Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40305 |
4.3 (3.1)
|
DNN has Force Friend Request Acceptance |
dnnsoftware |
Dnn.Platform |
2026-04-17T21:06:09.237Z | 2026-04-20T13:36:06.644Z |
| CVE-2026-40351 |
9.8 (3.1)
|
FastGPT: NoSQL Injection in loginByPassword leads to A… |
labring |
FastGPT |
2026-04-17T21:05:05.911Z | 2026-04-20T14:57:15.664Z |
| CVE-2026-40304 |
5.3 (3.1)
|
zrok's broken ownership check in DELETE /api/v2/unacce… |
openziti |
zrok |
2026-04-17T21:04:23.648Z | 2026-04-20T14:57:24.486Z |
| CVE-2026-40303 |
7.5 (3.1)
|
zrok allows unauthenticated DoS via unbounded memory a… |
openziti |
zrok |
2026-04-17T21:01:51.899Z | 2026-04-20T16:19:07.291Z |
| CVE-2026-40196 |
8.1 (3.1)
|
HomeBox has Unauthorized API Access via Retained defau… |
sysadminsmedia |
homebox |
2026-04-17T21:01:18.530Z | 2026-04-20T13:36:06.776Z |
| CVE-2026-40302 |
6.1 (3.1)
|
zrok has reflected XSS in GitHub OAuth callback via un… |
openziti |
zrok |
2026-04-17T20:56:08.368Z | 2026-04-18T03:07:10.092Z |
| CVE-2026-40155 |
5.4 (3.1)
|
Auth0 Next.js SDK has Improper Proxy Cache Lookup |
auth0 |
nextjs-auth0 |
2026-04-17T20:54:38.958Z | 2026-04-20T14:57:32.023Z |
| CVE-2026-40301 |
4.7 (3.1)
|
rhukster/dom-sanitizer: SVG <style> tag allows CSS inj… |
rhukster |
dom-sanitizer |
2026-04-17T20:51:37.226Z | 2026-04-20T14:57:39.192Z |
| CVE-2026-40299 |
6.9 (4.0)
|
next-intl has an open redirect vulnerability |
amannn |
next-intl |
2026-04-17T20:49:05.642Z | 2026-04-20T15:58:51.149Z |
| CVE-2026-40293 |
6.5 (3.1)
|
OpenFGA Playground Preshared Key Exposure |
openfga |
openfga |
2026-04-17T20:47:06.804Z | 2026-04-20T16:19:40.914Z |
| CVE-2026-35603 |
5.4 (4.0)
|
Claude Code: Insecure System-Wide Configuration Loadin… |
anthropics |
claude-code |
2026-04-17T20:38:49.901Z | 2026-04-20T14:57:47.669Z |
| CVE-2026-35402 |
2.3 (4.0)
|
mcp-neo4j-cypher: SSRF and Data Modification via read_… |
neo4j-contrib |
mcp-neo4j |
2026-04-17T20:34:06.510Z | 2026-04-20T15:51:06.164Z |
| CVE-2026-33436 |
3.1 (3.1)
|
Stirling-PDF: Reflected XSS through crafted filename i… |
Stirling-Tools |
Stirling-PDF |
2026-04-17T20:29:43.262Z | 2026-04-20T16:20:16.137Z |
| CVE-2026-40286 |
7.5 (3.1)
|
WeGIA has Cross-Site Scripting in Controle de Contribuição |
LabRedesCefetRJ |
WeGIA |
2026-04-17T20:27:59.131Z | 2026-04-20T15:49:44.569Z |
| CVE-2026-23500 |
9.4 (4.0)
|
Dolibarr: OS Command Injection (RCE) via MAIN_ODT_AS_P… |
Dolibarr |
dolibarr |
2026-04-17T20:25:49.843Z | 2026-04-18T03:06:20.406Z |
| CVE-2026-40285 |
8.8 (3.1)
|
WeGIA has SQL Injection via Session Variable Override … |
LabRedesCefetRJ |
WeGIA |
2026-04-17T20:25:33.185Z | 2026-04-20T16:21:07.084Z |
| CVE-2026-40527 |
8.5 (4.0)
7.8 (3.1)
|
radare2 Command Injection via DWARF Parameter Names |
radareorg |
radare2 |
2026-04-17T20:25:20.143Z | 2026-04-20T14:20:04.639Z |
| CVE-2026-40284 |
6.8 (3.1)
|
WeGIA has stored XSS in listar_despachos.php |
LabRedesCefetRJ |
WeGIA |
2026-04-17T20:24:10.282Z | 2026-04-20T16:26:32.113Z |
| CVE-2026-35512 |
8.7 (4.0)
|
xrdp: Heap buffer overflow in EGFX channel |
neutrinolabs |
xrdp |
2026-04-17T20:21:59.868Z | 2026-04-22T03:55:37.686Z |
| CVE-2026-40282 |
6.4 (4.0)
|
WeGIA has stored XSS in intercorrencia_visualizar.php |
LabRedesCefetRJ |
WeGIA |
2026-04-17T20:16:46.878Z | 2026-04-20T14:57:55.798Z |
| CVE-2026-33689 |
8.7 (4.0)
|
xrdp: Pre-authentication out-of-bounds reads in channe… |
neutrinolabs |
xrdp |
2026-04-17T20:16:31.248Z | 2026-04-20T16:21:39.933Z |
| CVE-2026-33145 |
6.3 (3.1)
|
xrdp: Authenticated RCE via unsanitized AlternateShell… |
neutrinolabs |
xrdp |
2026-04-17T20:14:14.048Z | 2026-04-22T13:57:26.244Z |
| CVE-2026-40283 |
6.8 (3.1)
|
WeGIA has stored XSS in profile_paciente.php |
LabRedesCefetRJ |
WeGIA |
2026-04-17T20:03:14.016Z | 2026-04-20T14:58:05.365Z |
| CVE-2026-32624 |
6.3 (4.0)
|
xrdp: Heap buffer overflow in xrdp_sec_process_logon_i… |
neutrinolabs |
xrdp |
2026-04-17T19:58:08.687Z | 2026-04-20T16:22:13.525Z |
| CVE-2026-33516 |
7.7 (4.0)
|
xrdp: Pre-authentication out-of-bounds reads in RDP ca… |
neutrinolabs |
xrdp |
2026-04-17T19:56:11.990Z | 2026-04-20T15:43:53.801Z |
| CVE-2026-32650 |
7.5 (3.1)
|
Anviz CrossChex Standard Algorithm Downgrade |
Anviz |
Anviz CrossChex Standard |
2026-04-17T19:52:45.308Z | 2026-04-17T20:26:17.922Z |
| CVE-2026-40434 |
8.1 (3.1)
|
Anviz CrossChex Standard Improper Verification of Sour… |
Anviz |
Anviz CrossChex Standard |
2026-04-17T19:49:28.099Z | 2026-04-17T20:28:02.785Z |
| CVE-2026-35682 |
8.8 (3.1)
|
Anviz CX2 Lite Command Injection |
Anviz |
Anviz CX2 Lite Firmware |
2026-04-17T19:46:26.716Z | 2026-04-17T20:30:18.510Z |
| CVE-2026-32623 |
7.7 (4.0)
|
xrdp: Heap buffer overflow in NeutrinoRDP channel reassembly |
neutrinolabs |
xrdp |
2026-04-17T19:43:58.682Z | 2026-04-22T03:55:35.336Z |
| CVE-2026-40066 |
8.8 (3.1)
|
Anviz Products Download of Code Without Integrity Check |
Anviz |
Anviz CX7 Firmware |
2026-04-17T19:43:20.709Z | 2026-04-17T20:00:36.786Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40481 |
8.2 (4.0)
|
monetr: Unauthenticated Stripe webhook reads attacker-… |
monetr |
monetr |
2026-04-17T22:54:57.545Z | 2026-04-20T13:36:05.862Z |
| CVE-2026-40479 |
5.4 (3.1)
|
Kimai: Stored XSS via Incomplete HTML Attribute Escapi… |
kimai |
kimai |
2026-04-17T22:31:29.930Z | 2026-04-20T16:16:41.880Z |
| CVE-2026-2434 |
6.4 (3.1)
|
Pz-LinkCard <= 2.5.8.1 - Authenticated (Contributor+) … |
poporon |
Pz-LinkCard |
2026-04-17T22:27:13.525Z | 2026-04-20T13:36:06.124Z |
| CVE-2026-5720 |
7.1 (4.0)
|
miniupnpd Integer Underflow SOAPAction Header Parsing |
miniupnp project |
miniupnpd |
2026-04-17T21:39:54.818Z | 2026-04-20T16:59:21.060Z |
| CVE-2026-40478 |
9.1 (3.1)
|
Improper neutralization of specific syntax patterns fo… |
thymeleaf |
thymeleaf |
2026-04-17T21:57:01.560Z | 2026-04-22T03:55:42.682Z |
| CVE-2026-40477 |
9.1 (3.1)
|
Improper restriction of the scope of accessible object… |
thymeleaf |
thymeleaf |
2026-04-17T21:53:47.271Z | 2026-04-22T03:55:41.093Z |
| CVE-2026-40476 |
6.9 (4.0)
|
graphql-php: Denial of Service via quadratic complexit… |
webonyx |
graphql-php |
2026-04-17T21:42:59.511Z | 2026-04-20T14:56:57.812Z |
| CVE-2026-40474 |
7.6 (3.1)
|
wger has Broken Access Control in the Global Gym Confi… |
wger-project |
wger |
2026-04-17T21:39:03.677Z | 2026-04-20T16:08:12.427Z |
| CVE-2026-40353 |
5.1 (4.0)
|
wger: Stored XSS via Unescaped License Attribution Fields |
wger-project |
wger |
2026-04-17T21:16:12.401Z | 2026-04-20T16:17:52.305Z |
| CVE-2026-40352 |
8.8 (3.1)
|
FastGPT: NoSQL Injection in updatePasswordByOld Leads … |
labring |
FastGPT |
2026-04-17T21:09:32.913Z | 2026-04-20T13:36:06.464Z |
| CVE-2026-40351 |
9.8 (3.1)
|
FastGPT: NoSQL Injection in loginByPassword leads to A… |
labring |
FastGPT |
2026-04-17T21:05:05.911Z | 2026-04-20T14:57:15.664Z |
| CVE-2026-40321 |
8.1 (3.1)
|
DotNetNuke.Core has stored cross-site-scripting (XSS) … |
dnnsoftware |
Dnn.Platform |
2026-04-17T21:10:33.192Z | 2026-04-22T03:55:44.141Z |
| CVE-2026-40306 |
6.9 (4.0)
|
DNN has same HostGUID for all new installs |
dnnsoftware |
Dnn.Platform |
2026-04-17T21:09:30.317Z | 2026-04-20T16:18:27.508Z |
| CVE-2026-40305 |
4.3 (3.1)
|
DNN has Force Friend Request Acceptance |
dnnsoftware |
Dnn.Platform |
2026-04-17T21:06:09.237Z | 2026-04-20T13:36:06.644Z |
| CVE-2026-40304 |
5.3 (3.1)
|
zrok's broken ownership check in DELETE /api/v2/unacce… |
openziti |
zrok |
2026-04-17T21:04:23.648Z | 2026-04-20T14:57:24.486Z |
| CVE-2026-40258 |
9.1 (3.1)
|
Gramps Web API has Zip Slip Path Traversal in Media Ar… |
gramps-project |
gramps-web-api |
2026-04-17T21:12:54.226Z | 2026-04-20T15:48:41.690Z |
| CVE-2026-29013 |
8.8 (4.0)
|
libcoap Out-of-Bounds Read in OSCORE CBOR Unwrap Handling |
libcoap |
libcoap |
2026-04-17T21:11:38.137Z | 2026-04-20T16:46:56.223Z |
| CVE-2026-40527 |
8.5 (4.0)
7.8 (3.1)
|
radare2 Command Injection via DWARF Parameter Names |
radareorg |
radare2 |
2026-04-17T20:25:20.143Z | 2026-04-20T14:20:04.639Z |
| CVE-2026-40303 |
7.5 (3.1)
|
zrok allows unauthenticated DoS via unbounded memory a… |
openziti |
zrok |
2026-04-17T21:01:51.899Z | 2026-04-20T16:19:07.291Z |
| CVE-2026-40302 |
6.1 (3.1)
|
zrok has reflected XSS in GitHub OAuth callback via un… |
openziti |
zrok |
2026-04-17T20:56:08.368Z | 2026-04-18T03:07:10.092Z |
| CVE-2026-40301 |
4.7 (3.1)
|
rhukster/dom-sanitizer: SVG <style> tag allows CSS inj… |
rhukster |
dom-sanitizer |
2026-04-17T20:51:37.226Z | 2026-04-20T14:57:39.192Z |
| CVE-2026-40299 |
6.9 (4.0)
|
next-intl has an open redirect vulnerability |
amannn |
next-intl |
2026-04-17T20:49:05.642Z | 2026-04-20T15:58:51.149Z |
| CVE-2026-40293 |
6.5 (3.1)
|
OpenFGA Playground Preshared Key Exposure |
openfga |
openfga |
2026-04-17T20:47:06.804Z | 2026-04-20T16:19:40.914Z |
| CVE-2026-40286 |
7.5 (3.1)
|
WeGIA has Cross-Site Scripting in Controle de Contribuição |
LabRedesCefetRJ |
WeGIA |
2026-04-17T20:27:59.131Z | 2026-04-20T15:49:44.569Z |
| CVE-2026-40285 |
8.8 (3.1)
|
WeGIA has SQL Injection via Session Variable Override … |
LabRedesCefetRJ |
WeGIA |
2026-04-17T20:25:33.185Z | 2026-04-20T16:21:07.084Z |
| CVE-2026-40284 |
6.8 (3.1)
|
WeGIA has stored XSS in listar_despachos.php |
LabRedesCefetRJ |
WeGIA |
2026-04-17T20:24:10.282Z | 2026-04-20T16:26:32.113Z |
| CVE-2026-40282 |
6.4 (4.0)
|
WeGIA has stored XSS in intercorrencia_visualizar.php |
LabRedesCefetRJ |
WeGIA |
2026-04-17T20:16:46.878Z | 2026-04-20T14:57:55.798Z |
| CVE-2026-40196 |
8.1 (3.1)
|
HomeBox has Unauthorized API Access via Retained defau… |
sysadminsmedia |
homebox |
2026-04-17T21:01:18.530Z | 2026-04-20T13:36:06.776Z |
| CVE-2026-40155 |
5.4 (3.1)
|
Auth0 Next.js SDK has Improper Proxy Cache Lookup |
auth0 |
nextjs-auth0 |
2026-04-17T20:54:38.958Z | 2026-04-20T14:57:32.023Z |
| CVE-2026-35603 |
5.4 (4.0)
|
