Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-33889 |
5.4 (3.1)
|
ApostropheCMS: Stored XSS via CSS Custom Property Inje… |
apostrophecms |
apostrophe |
2026-04-15T19:29:50.899Z | 2026-04-16T12:05:17.734Z |
| CVE-2026-33888 |
5.3 (3.1)
|
ApostropheCMS: publicApiProjection Bypass via `project… |
apostrophecms |
apostrophe |
2026-04-15T19:25:46.262Z | 2026-04-15T20:03:30.594Z |
| CVE-2026-21726 |
5.3 (3.1)
|
Loki Path Traversal - CVE-2021-36156 Bypass |
Grafana |
Loki |
2026-04-15T19:24:31.268Z | 2026-04-15T20:01:33.375Z |
| CVE-2026-6385 |
6.5 (3.1)
|
Ffmpeg: ffmpeg: denial of service and potential arbitr… |
Red Hat |
Lightspeed Core |
2026-04-15T19:18:39.354Z | 2026-04-15T20:01:15.671Z |
| CVE-2025-41118 |
9.1 (3.1)
|
Sensitive COS `SecretKey` exposed in plaintext via con… |
Grafana |
Pyroscope |
2026-04-15T19:15:17.689Z | 2026-04-15T19:33:10.329Z |
| CVE-2026-33877 |
3.7 (3.1)
|
ApostropheCMS: User Enumeration via Timing Side Channe… |
apostrophecms |
apostrophe |
2026-04-15T19:11:06.796Z | 2026-04-15T19:30:53.040Z |
| CVE-2026-6384 |
7.3 (3.1)
|
Gimp: gimp: arbitrary code execution or denial of serv… |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-04-15T19:09:10.587Z | 2026-04-16T03:56:19.004Z |
| CVE-2026-6364 |
6.5 (3.1)
|
Out of bounds read in Skia in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:59.385Z | 2026-04-16T13:53:06.236Z |
| CVE-2026-6319 |
7.5 (3.1)
|
Use after free in Payments in Google Chrome on An… |
Google |
Chrome |
2026-04-15T19:04:58.945Z | 2026-04-16T09:58:55.486Z |
| CVE-2026-6318 |
8.8 (3.1)
|
Use after free in Codecs in Google Chrome prior t… |
Google |
Chrome |
2026-04-15T19:04:58.495Z | 2026-04-16T09:58:26.278Z |
| CVE-2026-6363 |
8.8 (3.1)
|
Type Confusion in V8 in Google Chrome prior to 14… |
Google |
Chrome |
2026-04-15T19:04:57.982Z | 2026-04-16T03:55:45.999Z |
| CVE-2026-6317 |
8.8 (3.1)
|
Use after free in Cast in Google Chrome prior to … |
Google |
Chrome |
2026-04-15T19:04:57.557Z | 2026-04-16T03:55:47.518Z |
| CVE-2026-6362 |
6.3 (3.1)
|
Use after free in Codecs in Google Chrome prior t… |
Google |
Chrome |
2026-04-15T19:04:57.143Z | 2026-04-16T13:23:13.559Z |
| CVE-2026-6361 |
7.2 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome o… |
Google |
Chrome |
2026-04-15T19:04:56.740Z | 2026-04-16T10:00:46.711Z |
| CVE-2026-6316 |
8.8 (3.1)
|
Use after free in Forms in Google Chrome prior to… |
Google |
Chrome |
2026-04-15T19:04:56.345Z | 2026-04-16T03:55:49.002Z |
| CVE-2026-6315 |
8.8 (3.1)
|
Use after free in Permissions in Google Chrome on… |
Google |
Chrome |
2026-04-15T19:04:55.935Z | 2026-04-16T03:55:50.553Z |
| CVE-2026-6314 |
8.3 (3.1)
|
Out of bounds write in GPU in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:55.460Z | 2026-04-16T03:56:07.922Z |
| CVE-2026-6313 |
3.1 (3.1)
|
Insufficient policy enforcement in CORS in Google… |
Google |
Chrome |
2026-04-15T19:04:54.889Z | 2026-04-15T20:00:40.125Z |
| CVE-2026-6312 |
3.1 (3.1)
|
Insufficient policy enforcement in Passwords in G… |
Google |
Chrome |
2026-04-15T19:04:54.385Z | 2026-04-15T19:59:44.768Z |
| CVE-2026-6311 |
8.3 (3.1)
|
Uninitialized Use in Accessibility in Google Chro… |
Google |
Chrome |
2026-04-15T19:04:53.973Z | 2026-04-16T03:56:12.695Z |
| CVE-2026-6310 |
8.3 (3.1)
|
Use after free in Dawn in Google Chrome prior to … |
Google |
Chrome |
2026-04-15T19:04:53.589Z | 2026-04-16T03:56:06.808Z |
| CVE-2026-6360 |
8.8 (3.1)
|
Use after free in FileSystem in Google Chrome pri… |
Google |
Chrome |
2026-04-15T19:04:53.135Z | 2026-04-16T03:56:09.052Z |
| CVE-2026-6309 |
8.3 (3.1)
|
Use after free in Viz in Google Chrome prior to 1… |
Google |
Chrome |
2026-04-15T19:04:52.730Z | 2026-04-16T03:56:05.365Z |
| CVE-2026-6308 |
7.5 (3.1)
|
Out of bounds read in Media in Google Chrome prio… |
Google |
Chrome |
2026-04-15T19:04:52.265Z | 2026-04-16T09:57:13.931Z |
| CVE-2026-6307 |
8.8 (3.1)
|
Type Confusion in Turbofan in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:51.835Z | 2026-04-16T03:55:59.049Z |
| CVE-2026-6306 |
8.8 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome p… |
Google |
Chrome |
2026-04-15T19:04:51.372Z | 2026-04-16T09:56:40.048Z |
| CVE-2026-6305 |
8.8 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome p… |
Google |
Chrome |
2026-04-15T19:04:50.926Z | 2026-04-16T03:56:17.490Z |
| CVE-2026-6304 |
8.3 (3.1)
|
Use after free in Graphite in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:50.503Z | 2026-04-16T03:56:03.915Z |
| CVE-2026-6303 |
8.8 (3.1)
|
Use after free in Codecs in Google Chrome prior t… |
Google |
Chrome |
2026-04-15T19:04:50.052Z | 2026-04-16T09:57:48.474Z |
| CVE-2026-6302 |
8.8 (3.1)
|
Use after free in Video in Google Chrome prior to… |
Google |
Chrome |
2026-04-15T19:04:49.608Z | 2026-04-16T03:56:00.581Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-6385 |
6.5 (3.1)
|
Ffmpeg: ffmpeg: denial of service and potential arbitr… |
Red Hat |
Lightspeed Core |
2026-04-15T19:18:39.354Z | 2026-04-15T20:01:15.671Z |
| CVE-2026-6384 |
7.3 (3.1)
|
Gimp: gimp: arbitrary code execution or denial of serv… |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-04-15T19:09:10.587Z | 2026-04-16T03:56:19.004Z |
| CVE-2026-6364 |
6.5 (3.1)
|
Out of bounds read in Skia in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:59.385Z | 2026-04-16T13:53:06.236Z |
| CVE-2026-6363 |
8.8 (3.1)
|
Type Confusion in V8 in Google Chrome prior to 14… |
Google |
Chrome |
2026-04-15T19:04:57.982Z | 2026-04-16T03:55:45.999Z |
| CVE-2026-6362 |
6.3 (3.1)
|
Use after free in Codecs in Google Chrome prior t… |
Google |
Chrome |
2026-04-15T19:04:57.143Z | 2026-04-16T13:23:13.559Z |
| CVE-2026-6361 |
7.2 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome o… |
Google |
Chrome |
2026-04-15T19:04:56.740Z | 2026-04-16T10:00:46.711Z |
| CVE-2026-6360 |
8.8 (3.1)
|
Use after free in FileSystem in Google Chrome pri… |
Google |
Chrome |
2026-04-15T19:04:53.135Z | 2026-04-16T03:56:09.052Z |
| CVE-2026-6359 |
8.8 (3.1)
|
Use after free in Video in Google Chrome on Windo… |
Google |
Chrome |
2026-04-15T19:04:48.203Z | 2026-04-16T03:55:55.574Z |
| CVE-2026-6358 |
8.8 (3.1)
|
Use after free in XR in Google Chrome on Android … |
Google |
Chrome |
2026-04-15T19:04:47.677Z | 2026-04-16T03:55:54.349Z |
| CVE-2026-6319 |
7.5 (3.1)
|
Use after free in Payments in Google Chrome on An… |
Google |
Chrome |
2026-04-15T19:04:58.945Z | 2026-04-16T09:58:55.486Z |
| CVE-2026-6318 |
8.8 (3.1)
|
Use after free in Codecs in Google Chrome prior t… |
Google |
Chrome |
2026-04-15T19:04:58.495Z | 2026-04-16T09:58:26.278Z |
| CVE-2026-6317 |
8.8 (3.1)
|
Use after free in Cast in Google Chrome prior to … |
Google |
Chrome |
2026-04-15T19:04:57.557Z | 2026-04-16T03:55:47.518Z |
| CVE-2026-6316 |
8.8 (3.1)
|
Use after free in Forms in Google Chrome prior to… |
Google |
Chrome |
2026-04-15T19:04:56.345Z | 2026-04-16T03:55:49.002Z |
| CVE-2026-6315 |
8.8 (3.1)
|
Use after free in Permissions in Google Chrome on… |
Google |
Chrome |
2026-04-15T19:04:55.935Z | 2026-04-16T03:55:50.553Z |
| CVE-2026-6314 |
8.3 (3.1)
|
Out of bounds write in GPU in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:55.460Z | 2026-04-16T03:56:07.922Z |
| CVE-2026-6313 |
3.1 (3.1)
|
Insufficient policy enforcement in CORS in Google… |
Google |
Chrome |
2026-04-15T19:04:54.889Z | 2026-04-15T20:00:40.125Z |
| CVE-2026-6312 |
3.1 (3.1)
|
Insufficient policy enforcement in Passwords in G… |
Google |
Chrome |
2026-04-15T19:04:54.385Z | 2026-04-15T19:59:44.768Z |
| CVE-2026-6311 |
8.3 (3.1)
|
Uninitialized Use in Accessibility in Google Chro… |
Google |
Chrome |
2026-04-15T19:04:53.973Z | 2026-04-16T03:56:12.695Z |
| CVE-2026-6310 |
8.3 (3.1)
|
Use after free in Dawn in Google Chrome prior to … |
Google |
Chrome |
2026-04-15T19:04:53.589Z | 2026-04-16T03:56:06.808Z |
| CVE-2026-6309 |
8.3 (3.1)
|
Use after free in Viz in Google Chrome prior to 1… |
Google |
Chrome |
2026-04-15T19:04:52.730Z | 2026-04-16T03:56:05.365Z |
| CVE-2026-6308 |
7.5 (3.1)
|
Out of bounds read in Media in Google Chrome prio… |
Google |
Chrome |
2026-04-15T19:04:52.265Z | 2026-04-16T09:57:13.931Z |
| CVE-2026-6307 |
8.8 (3.1)
|
Type Confusion in Turbofan in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:51.835Z | 2026-04-16T03:55:59.049Z |
| CVE-2026-6306 |
8.8 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome p… |
Google |
Chrome |
2026-04-15T19:04:51.372Z | 2026-04-16T09:56:40.048Z |
| CVE-2026-6305 |
8.8 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome p… |
Google |
Chrome |
2026-04-15T19:04:50.926Z | 2026-04-16T03:56:17.490Z |
| CVE-2026-6304 |
8.3 (3.1)
|
Use after free in Graphite in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:50.503Z | 2026-04-16T03:56:03.915Z |
| CVE-2026-6303 |
8.8 (3.1)
|
Use after free in Codecs in Google Chrome prior t… |
Google |
Chrome |
2026-04-15T19:04:50.052Z | 2026-04-16T09:57:48.474Z |
| CVE-2026-6302 |
8.8 (3.1)
|
Use after free in Video in Google Chrome prior to… |
Google |
Chrome |
2026-04-15T19:04:49.608Z | 2026-04-16T03:56:00.581Z |
| CVE-2026-6301 |
8.8 (3.1)
|
Type Confusion in Turbofan in Google Chrome prior… |
Google |
Chrome |
2026-04-15T19:04:49.077Z | 2026-04-16T03:55:57.939Z |
| CVE-2026-6300 |
8.8 (3.1)
|
Use after free in CSS in Google Chrome prior to 1… |
Google |
Chrome |
2026-04-15T19:04:48.606Z | 2026-04-16T03:55:56.815Z |
| CVE-2026-6299 |
8.8 (3.1)
|
Use after free in Prerender in Google Chrome prio… |
Google |
Chrome |
2026-04-15T19:04:47.116Z | 2026-04-16T03:55:53.177Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-pq6h-83gw-pj9p |
4.4 (3.1)
|
The OPEN-BRAIN plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'API Key' … | 2026-04-16T09:31:44Z | 2026-04-16T09:31:45Z |
| ghsa-m34r-4v3r-pp9v |
7.4 (3.1)
|
In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call… | 2026-04-16T09:31:44Z | 2026-04-16T21:31:12Z |
| ghsa-j38x-p248-237v |
8.8 (3.1)
|
The Career Section plugin for WordPress is vulnerable to Cross-Site Request Forgery leading to Path… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-8jmv-f2mx-h22c |
5.3 (3.1)
|
The Post Grid Gutenberg Blocks for News, Magazines, Blog Websites – PostX plugin for WordPress is v… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-4mcf-jj9c-gvp6 |
7.2 (3.1)
|
The Prismatic plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'prismatic_… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-2jv9-g2gr-pf4j |
6.4 (3.1)
|
The BetterDocs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'betterdoc… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-28j6-w975-f9x7 |
5.0 (3.1)
|
ONLYOFFICE DocumentServer before 9.3.0 has an untrusted pointer dereference in XLS processing/conve… | 2026-04-16T09:31:44Z | 2026-04-16T09:31:44Z |
| ghsa-jvgv-2979-qhcj |
6.4 (3.1)
|
The Livemesh Addons for Elementor plugin for WordPress is vulnerable to unauthorized modification o… | 2026-04-16T09:31:43Z | 2026-04-16T09:31:43Z |
| ghsa-9726-56v6-8wh4 |
6.4 (3.1)
|
The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for… | 2026-04-16T09:31:43Z | 2026-04-16T09:31:43Z |
| ghsa-xcvh-9j7m-6vw3 |
6.5 (3.1)
|
Eaton Intelligent Power Protector (IPP) software allows repeated authentication attempts against th… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-w622-v92m-9f53 |
6.0 (3.1)
|
Due to improper input validation in one of the Eaton Intelligent Power Protector (IPP) XML, it is p… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-w3cg-4gfc-vw5x |
7.8 (3.1)
|
Eaton Intelligent Power Protector (IPP) is affected by insecure library loading in its executable, … | 2026-04-16T06:31:23Z | 2026-04-16T15:31:32Z |
| ghsa-rhf4-34xg-3v3j |
6.3 (3.1)
5.1 (4.0)
|
UDP Console provided by Arcserve contains an incorrectly specified destination in a communication c… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-rg9x-pgh3-3gwf |
6.5 (3.1)
|
The Accessibility Suite by Ability, Inc plugin for WordPress is vulnerable to SQL Injection via the… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-m6jh-hgc7-xggx |
5.7 (3.1)
|
Eaton Intelligent Power Protector (IPP) uses an insecure cookie configuration, which could allow a … | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-jp62-r24w-285j |
6.4 (3.1)
|
The WP Docs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpdocs_optio… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-hjc2-4gp6-gj54 |
4.3 (3.1)
|
In Wago Smart Designer in versions up to 2.33.1 a low privileged remote attacker may enumerate proj… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-gp63-xp8x-53g4 |
8.8 (3.1)
|
In products of the MSE6 product-family by Festo a remote authenticated, low privileged attacker cou… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-9ghh-rh79-4vmr |
5.9 (3.1)
|
A security misconfiguration was identified in Eaton Intelligent Power Protector (IPP), where an HTT… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-8m7q-ggj7-m3wx |
7.5 (3.1)
|
The Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection via the 'options' … | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-83mq-cmhp-6pvq |
6.1 (3.1)
|
The CodeColorer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' p… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-742g-5jmq-x7cr |
6.4 (3.1)
|
The Vantage theme for WordPress is vulnerable to Stored Cross-Site Scripting via Gallery block text… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-6pcx-jf98-3w2h |
7.5 (3.1)
|
The Payment Gateway for Redsys & WooCommerce Lite plugin for WordPress is vulnerable to Improper Ve… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-6cjg-w4wg-37mh |
9.8 (3.1)
|
