Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-9900 |
8.8 (3.1)
|
Libtiff: libtiff write-what-where |
|
|
2025-09-23T16:26:22.846Z | 2026-04-20T21:15:59.323Z |
| CVE-2026-4046 |
7.5 (3.1)
|
iconv crash due to assertion failure with untrusted input |
The GNU C Library |
glibc |
2026-03-30T17:16:11.021Z | 2026-04-20T21:02:31.443Z |
| CVE-2026-5450 |
N/A
|
scanf %mc off-by-one heap buffer overflow |
The GNU C Library |
glibc |
2026-04-20T20:55:41.170Z | 2026-04-20T20:55:41.170Z |
| CVE-2026-29647 |
N/A
|
In OpenXiangShan NEMU, insufficient Smstateen per… |
n/a |
n/a |
2026-04-20T00:00:00.000Z | 2026-04-20T20:49:54.460Z |
| CVE-2026-29646 |
N/A
|
In OpenXiangShan NEMU prior to 55295c4, when runn… |
n/a |
n/a |
2026-04-20T00:00:00.000Z | 2026-04-20T20:39:23.730Z |
| CVE-2026-5928 |
N/A
|
Static buffer overflow in deprecated nis_local_principal |
The GNU C Library |
glibc |
2026-04-20T20:37:31.743Z | 2026-04-20T20:37:31.743Z |
| CVE-2026-5358 |
N/A
|
Static buffer overflow in deprecated nis_local_principal |
The GNU C Library |
glibc |
2026-04-20T20:37:23.178Z | 2026-04-20T20:37:23.178Z |
| CVE-2026-29642 |
N/A
|
A local attacker who can execute privileged CSR o… |
n/a |
n/a |
2026-04-20T00:00:00.000Z | 2026-04-20T20:30:19.577Z |
| CVE-2026-33626 |
7.5 (3.1)
|
LMDeploy Vulnerable to Server-Side Request Forgery (SS… |
InternLM |
lmdeploy |
2026-04-20T20:29:19.558Z | 2026-04-20T20:29:19.558Z |
| CVE-2026-33432 |
7.7 (4.0)
|
Roxy-WI has Pre-Authentication LDAP Injection that Lea… |
roxy-wi |
roxy-wi |
2026-04-20T20:26:52.217Z | 2026-04-20T20:26:52.217Z |
| CVE-2026-26149 |
9 (3.1)
|
Microsoft Power Apps Spoofing Vulnerability |
Microsoft |
Microsoft Power Apps |
2026-04-14T16:56:57.430Z | 2026-04-20T20:26:12.470Z |
| CVE-2026-32077 |
7.8 (3.1)
|
Windows UPnP Device Host Elevation of Privilege Vulner… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:20.124Z | 2026-04-20T20:26:11.807Z |
| CVE-2026-33119 |
5.4 (3.1)
|
Microsoft Edge (Chromium-based) for Android Spoofing V… |
Microsoft |
Microsoft Edge for Android |
2026-04-10T21:20:37.767Z | 2026-04-20T20:26:10.969Z |
| CVE-2026-33118 |
4.3 (3.1)
|
Microsoft Edge (Chromium-based) Spoofing Vulnerability |
Microsoft |
Microsoft Edge (Chromium-based) |
2026-04-10T21:20:44.423Z | 2026-04-20T20:26:10.276Z |
| CVE-2026-32214 |
5.5 (3.1)
|
Universal Plug and Play (upnp.dll) Information Disclos… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:47.099Z | 2026-04-20T20:26:09.476Z |
| CVE-2026-33824 |
9.8 (3.1)
|
Windows Internet Key Exchange (IKE) Service Extensions… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:45.469Z | 2026-04-20T20:26:08.264Z |
| CVE-2026-33827 |
8.1 (3.1)
|
Windows TCP/IP Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:44.677Z | 2026-04-20T20:26:07.672Z |
| CVE-2026-33115 |
8.4 (3.1)
|
Microsoft Word Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-04-14T16:58:44.154Z | 2026-04-20T20:26:07.122Z |
| CVE-2026-33114 |
8.4 (3.1)
|
Microsoft Word Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-04-14T16:58:43.560Z | 2026-04-20T20:26:06.683Z |
| CVE-2026-33104 |
7 (3.1)
|
Win32k Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:42.929Z | 2026-04-20T20:26:06.234Z |
| CVE-2026-33103 |
5.5 (3.1)
|
Microsoft Dynamics 365 (On-Premises) Information Discl… |
Microsoft |
Microsoft Dynamics 365 (on-premises) version 9.0 |
2026-04-14T16:58:41.818Z | 2026-04-20T20:26:05.581Z |
| CVE-2026-33101 |
7.8 (3.1)
|
Windows Print Spooler Elevation of Privilege Vulnerability |
Microsoft |
Windows 11 Version 24H2 |
