Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40338 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_Sony_DPD() enume… |
gphoto |
libgphoto2 |
2026-04-17T23:40:10.097Z | 2026-04-20T16:16:08.585Z |
| CVE-2026-40485 |
5.3 (3.1)
|
ChurchCRM: Username Enumeration via Differential Respo… |
ChurchCRM |
CRM |
2026-04-17T23:29:35.884Z | 2026-04-20T13:36:05.319Z |
| CVE-2026-40336 |
2.4 (3.1)
|
libgphoto2 has memory leak in ptp_unpack_Sony_DPD() se… |
gphoto |
libgphoto2 |
2026-04-17T23:27:42.868Z | 2026-04-20T16:14:53.071Z |
| CVE-2026-2262 |
7.5 (3.1)
|
Easy Appointments <= 3.12.21 - Unauthenticated Sensiti… |
easyappointments |
Easy Appointments |
2026-04-17T23:26:48.863Z | 2026-04-20T13:51:28.513Z |
| CVE-2026-40484 |
9.1 (3.1)
|
ChurchCRM: Authenticated Remote Code Execution via Unr… |
ChurchCRM |
CRM |
2026-04-17T23:25:06.319Z | 2026-04-20T14:56:29.684Z |
| CVE-2026-40483 |
5.4 (3.1)
|
ChurchCRM: Stored XSS in PledgeEditor.php via Donation… |
ChurchCRM |
CRM |
2026-04-17T23:20:44.900Z | 2026-04-20T16:16:17.841Z |
| CVE-2026-40335 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_DPV() UINT128/IN… |
gphoto |
libgphoto2 |
2026-04-17T23:19:16.935Z | 2026-04-20T13:36:05.542Z |
| CVE-2026-40334 |
3.5 (3.1)
|
libgphoto2 missing null termination in ptp_unpack_Cano… |
gphoto |
libgphoto2 |
2026-04-17T23:16:38.751Z | 2026-04-20T13:36:05.703Z |
| CVE-2026-40582 |
9.1 (4.0)
|
ChurchCRM: Authentication Bypass in `/api/public/user/… |
ChurchCRM |
CRM |
2026-04-17T23:16:13.862Z | 2026-04-20T14:56:36.921Z |
| CVE-2026-40333 |
6.1 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_EOS_ImageFormat(… |
gphoto |
libgphoto2 |
2026-04-17T23:11:11.073Z | 2026-04-20T14:56:44.091Z |
| CVE-2026-40480 |
7.1 (4.0)
|
ChurchCRM has Missing Object-Level Authorization / IDO… |
ChurchCRM |
CRM |
2026-04-17T23:07:30.126Z | 2026-04-20T16:16:00.433Z |
| CVE-2026-40324 |
9.1 (3.1)
|
Hot Chocolate's Utf8GraphQLParser has Stack Overflow v… |
ChilliCream |
graphql-platform |
2026-04-17T23:05:26.217Z | 2026-04-20T16:16:25.151Z |
| CVE-2026-40482 |
7.1 (4.0)
|
ChurchCRM has Authenticated SQL Injection in `/api/fam… |
ChurchCRM |
CRM |
2026-04-17T22:58:48.528Z | 2026-04-20T16:16:32.247Z |
| CVE-2026-40323 |
8.9 (4.0)
|
SP1 V6 Recursion Circuit Row-Count Binding Gap |
succinctlabs |
sp1 |
2026-04-17T22:58:42.580Z | 2026-04-20T16:16:41.143Z |
| CVE-2026-40481 |
8.2 (4.0)
|
monetr: Unauthenticated Stripe webhook reads attacker-… |
monetr |
monetr |
2026-04-17T22:54:57.545Z | 2026-04-20T13:36:05.862Z |
| CVE-2026-40486 |
4.3 (3.1)
|
Kimai's User Preferences API allows standard users to … |
kimai |
kimai |
2026-04-17T22:35:53.543Z | 2026-04-20T14:56:51.165Z |
| CVE-2026-40479 |
5.4 (3.1)
|
Kimai: Stored XSS via Incomplete HTML Attribute Escapi… |
kimai |
kimai |
2026-04-17T22:31:29.930Z | 2026-04-20T16:16:41.880Z |
| CVE-2026-2434 |
6.4 (3.1)
|
Pz-LinkCard <= 2.5.8.1 - Authenticated (Contributor+) … |
poporon |
Pz-LinkCard |
2026-04-17T22:27:13.525Z | 2026-04-20T13:36:06.124Z |
| CVE-2026-40478 |
9.1 (3.1)
|
Improper neutralization of specific syntax patterns fo… |
thymeleaf |
thymeleaf |
2026-04-17T21:57:01.560Z | 2026-04-22T03:55:42.682Z |
| CVE-2026-40477 |
9.1 (3.1)
|
Improper restriction of the scope of accessible object… |
thymeleaf |
thymeleaf |
2026-04-17T21:53:47.271Z | 2026-04-22T03:55:41.093Z |
| CVE-2026-40476 |
6.9 (4.0)
|
graphql-php: Denial of Service via quadratic complexit… |
webonyx |
graphql-php |
2026-04-17T21:42:59.511Z | 2026-04-20T14:56:57.812Z |
| CVE-2026-5720 |
7.1 (4.0)
|
miniupnpd Integer Underflow SOAPAction Header Parsing |
miniupnp project |
miniupnpd |
2026-04-17T21:39:54.818Z | 2026-04-20T16:59:21.060Z |
| CVE-2026-40474 |
7.6 (3.1)
|
wger has Broken Access Control in the Global Gym Confi… |
wger-project |
wger |
2026-04-17T21:39:03.677Z | 2026-04-20T16:08:12.427Z |
| CVE-2026-40353 |
5.1 (4.0)
|
wger: Stored XSS via Unescaped License Attribution Fields |
wger-project |
wger |
2026-04-17T21:16:12.401Z | 2026-04-20T16:17:52.305Z |
| CVE-2026-40258 |
9.1 (3.1)
|
Gramps Web API has Zip Slip Path Traversal in Media Ar… |
gramps-project |
gramps-web-api |
2026-04-17T21:12:54.226Z | 2026-04-20T15:48:41.690Z |
| CVE-2026-29013 |
8.8 (4.0)
|
libcoap Out-of-Bounds Read in OSCORE CBOR Unwrap Handling |
libcoap |
libcoap |
2026-04-17T21:11:38.137Z | 2026-04-20T16:46:56.223Z |
| CVE-2026-40321 |
8.1 (3.1)
|
DotNetNuke.Core has stored cross-site-scripting (XSS) … |
dnnsoftware |
Dnn.Platform |
2026-04-17T21:10:33.192Z | 2026-04-22T03:55:44.141Z |
| CVE-2026-40352 |
8.8 (3.1)
|
FastGPT: NoSQL Injection in updatePasswordByOld Leads … |
labring |
FastGPT |
2026-04-17T21:09:32.913Z | 2026-04-20T13:36:06.464Z |
| CVE-2026-40306 |
6.9 (4.0)
|
DNN has same HostGUID for all new installs |
dnnsoftware |
Dnn.Platform |
2026-04-17T21:09:30.317Z | 2026-04-20T16:18:27.508Z |
| CVE-2026-40305 |
4.3 (3.1)
|
DNN has Force Friend Request Acceptance |
dnnsoftware |
Dnn.Platform |
2026-04-17T21:06:09.237Z | 2026-04-20T13:36:06.644Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-35465 |
7.5 (3.1)
|
SecureDrop Client has path injection in read_gzip_head… |
freedomofpress |
securedrop-client |
2026-04-18T00:41:16.594Z | 2026-04-20T15:47:43.822Z |
| CVE-2026-40593 |
4.8 (3.1)
|
ChurchCRM: Stored XSS in UserEditor.php via Login Name Field |
ChurchCRM |
CRM |
2026-04-18T00:02:59.606Z | 2026-04-20T14:56:05.666Z |
| CVE-2026-40582 |
9.1 (4.0)
|
ChurchCRM: Authentication Bypass in `/api/public/user/… |
ChurchCRM |
CRM |
2026-04-17T23:16:13.862Z | 2026-04-20T14:56:36.921Z |
| CVE-2026-40581 |
8.1 (3.1)
|
ChurchCRM: Cross-Site Request Forgery (CSRF) in Select… |
ChurchCRM |
CRM |
2026-04-17T23:51:32.765Z | 2026-04-20T16:15:58.183Z |
| CVE-2026-40485 |
5.3 (3.1)
|
ChurchCRM: Username Enumeration via Differential Respo… |
ChurchCRM |
CRM |
2026-04-17T23:29:35.884Z | 2026-04-20T13:36:05.319Z |
| CVE-2026-40484 |
9.1 (3.1)
|
ChurchCRM: Authenticated Remote Code Execution via Unr… |
ChurchCRM |
CRM |
2026-04-17T23:25:06.319Z | 2026-04-20T14:56:29.684Z |
| CVE-2026-40483 |
5.4 (3.1)
|
ChurchCRM: Stored XSS in PledgeEditor.php via Donation… |
ChurchCRM |
CRM |
2026-04-17T23:20:44.900Z | 2026-04-20T16:16:17.841Z |
| CVE-2026-40482 |
7.1 (4.0)
|
ChurchCRM has Authenticated SQL Injection in `/api/fam… |
ChurchCRM |
CRM |
2026-04-17T22:58:48.528Z | 2026-04-20T16:16:32.247Z |
| CVE-2026-40480 |
7.1 (4.0)
|
ChurchCRM has Missing Object-Level Authorization / IDO… |
ChurchCRM |
CRM |
2026-04-17T23:07:30.126Z | 2026-04-20T16:16:00.433Z |
| CVE-2026-40349 |
8.8 (3.1)
|
Authenticated Movary User Can Self-Escalate to Adminis… |
leepeuker |
movary |
2026-04-18T00:05:46.360Z | 2026-04-20T16:15:49.844Z |
| CVE-2026-40348 |
7.7 (3.1)
|
Movary has Authenticated SSRF via Jellyfin Server URL … |
leepeuker |
movary |
2026-04-18T00:01:09.725Z | 2026-04-20T16:11:32.779Z |
| CVE-2026-40347 |
5.3 (3.1)
|
Python-Multipart affected by Denial of Service via lar… |
Kludex |
python-multipart |
2026-04-17T23:56:50.777Z | 2026-04-20T15:46:40.011Z |
| CVE-2026-40346 |
6.4 (4.0)
|
NocoBase has SSRF in Workflow HTTP Request and Custom … |
nocobase |
@nocobase/plugin-workflow-request |
2026-04-17T23:54:34.829Z | 2026-04-20T14:56:12.829Z |
| CVE-2026-40341 |
3.5 (3.1)
|
libgphoto2 has an OOB Read in ptp_unpack_EOS_FocusInfoEx |
gphoto |
libgphoto2 |
2026-04-17T23:48:36.644Z | 2026-04-20T16:14:19.107Z |
| CVE-2026-40340 |
6.1 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_OI() in ptp-pack… |
gphoto |
libgphoto2 |
2026-04-17T23:45:17.467Z | 2026-04-20T13:36:05.149Z |
| CVE-2026-40339 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_Sony_DPD() FormF… |
gphoto |
libgphoto2 |
2026-04-17T23:42:32.586Z | 2026-04-20T14:56:21.979Z |
| CVE-2026-40338 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_Sony_DPD() enume… |
gphoto |
libgphoto2 |
2026-04-17T23:40:10.097Z | 2026-04-20T16:16:08.585Z |
| CVE-2026-40337 |
5.1 (3.1)
|
Sentry kernel has incomplete ownership check for IRQ l… |
camelot-os |
sentry-kernel |
2026-04-17T23:51:09.866Z | 2026-04-20T16:13:48.908Z |
| CVE-2026-40336 |
2.4 (3.1)
|
libgphoto2 has memory leak in ptp_unpack_Sony_DPD() se… |
gphoto |
libgphoto2 |
2026-04-17T23:27:42.868Z | 2026-04-20T16:14:53.071Z |
| CVE-2026-40335 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_DPV() UINT128/IN… |
gphoto |
libgphoto2 |
2026-04-17T23:19:16.935Z | 2026-04-20T13:36:05.542Z |
| CVE-2026-40334 |
3.5 (3.1)
|
libgphoto2 missing null termination in ptp_unpack_Cano… |
gphoto |
libgphoto2 |
2026-04-17T23:16:38.751Z | 2026-04-20T13:36:05.703Z |
| CVE-2026-40333 |
6.1 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_EOS_ImageFormat(… |
gphoto |
libgphoto2 |
2026-04-17T23:11:11.073Z | 2026-04-20T14:56:44.091Z |
| CVE-2026-40324 |
9.1 (3.1)
|
Hot Chocolate's Utf8GraphQLParser has Stack Overflow v… |
ChilliCream |
graphql-platform |
2026-04-17T23:05:26.217Z | 2026-04-20T16:16:25.151Z |
| CVE-2026-40323 |
8.9 (4.0)
|
SP1 V6 Recursion Circuit Row-Count Binding Gap |
succinctlabs |
sp1 |
2026-04-17T22:58:42.580Z | 2026-04-20T16:16:41.143Z |
| CVE-2026-2262 |
7.5 (3.1)
|
Easy Appointments <= 3.12.21 - Unauthenticated Sensiti… |
easyappointments |
Easy Appointments |
2026-04-17T23:26:48.863Z | 2026-04-20T13:51:28.513Z |
| CVE-2026-5250 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-04-17T22:21:51.917Z | |
| CVE-2026-40486 |
4.3 (3.1)
|
Kimai's User Preferences API allows standard users to … |
kimai |
kimai |
2026-04-17T22:35:53.543Z | 2026-04-20T14:56:51.165Z |
| CVE-2026-40481 |
8.2 (4.0)
|
monetr: Unauthenticated Stripe webhook reads attacker-… |
monetr |
monetr |
2026-04-17T22:54:57.545Z | 2026-04-20T13:36:05.862Z |
| CVE-2026-40479 |
5.4 (3.1)
|
Kimai: Stored XSS via Incomplete HTML Attribute Escapi… |
kimai |
kimai |
2026-04-17T22:31:29.930Z | 2026-04-20T16:16:41.880Z |
| CVE-2026-2434 |
6.4 (3.1)
|
