Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-23409 |
N/A
|
apparmor: fix differential encoding verification |
Linux |
Linux |
2026-04-01T08:36:38.516Z | 2026-04-18T08:58:44.586Z |
| CVE-2026-23408 |
7.8 (3.1)
|
apparmor: Fix double free of ns_name in aa_replace_pro… |
Linux |
Linux |
2026-04-01T08:36:37.873Z | 2026-04-18T08:58:43.247Z |
| CVE-2026-23407 |
7.8 (3.1)
|
apparmor: fix missing bounds check on DEFAULT table in… |
Linux |
Linux |
2026-04-01T08:36:37.197Z | 2026-04-18T08:58:41.909Z |
| CVE-2026-23406 |
7.8 (3.1)
|
apparmor: fix side-effect bug in match_char() macro usage |
Linux |
Linux |
2026-04-01T08:36:36.460Z | 2026-04-18T08:58:40.555Z |
| CVE-2026-23405 |
N/A
|
apparmor: fix: limit the number of levels of policy na… |
Linux |
Linux |
2026-04-01T08:36:35.697Z | 2026-04-18T08:58:39.212Z |
| CVE-2026-23404 |
N/A
|
apparmor: replace recursive profile removal with itera… |
Linux |
Linux |
2026-04-01T08:36:35.032Z | 2026-04-18T08:58:37.883Z |
| CVE-2026-23403 |
N/A
|
apparmor: fix memory leak in verify_header |
Linux |
Linux |
2026-04-01T08:36:34.269Z | 2026-04-18T08:58:36.504Z |
| CVE-2026-23401 |
N/A
|
KVM: x86/mmu: Drop/zap existing present SPTE even when… |
Linux |
Linux |
2026-04-01T08:36:32.367Z | 2026-04-18T08:58:35.165Z |
| CVE-2026-23398 |
N/A
|
icmp: fix NULL pointer dereference in icmp_tag_validation() |
Linux |
Linux |
2026-03-26T10:22:50.606Z | 2026-04-18T08:58:33.834Z |
| CVE-2026-23397 |
N/A
|
nfnetlink_osf: validate individual option lengths in f… |
Linux |
Linux |
2026-03-26T10:22:49.954Z | 2026-04-18T08:58:32.483Z |
| CVE-2026-23396 |
N/A
|
wifi: mac80211: fix NULL deref in mesh_matches_local() |
Linux |
Linux |
2026-03-26T10:22:49.287Z | 2026-04-18T08:58:31.018Z |
| CVE-2026-23395 |
8.8 (3.1)
|
Bluetooth: L2CAP: Fix accepting multiple L2CAP_ECRED_C… |
Linux |
Linux |
2026-03-25T10:33:18.936Z | 2026-04-18T08:58:29.622Z |
| CVE-2026-23394 |
N/A
|
af_unix: Give up GC if MSG_PEEK intervened. |
Linux |
Linux |
2026-03-25T10:33:18.180Z | 2026-04-18T08:58:28.303Z |
| CVE-2026-23391 |
7.8 (3.1)
|
netfilter: xt_CT: drop pending enqueued packets on tem… |
Linux |
Linux |
2026-03-25T10:33:15.677Z | 2026-04-18T08:58:26.823Z |
| CVE-2026-23388 |
N/A
|
Squashfs: check metadata block offset is within range |
Linux |
Linux |
2026-03-25T10:28:06.224Z | 2026-04-18T08:58:25.502Z |
| CVE-2026-23382 |
N/A
|
HID: Add HID_CLAIMED_INPUT guards in raw_event callbac… |
Linux |
Linux |
2026-03-25T10:28:01.040Z | 2026-04-18T08:58:24.172Z |
| CVE-2026-23381 |
N/A
|
net: bridge: fix nd_tbl NULL dereference when IPv6 is … |
Linux |
Linux |
2026-03-25T10:28:00.416Z | 2026-04-18T08:58:22.834Z |
| CVE-2026-23379 |
N/A
|
net/sched: ets: fix divide by zero in the offload path |
Linux |
Linux |
2026-03-25T10:27:58.659Z | 2026-04-18T08:58:21.505Z |
| CVE-2026-23374 |
N/A
|
blktrace: fix __this_cpu_read/write in preemptible context |
Linux |
Linux |
2026-03-25T10:27:55.117Z | 2026-04-18T08:58:20.182Z |
| CVE-2026-23372 |
7.8 (3.1)
|
nfc: rawsock: cancel tx_work before socket teardown |
Linux |
Linux |
2026-03-25T10:27:53.308Z | 2026-04-18T08:58:18.823Z |
| CVE-2026-23370 |
N/A
|
platform/x86: dell-wmi-sysman: Don't hex dump plaintex… |
Linux |
Linux |
2026-03-25T10:27:51.370Z | 2026-04-18T08:58:17.507Z |
| CVE-2026-23368 |
N/A
|
net: phy: register phy led_triggers during probe to av… |
Linux |
Linux |
2026-03-25T10:27:49.889Z | 2026-04-18T08:58:16.163Z |
| CVE-2026-23367 |
N/A
|
wifi: radiotap: reject radiotap with unknown bits |
Linux |
Linux |
2026-03-25T10:27:49.068Z | 2026-04-18T08:58:14.832Z |
| CVE-2026-23365 |
N/A
|
net: usb: kalmia: validate USB endpoints |
Linux |
Linux |
2026-03-25T10:27:47.609Z | 2026-04-18T08:58:13.498Z |
| CVE-2026-23362 |
N/A
|
can: bcm: fix locking for bcm_op runtime updates |
Linux |
Linux |
2026-03-25T10:27:45.476Z | 2026-04-18T08:58:12.167Z |
| CVE-2026-23359 |
N/A
|
bpf: Fix stack-out-of-bounds write in devmap |
Linux |
Linux |
2026-03-25T10:27:43.070Z | 2026-04-18T08:58:10.801Z |
| CVE-2026-23357 |
N/A
|
can: mcp251x: fix deadlock in error path of mcp251x_open |
Linux |
Linux |
2026-03-25T10:27:41.299Z | 2026-04-18T08:58:09.426Z |
| CVE-2026-23356 |
N/A
|
drbd: fix "LOGIC BUG" in drbd_al_begin_io_nonblock() |
Linux |
Linux |
2026-03-25T10:27:40.454Z | 2026-04-18T08:58:08.080Z |
| CVE-2026-23352 |
N/A
|
x86/efi: defer freeing of boot services memory |
Linux |
Linux |
2026-03-25T10:27:37.500Z | 2026-04-18T08:58:06.719Z |
| CVE-2026-23351 |
7.8 (3.1)
|
netfilter: nft_set_pipapo: split gc into unlink and re… |
Linux |
Linux |
2026-03-25T10:27:36.854Z | 2026-04-18T08:58:05.366Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-23351 |
7.8 (3.1)
|
netfilter: nft_set_pipapo: split gc into unlink and re… |
Linux |
Linux |
2026-03-25T10:27:36.854Z | 2026-04-18T08:58:05.366Z |
| CVE-2026-23340 |
7.8 (3.1)
|
net: sched: avoid qdisc_reset_all_tx_gt() vs dequeue r… |
Linux |
Linux |
2026-03-25T10:27:28.728Z | 2026-04-18T08:58:04.016Z |
| CVE-2026-23339 |
N/A
|
nfc: nci: free skb on nci_transceive early error paths |
Linux |
Linux |
2026-03-25T10:27:28.073Z | 2026-04-18T08:58:02.658Z |
| CVE-2026-23336 |
7.8 (3.1)
|
wifi: cfg80211: cancel rfkill_block work in wiphy_unre… |
Linux |
Linux |
2026-03-25T10:27:26.061Z | 2026-04-18T08:58:01.292Z |
| CVE-2026-23335 |
N/A
|
RDMA/irdma: Fix kernel stack leak in irdma_create_user_ah() |
Linux |
Linux |
2026-03-25T10:27:25.418Z | 2026-04-18T08:57:59.964Z |
| CVE-2026-23330 |
N/A
|
nfc: nci: complete pending data exchange on device close |
Linux |
Linux |
2026-03-25T10:27:21.871Z | 2026-04-18T08:57:58.619Z |
| CVE-2026-23324 |
N/A
|
can: usb: etas_es58x: correctly anchor the urb in the … |
Linux |
Linux |
2026-03-25T10:27:17.476Z | 2026-04-18T08:57:57.249Z |
| CVE-2026-23318 |
N/A
|
ALSA: usb-audio: Use correct version for UAC3 header v… |
Linux |
Linux |
2026-03-25T10:27:12.884Z | 2026-04-18T08:57:55.922Z |
| CVE-2026-23312 |
N/A
|
net: usb: kaweth: validate USB endpoints |
Linux |
Linux |
2026-03-25T10:27:07.916Z | 2026-04-18T08:57:54.585Z |
| CVE-2026-23307 |
N/A
|
can: ems_usb: ems_usb_read_bulk_callback(): check the … |
Linux |
Linux |
2026-03-25T10:27:02.746Z | 2026-04-18T08:57:53.252Z |
| CVE-2026-23304 |
N/A
|
ipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu() |
Linux |
Linux |
2026-03-25T10:26:59.015Z | 2026-04-18T08:57:51.949Z |
| CVE-2026-23303 |
N/A
|
smb: client: Don't log plaintext credentials in cifs_s… |
Linux |
Linux |
2026-03-25T10:26:58.166Z | 2026-04-18T08:57:50.190Z |
| CVE-2026-23302 |
N/A
|
net: annotate data-races around sk->sk_{data_ready,wri… |
Linux |
Linux |
2026-03-25T10:26:57.470Z | 2026-04-18T08:57:48.866Z |
| CVE-2026-23300 |
N/A
|
net: ipv6: fix panic when IPv4 route references loopba… |
Linux |
Linux |
2026-03-25T10:26:56.138Z | 2026-04-18T08:57:47.517Z |
| CVE-2026-23298 |
N/A
|
can: ucan: Fix infinite loop from zero-length messages |
Linux |
Linux |
2026-03-25T10:26:54.830Z | 2026-04-18T08:57:46.166Z |
| CVE-2026-23296 |
N/A
|
scsi: core: Fix refcount leak for tagset_refcnt |
Linux |
Linux |
2026-03-25T10:26:53.509Z | 2026-04-18T08:57:44.862Z |
| CVE-2026-23293 |
N/A
|
net: vxlan: fix nd_tbl NULL dereference when IPv6 is d… |
Linux |
Linux |
2026-03-25T10:26:51.160Z | 2026-04-18T08:57:43.516Z |
| CVE-2026-23291 |
N/A
|
nfc: pn533: properly drop the usb interface reference … |
Linux |
Linux |
2026-03-25T10:26:49.634Z | 2026-04-18T08:57:42.173Z |
| CVE-2026-23290 |
N/A
|
net: usb: pegasus: validate USB endpoints |
Linux |
Linux |
2026-03-25T10:26:48.886Z | 2026-04-18T08:57:40.813Z |
| CVE-2026-23289 |
N/A
|
IB/mthca: Add missed mthca_unmap_user_db() for mthca_c… |
Linux |
Linux |
2026-03-25T10:26:48.207Z | 2026-04-18T08:57:39.473Z |
| CVE-2026-23286 |
N/A
|
atm: lec: fix null-ptr-deref in lec_arp_clear_vccs |
Linux |
Linux |
2026-03-25T10:26:45.531Z | 2026-04-18T08:57:38.115Z |
| CVE-2026-23281 |
N/A
|
wifi: libertas: fix use-after-free in lbs_free_adapter() |
Linux |
Linux |
2026-03-25T10:26:41.844Z | 2026-04-18T08:57:36.792Z |
| CVE-2026-23279 |
N/A
|
wifi: mac80211: fix NULL pointer dereference in mesh_r… |
Linux |
Linux |
2026-03-25T10:26:39.994Z | 2026-04-18T08:57:35.221Z |
| CVE-2026-23277 |
N/A
|
net/sched: teql: fix NULL pointer dereference in iptun… |
Linux |
Linux |
2026-03-20T08:08:57.394Z | 2026-04-18T08:57:33.874Z |
| CVE-2026-23274 |
7.8 (3.1)
|
netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM ti… |
Linux |
Linux |
2026-03-20T08:08:54.918Z | 2026-04-18T08:57:32.534Z |
| CVE-2026-23270 |
7.8 (3.1)
|
net/sched: Only allow act_ct to bind to clsact/ingress… |
Linux |
Linux |
2026-03-18T17:54:43.803Z | 2026-04-18T08:57:30.870Z |
| CVE-2026-23269 |
7.1 (3.1)
|
apparmor: validate DFA start states are in bounds in u… |
Linux |
Linux |
2026-03-18T17:54:42.988Z | 2026-04-18T08:57:29.535Z |
| CVE-2026-23268 |
7.8 (3.1)
|
apparmor: fix unprivileged local user can do privilege… |
Linux |
Linux |
2026-03-18T17:54:41.974Z | 2026-04-18T08:57:28.196Z |
| CVE-2026-23253 |
7.8 (3.1)
|
media: dvb-core: fix wrong reinitialization of ringbuf… |
Linux |
Linux |
2026-03-18T17:01:44.126Z | 2026-04-18T08:57:26.705Z |
| CVE-2026-23245 |
7.8 (3.1)
|
net/sched: act_gate: snapshot parameters with RCU on replace |
Linux |
Linux |
2026-03-18T10:05:07.406Z | 2026-04-18T08:57:25.339Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-23291 | In the Linux kernel, the following vulnerability has been resolved: nfc: pn533: properly drop the … | 2026-03-25T11:16:24.197 | 2026-04-18T09:16:17.077 |
| fkie_cve-2026-23290 | In the Linux kernel, the following vulnerability has been resolved: net: usb: pegasus: validate US… | 2026-03-25T11:16:24.043 | 2026-04-18T09:16:16.877 |
| fkie_cve-2026-23289 | In the Linux kernel, the following vulnerability has been resolved: IB/mthca: Add missed mthca_unm… | 2026-03-25T11:16:23.887 | 2026-04-18T09:16:16.707 |
| fkie_cve-2026-23286 | In the Linux kernel, the following vulnerability has been resolved: atm: lec: fix null-ptr-deref i… | 2026-03-25T11:16:23.393 | 2026-04-18T09:16:16.523 |
| fkie_cve-2026-23281 | In the Linux kernel, the following vulnerability has been resolved: wifi: libertas: fix use-after-… | 2026-03-25T11:16:22.657 | 2026-04-18T09:16:16.350 |
| fkie_cve-2026-23279 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix NULL point… | 2026-03-25T11:16:22.333 | 2026-04-18T09:16:16.163 |
| fkie_cve-2026-23277 | In the Linux kernel, the following vulnerability has been resolved: net/sched: teql: fix NULL poin… | 2026-03-20T09:16:13.533 | 2026-04-18T09:16:15.980 |
| fkie_cve-2026-23274 | In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_IDLETIMER: rejec… | 2026-03-20T09:16:13.077 | 2026-04-18T09:16:15.797 |
| fkie_cve-2026-23270 | In the Linux kernel, the following vulnerability has been resolved: net/sched: Only allow act_ct t… | 2026-03-18T18:16:26.053 | 2026-04-18T09:16:15.620 |
| fkie_cve-2026-23269 | In the Linux kernel, the following vulnerability has been resolved: apparmor: validate DFA start s… | 2026-03-18T18:16:25.907 | 2026-04-18T09:16:15.433 |
| fkie_cve-2026-23268 | In the Linux kernel, the following vulnerability has been resolved: apparmor: fix unprivileged loc… | 2026-03-18T18:16:25.753 | 2026-04-18T09:16:15.237 |
| fkie_cve-2026-23253 | In the Linux kernel, the following vulnerability has been resolved: media: dvb-core: fix wrong rei… | 2026-03-18T18:16:23.383 | 2026-04-18T09:16:15.050 |
| fkie_cve-2026-23245 | In the Linux kernel, the following vulnerability has been resolved: net/sched: act_gate: snapshot … | 2026-03-18T11:16:16.437 | 2026-04-18T09:16:14.877 |
| fkie_cve-2026-23227 | In the Linux kernel, the following vulnerability has been resolved: drm/exynos: vidi: use ctx->loc… | 2026-02-18T16:22:32.467 | 2026-04-18T09:16:14.667 |
| fkie_cve-2026-23220 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix infinite loop cause… | 2026-02-18T16:22:31.700 | 2026-04-18T09:16:14.463 |
| fkie_cve-2026-23155 | In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bu… | 2026-02-14T16:15:55.653 | 2026-04-18T09:16:14.317 |
| fkie_cve-2026-23113 | In the Linux kernel, the following vulnerability has been resolved: io_uring/io-wq: check IO_WQ_BI… | 2026-02-14T15:16:06.380 | 2026-04-18T09:16:14.100 |
| fkie_cve-2026-23110 | In the Linux kernel, the following vulnerability has been resolved: scsi: core: Wake up the error … | 2026-02-04T17:16:21.880 | 2026-04-18T09:16:13.907 |
| fkie_cve-2026-23100 | In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix hugetlb_pmd_sh… | 2026-02-04T17:16:20.880 | 2026-04-18T09:16:13.703 |
| fkie_cve-2026-23082 | In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bu… | 2026-02-04T17:16:19.060 | 2026-04-18T09:16:13.530 |
| fkie_cve-2026-23031 | In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bu… | 2026-01-31T12:16:06.413 | 2026-04-18T09:16:13.360 |
| fkie_cve-2025-71150 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix refcount leak when … | 2026-01-23T15:16:05.773 | 2026-04-18T09:16:13.153 |
| fkie_cve-2025-68256 | In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix out-of… | 2025-12-16T15:15:54.990 | 2026-04-18T09:16:12.977 |
| fkie_cve-2025-68206 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_ct: add seqadj … | 2025-12-16T14:15:53.487 | 2026-04-18T09:16:12.780 |
| fkie_cve-2025-40323 | In the Linux kernel, the following vulnerability has been resolved: fbcon: Set fb_display[i]->mode… | 2025-12-08T01:16:05.067 | 2026-04-18T09:16:12.603 |
| fkie_cve-2025-40261 | In the Linux kernel, the following vulnerability has been resolved: nvme: nvme-fc: Ensure ->ioerr_… | 2025-12-04T16:16:20.053 | 2026-04-18T09:16:12.403 |
| fkie_cve-2025-40103 | In the Linux kernel, the following vulnerability has been resolved: smb: client: Fix refcount leak… | 2025-10-30T10:15:34.693 | 2026-04-18T09:16:12.240 |
| fkie_cve-2025-40016 | In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Mark invalid … | 2025-10-20T16:15:38.387 | 2026-04-18T09:16:12.023 |
| fkie_cve-2025-39930 | In the Linux kernel, the following vulnerability has been resolved: ASoC: simple-card-utils: Don't… | 2025-04-18T07:15:44.460 | 2026-04-18T09:16:11.863 |
| fkie_cve-2025-39764 | In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: remove r… | 2025-09-11T17:15:40.653 | 2026-04-18T09:16:11.663 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-qrjv-2grw-rfj4 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bu… | 2026-02-14T18:30:15Z | 2026-04-18T09:30:17Z |
| ghsa-m8p7-hjg2-3xqj |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bu… | 2026-02-04T18:30:43Z | 2026-04-18T09:30:17Z |
| ghsa-hg9v-crxc-wx3j |
|
In the Linux kernel, the following vulnerability has been resolved: can: ems_usb: ems_usb_read_bul… | 2026-03-25T12:30:22Z | 2026-04-18T09:30:17Z |
| ghsa-gwxh-wqjf-9572 |
