Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-6518 |
8.8 (3.1)
|
CMP – Coming Soon & Maintenance Plugin by NiteoThemes … |
niteo |
CMP – Coming Soon & Maintenance Plugin by NiteoThemes |
2026-04-18T03:37:04.707Z | 2026-04-20T13:46:08.222Z |
| CVE-2026-4801 |
6.4 (3.1)
|
Page Builder Gutenberg Blocks <= 3.1.16 - Authenticate… |
godaddy |
Page Builder Gutenberg Blocks – CoBlocks |
2026-04-18T03:37:03.859Z | 2026-04-20T14:42:38.120Z |
| CVE-2026-40494 |
9.8 (3.1)
|
SAIL has heap buffer overflow in TGA RLE decoder — raw… |
HappySeaFox |
sail |
2026-04-18T01:42:48.830Z | 2026-04-20T14:55:42.859Z |
| CVE-2026-40493 |
9.8 (3.1)
|
SAIL has heap buffer overflow in PSD decoder — bpp mis… |
HappySeaFox |
sail |
2026-04-18T01:41:14.664Z | 2026-04-20T16:15:22.120Z |
| CVE-2026-40492 |
9.8 (3.1)
|
SAIL has heap buffer overflow in XWD decoder — bits_pe… |
HappySeaFox |
sail |
2026-04-18T01:39:48.056Z | 2026-04-20T15:24:42.029Z |
| CVE-2026-40491 |
6.5 (3.1)
|
gdown Affected by Arbitrary File Write via Path Traver… |
wkentaro |
gdown |
2026-04-18T01:36:47.659Z | 2026-04-20T15:50:02.983Z |
| CVE-2026-40490 |
6.8 (3.1)
|
AsyncHttpClient leaks authorization credentials to unt… |
AsyncHttpClient |
async-http-client |
2026-04-18T01:31:13.860Z | 2026-04-20T14:55:50.254Z |
| CVE-2026-1559 |
6.4 (3.1)
|
Youzify <= 1.3.6 - Authenticated (Subscriber+) Stored … |
youzify |
Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress |
2026-04-18T01:26:05.210Z | 2026-04-20T13:46:08.353Z |
| CVE-2026-1838 |
6.1 (3.1)
|
Hostel <= 1.1.6 - Reflected Cross-Site Scripting via '… |
prasunsen |
Hostel |
2026-04-18T01:26:04.643Z | 2026-04-20T14:19:29.627Z |
| CVE-2026-40489 |
8.6 (4.0)
|
editorconfig-core-c has incomplete fix for CVE-2023-0341 |
editorconfig |
editorconfig-core-c |
2026-04-18T01:24:57.278Z | 2026-04-20T16:15:31.570Z |
| CVE-2026-40487 |
8.9 (3.1)
|
Postiz Has Unrestricted File Upload via MIME Type Spoo… |
gitroomhq |
postiz-app |
2026-04-18T01:19:06.588Z | 2026-04-20T15:25:40.893Z |
| CVE-2026-35582 |
8.8 (3.1)
|
Emissary has an OS Command Injection via Unvalidated I… |
NationalSecurityAgency |
emissary |
2026-04-18T01:16:27.661Z | 2026-04-20T15:48:51.543Z |
| CVE-2026-35465 |
7.5 (3.1)
|
SecureDrop Client has path injection in read_gzip_head… |
freedomofpress |
securedrop-client |
2026-04-18T00:41:16.594Z | 2026-04-20T15:47:43.822Z |
| CVE-2026-40572 |
9 (3.1)
|
NovumOS has Arbitrary Memory Mapping via Syscall 15 (M… |
MinecAnton209 |
NovumOS |
2026-04-18T00:16:02.590Z | 2026-04-20T14:55:57.521Z |
| CVE-2026-40317 |
9.4 (3.1)
|
NovumOS has Privilege Escalation in the Syscall Interface |
MinecAnton209 |
NovumOS |
2026-04-18T00:12:10.368Z | 2026-04-20T15:26:25.222Z |
| CVE-2026-40350 |
8.8 (3.1)
|
Movary User Management (/settings/users) has Authoriza… |
leepeuker |
movary |
2026-04-18T00:07:33.324Z | 2026-04-20T16:15:39.915Z |
| CVE-2026-40349 |
8.8 (3.1)
|
Authenticated Movary User Can Self-Escalate to Adminis… |
leepeuker |
movary |
2026-04-18T00:05:46.360Z | 2026-04-20T16:15:49.844Z |
| CVE-2026-40593 |
4.8 (3.1)
|
ChurchCRM: Stored XSS in UserEditor.php via Login Name Field |
ChurchCRM |
CRM |
2026-04-18T00:02:59.606Z | 2026-04-20T14:56:05.666Z |
| CVE-2026-40348 |
7.7 (3.1)
|
Movary has Authenticated SSRF via Jellyfin Server URL … |
leepeuker |
movary |
2026-04-18T00:01:09.725Z | 2026-04-20T16:11:32.779Z |
| CVE-2026-40347 |
5.3 (3.1)
|
Python-Multipart affected by Denial of Service via lar… |
Kludex |
python-multipart |
2026-04-17T23:56:50.777Z | 2026-04-20T15:46:40.011Z |
| CVE-2026-40346 |
6.4 (4.0)
|
NocoBase has SSRF in Workflow HTTP Request and Custom … |
nocobase |
@nocobase/plugin-workflow-request |
2026-04-17T23:54:34.829Z | 2026-04-20T14:56:12.829Z |
| CVE-2026-40581 |
8.1 (3.1)
|
ChurchCRM: Cross-Site Request Forgery (CSRF) in Select… |
ChurchCRM |
CRM |
2026-04-17T23:51:32.765Z | 2026-04-20T16:15:58.183Z |
| CVE-2026-40337 |
5.1 (3.1)
|
Sentry kernel has incomplete ownership check for IRQ l… |
camelot-os |
sentry-kernel |
2026-04-17T23:51:09.866Z | 2026-04-20T16:13:48.908Z |
| CVE-2026-40341 |
3.5 (3.1)
|
libgphoto2 has an OOB Read in ptp_unpack_EOS_FocusInfoEx |
gphoto |
libgphoto2 |
2026-04-17T23:48:36.644Z | 2026-04-20T16:14:19.107Z |
| CVE-2026-40340 |
6.1 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_OI() in ptp-pack… |
gphoto |
libgphoto2 |
2026-04-17T23:45:17.467Z | 2026-04-20T13:36:05.149Z |
| CVE-2026-40339 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_Sony_DPD() FormF… |
gphoto |
libgphoto2 |
2026-04-17T23:42:32.586Z | 2026-04-20T14:56:21.979Z |
| CVE-2026-40338 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_Sony_DPD() enume… |
gphoto |
libgphoto2 |
2026-04-17T23:40:10.097Z | 2026-04-20T16:16:08.585Z |
| CVE-2026-40485 |
5.3 (3.1)
|
ChurchCRM: Username Enumeration via Differential Respo… |
ChurchCRM |
CRM |
2026-04-17T23:29:35.884Z | 2026-04-20T13:36:05.319Z |
| CVE-2026-40336 |
2.4 (3.1)
|
libgphoto2 has memory leak in ptp_unpack_Sony_DPD() se… |
gphoto |
libgphoto2 |
2026-04-17T23:27:42.868Z | 2026-04-20T16:14:53.071Z |
| CVE-2026-2262 |
7.5 (3.1)
|
Easy Appointments <= 3.12.21 - Unauthenticated Sensiti… |
easyappointments |
Easy Appointments |
2026-04-17T23:26:48.863Z | 2026-04-20T13:51:28.513Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-6561 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
EyouCMS Index.php edit_adminlogo unrestricted upload |
n/a |
EyouCMS |
2026-04-19T07:15:11.267Z | 2026-04-20T14:55:35.698Z |
| CVE-2026-6560 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
H3C Magic B0 aspForm Edit_BasicSSID buffer overflow |
H3C |
Magic B0 |
2026-04-19T06:45:14.514Z | 2026-04-20T15:20:44.443Z |
| CVE-2026-6559 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Wavlink WL-WN579A3 login.cgi sub_401F80 cross site scripting |
Wavlink |
WL-WN579A3 |
2026-04-19T05:15:15.503Z | 2026-04-20T16:07:54.597Z |
| CVE-2026-0868 |
6.4 (3.1)
|
EMC Scheduling Manager <= 4.4 - Authenticated (Contrib… |
turn2honey |
EMC – Easily Embed Calendly Scheduling |
2026-04-19T03:26:14.765Z | 2026-04-20T16:53:24.024Z |
| CVE-2026-6056 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-04-18T22:19:26.698Z | |
| CVE-2026-41242 |
9.4 (4.0)
|
protobufjs has an arbitrary code execution issue |
protobufjs |
protobuf.js |
2026-04-18T16:18:10.652Z | 2026-04-20T16:03:57.689Z |
| CVE-2026-40948 |
N/A
|
Apache Airflow Providers Keycloak: OAuth Login CSRF — … |
Apache Software Foundation |
Apache Airflow Providers Keycloak |
2026-04-18T13:22:41.577Z | 2026-04-20T16:17:53.543Z |
| CVE-2026-2986 |
6.4 (3.1)
|
Contextual Related Posts <= 4.2.1 - Authenticated (Con… |
ajay |
Contextual Related Posts |
2026-04-18T11:16:10.980Z | 2026-04-20T14:19:06.323Z |
| CVE-2026-2505 |
5.4 (3.1)
|
Categories Images <= 3.3.1 - Authenticated (Contributo… |
elzahlan |
Categories Images |
2026-04-18T09:26:52.654Z | 2026-04-20T13:46:07.918Z |
| CVE-2026-0894 |
6.4 (3.1)
|
Content Blocks (Custom Post Widget) <= 3.3.9 - Authent… |
vanderwijk |
Content Blocks (Custom Post Widget) |
2026-04-18T09:26:52.078Z | 2026-04-20T13:48:40.598Z |
| CVE-2026-41254 |
4 (3.1)
|
Little CMS (lcms2) through 2.18 has an integer ov… |
littlecms |
little cms color engine |
2026-04-18T06:43:13.741Z | 2026-04-20T16:09:45.530Z |
| CVE-2026-32690 |
N/A
|
Apache Airflow: 3.x - Nested Variable Secret Values By… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:22:26.081Z | 2026-04-20T16:11:33.956Z |
| CVE-2026-32228 |
N/A
|
Apache Airflow: Users with asset materialization permi… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:19:47.512Z | 2026-04-20T15:54:05.072Z |
| CVE-2026-30912 |
N/A
|
Apache Airflow: Exposing stack trace in case of constr… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:20:30.254Z | 2026-04-20T16:26:07.128Z |
| CVE-2026-30898 |
N/A
|
Apache Airflow: Bad example of BashOperator shell inje… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:20:48.647Z | 2026-04-22T03:55:38.783Z |
| CVE-2026-25917 |
N/A
|
Apache Airflow: API extra-links triggers XCom deserial… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:20:11.187Z | 2026-04-22T13:58:49.807Z |
| CVE-2026-41253 |
6.9 (3.1)
|
In iTerm2 through 3.6.9, displaying a .txt file c… |
iTerm2 |
iTerm2 |
2026-04-18T05:27:08.202Z | 2026-04-20T15:52:10.357Z |
| CVE-2026-6518 |
8.8 (3.1)
|
CMP – Coming Soon & Maintenance Plugin by NiteoThemes … |
niteo |
CMP – Coming Soon & Maintenance Plugin by NiteoThemes |
2026-04-18T03:37:04.707Z | 2026-04-20T13:46:08.222Z |
| CVE-2026-6048 |
6.4 (3.1)
|
Flipbox Addon for Elementor <= 2.1.1 - Authenticated (… |
dragwyb |
Flipbox Addon for Elementor |
2026-04-18T03:37:05.751Z | 2026-04-20T13:46:08.081Z |
| CVE-2026-4801 |
6.4 (3.1)
|
Page Builder Gutenberg Blocks <= 3.1.16 - Authenticate… |
godaddy |
Page Builder Gutenberg Blocks – CoBlocks |
2026-04-18T03:37:03.859Z | 2026-04-20T14:42:38.120Z |
| CVE-2026-40494 |
9.8 (3.1)
|
SAIL has heap buffer overflow in TGA RLE decoder — raw… |
HappySeaFox |
sail |
2026-04-18T01:42:48.830Z | 2026-04-20T14:55:42.859Z |
| CVE-2026-40493 |
9.8 (3.1)
|
SAIL has heap buffer overflow in PSD decoder — bpp mis… |
HappySeaFox |
sail |
2026-04-18T01:41:14.664Z | 2026-04-20T16:15:22.120Z |
| CVE-2026-40492 |
9.8 (3.1)
|
SAIL has heap buffer overflow in XWD decoder — bits_pe… |
HappySeaFox |
sail |
2026-04-18T01:39:48.056Z | 2026-04-20T15:24:42.029Z |
| CVE-2026-40491 |
6.5 (3.1)
|
gdown Affected by Arbitrary File Write via Path Traver… |
wkentaro |
gdown |
2026-04-18T01:36:47.659Z | 2026-04-20T15:50:02.983Z |
| CVE-2026-40490 |
6.8 (3.1)
|
AsyncHttpClient leaks authorization credentials to unt… |
AsyncHttpClient |
async-http-client |
2026-04-18T01:31:13.860Z | 2026-04-20T14:55:50.254Z |
| CVE-2026-40489 |
8.6 (4.0)
|
editorconfig-core-c has incomplete fix for CVE-2023-0341 |
editorconfig |
editorconfig-core-c |
2026-04-18T01:24:57.278Z | 2026-04-20T16:15:31.570Z |
| CVE-2026-40487 |
