Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40492 |
9.8 (3.1)
|
SAIL has heap buffer overflow in XWD decoder — bits_pe… |
HappySeaFox |
sail |
2026-04-18T01:39:48.056Z | 2026-04-20T15:24:42.029Z |
| CVE-2026-40491 |
6.5 (3.1)
|
gdown Affected by Arbitrary File Write via Path Traver… |
wkentaro |
gdown |
2026-04-18T01:36:47.659Z | 2026-04-20T15:50:02.983Z |
| CVE-2026-40490 |
6.8 (3.1)
|
AsyncHttpClient leaks authorization credentials to unt… |
AsyncHttpClient |
async-http-client |
2026-04-18T01:31:13.860Z | 2026-04-20T14:55:50.254Z |
| CVE-2026-1559 |
6.4 (3.1)
|
Youzify <= 1.3.6 - Authenticated (Subscriber+) Stored … |
youzify |
Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress |
2026-04-18T01:26:05.210Z | 2026-04-20T13:46:08.353Z |
| CVE-2026-1838 |
6.1 (3.1)
|
Hostel <= 1.1.6 - Reflected Cross-Site Scripting via '… |
prasunsen |
Hostel |
2026-04-18T01:26:04.643Z | 2026-04-20T14:19:29.627Z |
| CVE-2026-40489 |
8.6 (4.0)
|
editorconfig-core-c has incomplete fix for CVE-2023-0341 |
editorconfig |
editorconfig-core-c |
2026-04-18T01:24:57.278Z | 2026-04-20T16:15:31.570Z |
| CVE-2026-40487 |
8.9 (3.1)
|
Postiz Has Unrestricted File Upload via MIME Type Spoo… |
gitroomhq |
postiz-app |
2026-04-18T01:19:06.588Z | 2026-04-20T15:25:40.893Z |
| CVE-2026-35582 |
8.8 (3.1)
|
Emissary has an OS Command Injection via Unvalidated I… |
NationalSecurityAgency |
emissary |
2026-04-18T01:16:27.661Z | 2026-04-20T15:48:51.543Z |
| CVE-2026-35465 |
7.5 (3.1)
|
SecureDrop Client has path injection in read_gzip_head… |
freedomofpress |
securedrop-client |
2026-04-18T00:41:16.594Z | 2026-04-20T15:47:43.822Z |
| CVE-2026-40572 |
9 (3.1)
|
NovumOS has Arbitrary Memory Mapping via Syscall 15 (M… |
MinecAnton209 |
NovumOS |
2026-04-18T00:16:02.590Z | 2026-04-20T14:55:57.521Z |
| CVE-2026-40317 |
9.4 (3.1)
|
NovumOS has Privilege Escalation in the Syscall Interface |
MinecAnton209 |
NovumOS |
2026-04-18T00:12:10.368Z | 2026-04-20T15:26:25.222Z |
| CVE-2026-40350 |
8.8 (3.1)
|
Movary User Management (/settings/users) has Authoriza… |
leepeuker |
movary |
2026-04-18T00:07:33.324Z | 2026-04-20T16:15:39.915Z |
| CVE-2026-40349 |
8.8 (3.1)
|
Authenticated Movary User Can Self-Escalate to Adminis… |
leepeuker |
movary |
2026-04-18T00:05:46.360Z | 2026-04-20T16:15:49.844Z |
| CVE-2026-40593 |
4.8 (3.1)
|
ChurchCRM: Stored XSS in UserEditor.php via Login Name Field |
ChurchCRM |
CRM |
2026-04-18T00:02:59.606Z | 2026-04-20T14:56:05.666Z |
| CVE-2026-40348 |
7.7 (3.1)
|
Movary has Authenticated SSRF via Jellyfin Server URL … |
leepeuker |
movary |
2026-04-18T00:01:09.725Z | 2026-04-20T16:11:32.779Z |
| CVE-2026-40347 |
5.3 (3.1)
|
Python-Multipart affected by Denial of Service via lar… |
Kludex |
python-multipart |
2026-04-17T23:56:50.777Z | 2026-04-20T15:46:40.011Z |
| CVE-2026-40346 |
6.4 (4.0)
|
NocoBase has SSRF in Workflow HTTP Request and Custom … |
nocobase |
@nocobase/plugin-workflow-request |
2026-04-17T23:54:34.829Z | 2026-04-20T14:56:12.829Z |
| CVE-2026-40581 |
8.1 (3.1)
|
ChurchCRM: Cross-Site Request Forgery (CSRF) in Select… |
ChurchCRM |
CRM |
2026-04-17T23:51:32.765Z | 2026-04-20T16:15:58.183Z |
| CVE-2026-40337 |
5.1 (3.1)
|
Sentry kernel has incomplete ownership check for IRQ l… |
camelot-os |
sentry-kernel |
2026-04-17T23:51:09.866Z | 2026-04-20T16:13:48.908Z |
| CVE-2026-40341 |
3.5 (3.1)
|
libgphoto2 has an OOB Read in ptp_unpack_EOS_FocusInfoEx |
gphoto |
libgphoto2 |
2026-04-17T23:48:36.644Z | 2026-04-20T16:14:19.107Z |
| CVE-2026-40340 |
6.1 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_OI() in ptp-pack… |
gphoto |
libgphoto2 |
2026-04-17T23:45:17.467Z | 2026-04-20T13:36:05.149Z |
| CVE-2026-40339 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_Sony_DPD() FormF… |
gphoto |
libgphoto2 |
2026-04-17T23:42:32.586Z | 2026-04-20T14:56:21.979Z |
| CVE-2026-40338 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_Sony_DPD() enume… |
gphoto |
libgphoto2 |
2026-04-17T23:40:10.097Z | 2026-04-20T16:16:08.585Z |
| CVE-2026-40485 |
5.3 (3.1)
|
ChurchCRM: Username Enumeration via Differential Respo… |
ChurchCRM |
CRM |
2026-04-17T23:29:35.884Z | 2026-04-20T13:36:05.319Z |
| CVE-2026-40336 |
2.4 (3.1)
|
libgphoto2 has memory leak in ptp_unpack_Sony_DPD() se… |
gphoto |
libgphoto2 |
2026-04-17T23:27:42.868Z | 2026-04-20T16:14:53.071Z |
| CVE-2026-2262 |
7.5 (3.1)
|
Easy Appointments <= 3.12.21 - Unauthenticated Sensiti… |
easyappointments |
Easy Appointments |
2026-04-17T23:26:48.863Z | 2026-04-20T13:51:28.513Z |
| CVE-2026-40484 |
9.1 (3.1)
|
ChurchCRM: Authenticated Remote Code Execution via Unr… |
ChurchCRM |
CRM |
2026-04-17T23:25:06.319Z | 2026-04-20T14:56:29.684Z |
| CVE-2026-40483 |
5.4 (3.1)
|
ChurchCRM: Stored XSS in PledgeEditor.php via Donation… |
ChurchCRM |
CRM |
2026-04-17T23:20:44.900Z | 2026-04-20T16:16:17.841Z |
| CVE-2026-40335 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_DPV() UINT128/IN… |
gphoto |
libgphoto2 |
2026-04-17T23:19:16.935Z | 2026-04-20T13:36:05.542Z |
| CVE-2026-40334 |
3.5 (3.1)
|
libgphoto2 missing null termination in ptp_unpack_Cano… |
gphoto |
libgphoto2 |
2026-04-17T23:16:38.751Z | 2026-04-20T13:36:05.703Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-6056 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-04-18T22:19:26.698Z | |
| CVE-2026-41242 |
9.4 (4.0)
|
protobufjs has an arbitrary code execution issue |
protobufjs |
protobuf.js |
2026-04-18T16:18:10.652Z | 2026-04-20T16:03:57.689Z |
| CVE-2026-40948 |
N/A
|
Apache Airflow Providers Keycloak: OAuth Login CSRF — … |
Apache Software Foundation |
Apache Airflow Providers Keycloak |
2026-04-18T13:22:41.577Z | 2026-04-20T16:17:53.543Z |
| CVE-2026-2986 |
6.4 (3.1)
|
Contextual Related Posts <= 4.2.1 - Authenticated (Con… |
ajay |
Contextual Related Posts |
2026-04-18T11:16:10.980Z | 2026-04-20T14:19:06.323Z |
| CVE-2026-2505 |
5.4 (3.1)
|
Categories Images <= 3.3.1 - Authenticated (Contributo… |
elzahlan |
Categories Images |
2026-04-18T09:26:52.654Z | 2026-04-20T13:46:07.918Z |
| CVE-2026-0894 |
6.4 (3.1)
|
Content Blocks (Custom Post Widget) <= 3.3.9 - Authent… |
vanderwijk |
Content Blocks (Custom Post Widget) |
2026-04-18T09:26:52.078Z | 2026-04-20T13:48:40.598Z |
| CVE-2026-41254 |
4 (3.1)
|
Little CMS (lcms2) through 2.18 has an integer ov… |
littlecms |
little cms color engine |
2026-04-18T06:43:13.741Z | 2026-04-20T16:09:45.530Z |
| CVE-2026-32690 |
N/A
|
Apache Airflow: 3.x - Nested Variable Secret Values By… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:22:26.081Z | 2026-04-20T16:11:33.956Z |
| CVE-2026-32228 |
N/A
|
Apache Airflow: Users with asset materialization permi… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:19:47.512Z | 2026-04-20T15:54:05.072Z |
| CVE-2026-30912 |
N/A
|
Apache Airflow: Exposing stack trace in case of constr… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:20:30.254Z | 2026-04-20T16:26:07.128Z |
| CVE-2026-30898 |
N/A
|
Apache Airflow: Bad example of BashOperator shell inje… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:20:48.647Z | 2026-04-22T03:55:38.783Z |
| CVE-2026-25917 |
N/A
|
Apache Airflow: API extra-links triggers XCom deserial… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:20:11.187Z | 2026-04-22T13:58:49.807Z |
| CVE-2026-41253 |
6.9 (3.1)
|
In iTerm2 through 3.6.9, displaying a .txt file c… |
iTerm2 |
iTerm2 |
2026-04-18T05:27:08.202Z | 2026-04-20T15:52:10.357Z |
| CVE-2026-6518 |
8.8 (3.1)
|
CMP – Coming Soon & Maintenance Plugin by NiteoThemes … |
niteo |
CMP – Coming Soon & Maintenance Plugin by NiteoThemes |
2026-04-18T03:37:04.707Z | 2026-04-20T13:46:08.222Z |
| CVE-2026-6048 |
6.4 (3.1)
|
Flipbox Addon for Elementor <= 2.1.1 - Authenticated (… |
dragwyb |
Flipbox Addon for Elementor |
2026-04-18T03:37:05.751Z | 2026-04-20T13:46:08.081Z |
| CVE-2026-4801 |
6.4 (3.1)
|
Page Builder Gutenberg Blocks <= 3.1.16 - Authenticate… |
godaddy |
Page Builder Gutenberg Blocks – CoBlocks |
2026-04-18T03:37:03.859Z | 2026-04-20T14:42:38.120Z |
| CVE-2026-40494 |
9.8 (3.1)
|
SAIL has heap buffer overflow in TGA RLE decoder — raw… |
HappySeaFox |
sail |
2026-04-18T01:42:48.830Z | 2026-04-20T14:55:42.859Z |
| CVE-2026-40493 |
9.8 (3.1)
|
SAIL has heap buffer overflow in PSD decoder — bpp mis… |
HappySeaFox |
sail |
2026-04-18T01:41:14.664Z | 2026-04-20T16:15:22.120Z |
| CVE-2026-40492 |
9.8 (3.1)
|
SAIL has heap buffer overflow in XWD decoder — bits_pe… |
HappySeaFox |
sail |
2026-04-18T01:39:48.056Z | 2026-04-20T15:24:42.029Z |
| CVE-2026-40491 |
6.5 (3.1)
|
gdown Affected by Arbitrary File Write via Path Traver… |
wkentaro |
gdown |
2026-04-18T01:36:47.659Z | 2026-04-20T15:50:02.983Z |
| CVE-2026-40490 |
6.8 (3.1)
|
AsyncHttpClient leaks authorization credentials to unt… |
AsyncHttpClient |
async-http-client |
2026-04-18T01:31:13.860Z | 2026-04-20T14:55:50.254Z |
| CVE-2026-40489 |
8.6 (4.0)
|
editorconfig-core-c has incomplete fix for CVE-2023-0341 |
editorconfig |
editorconfig-core-c |
2026-04-18T01:24:57.278Z | 2026-04-20T16:15:31.570Z |
| CVE-2026-40487 |
8.9 (3.1)
|
Postiz Has Unrestricted File Upload via MIME Type Spoo… |
gitroomhq |
postiz-app |
2026-04-18T01:19:06.588Z | 2026-04-20T15:25:40.893Z |
| CVE-2026-35582 |
8.8 (3.1)
|
Emissary has an OS Command Injection via Unvalidated I… |
NationalSecurityAgency |
emissary |
2026-04-18T01:16:27.661Z | 2026-04-20T15:48:51.543Z |
| CVE-2026-1838 |
6.1 (3.1)
|
Hostel <= 1.1.6 - Reflected Cross-Site Scripting via '… |
prasunsen |
Hostel |
2026-04-18T01:26:04.643Z | 2026-04-20T14:19:29.627Z |
| CVE-2026-1559 |
6.4 (3.1)
|
Youzify <= 1.3.6 - Authenticated (Subscriber+) Stored … |
youzify |
Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress |
2026-04-18T01:26:05.210Z | 2026-04-20T13:46:08.353Z |
| CVE-2026-40572 |
9 (3.1)
|
NovumOS has Arbitrary Memory Mapping via Syscall 15 (M… |
MinecAnton209 |
NovumOS |
2026-04-18T00:16:02.590Z | 2026-04-20T14:55:57.521Z |
| CVE-2026-40350 |
8.8 (3.1)
|
Movary User Management (/settings/users) has Authoriza… |
leepeuker |
movary |
2026-04-18T00:07:33.324Z | 2026-04-20T16:15:39.915Z |
| CVE-2026-40317 |
9.4 (3.1)
|
NovumOS has Privilege Escalation in the Syscall Interface |
MinecAnton209 |
NovumOS |
2026-04-18T00:12:10.368Z | 2026-04-20T15:26:25.222Z |
