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62474 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62473 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62472 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62470 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62469 | Microsoft Brokering File System Elevation of Privilege Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62468 | Windows Defender Firewall Service Information Disclosure Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-12T00:00:00.000Z |
| msrc_cve-2025-62467 | Windows Projected File System Elevation of Privilege Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62466 | Windows Client-Side Caching Elevation of Privilege Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62465 | DirectX Graphics Kernel Denial of Service Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62464 | Windows Projected File System Elevation of Privilege Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62463 | DirectX Graphics Kernel Denial of Service Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62462 | Windows Projected File System Elevation of Privilege Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62461 | Windows Projected File System Elevation of Privilege Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62458 | Win32k Elevation of Privilege Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62457 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62456 | Windows Resilient File System (ReFS) Remote Code Execution Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62455 | Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62454 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-62223 | Microsoft Edge (Chromium-based) for Mac Spoofing Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-04T00:00:00.000Z |
| msrc_cve-2025-62221 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-59517 | Windows Storage VSP Driver Elevation of Privilege Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-59516 | Windows Storage VSP Driver Elevation of Privilege Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| msrc_cve-2025-55233 | Windows Projected File System Elevation of Privilege Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-09T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15236-1 | kubernetes1.32-apiserver-1.32.6-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15235-1 | kubernetes1.31-apiserver-1.31.10-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15234-1 | kubernetes1.30-apiserver-1.30.14-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15233-1 | jq-1.8.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15232-1 | jgit-5.11.0-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15231-1 | java-1_8_0-openj9-1.8.0.452-3.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15230-1 | icu-77.1-3.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15229-1 | himmelblau-0.9.17+git.0.4a97692-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15228-1 | helm-3.18.3-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15227-1 | grype-0.94.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15226-1 | grafana-11.6.3-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15225-1 | govulncheck-vulndb-0.0.20250612T141001-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15224-1 | go1.24-1.24.4-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15223-1 | go1.23-1.23.10-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15222-1 | glibc-2.41-3.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15221-1 | gio-branding-upstream-2.84.3-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15220-1 | git-lfs-3.7.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15219-1 | gdm-48.0-10.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15218-1 | fractal-11.2-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15217-1 | flake-pilot-3.1.19-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15216-1 | firefox-esr-128.12.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15215-1 | ffmpeg-4-4.4.6-4.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15214-1 | faad2-2.11.2-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15213-1 | curl-8.14.1-4.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15212-1 | clustershell-1.9.3-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15211-1 | clamav-1.4.3-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15210-1 | chromedriver-138.0.7204.96-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15209-1 | assimp-devel-6.0.2-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15208-1 | apache-commons-fileupload-1.6.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15207-1 | alloy-1.9.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:0702 | Red Hat Security Advisory: OpenShift Container Platform 4.17.47 bug fix and security update | 2026-01-22T19:09:07+00:00 | 2026-04-13T20:14:11+00:00 |
| rhsa-2026:0928 | Red Hat Security Advisory: java-21-openjdk security update | 2026-01-22T19:02:18+00:00 | 2026-04-13T20:00:44+00:00 |
| rhsa-2026:0701 | Red Hat Security Advisory: OpenShift Container Platform 4.17.47 packages and security update | 2026-01-22T18:53:43+00:00 | 2026-04-14T02:03:19+00:00 |
