Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-41253 |
6.9 (3.1)
|
In iTerm2 through 3.6.9, displaying a .txt file c… |
iTerm2 |
iTerm2 |
2026-04-18T05:27:08.202Z | 2026-04-20T15:52:10.357Z |
| CVE-2026-6048 |
6.4 (3.1)
|
Flipbox Addon for Elementor <= 2.1.1 - Authenticated (… |
dragwyb |
Flipbox Addon for Elementor |
2026-04-18T03:37:05.751Z | 2026-04-20T13:46:08.081Z |
| CVE-2026-6518 |
8.8 (3.1)
|
CMP – Coming Soon & Maintenance Plugin by NiteoThemes … |
niteo |
CMP – Coming Soon & Maintenance Plugin by NiteoThemes |
2026-04-18T03:37:04.707Z | 2026-04-20T13:46:08.222Z |
| CVE-2026-4801 |
6.4 (3.1)
|
Page Builder Gutenberg Blocks <= 3.1.16 - Authenticate… |
godaddy |
Page Builder Gutenberg Blocks – CoBlocks |
2026-04-18T03:37:03.859Z | 2026-04-20T14:42:38.120Z |
| CVE-2026-40494 |
9.8 (3.1)
|
SAIL has heap buffer overflow in TGA RLE decoder — raw… |
HappySeaFox |
sail |
2026-04-18T01:42:48.830Z | 2026-04-20T14:55:42.859Z |
| CVE-2026-40493 |
9.8 (3.1)
|
SAIL has heap buffer overflow in PSD decoder — bpp mis… |
HappySeaFox |
sail |
2026-04-18T01:41:14.664Z | 2026-04-20T16:15:22.120Z |
| CVE-2026-40492 |
9.8 (3.1)
|
SAIL has heap buffer overflow in XWD decoder — bits_pe… |
HappySeaFox |
sail |
2026-04-18T01:39:48.056Z | 2026-04-20T15:24:42.029Z |
| CVE-2026-40491 |
6.5 (3.1)
|
gdown Affected by Arbitrary File Write via Path Traver… |
wkentaro |
gdown |
2026-04-18T01:36:47.659Z | 2026-04-20T15:50:02.983Z |
| CVE-2026-40490 |
6.8 (3.1)
|
AsyncHttpClient leaks authorization credentials to unt… |
AsyncHttpClient |
async-http-client |
2026-04-18T01:31:13.860Z | 2026-04-20T14:55:50.254Z |
| CVE-2026-1559 |
6.4 (3.1)
|
Youzify <= 1.3.6 - Authenticated (Subscriber+) Stored … |
youzify |
Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress |
2026-04-18T01:26:05.210Z | 2026-04-20T13:46:08.353Z |
| CVE-2026-1838 |
6.1 (3.1)
|
Hostel <= 1.1.6 - Reflected Cross-Site Scripting via '… |
prasunsen |
Hostel |
2026-04-18T01:26:04.643Z | 2026-04-20T14:19:29.627Z |
| CVE-2026-40489 |
8.6 (4.0)
|
editorconfig-core-c has incomplete fix for CVE-2023-0341 |
editorconfig |
editorconfig-core-c |
2026-04-18T01:24:57.278Z | 2026-04-20T16:15:31.570Z |
| CVE-2026-40487 |
8.9 (3.1)
|
Postiz Has Unrestricted File Upload via MIME Type Spoo… |
gitroomhq |
postiz-app |
2026-04-18T01:19:06.588Z | 2026-04-20T15:25:40.893Z |
| CVE-2026-35582 |
8.8 (3.1)
|
Emissary has an OS Command Injection via Unvalidated I… |
NationalSecurityAgency |
emissary |
2026-04-18T01:16:27.661Z | 2026-04-20T15:48:51.543Z |
| CVE-2026-35465 |
7.5 (3.1)
|
SecureDrop Client has path injection in read_gzip_head… |
freedomofpress |
securedrop-client |
2026-04-18T00:41:16.594Z | 2026-04-20T15:47:43.822Z |
| CVE-2026-40572 |
9 (3.1)
|
NovumOS has Arbitrary Memory Mapping via Syscall 15 (M… |
MinecAnton209 |
NovumOS |
2026-04-18T00:16:02.590Z | 2026-04-20T14:55:57.521Z |
| CVE-2026-40317 |
9.4 (3.1)
|
NovumOS has Privilege Escalation in the Syscall Interface |
MinecAnton209 |
NovumOS |
2026-04-18T00:12:10.368Z | 2026-04-20T15:26:25.222Z |
| CVE-2026-40350 |
8.8 (3.1)
|
Movary User Management (/settings/users) has Authoriza… |
leepeuker |
movary |
2026-04-18T00:07:33.324Z | 2026-04-20T16:15:39.915Z |
| CVE-2026-40349 |
8.8 (3.1)
|
Authenticated Movary User Can Self-Escalate to Adminis… |
leepeuker |
movary |
2026-04-18T00:05:46.360Z | 2026-04-20T16:15:49.844Z |
| CVE-2026-40593 |
4.8 (3.1)
|
ChurchCRM: Stored XSS in UserEditor.php via Login Name Field |
ChurchCRM |
CRM |
2026-04-18T00:02:59.606Z | 2026-04-20T14:56:05.666Z |
| CVE-2026-40348 |
7.7 (3.1)
|
Movary has Authenticated SSRF via Jellyfin Server URL … |
leepeuker |
movary |
2026-04-18T00:01:09.725Z | 2026-04-20T16:11:32.779Z |
| CVE-2026-40347 |
5.3 (3.1)
|
Python-Multipart affected by Denial of Service via lar… |
Kludex |
python-multipart |
2026-04-17T23:56:50.777Z | 2026-04-20T15:46:40.011Z |
| CVE-2026-40346 |
6.4 (4.0)
|
NocoBase has SSRF in Workflow HTTP Request and Custom … |
nocobase |
@nocobase/plugin-workflow-request |
2026-04-17T23:54:34.829Z | 2026-04-20T14:56:12.829Z |
| CVE-2026-40581 |
8.1 (3.1)
|
ChurchCRM: Cross-Site Request Forgery (CSRF) in Select… |
ChurchCRM |
CRM |
2026-04-17T23:51:32.765Z | 2026-04-20T16:15:58.183Z |
| CVE-2026-40337 |
5.1 (3.1)
|
Sentry kernel has incomplete ownership check for IRQ l… |
camelot-os |
sentry-kernel |
2026-04-17T23:51:09.866Z | 2026-04-20T16:13:48.908Z |
| CVE-2026-40341 |
3.5 (3.1)
|
libgphoto2 has an OOB Read in ptp_unpack_EOS_FocusInfoEx |
gphoto |
libgphoto2 |
2026-04-17T23:48:36.644Z | 2026-04-20T16:14:19.107Z |
| CVE-2026-40340 |
6.1 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_OI() in ptp-pack… |
gphoto |
libgphoto2 |
2026-04-17T23:45:17.467Z | 2026-04-20T13:36:05.149Z |
| CVE-2026-40339 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_Sony_DPD() FormF… |
gphoto |
libgphoto2 |
2026-04-17T23:42:32.586Z | 2026-04-20T14:56:21.979Z |
| CVE-2026-40338 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_Sony_DPD() enume… |
gphoto |
libgphoto2 |
2026-04-17T23:40:10.097Z | 2026-04-20T16:16:08.585Z |
| CVE-2026-40485 |
5.3 (3.1)
|
ChurchCRM: Username Enumeration via Differential Respo… |
ChurchCRM |
CRM |
2026-04-17T23:29:35.884Z | 2026-04-20T13:36:05.319Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-30898 |
N/A
|
Apache Airflow: Bad example of BashOperator shell inje… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:20:48.647Z | 2026-04-22T03:55:38.783Z |
| CVE-2026-25917 |
N/A
|
Apache Airflow: API extra-links triggers XCom deserial… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:20:11.187Z | 2026-04-22T13:58:49.807Z |
| CVE-2026-41253 |
6.9 (3.1)
|
In iTerm2 through 3.6.9, displaying a .txt file c… |
iTerm2 |
iTerm2 |
2026-04-18T05:27:08.202Z | 2026-04-20T15:52:10.357Z |
| CVE-2026-6518 |
8.8 (3.1)
|
CMP – Coming Soon & Maintenance Plugin by NiteoThemes … |
niteo |
CMP – Coming Soon & Maintenance Plugin by NiteoThemes |
2026-04-18T03:37:04.707Z | 2026-04-20T13:46:08.222Z |
| CVE-2026-6048 |
6.4 (3.1)
|
Flipbox Addon for Elementor <= 2.1.1 - Authenticated (… |
dragwyb |
Flipbox Addon for Elementor |
2026-04-18T03:37:05.751Z | 2026-04-20T13:46:08.081Z |
| CVE-2026-4801 |
6.4 (3.1)
|
Page Builder Gutenberg Blocks <= 3.1.16 - Authenticate… |
godaddy |
Page Builder Gutenberg Blocks – CoBlocks |
2026-04-18T03:37:03.859Z | 2026-04-20T14:42:38.120Z |
| CVE-2026-40494 |
9.8 (3.1)
|
SAIL has heap buffer overflow in TGA RLE decoder — raw… |
HappySeaFox |
sail |
2026-04-18T01:42:48.830Z | 2026-04-20T14:55:42.859Z |
| CVE-2026-40493 |
9.8 (3.1)
|
SAIL has heap buffer overflow in PSD decoder — bpp mis… |
HappySeaFox |
sail |
2026-04-18T01:41:14.664Z | 2026-04-20T16:15:22.120Z |
| CVE-2026-40492 |
9.8 (3.1)
|
SAIL has heap buffer overflow in XWD decoder — bits_pe… |
HappySeaFox |
sail |
2026-04-18T01:39:48.056Z | 2026-04-20T15:24:42.029Z |
| CVE-2026-40491 |
6.5 (3.1)
|
gdown Affected by Arbitrary File Write via Path Traver… |
wkentaro |
gdown |
2026-04-18T01:36:47.659Z | 2026-04-20T15:50:02.983Z |
| CVE-2026-40490 |
6.8 (3.1)
|
AsyncHttpClient leaks authorization credentials to unt… |
AsyncHttpClient |
async-http-client |
2026-04-18T01:31:13.860Z | 2026-04-20T14:55:50.254Z |
| CVE-2026-40489 |
8.6 (4.0)
|
editorconfig-core-c has incomplete fix for CVE-2023-0341 |
editorconfig |
editorconfig-core-c |
2026-04-18T01:24:57.278Z | 2026-04-20T16:15:31.570Z |
| CVE-2026-40487 |
8.9 (3.1)
|
Postiz Has Unrestricted File Upload via MIME Type Spoo… |
gitroomhq |
postiz-app |
2026-04-18T01:19:06.588Z | 2026-04-20T15:25:40.893Z |
| CVE-2026-35582 |
8.8 (3.1)
|
Emissary has an OS Command Injection via Unvalidated I… |
NationalSecurityAgency |
emissary |
2026-04-18T01:16:27.661Z | 2026-04-20T15:48:51.543Z |
| CVE-2026-1838 |
6.1 (3.1)
|
Hostel <= 1.1.6 - Reflected Cross-Site Scripting via '… |
prasunsen |
Hostel |
2026-04-18T01:26:04.643Z | 2026-04-20T14:19:29.627Z |
| CVE-2026-1559 |
6.4 (3.1)
|
Youzify <= 1.3.6 - Authenticated (Subscriber+) Stored … |
youzify |
Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress |
2026-04-18T01:26:05.210Z | 2026-04-20T13:46:08.353Z |
| CVE-2026-40572 |
9 (3.1)
|
NovumOS has Arbitrary Memory Mapping via Syscall 15 (M… |
MinecAnton209 |
NovumOS |
2026-04-18T00:16:02.590Z | 2026-04-20T14:55:57.521Z |
| CVE-2026-40350 |
8.8 (3.1)
|
Movary User Management (/settings/users) has Authoriza… |
leepeuker |
movary |
2026-04-18T00:07:33.324Z | 2026-04-20T16:15:39.915Z |
| CVE-2026-40317 |
9.4 (3.1)
|
NovumOS has Privilege Escalation in the Syscall Interface |
MinecAnton209 |
NovumOS |
2026-04-18T00:12:10.368Z | 2026-04-20T15:26:25.222Z |
| CVE-2026-35465 |
7.5 (3.1)
|
SecureDrop Client has path injection in read_gzip_head… |
freedomofpress |
securedrop-client |
2026-04-18T00:41:16.594Z | 2026-04-20T15:47:43.822Z |
| CVE-2026-40593 |
4.8 (3.1)
|
ChurchCRM: Stored XSS in UserEditor.php via Login Name Field |
ChurchCRM |
CRM |
2026-04-18T00:02:59.606Z | 2026-04-20T14:56:05.666Z |
| CVE-2026-40582 |
9.1 (4.0)
|
ChurchCRM: Authentication Bypass in `/api/public/user/… |
ChurchCRM |
CRM |
2026-04-17T23:16:13.862Z | 2026-04-20T14:56:36.921Z |
| CVE-2026-40581 |
8.1 (3.1)
|
ChurchCRM: Cross-Site Request Forgery (CSRF) in Select… |
ChurchCRM |
CRM |
2026-04-17T23:51:32.765Z | 2026-04-20T16:15:58.183Z |
| CVE-2026-40485 |
5.3 (3.1)
|
ChurchCRM: Username Enumeration via Differential Respo… |
ChurchCRM |
CRM |
2026-04-17T23:29:35.884Z | 2026-04-20T13:36:05.319Z |
| CVE-2026-40484 |
9.1 (3.1)
|
ChurchCRM: Authenticated Remote Code Execution via Unr… |
ChurchCRM |
CRM |
2026-04-17T23:25:06.319Z | 2026-04-20T14:56:29.684Z |
| CVE-2026-40483 |
5.4 (3.1)
|
ChurchCRM: Stored XSS in PledgeEditor.php via Donation… |
ChurchCRM |
CRM |
2026-04-17T23:20:44.900Z | 2026-04-20T16:16:17.841Z |
| CVE-2026-40482 |
7.1 (4.0)
|
ChurchCRM has Authenticated SQL Injection in `/api/fam… |
ChurchCRM |
CRM |
2026-04-17T22:58:48.528Z | 2026-04-20T16:16:32.247Z |
| CVE-2026-40480 |