Pz-LinkCard <= 2.5.8.1 - Authenticated (Contributor+) … |
poporon |
Pz-LinkCard |
2026-04-17T22:27:13.525Z | 2026-04-20T13:36:06.124Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-7x7j-88hg-3j82 |
6.1 (3.1)
|
A flaw was found in GIMP. This vulnerability, a buffer overflow in the `file-seattle-filmworks` plu… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-4gcp-x7jh-x4v7 |
9.2 (4.0)
|
CWE-798: Use of Hard-coded Credentials in Sonatype Nexus Repository Manager versions 3.0.0 through … | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-4f9g-vrx9-f8cq |
5.5 (3.1)
|
A flaw was found in GIMP. A remote attacker could exploit an integer overflow vulnerability in the … | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-497x-rrr9-68jp |
5.3 (3.1)
|
Grafana Loki Path Traversal - CVE-2021-36156 Bypass | 2026-04-15T21:30:18Z | 2026-04-16T21:42:00Z |
| ghsa-3p5h-985r-gw4g |
4.3 (3.1)
|
Heap buffer overflow in Skia in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to … | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-3347-qjpp-457v |
8.8 (3.1)
|
Use after free in Prerender in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to e… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-xw5x-xgqj-5wfc |
8.2 (3.1)
|
Adobe Photoshop Installer was affected by an Uncontrolled Search Path Element vulnerability that co… | 2026-04-15T21:30:17Z | 2026-04-22T18:31:38Z |
| ghsa-qh43-xrjm-4ggp |
4.3 (3.1)
|
Kimai's User Preferences API allows standard users to modify restricted attributes: hourly_rate, in… | 2026-04-15T19:46:45Z | 2026-04-15T19:46:45Z |
| ghsa-g82g-m9vx-vhjg |
5.4 (3.1)
|
Kimai has Stored XSS via Incomplete HTML Attribute Escaping in Team Member Widget | 2026-04-15T19:46:35Z | 2026-04-15T19:46:35Z |
| ghsa-xjw8-8c5c-9r79 |
9.0 (3.1)
|
Improper neutralization of specific syntax patterns for unauthorized expressions in Thymeleaf | 2026-04-15T19:46:23Z | 2026-04-15T19:46:23Z |
| ghsa-r4v4-5mwr-2fwr |
9.0 (3.1)
|
Improper restriction of the scope of accessible objects in Thymeleaf expressions | 2026-04-15T19:46:04Z | 2026-04-15T19:46:04Z |
| ghsa-mj87-hwqh-73pj |
5.3 (3.1)
|
python-multipart affected by Denial of Service via large multipart preamble or epilogue data | 2026-04-15T19:45:44Z | 2026-04-15T19:45:44Z |
| ghsa-mvvv-v22x-xqwp |
6.4 (4.0)
|
NocoBase has SSRF in Workflow HTTP Request and Custom Request Plugins | 2026-04-15T19:43:50Z | 2026-04-15T19:43:50Z |
| ghsa-xp4f-g2cm-rhg7 |
6.9 (4.0)
|
PocketMine-MP has LogDoS by many junk properties in client data JWT in LoginPacket | 2026-04-15T19:43:33Z | 2026-04-15T19:43:33Z |
| ghsa-jj6c-8h6c-hppx |
4.8 (4.0)
|
pypdf has long runtimes for wrong size values in cross-reference and object streams | 2026-04-15T19:43:09Z | 2026-04-15T19:43:09Z |
| ghsa-g24f-mgc3-jwwc |
7.6 (3.1)
|
OpenRemote has XXE in Velbus Asset Import | 2026-04-15T19:42:23Z | 2026-04-15T21:17:52Z |
| ghsa-xphw-cqx3-667j |
7.3 (3.1)
|
thin-vec: Use-After-Free and Double Free in IntoIter::drop When Element Drop Panics | 2026-04-15T19:24:54Z | 2026-04-15T19:24:54Z |
| ghsa-247c-9743-5963 |
7.5 (3.1)
|
Fastify has a Body Schema Validation Bypass via Leading Space in Content-Type Header | 2026-04-15T19:24:41Z | 2026-04-15T19:24:41Z |
| ghsa-pxq7-h93f-9jrg |
8.2 (3.1)
|
OAuth2 Proxy has an Authentication Bypass via Fragment Confusion in skip_auth_routes and skip_auth_regex | 2026-04-15T19:24:13Z | 2026-04-15T19:24:13Z |
| ghsa-c5c4-8r6x-56w3 |
6.8 (3.1)
|
OAuth2 Proxy has an Authorization Bypass in Email Domain Validation via Malformed Multi-@ Email Claims | 2026-04-15T19:23:54Z | 2026-04-15T19:23:54Z |
| ghsa-7x63-xv5r-3p2x |
9.1 (3.1)
|
OAuth2 Proxy has an Authentication Bypass via X-Forwarded-Uri Header Spoofing | 2026-04-15T19:21:06Z | 2026-04-15T19:21:06Z |
| ghsa-xmj9-7625-f634 |
6.3 (4.0)
|
Data Sharing Framework has an Inverted Time Comparison in OIDC JWKS and Token Cache | 2026-04-15T19:19:50Z | 2026-04-15T19:19:50Z |
| ghsa-gj7p-595x-qwf5 |
6.8 (4.0)
|
Data Sharing Framework is Missing Session Timeout for OIDC Sessions | 2026-04-15T19:19:43Z | 2026-04-16T21:41:52Z |
| ghsa-43fj-qp3h-hrh5 |
6.9 (4.0)
|
Sync-in Server has Username Enumeration via Timing Attack | 2026-04-15T18:57:50Z | 2026-04-15T18:57:50Z |
| ghsa-w8qq-gx58-7qgx |
7.5 (3.1)
|
Incorrect access control in the config.php component of Slah v1.5.0 and below allows unauthenticate… | 2026-04-15T18:31:58Z | 2026-04-15T21:30:17Z |
| ghsa-rqjr-7g3f-hx8c |
5.9 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-04-15T18:31:58Z | 2026-04-15T18:31:58Z |
| ghsa-rpqw-j963-73gh |
5.5 (3.1)
|
A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent could allow an authenticated, loc… | 2026-04-15T18:31:58Z | 2026-04-15T18:31:58Z |
| ghsa-m5qg-w79h-6284 |
7.5 (3.1)
|
An issue in the file handling logic of the component download.php of SAC-NFe v2.0.02 allows attacke… | 2026-04-15T18:31:58Z | 2026-04-15T21:30:17Z |
| ghsa-j452-xhg8-qg39 |
6.5 (3.1)
|
Mafintosh's protocol-buffers-schema is vulnerable to prototype pollution | 2026-04-15T18:31:58Z | 2026-04-16T21:33:53Z |
| ghsa-hwpg-c95h-3gc7 |
7.5 (3.1)
|
Missing Authorization vulnerability in Plisio Accept Cryptocurrencies with Plisio allows Exploiting… | 2026-04-15T18:31:58Z | 2026-04-15T18:31:58Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-715 |
|
TensorFlow is an end-to-end open source platform for machine learning. The reference impl… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:30.233507Z |
| pysec-2021-714 |
|
TensorFlow is an end-to-end open source platform for machine learning. The optimized impl… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:30.034082Z |
| pysec-2021-713 |
|
TensorFlow is an end-to-end open source platform for machine learning. The `Prepare` step… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:29.871064Z |
| pysec-2021-712 |
|
TensorFlow is an end-to-end open source platform for machine learning. Optimized pooling … | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:29.712146Z |
| pysec-2021-711 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite computa… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:29.363788Z |
| pysec-2021-710 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:29.199701Z |
| pysec-2021-709 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:29.040868Z |
| pysec-2021-708 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:28.875018Z |
| pysec-2021-707 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:28.711775Z |
| pysec-2021-706 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:28.532911Z |
| pysec-2021-705 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:28.365362Z |
| pysec-2021-704 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:28.203971Z |
| pysec-2021-703 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:28.044558Z |
| pysec-2021-702 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:27.875893Z |
| pysec-2021-701 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:27.716876Z |
| pysec-2021-700 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:27.544548Z |
| pysec-2021-699 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:27.365628Z |
| pysec-2021-698 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:27.168452Z |
| pysec-2021-697 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:27.008570Z |
| pysec-2021-696 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:26.840571Z |
| pysec-2021-695 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:26.658454Z |
| pysec-2021-694 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:26.499647Z |
| pysec-2021-693 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:26.340630Z |
| pysec-2021-692 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can wr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:26.175336Z |
| pysec-2021-691 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:26.009362Z |
| pysec-2021-690 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:25.817127Z |
| pysec-2021-689 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:25.642142Z |
| pysec-2021-688 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:25.478301Z |
| pysec-2021-687 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:25.291953Z |
| pysec-2021-686 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:25.121902Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1444 | Malicious code in graphql-request-dom (npm) | 2026-03-16T00:37:29Z | 2026-03-23T05:16:27Z |
| mal-2026-1442 | Malicious code in bignumber-tool.js (npm) | 2026-03-16T00:37:29Z | 2026-03-23T05:16:25Z |
| mal-2026-1447 | Malicious code in testpoc01 (npm) | 2026-03-16T00:30:13Z | 2026-03-23T05:16:31Z |
| mal-2026-1446 | Malicious code in omhcsilence-bails (npm) | 2026-03-16T00:25:13Z | 2026-03-23T05:16:29Z |
| mal-2026-1439 | Malicious code in @omhc/libsignal-node (npm) | 2026-03-16T00:25:13Z | 2026-03-23T05:16:24Z |
| mal-2026-1449 | Malicious code in vtimmmmmm-test (npm) | 2026-03-16T00:24:38Z | 2026-03-23T05:16:31Z |
| mal-2026-1440 | Malicious code in @vtim/xss-poc (npm) | 2026-03-16T00:24:38Z | 2026-03-23T05:16:25Z |
| mal-2026-1445 | Malicious code in nest-moralis (npm) | 2026-03-16T00:17:07Z | 2026-03-23T05:16:29Z |
| mal-2026-1448 | Malicious code in up2-daemon (npm) | 2026-03-16T00:04:33Z | 2026-03-23T05:16:31Z |
| mal-2026-1438 | Malicious code in pymnemonic (PyPI) | 2026-03-15T22:01:13Z | 2026-03-15T22:01:13Z |
| mal-2026-1436 | Malicious code in do-not-install-this-package-004 (PyPI) | 2026-03-15T17:05:57Z | 2026-03-15T17:05:57Z |
| mal-2026-1437 | Malicious code in flowpeek (PyPI) | 2026-03-15T17:02:41Z | 2026-03-15T17:02:41Z |
| mal-2026-1433 | Malicious code in kvstore-pb2-grpc (PyPI) | 2026-03-15T09:36:30Z | 2026-03-15T09:36:30Z |
| mal-2026-1432 | Malicious code in dgl-cu117 (PyPI) | 2026-03-15T09:34:51Z | 2026-03-15T09:34:51Z |
