Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40476 |
6.9 (4.0)
|
graphql-php: Denial of Service via quadratic complexit… |
webonyx |
graphql-php |
2026-04-17T21:42:59.511Z | 2026-04-20T14:56:57.812Z |
| CVE-2026-5720 |
7.1 (4.0)
|
miniupnpd Integer Underflow SOAPAction Header Parsing |
miniupnp project |
miniupnpd |
2026-04-17T21:39:54.818Z | 2026-04-20T16:59:21.060Z |
| CVE-2026-40474 |
7.6 (3.1)
|
wger has Broken Access Control in the Global Gym Confi… |
wger-project |
wger |
2026-04-17T21:39:03.677Z | 2026-04-20T16:08:12.427Z |
| CVE-2026-40353 |
5.1 (4.0)
|
wger: Stored XSS via Unescaped License Attribution Fields |
wger-project |
wger |
2026-04-17T21:16:12.401Z | 2026-04-20T16:17:52.305Z |
| CVE-2026-40258 |
9.1 (3.1)
|
Gramps Web API has Zip Slip Path Traversal in Media Ar… |
gramps-project |
gramps-web-api |
2026-04-17T21:12:54.226Z | 2026-04-20T15:48:41.690Z |
| CVE-2026-29013 |
8.8 (4.0)
|
libcoap Out-of-Bounds Read in OSCORE CBOR Unwrap Handling |
libcoap |
libcoap |
2026-04-17T21:11:38.137Z | 2026-04-20T16:46:56.223Z |
| CVE-2026-40321 |
8.1 (3.1)
|
DotNetNuke.Core has stored cross-site-scripting (XSS) … |
dnnsoftware |
Dnn.Platform |
2026-04-17T21:10:33.192Z | 2026-04-22T03:55:44.141Z |
| CVE-2026-40352 |
8.8 (3.1)
|
FastGPT: NoSQL Injection in updatePasswordByOld Leads … |
labring |
FastGPT |
2026-04-17T21:09:32.913Z | 2026-04-20T13:36:06.464Z |
| CVE-2026-40306 |
6.9 (4.0)
|
DNN has same HostGUID for all new installs |
dnnsoftware |
Dnn.Platform |
2026-04-17T21:09:30.317Z | 2026-04-20T16:18:27.508Z |
| CVE-2026-40305 |
4.3 (3.1)
|
DNN has Force Friend Request Acceptance |
dnnsoftware |
Dnn.Platform |
2026-04-17T21:06:09.237Z | 2026-04-20T13:36:06.644Z |
| CVE-2026-40351 |
9.8 (3.1)
|
FastGPT: NoSQL Injection in loginByPassword leads to A… |
labring |
FastGPT |
2026-04-17T21:05:05.911Z | 2026-04-20T14:57:15.664Z |
| CVE-2026-40304 |
5.3 (3.1)
|
zrok's broken ownership check in DELETE /api/v2/unacce… |
openziti |
zrok |
2026-04-17T21:04:23.648Z | 2026-04-20T14:57:24.486Z |
| CVE-2026-40303 |
7.5 (3.1)
|
zrok allows unauthenticated DoS via unbounded memory a… |
openziti |
zrok |
2026-04-17T21:01:51.899Z | 2026-04-20T16:19:07.291Z |
| CVE-2026-40196 |
8.1 (3.1)
|
HomeBox has Unauthorized API Access via Retained defau… |
sysadminsmedia |
homebox |
2026-04-17T21:01:18.530Z | 2026-04-20T13:36:06.776Z |
| CVE-2026-40302 |
6.1 (3.1)
|
zrok has reflected XSS in GitHub OAuth callback via un… |
openziti |
zrok |
2026-04-17T20:56:08.368Z | 2026-04-18T03:07:10.092Z |
| CVE-2026-40155 |
5.4 (3.1)
|
Auth0 Next.js SDK has Improper Proxy Cache Lookup |
auth0 |
nextjs-auth0 |
2026-04-17T20:54:38.958Z | 2026-04-20T14:57:32.023Z |
| CVE-2026-40301 |
4.7 (3.1)
|
rhukster/dom-sanitizer: SVG <style> tag allows CSS inj… |
rhukster |
dom-sanitizer |
2026-04-17T20:51:37.226Z | 2026-04-20T14:57:39.192Z |
| CVE-2026-40299 |
6.9 (4.0)
|
next-intl has an open redirect vulnerability |
amannn |
next-intl |
2026-04-17T20:49:05.642Z | 2026-04-20T15:58:51.149Z |
| CVE-2026-40293 |
6.5 (3.1)
|
OpenFGA Playground Preshared Key Exposure |
openfga |
openfga |
2026-04-17T20:47:06.804Z | 2026-04-20T16:19:40.914Z |
| CVE-2026-35603 |
5.4 (4.0)
|
Claude Code: Insecure System-Wide Configuration Loadin… |
anthropics |
claude-code |
2026-04-17T20:38:49.901Z | 2026-04-20T14:57:47.669Z |
| CVE-2026-35402 |
2.3 (4.0)
|
mcp-neo4j-cypher: SSRF and Data Modification via read_… |
neo4j-contrib |
mcp-neo4j |
2026-04-17T20:34:06.510Z | 2026-04-20T15:51:06.164Z |
| CVE-2026-33436 |
3.1 (3.1)
|
Stirling-PDF: Reflected XSS through crafted filename i… |
Stirling-Tools |
Stirling-PDF |
2026-04-17T20:29:43.262Z | 2026-04-20T16:20:16.137Z |
| CVE-2026-40286 |
7.5 (3.1)
|
WeGIA has Cross-Site Scripting in Controle de Contribuição |
LabRedesCefetRJ |
WeGIA |
2026-04-17T20:27:59.131Z | 2026-04-20T15:49:44.569Z |
| CVE-2026-23500 |
9.4 (4.0)
|
Dolibarr: OS Command Injection (RCE) via MAIN_ODT_AS_P… |
Dolibarr |
dolibarr |
2026-04-17T20:25:49.843Z | 2026-04-18T03:06:20.406Z |
| CVE-2026-40285 |
8.8 (3.1)
|
WeGIA has SQL Injection via Session Variable Override … |
LabRedesCefetRJ |
WeGIA |
2026-04-17T20:25:33.185Z | 2026-04-20T16:21:07.084Z |
| CVE-2026-40527 |
8.5 (4.0)
7.8 (3.1)
|
radare2 Command Injection via DWARF Parameter Names |
radareorg |
radare2 |
2026-04-17T20:25:20.143Z | 2026-04-20T14:20:04.639Z |
| CVE-2026-40284 |
6.8 (3.1)
|
WeGIA has stored XSS in listar_despachos.php |
LabRedesCefetRJ |
WeGIA |
2026-04-17T20:24:10.282Z | 2026-04-20T16:26:32.113Z |
| CVE-2026-35512 |
8.7 (4.0)
|
xrdp: Heap buffer overflow in EGFX channel |
neutrinolabs |
xrdp |
2026-04-17T20:21:59.868Z | 2026-04-22T03:55:37.686Z |
| CVE-2026-40282 |
6.4 (4.0)
|
WeGIA has stored XSS in intercorrencia_visualizar.php |
LabRedesCefetRJ |
WeGIA |
2026-04-17T20:16:46.878Z | 2026-04-20T14:57:55.798Z |
| CVE-2026-33689 |
8.7 (4.0)
|
xrdp: Pre-authentication out-of-bounds reads in channe… |
neutrinolabs |
xrdp |
2026-04-17T20:16:31.248Z | 2026-04-20T16:21:39.933Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40480 |
7.1 (4.0)
|
ChurchCRM has Missing Object-Level Authorization / IDO… |
ChurchCRM |
CRM |
2026-04-17T23:07:30.126Z | 2026-04-20T16:16:00.433Z |
| CVE-2026-40349 |
8.8 (3.1)
|
Authenticated Movary User Can Self-Escalate to Adminis… |
leepeuker |
movary |
2026-04-18T00:05:46.360Z | 2026-04-20T16:15:49.844Z |
| CVE-2026-40348 |
7.7 (3.1)
|
Movary has Authenticated SSRF via Jellyfin Server URL … |
leepeuker |
movary |
2026-04-18T00:01:09.725Z | 2026-04-20T16:11:32.779Z |
| CVE-2026-40347 |
5.3 (3.1)
|
Python-Multipart affected by Denial of Service via lar… |
Kludex |
python-multipart |
2026-04-17T23:56:50.777Z | 2026-04-20T15:46:40.011Z |
| CVE-2026-40346 |
6.4 (4.0)
|
NocoBase has SSRF in Workflow HTTP Request and Custom … |
nocobase |
@nocobase/plugin-workflow-request |
2026-04-17T23:54:34.829Z | 2026-04-20T14:56:12.829Z |
| CVE-2026-40341 |
3.5 (3.1)
|
libgphoto2 has an OOB Read in ptp_unpack_EOS_FocusInfoEx |
gphoto |
libgphoto2 |
2026-04-17T23:48:36.644Z | 2026-04-20T16:14:19.107Z |
| CVE-2026-40340 |
6.1 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_OI() in ptp-pack… |
gphoto |
libgphoto2 |
2026-04-17T23:45:17.467Z | 2026-04-20T13:36:05.149Z |
| CVE-2026-40339 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_Sony_DPD() FormF… |
gphoto |
libgphoto2 |
2026-04-17T23:42:32.586Z | 2026-04-20T14:56:21.979Z |
| CVE-2026-40338 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_Sony_DPD() enume… |
gphoto |
libgphoto2 |
2026-04-17T23:40:10.097Z | 2026-04-20T16:16:08.585Z |
| CVE-2026-40337 |
5.1 (3.1)
|
Sentry kernel has incomplete ownership check for IRQ l… |
camelot-os |
sentry-kernel |
2026-04-17T23:51:09.866Z | 2026-04-20T16:13:48.908Z |
| CVE-2026-40336 |
2.4 (3.1)
|
libgphoto2 has memory leak in ptp_unpack_Sony_DPD() se… |
gphoto |
libgphoto2 |
2026-04-17T23:27:42.868Z | 2026-04-20T16:14:53.071Z |
| CVE-2026-40335 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_DPV() UINT128/IN… |
gphoto |
libgphoto2 |
2026-04-17T23:19:16.935Z | 2026-04-20T13:36:05.542Z |
| CVE-2026-40334 |
3.5 (3.1)
|
libgphoto2 missing null termination in ptp_unpack_Cano… |
gphoto |
libgphoto2 |
2026-04-17T23:16:38.751Z | 2026-04-20T13:36:05.703Z |
| CVE-2026-40333 |
6.1 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_EOS_ImageFormat(… |
gphoto |
libgphoto2 |
2026-04-17T23:11:11.073Z | 2026-04-20T14:56:44.091Z |
| CVE-2026-40324 |
9.1 (3.1)
|
Hot Chocolate's Utf8GraphQLParser has Stack Overflow v… |
ChilliCream |
graphql-platform |
2026-04-17T23:05:26.217Z | 2026-04-20T16:16:25.151Z |
| CVE-2026-40323 |
8.9 (4.0)
|
SP1 V6 Recursion Circuit Row-Count Binding Gap |
succinctlabs |
sp1 |
2026-04-17T22:58:42.580Z | 2026-04-20T16:16:41.143Z |
| CVE-2026-2262 |
7.5 (3.1)
|
Easy Appointments <= 3.12.21 - Unauthenticated Sensiti… |
easyappointments |
Easy Appointments |
2026-04-17T23:26:48.863Z | 2026-04-20T13:51:28.513Z |
| CVE-2026-5250 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-04-17T22:21:51.917Z | |
| CVE-2026-40486 |
4.3 (3.1)
|
Kimai's User Preferences API allows standard users to … |
kimai |
kimai |
2026-04-17T22:35:53.543Z | 2026-04-20T14:56:51.165Z |
| CVE-2026-40481 |
8.2 (4.0)
|
monetr: Unauthenticated Stripe webhook reads attacker-… |
monetr |
monetr |
2026-04-17T22:54:57.545Z | 2026-04-20T13:36:05.862Z |
| CVE-2026-40479 |
5.4 (3.1)
|
Kimai: Stored XSS via Incomplete HTML Attribute Escapi… |
kimai |
kimai |
2026-04-17T22:31:29.930Z | 2026-04-20T16:16:41.880Z |
| CVE-2026-2434 |
6.4 (3.1)
|
Pz-LinkCard <= 2.5.8.1 - Authenticated (Contributor+) … |
poporon |
Pz-LinkCard |
2026-04-17T22:27:13.525Z | 2026-04-20T13:36:06.124Z |
| CVE-2026-5720 |
7.1 (4.0)
|
miniupnpd Integer Underflow SOAPAction Header Parsing |
miniupnp project |
miniupnpd |
2026-04-17T21:39:54.818Z | 2026-04-20T16:59:21.060Z |
| CVE-2026-40478 |
9.1 (3.1)
|
Improper neutralization of specific syntax patterns fo… |
thymeleaf |
thymeleaf |
2026-04-17T21:57:01.560Z | 2026-04-22T03:55:42.682Z |
| CVE-2026-40477 |
9.1 (3.1)
|
Improper restriction of the scope of accessible object… |
thymeleaf |
thymeleaf |
2026-04-17T21:53:47.271Z | 2026-04-22T03:55:41.093Z |
| CVE-2026-40476 |
6.9 (4.0)
|
graphql-php: Denial of Service via quadratic complexit… |
webonyx |
graphql-php |
2026-04-17T21:42:59.511Z | 2026-04-20T14:56:57.812Z |
| CVE-2026-40474 |
7.6 (3.1)
|
wger has Broken Access Control in the Global Gym Confi… |
wger-project |
wger |
2026-04-17T21:39:03.677Z | 2026-04-20T16:08:12.427Z |
| CVE-2026-40353 |
5.1 (4.0)
|
wger: Stored XSS via Unescaped License Attribution Fields |
wger-project |
wger |
2026-04-17T21:16:12.401Z | 2026-04-20T16:17:52.305Z |
| CVE-2026-40352 |
8.8 (3.1)
|
FastGPT: NoSQL Injection in updatePasswordByOld Leads … |
labring |
FastGPT |
2026-04-17T21:09:32.913Z | 2026-04-20T13:36:06.464Z |
