Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40335 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_DPV() UINT128/IN… |
gphoto |
libgphoto2 |
2026-04-17T23:19:16.935Z | 2026-04-20T13:36:05.542Z |
| CVE-2026-40334 |
3.5 (3.1)
|
libgphoto2 missing null termination in ptp_unpack_Cano… |
gphoto |
libgphoto2 |
2026-04-17T23:16:38.751Z | 2026-04-20T13:36:05.703Z |
| CVE-2026-40582 |
9.1 (4.0)
|
ChurchCRM: Authentication Bypass in `/api/public/user/… |
ChurchCRM |
CRM |
2026-04-17T23:16:13.862Z | 2026-04-20T14:56:36.921Z |
| CVE-2026-40333 |
6.1 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_EOS_ImageFormat(… |
gphoto |
libgphoto2 |
2026-04-17T23:11:11.073Z | 2026-04-20T14:56:44.091Z |
| CVE-2026-40480 |
7.1 (4.0)
|
ChurchCRM has Missing Object-Level Authorization / IDO… |
ChurchCRM |
CRM |
2026-04-17T23:07:30.126Z | 2026-04-20T16:16:00.433Z |
| CVE-2026-40324 |
9.1 (3.1)
|
Hot Chocolate's Utf8GraphQLParser has Stack Overflow v… |
ChilliCream |
graphql-platform |
2026-04-17T23:05:26.217Z | 2026-04-20T16:16:25.151Z |
| CVE-2026-40482 |
7.1 (4.0)
|
ChurchCRM has Authenticated SQL Injection in `/api/fam… |
ChurchCRM |
CRM |
2026-04-17T22:58:48.528Z | 2026-04-20T16:16:32.247Z |
| CVE-2026-40323 |
8.9 (4.0)
|
SP1 V6 Recursion Circuit Row-Count Binding Gap |
succinctlabs |
sp1 |
2026-04-17T22:58:42.580Z | 2026-04-20T16:16:41.143Z |
| CVE-2026-40481 |
8.2 (4.0)
|
monetr: Unauthenticated Stripe webhook reads attacker-… |
monetr |
monetr |
2026-04-17T22:54:57.545Z | 2026-04-20T13:36:05.862Z |
| CVE-2026-40486 |
4.3 (3.1)
|
Kimai's User Preferences API allows standard users to … |
kimai |
kimai |
2026-04-17T22:35:53.543Z | 2026-04-20T14:56:51.165Z |
| CVE-2026-40479 |
5.4 (3.1)
|
Kimai: Stored XSS via Incomplete HTML Attribute Escapi… |
kimai |
kimai |
2026-04-17T22:31:29.930Z | 2026-04-20T16:16:41.880Z |
| CVE-2026-2434 |
6.4 (3.1)
|
Pz-LinkCard <= 2.5.8.1 - Authenticated (Contributor+) … |
poporon |
Pz-LinkCard |
2026-04-17T22:27:13.525Z | 2026-04-20T13:36:06.124Z |
| CVE-2026-40478 |
9.1 (3.1)
|
Improper neutralization of specific syntax patterns fo… |
thymeleaf |
thymeleaf |
2026-04-17T21:57:01.560Z | 2026-04-22T03:55:42.682Z |
| CVE-2026-40477 |
9.1 (3.1)
|
Improper restriction of the scope of accessible object… |
thymeleaf |
thymeleaf |
2026-04-17T21:53:47.271Z | 2026-04-22T03:55:41.093Z |
| CVE-2026-40476 |
6.9 (4.0)
|
graphql-php: Denial of Service via quadratic complexit… |
webonyx |
graphql-php |
2026-04-17T21:42:59.511Z | 2026-04-20T14:56:57.812Z |
| CVE-2026-5720 |
7.1 (4.0)
|
miniupnpd Integer Underflow SOAPAction Header Parsing |
miniupnp project |
miniupnpd |
2026-04-17T21:39:54.818Z | 2026-04-20T16:59:21.060Z |
| CVE-2026-40474 |
7.6 (3.1)
|
wger has Broken Access Control in the Global Gym Confi… |
wger-project |
wger |
2026-04-17T21:39:03.677Z | 2026-04-20T16:08:12.427Z |
| CVE-2026-40353 |
5.1 (4.0)
|
wger: Stored XSS via Unescaped License Attribution Fields |
wger-project |
wger |
2026-04-17T21:16:12.401Z | 2026-04-20T16:17:52.305Z |
| CVE-2026-40258 |
9.1 (3.1)
|
Gramps Web API has Zip Slip Path Traversal in Media Ar… |
gramps-project |
gramps-web-api |
2026-04-17T21:12:54.226Z | 2026-04-20T15:48:41.690Z |
| CVE-2026-29013 |
8.8 (4.0)
|
libcoap Out-of-Bounds Read in OSCORE CBOR Unwrap Handling |
libcoap |
libcoap |
2026-04-17T21:11:38.137Z | 2026-04-20T16:46:56.223Z |
| CVE-2026-40321 |
8.1 (3.1)
|
DotNetNuke.Core has stored cross-site-scripting (XSS) … |
dnnsoftware |
Dnn.Platform |
2026-04-17T21:10:33.192Z | 2026-04-22T03:55:44.141Z |
| CVE-2026-40352 |
8.8 (3.1)
|
FastGPT: NoSQL Injection in updatePasswordByOld Leads … |
labring |
FastGPT |
2026-04-17T21:09:32.913Z | 2026-04-20T13:36:06.464Z |
| CVE-2026-40306 |
6.9 (4.0)
|
DNN has same HostGUID for all new installs |
dnnsoftware |
Dnn.Platform |
2026-04-17T21:09:30.317Z | 2026-04-20T16:18:27.508Z |
| CVE-2026-40305 |
4.3 (3.1)
|
DNN has Force Friend Request Acceptance |
dnnsoftware |
Dnn.Platform |
2026-04-17T21:06:09.237Z | 2026-04-20T13:36:06.644Z |
| CVE-2026-40351 |
9.8 (3.1)
|
FastGPT: NoSQL Injection in loginByPassword leads to A… |
labring |
FastGPT |
2026-04-17T21:05:05.911Z | 2026-04-20T14:57:15.664Z |
| CVE-2026-40304 |
5.3 (3.1)
|
zrok's broken ownership check in DELETE /api/v2/unacce… |
openziti |
zrok |
2026-04-17T21:04:23.648Z | 2026-04-20T14:57:24.486Z |
| CVE-2026-40303 |
7.5 (3.1)
|
zrok allows unauthenticated DoS via unbounded memory a… |
openziti |
zrok |
2026-04-17T21:01:51.899Z | 2026-04-20T16:19:07.291Z |
| CVE-2026-40196 |
8.1 (3.1)
|
HomeBox has Unauthorized API Access via Retained defau… |
sysadminsmedia |
homebox |
2026-04-17T21:01:18.530Z | 2026-04-20T13:36:06.776Z |
| CVE-2026-40302 |
6.1 (3.1)
|
zrok has reflected XSS in GitHub OAuth callback via un… |
openziti |
zrok |
2026-04-17T20:56:08.368Z | 2026-04-18T03:07:10.092Z |
| CVE-2026-40155 |
5.4 (3.1)
|
Auth0 Next.js SDK has Improper Proxy Cache Lookup |
auth0 |
nextjs-auth0 |
2026-04-17T20:54:38.958Z | 2026-04-20T14:57:32.023Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-35582 |
8.8 (3.1)
|
Emissary has an OS Command Injection via Unvalidated I… |
NationalSecurityAgency |
emissary |
2026-04-18T01:16:27.661Z | 2026-04-20T15:48:51.543Z |
| CVE-2026-1838 |
6.1 (3.1)
|
Hostel <= 1.1.6 - Reflected Cross-Site Scripting via '… |
prasunsen |
Hostel |
2026-04-18T01:26:04.643Z | 2026-04-20T14:19:29.627Z |
| CVE-2026-1559 |
6.4 (3.1)
|
Youzify <= 1.3.6 - Authenticated (Subscriber+) Stored … |
youzify |
Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress |
2026-04-18T01:26:05.210Z | 2026-04-20T13:46:08.353Z |
| CVE-2026-40572 |
9 (3.1)
|
NovumOS has Arbitrary Memory Mapping via Syscall 15 (M… |
MinecAnton209 |
NovumOS |
2026-04-18T00:16:02.590Z | 2026-04-20T14:55:57.521Z |
| CVE-2026-40350 |
8.8 (3.1)
|
Movary User Management (/settings/users) has Authoriza… |
leepeuker |
movary |
2026-04-18T00:07:33.324Z | 2026-04-20T16:15:39.915Z |
| CVE-2026-40317 |
9.4 (3.1)
|
NovumOS has Privilege Escalation in the Syscall Interface |
MinecAnton209 |
NovumOS |
2026-04-18T00:12:10.368Z | 2026-04-20T15:26:25.222Z |
| CVE-2026-35465 |
7.5 (3.1)
|
SecureDrop Client has path injection in read_gzip_head… |
freedomofpress |
securedrop-client |
2026-04-18T00:41:16.594Z | 2026-04-20T15:47:43.822Z |
| CVE-2026-40593 |
4.8 (3.1)
|
ChurchCRM: Stored XSS in UserEditor.php via Login Name Field |
ChurchCRM |
CRM |
2026-04-18T00:02:59.606Z | 2026-04-20T14:56:05.666Z |
| CVE-2026-40582 |
9.1 (4.0)
|
ChurchCRM: Authentication Bypass in `/api/public/user/… |
ChurchCRM |
CRM |
2026-04-17T23:16:13.862Z | 2026-04-20T14:56:36.921Z |
| CVE-2026-40581 |
8.1 (3.1)
|
ChurchCRM: Cross-Site Request Forgery (CSRF) in Select… |
ChurchCRM |
CRM |
2026-04-17T23:51:32.765Z | 2026-04-20T16:15:58.183Z |
| CVE-2026-40485 |
5.3 (3.1)
|
ChurchCRM: Username Enumeration via Differential Respo… |
ChurchCRM |
CRM |
2026-04-17T23:29:35.884Z | 2026-04-20T13:36:05.319Z |
| CVE-2026-40484 |
9.1 (3.1)
|
ChurchCRM: Authenticated Remote Code Execution via Unr… |
ChurchCRM |
CRM |
2026-04-17T23:25:06.319Z | 2026-04-20T14:56:29.684Z |
| CVE-2026-40483 |
5.4 (3.1)
|
ChurchCRM: Stored XSS in PledgeEditor.php via Donation… |
ChurchCRM |
CRM |
2026-04-17T23:20:44.900Z | 2026-04-20T16:16:17.841Z |
| CVE-2026-40482 |
7.1 (4.0)
|
ChurchCRM has Authenticated SQL Injection in `/api/fam… |
ChurchCRM |
CRM |
2026-04-17T22:58:48.528Z | 2026-04-20T16:16:32.247Z |
| CVE-2026-40480 |
7.1 (4.0)
|
ChurchCRM has Missing Object-Level Authorization / IDO… |
ChurchCRM |
CRM |
2026-04-17T23:07:30.126Z | 2026-04-20T16:16:00.433Z |
| CVE-2026-40349 |
8.8 (3.1)
|
Authenticated Movary User Can Self-Escalate to Adminis… |
leepeuker |
movary |
2026-04-18T00:05:46.360Z | 2026-04-20T16:15:49.844Z |
| CVE-2026-40348 |
7.7 (3.1)
|
Movary has Authenticated SSRF via Jellyfin Server URL … |
leepeuker |
movary |
2026-04-18T00:01:09.725Z | 2026-04-20T16:11:32.779Z |
| CVE-2026-40347 |
5.3 (3.1)
|
Python-Multipart affected by Denial of Service via lar… |
Kludex |
python-multipart |
2026-04-17T23:56:50.777Z | 2026-04-20T15:46:40.011Z |
| CVE-2026-40346 |
6.4 (4.0)
|
NocoBase has SSRF in Workflow HTTP Request and Custom … |
nocobase |
@nocobase/plugin-workflow-request |
2026-04-17T23:54:34.829Z | 2026-04-20T14:56:12.829Z |
| CVE-2026-40341 |
3.5 (3.1)
|
libgphoto2 has an OOB Read in ptp_unpack_EOS_FocusInfoEx |
gphoto |
libgphoto2 |
2026-04-17T23:48:36.644Z | 2026-04-20T16:14:19.107Z |
| CVE-2026-40340 |
6.1 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_OI() in ptp-pack… |
gphoto |
libgphoto2 |
2026-04-17T23:45:17.467Z | 2026-04-20T13:36:05.149Z |
| CVE-2026-40339 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_Sony_DPD() FormF… |
gphoto |
libgphoto2 |
2026-04-17T23:42:32.586Z | 2026-04-20T14:56:21.979Z |
| CVE-2026-40338 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_Sony_DPD() enume… |
gphoto |
libgphoto2 |
2026-04-17T23:40:10.097Z | 2026-04-20T16:16:08.585Z |
| CVE-2026-40337 |
5.1 (3.1)
|
Sentry kernel has incomplete ownership check for IRQ l… |
camelot-os |
sentry-kernel |
2026-04-17T23:51:09.866Z | 2026-04-20T16:13:48.908Z |
| CVE-2026-40336 |
2.4 (3.1)
|
libgphoto2 has memory leak in ptp_unpack_Sony_DPD() se… |
gphoto |
libgphoto2 |
2026-04-17T23:27:42.868Z | 2026-04-20T16:14:53.071Z |
| CVE-2026-40335 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_DPV() UINT128/IN… |
gphoto |
libgphoto2 |
2026-04-17T23:19:16.935Z | 2026-04-20T13:36:05.542Z |
| CVE-2026-40334 |
3.5 (3.1)
|
libgphoto2 missing null termination in ptp_unpack_Cano… |
gphoto |
libgphoto2 |
2026-04-17T23:16:38.751Z | 2026-04-20T13:36:05.703Z |
| CVE-2026-40333 |
6.1 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_EOS_ImageFormat(… |
gphoto |
libgphoto2 |
2026-04-17T23:11:11.073Z | 2026-04-20T14:56:44.091Z |
| CVE-2026-40324 |
9.1 (3.1)
|
Hot Chocolate's Utf8GraphQLParser has Stack Overflow v… |