| CVE-2026-35465 |
7.5 (3.1)
|
SecureDrop Client has path injection in read_gzip_head… |
freedomofpress |
securedrop-client |
2026-04-18T00:41:16.594Z | 2026-04-20T15:47:43.822Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-2xxp-g6g6-xch7 |
5.4 (3.1)
|
The WSO2 API Manager developer portal accepts user-supplied input without enforcing expected valida… | 2026-04-16T12:31:41Z | 2026-04-16T12:31:41Z |
| ghsa-c2m4-xc4p-9x32 |
7.3 (3.1)
|
Dell Storage Manager - Replay Manager for Microsoft Servers, version(s) 8.0, contain(s) an Improper… | 2026-04-16T09:31:45Z | 2026-04-16T09:31:45Z |
| ghsa-98jv-r7r8-3rqm |
7.5 (3.1)
|
The XML parsers within multiple WSO2 products accept user-supplied XML data without properly config… | 2026-04-16T09:31:45Z | 2026-04-16T09:31:45Z |
| ghsa-x998-f64j-xppw |
6.1 (3.1)
|
The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scr… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-v677-rmj8-wwf4 |
8.8 (3.1)
|
The Livemesh Addons for Elementor plugin for WordPress is vulnerable to Local File Inclusion in all… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-rc35-963c-p69f |
6.5 (3.1)
|
LINE client for iOS versions prior to 26.3.0 contains a vulnerability in the in-app browser where o… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-q42f-8h4q-g7mm |
6.2 (3.1)
|
In ONLYOFFICE DesktopEditors before 9.3.0, the update service allows attackers to perform actions o… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-pq6h-83gw-pj9p |
4.4 (3.1)
|
The OPEN-BRAIN plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'API Key' … | 2026-04-16T09:31:44Z | 2026-04-16T09:31:45Z |
| ghsa-m34r-4v3r-pp9v |
7.4 (3.1)
|
In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call… | 2026-04-16T09:31:44Z | 2026-04-22T06:30:28Z |
| ghsa-j38x-p248-237v |
8.8 (3.1)
|
The Career Section plugin for WordPress is vulnerable to Cross-Site Request Forgery leading to Path… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-8jmv-f2mx-h22c |
5.3 (3.1)
|
The Post Grid Gutenberg Blocks for News, Magazines, Blog Websites – PostX plugin for WordPress is v… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-4mcf-jj9c-gvp6 |
7.2 (3.1)
|
The Prismatic plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'prismatic_… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-2jv9-g2gr-pf4j |
6.4 (3.1)
|
The BetterDocs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'betterdoc… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-28j6-w975-f9x7 |
5.0 (3.1)
|
ONLYOFFICE DocumentServer before 9.3.0 has an untrusted pointer dereference in XLS processing/conve… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-jvgv-2979-qhcj |
6.4 (3.1)
|
The Livemesh Addons for Elementor plugin for WordPress is vulnerable to unauthorized modification o… | 2026-04-16T09:31:43Z | 2026-04-16T09:31:43Z |
| ghsa-9726-56v6-8wh4 |
6.4 (3.1)
|
The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for… | 2026-04-16T09:31:43Z | 2026-04-16T09:31:43Z |
| ghsa-xcvh-9j7m-6vw3 |
6.5 (3.1)
|
Eaton Intelligent Power Protector (IPP) software allows repeated authentication attempts against th… | 2026-04-16T06:31:23Z | 2026-04-22T21:31:47Z |
| ghsa-w622-v92m-9f53 |
6.0 (3.1)
|
Due to improper input validation in one of the Eaton Intelligent Power Protector (IPP) XML, it is p… | 2026-04-16T06:31:23Z | 2026-04-22T21:31:46Z |
| ghsa-w3cg-4gfc-vw5x |
7.8 (3.1)
|
Eaton Intelligent Power Protector (IPP) is affected by insecure library loading in its executable, … | 2026-04-16T06:31:23Z | 2026-04-22T21:31:49Z |
| ghsa-rhf4-34xg-3v3j |
6.3 (3.1)
5.1 (4.0)
|
UDP Console provided by Arcserve contains an incorrectly specified destination in a communication c… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-rg9x-pgh3-3gwf |
6.5 (3.1)
|
The Accessibility Suite by Ability, Inc plugin for WordPress is vulnerable to SQL Injection via the… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-m6jh-hgc7-xggx |
5.7 (3.1)
|
Eaton Intelligent Power Protector (IPP) uses an insecure cookie configuration, which could allow a … | 2026-04-16T06:31:23Z | 2026-04-22T21:31:48Z |
| ghsa-jp62-r24w-285j |
6.4 (3.1)
|
The WP Docs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpdocs_optio… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-hjc2-4gp6-gj54 |
4.3 (3.1)
|
In Wago Smart Designer in versions up to 2.33.1 a low privileged remote attacker may enumerate proj… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-gp63-xp8x-53g4 |
8.8 (3.1)
|
In products of the MSE6 product-family by Festo a remote authenticated, low privileged attacker cou… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-9ghh-rh79-4vmr |
5.9 (3.1)
|
A security misconfiguration was identified in Eaton Intelligent Power Protector (IPP), where an HTT… | 2026-04-16T06:31:23Z | 2026-04-22T21:31:49Z |
| ghsa-8m7q-ggj7-m3wx |
7.5 (3.1)
|
The Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection via the 'options' … | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-83mq-cmhp-6pvq |
6.1 (3.1)
|
The CodeColorer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' p… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-742g-5jmq-x7cr |
6.4 (3.1)
|
The Vantage theme for WordPress is vulnerable to Stored Cross-Site Scripting via Gallery block text… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-6pcx-jf98-3w2h |
7.5 (3.1)
|
The Payment Gateway for Redsys & WooCommerce Lite plugin for WordPress is vulnerable to Improper Ve… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-263 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:43.190554Z |
| pysec-2021-257 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:42.637508Z |
| pysec-2021-760 |
|
TensorFlow is an end-to-end open source platform for machine learning. The code for `tf.r… | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:36.563048Z |
| pysec-2021-758 |
|
TensorFlow is an end-to-end open source platform for machine learning. When a user does n… | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:36.390179Z |
| pysec-2021-754 |
|
TensorFlow is an end-to-end open source platform for machine learning. If a user does not… | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:36.031970Z |
| pysec-2021-750 |
|
TensorFlow is an end-to-end open source platform for machine learning. When restoring ten… | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:35.665255Z |
| pysec-2021-749 |
|
TensorFlow is an end-to-end open source platform for machine learning. Sending invalid ar… | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:35.577694Z |
| pysec-2021-748 |
|
TensorFlow is an end-to-end open source platform for machine learning. It is possible to … | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:35.492639Z |
| pysec-2021-562 |
|
TensorFlow is an end-to-end open source platform for machine learning. The code for `tf.r… | tensorflow-cpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:03.183506Z |
| pysec-2021-560 |
|
TensorFlow is an end-to-end open source platform for machine learning. When a user does n… | tensorflow-cpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:03.005830Z |
| pysec-2021-556 |
|
TensorFlow is an end-to-end open source platform for machine learning. If a user does not… | tensorflow-cpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:02.665889Z |
| pysec-2021-552 |
|
TensorFlow is an end-to-end open source platform for machine learning. When restoring ten… | tensorflow-cpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:02.331501Z |
| pysec-2021-551 |
|
TensorFlow is an end-to-end open source platform for machine learning. Sending invalid ar… | tensorflow-cpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:02.233432Z |
| pysec-2021-550 |
|
TensorFlow is an end-to-end open source platform for machine learning. It is possible to … | tensorflow-cpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:02.145086Z |
| pysec-2021-271 |
|
TensorFlow is an end-to-end open source platform for machine learning. The code for `tf.r… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:43.879548Z |
| pysec-2021-269 |
|
TensorFlow is an end-to-end open source platform for machine learning. When a user does n… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:43.708163Z |
| pysec-2021-265 |
|
TensorFlow is an end-to-end open source platform for machine learning. If a user does not… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:43.365129Z |
| pysec-2021-261 |
|
TensorFlow is an end-to-end open source platform for machine learning. When restoring ten… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:43.020795Z |
| pysec-2021-260 |
|
TensorFlow is an end-to-end open source platform for machine learning. Sending invalid ar… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:42.935785Z |
| pysec-2021-259 |
|
TensorFlow is an end-to-end open source platform for machine learning. It is possible to … | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:42.844418Z |
| pysec-2021-771 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:37.526889Z |
| pysec-2021-764 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:36.903192Z |
| pysec-2021-753 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:35.943696Z |
| pysec-2021-751 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:35.756075Z |
| pysec-2021-747 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:35.406311Z |
| pysec-2021-573 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:04.091418Z |
| pysec-2021-566 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:03.512666Z |
| pysec-2021-555 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:02.576943Z |
| pysec-2021-553 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:02.412159Z |
| pysec-2021-549 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:02.050023Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1566 | Malicious code in transform-for-of (npm) | 2026-03-18T08:15:59Z | 2026-03-23T05:16:31Z |
| mal-2026-1572 | Malicious code in transform-new-target (npm) | 2026-03-18T08:15:30Z | 2026-03-23T05:16:31Z |
| mal-2026-1575 | Malicious code in transform-typescript (npm) | 2026-03-18T08:15:09Z | 2026-03-23T05:16:31Z |