| CVE-2026-40351 |
9.8 (3.1)
|
FastGPT: NoSQL Injection in loginByPassword leads to A… |
labring |
FastGPT |
2026-04-17T21:05:05.911Z | 2026-04-20T14:57:15.664Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-j2hh-7j22-p596 |
7.8 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by a Heap-based Buffer Overflow vulnerabi… | 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-h6wr-vq3g-hh7j |
7.8 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by an Access of Resource Using Incompatib… | 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-9qfg-pjw2-8grg |
8.6 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by an Untrusted Search Path vulnerability… | 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-8v2w-q3wx-m958 |
5.5 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by an Access of Uninitialized Pointer vul… | 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-8jpv-7gww-9r9j |
7.0 (4.0)
|
Unisys WebPerfect Image Suite versions 3.0.3960.22810 and 3.0.3960.22604 expose an unauthenticated … | 2026-04-15T00:31:35Z | 2026-04-23T18:32:55Z |
| ghsa-6hg8-2cxf-7p6v |
7.8 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by an Integer Underflow (Wrap or Wraparou… | 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-573h-4gmm-4r9w |
7.8 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by an out-of-bounds write vulnerability t… | 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-39g8-p82f-45mx |
5.5 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by a Heap-based Buffer Overflow vulnerabi… | 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-34mc-mx9w-h5cv |
7.8 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by a Use After Free vulnerability that co… | 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-x69p-j55w-wfwc |
7.7 (3.1)
|
ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Limitation of a Pathnam… | 2026-04-15T00:31:34Z | 2026-04-15T00:31:34Z |
| ghsa-rrr4-c4r3-6q77 |
2.4 (3.1)
|
ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Uncontrolled Resource Consumptio… | 2026-04-15T00:31:34Z | 2026-04-15T00:31:34Z |
| ghsa-p34m-2cjp-296f |
2.4 (3.1)
|
ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Uncontrolled Resource Consumptio… | 2026-04-15T00:31:34Z | 2026-04-15T00:31:34Z |
| ghsa-jx8w-6mv7-8qj4 |
7.8 (3.1)
|
InCopy versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds write vulnerability that … | 2026-04-15T00:31:34Z | 2026-04-15T00:31:34Z |
| ghsa-75q9-6h6m-fmrg |
8.4 (3.1)
|
ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Input Validation vulner… | 2026-04-15T00:31:34Z | 2026-04-15T00:31:34Z |
| ghsa-rfcg-4cq5-pfmm |
7.5 (3.1)
|
ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Input Validation vulner… | 2026-04-15T00:31:33Z | 2026-04-15T00:31:33Z |
| ghsa-ppfw-rp5w-2c9c |
8.6 (3.1)
|
ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Limitation of a Pathnam… | 2026-04-15T00:31:33Z | 2026-04-15T00:31:34Z |
| ghsa-gw2m-9w3j-j7m2 |
5.3 (3.1)
|
The Nexi XPay plugin for WordPress is vulnerable to unauthorized modification of data due to missin… | 2026-04-15T00:31:33Z | 2026-04-15T00:31:33Z |
| ghsa-9mp8-pgq2-4399 |
9.3 (3.1)
|
ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Input Validation vulner… | 2026-04-15T00:31:33Z | 2026-04-15T00:31:33Z |
| ghsa-g4vj-cjjj-v7hg |
|
Defense in Depth update for NuGet Client | 2026-04-14T23:42:30Z | 2026-04-14T23:42:30Z |
| ghsa-2x79-gwq3-vxxm |
8.7 (4.0)
|
Uncontrolled resource consumption and loop with unreachable exit condition in facil.io and downstre… | 2026-04-14T23:41:06Z | 2026-04-14T23:41:06Z |
| ghsa-355h-qmc2-wpwf |
7.4 (3.1)
|
Jetty has HTTP Request Smuggling via Chunked Extension Quoted-String Parsing | 2026-04-14T23:40:31Z | 2026-04-14T23:40:31Z |
| ghsa-hv4r-mvr4-25vw |
8.8 (4.0)
|
MinIO has an Unauthenticated Object Write via Query-String Credential Signature Bypass in Unsigned-… | 2026-04-14T23:40:05Z | 2026-04-14T23:40:05Z |
| ghsa-2hx3-vp6r-mg3f |
7.3 (4.0)
|
Kiota: Code Generation Literal Injection | 2026-04-14T23:39:41Z | 2026-04-14T23:39:41Z |
| ghsa-fj52-5g4h-gmq8 |
2.9 (4.0)
|
pyLoad's Session Not Invalidated After Permission Changes | 2026-04-14T23:39:25Z | 2026-04-14T23:39:25Z |
| ghsa-66hx-chf7-3332 |
8.8 (3.1)
|
pyLoad has Stale Session Privilege After Role/Permission Change (Privilege Revocation Bypass) | 2026-04-14T23:38:35Z | 2026-04-14T23:38:35Z |
| ghsa-95wr-3f2v-v2wh |
5.5 (4.0)
|
Craft CMS has a host header injection leading to SSRF via resource-js endpoint | 2026-04-14T23:36:09Z | 2026-04-14T23:36:10Z |
| ghsa-3m9m-24vh-39wx |
5.5 (4.0)
|
Server-Side Request Forgery (SSRF) in Craft CMS with Asset Uploads Mutations | 2026-04-14T23:35:16Z | 2026-04-14T23:35:16Z |
| ghsa-jq2f-59pj-p3m3 |
5.3 (4.0)
|
Craft CMS has a Missing Authorization Check on User Group Removal via save-permissions Action | 2026-04-14T23:34:52Z | 2026-04-14T23:34:52Z |
| ghsa-hw5x-4r37-72w7 |
3.1 (3.1)
|
OpenTofu has unbounded memory usage, high CPU usage, or deadlock in "tofu init" with maliciously-cr… | 2026-04-14T23:34:08Z | 2026-04-14T23:34:09Z |
| ghsa-fcpv-w245-r2q7 |
|
DotNetNuke.Core security code analysis rules triggered | 2026-04-14T23:33:30Z | 2026-04-14T23:33:30Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-533 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite code fo… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:59.713113Z |
| pysec-2021-532 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite impleme… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:59.535781Z |
| pysec-2021-531 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:59.386976Z |
| pysec-2021-530 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:59.232371Z |
| pysec-2021-529 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite impleme… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:59.076380Z |
| pysec-2021-528 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:58.930299Z |
| pysec-2021-527 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:58.781489Z |
| pysec-2021-526 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:58.584252Z |
| pysec-2021-525 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:58.435866Z |
| pysec-2021-524 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:58.287349Z |
| pysec-2021-523 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:58.107477Z |
| pysec-2021-522 |
|
TensorFlow is an end-to-end open source platform for machine learning. TFLite's convoluti… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.958093Z |
| pysec-2021-521 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.775345Z |
| pysec-2021-520 |
|
TensorFlow is an end-to-end open source platform for machine learning. The fix for CVE-20… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.625576Z |
| pysec-2021-519 |
|
TensorFlow is an end-to-end open source platform for machine learning. TFlite graphs must… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.477070Z |
| pysec-2021-518 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.326959Z |
| pysec-2021-517 |
|
TensorFlow is an end-to-end open source platform for machine learning. The reference impl… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.180094Z |
| pysec-2021-516 |
|
TensorFlow is an end-to-end open source platform for machine learning. The optimized impl… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.029977Z |
| pysec-2021-515 |
|
TensorFlow is an end-to-end open source platform for machine learning. The `Prepare` step… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:56.873016Z |
| pysec-2021-514 |
|
TensorFlow is an end-to-end open source platform for machine learning. Optimized pooling … | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:56.717383Z |
| pysec-2021-513 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite computa… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:56.553875Z |
| pysec-2021-512 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:56.381620Z |
| pysec-2021-511 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:56.228145Z |
| pysec-2021-510 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:56.077512Z |
| pysec-2021-509 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:55.926686Z |
| pysec-2021-508 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:55.778346Z |
| pysec-2021-507 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:55.622531Z |
| pysec-2021-506 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:55.459344Z |
| pysec-2021-505 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:55.310052Z |
| pysec-2021-504 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:55.161027Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1384 | Malicious code in @lux2/ssr-catalogue-sfcc (npm) | 2026-03-13T05:37:08Z | 2026-03-23T05:16:24Z |
| mal-2026-1381 | Malicious code in @immuta/feature-flags-core (npm) | 2026-03-13T05:34:26Z | 2026-03-23T05:16:24Z |
| mal-2026-1383 | Malicious code in @immuta/pxl-components (npm) | 2026-03-13T05:32:55Z | 2026-03-23T05:16:24Z |
| mal-2026-1379 | Malicious code in 8x8-developer-docs (npm) | 2026-03-13T02:21:45Z | 2026-04-16T15:42:07Z |
| mal-2026-1378 | Malicious code in f0-service-address-doctor (npm) | 2026-03-13T00:40:57Z | 2026-04-16T15:42:08Z |
| mal-2026-1377 | Malicious code in adroit-websdk-server (npm) | 2026-03-13T00:40:56Z | 2026-03-23T05:16:25Z |
| mal-2026-1380 | Malicious code in cline (npm) | 2026-03-12T22:33:41Z | 2026-03-23T05:16:26Z |
| mal-2026-1374 | Malicious code in spectral-corsair-my-backdoor (npm) | 2026-03-12T18:09:11Z | 2026-04-16T15:42:10Z |
| mal-2026-1373 | Malicious code in @sky-it-livedata-libraries/livedata-commons-client (npm) | 2026-03-12T15:46:36Z | 2026-03-23T05:16:25Z |
| mal-2026-1372 | Malicious code in @sky-it-livedata-libraries/livedata-commons (npm) | 2026-03-12T15:46:35Z | 2026-03-23T05:16:25Z |