7.1 (4.0)
|
ChurchCRM has Missing Object-Level Authorization / IDO… |
ChurchCRM |
CRM |
2026-04-17T23:07:30.126Z | 2026-04-20T16:16:00.433Z |
| CVE-2026-40349 |
8.8 (3.1)
|
Authenticated Movary User Can Self-Escalate to Adminis… |
leepeuker |
movary |
2026-04-18T00:05:46.360Z | 2026-04-20T16:15:49.844Z |
| CVE-2026-40348 |
7.7 (3.1)
|
Movary has Authenticated SSRF via Jellyfin Server URL … |
leepeuker |
movary |
2026-04-18T00:01:09.725Z | 2026-04-20T16:11:32.779Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-hv5g-26jg-pc45 |
8.0 (3.1)
|
Velociraptor vulnerability in the query() plugin which allows access to all orgs with the user's cu… | 2026-04-15T18:31:58Z | 2026-04-16T21:33:30Z |
| ghsa-hh5g-g7m5-5vxv |
9.8 (3.1)
|
A vulnerability in the integration of single sign-on (SSO) with Control Hub in Cisco Webex Services… | 2026-04-15T18:31:58Z | 2026-04-15T18:31:58Z |
| ghsa-g4ww-j67q-3j45 |
9.8 (3.1)
|
Slah CMS v1.5.0 and below was discovered to contain a remote code execution (RCE) vulnerability in … | 2026-04-15T18:31:58Z | 2026-04-16T15:31:32Z |
| ghsa-fjg2-h4xx-5w8c |
6.1 (3.1)
|
A vulnerability in the Desktop Agent functionality of Cisco Webex Contact Center could have allowed… | 2026-04-15T18:31:58Z | 2026-04-15T18:31:58Z |
| ghsa-7h37-949c-f3gp |
8.6 (3.1)
|
Slah CMS v1.5.0 and below was discovered to contain a SQL injection vulnerability via the id parame… | 2026-04-15T18:31:58Z | 2026-04-15T18:31:58Z |
| ghsa-6m6h-8f8v-r7j4 |
9.9 (3.1)
|
A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to exe… | 2026-04-15T18:31:58Z | 2026-04-15T18:31:58Z |
| ghsa-6fqc-22r3-wrxm |
9.9 (3.1)
|
A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attack… | 2026-04-15T18:31:58Z | 2026-04-15T18:31:58Z |
| ghsa-4w7q-f6rr-2p4r |
9.9 (3.1)
|
A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attack… | 2026-04-15T18:31:58Z | 2026-04-15T18:31:58Z |
| ghsa-wxm9-c4v7-5x34 |
4.7 (3.1)
|
A vulnerability in the web-based management interface of Cisco Unity Connection could allow an unau… | 2026-04-15T18:31:57Z | 2026-04-15T18:31:57Z |
| ghsa-wj2m-jvpr-64cq |
8.0 (3.1)
|
A prompt injection vulnerability in Windsurf 1.9544.26 allows remote attackers to execute arbitrary… | 2026-04-15T18:31:57Z | 2026-04-15T18:31:57Z |
| ghsa-w94v-hq49-38vh |
8.6 (3.1)
|
LangChain-ChatChat 0.3.1 contains a remote code execution vulnerability in its MCP STDIO server con… | 2026-04-15T18:31:57Z | 2026-04-15T21:30:17Z |
| ghsa-v3r6-6788-v9xh |
5.3 (3.1)
|
A vulnerability in the authentication service feature of Cisco AsyncOS Software for Cisco Secure We… | 2026-04-15T18:31:57Z | 2026-04-15T18:31:58Z |
| ghsa-rppc-c4xv-v29h |
8.6 (3.1)
|
Agent Zero 0.9.8 contains a remote code execution vulnerability in its External MCP Servers configu… | 2026-04-15T18:31:57Z | 2026-04-15T21:30:17Z |
| ghsa-qf4m-4g7r-r2qp |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in Zaytech Smart Online Order for Clover allows Cro… | 2026-04-15T18:31:57Z | 2026-04-23T15:38:53Z |
| ghsa-q6x9-g748-283m |
6.5 (3.1)
|
Multiple vulnerabilities in Cisco Unity Connection could allow an authenticated, remote attacker&nb… | 2026-04-15T18:31:57Z | 2026-04-15T18:31:57Z |
| ghsa-q6p9-89h2-c9h9 |
8.3 (3.1)
|
Daylight Studio FuelCMS v1.5.2 was discovered to contain an authenticated remote code execution (RC… | 2026-04-15T18:31:57Z | 2026-04-16T15:31:32Z |
| ghsa-q3rq-78c6-33vh |
7.3 (3.1)
|
Jaaz 1.0.30 contains a remote code execution vulnerability in its MCP STDIO command execution handl… | 2026-04-15T18:31:57Z | 2026-04-15T18:31:57Z |
| ghsa-m7v3-c773-h4rx |
7.6 (3.1)
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-04-15T18:31:57Z | 2026-04-23T18:32:56Z |
| ghsa-m2rm-r929-jjfm |
4.9 (3.1)
|
A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to per… | 2026-04-15T18:31:57Z | 2026-04-15T18:31:57Z |
| ghsa-jhj9-vq27-q5p9 |
9.3 (4.0)
|
The vulnerability, if exploited, could allow an unauthenticated miscreant to perform operations int… | 2026-04-15T18:31:57Z | 2026-04-15T18:31:57Z |
| ghsa-jfv6-pxrq-x78p |
4.8 (3.1)
|
Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (I… | 2026-04-15T18:31:57Z | 2026-04-15T18:31:57Z |
| ghsa-hj84-36vf-hc6f |
6.0 (3.1)
|
A vulnerability in the CLI of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Ident… | 2026-04-15T18:31:57Z | 2026-04-15T18:31:57Z |
| ghsa-gpm4-vrgj-h7qc |
4.3 (3.1)
|
In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform v… | 2026-04-15T18:31:57Z | 2026-04-15T18:31:57Z |
| ghsa-gj97-4w7h-79j2 |
7.1 (3.1)
|
In Splunk Enterprise versions below 10.2.1, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform v… | 2026-04-15T18:31:57Z | 2026-04-15T18:31:57Z |
| ghsa-cw73-5f7h-m4gv |
9.8 (3.1)
|
Upsonic: remote code execution vulnerability in its MCP server/task creation functionality | 2026-04-15T18:31:57Z | 2026-04-16T21:33:09Z |
| ghsa-9xj2-4996-7w4r |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-04-15T18:31:57Z | 2026-04-23T15:38:53Z |
| ghsa-9p4v-rc38-f32h |
6.5 (3.1)
|
Multiple vulnerabilities in Cisco Unity Connection could allow an authenticated, remote attacker&nb… | 2026-04-15T18:31:57Z | 2026-04-15T18:31:57Z |
| ghsa-83qv-c52p-jx5j |
6.1 (3.1)
|
A vulnerability in the web-based management interface of Cisco Unity Connection could allow an unau… | 2026-04-15T18:31:57Z | 2026-04-15T18:31:57Z |
| ghsa-7hj6-v8wx-jqjx |
9.3 (4.0)
|
Deserialization of untrusted data vulnerability in OpenText, Inc RightFax on Windows, 64 bit, 32 bi… | 2026-04-15T18:31:57Z | 2026-04-15T18:31:57Z |
| ghsa-6qfc-m9fp-c5rm |
7.2 (3.1)
|
In Splunk MCP Server app versions below 1.0.3 , a user who holds a role with access to the Splunk `… | 2026-04-15T18:31:57Z | 2026-04-15T18:31:57Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-685 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ac… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:24.947926Z |
| pysec-2021-684 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:24.786927Z |
| pysec-2021-683 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:24.626277Z |
| pysec-2021-682 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:24.446471Z |
| pysec-2021-681 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:24.280047Z |
| pysec-2021-679 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can re… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:23.959666Z |
| pysec-2021-678 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:23.792052Z |
| pysec-2021-677 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:23.626707Z |
| pysec-2021-676 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:23.467562Z |
| pysec-2021-675 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:23.303837Z |
| pysec-2021-674 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:23.143235Z |
| pysec-2021-673 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:22.966902Z |
| pysec-2021-672 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:22.808181Z |
| pysec-2021-671 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:22.627279Z |
| pysec-2021-670 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:22.335925Z |
| pysec-2021-669 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:22.170510Z |
| pysec-2021-668 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:22.008829Z |
| pysec-2021-667 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:21.834705Z |
| pysec-2021-666 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:21.673979Z |
| pysec-2021-665 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_op… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:21.512777Z |
| pysec-2021-664 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:21.353144Z |
| pysec-2021-663 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:21.193841Z |
| pysec-2021-662 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:20.961529Z |
| pysec-2021-661 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:20.792Z |
| pysec-2021-660 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:20.598497Z |
| pysec-2021-659 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:20.437161Z |
| pysec-2021-658 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can fo… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:20.263925Z |
| pysec-2021-657 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:20.083523Z |
| pysec-2021-656 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:19.918878Z |
| pysec-2021-655 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:19.746209Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1455 | Malicious code in native_dep (npm) | 2026-03-14T06:20:46Z | 2026-03-27T00:59:35Z |
| mal-2026-1421 | Malicious code in devlino (npm) | 2026-03-13T20:35:45Z | 2026-03-23T05:16:26Z |
| mal-2026-1422 | Malicious code in fastapi-middleware-cors (PyPI) | 2026-03-13T20:20:02Z | 2026-03-13T20:20:02Z |
| mal-2026-1420 | Malicious code in cw-isdk (npm) | 2026-03-13T15:38:25Z | 2026-04-15T03:24:23Z |
| mal-2026-1418 | Malicious code in tailwind-mainanimation (npm) | 2026-03-13T14:20:40Z | 2026-03-23T05:16:31Z |
| mal-2026-1419 | Malicious code in tailwindcss-style-modify (npm) | 2026-03-13T14:15:45Z | 2026-03-23T05:16:31Z |
| mal-2026-1412 | Malicious code in project47 (PyPI) | 2026-03-13T10:54:54Z | 2026-03-13T10:54:54Z |
| mal-2026-1409 | Malicious code in darkig (PyPI) | 2026-03-13T10:50:53Z | 2026-03-13T10:50:53Z |
| mal-2026-1410 | Malicious code in ighack (PyPI) | 2026-03-13T10:47:01Z | 2026-03-13T10:47:01Z |
| mal-2026-1411 | Malicious code in nfd (PyPI) | 2026-03-13T10:41:13Z | 2026-03-13T10:41:13Z |
| mal-2026-1417 | Malicious code in twitch.dashboard-v2.core (npm) | 2026-03-13T10:37:20Z | 2026-03-23T05:16:31Z |
| mal-2026-1416 | Malicious code in twitch-security (npm) | 2026-03-13T10:37:20Z | 2026-03-23T05:16:31Z |
| mal-2026-1415 | Malicious code in pulsard-utils (npm) | 2026-03-13T10:37:20Z | 2026-03-23T05:16:30Z |
