Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40261 |
8.8 (3.1)
|
Composer has Command Injection via Malicious Perforce … |
composer |
composer |
2026-04-15T20:56:32.182Z | 2026-04-16T13:41:12.977Z |
| CVE-2026-40176 |
7.8 (3.1)
|
Composer is vulnerable to Command Injection via Malici… |
composer |
composer |
2026-04-15T20:47:39.839Z | 2026-04-16T14:16:39.968Z |
| CVE-2026-22676 |
8.5 (4.0)
7.8 (3.1)
|
Barracuda RMM < 2025.2.2 Privilege Escalation via Inse… |
Barracuda Networks |
RMM |
2026-04-15T20:45:23.918Z | 2026-04-16T12:05:01.880Z |
| CVE-2026-40173 |
9.4 (3.1)
|
Dgraph: Unauthenticated pprof endpoint leaks admin aut… |
dgraph-io |
dgraph |
2026-04-15T20:40:47.186Z | 2026-04-16T12:05:10.186Z |
| CVE-2026-40186 |
6.1 (3.1)
|
ApostropheCMS: sanitize-html allowedTags Bypass via En… |
apostrophecms |
apostrophe |
2026-04-15T20:15:12.333Z | 2026-04-16T14:15:41.275Z |
| CVE-2026-39857 |
5.3 (3.1)
|
Information Disclosure via `choices`/`counts` Query Pa… |
apostrophecms |
apostrophe |
2026-04-15T19:38:57.564Z | 2026-04-16T13:40:17.710Z |
| CVE-2026-35569 |
8.7 (3.1)
|
ApostropheCMS: Stored XSS in SEO Fields Leads to Authe… |
apostrophecms |
apostrophe |
2026-04-15T19:34:23.648Z | 2026-04-16T14:14:58.325Z |
| CVE-2026-33889 |
5.4 (3.1)
|
ApostropheCMS: Stored XSS via CSS Custom Property Inje… |
apostrophecms |
apostrophe |
2026-04-15T19:29:50.899Z | 2026-04-16T12:05:17.734Z |
| CVE-2026-33888 |
5.3 (3.1)
|
ApostropheCMS: publicApiProjection Bypass via `project… |
apostrophecms |
apostrophe |
2026-04-15T19:25:46.262Z | 2026-04-15T20:03:30.594Z |
| CVE-2026-21726 |
5.3 (3.1)
|
Loki Path Traversal - CVE-2021-36156 Bypass |
Grafana |
Loki |
2026-04-15T19:24:31.268Z | 2026-04-15T20:01:33.375Z |
| CVE-2026-6385 |
6.5 (3.1)
|
Ffmpeg: ffmpeg: denial of service and potential arbitr… |
Red Hat |
Lightspeed Core |
2026-04-15T19:18:39.354Z | 2026-04-15T20:01:15.671Z |
| CVE-2025-41118 |
9.1 (3.1)
|
Sensitive COS `SecretKey` exposed in plaintext via con… |
Grafana |
Pyroscope |
2026-04-15T19:15:17.689Z | 2026-04-15T19:33:10.329Z |
| CVE-2026-33877 |
3.7 (3.1)
|
ApostropheCMS: User Enumeration via Timing Side Channe… |
apostrophecms |
apostrophe |
2026-04-15T19:11:06.796Z | 2026-04-15T19:30:53.040Z |
| CVE-2026-6384 |
7.3 (3.1)
|
Gimp: gimp: arbitrary code execution or denial of serv… |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-04-15T19:09:10.587Z | 2026-04-16T03:56:19.004Z |
| CVE-2026-6364 |
6.5 (3.1)
|
Out of bounds read in Skia in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:59.385Z | 2026-04-16T13:53:06.236Z |
| CVE-2026-6319 |
7.5 (3.1)
|
Use after free in Payments in Google Chrome on An… |
Google |
Chrome |
2026-04-15T19:04:58.945Z | 2026-04-16T09:58:55.486Z |
| CVE-2026-6318 |
8.8 (3.1)
|
Use after free in Codecs in Google Chrome prior t… |
Google |
Chrome |
2026-04-15T19:04:58.495Z | 2026-04-16T09:58:26.278Z |
| CVE-2026-6363 |
8.8 (3.1)
|
Type Confusion in V8 in Google Chrome prior to 14… |
Google |
Chrome |
2026-04-15T19:04:57.982Z | 2026-04-16T03:55:45.999Z |
| CVE-2026-6317 |
8.8 (3.1)
|
Use after free in Cast in Google Chrome prior to … |
Google |
Chrome |
2026-04-15T19:04:57.557Z | 2026-04-16T03:55:47.518Z |
| CVE-2026-6362 |
6.3 (3.1)
|
Use after free in Codecs in Google Chrome prior t… |
Google |
Chrome |
2026-04-15T19:04:57.143Z | 2026-04-16T13:23:13.559Z |
| CVE-2026-6361 |
7.2 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome o… |
Google |
Chrome |
2026-04-15T19:04:56.740Z | 2026-04-16T10:00:46.711Z |
| CVE-2026-6316 |
8.8 (3.1)
|
Use after free in Forms in Google Chrome prior to… |
Google |
Chrome |
2026-04-15T19:04:56.345Z | 2026-04-16T03:55:49.002Z |
| CVE-2026-6315 |
8.8 (3.1)
|
Use after free in Permissions in Google Chrome on… |
Google |
Chrome |
2026-04-15T19:04:55.935Z | 2026-04-16T03:55:50.553Z |
| CVE-2026-6314 |
8.3 (3.1)
|
Out of bounds write in GPU in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:55.460Z | 2026-04-16T03:56:07.922Z |
| CVE-2026-6313 |
3.1 (3.1)
|
Insufficient policy enforcement in CORS in Google… |
Google |
Chrome |
2026-04-15T19:04:54.889Z | 2026-04-15T20:00:40.125Z |
| CVE-2026-6312 |
3.1 (3.1)
|
Insufficient policy enforcement in Passwords in G… |
Google |
Chrome |
2026-04-15T19:04:54.385Z | 2026-04-15T19:59:44.768Z |
| CVE-2026-6311 |
8.3 (3.1)
|
Uninitialized Use in Accessibility in Google Chro… |
Google |
Chrome |
2026-04-15T19:04:53.973Z | 2026-04-16T03:56:12.695Z |
| CVE-2026-6310 |
8.3 (3.1)
|
Use after free in Dawn in Google Chrome prior to … |
Google |
Chrome |
2026-04-15T19:04:53.589Z | 2026-04-16T03:56:06.808Z |
| CVE-2026-6360 |
8.8 (3.1)
|
Use after free in FileSystem in Google Chrome pri… |
Google |
Chrome |
2026-04-15T19:04:53.135Z | 2026-04-16T03:56:09.052Z |
| CVE-2026-6309 |
8.3 (3.1)
|
Use after free in Viz in Google Chrome prior to 1… |
Google |
Chrome |
2026-04-15T19:04:52.730Z | 2026-04-16T03:56:05.365Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40176 |
7.8 (3.1)
|
Composer is vulnerable to Command Injection via Malici… |
composer |
composer |
2026-04-15T20:47:39.839Z | 2026-04-16T14:16:39.968Z |
| CVE-2026-40173 |
9.4 (3.1)
|
Dgraph: Unauthenticated pprof endpoint leaks admin aut… |
dgraph-io |
dgraph |
2026-04-15T20:40:47.186Z | 2026-04-16T12:05:10.186Z |
| CVE-2026-22676 |
8.5 (4.0)
7.8 (3.1)
|
Barracuda RMM < 2025.2.2 Privilege Escalation via Inse… |
Barracuda Networks |
RMM |
2026-04-15T20:45:23.918Z | 2026-04-16T12:05:01.880Z |
| CVE-2026-6385 |
6.5 (3.1)
|
Ffmpeg: ffmpeg: denial of service and potential arbitr… |
Red Hat |
Lightspeed Core |
2026-04-15T19:18:39.354Z | 2026-04-15T20:01:15.671Z |
| CVE-2026-6384 |
7.3 (3.1)
|
Gimp: gimp: arbitrary code execution or denial of serv… |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-04-15T19:09:10.587Z | 2026-04-16T03:56:19.004Z |
| CVE-2026-6364 |
6.5 (3.1)
|
Out of bounds read in Skia in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:59.385Z | 2026-04-16T13:53:06.236Z |
| CVE-2026-6363 |
8.8 (3.1)
|
Type Confusion in V8 in Google Chrome prior to 14… |
Google |
Chrome |
2026-04-15T19:04:57.982Z | 2026-04-16T03:55:45.999Z |
| CVE-2026-6362 |
6.3 (3.1)
|
Use after free in Codecs in Google Chrome prior t… |
Google |
Chrome |
2026-04-15T19:04:57.143Z | 2026-04-16T13:23:13.559Z |
| CVE-2026-6361 |
7.2 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome o… |
Google |
Chrome |
2026-04-15T19:04:56.740Z | 2026-04-16T10:00:46.711Z |
| CVE-2026-6360 |
8.8 (3.1)
|
Use after free in FileSystem in Google Chrome pri… |
Google |
Chrome |
2026-04-15T19:04:53.135Z | 2026-04-16T03:56:09.052Z |
| CVE-2026-6359 |
8.8 (3.1)
|
Use after free in Video in Google Chrome on Windo… |
Google |
Chrome |
2026-04-15T19:04:48.203Z | 2026-04-16T03:55:55.574Z |
| CVE-2026-6358 |
8.8 (3.1)
|
Use after free in XR in Google Chrome on Android … |
Google |
Chrome |
2026-04-15T19:04:47.677Z | 2026-04-16T03:55:54.349Z |
| CVE-2026-6319 |
7.5 (3.1)
|
Use after free in Payments in Google Chrome on An… |
Google |
Chrome |
2026-04-15T19:04:58.945Z | 2026-04-16T09:58:55.486Z |
| CVE-2026-6318 |
8.8 (3.1)
|
Use after free in Codecs in Google Chrome prior t… |
Google |
Chrome |
2026-04-15T19:04:58.495Z | 2026-04-16T09:58:26.278Z |
| CVE-2026-6317 |
8.8 (3.1)
|
Use after free in Cast in Google Chrome prior to … |
Google |
Chrome |
2026-04-15T19:04:57.557Z | 2026-04-16T03:55:47.518Z |
| CVE-2026-6316 |
8.8 (3.1)
|
Use after free in Forms in Google Chrome prior to… |
Google |
Chrome |
2026-04-15T19:04:56.345Z | 2026-04-16T03:55:49.002Z |
| CVE-2026-6315 |
8.8 (3.1)
|
Use after free in Permissions in Google Chrome on… |
Google |
Chrome |
2026-04-15T19:04:55.935Z | 2026-04-16T03:55:50.553Z |
| CVE-2026-6314 |
8.3 (3.1)
|
Out of bounds write in GPU in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:55.460Z | 2026-04-16T03:56:07.922Z |
| CVE-2026-6313 |
3.1 (3.1)
|
Insufficient policy enforcement in CORS in Google… |
Google |
Chrome |
2026-04-15T19:04:54.889Z | 2026-04-15T20:00:40.125Z |
| CVE-2026-6312 |
3.1 (3.1)
|
Insufficient policy enforcement in Passwords in G… |
Google |
Chrome |
2026-04-15T19:04:54.385Z | 2026-04-15T19:59:44.768Z |
| CVE-2026-6311 |
8.3 (3.1)
|
Uninitialized Use in Accessibility in Google Chro… |
Google |
Chrome |
2026-04-15T19:04:53.973Z | 2026-04-16T03:56:12.695Z |
| CVE-2026-6310 |
8.3 (3.1)
|
Use after free in Dawn in Google Chrome prior to … |
Google |
Chrome |
2026-04-15T19:04:53.589Z | 2026-04-16T03:56:06.808Z |
| CVE-2026-6309 |
8.3 (3.1)
|
Use after free in Viz in Google Chrome prior to 1… |
Google |
Chrome |
2026-04-15T19:04:52.730Z | 2026-04-16T03:56:05.365Z |
| CVE-2026-6308 |
7.5 (3.1)
|
Out of bounds read in Media in Google Chrome prio… |
Google |
Chrome |
2026-04-15T19:04:52.265Z | 2026-04-16T09:57:13.931Z |
| CVE-2026-6307 |
8.8 (3.1)
|
Type Confusion in Turbofan in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:51.835Z | 2026-04-16T03:55:59.049Z |
| CVE-2026-6306 |
8.8 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome p… |
Google |
Chrome |
2026-04-15T19:04:51.372Z | 2026-04-16T09:56:40.048Z |
| CVE-2026-6305 |
8.8 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome p… |
Google |
Chrome |
2026-04-15T19:04:50.926Z | 2026-04-16T03:56:17.490Z |
| CVE-2026-6304 |
8.3 (3.1)
|
Use after free in Graphite in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:50.503Z | 2026-04-16T03:56:03.915Z |
| CVE-2026-6303 |
8.8 (3.1)
|
Use after free in Codecs in Google Chrome prior t… |
Google |
Chrome |
2026-04-15T19:04:50.052Z | 2026-04-16T09:57:48.474Z |
| CVE-2026-6302 |
8.8 (3.1)
|
Use after free in Video in Google Chrome prior to… |
Google |
Chrome |
2026-04-15T19:04:49.608Z | 2026-04-16T03:56:00.581Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-gc9w-cc93-rjv8 |
9.1 (3.1)
|
Froxlor has a PHP Code Injection via Unescaped Single Quotes in userdata.inc.php Generation (MysqlS… | 2026-04-16T00:50:00Z | 2026-04-16T00:50:00Z |
| ghsa-47hf-23pw-3m8c |
8.5 (3.1)
|
Froxlor has a BIND Zone File Injection via Unsanitized DNS Record Content in DomainZones::add() | 2026-04-16T00:47:26Z | 2026-04-16T00:47:26Z |
| ghsa-75h4-c557-j89r |
7.5 (3.1)
|
Froxlor has Incomplete Symlink Validation in DataDump.add() Allows Arbitrary Directory Ownership Ta… | 2026-04-16T00:47:18Z | 2026-04-16T00:47:18Z |
| ghsa-vmjj-qr7v-pxm6 |
5.0 (3.1)
|
Froxlor has an Email Sender Alias Domain Ownership Bypass via Wrong Array Index Allows Cross-Custom… | 2026-04-16T00:47:05Z | 2026-04-16T00:47:05Z |
| ghsa-jvx4-xv3m-hrj4 |
5.4 (3.1)
|
Froxlor has a Reseller Domain Quota Bypass via Unvalidated adminid Parameter in Domains.add() | 2026-04-16T00:46:47Z | 2026-04-16T00:46:47Z |
| ghsa-39q2-94rc-95cp |
5.3 (4.0)
|
DOMPurify's ADD_TAGS function form bypasses FORBID_TAGS due to short-circuit evaluation | 2026-04-16T00:46:35Z | 2026-04-16T00:46:35Z |
| ghsa-xm65-r32w-c46p |
6.5 (3.1)
|
Out of bounds read in Skia in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to ob… | 2026-04-15T21:30:19Z | 2026-04-16T15:31:32Z |
| ghsa-xhc9-2rpq-wh58 |
8.3 (3.1)
|
Use after free in Dawn in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had c… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-wrr6-q4vw-3g77 |
8.8 (3.1)
|
Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to exec… | 2026-04-15T21:30:19Z | 2026-04-16T12:31:39Z |
| ghsa-vm22-5c7q-8w8h |
8.3 (3.1)
|
Use after free in Viz in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had co… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-vhh6-f54w-x5gw |
8.3 (3.1)
|
Uninitialized Use in Accessibility in Google Chrome on Windows prior to 147.0.7727.101 allowed a re… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-qwmx-478f-c8cp |
8.8 (3.1)
|
Use after free in Video in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execu… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-qhxw-36rq-x2m4 |
8.3 (3.1)
|
Use after free in Graphite in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who h… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-qh37-w9pg-j55f |
7.3 (3.1)
|
A flaw was found in gimp. This buffer overflow vulnerability in the GIF image loading component's `… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-qg3c-xm7q-9c4x |
3.1 (3.1)
|
Insufficient policy enforcement in Passwords in Google Chrome prior to 147.0.7727.101 allowed a rem… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-qcvg-hwr7-r9v7 |
3.1 (3.1)
|
Insufficient policy enforcement in CORS in Google Chrome prior to 147.0.7727.101 allowed a remote a… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-q6m3-mcr7-qwwq |
7.5 (3.1)
|
Out of bounds read in Media in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who … | 2026-04-15T21:30:19Z | 2026-04-16T12:31:40Z |
| ghsa-q4f4-mqcx-4prx |
8.3 (3.1)
|
Out of bounds write in GPU in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who h… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-q22x-99q7-fr6w |
6.5 (3.1)
|