2026-04-14T16:58:40.813Z | 2026-04-20T20:26:04.761Z |
| CVE-2026-33100 |
7 (3.1)
|
Windows Ancillary Function Driver for WinSock Elevatio… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:40.062Z | 2026-04-20T20:26:04.211Z |
| CVE-2026-33099 |
7 (3.1)
|
Windows Ancillary Function Driver for WinSock Elevatio… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:39.440Z | 2026-04-20T20:26:03.130Z |
| CVE-2026-32225 |
8.8 (3.1)
|
Windows Shell Security Feature Bypass Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:38.879Z | 2026-04-20T20:26:01.558Z |
| CVE-2026-32203 |
7.5 (3.1)
|
.NET and Visual Studio Denial of Service Vulnerability |
Microsoft |
.NET 10.0 |
2026-04-14T16:58:38.178Z | 2026-04-20T20:26:00.881Z |
| CVE-2026-26171 |
7.5 (3.1)
|
.NET Denial of Service Vulnerability |
Microsoft |
.NET 10.0 |
2026-04-14T16:58:37.655Z | 2026-04-20T20:26:00.295Z |
| CVE-2026-32201 |
6.5 (3.1)
|
Microsoft SharePoint Server Spoofing Vulnerability |
Microsoft |
Microsoft SharePoint Enterprise Server 2016 |
2026-04-14T16:58:36.981Z | 2026-04-20T20:25:59.549Z |
| CVE-2026-32200 |
7.8 (3.1)
|
Microsoft PowerPoint Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-04-14T16:58:36.142Z | 2026-04-20T20:25:58.955Z |
| CVE-2026-32199 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-04-14T16:58:35.514Z | 2026-04-20T20:25:57.942Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2017-11774 |
7.8 (3.1)
|
Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and … |
Microsoft Corporation |
Microsoft Outlook |
2017-10-13T13:00:00.000Z | 2025-10-21T23:55:31.465Z |
| CVE-2017-11357 |
9.8 (3.1)
|
Progress Telerik UI for ASP.NET AJAX before R2 20… |
n/a |
n/a |
2017-08-23T17:00:00.000Z | 2025-10-21T23:55:35.158Z |
| CVE-2017-11317 |
9.8 (3.1)
|
Telerik.Web.UI in Progress Telerik UI for ASP.NET… |
n/a |
n/a |
2017-08-23T17:00:00.000Z | 2025-10-21T23:55:35.342Z |
| CVE-2017-11292 |
8.8 (3.1)
|
Adobe Flash Player version 27.0.0.159 and earlier… |
n/a |
Adobe Flash Player version 27.0.0.159 and earlier |
2017-10-21T05:00:00.000Z | 2025-10-21T23:55:30.944Z |
| CVE-2017-10271 |
7.5 (3.1)
|
Vulnerability in the Oracle WebLogic Server compo… |
Oracle Corporation |
WebLogic Server |
2017-10-19T17:00:00.000Z | 2025-10-21T23:55:31.111Z |
| CVE-2017-1000253 |
7.8 (3.1)
|
Linux distributions that have not patched their l… |
n/a |
n/a |
2017-10-04T01:00:00.000Z | 2025-10-21T23:55:32.192Z |
| CVE-2017-0263 |
7.8 (3.1)
|
The kernel-mode drivers in Microsoft Windows Serv… |
Microsoft Corporation |
Microsoft Windows |
2017-05-12T14:00:00.000Z | 2025-10-21T23:55:40.588Z |
| CVE-2017-0262 |
7.8 (3.1)
|
Microsoft Office 2010 SP2, Office 2013 SP1, and O… |
Microsoft Corporation |
Microsoft Office |
2017-05-12T14:00:00.000Z | 2025-10-21T23:55:40.758Z |
| CVE-2017-0261 |
7.8 (3.1)
|
Microsoft Office 2010 SP2, Office 2013 SP1, and O… |
Microsoft Corporation |
Microsoft Office |
2017-05-12T14:00:00.000Z | 2025-10-21T23:55:40.908Z |
| CVE-2017-0222 |
8.8 (3.1)
|
A remote code execution vulnerability exists when… |
Microsoft Corporation |
Internet Explorer |
2017-05-12T14:00:00.000Z | 2025-10-21T23:55:41.048Z |
| CVE-2017-0213 |
7.3 (3.1)
|
Windows COM Aggregate Marshaler in Microsoft Wind… |
Microsoft Corporation |
Windows COM |
2017-05-12T14:00:00.000Z | 2025-10-21T23:55:41.209Z |
| CVE-2017-0210 |
8.8 (3.1)
|
An elevation of privilege vulnerability exists wh… |
Microsoft Corporation |
Internet Explorer |
2017-04-12T14:00:00.000Z | 2025-10-21T23:55:42.425Z |
| CVE-2017-0199 |
7.8 (3.1)
|
