Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-23300 |
N/A
|
net: ipv6: fix panic when IPv4 route references loopba… |
Linux |
Linux |
2026-03-25T10:26:56.138Z | 2026-04-18T08:57:47.517Z |
| CVE-2026-23298 |
N/A
|
can: ucan: Fix infinite loop from zero-length messages |
Linux |
Linux |
2026-03-25T10:26:54.830Z | 2026-04-18T08:57:46.166Z |
| CVE-2026-23296 |
N/A
|
scsi: core: Fix refcount leak for tagset_refcnt |
Linux |
Linux |
2026-03-25T10:26:53.509Z | 2026-04-18T08:57:44.862Z |
| CVE-2026-23293 |
N/A
|
net: vxlan: fix nd_tbl NULL dereference when IPv6 is d… |
Linux |
Linux |
2026-03-25T10:26:51.160Z | 2026-04-18T08:57:43.516Z |
| CVE-2026-23291 |
N/A
|
nfc: pn533: properly drop the usb interface reference … |
Linux |
Linux |
2026-03-25T10:26:49.634Z | 2026-04-18T08:57:42.173Z |
| CVE-2026-23290 |
N/A
|
net: usb: pegasus: validate USB endpoints |
Linux |
Linux |
2026-03-25T10:26:48.886Z | 2026-04-18T08:57:40.813Z |
| CVE-2026-23289 |
N/A
|
IB/mthca: Add missed mthca_unmap_user_db() for mthca_c… |
Linux |
Linux |
2026-03-25T10:26:48.207Z | 2026-04-18T08:57:39.473Z |
| CVE-2026-23286 |
N/A
|
atm: lec: fix null-ptr-deref in lec_arp_clear_vccs |
Linux |
Linux |
2026-03-25T10:26:45.531Z | 2026-04-18T08:57:38.115Z |
| CVE-2026-23281 |
N/A
|
wifi: libertas: fix use-after-free in lbs_free_adapter() |
Linux |
Linux |
2026-03-25T10:26:41.844Z | 2026-04-18T08:57:36.792Z |
| CVE-2026-23279 |
N/A
|
wifi: mac80211: fix NULL pointer dereference in mesh_r… |
Linux |
Linux |
2026-03-25T10:26:39.994Z | 2026-04-18T08:57:35.221Z |
| CVE-2026-23277 |
N/A
|
net/sched: teql: fix NULL pointer dereference in iptun… |
Linux |
Linux |
2026-03-20T08:08:57.394Z | 2026-04-18T08:57:33.874Z |
| CVE-2026-23274 |
7.8 (3.1)
|
netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM ti… |
Linux |
Linux |
2026-03-20T08:08:54.918Z | 2026-04-18T08:57:32.534Z |
| CVE-2026-23270 |
7.8 (3.1)
|
net/sched: Only allow act_ct to bind to clsact/ingress… |
Linux |
Linux |
2026-03-18T17:54:43.803Z | 2026-04-18T08:57:30.870Z |
| CVE-2026-23269 |
7.1 (3.1)
|
apparmor: validate DFA start states are in bounds in u… |
Linux |
Linux |
2026-03-18T17:54:42.988Z | 2026-04-18T08:57:29.535Z |
| CVE-2026-23268 |
7.8 (3.1)
|
apparmor: fix unprivileged local user can do privilege… |
Linux |
Linux |
2026-03-18T17:54:41.974Z | 2026-04-18T08:57:28.196Z |
| CVE-2026-23253 |
7.8 (3.1)
|
media: dvb-core: fix wrong reinitialization of ringbuf… |
Linux |
Linux |
2026-03-18T17:01:44.126Z | 2026-04-18T08:57:26.705Z |
| CVE-2026-23245 |
7.8 (3.1)
|
net/sched: act_gate: snapshot parameters with RCU on replace |
Linux |
Linux |
2026-03-18T10:05:07.406Z | 2026-04-18T08:57:25.339Z |
| CVE-2026-23227 |
7.8 (3.1)
|
drm/exynos: vidi: use ctx->lock to protect struct vidi… |
Linux |
Linux |
2026-02-18T14:53:30.784Z | 2026-04-18T08:57:24.022Z |
| CVE-2026-23220 |
N/A
|
ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_o… |
Linux |
Linux |
2026-02-18T14:53:23.376Z | 2026-04-18T08:57:22.654Z |
| CVE-2026-23155 |
N/A
|
can: gs_usb: gs_usb_receive_bulk_callback(): fix error… |
Linux |
Linux |
2026-02-14T16:01:22.429Z | 2026-04-18T08:57:21.313Z |
| CVE-2026-23113 |
N/A
|
io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop |
Linux |
Linux |
2026-02-14T15:09:46.379Z | 2026-04-18T08:57:19.961Z |
| CVE-2026-23110 |
N/A
|
scsi: core: Wake up the error handler when final compl… |
Linux |
Linux |
2026-02-04T16:08:30.158Z | 2026-04-18T08:57:18.628Z |
| CVE-2026-23100 |
N/A
|
mm/hugetlb: fix hugetlb_pmd_shared() |
Linux |
Linux |
2026-02-04T16:08:22.592Z | 2026-04-18T08:57:17.289Z |
| CVE-2026-23082 |
N/A
|
can: gs_usb: gs_usb_receive_bulk_callback(): unanchor … |
Linux |
Linux |
2026-02-04T16:08:06.731Z | 2026-04-18T08:57:15.950Z |
| CVE-2026-23031 |
N/A
|
can: gs_usb: gs_usb_receive_bulk_callback(): fix URB m… |
Linux |
Linux |
2026-01-31T11:42:09.276Z | 2026-04-18T08:57:14.619Z |
| CVE-2025-71150 |
N/A
|
ksmbd: Fix refcount leak when invalid session is found… |
Linux |
Linux |
2026-01-23T14:15:16.898Z | 2026-04-18T08:57:13.286Z |
| CVE-2025-68256 |
N/A
|
staging: rtl8723bs: fix out-of-bounds read in rtw_get_… |
Linux |
Linux |
2025-12-16T14:44:58.829Z | 2026-04-18T08:57:11.909Z |
| CVE-2025-68206 |
N/A
|
netfilter: nft_ct: add seqadj extension for natted con… |
Linux |
Linux |
2025-12-16T13:48:33.763Z | 2026-04-18T08:57:10.560Z |
| CVE-2025-40323 |
N/A
|
fbcon: Set fb_display[i]->mode to NULL when the mode i… |
Linux |
Linux |
2025-12-08T00:46:50.833Z | 2026-04-18T08:57:09.204Z |
| CVE-2025-40261 |
N/A
|
nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvm… |
Linux |
Linux |
2025-12-04T16:08:21.345Z | 2026-04-18T08:57:07.832Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-23298 |
N/A
|
can: ucan: Fix infinite loop from zero-length messages |
Linux |
Linux |
2026-03-25T10:26:54.830Z | 2026-04-18T08:57:46.166Z |
| CVE-2026-23296 |
N/A
|
scsi: core: Fix refcount leak for tagset_refcnt |
Linux |
Linux |
2026-03-25T10:26:53.509Z | 2026-04-18T08:57:44.862Z |
| CVE-2026-23293 |
N/A
|
net: vxlan: fix nd_tbl NULL dereference when IPv6 is d… |
Linux |
Linux |
2026-03-25T10:26:51.160Z | 2026-04-18T08:57:43.516Z |
| CVE-2026-23291 |
N/A
|
nfc: pn533: properly drop the usb interface reference … |
Linux |
Linux |
2026-03-25T10:26:49.634Z | 2026-04-18T08:57:42.173Z |
| CVE-2026-23290 |
N/A
|
net: usb: pegasus: validate USB endpoints |
Linux |
Linux |
2026-03-25T10:26:48.886Z | 2026-04-18T08:57:40.813Z |
| CVE-2026-23289 |
N/A
|
IB/mthca: Add missed mthca_unmap_user_db() for mthca_c… |
Linux |
Linux |
2026-03-25T10:26:48.207Z | 2026-04-18T08:57:39.473Z |
| CVE-2026-23286 |
N/A
|
atm: lec: fix null-ptr-deref in lec_arp_clear_vccs |
Linux |
Linux |
2026-03-25T10:26:45.531Z | 2026-04-18T08:57:38.115Z |
| CVE-2026-23281 |
N/A
|
wifi: libertas: fix use-after-free in lbs_free_adapter() |
Linux |
Linux |
2026-03-25T10:26:41.844Z | 2026-04-18T08:57:36.792Z |
| CVE-2026-23279 |
N/A
|
wifi: mac80211: fix NULL pointer dereference in mesh_r… |
Linux |
Linux |
2026-03-25T10:26:39.994Z | 2026-04-18T08:57:35.221Z |
| CVE-2026-23277 |
N/A
|
net/sched: teql: fix NULL pointer dereference in iptun… |
Linux |
Linux |
2026-03-20T08:08:57.394Z | 2026-04-18T08:57:33.874Z |
| CVE-2026-23274 |
7.8 (3.1)
|
netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM ti… |
Linux |
Linux |
2026-03-20T08:08:54.918Z | 2026-04-18T08:57:32.534Z |
| CVE-2026-23270 |
7.8 (3.1)
|
net/sched: Only allow act_ct to bind to clsact/ingress… |
Linux |
Linux |
2026-03-18T17:54:43.803Z | 2026-04-18T08:57:30.870Z |
| CVE-2026-23269 |
7.1 (3.1)
|
apparmor: validate DFA start states are in bounds in u… |
Linux |
Linux |
2026-03-18T17:54:42.988Z | 2026-04-18T08:57:29.535Z |
| CVE-2026-23268 |
7.8 (3.1)
|
apparmor: fix unprivileged local user can do privilege… |
Linux |
Linux |
2026-03-18T17:54:41.974Z | 2026-04-18T08:57:28.196Z |
| CVE-2026-23253 |
7.8 (3.1)
|
media: dvb-core: fix wrong reinitialization of ringbuf… |
Linux |
Linux |
2026-03-18T17:01:44.126Z | 2026-04-18T08:57:26.705Z |
| CVE-2026-23245 |
7.8 (3.1)
|
net/sched: act_gate: snapshot parameters with RCU on replace |
Linux |
Linux |
2026-03-18T10:05:07.406Z | 2026-04-18T08:57:25.339Z |
| CVE-2026-23227 |
7.8 (3.1)
|
drm/exynos: vidi: use ctx->lock to protect struct vidi… |
Linux |
Linux |
2026-02-18T14:53:30.784Z | 2026-04-18T08:57:24.022Z |
| CVE-2026-23220 |
N/A
|
ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_o… |
Linux |
Linux |
2026-02-18T14:53:23.376Z | 2026-04-18T08:57:22.654Z |
| CVE-2026-23155 |
N/A
|
can: gs_usb: gs_usb_receive_bulk_callback(): fix error… |
Linux |
Linux |
2026-02-14T16:01:22.429Z | 2026-04-18T08:57:21.313Z |
| CVE-2026-23113 |
N/A
|
io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop |
Linux |
Linux |
2026-02-14T15:09:46.379Z | 2026-04-18T08:57:19.961Z |
| CVE-2026-23110 |
N/A
|
scsi: core: Wake up the error handler when final compl… |
Linux |
Linux |
2026-02-04T16:08:30.158Z | 2026-04-18T08:57:18.628Z |
| CVE-2026-23100 |
N/A
|
mm/hugetlb: fix hugetlb_pmd_shared() |
Linux |
Linux |
2026-02-04T16:08:22.592Z | 2026-04-18T08:57:17.289Z |
| CVE-2026-23082 |
N/A
|
can: gs_usb: gs_usb_receive_bulk_callback(): unanchor … |
Linux |
Linux |
2026-02-04T16:08:06.731Z | 2026-04-18T08:57:15.950Z |
| CVE-2026-23031 |
N/A
|
can: gs_usb: gs_usb_receive_bulk_callback(): fix URB m… |
Linux |
Linux |
2026-01-31T11:42:09.276Z | 2026-04-18T08:57:14.619Z |
| CVE-2025-71150 |
N/A
|
ksmbd: Fix refcount leak when invalid session is found… |
Linux |
Linux |
2026-01-23T14:15:16.898Z | 2026-04-18T08:57:13.286Z |
| CVE-2025-68256 |
N/A
|
staging: rtl8723bs: fix out-of-bounds read in rtw_get_… |
Linux |
Linux |
2025-12-16T14:44:58.829Z | 2026-04-18T08:57:11.909Z |
| CVE-2025-68206 |
N/A
|
netfilter: nft_ct: add seqadj extension for natted con… |
Linux |
Linux |
2025-12-16T13:48:33.763Z | 2026-04-18T08:57:10.560Z |
| CVE-2025-40323 |
N/A
|
fbcon: Set fb_display[i]->mode to NULL when the mode i… |
Linux |
Linux |
2025-12-08T00:46:50.833Z | 2026-04-18T08:57:09.204Z |
| CVE-2025-40261 |
N/A
|
nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvm… |
Linux |
Linux |
2025-12-04T16:08:21.345Z | 2026-04-18T08:57:07.832Z |
| CVE-2025-40103 |
N/A
|
smb: client: Fix refcount leak for cifs_sb_tlink |
Linux |
Linux |
2025-10-30T09:48:08.421Z | 2026-04-18T08:57:06.416Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-23293 | In the Linux kernel, the following vulnerability has been resolved: net: vxlan: fix nd_tbl NULL de… | 2026-03-25T11:16:24.520 | 2026-04-18T09:16:17.247 |
| fkie_cve-2026-23291 | In the Linux kernel, the following vulnerability has been resolved: nfc: pn533: properly drop the … | 2026-03-25T11:16:24.197 | 2026-04-18T09:16:17.077 |
| fkie_cve-2026-23290 | In the Linux kernel, the following vulnerability has been resolved: net: usb: pegasus: validate US… | 2026-03-25T11:16:24.043 | 2026-04-18T09:16:16.877 |
| fkie_cve-2026-23289 | In the Linux kernel, the following vulnerability has been resolved: IB/mthca: Add missed mthca_unm… | 2026-03-25T11:16:23.887 | 2026-04-18T09:16:16.707 |
| fkie_cve-2026-23286 | In the Linux kernel, the following vulnerability has been resolved: atm: lec: fix null-ptr-deref i… | 2026-03-25T11:16:23.393 | 2026-04-18T09:16:16.523 |
| fkie_cve-2026-23281 | In the Linux kernel, the following vulnerability has been resolved: wifi: libertas: fix use-after-… | 2026-03-25T11:16:22.657 | 2026-04-18T09:16:16.350 |
| fkie_cve-2026-23279 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix NULL point… | 2026-03-25T11:16:22.333 | 2026-04-18T09:16:16.163 |
| fkie_cve-2026-23277 | In the Linux kernel, the following vulnerability has been resolved: net/sched: teql: fix NULL poin… | 2026-03-20T09:16:13.533 | 2026-04-18T09:16:15.980 |
| fkie_cve-2026-23274 | In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_IDLETIMER: rejec… | 2026-03-20T09:16:13.077 | 2026-04-18T09:16:15.797 |
| fkie_cve-2026-23270 | In the Linux kernel, the following vulnerability has been resolved: net/sched: Only allow act_ct t… | 2026-03-18T18:16:26.053 | 2026-04-18T09:16:15.620 |
| fkie_cve-2026-23269 | In the Linux kernel, the following vulnerability has been resolved: apparmor: validate DFA start s… | 2026-03-18T18:16:25.907 | 2026-04-18T09:16:15.433 |
| fkie_cve-2026-23268 | In the Linux kernel, the following vulnerability has been resolved: apparmor: fix unprivileged loc… | 2026-03-18T18:16:25.753 | 2026-04-18T09:16:15.237 |
| fkie_cve-2026-23253 | In the Linux kernel, the following vulnerability has been resolved: media: dvb-core: fix wrong rei… | 2026-03-18T18:16:23.383 | 2026-04-18T09:16:15.050 |
| fkie_cve-2026-23245 | In the Linux kernel, the following vulnerability has been resolved: net/sched: act_gate: snapshot … | 2026-03-18T11:16:16.437 | 2026-04-18T09:16:14.877 |
| fkie_cve-2026-23227 | In the Linux kernel, the following vulnerability has been resolved: drm/exynos: vidi: use ctx->loc… | 2026-02-18T16:22:32.467 | 2026-04-18T09:16:14.667 |
| fkie_cve-2026-23220 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix infinite loop cause… | 2026-02-18T16:22:31.700 | 2026-04-18T09:16:14.463 |
| fkie_cve-2026-23155 | In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bu… | 2026-02-14T16:15:55.653 | 2026-04-18T09:16:14.317 |
| fkie_cve-2026-23113 | In the Linux kernel, the following vulnerability has been resolved: io_uring/io-wq: check IO_WQ_BI… | 2026-02-14T15:16:06.380 | 2026-04-18T09:16:14.100 |
| fkie_cve-2026-23110 | In the Linux kernel, the following vulnerability has been resolved: scsi: core: Wake up the error … | 2026-02-04T17:16:21.880 | 2026-04-18T09:16:13.907 |
| fkie_cve-2026-23100 | In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix hugetlb_pmd_sh… | 2026-02-04T17:16:20.880 | 2026-04-18T09:16:13.703 |
| fkie_cve-2026-23082 | In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bu… | 2026-02-04T17:16:19.060 | 2026-04-18T09:16:13.530 |
| fkie_cve-2026-23031 | In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bu… | 2026-01-31T12:16:06.413 | 2026-04-18T09:16:13.360 |
| fkie_cve-2025-71150 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix refcount leak when … | 2026-01-23T15:16:05.773 | 2026-04-18T09:16:13.153 |
| fkie_cve-2025-68256 | In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix out-of… | 2025-12-16T15:15:54.990 | 2026-04-18T09:16:12.977 |
| fkie_cve-2025-68206 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_ct: add seqadj … | 2025-12-16T14:15:53.487 | 2026-04-18T09:16:12.780 |
| fkie_cve-2025-40323 | In the Linux kernel, the following vulnerability has been resolved: fbcon: Set fb_display[i]->mode… | 2025-12-08T01:16:05.067 | 2026-04-18T09:16:12.603 |
| fkie_cve-2025-40261 | In the Linux kernel, the following vulnerability has been resolved: nvme: nvme-fc: Ensure ->ioerr_… | 2025-12-04T16:16:20.053 | 2026-04-18T09:16:12.403 |
| fkie_cve-2025-40103 | In the Linux kernel, the following vulnerability has been resolved: smb: client: Fix refcount leak… | 2025-10-30T10:15:34.693 | 2026-04-18T09:16:12.240 |
| fkie_cve-2025-40016 | In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Mark invalid … | 2025-10-20T16:15:38.387 | 2026-04-18T09:16:12.023 |
| fkie_cve-2025-39930 | In the Linux kernel, the following vulnerability has been resolved: ASoC: simple-card-utils: Don't… | 2025-04-18T07:15:44.460 | 2026-04-18T09:16:11.863 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-x52f-2whg-fhgm |