|
In the Linux kernel, the following vulnerability has been resolved: IB/mthca: Add missed mthca_unm… | 2026-03-25T12:30:21Z | 2026-04-18T09:30:17Z |
| ghsa-gvm4-5v6x-vmv9 |
|
In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bu… | 2026-01-31T12:30:12Z | 2026-04-18T09:30:17Z |
| ghsa-gpw9-p95r-3mv6 |
|
In the Linux kernel, the following vulnerability has been resolved: net: usb: pegasus: validate US… | 2026-03-25T12:30:22Z | 2026-04-18T09:30:17Z |
| ghsa-g3vh-wfh4-fp76 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: drm/exynos: vidi: use ctx->loc… | 2026-02-18T18:30:40Z | 2026-04-18T09:30:17Z |
| ghsa-g352-h749-hp67 |
|
In the Linux kernel, the following vulnerability has been resolved: net: annotate data-races aroun… | 2026-03-25T12:30:22Z | 2026-04-18T09:30:17Z |
| ghsa-f429-w42v-q89c |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: libertas: fix use-after-… | 2026-03-25T12:30:21Z | 2026-04-18T09:30:17Z |
| ghsa-cq3w-r62m-5jvq |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: apparmor: validate DFA start s… | 2026-03-18T18:31:18Z | 2026-04-18T09:30:17Z |
| ghsa-ccr5-8c2w-j2f4 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: io_uring/io-wq: check IO_WQ_BI… | 2026-02-14T15:32:18Z | 2026-04-18T09:30:17Z |
| ghsa-9wwr-2jh3-482p |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix infinite loop cause… | 2026-02-18T18:30:40Z | 2026-04-18T09:30:17Z |
| ghsa-8qv8-8mpp-cc7j |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: apparmor: fix unprivileged loc… | 2026-03-18T18:31:18Z | 2026-04-18T09:30:17Z |
| ghsa-7rpf-jpp6-g4v7 |
|
In the Linux kernel, the following vulnerability has been resolved: smb: client: Don't log plainte… | 2026-03-25T12:30:22Z | 2026-04-18T09:30:17Z |
| ghsa-7p3h-gfr2-rwcv |
4.7 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: scsi: core: Wake up the error … | 2026-02-04T18:30:44Z | 2026-04-18T09:30:17Z |
| ghsa-77gg-4hmh-hwxc |
|
In the Linux kernel, the following vulnerability has been resolved: net: ipv6: fix panic when IPv4… | 2026-03-25T12:30:22Z | 2026-04-18T09:30:17Z |
| ghsa-6rj2-xg9p-3jj4 |
|
In the Linux kernel, the following vulnerability has been resolved: atm: lec: fix null-ptr-deref i… | 2026-03-25T12:30:21Z | 2026-04-18T09:30:17Z |
| ghsa-62jp-jvc3-7hh9 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net/sched: Only allow act_ct t… | 2026-03-18T18:31:18Z | 2026-04-18T09:30:17Z |
| ghsa-4rhr-9xj2-x9gx |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix hugetlb_pmd_sh… | 2026-02-04T18:30:44Z | 2026-04-18T09:30:17Z |
| ghsa-4mrh-9qq5-26w5 |
|
In the Linux kernel, the following vulnerability has been resolved: net: vxlan: fix nd_tbl NULL de… | 2026-03-25T12:30:22Z | 2026-04-18T09:30:17Z |
| ghsa-3qgv-qj84-5mmh |
|
In the Linux kernel, the following vulnerability has been resolved: ipv6: fix NULL pointer deref i… | 2026-03-25T12:30:22Z | 2026-04-18T09:30:17Z |
| ghsa-3m5v-fjjv-99m5 |
|
In the Linux kernel, the following vulnerability has been resolved: nfc: pn533: properly drop the … | 2026-03-25T12:30:22Z | 2026-04-18T09:30:17Z |
| ghsa-3cwp-73f3-j7w3 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_IDLETIMER: rejec… | 2026-03-20T09:32:10Z | 2026-04-18T09:30:17Z |
| ghsa-3969-jvq7-cjf4 |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix NULL point… | 2026-03-25T12:30:21Z | 2026-04-18T09:30:17Z |
| ghsa-2m3p-78c9-6w3j |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: media: dvb-core: fix wrong rei… | 2026-03-18T18:31:17Z | 2026-04-18T09:30:17Z |
| ghsa-wp8q-76mh-g25x |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: driver: iio: add missing check… | 2024-09-18T09:30:35Z | 2026-04-18T09:30:16Z |
| ghsa-vv6w-x7vv-rv35 |
|
In the Linux kernel, the following vulnerability has been resolved: fbcon: Set fb_display[i]->mode… | 2025-12-08T03:31:01Z | 2026-04-18T09:30:16Z |
| ghsa-v488-2vhj-rwrj |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: bpf: Forget ranges when refini… | 2025-09-11T18:35:51Z | 2026-04-18T09:30:16Z |
| ghsa-v34r-xh7h-7w9g |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: io_uring/tctx: work around xa_… | 2024-12-27T15:31:54Z | 2026-04-18T09:30:16Z |
| ghsa-rh8j-5vmg-wppv |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad7923: Fix buffer o… | 2024-12-27T15:31:53Z | 2026-04-18T09:30:16Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-204 |
8.1 (3.1)
|
TorchGeo Remote Code Execution Vulnerability | torchgeo | 2024-11-12T18:15:45+00:00 | 2025-01-19T19:19:01.299352+00:00 |
| pysec-2024-203 |
7.5 (3.1)
|
DuckDB is a SQL database management system. In versions 1.0.0 and prior, content in files… | duckdb | 2024-07-24T18:15:05+00:00 | 2025-01-19T19:18:58.299130+00:00 |
| pysec-2024-202 |
6.5 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-11-05T19:15:07+00:00 | 2025-01-19T16:22:59.212853+00:00 |
| pysec-2024-201 |
6.1 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-11-05T19:15:05+00:00 | 2025-01-19T16:22:59.154645+00:00 |
| pysec-2024-200 |
7.2 (3.1)
|
JupyterHub is software that allows one to create a multi-user server for Jupyter notebook… | jupyterhub | 2024-08-08T15:15:17+00:00 | 2025-01-19T16:22:58.171761+00:00 |
| pysec-2024-199 |
3.7 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T16:22:57.938459+00:00 |
| pysec-2024-198 |
4.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:11+00:00 | 2025-01-19T16:22:57.845317+00:00 |
| pysec-2024-197 |
5.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T16:22:57.732726+00:00 |
| pysec-2024-196 |
8.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T16:22:57.640183+00:00 |
| pysec-2024-195 |
5.5 (3.1)
|
Use of Web Browser Cache Containing Sensitive Information vulnerability in Apache Airflow… | apache-airflow | 2024-06-14T09:15:09+00:00 | 2025-01-19T16:22:56.419822+00:00 |
| pysec-2024-194 |
6.1 (3.1)
|
A clickjacking vulnerability exists in zenml-io/zenml versions up to and including 0.55.5… | zenml | 2024-06-06T19:15:54+00:00 | 2025-01-19T13:22:31.835293+00:00 |
| pysec-2024-193 |
3.3 (3.1)
|
An issue was discovered in zenml-io/zenml versions up to and including 0.55.4. Due to imp… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-19T13:22:31.701775+00:00 |
| pysec-2024-192 |
|
An issue was discovered in llama_index before 0.10.38. download/integration.py includes a… | llama-index | 2024-08-22T20:15:10+00:00 | 2025-01-19T13:22:29.175614+00:00 |
| pysec-2024-191 |
5.5 (3.1)
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2024-10-24T22:15:04+00:00 | 2025-01-19T10:22:29.812605+00:00 |
| pysec-2024-190 |
8.8 (3.1)
|
Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenti… | apache-airflow | 2024-07-17T08:15:02+00:00 | 2025-01-19T07:21:16.859034+00:00 |
| pysec-2024-189 |
5.4 (3.1)
|
Apache Airflow versions before 2.9.3 have a vulnerability that allows an authenticated at… | apache-airflow | 2024-07-17T08:15:01+00:00 | 2025-01-19T07:21:16.796301+00:00 |
| pysec-2024-188 |
6.1 (3.1)
|
WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Lo… | webob | 2024-08-14T21:15:17+00:00 | 2025-01-19T04:23:01.908824+00:00 |
| pysec-2024-187 |
9.8 (3.1)
|
virtualenv before 20.26.6 allows command injection through the activation scripts for a v… | virtualenv | 2024-11-24T16:15:06+00:00 | 2025-01-19T04:23:01.784352+00:00 |
| pysec-2024-186 |
6.5 (3.1)
|
RestrictedPython is a restricted execution environment for Python to run untrusted code. … | restrictedpython | 2024-09-30T16:15:09+00:00 | 2025-01-19T04:23:01.259448+00:00 |
| pysec-2024-185 |
|
Nebari through 2024.4.1 prints the temporary Keycloak root password. | nebari | 2024-05-06T00:15:10+00:00 | 2025-01-19T04:23:00.951638+00:00 |
| pysec-2024-184 |
7.5 (3.1)
|
A local file inclusion vulnerability exists in the JSON component of gradio-app/gradio ve… | gradio | 2024-06-06T18:15:18+00:00 | 2025-01-19T04:23:00.017053+00:00 |
| pysec-2024-183 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-11-06T15:15:11+00:00 | 2025-01-19T04:22:59.576907+00:00 |
| pysec-2024-182 |
|
Apache Airflow versions before 2.10.3 contain a vulnerability that could expose sensitive… | apache-airflow | 2024-11-15T09:15:14+00:00 | 2025-01-19T04:22:59.398988+00:00 |
| pysec-2024-181 |
6.1 (3.1)
|
Apache Airflow, versions before 2.10.0, have a vulnerability that allows the developer of… | apache-airflow | 2024-08-21T16:15:08+00:00 | 2025-01-19T04:22:59.351008+00:00 |
| pysec-2024-180 |
5.4 (3.1)
|
Stored XSS in organizer and event settings of pretix up to 2024.7.0 allows malicious even… | pretix | 2024-08-23T15:15:17+00:00 | 2025-01-19T01:52:24.493530+00:00 |
| pysec-2024-179 |
4.8 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-03-18T22:15:07+00:00 | 2025-01-19T01:52:24.377662+00:00 |
| pysec-2024-178 |
7.5 (3.1)
|
Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to version 2… | litestar | 2024-11-20T21:15:08+00:00 | 2025-01-19T01:52:23.772726+00:00 |
| pysec-2024-177 |
9.8 (3.1)
|
Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach… | langflow | 2024-06-10T20:15:15+00:00 | 2025-01-19T01:52:23.722576+00:00 |
| pysec-2024-176 |
6.1 (3.1)
|
A reflected Cross-Site Scripting (XSS) vulnerability was identified in zenml-io/zenml ver… | zenml | 2024-06-30T16:15:03+00:00 | 2025-01-18T22:21:45.122426+00:00 |
| pysec-2024-175 |
|
WordOps through 3.20.0 has a wo/cli/plugins/stack_pref.py TOCTOU race condition because t… | wordops | 2024-05-06T00:15:10+00:00 | 2025-01-18T22:21:44.991242+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33683 | Cross-Site Request Forgery (CSRF) vulnerability in WP Republic Hide Dashboard Notificatio… | 2024-04-27T05:02:18.438205Z |
| gsd-2024-33755 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.436135Z |
| gsd-2024-33687 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.432624Z |
| gsd-2024-33753 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.430763Z |
| gsd-2024-33756 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.430035Z |
| gsd-2024-33717 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.429699Z |
| gsd-2024-33724 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.429383Z |
| gsd-2024-33706 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.427436Z |
| gsd-2024-33787 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.424661Z |
| gsd-2024-33799 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.424348Z |
| gsd-2024-33813 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.424031Z |
| gsd-2024-33735 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.410261Z |
| gsd-2024-33721 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.408369Z |
| gsd-2024-33695 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-27T05:02:18.407619Z |
| gsd-2024-33752 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.406190Z |
| gsd-2024-33692 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-27T05:02:18.404770Z |
| gsd-2024-33696 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-27T05:02:18.403548Z |
| gsd-2024-33761 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.399777Z |
| gsd-2024-33689 | Cross-Site Request Forgery (CSRF) vulnerability in Tony Zeoli, Tony Hayes Radio Station.T… | 2024-04-27T05:02:18.398121Z |
| gsd-2024-33730 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.396940Z |
| gsd-2024-33708 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.395735Z |
| gsd-2024-33830 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.395389Z |
| gsd-2024-33843 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.393431Z |
| gsd-2024-33841 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.393169Z |
| gsd-2024-33686 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.392053Z |
| gsd-2024-33816 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.388757Z |
| gsd-2024-33785 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.387543Z |
| gsd-2024-33703 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.386761Z |
| gsd-2024-33705 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.385891Z |
| gsd-2024-33824 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.385552Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2155 | Malicious code in pino-pretty-log (npm) | 2026-03-25T00:36:47Z | 2026-04-16T15:42:09Z |
| mal-2026-1978 | Malicious code in json-specular (npm) | 2026-03-20T04:53:15Z | 2026-04-16T15:42:09Z |
| mal-2026-1977 | Malicious code in json-bundling (npm) | 2026-03-20T04:53:15Z | 2026-04-16T15:42:09Z |
| mal-2026-1962 | Malicious code in parsejson-pro (npm) | 2026-03-20T04:41:13Z | 2026-04-16T15:42:09Z |
| mal-2026-1960 | Malicious code in nodex-db (npm) | 2026-03-20T04:40:18Z | 2026-04-16T15:42:09Z |
| mal-2026-1959 | Malicious code in node-business (npm) | 2026-03-20T04:40:18Z | 2026-04-16T15:42:09Z |
| mal-2026-1935 | Malicious code in jsonify-bundler (npm) | 2026-03-20T01:29:54Z | 2026-04-16T15:42:09Z |
| mal-2026-1925 | Malicious code in jsonify-parser (npm) | 2026-03-19T15:13:48Z | 2026-04-16T15:42:09Z |
| mal-2026-1816 | Malicious code in pkgnewfefame1 (npm) | 2026-03-18T13:03:54Z | 2026-04-16T15:42:09Z |
| mal-2026-1493 | Malicious code in pino-logger-utils (npm) | 2026-03-17T04:46:23Z | 2026-04-16T15:42:09Z |
| mal-2026-1463 | Malicious code in polymarket-validator (npm) | 2026-03-16T10:13:14Z | 2026-04-16T15:42:09Z |
| mal-2026-1399 | Malicious code in pino-sdk (npm) | 2026-03-13T06:55:58Z | 2026-04-16T15:42:09Z |
| mal-2026-1398 | Malicious code in meta-internal-logger-drzak (npm) | 2026-03-13T06:47:07Z | 2026-04-16T15:42:09Z |
| mal-2026-1331 | Malicious code in llm-oracle (npm) | 2026-03-11T05:58:11Z | 2026-04-16T15:42:09Z |
| mal-2025-27318 | Malicious code in netstruct (npm) | 2025-08-14T18:52:04Z | 2026-04-16T15:42:09Z |
| mal-2025-1044 | Malicious code in minikit-monorepo (npm) | 2025-02-03T17:25:15Z | 2026-04-16T15:42:09Z |
| mal-2026-834 | Malicious code in graphflowx (npm) | 2026-02-10T15:46:43Z | 2026-04-16T15:42:08Z |
| mal-2026-692 | Malicious code in graphrix (npm) | 2026-02-03T07:44:00Z | 2026-04-16T15:42:08Z |
| mal-2026-680 | Malicious code in frontend-js-state-web (npm) | 2026-02-03T07:27:10Z | 2026-04-16T15:42:08Z |
| mal-2026-2642 | Malicious code in chatbotloader (npm) | 2026-04-14T11:47:13Z | 2026-04-16T15:42:08Z |
| mal-2026-2641 | Malicious code in chai-as-refined (npm) | 2026-04-14T11:48:44Z | 2026-04-16T15:42:08Z |
| mal-2026-2640 | Malicious code in bytefrontier-core (npm) | 2026-04-14T11:47:12Z | 2026-04-16T15:42:08Z |
| mal-2026-2639 | Malicious code in bytefrontier (npm) | 2026-04-14T11:47:12Z | 2026-04-16T15:42:08Z |
| mal-2026-2249 | Malicious code in chai-as-added (npm) | 2026-03-27T03:12:35Z | 2026-04-16T15:42:08Z |
| mal-2026-2223 | Malicious code in cr-static-shared-components (npm) | 2026-03-24T09:05:26Z | 2026-04-16T15:42:08Z |
