Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40901 |
7.5 (4.0)
|
DataEase: Quartz Deserialization → Remote Code Execution |
dataease |
dataease |
2026-04-16T20:57:45.978Z | 2026-04-17T18:47:00.448Z |
| CVE-2026-40900 |
8.7 (4.0)
|
DataEase has SQL Injection via Stacked Queries |
dataease |
dataease |
2026-04-16T20:53:27.788Z | 2026-04-17T12:38:32.676Z |
| CVE-2026-40899 |
8.3 (4.0)
|
DataEase has an Arbitrary File Read Vulnerability |
dataease |
dataease |
2026-04-16T19:48:44.201Z | 2026-04-18T02:43:14.720Z |
| CVE-2026-33207 |
8.6 (4.0)
|
DataEase SQL Injection Vulnerability |
dataease |
dataease |
2026-04-16T19:37:36.197Z | 2026-04-20T15:00:41.415Z |
| CVE-2026-33122 |
8.6 (4.0)
|
DataEase has SQL Injection via Datasource Management |
dataease |
dataease |
2026-04-16T19:24:03.195Z | 2026-04-17T18:47:44.791Z |
| CVE-2025-54502 |
7.1 (4.0)
|
Incorrect use of boot service in the AMD Platform… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-04-16T18:46:13.377Z | 2026-04-17T03:55:16.268Z |
| CVE-2025-54510 |
5.9 (4.0)
|
A missing lock verification in AMD Secure Process… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-04-16T18:44:10.182Z | 2026-04-16T19:10:19.002Z |
| CVE-2026-6442 |
8.3 (3.1)
|
Improper Command Detection Logic Allows RCE in Cortex … |
Snowflake |
Cortex Code CLI |
2026-04-16T18:43:21.181Z | 2026-04-16T18:54:58.366Z |
| CVE-2023-20585 |
5.6 (4.0)
|
Insufficient checks of the RMP on host buffer acc… |
AMD |
AMD EPYC™ 7003 Series Processors |
2026-04-16T18:42:28.281Z | 2026-04-16T19:12:06.991Z |
| CVE-2026-33121 |
8.7 (4.0)
|
DataEase has SQL Injection via Datasource Save Flow |
dataease |
dataease |
2026-04-16T18:16:02.485Z | 2026-04-16T18:34:54.187Z |
| CVE-2026-33084 |
8.7 (4.0)
|
DataEase has SQL Injection through its getFieldEnumObj… |
dataease |
dataease |
2026-04-16T18:14:07.316Z | 2026-04-18T02:40:47.771Z |
| CVE-2025-43937 |
6.6 (3.1)
|
Dell PowerScale OneFS, versions prior to 9.12.0.0… |
Dell |
PowerScale OneFS |
2026-04-16T18:03:08.750Z | 2026-04-16T18:51:41.562Z |
| CVE-2025-43935 |
4.4 (3.1)
|
Dell PowerScale OneFS, versions prior to 9.12.0.0… |
Dell |
PowerScale OneFS |
2026-04-16T17:59:04.315Z | 2026-04-16T19:38:28.840Z |
| CVE-2025-43883 |
4.1 (3.1)
|
Dell PowerScale OneFS, versions prior to 9.12.0.0… |
Dell |
PowerScale OneFS |
2026-04-16T17:54:09.831Z | 2026-04-18T02:39:20.246Z |
| CVE-2026-33083 |
8.7 (4.0)
|
DataEase has SQL Injection in Order By Clause |
dataease |
dataease |
2026-04-16T17:52:37.255Z | 2026-04-16T19:39:25.443Z |
| CVE-2026-33082 |
8.7 (4.0)
|
DataEase: SQL Injection in v2 Dataset Export |
dataease |
dataease |
2026-04-16T17:39:37.894Z | 2026-04-16T18:41:46.111Z |
| CVE-2026-41082 |
7.3 (3.1)
|
In OCaml opam before 2.5.1, a .install field cont… |
OCaml |
opam |
2026-04-16T17:32:40.068Z | 2026-04-21T09:32:52.152Z |
| CVE-2026-27820 |
1.7 (4.0)
|
zlib: Buffer Overflow in Zlib::GzipReader ungetc via l… |
ruby |
zlib |
2026-04-16T17:27:48.944Z | 2026-04-16T18:20:21.451Z |
| CVE-2026-24749 |
5.3 (3.1)
|
Silverstripe Assets Module has a DBFile::getURL() perm… |
silverstripe |
silverstripe-assets |
2026-04-16T17:08:59.133Z | 2026-04-18T02:36:26.887Z |
| CVE-2026-2336 |
8.7 (4.0)
|
Weak webstax_auth Cookie Authentication Allows Privile… |
Microchip |
IStaX |
2026-04-16T17:02:06.352Z | 2026-04-16T17:34:39.672Z |
| CVE-2026-41080 |
2.9 (3.1)
|
libexpat before 2.8.0 uses insufficient entropy, … |
libexpat project |
libexpat |
2026-04-16T16:52:01.177Z | 2026-04-27T05:59:38.490Z |
| CVE-2025-36579 |
5.1 (3.1)
|
Dell Client Platform BIOS contains a Weak Passwor… |
Dell |
Dell Pro 14 Essential PV14250 |
2026-04-16T16:05:32.561Z | 2026-04-16T18:32:52.672Z |
| CVE-2026-5426 |
7.5 (3.1)
|
KnowledgeDeliver deployments before February 24, 2026 … |
Digital Knowledge |
KnowledgeDeliver |
2026-04-16T15:18:46.224Z | 2026-04-18T02:31:32.234Z |
| CVE-2026-3324 |
8.2 (3.1)
|
Authentication Bypass |
Zohocorp |
ManageEngine Log360 |
2026-04-16T14:30:55.130Z | 2026-04-16T15:21:19.911Z |
| CVE-2026-6409 |
7.1 (4.0)
|
Denial of Service (DoS) vulnerability exists in the Pr… |
Protocol Buffers |
Protobuf-php (Pecl) |
2026-04-16T14:30:51.568Z | 2026-04-16T15:24:43.164Z |
| CVE-2026-2840 |
6.4 (3.1)
|
Email Encoder – Protect Email Addresses and Phone Numb… |
onlineoptimisation |
Email Encoder – Protect Email Addresses and Phone Numbers |
2026-04-16T14:10:29.114Z | 2026-04-16T14:42:53.905Z |
| CVE-2026-33804 |
7.4 (3.1)
|
@fastify/middie vulnerable to middleware bypass via de… |
@fastify/middie |
@fastify/middie |
2026-04-16T13:56:56.176Z | 2026-04-16T14:41:48.659Z |
| CVE-2026-5785 |
8.1 (3.1)
|
SQL Injection |
Zohocorp |
ManageEngine PAM360 |
2026-04-16T13:46:28.313Z | 2026-04-17T03:55:15.059Z |
| CVE-2026-6270 |
9.1 (3.1)
|
@fastify/middie vulnerable to middleware authenticatio… |
@fastify/middie |
@fastify/middie |
2026-04-16T13:44:46.322Z | 2026-04-16T14:24:26.764Z |
| CVE-2026-31987 |
N/A
|
Apache Airflow: JWT token appearing in logs |
Apache Software Foundation |
Apache Airflow |
2026-04-16T13:31:52.336Z | 2026-04-18T02:28:44.770Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-3488 |
6.5 (3.1)
|
WP Statistics <= 14.16.4 - Missing Authorization to Au… |
veronalabs |
WP Statistics – Simple, privacy-friendly Google Analytics alternative |
2026-04-17T01:24:37.967Z | 2026-04-17T12:25:12.232Z |
| CVE-2026-40922 |
5.3 (4.0)
|
SiYuan: Incomplete sanitization of bazaar README allow… |
siyuan-note |
siyuan |
2026-04-16T23:14:00.592Z | 2026-04-20T14:59:52.008Z |
| CVE-2026-40265 |
5.9 (3.1)
|
Note Mark has Broken Access Control on Asset Download |
enchant97 |
note-mark |
2026-04-16T23:56:02.961Z | 2026-04-17T18:40:45.157Z |
| CVE-2026-40263 |
3.7 (3.1)
|
Note Mark: Username Enumeration via Login Endpoint Tim… |
enchant97 |
note-mark |
2026-04-16T23:53:50.195Z | 2026-04-17T12:23:42.042Z |
| CVE-2026-40262 |
8.7 (3.1)
|
Note Mark has Stored XSS via Unrestricted Asset Upload |
enchant97 |
note-mark |
2026-04-16T23:51:38.679Z | 2026-04-18T02:51:02.474Z |
| CVE-2026-40260 |
6.9 (4.0)
|
pypdf: Manipulated XMP metadata entity declarations ca… |
py-pdf |
pypdf |
2026-04-16T23:18:26.687Z | 2026-04-17T18:42:05.059Z |
| CVE-2026-22734 |
8.6 (3.1)
|
Cloud Foundry UAA SAML 2.0 Signature Bypass |
Cloud Foundry |
UUA |
2026-04-16T23:33:43.596Z | 2026-04-17T13:21:04.331Z |
| CVE-2026-40322 |
9.1 (3.1)
|
SiYuan: Mermaid `javascript:` Link Injection Leads to … |
siyuan-note |
siyuan |
2026-04-16T23:00:07.719Z | 2026-04-17T12:26:06.118Z |
| CVE-2026-40318 |
8.5 (3.1)
|
SiYuan: Publish Reader Path Traversal Delete via `remo… |
siyuan-note |
siyuan |
2026-04-16T22:54:47.881Z | 2026-04-18T02:48:57.193Z |
| CVE-2026-40259 |
8.1 (3.1)
|
SiYuan: Publish Reader Can Arbitrarily Delete Attribut… |
siyuan-note |
siyuan |
2026-04-16T22:49:36.992Z | 2026-04-20T14:59:59.417Z |
| CVE-2026-40255 |
6.1 (3.1)
|
@adonisjs/http-server has an Open Redirect vulnerability |
adonisjs |
http-server |
2026-04-16T22:25:38.155Z | 2026-04-17T18:43:10.697Z |
| CVE-2026-40253 |
6.8 (3.1)
|
openCryptoki: Memory safety vulnerabilities in BER/DER… |
opencryptoki |
opencryptoki |
2026-04-16T22:04:44.005Z | 2026-04-17T12:27:41.682Z |
| CVE-2024-58343 |
4.3 (3.1)
|
Vision Helpdesk before 5.7.0 (patched in 5.6.10) … |
Vision |
Helpdesk |
2026-04-16T22:27:03.084Z | 2026-04-17T13:31:05.652Z |
| CVE-2026-41113 |
8.1 (3.1)
|
sagredo qmail before 2026.04.07 allows tls_quit r… |
sagredo |
qmail |
2026-04-16T22:02:10.225Z | 2026-04-18T20:09:47.901Z |
| CVE-2026-40308 |
8.8 (4.0)
|
My Calendar: Unauthenticated Information Disclosure (I… |
joedolson |
my-calendar |
2026-04-16T21:30:52.401Z | 2026-04-17T12:32:26.622Z |
| CVE-2026-40249 |
6.9 (4.0)
|
free5gc UDR fail-open request handling in PolicyDataSu… |
free5gc |
free5gc |
2026-04-16T21:59:36.282Z | 2026-04-18T02:47:28.094Z |
| CVE-2026-40248 |
8.7 (4.0)
|
free5gc UDR improper path validation allows unauthenti… |
free5gc |
free5gc |
2026-04-16T21:57:13.101Z | 2026-04-20T15:00:17.552Z |
| CVE-2026-40247 |
8.7 (4.0)
|
free5gc UDR improper path validation allows unauthenti… |
free5gc |
free5gc |
2026-04-16T21:54:04.151Z | 2026-04-17T18:44:09.831Z |
| CVE-2026-40246 |
8.7 (4.0)
|
free5gc UDR improper path validation allows unauthenti… |
free5gc |
free5gc |
2026-04-16T21:40:03.598Z | 2026-04-18T02:46:14.355Z |
| CVE-2026-40170 |
7.5 (3.1)
|
ngtcp2 has a qlog transport parameter serialization st… |
ngtcp2 |
ngtcp2 |
2026-04-16T21:34:07.610Z | 2026-04-20T15:00:26.193Z |
| CVE-2026-39313 |
8.7 (4.0)
|
MCP-Framework: Unbounded memory allocation in readRequ… |
QuantGeekDev |
mcp-framework |
2026-04-16T21:24:27.328Z | 2026-04-17T18:46:07.726Z |
| CVE-2026-35469 |
8.7 (4.0)
|
SpdyStream: DOS on CRI |
moby |
spdystream |
2026-04-16T21:19:23.516Z | 2026-04-17T12:37:27.329Z |
| CVE-2026-34164 |
4.9 (3.1)
|
Valtimo: Sensitive data exposure through inbox message… |
valtimo-platform |
valtimo |
2026-04-16T21:17:35.472Z | 2026-04-18T02:44:44.369Z |
| CVE-2026-33472 |
4.8 (3.1)
|
Cryptomator Hub OAuth token exchange HTTP downgrade vi… |
cryptomator |
cryptomator |
2026-04-16T21:12:37.076Z | 2026-04-20T15:00:33.905Z |
| CVE-2026-40901 |
7.5 (4.0)
|
DataEase: Quartz Deserialization → Remote Code Execution |
dataease |
dataease |
2026-04-16T20:57:45.978Z | 2026-04-17T18:47:00.448Z |
| CVE-2026-40900 |
8.7 (4.0)
|
DataEase has SQL Injection via Stacked Queries |
dataease |
dataease |
2026-04-16T20:53:27.788Z | 2026-04-17T12:38:32.676Z |
| CVE-2026-40899 |
8.3 (4.0)
|
DataEase has an Arbitrary File Read Vulnerability |
dataease |
dataease |
2026-04-16T19:48:44.201Z | 2026-04-18T02:43:14.720Z |
| CVE-2026-33207 |
8.6 (4.0)
|
DataEase SQL Injection Vulnerability |
dataease |
dataease |
2026-04-16T19:37:36.197Z | 2026-04-20T15:00:41.415Z |
| CVE-2026-33122 |
8.6 (4.0)
|
DataEase has SQL Injection via Datasource Management |
dataease |
dataease |
2026-04-16T19:24:03.195Z | 2026-04-17T18:47:44.791Z |
| CVE-2025-54502 |
7.1 (4.0)
|
Incorrect use of boot service in the AMD Platform… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-04-16T18:46:13.377Z | 2026-04-17T03:55:16.268Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-gwjq-j584-rm32 |
5.3 (3.1)
6.9 (4.0)
|
CWE-307 Improper Restriction of Excessive Authentication Attempts vulnerability exists that would a… | 2026-04-14T18:30:35Z | 2026-04-22T15:31:32Z |