| rhsa-2026:1042 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.18.1 | 2026-01-22T18:14:00+00:00 | 2026-04-14T09:46:04+00:00 |
| rhsa-2026:0715 | Red Hat Security Advisory: OpenShift Container Platform 4.17.47 bug fix and security update | 2026-01-22T18:11:18+00:00 | 2026-04-10T21:19:00+00:00 |
| rhsa-2026:1041 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.18.1 | 2026-01-22T18:11:01+00:00 | 2026-04-12T14:07:03+00:00 |
| rhsa-2026:1038 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.18.1 | 2026-01-22T18:00:37+00:00 | 2026-04-14T09:46:04+00:00 |
| rhsa-2026:1025 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-22T16:47:34+00:00 | 2026-04-14T07:57:52+00:00 |
| rhsa-2026:1027 | Red Hat Security Advisory: RHOAI 3.2 - Red Hat OpenShift AI | 2026-01-22T16:34:27+00:00 | 2026-04-11T01:57:35+00:00 |
| rhsa-2026:1026 | Red Hat Security Advisory: RHOAI 3.2 - Red Hat OpenShift AI | 2026-01-22T16:34:21+00:00 | 2026-04-11T01:57:34+00:00 |
| rhsa-2026:1018 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.17.4 security update | 2026-01-22T15:52:24+00:00 | 2026-04-14T09:46:04+00:00 |
| rhsa-2026:1014 | Red Hat Security Advisory: gnupg2 security update | 2026-01-22T15:48:38+00:00 | 2026-04-02T23:28:43+00:00 |
| rhsa-2026:1017 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.18.3 security update | 2026-01-22T15:47:03+00:00 | 2026-04-14T09:46:04+00:00 |
| rhsa-2026:0991 | Red Hat Security Advisory: glib2 security update | 2026-01-22T12:22:52+00:00 | 2026-04-13T20:14:17+00:00 |
| rhsa-2026:0990 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.18.1 | 2026-01-22T11:34:41+00:00 | 2026-04-14T09:46:03+00:00 |
| rhsa-2026:0987 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-22T11:30:22+00:00 | 2026-04-14T07:57:55+00:00 |
| rhsa-2026:0981 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.18.1 | 2026-01-22T10:00:40+00:00 | 2026-04-14T09:46:03+00:00 |
| rhsa-2026:0927 | Red Hat Security Advisory: java-17-openjdk security update | 2026-01-22T09:24:37+00:00 | 2026-04-13T20:00:44+00:00 |
| rhsa-2026:0976 | Red Hat Security Advisory: openssh security update | 2026-01-22T09:20:02+00:00 | 2026-04-13T20:00:49+00:00 |
| rhsa-2026:0975 | Red Hat Security Advisory: glib2 security update | 2026-01-22T07:41:11+00:00 | 2026-04-13T20:14:15+00:00 |
| rhsa-2026:0974 | Red Hat Security Advisory: gnupg2 security update | 2026-01-22T06:57:36+00:00 | 2026-04-02T23:28:45+00:00 |
| rhsa-2026:0973 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-22T05:34:26+00:00 | 2026-04-14T07:57:49+00:00 |
| rhsa-2026:0934 | Red Hat Security Advisory: Release of OpenShift Serverless Logic 1.36.0 security update & enhancements | 2026-01-22T04:35:39+00:00 | 2026-04-14T10:01:48+00:00 |
| rhsa-2026:0663 | Red Hat Security Advisory: OpenShift Container Platform 4.20.11 bug fix and security update | 2026-01-22T03:28:29+00:00 | 2026-04-14T07:57:48+00:00 |
| rhsa-2026:0950 | Red Hat Security Advisory: OpenShift Virtualization 4.19.17 Images | 2026-01-22T02:56:54+00:00 | 2026-03-18T03:13:53+00:00 |
| rhsa-2026:0936 | Red Hat Security Advisory: glib2 security update | 2026-01-21T19:53:19+00:00 | 2026-04-13T20:14:14+00:00 |
| rhsa-2026:0935 | Red Hat Security Advisory: gnupg2 security update | 2026-01-21T19:09:27+00:00 | 2026-04-02T23:28:44+00:00 |
| rhsa-2026:0930 | Red Hat Security Advisory: pcs security update | 2026-01-21T15:59:50+00:00 | 2026-03-18T03:16:48+00:00 |
| rhsa-2026:0847 | Red Hat Security Advisory: java-11-openjdk ELS security update | 2026-01-21T14:09:25+00:00 | 2026-04-13T20:00:41+00:00 |
| rhsa-2026:0849 | Red Hat Security Advisory: OpenJDK 11.0.30 ELS Security Update for Windows Builds | 2026-01-21T13:47:54+00:00 | 2026-04-13T20:00:42+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0345-1 | Security update for freerdp | 2026-01-30T07:18:43Z | 2026-01-30T07:18:43Z |
| suse-su-2026:0344-1 | Security update for assertj-core | 2026-01-29T20:04:07Z | 2026-01-29T20:04:07Z |
| suse-su-2026:0343-1 | Security update for openssl-1_1 | 2026-01-29T18:34:02Z | 2026-01-29T18:34:02Z |
| suse-su-2026:20199-1 | Security update for java-17-openjdk | 2026-01-29T17:04:56Z | 2026-01-29T17:04:56Z |
| suse-su-2026:20198-1 | Security update for glibc | 2026-01-29T16:36:29Z | 2026-01-29T16:36:29Z |
| suse-su-2026:20178-1 | Security update for glibc | 2026-01-29T16:36:29Z | 2026-01-29T16:36:29Z |
| suse-su-2026:20196-1 | Security update for openvpn | 2026-01-29T16:09:32Z | 2026-01-29T16:09:32Z |
| suse-su-2026:20195-1 | Security update for gpg2 | 2026-01-29T16:09:32Z | 2026-01-29T16:09:32Z |
| suse-su-2026:20179-1 | Security update for gpg2 | 2026-01-29T16:09:32Z | 2026-01-29T16:09:32Z |
| suse-su-2026:20176-1 | Security update for elemental-register, elemental-toolkit | 2026-01-29T15:32:26Z | 2026-01-29T15:32:26Z |
| suse-su-2026:0342-1 | Security update for java-25-openjdk | 2026-01-29T14:59:30Z | 2026-01-29T14:59:30Z |
| suse-su-2026:0341-1 | Security update for java-11-openjdk | 2026-01-29T14:58:19Z | 2026-01-29T14:58:19Z |
| suse-su-2026:20193-1 | Security update for postgresql16 | 2026-01-29T10:56:55Z | 2026-01-29T10:56:55Z |
| suse-su-2026:20391-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-01-29T10:42:53Z | 2026-01-29T10:42:53Z |
| suse-su-2026:20390-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise Micro 6.0) | 2026-01-29T10:42:53Z | 2026-01-29T10:42:53Z |
