Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-6560 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
H3C Magic B0 aspForm Edit_BasicSSID buffer overflow |
H3C |
Magic B0 |
2026-04-19T06:45:14.514Z | 2026-04-20T15:20:44.443Z |
| CVE-2026-6559 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Wavlink WL-WN579A3 login.cgi sub_401F80 cross site scripting |
Wavlink |
WL-WN579A3 |
2026-04-19T05:15:15.503Z | 2026-04-20T16:07:54.597Z |
| CVE-2026-0868 |
6.4 (3.1)
|
EMC Scheduling Manager <= 4.4 - Authenticated (Contrib… |
turn2honey |
EMC – Easily Embed Calendly Scheduling |
2026-04-19T03:26:14.765Z | 2026-04-20T16:53:24.024Z |
| CVE-2026-41242 |
9.4 (4.0)
|
protobufjs has an arbitrary code execution issue |
protobufjs |
protobuf.js |
2026-04-18T16:18:10.652Z | 2026-04-20T16:03:57.689Z |
| CVE-2026-40948 |
N/A
|
Apache Airflow Providers Keycloak: OAuth Login CSRF — … |
Apache Software Foundation |
Apache Airflow Providers Keycloak |
2026-04-18T13:22:41.577Z | 2026-04-20T16:17:53.543Z |
| CVE-2026-2986 |
6.4 (3.1)
|
Contextual Related Posts <= 4.2.1 - Authenticated (Con… |
ajay |
Contextual Related Posts |
2026-04-18T11:16:10.980Z | 2026-04-20T14:19:06.323Z |
| CVE-2026-2505 |
5.4 (3.1)
|
Categories Images <= 3.3.1 - Authenticated (Contributo… |
elzahlan |
Categories Images |
2026-04-18T09:26:52.654Z | 2026-04-20T13:46:07.918Z |
| CVE-2026-0894 |
6.4 (3.1)
|
Content Blocks (Custom Post Widget) <= 3.3.9 - Authent… |
vanderwijk |
Content Blocks (Custom Post Widget) |
2026-04-18T09:26:52.078Z | 2026-04-20T13:48:40.598Z |
| CVE-2026-41254 |
4 (3.1)
|
Little CMS (lcms2) through 2.18 has an integer ov… |
littlecms |
little cms color engine |
2026-04-18T06:43:13.741Z | 2026-04-20T16:09:45.530Z |
| CVE-2026-32690 |
N/A
|
Apache Airflow: 3.x - Nested Variable Secret Values By… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:22:26.081Z | 2026-04-20T16:11:33.956Z |
| CVE-2026-30898 |
N/A
|
Apache Airflow: Bad example of BashOperator shell inje… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:20:48.647Z | 2026-04-22T03:55:38.783Z |
| CVE-2026-30912 |
N/A
|
Apache Airflow: Exposing stack trace in case of constr… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:20:30.254Z | 2026-04-20T16:26:07.128Z |
| CVE-2026-25917 |
N/A
|
Apache Airflow: API extra-links triggers XCom deserial… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:20:11.187Z | 2026-04-22T13:58:49.807Z |
| CVE-2026-32228 |
N/A
|
Apache Airflow: Users with asset materialization permi… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:19:47.512Z | 2026-04-20T15:54:05.072Z |
| CVE-2026-41253 |
6.9 (3.1)
|
In iTerm2 through 3.6.9, displaying a .txt file c… |
iTerm2 |
iTerm2 |
2026-04-18T05:27:08.202Z | 2026-04-20T15:52:10.357Z |
| CVE-2026-6048 |
6.4 (3.1)
|
Flipbox Addon for Elementor <= 2.1.1 - Authenticated (… |
dragwyb |
Flipbox Addon for Elementor |
2026-04-18T03:37:05.751Z | 2026-04-20T13:46:08.081Z |
| CVE-2026-6518 |
8.8 (3.1)
|
CMP – Coming Soon & Maintenance Plugin by NiteoThemes … |
niteo |
CMP – Coming Soon & Maintenance Plugin by NiteoThemes |
2026-04-18T03:37:04.707Z | 2026-04-20T13:46:08.222Z |
| CVE-2026-4801 |
6.4 (3.1)
|
Page Builder Gutenberg Blocks <= 3.1.16 - Authenticate… |
godaddy |
Page Builder Gutenberg Blocks – CoBlocks |
2026-04-18T03:37:03.859Z | 2026-04-20T14:42:38.120Z |
| CVE-2026-40494 |
9.8 (3.1)
|
SAIL has heap buffer overflow in TGA RLE decoder — raw… |
HappySeaFox |
sail |
2026-04-18T01:42:48.830Z | 2026-04-20T14:55:42.859Z |
| CVE-2026-40493 |
9.8 (3.1)
|
SAIL has heap buffer overflow in PSD decoder — bpp mis… |
HappySeaFox |
sail |
2026-04-18T01:41:14.664Z | 2026-04-20T16:15:22.120Z |
| CVE-2026-40492 |
9.8 (3.1)
|
SAIL has heap buffer overflow in XWD decoder — bits_pe… |
HappySeaFox |
sail |
2026-04-18T01:39:48.056Z | 2026-04-20T15:24:42.029Z |
| CVE-2026-40491 |
6.5 (3.1)
|
gdown Affected by Arbitrary File Write via Path Traver… |
wkentaro |
gdown |
2026-04-18T01:36:47.659Z | 2026-04-20T15:50:02.983Z |
| CVE-2026-40490 |
6.8 (3.1)
|
AsyncHttpClient leaks authorization credentials to unt… |
AsyncHttpClient |
async-http-client |
2026-04-18T01:31:13.860Z | 2026-04-20T14:55:50.254Z |
| CVE-2026-1559 |
6.4 (3.1)
|
Youzify <= 1.3.6 - Authenticated (Subscriber+) Stored … |
youzify |
Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress |
2026-04-18T01:26:05.210Z | 2026-04-20T13:46:08.353Z |
| CVE-2026-1838 |
6.1 (3.1)
|
Hostel <= 1.1.6 - Reflected Cross-Site Scripting via '… |
prasunsen |
Hostel |
2026-04-18T01:26:04.643Z | 2026-04-20T14:19:29.627Z |
| CVE-2026-40489 |
8.6 (4.0)
|
editorconfig-core-c has incomplete fix for CVE-2023-0341 |
editorconfig |
editorconfig-core-c |
2026-04-18T01:24:57.278Z | 2026-04-20T16:15:31.570Z |
| CVE-2026-40487 |
8.9 (3.1)
|
Postiz Has Unrestricted File Upload via MIME Type Spoo… |
gitroomhq |
postiz-app |
2026-04-18T01:19:06.588Z | 2026-04-20T15:25:40.893Z |
| CVE-2026-35582 |
8.8 (3.1)
|
Emissary has an OS Command Injection via Unvalidated I… |
NationalSecurityAgency |
emissary |
2026-04-18T01:16:27.661Z | 2026-04-20T15:48:51.543Z |
| CVE-2026-35465 |
7.5 (3.1)
|
SecureDrop Client has path injection in read_gzip_head… |
freedomofpress |
securedrop-client |
2026-04-18T00:41:16.594Z | 2026-04-20T15:47:43.822Z |
| CVE-2026-40572 |
9 (3.1)
|
NovumOS has Arbitrary Memory Mapping via Syscall 15 (M… |
MinecAnton209 |
NovumOS |
2026-04-18T00:16:02.590Z | 2026-04-20T14:55:57.521Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-6580 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
liangliangyy DjangoBlog Amap API Call views.py hard-co… |
liangliangyy |
DjangoBlog |
2026-04-19T22:15:12.387Z | 2026-04-20T14:55:13.830Z |
| CVE-2026-6579 |
6.9 (4.0)
6.5 (3.1)
6.5 (3.0)
|
liangliangyy DjangoBlog Clean Endpoint views.py missin… |
liangliangyy |
DjangoBlog |
2026-04-19T22:00:17.503Z | 2026-04-20T15:18:38.633Z |
| CVE-2026-6578 |
6.3 (4.0)
5.6 (3.1)
5.6 (3.0)
|
liangliangyy DjangoBlog Setting settings.py hard-coded… |
liangliangyy |
DjangoBlog |
2026-04-19T21:15:14.960Z | 2026-04-20T16:12:54.941Z |
| CVE-2026-6577 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
liangliangyy DjangoBlog logtracks Endpoint views.py mi… |
liangliangyy |
DjangoBlog |
2026-04-19T19:30:15.098Z | 2026-04-20T14:06:48.414Z |
| CVE-2026-6576 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
liangliangyy DjangoBlog WeChat Bot commonapi.py Comman… |
liangliangyy |
DjangoBlog |
2026-04-19T19:00:16.264Z | 2026-04-20T16:28:07.032Z |
| CVE-2026-6574 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
osuuu LightPicture API Upload Endpoint lp.sql hard-cod… |
osuuu |
LightPicture |
2026-04-19T13:30:17.265Z | 2026-04-20T14:55:21.489Z |
| CVE-2026-6573 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
PHPEMS Instant Exam Creation exams.master.php temppage… |
n/a |
PHPEMS |
2026-04-19T12:45:14.558Z | 2026-04-20T15:19:11.751Z |
| CVE-2026-6572 |
6.3 (4.0)
5.6 (3.1)
5.6 (3.0)
|
Collabora KodExplorer fileUpload Endpoint share.class.… |
Collabora |
KodExplorer |
2026-04-19T12:15:14.167Z | 2026-04-20T16:11:35.361Z |
| CVE-2026-6571 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
kodcloud KodExplorer systemRole.class.php roleGroupAct… |
kodcloud |
KodExplorer |
2026-04-19T12:00:17.810Z | 2026-04-20T14:18:17.474Z |
| CVE-2026-6570 |
5.1 (4.0)
2.7 (3.1)
2.7 (3.0)
|
kodcloud KodExplorer systemMember.class.php initInstal… |
kodcloud |
KodExplorer |
2026-04-19T11:00:17.545Z | 2026-04-20T16:23:44.786Z |
| CVE-2026-6569 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
kodcloud KodExplorer fileGet Endpoint share.class.php … |
kodcloud |
KodExplorer |
2026-04-19T10:15:11.445Z | 2026-04-20T14:55:28.674Z |
| CVE-2026-6568 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
kodcloud KodExplorer Public Share share.class.php init… |
kodcloud |
KodExplorer |
2026-04-19T09:45:11.131Z | 2026-04-20T15:20:09.531Z |
| CVE-2026-6564 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
EMQ EMQX Enterprise Session Handling improper authorization |
EMQ |
EMQX Enterprise |
2026-04-19T09:30:15.159Z | 2026-04-20T16:09:52.702Z |
| CVE-2026-6563 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
H3C Magic B1 aspForm SetAPWifiorLedInfoById buffer overflow |
H3C |
Magic B1 |
2026-04-19T08:30:14.248Z | 2026-04-20T14:18:45.761Z |
| CVE-2026-6562 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
dameng100 muucmf index.html getListByPage sql injection |
dameng100 |
muucmf |
2026-04-19T08:15:11.633Z | 2026-04-20T16:06:23.786Z |
| CVE-2026-6561 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
EyouCMS Index.php edit_adminlogo unrestricted upload |
n/a |
EyouCMS |
2026-04-19T07:15:11.267Z | 2026-04-20T14:55:35.698Z |
| CVE-2026-6560 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
H3C Magic B0 aspForm Edit_BasicSSID buffer overflow |
H3C |
Magic B0 |
2026-04-19T06:45:14.514Z | 2026-04-20T15:20:44.443Z |
| CVE-2026-6559 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Wavlink WL-WN579A3 login.cgi sub_401F80 cross site scripting |
Wavlink |
WL-WN579A3 |
2026-04-19T05:15:15.503Z | 2026-04-20T16:07:54.597Z |
| CVE-2026-0868 |
6.4 (3.1)
|
EMC Scheduling Manager <= 4.4 - Authenticated (Contrib… |
turn2honey |
EMC – Easily Embed Calendly Scheduling |
2026-04-19T03:26:14.765Z | 2026-04-20T16:53:24.024Z |
| CVE-2026-6056 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-04-18T22:19:26.698Z | |
| CVE-2026-41242 |
9.4 (4.0)
|
protobufjs has an arbitrary code execution issue |
protobufjs |
protobuf.js |
2026-04-18T16:18:10.652Z | 2026-04-20T16:03:57.689Z |
| CVE-2026-40948 |
N/A
|
Apache Airflow Providers Keycloak: OAuth Login CSRF — … |
Apache Software Foundation |
Apache Airflow Providers Keycloak |
2026-04-18T13:22:41.577Z | 2026-04-20T16:17:53.543Z |
| CVE-2026-2986 |
6.4 (3.1)
|
Contextual Related Posts <= 4.2.1 - Authenticated (Con… |
ajay |
Contextual Related Posts |
2026-04-18T11:16:10.980Z | 2026-04-20T14:19:06.323Z |
| CVE-2026-2505 |
5.4 (3.1)
|
Categories Images <= 3.3.1 - Authenticated (Contributo… |