| mal-2026-1435 | Malicious code in python-anchor (PyPI) | 2026-03-15T09:34:12Z | 2026-03-15T09:34:12Z |
| mal-2026-1434 | Malicious code in my-super-lib (PyPI) | 2026-03-15T09:33:22Z | 2026-03-15T09:33:22Z |
| mal-2026-1431 | Malicious code in ariadne-federation (PyPI) | 2026-03-15T09:29:37Z | 2026-03-15T09:29:37Z |
| mal-2026-1426 | Malicious code in @3stripes/common (npm) | 2026-03-15T05:46:19Z | 2026-03-23T05:16:24Z |
| mal-2026-1427 | Malicious code in @3stripes/helpers (npm) | 2026-03-15T05:45:45Z | 2026-03-23T05:16:24Z |
| mal-2026-1425 | Malicious code in @3stripes/auth (npm) | 2026-03-15T05:45:45Z | 2026-03-23T05:16:24Z |
| mal-2026-1424 | Malicious code in @3stripes/api-client (npm) | 2026-03-15T05:45:44Z | 2026-03-23T05:16:24Z |
| mal-2026-1430 | Malicious code in @3stripes/utils (npm) | 2026-03-15T05:45:43Z | 2026-03-23T05:16:24Z |
| mal-2026-1429 | Malicious code in @3stripes/ui (npm) | 2026-03-15T05:45:42Z | 2026-03-23T05:16:24Z |
| mal-2026-1428 | Malicious code in @3stripes/lib (npm) | 2026-03-15T05:45:42Z | 2026-03-23T05:16:24Z |
| mal-2026-1454 | Malicious code in n8n-nodes-text-helpers (npm) | 2026-03-15T01:58:08Z | 2026-03-23T05:16:29Z |
| mal-2026-1457 | Malicious code in tracking-service-config (npm) | 2026-03-14T19:12:09Z | 2026-03-23T05:16:31Z |
| mal-2026-1423 | Malicious code in test_pkg_forppe (npm) | 2026-03-14T07:17:39Z | 2026-03-25T00:55:57Z |
| mal-2026-1455 | Malicious code in native_dep (npm) | 2026-03-14T06:20:46Z | 2026-03-27T00:59:35Z |
| mal-2026-1421 | Malicious code in devlino (npm) | 2026-03-13T20:35:45Z | 2026-03-23T05:16:26Z |
| mal-2026-1422 | Malicious code in fastapi-middleware-cors (PyPI) | 2026-03-13T20:20:02Z | 2026-03-13T20:20:02Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1650 | Sitecore Experience Manager: Mehrere Schwachstellen | 2025-07-27T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1649 | WinRAR: Schwachstelle ermöglicht Codeausführung | 2025-07-27T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1648 | IBM Cognos Analytics (Python JSON Logger): Schwachstelle ermöglicht Codeausführung | 2025-07-27T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1647 | binutils: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-27T22:00:00.000+00:00 | 2025-12-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1646 | Red Hat Enterprise Linux (nodejs, perl): Mehrere Schwachstellen | 2025-07-27T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1645 | JHipster: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2025-07-27T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1644 | QEMU: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-07-24T22:00:00.000+00:00 | 2025-08-24T22:00:00.000+00:00 |
| wid-sec-w-2025-1643 | xwiki: Mehrere Schwachstelle ermöglicht eine SQL Injection | 2025-07-24T22:00:00.000+00:00 | 2025-07-28T22:00:00.000+00:00 |
| wid-sec-w-2025-1642 | IBM MQ: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-07-24T22:00:00.000+00:00 | 2025-07-24T22:00:00.000+00:00 |
| wid-sec-w-2025-1641 | Redis: Schwachstelle ermöglicht Denial of Service | 2025-07-24T22:00:00.000+00:00 | 2025-07-24T22:00:00.000+00:00 |
| wid-sec-w-2025-1640 | libssh: Schwachstelle ermöglicht Denial of Service | 2025-07-24T22:00:00.000+00:00 | 2025-12-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1639 | Keycloak (Quarkus): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-23T22:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1638 | Nvidia Treiber: Mehrere Schwachstellen | 2025-07-23T22:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-1637 | GNU libc: Schwachstelle ermöglicht unspezifischen Angriff | 2025-07-23T22:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1636 | Apache HTTP Server: Schwachstelle ermöglicht umgehen von Sicherheitsvorkehrungen | 2025-07-23T22:00:00.000+00:00 | 2025-11-30T23:00:00.000+00:00 |
| wid-sec-w-2025-1635 | Poly Clariti Manager: Mehrere Schwachstellen | 2025-07-23T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1634 | Harbor: Schwachstelle ermöglicht Cross-Site Scripting | 2025-07-23T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1633 | ABB AC-500: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-23T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1632 | SolarWinds Platform: Schwachstelle ermöglicht Privilegieneskalation | 2025-07-23T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1631 | Drupal (COOKiES Consent Management): Schwachstelle ermöglicht Cross-Site Scripting | 2025-07-23T22:00:00.000+00:00 | 2025-08-17T22:00:00.000+00:00 |
| wid-sec-w-2025-1630 | vBulletin Connect: Schwachstelle ermöglicht Denial of Service | 2025-07-23T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1629 | SonicWall SMA 100 Serie: Mehrere Schwachstellen | 2025-07-23T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1628 | Mitel MiCollab (Suite Applications Services): Schwachstelle ermöglicht SQL-Injection | 2025-07-23T22:00:00.000+00:00 | 2025-08-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1627 | GitLab: Mehrere Schwachstellen | 2025-07-22T22:00:00.000+00:00 | 2025-07-24T22:00:00.000+00:00 |
| wid-sec-w-2025-1626 | Devolutions Server: Mehrere Schwachstellen | 2025-07-22T22:00:00.000+00:00 | 2025-07-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1625 | Mattermost Server und Plugins: Mehrere Schwachstellen | 2025-07-22T22:00:00.000+00:00 | 2025-08-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1624 | Arista EOS: Mehrere Schwachstellen | 2025-07-22T22:00:00.000+00:00 | 2025-08-25T22:00:00.000+00:00 |
| wid-sec-w-2025-1623 | Mozilla Firefox , Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2025-07-22T22:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-1622 | Google Chrome / Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-07-22T22:00:00.000+00:00 | 2025-08-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1621 | TYPO3 Extensions: Mehrere Schwachstellen | 2025-07-21T22:00:00.000+00:00 | 2025-07-22T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-228-07 | Sequi PortBloque S | 2022-08-16T00:00:00.000000Z | 2022-08-16T00:00:00.000000Z |
| icsa-22-228-06 | Emerson Proficy Machine Edition | 2022-08-16T00:00:00.000000Z | 2022-08-16T00:00:00.000000Z |
| icsa-22-228-05 | B&R Industrial Automation Automation Studio 4 | 2022-08-16T00:00:00.000000Z | 2022-08-16T00:00:00.000000Z |
| icsa-22-228-04 | Softing Secure Integration Server | 2022-08-16T00:00:00.000000Z | 2022-08-16T00:00:00.000000Z |
| icsa-22-228-03 | Delta Industrial Automation DRAS | 2022-08-16T00:00:00.000000Z | 2022-08-16T00:00:00.000000Z |
| icsa-22-228-01 | Yokogawa CENTUM Controller FCS | 2022-08-16T00:00:00.000000Z | 2022-08-16T00:00:00.000000Z |
| icsa-22-223-06 | Siemens SICAM TOOLBOX II | 2022-08-11T00:00:00.000000Z | 2022-08-11T00:00:00.000000Z |
| icsa-22-223-04 | Emerson ROC800, ROC800L and DL8000 | 2022-08-11T00:00:00.000000Z | 2022-08-11T00:00:00.000000Z |
| icsa-22-223-03 | Schneider Electric EcoStruxure, EcoStruxure Process Expert, SCADAPack RemoteConnect for x70 | 2022-08-11T00:00:00.000000Z | 2022-08-11T00:00:00.000000Z |
| icsa-22-223-07 | Siemens SCALANCE | 2022-08-09T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-22-223-05 | Siemens SICAM A8000 Web Server Module | 2022-08-09T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-223-02 | Siemens Teamcenter | 2022-08-09T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-223-01 | Siemens Simcenter STAR-CCM+ | 2022-08-09T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-221-03 | Emerson OpenBSI | 2022-08-09T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-221-02 | Emerson ControlWave | 2022-08-09T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-216-01 | Digi ConnectPort X2D | 2022-08-04T00:00:00.000000Z | 2022-08-04T00:00:00.000000Z |
| icsa-22-209-01 | Rockwell Products Impacted by Chromium Type Confusion | 2022-07-28T00:00:00.000000Z | 2022-07-28T00:00:00.000000Z |
| icsa-22-207-02 | Honeywell Safety Manager | 2022-07-26T06:00:00.000000Z | 2022-07-26T06:00:00.000000Z |
| icsa-22-202-04 | ICONICS Suite and Mitsubishi Electric MC Works64 Products (Update C) | 2022-07-26T06:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-22-207-04 | MOXA NPort 5110 | 2022-07-26T00:00:00.000000Z | 2022-07-26T00:00:00.000000Z |
| icsa-22-207-03 | Honeywell Saia Burgess PG5 PCD | 2022-07-26T00:00:00.000000Z | 2022-07-26T00:00:00.000000Z |
| icsa-22-207-01 | Inductive Automation Ignition | 2022-07-26T00:00:00.000000Z | 2022-08-04T00:00:00.000000Z |
| icsa-22-202-05 | AutomationDirect Stride Field I/O | 2022-07-21T00:00:00.000000Z | 2022-07-21T00:00:00.000000Z |
| icsa-22-202-03 | Rockwell Automation ISaGRAF Workbench | 2022-07-21T00:00:00.000000Z | 2022-07-21T00:00:00.000000Z |
| icsa-22-202-02 | Johnson Controls Metasys ADS, ADX, OAS | 2022-07-21T00:00:00.000000Z | 2022-07-21T00:00:00.000000Z |
| icsa-22-202-01 | ABB Drive Composer, Automation Builder, Mint Workbench | 2022-07-21T00:00:00.000000Z | 2022-07-21T00:00:00.000000Z |
| icsa-22-200-01 | MiCODUS MV720 GPS tracker | 2022-07-19T00:00:00.000000Z | 2022-09-20T00:00:00.000000Z |
| icsa-22-195-18 | Siemens RUGGEDCOM ROS Code Injection | 2022-07-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-22-195-17 | Siemens Opcenter Quality | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-195-16 | Siemens EN100 Ethernet Module | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-wlc-gas-dos-8fse3awh | Cisco Wireless LAN Controller 802.11 Generic Advertisement Service Denial of Service Vulnerability | 2020-04-15T16:00:00+00:00 | 2020-04-20T15:38:49+00:00 |
| cisco-sa-wlc-capwap-dos-y2sd9uew | Cisco Wireless LAN Controller CAPWAP Denial of Service Vulnerability | 2020-04-15T16:00:00+00:00 | 2020-04-20T15:41:54+00:00 |
| cisco-sa-webex-player-q7rtgvby | Cisco Webex Network Recording Player and Cisco Webex Player Arbitrary Code Execution Vulnerability | 2020-04-15T16:00:00+00:00 | 2020-04-23T16:14:34+00:00 |