Microsoft Office 2007 SP3, Microsoft Office 2010 … |
Microsoft Corporation |
Office/WordPad |
2017-04-12T14:00:00.000Z | 2025-10-21T23:55:42.609Z |
| CVE-2017-0149 |
8.8 (3.1)
|
Microsoft Internet Explorer 9 through 11 allow re… |
Microsoft Corporation |
Internet Explorer |
2017-03-17T00:00:00.000Z | 2025-10-21T23:55:43.703Z |
| CVE-2017-0148 |
8.1 (3.1)
|
The SMBv1 server in Microsoft Windows Vista SP2; … |
Microsoft Corporation |
Windows SMB |
2017-03-17T00:00:00.000Z | 2025-10-21T23:55:43.849Z |
| CVE-2017-0147 |
7.5 (3.1)
|
The SMBv1 server in Microsoft Windows Vista SP2; … |
Microsoft Corporation |
Windows SMB |
2017-03-17T00:00:00.000Z | 2025-10-21T23:55:44.104Z |
| CVE-2017-0146 |
8.8 (3.1)
|
The SMBv1 server in Microsoft Windows Vista SP2; … |
Microsoft Corporation |
Windows SMB |
2017-03-17T00:00:00.000Z | 2025-10-21T23:55:44.319Z |
| CVE-2017-0145 |
8.8 (3.1)
|
The SMBv1 server in Microsoft Windows Vista SP2; … |
Microsoft Corporation |
Windows SMB |
2017-03-17T00:00:00.000Z | 2025-10-21T23:55:44.516Z |
| CVE-2017-0144 |
8.8 (3.1)
|
The SMBv1 server in Microsoft Windows Vista SP2; … |
Microsoft Corporation |
Windows SMB |
2017-03-17T00:00:00.000Z | 2025-10-21T23:55:44.676Z |
| CVE-2017-0143 |
8.8 (3.1)
|
The SMBv1 server in Microsoft Windows Vista SP2; … |
Microsoft Corporation |
Windows SMB |
2017-03-17T00:00:00.000Z | 2025-10-21T23:55:44.821Z |
| CVE-2017-0101 |
7.8 (3.1)
|
The kernel-mode drivers in Transaction Manager in… |
Microsoft Corporation |
Windows |
2017-03-17T00:00:00.000Z | 2025-10-21T23:55:44.984Z |
| CVE-2017-0059 |
4.3 (3.1)
|
Microsoft Internet Explorer 9 through 11 allow re… |
Microsoft Corporation |
Internet Explorer |
2017-03-17T00:00:00.000Z | 2025-10-21T23:55:45.352Z |
| CVE-2017-0037 |
8.1 (3.1)
|
Microsoft Internet Explorer 10 and 11 and Microso… |
Microsoft Corporation |
Internet Browser |
2017-02-26T23:30:00.000Z | 2025-10-21T23:55:46.410Z |
| CVE-2017-0022 |
6.5 (3.1)
|
Microsoft XML Core Services (MSXML) in Windows 10… |
Microsoft Corporation |
XML Core Services |
2017-03-17T00:00:00.000Z | 2025-10-21T23:55:45.619Z |
| CVE-2017-0005 |
7.8 (3.1)
|
The Graphics Device Interface (GDI) in Microsoft … |
Microsoft Corporation |
Windows GDI |
2017-03-17T00:00:00.000Z | 2025-10-21T23:55:45.802Z |
| CVE-2017-0001 |
7.8 (3.1)
|
The Graphics Device Interface (GDI) in Microsoft … |
Microsoft Corporation |
Windows GDI |
2017-03-17T00:00:00.000Z | 2025-10-21T23:55:45.958Z |
| CVE-2016-9563 |
6.5 (3.1)
|
BC-BMT-BPM-DSK in SAP NetWeaver AS JAVA 7.5 allow… |
n/a |
n/a |
2016-11-23T02:00:00.000Z | 2025-10-21T23:55:47.851Z |
| CVE-2016-8735 |
9.8 (3.1)
|
Remote code execution is possible with Apache Tom… |
Apache Software Foundation |
Apache Tomcat |
2017-04-06T21:00:00.000Z | 2025-10-21T23:55:42.758Z |
| CVE-2016-8562 |
7.5 (3.1)
|
A vulnerability has been identified in SIMATIC CP… |
n/a |
n/a |
2016-11-18T21:00:00.000Z | 2025-10-21T23:55:48.030Z |
| CVE-2016-7892 |
8.8 (3.1)
|
Adobe Flash Player versions 23.0.0.207 and earlie… |
n/a |
Adobe Flash Player 23.0.0.207 and earlier, 11.2.202.644 and earlier |