elzahlan |
Categories Images |
2026-04-18T09:26:52.654Z | 2026-04-20T13:46:07.918Z |
| CVE-2026-0894 |
6.4 (3.1)
|
Content Blocks (Custom Post Widget) <= 3.3.9 - Authent… |
vanderwijk |
Content Blocks (Custom Post Widget) |
2026-04-18T09:26:52.078Z | 2026-04-20T13:48:40.598Z |
| CVE-2026-41254 |
4 (3.1)
|
Little CMS (lcms2) through 2.18 has an integer ov… |
littlecms |
little cms color engine |
2026-04-18T06:43:13.741Z | 2026-04-20T16:09:45.530Z |
| CVE-2026-32690 |
N/A
|
Apache Airflow: 3.x - Nested Variable Secret Values By… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:22:26.081Z | 2026-04-20T16:11:33.956Z |
| CVE-2026-32228 |
N/A
|
Apache Airflow: Users with asset materialization permi… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:19:47.512Z | 2026-04-20T15:54:05.072Z |
| CVE-2026-30912 |
N/A
|
Apache Airflow: Exposing stack trace in case of constr… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:20:30.254Z | 2026-04-20T16:26:07.128Z |
| CVE-2026-30898 |
N/A
|
Apache Airflow: Bad example of BashOperator shell inje… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:20:48.647Z | 2026-04-22T03:55:38.783Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-m5wg-cjgh-223j |
9.8 (3.1)
10.0 (4.0)
|
goodoneuz/pay-uz: the /payment/api/editable/update endpoint overwrites existing PHP payment hook files | 2026-04-16T15:31:32Z | 2026-04-16T22:58:58Z |
| ghsa-j6vj-j7q6-95qq |
4.3 (3.1)
|
Missing Authorization vulnerability in Long Watch Studio MyRewards woorewards allows Exploiting Inc… | 2026-04-16T15:31:32Z | 2026-04-16T15:31:32Z |
| ghsa-hxj3-376r-rjpw |
7.2 (3.1)
|
SourceCodester Vehicle Parking Area Management System v1.0 is vulnerable to SQL Injection in the fi… | 2026-04-16T15:31:32Z | 2026-04-18T03:31:05Z |
| ghsa-hgfx-pj29-fw66 |
7.5 (3.1)
|
A NULL pointer dereference vulnerability exists in fio (Flexible I/O Tester) v3.41 when parsing job… | 2026-04-16T15:31:32Z | 2026-04-16T18:31:22Z |
| ghsa-g8rx-2jmm-3847 |
5.7 (4.0)
|
Insufficiently Protected Credentials in Sparx Systems Pty Ltd. Sparx Enterprise Architect. Client d… | 2026-04-16T15:31:32Z | 2026-04-16T15:31:32Z |
| ghsa-fpjj-7r25-62gj |
9.1 (3.1)
|
SourceCodester Payroll Management and Information System v1.0 is vulnerable to SQL Injection in the… | 2026-04-16T15:31:32Z | 2026-04-16T18:31:22Z |
| ghsa-c54p-hmw4-rrxj |
7.3 (3.1)
|
SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL Injection in the file … | 2026-04-16T15:31:32Z | 2026-04-16T18:31:21Z |
| ghsa-c29w-82wc-qh7v |
7.1 (3.1)
|
An issue in the Forgot Password feature of Daylight Studio FuelCMS v1.5.2 allows unauthenticated at… | 2026-04-16T15:31:32Z | 2026-04-16T18:31:21Z |
| ghsa-7crm-7p4w-3558 |
7.2 (3.1)
|
SourceCodester Vehicle Parking Area Management System v1.0 is vulnerable to SQL Injection in the fi… | 2026-04-16T15:31:32Z | 2026-04-18T03:31:05Z |
| ghsa-6f47-h5cp-7cwm |
6.4 (3.1)
|
The Email Encoder – Protect Email Addresses and Phone Numbers plugin for WordPress is vulnerable to… | 2026-04-16T15:31:32Z | 2026-04-16T15:31:32Z |
| ghsa-3xhp-52jc-www8 |
4.7 (3.1)
|
SourceCodester Payroll Management and Information System v1.0 is vulnerable to SQL Injection in the… | 2026-04-16T15:31:32Z | 2026-04-16T18:31:21Z |
| ghsa-3j9x-gmp6-9x73 |
7.3 (3.1)
|
SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL Injection in the file … | 2026-04-16T15:31:32Z | 2026-04-16T18:31:21Z |
| ghsa-3fcv-p6qc-8gvx |
7.2 (3.1)
|
SourceCodester Vehicle Parking Area Management System v1.0 is vulnerable to SQL Injection in the fi… | 2026-04-16T15:31:32Z | 2026-04-18T03:31:05Z |
| ghsa-263f-2q4p-95qq |
9.8 (3.1)
|
SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL Injection in the file … | 2026-04-16T15:31:32Z | 2026-04-18T03:31:05Z |
| ghsa-23m2-3g75-jvc8 |
5.3 (3.1)
|
The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin f… | 2026-04-16T15:31:32Z | 2026-04-16T15:31:32Z |
| ghsa-rpp7-9x22-6v9f |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-04-16T15:31:31Z | 2026-04-16T15:31:31Z |
| ghsa-q2hg-643c-gw8h |
8.1 (3.1)
|
Apache Airflow: RCE by race condition in example_xcom dag | 2026-04-16T15:31:31Z | 2026-04-16T22:57:15Z |
| ghsa-p284-vc5x-jqh4 |
8.5 (3.1)
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-04-16T15:31:31Z | 2026-04-16T15:31:31Z |
| ghsa-f763-m6cv-f596 |
5.4 (3.1)
|
Missing Authorization vulnerability in Themeum Tutor LMS tutor allows Exploiting Incorrectly Config… | 2026-04-16T15:31:31Z | 2026-04-16T15:31:31Z |
| ghsa-8f3x-4qgm-mmjv |
4.3 (3.1)
|
Missing Authorization vulnerability in bPlugins 3D viewer – Embed 3D Models 3d-viewer allows Exploi… | 2026-04-16T15:31:31Z | 2026-04-16T15:31:31Z |
| ghsa-3969-mh7w-g5vp |
5.3 (3.1)
|
Missing Authorization vulnerability in Majestic Support Majestic Support majestic-support allows Ex… | 2026-04-16T15:31:31Z | 2026-04-16T15:31:32Z |
| ghsa-2vc4-7wrh-m68v |
5.3 (3.1)
|
Missing Authorization vulnerability in WP Royal Royal Elementor Addons royal-elementor-addons allow… | 2026-04-16T15:31:31Z | 2026-04-16T15:31:31Z |
| ghsa-27h3-crw2-q36w |
7.5 (3.1)
|
SkyWalking OAP /debugging/config/dump endpoint may leak sensitive configuration information | 2026-04-16T15:31:31Z | 2026-04-16T22:57:31Z |
| ghsa-q4m3-x4h7-c3c2 |
7.5 (3.1)
|
The DirectoryPress – Business Directory And Classified Ad Listing plugin for WordPress is vulnerabl… | 2026-04-16T12:31:42Z | 2026-04-16T12:31:42Z |
| ghsa-242m-692q-2xxx |
5.4 (3.1)
|
The Better Find and Replace – AI-Powered Suggestions plugin for WordPress is vulnerable to Stored C… | 2026-04-16T12:31:42Z | 2026-04-16T12:31:42Z |
| ghsa-qw58-mhg6-q49h |
3.1 (3.1)
|
The OneSignal – Web Push Notifications plugin for WordPress is vulnerable to authorization bypass i… | 2026-04-16T12:31:41Z | 2026-04-16T12:31:41Z |
| ghsa-ppc7-gg9m-7hwq |
6.1 (3.1)
|
The authentication endpoint fails to encode user-supplied input before rendering it in the web page… | 2026-04-16T12:31:41Z | 2026-04-16T12:31:41Z |
| ghsa-gw5f-5fmc-2xp2 |
6.0 (3.1)
|
Active access tokens are not revoked or invalidated when a user account is locked within WSO2 Ident… | 2026-04-16T12:31:41Z | 2026-04-16T12:31:41Z |
| ghsa-6f87-4ph2-cp38 |
6.1 (3.1)
|
The authentication endpoint fails to adequately validate user-supplied input before reflecting it b… | 2026-04-16T12:31:41Z | 2026-04-16T12:31:41Z |
| ghsa-4fxw-3p35-q323 |
3.5 (3.1)
|
The component accepts XML input through the publisher without disabling external entity resolution.… | 2026-04-16T12:31:41Z | 2026-04-16T12:31:41Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-577 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:04.439609Z |
| pysec-2021-575 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:04.272005Z |
| pysec-2021-574 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:04.173783Z |
| pysec-2021-572 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:04.007163Z |
| pysec-2021-571 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:03.923873Z |
| pysec-2021-570 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:03.842863Z |
| pysec-2021-569 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:03.759832Z |
| pysec-2021-568 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:03.682408Z |
| pysec-2021-567 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:03.596009Z |
| pysec-2021-564 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:03.344534Z |
| pysec-2021-563 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:03.262683Z |
| pysec-2021-559 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:02.920127Z |
| pysec-2021-558 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:02.832886Z |
| pysec-2021-557 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:02.745951Z |
| pysec-2021-554 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:02.493921Z |
| pysec-2021-548 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:01.967587Z |
| pysec-2021-286 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:45.297527Z |
| pysec-2021-284 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:45.118929Z |
| pysec-2021-283 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:45.010979Z |
| pysec-2021-281 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:44.808272Z |
| pysec-2021-280 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:44.725554Z |
| pysec-2021-279 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:44.622008Z |
| pysec-2021-278 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:44.528249Z |
| pysec-2021-277 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:44.439225Z |
| pysec-2021-276 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:44.348474Z |
| pysec-2021-273 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:44.051773Z |
| pysec-2021-272 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:43.967494Z |
| pysec-2021-268 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:43.623027Z |
| pysec-2021-267 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:43.539250Z |
| pysec-2021-266 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:43.455188Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1889 | Malicious code in stripeapi.net (NuGet) | 2026-03-18T12:10:39Z | 2026-03-18T12:10:39Z |
| mal-2026-1888 | Malicious code in solnetwallet.net.core (NuGet) | 2026-03-18T12:10:38Z | 2026-03-18T12:10:38Z |
| mal-2026-1887 | Malicious code in solnetall.net (NuGet) | 2026-03-18T12:10:36Z | 2026-03-18T12:10:36Z |
| mal-2026-1886 | Malicious code in bsure.utils (NuGet) | 2026-03-18T12:10:31Z | 2026-03-18T12:10:31Z |
| mal-2026-1885 | Malicious code in bsure.binsec (NuGet) | 2026-03-18T12:10:30Z | 2026-03-18T12:10:30Z |
| mal-2026-1884 | Malicious code in avvio.sky.userdataservice (NuGet) | 2026-03-18T12:10:28Z | 2026-03-18T12:10:28Z |
| mal-2026-1883 | Malicious code in 8y234rtv8yvf (NuGet) | 2026-03-18T12:10:28Z | 2026-03-18T12:10:28Z |
| mal-2026-1882 | Malicious code in 3rugfbe8rivferiuv (NuGet) | 2026-03-18T12:10:27Z | 2026-03-18T12:10:27Z |
