Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40347 |
5.3 (3.1)
|
Python-Multipart affected by Denial of Service via lar… |
Kludex |
python-multipart |
2026-04-17T23:56:50.777Z | 2026-04-20T15:46:40.011Z |
| CVE-2026-40346 |
6.4 (4.0)
|
NocoBase has SSRF in Workflow HTTP Request and Custom … |
nocobase |
@nocobase/plugin-workflow-request |
2026-04-17T23:54:34.829Z | 2026-04-20T14:56:12.829Z |
| CVE-2026-40581 |
8.1 (3.1)
|
ChurchCRM: Cross-Site Request Forgery (CSRF) in Select… |
ChurchCRM |
CRM |
2026-04-17T23:51:32.765Z | 2026-04-20T16:15:58.183Z |
| CVE-2026-40337 |
5.1 (3.1)
|
Sentry kernel has incomplete ownership check for IRQ l… |
camelot-os |
sentry-kernel |
2026-04-17T23:51:09.866Z | 2026-04-20T16:13:48.908Z |
| CVE-2026-40341 |
3.5 (3.1)
|
libgphoto2 has an OOB Read in ptp_unpack_EOS_FocusInfoEx |
gphoto |
libgphoto2 |
2026-04-17T23:48:36.644Z | 2026-04-20T16:14:19.107Z |
| CVE-2026-40340 |
6.1 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_OI() in ptp-pack… |
gphoto |
libgphoto2 |
2026-04-17T23:45:17.467Z | 2026-04-20T13:36:05.149Z |
| CVE-2026-40339 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_Sony_DPD() FormF… |
gphoto |
libgphoto2 |
2026-04-17T23:42:32.586Z | 2026-04-20T14:56:21.979Z |
| CVE-2026-40338 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_Sony_DPD() enume… |
gphoto |
libgphoto2 |
2026-04-17T23:40:10.097Z | 2026-04-20T16:16:08.585Z |
| CVE-2026-40485 |
5.3 (3.1)
|
ChurchCRM: Username Enumeration via Differential Respo… |
ChurchCRM |
CRM |
2026-04-17T23:29:35.884Z | 2026-04-20T13:36:05.319Z |
| CVE-2026-40336 |
2.4 (3.1)
|
libgphoto2 has memory leak in ptp_unpack_Sony_DPD() se… |
gphoto |
libgphoto2 |
2026-04-17T23:27:42.868Z | 2026-04-20T16:14:53.071Z |
| CVE-2026-2262 |
7.5 (3.1)
|
Easy Appointments <= 3.12.21 - Unauthenticated Sensiti… |
easyappointments |
Easy Appointments |
2026-04-17T23:26:48.863Z | 2026-04-20T13:51:28.513Z |
| CVE-2026-40484 |
9.1 (3.1)
|
ChurchCRM: Authenticated Remote Code Execution via Unr… |
ChurchCRM |
CRM |
2026-04-17T23:25:06.319Z | 2026-04-20T14:56:29.684Z |
| CVE-2026-40483 |
5.4 (3.1)
|
ChurchCRM: Stored XSS in PledgeEditor.php via Donation… |
ChurchCRM |
CRM |
2026-04-17T23:20:44.900Z | 2026-04-20T16:16:17.841Z |
| CVE-2026-40335 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_DPV() UINT128/IN… |
gphoto |
libgphoto2 |
2026-04-17T23:19:16.935Z | 2026-04-20T13:36:05.542Z |
| CVE-2026-40334 |
3.5 (3.1)
|
libgphoto2 missing null termination in ptp_unpack_Cano… |
gphoto |
libgphoto2 |
2026-04-17T23:16:38.751Z | 2026-04-20T13:36:05.703Z |
| CVE-2026-40582 |
9.1 (4.0)
|
ChurchCRM: Authentication Bypass in `/api/public/user/… |
ChurchCRM |
CRM |
2026-04-17T23:16:13.862Z | 2026-04-20T14:56:36.921Z |
| CVE-2026-40333 |
6.1 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_EOS_ImageFormat(… |
gphoto |
libgphoto2 |
2026-04-17T23:11:11.073Z | 2026-04-20T14:56:44.091Z |
| CVE-2026-40480 |
7.1 (4.0)
|
ChurchCRM has Missing Object-Level Authorization / IDO… |
ChurchCRM |
CRM |
2026-04-17T23:07:30.126Z | 2026-04-20T16:16:00.433Z |
| CVE-2026-40324 |
9.1 (3.1)
|
Hot Chocolate's Utf8GraphQLParser has Stack Overflow v… |
ChilliCream |
graphql-platform |
2026-04-17T23:05:26.217Z | 2026-04-20T16:16:25.151Z |
| CVE-2026-40482 |
7.1 (4.0)
|
ChurchCRM has Authenticated SQL Injection in `/api/fam… |
ChurchCRM |
CRM |
2026-04-17T22:58:48.528Z | 2026-04-20T16:16:32.247Z |
| CVE-2026-40323 |
8.9 (4.0)
|
SP1 V6 Recursion Circuit Row-Count Binding Gap |
succinctlabs |
sp1 |
2026-04-17T22:58:42.580Z | 2026-04-20T16:16:41.143Z |
| CVE-2026-40481 |
8.2 (4.0)
|
monetr: Unauthenticated Stripe webhook reads attacker-… |
monetr |
monetr |
2026-04-17T22:54:57.545Z | 2026-04-20T13:36:05.862Z |
| CVE-2026-40486 |
4.3 (3.1)
|
Kimai's User Preferences API allows standard users to … |
kimai |
kimai |
2026-04-17T22:35:53.543Z | 2026-04-20T14:56:51.165Z |
| CVE-2026-40479 |
5.4 (3.1)
|
Kimai: Stored XSS via Incomplete HTML Attribute Escapi… |
kimai |
kimai |
2026-04-17T22:31:29.930Z | 2026-04-20T16:16:41.880Z |
| CVE-2026-2434 |
6.4 (3.1)
|
Pz-LinkCard <= 2.5.8.1 - Authenticated (Contributor+) … |
poporon |
Pz-LinkCard |
2026-04-17T22:27:13.525Z | 2026-04-20T13:36:06.124Z |
| CVE-2026-40478 |
9.1 (3.1)
|
Improper neutralization of specific syntax patterns fo… |
thymeleaf |
thymeleaf |
2026-04-17T21:57:01.560Z | 2026-04-22T03:55:42.682Z |
| CVE-2026-40477 |
9.1 (3.1)
|
Improper restriction of the scope of accessible object… |
thymeleaf |
thymeleaf |
2026-04-17T21:53:47.271Z | 2026-04-22T03:55:41.093Z |
| CVE-2026-40476 |
6.9 (4.0)
|
graphql-php: Denial of Service via quadratic complexit… |
webonyx |
graphql-php |
2026-04-17T21:42:59.511Z | 2026-04-20T14:56:57.812Z |
| CVE-2026-5720 |
7.1 (4.0)
|
miniupnpd Integer Underflow SOAPAction Header Parsing |
miniupnp project |
miniupnpd |
2026-04-17T21:39:54.818Z | 2026-04-20T16:59:21.060Z |
| CVE-2026-40474 |
7.6 (3.1)
|
wger has Broken Access Control in the Global Gym Confi… |
wger-project |
wger |
2026-04-17T21:39:03.677Z | 2026-04-20T16:08:12.427Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-30898 |
N/A
|
Apache Airflow: Bad example of BashOperator shell inje… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:20:48.647Z | 2026-04-22T03:55:38.783Z |
| CVE-2026-25917 |
N/A
|
Apache Airflow: API extra-links triggers XCom deserial… |
Apache Software Foundation |
Apache Airflow |
2026-04-18T06:20:11.187Z | 2026-04-22T13:58:49.807Z |
| CVE-2026-41253 |
6.9 (3.1)
|
In iTerm2 through 3.6.9, displaying a .txt file c… |
iTerm2 |
iTerm2 |
2026-04-18T05:27:08.202Z | 2026-04-20T15:52:10.357Z |
| CVE-2026-6518 |
8.8 (3.1)
|
CMP – Coming Soon & Maintenance Plugin by NiteoThemes … |
niteo |
CMP – Coming Soon & Maintenance Plugin by NiteoThemes |
2026-04-18T03:37:04.707Z | 2026-04-20T13:46:08.222Z |
| CVE-2026-6048 |
6.4 (3.1)
|
Flipbox Addon for Elementor <= 2.1.1 - Authenticated (… |
dragwyb |
Flipbox Addon for Elementor |
2026-04-18T03:37:05.751Z | 2026-04-20T13:46:08.081Z |
| CVE-2026-4801 |
6.4 (3.1)
|
Page Builder Gutenberg Blocks <= 3.1.16 - Authenticate… |
godaddy |
Page Builder Gutenberg Blocks – CoBlocks |
2026-04-18T03:37:03.859Z | 2026-04-20T14:42:38.120Z |
| CVE-2026-40494 |
9.8 (3.1)
|
SAIL has heap buffer overflow in TGA RLE decoder — raw… |
HappySeaFox |
sail |
2026-04-18T01:42:48.830Z | 2026-04-20T14:55:42.859Z |
| CVE-2026-40493 |
9.8 (3.1)
|
SAIL has heap buffer overflow in PSD decoder — bpp mis… |
HappySeaFox |
sail |
2026-04-18T01:41:14.664Z | 2026-04-20T16:15:22.120Z |
| CVE-2026-40492 |
9.8 (3.1)
|
SAIL has heap buffer overflow in XWD decoder — bits_pe… |
HappySeaFox |
sail |
2026-04-18T01:39:48.056Z | 2026-04-20T15:24:42.029Z |
| CVE-2026-40491 |
6.5 (3.1)
|
gdown Affected by Arbitrary File Write via Path Traver… |
wkentaro |
gdown |
2026-04-18T01:36:47.659Z | 2026-04-20T15:50:02.983Z |
| CVE-2026-40490 |
6.8 (3.1)
|
AsyncHttpClient leaks authorization credentials to unt… |
AsyncHttpClient |
async-http-client |
2026-04-18T01:31:13.860Z | 2026-04-20T14:55:50.254Z |
| CVE-2026-40489 |
8.6 (4.0)
|
editorconfig-core-c has incomplete fix for CVE-2023-0341 |
editorconfig |
editorconfig-core-c |
2026-04-18T01:24:57.278Z | 2026-04-20T16:15:31.570Z |
| CVE-2026-40487 |
8.9 (3.1)
|
Postiz Has Unrestricted File Upload via MIME Type Spoo… |
gitroomhq |
postiz-app |
2026-04-18T01:19:06.588Z | 2026-04-20T15:25:40.893Z |
| CVE-2026-35582 |
8.8 (3.1)
|
Emissary has an OS Command Injection via Unvalidated I… |
NationalSecurityAgency |
emissary |
2026-04-18T01:16:27.661Z | 2026-04-20T15:48:51.543Z |
| CVE-2026-1838 |
6.1 (3.1)
|
Hostel <= 1.1.6 - Reflected Cross-Site Scripting via '… |
prasunsen |
Hostel |
2026-04-18T01:26:04.643Z | 2026-04-20T14:19:29.627Z |
| CVE-2026-1559 |
6.4 (3.1)
|
Youzify <= 1.3.6 - Authenticated (Subscriber+) Stored … |
youzify |
Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress |
2026-04-18T01:26:05.210Z | 2026-04-20T13:46:08.353Z |
| CVE-2026-40572 |
9 (3.1)
|
NovumOS has Arbitrary Memory Mapping via Syscall 15 (M… |
MinecAnton209 |
NovumOS |
2026-04-18T00:16:02.590Z | 2026-04-20T14:55:57.521Z |
| CVE-2026-40350 |
8.8 (3.1)
|
Movary User Management (/settings/users) has Authoriza… |
leepeuker |
movary |
2026-04-18T00:07:33.324Z | 2026-04-20T16:15:39.915Z |
| CVE-2026-40317 |
9.4 (3.1)
|
NovumOS has Privilege Escalation in the Syscall Interface |
MinecAnton209 |
NovumOS |
2026-04-18T00:12:10.368Z | 2026-04-20T15:26:25.222Z |
| CVE-2026-35465 |
7.5 (3.1)
|
SecureDrop Client has path injection in read_gzip_head… |
freedomofpress |
securedrop-client |
2026-04-18T00:41:16.594Z | 2026-04-20T15:47:43.822Z |
| CVE-2026-40593 |
4.8 (3.1)
|
ChurchCRM: Stored XSS in UserEditor.php via Login Name Field |
ChurchCRM |
CRM |
2026-04-18T00:02:59.606Z | 2026-04-20T14:56:05.666Z |
| CVE-2026-40582 |
9.1 (4.0)
|
ChurchCRM: Authentication Bypass in `/api/public/user/… |
ChurchCRM |
CRM |
2026-04-17T23:16:13.862Z | 2026-04-20T14:56:36.921Z |
| CVE-2026-40581 |
8.1 (3.1)
|
ChurchCRM: Cross-Site Request Forgery (CSRF) in Select… |
ChurchCRM |
CRM |
2026-04-17T23:51:32.765Z | 2026-04-20T16:15:58.183Z |
| CVE-2026-40485 |
5.3 (3.1)
|
ChurchCRM: Username Enumeration via Differential Respo… |
ChurchCRM |
CRM |
2026-04-17T23:29:35.884Z | 2026-04-20T13:36:05.319Z |
| CVE-2026-40484 |
9.1 (3.1)
|
ChurchCRM: Authenticated Remote Code Execution via Unr… |
ChurchCRM |
CRM |
2026-04-17T23:25:06.319Z | 2026-04-20T14:56:29.684Z |
| CVE-2026-40483 |
5.4 (3.1)
|
ChurchCRM: Stored XSS in PledgeEditor.php via Donation… |
ChurchCRM |
CRM |
2026-04-17T23:20:44.900Z | 2026-04-20T16:16:17.841Z |
| CVE-2026-40482 |
7.1 (4.0)
|
ChurchCRM has Authenticated SQL Injection in `/api/fam… |
