Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40461 |
7.5 (3.1)
|
Anviz Products Missing Authentication for Critical Function |
Anviz |
Anviz CX7 Firmware |
2026-04-17T19:36:29.842Z | 2026-04-17T20:03:18.872Z |
| CVE-2026-32648 |
5.3 (3.1)
|
Anviz Products Missing Authorization |
Anviz |
Anviz CX7 Firmware |
2026-04-17T19:34:21.522Z | 2026-04-17T20:09:05.861Z |
| CVE-2026-33569 |
6.5 (3.1)
|
Anviz Products Cleartext Transmission of Sensitive Inf… |
Anviz |
Anviz CX7 Firmware |
2026-04-17T19:30:46.066Z | 2026-04-17T20:32:48.104Z |
| CVE-2026-32105 |
9.3 (4.0)
|
xrdp: RDP MAC signature (dataSignature) never verified… |
neutrinolabs |
xrdp |
2026-04-17T19:27:39.809Z | 2026-04-20T16:22:50.262Z |
| CVE-2026-32107 |
8.8 (3.1)
|
xrdp: Fail-open privilege drop in sesexec — child proc… |
neutrinolabs |
xrdp |
2026-04-17T19:25:20.274Z | 2026-04-22T03:55:34.190Z |
| CVE-2026-31927 |
4.9 (3.1)
|
Anviz CX7 Firmware Relative Path Traversal |
Anviz |
Anviz CX7 Firmware |
2026-04-17T19:24:53.893Z | 2026-04-17T20:34:41.679Z |
| CVE-2026-40342 |
10 (3.1)
|
Firebird: Path Traversal + Arbitrary File Write Leads … |
FirebirdSQL |
firebird |
2026-04-17T19:22:46.644Z | 2026-04-22T13:56:49.927Z |
| CVE-2026-32324 |
7.7 (3.1)
|
Anviz CX7 Firmware Use of Hard-coded Cryptographic Key |
Anviz |
Anviz CX7 Firmware |
2026-04-17T19:22:12.097Z | 2026-04-17T20:10:48.189Z |
| CVE-2026-35061 |
5.3 (3.1)
|
Anviz Products Missing Authorization |
Anviz |
Anviz CX7 Firmware |
2026-04-17T19:19:25.884Z | 2026-04-17T20:07:00.826Z |
| CVE-2026-33093 |
5.3 (3.1)
|
Anviz Products Missing Authorization |
Anviz |
Anviz CX7 Firmware |
2026-04-17T19:17:15.274Z | 2026-04-17T19:54:36.104Z |
| CVE-2026-35215 |
7.5 (3.1)
|
Firebird: DoS via malicious slice descriptor in slice packet |
FirebirdSQL |
firebird |
2026-04-17T18:59:23.663Z | 2026-04-20T15:40:39.510Z |
| CVE-2026-34232 |
7.5 (3.1)
|
Firebird: DoS via `op_response` packet from client |
FirebirdSQL |
firebird |
2026-04-17T18:52:11.693Z | 2026-04-20T13:46:08.507Z |
| CVE-2026-33337 |
7.5 (3.1)
|
Firebird has a buffer overflow when parsing corrupted … |
FirebirdSQL |
firebird |
2026-04-17T18:48:47.953Z | 2026-04-17T19:21:17.132Z |
| CVE-2026-6437 |
6.5 (3.1)
6.9 (4.0)
|
AWS EFS CSI Driver Mount Option Injection |
Amazon |
AWS EFS CSI Driver |
2026-04-17T18:41:36.075Z | 2026-04-17T19:57:02.728Z |
| CVE-2026-28224 |
8.2 (3.1)
|
Firebird Null Pointer Dereference via CryptCallback ca… |
FirebirdSQL |
firebird |
2026-04-17T18:38:58.138Z | 2026-04-17T19:31:38.952Z |
| CVE-2026-28214 |
6 (4.0)
|
Firebird server hangs when using specific clumplet on … |
FirebirdSQL |
firebird |
2026-04-17T18:35:46.974Z | 2026-04-20T13:46:08.635Z |
| CVE-2026-40525 |
9.1 (4.0)
9.1 (3.1)
|
OpenViking < 0.3.9 Authentication Bypass via VikingBot… |
volcengine |
OpenViking |
2026-04-17T18:19:12.315Z | 2026-04-21T13:34:32.327Z |
| CVE-2026-27890 |
8.2 (3.1)
|
Firebird has Pre-Auth DOS when Processing Out of Order… |
FirebirdSQL |
firebird |
2026-04-17T18:14:29.433Z | 2026-04-17T18:50:22.134Z |
| CVE-2026-28212 |
7.5 (3.1)
|
Firebird has potential server crash via null pointer d… |
FirebirdSQL |
firebird |
2026-04-17T18:05:25.854Z | 2026-04-20T13:46:08.904Z |
| CVE-2025-65104 |
7.9 (3.1)
|
Firebird: Information leak vulnerability in firebird3 … |
FirebirdSQL |
firebird |
2026-04-17T17:47:42.109Z | 2026-04-17T18:25:11.941Z |
| CVE-2026-5718 |
8.1 (3.1)
|
Drag and Drop Multiple File Upload for Contact Form 7 … |
glenwpcoder |
Drag and Drop Multiple File Upload for Contact Form 7 |
2026-04-17T17:25:55.466Z | 2026-04-17T18:34:48.917Z |
| CVE-2026-5710 |
7.5 (3.1)
|
Drag and Drop Multiple File Upload for Contact Form 7 … |
glenwpcoder |
Drag and Drop Multiple File Upload for Contact Form 7 |
2026-04-17T17:25:54.940Z | 2026-04-17T17:50:00.362Z |
| CVE-2026-40320 |
5.4 (4.0)
|
Giskard has an Unsandboxed Jinja2 Template Rendering i… |
Giskard-AI |
giskard-oss |
2026-04-17T17:25:50.449Z | 2026-04-20T13:46:09.036Z |
| CVE-2026-40319 |
1 (4.0)
|
Giskard has a Regular Expression Denial of Service (Re… |
Giskard-AI |
giskard-oss |
2026-04-17T17:16:37.676Z | 2026-04-20T13:46:09.167Z |
| CVE-2026-40518 |
7.1 (4.0)
7.1 (3.1)
|
ByteDance DeerFlow Path Traversal and Arbitrary File W… |
bytedance |
deer-flow |
2026-04-17T16:43:42.387Z | 2026-04-17T18:35:51.128Z |
| CVE-2026-3464 |
8.8 (3.1)
|
WP Customer Area <= 8.3.4 - Authenticated (Subscriber+… |
aguilatechnologies |
WP Customer Area |
2026-04-17T16:26:50.576Z | 2026-04-17T18:37:36.472Z |
| CVE-2026-21733 |
7.3 (3.1)
|
RESERVED |
Imagination Technologies |
Graphics DDK |
2026-04-17T16:08:25.661Z | 2026-04-23T10:52:18.501Z |
| CVE-2026-40516 |
7.8 (4.0)
8.3 (3.1)
|
OpenHarness SSRF via web_fetch and web_search |
HKUDS |
OpenHarness |
2026-04-17T16:02:09.082Z | 2026-04-17T16:27:11.780Z |
| CVE-2026-40515 |
8.7 (4.0)
7.5 (3.1)
|
OpenHarness Permission Bypass via grep and glob root a… |
HKUDS |
OpenHarness |
2026-04-17T16:00:07.116Z | 2026-04-20T14:58:22.999Z |
| CVE-2026-21709 |
6.7 (3.1)
|
A vulnerability allowing a local attacker with ad… |
Veeam |
Backup and Replication |
2026-04-17T15:32:10.755Z | 2026-04-20T14:06:52.636Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-35402 |
2.3 (4.0)
|
mcp-neo4j-cypher: SSRF and Data Modification via read_… |
neo4j-contrib |
mcp-neo4j |
2026-04-17T20:34:06.510Z | 2026-04-20T15:51:06.164Z |
| CVE-2026-33689 |
8.7 (4.0)
|
xrdp: Pre-authentication out-of-bounds reads in channe… |
neutrinolabs |
xrdp |
2026-04-17T20:16:31.248Z | 2026-04-20T16:21:39.933Z |
| CVE-2026-33436 |
3.1 (3.1)
|
Stirling-PDF: Reflected XSS through crafted filename i… |
Stirling-Tools |
Stirling-PDF |
2026-04-17T20:29:43.262Z | 2026-04-20T16:20:16.137Z |
| CVE-2026-33145 |
6.3 (3.1)
|
xrdp: Authenticated RCE via unsanitized AlternateShell… |
neutrinolabs |
xrdp |
2026-04-17T20:14:14.048Z | 2026-04-22T13:57:26.244Z |
| CVE-2026-23500 |
9.4 (4.0)
|
Dolibarr: OS Command Injection (RCE) via MAIN_ODT_AS_P… |
Dolibarr |
dolibarr |
2026-04-17T20:25:49.843Z | 2026-04-18T03:06:20.406Z |
| CVE-2026-40461 |
7.5 (3.1)
|
Anviz Products Missing Authentication for Critical Function |
Anviz |
Anviz CX7 Firmware |
2026-04-17T19:36:29.842Z | 2026-04-17T20:03:18.872Z |
| CVE-2026-40434 |
8.1 (3.1)
|
Anviz CrossChex Standard Improper Verification of Sour… |
Anviz |
Anviz CrossChex Standard |
2026-04-17T19:49:28.099Z | 2026-04-17T20:28:02.785Z |
| CVE-2026-40342 |
10 (3.1)
|
Firebird: Path Traversal + Arbitrary File Write Leads … |
FirebirdSQL |
firebird |
2026-04-17T19:22:46.644Z | 2026-04-22T13:56:49.927Z |
| CVE-2026-40283 |
6.8 (3.1)
|
WeGIA has stored XSS in profile_paciente.php |
LabRedesCefetRJ |
WeGIA |
2026-04-17T20:03:14.016Z | 2026-04-20T14:58:05.365Z |
| CVE-2026-40066 |
8.8 (3.1)
|
Anviz Products Download of Code Without Integrity Check |
Anviz |
Anviz CX7 Firmware |
2026-04-17T19:43:20.709Z | 2026-04-17T20:00:36.786Z |
| CVE-2026-35682 |
8.8 (3.1)
|
Anviz CX2 Lite Command Injection |
Anviz |
Anviz CX2 Lite Firmware |
2026-04-17T19:46:26.716Z | 2026-04-17T20:30:18.510Z |
| CVE-2026-35546 |
9.8 (3.1)
|
Anviz Products Missing Authentication for Critical Function |
Anviz |
Anviz CX7 Firmware |
2026-04-17T19:39:25.110Z | 2026-04-17T20:05:28.411Z |
| CVE-2026-35215 |
7.5 (3.1)
|
Firebird: DoS via malicious slice descriptor in slice packet |
FirebirdSQL |
firebird |
2026-04-17T18:59:23.663Z | 2026-04-20T15:40:39.510Z |
| CVE-2026-35061 |
5.3 (3.1)
|
Anviz Products Missing Authorization |
Anviz |
Anviz CX7 Firmware |
2026-04-17T19:19:25.884Z | 2026-04-17T20:07:00.826Z |
| CVE-2026-34232 |
7.5 (3.1)
|
Firebird: DoS via `op_response` packet from client |
FirebirdSQL |
firebird |
2026-04-17T18:52:11.693Z | 2026-04-20T13:46:08.507Z |
| CVE-2026-33569 |
6.5 (3.1)
|
Anviz Products Cleartext Transmission of Sensitive Inf… |
Anviz |
Anviz CX7 Firmware |
2026-04-17T19:30:46.066Z | 2026-04-17T20:32:48.104Z |
| CVE-2026-33516 |
7.7 (4.0)
|
xrdp: Pre-authentication out-of-bounds reads in RDP ca… |
neutrinolabs |
xrdp |
2026-04-17T19:56:11.990Z | 2026-04-20T15:43:53.801Z |
| CVE-2026-33093 |
5.3 (3.1)
|
Anviz Products Missing Authorization |
Anviz |
Anviz CX7 Firmware |
2026-04-17T19:17:15.274Z | 2026-04-17T19:54:36.104Z |
| CVE-2026-32650 |
7.5 (3.1)
|
Anviz CrossChex Standard Algorithm Downgrade |
Anviz |
Anviz CrossChex Standard |
2026-04-17T19:52:45.308Z | 2026-04-17T20:26:17.922Z |
| CVE-2026-32648 |
5.3 (3.1)
|
Anviz Products Missing Authorization |
Anviz |
Anviz CX7 Firmware |
2026-04-17T19:34:21.522Z | 2026-04-17T20:09:05.861Z |
| CVE-2026-32624 |
6.3 (4.0)
|
xrdp: Heap buffer overflow in xrdp_sec_process_logon_i… |
neutrinolabs |
xrdp |
2026-04-17T19:58:08.687Z | 2026-04-20T16:22:13.525Z |
| CVE-2026-32623 |
7.7 (4.0)
|
xrdp: Heap buffer overflow in NeutrinoRDP channel reassembly |
neutrinolabs |
xrdp |
2026-04-17T19:43:58.682Z | 2026-04-22T03:55:35.336Z |
| CVE-2026-32324 |
7.7 (3.1)
|
Anviz CX7 Firmware Use of Hard-coded Cryptographic Key |
Anviz |
Anviz CX7 Firmware |
2026-04-17T19:22:12.097Z | 2026-04-17T20:10:48.189Z |
| CVE-2026-32107 |
8.8 (3.1)
|
xrdp: Fail-open privilege drop in sesexec — child proc… |
neutrinolabs |
xrdp |
2026-04-17T19:25:20.274Z | 2026-04-22T03:55:34.190Z |
| CVE-2026-32105 |
9.3 (4.0)
|
xrdp: RDP MAC signature (dataSignature) never verified… |
neutrinolabs |
xrdp |
2026-04-17T19:27:39.809Z | 2026-04-20T16:22:50.262Z |
| CVE-2026-31927 |
4.9 (3.1)
|
Anviz CX7 Firmware Relative Path Traversal |
Anviz |
Anviz CX7 Firmware |
2026-04-17T19:24:53.893Z | 2026-04-17T20:34:41.679Z |
| CVE-2026-6437 |
6.5 (3.1)
6.9 (4.0)
|
AWS EFS CSI Driver Mount Option Injection |
Amazon |
AWS EFS CSI Driver |
2026-04-17T18:41:36.075Z | 2026-04-17T19:57:02.728Z |
| CVE-2026-40525 |
9.1 (4.0)
9.1 (3.1)
|
OpenViking < 0.3.9 Authentication Bypass via VikingBot… |
volcengine |
OpenViking |
2026-04-17T18:19:12.315Z | 2026-04-21T13:34:32.327Z |