| cisco-sa-voip-phones-rce-dos-rb6eerxs | Cisco IP Phones Web Server Remote Code Execution and Denial of Service Vulnerability | 2020-04-15T16:00:00+00:00 | 2020-04-16T15:57:25+00:00 |
| cisco-sa-ucsd-mult-vulns-unfpdw4e | Multiple Vulnerabilities in Cisco UCS Director and Cisco UCS Director Express for Big Data | 2020-04-15T16:00:00+00:00 | 2020-04-17T19:27:24+00:00 |
| cisco-sa-mob-exp-csrf-b8tfec24 | Cisco Mobility Express Software Cross-Site Request Forgery Vulnerability | 2020-04-15T16:00:00+00:00 | 2020-04-20T15:36:14+00:00 |
| cisco-sa-iot-coap-dos-wtbu6ytq | Cisco IoT Field Network Director Denial of Service Vulnerability | 2020-04-15T16:00:00+00:00 | 2020-04-15T16:00:00+00:00 |
| cisco-sa-cucm-taps-path-trav-pfsfo93r | Cisco Unified Communications Manager Path Traversal Vulnerability | 2020-04-15T16:00:00+00:00 | 2020-04-15T16:00:00+00:00 |
| cisco-sa-airo-wpa-dos-5zls6esz | Cisco Aironet Series Access Points Client Packet Processing Denial of Service Vulnerability | 2020-04-15T16:00:00+00:00 | 2020-04-15T16:00:00+00:00 |
| cisco-sa-sdwpresc-ysjgve9 | Cisco SD-WAN Solution Privilege Escalation Vulnerability | 2020-03-18T16:00:00+00:00 | 2021-06-23T18:09:31+00:00 |
| cisco-sa-sdwclici-cvrqph9v | Cisco SD-WAN Solution Command Injection Vulnerability | 2020-03-18T16:00:00+00:00 | 2020-03-18T16:00:00+00:00 |
| cisco-sa-sdwanbo-qkcabns2 | Cisco SD-WAN Solution Buffer Overflow Vulnerability | 2020-03-18T16:00:00+00:00 | 2021-06-23T18:22:48+00:00 |
| cisco-sa-20200318-vmanage-xss | Cisco SD-WAN Solution vManage Stored Cross-Site Scripting Vulnerability | 2020-03-18T16:00:00+00:00 | 2020-03-18T16:22:51+00:00 |
| cisco-sa-20200318-vmanage-cypher-inject | Cisco SD-WAN Solution vManage SQL Injection Vulnerability | 2020-03-18T16:00:00+00:00 | 2020-03-18T16:00:00+00:00 |
| cisco-sa-webex-info-disc-ohqg982 | Cisco Webex Meetings Client for MacOS Information Disclosure Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-tms-xss-4vxkdlo | Cisco TelePresence Management Suite Stored Cross-Site Scripting Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-rphy-cmdinject-dpejetgf | Cisco Remote PHY Device Software Command Injection Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-proximity-ssl-cert-gbbu3rb | Cisco Intelligent Proximity SSL Certificate Validation Vulnerability | 2020-03-04T16:00:00+00:00 | 2021-07-15T14:50:11+00:00 |
| cisco-sa-prime-collab-xss-rjrce9n7 | Cisco Prime Collaboration Provisioning Cross-Site Scripting Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-prim-collab-disclo-fanx4dkb | Cisco Prime Collaboration Provisioning Information Disclosure Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-ise-xss-br7nedjg | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-iosxr-ipsec-dos-q8upx6m | Cisco IOS XR Software IPsec Packet Processor Denial of Service Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-esa-resource-exhaust-d7rqahnd | Cisco Email Security Appliance Uncontrolled Resource Exhaustion Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-05T15:50:15+00:00 |
| cisco-sa-cpnr-csrf-wwtrdkyl | Cisco Prime Network Registrar Cross-Site Request Forgery Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-cont-sec-gui-dos-nj625dxb | Cisco ESA, Cisco WSA, and Cisco SMA GUI Denial of Service Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-20200304-webex-player | Cisco Webex Network Recording Player and Cisco Webex Player Arbitrary Code Execution Vulnerabilities | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-20200226-wi-fi-info-disclosure | Wi-Fi Protected Network and Wi-Fi Protected Network 2 Information Disclosure Vulnerability | 2020-02-27T00:00:00+00:00 | 2020-04-28T22:24:15+00:00 |
| cisco-sa-20200226-ucs-cli-cmdinj | Cisco UCS Manager Software Local Management CLI Command Injection Vulnerability | 2020-02-26T16:00:00+00:00 | 2020-02-26T16:00:00+00:00 |
| cisco-sa-20200226-nxos-bgpmd5 | Cisco NX-OS Software Border Gateway Protocol MD5 Authentication Bypass Vulnerability | 2020-02-26T16:00:00+00:00 | 2020-02-26T16:00:00+00:00 |
| cisco-sa-20200226-nxos-arp | Cisco NX-OS Software Anycast Gateway Invalid ARP Vulnerability | 2020-02-26T16:00:00+00:00 | 2020-02-26T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-40268 | cifs: client: fix memory leak in smb3_fs_context_parse_param | 2025-12-02T00:00:00.000Z | 2025-12-16T14:37:14.000Z |
| msrc_cve-2025-40266 | KVM: arm64: Check the untrusted offset in FF-A memory share | 2025-12-02T00:00:00.000Z | 2026-01-07T14:37:17.000Z |
| msrc_cve-2025-40264 | be2net: pass wrb_params in case of OS2BMC | 2025-12-02T00:00:00.000Z | 2026-01-07T14:36:56.000Z |
| msrc_cve-2025-40263 | Input: cros_ec_keyb - fix an invalid memory access | 2025-12-02T00:00:00.000Z | 2025-12-09T01:39:15.000Z |
| msrc_cve-2025-40262 | Input: imx_sc_key - fix memory corruption on unload | 2025-12-02T00:00:00.000Z | 2025-12-09T01:38:33.000Z |
| msrc_cve-2025-40261 | nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:36:10.000Z |
| msrc_cve-2025-40259 | scsi: sg: Do not sleep in atomic context | 2025-12-02T00:00:00.000Z | 2026-01-07T14:36:36.000Z |
| msrc_cve-2025-40258 | mptcp: fix race condition in mptcp_schedule_work() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:36:23.000Z |
| msrc_cve-2025-40257 | mptcp: fix a race in mptcp_pm_del_add_timer() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:36:16.000Z |
| msrc_cve-2025-40254 | net: openvswitch: remove never-working support for setting nsh fields | 2025-12-02T00:00:00.000Z | 2026-01-07T14:36:30.000Z |
| msrc_cve-2025-40253 | s390/ctcm: Fix double-kfree | 2025-12-02T00:00:00.000Z | 2025-12-09T01:39:05.000Z |
| msrc_cve-2025-40252 | net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:36:43.000Z |
| msrc_cve-2025-40251 | devlink: rate: Unset parent pointer in devl_rate_nodes_destroy | 2025-12-02T00:00:00.000Z | 2026-03-31T15:16:43.000Z |
| msrc_cve-2025-40250 | net/mlx5: Clean up only new IRQ glue on request_irq() failure | 2025-12-02T00:00:00.000Z | 2026-01-07T14:37:02.000Z |
| msrc_cve-2025-40248 | vsock: Ignore signal/timeout on connect() if already established | 2025-12-02T00:00:00.000Z | 2026-01-07T14:36:49.000Z |
| msrc_cve-2025-40247 | drm/msm: Fix pgtable prealloc error path | 2025-12-02T00:00:00.000Z | 2025-12-07T01:45:55.000Z |
| msrc_cve-2025-40245 | nios2: ensure that memblock.current_limit is set when setting pfn limits | 2025-12-02T00:00:00.000Z | 2025-12-09T01:38:43.000Z |
| msrc_cve-2025-40244 | hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent() | 2025-12-02T00:00:00.000Z | 2025-12-09T01:38:49.000Z |
| msrc_cve-2025-40243 | hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits() | 2025-12-02T00:00:00.000Z | 2025-12-09T01:39:00.000Z |
| msrc_cve-2025-40242 | gfs2: Fix unlikely race in gdlm_put_lock | 2025-12-02T00:00:00.000Z | 2025-12-09T01:38:38.000Z |
| msrc_cve-2025-40240 | sctp: avoid NULL dereference when chunk data buffer is missing | 2025-12-02T00:00:00.000Z | 2025-12-07T01:43:22.000Z |
| msrc_cve-2025-40233 | ocfs2: clear extent cache after moving/defragmenting extents | 2025-12-02T00:00:00.000Z | 2025-12-09T01:39:10.000Z |
| msrc_cve-2025-40223 | most: usb: Fix use-after-free in hdm_disconnect | 2025-12-02T00:00:00.000Z | 2025-12-09T01:38:54.000Z |
| msrc_cve-2025-40220 | fuse: fix livelock in synchronous file put from fuseblk workers | 2025-12-02T00:00:00.000Z | 2025-12-07T01:41:54.000Z |
| msrc_cve-2025-40219 | PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV | 2025-12-02T00:00:00.000Z | 2025-12-07T01:42:09.000Z |
| msrc_cve-2025-40218 | mm/damon/vaddr: do not repeat pte_offset_map_lock() until success | 2025-12-02T00:00:00.000Z | 2025-12-09T01:37:53.000Z |
| msrc_cve-2025-40217 | pidfs: validate extensible ioctls | 2025-12-02T00:00:00.000Z | 2025-12-09T01:37:58.000Z |
| msrc_cve-2025-40215 | xfrm: delete x->tunnel as we delete x | 2025-12-02T00:00:00.000Z | 2026-02-21T04:21:50.000Z |
| msrc_cve-2025-37731 | Elasticsearch Improper Authentication | 2025-12-02T00:00:00.000Z | 2025-12-16T01:01:28.000Z |
| msrc_cve-2025-34468 | libcoap Stack-Based Buffer Overflow in Address Resolution DoS or Potential RCE | 2025-12-02T00:00:00.000Z | 2026-02-21T04:00:03.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15017-1 | govulncheck-vulndb-0.0.20250422T181640-1.1 on GA media | 2025-04-23T00:00:00Z | 2025-04-23T00:00:00Z |
| opensuse-su-2025:15016-1 | mcabber-1.1.2-1.1 on GA media | 2025-04-22T00:00:00Z | 2025-04-22T00:00:00Z |
| opensuse-su-2025:15015-1 | libsoup-3_0-0-3.6.5-2.1 on GA media | 2025-04-22T00:00:00Z | 2025-04-22T00:00:00Z |
| opensuse-su-2025:15014-1 | govulncheck-vulndb-0.0.20250422T152923-1.1 on GA media | 2025-04-22T00:00:00Z | 2025-04-22T00:00:00Z |
| opensuse-su-2025:15013-1 | gopass-1.15.16-1.1 on GA media | 2025-04-22T00:00:00Z | 2025-04-22T00:00:00Z |
| opensuse-su-2025:15012-1 | ffmpeg-6-6.1.2-4.1 on GA media | 2025-04-22T00:00:00Z | 2025-04-22T00:00:00Z |
| opensuse-su-2025:15011-1 | epiphany-48.1-1.1 on GA media | 2025-04-22T00:00:00Z | 2025-04-22T00:00:00Z |
| opensuse-su-2025:0133-1 | Security update for chromium | 2025-04-20T18:00:46Z | 2025-04-20T18:00:46Z |
| opensuse-su-2025:0131-1 | Security update for coredns | 2025-04-19T22:01:42Z | 2025-04-19T22:01:42Z |
| opensuse-su-2025:15010-1 | ffmpeg-6-6.1.2-3.1 on GA media | 2025-04-18T00:00:00Z | 2025-04-18T00:00:00Z |
| opensuse-su-2025:0129-1 | Security update for rubygem-rexml | 2025-04-17T04:01:39Z | 2025-04-17T04:01:39Z |
| opensuse-su-2025:15009-1 | libmozjs-128-0-128.9.0-2.1 on GA media | 2025-04-17T00:00:00Z | 2025-04-17T00:00:00Z |
| opensuse-su-2025:15008-1 | govulncheck-vulndb-0.0.20250416T165455-1.1 on GA media | 2025-04-17T00:00:00Z | 2025-04-17T00:00:00Z |
| opensuse-su-2025:15007-1 | gio-branding-upstream-2.84.1-2.1 on GA media | 2025-04-17T00:00:00Z | 2025-04-17T00:00:00Z |