| ghsa-g2q7-p5pr-qxqg |
6.7 (3.1)
|
A improper neutralization of special elements used in an sql command ('sql injection') vulnerabilit… | 2026-04-14T18:30:35Z | 2026-04-14T18:30:36Z |
| ghsa-fpx9-9hq8-w2xc |
8.5 (3.1)
|
Webkul Krayin CRM has Server-Side Request Forgery (SSRF) | 2026-04-14T18:30:35Z | 2026-04-16T01:32:29Z |
| ghsa-c4rv-j252-rmpg |
4.3 (3.1)
5.3 (4.0)
|
CWE-93 Improper Neutralization of CRLF Sequences ('CRLF Injection') vulnerability exists that could… | 2026-04-14T18:30:35Z | 2026-04-22T15:31:32Z |
| ghsa-9mp2-p73v-6v44 |
8.1 (3.1)
|
A heap-based buffer overflow vulnerability in Fortinet FortiAnalyzer Cloud 7.6.2 through 7.6.4, For… | 2026-04-14T18:30:35Z | 2026-04-14T18:30:35Z |
| ghsa-9fmp-fvvg-6vr2 |
2.4 (3.1)
|
An URL Redirection to Untrusted Site ('Open Redirect') vulnerability [CWE-601] vulnerability in For… | 2026-04-14T18:30:35Z | 2026-04-14T18:30:35Z |
| ghsa-7cg5-32v2-8qp3 |
6.5 (3.1)
|
An improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in … | 2026-04-14T18:30:35Z | 2026-04-14T18:30:35Z |
| ghsa-6p3p-h3vc-6rh5 |
7.5 (3.1)
|
A improper authentication vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.3, FortiSOAR P… | 2026-04-14T18:30:35Z | 2026-04-14T18:30:35Z |
| ghsa-586j-jr5f-gx4j |
6.1 (3.1)
6.9 (4.0)
|
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability… | 2026-04-14T18:30:35Z | 2026-04-22T15:31:32Z |
| ghsa-4vfq-hhwv-xpcf |
5.0 (3.1)
2.4 (4.0)
|
CWE-532 Insertion of Sensitive Information into Log File vulnerability exists that could cause con… | 2026-04-14T18:30:35Z | 2026-04-22T15:31:32Z |
| ghsa-4mq8-r6pg-hwp6 |
4.1 (3.1)
|
A storing passwords in a recoverable format vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through … | 2026-04-14T18:30:35Z | 2026-04-14T18:30:35Z |
| ghsa-2xx8-j85v-j7wh |
8.1 (3.1)
|
Webkul Krayin CRM has Broken Object-Level Authorization (BOLA) in the /Contact/Persons/PersonContro… | 2026-04-14T18:30:35Z | 2026-04-16T01:32:19Z |
| ghsa-2j49-hp6r-vx83 |
6.5 (3.1)
5.3 (4.0)
|
CWE-400 Uncontrolled Resource Consumption vulnerability exists that could cause excessive troublesh… | 2026-04-14T18:30:35Z | 2026-04-22T15:31:32Z |
| ghsa-2gx2-4qjj-49ch |
4.3 (3.1)
|
A storing passwords in a recoverable format vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through … | 2026-04-14T18:30:35Z | 2026-04-14T18:30:35Z |
| ghsa-w5r2-jfhj-qppp |
6.0 (3.1)
|
An improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in … | 2026-04-14T18:30:34Z | 2026-04-14T18:30:34Z |
| ghsa-w4rq-w543-jw73 |
6.1 (3.1)
|
In manikandan580 School-management-system 1.0, a reflected XSS vulnerability exists in /studentms/a… | 2026-04-14T18:30:34Z | 2026-04-14T18:30:34Z |
| ghsa-v55w-rvx7-pq26 |
6.5 (3.1)
|
A missing authentication for critical function vulnerability in Fortinet FortiOS 7.6.0 through 7.6.… | 2026-04-14T18:30:34Z | 2026-04-14T18:30:34Z |
| ghsa-v2jv-4wf4-cwj4 |
9.8 (3.1)
|
A SQL injection vulnerability exists in the School Management System (version 1.0) by manikandan580… | 2026-04-14T18:30:34Z | 2026-04-16T15:31:31Z |
| ghsa-r66p-45rw-5xc2 |
4.3 (3.1)
|
A server-side request forgery (ssrf) vulnerability [CWE-918] vulnerability in Fortinet FortiSOAR Pa… | 2026-04-14T18:30:34Z | 2026-04-14T18:30:34Z |
| ghsa-pr8g-5jxw-8fhj |
5.4 (3.1)
|
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerabili… | 2026-04-14T18:30:34Z | 2026-04-14T18:30:34Z |
| ghsa-p356-3hpr-4rhh |
7.2 (3.1)
|
An improper neutralization of special elements used in an sql command ('sql injection') vulnerabili… | 2026-04-14T18:30:34Z | 2026-04-14T18:30:34Z |
| ghsa-mww8-x95w-rh7p |
|
In manikandan580 School-management-system 1.0, a reflected cross-site scripting (XSS) vulnerability… | 2026-04-14T18:30:34Z | 2026-04-14T18:30:34Z |
| ghsa-h7gf-v98f-2qm9 |
6.1 (3.1)
|
alandsilva26 hotel-management-php 1.0 is vulnerable to Cross Site Scripting (XSS) in /public/admin/… | 2026-04-14T18:30:34Z | 2026-04-14T18:30:34Z |
| ghsa-f3vf-64gv-cxr8 |
6.0 (3.1)
|
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') [CWE-22] vulnerab… | 2026-04-14T18:30:34Z | 2026-04-14T18:30:34Z |
| ghsa-9qp2-w8w6-fgc3 |
5.7 (3.1)
|
A cleartext transmission of sensitive information vulnerability in Fortinet FortiSOAR PaaS 7.6.0 th… | 2026-04-14T18:30:34Z | 2026-04-14T18:30:34Z |
| ghsa-7w2c-xvm6-78cm |
5.4 (3.1)
|
An exposure of sensitive information to an unauthorized actor vulnerability in Fortinet FortiNDR 7.… | 2026-04-14T18:30:34Z | 2026-04-14T18:30:34Z |
| ghsa-27pw-mrx7-45mq |
9.8 (3.1)
|
In manikandan580 School-management-system 1.0, a time-based blind SQL injection vulnerability exist… | 2026-04-14T18:30:34Z | 2026-04-14T18:30:34Z |
| ghsa-25qr-g262-c7jp |
9.8 (3.1)
|
Improper input handling in /Grocery/search_products_itname.php, in anirudhkannan Grocery Store Mana… | 2026-04-14T18:30:34Z | 2026-04-14T18:30:34Z |
| ghsa-r39r-m7wq-966m |
5.7 (3.1)
|
Improper protection of an alternate path in Ivanti N-ITSM before version 2025.4 allows a remote aut… | 2026-04-14T15:30:35Z | 2026-04-14T15:30:35Z |
| ghsa-mm54-xvph-7p9r |
7.1 (3.1)
|
A maliciously crafted HTML payload in an assembly variant name, when displayed during the delete co… | 2026-04-14T15:30:35Z | 2026-04-14T15:30:35Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2020-255 |
|
In affected versions of TensorFlow the tf.raw_ops.ImmutableConst operation returns a cons… | tensorflow | 2020-12-10T23:15:00Z | 2021-08-27T03:22:22.907995Z |
| pysec-2020-254 |
|
In affected versions of TensorFlow under certain cases a saved model can trigger use of u… | tensorflow | 2020-12-10T23:15:00Z | 2021-08-27T03:22:22.698179Z |
| pysec-2020-141 |
|
In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matchin… | tensorflow | 2020-12-10T23:15:00Z | 2020-12-14T17:42:00Z |
| pysec-2020-140 |
|
In affected versions of TensorFlow the tf.raw_ops.DataFormatVecPermute API does not valid… | tensorflow | 2020-12-10T23:15:00Z | 2020-12-14T19:08:00Z |
| pysec-2020-337 |
|
In affected versions of TensorFlow under certain cases, loading a saved model can result … | tensorflow-gpu | 2020-12-10T22:15:00Z | 2021-12-09T06:35:16.854014Z |
| pysec-2020-302 |
|
In affected versions of TensorFlow under certain cases, loading a saved model can result … | tensorflow-cpu | 2020-12-10T22:15:00Z | 2021-12-09T06:34:45.035634Z |
| pysec-2020-257 |
|
In affected versions of TensorFlow under certain cases, loading a saved model can result … | tensorflow | 2020-12-10T22:15:00Z | 2021-08-27T03:22:23.329750Z |
| pysec-2020-236 |
|
Matrix is an ecosystem for open federated Instant Messaging and VoIP. Synapse is a refere… | matrix-synapse | 2020-12-09T19:15:00Z | 2021-08-27T03:22:06.434071Z |
| pysec-2020-52 |
|
jupyterhub-systemdspawner enables JupyterHub to spawn single-user notebook servers using … | jupyterhub-systemdspawner | 2020-12-09T17:15:00Z | 2020-12-10T21:46:00Z |
| pysec-2020-92 |
|
A denial of service via regular expression in the py.path.svnwc component of py (aka pyth… | py | 2020-12-09T07:15:00Z | 2021-01-05T03:15:00Z |
| pysec-2020-98 |
|
Red Discord Bot Dashboard is an easy-to-use interactive web dashboard to control your Red… | red-dashboard | 2020-12-09T00:15:00Z | 2020-12-10T20:15:00Z |
| pysec-2020-226 |
|
Cross Site Scripting (XSS) vulnerability in Arachnys Cabot 0.11.12 can be exploited via t… | cabot | 2020-12-04T20:15:00Z | 2021-08-27T03:21:56.543783Z |
| pysec-2020-45 |
|
An issue was discovered in OpenStack Horizon before 15.3.2, 16.x before 16.2.1, 17.x and … | horizon | 2020-12-04T08:15:00Z | 2021-03-09T15:08:00Z |
| pysec-2020-109 |
|
In some conditions, a snap package built by snapcraft includes the current directory in L… | snapcraft | 2020-12-04T03:15:00Z | 2020-12-14T20:36:00Z |
| pysec-2020-62 |
|
A XSS vulnerability was discovered in python-lxml's clean module. The module's parser did… | lxml | 2020-12-03T17:15:00Z | 2021-03-30T21:15:00Z |
| pysec-2020-69 |
|
Python oic is a Python OpenID Connect implementation. In Python oic before version 1.2.1,… | oic | 2020-12-02T20:15:00Z | 2020-12-08T02:37:00Z |
| pysec-2020-74 |
|
Multiple cross-site scripting (XSS) vulnerabilities in Papermerge before 1.5.2 allow remo… | papermerge | 2020-12-02T08:15:00Z | 2020-12-02T16:29:00Z |
| pysec-2020-68 |
|
OAuthenticator is an OAuth login mechanism for JupyterHub. In oauthenticator from version… | oauthenticator | 2020-12-01T21:15:00Z | 2020-12-08T17:50:00Z |
| pysec-2020-343 |
7.8 (3.1)
|
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when the… | blosc2 | 2020-11-27T20:15:00Z | 2024-12-12T14:22:45.450508Z |
| pysec-2020-75 |
|
petl before 1.68, in some configurations, allows resolution of entities in an XML document. | petl | 2020-11-26T05:15:00Z | 2020-12-03T16:48:00Z |
| pysec-2020-234 |
|
Jupyter Server before version 1.0.6 has an Open redirect vulnerability. A maliciously cra… | jupyter-server | 2020-11-24T21:15:00Z | 2021-08-27T03:22:05.136094Z |
| pysec-2020-237 |
|
Matrix Synapse before 1.20.0 erroneously permits non-standard NaN, Infinity, and -Infinit… | matrix-synapse | 2020-11-24T03:15:00Z | 2021-08-27T03:22:06.477416Z |
| pysec-2020-108 |
|
** DISPUTED ** svm_predict_values in svm.cpp in Libsvm v324, as used in scikit-learn 0.23… | scikit-learn | 2020-11-21T21:15:00Z | 2020-12-03T18:50:00Z |
| pysec-2020-215 |
|
Jupyter Notebook before version 6.1.5 has an Open redirect vulnerability. A maliciously c… | notebook | 2020-11-18T22:15:00Z | 2021-08-11T11:14:19.531087Z |
| pysec-2020-157 |
|
Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL. | werkzeug | 2020-11-18T15:15:00Z | 2020-12-01T16:05:00Z |
| pysec-2020-261 |
|
A weak robustness vulnerability exists in the AWS Encryption SDKs for Java, Python, C and… | aws-encryption-sdk | 2020-11-16T12:15:00Z | 2021-09-26T23:32:16.436833Z |
| pysec-2020-100 |
|
It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker … | rsa | 2020-11-12T14:15:00Z | 2021-11-11T23:07:45.968611Z |
| pysec-2020-241 |
|
MoinMoin is a wiki engine. In MoinMoin before version 1.9.11, an attacker with write perm… | moin | 2020-11-11T16:15:00Z | 2021-08-27T03:22:07.834309Z |
| pysec-2020-67 |
|
The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal… | moin | 2020-11-10T17:15:00Z | 2020-11-24T17:20:00Z |
| pysec-2020-18 |
|