| CVE-2026-33337 |
7.5 (3.1)
|
Firebird has a buffer overflow when parsing corrupted … |
FirebirdSQL |
firebird |
2026-04-17T18:48:47.953Z | 2026-04-17T19:21:17.132Z |
| CVE-2026-28224 |
8.2 (3.1)
|
Firebird Null Pointer Dereference via CryptCallback ca… |
FirebirdSQL |
firebird |
2026-04-17T18:38:58.138Z | 2026-04-17T19:31:38.952Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-wcxr-mjcf-c92c |
7.8 (3.1)
|
Illustrator versions 30.2, 29.8.5 and earlier are affected by an out-of-bounds write vulnerability … | 2026-04-14T21:31:48Z | 2026-04-14T21:31:48Z |
| ghsa-q7xq-72rf-5j5w |
7.8 (3.1)
|
Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerabili… | 2026-04-14T21:31:48Z | 2026-04-14T21:31:48Z |
| ghsa-pfx2-9x9m-7ghx |
7.7 (3.1)
|
OpenStack Keystone: LDAP identity backend does not convert enabled attribute to boolean | 2026-04-14T21:31:48Z | 2026-04-16T01:20:22Z |
| ghsa-mq8r-rq42-5chh |
7.8 (3.1)
|
Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerabili… | 2026-04-14T21:31:48Z | 2026-04-14T21:31:48Z |
| ghsa-fmj2-h384-m84p |
7.8 (3.1)
|
Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerabili… | 2026-04-14T21:31:48Z | 2026-04-14T21:31:48Z |
| ghsa-9569-5f88-rr47 |
7.8 (3.1)
|
Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerabili… | 2026-04-14T21:31:48Z | 2026-04-14T21:31:48Z |
| ghsa-7r6q-467q-xx63 |
7.8 (3.1)
|
Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerabili… | 2026-04-14T21:31:48Z | 2026-04-14T21:31:48Z |
| ghsa-rwx7-xw8j-g7cp |
5.4 (3.1)
|
Adobe Experience Manager versions 6.5.24, FP11.7 and earlier are affected by a DOM-based Cross-Site… | 2026-04-14T21:31:47Z | 2026-04-14T21:31:47Z |
| ghsa-pgvh-5499-q39c |
5.5 (3.1)
|
Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Divide By Zero vulnerability that coul… | 2026-04-14T21:31:47Z | 2026-04-14T21:31:47Z |
| ghsa-p744-7x6c-3vvc |
7.8 (3.1)
|
Photoshop Desktop versions 27.4 and earlier are affected by an out-of-bounds read vulnerability whe… | 2026-04-14T21:31:47Z | 2026-04-14T21:31:47Z |
| ghsa-h8h2-q324-9vvx |
5.4 (3.1)
|
Adobe Experience Manager versions 6.5.24, FP11.7 and earlier are affected by a DOM-based Cross-Site… | 2026-04-14T21:31:47Z | 2026-04-14T21:31:47Z |
| ghsa-33v2-523j-4qw6 |
5.4 (3.1)
|
Adobe Experience Manager versions 6.5.24, FP11.7 and earlier are affected by a DOM-based Cross-Site… | 2026-04-14T21:31:47Z | 2026-04-14T21:31:47Z |
| ghsa-q93q-v844-jrqp |
8.1 (3.1)
|
kyverno apicall servicecall implicit bearer token injection leaks kyverno serviceaccount token | 2026-04-14T20:09:00Z | 2026-04-15T21:14:38Z |
| ghsa-fmqp-4wfc-w3v7 |
7.7 (3.1)
|
Kyverno APICall SSRF Vulnerability Leading to Multi-Tenant Isolation Breach | 2026-04-14T20:06:09Z | 2026-04-14T20:06:09Z |
| ghsa-qr4g-8hrp-c4rw |
7.7 (3.1)
|
Kyverno has unrestricted outbound requests in Kyverno apiCall enabling SSRF | 2026-04-14T20:05:52Z | 2026-04-14T20:05:52Z |
| ghsa-4p64-v8f5-r2gx |
1.3 (4.0)
|
Multiple security fixes in justhtml | 2026-04-14T20:05:10Z | 2026-04-14T20:05:10Z |
| ghsa-wg36-wvj6-r67p |
7.8 (3.1)
|
Composer has a command injection via malicious perforce repository | 2026-04-14T20:03:08Z | 2026-04-16T21:54:58Z |
| ghsa-j4j5-9x6g-rgxc |
5.1 (4.0)
|
October CMS has Stored XSS in Event Log Mail Preview | 2026-04-14T20:02:50Z | 2026-04-14T20:02:50Z |
| ghsa-6qmh-j78v-ffp7 |
5.3 (4.0)
|
October CMS has Stored XSS in Backend Editor Markup Classes | 2026-04-14T20:02:31Z | 2026-04-14T20:02:31Z |
| ghsa-m5qg-jc75-4jp6 |
4.9 (3.1)
|
October Rain has a Twig Sandbox Bypass via Collection Methods | 2026-04-14T20:02:05Z | 2026-04-14T20:02:05Z |
| ghsa-gqw4-4w2p-838q |
8.8 (3.1)
|
Composer has a command injection via malicious perforce reference | 2026-04-14T20:01:42Z | 2026-04-16T21:55:07Z |
| ghsa-6qvv-pj99-48qm |
6.1 (3.1)
|
@adonisjs/http-server has an Open Redirect vulnerability | 2026-04-14T20:01:28Z | 2026-04-15T21:09:15Z |
| ghsa-gx38-8h33-pmxr |
6.9 (4.0)
|
free5gc UDR fail-open request handling in PolicyDataSubsToNotifySubsIdPut may allow unintended subs… | 2026-04-14T20:00:59Z | 2026-04-14T20:00:59Z |
| ghsa-jgq2-qv8v-5cmj |
8.7 (4.0)
|
free5gc UDR improper path validation allows unauthenticated creation and modification of Traffic In… | 2026-04-14T20:00:45Z | 2026-04-14T20:00:45Z |
| ghsa-x5r2-r74c-3w28 |
8.7 (4.0)
|
free5gc UDR improper path validation allows unauthenticated access to Traffic Influence Subscriptions | 2026-04-14T20:00:35Z | 2026-04-14T20:00:35Z |
| ghsa-g9cw-qwhf-24jp |
8.7 (4.0)
|
free5gc UDR improper path validation allows unauthenticated deletion of Traffic Influence Subscriptions | 2026-04-14T20:00:24Z | 2026-04-14T20:00:24Z |
| ghsa-wrwh-rpq4-87hf |
7.5 (3.1)
|
free5gc UDR nudr-dr influenceData/subs-to-notify leaks SUPI in error response body without authentication | 2026-04-14T20:00:15Z | 2026-04-16T21:57:35Z |
| ghsa-5xg3-585r-9jh5 |
6.2 (3.1)
|
ImageMagick has an off-by-one error in MSL decoder could result in crash | 2026-04-14T19:10:48Z | 2026-04-14T19:10:48Z |
| ghsa-r83h-crwp-3vm7 |
5.5 (3.1)
|
ImageMagick has a heap-use-after-free via XMP profile could result in a crash when printing the values. | 2026-04-14T18:51:48Z | 2026-04-14T18:51:48Z |
| ghsa-pwg5-6jfc-crvh |
5.5 (3.1)
|
ImageMagick has a heap out-of-bounds write in JP2 encoder | 2026-04-14T18:51:37Z | 2026-04-14T18:51:37Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-442 |
|
TensorFlow is an end-to-end open source platform for machine learning. If the `splits` ar… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:45.524725Z |
| pysec-2021-441 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling TF operati… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:45.368024Z |
| pysec-2021-256 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing invalid ar… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.523296Z |
| pysec-2021-255 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing a complex … | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.358462Z |
| pysec-2021-254 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.200654Z |
| pysec-2021-253 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.041590Z |
| pysec-2021-252 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.882183Z |
| pysec-2021-251 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.712204Z |
| pysec-2021-250 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.522961Z |
| pysec-2021-249 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.356902Z |
| pysec-2021-248 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.176381Z |
| pysec-2021-247 |
|
TensorFlow is an end-to-end open source platform for machine learning. The validation in … | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.001819Z |
| pysec-2021-246 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.807777Z |
| pysec-2021-245 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.610515Z |
| pysec-2021-244 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.417025Z |
| pysec-2021-243 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.241160Z |
| pysec-2021-242 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite code fo… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.058012Z |
| pysec-2021-241 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite impleme… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.893665Z |
| pysec-2021-240 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.733041Z |
| pysec-2021-239 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.570829Z |
| pysec-2021-238 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite impleme… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.383979Z |
| pysec-2021-237 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.194303Z |
| pysec-2021-236 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.020093Z |
| pysec-2021-235 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:38.832523Z |
| pysec-2021-234 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:38.644851Z |
| pysec-2021-233 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:38.479573Z |
| pysec-2021-232 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:38.313497Z |
| pysec-2021-231 |
|
TensorFlow is an end-to-end open source platform for machine learning. TFLite's convoluti… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:38.125295Z |
| pysec-2021-230 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:37.941172Z |
| pysec-2021-229 |
|
TensorFlow is an end-to-end open source platform for machine learning. The fix for CVE-20… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:37.768858Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1296 | Malicious code in bpsm (PyPI) | 2026-03-09T17:31:34Z | 2026-04-10T15:51:21Z |
| mal-2026-1294 | Malicious code in causal-canvas (PyPI) | 2026-03-09T17:28:14Z | 2026-04-10T15:51:21Z |
| mal-2026-1295 | Malicious code in tabformerlite (PyPI) | 2026-03-09T17:26:01Z | 2026-04-10T15:51:21Z |
| mal-2026-1293 | Malicious code in tw-modern-ui (npm) | 2026-03-09T16:01:36Z | 2026-03-23T05:16:31Z |
| mal-2026-1292 | Malicious code in odds-analyzer (npm) | 2026-03-09T16:01:36Z | 2026-03-23T05:16:29Z |
| mal-2026-1291 | Malicious code in requests-lite (PyPI) | 2026-03-09T10:21:44Z | 2026-03-09T10:21:44Z |
| mal-2026-1290 | Malicious code in remjsonparse (PyPI) | 2026-03-09T10:09:35Z | 2026-03-09T10:09:35Z |
| mal-2026-1289 | Malicious code in aioutil3 (PyPI) | 2026-03-08T19:35:54Z | 2026-03-08T19:35:54Z |
| mal-2026-1288 | Malicious code in arnavtest123 (PyPI) | 2026-03-08T19:01:20Z | 2026-03-08T19:01:20Z |
| mal-2026-1287 | Malicious code in simple-text-parser (PyPI) | 2026-03-08T17:12:35Z | 2026-03-17T23:15:09Z |
| mal-2026-1286 | Malicious code in demozecosse (PyPI) | 2026-03-08T16:29:43Z | 2026-03-08T16:29:43Z |
| mal-2026-1283 | Malicious code in demozecob (PyPI) | 2026-03-08T14:53:48Z | 2026-03-08T14:53:48Z |