Claude Code: Insecure System-Wide Configuration Loadin… |
anthropics |
claude-code |
2026-04-17T20:38:49.901Z | 2026-04-20T14:57:47.669Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-pq96-pwvg-vrr9 |
6.5 (3.1)
|
frp has an authentication bypass in HTTP vhost routing when routeByHTTPUser is used for access control | 2026-04-14T23:33:15Z | 2026-04-14T23:33:15Z |
| ghsa-x928-4434-crqj |
3.7 (3.1)
|
ImageMagick has a memory leak in PNG encoder when writing a MNG image | 2026-04-14T23:32:44Z | 2026-04-16T15:49:58Z |
| ghsa-pmpg-6pww-fg6q |
3.3 (3.1)
|
ImageMagick has out-of-bounds access in ConnectedComponentsImage() via CLI-controlled connected-com… | 2026-04-14T23:32:35Z | 2026-04-16T15:54:56Z |
| ghsa-8vfj-q2cp-5m5j |
3.3 (3.1)
|
ImageMagick has a heap buffer overflow read in magnify operation via unrecognized magnify:method value | 2026-04-14T23:32:22Z | 2026-04-16T15:33:26Z |
| ghsa-98cp-rj9f-6v5g |
6.9 (3.1)
|
ImageMagick has has a stack-buffer-overflow in MNG encoder with oversized pallete | 2026-04-14T23:31:52Z | 2026-04-16T15:16:07Z |
| ghsa-q8h3-jv9v-57qx |
3.3 (3.1)
|
ImageMagick has has an off-by-one origin validation in allows out-of-bounds read in morphology processing | 2026-04-14T23:31:38Z | 2026-04-16T15:32:16Z |
| ghsa-w54j-7wpm-crhj |
3.3 (3.1)
|
ImageMagick has a heap-buffer-overflow in FTXT encoder | 2026-04-14T23:31:31Z | 2026-04-16T15:48:06Z |
| ghsa-w3x6-4m5h-cxqf |
7.5 (3.1)
|
Microsoft Security Advisory CVE-2026-26171 – .NET Denial of Service Vulnerability | 2026-04-14T23:31:08Z | 2026-04-17T13:20:49Z |
| ghsa-37gx-xxp4-5rgx |
7.5 (3.1)
|
Microsoft Security Advisory CVE-2026-33116 – .NET, .NET Framework, and Visual Studio Denial of Serv… | 2026-04-14T23:30:27Z | 2026-04-17T13:19:57Z |
| ghsa-vmwf-m9c5-3jvc |
0.0 (3.1)
|
Microsoft Security Advisory CVE-2026-32178 – .NET Spoofing Vulnerability | 2026-04-14T23:27:52Z | 2026-04-14T23:27:52Z |
| ghsa-pq8p-wc4f-vg7j |
8.8 (4.0)
|
WWBN AVideo has an incomplete fix for CVE-2026-33502: Command Injection | 2026-04-14T23:27:18Z | 2026-04-14T23:27:18Z |
| ghsa-m7r8-6q9j-m2hc |
5.9 (4.0)
|
WWBN AVideo has an incomplete fix for CVE-2026-33500: XSS | 2026-04-14T23:25:28Z | 2026-04-14T23:25:28Z |
| ghsa-m63r-m9jh-3vc6 |
6.5 (3.1)
|
WWBN AVideo has an Incomplete fix: Directory traversal bypass via query string in ReceiveImage down… | 2026-04-14T23:23:14Z | 2026-04-14T23:23:14Z |
| ghsa-26wg-9xf2-q495 |
8.1 (3.1)
|
Novu has a XSS sanitization bypass | 2026-04-14T23:23:01Z | 2026-04-14T23:23:01Z |
| ghsa-4x48-cgf9-q33f |
|
Novu has SSRF via conditions filter webhook bypasses validateUrlSsrf() protection | 2026-04-14T23:22:48Z | 2026-04-14T23:22:48Z |
| ghsa-8pv3-29pp-pf8f |
5.4 (3.1)
|
WWBN AVideo has Stored XSS via Unanchored Duration Regex in Video Encoder Receiver | 2026-04-14T23:22:21Z | 2026-04-14T23:22:21Z |
| ghsa-j432-4w3j-3w8j |
7.7 (3.1)
|
WWBN AVideo has a SSRF via same-domain hostname with alternate port bypasses isSSRFSafeURL | 2026-04-14T23:22:01Z | 2026-04-14T23:22:01Z |
| ghsa-5879-4fmr-xwf2 |
6.9 (4.0)
|
WWBN AVideo has an incomplete fix for CVE-2026-33293: Path Traversal | 2026-04-14T23:21:31Z | 2026-04-14T23:21:31Z |
| ghsa-ff5q-cc22-fgp4 |
7.1 (3.1)
|
WWBN AVideo has a CORS Origin Reflection Bypass via plugin/API/router.php and allowOrigin(true) Exp… | 2026-04-14T23:18:28Z | 2026-04-14T23:18:28Z |
| ghsa-ccq9-r5cw-5hwq |
8.1 (3.1)
|
WWBN AVideo has CORS Origin Reflection with Credentials on Sensitive API Endpoints Enables Cross-Or… | 2026-04-14T23:18:19Z | 2026-04-14T23:18:19Z |
| ghsa-793q-xgj6-7frp |
5.3 (3.1)
|
WWBN AVideo has an incomplete fix for CVE-2026-33039: SSRF | 2026-04-14T23:15:43Z | 2026-04-14T23:15:43Z |
| ghsa-7jrq-q4pq-rhm6 |
8.0 (4.0)
|
Oxia's TLS CA certificate chain validation fails with multi-certificate PEM bundles | 2026-04-14T23:15:16Z | 2026-04-14T23:15:16Z |
| ghsa-5gqc-qhrj-9xw8 |
8.7 (4.0)
|
Oxia affected by server crash via race condition in session heartbeat handling | 2026-04-14T23:15:00Z | 2026-04-14T23:15:00Z |
| ghsa-fhvp-9hcj-6m33 |
9.3 (4.0)
|
Oxia has an OIDC token audience validation bypass via SkipClientIDCheck | 2026-04-14T23:14:49Z | 2026-04-14T23:14:49Z |
| ghsa-pm7q-rjjx-979p |
|
Oxia exposes bearer token in debug log messages on authentication failure | 2026-04-14T23:14:38Z | 2026-04-14T23:14:38Z |
| ghsa-7xjm-g8f4-rp26 |
5.4 (4.0)
|
Giskard has Unsandboxed Jinja2 Template Rendering in ConformityCheck | 2026-04-14T23:13:52Z | 2026-04-14T23:13:52Z |
| ghsa-rq2q-4r55-9877 |
1.0 (4.0)
|
Giskard has a Regular Expression Denial of Service (ReDoS) in RegexMatching Check | 2026-04-14T23:13:39Z | 2026-04-14T23:13:39Z |
| ghsa-hg7g-56h5-5pqr |
5.3 (3.1)
|
CAPTCHA Bypass in WWBN/AVideo via Attacker-Controlled Length Parameter and Missing Token Invalidati… | 2026-04-14T23:13:21Z | 2026-04-14T23:13:21Z |
| ghsa-8qm8-g55h-xmqr |
5.4 (3.1)
|
WWBN AVideo is missing CSRF protection in objects/commentDelete.json.php enables mass comment delet… | 2026-04-14T23:13:08Z | 2026-04-14T23:13:09Z |
| ghsa-x2pw-9c38-cp2j |
5.4 (3.1)
|
WWBN AVideo: Missing CSRF Protection on State-Changing JSON Endpoints Enables Forced Comment Creati… | 2026-04-14T23:12:53Z | 2026-04-14T23:12:53Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-503 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:55.002066Z |
| pysec-2021-502 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:54.849798Z |
| pysec-2021-501 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:54.700321Z |
| pysec-2021-500 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:54.530775Z |
| pysec-2021-499 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:54.370426Z |
| pysec-2021-498 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:54.218525Z |
| pysec-2021-497 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:54.064557Z |
| pysec-2021-496 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:53.905703Z |
| pysec-2021-495 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:53.752999Z |
| pysec-2021-494 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can wr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:53.596467Z |
| pysec-2021-493 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:53.440506Z |
| pysec-2021-492 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:53.290029Z |
| pysec-2021-491 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:53.142665Z |
| pysec-2021-490 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:52.986581Z |
| pysec-2021-489 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:52.832408Z |
| pysec-2021-488 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:52.680803Z |
| pysec-2021-487 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ac… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:52.523360Z |
| pysec-2021-486 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:52.373382Z |
| pysec-2021-485 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:52.215362Z |
| pysec-2021-484 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:52.071121Z |
| pysec-2021-483 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.920437Z |
| pysec-2021-481 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can re… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.614588Z |
| pysec-2021-480 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.420468Z |
| pysec-2021-479 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.250544Z |
| pysec-2021-478 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.099370Z |
| pysec-2021-477 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.949292Z |
| pysec-2021-476 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.800401Z |
| pysec-2021-475 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.647185Z |
| pysec-2021-474 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.495115Z |
| pysec-2021-473 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.345149Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1356 | Malicious code in b2b-common-cb-lib (npm) | 2026-03-12T01:56:30Z | 2026-04-01T12:28:01Z |
| mal-2026-1364 | Malicious code in svg-safety-tool (npm) | 2026-03-12T01:54:01Z | 2026-03-23T05:16:31Z |
| mal-2026-1353 | Malicious code in restrict-imports (npm) | 2026-03-12T01:46:24Z | 2026-03-23T05:16:30Z |
| mal-2026-1352 | Malicious code in jinja-template (npm) | 2026-03-12T01:46:24Z | 2026-03-23T05:16:28Z |
| mal-2026-1351 | Malicious code in faaladorcli (PyPI) | 2026-03-11T23:31:55Z | 2026-04-10T15:51:21Z |
| mal-2026-1350 | Malicious code in falador (PyPI) | 2026-03-11T23:30:12Z | 2026-04-10T15:51:21Z |
| mal-2026-1347 | Malicious code in f0-abstraction-resolver (npm) | 2026-03-11T21:06:33Z | 2026-03-23T05:16:27Z |
| mal-2026-1348 | Malicious code in locale-clamp-middleware (npm) | 2026-03-11T21:05:46Z | 2026-03-23T05:16:28Z |
| mal-2026-1349 | Malicious code in mabibilabub (npm) | 2026-03-11T20:55:51Z | 2026-03-23T05:16:28Z |
| mal-2026-1346 | Malicious code in ts-lint-builder (npm) | 2026-03-11T16:48:00Z | 2026-03-23T05:16:31Z |
| mal-2026-1345 | Malicious code in npm-builders (npm) | 2026-03-11T16:48:00Z | 2026-03-23T05:16:29Z |
| mal-2026-1344 | Malicious code in bignum-ts (npm) | 2026-03-11T16:48:00Z | 2026-03-23T05:16:25Z |
| mal-2026-1343 | Malicious code in chai-as-flex (npm) | 2026-03-11T13:24:37Z | 2026-04-16T15:42:08Z |
| mal-2026-1342 | Malicious code in collectables (PyPI) | 2026-03-11T12:41:02Z | 2026-03-11T12:41:02Z |
| mal-2026-1341 | Malicious code in collects (PyPI) | 2026-03-11T10:17:52Z | 2026-03-11T10:17:53Z |
| mal-2026-1339 | Malicious code in anontest123 (PyPI) | 2026-03-11T07:44:14Z | 2026-03-11T07:44:14Z |
| mal-2026-1340 | Malicious code in safetest123 (PyPI) | 2026-03-11T07:43:06Z | 2026-03-11T07:43:06Z |
| mal-2026-1338 | Malicious code in vite-chunker (npm) | 2026-03-11T06:26:49Z | 2026-03-23T05:16:31Z |
| mal-2026-1336 | Malicious code in tailwindcss-forms-bundler (npm) | 2026-03-11T06:26:49Z | 2026-03-23T05:16:31Z |