The previous default setting for Airflow's Experimental API was to allow all API requests… | apache-airflow | 2020-11-10T16:15:00Z | 2020-11-24T17:29:00Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1057 | Malicious code in windowston (npm) | 2026-02-26T17:51:38Z | 2026-03-02T03:15:31Z |
| mal-2026-1049 | Malicious code in flycord (PyPI) | 2026-02-26T15:38:34Z | 2026-02-26T15:38:34Z |
| mal-2026-1048 | Malicious code in edx-salesforce (PyPI) | 2026-02-26T13:55:39Z | 2026-02-26T14:07:49Z |
| mal-2026-1055 | Malicious code in jslint-config (npm) | 2026-02-26T13:41:14Z | 2026-03-02T03:15:28Z |
| mal-2026-1053 | Malicious code in hardhat-node (npm) | 2026-02-26T13:32:42Z | 2026-03-01T20:43:45Z |
| mal-2026-1058 | Malicious code in zoddle (npm) | 2026-02-26T13:21:03Z | 2026-03-02T03:15:32Z |
| mal-2026-1047 | Malicious code in ts-packer (npm) | 2026-02-26T11:22:38Z | 2026-03-01T20:43:48Z |
| mal-2026-1046 | Malicious code in jest-param-validator (npm) | 2026-02-26T11:22:38Z | 2026-03-01T20:43:45Z |
| mal-2026-1045 | Malicious code in jest-node-paramset (npm) | 2026-02-26T11:22:38Z | 2026-03-01T20:43:45Z |
| mal-2026-1051 | Malicious code in corstoken (npm) | 2026-02-26T10:50:36Z | 2026-03-02T03:15:26Z |
| mal-2026-1054 | Malicious code in iosysredis (npm) | 2026-02-26T10:34:36Z | 2026-03-02T03:15:28Z |
| mal-2026-1056 | Malicious code in undicy-lint (npm) | 2026-02-26T10:17:13Z | 2026-03-02T03:15:31Z |
| mal-2026-1044 | Malicious code in awareness-demo-pkg (PyPI) | 2026-02-26T10:11:33Z | 2026-02-26T10:11:33Z |
| mal-2026-1038 | Malicious code in promanage (npm) | 2026-02-25T22:31:19Z | 2026-03-02T03:15:30Z |
| mal-2026-1043 | Malicious code in uuindex (npm) | 2026-02-25T21:51:09Z | 2026-03-02T03:15:31Z |
| mal-2026-1035 | Malicious code in neural-compressor-jax (PyPI) | 2026-02-25T19:42:30Z | 2026-02-25T19:42:30Z |
| mal-2026-1034 | Malicious code in chai-lite-lib (npm) | 2026-02-25T17:42:40Z | 2026-04-01T12:28:01Z |
| mal-2026-1033 | Malicious code in duer-js (npm) | 2026-02-25T16:53:55Z | 2026-03-01T20:43:44Z |
| mal-2026-1031 | Malicious code in react-svg-helper-fast (npm) | 2026-02-25T16:29:50Z | 2026-03-01T20:43:47Z |
| mal-2026-1030 | Malicious code in chai-as-utils (npm) | 2026-02-25T16:19:24Z | 2026-03-19T12:23:19Z |
| mal-2026-1032 | Malicious code in sample-custom-component (npm) | 2026-02-25T16:13:53Z | 2026-03-19T12:23:23Z |
| mal-2026-1029 | Malicious code in geocommunes-geoportal (PyPI) | 2026-02-25T11:49:41Z | 2026-02-25T11:49:41Z |
| mal-2026-1230 | Malicious code in @schedaero/react-core (npm) | 2026-02-25T06:12:08Z | 2026-03-08T01:39:42Z |
| mal-2026-1232 | Malicious code in @schedaero/yukon (npm) | 2026-02-25T06:11:34Z | 2026-03-08T01:39:42Z |
| mal-2026-1228 | Malicious code in @schedaero/bacon (npm) | 2026-02-25T06:11:11Z | 2026-03-08T01:39:42Z |
| mal-2026-1229 | Malicious code in @schedaero/net-common (npm) | 2026-02-25T06:10:40Z | 2026-03-08T01:39:42Z |
| mal-2026-1234 | Malicious code in uxproject11 (npm) | 2026-02-25T05:20:29Z | 2026-03-19T12:23:24Z |
| mal-2026-1233 | Malicious code in projectrtert (npm) | 2026-02-25T05:19:56Z | 2026-03-19T12:23:22Z |
| mal-2026-1231 | Malicious code in @schedaero/shared (npm) | 2026-02-25T05:19:33Z | 2026-03-08T01:39:42Z |
| mal-2026-1039 | Malicious code in react-devtools-raycast (npm) | 2026-02-25T04:33:21Z | 2026-03-19T12:23:22Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1206 | Perl: Schwachstelle ermöglicht Codeausführung und Offenlegung von Informationen | 2025-06-01T22:00:00.000+00:00 | 2025-11-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1205 | Golang Go: Mehrere Schwachstellen | 2025-06-01T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1204 | systemd-coredump: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-01T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1203 | NetApp ActiveIQ Unified Manager: Schwachstelle ermöglicht Denial of Service | 2025-06-01T22:00:00.000+00:00 | 2025-06-01T22:00:00.000+00:00 |
| wid-sec-w-2025-1202 | IBM InfoSphere Information Server: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-01T22:00:00.000+00:00 | 2025-06-01T22:00:00.000+00:00 |
| wid-sec-w-2025-1201 | Linux Kernel: Mehrere Schwachstellen | 2025-05-29T22:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1200 | VMware Tanzu Spring Cloud Gateway Server: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-29T22:00:00.000+00:00 | 2025-05-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1199 | Acronis Cyber Protect: Mehrere Schwachstellen | 2025-05-29T22:00:00.000+00:00 | 2025-05-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1173 | Devolutions Remote Desktop Manager: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-05-29T22:00:00.000+00:00 | 2025-05-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1172 | Drupal: Mehrere Schwachstellen | 2025-05-29T22:00:00.000+00:00 | 2025-05-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1171 | GStreamer: Mehrere Schwachstellen | 2025-05-29T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1169 | Apache Commons BeanUtils: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-29T22:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2025-1168 | Apache Superset: Schwachstelle ermöglicht SQL Injection | 2025-05-29T22:00:00.000+00:00 | 2025-05-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1167 | IBM DB2: Mehrere Schwachstellen | 2025-05-29T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1166 | Vercel Next.js: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-05-29T22:00:00.000+00:00 | 2025-06-01T22:00:00.000+00:00 |
| wid-sec-w-2025-1165 | Apache Tomcat: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-29T22:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2025-1164 | Red Hat OpenShift GitOps: Schwachstelle ermöglicht Cross-Site Scripting | 2025-05-29T22:00:00.000+00:00 | 2025-06-02T22:00:00.000+00:00 |
| wid-sec-w-2025-1163 | IBM Tivoli Monitoring: Schwachstelle ermöglicht Codeausführung | 2025-05-29T22:00:00.000+00:00 | 2025-05-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1162 | Red Hat Enterprise Linux (zlib): Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-05-29T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1161 | ESRI ArcGIS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-29T22:00:00.000+00:00 | 2025-05-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1160 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2025-05-27T22:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-1159 | Arista EOS: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-05-27T22:00:00.000+00:00 | 2025-05-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1158 | Google Chrome / Microsoft Edge: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-05-27T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-1157 | binutils: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-05-27T22:00:00.000+00:00 | 2025-12-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1156 | Xen: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2025-05-27T22:00:00.000+00:00 | 2025-05-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1155 | IBM Security Guardium: Mehrere Schwachstellen | 2025-05-27T22:00:00.000+00:00 | 2025-05-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1154 | Strapi: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-05-27T22:00:00.000+00:00 | 2025-05-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1153 | D-LINK Access Point (AP): Schwachstelle ermöglicht Codeausführung | 2025-05-27T22:00:00.000+00:00 | 2025-05-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1152 | IBM App Connect Enterprise: Schwachstelle ermöglicht Denial of Service | 2025-05-27T22:00:00.000+00:00 | 2025-05-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1151 | libcurl: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-05-27T22:00:00.000+00:00 | 2025-11-04T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-21-194-12 | Siemens VxWorks-based Industrial Products (Update C) | 2021-07-13T00:00:00.000000Z | 2022-05-12T00:00:00.000000Z |
| icsa-21-194-11 | Siemens Teamcenter Active Workspace | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-10 | Siemens RUGGEDCOM ROS | 2021-07-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-21-194-09 | Siemens JT Utilities | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-08 | Siemens Solid Edge | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-07 | Siemens Industrial Products LLDP (Update D) | 2021-07-13T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-21-194-06 | Siemens SIMATIC Software Products (Update B) | 2021-07-13T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-21-194-05 | Siemens SIMATIC Software Products | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-04 | Siemens SINUMERIK Integrate Operate Client | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-03 | Siemens PROFINET Devices | 2021-07-13T00:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-21-194-02 | Schneider Electric Modicon Controllers and Software (Update A) | 2021-07-13T00:00:00.000000Z | 2021-07-27T00:00:00.000000Z |
| icsa-21-194-01 | Schneider Electric C-Bus Toolkit | 2021-07-13T00:00:00.000000Z | 2021-07-13T00:00:00.000000Z |
| icsa-21-189-02 | MDT AutoSave | 2021-07-08T00:00:00.000000Z | 2021-07-08T00:00:00.000000Z |
| icsa-21-189-01 | Rockwell Automation MicroLogix 1100 | 2021-07-08T00:00:00.000000Z | 2021-07-08T00:00:00.000000Z |
| icsma-21-187-01 | Philips Vue PACS (Update B) | 2021-07-06T00:00:00.000000Z | 2022-04-05T00:00:00.000000Z |
| icsa-21-187-01 | Moxa NPort IAW5000A-I/O Series Serial Device Server | 2021-07-06T00:00:00.000000Z | 2021-07-06T00:00:00.000000Z |
| icsa-21-182-05 | Mitsubishi Electric Air Conditioning Systems | 2021-07-01T00:00:00.000000Z | 2021-07-01T00:00:00.000000Z |
| icsa-21-182-04 | Mitsubishi Electric Air Conditioning System | 2021-07-01T00:00:00.000000Z | 2021-07-01T00:00:00.000000Z |
| icsa-21-182-03 | Delta Electronics DOPSoft (Update A) | 2021-07-01T00:00:00.000000Z | 2022-09-29T00:00:00.000000Z |
| icsa-21-182-02 | Sensormatic Electronics C-CURE 9000 (Update A) | 2021-07-01T00:00:00.000000Z | 2021-08-12T00:00:00.000000Z |
| icsa-21-182-01 | Johnson Controls Facility Explorer | 2021-07-01T00:00:00.000000Z | 2021-07-01T00:00:00.000000Z |
| icsa-21-180-06 | Claroty Secure Remote Access Site | 2021-06-29T00:00:00.000000Z | 2021-06-29T00:00:00.000000Z |