| mal-2026-1285 | Malicious code in demozecox (PyPI) | 2026-03-08T14:52:48Z | 2026-03-08T14:52:48Z |
| mal-2026-1284 | Malicious code in demozecosso (PyPI) | 2026-03-08T14:52:35Z | 2026-03-08T14:52:35Z |
| mal-2026-1282 | Malicious code in xmrig-miner (PyPI) | 2026-03-08T14:15:50Z | 2026-03-08T14:15:50Z |
| mal-2026-1280 | Malicious code in py-sysbench (PyPI) | 2026-03-08T14:15:27Z | 2026-03-08T14:15:27Z |
| mal-2026-1279 | Malicious code in cpucheck (PyPI) | 2026-03-08T14:14:08Z | 2026-03-08T14:14:08Z |
| mal-2026-1281 | Malicious code in pyutils-helper (PyPI) | 2026-03-08T14:13:30Z | 2026-03-08T14:13:30Z |
| mal-2026-1278 | Malicious code in chat-xdk (PyPI) | 2026-03-07T09:17:14Z | 2026-03-07T09:17:34Z |
| mal-2026-1277 | Malicious code in prateek-yadav23 (PyPI) | 2026-03-06T23:22:42Z | 2026-03-17T23:15:08Z |
| mal-2026-1276 | Malicious code in flowfix (PyPI) | 2026-03-06T17:39:56Z | 2026-03-15T17:45:28Z |
| mal-2026-1275 | Malicious code in hostlists-plugins-default (PyPI) | 2026-03-06T17:01:42Z | 2026-03-06T17:01:59Z |
| mal-2026-1271 | Malicious code in qq-console (npm) | 2026-03-06T15:22:32Z | 2026-03-08T01:39:47Z |
| mal-2026-1270 | Malicious code in @wgu-edu/wgu-icons (npm) | 2026-03-06T15:20:59Z | 2026-03-08T01:39:42Z |
| mal-2026-1269 | Malicious code in @wgu-edu/wgu-core (npm) | 2026-03-06T15:20:59Z | 2026-03-08T01:39:42Z |
| mal-2026-1268 | Malicious code in @shenira/libsignal-node (npm) | 2026-03-06T14:37:02Z | 2026-03-08T01:39:42Z |
| mal-2026-1267 | Malicious code in @shenira/baileysx (npm) | 2026-03-06T14:37:02Z | 2026-03-08T01:39:42Z |
| mal-2026-1266 | Malicious code in @shenira/baileys (npm) | 2026-03-06T14:37:02Z | 2026-03-08T01:39:42Z |
| mal-2026-1274 | Malicious code in test-mal-npm-pkg-not-local (npm) | 2026-03-06T14:26:46Z | 2026-04-01T12:28:04Z |
| mal-2026-1273 | Malicious code in test-mal-npm-pkg-local (npm) | 2026-03-06T14:26:46Z | 2026-04-01T12:28:04Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1463 | Redis: Mehrere Schwachstellen | 2025-07-06T22:00:00.000+00:00 | 2025-12-03T23:00:00.000+00:00 |
| wid-sec-w-2025-1462 | Checkmk: Schwachstelle ermöglicht Manipulation von Dateien | 2025-07-06T22:00:00.000+00:00 | 2025-07-06T22:00:00.000+00:00 |
| wid-sec-w-2025-1461 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-03T22:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1460 | PHP: Mehrere Schwachstellen | 2025-07-03T22:00:00.000+00:00 | 2026-01-27T23:00:00.000+00:00 |
| wid-sec-w-2025-1459 | Dell Data Protection Advisor: Mehrere Schwachstellen | 2025-07-03T22:00:00.000+00:00 | 2025-07-03T22:00:00.000+00:00 |
| wid-sec-w-2025-1458 | LANCOM LW-500 Access Point: Schwachstelle ermöglicht Denial of Service | 2025-07-03T22:00:00.000+00:00 | 2025-07-03T22:00:00.000+00:00 |
| wid-sec-w-2025-1457 | Docker Desktop: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-03T22:00:00.000+00:00 | 2025-07-03T22:00:00.000+00:00 |
| wid-sec-w-2025-1456 | Vercel Next.js: Mehrere Schwachstellen | 2025-07-03T22:00:00.000+00:00 | 2025-07-03T22:00:00.000+00:00 |
| wid-sec-w-2025-1454 | Google Chrome: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-07-02T22:00:00.000+00:00 | 2025-07-16T22:00:00.000+00:00 |
| wid-sec-w-2025-1453 | Hashicorp Vagrant: Schwachstelle ermöglicht Codeausführung | 2025-07-02T22:00:00.000+00:00 | 2025-07-02T22:00:00.000+00:00 |
| wid-sec-w-2025-1452 | Linux Kernel: Mehrere Schwachstellen | 2025-07-02T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1451 | Drupal: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-07-02T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1450 | poppler: Schwachstelle ermöglicht Denial of Service | 2025-07-02T22:00:00.000+00:00 | 2025-08-06T22:00:00.000+00:00 |
| wid-sec-w-2025-1449 | Microsoft Edge: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Benutzerrechten | 2025-07-02T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1448 | Cisco Unified Communications Manager (CUCM): Schwachstelle ermöglicht Erlangen von Administratorrechten | 2025-07-02T22:00:00.000+00:00 | 2025-07-03T22:00:00.000+00:00 |
| wid-sec-w-2025-1447 | Xen: Schwachstelle ermöglicht Denial of Service | 2025-07-01T22:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2025-1446 | Red Hat JBoss Data Grid: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-01T22:00:00.000+00:00 | 2025-07-01T22:00:00.000+00:00 |
| wid-sec-w-2025-1445 | dpkg: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-01T22:00:00.000+00:00 | 2025-09-24T22:00:00.000+00:00 |
| wid-sec-w-2025-1444 | Microsoft Edge: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-01T22:00:00.000+00:00 | 2025-07-01T22:00:00.000+00:00 |
| wid-sec-w-2025-1443 | Junit: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-01T22:00:00.000+00:00 | 2025-07-01T22:00:00.000+00:00 |
| wid-sec-w-2025-1442 | Apache Guacamole: Schwachstelle ermöglicht Codeausführung | 2025-07-01T22:00:00.000+00:00 | 2025-07-01T22:00:00.000+00:00 |
| wid-sec-w-2025-1441 | OWASP ModSecurity: Schwachstelle ermöglicht Denial of Service | 2025-07-01T22:00:00.000+00:00 | 2025-08-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1440 | Microsoft GitHub Enterprise: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-01T22:00:00.000+00:00 | 2025-07-01T22:00:00.000+00:00 |
| wid-sec-w-2025-1439 | Dell Secure Connect Gateway: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-06-30T22:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| wid-sec-w-2025-1438 | MediaWiki: Mehrere Schwachstellen | 2025-06-30T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1437 | Red Hat Ansible Automation Platform: Mehrere Schwachstellen | 2025-06-30T22:00:00.000+00:00 | 2025-08-04T22:00:00.000+00:00 |
| wid-sec-w-2025-1436 | Google Chrome / Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2025-06-30T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1435 | IBM Storage Scale: Mehrere Schwachstellen | 2025-06-30T22:00:00.000+00:00 | 2025-06-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1434 | Dell NetWorker: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-30T22:00:00.000+00:00 | 2025-06-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1433 | Red Hat Enterprise Linux (python-setuptools): Schwachstelle ermöglicht Codeausführung | 2025-06-30T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-069-11 | Siemens SINUMERIK MC | 2022-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-09 | Siemens SINEC INS | 2022-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-08 | Siemens Polarion ALM | 2022-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-07 | Siemens Climatix POL909 | 2022-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-06 | Siemens COMOS | 2022-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-05 | Siemens Simcenter STAR-CCM+ Viewer | 2022-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-04 | Siemens SINEMA Mendix Forgot Password Appstore | 2022-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-03 | Siemens SINEC NMS | 2022-03-08T00:00:00.000000Z | 2023-10-10T00:00:00.000000Z |
| icsa-22-069-02 | Siemens SIMOTICS CONNECT 400 | 2022-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-01 | Siemens RUGGEDCOM Devices | 2022-03-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-22-067-02 | AVEVA System Platform | 2022-03-08T00:00:00.000000Z | 2022-03-08T00:00:00.000000Z |
| icsa-22-067-01 | PTC Axeda agent and Axeda Desktop Server (Update C) | 2022-03-08T00:00:00.000000Z | 2022-03-31T00:00:00.000000Z |
| icsa-22-063-01 | Trailer Power Line Communications (PLC) J2497 | 2022-03-04T00:00:00.000000Z | 2022-03-04T00:00:00.000000Z |
| icsma-22-062-02 | BD Viper LT | 2022-03-03T00:00:00.000000Z | 2022-03-03T00:00:00.000000Z |
| icsma-22-062-01 | BD Pyxis | 2022-03-03T00:00:00.000000Z | 2022-03-03T00:00:00.000000Z |
| icsa-22-062-01 | IPCOMM ipDIO | 2022-03-03T00:00:00.000000Z | 2022-03-03T00:00:00.000000Z |
| icsa-22-055-03 | Schneider Electric Easergy P5 and P3 | 2022-02-24T00:00:00.000000Z | 2022-02-24T00:00:00.000000Z |
| icsa-22-055-02 | Mitsubishi Electric EcoWebServerIII | 2022-02-24T00:00:00.000000Z | 2022-02-24T00:00:00.000000Z |
| icsa-22-055-01 | FATEK Automation FvDesigner | 2022-02-24T00:00:00.000000Z | 2022-02-24T00:00:00.000000Z |
| icsa-22-053-03 | WIN-911 2021 | 2022-02-22T00:00:00.000000Z | 2022-02-22T00:00:00.000000Z |
| icsa-22-053-02 | GE Proficy CIMPLICITY-Cleartext | 2022-02-22T00:00:00.000000Z | 2022-02-22T00:00:00.000000Z |
| icsa-22-053-01 | GE Proficy CIMPLICITY-IPM | 2022-02-22T00:00:00.000000Z | 2022-02-22T00:00:00.000000Z |
| icsa-22-069-10 | Siemens Simcenter Femap | 2022-02-17T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-046-01 | Schneider Electric IGSS | 2022-02-15T00:00:00.000000Z | 2022-02-15T00:00:00.000000Z |
| icsa-25-259-05 | Siemens OpenSSL Vulnerability in Industrial Products | 2022-02-08T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-22-041-07 | Siemens Solid Edge, JT2Go, and Teamcenter Visualization | 2022-02-08T00:00:00.000000Z | 2022-06-14T00:00:00.000000Z |
| icsa-22-041-06 | Siemens Spectrum Power 4 | 2022-02-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-041-05 | Siemens SICAM TOOLBOX II (Update A) | 2022-02-08T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-041-04 | Siemens SINEMA Remote Connect Server | 2022-02-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-041-03 | Siemens Simcenter Femap | 2022-02-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20191002-fmc-sql-inj | Cisco Firepower Management Center SQL Injection Vulnerabilities | 2019-10-02T16:00:00+00:00 | 2019-10-02T23:28:50+00:00 |
| cisco-sa-20191002-fmc-rce-12689 | Cisco Firepower Management Center Remote Code Execution Vulnerability | 2019-10-02T16:00:00+00:00 | 2019-10-02T23:28:51+00:00 |
| cisco-sa-20191002-fmc-rce | Cisco Firepower Management Center Remote Code Execution Vulnerability | 2019-10-02T16:00:00+00:00 | 2019-10-25T18:57:18+00:00 |