| mal-2026-1335 | Malicious code in tailwindcss-animate-framer (npm) | 2026-03-11T06:26:49Z | 2026-03-23T05:16:31Z |
| mal-2026-1333 | Malicious code in polygon-gamma-api (npm) | 2026-03-11T06:26:49Z | 2026-03-23T05:16:29Z |
| mal-2026-1328 | Malicious code in gamma-api-provider (npm) | 2026-03-11T06:26:49Z | 2026-03-23T05:16:27Z |
| mal-2026-1332 | Malicious code in mui-path-imports (npm) | 2026-03-11T06:19:33Z | 2026-04-28T04:47:58Z |
| mal-2026-1337 | Malicious code in typescript-urql (npm) | 2026-03-11T06:19:13Z | 2026-04-28T04:47:59Z |
| mal-2026-1326 | Malicious code in clean-order (npm) | 2026-03-11T06:19:13Z | 2026-04-28T04:47:57Z |
| mal-2026-1329 | Malicious code in google-camelcase (npm) | 2026-03-11T06:18:53Z | 2026-04-28T04:47:57Z |
| mal-2026-1334 | Malicious code in sort-export-all (npm) | 2026-03-11T06:17:53Z | 2026-04-28T04:47:59Z |
| mal-2026-1327 | Malicious code in filter-imports (npm) | 2026-03-11T06:17:33Z | 2026-04-28T04:47:57Z |
| mal-2026-1330 | Malicious code in import-zod (npm) | 2026-03-11T06:15:22Z | 2026-04-28T04:47:57Z |
| mal-2026-1331 | Malicious code in llm-oracle (npm) | 2026-03-11T05:58:11Z | 2026-04-16T15:42:09Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1524 | Drupal Module: Mehrere Schwachstellen | 2025-07-09T22:00:00.000+00:00 | 2025-07-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1523 | GitLab: Mehrere Schwachstellen | 2025-07-09T22:00:00.000+00:00 | 2025-07-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1522 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-09T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1521 | Jenkins Plugins: Mehrere Schwachstellen | 2025-07-09T22:00:00.000+00:00 | 2025-07-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1520 | Palo Alto Networks GlobalProtect App: Mehrere Schwachstellen | 2025-07-09T22:00:00.000+00:00 | 2025-07-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1519 | Juniper JUNOS: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2025-07-09T22:00:00.000+00:00 | 2025-10-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1518 | IBM App Connect Enterprise: Mehrere Schwachstellen | 2025-07-09T22:00:00.000+00:00 | 2025-07-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1517 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-08T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1516 | Golang Go: Schwachstelle ermöglicht Codeausführung | 2025-07-08T22:00:00.000+00:00 | 2025-09-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1515 | Adobe FrameMaker: Mehrere Schwachstellen | 2025-07-08T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1514 | Ivanti Connect Secure und Ivanti Policy Secure: Mehrere Schwachstellen | 2025-07-08T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1513 | Adobe ColdFusion: Mehrere Schwachstellen | 2025-07-08T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1512 | Keycloak: Kontoübernahme durch Manipulation des E-Mail-Verifizierungsprozesses | 2025-07-08T22:00:00.000+00:00 | 2025-07-28T22:00:00.000+00:00 |
| wid-sec-w-2025-1511 | ILIAS: Mehrere Schwachstellen | 2025-07-08T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1510 | Trend Micro Maximum Security: Schwachstelle ermöglicht Privilegieneskalation | 2025-07-08T22:00:00.000+00:00 | 2025-07-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1509 | IBM InfoSphere Data Replication (VSAM for z/OS Remote Source): Schwachstelle ermöglicht Denial of Service | 2025-07-08T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1508 | Irfan Skiljan IrfanView CADImage Plugin: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-07-08T22:00:00.000+00:00 | 2025-07-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1507 | ServiceNow Now Platform: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-08T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1506 | Zoom Video Communications Workplace und Rooms: Mehrere Schwachstellen | 2025-07-08T22:00:00.000+00:00 | 2025-07-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1505 | Citrix Systems Virtual Apps and Desktops: Schwachstelle ermöglicht Privilegieneskalation | 2025-07-08T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1504 | Spotfire Statistics Services: Schwachstelle ermöglicht Privilegieneskalation | 2025-07-08T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1503 | Adobe Experience Manager Forms und Adobe Experience Manager Screens: Mehrere Schwachstellen | 2025-07-08T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1502 | AMD Prozessor: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-07-08T22:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1501 | GNOME Remote Desktop: Schwachstelle ermöglicht Denial of Service | 2025-07-08T22:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2025-1500 | Adobe Connect: Schwachstelle ermöglicht Codeausführung | 2025-07-08T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1499 | Adobe Creative Cloud Applikationen: Mehrere Schwachstellen | 2025-07-08T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1498 | Ivanti Endpoint Manager: Mehrere Schwachstellen | 2025-07-08T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1497 | Broadcom Brocade SANnav: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-08T22:00:00.000+00:00 | 2025-07-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1496 | Microsoft Configuration Manager: Schwachstelle ermöglicht Codeausführung | 2025-07-08T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1495 | Microsoft Windows: Mehrere Schwachstellen | 2025-07-08T22:00:00.000+00:00 | 2025-09-02T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-130-06 | Mitsubishi Electric MELSOFT GT OPC UA | 2022-05-10T00:00:00.000000Z | 2022-05-10T00:00:00.000000Z |
| icsa-22-130-05 | AVEVA InTouch Access Anywhere and Plant SCADA Access Anywhere | 2022-05-10T00:00:00.000000Z | 2022-05-10T00:00:00.000000Z |
| icsa-22-130-04 | Eaton Intelligent Power Manager | 2022-05-10T00:00:00.000000Z | 2022-05-10T00:00:00.000000Z |
| icsa-22-130-03 | Eaton Intelligent Power Manager Infrastructure | 2022-05-10T00:00:00.000000Z | 2022-05-10T00:00:00.000000Z |
| icsa-22-130-02 | Eaton Intelligent Power Protector | 2022-05-10T00:00:00.000000Z | 2022-05-10T00:00:00.000000Z |
| icsa-22-130-01 | Adminer in Industrial Products | 2022-05-10T00:00:00.000000Z | 2022-05-10T00:00:00.000000Z |
| icsa-22-125-01 | Johnson Controls Metasys | 2022-05-05T00:00:00.000000Z | 2022-05-05T00:00:00.000000Z |
| icsa-22-123-01 | Yokogawa CENTUM and ProSafe-RS | 2022-05-03T00:00:00.000000Z | 2022-05-03T00:00:00.000000Z |
| icsa-22-118-01 | Johnson Controls Metasys | 2022-04-28T00:00:00.000000Z | 2022-04-28T00:00:00.000000Z |
| icsa-22-116-01 | Hitachi Energy System Data Manager | 2022-04-26T00:00:00.000000Z | 2022-04-26T00:00:00.000000Z |
| icsa-22-111-03 | Hitachi Energy MicroSCADA Pro/X SYS600 | 2022-04-21T00:00:00.000000Z | 2022-04-21T00:00:00.000000Z |
| icsa-22-111-02 | Johnson Controls Metasys SCT Pro | 2022-04-21T00:00:00.000000Z | 2022-04-21T00:00:00.000000Z |
| icsa-22-111-01 | Delta Electronics ASDA-Soft | 2022-04-21T00:00:00.000000Z | 2022-04-21T00:00:00.000000Z |
| icsa-22-109-05 | Elcomplus SmartPTT SCADA Server | 2022-04-19T00:00:00.000000Z | 2022-04-19T00:00:00.000000Z |
| icsa-22-109-04 | Elcomplus SmartPTT SCADA | 2022-04-19T00:00:00.000000Z | 2022-04-19T00:00:00.000000Z |
| icsa-22-109-03 | FANUC ROBOGUIDE Simulation Platform | 2022-04-19T00:00:00.000000Z | 2022-04-19T00:00:00.000000Z |
| icsa-22-109-02 | Automated Logic WebCTRL | 2022-04-19T00:00:00.000000Z | 2022-04-19T00:00:00.000000Z |
| icsa-22-109-01 | Interlogix Hills ComNav | 2022-04-19T00:00:00.000000Z | 2022-04-19T00:00:00.000000Z |
| icsa-22-104-03 | Red Lion DA50N | 2022-04-14T00:00:00.000000Z | 2022-04-14T00:00:00.000000Z |
| icsa-22-104-02 | Johnson Controls Metasys | 2022-04-14T00:00:00.000000Z | 2022-04-14T00:00:00.000000Z |
| icsa-22-104-01 | Delta Electronics DMARS | 2022-04-14T00:00:00.000000Z | 2022-04-14T00:00:00.000000Z |
| icsa-22-104-17 | Siemens Mendix | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-16 | Siemens TIA Administrator | 2022-04-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-104-15 | Siemens Simcenter Femap | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-14 | Siemens SIMATIC STEP 7 (TIA Portal) | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-12 | Siemens SIMATIC S7-400 | 2022-04-12T00:00:00.000000Z | 2023-04-11T00:00:00.000000Z |
| icsa-22-104-11 | Siemens SIMATIC Energy Manager | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-10 | Siemens SICAM A8000 | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-09 | Siemens SCALANCE X-300 Switches | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-08 | Siemens SCALANCE W1700 | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20191120-dna-sqlinjection | Cisco DNA Spaces: Connector SQL Injection Vulnerability | 2019-11-20T16:00:00+00:00 | 2019-11-20T16:00:00+00:00 |
| cisco-sa-20191120-dna-priv-esca | Cisco DNA Spaces: Connector Privilege Escalation Vulnerability | 2019-11-20T16:00:00+00:00 | 2019-11-20T16:00:00+00:00 |
| cisco-sa-20191120-dna-cmd-injection | Cisco DNA Spaces: Connector Command Injection Vulnerability | 2019-11-20T16:00:00+00:00 | 2019-11-20T16:00:00+00:00 |
| cisco-sa-20191120-cucm-sql | Cisco Unified Communications Manager SQL Injection Vulnerability | 2019-11-20T16:00:00+00:00 | 2020-02-06T17:00:15+00:00 |
| cisco-sa-20191112-asa-ftd-lua-rce | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Code Execution Vulnerability | 2019-11-12T13:15:00+00:00 | 2021-01-11T19:14:20+00:00 |
| cisco-sa-20191106-wsa-xss | Cisco Web Security Appliance Management Interface Cross-Site Scripting Vulnerability | 2019-11-06T16:00:00+00:00 | 2019-11-06T16:00:00+00:00 |