8.9 (3.1)
|
Postiz Has Unrestricted File Upload via MIME Type Spoo… |
gitroomhq |
postiz-app |
2026-04-18T01:19:06.588Z | 2026-04-20T15:25:40.893Z |
| CVE-2026-35582 |
8.8 (3.1)
|
Emissary has an OS Command Injection via Unvalidated I… |
NationalSecurityAgency |
emissary |
2026-04-18T01:16:27.661Z | 2026-04-20T15:48:51.543Z |
| CVE-2026-1838 |
6.1 (3.1)
|
Hostel <= 1.1.6 - Reflected Cross-Site Scripting via '… |
prasunsen |
Hostel |
2026-04-18T01:26:04.643Z | 2026-04-20T14:19:29.627Z |
| CVE-2026-1559 |
6.4 (3.1)
|
Youzify <= 1.3.6 - Authenticated (Subscriber+) Stored … |
youzify |
Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress |
2026-04-18T01:26:05.210Z | 2026-04-20T13:46:08.353Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-xr6f-h4x7-r6qp |
8.7 (4.0)
|
WWBN AVideo: RCE cause by clonesite plugin | 2026-04-16T21:25:19Z | 2026-04-16T21:25:20Z |
| ghsa-wxw2-rwmh-vr8f |
9.8 (3.1)
|
electerm: electerm_install_script_CommandInjection Vulnerability Report | 2026-04-16T21:24:22Z | 2026-04-16T21:24:22Z |
| ghsa-9hrv-gvrv-6gf2 |
6.0 (4.0)
|
Flowise Execute Flow function has an SSRF vulnerability | 2026-04-16T21:23:17Z | 2026-04-16T21:23:18Z |
| ghsa-qqvm-66q4-vf5c |
5.3 (4.0)
|
Flowise: SSRF Protection Bypass via Direct node-fetch / axios Usage (Patch Enforcement Failure) | 2026-04-16T21:23:03Z | 2026-04-16T21:23:03Z |
| ghsa-w6v6-49gh-mc9w |
4.9 (4.0)
|
Flowise: Path Traversal in Vector Store basePath | 2026-04-16T21:22:49Z | 2026-04-16T21:22:49Z |
| ghsa-m7mq-85xj-9x33 |
5.6 (3.1)
|
Flowise: Weak Default Token Hash Secret | 2026-04-16T21:22:36Z | 2026-04-16T21:22:36Z |
| ghsa-2qqc-p94c-hxwh |
5.6 (3.1)
|
Flowise: Weak Default Express Session Secret | 2026-04-16T21:22:00Z | 2026-04-16T21:22:00Z |
| ghsa-cc4f-hjpj-g9p8 |
5.6 (3.1)
|
Flowise: Weak Default JWT Secrets | 2026-04-16T21:21:12Z | 2026-04-16T21:21:12Z |
| ghsa-6pcv-j4jx-m4vx |
5.3 (3.1)
|
Flowise: Unauthenticated Information Disclosure of OAuth Secrets (Cleartext) via GET Request | 2026-04-16T21:20:05Z | 2026-04-16T21:20:05Z |
| ghsa-gj9q-8w99-mp8j |
2.1 (4.0)
|
OpenClaw: TOCTOU read in exec script preflight | 2026-04-16T21:19:21Z | 2026-04-16T21:19:21Z |
| ghsa-c9gw-hvqq-f33r |
9.9 (3.1)
|
Flowise: Authenticated RCE Via MCP Adapters | 2026-04-16T21:18:17Z | 2026-04-16T21:18:17Z |
| ghsa-xgp8-3hg3-c2mh |
2.2 (3.1)
|
webpki: Name constraints were accepted for certificates asserting a wildcard name | 2026-04-16T21:17:12Z | 2026-04-16T21:17:12Z |
| ghsa-v92g-xgxw-vvmm |
6.3 (4.0)
|
Mako: Path traversal via double-slash URI prefix in TemplateLookup | 2026-04-16T21:16:40Z | 2026-04-16T21:16:40Z |
| ghsa-965h-392x-2mh5 |
2.2 (3.1)
|
webpki: Name constraints for URI names were incorrectly accepted | 2026-04-16T21:16:22Z | 2026-04-16T21:16:23Z |
| ghsa-hf5p-q87m-crj7 |
5.9 (3.1)
|
Junrar: Path Traversal (Zip-Slip) via Sibling Directory Name Prefix | 2026-04-16T21:14:33Z | 2026-04-16T21:14:33Z |
| ghsa-533q-w4g6-5586 |
7.5 (3.1)
|
PsiTransfer: Upload PATCH path traversal can create `config.<NODE_ENV>.js` and lead to code executi… | 2026-04-16T21:13:40Z | 2026-04-16T21:13:40Z |
| ghsa-wqq3-wfmp-v85g |
4.7 (3.1)
|
Mojic: Observable Timing Discrepancy in HMAC Verification | 2026-04-16T21:10:17Z | 2026-04-16T21:10:17Z |
| ghsa-jhm7-29pj-4xvf |
5.9 (3.1)
|
@node-oauth/oauth2-server: PKCE code_verifier ABNF not enforced in token exchange allows brute-forc… | 2026-04-16T21:09:50Z | 2026-04-16T21:09:50Z |
| ghsa-qr3m-xw4c-jqw3 |
9.1 (3.1)
|
ChilliCream GraphQL Platform: Utf8GraphQLParser Stack Overflow via Deeply Nested GraphQL Documents | 2026-04-16T21:09:40Z | 2026-04-16T21:09:40Z |
| ghsa-3jpj-v3xr-5h6g |
5.3 (3.1)
|
zrok: Broken ownership check in DELETE /api/v2/unaccess allows non-admin to delete global frontend … | 2026-04-16T21:09:23Z | 2026-04-16T21:09:23Z |
| ghsa-cpf9-ph2j-ccr9 |
7.5 (3.1)
|
zrok: Unauthenticated DoS via unbounded memory allocation in striped session cookie parsing | 2026-04-16T21:09:08Z | 2026-04-16T21:09:08Z |
| ghsa-4fxq-2x3x-6xqx |
6.1 (3.1)
|
zrok: Reflected XSS in GitHub OAuth callback via unsanitized refreshInterval error rendering | 2026-04-16T21:08:55Z | 2026-04-16T21:08:55Z |
| ghsa-ffgh-3jrf-8wvh |
5.0 (3.1)
|
Weblate: Prefix-Based Repository Boundary Check Bypass via Symlink/Junction Path Prefix Collision | 2026-04-16T21:08:47Z | 2026-04-16T21:08:47Z |
| ghsa-9mrh-v2v3-xpfm |
6.1 (3.1)
|
sanitize-html allowedTags Bypass via Entity-Decoded Text in nonTextTags Elements | 2026-04-16T21:08:29Z | 2026-04-16T21:08:29Z |
| ghsa-95mq-xwj4-r47p |
9.4 (3.1)
|
Dgraph: Unauthenticated /debug/pprof/cmdline discloses admin auth token, enabling unauthorized acce… | 2026-04-16T21:08:07Z | 2026-04-16T21:08:07Z |
| ghsa-c276-fj82-f2pq |
5.3 (3.1)
|
ApostropheCMS: Information Disclosure via choices/counts Query Parameters Bypassing publicApiProjec… | 2026-04-16T20:45:15Z | 2026-04-16T20:45:15Z |
| ghsa-f8hv-g549-hwg2 |
4.1 (3.1)
|
Weblate: SSRF via the webhook add-on using unprotected fetch_url() | 2026-04-16T20:45:04Z | 2026-04-16T20:45:04Z |
| ghsa-9gcg-w975-3rjh |
5.4 (3.1)
|
Istio: AuthorizationPolicy serviceAccounts regex injection via unescaped dots | 2026-04-16T20:44:46Z | 2026-04-16T20:44:46Z |
| ghsa-353c-v8x9-v7c3 |
8.7 (4.0)
|
MCP-Framework: Unbounded memory allocation in readRequestBody allows denial of service via HTTP transport | 2026-04-16T20:44:32Z | 2026-04-16T20:44:32Z |
| ghsa-855c-r2vq-c292 |
8.7 (3.1)
|
Stored XSS in SEO Fields Leads to Authenticated API Data Exposure in ApostropheCMS | 2026-04-16T20:44:18Z | 2026-04-16T20:44:18Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-296 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:46.211223Z |
| pysec-2021-295 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:46.123018Z |
| pysec-2021-294 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:46.024313Z |
| pysec-2021-292 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:45.845259Z |
| pysec-2021-291 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:45.759545Z |
| pysec-2021-290 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:45.672870Z |
| pysec-2021-287 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:45.390087Z |
| pysec-2021-285 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:45.209094Z |
| pysec-2021-800 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:40.116575Z |
| pysec-2021-799 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:40.029733Z |
| pysec-2021-797 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:39.861916Z |
| pysec-2021-792 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:39.432731Z |
| pysec-2021-791 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:39.345760Z |
| pysec-2021-787 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:38.998901Z |
| pysec-2021-786 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:38.896417Z |
| pysec-2021-782 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:38.525134Z |
| pysec-2021-778 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:38.165715Z |
| pysec-2021-777 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:38.080205Z |
| pysec-2021-763 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:36.820839Z |
| pysec-2021-759 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:36.478576Z |
| pysec-2021-602 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:06.599796Z |
| pysec-2021-601 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:06.517637Z |
| pysec-2021-599 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:06.351462Z |
| pysec-2021-594 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.896757Z |
| pysec-2021-593 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.816233Z |
| pysec-2021-589 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.480275Z |
| pysec-2021-588 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.402350Z |
| pysec-2021-584 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.048687Z |
| pysec-2021-580 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:04.699565Z |
| pysec-2021-579 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:04.618744Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1911 | Malicious code in prometheus-quicker-analysis (PyPI) | 2026-03-18T12:17:12Z | 2026-03-18T12:17:12Z |
| mal-2026-1910 | Malicious code in prometheus-quick-analysis (PyPI) | 2026-03-18T12:17:12Z | 2026-03-18T12:17:12Z |
| mal-2026-1909 | Malicious code in prometheus-fast-analysis (PyPI) | 2026-03-18T12:17:11Z | 2026-03-18T12:17:11Z |
| mal-2026-1908 | Malicious code in prometheus-analysis-1 (PyPI) | 2026-03-18T12:17:10Z | 2026-03-18T12:17:10Z |
| mal-2026-1907 | Malicious code in prometheus-analysis (PyPI) | 2026-03-18T12:17:09Z | 2026-03-18T12:17:09Z |
| mal-2026-1906 | Malicious code in loveclose2 (PyPI) | 2026-03-18T12:15:42Z | 2026-03-18T12:15:42Z |
| mal-2026-1905 | Malicious code in loveclose1 (PyPI) | 2026-03-18T12:15:41Z | 2026-03-18T12:15:41Z |
| mal-2026-1904 | Malicious code in loveclose (PyPI) | 2026-03-18T12:15:41Z | 2026-03-18T12:15:41Z |
| mal-2026-1903 | Malicious code in loveahmedclose (PyPI) | 2026-03-18T12:15:40Z | 2026-03-18T12:15:40Z |
| mal-2026-1902 | Malicious code in helloharry123t-package (PyPI) | 2026-03-18T12:14:34Z | 2026-03-18T12:14:34Z |
| mal-2026-1901 | Malicious code in ethical-demo-liviy (PyPI) | 2026-03-18T12:13:36Z | 2026-03-18T12:13:36Z |
| mal-2026-1900 | Malicious code in elleuchdhsolvepwn (PyPI) | 2026-03-18T12:13:31Z | 2026-03-18T12:13:31Z |
| mal-2026-1899 | Malicious code in discordrlbypasser (PyPI) | 2026-03-18T12:13:20Z | 2026-03-18T12:13:20Z |
| mal-2026-1898 | Malicious code in curl-requester (PyPI) | 2026-03-18T12:13:00Z | 2026-03-18T12:13:00Z |
| mal-2026-1897 | Malicious code in bigmathutils (PyPI) | 2026-03-18T12:11:55Z | 2026-03-18T12:11:55Z |
| mal-2026-1896 | Malicious code in bigmathix (PyPI) | 2026-03-18T12:11:54Z | 2026-03-18T12:11:54Z |