| mal-2026-2222 | Malicious code in chain-coremesh (npm) | 2026-03-26T00:42:51Z | 2026-04-16T15:42:08Z |
| mal-2026-2160 | Malicious code in chai-as-chain (npm) | 2026-03-25T01:52:23Z | 2026-04-16T15:42:08Z |
| mal-2026-2154 | Malicious code in chai-as-emitted (npm) | 2026-03-25T00:37:35Z | 2026-04-16T15:42:08Z |
| mal-2026-2130 | Malicious code in fancode-web-app (npm) | 2026-03-24T12:48:28Z | 2026-04-16T15:42:08Z |
| mal-2026-1975 | Malicious code in chai-as-chayn (npm) | 2026-03-20T04:59:55Z | 2026-04-16T15:42:08Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1976 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-04T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1898 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und Privilegieneskalation | 2025-08-24T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1858 | Linux Kernel: Mehrere Schwachstellen | 2025-08-17T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1665 | Linux Kernel: Mehrere Schwachstellen | 2025-07-28T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1653 | Linux Kernel: Mehrere Schwachstellen | 2025-07-27T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1522 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-09T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1517 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-08T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1465 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-06T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1452 | Linux Kernel: Mehrere Schwachstellen | 2025-07-02T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1327 | Grafana: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-15T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1272 | QNAP NAS Software und Anwendungen: Mehrere Schwachstellen | 2025-06-09T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-0975 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-05-07T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2024-3756 | Linux Kernel: Mehrere Schwachstellen | 2024-12-26T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2024-3528 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-11-21T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2024-3509 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-11-19T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2024-1722 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-07-29T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2024-1008 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-05-01T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-2386 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-09-18T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0743 | OpenClaw: Mehrere Schwachstellen | 2026-03-16T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0727 | OpenClaw: Mehrere Schwachstellen | 2026-03-15T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0711 | OpenClaw: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0691 | OpenClaw: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0885 | n8n: Schwachstelle ermöglicht SQL-Injection | 2026-03-26T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0883 | Red Hat Enterprise Linux (hivex): Schwachstelle ermöglicht Denial of Service | 2021-08-30T22:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0882 | GIMP: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0881 | IBM License Metric Tool: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0878 | FreeBSD Project FreeBSD OS: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0873 | docker: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0869 | SolarWinds Platform: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0865 | Keycloak: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-184-01 | Hitachi Energy Relion 670/650 and SAM600-IO Series | 2025-06-24T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-25-343-03 | Multiple India-based CCTV Cameras (Update A)** | 2025-12-09T06:00:00.000000Z | 2026-02-05T06:00:00.000000Z |
| icsa-26-034-04 | Synectix LAN 232 TRIO | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-03 | RISS SRL MOMA Seismic Station | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-02 | *Avation Light Engine Pro * | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-01 | Mitsubishi Electric FREQSHIP-mini for Windows | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-310-02 | Ubia Ubox (Update A) | 2025-11-06T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-128-03 | Mitsubishi Electric Multiple FA Products (Update B) | 2025-05-08T06:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-24-345-06 | Rockwell Automation Arena (Update B) | 2024-12-10T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-23-089-01 | Hitachi Energy IEC 61850 MMS-Server (Update B) | 2023-02-14T13:30:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-23-068-05 | Hitachi Energy Relion 670, 650 and SAM600-IO Series | 2023-02-28T13:30:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-112-03 | Schneider Electric Wiser Home Controller WHC-5918A | 2024-07-09T00:00:00.000000Z | 2026-01-30T07:00:00.000000Z |
| icsa-26-029-03 | Rockwell Automation ControlLogix | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-26-029-02 | Rockwell Automation ArmorStart LT | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-205-01 | Mitsubishi Electric CNC Series (Update B) | 2025-07-24T06:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-126-03 | BrightSign Players (Update A) | 2025-05-06T06:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-028-06 | Schneider Electric RemoteConnect and SCADAPack x70 Utilities (Update A) | 2025-01-14T00:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-26-027-03 | Schneider Electric Zigbee Products | 2026-01-13T08:00:00.000000Z | 2026-01-27T20:13:34.637968Z |
| icsa-26-027-02 | Festo Didactic SE MES PC | 2024-02-27T12:00:00.000000Z | 2026-01-27T16:20:28.099631Z |
| icsa-26-027-04 | Johnson Controls Metasys Products | 2026-01-27T07:00:00.000000Z | 2026-01-27T07:00:00.000000Z |
| icsa-26-022-01 | Schneider Electric | 2026-01-13T08:00:00.000000Z | 2026-01-22T17:29:46.950679Z |
| icsa-26-022-08 | EVMAPA | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-07 | Delta Electronics DIAView | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-06 | Hubitat Elevation Hubs | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-05 | Weintek cMT X Series HMI EasyWeb Service | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-04 | Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-03 | Rockwell Automation CompactLogix 5370 | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-02 | AutomationDirect CLICK Programmable Logic Controller | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-25-352-08 | Axis Communications Camera Station Pro, Camera Station, and Device Manager (Update B) | 2025-12-18T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-24-326-04 | Schneider Electric Modicon M340, MC80, and Momentum Unity M1E (Update B) | 2024-11-12T05:00:00.000000Z | 2026-01-20T15:49:53.166459Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-fmc-html-inj-mqjrzrny | Cisco Secure Firewall Management Center Software HTML Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-ftd-cmdinj-phe7kmt | Cisco Secure Firewall Management Center and Secure Firewall Threat Defense Software Command Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-hcrlpfyn | Cisco Secure Firewall Management Center Software Command Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-authz-bypass-m7xhnau | Cisco Secure Firewall Management Center Software Authorization Bypass Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpnwebs-dos-hjbhmbsx | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access VPN Web Server Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpn-dos-mfpeka6e | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-nat-dns-dos-bqhynhtm | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Network Address Translation DNS Inspection Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-http-file-huyx2jl4 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Server Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-dhcp-qj7ngs4n | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software DHCP Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-cmdinj-vehfezq3 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Authenticated Command Injection Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-ftd-ios-dos-doeshwhy | Cisco IOS, IOS XE, Secure Firewall Adaptive Security Appliance, and Secure Firewall Threat Defense Software IKEv2 Denial of Service Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-ftd-acl-bypass-mtpze9yh | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Access Control Rules Bypass Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-buffer-overflow-pyruhwbc | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Web Services Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-webex-join-ynxfqhk4 | Cisco Webex Meeting Client Join Certificate Validation Vulnerability | 2025-08-06T16:00:00+00:00 | 2025-08-06T16:00:00+00:00 |
| cisco-sa-ise_xss_acc_cont-ysr4ut4u | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2025-08-06T16:00:00+00:00 | 2025-08-06T16:00:00+00:00 |
| cisco-sa-20170629-snmp | SNMP Remote Code Execution Vulnerabilities in Cisco IOS and IOS XE Software | 2017-06-29T16:00:00+00:00 | 2025-07-30T16:27:06+00:00 |
| cisco-sa-ise-unauth-rce-zad2gnj6 | Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities | 2025-06-25T16:00:00+00:00 | 2025-07-24T23:30:31+00:00 |
| cisco-sa-piepnm-bsi-25jjqsbb | Cisco Prime Infrastructure and Evolved Programmable Network Manager Blind SQL Injection Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-ise-multi-3vpsxoxo | Cisco Identity Services Engine Authenticated Remote Code Execution and Authorization Bypass Vulnerabilities | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-cuis-ssrf-jsudjev | Cisco Unified Intelligence Center Server-Side Request Forgery Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-cuis-file-upload-uhnetstm | Cisco Unified Intelligence Center Arbitrary File Upload Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-spaces-conn-privesc-kgd2ccdu | Cisco Spaces Connector Privilege Escalation Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-ece-xss-cbtkteyc | Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-cucm-ssh-m4ubdpe7 | Cisco Unified Communications Manager Static SSH Credentials Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-ise-stored-xss-yff54m73 | Cisco Identity Services Stored Cross-Site Scripting Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-06-30T15:08:59+00:00 |
| cisco-sa-ise-auth-bypass-mvfkvqau | Cisco Identity Services Engine Authorization Bypass Vulnerability | 2025-06-25T16:00:00+00:00 | 2025-06-25T16:00:00+00:00 |
| cisco-sa-ise-file-upload-p4m8vwxy | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-23T19:16:21+00:00 |
| cisco-sa-meraki-mx-vpn-dos-sm5gcfm7 | Cisco Meraki MX and Z Series AnyConnect VPN with Client Certificate Authentication Denial of Service Vulnerability | 2025-06-18T16:00:00+00:00 | 2025-06-18T16:00:00+00:00 |
| cisco-sa-clamav-udf-hmwd9ndy | ClamAV UDF File Parsing Out-of-Bounds Read Information Disclosure Vulnerability | 2025-06-18T16:00:00+00:00 | 2025-06-18T16:00:00+00:00 |
| cisco-sa-erlang-otp-ssh-xyzzy | Multiple Cisco Products Unauthenticated Remote Code Execution in Erlang/OTP SSH Server: April 2025 | 2025-04-22T21:45:00+00:00 | 2025-06-11T14:40:37+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-69647 | CVE-2025-69647 | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:39.000Z |
| msrc_cve-2026-3784 | wrong proxy connection reuse with credentials | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:33.000Z |
| msrc_cve-2026-1965 | bad reuse of HTTP Negotiate connection | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:28.000Z |
| msrc_cve-2026-3783 | token leak with redirect and netrc | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:22.000Z |
| msrc_cve-2026-27142 | URLs in meta content attribute actions are not escaped in html/template | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:15.000Z |
| msrc_cve-2025-69649 | GNU Binutils thru 2.46 readelf contains a null pointer dereference vulnerability when processing a crafted ELF binary with malformed header fields. During relocation processing, an invalid or null section pointer may be passed into display_relocations(), resulting in a segmentation fault (SIGSEGV) and abrupt termination. No evidence of memory corruption beyond the null pointer dereference, nor any possibility of code execution, was observed. | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:06.000Z |
| msrc_cve-2025-69645 | Binutils objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed DWARF debug information. A logic error in the handling of DWARF compilation units can result in an invalid offset_size value being used inside byte_get_little_endian, leading to an abort (SIGABRT). The issue was observed in binutils 2.44. A local attacker can trigger the crash by supplying a malicious input file. | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:00.000Z |
| msrc_cve-2025-69652 | GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an abort (SIGABRT) when processing a crafted ELF binary with malformed DWARF abbrev or debug information. Due to incomplete state cleanup in process_debug_info(), an invalid debug_info_p state may propagate into DWARF attribute parsing routines. When certain malformed attributes result in an unexpected data length of zero, byte_get_little_endian() triggers a fatal abort. No evidence of memory corruption or code execution was observed; the impact is limited to denial of service. | 2026-03-02T00:00:00.000Z | 2026-04-14T14:39:55.000Z |
| msrc_cve-2025-69646 | Binutils objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed DWARF debug_rnglists data. A logic error in the handling of the debug_rnglists header can cause objdump to repeatedly print the same warning message and fail to terminate, resulting in an unbounded logging loop until the process is interrupted. The issue was observed in binutils 2.44. A local attacker can exploit this vulnerability by supplying a malicious input file, leading to excessive CPU and I/O usage and preventing completion of the objdump analysis. | 2026-03-02T00:00:00.000Z | 2026-04-14T14:39:49.000Z |
| msrc_cve-2025-59529 | simple protocol server ignores accepts unlimited connections and logs failures without limit | 2025-12-02T00:00:00.000Z | 2026-04-14T14:39:38.000Z |