| mal-2026-1571 | Malicious code in transform-modules-systemjs (npm) | 2026-03-18T08:17:57Z | 2026-03-23T05:16:31Z |
| mal-2026-1560 | Malicious code in transform-dynamic-import (npm) | 2026-03-18T08:17:40Z | 2026-03-23T05:16:31Z |
| mal-2026-1574 | Malicious code in transform-spread (npm) | 2026-03-18T08:17:06Z | 2026-03-23T05:16:31Z |
| mal-2026-1569 | Malicious code in transform-json-strings (npm) | 2026-03-18T08:17:06Z | 2026-03-23T05:16:31Z |
| mal-2026-1568 | Malicious code in transform-inline-consecutive-adds (npm) | 2026-03-18T08:16:35Z | 2026-03-23T05:16:31Z |
| mal-2026-1559 | Malicious code in transform-charcodes (npm) | 2026-03-18T08:16:19Z | 2026-03-23T05:16:31Z |
| mal-2026-1566 | Malicious code in transform-for-of (npm) | 2026-03-18T08:15:59Z | 2026-03-23T05:16:31Z |
| mal-2026-1572 | Malicious code in transform-new-target (npm) | 2026-03-18T08:15:30Z | 2026-03-23T05:16:31Z |
| mal-2026-1575 | Malicious code in transform-typescript (npm) | 2026-03-18T08:15:09Z | 2026-03-23T05:16:31Z |
| mal-2026-1563 | Malicious code in transform-es2015-shorthand-properties (npm) | 2026-03-18T08:14:34Z | 2026-03-23T05:16:31Z |
| mal-2026-1562 | Malicious code in transform-es2015-parameters (npm) | 2026-03-18T08:13:44Z | 2026-03-23T05:16:31Z |
| mal-2026-1557 | Malicious code in add-react-displayname (npm) | 2026-03-18T08:13:24Z | 2026-04-16T15:42:07Z |
| mal-2026-1570 | Malicious code in transform-member-expression-literals (npm) | 2026-03-18T08:12:49Z | 2026-03-23T05:16:31Z |
| mal-2026-1573 | Malicious code in transform-proto-to-assign (npm) | 2026-03-18T07:53:56Z | 2026-03-23T05:16:31Z |
| mal-2026-1567 | Malicious code in transform-function-bind (npm) | 2026-03-18T07:51:26Z | 2026-03-23T05:16:31Z |
| mal-2026-1558 | Malicious code in syntax-async-generators (npm) | 2026-03-18T07:50:36Z | 2026-03-23T05:16:31Z |
| mal-2026-1564 | Malicious code in transform-es2015-spread (npm) | 2026-03-18T07:50:17Z | 2026-03-23T05:16:31Z |
| mal-2026-1565 | Malicious code in transform-export-extensions (npm) | 2026-03-18T07:49:25Z | 2026-03-23T05:16:31Z |
| mal-2026-1561 | Malicious code in transform-es2015-duplicate-keys (npm) | 2026-03-18T07:49:07Z | 2026-03-23T05:16:31Z |
| mal-2026-1550 | Malicious code in syntax-export-extensions (npm) | 2026-03-18T07:25:23Z | 2026-03-23T05:16:31Z |
| mal-2026-1548 | Malicious code in syntax-class-constructor-call (npm) | 2026-03-18T07:23:59Z | 2026-03-23T05:16:31Z |
| mal-2026-1549 | Malicious code in syntax-do-expressions (npm) | 2026-03-18T07:23:53Z | 2026-03-23T05:16:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1806 | Fortinet FortiOS: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1805 | Fortinet FortiWeb: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-08-17T22:00:00.000+00:00 |
| wid-sec-w-2025-1804 | Fortinet FortiOS und FortiProxy: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1803 | Fortinet FortiMail, FortiRecorder und FortiVoice. : Schwachstelle ermöglicht Offenlegung von Informationen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1802 | Fortinet FortiManager: Schwachstelle ermöglicht Manipulation von Dateien und potenziell Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1801 | Insyde UEFI Firmware: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1800 | Intel Xeon 6 Server Firmware: Schwachstelle ermöglicht Denial of Service | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1799 | Intel Rapid Storage Technology: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-12T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1798 | Intel Graphics Driver: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-09-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1797 | Intel Chipset: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-12-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1796 | Intel Driver and Support Assistant: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1795 | Intel PROSet Wireless WiFi Software: Schwachstelle ermöglicht Denial of Service | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1794 | Intel Ethernet Controller: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2026-03-09T23:00:00.000+00:00 |
| wid-sec-w-2025-1793 | Adobe Photoshop: Schwachstelle ermöglicht Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1792 | Adobe FrameMaker: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1791 | Adobe Magento: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1790 | Microsoft Windows und Windows Server: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-11-20T23:00:00.000+00:00 |
| wid-sec-w-2025-1789 | Microsoft Edge Android: Mehrere Schwachstellen ermöglichen Darstellen falscher Informationen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1788 | IBM Storage Virtualize-Produkte: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-12T22:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1787 | Microsoft Office Produkte: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1786 | Microsoft Dynamics 365: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1785 | Intel Prozessoren: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-12-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1784 | Liferay Portal und DXP: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1783 | Adobe Creative Cloud Applikationen: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-09-16T22:00:00.000+00:00 |
| wid-sec-w-2025-1782 | Microsoft SQL Server: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1781 | Microsoft Exchange Server und Microsoft Exchange: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1780 | Microsoft Azure: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1779 | Microsoft Windows Subsystem für Linux: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1778 | ServiceNow Now Platform (AI Platform): Schwachstelle ermöglicht Umgehung von Sicherheitsmechanismen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1777 | Zoom Video Communications Zoom Client: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-354-03 | ARC Informatique PcVue | 2022-12-20T00:00:00.000000Z | 2023-02-09T00:00:00.000000Z |
| icsa-22-354-02 | Rockwell Automation GuardLogix and ControlLogix controllers | 2022-12-20T00:00:00.000000Z | 2022-12-20T00:00:00.000000Z |
| icsa-22-354-01 | Fuji Electric Tellus Lite V-Simulator | 2022-12-20T00:00:00.000000Z | 2022-12-20T00:00:00.000000Z |
| icsa-22-349-10 | Siemens APOGEE/TALON Field Panels | 2022-12-15T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-349-01 | Prosys OPC UA Simulation Server (Update A) | 2022-12-15T00:00:00.000000Z | 2023-01-03T00:00:00.000000Z |
| icsa-22-349-21 | Siemens SCALANCE X-200RNA Switch Devices | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-349-20 | Siemens Teamcenter Visualization and JT2Go | 2022-12-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-349-19 | Siemens SICAM PAS | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-349-18 | Siemens SCALANCE SC-600 Family | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-349-17 | Siemens Mendix Email Connector | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-349-16 | Siemens APOGEE and TALON | 2022-12-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-349-15 | Siemens Teamcenter Visualization and JT2Go | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-349-14 | Siemens SISCO MMS-EASE Third Party Component | 2022-12-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-349-13 | Siemens Mendix Workflow Commons | 2022-12-13T00:00:00.000000Z | 2023-01-10T00:00:00.000000Z |
| icsa-22-349-12 | Siemens Parasolid | 2022-12-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-349-11 | Siemens SIPROTEC 5 Devices | 2022-12-13T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-22-349-09 | Siemens Products affected by OpenSSL 3.0 | 2022-12-13T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-22-349-08 | Siemens Polarion ALM | 2022-12-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-349-07 | Siemens Simcenter STAR-CCM+ | 2022-12-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-349-06 | Siemens SIMATIC WinCC OA Ultralight Client | 2022-12-13T00:00:00.000000Z | 2023-01-10T00:00:00.000000Z |
| icsa-22-349-04 | Siemens SCALANCE Products | 2022-12-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-349-03 | Siemens Multiple Denial of Service Vulnerabilities in Industrial Products | 2022-12-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-349-02 | Siemens SCALANCE X-200RNA Switch Devices | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-347-03 | Contec CONPROSYS HMI System (CHS) | 2022-12-13T00:00:00.000000Z | 2023-01-19T00:00:00.000000Z |
| icsa-22-347-02 | Schneider Electric APC Easy UPS Online | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-347-01 | ICONICS and Mitsubishi Electric Products | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-346-05 | Siemens PLM Help Server | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-342-03 | Rockwell Automation Logix controllers | 2022-12-08T00:00:00.000000Z | 2022-12-08T00:00:00.000000Z |
| icsa-22-342-02 | AVEVA InTouch Access Anywhere and Plant SCADA Access Anywhere | 2022-12-08T00:00:00.000000Z | 2023-04-03T10:15:45.322434Z |
| icsa-22-342-01 | Advantech iView | 2022-12-08T00:00:00.000000Z | 2022-12-08T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-webex-html-bj4y9tx | Cisco Webex Meetings and Cisco Webex Meetings Server HTML Injection Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-20T14:31:42+00:00 |
| cisco-sa-vmpresc-syzcs4kc | Cisco SD-WAN Solution Software Privilege Escalation Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmdirtrav-efdaxsjg | Cisco SD-WAN vManage Software Directory Traversal Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmanxss-z7bhvhpy | Cisco SD-WAN vManage Software Cross-Site Scripting Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmanxml-aj4gfekd | Cisco SD-WAN vManage Software XML External Entity Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmanwebid-5qwmccvt | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmanrce-4jtwt28p | Cisco SD-WAN vManage Software Remote Code Execution Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmandowndir-cvgvdkm3 | Cisco SD-WAN vManage Software Path Traversal Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmanage-v78fubgv | Cisco SD-WAN vManage Software SQL Injection Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T20:56:20+00:00 |