| mal-2026-1895 | Malicious code in bigmathex (PyPI) | 2026-03-18T12:11:53Z | 2026-03-18T12:11:53Z |
| mal-2026-1894 | Malicious code in async-substrate-interface-sub (PyPI) | 2026-03-18T12:11:16Z | 2026-03-18T12:11:16Z |
| mal-2026-1893 | Malicious code in aitrade (PyPI) | 2026-03-18T12:10:51Z | 2026-03-18T12:10:51Z |
| mal-2026-1892 | Malicious code in test6789.v3 (NuGet) | 2026-03-18T12:10:41Z | 2026-03-18T12:10:41Z |
| mal-2026-1891 | Malicious code in test6789.latest (NuGet) | 2026-03-18T12:10:40Z | 2026-03-18T12:10:40Z |
| mal-2026-1890 | Malicious code in test6789.client (NuGet) | 2026-03-18T12:10:40Z | 2026-03-18T12:10:40Z |
| mal-2026-1889 | Malicious code in stripeapi.net (NuGet) | 2026-03-18T12:10:39Z | 2026-03-18T12:10:39Z |
| mal-2026-1888 | Malicious code in solnetwallet.net.core (NuGet) | 2026-03-18T12:10:38Z | 2026-03-18T12:10:38Z |
| mal-2026-1887 | Malicious code in solnetall.net (NuGet) | 2026-03-18T12:10:36Z | 2026-03-18T12:10:36Z |
| mal-2026-1886 | Malicious code in bsure.utils (NuGet) | 2026-03-18T12:10:31Z | 2026-03-18T12:10:31Z |
| mal-2026-1885 | Malicious code in bsure.binsec (NuGet) | 2026-03-18T12:10:30Z | 2026-03-18T12:10:30Z |
| mal-2026-1884 | Malicious code in avvio.sky.userdataservice (NuGet) | 2026-03-18T12:10:28Z | 2026-03-18T12:10:28Z |
| mal-2026-1883 | Malicious code in 8y234rtv8yvf (NuGet) | 2026-03-18T12:10:28Z | 2026-03-18T12:10:28Z |
| mal-2026-1882 | Malicious code in 3rugfbe8rivferiuv (NuGet) | 2026-03-18T12:10:27Z | 2026-03-18T12:10:27Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1868 | Passwortmanager: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-08-19T22:00:00.000+00:00 | 2025-08-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1867 | Commvault Backup & Recovery: Mehrere Schwachstellen | 2025-08-19T22:00:00.000+00:00 | 2025-08-20T22:00:00.000+00:00 |
| wid-sec-w-2025-1866 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2025-08-19T22:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-1865 | Liferay Portal und DXP: Mehrere Schwachstellen | 2025-08-19T22:00:00.000+00:00 | 2025-08-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1864 | Google Chrome und Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2025-08-19T22:00:00.000+00:00 | 2025-11-24T23:00:00.000+00:00 |
| wid-sec-w-2025-1863 | libTIFF: Schwachstelle ermöglicht Denial of Service | 2025-08-19T22:00:00.000+00:00 | 2025-11-27T23:00:00.000+00:00 |
| wid-sec-w-2025-1862 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-08-18T22:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1861 | Liferay DXP und Portal: Mehrere Schwachstellen | 2025-08-18T22:00:00.000+00:00 | 2025-09-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1858 | Linux Kernel: Mehrere Schwachstellen | 2025-08-17T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1857 | Firebird: Mehrere Schwachstellen | 2025-08-17T22:00:00.000+00:00 | 2025-08-31T22:00:00.000+00:00 |
| wid-sec-w-2025-1856 | Mattermost Server: Mehrere Schwachstellen | 2025-08-17T22:00:00.000+00:00 | 2025-09-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1855 | OpenBao: Mehrere Schwachstellen | 2025-08-17T22:00:00.000+00:00 | 2025-08-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1854 | HCL BigFix Komponente: Mehrere Schwachstellen | 2025-08-17T22:00:00.000+00:00 | 2025-10-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1853 | Verschiedene Autodesk AutoCAD-Produkte und Civil 3D: Mehrere Schwachstellen | 2025-08-17T22:00:00.000+00:00 | 2025-08-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1852 | Bouncy Castle: Schwachstelle ermöglicht Denial of Service | 2025-08-17T22:00:00.000+00:00 | 2025-08-17T22:00:00.000+00:00 |
| wid-sec-w-2025-1851 | Apache Superset: Mehrere Schwachstellen | 2025-08-14T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1850 | Xerox FreeFlow Print Server: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-08-14T22:00:00.000+00:00 | 2025-11-17T23:00:00.000+00:00 |
| wid-sec-w-2025-1849 | Rockwell Automation FactoryTalk: Mehrere Schwachstellen | 2025-08-14T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1848 | Rockwell Automation ControlLogix: Schwachstelle ermöglicht Codeausführung | 2025-08-14T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1847 | libTIFF: Schwachstelle ermöglicht Denial of Service | 2025-08-14T22:00:00.000+00:00 | 2025-11-27T23:00:00.000+00:00 |
| wid-sec-w-2025-1846 | IBM WebSphere Application Server: Schwachstelle ermöglicht Umgehung von Sicherheitsmechanismen | 2025-08-14T22:00:00.000+00:00 | 2025-10-05T22:00:00.000+00:00 |
| wid-sec-w-2025-1845 | Cisco Secure Firewall Threat Defense: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-08-14T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1844 | Rockwell Automation Studio 5000 Logix Designer: Schwachstelle ermöglicht Codeausführung | 2025-08-14T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1843 | Cisco Secure Firewall Threat Defense (Snort 3 Detection Engine): Schwachstelle ermöglicht Denial of Service | 2025-08-14T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1842 | PostgreSQL: Mehrere Schwachstellen | 2025-08-14T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1841 | Cisco Secure Firewall Management Center: Mehrere Schwachstellen | 2025-08-14T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1840 | Cisco Secure Firewall Management Center und Secure Firewall Threat Defense: Schwachstelle ermöglicht Ausführen von Kommandos als root | 2025-08-14T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1839 | Cisco ASA und Secure Firewall Threat Defense: Mehrere Schwachstellen | 2025-08-14T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1838 | Cisco IOS, XE, ASA, FTD: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-08-14T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1837 | Gitea: Mehrere Schwachstellen | 2025-08-14T22:00:00.000+00:00 | 2025-11-27T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-23-045-01 | Weintek EasyBuilder Pro cMT Series | 2023-02-20T16:33:49.721285Z | 2023-02-20T16:33:49.721285Z |
| icsma-23-047-01 | BD Alaris Infusion Central | 2023-02-16T00:00:00.000000Z | 2023-02-27T13:27:41.553636Z |
| icsa-23-089-01 | Hitachi Energy IEC 61850 MMS-Server (Update B) | 2023-02-14T13:30:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-23-047-12 | Siemens JT Open, JT Utilities, and Parasolid | 2023-02-14T00:00:00.000000Z | 2023-02-14T00:00:00.000000Z |
| icsa-23-047-11 | Siemens Mendix | 2023-02-14T00:00:00.000000Z | 2023-02-14T00:00:00.000000Z |
| icsa-23-047-10 | Siemens COMOS | 2023-02-14T00:00:00.000000Z | 2023-02-14T00:00:00.000000Z |
| icsa-23-047-09 | Siemens SIMATIC Industrial Products | 2023-02-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-047-08 | Siemens RUGGEDCOM APE1808 | 2023-02-14T00:00:00.000000Z | 2023-09-12T00:00:00.000000Z |
| icsa-23-047-07 | Siemens TIA Project-Server formerly known as TIA Multiuser Server | 2023-02-14T00:00:00.000000Z | 2024-08-13T00:00:00.000000Z |
| icsa-23-047-06 | Siemens Simcenter Femap before V2023.1 | 2023-02-14T00:00:00.000000Z | 2023-02-14T00:00:00.000000Z |
| icsa-23-047-05 | Siemens SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2023-02-14T00:00:00.000000Z | 2023-02-14T00:00:00.000000Z |
| icsa-23-047-04 | Siemens Brownfield Connectivity Gateway | 2023-02-14T00:00:00.000000Z | 2023-02-14T00:00:00.000000Z |
| icsa-23-047-03 | Siemens Brownfield Connectivity Client | 2023-02-14T00:00:00.000000Z | 2023-02-14T00:00:00.000000Z |
| icsa-23-047-02 | Siemens SCALANCE X200 IRT | 2023-02-14T00:00:00.000000Z | 2023-02-14T00:00:00.000000Z |
| icsa-23-047-01 | Siemens Solid Edge | 2023-02-14T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-23-040-04 | Horner Automation Cscape Envision RV | 2023-02-09T00:00:00.000000Z | 2023-02-09T00:00:00.000000Z |
| icsa-23-040-03 | Johnson Controls System Configuration Tool (SCT) | 2023-02-09T00:00:00.000000Z | 2023-02-09T00:00:00.000000Z |
| icsa-23-040-02 | LS ELECTRIC XBC-DN32U | 2023-02-09T00:00:00.000000Z | 2023-02-09T00:00:00.000000Z |
| icsa-23-040-01 | Control By Web X-400, X-600M | 2023-02-09T00:00:00.000000Z | 2023-02-09T00:00:00.000000Z |
| icsa-23-037-01 | EnOcean SmartServer | 2023-02-07T00:00:00.000000Z | 2023-02-07T00:00:00.000000Z |
| icsa-23-033-03 | Baicells Nova | 2023-02-02T07:00:00.000000Z | 2023-02-02T07:00:00.000000Z |
| icsa-23-033-05 | Delta Electronics DX-2100-L1-CN | 2023-02-02T00:00:00.000000Z | 2023-02-02T00:00:00.000000Z |
| icsa-23-033-04 | Delta Electronics DVW-W02W2-E2 | 2023-02-02T00:00:00.000000Z | 2023-02-02T00:00:00.000000Z |
| icsa-23-033-02 | Mitsubishi Electric GOT2000 Series and GT SoftGOT2000 | 2023-02-02T00:00:00.000000Z | 2023-02-02T00:00:00.000000Z |
| icsa-23-033-01 | Delta Electronics DIAScreen | 2023-02-02T00:00:00.000000Z | 2023-02-02T00:00:00.000000Z |
| icsa-23-031-01 | Delta Electronics DOPSoft | 2023-01-31T00:00:00.000000Z | 2023-01-31T00:00:00.000000Z |
| icsa-23-026-02 | Econolite EOS (Update A) | 2023-01-26T07:00:00.000000Z | 2023-06-22T06:00:00.000000Z |
| icsa-23-026-07 | Landis+Gyr E850 | 2023-01-26T00:00:00.000000Z | 2023-01-26T00:00:00.000000Z |
| icsa-23-026-06 | Rockwell Automation products using GoAhead Web Server | 2023-01-26T00:00:00.000000Z | 2023-01-26T00:00:00.000000Z |
| icsa-23-026-05 | Mitsubishi Electric MELFA SD/SQ series and F-series Robot Controllers | 2023-01-26T00:00:00.000000Z | 2023-01-26T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-n3n9k-priv-escal-3qhxjbc | Cisco Nexus 3000 and 9000 Series Switches Privilege Escalation Vulnerability | 2020-08-26T16:00:00+00:00 | 2020-08-26T20:59:18+00:00 |
| cisco-sa-fxos-nxos-cfs-dos-damnymbd | Cisco FXOS and NX-OS Software Cisco Fabric Services Denial of Service Vulnerability | 2020-08-26T16:00:00+00:00 | 2020-08-26T21:23:18+00:00 |
| cisco-sa-callhome-cmdinj-zkxzscy | Cisco NX-OS Software Call Home Command Injection Vulnerability | 2020-08-26T16:00:00+00:00 | 2020-08-26T20:51:18+00:00 |