The Riaxe Product Customizer plugin for WordPress is vulnerable to Privilege Escalation in all vers… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-4xx2-h7jh-g7ph |
4.4 (3.1)
|
The Custom New User Notification plugin for WordPress is vulnerable to Stored Cross-Site Scripting … | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-4g9p-x8vm-f7qg |
5.3 (3.1)
|
The Riaxe Product Customizer plugin for WordPress is vulnerable to authorization bypass in all vers… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-45x5-433g-pc2h |
5.3 (3.1)
|
The Basic Google Maps Placemarks plugin for WordPress is vulnerable to authorization bypass in vers… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-3phr-p473-vc8q |
8.8 (3.1)
|
The AcyMailing plugin for WordPress is vulnerable to privilege escalation in all versions From 9.11… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-wxm2-x9x9-x5mj |
9.3 (3.1)
|
Luanti 5 before 5.15.2, when LuaJIT is used, allows a Lua sandbox escape via a crafted mod. | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-wc72-m63f-4pcv |
6.4 (3.1)
|
The WP YouTube Lyte plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugi… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-86 |
4.9 (3.1)
|
Wagtail is an open source content management system built on Django. A bug in Wagtail's `… | wagtail | 2024-07-11T16:15:00+00:00 | 2024-09-19T19:20:17.668744+00:00 |
| pysec-2024-61 |
6.1 (3.1)
|
A Stored Cross-Site Scripting (XSS) vulnerability exists in gaizhenbiao/chuanhuchatgpt ve… | chuanhuchatgpt | 2024-07-11T11:15:00+00:00 | 2024-07-12T21:33:00.657381+00:00 |
| pysec-2024-59 |
|
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. get_supported_l… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.800540+00:00 |
| pysec-2024-58 |
|
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. Derived classes… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.704786+00:00 |
| pysec-2024-57 |
|
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. The django.cont… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.604887+00:00 |
| pysec-2024-56 |
|
An issue was discovered in Django 4.2 before 4.2.14 and 5.0 before 5.0.7. urlize and urli… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.495359+00:00 |
| pysec-2024-60 |
7.5 (3.1)
|
A vulnerability was identified in the kjd/idna library, specifically within the `idna.enc… | idna | 2024-07-07T18:15:00+00:00 | 2024-07-11T17:21:37.216928+00:00 |
| pysec-2024-230 |
7.5 (3.1)
|
Certifi is a curated collection of Root Certificates for validating the trustworthiness o… | certifi | 2024-07-05T19:15:10+00:00 | 2025-02-12T21:21:51.559667+00:00 |
| pysec-2024-176 |
6.1 (3.1)
|
A reflected Cross-Site Scripting (XSS) vulnerability was identified in zenml-io/zenml ver… | zenml | 2024-06-30T16:15:03+00:00 | 2025-01-18T22:21:45.122426+00:00 |
| pysec-2024-167 |
|
NLTK through 3.8.1 allows remote code execution if untrusted packages have pickled Python… | nltk | 2024-06-27T22:15:10+00:00 | 2025-01-18T19:19:06.317325+00:00 |
| pysec-2024-54 |
6.5 (3.1)
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-06-24T18:15:00+00:00 | 2024-06-26T19:19:24.981233+00:00 |
| pysec-2024-53 |
|
langchain_experimental (aka LangChain Experimental) before 0.0.61 for LangChain provides … | langchain-experimental | 2024-06-16T15:15:00+00:00 | 2024-06-16T17:20:32.187558+00:00 |
| pysec-2024-195 |
5.5 (3.1)
|
Use of Web Browser Cache Containing Sensitive Information vulnerability in Apache Airflow… | apache-airflow | 2024-06-14T09:15:09+00:00 | 2025-01-19T16:22:56.419822+00:00 |
| pysec-2024-98 |
9.8 (3.1)
|
** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Submarine… | apache-submarine | 2024-06-12T15:15:00+00:00 | 2024-09-26T17:22:54.526846+00:00 |
| pysec-2024-97 |
9.8 (3.1)
|
** UNSUPPORTED WHEN ASSIGNED ** Improper Authentication vulnerability in Apache Submarine… | apache-submarine | 2024-06-12T14:15:00+00:00 | 2024-09-26T17:22:54.470974+00:00 |
| pysec-2024-236 |
6.1 (3.1)
|
Jupyter Server Proxy allows users to run arbitrary external processes alongside their not… | jupyter-server-proxy | 2024-06-11T22:15:09+00:00 | 2025-02-26T23:22:41.524251+00:00 |
| pysec-2024-177 |
9.8 (3.1)
|
Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach… | langflow | 2024-06-10T20:15:15+00:00 | 2025-01-19T01:52:23.722576+00:00 |
| pysec-2024-52 |
|
lepture Authlib before 1.3.1 has algorithm confusion with asymmetric public keys. Unless … | authlib | 2024-06-09T19:15:00+00:00 | 2024-06-09T21:20:21.309692+00:00 |
| pysec-2024-76 |
7.5 (3.1)
|
An XML External Entity (XXE) vulnerability in the ebookmeta.get_metadata function of eboo… | ebookmeta | 2024-06-07T19:15:00+00:00 | 2024-09-13T21:22:04.531357+00:00 |
| pysec-2024-117 |
9.8 (3.1)
|
man-group/dtale version 3.10.0 is vulnerable to an authentication bypass and remote code … | dtale | 2024-06-06T19:16:00+00:00 | 2024-11-03T20:22:34.425699+00:00 |
| pysec-2024-110 |
4.7 (3.1)
|
A sensitive data leakage vulnerability was identified in scikit-learn's TfidfVectorizer, … | scikit-learn | 2024-06-06T19:16:00+00:00 | 2024-10-24T21:22:05.950602+00:00 |
| pysec-2024-108 |
7.5 (3.1)
|
A path traversal vulnerability exists in the parisneo/lollms application, affecting versi… | lollms | 2024-06-06T19:16:00+00:00 | 2024-10-17T17:21:59.592496+00:00 |
| pysec-2024-242 |
7.5 (3.1)
|
A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically … | mlflow | 2024-06-06T19:15:55+00:00 | 2025-04-08T10:23:24.995743+00:00 |
| pysec-2024-194 |
6.1 (3.1)
|
A clickjacking vulnerability exists in zenml-io/zenml versions up to and including 0.55.5… | zenml | 2024-06-06T19:15:54+00:00 | 2025-01-19T13:22:31.835293+00:00 |
| pysec-2024-193 |
3.3 (3.1)
|
An issue was discovered in zenml-io/zenml versions up to and including 0.55.4. Due to imp… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-19T13:22:31.701775+00:00 |
| pysec-2024-170 |
4.8 (3.1)
|
A stored Cross-Site Scripting (XSS) vulnerability was identified in the zenml-io/zenml re… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-18T19:19:08.253212+00:00 |
| pysec-2024-169 |
6.5 (3.1)
|
An improper authorization vulnerability exists in the zenml-io/zenml repository, specific… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-18T19:19:08.205431+00:00 |
| pysec-2024-239 |
8.8 (3.1)
|
A vulnerability in mlflow/mlflow version 8.2.1 allows for remote code execution due to im… | mlflow | 2024-06-06T19:15:51+00:00 | 2025-04-08T10:23:24.852109+00:00 |
| pysec-2024-118 |
4.7 (3.1)
|
A Denial-of-Service (DoS) vulnerability exists in the `SitemapLoader` class of the `langc… | langchain | 2024-06-06T19:15:00+00:00 | 2024-11-03T20:22:34.854295+00:00 |
| pysec-2024-105 |
3.1 (3.1)
|
A race condition vulnerability exists in zenml-io/zenml versions up to and including 0.55… | zenml | 2024-06-06T19:15:00+00:00 | 2024-10-11T17:21:29.672975+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2652 | Malicious code in onewin-landing (npm) | 2026-04-14T11:47:12Z | 2026-04-16T15:42:09Z |
| mal-2026-2650 | Malicious code in one-sdui (npm) | 2026-04-14T11:47:12Z | 2026-04-16T15:42:09Z |
| mal-2026-2643 | Malicious code in ms-affiliate-links (npm) | 2026-04-14T11:47:12Z | 2026-04-16T15:42:09Z |
| mal-2026-2640 | Malicious code in bytefrontier-core (npm) | 2026-04-14T11:47:12Z | 2026-04-16T15:42:08Z |
| mal-2026-2639 | Malicious code in bytefrontier (npm) | 2026-04-14T11:47:12Z | 2026-04-16T15:42:08Z |
| mal-2026-2638 | Malicious code in billing-paywidget (npm) | 2026-04-14T11:47:12Z | 2026-04-16T15:42:07Z |
| mal-2026-2651 | Malicious code in one-translations (npm) | 2026-04-14T11:47:11Z | 2026-04-16T15:42:09Z |
| mal-2026-2655 | Malicious code in tailwind-lines-clamp (npm) | 2026-04-14T11:38:14Z | 2026-04-14T11:38:15Z |
| mal-2026-2632 | Malicious code in magentaa11y (npm) | 2026-04-14T11:31:05Z | 2026-04-14T11:31:12Z |
| mal-2026-2634 | Malicious code in percy-cake-docker (npm) | 2026-04-14T11:31:04Z | 2026-04-14T11:31:05Z |
| mal-2026-2630 | Malicious code in gate-apis (PyPI) | 2026-04-14T10:23:40Z | 2026-04-14T10:23:40Z |
| mal-2026-2825 | Malicious code in centralogger (npm) | 2026-04-14T09:21:57Z | 2026-04-14T09:21:57Z |
| mal-2026-2826 | Malicious code in dom-utils-lite (npm) | 2026-04-14T09:21:35Z | 2026-04-14T09:21:35Z |
| mal-2026-2629 | Malicious code in stacks-editor (npm) | 2026-04-14T08:55:57Z | 2026-04-14T08:55:57Z |
| mal-2026-2628 | Malicious code in svchost (PyPI) | 2026-04-14T05:42:26Z | 2026-04-14T05:42:26Z |
| mal-2026-2627 | Malicious code in pckg-sv (PyPI) | 2026-04-14T05:35:20Z | 2026-04-14T05:35:20Z |
| mal-2026-2626 | Malicious code in getcardslib (npm) | 2026-04-14T00:07:56Z | 2026-04-14T00:07:56Z |
| mal-2026-2625 | Malicious code in robase-install (PyPI) | 2026-04-13T22:03:44Z | 2026-04-16T07:40:04Z |
| mal-2026-2624 | Malicious code in asciitoart (PyPI) | 2026-04-13T21:26:29Z | 2026-04-13T22:22:34Z |
| mal-2026-2623 | Malicious code in hive-setting (PyPI) | 2026-04-13T16:27:32Z | 2026-04-13T16:27:32Z |
| mal-2026-2621 | Malicious code in walmart-internal (npm) | 2026-04-13T15:33:47Z | 2026-04-13T15:33:47Z |
| mal-2026-2597 | Malicious code in @zgny/onboarding-consumer (npm) | 2026-04-13T15:25:22Z | 2026-04-13T15:25:30Z |
| mal-2026-2596 | Malicious code in @spreadjs/js-calc (npm) | 2026-04-13T15:25:22Z | 2026-04-13T15:25:30Z |
| mal-2026-2595 | Malicious code in @sports-api/api-sdk (npm) | 2026-04-13T15:25:22Z | 2026-04-16T15:42:07Z |
| mal-2026-2594 | Malicious code in @spoonflower/ui (npm) | 2026-04-13T15:25:22Z | 2026-04-13T15:25:30Z |
| mal-2026-2593 | Malicious code in @sage-active/ui (npm) | 2026-04-13T15:25:22Z | 2026-04-16T15:42:07Z |
| mal-2026-2592 | Malicious code in @relxui/react (npm) | 2026-04-13T15:25:22Z | 2026-04-13T15:25:30Z |
| mal-2026-2591 | Malicious code in @pes-ui/components (npm) | 2026-04-13T15:25:22Z | 2026-04-16T15:42:07Z |
| mal-2026-2590 | Malicious code in @op-microfrontends/config (npm) | 2026-04-13T15:25:22Z | 2026-04-16T15:42:07Z |
| mal-2026-2589 | Malicious code in @mx-shared/utils (npm) | 2026-04-13T15:25:22Z | 2026-04-13T15:25:30Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0566 | QEMU (qemu-kvm: virtio-snd): Mehrere Schwachstellen ermöglichen Codeausführung und DoS | 2026-03-02T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0565 | FreeType: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-03-02T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0564 | binutils (bfd linker): Mehrere Schwachstellen ermöglichen DoS und Offenlegung von Informationen | 2026-03-02T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0563 | Commvault Backup & Recovery: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-02T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0557 | OpenClaw: Mehrere Schwachstellen | 2026-03-01T23:00:00.000+00:00 | 2026-03-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0556 | vim: Mehrere Schwachstellen | 2026-03-01T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0554 | Red Hat Enterprise Linux (udisks): Mehrere Schwachstellen | 2026-03-01T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0551 | OpenClaw: Mehrere Schwachstellen | 2026-02-26T23:00:00.000+00:00 | 2026-03-11T23:00:00.000+00:00 |
| wid-sec-w-2026-0548 | Golang Go: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2026-02-26T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0547 | IBM MQ: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-02-26T23:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2026-0546 | Red Hat Enterprise Linux (Valkey): Mehrere Schwachstellen | 2026-02-26T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0544 | IBM QRadar SIEM: Mehrere Schwachstellen | 2026-02-26T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0542 | OpenClaw: Mehrere Schwachstellen | 2026-02-25T23:00:00.000+00:00 | 2026-04-12T22:00:00.000+00:00 |
| wid-sec-w-2026-0536 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-25T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0535 | Juniper JUNOS Evolved: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2026-02-25T23:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2026-0530 | Drupal Extensions: Mehrere Schwachstellen | 2026-02-25T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0526 | IBM App Connect Enterprise: Mehrere Schwachstellen | 2026-02-25T23:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2026-0525 | GStreamer: Mehrere Schwachstellen | 2026-02-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0520 | Dell PowerScale OneFS: Mehrere Schwachstellen | 2026-02-25T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0518 | IBM WebSphere Application Server Liberty: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-02-25T23:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2026-0516 | Cisco Catalyst SD-WAN Manager und SD-WAN Controller: Mehrere Schwachstellen | 2026-02-25T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0514 | FreeRDP: Mehrere Schwachstellen | 2026-02-24T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0509 | Trend Micro Apex One: Mehrere Schwachstellen | 2026-02-24T23:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2026-0508 | Keycloak: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-02-24T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0507 | util-linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-02-24T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0506 | FreeBSD Project FreeBSD OS: Mehrere Schwachstellen | 2026-02-24T23:00:00.000+00:00 | 2026-03-09T23:00:00.000+00:00 |