ChilliCream |
graphql-platform |
2026-04-17T23:05:26.217Z | 2026-04-20T16:16:25.151Z |
| CVE-2026-40323 |
8.9 (4.0)
|
SP1 V6 Recursion Circuit Row-Count Binding Gap |
succinctlabs |
sp1 |
2026-04-17T22:58:42.580Z | 2026-04-20T16:16:41.143Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-qcvg-hwr7-r9v7 |
3.1 (3.1)
|
Insufficient policy enforcement in CORS in Google Chrome prior to 147.0.7727.101 allowed a remote a… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-q6m3-mcr7-qwwq |
7.5 (3.1)
|
Out of bounds read in Media in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who … | 2026-04-15T21:30:19Z | 2026-04-16T12:31:40Z |
| ghsa-q4f4-mqcx-4prx |
8.3 (3.1)
|
Out of bounds write in GPU in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who h… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-q22x-99q7-fr6w |
6.5 (3.1)
|
A flaw was found in FFmpeg. A remote attacker could exploit this vulnerability by providing a speci… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-p824-jmv3-c7rj |
8.8 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed a remote attacker t… | 2026-04-15T21:30:19Z | 2026-04-16T12:31:40Z |
| ghsa-mvj2-3qfg-7mxp |
8.8 (3.1)
|
Type Confusion in V8 in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentia… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-m8qq-h68v-7p42 |
8.8 (3.1)
|
Use after free in Cast in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execut… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-j7wg-hx8x-r38h |
8.8 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed a remote attacker t… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-hmgp-8pgg-h7pp |
8.8 (3.1)
|
Use after free in Permissions in Google Chrome on Android prior to 147.0.7727.101 allowed a remote … | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-hh8m-xqf2-mgfv |
8.8 (3.1)
|
Use after free in FileSystem in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to … | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-gjmf-r9m5-967q |
8.8 (3.1)
|
Use after free in XR in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker … | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-g6hr-fwwc-8cg8 |
7.8 (3.1)
8.5 (4.0)
|
Barracuda RMM versions prior to 2025.2.2 contain a privilege escalation vulnerability that allows l… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-fmvf-422w-w34q |
8.8 (3.1)
|
Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to exec… | 2026-04-15T21:30:19Z | 2026-04-16T12:31:40Z |
| ghsa-f4mv-qxg4-7wq3 |
6.3 (3.1)
|
Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to pote… | 2026-04-15T21:30:19Z | 2026-04-16T15:31:32Z |
| ghsa-6r59-54c6-3757 |
8.8 (3.1)
|
Use after free in Forms in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execu… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-5hwj-hjjc-gm39 |
8.8 (3.1)
|
Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to ex… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-4hx4-54fm-qc8q |
7.5 (3.1)
|
Use after free in Payments in Google Chrome on Android prior to 147.0.7727.101 allowed a remote att… | 2026-04-15T21:30:19Z | 2026-04-16T12:31:41Z |
| ghsa-3m3g-56cx-59q7 |
8.8 (3.1)
|
Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to ex… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-2rw5-37w7-549x |
8.8 (3.1)
|
Use after free in Video in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attack… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-xcqw-9mv2-wqj3 |
5.0 (3.1)
|
A flaw was found in GIMP. A stack buffer overflow vulnerability in the TIM image loader's 4BPP deco… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-vhp9-v4r9-mxwj |
9.6 (3.1)
|
Heap buffer overflow in ANGLE in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-vcp6-gxf9-8g4m |
8.4 (3.1)
|
IdentityIQ 8.5, all IdentityIQ 8.5 patch levels prior to 8.5p2, IdentityIQ 8.4, and all IdentityIQ … | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-qh6q-mfp5-q5wr |
5.5 (3.1)
|
A flaw was found in GIMP. Processing a specially crafted PVR image file with large dimensions can l… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-pfc6-jxgq-cf62 |
8.3 (3.1)
|
Use after free in Proxy in Google Chrome prior to 147.0.7727.101 allowed an attacker in a privilege… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-p5x9-j974-rpfp |
3.3 (3.1)
|
--- title: Cross-Tenant Legacy Correlation Disclosure and Deletion draft: false hero: image: /sta… | 2026-04-15T21:30:18Z | 2026-04-20T21:31:39Z |
| ghsa-m9hq-h476-h2g8 |
9.1 (3.1)
|
Exposure of Storage Secret in Pyroscope | 2026-04-15T21:30:18Z | 2026-04-16T21:41:13Z |
| ghsa-j6cv-3w8p-vrg8 |
5.4 (3.1)
|
KubeVirt's authorization mechanism improperly truncates subresource names | 2026-04-15T21:30:18Z | 2026-04-16T21:40:08Z |
| ghsa-g672-w7xh-qp9j |
5.5 (3.1)
|
A flaw was found in the System Security Services Daemon (SSSD). The pam_passkey_child_read_data() f… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-9w25-v364-3jpm |
8.8 (3.1)
|
Use after free in CSS in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:19Z |
| ghsa-856r-6q67-9x29 |
5.0 (3.1)
|
A flaw was found in GIMP. This vulnerability, a heap buffer over-read in the `icns_slurp()` functio… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-745 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing invalid ar… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:35.220537Z |
| pysec-2021-744 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing a complex … | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:35.049527Z |
| pysec-2021-743 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:34.887813Z |
| pysec-2021-742 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:34.728611Z |
| pysec-2021-741 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:34.555865Z |
| pysec-2021-740 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:34.396130Z |
| pysec-2021-739 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:34.219918Z |
| pysec-2021-738 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:34.038446Z |
| pysec-2021-737 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:33.881511Z |
| pysec-2021-736 |
|
TensorFlow is an end-to-end open source platform for machine learning. The validation in … | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:33.722327Z |
| pysec-2021-735 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:33.559422Z |
| pysec-2021-734 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:33.390905Z |
| pysec-2021-733 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:33.208696Z |
| pysec-2021-732 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:33.046688Z |
| pysec-2021-731 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite code fo… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:32.887706Z |
| pysec-2021-730 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite impleme… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:32.707618Z |
| pysec-2021-729 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:32.536343Z |
| pysec-2021-728 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:32.373015Z |
| pysec-2021-727 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite impleme… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:32.210068Z |
| pysec-2021-726 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:32.041975Z |
| pysec-2021-725 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:31.883346Z |
| pysec-2021-724 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:31.724950Z |
| pysec-2021-723 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:31.566408Z |
| pysec-2021-722 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:31.406437Z |
| pysec-2021-721 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:31.250576Z |
| pysec-2021-720 |
|
TensorFlow is an end-to-end open source platform for machine learning. TFLite's convoluti… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:31.088691Z |
| pysec-2021-719 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:30.927051Z |
| pysec-2021-718 |
|
TensorFlow is an end-to-end open source platform for machine learning. The fix for CVE-20… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:30.746202Z |
| pysec-2021-717 |
|
TensorFlow is an end-to-end open source platform for machine learning. TFlite graphs must… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:30.563708Z |
| pysec-2021-716 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:30.403366Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1474 | Malicious code in alinet (npm) | 2026-03-16T15:51:36Z | 2026-03-23T05:16:25Z |
| mal-2026-1473 | Malicious code in aesdecryptor (npm) | 2026-03-16T15:51:36Z | 2026-04-16T15:42:07Z |
| mal-2026-1472 | Malicious code in n8n-nodes-xml-utils (npm) | 2026-03-16T14:49:15Z | 2026-03-23T05:16:29Z |
| mal-2026-1471 | Malicious code in n8n-nodes-text-utils (npm) | 2026-03-16T14:49:15Z | 2026-03-23T05:16:29Z |
| mal-2026-1470 | Malicious code in n8n-nodes-json-helper (npm) | 2026-03-16T14:49:15Z | 2026-03-23T05:16:29Z |
| mal-2026-1469 | Malicious code in n8n-nodes-format-utils (npm) | 2026-03-16T14:49:15Z | 2026-03-23T05:16:29Z |
| mal-2026-1468 | Malicious code in n8n-nodes-data-transform (npm) | 2026-03-16T14:49:15Z | 2026-03-23T05:16:29Z |
| mal-2026-1467 | Malicious code in n8n-nodes-csv-parse (npm) | 2026-03-16T14:49:15Z | 2026-03-23T05:16:29Z |
| mal-2026-1466 | Malicious code in supplychain-security-demo (npm) | 2026-03-16T14:29:56Z | 2026-03-23T05:16:30Z |
| mal-2026-1465 | Malicious code in hariprasath (npm) | 2026-03-16T14:29:56Z | 2026-03-23T05:16:27Z |
| mal-2026-1483 | Malicious code in @jaime9008/math-service (npm) | 2026-03-16T11:54:06Z | 2026-03-23T05:16:24Z |
| mal-2026-1464 | Malicious code in pretty-changelog-logger (npm) | 2026-03-16T10:13:14Z | 2026-03-23T05:16:30Z |