| cisco-sa-webex-desktop-app-ovsfpvmj | Cisco Webex Meetings Desktop App for Windows Arbitrary File Overwrite Vulnerability | 2020-08-19T16:00:00+00:00 | 2021-02-17T17:38:58+00:00 |
| cisco-sa-waas-encsw-cspw-cred-hzzl29a7 | Cisco vWAAS for Cisco ENCS 5400-W Series and CSP 5000-W Series Default Credentials Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-vdsd-w7mnkwj7 | Cisco Vision Dynamic Signage Director Directory Traversal Information Disclosure Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-smart-priv-esca-nqwxxwbu | Cisco Smart Software Manager On-Prem Privilege Escalation Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-sbss-ipv6-dos-tsgqbffw | Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-ipcameras-rce-dos-upyjyxn3 | Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Remote Code Execution and Denial of Service Vulnerabilities | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-hyp-wsv-yt3j5hsb | Cisco Hyperflex HX-Series Software Weak Storage Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-dnac-mlt-xss-zuzbcdev | Cisco DNA Center Cross-Site Scripting Vulnerabilities | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-dcnm-xss-stored-w4rjzjto | Cisco Data Center Network Manager Stored Cross-Site Scripting Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-dcnm-xss-jnhswg5c | Cisco Data Center Network Manager Cross-Site Scripting Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-dcnm-xss-5tdmjrb3 | Cisco Data Center Network Manager Cross-Site Scripting Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-dcnm-patrav-pw9rkhyw | Cisco Data Center Network Manager Path Traversal Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-dcnm-pa-trav-bmdfsttq | Cisco Data Center Network Manager Path Traversal Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-dcnm-infordisc-doaxvvfv | Cisco Data Center Network Manager Information Disclosure Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-dcnm-file-path-6pkonjhe | Cisco Data Center Network Manager Read File Path Traversal Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-dcnm-bypass-auth-mvdr6ygt | Cisco Data Center Network Manager Authorization Bypass Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-dcnm-authbypass-yvjzqgk2 | Cisco Data Center Network Manager Authorization Bypass Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-dcnm-auth-bypass-myefpfcf | Cisco Data Center Network Manager Authorization Bypass Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-cvdsd-xss-temmlyur | Cisco Vision Dynamic Signage Director Stored Cross-Site Scripting Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-cvdsd-rbac-y9lm5jw4 | Cisco Vision Dynamic Signage Director Role-Based Access Control Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-cvdsd-pathtrv-5tljrrfn | Cisco Vision Dynamic Signage Director Path Traversal Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-cmx-rshell-esc-l6hbwjbg | Cisco Connected Mobile Experiences Restricted Shell Escape Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-cmx-prvesc-6g37hjal | Cisco Connected Mobile Experiences Privilege Escalation Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-cdp-memleak-k5z7m55t | Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Memory Leak Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-webex-smtdelete-gjdurogr | Cisco Webex Meetings Scheduled Meeting Template Deletion Vulnerability | 2020-08-05T16:00:00+00:00 | 2020-08-05T16:00:00+00:00 |
| cisco-sa-webex-smtcreate-ymud5sk | Cisco Webex Meetings Scheduled Meeting Template Creation Vulnerability | 2020-08-05T16:00:00+00:00 | 2020-08-05T16:00:00+00:00 |
| cisco-sa-webex-mttngs-xss-3vbdxduf | Cisco Webex Meetings Reflected Cross-Site Scripting Vulnerability | 2020-08-05T16:00:00+00:00 | 2020-08-05T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-54100 | PowerShell Remote Code Execution Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-18T00:00:00.000Z |
| msrc_cve-2025-69277 | libsodium before ad3004e, in atypical use cases involving certain custom cryptography or untrusted data to crypto_core_ed25519_is_valid_point, mishandles checks for whether an elliptic curve point is valid because it sometimes allows points that aren't in the main cryptographic group. | 2025-12-02T00:00:00.000Z | 2026-02-18T02:48:42.000Z |
| msrc_cve-2025-68973 | In GnuPG through 2.4.8, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.) | 2025-12-02T00:00:00.000Z | 2026-02-25T01:36:51.000Z |
| msrc_cve-2025-68972 | In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line. | 2025-12-02T00:00:00.000Z | 2026-03-03T14:52:31.000Z |
| msrc_cve-2025-68746 | spi: tegra210-quad: Fix timeout handling | 2025-12-02T00:00:00.000Z | 2026-02-18T02:29:02.000Z |
| msrc_cve-2025-68745 | scsi: qla2xxx: Clear cmds after chip reset | 2025-12-02T00:00:00.000Z | 2026-03-31T15:01:55.000Z |
| msrc_cve-2025-68744 | bpf: Free special fields when update [lru_,]percpu_hash maps | 2025-12-02T00:00:00.000Z | 2026-02-18T02:26:56.000Z |
| msrc_cve-2025-68742 | bpf: Fix invalid prog->stats access when update_effective_progs fails | 2025-12-02T00:00:00.000Z | 2026-02-18T02:30:39.000Z |
| msrc_cve-2025-68741 | scsi: qla2xxx: Fix improper freeing of purex item | 2025-12-02T00:00:00.000Z | 2026-02-18T02:21:57.000Z |
| msrc_cve-2025-68740 | ima: Handle error code returned by ima_filter_rule_match() | 2025-12-02T00:00:00.000Z | 2026-02-18T02:34:12.000Z |
| msrc_cve-2025-68736 | landlock: Fix handling of disconnected directories | 2025-12-02T00:00:00.000Z | 2026-03-31T15:01:33.000Z |
| msrc_cve-2025-68733 | smack: fix bug: unprivileged task can create labels | 2025-12-02T00:00:00.000Z | 2026-02-18T02:39:17.000Z |
| msrc_cve-2025-68732 | gpu: host1x: Fix race in syncpt alloc/free | 2025-12-02T00:00:00.000Z | 2026-02-18T02:22:51.000Z |
| msrc_cve-2025-68729 | wifi: ath12k: Fix MSDU buffer types handling in RX error path | 2025-12-02T00:00:00.000Z | 2026-01-08T14:37:51.000Z |
| msrc_cve-2025-68728 | ntfs3: fix uninit memory after failed mi_read in mi_format_new | 2025-12-02T00:00:00.000Z | 2026-01-13T01:43:26.000Z |
| msrc_cve-2025-68727 | ntfs3: Fix uninit buffer allocated by __getname() | 2025-12-02T00:00:00.000Z | 2026-01-13T01:43:46.000Z |
| msrc_cve-2025-68725 | bpf: Do not let BPF test infra emit invalid GSO types to stack | 2025-12-02T00:00:00.000Z | 2026-03-03T15:00:44.000Z |
| msrc_cve-2025-68724 | crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id | 2025-12-02T00:00:00.000Z | 2026-02-18T02:38:05.000Z |
| msrc_cve-2025-68615 | Net-SNMP snmptrapd crash | 2025-12-02T00:00:00.000Z | 2025-12-31T01:37:13.000Z |
| msrc_cve-2025-68476 | KEDA has Arbitrary File Read via Insufficient Path Validation in HashiCorp Vault Service Account Credential | 2025-12-02T00:00:00.000Z | 2026-01-08T01:39:41.000Z |
| msrc_cve-2025-68390 | Elasticsearch Allocation of Resources Without Limits or Throttling | 2025-12-02T00:00:00.000Z | 2025-12-23T01:37:15.000Z |
| msrc_cve-2025-68384 | Elasticsearch Allocation of Resources Without Limits or Throttling | 2025-12-02T00:00:00.000Z | 2025-12-23T01:37:09.000Z |
| msrc_cve-2025-68380 | wifi: ath11k: fix peer HE MCS assignment | 2025-12-02T00:00:00.000Z | 2026-01-08T14:41:22.000Z |
| msrc_cve-2025-68379 | RDMA/rxe: Fix null deref on srq->rq.queue after resize failure | 2025-12-02T00:00:00.000Z | 2026-02-18T02:35:33.000Z |
| msrc_cve-2025-68378 | bpf: Fix stackmap overflow check in __bpf_get_stackid() | 2025-12-02T00:00:00.000Z | 2026-03-31T15:02:43.000Z |
| msrc_cve-2025-68376 | coresight: ETR: Fix ETR buffer use-after-free issue | 2025-12-02T00:00:00.000Z | 2026-01-13T01:43:52.000Z |
| msrc_cve-2025-68374 | md: fix rcu protection in md_wakeup_thread | 2025-12-02T00:00:00.000Z | 2026-03-31T15:03:08.000Z |
| msrc_cve-2025-68372 | nbd: defer config put in recv_work | 2025-12-02T00:00:00.000Z | 2026-02-18T02:32:55.000Z |
| msrc_cve-2025-68371 | scsi: smartpqi: Fix device resources accessed after device removal | 2025-12-02T00:00:00.000Z | 2026-02-18T02:17:01.000Z |
| msrc_cve-2025-68367 | macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse | 2025-12-02T00:00:00.000Z | 2026-01-08T14:39:03.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15206-1 | SDL2-2.32.8-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15205-1 | SDL-1.2.15-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15204-1 | MozillaThunderbird-128.11.1-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15203-1 | MozillaFirefox-139.0.4-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15202-1 | python311-selenium-4.25.0-5.1 on GA media | 2025-06-04T00:00:00Z | 2025-06-04T00:00:00Z |
| opensuse-su-2025:15201-1 | python311-nh3-0.2.17-2.1 on GA media | 2025-06-04T00:00:00Z | 2025-06-04T00:00:00Z |
| opensuse-su-2025:15200-1 | haproxy-3.2.0+git0.e134140d2-2.1 on GA media | 2025-06-04T00:00:00Z | 2025-06-04T00:00:00Z |
| opensuse-su-2025:15199-1 | perl-Crypt-OpenSSL-RSA-0.350.0-1.1 on GA media | 2025-06-03T00:00:00Z | 2025-06-03T00:00:00Z |
| opensuse-su-2025:15198-1 | assimp-devel-6.0.1-1.1 on GA media | 2025-06-03T00:00:00Z | 2025-06-03T00:00:00Z |
| opensuse-su-2025:15197-1 | apache2-mod_security2-2.9.10-1.1 on GA media | 2025-06-03T00:00:00Z | 2025-06-03T00:00:00Z |
| opensuse-su-2025:15196-1 | MozillaFirefox-139.0.1-1.1 on GA media | 2025-06-03T00:00:00Z | 2025-06-03T00:00:00Z |
| opensuse-su-2025:15195-1 | golang-github-v2fly-v2ray-core-5.33.0-1.1 on GA media | 2025-06-02T00:00:00Z | 2025-06-02T00:00:00Z |
| opensuse-su-2025:15194-1 | sslh-2.2.4-1.1 on GA media | 2025-06-02T00:00:00Z | 2025-06-02T00:00:00Z |
| opensuse-su-2025:15193-1 | golang-github-teddysun-v2ray-plugin-5.25.0-1.1 on GA media | 2025-06-02T00:00:00Z | 2025-06-02T00:00:00Z |
| opensuse-su-2025:15192-1 | python39-3.9.22-3.1 on GA media | 2025-06-02T00:00:00Z | 2025-06-02T00:00:00Z |