ChurchCRM |
CRM |
2026-04-17T22:58:48.528Z | 2026-04-20T16:16:32.247Z |
| CVE-2026-40480 |
7.1 (4.0)
|
ChurchCRM has Missing Object-Level Authorization / IDO… |
ChurchCRM |
CRM |
2026-04-17T23:07:30.126Z | 2026-04-20T16:16:00.433Z |
| CVE-2026-40349 |
8.8 (3.1)
|
Authenticated Movary User Can Self-Escalate to Adminis… |
leepeuker |
movary |
2026-04-18T00:05:46.360Z | 2026-04-20T16:15:49.844Z |
| CVE-2026-40348 |
7.7 (3.1)
|
Movary has Authenticated SSRF via Jellyfin Server URL … |
leepeuker |
movary |
2026-04-18T00:01:09.725Z | 2026-04-20T16:11:32.779Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-3w73-fhv4-qr7q |
4.3 (3.1)
|
A vulnerability in the web-based management interface of Cisco Unity Connection could allow an auth… | 2026-04-15T18:31:57Z | 2026-04-15T18:31:57Z |
| ghsa-wrhr-37c7-3326 |
7.5 (3.1)
|
Nordic Semiconductor IronSide SE for nRF54H20 before 23.0.2+17 has an Algorithmic complexity issue. | 2026-04-15T18:31:56Z | 2026-04-16T15:31:32Z |
| ghsa-pcxf-fmpx-32ph |
6.5 (3.1)
1.3 (4.0)
|
In Grafana's alerting system, users with edit permissions for a contact point, specifically the per… | 2026-04-15T18:31:56Z | 2026-04-20T21:31:39Z |
| ghsa-p3vg-7hj9-6f24 |
6.6 (3.1)
|
In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform v… | 2026-04-15T18:31:56Z | 2026-04-15T18:31:56Z |
| ghsa-74c3-5r2f-v2xg |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in DeluxeThemes Userpro allows Cross Site Request F… | 2026-04-15T18:31:56Z | 2026-04-23T18:32:56Z |
| ghsa-x75g-qm53-h84r |
8.1 (3.1)
|
Authorization Bypass Through User-Controlled Key vulnerability in Mahmudul Hasan Arif FluentBoards … | 2026-04-15T18:31:55Z | 2026-04-15T18:31:55Z |
| ghsa-jpgq-q89g-m8wr |
8.1 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in Syed Balkhi Contact Form by WPForms wpforms-lite… | 2026-04-15T18:31:55Z | 2026-04-15T18:31:55Z |
| ghsa-h93w-324f-xffx |
5.3 (3.1)
|
Missing Authorization vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Expl… | 2026-04-15T18:31:55Z | 2026-04-15T18:31:55Z |
| ghsa-g5jh-99h2-gm4r |
5.3 (3.1)
|
Authorization Bypass Through User-Controlled Key vulnerability in VillaTheme COMPE compe-woo-compar… | 2026-04-15T18:31:55Z | 2026-04-15T18:31:55Z |
| ghsa-82v2-5hpx-rj8w |
7.6 (3.1)
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-04-15T18:31:55Z | 2026-04-15T18:31:55Z |
| ghsa-wg6q-6289-32hp |
6.3 (4.0)
|
Bouncy Castle Crypto Package For Java: Use of a Broken or Risky Cryptographic Algorithm vulnerabili… | 2026-04-15T18:31:54Z | 2026-04-16T21:32:20Z |
| ghsa-r6g6-6h6f-xcmj |
7.5 (3.1)
|
Apache::API::Password versions through v0.5.2 for Perl can generate insecure random values for salt… | 2026-04-15T18:31:54Z | 2026-04-16T15:31:31Z |
| ghsa-mgp4-3fh3-m48x |
4.3 (3.1)
|
Missing Authorization vulnerability in BlockArt Magazine Blocks magazine-blocks allows Exploiting I… | 2026-04-15T18:31:54Z | 2026-04-15T18:31:54Z |
| ghsa-r28v-qhr5-pj8w |
8.7 (4.0)
|
Certain HP DeskJet All in One devices may be vulnerable to remote code execution caused by a buffer… | 2026-04-15T15:31:43Z | 2026-04-15T15:31:43Z |
| ghsa-p4rv-88gx-v3fc |
7.8 (3.1)
8.5 (4.0)
|
During an internal security assessment, a potential vulnerability was discovered in Lenovo Software… | 2026-04-15T15:31:43Z | 2026-04-15T15:31:43Z |
| ghsa-hv95-2pcr-m52r |
7.5 (3.1)
|
CentSDR commit e40795 was discovered to contain a stack overflow in the "Thread1" function. | 2026-04-15T15:31:43Z | 2026-04-15T18:31:56Z |
| ghsa-ggmw-mjhv-75rm |
8.4 (3.1)
|
NietThijmen ShoppingCart: Command injection in the connect function | 2026-04-15T15:31:43Z | 2026-04-16T21:26:36Z |
| ghsa-f7xm-7w7h-hhcm |
7.3 (4.0)
|
HP System Optimizer might potentially be vulnerable to escalation of privilege. HP is releasing an … | 2026-04-15T15:31:43Z | 2026-04-15T15:31:43Z |
| ghsa-7qr2-rw3m-88wx |
6.6 (3.1)
5.2 (4.0)
|
During an internal security assessment, a potential vulnerability was discovered in Lenovo Software… | 2026-04-15T15:31:43Z | 2026-04-15T15:31:43Z |
| ghsa-qpgx-vhr9-cwj5 |
6.7 (3.1)
5.4 (4.0)
|
A potential DLL hijacking vulnerability was reported in Lenovo Service Bridge that, under certain c… | 2026-04-15T15:31:42Z | 2026-04-15T15:31:42Z |
| ghsa-jr3g-fr35-x3w4 |
7.3 (3.1)
7.0 (4.0)
|
During an internal security assessment, a potential vulnerability was discovered in Lenovo Software… | 2026-04-15T15:31:42Z | 2026-04-15T15:31:42Z |
| ghsa-4g48-54q2-fg7q |
6.5 (3.1)
|
Apache Airlfow: Sensitive Azure Service Bus connection string (and possibly other providers) expose… | 2026-04-15T15:31:42Z | 2026-04-16T21:26:23Z |
| ghsa-2mv9-v6q7-x773 |
7.1 (3.1)
6.9 (4.0)
|
During an internal security assessment, a potential vulnerability was discovered in Lenovo Diagnost… | 2026-04-15T15:31:42Z | 2026-04-15T15:31:42Z |
| ghsa-p72j-qjhf-94m3 |
2.9 (3.1)
|
HCL AION is affected by a vulnerability where certain system behaviours may allow exploration of in… | 2026-04-15T15:31:41Z | 2026-04-15T15:31:41Z |
| ghsa-8wr7-69hr-44pw |
7.5 (3.1)
|
Deadwood in MaraDNS 3.5.0036 allows attackers to exhaust connection slots via a zone whose authorit… | 2026-04-15T15:31:40Z | 2026-04-15T15:31:40Z |
| ghsa-m3qh-6w2c-jgrx |
7.2 (3.1)
|
A out-of-bounds write vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 throug… | 2026-04-15T00:31:36Z | 2026-04-15T00:31:36Z |
| ghsa-qhm2-fwj3-3r79 |
7.0 (4.0)
|
Unisys WebPerfect Image Suite versions 3.0.3960.22810 and 3.0.3960.22604 expose a deprecated .NET R… | 2026-04-15T00:31:35Z | 2026-04-23T18:32:55Z |
| ghsa-qgcm-8wwj-ghmv |
7.8 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by an out-of-bounds read vulnerability wh… | 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-pgfp-3xc3-mf3p |
7.8 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by an Integer Underflow (Wrap or Wraparou… | 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-mwv4-vh82-wfp9 |
6.3 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by an Improper Input Validation vulnerabi… | 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-654 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:19.582800Z |
| pysec-2021-653 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:19.411969Z |
| pysec-2021-652 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:19.249421Z |
| pysec-2021-651 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:19.088447Z |
| pysec-2021-650 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.930076Z |
| pysec-2021-649 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.759879Z |
| pysec-2021-648 |
|
TensorFlow is an end-to-end open source platform for machine learning. The `tf.raw_ops.Co… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.591146Z |
| pysec-2021-647 |
|
TensorFlow is an end-to-end open source platform for machine learning. Specifying a negat… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.423070Z |
| pysec-2021-646 |
|
TensorFlow is an end-to-end open source platform for machine learning. Missing validation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.334867Z |
| pysec-2021-645 |
|
TensorFlow is an end-to-end open source platform for machine learning. The API of `tf.raw… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.174701Z |
| pysec-2021-644 |
|
TensorFlow is an end-to-end open source platform for machine learning. In eager mode (def… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.016615Z |
| pysec-2021-643 |
|
TensorFlow is an end-to-end open source platform for machine learning. A malicious user c… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:17.852782Z |
| pysec-2021-642 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_op… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:17.688674Z |
| pysec-2021-641 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:17.530281Z |
| pysec-2021-640 |
|
TensorFlow is an end-to-end open source platform for machine learning. If the `splits` ar… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:17.368785Z |
| pysec-2021-639 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling TF operati… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:17.206359Z |
| pysec-2021-547 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing invalid ar… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:01.886365Z |
| pysec-2021-546 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing a complex … | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:01.733982Z |
| pysec-2021-545 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:01.587221Z |
| pysec-2021-544 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:01.440204Z |
| pysec-2021-543 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:01.249240Z |
| pysec-2021-542 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:01.093835Z |
| pysec-2021-541 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.939983Z |
| pysec-2021-540 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.791095Z |
| pysec-2021-539 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.643127Z |
| pysec-2021-538 |
|
TensorFlow is an end-to-end open source platform for machine learning. The validation in … | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.479412Z |
| pysec-2021-537 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.330206Z |
| pysec-2021-536 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.179664Z |
| pysec-2021-535 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.010376Z |
| pysec-2021-534 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:59.860176Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1416 | Malicious code in twitch-security (npm) | 2026-03-13T10:37:20Z | 2026-03-23T05:16:31Z |