| cisco-sa-20191106-wsa-unauth-devreset | Cisco Web Security Appliance Unauthorized Device Reset Vulnerability | 2019-11-06T16:00:00+00:00 | 2019-11-06T16:00:00+00:00 |
| cisco-sa-20191106-wlc-dos | Cisco Wireless LAN Controller HTTP Parsing Engine Denial of Service Vulnerability | 2019-11-06T16:00:00+00:00 | 2020-05-11T15:58:49+00:00 |
| cisco-sa-20191106-webex-player | Cisco Webex Network Recording Player and Cisco Webex Player Arbitrary Code Execution Vulnerabilities | 2019-11-06T16:00:00+00:00 | 2019-11-06T16:00:00+00:00 |
| cisco-sa-20191106-wbs-privilege | Cisco Webex Network Recording Admin Page Privilege Escalation Vulnerability | 2019-11-06T16:00:00+00:00 | 2019-11-06T16:00:00+00:00 |
| cisco-sa-20191106-telepres-roomos-privesc | Cisco TelePresence Collaboration Endpoint, TelePresence Codec, and RoomOS Software Privilege Escalation Vulnerability | 2019-11-06T16:00:00+00:00 | 2019-11-06T16:00:00+00:00 |
| cisco-sa-20191106-telepres-roomos-dos | Cisco TelePresence Collaboration Endpoint and RoomOS Software Denial of Service Vulnerabilities | 2019-11-06T16:00:00+00:00 | 2019-11-06T16:00:00+00:00 |
| cisco-sa-20191106-telece-ros-eve | Cisco TelePresence Collaboration Endpoint and RoomOS Audio Eavesdropping Vulnerability | 2019-11-06T16:00:00+00:00 | 2019-11-06T16:00:00+00:00 |
| cisco-sa-20191106-spa500-script | Cisco Small Business SPA500 Series IP Phones Local Script Execution Vulnerability | 2019-11-06T16:00:00+00:00 | 2019-11-06T16:00:00+00:00 |
| cisco-sa-20191106-sbrv-cmd-x | Cisco Small Business RV016, RV042, RV042G, and RV082 Routers Arbitrary Command Execution Vulnerability | 2019-11-06T16:00:00+00:00 | 2022-12-15T22:19:50+00:00 |
| cisco-sa-20191106-sbr-cominj | Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Command Injection Vulnerability | 2019-11-06T16:00:00+00:00 | 2019-11-06T16:00:00+00:00 |
| cisco-sa-20191106-rv32x | Cisco Small Business RV320 and RV325 Dual Gigabit WAN Routers Issues | 2019-11-06T16:00:00+00:00 | 2019-11-06T16:00:00+00:00 |
| cisco-sa-20191106-rv0x2 | Cisco Small Business RV016, RV042, RV042G, and RV082 Routers Issues | 2019-11-06T16:00:00+00:00 | 2019-11-06T16:00:00+00:00 |
| cisco-sa-20191106-pi-epn-codex | Cisco Prime Infrastructure and Evolved Programmable Network Manager Remote Code Execution Vulnerability | 2019-11-06T16:00:00+00:00 | 2019-11-12T23:53:54+00:00 |
| cisco-sa-20191106-msa-open-redirect | Cisco Managed Services Accelerator Open Redirect Vulnerability | 2019-11-06T16:00:00+00:00 | 2019-11-06T16:00:00+00:00 |
| cisco-sa-20191106-idn-xss | Cisco Industrial Network Director Reflected Cross-Site Scripting Vulnerability | 2019-11-06T16:00:00+00:00 | 2019-11-06T16:00:00+00:00 |
| cisco-sa-20191016-wlc-ssh-dos | Cisco Wireless LAN Controller Secure Shell Denial of Service Vulnerability | 2019-10-16T16:00:00+00:00 | 2019-10-16T16:00:00+00:00 |
| cisco-sa-20191016-wlc-pathtrav | Cisco Wireless LAN Controller Path Traversal Vulnerability | 2019-10-16T16:00:00+00:00 | 2019-10-24T13:48:34+00:00 |
| cisco-sa-20191016-vcs-xss | Cisco Expressway Series and TelePresence Video Communication Server Cross-Site Scripting Vulnerability | 2019-10-16T16:00:00+00:00 | 2019-10-16T16:00:00+00:00 |
| cisco-sa-20191016-telepres-escalation | Cisco TelePresence Collaboration Endpoint Software Privilege Escalation Vulnerability | 2019-10-16T16:00:00+00:00 | 2019-10-16T16:00:00+00:00 |
| cisco-sa-20191016-tele-ce-privescal | Cisco TelePresence Collaboration Endpoint Software Privilege Escalation Vulnerability | 2019-10-16T16:00:00+00:00 | 2019-10-16T16:00:00+00:00 |
| cisco-sa-20191016-tele-ce-filewrite | Cisco TelePresence Collaboration Endpoint Software Arbitrary File Write Vulnerability | 2019-10-16T16:00:00+00:00 | 2019-10-16T16:00:00+00:00 |
| cisco-sa-20191016-tele-ce-file-ovrwrt | Cisco TelePresence Collaboration Endpoint Software Arbitrary File Overwrite Vulnerabilities | 2019-10-16T16:00:00+00:00 | 2019-10-16T16:00:00+00:00 |
| cisco-sa-20191016-tele-ce-cmdinj | Cisco TelePresence Collaboration Endpoint Software Command Injection Vulnerability | 2019-10-16T16:00:00+00:00 | 2019-10-16T16:00:00+00:00 |
| cisco-sa-20191016-spa-webui-dos | Cisco SPA100 Series Analog Telephone Adapters Web Management Interface Denial of Service Vulnerability | 2019-10-16T16:00:00+00:00 | 2019-10-16T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-59504 | Azure Monitor Agent Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59499 | Microsoft SQL Server Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59245 | Microsoft SharePoint Online Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-20T00:00:00.000Z |
| msrc_cve-2025-59240 | Microsoft Excel Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-49752 | Azure Bastion Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-21T00:00:00.000Z |
| msrc_cve-2025-47179 | Configuration Manager Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-30398 | Nuance PowerScribe 360 Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-66382 | In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time. | 2025-11-02T00:00:00.000Z | 2026-04-14T14:39:13.000Z |
| msrc_cve-2025-66221 | Werkzeug safe_join() allows Windows special device names | 2025-11-02T00:00:00.000Z | 2025-12-09T01:37:04.000Z |
| msrc_cve-2025-66031 | node-forge ASN.1 Unbounded Recursion | 2025-11-02T00:00:00.000Z | 2025-12-04T14:36:01.000Z |
| msrc_cve-2025-66030 | node-forge ASN.1 OID Integer Truncation | 2025-11-02T00:00:00.000Z | 2025-12-04T14:35:55.000Z |
| msrc_cve-2025-65018 | LIBPNG is vulnerable to a heap buffer overflow in `png_combine_row` triggered via `png_image_finish_read` | 2025-11-02T00:00:00.000Z | 2025-12-02T01:40:36.000Z |
| msrc_cve-2025-64720 | LIBPNG is vulnerable to a buffer overflow in `png_image_read_composite` via incorrect palette premultiplication | 2025-11-02T00:00:00.000Z | 2025-12-02T01:40:57.000Z |
| msrc_cve-2025-64713 | WebAssembly Micro Runtime frame_offset_bottom array bounds overflow in fast Interpreter mode when handling GET_GLOBAL(I32) followed by if opcode | 2025-11-02T00:00:00.000Z | 2025-12-01T14:38:21.000Z |
| msrc_cve-2025-64704 | WebAssembly Micro Runtime vulnerable to a segmentation fault in v128.store instruction | 2025-11-02T00:00:00.000Z | 2025-12-01T14:38:13.000Z |
| msrc_cve-2025-64506 | LIBPNG is vulnerable to a heap buffer over-read in `png_write_image_8bit` with grayscale+alpha or RGB/RGBA images | 2025-11-02T00:00:00.000Z | 2025-12-03T01:38:33.000Z |
| msrc_cve-2025-64505 | LIBPNG is vulnerable to a heap buffer overflow in `png_do_quantize` via malformed palette index | 2025-11-02T00:00:00.000Z | 2025-12-03T01:38:21.000Z |
| msrc_cve-2025-64437 | KubeVirt Isolation Detection Flaw Allows Arbitrary File Permission Changes | 2025-11-02T00:00:00.000Z | 2026-01-02T14:39:46.000Z |
| msrc_cve-2025-64436 | KubeVirt Excessive Role Permissions Could Enable Unauthorized VMI Migrations Between Nodes | 2025-11-02T00:00:00.000Z | 2026-03-03T14:57:31.000Z |
| msrc_cve-2025-64435 | KubeVirt VMI Denial-of-Service (DoS) Using Pod Impersonation | 2025-11-02T00:00:00.000Z | 2026-01-08T14:37:49.000Z |
| msrc_cve-2025-64434 | KubeVirt Improper TLS Certificate Management Handling Allows API Identity Spoofing | 2025-11-02T00:00:00.000Z | 2026-01-13T01:40:10.000Z |
| msrc_cve-2025-64433 | KubeVirt Arbitrary Container File Read | 2025-11-02T00:00:00.000Z | 2026-01-02T14:39:25.000Z |
| msrc_cve-2025-64432 | KubeVirt Affected by an Authentication Bypass in Kubernetes Aggregation Layer | 2025-11-02T00:00:00.000Z | 2026-01-02T14:39:19.000Z |
| msrc_cve-2025-64329 | containerd CRI server: Host memory exhaustion through Attach goroutine leak | 2025-11-02T00:00:00.000Z | 2025-12-07T01:47:05.000Z |
| msrc_cve-2025-64324 | KubeVirt Vulnerable to Arbitrary Host File Read and Write | 2025-11-02T00:00:00.000Z | 2025-12-17T14:35:11.000Z |
| msrc_cve-2025-62689 | NULL pointer dereference vulnerability exists in GNU libmicrohttpd v1.0.2 and earlier. The vulnerability was fixed in commit ff13abc on the master branch of the libmicrohttpd Git repository, after the v1.0.2 tag. A specially crafted packet sent by an attacker could cause a denial-of-service (DoS) condition. | 2025-11-02T00:00:00.000Z | 2025-11-25T01:40:58.000Z |
| msrc_cve-2025-61915 | OpenPrinting CUPS vulnerable to stack based out-of-bound write | 2025-11-02T00:00:00.000Z | 2026-01-02T14:40:04.000Z |
| msrc_cve-2025-61664 | Grub2: missing unregister call for normal_exit command may lead to use-after-free | 2025-11-02T00:00:00.000Z | 2026-01-08T14:40:13.000Z |
| msrc_cve-2025-61663 | Grub2: missing unregister call for normal commands may lead to use-after-free | 2025-11-02T00:00:00.000Z | 2026-01-08T14:40:24.000Z |
| msrc_cve-2025-61662 | Grub2: missing unregister call for gettext command may lead to use-after-free | 2025-11-02T00:00:00.000Z | 2026-01-08T14:40:01.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:14911-1 | tomcat-9.0.102-1.1 on GA media | 2025-03-19T00:00:00Z | 2025-03-19T00:00:00Z |
| opensuse-su-2025:14910-1 | govulncheck-vulndb-0.0.20250318T181448-1.1 on GA media | 2025-03-19T00:00:00Z | 2025-03-19T00:00:00Z |
| opensuse-su-2025:14909-1 | apptainer-1.3.6-5.1 on GA media | 2025-03-19T00:00:00Z | 2025-03-19T00:00:00Z |
| opensuse-su-2025:14908-1 | python311-Django4-4.2.20-1.1 on GA media | 2025-03-18T00:00:00Z | 2025-03-18T00:00:00Z |
| opensuse-su-2025:14907-1 | kured-1.17.1-1.1 on GA media | 2025-03-18T00:00:00Z | 2025-03-18T00:00:00Z |
| opensuse-su-2025:14906-1 | helm-3.17.2-1.1 on GA media | 2025-03-18T00:00:00Z | 2025-03-18T00:00:00Z |
| opensuse-su-2025:14905-1 | crane-0.20.3-2.1 on GA media | 2025-03-18T00:00:00Z | 2025-03-18T00:00:00Z |
| opensuse-su-2025:14904-1 | cadvisor-0.52.1-1.1 on GA media | 2025-03-18T00:00:00Z | 2025-03-18T00:00:00Z |
| opensuse-su-2025:14903-1 | assimp-devel-5.4.3-4.1 on GA media | 2025-03-18T00:00:00Z | 2025-03-18T00:00:00Z |