|
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix out-of… | 2025-12-16T15:30:47Z | 2026-04-18T09:30:17Z |
| ghsa-vw2r-ffc4-8xm3 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net/sched: act_gate: snapshot … | 2026-03-18T12:31:52Z | 2026-04-18T09:30:17Z |
| ghsa-v7rc-q48q-f2p3 |
|
In the Linux kernel, the following vulnerability has been resolved: can: ucan: Fix infinite loop f… | 2026-03-25T12:30:22Z | 2026-04-18T09:30:17Z |
| ghsa-v66f-jqgm-8687 |
|
In the Linux kernel, the following vulnerability has been resolved: net/sched: teql: fix NULL poin… | 2026-03-20T09:32:10Z | 2026-04-18T09:30:17Z |
| ghsa-qrjv-2grw-rfj4 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bu… | 2026-02-14T18:30:15Z | 2026-04-18T09:30:17Z |
| ghsa-m8p7-hjg2-3xqj |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bu… | 2026-02-04T18:30:43Z | 2026-04-18T09:30:17Z |
| ghsa-hg9v-crxc-wx3j |
|
In the Linux kernel, the following vulnerability has been resolved: can: ems_usb: ems_usb_read_bul… | 2026-03-25T12:30:22Z | 2026-04-18T09:30:17Z |
| ghsa-gwxh-wqjf-9572 |
|
In the Linux kernel, the following vulnerability has been resolved: IB/mthca: Add missed mthca_unm… | 2026-03-25T12:30:21Z | 2026-04-18T09:30:17Z |
| ghsa-gvm4-5v6x-vmv9 |
|
In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bu… | 2026-01-31T12:30:12Z | 2026-04-18T09:30:17Z |
| ghsa-gpw9-p95r-3mv6 |
|
In the Linux kernel, the following vulnerability has been resolved: net: usb: pegasus: validate US… | 2026-03-25T12:30:22Z | 2026-04-18T09:30:17Z |
| ghsa-g3vh-wfh4-fp76 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: drm/exynos: vidi: use ctx->loc… | 2026-02-18T18:30:40Z | 2026-04-18T09:30:17Z |
| ghsa-g352-h749-hp67 |
|
In the Linux kernel, the following vulnerability has been resolved: net: annotate data-races aroun… | 2026-03-25T12:30:22Z | 2026-04-18T09:30:17Z |
| ghsa-f429-w42v-q89c |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: libertas: fix use-after-… | 2026-03-25T12:30:21Z | 2026-04-18T09:30:17Z |
| ghsa-cq3w-r62m-5jvq |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: apparmor: validate DFA start s… | 2026-03-18T18:31:18Z | 2026-04-18T09:30:17Z |
| ghsa-ccr5-8c2w-j2f4 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: io_uring/io-wq: check IO_WQ_BI… | 2026-02-14T15:32:18Z | 2026-04-18T09:30:17Z |
| ghsa-9wwr-2jh3-482p |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix infinite loop cause… | 2026-02-18T18:30:40Z | 2026-04-18T09:30:17Z |
| ghsa-8qv8-8mpp-cc7j |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: apparmor: fix unprivileged loc… | 2026-03-18T18:31:18Z | 2026-04-18T09:30:17Z |
| ghsa-7rpf-jpp6-g4v7 |
|
In the Linux kernel, the following vulnerability has been resolved: smb: client: Don't log plainte… | 2026-03-25T12:30:22Z | 2026-04-18T09:30:17Z |
| ghsa-7p3h-gfr2-rwcv |
4.7 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: scsi: core: Wake up the error … | 2026-02-04T18:30:44Z | 2026-04-18T09:30:17Z |
| ghsa-77gg-4hmh-hwxc |
|
In the Linux kernel, the following vulnerability has been resolved: net: ipv6: fix panic when IPv4… | 2026-03-25T12:30:22Z | 2026-04-18T09:30:17Z |
| ghsa-6rj2-xg9p-3jj4 |
|
In the Linux kernel, the following vulnerability has been resolved: atm: lec: fix null-ptr-deref i… | 2026-03-25T12:30:21Z | 2026-04-18T09:30:17Z |
| ghsa-62jp-jvc3-7hh9 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net/sched: Only allow act_ct t… | 2026-03-18T18:31:18Z | 2026-04-18T09:30:17Z |
| ghsa-4rhr-9xj2-x9gx |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix hugetlb_pmd_sh… | 2026-02-04T18:30:44Z | 2026-04-18T09:30:17Z |
| ghsa-4mrh-9qq5-26w5 |
|
In the Linux kernel, the following vulnerability has been resolved: net: vxlan: fix nd_tbl NULL de… | 2026-03-25T12:30:22Z | 2026-04-18T09:30:17Z |
| ghsa-3qgv-qj84-5mmh |
|
In the Linux kernel, the following vulnerability has been resolved: ipv6: fix NULL pointer deref i… | 2026-03-25T12:30:22Z | 2026-04-18T09:30:17Z |
| ghsa-3m5v-fjjv-99m5 |
|
In the Linux kernel, the following vulnerability has been resolved: nfc: pn533: properly drop the … | 2026-03-25T12:30:22Z | 2026-04-18T09:30:17Z |
| ghsa-3cwp-73f3-j7w3 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_IDLETIMER: rejec… | 2026-03-20T09:32:10Z | 2026-04-18T09:30:17Z |
| ghsa-3969-jvq7-cjf4 |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix NULL point… | 2026-03-25T12:30:21Z | 2026-04-18T09:30:17Z |
| ghsa-2m3p-78c9-6w3j |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: media: dvb-core: fix wrong rei… | 2026-03-18T18:31:17Z | 2026-04-18T09:30:17Z |
| ghsa-wp8q-76mh-g25x |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: driver: iio: add missing check… | 2024-09-18T09:30:35Z | 2026-04-18T09:30:16Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2025-15 |
5.3 (3.1)
|
Flask-AppBuilder is an application development framework. Prior to 4.5.3, Flask-AppBuilde… | flask-appbuilder | 2025-03-03T16:15:41+00:00 | 2025-04-09T17:27:25.227116+00:00 |
| pysec-2025-14 |
|
An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normal… | django | 2025-04-02T13:15:44+00:00 | 2025-04-09T17:27:25.169049+00:00 |
| pysec-2025-13 |
|
An issue was discovered in Django 5.1 before 5.1.7, 5.0 before 5.0.13, and 4.2 before 4.2… | django | 2025-03-06T19:15:27+00:00 | 2025-04-09T17:27:25.095679+00:00 |
| pysec-2022-43178 |
7.5 (3.1)
|
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the cleo … | cleo | 2022-11-09T20:15:10+00:00 | 2025-04-09T17:27:24.793038+00:00 |
| pysec-2022-43177 |
9.8 (3.1)
|
Azure CLI is the command-line interface for Microsoft Azure. In versions previous to 2.40… | azure-cli | 2022-10-25T17:15:56+00:00 | 2025-04-09T17:27:24.642962+00:00 |
| pysec-2024-244 |
7.5 (3.1)
|
A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a by… | mlflow | 2024-05-16T09:15:14+00:00 | 2025-04-08T10:23:25.092581+00:00 |
| pysec-2024-243 |
9.3 (3.1)
|
mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs… | mlflow | 2024-04-16T00:15:12+00:00 | 2025-04-08T10:23:25.044416+00:00 |
| pysec-2024-242 |
7.5 (3.1)
|
A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically … | mlflow | 2024-06-06T19:15:55+00:00 | 2025-04-08T10:23:24.995743+00:00 |
| pysec-2024-241 |
9.6 (3.1)
|
Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untru… | mlflow | 2024-02-23T22:15:55+00:00 | 2025-04-08T10:23:24.946136+00:00 |
| pysec-2024-240 |
9.6 (3.1)
|
Insufficient sanitization in MLflow leads to XSS when running an untrusted recipe. This … | mlflow | 2024-02-23T22:15:55+00:00 | 2025-04-08T10:23:24.900947+00:00 |
| pysec-2024-239 |
8.8 (3.1)
|
A vulnerability in mlflow/mlflow version 8.2.1 allows for remote code execution due to im… | mlflow | 2024-06-06T19:15:51+00:00 | 2025-04-08T10:23:24.852109+00:00 |
| pysec-2025-12 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2025-01-21T15:15:13+00:00 | 2025-04-08T10:23:23.899726+00:00 |
| pysec-2024-238 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-11-06T15:15:11+00:00 | 2025-04-08T10:23:23.857960+00:00 |
| pysec-2025-11 |
5.9 (3.1)
|
A vulnerability in the `KnowledgeBaseWebReader` class of the run-llama/llama_index reposi… | llama-index | 2025-03-20T10:15:31+00:00 | 2025-04-01T23:22:47.294256+00:00 |
| pysec-2025-10 |
9.1 (3.1)
|
A vulnerability in the `download_model` function of the onnx/onnx framework, before and i… | onnx | 2025-03-20T10:15:37+00:00 | 2025-03-26T19:21:38.843396+00:00 |
| pysec-2025-9 |
|
A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through… | invokeai | 2025-03-20T10:15:26+00:00 | 2025-03-20T11:21:37.872971+00:00 |
| pysec-2025-8 |
|
The `pygments-style-solarized` project was removed from PyPI by its owner on 2021-08-26. … | pygments-style-solarized | 2025-03-17T16:35:37+00:00 | |
| pysec-2024-237 |
9.4 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-05-14T16:17:12+00:00 | 2025-03-05T17:22:29.121263+00:00 |
| pysec-2024-236 |
6.1 (3.1)
|
Jupyter Server Proxy allows users to run arbitrary external processes alongside their not… | jupyter-server-proxy | 2024-06-11T22:15:09+00:00 | 2025-02-26T23:22:41.524251+00:00 |
| pysec-2025-7 |
|
Published in 2021, the imblog package is a Python library that scrapes data from a blog p… | imblog | 2025-02-26T21:19:19+00:00 | |
| pysec-2025-6 |
|
Published in 2021, the colabrun package is a Python library that exfiltrates user cookies… | colabrun | 2025-02-26T20:59:48+00:00 | |
| pysec-2025-5 |
|
Published in 2020, the autodzee package is a Python library that bypasses Deezer API rest… | browsercmdhbt2 | 2025-02-26T20:57:11+00:00 | |
| pysec-2025-3 |
|
Published in 2019, the autodzee package is a Python library that bypasses Deezer API rest… | autodzee | 2025-02-26T20:54:20+00:00 | |
| pysec-2025-4 |
|
Published in 2019, the automslc package is a Python library that bypasses Deezer API rest… | automslc | 2025-02-26T19:26:49+00:00 | |
| pysec-2024-235 |
8.1 (3.1)
|
With the following crawler configuration: ```python from bs4 import BeautifulSoup as Sou… | langchain-exa | 2024-02-26T16:27:49+00:00 | 2025-02-26T02:48:56.937312+00:00 |
| pysec-2023-194 |
9.8 (3.1)
|
langchain_experimental 0.0.14 allows an attacker to bypass the CVE-2023-36258 fix and exe… | langchain-experimental | 2023-10-09T20:15:00Z | 2025-02-23T07:46:11Z |
| pysec-2024-234 |
9.8 (3.1)
|
Jupyter Server Proxy allows users to run arbitrary external processes alongside their Jup… | jupyter-server-proxy | 2024-03-20T20:15:08+00:00 | 2025-02-21T18:23:35.992501+00:00 |
| pysec-2023-163 |
9.8 (3.1)
|
An issue in LanChain-ai Langchain v.0.0.245 allows a remote attacker to execute arbitrary… | numexpr | 2023-09-01T16:15:00Z | 2025-02-20T09:11:38.521949Z |
| pysec-2024-233 |
|
python-jose through 3.3.0 allows attackers to cause a denial of service (resource consump… | python-jose | 2024-04-26T00:15:09+00:00 | 2025-02-18T19:20:15.511369+00:00 |
| pysec-2024-232 |
|
python-jose through 3.3.0 has algorithm confusion with OpenSSH ECDSA keys and other key f… | python-jose | 2024-04-26T00:15:09+00:00 | 2025-02-18T19:20:15.468012+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33822 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.561810Z |
| gsd-2024-33773 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.560326Z |
| gsd-2024-33769 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.558897Z |
| gsd-2024-33794 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.557396Z |
| gsd-2024-33818 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.556720Z |
| gsd-2024-33793 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.552273Z |
| gsd-2024-33833 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.551960Z |
| gsd-2024-33835 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.550838Z |
| gsd-2024-33744 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.543395Z |
| gsd-2024-33789 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.534336Z |
| gsd-2024-33760 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.533361Z |
| gsd-2024-33702 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.530768Z |
| gsd-2024-33797 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.530297Z |
| gsd-2024-33684 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.529859Z |
| gsd-2024-33827 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.528643Z |
| gsd-2024-33810 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.527741Z |
| gsd-2024-33729 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.527542Z |
| gsd-2024-33807 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.526483Z |
| gsd-2024-33688 | Cross-Site Request Forgery (CSRF) vulnerability in Extend Themes Teluro.This issue affect… | 2024-04-27T05:02:18.524420Z |
| gsd-2024-33685 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.523707Z |
| gsd-2024-33713 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.522989Z |
| gsd-2024-33768 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.521409Z |
| gsd-2024-33720 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.519711Z |
| gsd-2024-33809 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.516352Z |
| gsd-2024-33727 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.514916Z |
| gsd-2024-33770 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.514460Z |
| gsd-2024-33732 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.513959Z |
| gsd-2024-33829 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.511177Z |
| gsd-2024-33714 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.510684Z |
| gsd-2024-33693 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-27T05:02:18.509326Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-5051 | Malicious code in react-expiry-date (npm) | 2025-06-13T01:31:54Z | 2026-04-16T15:42:10Z |
| mal-2025-34723 | Malicious code in terminalcolor256 (npm) | 2025-08-14T18:52:04Z | 2026-04-16T15:42:10Z |
| mal-2025-2895 | Malicious code in shopmacher-mollie-application (npm) | 2025-03-28T12:58:40Z | 2026-04-16T15:42:10Z |
| mal-2024-9888 | Malicious code in typescript-operations (npm) | 2024-10-16T13:26:54Z | 2026-04-16T15:42:10Z |
| mal-2026-2652 | Malicious code in onewin-landing (npm) | 2026-04-14T11:47:12Z | 2026-04-16T15:42:09Z |
| mal-2026-2651 | Malicious code in one-translations (npm) | 2026-04-14T11:47:11Z | 2026-04-16T15:42:09Z |
| mal-2026-2650 | Malicious code in one-sdui (npm) | 2026-04-14T11:47:12Z | 2026-04-16T15:42:09Z |
| mal-2026-2649 | Malicious code in okxglobal (npm) | 2026-04-14T11:47:13Z | 2026-04-16T15:42:09Z |
| mal-2026-2648 | Malicious code in okx-nav (npm) | 2026-04-14T11:47:13Z | 2026-04-16T15:42:09Z |
| mal-2026-2647 | Malicious code in okx-data (npm) | 2026-04-14T11:47:13Z | 2026-04-16T15:42:09Z |
| mal-2026-2646 | Malicious code in okfe-serverless-conf (npm) | 2026-04-14T11:47:13Z | 2026-04-16T15:42:09Z |
| mal-2026-2645 | Malicious code in okassistant (npm) | 2026-04-14T11:47:13Z | 2026-04-16T15:42:09Z |
| mal-2026-2643 | Malicious code in ms-affiliate-links (npm) | 2026-04-14T11:47:12Z | 2026-04-16T15:42:09Z |
| mal-2026-2606 | Malicious code in mdb-react-sortable (npm) | 2026-04-13T15:25:19Z | 2026-04-16T15:42:09Z |
| mal-2026-2237 | Malicious code in jsonify-builder (npm) | 2026-03-26T14:45:36Z | 2026-04-16T15:42:09Z |
| mal-2026-2226 | Malicious code in node-coremesh (npm) | 2026-03-26T00:42:51Z | 2026-04-16T15:42:09Z |