| icsa-21-180-05 | AVEVA System Platform (Update A) | 2021-06-29T00:00:00.000000Z | 2021-07-27T00:00:00.000000Z |
| icsa-21-180-04 | JTEKT TOYOPUC PLC | 2021-06-29T00:00:00.000000Z | 2021-06-29T00:00:00.000000Z |
| icsa-21-180-03 | Panasonic FPWIN Pro | 2021-06-29T00:00:00.000000Z | 2021-06-29T00:00:00.000000Z |
| icsa-21-180-02 | Exacq Technologies exacqVision Enterprise Manager | 2021-06-29T00:00:00.000000Z | 2021-06-29T00:00:00.000000Z |
| icsa-21-180-01 | Exacq Technologies exacqVision Web Service | 2021-06-29T00:00:00.000000Z | 2021-06-29T00:00:00.000000Z |
| icsma-21-175-01 | Philips Interoperability Solution XDS | 2021-06-24T00:00:00.000000Z | 2021-06-24T00:00:00.000000Z |
| icsa-21-175-01 | FATEK Automation WinProladder | 2021-06-24T00:00:00.000000Z | 2021-06-24T00:00:00.000000Z |
| icsa-21-173-04 | CODESYS Control V2 Linux SysFile library | 2021-06-22T00:00:00.000000Z | 2021-06-22T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20190501-wsa-dos | Cisco Web Security Appliance Malformed Request Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-udb-sm | Cisco Umbrella Dashboard Session Management Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-sd-cpu-dos | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software WebVPN Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:57:14+00:00 |
| cisco-sa-20190501-scbv | Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-sbr-hijack | Cisco Small Business RV320 and RV325 Routers Session Hijacking Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-pnr-xss | Cisco Prime Network Registrar Cross-Site Scripting Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-phone-sip-xml-dos | Cisco IP Phone 7800 Series and 8800 Series Session Initiation Protocol XML Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-pca-xss | Cisco Prime Collaboration Assurance Cross-Site Scripting Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-nexus9k-sshkey | Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Default SSH Key Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-09T12:49:51+00:00 |
| cisco-sa-20190501-nexus9k-rpe | Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Root Privilege Escalation Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-15T13:28:14+00:00 |
| cisco-sa-20190501-hyperflex-csrf | Cisco HyperFlex HX-Series Web-Based Management Interface Cross-Site Request Forgery Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-ftd-cmd-inject | Cisco Firepower Threat Defense Software Command Injection Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-frpwr-smb-snort | Cisco Firepower Threat Defense Software SMB Protocol Preprocessor Detection Engine Denial of Service Vulnerabilities | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:54:49+00:00 |
| cisco-sa-20190501-frpwr-dos | Cisco Firepower Threat Defense Software Packet Processing Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:41:24+00:00 |
| cisco-sa-20190501-frpwr-cmd-inj | Cisco Firepower Threat Defense Software Command Injection Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-firepower-dos | Cisco Firepower Threat Defense Software TCP Ingress Handler Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:55:55+00:00 |
| cisco-sa-20190501-fabric-traversal | Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Symbolic Link Path Traversal Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-expressway-traversal | Cisco Expressway Series Directory Traversal Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-esa-bypass | Cisco Email Security Appliance Filter Bypass Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-03T20:26:28+00:00 |
| cisco-sa-20190501-asaftd-saml-vpn | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software VPN SAML Authentication Bypass Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:39:02+00:00 |
| cisco-sa-20190501-asa-vpn-dos | Cisco Adaptive Security Appliance Software VPN Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:12:08+00:00 |
| cisco-sa-20190501-asa-ipsec-dos | Cisco Adaptive Security Appliance Software IPsec Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-asa-ftdtcp-dos | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software TCP Proxy Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:48:07+00:00 |
| cisco-sa-20190501-asa-ftds-ldapdos | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Lightweight Directory Access Protocol Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:53:03+00:00 |
| cisco-sa-20190501-asa-ftd-xss | Cisco Adaptive Security Appliance and Firepower Threat Defense Software WebVPN Cross-Site Scripting Vulnerabilities | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:42:58+00:00 |
| cisco-sa-20190501-asa-ftd-ike-dos | Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software MOBIKE Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:37:28+00:00 |
| cisco-sa-20190501-asa-ftd-entropy | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Low-Entropy Keys Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:49:48+00:00 |
| cisco-sa-20190501-asa-ftd-dos | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software WebVPN Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:47:03+00:00 |
| cisco-sa-20190501-asa-ftd-bypass | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Layer 2 Filtering Bypass Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:44:22+00:00 |
| cisco-sa-20190501-asa-frpwrtd-dos | Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software TCP Timer Handling Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-03T19:45:16+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-62168 | Squid vulnerable to information disclosure via authentication credential leakage in error handling | 2025-10-02T00:00:00.000Z | 2025-10-19T01:01:13.000Z |
| msrc_cve-2025-61985 | ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used. | 2025-10-02T00:00:00.000Z | 2025-10-08T01:02:00.000Z |
| msrc_cve-2025-61984 | ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.) | 2025-10-02T00:00:00.000Z | 2025-10-08T01:02:05.000Z |
| msrc_cve-2025-61725 | Excessive CPU consumption in ParseAddress in net/mail | 2025-10-02T00:00:00.000Z | 2026-04-14T14:39:06.000Z |
| msrc_cve-2025-61724 | Excessive CPU consumption in Reader.ReadResponse in net/textproto | 2025-10-02T00:00:00.000Z | 2026-04-14T14:38:55.000Z |
| msrc_cve-2025-61723 | Quadratic complexity when parsing some invalid inputs in encoding/pem | 2025-10-02T00:00:00.000Z | 2026-02-18T02:25:18.000Z |
| msrc_cve-2025-61107 | FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_pref_pref_sid function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted LSA Update packet. | 2025-10-02T00:00:00.000Z | 2026-02-18T02:41:48.000Z |
| msrc_cve-2025-61106 | FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_pref_pref_sid function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet. | 2025-10-02T00:00:00.000Z | 2026-02-18T02:40:55.000Z |
| msrc_cve-2025-61105 | FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_link_info function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet. | 2025-10-02T00:00:00.000Z | 2026-02-18T02:43:12.000Z |
| msrc_cve-2025-61104 | FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_unknown_tlv function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet. | 2025-10-02T00:00:00.000Z | 2026-02-18T02:50:40.000Z |
| msrc_cve-2025-61103 | FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_link_lan_adj_sid function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet. | 2025-10-02T00:00:00.000Z | 2026-02-18T02:40:00.000Z |
| msrc_cve-2025-61102 | FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_link_adj_sid function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet. | 2025-10-02T00:00:00.000Z | 2026-02-18T02:42:38.000Z |
| msrc_cve-2025-61101 | FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_link_rmt_itf_addr function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet. | 2025-10-02T00:00:00.000Z | 2026-02-18T02:48:59.000Z |
| msrc_cve-2025-61100 | FRRouting/frr from v2.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the ospf_opaque_lsa_dump function at ospf_opaque.c. This vulnerability allows attackers to cause a Denial of Service (DoS) under specific malformed LSA conditions. | 2025-10-02T00:00:00.000Z | 2026-02-18T02:49:53.000Z |
| msrc_cve-2025-61099 | FRRouting/frr from v2.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the opaque_info_detail function at ospf_opaque.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted LS Update packet. | 2025-10-02T00:00:00.000Z | 2026-02-18T02:52:47.000Z |
| msrc_cve-2025-6075 | Quadratic complexity in os.path.expandvars() with user-controlled template | 2025-10-02T00:00:00.000Z | 2025-12-07T01:46:03.000Z |
| msrc_cve-2025-59530 | quic-go has Client Crash Due to Premature HANDSHAKE_DONE Frame | 2025-10-02T00:00:00.000Z | 2025-10-25T14:01:47.000Z |
| msrc_cve-2025-58189 | ALPN negotiation error contains attacker controlled information in crypto/tls | 2025-10-02T00:00:00.000Z | 2025-10-31T01:09:20.000Z |
| msrc_cve-2025-58188 | Panic when validating certificates with DSA public keys in crypto/x509 | 2025-10-02T00:00:00.000Z | 2026-04-14T14:39:01.000Z |
| msrc_cve-2025-58187 | Quadratic complexity when checking name constraints in crypto/x509 | 2025-10-02T00:00:00.000Z | 2026-02-18T02:28:39.000Z |
| msrc_cve-2025-58186 | Lack of limit when parsing cookies can cause memory exhaustion in net/http | 2025-10-02T00:00:00.000Z | 2026-04-14T14:38:50.000Z |
| msrc_cve-2025-58185 | Parsing DER payload can cause memory exhaustion in encoding/asn1 | 2025-10-02T00:00:00.000Z | 2026-02-18T02:14:53.000Z |
| msrc_cve-2025-58183 | Unbounded allocation when parsing GNU sparse map in archive/tar | 2025-10-02T00:00:00.000Z | 2026-04-14T14:38:44.000Z |
| msrc_cve-2025-53069 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:30.000Z |
| msrc_cve-2025-53062 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:15.000Z |
| msrc_cve-2025-53054 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:45.000Z |
| msrc_cve-2025-53053 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:22.000Z |
| msrc_cve-2025-53045 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:38.000Z |