| wid-sec-w-2026-0505 | Devolutions Server: Mehrere Schwachstellen | 2026-02-24T23:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2026-0504 | Mattermost Server und Plugins: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2026-02-24T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0501 | OpenClaw: Mehrere Schwachstellen | 2026-02-24T23:00:00.000+00:00 | 2026-03-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0499 | ImageMagick: Mehrere Schwachstellen | 2026-02-24T23:00:00.000+00:00 | 2026-03-09T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-329-01 | Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, Cobalt Share | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-04 | Opto 22 groov View | 2025-11-25T06:00:00.000000Z | 2025-11-25T06:00:00.000000Z |
| icsa-25-324-06 | Emerson Appleton UPSMON-PRO | 2025-11-20T07:00:00.000000Z | 2025-11-20T07:00:00.000000Z |
| icsa-25-324-01 | Automated Logic WebCTRL Premium Server | 2025-11-20T07:00:00.000000Z | 2025-11-20T07:00:00.000000Z |
| icsa-25-324-03 | Opto 22 GRV-EPIC and groov RIO | 2025-11-20T06:00:00.000000Z | 2025-11-20T06:00:00.000000Z |
| icsa-25-324-02 | ICAM365 CCTV Camera Multiple Models | 2025-11-20T06:00:00.000000Z | 2025-11-20T06:00:00.000000Z |
| icsa-25-322-05 | METZ CONNECT EWIO2 | 2025-11-18T12:00:00.000000Z | 2025-11-18T12:00:00.000000Z |
| icsa-25-322-03 | Shelly Pro 3EM | 2025-11-18T07:00:00.000000Z | 2025-11-18T07:00:00.000000Z |
| icsa-25-322-02 | Shelly Pro 4PM | 2025-11-18T07:00:00.000000Z | 2025-11-18T07:00:00.000000Z |
| icsa-25-317-12 | Siemens Spectrum Power 4 | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-11 | Siemens SICAM P850 family and SICAM P855 family | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-10 | *Rockwell Automation AADvance-Trusted SIS Workstation * | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-09 | Rockwell Automation FactoryTalk Policy Manager | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-08 | General Industrial Controls Lynx+ Gateway | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-07 | Rockwell Automation FactoryTalk DataMosaix Private Cloud | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-06 | Rockwell Automation Studio 5000 Simulation Interface | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-05 | Rockwell Automation Verve Asset Manager | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-04 | Brightpick Mission Control / Internal Logic Control | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-03 | AVEVA Edge | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-02 | AVEVA Application Server IDE | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-01 | Mitsubishi Electric MELSEC iQ-F Series | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-322-04 | Schneider Electric PowerChute Serial Shutdown | 2025-11-11T08:00:00.000000Z | 2025-11-11T08:00:00.000000Z |
| icsa-25-322-01 | Schneider Electric EcoStruxure Machine SCADA Expert & Pro-face BLUE Open Studio | 2025-11-11T08:00:00.000000Z | 2025-11-11T08:00:00.000000Z |
| icsa-25-317-17 | Siemens Software Center and Solid Edge | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-16 | Siemens Altair Grid Engine | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-15 | Siemens COMOS | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-14 | Siemens Solid Edge | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-13 | Siemens LOGO! 8 BM Devices | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-310-03 | ABB FLXeon Controllers | 2025-11-06T07:00:00.000000Z | 2025-11-06T07:00:00.000000Z |
| icsa-25-310-02 | Ubia Ubox (Update A) | 2025-11-06T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-webex-xss-7teqtfn8 | Cisco Webex Services Cross-Site Scripting Vulnerabilities | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-webex-cache-q4xbkqbg | Cisco Webex Meetings Services HTTP Cache Poisoning Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sna-ssti-dpulqsmz | Cisco Secure Network Analytics Manager Privilege Escalation Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sna-apiacv-4b6x5ysw | Cisco Secure Network Analytics Manager API Authorization Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-ise-stored-xss-yff54m73 | Cisco Identity Services Stored Cross-Site Scripting Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-06-30T15:08:59+00:00 |
| cisco-sa-ise-restart-ss-uf986g2q | Cisco Identity Services Engine RADIUS Denial of Service Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-duo-ssp-cmd-inj-rcmyrna | Cisco Duo Self-Service Portal Command Injection Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-cuis-priv-esc-3pk96su4 | Cisco Unified Intelligence Center Privilege Escalation Vulnerabilities | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-cucm-kkhzbhr5 | Cisco Unified Communications Products Privilege Escalation Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-contcent-insuffacces-ardovhn8 | Cisco Unified Contact Center Enterprise Cloud Connect Insufficient Access Control Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-wlc-wncd-p6gvt6hl | Cisco IOS XE Software for WLC Wireless IPv6 Clients Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-wlc-file-uplpd-rhzg9ufc | Cisco IOS XE Wireless Controller Software Arbitrary File Upload Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-06-06T20:02:48+00:00 |
| cisco-sa-webui-multi-arnhm4v6 | Cisco IOS XE Software Web-Based Management Interface Vulnerabilities | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-webui-cmdinj-gvn3oknc | Cisco IOS XE Software Web-Based Management Interface Command Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-vmanage-xss-xhn8m5jt | Cisco Catalyst SD-WAN Manager Stored Cross-Site Scripting Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-vmanage-html-inj-gxvtk6zj | Cisco Catalyst SD-WAN Manager Reflected HTML Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-twamp-kv4fhugn | Cisco IOS, IOS XE, and IOS XR Software TWAMP Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-snmpv3-qkeyvzsy | Cisco IOS and IOS XE Software SNMPv3 Configuration Restriction Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-snmp-bypass-hhuvujdn | Cisco IOS XE SD-WAN Software Packet Filtering Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-09-22T14:12:28+00:00 |
| cisco-sa-sisf-dos-zgwt4ddy | Multiple Cisco Products Switch Integrated Security Features DHCPv6 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-sdwanarbfile-2zkhkzwj | Cisco Catalyst SD-WAN Manager Arbitrary File Creation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-14T20:04:53+00:00 |
| cisco-sa-sdwan-priviesc-wck7bmmt | Cisco Catalyst SD-WAN Manager Privilege Escalation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-sdwan-fileoverwrite-uc9txwh | Cisco Catalyst SD-WAN Manager Arbitrary File Overwrite Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-08T15:55:57+00:00 |
| cisco-sa-netconf-nacm-bypass-tgzv9pmq | Cisco IOS XE Software Model-Driven Programmability Authorization Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-multiprod-ikev2-dos-gpctuqv2 | Cisco Adaptive Security Appliance Software, Firepower Threat Defense Software, IOS Software, and IOS XE Software IKEv2 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ipsgacl-pg6qfzk | Cisco IOS Software on Cisco Catalyst 1000 and 2960L Switches Access Control List Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iox-dos-95fqnf7b | Cisco IOx Application Hosting Environment Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-privesc-su7scvdp | Cisco IOS XE Software Privilege Escalation Vulnerabilities | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-ikev1-dos-xhk3hzfc | Cisco IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-dhcpsn-dos-xbn8mtks | Cisco IOS XE Software DHCP Snooping Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-5477 | Prefix-substitution forgery via integer overflow in wolfCrypt CMAC | 2026-04-02T00:00:00.000Z | 2026-04-15T01:03:08.000Z |
| msrc_cve-2026-5466 | wc_VerifyEccsiHash missing sanity check | 2026-04-02T00:00:00.000Z | 2026-04-15T01:01:59.000Z |
| msrc_cve-2026-5460 | Heap Use-After-Free in PQC Hybrid KeyShare Error Cleanup in wolfSSL TLS 1.3 | 2026-04-02T00:00:00.000Z | 2026-04-15T01:04:23.000Z |
| msrc_cve-2026-5448 | 1-2 Byte Buffer Overflow in wolfSSL_X509_notAfter/notBefore | 2026-04-02T00:00:00.000Z | 2026-04-15T01:02:59.000Z |
| msrc_cve-2026-5447 | Heap buffer overflow in CertFromX509() via AuthorityKeyIdentifier | 2026-04-02T00:00:00.000Z | 2026-04-15T01:04:06.000Z |
| msrc_cve-2026-5446 | wolfSSL ARIA-GCM TLS 1.2/DTLS 1.2 GCM nonce reuse | 2026-04-02T00:00:00.000Z | 2026-04-15T01:04:48.000Z |
| msrc_cve-2026-5393 | OOB Read in DoTls13CertificateVerify with WOLFSSL_DUAL_ALG_CERTS | 2026-04-02T00:00:00.000Z | 2026-04-15T01:02:08.000Z |
| msrc_cve-2026-5392 | wolfSSL heap OOB read in PKCS7 SignedData streaming | 2026-04-02T00:00:00.000Z | 2026-04-15T01:04:39.000Z |
| msrc_cve-2026-5295 | Stack Buffer Overflow in wolfSSL PKCS7 wc_PKCS7_DecryptOri() via Oversized OID | 2026-04-02T00:00:00.000Z | 2026-04-15T01:03:41.000Z |
| msrc_cve-2026-5264 | DTLS 1.3 ACK heap buffer overflow | 2026-04-02T00:00:00.000Z | 2026-04-15T01:03:33.000Z |
| msrc_cve-2026-5263 | URI nameConstraints not enforced in ConfirmNameConstraints() | 2026-04-02T00:00:00.000Z | 2026-04-15T01:04:31.000Z |
| msrc_cve-2026-5194 | wolfSSL ECDSA Certificate Verification | 2026-04-02T00:00:00.000Z | 2026-04-15T01:02:34.000Z |
| msrc_cve-2026-5188 | Integer underflow in X.509 SAN parsing in wolfSSL | 2026-04-02T00:00:00.000Z | 2026-04-15T01:03:50.000Z |
| msrc_cve-2026-4878 | Libcap: libcap: privilege escalation via toctou race condition in cap_set_file() | 2026-04-02T00:00:00.000Z | 2026-04-14T14:47:44.000Z |
| msrc_cve-2026-41035 | CVE-2026-41035 | 2026-04-02T00:00:00.000Z | 2026-04-17T01:02:04.000Z |
| msrc_cve-2026-40393 | CVE-2026-40393 | 2026-04-02T00:00:00.000Z | 2026-04-14T01:01:32.000Z |
| msrc_cve-2026-40386 | CVE-2026-40386 | 2026-04-02T00:00:00.000Z | 2026-04-15T14:45:23.000Z |
| msrc_cve-2026-40385 | CVE-2026-40385 | 2026-04-02T00:00:00.000Z | 2026-04-15T14:45:30.000Z |
| msrc_cve-2026-40226 | CVE-2026-40226 | 2026-04-02T00:00:00.000Z | 2026-04-13T14:40:48.000Z |
| msrc_cve-2026-40179 | Prometheus: Stored XSS via metric names and label values in web UI tooltips and metrics explorer | 2026-04-02T00:00:00.000Z | 2026-04-17T01:02:33.000Z |
| msrc_cve-2026-40175 | Axios has Unrestricted Cloud Metadata Exfiltration via Header Injection Chain | 2026-04-02T00:00:00.000Z | 2026-04-15T01:05:29.000Z |
| msrc_cve-2026-40164 | jq: Algorithmic complexity DoS via hardcoded MurmurHash3 seed | 2026-04-02T00:00:00.000Z | 2026-04-17T01:01:51.000Z |
| msrc_cve-2026-40026 | Sleuth Kit ISO9660 SUSP Extension Reference Out-of-Bounds Read | 2026-04-02T00:00:00.000Z | 2026-04-11T01:40:37.000Z |
| msrc_cve-2026-40025 | Sleuth Kit APFS Keybag Parser Out-of-Bounds Read | 2026-04-02T00:00:00.000Z | 2026-04-11T01:40:44.000Z |
| msrc_cve-2026-40024 | Sleuth Kit tsk_recover Path Traversal | 2026-04-02T00:00:00.000Z | 2026-04-11T01:40:50.000Z |
| msrc_cve-2026-39979 | jq: Out-of-Bounds Read in jv_parse_sized() Error Formatting for Non-NUL-Terminated Counted Buffers | 2026-04-02T00:00:00.000Z | 2026-04-17T01:01:42.000Z |
| msrc_cve-2026-39956 | jq: Missing runtime type checks for _strindices lead to crash and limited memory disclosure | 2026-04-02T00:00:00.000Z | 2026-04-17T01:02:19.000Z |
| msrc_cve-2026-39882 | OpenTelemetry-Go OTLP HTTP exporters read unbounded HTTP response bodies | 2026-04-02T00:00:00.000Z | 2026-04-11T01:03:08.000Z |
| msrc_cve-2026-39881 | Vim Ex command injection in Vims NetBeans integration | 2026-04-02T00:00:00.000Z | 2026-04-11T01:40:57.000Z |
| msrc_cve-2026-39856 | osslsigncode has an Out-of-Bounds Read via Unvalidated Section Bounds in PE Page Hash Calculation | 2026-04-02T00:00:00.000Z | 2026-04-13T14:41:03.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0346 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2025-11-03T08:14:02.972842Z | 2025-11-03T08:14:02.972842Z |
| ncsc-2025-0345 | Kwetsbaarheden verholpen in Rockwell Automation FactoryTalk | 2025-10-31T09:35:00.469498Z | 2025-10-31T09:35:00.469498Z |
| ncsc-2025-0344 | Kwetsbaarheden verholpen in Rockwell Automation COMMS | 2025-10-31T09:34:05.069339Z | 2025-10-31T09:34:05.069339Z |
| ncsc-2025-0343 | Kwetsbaarheid verholpen in Mozilla Firefox | 2025-10-31T09:31:53.270725Z | 2025-10-31T09:31:53.270725Z |
| ncsc-2025-0342 | Kwetsbaarheden verholpen in GitLab Enterprise en Community Edition | 2025-10-27T08:08:17.974767Z | 2025-10-27T09:38:47.073257Z |
| ncsc-2025-0341 | Kwetsbaarheden verholpen in BIND 9 | 2025-10-24T08:19:45.232307Z | 2025-10-27T08:24:03.796638Z |
| ncsc-2025-0340 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2025-10-23T14:13:39.969386Z | 2025-10-23T14:13:39.969386Z |
| ncsc-2025-0339 | Kwetsbaarheden verholpen in Oracle MySQL | 2025-10-23T14:11:30.111892Z | 2025-10-23T14:11:30.111892Z |
| ncsc-2025-0338 | Kwetsbaarheden verholpen in Oracle JD Edwards EnterpriseOne Tools | 2025-10-23T13:53:27.268400Z | 2025-10-23T13:53:27.268400Z |
| ncsc-2025-0337 | Kwetsbaarheden verholpen in Oracle Java | 2025-10-23T13:51:40.686406Z | 2025-10-23T13:51:40.686406Z |
| ncsc-2025-0336 | Kwetsbaarheden verholpen in Oracle Hyperion | 2025-10-23T13:49:44.344049Z | 2025-10-23T13:49:44.344049Z |
| ncsc-2025-0335 | Kwetsbaarheden verholpen in Oracle Analytics | 2025-10-23T13:45:06.747933Z | 2025-10-23T13:45:06.747933Z |
| ncsc-2025-0334 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2025-10-23T13:42:11.992643Z | 2025-11-21T16:03:18.991100Z |