| mal-2026-2225 | Malicious code in neanderthal-validator (npm) | 2026-03-26T00:52:19Z | 2026-04-16T15:42:09Z |
| mal-2026-2200 | Malicious code in json-lucide (npm) | 2026-03-25T16:45:38Z | 2026-04-16T15:42:09Z |
| mal-2026-2188 | Malicious code in levex-refa (npm) | 2026-03-25T11:59:23Z | 2026-04-16T15:42:09Z |
| mal-2026-2161 | Malicious code in path-external (npm) | 2026-03-25T01:50:59Z | 2026-04-16T15:42:09Z |
| mal-2026-2155 | Malicious code in pino-pretty-log (npm) | 2026-03-25T00:36:47Z | 2026-04-16T15:42:09Z |
| mal-2026-1978 | Malicious code in json-specular (npm) | 2026-03-20T04:53:15Z | 2026-04-16T15:42:09Z |
| mal-2026-1977 | Malicious code in json-bundling (npm) | 2026-03-20T04:53:15Z | 2026-04-16T15:42:09Z |
| mal-2026-1962 | Malicious code in parsejson-pro (npm) | 2026-03-20T04:41:13Z | 2026-04-16T15:42:09Z |
| mal-2026-1960 | Malicious code in nodex-db (npm) | 2026-03-20T04:40:18Z | 2026-04-16T15:42:09Z |
| mal-2026-1959 | Malicious code in node-business (npm) | 2026-03-20T04:40:18Z | 2026-04-16T15:42:09Z |
| mal-2026-1935 | Malicious code in jsonify-bundler (npm) | 2026-03-20T01:29:54Z | 2026-04-16T15:42:09Z |
| mal-2026-1925 | Malicious code in jsonify-parser (npm) | 2026-03-19T15:13:48Z | 2026-04-16T15:42:09Z |
| mal-2026-1816 | Malicious code in pkgnewfefame1 (npm) | 2026-03-18T13:03:54Z | 2026-04-16T15:42:09Z |
| mal-2026-1493 | Malicious code in pino-logger-utils (npm) | 2026-03-17T04:46:23Z | 2026-04-16T15:42:09Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0825 | strongSwan: Schwachstelle ermöglicht Denial of Service | 2026-03-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0782 | WebKitGTK: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0761 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Denial of Service | 2026-03-17T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0756 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Privilegieneskalation und Offenlegung von Informationen | 2026-03-16T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0744 | ImageMagick: Schwachstelle ermöglicht Denial of Service | 2026-03-16T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0688 | cPanel cPanel/WHM: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0643 | ImageMagick: Mehrere Schwachstellen | 2026-03-09T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0494 | Red Hat Enterprise Linux (389-ds-base): Schwachstelle ermöglicht Codeausführung und potenziell Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0484 | ImageMagick: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0479 | Red Hat OpenShift Service Mesh (Kiali): Schwachstelle ermöglicht Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0462 | Linux Kernel: Mehrere Schwachstellen | 2026-02-18T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0405 | Grafana: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0362 | Red Hat Enterprise Linux (Lodash): Schwachstelle ermöglicht Denial of Service | 2026-02-10T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0345 | Golang Go: Mehrere Schwachstellen | 2026-02-08T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0327 | Asterisk: Mehrere Schwachstellen | 2026-02-05T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0326 | Red Hat Self-service automation portal for Ansible Automation Platform: Schwachstelle ermöglicht Manipulation von Dateien | 2026-02-05T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0306 | Red Hat Enterprise Linux (pyasn1): Schwachstelle ermöglicht Denial of Service | 2026-02-04T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0269 | SaltStack Salt: Mehrere Schwachstellen | 2026-02-01T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0199 | Red Hat OpenShift Pipelines Operator (Fulcio): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0195 | Red Hat Enterprise Linux (pcs / tornado): Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0148 | ImageMagick: Mehrere Schwachstellen | 2026-01-19T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0129 | Golang Go: Mehrere Schwachstellen | 2026-01-15T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0119 | Linux Kernel: Mehrere Schwachstellen | 2026-01-14T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0114 | Red Hat OpenShift (github.com/sirupsen/logrus): Schwachstelle ermöglicht Denial of Service | 2026-01-14T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0086 | Linux Kernel: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0009 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-04T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-2941 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-30T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-2929 | Linux Kernel: Mehrere Schwachstellen | 2025-12-28T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-2920 | Linux Kernel: Mehrere Schwachstellen | 2025-12-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-2915 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-062-02 | Hitachi Energy Relion REB500 Product | 2026-02-24T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-01 | Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module | 2026-03-03T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-25-023-02 | Hitachi Energy RTU500 Series Product (Update B) | 2024-04-30T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-08 | Everon OCPP Backends | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-062-07 | ePower epower.ie | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-062-06 | Mobiliti e-mobi.hu | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-057-10 | Copeland XWEB and XWEB Pro | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-09 | Yokogawa CENTUM VP R6, R7 | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-08 | Mobility46 mobility46.se | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-07 | EV Energy ev.energy | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-06 | SWITCH EV swtchenergy.com | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-05 | Chargemap chargemap.com | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-04 | EV2GO ev2go.io | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-03 | CloudCharge cloudcharge.se | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-02 | Pelco, Inc. Sarix Pro 3 Series IP Cameras | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-01 | Johnson Controls, Inc. Frick Controls Quantum HD | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-25-133-02 | Hitachi Energy Relion 670/650/SAM600-IO Series (Update C) | 2023-11-28T00:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-043-06 | Siemens SINEC OS | 2026-01-28T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-26-027-01 | iba Systems ibaPDA | 2026-01-27T07:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-25-226-15 | Siemens SINEC OS | 2025-08-12T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-25-226-07 | Siemens Third-Party Components in SINEC OS | 2025-08-12T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-25-203-04 | Schneider Electric EcoStruxure Power Operation (Update A) | 2025-07-22T06:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-26-055-02 | Schneider Electric EcoStruxure Building Operation Workstation | 2026-02-10T08:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-26-055-01 | InSAT MasterSCADA BUK-TS | 2026-02-24T07:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-25-070-01 | Schneider Electric Uni-Telway Driver (Update C) | 2025-02-11T05:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-24-296-01 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products (Update C) | 2024-10-22T06:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-22-202-04 | ICONICS Suite and Mitsubishi Electric MC Works64 Products (Update C) | 2022-07-26T06:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-26-020-01 | Schneider Electric EcoStruxure Foxboro DCS (Update A) | 2025-12-09T08:00:00.000000Z | 2026-02-24T06:00:00.000000Z |
| icsa-26-050-04 | Welker OdorEyes EcoSystem Pulse Bypass System with XL4 Controller | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-050-03 | Jinan USR IOT Technology Limited (PUSR) USR-W610 | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-cc-unauth-rce-qen8h7mq | Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-11-13T12:48:42+00:00 |
| cisco-sa-asaftd-webvpn-yrootuw | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Unauthorized Access Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:55+00:00 |
| cisco-sa-asaftd-webvpn-z5xp8eub | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:54+00:00 |
| cisco-sa-http-code-exec-wmfp3h3o | Cisco Secure Firewall Adaptive Security Appliance Software, Secure Firewall Threat Defense Software, IOS Software, IOS XE Software, and IOS XR Software Web Services Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:51+00:00 |
| cisco-sa-ise-radsupress-dos-8yf3jthh | Cisco Identity Services Engine RADIUS Suppression Denial of Service Vulnerability | 2025-11-05T16:00:00+00:00 | 2025-11-05T16:00:00+00:00 |
| cisco-sa-broadworks-xss-o696ymra | Cisco BroadWorks CommPilot Application Software Cross-Site Scripting Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-10-21T15:13:31+00:00 |
| cisco-sa-roomos-inf-disc-qggsbxam | Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-phone-dos-fpyjlv7a | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-secboot-uqfd8avc | Cisco IOS XE Software Secure Boot Bypass Vulnerabilities | 2025-09-24T16:00:00+00:00 | 2025-10-15T15:57:29+00:00 |
| cisco-sa-snmp-x4lphte | Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-06T18:27:02+00:00 |
| cisco-sa-ios-tacacs-hdb7thjw | Cisco IOS and IOS XE Software TACACS+ Authentication Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-01T16:39:50+00:00 |
| cisco-sa-cv-xss-rwrakaj9 | Cisco Cyber Vision Center Stored Cross-Site Scripting Vulnerabilities | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-cucm-stored-xss-fnj66yly | Cisco Unified Communications Manager Stored Cross-Site Scripting Vulnerability | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-cat9k-ptmd7bgy | Cisco IOS XE Software for Catalyst 9000 Series Switches Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-30T14:26:46+00:00 |
| cisco-sa-ap-ipv6-gw-tuazpn9o | Cisco Access Point Software Intermittent IPv6 Gateway Change Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:51+00:00 |
| cisco-sa-webui-xss-vwydgjou | Cisco IOS XE Software Web Authentication Reflected Cross-Site Scripting Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:50+00:00 |
| cisco-sa-snmpwred-x3mjyf5m | Cisco IOS XE Software Simple Network Management Protocol Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-nbar-dos-lavwtmet | Cisco IOS XE Software Network-Based Application Recognition Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-arg-inject-eyddbh4e | Cisco IOS XE Software CLI Argument Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-xe-cmd-inject-rpjm8bgl | Cisco IOS XE Software HTTP API Command Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-invalid-url-dos-nvxszf6u | Cisco IOS Software Industrial Ethernet Switch Device Manager Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-cli-eb7cz6yo | Cisco IOS and IOS XE Software CLI Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-defaultacl-psjk9nvf | Cisco SD-WAN vEdge Software Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-cat9k-acl-l4k7vxgd | Cisco IOS XE Software on Cisco Catalyst 9500X and 9600X Series Switches Virtual Interface Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-action-frame-inj-qqcncz8h | Cisco Wireless Access Point Software Device Analytics Action Frame Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-9800cl-openscep-sb4xtxzp | Cisco IOS XE Software for Catalyst 9800 Series Wireless Controller for Cloud Unauthenticated Access to Certificate Enrollment Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-snmp-bypass-hhuvujdn | Cisco IOS XE SD-WAN Software Packet Filtering Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-09-22T14:12:28+00:00 |
| cisco-sa-xrsig-uy4zrucg | Cisco IOS XR Software Image Verification Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-iosxr-arp-storm-ejuu55ym | Cisco IOS XR ARP Broadcast Storm Denial of Service Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-acl-packetio-swjhhbtz | Cisco IOS XR Software Management Interface ACL Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-5504 | PKCS7 CBC Padding Oracle — Plaintext Recovery | 2026-04-02T00:00:00.000Z | 2026-04-15T01:02:25.000Z |
| msrc_cve-2026-5500 | Improper Validation of AES-GCM Authentication Tag Length in PKCS#7 Envelope Allows Authentication Bypass | 2026-04-02T00:00:00.000Z | 2026-04-15T01:02:16.000Z |
| msrc_cve-2026-5393 | OOB Read in DoTls13CertificateVerify with WOLFSSL_DUAL_ALG_CERTS | 2026-04-02T00:00:00.000Z | 2026-04-15T01:02:08.000Z |
| msrc_cve-2026-5466 | wc_VerifyEccsiHash missing sanity check | 2026-04-02T00:00:00.000Z | 2026-04-15T01:01:59.000Z |
| msrc_cve-2026-33555 | CVE-2026-33555 | 2026-04-02T00:00:00.000Z | 2026-04-15T01:01:51.000Z |
| msrc_cve-2026-4878 | Libcap: libcap: privilege escalation via toctou race condition in cap_set_file() | 2026-04-02T00:00:00.000Z | 2026-04-14T14:47:44.000Z |
| msrc_cve-2026-33810 | Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509 | 2026-04-02T00:00:00.000Z | 2026-04-14T14:47:37.000Z |
| msrc_cve-2026-32289 | JsBraceDepth Context Tracking Bugs (XSS) in html/template | 2026-04-02T00:00:00.000Z | 2026-04-14T14:46:40.000Z |
| msrc_cve-2026-34933 | Avahi: Reachable assertion in `transport_flags_from_domain()` via conflicting publish flags crashes avahi-daemon | 2026-04-02T00:00:00.000Z | 2026-04-14T14:44:57.000Z |
| msrc_cve-2026-3184 | Util-linux: util-linux: access control bypass due to improper hostname canonicalization | 2026-04-02T00:00:00.000Z | 2026-04-14T14:44:51.000Z |
| msrc_cve-2026-0968 | Libssh: libssh: denial of service due to malformed sftp message | 2026-03-02T00:00:00.000Z | 2026-04-14T14:44:45.000Z |
| msrc_cve-2026-27456 | util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup | 2026-04-02T00:00:00.000Z | 2026-04-14T14:44:40.000Z |