| opensuse-su-2025:15006-1 | argocd-cli-2.14.10-1.1 on GA media | 2025-04-17T00:00:00Z | 2025-04-17T00:00:00Z |
| opensuse-su-2025:15005-1 | MozillaFirefox-137.0.2-1.1 on GA media | 2025-04-17T00:00:00Z | 2025-04-17T00:00:00Z |
| opensuse-su-2025:0123-1 | Security update for perl-Data-Entropy | 2025-04-16T14:02:07Z | 2025-04-16T14:02:07Z |
| opensuse-su-2025:15004-1 | subfinder-2.7.0-2.1 on GA media | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| opensuse-su-2025:15003-1 | perl-32bit-5.40.2-1.1 on GA media | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| opensuse-su-2025:15002-1 | libmozjs-115-0-115.15.0-5.1 on GA media | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| opensuse-su-2025:15001-1 | forgejo-10.0.3-2.1 on GA media | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| opensuse-su-2025:15000-1 | MozillaThunderbird-128.9.2-1.1 on GA media | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| opensuse-su-2025:14999-1 | python-lxml-doc-5.3.2-1.1 on GA media | 2025-04-15T00:00:00Z | 2025-04-15T00:00:00Z |
| opensuse-su-2025:14998-1 | python311-aiohttp-3.11.16-1.1 on GA media | 2025-04-15T00:00:00Z | 2025-04-15T00:00:00Z |
| opensuse-su-2025:14997-1 | oci-cli-3.54.1-1.1 on GA media | 2025-04-15T00:00:00Z | 2025-04-15T00:00:00Z |
| opensuse-su-2025:14996-1 | hauler-1.2.2-1.1 on GA media | 2025-04-15T00:00:00Z | 2025-04-15T00:00:00Z |
| opensuse-su-2025:14995-1 | govulncheck-vulndb-0.0.20250410T162706-1.1 on GA media | 2025-04-15T00:00:00Z | 2025-04-15T00:00:00Z |
| opensuse-su-2025:14994-1 | gitoxide-0.42.0-1.1 on GA media | 2025-04-15T00:00:00Z | 2025-04-15T00:00:00Z |
| opensuse-su-2025:14993-1 | GraphicsMagick-1.3.45-3.1 on GA media | 2025-04-15T00:00:00Z | 2025-04-15T00:00:00Z |
| opensuse-su-2025:14992-1 | libvarnishapi3-7.7.0-1.1 on GA media | 2025-04-14T00:00:00Z | 2025-04-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:0261 | Red Hat Security Advisory: Red Hat Developer Hub 1.7.4 release. | 2026-01-07T18:34:52+00:00 | 2026-04-14T09:16:28+00:00 |
| rhsa-2026:0251 | Red Hat Security Advisory: libpng security update | 2026-01-07T16:09:27+00:00 | 2026-04-13T20:00:25+00:00 |
| rhsa-2026:0247 | Red Hat Security Advisory: mariadb:10.11 security update | 2026-01-07T15:09:41+00:00 | 2026-04-14T09:46:00+00:00 |
| rhsa-2026:0250 | Red Hat Security Advisory: gimp:2.8 security update | 2026-01-07T15:08:46+00:00 | 2026-03-18T03:15:11+00:00 |
| rhsa-2026:0246 | Red Hat Security Advisory: grafana security update | 2026-01-07T14:46:41+00:00 | 2026-04-14T07:57:45+00:00 |
| rhsa-2026:0245 | Red Hat Security Advisory: grafana security update | 2026-01-07T14:45:51+00:00 | 2026-04-14T07:57:45+00:00 |
| rhsa-2026:0243 | Red Hat Security Advisory: grafana security update | 2026-01-07T14:43:26+00:00 | 2026-04-14T07:57:45+00:00 |
| rhsa-2026:0244 | Red Hat Security Advisory: grafana security update | 2026-01-07T14:38:56+00:00 | 2026-04-14T07:57:45+00:00 |
| rhsa-2026:0241 | Red Hat Security Advisory: libpng security update | 2026-01-07T14:21:46+00:00 | 2026-04-13T20:00:24+00:00 |
| rhsa-2026:0238 | Red Hat Security Advisory: libpng security update | 2026-01-07T13:43:11+00:00 | 2026-04-13T20:00:23+00:00 |
| rhsa-2026:0237 | Red Hat Security Advisory: libpng security update | 2026-01-07T13:29:16+00:00 | 2026-04-13T20:00:22+00:00 |
| rhsa-2026:0233 | Red Hat Security Advisory: mariadb:10.5 security update | 2026-01-07T13:18:51+00:00 | 2026-04-13T20:00:22+00:00 |
| rhsa-2026:0232 | Red Hat Security Advisory: mariadb:10.11 security update | 2026-01-07T13:18:43+00:00 | 2026-04-13T20:00:24+00:00 |
| rhsa-2026:0234 | Red Hat Security Advisory: libpng security update | 2026-01-07T13:03:31+00:00 | 2026-04-13T20:00:22+00:00 |
| rhsa-2026:0210 | Red Hat Security Advisory: libpng security update | 2026-01-07T13:02:56+00:00 | 2026-04-13T20:00:19+00:00 |
| rhsa-2026:0211 | Red Hat Security Advisory: libpng security update | 2026-01-07T12:57:50+00:00 | 2026-04-13T20:00:20+00:00 |
| rhsa-2026:0226 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-07T12:46:50+00:00 | 2026-04-14T07:57:43+00:00 |
| rhsa-2026:0225 | Red Hat Security Advisory: mariadb:10.3 security update | 2026-01-07T11:52:55+00:00 | 2026-04-13T20:00:21+00:00 |
| rhsa-2026:0227 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-07T11:32:40+00:00 | 2026-04-14T07:57:44+00:00 |
| rhsa-2026:0216 | Red Hat Security Advisory: libpng security update | 2026-01-07T11:23:35+00:00 | 2026-04-13T20:00:20+00:00 |
| rhsa-2026:0224 | Red Hat Security Advisory: git-lfs security update | 2026-01-07T10:20:45+00:00 | 2026-03-18T03:15:30+00:00 |
| rhsa-2026:0212 | Red Hat Security Advisory: libpng security update | 2026-01-07T09:24:35+00:00 | 2026-04-13T20:00:20+00:00 |
| rhsa-2025:23113 | Red Hat Security Advisory: OpenShift Container Platform 4.15.60 bug fix and security update | 2026-01-07T07:16:55+00:00 | 2026-04-14T02:01:52+00:00 |
| rhsa-2026:0204 | Red Hat Security Advisory: git-lfs security update | 2026-01-07T05:45:24+00:00 | 2026-03-18T03:14:56+00:00 |
| rhsa-2026:0203 | Red Hat Security Advisory: git-lfs security update | 2026-01-07T05:31:09+00:00 | 2026-03-18T03:14:56+00:00 |
| rhsa-2026:0199 | Red Hat Security Advisory: git-lfs security update | 2026-01-07T04:46:49+00:00 | 2026-03-18T03:14:56+00:00 |
| rhsa-2026:0173 | Red Hat Security Advisory: kernel security update | 2026-01-07T01:07:25+00:00 | 2026-04-13T11:13:52+00:00 |
| rhsa-2026:0171 | Red Hat Security Advisory: httpd security update | 2026-01-06T21:28:14+00:00 | 2026-04-08T16:37:45+00:00 |
| rhsa-2026:0141 | Red Hat Security Advisory: httpd security update | 2026-01-06T17:34:13+00:00 | 2026-04-08T16:37:45+00:00 |
| rhsa-2026:0140 | Red Hat Security Advisory: grafana-pcp security update | 2026-01-06T17:13:28+00:00 | 2026-03-18T03:15:28+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20257-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:55Z | 2026-01-19T15:31:55Z |
| suse-su-2026:20256-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:55Z | 2026-01-19T15:31:55Z |
| suse-su-2026:20255-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:31:55Z | 2026-01-19T15:31:55Z |
| suse-su-2026:20397-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:28:20Z | 2026-01-19T15:28:20Z |
| suse-su-2026:20396-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:28:20Z | 2026-01-19T15:28:20Z |
| suse-su-2026:20395-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:28:20Z | 2026-01-19T15:28:20Z |
| suse-su-2026:20394-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:28:20Z | 2026-01-19T15:28:20Z |
| suse-su-2026:20393-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:28:20Z | 2026-01-19T15:28:20Z |
| suse-su-2026:20392-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:28:20Z | 2026-01-19T15:28:20Z |
| suse-su-2026:20253-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:28:20Z | 2026-01-19T15:28:20Z |
| suse-su-2026:20252-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:28:20Z | 2026-01-19T15:28:20Z |
| suse-su-2026:20251-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:28:20Z | 2026-01-19T15:28:20Z |
| suse-su-2026:20250-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:28:20Z | 2026-01-19T15:28:20Z |
| suse-su-2026:20249-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:28:20Z | 2026-01-19T15:28:20Z |
| suse-su-2026:20248-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-01-19T15:28:20Z | 2026-01-19T15:28:20Z |
| suse-su-2026:0166-1 | Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4) | 2026-01-19T15:05:22Z | 2026-01-19T15:05:22Z |
| suse-su-2026:0163-1 | Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4) | 2026-01-19T14:34:24Z | 2026-01-19T14:34:24Z |
| suse-su-2026:0155-1 | Security update for the Linux Kernel (Live Patch 72 for SUSE Linux Enterprise 12 SP5) | 2026-01-19T12:11:10Z | 2026-01-19T12:11:10Z |
| suse-su-2026:0154-1 | Security update for the Linux Kernel (Live Patch 63 for SUSE Linux Enterprise 12 SP5) | 2026-01-19T12:08:42Z | 2026-01-19T12:08:42Z |
| suse-su-2026:20360-1 | Security update for libsoup | 2026-01-19T11:45:24Z | 2026-01-19T11:45:24Z |
| suse-su-2026:0153-1 | Security update for MozillaThunderbird | 2026-01-19T11:14:01Z | 2026-01-19T11:14:01Z |
| suse-su-2026:20359-1 | Security update for net-snmp | 2026-01-19T11:08:53Z | 2026-01-19T11:08:53Z |
| suse-su-2026:20096-1 | Security update for cargo-c | 2026-01-19T10:38:15Z | 2026-01-19T10:38:15Z |
| suse-su-2026:0151-1 | Security update for libsoup | 2026-01-19T09:56:33Z | 2026-01-19T09:56:33Z |
| suse-su-2026:20112-1 | Security update for docker | 2026-01-17T13:20:31Z | 2026-01-17T13:20:31Z |
| suse-su-2026:20095-1 | Security update for docker | 2026-01-17T13:20:31Z | 2026-01-17T13:20:31Z |
| suse-su-2026:0148-1 | Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-01-17T12:04:20Z | 2026-01-17T12:04:20Z |
| suse-su-2026:0147-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise 15 SP7) | 2026-01-17T11:33:38Z | 2026-01-17T11:33:38Z |
| suse-su-2026:0146-1 | Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 15 SP7) | 2026-01-17T11:33:35Z | 2026-01-17T11:33:35Z |
| suse-su-2026:0145-1 | Security update for the Linux Kernel RT (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2026-01-17T11:04:25Z | 2026-01-17T11:04:25Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:5291 | Moderate: grafana security update | 2024-08-13T00:00:00Z | 2024-08-21T11:59:57Z |
| alsa-2024:5289 | Moderate: mod_auth_openidc:2.3 security update | 2024-08-13T00:00:00Z | 2024-08-21T11:58:07Z |
| alsa-2024:5258 | Important: container-tools:rhel8 security update | 2024-08-13T00:00:00Z | 2024-08-14T16:09:13Z |
| alsa-2024:5193 | Important: httpd:2.4 security update | 2024-08-12T00:00:00Z | 2024-08-12T08:10:20Z |
| alsa-2024:5192 | Moderate: 389-ds-base security update | 2024-08-12T00:00:00Z | 2024-08-13T06:44:14Z |