2016-12-15T06:31:00.000Z | 2025-10-21T23:55:47.528Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2017-9248 | Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 and Sitefinity before… | 2017-07-03T19:29:00.270 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-8759 | Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to exe… | 2017-09-13T01:29:12.193 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-8570 | Microsoft Office allows a remote code execution vulnerability due to the way that it handles object… | 2017-07-11T21:29:01.267 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-8543 | Microsoft Windows XP SP3, Windows XP x64 XP2, Windows Server 2003 SP2, Windows Vista, Windows 7 SP1… | 2017-06-15T01:29:04.490 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-8540 | The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Mi… | 2017-05-26T20:29:00.427 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-8464 | Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.… | 2017-06-15T01:29:02.727 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-8291 | Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdp… | 2017-04-27T01:59:02.057 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-7494 | Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code executio… | 2017-05-30T18:29:00.190 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-7269 | Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information … | 2017-03-27T02:59:00.453 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-6884 | A command injection vulnerability was discovered on the Zyxel EMG2926 home router with firmware V1.… | 2017-04-06T17:59:00.163 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-6862 | NETGEAR WNR2000v3 devices before 1.1.2.14, WNR2000v4 devices before 1.0.0.66, and WNR2000v5 devices… | 2017-05-26T20:29:00.177 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-6744 | The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains m… | 2017-07-17T21:29:00.510 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-6743 | The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains m… | 2017-07-17T21:29:00.477 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-6740 | The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains m… | 2017-07-17T21:29:00.370 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-6739 | A vulnerability in the SNMP implementation of could allow an authenticated, remote attacker to caus… | 2017-07-17T21:29:00.337 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-6738 | The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains m… | 2017-07-17T21:29:00.290 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-6737 | A vulnerability in the SNMP implementation of could allow an authenticated, remote attacker to caus… | 2017-07-17T21:29:00.243 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-6736 | The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains m… | 2017-07-17T21:29:00.213 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-6663 | A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software… | 2017-08-07T06:29:00.230 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-6627 | A vulnerability in the UDP processing code of Cisco IOS 15.1, 15.2, and 15.4 and IOS XE 3.14 throug… | 2017-09-07T21:29:00.660 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-6334 | dnslookup.cgi on NETGEAR DGN2200 devices with firmware through 10.0.0.50 allows remote authenticate… | 2017-03-06T02:59:00.433 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-6327 | The Symantec Messaging Gateway before 10.6.3-267 can encounter an issue of remote code execution, w… | 2017-08-11T20:29:00.207 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-6316 | Citrix NetScaler SD-WAN devices through v9.1.2.26.561201 allow remote attackers to execute arbitrar… | 2017-07-20T04:29:00.423 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-6077 | ping.cgi on NETGEAR DGN2200 devices with firmware through 10.0.0.50 allows