| mal-2026-1463 | Malicious code in polymarket-validator (npm) | 2026-03-16T10:13:14Z | 2026-04-16T15:42:09Z |
| mal-2026-1460 | Malicious code in changelog-logger-wrapper (npm) | 2026-03-16T10:13:14Z | 2026-03-23T05:16:26Z |
| mal-2026-1459 | Malicious code in changelog-logger-utilities (npm) | 2026-03-16T10:13:14Z | 2026-03-23T05:16:26Z |
| mal-2026-1462 | Malicious code in npm-demoo-1111 (npm) | 2026-03-16T10:13:13Z | 2026-03-23T05:16:29Z |
| mal-2026-1461 | Malicious code in npm-demo-1112 (npm) | 2026-03-16T10:13:13Z | 2026-03-23T05:16:29Z |
| mal-2026-1486 | Malicious code in trello-enterprises (npm) | 2026-03-16T10:04:04Z | 2026-03-23T05:16:31Z |
| mal-2026-1485 | Malicious code in react-refresh-update (npm) | 2026-03-16T10:02:26Z | 2026-03-23T05:16:30Z |
| mal-2026-1484 | Malicious code in internal-lib-vulnerable (npm) | 2026-03-16T10:01:24Z | 2026-03-23T05:16:28Z |
| mal-2026-1487 | Malicious code in vitest-config (npm) | 2026-03-16T09:58:05Z | 2026-03-23T05:16:31Z |
| mal-2026-1458 | Malicious code in @wealth-common/font (npm) | 2026-03-16T08:11:02Z | 2026-03-23T05:16:25Z |
| mal-2026-1450 | Malicious code in @myisrfn/baileys-mod (npm) | 2026-03-16T01:13:02Z | 2026-03-23T05:16:24Z |
| mal-2026-1452 | Malicious code in @sheniraid/libsignal-node (npm) | 2026-03-16T01:12:12Z | 2026-03-23T05:16:25Z |
| mal-2026-1451 | Malicious code in @sheniraid/baileys (npm) | 2026-03-16T01:12:12Z | 2026-03-23T05:16:25Z |
| mal-2026-1443 | Malicious code in es-lint-builder (npm) | 2026-03-16T00:39:54Z | 2026-03-23T05:16:27Z |
| mal-2026-1441 | Malicious code in big-numben (npm) | 2026-03-16T00:39:54Z | 2026-03-23T05:16:25Z |
| mal-2026-1444 | Malicious code in graphql-request-dom (npm) | 2026-03-16T00:37:29Z | 2026-03-23T05:16:27Z |
| mal-2026-1442 | Malicious code in bignumber-tool.js (npm) | 2026-03-16T00:37:29Z | 2026-03-23T05:16:25Z |
| mal-2026-1447 | Malicious code in testpoc01 (npm) | 2026-03-16T00:30:13Z | 2026-03-23T05:16:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1684 | Drupal: Mehrere Schwachstellen | 2025-07-30T22:00:00.000+00:00 | 2025-08-17T22:00:00.000+00:00 |
| wid-sec-w-2025-1683 | Apple Safari: Mehrere Schwachstellen | 2025-07-30T22:00:00.000+00:00 | 2025-07-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1682 | Dell ECS: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-30T22:00:00.000+00:00 | 2025-07-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1681 | Red Hat OpenShift (glog): Schwachstelle ermöglicht Manipulation von Dateien | 2025-07-30T22:00:00.000+00:00 | 2025-12-08T23:00:00.000+00:00 |
| wid-sec-w-2025-1680 | Insyde BIOS (Lenovo): Mehrere Schwachstellen | 2025-07-29T22:00:00.000+00:00 | 2025-07-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1679 | Linux Kernel: Schwachstelle ermöglicht Manipulation und Dos | 2025-07-29T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1678 | Autodesk Produkte: Mehrere Schwachstellen | 2025-07-29T22:00:00.000+00:00 | 2025-07-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1677 | Absolute Secure Access: Mehrere Schwachstellen | 2025-07-29T22:00:00.000+00:00 | 2025-07-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1676 | IGEL UMS: Schwachstelle ermöglicht Cross-Site Scripting | 2025-07-29T22:00:00.000+00:00 | 2025-07-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1675 | IBM DB2: Mehrere Schwachstellen | 2025-07-29T22:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| wid-sec-w-2025-1674 | HCL BigFix Remote Control Server: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-07-29T22:00:00.000+00:00 | 2025-07-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1673 | Red Hat Enterprise Linux (libtpms): Schwachstelle ermöglicht Denial of Service | 2025-07-29T22:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2025-1672 | Apple macOS Sequoia, Sonoma und Ventura: Mehrere Schwachstellen | 2025-07-29T22:00:00.000+00:00 | 2025-11-03T23:00:00.000+00:00 |
| wid-sec-w-2025-1671 | VMware vCenter Server und Cloud Foundation: Schwachstelle ermöglicht Denial of Service | 2025-07-29T22:00:00.000+00:00 | 2025-07-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1670 | SonicWall SSL-VPN SonicOS Gen7 Firewall: Schwachstelle ermöglicht Denial of Service | 2025-07-29T22:00:00.000+00:00 | 2025-07-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1669 | Red Hat Enterprise Linux (libtpms): Schwachstelle ermöglicht Denial of Service | 2025-07-29T22:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2025-1668 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2025-07-29T22:00:00.000+00:00 | 2025-07-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1667 | Google Chrome / Microsoft Edge: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-07-29T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1666 | JetBrains TeamCity: Mehrere Schwachstellen | 2025-07-28T22:00:00.000+00:00 | 2025-07-28T22:00:00.000+00:00 |
| wid-sec-w-2025-1665 | Linux Kernel: Mehrere Schwachstellen | 2025-07-28T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1664 | Python: Schwachstelle ermöglicht Denial of Service | 2025-07-28T22:00:00.000+00:00 | 2026-03-09T23:00:00.000+00:00 |
| wid-sec-w-2025-1663 | Mattermost Plugins: Mehrere Schwachstellen ermöglichen Umgehung von Sicherheitsmechanismen | 2025-07-28T22:00:00.000+00:00 | 2025-08-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1662 | Dell ECS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-07-28T22:00:00.000+00:00 | 2025-08-04T22:00:00.000+00:00 |
| wid-sec-w-2025-1661 | Palo Alto Networks GlobalProtect App: Schwachstelle ermöglicht Denial of Service | 2025-07-28T22:00:00.000+00:00 | 2025-07-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1656 | Red Hat Enterprise Linux (unbound): Schwachstelle ermöglicht Manipulation von Daten | 2025-07-27T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-1655 | IBM Informix Dynamic Server: Mehrere Schwachstellen | 2025-07-27T22:00:00.000+00:00 | 2025-07-28T22:00:00.000+00:00 |
| wid-sec-w-2025-1654 | libTIFF (Tiffmedian, Thumbnail): Mehrere Schwachstellen | 2025-07-27T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1653 | Linux Kernel: Mehrere Schwachstellen | 2025-07-27T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1652 | Commvault Backup & Recovery: Schwachstelle ermöglicht SQL injection | 2025-07-27T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1651 | HP DesignJet: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-27T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-256-02 | Honeywell SoftMaster | 2022-09-13T00:00:00.000000Z | 2022-09-13T00:00:00.000000Z |
| icsa-22-256-01 | Hitachi Energy TXpert Hub CoreTec 4 Sudo Vulnerability | 2022-09-13T00:00:00.000000Z | 2022-09-13T00:00:00.000000Z |
| icsma-22-251-01 | Baxter Sigma Spectrum Infusion Pump (Update A) | 2022-09-08T00:00:00.000000Z | 2022-09-29T00:00:00.000000Z |
| icsa-22-251-01 | MZ Automation libIEC61850 | 2022-09-08T00:00:00.000000Z | 2022-09-08T00:00:00.000000Z |
| icsa-22-249-04 | Hitachi Energy TXpert Hub CoreTec 4 | 2022-09-06T00:00:00.000000Z | 2022-09-06T00:00:00.000000Z |
| icsa-22-249-03 | Cognex 3D-A1000 Dimensioning System | 2022-09-06T00:00:00.000000Z | 2022-09-06T00:00:00.000000Z |
| icsa-22-249-02 | AVEVA Edge 2020 R2 SP1 and all prior versions | 2022-09-06T00:00:00.000000Z | 2022-09-06T00:00:00.000000Z |
| icsa-22-249-01 | Triangle Microworks Libraries | 2022-09-06T00:00:00.000000Z | 2022-09-06T00:00:00.000000Z |
| icsma-22-244-01 | Contec Health CMS8000 Patient Monitor (Update A) | 2022-09-01T06:00:00.000000Z | 2025-01-30T07:00:00.000000Z |
| icsa-22-244-01 | Delta Electronics DOPSoft (Update A) | 2022-09-01T00:00:00.000000Z | 2022-09-29T00:00:00.000000Z |
| icsa-22-242-11 | Sensormatic Electronics iSTAR | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-242-10 | PTC Kepware KEPServerEX (Update A) | 2022-08-30T00:00:00.000000Z | 2022-09-08T00:00:00.000000Z |
| icsa-22-242-09 | Omron CX-Programmer | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-242-08 | Honeywell Trend Controls Inter-Controller Protocol | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-242-07 | Honeywell Experion LX | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-242-06 | Honeywell ControlEdge | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-242-05 | Fuji Electric D300win | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-242-04 | Hitachi Energy RTU500 series | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-242-03 | Hitachi Energy MSM Product | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-242-02 | Hitachi Energy Gateway Station (GWS) Product | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-242-01 | Hitachi Energy FACTS Control Platform (FCP) Product | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-221-01 | Mitsubishi Electric Multiple Factory Automation Products (Update B) | 2022-08-30T00:00:00.000000Z | 2023-02-02T00:00:00.000000Z |
| icsa-22-237-01 | FATEK Automation FvDesigner | 2022-08-25T00:00:00.000000Z | 2022-08-25T00:00:00.000000Z |
| icsa-22-235-07 | Hitachi Energy RTU500 | 2022-08-23T00:00:00.000000Z | 2022-08-23T00:00:00.000000Z |
| icsa-22-235-06 | Measuresoft ScadaPro Server and Client | 2022-08-23T00:00:00.000000Z | 2022-08-23T00:00:00.000000Z |
| icsa-22-235-05 | Measuresoft ScadaPro Server | 2022-08-23T00:00:00.000000Z | 2022-08-23T00:00:00.000000Z |
| icsa-22-235-03 | mySCADA myPRO | 2022-08-23T00:00:00.000000Z | 2022-08-23T00:00:00.000000Z |
| icsa-22-235-02 | Delta Industrial Automation DIALink | 2022-08-23T00:00:00.000000Z | 2022-08-23T00:00:00.000000Z |
| icsa-22-235-01 | ARC Informatique PcVue (Update A) | 2022-08-23T00:00:00.000000Z | 2022-09-29T00:00:00.000000Z |