| opensuse-su-2025:15191-1 | python311-3.11.12-4.1 on GA media | 2025-06-02T00:00:00Z | 2025-06-02T00:00:00Z |
| opensuse-su-2025:15190-1 | python310-3.10.17-4.1 on GA media | 2025-06-02T00:00:00Z | 2025-06-02T00:00:00Z |
| opensuse-su-2025:15189-1 | libsoup-2_4-1-2.74.3-11.1 on GA media | 2025-06-01T00:00:00Z | 2025-06-01T00:00:00Z |
| opensuse-su-2025:15188-1 | govulncheck-vulndb-0.0.20250529T205903-1.1 on GA media | 2025-06-01T00:00:00Z | 2025-06-01T00:00:00Z |
| opensuse-su-2025:15187-1 | perl-Net-Dropbox-API-1.900.0-2.1 on GA media | 2025-05-31T00:00:00Z | 2025-05-31T00:00:00Z |
| opensuse-su-2025:15186-1 | openbao-2.2.2-1.1 on GA media | 2025-05-31T00:00:00Z | 2025-05-31T00:00:00Z |
| opensuse-su-2025:15185-1 | libsoup-3_0-0-3.6.5-5.1 on GA media | 2025-05-31T00:00:00Z | 2025-05-31T00:00:00Z |
| opensuse-su-2025:15184-1 | pluto-5.21.7-1.1 on GA media | 2025-05-30T00:00:00Z | 2025-05-30T00:00:00Z |
| opensuse-su-2025:15183-1 | libopenssl-3-devel-3.5.0-3.1 on GA media | 2025-05-30T00:00:00Z | 2025-05-30T00:00:00Z |
| opensuse-su-2025:15182-1 | nodejs-electron-35.5.0-1.1 on GA media | 2025-05-30T00:00:00Z | 2025-05-30T00:00:00Z |
| opensuse-su-2025:15181-1 | kea-2.6.3-1.1 on GA media | 2025-05-30T00:00:00Z | 2025-05-30T00:00:00Z |
| opensuse-su-2025:15180-1 | icinga2-2.14.6-1.1 on GA media | 2025-05-30T00:00:00Z | 2025-05-30T00:00:00Z |
| opensuse-su-2025:15179-1 | govulncheck-vulndb-0.0.20250527T204717-1.1 on GA media | 2025-05-30T00:00:00Z | 2025-05-30T00:00:00Z |
| opensuse-su-2025:15178-1 | golang-github-prometheus-alertmanager-0.28.1-2.1 on GA media | 2025-05-30T00:00:00Z | 2025-05-30T00:00:00Z |
| opensuse-su-2025:15177-1 | ffmpeg-7-7.1.1-4.1 on GA media | 2025-05-30T00:00:00Z | 2025-05-30T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:0848 | Red Hat Security Advisory: OpenJDK 11.0.30 ELS Security Update for Portable Linux Builds | 2026-01-21T13:39:28+00:00 | 2026-04-13T20:00:42+00:00 |
| rhsa-2026:0926 | Red Hat Security Advisory: net-snmp security update | 2026-01-21T13:18:40+00:00 | 2026-03-18T03:16:22+00:00 |
| rhsa-2026:0925 | Red Hat Security Advisory: libsoup security update | 2026-01-21T12:55:50+00:00 | 2026-03-19T14:37:01+00:00 |
| rhsa-2026:0923 | Red Hat Security Advisory: golang security update | 2026-01-21T12:11:33+00:00 | 2026-04-14T09:46:01+00:00 |
| rhsa-2026:0924 | Red Hat Security Advisory: thunderbird security update | 2026-01-21T12:03:00+00:00 | 2026-03-18T17:26:35+00:00 |
| rhsa-2026:0917 | Red Hat Security Advisory: kernel security update | 2026-01-21T10:12:07+00:00 | 2026-03-30T23:21:04+00:00 |
| rhsa-2026:0921 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-01-21T10:01:30+00:00 | 2026-04-14T09:46:01+00:00 |
| rhsa-2026:0922 | Red Hat Security Advisory: golang security update | 2026-01-21T09:50:39+00:00 | 2026-04-14T09:46:01+00:00 |
| rhsa-2026:0914 | Red Hat Security Advisory: gimp security update | 2026-01-21T07:41:14+00:00 | 2026-03-18T03:16:43+00:00 |
| rhsa-2026:0911 | Red Hat Security Advisory: libsoup security update | 2026-01-21T06:39:49+00:00 | 2026-03-19T14:37:00+00:00 |
| rhsa-2026:0908 | Red Hat Security Advisory: libsoup security update | 2026-01-21T05:40:16+00:00 | 2026-03-19T14:37:00+00:00 |
| rhsa-2026:0907 | Red Hat Security Advisory: libsoup security update | 2026-01-21T05:40:05+00:00 | 2026-03-19T14:37:00+00:00 |
| rhsa-2026:0905 | Red Hat Security Advisory: libsoup security update | 2026-01-21T05:26:02+00:00 | 2026-03-19T14:37:00+00:00 |
| rhsa-2026:0906 | Red Hat Security Advisory: libsoup security update | 2026-01-21T05:17:45+00:00 | 2026-03-19T14:37:00+00:00 |
| rhsa-2026:0909 | Red Hat Security Advisory: libsoup security update | 2026-01-21T05:13:10+00:00 | 2026-03-19T14:37:00+00:00 |
| rhsa-2026:0887 | Red Hat Security Advisory: openssl security update | 2026-01-20T16:12:12+00:00 | 2026-04-13T20:00:42+00:00 |
| rhsa-2026:0867 | Red Hat Security Advisory: libsoup security update | 2026-01-20T15:37:11+00:00 | 2026-03-19T14:36:59+00:00 |
| rhsa-2026:0868 | Red Hat Security Advisory: libsoup security update | 2026-01-20T15:33:17+00:00 | 2026-03-19T14:37:01+00:00 |
| rhsa-2026:0865 | Red Hat Security Advisory: libpq security update | 2026-01-20T14:52:12+00:00 | 2026-04-13T20:14:16+00:00 |
| rhba-2026:0860 | Red Hat Bug Fix Advisory: open-vm-tools bug fix and enhancement update | 2026-01-20T14:46:22+00:00 | 2026-01-22T12:57:05+00:00 |
| rhsa-2026:0853 | Red Hat Security Advisory: net-snmp security update | 2026-01-20T14:03:45+00:00 | 2026-03-18T03:16:23+00:00 |
| rhsa-2026:0851 | Red Hat Security Advisory: net-snmp security update | 2026-01-20T13:58:11+00:00 | 2026-03-18T03:16:23+00:00 |
| rhsa-2026:0852 | Red Hat Security Advisory: net-snmp security update | 2026-01-20T13:49:10+00:00 | 2026-03-18T03:16:23+00:00 |
| rhsa-2026:0850 | Red Hat Security Advisory: net-snmp security update | 2026-01-20T13:42:20+00:00 | 2026-03-18T03:16:23+00:00 |
| rhsa-2026:0845 | Red Hat Security Advisory: brotli security update | 2026-01-20T12:13:35+00:00 | 2026-04-13T19:34:07+00:00 |
| rhsa-2026:0836 | Red Hat Security Advisory: libsoup3 security update | 2026-01-20T06:18:50+00:00 | 2026-03-19T14:36:59+00:00 |
| rhsa-2026:0835 | Red Hat Security Advisory: libpq security update | 2026-01-20T05:13:19+00:00 | 2026-04-13T20:14:12+00:00 |
| rhsa-2026:0812 | Red Hat Security Advisory: net-snmp security update | 2026-01-19T16:33:51+00:00 | 2026-03-18T03:16:20+00:00 |
| rhsa-2026:0813 | Red Hat Security Advisory: net-snmp security update | 2026-01-19T16:29:06+00:00 | 2026-03-18T03:16:20+00:00 |
| rhsa-2026:0814 | Red Hat Security Advisory: net-snmp security update | 2026-01-19T16:03:01+00:00 | 2026-03-18T03:16:21+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0335-1 | Security update for python-filelock | 2026-01-29T10:15:42Z | 2026-01-29T10:15:42Z |
| suse-su-2026:0334-1 | Security update for libxml2 | 2026-01-29T10:01:36Z | 2026-01-29T10:01:36Z |
| suse-su-2026:0333-1 | Security update for openssl-1_0_0 | 2026-01-29T08:16:22Z | 2026-01-29T08:16:22Z |
| suse-su-2026:0332-1 | Security update for openssl-1_0_0 | 2026-01-29T06:04:36Z | 2026-01-29T06:04:36Z |
| suse-su-2026:0331-1 | Security update for openssl-1_1 | 2026-01-28T17:13:03Z | 2026-01-28T17:13:03Z |
| suse-su-2026:20190-1 | Security update for java-21-openjdk | 2026-01-28T17:01:51Z | 2026-01-28T17:01:51Z |
| suse-su-2026:0330-1 | Security update for openjpeg2 | 2026-01-28T16:27:12Z | 2026-01-28T16:27:12Z |
| suse-su-2026:20189-1 | Security update for python-urllib3 | 2026-01-28T16:03:29Z | 2026-01-28T16:03:29Z |
| suse-su-2026:20188-1 | Security update for python-python-multipart | 2026-01-28T16:03:29Z | 2026-01-28T16:03:29Z |
| suse-su-2026:20175-1 | Security update for python-urllib3 | 2026-01-28T16:03:29Z | 2026-01-28T16:03:29Z |
| suse-su-2026:20203-1 | Security update for ucode-amd | 2026-01-28T16:01:59Z | 2026-01-28T16:01:59Z |
| suse-su-2026:20173-1 | Security update for ucode-amd | 2026-01-28T16:01:59Z | 2026-01-28T16:01:59Z |
| suse-su-2026:20187-1 | Security update for python-h2 | 2026-01-28T15:47:48Z | 2026-01-28T15:47:48Z |
| suse-su-2026:20186-1 | Security update for xkbcomp | 2026-01-28T15:47:14Z | 2026-01-28T15:47:14Z |
| suse-su-2026:0329-1 | Security update for xen | 2026-01-28T15:39:40Z | 2026-01-28T15:39:40Z |
| suse-su-2026:0328-1 | Security update for xen | 2026-01-28T15:39:28Z | 2026-01-28T15:39:28Z |
| suse-su-2026:0327-1 | Security update for alloy | 2026-01-28T15:38:58Z | 2026-01-28T15:38:58Z |
| suse-su-2026:0326-1 | Security update for helm | 2026-01-28T14:55:01Z | 2026-01-28T14:55:01Z |
| suse-su-2026:0325-1 | Security update for kubernetes | 2026-01-28T14:54:08Z | 2026-01-28T14:54:08Z |
| suse-su-2026:0320-1 | Security update for openjpeg2 | 2026-01-28T14:40:09Z | 2026-01-28T14:40:09Z |
| suse-su-2026:0319-1 | Security update for container-suseconnect | 2026-01-28T14:40:01Z | 2026-01-28T14:40:01Z |
| suse-su-2026:0317-1 | Security update for the Linux Kernel | 2026-01-28T14:37:02Z | 2026-01-28T14:37:02Z |
| suse-su-2026:0316-1 | Security update for the Linux Kernel | 2026-01-28T14:35:14Z | 2026-01-28T14:35:14Z |
| suse-su-2026:0315-1 | Security update for the Linux Kernel | 2026-01-28T14:34:30Z | 2026-01-28T14:34:30Z |
| suse-su-2026:0314-1 | Security update for python311 | 2026-01-28T13:28:48Z | 2026-01-28T13:28:48Z |
| suse-su-2026:20202-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-01-28T10:27:58Z | 2026-01-28T10:27:58Z |
| suse-su-2026:20171-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-01-28T10:27:58Z | 2026-01-28T10:27:58Z |
| suse-su-2026:0313-1 | Security update for gimp | 2026-01-28T10:13:29Z | 2026-01-28T10:13:29Z |
| suse-su-2026:20184-1 | Security update for python-FontTools | 2026-01-28T09:56:55Z | 2026-01-28T09:56:55Z |
| suse-su-2026:0312-1 | Security update for openssl-3 | 2026-01-28T09:37:56Z | 2026-01-28T09:37:56Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:9404 | Moderate: libgcrypt security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:20Z |
| alsa-2024:9401 | Moderate: microcode_ctl security update | 2024-11-12T00:00:00Z | 2024-11-18T11:46:59Z |
| alsa-2024:9371 | Moderate: python3.9 security update | 2024-11-12T00:00:00Z | 2024-11-18T14:10:04Z |
| alsa-2024:9333 | Low: openssl security update | 2024-11-12T00:00:00Z | 2024-11-20T06:02:13Z |
| alsa-2024:9331 | Moderate: krb5 security update | 2024-11-12T00:00:00Z | 2024-11-18T14:12:56Z |
| alsa-2024:9325 | Low: cockpit security update | 2024-11-12T00:00:00Z | 2024-11-18T11:53:47Z |
| alsa-2024:9317 | Low: NetworkManager security update | 2024-11-12T00:00:00Z | 2024-11-18T11:55:17Z |
| alsa-2024:9306 | Moderate: httpd security update | 2024-11-12T00:00:00Z | 2024-11-18T11:55:18Z |
| alsa-2024:9281 | Moderate: python-jwcrypto security update | 2024-11-12T00:00:00Z | 2024-11-18T11:48:49Z |
| alsa-2024:9277 | Moderate: oci-seccomp-bpf-hook security update | 2024-11-12T00:00:00Z | 2024-11-18T11:46:57Z |