| msrc_cve-2025-61727 | Improper application of excluded DNS name constraints when verifying wildcard names in crypto/x509 | 2025-12-02T00:00:00.000Z | 2026-04-14T14:39:26.000Z |
| msrc_cve-2025-66382 | In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time. | 2025-11-02T00:00:00.000Z | 2026-04-14T14:39:13.000Z |
| msrc_cve-2025-61725 | Excessive CPU consumption in ParseAddress in net/mail | 2025-10-02T00:00:00.000Z | 2026-04-14T14:39:06.000Z |
| msrc_cve-2025-58188 | Panic when validating certificates with DSA public keys in crypto/x509 | 2025-10-02T00:00:00.000Z | 2026-04-14T14:39:01.000Z |
| msrc_cve-2025-61724 | Excessive CPU consumption in Reader.ReadResponse in net/textproto | 2025-10-02T00:00:00.000Z | 2026-04-14T14:38:55.000Z |
| msrc_cve-2025-58186 | Lack of limit when parsing cookies can cause memory exhaustion in net/http | 2025-10-02T00:00:00.000Z | 2026-04-14T14:38:50.000Z |
| msrc_cve-2025-58183 | Unbounded allocation when parsing GNU sparse map in archive/tar | 2025-10-02T00:00:00.000Z | 2026-04-14T14:38:44.000Z |
| msrc_cve-2025-11839 | GNU Binutils prdbg.c tg_tag_type return value | 2025-10-02T00:00:00.000Z | 2026-04-14T14:38:38.000Z |
| msrc_cve-2025-9901 | Libsoup: improper handling of http vary header in libsoup caching | 2025-09-02T00:00:00.000Z | 2026-04-14T14:38:32.000Z |
| msrc_cve-2025-4035 | Libsoup: cookie domain validation bypass via uppercase characters in libsoup | 2025-04-02T00:00:00.000Z | 2026-04-14T14:38:25.000Z |
| msrc_cve-2025-1148 | GNU Binutils ld ldelfgen.c link_order_scan memory leak | 2025-02-02T00:00:00.000Z | 2026-04-14T14:38:18.000Z |
| msrc_cve-2025-1180 | GNU Binutils ld elf-eh-frame.c _bfd_elf_write_section_eh_frame memory corruption | 2025-02-02T00:00:00.000Z | 2026-04-14T14:38:13.000Z |
| msrc_cve-2025-1150 | GNU Binutils ld libbfd.c bfd_malloc memory leak | 2025-02-02T00:00:00.000Z | 2026-04-14T14:38:04.000Z |
| msrc_cve-2025-1147 | GNU Binutils nm nm.c internal_strlen buffer overflow | 2025-02-02T00:00:00.000Z | 2026-04-14T14:37:57.000Z |
| msrc_cve-2025-1149 | GNU Binutils ld xmalloc.c xstrdup memory leak | 2025-02-02T00:00:00.000Z | 2026-04-14T14:37:50.000Z |
| msrc_cve-2025-1151 | GNU Binutils ld xmemdup.c xmemdup memory leak | 2025-02-02T00:00:00.000Z | 2026-04-14T14:37:42.000Z |
| msrc_cve-2025-1152 | GNU Binutils ld xstrdup.c xstrdup memory leak | 2025-02-02T00:00:00.000Z | 2026-04-14T14:37:34.000Z |
| msrc_cve-2026-33829 | Windows Snipping Tool Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33827 | Windows TCP/IP Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33826 | Windows Active Directory Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0378 | Kwetsbaarheden verholpen in Mattermost | 2025-11-28T09:53:42.334621Z | 2025-11-28T09:53:42.334621Z |
| ncsc-2025-0377 | Kwetsbaarheden verholpen in GitLab | 2025-11-27T13:35:09.121804Z | 2025-11-27T13:35:09.121804Z |
| ncsc-2025-0376 | Kwetsbaarheden verholpen in SonicWall Email Security appliances | 2025-11-21T16:06:33.949861Z | 2025-11-21T16:06:33.949861Z |
| ncsc-2025-0375 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2025-11-21T16:06:14.387571Z | 2025-11-21T16:06:14.387571Z |
| ncsc-2025-0334 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2025-10-23T13:42:11.992643Z | 2025-11-21T16:03:18.991100Z |
| ncsc-2025-0374 | Kwetsbaarheden verholpen in Arista EOS | 2025-11-20T11:48:20.126141Z | 2025-11-20T11:48:20.126141Z |
| ncsc-2025-0373 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2025-11-19T08:35:31.999400Z | 2025-11-19T08:35:31.999400Z |
| ncsc-2025-0372 | Kwetsbaarheid verholpen in Fortinet FortiWeb | 2025-11-19T08:34:59.616354Z | 2025-11-19T08:34:59.616354Z |
| ncsc-2025-0371 | Kwetsbaarheden verholpen in Google Chrome | 2025-11-18T09:01:31.984222Z | 2025-11-18T09:01:31.984222Z |
| ncsc-2025-0370 | Kwetsbaarheden verholpen in Cisco Unified Contact Center Express | 2025-11-18T07:04:55.173157Z | 2025-11-18T07:04:55.173157Z |
| ncsc-2025-0369 | Kwetsbaarheden verholpen in IBM AIX | 2025-11-18T07:03:55.766335Z | 2025-11-18T07:03:55.766335Z |
| ncsc-2025-0368 | Kwetsbaarheden verholpen in Zoom Workplace en Zoom Clients | 2025-11-18T07:02:36.696426Z | 2025-11-18T07:02:36.696426Z |
| ncsc-2025-0367 | Kwetsbaarheden verholpen in GitLab | 2025-11-18T07:01:35.502522Z | 2025-11-18T07:01:35.502522Z |
| ncsc-2025-0366 | Kwetsbaarheid verholpen in Fortinet FortiWeb | 2025-11-15T14:57:33.774388Z | 2025-11-15T14:57:33.774388Z |
| ncsc-2025-0365 | Kwetsbaarheden verholpen in Cisco Catalyst Center | 2025-11-14T12:55:27.227262Z | 2025-11-14T12:55:27.227262Z |
| ncsc-2025-0364 | Kwetsbaarheid verholpen in Adobe Photoshop | 2025-11-12T12:17:16.207233Z | 2025-11-12T12:17:16.207233Z |
| ncsc-2025-0363 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-11-12T11:52:08.634593Z | 2025-11-12T11:56:09.924799Z |
| ncsc-2025-0362 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2025-11-11T18:35:40.376220Z | 2025-11-11T18:35:40.376220Z |
| ncsc-2025-0361 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2025-11-11T18:34:39.453615Z | 2025-11-11T18:34:39.453615Z |
| ncsc-2025-0360 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2025-11-11T18:33:13.936830Z | 2025-11-11T18:33:13.936830Z |
| ncsc-2025-0359 | Kwetsbaarheden verholpen in Microsoft Office | 2025-11-11T18:31:27.092072Z | 2025-11-11T18:31:27.092072Z |
| ncsc-2025-0358 | Kwetsbaartheden verholpen in Microsoft Windows | 2025-11-11T18:29:38.918562Z | 2025-11-11T18:29:38.918562Z |
| ncsc-2025-0357 | Kwetsbaarheden verholpen in Siemens producten | 2025-11-11T18:14:44.487803Z | 2025-11-11T18:14:44.487803Z |
| ncsc-2025-0356 | Kwetsbaarheden verholpen in SAP-producten | 2025-11-11T12:15:53.615720Z | 2025-11-11T12:15:53.615720Z |
| ncsc-2025-0355 | Kwetsbaarheden verholpen in Fortinet FortiOS en FortiProxy | 2025-11-07T10:07:28.475542Z | 2025-11-07T10:07:28.475542Z |
| ncsc-2025-0354 | Kwetsbaarheid verholpen in Cisco Identity Services Engine | 2025-11-06T12:36:51.591695Z | 2025-11-06T12:36:51.591695Z |
| ncsc-2025-0353 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-11-04T15:03:48.630084Z | 2025-11-04T15:03:48.630084Z |
| ncsc-2025-0352 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-11-04T12:53:15.358078Z | 2025-11-04T12:53:15.358078Z |
| ncsc-2025-0351 | Kwetsbaarheden verholpen in Apple MacOS | 2025-11-04T12:44:25.439757Z | 2025-11-04T12:44:25.439757Z |
| ncsc-2025-0350 | Kwetsbaarheid verholpen in CFMOTO Ride voertuigdatabeheer systemen | 2025-11-04T10:27:59.187171Z | 2025-11-04T10:27:59.187171Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10348-1 | ruby4.0-rubygem-grpc-1.70.1-1.7 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10347-1 | ruby4.0-rubygem-globalid-1.2.1-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10346-1 | ruby4.0-rubygem-fluentd-1.17.1-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10345-1 | ruby4.0-rubygem-activesupport-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10344-1 | ruby4.0-rubygem-activestorage-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10343-1 | ruby4.0-rubygem-activerecord-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10342-1 | ruby4.0-rubygem-activemodel-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10341-1 | ruby4.0-rubygem-activejob-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10340-1 | ruby4.0-rubygem-actionview-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10339-1 | ruby4.0-rubygem-actiontext-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10338-1 | ruby4.0-rubygem-actionpack-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10337-1 | ruby4.0-rubygem-actionmailer-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10336-1 | ruby4.0-rubygem-actionmailbox-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10335-1 | ruby4.0-rubygem-actioncable-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10334-1 | python311-pypdf-6.8.0-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10333-1 | python311-multipart-1.3.1-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10332-1 | python311-PyPDF2-2.11.1-7.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10331-1 | mingw64-binutils-2.45.1-2.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10330-1 | mingw32-binutils-2.45.1-2.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10329-1 | kubelogin-0.2.16-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10328-1 | himmelblau-2.3.8+git0.dec3693-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10327-1 | heroic-games-launcher-2.20.1-3.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10326-1 | giflib-devel-32bit-5.2.2-3.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10325-1 | clamav-1.5.2-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10324-1 | MozillaFirefox-148.0.2-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:20361-1 | Security update for osc, obs-scm-bridge | 2026-03-12T20:54:40Z | 2026-03-12T20:54:40Z |
| opensuse-su-2026:20351-1 | Security update for amazon-ssm-agent | 2026-03-12T13:46:52Z | 2026-03-12T13:46:52Z |
| opensuse-su-2026:20350-1 | Security update for tomcat | 2026-03-12T13:46:00Z | 2026-03-12T13:46:00Z |
| opensuse-su-2026:20348-1 | Security update for python-PyPDF2 | 2026-03-11T20:15:02Z | 2026-03-11T20:15:02Z |
| opensuse-su-2026:20345-1 | Security update for python-lxml_html_clean | 2026-03-11T18:05:18Z | 2026-03-11T18:05:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:3827 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.20.3 | 2026-03-05T07:31:32+00:00 | 2026-04-14T09:46:31+00:00 |
| rhsa-2026:3822 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:53:01+00:00 | 2026-04-14T09:46:31+00:00 |
| rhsa-2026:3821 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:51:55+00:00 | 2026-04-14T09:46:31+00:00 |
| rhsa-2026:3816 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T05:42:24+00:00 | 2026-04-14T09:46:31+00:00 |
| rhsa-2026:3820 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:19:06+00:00 | 2026-04-14T09:46:30+00:00 |
| rhsa-2026:3817 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:25:53+00:00 | 2026-04-14T09:46:30+00:00 |
| rhsa-2026:3815 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T05:32:24+00:00 | 2026-04-14T09:46:29+00:00 |
| rhsa-2026:3812 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T04:13:33+00:00 | 2026-04-14T09:46:28+00:00 |
| rhsa-2026:3782 | Red Hat Security Advisory: RHOAI 2.25.3 - Red Hat OpenShift AI | 2026-03-04T18:23:40+00:00 | 2026-04-14T09:46:28+00:00 |
| rhsa-2026:3753 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-04T15:52:29+00:00 | 2026-04-14T09:46:28+00:00 |
| rhsa-2026:3752 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-04T15:29:36+00:00 | 2026-04-14T09:46:28+00:00 |
| rhsa-2026:3713 | Red Hat Security Advisory: RHOAI 3.3 - Red Hat OpenShift AI | 2026-03-04T07:18:30+00:00 | 2026-04-14T09:46:28+00:00 |
| rhsa-2026:3506 | Red Hat Security Advisory: yggdrasil security update | 2026-03-02T06:45:32+00:00 | 2026-04-14T09:46:27+00:00 |
| rhsa-2026:3459 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.9.0 release | 2026-02-26T19:58:40+00:00 | 2026-04-14T09:46:27+00:00 |
| rhsa-2026:3428 | Red Hat Security Advisory: container-tools:rhel8 security update | 2026-02-26T14:36:45+00:00 | 2026-04-14T09:46:27+00:00 |
| rhsa-2026:3343 | Red Hat Security Advisory: skopeo security update | 2026-02-25T11:50:40+00:00 | 2026-04-14T09:46:26+00:00 |
| rhsa-2026:3341 | Red Hat Security Advisory: containernetworking-plugins security update | 2026-02-25T12:14:45+00:00 | 2026-04-14T09:46:26+00:00 |
| rhsa-2026:3340 | Red Hat Security Advisory: skopeo security update | 2026-02-25T12:16:20+00:00 | 2026-04-14T09:46:26+00:00 |
| rhsa-2026:3053 | Red Hat Security Advisory: butane security update | 2026-02-23T06:47:46+00:00 | 2026-04-14T09:46:26+00:00 |
| rhsa-2026:3337 | Red Hat Security Advisory: podman security update | 2026-02-25T11:48:26+00:00 | 2026-04-14T09:46:25+00:00 |
| rhsa-2026:3336 | Red Hat Security Advisory: podman security update | 2026-02-25T11:30:01+00:00 | 2026-04-14T09:46:25+00:00 |
| rhsa-2026:3298 | Red Hat Security Advisory: buildah security update | 2026-02-25T09:32:15+00:00 | 2026-04-14T09:46:25+00:00 |
| rhsa-2026:3297 | Red Hat Security Advisory: buildah security update | 2026-02-25T09:09:30+00:00 | 2026-04-14T09:46:25+00:00 |
| rhsa-2026:3296 | Red Hat Security Advisory: RHTAS - Tech Preview Release Of the Policy Controller Operator | 2026-02-25T08:49:49+00:00 | 2026-04-14T09:46:25+00:00 |
| rhsa-2026:3291 | Red Hat Security Advisory: runc security update | 2026-02-25T07:41:04+00:00 | 2026-04-14T09:46:24+00:00 |
| rhsa-2026:3289 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-02-25T07:10:59+00:00 | 2026-04-14T09:46:24+00:00 |
| rhsa-2026:3288 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-02-25T06:54:49+00:00 | 2026-04-14T09:46:24+00:00 |
| rhsa-2026:3287 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-02-25T07:05:39+00:00 | 2026-04-14T09:46:24+00:00 |
| rhsa-2026:3184 | Red Hat Security Advisory: RHTAS - Tech Preview Release Of the Policy Controller Operator | 2026-02-24T09:58:16+00:00 | 2026-04-14T09:46:23+00:00 |
| rhsa-2026:3111 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.2.2 | 2026-02-23T17:39:45+00:00 | 2026-04-14T09:46:23+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2022-312-01 | NetBotz 4 - 355/450/455/550/570 | 2022-11-08T06:53:24.000Z | 2023-02-14T06:30:00.000Z |
| sevd-2023-045-01 | EcoStruxureTM Geo SCADA Expert | 2023-02-14T06:02:05.000Z | 2023-02-14T06:02:05.000Z |
| sevd-2022-347-01 | APC Easy UPS Online Monitoring Software | 2022-12-13T06:09:04.000Z | 2023-01-11T00:00:00.000Z |
| sevd-2023-010-03 | EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 | 2023-01-10T17:44:20.000Z | 2023-01-10T17:44:20.000Z |
| sevd-2023-010-04 | EcoStruxure™ Power SCADA Anywhere | 2023-01-10T10:28:35.000Z | 2023-01-10T10:28:35.000Z |
| sevd-2023-010-01 | EcoStruxureTM Machine Expert – HVAC (formerly SoMachine - HVAC) | 2023-01-10T09:28:52.000Z | 2023-01-10T09:28:52.000Z |
| sevd-2022-347-03 | EcoStruxure Power Commission | 2022-12-13T04:28:00.000Z | 2022-12-13T04:28:00.000Z |
| sevd-2022-347-02 | Saitel DR RTU | 2022-12-13T04:12:25.000Z | 2022-12-13T04:12:25.000Z |
| sevd-2021-103-01 | C-Bus Toolkit and C-Gate Server | 2021-04-13T11:17:13.000Z | 2022-11-08T11:17:13.000Z |
| sevd-2021-130-04 | homeLYnk (Wiser For KNX) and spaceLYnk | 2021-05-11T07:30:55.000Z | 2022-11-08T07:30:55.000Z |
| sevd-2022-284-04 | EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 | 2022-10-11T10:45:15.000Z | 2022-10-14T10:45:15.000Z |
| sevd-2022-284-02 | EcoStruxure™ Panel Server Box (PAS900) | 2022-10-11T10:05:49.000Z | 2022-10-11T10:05:49.000Z |
| sevd-2022-284-01 | EcoStruxure™ Operator Terminal Expert and Pro-face BLUE | 2022-10-11T09:48:46.000Z | 2022-10-11T09:48:46.000Z |