A flaw was found in FFmpeg. A remote attacker could exploit this vulnerability by providing a speci… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-p824-jmv3-c7rj |
8.8 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed a remote attacker t… | 2026-04-15T21:30:19Z | 2026-04-16T12:31:40Z |
| ghsa-mvj2-3qfg-7mxp |
8.8 (3.1)
|
Type Confusion in V8 in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentia… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-m8qq-h68v-7p42 |
8.8 (3.1)
|
Use after free in Cast in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execut… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-j7wg-hx8x-r38h |
8.8 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed a remote attacker t… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-hmgp-8pgg-h7pp |
8.8 (3.1)
|
Use after free in Permissions in Google Chrome on Android prior to 147.0.7727.101 allowed a remote … | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-hh8m-xqf2-mgfv |
8.8 (3.1)
|
Use after free in FileSystem in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to … | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-gjmf-r9m5-967q |
8.8 (3.1)
|
Use after free in XR in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker … | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-g6hr-fwwc-8cg8 |
7.8 (3.1)
8.5 (4.0)
|
Barracuda RMM versions prior to 2025.2.2 contain a privilege escalation vulnerability that allows l… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-fmvf-422w-w34q |
8.8 (3.1)
|
Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to exec… | 2026-04-15T21:30:19Z | 2026-04-16T12:31:40Z |
| ghsa-f4mv-qxg4-7wq3 |
6.3 (3.1)
|
Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to pote… | 2026-04-15T21:30:19Z | 2026-04-16T15:31:32Z |
| ghsa-6r59-54c6-3757 |
8.8 (3.1)
|
Use after free in Forms in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execu… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-198 |
4.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:11+00:00 | 2025-01-19T16:22:57.845317+00:00 |
| pysec-2024-214 |
5.4 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T22:22:23.399444+00:00 |
| pysec-2024-213 |
6.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T22:22:23.310301+00:00 |
| pysec-2024-197 |
5.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T16:22:57.732726+00:00 |
| pysec-2024-196 |
8.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T16:22:57.640183+00:00 |
| pysec-2024-168 |
6.5 (3.1)
|
Taipy is an open-source Python library for easy, end-to-end application development for d… | taipy | 2024-10-09T19:15:14+00:00 | 2025-01-18T19:19:07.718423+00:00 |
| pysec-2024-109 |
7.8 (3.1)
|
DeepSpeed Remote Code Execution Vulnerability | deepspeed | 2024-10-08T18:15:00+00:00 | 2024-10-17T23:22:43.000269+00:00 |
| pysec-2024-102 |
|
An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.… | django | 2024-10-08T16:15:00+00:00 | 2024-10-08T19:19:01.400873+00:00 |
| pysec-2024-121 |
6.5 (3.1)
|
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from… | openc3 | 2024-10-02T20:15:00+00:00 | 2024-11-13T20:22:56.434107+00:00 |
| pysec-2024-101 |
6.5 (3.1)
|
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from… | openc3 | 2024-10-02T20:15:00+00:00 | 2024-10-08T17:22:06.539206+00:00 |
| pysec-2024-100 |
6.1 (3.1)
|
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from… | openc3 | 2024-10-02T20:15:00+00:00 | 2024-10-08T17:22:06.493109+00:00 |
| pysec-2024-186 |
6.5 (3.1)
|
RestrictedPython is a restricted execution environment for Python to run untrusted code. … | restrictedpython | 2024-09-30T16:15:09+00:00 | 2025-01-19T04:23:01.259448+00:00 |
| pysec-2024-171 |
8.0 (3.1)
|
Strawberry GraphQL is a library for creating GraphQL APIs. Prior to version 0.243.0, mult… | strawberry-graphql | 2024-09-25T18:15:05+00:00 | 2025-01-18T22:21:43.412172+00:00 |
| pysec-2024-99 |
7.5 (3.1)
|
OpenSlides 4.0.15 was discovered to be using a weak hashing algorithm to store passwords. | openslides | 2024-09-25T15:15:00+00:00 | 2024-10-01T21:22:35.777428+00:00 |
| pysec-2024-96 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-string | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:56.151249+00:00 |
| pysec-2024-95 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-os-path | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:56.045949+00:00 |
| pysec-2024-94 |
8.1 (3.1)
|
A vulnerability was found in MicroPython 1.22.2. It has been declared as critical. Affect… | micropython-io | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.930133+00:00 |
| pysec-2024-93 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-io | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.864558+00:00 |
| pysec-2024-92 |
8.1 (3.1)
|
A vulnerability was found in MicroPython 1.22.2. It has been declared as critical. Affect… | micropython-copy | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.787891+00:00 |
| pysec-2024-91 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-copy | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.729708+00:00 |
| pysec-2024-89 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected … | micropython-os | 2024-09-17T19:15:00+00:00 | 2024-09-23T21:22:09.689786+00:00 |
| pysec-2024-88 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected … | micropython-io | 2024-09-17T19:15:00+00:00 | 2024-09-23T21:22:09.570550+00:00 |
| pysec-2024-87 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected … | micropython-copy | 2024-09-17T19:15:00+00:00 | 2024-09-23T21:22:09.445188+00:00 |
| pysec-2024-85 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-03-03T16:29:37.848846Z |
| pysec-2024-84 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.3.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-03-03T16:29:37.756762Z |
| pysec-2024-83 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-03-03T16:29:37.662671Z |
| pysec-2024-82 |
8.8 (3.1)
|
Deserialization of untrusted data can occur in versions 23.3.2.0 and newer of the MindsDB… | mindsdb | 2024-09-12T13:15:00Z | 2026-03-03T16:29:37.563380Z |
| pysec-2024-81 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:05.004524+00:00 |
| pysec-2024-80 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.922906+00:00 |
| pysec-2024-79 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.841635+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2699 | Malicious code in robase-api (PyPI) | 2026-04-16T07:06:16Z | 2026-04-16T07:06:16Z |
| mal-2026-2697 | Malicious code in ccxt-telemetry (PyPI) | 2026-04-15T20:02:13Z | 2026-04-15T20:02:13Z |
| mal-2026-2698 | Malicious code in kyleip (PyPI) | 2026-04-15T19:50:37Z | 2026-04-15T19:50:37Z |
| mal-2026-2696 | Malicious code in bfx-hf-strategy-perf (npm) | 2026-04-15T18:25:54Z | 2026-04-15T18:25:54Z |
| mal-2026-2695 | Malicious code in cpu-optimizers2-33 (PyPI) | 2026-04-15T16:48:54Z | 2026-04-15T16:48:54Z |
| mal-2026-2694 | Malicious code in cpu-optimizers (PyPI) | 2026-04-15T16:18:21Z | 2026-04-15T16:18:21Z |
| mal-2026-2693 | Malicious code in vs-supplier-portal-web (npm) | 2026-04-15T14:57:24Z | 2026-04-15T14:57:25Z |
| mal-2026-2692 | Malicious code in fusion-events (npm) | 2026-04-15T14:57:24Z | 2026-04-15T14:57:25Z |
| mal-2026-2691 | Malicious code in base-counter-web (npm) | 2026-04-15T14:57:24Z | 2026-04-15T14:57:25Z |
| mal-2026-2690 | Malicious code in @pnc-ref/harmony-support-v18 (npm) | 2026-04-15T14:19:35Z | 2026-04-15T14:19:42Z |
| mal-2026-2689 | Malicious code in @pnc-ref/harmony-core-v18 (npm) | 2026-04-15T14:19:35Z | 2026-04-15T14:19:36Z |
| mal-2026-2688 | Malicious code in @pnc-cib/cib-core-lib (npm) | 2026-04-15T14:19:35Z | 2026-04-15T14:19:42Z |
| mal-2026-2687 | Malicious code in com.baogong.app_push_permission (npm) | 2026-04-15T13:49:47Z | 2026-04-15T13:49:48Z |
| mal-2026-2685 | Malicious code in react-dom-19 (npm) | 2026-04-15T13:21:15Z | 2026-04-15T13:40:58Z |
| mal-2026-2686 | Malicious code in neverinstallme (PyPI) | 2026-04-15T13:10:53Z | 2026-04-15T13:10:53Z |
| mal-2026-2684 | Malicious code in tensorzero-node (npm) | 2026-04-15T10:55:56Z | 2026-04-15T15:43:53Z |
| mal-2026-2683 | Malicious code in @athena-ui-components/axios (npm) | 2026-04-15T09:40:47Z | 2026-04-15T09:40:47Z |
| mal-2026-2681 | Malicious code in @athena-ui-components/dashboard-widget (npm) | 2026-04-15T09:00:54Z | 2026-04-15T09:00:54Z |
| mal-2026-2682 | Malicious code in @athena-ui-components/deeplink (npm) | 2026-04-15T09:00:45Z | 2026-04-15T09:00:45Z |
| mal-2026-2680 | Malicious code in @veygo/component-library (npm) | 2026-04-15T03:25:57Z | 2026-04-15T03:25:57Z |
| mal-2026-2679 | Malicious code in snitz-chief-cloud-config (npm) | 2026-04-15T03:12:05Z | 2026-04-15T03:12:06Z |
| mal-2026-2678 | Malicious code in snitz-chief-cloud (npm) | 2026-04-15T03:12:05Z | 2026-04-15T03:12:05Z |
| mal-2026-2677 | Malicious code in pdf-linker (npm) | 2026-04-15T03:12:05Z | 2026-04-15T03:12:05Z |
| mal-2026-2676 | Malicious code in moscova-plural-json-parser (npm) | 2026-04-15T03:12:05Z | 2026-04-15T03:12:06Z |
| mal-2026-2674 | Malicious code in chief-proxy-out (npm) | 2026-04-15T03:12:05Z | 2026-04-15T03:12:06Z |
| mal-2026-2673 | Malicious code in chief-documentation (npm) | 2026-04-15T03:12:05Z | 2026-04-15T03:12:05Z |
| mal-2026-2675 | Malicious code in mongoose-stamps (npm) | 2026-04-15T03:07:56Z | 2026-04-15T03:07:57Z |
| mal-2026-2672 | Malicious code in ahmed_salem_ph (npm) | 2026-04-15T03:02:45Z | 2026-04-15T03:02:45Z |
| mal-2026-2671 | Malicious code in kryptex-os (PyPI) | 2026-04-14T21:55:34Z | 2026-04-14T21:55:34Z |
| mal-2026-2670 | Malicious code in 7miners (PyPI) | 2026-04-14T21:55:03Z | 2026-04-14T21:55:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0626 | Flowise: Mehrere Schwachstellen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0625 | Mattermost: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-03-05T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0624 | FasterXML Jackson: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und potenziell Denial of Service | 2026-03-05T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0623 | Gogs: Mehrere Schwachstellen | 2026-03-05T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0622 | Keycloak: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2026-03-05T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0621 | DriveLock: Mehrere Schwachstellen | 2026-03-05T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0620 | Acronis Cyber Protect und Cyber Protect Cloud Agent: Mehrere Schwachstellen | 2026-03-05T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0619 | SmarterTools SmarterMail: Mehrere Schwachstellen | 2026-03-05T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0618 | Avira Internet Security Suite: Mehrere Schwachstellen | 2026-03-05T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0616 | Microsoft Azure (ACI Confidential Containers): Mehrere Schwachstellen | 2026-03-05T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0615 | Red Hat Enterprise Linux (nfs-utils): Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-05T23:00:00.000+00:00 | 2026-03-09T23:00:00.000+00:00 |
| wid-sec-w-2026-0614 | Linux Kernel: Mehrere Schwachstellen | 2026-03-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0613 | Octopus Deploy: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-04T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0612 | Google Chrome: Mehrere Schwachstellen | 2026-03-04T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0611 | Eclipse Jetty: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-04T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0610 | Cisco Secure Firewall Management Center: Mehrere Schwachstellen | 2026-03-04T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0609 | ATOSS Staff Efficiency Suite: Mehrere Schwachstellen | 2026-03-04T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0608 | Cisco ASA (Adaptive Security Appliance), Secure Firewall Threat Defense, Cisco IOS XE und Cisco Meraki MX: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-03-04T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0607 | CPython: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-04T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0606 | Checkmk: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2026-03-04T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0605 | Cisco Secure Firewall Threat Defense: Mehrere Schwachstellen | 2026-03-04T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0604 | Eclipse Jetty: Schwachstelle ermöglicht Denial of Service | 2026-03-04T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0603 | Cisco ASA (Adaptive Security Appliance) und Secure Firewall Threat Defense: Mehrere Schwachstellen | 2026-03-04T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0602 | OpenBSD: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2026-03-04T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0601 | Cisco ASA (Adaptive Security Appliance): Mehrere Schwachstellen | 2026-03-04T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0600 | xwiki Blog Application: Schwachstelle ermöglicht Cross-Site Scripting | 2026-03-04T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0599 | Drupal Extensions: Mehrere Schwachstellen | 2026-03-04T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0598 | Cisco WebEx: Schwachstelle ermöglicht Cross-Site Scripting | 2026-03-04T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0597 | NetApp Data ONTAP: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-04T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0596 | Checkmk: Schwachstelle ermöglicht Denial of Service | 2026-03-04T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| va-26-008-01 | OPEXUS eCASE | 2026-01-08T16:36:15Z | 2026-01-08T16:36:15Z |