| alsa-2024:5138 | Important: httpd security update | 2024-08-08T00:00:00Z | 2024-08-08T19:01:17Z |
| alsa-2024:5102 | Important: kernel-rt security update | 2024-08-08T00:00:00Z | 2024-08-08T18:59:48Z |
| alsa-2024:5101 | Important: kernel security update | 2024-08-08T00:00:00Z | 2024-08-08T19:03:05Z |
| alsa-2024:5079 | Moderate: libtiff security update | 2024-08-07T00:00:00Z | 2024-08-08T08:54:06Z |
| alsa-2024:4936 | Important: freeradius:3.0 security update | 2024-07-31T00:00:00Z | 2024-08-06T20:56:46Z |
| alsa-2024:4935 | Important: freeradius security update | 2024-07-31T00:00:00Z | 2024-08-06T20:53:34Z |
| alsa-2024:4928 | Moderate: kernel security update | 2024-07-31T00:00:00Z | 2024-11-03T22:23:15Z |
| alsa-2024:4861 | Moderate: squid security update | 2024-07-25T00:00:00Z | 2024-07-26T11:15:21Z |
| alsa-2024:4779 | Low: python3 security update | 2024-07-23T00:00:00Z | 2024-07-24T13:03:51Z |
| alsa-2024:4776 | Moderate: cups security update | 2024-07-23T00:00:00Z | 2024-07-24T14:45:37Z |
| alsa-2024:4774 | Moderate: linux-firmware security update | 2024-07-23T00:00:00Z | 2024-07-25T10:45:53Z |
| alsa-2024:4766 | Low: python3 security update | 2024-07-23T00:00:00Z | 2024-07-24T13:07:17Z |
| alsa-2024:4762 | Important: runc security update | 2024-07-23T00:00:00Z | 2024-07-24T14:55:19Z |
| alsa-2024:4761 | Important: containernetworking-plugins security update | 2024-07-23T00:00:00Z | 2024-07-24T14:59:50Z |
| alsa-2024:4757 | Moderate: libvirt security update | 2024-07-23T00:00:00Z | 2024-07-25T08:13:20Z |
| alsa-2024:4756 | Moderate: libuv security update | 2024-07-23T00:00:00Z | 2024-07-24T15:07:33Z |
| alsa-2024:4755 | Moderate: libreoffice security update | 2024-07-23T00:00:00Z | 2024-07-25T08:25:06Z |
| alsa-2024:4749 | Moderate: edk2 security update | 2024-07-23T00:00:00Z | 2024-07-25T08:35:23Z |
| alsa-2024:4726 | Important: httpd security update | 2024-07-23T00:00:00Z | 2024-07-23T22:08:50Z |
| alsa-2024:4720 | Important: httpd:2.4 security update | 2024-07-23T00:00:00Z | 2024-07-23T22:13:25Z |
| alsa-2024:4636 | Important: libndp security update | 2024-07-18T00:00:00Z | 2024-07-19T10:19:10Z |
| alsa-2024:4635 | Important: thunderbird security update | 2024-07-18T00:00:00Z | 2024-07-19T10:20:07Z |
| alsa-2024:4624 | Important: thunderbird security update | 2024-07-18T00:00:00Z | 2024-07-19T10:21:38Z |
| alsa-2024:4623 | Important: qt5-qtbase security update | 2024-07-18T00:00:00Z | 2024-07-19T10:23:11Z |
| alsa-2024:4620 | Important: libndp security update | 2024-07-18T00:00:00Z | 2024-07-19T10:24:45Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-398 | Heap-buffer-overflow in json_common_entity_data | 2022-05-07T00:00:06.828980Z | 2022-11-20T00:16:38.866820Z |
| osv-2022-394 | Incorrect-function-pointer-type in cv::split | 2022-05-04T00:00:27.326853Z | 2026-04-04T14:23:39.520277Z |
| osv-2022-393 | Heap-use-after-free in mrb_funcall_with_block | 2022-05-04T00:00:21.149913Z | 2022-05-04T00:00:21.150142Z |
| osv-2022-390 | Heap-buffer-overflow in s_PFBD_process | 2022-05-02T00:01:27.811540Z | 2023-02-24T01:55:09.258829Z |
| osv-2022-389 | Global-buffer-overflow in _dwarf_pathjoinl | 2022-05-01T00:01:57.432738Z | 2022-05-01T00:01:57.432994Z |
| osv-2022-388 | Segv on unknown address in dwg_ref_get_object | 2022-05-01T00:01:54.904711Z | 2026-04-25T14:22:28.434545Z |
| osv-2022-387 | Segv on unknown address in bit_write_TV | 2022-05-01T00:00:24.004253Z | 2022-07-30T00:11:20.899511Z |
| osv-2022-386 | Invalid-free in change_pin | 2022-05-01T00:00:17.507442Z | 2022-05-01T00:00:17.507768Z |
| osv-2022-383 | Heap-use-after-free in r_asm_free | 2022-04-30T00:00:25.155380Z | 2022-04-30T00:00:25.155685Z |
| osv-2022-380 | Stack-buffer-overflow in sc_asn1_read_tag | 2022-04-27T00:01:38.850365Z | 2022-04-27T00:01:38.850588Z |
| osv-2022-379 | Segv on unknown address in bit_write_TV | 2022-04-27T00:00:44.539231Z | 2026-04-25T14:26:20.078250Z |
| osv-2022-377 | Heap-buffer-overflow in decode_preR13_section_hdr | 2022-04-26T00:01:48.422620Z | 2022-07-30T00:11:24.476167Z |
| osv-2022-376 | Heap-buffer-overflow in ndpi_search_raknet | 2022-04-26T00:01:35.220458Z | 2022-04-26T00:01:35.220667Z |
| osv-2022-375 | Stack-use-after-return in std::__1::__function::__func<bool grk::WaveletReverse::decompress_partial_tile<i | 2022-04-26T00:00:52.868142Z | 2022-04-26T00:00:52.868349Z |
| osv-2022-372 | Heap-buffer-overflow in dwg_encode_VERTEX_2D | 2022-04-26T00:00:09.352798Z | 2026-04-25T14:26:18.807863Z |
| osv-2022-371 | Segv on unknown address in jxl::N_AVX2::WriteToU8Stage::ProcessRow | 2022-04-25T00:00:23.683106Z | 2022-04-25T00:00:23.683365Z |
| osv-2022-368 | Heap-buffer-overflow in exif_get_long | 2022-04-23T00:01:48.707920Z | 2022-04-23T00:01:48.708304Z |
| osv-2022-367 | Segv on unknown address in jxl::N_SSE4::WriteToU8Stage::ProcessRow | 2022-04-23T00:01:38.671607Z | 2022-04-23T00:01:38.671886Z |
| osv-2022-363 | Heap-use-after-free in dwg_free_TABLEGEOMETRY_private | 2022-04-21T00:01:58.402473Z | 2022-07-30T00:11:38.468823Z |
| osv-2022-361 | UNKNOWN READ in sc_pkcs15_decode_pubkey_ec | 2022-04-21T00:00:24.706566Z | 2022-04-21T00:00:24.706829Z |
| osv-2022-360 | Invalid-free in igl::MshLoader::~MshLoader | 2022-04-20T00:01:28.065887Z | 2026-04-18T14:16:11.274912Z |
| osv-2022-354 | Segv on unknown address in gs_heap_free_object | 2022-04-17T00:01:44.034459Z | 2022-04-17T00:01:44.034686Z |
| osv-2022-351 | UNKNOWN READ in ref_stack_counttomark | 2022-04-16T00:01:10.988352Z | 2023-02-24T02:14:14.338741Z |
| osv-2022-349 | Heap-buffer-overflow in JS_CallInternal | 2022-04-16T00:00:12.324830Z | 2022-04-16T00:00:12.325106Z |
| osv-2022-347 | Heap-buffer-overflow in cli_bcomp_freemeta | 2022-04-15T00:01:49.289095Z | 2023-02-24T01:29:44.509664Z |
| osv-2022-345 | Stack-buffer-overflow in sc_hsm_list_files | 2022-04-15T00:01:47.875554Z | 2022-04-15T00:01:47.875889Z |
| osv-2022-343 | Uncaught exception in com.alibaba.fastjson.JSONPath.getPropertyValue | 2022-04-15T00:01:30.888554Z | 2022-08-03T00:19:59.503915Z |
| osv-2022-342 | Heap-buffer-overflow in sc_pkcs15init_delete_by_path | 2022-04-14T00:01:38.330194Z | 2022-04-14T00:01:38.330440Z |
| osv-2022-341 | Heap-buffer-overflow in krb_parse | 2022-04-14T00:01:37.890580Z | 2022-04-14T00:01:37.890823Z |
| osv-2022-339 | Heap-use-after-free in gc_trace | 2022-04-14T00:00:06.038155Z | 2022-04-14T00:00:06.038429Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2024-8186 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2025-03-05T07:13:13.551Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2025-0475 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2025-03-05T07:09:22.656Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2025-0555 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2025-03-05T07:09:06.942Z | 2025-05-20T10:02:07.006Z |
| bit-passenger-2025-26803 | 2025-03-02T07:16:46.292Z | 2025-04-03T14:40:37.652Z | |
| bit-odoo-2024-12368 | 2025-03-02T07:16:14.895Z | 2025-08-20T09:06:12.327Z | |
| bit-odoo-2024-36259 | 2025-03-02T07:16:07.290Z | 2025-08-20T09:06:12.327Z | |
| bit-mastodon-2025-27157 | Mastodon's rate-limits are missing on `/auth/setup` | 2025-03-02T07:13:08.797Z | 2025-05-20T10:02:07.006Z |
| bit-mastodon-2025-27399 | Mastodon's domain blocks & rationales ignore user approval when visibility set as "users" | 2025-03-02T07:13:02.508Z | 2025-05-20T10:02:07.006Z |
| bit-harbor-2024-22244 | Harbor Open Redirect URL | 2025-02-27T07:09:50.441Z | 2025-05-20T10:02:07.006Z |
| bit-gradle-2025-27148 | Gradle vulnerable to local privilege escalation through system temporary directory | 2025-02-27T07:08:45.147Z | 2025-05-20T10:02:07.006Z |
| bit-cassandra-2024-27137 | Apache Cassandra: unrestricted deserialization of JMX authentication credentials | 2025-02-20T19:10:15.703Z | 2025-05-20T10:02:07.006Z |
| bit-php-2022-31631 | PDO::quote() may return unquoted string | 2025-02-20T10:43:06.805Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2024-53266 | Cross-site Scripting (XSS) via topic titles when CSP disabled in Discourse | 2025-02-20T10:32:23.108Z | 2025-08-27T09:06:48.117Z |
| bit-discourse-2024-53851 | Partial denial of service via inline oneboxes in Discourse | 2025-02-20T10:32:14.095Z | 2025-08-27T09:06:48.117Z |
| bit-discourse-2024-53994 | Potential bypass of chat permissions in Discourse | 2025-02-20T10:31:56.798Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2024-55948 | Anonymous cache poisoning via XHR requests in Discourse | 2025-02-20T10:31:48.409Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2024-56197 | Users can see other user's tagged PMs in Discourse | 2025-02-20T10:31:38.504Z | 2026-03-25T09:15:17.567Z |
| bit-discourse-2024-56328 | HTMLi(XSS without CSP) via Onebox urls in Discourse | 2025-02-20T10:31:29.492Z | 2025-08-27T09:06:48.117Z |
| bit-discourse-2025-22602 | Stored DOM-based XSS (without CSP) via video placeholders in Discourse | 2025-02-20T10:31:17.404Z | 2025-08-27T09:06:48.117Z |
| bit-discourse-2025-23023 | Anonymous cache poisoning via request headers in Discourse | 2025-02-20T10:31:08.896Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-12379 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-02-17T19:27:19.016Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-3303 | Improper Neutralization of Input Used for LLM Prompting in GitLab | 2025-02-17T19:23:31.736Z | 2025-08-07T09:23:45.368Z |
| bit-postgresql-2025-1094 | PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation | 2025-02-17T19:18:46.733Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-7102 | Execution with Unnecessary Privileges in GitLab | 2025-02-17T19:16:40.313Z | 2025-08-07T09:23:45.368Z |
| bit-gitlab-2024-8266 | Execution with Unnecessary Privileges in GitLab | 2025-02-17T19:14:44.926Z | 2025-08-07T09:23:45.368Z |