| sevd-2020-343-05 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and Associated Communication Modules | 2020-12-08T21:04:43.000Z | 2022-09-13T20:04:43.000Z |
| sevd-2020-343-07 | SNMP Service on Modicon M340 and Associated Communication Modules | 2020-12-08T05:49:51.000Z | 2022-09-13T05:49:51.000Z |
| sevd-2022-256-01 | EcoStruxure Machine SCADA Expert and Pro-face BLUE Open Studio | 2022-09-13T05:45:41.000Z | 2022-09-13T05:45:41.000Z |
| sesb-2019-214-01 | Wind River VxWorks Vulnerabilities (URGENT/11) | 2019-08-02T00:00:00.000Z | 2022-09-13T00:00:00.000Z |
| sevd-2022-193-01 | OPC UA and X80 advanced RTU Modicon Communication Modules | 2022-07-12T04:00:00.000Z | 2022-08-19T06:30:00.000Z |
| sesb-2021-347-01 | Apache Log4j Vulnerabilities (Log4Shell) | 2021-12-13T09:22:58.000Z | 2022-08-09T09:22:58.000Z |
| sevd-2022-221-03 | EcoStruxure™ Control Expert | 2022-08-09T09:14:27.000Z | 2022-08-09T09:14:27.000Z |
| sevd-2020-175-01 | Treck TCP/IP Vulnerabilities (Ripple20) | 2020-06-23T16:00:00.000Z | 2022-08-08T13:57:08.970Z |
| sevd-2022-193-03 | Acti9 PowerTag Link C | 2022-07-12T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2022-193-02 | SpaceLogic C-Bus Home Controller, formerly known as C-Bus Wiser Home Controller MK2 | 2022-07-12T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2021-257-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ for x70 | 2021-09-14T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2021-222-02 | AT&T Labs Compressor (XMilI) and Decompressor (XDemill) used by EcoStruxureTM Control Expert, EcoStruxureTM Process Expert and SCADAPack RemoteConnect™ for x70 | 2021-08-01T07:25:51.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2022-193-04 | Easergy P5 | 2022-07-12T08:55:42.000Z | 2022-07-12T08:55:42.000Z |
| sevd-2022-102-01 | IGSS (Interactive Graphical SCADA System) | 2022-04-12T08:47:25.000Z | 2022-07-12T08:47:25.000Z |
| sevd-2022-067-02 | APC Smart-UPS SMT, SMC, SMX, SCL, SRC, XU, XP, CSH2, SURTD, SMTL, SRT, and select SRTL Series | 2022-03-08T06:30:00.000Z | 2022-06-16T18:30:00.000Z |
| sevd-2022-165-08 | EcoStruxure™ Cybersecurity Admin Expert | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-07 | CanBRASS | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-384652 | SSA-384652: Cross-Site Request Forgery (CSRF) Vulnerability in RUGGEDCOM ROX II | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-264814 | SSA-264814: Timing Based Side Channel Vulnerability in the OpenSSL RSA Decryption in SIMATIC Products | 2023-08-08T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-128393 | SSA-128393: Firmware Decryption Vulnerability in SICAM A8000 CP-8031 and CP-8050 | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-042050 | SSA-042050: Know-How Protection Mechanism Failure in TIA Portal | 2023-06-13T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-824503 | SSA-824503: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation Before V2302.0018 and V2404.0007 | 2024-11-18T00:00:00Z | 2024-11-18T00:00:00Z |
| ssa-915275 | SSA-915275: Multiple Vulnerabilities in SINEC INS Before V1.0 SP2 Update 3 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-883918 | SSA-883918: Information Disclosure Vulnerability in SIMATIC WinCC | 2024-07-09T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-654798 | SSA-654798: Incorrect Authorization Vulnerability in SIMATIC CP 1543-1 Devices | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-616032 | SSA-616032: Local Privilege Escalation Vulnerability in Spectrum Power 7 Before V24Q3 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-454789 | SSA-454789: Deserialization Vulnerability in TeleControl Server Basic V3.1 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-354112 | SSA-354112: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.2 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-351178 | SSA-351178: Multiple Vulnerabilities in Solid Edge Before SE2024 Update 9 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-331112 | SSA-331112: Multiple Vulnerabilities in SINEC NMS Before V3.0 SP1 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-000297 | SSA-000297: Multiple SQLite Vulnerabilities in RUGGEDCOM CROSSBOW Station Access Controller Before V5.6 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-438590 | SSA-438590: Buffer Overflow Vulnerability in Siveillance Video Camera Drivers | 2024-10-10T00:00:00Z | 2024-10-10T00:00:00Z |
| ssa-959281 | SSA-959281: XML File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-955858 | SSA-955858: Multiple Vulnerabilities in LOGO! 8 BM Devices | 2022-10-11T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-783481 | SSA-783481: Denial-of-Service Vulnerability in LOGO! 8 BM | 2021-03-09T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-626178 | SSA-626178: Stack-Based Buffer Overflow Vulnerability in JT2Go Before V2406.0003 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-540493 | SSA-540493: Kiosk Mode Escape Vulnerability in HiMed Cockpit Devices Before V11.6.2 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-368868 | SSA-368868: Multiple Vulnerabilities in WibuKey for Windows | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-321292 | SSA-321292: Denial of Service in the OPC Foundation Local Discovery Server (LDS) in Industrial Products | 2022-05-10T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-254396 | SSA-254396: Vulnerability in Nozomi Guardian/CMC Before 24.3.1 on RUGGEDCOM APE1808 Devices | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-148641 | SSA-148641: XPath Constraint Vulnerability in Mendix Runtime | 2022-03-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-969738 | SSA-969738: Denial of Service Vulnerability in SIMATIC S7-200 SMART Devices | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-869574 | SSA-869574: Multiple Vulnerabilities in SINEMA Remote Connect Server Before V3.2 SP2 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-792319 | SSA-792319: Missing Read Out Protection in SENTRON 7KM PAC3x20 Devices | 2024-03-12T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-765405 | SSA-765405: Multiple Vulnerabilities in SIMATIC RFID Readers | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-753746 | SSA-753746: Denial of Service Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products | 2024-02-13T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-721642 | SSA-721642: Injection Vulnerability in SCALANCE W700 802.11 AX Family Before V2.4 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1263-1 | Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T22:35:17Z | 2026-04-10T22:35:17Z |
| suse-su-2026:1262-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP7) | 2026-04-10T21:43:55Z | 2026-04-10T21:43:55Z |
| suse-su-2026:1261-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP7) | 2026-04-10T19:34:46Z | 2026-04-10T19:34:46Z |
| suse-su-2026:21095-1 | Security update for sqlite3 | 2026-04-10T18:50:16Z | 2026-04-10T18:50:16Z |
| suse-su-2026:21094-1 | Security update for pcre2 | 2026-04-10T18:27:30Z | 2026-04-10T18:27:30Z |
| suse-su-2026:1259-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6) | 2026-04-10T17:35:15Z | 2026-04-10T17:35:15Z |
| suse-su-2026:1258-1 | Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T17:35:09Z | 2026-04-10T17:35:09Z |
| suse-su-2026:1257-1 | Security update for openssl-1_1 | 2026-04-10T15:06:36Z | 2026-04-10T15:06:36Z |
| suse-su-2026:1256-1 | Security update for openssl-1_0_0 | 2026-04-10T14:57:18Z | 2026-04-10T14:57:18Z |
| suse-su-2026:1255-1 | Security update for openssl-1_1 | 2026-04-10T14:56:12Z | 2026-04-10T14:56:12Z |
| suse-su-2026:1254-1 | Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T14:04:42Z | 2026-04-10T14:04:42Z |
| suse-su-2026:21121-1 | Security update for NetworkManager | 2026-04-10T12:48:36Z | 2026-04-10T12:48:36Z |
| suse-su-2026:21113-1 | Security update for NetworkManager | 2026-04-10T12:30:19Z | 2026-04-10T12:30:19Z |
| suse-su-2026:21023-1 | Security update for cockpit-podman | 2026-04-10T11:54:16Z | 2026-04-10T11:54:16Z |
| suse-su-2026:21024-1 | Security update for cockpit-machines | 2026-04-10T11:53:13Z | 2026-04-10T11:53:13Z |
| suse-su-2026:21022-1 | Security update for cockpit | 2026-04-10T11:42:11Z | 2026-04-10T11:42:11Z |
| suse-su-2026:1252-1 | Security update for tigervnc | 2026-04-10T11:36:58Z | 2026-04-10T11:36:58Z |
| suse-su-2026:1251-1 | Security update for cockpit-podman | 2026-04-10T11:36:50Z | 2026-04-10T11:36:50Z |
| suse-su-2026:1250-1 | Security update for cockpit-tukit | 2026-04-10T11:36:40Z | 2026-04-10T11:36:40Z |
| suse-su-2026:1249-1 | Security update for cockpit-machines | 2026-04-10T11:36:32Z | 2026-04-10T11:36:32Z |
| suse-su-2026:21021-1 | Security update for python-cryptography | 2026-04-10T11:26:32Z | 2026-04-10T11:26:32Z |
| suse-su-2026:1247-1 | Security update for nghttp2 | 2026-04-10T10:34:43Z | 2026-04-10T10:34:43Z |
| suse-su-2026:1248-1 | Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T09:13:03Z | 2026-04-10T09:13:03Z |
| suse-su-2026:21020-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-04-10T08:14:40Z | 2026-04-10T08:14:40Z |
| suse-su-2026:1244-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2026-04-10T08:04:54Z | 2026-04-10T08:04:54Z |
| suse-su-2026:1242-1 | Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T07:04:48Z | 2026-04-10T07:04:48Z |
| suse-su-2026:21019-1 | Security update for glibc | 2026-04-10T06:44:31Z | 2026-04-10T06:44:31Z |
| suse-su-2026:1239-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise 15 SP6) | 2026-04-09T19:04:33Z | 2026-04-09T19:04:33Z |
| suse-su-2026:1237-1 | Security update for the Linux Kernel (Live Patch 47 for SUSE Linux Enterprise 15 SP4) | 2026-04-09T17:04:59Z | 2026-04-09T17:04:59Z |
| suse-su-2026:21018-1 | Security update for ovmf | 2026-04-09T15:10:40Z | 2026-04-09T15:10:40Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:4648 | Moderate: grub2 security update | 2026-03-16T00:00:00Z | 2026-03-17T10:24:06Z |
| alsa-2026:4672 | Important: container-tools:rhel8 security update | 2026-03-17T00:00:00Z | 2026-03-17T10:17:22Z |
| alsa-2026:4445 | Important: .NET 10.0 security update | 2026-03-12T00:00:00Z | 2026-03-16T16:52:17Z |
| alsa-2026:4472 | Moderate: compat-openssl11 security update | 2026-03-12T00:00:00Z | 2026-03-16T16:49:36Z |
| alsa-2026:4447 | Important: libvpx security update | 2026-03-12T00:00:00Z | 2026-03-16T16:46:00Z |
| alsa-2026:4456 | Important: .NET 9.0 security update | 2026-03-12T00:00:00Z | 2026-03-16T16:41:08Z |
| alsa-2026:3985 | Important: git-lfs security update | 2026-03-09T00:00:00Z | 2026-03-13T12:38:07Z |
| alsa-2026:4306 | Important: mingw-libpng security update | 2026-03-11T00:00:00Z | 2026-03-13T12:35:26Z |
| alsa-2026:4012 | Moderate: kernel security update | 2026-03-09T00:00:00Z | 2026-03-13T09:42:02Z |
| alsa-2026:4450 | Important: .NET 9.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:36:54Z |
| alsa-2026:4451 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:34:29Z |
| alsa-2026:4453 | Important: .NET 10.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:32:40Z |
| alsa-2026:3940 | Moderate: nfs-utils security update | 2026-03-05T00:00:00Z | 2026-03-13T09:30:09Z |
| alsa-2026:3842 | Moderate: delve security update | 2026-03-05T00:00:00Z | 2026-03-13T09:28:13Z |
| alsa-2026:4168 | Moderate: python3.9 security update | 2026-03-10T00:00:00Z | 2026-03-13T09:26:02Z |
| alsa-2026:4177 | Important: opentelemetry-collector security update | 2026-03-10T00:00:00Z | 2026-03-13T09:23:39Z |
| alsa-2026:4188 | Moderate: gnutls security update | 2026-03-10T00:00:00Z | 2026-03-13T09:21:59Z |
| alsa-2026:4216 | Moderate: python3.11 security update | 2026-03-10T00:00:00Z | 2026-03-13T09:19:57Z |
| alsa-2026:4454 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:17:27Z |
| alsa-2026:4458 | Important: .NET 10.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:14:44Z |
| alsa-2026:4455 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:11:49Z |
| alsa-2026:4463 | Moderate: python3.12 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:03:59Z |
| alsa-2026:4443 | Important: .NET 9.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:01:07Z |
| alsa-2026:4442 | Moderate: vim security update | 2026-03-12T00:00:00Z | 2026-03-12T14:47:41Z |
| alsa-2026:4174 | Important: opentelemetry-collector security update | 2026-03-10T00:00:00Z | 2026-03-11T17:46:34Z |
| alsa-2026:4235 | Moderate: nginx:1.26 security update | 2026-03-10T00:00:00Z | 2026-03-11T11:13:12Z |
| alsa-2026:3966 | Moderate: kernel security update | 2026-03-09T00:00:00Z | 2026-03-11T10:10:37Z |
| alsa-2026:3730 | Important: postgresql security update | 2026-03-04T00:00:00Z | 2026-03-11T10:01:08Z |
| alsa-2026:3752 | Important: osbuild-composer security update | 2026-03-04T00:00:00Z | 2026-03-11T09:57:01Z |
| alsa-2026:3898 | Important: osbuild-composer security update | 2026-03-05T00:00:00Z | 2026-03-11T09:54:32Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-519 | Stack-buffer-overflow in LookupThousands | 2022-06-29T00:00:24.107785Z | 2026-02-08T14:10:55.777894Z |
| osv-2022-462 | Stack-buffer-overflow in strcat | 2022-06-07T00:01:47.521548Z | 2026-02-08T14:10:42.909724Z |
| osv-2021-802 | Stack-buffer-overflow in InterpretCondition | 2021-05-27T00:00:31.797718Z | 2026-02-08T14:08:02.526845Z |
| osv-2021-1110 | Stack-buffer-overflow in TranslateWord2 | 2021-08-08T00:02:17.026887Z | 2026-02-08T14:07:47.971880Z |
| osv-2026-209 | Use-of-uninitialized-value in ntrip_parse_url | 2026-02-08T00:06:08.137216Z | 2026-02-08T00:06:08.137699Z |
| osv-2025-547 | Security exception in com.alibaba.fastjson2.JSONReader.readArray | 2025-07-15T00:09:03.936493Z | 2026-02-07T14:17:37.720783Z |
| osv-2023-197 | Global-buffer-overflow in base_C_MessageEncryptInit | 2023-03-18T13:00:57.254906Z | 2026-02-07T14:09:46.773524Z |
| osv-2026-205 | UNKNOWN READ in gpsd_poll | 2026-02-07T00:03:03.099317Z | 2026-02-07T00:03:03.099778Z |
| osv-2026-204 | Segv on unknown address in icalarray_append | 2026-02-06T00:20:37.969087Z | 2026-02-06T00:20:37.969390Z |
| osv-2026-203 | Segv on unknown address in glslang::TIntermediate::addSymbol | 2026-02-06T00:20:30.779951Z | 2026-02-06T00:20:30.780234Z |
| osv-2026-200 | Global-buffer-overflow in nameMatch | 2026-02-06T00:15:58.927791Z | 2026-02-06T00:15:58.928058Z |
| osv-2026-196 | Null-dereference READ in ubsan_GetStackTrace | 2026-02-06T00:06:05.778394Z | 2026-02-06T00:06:05.778867Z |
| osv-2026-195 | Use-of-uninitialized-value in vcardstructured_free | 2026-02-05T00:15:22.587525Z | 2026-02-05T00:15:22.587818Z |
| osv-2026-189 | Global-buffer-overflow in gpsd_poll | 2026-02-04T00:05:14.950372Z | 2026-02-04T00:05:14.950857Z |