| mal-2026-1414 | Malicious code in hardhat2-config (npm) | 2026-03-13T10:37:20Z | 2026-03-23T05:16:27Z |
| mal-2026-1413 | Malicious code in brlc-base (npm) | 2026-03-13T10:37:19Z | 2026-03-23T05:16:25Z |
| mal-2026-1408 | Malicious code in nai (PyPI) | 2026-03-13T10:31:39Z | 2026-03-13T10:31:39Z |
| mal-2026-1407 | Malicious code in thief-utils (PyPI) | 2026-03-13T08:43:52Z | 2026-04-01T12:28:04Z |
| mal-2026-1406 | Malicious code in makenotion-ppetest (PyPI) | 2026-03-13T08:13:53Z | 2026-04-01T12:28:04Z |
| mal-2026-1456 | Malicious code in rrweb-v1 (npm) | 2026-03-13T07:10:46Z | 2026-03-23T05:16:30Z |
| mal-2026-1400 | Malicious code in solana-pumpfun-sdk (npm) | 2026-03-13T06:55:58Z | 2026-03-23T05:16:30Z |
| mal-2026-1399 | Malicious code in pino-sdk (npm) | 2026-03-13T06:55:58Z | 2026-04-16T15:42:09Z |
| mal-2026-1392 | Malicious code in @dinzid04/libsignal-node (npm) | 2026-03-13T06:54:12Z | 2026-03-23T05:16:24Z |
| mal-2026-1391 | Malicious code in @dinzid04/baileys (npm) | 2026-03-13T06:54:12Z | 2026-03-23T05:16:24Z |
| mal-2026-1401 | Malicious code in tailwindcss-animation-advanced (npm) | 2026-03-13T06:51:42Z | 2026-03-23T05:16:31Z |
| mal-2026-1393 | Malicious code in cortana-md-bot (npm) | 2026-03-13T06:48:27Z | 2026-03-23T05:16:26Z |
| mal-2026-1390 | Malicious code in @depro-tech/cortana-md (npm) | 2026-03-13T06:48:27Z | 2026-03-23T05:16:24Z |
| mal-2026-1404 | Malicious code in whatsapp-core-auth-drzak (npm) | 2026-03-13T06:47:07Z | 2026-04-16T15:42:10Z |
| mal-2026-1398 | Malicious code in meta-internal-logger-drzak (npm) | 2026-03-13T06:47:07Z | 2026-04-16T15:42:09Z |
| mal-2026-1405 | Malicious code in whatsapp-fastdesk-utils-drzak (npm) | 2026-03-13T06:47:06Z | 2026-04-16T15:42:10Z |
| mal-2026-1403 | Malicious code in tradepmr-fusion-core-drzak (npm) | 2026-03-13T06:47:06Z | 2026-04-16T15:42:10Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1620 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-07-21T22:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-1619 | Dell PowerScale: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-21T22:00:00.000+00:00 | 2025-07-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1618 | Kubernetes Image Builder: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2025-07-21T22:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1617 | IBM Cognos Analytics: Mehrere Schwachstellen | 2025-07-21T22:00:00.000+00:00 | 2025-07-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1616 | Dell BIOS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-07-21T22:00:00.000+00:00 | 2025-07-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1615 | Sophos Firewall: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-07-21T22:00:00.000+00:00 | 2025-07-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1614 | PowerDNS: Schwachstelle ermöglicht Denial of Service | 2025-07-21T22:00:00.000+00:00 | 2025-08-24T22:00:00.000+00:00 |
| wid-sec-w-2025-1613 | Linux Kernel: Mehrere Schwachstellen | 2025-07-20T22:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1612 | WordPress: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-20T22:00:00.000+00:00 | 2025-07-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1611 | Dell Avamar: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-20T22:00:00.000+00:00 | 2025-08-04T22:00:00.000+00:00 |
| wid-sec-w-2025-1610 | Acronis Cyber Protect Cloud Agent: Schwachstelle ermöglicht Privilegieneskalation | 2025-07-20T22:00:00.000+00:00 | 2025-08-28T22:00:00.000+00:00 |
| wid-sec-w-2025-1609 | Trellix Endpoint Security (HX) Agent: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2025-07-20T22:00:00.000+00:00 | 2025-09-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1608 | CrushFTP: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2025-07-20T22:00:00.000+00:00 | 2025-07-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1607 | Keycloak: Schwachstelle ermöglicht Privilegieneskalation | 2025-07-20T22:00:00.000+00:00 | 2025-07-28T22:00:00.000+00:00 |
| wid-sec-w-2025-1606 | Joomla Extensions: Mehrere Schwachstellen | 2025-07-20T22:00:00.000+00:00 | 2025-07-20T22:00:00.000+00:00 |
| wid-sec-w-2025-1605 | OpenCTI: Schwachstelle ermöglicht Manipulation von Dateien | 2025-07-20T22:00:00.000+00:00 | 2025-07-20T22:00:00.000+00:00 |
| wid-sec-w-2025-1604 | ESET Endpoint Security: Schwachstelle ermöglicht Manipulation von Dateien | 2025-07-20T22:00:00.000+00:00 | 2025-07-20T22:00:00.000+00:00 |
| wid-sec-w-2025-1598 | Microsoft SharePoint (On-premises): Mehrere Schwachstellen | 2025-07-20T22:00:00.000+00:00 | 2025-07-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1596 | Linux Kernel: Schwachstelle ermöglicht Denial of Service und nicht spezifizierten Angriff | 2025-07-17T22:00:00.000+00:00 | 2026-03-09T23:00:00.000+00:00 |
| wid-sec-w-2025-1595 | IBM AIX und VIOS (SQLite): Mehrere Schwachstellen | 2025-07-17T22:00:00.000+00:00 | 2025-07-17T22:00:00.000+00:00 |
| wid-sec-w-2025-1594 | IBM Tivoli Netcool/OMNIbus (Eclipse OMR): Mehrere Schwachstellen | 2025-07-17T22:00:00.000+00:00 | 2025-07-17T22:00:00.000+00:00 |
| wid-sec-w-2025-1593 | Grafana: Mehrere Schwachstellen | 2025-07-17T22:00:00.000+00:00 | 2025-12-18T23:00:00.000+00:00 |
| wid-sec-w-2025-1592 | Red Hat Ansible Automation Platform: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-17T22:00:00.000+00:00 | 2025-08-04T22:00:00.000+00:00 |
| wid-sec-w-2025-1591 | IBM WebSphere Application Server: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-17T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1590 | 7-Zip: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-17T22:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1589 | Apache Tomcat: Schwachstelle ermöglicht Denial of Service | 2025-07-17T22:00:00.000+00:00 | 2025-07-17T22:00:00.000+00:00 |
| wid-sec-w-2025-1588 | Cisco Identity Services Engine (ISE): Mehrere Schwachstellen | 2025-07-16T22:00:00.000+00:00 | 2025-07-16T22:00:00.000+00:00 |
| wid-sec-w-2025-1587 | Drupal-Module: Mehrere Schwachstellen | 2025-07-16T22:00:00.000+00:00 | 2025-07-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1586 | Cisco Unified Intelligence Center: Mehrere Schwachstellen | 2025-07-16T22:00:00.000+00:00 | 2025-07-16T22:00:00.000+00:00 |
| wid-sec-w-2025-1585 | Internet Systems Consortium BIND: Mehrere Schwachstellen | 2025-07-16T22:00:00.000+00:00 | 2025-07-17T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-195-15 | Siemens SIMATIC eaSie Core Package | 2022-07-12T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-195-14 | Siemens CPC80 Firmware of SICAM A8000 | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-195-13 | Siemens Mendix | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-195-12 | Siemens SRCS VPN Feature in SIMATIC CP Devices | 2022-07-12T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-22-195-11 | Open Design Alliance Drawings SDK | 2022-07-12T00:00:00.000000Z | 2022-09-13T00:00:00.000000Z |
| icsa-22-195-10 | Siemens Mendix Applications | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-195-09 | Simcenter Femap and Parasolid | 2022-07-12T00:00:00.000000Z | 2022-09-13T00:00:00.000000Z |
| icsa-22-195-08 | Siemens PADS Standard/Plus Viewer | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-195-07 | Siemens Datalogics File Parsing Vulnerability | 2022-07-12T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-195-06 | Siemens Mendix Excel Importer | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-195-05 | Siemens RUGGEDCOM ROX | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-195-04 | Siemens Simcenter Femap | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-195-03 | Siemens SIMATIC MV500 Devices | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-195-02 | Siemens SICAM GridEdge | 2022-07-12T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-22-195-01 | Siemens SCALANCE X Switch Devices | 2022-07-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-193-01 | Dahua ASI7213X-T1 (Update A) | 2022-07-12T00:00:00.000000Z | 2022-07-19T00:00:00.000000Z |
| icsa-22-188-02 | Bently Nevada ADAPT 3701/4X Series and 60M100 | 2022-07-07T00:00:00.000000Z | 2022-07-07T00:00:00.000000Z |
| icsa-22-188-01 | Rockwell Automation MicroLogix | 2022-07-07T00:00:00.000000Z | 2022-07-07T00:00:00.000000Z |
| icsa-25-182-04 | FESTO Hardware Controller, Hardware Servo Press Kit | 2022-07-06T07:00:00.000000Z | 2025-06-23T08:00:00.000000Z |
| icsa-22-181-04 | Distributed Data Systems WebHMI | 2022-06-30T00:00:00.000000Z | 2022-06-30T00:00:00.000000Z |
| icsa-22-181-03 | Emerson DeltaV Distributed Control System | 2022-06-30T00:00:00.000000Z | 2022-06-30T00:00:00.000000Z |
| icsa-22-181-02 | Yokogawa Wide Area Communication Router | 2022-06-30T00:00:00.000000Z | 2022-06-30T00:00:00.000000Z |
| icsa-22-181-01 | Exemys RME1 | 2022-06-30T00:00:00.000000Z | 2022-06-30T00:00:00.000000Z |
| icsa-22-179-06 | Motorola Solutions ACE1000 | 2022-06-28T00:00:00.000000Z | 2022-06-28T00:00:00.000000Z |
| icsa-22-179-05 | Motorola Solutions MDLC | 2022-06-28T00:00:00.000000Z | 2022-06-28T00:00:00.000000Z |
| icsa-22-179-04 | Motorola Solutions MOSCAD IP and ACE IP Gateways | 2022-06-28T00:00:00.000000Z | 2022-06-28T00:00:00.000000Z |
| icsa-22-179-03 | Advantech iView | 2022-06-28T00:00:00.000000Z | 2022-06-28T00:00:00.000000Z |
| icsa-22-179-02 | Omron SYSMAC CS/CJ/CP Series and NJ/NX Series | 2022-06-28T00:00:00.000000Z | 2022-06-28T00:00:00.000000Z |
| icsa-22-179-01 | ABB e-Design | 2022-06-28T00:00:00.000000Z | 2022-06-28T00:00:00.000000Z |
| icsma-22-174-01 | OFFIS DCMTK | 2022-06-23T00:00:00.000000Z | 2022-06-23T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20200226-nxos-api-dos | Cisco NX-OS Software NX-API Denial of Service Vulnerability | 2020-02-26T16:00:00+00:00 | 2020-02-26T16:00:00+00:00 |
| cisco-sa-20200226-nexus-1000v-dos | Cisco Nexus 1000V Switch for VMware vSphere Secure Login Enhancements Denial of Service Vulnerability | 2020-02-26T16:00:00+00:00 | 2020-02-26T16:00:00+00:00 |