| msrc_cve-2026-4897 | Polkit: polkit: denial of service via unbounded input processing through standard input | 2026-03-02T00:00:00.000Z | 2026-04-14T14:44:19.000Z |
| msrc_cve-2026-2436 | Libsoup: libsoup: denial of service via use-after-free in soupserver during tls handshake | 2026-03-02T00:00:00.000Z | 2026-04-14T14:44:01.000Z |
| msrc_cve-2026-5119 | Libsoup: libsoup: information disclosure via cleartext transmission of cookies during https tunnel establishment | 2026-03-02T00:00:00.000Z | 2026-04-14T14:43:55.000Z |
| msrc_cve-2026-21711 | CVE-2026-21711 | 2026-03-02T00:00:00.000Z | 2026-04-14T14:43:40.000Z |
| msrc_cve-2025-66038 | OpenSC: `sc_compacttlv_find_tag` can return out-of-bounds pointers | 2026-03-02T00:00:00.000Z | 2026-04-14T14:43:34.000Z |
| msrc_cve-2025-49010 | OpenSC: Stack-buffer-overflow WRITE in GET RESPONSE | 2026-03-02T00:00:00.000Z | 2026-04-14T14:43:29.000Z |
| msrc_cve-2026-0964 | Libssh: improper sanitation of paths received from scp servers | 2026-03-02T00:00:00.000Z | 2026-04-14T14:43:16.000Z |
| msrc_cve-2026-0966 | Libssh: buffer underflow in ssh_get_hexa() on invalid input | 2026-03-02T00:00:00.000Z | 2026-04-14T14:43:10.000Z |
| msrc_cve-2026-0967 | Libssh: libssh: denial of service via inefficient regular expression processing | 2026-03-02T00:00:00.000Z | 2026-04-14T14:43:05.000Z |
| msrc_cve-2026-0965 | Libssh: libssh: denial of service via improper configuration file handling | 2026-03-02T00:00:00.000Z | 2026-04-14T14:42:59.000Z |
| msrc_cve-2026-5107 | FRRouting FRR EVPN Type-2 Route bgp_evpn.c process_type2_route access control | 2026-03-02T00:00:00.000Z | 2026-04-14T14:42:52.000Z |
| msrc_cve-2026-4647 | Binutils: out-of-bounds read in xcoff relocation processing in gnu binutils bfd library | 2026-03-02T00:00:00.000Z | 2026-04-14T14:42:23.000Z |
| msrc_cve-2026-3099 | Libsoup: libsoup: authentication bypass via digest authentication replay attack | 2026-03-02T00:00:00.000Z | 2026-04-14T14:41:57.000Z |
| msrc_cve-2026-3633 | Libsoup: libsoup: header and http request injection via crlf injection | 2026-03-02T00:00:00.000Z | 2026-04-14T14:41:43.000Z |
| msrc_cve-2026-3632 | Libsoup: libsoup: http smuggling and server-side request forgery via malformed hostnames | 2026-03-02T00:00:00.000Z | 2026-04-14T14:41:38.000Z |
| msrc_cve-2026-3634 | Libsoup: libsoup: http header injection and response splitting via crlf injection in content-type header | 2026-03-02T00:00:00.000Z | 2026-04-14T14:41:33.000Z |
| msrc_cve-2025-69648 | CVE-2025-69648 | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:44.000Z |
| msrc_cve-2025-69647 | CVE-2025-69647 | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:39.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0036 | Kwetsbaarheden verholpen in Cisco Unified Communications producten | 2026-01-22T09:49:39.156365Z | 2026-01-22T09:49:39.156365Z |
| ncsc-2026-0035 | Kwetsbaarheid verholpen in Palo Alto Networks PAN-OS | 2026-01-22T09:22:36.433609Z | 2026-01-22T09:22:36.433609Z |
| ncsc-2026-0034 | Kwetsbaarheden verholpen in Atlassian producten | 2026-01-22T09:03:42.667958Z | 2026-01-22T09:03:42.667958Z |
| ncsc-2026-0033 | Kwetsbaarheid verholpen in GNU Inetutils telnetd | 2026-01-21T14:15:46.424529Z | 2026-01-21T14:15:46.424529Z |
| ncsc-2026-0032 | Kwetsbaarheden verholpen in Oracle MySQL | 2026-01-21T10:12:24.844869Z | 2026-01-21T10:12:24.844869Z |
| ncsc-2026-0031 | Kwetsbaarheden verholpen in Oracle JD Edwards | 2026-01-21T10:12:00.674214Z | 2026-01-21T10:12:00.674214Z |
| ncsc-2026-0030 | Kwetsbaarheden verholpen in Oracle Java | 2026-01-21T10:11:39.759123Z | 2026-01-21T10:11:39.759123Z |
| ncsc-2026-0029 | Kwetsbaarheden verholpen in Oracle Hyperion | 2026-01-21T10:10:46.297433Z | 2026-01-21T10:10:46.297433Z |
| ncsc-2026-0028 | Kwetsbaarheden verholpen in Oracle Analytics | 2026-01-21T10:10:15.985753Z | 2026-01-21T10:10:15.985753Z |
| ncsc-2026-0027 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2026-01-21T10:08:59.379774Z | 2026-01-21T10:08:59.379774Z |
| ncsc-2026-0026 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2026-01-21T10:06:27.920991Z | 2026-01-21T10:06:27.920991Z |
| ncsc-2026-0025 | Kwetsbaarheden verholpen in Oracle Financial Services | 2026-01-21T09:55:33.889125Z | 2026-01-21T09:55:33.889125Z |
| ncsc-2026-0024 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2026-01-21T09:29:38.334428Z | 2026-01-21T09:29:38.334428Z |
| ncsc-2026-0023 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2026-01-21T09:27:58.715578Z | 2026-01-21T09:27:58.715578Z |
| ncsc-2026-0022 | Kwetsbaarheden verholpen in Oracle Communications producten | 2026-01-21T09:25:39.876330Z | 2026-01-21T09:25:39.876330Z |
| ncsc-2026-0021 | Kwetsbaarheden verholpen in Oracle Database Server producten | 2026-01-21T09:19:00.000449Z | 2026-01-21T09:19:00.000449Z |
| ncsc-2026-0020 | Kwetsbaarheden verholpen in Oracle Commerce | 2026-01-21T09:18:16.268788Z | 2026-01-21T09:18:16.268788Z |
| ncsc-2026-0019 | Kwetsbaarheid verholpen in Fortinet FortiSIEM | 2026-01-16T13:34:34.467426Z | 2026-01-16T13:34:34.467426Z |
| ncsc-2026-0018 | Kwetsbaarheden verholpen in TYPO3 CMS | 2026-01-16T10:11:37.524826Z | 2026-01-16T10:11:37.524826Z |
| ncsc-2026-0017 | Kwetsbaarheden verholpen in Juniper Networks JunOS | 2026-01-16T10:07:39.310560Z | 2026-01-16T10:07:39.310560Z |
| ncsc-2026-0016 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS | 2026-01-16T09:44:20.575860Z | 2026-01-16T09:44:20.575860Z |
| ncsc-2026-0015 | Kwetsbaarheid verholpen in Fortinet FortiOS | 2026-01-15T12:31:57.265723Z | 2026-01-15T12:31:57.265723Z |
| ncsc-2026-0014 | Kwetsbaarheden verholpen in Adobe Illustrator | 2026-01-15T12:16:05.427141Z | 2026-01-15T12:16:05.427141Z |
| ncsc-2026-0013 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2026-01-14T13:45:48.530782Z | 2026-01-14T13:45:48.530782Z |
| ncsc-2026-0012 | Kwetsbaarheden verholpen in Adobe Dreamweaver Desktop | 2026-01-14T13:41:56.261778Z | 2026-01-14T13:41:56.261778Z |
| ncsc-2026-0011 | Kwetsbaarheid verholpen in Microsoft Developer Tools | 2026-01-13T19:19:27.690900Z | 2026-01-13T19:19:27.690900Z |
| ncsc-2026-0009 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-01-13T19:17:59.629364Z | 2026-01-13T19:17:59.629364Z |
| ncsc-2026-0008 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-01-13T19:17:18.848673Z | 2026-01-13T19:17:18.848673Z |
| ncsc-2026-0006 | Kwetsbaarheden verholpen in SAP producten | 2026-01-13T14:42:24.621603Z | 2026-01-13T14:42:24.621603Z |
| ncsc-2026-0005 | Kwetsbaarheden verholpen in Siemens producten | 2026-01-13T12:05:57.353070Z | 2026-01-13T12:05:57.353070Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10398-1 | python311-3.11.15-3.1 on GA media | 2026-03-20T00:00:00Z | 2026-03-20T00:00:00Z |
| opensuse-su-2026:10397-1 | python311-PyJWT-2.12.1-1.1 on GA media | 2026-03-20T00:00:00Z | 2026-03-20T00:00:00Z |
| opensuse-su-2026:10396-1 | openbao-2.5.1-1.1 on GA media | 2026-03-20T00:00:00Z | 2026-03-20T00:00:00Z |
| opensuse-su-2026:10395-1 | qemu-10.2.2-1.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10394-1 | python313-3.13.12-2.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10393-1 | python311-pyasn1-0.6.3-1.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10392-1 | python311-pyOpenSSL-26.0.0-1.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10391-1 | GraphicsMagick-1.3.46-3.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10390-1 | tempo-cli-2.10.3-1.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:10389-1 | python311-salt-3006.0-56.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:10388-1 | mumble-1.5.857-2.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:10387-1 | kernel-devel-6.19.8-1.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:10386-1 | ImageMagick-7.1.2.17-1.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:20375-1 | Security update for python-PyPDF2 | 2026-03-17T15:19:48Z | 2026-03-17T15:19:48Z |
| opensuse-su-2026:20374-1 | Security update for krb5-appl | 2026-03-17T13:34:53Z | 2026-03-17T13:34:53Z |
| opensuse-su-2026:20373-1 | Security update for python-Django | 2026-03-17T13:27:11Z | 2026-03-17T13:27:11Z |
| opensuse-su-2026:20368-1 | Security update for ocaml | 2026-03-17T10:41:31Z | 2026-03-17T10:41:31Z |
| opensuse-su-2026:20372-1 | Security update for chromium | 2026-03-17T10:11:02Z | 2026-03-17T10:11:02Z |
| opensuse-su-2026:10385-1 | traefik-3.6.10-2.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10384-1 | cargo1.94-1.94.0-2.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10383-1 | cargo1.93-1.93.0-3.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10382-1 | cargo1.92-1.92.0-2.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10381-1 | python311-3.11.15-2.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10380-1 | python311-uv-0.10.11-1.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10379-1 | python311-CairoSVG-2.9.0-1.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:10378-1 | ovmf-202602-5.1 on GA media | 2026-03-17T00:00:00Z | 2026-03-17T00:00:00Z |
| opensuse-su-2026:20365-1 | Security update for MozillaFirefox | 2026-03-16T16:42:36Z | 2026-03-16T16:42:36Z |
| opensuse-su-2026:20366-1 | Security update for docker-stable | 2026-03-16T15:57:03Z | 2026-03-16T15:57:03Z |
| opensuse-su-2026:20364-1 | Security update for rust-keylime | 2026-03-16T15:31:12Z | 2026-03-16T15:31:12Z |
| opensuse-su-2026:10377-1 | python312-3.12.13-2.1 on GA media | 2026-03-16T00:00:00Z | 2026-03-16T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:5533 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-24T04:02:36+00:00 | 2026-04-14T09:46:51+00:00 |
| rhsa-2026:5461 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-23T17:44:49+00:00 | 2026-04-14T09:46:51+00:00 |
| rhsa-2026:5394 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 director Operator container images | 2026-03-23T13:04:11+00:00 | 2026-04-14T09:46:50+00:00 |
| rhsa-2026:5327 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-23T07:40:40+00:00 | 2026-04-14T09:46:50+00:00 |
| rhsa-2026:5146 | Red Hat Security Advisory: yggdrasil security update | 2026-03-19T16:04:46+00:00 | 2026-04-14T09:46:49+00:00 |
| rhsa-2026:5110 | Red Hat Security Advisory: Multicluster Global Hub 1.5.4 security update | 2026-03-19T10:27:09+00:00 | 2026-04-14T09:46:49+00:00 |
| rhsa-2026:5079 | Red Hat Security Advisory: rhc security update | 2026-03-19T09:49:36+00:00 | 2026-04-14T09:46:49+00:00 |
| rhsa-2026:5078 | Red Hat Security Advisory: rhc security update | 2026-03-19T21:11:27+00:00 | 2026-04-14T09:46:49+00:00 |
| rhsa-2026:5077 | Red Hat Security Advisory: rhc security update | 2026-03-19T23:49:18+00:00 | 2026-04-14T09:46:48+00:00 |
| rhsa-2026:5076 | Red Hat Security Advisory: rhc security update | 2026-03-19T21:34:22+00:00 | 2026-04-14T09:46:48+00:00 |
| rhsa-2026:5031 | Red Hat Security Advisory: rhc security update | 2026-03-19T05:19:39+00:00 | 2026-04-14T09:46:48+00:00 |
| rhsa-2026:5030 | Red Hat Security Advisory: rhc security update | 2026-03-19T05:15:04+00:00 | 2026-04-14T09:46:47+00:00 |
| rhsa-2026:5022 | Red Hat Security Advisory: rhc security update | 2026-03-19T05:02:24+00:00 | 2026-04-14T09:46:47+00:00 |
| rhsa-2026:4952 | Red Hat Security Advisory: rhc security update | 2026-03-18T21:13:13+00:00 | 2026-04-14T09:46:47+00:00 |
| rhsa-2026:4939 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.3.4 | 2026-03-18T16:03:08+00:00 | 2026-04-14T09:46:46+00:00 |
| rhsa-2026:4936 | Red Hat Security Advisory: Release of containers for RHOSO 18.0.17 security update | 2026-03-18T15:36:04+00:00 | 2026-04-14T09:46:46+00:00 |
| rhsa-2026:4498 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.4.3 | 2026-03-12T14:43:54+00:00 | 2026-04-14T09:46:46+00:00 |
| rhsa-2026:4907 | Red Hat Security Advisory: rhc security update | 2026-03-18T10:44:01+00:00 | 2026-04-14T09:46:45+00:00 |
| rhsa-2026:4901 | Red Hat Security Advisory: rhc security update | 2026-03-18T11:07:06+00:00 | 2026-04-14T09:46:45+00:00 |
| rhsa-2026:4892 | Red Hat Security Advisory: rhc security update | 2026-03-18T08:06:26+00:00 | 2026-04-14T09:46:45+00:00 |
| rhsa-2026:4753 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-17T11:44:32+00:00 | 2026-04-14T09:46:44+00:00 |
| rhsa-2026:4510 | Red Hat Security Advisory: OpenShift Container Platform 4.17.51 bug fix and security update | 2026-03-19T02:31:44+00:00 | 2026-04-14T09:46:43+00:00 |
| rhsa-2026:4500 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.2.9 | 2026-03-12T14:45:08+00:00 | 2026-04-14T09:46:43+00:00 |
| rhsa-2026:4467 | Red Hat Security Advisory: RHACS 4.9.4 security and bug fix update | 2026-03-12T11:53:58+00:00 | 2026-04-14T09:46:43+00:00 |
| rhsa-2026:3905 | Red Hat Security Advisory: OpenShift Container Platform 4.18.35 bug fix and security update | 2026-03-11T04:27:58+00:00 | 2026-04-14T09:46:43+00:00 |
| rhsa-2026:4466 | Red Hat Security Advisory: RHACS 4.8.9 security and bug fix update | 2026-03-12T11:53:42+00:00 | 2026-04-14T09:46:42+00:00 |
| rhsa-2026:4464 | Red Hat Security Advisory: OpenShift Container Platform 4.16.58 packages and security update | 2026-03-19T07:51:30+00:00 | 2026-04-14T09:46:42+00:00 |
| rhsa-2026:4434 | Red Hat Security Advisory: OpenShift Container Platform 4.19.26 bug fix and security update | 2026-03-18T18:31:59+00:00 | 2026-04-14T09:46:42+00:00 |
| rhsa-2026:4276 | Red Hat Security Advisory: RHTAS 1.3.2 - Tech Preview Release Of the Model Validation Operator | 2026-03-11T09:11:34+00:00 | 2026-04-14T09:46:42+00:00 |