| suse-su-2026:20276-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-01-29T10:42:53Z | 2026-01-29T10:42:53Z |
| suse-su-2026:20275-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise Micro 6.0) | 2026-01-29T10:42:53Z | 2026-01-29T10:42:53Z |
| suse-su-2026:20389-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-01-29T10:37:57Z | 2026-01-29T10:37:57Z |
| suse-su-2026:20388-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-01-29T10:37:57Z | 2026-01-29T10:37:57Z |
| suse-su-2026:20387-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-01-29T10:37:57Z | 2026-01-29T10:37:57Z |
| suse-su-2026:20274-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-01-29T10:37:57Z | 2026-01-29T10:37:57Z |
| suse-su-2026:20273-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-01-29T10:37:57Z | 2026-01-29T10:37:57Z |
| suse-su-2026:20272-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-01-29T10:37:57Z | 2026-01-29T10:37:57Z |
| suse-su-2026:0338-1 | Security update for abseil-cpp | 2026-01-29T10:35:48Z | 2026-01-29T10:35:48Z |
| suse-su-2026:20386-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-01-29T10:35:41Z | 2026-01-29T10:35:41Z |
| suse-su-2026:20271-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-01-29T10:35:41Z | 2026-01-29T10:35:41Z |
| suse-su-2026:0337-1 | Security update for python | 2026-01-29T10:34:17Z | 2026-01-29T10:34:17Z |
| suse-ru-2026:20192-1 | Recommended update for cloud-init | 2026-01-29T10:23:27Z | 2026-01-29T10:23:27Z |
| suse-ru-2026:20174-1 | Recommended update for cloud-init | 2026-01-29T10:23:27Z | 2026-01-29T10:23:27Z |
| suse-su-2026:0336-1 | Security update for libxml2 | 2026-01-29T10:16:20Z | 2026-01-29T10:16:20Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:9555 | Important: NetworkManager-libreswan security update | 2024-11-13T00:00:00Z | 2024-11-20T13:27:22Z |
| alsa-2024:9554 | Important: firefox security update | 2024-11-13T00:00:00Z | 2024-11-18T18:09:22Z |
| alsa-2024:9553 | Important: webkit2gtk3 security update | 2024-11-13T00:00:00Z | 2024-11-18T11:52:36Z |
| alsa-2024:9552 | Important: thunderbird security update | 2024-11-13T00:00:00Z | 2024-11-18T18:10:34Z |
| alsa-2024:9548 | Important: openexr security update | 2024-11-13T00:00:00Z | 2024-11-18T11:48:22Z |
| alsa-2024:9543 | Important: .NET 9.0 security update | 2024-11-13T00:00:00Z | 2024-11-19T06:01:57Z |
| alsa-2024:9541 | Moderate: expat security update | 2024-11-13T00:00:00Z | 2024-11-18T11:47:33Z |
| alsa-2024:9540 | Important: tigervnc security update | 2024-11-13T00:00:00Z | 2024-11-15T12:49:29Z |
| alsa-2024:9502 | Moderate: expat security update | 2024-11-13T00:00:00Z | 2024-11-13T06:26:28Z |
| alsa-2024:9474 | Important: krb5 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:53:53Z |
| alsa-2024:9473 | Important: grafana security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:32Z |
| alsa-2024:9472 | Important: grafana-pcp security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:05Z |
| alsa-2024:9470 | Low: cups security update | 2024-11-12T00:00:00Z | 2024-11-18T11:53:52Z |
| alsa-2024:9468 | Moderate: python3.9 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:52:32Z |
| alsa-2024:9459 | Important: buildah security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:30Z |
| alsa-2024:9458 | Moderate: python3.11-urllib3 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:49:14Z |
| alsa-2024:9457 | Moderate: python3.12-urllib3 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:49:13Z |
| alsa-2024:9456 | Important: osbuild-composer security update | 2024-11-12T00:00:00Z | 2024-11-18T11:48:14Z |
| alsa-2024:9454 | Important: podman security update | 2024-11-12T00:00:00Z | 2024-11-18T11:52:29Z |
| alsa-2024:9452 | Moderate: pcp security update | 2024-11-12T00:00:00Z | 2024-11-18T14:06:11Z |
| alsa-2024:9451 | Moderate: python3.12 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:52:28Z |
| alsa-2024:9450 | Moderate: python3.11 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:52:25Z |
| alsa-2024:9449 | Important: bubblewrap and flatpak security update | 2024-11-12T00:00:00Z | 2024-11-18T11:52:24Z |
| alsa-2024:9442 | Moderate: mingw-glib2 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:49:07Z |
| alsa-2024:9439 | Moderate: fontforge security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:24Z |
| alsa-2024:9430 | Low: nano security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:01Z |
| alsa-2024:9424 | Low: tpm2-tools security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:01Z |
| alsa-2024:9423 | Moderate: python-dns security update | 2024-11-12T00:00:00Z | 2024-11-18T11:49:05Z |
| alsa-2024:9413 | Moderate: bluez security update | 2024-11-12T00:00:00Z | 2024-11-18T11:48:04Z |
| alsa-2024:9405 | Low: vim security update | 2024-11-12T00:00:00Z | 2024-11-18T11:49:53Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-854 | Heap-buffer-overflow in perfetto::trace_processor::TrackEventParser::ParseTrackDescriptor | 2022-09-07T00:00:54.323344Z | 2023-04-20T22:55:15.851034Z |
| osv-2022-852 | Security exception in java.base/java.nio.Bits.reserveMemory | 2022-09-07T00:00:21.638154Z | 2023-10-19T14:17:42.036432Z |
| osv-2022-848 | Heap-buffer-overflow in pcpp::HttpRequestFirstLine::parseVersion | 2022-09-06T00:01:33.775721Z | 2022-12-12T00:11:45.288626Z |