| va-26-008-03 | Ideagen DevonWay stored XSS | 2026-01-08T00:00:00Z | 2026-01-08T00:00:00Z |
| va-26-008-02 | OPEXUS eComplaint and eCasePortal IDOR | 2026-01-07T16:35:11Z | 2026-01-07T16:35:11Z |
| icsa-26-006-01 | Columbia Weather Systems MicroServer | 2026-01-06T07:00:00.000000Z | 2026-01-06T07:00:00.000000Z |
| icsma-25-364-01 | WHILL Model C2 Electric Wheelchairs and Model F Power Chairs (Update A) | 2025-12-30T07:00:00.000000Z | 2026-03-24T06:00:00.000000Z |
| icsa-25-352-08 | Axis Communications Camera Station Pro, Camera Station, and Device Manager (Update B) | 2025-12-18T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-25-352-07 | Rockwell Automation Micro820, Micro850, Micro870 | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-06 | Advantech WebAccess/SCADA | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-04 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electrics Products | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-03 | National Instruments LabView | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-01 | Inductive Automation Ignition | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| va-25-352-01 | BullWall Ransomware Containment and Server Intrusion Protection multiple vulnerabilities | 2025-12-18T00:00:00Z | 2025-12-18T00:00:00Z |
| icsa-25-350-04 | Mitsubishi Electric GT Designer3 | 2025-12-16T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-25-350-03 | Hitachi Energy AFS, AFR and AFF Series | 2025-12-16T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-25-350-02 | Johnson Controls PowerG, IQPanel and IQHub (Update A) | 2025-12-16T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| icsa-25-350-01 | Güralp Systems Fortimus Series, Minimus Series, and Certimus Series | 2025-12-16T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| va-25-345-01 | CISA Software Acquisition Guide Supplier Response Web Tool XSS | 2025-12-12T20:27:47Z | 2025-12-12T20:27:47Z |
| icsma-25-345-02 | Varex Imaging Panoramic Dental Imaging Software | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| icsma-25-345-01 | Grassroots DICOM (GDCM) | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| icsa-25-345-10 | OpenPLC_V3 (Update A) | 2025-12-11T07:00:00.000000Z | 2026-04-09T06:00:00.000000Z |
| icsa-25-345-03 | AzeoTech DAQFactory (Update A) | 2025-12-11T07:00:00.000000Z | 2026-01-12T07:00:00.000000Z |
| icsa-25-345-02 | Johnson Controls iSTAR Ultra | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| icsa-25-345-01 | Johnson Controls iSTAR | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| va-25-343-01 | Windscribe for Linux 'changeMTU' local privilege escalation | 2025-12-10T16:46:41Z | 2025-12-10T16:46:41Z |
| icsa-26-020-01 | Schneider Electric EcoStruxure Foxboro DCS (Update A) | 2025-12-09T08:00:00.000000Z | 2026-02-24T06:00:00.000000Z |
| icsa-25-352-02 | Schneider Electric EcoStruxure Foxboro DCS Advisor | 2025-12-09T08:00:00.000000Z | 2025-12-18T18:23:06.311869Z |
| icsa-25-343-01 | Universal Boot Loader (U-Boot) (Update A) | 2025-12-09T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| icsa-25-343-03 | Multiple India-based CCTV Cameras (Update A)** | 2025-12-09T06:00:00.000000Z | 2026-02-05T06:00:00.000000Z |
| icsa-26-043-03 | Siemens COMOS | 2025-12-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-015-12 | Siemens SIMATIC CN 4100 | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-epni-arb-file-upload-jjdm2p83 | Cisco Evolved Programmable Network Manager Arbitrary File Upload Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-cucm-csrf-w762pryd | Cisco Unified Communications Manager Cross-Site Request Forgery Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-ucs-xss-ey6xhyps | Cisco UCS Manager Software Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-vkvmorv-cnkrv7hk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Open Redirect Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-multi-cmdinj-e4ukjyrz | Cisco UCS Manager Software Command Injection Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-kvmsxss-6h7anuyk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxospc-pim6-vg4jfph | Cisco Nexus 3000 and 9000 Series Switches Protocol Independent Multicast Version 6 Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-infodis-tectysfg | Cisco NX-OS Software Sensitive Log Information Disclosure Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-cmdinj-qhnze5ss | Cisco NX-OS Software Command Injection Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nshs-urapi-gjubvfpu | Cisco Nexus Dashboard and Nexus Dashboard Fabric Controller Unauthorized REST API Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nd-ptrs-xu2fm2wb | Cisco Nexus Dashboard Path Traversal Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-n39k-isis-dos-jhja8rfx | Cisco Nexus 3000 and 9000 Series Switches Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-pi-epnm-tet4gxbx | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Sensitive Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-ise-file-upload-qksx6c8g | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:43:01+00:00 |
| cisco-sa-authproxlog-sxczxq63 | Cisco Duo Authentication Proxy Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-ftd-ravpn-geobypass-9h38m37z | Cisco Secure Firewall Threat Defense Software Geolocation Remote Access VPN Bypass Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-ftd-dos-svkhtjgt | Cisco Secure Firewall Threat Defense Software Snort 3 Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fp2k-ipsec-dos-tjwgdzco | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 2100 Series IPv6 over IPsec Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-09T21:22:34+00:00 |
| cisco-sa-fmc-xss-jtnmcusp | Cisco Secure Firewall Management Center Software Cross-Site Scripting Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-xpathinj-corthdmb | Cisco Secure Firewall Management Center Software XPATH Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-radius-rce-tnbkf79 | Cisco Secure Firewall Management Center Software RADIUS Remote Code Execution Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-html-inj-mqjrzrny | Cisco Secure Firewall Management Center Software HTML Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-ftd-cmdinj-phe7kmt | Cisco Secure Firewall Management Center and Secure Firewall Threat Defense Software Command Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-hcrlpfyn | Cisco Secure Firewall Management Center Software Command Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-authz-bypass-m7xhnau | Cisco Secure Firewall Management Center Software Authorization Bypass Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpnwebs-dos-hjbhmbsx | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access VPN Web Server Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpn-dos-mfpeka6e | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-ssltls-dos-ehw76vze | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software SSL/TLS Certificate Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-19T16:32:05+00:00 |
| cisco-sa-asaftd-nat-dns-dos-bqhynhtm | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Network Address Translation DNS Inspection Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-http-file-huyx2jl4 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Server Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-26184 | Windows Projected File System Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26183 | Remote Access Management service/API (RPC server) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26182 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26181 | Microsoft Brokering File System Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26180 | Windows Kernel Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26179 | Windows Kernel Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26178 | Windows Advanced Rasterization Platform Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26177 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26176 | Windows Client Side Caching driver (csc.sys) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26175 | Windows Boot Manager Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26174 | Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26173 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26172 | Windows Push Notifications Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26171 | .NET Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26170 | PowerShell Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26169 | Windows Kernel Memory Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26168 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26167 | Windows Push Notifications Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26166 | Windows Shell Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26165 | Windows Shell Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26163 | Windows Kernel Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26162 | Windows OLE Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26161 | Windows Sensor Data Service Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26160 | Remote Desktop Licensing Service Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26159 | Remote Desktop Licensing Service Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26156 | Windows Hyper-V Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26155 | Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26154 | Windows Server Update Service (WSUS) Tampering Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26153 | Windows Encrypted File System (EFS) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26152 | Microsoft Cryptographic Services Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0001 | Kwetsbaarheden verholpen in Hanwha camera systemen | 2026-01-08T12:28:21.446188Z | 2026-01-08T12:28:21.446188Z |
| ncsc-2025-0405 | Kwetsbaarheid verholpen in Roundcube Webmail | 2025-12-31T14:29:26.821576Z | 2025-12-31T14:29:26.821576Z |
| ncsc-2025-0404 | Kwetsbaarheid verholpen in SmarterMail | 2025-12-31T14:19:01.847364Z | 2025-12-31T14:19:01.847364Z |
| ncsc-2025-0403 | Kwetsbaarheden verholpen in QNAP besturingssystemen | 2025-12-29T09:17:28.385450Z | 2025-12-29T09:17:28.385450Z |
| ncsc-2025-0402 | Kwetsbaarheid verholpen in MongoDB | 2025-12-27T11:38:11.514349Z | 2025-12-27T11:38:11.514349Z |
| ncsc-2025-0401 | Kwetsbaarheden verholpen in Foxit PDF Reader | 2025-12-24T09:14:56.590353Z | 2025-12-24T09:14:56.590353Z |
| ncsc-2025-0400 | Kwetsbaarheid verholpen in WatchGuard Firebox | 2025-12-19T11:16:01.438518Z | 2025-12-19T11:16:01.438518Z |
| ncsc-2025-0399 | Kwetsbaarheid verholpen in HPE OneView Software | 2025-12-18T18:38:20.794784Z | 2025-12-24T11:29:46.123674Z |
| ncsc-2025-0398 | Kwetsbaarheid in Cisco AsyncOS | 2025-12-17T19:47:00.346651Z | 2025-12-17T19:47:00.346651Z |
| ncsc-2025-0397 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-12-15T09:08:39.804149Z | 2025-12-15T09:08:39.804149Z |
| ncsc-2025-0396 | Kwetsbaarheden verholpen in Apple macOS | 2025-12-15T09:06:36.450655Z | 2025-12-15T09:06:36.450655Z |
| ncsc-2025-0395 | Kwetsbaarheden verholpen in SAP Software | 2025-12-12T09:29:08.429888Z | 2025-12-12T09:29:08.429888Z |
| ncsc-2025-0394 | Kwetsbaarheden verholpen in React Server Components | 2025-12-12T09:04:19.324080Z | 2025-12-12T10:46:34.688189Z |
| ncsc-2025-0393 | Kwetsbaarheid verholpen in GeoServer | 2025-12-12T08:12:18.831044Z | 2025-12-12T09:02:27.681292Z |
| ncsc-2025-0392 | Kwetsbaarheid verholpen in Barracuda Service Center | 2025-12-11T13:53:23.819008Z | 2025-12-11T13:53:23.819008Z |
| ncsc-2025-0391 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2025-12-11T13:51:55.178462Z | 2025-12-11T13:51:55.178462Z |
| ncsc-2025-0390 | Kwetsbaarheden verholpen in GitLab CE/EE | 2025-12-11T09:22:54.841848Z | 2025-12-11T09:22:54.841848Z |
| ncsc-2025-0389 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-12-10T14:59:57.911864Z | 2025-12-10T14:59:57.911864Z |
| ncsc-2025-0388 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-12-10T13:35:58.314547Z | 2025-12-10T13:35:58.314547Z |