remote authenticated use… | 2017-02-22T23:59:00.190 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-5689 | An unprivileged network attacker could gain system privileges to provisioned Intel manageability SK… | 2017-05-02T14:59:00.520 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-5638 | The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has i… | 2017-03-11T02:59:00.150 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-5521 | An issue was discovered on NETGEAR R8500, R8300, R7000, R6400, R7300, R7100LG, R6300v2, WNDR3400v3,… | 2017-01-17T09:59:00.333 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-5070 | Type confusion in V8 in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3… | 2017-10-27T05:29:00.847 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-5030 | Incorrect handling of complex species in V8 in Google Chrome prior to 57.0.2987.98 for Linux, Windo… | 2017-04-24T23:59:00.190 | 2026-04-21T15:19:27.667 |
| fkie_cve-2017-3506 | Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: We… | 2017-04-24T19:59:03.037 | 2026-04-21T15:19:27.667 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-49mg-4v6p-32w2 |
5.4 (3.1)
5.1 (4.0)
|
Vvveb prior to 1.0.8.1 contains a stored cross-site scripting vulnerability that allows authenticat… | 2026-04-20T18:31:48Z | 2026-04-20T18:31:48Z |
| ghsa-wf66-mphr-4c4r |
5.3 (3.1)
|
Information exposure vulnerability has been identified in Apache Kafka. The NetworkClient componen… | 2026-04-20T15:31:52Z | 2026-04-20T18:31:47Z |
| ghsa-gxrh-c9qf-pf88 |
7.2 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-20T18:31:47Z | 2026-04-20T18:31:47Z |
| ghsa-2wm4-697g-pfq8 |
9.8 (3.1)
|
SGLang's reranking endpoint (/v1/rerank) achieves Remote Code Execution (RCE) when a model file con… | 2026-04-20T15:31:52Z | 2026-04-20T18:31:47Z |
| ghsa-w9r4-94fj-xp69 |
3.7 (3.1)
|
Secrets in Variables saved as JSON dictionaries were not properly redacted - in case thee variables… | 2026-04-18T09:30:20Z | 2026-04-20T18:31:46Z |
| ghsa-qhfq-gvvc-5q6q |
5.3 (3.1)
|
Apache Doris MCP Server versions earlier than 0.6.1 are affected by an improper neutralization flaw… | 2026-04-20T15:31:52Z | 2026-04-20T18:31:46Z |
| ghsa-5w6h-pjw6-wvc6 |
5.4 (3.1)
|
The Keycloak authentication manager in `apache-airflow-providers-keycloak` did not generate or vali… | 2026-04-18T15:34:15Z | 2026-04-20T18:31:46Z |
| ghsa-28jg-cgg7-j4wc |
9.1 (3.1)
|
A possible security vulnerability has been identified in Apache Kafka. By default, the broker prop… | 2026-04-20T15:31:52Z | 2026-04-20T18:31:46Z |
| ghsa-w7cf-2pmc-5m4c |
7.5 (3.1)
|
In case of SQL errors, exception/stack trace of errors was exposed in API even if "api/expose_stack… | 2026-04-18T09:30:20Z | 2026-04-20T18:31:45Z |
| ghsa-h97w-pm3w-mwmc |
7.5 (3.1)
|
UI / API User with asset materialize permission could trigger dags they had no access to. Users are… | 2026-04-18T09:30:20Z | 2026-04-20T18:31:45Z |
| ghsa-6ffj-2wg2-w45j |
9.8 (3.1)
|
Dag Authors, who normally should not be able to execute code in the webserver context could craft X… | 2026-04-18T09:30:20Z | 2026-04-20T18:31:45Z |
| ghsa-6337-2587-f2jq |
8.8 (3.1)
|
An example of BashOperator in Airflow documentation suggested a way of passing dag_run.conf in the … | 2026-04-18T09:30:20Z | 2026-04-20T18:31:45Z |
| ghsa-v446-j5j2-jvvp |
6.7 (3.1)
|
A vulnerability allowing a local attacker with administrator privileges to bypass Windows Driver Si… | 2026-04-17T18:31:51Z | 2026-04-20T18:31:44Z |
| ghsa-q4xv-xmjx-4h94 |
7.1 (4.0)
|