| cisco-sa-visio-dir-sql-inj-fpm3mpft | Cisco Vision Dynamic Signage Director SQL Injection Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vedgfpdos-pkqqrnwv | Cisco SD-WAN vEdge Routers Denial of Service Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-sivm-m8wugr9o | Cisco SD-WAN vManage Software SQL Injection Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-sdw-dos-kwodyhnb | Cisco SD-WAN Solution Software Denial of Service Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-sdscred-hfwwfqbj | Cisco SD-WAN Solution Software Static Credentials Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-sb-rce-dos-9zajkx4 | Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Remote Code Execution and Denial of Service Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-sb-dos-zn5gvnh7 | Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Denial of Service Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-rv110w-static-cred-bmtwbwty | Cisco Small Business RV110W Wireless-N VPN Firewall Static Default Credential Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-rv-rce-m4feegwx | Cisco RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution Multiple Vulnerabilities | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-rv-rce-aqkreqp | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-rv-info-dis-fewbwgsd | Cisco Small Business RV110W and RV215W Series Routers Information Disclosure Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-rv-auth-bypass-cgv9eruz | Cisco RV110W, RV130, RV130W, and RV215W Routers Authentication Bypass Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-fpdos-horbfd9f | Cisco SD-WAN vEdge Routers Denial of Service Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-esa-filt-39jxvmfm | Cisco Email Security Appliance Filter Bypass Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-16T16:44:30+00:00 |
| cisco-sa-emvman-3y6lutcz | Cisco SD-WAN vManage Software Denial of Service Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-dncm-xss-avmyawd2 | Cisco Data Center Network Manager Cross-Site Scripting Vulnerabilities | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-dcnm-privescal-zxfch7dg | Cisco Data Center Network Manager Privilege Escalation Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-code-exec-wh3bnfb | Cisco RV110W and RV215W Series Routers Arbitrary Code Execution Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-cmd-shell-injection-9joqn9dy | Cisco Small Business RV110W, RV130, RV130W, and RV215W Series Routers Command Shell Injection Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-cma-turn-crdls-rhjszkxn | Cisco Meetings App Missing TURN Server Credentials Expiration Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-clibypvman-skclf2l | Cisco SD-WAN vManage Software Command Injection Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-68322 | parisc: Avoid crash due to unaligned access in unwinder | 2025-12-02T00:00:00.000Z | 2026-01-13T01:39:07.000Z |
| msrc_cve-2025-68318 | clk: thead: th1520-ap: set all AXI clocks to CLK_IS_CRITICAL | 2025-12-02T00:00:00.000Z | 2026-01-13T14:37:11.000Z |
| msrc_cve-2025-68317 | io_uring/zctx: check chained notif contexts | 2025-12-02T00:00:00.000Z | 2025-12-18T01:03:25.000Z |
| msrc_cve-2025-68315 | f2fs: fix to detect potential corrupted nid in free_nid_list | 2025-12-02T00:00:00.000Z | 2026-01-08T14:49:31.000Z |
| msrc_cve-2025-68313 | x86/CPU/AMD: Add RDSEED fix for Zen5 | 2025-12-02T00:00:00.000Z | 2025-12-18T01:02:58.000Z |
| msrc_cve-2025-68311 | tty: serial: ip22zilog: Use platform device for probing | 2025-12-02T00:00:00.000Z | 2026-01-08T14:48:57.000Z |
| msrc_cve-2025-68309 | PCI/AER: Fix NULL pointer access by aer_info | 2025-12-02T00:00:00.000Z | 2025-12-18T01:03:30.000Z |
| msrc_cve-2025-68308 | can: kvaser_usb: leaf: Fix potential infinite loop in command parsers | 2025-12-02T00:00:00.000Z | 2026-01-07T14:40:11.000Z |
| msrc_cve-2025-68307 | can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs | 2025-12-02T00:00:00.000Z | 2026-01-07T14:39:31.000Z |
| msrc_cve-2025-68304 | Bluetooth: hci_core: lookup hci_conn on RX path on protocol side | 2025-12-02T00:00:00.000Z | 2026-03-31T14:52:44.000Z |
| msrc_cve-2025-68303 | platform/x86: intel: punit_ipc: fix memory corruption | 2025-12-02T00:00:00.000Z | 2026-01-08T01:38:41.000Z |
| msrc_cve-2025-68302 | net: sxgbe: fix potential NULL dereference in sxgbe_rx() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:40:31.000Z |
| msrc_cve-2025-68301 | net: atlantic: fix fragment overflow handling in RX path | 2025-12-02T00:00:00.000Z | 2026-01-08T01:38:53.000Z |
| msrc_cve-2025-68297 | ceph: fix crash in process_v2_sparse_read() for encrypted directories | 2025-12-02T00:00:00.000Z | 2025-12-18T01:02:32.000Z |
| msrc_cve-2025-68296 | drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup | 2025-12-02T00:00:00.000Z | 2026-03-31T14:53:06.000Z |
| msrc_cve-2025-68295 | smb: client: fix memory leak in cifs_construct_tcon() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:39:44.000Z |
| msrc_cve-2025-68291 | mptcp: Initialise rcv_mss before calling tcp_send_active_reset() in mptcp_do_fastclose(). | 2025-12-02T00:00:00.000Z | 2026-02-18T14:06:12.000Z |
| msrc_cve-2025-68290 | most: usb: fix double free on late probe failure | 2025-12-02T00:00:00.000Z | 2026-01-08T01:38:59.000Z |
| msrc_cve-2025-68289 | usb: gadget: f_eem: Fix memory leak in eem_unwrap | 2025-12-02T00:00:00.000Z | 2026-01-13T14:37:17.000Z |
| msrc_cve-2025-68288 | usb: storage: Fix memory leak in USB bulk transport | 2025-12-02T00:00:00.000Z | 2026-01-07T14:39:51.000Z |
| msrc_cve-2025-68287 | usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths | 2025-12-02T00:00:00.000Z | 2026-01-08T01:39:04.000Z |
| msrc_cve-2025-68286 | drm/amd/display: Check NULL before accessing | 2025-12-02T00:00:00.000Z | 2026-01-07T14:39:38.000Z |
| msrc_cve-2025-68285 | libceph: fix potential use-after-free in have_mon_and_osd_map() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:39:18.000Z |
| msrc_cve-2025-68284 | libceph: prevent potential out-of-bounds writes in handle_auth_session_key() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:39:57.000Z |
| msrc_cve-2025-68283 | libceph: replace BUG_ON with bounds check for map->max_osd | 2025-12-02T00:00:00.000Z | 2026-01-07T14:39:25.000Z |
| msrc_cve-2025-68282 | usb: gadget: udc: fix use-after-free in usb_gadget_state_work | 2025-12-02T00:00:00.000Z | 2026-01-07T14:39:11.000Z |
| msrc_cve-2025-68281 | ASoC: SDCA: bug fix while parsing mipi-sdca-control-cn-list | 2025-12-02T00:00:00.000Z | 2026-01-13T14:36:51.000Z |
| msrc_cve-2025-68266 | bfs: Reconstruct file type when loading from disk | 2025-12-02T00:00:00.000Z | 2026-01-08T14:45:54.000Z |
| msrc_cve-2025-68265 | nvme: fix admin request_queue lifetime | 2025-12-02T00:00:00.000Z | 2026-02-18T14:26:22.000Z |
| msrc_cve-2025-68264 | ext4: refresh inline data size before write operations | 2025-12-02T00:00:00.000Z | 2026-02-18T14:22:47.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15146-1 | kind-0.29.0-1.1 on GA media | 2025-05-22T00:00:00Z | 2025-05-22T00:00:00Z |
| opensuse-su-2025:15145-1 | grafana-11.6.1-1.1 on GA media | 2025-05-22T00:00:00Z | 2025-05-22T00:00:00Z |
| opensuse-su-2025:15144-1 | govulncheck-vulndb-0.0.20250520T172319-1.1 on GA media | 2025-05-22T00:00:00Z | 2025-05-22T00:00:00Z |
| opensuse-su-2025:15143-1 | chromedriver-136.0.7103.113-1.1 on GA media | 2025-05-21T00:00:00Z | 2025-05-21T00:00:00Z |
| opensuse-su-2025:15142-1 | xen-4.20.0_12-1.1 on GA media | 2025-05-20T00:00:00Z | 2025-05-20T00:00:00Z |
| opensuse-su-2025:15141-1 | python314-3.14.0~b1-3.1 on GA media | 2025-05-20T00:00:00Z | 2025-05-20T00:00:00Z |
| opensuse-su-2025:15140-1 | postgresql16-16.9-1.1 on GA media | 2025-05-20T00:00:00Z | 2025-05-20T00:00:00Z |
| opensuse-su-2025:15139-1 | postgresql15-15.13-1.1 on GA media | 2025-05-20T00:00:00Z | 2025-05-20T00:00:00Z |
| opensuse-su-2025:15138-1 | postgresql14-14.18-1.1 on GA media | 2025-05-20T00:00:00Z | 2025-05-20T00:00:00Z |
| opensuse-su-2025:15137-1 | postgresql13-13.21-1.1 on GA media | 2025-05-20T00:00:00Z | 2025-05-20T00:00:00Z |
| opensuse-su-2025:15136-1 | grype-0.92.1-1.1 on GA media | 2025-05-20T00:00:00Z | 2025-05-20T00:00:00Z |
| opensuse-su-2025:15135-1 | govulncheck-vulndb-0.0.20250515T200012-1.1 on GA media | 2025-05-20T00:00:00Z | 2025-05-20T00:00:00Z |
| opensuse-su-2025:15134-1 | gnuplot-6.0.2-3.1 on GA media | 2025-05-20T00:00:00Z | 2025-05-20T00:00:00Z |
| opensuse-su-2025:15133-1 | firefox-esr-128.10.1-1.1 on GA media | 2025-05-20T00:00:00Z | 2025-05-20T00:00:00Z |
| opensuse-su-2025:15132-1 | dante-1.4.4-1.1 on GA media | 2025-05-20T00:00:00Z | 2025-05-20T00:00:00Z |
| opensuse-su-2025:15131-1 | MozillaThunderbird-128.10.1-1.1 on GA media | 2025-05-20T00:00:00Z | 2025-05-20T00:00:00Z |