| osv-2026-182 | Use-of-uninitialized-value in json_internal_read_object | 2026-02-03T00:11:05.023029Z | 2026-02-03T00:11:05.023344Z |
| osv-2026-177 | Security exception in org.apache.poi.util.IOUtils.safelyAllocate | 2026-02-02T00:20:01.368972Z | 2026-02-02T00:20:01.369362Z |
| osv-2026-169 | Null-dereference READ in execute_post_instantiate_functions | 2026-02-01T00:01:05.927662Z | 2026-02-01T00:01:05.927997Z |
| osv-2022-1003 | Index-out-of-bounds in LibRaw::ahd_interpolate_r_and_b_in_rgb_and_convert_to_cielab | 2022-09-30T00:02:10.026151Z | 2026-01-31T14:08:33.420267Z |
| osv-2026-167 | Use-of-uninitialized-value in aivdm_analyze | 2026-01-31T00:10:49.750917Z | 2026-01-31T00:10:49.751204Z |
| osv-2026-166 | Use-of-uninitialized-value in ntrip_parse_url | 2026-01-31T00:10:39.163525Z | 2026-01-31T00:10:39.163931Z |
| osv-2023-235 | Use-of-uninitialized-value in complexity_RC_reset_marking | 2023-03-26T13:00:16.681780Z | 2026-01-29T14:14:41.215909Z |
| osv-2023-234 | Use-of-uninitialized-value in ihevce_enc_frm_proc_slave_thrd | 2023-03-26T13:00:12.135289Z | 2026-01-29T14:14:40.129452Z |
| osv-2023-239 | Use-of-uninitialized-value in ihevce_strm_fill_done | 2023-03-26T13:02:03.445119Z | 2026-01-29T14:14:38.558891Z |
| osv-2026-97 | Heap-buffer-overflow in vpx_wb_write_literal | 2026-01-21T00:09:09.897624Z | 2026-01-28T14:23:52.198239Z |
| osv-2026-156 | Segv on unknown address in aivdm_analyze | 2026-01-28T00:06:24.327227Z | 2026-01-28T00:06:24.327712Z |
| osv-2026-150 | Null-dereference READ in wasm_runtime_invoke_native | 2026-01-27T00:02:06.850780Z | 2026-01-27T00:02:06.851098Z |
| osv-2026-144 | Use-of-uninitialized-value in initFilter | 2026-01-26T00:05:57.473672Z | 2026-01-26T00:05:57.473958Z |
| osv-2026-141 | Segv on unknown address in yuv2rgb4_X_c | 2026-01-26T00:03:47.552290Z | 2026-01-26T00:03:47.552807Z |
| osv-2025-280 | Heap-buffer-overflow in Assimp::SceneCombiner::CopyScene | 2025-04-15T00:04:03.423453Z | 2026-01-25T14:19:05.873424Z |
| osv-2025-580 | UNKNOWN READ in signed char Assimp::StreamReader<false, false>::Get<signed char> | 2025-07-29T00:16:41.422221Z | 2026-01-25T14:18:57.285875Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0436 | paste - no longer maintained | 2024-10-07T12:00:00Z | 2026-01-27T21:51:15Z |
| rustsec-2026-0005 | Potential use-after-free in `oneshot` when used asynchronously | 2026-01-25T12:00:00Z | 2026-01-27T05:50:51Z |
| rustsec-2026-0004 | Triton VM Soundness Vulnerability due to Improper Sampling of Randomness | 2026-01-21T12:00:00Z | 2026-01-23T05:50:29Z |
| rustsec-2021-0155 | Use After Free in lucet-runtime | 2021-11-30T12:00:00Z | 2026-01-17T19:50:19Z |
| rustsec-2025-0111 | `tokio-tar` parses PAX extended headers incorrectly, allows file smuggling | 2025-10-21T12:00:00Z | 2026-01-17T07:44:05Z |
| rustsec-2025-0141 | Bincode is unmaintained | 2025-12-16T12:00:00Z | 2026-01-16T11:04:42Z |
| rustsec-2026-0003 | Non-constant-time code generation on ARM32 targets | 2026-01-14T12:00:00Z | 2026-01-15T17:45:42Z |
| rustsec-2026-0002 | `IterMut` violates Stacked Borrows by invalidating internal pointer | 2026-01-07T12:00:00Z | 2026-01-08T05:46:06Z |
| rustsec-2026-0001 | Potential Undefined Behaviors in `Arc<T>`/`Rc<T>` impls of `from_value` on OOM | 2026-01-05T12:00:00Z | 2026-01-06T15:33:19Z |
| rustsec-2025-0139 | theshit vulnerable to unsafe loading of user-owned Python rules when running as root | 2025-12-30T12:00:00Z | 2026-01-04T20:34:25Z |
| rustsec-2023-0096 | Plaintext exposed in decrypt_in_place_detached even on tag verification failure | 2023-11-22T12:00:00Z | 2025-12-29T13:49:34Z |
| rustsec-2025-0138 | --allow-read / --allow-write permission bypass in `node:sqlite` | 2025-06-03T12:00:00Z | 2025-12-29T10:04:21Z |
| rustsec-2025-0137 | Unsoundness of safe `reciprocal_mg10` | 2025-12-22T12:00:00Z | 2025-12-28T09:42:26Z |
| rustsec-2024-0447 | Panics on Malformed Untrusted Input | 2024-12-05T12:00:00Z | 2025-12-24T14:48:25Z |
| rustsec-2023-0095 | Invalid Slice Split Results in Server Panic | 2023-08-03T12:00:00Z | 2025-12-22T18:53:25Z |
| rustsec-2024-0446 | Shell expansion in custom commands | 2024-07-26T12:00:00Z | 2025-12-22T13:54:49Z |
| rustsec-2022-0103 | Incorrect signature verification on gzip-compressed install images | 2022-03-04T12:00:00Z | 2025-12-21T13:45:28Z |
| rustsec-2024-0445 | cap-primitives doesn't fully sandbox all the Windows device filenames | 2024-11-05T12:00:00Z | 2025-12-19T21:01:24Z |
| rustsec-2024-0444 | Uncaught exception when transitioning the state of `AsyncGenerator` objects from within a property getter of `then` | 2024-08-14T12:00:00Z | 2025-12-19T06:15:15Z |
| rustsec-2021-0082 | vec-const attempts to construct a Vec from a pointer to a const slice | 2021-08-14T12:00:00Z | 2025-12-17T17:06:41Z |
| rustsec-2025-0136 | Underflow in aes_key_unwrap function | 2025-11-07T12:00:00Z | 2025-12-17T06:01:32Z |
| rustsec-2025-0135 | matrix-sdk-base: Denial of service due to custom `m.room.join_rules` events | 2025-12-08T12:00:00Z | 2025-12-08T12:23:54Z |
| rustsec-2025-0133 | Incorrect calculation on aarch64 | 2025-12-04T12:00:00Z | 2025-12-06T07:36:56Z |
| rustsec-2025-0134 | rustls-pemfile is unmaintained | 2025-11-28T12:00:00Z | 2025-12-05T19:07:24Z |
| rustsec-2025-0132 | `Reader::open_mmap` unsoundly marks unsafe memmap operation as safe | 2025-11-28T12:00:00Z | 2025-12-02T06:03:09Z |
| rustsec-2025-0131 | Lack of sufficient checks in public API | 2025-10-31T12:00:00Z | 2025-12-02T06:03:09Z |
| rustsec-2025-0120 | json5 crate is unmaintained | 2025-11-16T12:00:00Z | 2025-11-30T00:15:16Z |
| rustsec-2025-0126 | Heap-buffer-overflow in nftnl::Batch::with_page_size (nftnl-rs) | 2025-10-18T12:00:00Z | 2025-11-27T21:53:33Z |
| rustsec-2025-0130 | Missing check in ZK proof in CGGMP21 Threshold Signing Protocol | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0129 | Missing check in ZK proof in CGGMP21 Threshold Signing Protocol | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-joomla-2026-21630 | Joomla! Core - [20260302] - SQL injection in com_content articles webservice endpoint | 2026-04-10T08:49:15.352Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21629 | Joomla! Core - [20260301] - ACL hardening in com_ajax | 2026-04-10T08:49:13.196Z | 2026-04-10T09:26:18.172Z |
| bit-cassandra-2026-27315 | Apache Cassandra: cqlsh history sensitive information leak | 2026-04-09T08:36:45.141Z | 2026-04-10T09:26:18.172Z |
| bit-parse-2026-39381 | Parse Server's Endpoint `/sessions/me` bypasses `_Session` `protectedFields` | 2026-04-09T14:37:43.255Z | 2026-04-09T15:05:10.890Z |
| bit-parse-2026-39321 | Parse Server has a login timing side-channel reveals user existence | 2026-04-09T14:37:40.125Z | 2026-04-09T15:05:10.890Z |
| bit-wordpress-2023-2745 | WordPress Core < 6.2.1 - Directory Traversal | 2024-03-06T11:09:15.187Z | 2026-04-09T09:13:50.652Z |
| bit-activemq-2026-33227 | Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ Web, Apache ActiveMQ: Improper Limitation of a Pathname to a Restricted Classpath Directory | 2026-04-09T08:36:51.132Z | 2026-04-09T09:13:50.652Z |
| bit-wordpress-2023-5692 | WordPress Core <= 6.4.3 - Sensitive Information Exposure via redirect_guess_404_permalink | 2024-04-09T10:59:36.633Z | 2026-04-08T18:15:20.423Z |
| bit-parse-2026-35200 | Parse Server has a file upload Content-Type override via extension mismatch | 2026-04-08T14:51:33.993Z | 2026-04-08T15:15:28.618Z |
| bit-discourse-2026-34947 | Discourse: Staged user custom fields are exposed on public invite pages | 2026-04-08T14:45:19.092Z | 2026-04-08T15:15:28.618Z |
| bit-discourse-2026-27481 | Discourse: Hidden tag visibility bypass on tag routes | 2026-04-08T14:43:31.143Z | 2026-04-08T15:15:28.618Z |
| bit-mlflow-2025-15031 | Path Traversal Vulnerability in mlflow/mlflow | 2026-03-24T08:47:14.572Z | 2026-04-08T12:15:37.582Z |
| bit-jupyterhub-2026-33709 | JupyterHub has an Open Redirect Vulnerability | 2026-04-08T08:40:42.508Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-33375 | Grafana MSSQL Data Source Plugin: Restriction Bypass Leading to OOM DoS | 2026-04-01T08:41:17.463Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-28375 | Grafana Testdata datasource can issue unbounded memory allocations | 2026-04-01T08:41:15.363Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27880 | OpenFeature evaluation API reads input data with no bounds | 2026-04-01T08:41:13.459Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27879 | Query resampling can cause unbounded memory allocations | 2026-04-01T08:41:11.477Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27877 | Public dashboards discloses all direct mode datasources | 2026-04-01T08:41:09.536Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27876 | RCE on Grafana via sqlExpressions | 2026-04-01T08:41:07.673Z | 2026-04-08T09:14:18.943Z |
| bit-discourse-2026-33415 | Discourse: Improper Access Control in discourse-ai Allows Unauthorized Category Content Exposure | 2026-04-07T08:44:29.473Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33300 | Discourse: Hidden group names and access metadata are exposed to moderators through the `category-chatables` endpoint | 2026-04-07T08:44:13.358Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33185 | Discourse: Group SMTP test endpoint susceptible to SSRF | 2026-04-07T08:44:07.641Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33074 | Discourse: Vulnerability in discourse-subscriptions plugin allowing users to self-grant to higher tier subscriptions | 2026-04-07T08:44:05.677Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33073 | discourse-subscriptions plugin leaking stripe API key in multisite environment | 2026-04-07T08:44:03.688Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32951 | Discourse: Authorization bypass in oneboxer via user-controlled category id | 2026-04-07T08:44:01.614Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32620 | Discourse: Missing post-level authorization allows whisper metadata disclosure | 2026-04-07T08:43:59.465Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32619 | Discourse: Insufficient topic visibility check allows unauthorized poll manipulation in private categories | 2026-04-07T08:43:57.232Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32618 | Discourse: Unauthorized channel membership inference via excluded_memberships_channel_id | 2026-04-07T08:43:55.159Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32615 | Discourse: Category group moderators can perform actions on topics in restricted categories without read access | 2026-04-07T08:43:53.093Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32607 | Discourse: Stored XSS via unescaped assignee name | 2026-04-07T08:43:50.897Z | 2026-04-07T09:14:25.218Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-gk29346 | Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2025-66564, CVE-2026-1229, CVE-2026-22039, CVE-2026-22703, CVE-2026-22772, CVE-2026-23831, CVE-2026-23881, CVE-2026-24051, CVE-2026-24117, CVE-2026-24137, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-29wx-vh33-7x7r, ghsa-2x5j-vhc8-9cwm, ghsa-459x-q9hg-4gpq, ghsa-4qg8-fj49-pxjh, ghsa-4vq8-7jfc-9cvp, ghsa-6m8w-jc87-6cr7, ghsa-88jx-383q-w4qc, ghsa-95pr-fxf5-86gv, ghsa-c5q2-7r4c-mv6g, ghsa-c6gw-w398-hv78, ghsa-c77r-fh37-x2px, ghsa-f83f-xpx7-ffpw, ghsa-fv92-fjc5-jj9h, ghsa-jrr2-x33p-6hvc, ghsa-mh63-6h87-95cp, ghsa-mqqf-5wvp-8fh8, ghsa-p77j-4mvh-x3m3, ghsa-qjvc-p88j-j9rm, ghsa-r5p3-955p-5ggq, ghsa-v23v-6jw2-98fq, ghsa-v6v8-xj6m-xwqh, ghsa-xw73-rw38-6vjc applied in versions: 1.4.2-r2, 1.4.2-r4, 1.4.2-r6, 1.4.2-r7 | 2026-04-01T09:22:17.389111Z | 2026-03-25T11:02:44Z |
| cleanstart-2026-ce02533 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2025-62820, CVE-2026-30836, CVE-2026-33186, ghsa-p77j-4mvh-x3m3, ghsa-q4r8-xm5f-56gw applied in versions: 0.10.1-r0, 0.9.10-r0, 0.9.9-r0, 0.9.9-r1 | 2026-04-01T09:21:33.459909Z | 2026-03-25T10:51:25Z |
| cleanstart-2026-pw57640 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, CVE-2026-4427, ghsa-37cx-329c-33x3, ghsa-6g7g-w4f8-9c9x, ghsa-9h8m-3fm2-qjrq, ghsa-9mj6-hxhv-w67j, ghsa-cfpf-hrx2-8rv6, ghsa-f6x5-jh6r-wrfv, ghsa-fw7p-63qq-7hpr, ghsa-j5w8-q4qc-rx2x, ghsa-jqcq-xjh3-6g23, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x, ghsa-x6gf-mpr2-68h6 applied in versions: 1.12.1-r0, 1.12.1-r1, 1.12.1-r2 | 2026-04-01T09:22:37.368205Z | 2026-03-25T05:32:13Z |
| cleanstart-2026-lk63891 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.29.0-r0, 1.29.1-r0 | 2026-04-01T09:22:08.586608Z | 2026-03-25T05:12:36Z |
| cleanstart-2026-ej96468 | Security fixes for ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0, 1.28.4-r1, 1.28.5-r0 | 2026-04-01T09:22:08.656529Z | 2026-03-25T05:09:00Z |
| cleanstart-2026-jm60128 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0, 1.28.4-r1 | 2026-04-01T09:22:08.268986Z | 2026-03-25T05:05:50Z |
| cleanstart-2026-kw90815 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0, 1.27.6-r1, 1.27.8-r0 | 2026-04-01T09:22:32.438088Z | 2026-03-25T05:02:40Z |
| cleanstart-2026-ev91316 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0, 1.27.6-r1 | 2026-04-01T09:22:33.462978Z | 2026-03-25T04:58:46Z |
| cleanstart-2026-hh87643 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.26.8-r0, 1.26.8-r1 | 2026-04-01T09:22:32.645637Z | 2026-03-25T04:50:32Z |
| cleanstart-2026-zw86166 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-p77j-4mvh-x3m3 applied in versions: 0.8.10-r0, 0.8.4-r0 | 2026-04-01T09:22:53.735679Z | 2026-03-25T04:41:41Z |
| cleanstart-2026-ol17158 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-m6hq-p25p-ffr2, ghsa-p77j-4mvh-x3m3, ghsa-pwhc-rpq9-4c8w applied in versions: 0.7.0-r2, 0.7.0-r3, 0.7.0-r4 | 2026-04-01T09:23:46.993269Z | 2026-03-25T04:38:39Z |
| cleanstart-2026-pv98664 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-m6hq-p25p-ffr2, ghsa-p77j-4mvh-x3m3, ghsa-pwhc-rpq9-4c8w applied in versions: 0.6.4-r5, 0.6.4-r6, 0.7.0-r4 | 2026-04-01T09:23:47.321714Z | 2026-03-25T04:34:22Z |
| cleanstart-2026-ot07577 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2026-1229 applied in versions: 3.19.0-r0, 4.0.1-r0, 4.1.0-r0 | 2026-04-01T09:24:34.526263Z | 2026-03-24T13:01:13Z |
| cleanstart-2026-mf20926 | Security fixes for CVE-2021-38561, CVE-2022-27191, CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-58190, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 3.1.2-r3, 3.1.2-r4, 3.7.0-r0, 3.7.0-r2 | 2026-04-01T09:24:07.163057Z | 2026-03-24T13:01:13Z |
| cleanstart-2026-cv29689 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2025-62820, CVE-2026-25793, CVE-2026-30836 applied in versions: 0.10.2-r0, 0.9.10-r0, 0.9.9-r0, 0.9.9-r1 | 2026-04-01T09:24:13.195625Z | 2026-03-24T13:01:13Z |