| rhsa-2026:4270 | Red Hat Security Advisory: OpenShift Source To Image 1.6.0 | 2026-03-11T07:52:06+00:00 | 2026-04-14T09:46:42+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2024-226-01 | Accutech Manager | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-101-05 | Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-04-11T09:46:26.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-05 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-01-10T15:41:57.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-04 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-02 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, and Modicon Controllers M580 and M340 | 2022-08-09T10:58:35.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-222-04 | Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert | 2021-08-10T02:27:39.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-194-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ x70, and Modicon Controllers M580 and M340 | 2021-07-13T08:22:02.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2019-281-02 | Modicon Controllers | 2019-09-26T12:53:28.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2018-081-01 | Embedded FTP Servers for Modicon PAC Controllers | 2018-03-22T03:39:21.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2024-191-03 | EcoStruxure Foxboro SCADA FoxRTU Station | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-191-02 | EcoStruxureTM Foxboro DCS Core Control Services | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-191-01 | Wiser Home Controller WHC-5918A | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-163-05 | SAGE RTU | 2024-06-11T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-163-04 | SpaceLogic AS-P and AS-B Automation Servers | 2024-06-11T00:00:00.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2024-163-03 | EVlink Home Smart | 2024-06-11T00:00:00.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2023-101-04 | Easy UPS Online Monitoring Software | 2023-04-11T14:09:13.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2024-100-01 | Easergy Studio | 2024-04-09T00:00:00.000Z | 2024-04-09T00:00:00.000Z |
| sevd-2023-346-01 | Trio™ Licensed and License-free Data Radios | 2023-12-12T00:00:00.000Z | 2024-04-09T00:00:00.000Z |
| sevd-2023-318-03 | Galaxy VS and Galaxy VL | 2023-11-14T08:28:19.000Z | 2024-04-09T00:00:00.000Z |
| sevd-2024-072-01 | Easergy T200 Multiple Vulnerabilities | 2024-03-12T07:02:04.000Z | 2024-03-12T07:02:04.000Z |
| sevd-2024-072-02 | EcoStruxure Power Design - Ecodial | 2024-03-12T05:00:00.000Z | 2024-03-12T05:00:00.000Z |
| sevd-2024-044-03 | EcoStruxure IT Gateway | 2024-02-13T12:21:44.000Z | 2024-02-13T12:21:44.000Z |
| sevd-2024-044-02 | Harmony Relay NFC | 2024-02-13T04:05:07.000Z | 2024-02-13T04:05:07.000Z |
| sevd-2024-009-02 | Easergy Studio | 2024-01-09T14:51:40.000Z | 2024-01-09T14:51:40.000Z |
| sevd-2023-101-01 | CODESYS Runtime Vulnerabilities | 2023-04-11T13:31:49.000Z | 2024-01-09T13:31:00.000Z |
| sevd-2023-101-03 | EcoStruxure™ Control Expert | 2023-04-11T10:14:15.000Z | 2024-01-09T10:14:00.000Z |
| sevd-2019-225-01 | Harmony (formerly known as Magelis) HMI Panels | 2019-08-13T09:59:02.000Z | 2024-01-09T09:59:02.000Z |
| sevd-2023-346-03 | Easy UPS Online Monitoring Software | 2023-12-12T00:00:00.000Z | 2023-12-12T00:00:00.000Z |
| sevd-2023-346-02 | ProLeiT Plant iT/Brewmaxx | 2023-12-12T00:00:00.000Z | 2023-12-12T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-552874 | SSA-552874: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2022-12-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-522291 | SSA-522291: Improper Certificate Validation Vulnerability in Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-514895 | SSA-514895: Multiple Vulnerabilities in Altair Grid Engine V2025.1.0 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-365596 | SSA-365596: DLL Hijacking Vulnerability in Siemens Software Center and Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-339694 | SSA-339694: Multiple Vulnerabilities in Spectrum Power 4 Before v4.70 SP12 Security Patch 2 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-322980 | SSA-322980: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2023-04-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-301229 | SSA-301229: Client-Side Enforcement of Server-Side Security Vulnerabilities in RUGGEDCOM ROX II | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-267056 | SSA-267056: Multiple Vulnerabilities in LOGO! 8 BM Devices | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-225578 | SSA-225578: Improper Access Control Vulnerability in SICAM GridEdge Before V2.7.3 | 2022-07-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-201498 | SSA-201498: Multiple Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices Before V3.11 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-194557 | SSA-194557: Improper Limitation of Filesystem Access through Web Server Vulnerability in SIPROTEC 5 | 2025-01-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-876787 | SSA-876787: Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-722410 | SSA-722410: Multiple Vulnerabilities in User Management Component (UMC) | 2025-09-09T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-625789 | SSA-625789: Multiple Vulnerabilities in SIMATIC S7-1200 CPU V1/V2 Devices | 2011-06-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-614723 | SSA-614723: Denial of Service Vulnerabilities in User Management Component (UMC) | 2025-05-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-541582 | SSA-541582: Multiple File Parsing Vulnerabilities in Solid Edge | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-486936 | SSA-486936: Authentication Vulnerability in SIMATIC ET 200SP Communication Processors | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-373591 | SSA-373591: Buffer Overflow Vulnerability in RUGGEDCOM ROS Devices | 2021-07-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-367714 | SSA-367714: Improper Integrity Check of Firmware Updates in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2025-05-23T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-318832 | SSA-318832: SQL Injection Vulnerability in SINEC NMS | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-279823 | SSA-279823: Cross-Site Scripting Vulnerability in SIMATIC S7-1200 CPU V2/V3 Before V3.0.2 | 2012-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-240718 | SSA-240718: Insecure Storage of HTTPS CA Certificate in SIMATIC S7-1200 CPU V2 | 2012-09-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-083019 | SSA-083019: Multiple Vulnerabilities in RUGGEDCOM ROS Devices | 2025-07-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-062309 | SSA-062309: Information Disclosure Vulnerability in TeleControl Server Basic V3.1 | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-054046 | SSA-054046: Unauthenticated Information Disclosure in Web Server of SIMATIC S7-1500 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-039007 | SSA-039007: Heap-based Buffer Overflow Vulnerability in User Management Component (UMC) | 2024-09-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-517338 | SSA-517338: Multiple Vulnerabilities in SINEC Traffic Analyzer Before V3.0 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-398330 | SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP >= V3.1.0 and < V3.1.5 | 2023-12-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-183963 | SSA-183963: Certificate Validation Vulnerabilities in SICAM TOOLBOX II Before V07.11 | 2025-07-08T00:00:00Z | 2025-07-18T00:00:00Z |
| ssa-938066 | SSA-938066: Remote Code Execution Vulnerability in SENTRON Powermanager and Desigo CC | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1313-1 | Security update for freerdp2 | 2026-04-14T10:47:31Z | 2026-04-14T10:47:31Z |
| suse-su-2026:1312-1 | Security update for bind | 2026-04-14T10:46:32Z | 2026-04-14T10:46:32Z |
| suse-su-2026:1311-1 | Security update for libpng16 | 2026-04-14T10:44:51Z | 2026-04-14T10:44:51Z |
| suse-su-2026:1310-1 | Security update for libssh | 2026-04-14T10:42:14Z | 2026-04-14T10:42:14Z |
| suse-su-2026:1309-1 | Security update for sudo | 2026-04-14T10:39:38Z | 2026-04-14T10:39:38Z |
| suse-su-2026:1308-1 | Security update for sudo | 2026-04-14T10:38:01Z | 2026-04-14T10:38:01Z |
| suse-su-2026:1307-1 | Security update for strongswan | 2026-04-14T10:35:42Z | 2026-04-14T10:35:42Z |
| suse-su-2026:21118-1 | Security update for vim | 2026-04-14T08:33:54Z | 2026-04-14T08:33:54Z |
| suse-su-2026:21117-1 | Security update for avahi | 2026-04-14T08:31:12Z | 2026-04-14T08:31:12Z |
| suse-su-2026:21116-1 | Security update for python-cryptography | 2026-04-14T08:30:04Z | 2026-04-14T08:30:04Z |
| suse-su-2026:21115-1 | Security update for ignition | 2026-04-14T08:29:25Z | 2026-04-14T08:29:25Z |
| suse-su-2026:21127-1 | Security update for avahi | 2026-04-14T08:01:54Z | 2026-04-14T08:01:54Z |
| suse-su-2026:21128-1 | Security update for ignition | 2026-04-14T08:01:00Z | 2026-04-14T08:01:00Z |
| suse-su-2026:21126-1 | Security update for python-cryptography | 2026-04-14T07:57:50Z | 2026-04-14T07:57:50Z |
| suse-su-2026:21124-1 | Security update for vim | 2026-04-14T07:55:35Z | 2026-04-14T07:55:35Z |
| suse-su-2026:1305-1 | Security update for the Linux Kernel (Live Patch 76 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T18:34:02Z | 2026-04-13T18:34:02Z |
| suse-su-2026:21123-1 | Security update for the Linux Kernel | 2026-04-13T18:28:29Z | 2026-04-13T18:28:29Z |
| suse-su-2026:21114-1 | Security update for the Linux Kernel | 2026-04-13T17:04:49Z | 2026-04-13T17:04:49Z |
| suse-su-2026:21122-1 | Security update for kernel-livepatch-MICRO-6-0_Update_18 | 2026-04-13T16:42:46Z | 2026-04-13T16:42:46Z |
| suse-su-2026:21120-1 | Security update for kernel-livepatch-MICRO-6-0_Update_18 | 2026-04-13T16:42:46Z | 2026-04-13T16:42:46Z |
| suse-su-2026:1304-1 | Security update for the Linux Kernel (Live Patch 73 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T16:04:42Z | 2026-04-13T16:04:42Z |
| suse-su-2026:1303-1 | Security update for tigervnc | 2026-04-13T16:02:59Z | 2026-04-13T16:02:59Z |
| suse-su-2026:1302-1 | Security update for tigervnc | 2026-04-13T16:02:16Z | 2026-04-13T16:02:16Z |
| suse-su-2026:1301-1 | Security update for tigervnc | 2026-04-13T16:01:23Z | 2026-04-13T16:01:23Z |
| suse-su-2026:1300-1 | Security update for GraphicsMagick | 2026-04-13T15:58:01Z | 2026-04-13T15:58:01Z |
| suse-su-2026:1299-1 | Security update for nodejs24 | 2026-04-13T15:54:45Z | 2026-04-13T15:54:45Z |
| suse-su-2026:21107-1 | Security update for openssl-3 | 2026-04-13T15:48:01Z | 2026-04-13T15:48:01Z |
| suse-su-2026:1298-1 | Security update for the Linux Kernel (Live Patch 72 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T15:04:44Z | 2026-04-13T15:04:44Z |
| suse-su-2026:21106-1 | Security update for cockpit | 2026-04-13T14:11:34Z | 2026-04-13T14:11:34Z |
| suse-su-2026:1297-1 | Security update for the Linux Kernel (Live Patch 71 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T12:42:14Z | 2026-04-13T12:42:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:6473 | Important: python3 security update | 2026-04-02T00:00:00Z | 2026-04-03T12:02:03Z |
| alsa-2026:6388 | Important: grafana-pcp security update | 2026-04-01T00:00:00Z | 2026-04-03T10:02:10Z |
| alsa-2026:6344 | Important: grafana security update | 2026-04-01T00:00:00Z | 2026-04-03T09:56:37Z |
| alsa-2026:6259 | Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update | 2026-03-31T00:00:00Z | 2026-04-03T09:45:31Z |
| alsa-2026:6053 | Moderate: kernel security update | 2026-03-30T00:00:00Z | 2026-04-03T09:23:17Z |
| alsa-2026:6390 | Moderate: rsync security update | 2026-04-01T00:00:00Z | 2026-04-02T09:23:33Z |
| alsa-2026:6383 | Important: grafana-pcp security update | 2026-04-01T00:00:00Z | 2026-04-02T09:15:46Z |
| alsa-2026:6382 | Important: grafana security update | 2026-04-01T00:00:00Z | 2026-04-02T09:12:36Z |
| alsa-2026:6340 | Important: freerdp security update | 2026-04-01T00:00:00Z | 2026-04-02T09:09:13Z |
| alsa-2026:6005 | Important: freerdp security update | 2026-03-30T00:00:00Z | 2026-04-02T09:00:17Z |
| alsa-2026:6153 | Moderate: kernel security update | 2026-03-30T00:00:00Z | 2026-04-02T08:46:53Z |
| alsa-2026:6188 | Important: thunderbird security update | 2026-03-30T00:00:00Z | 2026-04-02T08:18:50Z |
| alsa-2026:6342 | Important: thunderbird security update | 2026-04-01T00:00:00Z | 2026-04-01T11:59:47Z |
| alsa-2026:6301 | Important: squid security update | 2026-03-31T00:00:00Z | 2026-04-01T09:27:45Z |
| alsa-2026:6256 | Important: python3.12 security update | 2026-03-31T00:00:00Z | 2026-04-01T09:23:35Z |
| alsa-2026:6266 | Moderate: libxslt security update | 2026-03-31T00:00:00Z | 2026-04-01T09:19:08Z |
| alsa-2026:6286 | Important: python3.11 security update | 2026-03-31T00:00:00Z | 2026-04-01T09:15:24Z |
| alsa-2026:6285 | Important: python3.12 security update | 2026-03-31T00:00:00Z | 2026-04-01T09:07:09Z |
| alsa-2026:6283 | Important: python3.12 security update | 2026-03-31T00:00:00Z | 2026-04-01T08:56:58Z |
| alsa-2026:6281 | Important: python3.11 security update | 2026-03-31T00:00:00Z | 2026-04-01T08:52:26Z |
| alsa-2026:6004 | Important: freerdp security update | 2026-03-30T00:00:00Z | 2026-03-31T08:19:51Z |
| alsa-2026:5930 | Important: firefox security update | 2026-03-26T00:00:00Z | 2026-03-30T11:00:48Z |
| alsa-2026:6037 | Moderate: kernel security update | 2026-03-30T00:00:00Z | 2026-03-30T10:55:07Z |
| alsa-2026:6036 | Moderate: kernel-rt security update | 2026-03-30T00:00:00Z | 2026-03-30T10:51:16Z |
| alsa-2026:5932 | Important: firefox security update | 2026-03-26T00:00:00Z | 2026-03-30T10:46:04Z |
| alsa-2026:5931 | Important: firefox security update | 2026-03-26T00:00:00Z | 2026-03-30T10:43:43Z |
| alsa-2026:5913 | Moderate: ncurses security update | 2026-03-26T00:00:00Z | 2026-03-27T10:30:59Z |
| alsa-2026:5939 | Important: freerdp security update | 2026-03-26T00:00:00Z | 2026-03-27T10:28:32Z |
| alsa-2026:5941 | Important: golang security update | 2026-03-26T00:00:00Z | 2026-03-27T10:26:32Z |
| alsa-2026:5942 | Important: golang security update | 2026-03-26T00:00:00Z | 2026-03-27T10:17:44Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-728 | Negative-size-param in pdf_resize_resource_arrays | 2024-08-08T00:09:33.935595Z | 2026-03-18T14:32:58.071449Z |
| osv-2024-677 | Segv on unknown address in gs_gc_reclaim | 2024-07-25T00:06:43.762625Z | 2026-03-18T14:32:20.684770Z |
| osv-2025-202 | UNKNOWN READ in _blit_xrgb32_lerp_spans | 2025-03-15T00:01:51.127135Z | 2026-03-18T14:26:56.370221Z |
| osv-2023-34 | Heap-use-after-free in gc_trace | 2023-01-29T13:00:17.773387Z | 2026-03-18T14:25:32.218330Z |
| osv-2022-73 | Heap-use-after-free in pdfi_cspace_free_callback | 2022-01-22T00:00:41.413569Z | 2026-03-18T14:24:03.137574Z |
| osv-2022-524 | Heap-buffer-overflow in Ins_JROF | 2022-07-01T00:01:43.353257Z | 2026-03-18T14:22:41.236746Z |
| osv-2026-417 | Segv on unknown address in arrow::Array::IsNull | 2026-03-18T00:18:35.139866Z | 2026-03-18T00:18:35.140154Z |