| opensuse-su-2025:15130-1 | ruby3.4-rubygem-websocket-extensions-0.1.5-1.22 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15129-1 | ruby3.4-rubygem-web-console-4.2.1-1.7 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15128-1 | ruby3.4-rubygem-sprockets-3.7-3.7.5-1.3 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15127-1 | ruby3.4-rubygem-sprockets-4.2.1-1.7 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15126-1 | ruby3.4-rubygem-rubyzip-2.3.2-1.17 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15125-1 | ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15124-1 | ruby3.4-rubygem-rails-7.0-7.0.8.6-1.3 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15123-1 | ruby3.4-rubygem-puma-6.4.3-1.3 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15122-1 | ruby3.4-rubygem-multi_xml-0.6.0-1.29 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15121-1 | ruby3.4-rubygem-minitar-0.9-1.19 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15120-1 | ruby3.4-rubygem-loofah-2.23.1-1.3 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15119-1 | ruby3.4-rubygem-kramdown-2.4.0-1.15 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15118-1 | ruby3.4-rubygem-json_pure-2.7.6-1.3 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15117-1 | ruby3.4-rubygem-jquery-rails-4.6.0-1.7 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:0742 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.13 on RHEL 7 security update | 2026-01-19T00:15:08+00:00 | 2026-04-01T13:32:37+00:00 |
| rhsa-2026:0737 | Red Hat Security Advisory: OpenShift Compliance Operator bug fix and enhancement update | 2026-01-15T23:39:47+00:00 | 2026-03-26T11:54:17+00:00 |
| rhsa-2026:0728 | Red Hat Security Advisory: gnupg2 security update | 2026-01-15T21:34:05+00:00 | 2026-04-02T23:28:42+00:00 |
| rhsa-2026:0726 | Red Hat Security Advisory: Red Hat Build of Apache Camel 4.14.2.P1 for Spring Boot release. | 2026-01-15T19:53:18+00:00 | 2026-03-18T03:16:08+00:00 |
| rhsa-2026:0418 | Red Hat Security Advisory: OpenShift Container Platform 4.16.55 packages and security update | 2026-01-15T19:15:31+00:00 | 2026-04-14T02:03:14+00:00 |
| rhsa-2026:0331 | Red Hat Security Advisory: OpenShift Container Platform 4.18.31 packages and security update | 2026-01-15T19:11:50+00:00 | 2026-04-14T02:03:12+00:00 |
| rhsa-2026:0332 | Red Hat Security Advisory: OpenShift Container Platform 4.18.31 bug fix and security update | 2026-01-15T18:56:30+00:00 | 2026-04-13T20:14:02+00:00 |
| rhsa-2026:0326 | Red Hat Security Advisory: OpenShift Container Platform 4.16.55 bug fix and security update | 2026-01-15T18:47:30+00:00 | 2026-04-13T20:14:02+00:00 |
| rhsa-2026:0722 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.8.4 security update | 2026-01-15T17:23:06+00:00 | 2026-04-14T07:57:49+00:00 |
| rhsa-2026:0719 | Red Hat Security Advisory: gnupg2 security update | 2026-01-15T17:17:05+00:00 | 2026-04-02T23:28:41+00:00 |
| rhsa-2026:0714 | Red Hat Security Advisory: openssl security update | 2026-01-15T16:05:10+00:00 | 2026-04-13T20:00:41+00:00 |
| rhsa-2026:0718 | Red Hat Security Advisory: Moderate: Red Hat Advanced Cluster Management for Kubernetes v2.13.5 security update | 2026-01-15T15:59:28+00:00 | 2026-04-14T07:57:49+00:00 |
| rhsa-2026:0327 | Red Hat Security Advisory: OpenShift Container Platform 4.16.55 bug fix and security update | 2026-01-15T15:33:44+00:00 | 2026-04-10T21:18:57+00:00 |
| rhsa-2026:0696 | Red Hat Security Advisory: net-snmp security update | 2026-01-15T13:19:04+00:00 | 2026-03-18T03:16:15+00:00 |
| rhsa-2026:0705 | Red Hat Security Advisory: transfig security update | 2026-01-15T13:11:05+00:00 | 2026-03-18T03:15:33+00:00 |
| rhsa-2026:0704 | Red Hat Security Advisory: transfig security update | 2026-01-15T12:56:19+00:00 | 2026-03-18T03:15:32+00:00 |
| rhsa-2026:0700 | Red Hat Security Advisory: transfig security update | 2026-01-15T12:28:39+00:00 | 2026-03-18T03:14:55+00:00 |
| rhsa-2026:0695 | Red Hat Security Advisory: libpq security update | 2026-01-15T12:08:34+00:00 | 2026-04-13T20:14:16+00:00 |
| rhsa-2026:0693 | Red Hat Security Advisory: openssh security update | 2026-01-15T11:56:04+00:00 | 2026-04-13T20:00:39+00:00 |
| rhsa-2026:0694 | Red Hat Security Advisory: firefox security update | 2026-01-15T11:53:04+00:00 | 2026-03-18T17:26:32+00:00 |
| rhsa-2026:0698 | Red Hat Security Advisory: mariadb-devel:10.3 security update | 2026-01-15T11:32:19+00:00 | 2026-04-13T20:00:40+00:00 |
| rhsa-2026:0697 | Red Hat Security Advisory: gnupg2 security update | 2026-01-15T11:30:44+00:00 | 2026-04-02T23:28:41+00:00 |
| rhsa-2026:0685 | Red Hat Security Advisory: Red Hat Update Infrastructure 5 security update | 2026-01-15T10:02:39+00:00 | 2026-04-13T20:00:44+00:00 |
| rhsa-2026:0671 | Red Hat Security Advisory: Assisted Installer RHEL 9 components for Multicluster Engine for Kubernetes 2.8.4 | 2026-01-15T08:34:14+00:00 | 2026-04-14T07:57:52+00:00 |
| rhsa-2026:0667 | Red Hat Security Advisory: firefox security update | 2026-01-15T08:26:09+00:00 | 2026-03-18T17:26:30+00:00 |
| rhsa-2026:0668 | Red Hat Security Advisory: net-snmp security update | 2026-01-15T08:16:08+00:00 | 2026-03-18T03:16:15+00:00 |
| rhsa-2026:0316 | Red Hat Security Advisory: OpenShift Container Platform 4.12.84 bug fix and security update | 2026-01-15T05:12:28+00:00 | 2026-04-14T02:03:12+00:00 |
| rhsa-2026:0643 | Red Hat Security Advisory: kernel security update | 2026-01-15T01:11:08+00:00 | 2026-04-13T11:13:54+00:00 |
| rhsa-2026:0315 | Red Hat Security Advisory: OpenShift Container Platform 4.12.84 packages and security update | 2026-01-15T00:25:18+00:00 | 2026-04-14T02:03:16+00:00 |
| rhsa-2026:0338 | Red Hat Security Advisory: OpenShift Container Platform 4.18.31 bug fix and security update | 2026-01-14T22:29:24+00:00 | 2026-04-10T21:18:59+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0288-1 | Security update for qemu | 2026-01-26T09:04:46Z | 2026-01-26T09:04:46Z |
| suse-su-2026:0287-1 | Security update for harfbuzz | 2026-01-23T23:35:49Z | 2026-01-23T23:35:49Z |
| suse-su-2026:0286-1 | Security update for glib2 | 2026-01-23T23:35:36Z | 2026-01-23T23:35:36Z |
| suse-su-2026:0284-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 2026-01-23T20:04:18Z | 2026-01-23T20:04:18Z |
| suse-su-2026:0283-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-01-23T17:33:31Z | 2026-01-23T17:33:31Z |
| suse-su-2026:20163-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-01-23T16:43:58Z | 2026-01-23T16:43:58Z |
| suse-su-2026:20148-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-01-23T16:43:58Z | 2026-01-23T16:43:58Z |
| suse-su-2026:0281-1 | Security update for the Linux Kernel | 2026-01-23T16:03:47Z | 2026-01-23T16:03:47Z |
| suse-su-2026:0280-1 | Security update for openvswitch | 2026-01-23T15:33:56Z | 2026-01-23T15:33:56Z |
| suse-su-2026:0279-1 | Security update for libvirt | 2026-01-23T15:09:05Z | 2026-01-23T15:09:05Z |
| suse-su-2026:0278-1 | Security update for the Linux Kernel | 2026-01-23T15:08:32Z | 2026-01-23T15:08:32Z |
| suse-su-2026:0274-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6) | 2026-01-23T12:04:25Z | 2026-01-23T12:04:25Z |
| suse-su-2026:0273-1 | Security update for azure-cli-core | 2026-01-23T11:26:43Z | 2026-01-23T11:26:43Z |
| suse-su-2026:20139-1 | Security update for python-jaraco.context | 2026-01-23T10:43:48Z | 2026-01-23T10:43:48Z |
| suse-su-2026:0270-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6) | 2026-01-23T10:33:38Z | 2026-01-23T10:33:38Z |
| suse-su-2026:0269-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6) | 2026-01-23T10:04:12Z | 2026-01-23T10:04:12Z |
| suse-su-2026:0268-1 | Security update for python | 2026-01-23T09:40:47Z | 2026-01-23T09:40:47Z |
| suse-su-2026:0267-1 | Recommended update for kernel-firmware | 2026-01-23T09:40:29Z | 2026-01-23T09:40:29Z |
| suse-su-2026:0266-1 | Security update for glib2 | 2026-01-23T08:55:04Z | 2026-01-23T08:55:04Z |
| suse-su-2026:0265-1 | Security update for libsoup | 2026-01-23T07:08:44Z | 2026-01-23T07:08:44Z |
| suse-su-2026:0264-1 | Security update for glib2 | 2026-01-23T04:33:57Z | 2026-01-23T04:33:57Z |
| suse-su-2026:0263-1 | Security update for the Linux Kernel | 2026-01-22T21:15:02Z | 2026-01-22T21:15:02Z |
| suse-su-2026:20134-1 | Security update for busybox | 2026-01-22T16:57:46Z | 2026-01-22T16:57:46Z |
| suse-su-2026:20135-1 | Security update for bind | 2026-01-22T16:50:15Z | 2026-01-22T16:50:15Z |
| suse-su-2026:20158-1 | Security update for python-pyasn1 | 2026-01-22T16:46:21Z | 2026-01-22T16:46:21Z |
| suse-su-2026:20133-1 | Security update for python-pyasn1 | 2026-01-22T16:46:21Z | 2026-01-22T16:46:21Z |
| suse-su-2026:0262-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP6) | 2026-01-22T16:33:41Z | 2026-01-22T16:33:41Z |
| suse-su-2026:0260-1 | Security update for MozillaFirefox | 2026-01-22T16:11:44Z | 2026-01-22T16:11:44Z |
| suse-su-2026:0259-1 | Security update for avahi | 2026-01-22T16:10:45Z | 2026-01-22T16:10:45Z |
| suse-su-2026:0258-1 | Security update for libsoup2 | 2026-01-22T16:10:25Z | 2026-01-22T16:10:25Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:8793 | Moderate: thunderbird security update | 2024-11-04T00:00:00Z | 2024-11-04T23:02:53Z |
| alsa-2024:8790 | Moderate: thunderbird security update | 2024-11-04T00:00:00Z | 2024-11-04T22:59:59Z |
| alsa-2024:8729 | Moderate: firefox security update | 2024-10-31T00:00:00Z | 2024-11-03T22:01:19Z |
| alsa-2024:8726 | Moderate: firefox security update | 2024-10-31T00:00:00Z | 2024-11-04T08:02:30Z |
| alsa-2024:8680 | Low: mod_http2 security update | 2024-10-30T00:00:00Z | 2024-10-31T13:44:32Z |
| alsa-2024:8678 | Important: grafana security update | 2024-10-30T00:00:00Z | 2024-11-03T19:14:25Z |
| alsa-2024:8617 | Moderate: kernel security update | 2024-10-30T00:00:00Z | 2024-11-03T19:17:28Z |
| alsa-2024:8563 | Important: buildah security update | 2024-10-29T00:00:00Z | 2024-10-29T12:38:06Z |
| alsa-2024:8447 | Moderate: python3.12 security update | 2024-10-24T00:00:00Z | 2024-10-24T22:24:09Z |
| alsa-2024:8446 | Moderate: python3.9 security update | 2024-10-24T00:00:00Z | 2024-10-24T22:22:25Z |
| alsa-2024:8374 | Moderate: python3.11 security update | 2024-10-23T00:00:00Z | 2024-10-24T07:32:07Z |
| alsa-2024:8359 | Moderate: python39:3.9 and python39-devel:3.9 security update | 2024-10-23T00:00:00Z | 2024-10-24T07:36:13Z |
| alsa-2024:8353 | Important: NetworkManager-libreswan security update | 2024-10-23T00:00:00Z | 2024-10-24T08:49:12Z |
| alsa-2024:8327 | Important: grafana security update | 2024-10-22T00:00:00Z | 2024-10-23T14:58:53Z |