| bit-gitlab-2024-9870 | Unintended Proxy or Intermediary ('Confused Deputy') in GitLab | 2025-02-17T19:11:40.337Z | 2025-08-07T09:23:45.368Z |
| bit-gitlab-2025-0376 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2025-02-17T19:11:05.326Z | 2025-08-07T09:23:45.368Z |
| bit-gitlab-2025-0516 | Incorrect Authorization in GitLab | 2025-02-17T19:10:56.835Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2025-1042 | Files or Directories Accessible to External Parties in GitLab | 2025-02-17T19:10:49.113Z | 2025-08-07T09:23:45.368Z |
| bit-gitlab-2025-1198 | Insufficient Session Expiration in GitLab | 2025-02-17T19:10:33.316Z | 2025-08-07T09:23:45.368Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2024-avi-1105 | Multiples vulnérabilités dans Tenable Security Center | 2024-12-23T00:00:00.000000 | 2024-12-23T00:00:00.000000 |
| certfr-2024-avi-1104 | Vulnérabilité dans les produits NetApp | 2024-12-23T00:00:00.000000 | 2024-12-23T00:00:00.000000 |
| certfr-2024-avi-1103 | Multiples vulnérabilités dans les produits IBM | 2024-12-20T00:00:00.000000 | 2024-12-20T00:00:00.000000 |
| certfr-2024-avi-1102 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-12-20T00:00:00.000000 | 2024-12-20T00:00:00.000000 |
| certfr-2024-avi-1101 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-12-20T00:00:00.000000 | 2024-12-20T00:00:00.000000 |
| certfr-2024-avi-1100 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2024-12-20T00:00:00.000000 | 2024-12-20T00:00:00.000000 |
| certfr-2024-avi-1099 | Multiples vulnérabilités dans Sophos Firewall | 2024-12-20T00:00:00.000000 | 2024-12-20T00:00:00.000000 |
| certfr-2024-avi-1098 | Multiples vulnérabilités dans Microsoft Edge | 2024-12-20T00:00:00.000000 | 2024-12-20T00:00:00.000000 |
| certfr-2024-avi-1097 | Vulnérabilité dans Trend Micro Deep Security Agent | 2024-12-19T00:00:00.000000 | 2024-12-19T00:00:00.000000 |
| certfr-2024-avi-1096 | Multiples vulnérabilités dans les produits Fortinet | 2024-12-19T00:00:00.000000 | 2024-12-19T00:00:00.000000 |
| certfr-2024-avi-1095 | Multiples vulnérabilités dans Google Chrome | 2024-12-19T00:00:00.000000 | 2024-12-19T00:00:00.000000 |
| certfr-2024-avi-1094 | Vulnérabilité dans les produits Elastic | 2024-12-18T00:00:00.000000 | 2024-12-18T00:00:00.000000 |
| certfr-2024-avi-1093 | Multiples vulnérabilités dans Xen | 2024-12-18T00:00:00.000000 | 2024-12-18T00:00:00.000000 |
| certfr-2024-avi-1092 | Vulnérabilité dans Traefik | 2024-12-18T00:00:00.000000 | 2024-12-18T00:00:00.000000 |
| certfr-2024-avi-1091 | Multiples vulnérabilités dans Apache Tomcat | 2024-12-18T00:00:00.000000 | 2024-12-24T00:00:00.000000 |
| certfr-2024-avi-1090 | Multiples vulnérabilités dans Synacor Zimbra Collaboration | 2024-12-18T00:00:00.000000 | 2025-12-04T00:00:00.000000 |
| certfr-2024-avi-1089 | Vulnérabilité dans les produits StormShield Management Center | 2024-12-17T00:00:00.000000 | 2024-12-17T00:00:00.000000 |
| certfr-2024-avi-1088 | Multiples vulnérabilités dans les produits Foxit | 2024-12-17T00:00:00.000000 | 2024-12-17T00:00:00.000000 |
| certfr-2024-avi-1087 | Vulnérabilité dans les produits Siemens | 2024-12-17T00:00:00.000000 | 2024-12-17T00:00:00.000000 |
| certfr-2024-avi-1086 | Multiples vulnérabilités dans Trend Micro Apex One | 2024-12-17T00:00:00.000000 | 2024-12-17T00:00:00.000000 |
| certfr-2024-avi-1085 | Multiples vulnérabilités dans Moodle | 2024-12-17T00:00:00.000000 | 2024-12-17T00:00:00.000000 |
| certfr-2024-avi-1084 | Vulnérabilité dans SolarWinds Web Help Desk | 2024-12-16T00:00:00.000000 | 2024-12-16T00:00:00.000000 |
| certfr-2024-avi-1083 | Multiples vulnérabilités dans Mozilla Thunderbird | 2024-12-16T00:00:00.000000 | 2024-12-16T00:00:00.000000 |
| certfr-2024-avi-1082 | Multiples vulnérabilités dans les produits Synology | 2024-12-16T00:00:00.000000 | 2024-12-16T00:00:00.000000 |
| certfr-2024-avi-1081 | Multiples vulnérabilités dans les produits IBM | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| certfr-2024-avi-1080 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| certfr-2024-avi-1079 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| certfr-2024-avi-1078 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| certfr-2024-avi-1077 | Multiples vulnérabilités dans Microsoft Edge | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| certfr-2024-avi-1076 | Multiples vulnérabilités dans Suricata | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000223 | Cybozu Garoon vulnerable to information disclosure | 2016-12-19T12:29+09:00 | 2017-11-27T16:58+09:00 |
| jvndb-2016-000222 | Cybozu Garoon vulnerable to cross-site scripting | 2016-12-19T12:22+09:00 | 2017-11-27T16:58+09:00 |
| jvndb-2016-000246 | Mutiple SONY Videoconference Systems do not properly perform authentication | 2016-12-16T14:11+09:00 | 2018-01-17T14:03+09:00 |
| jvndb-2016-000245 | Apache ActiveMQ vulnerable to cross-site scripting | 2016-12-13T14:00+09:00 | 2018-04-04T12:25+09:00 |
| jvndb-2016-000244 | Access restriction bypass to delete DBM files in Cybozu Dezie | 2016-12-12T14:49+09:00 | 2017-11-27T17:12+09:00 |
| jvndb-2016-000243 | Access restriction bypass to download DBM files in Cybozu Dezie | 2016-12-12T14:49+09:00 | 2017-11-27T17:12+09:00 |
| jvndb-2016-006114 | The Bank of Tokyo-Mitsubishi UFJ for Android vulnerable to SSL/TLS downgrade attack | 2016-12-08T11:33+09:00 | 2018-02-28T11:47+09:00 |
| jvndb-2016-000242 | Sleipnir for Mac vulnerable to URL spoofing | 2016-12-07T14:44+09:00 | 2018-01-17T11:48+09:00 |
| jvndb-2016-002331 | ManageEngine Password Manager Pro fails to restrict access permissions | 2016-12-05T15:02+09:00 | 2016-12-05T15:02+09:00 |
| jvndb-2016-002298 | Keitai Kit for Movable Type vulnerable to OS command injection | 2016-12-05T15:02+09:00 | 2016-12-05T15:02+09:00 |
| jvndb-2016-006038 | Multiple SONY network cameras vulnerable to sensitive information disclosure | 2016-12-05T14:33+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-003380 | ManageEngine Password Manager Pro vulnerable to cross-site request forgery | 2016-12-05T14:32+09:00 | 2017-05-23T16:23+09:00 |
| jvndb-2016-002299 | SaAT Netizen fails to properly verify downloaded installation and update files | 2016-12-05T13:52+09:00 | 2024-06-27T13:59+09:00 |
| jvndb-2016-000241 | WNC01WH vulnerable to directory traversal due to an issue in processing POST request | 2016-12-02T14:46+09:00 | 2017-11-27T17:11+09:00 |
| jvndb-2016-000240 | WNC01WH vulnerable to directory traversal due to an issue in processing commands | 2016-12-02T14:45+09:00 | 2017-11-27T16:27+09:00 |
| jvndb-2016-000239 | WNC01WH vulnerable to enabling debug option | 2016-12-02T14:44+09:00 | 2017-11-27T16:27+09:00 |
| jvndb-2016-000238 | WNC01WH vulnerable to stored cross-site scripting | 2016-12-02T14:43+09:00 | 2017-11-27T16:27+09:00 |
| jvndb-2016-000237 | WNC01WH vulnerable to cross-site request forgery | 2016-12-02T14:43+09:00 | 2017-11-27T16:27+09:00 |
| jvndb-2016-000236 | WNC01WH vulnerable to denial-of-service (DoS) | 2016-12-02T14:43+09:00 | 2017-11-27T16:27+09:00 |
| jvndb-2016-000233 | The installers of multiple Japan Pension Service software may insecurely load Dynamic Link Libraries | 2016-12-01T13:40+09:00 | 2018-01-17T13:54+09:00 |
| jvndb-2016-000235 | Multiple I-O DATA network camera products vulnerable to buffer overflow | 2016-11-30T15:17+09:00 | 2018-01-17T11:48+09:00 |
| jvndb-2016-000234 | Multiple I-O DATA network camera products vulnerable to OS command injection | 2016-11-30T15:17+09:00 | 2018-01-17T11:52+09:00 |
| jvndb-2016-000231 | kintone mobile for Android fails to verify SSL server certificates | 2016-11-28T13:47+09:00 | 2018-01-17T12:34+09:00 |
| jvndb-2016-000232 | Simple keitai chat vulnerable to cross-site scripting | 2016-11-25T13:54+09:00 | 2018-01-17T11:57+09:00 |
| jvndb-2016-000220 | DERAEMON-CMS vulnerable to cross-site scripting | 2016-11-15T13:41+09:00 | 2018-01-17T12:09+09:00 |
| jvndb-2016-000219 | CG-WLR300NX fails to restrict access permissions | 2016-11-11T14:50+09:00 | 2018-01-17T12:09+09:00 |
| jvndb-2016-000218 | CG-WLR300NX vulnerable to cross-site scripting | 2016-11-11T14:49+09:00 | 2018-01-17T12:18+09:00 |
| jvndb-2016-000217 | CG-WLR300NX vulnerable to cross-site request forgery | 2016-11-11T14:49+09:00 | 2018-01-17T12:18+09:00 |
| jvndb-2016-000216 | Multiple Corega wireless LAN routers vulnerable to cross-site scripting | 2016-11-11T14:45+09:00 | 2017-11-27T16:42+09:00 |
| jvndb-2016-000221 | Multiple I-O DATA network camera products vulnerable to information disclosure | 2016-11-11T13:51+09:00 | 2018-01-17T12:02+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-10876 | mall-swarm授权问题漏洞 | 2025-12-10 | 2026-02-13 |
| cnvd-2026-04862 | Google Android缺少权限检查漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-04861 | Google Android输入验证不当漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-04860 | Google Android越界写入漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-04859 | Google Android竞争条件漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-04858 | Google Android越界写入漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-04857 | Google Android堆缓冲区溢出漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-04806 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在命令执行漏洞(CNVD-C-2025-1018960) | 2025-12-10 | 2026-01-21 |