| osv-2023-1307 | UNKNOWN READ in init_struct_ops_maps | 2023-12-15T00:12:51.528155Z | 2026-03-17T14:24:53.158428Z |
| osv-2023-1267 | Heap-buffer-overflow in dwg_free_object | 2023-12-08T00:11:02.971903Z | 2026-03-16T14:18:18.473266Z |
| osv-2026-350 | UNKNOWN READ in bfd_getl32 | 2026-03-04T00:14:56.651284Z | 2026-03-14T18:43:19.427139Z |
| osv-2022-1235 | Heap-buffer-overflow in _rrparse | 2022-12-04T13:00:30.303410Z | 2026-03-13T14:16:08.108628Z |
| osv-2024-914 | UNKNOWN READ in boost::re_detail_500::basic_regex_formatter<std::__1::ostream_iterator<char, cha | 2024-08-16T00:08:20.277708Z | 2026-03-11T14:30:35.738187Z |
| osv-2024-398 | Use-of-uninitialized-value in wabt::BinaryReaderObjdump::PrintInitExpr | 2024-05-01T00:11:38.602555Z | 2026-03-11T14:28:35.396657Z |
| osv-2024-112 | Stack-overflow in boost::read_graphviz_detail::parser::parse_subgraph | 2024-02-16T00:05:47.896843Z | 2026-03-11T14:26:22.626694Z |
| osv-2023-346 | UNKNOWN WRITE in void std::__1::allocator_traits<std::__1::allocator<wabt::interp::HandlerDesc> > | 2023-04-27T14:02:25.286668Z | 2026-03-11T14:24:45.211720Z |
| osv-2022-916 | Container-overflow in wabt::interp::BinaryReaderInterp::BeginFunctionBody | 2022-09-20T00:00:42.122902Z | 2026-03-11T14:23:47.282795Z |
| osv-2022-1263 | Null-dereference READ | 2022-12-20T13:01:53.219707Z | 2026-03-11T14:20:54.166339Z |
| osv-2026-371 | Heap-buffer-overflow in tinyobj::tryParseDouble | 2026-03-09T00:09:41.689616Z | 2026-03-09T00:09:41.689926Z |
| osv-2024-838 | Bad-cast to RDKit::AtomRDKit::ROMol::initFromOther | 2024-08-16T00:03:32.029853Z | 2026-03-07T14:34:10.603763Z |
| osv-2026-359 | Segv on unknown address in gpsd_vlog | 2026-03-07T00:03:40.062221Z | 2026-03-07T00:03:40.062505Z |
| osv-2025-62 | UNKNOWN READ in RDKit::Dict::reset | 2025-01-27T00:01:51.692636Z | 2026-03-06T14:31:24.229549Z |
| osv-2025-266 | Heap-buffer-overflow in lj_buf_ruleb128 | 2025-04-08T00:17:06.279554Z | 2026-03-05T14:36:27.176471Z |
| osv-2022-94 | Heap-buffer-overflow in cli_strlcat | 2022-01-27T00:02:12.465969Z | 2026-03-05T14:29:46.831320Z |
| osv-2022-636 | UNKNOWN READ in fp_cmp_mag | 2022-07-27T00:00:35.300337Z | 2026-03-05T14:28:12.890689Z |
| osv-2022-1068 | UNKNOWN READ in fp_cmp_mag | 2022-10-21T00:00:11.246872Z | 2026-03-05T14:25:24.236211Z |
| osv-2026-341 | Security exception in com.code_intelligence.jazzer.sanitizers.RegexInjection.hookInternal | 2026-03-03T00:17:38.109294Z | 2026-03-03T00:17:38.109635Z |
| osv-2026-338 | Use-of-uninitialized-value in pjsip_auth_clt_init_req | 2026-03-03T00:09:55.520965Z | 2026-03-03T00:09:55.521245Z |
| osv-2024-340 | Heap-buffer-overflow in Exiv2::AsfVideo::GUIDTag::GUIDTag | 2024-04-30T00:01:53.406015Z | 2026-03-01T14:15:15.992512Z |
| osv-2025-253 | Security exception in org.apache.lucene.analysis.ckb.SoraniNormalizer.normalize | 2025-04-03T00:17:24.000398Z | 2026-02-26T15:05:21.477837Z |
| osv-2022-867 | Heap-buffer-overflow in get_utf_8_string | 2022-09-09T00:01:54.157712Z | 2026-02-26T15:03:06.284832Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0042 | CRL Distribution Point Scope Check Logic Error in AWS-LC | 2026-03-19T12:00:00Z | 2026-03-20T17:11:58Z |
| rustsec-2023-0103 | `postgress` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0102 | `serd` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0101 | `oncecell` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0100 | `xrvrv` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0099 | `envlogger` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0098 | `if-cfg` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0097 | `lazystatic` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2026-0040 | `tracing-ethers` was removed from crates.io due to malicious code | 2026-03-14T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0039 | `chrono_anchor` was removed from crates.io due to malicious code | 2026-03-10T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0036 | `time-sync` was removed from crates.io due to malicious code | 2026-03-04T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0032 | `dnp3times` was removed from crates.io due to malicious code | 2026-03-04T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0031 | `time_calibrators` was removed from crates.io due to malicious code | 2026-03-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0030 | `time_calibrator` was removed from crates.io due to malicious code | 2026-03-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0028 | `tracing_checks` was removed from crates.io for transitively including malicious code | 2026-02-26T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0027 | `tracings` was removed from crates.io for malicious code | 2026-02-26T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0019 | `tracing-check` was removed from crates.io for malicious code | 2026-02-24T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0018 | `rpc-check` was removed from crates.io for malicious code | 2026-02-24T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0017 | `clob-sdk` was removed from crates.io for malicious code | 2026-02-20T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0016 | `polymarkets-rs-clob-client` was removed from crates.io for malicious code | 2026-02-20T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0015 | `polymarkets-client-sdk` was removed from crates.io for malicious code | 2026-02-19T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0014 | `rpc-check` was removed from crates.io for malicious code | 2026-02-19T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0011 | `polymarket-client-sdks` was removed from crates.io for malicious code | 2026-02-13T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0010 | `polymarket-clients-sdk` was removed from crates.io for malicious code | 2026-02-06T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0152 | `finch_cli_rust` was removed from crates.io for malicious code | 2025-12-09T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0151 | `sha-rst` was removed from crates.io for malicious code | 2025-12-09T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0150 | `finch-rst` was removed from crates.io for malicious code | 2025-12-09T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0148 | `finch-rust` was removed from crates.io for malicious code | 2025-12-05T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0147 | `evm-units` was removed from crates.io for malicious code | 2025-12-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0146 | `sha-rust` was removed from crates.io for malicious code | 2025-12-05T12:00:00Z | 2026-03-17T22:31:38Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-tomcat-2026-34500 | Apache Tomcat: OCSP checks sometimes soft-fail with FFM even when soft-fail is disabled | 2026-04-13T10:20:02.205Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-34487 | Apache Tomcat: Cloud membership for clustering component exposed the Kubernetes bearer token | 2026-04-13T10:20:00.791Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-34483 | Apache Tomcat: Incomplete escaping of JSON access logs | 2026-04-13T10:19:58.030Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-29145 | Apache Tomcat, Apache Tomcat Native: OCSP checks sometimes soft-fail even when soft-fail is disabled | 2026-04-13T10:19:53.698Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-25854 | Apache Tomcat: Occasionally open redirect | 2026-04-13T10:19:50.972Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-24880 | Apache Tomcat: Request smuggling via invalid chunk extension | 2026-04-13T10:19:49.629Z | 2026-04-13T10:42:00.723Z |
| bit-mongodb-2026-4148 | ExpressionContext use-after-free in classic engine $lookup and $graphLookup aggregation operators | 2026-04-13T10:13:07.402Z | 2026-04-13T10:42:00.723Z |
| bit-mongodb-2026-4147 | Stack memory disclosure in filemd5 command | 2026-04-13T10:13:04.983Z | 2026-04-13T10:42:00.723Z |
| bit-minio-2026-39414 | MinIO affected a DoS via Unbounded Memory Allocation in S3 Select CSV Parsing | 2026-04-13T10:10:51.384Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-34486 | Apache Tomcat: Fix for CVE-2026-29146 allowed bypass of EncryptInterceptor | 2026-04-13T05:53:08.595Z | 2026-04-13T06:11:47.324Z |
| bit-tomcat-2026-32990 | Apache Tomcat: Fix for CVE-2025-66614 is incomplete | 2026-04-13T05:53:05.369Z | 2026-04-13T06:11:47.324Z |
| bit-tomcat-2026-29129 | Apache Tomcat: TLS cipher order is not preserved | 2026-04-13T05:53:00.617Z | 2026-04-13T06:11:47.324Z |
| bit-tomcat-2026-24734 | Apache Tomcat Native, Apache Tomcat: OCSP revocation bypass | 2026-02-20T09:53:00.269Z | 2026-04-13T06:11:47.324Z |
| bit-node-2026-21717 | 2026-04-06T07:58:47.295Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21716 | 2026-04-06T07:58:44.008Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21715 | 2026-04-06T07:58:41.424Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21714 | 2026-04-06T07:58:38.953Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21713 | 2026-04-06T07:58:36.353Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21710 | 2026-04-06T07:58:28.068Z | 2026-04-13T06:11:47.324Z | |
| bit-logstash-2026-33466 | Improper Limitation of a Pathname to a Restricted Directory in Logstash Leading to Arbitrary File Write | 2026-04-13T05:42:10.653Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-4498 | Execution with Unnecessary Privileges in Kibana Leading to reading index data beyond their direct Elasticsearch RBAC scope | 2026-04-13T05:42:05.042Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-33461 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:42:03.441Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-33460 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:42:01.870Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-33459 | Uncontrolled Resource Consumption in Kibana Leading to Denial of Service | 2026-04-13T05:42:00.230Z | 2026-04-13T06:11:47.324Z |
| bit-helm-2026-35206 | Helm Chart extraction output directory collapse via `Chart.yaml` name dot-segment | 2026-04-13T05:40:36.770Z | 2026-04-13T06:11:47.324Z |
| bit-helm-2026-35205 | Helm's plugin verification fails open when .prov is missing, allowing unsigned plugin install | 2026-04-13T05:40:35.063Z | 2026-04-13T06:11:47.324Z |
| bit-helm-2026-35204 | Helm has a path traversal in plugin metadata version enables arbitrary file write outside Helm plugin directory | 2026-04-13T05:40:33.104Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-32280 | Unexpected work during chain building in crypto/x509 | 2026-04-13T05:43:38.849Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-4916 | Missing Authorization in GitLab | 2026-04-13T06:10:14.681Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-4332 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-04-13T06:10:11.039Z | 2026-04-13T06:11:47.324Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-li54613 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T02:45:58.881296Z | 2026-04-03T07:10:19Z |
| cleanstart-2026-dm62512 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.35.0-r0 | 2026-04-06T02:48:21.440386Z | 2026-04-03T06:57:54Z |
| cleanstart-2026-lc01167 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-p77j-4mvh-x3m3 applied in versions: 8.4.0-r0, 8.4.0-r1, 8.4.0-r2 | 2026-04-06T02:48:42.431061Z | 2026-04-03T06:52:41Z |
| cleanstart-2026-gm09342 | Security fixes for CVE-2025-68121, CVE-2026-26958, ghsa-fw7p-63qq-7hpr, ghsa-mqqf-5wvp-8fh8 applied in versions: 0.29.0-r0, 0.29.0-r1 | 2026-04-06T02:48:25.848581Z | 2026-04-03T06:51:44Z |
| cleanstart-2026-hl08143 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-06T02:48:38.996528Z | 2026-04-03T06:50:37Z |
| cleanstart-2026-gn22652 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq applied in versions: 3.7.2-r4, 3.7.2-r5 | 2026-04-06T02:48:55.605608Z | 2026-04-03T06:50:37Z |
| cleanstart-2026-dm25112 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T02:48:32.316783Z | 2026-04-03T06:50:37Z |
| cleanstart-2026-ny32236 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T02:49:48.749661Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-io43826 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T02:49:47.698715Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-an95970 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-06T02:49:57.502118Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-ag21538 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-06T02:50:01.578746Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-ip72442 | Security fixes for CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1 | 2026-04-06T02:52:00.185166Z | 2026-04-01T14:41:16Z |
| cleanstart-2026-nb78893 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-64715, CVE-2025-68119, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, CVE-2026-33726 applied in versions: 0.13.3-r0, 0.13.3-r1 | 2026-04-06T02:52:24.792809Z | 2026-04-01T13:08:16Z |
| cleanstart-2026-mq18886 | Security fixes for CVE-2026-22735, CVE-2026-22737 applied in versions: 6.2.3-r0 | 2026-04-06T02:52:03.544300Z | 2026-04-01T11:39:45Z |
| cleanstart-2026-ly39171 | Security fixes for CVE-2026-33186 applied in versions: 3.1.4-r0 | 2026-04-06T02:51:58.911697Z | 2026-04-01T11:39:45Z |
| cleanstart-2026-kc06018 | Security fixes for CVE-2017-12158, CVE-2017-12159, ghsa-3p8m-j85q-pgmj, ghsa-45p5-v273-3qqr, ghsa-4cx2-fc23-5wg6, ghsa-5rfx-cp42-p624, ghsa-72hv-8253-57qq, ghsa-84h7-rjj3-6jx4, ghsa-9342-92gg-6v29, ghsa-cbdj-484d-3x9q, ghsa-fghv-69vj-qj49, ghsa-h5fg-jpgr-rv9c, ghsa-hq9p-pm7w-8p54, ghsa-j288-q9x7-2f5v, ghsa-pwqr-wmgm-9rr8, ghsa-w9fj-cfpg-grvv applied in versions: 26.1.4-r1, 26.5.0-r0, 26.5.0-r1, 26.5.0-r2, 26.5.6-r3 | 2026-04-06T02:52:37.677608Z | 2026-04-01T11:37:49Z |
| cleanstart-2026-po55014 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-06T02:53:00.589014Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-mu54962 | Security fixes for ghsa-527x-5wrf-22m2, ghsa-g754-hx8w-x2g6, ghsa-jgfp-53c3-624w, ghsa-px8v-pp82-rcvr, ghsa-vv39-3w5q-974q applied in versions: 1.25.0-r0, 1.26.7-r0 | 2026-04-06T02:54:48.662994Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-hj96712 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq applied in versions: 3.7.2-r4, 3.7.2-r5 | 2026-04-06T02:53:02.079256Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-bl95928 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T02:52:47.736498Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-eb74978 | Security fixes for CVE-2020-8912, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1 | 2026-04-01T09:05:49.917651Z | 2026-03-31T15:18:53Z |