| osv-2022-847 | Heap-use-after-free in ndlz4_decompress | 2022-09-06T00:01:17.903893Z | 2023-06-23T14:11:41.995914Z |
| osv-2022-843 | Heap-buffer-overflow in _cmsMAT3per | 2022-09-05T00:00:44.020201Z | 2022-09-05T00:00:44.020437Z |
| osv-2022-842 | Stack-buffer-overflow in wc_Shake256_Final | 2022-09-05T00:00:28.251072Z | 2026-04-09T14:36:35.503150Z |
| osv-2022-840 | Negative-size-param in wc_Sha3_256_Final | 2022-09-05T00:00:13.232523Z | 2022-09-05T00:00:13.232811Z |
| osv-2022-837 | Heap-buffer-overflow in DetectGetLastSMFromMpmLists | 2022-09-04T00:01:56.921937Z | 2023-02-22T00:37:37.672605Z |
| osv-2022-836 | Heap-buffer-overflow in jxl::N_AVX2::BlendingStage::ProcessPaddingRow | 2022-09-04T00:01:16.620978Z | 2023-02-24T01:50:40.503344Z |
| osv-2022-835 | Use-of-uninitialized-value in json_buildv | 2022-09-04T00:00:50.399079Z | 2022-09-04T00:00:50.399329Z |
| osv-2022-834 | Heap-use-after-free in mk_event_timeout_destroy | 2022-09-04T00:00:31.605787Z | 2026-04-15T14:19:29.667112Z |
| osv-2022-830 | Heap-buffer-overflow in Exiv2::MemIo::read | 2022-09-03T00:01:42.338079Z | 2022-09-03T00:01:42.338575Z |
| osv-2022-829 | Heap-use-after-free in xps_tifsSeekProc | 2022-09-03T00:01:00.692854Z | 2022-09-03T00:01:00.693111Z |
| osv-2022-821 | Heap-buffer-overflow in ttfOutliner__BuildGlyphOutlineAux | 2022-09-02T00:00:51.176206Z | 2022-09-02T00:00:51.176468Z |
| osv-2022-819 | Use-of-uninitialized-value in init_main_qtable | 2022-09-02T00:00:49.565627Z | 2025-12-22T14:15:44.411248Z |
| osv-2022-818 | Heap-buffer-overflow in Ins_NPUSHW | 2022-09-02T00:00:46.165481Z | 2022-09-02T00:00:46.165729Z |
| osv-2022-815 | Negative-size-param in PackChunkyBytes | 2022-09-02T00:00:23.984495Z | 2022-09-02T00:00:23.984810Z |
| osv-2022-810 | Stack-buffer-overflow in CBS_stow | 2022-09-01T00:02:14.947906Z | 2022-09-01T00:02:14.948162Z |
| osv-2022-808 | Use-of-uninitialized-value in _dbus_marshal_write_basic | 2022-08-31T00:02:04.143893Z | 2022-08-31T00:02:04.144156Z |
| osv-2022-805 | Global-buffer-overflow in get_unpack_proc | 2022-08-30T00:01:51.885191Z | 2022-09-07T01:03:01.139904Z |
| osv-2022-804 | Heap-buffer-overflow in _cmsMAT3per | 2022-08-30T00:00:33.342382Z | 2022-08-30T00:00:33.342706Z |
| osv-2022-803 | Segv on unknown address in gs_fapi_ft_get_scaled_font | 2022-08-30T00:00:29.137097Z | 2022-09-07T01:05:10.157021Z |
| osv-2022-802 | Heap-use-after-free in UA_Server_networkCallback | 2022-08-29T00:02:04.585826Z | 2023-04-29T14:17:55.891692Z |
| osv-2022-801 | Stack-buffer-overflow in sc_hsm_decode_ecdsa_signature | 2022-08-29T00:00:46.332913Z | 2022-08-29T00:00:46.333151Z |
| osv-2022-799 | Incorrect-function-pointer-type in grk::BufferedStream::read | 2022-08-28T00:02:06.609956Z | 2023-07-22T14:10:59.366573Z |
| osv-2022-798 | Heap-use-after-free in cmsFreeNamedColorList | 2022-08-28T00:00:53.745737Z | 2022-08-28T00:00:53.745986Z |
| osv-2022-797 | Heap-buffer-overflow in Ins_NPUSHB | 2022-08-28T00:00:50.707451Z | 2022-09-07T00:58:20.546165Z |
| osv-2022-795 | UNKNOWN READ in pcl::PLYReader::read | 2022-08-28T00:00:11.408403Z | 2025-09-26T14:12:06.751834Z |
| osv-2022-794 | Heap-buffer-overflow in std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<ch | 2022-08-27T00:02:10.619878Z | 2022-08-27T00:02:10.620143Z |
| osv-2022-791 | Security exception in java.base/java.util.Arrays.copyOf | 2022-08-27T00:00:53.774660Z | 2022-09-01T00:16:14.955289Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-node-2025-23122 | 2025-05-21T06:00:14.195Z | 2025-05-21T06:18:45.476Z | |
| bit-superset-2025-27696 | Apache Superset: Incorrect authorization leading to resource ownership takeover | 2025-05-16T06:13:17.089Z | 2025-09-02T09:09:29.426Z |
| bit-pgpool-2025-22248 | 2025-05-13T07:30:00.000Z | 2025-05-13T07:30:00.000Z | |
| bit-gitlab-2025-1278 | Insufficient Granularity of Access Control in GitLab | 2025-05-13T06:11:59.150Z | 2025-08-11T00:06:06.142Z |
| bit-gitlab-2025-0549 | Authentication Bypass Using an Alternate Path or Channel in GitLab | 2025-05-13T06:11:47.084Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-8973 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-05-13T06:11:22.852Z | 2025-08-11T00:06:06.142Z |
| bit-postgresql-2025-4207 | PostgreSQL GB18030 encoding validation can read one byte past end of allocation for text that fails validation | 2025-05-10T08:51:38.412Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2025-46821 | Envoy vulnerable to bypass of RBAC uri_template permission | 2025-05-09T05:41:53.497Z | 2025-09-04T09:06:08.228Z |
| bit-mastodon-2023-49952 | 2025-05-08T05:43:30.042Z | 2025-05-08T06:11:50.963Z | |
| bit-logstash-2025-37730 | Logstash Improper Certificate Validation in TCP output | 2025-05-08T05:42:10.346Z | 2025-05-20T10:02:07.006Z |
| bit-kibana-2025-25014 | Kibana arbitrary code execution via prototype pollution | 2025-05-08T05:41:37.442Z | 2025-10-03T09:07:39.166Z |
| bit-elk-2025-25014 | Kibana arbitrary code execution via prototype pollution | 2025-05-08T05:37:10.649Z | 2025-10-03T09:07:39.166Z |
| bit-vault-2025-4166 | Vault May Include Sensitive Data in Error Logs When Using the KV v2 Plugin | 2025-05-07T05:56:55.608Z | 2025-08-13T06:08:53.695Z |