| ncsc-2025-0387 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2025-12-10T13:34:08.908897Z | 2025-12-10T13:34:08.908897Z |
| ncsc-2025-0386 | Kwetsbaarheden verholpen in Fortinet producten | 2025-12-10T09:51:34.918202Z | 2026-01-28T15:46:10.814803Z |
| ncsc-2025-0385 | Kwetsbaarheden verholpen in Microsoft Exchange | 2025-12-09T18:42:32.332749Z | 2025-12-09T18:42:32.332749Z |
| ncsc-2025-0384 | Kwetsbaarheden verholpen in Microsoft Office | 2025-12-09T18:40:33.839342Z | 2025-12-09T18:40:33.839342Z |
| ncsc-2025-0383 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-12-09T18:39:18.152251Z | 2025-12-09T18:39:18.152251Z |
| ncsc-2025-0382 | Kwetsbaarheden verholpen in Siemens producten | 2025-12-09T13:15:05.391966Z | 2025-12-09T13:15:05.391966Z |
| ncsc-2025-0381 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2025-12-08T08:23:21.965599Z | 2025-12-08T08:23:21.965599Z |
| ncsc-2025-0380 | Kwetsbaarheden verholpen in React Server Components | 2025-12-03T20:11:57.728117Z | 2025-12-05T12:13:36.590522Z |
| ncsc-2025-0379 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-12-02T13:25:17.745981Z | 2025-12-02T13:25:17.745981Z |
| ncsc-2025-0378 | Kwetsbaarheden verholpen in Mattermost | 2025-11-28T09:53:42.334621Z | 2025-11-28T09:53:42.334621Z |
| ncsc-2025-0377 | Kwetsbaarheden verholpen in GitLab | 2025-11-27T13:35:09.121804Z | 2025-11-27T13:35:09.121804Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10374-1 | python311-tornado6-6.5.5-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:10373-1 | python311-simpleeval-1.0.5-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:10372-1 | python311-black-26.3.1-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:10371-1 | curl-8.19.0-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:20357-1 | Security update for qemu | 2026-03-13T10:47:15Z | 2026-03-13T10:47:15Z |
| opensuse-su-2026:20354-1 | Security update for libsoup2 | 2026-03-13T08:41:04Z | 2026-03-13T08:41:04Z |
| opensuse-su-2026:10370-1 | smb4k-4.0.5-1.2 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10369-1 | skaffold-2.18.0-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10368-1 | ruby4.0-rubygem-websocket-extensions-0.1.5-1.24 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10367-1 | ruby4.0-rubygem-web-console-4.2.1-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10366-1 | ruby4.0-rubygem-thor-1.4.0-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10365-1 | ruby4.0-rubygem-sprockets-3.7-3.7.5-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10364-1 | ruby4.0-rubygem-sprockets-4.2.1-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10363-1 | ruby4.0-rubygem-rubyzip-2.3.2-1.19 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10362-1 | ruby4.0-rubygem-railties-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10361-1 | ruby4.0-rubygem-rails-html-sanitizer-1.6.0-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10360-1 | ruby4.0-rubygem-rails-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10359-1 | ruby4.0-rubygem-rack-session-2.1.1-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10358-1 | ruby4.0-rubygem-rack-3.1.18-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10357-1 | ruby4.0-rubygem-puma-6.4.3-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10356-1 | ruby4.0-rubygem-nokogiri-1.18.9-1.4 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10355-1 | ruby4.0-rubygem-multi_xml-0.6.0-1.31 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10354-1 | ruby4.0-rubygem-minitar-0.9-1.21 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10353-1 | ruby4.0-rubygem-loofah-2.23.1-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10352-1 | ruby4.0-rubygem-kramdown-2.4.0-1.17 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10351-1 | ruby4.0-rubygem-json_pure-2.7.6-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10350-1 | ruby4.0-rubygem-jquery-rails-4.6.0-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10349-1 | ruby4.0-rubygem-http-cookie-1.0.8-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10348-1 | ruby4.0-rubygem-grpc-1.70.1-1.7 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10347-1 | ruby4.0-rubygem-globalid-1.2.1-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:6762 | Red Hat Security Advisory: Red Hat AI Inference Server 3.2.2 (ROCm) | 2026-04-07T08:45:04+00:00 | 2026-04-08T13:34:47+00:00 |
| rhsa-2026:6761 | Red Hat Security Advisory: Red Hat AI Inference Server Model Optimization Tools 3.2.2 (CUDA) | 2026-04-07T08:44:07+00:00 | 2026-04-08T13:34:49+00:00 |
| rhsa-2026:6750 | Red Hat Security Advisory: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update | 2026-04-07T08:25:32+00:00 | 2026-04-14T06:25:53+00:00 |
| rhsa-2026:6738 | Red Hat Security Advisory: gnutls security update | 2026-04-07T08:14:17+00:00 | 2026-04-09T20:36:56+00:00 |
| rhsa-2026:6737 | Red Hat Security Advisory: gnutls security update | 2026-04-07T08:03:13+00:00 | 2026-04-09T20:36:58+00:00 |
| rhsa-2026:6743 | Red Hat Security Advisory: freerdp security update | 2026-04-07T07:47:22+00:00 | 2026-04-14T07:11:28+00:00 |
| rhsa-2026:6736 | Red Hat Security Advisory: vim security update | 2026-04-07T07:05:02+00:00 | 2026-04-13T14:52:22+00:00 |
| rhsa-2026:6731 | Red Hat Security Advisory: vim security update | 2026-04-07T06:48:02+00:00 | 2026-04-13T14:52:21+00:00 |
| rhsa-2026:6729 | Red Hat Security Advisory: vim security update | 2026-04-07T06:25:37+00:00 | 2026-04-13T14:52:21+00:00 |
| rhsa-2026:6727 | Red Hat Security Advisory: freerdp security update | 2026-04-07T06:25:32+00:00 | 2026-04-14T07:11:28+00:00 |
| rhsa-2026:6730 | Red Hat Security Advisory: vim security update | 2026-04-07T06:20:17+00:00 | 2026-04-13T14:52:22+00:00 |
| rhsa-2026:6725 | Red Hat Security Advisory: vim security update | 2026-04-07T01:58:27+00:00 | 2026-04-13T14:52:20+00:00 |
| rhsa-2026:6720 | Red Hat Security Advisory: Red Hat Quay 3.12.16 | 2026-04-06T22:57:46+00:00 | 2026-04-14T06:51:11+00:00 |
| rhsa-2026:6713 | Red Hat Security Advisory: ImageMagick security update | 2026-04-06T18:57:01+00:00 | 2026-04-06T22:26:28+00:00 |
| rhsa-2026:6712 | Red Hat Security Advisory: freerdp security update | 2026-04-06T18:44:31+00:00 | 2026-04-09T14:38:12+00:00 |
| rhsa-2026:6692 | Red Hat Security Advisory: kernel security update | 2026-04-06T16:24:30+00:00 | 2026-04-08T19:38:57+00:00 |
| rhsa-2026:6665 | Red Hat Security Advisory: freerdp security update | 2026-04-06T14:51:20+00:00 | 2026-04-09T14:38:09+00:00 |
| rhsa-2026:6647 | Red Hat Security Advisory: libarchive security update | 2026-04-06T09:32:55+00:00 | 2026-04-09T20:37:30+00:00 |
| rhsa-2026:6632 | Red Hat Security Advisory: kernel security update | 2026-04-06T08:09:40+00:00 | 2026-04-08T20:50:08+00:00 |
| rhsa-2026:6635 | Red Hat Security Advisory: fontforge security update | 2026-04-06T07:50:34+00:00 | 2026-04-13T08:42:41+00:00 |
| rhsa-2026:6630 | Red Hat Security Advisory: gnutls security update | 2026-04-06T07:24:34+00:00 | 2026-04-09T20:36:52+00:00 |
| rhsa-2026:6631 | Red Hat Security Advisory: fontforge security update | 2026-04-06T06:36:19+00:00 | 2026-04-13T08:42:41+00:00 |
| rhsa-2026:6628 | Red Hat Security Advisory: fontforge security update | 2026-04-06T05:23:14+00:00 | 2026-04-13T08:42:37+00:00 |
| rhsa-2026:6620 | Red Hat Security Advisory: vim security update | 2026-04-06T03:44:03+00:00 | 2026-04-13T14:52:08+00:00 |
| rhsa-2026:6621 | Red Hat Security Advisory: crun security update | 2026-04-06T03:41:18+00:00 | 2026-04-06T10:31:25+00:00 |
| rhsa-2026:6617 | Red Hat Security Advisory: vim security update | 2026-04-06T03:34:58+00:00 | 2026-04-13T14:52:20+00:00 |
| rhsa-2026:6618 | Red Hat Security Advisory: gnutls security update | 2026-04-06T03:33:23+00:00 | 2026-04-09T20:37:04+00:00 |
| rhsa-2026:6616 | Red Hat Security Advisory: freerdp security update | 2026-04-06T03:31:33+00:00 | 2026-04-09T14:38:16+00:00 |
| rhsa-2026:6622 | Red Hat Security Advisory: crun security update | 2026-04-06T03:28:23+00:00 | 2026-04-06T10:30:54+00:00 |
| rhsa-2026:6619 | Red Hat Security Advisory: vim security update | 2026-04-06T03:27:33+00:00 | 2026-04-13T14:52:08+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2023-073-04 | IGSS (Interactive Graphical SCADA System) | 2023-03-14T10:58:24.000Z | 2023-03-14T10:58:24.000Z |
| sevd-2023-073-02 | PowerLogic™ HDPM6000 | 2023-03-14T09:26:56.000Z | 2023-03-14T09:26:56.000Z |
| sevd-2023-073-01 | EcoStruxure™ Power Monitoring Expert | 2023-03-14T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2023-045-02 | StruxureWare Data Center Expert | 2023-02-14T08:05:19.000Z | 2023-02-14T08:05:19.000Z |
| sevd-2023-045-03 | Merten KNX devices | 2023-02-14T07:24:05.000Z | 2023-02-14T07:24:05.000Z |
| sevd-2023-045-01 | EcoStruxureTM Geo SCADA Expert | 2023-02-14T06:02:05.000Z | 2023-02-14T06:02:05.000Z |
| sevd-2023-010-03 | EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 | 2023-01-10T17:44:20.000Z | 2023-01-10T17:44:20.000Z |
| sevd-2023-010-02 | EcoStruxure Geo SCADA Expert | 2023-01-10T16:24:00.000Z | 2023-03-13T18:30:00.000Z |
| sevd-2023-010-05 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-01-10T15:41:57.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-04 | EcoStruxure™ Power SCADA Anywhere | 2023-01-10T10:28:35.000Z | 2023-01-10T10:28:35.000Z |
| sevd-2023-010-01 | EcoStruxureTM Machine Expert – HVAC (formerly SoMachine - HVAC) | 2023-01-10T09:28:52.000Z | 2023-01-10T09:28:52.000Z |
| sevd-2023-010-06 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon M340, M580 and M580 CPU Safety | 2023-01-10T00:00:00.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2022-347-01 | APC Easy UPS Online Monitoring Software | 2022-12-13T06:09:04.000Z | 2023-01-11T00:00:00.000Z |
| sevd-2022-347-03 | EcoStruxure Power Commission | 2022-12-13T04:28:00.000Z | 2022-12-13T04:28:00.000Z |
| sevd-2022-347-02 | Saitel DR RTU | 2022-12-13T04:12:25.000Z | 2022-12-13T04:12:25.000Z |
| sevd-2022-312-01 | NetBotz 4 - 355/450/455/550/570 | 2022-11-08T06:53:24.000Z | 2023-02-14T06:30:00.000Z |
| sevd-2022-284-04 | EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 | 2022-10-11T10:45:15.000Z | 2022-10-14T10:45:15.000Z |
| sevd-2022-284-02 | EcoStruxure™ Panel Server Box (PAS900) | 2022-10-11T10:05:49.000Z | 2022-10-11T10:05:49.000Z |
| sevd-2022-284-01 | EcoStruxure™ Operator Terminal Expert and Pro-face BLUE | 2022-10-11T09:48:46.000Z | 2022-10-11T09:48:46.000Z |
| sevd-2022-284-03 | ISaGRAF Workbench for SAGE RTU | 2022-10-10T22:13:16.000Z | 2025-11-14T06:30:00.000Z |
| sevd-2022-256-01 | EcoStruxure Machine SCADA Expert and Pro-face BLUE Open Studio | 2022-09-13T05:45:41.000Z | 2022-09-13T05:45:41.000Z |
| sevd-2022-221-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, and Modicon Controllers M580 and M340 | 2022-08-09T10:58:35.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-03 | EcoStruxure™ Control Expert | 2022-08-09T09:14:27.000Z | 2022-08-09T09:14:27.000Z |
| sevd-2022-221-04 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-02 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-193-03 | Acti9 PowerTag Link C | 2022-07-12T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2022-193-02 | SpaceLogic C-Bus Home Controller, formerly known as C-Bus Wiser Home Controller MK2 | 2022-07-12T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2022-193-04 | Easergy P5 | 2022-07-12T08:55:42.000Z | 2022-07-12T08:55:42.000Z |
| sevd-2022-193-01 | OPC UA and X80 advanced RTU Modicon Communication Modules | 2022-07-12T04:00:00.000Z | 2022-08-19T06:30:00.000Z |
| sevd-2022-165-08 | EcoStruxure™ Cybersecurity Admin Expert | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-430425 | SSA-430425: Multiple Vulnerabilities in SINEC Security Monitor before V4.9.0 | 2024-10-08T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-426509 | SSA-426509: Multiple Local Code Execution Vulnerabilities in Questa and ModelSim | 2024-10-08T00:00:00Z | 2025-06-17T00:00:00Z |