| cisco-sa-20200226-mds-ovrld-dos | Cisco MDS 9000 Series Switches Denial of Service Vulnerability | 2020-02-26T16:00:00+00:00 | 2020-05-21T15:32:26+00:00 |
| cisco-sa-20200226-fxos-ucs-cmdinj | Cisco FXOS and UCS Manager Software CLI Command Injection Vulnerability | 2020-02-26T16:00:00+00:00 | 2020-03-06T16:42:35+00:00 |
| cisco-sa-20200226-fxos-ucs-cli-cmdinj | Cisco FXOS and UCS Manager Software Local Management CLI Command Injection Vulnerability | 2020-02-26T16:00:00+00:00 | 2020-03-06T16:42:36+00:00 |
| cisco-sa-20200226-fxos-nxos-cdp | Cisco FXOS and NX-OS Software Cisco Discovery Protocol Arbitrary Code Execution and Denial of Service Vulnerability | 2020-02-26T16:00:00+00:00 | 2020-03-06T16:42:38+00:00 |
| cisco-sa-20200226-fxos-cli-file | Cisco FXOS Software CLI Arbitrary File Read and Write Vulnerability | 2020-02-26T16:00:00+00:00 | 2020-03-10T18:18:14+00:00 |
| cisco-sa-20200226-fpwr-cmdinj | Cisco FXOS Software CLI Command Injection Vulnerability | 2020-02-26T16:00:00+00:00 | 2020-02-26T16:00:00+00:00 |
| cisco-sa-uccx-privesc-zd7bvwyf | Cisco Unified Contact Center Express Privilege Escalation Vulnerability | 2020-02-19T16:00:00+00:00 | 2020-04-02T15:27:05+00:00 |
| cisco-sa-ucce-tip-dos-7cdluasb | Cisco Unified Contact Center Enterprise Denial of Service Vulnerability | 2020-02-19T16:00:00+00:00 | 2020-02-19T16:00:00+00:00 |
| cisco-sa-on-prem-static-cred-sl8rds8 | Cisco Smart Software Manager On-Prem Static Default Credential Vulnerability | 2020-02-19T16:00:00+00:00 | 2020-02-19T16:00:00+00:00 |
| cisco-sa-nfvis-codex-shs4nhvs | Cisco Enterprise NFV Infrastructure Software Remote Code Execution Vulnerability | 2020-02-19T16:00:00+00:00 | 2020-02-19T16:00:00+00:00 |
| cisco-sa-ise-xss-s3ekckch | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2020-02-19T16:00:00+00:00 | 2020-02-19T16:00:00+00:00 |
| cisco-sa-finesse-xss-6ogfqkut | Cisco Finesse Web-Based Management Interface Cross-Site Scripting Vulnerability | 2020-02-19T16:00:00+00:00 | 2020-02-19T16:00:00+00:00 |
| cisco-sa-esa-shrt-dos-wm54r8qa | Cisco Email Security Appliance Shortened URL Denial of Service Vulnerability | 2020-02-19T16:00:00+00:00 | 2020-02-19T16:00:00+00:00 |
| cisco-sa-cws-inject-6ytdx7ao | Cisco Cloud Web Security SQL Injection Vulnerability | 2020-02-19T16:00:00+00:00 | 2020-02-19T16:00:00+00:00 |
| cisco-sa-cms-xmpp-dos-ptfgusbx | Cisco Meeting Server Extensible Messaging and Presence Protocol Denial of Service Vulnerability | 2020-02-19T16:00:00+00:00 | 2020-02-19T16:00:00+00:00 |
| cisco-sa-ac-win-path-traverse-qo4hwbsj | Cisco AnyConnect Secure Mobility Client for Windows Uncontrolled Search Path Vulnerability | 2020-02-19T16:00:00+00:00 | 2022-10-25T13:31:56+00:00 |
| cisco-sa-20200219-ucs-boot-bypass | Multiple Cisco UCS-Based Products UEFI Secure Boot Bypass Vulnerability | 2020-02-19T16:00:00+00:00 | 2020-06-01T13:56:07+00:00 |
| cisco-sa-20200219-esa-sma-dos | Cisco Email Security Appliance and Cisco Content Security Management Appliance Denial of Service Vulnerability | 2020-02-19T16:00:00+00:00 | 2020-02-19T16:00:00+00:00 |
| cisco-sa-20200219-esa-dos | Cisco Email Security Appliance Denial of Service Vulnerability | 2020-02-19T16:00:00+00:00 | 2020-02-19T16:00:00+00:00 |
| cisco-sa-20200219-dcnm-xss | Cisco Data Center Network Manager Stored Cross-Site Scripting Vulnerability | 2020-02-19T16:00:00+00:00 | 2020-02-19T16:00:00+00:00 |
| cisco-sa-20200219-dcnm-priv-esc | Cisco Data Center Network Manager Privilege Escalation Vulnerability | 2020-02-19T16:00:00+00:00 | 2020-02-19T16:00:00+00:00 |
| cisco-sa-20200219-dcnm-csrf | Cisco Data Center Network Manager Cross-Site Request Forgery Vulnerability | 2020-02-19T16:00:00+00:00 | 2020-02-19T16:00:00+00:00 |
| cisco-sa-ise-xss-dxjsrwrx | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | 2020-02-05T16:00:00+00:00 | 2020-02-05T16:00:00+00:00 |
| cisco-sa-20200205-voip-phones-rce-dos | Cisco IP Phone Remote Code Execution and Denial of Service Vulnerability | 2020-02-05T16:00:00+00:00 | 2020-02-25T13:47:32+00:00 |
| cisco-sa-20200205-nxos-cdp-rce | Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability | 2020-02-05T16:00:00+00:00 | 2020-02-14T20:08:04+00:00 |
| cisco-sa-20200205-ipcameras-rce-dos | Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Remote Code Execution and Denial of Service Vulnerability | 2020-02-05T16:00:00+00:00 | 2020-02-05T16:00:00+00:00 |
| cisco-sa-20200205-iosxr-cdp-rce | Cisco IOS XR Software Cisco Discovery Protocol Format String Vulnerability | 2020-02-05T16:00:00+00:00 | 2020-10-20T18:23:29+00:00 |
| cisco-sa-20200205-fxnxos-iosxr-cdp-dos | Cisco FXOS, IOS XR, and NX-OS Software Cisco Discovery Protocol Denial of Service Vulnerability | 2020-02-05T16:00:00+00:00 | 2020-02-21T20:46:35+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-34297 | KissFFT Integer Overflow Heap Buffer Overflow via kiss_fft_alloc | 2025-12-02T00:00:00.000Z | 2025-12-09T01:38:14.000Z |
| msrc_cve-2025-2296 | Un-verified kernel bypass Secure Boot mechanism in direct boot mode | 2025-12-02T00:00:00.000Z | 2026-01-08T01:38:35.000Z |
| msrc_cve-2025-15284 | arrayLimit bypass in bracket notation allows DoS via memory exhaustion | 2025-12-02T00:00:00.000Z | 2026-01-08T01:40:35.000Z |
| msrc_cve-2025-14523 | Libsoup: libsoup: duplicate host header handling causes host-parsing discrepancy (first- vs last-value wins) | 2025-12-02T00:00:00.000Z | 2026-04-15T01:39:52.000Z |
| msrc_cve-2025-14512 | Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow | 2025-12-02T00:00:00.000Z | 2026-01-08T14:43:54.000Z |
| msrc_cve-2025-14180 | NULL Pointer Dereference in PDO quoting | 2025-12-02T00:00:00.000Z | 2026-01-21T01:40:22.000Z |
| msrc_cve-2025-14178 | Heap buffer overflow in array_merge() | 2025-12-02T00:00:00.000Z | 2026-02-18T02:42:39.000Z |
| msrc_cve-2025-14177 | Information Leak of Memory in getimagesize | 2025-12-02T00:00:00.000Z | 2026-02-18T02:41:55.000Z |
| msrc_cve-2025-14104 | Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames | 2025-12-02T00:00:00.000Z | 2026-01-08T14:44:17.000Z |
| msrc_cve-2025-14087 | Glib: glib: buffer underflow in gvariant parser leads to heap corruption | 2025-12-02T00:00:00.000Z | 2026-01-08T14:43:42.000Z |
| msrc_cve-2025-13912 | Potential non-constant time compiled code with Clang LLVM | 2025-12-02T00:00:00.000Z | 2026-01-13T01:38:22.000Z |
| msrc_cve-2025-13837 | Out-of-memory when loading Plist | 2025-12-02T00:00:00.000Z | 2026-03-31T15:13:04.000Z |
| msrc_cve-2025-13836 | Excessive read buffering DoS in http.client | 2025-12-02T00:00:00.000Z | 2026-01-08T14:41:06.000Z |
| msrc_cve-2025-13699 | MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability | 2025-12-02T00:00:00.000Z | 2026-01-03T01:36:02.000Z |
| msrc_cve-2025-13281 | Portworx Half-Blind SSRF in kube-controller-manager | 2025-12-02T00:00:00.000Z | 2026-01-08T14:44:38.000Z |
| msrc_cve-2025-12819 | Untrusted search path in auth_query connection in PgBouncer | 2025-12-02T00:00:00.000Z | 2025-12-23T01:37:37.000Z |
| msrc_cve-2025-12385 | Improper validation of <img> tag size in Text component parser | 2025-12-02T00:00:00.000Z | 2026-03-18T14:35:44.000Z |
| msrc_cve-2025-12084 | Quadratic complexity in node ID cache clearing | 2025-12-02T00:00:00.000Z | 2026-03-03T15:02:48.000Z |
| msrc_cve-2025-11964 | OOBW in utf_16le_to_utf_8_truncated() in libpcap | 2025-12-02T00:00:00.000Z | 2026-01-06T01:35:42.000Z |
| msrc_cve-2025-11961 | OOBR and OOBW in pcap_ether_aton() in libpcap | 2025-12-02T00:00:00.000Z | 2026-03-03T14:49:25.000Z |
| msrc_cve-2025-10543 | CVE-2025-10543 | 2025-12-02T00:00:00.000Z | 2026-01-08T14:41:52.000Z |
| msrc_cve-2023-54207 | HID: uclogic: Correct devm device reference for hidinput input_dev name | 2025-12-02T00:00:00.000Z | 2026-03-03T14:56:41.000Z |
| msrc_cve-2023-54161 | af_unix: Fix null-ptr-deref in unix_stream_sendpage(). | 2025-12-02T00:00:00.000Z | 2025-12-26T14:36:26.000Z |
| msrc_cve-2023-54082 | af_unix: Fix null-ptr-deref in unix_stream_sendpage(). | 2025-12-02T00:00:00.000Z | 2025-12-26T14:37:53.000Z |
| msrc_cve-2023-54061 | x86: fix clear_user_rep_good() exception handling annotation | 2025-12-02T00:00:00.000Z | 2025-12-26T14:38:55.000Z |
| msrc_cve-2023-53749 | x86: fix clear_user_rep_good() exception handling annotation | 2025-12-02T00:00:00.000Z | 2025-12-09T01:01:20.000Z |
| msrc_cve-2025-60710 | Host Process for Windows Tasks Elevation of Privilege Vulnerability | 2025-11-11T08:00:00.000Z | 2026-01-02T08:00:00.000Z |
| msrc_cve-2025-64660 | GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-25T00:00:00.000Z |
| msrc_cve-2025-64657 | Azure Application Gateway Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-20T00:00:00.000Z |
| msrc_cve-2025-64656 | Azure Application Gateway Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-20T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:14991-1 | libsqlite3-0-3.49.1-3.1 on GA media | 2025-04-14T00:00:00Z | 2025-04-14T00:00:00Z |
| opensuse-su-2025:14990-1 | rekor-1.3.10-1.1 on GA media | 2025-04-14T00:00:00Z | 2025-04-14T00:00:00Z |
| opensuse-su-2025:14989-1 | flannel-0.26.6-1.1 on GA media | 2025-04-14T00:00:00Z | 2025-04-14T00:00:00Z |
| opensuse-su-2025:14988-1 | cosign-2.5.0-1.1 on GA media | 2025-04-14T00:00:00Z | 2025-04-14T00:00:00Z |
| opensuse-su-2025:0120-1 | Security update for chromium | 2025-04-13T13:37:12Z | 2025-04-13T13:37:12Z |
| opensuse-su-2025:14987-1 | python311-PyJWT-2.10.1-2.1 on GA media | 2025-04-11T00:00:00Z | 2025-04-11T00:00:00Z |
| opensuse-su-2025:14986-1 | python311-Django-5.1.8-1.1 on GA media | 2025-04-11T00:00:00Z | 2025-04-11T00:00:00Z |
| opensuse-su-2025:14985-1 | docker-27.5.1_ce-15.1 on GA media | 2025-04-11T00:00:00Z | 2025-04-11T00:00:00Z |
| opensuse-su-2025:14984-1 | liblzma5-32bit-5.8.1-1.1 on GA media | 2025-04-10T00:00:00Z | 2025-04-10T00:00:00Z |