| msrc_cve-2025-53044 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:00.000Z |
| msrc_cve-2025-53042 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:05:53.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:14641-1 | rclone-1.69.0-1.1 on GA media | 2025-01-13T00:00:00Z | 2025-01-13T00:00:00Z |
| opensuse-su-2025:14640-1 | kepler-0.7.11-2.1 on GA media | 2025-01-13T00:00:00Z | 2025-01-13T00:00:00Z |
| opensuse-su-2025:14639-1 | yq-4.44.6-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14638-1 | valkey-8.0.2-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14637-1 | python311-mistune-3.1.0-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14636-1 | proftpd-1.3.8c-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14635-1 | perl-Module-ScanDeps-1.370.0-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14634-1 | operator-sdk-1.39.0-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14633-1 | grafana-11.3.0-4.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14632-1 | frr-10.2.1-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14631-1 | dpdk-23.11.1-4.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14630-1 | MozillaFirefox-134.0-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14629-1 | chromedriver-131.0.6778.264-1.1 on GA media | 2025-01-10T00:00:00Z | 2025-01-10T00:00:00Z |
| opensuse-su-2025:14628-1 | python311-slixmpp-1.8.6-1.1 on GA media | 2025-01-09T00:00:00Z | 2025-01-09T00:00:00Z |
| opensuse-su-2025:14627-1 | logback-1.2.11-4.1 on GA media | 2025-01-09T00:00:00Z | 2025-01-09T00:00:00Z |
| opensuse-su-2025:14626-1 | kubo-0.32.1-1.1 on GA media | 2025-01-09T00:00:00Z | 2025-01-09T00:00:00Z |
| opensuse-su-2025:14625-1 | gstreamer-plugins-base-1.24.11-1.1 on GA media | 2025-01-09T00:00:00Z | 2025-01-09T00:00:00Z |
| opensuse-su-2025:14624-1 | govulncheck-vulndb-0.0.20250108T191942-1.1 on GA media | 2025-01-09T00:00:00Z | 2025-01-09T00:00:00Z |
| opensuse-su-2025:0008-1 | Security update for python-django-ckeditor | 2025-01-07T17:02:06Z | 2025-01-07T17:02:06Z |
| opensuse-su-2025:0004-1 | Security update for rubygem-json-jwt | 2025-01-07T17:01:48Z | 2025-01-07T17:01:48Z |
| opensuse-su-2025:0003-1 | Security update for etcd | 2025-01-07T15:04:12Z | 2025-01-07T15:04:12Z |
| opensuse-su-2025:14623-1 | tomcat10-10.1.34-1.1 on GA media | 2025-01-07T00:00:00Z | 2025-01-07T00:00:00Z |
| opensuse-su-2025:14622-1 | tomcat-9.0.98-1.1 on GA media | 2025-01-07T00:00:00Z | 2025-01-07T00:00:00Z |
| opensuse-su-2025:14621-1 | libruby3_4-3_4-3.4.1-1.1 on GA media | 2025-01-07T00:00:00Z | 2025-01-07T00:00:00Z |
| opensuse-su-2025:14620-1 | libopenjp2-7-2.5.3-2.1 on GA media | 2025-01-07T00:00:00Z | 2025-01-07T00:00:00Z |
| opensuse-su-2025:14619-1 | firefox-esr-128.6.0-1.1 on GA media | 2025-01-07T00:00:00Z | 2025-01-07T00:00:00Z |
| opensuse-su-2025:14618-1 | apptainer-1.3.6-2.1 on GA media | 2025-01-07T00:00:00Z | 2025-01-07T00:00:00Z |
| opensuse-su-2025:14617-1 | rizin-0.7.4-1.1 on GA media | 2025-01-05T00:00:00Z | 2025-01-05T00:00:00Z |
| opensuse-su-2025:14616-1 | libpoppler-cpp1-24.12.0-1.1 on GA media | 2025-01-03T00:00:00Z | 2025-01-03T00:00:00Z |
| opensuse-su-2025:14615-1 | corepack22-22.12.0-1.1 on GA media | 2025-01-03T00:00:00Z | 2025-01-03T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:22377 | Red Hat Security Advisory: libxml2 security update | 2025-12-01T03:32:31+00:00 | 2026-04-13T20:13:39+00:00 |
| rhsa-2025:22376 | Red Hat Security Advisory: libxml2 security update | 2025-12-01T03:26:36+00:00 | 2026-04-13T20:13:39+00:00 |
| rhsa-2025:22374 | Red Hat Security Advisory: firefox security update | 2025-12-01T02:53:51+00:00 | 2026-03-18T03:11:01+00:00 |
| rhsa-2025:22375 | Red Hat Security Advisory: firefox security update | 2025-12-01T02:46:01+00:00 | 2026-03-18T03:11:01+00:00 |
| rhsa-2025:22364 | Red Hat Security Advisory: xorg-x11-server security update | 2025-12-01T02:42:02+00:00 | 2026-03-18T03:12:29+00:00 |
| rhsa-2025:22371 | Red Hat Security Advisory: firefox security update | 2025-12-01T02:40:31+00:00 | 2026-03-18T03:10:59+00:00 |
| rhsa-2025:22372 | Red Hat Security Advisory: firefox security update | 2025-12-01T02:39:56+00:00 | 2026-03-18T03:11:00+00:00 |
| rhsa-2025:22363 | Red Hat Security Advisory: firefox security update | 2025-12-01T02:38:16+00:00 | 2026-03-18T03:10:58+00:00 |
| rhsa-2025:22373 | Red Hat Security Advisory: firefox security update | 2025-12-01T02:35:11+00:00 | 2026-03-18T03:11:00+00:00 |
| rhsa-2025:22368 | Red Hat Security Advisory: firefox security update | 2025-12-01T02:33:21+00:00 | 2026-03-18T03:10:59+00:00 |
| rhsa-2025:22369 | Red Hat Security Advisory: firefox security update | 2025-12-01T02:17:58+00:00 | 2026-03-18T03:10:59+00:00 |
| rhsa-2025:22367 | Red Hat Security Advisory: firefox security update | 2025-12-01T02:12:31+00:00 | 2026-03-18T03:11:02+00:00 |
| rhsa-2025:22365 | Red Hat Security Advisory: xorg-x11-server security update | 2025-12-01T02:02:06+00:00 | 2026-03-18T03:12:27+00:00 |
| rhsa-2025:22370 | Red Hat Security Advisory: java-1.8.0-ibm security update | 2025-12-01T01:49:46+00:00 | 2026-03-18T03:12:13+00:00 |
| rhsa-2025:22361 | Red Hat Security Advisory: qt6-qtquick3d security update | 2025-12-01T01:46:32+00:00 | 2026-03-18T03:12:34+00:00 |
| rhsa-2025:22345 | Red Hat Security Advisory: Red Hat OpenShift Developer Tools - Source-to-Image 1.5.2 | 2025-11-27T22:06:09+00:00 | 2026-04-14T07:56:32+00:00 |
| rhsa-2025:22287 | Red Hat Security Advisory: Red Hat Quay 3.9 | 2025-11-27T14:54:51+00:00 | 2026-04-12T13:31:07+00:00 |
| rhsa-2025:21829 | Red Hat Security Advisory: OpenShift Container Platform 4.12.83 bug fix and security update | 2025-11-27T12:20:57+00:00 | 2026-03-18T03:11:45+00:00 |
| rhsa-2025:21824 | Red Hat Security Advisory: OpenShift Container Platform 4.16.53 bug fix and security update | 2025-11-27T11:08:51+00:00 | 2026-04-14T02:01:23+00:00 |
| rhsa-2025:21795 | Red Hat Security Advisory: OpenShift Container Platform 4.18.29 bug fix and security update | 2025-11-27T04:24:21+00:00 | 2026-04-14T02:01:21+00:00 |
| rhsa-2025:22205 | Red Hat Security Advisory: bind security update | 2025-11-26T21:38:30+00:00 | 2026-04-13T20:13:39+00:00 |
| rhsa-2025:22190 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.1.2 security update | 2025-11-26T17:02:38+00:00 | 2026-04-01T13:32:42+00:00 |
| rhsa-2025:22188 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.1.2 Security update | 2025-11-26T16:59:23+00:00 | 2026-04-01T13:32:41+00:00 |
| rhsa-2025:22187 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.1.2 security update | 2025-11-26T16:59:20+00:00 | 2026-04-01T13:32:41+00:00 |
| rhsa-2025:22181 | Red Hat Security Advisory: golang security update | 2025-11-26T15:05:54+00:00 | 2026-04-14T07:56:32+00:00 |
| rhsa-2025:22182 | Red Hat Security Advisory: Red Hat Quay 3.10.16 | 2025-11-26T14:52:57+00:00 | 2026-04-12T13:31:07+00:00 |
| rhsa-2025:22179 | Red Hat Security Advisory: RHSA 4.8.6 security and bug fix update | 2025-11-26T13:57:08+00:00 | 2026-04-09T14:28:14+00:00 |
| rhsa-2025:22177 | Red Hat Security Advisory: libxml2 security update | 2025-11-26T13:19:45+00:00 | 2026-04-13T20:13:39+00:00 |
| rhsa-2025:22175 | Red Hat Security Advisory: expat security update | 2025-11-26T11:07:19+00:00 | 2026-04-13T20:13:38+00:00 |
| rhsa-2025:22168 | Red Hat Security Advisory: bind9.16 security update | 2025-11-26T07:25:14+00:00 | 2026-04-13T20:13:43+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:4287-1 | Security update for java-25-openjdk | 2025-11-28T08:23:45Z | 2025-11-28T08:23:45Z |
| suse-su-2025:21124-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_12 | 2025-11-28T08:21:31Z | 2025-11-28T08:21:31Z |
| suse-su-2025:21123-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_11 | 2025-11-28T08:21:31Z | 2025-11-28T08:21:31Z |
| suse-su-2025:21104-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_12 | 2025-11-28T08:21:31Z | 2025-11-28T08:21:31Z |
| suse-su-2025:21103-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_11 | 2025-11-28T08:21:31Z | 2025-11-28T08:21:31Z |
| suse-su-2025:21122-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 | 2025-11-28T08:21:02Z | 2025-11-28T08:21:02Z |
| suse-su-2025:21099-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 | 2025-11-28T08:21:02Z | 2025-11-28T08:21:02Z |
| suse-su-2025:21115-1 | Security update for kernel-livepatch-MICRO-6-0_Update_12 | 2025-11-28T08:20:42Z | 2025-11-28T08:20:42Z |
| suse-su-2025:21102-1 | Security update for kernel-livepatch-MICRO-6-0_Update_12 | 2025-11-28T08:20:42Z | 2025-11-28T08:20:42Z |
| suse-su-2025:21114-1 | Security update for kernel-livepatch-MICRO-6-0_Update_10 | 2025-11-28T08:20:28Z | 2025-11-28T08:20:28Z |
| suse-su-2025:21100-1 | Security update for kernel-livepatch-MICRO-6-0_Update_10 | 2025-11-28T08:20:28Z | 2025-11-28T08:20:28Z |
| suse-su-2025:21113-1 | Security update for kernel-livepatch-MICRO-6-0_Update_11 | 2025-11-28T08:20:11Z | 2025-11-28T08:20:11Z |
| suse-su-2025:21101-1 | Security update for kernel-livepatch-MICRO-6-0_Update_11 | 2025-11-28T08:20:11Z | 2025-11-28T08:20:11Z |
| suse-su-2025:21121-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_9 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21120-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21119-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21118-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21117-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21116-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21091-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_9 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21090-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21089-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21088-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21087-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21086-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21112-1 | Security update for kernel-livepatch-MICRO-6-0_Update_9 | 2025-11-28T08:19:28Z | 2025-11-28T08:19:28Z |
| suse-su-2025:21111-1 | Security update for kernel-livepatch-MICRO-6-0_Update_8 | 2025-11-28T08:19:28Z | 2025-11-28T08:19:28Z |
| suse-su-2025:21110-1 | Security update for kernel-livepatch-MICRO-6-0_Update_7 | 2025-11-28T08:19:28Z | 2025-11-28T08:19:28Z |