| bit-vault-2025-3879 | Vault’s Azure Authentication Method bound_location Restriction Could be Bypassed on Login | 2025-05-07T05:56:52.014Z | 2025-08-13T06:08:53.695Z |
| bit-mastodon-2024-34535 | 2025-05-07T05:43:55.990Z | 2025-05-07T06:11:12.279Z | |
| bit-kibana-2025-25016 | Kibana Unrestricted Upload of File | 2025-05-03T05:46:27.247Z | 2025-05-20T10:02:07.006Z |
| bit-kibana-2024-11390 | Kibana Unrestricted Upload of File with Dangerous Type Can Lead to XSS | 2025-05-03T05:44:59.249Z | 2025-05-20T10:02:07.006Z |
| bit-elasticsearch-2024-52979 | Elasticsearch Uncontrolled Resource Consumption vulnerability | 2025-05-03T05:41:02.354Z | 2025-10-03T09:07:39.166Z |
| bit-elk-2025-25016 | Kibana Unrestricted Upload of File | 2025-05-03T05:39:08.441Z | 2025-05-20T10:02:07.006Z |
| bit-elk-2024-11390 | Kibana Unrestricted Upload of File with Dangerous Type Can Lead to XSS | 2025-05-03T05:37:15.652Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2025-32376 | Discourse DM limits aren’t always properly enforced | 2025-05-02T11:13:20.595Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43440 | Moodle: lfi vulnerability when restoring malformed block backups | 2025-05-02T06:19:00.410Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43435 | Moodle: can create global glossary without being admin | 2025-05-02T06:18:56.485Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43434 | Moodle: csrf risk in feedback non-respondents report | 2025-05-02T06:18:55.145Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43433 | Moodle: matrix user/power level management not always working as expected with suspended users | 2025-05-02T06:18:53.795Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43432 | Moodle: authorization headers preserved between "emulated redirects" | 2025-05-02T06:18:52.499Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43431 | Moodle: idor in badges allows deletion of arbitrary badges | 2025-05-02T06:18:51.186Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43430 | Moodle: lack of access control when using external methods for quiz overrides | 2025-05-02T06:18:49.899Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43429 | Moodle: user information visibility control issues in gradebook reports | 2025-05-02T06:18:48.592Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43428 | Moodle: cache poisoning via injection into storage | 2025-05-02T06:18:47.252Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0229 | Vulnérabilité dans Veeam Backup & Replication | 2025-03-20T00:00:00.000000 | 2025-03-20T00:00:00.000000 |
| certfr-2025-avi-0228 | Multiples vulnérabilités dans Spring Security | 2025-03-20T00:00:00.000000 | 2025-03-20T00:00:00.000000 |
| certfr-2025-avi-0227 | Vulnérabilité dans Liferay | 2025-03-20T00:00:00.000000 | 2025-03-20T00:00:00.000000 |
| certfr-2025-avi-0226 | Vulnérabilité dans Google Chrome | 2025-03-20T00:00:00.000000 | 2025-03-20T00:00:00.000000 |
| certfr-2025-avi-0225 | Vulnérabilité dans Drupal | 2025-03-20T00:00:00.000000 | 2025-03-20T00:00:00.000000 |
| certfr-2025-avi-0224 | Multiples vulnérabilités dans les produits Synology | 2025-03-19T00:00:00.000000 | 2025-03-19T00:00:00.000000 |
| certfr-2025-avi-0223 | Multiples vulnérabilités dans Suricata | 2025-03-19T00:00:00.000000 | 2025-03-19T00:00:00.000000 |
| certfr-2025-avi-0222 | Vulnérabilité dans MongoDB C Driver | 2025-03-19T00:00:00.000000 | 2025-03-19T00:00:00.000000 |
| certfr-2025-avi-0221 | Multiples vulnérabilités dans HPE Aruba Networking AOS-CX | 2025-03-19T00:00:00.000000 | 2025-03-19T00:00:00.000000 |
| certfr-2025-avi-0220 | Vulnérabilité dans Mattermost Server | 2025-03-19T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| certfr-2025-avi-0219 | Multiples vulnérabilités dans GLPI | 2025-03-19T00:00:00.000000 | 2025-03-19T00:00:00.000000 |
| certfr-2025-avi-0218 | Multiples vulnérabilités dans Atlassian Jira | 2025-03-19T00:00:00.000000 | 2025-03-19T00:00:00.000000 |
| certfr-2025-avi-0217 | Multiples vulnérabilités dans Mattermost Server | 2025-03-18T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| certfr-2025-avi-0216 | Multiples vulnérabilités dans les produits Schneider Electric | 2025-03-17T00:00:00.000000 | 2025-03-17T00:00:00.000000 |
| certfr-2025-avi-0215 | Multiples vulnérabilités dans VMware Tanzu Gemfire | 2025-03-17T00:00:00.000000 | 2025-03-17T00:00:00.000000 |
| certfr-2025-avi-0214 | Multiples vulnérabilités dans les produits IBM | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| certfr-2025-avi-0213 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| certfr-2025-avi-0212 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| certfr-2025-avi-0211 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| certfr-2025-avi-0210 | Multiples vulnérabilités dans VMware Tanzu | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| certfr-2025-avi-0209 | Multiples vulnérabilités dans PHP | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| certfr-2025-avi-0208 | Vulnérabilité dans Microsoft Dataverse | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| certfr-2025-avi-0207 | Multiples vulnérabilités dans Cisco IOS XR | 2025-03-13T00:00:00.000000 | 2025-03-13T00:00:00.000000 |
| certfr-2025-avi-0206 | Vulnérabilité dans Juniper Networks Junos OS | 2025-03-13T00:00:00.000000 | 2025-03-13T00:00:00.000000 |