| ncsc-2025-0333 | Kwetsbaarheden verholpen in Oracle Financial Services | 2025-10-23T13:35:32.902231Z | 2025-10-23T13:35:32.902231Z |
| ncsc-2025-0332 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2025-10-23T13:26:49.210414Z | 2025-10-23T13:26:49.210414Z |
| ncsc-2025-0331 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2025-10-23T13:23:20.471568Z | 2025-10-23T13:23:20.471568Z |
| ncsc-2025-0330 | Kwetsbaarheden verholpen in Oracle Communications producten | 2025-10-23T13:20:15.363063Z | 2025-10-23T13:20:15.363063Z |
| ncsc-2025-0329 | Kwetsbaarheden verholpen in Oracle Commerce | 2025-10-23T07:20:51.213314Z | 2025-10-23T07:20:51.213314Z |
| ncsc-2025-0328 | Kwetsbaarheden verholpen in Oracle Database producten | 2025-10-23T07:19:57.652532Z | 2025-10-23T07:19:57.652532Z |
| ncsc-2025-0327 | Kwetsbaarheden verholpen in Zohocorp's ManageEngine | 2025-10-23T07:18:47.274781Z | 2025-10-23T07:18:47.274781Z |
| ncsc-2025-0326 | Kwetsbaarheden verholpen in Moxa’s netwerkbeveiligingsapparaten | 2025-10-20T13:03:34.436477Z | 2025-10-20T13:03:34.436477Z |
| ncsc-2025-0325 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2025-10-20T12:59:06.729067Z | 2025-10-20T12:59:06.729067Z |
| ncsc-2025-0324 | Kwetsbaarheid verholpen in FortiOS | 2025-10-17T08:42:51.624827Z | 2025-10-17T08:42:51.624827Z |
| ncsc-2025-0323 | Kwetsbaarheden verholpen in SAP Producten | 2025-10-17T08:04:54.828451Z | 2025-10-17T08:04:54.828451Z |
| ncsc-2025-0322 | Kwetsbaarheden verholpen in Adobe Commerce | 2025-10-16T06:32:33.597617Z | 2025-10-16T06:32:33.597617Z |
| ncsc-2025-0321 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-10-16T06:27:14.019367Z | 2025-10-16T06:27:14.019367Z |
| ncsc-2025-0320 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-10-16T06:25:05.618348Z | 2025-10-16T06:25:05.618348Z |
| ncsc-2025-0319 | Kwetsbaarheden verholpen in F5 Networks BIG-IP, F5OS en NGINX App Protect WAF | 2025-10-15T15:21:14.871532Z | 2026-03-27T18:09:03.259108Z |
| ncsc-2025-0318 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2025-10-15T06:22:07.027110Z | 2025-10-15T06:22:07.027110Z |
| ncsc-2025-0317 | Kwetsbaarheden verholpen in Veeam Backup & Replication | 2025-10-15T06:13:55.126030Z | 2025-10-15T06:13:55.126030Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20340-1 | Security update for cJSON | 2026-03-11T08:21:26Z | 2026-03-11T08:21:26Z |
| opensuse-su-2026:20339-1 | Security update for freerdp | 2026-03-10T12:34:56Z | 2026-03-10T12:34:56Z |
| opensuse-su-2026:10323-1 | traefik-3.6.10-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10322-1 | python311-lxml_html_clean-0.4.4-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10321-1 | python311-PyPDF2-2.11.1-6.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10320-1 | perl-Compress-Raw-Zlib-2.222-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10319-1 | helm3-3.20.0-2.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10318-1 | helm-4.1.1-3.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10317-1 | grype-0.109.1-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10316-1 | ghostty-1.3.0-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10315-1 | GraphicsMagick-1.3.46-2.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:20336-1 | Security update for cockpit-podman | 2026-03-09T10:47:09Z | 2026-03-09T10:47:09Z |
| opensuse-su-2026:20337-1 | Security update for ImageMagick | 2026-03-09T10:04:29Z | 2026-03-09T10:04:29Z |
| opensuse-su-2026:10314-1 | traefik2-2.11.40-1.1 on GA media | 2026-03-09T00:00:00Z | 2026-03-09T00:00:00Z |
| opensuse-su-2026:10313-1 | rclone-1.73.2-1.1 on GA media | 2026-03-09T00:00:00Z | 2026-03-09T00:00:00Z |
| opensuse-su-2026:10312-1 | python311-pymongo-4.16.0-1.1 on GA media | 2026-03-09T00:00:00Z | 2026-03-09T00:00:00Z |
| opensuse-su-2026:10311-1 | corepack24-24.13.0-4.1 on GA media | 2026-03-08T00:00:00Z | 2026-03-08T00:00:00Z |
| opensuse-su-2026:10310-1 | go1.25-1.25.8-1.1 on GA media | 2026-03-08T00:00:00Z | 2026-03-08T00:00:00Z |
| opensuse-su-2026:20332-1 | Security update for chromium | 2026-03-07T12:59:14Z | 2026-03-07T12:59:14Z |
| opensuse-su-2026:10309-1 | weblate-5.16.1-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10308-1 | virtiofsd-1.13.2-2.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10307-1 | tomcat11-11.0.18-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10306-1 | tomcat10-10.1.52-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10305-1 | tomcat-9.0.115-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10304-1 | python311-nltk-3.9.3-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10303-1 | libIex-3_4-33-3.4.6-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10302-1 | kubeshark-cli-53.1.0-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10301-1 | kernel-devel-longterm-6.18.16-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10300-1 | jetty-annotations-9.4.58-3.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10299-1 | go1.26-1.26.1-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:6436 | Red Hat Security Advisory: rsync security update | 2026-04-02T10:54:57+00:00 | 2026-04-13T19:35:44+00:00 |
| rhsa-2026:5910 | Red Hat Security Advisory: OpenShift Container Platform 4.16.59 bug fix and security update | 2026-04-02T08:02:20+00:00 | 2026-04-13T18:52:05+00:00 |
| rhsa-2026:6429 | Red Hat Security Advisory: Multicluster Global Hub 1.4.5 security update | 2026-04-02T07:56:10+00:00 | 2026-04-14T07:59:34+00:00 |
| rhsa-2026:6428 | Red Hat Security Advisory: Network Observability 1.11.1 for OpenShift | 2026-04-02T07:50:38+00:00 | 2026-04-14T09:46:55+00:00 |
| rhsa-2026:6427 | Red Hat Security Advisory: nginx:1.26 security update | 2026-04-02T07:42:56+00:00 | 2026-04-08T14:07:15+00:00 |
| rhsa-2026:6407 | Red Hat Security Advisory: nginx:1.24 security update | 2026-04-01T22:57:35+00:00 | 2026-04-08T14:07:11+00:00 |
| rhsa-2026:6408 | Red Hat Security Advisory: nginx security update | 2026-04-01T20:24:35+00:00 | 2026-04-08T14:07:11+00:00 |
| rhsa-2026:6404 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2026-04-01T18:20:27+00:00 | 2026-04-13T20:58:37+00:00 |
| rhsa-2026:6396 | Red Hat Security Advisory: freerdp security update | 2026-04-01T16:28:09+00:00 | 2026-04-09T14:38:07+00:00 |
| rhsa-2026:6395 | Red Hat Security Advisory: freerdp security update | 2026-04-01T16:24:09+00:00 | 2026-04-09T14:38:07+00:00 |
| rhsa-2026:6391 | Red Hat Security Advisory: mysql:8.4 security update | 2026-04-01T15:43:39+00:00 | 2026-04-02T16:36:39+00:00 |
| rhsa-2026:6390 | Red Hat Security Advisory: rsync security update | 2026-04-01T15:41:34+00:00 | 2026-04-13T19:35:45+00:00 |
| rhsa-2026:6385 | Red Hat Security Advisory: freerdp security update | 2026-04-01T15:01:19+00:00 | 2026-04-09T14:38:06+00:00 |
| rhsa-2026:6383 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-01T14:59:14+00:00 | 2026-04-14T07:28:14+00:00 |
| rhsa-2026:6382 | Red Hat Security Advisory: grafana security update | 2026-04-01T14:57:19+00:00 | 2026-04-14T07:28:25+00:00 |
| rhsa-2026:6384 | Red Hat Security Advisory: freerdp security update | 2026-04-01T14:55:19+00:00 | 2026-04-09T14:38:07+00:00 |
| rhsa-2026:6388 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-01T14:40:49+00:00 | 2026-04-14T07:28:26+00:00 |
| rhsa-2026:6344 | Red Hat Security Advisory: grafana security update | 2026-04-01T11:23:28+00:00 | 2026-04-14T07:28:26+00:00 |
| rhsa-2026:5876 | Red Hat Security Advisory: OpenShift Container Platform 4.19.27 packages and security update | 2026-04-01T10:19:18+00:00 | 2026-04-14T07:59:31+00:00 |
| rhsa-2026:5877 | Red Hat Security Advisory: OpenShift Container Platform 4.19.27 bug fix and security update | 2026-04-01T10:06:58+00:00 | 2026-04-02T16:39:26+00:00 |
| rhsa-2026:5878 | Red Hat Security Advisory: OpenShift Container Platform 4.19.27 bug fix and security update | 2026-04-01T09:48:10+00:00 | 2026-04-13T14:46:55+00:00 |
| rhsa-2026:6342 | Red Hat Security Advisory: thunderbird security update | 2026-04-01T09:40:38+00:00 | 2026-04-13T15:26:50+00:00 |
| rhsa-2026:5866 | Red Hat Security Advisory: OpenShift Container Platform 4.17.52 packages and security update | 2026-04-01T09:29:07+00:00 | 2026-04-14T09:46:53+00:00 |
| rhsa-2026:6341 | Red Hat Security Advisory: Red Hat build of Cryostat security update | 2026-04-01T09:19:49+00:00 | 2026-04-14T07:28:19+00:00 |
| rhsa-2026:5867 | Red Hat Security Advisory: OpenShift Container Platform 4.17.52 bug fix and security update | 2026-04-01T09:17:57+00:00 | 2026-04-02T16:39:27+00:00 |
| rhsa-2026:6340 | Red Hat Security Advisory: freerdp security update | 2026-04-01T09:08:02+00:00 | 2026-04-14T07:11:28+00:00 |
| rhsa-2026:5907 | Red Hat Security Advisory: OpenShift Container Platform 4.17.52 bug fix and security update | 2026-04-01T03:47:45+00:00 | 2026-04-13T19:36:08+00:00 |
| rhsa-2026:6311 | Red Hat Security Advisory: nginx security update | 2026-04-01T02:29:52+00:00 | 2026-04-08T14:07:10+00:00 |
| rhsa-2026:6310 | Red Hat Security Advisory: kernel security update | 2026-04-01T01:15:17+00:00 | 2026-04-13T07:08:47+00:00 |
| rhsa-2026:6309 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2026-03-31T23:31:56+00:00 | 2026-04-13T20:58:36+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2021-348-02 | EVlink City / Parking / Smart Wallbox Charging Stations | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sevd-2021-348-01 | IGSS (Interactive Graphical SCADA System) | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sesb-2021-347-01 | Apache Log4j Vulnerabilities (Log4Shell) | 2021-12-13T09:22:58.000Z | 2022-08-09T09:22:58.000Z |
| sevd-2021-313-04 | Windows Print Spooler embedded in EcoStruxure™ Process Expert | 2021-11-09T08:45:48.000Z | 2022-03-08T08:45:48.000Z |
| sevd-2021-313-03 | APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices | 2021-11-09T06:30:00.000Z | 2022-05-10T00:00:00.00Z |
| sevd-2021-313-05 | BadAlloc Vulnerabilities | 2021-11-09T05:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2021-313-07 | Eurotherm GUIcon | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-313-02 | Schneider Electric Software Update | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-313-01 | SCADAPack 300E Series RTU | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-285-05 | Conext™ Advisor & Conext™ Control V2 | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-04 | Modicon M218 Logic Controller | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-03 | IGSS (Interactive Graphical SCADA System) | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-02 | ConneXium Network Manager (CNM) Software | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-01 | spaceLYnk, Wiser For KNX, fellerLYnk | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-257-02 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Premium and Associated Communication Modules | 2021-09-14T20:04:00.000Z | 2023-02-14T20:04:43.000Z |
| sevd-2021-257-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ for x70 | 2021-09-14T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2021-257-03 | StruxureWare Data Center Expert | 2021-09-14T00:00:00.000Z | 2021-09-14T00:00:00.000Z |
| sevd-2021-222-04 | Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert | 2021-08-10T02:27:39.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-222-06 | CODESYS V2 Vulnerabilities in Programmable Automation Controller (PacDrive) M | 2021-08-10T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2021-222-05 | AccuSine PCSn/PCS+/PFV+ | 2021-08-10T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2021-222-03 | Pro-face GP-Pro EX | 2021-08-10T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2021-217-01 | NicheStack TCP/IP Vulnerabilities (INFRA:HALT) in Lexium ILE, ILA, ILS, and Communication Option Boards for Altivar and Lexium32 drives | 2021-08-05T06:29:08.000Z | 2023-05-09T06:29:00.000Z |
| sevd-2021-222-02 | AT&T Labs Compressor (XMilI) and Decompressor (XDemill) used by EcoStruxureTM Control Expert, EcoStruxureTM Process Expert and SCADAPack RemoteConnect™ for x70 | 2021-08-01T07:25:51.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2021-194-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ x70, and Modicon Controllers M580 and M340 | 2021-07-13T08:22:02.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-194-05 | Easergy T200 | 2021-07-13T00:00:00.000Z | 2021-07-13T00:00:00.000Z |
| sevd-2021-194-04 | C-Bus Toolkit | 2021-07-13T00:00:00.000Z | 2021-07-13T00:00:00.000Z |
| sevd-2021-194-03 | SoSafe Configurable | 2021-07-13T00:00:00.000Z | 2021-07-13T00:00:00.000Z |
| sevd-2021-159-04 | ISaGRAF Vulnerabilities in IEC 61131-3 Programming and Engineering Tools | 2021-06-08T04:36:25.000Z | 2025-11-15T00:00:00.000Z |
| sevd-2021-159-03 | PowerLogic EGX100 and PowerLogicEGX300 | 2021-06-08T00:00:00.000Z | 2021-06-08T00:00:00.000Z |