| mal-2026-1563 | Malicious code in transform-es2015-shorthand-properties (npm) | 2026-03-18T08:14:34Z | 2026-03-23T05:16:31Z |
| mal-2026-1562 | Malicious code in transform-es2015-parameters (npm) | 2026-03-18T08:13:44Z | 2026-03-23T05:16:31Z |
| mal-2026-1557 | Malicious code in add-react-displayname (npm) | 2026-03-18T08:13:24Z | 2026-04-16T15:42:07Z |
| mal-2026-1570 | Malicious code in transform-member-expression-literals (npm) | 2026-03-18T08:12:49Z | 2026-03-23T05:16:31Z |
| mal-2026-1573 | Malicious code in transform-proto-to-assign (npm) | 2026-03-18T07:53:56Z | 2026-03-23T05:16:31Z |
| mal-2026-1567 | Malicious code in transform-function-bind (npm) | 2026-03-18T07:51:26Z | 2026-03-23T05:16:31Z |
| mal-2026-1558 | Malicious code in syntax-async-generators (npm) | 2026-03-18T07:50:36Z | 2026-03-23T05:16:31Z |
| mal-2026-1564 | Malicious code in transform-es2015-spread (npm) | 2026-03-18T07:50:17Z | 2026-03-23T05:16:31Z |
| mal-2026-1565 | Malicious code in transform-export-extensions (npm) | 2026-03-18T07:49:25Z | 2026-03-23T05:16:31Z |
| mal-2026-1561 | Malicious code in transform-es2015-duplicate-keys (npm) | 2026-03-18T07:49:07Z | 2026-03-23T05:16:31Z |
| mal-2026-1550 | Malicious code in syntax-export-extensions (npm) | 2026-03-18T07:25:23Z | 2026-03-23T05:16:31Z |
| mal-2026-1548 | Malicious code in syntax-class-constructor-call (npm) | 2026-03-18T07:23:59Z | 2026-03-23T05:16:31Z |
| mal-2026-1549 | Malicious code in syntax-do-expressions (npm) | 2026-03-18T07:23:53Z | 2026-03-23T05:16:31Z |
| mal-2026-1551 | Malicious code in syntax-function-bind (npm) | 2026-03-18T07:23:52Z | 2026-03-23T05:16:31Z |
| mal-2026-1546 | Malicious code in dazaar-payment (npm) | 2026-03-18T07:22:24Z | 2026-03-23T05:16:26Z |
| mal-2026-1545 | Malicious code in dazaar-cli (npm) | 2026-03-18T07:22:23Z | 2026-03-23T05:16:26Z |
| mal-2026-1547 | Malicious code in pear-wrk-wdk (npm) | 2026-03-18T07:22:07Z | 2026-03-23T05:16:29Z |
| mal-2026-1556 | Malicious code in yoshi-base (npm) | 2026-03-18T06:58:20Z | 2026-03-23T05:16:32Z |
| mal-2026-1552 | Malicious code in typescript-nhost (npm) | 2026-03-18T06:58:20Z | 2026-03-23T05:16:31Z |
| mal-2026-1554 | Malicious code in typescript-validation-schema (npm) | 2026-03-18T06:57:44Z | 2026-03-23T05:16:31Z |
| mal-2026-1553 | Malicious code in typescript-react-query (npm) | 2026-03-18T06:57:11Z | 2026-03-23T05:16:31Z |
| mal-2026-1555 | Malicious code in typescript-vue-apollo-smart-ops (npm) | 2026-03-18T06:56:54Z | 2026-03-23T05:16:31Z |
| mal-2026-1544 | Malicious code in rowrap (PyPI) | 2026-03-18T06:42:54Z | 2026-03-23T23:47:07Z |
| mal-2026-1543 | Malicious code in aniresolve (PyPI) | 2026-03-18T06:20:16Z | 2026-03-18T06:20:16Z |
| mal-2026-1542 | Malicious code in bugbounty-test-123 (npm) | 2026-03-18T05:45:48Z | 2026-03-23T05:16:25Z |
| mal-2026-1539 | Malicious code in relay-optimizer-plugin (npm) | 2026-03-18T05:14:43Z | 2026-03-23T05:16:30Z |
| mal-2026-1541 | Malicious code in urql-introspection (npm) | 2026-03-18T05:14:14Z | 2026-03-23T05:16:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1778 | ServiceNow Now Platform (AI Platform): Schwachstelle ermöglicht Umgehung von Sicherheitsmechanismen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1777 | Zoom Video Communications Zoom Client: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1776 | Microsoft Visual Studio: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-09-02T22:00:00.000+00:00 |
| wid-sec-w-2025-1775 | Ivanti Avalanche: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1774 | Ivanti Connect Secure und Policy Secure: Mehrere Schwachstelle | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1773 | Microsoft Teams Geräte: Schwachstelle ermöglicht Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1772 | Siemens SICAM: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1771 | Mehrere Siemens-Produkte: Schwachstelle ermöglicht Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1770 | AMD Prozessoren: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1769 | Siemens SIMATIC S7: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1768 | Siemens SIPROTEC: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1767 | AMD Radeon Graphics Products: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-11-02T23:00:00.000+00:00 |
| wid-sec-w-2025-1766 | Liferay Portal und DXP: Schwachstelle ermöglicht Denial of Service | 2025-08-11T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1765 | Axis Camera Station und Device Manager: Mehrere Schwachstellen | 2025-08-11T22:00:00.000+00:00 | 2025-08-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1764 | Bouncy Castle: Schwachstelle ermöglicht Denial of Service | 2025-08-11T22:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-1763 | QEMU: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-08-11T22:00:00.000+00:00 | 2025-09-04T22:00:00.000+00:00 |
| wid-sec-w-2025-1762 | Axis Axis OS: Mehrere Schwachstellen | 2025-08-11T22:00:00.000+00:00 | 2025-08-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1761 | Omnissa Workspace ONE UEM: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-08-11T22:00:00.000+00:00 | 2025-09-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1760 | ESRI ArcGIS Enterprise Sites: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2025-08-11T22:00:00.000+00:00 | 2025-08-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1759 | GIMP: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-11T22:00:00.000+00:00 | 2025-08-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1758 | SAP Patchday August 2025: Mehrere Schwachstellen | 2025-08-11T22:00:00.000+00:00 | 2025-09-07T22:00:00.000+00:00 |
| wid-sec-w-2025-1757 | Linux Kernel: Schwachstelle ermöglicht Umgehen von Sicherheitsmechanismen | 2025-08-11T22:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1756 | libTIFF: Schwachstelle ermöglicht Denial of Service | 2025-08-11T22:00:00.000+00:00 | 2025-11-09T23:00:00.000+00:00 |
| wid-sec-w-2025-1755 | JasPer: Mehrere Schwachstellen | 2025-08-10T22:00:00.000+00:00 | 2025-11-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1754 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-08-10T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1753 | vim: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-08-10T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1752 | Liferay Portal und DXP: Mehrere Schwachstellen | 2025-08-10T22:00:00.000+00:00 | 2025-08-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1751 | Apache CXF: Schwachstelle ermöglicht Codeausführung | 2025-08-10T22:00:00.000+00:00 | 2025-10-05T22:00:00.000+00:00 |
| wid-sec-w-2025-1750 | 7-Zip: Schwachstelle ermöglicht Manipulation von Dateien | 2025-08-10T22:00:00.000+00:00 | 2025-08-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1749 | win.rar WinRAR: Schwachstelle ermöglicht Codeausführung | 2025-08-10T22:00:00.000+00:00 | 2025-08-10T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-333-05 | Mitsubishi Electric FA Engineering Software (Update C) | 2022-12-05T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsma-22-335-01 | BD BodyGuard Pumps | 2022-12-01T00:00:00.000000Z | 2022-12-01T00:00:00.000000Z |
| icsa-22-335-02 | Horner Automation Remote Compact Controller | 2022-12-01T00:00:00.000000Z | 2022-12-01T00:00:00.000000Z |
| icsa-22-335-01 | Mitsubishi Electric MELSEC iQ-R Series | 2022-12-01T00:00:00.000000Z | 2022-12-01T00:00:00.000000Z |
| icsa-26-015-02 | Festo Firmware | 2022-11-29T11:49:00.000000Z | 2026-01-14T22:46:49.184310Z |
| icsa-22-333-03 | Hitachi Energy MicroSCADA Pro/X SYS600 Products (Update A) | 2022-11-29T07:00:00.000000Z | 2023-11-09T07:00:00.000000Z |
| icsa-22-333-02 | Hitachi Energy IED Connectivity Packages and PCM600 Products (Update A) | 2022-11-29T07:00:00.000000Z | 2024-07-23T06:00:00.000000Z |
| icsa-22-333-04 | Moxa UC Series | 2022-11-29T00:00:00.000000Z | 2023-02-23T00:00:00.000000Z |
| icsa-22-333-01 | Mitsubishi Electric GOT2000 | 2022-11-29T00:00:00.000000Z | 2022-11-29T00:00:00.000000Z |
| icsa-22-326-02 | Digital Alert Systems DASDEC | 2022-11-22T07:00:00.000000Z | 2022-11-22T07:00:00.000000Z |
| icsa-22-326-05 | Moxa Multiple ARM-Based Computers | 2022-11-22T00:00:00.000000Z | 2022-11-22T00:00:00.000000Z |
| icsa-22-326-04 | GE CIMPLICITY | 2022-11-22T00:00:00.000000Z | 2022-11-22T00:00:00.000000Z |
| icsa-22-326-03 | Phoenix Contact Automation Worx | 2022-11-22T00:00:00.000000Z | 2022-11-22T00:00:00.000000Z |
| icsa-22-326-01 | AVEVA Edge | 2022-11-22T00:00:00.000000Z | 2022-11-22T00:00:00.000000Z |
| icsa-22-321-02 | Cradlepoint IBR600 | 2022-11-17T00:00:00.000000Z | 2022-11-17T00:00:00.000000Z |
| icsa-22-321-01 | Red Lion Crimson | 2022-11-17T00:00:00.000000Z | 2022-11-17T00:00:00.000000Z |
| icsa-22-319-01 | Mitsubishi Electric GT SoftGOT2000 | 2022-11-15T00:00:00.000000Z | 2022-11-15T00:00:00.000000Z |
| icsa-22-314-08 | Omron NJ/NX-series Machine Automation Controllers | 2022-11-10T00:00:00.000000Z | 2022-11-10T00:00:00.000000Z |
| icsa-22-314-07 | Omron NJ/NX-series Machine Automation Controllers | 2022-11-10T00:00:00.000000Z | 2022-11-10T00:00:00.000000Z |
| icsa-22-298-06 | Delta Electronics DIAEnergie | 2022-11-10T00:00:00.000000Z | 2023-02-16T00:00:00.000000Z |
| icsa-22-314-11 | Siemens SICAM Q100 | 2022-11-08T00:00:00.000000Z | 2024-01-09T00:00:00.000000Z |
| icsa-22-314-10 | Siemens SCALANCE W1750D | 2022-11-08T00:00:00.000000Z | 2023-02-14T00:00:00.000000Z |
| icsa-22-314-09 | Siemens Teamcenter Visualization and JT2Go | 2022-11-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-314-06 | Siemens QMS Automotive | 2022-11-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-314-05 | Siemens RUGGEDCOM ROS | 2022-11-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-22-314-04 | Siemens SINUMERIK ONE and SINUMERIK MC | 2022-11-08T00:00:00.000000Z | 2023-02-14T00:00:00.000000Z |
| icsa-22-314-03 | Siemens SINEC Network Management System Logback Component | 2022-11-08T00:00:00.000000Z | 2022-11-08T00:00:00.000000Z |
| icsa-22-314-02 | Siemens Web Server Login Page of Industrial Controllers | 2022-11-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-314-01 | Siemens Parasolid | 2022-11-08T00:00:00.000000Z | 2022-11-08T00:00:00.000000Z |