| suse-su-2025:21109-1 | Security update for kernel-livepatch-MICRO-6-0_Update_6 | 2025-11-28T08:19:28Z | 2025-11-28T08:19:28Z |
| suse-su-2025:21108-1 | Security update for kernel-livepatch-MICRO-6-0_Update_5 | 2025-11-28T08:19:28Z | 2025-11-28T08:19:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:0670 | Important: runc security update | 2024-02-02T00:00:00Z | 2024-02-06T05:57:05Z |
| alsa-2024:0647 | Moderate: rpm security update | 2024-02-01T00:00:00Z | 2024-02-01T17:32:00Z |
| alsa-2024:0628 | Moderate: libssh security update | 2024-01-31T00:00:00Z | 2024-02-01T09:02:43Z |
| alsa-2024:0627 | Moderate: gnutls security update | 2024-01-31T00:00:00Z | 2024-02-01T09:14:29Z |
| alsa-2024:0609 | Important: thunderbird security update | 2024-01-30T00:00:00Z | 2024-02-01T09:44:40Z |
| alsa-2024:0608 | Important: firefox security update | 2024-01-30T00:00:00Z | 2024-02-01T09:58:53Z |
| alsa-2024:0607 | Important: tigervnc security update | 2024-01-30T00:00:00Z | 2024-01-31T10:11:00Z |
| alsa-2024:0606 | Moderate: openssh security update | 2024-01-30T00:00:00Z | 2024-01-31T10:16:15Z |
| alsa-2024:0603 | Important: firefox security update | 2024-01-30T00:00:00Z | 2024-02-01T10:06:48Z |
| alsa-2024:0602 | Important: thunderbird security update | 2024-01-30T00:00:00Z | 2024-02-01T10:12:30Z |
| alsa-2024:0557 | Important: tigervnc security update | 2024-01-30T00:00:00Z | 2024-01-31T11:00:39Z |
| alsa-2024:0539 | Important: tomcat security update | 2024-01-29T00:00:00Z | 2024-01-29T17:07:10Z |
| alsa-2024:0533 | Moderate: gnutls security update | 2024-01-29T00:00:00Z | 2024-01-29T16:57:50Z |
| alsa-2024:0477 | Moderate: frr security update | 2024-01-25T00:00:00Z | 2024-01-25T21:18:33Z |
| alsa-2024:0474 | Moderate: tomcat security update | 2024-01-25T00:00:00Z | 2024-01-25T21:22:43Z |
| alsa-2024:0468 | Moderate: grub2 security update | 2024-01-25T00:00:00Z | 2024-01-26T10:16:18Z |
| alsa-2024:0466 | Moderate: python3.9 security update | 2024-01-25T00:00:00Z | 2024-01-25T21:26:28Z |
| alsa-2024:0465 | Moderate: sqlite security update | 2024-01-25T00:00:00Z | 2024-01-25T21:37:59Z |
| alsa-2024:0464 | Moderate: python-urllib3 security update | 2024-01-25T00:00:00Z | 2024-01-25T21:46:05Z |
| alsa-2024:0463 | Moderate: rpm security update | 2024-01-25T00:00:00Z | 2024-01-25T21:52:51Z |
| alsa-2024:0387 | Moderate: php:8.1 security update | 2024-01-24T00:00:00Z | 2024-01-25T22:02:03Z |
| alsa-2024:0310 | Moderate: openssl security update | 2024-01-22T00:00:00Z | 2024-01-22T08:01:31Z |
| alsa-2024:0266 | Important: java-11-openjdk security update | 2024-01-18T00:00:00Z | 2024-01-20T14:46:27Z |
| alsa-2024:0267 | Important: java-17-openjdk security and bug fix update | 2024-01-17T00:00:00Z | 2024-01-20T14:39:47Z |
| alsa-2024:0265 | Important: java-1.8.0-openjdk security and bug fix update | 2024-01-17T00:00:00Z | 2024-01-20T14:52:21Z |
| alsa-2024:0249 | Important: java-21-openjdk security update | 2024-01-17T00:00:00Z | 2024-01-20T14:58:07Z |
| alsa-2024:0248 | Important: java-21-openjdk security update | 2024-01-17T00:00:00Z | 2024-01-20T11:28:23Z |
| alsa-2024:0256 | Moderate: python3 security update | 2024-01-15T00:00:00Z | 2024-01-16T18:53:05Z |
| alsa-2024:0253 | Moderate: sqlite security update | 2024-01-15T00:00:00Z | 2024-01-16T19:17:29Z |
| alsa-2024:0158 | Important: .NET 6.0 security update | 2024-01-10T00:00:00Z | 2024-01-11T18:37:05Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2021-1332 | Invalid-free in swift_unexpectedError | 2021-09-20T00:00:14.317470Z | 2022-04-13T03:04:35.860262Z |
| osv-2021-1330 | Heap-buffer-overflow in parse_content_length | 2021-09-19T00:01:45.327292Z | 2022-04-13T03:04:37.758340Z |
| osv-2021-1322 | Heap-buffer-overflow in cdf_read_property_info | 2021-09-19T00:00:35.246398Z | 2022-04-13T03:04:30.810696Z |
| osv-2021-1319 | Heap-buffer-overflow in geos::operation::valid::PolygonNode::isInteriorSegment | 2021-09-19T00:00:07.077782Z | 2022-04-13T03:04:36.757432Z |
| osv-2021-1317 | Use-of-uninitialized-value in std::__1::basic_ostream<char, std::__1::char_traits<char> >& std::__1::__put_cha | 2021-09-18T00:01:38.031586Z | 2022-04-13T03:04:31.432910Z |
| osv-2021-1316 | Stack-buffer-overflow in Assimp::ZipArchiveIOSystem::Implement::MapArchive | 2021-09-18T00:01:34.920205Z | 2022-04-13T03:04:42.667817Z |
| osv-2021-1314 | Use-of-uninitialized-value in LoadBinarySchema | 2021-09-18T00:01:28.793578Z | 2022-04-13T03:04:42.024738Z |
| osv-2021-1312 | Use-of-uninitialized-value in std::__1::basic_ostream<char, std::__1::char_traits<char> >& std::__1::__put_cha | 2021-09-18T00:01:03.273096Z | 2022-04-13T03:04:31.443505Z |
| osv-2021-1311 | Null-dereference READ in unzOpenCurrentFile3 | 2021-09-18T00:00:37.776159Z | 2022-04-13T03:04:42.679623Z |
| osv-2021-1310 | Heap-use-after-free in hb_resolve_overflows | 2021-09-18T00:00:25.727046Z | 2022-04-13T03:04:33.258700Z |
| osv-2021-1309 | Heap-buffer-overflow in ext2fs_dinode_copy | 2021-09-18T00:00:18.281968Z | 2022-04-13T03:04:36.448065Z |
| osv-2021-1305 | Use-of-uninitialized-value in std::__1::basic_ostream<char, std::__1::char_traits<char> >& std::__1::__put_cha | 2021-09-17T00:01:40.665077Z | 2022-04-13T03:04:32.377836Z |
| osv-2021-1301 | Use-of-uninitialized-value in std::__1::__hash_iterator<std::__1::__hash_node<std::__1::__hash_value_type<std: | 2021-09-17T00:01:36.462295Z | 2022-04-13T03:04:39.662150Z |
| osv-2021-1300 | UNKNOWN READ in get_body | 2021-09-17T00:01:33.668747Z | 2022-04-13T03:04:37.727198Z |
| osv-2021-1287 | Use-of-uninitialized-value in piex::image_type_recognition::ContainsNikonSignatures | 2021-09-17T00:00:35.215722Z | 2022-04-13T03:04:39.505395Z |
| osv-2021-1275 | Use-of-uninitialized-value in std::__1::basic_ostream<char, std::__1::char_traits<char> >& std::__1::__put_cha | 2021-09-17T00:00:13.564872Z | 2022-04-13T03:04:32.383997Z |
| osv-2021-1269 | Use-of-uninitialized-value in std::__1::basic_ostream<char, std::__1::char_traits<char> >& std::__1::__put_cha | 2021-09-17T00:00:07.966622Z | 2022-04-13T03:04:32.390354Z |
| osv-2021-1266 | UNKNOWN WRITE in void AK::BumpAllocator<true, 2097152ul>::for_each_chunk<AK::UniformBumpAllocator | 2021-09-16T00:00:19.187563Z | 2022-04-13T03:04:32.129544Z |
| osv-2021-1262 | Heap-buffer-overflow in H5O__chunk_deserialize | 2021-09-15T00:01:43.515380Z | 2022-04-13T03:04:43.070356Z |
| osv-2021-1261 | UNKNOWN READ in kh_get_ucl_hash_node | 2021-09-15T00:00:41.384284Z | 2026-02-17T14:15:50.348749Z |
| osv-2021-1258 | Bad-cast to SplashPattern from invalid vptr | 2021-09-15T00:00:11.560834Z | 2022-04-13T03:04:37.235796Z |
| osv-2021-1257 | Stack-buffer-overflow in GRIBDataset::Open | 2021-09-14T00:01:43.346984Z | 2022-04-13T03:04:42.155223Z |
| osv-2021-1250 | Segv on unknown address in ft_free | 2021-09-14T00:00:09.257971Z | 2022-04-13T03:04:37.307853Z |
| osv-2021-1249 | Heap-buffer-overflow in int flatbuffers::ReadScalar<int> | 2021-09-14T00:00:07.321535Z | 2022-04-13T03:04:42.051274Z |
| osv-2021-1246 | Heap-buffer-overflow in FSE_writeNCount_generic | 2021-09-13T00:00:35.678119Z | 2022-04-13T03:04:31.669800Z |
| osv-2021-1241 | Heap-buffer-overflow in wabt::string_view::compare | 2021-09-12T00:01:27.535685Z | 2023-09-16T14:07:19.262111Z |
| osv-2021-1239 | Heap-buffer-overflow in stbi__load_and_postprocess_8bit | 2021-09-12T00:01:05.421369Z | 2022-04-13T03:04:40.826791Z |
| osv-2021-1238 | UNKNOWN READ in cdf_read_property_info | 2021-09-12T00:00:57.129964Z | 2022-04-13T03:04:30.837467Z |
| osv-2021-1237 | Heap-buffer-overflow in ih264d_parse_decode_slice | 2021-09-12T00:00:40.701615Z | 2023-02-24T01:42:22.584425Z |
| osv-2021-1236 | UNKNOWN READ in icu_70::UCharsTrie::branchNext | 2021-09-12T00:00:39.088726Z | 2023-02-24T02:18:55.717212Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-dotnet-2024-38081 | .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability | 2024-08-20T07:18:07.714Z | 2025-05-20T10:02:07.006Z |
| bit-cilium-2024-42486 | Cilium vulnerable to information leakage via incorrect ReferenceGrant update logic in Gateway API | 2024-08-20T07:17:08.114Z | 2025-09-04T09:06:08.228Z |
| bit-python-2024-6923 | Email header injection due to unquoted newlines | 2024-08-19T09:33:54.548Z | 2025-11-06T13:25:46.476Z |
| bit-dotnet-2024-38167 | .NET and Visual Studio Information Disclosure Vulnerability | 2024-08-17T07:17:18.748Z | 2025-05-20T10:02:07.006Z |
| bit-dotnet-2024-38168 | .NET and Visual Studio Denial of Service Vulnerability | 2024-08-17T07:17:03.951Z | 2025-05-20T10:02:07.006Z |
| bit-cilium-2024-42487 | Cilium's Gateway API route matching order contradicts specification | 2024-08-17T07:16:43.256Z | 2025-05-20T10:02:07.006Z |
| bit-cilium-2024-42488 | Cilium agent's race condition may lead to policy bypass for Host Firewall policy | 2024-08-17T07:16:31.051Z | 2025-05-20T10:02:07.006Z |
| bit-nginx-2024-7347 | NGINX MP4 module vulnerability | 2024-08-16T07:27:39.450Z | 2025-11-06T13:25:46.476Z |
| bit-postgresql-2024-7348 | PostgreSQL relation replacement during pg_dump executes arbitrary SQL | 2024-08-10T07:32:17.691Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-2800 | Uncontrolled Resource Consumption in GitLab | 2024-08-10T07:28:58.601Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-3035 | Authorization Bypass Through User-Controlled Key in GitLab | 2024-08-10T07:27:41.389Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-3114 | Uncontrolled Resource Consumption in GitLab | 2024-08-10T07:27:12.594Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-3958 | Improper Control of Generation of Code ('Code Injection') in GitLab | 2024-08-10T07:26:42.995Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-4207 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2024-08-10T07:25:14.194Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-4210 | Uncontrolled Resource Consumption in GitLab | 2024-08-10T07:24:57.497Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-4784 | Authentication Bypass by Primary Weakness in GitLab | 2024-08-10T07:23:52.701Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-5423 | Uncontrolled Resource Consumption in GitLab | 2024-08-10T07:22:13.593Z | 2025-05-20T10:02:07.006Z |