| certfr-2025-avi-0205 | Multiples vulnérabilités dans GitLab | 2025-03-13T00:00:00.000000 | 2025-03-13T00:00:00.000000 |
| certfr-2025-avi-0204 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-03-13T00:00:00.000000 | 2025-03-13T00:00:00.000000 |
| certfr-2025-avi-0203 | Multiples vulnérabilités dans Microsoft Edge | 2025-03-13T00:00:00.000000 | 2025-03-13T00:00:00.000000 |
| certfr-2025-avi-0202 | Vulnérabilité dans Joomla! | 2025-03-12T00:00:00.000000 | 2025-03-12T00:00:00.000000 |
| certfr-2025-avi-0201 | Multiples vulnérabilités dans les produits Adobe | 2025-03-12T00:00:00.000000 | 2025-03-12T00:00:00.000000 |
| certfr-2025-avi-0200 | Vulnérabilité dans Apache Tomcat | 2025-03-12T00:00:00.000000 | 2025-03-12T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2017-000237 | Multiple vulnerabilities in BOOK WALKER for Windows/Mac | 2017-11-14T15:19+09:00 | 2018-03-07T13:36+09:00 |
| jvndb-2017-000236 | WordPress plugin "TablePress" vulnerable to improper restriction of XML external entity (XXE) references | 2017-11-14T13:26+09:00 | 2018-03-07T13:36+09:00 |
| jvndb-2017-000235 | CS-Cart Japanese Edition vulnerable to cross-site scripting | 2017-11-13T15:30+09:00 | 2018-03-07T13:36+09:00 |
| jvndb-2017-000234 | Installer of HYPER SBI may insecurely load Dynamic Link Libraries | 2017-11-09T12:29+09:00 | 2018-03-07T14:01+09:00 |
| jvndb-2017-000233 | I-O DATA LAN DISK Connect vulnerable to denial-of-service (DoS) | 2017-11-06T13:48+09:00 | 2018-03-07T14:01+09:00 |
| jvndb-2017-000232 | Wi-Fi STATION L-02F vulnerable to buffer overflow | 2017-11-06T13:48+09:00 | 2018-03-07T14:00+09:00 |
| jvndb-2017-000213 | Installer of "Flets Easy Setup Tool" may insecurely load Dynamic Link Libraries | 2017-11-02T13:57+09:00 | 2018-03-14T13:48+09:00 |
| jvndb-2017-000231 | OpenAM (Open Source Edition) vulnerable to authentication bypass | 2017-11-01T15:36+09:00 | 2018-03-14T14:03+09:00 |
| jvndb-2017-008629 | Memory corruption vulnerability in Rakuraku Hagaki and Rakuraku Hagaki Select for Ichitaro | 2017-10-25T12:17+09:00 | 2018-03-14T14:01+09:00 |
| jvndb-2017-008411 | XXE Vulnerability in Hitachi Command Suite | 2017-10-18T14:22+09:00 | 2017-11-07T15:06+09:00 |
| jvndb-2017-000229 | Home unit KX-HJB1000 contains multiple vulnerabilities | 2017-10-17T17:22+09:00 | 2018-03-07T14:24+09:00 |
| jvndb-2017-008370 | Information Disclosure Vulnerability in Hitachi Automation Director | 2017-10-17T17:01+09:00 | 2017-10-18T12:31+09:00 |
| jvndb-2017-008369 | Multiple Vulnerabilities in Hitachi Infrastructure Analytics Advisor | 2017-10-17T16:58+09:00 | 2017-10-18T12:31+09:00 |
| jvndb-2017-008364 | RMI Vulnerability in Hitachi Tuning Manager | 2017-10-17T16:26+09:00 | 2017-10-18T12:31+09:00 |
| jvndb-2017-008363 | Information Disclosure Vulnerability in Hitachi Global Link Manager | 2017-10-17T16:26+09:00 | 2017-10-18T12:31+09:00 |
| jvndb-2017-000228 | Installer of HIBUN Confidential File Viewer may insecurely load Dynamic Link Libraries and invoke executable files | 2017-10-11T16:43+09:00 | 2018-03-07T12:09+09:00 |
| jvndb-2017-000227 | HIBUN Confidential File Decryption program may insecurely load Dynamic Link Libraries | 2017-10-11T16:43+09:00 | 2018-03-07T12:06+09:00 |
| jvndb-2017-000226 | HIBUN Confidential File Decryption program may insecurely load Dynamic Link Libraries | 2017-10-11T16:43+09:00 | 2018-03-07T12:12+09:00 |
| jvndb-2017-000225 | Cybozu Office fails to restrict access permissions | 2017-10-11T14:28+09:00 | 2018-03-07T12:21+09:00 |
| jvndb-2017-007767 | Self-Decrypting Confidential Files created by JP1/HIBUN may insecurely load Dynamic Link Libraries | 2017-10-03T11:18+09:00 | 2017-10-06T11:36+09:00 |
| jvndb-2017-000223 | Install program and Installer of i-filter 6.0 may insecurely load Dynamic Link Libraries and invoke executable files | 2017-09-29T13:54+09:00 | 2017-09-29T13:54+09:00 |
| jvndb-2017-000146 | Marp vulnerable to improper access control in JavaScript execution | 2017-09-29T13:54+09:00 | 2018-02-07T11:52+09:00 |
| jvndb-2017-007582 | jwt-scala fails to verify token signatures | 2017-09-26T15:37+09:00 | 2018-03-07T12:23+09:00 |
| jvndb-2017-007422 | InterScan Web Security Virtual Appliance vulnerable to code injection | 2017-09-21T15:58+09:00 | 2018-03-07T14:32+09:00 |
| jvndb-2017-000218 | Wi-Fi STATION L-02F fails to restrict access permissions | 2017-09-12T14:35+09:00 | 2018-02-28T14:09+09:00 |
| jvndb-2017-000217 | Backdoor access issue in Wi-Fi STATION L-02F | 2017-09-12T14:34+09:00 | 2018-02-28T14:11+09:00 |
| jvndb-2017-000222 | SEIL Series routers vulnerable to denial-of-service (DoS) | 2017-09-11T15:19+09:00 | 2018-02-28T14:12+09:00 |
| jvndb-2017-000221 | Installer of FENCE-Explorer may insecurely load Dynamic Link Libraries and invoke executable files | 2017-09-11T14:55+09:00 | 2018-02-28T13:58+09:00 |
| jvndb-2017-000220 | Multiple vulnerabilities in CG-WLR300NM | 2017-09-08T14:14+09:00 | 2018-02-28T12:21+09:00 |
| jvndb-2017-006769 | Denial-of-service (DoS) Vulnerability in JP1 and Hitachi IT Operations Director | 2017-09-04T12:14+09:00 | 2017-09-05T10:46+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14399 | MailEnable不安全DLL加载漏洞(CNVD-2026-14399) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14398 | MailEnable不安全DLL加载漏洞 | 2025-12-18 | 2026-03-20 |