| ssa-368868 | SSA-368868: Multiple Vulnerabilities in WibuKey for Windows | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-254396 | SSA-254396: Vulnerability in Nozomi Guardian/CMC Before 24.3.1 on RUGGEDCOM APE1808 Devices | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-054046 | SSA-054046: Unauthenticated Information Disclosure in Web Server of SIMATIC S7-1500 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-969738 | SSA-969738: Denial of Service Vulnerability in SIMATIC S7-200 SMART Devices | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-869574 | SSA-869574: Multiple Vulnerabilities in SINEMA Remote Connect Server Before V3.2 SP2 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-773256 | SSA-773256: Impact of Socket.IO CVE-2024-38355 on Siemens Industrial Products | 2024-09-10T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-765405 | SSA-765405: Multiple Vulnerabilities in SIMATIC RFID Readers | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-721642 | SSA-721642: Injection Vulnerability in SCALANCE W700 802.11 AX Family Before V2.4 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-673996 | SSA-673996: Buffer Overflow Vulnerability in Third-Party Component in SICAM and SITIPE Products | 2024-09-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-629254 | SSA-629254: Remote Code Execution Vulnerability in SIMATIC SCADA and PCS 7 systems | 2024-09-10T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-427715 | SSA-427715: Stack-Based Buffer Overflow Vulnerability in Tecnomatix Plant Simulation | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-423808 | SSA-423808: Multiple NULL Pointer Dereference Vulnerabilities in Industrial Products | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-417159 | SSA-417159: Multiple Vulnerabilities in SINEMA Remote Connect Client Before V3.2 SP2 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-359713 | SSA-359713: Authorization Bypass Vulnerability in Industrial Edge Management | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-342438 | SSA-342438: Privilege Escalation Vulnerability in SINUMERIK ONE, SINUMERIK 840D and SINUMERIK 828D | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-097786 | SSA-097786: Insertion of Sensitive Information into Log File Vulnerability in SINUMERIK systems | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-039007 | SSA-039007: Heap-based Buffer Overflow Vulnerability in User Management Component (UMC) | 2024-09-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-856475 | SSA-856475: X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-784301 | SSA-784301: Multiple Vulnerabilities in SINEC NMS Before V3.0 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-720392 | SSA-720392: Multiple Vulnerabilities in Third-Party Components in Location Intelligence Before V4.4 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-716317 | SSA-716317: Multiple Vulnerability in SINEC Traffic Analyzer Before V2.0 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-659443 | SSA-659443: Local Code Execution Vulnerabilities in COMOS Before V10.5 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-417547 | SSA-417547: Multiple Vulnerabilities in INTRALOG WMS Before V4 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-357412 | SSA-357412: PRT File Parsing Vulnerability in NX Before V2406.3000 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-087301 | SSA-087301: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.1 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-857368 | SSA-857368: Multiple Vulnerabilities in Omnivise T3000 | 2024-08-02T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-071402 | SSA-071402: Multiple Vulnerabilities in SICAM Products | 2024-07-22T00:00:00Z | 2024-07-22T00:00:00Z |
| ssa-998949 | SSA-998949: Hard-coded Default Encryption Key in Mendix Encryption Module V10.0.0 and V10.0.1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21085-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21084-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21083-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21082-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21081-1 | Security update for the Linux Kernel RT (Live Patch 15 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21055-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21054-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21053-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21052-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21051-1 | Security update for the Linux Kernel RT (Live Patch 15 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21080-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:33Z | 2026-04-09T13:20:33Z |
| suse-su-2026:21050-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:33Z | 2026-04-09T13:20:33Z |
| suse-su-2026:21079-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:25Z | 2026-04-09T13:20:25Z |
| suse-su-2026:21078-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:25Z | 2026-04-09T13:20:25Z |
| suse-su-2026:21049-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:25Z | 2026-04-09T13:20:25Z |
| suse-su-2026:21048-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:25Z | 2026-04-09T13:20:25Z |
| suse-su-2026:21077-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:15Z | 2026-04-09T13:20:15Z |
| suse-su-2026:21076-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:15Z | 2026-04-09T13:20:15Z |
| suse-su-2026:21047-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:15Z | 2026-04-09T13:20:15Z |
| suse-su-2026:21046-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:15Z | 2026-04-09T13:20:15Z |
| suse-su-2026:21075-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21074-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21045-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21044-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21073-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21072-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21071-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21070-1 | Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21043-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21042-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:3668 | Important: go-rpm-macros security update | 2026-03-03T00:00:00Z | 2026-03-04T11:06:04Z |
| alsa-2026:3638 | Moderate: nginx:1.24 security update | 2026-03-03T00:00:00Z | 2026-03-04T10:33:37Z |
| alsa-2026:3551 | Important: libpng security update | 2026-03-02T00:00:00Z | 2026-03-04T10:21:19Z |
| alsa-2026:3517 | Important: thunderbird security update | 2026-03-02T00:00:00Z | 2026-03-05T07:45:44Z |
| alsa-2026:3516 | Important: thunderbird security update | 2026-03-02T00:00:00Z | 2026-03-04T10:23:48Z |
| alsa-2026:3515 | Important: thunderbird security update | 2026-03-02T00:00:00Z | 2026-03-04T11:54:18Z |
| alsa-2026:3507 | Important: valkey security update | 2026-03-02T00:00:00Z | 2026-03-04T10:26:29Z |
| alsa-2026:3488 | Moderate: kernel security update | 2026-03-02T00:00:00Z | 2026-03-04T10:30:56Z |
| alsa-2026:3477 | Moderate: gnutls security update | 2026-03-02T00:00:00Z | 2026-03-02T13:35:48Z |
| alsa-2026:3476 | Important: udisks2 security update | 2026-03-02T00:00:00Z | 2026-03-05T07:49:03Z |
| alsa-2026:3464 | Moderate: kernel security update | 2026-03-02T00:00:00Z | 2026-03-03T15:09:58Z |
| alsa-2026:3463 | Moderate: kernel-rt security update | 2026-03-02T00:00:00Z | 2026-03-03T15:13:38Z |
| alsa-2026:3443 | Important: valkey security update | 2026-02-26T00:00:00Z | 2026-03-05T07:52:10Z |
| alsa-2026:3428 | Important: container-tools:rhel8 security update | 2026-02-26T00:00:00Z | 2026-03-02T15:20:08Z |
| alsa-2026:3407 | Important: mingw-fontconfig security update | 2026-02-26T00:00:00Z | 2026-03-02T15:16:03Z |
| alsa-2026:3405 | Important: libpng security update | 2026-02-26T00:00:00Z | 2026-03-02T13:11:42Z |
| alsa-2026:3361 | Important: firefox security update | 2026-02-25T00:00:00Z | 2026-02-26T10:18:27Z |
| alsa-2026:3359 | Important: python-pyasn1 security update | 2026-02-25T00:00:00Z | 2026-02-26T10:19:52Z |
| alsa-2026:3354 | Important: python-pyasn1 security update | 2026-02-25T00:00:00Z | 2026-02-26T13:28:33Z |
| alsa-2026:3343 | Important: skopeo security update | 2026-02-25T00:00:00Z | 2026-02-26T13:30:14Z |
| alsa-2026:3341 | Important: containernetworking-plugins security update | 2026-02-25T00:00:00Z | 2026-03-02T12:59:54Z |
| alsa-2026:3340 | Important: skopeo security update | 2026-02-25T00:00:00Z | 2026-03-02T12:57:45Z |
| alsa-2026:3339 | Important: firefox security update | 2026-02-25T00:00:00Z | 2026-02-26T10:21:52Z |
| alsa-2026:3338 | Important: firefox security update | 2026-02-25T00:00:00Z | 2026-03-02T12:54:29Z |
| alsa-2026:3337 | Important: podman security update | 2026-02-25T00:00:00Z | 2026-02-26T10:23:45Z |
| alsa-2026:3336 | Important: podman security update | 2026-02-25T00:00:00Z | 2026-02-26T13:31:46Z |
| alsa-2026:3334 | Important: freerdp security update | 2026-02-25T00:00:00Z | 2026-02-26T09:39:13Z |
| alsa-2026:3298 | Important: buildah security update | 2026-02-25T00:00:00Z | 2026-02-26T10:25:19Z |
| alsa-2026:3297 | Important: buildah security update | 2026-02-25T00:00:00Z | 2026-02-26T10:26:55Z |
| alsa-2026:3291 | Important: runc security update | 2026-02-25T00:00:00Z | 2026-02-26T10:27:56Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-787 | Heap-buffer-overflow in DwaCompressor_uncompress | 2025-09-27T00:18:30.312049Z | 2025-09-27T00:18:30.312655Z |
| osv-2025-783 | Heap-buffer-overflow in inspect_process | 2025-09-26T00:06:21.859576Z | 2025-09-26T00:06:21.859964Z |
| osv-2025-767 | UNKNOWN READ in dcd_int_handler | 2025-09-20T00:19:20.851166Z | 2025-09-20T00:19:20.851464Z |
| osv-2025-766 | Heap-buffer-overflow in Open | 2025-09-20T00:18:10.380843Z | 2025-09-20T00:18:10.381141Z |
| osv-2025-765 | Security exception in com.spotify.docker.client.shaded.com.fasterxml.jackson.databind.util.TokenBuffer | 2025-09-20T00:18:07.994839Z | 2025-09-20T00:18:07.995257Z |
| osv-2025-764 | Global-buffer-overflow in Ogg_CreateES | 2025-09-20T00:15:54.584666Z | 2025-09-20T00:15:54.585041Z |
| osv-2025-762 | Use-of-uninitialized-value in fuzzer_send | 2025-09-19T00:14:45.258709Z | 2025-09-19T00:14:45.259063Z |
| osv-2025-742 | Null-dereference READ in ubsan_GetStackTrace | 2025-09-14T00:15:42.184140Z | 2025-09-14T00:15:42.184553Z |
| osv-2025-729 | UNKNOWN READ in sam_hrecs_free_tags | 2025-09-13T00:08:43.863495Z | 2025-09-13T00:08:43.863848Z |
| osv-2025-723 | Heap-buffer-overflow in processClientServerHello | 2025-09-13T00:02:40.666090Z | 2025-09-13T00:02:40.666412Z |
| osv-2025-718 | Heap-buffer-overflow in pcpp::ArpLayer::toString | 2025-09-10T00:08:49.177204Z | 2025-12-22T14:17:36.857810Z |
| osv-2025-698 | Use-of-uninitialized-value in AesEncrypt_C | 2025-09-02T00:02:49.308939Z | 2025-12-05T14:58:11.846817Z |
| osv-2025-684 | Heap-buffer-overflow in TGAHandler::read | 2025-08-25T00:17:17.781502Z | 2025-08-25T00:17:17.782094Z |
| osv-2025-677 | Heap-buffer-overflow in TGAHandler::read | 2025-08-23T00:05:27.168432Z | 2025-08-23T00:05:27.168725Z |
| osv-2025-657 | Heap-use-after-free in ftp_pp_statemachine | 2025-08-20T00:12:09.699805Z | 2025-08-20T00:12:09.700264Z |
| osv-2025-638 | Security exception in com.fasterxml.jackson.databind.deser.std.UntypedObjectDeserializer$Vanilla.deser | 2025-08-17T00:01:49.946822Z | 2025-08-17T14:48:59.288257Z |
| osv-2025-634 | Null-dereference READ in enc_fuzzer@Enc.EncTest | 2025-08-15T00:17:04.845331Z | 2025-08-15T00:17:04.845683Z |
| osv-2025-633 | UNKNOWN WRITE in _lou_handlePassVariableAction | 2025-08-15T00:16:54.142913Z | 2025-08-15T00:16:54.143400Z |
| osv-2025-631 | Null-dereference READ in advanced_api_fuzzer@AdvancedApi.AdvancedApiTest | 2025-08-15T00:02:42.080995Z | 2025-08-15T00:02:42.081563Z |
| osv-2025-628 | Null-dereference READ in ubsan_GetStackTrace | 2025-08-14T00:15:27.806312Z | 2025-08-14T00:15:27.806631Z |
| osv-2025-627 | Null-dereference READ in ProcessRows | 2025-08-14T00:14:14.245302Z | 2025-08-14T00:14:14.245619Z |
| osv-2025-622 | Heap-buffer-overflow in cc_storage_append | 2025-08-13T00:16:18.937393Z | 2025-08-13T00:16:18.937719Z |
| osv-2025-620 | Heap-buffer-overflow in FragPrepareChunk | 2025-08-12T00:14:23.793424Z | 2025-08-12T00:14:23.793828Z |
| osv-2025-619 | Heap-buffer-overflow in webvtt_domnode_SelectNodesInTree | 2025-08-12T00:13:01.748418Z | 2025-08-12T00:13:01.748751Z |
| osv-2025-618 | Heap-buffer-overflow in iTUNTripletCallback | 2025-08-12T00:05:50.847179Z | 2025-08-12T00:05:50.847582Z |
| osv-2025-617 | UNKNOWN WRITE in MP4_BoxFree | 2025-08-12T00:04:18.009473Z | 2025-08-12T00:04:18.009816Z |
| osv-2025-616 | Heap-buffer-overflow in Open | 2025-08-12T00:00:48.056276Z | 2025-08-12T00:00:48.056623Z |
| osv-2025-615 | Index-out-of-bounds in hevc_get_picture_size | 2025-08-12T00:00:42.725434Z | 2025-08-12T00:00:42.725767Z |
| osv-2025-614 | Heap-buffer-overflow in hevc_hvcC_to_AnnexB_NAL | 2025-08-12T00:00:36.634849Z | 2025-08-12T00:00:36.635239Z |
| osv-2025-613 | Heap-buffer-overflow in check_sync_pes | 2025-08-12T00:00:33.354786Z | 2025-08-12T00:00:33.355391Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0129 | Missing check in ZK proof in CGGMP21 Threshold Signing Protocol | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0128 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0127 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0125 | Resource Exhaustion (Memory and Handle Leaks) on Windows and macOS | 2025-11-22T12:00:00Z | 2025-11-22T12:29:36Z |
| rustsec-2025-0153 | hexchat crate is unsound and unmaintained | 2025-11-17T12:00:00Z | 2026-02-26T06:11:28Z |
| rustsec-2025-0124 | rand_os crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-19T20:48:42Z |
| rustsec-2025-0123 | opentelemetry-jaeger crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T12:07:07Z |