miniupnpd contains an integer underflow vulnerability in SOAPAction header parsing that allows remo… | 2026-04-18T00:31:04Z | 2026-04-20T18:31:44Z |
| ghsa-p2v5-ghx9-jg75 |
6.3 (3.1)
5.3 (4.0)
|
Livestatus injection in the monitoring quicksearch in Checkmk <2.5.0b4 allows an authenticated atta… | 2026-04-10T09:31:16Z | 2026-04-20T18:31:43Z |
| ghsa-hxwv-vc7p-p66g |
7.6 (3.1)
5.1 (4.0)
|
Livestatus injection in the notification test mode in Checkmk <2.5.0b4 and <2.4.0p26 allows an auth… | 2026-04-10T09:31:16Z | 2026-04-20T18:31:43Z |
| ghsa-f43w-3fr5-h2m3 |
6.5 (3.1)
6.9 (4.0)
|
Hydrosystem Control System saves sensitive information into a log file. Critically, user credential… | 2026-04-09T12:31:10Z | 2026-04-20T18:31:43Z |
| ghsa-8gxr-c98h-cwxm |
6.3 (3.1)
5.3 (4.0)
|
Livestatus injection in the prediction graph page in Checkmk <2.5.0b4, <2.4.0p26, and <2.3.0p47 all… | 2026-04-10T09:31:16Z | 2026-04-20T18:31:43Z |
| ghsa-w5x8-257x-9rv5 |
5.4 (3.1)
5.1 (4.0)
|
Bludit is vulnerable to Stored Cross-Site Scripting (XSS) in its page creating functionality. An au… | 2026-04-07T12:31:15Z | 2026-04-20T18:31:42Z |
| ghsa-r6gx-fcg6-8hhj |
7.5 (3.1)
|
A flaw was found in WebKitGTK and WPE WebKit. This vulnerability allows an out-of-bounds read and i… | 2025-11-25T09:31:24Z | 2026-04-20T18:31:42Z |
| ghsa-p6w4-7rrj-xwqx |
8.8 (3.1)
8.7 (4.0)
|
Hydrosystem Control System is vulnerable to SQL Injection across most scripts and input parameters.… | 2026-04-09T12:31:11Z | 2026-04-20T18:31:42Z |
| ghsa-hh72-xj72-2c38 |
9.1 (3.1)
8.8 (4.0)
|
Hydrosystem Control System does not enforce authorization for some directories. This allows an unau… | 2026-04-09T12:31:10Z | 2026-04-20T18:31:42Z |
| ghsa-fv83-x2xw-2j55 |
7.5 (3.1)
|
When verifying a certificate chain containing excluded DNS constraints, these constraints are not c… | 2026-04-08T03:32:14Z | 2026-04-20T18:31:42Z |
| ghsa-5rc9-qhhx-3j46 |
7.0 (3.1)
7.3 (4.0)
|
BuhoCleaner contains an insecure XPC service that allows local, unprivileged users to escalate thei… | 2026-02-03T00:30:18Z | 2026-04-20T18:31:42Z |
| ghsa-3fcc-qfqw-wqr5 |
5.8 (3.1)
|
A ZigBee coordinator, router, or end device may change their node ID when an unsolicited encrypted … | 2025-01-15T09:30:50Z | 2026-04-20T18:31:42Z |
| ghsa-rpw7-c5cp-v8vp |
5.5 (3.1)
|
Leanote version 2.7.0 allows obtaining arbitrary local files. This is possible because the applica… | 2024-02-07T03:30:33Z | 2026-04-20T18:31:41Z |
| ghsa-x2wv-w39c-7c55 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in Qibo CMS 1.0. Affected by this issue is some unknown functionalit… | 2026-04-20T15:31:52Z | 2026-04-20T15:31:52Z |
| ghsa-wvwg-7g9q-g3v4 |
8.4 (3.1)
|
OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an … | 2026-04-20T15:31:52Z | 2026-04-20T15:31:52Z |
| ghsa-rw4j-jhfh-fr2h |
8.4 (3.1)
|
OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an … | 2026-04-20T15:31:52Z | 2026-04-20T15:31:52Z |
| ghsa-pwx9-99jm-fx95 |
8.4 (3.1)
|
OS Command Injection Remote Code Execution Vulnerability in UI in Progress ADC Products allows an a… | 2026-04-20T15:31:52Z | 2026-04-20T15:31:52Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-174 |
4.3 (3.1)
|
Server-Side Request Forgery (SSRF) vulnerability in Apache StreamPipes during installatio… | streampipes | 2024-07-17T09:15:02+00:00 | 2025-01-18T22:21:43.678475+00:00 |
| pysec-2024-173 |
8.8 (3.1)
|
Unrestricted Upload of File with dangerous type vulnerability in Apache StreamPipes. Such… | streampipes | 2024-07-17T10:15:01+00:00 | 2025-01-18T22:21:43.618882+00:00 |