| sevd-2021-159-02 | PowerLogic PM5500 and PowerLogic PM8ECC | 2021-06-08T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-925850 | SSA-925850: Improper Access Control in Polarion ALM | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-923361 | SSA-923361: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0011 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-916916 | SSA-916916: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.5 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-871704 | SSA-871704: Multiple Vulnerabilities in SICAM Products | 2024-05-14T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-661579 | SSA-661579: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-589937 | SSA-589937: Multiple Memory Corruption Vulnerabilities in Solid Edge | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-489698 | SSA-489698: X_T File Parsing Vulnerability in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-292022 | SSA-292022: Vulnerability in Nozomi Guardian/CMC before 23.4.1 on RUGGEDCOM APE1808 devices | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-273900 | SSA-273900: Multiple Vulnerabilities in SIMATIC CN 4100 before V3.0 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-258494 | SSA-258494: Stack Overflow Vulnerability in Simcenter Nastran before 2406.90 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-093430 | SSA-093430: Multiple Vulnerabilities in SIMATIC RTLS Locating Manager before V3.0 | 2024-05-14T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-046364 | SSA-046364: X_T File Parsing Vulnerabilities in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-750274 | SSA-750274: Impact of CVE-2024-3400 on RUGGEDCOM APE1808 devices configured with Palo Alto Networks Virtual NGFW | 2024-04-19T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-885980 | SSA-885980: Multiple Vulnerabilities in Scalance W1750D | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-822518 | SSA-822518: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW Before V11.0.1 on RUGGEDCOM APE1808 Devices | 2024-04-09T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-730482 | SSA-730482: Denial of Service Vulnerability in SIMATIC WinCC | 2024-04-09T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-556635 | SSA-556635: Multiple Vulnerabilities in Telecontrol Server Basic before V3.1.2.0 | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-265688 | SSA-265688: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1 | 2024-04-09T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-222019 | SSA-222019: X_T File Parsing Vulnerabilities in Parasolid | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-128433 | SSA-128433: Multiple Vulnerabilities in SINEC NMS before V2.0 SP2 | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-918992 | SSA-918992: Unused HTTP Service on SENTRON 3KC ATC6 Ethernet Module | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-832273 | SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-792319 | SSA-792319: Missing Read Out Protection in SENTRON 7KM PAC3x20 Devices | 2024-03-12T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-770721 | SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-653855 | SSA-653855: Information Disclosure vulnerability in SINEMA Remote Connect Client before V3.1 SP1 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-576771 | SSA-576771: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-382651 | SSA-382651: File Parsing Vulnerability in Solid Edge | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-366067 | SSA-366067: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.1 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-225840 | SSA-225840: Vulnerabilities in the Network Communication Stack in Sinteso EN and Cerberus PRO EN Fire Protection Systems | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-145196 | SSA-145196: Authorization Bypass Vulnerability in Siveillance Control | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1216-1 | Security update for openssl-1_1 | 2026-04-08T12:28:22Z | 2026-04-08T12:28:22Z |
| suse-su-2026:1215-1 | Security update for openssl-3 | 2026-04-08T12:27:58Z | 2026-04-08T12:27:58Z |
| suse-su-2026:1214-1 | Security update for openssl-3 | 2026-04-08T12:27:45Z | 2026-04-08T12:27:45Z |
| suse-su-2026:1213-1 | Security update for openssl-3 | 2026-04-08T12:27:10Z | 2026-04-08T12:27:10Z |
| suse-su-2026:1051-1 | Security update for vim | 2026-04-08T11:40:57Z | 2026-04-08T11:40:57Z |
| suse-su-2026:1212-1 | Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5) | 2026-04-08T10:04:46Z | 2026-04-08T10:04:46Z |
| suse-su-2026:1209-1 | Security update for bind | 2026-04-08T07:12:41Z | 2026-04-08T07:12:41Z |
| suse-su-2026:1208-1 | Security update for ignition | 2026-04-08T07:12:23Z | 2026-04-08T07:12:23Z |
| suse-su-2026:21062-1 | Security update for expat | 2026-04-07T18:52:31Z | 2026-04-07T18:52:31Z |
| suse-su-2026:21003-1 | Security update for systemd | 2026-04-07T15:06:51Z | 2026-04-07T15:06:51Z |
| suse-su-2026:21002-1 | Security update for tar | 2026-04-07T14:59:15Z | 2026-04-07T14:59:15Z |
| suse-su-2026:1095-1 | Security update for vim | 2026-04-07T14:35:54Z | 2026-04-07T14:35:54Z |
| suse-su-2026:0910-1 | Security update for vim | 2026-04-07T14:35:08Z | 2026-04-07T14:35:08Z |
| suse-su-2026:21001-1 | Security update for libtasn1 | 2026-04-07T14:32:32Z | 2026-04-07T14:32:32Z |
| suse-su-2026:1206-1 | Security update for python | 2026-04-07T14:18:48Z | 2026-04-07T14:18:48Z |
| suse-su-2026:1203-1 | Security update for ImageMagick | 2026-04-07T12:24:55Z | 2026-04-07T12:24:55Z |
| suse-su-2026:1202-1 | Security update for ImageMagick | 2026-04-07T12:24:42Z | 2026-04-07T12:24:42Z |
| suse-su-2026:1201-1 | Security update for ImageMagick | 2026-04-07T12:24:24Z | 2026-04-07T12:24:24Z |
| suse-su-2026:21000-1 | Security update for libpng16 | 2026-04-07T11:57:32Z | 2026-04-07T11:57:32Z |
| suse-su-2026:1200-1 | Security update for ignition | 2026-04-07T11:50:19Z | 2026-04-07T11:50:19Z |
| suse-su-2026:20969-1 | Security update for polkit | 2026-04-07T11:50:03Z | 2026-04-07T11:50:03Z |
| suse-su-2026:21032-1 | Security update for polkit | 2026-04-07T11:36:08Z | 2026-04-07T11:36:08Z |
| suse-su-2026:21031-1 | Security update for expat | 2026-04-07T11:09:30Z | 2026-04-07T11:09:30Z |
| suse-su-2026:1199-1 | Security update for python-PyJWT | 2026-04-07T10:25:37Z | 2026-04-07T10:25:37Z |
| suse-su-2026:1198-1 | Security update for ignition | 2026-04-07T10:25:22Z | 2026-04-07T10:25:22Z |
| suse-su-2026:1197-1 | Security update for ignition | 2026-04-07T10:25:02Z | 2026-04-07T10:25:02Z |
| suse-su-2026:1195-1 | Security update for google-cloud-sap-agent | 2026-04-07T09:25:22Z | 2026-04-07T09:25:22Z |
| suse-su-2026:1194-1 | Security update for google-cloud-sap-agent | 2026-04-07T09:25:07Z | 2026-04-07T09:25:07Z |
| suse-su-2026:1193-1 | Security update for gimp | 2026-04-07T08:40:15Z | 2026-04-07T08:40:15Z |
| suse-su-2026:1192-1 | Security update for python-pyOpenSSL | 2026-04-07T08:39:34Z | 2026-04-07T08:39:34Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:2721 | Moderate: kernel security update | 2026-02-16T00:00:00Z | 2026-02-23T13:34:16Z |
| alsa-2026:2720 | Moderate: kernel security update | 2026-02-16T00:00:00Z | 2026-02-23T13:27:24Z |
| alsa-2026:2719 | Important: gnupg2 security update | 2026-02-16T00:00:00Z | 2026-02-18T13:46:37Z |
| alsa-2026:2709 | Important: golang security update | 2026-02-16T00:00:00Z | 2026-02-17T10:27:57Z |
| alsa-2026:2708 | Important: go-toolset:rhel8 security update | 2026-02-16T00:00:00Z | 2026-02-16T14:22:53Z |
| alsa-2026:2707 | Important: gimp security update | 2026-02-16T00:00:00Z | 2026-02-17T10:29:58Z |
| alsa-2026:2706 | Important: golang security update | 2026-02-16T00:00:00Z | 2026-02-18T13:54:31Z |
| alsa-2026:2627 | Moderate: gcc-toolset-14-binutils security update | 2026-02-12T00:00:00Z | 2026-02-13T08:03:55Z |
| alsa-2026:2470 | Moderate: php:7.4 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:10:23Z |
| alsa-2026:2452 | Important: pcs security update | 2026-02-10T00:00:00Z | 2026-02-12T10:12:36Z |
| alsa-2026:2438 | Important: pcs security update | 2026-02-10T00:00:00Z | 2026-02-12T10:14:13Z |
| alsa-2026:2422 | Important: nodejs:20 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:15:50Z |
| alsa-2026:2421 | Important: nodejs:22 security update | 2026-02-10T00:00:00Z | 2026-02-13T10:53:31Z |
| alsa-2026:2420 | Important: nodejs:24 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:19:24Z |
| alsa-2026:2419 | Moderate: python3.12 security update | 2026-02-10T00:00:00Z | 2026-02-11T15:30:15Z |
| alsa-2026:2410 | Important: libsoup3 security update | 2026-02-10T00:00:00Z | 2026-02-11T15:26:55Z |
| alsa-2026:2389 | Important: brotli security update | 2026-02-10T00:00:00Z | 2026-02-11T11:06:48Z |
| alsa-2026:2378 | Moderate: kernel-rt security update | 2026-02-10T00:00:00Z | 2026-02-10T09:34:16Z |
| alsa-2026:2323 | Important: git-lfs security update | 2026-02-09T00:00:00Z | 2026-02-11T11:02:49Z |
| alsa-2026:2286 | Important: thunderbird security update | 2026-02-09T00:00:00Z | 2026-02-09T12:36:11Z |
| alsa-2026:2282 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-12T10:29:43Z |
| alsa-2026:2271 | Important: firefox security update | 2026-02-09T00:00:00Z | 2026-02-09T11:39:07Z |
| alsa-2026:2264 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-09T11:47:42Z |
| alsa-2026:2230 | Important: fontforge security update | 2026-02-09T00:00:00Z | 2026-02-10T10:04:33Z |
| alsa-2026:2225 | Critical: keylime security update | 2026-02-09T00:00:00Z | 2026-02-10T10:06:14Z |
| alsa-2026:2224 | Critical: keylime security update | 2026-02-09T00:00:00Z | 2026-02-11T15:22:49Z |
| alsa-2026:2222 | Important: freerdp security update | 2026-02-09T00:00:00Z | 2026-02-10T10:08:14Z |
| alsa-2026:2220 | Important: thunderbird security update | 2026-02-09T00:00:00Z | 2026-02-10T07:45:12Z |
| alsa-2026:2216 | Important: libsoup security update | 2026-02-09T00:00:00Z | 2026-02-10T10:37:43Z |
| alsa-2026:2215 | Important: libsoup security update | 2026-02-09T00:00:00Z | 2026-02-09T11:36:21Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-480 | Stack-buffer-overflow in void glz::from<10000u, std::__1::__bit_reference<std::__1::vector<bool, std::__1 | 2025-06-20T00:14:17.007847Z | 2025-06-20T00:14:17.008310Z |
| osv-2025-469 | Use-of-uninitialized-value in ndpi_strdup | 2025-06-16T00:17:21.776120Z | 2025-06-16T00:17:21.776520Z |
| osv-2025-465 | Heap-buffer-overflow in xmlParsePubidLiteral | 2025-06-15T00:09:20.387117Z | 2025-06-15T00:09:20.387490Z |
| osv-2025-461 | Heap-buffer-overflow in xmlParsePubidLiteral | 2025-06-14T00:10:49.391511Z | 2025-06-14T00:10:49.391787Z |
| osv-2025-457 | Heap-buffer-overflow in xmlParsePubidLiteral | 2025-06-14T00:04:11.416575Z | 2025-06-14T00:04:11.417116Z |
| osv-2025-456 | Use-of-uninitialized-value in ppd_hash_option | 2025-06-12T00:10:52.355312Z | 2025-06-12T00:10:52.355684Z |
| osv-2025-454 | Use-of-uninitialized-value in _cups_strcasecmp | 2025-06-11T00:12:12.952969Z | 2025-06-11T00:12:12.953357Z |
| osv-2025-449 | Heap-buffer-overflow in check_content_type_and_change_protocol | 2025-06-10T00:16:50.624468Z | 2025-06-10T00:16:50.624907Z |
| osv-2025-447 | Use-of-uninitialized-value in spvtools::EmitNumericLiteral | 2025-06-09T00:05:11.128452Z | 2025-09-24T14:18:33.220549Z |
| osv-2024-1446 | Segv on unknown address in glslang::TIntermediate::addSymbol | 2025-06-06T00:12:59.981959Z | 2025-06-06T00:12:59.982286Z |
| osv-2025-442 | Security exception in org.jsoup.parser.HtmlTreeBuilder.process | 2025-06-06T00:12:40.427852Z | 2025-06-06T00:12:40.428189Z |
| osv-2025-437 | Heap-buffer-overflow in mmcall | 2025-06-05T00:18:59.402795Z | 2025-06-05T00:18:59.403189Z |
| osv-2025-436 | Security exception in graphql.parser.GraphqlAntlrToLanguage.createNonNullType | 2025-06-05T00:11:24.382209Z | 2025-06-05T00:11:24.382444Z |
| osv-2025-433 | Null-dereference READ in _libssh2_packet_add | 2025-06-05T00:02:57.199903Z | 2025-06-05T00:02:57.200566Z |
| osv-2025-424 | UNKNOWN READ in RDKit::RDValue::destroy | 2025-06-03T00:12:35.236863Z | 2025-09-24T14:19:44.921114Z |
| osv-2025-412 | UNKNOWN WRITE in luaL_newstate | 2025-05-28T00:06:09.320289Z | 2025-05-28T00:06:09.320970Z |
| osv-2025-408 | Heap-buffer-overflow in sav_parse_long_variable_names_record | 2025-05-27T00:12:59.401698Z | 2025-05-27T00:12:59.402180Z |
| osv-2025-406 | Security exception in com.puppycrawl.tools.checkstyle.JavaAstVisitor.getInnerBopAst | 2025-05-27T00:01:44.628210Z | 2025-05-27T00:01:44.628747Z |
| osv-2025-404 | Use-of-uninitialized-value in JS_FreeRuntime | 2025-05-23T00:14:00.218149Z | 2025-05-23T00:14:00.218494Z |
| osv-2025-401 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-05-23T00:07:37.622395Z | 2025-05-23T00:07:37.622817Z |
| osv-2025-396 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-05-22T00:16:08.210127Z | 2025-05-22T00:16:08.210510Z |
| osv-2025-384 | Segv on unknown address in rtpp_refcnt_decref | 2025-05-20T00:04:47.616424Z | 2025-05-20T00:04:47.617104Z |
| osv-2025-374 | Use-of-uninitialized-value in pcpp::SomeIpSdEntry::SomeIpSdEntry | 2025-05-17T00:16:26.661924Z | 2025-05-17T00:16:26.662355Z |
| osv-2025-373 | Heap-use-after-free in aiMesh::~aiMesh | 2025-05-17T00:11:17.621374Z | 2025-08-22T19:20:38.723565Z |
| osv-2025-371 | Index-out-of-bounds in tcp_analyze_sequence_number | 2025-05-16T00:16:16.300219Z | 2025-05-16T00:16:16.300689Z |
| osv-2025-369 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-05-15T00:19:04.752117Z | 2025-05-15T00:19:04.752522Z |
| osv-2025-368 | Heap-buffer-overflow in __parse_options | 2025-05-15T00:03:04.543640Z | 2025-05-15T00:03:04.544159Z |
| osv-2025-363 | Heap-buffer-overflow in jv_string_vfmt | 2025-05-14T00:03:23.388719Z | 2025-05-14T00:03:23.389224Z |
| osv-2025-357 | Segv on unknown address in pcpp::Packet::computeCalculateFields | 2025-05-12T00:13:14.901744Z | 2025-09-10T14:24:05.862334Z |
| osv-2025-354 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.statement | 2025-05-11T00:17:30.348393Z | 2025-05-11T00:17:30.348809Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0072 | soundness issue and unmaintained | 2025-10-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0071 | Incorrect handling of embedded SVG and MathML leads to mutation XSS after removal | 2025-09-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0070 | Pingora MadeYouReset HTTP/2 vulnerability | 2025-09-17T12:00:00Z | 2025-09-18T07:10:31Z |