| icsa-22-307-02 | Nokia ASIK AirScale System Module | 2022-11-03T06:00:00.000000Z | 2022-11-03T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-cisco-prime-priv-esc-hyhwdzba | Cisco Prime License Manager Privilege Escalation Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-sbswitch-session-jzas5jny | Cisco Small Business Smart and Managed Switches Session Management Vulnerability | 2020-07-01T16:00:00+00:00 | 2020-07-01T16:00:00+00:00 |
| cisco-sa-sa-rv-routers-xss-k7z5u6q3 | Cisco Small Business RV042 and RV042G Routers Cross-Site Scripting Vulnerability | 2020-07-01T16:00:00+00:00 | 2020-07-01T16:00:00+00:00 |
| cisco-sa-mlt-ise-strd-xss-nqfhttx7 | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2020-07-01T16:00:00+00:00 | 2020-07-01T16:00:00+00:00 |
| cisco-sa-dnac-info-disc-6xscydyy | Cisco Digital Network Architecture Center Information Disclosure Vulnerability | 2020-07-01T16:00:00+00:00 | 2020-07-01T16:00:00+00:00 |
| cisco-sa-cvp-info-dislosure-nzbewj9v | Cisco Unified Customer Voice Portal Information Disclosure Vulnerability | 2020-07-01T16:00:00+00:00 | 2020-08-11T13:54:42+00:00 |
| cisco-sa-cucm-xss-blzw4ctq | Cisco Unified Communications Manager Stored Cross-Site Scripting Vulnerability | 2020-07-01T16:00:00+00:00 | 2020-07-01T16:00:00+00:00 |
| cisco-sa-cucm-cuc-imp-xss-owusyap | Cisco Unified Communications Products Cross-Site Scripting Vulnerability | 2020-07-01T16:00:00+00:00 | 2020-07-01T16:00:00+00:00 |
| cisco-sa-anyconnect-mac-dos-36s2y3lv | Cisco AnyConnect Secure Mobility Client for Mac OS File Corruption Vulnerability | 2020-07-01T16:00:00+00:00 | 2020-07-01T16:00:00+00:00 |
| cisco-sa-telnetd-efjrezpx | Telnet Vulnerability Affecting Cisco Products: June 2020 | 2020-06-24T16:00:00+00:00 | 2020-07-08T16:58:30+00:00 |
| cisco-sa-treck-ip-stack-jybq5gyc | Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020 | 2020-06-17T20:00:00+00:00 | 2020-08-21T16:40:13+00:00 |
| cisco-sa-xracl-zbwswret | Cisco IOS XR Software Standby Route Processor Gigabit Ethernet Management Interface Access Control List Bypass Vulnerability | 2020-06-17T16:00:00+00:00 | 2020-06-17T16:00:00+00:00 |
| cisco-sa-webex-token-zpvejkn | Cisco Webex Meetings and Cisco Webex Meetings Server Token Handling Unauthorized Access Vulnerability | 2020-06-17T16:00:00+00:00 | 2020-06-17T16:00:00+00:00 |
| cisco-sa-webex-client-url-fcmpdfvy | Cisco Webex Meetings Desktop App and Webex Meetings Client URL Filtering Arbitrary Program Execution Vulnerability | 2020-06-17T16:00:00+00:00 | 2020-08-11T16:29:52+00:00 |
| cisco-sa-webex-client-nbmqm9vt | Cisco Webex Meetings Desktop App for Windows Shared Memory Information Disclosure Vulnerability | 2020-06-17T16:00:00+00:00 | 2021-05-05T15:31:08+00:00 |
| cisco-sa-webex-client-mac-x7vp65bl | Cisco Webex Meetings Desktop App for Mac Update Feature Code Execution Vulnerability | 2020-06-17T16:00:00+00:00 | 2020-06-17T16:00:00+00:00 |
| cisco-sa-umbrella-open-redire-ugk9dwk4 | Cisco Umbrella Open Redirect Vulnerability | 2020-06-17T16:00:00+00:00 | 2020-06-17T16:00:00+00:00 |
| cisco-sa-ucsd-task-path-trav-d67zuak7 | Cisco UCS Director Path Traversal Vulnerability | 2020-06-17T16:00:00+00:00 | 2020-06-17T16:00:00+00:00 |
| cisco-sa-ucsd-info-disclosure-gsmu8ekt | Cisco UCS Director Information Disclosure Vulnerability | 2020-06-17T16:00:00+00:00 | 2020-06-17T16:00:00+00:00 |
| cisco-sa-tp-cmd-inj-7zpwhvzb | Cisco TelePresence Collaboration Endpoint and RoomOS Software Command Injection Vulnerability | 2020-06-17T16:00:00+00:00 | 2020-06-17T16:00:00+00:00 |
| cisco-sa-rv-routers-stack-vuxhmnnz | Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities | 2020-06-17T16:00:00+00:00 | 2020-06-17T16:00:00+00:00 |
| cisco-sa-rv-routers-rj5jrff8 | Cisco Small Business RV Series Routers Command Injection Vulnerabilities | 2020-06-17T16:00:00+00:00 | 2020-08-03T16:18:58+00:00 |
| cisco-sa-rv-routers-injection-twc7krkq | Cisco Small Business RV110W, RV130, RV130W, and RV215W Series Routers Management Interface Vulnerabilities | 2020-06-17T16:00:00+00:00 | 2020-06-17T16:00:00+00:00 |
| cisco-sa-phone-logs-2o7f7exm | Cisco IP Phones Call Log Information Disclosure Vulnerability | 2020-06-17T16:00:00+00:00 | 2020-06-18T14:54:30+00:00 |
| cisco-sa-on-prem-access-ctrl-fpqrfdpf | Cisco Smart Software Manager On-Prem Improper Access Control Vulnerability | 2020-06-17T16:00:00+00:00 | 2020-06-17T16:00:00+00:00 |
| cisco-sa-nso-info-disclosure-wdnvbtnq | Cisco Network Services Orchestrator Information Disclosure Vulnerability | 2020-06-17T16:00:00+00:00 | 2020-06-17T16:00:00+00:00 |
| cisco-sa-nfvis-ptrav-shmzzwvr | Cisco Enterprise NFV Infrastructure Software Path Traversal Vulnerability | 2020-06-17T16:00:00+00:00 | 2020-06-17T16:00:00+00:00 |
| cisco-sa-famp-zepdxy | Cisco AMP for Endpoints and ClamAV Privilege Escalation Vulnerability | 2020-06-17T16:00:00+00:00 | 2020-06-17T16:00:00+00:00 |
| cisco-sa-esa-url-bypass-wo4bz75s | Cisco Email Security Appliance URL Filtering Bypass Vulnerability | 2020-06-17T16:00:00+00:00 | 2020-06-17T16:00:00+00:00 |
| cisco-sa-dcnm-stored-xss-yjyqbjgu | Cisco Data Center Network Manager Stored Cross-Site Scripting Vulnerability | 2020-06-17T16:00:00+00:00 | 2020-06-17T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-68263 | ksmbd: ipc: fix use-after-free in ipc_msg_send_request | 2025-12-02T00:00:00.000Z | 2026-01-13T01:36:19.000Z |
| msrc_cve-2025-68261 | ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock() | 2025-12-02T00:00:00.000Z | 2026-02-18T14:24:17.000Z |
| msrc_cve-2025-68259 | KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced | 2025-12-02T00:00:00.000Z | 2026-02-18T14:27:07.000Z |
| msrc_cve-2025-68258 | comedi: multiq3: sanitize config options in multiq3_attach() | 2025-12-02T00:00:00.000Z | 2026-01-13T01:38:07.000Z |
| msrc_cve-2025-68257 | comedi: check device's attached status in compat ioctls | 2025-12-02T00:00:00.000Z | 2026-01-13T01:37:23.000Z |
| msrc_cve-2025-68256 | staging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser | 2025-12-02T00:00:00.000Z | 2026-01-08T14:48:00.000Z |
| msrc_cve-2025-68255 | staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing | 2025-12-02T00:00:00.000Z | 2026-01-08T14:45:20.000Z |
| msrc_cve-2025-68254 | staging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing | 2025-12-02T00:00:00.000Z | 2026-02-18T14:29:01.000Z |
| msrc_cve-2025-68239 | binfmt_misc: restore write access before closing files opened by open_exec() | 2025-12-02T00:00:00.000Z | 2026-03-27T14:36:16.000Z |
| msrc_cve-2025-68237 | mtdchar: fix integer overflow in read/write ioctls | 2025-12-02T00:00:00.000Z | 2026-01-07T14:38:38.000Z |
| msrc_cve-2025-68236 | scsi: ufs: ufs-qcom: Fix UFS OCP issue during UFS power down (PC=3) | 2025-12-02T00:00:00.000Z | 2026-01-13T01:37:08.000Z |
| msrc_cve-2025-68235 | nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot | 2025-12-02T00:00:00.000Z | 2026-01-07T14:37:58.000Z |
| msrc_cve-2025-68233 | drm/tegra: Add call to put_pid() | 2025-12-02T00:00:00.000Z | 2026-01-13T01:37:52.000Z |
| msrc_cve-2025-68231 | mm/mempool: fix poisoning order>0 pages with HIGHMEM | 2025-12-02T00:00:00.000Z | 2026-01-07T14:37:52.000Z |
| msrc_cve-2025-68230 | drm/amdgpu: fix gpu page fault after hibernation on PF passthrough | 2025-12-02T00:00:00.000Z | 2026-03-31T14:48:34.000Z |
| msrc_cve-2025-68229 | scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:38:12.000Z |
| msrc_cve-2025-68227 | mptcp: Fix proto fallback detection with BPF | 2025-12-02T00:00:00.000Z | 2026-01-07T14:38:32.000Z |
| msrc_cve-2025-68224 | scsi: core: Fix a regression triggered by scsi_host_busy() | 2025-12-02T00:00:00.000Z | 2025-12-17T01:01:38.000Z |
| msrc_cve-2025-68223 | drm/radeon: delete radeon_fence_process in is_signaled, no deadlock | 2025-12-02T00:00:00.000Z | 2026-03-31T15:16:57.000Z |
| msrc_cve-2025-68222 | pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc | 2025-12-02T00:00:00.000Z | 2026-01-13T01:37:45.000Z |
| msrc_cve-2025-68220 | net: ethernet: ti: netcp: Standardize knav_dma_open_channel to return NULL on error | 2025-12-02T00:00:00.000Z | 2026-01-13T01:37:38.000Z |
| msrc_cve-2025-68219 | cifs: fix memory leak in smb3_fs_context_parse_param error path | 2025-12-02T00:00:00.000Z | 2026-01-07T14:38:05.000Z |
| msrc_cve-2025-68217 | Input: pegasus-notetaker - fix potential out-of-bounds access | 2025-12-02T00:00:00.000Z | 2026-01-13T01:38:00.000Z |
| msrc_cve-2025-68214 | timers: Fix NULL function pointer race in timer_shutdown_sync() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:38:19.000Z |
| msrc_cve-2025-68211 | ksm: use range-walk function to jump over holes in scan_get_next_rmap_item | 2025-12-02T00:00:00.000Z | 2026-03-03T14:59:05.000Z |
| msrc_cve-2025-68209 | mlx5: Fix default values in create CQ | 2025-12-02T00:00:00.000Z | 2026-03-31T14:50:13.000Z |
| msrc_cve-2025-68206 | netfilter: nft_ct: add seqadj extension for natted connections | 2025-12-02T00:00:00.000Z | 2026-03-27T14:36:23.000Z |
| msrc_cve-2025-68204 | pmdomain: arm: scmi: Fix genpd leak on provider registration failure | 2025-12-02T00:00:00.000Z | 2026-01-13T01:36:52.000Z |
| msrc_cve-2025-68203 | drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process | 2025-12-02T00:00:00.000Z | 2026-01-13T01:36:03.000Z |