| cnvd-2026-03536 | Google Android权限提升漏洞(CNVD-2026-03536) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03535 | Google Android信息泄露漏洞(CNVD-2026-03535) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03528 | Google Android越界写入漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03506 | Google Android越界读取漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03505 | Google Android缺少权限检查漏洞(CNVD-2026-0350579) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03504 | Google Android逻辑错误漏洞(CNVD-2026-0350480) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03503 | Google Android逻辑错误漏洞(CNVD-2026-0350381) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03502 | Google Android混淆代理漏洞(CNVD-2026-0350282) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03501 | Google Android缺少权限检查漏洞(CNVD-2026-0350183) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03500 | Google Android拒绝服务漏洞(CNVD-2026-0350084) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03499 | Google Android输入验证不当漏洞(CNVD-2026-0349985) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03498 | Google Android拒绝服务漏洞(CNVD-2026-0349886) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03497 | Google Android点击劫持漏洞(CNVD-2026-0349787) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03496 | Google Android输入验证不当漏洞(CNVD-2026-0349688) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03495 | Google Android逻辑错误漏洞(CNVD-2026-0349589) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03494 | Google Android拒绝服务漏洞(CNVD-2026-0349490) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03493 | Google Android缺少权限检查漏洞(CNVD-2026-0349391) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03492 | Google Android逻辑错误漏洞(CNVD-2026-0349292) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03491 | Google Android权限绕过漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03490 | Google Android缺少权限检查漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03489 | Google Android输入验证不当漏洞(CNVD-2026-0348995) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03488 | Google Android逻辑错误漏洞(CNVD-2026-0348896) | 2025-12-10 | 2026-01-15 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-16493 | Уязвимость программного обеспечения для проверки личности клиентов KYC Solutions, связанн… | 31.12.2025 | 31.12.2025 |
| bdu:2025-16492 | Уязвимость программного обеспечения для проверки личности клиентов KYC Solutions, связанн… | 31.12.2025 | 31.12.2025 |
| bdu:2025-16491 | Уязвимость программного обеспечения для управления процессами подачи заявок Bidding Solu… | 31.12.2025 | 31.12.2025 |
| bdu:2025-16490 | Уязвимость реализации механизма OTP программного обеспечения для проверки личности клиент… | 31.12.2025 | 31.12.2025 |
| bdu:2025-16489 | Уязвимость компонента APPEND Command Handler FTP-сервера Freefloat FTP Server, позволяюща… | 31.12.2025 | 31.12.2025 |
| bdu:2025-16488 | Уязвимость контроллера доставки приложений NetScaler ADC (ранее Citrix ADC) и системы кон… | 31.12.2025 | 31.12.2025 |
| bdu:2025-16487 | Уязвимость системы управления сетевой инфраструктурой Cisco Catalyst Center (ранее Cisco … | 31.12.2025 | 31.12.2025 |
| bdu:2025-16486 | Уязвимость программы установки Autodesk Installer, связанная с ошибками при управлении пр… | 31.12.2025 | 31.12.2025 |
| bdu:2025-16485 | Уязвимость программного средства Docker-proxy, связанная с некорректной очисткой или осво… | 31.12.2025 | 31.12.2025 |
| bdu:2025-16484 | Уязвимость плагина The Events Calendar системы управления содержимым сайта WordPress, свя… | 31.12.2025 | 31.12.2025 |
| bdu:2025-16483 | Уязвимость функции bs_GetManPwd библиотеки libblinkapi.so файла /cgi-bin/lighttpd.cgi мик… | 31.12.2025 | 31.12.2025 |
| bdu:2025-16482 | Уязвимость метода Mailgen.generatePlaintext(email) пакета Mailgen программной платформы N… | 31.12.2025 | 31.12.2025 |
| bdu:2025-16481 | Уязвимость программного средства для резервного копирования Backup, связанная с ошибками … | 31.12.2025 | 31.12.2025 |
| bdu:2025-16480 | Уязвимость файла VS6Sim.exe программного средства для конфигурирования HMI-интерфейсов Mo… | 31.12.2025 | 31.12.2025 |
| bdu:2025-16479 | Уязвимость функции sess_get_uid() микропрограммного обеспечения маршрутизаторов D-Link DI… | 31.12.2025 | 31.12.2025 |
| bdu:2025-16478 | Уязвимость микропрограммного обеспечения контроллеров DVP-12SE11T, связанная с записью за… | 31.12.2025 | 31.12.2025 |
| bdu:2025-16477 | Уязвимость функции formSetPPTPUserList() микропрограммного обеспечения маршрутизаторов Te… | 31.12.2025 | 31.12.2025 |
| bdu:2025-16476 | Уязвимость веб-интерфейса микропрограммного обеспечения IP-телефонов Yealink T21P_E2, поз… | 31.12.2025 | 31.12.2025 |
| bdu:2025-16475 | Уязвимость функции sub_42261C() микропрограммного обеспечения маршрутизаторов D-Link DWR-… | 31.12.2025 | 31.12.2025 |
| bdu:2025-16474 | Уязвимость программного обеспечения систем числового программного управления CNCSoft, свя… | 30.12.2025 | 30.12.2025 |
| bdu:2025-16473 | Уязвимость веб-интерфейса FTP-сервера Wing FTP Server, позволяющая нарушителю повысить св… | 30.12.2025 | 30.12.2025 |
| bdu:2025-16472 | Уязвимость библиотеки SysSocket среды выполнения CODESYS Control, позволяющая нарушителю … | 30.12.2025 | 30.12.2025 |
| bdu:2025-16471 | Уязвимость компонента визуализации CmpVisuServer программного комплекса промышленной авто… | 30.12.2025 | 30.12.2025 |
| bdu:2025-16470 | Уязвимость программной платформы на базе git для совместной работы над кодом GitLab, связ… | 30.12.2025 | 30.12.2025 |
| bdu:2025-16469 | Уязвимость микропрограммного обеспечения маршрутизаторов Tenda WH450, связанная с выходом… | 30.12.2025 | 30.12.2025 |
| bdu:2025-16468 | Уязвимость SCADA-системы Advantech WebAccss/SCADA, связанная с неверным ограничением имен… | 30.12.2025 | 30.12.2025 |
| bdu:2025-16467 | Уязвимость SCADA-системы Advantech WebAccss/SCADA, связанная с неограниченной загрузкой ф… | 30.12.2025 | 30.12.2025 |
| bdu:2025-16466 | Уязвимость SCADA-системы Advantech WebAccss/SCADA, связанная с неверным ограничением имен… | 30.12.2025 | 30.12.2025 |
| bdu:2025-16465 | Уязвимость SCADA-системы Advantech WebAccss/SCADA? связанная с непринятием мер по защите … | 30.12.2025 | 30.12.2025 |
| bdu:2025-16464 | Уязвимость SCADA-системы Advantech WebAccss/SCADA, связанная с неверным ограничением имен… | 30.12.2025 | 30.12.2025 |
| ID | Description | Updated |
|---|---|---|
| var-202512-0195 | A vulnerability was detected in D-Link DIR-803 up to 1.04. Impacted is an unknown functio… | 2025-12-20T23:39:14.888000Z |
| var-202511-0924 | Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in … | 2025-12-20T23:37:30.217000Z |
| var-202511-1363 | Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in … | 2025-12-20T23:37:30.171000Z |
| var-202406-0276 | Advantech iView ConfigurationServlet SQL Injection Information Disclosure Vulnerability. … | 2025-12-20T23:36:33.060000Z |
| var-202511-0871 | A stack buffer overflow vulnerability exists in the ToToLink LR1200GB (V9.1.0u.6619_B2023… | 2025-12-20T23:36:29.975000Z |
| var-202511-2274 | A vulnerability was identified in D-Link DIR-852 1.00. This issue affects some unknown pr… | 2025-12-20T23:36:29.894000Z |
| var-202511-2366 | Tenda AC21 V16.03.08.16 is vulnerable to Buffer Overflow via the list parameter of /gofor… | 2025-12-20T23:35:27.958000Z |
| var-202511-0447 | Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in … | 2025-12-20T23:32:36.165000Z |
| var-202512-0097 | Unauthenticated Telnet enablement via cstecgi.cgi (auth bypass) leading to unauthenticate… | 2025-12-20T23:32:35.891000Z |
| var-202511-1093 | Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in … | 2025-12-20T23:30:45.718000Z |
| var-202511-1242 | A debug messages revealing unnecessary information vulnerability in Fortinet FortiExtende… | 2025-12-20T23:30:45.698000Z |
| var-202512-0954 | An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') v… | 2025-12-20T23:30:45.405000Z |
| var-202511-2202 | Advantech WebAccess/VPN versions prior to 1.1.5 contain a stored cross-site scripting (XS… | 2025-12-20T23:29:14.146000Z |
| var-201709-1229 | The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.1… | 2025-12-20T23:27:05.049000Z |
| var-202512-0141 | A vulnerability was determined in TOTOLINK X5000R 9.1.0cu.2089_B20211224. Affected by thi… | 2025-12-20T23:26:42.148000Z |
| var-202509-1846 | A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element is the fun… | 2025-12-20T23:22:57.907000Z |
| var-200609-1013 | Stack-based buffer overflow in the Apple Type Services (ATS) server in Mac OS 10.4.8 and … | 2025-12-20T22:49:34.133000Z |
| var-200110-0169 | OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers t… | 2025-12-20T21:52:04.681000Z |
| var-200609-1734 | Heap-based buffer overflow in the Finder in Apple Mac OS X 10.4.8 and earlier allows user… | 2025-12-20T21:17:37.720000Z |
| var-200609-1302 | The VPN service in Apple Mac OS X 10.3.x through 10.3.9 and 10.4.x through 10.4.8 does no… | 2025-12-20T21:12:08.348000Z |
| var-200609-0959 | OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key… | 2025-12-20T20:19:40.634000Z |
| var-200609-0855 | The Online Certificate Status Protocol (OCSP) service in the Security Framework in Apple … | 2025-12-20T20:14:42.895000Z |
| var-202511-0448 | Advantech WebAccess/VPN versions prior to 1.1.5 contain a stored cross-site scripting (XS… | 2025-12-20T19:39:02.919000Z |
| var-202512-0021 | In AzeoTech DAQFactory release 20.7 (Build 2555), a Stack-Based Buffer Overflow vulnerabi… | 2025-12-20T19:39:02.662000Z |
| var-202512-0023 | In AzeoTech DAQFactory release 20.7 (Build 2555), an Access of Resource Using Incompatibl… | 2025-12-20T19:39:02.634000Z |
| var-202512-0022 | In AzeoTech DAQFactory release 20.7 (Build 2555), a Use After Free vulnerability can be e… | 2025-12-20T19:39:02.612000Z |
| var-202512-0018 | In AzeoTech DAQFactory release 20.7 (Build 2555), an Access of Uninitialized Pointer vuln… | 2025-12-20T19:39:02.595000Z |
| var-202512-0017 | In AzeoTech DAQFactory release 20.7 (Build 2555), the affected application is vulnerable … | 2025-12-20T19:39:02.575000Z |
| var-202512-0019 | In AzeoTech DAQFactory release 20.7 (Build 2555), an Out-of-bounds Read vulnerability can… | 2025-12-20T19:39:02.534000Z |
| var-202512-0020 | In AzeoTech DAQFactory release 20.7 (Build 2555), an Out-of-bounds Write vulnerability ca… | 2025-12-20T19:39:02.502000Z |