| cleanstart-2026-bk28579 | Security fixes for CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1 | 2026-04-01T09:05:31.827204Z | 2026-03-31T15:16:59Z |
| cleanstart-2026-is43446 | Security fixes for ghsa-25qh-j22f-pwp8, ghsa-389x-839f-4rhx, ghsa-3p8m-j85q-pgmj, ghsa-4g8c-wm8x-jfhw, ghsa-5jpm-x58v-624v, ghsa-72hv-8253-57qq, ghsa-84h7-rjj3-6jx4, ghsa-fghv-69vj-qj49, ghsa-jq43-27x9-3v86, ghsa-pwqr-wmgm-9rr8, ghsa-qqpg-mvqg-649v, ghsa-w9fj-cfpg-grvv, ghsa-xq3w-v528-46rv applied in versions: 0.1.109-r0, 0.1.109-r1, 0.1.111-r2 | 2026-04-01T09:05:58.458627Z | 2026-03-31T07:55:31Z |
| cleanstart-2026-ch77232 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 18.7.1-r0 | 2026-04-01T09:06:04.906254Z | 2026-03-31T07:29:33Z |
| cleanstart-2026-is74202 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:09:55.185988Z | 2026-03-31T04:38:08Z |
| cleanstart-2026-ls30652 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-47914, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-33186, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-p84v-gxvw-73pf applied in versions: 3.7.0-r0, 3.7.11-r0, 3.7.3-r0, 3.7.4-r0, 3.7.6-r0, 3.7.9-r0, 3.7.9-r1, 3.7.9-r2, 4.0.2-r0 | 2026-04-01T09:07:01.631355Z | 2026-03-30T12:04:05Z |
| cleanstart-2026-hk71313 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw applied in versions: 0.12.0-r0, 0.12.0-r1, 0.12.0-r2 | 2026-04-01T09:06:39.410428Z | 2026-03-30T06:53:15Z |
| cleanstart-2026-li04631 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.79.0-r0, 1.79.0-r2, 1.79.0-r3 | 2026-04-01T09:08:44.082129Z | 2026-03-28T10:16:19Z |
| cleanstart-2026-bk44511 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.78.0-r0, 1.78.0-r2, 1.78.0-r3 | 2026-04-01T09:08:47.105116Z | 2026-03-28T10:16:01Z |
| cleanstart-2026-ld15132 | Security fixes for CVE-2020-8912, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-6g7g-w4f8-9c9x, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 0.142.0-r0, 0.144.0-r0, 0.144.0-r1, 0.144.0-r2, 0.144.0-r3 | 2026-04-01T09:09:25.500286Z | 2026-03-28T10:14:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2025-058 | 2025-05-14T18:04:44.000Z | 2025-05-29T18:19:12.000Z | |
| drupal-contrib-2025-059 | 2025-05-14T18:04:52.000Z | 2025-05-29T18:18:54.000Z | |
| drupal-contrib-2025-069 | 2025-05-21T17:29:25.000Z | 2025-05-29T18:17:38.000Z | |
| drupal-contrib-2025-070 | 2025-05-28T17:41:20.000Z | 2025-05-29T18:17:25.000Z | |
| drupal-contrib-2025-071 | 2025-05-28T17:43:23.000Z | 2025-05-29T18:17:12.000Z | |
| drupal-contrib-2025-072 | 2025-05-28T17:43:44.000Z | 2025-05-29T18:16:59.000Z | |
| drupal-contrib-2025-073 | 2025-05-28T17:44:12.000Z | 2025-05-29T18:16:49.000Z | |
| drupal-contrib-2025-074 | 2025-05-28T17:44:33.000Z | 2025-05-29T18:16:36.000Z | |
| drupal-contrib-2025-075 | 2025-05-28T17:45:37.000Z | 2025-05-29T18:16:19.000Z | |
| drupal-contrib-2025-076 | 2025-05-28T17:46:09.000Z | 2025-05-29T18:15:56.000Z | |
| drupal-contrib-2025-068 | 2025-05-21T17:29:14.000Z | 2025-05-21T17:29:14.000Z | |
| drupal-contrib-2025-067 | 2025-05-21T17:28:55.000Z | 2025-05-21T17:28:55.000Z | |
| drupal-contrib-2025-066 | 2025-05-21T17:28:47.000Z | 2025-05-21T17:28:47.000Z | |
| drupal-contrib-2025-065 | 2025-05-21T17:28:31.000Z | 2025-05-21T17:28:31.000Z | |
| drupal-contrib-2025-064 | 2025-05-21T17:28:11.000Z | 2025-05-21T17:28:11.000Z | |
| drupal-contrib-2025-057 | 2025-05-14T18:04:31.000Z | 2025-05-14T19:39:43.000Z | |
| drupal-contrib-2025-063 | 2025-05-14T18:05:32.000Z | 2025-05-14T18:05:32.000Z | |
| drupal-contrib-2025-062 | 2025-05-14T18:05:22.000Z | 2025-05-14T18:05:22.000Z | |
| drupal-contrib-2025-061 | 2025-05-14T18:05:13.000Z | 2025-05-14T18:05:13.000Z | |
| drupal-contrib-2025-060 | 2025-05-14T18:05:04.000Z | 2025-05-14T18:05:04.000Z | |
| drupal-contrib-2025-056 | 2025-05-07T17:08:31.000Z | 2025-05-07T17:16:40.000Z | |
| drupal-contrib-2025-055 | 2025-05-07T17:07:46.000Z | 2025-05-07T17:16:36.000Z | |
| drupal-contrib-2025-054 | 2025-05-07T17:07:32.000Z | 2025-05-07T17:16:32.000Z | |
| drupal-contrib-2025-053 | 2025-05-07T17:07:22.000Z | 2025-05-07T17:16:27.000Z | |
| drupal-contrib-2025-052 | 2025-05-07T17:07:14.000Z | 2025-05-07T17:16:21.000Z | |
| drupal-contrib-2025-047 | 2025-05-07T17:06:16.000Z | 2025-05-07T17:06:16.000Z | |
| drupal-contrib-2025-033 | 2025-04-09T17:04:56.000Z | 2025-04-29T07:18:22.000Z | |
| drupal-contrib-2025-046 | 2025-04-23T16:59:33.000Z | 2025-04-23T16:59:33.000Z | |
| drupal-contrib-2025-045 | 2025-04-23T16:59:19.000Z | 2025-04-23T16:59:19.000Z | |
| drupal-contrib-2025-044 | 2025-04-23T16:59:11.000Z | 2025-04-23T16:59:11.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2020-ale-023 | Multiples vulnérabilités dans Google Chrome | 2020-11-12T00:00:00.000000 | 2020-12-04T00:00:00.000000 |
| certfr-2020-ale-018 | Vulnérabilité dans Cisco ASA et FTD | 2020-07-28T00:00:00.000000 | 2020-11-05T00:00:00.000000 |
| certfr-2020-ale-017 | Multiples vulnérabilités dans SAP Netweaver AS JAVA | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| certfr-2020-ale-016 | Vulnérabilité dans Microsoft Domain Name System (DNS) Server | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| certfr-2020-ale-015 | Vulnérabilité dans F5 BIG-IP | 2020-07-05T00:00:00.000000 | 2020-09-15T00:00:00.000000 |
| certfr-2020-ale-014 | Vulnérabilité dans Palo Alto Networks PAN-OS | 2020-07-03T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-012 | Multiples vulnérabilités dans SaltStack | 2020-05-04T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-008 | Vulnérabilité dans l'implémentation du protocole SMB par Microsoft | 2020-03-11T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-002 | Vulnérabilité dans les produits Citrix ADC et Citrix Gateway | 2020-01-09T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-013 | Multiples vulnérabilités dans Microsoft Windows | 2020-07-01T00:00:00.000000 | 2020-07-05T00:00:00.000000 |
| certfr-2020-ale-011 | Multiples vulnérabilités dans les produits Microsoft qui utilisent la bibliothèque Autodesk FBX | 2020-04-22T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-ale-009 | Multiples vulnérabilités dans Microsoft Windows | 2020-03-24T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-ale-010 | Multiples vulnérabilités dans Mozilla Firefox | 2020-04-06T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-007 | Vulnérabilité dans Microsoft Exchange Server | 2020-02-27T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-001 | Multiples vulnérabilités dans les produits de Pulse Secure | 2020-01-09T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2020-01-20T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-ale-005 | Multiples vulnérabilités dans le serveur de passerelle RDP de Windows | 2020-01-14T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-ale-003 | Vulnérabilité dans les produits Mozilla | 2020-01-09T00:00:00.000000 | 2020-01-20T00:00:00.000000 |
| certfr-2020-ale-004 | Vulnérabilité dans Microsoft Windows | 2020-01-14T00:00:00.000000 | 2020-01-17T00:00:00.000000 |
| certfr-2019-ale-015 | Multiples vulnérabilités dans Google Chrome | 2019-11-04T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2019-ale-014 | Vulnérabilité dans PHP | 2019-10-29T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2019-ale-013 | Vulnérabilité dans Microsoft Internet Explorer | 2019-09-24T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-012 | Multiples vulnérabilités dans Microsoft Remote Desktop Services | 2019-08-14T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-006 | Vulnérabilité dans Microsoft Remote Desktop Services | 2019-05-22T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-011 | Vulnérabilité dans Oracle WebLogic | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-010 | Vulnérabilité dans Mozilla Firefox | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-009 | Vulnérabilité dans Exim | 2019-06-11T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-008 | Vulnérabilité dans Microsoft SharePoint Server | 2019-05-29T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-007 | Vulnérabilité dans le serveur DHCP de Windows | 2019-05-15T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| certfr-2019-ale-005 | Vulnérabilité dans Oracle WebLogic | 2019-04-26T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0367 | Multiples vulnérabilités dans Zabbix | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0366 | Multiples vulnérabilités dans Traefik | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0365 | Multiples vulnérabilités dans Spring AI | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0364 | Multiples vulnérabilités dans les produits Siemens | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0363 | Multiples vulnérabilités dans les produits NetApp | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0300 | Multiples vulnérabilités dans Mattermost Server | 2026-03-17T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0133 | Multiples vulnérabilités dans Roundcube | 2026-02-09T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0362 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0361 | Multiples vulnérabilités dans Cisco IOS et IOS XE | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0360 | Multiples vulnérabilités dans ISC BIND | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0359 | Multiples vulnérabilités dans Grafana | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0201 | Multiples vulnérabilités dans Mattermost Server | 2026-02-24T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0358 | Vulnérabilité dans Citrix XenServer | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0357 | Multiples vulnérabilités dans GitLab | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0356 | Vulnérabilité dans ISC Kea | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0355 | Multiples vulnérabilités dans les produits Apple | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0354 | Multiples vulnérabilités dans les produits Mozilla | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0353 | Multiples vulnérabilités dans Zabbix | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0352 | Multiples vulnérabilités dans les produits F5 | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0351 | Vulnérabilité dans Tenable OT Platform | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0350 | Multiples vulnérabilités dans Squid | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0349 | Multiples vulnérabilités dans Ruby on Rails | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0348 | Vulnérabilité dans Trend Micro Deep Discovery Inspector | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0347 | Vulnérabilité dans Xen | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0346 | Vulnérabilité dans VMware Tanzu pour Postgres | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0345 | Vulnérabilité dans LibreNMS | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0344 | Vulnérabilité dans strongSwan | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0343 | Vulnérabilité dans Spring Cloud Config | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0342 | Multiples vulnérabilités dans Google Chrome | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0341 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-001380 | Multiple vulnerabilities in Canon Small Office Multifunction Printers and Laser Printers | 2026-01-19T10:08+09:00 | 2026-01-19T10:08+09:00 |
| jvndb-2026-000007 | Multiple Vulnerabilities in TOA Network Cameras TRIFORA 3 series | 2026-01-16T15:06+09:00 | 2026-01-16T15:06+09:00 |
| jvndb-2025-022878 | Media Player MP-01 vulnerable to Missing Authentication for Critical Function | 2025-12-24T11:10+09:00 | 2026-01-15T11:10+09:00 |
| jvndb-2026-000006 | Chainlit vulnerable to improper access restriction | 2026-01-14T17:03+09:00 | 2026-01-14T17:03+09:00 |
| jvndb-2026-000002 | Multiple vulnerabilities in multiple NEC branded projectors manufactured by Sharp Display Solutions, Ltd. | 2026-01-07T14:10+09:00 | 2026-01-14T16:54+09:00 |
| jvndb-2026-000005 | Multiple vulnerabilities in EATON UPS Companion | 2026-01-13T19:01+09:00 | 2026-01-13T19:01+09:00 |
| jvndb-2026-000003 | RICOH Streamline NX vulnerable to improper authorization | 2026-01-09T18:17+09:00 | 2026-01-09T18:17+09:00 |
| jvndb-2026-000004 | The installers for multiple PIONEER products may insecurely load Dynamic Link Libraries | 2026-01-08T13:47+09:00 | 2026-01-08T13:47+09:00 |
| jvndb-2026-000001 | Origin validation error vulnerability in Fujitsu Security Solution AuthConductor Client Basic V2 | 2026-01-07T14:19+09:00 | 2026-01-07T14:19+09:00 |
| jvndb-2026-001001 | Authentication bypass vulnerability in OpenBlocks series | 2026-01-07T10:46+09:00 | 2026-01-07T10:46+09:00 |
| jvndb-2025-019621 | EPSON WebConfig / Epson Web Control for SEIKO EPSON Projector Products do not restrict excessive authentication attempts | 2025-11-21T15:31+09:00 | 2025-12-24T10:54+09:00 |
| jvndb-2025-014967 | Multiple vulnerabilities in multiple Keyence products | 2025-10-03T11:19+09:00 | 2025-12-23T14:36+09:00 |
| jvndb-2025-000117 | SEIKO EPSON printer Web Config vulnerable to stack-based buffer overflow | 2025-12-16T15:31+09:00 | 2025-12-23T11:57+09:00 |
| jvndb-2025-022400 | Ruijie Networks AP180 Series vulnerable to OS command injection | 2025-12-19T12:33+09:00 | 2025-12-19T12:33+09:00 |
| jvndb-2025-000118 | GROWI vulnerable to cross-site request forgery | 2025-12-17T13:04+09:00 | 2025-12-17T13:04+09:00 |
| jvndb-2025-022062 | Multiple vulnerabilities in CHOCO TEI WATCHER mini | 2025-12-17T11:28+09:00 | 2025-12-17T11:28+09:00 |
| jvndb-2025-000115 | QND vulnerable to privilege escalation | 2025-12-11T14:33+09:00 | 2025-12-11T14:33+09:00 |
| jvndb-2025-000113 | Multiple vulnerabilities in GroupSession | 2025-12-08T17:48+09:00 | 2025-12-11T11:30+09:00 |