| mal-2026-1371 | Malicious code in collecters (PyPI) | 2026-03-12T15:25:30Z | 2026-03-12T15:25:30Z |
| mal-2026-1375 | Malicious code in @adamallana0909/apple-research-test (npm) | 2026-03-12T14:05:43Z | 2026-03-23T05:16:24Z |
| mal-2026-1376 | Malicious code in @appleseed-apple/ac-sasskit (npm) | 2026-03-12T11:35:51Z | 2026-03-23T05:16:24Z |
| mal-2026-1368 | Malicious code in json-specparse (npm) | 2026-03-12T05:15:33Z | 2026-04-01T12:28:02Z |
| mal-2026-1370 | Malicious code in mezukabil (npm) | 2026-03-12T05:14:53Z | 2026-03-23T05:16:29Z |
| mal-2026-1369 | Malicious code in kinggupong (npm) | 2026-03-12T05:13:07Z | 2026-03-23T05:16:28Z |
| mal-2026-1367 | Malicious code in @kinggupong/libsignal-node (npm) | 2026-03-12T05:13:07Z | 2026-03-23T05:16:24Z |
| mal-2026-1366 | Malicious code in @kinggupong/baileys (npm) | 2026-03-12T05:13:07Z | 2026-03-23T05:16:24Z |
| mal-2026-1365 | Malicious code in unibody (npm) | 2026-03-12T02:18:38Z | 2026-04-01T12:28:04Z |
| mal-2026-1362 | Malicious code in praxis-scripts (npm) | 2026-03-12T02:18:38Z | 2026-04-01T12:28:03Z |
| mal-2026-1361 | Malicious code in pcl-build-docroot (npm) | 2026-03-12T02:18:38Z | 2026-04-01T12:28:03Z |
| mal-2026-1359 | Malicious code in libsignal-mod (npm) | 2026-03-12T02:18:02Z | 2026-03-23T05:16:28Z |
| mal-2026-1358 | Malicious code in dappa-libsignal (npm) | 2026-03-12T02:18:02Z | 2026-03-23T05:16:26Z |
| mal-2026-1355 | Malicious code in @dappaoffc/baileys-mod (npm) | 2026-03-12T02:18:01Z | 2026-03-23T05:16:24Z |
| mal-2026-1354 | Malicious code in @dappaoffc/baileys (npm) | 2026-03-12T02:18:01Z | 2026-03-23T05:16:24Z |
| mal-2026-1363 | Malicious code in react-svg-anchor (npm) | 2026-03-12T02:12:32Z | 2026-03-23T05:16:30Z |
| mal-2026-1360 | Malicious code in npm-doc-build (npm) | 2026-03-12T02:07:51Z | 2026-04-01T12:28:03Z |
| mal-2026-1357 | Malicious code in bign.ts (npm) | 2026-03-12T02:07:51Z | 2026-03-23T05:16:25Z |
| mal-2026-1356 | Malicious code in b2b-common-cb-lib (npm) | 2026-03-12T01:56:30Z | 2026-04-01T12:28:01Z |
| mal-2026-1364 | Malicious code in svg-safety-tool (npm) | 2026-03-12T01:54:01Z | 2026-03-23T05:16:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1554 | Oracle Database Server: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1553 | Oracle NoSQL Database: Schwachstelle gefährdet Verfügbarkeit | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1552 | Oracle REST Data Services: Schwachstelle gefährdet Vertraulichkeit und Integrität | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1551 | Oracle Commerce: Schwachstelle gefährdet Vertraulichkeit, Integrität und Verfügbarkeit | 2025-07-15T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1550 | Red Hat Enterprise Linux (LZ4): Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-07-14T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1549 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation und DoS | 2025-07-14T22:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| wid-sec-w-2025-1548 | Red Hat OpenShift Container Platform: Schwachstelle ermöglicht Denial of Service | 2025-07-14T22:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1547 | Apache Jackrabbit Oak: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-14T22:00:00.000+00:00 | 2025-07-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1546 | Red Hat Enterprise Linux (GLib): Schwachstelle ermöglicht Denial of Service | 2025-07-14T22:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1545 | OTRS: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-13T22:00:00.000+00:00 | 2025-07-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1544 | PyTorch (ExecuTorch): Schwachstelle ermöglicht Denial of Service und Codeausführung | 2025-07-13T22:00:00.000+00:00 | 2025-07-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1543 | binutils: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-13T22:00:00.000+00:00 | 2025-12-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1542 | Sitecore Experience Manager: Mehrere Schwachstellen | 2025-07-13T22:00:00.000+00:00 | 2025-09-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1541 | SAP Software: Schwachstelle ermöglicht Codeausführung | 2025-07-13T22:00:00.000+00:00 | 2025-07-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1540 | Apache Commons Lang: Schwachstelle ermöglicht Denial of Service | 2025-07-13T22:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1539 | Red Hat Enterprise Linux (cloud-init): Schwachstelle ermöglicht Erlangen von Administratorrechten | 2025-07-13T22:00:00.000+00:00 | 2025-09-28T22:00:00.000+00:00 |
| wid-sec-w-2025-1538 | Ivanti Avalanche (Wavelink Manager): Schwachstelle ermöglicht Codeausführung oder Denial-of-Service | 2025-07-13T22:00:00.000+00:00 | 2025-07-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1537 | ImageMagick: Mehrere Schwachstellen | 2025-07-13T22:00:00.000+00:00 | 2025-09-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1536 | IBM Storage Scale: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-13T22:00:00.000+00:00 | 2025-07-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1535 | Ivanti Desktop and Server Management: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-07-13T22:00:00.000+00:00 | 2025-07-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1534 | Ivanti Sentry: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-07-13T22:00:00.000+00:00 | 2025-07-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1532 | ESET Sicherheitsprodukte: Schwachstelle ermöglicht Manipulation von Dateien | 2025-07-10T22:00:00.000+00:00 | 2025-07-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1531 | QT: Schwachstelle ermöglicht Denial of Service | 2025-07-10T22:00:00.000+00:00 | 2025-07-16T22:00:00.000+00:00 |
| wid-sec-w-2025-1530 | Trend Micro Worry-Free Business Security: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-07-10T22:00:00.000+00:00 | 2025-07-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1529 | Apache HTTP Server: Mehrere Schwachstellen | 2025-07-10T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1528 | WatchGuard Firebox: Mehrere Schwachstellen | 2025-07-10T22:00:00.000+00:00 | 2025-12-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1527 | Broadcom Brocade SANnav: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-10T22:00:00.000+00:00 | 2025-07-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1526 | GnuTLS: Mehrere Schwachstellen | 2025-07-09T22:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2025-1525 | MediaWiki Extensions und Skins: Mehrere Schwachstellen | 2025-07-09T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1524 | Drupal Module: Mehrere Schwachstellen | 2025-07-09T22:00:00.000+00:00 | 2025-07-21T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-165-02 | Meridian Cooperative Meridian | 2022-06-14T00:00:00.000000Z | 2022-06-14T00:00:00.000000Z |
| icsa-22-165-01 | Johnson Controls Metasys ADS ADX OAS Servers | 2022-06-14T00:00:00.000000Z | 2022-06-14T00:00:00.000000Z |
| icsa-22-160-01 | Mitsubishi Electric Air Conditioning Systems | 2022-06-09T00:00:00.000000Z | 2022-06-09T00:00:00.000000Z |
| icsa-22-154-01 | Vulnerabilities Affecting Dominion Voting Systems ImageCast X | 2022-06-03T00:00:00.000000Z | 2022-06-03T00:00:00.000000Z |
| icsa-22-153-02 | Illumina Local Run Manager | 2022-06-02T00:00:00.000000Z | 2022-08-23T00:00:00.000000Z |
| icsa-22-153-01 | Carrier LenelS2 HID Mercury access panels | 2022-06-02T00:00:00.000000Z | 2022-06-02T00:00:00.000000Z |
| icsma-22-151-02 | BD Synapsys | 2022-05-31T00:00:00.000000Z | 2022-05-31T00:00:00.000000Z |
| icsma-22-151-01 | BD Pyxis | 2022-05-31T00:00:00.000000Z | 2022-05-31T00:00:00.000000Z |
| icsa-22-151-01 | Fuji Electric Alpha7 PC Loader | 2022-05-31T00:00:00.000000Z | 2022-05-31T00:00:00.000000Z |
| icsa-22-146-02 | Horner Automation Cscape Csfont | 2022-05-26T00:00:00.000000Z | 2022-05-26T00:00:00.000000Z |
| icsa-22-146-01 | Keysight N6854A Geolocation server and N6841A RF Sensor software | 2022-05-26T00:00:00.000000Z | 2022-05-26T00:00:00.000000Z |
| icsa-22-144-02 | Matrikon OPC Server | 2022-05-24T00:00:00.000000Z | 2022-05-24T00:00:00.000000Z |
| icsa-22-144-01 | Rockwell Automation Logix Controllers | 2022-05-24T00:00:00.000000Z | 2022-05-24T00:00:00.000000Z |
| icsa-22-139-01 | Mitsubishi Electric MELSEC iQ-F Series | 2022-05-19T00:00:00.000000Z | 2022-05-31T00:00:00.000000Z |
| icsa-22-137-01 | Circutor COMPACT DC-S BASIC | 2022-05-17T00:00:00.000000Z | 2022-05-17T00:00:00.000000Z |
| icsa-22-132-10 | Siemens Desigo PXC and DXR Devices | 2022-05-12T00:00:00.000000Z | 2022-06-16T00:00:00.000000Z |
| icsa-22-132-04 | Cambium Networks cnMaestro | 2022-05-12T00:00:00.000000Z | 2022-05-12T00:00:00.000000Z |
| icsa-22-132-03 | Inkscape in Industrial Products | 2022-05-12T00:00:00.000000Z | 2022-05-12T00:00:00.000000Z |
| icsa-22-132-02 | Mitsubishi Electric MELSOFT iQ AppPortal | 2022-05-12T00:00:00.000000Z | 2022-05-12T00:00:00.000000Z |
| icsa-22-132-01 | Delta Electronics CNCSoft | 2022-05-12T00:00:00.000000Z | 2022-05-12T00:00:00.000000Z |
| icsa-22-132-16 | Siemens Teamcenter | 2022-05-10T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-132-15 | Siemens OpenV2G | 2022-05-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-132-14 | Siemens Simcenter Femap | 2022-05-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-132-13 | Siemens Industrial Devices using libcurl | 2022-05-10T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-132-12 | Siemens Industrial Products | 2022-05-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-132-11 | Siemens SIMATIC CP 44x-1 RNA | 2022-05-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-132-09 | Siemens JT2GO and Teamcenter Visualization | 2022-05-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-132-08 | Siemens Industrial Products with OPC UA | 2022-05-10T00:00:00.000000Z | 2023-10-10T00:00:00.000000Z |