| icsa-22-228-02 | LS ELECTRIC PLC and XG5000 (Update A) | 2022-08-16T06:00:00.000000Z | 2022-11-14T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-sma-opn-rdrct-yppmdsmq | Cisco Content Security Management Appliance Open Redirect Vulnerabilities | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-sigbypass-fcvppcep | Cisco Firepower Threat Defense Software Signature Verification Bypass Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-hcmf-xxe-qqcmauj2 | Cisco Hosted Collaboration Mediation Fulfillment XML External Expansion Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-ftd-tls-dos-4v5nmwtz | Cisco Firepower 1000 Series SSL/TLS Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-06-02T20:40:35+00:00 |
| cisco-sa-ftd-shell-9rhjf68k | Cisco Firepower Threat Defense Software Shell Access Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-ftd-mgmt-interface-dos-fkg4mutu | Cisco Firepower Threat Defense Software Management Interface Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-06-02T21:00:50+00:00 |
| cisco-sa-ftd-infodis-kzxgtujd | Cisco Firepower Threat Defense Software Information Disclosure Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-ftd-dos-rdpe34sd8 | Cisco Firepower Threat Defense Software VPN System Logging Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-06-02T21:11:10+00:00 |
| cisco-sa-ftd-dos-n2vqzasr | Cisco Firepower Threat Defense Software Packet Flood Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-06-02T20:53:05+00:00 |
| cisco-sa-ftd-dos-2-ss2h7awe | Cisco Firepower Threat Defense Software Generic Routing Encapsulation Tunnel IPv6 Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-06-02T21:15:25+00:00 |
| cisco-sa-ftd-accesslist-bypass-5dzs5qzp | Cisco Firepower Threat Defense Software Management Access List Bypass Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-fp2100-arp-dos-kldck8ks | Cisco Firepower 2100 Series Security Appliances ARP Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-11T15:48:19+00:00 |
| cisco-sa-fmcxss-ut3bmx9k | Cisco Firepower Management Center Cross-Site Scripting Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-fmcua-statcred-weecczct | Cisco Firepower Management Center Static Credential Vulnerabilities | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-fmcai-z5dqobvn | Cisco Firepower Management Center File Overwrite Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-fmc-webredirect-tcfgd42y | Cisco Firepower Management Center Open Redirect Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-fdmfo-hvpwkxde | Cisco Firepower Device Manager On-Box Software Arbitrary File Overwrite Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-asaftd-path-je3azww43 | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Path Traversal Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-06-02T21:18:00+00:00 |
| cisco-sa-asaftd-mgcp-suqb8vkh | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Media Gateway Control Protocol Denial of Service Vulnerabilities | 2020-05-06T16:00:00+00:00 | 2020-06-02T21:04:05+00:00 |
| cisco-sa-asaftd-ipv6-67pa658k | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IPv6 DNS Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-06-02T21:07:35+00:00 |
| cisco-sa-asaftd-info-disclose-9ejtycmb | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Information Disclosure Vulnerability | 2020-05-06T16:00:00+00:00 | 2024-02-21T15:57:20+00:00 |
| cisco-sa-asaftd-dos-qk8ctglz | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software DHCP Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-asa-ssl-vpn-dos-qy7bhpjn | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SSL/TLS Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-06-02T20:36:50+00:00 |
| cisco-sa-asa-ftd-ospf-memleak-dhpsgfnv | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software OSPF Packets Processing Memory Leak Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-06-02T20:45:05+00:00 |
| cisco-sa-asa-ftd-ospf-dos-rhmqy8qx | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Malformed OSPF Packets Processing Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-06-02T20:50:55+00:00 |
| cisco-sa-asa-dos-p43gce5j | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software BGP Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-asa-dos-bqyfrjt9 | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IKEv1 Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-alfo-thwfdmte | Cisco Firepower Management Center Arbitrary Log File Write Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-asa-kerberos-bypass-96gghe2ss | Cisco Adaptive Security Appliance Software Kerberos Authentication Bypass Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-07T14:39:34+00:00 |
| cisco-sa-xesdwcinj-acq5mxcn | Cisco IOS XE SD-WAN Software Command Injection Vulnerability | 2020-04-29T16:00:00+00:00 | 2020-04-29T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-40310 | amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:23.000Z |
| msrc_cve-2025-40309 | Bluetooth: SCO: Fix UAF on sco_conn_free | 2025-12-02T00:00:00.000Z | 2025-12-09T01:01:37.000Z |
| msrc_cve-2025-40308 | Bluetooth: bcsp: receive data only if registered | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:38.000Z |
| msrc_cve-2025-40307 | exfat: validate cluster allocation bits of the allocation bitmap | 2025-12-02T00:00:00.000Z | 2025-12-09T01:01:26.000Z |
| msrc_cve-2025-40306 | orangefs: fix xattr related buffer overflow... | 2025-12-02T00:00:00.000Z | 2025-12-09T01:01:58.000Z |
| msrc_cve-2025-40305 | 9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN | 2025-12-02T00:00:00.000Z | 2025-12-09T01:01:42.000Z |
| msrc_cve-2025-40304 | fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:10.000Z |
| msrc_cve-2025-40303 | btrfs: ensure no dirty metadata is written back for an fs with errors | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:56.000Z |
| msrc_cve-2025-40301 | Bluetooth: hci_event: validate skb length for unknown CC opcode | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:04.000Z |
| msrc_cve-2025-40297 | net: bridge: fix use-after-free due to MST port state bypass | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:49.000Z |
| msrc_cve-2025-40294 | Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:17.000Z |
| msrc_cve-2025-40293 | iommufd: Don't overflow during division for dirty tracking | 2025-12-02T00:00:00.000Z | 2025-12-09T01:01:47.000Z |
| msrc_cve-2025-40292 | virtio-net: fix received length check in big packets | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:45.000Z |
| msrc_cve-2025-40289 | drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM | 2025-12-02T00:00:00.000Z | 2026-03-31T15:15:05.000Z |
| msrc_cve-2025-40288 | drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices | 2025-12-02T00:00:00.000Z | 2025-12-16T14:37:34.000Z |
| msrc_cve-2025-40287 | exfat: fix improper check of dentry.stream.valid_size | 2025-12-02T00:00:00.000Z | 2025-12-09T01:40:07.000Z |
| msrc_cve-2025-40286 | smb/server: fix possible memory leak in smb2_read() | 2025-12-02T00:00:00.000Z | 2025-12-09T01:40:46.000Z |
| msrc_cve-2025-40285 | smb/server: fix possible refcount leak in smb2_sess_setup() | 2025-12-02T00:00:00.000Z | 2025-12-09T01:40:41.000Z |
| msrc_cve-2025-40284 | Bluetooth: MGMT: cancel mesh send timer when hdev removed | 2025-12-02T00:00:00.000Z | 2025-12-16T14:37:40.000Z |
| msrc_cve-2025-40283 | Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF | 2025-12-02T00:00:00.000Z | 2025-12-16T14:37:47.000Z |
| msrc_cve-2025-40282 | Bluetooth: 6lowpan: reset link-local header on ipv6 recv path | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:00.000Z |
| msrc_cve-2025-40281 | sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:25.000Z |
| msrc_cve-2025-40280 | tipc: Fix use-after-free in tipc_mon_reinit_self(). | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:19.000Z |
| msrc_cve-2025-40279 | net: sched: act_connmark: initialize struct tc_ife to fix kernel leak | 2025-12-02T00:00:00.000Z | 2025-12-16T14:37:53.000Z |
| msrc_cve-2025-40278 | net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak | 2025-12-02T00:00:00.000Z | 2025-12-09T01:40:12.000Z |
| msrc_cve-2025-40277 | drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:13.000Z |
| msrc_cve-2025-40275 | ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd | 2025-12-02T00:00:00.000Z | 2025-12-16T14:37:27.000Z |
| msrc_cve-2025-40273 | NFSD: free copynotify stateid in nfs4_free_ol_stateid() | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:06.000Z |
| msrc_cve-2025-40272 | mm/secretmem: fix use-after-free race in fault handler | 2025-12-02T00:00:00.000Z | 2025-12-16T14:37:21.000Z |
| msrc_cve-2025-40269 | ALSA: usb-audio: Fix potential overflow of PCM transfer buffer | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:32.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15046-1 | docker-28.1.1_ce-16.1 on GA media | 2025-05-02T00:00:00Z | 2025-05-02T00:00:00Z |
| opensuse-su-2025:15045-1 | MozillaFirefox-138.0-1.1 on GA media | 2025-05-02T00:00:00Z | 2025-05-02T00:00:00Z |
| opensuse-su-2025:15044-1 | libsoup-2_4-1-2.74.3-9.1 on GA media | 2025-05-01T00:00:00Z | 2025-05-01T00:00:00Z |
| opensuse-su-2025:15043-1 | libsoup-3_0-0-3.6.5-3.1 on GA media | 2025-05-01T00:00:00Z | 2025-05-01T00:00:00Z |
| opensuse-su-2025:15042-1 | MozillaThunderbird-128.10.0-1.1 on GA media | 2025-05-01T00:00:00Z | 2025-05-01T00:00:00Z |
| opensuse-su-2025:0139-1 | Security update for libjxl | 2025-04-30T12:01:35Z | 2025-04-30T12:01:35Z |
| opensuse-su-2025:15041-1 | golang-github-prometheus-node_exporter-1.9.1-2.1 on GA media | 2025-04-30T00:00:00Z | 2025-04-30T00:00:00Z |
| opensuse-su-2025:15040-1 | firefox-esr-128.10.0-1.1 on GA media | 2025-04-30T00:00:00Z | 2025-04-30T00:00:00Z |
| opensuse-su-2025:15039-1 | cmctl-2.2.0-1.1 on GA media | 2025-04-30T00:00:00Z | 2025-04-30T00:00:00Z |