| mal-2026-1415 | Malicious code in pulsard-utils (npm) | 2026-03-13T10:37:20Z | 2026-03-23T05:16:30Z |
| mal-2026-1414 | Malicious code in hardhat2-config (npm) | 2026-03-13T10:37:20Z | 2026-03-23T05:16:27Z |
| mal-2026-1413 | Malicious code in brlc-base (npm) | 2026-03-13T10:37:19Z | 2026-03-23T05:16:25Z |
| mal-2026-1408 | Malicious code in nai (PyPI) | 2026-03-13T10:31:39Z | 2026-03-13T10:31:39Z |
| mal-2026-1407 | Malicious code in thief-utils (PyPI) | 2026-03-13T08:43:52Z | 2026-04-01T12:28:04Z |
| mal-2026-1406 | Malicious code in makenotion-ppetest (PyPI) | 2026-03-13T08:13:53Z | 2026-04-01T12:28:04Z |
| mal-2026-1456 | Malicious code in rrweb-v1 (npm) | 2026-03-13T07:10:46Z | 2026-03-23T05:16:30Z |
| mal-2026-1400 | Malicious code in solana-pumpfun-sdk (npm) | 2026-03-13T06:55:58Z | 2026-03-23T05:16:30Z |
| mal-2026-1399 | Malicious code in pino-sdk (npm) | 2026-03-13T06:55:58Z | 2026-04-16T15:42:09Z |
| mal-2026-1392 | Malicious code in @dinzid04/libsignal-node (npm) | 2026-03-13T06:54:12Z | 2026-03-23T05:16:24Z |
| mal-2026-1391 | Malicious code in @dinzid04/baileys (npm) | 2026-03-13T06:54:12Z | 2026-03-23T05:16:24Z |
| mal-2026-1401 | Malicious code in tailwindcss-animation-advanced (npm) | 2026-03-13T06:51:42Z | 2026-03-23T05:16:31Z |
| mal-2026-1393 | Malicious code in cortana-md-bot (npm) | 2026-03-13T06:48:27Z | 2026-03-23T05:16:26Z |
| mal-2026-1390 | Malicious code in @depro-tech/cortana-md (npm) | 2026-03-13T06:48:27Z | 2026-03-23T05:16:24Z |
| mal-2026-1404 | Malicious code in whatsapp-core-auth-drzak (npm) | 2026-03-13T06:47:07Z | 2026-04-16T15:42:10Z |
| mal-2026-1398 | Malicious code in meta-internal-logger-drzak (npm) | 2026-03-13T06:47:07Z | 2026-04-16T15:42:09Z |
| mal-2026-1405 | Malicious code in whatsapp-fastdesk-utils-drzak (npm) | 2026-03-13T06:47:06Z | 2026-04-16T15:42:10Z |
| mal-2026-1403 | Malicious code in tradepmr-fusion-core-drzak (npm) | 2026-03-13T06:47:06Z | 2026-04-16T15:42:10Z |
| mal-2026-1402 | Malicious code in tradepmr-api-utils-drzak (npm) | 2026-03-13T06:47:06Z | 2026-04-16T15:42:10Z |
| mal-2026-1397 | Malicious code in fusion-internal-common-drzak (npm) | 2026-03-13T06:47:06Z | 2026-04-16T15:42:08Z |
| mal-2026-1396 | Malicious code in dell-internal-auth-drzak (npm) | 2026-03-13T06:47:06Z | 2026-04-16T15:42:08Z |
| mal-2026-1395 | Malicious code in dell-fusion-core-drzak (npm) | 2026-03-13T06:47:06Z | 2026-04-16T15:42:08Z |
| mal-2026-1394 | Malicious code in dell-emc-internal-api-drzak (npm) | 2026-03-13T06:47:06Z | 2026-04-16T15:42:08Z |
| mal-2026-1382 | Malicious code in @immuta/flag-providers-web (npm) | 2026-03-13T05:53:14Z | 2026-03-23T05:16:24Z |
| mal-2026-1386 | Malicious code in tachyon-spade-reporter (npm) | 2026-03-13T05:39:05Z | 2026-03-23T05:16:31Z |
| mal-2026-1387 | Malicious code in tahoe-tap (npm) | 2026-03-13T05:38:17Z | 2026-03-23T05:16:31Z |
| mal-2026-1388 | Malicious code in tourney-sdk-react (npm) | 2026-03-13T05:37:58Z | 2026-03-23T05:16:31Z |
| mal-2026-1389 | Malicious code in twitch-twilight-intl (npm) | 2026-03-13T05:37:47Z | 2026-03-23T05:16:31Z |
| mal-2026-1385 | Malicious code in conductor-managed-airflow-environment (npm) | 2026-03-13T05:37:35Z | 2026-03-23T05:16:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1584 | Cisco Prime Infrastructure und EPNM: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-16T22:00:00.000+00:00 | 2025-07-16T22:00:00.000+00:00 |
| wid-sec-w-2025-1583 | ffmpeg: Schwachstelle ermöglicht Denial of Service | 2025-07-16T22:00:00.000+00:00 | 2025-11-17T23:00:00.000+00:00 |
| wid-sec-w-2025-1582 | IBM WebSphere Application Server: Schwachstelle ermöglicht Denial of Service | 2025-07-16T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1581 | Fortra GoAnywhere MFT: Schwachstelle ermöglicht Denial of Service | 2025-07-16T22:00:00.000+00:00 | 2025-07-16T22:00:00.000+00:00 |
| wid-sec-w-2025-1580 | Google Chrome / Microsoft Edge: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1579 | Atlassian Bamboo Data Center und Server: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-15T22:00:00.000+00:00 | 2025-10-05T22:00:00.000+00:00 |
| wid-sec-w-2025-1578 | Node.js: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-10-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1577 | Microsoft GitHub Enterprise: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1576 | VMware Produkte: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-07-16T22:00:00.000+00:00 |
| wid-sec-w-2025-1575 | vim (.tar and .zip): Mehrere Schwachstellen ermöglichen Codeausführung | 2025-07-15T22:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2025-1574 | Apache CXF: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1573 | IBM QRadar SIEM: Schwachstelle ermöglicht Cross-Site Scripting | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1572 | Oracle Fusion Middleware: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1571 | Oracle Hyperion: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1570 | Oracle Insurance Applications: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1569 | Oracle Java SE: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-1568 | Oracle JD Edwards: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1567 | Oracle MySQL: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-1566 | Oracle PeopleSoft: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1565 | Oracle Retail Applications: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1564 | Oracle Siebel CRM: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1563 | Oracle Supply Chain: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1562 | Oracle Utilities Applications: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1561 | Oracle Virtualization: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1560 | Oracle Communications Applications: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1559 | Oracle Communications: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1558 | Oracle Construction and Engineering: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1557 | Oracle E-Business Suite: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1556 | Oracle Enterprise Manager: Schwachstelle gefährdet Vertraulichkeit, Integrität und Verfügbarkeit | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1555 | Oracle Financial Services Applications: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-174-05 | Elcomplus SmartICS | 2022-06-23T00:00:00.000000Z | 2022-06-23T00:00:00.000000Z |
| icsa-22-174-04 | Pyramid Solutions EtherNet/IP Adapter Development Kit | 2022-06-23T00:00:00.000000Z | 2022-06-23T00:00:00.000000Z |
| icsa-22-174-03 | Secheron SEPCOS Control and Protection Relay | 2022-06-23T00:00:00.000000Z | 2022-06-23T00:00:00.000000Z |
| icsa-22-174-02 | Yokogawa CAMS for HIS | 2022-06-23T00:00:00.000000Z | 2022-06-23T00:00:00.000000Z |
| icsa-22-174-01 | Yokogawa STARDOM | 2022-06-23T00:00:00.000000Z | 2022-06-23T00:00:00.000000Z |
| icsa-22-172-06 | Siemens WinCC OA | 2022-06-21T00:00:00.000000Z | 2022-06-21T00:00:00.000000Z |
| icsa-22-172-05 | Phoenix Contact Classic Line Industrial Controllers | 2022-06-21T00:00:00.000000Z | 2022-06-21T00:00:00.000000Z |
| icsa-22-172-04 | Phoenix Contact ProConOS and MULTIPROG | 2022-06-21T00:00:00.000000Z | 2022-06-21T00:00:00.000000Z |
| icsa-22-172-03 | Phoenix Contact Classic Line Controllers | 2022-06-21T00:00:00.000000Z | 2022-06-21T00:00:00.000000Z |
| icsa-22-172-02 | JTEKT TOYOPUC | 2022-06-21T00:00:00.000000Z | 2022-06-21T00:00:00.000000Z |
| icsma-22-167-01 | Hillrom Medical Device Management | 2022-06-16T00:00:00.000000Z | 2022-06-16T00:00:00.000000Z |
| icsa-22-167-03 | AutomationDirect DirectLOGIC with Ethernet | 2022-06-16T00:00:00.000000Z | 2022-06-16T00:00:00.000000Z |
| icsa-22-167-02 | AutomationDirect DirectLOGIC with Serial Communication | 2022-06-16T00:00:00.000000Z | 2022-06-16T00:00:00.000000Z |
| icsa-22-167-01 | AutomationDirect C-More EA9 HMI | 2022-06-16T00:00:00.000000Z | 2022-06-16T00:00:00.000000Z |
| icsa-22-172-01 | Mitsubishi Electric MELSEC iQ-R, Q, L Series and MELIPC Series (Update C) | 2022-06-14T06:00:00.000000Z | 2024-05-30T06:00:00.000000Z |
| icsa-22-167-17 | Siemens OpenSSL Affecting Industrial Products | 2022-06-14T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-22-167-16 | Siemens SCALANCE LPE 4903 and SINUMERIK Edge | 2022-06-14T00:00:00.000000Z | 2022-06-14T00:00:00.000000Z |
| icsa-22-167-15 | Siemens Teamcenter Active Workspace | 2022-06-14T00:00:00.000000Z | 2022-06-14T00:00:00.000000Z |
| icsa-22-167-14 | Siemens OpenSSL Affected Industrial Products | 2022-06-14T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-22-167-13 | Siemens Teamcenter | 2022-06-14T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-167-12 | Siemens Spectrum Power Systems | 2022-06-14T00:00:00.000000Z | 2022-06-14T00:00:00.000000Z |
| icsa-22-167-11 | Siemens Xpedition Designer | 2022-06-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-167-10 | Siemens SCALANCE XM-400 and XR-500 | 2022-06-14T00:00:00.000000Z | 2022-06-14T00:00:00.000000Z |
| icsa-22-167-09 | Siemens SCALANCE LPE9403 Third-Party Vulnerabilities | 2022-06-14T00:00:00.000000Z | 2022-06-14T00:00:00.000000Z |
| icsa-22-167-08 | Siemens SICAM GridEdge | 2022-06-14T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-22-167-07 | Siemens SINEMA Remote Connect Server | 2022-06-14T00:00:00.000000Z | 2022-06-14T00:00:00.000000Z |
| icsa-22-167-06 | Siemens Apache HTTP Server | 2022-06-14T00:00:00.000000Z | 2022-10-11T00:00:00.000000Z |
| icsa-22-167-05 | Siemens EN100 Ethernet Module | 2022-06-14T00:00:00.000000Z | 2022-06-14T00:00:00.000000Z |