| msrc_cve-2025-68201 | drm/amdgpu: remove two invalid BUG_ON()s | 2025-12-02T00:00:00.000Z | 2026-03-31T14:48:10.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15116-1 | ruby3.4-rubygem-globalid-1.2.1-1.7 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15115-1 | ruby3.4-rubygem-fluentd-1.17.1-1.3 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15114-1 | ruby3.4-rubygem-activesupport-7.0-7.0.8.6-1.3 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15113-1 | ruby3.4-rubygem-activestorage-7.0-7.0.8.6-1.3 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15112-1 | ruby3.4-rubygem-activerecord-7.0-7.0.8.6-1.3 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15111-1 | ruby3.4-rubygem-actiontext-7.0-7.0.8.6-1.3 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15110-1 | ruby3.4-rubygem-actionpack-7.0-7.0.8.6-1.3 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15109-1 | ruby3.4-rubygem-actionmailer-7.0-7.0.8.6-1.3 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15108-1 | python311-waitress-3.0.2-1.4 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15107-1 | python311-ujson-5.10.0-1.5 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15106-1 | python311-treq-24.9.1-1.4 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15105-1 | python311-suds-1.2.0-2.4 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15104-1 | python311-pywayland-0.4.17-3.5 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15103-1 | python311-pyspnego-0.11.2-1.4 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15102-1 | python311-pycapnp-2.0.0-2.5 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15101-1 | python311-py7zr-0.20.8-2.6 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15100-1 | python311-oauthlib-3.2.2-5.4 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15099-1 | python311-nltk-3.9.1-2.4 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15098-1 | python311-mechanize-0.4.10-1.4 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15097-1 | python311-loguru-0.7.2-2.5 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15096-1 | python311-jwcrypto-1.5.6-2.5 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15095-1 | python311-httptools-0.6.1-1.9 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15094-1 | python311-cramjam-2.9.1-1.3 on GA media | 2025-05-17T00:00:00Z | 2025-05-17T00:00:00Z |
| opensuse-su-2025:15093-1 | ucode-intel-20250512-1.1 on GA media | 2025-05-15T00:00:00Z | 2025-05-15T00:00:00Z |
| opensuse-su-2025:15092-1 | pnpm-10.11.0-1.1 on GA media | 2025-05-15T00:00:00Z | 2025-05-15T00:00:00Z |
| opensuse-su-2025:15091-1 | openssh-10.0p2-2.1 on GA media | 2025-05-15T00:00:00Z | 2025-05-15T00:00:00Z |
| opensuse-su-2025:15090-1 | libvmtools-devel-12.5.2-1.1 on GA media | 2025-05-15T00:00:00Z | 2025-05-15T00:00:00Z |
| opensuse-su-2025:15089-1 | iputils-20240905-3.1 on GA media | 2025-05-15T00:00:00Z | 2025-05-15T00:00:00Z |
| opensuse-su-2025:15088-1 | nbdkit-1.42.3-1.1 on GA media | 2025-05-14T00:00:00Z | 2025-05-14T00:00:00Z |
| opensuse-su-2025:15087-1 | python311-Django-5.2.1-1.1 on GA media | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:0629 | Red Hat Security Advisory: satellite/foreman-mcp-server-rhel9 container image available as a Technology Preview | 2026-01-14T19:31:51+00:00 | 2026-03-19T20:32:29+00:00 |
| rhsa-2026:0627 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.13.5 security update | 2026-01-14T18:37:52+00:00 | 2026-04-14T07:57:47+00:00 |
| rhsa-2026:0606 | Red Hat Security Advisory: vsftpd security update | 2026-01-14T15:53:51+00:00 | 2026-03-18T03:14:57+00:00 |
| rhsa-2026:0605 | Red Hat Security Advisory: vsftpd security update | 2026-01-14T15:34:31+00:00 | 2026-03-18T03:14:57+00:00 |
| rhsa-2026:0608 | Red Hat Security Advisory: vsftpd security update | 2026-01-14T15:23:47+00:00 | 2026-03-18T03:14:57+00:00 |
| rhsa-2026:0602 | Red Hat Security Advisory: openssl security update | 2026-01-14T14:46:26+00:00 | 2026-04-13T20:00:39+00:00 |
| rhsa-2026:0596 | Red Hat Security Advisory: cups security update | 2026-01-14T14:04:52+00:00 | 2026-04-13T20:14:09+00:00 |
| rhsa-2026:0420 | Red Hat Security Advisory: OpenShift Container Platform 4.20.10 bug fix and security update | 2026-01-14T13:25:27+00:00 | 2026-04-13T20:14:03+00:00 |
| rhsa-2026:0594 | Red Hat Security Advisory: libpq security update | 2026-01-14T12:56:36+00:00 | 2026-04-13T20:14:09+00:00 |
| rhsa-2026:0576 | Red Hat Security Advisory: kernel security update | 2026-01-14T09:53:46+00:00 | 2026-03-18T03:11:20+00:00 |
| rhsa-2026:0545 | Red Hat Security Advisory: podman security update | 2026-01-14T04:08:21+00:00 | 2026-04-02T16:47:05+00:00 |
| rhsa-2026:0535 | Red Hat Security Advisory: kernel security update | 2026-01-14T00:36:59+00:00 | 2026-03-25T06:06:29+00:00 |
| rhsa-2026:0536 | Red Hat Security Advisory: kernel security update | 2026-01-14T00:29:00+00:00 | 2026-04-13T11:13:52+00:00 |
| rhsa-2026:0532 | Red Hat Security Advisory: kernel security update | 2026-01-14T00:26:00+00:00 | 2026-03-18T03:15:27+00:00 |
| rhsa-2026:0533 | Red Hat Security Advisory: kernel security update | 2026-01-14T00:17:49+00:00 | 2026-04-01T19:29:20+00:00 |
| rhsa-2026:0534 | Red Hat Security Advisory: kernel-rt security update | 2026-01-14T00:13:14+00:00 | 2026-03-25T06:06:29+00:00 |
| rhsa-2026:0537 | Red Hat Security Advisory: kernel-rt security update | 2026-01-14T00:10:39+00:00 | 2026-03-18T03:11:20+00:00 |
| rhsa-2026:0531 | Red Hat Security Advisory: Red Hat Developer Hub 1.8.2 release. | 2026-01-13T21:28:08+00:00 | 2026-04-14T09:16:30+00:00 |
| rhsa-2026:0530 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.12 | 2026-01-13T20:48:49+00:00 | 2026-04-14T07:57:47+00:00 |
| rhsa-2026:0524 | Red Hat Security Advisory: postgresql:15 security update | 2026-01-13T17:16:38+00:00 | 2026-04-13T20:14:08+00:00 |
| rhsa-2026:0523 | Red Hat Security Advisory: postgresql:13 security update | 2026-01-13T16:54:58+00:00 | 2026-04-13T20:14:08+00:00 |
| rhsa-2026:0527 | Red Hat Security Advisory: VolSync v0.14 security fixes and container updates | 2026-01-13T16:52:50+00:00 | 2026-04-14T07:57:47+00:00 |
| rhsa-2026:0525 | Red Hat Security Advisory: postgresql16 security update | 2026-01-13T16:46:38+00:00 | 2026-04-13T20:14:09+00:00 |
| rhsa-2026:0519 | Red Hat Security Advisory: postgresql:16 security update | 2026-01-13T16:38:28+00:00 | 2026-04-13T20:14:10+00:00 |
| rhsa-2026:0513 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-01-13T16:33:48+00:00 | 2026-03-26T20:27:02+00:00 |
| rhsa-2026:0512 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-01-13T16:29:33+00:00 | 2026-03-26T20:27:02+00:00 |
| rhsa-2026:0514 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-01-13T16:21:59+00:00 | 2026-03-26T20:27:04+00:00 |
| rhsa-2026:0493 | Red Hat Security Advisory: postgresql:16 security update | 2026-01-13T16:07:38+00:00 | 2026-04-13T20:14:05+00:00 |
| rhsa-2026:0518 | Red Hat Security Advisory: Red Hat Quay 3.16.1 | 2026-01-13T16:03:52+00:00 | 2026-04-13T20:14:08+00:00 |
| rhsa-2026:0492 | Red Hat Security Advisory: postgresql:15 security update | 2026-01-13T13:14:28+00:00 | 2026-04-13T20:14:05+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0257-1 | Security update for libsoup | 2026-01-22T16:09:13Z | 2026-01-22T16:09:13Z |
| suse-su-2026:0256-1 | Security update for openldap2_5 | 2026-01-22T16:08:55Z | 2026-01-22T16:08:55Z |
| suse-su-2026:0255-1 | Security update for python-urllib3 | 2026-01-22T16:08:44Z | 2026-01-22T16:08:44Z |
| suse-su-2026:0254-1 | Security update for log4j | 2026-01-22T16:08:26Z | 2026-01-22T16:08:26Z |
| suse-su-2026:0253-1 | Security update for libsoup2 | 2026-01-22T16:08:05Z | 2026-01-22T16:08:05Z |
| suse-su-2026:0252-1 | Security update for python-pyasn1 | 2026-01-22T16:06:32Z | 2026-01-22T16:06:32Z |
| suse-su-2026:20132-1 | Security update for go1.25 | 2026-01-22T15:53:13Z | 2026-01-22T15:53:13Z |
| suse-su-2026:20129-1 | Security update for python-virtualenv | 2026-01-22T15:48:44Z | 2026-01-22T15:48:44Z |
| suse-su-2026:20130-1 | Security update for python-marshmallow | 2026-01-22T15:46:22Z | 2026-01-22T15:46:22Z |
| suse-su-2026:20157-1 | Security update for python-urllib3 | 2026-01-22T15:46:01Z | 2026-01-22T15:46:01Z |
| suse-su-2026:20131-1 | Security update for python-urllib3 | 2026-01-22T15:46:01Z | 2026-01-22T15:46:01Z |
| suse-su-2026:0247-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7) | 2026-01-22T15:22:22Z | 2026-01-22T15:22:22Z |
| suse-su-2026:0246-1 | Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP5) | 2026-01-22T15:19:55Z | 2026-01-22T15:19:55Z |
| suse-su-2026:0245-1 | Security update for php7 | 2026-01-22T15:18:06Z | 2026-01-22T15:18:06Z |
| suse-su-2026:20156-1 | Security update for gdk-pixbuf | 2026-01-22T14:36:50Z | 2026-01-22T14:36:50Z |
| suse-su-2026:20128-1 | Security update for gdk-pixbuf | 2026-01-22T14:36:50Z | 2026-01-22T14:36:50Z |
| suse-su-2026:20155-1 | Security update for libpng16 | 2026-01-22T14:31:16Z | 2026-01-22T14:31:16Z |
| suse-su-2026:20127-1 | Security update for libpng16 | 2026-01-22T14:31:16Z | 2026-01-22T14:31:16Z |
| suse-su-2026:20154-1 | Security update for python313 | 2026-01-22T14:12:33Z | 2026-01-22T14:12:33Z |
| suse-su-2026:20126-1 | Security update for rabbitmq-server | 2026-01-22T14:12:33Z | 2026-01-22T14:12:33Z |
| suse-su-2026:20125-1 | Security update for python313 | 2026-01-22T14:12:33Z | 2026-01-22T14:12:33Z |
| suse-su-2026:0243-1 | Security update for librsvg | 2026-01-22T13:57:37Z | 2026-01-22T13:57:37Z |
| suse-su-2026:20123-1 | Security update for buildah | 2026-01-22T13:01:23Z | 2026-01-22T13:01:23Z |
| suse-su-2026:20122-1 | Security update for go1.24 | 2026-01-22T12:53:24Z | 2026-01-22T12:53:24Z |
| suse-su-2026:0238-1 | Security update for dpdk | 2026-01-22T12:26:26Z | 2026-01-22T12:26:26Z |
| suse-su-2026:0237-1 | Security update for wireshark | 2026-01-22T12:26:09Z | 2026-01-22T12:26:09Z |
| suse-su-2026:0236-1 | Security update for busybox | 2026-01-22T12:25:35Z | 2026-01-22T12:25:35Z |
| suse-su-2026:0235-1 | Security update for busybox | 2026-01-22T12:25:06Z | 2026-01-22T12:25:06Z |
| suse-su-2026:0234-1 | Security update for libpng16 | 2026-01-22T12:24:45Z | 2026-01-22T12:24:45Z |
| suse-su-2026:0233-1 | Security update for python-virtualenv | 2026-01-22T12:24:32Z | 2026-01-22T12:24:32Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:7869 | Important: .NET 8.0 security update | 2024-10-09T00:00:00Z | 2024-10-11T07:46:25Z |
| alsa-2024:7868 | Important: .NET 8.0 security update | 2024-10-09T00:00:00Z | 2024-10-10T11:20:15Z |
| alsa-2024:7867 | Important: .NET 6.0 security update | 2024-10-09T00:00:00Z | 2024-10-11T07:48:03Z |
| alsa-2024:7851 | Important: .NET 6.0 security update | 2024-10-09T00:00:00Z | 2024-10-10T11:22:20Z |
| alsa-2024:7848 | Low: openssl security update | 2024-10-09T00:00:00Z | 2024-10-10T11:24:01Z |
| alsa-2024:7700 | Important: firefox security update | 2024-10-07T00:00:00Z | 2024-10-09T08:57:20Z |
| alsa-2024:7699 | Important: thunderbird security update | 2024-10-07T00:00:00Z | 2024-10-09T08:55:36Z |