| opensuse-su-2025:15038-1 | cyradm-3.8.4-2.1 on GA media | 2025-04-29T00:00:00Z | 2025-04-29T00:00:00Z |
| opensuse-su-2025:15037-1 | amber-cli-1.13.1+git20250329.c2e3bb8-1.1 on GA media | 2025-04-29T00:00:00Z | 2025-04-29T00:00:00Z |
| opensuse-su-2025:15036-1 | glow-2.1.0-2.1 on GA media | 2025-04-27T00:00:00Z | 2025-04-27T00:00:00Z |
| opensuse-su-2025:15035-1 | valkey-8.0.3-1.1 on GA media | 2025-04-26T00:00:00Z | 2025-04-26T00:00:00Z |
| opensuse-su-2025:15034-1 | subfinder-2.7.0-3.1 on GA media | 2025-04-26T00:00:00Z | 2025-04-26T00:00:00Z |
| opensuse-su-2025:15033-1 | govulncheck-vulndb-0.0.20250424T181457-1.1 on GA media | 2025-04-26T00:00:00Z | 2025-04-26T00:00:00Z |
| opensuse-su-2025:15032-1 | python311-h11-0.16.0-1.1 on GA media | 2025-04-25T00:00:00Z | 2025-04-25T00:00:00Z |
| opensuse-su-2025:15031-1 | python311-grpcio-1.69.0-2.1 on GA media | 2025-04-25T00:00:00Z | 2025-04-25T00:00:00Z |
| opensuse-su-2025:15030-1 | opentofu-1.9.1-1.1 on GA media | 2025-04-25T00:00:00Z | 2025-04-25T00:00:00Z |
| opensuse-su-2025:15029-1 | kyverno-1.14.0-1.1 on GA media | 2025-04-25T00:00:00Z | 2025-04-25T00:00:00Z |
| opensuse-su-2025:15028-1 | distrobuilder-3.2-2.1 on GA media | 2025-04-25T00:00:00Z | 2025-04-25T00:00:00Z |
| opensuse-su-2025:15027-1 | chromedriver-135.0.7049.95-1.1 on GA media | 2025-04-25T00:00:00Z | 2025-04-25T00:00:00Z |
| opensuse-su-2025:15026-1 | mysql-connector-java-9.3.0-1.1 on GA media | 2025-04-24T00:00:00Z | 2025-04-24T00:00:00Z |
| opensuse-su-2025:15025-1 | libraw-devel-0.21.4-1.1 on GA media | 2025-04-24T00:00:00Z | 2025-04-24T00:00:00Z |
| opensuse-su-2025:15024-1 | java-21-openjdk-21.0.7.0-1.1 on GA media | 2025-04-24T00:00:00Z | 2025-04-24T00:00:00Z |
| opensuse-su-2025:15023-1 | java-17-openjdk-17.0.15.0-1.1 on GA media | 2025-04-24T00:00:00Z | 2025-04-24T00:00:00Z |
| opensuse-su-2025:15022-1 | java-11-openjdk-11.0.27.0-1.1 on GA media | 2025-04-24T00:00:00Z | 2025-04-24T00:00:00Z |
| opensuse-su-2025:15021-1 | augeas-1.14.1-2.1 on GA media | 2025-04-24T00:00:00Z | 2025-04-24T00:00:00Z |
| opensuse-su-2025:15020-1 | rollup-3.29.5-1.1 on GA media | 2025-04-23T00:00:00Z | 2025-04-23T00:00:00Z |
| opensuse-su-2025:15019-1 | libxml2-2-2.13.8-1.1 on GA media | 2025-04-23T00:00:00Z | 2025-04-23T00:00:00Z |
| opensuse-su-2025:15018-1 | libsoup-2_4-1-2.74.3-8.1 on GA media | 2025-04-23T00:00:00Z | 2025-04-23T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:0353 | Red Hat Security Advisory: python3.12 security update | 2026-01-08T13:54:19+00:00 | 2026-04-13T20:00:35+00:00 |
| rhsa-2026:0342 | Red Hat Security Advisory: gcc-toolset-13-binutils security update | 2026-01-08T13:45:04+00:00 | 2026-04-13T20:00:34+00:00 |
| rhsa-2026:0343 | Red Hat Security Advisory: gcc-toolset-13-binutils security update | 2026-01-08T13:27:24+00:00 | 2026-04-13T20:00:34+00:00 |
| rhsa-2026:0351 | Red Hat Security Advisory: mariadb security update | 2026-01-08T13:26:39+00:00 | 2026-04-13T20:00:35+00:00 |
| rhsa-2026:0344 | Red Hat Security Advisory: mariadb:10.5 security update | 2026-01-08T13:21:24+00:00 | 2026-04-13T20:00:34+00:00 |
| rhsa-2026:0312 | Red Hat Security Advisory: cups security update | 2026-01-08T13:15:40+00:00 | 2026-04-13T20:14:01+00:00 |
| rhsa-2026:0334 | Red Hat Security Advisory: mariadb:10.11 security update | 2026-01-08T13:13:06+00:00 | 2026-04-14T09:46:00+00:00 |
| rhsa-2026:0335 | Red Hat Security Advisory: mariadb:10.11 security update | 2026-01-08T13:07:04+00:00 | 2026-04-14T09:46:01+00:00 |
| rhsa-2026:0337 | Red Hat Security Advisory: openssl security update | 2026-01-08T12:53:20+00:00 | 2026-04-13T20:00:32+00:00 |
| rhsa-2026:0336 | Red Hat Security Advisory: mariadb:10.5 security update | 2026-01-08T12:47:39+00:00 | 2026-04-13T20:00:32+00:00 |
| rhsa-2026:0333 | Red Hat Security Advisory: mariadb:10.3 security update | 2026-01-08T12:24:39+00:00 | 2026-04-13T20:00:30+00:00 |
| rhsa-2026:0322 | Red Hat Security Advisory: libpng security update | 2026-01-08T12:09:44+00:00 | 2026-04-13T20:00:28+00:00 |
| rhsa-2026:0313 | Red Hat Security Advisory: libpng security update | 2026-01-08T11:38:59+00:00 | 2026-04-13T20:00:28+00:00 |
| rhsa-2026:0314 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-08T11:35:59+00:00 | 2026-04-14T07:57:46+00:00 |
| rhsa-2026:0321 | Red Hat Security Advisory: libpng security update | 2026-01-08T11:29:49+00:00 | 2026-04-13T20:00:32+00:00 |
| rhsa-2026:0323 | Red Hat Security Advisory: libpng security update | 2026-01-08T11:26:24+00:00 | 2026-04-13T20:00:32+00:00 |
| rhsa-2026:0296 | Red Hat Security Advisory: mariadb:10.3 security update | 2026-01-08T08:10:28+00:00 | 2026-04-13T20:00:27+00:00 |
| rhsa-2026:0295 | Red Hat Security Advisory: mariadb:10.5 security update | 2026-01-08T07:53:23+00:00 | 2026-04-13T20:00:26+00:00 |
| rhsa-2026:0293 | Red Hat Security Advisory: pki-servlet-engine security update | 2026-01-08T07:28:53+00:00 | 2026-04-13T20:14:01+00:00 |
| rhsa-2026:0292 | Red Hat Security Advisory: pki-servlet-engine security update | 2026-01-08T07:23:28+00:00 | 2026-04-13T20:14:01+00:00 |
| rhsa-2026:0268 | Red Hat Security Advisory: postgresql security update | 2026-01-08T02:42:08+00:00 | 2026-04-13T20:13:59+00:00 |
| rhsa-2026:0269 | Red Hat Security Advisory: postgresql:16 security update | 2026-01-08T01:57:46+00:00 | 2026-04-13T20:14:00+00:00 |
| rhsa-2026:0264 | Red Hat Security Advisory: postgresql:16 security update | 2026-01-08T01:34:12+00:00 | 2026-04-13T20:13:58+00:00 |
| rhsa-2026:0262 | Red Hat Security Advisory: postgresql security update | 2026-01-08T01:29:27+00:00 | 2026-04-13T20:13:57+00:00 |
| rhsa-2026:0270 | Red Hat Security Advisory: postgresql:13 security update | 2026-01-08T01:03:12+00:00 | 2026-04-13T20:14:00+00:00 |
| rhsa-2026:0271 | Red Hat Security Advisory: kernel security update | 2026-01-08T00:47:42+00:00 | 2026-03-19T17:35:16+00:00 |
| rhsa-2026:0267 | Red Hat Security Advisory: postgresql:13 security update | 2026-01-08T00:42:27+00:00 | 2026-04-13T20:13:58+00:00 |
| rhsa-2026:0266 | Red Hat Security Advisory: postgresql:15 security update | 2026-01-08T00:40:52+00:00 | 2026-04-13T20:13:58+00:00 |
| rhsa-2026:0265 | Red Hat Security Advisory: postgresql:13 security update | 2026-01-08T00:35:37+00:00 | 2026-04-13T20:13:58+00:00 |
| rhsa-2026:0263 | Red Hat Security Advisory: postgresql security update | 2026-01-08T00:18:42+00:00 | 2026-04-13T20:13:57+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0176-1 | Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4) | 2026-01-19T19:03:59Z | 2026-01-19T19:03:59Z |
| suse-su-2026:20099-1 | Security update for rust1.91, rust1.92 | 2026-01-19T18:30:57Z | 2026-01-19T18:30:57Z |
| suse-su-2026:0168-1 | Security update for the Linux Kernel (Live Patch 40 for SUSE Linux Enterprise 15 SP4) | 2026-01-19T18:04:39Z | 2026-01-19T18:04:39Z |
| suse-su-2026:0174-1 | Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP4) | 2026-01-19T18:04:30Z | 2026-01-19T18:04:30Z |
| suse-su-2026:0173-1 | Security update for the Linux Kernel (Live Patch 21 for SUSE Linux Enterprise 15 SP5) | 2026-01-19T17:33:53Z | 2026-01-19T17:33:53Z |
| suse-su-2026:0171-1 | Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 2026-01-19T16:34:41Z | 2026-01-19T16:34:41Z |
| suse-su-2026:20385-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T16:27:04Z | 2026-01-19T16:27:04Z |
| suse-su-2026:20266-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T16:27:04Z | 2026-01-19T16:27:04Z |
| suse-su-2026:0169-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise 15 SP7) | 2026-01-19T16:04:33Z | 2026-01-19T16:04:33Z |
| suse-su-2026:20400-1 | Security update for the Linux Kernel RT (Live Patch 4 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:33:57Z | 2026-01-19T15:33:57Z |
| suse-su-2026:20265-1 | Security update for the Linux Kernel RT (Live Patch 4 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:33:57Z | 2026-01-19T15:33:57Z |
| suse-su-2026:20399-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:33:28Z | 2026-01-19T15:33:28Z |
| suse-su-2026:20264-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:33:28Z | 2026-01-19T15:33:28Z |
| suse-su-2026:20398-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:57Z | 2026-01-19T15:31:57Z |
| suse-su-2026:20254-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:57Z | 2026-01-19T15:31:57Z |
| suse-su-2026:20384-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:55Z | 2026-01-19T15:31:55Z |
| suse-su-2026:20383-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:55Z | 2026-01-19T15:31:55Z |
| suse-su-2026:20382-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:55Z | 2026-01-19T15:31:55Z |
| suse-su-2026:20381-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:55Z | 2026-01-19T15:31:55Z |
| suse-su-2026:20380-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:55Z | 2026-01-19T15:31:55Z |
| suse-su-2026:20379-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:55Z | 2026-01-19T15:31:55Z |
| suse-su-2026:20378-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:55Z | 2026-01-19T15:31:55Z |
| suse-su-2026:20377-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:55Z | 2026-01-19T15:31:55Z |
| suse-su-2026:20376-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:55Z | 2026-01-19T15:31:55Z |
| suse-su-2026:20263-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:55Z | 2026-01-19T15:31:55Z |
| suse-su-2026:20262-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:55Z | 2026-01-19T15:31:55Z |
| suse-su-2026:20261-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:55Z | 2026-01-19T15:31:55Z |
| suse-su-2026:20260-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:55Z | 2026-01-19T15:31:55Z |
| suse-su-2026:20259-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:55Z | 2026-01-19T15:31:55Z |