| opensuse-su-2025:14902-1 | rime-plum-1.0.3-1.1 on GA media | 2025-03-17T00:00:00Z | 2025-03-17T00:00:00Z |
| opensuse-su-2025:14901-1 | dcmtk-3.6.9-3.1 on GA media | 2025-03-17T00:00:00Z | 2025-03-17T00:00:00Z |
| opensuse-su-2025:14900-1 | copacetic-0.10.0-1.1 on GA media | 2025-03-17T00:00:00Z | 2025-03-17T00:00:00Z |
| opensuse-su-2025:14899-1 | wpa_supplicant-2.11-4.1 on GA media | 2025-03-16T00:00:00Z | 2025-03-16T00:00:00Z |
| opensuse-su-2025:14898-1 | nethack-3.4.3-6.1 on GA media | 2025-03-16T00:00:00Z | 2025-03-16T00:00:00Z |
| opensuse-su-2025:0091-1 | Security update for restic | 2025-03-15T11:01:16Z | 2025-03-15T11:01:16Z |
| opensuse-su-2025:14897-1 | tomcat10-10.1.35-1.1 on GA media | 2025-03-15T00:00:00Z | 2025-03-15T00:00:00Z |
| opensuse-su-2025:14896-1 | tomcat-9.0.99-1.1 on GA media | 2025-03-15T00:00:00Z | 2025-03-15T00:00:00Z |
| opensuse-su-2025:14895-1 | php8-8.3.19-1.1 on GA media | 2025-03-15T00:00:00Z | 2025-03-15T00:00:00Z |
| opensuse-su-2025:14894-1 | libexslt0-1.1.43-1.1 on GA media | 2025-03-15T00:00:00Z | 2025-03-15T00:00:00Z |
| opensuse-su-2025:14893-1 | govulncheck-vulndb-0.0.20250313T170021-1.1 on GA media | 2025-03-15T00:00:00Z | 2025-03-15T00:00:00Z |
| opensuse-su-2025:14892-1 | ed25519-java-0.3.0-6.1 on GA media | 2025-03-15T00:00:00Z | 2025-03-15T00:00:00Z |
| opensuse-su-2025:14891-1 | libzvbi-chains0-0.2.44-1.1 on GA media | 2025-03-13T00:00:00Z | 2025-03-13T00:00:00Z |
| opensuse-su-2025:14890-1 | hostapd-2.11-2.1 on GA media | 2025-03-13T00:00:00Z | 2025-03-13T00:00:00Z |
| opensuse-su-2025:14889-1 | govulncheck-vulndb-0.0.20250312T181707-1.1 on GA media | 2025-03-13T00:00:00Z | 2025-03-13T00:00:00Z |
| opensuse-su-2025:14888-1 | chromedriver-134.0.6998.88-1.1 on GA media | 2025-03-13T00:00:00Z | 2025-03-13T00:00:00Z |
| opensuse-su-2025:0090-1 | Security update for ark | 2025-03-12T17:29:59Z | 2025-03-12T17:29:59Z |
| opensuse-su-2025:0089-1 | Security update for chromium | 2025-03-12T17:29:57Z | 2025-03-12T17:29:57Z |
| opensuse-su-2025:14887-1 | tailscale-1.80.3-2.1 on GA media | 2025-03-12T00:00:00Z | 2025-03-12T00:00:00Z |
| opensuse-su-2025:14886-1 | stalld-1.19.8-1.1 on GA media | 2025-03-12T00:00:00Z | 2025-03-12T00:00:00Z |
| opensuse-su-2025:14885-1 | python313-3.13.2-3.1 on GA media | 2025-03-12T00:00:00Z | 2025-03-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:23842 | Red Hat Security Advisory: rsync security update | 2025-12-22T09:46:13+00:00 | 2026-03-18T03:14:33+00:00 |
| rhsa-2025:23834 | Red Hat Security Advisory: go-rpm-macros security update | 2025-12-22T09:38:58+00:00 | 2026-03-24T13:17:03+00:00 |
| rhsa-2025:23833 | Red Hat Security Advisory: go-rpm-macros security update | 2025-12-22T09:31:10+00:00 | 2026-03-24T13:17:03+00:00 |
| rhsa-2025:23789 | Red Hat Security Advisory: kernel security update | 2025-12-22T03:25:22+00:00 | 2026-03-18T03:11:39+00:00 |
| rhsa-2025:23744 | Red Hat Security Advisory: git-lfs security update | 2025-12-22T02:12:57+00:00 | 2026-03-18T03:14:32+00:00 |
| rhsa-2025:23745 | Red Hat Security Advisory: git-lfs security update | 2025-12-22T02:02:22+00:00 | 2026-03-18T03:14:32+00:00 |
| rhsa-2025:23742 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-12-22T01:58:29+00:00 | 2026-04-13T08:44:49+00:00 |
| rhsa-2025:23739 | Red Hat Security Advisory: mod_md security update | 2025-12-22T01:45:43+00:00 | 2026-03-18T03:14:48+00:00 |
| rhsa-2025:23743 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-12-22T01:45:22+00:00 | 2026-04-13T08:44:49+00:00 |
| rhsa-2025:23737 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2025-12-22T01:43:37+00:00 | 2026-04-14T07:56:43+00:00 |
| rhsa-2025:23746 | Red Hat Security Advisory: grafana security update | 2025-12-22T01:42:33+00:00 | 2026-04-14T07:56:44+00:00 |
| rhsa-2025:23747 | Red Hat Security Advisory: grafana security update | 2025-12-22T01:42:23+00:00 | 2026-04-14T07:56:45+00:00 |
| rhsa-2025:23733 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2025-12-22T01:38:52+00:00 | 2026-04-14T07:56:42+00:00 |
| rhsa-2025:23741 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2025-12-22T01:35:17+00:00 | 2026-04-14T07:56:44+00:00 |
| rhsa-2025:23732 | Red Hat Security Advisory: httpd:2.4 security update | 2025-12-22T01:33:02+00:00 | 2026-04-08T16:37:37+00:00 |
| rhsa-2025:23735 | Red Hat Security Advisory: keylime security update | 2025-12-22T01:29:17+00:00 | 2026-03-19T15:39:02+00:00 |
| rhsa-2025:23736 | Red Hat Security Advisory: grafana security update | 2025-12-22T01:28:57+00:00 | 2026-04-14T07:56:43+00:00 |
| rhsa-2025:23738 | Red Hat Security Advisory: mod_md security update | 2025-12-22T01:28:17+00:00 | 2026-03-18T03:14:51+00:00 |
| rhsa-2025:23740 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2025-12-22T01:19:27+00:00 | 2026-04-14T07:56:44+00:00 |
| rhsa-2025:23731 | Red Hat Security Advisory: RHEL AI 3.0 hdf5 security update | 2025-12-22T00:43:34+00:00 | 2026-03-18T03:15:00+00:00 |
| rhsa-2025:23730 | Red Hat Security Advisory: kpatch-patch-5_14_0-611_9_1 security update | 2025-12-22T00:37:17+00:00 | 2026-03-18T03:13:29+00:00 |
| rhsa-2025:23729 | Red Hat Security Advisory: opentelemetry-collector security update | 2025-12-22T00:22:42+00:00 | 2026-03-26T20:27:02+00:00 |
| rhsa-2025:23700 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-12-18T22:17:44+00:00 | 2026-04-02T19:13:11+00:00 |
| rhsa-2025:23663 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-12-18T20:18:01+00:00 | 2026-04-02T19:13:10+00:00 |
| rhsa-2025:23667 | Red Hat Security Advisory: git-lfs security update | 2025-12-18T19:18:19+00:00 | 2026-03-18T03:14:32+00:00 |
| rhsa-2025:23664 | Red Hat Security Advisory: opentelemetry-collector security update | 2025-12-18T18:53:08+00:00 | 2026-03-26T20:27:02+00:00 |
| rhsa-2025:23648 | Red Hat Security Advisory: ruby:3.3 security update | 2025-12-18T13:21:06+00:00 | 2026-03-18T03:14:54+00:00 |
| rhsa-2025:23342 | Red Hat Security Advisory: python3.9 security update | 2025-12-18T13:21:05+00:00 | 2026-04-13T20:00:08+00:00 |
| rhsa-2025:23343 | Red Hat Security Advisory: binutils security update | 2025-12-18T13:20:28+00:00 | 2026-04-13T20:00:08+00:00 |
| rhsa-2025:23325 | Red Hat Security Advisory: podman security update | 2025-12-18T13:20:27+00:00 | 2026-04-14T07:56:42+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0061-1 | Security update for ImageMagick | 2026-01-07T18:33:22Z | 2026-01-07T18:33:22Z |
| suse-su-2026:0060-1 | Security update for capstone | 2026-01-07T16:02:47Z | 2026-01-07T16:02:47Z |
| suse-su-2026:0059-1 | Security update for ImageMagick | 2026-01-07T16:01:56Z | 2026-01-07T16:01:56Z |
| suse-su-2026:20039-1 | Security update for the Linux Kernel | 2026-01-07T12:33:45Z | 2026-01-07T12:33:45Z |
| suse-su-2026:0053-1 | Security update for libpcap | 2026-01-07T11:03:52Z | 2026-01-07T11:03:52Z |
| suse-su-2026:20059-1 | Security update for the Linux Kernel | 2026-01-07T10:55:44Z | 2026-01-07T10:55:44Z |
| suse-su-2026:20022-1 | Security update of valkey | 2026-01-07T09:35:57Z | 2026-01-07T09:35:57Z |
| suse-su-2026:0052-1 | Security update for curl | 2026-01-07T09:28:37Z | 2026-01-07T09:28:37Z |
| suse-su-2026:0051-1 | Security update for curl | 2026-01-07T09:28:27Z | 2026-01-07T09:28:27Z |
| suse-su-2026:0050-1 | Security update for curl | 2026-01-07T09:28:15Z | 2026-01-07T09:28:15Z |
| suse-su-2026:0044-1 | Security update for mozjs60 | 2026-01-06T16:10:16Z | 2026-01-06T16:10:16Z |
| suse-su-2026:0043-1 | Security update for qemu | 2026-01-06T16:03:07Z | 2026-01-06T16:03:07Z |
| suse-su-2026:20038-1 | Security update for qemu | 2026-01-06T11:41:24Z | 2026-01-06T11:41:24Z |
| suse-su-2026:0042-1 | Security update for usbmuxd | 2026-01-06T10:34:56Z | 2026-01-06T10:34:56Z |
| suse-su-2026:0041-1 | Security update for rsync | 2026-01-06T10:33:33Z | 2026-01-06T10:33:33Z |
| suse-su-2026:0039-1 | Security update for qemu | 2026-01-06T10:31:23Z | 2026-01-06T10:31:23Z |
| suse-su-2026:0036-1 | Security update for libpcap | 2026-01-06T10:22:41Z | 2026-01-06T10:22:41Z |
| suse-su-2026:0034-1 | Security update for the Linux Kernel | 2026-01-05T19:29:28Z | 2026-01-05T19:29:28Z |
| suse-su-2026:0033-1 | Security update for the Linux Kernel | 2026-01-05T19:26:53Z | 2026-01-05T19:26:53Z |
| suse-su-2026:0032-1 | Security update for the Linux Kernel | 2026-01-05T19:24:53Z | 2026-01-05T19:24:53Z |
| suse-su-2026:0029-1 | Security update for the Linux Kernel | 2026-01-05T12:59:48Z | 2026-01-05T12:59:48Z |
| suse-su-2026:0028-1 | Security update for alloy | 2026-01-05T12:53:11Z | 2026-01-05T12:53:11Z |
| suse-su-2026:0027-1 | Security update for python3 | 2026-01-05T12:47:16Z | 2026-01-05T12:47:16Z |
| suse-su-2026:0025-1 | Security update for python312 | 2026-01-05T12:11:09Z | 2026-01-05T12:11:09Z |
| suse-su-2026:0024-1 | Security update for python313 | 2026-01-05T12:10:23Z | 2026-01-05T12:10:23Z |
| suse-su-2026:0023-1 | Security update for erlang26 | 2026-01-05T12:06:04Z | 2026-01-05T12:06:04Z |
| suse-su-2026:0022-1 | Security update for qemu | 2026-01-05T11:18:23Z | 2026-01-05T11:18:23Z |
| suse-su-2026:0021-1 | Security update for webkit2gtk3 | 2026-01-05T11:12:33Z | 2026-01-05T11:12:33Z |
| suse-su-2026:0020-1 | Security update for apache2 | 2026-01-05T11:08:42Z | 2026-01-05T11:08:42Z |
| suse-su-2026:0019-1 | Security update for apache2 | 2026-01-05T11:08:00Z | 2026-01-05T11:08:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:3627 | Moderate: kernel-rt security and bug fix update | 2024-06-05T00:00:00Z | 2024-06-05T18:36:45Z |
| alsa-2024:3626 | Moderate: libxml2 security update | 2024-06-05T00:00:00Z | 2024-06-05T18:34:23Z |
| alsa-2024:3619 | Moderate: kernel security and bug fix update | 2024-06-05T00:00:00Z | 2024-11-03T22:14:41Z |
| alsa-2024:3618 | Moderate: kernel update | 2024-06-05T00:00:00Z | 2024-06-05T17:12:40Z |