| alsa-2024:7552 | Important: thunderbird security update | 2024-10-02T00:00:00Z | 2024-10-04T05:25:09Z |
| alsa-2024:7550 | Moderate: golang security update | 2024-10-02T00:00:00Z | 2024-10-03T12:54:50Z |
| alsa-2024:7505 | Important: firefox security update | 2024-10-02T00:00:00Z | 2024-10-04T05:27:10Z |
| alsa-2024:7502 | Moderate: go-toolset:rhel8 security update | 2024-10-02T00:00:00Z | 2024-10-03T12:57:04Z |
| alsa-2024:7484 | Moderate: linux-firmware security update | 2024-10-02T00:00:00Z | 2024-10-03T13:02:51Z |
| alsa-2024:7481 | Important: linux-firmware security update | 2024-10-02T00:00:00Z | 2024-10-03T13:08:29Z |
| alsa-2024:7463 | Important: cups-filters security update | 2024-10-01T00:00:00Z | 2024-10-03T09:11:48Z |
| alsa-2024:7457 | Moderate: mod_jk bug fix update | 2024-10-01T00:00:00Z | 2024-10-09T08:59:28Z |
| alsa-2024:7349 | Moderate: grafana security update | 2024-09-30T00:00:00Z | 2024-10-01T13:26:04Z |
| alsa-2024:7346 | Important: cups-filters security update | 2024-09-27T00:00:00Z | 2024-09-28T10:34:18Z |
| alsa-2024:7262 | Important: osbuild-composer security update | 2024-09-26T00:00:00Z | 2024-09-27T07:24:20Z |
| alsa-2024:7260 | Moderate: net-snmp security update | 2024-09-26T00:00:00Z | 2024-09-27T07:22:47Z |
| alsa-2024:7204 | Important: osbuild-composer security update | 2024-09-26T00:00:00Z | 2024-09-27T09:50:28Z |
| alsa-2024:7136 | Important: git-lfs security update | 2024-09-25T00:00:00Z | 2024-09-26T06:08:12Z |
| alsa-2024:7135 | Important: git-lfs security update | 2024-09-25T00:00:00Z | 2024-09-26T06:10:19Z |
| alsa-2024:7001 | Important: kernel-rt security update | 2024-09-24T00:00:00Z | 2024-09-24T11:25:16Z |
| alsa-2024:7000 | Important: kernel security update | 2024-09-24T00:00:00Z | 2024-09-25T15:23:15Z |
| alsa-2024:6997 | Important: kernel security update | 2024-09-24T00:00:00Z | 2024-11-03T22:34:52Z |
| alsa-2024:6989 | Moderate: expat security update | 2024-09-24T00:00:00Z | 2024-09-24T11:26:12Z |
| alsa-2024:6987 | Moderate: emacs security update | 2024-09-24T00:00:00Z | 2024-09-24T11:27:56Z |
| alsa-2024:6986 | Low: nano security update | 2024-09-24T00:00:00Z | 2024-09-24T11:29:25Z |
| alsa-2024:6975 | Moderate: python3 security update | 2024-09-24T00:00:00Z | 2024-09-24T14:01:33Z |
| alsa-2024:6973 | Moderate: dovecot security update | 2024-09-24T00:00:00Z | 2024-09-24T11:31:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-621 | Segv on unknown address in mpz_add | 2022-07-25T00:00:48.757551Z | 2022-07-25T00:00:48.757810Z |
| osv-2022-619 | Heap-buffer-overflow in udiv | 2022-07-25T00:00:11.229803Z | 2022-07-25T00:00:11.230049Z |
| osv-2022-618 | Heap-buffer-overflow in Type_MLU_Write | 2022-07-25T00:00:09.532974Z | 2022-07-25T00:00:09.533238Z |
| osv-2022-616 | Timeout in JsonFuzzer | 2022-07-24T00:01:38.754389Z | 2022-07-24T00:01:38.754608Z |
| osv-2022-615 | Heap-buffer-overflow in TetrahedralInterp16 | 2022-07-24T00:01:36.775330Z | 2022-07-24T00:01:36.775552Z |
| osv-2022-614 | UNKNOWN READ in std::__1::basic_filebuf<char, std::__1::char_traits<char> >::underflow | 2022-07-24T00:01:03.302330Z | 2022-07-24T00:01:03.302538Z |
| osv-2022-613 | UNKNOWN READ in OT::avar::map_coords | 2022-07-24T00:00:06.663903Z | 2022-07-24T00:00:06.664183Z |
| osv-2022-612 | Heap-buffer-overflow in fxGetNextEntity | 2022-07-23T00:01:34.852237Z | 2022-07-23T00:01:34.852490Z |
| osv-2022-611 | Heap-use-after-free in cras_iodev_list_disable_dev | 2022-07-23T00:00:18.304218Z | 2022-07-23T00:00:18.304480Z |
| osv-2022-608 | Heap-use-after-free in jxl::WriteToPixelCallbackStage::ProcessRow | 2022-07-21T00:01:50.967627Z | 2026-02-11T14:11:11.571040Z |
| osv-2022-606 | Heap-buffer-overflow in mrb_bint_add | 2022-07-21T00:00:54.416564Z | 2022-07-21T00:00:54.416814Z |
| osv-2022-605 | Heap-buffer-overflow in mrb_bint_cmp | 2022-07-21T00:00:15.226959Z | 2022-07-21T00:00:15.227263Z |
| osv-2022-604 | Stack-buffer-overflow in sc_asn1_read_tag | 2022-07-20T00:01:45.985390Z | 2022-07-20T00:01:45.985682Z |
| osv-2022-603 | Heap-buffer-overflow in mrb_vm_exec | 2022-07-20T00:01:44.769746Z | 2022-07-20T00:01:44.769985Z |
| osv-2022-601 | Heap-buffer-overflow in mrb_bint_xor | 2022-07-20T00:00:17.741225Z | 2022-07-20T00:00:17.741572Z |
| osv-2022-600 | Segv on unknown address in mrb_bint_to_s | 2022-07-20T00:00:13.612086Z | 2022-07-20T00:00:13.612334Z |
| osv-2022-599 | Use-of-uninitialized-value in mrb_bint_as_int | 2022-07-20T00:00:11.865502Z | 2026-04-20T14:10:24.129976Z |
| osv-2022-598 | Heap-buffer-overflow in get_symbols_64 | 2022-07-19T00:02:00.850559Z | 2022-07-19T00:02:00.850820Z |
| osv-2022-597 | Heap-use-after-free in .tmpgt0oOx | 2022-07-19T00:01:55.792573Z | 2025-03-21T14:13:26.227734Z |
| osv-2022-595 | Stack-buffer-overflow in Lookup | 2022-07-19T00:01:42.567408Z | 2024-12-12T14:09:48.779445Z |
| osv-2022-594 | Container-overflow in STOFFStarMathToMMLConverterInternal::Parser::convert | 2022-07-19T00:01:28.212413Z | 2022-07-19T00:01:28.212684Z |
| osv-2022-590 | Heap-use-after-free in .tmpoLlNv4 | 2022-07-19T00:00:24.803758Z | 2022-07-19T00:00:24.804013Z |
| osv-2022-588 | Heap-use-after-free in wasmtime_runtime::externref::gc::hcbc8e23ae41614fa | 2022-07-19T00:00:07.311785Z | 2022-07-19T00:00:07.312090Z |
| osv-2022-581 | Heap-buffer-overflow in megasas_map_sgl | 2022-07-14T00:00:45.644503Z | 2026-04-22T14:35:33.317656Z |
| osv-2022-580 | Heap-buffer-overflow in jxl::N_AVX2::BlendingStage::ProcessPaddingRow | 2022-07-13T00:02:03.212239Z | 2022-07-13T00:02:03.212489Z |
| osv-2022-578 | Heap-buffer-overflow in mrb_bint_to_s | 2022-07-13T00:02:00.667751Z | 2022-07-13T00:02:00.667996Z |
| osv-2022-577 | Heap-use-after-free in jsmn_parse | 2022-07-13T00:01:36.106912Z | 2022-07-13T00:01:36.107146Z |
| osv-2022-576 | UNKNOWN WRITE in SkMaskBlurFilter::blur | 2022-07-13T00:00:55.846420Z | 2023-02-24T01:46:48.689548Z |
| osv-2022-573 | Heap-buffer-overflow in zim_ReflectionEnumBackedCase_getBackingValue | 2022-07-13T00:00:07.763765Z | 2025-03-12T17:15:50.141849Z |
| osv-2022-572 | Heap-buffer-overflow in dhcp_reply | 2022-07-12T00:00:45.818288Z | 2025-07-01T14:24:05.029738Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-joomla-2022-27914 | [20221101] - Core - RXSS through reflection of user input in com_media | 2025-04-03T14:15:31.388Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-27913 | [20221002] - Core - RXSS through reflection of user input in headings | 2025-04-03T14:15:24.691Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-27912 | [20221001] - Core - Debug Mode leaks full request payloads including passwords | 2025-04-03T14:15:18.090Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-27911 | [20220801] - Core - Multiple Full Path Disclosures because of missing '_JEXEC or die check' | 2025-04-03T14:15:11.988Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-23801 | [20220309] - Core - XSS attack vector through SVG | 2025-04-03T14:15:05.093Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-23800 | [20220308] - Core - Inadequate content filtering within the filter code | 2025-04-03T14:14:57.695Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-23799 | [20220307] - Core - Variable Tampering on JInput $_REQUEST data | 2025-04-03T14:14:51.000Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-23798 | [20220306] - Core - Inadequate validation of internal URLs | 2025-04-03T14:14:44.389Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-23797 | [20220305] - Core - Inadequate filtering on the selected Ids | 2025-04-03T14:14:37.993Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-23796 | [20220304] - Core - Missing input validation within com_fields class inputs | 2025-04-03T14:14:31.588Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-23795 | [20220303] - Core - User row are not bound to a authentication mechanism | 2025-04-03T14:14:24.804Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-23794 | [20220302] - Core - Path Disclosure within filesystem error messages | 2025-04-03T14:14:18.591Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-23793 | [20220301] - Core - Zip Slip within the Tar extractor | 2025-04-03T14:14:11.792Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26040 | [20210801] - Core - Insufficient access control for com_media deletion endpoint | 2025-04-03T14:14:05.591Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26039 | [20210705] - Core - XSS in com_media imagelist | 2025-04-03T14:13:58.891Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26038 | [20210704] - Core - Privilege escalation through com_installer | 2025-04-03T14:13:51.791Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26037 | [20210703] - Core - Lack of enforced session termination | 2025-04-03T14:13:44.898Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26036 | [20210702] - Core - DoS through usergroup table manipulation | 2025-04-03T14:13:37.395Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26035 | [20210701] - Core - XSS in JForm Rules field | 2025-04-03T14:13:30.589Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26034 | [20210503] - Core - CSRF in data download endpoints | 2025-04-03T14:13:23.793Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26033 | [20210502] - Core - CSRF in AJAX reordering endpoint | 2025-04-03T14:13:17.590Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26032 | [20210501] - Core - Adding HTML to the executable block list of MediaHelper::canUpload | 2025-04-03T14:13:12.201Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26031 | [20210402] - Core - Inadequate filters on module layout settings | 2025-04-03T14:13:07.292Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26030 | [20210401] - Core - Escape xss in logo parameter error pages | 2025-04-03T14:13:02.387Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26029 | [20210309] - Core - Inadequate filtering of form contents could allow to overwrite the author field | 2025-04-03T14:12:57.202Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26028 | [20210308] - Core - Path Traversal within joomla/archive zip class | 2025-04-03T14:12:52.695Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26027 | [20210307] - Core - ACL violation within com_content frontend editing | 2025-04-03T14:12:48.007Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-23132 | [20210306] - Core - com_media allowed paths that are not intended for image uploads | 2025-04-03T14:12:43.405Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-23131 | [20210305] - Core - Input validation within the template manager | 2025-04-03T14:12:39.004Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-23130 | [20210304] - Core - XSS within the feed parser library | 2025-04-03T14:12:34.298Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0109 | Vulnérabilité dans Nginx | 2025-02-11T00:00:00.000000 | 2025-02-11T00:00:00.000000 |