| icsa-22-167-04 | Siemens Mendix SAML Module | 2022-06-14T00:00:00.000000Z | 2022-06-14T00:00:00.000000Z |
| icsa-22-165-03 | Mitsubishi Electric MELSEC-Q/L and MELSEC iQ-R | 2022-06-14T00:00:00.000000Z | 2022-06-14T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20190205-dnac-xss | Cisco Digital Network Architecture Center Stored Cross-Site Scripting Vulnerability | 2020-02-05T16:00:00+00:00 | 2020-02-05T16:00:00+00:00 |
| cisco-sa-smlbus-switch-dos-r6vqus2u | Cisco Small Business Switches Denial of Service Vulnerability | 2020-01-29T16:00:00+00:00 | 2020-01-29T16:00:00+00:00 |
| cisco-sa-20200129-smlbus-switch-disclos | Cisco Small Business Switches Information Disclosure Vulnerability | 2020-01-29T16:00:00+00:00 | 2021-02-18T22:53:27+00:00 |
| cisco-sa-20200124-webex-unauthjoin | Cisco Webex Meetings Suite and Cisco Webex Meetings Online Unauthenticated Meeting Join Vulnerability | 2020-01-24T16:00:00+00:00 | 2020-01-24T19:21:30+00:00 |
| cisco-sa-webex-cards-dos-fwzncxpq | Cisco Webex Teams Adaptive Cards Denial of Service Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-ucm-csrf-nbhztxl | Cisco Unified Communications Manager Cross-Site Request Forgery Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-telepresence-path-tr-wdrnyezz | Cisco TelePresence Collaboration Endpoint, TelePresence Codec, and RoomOS Software Path Traversal Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T20:52:27+00:00 |
| cisco-sa-sd-wan-cred-evgsf259 | Cisco IOS XE SD-WAN Software Default Credentials Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-jabber-guest-xss-6urxhkqv | Cisco Jabber Guest Cross-Site Scripting Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-iptable-bypass-gxw88xjl | Cisco Application Policy Infrastructure Controller Out Of Band Management IP Tables Bypass Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-esa-dos-87mbkc8n | Cisco Email Security Appliance Zip Decompression Engine Denial of Service Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-esa-bypass-5cdv2hma | Cisco Email Security Appliance Content Filter Bypass Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-email-sec-xss-ebjxuxwp | Cisco Email Security Appliance Cross-Site Scripting Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-cuc-dirtrv-m9hpnme4 | Cisco Unity Connection Directory Traversal Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-wsa-sma-header-inject | Cisco Web Security Appliance and Cisco Content Security Management Appliance HTTP Header Injection Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-02-03T16:50:10+00:00 |
| cisco-sa-20200122-umbrella-msi-install | Cisco Umbrella Roaming Client for Windows Install Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-uc-xss | Cisco Unity Connection Stored Cross-Site Scripting Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-sdwan-sqlinj | Cisco SD-WAN Solution SQL Injection Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-sdwan-sql-inject | Cisco SD-WAN Solution SQL Injection Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-sdwan-priv-esc | Cisco SD-WAN Solution Local Privilege Escalation Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-sdwan-cmd-inject | Cisco SD-WAN vManage Command Injection Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-sbsms-xss | Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability | 2020-01-22T16:00:00+00:00 | 2021-02-18T22:59:12+00:00 |
| cisco-sa-20200122-on-prem-dos | Cisco Smart Software Manager On-Prem Web Interface Denial of Service Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-ios-xr-routes | Cisco IOS XR Software BGP EVPN Operational Routes Denial of Service Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-24T16:22:50+00:00 |
| cisco-sa-20200122-ios-xr-evpn | Cisco IOS XR Software BGP EVPN Denial of Service Vulnerabilities | 2020-01-22T16:00:00+00:00 | 2020-02-07T16:48:01+00:00 |
| cisco-sa-20200122-ios-xr-dos | Cisco IOS XR Software Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-02-19T18:42:41+00:00 |
| cisco-sa-20200122-ios-xr-bgp-dos | Cisco IOS XR Software Border Gateway Protocol Attribute Denial of Service Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-hcm-f-csrf | Cisco Hosted Collaboration Mediation Fulfillment Cross-Site Request Forgery Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-fmc-auth | Cisco Firepower Management Center Lightweight Directory Access Protocol Authentication Bypass Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-cuc-info-disclosure | Cisco Unified Communications Manager Information Disclosure Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-64655 | Dynamics OmniChannel SDK Storage Containers Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-20T00:00:00.000Z |
| msrc_cve-2025-62459 | Microsoft Defender Portal Spoofing Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-20T00:00:00.000Z |
| msrc_cve-2025-62453 | GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62452 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62449 | Microsoft Visual Studio Code CoPilot Chat Extension Security Feature Bypass Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62222 | Agentic AI and Visual Studio Code Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62220 | Windows Subsystem for Linux GUI Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-13T00:00:00.000Z |
| msrc_cve-2025-62219 | Microsoft Wireless Provisioning System Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62218 | Microsoft Wireless Provisioning System Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62217 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62216 | Microsoft Office Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62215 | Windows Kernel Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62214 | Visual Studio Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62213 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62211 | Dynamics 365 Field Service (online) Spoofing Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62210 | Dynamics 365 Field Service (online) Spoofing Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62209 | Windows License Manager Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-18T00:00:00.000Z |
| msrc_cve-2025-62208 | Windows License Manager Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-18T00:00:00.000Z |
| msrc_cve-2025-62207 | Azure Monitor Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-20T00:00:00.000Z |
| msrc_cve-2025-62206 | Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62205 | Microsoft Office Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62204 | Microsoft SharePoint Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62203 | Microsoft Excel Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62202 | Microsoft Excel Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62201 | Microsoft Excel Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62200 | Microsoft Excel Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62199 | Microsoft Office Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60728 | Microsoft Excel Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60727 | Microsoft Excel Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60726 | Microsoft Excel Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:14964-1 | gsl-2.8-4.1 on GA media | 2025-04-03T00:00:00Z | 2025-04-03T00:00:00Z |
| opensuse-su-2025:14963-1 | go1.24-1.24.2-1.1 on GA media | 2025-04-03T00:00:00Z | 2025-04-03T00:00:00Z |
| opensuse-su-2025:14962-1 | go1.23-1.23.8-1.1 on GA media | 2025-04-03T00:00:00Z | 2025-04-03T00:00:00Z |
| opensuse-su-2025:14961-1 | firefox-esr-128.9.0-1.1 on GA media | 2025-04-03T00:00:00Z | 2025-04-03T00:00:00Z |
| opensuse-su-2025:0113-1 | Security update for assimp | 2025-04-02T16:31:31Z | 2025-04-02T16:31:31Z |
| opensuse-su-2025:14960-1 | perl-Data-Entropy-0.8.0-1.1 on GA media | 2025-04-02T00:00:00Z | 2025-04-02T00:00:00Z |
| opensuse-su-2025:14959-1 | libsaml-devel-3.3.1-2.1 on GA media | 2025-04-02T00:00:00Z | 2025-04-02T00:00:00Z |
| opensuse-su-2025:14958-1 | libmozjs-128-0-128.8.1-1.1 on GA media | 2025-04-02T00:00:00Z | 2025-04-02T00:00:00Z |
| opensuse-su-2025:14957-1 | libtheora-devel-1.2.0-1.1 on GA media | 2025-04-02T00:00:00Z | 2025-04-02T00:00:00Z |
| opensuse-su-2025:14956-1 | headscale-0.25.1-2.1 on GA media | 2025-04-02T00:00:00Z | 2025-04-02T00:00:00Z |
| opensuse-su-2025:14955-1 | govulncheck-vulndb-0.0.20250331T171002-1.1 on GA media | 2025-04-02T00:00:00Z | 2025-04-02T00:00:00Z |
| opensuse-su-2025:14954-1 | gotosocial-0.18.3-2.1 on GA media | 2025-04-02T00:00:00Z | 2025-04-02T00:00:00Z |
| opensuse-su-2025:14953-1 | ghostscript-10.05.0-1.1 on GA media | 2025-04-02T00:00:00Z | 2025-04-02T00:00:00Z |
| opensuse-su-2025:14952-1 | expat-2.7.1-1.1 on GA media | 2025-04-02T00:00:00Z | 2025-04-02T00:00:00Z |
| opensuse-su-2025:14951-1 | aws-efs-utils-2.2.1-1.1 on GA media | 2025-04-02T00:00:00Z | 2025-04-02T00:00:00Z |
| opensuse-su-2025:14950-1 | assimp-devel-5.4.3-5.1 on GA media | 2025-04-02T00:00:00Z | 2025-04-02T00:00:00Z |
| opensuse-su-2025:14949-1 | GraphicsMagick-1.3.45-2.1 on GA media | 2025-04-02T00:00:00Z | 2025-04-02T00:00:00Z |
| opensuse-su-2025:14948-1 | MozillaFirefox-136.0.4-1.1 on GA media | 2025-04-01T00:00:00Z | 2025-04-01T00:00:00Z |
| opensuse-su-2025:0111-1 | Security update for opera | 2025-03-31T22:46:48Z | 2025-03-31T22:46:48Z |
| opensuse-su-2025:0110-1 | Security update for restic | 2025-03-31T12:01:10Z | 2025-03-31T12:01:10Z |
| opensuse-su-2025:14947-1 | upx-5.0.0-2.1 on GA media | 2025-03-31T00:00:00Z | 2025-03-31T00:00:00Z |