| jvndb-2025-000091 | Multiple I-O DATA NAS management applications register Windows services with unquoted file paths | 2025-10-22T15:04+09:00 | 2025-12-10T16:20+09:00 |
| jvndb-2021-000081 | Multiple vulnerabilities in Sharp NEC Display Solutions' public displays | 2021-09-17T15:13+09:00 | 2025-12-10T10:24+09:00 |
| jvndb-2025-021305 | Android App "Brother iPrint&Scan" improper use of an external cache directory | 2025-12-09T17:25+09:00 | 2025-12-09T17:25+09:00 |
| jvndb-2025-000114 | ELECOM Clone for Windows registers a Windows service with an unquoted file path | 2025-12-09T17:16+09:00 | 2025-12-09T17:16+09:00 |
| jvndb-2025-000116 | GS Yuasa FULLBACK Manager Pro registers Windows services with unquoted file paths | 2025-12-08T14:06+09:00 | 2025-12-08T14:06+09:00 |
| jvndb-2025-000094 | Multiple vulnerabilities in ABB Terra AC Wallbox | 2025-12-05T14:12+09:00 | 2025-12-05T14:12+09:00 |
| jvndb-2025-000112 | Installer of INZONE Hub may insecurely load Dynamic Link Libraries | 2025-11-28T13:36+09:00 | 2025-11-28T13:36+09:00 |
| jvndb-2025-000111 | SwitchBot Smart Video Doorbell vulnerable to active debug code | 2025-11-26T14:35+09:00 | 2025-11-26T14:35+09:00 |
| jvndb-2025-000110 | Multiple vulnerabilities in Security Point (Windows) of MaLion | 2025-11-25T17:17+09:00 | 2025-11-25T17:17+09:00 |
| jvndb-2025-000109 | Multiple vulnerabilities in SNC-CX600W | 2025-11-25T14:59+09:00 | 2025-11-25T14:59+09:00 |
| jvndb-2025-000108 | "FOD" App uses hard-coded cryptographic keys | 2025-11-25T14:15+09:00 | 2025-11-25T14:15+09:00 |
| jvndb-2025-000106 | Multiple vulnerabilities in LogStare Collector | 2025-11-21T16:27+09:00 | 2025-11-21T16:27+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-16582 | Adobe Commerce跨站脚本漏洞(CNVD-2026-16582) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16581 | Adobe Commerce安全绕过漏洞(CNVD-2026-16581) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16580 | Adobe Commerce安全绕过漏洞(CNVD-2026-16580) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16579 | Adobe Commerce安全绕过漏洞(CNVD-2026-16579) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16578 | Adobe Commerce安全绕过漏洞(CNVD-2026-16578) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16577 | WordPress插件Easy Post Submission存在未明漏洞 | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16576 | WordPress插件Eagle BookingSQL注入漏洞 | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16412 | HCL AION信息泄露漏洞(CNVD-2026-16412) | 2025-10-20 | 2026-04-09 |
| cnvd-2026-16411 | HCL AION代码执行漏洞(CNVD-2026-16411) | 2025-10-20 | 2026-04-09 |
| cnvd-2026-16410 | HCL AION存在未明漏洞(CNVD-2026-16410) | 2026-01-29 | 2026-04-09 |
| cnvd-2026-16409 | HCL AION信息泄露漏洞(CNVD-2026-16409) | 2026-01-29 | 2026-04-09 |
| cnvd-2026-16408 | HCL AION文件上传漏洞 | 2026-01-29 | 2026-04-09 |
| cnvd-2026-16407 | HCL AION存在未明漏洞(CNVD-2026-16407) | 2026-01-29 | 2026-04-09 |
| cnvd-2026-16406 | HCL AION存在未明漏洞(CNVD-2026-16406) | 2026-01-29 | 2026-04-09 |
| cnvd-2026-16405 | HCL AION信息泄露漏洞(CNVD-2026-16405) | 2026-01-29 | 2026-04-09 |
| cnvd-2026-16403 | HCL AION信息泄露漏洞(CNVD-2026-16403) | 2026-02-11 | 2026-04-09 |
| cnvd-2026-16402 | HCL AION存在未明漏洞(CNVD-2026-16402) | 2026-02-11 | 2026-04-09 |
| cnvd-2026-16404 | HCL AION安全绕过漏洞(CNVD-2026-16404) | 2026-01-29 | 2026-04-08 |
| cnvd-2026-16401 | HCL AION跨站请求伪造漏洞 | 2026-02-11 | 2026-04-08 |
| cnvd-2026-16400 | HCL AION跨站脚本漏洞 | 2026-02-11 | 2026-04-08 |
| cnvd-2026-16399 | HCL AION存在未明漏洞(CNVD-2026-16399) | 2026-02-11 | 2026-04-08 |
| cnvd-2026-16398 | HCL AION命令注入漏洞 | 2026-02-11 | 2026-04-08 |
| cnvd-2026-16397 | HCL AION信息泄露漏洞(CNVD-2026-16397) | 2026-02-11 | 2026-04-08 |
| cnvd-2026-16396 | HCL AION拒绝服务漏洞 | 2026-03-19 | 2026-04-08 |
| cnvd-2026-16395 | OpenClaw权限提升漏洞(CNVD-2026-16395) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16394 | OpenClaw任意代码执行漏洞(CNVD-2026-16394) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16393 | OpenClaw沙盒逃逸漏洞 | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16392 | OpenClaw存在未明漏洞(CVE-2026-32913) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16391 | OpenClaw存在未明漏洞(CNVD-2026-16391) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16390 | OpenClaw拒绝服务漏洞(CNVD-2026-16390) | 2026-03-26 | 2026-04-08 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15785 | Уязвимость компонента imxfb ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15782 | Уязвимость компонента cpcap-charger ядра операционной системы Linux, позволяющая нарушите… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15781 | Уязвимость компонента davinci ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15780 | Уязвимость компонента net/netfilter/xt_nfacct.c ядра операционной системы Linux, позволяю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15779 | Уязвимость компонента net/mac80211/tdls.c ядра операционной системы Linux, позволяющая на… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15778 | Уязвимость компонента net/mlx5 ядра операционной системы Linux, позволяющая нарушителю вы… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15776 | Уязвимость компонента fs/f2fs/f2fs.h ядра операционной системы Linux, позволяющая нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15773 | Уязвимость компонента ice/ice_ddp.c ядра операционной системы Linux, позволяющая нарушите… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15772 | Уязвимость компонента netlink ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15771 | Уязвимость компонента drivers/regulator/core.c ядра операционной системы Linux, позволяющ… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15770 | Уязвимость компонента arm64/entry ядра операционной системы Linux, позволяющая нарушителю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15769 | Уязвимость компонента drivers/i2c/busses/i2c-qup.c ядра операционной системы Linux, позво… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15767 | Уязвимость ядра операционной системы Linux, связанная с чтением за границами буфера памят… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15766 | Уязвимость компонента venus ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15765 | Уязвимость компонента uvcvideo ядра операционной системы Linux, позволяющая нарушителю вы… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15764 | Уязвимость компонента mm/ptdump ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15763 | Уязвимость компонента hv_netvsc ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15762 | Уязвимость компонента net/sched ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15761 | Уязвимость компонента media ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15760 | Уязвимость компонента media/dvb-frontends/dib7000p.c ядра операционной системы Linux, поз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15759 | Уязвимость компонента lpfc/lpfc_scsi.c ядра операционной системы Linux, позволяющая наруш… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15758 | Уязвимость компонента mips/kernel/process.c ядра операционной системы Linux, позволяющая … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15757 | Уязвимость компонента jfs/jfs_dmap.c ядра операционной системы Linux, позволяющая нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15756 | Уязвимость компонента scsi/bfa/bfad_im.c ядра операционной системы Linux, позволяющая нар… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15755 | Уязвимость компонента scsi/libiscsi.c ядра операционной системы Linux, позволяющая наруши… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15753 | Уязвимость компонента sound/soc/soc-core.c ядра операционной системы Linux, позволяющая н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15752 | Уязвимость компонента fs/hfsplus/xattr.c ядра операционной системы Linux, позволяющая нар… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15751 | Уязвимость компонента fs/hfs/bnode.c ядра операционной системы Linux, позволяющая нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15750 | Уязвимость компонента nf_conntrack_netlink.c ядра операционной системы Linux, позволяющая… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15749 | Уязвимость компонента fs/nfsd/nfs4state.c ядра операционной системы Linux, позволяющая на… | 15.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201905-0710 | Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors ut… | 2026-04-10T23:30:52.435000Z |
| var-201904-1419 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-04-10T23:30:45.817000Z |
| var-200603-0275 | Stack-based buffer overflow in Safari in Mac OS X 10.4.5 and earlier, and 10.3.9 and earl… | 2026-04-10T23:30:45.399000Z |
| var-201702-0868 | An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari … | 2026-04-10T23:30:44.085000Z |
| var-201502-0366 | named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when D… | 2026-04-10T23:30:42.934000Z |
| var-201501-0339 | The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 b… | 2026-04-10T23:30:42.866000Z |
| var-200803-0019 | Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might … | 2026-04-10T23:30:34.903000Z |
| var-200712-0604 | Double free vulnerability in the gss_krb5int_make_seal_token_v3 function in lib/gssapi/kr… | 2026-04-10T23:30:33.322000Z |
| var-201205-0016 | The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified M… | 2026-04-10T23:30:28.954000Z |
| var-200608-0036 | Integer overflow in ImageIO in Apple Mac OS X 10.4.7 allows user-assisted attackers to ca… | 2026-04-10T23:30:28.767000Z |
| var-201409-1155 | GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed functi… | 2026-04-10T23:30:28.561000Z |
| var-201512-0008 | The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent at… | 2026-04-10T23:30:12.492000Z |
| var-201006-1131 | WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4… | 2026-04-10T23:29:42.274000Z |
| var-201605-0076 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL bef… | 2026-04-10T23:29:41.728000Z |
| var-201603-0244 | Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and… | 2026-04-10T23:29:40.940000Z |
| var-200608-0031 | Stack-based buffer overflow in bootpd in the DHCP component for Apple Mac OS X 10.3.9 and… | 2026-04-10T23:29:06.750000Z |
| var-202003-1777 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2026-04-10T23:29:04.264000Z |
| var-201901-1586 | In Safari before 11.1.2, iTunes before 12.8 for Windows, iOS before 11.4.1, tvOS before 1… | 2026-04-10T23:29:04.125000Z |
| var-200809-0188 | Integer overflow in Apple QuickTime before 7.5.5 on Windows allows remote attackers to ex… | 2026-04-10T23:29:01.689000Z |
| var-202105-1461 | A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in fun… | 2026-04-10T23:29:01.499000Z |
| var-201110-0380 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2026-04-10T23:28:26.796000Z |
| var-201302-0147 | Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on … | 2026-04-10T23:28:24.344000Z |
| var-200603-0270 | Unspecified vulnerability in Safari, LaunchServices, and/or CoreTypes in Apple Mac OS X 1… | 2026-04-10T23:28:22.763000Z |
| var-201110-0388 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2026-04-10T23:28:21.183000Z |
| var-202201-0295 | The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhan… | 2026-04-10T23:28:20.182000Z |
| var-202206-1900 | curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverrespon… | 2026-04-10T23:28:19.708000Z |
| var-201912-0124 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-04-10T23:27:44.850000Z |
| var-201206-0064 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-04-10T23:27:44.735000Z |
| var-201504-0147 | cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which a… | 2026-04-10T23:26:35.745000Z |
| var-201912-0629 | A logic issue was addressed with improved state management. This issue is fixed in tvOS 1… | 2026-04-10T23:26:34.862000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2024-029 | Phoenix Contact: Unbounded growth of OpenSSL session cache in multiple FL MGUARD devices | 2024-06-11T06:00:00.000Z | 2024-06-11T06:00:00.000Z |
| vde-2024-019 | Phoenix Contact: Multiple vulnerabilities in the Firmware of CHARX SEC charge controllers | 2024-05-14T06:00:00.000Z | 2024-05-14T06:00:00.000Z |
| vde-2024-011 | PHOENIX CONTACT: Multiple vulnerabilities in CHARX SEC charge controllers | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| vde-2023-055 | Phoenix Contact: Automation Worx and classic line controllers prone to Incorrect Permission Assignment for Critical Resource | 2023-12-12T07:00:00.000Z | 2023-12-12T07:00:00.000Z |
| vde-2023-062 | Phoenix Contact: WIBU-SYSTEMS CodeMeter Runtime vulnerabilities in multiple products | 2023-11-21T08:15:00.000Z | 2023-11-21T08:15:00.000Z |
| vde-2023-030 | Phoenix Contact: Multiple products affected by WIBU Codemeter Vulnerability (Update A) | 2023-09-19T06:50:00.000Z | 2023-11-13T11:00:00.000Z |
| vde-2023-004 | Phoenix Contact: Directory Traversal Vulnerability in ENERGY AXC PU Web service | 2023-04-11T08:00:00.000Z | 2023-04-11T08:00:00.000Z |
| vde-2022-018 | PHOENIX CONTACT: Multiple vulnerabilities in RAD-ISM-900-EN-BD devices | 2022-05-11T14:20:00.000Z | 2022-05-11T14:20:00.000Z |
| vde-2021-046 | PHOENIX CONTACT: XSS and memory-leak in FL MGUARD 1102/1105 | 2021-11-10T07:23:00.000Z | 2021-11-10T07:23:00.000Z |
| vde-2020-049 | Phoenix Contact: Multiple vulnerabilities in PLCnext Control devices < 2021.0 LTS | 2020-12-17T09:00:00.000Z | 2020-12-17T09:00:00.000Z |
| vde-2020-030 | PHOENIX CONTACT: Products utilizing WIBU-SYSTEMS CodeMeter components | 2020-09-09T06:22:00.000Z | 2020-09-09T06:22:00.000Z |
| vde-2020-018 | PHOENIX CONTACT: FL MGUARD, TC MGUARD, TC ROUTER and TC CLOUD CLIENT: PPPD vulnerable to CVE-2020-8597 | 2020-06-02T08:42:00.000Z | 2020-06-02T08:42:00.000Z |
| vde-2020-013 | PHOENIX CONTACT: Local Privilege Escalation in Portico Remote desktop control software | 2020-03-27T09:48:00.000Z | 2020-03-27T09:48:00.000Z |
| vde-2018-015 | Phoenix Contact: AXL F BK PN Denial of Service Vulnerability | 2018-09-21T07:03:00.000Z | 2018-09-21T07:03:00.000Z |
| vde-2018-012 | PHOENIX CONTACT: ILC 1x1 ETH Denial of Service | 2018-08-13T11:55:00.000Z | 2018-08-13T11:55:00.000Z |
| vde-2018-005 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series through 1.33 allows Information Exposure | 2018-05-16T05:35:00.000Z | 2018-05-16T05:35:00.000Z |