| rustsec-2025-0069 | `daemonize` is Unmaintained | 2025-09-14T12:00:00Z | 2025-09-15T14:42:32Z |
| rustsec-2025-0068 | serde_yml crate is unsound and unmaintained | 2025-09-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0067 | `libyml::string::yaml_string_extend` is unsound and unmaintained | 2025-09-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0065 | matrix-sdk-base: Panic in the `RoomMember::normalized_power_level()` method | 2025-09-11T12:00:00Z | 2025-09-11T12:21:52Z |
| rustsec-2025-0000 | matrix-sdk-base: Panic in the `RoomMember::normalized_power_level()` method | 2025-09-11T12:00:00Z | 2025-09-11T12:10:54Z |
| rustsec-2025-0066 | The `google-apis-rs` project is now unmaintained | 2025-09-09T12:00:00Z | 2025-09-11T16:34:38Z |
| rustsec-2025-0061 | iron crate is unmaintained | 2025-09-08T12:00:00Z | 2025-09-08T09:09:54Z |
| rustsec-2025-0060 | crypto-hash crate is unmaintained | 2025-09-08T12:00:00Z | 2025-09-08T09:09:54Z |
| rustsec-2025-0059 | servo-fontconfig crate is unmaintained | 2025-09-08T12:00:00Z | 2025-09-08T09:09:54Z |
| rustsec-2025-0058 | custom_derive crate is unmaintained | 2025-09-07T12:00:00Z | 2025-09-07T08:38:20Z |
| rustsec-2025-0057 | fxhash - no longer maintained | 2025-09-05T12:00:00Z | 2025-09-05T19:09:01Z |
| rustsec-2025-0056 | adler crate is unmaintained, use adler2 instead | 2025-09-05T12:00:00Z | 2025-09-05T09:05:48Z |
| rustsec-2025-0055 | Logging user input may result in poisoning logs with ANSI escape sequences | 2025-08-29T12:00:00Z | 2025-09-02T11:05:02Z |
| rustsec-2025-0157 | `statsrelay-protobuf` was removed from crates.io for malicious code | 2025-08-26T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0052 | async-std has been discontinued | 2025-08-24T12:00:00Z | 2025-08-27T11:36:30Z |
| rustsec-2025-0054 | ArrayQueue::push_front is not panic-safe | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0053 | Multiple memory corruption vulnerabilities in safe APIs | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0050 | IdMap::from_iter may lead to uninitialized memory being freed on drop | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0049 | User-defined implementations of the safe trait scratchpad::Tracking can cause heap buffer overflows | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0047 | Out-of-bounds access in `get_disjoint_mut` due to incorrect bounds check | 2025-08-12T12:00:00Z | 2025-08-12T09:41:13Z |
| rustsec-2025-0051 | `xcb::Connection::connect_to_fd*` functions violate I/O safety | 2025-08-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0048 | tsify-next is unmaintained, use tsify instead | 2025-07-29T12:00:00Z | 2025-08-13T14:05:32Z |
| rustsec-2025-0112 | Possible host crash with host-to-wasm component intrinsics | 2025-07-18T12:00:00Z | 2025-10-25T11:20:30Z |
| rustsec-2025-0046 | Host panic with `fd_renumber` WASIp1 function | 2025-07-18T12:00:00Z | 2025-07-18T19:48:13Z |
| rustsec-2025-0045 | ConstStaticCell could have been used to pass non-Send values to another thread | 2025-07-17T12:00:00Z | 2025-07-17T14:38:11Z |
| rustsec-2025-0043 | matrix-sdk-sqlite: SQL injection vulnerability in `SqliteEventCacheStore::find_event_with_relations` | 2025-07-11T12:00:00Z | 2025-07-11T15:30:12Z |
| rustsec-2025-0042 | Uninitialized read after allocating MemBump | 2025-07-11T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-nats-2026-33219 | NATS is vulnerable to pre-auth DoS through WebSockets client service | 2026-03-27T17:45:18.190Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33218 | NATS has pre-auth server panic via leafnode handling | 2026-03-27T17:45:16.655Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33217 | NATS allows MQTT clients to bypass ACL checks | 2026-03-27T17:45:15.042Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33216 | NATS has MQTT plaintext password disclosure | 2026-03-27T17:45:13.444Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-29785 | NATS Server panic via malicious compression on leafnode port | 2026-03-27T17:45:10.061Z | 2026-03-27T18:14:10.313Z |
| bit-gitlab-2026-4363 | Incorrect Authorization in GitLab | 2026-03-27T12:15:19.935Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-3988 | Inefficient Algorithmic Complexity in GitLab | 2026-03-27T12:15:17.809Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-3857 | Cross-Site Request Forgery (CSRF) in GitLab | 2026-03-27T12:15:15.885Z | 2026-03-31T09:14:23.567Z |
| bit-gitlab-2026-2995 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in GitLab | 2026-03-27T12:15:11.976Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2973 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-03-27T12:15:10.065Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2745 | Authentication Bypass Using an Alternate Path or Channel in GitLab | 2026-03-27T12:15:06.072Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2726 | Incorrect Authorization in GitLab | 2026-03-27T12:15:04.107Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-1724 | Missing Authentication for Critical Function in GitLab | 2026-03-27T12:14:54.117Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-14595 | Missing Authorization in GitLab | 2026-03-27T12:11:45.074Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-13436 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-27T12:11:11.989Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-13078 | Improper Validation of Specified Quantity in Input in GitLab | 2026-03-27T12:11:08.026Z | 2026-03-27T12:16:52.978Z |
| bit-nats-2026-27889 | NATS: Pre-auth remote server crash via WebSocket frame length overflow in wsRead | 2026-03-27T11:47:22.988Z | 2026-03-27T12:16:52.978Z |
| bit-etcd-2026-33413 | etcd: Authorization bypasses in multiple APIs | 2026-03-27T11:39:27.916Z | 2026-03-27T12:16:52.978Z |
| bit-etcd-2026-33343 | etcd: Nested etcd transactions bypass RBAC authorization checks | 2026-03-27T11:39:26.076Z | 2026-03-27T12:16:52.978Z |
| bit-parse-2026-33627 | Parse Server: Auth data exposed via /users/me endpoint | 2026-03-27T07:14:47.660Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33624 | Parse Server: MFA recovery code single-use bypass via concurrent requests | 2026-03-27T07:14:44.950Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33539 | Parse Server: SQL injection via aggregate and distinct field names in PostgreSQL adapter | 2026-03-27T07:14:42.086Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33538 | Parse Server: Denial of service via unindexed database query for unconfigured auth providers | 2026-03-27T07:14:39.195Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33527 | Parse Server: Session update endpoint allows overwriting server-generated session fields | 2026-03-27T07:14:36.431Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33508 | Parse Server: LiveQuery subscription query depth bypass | 2026-03-27T07:14:33.818Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33498 | Parse Server: Query condition depth bypass via pre-validation transform pipeline | 2026-03-27T07:14:30.964Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33429 | Parse Server: Protected field change detection oracle via LiveQuery watch parameter | 2026-03-27T07:14:28.266Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33421 | Parse Server: LiveQuery bypasses CLP pointer permission enforcement | 2026-03-27T07:14:25.801Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33409 | Parse Server: Auth provider validation bypass on login via partial authData | 2026-03-27T07:14:23.276Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33323 | Parse Server: Email verification resend page leaks user existence | 2026-03-27T07:14:20.379Z | 2026-03-27T07:40:55.991Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-fx51482 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.5.1-r0, 1.5.1-r1 | 2026-04-01T09:45:37.795716Z | 2026-03-18T07:43:14Z |
| cleanstart-2026-lm72903 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 4.5.1-r0 | 2026-04-01T09:45:35.196573Z | 2026-03-18T05:58:10Z |
| cleanstart-2026-ei62818 | Security fixes for ghsa-3677-xxcr-wjqv, ghsa-qqpg-mvqg-649v, ghsa-x44p-gvrj-pj2r applied in versions: 2.7.2-r0 | 2026-04-01T09:45:31.119946Z | 2026-03-18T05:57:33Z |
| cleanstart-2026-ow14897 | Security fixes for CVE-2025-25285, CVE-2025-69873, CVE-2026-21637, ghsa-23c5-xmqv-rm74, ghsa-72xf-g2v4-qvf3, ghsa-7r86-cg39-jmmj, ghsa-pfrx-2q88-qq97, ghsa-rc47-6667-2j5j, ghsa-rmvr-2pp2-xj38 applied in versions: 2.5.10-r2, 2.5.10-r3, 2.6.0-r1 | 2026-04-01T09:45:25.624227Z | 2026-03-18T07:42:00Z |
| cleanstart-2026-ox88144 | Security fixes for CVE-2025-47911, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61732, CVE-2026-27139 applied in versions: 1.34.1-r0, 1.34.1-r2 | 2026-04-01T09:45:10.149925Z | 2026-03-18T13:13:46Z |
| cleanstart-2026-pk48502 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-68121 applied in versions: 2.3.0-r0 | 2026-04-01T09:45:06.972039Z | 2026-03-18T08:57:33Z |
| cleanstart-2026-gr86205 | Security fixes for CVE-2022-23181, CVE-2022-29885, CVE-2022-34305, CVE-2022-42252, CVE-2022-45143, CVE-2023-24998, CVE-2023-28708, CVE-2026-24515, CVE-2026-25210 applied in versions: 11.0.18-r0, 9.0.58-r0, 9.0.63-r0, 9.0.64-r0, 9.0.68-r0, 9.0.70-r0, 9.0.71-r0, 9.0.73-r0, 9.0.80-r0 | 2026-04-01T09:45:02.431388Z | 2026-03-19T05:47:18Z |
| cleanstart-2026-iy78242 | Security fixes for CVE-2025-61729, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-273p-m2cw-6833, ghsa-4c4x-jm2x-pf9j, ghsa-4qg8-fj49-pxjh, ghsa-59jp-pj84-45mr, ghsa-72c7-4g63-hpw5, ghsa-846p-jg2w-w324, ghsa-9h8m-3fm2-qjrq, ghsa-f6x5-jh6r-wrfv, ghsa-f83f-xpx7-ffpw, ghsa-fcv2-xgw5-pqxf, ghsa-fphv-w9fq-2525, ghsa-fw7p-63qq-7hpr, ghsa-j5w8-q4qc-rx2x, ghsa-jqc5-w2xx-5vq4, ghsa-p436-gjf2-799p, ghsa-whqx-f9j3-ch6m applied in versions: 0.26.0-r0, 0.26.0-r1, 0.26.0-r2, 0.26.0-r3, 0.26.0-r4 | 2026-04-01T09:44:29.089231Z | 2026-03-19T06:58:14Z |
| cleanstart-2026-pj76318 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, ghsa-273p-m2cw-6833, ghsa-4c4x-jm2x-pf9j, ghsa-4qg8-fj49-pxjh, ghsa-846p-jg2w-w324, ghsa-fcv2-xgw5-pqxf, ghsa-fphv-w9fq-2525, ghsa-jqc5-w2xx-5vq4, ghsa-whqx-f9j3-ch6m applied in versions: 1.14.1-r0, 1.14.1-r1, 1.14.1-r2, 1.14.1-r3 | 2026-04-01T09:44:23.291711Z | 2026-03-19T06:56:15Z |
| cleanstart-2026-mq21261 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142 applied in versions: 1.5.1-r0, 1.5.1-r1, 1.5.1-r2, 1.5.1-r3 | 2026-04-01T09:43:56.426341Z | 2026-03-19T07:05:59Z |
| cleanstart-2026-bt99405 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.29.2-r0, 1.29.2-r1 | 2026-04-01T09:43:54.267145Z | 2026-03-19T07:01:48Z |
| cleanstart-2026-qb67682 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.2-r1, 3.3.3-r0 | 2026-04-01T09:43:42.917590Z | 2026-03-19T07:11:57Z |
| cleanstart-2026-gs57401 | Security fixes for CVE-2025-69873, CVE-2026-1525, CVE-2026-1526, CVE-2026-1527, CVE-2026-1528, CVE-2026-2229, CVE-2026-2327, CVE-2026-2391, CVE-2026-25128, CVE-2026-25547, CVE-2026-2581, CVE-2026-25896, CVE-2026-26278, CVE-2026-26960, CVE-2026-27601, CVE-2026-27903, CVE-2026-27904, CVE-2026-27942, CVE-2026-28292, CVE-2026-29786, CVE-2026-31802, CVE-2026-32141, CVE-2026-33036, ghsa-23c5-xmqv-rm74, ghsa-25h7-pfq9-p65f, ghsa-2g4f-4pwh-qvx6, ghsa-2mjp-6q6p-2qxm, ghsa-37qj-frw5-hhjh, ghsa-38c4-r59v-3vqw, ghsa-3ppc-4f35-3m26, ghsa-4992-7rv2-5pvq, ghsa-7h2j-956f-4vf2, ghsa-7r86-cg39-jmmj, ghsa-83g3-92jg-28cx, ghsa-8gc5-j5rx-235r, ghsa-8wc6-vgrq-x6cf, ghsa-9ppj-qmqm-q256, ghsa-f269-vfmq-vjvj, ghsa-fj3w-jwp8-x2g3, ghsa-jmr7-xgp7-cmfj, ghsa-m7jm-9gc2-mpf2, ghsa-phc3-fgpg-7m6h, ghsa-qffp-2rhf-9h96, ghsa-qpx9-hpmf-5gmw, ghsa-r275-fr43-pm7q, ghsa-v9p9-hfj2-hcw8, ghsa-vrm6-8vpv-qv8q, ghsa-w7fw-mjwx-w883 applied in versions: 43.4.3-r1 | 2026-04-01T09:43:24.793409Z | 2026-03-19T07:48:38Z |
| cleanstart-2026-gc37751 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-66jq-2c23-2xh5, ghsa-9h8m-3fm2-qjrq applied in versions: 0.65.0-r0, 0.65.0-r1 | 2026-04-01T09:43:05.536029Z | 2026-03-19T07:09:40Z |
| cleanstart-2026-ck42797 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-1229, CVE-2026-25679, CVE-2026-25934, CVE-2026-27139, CVE-2026-27142, ghsa-37cx-329c-33x3 applied in versions: 0.18.0-r1, 1.16.0-r0 | 2026-04-01T09:42:37.879665Z | 2026-03-19T07:29:02Z |
| cleanstart-2026-gx29850 | Security fixes for CVE-2025-61732, CVE-2025-68121 applied in versions: 1.132.0-r0, 1.132.0-r1 | 2026-04-01T09:42:09.716696Z | 2026-03-19T07:32:54Z |
| cleanstart-2026-jd68539 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61732, CVE-2025-68121, ghsa-vvgc-356p-c3xw applied in versions: 1.7.0-r0 | 2026-04-01T09:42:09.713315Z | 2026-03-19T07:35:12Z |
| cleanstart-2026-em40436 | Security fixes for ghsa-8v2v-wjwg-vx6r applied in versions: 1.16.3-r0 | 2026-04-01T09:42:07.970704Z | 2026-03-19T07:29:54Z |
| cleanstart-2026-kj56465 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 5.4.8-r0 | 2026-04-01T09:41:55.075579Z | 2026-03-19T07:57:48Z |
| cleanstart-2026-ax74442 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-01T09:41:13.499618Z | 2026-03-19T12:02:36Z |
| cleanstart-2026-ib04141 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq applied in versions: 3.7.2-r4, 3.7.2-r5 | 2026-04-01T09:40:40.529278Z | 2026-03-19T12:02:36Z |
| cleanstart-2026-qi69220 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-01T09:40:21.793084Z | 2026-03-19T12:02:36Z |
| cleanstart-2026-kt54860 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-01T09:40:18.425287Z | 2026-03-19T12:02:36Z |