| opensuse-su-2025:14946-1 | libmodsecurity3-3.0.14-1.1 on GA media | 2025-03-31T00:00:00Z | 2025-03-31T00:00:00Z |
| opensuse-su-2025:14945-1 | atop-2.11.1-1.1 on GA media | 2025-03-31T00:00:00Z | 2025-03-31T00:00:00Z |
| opensuse-su-2025:14944-1 | rke2-1.31-1.31.7+rke2r1-1.1 on GA media | 2025-03-28T00:00:00Z | 2025-03-28T00:00:00Z |
| opensuse-su-2025:14943-1 | rke2-1.30-1.30.11+rke2r1-1.1 on GA media | 2025-03-28T00:00:00Z | 2025-03-28T00:00:00Z |
| opensuse-su-2025:14942-1 | rke2-1.29-1.29.15+rke2r1-1.1 on GA media | 2025-03-28T00:00:00Z | 2025-03-28T00:00:00Z |
| opensuse-su-2025:14941-1 | rke2-1.32.3+rke2r1-1.1 on GA media | 2025-03-28T00:00:00Z | 2025-03-28T00:00:00Z |
| opensuse-su-2025:14940-1 | podman-5.4.1-3.1 on GA media | 2025-03-28T00:00:00Z | 2025-03-28T00:00:00Z |
| opensuse-su-2025:14939-1 | matrix-synapse-1.127.1-1.1 on GA media | 2025-03-28T00:00:00Z | 2025-03-28T00:00:00Z |
| opensuse-su-2025:14938-1 | istioctl-1.25.1-1.1 on GA media | 2025-03-28T00:00:00Z | 2025-03-28T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:0052 | Red Hat Security Advisory: gcc-toolset-14-binutils security update | 2026-01-05T09:16:59+00:00 | 2026-04-13T20:00:16+00:00 |
| rhsa-2026:0050 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.6.2 | 2026-01-05T08:04:03+00:00 | 2026-04-14T02:03:06+00:00 |
| rhsa-2026:0035 | Red Hat Security Advisory: xorg-x11-server-Xwayland security update | 2026-01-05T06:18:58+00:00 | 2026-03-18T03:15:08+00:00 |
| rhsa-2026:0033 | Red Hat Security Advisory: xorg-x11-server-Xwayland security update | 2026-01-05T06:18:08+00:00 | 2026-03-18T03:15:06+00:00 |
| rhsa-2026:0036 | Red Hat Security Advisory: xorg-x11-server-Xwayland security update | 2026-01-05T06:16:04+00:00 | 2026-03-18T03:15:08+00:00 |
| rhsa-2026:0034 | Red Hat Security Advisory: xorg-x11-server-Xwayland security update | 2026-01-05T06:11:18+00:00 | 2026-03-18T03:15:06+00:00 |
| rhsa-2026:0031 | Red Hat Security Advisory: xorg-x11-server-Xwayland security update | 2026-01-05T06:09:23+00:00 | 2026-03-18T03:15:08+00:00 |
| rhsa-2026:0029 | Red Hat Security Advisory: mod_md security update | 2026-01-05T05:28:58+00:00 | 2026-03-18T03:15:22+00:00 |
| rhsa-2026:0030 | Red Hat Security Advisory: mod_md security update | 2026-01-05T05:19:04+00:00 | 2026-03-18T03:15:26+00:00 |
| rhsa-2026:0013 | Red Hat Security Advisory: firefox security update | 2026-01-05T02:17:33+00:00 | 2026-03-18T03:13:47+00:00 |
| rhsa-2026:0016 | Red Hat Security Advisory: firefox security update | 2026-01-05T02:09:38+00:00 | 2026-03-18T03:13:48+00:00 |
| rhsa-2026:0027 | Red Hat Security Advisory: gimp:2.8 security update | 2026-01-05T02:01:48+00:00 | 2026-03-18T03:14:17+00:00 |
| rhsa-2026:0012 | Red Hat Security Advisory: httpd:2.4 security update | 2026-01-05T02:01:38+00:00 | 2026-04-08T16:37:42+00:00 |
| rhsa-2026:0011 | Red Hat Security Advisory: httpd:2.4 security update | 2026-01-05T02:00:58+00:00 | 2026-04-08T16:37:42+00:00 |
| rhsa-2026:0022 | Red Hat Security Advisory: thunderbird security update | 2026-01-05T01:57:23+00:00 | 2026-03-18T03:13:50+00:00 |
| rhsa-2026:0021 | Red Hat Security Advisory: thunderbird security update | 2026-01-05T01:56:08+00:00 | 2026-03-18T03:13:50+00:00 |
| rhsa-2026:0010 | Red Hat Security Advisory: httpd:2.4 security update | 2026-01-05T01:55:58+00:00 | 2026-04-08T16:37:40+00:00 |
| rhsa-2026:0026 | Red Hat Security Advisory: thunderbird security update | 2026-01-05T01:50:58+00:00 | 2026-03-18T03:13:51+00:00 |
| rhsa-2026:0003 | Red Hat Security Advisory: thunderbird security update | 2026-01-05T01:47:48+00:00 | 2026-03-18T03:13:45+00:00 |
| rhsa-2026:0004 | Red Hat Security Advisory: thunderbird security update | 2026-01-05T01:42:23+00:00 | 2026-03-18T03:13:45+00:00 |
| rhsa-2026:0023 | Red Hat Security Advisory: thunderbird security update | 2026-01-05T01:39:46+00:00 | 2026-03-18T03:13:51+00:00 |
| rhsa-2026:0017 | Red Hat Security Advisory: firefox security update | 2026-01-05T01:39:11+00:00 | 2026-03-18T03:13:48+00:00 |
| rhsa-2026:0014 | Red Hat Security Advisory: firefox security update | 2026-01-05T01:39:07+00:00 | 2026-03-18T03:13:48+00:00 |
| rhsa-2026:0009 | Red Hat Security Advisory: httpd:2.4 security update | 2026-01-05T01:39:00+00:00 | 2026-04-08T16:37:40+00:00 |
| rhsa-2026:0019 | Red Hat Security Advisory: thunderbird security update | 2026-01-05T01:38:55+00:00 | 2026-03-18T03:13:49+00:00 |
| rhsa-2026:0018 | Red Hat Security Advisory: firefox security update | 2026-01-05T01:37:48+00:00 | 2026-03-18T03:13:49+00:00 |
| rhsa-2026:0020 | Red Hat Security Advisory: thunderbird security update | 2026-01-05T01:37:22+00:00 | 2026-03-18T03:13:49+00:00 |
| rhsa-2026:0007 | Red Hat Security Advisory: firefox security update | 2026-01-05T01:37:07+00:00 | 2026-03-18T03:13:47+00:00 |
| rhsa-2026:0015 | Red Hat Security Advisory: firefox security update | 2026-01-05T01:36:47+00:00 | 2026-03-18T03:13:48+00:00 |
| rhsa-2026:0025 | Red Hat Security Advisory: thunderbird security update | 2026-01-05T01:33:48+00:00 | 2026-03-18T03:13:51+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0120-1 | Security update for ovmf | 2026-01-14T06:46:44Z | 2026-01-14T06:46:44Z |
| suse-su-2026:20355-1 | Security update for libtasn1 | 2026-01-13T13:23:28Z | 2026-01-13T13:23:28Z |
| suse-su-2026:20354-1 | Security update for libsodium | 2026-01-13T13:23:04Z | 2026-01-13T13:23:04Z |
| suse-su-2026:20242-1 | Security update for libsodium | 2026-01-13T13:09:40Z | 2026-01-13T13:09:40Z |
| suse-su-2026:20077-1 | Security update for python-uv | 2026-01-13T12:49:17Z | 2026-01-13T12:49:17Z |
| suse-su-2026:20091-1 | Security update for hawk2 | 2026-01-13T12:46:40Z | 2026-01-13T12:46:40Z |
| suse-su-2026:20093-1 | Security update for hawk2 | 2026-01-13T12:43:07Z | 2026-01-13T12:43:07Z |
| suse-su-2026:0119-1 | Security update for curl | 2026-01-13T08:10:35Z | 2026-01-13T08:10:35Z |
| suse-su-2026:0118-1 | Security update for libtasn1 | 2026-01-13T06:46:54Z | 2026-01-13T06:46:54Z |
| suse-su-2026:0117-1 | Security update for util-linux | 2026-01-13T04:33:43Z | 2026-01-13T04:33:43Z |
| suse-su-2026:0116-1 | Security update for util-linux | 2026-01-13T02:33:45Z | 2026-01-13T02:33:45Z |
| suse-su-2026:0115-1 | Security update for util-linux | 2026-01-12T15:03:44Z | 2026-01-12T15:03:44Z |
| suse-su-2026:20053-1 | Security update for libsoup | 2026-01-12T12:03:42Z | 2026-01-12T12:03:42Z |
| suse-su-2026:20051-1 | Security update for libtasn1 | 2026-01-12T12:00:27Z | 2026-01-12T12:00:27Z |
| suse-su-2026:20031-1 | Security update for MozillaFirefox | 2026-01-12T12:00:16Z | 2026-01-12T12:00:16Z |
| suse-su-2026:20074-1 | Security update for glib2 | 2026-01-12T11:58:25Z | 2026-01-12T11:58:25Z |
| suse-su-2026:20032-1 | Security update for glib2 | 2026-01-12T11:58:25Z | 2026-01-12T11:58:25Z |
| suse-su-2026:20072-1 | Security update for libmicrohttpd | 2026-01-12T11:15:02Z | 2026-01-12T11:15:02Z |
| suse-su-2026:20029-1 | Security update for libmicrohttpd | 2026-01-12T11:15:02Z | 2026-01-12T11:15:02Z |
| suse-su-2026:20073-1 | Security update for libpng16 | 2026-01-12T11:15:01Z | 2026-01-12T11:15:01Z |
| suse-su-2026:20030-1 | Security update for libpng16 | 2026-01-12T11:15:01Z | 2026-01-12T11:15:01Z |
| suse-su-2026:0099-1 | Security update for ImageMagick | 2026-01-12T10:37:47Z | 2026-01-12T10:37:47Z |
| suse-su-2026:0107-1 | Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) | 2026-01-12T10:34:47Z | 2026-01-12T10:34:47Z |
| suse-su-2026:0090-1 | Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5) | 2026-01-12T10:34:10Z | 2026-01-12T10:34:10Z |
| suse-su-2026:20071-1 | Security update for python-tornado6 | 2026-01-12T10:30:08Z | 2026-01-12T10:30:08Z |
| suse-su-2026:20028-1 | Security update for python-tornado6 | 2026-01-12T10:30:08Z | 2026-01-12T10:30:08Z |
| suse-su-2026:20070-1 | Security update for avahi | 2026-01-11T16:54:30Z | 2026-01-11T16:54:30Z |
| suse-su-2026:20027-1 | Security update for avahi | 2026-01-11T16:54:30Z | 2026-01-11T16:54:30Z |
| suse-su-2026:0087-1 | Security update for libheif | 2026-01-09T15:19:44Z | 2026-01-09T15:19:44Z |
| suse-su-2026:0086-1 | Security update for php8 | 2026-01-09T15:01:56Z | 2026-01-09T15:01:56Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:4262 | Moderate: linux-firmware security update | 2024-07-02T00:00:00Z | 2024-07-08T18:05:46Z |
| alsa-2024:4260 | Moderate: python-idna security update | 2024-07-02T00:00:00Z | 2024-07-03T11:38:17Z |
| alsa-2024:4259 | Moderate: xmlrpc-c security and bug fix update | 2024-07-02T00:00:00Z | 2024-07-03T14:16:04Z |
| alsa-2024:4256 | Important: less security update | 2024-07-02T00:00:00Z | 2024-07-03T11:41:26Z |
| alsa-2024:4252 | Moderate: nghttp2 security update | 2024-07-02T00:00:00Z | 2024-07-03T11:46:01Z |
| alsa-2024:4249 | Low: c-ares security update | 2024-07-02T00:00:00Z | 2024-07-03T15:15:20Z |
| alsa-2024:4247 | Moderate: libuv security update | 2024-07-02T00:00:00Z | 2024-07-03T11:49:55Z |
| alsa-2024:4246 | Moderate: container-tools security update | 2024-07-02T00:00:00Z | 2024-07-03T12:02:02Z |
| alsa-2024:4245 | Moderate: python3 security update | 2024-07-02T00:00:00Z | 2024-07-03T12:05:46Z |
| alsa-2024:4244 | Moderate: python3.11-PyMySQL security update | 2024-07-02T00:00:00Z | 2024-07-03T12:11:03Z |
| alsa-2024:4243 | Moderate: python3 security update | 2024-07-02T00:00:00Z | 2024-07-03T12:16:48Z |
| alsa-2024:4242 | Moderate: libreoffice security update | 2024-07-02T00:00:00Z | 2024-07-04T06:42:12Z |
| alsa-2024:4241 | Moderate: iperf3 security update | 2024-07-02T00:00:00Z | 2024-07-03T14:17:31Z |
| alsa-2024:4237 | Moderate: go-toolset security update | 2024-07-02T00:00:00Z | 2024-07-03T12:24:12Z |