| opensuse-su-2025:14983-1 | pgadmin4-9.2-1.1 on GA media | 2025-04-10T00:00:00Z | 2025-04-10T00:00:00Z |
| opensuse-su-2025:14982-1 | govulncheck-vulndb-0.0.20250409T170536-1.1 on GA media | 2025-04-10T00:00:00Z | 2025-04-10T00:00:00Z |
| opensuse-su-2025:14981-1 | fontforge-20230101-6.1 on GA media | 2025-04-10T00:00:00Z | 2025-04-10T00:00:00Z |
| opensuse-su-2025:14980-1 | docker-stable-24.0.9_ce-9.1 on GA media | 2025-04-10T00:00:00Z | 2025-04-10T00:00:00Z |
| opensuse-su-2025:0117-1 | Security update for doomsday | 2025-04-09T06:48:33Z | 2025-04-09T06:48:33Z |
| opensuse-su-2025:14979-1 | openvpn-2.6.14-1.1 on GA media | 2025-04-09T00:00:00Z | 2025-04-09T00:00:00Z |
| opensuse-su-2025:14978-1 | govulncheck-vulndb-0.0.20250408T210408-1.1 on GA media | 2025-04-09T00:00:00Z | 2025-04-09T00:00:00Z |
| opensuse-su-2025:14977-1 | c-ares-devel-1.34.5-1.1 on GA media | 2025-04-09T00:00:00Z | 2025-04-09T00:00:00Z |
| opensuse-su-2025:14976-1 | libpoppler-cpp2-25.04.0-1.1 on GA media | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| opensuse-su-2025:14975-1 | libmozjs-128-0-128.9.0-1.1 on GA media | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| opensuse-su-2025:14974-1 | ffmpeg-7-7.1.1-1.1 on GA media | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| opensuse-su-2025:14973-1 | etcd-3.5.21-1.1 on GA media | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| opensuse-su-2025:14972-1 | apache2-mod_auth_openidc-2.4.16.11-1.1 on GA media | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| opensuse-su-2025:14971-1 | MozillaFirefox-137.0-1.1 on GA media | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| opensuse-su-2025:0115-1 | Security update for chromium, gn | 2025-04-06T23:02:41Z | 2025-04-06T23:02:41Z |
| opensuse-su-2025:14970-1 | govulncheck-vulndb-0.0.20250402T160203-1.1 on GA media | 2025-04-04T00:00:00Z | 2025-04-04T00:00:00Z |
| opensuse-su-2025:14969-1 | google-guest-agent-20250327.01-1.1 on GA media | 2025-04-04T00:00:00Z | 2025-04-04T00:00:00Z |
| opensuse-su-2025:14968-1 | cyradm-3.8.4-1.1 on GA media | 2025-04-04T00:00:00Z | 2025-04-04T00:00:00Z |
| opensuse-su-2025:14967-1 | chromedriver-135.0.7049.52-2.1 on GA media | 2025-04-04T00:00:00Z | 2025-04-04T00:00:00Z |
| opensuse-su-2025:14966-1 | MozillaThunderbird-128.9.0-1.1 on GA media | 2025-04-04T00:00:00Z | 2025-04-04T00:00:00Z |
| opensuse-su-2025:14965-1 | python311-ecdsa-0.19.1-1.1 on GA media | 2025-04-03T00:00:00Z | 2025-04-03T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:0139 | Red Hat Security Advisory: httpd security update | 2026-01-06T15:24:18+00:00 | 2026-04-08T16:37:44+00:00 |
| rhsa-2026:0137 | Red Hat Security Advisory: mariadb security update | 2026-01-06T14:45:44+00:00 | 2026-04-13T20:00:19+00:00 |
| rhsa-2026:0136 | Red Hat Security Advisory: mariadb10.11 security update | 2026-01-06T13:46:18+00:00 | 2026-04-14T09:45:59+00:00 |
| rhsa-2026:0135 | Red Hat Security Advisory: tar security update | 2026-01-06T13:36:23+00:00 | 2026-03-18T03:14:49+00:00 |
| rhsa-2026:0134 | Red Hat Security Advisory: Red Hat build of Quarkus 3.27.1.SP1 security update | 2026-01-06T13:22:25+00:00 | 2026-03-24T13:18:08+00:00 |
| rhsa-2026:0131 | Red Hat Security Advisory: Red Hat build of Quarkus 3.20.4.SP1 security update | 2026-01-06T13:12:23+00:00 | 2026-03-24T13:18:08+00:00 |
| rhsa-2026:0130 | Red Hat Security Advisory: poppler security update | 2026-01-06T13:10:58+00:00 | 2026-03-18T03:15:28+00:00 |
| rhsa-2026:0124 | Red Hat Security Advisory: thunderbird security update | 2026-01-06T12:07:51+00:00 | 2026-03-18T03:13:51+00:00 |
| rhsa-2026:0126 | Red Hat Security Advisory: poppler security update | 2026-01-06T11:57:21+00:00 | 2026-03-18T03:15:28+00:00 |
| rhsa-2026:0128 | Red Hat Security Advisory: poppler security update | 2026-01-06T11:36:21+00:00 | 2026-03-18T03:15:28+00:00 |
| rhsa-2026:0127 | Red Hat Security Advisory: firefox security update | 2026-01-06T11:28:47+00:00 | 2026-03-18T03:13:51+00:00 |
| rhsa-2026:0125 | Red Hat Security Advisory: mingw-libpng security update | 2026-01-06T11:25:54+00:00 | 2026-04-13T20:00:18+00:00 |
| rhea-2026:0129 | Red Hat Enhancement Advisory: OpenShift Virtualization 4.17.39 Images | 2026-01-06T11:25:38+00:00 | 2026-03-26T11:45:15+00:00 |
| rhsa-2026:0123 | Red Hat Security Advisory: python3.12 security update | 2026-01-06T10:47:27+00:00 | 2026-04-13T20:00:18+00:00 |
| rhsa-2026:0111 | Red Hat Security Advisory: mariadb security update | 2026-01-06T08:07:07+00:00 | 2026-04-13T20:00:17+00:00 |
| rhsa-2026:0112 | Red Hat Security Advisory: mariadb security update | 2026-01-06T08:05:42+00:00 | 2026-04-13T20:00:17+00:00 |
| rhsa-2026:0108 | Red Hat Security Advisory: gcc-toolset-15-binutils security update | 2026-01-06T07:05:36+00:00 | 2026-04-13T20:00:16+00:00 |
| rhsa-2026:0094 | Red Hat Security Advisory: mod_md security update | 2026-01-06T05:05:51+00:00 | 2026-03-18T03:15:22+00:00 |
| rhsa-2026:0090 | Red Hat Security Advisory: httpd security update | 2026-01-06T05:04:06+00:00 | 2026-04-08T16:37:43+00:00 |
| rhsa-2026:0093 | Red Hat Security Advisory: mod_md security update | 2026-01-06T01:44:58+00:00 | 2026-03-18T03:15:23+00:00 |
| rhsa-2026:0095 | Red Hat Security Advisory: httpd security update | 2026-01-06T01:23:46+00:00 | 2026-04-08T16:37:44+00:00 |
| rhsa-2026:0092 | Red Hat Security Advisory: mod_md security update | 2026-01-06T00:47:11+00:00 | 2026-03-18T03:15:25+00:00 |
| rhsa-2026:0079 | Red Hat Security Advisory: perl security update | 2026-01-05T21:25:35+00:00 | 2026-03-18T03:15:16+00:00 |
| rhsa-2026:0075 | Red Hat Security Advisory: httpd security update | 2026-01-05T19:42:42+00:00 | 2026-04-08T16:37:42+00:00 |
| rhsa-2026:0067 | Red Hat Security Advisory: tar security update | 2026-01-05T19:01:10+00:00 | 2026-03-18T03:14:46+00:00 |
| rhsa-2026:0077 | Red Hat Security Advisory: spice-client-win security update | 2026-01-05T18:07:35+00:00 | 2026-04-13T20:14:01+00:00 |
| rhsa-2026:0076 | Red Hat Security Advisory: spice-client-win security update | 2026-01-05T18:01:00+00:00 | 2026-04-13T20:13:56+00:00 |
| rhsa-2026:0074 | Red Hat Security Advisory: httpd security update | 2026-01-05T18:00:45+00:00 | 2026-04-08T16:37:42+00:00 |
| rhsa-2026:0078 | Red Hat Security Advisory: spice-client-win security update | 2026-01-05T17:40:30+00:00 | 2026-04-13T20:13:57+00:00 |
| rhsa-2026:0061 | Red Hat Security Advisory: mariadb security update | 2026-01-05T12:22:55+00:00 | 2026-04-13T20:00:16+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0144-1 | Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 15 SP7) | 2026-01-17T11:04:22Z | 2026-01-17T11:04:22Z |
| suse-su-2026:0143-1 | Security update for avahi | 2026-01-17T11:04:15Z | 2026-01-17T11:04:15Z |
| suse-su-2026:20246-1 | Security update for ovmf | 2026-01-16T13:04:57Z | 2026-01-16T13:04:57Z |
| suse-su-2026:20245-1 | Security update for libsoup | 2026-01-16T12:54:13Z | 2026-01-16T12:54:13Z |
| suse-su-2026:0133-1 | Security update for python | 2026-01-16T09:19:41Z | 2026-01-16T09:19:41Z |
| suse-su-2026:20090-1 | Security update for cpp-httplib | 2026-01-15T22:11:51Z | 2026-01-15T22:11:51Z |
| suse-su-2026:20089-1 | Security update for alloy | 2026-01-15T17:57:53Z | 2026-01-15T17:57:53Z |
| suse-su-2026:20088-1 | Security update for erlang | 2026-01-15T17:32:55Z | 2026-01-15T17:32:55Z |
| suse-su-2026:20086-1 | Security update for MozillaFirefox | 2026-01-15T16:33:38Z | 2026-01-15T16:33:38Z |
| suse-su-2026:0130-1 | Security update for python310 | 2026-01-15T13:11:09Z | 2026-01-15T13:11:09Z |
| suse-su-2026:20244-1 | Security update for elemental-toolkit, elemental-operator | 2026-01-15T11:08:38Z | 2026-01-15T11:08:38Z |
| suse-su-2026:20085-1 | Security update for bind | 2026-01-15T10:43:50Z | 2026-01-15T10:43:50Z |
| suse-su-2026:20358-1 | Security update for curl | 2026-01-15T09:31:41Z | 2026-01-15T09:31:41Z |
| suse-su-2026:20357-1 | Security update for elemental-toolkit, elemental-operator | 2026-01-15T09:23:45Z | 2026-01-15T09:23:45Z |
| suse-su-2026:0125-1 | Security update for podman | 2026-01-14T16:57:37Z | 2026-01-14T16:57:37Z |
| suse-su-2026:0123-1 | Security update for libsoup | 2026-01-14T13:47:28Z | 2026-01-14T13:47:28Z |
| suse-su-2026:20084-1 | Security update for tomcat | 2026-01-14T13:17:56Z | 2026-01-14T13:17:56Z |
| suse-su-2026:20081-1 | Security update for apache2 | 2026-01-14T11:03:13Z | 2026-01-14T11:03:13Z |
| suse-su-2026:20110-1 | Security update for curl | 2026-01-14T10:58:55Z | 2026-01-14T10:58:55Z |
| suse-su-2026:20082-1 | Security update for curl | 2026-01-14T10:58:55Z | 2026-01-14T10:58:55Z |
| suse-su-2026:20092-1 | Security update for haproxy | 2026-01-14T10:57:49Z | 2026-01-14T10:57:49Z |
| suse-su-2026:20109-1 | Security update for haproxy | 2026-01-14T10:55:40Z | 2026-01-14T10:55:40Z |
| suse-su-2026:20094-1 | Security update for haproxy | 2026-01-14T10:55:40Z | 2026-01-14T10:55:40Z |
| suse-su-2026:20108-1 | Security update for gpg2 | 2026-01-14T10:23:37Z | 2026-01-14T10:23:37Z |
| suse-su-2026:20080-1 | Security update for gpg2 | 2026-01-14T10:23:37Z | 2026-01-14T10:23:37Z |
| suse-su-2026:20243-1 | Security update for gpg2 | 2026-01-14T09:44:10Z | 2026-01-14T09:44:10Z |
| suse-su-2026:20356-1 | Security update for gpg2 | 2026-01-14T09:32:10Z | 2026-01-14T09:32:10Z |
| suse-su-2026:0122-1 | Security update for MozillaFirefox | 2026-01-14T08:49:21Z | 2026-01-14T08:49:21Z |
| suse-su-2026:20078-1 | Security update for squid | 2026-01-14T08:37:40Z | 2026-01-14T08:37:40Z |
| suse-su-2026:0121-1 | Security update for ovmf | 2026-01-14T06:47:26Z | 2026-01-14T06:47:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:4617 | Important: qt5-qtbase security update | 2024-07-18T00:00:00Z | 2024-07-19T10:26:59Z |
| alsa-2024:4583 | Important: kernel security update | 2024-07-17T00:00:00Z | 2024-11-03T22:20:25Z |
| alsa-2024:4573 | Important: java-21-openjdk security update | 2024-07-17T00:00:00Z | 2024-07-18T14:18:00Z |