| icsa-22-132-07 | Siemens SICAM P850 and SICAM P855 | 2022-05-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-132-06 | Siemens SIMATIC WinCC | 2022-05-10T00:00:00.000000Z | 2023-11-14T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20200108-webex-video | Cisco Webex Video Mesh Node Command Injection Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| cisco-sa-20200108-webex-centers-dos | Cisco Webex Centers Denial of Service Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| cisco-sa-20200108-vdsd-auth-bypass | Cisco Vision Dynamic Signage Director Authentication Bypass Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| cisco-sa-20200108-ucs-dir-infodis | Cisco UCS Director Information Disclosure Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| cisco-sa-20200108-mme-dos | Cisco Mobility Management Entity Denial of Service Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| cisco-sa-20200108-ise-auth-bypass | Cisco Identity Services Engine Authorization Bypass Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| cisco-sa-20200108-iphone-xss | Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Scripting Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| cisco-sa-20200108-ios-csrf | Cisco IOS and Cisco IOS XE Software Web UI Cross-Site Request Forgery Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-04-28T17:46:50+00:00 |
| cisco-sa-20200108-finesse-xss | Cisco Finesse Cross-Site Scripting Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-03-30T21:00:57+00:00 |
| cisco-sa-20200108-er-xss | Cisco Emergency Responder Stored Cross-Site Scripting Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| cisco-sa-20200108-dcaf-xss | Cisco Data Center Analytics Framework Cross-Site Scripting Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| cisco-sa-20200108-cvp-direct-obj-ref | Cisco Unified Customer Voice Portal Insecure Direct Object Reference Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| cisco-sa-20200108-cnca-xss | Cisco Crosswork Change Automation Cross-Site Scripting Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| cisco-sa-20200108-anyconnect-hijack | Cisco AnyConnect Secure Mobility Client for Android Service Hijack Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| cisco-sa-20200102-dcnm-xml-ext-entity | Cisco Data Center Network Manager XML External Entity Read Access Vulnerability | 2020-01-02T16:00:00+00:00 | 2020-01-15T15:58:00+00:00 |
| cisco-sa-20200102-dcnm-unauth-access | Cisco Data Center Network Manager JBoss EAP Unauthorized Access Vulnerability | 2020-01-02T16:00:00+00:00 | 2020-01-15T15:57:58+00:00 |
| cisco-sa-20200102-dcnm-sql-inject | Cisco Data Center Network Manager SQL Injection Vulnerabilities | 2020-01-02T16:00:00+00:00 | 2020-01-15T15:57:59+00:00 |
| cisco-sa-20200102-dcnm-path-trav | Cisco Data Center Network Manager Path Traversal Vulnerabilities | 2020-01-02T16:00:00+00:00 | 2020-01-15T15:58:01+00:00 |
| cisco-sa-20200102-dcnm-comm-inject | Cisco Data Center Network Manager Command Injection Vulnerabilities | 2020-01-02T16:00:00+00:00 | 2020-01-15T15:58:02+00:00 |
| cisco-sa-20200102-dcnm-auth-bypass | Cisco Data Center Network Manager Authentication Bypass Vulnerabilities | 2020-01-02T16:00:00+00:00 | 2020-01-15T15:58:03+00:00 |
| cisco-sa-20191120-webex-teams-dll | Cisco Webex Teams and Cisco Webex Meetings Client DLL Hijacking Vulnerability | 2019-11-20T16:00:00+00:00 | 2019-12-02T16:36:24+00:00 |
| cisco-sa-20191120-webex-centers-infodis | Cisco WebEx Centers Username Enumeration Information Disclosure Vulnerability | 2019-11-20T16:00:00+00:00 | 2019-11-20T16:00:00+00:00 |
| cisco-sa-20191120-vman-csrf | Cisco SD-WAN Solution vManage Cross-Site Request Forgery Vulnerability | 2019-11-20T16:00:00+00:00 | 2019-11-20T16:00:00+00:00 |
| cisco-sa-20191120-unity-exp-comm-inject | Cisco Unity Express Command Injection Vulnerability | 2019-11-20T16:00:00+00:00 | 2019-11-20T16:00:00+00:00 |
| cisco-sa-20191120-ucdm-xss | Cisco Unified Communications Domain Manager Persistent Cross-Site Scripting Vulnerability | 2019-11-20T16:00:00+00:00 | 2019-11-20T16:00:00+00:00 |
| cisco-sa-20191120-stealth-xss | Cisco Stealthwatch Enterprise Cross-Site Scripting Vulnerability | 2019-11-20T16:00:00+00:00 | 2019-11-20T16:00:00+00:00 |
| cisco-sa-20191120-sbr-rv-infodis | Cisco Small Business Routers RV016, RV042, RV042G, and RV082 Information Disclosure Vulnerability | 2019-11-20T16:00:00+00:00 | 2019-11-20T16:00:00+00:00 |
| cisco-sa-20191120-iosxr-ssh-bypass | Cisco IOS XR Software NETCONF Over Secure Shell ACL Bypass Vulnerability | 2019-11-20T16:00:00+00:00 | 2019-11-23T02:24:36+00:00 |
| cisco-sa-20191120-esa-url-bypass | Cisco Email Security Appliance URL Filtering Bypass Vulnerability | 2019-11-20T16:00:00+00:00 | 2019-11-20T16:00:00+00:00 |
| cisco-sa-20191120-esa-mp3-bypass | Cisco Email Security Appliance MP3 Content Filter Bypass Vulnerability | 2019-11-20T16:00:00+00:00 | 2019-11-20T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-60724 | GDI+ Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60723 | DirectX Graphics Kernel Denial of Service Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60722 | Microsoft OneDrive for Android Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60721 | Windows Administrator Protection Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60720 | Windows Transport Driver Interface (TDI) Translation Driver Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60719 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60718 | Windows Administrator Protection Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60717 | Windows Broadcast DVR User Service Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60716 | DirectX Graphics Kernel Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60715 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60714 | Windows OLE Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60713 | Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60709 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60708 | Storvsp.sys Driver Denial of Service Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60707 | Multimedia Class Scheduler Service (MMCSS) Driver Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60706 | Windows Hyper-V Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60705 | Windows Client-Side Caching Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60704 | Windows Kerberos Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60703 | Windows Remote Desktop Services Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59515 | Windows Broadcast DVR User Service Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59514 | Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59513 | Windows Bluetooth RFCOM Protocol Driver Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59512 | Customer Experience Improvement Program (CEIP) Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59511 | Windows WLAN Service Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59510 | Windows Routing and Remote Access Service (RRAS) Denial of Service Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59509 | Windows Speech Recognition Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59508 | Windows Speech Recognition Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59507 | Windows Speech Runtime Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59506 | DirectX Graphics Kernel Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59505 | Windows Smart Card Reader Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:14937-1 | govulncheck-vulndb-0.0.20250327T184518-1.1 on GA media | 2025-03-28T00:00:00Z | 2025-03-28T00:00:00Z |
| opensuse-su-2025:14936-1 | ffmpeg-4-4.4.5-9.1 on GA media | 2025-03-28T00:00:00Z | 2025-03-28T00:00:00Z |
| opensuse-su-2025:14935-1 | exim-4.98.2-1.1 on GA media | 2025-03-28T00:00:00Z | 2025-03-28T00:00:00Z |
| opensuse-su-2025:14934-1 | 389-ds-3.1.2~git55.7fbd4526-1.1 on GA media | 2025-03-28T00:00:00Z | 2025-03-28T00:00:00Z |
| opensuse-su-2025:14933-1 | corosync-3.1.9-2.1 on GA media | 2025-03-27T00:00:00Z | 2025-03-27T00:00:00Z |
| opensuse-su-2025:14932-1 | qubesome-0.0.10-1.1 on GA media | 2025-03-26T00:00:00Z | 2025-03-26T00:00:00Z |
| opensuse-su-2025:14931-1 | icingacli-2.12.4-1.1 on GA media | 2025-03-26T00:00:00Z | 2025-03-26T00:00:00Z |
| opensuse-su-2025:14930-1 | git-bug-0.8.0+git.1742269202.0ab94c9-1.1 on GA media | 2025-03-26T00:00:00Z | 2025-03-26T00:00:00Z |
| opensuse-su-2025:14929-1 | apache-commons-vfs2-2.10.0-1.1 on GA media | 2025-03-26T00:00:00Z | 2025-03-26T00:00:00Z |
| opensuse-su-2025:14928-1 | libmbedcrypto7-2.28.10-1.1 on GA media | 2025-03-25T00:00:00Z | 2025-03-25T00:00:00Z |
| opensuse-su-2025:14927-1 | kubernetes1.32-apiserver-1.32.3-1.1 on GA media | 2025-03-25T00:00:00Z | 2025-03-25T00:00:00Z |
| opensuse-su-2025:14926-1 | kubernetes1.31-apiserver-1.31.7-1.1 on GA media | 2025-03-25T00:00:00Z | 2025-03-25T00:00:00Z |
| opensuse-su-2025:14925-1 | kubernetes1.30-apiserver-1.30.11-1.1 on GA media | 2025-03-25T00:00:00Z | 2025-03-25T00:00:00Z |
| opensuse-su-2025:14924-1 | kubernetes1.29-apiserver-1.29.15-1.1 on GA media | 2025-03-25T00:00:00Z | 2025-03-25T00:00:00Z |
| opensuse-su-2025:14923-1 | docker-stable-24.0.9_ce-8.1 on GA media | 2025-03-25T00:00:00Z | 2025-03-25T00:00:00Z |
| opensuse-su-2025:14922-1 | chromedriver-134.0.6998.117-1.1 on GA media | 2025-03-25T00:00:00Z | 2025-03-25T00:00:00Z |
| opensuse-su-2025:14921-1 | argocd-cli-2.14.8-1.1 on GA media | 2025-03-25T00:00:00Z | 2025-03-25T00:00:00Z |
| opensuse-su-2025:0103-1 | Security update for cadvisor | 2025-03-24T17:01:45Z | 2025-03-24T17:01:45Z |