| alsa-2024:4235 | Important: 389-ds security update | 2024-07-02T00:00:00Z | 2024-07-04T07:29:57Z |
| alsa-2024:4231 | Moderate: python-jinja2 security update | 2024-07-02T00:00:00Z | 2024-07-03T14:19:17Z |
| alsa-2024:4227 | Moderate: python-pillow security update | 2024-07-02T00:00:00Z | 2024-07-03T14:21:35Z |
| alsa-2024:4212 | Moderate: golang security update | 2024-07-02T00:00:00Z | 2024-07-02T21:23:44Z |
| alsa-2024:4211 | Important: kernel security and bug fix update | 2024-07-02T00:00:00Z | 2024-07-02T15:12:03Z |
| alsa-2024:4197 | Moderate: httpd:2.4/httpd security update | 2024-07-01T00:00:00Z | 2024-07-01T16:03:26Z |
| alsa-2024:4165 | Important: pki-core security update | 2024-06-27T00:00:00Z | 2024-06-27T20:01:45Z |
| alsa-2024:4084 | Important: git security update | 2024-06-25T00:00:00Z | 2024-06-25T14:12:03Z |
| alsa-2024:4083 | Important: git security update | 2024-06-25T00:00:00Z | 2024-06-25T14:01:56Z |
| alsa-2024:4078 | Important: python3.9 security update | 2024-06-25T00:00:00Z | 2024-06-25T13:59:03Z |
| alsa-2024:4077 | Important: python3.11 security update | 2024-06-25T00:00:00Z | 2024-06-25T13:57:29Z |
| alsa-2024:4058 | Important: python3.11 security update | 2024-06-24T00:00:00Z | 2024-06-24T12:16:49Z |
| alsa-2024:4050 | Moderate: libreswan security update | 2024-06-23T00:00:00Z | 2024-06-24T12:13:31Z |
| alsa-2024:4036 | Important: thunderbird security update | 2024-06-20T00:00:00Z | 2024-06-21T07:20:21Z |
| alsa-2024:4002 | Important: thunderbird security update | 2024-06-20T00:00:00Z | 2024-06-20T13:53:09Z |
| alsa-2024:4000 | Important: ghostscript security update | 2024-06-20T00:00:00Z | 2024-06-20T11:36:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-289 | Heap-buffer-overflow in add_compile_string | 2022-03-30T00:01:45.027746Z | 2023-02-24T02:02:17.563669Z |
| osv-2022-288 | Segv on unknown address in flb_ra_translate | 2022-03-30T00:01:21.966556Z | 2023-02-24T01:26:04.553459Z |
| osv-2022-284 | Heap-double-free in read_config | 2022-03-27T00:00:37.751332Z | 2023-02-24T01:42:35.895091Z |
| osv-2022-283 | Heap-buffer-overflow in epassNUMBER_hook_path | 2022-03-26T00:01:45.914197Z | 2022-03-26T00:01:45.914434Z |
| osv-2022-282 | Heap-buffer-overflow in cosm_new_file | 2022-03-26T00:01:18.978386Z | 2022-03-26T00:01:18.978611Z |
| osv-2022-281 | Heap-use-after-free in jsmn_parse | 2022-03-26T00:01:08.816881Z | 2023-02-24T01:53:28.171732Z |
| osv-2022-280 | Heap-buffer-overflow in Exiv2::getULong | 2022-03-26T00:00:34.484159Z | 2022-04-13T03:04:39.315882Z |
| osv-2022-279 | Heap-double-free in flb_pack_state_reset | 2022-03-26T00:00:22.006982Z | 2022-09-03T00:24:48.577747Z |
| osv-2022-278 | UNKNOWN READ in s_RLE_process | 2022-03-26T00:00:21.517737Z | 2023-02-24T01:59:07.320866Z |
| osv-2022-276 | Segv on unknown address in sc_file_clear_acl_entries | 2022-03-24T00:00:43.845979Z | 2022-03-24T00:00:43.846203Z |
| osv-2022-271 | UNKNOWN READ in pdf14_buf_free | 2022-03-22T00:01:47.478262Z | 2022-04-13T03:04:34.441603Z |
| osv-2022-270 | Stack-buffer-overflow in fn_ElIn_evaluate | 2022-03-22T00:00:43.287274Z | 2023-02-24T02:22:05.985394Z |
| osv-2022-268 | Stack-use-after-return in template_sanity_check | 2022-03-21T00:01:55.565037Z | 2022-03-21T00:01:55.565249Z |
| osv-2022-267 | Segv on unknown address in flb_sds_copy | 2022-03-21T00:01:43.029782Z | 2022-04-13T03:04:38.355696Z |
| osv-2022-265 | Heap-buffer-overflow in jxl::WriteToPixelCallbackStage::ProcessRow | 2022-03-21T00:00:38.667705Z | 2022-04-13T03:04:41.859422Z |
| osv-2022-264 | Heap-buffer-overflow in jxl::N_AVX2::BlendingStage::ProcessRow | 2022-03-21T00:00:16.278407Z | 2022-04-13T03:04:38.130266Z |
| osv-2022-262 | Heap-double-free in flb_pack_state_reset | 2022-03-20T00:01:42.677304Z | 2022-04-13T03:04:38.171801Z |
| osv-2022-261 | Segv on unknown address in flb_ra_create | 2022-03-19T00:01:36.425719Z | 2022-04-13T03:04:38.160364Z |
| osv-2022-260 | Heap-double-free in read_config | 2022-03-19T00:01:34.875264Z | 2022-04-13T03:04:38.402999Z |
| osv-2022-259 | Heap-double-free in read_config | 2022-03-19T00:01:33.918499Z | 2022-04-13T03:04:38.220410Z |
| osv-2022-258 | Heap-double-free in Imf_3_1::RgbaInputFile::~RgbaInputFile | 2022-03-19T00:00:41.775467Z | 2022-04-13T03:04:37.079008Z |
| osv-2022-257 | Segv on unknown address in flb_config_map_properties_check | 2022-03-19T00:00:27.794395Z | 2022-04-13T03:04:38.314832Z |
| osv-2022-255 | Heap-double-free in flb_pack_state_reset | 2022-03-19T00:00:22.692682Z | 2022-04-13T03:04:38.225956Z |
| osv-2022-254 | Heap-use-after-free in jsmn_parse | 2022-03-19T00:00:21.433441Z | 2022-04-13T03:04:38.320458Z |
| osv-2022-252 | Heap-buffer-overflow in grk::PacketLengthMarkers::readPLM | 2022-03-18T00:01:35.796630Z | 2023-07-22T14:10:55.592593Z |
| osv-2022-250 | Heap-buffer-overflow in __covrec_1D46B478ANUMBER | 2022-03-17T00:01:53.988524Z | 2022-04-13T03:04:40.163328Z |
| osv-2022-248 | Uncaught exception in java.base/java.nio.Bits.reserveMemory | 2022-03-16T00:01:40.965144Z | 2022-04-13T03:04:31.580413Z |
| osv-2022-245 | Heap-buffer-overflow in grk::PacketIter::genPrecinctInfo | 2022-03-15T00:01:42.984652Z | 2023-07-22T14:10:55.061574Z |
| osv-2022-244 | Heap-buffer-overflow in process_ef | 2022-03-15T00:01:37.262017Z | 2022-04-13T03:04:41.543168Z |
| osv-2022-243 | Heap-buffer-overflow in grk::PacketIter::next_pcrl | 2022-03-15T00:00:45.636919Z | 2022-04-13T03:04:39.523343Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-superset-2021-44451 | API sensitive information leak | 2025-02-05T07:29:30.216Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2022-27479 | SQL injection vulnerability in chart data API | 2025-02-05T07:29:25.394Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2022-41703 | Apache Superset: SQL injection vulnerability in adhoc clauses | 2025-02-05T07:29:20.796Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43717 | Apache Superset: Cross-Site Scripting on dashboards | 2025-02-05T07:29:16.011Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43718 | Apache Superset: Cross-Site Scripting vulnerability on upload forms | 2025-02-05T07:29:11.197Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43719 | Apache Superset: Cross Site Request Forgery (CSRF) on accept, request access API | 2025-02-05T07:29:05.011Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43720 | Apache Superset: Improper rendering of user input | 2025-02-05T07:28:59.302Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43721 | Apache Superset: Open Redirect Vulnerability | 2025-02-05T07:28:53.604Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-45438 | Apache Superset: Dashboard metadata information leak | 2025-02-05T07:28:48.307Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2023-25504 | Apache Superset: Possible SSRF on import datasets | 2025-02-05T07:28:42.590Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-27523 | Apache Superset: Improper data permission validation on Jinja templated queries | 2025-02-05T07:28:36.910Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-27524 | Apache Superset: Session validation vulnerability when using provided default SECRET_KEY | 2025-02-05T07:28:32.393Z | 2025-10-22T09:08:25.162Z |
| bit-superset-2023-27525 | Apache Superset: Incorrect default permissions for Gamma role | 2025-02-05T07:28:27.194Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-27526 | Apache Superset: Improper Authorization check on import charts | 2025-02-05T07:28:21.504Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-30776 | Apache Superset: Database connection password leak | 2025-02-05T07:28:16.401Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-32672 | Apache Superset: SQL parser edge case bypasses data access authorization | 2025-02-05T07:28:10.906Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-36387 | Apache Superset: Improper API permission for low privilege users | 2025-02-05T07:28:04.907Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-36388 | Apache Superset: Improper API permission for low privilege users allows for SSRF | 2025-02-05T07:27:59.197Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-37941 | Apache Superset: Metadata db write access can lead to remote code execution | 2025-02-05T07:27:54.294Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-39264 | Apache Superset: Stack traces enabled by default | 2025-02-05T07:27:48.606Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-39265 | Apache Superset: Possible Unauthorized Registration of SQLite Database Connections | 2025-02-05T07:27:42.608Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-40610 | Apache Superset: Privilege escalation with default examples database | 2025-02-05T07:27:36.004Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-42501 | Apache Superset: Unnecessary read permissions within the Gamma role | 2025-02-05T07:27:30.205Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-42502 | Apache Superset: Open Redirect Vulnerability | 2025-02-05T07:27:24.700Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-42504 | Apache Superset: Lack of rate limiting allows for possible denial of service | 2025-02-05T07:27:18.806Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-42505 | Apache Superset: Sensitive information disclosure on db connection details | 2025-02-05T07:27:12.602Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-43701 | Apache Superset: Stored XSS on API endpoint | 2025-02-05T07:27:04.308Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-46104 | Apache Superset: Allows for uncontrolled resource consumption via a ZIP bomb | 2025-02-05T07:26:56.804Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-49657 | Apache Superset: Stored XSS in Dashboard Title and Chart Title | 2025-02-05T07:26:48.212Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-49734 | Apache Superset: Privilege Escalation Vulnerability | 2025-02-05T07:26:41.202Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2024-avi-1045 | Multiples vulnérabilités dans Google Pixel | 2024-12-06T00:00:00.000000 | 2024-12-06T00:00:00.000000 |