| alsa-2024:9243 | Moderate: postfix security update | 2024-11-12T00:00:00Z | 2024-11-18T11:52:52Z |
| alsa-2024:9200 | Moderate: runc security update | 2024-11-12T00:00:00Z | 2024-11-18T11:46:57Z |
| alsa-2024:9195 | Moderate: cyrus-imapd security update | 2024-11-12T00:00:00Z | 2024-11-18T11:49:43Z |
| alsa-2024:9194 | Moderate: python3.11-PyMySQL security update | 2024-11-12T00:00:00Z | 2024-11-18T11:52:13Z |
| alsa-2024:9193 | Moderate: python3.12-PyMySQL security update | 2024-11-12T00:00:00Z | 2024-11-18T11:52:12Z |
| alsa-2024:9192 | Moderate: python3.11 security update | 2024-11-12T00:00:00Z | 2024-11-18T18:11:50Z |
| alsa-2024:9190 | Moderate: python3.12 security update | 2024-11-12T00:00:00Z | 2024-11-18T18:13:18Z |
| alsa-2024:9188 | Low: bpftrace security update | 2024-11-12T00:00:00Z | 2024-11-18T11:46:56Z |
| alsa-2024:9187 | Low: bcc security update | 2024-11-12T00:00:00Z | 2024-11-18T11:51:30Z |
| alsa-2024:9185 | Moderate: iperf3 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:13Z |
| alsa-2024:9184 | Moderate: gtk3 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:50:42Z |
| alsa-2024:9181 | Moderate: jose security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:46Z |
| alsa-2024:9180 | Moderate: mod_auth_openidc security update | 2024-11-12T00:00:00Z | 2024-11-18T11:46:55Z |
| alsa-2024:9167 | Moderate: poppler security update | 2024-11-12T00:00:00Z | 2024-11-18T11:53:58Z |
| alsa-2024:9158 | Moderate: lldpd security update | 2024-11-12T00:00:00Z | 2024-11-18T11:48:33Z |
| alsa-2024:9150 | Moderate: python-jinja2 security update | 2024-11-12T00:00:00Z | 2024-11-18T11:48:33Z |
| alsa-2024:9144 | Important: webkit2gtk3 security update | 2024-11-12T00:00:00Z | 2024-11-19T06:23:59Z |
| alsa-2024:9136 | Moderate: qemu-kvm security update | 2024-11-12T00:00:00Z | 2024-11-18T11:55:36Z |
| alsa-2024:9135 | Moderate: toolbox security update | 2024-11-12T00:00:00Z | 2024-11-18T11:47:10Z |
| alsa-2024:9128 | Moderate: libvirt security update | 2024-11-12T00:00:00Z | 2024-11-18T11:56:39Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-795 | UNKNOWN READ in pcl::PLYReader::read | 2022-08-28T00:00:11.408403Z | 2025-09-26T14:12:06.751834Z |
| osv-2022-794 | Heap-buffer-overflow in std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<ch | 2022-08-27T00:02:10.619878Z | 2022-08-27T00:02:10.620143Z |
| osv-2022-791 | Security exception in java.base/java.util.Arrays.copyOf | 2022-08-27T00:00:53.774660Z | 2022-09-01T00:16:14.955289Z |
| osv-2022-785 | Heap-buffer-overflow in resize_packet | 2022-08-27T00:00:14.614126Z | 2025-07-01T14:25:29.517657Z |
| osv-2022-784 | Segv on unknown address in FreeCodePages | 2022-08-26T00:01:54.152651Z | 2025-12-20T14:16:22.419962Z |
| osv-2022-782 | Security exception in java.base/java.lang.StringBuffer.append | 2022-08-26T00:00:56.058441Z | 2022-08-26T00:00:56.058701Z |
| osv-2022-781 | Segv on unknown address in wasmtime_runtime::traphandlers::catch_traps::call_closure::hec711b3339636b04 | 2022-08-26T00:00:47.981814Z | 2022-08-26T00:00:47.982073Z |
| osv-2022-776 | Heap-buffer-overflow in do_job | 2022-08-24T00:00:48.440951Z | 2026-03-28T14:13:55.545096Z |
| osv-2022-774 | Segv on unknown address in cranelift_filetests::function_runner::CompiledFunction::call::ha6b9162cd2eNUMBER | 2022-08-24T00:00:24.235770Z | 2022-08-24T00:00:24.236021Z |
| osv-2022-773 | Heap-double-free in sc_pkcs15_encode_df | 2022-08-24T00:00:17.518353Z | 2022-08-24T00:00:17.518621Z |
| osv-2022-772 | Heap-use-after-free in pdfi_cidtype2_get_glyph_index | 2022-08-24T00:00:16.335034Z | 2022-08-24T00:00:16.335380Z |
| osv-2022-770 | Stack-buffer-overflow in get_transaction | 2022-08-22T00:01:37.084046Z | 2022-08-22T00:01:37.084285Z |
| osv-2022-768 | Security exception in org.apache.commons.jxpath.ri.axes.UnionContext.setPosition | 2022-08-22T00:00:44.994128Z | 2022-08-22T00:00:44.994365Z |
| osv-2022-764 | Security exception in org.apache.commons.jxpath.ri.compiler.CoreOperation.parenthesize | 2022-08-21T00:00:44.740591Z | 2022-08-21T00:00:44.740834Z |
| osv-2022-763 | Heap-buffer-overflow in sqlite3VdbeExec | 2022-08-21T00:00:23.656015Z | 2026-02-26T14:12:24.701998Z |
| osv-2022-760 | Security exception in com.fasterxml.jackson.dataformat.toml.Parser.parseInlineTable | 2022-08-20T00:01:56.371630Z | 2023-03-09T00:21:36.500254Z |
| osv-2022-759 | Security exception in com.ctc.wstx.dtd.FullDTDReader.readContentSpec | 2022-08-20T00:01:56.255492Z | 2022-08-20T00:01:56.255739Z |
| osv-2022-757 | UNKNOWN WRITE in pdfi_free_array | 2022-08-20T00:00:59.035627Z | 2022-08-20T00:00:59.035892Z |
| osv-2022-755 | Global-buffer-overflow in chunk_obj_alloc | 2022-08-20T00:00:49.311644Z | 2022-08-20T00:00:49.311893Z |
| osv-2022-751 | Heap-buffer-overflow in gs_type2_interpret | 2022-08-20T00:00:12.956053Z | 2023-02-24T02:57:17.854976Z |
| osv-2022-750 | Heap-buffer-overflow in do_job | 2022-08-20T00:00:10.770653Z | 2022-08-20T00:00:10.770920Z |
| osv-2022-749 | Security exception in com.ctc.wstx.dtd.FullDTDReader.readContentSpec | 2022-08-20T00:00:08.690762Z | 2022-08-20T00:00:08.691032Z |
| osv-2022-744 | Stack-buffer-overflow in gs_glyph_data_from_bytes | 2022-08-19T00:00:54.177954Z | 2022-08-19T00:00:54.178402Z |
| osv-2022-743 | Security exception in org.apache.commons.jxpath.ri.parser.XPathParser.MultiplicativeExpr | 2022-08-19T00:00:54.027907Z | 2022-08-19T00:00:54.028172Z |
| osv-2022-738 | Security exception in DatatypeFuzzer.fuzzerTestOneInput | 2022-08-19T00:00:35.294543Z | 2025-01-10T04:55:45.450144Z |
| osv-2022-736 | Heap-buffer-overflow in copy_glyph_data | 2022-08-19T00:00:25.579648Z | 2022-08-19T00:00:25.579898Z |
| osv-2022-733 | Security exception in jaz.Zer.<clinit> | 2022-08-19T00:00:14.579733Z | 2022-08-19T00:00:14.579980Z |
| osv-2022-729 | Security exception in org.apache.commons.jxpath.ri.compiler.CoreOperationMultiply.computeValue | 2022-08-19T00:00:10.461426Z | 2022-08-19T00:00:10.461689Z |
| osv-2022-727 | Heap-buffer-overflow in s_file_write_flush | 2022-08-19T00:00:07.550998Z | 2022-08-19T00:00:07.551246Z |
| osv-2022-726 | Heap-use-after-free in gx_device_forward_finalize | 2022-08-18T00:02:06.680237Z | 2022-08-18T00:02:06.680485Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-moodle-2024-43427 | Moodle: admin presets export tool includes some secrets that should not be exported | 2025-05-02T06:18:45.967Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43425 | Moodle: remote code execution via calculated question types | 2025-05-02T06:18:44.557Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-34005 | moodle: authenticated LFI risk in some misconfigured shared hosting environments via modified mod_data backup | 2025-05-02T06:18:37.889Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-34004 | moodle: authenticated LFI risk in some misconfigured shared hosting environments via modified mod_wiki backup | 2025-05-02T06:18:36.041Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-34003 | moodle: authenticated LFI risk in some misconfigured shared hosting environments via modified mod_workshop backup | 2025-05-02T06:18:33.951Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-34002 | moodle: authenticated LFI risk in some misconfigured shared hosting environments via modified mod_feedback backup | 2025-05-02T06:18:31.695Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-29374 | 2025-05-02T06:18:29.552Z | 2025-08-20T09:06:12.327Z | |
| bit-moodle-2024-28593 | 2025-05-02T06:18:27.353Z | 2025-05-02T06:34:40.019Z | |
| bit-drupal-2025-31674 | Drupal core - Moderately critical - Gadget Chain - SA-CORE-2025-003 | 2025-05-02T05:46:04.051Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-38275 | moodle: HTTP authorization header is preserved between "emulated redirects" | 2025-05-01T05:57:26.688Z | 2025-05-20T10:02:07.006Z |
| bit-tomcat-2025-31650 | Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame | 2025-04-30T05:56:04.703Z | 2026-03-20T09:47:33.381Z |
| bit-gitlab-2025-1908 | Business Logic Errors in GitLab | 2025-04-26T06:31:29.850Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2025-0639 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-04-26T06:31:15.748Z | 2025-08-11T00:06:06.142Z |
| bit-gitlab-2024-12244 | Missing Authorization in GitLab | 2025-04-26T06:28:03.620Z | 2025-05-20T10:02:07.006Z |
| bit-valkey-2025-21605 | Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client | 2025-04-25T07:27:01.789Z | 2026-02-11T09:09:18.507Z |
| bit-redis-2025-21605 | Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client | 2025-04-25T07:24:43.793Z | 2026-02-11T09:09:18.507Z |
| bit-grafana-2025-2703 | 2025-04-25T07:14:58.193Z | 2025-06-11T06:16:36.747Z | |
| bit-keydb-2025-21605 | Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client | 2025-04-25T07:14:30.296Z | 2026-02-11T09:09:18.507Z |
| bit-moodle-2024-43439 | Moodle: reflected xss via h5p error message | 2025-04-24T07:29:07.150Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43437 | Moodle: xss risk when restoring malicious course backup file | 2025-04-24T07:29:05.528Z | 2025-05-20T10:02:07.006Z |
| bit-phpmyadmin-2025-24530 | 2025-04-24T07:21:48.097Z | 2025-11-06T13:25:46.476Z | |
| bit-phpmyadmin-2025-24529 | 2025-04-24T07:21:41.489Z | 2025-11-06T13:25:46.476Z | |
| bit-cilium-2025-32793 | Cilium packets from terminating endpoints may not be encrypted in Wireguard-enabled clusters | 2025-04-23T08:52:41.427Z | 2025-05-20T10:02:07.006Z |
| bit-pytorch-2025-32434 | PyTorch: `torch.load` with `weights_only=True` leads to remote code execution | 2025-04-22T07:19:45.992Z | 2025-12-01T21:08:19.180Z |
| bit-ghost-2024-34448 | 2025-04-19T07:10:27.999Z | 2025-04-19T07:44:40.595Z | |
| bit-pgbouncer-2025-2291 | PgBouncer default auth_query does not take Postgres password expiry into account | 2025-04-18T19:19:16.416Z | 2025-12-09T12:08:00.393Z |