| bit-jupyterhub-2024-41942 | JupyterHub has a privilege escalation vulnerability with the `admin:users` scope | 2024-08-10T07:22:10.997Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-6329 | Improper Encoding or Escaping of Output in GitLab | 2024-08-10T07:20:44.297Z | 2025-05-20T10:02:07.006Z |
| bit-harbor-2024-22278 | Harbor fails to validate the user permissions when updating project configurations | 2024-08-10T07:20:13.895Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-7554 | Exposure of Sensitive Information to an Unauthorized Actor in GitLab | 2024-08-10T07:18:59.092Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-7610 | Uncontrolled Resource Consumption in GitLab | 2024-08-10T07:18:42.094Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-38276 | moodle: CSRF risks due to misuse of confirm_sesskey | 2024-08-09T07:26:18.452Z | 2025-05-20T10:02:07.006Z |
| bit-jenkins-2024-43044 | 2024-08-09T07:23:05.050Z | 2025-04-03T14:40:37.652Z | |
| bit-jenkins-2024-43045 | 2024-08-09T07:22:49.547Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2024-41989 | 2024-08-08T07:17:45.895Z | 2025-11-06T13:25:46.476Z | |
| bit-django-2024-41990 | 2024-08-08T07:17:28.897Z | 2025-11-06T13:25:46.476Z | |
| bit-django-2024-41991 | 2024-08-08T07:17:15.604Z | 2025-11-06T13:25:46.476Z | |
| bit-django-2024-42005 | 2024-08-08T07:17:01.495Z | 2025-11-06T13:25:46.476Z | |
| bit-wordpress-2024-3992 | 2024-08-06T10:14:12.806Z | 2025-03-24T17:31:38.612Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2024-avi-0687 | Multiples vulnérabilités dans Mitel Unify OpenScape Business Application | 2024-08-16T00:00:00.000000 | 2024-08-16T00:00:00.000000 |
| certfr-2024-avi-0686 | Multiples vulnérabilités dans Xen | 2024-08-16T00:00:00.000000 | 2024-08-16T00:00:00.000000 |
| certfr-2024-avi-0685 | Vulnérabilité dans SolarWinds Web Help Desk | 2024-08-16T00:00:00.000000 | 2024-08-16T00:00:00.000000 |
| certfr-2024-avi-0684 | Multiples vulnérabilités dans les produits Microsoft | 2024-08-14T00:00:00.000000 | 2024-08-14T00:00:00.000000 |
| certfr-2024-avi-0683 | Multiples vulnérabilités dans Microsoft Azure | 2024-08-14T00:00:00.000000 | 2024-08-14T00:00:00.000000 |
| certfr-2024-avi-0682 | Multiples vulnérabilités dans Microsoft .Net | 2024-08-14T00:00:00.000000 | 2024-08-14T00:00:00.000000 |
| certfr-2024-avi-0681 | Multiples vulnérabilités dans Microsoft Windows | 2024-08-14T00:00:00.000000 | 2024-08-14T00:00:00.000000 |
| certfr-2024-avi-0680 | Multiples vulnérabilités dans Microsoft Office | 2024-08-14T00:00:00.000000 | 2024-08-14T00:00:00.000000 |
| certfr-2024-avi-0679 | Multiples vulnérabilités dans les produits Intel | 2024-08-14T00:00:00.000000 | 2024-08-14T00:00:00.000000 |
| certfr-2024-avi-0678 | Multiples vulnérabilités dans les produits Adobe | 2024-08-14T00:00:00.000000 | 2024-08-14T00:00:00.000000 |
| certfr-2024-avi-0677 | Multiples vulnérabilités dans les produits Fortinet | 2024-08-14T00:00:00.000000 | 2024-08-14T00:00:00.000000 |
| certfr-2024-avi-0676 | Multiples vulnérabilités dans Tenable Security Center | 2024-08-14T00:00:00.000000 | 2024-08-14T00:00:00.000000 |
| certfr-2024-avi-0675 | Multiples vulnérabilités dans Nagios XI | 2024-08-14T00:00:00.000000 | 2024-08-14T00:00:00.000000 |
| certfr-2024-avi-0674 | Multiples vulnérabilités dans Zabbix | 2024-08-13T00:00:00.000000 | 2024-08-13T00:00:00.000000 |
| certfr-2024-avi-0673 | Multiples vulnérabilités dans les produits Schneider Electric | 2024-08-13T00:00:00.000000 | 2024-08-13T00:00:00.000000 |
| certfr-2024-avi-0672 | Multiples vulnérabilités dans les produits Siemens | 2024-08-13T00:00:00.000000 | 2024-08-16T00:00:00.000000 |
| certfr-2024-avi-0671 | Multiples vulnérabilités dans les produits SAP | 2024-08-13T00:00:00.000000 | 2024-08-13T00:00:00.000000 |
| certfr-2024-avi-0670 | Multiples vulnérabilités dans Splunk Machine Learning Toolkit | 2024-08-13T00:00:00.000000 | 2024-08-13T00:00:00.000000 |
| certfr-2024-avi-0669 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| certfr-2024-avi-0668 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| certfr-2024-avi-0667 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| certfr-2024-avi-0666 | Multiples vulnérabilités dans les produits IBM | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| certfr-2024-avi-0665 | Multiples vulnérabilités dans Microsoft Edge | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| certfr-2024-avi-0664 | Vulnérabilité dans PostgreSQL | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| certfr-2024-avi-0663 | Vulnérabilité dans Asterisk | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| certfr-2024-avi-0662 | Vulnérabilité dans MongoDB | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| certfr-2024-avi-0661 | Multiples vulnérabilités dans les produits Cisco | 2024-08-08T00:00:00.000000 | 2024-08-08T00:00:00.000000 |
| certfr-2024-avi-0660 | Multiples vulnérabilités dans Microsoft Windows | 2024-08-08T00:00:00.000000 | 2024-08-08T00:00:00.000000 |
| certfr-2024-avi-0659 | Multiples vulnérabilités dans GitLab | 2024-08-08T00:00:00.000000 | 2024-08-08T00:00:00.000000 |
| certfr-2024-avi-0658 | Multiples vulnérabilités dans Google Chrome | 2024-08-07T00:00:00.000000 | 2024-08-07T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2015-000019 | Squid input validation vulnerability | 2015-02-20T14:55+09:00 | 2015-03-06T14:57+09:00 |
| jvndb-2015-000021 | AL-Mail32 vulnerable to denial-of-service (DoS) | 2015-02-20T14:54+09:00 | 2015-02-24T16:37+09:00 |
| jvndb-2015-000020 | AL-Mail32 vulnerable to directory traversal | 2015-02-20T14:37+09:00 | 2015-02-24T16:38+09:00 |
| jvndb-2015-000018 | C-BOARD Moyuku vulnerable to arbitrary file creation | 2015-02-17T14:21+09:00 | 2015-04-07T17:57+09:00 |
| jvndb-2015-000017 | Saurus CMS Community Edition vulnerable to cross-site scripting | 2015-02-17T14:20+09:00 | 2015-04-08T15:20+09:00 |
| jvndb-2015-001269 | Cross-site Scripting Vulnerability in Hitachi Application Server Help | 2015-02-16T11:21+09:00 | 2015-03-03T16:59+09:00 |
| jvndb-2015-001268 | Cross-site Scripting Vulnerability in Hitachi Command Suite Products | 2015-02-16T11:12+09:00 | 2015-03-03T16:59+09:00 |
| jvndb-2015-000016 | Smartphone Passbook for Android information management vulnerability | 2015-02-13T14:33+09:00 | 2015-05-21T10:05+09:00 |
| jvndb-2015-000015 | Smartphone Passbook fails to verify SSL server certificates | 2015-02-13T14:32+09:00 | 2018-03-07T13:50+09:00 |
| jvndb-2015-000014 | PerlTreeBBS vulnerable to cross-site scripting | 2015-02-13T13:58+09:00 | 2015-02-13T13:58+09:00 |
| jvndb-2015-000013 | shiromuku(u1)GUESTBOOK vulnerable to cross-site scripting | 2015-02-13T13:58+09:00 | 2015-02-13T13:58+09:00 |
| jvndb-2015-000001 | Cybozu Remote Service Manager vulnerable to denial-of-service (DoS) | 2015-01-30T14:19+09:00 | 2015-01-30T14:19+09:00 |
| jvndb-2015-000010 | Fumy News Clipper vulnerable to cross-site scripting | 2015-01-30T13:52+09:00 | 2015-02-16T15:55+09:00 |
| jvndb-2015-000007 | Arbitrary files may be overwritten in multiple VMware products | 2015-01-29T13:52+09:00 | 2015-02-16T15:34+09:00 |
| jvndb-2015-000012 | Multiple ASUS wireless LAN routers vulnerable to cross-site request forgery | 2015-01-27T14:24+09:00 | 2015-06-17T16:42+09:00 |
| jvndb-2015-000011 | Multiple ASUS wireless LAN routers vulnerable to OS command injection | 2015-01-27T14:23+09:00 | 2015-06-17T16:42+09:00 |
| jvndb-2015-000009 | NP-BBRM vulnerable in UPnP functionality | 2015-01-26T13:42+09:00 | 2015-08-18T14:36+09:00 |
| jvndb-2015-000008 | shiromuku(bu2)BBS vulnerable to arbitrary file creation | 2015-01-23T14:22+09:00 | 2015-02-13T09:51+09:00 |
| jvndb-2015-000006 | SYNCK GRAPHICA Download Log CGI vulnerable to directory traversal | 2015-01-19T13:54+09:00 | 2015-02-13T15:09+09:00 |
| jvndb-2014-000152 | WBS Gantt-Chart for JIRA vulnerable to cross-site scripting | 2014-12-18T14:49+09:00 | 2014-12-22T17:33+09:00 |
| jvndb-2014-000151 | WBS Gantt-Chart for JIRA vulnerable to cross-site scripting | 2014-12-18T14:48+09:00 | 2014-12-22T17:30+09:00 |
| jvndb-2014-000132 | Multiple Allied Telesis products vulnerable to buffer overflow | 2014-12-18T14:47+09:00 | 2015-01-28T17:38+09:00 |
| jvndb-2014-000124 | TSUTAYA App for Android vulnerable to arbitrary Java method execution | 2014-12-18T13:41+09:00 | 2014-12-22T17:52+09:00 |
| jvndb-2014-005987 | Multiple Vulnerabilities in JP1/Cm2/Network Node Manager i | 2014-12-16T17:31+09:00 | 2016-02-26T17:52+09:00 |
| jvndb-2014-005986 | Multiple buffer overflows in Hitachi JP1/Cm2/Network Node Manager i | 2014-12-16T17:30+09:00 | 2016-02-26T17:32+09:00 |
| jvndb-2014-000150 | LinPHA vulnerable to cross-site scripting | 2014-12-12T13:48+09:00 | 2014-12-16T17:07+09:00 |
| jvndb-2014-000149 | Chyrp vulnerable to cross-site scripting | 2014-12-10T14:18+09:00 | 2014-12-15T18:06+09:00 |
| jvndb-2014-000146 | i-HTTPD vulnerable to cross-site scripting | 2014-12-09T14:45+09:00 | 2014-12-09T14:45+09:00 |
| jvndb-2014-000145 | "Omake BBS" of i-HTTPD vulnerable to cross-site scripting | 2014-12-09T14:44+09:00 | 2014-12-15T19:16+09:00 |
| jvndb-2014-000144 | i-HTTPD vulnerable to cross-site scripting | 2014-12-09T14:41+09:00 | 2014-12-16T17:09+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-29742 | AMD Xilinx Run Time缓冲区溢出漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29741 | AMD Xilinx Run Time锁定保护不足漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29740 | AMD XOCL driver输入验证不当漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29739 | AMD uProf输入验证不当漏洞(CNVD-2025-29739) | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29738 | AMD uProf返回值处理不当漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29737 | AMD uProf输入验证不当漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29666 | IBM Concert加密问题漏洞 | 2025-11-27 | 2025-12-01 |
| cnvd-2025-29489 | WordPress Peer Publish plugin跨站请求伪造漏洞 | 2025-11-27 | 2025-11-27 |
| cnvd-2025-29488 | WordPress Locker Content plugin信息泄露漏洞 | 2025-11-27 | 2025-11-27 |
| cnvd-2025-29487 | WordPress Just Highlight plugin跨站脚本漏洞 | 2025-11-27 | 2025-11-27 |
| cnvd-2025-29486 | WordPress Job Board by BestWebSoft plugin跨站脚本漏洞 | 2025-11-27 | 2025-11-27 |
| cnvd-2025-29485 | WordPress iframe plugin跨站脚本漏洞 | 2025-11-27 | 2025-11-27 |
| cnvd-2025-29484 | WordPress Frontend File Manager Plugin不安全的直接对象引用漏洞 | 2025-11-27 | 2025-11-27 |