| alsa-2024:3546 | Moderate: ruby:3.1 security, bug fix, and enhancement update | 2024-06-03T00:00:00Z | 2024-06-04T07:46:24Z |
| alsa-2024:3513 | Important: less security update | 2024-05-30T00:00:00Z | 2024-05-30T20:11:01Z |
| alsa-2024:3501 | Moderate: nghttp2 security update | 2024-05-30T00:00:00Z | 2024-05-30T20:12:46Z |
| alsa-2024:3500 | Moderate: ruby:3.0 security update | 2024-05-30T00:00:00Z | 2024-05-31T14:51:49Z |
| alsa-2024:3466 | Important: python39:3.9 and python39-devel:3.9 security update | 2024-05-29T00:00:00Z | 2024-05-31T15:26:20Z |
| alsa-2024:3347 | Important: python3 security update | 2024-05-23T00:00:00Z | 2024-05-29T14:46:29Z |
| alsa-2024:3346 | Important: git-lfs security update | 2024-05-23T00:00:00Z | 2024-05-29T14:39:48Z |
| alsa-2024:3345 | Important: .NET 8.0 security update | 2024-05-23T00:00:00Z | 2024-05-29T14:47:21Z |
| alsa-2024:3344 | Important: glibc security update | 2024-05-23T00:00:00Z | 2024-05-29T14:51:56Z |
| alsa-2024:3343 | Important: xorg-x11-server-Xwayland security update | 2024-05-23T00:00:00Z | 2024-05-29T14:39:47Z |
| alsa-2024:3341 | Moderate: gdk-pixbuf2 security update | 2024-05-23T00:00:00Z | 2024-05-29T14:43:01Z |
| alsa-2024:3340 | Important: .NET 7.0 security update | 2024-05-23T00:00:00Z | 2024-05-29T14:45:35Z |
| alsa-2024:3339 | Important: glibc security update | 2024-05-23T00:00:00Z | 2024-05-28T10:19:14Z |
| alsa-2024:3307 | Important: tomcat security and bug fix update | 2024-05-23T00:00:00Z | 2024-05-28T10:01:45Z |
| alsa-2024:3306 | Moderate: kernel security and bug fix update | 2024-05-23T00:00:00Z | 2024-11-03T22:11:49Z |
| alsa-2024:3275 | Moderate: python-dns security update | 2024-05-22T00:00:00Z | 2024-05-29T14:42:55Z |
| alsa-2024:3271 | Important: bind and dhcp security update | 2024-05-22T00:00:00Z | 2024-05-29T14:48:47Z |
| alsa-2024:3270 | Moderate: sssd security update | 2024-05-22T00:00:00Z | 2024-05-29T14:49:20Z |
| alsa-2024:3269 | Important: glibc security update | 2024-05-22T00:00:00Z | 2024-05-29T16:16:09Z |
| alsa-2024:3268 | Low: krb5 security update | 2024-05-22T00:00:00Z | 2024-05-29T14:47:08Z |
| alsa-2024:3265 | Important: grafana security update | 2024-05-22T00:00:00Z | 2024-05-29T14:40:10Z |
| alsa-2024:3264 | Important: pcp security update | 2024-05-22T00:00:00Z | 2024-05-29T14:50:51Z |
| alsa-2024:3261 | Important: tigervnc security update | 2024-05-22T00:00:00Z | 2024-05-29T14:47:38Z |
| alsa-2024:3259 | Important: go-toolset:rhel8 security update | 2024-05-22T00:00:00Z | 2024-05-29T14:48:08Z |
| alsa-2024:3258 | Moderate: xorg-x11-server security update | 2024-05-22T00:00:00Z | 2024-05-29T14:44:29Z |
| alsa-2024:3254 | Important: container-tools:rhel8 security update | 2024-05-22T00:00:00Z | 2024-05-29T14:49:44Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-165 | Stack-buffer-overflow in fmt::v8::basic_memory_buffer<unsigned int, 32ul, std::__1::allocator<unsigned in | 2022-02-18T00:00:13.957825Z | 2022-04-13T03:04:33.946076Z |
| osv-2022-158 | Heap-buffer-overflow in parse_primitive | 2022-02-16T00:00:29.292668Z | 2022-04-13T03:04:39.859876Z |
| osv-2022-151 | Heap-buffer-overflow in extensionObjectOrder | 2022-02-14T00:00:57.573403Z | 2022-04-13T03:04:41.434067Z |
| osv-2022-150 | Heap-buffer-overflow in coap_split_uri_sub | 2022-02-14T00:00:50.308933Z | 2026-04-14T14:11:39.559701Z |
| osv-2022-149 | Heap-buffer-overflow in read_xref_stream_entries | 2022-02-14T00:00:48.224847Z | 2022-04-13T03:04:34.435603Z |
| osv-2022-147 | Heap-buffer-overflow in parse_primitive | 2022-02-13T00:01:52.104750Z | 2022-04-13T03:04:39.871047Z |
| osv-2021-1807 | Heap-use-after-free in dhcp6_no_relay | 2022-02-13T00:01:51.009220Z | 2022-04-13T03:04:31.136434Z |
| osv-2022-145 | Heap-buffer-overflow in print_mac | 2022-02-13T00:01:27.883603Z | 2022-04-13T03:04:31.179893Z |
| osv-2022-144 | Segv on unknown address in onig_free_body | 2022-02-13T00:00:46.389187Z | 2022-07-07T03:04:18.191141Z |
| osv-2022-142 | Heap-use-after-free in archive_read_format_rar_read_data | 2022-02-12T00:00:11.416771Z | 2022-04-13T03:04:41.195078Z |
| osv-2022-141 | Heap-use-after-free in nghttp2_hd_deflate_hd_bufs | 2022-02-11T00:01:56.941272Z | 2022-04-13T03:04:42.872996Z |
| osv-2022-139 | Heap-use-after-free in nghttp2_http_record_request_method | 2022-02-11T00:01:42.562895Z | 2022-04-13T03:04:42.843414Z |
| osv-2022-137 | Stack-buffer-overflow in LoadVoice | 2022-02-10T00:01:38.135452Z | 2022-04-13T03:04:34.254583Z |
| osv-2022-136 | Heap-buffer-overflow in cli_js_parse_done | 2022-02-10T00:01:30.573024Z | 2022-04-13T03:04:39.419617Z |
| osv-2022-134 | Heap-use-after-free in RDKit::Chirality::cleanupStereoGroups | 2022-02-10T00:00:40.784389Z | 2023-08-07T14:12:28.790532Z |
| osv-2022-133 | Heap-buffer-overflow in coap_split_uri_sub | 2022-02-10T00:00:28.319288Z | 2022-04-13T03:04:42.407417Z |
| osv-2022-129 | Heap-buffer-overflow in dwg_free_HATCH_private | 2022-02-09T00:00:11.798343Z | 2022-02-09T00:00:11.798577Z |
| osv-2022-128 | Stack-buffer-overflow in decompress_rNUMBER | 2022-02-07T00:00:43.453413Z | 2022-07-30T00:11:15.450699Z |
| osv-2022-127 | Heap-use-after-free in UA_ServerConfig_clean | 2022-02-07T00:00:13.222125Z | 2022-02-07T00:00:13.222344Z |
| osv-2022-126 | Heap-buffer-overflow in md_analyze_inlines | 2022-02-07T00:00:05.720107Z | 2026-04-20T14:05:37.342162Z |
| osv-2022-125 | Invalid-free in NIOHTTP2.NIOHTTP2Handler. | 2022-02-06T00:01:40.863807Z | 2022-04-13T03:04:36.950396Z |
| osv-2022-121 | Heap-buffer-overflow in s_hex_process | 2022-02-05T00:01:37.849252Z | 2022-04-13T03:04:34.673865Z |
| osv-2022-120 | Heap-buffer-overflow in ndpi_strncasestr | 2022-02-05T00:01:07.016269Z | 2022-04-13T03:04:36.281315Z |
| osv-2022-116 | Heap-buffer-overflow in parse_object | 2022-02-04T00:00:28.846023Z | 2022-04-13T03:04:39.876645Z |
| osv-2022-115 | UNKNOWN READ in unescape_string | 2022-02-04T00:00:20.060698Z | 2022-04-13T03:04:39.882511Z |
| osv-2022-114 | Heap-buffer-overflow in add_compile_string | 2022-02-04T00:00:10.501043Z | 2022-04-13T03:04:38.331653Z |
| osv-2022-112 | Heap-use-after-free in hb_bit_set_invertible_t::next | 2022-02-02T00:01:18.382284Z | 2022-04-13T03:04:33.242063Z |
| osv-2022-111 | Heap-use-after-free in OT::CoverageFormat1::intersected_coverage_glyphs | 2022-02-02T00:00:17.029431Z | 2022-04-13T03:04:33.208408Z |
| osv-2022-110 | Heap-buffer-overflow in ZSTD_compressLiterals | 2022-02-01T00:01:50.971611Z | 2022-04-13T03:04:31.686195Z |
| osv-2022-109 | UNKNOWN READ in unescape_string | 2022-02-01T00:01:34.223287Z | 2022-04-13T03:04:39.889052Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2024-11931 | Insufficient Granularity of Access Control in GitLab | 2025-01-28T07:25:07.907Z | 2025-08-06T06:08:07.957Z |
| bit-gitlab-2025-0314 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2025-01-28T07:10:14.614Z | 2025-08-06T06:08:07.957Z |
| bit-node-2025-23083 | 2025-01-27T07:15:43.637Z | 2025-07-23T06:06:57.881Z | |
| bit-node-2025-23087 | 2025-01-27T07:15:36.528Z | 2025-03-02T07:44:48.340Z | |
| bit-node-2025-23088 | 2025-01-27T07:15:29.521Z | 2025-03-02T07:44:48.340Z | |
| bit-node-2025-23089 | 2025-01-27T07:15:22.512Z | 2025-03-02T07:44:48.340Z | |
| bit-node-2025-23090 | 2025-01-27T07:15:14.518Z | 2025-07-19T06:08:14.411Z | |
| bit-mlflow-2024-3848 | Path Traversal Bypass in mlflow/mlflow | 2025-01-27T07:13:35.132Z | 2025-05-20T10:02:07.006Z |
| bit-kibana-2024-43707 | Kibana exposure of sensitive information to an unauthorized actor | 2025-01-27T07:12:51.527Z | 2025-10-01T15:14:38.852Z |
| bit-kibana-2024-43708 | 2025-01-27T07:12:44.021Z | 2025-04-03T14:40:37.652Z | |
| bit-kibana-2024-43710 | Kibana server-side request forgery | 2025-01-27T07:12:37.323Z | 2025-05-20T10:02:07.006Z |
| bit-kibana-2024-52972 | Kibana allocation of resources without limits or throttling leads to crash | 2025-01-27T07:12:30.819Z | 2025-05-20T10:02:07.006Z |
| bit-elk-2024-43707 | Kibana exposure of sensitive information to an unauthorized actor | 2025-01-27T07:10:02.513Z | 2025-10-01T15:14:38.852Z |
| bit-elk-2024-43708 | 2025-01-27T07:09:55.231Z | 2025-04-03T14:40:37.652Z | |
| bit-elk-2024-43710 | Kibana server-side request forgery | 2025-01-27T07:09:48.425Z | 2025-05-20T10:02:07.006Z |
| bit-elk-2024-52972 | Kibana allocation of resources without limits or throttling leads to crash | 2025-01-27T07:09:41.033Z | 2025-05-20T10:02:07.006Z |
| bit-cilium-2025-23028 | DoS in Cilium agent DNS proxy from crafted DNS responses | 2025-01-27T07:09:18.725Z | 2025-05-20T10:02:07.006Z |
| bit-cilium-2025-23047 | Cilium vulnerable to information leakage via insecure default Hubble UI CORS header | 2025-01-27T07:09:11.634Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-12431 | Missing Authorization in GitLab | 2025-01-10T19:24:59.289Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-13041 | Incorrect User Management in GitLab | 2025-01-10T19:24:39.902Z | 2025-08-06T06:08:07.957Z |
| bit-gitlab-2024-6324 | Inefficient Algorithmic Complexity in GitLab | 2025-01-10T19:17:23.895Z | 2025-05-20T10:02:07.006Z |
| bit-node-2024-27980 | 2025-01-10T19:16:46.586Z | 2025-04-03T14:40:37.652Z | |
| bit-node-2024-37372 | 2025-01-10T19:16:12.087Z | 2025-05-03T06:34:12.721Z | |
| bit-gitlab-2025-0194 | Insertion of Sensitive Information into Externally-Accessible File or Directory in GitLab | 2025-01-10T19:11:23.175Z | 2025-05-20T10:02:07.006Z |
| bit-valkey-2024-46981 | Redis' Lua library commands may lead to remote code execution | 2025-01-08T07:22:30.615Z | 2026-02-11T09:09:18.507Z |
| bit-valkey-2024-51741 | Redis allows denial-of-service due to malformed ACL selectors | 2025-01-08T07:22:23.019Z | 2026-02-11T09:09:18.507Z |
| bit-redis-2024-46981 | Redis' Lua library commands may lead to remote code execution | 2025-01-08T07:20:24.318Z | 2026-02-11T09:09:18.507Z |