| cnvd-2026-10887 | MailEnable存在未明漏洞(CNVD-2026-10887) | 2025-12-18 | 2026-02-14 |
| cnvd-2026-10886 | MailEnable存在未明漏洞 | 2025-12-18 | 2026-02-13 |
| cnvd-2026-10328 | Google Pixel gxp_fence_manager.cc文件输入验证错误漏洞 | 2025-12-18 | 2026-02-06 |
| cnvd-2026-10327 | Google Pixel aoc_ipc_core.c文件输入验证错误漏洞 | 2025-12-18 | 2026-02-06 |
| cnvd-2026-10326 | Google Pixel授权问题漏洞 | 2025-12-18 | 2026-02-06 |
| cnvd-2026-10325 | Google Pixel protocolpsadapter.cpp文件缓冲区溢出漏洞 | 2025-12-18 | 2026-02-06 |
| cnvd-2026-10324 | Google Pixel cn_NrmmDecoder.cpp文件缓冲区溢出漏洞 | 2025-12-18 | 2026-02-06 |
| cnvd-2026-10323 | Google Pixel gxp_buffer.h文件缓冲区溢出漏洞 | 2025-12-18 | 2026-02-06 |
| cnvd-2026-10322 | Google Pixel ss_LcsManagement.c文件缓冲区溢出漏洞 | 2025-12-18 | 2026-02-06 |
| cnvd-2026-10321 | Google Pixel代码执行漏洞(CNVD-2026-1032114) | 2025-12-18 | 2026-02-06 |
| cnvd-2026-05878 | 麒麟软件有限公司银河麒麟操作系统存在二进制漏洞 | 2025-12-18 | 2026-02-01 |
| cnvd-2026-03712 | TOTOLINK X5000R代码执行漏洞 | 2025-12-18 | 2026-01-15 |
| cnvd-2026-02696 | Google Pixel权限提升漏洞(CNVD-2026-0269620) | 2025-12-18 | 2026-01-09 |
| cnvd-2026-02695 | Google Pixel权限提升漏洞(CNVD-2026-0269521) | 2025-12-18 | 2026-01-09 |
| cnvd-2026-02694 | Google Pixel权限提升漏洞(CNVD-2026-0269422) | 2025-12-18 | 2026-01-09 |
| cnvd-2026-02693 | Google Pixel权限提升漏洞(CNVD-2026-0269323) | 2025-12-18 | 2026-01-09 |
| cnvd-2026-00840 | Student File Management System update_user.php文件跨站脚本漏洞 | 2025-12-18 | 2026-01-05 |
| cnvd-2026-00839 | Student File Management System user_id参数SQL注入漏洞 | 2025-12-18 | 2026-01-05 |
| cnvd-2026-00796 | UTT 进取 512W缓冲区溢出漏洞(CNVD-2026-0079609) | 2025-12-18 | 2026-01-08 |
| cnvd-2026-00795 | UTT 进取 512W缓冲区溢出漏洞(CNVD-2026-0079510) | 2025-12-18 | 2026-01-08 |
| cnvd-2026-00696 | Simple Attendance Record System check.php文件SQL注入漏洞 | 2025-12-18 | 2026-01-07 |
| cnvd-2026-00695 | Computer Laboratory System admin_pic.php文件文件上传漏洞 | 2025-12-18 | 2026-01-07 |
| cnvd-2026-00656 | D-Link DIR-803信息泄露漏洞 | 2025-12-18 | 2026-01-07 |
| cnvd-2026-00446 | Class and Exam Timetable Management /index.php文件SQL注入漏洞 | 2025-12-18 | 2026-01-05 |
| cnvd-2026-00445 | Class and Exam Timetable Management /preview7.php文件SQL注入漏洞 | 2025-12-18 | 2026-01-05 |
| cnvd-2025-31547 | IBM Aspera Orchestrator拒绝服务漏洞 | 2025-12-18 | 2025-12-30 |
| cnvd-2025-31546 | IBM Aspera Orchestrator未验证的密码更改漏洞 | 2025-12-18 | 2025-12-30 |
| cnvd-2025-31116 | WordPress Addon Elements for Elementor跨站脚本漏洞 | 2025-12-18 | 2025-12-26 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-00238 | Уязвимость программного средства мониторинга, анализа и создания отчетов Zohocorp ManageE… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00237 | Уязвимость программного средства мониторинга, анализа и создания отчетов Zohocorp ManageE… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00236 | Уязвимость программного обеспечения для централизованного управления настольными ПК в сет… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00235 | Уязвимость компонента OU History Report программного средства управления и отчетности Win… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00234 | Уязвимость функции child_process MCP-сервера для управления кластерами виртуальных машин … | 09.01.2026 | 09.01.2026 |
| bdu:2026-00233 | Уязвимость приложения для установления связи между облачной платформой и локальной систем… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00232 | Уязвимость программной платформы SAP S/4HANA, позволяющая нарушителю выполнить произвольный код | 09.01.2026 | 09.01.2026 |
| bdu:2026-00231 | Уязвимость программного обеспечения разработки и выполнения приложений на языке ABAP SAP … | 09.01.2026 | 09.01.2026 |
| bdu:2026-00230 | Уязвимость программного обеспечения разработки и выполнения приложений на языке ABAP SAP … | 09.01.2026 | 09.01.2026 |
| bdu:2026-00229 | Уязвимость компонента Internet Communication Manager программных интеграционных платформ … | 09.01.2026 | 09.01.2026 |
| bdu:2026-00228 | Уязвимость интегрированной среды для управления жизненным циклом разработки IBM Jazz Foun… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00227 | Уязвимость приложения для обеспечения двусторонней передачи информации (между IBM Securit… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00226 | Уязвимость операционной системы FydeOS, связанная с возможностью использования жёстко зад… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00225 | Уязвимость программного средства контроля безопасности сетей АСУ ТП Cisco Cyber Vision Ce… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00224 | Уязвимость веб-интерфейса систем обработки вызовов Cisco Unified Communications Manager (… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00223 | Уязвимость программного средства контроля безопасности сетей АСУ ТП Cisco Cyber Vision Ce… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00222 | Уязвимость реализации протокола RADIUS (Remote Authentication in Dial-In User Service) пл… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00221 | Уязвимость веб-интерфейса платформы управления политиками соединений Cisco Identity Servi… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00220 | Уязвимость веб-интерфейса платформы управления политиками соединений Cisco Identity Servi… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00219 | Уязвимость веб-интерфейса платформы управления политиками