| alsa-2024:8180 | Important: webkit2gtk3 security update | 2024-10-16T00:00:00Z | 2024-10-18T09:22:49Z |
| alsa-2024:8162 | Moderate: kernel security update | 2024-10-16T00:00:00Z | 2024-10-25T06:30:39Z |
| alsa-2024:8127 | Moderate: java-21-openjdk security update | 2024-10-16T00:00:00Z | 2024-10-18T09:27:15Z |
| alsa-2024:8124 | Moderate: java-17-openjdk security update | 2024-10-16T00:00:00Z | 2024-10-18T09:29:18Z |
| alsa-2024:8121 | Moderate: java-11-openjdk security update | 2024-10-16T00:00:00Z | 2024-10-18T09:33:29Z |
| alsa-2024:8117 | Moderate: java-1.8.0-openjdk security update | 2024-10-16T00:00:00Z | 2024-10-18T09:40:20Z |
| alsa-2024:8112 | Important: buildah security update | 2024-10-15T00:00:00Z | 2024-10-16T10:11:52Z |
| alsa-2024:8111 | Important: skopeo security update | 2024-10-15T00:00:00Z | 2024-10-15T15:06:33Z |
| alsa-2024:8110 | Important: containernetworking-plugins security update | 2024-10-15T00:00:00Z | 2024-10-15T15:04:52Z |
| alsa-2024:8039 | Important: podman security update | 2024-10-14T00:00:00Z | 2024-10-15T09:11:06Z |
| alsa-2024:8038 | Important: container-tools:rhel8 security update | 2024-10-14T00:00:00Z | 2024-10-15T09:14:31Z |
| alsa-2024:8037 | Moderate: OpenIPMI security update | 2024-10-14T00:00:00Z | 2024-10-15T09:16:16Z |
| alsa-2024:8025 | Important: thunderbird security update | 2024-10-14T00:00:00Z | 2024-10-15T09:17:52Z |
| alsa-2024:8024 | Important: thunderbird security update | 2024-10-14T00:00:00Z | 2024-10-15T09:19:16Z |
| alsa-2024:7977 | Important: firefox security update | 2024-10-10T00:00:00Z | 2024-10-12T13:31:27Z |
| alsa-2024:7958 | Important: firefox security update | 2024-10-10T00:00:00Z | 2024-10-12T13:30:02Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-664 | Heap-buffer-overflow in decode_preR13_section_hdr | 2022-08-02T00:00:39.660612Z | 2022-11-25T00:14:56.081549Z |
| osv-2022-663 | Heap-buffer-overflow in av1_read_mode_info | 2022-08-01T00:02:06.451838Z | 2022-08-01T00:02:06.452091Z |
| osv-2022-662 | UNKNOWN READ in pdfi_free_object | 2022-08-01T00:00:56.006520Z | 2022-08-01T00:00:56.006820Z |
| osv-2022-661 | Heap-buffer-overflow in dissect_softether_ip_port | 2022-08-01T00:00:49.003477Z | 2022-08-01T00:00:49.003750Z |
| osv-2022-657 | Heap-buffer-overflow in dynapi_set_helper | 2022-07-31T00:02:03.618698Z | 2023-01-13T00:11:29.004032Z |
| osv-2022-656 | Heap-buffer-overflow in dwg_decode_LWPOLYLINE_private | 2022-07-31T00:00:46.624694Z | 2022-12-10T00:15:05.367372Z |
| osv-2022-655 | UNKNOWN WRITE in pdfi_repair_file | 2022-07-31T00:00:27.897800Z | 2022-07-31T00:00:27.898067Z |
| osv-2022-654 | Heap-buffer-overflow in dwg_geojson_feature | 2022-07-31T00:00:26.014159Z | 2022-12-13T00:15:49.831271Z |
| osv-2022-653 | Heap-double-free in dwg_free_common_entity_data | 2022-07-30T00:01:52.491112Z | 2026-04-25T14:26:56.502607Z |
| osv-2022-652 | Use-of-uninitialized-value in udiv | 2022-07-29T00:02:04.321859Z | 2026-04-20T14:10:26.566278Z |
| osv-2022-651 | Heap-use-after-free in jsmn_parse | 2022-07-29T00:02:00.109341Z | 2022-07-29T00:02:00.109581Z |
| osv-2022-648 | Use-of-uninitialized-value in _LUTeval16 | 2022-07-29T00:00:36.357Z | 2022-07-29T00:00:36.357246Z |
| osv-2022-647 | Heap-use-after-free in cmsFreeNamedColorList | 2022-07-29T00:00:17.863694Z | 2022-07-29T00:00:17.863964Z |
| osv-2022-644 | Global-buffer-overflow in decode_CABAC_bit | 2022-07-28T00:00:54.618523Z | 2022-07-28T00:00:54.618774Z |
| osv-2022-643 | Heap-use-after-free in gs_tifsSeekProc | 2022-07-28T00:00:44.318616Z | 2022-07-28T00:00:44.318860Z |
| osv-2022-642 | Segv on unknown address in cmsNamedColorInfo | 2022-07-28T00:00:18.998740Z | 2022-07-28T00:00:18.999033Z |
| osv-2022-640 | Stack-use-after-return in rc_free_text_enum | 2022-07-28T00:00:10.449600Z | 2022-07-28T00:00:10.449870Z |
| osv-2022-639 | Heap-buffer-overflow in _cmsWriteXYZNumber | 2022-07-27T00:02:09.500940Z | 2022-07-27T00:02:09.501206Z |
| osv-2022-638 | Use-of-uninitialized-value in ComputeConversion | 2022-07-27T00:02:09.427043Z | 2022-07-27T00:02:09.427319Z |
| osv-2022-637 | Segv on unknown address in mrb_bint_cmp | 2022-07-27T00:01:52.266864Z | 2022-07-27T00:01:52.267117Z |
| osv-2022-636 | UNKNOWN READ in fp_cmp_mag | 2022-07-27T00:00:35.300337Z | 2026-03-05T14:28:12.890689Z |
| osv-2022-635 | UNKNOWN READ in EvalSegmentedFn | 2022-07-27T00:00:31.529209Z | 2022-07-27T00:00:31.529473Z |
| osv-2022-632 | Segv on unknown address in mrb_bint_cmp | 2022-07-26T00:01:37.803408Z | 2022-07-26T00:01:37.803639Z |
| osv-2022-629 | Heap-buffer-overflow in TetrahedralInterp16 | 2022-07-26T00:00:44.729049Z | 2022-07-26T00:00:44.729292Z |
| osv-2022-628 | Segv on unknown address in mpz_add | 2022-07-26T00:00:24.203215Z | 2022-07-26T00:00:24.203433Z |
| osv-2022-627 | Heap-buffer-overflow in cmsMLUgetASCII | 2022-07-26T00:00:23.478650Z | 2022-07-26T00:00:23.478935Z |
| osv-2022-626 | Heap-buffer-overflow in Write16bitTables | 2022-07-26T00:00:10.915179Z | 2022-07-26T00:00:10.915434Z |
| osv-2022-625 | Heap-buffer-overflow in WriteSeqID | 2022-07-26T00:00:08.222361Z | 2022-07-26T00:00:08.222615Z |
| osv-2022-624 | Heap-buffer-overflow in Assimp::MD5::MD5Parser::ParseHeader | 2022-07-25T00:02:02.600456Z | 2025-08-19T09:51:59.993647Z |
| osv-2022-622 | Segv on unknown address in urshift | 2022-07-25T00:01:52.179092Z | 2022-07-25T00:01:52.179390Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2025-2469 | Debug Messages Revealing Unnecessary Information in GitLab | 2025-04-12T08:05:55.234Z | 2025-08-08T06:26:52.450Z |
| bit-gitlab-2025-2408 | Insufficient Granularity of Access Control in GitLab | 2025-04-12T08:05:53.910Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2025-1677 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-04-12T08:05:49.581Z | 2025-08-08T06:26:52.450Z |
| bit-gitlab-2025-0362 | Improper Restriction of Rendered UI Layers or Frames in GitLab | 2025-04-12T08:05:31.912Z | 2025-08-08T06:26:52.450Z |
| bit-gitlab-2024-11129 | Generation of Error Message Containing Sensitive Information in GitLab | 2025-04-12T08:02:16.568Z | 2025-08-08T06:26:52.450Z |
| bit-sqlite-2025-29087 | 2025-04-11T19:26:41.394Z | 2026-02-11T09:09:18.507Z | |
| bit-helm-2025-32387 | Helm Allows A Specially Crafted JSON Schema To Cause A Stack Overflow | 2025-04-11T19:13:06.497Z | 2025-05-20T10:02:07.006Z |
| bit-helm-2025-32386 | Helm Allows A Specially Crafted Chart Archive To Cause Out Of Memory Termination | 2025-04-11T19:13:00.490Z | 2025-05-20T10:02:07.006Z |
| bit-haproxy-2025-32464 | 2025-04-11T19:12:38.400Z | 2025-07-02T06:33:01.619Z | |
| bit-golang-2025-22871 | Request smuggling due to acceptance of invalid chunked data in net/http | 2025-04-10T07:19:26.353Z | 2025-05-20T10:02:07.006Z |
| bit-kibana-2024-52974 | 2025-04-10T07:13:12.160Z | 2025-04-10T07:44:37.385Z | |
| bit-kibana-2024-12556 | Kibana Prototype Pollution can lead to code injection | 2025-04-10T07:12:32.246Z | 2025-10-03T09:07:39.166Z |
| bit-elasticsearch-2024-52981 | 2025-04-10T07:10:18.243Z | 2025-10-03T09:07:39.166Z | |
| bit-elasticsearch-2024-52980 | Elasticsearch Uncontrolled Resource Consumption vulnerability | 2025-04-10T07:10:13.338Z | 2025-05-20T10:02:07.006Z |
| bit-elk-2024-52974 | 2025-04-10T07:08:46.358Z | 2025-04-10T07:44:37.385Z | |
| bit-elk-2024-12556 | Kibana Prototype Pollution can lead to code injection | 2025-04-10T07:07:56.053Z | 2025-10-03T09:07:39.166Z |
| bit-jenkins-2025-31721 | 2025-04-04T07:21:30.555Z | 2025-04-30T18:10:29.413Z | |
| bit-jenkins-2025-31720 | 2025-04-04T07:21:24.647Z | 2025-04-30T18:10:29.413Z | |
| bit-joomla-2024-26279 | [20240704] - Core - XSS in Wrapper extensions | 2025-04-03T14:17:01.094Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2024-26278 | [20240705] - Core - XSS in com_fields default field value | 2025-04-03T14:16:53.789Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2024-21731 | [20240703] - Core - XSS in StringHelper::truncate method | 2025-04-03T14:16:45.887Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2024-21730 | [20240702] - Core - Self-XSS in fancyselect list field layout | 2025-04-03T14:16:37.895Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2024-21729 | [20240701] - Core - XSS in accessible media selection field | 2025-04-03T14:16:30.697Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2024-21724 | [20240203] - Core - XSS in media selection fields | 2025-04-03T14:16:23.491Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2023-40626 | [20231101] - Core - Exposure of environment variables | 2025-04-03T14:16:16.690Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2023-23755 | [20230502] - Core - Bruteforce prevention within the mfa screen | 2025-04-03T14:16:09.791Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2023-23754 | [20230501] - Core - Open Redirect and XSS within the mfa select | 2025-04-03T14:16:03.188Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2023-23752 | [20230201] - Core - Improper access check in webservice endpoints | 2025-04-03T14:15:54.999Z | 2025-10-22T09:08:25.162Z |
| bit-joomla-2023-23751 | [20230102] - Core - Missing ACL checks for com_actionlogs | 2025-04-03T14:15:47.091Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2023-23750 | [20230101] - Core - CSRF within post-installation messages | 2025-04-03T14:15:38.995Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0139 | Multiples vulnérabilités dans OpenSSH | 2025-02-18T00:00:00.000000 | 2025-02-18T00:00:00.000000 |
| certfr-2025-avi-0138 | Multiples vulnérabilités dans Moodle | 2025-02-18T00:00:00.000000 | 2025-02-18T00:00:00.000000 |
| certfr-2025-avi-0137 | Multiples vulnérabilités dans Microsoft Edge | 2025-02-17T00:00:00.000000 | 2025-02-17T00:00:00.000000 |
| certfr-2025-avi-0136 | Multiples vulnérabilités dans Synology Active Backup for Business | 2025-02-17T00:00:00.000000 | 2025-02-17T00:00:00.000000 |
| certfr-2025-avi-0135 | Multiples vulnérabilités dans IBM QRadar Deployment Intelligence App | 2025-02-14T00:00:00.000000 | 2025-02-14T00:00:00.000000 |