| bit-redis-2024-51741 | Redis allows denial-of-service due to malformed ACL selectors | 2025-01-08T07:20:15.238Z | 2026-02-11T09:09:18.507Z |
| bit-keydb-2024-46981 | Redis' Lua library commands may lead to remote code execution | 2025-01-08T07:13:21.212Z | 2026-02-11T09:09:18.507Z |
| bit-keydb-2024-51741 | Redis allows denial-of-service due to malformed ACL selectors | 2025-01-08T07:13:13.917Z | 2026-02-11T09:09:18.507Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2024-avi-0985 | Multiples vulnérabilités dans Stormshield Network Security | 2024-11-14T00:00:00.000000 | 2024-11-14T00:00:00.000000 |
| certfr-2024-avi-0984 | Vulnérabilité dans les produits Symfony | 2024-11-14T00:00:00.000000 | 2024-11-14T00:00:00.000000 |
| certfr-2024-avi-0983 | Vulnérabilité dans les produits Mozilla | 2024-11-14T00:00:00.000000 | 2024-11-14T00:00:00.000000 |
| certfr-2024-avi-0982 | Vulnérabilité dans CPython | 2024-11-13T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| certfr-2024-avi-0981 | Multiples vulnérabilités dans GitLab | 2024-11-13T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| certfr-2024-avi-0980 | Multiples vulnérabilités dans les produits Intel | 2024-11-13T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| certfr-2024-avi-0979 | Multiples vulnérabilités dans les produits Fortinet | 2024-11-13T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| certfr-2024-avi-0978 | Multiples vulnérabilités dans les produits Microsoft | 2024-11-13T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| certfr-2024-avi-0977 | Multiples vulnérabilités dans Microsoft Azure | 2024-11-13T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| certfr-2024-avi-0976 | Multiples vulnérabilités dans Microsoft .Net | 2024-11-13T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| certfr-2024-avi-0975 | Multiples vulnérabilités dans Microsoft Windows | 2024-11-13T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| certfr-2024-avi-0974 | Multiples vulnérabilités dans Microsoft Office | 2024-11-13T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| certfr-2024-avi-0973 | Vulnérabilité dans les produits Citrix | 2024-11-13T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| certfr-2024-avi-0972 | Vulnérabilité dans les produits Adobe | 2024-11-13T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| certfr-2024-avi-0971 | Multiples vulnérabilités dans Grafana | 2024-11-13T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| certfr-2024-avi-0970 | Multiples vulnérabilités dans Google Chrome | 2024-11-13T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| certfr-2024-avi-0969 | Multiples vulnérabilités dans Synacor Zimbra Collaboration | 2024-11-13T00:00:00.000000 | 2024-11-20T00:00:00.000000 |
| certfr-2024-avi-0968 | Multiples vulnérabilités dans les produits Siemens | 2024-11-13T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| certfr-2024-avi-0967 | Multiples vulnérabilités dans les produits Ivanti | 2024-11-13T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| certfr-2024-avi-0966 | Multiples vulnérabilités dans Nagios XI | 2024-11-13T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| certfr-2024-avi-0965 | Multiples vulnérabilités dans les produits PrimX | 2024-11-13T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| certfr-2024-avi-0964 | Multiples vulnérabilités dans les produits Citrix | 2024-11-12T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| certfr-2024-avi-0963 | Multiples vulnérabilités dans Xen | 2024-11-12T00:00:00.000000 | 2024-11-12T00:00:00.000000 |
| certfr-2024-avi-0962 | Multiples vulnérabilités dans les produits SAP | 2024-11-12T00:00:00.000000 | 2024-11-12T00:00:00.000000 |
| certfr-2024-avi-0961 | Multiples vulnérabilités dans les produits Schneider Electric | 2024-11-12T00:00:00.000000 | 2024-11-12T00:00:00.000000 |
| certfr-2024-avi-0960 | Multiples vulnérabilités dans les produits Synology | 2024-11-12T00:00:00.000000 | 2024-11-12T00:00:00.000000 |
| certfr-2024-avi-0959 | Multiples vulnérabilités dans les produits NetApp | 2024-11-12T00:00:00.000000 | 2024-11-12T00:00:00.000000 |
| certfr-2024-avi-0958 | Multiples vulnérabilités dans les produits IBM | 2024-11-08T00:00:00.000000 | 2024-11-08T00:00:00.000000 |
| certfr-2024-avi-0957 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-11-08T00:00:00.000000 | 2024-11-08T00:00:00.000000 |
| certfr-2024-avi-0956 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2024-11-08T00:00:00.000000 | 2024-11-08T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000122 | Sushiro App fails to verify SSL server certificates | 2016-06-29T14:27+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000120 | DMM Movie Player App fails to verify SSL server certificates | 2016-06-27T14:23+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000106 | Multiple Hikari Denwa routers vulnerable to cross-site request forgery | 2016-06-27T14:19+09:00 | 2016-08-03T16:07+09:00 |
| jvndb-2016-000105 | Multiple Hikari Denwa routers vulnerable to OS command injection | 2016-06-27T14:10+09:00 | 2016-08-03T16:07+09:00 |
| jvndb-2016-000119 | QNAP QTS vulnerable to cross-site scripting | 2016-06-27T13:48+09:00 | 2016-08-03T14:55+09:00 |
| jvndb-2016-000118 | WordPress plugin "Welcart e-Commerce" vulnerable to session management | 2016-06-24T14:12+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000117 | WordPress plugin "Welcart e-Commerce" vulnerable to cross-site scripting | 2016-06-24T14:12+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000116 | WordPress plugin "Welcart e-Commerce" vulnerable to cross-site scripting | 2016-06-24T13:43+09:00 | 2016-06-29T16:05+09:00 |
| jvndb-2016-000115 | WordPress plugin "Welcart e-Commerce" vulnerable to PHP object injection | 2016-06-24T13:43+09:00 | 2016-06-29T16:04+09:00 |
| jvndb-2016-000109 | CG-WLR300GNV Series does not limit authentication attempts | 2016-06-22T14:57+09:00 | 2016-06-29T16:04+09:00 |
| jvndb-2016-000108 | CG-WLBARAGM vulnerable to denial-of-service (DoS) | 2016-06-22T14:57+09:00 | 2016-06-29T16:04+09:00 |
| jvndb-2016-000107 | CG-WLBARGL vulnerable to command injection | 2016-06-22T14:56+09:00 | 2016-06-29T16:03+09:00 |
| jvndb-2016-000113 | Apache Struts vulnerable to input validation bypass | 2016-06-20T17:20+09:00 | 2022-08-09T14:10+09:00 |
| jvndb-2016-000112 | Apache Struts vulnerable to validation bypass in Getter method | 2016-06-20T17:19+09:00 | 2022-08-09T14:08+09:00 |
| jvndb-2016-000111 | Apache Struts vulnerable to cross-site request forgery | 2016-06-20T17:18+09:00 | 2022-08-09T14:05+09:00 |
| jvndb-2016-000114 | Apache Struts vulnerable to denial-of-service (DoS) | 2016-06-20T16:36+09:00 | 2016-08-03T16:20+09:00 |
| jvndb-2016-000110 | Apache Struts vulnerable to remote code execution | 2016-06-20T16:36+09:00 | 2016-08-03T16:19+09:00 |
| jvndb-2016-000103 | Deep Discovery Inspector vulnerable to remote code execution | 2016-06-16T14:03+09:00 | 2016-07-12T15:03+09:00 |
| jvndb-2016-000101 | ETX-R vulnerable to denial-of-service (DoS) | 2016-06-14T14:00+09:00 | 2016-06-23T12:20+09:00 |
| jvndb-2016-000100 | ETX-R vulnerable to cross-site request forgery | 2016-06-14T13:55+09:00 | 2016-06-23T17:12+09:00 |
| jvndb-2016-000099 | DX Library vulnerable to remote code execution | 2016-06-08T14:30+09:00 | 2016-06-27T11:32+09:00 |
| jvndb-2016-000098 | TERASOLUNA Server Framework for Java(WEB) access restriction bypass vulnerability in the file extention filter | 2016-06-07T16:26+09:00 | 2016-06-27T11:32+09:00 |
| jvndb-2016-000097 | Apache Struts 1 vulnerable to input validation bypass | 2016-06-07T16:26+09:00 | 2016-12-05T16:59+09:00 |
| jvndb-2016-000096 | Apache Struts 1 vulnerability that allows unintended remote operations against components on memory | 2016-06-07T16:26+09:00 | 2017-02-20T15:42+09:00 |
| jvndb-2016-000089 | Trend Micro enterprise products HTTP header injection vulnerability | 2016-06-02T16:18+09:00 | 2016-06-22T17:58+09:00 |
| jvndb-2016-000088 | Trend Micro Internet Security vulnerable to arbitrary script execution | 2016-06-02T16:18+09:00 | 2016-06-22T18:08+09:00 |
| jvndb-2016-000074 | Trend Micro enterprise products directory traversal vulnerability | 2016-06-02T16:18+09:00 | 2016-06-22T17:56+09:00 |
| jvndb-2016-000073 | Trend Micro Internet Security access restriction flaw | 2016-06-02T16:18+09:00 | 2016-06-22T18:12+09:00 |
| jvndb-2016-000095 | Cybozu Garoon logging function vulnerable to directory traversal | 2016-05-30T16:18+09:00 | 2016-06-23T17:49+09:00 |
| jvndb-2016-000094 | Cybozu Garoon function "MultiReport" vulnerable to access restriction bypass | 2016-05-30T16:18+09:00 | 2016-06-28T17:01+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-30364 | Billing System password-recovery.php端点SQL注入漏洞 | 2025-12-09 | 2025-12-10 |
| cnvd-2025-30363 | Billing System admin/index.php端点SQL注入漏洞 | 2025-12-09 | 2025-12-10 |
| cnvd-2026-07244 | Google Chrome实现不当漏洞 | 2025-12-08 | 2026-01-22 |
| cnvd-2026-07243 | Google Chrome类型混淆漏洞 | 2025-12-08 | 2026-01-22 |
| cnvd-2026-04890 | Google Chrome释放后重用漏洞 | 2025-12-08 | 2026-01-19 |
| cnvd-2026-04889 | Google Chrome竞争条件漏洞 | 2025-12-08 | 2026-01-19 |
| cnvd-2026-04469 | 北京神州视翰科技有限公司远程医疗综合服务平台存在SQL注入漏洞(CNVD-C-2025-987341) | 2025-12-08 | 2026-01-21 |
| cnvd-2025-30979 | Advantech iView SQL注入漏洞 | 2025-12-08 | 2025-12-17 |
| cnvd-2025-30385 | Google Chrome Media Stream释放后重用漏洞(CNVD-2025-30385) | 2025-12-08 | 2025-12-09 |
| cnvd-2025-30384 | Claude Code代码执行漏洞 | 2025-12-08 | 2025-12-10 |
| cnvd-2026-04452 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-986300) | 2025-12-07 | 2026-01-21 |
| cnvd-2026-04451 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-986298) | 2025-12-07 | 2026-01-21 |
| cnvd-2026-07245 | Google Chrome释放后使用漏洞(CNVD-2026-07245) | 2025-12-05 | 2026-01-22 |
| cnvd-2026-04296 | 北京邦永科技有限公司PM2项目管理平台存在SQL注入漏洞(CNVD-C-2025-983218) | 2025-12-05 | 2026-01-19 |