| rustsec-2025-0122 | cargo-asm crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T09:02:31Z |
| rustsec-2025-0121 | gcc crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:52:10Z |
| rustsec-2025-0119 | number_prefix crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:13:56Z |
| rustsec-2025-0120 | json5 crate is unmaintained | 2025-11-16T12:00:00Z | 2025-11-30T00:15:16Z |
| rustsec-2025-0118 | Unsound API access to a WebAssembly shared linear memory | 2025-11-11T12:00:00Z | 2025-11-13T16:55:40Z |
| rustsec-2025-0117 | tandem is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0116 | tandem_garble_interop is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0115 | tandem_http_server is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0114 | tandem_http_client is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0136 | Underflow in aes_key_unwrap function | 2025-11-07T12:00:00Z | 2025-12-17T06:01:32Z |
| rustsec-2025-0154 | `replit_ruspty` was removed from crates.io for malicious code | 2025-11-04T12:00:00Z | 2026-03-25T08:37:19Z |
| rustsec-2025-0131 | Lack of sufficient checks in public API | 2025-10-31T12:00:00Z | 2025-12-02T06:03:09Z |
| rustsec-2025-0111 | `tokio-tar` parses PAX extended headers incorrectly, allows file smuggling | 2025-10-21T12:00:00Z | 2026-01-17T07:44:05Z |
| rustsec-2025-0110 | astral-tokio-tar Vulnerable to PAX Header Desynchronization | 2025-10-21T12:00:00Z | 2025-10-25T11:18:52Z |
| rustsec-2025-0109 | Out-of-bounds memory access in binary_read_to_ref and binary_write_from_ref | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0108 | Uninitialized memory exposure in string reading functions | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0107 | Uninitialized memory exposure in any_as_u8_slice | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0106 | Undefined behavior in index_of_ptr with empty slices | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0105 | Uninitialized memory exposure in create_ring_buffer | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0142 | Segmentation fault and invalid memory read in `mnl::cb_run` | 2025-10-18T12:00:00Z | 2026-02-10T13:23:41Z |
| rustsec-2025-0126 | Heap-buffer-overflow in nftnl::Batch::with_page_size (nftnl-rs) | 2025-10-18T12:00:00Z | 2025-11-27T21:53:33Z |
| rustsec-2025-0104 | `unic-ucd-segment` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0103 | `unic-ucd-core` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-nats-2026-33247 | NATS credentials are exposed in monitoring port via command-line argv | 2026-03-27T17:45:24.871Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33246 | NATS: Leafnode connections allow spoofing of Nats-Request-Info identity headers | 2026-03-27T17:45:23.082Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33223 | NATS Server: Incomplete Stripping of Nats-Request-Info Header Allows Identity Spoofing | 2026-03-27T17:45:21.527Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33222 | NATS JetStream has an authorization bypass through its Management API | 2026-03-27T17:45:19.827Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33219 | NATS is vulnerable to pre-auth DoS through WebSockets client service | 2026-03-27T17:45:18.190Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33218 | NATS has pre-auth server panic via leafnode handling | 2026-03-27T17:45:16.655Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33217 | NATS allows MQTT clients to bypass ACL checks | 2026-03-27T17:45:15.042Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33216 | NATS has MQTT plaintext password disclosure | 2026-03-27T17:45:13.444Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-29785 | NATS Server panic via malicious compression on leafnode port | 2026-03-27T17:45:10.061Z | 2026-03-27T18:14:10.313Z |
| bit-gitlab-2026-4363 | Incorrect Authorization in GitLab | 2026-03-27T12:15:19.935Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-3988 | Inefficient Algorithmic Complexity in GitLab | 2026-03-27T12:15:17.809Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-3857 | Cross-Site Request Forgery (CSRF) in GitLab | 2026-03-27T12:15:15.885Z | 2026-03-31T09:14:23.567Z |
| bit-gitlab-2026-2995 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in GitLab | 2026-03-27T12:15:11.976Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2973 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-03-27T12:15:10.065Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2745 | Authentication Bypass Using an Alternate Path or Channel in GitLab | 2026-03-27T12:15:06.072Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2726 | Incorrect Authorization in GitLab | 2026-03-27T12:15:04.107Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-1724 | Missing Authentication for Critical Function in GitLab | 2026-03-27T12:14:54.117Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-14595 | Missing Authorization in GitLab | 2026-03-27T12:11:45.074Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-13436 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-27T12:11:11.989Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-13078 | Improper Validation of Specified Quantity in Input in GitLab | 2026-03-27T12:11:08.026Z | 2026-03-27T12:16:52.978Z |
| bit-nats-2026-27889 | NATS: Pre-auth remote server crash via WebSocket frame length overflow in wsRead | 2026-03-27T11:47:22.988Z | 2026-03-27T12:16:52.978Z |
| bit-etcd-2026-33413 | etcd: Authorization bypasses in multiple APIs | 2026-03-27T11:39:27.916Z | 2026-03-27T12:16:52.978Z |
| bit-etcd-2026-33343 | etcd: Nested etcd transactions bypass RBAC authorization checks | 2026-03-27T11:39:26.076Z | 2026-03-27T12:16:52.978Z |
| bit-parse-2026-33627 | Parse Server: Auth data exposed via /users/me endpoint | 2026-03-27T07:14:47.660Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33624 | Parse Server: MFA recovery code single-use bypass via concurrent requests | 2026-03-27T07:14:44.950Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33539 | Parse Server: SQL injection via aggregate and distinct field names in PostgreSQL adapter | 2026-03-27T07:14:42.086Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33538 | Parse Server: Denial of service via unindexed database query for unconfigured auth providers | 2026-03-27T07:14:39.195Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33527 | Parse Server: Session update endpoint allows overwriting server-generated session fields | 2026-03-27T07:14:36.431Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33508 | Parse Server: LiveQuery subscription query depth bypass | 2026-03-27T07:14:33.818Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33498 | Parse Server: Query condition depth bypass via pre-validation transform pipeline | 2026-03-27T07:14:30.964Z | 2026-03-27T07:40:55.991Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-cy45415 | Security fixes for CVE-2025-15558, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-fv92-fjc5-jj9h applied in versions: 3.6.16-r0, 3.7.4-r0, 3.7.7-r0 | 2026-04-01T10:06:30.444629Z | 2026-03-06T11:37:07Z |
| cleanstart-2026-hd58055 | Security fixes for CVE-2025-25285, CVE-2026-21637, ghsa-23c5-xmqv-rm74, ghsa-3ppc-4f35-3m26, ghsa-72xf-g2v4-qvf3, ghsa-7r86-cg39-jmmj, ghsa-pfrx-2q88-qq97, ghsa-rc47-6667-2j5j, ghsa-rmvr-2pp2-xj38 applied in versions: 2.6.0-r1, 2.6.0-r2 | 2026-04-01T10:06:17.030926Z | 2026-03-06T12:59:45Z |
| cleanstart-2026-ck64127 | Security fixes for ghsa-6rw7-vpxm-498p, ghsa-73rr-hh4g-fpgx, ghsa-8qq5-rm4j-mr97, ghsa-wqch-xfxh-vrr4 applied in versions: 4.2.1.1-r1 | 2026-04-01T10:06:15.177169Z | 2026-03-06T11:36:37Z |
| cleanstart-2026-fn55648 | Security fixes for CVE-2025-25285, CVE-2026-21637, ghsa-23c5-xmqv-rm74, ghsa-72xf-g2v4-qvf3, ghsa-7r86-cg39-jmmj, ghsa-fj3w-jwp8-x2g3, ghsa-pfrx-2q88-qq97, ghsa-rc47-6667-2j5j, ghsa-rmvr-2pp2-xj38 applied in versions: 2.6.0-r1, 2.7.0-r0 | 2026-04-01T10:06:10.961683Z | 2026-03-06T13:00:09Z |
| cleanstart-2026-qx99194 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:06:00.100216Z | 2026-03-07T09:08:53Z |
| cleanstart-2026-pr27884 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:52.407214Z | 2026-03-07T09:10:08Z |
| cleanstart-2026-lu31244 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:46.726872Z | 2026-03-07T09:10:59Z |
| cleanstart-2026-jr53141 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:46.660054Z | 2026-03-07T09:11:28Z |
| cleanstart-2026-ff20499 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0 | 2026-04-01T10:04:06.598747Z | 2026-03-09T11:52:12Z |
| cleanstart-2026-ar56257 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 1.0.16-r0 | 2026-04-01T10:03:58.074474Z | 2026-03-07T09:14:16Z |
| cleanstart-2026-bf73214 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 1.0.17-r0 | 2026-04-01T10:03:56.655073Z | 2026-03-07T09:14:49Z |
| cleanstart-2026-df22934 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, ghsa-6v2p-p543-phr9, ghsa-f6x5-jh6r-wrfv, ghsa-hcg3-q754-cr77, ghsa-j5w8-q4qc-rx2x, ghsa-qxp5-gwg8-xv66, ghsa-v778-237x-gjrc, ghsa-vvgc-356p-c3xw applied in versions: 0.28.0-r0, 0.28.0-r1 | 2026-04-01T10:03:39.072806Z | 2026-03-09T13:31:49Z |
| cleanstart-2026-ds01292 | Security fixes for CVE-2025-47910, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2026-24051, CVE-2026-27141, ghsa-9h8m-3fm2-qjrq applied in versions: 1.19.1-r0, 1.19.2-r0, 1.19.2-r1 | 2026-04-01T10:03:13.135534Z | 2026-03-10T06:29:01Z |
| cleanstart-2026-ew27017 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.10.0-r0, 1.10.0-r1 | 2026-04-01T10:03:13.124366Z | 2026-03-09T13:26:38Z |
| cleanstart-2026-fo41609 | Security fixes for CVE-2025-48924, ghsa-22h5-pq3x-2gf2, ghsa-33mh-2634-fwr2, ghsa-4cx2-fc23-5wg6, ghsa-6xw4-3v39-52mm, ghsa-72hv-8253-57qq, ghsa-72qj-48g4-5xgx, ghsa-c2f4-jgmc-q2r5, ghsa-gh9q-2xrm-x6qv, ghsa-j288-q9x7-2f5v, ghsa-j4pr-3wm6-xx2r, ghsa-mhwm-jh88-3gjf, ghsa-mr3q-g2mv-mr4q, ghsa-p543-xpfm-54cp, ghsa-vc5p-v9hr-52mj, ghsa-vqg5-3255-v292, ghsa-w9pc-fmgc-vxvw, ghsa-wpv5-97wm-hp9c applied in versions: 8.19.12-r0, 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-04-01T10:02:50.908381Z | 2026-03-10T06:14:42Z |
| cleanstart-2026-jo97977 | Security fixes for ghsa-22h5-pq3x-2gf2, ghsa-33mh-2634-fwr2, ghsa-4cx2-fc23-5wg6, ghsa-6xw4-3v39-52mm, ghsa-72hv-8253-57qq, ghsa-72qj-48g4-5xgx, ghsa-c2f4-jgmc-q2r5, ghsa-gh9q-2xrm-x6qv, ghsa-j4pr-3wm6-xx2r, ghsa-mhwm-jh88-3gjf, ghsa-mr3q-g2mv-mr4q, ghsa-p543-xpfm-54cp, ghsa-vc5p-v9hr-52mj, ghsa-vqg5-3255-v292, ghsa-w9pc-fmgc-vxvw, ghsa-wpv5-97wm-hp9c applied in versions: 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-04-01T10:02:43.649563Z | 2026-03-10T06:18:32Z |
| cleanstart-2026-fz71456 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 1.0.18-r0 | 2026-04-01T10:02:32.121585Z | 2026-03-10T06:07:45Z |
| cleanstart-2026-al75891 | Security fixes for CVE-2026-24051, ghsa-9h8m-3fm2-qjrq applied in versions: 1.19.2-r0 | 2026-04-01T10:02:21.610635Z | 2026-03-10T06:30:49Z |
| cleanstart-2026-jk38734 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121 applied in versions: 1.80.1-r1 | 2026-04-01T10:02:16.597211Z | 2026-03-10T06:53:47Z |
| cleanstart-2026-ei44621 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.27.4-r0, 1.27.4-r1, 1.27.7-r0 | 2026-04-01T10:02:07.249071Z | 2026-03-10T11:28:54Z |
| cleanstart-2026-bm51903 | Security fixes for CVE-2015-20107, CVE-2015-2104, CVE-2019-16056, CVE-2019-16935, CVE-2019-20907, CVE-2019-5010, CVE-2020-14422, CVE-2020-8492, CVE-2021-23336, CVE-2021-29921, CVE-2021-3177, CVE-2022-45061, CVE-2023-27043, CVE-2024-6232, CVE-2024-6923, CVE-2025-59375 applied in versions: 3.10.5-r0, 3.11.1-r0, 3.11.5-r0, 3.12.12-r0, 3.12.3-r2, 3.12.6-r0, 3.6.8-r1, 3.7.5-r0, 3.8.2-r0, 3.8.4-r0, 3.8.5-r0, 3.8.7-r2, 3.8.8-r0, 3.9.4-r0, 3.9.5-r0 | 2026-04-01T10:02:05.179897Z | 2026-03-10T11:38:44Z |
| cleanstart-2026-lu81821 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.28.3-r1 | 2026-04-01T10:02:04.894450Z | 2026-03-10T11:29:14Z |
| cleanstart-2026-dr75226 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.2-r1 | 2026-04-01T10:01:44.354704Z | 2026-03-10T12:28:42Z |
| cleanstart-2026-pp64690 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-1229, CVE-2026-25934, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-q9hv-hpm4-hj6x applied in versions: 0.20.4-r1, 0.20.4-r2, 0.20.4-r3 | 2026-04-01T10:01:43.950159Z | 2026-03-10T11:34:26Z |
| cleanstart-2026-iy77127 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.29.0-r0 | 2026-04-01T10:01:36.492383Z | 2026-03-10T11:31:41Z |
| cleanstart-2026-pm59896 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729 applied in versions: 1.41.1-r0, 1.41.1-r1 | 2026-04-01T10:00:44.608929Z | 2026-03-11T05:51:53Z |