| cisco-sa-20191002-fmc-dir-trav | Cisco Firepower Management Center Directory Traversal Vulnerability | 2019-10-02T16:00:00+00:00 | 2019-10-02T16:00:00+00:00 |
| cisco-sa-20191002-fmc-com-inj | Cisco Firepower Management Center Command Injection Vulnerability | 2019-10-02T16:00:00+00:00 | 2019-10-25T18:55:33+00:00 |
| cisco-sa-20191002-firepwr-bypass | Cisco Firepower System Software Detection Engine RTF and RAR Malware and File Policy Bypass Vulnerabilities | 2019-10-02T16:00:00+00:00 | 2019-10-02T16:00:00+00:00 |
| cisco-sa-20191002-fire-bypass | Cisco Firepower Management Center Software File and Malware Policy Bypass Vulnerability | 2019-10-02T16:00:00+00:00 | 2019-10-02T16:00:00+00:00 |
| cisco-sa-20191002-esa-bypass | Cisco Email Security Appliance Filter Bypass Vulnerability | 2019-10-02T16:00:00+00:00 | 2020-02-18T20:41:30+00:00 |
| cisco-sa-20191002-cucm-xxe | Cisco Unified Communications Manager XML External Expansion Vulnerability | 2019-10-02T16:00:00+00:00 | 2019-10-23T17:53:28+00:00 |
| cisco-sa-20191002-cucm-xss-12716 | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2019-10-02T16:00:00+00:00 | 2019-10-02T16:00:00+00:00 |
| cisco-sa-20191002-cucm-xss-12715 | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2019-10-02T16:00:00+00:00 | 2019-10-02T16:00:00+00:00 |
| cisco-sa-20191002-cucm-csrf | Multiple Cisco Unified Communications Products Cross-Site Request Forgery Vulnerability | 2019-10-02T16:00:00+00:00 | 2019-10-15T21:28:23+00:00 |
| cisco-sa-20191002-cuc-xss | Multiple Cisco Unified Communications Products Cross-Site Scripting Vulnerability | 2019-10-02T16:00:00+00:00 | 2019-10-02T16:00:00+00:00 |
| cisco-sa-20191002-cuc-inject | Cisco Unified Communications Manager SQL Injection Vulnerability | 2019-10-02T16:00:00+00:00 | 2019-10-02T16:00:00+00:00 |
| cisco-sa-20191002-asa-xss | Cisco Adaptive Security Appliance and Firepower Threat Defense Software WebVPN Cross-Site Scripting Vulnerability | 2019-10-02T16:00:00+00:00 | 2019-10-02T16:00:00+00:00 |
| cisco-sa-20191002-asa-ssl-vpn-dos | Cisco Adaptive Security Appliance Software SSL VPN Denial of Service Vulnerability | 2019-10-02T16:00:00+00:00 | 2019-10-02T16:00:00+00:00 |
| cisco-sa-20191002-asa-scp-dos | Cisco Adaptive Security Appliance Software Secure Copy Denial of Service Vulnerability | 2019-10-02T16:00:00+00:00 | 2019-10-07T15:13:20+00:00 |
| cisco-sa-20191002-asa-ospf-lsa-dos | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software OSPF LSA Processing Denial of Service Vulnerability | 2019-10-02T16:00:00+00:00 | 2019-10-18T18:18:13+00:00 |
| cisco-sa-20191002-asa-ftd-sip-dos | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SIP Inspection Denial of Service Vulnerability | 2019-10-02T16:00:00+00:00 | 2019-10-02T16:00:00+00:00 |
| cisco-sa-20191002-asa-ftd-ikev1-dos | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IKEv1 Denial of Service Vulnerability | 2019-10-02T16:00:00+00:00 | 2019-10-02T16:00:00+00:00 |
| cisco-sa-20191002-asa-ftd-dos | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software WebVPN CPU Denial of Service Vulnerability | 2019-10-02T16:00:00+00:00 | 2019-10-02T16:00:00+00:00 |
| cisco-sa-20191002-asa-dos | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software FTP Inspection Denial of Service Vulnerability | 2019-10-02T16:00:00+00:00 | 2019-11-14T18:50:29+00:00 |
| cisco-sa-20190925-xss | Cisco IOS XE Software Stored Cross-Site Scripting Vulnerability | 2019-09-25T16:00:00+00:00 | 2019-09-25T16:00:00+00:00 |
| cisco-sa-20190925-xr-asr9k-privesc | Cisco IOS XR Software for Cisco ASR 9000 VMAN CLI Privilege Escalation Vulnerability | 2019-09-25T16:00:00+00:00 | 2019-09-25T16:00:00+00:00 |
| cisco-sa-20190925-webui-cmd-injection | Cisco IOS XE Software Web UI Command Injection Vulnerabilities | 2019-09-25T16:00:00+00:00 | 2019-10-14T18:25:06+00:00 |
| cisco-sa-20190925-vman-cmd-injection | Cisco IOS XE Software Virtualization Manager CLI Command Injection Vulnerability | 2019-09-25T16:00:00+00:00 | 2019-09-25T16:00:00+00:00 |
| cisco-sa-20190925-vman | Cisco NX-OS and IOS XE Software Virtual Service Image Signature Bypass Vulnerability | 2019-09-25T16:00:00+00:00 | 2019-09-25T16:00:00+00:00 |
| cisco-sa-20190925-utd | Cisco IOS XE Software Unified Threat Defense Denial of Service Vulnerability | 2019-09-25T16:00:00+00:00 | 2019-09-25T16:00:00+00:00 |
| cisco-sa-20190925-tsec | Cisco IOS and IOS XE Software Change of Authorization Denial of Service Vulnerability | 2019-09-25T16:00:00+00:00 | 2019-09-25T16:00:00+00:00 |
| cisco-sa-20190925-sip-dos | Cisco IOS and IOS XE Software Session Initiation Protocol Denial of Service Vulnerability | 2019-09-25T16:00:00+00:00 | 2019-10-04T22:21:48+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-40180 | mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop | 2025-11-02T00:00:00.000Z | 2026-03-31T14:37:24.000Z |
| msrc_cve-2025-40179 | ext4: verify orphan file size is not too big | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:03.000Z |
| msrc_cve-2025-40178 | pid: Add a judgment for ns null in pid_nr_ns | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:49.000Z |
| msrc_cve-2025-40176 | tls: wait for pending async decryptions if tls_strp_msg_hold fails | 2025-11-02T00:00:00.000Z | 2025-12-07T01:50:46.000Z |
| msrc_cve-2025-40173 | net/ip6_tunnel: Prevent perpetual tunnel growth | 2025-11-02T00:00:00.000Z | 2025-12-07T01:50:19.000Z |
| msrc_cve-2025-40172 | accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages() | 2025-11-02T00:00:00.000Z | 2025-11-13T01:02:30.000Z |
| msrc_cve-2025-40170 | net: use dst_dev_rcu() in sk_setup_caps() | 2025-11-02T00:00:00.000Z | 2026-03-31T15:13:34.000Z |
| msrc_cve-2025-40168 | smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match(). | 2025-11-02T00:00:00.000Z | 2026-03-31T15:13:13.000Z |
| msrc_cve-2025-40167 | ext4: detect invalid INLINE_DATA + EXTENTS flag combination | 2025-11-02T00:00:00.000Z | 2025-12-07T01:49:17.000Z |
| msrc_cve-2025-40165 | media: nxp: imx8-isi: m2m: Fix streaming cleanup on release | 2025-11-02T00:00:00.000Z | 2025-11-13T01:02:47.000Z |
| msrc_cve-2025-40164 | usbnet: Fix using smp_processor_id() in preemptible code warnings | 2025-11-02T00:00:00.000Z | 2026-03-03T14:58:22.000Z |
| msrc_cve-2025-40158 | ipv6: use RCU in ip6_output() | 2025-11-02T00:00:00.000Z | 2026-03-31T15:13:57.000Z |
| msrc_cve-2025-40149 | tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock(). | 2025-11-02T00:00:00.000Z | 2026-03-03T14:58:02.000Z |
| msrc_cve-2025-40146 | blk-mq: fix potential deadlock while nr_requests grown | 2025-11-02T00:00:00.000Z | 2026-03-31T15:12:50.000Z |
| msrc_cve-2025-40139 | smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set(). | 2025-11-02T00:00:00.000Z | 2026-03-31T15:12:28.000Z |
| msrc_cve-2025-40136 | crypto: hisilicon/qm - request reserved interrupt for virtual function | 2025-11-02T00:00:00.000Z | 2025-11-25T01:40:44.000Z |
| msrc_cve-2025-40135 | ipv6: use RCU in ip6_xmit() | 2025-11-02T00:00:00.000Z | 2026-03-27T14:36:03.000Z |
| msrc_cve-2025-40111 | drm/vmwgfx: Fix Use-after-free in validation | 2025-11-02T00:00:00.000Z | 2025-12-07T01:49:08.000Z |
| msrc_cve-2025-40110 | drm/vmwgfx: Fix a null-ptr access in the cursor snooper | 2025-11-02T00:00:00.000Z | 2025-12-07T01:49:00.000Z |
| msrc_cve-2025-40109 | crypto: rng - Ensure set_ent is always present | 2025-11-02T00:00:00.000Z | 2025-11-10T01:03:03.000Z |
| msrc_cve-2025-40107 | can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled | 2025-11-02T00:00:00.000Z | 2025-11-04T01:01:14.000Z |
| msrc_cve-2025-31133 | runc container escape via "masked path" abuse due to mount race conditions | 2025-11-02T00:00:00.000Z | 2025-12-17T14:35:21.000Z |
| msrc_cve-2025-2486 | UEFI Shell accessible in AAVMF with Secure Boot enabled on Ubuntu | 2025-11-02T00:00:00.000Z | 2026-01-13T01:41:34.000Z |
| msrc_cve-2025-13601 | Glib: integer overflow in in g_escape_uri_string() | 2025-11-02T00:00:00.000Z | 2025-12-02T01:35:13.000Z |
| msrc_cve-2025-13230 | Type Confusion in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | 2025-11-02T00:00:00.000Z | 2026-03-31T14:58:05.000Z |
| msrc_cve-2025-13227 | Type Confusion in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | 2025-11-02T00:00:00.000Z | 2026-03-31T14:59:07.000Z |
| msrc_cve-2025-13226 | Type Confusion in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | 2025-11-02T00:00:00.000Z | 2026-03-31T14:58:43.000Z |
| msrc_cve-2025-13193 | Libvirt: information disclosure via world-readable vm snapshots | 2025-11-02T00:00:00.000Z | 2025-12-07T01:38:09.000Z |
| msrc_cve-2025-13120 | mruby array.c sort_cmp use after free | 2025-11-02T00:00:00.000Z | 2025-11-25T01:37:47.000Z |
| msrc_cve-2025-12977 | CVE-2025-12977 | 2025-11-02T00:00:00.000Z | 2025-12-17T14:35:28.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:14855-1 | go1.23-1.23.7-1.1 on GA media | 2025-03-06T00:00:00Z | 2025-03-06T00:00:00Z |
| opensuse-su-2025:14854-1 | chromedriver-134.0.6998.35-1.1 on GA media | 2025-03-06T00:00:00Z | 2025-03-06T00:00:00Z |
| opensuse-su-2025:14853-1 | MozillaThunderbird-128.8.0-1.1 on GA media | 2025-03-06T00:00:00Z | 2025-03-06T00:00:00Z |
| opensuse-su-2025:14852-1 | firefox-esr-128.8.0-1.1 on GA media | 2025-03-04T00:00:00Z | 2025-03-04T00:00:00Z |
| opensuse-su-2025:0081-1 | Security update for phpMyAdmin | 2025-03-03T09:28:26Z | 2025-03-03T09:28:26Z |
| opensuse-su-2025:0080-1 | Security update for trivy | 2025-03-03T09:28:23Z | 2025-03-03T09:28:23Z |
| opensuse-su-2025:14851-1 | glibc-2.41-1.1 on GA media | 2025-03-02T00:00:00Z | 2025-03-02T00:00:00Z |
| opensuse-su-2025:14850-1 | ffmpeg-7-7.1-4.1 on GA media | 2025-03-02T00:00:00Z | 2025-03-02T00:00:00Z |
| opensuse-su-2025:14849-1 | ffmpeg-4-4.4.5-5.1 on GA media | 2025-03-02T00:00:00Z | 2025-03-02T00:00:00Z |