| certfr-2025-avi-0134 | Multiples vulnérabilités dans le noyau Linux de Debian | 2025-02-14T00:00:00.000000 | 2025-02-14T00:00:00.000000 |
| certfr-2025-avi-0133 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-02-14T00:00:00.000000 | 2025-02-14T00:00:00.000000 |
| certfr-2025-avi-0132 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-02-14T00:00:00.000000 | 2025-02-14T00:00:00.000000 |
| certfr-2025-avi-0131 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-02-14T00:00:00.000000 | 2025-02-14T00:00:00.000000 |
| certfr-2025-avi-0130 | Vulnérabilité dans PostgreSQL | 2025-02-14T00:00:00.000000 | 2025-02-14T00:00:00.000000 |
| certfr-2025-avi-0129 | Multiples vulnérabilités dans OpenSSL | 2025-02-13T00:00:00.000000 | 2025-02-17T00:00:00.000000 |
| certfr-2025-avi-0128 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-02-13T00:00:00.000000 | 2025-02-13T00:00:00.000000 |
| certfr-2025-avi-0127 | Multiples vulnérabilités dans Google Chrome | 2025-02-13T00:00:00.000000 | 2025-02-13T00:00:00.000000 |
| certfr-2025-avi-0126 | Vulnérabilité dans les produits Juniper Networks | 2025-02-12T00:00:00.000000 | 2025-02-12T00:00:00.000000 |
| certfr-2025-avi-0125 | Multiples vulnérabilités dans les produits SolarWinds | 2025-02-12T00:00:00.000000 | 2025-02-12T00:00:00.000000 |
| certfr-2025-avi-0124 | Vulnérabilité dans le greffon "Saisies pour formulaire" pour SPIP | 2025-02-12T00:00:00.000000 | 2025-02-12T00:00:00.000000 |
| certfr-2025-avi-0123 | Multiples vulnérabilités dans GitLab | 2025-02-12T00:00:00.000000 | 2025-02-13T00:00:00.000000 |
| certfr-2025-avi-0122 | Multiples vulnérabilités dans les produits Adobe | 2025-02-12T00:00:00.000000 | 2025-02-12T00:00:00.000000 |
| certfr-2025-avi-0121 | Multiples vulnérabilités dans les produits Ivanti | 2025-02-12T00:00:00.000000 | 2025-02-12T00:00:00.000000 |
| certfr-2025-avi-0120 | Multiples vulnérabilités dans les produits Fortinet | 2025-02-12T00:00:00.000000 | 2025-02-12T00:00:00.000000 |
| certfr-2025-avi-0119 | Multiples vulnérabilités dans les produits Intel | 2025-02-12T00:00:00.000000 | 2025-02-12T00:00:00.000000 |
| certfr-2025-avi-0118 | Multiples vulnérabilités dans les produits Microsoft | 2025-02-12T00:00:00.000000 | 2025-02-12T00:00:00.000000 |
| certfr-2025-avi-0117 | Vulnérabilité dans Microsoft Azure | 2025-02-12T00:00:00.000000 | 2025-02-12T00:00:00.000000 |
| certfr-2025-avi-0116 | Multiples vulnérabilités dans Microsoft Windows | 2025-02-12T00:00:00.000000 | 2025-02-12T00:00:00.000000 |
| certfr-2025-avi-0115 | Multiples vulnérabilités dans Microsoft Office | 2025-02-12T00:00:00.000000 | 2025-02-12T00:00:00.000000 |
| certfr-2025-avi-0114 | Multiples vulnérabilités dans les produits SAP | 2025-02-11T00:00:00.000000 | 2025-02-11T00:00:00.000000 |
| certfr-2025-avi-0113 | Multiples vulnérabilités dans les produits Siemens | 2025-02-11T00:00:00.000000 | 2025-02-11T00:00:00.000000 |
| certfr-2025-avi-0112 | Vulnérabilité dans les produits Schneider Electric | 2025-02-11T00:00:00.000000 | 2025-02-11T00:00:00.000000 |
| certfr-2025-avi-0111 | Multiples vulnérabilités dans les produits SolarWinds | 2025-02-11T00:00:00.000000 | 2025-02-11T00:00:00.000000 |
| certfr-2025-avi-0110 | Vulnérabilité dans les produits Apple | 2025-02-11T00:00:00.000000 | 2025-02-11T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2017-003108 | Multiple Vulnerabilities in Hitachi IT Operations Director and JP1/IT Desktop Management | 2017-06-30T15:55+09:00 | 2017-06-30T15:55+09:00 |
| jvndb-2016-008607 | Vulnerability in Cosminexus HTTP Server and Hitachi Web Server | 2017-06-30T15:55+09:00 | 2019-07-25T14:14+09:00 |
| jvndb-2017-000152 | Installer of Shinseiyou Sougou Soft provided by The Ministry of Justice may insecurely load Dynamic Link Libraries | 2017-06-30T14:19+09:00 | 2018-02-07T12:22+09:00 |
| jvndb-2017-000153 | Installer of PDF Digital Signature Plugin provided by the Ministry of Justice may insecurely load Dynamic Link Libraries | 2017-06-30T14:18+09:00 | 2018-02-07T12:21+09:00 |
| jvndb-2017-000145 | Installer of Setup file of advance preparation for e-Tax software (WEB version) may insecurely load Dynamic Link Libraries | 2017-06-28T16:40+09:00 | 2018-02-07T13:40+09:00 |
| jvndb-2017-000151 | Cross-site request forgery vulnerability in Toshiba Lighting & Technology Corporation Home gateway | 2017-06-28T10:28+09:00 | 2018-02-14T12:10+09:00 |
| jvndb-2017-000150 | OS command injection vulnerability in Toshiba Lighting & Technology Corporation Home gateway | 2017-06-28T10:28+09:00 | 2018-02-14T12:10+09:00 |
| jvndb-2017-000147 | Non-documented developer's screen in Toshiba Lighting & Technology Corporation Home gateway | 2017-06-28T10:28+09:00 | 2018-02-14T12:10+09:00 |
| jvndb-2017-000149 | Hard-coded credentials vulnerability in Toshiba Lighting & Technology Corporation Home gateway | 2017-06-28T10:23+09:00 | 2018-02-14T12:10+09:00 |
| jvndb-2017-000148 | Improper access control vulnerability in Toshiba Lighting & Technology Corporation Home gateway | 2017-06-28T10:23+09:00 | 2018-02-14T12:10+09:00 |
| jvndb-2017-000144 | Denshi Nyusatsu Check Tool provided by Ministry of Education, Culture, Sports, Science and Technology may insecurely load Dynamic Link Libraries | 2017-06-26T14:28+09:00 | 2018-02-07T13:40+09:00 |
| jvndb-2017-000142 | Installer of Charamin OMP may insecurely load Dynamic Link Libraries | 2017-06-23T14:38+09:00 | 2018-02-07T12:32+09:00 |
| jvndb-2017-000120 | [Simeji for Windows] installer may insecurely load Dynamic Link Libraries | 2017-06-21T18:15+09:00 | 2017-06-21T18:15+09:00 |
| jvndb-2017-000138 | HOME SPOT CUBE2 vulnerable to improper authentication in WebUI | 2017-06-21T13:45+09:00 | 2018-02-14T11:59+09:00 |
| jvndb-2017-000137 | HOME SPOT CUBE2 vulnerable to OS command injection in WebUI | 2017-06-21T13:45+09:00 | 2018-02-14T11:59+09:00 |
| jvndb-2017-000136 | HOME SPOT CUBE2 vulnerable to buffer overflow in WebUI | 2017-06-21T13:44+09:00 | 2018-02-14T11:59+09:00 |
| jvndb-2017-000135 | HOME SPOT CUBE2 vulnerable to OS command injection in clock settings | 2017-06-21T13:44+09:00 | 2018-02-14T11:54+09:00 |
| jvndb-2017-000141 | Multiple I-O DATA network camera products vulnerable to cross-site request forgery | 2017-06-20T13:59+09:00 | 2018-02-14T12:10+09:00 |
| jvndb-2017-000140 | WordPress plugin "Event Calendar WD" vulnerable to cross-site scripting | 2017-06-20T13:58+09:00 | 2018-02-14T12:10+09:00 |
| jvndb-2017-000139 | WordPress plugin "WP Job Manager" fails to restrict access permissions | 2017-06-15T14:32+09:00 | 2017-06-15T14:32+09:00 |
| jvndb-2017-000133 | Source code security studying tool iCodeChecker vulnerable to cross-site scripting | 2017-06-13T14:50+09:00 | 2018-02-14T13:48+09:00 |
| jvndb-2017-000132 | WordPress plugin "WP-Members" vulnerable to cross-site scripting | 2017-06-13T14:50+09:00 | 2018-02-07T11:52+09:00 |
| jvndb-2017-000128 | Open redirect vulnerability in WordPress plugin "WordPress Download Manager" | 2017-06-13T14:11+09:00 | 2018-01-24T12:21+09:00 |
| jvndb-2017-000127 | Cross-site scripting vulnerability in WordPress plugin "WordPress Download Manager" | 2017-06-13T14:11+09:00 | 2018-01-24T12:24+09:00 |
| jvndb-2017-000116 | Installer of QuickTime for Windows may insecurely load Dynamic Link Libraries | 2017-06-13T13:51+09:00 | 2018-02-14T11:58+09:00 |
| jvndb-2017-000130 | Installer of electronic tendering and bid opening system provided by Acquisition, Technology & Logistics Agency may insecurely invoke an executable file | 2017-06-12T14:49+09:00 | 2018-02-14T13:52+09:00 |
| jvndb-2017-000131 | Cybozu KUNAI for Android vulnerable to cross-site scripting | 2017-06-12T13:36+09:00 | 2018-01-24T12:34+09:00 |
| jvndb-2017-000129 | Installer of "Setup file of advance preparation" may insecurely load Dinamic Link Libraries | 2017-06-09T15:59+09:00 | 2018-02-14T13:55+09:00 |
| jvndb-2017-000126 | Installer of Denshinouhin Check System (for Ministry of Agriculture, Forestry and Fisheries Nouson Seibi Jigyou) may insecurely load Dynamic Link Libraries | 2017-06-09T15:48+09:00 | 2018-02-14T14:00+09:00 |
| jvndb-2017-000117 | Installer of CASL II simulator(self-extract format) may insecurely load Dynamic Link Libraries | 2017-06-09T13:49+09:00 | 2018-02-14T11:58+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-04191 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-04191) | 2025-12-15 | 2026-01-16 |
| cnvd-2026-04190 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-04190) | 2025-12-15 | 2026-01-16 |
| cnvd-2026-04189 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-04189) | 2025-12-15 | 2026-01-16 |
| cnvd-2026-04188 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-04188) | 2025-12-15 | 2026-01-16 |