| opensuse-su-2025:14920-1 | gitleaks-8.24.2-1.1 on GA media | 2025-03-24T00:00:00Z | 2025-03-24T00:00:00Z |
| opensuse-su-2025:14919-1 | forgejo-10.0.3-1.1 on GA media | 2025-03-24T00:00:00Z | 2025-03-24T00:00:00Z |
| opensuse-su-2025:0101-1 | Security update for radare2 | 2025-03-23T15:01:53Z | 2025-03-23T15:01:53Z |
| opensuse-su-2025:0098-1 | Security update for chromium | 2025-03-22T10:55:25Z | 2025-03-22T10:55:25Z |
| opensuse-su-2025:14918-1 | warewulf4-4.6.0-2.1 on GA media | 2025-03-21T00:00:00Z | 2025-03-21T00:00:00Z |
| opensuse-su-2025:14917-1 | nodejs-electron-33.4.6-1.1 on GA media | 2025-03-21T00:00:00Z | 2025-03-21T00:00:00Z |
| opensuse-su-2025:0094-1 | Security update for gitea-tea | 2025-03-20T13:01:19Z | 2025-03-20T13:01:19Z |
| opensuse-su-2025:14916-1 | xorg-x11-server-21.1.15-3.1 on GA media | 2025-03-20T00:00:00Z | 2025-03-20T00:00:00Z |
| opensuse-su-2025:14915-1 | tomcat10-10.1.39-1.1 on GA media | 2025-03-20T00:00:00Z | 2025-03-20T00:00:00Z |
| opensuse-su-2025:14914-1 | python311-joblib-1.4.2-2.1 on GA media | 2025-03-20T00:00:00Z | 2025-03-20T00:00:00Z |
| opensuse-su-2025:14913-1 | python311-Django-5.1.7-1.1 on GA media | 2025-03-20T00:00:00Z | 2025-03-20T00:00:00Z |
| opensuse-su-2025:14912-1 | mercurial-6.9.4-1.1 on GA media | 2025-03-20T00:00:00Z | 2025-03-20T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:0024 | Red Hat Security Advisory: thunderbird security update | 2026-01-05T01:32:27+00:00 | 2026-03-18T03:13:53+00:00 |
| rhsa-2026:0008 | Red Hat Security Advisory: brotli security update | 2026-01-05T01:26:08+00:00 | 2026-04-13T19:34:05+00:00 |
| rhsa-2026:0006 | Red Hat Security Advisory: firefox security update | 2026-01-05T01:23:27+00:00 | 2026-03-18T03:13:46+00:00 |
| rhsa-2026:0005 | Red Hat Security Advisory: firefox security update | 2026-01-05T01:17:27+00:00 | 2026-03-18T03:13:46+00:00 |
| rhsa-2026:0002 | Red Hat Security Advisory: tar security update | 2026-01-05T00:51:42+00:00 | 2026-03-18T03:14:28+00:00 |
| rhsa-2026:0001 | Red Hat Security Advisory: spice-client-win security update | 2026-01-05T00:51:17+00:00 | 2026-04-13T20:13:56+00:00 |
| rhsa-2025:23975 | Red Hat Security Advisory: webkitgtk4 security update | 2025-12-24T09:04:13+00:00 | 2026-04-02T19:13:15+00:00 |
| rhsa-2025:23974 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-12-24T09:01:38+00:00 | 2026-04-02T19:13:15+00:00 |
| rhsa-2025:23972 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-12-24T08:38:43+00:00 | 2026-04-02T19:13:17+00:00 |
| rhsa-2025:23973 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-12-24T08:19:08+00:00 | 2026-04-02T19:13:14+00:00 |
| rhsa-2025:23971 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-12-24T07:59:13+00:00 | 2026-04-02T19:13:14+00:00 |
| rhsa-2025:23970 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-12-24T07:55:33+00:00 | 2026-04-02T19:13:13+00:00 |
| rhsa-2025:23969 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-12-24T07:42:23+00:00 | 2026-04-02T19:13:14+00:00 |
| rhsa-2025:23968 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-12-24T07:39:38+00:00 | 2026-04-02T19:13:12+00:00 |
| rhsa-2025:23967 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-12-24T07:18:48+00:00 | 2026-04-02T19:13:12+00:00 |
| rhsa-2025:23919 | Red Hat Security Advisory: httpd security update | 2025-12-22T23:27:16+00:00 | 2026-04-08T16:37:38+00:00 |
| rhsa-2025:23947 | Red Hat Security Advisory: kernel security update | 2025-12-22T17:42:52+00:00 | 2026-03-18T03:14:52+00:00 |
| rhsa-2025:23948 | Red Hat Security Advisory: grafana security update | 2025-12-22T17:10:29+00:00 | 2026-04-14T07:56:45+00:00 |
| rhsa-2025:23960 | Red Hat Security Advisory: kernel-rt security update | 2025-12-22T17:04:29+00:00 | 2026-03-18T03:14:52+00:00 |
| rhsa-2025:23932 | Red Hat Security Advisory: httpd security update | 2025-12-22T16:55:54+00:00 | 2026-04-08T16:37:39+00:00 |
| rhsa-2025:23927 | Red Hat Security Advisory: ruby security update | 2025-12-22T16:49:49+00:00 | 2026-03-18T03:15:10+00:00 |
| rhsa-2025:23940 | Red Hat Security Advisory: python3.12 security update | 2025-12-22T16:40:10+00:00 | 2026-04-13T20:00:12+00:00 |
| rhsa-2025:23916 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.18 security, enhancement & bug fix update | 2025-12-22T14:47:09+00:00 | 2026-04-14T07:56:45+00:00 |
| rhsa-2025:23856 | Red Hat Security Advisory: thunderbird security update | 2025-12-22T13:36:18+00:00 | 2026-03-18T03:13:44+00:00 |
| rhsa-2025:23858 | Red Hat Security Advisory: rsync security update | 2025-12-22T12:57:18+00:00 | 2026-03-18T03:14:33+00:00 |
| rhsa-2025:23857 | Red Hat Security Advisory: gimp:2.8 security update | 2025-12-22T12:54:58+00:00 | 2026-03-18T03:14:17+00:00 |
| rhsa-2025:23854 | Red Hat Security Advisory: rsync security update | 2025-12-22T12:14:03+00:00 | 2026-03-18T03:14:33+00:00 |
| rhsa-2025:23852 | Red Hat Security Advisory: keylime security update | 2025-12-22T11:43:44+00:00 | 2026-03-19T15:39:05+00:00 |
| rhsa-2025:23853 | Red Hat Security Advisory: rsync security update | 2025-12-22T11:41:13+00:00 | 2026-03-18T03:14:33+00:00 |
| rhsa-2025:23851 | Red Hat Security Advisory: go-rpm-macros security update | 2025-12-22T11:31:13+00:00 | 2026-03-24T13:17:04+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0085-1 | Security update for libpng16 | 2026-01-09T15:01:38Z | 2026-01-09T15:01:38Z |
| suse-su-2026:20050-1 | Security update for libvirt | 2026-01-09T11:04:23Z | 2026-01-09T11:04:23Z |
| suse-su-2026:20049-1 | Security update for openvswitch | 2026-01-09T10:54:58Z | 2026-01-09T10:54:58Z |
| suse-su-2026:0083-1 | Security update for gimp | 2026-01-09T09:12:59Z | 2026-01-09T09:12:59Z |
| suse-su-2026:0082-1 | Security update for python-filelock | 2026-01-09T09:12:48Z | 2026-01-09T09:12:48Z |
| suse-su-2026:0081-1 | Security update for poppler | 2026-01-09T08:02:02Z | 2026-01-09T08:02:02Z |
| suse-su-2026:0080-1 | Security update for libvirt | 2026-01-09T08:01:44Z | 2026-01-09T08:01:44Z |
| suse-su-2026:0079-1 | Security update for libvirt | 2026-01-09T08:01:29Z | 2026-01-09T08:01:29Z |
| suse-su-2026:0078-1 | Security update for curl | 2026-01-09T07:07:10Z | 2026-01-09T07:07:10Z |
| suse-su-2026:0077-1 | Security update for curl | 2026-01-08T19:04:00Z | 2026-01-08T19:04:00Z |
| suse-su-2026:20048-1 | Security update for libpcap | 2026-01-08T16:29:06Z | 2026-01-08T16:29:06Z |
| suse-su-2026:20047-1 | Security update for python311 | 2026-01-08T16:27:35Z | 2026-01-08T16:27:35Z |
| suse-su-2026:20064-1 | Security update for libpcap | 2026-01-08T16:16:36Z | 2026-01-08T16:16:36Z |
| suse-su-2026:20045-1 | Security update for glib2 | 2026-01-08T16:00:18Z | 2026-01-08T16:00:18Z |
| suse-su-2026:20044-1 | Security update for rsync | 2026-01-08T15:49:46Z | 2026-01-08T15:49:46Z |
| suse-su-2026:20043-1 | Security update for python-tornado6 | 2026-01-08T15:48:09Z | 2026-01-08T15:48:09Z |
| suse-su-2026:20042-1 | Security update for curl | 2026-01-08T15:18:54Z | 2026-01-08T15:18:54Z |
| suse-su-2026:20041-1 | Security update for bluez | 2026-01-08T15:07:04Z | 2026-01-08T15:07:04Z |
| suse-su-2026:20062-1 | Security update for curl | 2026-01-08T14:51:21Z | 2026-01-08T14:51:21Z |
| suse-su-2026:20061-1 | Security update for openvswitch | 2026-01-08T14:43:50Z | 2026-01-08T14:43:50Z |
| suse-su-2026:0073-1 | Security update for ImageMagick | 2026-01-08T13:22:41Z | 2026-01-08T13:22:41Z |
| suse-su-2026:0072-1 | Security update for ImageMagick | 2026-01-08T13:22:28Z | 2026-01-08T13:22:28Z |
| suse-su-2026:0071-1 | Security update for php8 | 2026-01-08T13:22:08Z | 2026-01-08T13:22:08Z |
| suse-su-2026:0070-1 | Security update for qemu | 2026-01-08T13:21:59Z | 2026-01-08T13:21:59Z |
| suse-su-2026:0069-1 | Security update for rsync | 2026-01-08T13:21:48Z | 2026-01-08T13:21:48Z |
| suse-su-2026:0068-1 | Security update for libvirt | 2026-01-08T12:22:40Z | 2026-01-08T12:22:40Z |
| suse-su-2026:0067-1 | Security update for podman | 2026-01-08T12:22:16Z | 2026-01-08T12:22:16Z |
| suse-su-2026:0066-1 | Security update for curl | 2026-01-08T12:21:35Z | 2026-01-08T12:21:35Z |
| suse-su-2026:0063-1 | Security update for libpcap | 2026-01-08T09:36:26Z | 2026-01-08T09:36:26Z |
| suse-su-2026:0062-1 | Security update for libpcap | 2026-01-08T09:36:12Z | 2026-01-08T09:36:12Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:3999 | Important: ghostscript security update | 2024-06-20T00:00:00Z | 2024-06-20T11:33:41Z |
| alsa-2024:3968 | Moderate: container-tools:rhel8 bug fix and enhancement update | 2024-06-18T00:00:00Z | 2024-06-19T09:17:27Z |
| alsa-2024:3961 | Important: flatpak security update | 2024-06-17T00:00:00Z | 2024-06-19T09:15:05Z |
| alsa-2024:3959 | Important: flatpak security update | 2024-06-17T00:00:00Z | 2024-06-19T09:13:38Z |
| alsa-2024:3955 | Important: firefox security update | 2024-06-17T00:00:00Z | 2024-06-19T09:12:22Z |
| alsa-2024:3954 | Important: firefox security update | 2024-06-17T00:00:00Z | 2024-06-19T09:10:34Z |
| alsa-2024:3846 | Moderate: python-idna security update | 2024-06-11T00:00:00Z | 2024-06-13T13:10:39Z |
| alsa-2024:3843 | Moderate: cockpit security update | 2024-06-11T00:00:00Z | 2024-06-13T13:13:08Z |
| alsa-2024:3842 | Low: c-ares security update | 2024-06-11T00:00:00Z | 2024-06-13T13:15:03Z |
| alsa-2024:3838 | Moderate: ruby security update | 2024-06-11T00:00:00Z | 2024-06-13T13:19:02Z |
| alsa-2024:3837 | Important: 389-ds-base security update | 2024-06-11T00:00:00Z | 2024-06-14T06:41:16Z |
| alsa-2024:3835 | Important: libreoffice security update | 2024-06-11T00:00:00Z | 2024-06-14T13:33:39Z |
| alsa-2024:3834 | Moderate: gdk-pixbuf2 security update | 2024-06-11T00:00:00Z | 2024-06-13T13:20:04Z |
| alsa-2024:3831 | Moderate: containernetworking-plugins security and bug fix update | 2024-06-11T00:00:00Z | 2024-06-13T13:20:58Z |