| cleanstart-2026-mk01488 | Security fixes for CVE-2025-15558, CVE-2025-61729, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-27141, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-9h8m-3fm2-qjrq, ghsa-fv92-fjc5-jj9h, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p applied in versions: 3.6.16-r0, 3.7.10-r0, 3.7.10-r1, 3.7.10-r2, 3.7.10-r3, 3.7.10-r4, 3.7.4-r0, 3.7.9-r0 | 2026-04-01T10:00:43.919294Z | 2026-03-10T12:46:44Z |
| cleanstart-2026-bb17877 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.87.1-r0, 0.89.0-r0 | 2026-04-01T10:00:31.981994Z | 2026-03-11T05:53:58Z |
| cleanstart-2026-lz54652 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729 applied in versions: 1.7.0-r0, 1.7.1-r0 | 2026-04-01T10:00:12.081449Z | 2026-03-11T07:18:17Z |
| cleanstart-2026-ju62670 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2x5j-vhc8-9cwm, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2gw2-vh5m, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-c6gw-w398-hv78, ghsa-cfpf-hrx2-8rv6, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-jgfp-53c3-624w, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r, ghsa-pwhc-rpq9-4c8w, ghsa-r6j8-c6r2-37rr, ghsa-vv39-3w5q-974q applied in versions: 2.13.9-r0, 2.14.20-r0, 2.14.20-r1, 3.0.16-r0, 3.0.19-r0, 3.0.20-r2, 3.0.21-r0, 3.0.21-r1, 3.1.4-r0, 3.1.8.-r0 | 2026-04-01T10:00:01.931332Z | 2026-03-11T10:03:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2025-038 | 2025-04-16T16:25:45.000Z | 2025-04-16T16:25:45.000Z | |
| drupal-contrib-2025-037 | 2025-04-16T16:25:35.000Z | 2025-04-16T16:25:35.000Z | |
| drupal-contrib-2025-036 | 2025-04-16T16:25:27.000Z | 2025-04-16T16:25:27.000Z | |
| drupal-contrib-2025-035 | 2025-04-16T16:25:12.000Z | 2025-04-16T16:25:12.000Z | |
| drupal-contrib-2025-034 | 2025-04-16T16:24:49.000Z | 2025-05-29T18:24:01.000Z | |
| drupal-contrib-2025-033 | 2025-04-09T17:04:56.000Z | 2025-04-29T07:18:22.000Z | |
| drupal-contrib-2025-032 | 2025-04-09T17:04:46.000Z | 2025-04-09T17:04:46.000Z | |
| drupal-contrib-2025-031 | 2025-04-09T17:04:15.000Z | 2025-04-10T16:01:51.000Z | |
| drupal-contrib-2025-030 | 2025-04-09T17:04:09.000Z | 2025-04-09T17:04:09.000Z | |
| drupal-contrib-2025-029 | 2025-04-02T17:03:15.000Z | 2025-04-02T17:03:15.000Z | |
| drupal-contrib-2025-028 | 2025-04-02T17:02:32.000Z | 2025-04-02T17:02:32.000Z | |
| drupal-contrib-2025-027 | 2025-04-02T17:01:45.000Z | 2025-04-02T17:01:45.000Z | |
| drupal-contrib-2025-026 | 2025-03-19T18:53:42.000Z | 2025-03-31T22:07:23.000Z | |
| drupal-contrib-2025-025 | 2025-03-19T18:53:23.000Z | 2025-03-31T22:07:15.000Z | |
| drupal-contrib-2025-024 | 2025-03-19T18:52:53.000Z | 2025-03-31T22:07:08.000Z | |
| drupal-contrib-2025-023 | 2025-03-05T18:17:14.000Z | 2025-03-31T22:06:55.000Z | |
| drupal-contrib-2025-022 | 2025-03-05T17:27:19.000Z | 2025-03-31T22:06:45.000Z | |
| drupal-contrib-2025-021 | 2025-03-05T17:18:25.000Z | 2025-03-31T22:06:37.000Z | |
| drupal-contrib-2025-020 | 2025-02-26T18:35:21.000Z | 2025-03-31T22:06:18.000Z | |
| drupal-contrib-2025-019 | 2025-02-26T18:35:11.000Z | 2025-03-31T22:06:12.000Z | |
| drupal-contrib-2025-018 | 2025-02-26T18:34:59.000Z | 2025-03-31T22:06:05.000Z | |
| drupal-contrib-2025-017 | 2025-02-12T17:38:22.000Z | 2025-03-31T22:05:40.000Z | |
| drupal-contrib-2025-016 | 2025-02-12T17:38:09.000Z | 2025-03-31T22:05:16.000Z | |
| drupal-contrib-2025-015 | 2025-02-12T17:37:59.000Z | 2025-03-31T22:05:08.000Z | |
| drupal-contrib-2025-014 | 2025-02-12T17:37:40.000Z | 2025-03-31T22:05:00.000Z | |
| drupal-contrib-2025-013 | 2025-02-05T17:24:48.000Z | 2025-03-31T22:04:51.000Z | |
| drupal-contrib-2025-012 | 2025-01-29T17:16:19.000Z | 2025-03-31T22:04:42.000Z | |
| drupal-contrib-2025-011 | 2025-01-29T17:13:29.000Z | 2025-03-31T22:04:35.000Z | |
| drupal-contrib-2025-010 | 2025-01-29T16:57:22.000Z | 2025-03-31T22:23:22.000Z | |
| drupal-contrib-2025-009 | 2025-01-29T16:54:02.000Z | 2025-03-31T22:04:22.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2019-ale-004 | Multiples vulnérabilités dans Microsoft Edge et Internet Explorer | 2019-04-01T00:00:00.000000 | 2019-04-17T00:00:00.000000 |
| certfr-2019-ale-003 | Campagnes de rançongiciels | 2019-01-31T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| certfr-2019-ale-002 | Vulnérabilités affectant l'écosystème Microsoft Exchange et Active Directory | 2019-01-30T00:00:00.000000 | 2019-03-06T00:00:00.000000 |
| certfr-2019-ale-001 | Vulnérabilité dans le gestionnaire de paquets APT | 2019-01-22T00:00:00.000000 | 2019-02-27T00:00:00.000000 |
| certfr-2018-ale-013 | Vulnérabilité dans Microsoft Internet Explorer | 2018-12-20T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| certfr-2018-ale-012 | Vulnérabilité dans Wallix AdminBastion | 2018-10-26T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| certfr-2018-ale-011 | Vulnérabilité dans le client Git | 2018-10-08T00:00:00.000000 | 2018-10-12T00:00:00.000000 |
| certfr-2018-ale-010 | Vulnérabilité activement exploitée dans le framework STRUTS 2 | 2018-08-29T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-009 | Vulnérabilité dans Microsoft Windows | 2018-08-29T00:00:00.000000 | 2018-09-17T00:00:00.000000 |
| certfr-2018-ale-008 | Campagne de messages électroniques non sollicités de type Locky Locker | 2018-08-03T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-007 | Multiples vulnérabilités dans S/MIME et OpenPGP | 2018-05-14T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-006 | Vulnérabilité dans Cisco IOS et IOS XE Smart Install Client | 2018-04-06T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-005 | Multiples vulnérabilités dans Drupal | 2018-03-29T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-004 | Vulnérabilité dans le serveur de messagerie Exim | 2018-03-07T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-003 | Vulnérabilité dans Adobe Flash Player | 2018-02-02T00:00:00.000000 | 2018-02-07T00:00:00.000000 |
| certfr-2018-ale-002 | Vulnérabilité dans Cisco Adaptive Security Appliance | 2018-02-01T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| certfr-2018-ale-001 | Multiples vulnérabilités de fuite d'informations dans des processeurs | 2018-01-04T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2017-ale-020 | Vulnérabilité dans des implémentations de TLS | 2017-12-13T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| certfr-2017-ale-019 | Vulnérabilité d'usurpation d'identité dans plusieurs clients de messagerie | 2017-12-05T00:00:00.000000 | 2018-03-07T00:00:00.000000 |
| certfr-2017-ale-018 | Vulnérabilité dans Apple MacOS High Sierra | 2017-11-29T00:00:00.000000 | 2017-11-30T00:00:00.000000 |
| certfr-2017-ale-017 | Vulnérabilité dans le serveur de messagerie Exim | 2017-11-27T00:00:00.000000 | 2018-02-01T00:00:00.000000 |
| certfr-2017-ale-016 | Campagne de rançongiciel Bad Rabbit | 2017-10-25T00:00:00.000000 | 2017-10-27T00:00:00.000000 |
| certfr-2017-ale-014 | Vulnérabilité dans le protocole WPA/WPA2 | 2017-10-18T00:00:00.000000 | 2017-10-19T00:00:00.000000 |
| certfr-2017-ale-015 | Vulnérabilités dans la bibliothèque Infineon RSA | 2017-10-16T00:00:00.000000 | 2017-10-17T00:00:00.000000 |
| certfr-2017-ale-013 | Présence de code malveillant dans Piriform CCleaner | 2017-09-18T00:00:00.000000 | 2017-10-09T00:00:00.000000 |
| certfr-2017-ale-012 | Campagne de maliciels prenant l'apparence d'un rançongiciel à multiples capacités de propagation | 2017-06-27T00:00:00.000000 | 2017-08-03T00:00:00.000000 |
| certfr-2017-ale-011 | Campagne de messages électroniques non sollicités de type Jaff | 2017-05-14T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| certfr-2017-ale-010 | Propagation d'un rançongiciel exploitant les vulnérabilités MS17-010 | 2017-05-12T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| certfr-2017-ale-009 | Vulnérabilité dans Microsoft Malware Protection Engine | 2017-05-09T00:00:00.000000 | 2017-05-15T00:00:00.000000 |
| certfr-2017-ale-008 | Multiples vulnérabilités dans Microsoft Windows XP et Windows Server 2003 | 2017-04-14T00:00:00.000000 | 2017-09-06T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0331 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0330 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0329 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0328 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0327 | Multiples vulnérabilités dans les produits IBM | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0326 | Multiples vulnérabilités dans les produits VMware | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0325 | Multiples vulnérabilités dans les produits Elastic | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0324 | Multiples vulnérabilités dans Google Chrome | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0323 | Multiples vulnérabilités dans les produits Spring | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0322 | Multiples vulnérabilités dans les produits VMware | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0321 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0320 | Multiples vulnérabilités dans Roundcube | 2026-03-19T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| certfr-2026-avi-0319 | Vulnérabilité dans les produits Mitel | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0318 | Multiples vulnérabilités dans Splunk Universal Forwarder | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0317 | Vulnérabilité dans Python | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0316 | Multiples vulnérabilités dans les produits VMware | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0315 | Multiples vulnérabilités dans les produits VMware | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0314 | Multiples vulnérabilités dans les produits Atlassian | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0313 | Vulnérabilité dans les produits Apple | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0312 | Multiples vulnérabilités dans GLPI | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0311 | Vulnérabilité dans Citrix XenServer | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0310 | Multiples vulnérabilités dans MongoDB | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0309 | Multiples vulnérabilités dans Suricata | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0308 | Multiples vulnérabilités dans Node.js | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0307 | Vulnérabilité dans les produits Microsoft | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0306 | Multiples vulnérabilités dans Redmine | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0305 | Multiples vulnérabilités dans Spring AI | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0304 | Multiples vulnérabilités dans Xen | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0303 | Vulnérabilité dans Microsoft Edge | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0302 | Multiples vulnérabilités dans Python | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000098 | Optical Disc Archive Software (for Windows) registers a Windows service with an unquoted file path | 2025-11-04T13:51+09:00 | 2025-11-04T13:51+09:00 |
| jvndb-2025-000099 | Progress Flowmon vulnerable to authenticated OS command injection | 2025-11-04T12:47+09:00 | 2025-11-04T12:47+09:00 |
| jvndb-2025-000096 | Installer of WTW EAGLE (for Windows) may insecurely load Dynamic Link Libraries | 2025-10-29T14:17+09:00 | 2025-10-29T14:17+09:00 |
| jvndb-2025-000095 | MZK-DP300N uses hard-coded credentials | 2025-10-28T14:04+09:00 | 2025-10-28T14:04+09:00 |
| jvndb-2025-000093 | Multiple stored cross-site scripting vulnerabilities in Pleasanter | 2025-10-24T15:11+09:00 | 2025-10-24T15:11+09:00 |
| jvndb-2025-000084 | GROWI vulnerable to cross-site scripting | 2025-10-22T15:44+09:00 | 2025-10-22T15:44+09:00 |
| jvndb-2025-000091 | Multiple I-O DATA NAS management applications register Windows services with unquoted file paths | 2025-10-22T15:04+09:00 | 2025-12-10T16:20+09:00 |
| jvndb-2025-000090 | Multiple stored cross-site scripting vulnerabilities in Movable Type | 2025-10-22T13:54+09:00 | 2025-10-22T13:54+09:00 |
| jvndb-2025-000088 | Lanscope Endpoint Manager (On-Premises) vulnerable to improper verification of source of a communication channel | 2025-10-20T16:17+09:00 | 2025-10-22T10:06+09:00 |
| jvndb-2025-000092 | ETERNUS SF vulnerable to incorrect default permissions | 2025-10-20T14:20+09:00 | 2025-10-20T14:20+09:00 |
| jvndb-2025-000089 | Installer of AutoDownloader may insecurely load Dynamic Link Libraries | 2025-10-17T13:38+09:00 | 2025-10-17T13:38+09:00 |
| jvndb-2025-000074 | Multiple vulnerabilities in desknet's NEO | 2025-10-16T17:30+09:00 | 2025-10-16T17:30+09:00 |
| jvndb-2025-000076 | Multiple vulnerabilities in ChatLuck | 2025-10-16T17:17+09:00 | 2025-10-16T17:17+09:00 |
| jvndb-2025-000087 | Ruijie Networks RG-EST300 undocumented SSH functionality | 2025-10-16T14:19+09:00 | 2025-10-16T14:19+09:00 |
| jvndb-2025-016124 | Buffalo Wi-Fi router WXR9300BE6P series vulnerable to path traversal | 2025-10-16T11:16+09:00 | 2025-10-16T11:16+09:00 |