| suse-su-2026:20258-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:55Z | 2026-01-19T15:31:55Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:5693 | Important: tomcat security update | 2024-08-21T00:00:00Z | 2024-08-21T13:24:31Z |
| alsa-2024:5654 | Moderate: curl security update | 2024-08-20T00:00:00Z | 2024-08-21T13:13:13Z |
| alsa-2024:5598 | Moderate: libreoffice security update | 2024-08-20T00:00:00Z | 2024-08-21T13:11:29Z |
| alsa-2024:5583 | Moderate: libreoffice security update | 2024-08-19T00:00:00Z | 2024-08-21T13:03:19Z |
| alsa-2024:5534 | Important: python-setuptools security update | 2024-08-19T00:00:00Z | 2024-08-21T12:43:25Z |
| alsa-2024:5533 | Important: python3.12-setuptools security update | 2024-08-19T00:00:00Z | 2024-08-21T12:41:03Z |
| alsa-2024:5532 | Important: python3.11-setuptools security update | 2024-08-19T00:00:00Z | 2024-08-21T12:38:58Z |
| alsa-2024:5531 | Important: python3.12-setuptools security update | 2024-08-19T00:00:00Z | 2024-08-21T12:36:59Z |
| alsa-2024:5530 | Important: python-setuptools security update | 2024-08-19T00:00:00Z | 2024-08-21T12:35:03Z |
| alsa-2024:5529 | Moderate: curl security update | 2024-08-19T00:00:00Z | 2024-08-21T12:31:43Z |
| alsa-2024:5524 | Important: bind security update | 2024-08-19T00:00:00Z | 2024-08-21T12:29:41Z |
| alsa-2024:5334 | Moderate: .NET 8.0 security update | 2024-08-15T00:00:00Z | 2024-08-21T12:17:26Z |
| alsa-2024:5322 | Important: firefox security update | 2024-08-15T00:00:00Z | 2024-08-21T12:15:26Z |
| alsa-2024:5279 | Important: python3.11-setuptools security update | 2024-08-15T00:00:00Z | 2024-08-21T11:55:33Z |
| alsa-2024:5231 | Important: bind and bind-dyndb-ldap security update | 2024-08-15T00:00:00Z | 2024-08-28T15:57:37Z |
| alsa-2024:5402 | Important: thunderbird security update | 2024-08-14T00:00:00Z | 2024-08-21T12:27:11Z |
| alsa-2024:5392 | Important: thunderbird security update | 2024-08-14T00:00:00Z | 2024-08-21T12:26:14Z |
| alsa-2024:5391 | Important: firefox security update | 2024-08-14T00:00:00Z | 2024-08-21T12:24:40Z |
| alsa-2024:5390 | Important: bind9.16 security update | 2024-08-14T00:00:00Z | 2024-08-21T12:23:01Z |
| alsa-2024:5363 | Important: kernel security update | 2024-08-14T00:00:00Z | 2024-11-03T22:26:07Z |
| alsa-2024:5338 | Low: pcs security update | 2024-08-13T00:00:00Z | 2024-08-21T12:21:22Z |
| alsa-2024:5337 | Moderate: .NET 8.0 security update | 2024-08-13T00:00:00Z | 2024-08-21T12:19:34Z |
| alsa-2024:5312 | Moderate: krb5 security update | 2024-08-13T00:00:00Z | 2024-08-21T12:13:57Z |
| alsa-2024:5309 | Moderate: python-urllib3 security update | 2024-08-13T00:00:00Z | 2024-08-21T12:12:11Z |
| alsa-2024:5306 | Moderate: orc security update | 2024-08-13T00:00:00Z | 2024-08-21T12:10:31Z |
| alsa-2024:5305 | Moderate: poppler security update | 2024-08-13T00:00:00Z | 2024-08-21T12:07:10Z |
| alsa-2024:5299 | Moderate: wget security update | 2024-08-13T00:00:00Z | 2024-08-21T12:05:01Z |
| alsa-2024:5298 | Moderate: gnome-shell security update | 2024-08-13T00:00:00Z | 2024-08-21T12:08:50Z |
| alsa-2024:5297 | Moderate: edk2 security update | 2024-08-13T00:00:00Z | 2024-08-21T12:03:25Z |
| alsa-2024:5294 | Moderate: jose security update | 2024-08-13T00:00:00Z | 2024-08-21T12:01:41Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-455 | Uncaught exception in com.ctc.wstx.dtd.FullDTDReader.readContentSpec | 2022-06-04T00:01:04.189652Z | 2022-06-04T00:01:04.189880Z |
| osv-2022-453 | Segv on unknown address in gx_device_finalize | 2022-06-03T00:00:46.765501Z | 2022-06-03T00:00:46.765738Z |
| osv-2022-451 | Heap-buffer-overflow in myeid_create_key | 2022-06-02T00:02:00.250877Z | 2022-06-02T00:02:00.251315Z |
| osv-2022-450 | Heap-buffer-overflow in Curl_headers_push | 2022-06-02T00:01:55.821368Z | 2022-06-02T00:01:55.821619Z |
| osv-2022-449 | UNKNOWN WRITE in alloc_restore_step_in | 2022-06-02T00:01:51.881159Z | 2022-06-02T00:01:51.881396Z |
| osv-2022-447 | Heap-buffer-overflow in ndpi_search_http_tcp | 2022-06-01T00:01:50.990454Z | 2022-06-01T00:01:50.990703Z |
| osv-2022-445 | Stack-buffer-overflow in tlsCheckUncommonALPN | 2022-06-01T00:00:07.684819Z | 2022-06-01T00:00:07.685074Z |
| osv-2022-443 | Heap-buffer-overflow in ndpi_search_http_tcp | 2022-05-31T00:00:50.179754Z | 2022-05-31T00:00:50.180013Z |
| osv-2022-439 | Stack-use-after-return in test_update | 2022-05-29T00:01:40.731606Z | 2022-05-29T00:01:40.731836Z |
| osv-2022-437 | Stack-buffer-overflow in sc_asn1_read_tag | 2022-05-29T00:00:46.150112Z | 2022-05-29T00:00:46.150356Z |
| osv-2022-436 | Stack-buffer-overflow in spvtools::opt::CompositeInsertToCompositeConstruct | 2022-05-29T00:00:37.959985Z | 2022-05-29T00:00:37.960247Z |
| osv-2022-434 | Segv on unknown address in sc_aux_data_free | 2022-05-28T00:00:15.235936Z | 2022-05-28T00:00:15.236194Z |
| osv-2022-432 | Stack-use-after-return in conversation_match_element_list | 2022-05-26T00:00:29.927017Z | 2022-05-26T00:00:29.927244Z |
| osv-2022-431 | Uncaught exception in com.ctc.wstx.dtd.FullDTDReader.readContentSpec | 2022-05-26T00:00:20.481972Z | 2022-05-26T00:00:20.482230Z |
| osv-2022-429 | Heap-buffer-overflow in pdfi_dict_get_no_store_R_inner | 2022-05-25T00:00:30.642736Z | 2022-05-25T00:00:30.642988Z |
| osv-2022-425 | Heap-use-after-free in std::__1::__tree_node_base<void*>*& std::__1::__tree<std::__1::__value_type<std: | 2022-05-21T00:01:00.208406Z | 2022-05-21T00:01:00.208655Z |
| osv-2022-423 | Heap-buffer-overflow in sc_build_pin | 2022-05-20T00:00:21.692977Z | 2022-05-20T00:00:21.693236Z |
| osv-2022-422 | UNKNOWN WRITE in alloc_restore_step_in | 2022-05-19T00:01:44.794873Z | 2022-05-19T00:01:44.795111Z |
| osv-2022-421 | Stack-buffer-overflow in cardos_list_files | 2022-05-19T00:01:39.869536Z | 2022-05-19T00:01:39.869761Z |
| osv-2022-419 | Heap-buffer-overflow in uncompress_b44_impl | 2022-05-19T00:00:46.415466Z | 2022-05-19T00:00:46.415698Z |
| osv-2022-417 | Heap-buffer-overflow in read_xref | 2022-05-19T00:00:17.646200Z | 2022-05-19T00:00:17.646459Z |
| osv-2022-416 | Heap-buffer-overflow in opj_t1_allocate_buffers | 2022-05-19T00:00:17.026619Z | 2022-05-19T00:00:17.026871Z |
| osv-2022-415 | UNKNOWN READ in pdfi_free_object | 2022-05-19T00:00:14.734454Z | 2022-05-19T00:00:14.734703Z |
| osv-2022-413 | Heap-buffer-overflow in generic_unpack | 2022-05-18T00:00:39.752172Z | 2022-05-18T00:00:39.752426Z |
| osv-2022-412 | Bad-cast to const upb_tabent' (aka 'const struct _upb_tabent')insert | 2022-05-17T00:00:31.470478Z | 2022-05-17T00:00:31.470713Z |
| osv-2022-410 | Heap-buffer-overflow in Assimp::ASE::Parser::ParseLV1SoftSkinBlock | 2022-05-12T00:01:58.200644Z | 2022-08-13T00:17:10.220371Z |
| osv-2022-409 | Heap-buffer-overflow in std::__1::__tree_node_base<void*>*& std::__1::__tree<std::__1::__value_type<std: | 2022-05-12T00:01:13.318272Z | 2022-05-12T00:01:13.318534Z |
| osv-2022-403 | Heap-use-after-free in dwg_add_handleref | 2022-05-09T00:00:48.738027Z | 2022-12-03T00:15:46.871208Z |
| osv-2022-401 | UNKNOWN READ in OT::gvar::subset | 2022-05-08T00:00:43.199921Z | 2022-05-08T00:00:43.200135Z |
| osv-2022-400 | Heap-double-free in dwg_free_XRECORD_private | 2022-05-08T00:00:40.782520Z | 2026-04-25T14:23:49.670599Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2024-7296 | Incorrect Authorization in GitLab | 2025-03-15T07:19:42.794Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-8402 | Improper Neutralization of Special Elements used in a Command ('Command Injection') in GitLab | 2025-03-15T07:16:54.710Z | 2025-08-08T06:26:52.450Z |
| bit-gitlab-2025-0652 | Incorrect Authorization in GitLab | 2025-03-15T07:12:05.891Z | 2025-08-08T06:26:52.450Z |
| bit-gitlab-2025-1257 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-03-15T07:11:11.910Z | 2025-08-08T06:26:52.450Z |
| bit-mariadb-2023-52968 | 2025-03-13T07:14:21.149Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2023-52969 | 2025-03-13T07:14:15.453Z | 2025-11-06T13:25:46.476Z | |
| bit-mariadb-2023-52970 | 2025-03-13T07:14:09.649Z | 2025-11-06T13:25:46.476Z | |
| bit-mariadb-2023-52971 | 2025-03-13T07:14:03.653Z | 2025-07-16T08:37:34.844Z | |
| bit-mariadb-2025-21490 | 2025-03-13T07:13:52.740Z | 2025-11-06T13:25:46.476Z | |
| bit-mongodb-2024-1351 | MongoDB Server may allow successful untrusted connection | 2025-03-12T07:18:10.164Z | 2025-05-20T10:02:07.006Z |
| bit-neo4j-2024-34517 | 2025-03-12T07:15:48.750Z | 2025-04-22T07:43:26.909Z | |
| bit-django-2024-38875 | 2025-03-10T08:15:29.668Z | 2025-11-06T13:25:46.476Z | |
| bit-django-2024-39329 | 2025-03-10T08:15:20.473Z | 2025-11-06T13:25:46.476Z | |
| bit-django-2024-39330 | 2025-03-10T08:15:12.172Z | 2025-11-06T13:25:46.476Z | |
| bit-django-2024-39614 | 2025-03-10T08:15:02.669Z | 2025-11-06T13:25:46.476Z | |
| bit-gitlab-2025-1540 | Incorrect Authorization in GitLab | 2025-03-10T08:14:55.268Z | 2025-08-07T09:23:45.368Z |
| bit-django-2024-53907 | 2025-03-10T08:13:36.167Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2024-53908 | 2025-03-10T08:13:29.171Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2024-56374 | 2025-03-10T08:13:20.368Z | 2025-10-06T00:06:00.502Z | |
| bit-django-2025-26699 | 2025-03-10T08:13:13.707Z | 2025-10-03T09:07:39.166Z | |
| bit-arangodb-2021-25940 | ArangoDB - Insufficient Session Expiration after Password Change | 2025-03-10T08:12:14.779Z | 2025-05-20T10:02:07.006Z |
| bit-modsecurity2-2025-27110 | Libmodsecurity3 has possible bypass of encoded HTML entities | 2025-03-07T20:58:44.656Z | 2025-05-20T10:02:07.006Z |
| bit-modsecurity-2025-27110 | Libmodsecurity3 has possible bypass of encoded HTML entities | 2025-03-07T20:58:41.959Z | 2025-05-20T10:02:07.006Z |
| bit-kibana-2025-25015 | Kibana arbitrary code execution via prototype pollution | 2025-03-07T20:56:34.668Z | 2025-05-20T10:02:07.006Z |
| bit-jenkins-2025-27622 | 2025-03-07T20:56:03.254Z | 2025-04-30T18:10:29.413Z | |