соединений Cisco Identity Servi… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00218 | Уязвимость веб-интерфейса платформы управления политиками соединений Cisco Identity Servi… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00217 | Уязвимость функции constructFromCanonical() библиотеки рендеринга шаблонов jinjava, позво… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00216 | Уязвимость платформы разработки приложений Dyad, связанная с неверным управлением генерац… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00215 | Уязвимость операционной системы ZimaOS, связанная с ошибками при управлении привилегиями,… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00214 | Уязвимость операционной системы ZimaOS, связанная с ошибками при управлении привилегиями,… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00213 | Уязвимость функции GitHub.repo() пакета для работы с GitHub на языке Julia GitHub.jl, поз… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00212 | Уязвимость плагина java-plugin-runner облачного API-шлюза Apache APISIX, позволяющая нару… | 09.01.2026 | 04.02.2026 |
| bdu:2026-00211 | Уязвимость функции parseInt() платформы для разработки приложений dify.ai, позволяющая на… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00210 | Уязвимость хостинга для игровых стримов Sunshine, связанная с подделкой межсайтовых запро… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00209 | Уязвимость функции child_process() системы автоматической публикации Eclipse Open VSX Reg… | 09.01.2026 | 09.01.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202001-0472 | Insufficient control flow in certain data structures for some Intel(R) Processors with In… | 2026-03-09T20:01:34.498000Z |
| var-202003-1786 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2026-03-09T20:01:33.867000Z |
| var-201806-1439 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2026-03-09T20:01:33.338000Z |
| var-201211-0168 | Use-after-free vulnerability in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0… | 2026-03-09T20:01:27.992000Z |
| var-200609-0314 | Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to… | 2026-03-09T20:00:52.219000Z |
| var-201208-0292 | Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java S… | 2026-03-09T20:00:52.141000Z |
| var-201509-0438 | Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C L… | 2026-03-09T20:00:49.321000Z |
| var-202105-1459 | A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in … | 2026-03-09T20:00:47.932000Z |
| var-202207-0107 | AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation … | 2026-03-09T20:00:09.522000Z |
| var-201311-0106 | Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1… | 2026-03-09T20:00:01.464000Z |
| var-200904-0811 | Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier… | 2026-03-09T19:59:59.628000Z |
| var-202005-1052 | When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.… | 2026-03-09T19:59:58.474000Z |
| var-202205-1370 | Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.114 allowed a remote … | 2026-03-09T19:59:25.491000Z |
| var-200406-0158 | Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (sys… | 2026-03-09T19:59:24.752000Z |
| var-201912-0511 | A logic issue existed in the handling of document loads. This issue was addressed with im… | 2026-03-09T19:59:24.069000Z |
| var-201806-1458 | An issue was discovered in certain Apple products. iOS before 11.3.1 is affected. macOS b… | 2026-03-09T19:59:21.358000Z |
| var-201912-1852 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-03-09T19:59:21.106000Z |
| var-200102-0027 | CBOS 2.4.1 and earlier in Cisco 600 routers allows remote attackers to cause a denial of … | 2026-03-09T19:59:20.200000Z |
| var-201003-1114 | The _cupsGetlang function, as used by lppasswd.c in lppasswd in CUPS 1.2.2, 1.3.7, 1.3.9,… | 2026-03-09T19:59:19.792000Z |
| var-201911-1619 | Improper invalidation for page table updates by a virtual guest operating system for mult… | 2026-03-09T19:59:17.276000Z |
| var-200102-0077 | Memory leak in Cisco Catalyst 4000, 5000, and 6000 series switches allows remote attacker… | 2026-03-09T19:58:52.944000Z |
| var-200806-0425 | Unspecified vulnerability in WebKit in Apple Safari before 3.1.2, as distributed in Mac O… | 2026-03-09T19:58:22.294000Z |
| var-201912-0582 | A logic issue was addressed with improved state management. This issue is fixed in iOS 12… | 2026-03-09T19:58:20.700000Z |
| var-202201-0468 | build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. T… | 2026-03-09T19:58:20.601000Z |
| var-202207-0381 | A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.20.0, <18.5… | 2026-03-09T19:58:17.375000Z |
| var-201008-0241 | Untrusted search path vulnerability in the Microsoft Foundation Class (MFC) Library in Mi… | 2026-03-09T19:58:12.774000Z |
| var-202201-0372 | lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. Expat … | 2026-03-09T19:57:38.857000Z |
| var-201508-0365 | The xmlreader in libxml allows remote attackers to cause a denial of service (memory cons… | 2026-03-09T19:57:38.077000Z |
| var-201507-0348 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b… | 2026-03-09T19:57:37.349000Z |
| var-202101-0119 | The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing… | 2026-03-09T19:57:34.069000Z |