| alsa-2024:3830 | Moderate: gvisor-tap-vsock security and bug fix update | 2024-06-11T00:00:00Z | 2024-06-13T13:21:54Z |
| alsa-2024:3827 | Moderate: buildah security and bug fix update | 2024-06-11T00:00:00Z | 2024-06-13T13:22:49Z |
| alsa-2024:3826 | Moderate: podman security and bug fix update | 2024-06-11T00:00:00Z | 2024-06-14T09:47:46Z |
| alsa-2024:3823 | Moderate: rpm-ostree security update | 2024-06-11T00:00:00Z | 2024-06-14T06:42:30Z |
| alsa-2024:3820 | Moderate: fence-agents security update | 2024-06-11T00:00:00Z | 2024-06-14T07:34:33Z |
| alsa-2024:3784 | Moderate: thunderbird security update | 2024-06-10T00:00:00Z | 2024-06-20T21:36:14Z |
| alsa-2024:3783 | Moderate: firefox security update | 2024-06-10T00:00:00Z | 2024-06-20T21:37:10Z |
| alsa-2024:3755 | Important: idm:DL1 security update | 2024-06-10T00:00:00Z | 2024-06-20T15:58:27Z |
| alsa-2024:3754 | Important: ipa security update | 2024-06-10T00:00:00Z | 2024-06-20T16:08:28Z |
| alsa-2024:3671 | Moderate: ruby:3.3 security, bug fix, and enhancement update | 2024-06-06T00:00:00Z | 2024-06-10T14:17:10Z |
| alsa-2024:3670 | Moderate: ruby:3.3 security, bug fix, and enhancement update | 2024-06-06T00:00:00Z | 2024-06-10T14:22:22Z |
| alsa-2024:3668 | Moderate: ruby:3.1 security, bug fix, and enhancement update | 2024-06-06T00:00:00Z | 2024-06-06T13:02:23Z |
| alsa-2024:3667 | Moderate: cockpit security update | 2024-06-06T00:00:00Z | 2024-06-06T12:57:53Z |
| alsa-2024:3666 | Important: tomcat security and bug fix update | 2024-06-06T00:00:00Z | 2024-06-06T12:55:40Z |
| alsa-2024:3661 | Important: booth security update | 2024-06-06T00:00:00Z | 2024-06-11T12:22:44Z |
| alsa-2024:3659 | Important: booth security update | 2024-06-06T00:00:00Z | 2024-06-11T12:24:50Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-241 | UNKNOWN READ in write_cond_nodes_to_conf | 2022-03-14T00:01:31.071382Z | 2022-04-13T03:04:42.314289Z |
| osv-2022-238 | Segv on unknown address in i_zval_ptr_dtor | 2022-03-12T00:00:45.926897Z | 2022-04-13T03:04:33.378430Z |
| osv-2022-237 | Stack-buffer-overflow in sc_format_oid | 2022-03-12T00:00:21.696792Z | 2022-03-12T00:00:21.697036Z |
| osv-2022-235 | Heap-buffer-overflow in zend_gc_collect_cycles | 2022-03-11T00:01:44.805842Z | 2022-04-13T03:04:33.343084Z |
| osv-2022-232 | UNKNOWN READ in pdfi_fapi_get_glyph | 2022-03-11T00:00:50.999282Z | 2022-04-13T03:04:34.809697Z |
| osv-2022-231 | Heap-buffer-overflow in do_fileid | 2022-03-11T00:00:50.495613Z | 2022-03-11T00:00:50.495861Z |
| osv-2022-229 | UNKNOWN READ in spgetcc | 2022-03-09T00:01:43.021663Z | 2023-02-24T02:17:15.756244Z |
| osv-2022-226 | Heap-buffer-overflow in vips_rect_intersectrect | 2022-03-09T00:00:12.248020Z | 2022-04-13T03:04:38.135997Z |
| osv-2022-223 | Container-overflow in Exiv2::Photoshop::locateIrb | 2022-03-08T00:00:07.482401Z | 2022-04-13T03:04:39.309960Z |
| osv-2022-222 | Heap-use-after-free in cb_stdout_flush | 2022-03-07T00:01:53.429306Z | 2022-04-13T03:04:38.208453Z |
| osv-2022-220 | Stack-buffer-overflow in load_regex_matcher | 2022-03-07T00:00:32.716453Z | 2022-04-13T03:04:39.413972Z |
| osv-2022-218 | UNKNOWN READ in pdfi_read_cff_font | 2022-03-06T00:01:40.010815Z | 2022-04-13T03:04:34.729007Z |
| osv-2022-217 | Stack-buffer-overflow in msgpack_sbuffer_write | 2022-03-06T00:00:18.911752Z | 2023-02-24T01:48:20.116657Z |
| osv-2022-210 | UNKNOWN READ in pdfi_count_cff_index | 2022-03-04T00:00:09.623913Z | 2022-04-13T03:04:34.328420Z |
| osv-2022-209 | Heap-buffer-overflow in dotnet_parse_tilde_2 | 2022-03-03T00:00:39.597102Z | 2022-04-13T03:04:42.230855Z |
| osv-2022-206 | Heap-buffer-overflow in spgetcc | 2022-02-27T00:02:01.721420Z | 2022-04-13T03:04:34.680498Z |
| osv-2022-202 | Heap-buffer-overflow in ndpi_workflow_process_packet | 2022-02-27T00:00:22.129581Z | 2022-04-13T03:04:35.896926Z |
| osv-2022-199 | Stack-buffer-overflow in check_user_password_preR5 | 2022-02-25T00:01:57.594646Z | 2023-02-24T02:18:08.648171Z |
| osv-2021-1809 | Heap-buffer-overflow in ujson.cpython-38-x86_64-linux-gnu.so | 2022-02-25T00:00:25.106722Z | 2022-05-19T00:55:00.970552Z |
| osv-2022-194 | Heap-buffer-overflow in SuperFastHash | 2022-02-24T00:00:08.858909Z | 2022-07-31T00:32:48.104607Z |
| osv-2022-193 | UNKNOWN READ in GC_generic_malloc_many | 2022-02-24T00:00:07.843234Z | 2023-01-22T00:12:25.178113Z |
| osv-2022-191 | Heap-buffer-overflow in ndpi_handle_ipv6_extension_headers | 2022-02-23T00:01:48.558449Z | 2022-04-13T03:04:35.972108Z |
| osv-2022-188 | Incorrect-function-pointer-type in cv::split | 2022-02-23T00:00:47.945292Z | 2022-02-23T00:00:47.945497Z |
| osv-2022-183 | Heap-buffer-overflow in evax_bfd_print_dst | 2022-02-21T00:01:49.508994Z | 2023-02-24T05:02:12.387302Z |
| osv-2022-181 | Heap-use-after-free in zval_call_destructor | 2022-02-21T00:00:49.282928Z | 2022-04-13T03:04:33.592539Z |
| osv-2022-180 | Heap-buffer-overflow in row_mt_worker_hook | 2022-02-21T00:00:46.102389Z | 2022-04-13T03:04:39.473707Z |
| osv-2022-179 | Heap-buffer-overflow in row_mt_worker_hook | 2022-02-21T00:00:40.376028Z | 2022-04-13T03:04:39.479274Z |
| osv-2022-177 | UNKNOWN READ in gx_dc_default_fill_masked | 2022-02-21T00:00:26.966993Z | 2022-04-13T03:04:34.838399Z |
| osv-2022-169 | Heap-buffer-overflow in ucasemap_internalUTF8ToTitle_70 | 2022-02-19T00:01:40.865642Z | 2022-04-13T03:04:34.130335Z |
| osv-2022-168 | Heap-buffer-overflow in fmt::v8::detail::big_decimal_fp fmt::v8::detail::write_padded< | 2022-02-19T00:01:40.526021Z | 2022-04-13T03:04:33.952012Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-superset-2023-49736 | Apache Superset: SQL Injection on where_in JINJA macro | 2025-02-05T07:26:33.003Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-23952 | Apache Superset: Allows for uncontrolled resource consumption via a ZIP bomb (version range fix for CVE-2023-46104) | 2025-02-05T07:26:25.704Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-24772 | Apache Superset: Improper Neutralisation of custom SQL on embedded context | 2025-02-05T07:26:17.412Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-24773 | Apache Superset: Improper validation of SQL statements allows for unauthorized access to data | 2025-02-05T07:26:09.909Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-24779 | Apache Superset: Improper data authorization when creating a new dataset | 2025-02-05T07:26:02.294Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-26016 | Apache Superset: Improper authorization validation on dashboards and charts import | 2025-02-05T07:25:54.594Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-27315 | Apache Superset: Improper error handling on alerts | 2025-02-05T07:25:46.001Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-28148 | Apache Superset: Incorrect datasource authorization on explore REST API | 2025-02-05T07:25:37.993Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-34693 | Apache Superset: Server arbitrary file read | 2025-02-05T07:25:30.309Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-39887 | Apache Superset: Improper SQL authorisation, parse not checking for specific engine functions | 2025-02-05T07:25:23.689Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-53948 | Apache Superset: Error verbosity exposes metadata in analytics databases | 2025-02-05T07:25:06.905Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-53949 | Apache Superset: Lower privilege users are able to create Role when FAB_ADD_SECURITY_API is enabled | 2025-02-05T07:24:59.693Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-55633 | Apache Superset: SQLLab Improper readonly query validation allows unauthorized write access | 2025-02-05T07:24:52.298Z | 2025-05-20T10:02:07.006Z |
| bit-mlflow-2024-1483 | Path Traversal Vulnerability in mlflow/mlflow | 2025-02-04T07:22:21.033Z | 2025-05-20T10:02:07.006Z |
| bit-mlflow-2024-1558 | Path Traversal Vulnerability in mlflow/mlflow | 2025-02-04T07:22:09.430Z | 2025-05-20T10:02:07.006Z |
| bit-mlflow-2024-1560 | Path Traversal Vulnerability in mlflow/mlflow | 2025-02-04T07:21:57.427Z | 2025-08-20T09:06:12.327Z |
| bit-mlflow-2024-1593 | Path Traversal via Parameter Smuggling in mlflow/mlflow | 2025-02-04T07:21:44.709Z | 2025-05-20T10:02:07.006Z |
| bit-mlflow-2024-1594 | Local File Read via Path Traversal in mlflow/mlflow | 2025-02-04T07:21:32.028Z | 2025-05-20T10:02:07.006Z |
| bit-mlflow-2024-3573 | Local File Inclusion (LFI) via Scheme Confusion in mlflow/mlflow | 2025-02-04T07:20:26.331Z | 2025-05-20T10:02:07.006Z |
| bit-mlflow-2024-4263 | Improper Access Control in mlflow/mlflow | 2025-02-04T07:17:58.524Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2024-11741 | 2025-02-04T07:14:17.715Z | 2025-05-10T09:10:12.512Z | |
| bit-gitlab-2023-6195 | Server-Side Request Forgery (SSRF) in GitLab | 2025-02-01T07:29:24.815Z | 2025-08-06T06:08:07.957Z |
| bit-gitlab-2024-1211 | Cross-Site Request Forgery (CSRF) in GitLab | 2025-02-01T07:26:58.828Z | 2025-08-06T06:08:07.957Z |
| bit-elasticsearch-2024-43709 | Elasticsearch allocation of resources without limits or throttling leads to crash | 2025-02-01T07:09:48.913Z | 2025-05-20T10:02:07.006Z |
| bit-node-2025-23084 | 2025-01-30T19:20:24.038Z | 2025-11-06T13:25:46.476Z | |
| bit-golang-2024-45336 | Sensitive headers incorrectly sent after cross-domain redirect in net/http | 2025-01-30T19:13:32.933Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2024-45341 | Usage of IPv6 zone IDs can bypass URI name constraints in crypto/x509 | 2025-01-30T19:13:14.453Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2025-0290 | Loop with Unreachable Exit Condition ('Infinite Loop') in GitLab | 2025-01-30T19:13:11.925Z | 2025-05-20T10:02:07.006Z |
| bit-solr-2024-52012 | Apache Solr: Configset upload on Windows allows arbitrary path write-access | 2025-01-29T07:20:30.008Z | 2025-05-20T10:02:07.006Z |