| bit-jenkins-2025-27623 | 2025-03-07T20:55:58.859Z | 2025-04-30T18:10:29.413Z | |
| bit-jenkins-2025-27624 | 2025-03-07T20:55:54.257Z | 2025-04-30T18:10:29.413Z | |
| bit-jenkins-2025-27625 | 2025-03-07T20:55:49.769Z | 2025-04-30T18:10:29.413Z | |
| bit-elk-2025-25015 | Kibana arbitrary code execution via prototype pollution | 2025-03-07T20:52:06.865Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-10925 | Authorization Bypass Through User-Controlled Key in GitLab | 2025-03-05T07:30:40.739Z | 2025-11-25T18:26:29.568Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0025 | Multiples vulnérabilités dans Mozilla Firefox pour iOS | 2025-01-13T00:00:00.000000 | 2025-01-13T00:00:00.000000 |
| certfr-2025-avi-0024 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-01-10T00:00:00.000000 | 2025-01-10T00:00:00.000000 |
| certfr-2025-avi-0023 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-01-10T00:00:00.000000 | 2025-01-10T00:00:00.000000 |
| certfr-2025-avi-0022 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-01-10T00:00:00.000000 | 2025-01-10T00:00:00.000000 |
| certfr-2025-avi-0021 | Multiples vulnérabilités dans les produits IBM | 2025-01-10T00:00:00.000000 | 2025-01-10T00:00:00.000000 |
| certfr-2025-avi-0020 | Vulnérabilité dans Asterisk | 2025-01-10T00:00:00.000000 | 2025-01-10T00:00:00.000000 |
| certfr-2025-avi-0019 | Multiples vulnérabilités dans Mozilla Thunderbird | 2025-01-09T00:00:00.000000 | 2025-01-15T00:00:00.000000 |
| certfr-2025-avi-0018 | Multiples vulnérabilités dans les produits Juniper Networks | 2025-01-09T00:00:00.000000 | 2025-01-09T00:00:00.000000 |
| certfr-2025-avi-0017 | Vulnérabilité dans les produits HPE Aruba Networking | 2025-01-09T00:00:00.000000 | 2025-01-09T00:00:00.000000 |
| certfr-2025-avi-0016 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-01-09T00:00:00.000000 | 2025-01-09T00:00:00.000000 |
| certfr-2025-avi-0015 | Multiples vulnérabilités dans GitLab | 2025-01-09T00:00:00.000000 | 2025-01-09T00:00:00.000000 |
| certfr-2025-avi-0014 | Multiples vulnérabilités dans les produits Ivanti | 2025-01-09T00:00:00.000000 | 2025-01-09T00:00:00.000000 |
| certfr-2025-avi-0013 | Multiples vulnérabilités dans les produits SonicWall | 2025-01-08T00:00:00.000000 | 2025-01-08T00:00:00.000000 |
| certfr-2025-avi-0012 | Vulnérabilité dans Google Chrome | 2025-01-08T00:00:00.000000 | 2025-01-08T00:00:00.000000 |
| certfr-2025-avi-0011 | Vulnérabilité dans VMware Aria automation et Cloud Fondation | 2025-01-08T00:00:00.000000 | 2025-01-08T00:00:00.000000 |
| certfr-2025-avi-0010 | Multiples vulnérabilités dans les produits Splunk | 2025-01-08T00:00:00.000000 | 2025-01-08T00:00:00.000000 |
| certfr-2025-avi-0009 | Multiples vulnérabilités dans les produits Mozilla | 2025-01-08T00:00:00.000000 | 2025-01-15T00:00:00.000000 |
| certfr-2025-avi-0008 | Multiples vulnérabilités dans Joomla! | 2025-01-08T00:00:00.000000 | 2025-01-08T00:00:00.000000 |
| certfr-2025-avi-0007 | Multiples vulnérabilités dans HPE Aruba Networking 501 Wireless Client Bridge | 2025-01-08T00:00:00.000000 | 2025-01-08T00:00:00.000000 |
| certfr-2025-avi-0006 | Multiples vulnérabilités dans LibreOffice | 2025-01-08T00:00:00.000000 | 2025-01-08T00:00:00.000000 |
| certfr-2025-avi-0005 | Vulnérabilité dans Google Pixel | 2025-01-08T00:00:00.000000 | 2025-01-08T00:00:00.000000 |
| certfr-2025-avi-0004 | Multiples vulnérabilités dans Google Android | 2025-01-07T00:00:00.000000 | 2025-01-03T00:00:00.000000 |
| certfr-2025-avi-0003 | Multiples vulnérabilités dans les produits IBM | 2025-01-03T00:00:00.000000 | 2025-01-03T00:00:00.000000 |
| certfr-2025-avi-0002 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-01-03T00:00:00.000000 | 2025-01-06T00:00:00.000000 |
| certfr-2025-avi-0001 | Multiples vulnérabilités dans les produits Moxa | 2025-01-03T00:00:00.000000 | 2025-01-03T00:00:00.000000 |
| certfr-2024-avi-1110 | Multiples vulnérabilités dans le greffon Security QRadar Log Management AQL de IBM | 2024-12-27T00:00:00.000000 | 2024-12-27T00:00:00.000000 |
| certfr-2024-avi-1109 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-12-27T00:00:00.000000 | 2024-12-27T00:00:00.000000 |
| certfr-2024-avi-1108 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-12-27T00:00:00.000000 | 2024-12-27T00:00:00.000000 |
| certfr-2024-avi-1107 | Vulnérabilité dans les produits Palo Alto Networks | 2024-12-27T00:00:00.000000 | 2024-12-27T00:00:00.000000 |
| certfr-2024-avi-1106 | Vulnérabilité dans Adobe ColdFusion | 2024-12-24T00:00:00.000000 | 2024-12-24T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2017-000018 | Hands-on Vulnerability Learning Tool "AppGoat" vulnerable to remote code execution | 2017-02-09T14:47+09:00 | 2017-06-01T11:30+09:00 |
| jvndb-2017-000021 | Hands-on Vulnerability Learning Tool "AppGoat" vulnerable to cross-site request forgery | 2017-02-09T14:40+09:00 | 2017-06-01T11:30+09:00 |
| jvndb-2017-000020 | Hands-on Vulnerability Learning Tool "AppGoat" vulnerable to authentication bypass | 2017-02-09T14:39+09:00 | 2017-06-01T11:30+09:00 |
| jvndb-2017-000022 | Multiple cross-site scripting vulnerabilities in Webmin | 2017-02-09T14:06+09:00 | 2017-06-02T18:04+09:00 |
| jvndb-2017-000017 | Business LaLa Call App for Android fails to verify SSL server certificates | 2017-02-03T13:58+09:00 | 2017-06-06T11:52+09:00 |
| jvndb-2017-000016 | LaLa Call App for Android fails to verify SSL server certificates | 2017-02-03T13:31+09:00 | 2017-06-06T11:52+09:00 |
| jvndb-2017-000014 | CubeCart vulnerable to directory traversal | 2017-01-27T13:49+09:00 | 2017-06-01T11:30+09:00 |
| jvndb-2017-000011 | Knowledge vulnerable to cross-site request forgery | 2017-01-24T14:12+09:00 | 2017-06-06T14:38+09:00 |
| jvndb-2017-000013 | Nessus vulnerable to cross-site scripting | 2017-01-24T13:38+09:00 | 2017-02-20T17:44+09:00 |
| jvndb-2017-000010 | smalruby-editor vulnerable to OS command injection | 2017-01-24T13:34+09:00 | 2017-06-06T15:40+09:00 |
| jvndb-2017-001054 | Arbitrary file upload vulnerability in GigaCC OFFICE | 2017-01-23T17:57+09:00 | 2018-02-28T11:25+09:00 |
| jvndb-2017-001053 | Mis-configuration of Apache Velocity template engine used to send emails in GigaCC OFFICE | 2017-01-23T17:57+09:00 | 2018-02-28T11:35+09:00 |
| jvndb-2017-000012 | Java (OGNL) code execution in Apache Struts 2 when devMode is enabled | 2017-01-20T14:01+09:00 | 2017-01-20T14:01+09:00 |
| jvndb-2017-000009 | MaruUo Factory's multiple AttacheCase products vulnerable to directory traversal | 2017-01-16T14:41+09:00 | 2017-06-06T16:13+09:00 |
| jvndb-2017-000008 | AttacheCase vulnerable to directory traversal | 2017-01-16T14:35+09:00 | 2017-06-06T16:13+09:00 |
| jvndb-2017-000007 | Cybozu Remote Service Manager fails to verify client certificates | 2017-01-11T13:46+09:00 | 2017-06-06T15:52+09:00 |
| jvndb-2017-000003 | Olive Diary DX vulnerable to cross-site scripting | 2017-01-06T14:02+09:00 | 2017-06-01T15:58+09:00 |
| jvndb-2017-000002 | WEB SCHEDULE vulnerable to cross-site scripting | 2017-01-06T14:01+09:00 | 2017-06-01T15:58+09:00 |
| jvndb-2017-000001 | Olive Blog vulnerable to cross-site scripting | 2017-01-06T13:56+09:00 | 2017-06-01T15:58+09:00 |
| jvndb-2016-000251 | WinSparkle issue where registry value is not validated | 2016-12-26T14:45+09:00 | 2018-02-16T16:00+09:00 |
| jvndb-2016-000250 | Wireshark for Windows issue where an arbitrary file may be deleted | 2016-12-26T14:45+09:00 | 2018-02-16T16:00+09:00 |
| jvndb-2016-000249 | SKYSEA Client View vulnerable to arbitrary code execution | 2016-12-22T14:26+09:00 | 2017-11-27T16:53+09:00 |
| jvndb-2016-000248 | H2O use-after-free vulnerability | 2016-12-22T14:26+09:00 | 2017-11-27T16:53+09:00 |
| jvndb-2016-000247 | BlueZ userland utilities vulnerable to buffer overflow | 2016-12-22T14:26+09:00 | 2017-11-27T16:47+09:00 |
| jvndb-2016-000226 | Cybozu Garoon fails to restrict access permission in To-Dos of Space function | 2016-12-19T14:38+09:00 | 2017-11-27T16:58+09:00 |
| jvndb-2016-000225 | Cybozu Garoon fails to restrict access permission in MultiReport filters | 2016-12-19T14:32+09:00 | 2017-11-27T16:58+09:00 |
| jvndb-2016-000224 | Cybozu Garoon fails to restrict access permission in the RSS settings | 2016-12-19T14:29+09:00 | 2017-11-27T16:58+09:00 |
| jvndb-2016-000229 | Cybozu Garoon vulnerable to SQL injection | 2016-12-19T14:19+09:00 | 2017-11-27T17:11+09:00 |
| jvndb-2016-000228 | Cybozu Garoon vulnerable to directory traversal | 2016-12-19T13:44+09:00 | 2017-11-27T17:11+09:00 |
| jvndb-2016-000227 | Cybozu Garoon vulnerable to cross-site request forgery | 2016-12-19T13:36+09:00 | 2017-11-27T16:58+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-30739 | WordPress Debug Log Viewer plugin缺少授权漏洞 | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30738 | WordPress Chartify plugin跨站请求伪造漏洞 | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30737 | WordPress Business Directory Plugin跨站请求伪造漏洞 | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30736 | WordPress Basel plugin缺失授权漏洞 | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30735 | WordPress Animation Addons for Elementor plugin SQL注入漏洞 | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30734 | WordPress Advanced FAQ Manager plugin跨站脚本漏洞(CNVD-2025-3073485) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30733 | WordPress Advanced FAQ Manager plugin跨站脚本漏洞 | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30732 | WordPress AdForest plugin缺失授权漏洞 | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30663 | Microsoft Word代码执行漏洞(CNVD-2025-30663) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30662 | Microsoft Word代码执行漏洞(CNVD-2025-30662) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30661 | Microsoft Word代码执行漏洞(CNVD-2025-30661) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30660 | Microsoft Office代码执行漏洞(CNVD-2025-30660) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30659 | Microsoft Office代码执行漏洞(CNVD-2025-30659) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30658 | Microsoft Excel代码执行漏洞(CNVD-2025-30658) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30657 | Microsoft Excel代码执行漏洞(CNVD-2025-30657) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30656 | Microsoft Excel代码执行漏洞(CNVD-2025-30656) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30655 | Microsoft Excel代码执行漏洞(CNVD-2025-30655) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30654 | Microsoft Excel代码执行漏洞(CNVD-2025-30654) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30653 | Microsoft Excel代码执行漏洞(CNVD-2025-30653) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30589 | WordPress插件WP EasyCart信息泄露漏洞 | 2025-12-12 | 2025-12-12 |