| opensuse-su-2025:14848-1 | nodejs-electron-33.4.2-1.1 on GA media | 2025-03-01T00:00:00Z | 2025-03-01T00:00:00Z |
| opensuse-su-2025:14847-1 | python311-spotipy-2.25.1-1.1 on GA media | 2025-02-28T00:00:00Z | 2025-02-28T00:00:00Z |
| opensuse-su-2025:14846-1 | phpMyAdmin-5.2.2-2.1 on GA media | 2025-02-28T00:00:00Z | 2025-02-28T00:00:00Z |
| opensuse-su-2025:0077-1 | Security update for chromium | 2025-02-27T10:18:19Z | 2025-02-27T10:18:19Z |
| opensuse-su-2025:14845-1 | python311-jupyter-server-2.14.2-3.1 on GA media | 2025-02-27T00:00:00Z | 2025-02-27T00:00:00Z |
| opensuse-su-2025:14844-1 | bsdtar-3.7.7-2.1 on GA media | 2025-02-27T00:00:00Z | 2025-02-27T00:00:00Z |
| opensuse-su-2025:14843-1 | govulncheck-vulndb-0.0.20250226T025151-1.1 on GA media | 2025-02-27T00:00:00Z | 2025-02-27T00:00:00Z |
| opensuse-su-2025:14842-1 | xwayland-24.1.5-2.1 on GA media | 2025-02-26T00:00:00Z | 2025-02-26T00:00:00Z |
| opensuse-su-2025:14841-1 | xorg-x11-server-21.1.15-2.1 on GA media | 2025-02-26T00:00:00Z | 2025-02-26T00:00:00Z |
| opensuse-su-2025:14840-1 | trivy-0.59.1-1.1 on GA media | 2025-02-26T00:00:00Z | 2025-02-26T00:00:00Z |
| opensuse-su-2025:14839-1 | teleport-17.2.9-1.1 on GA media | 2025-02-26T00:00:00Z | 2025-02-26T00:00:00Z |
| opensuse-su-2025:14838-1 | libxkbfile-devel-1.1.3-2.1 on GA media | 2025-02-26T00:00:00Z | 2025-02-26T00:00:00Z |
| opensuse-su-2025:14837-1 | libX11-6-1.8.11-2.1 on GA media | 2025-02-26T00:00:00Z | 2025-02-26T00:00:00Z |
| opensuse-su-2025:14836-1 | libiniparser-devel-4.2.6-1.1 on GA media | 2025-02-25T00:00:00Z | 2025-02-25T00:00:00Z |
| opensuse-su-2025:14835-1 | gnutls-3.8.9-1.1 on GA media | 2025-02-25T00:00:00Z | 2025-02-25T00:00:00Z |
| opensuse-su-2025:14834-1 | ffmpeg-7-7.1-3.1 on GA media | 2025-02-25T00:00:00Z | 2025-02-25T00:00:00Z |
| opensuse-su-2025:14833-1 | ffmpeg-4-4.4.5-3.1 on GA media | 2025-02-25T00:00:00Z | 2025-02-25T00:00:00Z |
| opensuse-su-2025:0074-1 | Security update for crun | 2025-02-24T15:01:42Z | 2025-02-24T15:01:42Z |
| opensuse-su-2025:14832-1 | libprotobuf-lite28_3_0-28.3-15.1 on GA media | 2025-02-24T00:00:00Z | 2025-02-24T00:00:00Z |
| opensuse-su-2025:0072-1 | Security update for radare2 | 2025-02-21T11:02:12Z | 2025-02-21T11:02:12Z |
| opensuse-su-2025:0070-1 | Security update for chromium | 2025-02-21T05:02:53Z | 2025-02-21T05:02:53Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:23542 | Red Hat Security Advisory: OpenShift File Integrity Operator bug fix and enhancement update | 2025-12-17T16:35:07+00:00 | 2026-03-26T11:50:11+00:00 |
| rhsa-2025:23535 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.0.12 | 2025-12-17T15:38:59+00:00 | 2026-04-14T07:56:42+00:00 |
| rhsa-2025:23534 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.2.7 | 2025-12-17T15:37:08+00:00 | 2026-04-14T07:56:45+00:00 |
| rhsa-2025:23531 | Red Hat Security Advisory: RHOAI 2.25.1 - Red Hat OpenShift AI | 2025-12-17T15:17:16+00:00 | 2026-04-14T02:01:59+00:00 |
| rhsa-2025:23463 | Red Hat Security Advisory: kernel security update | 2025-12-17T15:04:13+00:00 | 2026-03-18T03:13:53+00:00 |
| rhsa-2025:23529 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes 2.11.9 security update | 2025-12-17T14:58:47+00:00 | 2026-04-09T02:05:55+00:00 |
| rhsa-2025:23528 | Red Hat Security Advisory: multicluster engine for Kubernetes 2.6 security update | 2025-12-17T14:58:16+00:00 | 2026-04-12T19:39:25+00:00 |
| rhsa-2025:23479 | Red Hat Security Advisory: openssh security update | 2025-12-17T14:16:13+00:00 | 2026-04-13T20:00:10+00:00 |
| rhsa-2025:23452 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-12-17T14:04:17+00:00 | 2026-04-13T08:44:48+00:00 |
| rhsa-2025:23491 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.20 security update. | 2025-12-17T13:43:49+00:00 | 2026-04-01T13:32:46+00:00 |
| rhsa-2025:23492 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.18 security update. | 2025-12-17T13:43:48+00:00 | 2026-04-01T13:32:46+00:00 |
| rhsa-2025:23490 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.16 security update. | 2025-12-17T13:43:38+00:00 | 2026-04-01T13:32:45+00:00 |
| rhsa-2025:23488 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.19 security update. | 2025-12-17T13:43:38+00:00 | 2026-04-01T13:32:45+00:00 |
| rhsa-2025:23489 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.17 security update. | 2025-12-17T13:43:36+00:00 | 2026-04-01T13:32:49+00:00 |
| rhsa-2025:23487 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.12 security update. | 2025-12-17T13:41:30+00:00 | 2026-04-01T13:32:45+00:00 |
| rhsa-2025:23486 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.15 security update. | 2025-12-17T13:41:25+00:00 | 2026-04-01T13:32:44+00:00 |
| rhsa-2025:23485 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.14 security update. | 2025-12-17T13:41:11+00:00 | 2026-04-01T13:32:44+00:00 |
| rhsa-2025:23482 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.13 security update. | 2025-12-17T13:07:54+00:00 | 2026-04-01T13:32:43+00:00 |
| rhsa-2025:23451 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-12-17T12:19:18+00:00 | 2026-04-13T08:44:48+00:00 |
| rhsa-2025:23241 | Red Hat Security Advisory: kernel security update | 2025-12-17T11:51:32+00:00 | 2026-03-18T03:13:26+00:00 |
| rhea-2025:23478 | Red Hat Enhancement Advisory: OpenShift Virtualization 4.18.25 Images | 2025-12-17T11:33:21+00:00 | 2026-03-26T11:45:13+00:00 |
| rhsa-2025:23449 | Red Hat Security Advisory: Red Hat AI Inference Server 3.2.5 (ROCm) | 2025-12-17T08:22:31+00:00 | 2026-04-14T09:37:52+00:00 |
| rhsa-2025:23445 | Red Hat Security Advisory: kernel security update | 2025-12-17T07:48:31+00:00 | 2026-03-18T03:14:18+00:00 |
| rhsa-2025:23437 | Red Hat Security Advisory: libsoup3 security update | 2025-12-17T07:32:46+00:00 | 2026-03-19T14:05:58+00:00 |
| rhsa-2025:23434 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-12-17T06:13:37+00:00 | 2026-04-13T08:44:48+00:00 |
| rhsa-2025:23250 | Red Hat Security Advisory: kernel security update | 2025-12-17T05:39:46+00:00 | 2026-03-18T03:13:27+00:00 |
| rhsa-2025:23279 | Red Hat Security Advisory: kernel security update | 2025-12-17T05:37:41+00:00 | 2026-03-18T03:13:29+00:00 |
| rhsa-2025:23433 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-12-17T04:58:31+00:00 | 2026-04-13T08:44:47+00:00 |
| rhsa-2025:23228 | Red Hat Security Advisory: qemu-kvm security update | 2025-12-17T04:15:26+00:00 | 2026-03-24T13:02:44+00:00 |
| rhsa-2025:23423 | Red Hat Security Advisory: kernel security update | 2025-12-17T03:51:11+00:00 | 2026-03-18T03:13:52+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20062-1 | Security update for curl | 2026-01-08T14:51:21Z | 2026-01-08T14:51:21Z |
| suse-su-2026:20061-1 | Security update for openvswitch | 2026-01-08T14:43:50Z | 2026-01-08T14:43:50Z |
| suse-su-2026:0073-1 | Security update for ImageMagick | 2026-01-08T13:22:41Z | 2026-01-08T13:22:41Z |
| suse-su-2026:0072-1 | Security update for ImageMagick | 2026-01-08T13:22:28Z | 2026-01-08T13:22:28Z |
| suse-su-2026:0071-1 | Security update for php8 | 2026-01-08T13:22:08Z | 2026-01-08T13:22:08Z |
| suse-su-2026:0070-1 | Security update for qemu | 2026-01-08T13:21:59Z | 2026-01-08T13:21:59Z |
| suse-su-2026:0069-1 | Security update for rsync | 2026-01-08T13:21:48Z | 2026-01-08T13:21:48Z |
| suse-su-2026:0068-1 | Security update for libvirt | 2026-01-08T12:22:40Z | 2026-01-08T12:22:40Z |
| suse-su-2026:0067-1 | Security update for podman | 2026-01-08T12:22:16Z | 2026-01-08T12:22:16Z |
| suse-su-2026:0066-1 | Security update for curl | 2026-01-08T12:21:35Z | 2026-01-08T12:21:35Z |
| suse-su-2026:0063-1 | Security update for libpcap | 2026-01-08T09:36:26Z | 2026-01-08T09:36:26Z |
| suse-su-2026:0062-1 | Security update for libpcap | 2026-01-08T09:36:12Z | 2026-01-08T09:36:12Z |
| suse-su-2026:0061-1 | Security update for ImageMagick | 2026-01-07T18:33:22Z | 2026-01-07T18:33:22Z |
| suse-su-2026:0060-1 | Security update for capstone | 2026-01-07T16:02:47Z | 2026-01-07T16:02:47Z |
| suse-su-2026:0059-1 | Security update for ImageMagick | 2026-01-07T16:01:56Z | 2026-01-07T16:01:56Z |
| suse-su-2026:20039-1 | Security update for the Linux Kernel | 2026-01-07T12:33:45Z | 2026-01-07T12:33:45Z |
| suse-su-2026:0053-1 | Security update for libpcap | 2026-01-07T11:03:52Z | 2026-01-07T11:03:52Z |
| suse-su-2026:20059-1 | Security update for the Linux Kernel | 2026-01-07T10:55:44Z | 2026-01-07T10:55:44Z |
| suse-su-2026:20022-1 | Security update of valkey | 2026-01-07T09:35:57Z | 2026-01-07T09:35:57Z |
| suse-su-2026:0052-1 | Security update for curl | 2026-01-07T09:28:37Z | 2026-01-07T09:28:37Z |
| suse-su-2026:0051-1 | Security update for curl | 2026-01-07T09:28:27Z | 2026-01-07T09:28:27Z |
| suse-su-2026:0050-1 | Security update for curl | 2026-01-07T09:28:15Z | 2026-01-07T09:28:15Z |
| suse-su-2026:0044-1 | Security update for mozjs60 | 2026-01-06T16:10:16Z | 2026-01-06T16:10:16Z |
| suse-su-2026:0043-1 | Security update for qemu | 2026-01-06T16:03:07Z | 2026-01-06T16:03:07Z |
| suse-su-2026:20038-1 | Security update for qemu | 2026-01-06T11:41:24Z | 2026-01-06T11:41:24Z |
| suse-su-2026:0042-1 | Security update for usbmuxd | 2026-01-06T10:34:56Z | 2026-01-06T10:34:56Z |
| suse-su-2026:0041-1 | Security update for rsync | 2026-01-06T10:33:33Z | 2026-01-06T10:33:33Z |
| suse-su-2026:0039-1 | Security update for qemu | 2026-01-06T10:31:23Z | 2026-01-06T10:31:23Z |
| suse-su-2026:0036-1 | Security update for libpcap | 2026-01-06T10:22:41Z | 2026-01-06T10:22:41Z |
| suse-su-2026:0034-1 | Security update for the Linux Kernel | 2026-01-05T19:29:28Z | 2026-01-05T19:29:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:3043 | Moderate: ansible-core bug fix, enhancement, and security update | 2024-05-22T00:00:00Z | 2024-05-29T14:39:55Z |