| bit-solr-2025-24814 | Apache Solr: Core-creation with "trusted" configset can use arbitrary untrusted files | 2025-01-29T07:20:22.315Z | 2026-01-26T15:09:56.435Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2024-avi-1015 | Multiples vulnérabilités dans les produits IBM | 2024-11-22T00:00:00.000000 | 2024-11-22T00:00:00.000000 |
| certfr-2024-avi-1014 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2024-11-22T00:00:00.000000 | 2024-11-22T00:00:00.000000 |
| certfr-2024-avi-1013 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-11-22T00:00:00.000000 | 2024-11-22T00:00:00.000000 |
| certfr-2024-avi-1012 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-11-22T00:00:00.000000 | 2024-11-22T00:00:00.000000 |
| certfr-2024-avi-1011 | Vulnérabilité dans Centreon Web | 2024-11-22T00:00:00.000000 | 2024-11-22T00:00:00.000000 |
| certfr-2024-avi-1010 | Multiples vulnérabilités dans Microsoft Edge | 2024-11-22T00:00:00.000000 | 2024-11-22T00:00:00.000000 |
| certfr-2024-avi-1009 | Multiples vulnérabilités dans Drupal | 2024-11-21T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-avi-1008 | Multiples vulnérabilités dans Wireshark | 2024-11-21T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-avi-1007 | Multiples vulnérabilités dans PHP | 2024-11-21T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-avi-1006 | Multiples vulnérabilités dans les produits Atlassian | 2024-11-20T00:00:00.000000 | 2024-11-20T00:00:00.000000 |
| certfr-2024-avi-1005 | Multiples vulnérabilités dans les produits Spring | 2024-11-20T00:00:00.000000 | 2024-11-20T00:00:00.000000 |
| certfr-2024-avi-1004 | Multiples vulnérabilités dans les produits Apple | 2024-11-20T00:00:00.000000 | 2024-11-20T00:00:00.000000 |
| certfr-2024-avi-1003 | Vulnérabilité dans Google Chrome | 2024-11-20T00:00:00.000000 | 2024-11-20T00:00:00.000000 |
| certfr-2024-avi-1002 | Vulnérabilité dans les produits Trend Micro | 2024-11-19T00:00:00.000000 | 2024-11-19T00:00:00.000000 |
| certfr-2024-avi-1001 | Vulnérabilité dans les produits Palo Alto Networks | 2024-11-19T00:00:00.000000 | 2024-11-19T00:00:00.000000 |
| certfr-2024-avi-1000 | Multiples vulnérabilités dans Apache Tomcat | 2024-11-18T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| certfr-2024-avi-0999 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-11-18T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| certfr-2024-avi-0998 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2024-11-18T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| certfr-2024-avi-0997 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-11-18T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| certfr-2024-avi-0996 | Multiples vulnérabilités dans GLPI | 2024-11-18T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| certfr-2024-avi-0995 | Multiples vulnérabilités dans les produits Nextcloud | 2024-11-18T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| certfr-2024-avi-0994 | Vulnérabilité dans Microsoft Azure | 2024-11-18T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| certfr-2024-avi-0993 | Vulnérabilité dans les caméras Synology | 2024-11-18T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| certfr-2024-avi-0992 | Multiples vulnérabilités dans les produits IBM | 2024-11-15T00:00:00.000000 | 2024-11-15T00:00:00.000000 |
| certfr-2024-avi-0991 | Vulnérabilité dans Spring | 2024-11-15T00:00:00.000000 | 2024-11-15T00:00:00.000000 |
| certfr-2024-avi-0990 | Vulnérabilité dans les produits Palo Alto Networks | 2024-11-15T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| certfr-2024-avi-0989 | Vulnérabilité dans MongoDB | 2024-11-15T00:00:00.000000 | 2024-11-15T00:00:00.000000 |
| certfr-2024-avi-0988 | Multiples vulnérabilités dans Microsoft Edge | 2024-11-15T00:00:00.000000 | 2024-11-15T00:00:00.000000 |
| certfr-2024-avi-0987 | Multiples vulnérabilités dans PostgreSQL | 2024-11-15T00:00:00.000000 | 2024-11-15T00:00:00.000000 |
| certfr-2024-avi-0986 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2024-11-14T00:00:00.000000 | 2024-11-14T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000153 | LINE for Windows fails to properly verify downloaded files | 2016-08-25T14:26+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000151 | YoruFukurou (NightOwl) vulnerable to denial-of-service (DoS) | 2016-08-24T14:14+09:00 | 2016-10-27T09:43+09:00 |
| jvndb-2016-000152 | simple chat vulnerable to cross-site scripting | 2016-08-23T13:37+09:00 | 2016-09-05T17:45+09:00 |
| jvndb-2016-000149 | Cybozu Garoon fails to restrict access permissions | 2016-08-22T15:16+09:00 | 2017-05-23T12:01+09:00 |
| jvndb-2016-000148 | Cybozu Garoon vulnerable to authentication bypass | 2016-08-22T15:16+09:00 | 2017-05-23T12:01+09:00 |
| jvndb-2016-000147 | Cybozu Garoon vulnerable to SQL injection | 2016-08-22T15:16+09:00 | 2017-05-23T12:01+09:00 |
| jvndb-2016-000146 | "Check available times" function in Cybozu Garoon vulnerable to cross-site scripting | 2016-08-22T15:16+09:00 | 2017-05-23T12:01+09:00 |
| jvndb-2016-000145 | "New appointment" function in Cybozu Garoon vulnerable to cross-site scripting | 2016-08-22T15:16+09:00 | 2017-05-23T12:01+09:00 |
| jvndb-2016-000144 | "User details" function in Cybozu Garoon vulnerable to cross-site scripting | 2016-08-22T15:16+09:00 | 2017-05-23T12:01+09:00 |
| jvndb-2016-000143 | "Response request" function in Cybozu Garoon vulnerable to cross-site scripting | 2016-08-22T15:16+09:00 | 2017-05-23T12:01+09:00 |
| jvndb-2016-000142 | Cybozu Garoon vulnerable to open redirect | 2016-08-22T15:16+09:00 | 2017-05-23T12:01+09:00 |
| jvndb-2016-000150 | Geeklog IVYWE edition contains a cross-site scripting vulnerability | 2016-08-19T14:13+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000141 | OSSEC Web UI vulnerable to cross-site scripting | 2016-08-18T14:24+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000140 | ClipBucket vulnerable to cross-site scripting | 2016-08-18T14:09+09:00 | 2016-09-05T17:41+09:00 |
| jvndb-2016-000139 | Installer of PhishWall Client Internet Explorer version may insecurely load Dynamic Link Libraries | 2016-08-17T16:12+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000138 | Cybozu Mailwise contains issue in preventing clickjacking attacks | 2016-08-16T14:14+09:00 | 2017-05-23T12:01+09:00 |
| jvndb-2016-000137 | Cybozu Mailwise vulnerable to information disclosure | 2016-08-16T14:14+09:00 | 2017-05-23T12:02+09:00 |
| jvndb-2016-000136 | Cybozu Mailwise vulnerable to information disclosure | 2016-08-16T14:14+09:00 | 2017-05-23T12:02+09:00 |
| jvndb-2016-000135 | Cybozu Mailwise vulnerable to mail header injection | 2016-08-16T14:10+09:00 | 2017-05-23T16:23+09:00 |
| jvndb-2016-000134 | Multiple I-O DATA Recording Hard disk products vulnerable to cross-site request forgery | 2016-08-08T12:28+09:00 | 2016-10-24T18:27+09:00 |
| jvndb-2016-000127 | Android stock browser vulnerable to denial-of-service (DoS) | 2016-08-05T13:41+09:00 | 2016-08-05T13:41+09:00 |
| jvndb-2016-000133 | Coordinate Plus App fails to verify SSL server certificates | 2016-08-04T13:41+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-003527 | Information Disclosure Vulnerability in Hitachi Command Suite | 2016-08-02T13:50+09:00 | 2016-09-14T18:18+09:00 |
| jvndb-2016-000130 | EC-CUBE plugin "Coupon Plugin" vulnerable to SQL injection | 2016-07-25T11:15+09:00 | 2016-08-04T17:55+09:00 |
| jvndb-2016-000129 | Android OS issue where it is affected by the CRIME attack | 2016-07-25T11:15+09:00 | 2025-04-18T16:36+09:00 |
| jvndb-2016-000128 | Android OS Contacts app fails to restrict access permissions | 2016-07-25T11:14+09:00 | 2016-07-25T11:14+09:00 |
| jvndb-2016-000126 | Vtiger CRM does not properly restrict access to application data | 2016-07-20T14:56+09:00 | 2016-08-04T18:02+09:00 |
| jvndb-2016-000125 | WordPress plugin "Nofollow Links" vulnerable to cross-site scripting | 2016-07-20T14:56+09:00 | 2016-08-05T17:40+09:00 |
| jvndb-2016-000123 | LINE for Windows may insecurely load Dynamic Link Libraries | 2016-07-08T14:29+09:00 | 2016-08-19T17:44+09:00 |
| jvndb-2016-000121 | Apache Commons FileUpload vulnerable to denial-of-service (DoS) | 2016-06-30T13:53+09:00 | 2018-01-29T10:30+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-30976 | Advantech WISE-DeviceOn Server跨站脚本漏洞(CNVD-2025-3097699) | 2025-12-10 | 2025-12-17 |
| cnvd-2025-30975 | Advantech WISE-DeviceOn Server跨站脚本漏洞(CNVD-2025-3097500) | 2025-12-10 | 2025-12-17 |
| cnvd-2025-30974 | Advantech WISE-DeviceOn Server跨站脚本漏洞(CNVD-2025-3097401) | 2025-12-10 | 2025-12-17 |
| cnvd-2025-30973 | Advantech WISE-DeviceOn Server跨站脚本漏洞(CNVD-2025-3097302) | 2025-12-10 | 2025-12-17 |
| cnvd-2025-30972 | Advantech WISE-DeviceOn Server跨站脚本漏洞(CNVD-2025-3097203) | 2025-12-10 | 2025-12-17 |
| cnvd-2025-30971 | Advantech WISE-DeviceOn Server跨站脚本漏洞(CNVD-2025-3097104) | 2025-12-10 | 2025-12-17 |
| cnvd-2025-30970 | Advantech WISE-DeviceOn Server跨站脚本漏洞(CNVD-2025-3097005) | 2025-12-10 | 2025-12-17 |
| cnvd-2025-30969 | Advantech WISE-DeviceOn Server跨站脚本漏洞(CNVD-2025-3096906) | 2025-12-10 | 2025-12-17 |
| cnvd-2025-30968 | Advantech WISE-DeviceOn Server跨站脚本漏洞 | 2025-12-10 | 2025-12-17 |
| cnvd-2025-30837 | Apache HTTP Server存在未明漏洞(CNVD-2025-30837) | 2025-12-10 | 2025-12-17 |
| cnvd-2025-30836 | Apache HTTP Server跨站请求伪造漏洞 | 2025-12-10 | 2025-12-17 |
| cnvd-2025-30835 | Apache HTTP Server代码执行漏洞(CNVD-2025-30835) | 2025-12-10 | 2025-12-17 |
| cnvd-2025-30833 | Apache HTTP Server安全绕过漏洞(CNVD-2025-30833) | 2025-12-10 | 2025-12-17 |
| cnvd-2025-30755 | Student Management System /newcurriculm.php文件SQL注入漏洞 | 2025-12-10 | 2025-12-16 |
| cnvd-2025-30754 | Student Management System /edit_user.php文件SQL注入漏洞 | 2025-12-10 | 2025-12-16 |
| cnvd-2025-30677 | Google Android权限提升漏洞(CNVD-2025-30677) | 2025-12-10 | 2025-12-15 |