| cleanstart-2026-il36032 | Security fixes for CVE-2025-30218, CVE-2025-49005, CVE-2025-65945, ghsa-2mjp-6q6p-2qxm, ghsa-33vc-wfww-vjfv, ghsa-43fc-jf86-j433, ghsa-4992-7rv2-5pvq, ghsa-4hjh-wcwx-xvwj, ghsa-554w-wpv2-vw27, ghsa-5gfm-wpxj-wjgq, ghsa-5jpx-9hw9-2fx4, ghsa-65ch-62r8-g69g, ghsa-869p-cjfg-cm3x, ghsa-968p-4wvh-cqc8, ghsa-9g9p-9gw9-jx7f, ghsa-9qr9-h5gf-34mp, ghsa-f269-vfmq-vjvj, ghsa-fjxv-7rqg-78g4, ghsa-g9mf-h72j-4rw9, ghsa-h25m-26qc-wcjf, ghsa-jmr7-xgp7-cmfj, ghsa-m7jm-9gc2-mpf2, ghsa-mwv6-3258-q52c, ghsa-rcmh-qjqh-p98v, ghsa-v9p9-hfj2-hcw8, ghsa-vrm6-8vpv-qv8q, ghsa-w37m-7fhw-fmv9, ghsa-xxjr-mmjv-4gpg applied in versions: 2.11.0-r0, 2.11.0-r2 | 2026-04-01T09:39:16.823043Z | 2026-03-19T12:59:29Z |
| cleanstart-2026-ix47217 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-26958, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.18.0-r0, 0.19.0-r0 | 2026-04-01T09:39:04.589001Z | 2026-03-19T12:57:20Z |
| cleanstart-2026-ad71344 | Security fixes for CVE-2024-10005, CVE-2024-10006, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.10.7-r1, 1.10.9-r0, 1.10.9-r1, 1.10.9-r2, 1.10.9-r3, 1.9.4-r0 | 2026-04-01T09:38:56.500937Z | 2026-03-20T04:46:15Z |
| cleanstart-2026-di15427 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-26958, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.18.0-r0, 0.19.0-r0 | 2026-04-01T09:38:54.759545Z | 2026-03-19T12:58:08Z |
| cleanstart-2026-dp35743 | Security fixes for CVE-2024-10005, CVE-2024-10006, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24051, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.7.10-r0, 1.7.10-r1, 1.7.10-r2, 1.7.10-r3, 1.9.4-r0 | 2026-04-01T09:38:30.680533Z | 2026-03-20T04:50:14Z |
| cleanstart-2026-om95908 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-qxp5-gwg8-xv66, ghsa-r92c-9c7f-3pj8, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.10.7-r1, 1.11.4-r0, 1.11.5-r0, 1.11.5-r1, 1.11.5-r2, 1.9.4-r0 | 2026-04-01T09:38:28.220463Z | 2026-03-20T04:48:45Z |
| cleanstart-2026-kd93706 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.25.0-r0 | 2026-04-01T09:38:28.023266Z | 2026-03-19T12:59:29Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2024-047 | 2024-10-09T15:54:27.000Z | 2025-02-20T19:26:17.000Z | |
| drupal-contrib-2024-046 | 2024-10-09T15:48:11.000Z | 2025-02-20T19:26:30.000Z | |
| drupal-contrib-2024-045 | 2024-10-09T15:48:10.000Z | 2025-02-20T19:26:40.000Z | |
| drupal-contrib-2024-044 | 2024-10-02T16:27:12.000Z | 2025-02-20T19:26:51.000Z | |
| drupal-contrib-2024-043 | 2024-10-02T16:20:48.000Z | 2025-02-20T19:27:03.000Z | |
| drupal-contrib-2024-042 | 2024-10-02T16:15:59.000Z | 2025-02-20T19:27:15.000Z | |
| drupal-contrib-2024-039 | 2024-09-11T16:21:22.000Z | 2025-02-20T19:22:14.000Z | |
| drupal-contrib-2024-038 | 2024-09-04T16:20:17.000Z | 2025-02-20T19:22:30.000Z | |
| drupal-contrib-2024-037 | 2024-09-04T16:15:41.000Z | 2025-02-20T19:22:50.000Z | |
| drupal-contrib-2024-036 | 2024-09-04T15:42:05.000Z | 2025-02-20T19:23:09.000Z | |
| drupal-contrib-2024-035 | 2024-09-04T15:40:44.000Z | 2025-02-20T19:23:27.000Z | |
| drupal-contrib-2024-034 | 2024-09-04T15:35:55.000Z | 2025-02-20T19:23:44.000Z | |
| drupal-contrib-2024-033 | 2024-08-28T15:32:41.000Z | 2025-02-20T19:24:02.000Z | |
| drupal-contrib-2024-030 | 2024-08-21T16:23:02.000Z | 2025-02-20T19:11:48.000Z | |
| drupal-contrib-2024-029 | 2024-08-07T17:36:15.000Z | 2025-02-20T19:12:05.000Z | |
| drupal-contrib-2024-028 | 2024-08-07T17:30:20.000Z | 2025-02-20T19:12:22.000Z | |
| drupal-contrib-2024-027 | 2024-08-07T17:19:30.000Z | 2025-02-20T19:12:37.000Z | |
| drupal-contrib-2024-026 | 2024-07-31T15:59:06.000Z | 2025-02-20T19:12:56.000Z | |
| drupal-contrib-2024-025 | 2024-06-05T16:45:02.000Z | 2025-02-20T19:13:15.000Z | |
| drupal-contrib-2024-024 | 2024-05-29T16:58:59.000Z | 2025-02-20T19:13:35.000Z | |
| drupal-contrib-2024-023 | 2024-05-29T16:52:42.000Z | 2025-02-20T19:13:53.000Z | |
| drupal-contrib-2024-022 | 2024-05-29T16:44:55.000Z | 2025-02-20T19:14:10.000Z | |
| drupal-contrib-2024-021 | 2024-05-22T16:21:55.000Z | 2025-02-20T19:14:35.000Z | |
| drupal-contrib-2024-020 | 2024-05-22T16:03:46.000Z | 2025-02-20T18:43:21.000Z | |
| drupal-contrib-2024-018 | 2024-04-24T14:23:34.000Z | 2025-02-20T18:44:08.000Z | |
| drupal-contrib-2024-017 | 2024-04-24T13:16:40.000Z | 2025-02-20T18:44:32.000Z | |
| drupal-contrib-2024-016 | 2024-03-27T17:16:26.000Z | 2025-02-20T19:08:34.000Z | |
| drupal-contrib-2024-015 | 2024-03-06T17:06:37.000Z | 2025-02-20T19:08:51.000Z | |
| drupal-contrib-2024-014 | 2024-02-28T18:36:35.000Z | 2025-02-20T19:09:20.000Z | |
| drupal-contrib-2024-012 | 2024-02-28T18:19:01.000Z | 2025-02-20T19:09:55.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2015-ale-002 | Vulnérabilité dans Adobe Flash Player | 2015-02-02T00:00:00.000000 | 2015-02-05T00:00:00.000000 |
| certfr-2015-ale-001 | Vulnérabilité dans Adobe Flash Player | 2015-01-22T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-011 | Vulnérabilité de l'implémentation Kerberos dans Microsoft Windows | 2014-11-18T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-010 | Vulnérabilité de l'implémentation des protocoles SSL/TLS dans Microsoft Windows | 2014-11-11T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-009 | Vulnérabilité dans Microsoft OLE | 2014-10-22T00:00:00.000000 | 2014-11-12T00:00:00.000000 |
| certfr-2014-ale-008 | Vulnérabilité dans Drupal | 2014-10-16T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-007 | Vulnérabilité dans SSLv3 | 2014-10-15T00:00:00.000000 | 2014-10-15T00:00:00.000000 |
| certfr-2014-ale-006 | Vulnérabilité dans GNU bash | 2014-09-25T00:00:00.000000 | 2014-09-30T00:00:00.000000 |
| certfr-2014-ale-005 | Vulnérabilité dans Microsoft Internet Explorer | 2014-04-28T00:00:00.000000 | 2014-05-02T00:00:00.000000 |
| certfr-2014-ale-004 | Vulnérabilité dans Apache Struts | 2014-04-25T00:00:00.000000 | 2014-04-29T00:00:00.000000 |
| certfr-2014-ale-003 | Vulnérabilité dans OpenSSL | 2014-04-08T00:00:00.000000 | 2014-07-30T00:00:00.000000 |
| certfr-2014-ale-002 | Vulnérabilité dans Microsoft Word | 2014-03-25T00:00:00.000000 | 2014-04-09T00:00:00.000000 |
| certfr-2014-ale-001 | Vulnérabilité dans Microsoft Internet Explorer | 2014-02-21T00:00:00.000000 | 2014-03-12T00:00:00.000000 |
| certa-2013-ale-008 | Vulnérabilité critique dans le noyau de Microsoft Windows | 2013-11-28T00:00:00.000000 | 2014-01-16T00:00:00.000000 |
| certa-2013-ale-007 | Vulnérabilité dans un composant graphique de Microsoft | 2013-11-06T00:00:00.000000 | 2013-12-10T00:00:00.000000 |
| certa-2013-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2013-09-18T00:00:00.000000 | 2013-10-09T00:00:00.000000 |
| certa-2013-ale-005 | Vulnérabilité dans le noyau Linux | 2013-05-14T00:00:00.000000 | 2013-05-24T00:00:00.000000 |
| certa-2013-ale-004 | Vulnérabilité dans Adobe ColdFusion | 2013-05-10T00:00:00.000000 | 2013-05-15T00:00:00.000000 |
| certa-2013-ale-003 | Vulnérabilité dans Microsoft Internet Explorer 8 | 2013-05-06T00:00:00.000000 | 2013-05-15T00:00:00.000000 |
| certa-2013-ale-002 | Vulnérabilités dans Adobe Reader et Acrobat | 2013-02-14T00:00:00.000000 | 2013-02-21T00:00:00.000000 |
| certa-2013-ale-001 | Vulnérabilités dans Oracle Java | 2013-01-10T00:00:00.000000 | 2013-01-15T00:00:00.000000 |
| certa-2012-ale-010 | Vulnérabilité dans Internet Explorer | 2012-12-31T00:00:00.000000 | 2013-01-15T00:00:00.000000 |
| certa-2012-ale-009 | Vulnérabilité dans les pilotes NVidia | 2012-12-26T00:00:00.000000 | 2013-01-07T00:00:00.000000 |
| certa-2012-ale-008 | Vulnérabilité dans certains terminaux Samsung | 2012-12-18T00:00:00.000000 | 2012-12-18T00:00:00.000000 |
| certa-2012-ale-007 | Vulnérabilité dans MySQL | 2012-12-06T00:00:00.000000 | 2013-01-07T00:00:00.000000 |
| certa-2012-ale-006 | Vulnérabilité dans Internet Explorer | 2012-09-18T00:00:00.000000 | 2012-09-21T00:00:00.000000 |
| certa-2012-ale-005 | Vulnérabilité dans Oracle Java | 2012-08-27T00:00:00.000000 | 2012-08-31T00:00:00.000000 |
| certa-2012-ale-004 | Vulnérabilité dans Microsoft Exchange et Fast Search Server 2010 | 2012-07-25T00:00:00.000000 | 2012-08-16T00:00:00.000000 |
| certa-2012-ale-003 | Vulnérabilité dans Microsoft XML Core Services | 2012-06-14T00:00:00.000000 | 2012-08-17T00:00:00.000000 |
| certa-2012-ale-002 | Vulnérabilité dans Windows RDP | 2012-03-14T00:00:00.000000 | 2012-04-13T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0271 | Multiples vulnérabilités dans Microsoft Windows | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0270 | Multiples vulnérabilités dans Microsoft Office | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0269 | Multiples vulnérabilités dans Curl | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0268 | Multiples vulnérabilités dans Traefik | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0267 | Multiples vulnérabilités dans Mozilla Firefox | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0266 | Multiples vulnérabilités dans VMware Tanzu | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0265 | Multiples vulnérabilités dans les produits Fortinet | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0264 | Multiples vulnérabilités dans les produits Adobe | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0263 | Vulnérabilité dans Ivanti Desktop and Server Management (DSM) | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0262 | Multiples vulnérabilités dans HPE Aruba Networking AOS-CX | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0261 | Multiples vulnérabilités dans les produits Intel | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0260 | Multiples vulnérabilités dans WordPress | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0259 | Multiples vulnérabilités dans Stormshield Network Security | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0258 | Vulnérabilité dans Microsoft CBL-Mariner | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0257 | Vulnérabilité dans Mozilla Focus | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0256 | Multiples vulnérabilités dans les produits SAP | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0255 | Multiples vulnérabilités dans les produits Siemens | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0254 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0253 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-09T00:00:00.000000 | 2026-03-09T00:00:00.000000 |
| certfr-2026-avi-0252 | Multiples vulnérabilités dans les produits Moxa | 2026-03-09T00:00:00.000000 | 2026-03-09T00:00:00.000000 |
| certfr-2026-avi-0251 | Multiples vulnérabilités dans Apache Zookeeper | 2026-03-09T00:00:00.000000 | 2026-03-09T00:00:00.000000 |
| certfr-2026-avi-0250 | Vulnérabilité dans Apereo CAS | 2026-03-09T00:00:00.000000 | 2026-03-09T00:00:00.000000 |
| certfr-2026-avi-0249 | Multiples vulnérabilités dans les produits IBM | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0248 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0247 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0246 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0245 | Vulnérabilité dans Zabbix | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0244 | Vulnérabilité dans Nextcloud Flow | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0243 | Vulnérabilité dans SPIP | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0242 | Multiples vulnérabilités dans les produits Cisco | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000055 | ZXHN-F660T and ZXHN-F660A use a common credential for all installations | 2025-07-31T15:12+09:00 | 2025-07-31T15:12+09:00 |
| jvndb-2025-000054 | Apache Jena Fuseki vulnerable to path traversal | 2025-07-30T14:17+09:00 | 2025-07-30T14:17+09:00 |
| jvndb-2025-000053 | "SwitchBot" App vulnerable to insertion of sensitive information into log file | 2025-07-29T13:44+09:00 | 2025-07-29T13:44+09:00 |
| jvndb-2025-010056 | TP-Link VIGI NVR1104H-4P and VIGI NVR2016H-16MP vulnerable to OS command injection | 2025-07-28T17:53+09:00 | 2025-07-28T17:53+09:00 |
| jvndb-2025-000052 | TP-Link Archer C1200 vulnerable to clickjacking | 2025-07-24T14:16+09:00 | 2025-07-24T14:16+09:00 |
| jvndb-2025-000051 | Real-time Bus Tracking System vulnerable to improper validation of specified quantity in input | 2025-07-23T13:54+09:00 | 2025-07-23T13:54+09:00 |
| jvndb-2025-009576 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2025-07-23T11:13+09:00 | 2025-07-23T11:13+09:00 |
| jvndb-2025-000050 | "region PAY" App for Android vulnerable to insertion of sensitive information into log file | 2025-07-22T13:33+09:00 | 2025-07-22T13:33+09:00 |
| jvndb-2025-009150 | Security updates for Trend Micro products (June 2025) | 2025-07-17T17:03+09:00 | 2025-07-17T17:03+09:00 |
| jvndb-2025-000049 | ZWX-2000CSW2-HN and ZWX-2000CS2-HN vulnerable to use of hard-coded credentials | 2025-07-16T13:54+09:00 | 2025-07-16T13:54+09:00 |
| jvndb-2025-008881 | Least Privilege Violation Vulnerability in the communications functions of NJ/NX series Machine Automation Controllers | 2025-07-15T15:54+09:00 | 2025-07-15T15:54+09:00 |
| jvndb-2025-008783 | Firebox T15 contains an issue with hidden functionality | 2025-07-14T17:22+09:00 | 2025-07-14T17:22+09:00 |
| jvndb-2025-008145 | Epson Web Installer for Mac vulnerable to missing authentication for critical function | 2025-07-08T14:08+09:00 | 2025-07-08T14:08+09:00 |
| jvndb-2025-008106 | Heap-based buffer overflow vulnerability in V-SFT and TELLUS | 2025-07-07T16:26+09:00 | 2025-07-07T16:26+09:00 |