| alsa-2024:3030 | Moderate: libsndfile security update | 2024-05-22T00:00:00Z | 2024-05-29T14:40:37Z |
| alsa-2024:3022 | Moderate: motif security update | 2024-05-22T00:00:00Z | 2024-05-29T14:44:13Z |
| alsa-2024:3017 | Important: edk2 security update | 2024-05-22T00:00:00Z | 2024-05-29T12:19:10Z |
| alsa-2024:3008 | Important: pmix security update | 2024-05-22T00:00:00Z | 2024-05-29T14:39:53Z |
| alsa-2024:3005 | Moderate: python-pillow security update | 2024-05-22T00:00:00Z | 2024-05-29T14:45:15Z |
| alsa-2024:2996 | Moderate: xorg-x11-server-Xwayland security update | 2024-05-22T00:00:00Z | 2024-05-29T16:19:03Z |
| alsa-2024:2995 | Moderate: xorg-x11-server security update | 2024-05-22T00:00:00Z | 2024-05-29T16:20:19Z |
| alsa-2024:2994 | Moderate: LibRaw security update | 2024-05-22T00:00:00Z | 2024-05-29T12:19:05Z |
| alsa-2024:2987 | Moderate: python27:2.7 security update | 2024-05-22T00:00:00Z | 2024-05-29T14:51:40Z |
| alsa-2024:2986 | Moderate: python3.11-urllib3 security update | 2024-05-22T00:00:00Z | 2024-05-29T14:42:03Z |
| alsa-2024:2985 | Moderate: python39:3.9 and python39-devel:3.9 security update | 2024-05-22T00:00:00Z | 2024-05-29T14:50:33Z |
| alsa-2024:2982 | Important: webkit2gtk3 security update | 2024-05-22T00:00:00Z | 2024-05-29T14:45:15Z |
| alsa-2024:2981 | Moderate: frr security update | 2024-05-22T00:00:00Z | 2024-05-29T14:43:20Z |
| alsa-2024:2980 | Moderate: harfbuzz security update | 2024-05-22T00:00:00Z | 2024-05-29T14:44:10Z |
| alsa-2024:2979 | Moderate: poppler security update | 2024-05-22T00:00:00Z | 2024-05-29T14:47:13Z |
| alsa-2024:2974 | Moderate: libXpm security update | 2024-05-22T00:00:00Z | 2024-05-29T14:41:59Z |
| alsa-2024:2973 | Moderate: libX11 security update | 2024-05-22T00:00:00Z | 2024-05-29T14:46:08Z |
| alsa-2024:2968 | Moderate: fence-agents security and bug fix update | 2024-05-22T00:00:00Z | 2024-05-29T14:51:26Z |
| alsa-2024:2966 | Low: ghostscript security update | 2024-05-22T00:00:00Z | 2024-05-29T14:45:36Z |
| alsa-2024:2961 | Moderate: Image builder components bug fix, enhancement and security update | 2024-05-22T00:00:00Z | 2024-05-29T14:40:22Z |
| alsa-2024:2953 | Moderate: pcs security update | 2024-05-22T00:00:00Z | 2024-05-29T14:39:49Z |
| alsa-2024:2952 | Moderate: resource-agents security and bug fix update | 2024-05-22T00:00:00Z | 2024-05-29T14:41:52Z |
| alsa-2024:2950 | Moderate: kernel-rt security and bug fix update | 2024-05-22T00:00:00Z | 2024-05-29T12:19:46Z |
| alsa-2024:2910 | Important: nodejs security update | 2024-05-20T00:00:00Z | 2024-05-20T07:23:15Z |
| alsa-2024:2888 | Important: thunderbird security update | 2024-05-16T00:00:00Z | 2024-05-21T07:54:53Z |
| alsa-2024:2883 | Important: firefox security update | 2024-05-16T00:00:00Z | 2024-05-21T07:56:50Z |
| alsa-2024:2853 | Important: nodejs:20 security update | 2024-05-15T00:00:00Z | 2024-05-16T07:49:52Z |
| alsa-2024:2843 | Important: .NET 7.0 security update | 2024-05-15T00:00:00Z | 2024-05-16T07:51:11Z |
| alsa-2024:2842 | Important: .NET 8.0 security update | 2024-05-14T00:00:00Z | 2024-05-16T07:52:44Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-57 | Heap-buffer-overflow in _estrdup | 2022-01-19T00:00:22.188845Z | 2022-04-13T03:04:33.581273Z |
| osv-2022-55 | Heap-buffer-overflow in ndlz4_decompress | 2022-01-17T00:01:46.844742Z | 2022-04-13T03:04:40.429461Z |
| osv-2021-1803 | UNKNOWN READ in chunk_obj_alloc | 2022-01-17T00:01:26.621940Z | 2022-04-13T03:04:34.776233Z |
| osv-2022-54 | Heap-buffer-overflow in s_hex_process | 2022-01-17T00:00:22.068535Z | 2022-04-13T03:04:34.485965Z |
| osv-2022-53 | Heap-buffer-overflow in mem_true24_fill_rectangle | 2022-01-17T00:00:11.001652Z | 2022-04-13T03:04:34.496848Z |
| osv-2022-51 | Negative-size-param in ndlz4_decompress | 2022-01-16T00:01:39.199642Z | 2023-02-04T00:12:57.308124Z |
| osv-2022-48 | Heap-buffer-overflow in processClientServerHello | 2022-01-16T00:01:02.352424Z | 2022-04-13T03:04:35.950537Z |
| osv-2022-47 | Heap-buffer-overflow in mem_mono_copy_mono | 2022-01-16T00:00:36.108268Z | 2022-04-13T03:04:34.703597Z |
| osv-2021-1802 | UNKNOWN READ in pdfi_count_cff_index | 2022-01-15T00:01:46.159354Z | 2022-04-13T03:04:34.770346Z |
| osv-2022-42 | Heap-buffer-overflow in md_decode_utf8__ | 2022-01-14T00:00:32.201187Z | 2022-04-13T03:04:34.861184Z |
| osv-2022-41 | Segv on unknown address in zero | 2022-01-14T00:00:26.166067Z | 2022-04-13T03:04:33.433288Z |
| osv-2022-40 | UNKNOWN READ in md_build_attribute | 2022-01-14T00:00:14.345044Z | 2022-04-13T03:04:34.866550Z |
| osv-2022-39 | Stack-buffer-overflow in BZ2_decompress | 2022-01-14T00:00:06.951694Z | 2022-04-13T03:04:34.905281Z |
| osv-2022-37 | Heap-buffer-overflow in stringProcess | 2022-01-13T00:01:03.929984Z | 2023-09-25T14:30:41.938585Z |
| osv-2022-36 | Heap-buffer-overflow in void absl::BytesToHexStringInternal<std::__1::basic_string<char, std::__1::char_ | 2022-01-13T00:00:36.808390Z | 2022-04-13T03:04:42.815986Z |
| osv-2022-35 | Use-after-poison in absl::BytesToHexString | 2022-01-13T00:00:25.384147Z | 2022-04-13T03:04:42.821777Z |
| osv-2022-34 | Heap-buffer-overflow in LZ4_decompress_safe | 2022-01-12T00:01:27.704351Z | 2022-06-16T00:04:26.487538Z |
| osv-2022-33 | Heap-buffer-overflow in ndlz8_decompress | 2022-01-12T00:00:34.083560Z | 2022-05-09T00:03:53.061033Z |
| osv-2022-32 | Heap-buffer-overflow in _estrdup | 2022-01-11T00:01:35.764166Z | 2022-04-13T03:04:33.372135Z |
| osv-2022-24 | Null-dereference READ in session_startup | 2022-01-09T00:01:35.903934Z | 2025-02-01T14:16:58.476563Z |
| osv-2022-21 | Heap-buffer-overflow in Assimp::IOSystem2Unzip::opendisk | 2022-01-09T00:00:18.775490Z | 2022-04-13T03:04:42.661784Z |
| osv-2022-18 | UNKNOWN READ in gx_restrict_Pattern | 2022-01-07T00:02:01.270812Z | 2022-04-13T03:04:34.575775Z |
| osv-2022-17 | Heap-buffer-overflow in ap_is_chunked | 2022-01-07T00:01:40.476644Z | 2022-04-13T03:04:35.773121Z |
| osv-2022-16 | UNKNOWN READ in MqttProps_Free | 2022-01-07T00:00:23.617044Z | 2022-04-13T03:04:34.050368Z |
| osv-2022-15 | Global-buffer-overflow in ZSTD_compressBlock_opt0 | 2022-01-07T00:00:09.720542Z | 2022-04-13T03:04:31.638184Z |
| osv-2022-13 | Heap-use-after-free in read_data_compressed | 2022-01-06T00:02:10.206687Z | 2022-04-13T03:31:58.721976Z |
| osv-2022-12 | Heap-buffer-overflow in print_mac | 2022-01-06T00:02:06.880603Z | 2022-04-13T03:04:31.155422Z |
| osv-2022-11 | Heap-buffer-overflow in dhcp_reply | 2022-01-06T00:01:04.470937Z | 2022-04-13T03:04:31.185616Z |
| osv-2022-10 | Heap-buffer-overflow in check_bad_address | 2022-01-06T00:00:44.554417Z | 2022-04-13T03:04:31.191964Z |
| osv-2022-6 | Heap-buffer-overflow in extract_name | 2022-01-06T00:00:09.667642Z | 2022-04-13T03:04:31.123021Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-python-2024-11168 | Improper validation of IPv6 and IPvFuture addresses | 2024-12-10T11:25:45.323Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-50602 | 2024-12-05T07:15:23.404Z | 2026-02-11T09:09:18.507Z | |
| bit-haproxy-2024-53008 | 2024-12-05T07:06:43.292Z | 2025-04-03T14:40:37.652Z | |
| bit-node-2024-22017 | 2024-11-29T14:03:41.826Z | 2026-02-11T09:09:18.507Z | |
| bit-gitlab-2024-10240 | Exposure of Sensitive System Information to an Unauthorized Control Sphere in GitLab | 2024-11-28T19:22:10.536Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-11668 | Insufficient Session Expiration in GitLab | 2024-11-28T19:22:00.426Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-11669 | Incorrect Authorization in GitLab | 2024-11-28T19:21:54.715Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-11828 | Inefficient Algorithmic Complexity in GitLab | 2024-11-28T19:21:48.331Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-8114 | Missing Authorization in GitLab | 2024-11-28T19:11:26.327Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-8177 | Inefficient Algorithmic Complexity in GitLab | 2024-11-28T19:11:11.328Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-8237 | Inefficient Algorithmic Complexity in GitLab | 2024-11-28T19:10:56.016Z | 2025-05-20T10:02:07.006Z |
| bit-virtualenv-2024-53899 | 2024-11-27T19:23:31.279Z | 2025-04-03T14:40:37.652Z | |
| bit-php-2024-11233 | Single byte overread with convert.quoted-printable-decode filter | 2024-11-27T19:20:18.573Z | 2025-11-06T13:25:46.476Z |
| bit-php-2024-11234 | Configuring a proxy in a stream context might allow for CRLF injection in URIs | 2024-11-27T19:20:11.489Z | 2025-11-06T13:25:46.476Z |
| bit-php-2024-11236 | Integer overflow in the firebird and dblib quoters causing OOB writes | 2024-11-27T19:20:03.987Z | 2025-11-06T13:25:46.476Z |
| bit-php-2024-8929 | Leak partial content of the heap through heap buffer over-read in mysqlnd | 2024-11-27T19:18:36.988Z | 2025-11-06T13:25:46.476Z |
| bit-php-2024-8932 | OOB access in ldap_escape | 2024-11-27T19:18:28.985Z | 2025-11-06T13:25:46.476Z |
| bit-mlflow-2024-27134 | Excessive directory permissions in MLflow leads to local privilege escalation when using spark_udf | 2024-11-27T19:16:49.374Z | 2025-05-20T10:02:07.006Z |
| bit-cilium-2024-52529 | Layer 7 policy enforcement may not occur in policies with wildcarded port ranges in Cilium | 2024-11-27T19:10:35.180Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-48896 | Moodle: users' names returned in messaging error message | 2024-11-21T07:13:38.787Z | 2026-03-03T21:13:17.555Z |
| bit-moodle-2024-48897 | Moodle: idor in edit/delete rss feed | 2024-11-21T07:13:31.891Z | 2026-03-03T21:13:17.555Z |
| bit-moodle-2024-48898 | Moodle: some users can delete audiences of other reports | 2024-11-21T07:13:24.286Z | 2026-03-03T21:13:17.555Z |
| bit-moodle-2024-48901 | Moodle: idor when fetching report schedules | 2024-11-21T07:13:17.796Z | 2026-03-03T21:13:17.555Z |