| alsa-2024:4568 | Important: java-17-openjdk security update | 2024-07-17T00:00:00Z | 2024-07-18T14:15:38Z |
| alsa-2024:4563 | Important: java-1.8.0-openjdk security update | 2024-07-17T00:00:00Z | 2024-07-18T15:14:20Z |
| alsa-2024:4567 | Important: java-11-openjdk security update | 2024-07-16T00:00:00Z | 2024-07-26T15:17:22Z |
| alsa-2024:4502 | Important: skopeo security update | 2024-07-15T00:00:00Z | 2024-07-17T14:43:23Z |
| alsa-2024:4517 | Important: firefox security update | 2024-07-11T00:00:00Z | 2024-07-17T14:39:06Z |
| alsa-2024:4500 | Important: firefox security update | 2024-07-11T00:00:00Z | 2024-07-17T14:45:01Z |
| alsa-2024:4499 | Moderate: ruby security update | 2024-07-11T00:00:00Z | 2024-07-17T14:48:19Z |
| alsa-2024:4457 | Moderate: openssh security update | 2024-07-10T00:00:00Z | 2024-07-17T14:49:58Z |
| alsa-2024:4451 | Important: dotnet8.0 security update | 2024-07-10T00:00:00Z | 2024-07-11T08:44:08Z |
| alsa-2024:4450 | Important: dotnet8.0 security update | 2024-07-10T00:00:00Z | 2024-07-11T08:47:11Z |
| alsa-2024:4439 | Moderate: dotnet6.0 security update | 2024-07-09T00:00:00Z | 2024-07-10T09:03:22Z |
| alsa-2024:4438 | Moderate: dotnet6.0 security update | 2024-07-09T00:00:00Z | 2024-07-10T09:06:45Z |
| alsa-2024:4422 | Moderate: fence-agents security update | 2024-07-09T00:00:00Z | 2024-07-10T13:12:27Z |
| alsa-2024:4420 | Important: virt:rhel and virt-devel:rhel security update | 2024-07-09T00:00:00Z | 2024-07-10T13:18:35Z |
| alsa-2024:4379 | Important: gvisor-tap-vsock security update | 2024-07-08T00:00:00Z | 2024-07-09T12:27:51Z |
| alsa-2024:4378 | Important: podman security update | 2024-07-08T00:00:00Z | 2024-07-09T12:30:05Z |
| alsa-2024:4376 | Moderate: libreswan security update | 2024-07-08T00:00:00Z | 2024-07-09T12:36:52Z |
| alsa-2024:4371 | Important: buildah security update | 2024-07-08T00:00:00Z | 2024-07-09T12:31:42Z |
| alsa-2024:4367 | Important: pki-core security update | 2024-07-08T00:00:00Z | 2024-07-08T19:24:19Z |
| alsa-2024:4352 | Important: kernel-rt security and bug fix update | 2024-07-08T00:00:00Z | 2024-07-08T18:07:21Z |
| alsa-2024:4351 | Low: virt:rhel and virt-devel:rhel security and bug fix update | 2024-07-08T00:00:00Z | 2024-07-08T11:18:04Z |
| alsa-2024:4349 | Moderate: kernel security and bug fix update | 2024-07-08T00:00:00Z | 2024-11-03T22:17:33Z |
| alsa-2024:4312 | Important: openssh security update | 2024-07-03T00:00:00Z | 2024-07-04T06:32:48Z |
| alsa-2024:4278 | Important: qemu-kvm security update | 2024-07-02T00:00:00Z | 2024-07-03T14:13:47Z |
| alsa-2024:4267 | Moderate: fontforge security update | 2024-07-02T00:00:00Z | 2024-07-03T14:14:44Z |
| alsa-2024:4265 | Moderate: cups security update | 2024-07-02T00:00:00Z | 2024-07-03T11:29:10Z |
| alsa-2024:4264 | Low: openldap security update | 2024-07-02T00:00:00Z | 2024-07-03T11:33:34Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-336 | Use-of-uninitialized-value in grk::N_SCALAR::DecompressIrrev::vtrans | 2022-04-12T00:00:32.150063Z | 2023-07-22T14:10:59.966993Z |
| osv-2022-331 | Stack-buffer-overflow in void unwindstack::Symbols::BuildRemapTable<Elf64_Sym> | 2022-04-11T00:00:39.202876Z | 2023-04-20T22:56:13.048149Z |
| osv-2022-330 | Stack-use-after-return in std::__1::__function::__func<bool grk::WaveletReverse::decompress_partial_tile<i | 2022-04-11T00:00:12.423473Z | 2023-07-22T14:11:03.219082Z |
| osv-2022-327 | Stack-use-after-return in QSemaphore::release | 2022-04-10T00:01:12.211800Z | 2022-04-27T22:12:36.132079Z |
| osv-2022-325 | Heap-buffer-overflow in ndpi_search_tinc | 2022-04-09T00:01:54.199571Z | 2022-04-13T03:04:36.075248Z |
| osv-2022-324 | Heap-buffer-overflow in resize_packet | 2022-04-09T00:01:08.603836Z | 2022-08-24T00:04:34.375755Z |
| osv-2022-323 | Heap-buffer-overflow in ConvertRGB24ToY_SSE41 | 2022-04-09T00:00:46.308548Z | 2022-04-09T00:00:46.308780Z |
| osv-2022-322 | Heap-buffer-overflow in frame_get_metalayers | 2022-04-09T00:00:44.310354Z | 2022-04-09T00:00:44.310661Z |
| osv-2022-321 | Stack-use-after-scope in std::__1::__function::__func<bool grk::WaveletReverse::decompress_partial_tile<g | 2022-04-09T00:00:21.286205Z | 2022-04-13T03:04:39.574474Z |
| osv-2022-320 | Heap-buffer-overflow in lwan_h2_huffman_decode_for_fuzzing | 2022-04-09T00:00:11.593728Z | 2022-04-09T00:00:11.594Z |
| osv-2022-319 | Heap-buffer-overflow in LoadPSD | 2022-04-08T00:01:29.512342Z | 2022-04-13T03:04:42.482177Z |
| osv-2022-318 | UNKNOWN READ | 2022-04-07T00:01:51.631058Z | 2022-04-13T03:04:38.037322Z |
| osv-2022-317 | Heap-use-after-free in save_marker | 2022-04-07T00:01:50.873728Z | 2022-04-13T03:04:38.002433Z |
| osv-2022-315 | UNKNOWN READ in start_output_pass | 2022-04-07T00:01:37.970448Z | 2022-04-13T03:04:38.053376Z |
| osv-2022-314 | UNKNOWN READ in [heap] | 2022-04-07T00:01:25.692646Z | 2022-04-13T03:04:38.059421Z |
| osv-2022-313 | Heap-buffer-overflow in generic_unpack | 2022-04-07T00:00:47.839342Z | 2022-04-07T00:00:47.839583Z |
| osv-2022-312 | Heap-buffer-overflow in dhcp_reply | 2022-04-07T00:00:40.457052Z | 2026-04-22T14:08:42.726114Z |
| osv-2022-311 | Heap-use-after-free in decode_mcu | 2022-04-06T00:00:47.999546Z | 2022-04-13T03:04:38.065409Z |
| osv-2022-310 | Heap-use-after-free in jpeg_fill_bit_buffer | 2022-04-06T00:00:40.210191Z | 2022-04-13T03:04:38.124312Z |
| osv-2022-309 | UNKNOWN READ in decompress_smooth_data | 2022-04-06T00:00:33.512236Z | 2022-04-13T03:04:38.013782Z |
| osv-2022-308 | Null-dereference READ in ubsan_GetStackTrace | 2022-04-06T00:00:09.670188Z | 2022-04-13T03:04:38.101911Z |
| osv-2022-306 | Heap-buffer-overflow in Imf_3_1::memstream_read | 2022-04-05T00:00:45.087023Z | 2022-04-13T03:04:37.050267Z |
| osv-2022-305 | Heap-buffer-overflow in jxl::N_AVX2::BlendingStage::ProcessPaddingRow | 2022-04-05T00:00:26.264820Z | 2022-04-05T00:00:26.265051Z |
| osv-2022-304 | Heap-use-after-free in decode_mcu | 2022-04-05T00:00:22.785247Z | 2022-04-13T03:04:38.096047Z |
| osv-2022-303 | Heap-use-after-free in start_pass_phuff_decoder | 2022-04-05T00:00:12.039669Z | 2022-04-13T03:04:38.084296Z |
| osv-2022-302 | Heap-use-after-free in read_markers | 2022-04-05T00:00:09.283355Z | 2022-04-13T03:04:38.007999Z |
| osv-2022-301 | Heap-buffer-overflow in template_compose_group | 2022-04-04T00:01:45.327471Z | 2022-04-04T00:01:45.327710Z |
| osv-2022-299 | Heap-use-after-free in read_data_compressed | 2022-04-04T00:00:06.861660Z | 2022-04-13T03:04:41.189362Z |
| osv-2022-296 | Negative-size-param in jxl::N_SSE4::BlendingStage::ProcessPaddingRow | 2022-04-03T00:00:21.308788Z | 2022-04-03T00:00:21.309111Z |
| osv-2022-295 | Use-of-uninitialized-value in unsigned long grk::N_SSE4::vscheduler<grk::N_SSE4::DecompressDcShiftIrrev> | 2022-04-02T00:01:43.648632Z | 2023-07-22T14:04:06.247397Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2025-1212 | Exposure of Sensitive System Information to an Unauthorized Control Sphere in GitLab | 2025-02-17T19:10:24.523Z | 2025-08-07T09:23:45.368Z |
| bit-gitlab-2024-10383 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab VSCode Fork | 2025-02-11T07:26:57.802Z | 2026-03-20T09:47:33.381Z |
| bit-node-2025-23085 | 2025-02-11T07:16:03.298Z | 2025-11-06T13:25:46.476Z | |
| bit-gitlab-2025-1072 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-02-11T07:10:10.109Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2025-22866 | Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec | 2025-02-08T07:13:28.235Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-6386 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-02-07T07:28:12.605Z | 2025-08-06T06:08:07.957Z |
| bit-gitlab-2024-1539 | Missing Authorization in GitLab | 2025-02-07T07:24:47.498Z | 2025-08-07T09:23:45.368Z |
| bit-gitlab-2024-2878 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-02-07T07:22:41.794Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-3976 | Missing Authorization in GitLab | 2025-02-07T07:21:27.185Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-5528 | Incomplete Comparison with Missing Factors in GitLab | 2025-02-07T07:17:30.379Z | 2025-08-07T09:23:45.368Z |
| bit-gitlab-2024-6356 | Incorrect User Management in GitLab | 2025-02-07T07:16:51.890Z | 2025-05-20T10:02:07.006Z |
| bit-nginx-2025-23419 | TLS Session Resumption Vulnerability | 2025-02-07T07:15:11.088Z | 2025-11-06T13:25:46.476Z |
| bit-gitlab-2024-9631 | Inefficient Algorithmic Complexity in GitLab | 2025-02-07T07:10:40.789Z | 2025-05-20T10:02:07.006Z |
| bit-python-2024-12254 | Unbounded memory buffering in SelectorSocketTransport.writelines() | 2025-02-06T12:33:19.896Z | 2025-05-20T10:02:07.006Z |
| bit-dotnet-2025-21171 | .NET Remote Code Execution Vulnerability | 2025-02-06T07:10:17.782Z | 2025-05-20T10:02:07.006Z |
| bit-dotnet-2025-21172 | .NET and Visual Studio Remote Code Execution Vulnerability | 2025-02-06T07:09:49.793Z | 2025-05-20T10:02:07.006Z |
| bit-dotnet-2025-21173 | .NET Elevation of Privilege Vulnerability | 2025-02-06T07:09:40.090Z | 2025-05-20T10:02:07.006Z |
| bit-dotnet-2025-21176 | .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability | 2025-02-06T07:09:21.190Z | 2025-05-20T10:02:07.006Z |
| bit-cassandra-2025-23015 | Apache Cassandra: User with MODIFY permission on ALL KEYSPACES can escalate privileges to superuser via unsafe actions | 2025-02-06T07:09:06.498Z | 2025-05-20T10:02:07.006Z |
| bit-cassandra-2025-24860 | Apache Cassandra: CassandraNetworkAuthorizer and CassandraCIDRAuthorizer can be bypassed allowing access to different network regions | 2025-02-06T07:08:57.983Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2020-13948 | 2025-02-05T07:30:08.799Z | 2025-04-03T14:40:37.652Z | |
| bit-superset-2020-13952 | 2025-02-05T07:30:05.203Z | 2025-04-03T14:40:37.652Z | |
| bit-superset-2020-1932 | 2025-02-05T07:30:01.600Z | 2025-04-03T14:40:37.652Z | |