| cnvd-2025-30386 | Google Chrome权限提升漏洞(CNVD-2025-30386) | 2025-12-05 | 2025-12-09 |
| cnvd-2026-04468 | 北京神州视翰科技有限公司远程医疗综合服务平台存在SQL注入漏洞(CNVD-C-2025-980402) | 2025-12-04 | 2026-01-21 |
| cnvd-2025-30213 | NVIDIA TAO资源加载漏洞 | 2025-12-04 | 2025-12-05 |
| cnvd-2025-29924 | Meta React Server Components远程代码执行漏洞 | 2025-12-04 | 2025-12-04 |
| cnvd-2025-29923 | ZEIT Next.js远程代码执行漏洞 | 2025-12-04 | 2025-12-04 |
| cnvd-2026-05362 | ChurchCRM 时间型盲SQL注入漏洞 | 2025-12-03 | 2026-01-19 |
| cnvd-2026-04449 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-976472) | 2025-12-03 | 2026-01-21 |
| cnvd-2026-04448 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-976469) | 2025-12-03 | 2026-01-21 |
| cnvd-2026-04447 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-976466) | 2025-12-03 | 2026-01-21 |
| cnvd-2026-04446 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-976462) | 2025-12-03 | 2026-01-21 |
| cnvd-2026-04445 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-976459) | 2025-12-03 | 2026-01-21 |
| cnvd-2026-04444 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-976458) | 2025-12-03 | 2026-01-21 |
| cnvd-2026-04443 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-976457) | 2025-12-03 | 2026-01-21 |
| cnvd-2026-04442 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-976455) | 2025-12-03 | 2026-01-21 |
| cnvd-2026-03544 | Blood Bank Management System rprofile.php组件跨站脚本漏洞 | 2025-12-03 | 2026-01-15 |
| cnvd-2026-03543 | Blood Bank Management System receiverLogin.php组件SQL注入漏洞 | 2025-12-03 | 2026-01-15 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-16357 | Уязвимость компонента Netmonitor браузеров Mozilla Firefox, Firefox ESR и почтового клиен… | 26.12.2025 | 13.01.2026 |
| bdu:2025-16356 | Уязвимость компонента Downloads Panel браузера Mozilla Firefox и почтового клиента Thunde… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16355 | Уязвимость компонента GMP браузера Mozilla Firefox и почтового клиента Thunderbird, позво… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16354 | Уязвимость JIT-компилятора браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thu… | 26.12.2025 | 13.01.2026 |
| bdu:2025-16353 | Уязвимость компонента RestFilter веб-интерфейса управления корпоративной системы управлен… | 26.12.2025 | 23.01.2026 |
| bdu:2025-16352 | Уязвимость платформы для совместной разработки Forgejo, связанная с недостатками механизм… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16351 | Уязвимость клиента реализации протокола Kermit пакета программного обеспечения для послед… | 26.12.2025 | 26.12.2025 |
| bdu:2025-16350 | Уязвимость плагина «Многофункциональный экспорт/импорт в Excel», связанная с недостаточно… | 26.12.2025 | 13.01.2026 |
| bdu:2025-16349 | Уязвимость плагина «Многофункциональный экспорт/импорт в Excel», связанная с неверным огр… | 26.12.2025 | 15.01.2026 |
| bdu:2025-16348 | Уязвимость конфигурации config.enableHelm: true пользовательского интерфейса Headlamp про… | 25.12.2025 | 25.12.2025 |
| bdu:2025-16347 | Уязвимость плагина Mattermost GitHub Plugin приложения для обмена мгновенными сообщениями… | 25.12.2025 | 25.12.2025 |
| bdu:2025-16346 | Уязвимость приложения для обмена мгновенными сообщениями Mattermost, связанная с переадре… | 25.12.2025 | 25.12.2025 |
| bdu:2025-16345 | Уязвимость библиотеки python-jose, связанная с некорректной обработкой сильно сжатых вход… | 25.12.2025 | 25.12.2025 |
| bdu:2025-16342 | Уязвимость программного обеспечения TrueConf Server, связанная с несоответствием ответов … | 25.12.2025 | 14.01.2026 |
| bdu:2025-16340 | Уязвимость модуля отображения веб-страниц WebKit операционных систем macOS, iOS и iPadOS,… | 25.12.2025 | 25.12.2025 |
| bdu:2025-16339 | Уязвимость модуля отображения веб-страниц WebKit операционных систем macOS, iOS и iPadOS,… | 25.12.2025 | 25.12.2025 |
| bdu:2025-16338 | Уязвимость модуля отображения веб-страниц WebKit операционных систем macOS, iOS и iPadOS,… | 25.12.2025 | 25.12.2025 |
| bdu:2025-16337 | Уязвимость функции handleServeStandalone() плагина Mattermost Calls приложения для обмена… | 25.12.2025 | 25.12.2025 |
| bdu:2025-16336 | Уязвимость компонента Downloads (Загрузки) браузера Firefox операционных систем iOS, позв… | 25.12.2025 | 25.12.2025 |
| bdu:2025-16332 | Уязвимость компонента интерфейса для людей с ограниченными возможностями браузера Firefox… | 25.12.2025 | 25.12.2025 |
| bdu:2025-16331 | Уязвимость платформы для унификации и упрощения рабочих процессов в области робототехники… | 25.12.2025 | 25.12.2025 |
| bdu:2025-16330 | Уязвимость комплексной платформы для тренировки и применения нейронных сетей в области об… | 25.12.2025 | 25.12.2025 |
| bdu:2025-16329 | Уязвимость комплексной платформы для тренировки и применения нейронных сетей в области об… | 25.12.2025 | 25.12.2025 |
| bdu:2025-16328 | Уязвимость модуля Checkpointing набора инструментов для повышения отказоустойчивости круп… | 25.12.2025 | 25.12.2025 |
| bdu:2025-16327 | Уязвимость службы Log Aggregator Service набора инструментов для повышения отказоустойчив… | 25.12.2025 | 25.12.2025 |
| bdu:2025-16326 | Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, поз… | 25.12.2025 | 25.12.2025 |
| bdu:2025-16325 | Уязвимость плагина «Импорт из Excel», связанная с неверным ограничением имени пути к ката… | 25.12.2025 | 15.01.2026 |
| bdu:2025-16324 | Уязвимость плагина «Экспорт/Импорт товаров в Excel», связанная с неверным ограничением им… | 25.12.2025 | 15.01.2026 |
| bdu:2025-16320 | Уязвимость обработчика JavaScript-сценариев V8 браузеров Google Chrome и Microsoft Edge, … | 24.12.2025 | 24.12.2025 |
| bdu:2025-16319 | Уязвимость компонента WebGPU браузеров Google Chrome и Microsoft Edge, позволяющая наруши… | 24.12.2025 | 24.12.2025 |
| ID | Description | Updated |
|---|---|---|
| var-202512-0005 | A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functi… | 2025-12-19T22:35:25.202000Z |
| var-202512-0008 | A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functi… | 2025-12-19T22:35:25.186000Z |
| var-202308-3135 | D-Link DAP-2622 DDP Set IPv4 Address Auth Username Stack-based Buffer Overflow Remote Cod… | 2025-12-19T22:28:23.079000Z |
| var-202308-3118 | D-Link DAP-2622 DDP Set Date-Time Auth Username Stack-based Buffer Overflow Remote Code E… | 2025-12-19T22:28:23.041000Z |
| var-202308-3111 | D-Link DAP-2622 DDP Set IPv6 Address Secondary DNS Stack-based Buffer Overflow Remote Cod… | 2025-12-19T22:28:23.003000Z |
| var-202308-3128 | D-Link DAP-2622 DDP Set Device Info Auth Password Stack-based Buffer Overflow Remote Code… | 2025-12-19T22:28:22.968000Z |
| var-202308-3425 | D-Link DAP-2622 DDP Set AG Profile Auth Password Stack-based Buffer Overflow Remote Code … | 2025-12-19T22:28:22.925000Z |
| var-202308-3664 | D-Link DAP-2622 DDP Set Date-Time Stack-based Buffer Overflow Remote Code Execution Vulne… | 2025-12-19T22:28:22.892000Z |
| var-202308-3321 | D-Link DAP-2622 DDP Set Date-Time Auth Password Stack-based Buffer Overflow Remote Code E… | 2025-12-19T22:28:22.859000Z |
| var-202308-3252 | D-Link DAP-2622 DDP Set Device Info Auth Username Stack-based Buffer Overflow Remote Code… | 2025-12-19T22:28:22.818000Z |
| var-202308-3358 | D-Link DAP-2622 DDP Set IPv6 Address Auth Username Stack-based Buffer Overflow Remote Cod… | 2025-12-19T22:28:22.772000Z |
| var-202308-3136 | D-Link DAP-2622 DDP Set AG Profile UUID Stack-based Buffer Overflow Remote Code Execution… | 2025-12-19T22:28:22.745000Z |
| var-202405-4091 | Cross Site Scripting vulnerability in TOTOLINK X2000R before v1.0.0-B20231213.1013 allows… | 2025-12-19T22:28:20.575000Z |
| var-202406-1502 | Improper Input Validation vulnerability in ABB 800xA Base. An attacker who successfully e… | 2025-12-19T22:28:20.404000Z |
| var-202205-0922 | A vulnerability has been identified in SICAM T (All versions < V3.0). The web based manag… | 2025-12-19T22:16:46.194000Z |
| var-202205-0920 | A vulnerability has been identified in SICAM T (All versions < V3.0). Affected devices do… | 2025-12-19T22:15:45.842000Z |
| var-200609-0857 | The FTP server in Apple Mac OS X 10.4.8 and earlier, when FTP Access is enabled, will cra… | 2025-12-19T21:56:08.648000Z |
| var-201901-1500 | In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended acce… | 2025-12-19T21:42:31.515000Z |
| var-202403-0812 | A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures su… | 2025-12-19T21:25:15.264000Z |
| var-202205-0926 | A vulnerability has been identified in SICAM T (All versions < V3.0). Affected devices do… | 2025-12-19T20:52:33.147000Z |
| var-202210-0447 | A vulnerability has been identified in SICAM P850 (7KG8500-0AA00-0AA0) (All versions < V3… | 2025-12-19T20:22:18.450000Z |
| var-201808-0455 | OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bail… | 2025-12-19T20:21:06.956000Z |
| var-200609-1414 | The VPN service in Apple Mac OS X 10.3.x through 10.3.9 and 10.4.x through 10.4.8 does no… | 2025-12-19T20:20:07.348000Z |
| var-202211-0375 | A vulnerability has been identified in POWER METER SICAM Q100 (7KG9501-0AA01-0AA1) (All v… | 2025-12-19T20:09:51.286000Z |
| var-201901-0012 | An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from … | 2025-12-19T19:55:49.662000Z |
| var-200609-1027 | Buffer overflow in PPP on Apple Mac OS X 10.4.x up to 10.4.8 and 10.3.x up to 10.3.9, whe… | 2025-12-19T19:43:56.138000Z |
| var-202511-0715 | A stack-based buffer overflow exists in the get_merge_ipaddr function of the httpd binary… | 2025-12-19T19:39:43.429000Z |
| var-202511-2401 | A SQL injection vulnerability has been identified in bwdpi. A remote, authenticated attac… | 2025-12-19T19:39:43.281000Z |
| var-202512-0003 | A cleartext transmission vulnerability exists in the WEBVIEW-M functionality of Socomec D… | 2025-12-19T19:39:43.028000Z |
| var-202512-0066 | A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 … | 2025-12-19T19:39:42.993000Z |