| certfr-2025-avi-0108 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| certfr-2025-avi-0107 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| certfr-2025-avi-0106 | Multiples vulnérabilités dans les produits IBM | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| certfr-2025-avi-0105 | Multiples vulnérabilités dans Microsoft Edge | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| certfr-2025-avi-0104 | Multiples vulnérabilités dans les produits Moxa | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| certfr-2025-avi-0103 | Vulnérabilité dans les produits Synology | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| certfr-2025-avi-0102 | Multiples vulnérabilités dans les produits Tenable | 2025-02-07T00:00:00.000000 | 2025-02-10T00:00:00.000000 |
| certfr-2025-avi-0101 | Vulnérabilité dans les produits Kaspersky | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| certfr-2025-avi-0100 | Multiples vulnérabilités dans les produits Cisco | 2025-02-06T00:00:00.000000 | 2025-02-06T00:00:00.000000 |
| certfr-2025-avi-0099 | Multiples vulnérabilités dans les produits F5 | 2025-02-06T00:00:00.000000 | 2025-02-06T00:00:00.000000 |
| certfr-2025-avi-0098 | Multiples vulnérabilités dans les produits Curl | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| certfr-2025-avi-0097 | Multiples vulnérabilités dans les produits Mozilla | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| certfr-2025-avi-0096 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| certfr-2025-avi-0095 | Multiples vulnérabilités dans Google Chrome | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| certfr-2025-avi-0094 | Vulnérabilité dans les produits Veeam | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| certfr-2025-avi-0093 | Vulnérabilité dans Google Pixel | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| certfr-2025-avi-0092 | Multiples vulnérabilités dans ISC BIND | 2025-02-04T00:00:00.000000 | 2025-02-04T00:00:00.000000 |
| certfr-2025-avi-0091 | Multiples vulnérabilités dans Google Android | 2025-02-04T00:00:00.000000 | 2025-02-04T00:00:00.000000 |
| certfr-2025-avi-0090 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2025-02-03T00:00:00.000000 | 2025-02-03T00:00:00.000000 |
| certfr-2025-avi-0089 | Vulnérabilité dans Python | 2025-02-03T00:00:00.000000 | 2025-02-03T00:00:00.000000 |
| certfr-2025-avi-0088 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2025-avi-0087 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2025-avi-0086 | Multiples vulnérabilités dans les produits IBM | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2025-avi-0085 | Multiples vulnérabilités dans les produits VMware | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2025-avi-0084 | Vulnérabilité dans Microsoft Edge | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2025-avi-0083 | Vulnérabilité dans Apple GarageBand | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2025-avi-0082 | Vulnérabilité dans Sonicwall NetExtender | 2025-01-30T00:00:00.000000 | 2025-01-30T00:00:00.000000 |
| certfr-2025-avi-0081 | Multiples vulnérabilités dans ISC BIND | 2025-01-30T00:00:00.000000 | 2025-01-30T00:00:00.000000 |
| certfr-2025-avi-0080 | Vulnérabilité dans les produits Moxa | 2025-01-29T00:00:00.000000 | 2025-01-29T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2017-000124 | The installer of SemiDynaEXE provided by Geospatial Information Authority of Japan (GSI) may insecurely load Dynamic Link Libraries | 2017-06-08T15:31+09:00 | 2018-01-24T12:15+09:00 |
| jvndb-2017-000123 | The installer of TKY2JGD provided by Geospatial Information Authority of Japan (GSI) may insecurely load Dynamic Link Libraries | 2017-06-08T15:31+09:00 | 2018-01-24T12:15+09:00 |
| jvndb-2017-000122 | The installer of PatchJGD(Hyoko) provided by Geospatial Information Authority of Japan (GSI) may insecurely load Dynamic Link Libraries | 2017-06-08T15:31+09:00 | 2018-01-24T12:15+09:00 |
| jvndb-2017-000121 | The installer of PatchJGD provided by Geospatial Information Authority of Japan (GSI) may insecurely load Dynamic Link Libraries | 2017-06-08T15:31+09:00 | 2018-01-24T12:15+09:00 |
| jvndb-2017-000125 | AppCheck may insecurely invoke an executable file | 2017-06-07T14:54+09:00 | 2018-01-24T12:15+09:00 |
| jvndb-2017-000115 | WordPress plugin "Multi Feed Reader" vulnerable to SQL injection | 2017-06-06T14:54+09:00 | 2018-01-17T13:58+09:00 |
| jvndb-2017-000113 | Hands-on Vulnerability Learning Tool "AppGoat" vulnerable to remote code execution | 2017-06-06T14:21+09:00 | 2017-11-27T17:22+09:00 |
| jvndb-2017-000112 | Hands-on Vulnerability Learning Tool "AppGoat" vulnerable to information disclosure | 2017-06-06T14:20+09:00 | 2017-11-27T17:22+09:00 |
| jvndb-2017-000114 | Hands-on Vulnerability Learning Tool "AppGoat" vulnerable to remote code execution | 2017-06-06T14:19+09:00 | 2017-11-27T17:22+09:00 |
| jvndb-2017-000111 | Hands-on Vulnerability Learning Tool "AppGoat" vulnerable to remote code execution | 2017-06-06T14:19+09:00 | 2017-11-27T17:22+09:00 |
| jvndb-2017-000102 | The installer of the Ministry of Justice [The electronic authentication system based on the commercial registration system "The CRCA user's Software"] may insecurely load Dynamic Link Libraries | 2017-06-06T11:19+09:00 | 2018-01-17T13:58+09:00 |
| jvndb-2017-000119 | Installer of Houkokusyo Sakusei Shien Tool provided by Ministry of the Environment may insecurely load Dynamic Link Libraries | 2017-06-05T13:47+09:00 | 2018-01-17T13:49+09:00 |
| jvndb-2017-000110 | Installer of SaAT Personal may insecurely load Dynamic Link Libraries | 2017-06-02T14:00+09:00 | 2018-01-17T12:25+09:00 |
| jvndb-2017-000109 | Installer of SaAT Netizen may insecurely load Dynamic Link Libraries | 2017-06-02T14:00+09:00 | 2018-01-17T12:29+09:00 |
| jvndb-2017-000107 | RW-5100 tool to verify execution environment may insecurely load Dynamic Link Libraries | 2017-06-01T16:47+09:00 | 2018-01-24T14:03+09:00 |
| jvndb-2017-000106 | RW-5100 driver installer may insecurely load Dynamic Link Libraries | 2017-06-01T16:44+09:00 | 2018-01-24T14:15+09:00 |
| jvndb-2017-000105 | RW-4040 tool to verify execution environment may insecurely load Dynamic Link Libraries | 2017-06-01T16:40+09:00 | 2018-01-24T14:05+09:00 |
| jvndb-2017-000104 | RW-4040 driver installer may insecurely load Dynamic Link Libraries | 2017-06-01T16:25+09:00 | 2018-01-24T13:57+09:00 |
| jvndb-2017-000108 | Installer of Tera Term may insecurely load Dynamic Link Libraries | 2017-06-01T14:42+09:00 | 2018-01-24T14:20+09:00 |
| jvndb-2017-000103 | WordPress plugin "WP Live Chat Support" vulnerable to cross-site scripting | 2017-06-01T14:06+09:00 | 2017-11-27T16:47+09:00 |
| jvndb-2017-000101 | Installers of the screensavers provided by JAPAN AIR SELF DEFENSE FORCE, MINISTRY OF DEFENSE may insecurely load Dynamic Link Libraries | 2017-05-25T14:14+09:00 | 2018-02-15T15:30+09:00 |
| jvndb-2017-000100 | Installer of electronic tendering and bid opening system provided by Acquisition, Technology & Logistics Agency may insecurely load Dynamic Link Libraries | 2017-05-25T14:14+09:00 | 2018-01-17T13:58+09:00 |
| jvndb-2017-000089 | GroupSession fails to restrict access permissions | 2017-05-25T14:14+09:00 | 2018-01-24T11:59+09:00 |
| jvndb-2017-000099 | SSL Visibility Appliance may generate illegal RST packets | 2017-05-24T14:41+09:00 | 2017-05-31T19:27+09:00 |
| jvndb-2017-000098 | The installer of Empirical Project Monitor - eXtended may insecurely load Dynamic Link Libraries | 2017-05-19T14:57+09:00 | 2017-11-27T18:01+09:00 |
| jvndb-2017-000097 | Empirical Project Monitor - eXtended vulnerable to cross-site scripting | 2017-05-19T14:55+09:00 | 2017-11-27T18:01+09:00 |
| jvndb-2017-000096 | Empirical Project Monitor - eXtended vulnerable to cross-site scripting | 2017-05-19T14:53+09:00 | 2017-11-27T18:01+09:00 |
| jvndb-2017-000091 | FlashAir do not set credential information in PhotoShare | 2017-05-16T15:46+09:00 | 2017-12-21T19:16+09:00 |
| jvndb-2017-000090 | FlashAir fails to restrict access permissions in PhotoShare | 2017-05-16T15:34+09:00 | 2017-12-21T19:13+09:00 |
| jvndb-2017-000094 | Multiple BestWebSoft WordPress plugins vulnerable to cross-site scripting | 2017-05-16T14:00+09:00 | 2017-11-27T17:04+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-03527 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0352794) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-03526 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0352695) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-03525 | Adobe Experience Manager跨站脚本漏洞 | 2025-12-15 | 2026-01-15 |