| bit-superset-2021-27907 | Apache Superset stored XSS on Dashboard markdown | 2025-02-05T07:29:57.911Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2021-28125 | Apache Superset Open Redirect | 2025-02-05T07:29:54.416Z | 2026-02-24T18:11:25.008Z |
| bit-superset-2021-32609 | XSS vulnerability on Explore page | 2025-02-05T07:29:50.701Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2021-37839 | Improper access to dataset metadata information | 2025-02-05T07:29:47.009Z | 2026-02-24T21:09:55.900Z |
| bit-superset-2021-41971 | Possible SQL Injection when template processing is enabled | 2025-02-05T07:29:43.303Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2021-41972 | Credentials leak | 2025-02-05T07:29:39.196Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2021-42250 | Possible log injection | 2025-02-05T07:29:35.000Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2024-avi-1075 | Multiples vulnérabilités dans Nagios XI | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| certfr-2024-avi-1074 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2024-12-12T00:00:00.000000 | 2024-12-12T00:00:00.000000 |
| certfr-2024-avi-1073 | Vulnérabilité dans les produits Mozilla | 2024-12-12T00:00:00.000000 | 2024-12-12T00:00:00.000000 |
| certfr-2024-avi-1072 | Multiples vulnérabilités dans les produits Apple | 2024-12-12T00:00:00.000000 | 2024-12-12T00:00:00.000000 |
| certfr-2024-avi-1071 | Multiples vulnérabilités dans les produits Tenable | 2024-12-12T00:00:00.000000 | 2024-12-12T00:00:00.000000 |
| certfr-2024-avi-1070 | Multiples vulnérabilités dans les produits Microsoft | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1069 | Multiples vulnérabilités dans Microsoft Windows | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1068 | Multiples vulnérabilités dans Microsoft Office | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1067 | Multiples vulnérabilités dans les produits Atlassian | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1066 | Vulnérabilité dans Apache Struts | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1065 | Multiples vulnérabilités dans GitLab | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1064 | Multiples vulnérabilités dans GLPI | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1063 | Vulnérabilité dans cURL et libcurl | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1062 | Multiples vulnérabilités dans les produits Siemens | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1061 | Multiples vulnérabilités dans les produits Splunk | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1060 | Multiples vulnérabilités dans Ruby on Rails | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1059 | Multiples vulnérabilités dans les produits Intel | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1058 | Multiples vulnérabilités dans les produits Ivanti | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1057 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1056 | Multiples vulnérabilités dans les produits Adobe | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1055 | Multiples vulnérabilités dans Google Chrome | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1054 | Multiples vulnérabilités dans les produits SAP | 2024-12-10T00:00:00.000000 | 2024-12-10T00:00:00.000000 |
| certfr-2024-avi-1053 | Multiples vulnérabilités dans les produits Schneider Electric | 2024-12-10T00:00:00.000000 | 2024-12-10T00:00:00.000000 |
| certfr-2024-avi-1052 | Multiples vulnérabilités dans les produits Qnap | 2024-12-09T00:00:00.000000 | 2024-12-09T00:00:00.000000 |
| certfr-2024-avi-1051 | Multiples vulnérabilités dans les produits IBM | 2024-12-06T00:00:00.000000 | 2024-12-06T00:00:00.000000 |
| certfr-2024-avi-1050 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2024-12-06T00:00:00.000000 | 2024-12-06T00:00:00.000000 |
| certfr-2024-avi-1049 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-12-06T00:00:00.000000 | 2024-12-06T00:00:00.000000 |
| certfr-2024-avi-1048 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-12-06T00:00:00.000000 | 2024-12-06T00:00:00.000000 |
| certfr-2024-avi-1047 | Multiples vulnérabilités dans Microsoft Edge | 2024-12-06T00:00:00.000000 | 2024-12-06T00:00:00.000000 |
| certfr-2024-avi-1046 | Multiples vulnérabilités dans Tenable Security Center | 2024-12-06T00:00:00.000000 | 2024-12-06T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-005655 | Vulnerabilitie in JP1/IT Desktop Management 2 - Manager and JP1/NETM/DM | 2016-11-10T16:59+09:00 | 2016-11-10T16:59+09:00 |
| jvndb-2016-000215 | Access restriction bypass vulnerability in WFS-SR01 | 2016-11-02T16:21+09:00 | 2017-11-27T16:42+09:00 |
| jvndb-2016-000214 | Command injection vulnerability in WFS-SR01 | 2016-11-02T16:20+09:00 | 2017-11-27T16:42+09:00 |
| jvndb-2016-000212 | The installer of The Public Certification Service for Individuals "The JPKI user's software" may insecurely load Dynamic Link Libraries | 2016-11-01T16:44+09:00 | 2017-12-25T11:28+09:00 |
| jvndb-2016-000213 | mobiGate App fails to verify SSL server certificates | 2016-11-01T13:47+09:00 | 2018-01-17T12:18+09:00 |
| jvndb-2016-000211 | Installer of 7-Zip for Windows may insecurely load Dynamic Link Libraries | 2016-10-26T15:13+09:00 | 2017-12-25T10:27+09:00 |
| jvndb-2016-000210 | SQL injection vulnerability in WordPress plugin WP-OliveCart | 2016-10-20T14:22+09:00 | 2018-01-17T12:10+09:00 |
| jvndb-2016-000209 | Cross-site request forgery vulnerability in WordPress plugin WP-OliveCart | 2016-10-20T14:22+09:00 | 2018-01-17T12:10+09:00 |
| jvndb-2016-000208 | Cross-site scripting vulnerability in WordPress plugin WP-OliveCart | 2016-10-20T14:22+09:00 | 2018-01-17T12:10+09:00 |
| jvndb-2016-000206 | Installer of Evernote for Windows may insecurely load Dynamic Link Libraries | 2016-10-19T15:32+09:00 | 2017-11-27T18:12+09:00 |
| jvndb-2016-000207 | The installer of e-Tax Software may insecurely load Dynamic Link Libraries | 2016-10-19T12:29+09:00 | 2018-01-17T11:48+09:00 |
| jvndb-2016-000168 | Toshiba FlashAir does not require authentication in "Internet pass-thru Mode" | 2016-10-12T10:03+09:00 | 2017-11-27T17:04+09:00 |
| jvndb-2016-000201 | SetucoCMS vulnerable to session management | 2016-10-07T15:04+09:00 | 2017-05-17T14:44+09:00 |
| jvndb-2016-000200 | SetucoCMS vulnerable to code injection | 2016-10-07T15:04+09:00 | 2017-05-17T14:44+09:00 |
| jvndb-2016-000199 | SetucoCMS vulnerable to denial-of-service (DoS) | 2016-10-07T15:04+09:00 | 2017-05-17T14:44+09:00 |
| jvndb-2016-000198 | SetucoCMS vulnerable to SQL injection | 2016-10-07T15:04+09:00 | 2017-05-17T14:44+09:00 |
| jvndb-2016-000197 | SetucoCMS vulnerable to cross-site scripting | 2016-10-07T15:04+09:00 | 2017-05-17T14:44+09:00 |
| jvndb-2016-000196 | SetucoCMS vulnerable to cross-site request forgery | 2016-10-07T15:04+09:00 | 2017-05-17T14:44+09:00 |
| jvndb-2016-000195 | Cryptography API: Next Generation (CNG) vulnerable to denial-of-service (DoS) | 2016-10-07T14:11+09:00 | 2016-10-07T14:11+09:00 |
| jvndb-2016-000202 | Usermin cross-site scripting vulnerabilties | 2016-10-07T13:50+09:00 | 2017-05-16T17:52+09:00 |
| jvndb-2016-000193 | Cybozu Office vulnerable to Reflected File Download (RFD) | 2016-10-03T15:47+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000192 | Cybozu Office vulnerable to denial-of-service (DoS) | 2016-10-03T15:46+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000191 | Cybozu Office vulnerable to information disclosure | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| jvndb-2016-000190 | Cybozu Office vulnerable to mail header injection | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| jvndb-2016-000189 | "Project" function in Cybozu Office vulnerable vulnerable to operation restriction bypass | 2016-10-03T15:43+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000188 | Breadcrumb trail in Cybozu Office vulnerable vulnerable to browse restriction bypass | 2016-10-03T15:43+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000187 | "Project" function in Cybozu Office vulnerable vulnerable to access restriction bypass | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| jvndb-2016-000186 | "Schedule" function in Cybozu Office vulnerable to cross-site scripting | 2016-10-03T15:43+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000185 | "Project" function in Cybozu Office vulnerable to cross-site scripting | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| jvndb-2016-000184 | "Customapp" function in Cybozu Office vulnerable to cross-site scripting | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-03487 | Google Android点击劫持漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03486 | Google Android拒绝服务漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03485 | Google Android逻辑错误漏洞(CNVD-2026-0348599) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03484 | Google Android混淆代理漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03483 | Google Android输入验证不当漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03482 | Google Android权限提升漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03481 | Google Android逻辑错误漏洞(CNVD-2026-0348103) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03480 | Google Android逻辑错误漏洞(CNVD-2026-0348004) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03479 | Google Android逻辑错误漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03058 | Google Android混淆代理漏洞 | 2025-12-10 | 2026-01-14 |
| cnvd-2026-02976 | Google Android权限提升漏洞(CNVD-2026-02976) | 2025-12-10 | 2026-01-13 |
| cnvd-2026-02975 | Google Android拒绝服务漏洞(CNVD-2026-02975) | 2025-12-10 | 2026-01-13 |
| cnvd-2026-02974 | Google Android权限提升漏洞(CNVD-2026-02974) | 2025-12-10 | 2026-01-13 |
| cnvd-2026-02964 | Google Android拒绝服务漏洞(CNVD-2026-02964) | 2025-12-10 | 2026-01-13 |
| cnvd-2026-02962 | Google Android拒绝服务漏洞(CNVD-2026-02962) | 2025-12-10 | 2026-01-13 |
| cnvd-2026-02949 | Google Android权限提升漏洞(CNVD-2026-02949) | 2025-12-10 | 2026-01-13 |