| bit-tomcat-2024-52317 | Apache Tomcat: Request/response mix-up with HTTP/2 | 2024-11-20T07:20:06.896Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-52318 | Apache Tomcat: Incorrect JSP tag recycling leads to XSS | 2024-11-20T07:19:59.288Z | 2025-07-09T15:43:42.864Z |
| bit-harbor-2022-31667 | Harbor fails to validate the user permissions when updating a robot account | 2024-11-20T07:11:07.078Z | 2025-05-20T10:02:07.006Z |
| bit-harbor-2022-31668 | User permission validation failure and disclosure of P2P preheat execution logs | 2024-11-20T07:10:59.480Z | 2025-05-20T10:02:07.006Z |
| bit-harbor-2022-31669 | Harbor fails to validate the user permissions when updating tag immutability policies | 2024-11-20T07:10:52.890Z | 2025-05-20T10:02:07.006Z |
| bit-harbor-2022-31670 | Harbor fails to validate the user permissions when updating tag retention policies | 2024-11-20T07:10:45.197Z | 2025-05-20T10:02:07.006Z |
| bit-harbor-2022-31671 | Harbor fails to validate the user permissions when reading and updating job execution logs through the P2P preheat execution logs | 2024-11-20T07:10:37.789Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2024-avi-0925 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2024-10-25T00:00:00.000000 | 2024-10-25T00:00:00.000000 |
| certfr-2024-avi-0924 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-10-25T00:00:00.000000 | 2024-10-25T00:00:00.000000 |
| certfr-2024-avi-0923 | Multiples vulnérabilités dans les produits IBM | 2024-10-25T00:00:00.000000 | 2024-10-25T00:00:00.000000 |
| certfr-2024-avi-0922 | Multiples vulnérabilités dans Microsoft Edge | 2024-10-25T00:00:00.000000 | 2024-10-25T00:00:00.000000 |
| certfr-2024-avi-0921 | Vulnérabilité dans les produits Microsoft | 2024-10-24T00:00:00.000000 | 2024-10-24T00:00:00.000000 |
| certfr-2024-avi-0920 | Vulnérabilité dans Microsoft Azure | 2024-10-24T00:00:00.000000 | 2024-10-24T00:00:00.000000 |
| certfr-2024-avi-0919 | Multiples vulnérabilités dans les produits Cisco | 2024-10-24T00:00:00.000000 | 2024-10-24T00:00:00.000000 |
| certfr-2024-avi-0918 | Multiples vulnérabilités dans GitLab | 2024-10-24T00:00:00.000000 | 2024-10-24T00:00:00.000000 |
| certfr-2024-avi-0917 | Vulnérabilité dans Fortinet FortiManager | 2024-10-23T00:00:00.000000 | 2024-10-24T00:00:00.000000 |
| certfr-2024-avi-0916 | Multiples vulnérabilités dans le greffon pour Office 365 de Splunk | 2024-10-23T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| certfr-2024-avi-0915 | Multiples vulnérabilités dans les produits Centreon | 2024-10-23T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| certfr-2024-avi-0914 | Vulnérabilité dans les produits Spring | 2024-10-23T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| certfr-2024-avi-0913 | Multiples vulnérabilités dans Google Chrome | 2024-10-23T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| certfr-2024-avi-0912 | Multiples vulnérabilités dans Liferay | 2024-10-23T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| certfr-2024-avi-0911 | Vulnérabilité dans les produits Moxa | 2024-10-22T00:00:00.000000 | 2024-10-22T00:00:00.000000 |
| certfr-2024-avi-0910 | Vulnérabilité dans MongoDB | 2024-10-22T00:00:00.000000 | 2024-10-22T00:00:00.000000 |
| certfr-2024-avi-0909 | Multiples vulnérabilités dans les produits Synology | 2024-10-21T00:00:00.000000 | 2024-10-22T00:00:00.000000 |
| certfr-2024-avi-0908 | Vulnérabilité dans Microsoft Edge | 2024-10-21T00:00:00.000000 | 2024-10-21T00:00:00.000000 |
| certfr-2024-avi-0907 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-10-18T00:00:00.000000 | 2024-10-18T00:00:00.000000 |
| certfr-2024-avi-0906 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-10-18T00:00:00.000000 | 2024-10-18T00:00:00.000000 |
| certfr-2024-avi-0905 | Multiples vulnérabilités dans les produits Moxa | 2024-10-18T00:00:00.000000 | 2024-10-18T00:00:00.000000 |
| certfr-2024-avi-0904 | Multiples vulnérabilités dans Foxit PDF Editor | 2024-10-18T00:00:00.000000 | 2024-10-18T00:00:00.000000 |
| certfr-2024-avi-0903 | Multiples vulnérabilités dans les produits IBM | 2024-10-18T00:00:00.000000 | 2024-10-18T00:00:00.000000 |
| certfr-2024-avi-0902 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2024-10-18T00:00:00.000000 | 2024-10-18T00:00:00.000000 |
| certfr-2024-avi-0901 | Multiples vulnérabilités dans Microsoft Edge | 2024-10-18T00:00:00.000000 | 2024-10-18T00:00:00.000000 |
| certfr-2024-avi-0900 | Multiples vulnérabilités dans Spring Framework | 2024-10-18T00:00:00.000000 | 2024-10-18T00:00:00.000000 |
| certfr-2024-avi-0899 | Vulnérabilité dans Grafana | 2024-10-18T00:00:00.000000 | 2024-10-21T00:00:00.000000 |
| certfr-2024-avi-0898 | Multiples vulnérabilités dans Google Pixel | 2024-10-17T00:00:00.000000 | 2024-10-17T00:00:00.000000 |
| certfr-2024-avi-0897 | Multiples vulnérabilités dans les produits Cisco | 2024-10-17T00:00:00.000000 | 2024-10-17T00:00:00.000000 |
| certfr-2024-avi-0896 | Vulnérabilité dans VMware HCX | 2024-10-17T00:00:00.000000 | 2024-10-17T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000064 | WordPress plugin "Ninja Forms" vulnerable to PHP object injection | 2016-05-13T14:27+09:00 | 2016-06-01T17:00+09:00 |
| jvndb-2016-000063 | FileMaker server issue where PHP source code may be viewable | 2016-05-13T14:27+09:00 | 2016-06-02T09:43+09:00 |
| jvndb-2016-000062 | WN-G300R Series vulnerable to cross-site scripting | 2016-05-12T14:34+09:00 | 2016-06-01T16:48+09:00 |
| jvndb-2016-000061 | WN-GDN/R3 Series does not limit authentication attempts | 2016-05-12T14:34+09:00 | 2016-06-01T16:52+09:00 |
| jvndb-2016-000059 | Apache Cordova vulnerable to arbitrary plugin execution | 2016-05-11T14:16+09:00 | 2016-06-01T16:30+09:00 |
| jvndb-2016-000058 | Apache Cordova fails to restrict access permissions | 2016-05-11T14:16+09:00 | 2016-06-02T17:49+09:00 |
| jvndb-2016-000053 | EC-CUBE vulnerable to cross-site request forgery | 2016-04-26T14:24+09:00 | 2016-05-31T17:40+09:00 |
| jvndb-2016-000057 | Multiple shiro8 Co., Ltd. freearea_ addition_plugins for EC-CUBE vulnerable to cross-site scripting | 2016-04-26T14:18+09:00 | 2016-05-25T17:48+09:00 |
| jvndb-2016-000052 | EC-CUBE fails to restrict access permissions | 2016-04-26T13:56+09:00 | 2016-05-31T17:41+09:00 |
| jvndb-2016-000051 | EC-CUBE fails to restrict access permissions | 2016-04-26T13:56+09:00 | 2016-05-31T17:41+09:00 |
| jvndb-2016-000056 | kintone mobile for Android fails to verify SSL server certificates | 2016-04-25T15:36+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000055 | kintone mobile for Android information management vulnerability | 2016-04-25T15:35+09:00 | 2016-06-01T16:21+09:00 |
| jvndb-2016-000054 | Electron may insecurely load Node modules | 2016-04-22T13:49+09:00 | 2016-06-01T15:56+09:00 |
| jvndb-2016-000050 | Photopt App fails to verify SSL server certificates | 2016-04-19T13:44+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000049 | Tokyo Star bank App fails to verify SSL server certificates | 2016-04-13T14:30+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000048 | EC-CUBE plugin "Social-button Plugin Premium" and "Social-button Plugin" vulnerable to cross-site scripting | 2016-04-08T12:31+09:00 | 2016-05-06T16:13+09:00 |
| jvndb-2016-000045 | baserCMS plugin "Casebook Plugin" vulnerable to cross-site request forgery | 2016-04-06T15:29+09:00 | 2016-04-08T16:51+09:00 |
| jvndb-2016-000044 | baserCMS plugin "Casebook Plugin" vulnerable to cross-site scripting | 2016-04-06T15:29+09:00 | 2016-04-08T16:51+09:00 |
| jvndb-2016-000043 | baserCMS plugin "Menubook Plugin" vulnerable to cross-site request forgery | 2016-04-06T15:29+09:00 | 2016-04-08T16:51+09:00 |
| jvndb-2016-000042 | baserCMS plugin "Menubook Plugin" vulnerable to cross-site scripting | 2016-04-06T15:29+09:00 | 2016-04-08T16:51+09:00 |
| jvndb-2016-000041 | baserCMS plugin "Recruit Plugin" vulnerable to cross-site request forgery | 2016-04-06T15:29+09:00 | 2016-04-08T16:51+09:00 |
| jvndb-2016-000040 | baserCMS plugin "Recruit Plugin" vulnerable to cross-site scripting | 2016-04-06T15:29+09:00 | 2016-04-08T16:51+09:00 |
| jvndb-2016-000039 | AQUOS Photo Player HN-PP150 vulnerable to cross-site request forgery | 2016-04-04T15:30+09:00 | 2016-04-07T12:05+09:00 |
| jvndb-2016-000038 | ActiveX control for EVA Animator vulnerable to buffer overflow | 2016-04-04T15:30+09:00 | 2016-04-20T09:38+09:00 |
| jvndb-2016-000037 | WisePoint contains issue in preventing clickjacking attacks | 2016-04-04T15:30+09:00 | 2016-04-07T12:05+09:00 |
| jvndb-2016-000036 | Aterm WG300HP vulnerable to cross-site request forgery | 2016-03-30T14:49+09:00 | 2016-04-18T15:41+09:00 |
| jvndb-2016-000035 | Aterm WF800HP vulnerable to cross-site request forgery | 2016-03-30T14:49+09:00 | 2016-04-18T15:42+09:00 |
| jvndb-2016-000034 | WordPress plugin "WP Favorite Posts" vulnerable to cross-site scripting | 2016-03-24T12:28+09:00 | 2016-03-29T15:40+09:00 |
| jvndb-2016-001559 | Information Disclosure Vulnerability in Hitachi Compute Systems Manager | 2016-03-07T17:00+09:00 | 2016-03-31T17:50+09:00 |
| jvndb-2016-000032 | Multiple Corega wireless LAN routers vulnerable to cross-site request forgery | 2016-03-02T14:52+09:00 | 2016-03-16T13:46+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-30452 | Socomec DIRIS Digiware M-70拒绝服务漏洞 | 2025-12-03 | 2025-12-11 |
| cnvd-2025-30355 | Grav资源管理错误漏洞 | 2025-12-03 | 2025-12-09 |
| cnvd-2025-30354 | Grav权限提升漏洞(CNVD-2025-30354) | 2025-12-03 | 2025-12-09 |
| cnvd-2025-30353 | Grav路径遍历漏洞(CNVD-2025-30353) | 2025-12-03 | 2025-12-09 |
| cnvd-2025-30352 | Grav服务端模板注入漏洞(CNVD-2025-30352) | 2025-12-03 | 2025-12-09 |
| cnvd-2025-30351 | Grav授权问题漏洞 | 2025-12-03 | 2025-12-09 |
| cnvd-2025-30350 | Grav路径遍历漏洞(CNVD-2025-30350) | 2025-12-03 | 2025-12-09 |
| cnvd-2025-30349 | Grav路径遍历漏洞 | 2025-12-03 | 2025-12-09 |
| cnvd-2025-30348 | Grav跨站脚本漏洞(CNVD-2025-30348) | 2025-12-03 | 2025-12-09 |
| cnvd-2025-30347 | Grav跨站脚本漏洞(CNVD-2025-30347) | 2025-12-03 | 2025-12-09 |