| cnvd-2025-30593 | WordPress插件WebP Express信息泄露漏洞 | 2025-12-10 | 2025-12-12 |
| cnvd-2025-30592 | WordPress插件MxChat信息泄露漏洞 | 2025-12-10 | 2025-12-12 |
| cnvd-2025-30591 | WordPress插件SurveyFunnel – Survey Plugin for WordPress信息泄露漏洞 | 2025-12-10 | 2025-12-12 |
| cnvd-2025-30590 | WordPress插件SSP Debug信息泄露漏洞 | 2025-12-10 | 2025-12-12 |
| cnvd-2025-30564 | Apache HTTP Server命令注入漏洞 | 2025-12-10 | 2025-12-12 |
| cnvd-2025-30563 | Tenda Ax3缓冲区溢出漏洞 | 2025-12-10 | 2025-12-12 |
| cnvd-2025-30562 | Huawei HarmonyOS存在未明漏洞(CNVD-2025-30562) | 2025-12-10 | 2025-12-12 |
| cnvd-2025-30561 | Huawei HarmonyOS file management app绕过应用锁校验漏洞 | 2025-12-10 | 2025-12-12 |
| cnvd-2025-30560 | Huawei HarmonyOS存在未明漏洞(CNVD-2025-30560) | 2025-12-10 | 2025-12-12 |
| cnvd-2025-30559 | Huawei HarmonyOS office service拒绝服务漏洞 | 2025-12-10 | 2025-12-12 |
| cnvd-2025-30558 | Huawei HarmonyOS存在未明漏洞(CNVD-2025-30558) | 2025-12-10 | 2025-12-12 |
| cnvd-2025-30383 | Google Chrome信息泄露漏洞(CNVD-2025-3038304) | 2025-12-10 | 2025-12-10 |
| cnvd-2025-30382 | FreePBX SQL注入漏洞(CNVD-2025-3038208) | 2025-12-10 | 2025-12-10 |
| cnvd-2026-04888 | Google Chrome错误类型转换漏洞 | 2025-12-09 | 2026-01-19 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-16387 | Уязвимость функции verify_field_val() плагина интеграции Integration for Contact Forms an… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16386 | Уязвимость компонента Devnex Addons плагина WordPress Elementor, позволяющая нарушителю о… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16385 | Уязвимость плагина Malcure Malware Scanner системы управления содержимым сайта WordPress,… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16384 | Уязвимость плагина AI Engine системы управления содержимым сайта WordPress, связанная с н… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16383 | Уязвимость программного средства для службы ИТ-поддержки Zoho ManageEngine Applications M… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16382 | Уязвимость программного средства мониторинга, анализа и создания отчетов Zohocorp ManageE… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16381 | Уязвимость программного обеспечения для мониторинга сети OpManager, OpManager MSP, OpMana… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16380 | Уязвимость программного средства мониторинга, анализа и создания отчетов Zohocorp ManageE… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16379 | Уязвимость программного обеспечения для управления сервисом Active Directory Zoho ManageE… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16378 | Уязвимость консоли администратора корпоративной системы управления электронной почтой Zim… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16377 | Уязвимость функции sprintf микропрограммного обеспечения маршрутизаторов Tenda AC18, позв… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16376 | Уязвимость функции strcpy микропрограммного обеспечения маршрутизаторов Tenda AC18, позво… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16375 | Уязвимость набор инструментов для взаимодействия с базами данных MariaDB MCP MariaDB Serv… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16374 | Уязвимость программного средства управления проектами и задачами JetBrains YouTrack, связ… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16373 | Уязвимость программного средства управления проектами и задачами JetBrains YouTrack, связ… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16372 | Уязвимость программного средства управления проектами и задачами JetBrains YouTrack, связ… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16371 | Уязвимость системы сбора и анализа событий безопасности IBM QRadar SIEM, связанная с ошиб… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16370 | Уязвимость системы сбора и анализа событий безопасности IBM QRadar SIEM, связанная с ошиб… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16369 | Уязвимость системы сбора и анализа событий безопасности IBM QRadar SIEM, связанная с недо… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16368 | Уязвимость платформы управления рисками на предприятии IBM OpenPages, связанная с раскрыт… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16367 | Уязвимость платформы управления рисками на предприятии IBM OpenPages, связанная с недоста… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16366 | Уязвимость онлайн-сервиса бизнес-аналитики IBM Cognos Analytics, связанная с использовани… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16365 | Уязвимость компонента Block Storage системы хранения данных Sun ZFS Storage Appliance Kit… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16364 | Уязвимость компонента System Configuration платформы для аналитики и управления данными O… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16363 | Уязвимость компонента Web Service API программного средства для создания отчетов Oracle B… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16362 | Уязвимость компонента Core системы хранения данных Oracle ZFS Storage Appliance Kit компа… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16361 | Уязвимость браузера Mozilla Firefox и почтового клиента Thunderbird, связанная с записью … | 26.12.2025 | 26.12.2025 |
| bdu:2025-16360 | Уязвимость компонента Request Handling браузеров Mozilla Firefox, Firefox ESR и почтового… | 26.12.2025 | 13.01.2026 |
| bdu:2025-16359 | Уязвимость JIT-компилятора браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thu… | 26.12.2025 | 13.01.2026 |
| bdu:2025-16358 | Уязвимость компонента Netmonitor браузеров Mozilla Firefox, Firefox ESR и почтового клиен… | 26.12.2025 | 13.01.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202311-1677 | A user with a standard account in Fuji Electric Tellus Lite may overwrite files in the sy… | 2025-12-19T22:45:54.874000Z |
| var-202401-0453 | A vulnerability, which was classified as critical, was found in Totolink LR1200GB 9.1.0u.… | 2025-12-19T22:45:54.666000Z |
| var-202403-0961 | A vulnerability, which was classified as critical, was found in Tenda FH1205 2.0.0.7(775)… | 2025-12-19T22:45:54.351000Z |
| var-202403-3128 | Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the deviceId parameter f… | 2025-12-19T22:45:54.230000Z |
| var-202510-4397 | The Huawei HG532n is a SOHO-class wireless router designed for home users. The Huawei HG… | 2025-12-19T22:45:50.801000Z |
| var-202511-2374 | An authentication bypass vulnerability has been identified in the IFTTT integration featu… | 2025-12-19T22:45:50.451000Z |
| var-202310-2645 | TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow v… | 2025-12-19T22:44:45.429000Z |
| var-202511-2429 | A bug within some AMD CPUs could allow a local admin-privileged attacker to run a SEV-SNP… | 2025-12-19T22:44:10.458000Z |
| var-202512-0388 | A cross-site request forgery (csrf) vulnerability exists in the WEBVIEW-M functionality o… | 2025-12-19T22:44:10.012000Z |
| var-202512-0999 | In Modem, there is a possible out of bounds read due to a missing bounds check. This coul… | 2025-12-19T22:44:09.180000Z |
| var-202512-2043 | In Modem, there is a possible system crash due to an uncaught exception. This could lead … | 2025-12-19T22:44:08.641000Z |
| var-202209-1174 | TOTOLINK-720R v4.1.5cu.374 was discovered to contain a remote code execution (RCE) vulner… | 2025-12-19T22:41:19.163000Z |
| var-202512-0004 | A denial of service vulnerability exists in the Modbus TCP functionality of Socomec DIRIS… | 2025-12-19T22:41:07.988000Z |
| var-202512-0088 | A vulnerability was determined in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE90… | 2025-12-19T22:41:07.942000Z |
| var-202512-0340 | A buffer overflow vulnerability exists in the Modbus TCP functionality of Socomec DIRIS D… | 2025-12-19T22:41:07.717000Z |
| var-202512-1306 | Stack-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2. In th… | 2025-12-19T22:41:06.427000Z |
| var-202512-1579 | Heap-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2. In the… | 2025-12-19T22:41:06.284000Z |
| var-202208-2018 | TOTOLINK A720R V4.1.5cu.532_B20210610 was discovered to contain a hardcoded password for … | 2025-12-19T22:38:48.059000Z |
| var-202403-3021 | Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the urls parameter from … | 2025-12-19T22:38:44.714000Z |
| var-202510-0124 | An out-of-bounds read vulnerability exists in VS6ComFile!load_link_inf of V-SFT v6.2.7.0 … | 2025-12-19T22:38:41.384000Z |
| var-202511-0384 | A stack buffer overflow exists in the ToToLink A720R Router firmware V4.1.5cu.614_B202306… | 2025-12-19T22:38:41.131000Z |
| var-202511-2446 | A stack buffer overflow vulnerability has been identified in certain router models. An au… | 2025-12-19T22:38:40.870000Z |
| var-202512-0426 | A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.… | 2025-12-19T22:38:36.699000Z |
| var-202512-0468 | A vulnerability was identified in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE90… | 2025-12-19T22:38:36.674000Z |
| var-202512-1520 | In Modem, there is a possible system crash due to a missing bounds check. This could lead… | 2025-12-19T22:38:34.421000Z |
| var-202512-1753 | An improper neutralization of special elements used in an OS command ('OS Command Injecti… | 2025-12-19T22:38:34.295000Z |
| var-202401-0536 | A vulnerability, which was classified as critical, has been found in Totolink LR1200GB 9.… | 2025-12-19T22:35:31.035000Z |
| var-202403-3087 | Tenda F1202 v1.2.0.20(408) has a stack overflow vulnerability via the mitInterface parame… | 2025-12-19T22:35:30.358000Z |
| var-202512-0006 | A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functi… | 2025-12-19T22:35:25.234000Z |
| var-202512-0007 | A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functi… | 2025-12-19T22:35:25.218000Z |