| cnvd-2026-02933 | Google Android权限提升漏洞(CNVD-2026-02933) | 2025-12-10 | 2026-01-12 |
| cnvd-2026-02932 | Google Android拒绝服务漏洞(CNVD-2026-02932) | 2025-12-10 | 2026-01-13 |
| cnvd-2026-00800 | UTT 进取 520W缓冲区溢出漏洞 | 2025-12-10 | 2026-01-08 |
| cnvd-2026-00799 | UTT 进取 520W缓冲区溢出漏洞(CNVD-2026-0079988) | 2025-12-10 | 2026-01-08 |
| cnvd-2026-00798 | UTT 进取 520W缓冲区溢出漏洞(CNVD-2026-0079889) | 2025-12-10 | 2026-01-08 |
| cnvd-2026-00797 | UTT 进取 512W缓冲区溢出漏洞(CNVD-2026-0079790) | 2025-12-10 | 2026-01-08 |
| cnvd-2026-00665 | D-Link DCS-930L命令注入漏洞 | 2025-12-10 | 2026-01-07 |
| cnvd-2026-00632 | Huawei HarmonyOS竞争条件漏洞(CNVD-2026-00632) | 2025-12-10 | 2026-01-07 |
| cnvd-2026-00621 | Huawei HarmonyOS camera framework模块多线程条件竞争漏洞(CNVD-2026-00621) | 2025-12-10 | 2026-01-07 |
| cnvd-2026-00615 | Huawei HarmonyOS camera framework模块多线程条件竞争漏洞 | 2025-12-10 | 2026-01-07 |
| cnvd-2026-00525 | Simple Shopping Cart settings.php文件SQL注入漏洞 | 2025-12-10 | 2026-01-06 |
| cnvd-2026-00524 | Simple Shopping Cart adminlogin.php文件SQL注入漏洞 | 2025-12-10 | 2026-01-06 |
| cnvd-2026-00523 | Simple Shopping Cart additems.php文件SQL注入漏洞 | 2025-12-10 | 2026-01-06 |
| cnvd-2026-00522 | Online Ordering System user_school.php文件SQL注入漏洞 | 2025-12-10 | 2026-01-06 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-16463 | Уязвимость единой системы для аналитики данных IBM Integrated Analytics System, связанная… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16462 | Уязвимость функции резервного копирования SSM (Sprecher Storage Manager) микропрограммног… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16461 | Уязвимость микропрограммного обеспечения модуля автоматизации Sprecher SPRECON-E, связанн… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16460 | Уязвимость микропрограммного обеспечения модуля автоматизации Sprecher SPRECON-E, связанн… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16459 | Уязвимость микропрограммного обеспечения модуля автоматизации Sprecher SPRECON-E, связанн… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16458 | Уязвимость функций mxc_isi_m2m_vb2_buffer_queue(), mxc_isi_m2m_vb2_stop_streaming() и mxc… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16442 | Уязвимость офисного онлайн-пакета ONLYOFFICE Docs (DocumentServer), связанная с неприняти… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16441 | Уязвимость офисного онлайн-пакета ONLYOFFICE Docs (DocumentServer), связанная с неприняти… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16440 | Уязвимость офисного онлайн-пакета ONLYOFFICE Docs (DocumentServer), связанная с неприняти… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16439 | Уязвимость функций mxc_isi_m2m_vb2_buffer_queue(), mxc_isi_m2m_vb2_stop_streaming() и mxc… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16438 | Уязвимость интерфейса программного средства мониторинга и анализа логов Nagios Log Server… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16437 | Уязвимость веб-интерфейса программного средства мониторинга и анализа логов Nagios Log Se… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16436 | Уязвимость функции Instant Search модуля Content Search программного средства мониторинга… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16435 | Уязвимость модуля Reports программного средства мониторинга, анализа и создания отчетов M… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16434 | Уязвимость модуля Content Search средства мониторинга, анализа и создания отчетов ManageE… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16433 | Уязвимость ПЛК NLcon-CE-485-C, связанная с непринятием мер по шифрованию секретных данных… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16432 | Уязвимость ПЛК NLcon-CE-485-C, связанная с недостаточной проверкой вводимых данных в серв… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16431 | Уязвимость ПЛК NLcon-CE-485-C, связанная с использованием устаревшей ОС Windows CE 5.0, п… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16430 | Уязвимость ПЛК NLcon-CE-485-C, связанная с недостаточной проверкой вводимых данных при об… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16429 | Уязвимость ПЛК NLcon-CE-485-C, связанная с недостаточной проверкой вводимых данных при об… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16428 | Уязвимость ПЛК NLcon-CE-485-C, связанная с недостатками процедуры авторизации сервиса Cod… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16427 | Уязвимость функции sub_F934() микропрограммного обеспечения Wi-Fi адаптера TRENDnet TEW-8… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16426 | Уязвимость функции armor_filter() программы для шифрования информации и создания электрон… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16425 | Уязвимость библиотеки Apache Common Text сервера FileMaker Server, связанная с неверным у… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16424 | Уязвимость сценария ExportSettings.sh (/cgi-bin/ExportSettings.sh) микропрограммного обес… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16422 | Уязвимость обработчика HTTP-запросов микропрограммного обеспечения маршрутизаторов Tenda … | 29.12.2025 | 29.12.2025 |
| bdu:2025-16421 | Уязвимость браузера Internet Explorer, связанная с неверным ограничением имени пути к кат… | 29.12.2025 | 26.01.2026 |
| bdu:2025-16420 | Уязвимость библиотеки управления виртуализацией libvirt, связанная с недостатками контрол… | 29.12.2025 | 29.12.2025 |
| bdu:2025-16419 | Уязвимость плагина OwnID Passwordless Login системы управления содержимым сайта WordPress… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16418 | Уязвимость программного обеспечения для обнаружения, мониторинга и реагирования на угрозы… | 26.12.2025 | 26.12.2025 |
| ID | Description | Updated |
|---|---|---|
| var-202209-1073 | TOTOLINK-720R v4.1.5cu.374 was discovered to contain a remote code execution (RCE) vulner… | 2025-12-19T23:03:12.310000Z |
| var-202401-0298 | A vulnerability, which was classified as critical, has been found in Totolink LR1200GB 9.… | 2025-12-19T23:03:10.058000Z |
| var-202403-2073 | Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the schedStartTime para… | 2025-12-19T23:03:09.700000Z |
| var-202511-2421 | A command injection vulnerability has been identified in bwdpi. A remote, authenticated a… | 2025-12-19T23:03:06.080000Z |
| var-202512-0002 | A security flaw has been discovered in Tenda CH22 1.0.0.1. This affects the function frmL… | 2025-12-19T23:03:05.839000Z |
| var-202401-0476 | A vulnerability classified as critical was found in Totolink LR1200GB 9.1.0u.6619_B202301… | 2025-12-19T23:02:31.688000Z |
| var-202403-3020 | Tenda F1202 v1.2.0.20(408) has a stack overflow vulnerability in the page parameter of fr… | 2025-12-19T23:02:31.223000Z |
| var-202511-2406 | Out-of-bounds read in Application Gateway allows an unauthorized attacker to elevate priv… | 2025-12-19T23:02:27.251000Z |
| var-202512-1793 | In Modem, there is a possible application crash due to improper input validation. This co… | 2025-12-19T23:02:22.191000Z |
| var-202403-3051 | Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the time parameter from … | 2025-12-19T23:01:35.219000Z |
| var-202511-1845 | An unauthenticated command injection vulnerability exists in the ToToLink LR1200GB Router… | 2025-12-19T23:01:31.950000Z |
| var-202403-3269 | Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the schedStartTime param… | 2025-12-19T23:01:09.608000Z |
| var-202511-0855 | TOTOLink A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow in the … | 2025-12-19T23:01:06.206000Z |
| var-202511-2413 | A path traversal vulnerability has been identified in certain router models. A remote, au… | 2025-12-19T23:00:11.660000Z |
| var-202512-0754 | In Modem, there is a possible system crash due to an uncaught exception. This could lead … | 2025-12-19T23:00:11.066000Z |
| var-202512-0920 | An improper neutralization of special elements used in an sql command ('sql injection') v… | 2025-12-19T23:00:10.768000Z |
| var-202307-1097 | The Rockwell Automation Enhanced HIM software contains an API that the application uses… | 2025-12-19T22:59:42.381000Z |
| var-202401-0454 | A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been rated a… | 2025-12-19T22:59:41.647000Z |
| var-202403-3049 | Tenda F1202 v1.2.0.20(408) has a command injection vulnerablility in the formWriteFacMac … | 2025-12-19T22:59:41.207000Z |
| var-202512-2040 | In Modem, there is a possible system crash due to improper input validation. This could l… | 2025-12-19T22:59:32.401000Z |
| var-202208-2067 | TOTOLINK A950RG V4.1.2cu.5204_B20210112 was discovered to contain a hardcoded password fo… | 2025-12-19T22:58:15.355000Z |
| var-202311-1187 | Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an att… | 2025-12-19T22:58:13.256000Z |
| var-202401-2281 | An issue discovered in TOTOLINK X6000R v9.4.0cu.852_B20230719 allows attackers to run arb… | 2025-12-19T22:58:12.967000Z |
| var-202510-4380 | Xindu (Qingdao) Office Systems Co., Ltd. is a professional office equipment enterprise in… | 2025-12-19T22:58:09.310000Z |
| var-202512-0794 | Use of hardcoded cryptographic keys in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2. The affecte… | 2025-12-19T22:58:08.460000Z |
| var-202512-0943 | Improper export of android application components in Galaxy Store for Galaxy Watch prior … | 2025-12-19T22:58:08.075000Z |
| var-202401-0463 | A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been classif… | 2025-12-19T22:57:05.173000Z |
| var-202511-1036 | An unauthenticated command injection vulnerability exists in the Start_EPI function of th… | 2025-12-19T22:57:01.299000Z |
| var-202511-2373 | A path traversal vulnerability has been identified in WebDAV, which may allow unauthentic… | 2025-12-19T22:57:01.177000Z |
| var-202512-2102 | Stack-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2. In th… | 2025-12-19T22:56:55.417000Z |