| jvndb-2025-008105 | Windows shortcut following (.LNK) vulnerability in Trend Micro Security for Windows (CVE-2025-52521) | 2025-07-07T16:04+09:00 | 2025-07-07T16:04+09:00 |
| jvndb-2025-000047 | Multiple vulnerabilities in Nimesa Backup and Recovery | 2025-07-07T15:26+09:00 | 2025-07-07T15:26+09:00 |
| jvndb-2025-007978 | Multiple vulnerabilities in Trend Micro Password Manager for Windows (CVE-2025-48443, CVE-2025-52837) | 2025-07-04T13:28+09:00 | 2025-07-04T13:28+09:00 |
| jvndb-2025-000045 | Multiple vulnerabilities in Active! mail | 2025-07-02T14:13+09:00 | 2025-07-02T14:13+09:00 |
| jvndb-2025-007754 | Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS) | 2025-07-02T11:31+09:00 | 2025-07-02T11:31+09:00 |
| jvndb-2025-007607 | Pass-Back Attack vulnerability in Konica Minorta bizhub series | 2025-07-01T14:09+09:00 | 2025-07-01T14:09+09:00 |
| jvndb-2025-007595 | Multiple vulnerabilities in Web Connection of Konica Minolta MFPs | 2025-07-01T14:02+09:00 | 2025-07-01T14:02+09:00 |
| jvndb-2025-000046 | SLNX Help Documentation of RICOH Streamline NX vulnerable to reflected cross-site scripting | 2025-06-30T15:45+09:00 | 2025-06-30T15:45+09:00 |
| jvndb-2025-007552 | Multiple vulnerabilities in TB-eye network recorders and AHD recorders | 2025-06-30T14:45+09:00 | 2025-06-30T14:45+09:00 |
| jvndb-2025-007521 | Multiple Brother driver installers for Windows vulnerable to privilege escalation | 2025-06-27T09:37+09:00 | 2025-08-19T11:29+09:00 |
| jvndb-2025-007519 | Multiple vulnerabilities in multiple BROTHER products | 2025-06-26T18:15+09:00 | 2025-09-22T10:16+09:00 |
| jvndb-2025-000043 | Multiple vulnerabilities in iroha Board | 2025-06-26T15:13+09:00 | 2025-06-26T15:13+09:00 |
| jvndb-2025-000044 | Denial-of-service (DoS) vulnerabilities in multiple Apache products | 2025-06-26T14:41+09:00 | 2025-10-01T14:18+09:00 |
| jvndb-2025-000042 | Inefficient regular expressions in GROWI | 2025-06-24T15:25+09:00 | 2025-06-24T15:25+09:00 |
| jvndb-2025-000041 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2025-06-24T14:50+09:00 | 2026-02-03T15:35+09:00 |
| jvndb-2025-007390 | Trend Micro Internet Security and Trend Micro Maximum Security vulnerable to link following local privilege escalation (CVE-2025-49384, CVE-2025-49385) | 2025-06-24T11:18+09:00 | 2025-06-24T11:18+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14391 | OpenClaw代码注入漏洞(CNVD-2026-14391) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14388 | OpenClaw目录遍历漏洞 | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14142 | WordPress插件My Tickets信息泄露漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14141 | WordPress插件Greenshift – animation and page builder blocks信息泄露漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14140 | WordPress插件Classified Listing信息泄露漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14139 | WordPress插件Chaty信息泄露漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14138 | WordPress插件WP Booking System信息泄露漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14137 | WordPress插件NextScripts: Social Networks Auto-Poster跨站脚本漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14120 | OpenAkita操作系统命令注入漏洞 | 2026-03-17 | 2026-03-17 |
| cnvd-2026-14119 | Siemens SICAM SIAPP SDK缓冲区溢出漏洞 | 2026-03-17 | 2026-03-17 |
| cnvd-2026-14007 | Huawei HarmonyOS资源调度模块权限控制漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-14000 | Huawei EMUI和Huawei HarmonyOS IMS模块越界写入漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-13998 | Huawei EMUI和Huawei HarmonyOS电子邮件应用校验不当漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-13997 | Huawei EMUI和Huawei HarmonyOS系统服务框架权限绕过漏洞 | 2026-03-17 | 2026-03-18 |
| cnvd-2026-15865 | Delta Electronics COMMGR2堆栈缓冲区溢出漏洞 | 2026-03-16 | 2026-04-02 |
| cnvd-2026-15864 | Delta Electronics COMMGR2拒绝服务漏洞 | 2026-03-16 | 2026-04-02 |
| cnvd-2026-13976 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13976) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13975 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13975) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13974 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13974) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13973 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13973) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13972 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13972) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13971 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13971) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13970 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13970) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13969 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13969) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13968 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13968) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13967 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13967) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13966 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13966) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13965 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13965) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13964 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13964) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13963 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13963) | 2026-03-16 | 2026-03-17 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01534 | Уязвимость функции smtcfb_write() модуля drivers/video/fbdev/sm712fb.c драйвера поддержки… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01533 | Уязвимость функции mt8183_da7219_max98357_dev_probe() модуля sound/soc/mediatek/mt8183/mt… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01532 | Уязвимость функции qla2x00_bsg_job_done() модуля drivers/scsi/qla2xxx/qla_bsg.c драйвера … | 10.02.2026 | 10.02.2026 |
| bdu:2026-01531 | Уязвимость функции __udf_iget() модуля fs/udf/inode.c файловой системы ядра операционной … | 10.02.2026 | 10.02.2026 |
| bdu:2026-01530 | Уязвимость функции mt7601u_rx_next_seg_len() модуля drivers/net/wireless/mediatek/mt7601u… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01529 | Уязвимость функции lio_target_nacl_info_show() модуля drivers/target/iscsi/iscsi_target_c… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01528 | Уязвимость функции bnxt_get_nvram_directory() модуля drivers/net/ethernet/broadcom/bnxt/b… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01527 | Уязвимость функции ext4_iget_extra_inode() модуля fs/ext4/inode.c файловой системы Ext4 я… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01526 | Уязвимость функции ieee80211_probe_client() модуля net/mac80211/cfg.c реализации стека ma… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01525 | Уязвимость функции brcmf_c_preinit_dcmds() модуля drivers/net/wireless/broadcom/brcm80211… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01524 | Уязвимость функции prepare_to_relocate() ядра операционной системы Linux, позволяющая нар… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01523 | Уязвимость функций lpfc_debugfs_multixripools_write() и lpfc_debugfs_nvmestat_write() ядр… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01522 | Уязвимость функции raid5_end_write_request() ядра операционной системы Linux, позволяющая… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01521 | Уязвимость функций ext4_mb_clear_bb() и ext4_free_blocks() ядра операционной системы Linu… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01520 | Уязвимость функции usb_udc_uevent() ядра операционной системы Linux, позволяющая нарушите… | 10.02.2026 | 10.02.2026 |
| bdu:2026-01516 | Уязвимость функции convert___skb_to_skb() ядра операционной системы Linux, позволяющая на… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01515 | Уязвимость операционной системы HPE Alletra, системы хранения данных HPE Nimble Storage A… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01514 | Уязвимость функции optc1_enable_optc_clock() ядра операционной системы Linux, позволяющая… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01510 | Уязвимость функции __ieee80211_scan_completed() ядра операционной системы Linux, позволяю… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01509 | Уязвимость функций nilfs_relax_pressure_in_lock() и nilfs_construct_segment() ядра операц… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01508 | Уязвимость функции cpe_mime_handlers() микропрограммного обеспечения маршрутизаторов Link… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01507 | Уязвимость функции ntfs_read_inode_mount() ядра операционной системы Linux, позволяющая н… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01506 | Уязвимость функции formSetWanDiag() микропрограммного обеспечения маршрутизаторов Tenda G… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01505 | Уязвимость функции null_init_tag_set() модуля drivers/block/null_blk/main.c драйвера блоч… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01504 | Уязвимость функции pot_hole() ядра операционной системы Linux, позволяющая нарушителю ока… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01503 | Уязвимость функции usbnet_probe () модуля drivers/net/usb/usbnet.c драйвера сетевых адапт… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01502 | Уязвимость функции bcmgenet_desc_rx() модуля drivers/net/ethernet/broadcom/genet/bcmgenet… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01501 | Уязвимость функции snd_pcm_oss_period_size() ядра операционной системы Linux, позволяющая… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01500 | Уязвимость функции sja1105_table_delete_entry() модуля drivers/net/dsa/sja1105/sja1105_st… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01499 | Уязвимость функции jfs_link() модуля fs/jfs/namei.c файловой системы JFS ядра операционно… | 09.02.2026 | 09.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201908-1958 | The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently l… | 2026-04-10T23:16:47.566000Z |
| var-201403-0275 | sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd… | 2026-04-10T23:16:47.157000Z |
| var-201006-1162 | WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4… | 2026-04-10T23:16:45.414000Z |
| var-200605-0497 | RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly enforce RIPv2 authenticati… | 2026-04-10T23:16:45.010000Z |
| var-202203-0045 | Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) P… | 2026-04-10T23:16:41.141000Z |
| var-201603-0222 | The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denia… | 2026-04-10T23:16:40.712000Z |
| var-201108-0145 | Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before … | 2026-04-10T23:16:40.293000Z |
| var-200909-0801 | The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp modul… | 2026-04-10T23:16:40.099000Z |
| var-201806-1459 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2026-04-10T23:16:38.256000Z |
| var-200609-1424 | The Installer application in Apple Mac OS X 10.4.8 and earlier, when used by a user with … | 2026-04-10T23:16:33.184000Z |
| var-201804-1187 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2026-04-10T23:16:32.078000Z |
| var-201006-1259 | Double free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 1… | 2026-04-10T23:16:32.021000Z |
| var-202203-0034 | A carefully crafted request body can cause a read to a random memory area which could cau… | 2026-04-10T23:16:31.216000Z |
| var-201110-0394 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2026-04-10T23:15:43.060000Z |
| var-201411-0410 | cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain nam… | 2026-04-10T23:15:37.764000Z |
| var-201606-0395 | The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-depen… | 2026-04-10T23:15:26.893000Z |
| var-200810-0138 | The Hewlett-Packard Graphics Language (HPGL) filter in CUPS before 1.3.9 allows remote at… | 2026-04-10T23:15:18.511000Z |
| var-201910-1495 | The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print… | 2026-04-10T23:14:47.530000Z |
| var-200807-0061 | Safari on Apple iPhone before 2.0 and iPod touch before 2.0 misinterprets a menu button p… | 2026-04-10T23:14:47.455000Z |
| var-202205-1953 | A logic issue was addressed with improved state management. This issue is fixed in Securi… | 2026-04-10T23:14:47.340000Z |
| var-200611-0488 | Unspecified vulnerability in Apple Mac OS X 10.4.8, and possibly other versions, allows r… | 2026-04-10T23:14:42.727000Z |
| var-201804-1161 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2026-04-10T23:14:42.647000Z |
| var-201006-1160 | Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in WebKit… | 2026-04-10T23:14:06.173000Z |
| var-201302-0106 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-04-10T23:14:05.812000Z |
| var-201310-0355 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, a… | 2026-04-10T23:13:38.401000Z |
| var-200704-0213 | load_webdav in Apple Mac OS X 10.3.9 through 10.4.9 does not properly clean the environme… | 2026-04-10T23:13:37.222000Z |
| var-200701-0124 | The ufs_lookup function in the Mac OS X 10.4.8 and FreeBSD 6.1 kernels allows local users… | 2026-04-10T23:13:36.661000Z |
| var-200610-0022 | User interface inconsistency in Workgroup Manager in Apple Mac OS X 10.4 through 10.4.7 a… | 2026-04-10T23:13:06.498000Z |
| var-200704-0217 | The Login Window in Apple Mac OS X 10.3.9 through 10.4.9 does not properly check certain … | 2026-04-10T23:13:02.369000Z |
| var-201302-0305 | Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on … | 2026-04-10T23:13:02.295000Z |