| bit-nats-2025-30215 | NATS-Server Fails to Authorize Certain Jetstream Admin APIs | 2025-04-18T19:17:14.515Z | 2025-05-20T10:02:07.006Z |
| bit-sqlite-2025-3277 | 2025-04-16T07:42:43.650Z | 2025-04-16T08:06:52.943Z | |
| bit-sqlite-2025-29088 | 2025-04-16T07:42:31.752Z | 2025-10-01T15:14:38.852Z | |
| bit-pytorch-2025-2953 | PyTorch torch.mkldnn_max_pool2d denial of service | 2025-04-16T07:31:10.049Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0199 | Vulnérabilité dans les produits Apple | 2025-03-12T00:00:00.000000 | 2025-03-12T00:00:00.000000 |
| certfr-2025-avi-0198 | Multiples vulnérabilités dans les produits Ivanti | 2025-03-12T00:00:00.000000 | 2025-03-12T00:00:00.000000 |
| certfr-2025-avi-0197 | Multiples vulnérabilités dans les produits Fortinet | 2025-03-12T00:00:00.000000 | 2025-03-12T00:00:00.000000 |
| certfr-2025-avi-0196 | Multiples vulnérabilités dans les produits Microsoft | 2025-03-12T00:00:00.000000 | 2025-03-12T00:00:00.000000 |
| certfr-2025-avi-0195 | Multiples vulnérabilités dans Microsoft Azure | 2025-03-12T00:00:00.000000 | 2025-03-12T00:00:00.000000 |
| certfr-2025-avi-0194 | Vulnérabilité dans Microsoft .Net | 2025-03-12T00:00:00.000000 | 2025-03-12T00:00:00.000000 |
| certfr-2025-avi-0193 | Multiples vulnérabilités dans Microsoft Windows | 2025-03-12T00:00:00.000000 | 2025-03-12T00:00:00.000000 |
| certfr-2025-avi-0192 | Multiples vulnérabilités dans Microsoft Office | 2025-03-12T00:00:00.000000 | 2025-03-12T00:00:00.000000 |
| certfr-2025-avi-0191 | Multiples vulnérabilités dans les produits Siemens | 2025-03-11T00:00:00.000000 | 2025-03-11T00:00:00.000000 |
| certfr-2025-avi-0190 | Multiples vulnérabilités dans les produits SAP | 2025-03-11T00:00:00.000000 | 2025-03-11T00:00:00.000000 |
| certfr-2025-avi-0189 | Multiples vulnérabilités dans Google Chrome | 2025-03-11T00:00:00.000000 | 2025-03-11T00:00:00.000000 |
| certfr-2025-avi-0188 | Multiples vulnérabilités dans les produits Qnap | 2025-03-10T00:00:00.000000 | 2025-03-10T00:00:00.000000 |
| certfr-2025-avi-0187 | Multiples vulnérabilités dans Microsoft Edge | 2025-03-10T00:00:00.000000 | 2025-03-10T00:00:00.000000 |
| certfr-2025-avi-0186 | Multiples vulnérabilités dans les produits IBM | 2025-03-07T00:00:00.000000 | 2025-03-07T00:00:00.000000 |
| certfr-2025-avi-0185 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-03-07T00:00:00.000000 | 2025-03-07T00:00:00.000000 |
| certfr-2025-avi-0184 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-03-07T00:00:00.000000 | 2025-03-07T00:00:00.000000 |
| certfr-2025-avi-0183 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-03-07T00:00:00.000000 | 2025-03-07T00:00:00.000000 |
| certfr-2025-avi-0182 | Vulnérabilité dans Nagios XI | 2025-03-07T00:00:00.000000 | 2025-03-07T00:00:00.000000 |
| certfr-2025-avi-0181 | Vulnérabilité dans les produits Moxa | 2025-03-06T00:00:00.000000 | 2025-03-06T00:00:00.000000 |
| certfr-2025-avi-0180 | Vulnérabilité dans Cisco Secure Client | 2025-03-06T00:00:00.000000 | 2025-03-06T00:00:00.000000 |
| certfr-2025-avi-0179 | Vulnérabilité dans Symantec Carbon Black Cloud | 2025-03-06T00:00:00.000000 | 2025-03-06T00:00:00.000000 |
| certfr-2025-avi-0178 | Vulnérabilité dans Elastic Kibana | 2025-03-05T00:00:00.000000 | 2025-03-07T00:00:00.000000 |
| certfr-2025-avi-0177 | Multiples vulnérabilités dans les produits VMware | 2025-03-05T00:00:00.000000 | 2025-03-05T00:00:00.000000 |
| certfr-2025-avi-0176 | Multiples vulnérabilités dans les produits Mozilla | 2025-03-05T00:00:00.000000 | 2025-03-05T00:00:00.000000 |
| certfr-2025-avi-0175 | Vulnérabilité dans LibreOffice | 2025-03-05T00:00:00.000000 | 2025-03-05T00:00:00.000000 |
| certfr-2025-avi-0174 | Multiples vulnérabilités dans Google Chrome | 2025-03-05T00:00:00.000000 | 2025-03-05T00:00:00.000000 |
| certfr-2025-avi-0173 | Multiples vulnérabilités dans Google Pixel | 2025-03-05T00:00:00.000000 | 2025-03-05T00:00:00.000000 |
| certfr-2025-avi-0172 | Multiples vulnérabilités dans Google Android | 2025-03-04T00:00:00.000000 | 2025-03-04T00:00:00.000000 |
| certfr-2025-avi-0171 | Vulnérabilité dans Python | 2025-03-03T00:00:00.000000 | 2025-03-03T00:00:00.000000 |
| certfr-2025-avi-0170 | Multiples vulnérabilités dans les produits IBM | 2025-02-28T00:00:00.000000 | 2025-02-28T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2017-000219 | Multiple Fuji Xerox products may insecurely load Dynamic Link Libraries | 2017-08-31T16:35+09:00 | 2021-04-12T13:30+09:00 |
| jvndb-2017-000211 | Installer of "Remote Support Tool (Enkaku Support Tool)" may insecurely load Dynamic Link Libraries | 2017-08-30T15:10+09:00 | 2017-08-30T15:10+09:00 |
| jvndb-2017-006466 | Denial-of-service (DoS) Vulnerability in HiRDB | 2017-08-28T13:46+09:00 | 2017-09-05T10:46+09:00 |
| jvndb-2017-000214 | Installer of "Flets Install Tool" may insecurely load Dynamic Link Libraries | 2017-08-25T15:02+09:00 | 2018-02-28T14:07+09:00 |
| jvndb-2017-000212 | Installer of "Flets Azukeru for Windows Auto Backup Tool" may insecurely load Dynamic Link Libraries | 2017-08-25T15:02+09:00 | 2018-02-28T14:07+09:00 |
| jvndb-2017-000216 | Installer of "Flets Setsuzoku Tool" may insecurely load Dynamic Link Libraries | 2017-08-25T14:52+09:00 | 2018-02-28T11:39+09:00 |
| jvndb-2017-000215 | Installer and self-extracting archive containing the installer of "Security Setup Tool" may insecurely load Dynamic Link Libraries | 2017-08-25T14:50+09:00 | 2018-02-28T14:28+09:00 |
| jvndb-2017-000210 | Installer of "Security Kinou Mihariban" may insecurely load Dynamic Link Libraries | 2017-08-25T14:50+09:00 | 2018-02-28T14:04+09:00 |
| jvndb-2017-000209 | Installer of Optimal Guard may insecurely load Dynamic Link Libraries | 2017-08-25T14:50+09:00 | 2018-02-28T12:23+09:00 |
| jvndb-2017-000203 | Multiple vulnerabilities in baserCMS | 2017-08-25T14:50+09:00 | 2018-02-28T11:45+09:00 |
| jvndb-2017-000208 | WordPress plugin "BackupGuard" vulnerable to cross-site scripting | 2017-08-24T14:03+09:00 | 2018-02-28T12:26+09:00 |
| jvndb-2017-000207 | Multiple vulnerabilities in SEO Panel | 2017-08-24T14:03+09:00 | 2018-02-28T12:19+09:00 |
| jvndb-2017-000206 | Multiple vulnerabilities in WebCalendar | 2017-08-24T14:03+09:00 | 2018-02-28T12:07+09:00 |
| jvndb-2017-000204 | Multiple vulnerabilities in "Dokodemo eye Smart HD" SCR02HD | 2017-08-23T15:36+09:00 | 2018-02-28T14:28+09:00 |
| jvndb-2017-000205 | The installer of the Ministry of Justice [The electronic authentication system based on the commercial registration system "The CRCA user's Software"] may insecurely load Dynamic Link Libraries | 2017-08-23T15:24+09:00 | 2018-02-28T14:04+09:00 |
| jvndb-2017-000197 | Installer of Photo Collection PC Software provided by NTT DOCOMO, INC. may insecurely load Dynamic Link Libraries and invoke executable files | 2017-08-22T12:34+09:00 | 2018-02-28T12:13+09:00 |
| jvndb-2017-000202 | Multiple vulnerabilities in Cybozu Garoon | 2017-08-21T14:30+09:00 | 2018-02-14T12:25+09:00 |
| jvndb-2017-000198 | Installer and self-extracting archive containing the installer of TDB CA TypeA use software may insecurely load Dynamic Link Libraries | 2017-08-18T13:41+09:00 | 2018-02-14T12:16+09:00 |
| jvndb-2017-000201 | Installer of Shin Kinkyuji Houkoku Data Nyuryoku Program may insecurely load Dynamic Link Libraries | 2017-08-17T17:29+09:00 | 2018-02-14T12:08+09:00 |
| jvndb-2017-000200 | Installer of Shin Sekiyu Yunyu Chousa Houkoku Data Nyuryoku Program may insecurely load Dynamic Link Libraries | 2017-08-17T17:29+09:00 | 2018-02-14T12:05+09:00 |
| jvndb-2017-000199 | Installer of Shin Kikan Toukei Houkoku Data Nyuryokuyou Program may insecurely load Dynamic Link Libraries | 2017-08-17T17:29+09:00 | 2018-02-14T12:19+09:00 |
| jvndb-2017-000154 | Teikihoukokusho Sakuseishien Tool may insecurely load Dynamic Link Libraries | 2017-08-17T15:31+09:00 | 2018-02-14T12:11+09:00 |
| jvndb-2017-000194 | WSR-300HP vulnerable to arbitrary code execution | 2017-08-08T18:07+09:00 | 2024-07-02T17:55+09:00 |
| jvndb-2017-000192 | WCR-1166DS vulnerable to OS command injection | 2017-08-08T18:06+09:00 | 2018-02-14T12:21+09:00 |
| jvndb-2017-000191 | Installer of Qua station connection tool for Windows may insecurely load Dynamic Link Libraries | 2017-08-08T15:35+09:00 | 2018-02-14T12:14+09:00 |
| jvndb-2017-000196 | Installer of IP Messenger may insecurely load Dynamic Link Libraries | 2017-08-03T14:35+09:00 | 2018-01-24T14:26+09:00 |
| jvndb-2017-000195 | Installer of Baidu IME may insecurely load Dynamic Link Libraries | 2017-08-03T12:28+09:00 | 2018-01-24T14:34+09:00 |
| jvndb-2017-000189 | Installers of Sony PaSoRi related software may insecurely load Dynamic Link Libraries | 2017-07-27T15:38+09:00 | 2018-01-24T14:14+09:00 |
| jvndb-2017-000186 | NFC Port Software remover may insecurely load Dynamic Link Libraries | 2017-07-27T15:38+09:00 | 2018-01-24T14:02+09:00 |
| jvndb-2017-000187 | Installer of LhaForge may insecurely load Dynamic Link Libraries | 2017-07-27T14:31+09:00 | 2018-01-24T13:59+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-31121 | WordPress Video Merchant跨站请求伪造漏洞 | 2025-12-16 | 2025-12-26 |
| cnvd-2025-31120 | WordPress Wp Job Portal任意文件读取漏洞 | 2025-12-16 | 2025-12-26 |
| cnvd-2025-31119 | WordPress RSS Aggregator by Feedzy代码问题漏洞 | 2025-12-16 | 2025-12-26 |
| cnvd-2025-31118 | WordPress WP CarDealer权限提升漏洞 | 2025-12-16 | 2025-12-26 |
| cnvd-2025-31117 | WordPress List category posts SQL注入漏洞 | 2025-12-16 | 2025-12-26 |
| cnvd-2025-30834 | 帆软软件有限公司FineReport、FineBI及FineDataLink存在命令注入漏洞 | 2025-12-16 | 2025-12-17 |
| cnvd-2026-14655 | Rockwell Automation FactoryTalk DataMosaix Private Cloud SQL注入漏洞 | 2025-12-15 | 2026-03-24 |
| cnvd-2026-14654 | Rockwell Automation 432ES-IG3 Series A拒绝服务漏洞 | 2025-12-15 | 2026-03-24 |
| cnvd-2026-12374 | NVIDIA NVTabular反序列化漏洞 | 2025-12-15 | 2026-03-03 |
| cnvd-2026-12373 | NVIDIA Merlin Transformers4Rec反序列化漏洞 | 2025-12-15 | 2026-03-03 |