| certfr-2024-avi-1044 | Multiples vulnérabilités dans MISP | 2024-12-05T00:00:00.000000 | 2024-12-05T00:00:00.000000 |
| certfr-2024-avi-1043 | Vulnérabilité dans Cisco NX-OS | 2024-12-05T00:00:00.000000 | 2024-12-05T00:00:00.000000 |
| certfr-2024-avi-1042 | Multiples vulnérabilités dans Sonicwall Secure Mobile Access | 2024-12-05T00:00:00.000000 | 2024-12-05T00:00:00.000000 |
| certfr-2024-avi-1041 | Vulnérabilité dans SolarWinds Platform | 2024-12-04T00:00:00.000000 | 2024-12-04T00:00:00.000000 |
| certfr-2024-avi-1040 | Vulnérabilité dans Moxa VPort 07-3 Series | 2024-12-04T00:00:00.000000 | 2024-12-04T00:00:00.000000 |
| certfr-2024-avi-1039 | Multiples vulnérabilités dans les produits Veeam | 2024-12-04T00:00:00.000000 | 2024-12-04T00:00:00.000000 |
| certfr-2024-avi-1038 | Vulnérabilité dans Google Chrome | 2024-12-04T00:00:00.000000 | 2024-12-04T00:00:00.000000 |
| certfr-2024-avi-1037 | Multiples vulnérabilités dans HPE Aruba Networking ClearPass Policy Manager | 2024-12-04T00:00:00.000000 | 2024-12-04T00:00:00.000000 |
| certfr-2024-avi-1036 | Multiples vulnérabilités dans Google Android | 2024-12-03T00:00:00.000000 | 2024-12-03T00:00:00.000000 |
| certfr-2024-avi-1035 | Multiples vulnérabilités dans les produits Axis | 2024-12-03T00:00:00.000000 | 2024-12-03T00:00:00.000000 |
| certfr-2024-avi-1034 | Multiples vulnérabilités dans Ruby on Rails | 2024-12-03T00:00:00.000000 | 2024-12-03T00:00:00.000000 |
| certfr-2024-avi-1033 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-11-29T00:00:00.000000 | 2024-11-29T00:00:00.000000 |
| certfr-2024-avi-1032 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2024-11-29T00:00:00.000000 | 2024-11-29T00:00:00.000000 |
| certfr-2024-avi-1031 | Multiples vulnérabilités dans le noyau Linux de Debian | 2024-11-29T00:00:00.000000 | 2024-11-29T00:00:00.000000 |
| certfr-2024-avi-1030 | Multiples vulnérabilités dans IBM QRadar | 2024-11-29T00:00:00.000000 | 2024-11-29T00:00:00.000000 |
| certfr-2024-avi-1029 | Vulnérabilité dans Traefik | 2024-11-29T00:00:00.000000 | 2024-11-29T00:00:00.000000 |
| certfr-2024-avi-1028 | Multiples vulnérabilités dans Zabbix | 2024-11-29T00:00:00.000000 | 2024-11-29T00:00:00.000000 |
| certfr-2024-avi-1027 | Multiples vulnérabilités dans VMware Aria Operations | 2024-11-29T00:00:00.000000 | 2024-11-29T00:00:00.000000 |
| certfr-2024-avi-1026 | Multiples vulnérabilités dans les produits Synology | 2024-11-28T00:00:00.000000 | 2025-12-08T00:00:00.000000 |
| certfr-2024-avi-1025 | Multiples vulnérabilités dans les produits Mozilla | 2024-11-27T00:00:00.000000 | 2024-11-27T00:00:00.000000 |
| certfr-2024-avi-1024 | Multiples vulnérabilités dans les produits Microsoft | 2024-11-27T00:00:00.000000 | 2024-11-27T00:00:00.000000 |
| certfr-2024-avi-1023 | Vulnérabilité dans Microsoft Azure | 2024-11-27T00:00:00.000000 | 2024-11-27T00:00:00.000000 |
| certfr-2024-avi-1022 | Multiples vulnérabilités dans les produits Splunk | 2024-11-27T00:00:00.000000 | 2024-11-27T00:00:00.000000 |
| certfr-2024-avi-1021 | Multiples vulnérabilités dans GitLab | 2024-11-27T00:00:00.000000 | 2024-11-27T00:00:00.000000 |
| certfr-2024-avi-1020 | Vulnérabilité dans Palo Alto Networks GlobalProtect App | 2024-11-26T00:00:00.000000 | 2024-11-26T00:00:00.000000 |
| certfr-2024-avi-1019 | Multiples vulnérabilités dans Netgate pfSense | 2024-11-26T00:00:00.000000 | 2024-11-26T00:00:00.000000 |
| certfr-2024-avi-1018 | Multiples vulnérabilités dans les produits Qnap | 2024-11-25T00:00:00.000000 | 2024-11-25T00:00:00.000000 |
| certfr-2024-avi-1017 | Multiples vulnérabilités dans Centreon Central server | 2024-11-25T00:00:00.000000 | 2024-11-25T00:00:00.000000 |
| certfr-2024-avi-1016 | Vulnérabilité dans NetApp Brocade SAN Navigator | 2024-11-25T00:00:00.000000 | 2024-11-25T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000194 | Docomo L-04D mobile WiFi router vulnerable to cross-site request forgery | 2016-10-03T15:17+09:00 | 2018-01-17T11:53+09:00 |
| jvndb-2016-000183 | baserCMS plugin Uploader vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000182 | baserCMS plugin Mail vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000181 | baserCMS plugin Feed vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000180 | baserCMS plugin Blog vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000179 | baserCMS vulnerable to cross-site scripting | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000178 | baserCMS vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000177 | baserCMS vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000176 | baserCMS plugin Blog vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000175 | baserCMS plugin Blog vulnerable to cross-site scripting | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000174 | baserCMS plugin Mail vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000173 | baserCMS plugin Mail vulnerable to cross-site scripting | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000172 | baserCMS vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:36+09:00 |
| jvndb-2016-000171 | ManageEngine ServiceDesk Plus uses an insecure method for cookie generation | 2016-09-29T14:39+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000170 | ManageEngine ServiceDesk Plus fails to restrict access permissions | 2016-09-29T14:39+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000169 | ManageEngine ServiceDesk Plus vulnerable to cross-site scripting | 2016-09-29T14:39+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000167 | Multiple plugins for Geeklog IVYWE edition vulnerable to cross-site scripting | 2016-09-23T14:15+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000161 | Money Forward Apps for Android vulnerability that allows unintended operations | 2016-09-20T15:19+09:00 | 2017-11-27T18:01+09:00 |
| jvndb-2016-000160 | Money Forward Apps for Android vulnerable in the WebView class | 2016-09-20T15:19+09:00 | 2017-11-27T18:01+09:00 |
| jvndb-2016-000166 | Trend Micro Internet Security vulnerability where files may be excluded as scan targets | 2016-09-16T14:31+09:00 | 2016-09-16T14:31+09:00 |
| jvndb-2016-000165 | Splunk Enterprise and Splunk Light vulnerable to cross-site scripting | 2016-09-16T14:17+09:00 | 2018-01-24T11:53+09:00 |
| jvndb-2016-000164 | Splunk Enterprise and Splunk Light vulnerable to open redirect | 2016-09-16T14:16+09:00 | 2017-11-27T16:55+09:00 |
| jvndb-2016-000163 | Splunk Enterprise and Splunk Light vulnerable to open redirect | 2016-09-16T14:08+09:00 | 2017-11-27T16:55+09:00 |
| jvndb-2016-000162 | Splunk Enterprise and Splunk Lite vulnerable to cross-site scripting | 2016-09-16T13:56+09:00 | 2017-11-27T16:55+09:00 |
| jvndb-2016-000159 | H2O use of externally-controlled format string | 2016-09-15T14:26+09:00 | 2017-11-27T17:23+09:00 |
| jvndb-2016-000158 | Zend Framework vulnerable to SQL injection | 2016-09-15T14:11+09:00 | 2017-03-16T14:15+09:00 |
| jvndb-2016-000157 | CS-Cart add-on "Twigmo" vulnerable to PHP object injection | 2016-09-14T15:00+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000156 | ADOdb vulnerable to cross-site scripting | 2016-09-06T13:45+09:00 | 2017-11-27T16:43+09:00 |
| jvndb-2016-004496 | Information Disclosure Vulnerability in Hitachi Automation Director and JP1/Automatic Operation | 2016-09-02T16:09+09:00 | 2016-09-30T09:47+09:00 |
| jvndb-2016-000154 | Multiple AKABEi SOFT2 LTD. games vulnerable to OS command injection | 2016-08-31T15:33+09:00 | 2016-09-05T17:56+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-00521 | Online Ordering System user_contact.php文件SQL注入漏洞 | 2025-12-10 | 2026-01-06 |
| cnvd-2026-00520 | Online Ordering System /admin文件SQL注入漏洞 | 2025-12-10 | 2026-01-06 |
| cnvd-2026-00519 | Employee Profile Management System代码问题漏洞 | 2025-12-10 | 2026-01-06 |
| cnvd-2026-00518 | Employee Profile Management System /view_personnel.php文件跨站脚本漏洞 | 2025-12-10 | 2026-01-06 |
| cnvd-2026-00517 | Employee Profile Management System /view_personnel.php文件SQL注入漏洞 | 2025-12-10 | 2026-01-06 |
| cnvd-2026-00516 | Employee Profile Management System print_personnel_report.php文件SQL注入漏洞 | 2025-12-10 | 2026-01-06 |
| cnvd-2026-00515 | Currency Exchange System /edittrns.php文件SQL注入漏洞 | 2025-12-10 | 2026-01-06 |
| cnvd-2026-00447 | Huawei HarmonyOS多线程竞争条件漏洞 | 2025-12-10 | 2026-01-05 |
| cnvd-2026-00137 | Huawei HarmonyOS/EMUI权限控制漏洞(CNVD-2026-0013753) | 2025-12-10 | 2026-01-05 |
| cnvd-2026-00136 | Huawei HarmonyOS/EMUI权限控制漏洞(CNVD-2026-0013655) | 2025-12-10 | 2026-01-05 |
| cnvd-2025-31471 | Google Android竞争条件漏洞 | 2025-12-10 | 2025-12-29 |
| cnvd-2025-31470 | Google Android不安全默认设置漏洞 | 2025-12-10 | 2025-12-29 |
| cnvd-2025-31469 | Google Android前置条件检查失败漏洞 | 2025-12-10 | 2025-12-29 |
| cnvd-2025-31468 | Google Android不安全默认值漏洞 | 2025-12-10 | 2025-12-29 |
| cnvd-2025-31467 | Google Android逻辑错误漏洞(CNVD-2025-3146717) | 2025-12-10 | 2025-12-29 |
| cnvd-2025-31466 | Google Android逻辑错误漏洞(CNVD-2025-3146618) | 2025-12-10 | 2025-12-29 |
| cnvd-2025-31465 | Google Android缺少权限检查漏洞 | 2025-12-10 | 2025-12-29 |
| cnvd-2025-31464 | Google Android权限混淆漏洞 | 2025-12-10 | 2025-12-29 |
| cnvd-2025-31463 | Google Android逻辑错误漏洞 | 2025-12-10 | 2025-12-29 |