| cleanstart-2026-ni04192 | Security fixes for CVE-2025-61729, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-fv92-fjc5-jj9h, ghsa-p77j-4mvh-x3m3 applied in versions: 3.6.16-r0, 3.6.18-r0, 3.6.18-r1, 3.6.18-r2, 3.7.4-r0 | 2026-04-01T09:24:43.327769Z | 2026-03-24T12:54:01Z |
| cleanstart-2026-mk10646 | Security fixes for CVE-2025-61729, CVE-2026-25679, CVE-2026-25934, CVE-2026-27139, CVE-2026-27142, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-9h8m-3fm2-qjrq, ghsa-fv92-fjc5-jj9h, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x applied in versions: 3.6.16-r0, 3.7.4-r0, 3.7.9-r0, 3.7.9-r1 | 2026-04-01T09:24:40.606937Z | 2026-03-24T12:53:01Z |
| cleanstart-2026-pz85180 | Security fixes for CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, ghsa-9h8m-3fm2-qjrq, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x applied in versions: 3.7.8-r2, 3.7.8-r3 | 2026-04-01T09:25:09.013456Z | 2026-03-24T12:47:42Z |
| cleanstart-2026-cp95927 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 1.28.1-r0, 1.28.1-r1 | 2026-04-01T09:25:12.106009Z | 2026-03-24T12:00:17Z |
| cleanstart-2026-ci66802 | Security fixes for CVE-2015-2104, CVE-2020-8908, CVE-2021-21295, CVE-2021-21409, CVE-2021-37136, CVE-2022-1471, CVE-2022-41881, CVE-2023-27043, CVE-2023-2976, CVE-2023-34462, CVE-2023-6378, CVE-2024-12254, CVE-2024-12718, CVE-2024-12798, CVE-2024-12801, CVE-2024-27137, CVE-2024-6232, CVE-2024-6923, CVE-2024-9287, CVE-2025-0938, CVE-2025-23015, CVE-2025-4138, CVE-2025-4330, CVE-2025-4516, CVE-2025-4517, CVE-2026-1225, ghsa-25qh-j22f-pwp8, ghsa-3mc7-4q67-w48m, ghsa-5mg8-w23w-74h3, ghsa-6v67-2wr5-gvf4, ghsa-72hv-8253-57qq, ghsa-7g45-4rm6-3mm3, ghsa-98wm-3w3q-mw94, ghsa-9w3m-gqgf-c4p9, ghsa-c4r9-r8fh-9vj2, ghsa-hhhw-99gj-p3c3, ghsa-mjmj-j48q-9wg2, ghsa-pr98-23f8-jwxv, ghsa-qqpg-mvqg-649v, ghsa-vmq6-5m68-f53m, ghsa-w37g-rhq8-7m4j applied in versions: 4.0.17-r1, 4.0.19-r2, 4.0.19-r3, 4.1.9-r0 | 2026-04-01T09:27:07.387904Z | 2026-03-24T10:05:19Z |
| cleanstart-2026-km27583 | Security fixes for CVE-2015-2104, CVE-2023-27043, CVE-2024-12254, CVE-2024-12718, CVE-2024-12798, CVE-2024-12801, CVE-2024-27137, CVE-2024-6232, CVE-2024-6923, CVE-2024-9287, CVE-2025-0938, CVE-2025-23015, CVE-2025-4138, CVE-2025-4330, CVE-2025-4516, CVE-2025-4517, CVE-2025-58057, CVE-2026-1225, ghsa-25qh-j22f-pwp8, ghsa-3p8m-j85q-pgmj, ghsa-5mg8-w23w-74h3, ghsa-6v67-2wr5-gvf4, ghsa-72hv-8253-57qq, ghsa-7g45-4rm6-3mm3, ghsa-pr98-23f8-jwxv, ghsa-qqpg-mvqg-649v applied in versions: 4.0.17-r1, 4.1.9-r0, 5.0.6-r1, 5.0.6-r2 | 2026-04-01T09:26:50.907320Z | 2026-03-24T09:56:29Z |
| cleanstart-2026-db61851 | Security fixes for CVE-2024-10005, CVE-2024-10006, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24051, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.8.11-r0, 1.8.11-r1, 1.8.11-r2, 1.8.11-r3, 1.9.4-r0 | 2026-04-01T09:26:58.691080Z | 2026-03-24T08:56:04Z |
| cleanstart-2026-jj09127 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-33186 applied in versions: 0.28.7-r1, 0.29.0-r0, 0.30.0-r0 | 2026-04-01T09:26:20.691727Z | 2026-03-24T04:58:10Z |
| cleanstart-2026-id24148 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-33186 applied in versions: 0.28.7-r1, 0.29.0-r0, 0.30.0-r0 | 2026-04-01T09:27:05.843609Z | 2026-03-24T04:58:10Z |
| cleanstart-2026-hk06185 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-47914, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p84v-gxvw-73pf applied in versions: 3.7.0-r0, 3.7.3-r0, 3.7.4-r0, 3.7.6-r0, 3.7.9-r0, 3.7.9-r1, 3.7.9-r2, 4.0.2-r0 | 2026-04-01T09:27:48.241920Z | 2026-03-24T04:58:10Z |
| cleanstart-2026-ka15295 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.7.0-r0, 3.7.0.-r1 | 2026-04-01T09:27:33.488765Z | 2026-03-23T14:26:32Z |
| cleanstart-2026-am88528 | Security fixes for CVE-2025-15558, CVE-2025-61729, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-fv92-fjc5-jj9h, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3 applied in versions: 3.6.16-r0, 3.6.18-r0, 3.6.19-r0, 3.6.19-r1, 3.6.19-r2, 3.6.19-r3, 3.7.4-r0 | 2026-04-01T09:27:52.956018Z | 2026-03-23T14:25:49Z |
| cleanstart-2026-mz18595 | Security fixes for CVE-2025-61730, CVE-2025-61732, CVE-2026-27139, CVE-2026-27142 applied in versions: 3.4.0-r7 | 2026-04-01T09:27:48.953742Z | 2026-03-23T14:24:01Z |
| cleanstart-2026-cu52059 | Security fixes for CVE-2025-61728, CVE-2025-61730, CVE-2026-24051, CVE-2026-27139, CVE-2026-27142, ghsa-9h8m-3fm2-qjrq applied in versions: 3.3.0-r7, 3.5.0-r0 | 2026-04-01T09:27:57.960712Z | 2026-03-23T14:23:15Z |
| cleanstart-2026-nn77774 | Security fixes for CVE-2026-33186, ghsa-p77j-4mvh-x3m3 applied in versions: 2.4.0-r0 | 2026-04-01T09:28:03.910369Z | 2026-03-23T12:37:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2025-014 | 2025-02-12T17:37:40.000Z | 2025-03-31T22:05:00.000Z | |
| drupal-contrib-2025-013 | 2025-02-05T17:24:48.000Z | 2025-03-31T22:04:51.000Z | |
| drupal-contrib-2025-012 | 2025-01-29T17:16:19.000Z | 2025-03-31T22:04:42.000Z | |
| drupal-contrib-2025-011 | 2025-01-29T17:13:29.000Z | 2025-03-31T22:04:35.000Z | |
| drupal-contrib-2025-009 | 2025-01-29T16:54:02.000Z | 2025-03-31T22:04:22.000Z | |
| drupal-contrib-2025-008 | 2025-01-29T08:51:50.000Z | 2025-03-31T22:04:11.000Z | |
| drupal-contrib-2025-007 | 2025-01-22T17:01:38.000Z | 2025-03-31T22:04:03.000Z | |
| drupal-contrib-2025-003 | 2025-01-15T15:58:05.000Z | 2025-03-31T22:03:43.000Z | |
| drupal-contrib-2024-051 | 2024-10-23T15:45:41.000Z | 2025-02-20T20:08:44.000Z | |
| drupal-contrib-2024-076 | 2024-12-11T16:53:22.000Z | 2025-02-20T20:08:37.000Z | |
| drupal-contrib-2024-075 | 2024-12-11T14:31:11.000Z | 2025-02-20T20:08:28.000Z | |
| drupal-contrib-2024-074 | 2024-12-11T14:27:22.000Z | 2025-02-20T20:08:21.000Z | |
| drupal-contrib-2024-073 | 2024-12-11T12:36:29.000Z | 2025-02-20T20:08:10.000Z | |
| drupal-contrib-2024-072 | 2024-12-11T07:44:40.000Z | 2025-02-20T20:08:00.000Z | |
| drupal-contrib-2024-071 | 2024-12-04T16:20:57.000Z | 2025-02-20T20:07:52.000Z | |
| drupal-contrib-2024-070 | 2024-12-04T15:51:12.000Z | 2025-02-20T20:07:46.000Z | |
| drupal-contrib-2024-069 | 2024-12-04T15:13:14.000Z | 2025-02-20T20:07:35.000Z | |
| drupal-contrib-2024-068 | 2024-12-04T14:46:03.000Z | 2025-02-20T20:07:26.000Z | |
| drupal-contrib-2024-067 | 2024-12-04T14:40:50.000Z | 2025-02-20T20:07:11.000Z | |
| drupal-contrib-2024-064 | 2024-11-27T16:41:51.000Z | 2025-02-20T20:06:49.000Z | |
| drupal-contrib-2024-062 | 2024-11-20T17:36:55.000Z | 2025-02-20T20:06:35.000Z | |
| drupal-contrib-2024-060 | 2024-11-13T17:37:36.000Z | 2025-02-20T20:06:18.000Z | |
| drupal-contrib-2024-059 | 2024-11-13T17:36:48.000Z | 2025-02-20T20:06:05.000Z | |
| drupal-contrib-2024-058 | 2024-11-06T16:28:56.000Z | 2025-02-20T20:05:57.000Z | |
| drupal-contrib-2024-056 | 2024-10-30T17:11:24.000Z | 2025-02-20T20:05:41.000Z | |
| drupal-contrib-2024-055 | 2024-10-30T17:07:09.000Z | 2025-02-20T20:05:30.000Z | |
| drupal-contrib-2024-052 | 2024-10-23T15:45:47.000Z | 2025-02-20T20:05:19.000Z | |
| drupal-contrib-2024-042 | 2024-10-02T16:15:59.000Z | 2025-02-20T19:27:15.000Z | |
| drupal-contrib-2024-043 | 2024-10-02T16:20:48.000Z | 2025-02-20T19:27:03.000Z | |
| drupal-contrib-2024-044 | 2024-10-02T16:27:12.000Z | 2025-02-20T19:26:51.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2017-ale-005 | Vulnérabilité dans les commutateurs Cisco | 2017-03-20T00:00:00.000000 | 2017-05-10T00:00:00.000000 |
| certfr-2017-ale-004 | Vulnérabilité dans Apache Struts | 2017-03-10T00:00:00.000000 | 2017-05-10T00:00:00.000000 |
| certfr-2017-ale-007 | Vulnérabilité dans Microsoft Office | 2017-04-10T00:00:00.000000 | 2017-04-12T00:00:00.000000 |
| certfr-2017-ale-006 | Multiples vulnérabilités dans SCADA Siemens RUGGEDCOM ROX I | 2017-03-29T00:00:00.000000 | 2017-03-29T00:00:00.000000 |
| certfr-2017-ale-003 | Vulnérabilité dans les navigateurs Microsoft | 2017-02-27T00:00:00.000000 | 2017-03-15T00:00:00.000000 |
| certfr-2017-ale-002 | Vulnérabilité dans Microsoft Windows | 2017-02-20T00:00:00.000000 | 2017-03-15T00:00:00.000000 |
| certfr-2017-ale-001 | Vulnérabilité dans Cisco WebEx | 2017-01-25T00:00:00.000000 | 2017-01-31T00:00:00.000000 |
| certfr-2016-ale-009 | Campagne d'attaque contre des routeurs DSL | 2016-12-01T00:00:00.000000 | 2017-01-26T00:00:00.000000 |
| certfr-2016-ale-010 | Vulnérabilité dans les routeurs Netgear | 2016-12-13T00:00:00.000000 | 2016-12-26T00:00:00.000000 |
| certfr-2016-ale-006 | Campagne de messages électroniques non sollicités de type Zepto/Odin | 2016-09-05T00:00:00.000000 | 2016-11-17T00:00:00.000000 |
| certfr-2016-ale-008 | Vulnérabilité dans Microsoft Windows | 2016-11-02T00:00:00.000000 | 2016-11-09T00:00:00.000000 |
| certfr-2016-ale-007 | Vulnérabilité dans Cisco IOS, IOS XE et IOS XR | 2016-09-19T00:00:00.000000 | 2016-09-19T00:00:00.000000 |
| certfr-2016-ale-005 | Multiples vulnérabilités dans les pare-feux Cisco | 2016-08-18T00:00:00.000000 | 2016-09-05T00:00:00.000000 |
| certfr-2015-ale-013 | Vulnérabilité dans Joomla! | 2015-12-14T00:00:00.000000 | 2016-08-01T00:00:00.000000 |
| certfr-2016-ale-004 | Vulnérabilité dans Adobe Flash Player | 2016-06-15T00:00:00.000000 | 2016-06-16T00:00:00.000000 |
| certfr-2016-ale-003 | Vulnérabilité dans Adobe Flash Player | 2016-05-11T00:00:00.000000 | 2016-05-12T00:00:00.000000 |
| certfr-2015-ale-014 | Vulnérabilité dans Juniper ScreenOS | 2015-12-18T00:00:00.000000 | 2016-04-11T00:00:00.000000 |
| certfr-2016-ale-002 | Vulnérabilité dans Adobe Flash Player | 2016-04-06T00:00:00.000000 | 2016-04-08T00:00:00.000000 |
| certfr-2016-ale-001 | Campagne de messages électroniques non sollicités de type Locky | 2016-02-19T00:00:00.000000 | 2016-04-07T00:00:00.000000 |
| certfr-2015-ale-015 | Campagne de messages électroniques non sollicités de type TeslaCrypt | 2015-12-21T00:00:00.000000 | 2016-03-10T00:00:00.000000 |
| certfr-2015-ale-009 | Vulnérabilité dans Apple Mac OS X | 2015-07-24T00:00:00.000000 | 2015-12-22T00:00:00.000000 |
| certfr-2015-ale-012 | Campagne de messages électroniques non sollicités de type Dridex | 2015-10-23T00:00:00.000000 | 2015-11-26T00:00:00.000000 |
| certfr-2015-ale-011 | Vulnérabilité dans Adobe Flash Player | 2015-10-14T00:00:00.000000 | 2015-10-19T00:00:00.000000 |
| certfr-2015-ale-010 | Multiples vulnérabilités dans Google Android | 2015-07-28T00:00:00.000000 | 2015-10-06T00:00:00.000000 |
| certfr-2015-ale-008 | Vulnérabilité dans le pilote de gestion des polices de caractères de Microsoft Windows | 2015-07-20T00:00:00.000000 | 2015-07-30T00:00:00.000000 |
| certfr-2015-ale-007 | Vulnérabilité dans Oracle Java SE | 2015-07-13T00:00:00.000000 | 2015-07-20T00:00:00.000000 |
| certfr-2015-ale-006 | Vulnérabilité dans Adobe Flash Player | 2015-07-11T00:00:00.000000 | 2015-07-20T00:00:00.000000 |
| certfr-2015-ale-005 | Vulnérabilité dans Adobe Flash Player | 2015-07-08T00:00:00.000000 | 2015-07-10T00:00:00.000000 |
| certfr-2015-ale-003 | Nouvelle campagne d'hameçonnage de type rançongiciel | 2015-02-05T00:00:00.000000 | 2015-07-10T00:00:00.000000 |
| certfr-2015-ale-004 | Vulnérabilité dans Microsoft Internet Explorer | 2015-02-10T00:00:00.000000 | 2015-03-31T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0309 | Multiples vulnérabilités dans Suricata | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0308 | Multiples vulnérabilités dans Node.js | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0307 | Vulnérabilité dans les produits Microsoft | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0306 | Multiples vulnérabilités dans Redmine | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0305 | Multiples vulnérabilités dans Spring AI | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0304 | Multiples vulnérabilités dans Xen | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0303 | Vulnérabilité dans Microsoft Edge | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0302 | Multiples vulnérabilités dans Python | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0301 | Multiples vulnérabilités dans les produits Kaspersky | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0176 | Vulnérabilité dans Mattermost Server | 2026-02-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0173 | Multiples vulnérabilités dans les produits Mattermost | 2026-02-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0052 | Multiples vulnérabilités dans Mattermost Server | 2026-01-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0299 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0298 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0297 | Vulnérabilité dans Google Chrome | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0296 | Vulnérabilité dans OpenSSL | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0295 | Vulnérabilité dans les produits Microsoft | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0294 | Vulnérabilité dans Microsoft Office | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0293 | Vulnérabilité dans Microsoft Edge | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0292 | Multiples vulnérabilités dans les produits IBM | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0291 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0290 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0289 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0288 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0287 | Multiples vulnérabilités dans les produits NetApp | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0286 | Multiples vulnérabilités dans Google Chrome | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0285 | Vulnérabilité dans Python | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0284 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0283 | Vulnérabilité dans Microsoft Edge | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0282 | Multiples vulnérabilités dans Veeam Backup & Replication | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000082 | The installers of DENSO TEN drive recorder viewer may insecurely load Dynamic Link Libraries | 2025-10-06T15:38+09:00 | 2025-10-06T15:38+09:00 |
| jvndb-2025-015061 | Trend Micro Antivirus for Mac vulnerable to Local Privilege Escalation | 2025-10-06T13:52+09:00 | 2025-10-06T13:52+09:00 |
| jvndb-2025-000044 | Denial-of-service (DoS) vulnerabilities in multiple Apache products | 2025-06-26T14:41+09:00 | 2025-10-01T14:18+09:00 |
| jvndb-2025-014642 | Multiple vulnerabilities in Canon Printer Drivers for Production Printers, Office/Small Office Multifunction Printers and Laser Printers | 2025-09-30T11:50+09:00 | 2025-09-30T11:50+09:00 |
| jvndb-2025-000066 | Improper file access permission settings in multiple i-FILTER products | 2025-08-27T19:50+09:00 | 2025-09-29T13:45+09:00 |