| cnvd-2025-30588 | WordPress插件WP AI CoPilot信息泄露漏洞 | 2025-12-12 | 2025-12-12 |
| cnvd-2025-30587 | WordPress插件Shortcodes and extra features for Phlox theme信息泄露漏洞 | 2025-12-12 | 2025-12-12 |
| cnvd-2025-30586 | WordPress插件Portfolio and Projects信息泄露漏洞 | 2025-12-12 | 2025-12-12 |
| cnvd-2025-30585 | WordPress插件Geo Controller信息泄露漏洞 | 2025-12-12 | 2025-12-12 |
| cnvd-2025-30584 | WordPress插件EventPrime信息泄露漏洞 | 2025-12-12 | 2025-12-12 |
| cnvd-2025-30583 | WordPress插件Download Manager信息泄露漏洞 | 2025-12-12 | 2025-12-12 |
| cnvd-2025-30582 | WordPress插件Beaver Builder信息泄露漏洞 | 2025-12-12 | 2025-12-12 |
| cnvd-2025-30574 | Microsoft Outlook资源管理错误漏洞 | 2025-12-12 | 2025-12-12 |
| cnvd-2025-30573 | Microsoft Office代码执行漏洞(CNVD-2025-3057378) | 2025-12-12 | 2025-12-12 |
| cnvd-2025-30572 | Microsoft Exchange Server输入验证错误漏洞(CNVD-2025-3057284) | 2025-12-12 | 2025-12-12 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-00028 | Уязвимость решения для управления финансовыми показателями SAP Business Planning and Cons… | 03.01.2026 | 03.01.2026 |
| bdu:2026-00027 | Уязвимость компонента My Timesheet Fiori 2.0 программного обеспечения для управления перс… | 03.01.2026 | 03.01.2026 |
| bdu:2026-00026 | Уязвимость компонента My Timesheet Fiori 2.0 программного обеспечения для управления перс… | 03.01.2026 | 03.01.2026 |
| bdu:2026-00025 | Уязвимость компонента My Timesheet Fiori 2.0 программного обеспечения для управления перс… | 03.01.2026 | 03.01.2026 |
| bdu:2026-00024 | Уязвимость компонента Adobe Document Service программных интеграционных платформ SAP NetW… | 03.01.2026 | 03.01.2026 |
| bdu:2026-00023 | Уязвимость программной интеграционной платформы SAP NetWeaver, связанная с недостатками п… | 03.01.2026 | 03.01.2026 |
| bdu:2026-00022 | Уязвимость сервера приложений SAP NetWeaver Application Server Java, связанная с недостат… | 03.01.2026 | 03.01.2026 |
| bdu:2026-00021 | Уязвимость программного обеспечения разработки и выполнения приложений на языке ABAP SAP … | 03.01.2026 | 03.01.2026 |
| bdu:2026-00020 | Уязвимость компонента My Timesheet Fiori 2.0 программного обеспечения для управления перс… | 03.01.2026 | 03.01.2026 |
| bdu:2026-00019 | Уязвимость функций ForegroundLockActivity(), MainActivity() приложения для управления сис… | 03.01.2026 | 03.01.2026 |
| bdu:2026-00018 | Уязвимость функций ForegroundLockActivity(), WelcomeActivity() приложения для управления … | 03.01.2026 | 03.01.2026 |
| bdu:2026-00017 | Уязвимость функции userfaultfd_writeprotect() модуля fs/userfaultfd.c поддержки файловой … | 03.01.2026 | 03.01.2026 |
| bdu:2026-00016 | Уязвимость браузера Microsoft Edge, связанная с обходом аутентификации посредством спуфин… | 03.01.2026 | 03.01.2026 |
| bdu:2026-00015 | Уязвимость программного обеспечения для централизованного мониторинга и управления в сред… | 03.01.2026 | 03.01.2026 |
| bdu:2026-00014 | Уязвимость драйвера потребительских ноутбуков Lenovo Dispatcher 3.0, Dispatcher 3.1, связ… | 03.01.2026 | 03.01.2026 |
| bdu:2026-00013 | Уязвимость демонов для обработки Router Solicitation, Router Advertisement в IPv6 rtsol(8… | 03.01.2026 | 03.01.2026 |
| bdu:2026-00012 | Уязвимость сервиса визуализации данных Kibana, связанная с ошибками авторизации, позволяю… | 03.01.2026 | 03.01.2026 |
| bdu:2026-00011 | Уязвимость сервиса визуализации данных Kibana, связанная с ошибками авторизации, позволяю… | 03.01.2026 | 03.01.2026 |
| bdu:2026-00010 | Уязвимость службы загрузки встроенного ПО микропрограммного обеспечения маршрутизаторов D… | 03.01.2026 | 03.01.2026 |
| bdu:2026-00009 | Уязвимость компонента Socket Appender реализации API библиотеки журналирования Apache Log… | 03.01.2026 | 14.01.2026 |
| bdu:2026-00008 | Уязвимость интерфейса командной строки (CLI) микропрограммного обеспечения терминального … | 03.01.2026 | 03.01.2026 |
| bdu:2026-00007 | Уязвимость прикладного программного интерфейса аутентификации gRPC распределенной системы… | 03.01.2026 | 03.01.2026 |
| bdu:2026-00006 | Уязвимость функции write_headers() библиотеки cpp-httplib, позволяющая нарушителю модифиц… | 03.01.2026 | 03.01.2026 |
| bdu:2026-00005 | Уязвимость модуля отображения веб-страниц WebKit браузера Safari операционных систем tvOS… | 02.01.2026 | 02.01.2026 |
| bdu:2026-00004 | Уязвимость плагинов Manx и Sandcat автоматизированной системы эмуляции действий нарушител… | 01.01.2026 | 01.01.2026 |
| bdu:2026-00003 | Уязвимость плагина Magic the Gathering Card Tooltips системы управления содержимым сайта … | 01.01.2026 | 01.01.2026 |
| bdu:2026-00002 | Уязвимость плагина Calculator Builder системы управления содержимым сайта WordPress, связ… | 01.01.2026 | 01.01.2026 |
| bdu:2026-00001 | Уязвимость плагина FULL Customer системы управления содержимым сайта WordPress, связанная… | 01.01.2026 | 01.01.2026 |
| bdu:2025-16495 | Уязвимость плагина AI Mortgage Calculator системы управления содержимым сайта WordPress, … | 31.12.2025 | 31.12.2025 |
| bdu:2025-16494 | Уязвимость программного обеспечения для проверки личности клиентов KYC Solutions, связанн… | 31.12.2025 | 31.12.2025 |
| ID | Description | Updated |
|---|---|---|
| var-201611-0386 | Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local … | 2025-12-22T23:04:53.271000Z |
| var-200609-1397 | The Airport driver for certain Orinoco based Airport cards in Darwin kernel 8.8.0 in Appl… | 2025-12-22T22:38:07.588000Z |
| var-200609-1400 | The Security Framework in Apple Mac OS X 10.4 through 10.4.8 allows remote attackers to c… | 2025-12-22T22:25:37.911000Z |
| var-202203-0005 | The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can… | 2025-12-22T22:11:54.518000Z |
| var-200609-1306 | The Security Framework in Apple Mac OS X 10.3.9, and 10.4.x before 10.4.7, does not prope… | 2025-12-22T22:08:01.985000Z |
| var-200609-0858 | Multiple buffer overflows in the Apple Type Services (ATS) server in Mac OS X 10.4 throug… | 2025-12-22T21:35:06.905000Z |
| var-200110-0422 | OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a de… | 2025-12-22T20:52:04.389000Z |
| var-200609-1606 | WebKit in Apple Mac OS X 10.3.x through 10.3.9 and 10.4 through 10.4.8 allows remote atta… | 2025-12-22T20:21:43.581000Z |
| var-201704-1034 | Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.… | 2025-12-22T19:58:27.256000Z |
| var-200609-1021 | Unspecified vulnerability in CFNetwork in Mac OS 10.4.8 and earlier allows user-assisted … | 2025-12-21T23:18:12.893000Z |
| var-200609-1276 | The Security Framework in Apple Mac OS X 10.4 through 10.4.8 allows remote attackers to c… | 2025-12-21T23:11:14.058000Z |
| var-200609-1209 | Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.… | 2025-12-21T22:00:19.673000Z |
| var-200609-1035 | The Installer application in Apple Mac OS X 10.4.8 and earlier, when used by a user with … | 2025-12-21T21:27:14.934000Z |
| var-201406-0117 | The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 … | 2025-12-21T21:19:59.437000Z |
| var-200609-1614 | The Apple Type Services (ATS) server in Mac OS X 10.4.8 and earlier does not securely cre… | 2025-12-21T20:37:07.304000Z |
| var-200609-1338 | Stack-based buffer overflow in the Apple Type Services (ATS) server in Mac OS 10.4.8 and … | 2025-12-21T19:57:33.281000Z |
| var-200609-1025 | The Security Framework in Apple Mac OS X 10.3.9, and 10.4.x before 10.4.7, does not prope… | 2025-12-21T19:56:11.573000Z |
| var-202511-1445 | An Improper Isolation or Compartmentalization vulnerability [CWE-653] in Fortinet FortiSa… | 2025-12-20T23:46:54.209000Z |
| var-202511-1634 | An improper neutralization of special elements used in an SQL Command ("SQL Injection") v… | 2025-12-20T23:46:54.174000Z |
| var-202511-2201 | Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in … | 2025-12-20T23:46:54.141000Z |
| var-202511-0753 | Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in … | 2025-12-20T23:46:14.059000Z |
| var-202511-1341 | A buffer copy without checking size of input ('classic buffer overflow') in Fortinet Fort… | 2025-12-20T23:46:14.020000Z |
| var-202512-0955 | An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injecti… | 2025-12-20T23:46:13.756000Z |
| var-202501-1344 | NETGEAR DGN1000 before 1.1.00.48 is vulnerable to an authentication bypass vulnerability.… | 2025-12-20T23:45:21.039000Z |
| var-202511-2330 | Shenzhen Tenda Technology Co.,Ltd. of ac21 A stack-based buffer overflow vulnerability ex… | 2025-12-20T23:44:52.161000Z |
| var-202511-2269 | A vulnerability has been found in Tenda AC21 16.03.08.16. This vulnerability affects unkn… | 2025-12-20T23:44:29.620000Z |
| var-202511-0613 | Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in … | 2025-12-20T23:41:43.613000Z |
| var-202509-4136 | Information disclosure when UE receives the RTP packet from the network, while decoding a… | 2025-12-20T23:40:19.442000Z |
| var-202511-1878 | Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in … | 2025-12-20T23:40:19.042000Z |
| var-202511-1190 | A command injection vulnerability exists in the D-Link DIR-823G router firmware DIR823G_V… | 2025-12-20T23:39:53.806000Z |