| cnvd-2025-31462 | Google Android权限绕过漏洞 | 2025-12-10 | 2025-12-29 |
| cnvd-2025-31461 | Google Android输入验证不当漏洞 | 2025-12-10 | 2025-12-29 |
| cnvd-2025-31156 | Currency Exchange System /editotheraccount.php文件SQL注入漏洞 | 2025-12-10 | 2025-12-22 |
| cnvd-2025-31155 | Currency Exchange System /edit.php文件SQL注入漏洞 | 2025-12-10 | 2025-12-22 |
| cnvd-2025-31136 | Huawei HarmonyOS拒绝服务漏洞(CNVD-2025-3113638) | 2025-12-10 | 2025-12-23 |
| cnvd-2025-31135 | Huawei HarmonyOS安全检查不当漏洞 | 2025-12-10 | 2025-12-23 |
| cnvd-2025-31134 | Huawei HarmonyOS拒绝服务漏洞(CNVD-2025-3113443) | 2025-12-10 | 2025-12-23 |
| cnvd-2025-31133 | Huawei HarmonyOS拒绝服务漏洞 | 2025-12-10 | 2025-12-23 |
| cnvd-2025-31132 | Huawei HarmonyOS竞争条件漏洞 | 2025-12-10 | 2025-12-23 |
| cnvd-2025-30978 | Advantech WISE-DeviceOn Server硬编码加密密钥漏洞 | 2025-12-10 | 2025-12-17 |
| cnvd-2025-30977 | Advantech WISE-DeviceOn Server跨站脚本漏洞(CNVD-2025-3097798) | 2025-12-10 | 2025-12-17 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-16417 | Уязвимость функции sub_403198() сценария /cgi-bin/wireless.cgi микропрограммного обеспече… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16416 | Уязвимость функции sub_4016F0 микропрограммного обеспечения маршрутизаторов Wavlink NU516… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16415 | Уязвимость маршрутизатора App Router программной платформы создания веб-приложений Next.j… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16414 | Уязвимость программной платформы создания веб-приложений Next.js, связанная с недостаткам… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16413 | Уязвимость функции sub_401778 микропрограммного обеспечения маршрутизаторов Wavlink NU516… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16412 | Уязвимость компонента DeleteMac Page функции sub_402D1C микропрограммного обеспечения мар… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16411 | Уязвимость компонента Delete_Mac_list Page функции sub_4030C0 микропрограммного обеспечен… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16410 | Уязвимость функции sub_401B30 микропрограммного обеспечения маршрутизаторов Wavlink NU516… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16409 | Уязвимость функции __pnet_find_base_ndev() ядра операционной системы Linux, позволяющая н… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16408 | Уязвимость функции PERF_IDX2OFF() ядра операционной системы Linux, позволяющая нарушителю… | 26.12.2025 | 13.01.2026 |
| bdu:2025-16407 | Уязвимость компонента nbd ядра операционной системы Linux, позволяющая нарушителю вызвать… | 26.12.2025 | 13.01.2026 |
| bdu:2025-16406 | Уязвимость функции bpf_sock_addr() ядра операционной системы Linux, позволяющая нарушител… | 26.12.2025 | 13.01.2026 |
| bdu:2025-16405 | Уязвимость компонента tcp_metrics ядра операционной системы Linux, позволяющая нарушителю… | 26.12.2025 | 27.01.2026 |
| bdu:2025-16404 | Уязвимость функции dst_dev_rcu() ядра операционной системы Linux, позволяющая нарушителю … | 26.12.2025 | 26.12.2025 |
| bdu:2025-16403 | Уязвимость компонента n_gsm ядра операционной системы Linux, позволяющая нарушителю вызва… | 26.12.2025 | 13.01.2026 |
| bdu:2025-16402 | Уязвимость функции pps_register_cdev() ядра операционной системы Linux, позволяющая наруш… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16401 | Уязвимость системы для управления идентификацией пользователей и групп OpenText Directory… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16400 | Уязвимость компонента llama_index класса для чтения данных JSON по токенам JSONReader, по… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16399 | Уязвимость адаптера Express библиотеки маршрутизации React Router react-фреймворка Remix,… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16398 | Уязвимость платформы на базе искуственного интеллекта LibreChat, связанная с недостатками… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16397 | Уязвимость компонента ubusd встраиваемой операционной системы OpenWrt, позволяющая наруши… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16396 | Уязвимость платформы на базе искуственного интеллекта LibreChat, связанная с неконтролиру… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16395 | Уязвимость функции hfsplus_uni2asc() ядра операционной системы Linux, позволяющая нарушит… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16394 | Уязвимость функции mnt_ns_from_dentry() компонента fanotify ядра операционной системы Lin… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16393 | Уязвимость функции run_unpack() ядра операционной системы Linux, позволяющая нарушителю в… | 26.12.2025 | 13.01.2026 |
| bdu:2025-16392 | Уязвимость функции ProcessWhereClause сервера PolicyServer средства шифрования данных Tre… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16391 | Уязвимость функции GetGroupFilteredUsers сервера PolicyServer средства шифрования данных … | 26.12.2025 | 26.12.2025 |
| bdu:2025-16390 | Уязвимость средства хранения паролей Trend Micro Password Manager, связанная с некорректн… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16389 | Уязвимость программного обеспечения для очистки и оптимизации системы Trend Micro Cleaner… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16388 | Уязвимость системы обнаружения и предотвращения вторжений Wazuh, связанная с ошибками син… | 26.12.2025 | 26.12.2025 |
| ID | Description | Updated |
|---|---|---|
| var-202302-1569 | TOTOLINK A720R V4.1.5cu.532_ B20210610 is vulnerable to Incorrect Access Control. TOTOLIN… | 2025-12-19T22:56:09.143000Z |
| var-202404-2868 | TOTOLINK X2000R before V1.0.0-B20231213.1013 contains a Stored Cross-site scripting (XSS)… | 2025-12-19T22:56:03.346000Z |
| var-202405-1031 | An attacker who successfully exploited these vulnerabilities could cause the robot to sto… | 2025-12-19T22:56:03.262000Z |
| var-202403-1307 | Tenda FH1202 v1.2.0.14(408) firmware has a stack overflow vulnerability in the entrys par… | 2025-12-19T22:54:57.204000Z |
| var-202510-4381 | The NPort 5210 is an industrial-grade serial communication server integrating a 16-bit pr… | 2025-12-19T22:54:53.596000Z |
| var-202511-0549 | A command injection vulnerability exists in the ToToLink A720R Router firmware V4.1.5cu.6… | 2025-12-19T22:54:53.529000Z |
| var-202511-1198 | A buffer overflow vulnerability exists in the TOTOLINK A950RG Router firmware V5.9c.4592_… | 2025-12-19T22:54:53.409000Z |
| var-202511-1954 | TOTOLink A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow in the … | 2025-12-19T22:54:53.369000Z |
| var-202512-0230 | A denial of service vulnerability exists in the Modbus RTU over TCP functionality of Soco… | 2025-12-19T22:54:52.945000Z |
| var-202310-1252 | TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow v… | 2025-12-19T22:51:48.011000Z |
| var-202401-0733 | A vulnerability classified as critical has been found in Totolink LR1200GB 9.1.0u.6619_B2… | 2025-12-19T22:51:47.675000Z |
| var-202208-1982 | TOTOLink A720R V4.1.5cu.532_B20210610 was discovered to contain a command injection vulne… | 2025-12-19T22:50:39.054000Z |
| var-202405-1487 | An attacker who successfully exploited these vulnerabilities could cause the robot to st… | 2025-12-19T22:50:36.166000Z |
| var-202511-0869 | A command injection vulnerability exists in the TOTOLINK A950RG Router firmware V5.9c.459… | 2025-12-19T22:50:29.393000Z |
| var-202511-2063 | A command injection vulnerability exists in the ToToLink A720R Router firmware V4.1.5cu.6… | 2025-12-19T22:50:29.257000Z |
| var-202511-2271 | A vulnerability was detected in Tenda CH22 1.0.0.1. Affected is the function formWrlExtra… | 2025-12-19T22:50:29.202000Z |
| var-202511-2375 | Improper handling of insufficient entropy in the AMD CPUs could allow a local attacker to… | 2025-12-19T22:50:29.181000Z |
| var-202512-1246 | In Modem, there is a possible system crash due to a logic error. This could lead to remot… | 2025-12-19T22:50:28.336000Z |
| var-202512-1580 | Stack-based buffer overflow vulnerability in CircutorSGE-PLC1000/SGE-PLC50 v9.0.2. The 'S… | 2025-12-19T22:50:27.787000Z |
| var-202212-1812 | Fuji Electric Tellus Lite V-Simulator versions 4.0.12.0 and prior are vulnerable to a st… | 2025-12-19T22:49:46.010000Z |
| var-202401-0163 | A vulnerability classified as critical has been found in Totolink LR1200GB 9.1.0u.6619_B2… | 2025-12-19T22:49:44.362000Z |
| var-202510-4378 | The ioLogik E1200 series is an industrial Ethernet remote I/O device designed for flexibl… | 2025-12-19T22:49:40.692000Z |
| var-202512-0267 | A security flaw has been discovered in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and… | 2025-12-19T22:49:40.078000Z |
| var-202009-0219 | SQL injection vulnerability exists in the CHaD.asmx web service functionality of eDNA Ent… | 2025-12-19T22:48:37.875000Z |
| var-202401-0276 | A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130 and classified as cr… | 2025-12-19T22:48:33.428000Z |
| var-202403-3181 | Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the schedEndTime paramet… | 2025-12-19T22:48:32.999000Z |
| var-202511-2428 | An authentication-bypass vulnerability exists in AiCloud. This vulnerability can be trigg… | 2025-12-19T22:48:29.164000Z |
| var-202512-0198 | A vulnerability was determined in Tenda AC9 15.03.05.14_multi. Affected by this vulnerabi… | 2025-12-19T22:48:28.850000Z |
| var-202510-4379 | The Pantum CM1100DN Series is a color laser multifunction printer. The Pantum CM1100DN S… | 2025-12-19T22:47:30.157000Z |
| var-202511-2372 | An integer underflow vulnerability has been identified in Aicloud. An authenticated attac… | 2025-12-19T22:47:29.857000Z |