| jvndb-2025-000085 | Multiple RSUPPORT products may insecurely load Dynamic Link Libraries | 2025-10-15T15:55+09:00 | 2025-10-15T15:55+09:00 |
| jvndb-2025-000086 | Phoenix Contact CHARX SEC-3xxx vulnerable to code injection | 2025-10-15T15:54+09:00 | 2025-10-15T15:54+09:00 |
| jvndb-2025-000083 | BUFFALO NAS Navigator2 registers a Windows service with an unquoted file path | 2025-10-10T13:56+09:00 | 2025-10-10T13:56+09:00 |
| jvndb-2025-015451 | Multiple vulnerabilities in FUJI Electric V-SFT | 2025-10-09T13:39+09:00 | 2025-10-09T13:39+09:00 |
| jvndb-2025-000082 | The installers of DENSO TEN drive recorder viewer may insecurely load Dynamic Link Libraries | 2025-10-06T15:38+09:00 | 2025-10-06T15:38+09:00 |
| jvndb-2025-015061 | Trend Micro Antivirus for Mac vulnerable to Local Privilege Escalation | 2025-10-06T13:52+09:00 | 2025-10-06T13:52+09:00 |
| jvndb-2025-014967 | Multiple vulnerabilities in multiple Keyence products | 2025-10-03T11:19+09:00 | 2025-12-23T14:36+09:00 |
| jvndb-2025-014793 | NIHON KOHDEN Central Monitor CNS-6201 vulnerable to NULL pointer dereference | 2025-10-01T11:35+09:00 | 2025-10-27T12:28+09:00 |
| jvndb-2025-014642 | Multiple vulnerabilities in Canon Printer Drivers for Production Printers, Office/Small Office Multifunction Printers and Laser Printers | 2025-09-30T11:50+09:00 | 2025-09-30T11:50+09:00 |
| jvndb-2025-000081 | DataSpider Servista improper restriction of XML external entity references | 2025-09-29T14:44+09:00 | 2025-10-07T16:54+09:00 |
| jvndb-2025-014105 | OMRON SOCIAL SOLUTIONS Uninterruptible Power Supply (UPS) management application registers a Windows service with an unquoted file path | 2025-09-19T16:21+09:00 | 2025-09-19T16:21+09:00 |
| jvndb-2025-014104 | Multiple vulnerabilities in I-O DATA wireless LAN routers | 2025-09-19T14:58+09:00 | 2025-09-19T14:58+09:00 |
| jvndb-2025-014081 | Multiple Brother and its OEM products with weak initial administrator passwords | 2025-09-19T10:52+09:00 | 2025-09-19T10:52+09:00 |
| jvndb-2025-000079 | UNIVERGE IX/IX-R/IX-V series routers provided by NEC Corporation vulnerable to cross-site scripting | 2025-09-18T17:43+09:00 | 2025-09-18T17:43+09:00 |
| jvndb-2025-000078 | Century HW RAID Manager registers a Windows service with an unquoted file path | 2025-09-17T13:45+09:00 | 2025-09-17T13:45+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14835 | OpenClaw授权绕过漏洞(CNVD-2026-14835) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14834 | OpenClaw存在未明漏洞(CNVD-2026-14834) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14833 | OpenClaw身份验证绕过漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14832 | OpenClaw存在未明漏洞(CNVD-2026-14832) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14831 | OpenClaw授权绕过漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14830 | OpenClaw存在未明漏洞(CNVD-2026-14830) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14829 | OpenClaw存在未明漏洞(CNVD-2026-14829) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14828 | OpenClaw存在未明漏洞(CNVD-2026-14828) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14827 | OpenClaw数据伪造问题漏洞(CNVD-2026-14827) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14826 | OpenClaw信息泄露漏洞(CNVD-2026-14826) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14825 | OpenClaw拒绝服务漏洞(CNVD-2026-14825) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-15159 | Apache Airflow信息泄露漏洞(CNVD-2026-15159) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15158 | Apache Airflow信息泄露漏洞(CNVD-2026-15158) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15157 | Apache Airflow安全绕过漏洞(CNVD-2026-15157) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15156 | Apache Airflow信息泄露漏洞(CNVD-2026-15156) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15154 | HCL AION安全绕过漏洞 | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15153 | HCL AION存在未明漏洞(CNVD-2026-15153) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15151 | HCL AION存在未明漏洞(CNVD-2026-15151) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15150 | HCL AION存在未明漏洞(CNVD-2026-15150) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15149 | HCL AION存在未明漏洞(CNVD-2026-15149) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15148 | HCL AION存在未明漏洞(CNVD-2026-15148) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15147 | HCL AION存在未明漏洞(CNVD-2026-15147) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15146 | HCL AION SQL注入漏洞(CNVD-2026-15146) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15145 | HCL AION信息泄露漏洞(CNVD-2026-15145) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15144 | HCL AION SQL注入漏洞 | 2026-03-19 | 2026-03-23 |
| cnvd-2026-14969 | WordPress插件WpEvently信息泄露漏洞 | 2026-03-19 | 2026-03-26 |
| cnvd-2026-14968 | WordPress插件wpDiscuz信息泄露漏洞 | 2026-03-19 | 2026-03-26 |
| cnvd-2026-14686 | Belkin F9K1122堆栈缓冲区溢出漏洞(CNVD-2026-14686) | 2026-03-19 | 2026-03-24 |
| cnvd-2026-14680 | TRENDnet TEW-632BRP缓冲区溢出漏洞 | 2026-03-19 | 2026-03-24 |
| cnvd-2026-14390 | OpenClaw访问控制错误漏洞(CNVD-2026-14390) | 2026-03-19 | 2026-03-20 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01708 | Уязвимость функции commonprefix() модуля pip языка программирования Python, позволяющая н… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01707 | Уязвимость библиотеки обработки JSON-данных Json-smart, связанная с неконтролируемой реку… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01706 | Уязвимость функции toFixed() среды выполнения JavaScript-кода Rhino, позволяющая нарушите… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01705 | Уязвимость классов ManifestParser и AmazonS3 системы контроля версий Git на языке Java Ec… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01704 | Уязвимость компонента JSON Web Token Handler программного средства для управления иденти… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01703 | Уязвимость функции h2v2_merged_upsample_internal() библиотеки libjpeg-turbo, позволяющая … | 11.02.2026 | 11.02.2026 |
| bdu:2026-01702 | Уязвимость диспетчера окон рабочего стола (Desktop Window Manager) операционных систем Wi… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01701 | Уязвимость службы удаленного рабочего стола Remote Desktop Services (RDS) операционных си… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01700 | Уязвимость компонента MSHTML операционных систем Windows, позволяющая нарушителю обойти ф… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01699 | Уязвимость пакета программ Microsoft Office, связанная с использованием ненадежных входны… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01698 | Уязвимость службы Remote Access Connection Manager (RASMan) операционной системы Windows,… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01639 | Уязвимость функций virtio_queue_rqs() и virtblk_poll() модуля drivers/block/virtio_blk.c … | 11.02.2026 | 11.02.2026 |
| bdu:2026-01636 | Уязвимость функции felix_change_tag_protocol() модуля drivers/net/dsa/ocelot/felix.c драй… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01635 | Уязвимость анализатора XML-файлов Xerces2 Java, связанная с ошибками управления ресурсом,… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01634 | Уязвимость библиотеки синтаксического анализа XML Apache Xerces, связанная с выполнением … | 11.02.2026 | 11.02.2026 |
| bdu:2026-01633 | Уязвимость функции gfx_v9_0_hw_fini() модуля drivers/gpu/drm/amd/amdgpu/gfx_v9_0.c драйве… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01632 | Уязвимость компонента io.netty.handler.codec.http.HttpRequestEncoder сетевого программног… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01631 | Уязвимость функции nouveau_gem_prime_import_sg_table() модуля drivers/gpu/drm/nouveau/nou… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01630 | Уязвимость командной оболочки Shell операционных систем Windows, позволяющая нарушителю о… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01629 | Уязвимость функции efivar_ssdt_load() модуля drivers/firmware/efi/efi.c драйвера прошивок… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01628 | Уязвимость функции irdma_net_event() модуля drivers/infiniband/hw/irdma/utils.c драйвера … | 11.02.2026 | 11.02.2026 |
| bdu:2026-01627 | Уязвимость функции kimage_map_segment() модуля kernel/kexec_core.c ядра операционной сист… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01626 | Уязвимость функций rtw89_core_register_hw(), rtw89_pci_probe() модуля drivers/net/wireles… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01625 | Уязвимость инструмента создания сценариев веб-клиента системы для управления взаимоотноше… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01599 | Уязвимость функции drain_obj_stock() модуля mm/memcontrol.c подсистемы управления памятью… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01598 | Уязвимость функции f2fs_put_super() модуля fs/f2fs/super.c файловой системы F2FS ядра опе… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01570 | Уязвимость функции a7xx_patch_pwrup_reglist() модуля drivers/gpu/drm/msm/adreno/a6xx_gpu… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01569 | Уязвимость функции exynos_clkout_probe() модуля drivers/clk/samsung/clk-exynos-clkout.c д… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01568 | Уязвимость функции adv7842_cp_log_status() модуля drivers/media/i2c/adv7842.c драйвера му… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01567 | Уязвимость функции raid1_remove_disk() модуля drivers/md/raid1.c драйвера нескольких устр… | 11.02.2026 | 11.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201108-0148 | Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and… | 2026-04-10T23:26:02.507000Z |
| var-201904-1341 | A memory corruption issue was addressed with improved memory handling. This issue affecte… | 2026-04-10T23:25:27.834000Z |
| var-202210-1070 | An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions … | 2026-04-10T23:25:26.950000Z |
| var-202205-1299 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2026-04-10T23:25:25.876000Z |
| var-201006-1232 | Multiple integer overflows in the Fax3SetupState function in tif_fax3.c in the FAX3 decod… | 2026-04-10T23:25:24.129000Z |
| var-201804-1180 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2026-04-10T23:24:53.353000Z |
| var-201304-0189 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-04-10T23:24:53.092000Z |
| var-201210-0267 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-04-10T23:24:49.568000Z |
| var-202206-1961 | When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification fa… | 2026-04-10T23:24:46.149000Z |
| var-201710-0207 | Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GT… | 2026-04-10T23:24:45.096000Z |
| var-201103-0114 | The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x be… | 2026-04-10T23:24:36.765000Z |
| var-201912-0506 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-04-10T23:24:36.650000Z |
| var-200709-0495 | Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server bef… | 2026-04-10T23:24:05.770000Z |
| var-202201-0355 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. Summary: The Migra… | 2026-04-10T23:24:03.064000Z |
| var-201406-0445 | OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly re… | 2026-04-10T23:23:58.165000Z |
| var-201912-0636 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-04-10T23:23:57.746000Z |
| var-201512-0531 | The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not prop… | 2026-04-10T23:23:51.166000Z |
| var-201308-0259 | The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not prop… | 2026-04-10T23:23:07.436000Z |
| var-200810-0393 | Unspecified vulnerability in rlogind in the rlogin component in Mac OS X 10.4.11 and 10.5… | 2026-04-10T23:23:06.288000Z |
| var-201908-1840 | When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_dat… | 2026-04-10T23:22:10.837000Z |
| var-201304-0062 | Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, T… | 2026-04-10T23:21:40.444000Z |
| var-202002-1479 | A denial of service issue was addressed with improved memory handling. This issue is fixe… | 2026-04-10T23:21:40.368000Z |
| var-201105-0095 | lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 d… | 2026-04-10T23:21:38.300000Z |
| var-202003-1776 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2026-04-10T23:21:31.234000Z |
| var-200608-0035 | Unspecified vulnerability in ImageIO in Apple Mac OS X 10.4.7 allows user-assisted attack… | 2026-04-10T23:21:30.935000Z |
| var-201904-1404 | A use after free issue was addressed with improved memory management. This issue affected… | 2026-04-10T23:20:59.728000Z |
| var-200102-0021 | WatchGuard SOHO FireWall 2.2.1 and earlier allows remote attackers to cause a denial of s… | 2026-04-10T23:20:51.330000Z |
| var-201806-1469 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2026-04-10T23:20:47.406000Z |
| var-201302-0134 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-04-10T23:20:45.565000Z |
| var-202002-1243 | There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_re… | 2026-04-10T23:20:44.991000Z |