| cnvd-2026-03524 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0352497) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-03523 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0352398) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-02931 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02931) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02930 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02930) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02929 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02929) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02928 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02928) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02927 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02927) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02926 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02926) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02925 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02925) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02924 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02924) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02923 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02923) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02922 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02922) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02912 | Ivanti Endpoint Manager路径遍历漏洞 | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02911 | Ivanti Endpoint Manager数据伪造问题漏洞 | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02910 | Ivanti Endpoint Manager跨站脚本漏洞 | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02909 | Ivanti Endpoint Manager代码执行漏洞 | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02640 | Employee Profile Management System edit_personnel.php文件SQL注入漏洞 | 2025-12-15 | 2026-01-06 |
| cnvd-2026-00691 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00691) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00690 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00690) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00689 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00689) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00688 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00688) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00687 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00687) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00686 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00686) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00685 | Adobe Experience Manager跨站脚本洞(CNVD-2026-00685) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00684 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00684) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00683 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00683) | 2025-12-15 | 2026-01-07 |
| cnvd-2026-00682 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00682) | 2025-12-15 | 2026-01-07 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-00118 | Уязвимость компонента VPN Setting операционной системы для управления сетевыми устройства… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00117 | Уязвимость компонента NTP Region операционной системы для управления сетевыми устройствам… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00116 | Уязвимость агент автоматического обновления Zincati, связанная с логической ошибкой приор… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00115 | Уязвимость компонента org.apache.commons.jxpath.JXPathContext платформы для бизнес-аналит… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00114 | Уязвимость компонента Case Display Page системы управления контентом FoxCMS, позволяющая … | 06.01.2026 | 06.01.2026 |
| bdu:2026-00113 | Уязвимость системы онлайн-просмотра репозиториев ViewVC, связанная с возможностью обхода … | 06.01.2026 | 06.01.2026 |
| bdu:2026-00112 | Уязвимость программного обеспечения GreaterWMS, связанная с обходом процедуры аутентифика… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00111 | Уязвимость библиотеки для работы с базами данных Redis на языке Go go-redis, связанная с … | 06.01.2026 | 06.01.2026 |
| bdu:2026-00110 | Уязвимость программного обеспечения kcp, связанная с недостатками процедуры авторизации, … | 06.01.2026 | 06.01.2026 |
| bdu:2026-00109 | Уязвимость библиотеки BentoML, связанная с недостаточной проверкой запросов на стороне се… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00108 | Уязвимость функции pull_request_target библиотеки dag-factory, позволяющая нарушителю вып… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00107 | Уязвимость библиотеки на языке Rust для арифметических вычислений над эллиптическими крив… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00106 | Уязвимость сервера DICOM Orthanc, связанная с недостаточной защитой служебных данных, поз… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00105 | Уязвимость функции Crypto_TC_Prep_AAD библиотеки CryptoLib, связанная с чтением за предел… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00104 | Уязвимость библиотеки для работы с zip-файлами DotNetZip, связанная с неверным ограничени… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00103 | Уязвимость веб-менеджера для управления файлами и каталогами File Browser, связанная с об… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00102 | Уязвимость библиотеки реализации алгоритмов постквантовой криптографии liboqs, связанная … | 06.01.2026 | 06.01.2026 |
| bdu:2026-00101 | Уязвимость библиотеки cpp-httplib, связанная с недостатками обработки HTTP-запросов, позв… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00100 | Уязвимость библиотеки cpp-httplib, связанная с неконтролируемым расходом ресурсов, позвол… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00099 | Уязвимость программного обеспечения для автоматизации маркетинга и управления взаимодейст… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00098 | Уязвимость функции setDeferredReply сервера структур данных Valkey, позволяющая нарушител… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00097 | Уязвимость программного обеспечения Hashview, связанная с недостатком механизма восстанов… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00096 | Уязвимость программного обеспечения Multi-Router Looking Glass (MRLG), связанная с выходо… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00095 | Уязвимость библиотеки mcp (MCP Python SDK), связанная с ошибкой обработки исключительных … | 06.01.2026 | 06.01.2026 |
| bdu:2026-00094 | Уязвимость библиотеки mcp (MCP Python SDK), связанная с ошибкой обработки исключительных … | 06.01.2026 | 06.01.2026 |
| bdu:2026-00093 | Уязвимость функции authenticate_user() системы для запуска и управления большими языковым… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00092 | Уязвимость функции upload_to_input_dir фреймворка LightRAG, позволяющая нарушителю обойти… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00091 | Уязвимость компонента SparseMatrix фреймворка PowSyBl Core, позволяющая нарушителю повыси… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00090 | Уязвимость компонента Cluster Metrics Handler набора инструментов для создания высококонк… | 06.01.2026 | 06.01.2026 |
| bdu:2026-00089 | Уязвимость файла /goform/WifiExtraSet микропрограммного обеспечения маршрутизаторjd Tenda… | 06.01.2026 | 06.01.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201306-0249 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-05T22:54:52.186000Z |
| var-201706-0272 | In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth… | 2026-03-05T22:54:09.899000Z |
| var-202103-1564 | Netty is an open-source, asynchronous event-driven network application framework for rapi… | 2026-03-05T22:50:25.917000Z |
| var-200609-1376 | The Security Framework in Apple Mac OS X 10.3.x up to 10.3.9 does not properly prioritize… | 2026-03-05T22:46:50.292000Z |
| var-201206-0055 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-05T22:44:26.732000Z |
| var-201202-0071 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-05T22:39:44.546000Z |
| var-201206-0059 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-05T22:34:03.025000Z |
| var-200609-1375 | Unspecified vulnerability in CFNetwork in Mac OS 10.4.8 and earlier allows user-assisted … | 2026-03-05T22:26:56.149000Z |
| var-200609-1286 | WebKit in Apple Mac OS X 10.3.x through 10.3.9 and 10.4 through 10.4.8 allows remote atta… | 2026-03-05T22:23:27.636000Z |
| var-200609-0667 | The Airport driver for certain Orinoco based Airport cards in Darwin kernel 8.8.0 in Appl… | 2026-03-05T22:23:12.700000Z |
| var-201206-0054 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-05T22:19:03.305000Z |
| var-202105-1475 | An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implement… | 2026-03-05T22:14:04.410000Z |
| var-200609-0823 | Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.… | 2026-03-05T22:12:20.082000Z |
| var-200609-1208 | The FTP server in Apple Mac OS X 10.4.8 and earlier, when FTP Access is enabled, will cra… | 2026-03-05T22:09:52.775000Z |
| var-200609-1703 | The Security Framework in Apple Mac OS X 10.3.9, and 10.4.x before 10.4.7, does not prope… | 2026-03-05T22:05:03.572000Z |
| var-200609-1341 | The VPN service in Apple Mac OS X 10.3.x through 10.3.9 and 10.4.x through 10.4.8 does no… | 2026-03-05T22:03:21.673000Z |
| var-201206-0028 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6… | 2026-03-05T21:59:37.122000Z |
| var-201503-0052 | Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in O… | 2026-03-05T21:52:39.992000Z |
| var-201007-0199 | The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 a… | 2026-03-05T21:41:36.296000Z |
| var-201405-0503 | Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly co… | 2026-03-05T21:29:36.801000Z |
| var-201210-0278 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-05T21:22:00.688000Z |
| var-201306-0253 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-05T21:20:08.382000Z |
| var-202105-0146 | Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 ma… | 2026-03-05T21:09:33.658000Z |
| var-201405-0543 | Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filter… | 2026-03-05T21:07:08.271000Z |
| var-201306-0264 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-05T20:48:20.415000Z |
| var-201302-0235 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-05T20:29:09.178000Z |
| var-201210-0144 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-03-05T20:29:02.508000Z |
| var-202003-1583 | The first time AirPods are connected to an iPhone, they become named after the user's nam… | 2026-03-05T20:11:42.206000Z |
| var-200609-1116 | Multiple buffer overflows in the Apple Type Services (ATS) server in Mac OS X 10.4 throug… | 2026-03-05T20:08:53.068000Z |
| var-200609-1132 | The Security Framework in Apple Mac OS X 10.4 through 10.4.8 allows remote attackers to c… | 2026-03-05T19:54:05.740000Z |