| cnvd-2026-04139 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413973) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04138 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413874) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04137 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413775) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04136 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413676) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04135 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413577) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04134 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413478) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04130 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413079) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04129 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412980) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04128 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412881) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04127 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412782) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04126 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412683) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04125 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412584) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04124 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412485) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04123 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412386) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04122 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412288) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04121 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412189) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04120 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412090) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04119 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0411991) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04118 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0411892) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04117 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0411793) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04116 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0411699) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04115 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0411501) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04114 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0411402) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04113 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0411303) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04112 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0411204) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04111 | Adobe Experience Manager跨站脚本漏洞 | 2025-12-15 | 2026-01-15 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-00148 | Уязвимость микропрограммного обеспечение измерителей мощности POWER METER SICAM Q100, POW… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00147 | Уязвимость среды разработки программного обеспечения систем автоматизации технологических… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00146 | Уязвимость программного обеспечения для расчета позиций отдельных RTLS-транспондеров SIMA… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00145 | Уязвимость программного обеспечения для расчета позиций отдельных RTLS-транспондеров SIMA… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00144 | Уязвимость микропрограммного обеспечения коммуникационного шлюза SIMATIC CN 4100, связанн… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00143 | Уязвимость микропрограммного обеспечения коммуникационного шлюза SIMATIC CN 4100, связанн… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00142 | Уязвимость микропрограммного обеспечения коммуникационного шлюза SIMATIC CN 4100, связанн… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00141 | Уязвимость микропрограммного обеспечения коммуникационного шлюза SIMATIC CN 4100, связанн… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00140 | Уязвимость микропрограммного обеспечения коммуникационного шлюза SIMATIC CN 4100, связанн… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00139 | Уязвимость программного обеспечения Gridscale X Prepay, связанная с возможностью обхода п… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00138 | Уязвимость веб-сервера Undertow, связанная с неконтролируемой рекурсией, позволяющая нару… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00137 | Уязвимость компонента Foreman программного средства для управления системами Red Hat Sate… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00136 | Уязвимость компонента EDA платформы автоматизации Red Hat Ansible Automation Platform, по… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00135 | Уязвимость компонента EDA платформы автоматизации Red Hat Ansible Automation Platform, по… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00134 | Уязвимость платформы автоматизации Red Hat Ansible Automation Platform, связанная с отсут… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00133 | Уязвимость платформы автоматизации Red Hat Ansible Automation Platform, связанная с перед… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00132 | Уязвимость программируемых логических контроллеров серии MELSEC iQ-F, связанная с чрезмер… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00131 | Уязвимость системы кондиционирования воздуха Mitsubishi Electric, связанная с отсутствием… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00130 | Уязвимость компонента Bluetooth Low Energy Stack микропрограммного обеспечения семейства … | 09.01.2026 | 09.01.2026 |
| bdu:2026-00129 | Уязвимость программного обеспечения Chall-Manager, связанная с асимметричным потреблением… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00128 | Уязвимость программного обеспечения Chall-Manager, связанная с неограниченным распределен… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00127 | Уязвимость программной платформы для управления идентификационными данными ZITADEL, связа… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00126 | Уязвимость платформы для автоматизации рабочих процессов N8n, связанная с недостатками ме… | 09.01.2026 | 09.01.2026 |
| bdu:2026-00125 | Уязвимость платформы управления прикладными программными интерфейсами IBM API Connect, св… | 07.01.2026 | 07.01.2026 |
| bdu:2026-00124 | Уязвимость веб-интерфейса микропрограммного обеспечения маршрутизаторов D-Link DSL-2740R,… | 07.01.2026 | 07.01.2026 |
| bdu:2026-00123 | Уязвимость функции Code Node платформы для автоматизации рабочих процессов N8n, позволяющ… | 07.01.2026 | 07.01.2026 |
| bdu:2026-00122 | Уязвимость функции gfx_v9_0_sw_fini() модуля drivers/gpu/drm/amd/amdgpu/gfx_v9_0.c драйве… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00121 | Уязвимость функции strcpy() микропрограммного обеспечения маршрутизаторов UTT 512W, позво… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00120 | Уязвимость функции MultipartFile.move() пакета bodyparser программной платформы для созда… | 06.01.2026 | 09.01.2026 |
| bdu:2026-00119 | Уязвимость компонента DDNS Record операционной системы для управления сетевыми устройства… | 06.01.2026 | 06.01.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201310-0593 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, J… | 2026-03-07T20:56:30.940000Z |
| var-202108-1267 | An integer overflow was addressed with improved input validation. This issue is fixed in … | 2026-03-07T20:56:10.748000Z |
| var-201406-0142 | The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 bef… | 2026-03-07T20:54:42.567000Z |
| var-201312-0004 | Xen in the Linux kernel, when running a guest on a host without hardware assisted paging … | 2026-03-07T20:48:08.183000Z |
| var-201310-0084 | Off-by-one error in the __addr_ok macro in Xen 3.3 and earlier allows local 64 bit PV gue… | 2026-03-07T20:31:50.931000Z |
| var-201408-0081 | The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows m… | 2026-03-07T20:27:09.128000Z |
| var-201210-0179 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-07T20:24:49.179000Z |
| var-200609-0782 | Multiple buffer overflows in the Apple Type Services (ATS) server in Mac OS X 10.4 throug… | 2026-03-07T20:22:30.203000Z |
| var-201501-0340 | Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0… | 2026-03-07T20:21:02.921000Z |
| var-201409-1148 | Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash4… | 2026-03-07T20:18:17.087000Z |
| var-200609-0871 | Heap-based buffer overflow in the Finder in Apple Mac OS X 10.4.8 and earlier allows user… | 2026-03-07T20:17:55.895000Z |
| var-201110-0389 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2026-03-07T20:17:48.759000Z |
| var-201506-0496 | Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL be… | 2026-03-07T20:15:57.995000Z |
| var-200912-0769 | ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause … | 2026-03-07T20:12:15.882000Z |
| var-200609-1549 | The Online Certificate Status Protocol (OCSP) service in the Security Framework in Apple … | 2026-03-07T20:03:03.547000Z |
| var-201108-0132 | The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x thr… | 2026-03-07T20:00:13.509000Z |
| var-200609-1216 | The Security Framework in Apple Mac OS X 10.4 through 10.4.8 allows remote attackers to c… | 2026-03-07T20:00:12.091000Z |
| var-201511-0294 | The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows … | 2026-03-07T19:56:22.028000Z |
| var-200609-0717 | The Apple Type Services (ATS) server in Mac OS X 10.4.8 and earlier does not securely cre… | 2026-03-07T19:47:08.087000Z |
| var-200609-1229 | The Security Framework in Apple Mac OS X 10.3.x up to 10.3.9 does not properly prioritize… | 2026-03-07T19:46:55.413000Z |
| var-202602-0263 | A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. … | 2026-03-07T19:45:30.298000Z |
| var-202602-0256 | A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. … | 2026-03-07T19:45:30.275000Z |
| var-202602-0262 | A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. … | 2026-03-07T19:45:30.256000Z |
| var-202602-0261 | A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. … | 2026-03-07T19:45:30.237000Z |
| var-202602-0267 | A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. … | 2026-03-07T19:45:30.218000Z |
| var-202602-0260 | A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. … | 2026-03-07T19:45:30.186000Z |
| var-202602-0268 | A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. … | 2026-03-07T19:45:30.166000Z |
| var-202603-0071 | In Modem, there is a possible out of bounds write due to a missing bounds check. This cou… | 2026-03-05T23:43:43.098000Z |
| var-202007-0395 | Advantech iView, versions 5.6 and prior, contains multiple SQL injection vulnerabilities … | 2026-03-05T23:20:59.360000Z |
| var-201409-1154 | GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the value… | 2026-03-05T23:09:27.165000Z |