| cnvd-2025-30346 | Grav跨站脚本漏洞(CNVD-2025-30346) | 2025-12-03 | 2025-12-09 |
| cnvd-2025-30345 | Grav跨站脚本漏洞(CNVD-2025-30345) | 2025-12-03 | 2025-12-09 |
| cnvd-2025-30344 | Grav跨站脚本漏洞 | 2025-12-03 | 2025-12-09 |
| cnvd-2025-30343 | Grav拒绝服务漏洞 | 2025-12-03 | 2025-12-09 |
| cnvd-2025-30342 | Grav服务器端模板注入漏洞(CNVD-2025-30342) | 2025-12-03 | 2025-12-09 |
| cnvd-2025-30341 | Grav代码执行漏洞 | 2025-12-03 | 2025-12-09 |
| cnvd-2025-30340 | Grav用户枚举和电子邮件泄露漏洞 | 2025-12-03 | 2025-12-09 |
| cnvd-2025-30339 | Grav服务器端模板注入漏洞 | 2025-12-03 | 2025-12-09 |
| cnvd-2025-30338 | Grav权限提升漏洞 | 2025-12-03 | 2025-12-09 |
| cnvd-2025-30337 | Grav不安全的直接对象引用漏洞 | 2025-12-03 | 2025-12-09 |
| cnvd-2025-30302 | Huawei HarmonyOS权限控制漏洞(CNVD-2025-30302) | 2025-12-03 | 2025-12-08 |
| cnvd-2025-30301 | Huawei HarmonyOS身份认证绕过漏洞 | 2025-12-03 | 2025-12-08 |
| cnvd-2025-30300 | Huawei HarmonyOS权限控制漏洞(CNVD-2025-30300) | 2025-12-03 | 2025-12-08 |
| cnvd-2025-30299 | Huawei HarmonyOS权限控制漏洞(CNVD-2025-30299) | 2025-12-03 | 2025-12-08 |
| cnvd-2025-30298 | Huawei HarmonyOS配置缺陷漏洞 | 2025-12-03 | 2025-12-08 |
| cnvd-2025-30297 | Huawei HarmonyOS安全检查标准不当漏洞 | 2025-12-03 | 2025-12-08 |
| cnvd-2025-30296 | Huawei HarmonyOS权限控制漏洞(CNVD-2025-30296) | 2025-12-03 | 2025-12-08 |
| cnvd-2025-30295 | Huawei HarmonyOS权限控制漏洞(CNVD-2025-30295) | 2025-12-03 | 2025-12-08 |
| cnvd-2025-30294 | Huawei HarmonyOS权限控制漏洞 | 2025-12-03 | 2025-12-08 |
| cnvd-2025-30293 | Huawei HarmonyOS拒绝服务漏洞 | 2025-12-03 | 2025-12-08 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-16288 | Уязвимость программного средства для моделирования и автоматизации дискретных событий Roc… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16287 | Уязвимость модуля drivers/clk/tegra/clk-tegra124-emc.c ядра операционной системы Linux, п… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16286 | Уязвимость веб-сервера микропрограммного обеспечения сетевых устройств Zyxel 4G LTE/5G NR… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16285 | Уязвимость функции cpu_to_node() ядра операционной системы Linux, позволяющая нарушителю … | 24.12.2025 | 24.12.2025 |
| bdu:2025-16284 | Уязвимость интерфейса REST API системы управления сетевой инфраструктурой Cisco Catalyst … | 24.12.2025 | 24.12.2025 |
| bdu:2025-16283 | Уязвимость системы управления сетевой инфраструктурой Cisco Catalyst Center (ранее Cisco … | 24.12.2025 | 24.12.2025 |
| bdu:2025-16282 | Уязвимость веб-интерфейса управления системы управления сетевой инфраструктурой Cisco Cat… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16281 | Уязвимость веб-интерфейса управления системы управления сетевой инфраструктурой Cisco Cat… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16280 | Уязвимость программного обеспечения OpenVPN, связанная с неограниченным распределением ре… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16279 | Уязвимость функции mvpp2_ethtool_get_rxnfc() ядра операционной системы Linux, позволяющая… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16278 | Уязвимость функции virtnet_open() компонента virtio_net ядра операционной системы Linux, … | 24.12.2025 | 24.12.2025 |
| bdu:2025-16277 | Уязвимость функции amdgpu_dm_fini() ядра операционной системы Linux, позволяющая нарушите… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16276 | Уязвимость драйвера преобразования JDBC-вызовов SAP jConnect, связанная с недостатками ме… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16275 | Уязвимость сервера веб-приложений SAP NetWeaver Internet Communication Manager, веб-диспе… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16274 | Уязвимость сервера веб-приложений SAP NetWeaver Internet Communication Manager, сервера с… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16273 | Уязвимость программной интеграционной платформы SAP NetWeaver, связанная с неконтролируем… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16272 | Уязвимость сервера веб-приложений SAP NetWeaver Internet Communication Framework, связанн… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16271 | Уязвимость сервера управления данными SAP MDM Server, связанная с освобождением ранее не … | 24.12.2025 | 24.12.2025 |
| bdu:2025-16270 | Уязвимость функции Read сервера управления данными SAP MDM Server, позволяющая нарушителю… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16269 | Уязвимость функции hci_suspend_notifier() в модуле net/bluetooth/hci_core.c подсистемы Bl… | 24.12.2025 | 09.02.2026 |
| bdu:2025-16268 | Уязвимость программного обеспечения разработки и выполнения приложений на языке ABAP SAP … | 24.12.2025 | 24.12.2025 |
| bdu:2025-16267 | Уязвимость программной интеграционной платформы SAP NetWeaver Application Server ABAP, св… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16266 | Уязвимость инструмента администрирования публикации отчетов SAP BusinessObjects Content A… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16265 | Уязвимость системы управления данными и аналитики SAP Business Warehouse, связанная с неп… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16264 | Уязвимость программной интеграционной платформы SAP NetWeaver Application Server ABAP, св… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16263 | Уязвимость веб-интерфейса управления системами IP-телефонии FreePBX, позволяющая нарушите… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16262 | Уязвимость функции __stack_chk_fail() ядра операционной системы Linux, позволяющая наруши… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16261 | Уязвимость веб-интерфейса управления системами IP-телефонии FreePBX, позволяющая нарушите… | 24.12.2025 | 24.12.2025 |
| bdu:2025-16260 | Уязвимость плагина SAP Plug-In Basis системы управления данными и аналитики SAP Business … | 24.12.2025 | 24.12.2025 |
| bdu:2025-16259 | Уязвимость прикладного программного интерфейса программного обеспечения Red Hat AI Infere… | 24.12.2025 | 24.12.2025 |
| ID | Description | Updated |
|---|---|---|
| var-202308-3601 | Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via … | 2025-12-18T00:35:43.942000Z |
| var-202308-3330 | Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via … | 2025-12-18T00:35:21.287000Z |
| var-202308-3226 | Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via … | 2025-12-18T00:34:53.096000Z |
| var-202412-0388 | A vulnerability has been identified in SIMATIC S7-PLCSIM V16 (All versions), SIMATIC S7-P… | 2025-12-18T00:34:50.874000Z |
| var-202508-1608 | EnzoH has an OS command injection vulnerability. Successful exploitation of this vulnerab… | 2025-12-18T00:34:49.092000Z |
| var-202510-4196 | A vulnerability in the web UI of Cisco Desk Phone 9800 Series, Cisco IP Phone 7800 and 88… | 2025-12-18T00:33:53.873000Z |
| var-202308-2793 | Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the list paramete… | 2025-12-18T00:32:28.220000Z |
| var-202308-3191 | Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via … | 2025-12-18T00:32:28.182000Z |
| var-202502-2961 | Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged… | 2025-12-18T00:32:25.448000Z |
| var-202511-0844 | A stored cross-site scripting (XSS) vulnerability was discovered in Tenda AC18 v15.03.05.… | 2025-12-18T00:32:23.165000Z |
| var-202511-1472 | Improper Input Validation vulnerability in NETGEAR R6260 and NETGEAR R6850 allows unauthe… | 2025-12-18T00:32:23.118000Z |
| var-202511-1682 | Improper certificate validation in firmware update logic in NETGEAR RAX30 (Nighthawk AX5 … | 2025-12-18T00:32:23.092000Z |
| var-202407-0512 | Vulnerability in Tenda AC8v4 .V16.03.34.09 due to sscanf and the last digit of s8 being o… | 2025-12-18T00:31:44.840000Z |
| var-202511-1888 | Improper input validation in NETGEAR DGN2200v4 (N300 Wireless ADSL2+ Modem Router) allows… | 2025-12-18T00:31:41.327000Z |
| var-202308-3399 | Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via … | 2025-12-18T00:31:26.512000Z |
| var-202508-1009 | EnzoH has an OS command injection vulnerability. Successful exploitation of this vulnerab… | 2025-12-18T00:29:07.455000Z |
| var-202308-3398 | Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via … | 2025-12-18T00:28:36.966000Z |
| var-202410-2938 | IBM Flexible Service Processor (FSP) FW860.00 through FW860.B3, FW950.00 through FW950.C0… | 2025-12-18T00:28:34.915000Z |
| var-202308-2765 | Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the list paramete… | 2025-12-18T00:27:25.800000Z |
| var-202308-3396 | Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via … | 2025-12-18T00:27:25.745000Z |
| var-202508-1500 | EnzoH has an OS command injection vulnerability. Successful exploitation of this vulnerab… | 2025-12-18T00:27:21.854000Z |
| var-202510-2085 | A buffer overflow in the UPnP service of Tenda AC8 Hardware v03.03.10.01 allows attackers… | 2025-12-18T00:26:24.455000Z |
| var-201905-0853 | An exploitable remote code execution vulnerability exists in the upload.cgi functionality… | 2025-12-18T00:23:25.774000Z |
| var-202412-0387 | A vulnerability has been identified in SIMATIC S7-PLCSIM V17 (All versions), SIMATIC S7-P… | 2025-12-18T00:23:16.681000Z |
| var-202507-0163 | A vulnerability has been identified in SIMATIC CN 4100 (All versions < V4.0). The affecte… | 2025-12-18T00:23:11.665000Z |
| var-202308-3227 | Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via … | 2025-12-18T00:17:25.708000Z |
| var-202510-3182 | A vulnerability in the web UI of Cisco Desk Phone 9800 Series, Cisco IP Phone 7800 and 88… | 2025-12-18T00:17:18.490000Z |
| var-202308-3397 | Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via … | 2025-12-18T00:09:29.738000Z |
| var-202401-0196 | A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The "interm… | 2025-12-18T00:09:28.683000Z |
| var-202401-0197 | A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The "interm… | 2025-12-18T00:09:28.660000Z |