| jvndb-2025-000077 | RICOH Streamline NX vulnerable to tampering with operation history | 2025-09-08T13:42+09:00 | 2025-09-24T16:53+09:00 |
| jvndb-2025-007519 | Multiple vulnerabilities in multiple BROTHER products | 2025-06-26T18:15+09:00 | 2025-09-22T10:16+09:00 |
| jvndb-2025-014105 | OMRON SOCIAL SOLUTIONS Uninterruptible Power Supply (UPS) management application registers a Windows service with an unquoted file path | 2025-09-19T16:21+09:00 | 2025-09-19T16:21+09:00 |
| jvndb-2025-014104 | Multiple vulnerabilities in I-O DATA wireless LAN routers | 2025-09-19T14:58+09:00 | 2025-09-19T14:58+09:00 |
| jvndb-2025-014081 | Multiple Brother and its OEM products with weak initial administrator passwords | 2025-09-19T10:52+09:00 | 2025-09-19T10:52+09:00 |
| jvndb-2025-000079 | UNIVERGE IX/IX-R/IX-V series routers provided by NEC Corporation vulnerable to cross-site scripting | 2025-09-18T17:43+09:00 | 2025-09-18T17:43+09:00 |
| jvndb-2025-000078 | Century HW RAID Manager registers a Windows service with an unquoted file path | 2025-09-17T13:45+09:00 | 2025-09-17T13:45+09:00 |
| jvndb-2025-000048 | WTW-EAGLE App vulnerable to improper server certificate validation | 2025-09-12T13:57+09:00 | 2025-09-12T13:57+09:00 |
| jvndb-2025-000070 | "Gunosy" App vulnerable to insertion of sensitive information into sent data | 2025-09-02T14:20+09:00 | 2025-09-09T09:51+09:00 |
| jvndb-2025-000072 | Obsidian GitHub Copilot Plugin stores sensitive information in cleartext | 2025-09-05T16:52+09:00 | 2025-09-05T16:52+09:00 |
| jvndb-2025-000073 | RATOC RAID Monitoring Manager for Windows registers a Windows service with an unquoted file path | 2025-09-05T16:20+09:00 | 2025-09-05T16:20+09:00 |
| jvndb-2025-000071 | "Yahoo! Shopping" App for Android fails to restrict custom URL schemes properly | 2025-09-05T15:12+09:00 | 2025-09-05T15:12+09:00 |
| jvndb-2025-000075 | Multiple vulnerabilities in TkEasyGUI | 2025-09-05T14:53+09:00 | 2025-09-05T14:53+09:00 |
| jvndb-2025-000069 | Web Caster V130 vulnerable to cross-site request forgery | 2025-09-03T14:23+09:00 | 2025-09-03T14:23+09:00 |
| jvndb-2025-000068 | Seiko Solutions SkyBridge BASIC MB-A130 vulnerable to OS command injection | 2025-09-01T16:21+09:00 | 2025-09-01T16:21+09:00 |
| jvndb-2025-012659 | Denial-of-service (DoS) vulnerability in Konica Minolta bizhub series | 2025-09-01T15:22+09:00 | 2025-09-01T15:22+09:00 |
| jvndb-2025-000067 | Multiple vulnerabilities in multiple iND products | 2025-08-29T14:47+09:00 | 2025-08-29T14:47+09:00 |
| jvndb-2025-000064 | Multiple vulnerabilities in SS1 | 2025-08-27T15:13+09:00 | 2025-08-27T15:13+09:00 |
| jvndb-2025-000065 | ScanSnap Manager installers vulnerable to privilege escalation | 2025-08-27T14:22+09:00 | 2025-08-27T14:22+09:00 |
| jvndb-2025-011884 | FUJIFILM Healthcare Americas Synapse Mobility vulnerable to Privilege Escalation | 2025-08-21T11:49+09:00 | 2025-08-25T10:38+09:00 |
| jvndb-2025-000063 | Western Digital Kitfox registers a Windows service with an unquoted file path | 2025-08-22T13:37+09:00 | 2025-08-22T13:37+09:00 |
| jvndb-2025-000062 | Multiple vulnerabilities in Group-Office | 2025-08-21T14:03+09:00 | 2025-08-21T14:03+09:00 |
| jvndb-2025-000061 | Multiple vulnerabilities in Movable Type | 2025-08-20T15:30+09:00 | 2025-08-20T15:30+09:00 |
| jvndb-2025-000059 | Seagate Toolkit registers a Windows service with an unquoted file path | 2025-08-14T12:32+09:00 | 2025-08-19T14:40+09:00 |
| jvndb-2025-010854 | Trend Micro Endpoint security products for enterprises vulnerable to multiple OS command injection | 2025-08-07T12:25+09:00 | 2025-08-19T11:36+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-16152 | Microsoft Excel代码执行漏洞(CNVD-2026-16152) | 2026-03-17 | 2026-04-07 |
| cnvd-2026-16151 | Google Chrome内存错误引用漏洞(CNVD-2026-16151) | 2026-03-23 | 2026-04-07 |
| cnvd-2026-16150 | Google Chrome信息泄露漏洞(CNVD-2026-16150) | 2026-03-25 | 2026-04-07 |
| cnvd-2026-16149 | Google Chrome安全绕过漏洞(CNVD-2026-16149) | 2026-03-25 | 2026-04-07 |
| cnvd-2026-16148 | Google Chrome安全绕过漏洞(CNVD-2026-16148) | 2026-03-25 | 2026-04-07 |
| cnvd-2026-16147 | D-Link DIR-513堆栈缓冲区溢出漏洞(CNVD-2026-16147) | 2026-03-09 | 2026-04-07 |
| cnvd-2026-16146 | D-Link DIR-513堆栈缓冲区溢出漏洞(CNVD-2026-16146) | 2026-03-09 | 2026-04-07 |
| cnvd-2026-16145 | TRENDnet TEW-800MB命令注入漏洞 | 2026-01-12 | 2026-04-07 |
| cnvd-2026-16144 | Delta Electronics DVP-12SE11T越界写入漏洞 | 2026-01-14 | 2026-04-07 |
| cnvd-2026-16143 | Delta Electronics DVP15MC11T拒绝服务漏洞 | 2026-01-14 | 2026-04-07 |
| cnvd-2026-16142 | Delta Electronics DIAView命令注入漏洞 | 2026-02-02 | 2026-04-07 |
| cnvd-2026-16141 | Delta Electronics DIAView存在未明漏洞 | 2026-02-05 | 2026-04-07 |
| cnvd-2026-16140 | Delta Electronics DIAView身份验证绕过漏洞 | 2026-02-05 | 2026-04-07 |
| cnvd-2026-16139 | Delta Electronics ASDA-Soft堆栈缓冲区溢出漏洞 | 2026-02-05 | 2026-04-07 |
| cnvd-2026-16138 | Delta Electronics CNCSoft-G2代码执行漏洞 | 2026-03-09 | 2026-04-07 |
| cnvd-2026-16137 | IBM InfoSphere Information Server代码问题漏洞(CNVD-2026-16137) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16136 | IBM Concert代码问题漏洞(CNVD-2026-16136) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16135 | IBM Concert加密问题漏洞(CNVD-2026-16135) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16134 | IBM Concert加密问题漏洞(CNVD-2026-16134) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16133 | IBM InfoSphere Information Server加密问题漏洞 | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16132 | IBM InfoSphere Information Server信息泄露漏洞(CNVD-2026-16132) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16131 | IBM InfoSphere Information Server信息泄露漏洞(CNVD-2026-16131) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16130 | IBM InfoSphere Information Server信息泄露漏洞(CNVD-2026-16130) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16129 | IBM InfoSphere Information Server信息泄露漏洞(CNVD-2026-16129) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16128 | IBM Concert访问控制错误漏洞(CNVD-2026-16128) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16069 | WordPress插件WP Gmail SMTP信息泄露漏洞 | 2025-10-24 | 2026-04-03 |
| cnvd-2026-16068 | WordPress插件TNC Toolbox Web Performance存在未明漏洞 | 2025-11-14 | 2026-04-03 |
| cnvd-2026-16067 | WordPress插件ELEX WordPress HelpDesk & Customer Ticketing System存在未明漏洞 | 2026-02-11 | 2026-04-03 |
| cnvd-2026-16066 | WordPress插件King Addons for Elementor信息泄露漏洞 | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16065 | WordPress插件Download Manager信息泄露漏洞 | 2026-03-26 | 2026-04-03 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15695 | Уязвимость компонента drivers/gpu/drm/hisilicon/hibmc/hibmc_drm_drv.c ядра операционной с… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15694 | Уязвимость функции br_multicast_query_expired() компонента net/bridge/br_multicast.c ядра… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15693 | Уязвимость функции destroy_args() компонента mm/debug_vm_pgtable.c ядра операционной сист… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15692 | Уязвимость компонента ufs-exynos.c ядра операционной системы Linux, позволяющая нарушител… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15690 | Уязвимость компонента drivers/bus ядра операционной системы Linux, позволяющая нарушителю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15688 | Уязвимость компонента fs/nfs ядра операционной системы Linux, позволяющая нарушителю полу… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15687 | Уязвимость компонента dwc3 ядра операционной системы Linux, позволяющая нарушителю вызват… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15686 | Уязвимость функции mt_report_fixup() ядра операционной системы Linux, позволяющая нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15683 | Уязвимость функции trace_printk_seq() ядра операционной системы Linux, связанная с неконт… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15682 | Уязвимость компонента efivarfs ядра операционной системы Linux, позволяющая нарушителю вы… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15680 | Уязвимость компонента fs/smb ядра операционной системы Linux, позволяющая нарушителю вызв… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15679 | Уязвимость компонента inode.c ядра операционной системы Linux, позволяющая нарушителю пол… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15678 | Уязвимость компонентов rose ядра операционной системы Linux, позволяющая нарушителю получ… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15677 | Уязвимость компонента rose_route.c ядра операционной системы Linux, позволяющая нарушител… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15676 | Уязвимость компонента xfs ядра операционной системы Linux, позволяющая нарушителю вызвать… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15674 | Уязвимость модуля wifi ядра операционной системы Linux, позволяющая нарушителю получить д… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15669 | Уязвимость компонента slub.c ядра операционной системы Linux, позволяющая нарушителю вызв… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15667 | Уязвимость функции do_validate_mem() компонента rsrc_nonstatic.c ядра операционной систем… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15665 | Уязвимость компонента arch/x86 ядра операционной системы Linux, позволяющая нарушителю по… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15660 | Уязвимость компонента fs/hfsplus/unicode.c ядра операционной системы Linux, позволяющая н… | 14.12.2025 | 16.02.2026 |
| bdu:2025-15659 | Уязвимость компонента fs/hfsplus/bnode.c ядра операционной системы Linux, позволяющая нар… | 14.12.2025 | 16.02.2026 |
| bdu:2025-15658 | Уязвимость компонента netfilter ядра операционной системы Linux, позволяющая нарушителю в… | 14.12.2025 | 16.02.2026 |
| bdu:2025-15559 | Уязвимость функции sqlite3KeyInfoFromExprList системы управления базами данных SQLite, по… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15558 | Уязвимость реализации протокола IEEE 802.11 ядра операционной системы Linux, позволяющая … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15556 | Уязвимость компонента jfs_imap.c ядра операционной системы Linux, позволяющая нарушителю … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15555 | Уязвимость компонента ksmbd ядра операционной системы Linux, позволяющая нарушителю вызва… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15554 | Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | 11.12.2025 | 16.02.2026 |
| bdu:2025-15553 | Уязвимость компонента net/sched ядра операционной системы Linux, позволяющая нарушителю в… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15552 | Уязвимость компонента eventpoll ядра операционной системы Linux, позволяющая нарушителю в… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15551 | Уязвимость функции nf_tables_updchain компонента net/netfilter/nf_tables_api.c ядра опера… | 11.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200901-0706 | WebKit in Apple Safari before 4.0 does not prevent remote loading of local Java applets, … | 2026-04-10T23:20:43.178000Z |
| var-201912-0457 | A validation issue was addressed with improved logic. This issue is fixed in iOS 12.2, tv… | 2026-04-10T23:20:16.405000Z |
| var-201310-0353 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, a… | 2026-04-10T23:20:15.924000Z |
| var-200809-0184 | Race condition in Login Window in Apple Mac OS X 10.5 through 10.5.4, when a blank-passwo… | 2026-04-10T23:20:15.546000Z |
| var-201110-0332 | Integer signedness error in Apple QuickTime before 7.7.1 allows remote attackers to execu… | 2026-04-10T23:19:14.296000Z |
| var-202202-0163 | In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_m… | 2026-04-10T23:19:11.648000Z |
| var-201302-0302 | Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on … | 2026-04-10T23:19:11.196000Z |
| var-201806-1487 | An issue was discovered in certain Apple products. iOS before 11.3.1 is affected. Safari … | 2026-04-10T23:19:04.648000Z |
| var-201806-1468 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2026-04-10T23:19:04.159000Z |
| var-202002-1191 | An out-of-bounds read was addressed with improved input validation. This issue is fixed i… | 2026-04-10T23:18:30.999000Z |
| var-202212-2277 | An integer underflow in Organization Specific TLV was found in various versions of OpenvS… | 2026-04-10T23:18:30.931000Z |
| var-200504-0293 | Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allo… | 2026-04-10T23:18:06.549000Z |
| var-202108-2072 | A race condition was addressed with improved locking. This issue is fixed in Security Upd… | 2026-04-10T23:18:05.484000Z |
| var-202005-1054 | dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by d… | 2026-04-10T23:18:04.974000Z |
| var-201804-1226 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2026-04-10T23:18:04.248000Z |
| var-201108-0210 | Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before … | 2026-04-10T23:18:03.075000Z |
| var-201903-0442 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-04-10T23:18:02.839000Z |
| var-201211-0368 | Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS … | 2026-04-10T23:18:01.678000Z |
| var-202004-1975 | An input validation issue was addressed with improved input validation. This issue is fix… | 2026-04-10T23:18:01.002000Z |
| var-202112-2540 | vim is vulnerable to Use After Free. vim Exists in a vulnerability related to the use of … | 2026-04-10T23:18:00.385000Z |
| var-201006-1142 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 throug… | 2026-04-10T23:17:59.611000Z |
| var-201806-1486 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2026-04-10T23:17:29.301000Z |
| var-201110-0321 | FreeType 2 before 2.4.7, as used in CoreGraphics in Apple iOS before 5, Mandriva Enterpri… | 2026-04-10T23:17:27.422000Z |
| var-201212-0238 | Integer overflow in Adobe Flash Player before 10.3.183.48 and 11.x before 11.5.502.135 on… | 2026-04-10T23:17:27.170000Z |
| var-201506-0498 | The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 bef… | 2026-04-10T23:17:27.032000Z |
| var-201902-0242 | In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishand… | 2026-04-10T23:17:00.959000Z |
| var-200905-0196 | racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denia… | 2026-04-10T23:16:56.486000Z |
| var-200905-0043 | Integer underflow in QuickDraw Manager in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7, … | 2026-04-10T23:16:49.561000Z |
| var-200712-0605 | Use-after-free vulnerability in the gss_indicate_mechs function in lib/gssapi/mechglue/g_… | 2026-04-10T23:16:48.658000Z |
| var-200912-0751 | Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allo… | 2026-04-10T23:16:47.736000Z |