| cnvd-2025-29483 | WordPress EduKart Pro plugin权限提升漏洞 | 2025-11-27 | 2025-11-27 |
| cnvd-2025-29482 | WordPress Conditional Maintenance Mode plugin跨站请求伪造漏洞 | 2025-11-27 | 2025-11-27 |
| cnvd-2025-29481 | WordPress CIBELES AI plugin任意文件上传漏洞 | 2025-11-27 | 2025-11-27 |
| cnvd-2025-29480 | WordPress Chamber Dashboard Business Directory plugin未经授权的数据导出漏洞 | 2025-11-27 | 2025-11-27 |
| cnvd-2025-29479 | WordPress Autochat Automatic Conversation plugin未经授权修改数据漏洞 | 2025-11-27 | 2025-11-27 |
| cnvd-2025-29478 | WordPress AI Feeds plugin任意文件上传漏洞 | 2025-11-27 | 2025-11-27 |
| cnvd-2025-29477 | WordPress Admin and Customer Messages After Order for WooCommerce: OrderConvo plugin未授权访问漏洞 | 2025-11-27 | 2025-11-27 |
| cnvd-2025-29476 | WordPress Admin and Customer Messages After Order for WooCommerce: OrderConvo plugin缺失授权漏洞 | 2025-11-27 | 2025-11-27 |
| cnvd-2025-29475 | WordPress Ace Post Type Builder plugin未经授权的自定义分类法删除漏洞 | 2025-11-27 | 2025-11-27 |
| cnvd-2026-12149 | 用友网络科技股份有限公司U8 Cloud存在SQL注入漏洞(CNVD-2026-12149) | 2025-11-26 | 2026-02-28 |
| cnvd-2026-04466 | 北京神州视翰科技有限公司远程医疗综合服务平台存在SQL注入漏洞(CNVD-C-2025-928742) | 2025-11-26 | 2026-01-22 |
| cnvd-2026-12772 | WordPress插件Uncanny Automator信息泄露漏洞 | 2025-11-25 | 2026-03-06 |
| cnvd-2026-07567 | WordPress插件Tainacan信息泄露漏洞 | 2025-11-25 | 2026-01-28 |
| cnvd-2026-06604 | 上海锐昉科技有限公司RB企业管理系统存在SQL注入漏洞 | 2025-11-25 | 2026-01-23 |
| cnvd-2026-04441 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-926218) | 2025-11-25 | 2026-01-22 |
| cnvd-2026-04439 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-925400) | 2025-11-25 | 2026-01-22 |
| cnvd-2026-04438 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-925300) | 2025-11-25 | 2026-01-22 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-16037 | Уязвимость промышленной сетевой точки доступа Wi-Fi Rockwell Automation 1783-NATR, связан… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16036 | Уязвимость операционной системы Stratix IOS коммутаторов Stratix 5410, 5700 и 8000, связа… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16035 | Уязвимость программного обеспечения системы автоматизации FactoryTalk Linx, связанная с н… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16034 | Уязвимость аппаратного модуля ввода-вывода Rockwell Automation FLEX 5000 IO (5094-IF8), с… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16033 | Уязвимость микропрограммного обеспечения встраиваемых плат Qualcomm, связанная с недостат… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16032 | Уязвимость микропрограммного обеспечения встраиваемых плат Qualcomm, связанная с использо… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16031 | Уязвимость операционных систем QuTS hero и QTS сетевых устройств Qnap, связанная с исполь… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16030 | Уязвимость операционных систем QuTS hero и QTS сетевых устройств Qnap, связанная с исполь… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16029 | Уязвимость программного средства для резервного копирования и аварийного восстановления H… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16028 | Уязвимость операционных систем QuTS hero и QTS сетевых устройств Qnap, связанная с исполь… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16027 | Уязвимость приложения для синхронизации файлов Qsync Central, связанная с неограниченным … | 17.12.2025 | 17.12.2025 |
| bdu:2025-16026 | Уязвимость приложения для синхронизации файлов Qsync Central, связанная с непринятием мер… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16025 | Уязвимость программного обеспечения резервного копирования NetBak Replicator, связанная с… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16024 | Уязвимость приложения для синхронизации файлов Qsync Central, связанная с неограниченным … | 17.12.2025 | 17.12.2025 |
| bdu:2025-16023 | Уязвимость приложения для синхронизации файлов Qsync Central, связанная с непринятием мер… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16022 | Уязвимость пакета Palo Alto Networks Cortex XDR Microsoft 365 Defender Pack, связанная с … | 17.12.2025 | 17.12.2025 |
| bdu:2025-16021 | Уязвимость программного обеспечения сбора и управления учетными записями User-ID Credenti… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16020 | Уязвимость программного средства для обеспечения безопасного удаленного доступа к данным … | 17.12.2025 | 17.12.2025 |
| bdu:2025-16019 | Уязвимость обработчика заголовка ответов ngx_mail_smtp_ веб-серверов NGINX Plus и NGINX O… | 17.12.2025 | 26.12.2025 |
| bdu:2025-16018 | Уязвимость приложения для обмена мгновенными сообщениями Mattermost, связанная с неконтр… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16017 | Уязвимость приложения для обмена мгновенными сообщениями Mattermost, связанная с недостат… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16016 | Уязвимость функции Open in Channel приложения для обмена мгновенными сообщениями Mattermo… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16015 | Уязвимость компонента WebSocket приложения для обмена мгновенными сообщениями Mattermost,… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16014 | Уязвимость плагина MSTeams приложения для обмена мгновенными сообщениями Mattermost, позв… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16013 | Уязвимость компонента API приложения для обмена мгновенными сообщениями Mattermost, позво… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16012 | Уязвимость приложения для обмена мгновенными сообщениями Mattermost, связанная с ошибками… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16011 | Уязвимость мобильного приложения для обмена мгновенными сообщениями Mattermost Mobile App… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16010 | Уязвимость приложения для обмена мгновенными сообщениями Mattermost, связанная с чрезмерн… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16009 | Уязвимость приложения для обмена мгновенными сообщениями Mattermost, связанная с использо… | 17.12.2025 | 17.12.2025 |
| bdu:2025-16008 | Уязвимость приложения для обмена мгновенными сообщениями Mattermost, связанная с неправил… | 17.12.2025 | 17.12.2025 |
| ID | Description | Updated |
|---|---|---|
| var-202309-2808 | D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via websGetVar function. D-Link … | 2025-11-19T23:33:09.364000Z |
| var-202403-0813 | A vulnerability, which was classified as problematic, has been found in Tenda AC15 15.03.… | 2025-11-19T23:33:08.511000Z |
| var-202508-2473 | A security vulnerability has been detected in D-Link DI-500WF 14.04.10A1T. The impacted e… | 2025-11-19T23:33:01.936000Z |
| var-202509-3075 | Improper Input Validation vulnerability in TOTOLINK X6000R allows Flooding.This issue aff… | 2025-11-19T23:33:01.699000Z |
| var-202509-4499 | The LR350 is a wireless router. The TOTOLINK LR350 contains a stack overflow vulnerabili… | 2025-11-19T23:33:01.600000Z |
| var-202510-1108 | When an iRule is configured on a virtual server via the declarative API, upon re-instanti… | 2025-11-19T23:33:01.549000Z |
| var-202510-2641 | Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow via the deviceId pa… | 2025-11-19T23:33:01.091000Z |
| var-202511-0004 | A vulnerability was found in Tenda A15 15.13.07.13. Affected is the function fromSetWirel… | 2025-11-19T23:33:00.612000Z |
| var-202309-2802 | D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWAN_Wizard55 function… | 2025-11-19T23:32:17.896000Z |
| var-202309-2823 | D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWanPPPoE function. D-… | 2025-11-19T23:32:17.874000Z |
| var-202509-2299 | Buffer overflow vulnerability in D-Link DI-7100G 2020-02-21 in the sub_451754 function of… | 2025-11-19T23:32:10.573000Z |
| var-202510-0756 | When the database variable tm.tcpudptxchecksum is configured as non-default value Softwar… | 2025-11-19T23:32:10.348000Z |
| var-202510-0903 | Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the cloneType para… | 2025-11-19T23:32:10.327000Z |
| var-202510-2077 | Dell Secure Connect Gateway (SCG) 5.0 Application and Appliance version(s) 5.26.00.00 - 5… | 2025-11-19T23:32:10.231000Z |
| var-202511-0870 | A stack-based buffer overflow exists in the get_merge_mac function of the httpd binary on… | 2025-11-19T23:32:08.813000Z |
| var-202509-1746 | A vulnerability has been found in Tenda AC23 up to 16.03.07.52. Affected by this vulnerab… | 2025-11-19T23:31:47.450000Z |
| var-202510-2086 | Tenda AC6 V2.0 15.03.06.50 was discovered to contain a buffer overflow in the speed_dir p… | 2025-11-19T23:31:47.156000Z |
| var-202510-2149 | D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime … | 2025-11-19T23:31:47.130000Z |
| var-202510-2191 | A flaw has been found in Tenda CH22 1.0.0.1. Affected by this issue is the function fromS… | 2025-11-19T23:31:47.101000Z |
| var-202510-2359 | D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the next_pag… | 2025-11-19T23:31:47.001000Z |
| var-202510-3241 | The Cisco SPA514G is an IP telephony-enabled device featuring four voice lines, a Gigabit… | 2025-11-19T23:31:46.550000Z |
| var-202212-0076 | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the ssid param… | 2025-11-19T23:31:00.748000Z |
| var-202305-2373 | A vulnerability classified as critical was found in Tenda AC6 US_AC6V1.0BR_V15.03.05.19. … | 2025-11-19T23:30:59.977000Z |
| var-202403-0765 | A vulnerability was found in Tenda AC15 15.03.05.18/15.03.20_multi. It has been rated as … | 2025-11-19T23:30:58.676000Z |
| var-202508-2573 | Tenda AC15 v15.03.05.19_multi_TD01 has a stack overflow via the list parameter in the fro… | 2025-11-19T23:30:51.736000Z |
| var-202509-3067 | Tenda AC6 router firmware 15.03.05.19 contains a command injection vulnerability in the f… | 2025-11-19T23:30:51.518000Z |
| var-202509-3762 | A vulnerability was determined in Tenda CH22 1.0.0.1. This vulnerability affects the func… | 2025-11-19T23:30:51.451000Z |
| var-202509-4455 | The AC18 is a dual-band wireless router. The AC18 router developed by Shenzhen Jixiang T… | 2025-11-19T23:30:51.412000Z |
| var-202510-0265 | Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the wanSpeed param… | 2025-11-19T23:30:51.330000Z |
| var-202510-1083 | A vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) comma… | 2025-11-19T23:30:51.255000Z |