| cnvd-2026-11778 | Adobe DNG Software Development Kit (SDK)输入验证错误漏洞 | 2025-12-15 | 2026-02-26 |
| cnvd-2026-11777 | Adobe DNG Software Development Kit (SDK)拒绝服务漏洞 | 2025-12-15 | 2026-02-26 |
| cnvd-2026-11776 | Adobe DNG Software Development Kit (SDK)堆缓冲区溢出漏洞 | 2025-12-15 | 2026-02-26 |
| cnvd-2026-11775 | Adobe DNG Software Development Kit (SDK)越界读取漏洞 | 2025-12-15 | 2026-02-26 |
| cnvd-2026-10898 | Adobe Creative Cloud Desktop Application拒绝服务漏洞(CNVD-2026-10898) | 2025-12-15 | 2026-02-10 |
| cnvd-2026-10344 | Siemens RUGGEDCOM输入验证错误漏洞 | 2025-12-15 | 2026-02-06 |
| cnvd-2026-07962 | Soda PDF Desktop目录遍历漏洞 | 2025-12-15 | 2026-01-27 |
| cnvd-2026-07961 | Soda PDF Desktop越界写入漏洞 | 2025-12-15 | 2026-01-27 |
| cnvd-2026-07566 | Siemens SINEMA Remote Connect Server安全绕过漏洞 | 2025-12-15 | 2026-01-28 |
| cnvd-2026-07565 | Siemens SINEMA Remote Connect Server存在未明漏洞(CNVD-2026-07565) | 2025-12-15 | 2026-01-28 |
| cnvd-2026-07564 | Siemens SINEC Security Monitor输入验证错误漏洞 | 2025-12-15 | 2026-01-28 |
| cnvd-2026-07563 | Siemens SINEC Security Monitor授权问题漏洞 | 2025-12-15 | 2026-01-28 |
| cnvd-2026-07562 | Siemens SIMATIC CN 4100信息泄露漏洞(CNVD-2026-07562) | 2025-12-15 | 2026-01-28 |
| cnvd-2026-07561 | Siemens SIMATIC CN 4100信息泄露漏洞 | 2025-12-15 | 2026-01-28 |
| cnvd-2026-07560 | Siemens SIMATIC CN 4100信任管理问题漏洞 | 2025-12-15 | 2026-01-28 |
| cnvd-2026-07242 | Google Chrome释放后重用漏洞 | 2025-12-15 | 2026-01-22 |
| cnvd-2026-06106 | 湖南强智科技发展有限公司教务管理系统存在SQL注入漏洞(CNVD-2026-06106 ) | 2025-12-15 | 2026-01-26 |
| cnvd-2026-04945 | Adobe ColdFusion输入验证不当漏洞(CNVD-2026-0494539) | 2025-12-15 | 2026-01-19 |
| cnvd-2026-04944 | Adobe ColdFusion XML外部实体引用限制不当漏洞(CNVD-2026-0494441) | 2025-12-15 | 2026-01-19 |
| cnvd-2026-04943 | Adobe ColdFusion XML外部实体引用限制不当漏洞(CNVD-2026-0494343) | 2025-12-15 | 2026-01-19 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-00208 | Уязвимость компонента child_process.exec npm библиотеки MCP Server, позволяющая нарушител… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00207 | Уязвимость микропрограммного обеспечения коммутационных шлюзов Zenitel ICX500 и ICX510, с… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00206 | Уязвимость микропрограммного обеспечения коммутационных шлюзов Zenitel ICX500 и ICX510, с… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00205 | Уязвимость плагинов Drag and Drop Multiple File Upload PRO и Drag and Drop Multiple File … | 09.01.2026 | 09.01.2026 |
| bdu:2026-00204 | Уязвимость плагина для управления отображением блоков Block Logic системы управления соде… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00203 | Уязвимость программного обеспечения восстановления поврежденных файлов Wondershare Repair… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00202 | Уязвимость программного обеспечения восстановления поврежденных файлов Wondershare Repair… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00201 | Уязвимость программного обеспечения для проектирования, эксплуатации и обслуживания техно… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00200 | Уязвимость лазерного датчика SICK DL100, связанная с передачей учетных данных в незашифро… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00199 | Уязвимость лазерного датчика SICK DL100, связанная с использованием обратимой односторонн… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00198 | Уязвимость лазерного датчика SICK DL100, связанная с загрузкой кода без проверки его цело… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00197 | Уязвимость компонента Fast_wireless_conf микропрограммного обеспечения маршрутизаторов UT… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00196 | Уязвимость микропрограммного обеспечения программируемых логических контроллеров Siemens … | 09.01.2026 | 09.01.2026 |
| bdu:2026-00195 | Уязвимость микропрограммного обеспечения устройств SIMATIC IPC, связанная с неправильным … | 09.01.2026 | 09.01.2026 |
| bdu:2026-00194 | Уязвимость микропрограммного обеспечения программируемых логических контроллеров SIMATIC … | 09.01.2026 | 09.01.2026 |
| bdu:2026-00193 | Уязвимость устройств релейной защиты SIPROTEC, связанная с недостаточной защитой служебны… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00192 | Уязвимость устройств релейной защиты SIPROTEC, связанная с использованием учетных данных … | 09.01.2026 | 09.01.2026 |
| bdu:2026-00191 | Уязвимость микропрограммного обеспечения программируемых логических контроллеров SIMATIC … | 09.01.2026 | 09.01.2026 |
| bdu:2026-00190 | Уязвимость устройств релейной защиты, автоматики и контроля SIPROTEC 5, связанная с раскр… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00189 | Уязвимость микропрограммного обеспечения коммуникационного шлюза SIMATIC CN 4100, связанн… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00188 | Уязвимость микропрограммного обеспечения сервера TIA Project-Server и среды разработки пр… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00187 | Уязвимость среды разработки программного обеспечения TIA Administrator связана с ошибками… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00186 | Уязвимость плагина программирования Roo Code, связанная с непринятием мер по чистке данн… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00185 | Уязвимость программного обеспечения для централизованного управления сетевой инфраструкту… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00184 | Уязвимость программного обеспечения для централизованного управления сетевой инфраструкту… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00183 | Уязвимость микропрограммного обеспечения контроллеров беспроводных сетей Ruckus Virtual S… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00182 | Уязвимость микропрограммного обеспечения контроллеров беспроводных сетей Ruckus Virtual S… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00181 | Уязвимость микропрограммного обеспечения контроллеров беспроводных сетей Ruckus Virtual S… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00180 | Уязвимость программного обеспечения для централизованного управления сетевой инфраструкту… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00179 | Уязвимость микропрограммного обеспечения контроллеров беспроводных сетей Ruckus Virtual S… | 09.01.2026 | 09.01.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202603-0162 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the sizes of… | 2026-03-07T23:59:06.737000Z |
| var-202603-0142 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulner… | 2026-03-07T23:58:17.436000Z |
| var-202208-0562 | The chinadrm module has an out-of-bounds read vulnerability. Successful exploitation of t… | 2026-03-07T23:56:34.774000Z |
| var-202603-0125 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulner… | 2026-03-07T23:54:34.526000Z |
| var-202208-0784 | The Settings application has a vulnerability of bypassing the out-of-box experience (OOBE… | 2026-03-07T23:52:47.480000Z |
| var-202603-0234 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulner… | 2026-03-07T23:52:36.711000Z |
| var-202103-0438 | Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Ve… | 2026-03-07T23:52:17.783000Z |
| var-202603-0191 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulner… | 2026-03-07T23:52:05.338000Z |
| var-202208-0507 | The recovery module has a vulnerability of bypassing the verification of an update packag… | 2026-03-07T23:49:28.589000Z |
| var-202603-0017 | A security flaw has been discovered in Tenda AC15 up to 15.13.07.13. Affected by this iss… | 2026-03-07T23:49:20.922000Z |
| var-201705-3762 | An Improper Authentication issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 … | 2026-03-07T23:48:05.304000Z |
| var-202003-1473 | TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to c… | 2026-03-07T23:48:01.799000Z |
| var-202602-2618 | TOTOLINK A3002RU_V3 V3.0.0-B20220304.1804 was discovered to contain a stack-based buffer … | 2026-03-07T23:45:02.449000Z |
| var-202603-0110 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the value of… | 2026-03-07T23:44:01.797000Z |
| var-202603-0172 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulner… | 2026-03-07T23:41:25.350000Z |
| var-202208-0488 | The Settings application has an argument injection vulnerability. Successful exploitation… | 2026-03-07T23:39:48.722000Z |
| var-202603-0161 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate `pPortMapInd… | 2026-03-07T23:39:40.758000Z |
| var-202603-0211 | An issue was discovered in goform/formSetIptv in Tenda AC15V1.0 V15.03.05.18_multi. When … | 2026-03-07T23:36:37.208000Z |
| var-202208-0888 | Vulnerability of writing data to an arbitrary address in the HW_KEYMASTER module. Success… | 2026-03-07T23:34:25.080000Z |
| var-202603-0158 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may send overly long `… | 2026-03-07T23:34:14.871000Z |
| var-202208-0445 | The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerabili… | 2026-03-07T23:29:40.981000Z |
| var-201302-0403 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-07T23:21:30.078000Z |
| var-200609-1782 | Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox … | 2026-03-07T23:17:30.881000Z |
| var-201501-0436 | The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1… | 2026-03-07T23:17:26.561000Z |
| var-201409-0366 | GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the value… | 2026-03-07T23:15:06.483000Z |
| var-201201-0169 | The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC che… | 2026-03-07T23:08:59.868000Z |
| var-201306-0247 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-07T23:02:07.816000Z |
| var-201304-0381 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-07T22:58:23.147000Z |
| var-201110-0352 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2026-03-07T22:52:14.082000Z |
| var-201304-0105 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-07T22:35:46.601000Z |