| pysec-2024-172 |
3.7 (3.1)
|
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache StreamPipes in … | streampipes | 2024-07-17T09:15:02+00:00 | 2025-01-18T22:21:43.557516+00:00 |
| pysec-2024-171 |
8.0 (3.1)
|
Strawberry GraphQL is a library for creating GraphQL APIs. Prior to version 0.243.0, mult… | strawberry-graphql | 2024-09-25T18:15:05+00:00 | 2025-01-18T22:21:43.412172+00:00 |
| pysec-2024-170 |
4.8 (3.1)
|
A stored Cross-Site Scripting (XSS) vulnerability was identified in the zenml-io/zenml re… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-18T19:19:08.253212+00:00 |
| pysec-2024-169 |
6.5 (3.1)
|
An improper authorization vulnerability exists in the zenml-io/zenml repository, specific… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-18T19:19:08.205431+00:00 |
| pysec-2024-168 |
6.5 (3.1)
|
Taipy is an open-source Python library for easy, end-to-end application development for d… | taipy | 2024-10-09T19:15:14+00:00 | 2025-01-18T19:19:07.718423+00:00 |
| pysec-2024-167 |
|
NLTK through 3.8.1 allows remote code execution if untrusted packages have pickled Python… | nltk | 2024-06-27T22:15:10+00:00 | 2025-01-18T19:19:06.317325+00:00 |
| pysec-2024-166 |
|
Nautobot is a Network Source of Truth and Network Automation Platform. A user with permis… | nautobot | 2024-05-28T23:15:17+00:00 | 2025-01-18T19:19:06.277166+00:00 |
| pysec-2024-165 |
7.5 (3.1)
|
The Jupyter Server provides the backend for Jupyter web applications. Jupyter Server on W… | jupyter-server | 2024-06-06T16:15:11+00:00 | 2025-01-18T19:19:04.842426+00:00 |
| pysec-2024-164 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. If an exces… | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-16T21:21:41.436934+00:00 |
| pysec-2025-1 |
|
An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2… | django | 2025-01-14T19:15:32+00:00 | 2025-01-14T21:22:18.665005+00:00 |
| pysec-2024-163 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Prior to ve… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-14T05:22:23.036505+00:00 |
| pysec-2024-162 |
6.5 (3.1)
|
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the XMLFeedSpider … | scrapy | 2024-02-28T00:15:53+00:00 | 2025-01-14T05:22:21.870348+00:00 |
| pysec-2024-161 |
|
Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R packag… | pyarrow | 2024-11-28T17:15:48+00:00 | 2025-01-14T05:22:20.554292+00:00 |
| pysec-2024-160 |
6.1 (3.1)
|
lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.cle… | lxml-html-clean | 2024-11-19T22:15:21+00:00 | 2025-01-14T05:22:17.244267+00:00 |
| pysec-2024-159 |
|
Versions of the package luigi before 3.6.0 are vulnerable to Arbitrary File Write via Arc… | luigi | 2024-12-10T05:15:07+00:00 | 2025-01-14T05:22:17.204098+00:00 |
| pysec-2024-158 |
|
Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when … | djoser | 2024-12-13T05:15:07+00:00 | 2025-01-14T05:22:11.856636+00:00 |
| pysec-2024-157 |
|
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2… | django | 2024-12-06T12:15:18+00:00 | 2025-01-14T05:22:11.817473+00:00 |
| pysec-2024-156 |
|
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2… | django | 2024-12-06T12:15:17+00:00 | 2025-01-14T05:22:11.736011+00:00 |
| pysec-2024-155 |
7.5 (3.1)
|
cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) … | cbor2 | 2024-02-19T23:15:07+00:00 | 2025-01-14T05:22:09.226388+00:00 |
| pysec-2019-255 |
6.1 (3.1)
|
data/interfaces/default/history.html in Tautulli 2.1.26 has XSS via a crafted Plex userna… | tautulli | 2019-02-19T16:29:00Z | 2025-01-12T05:34:20.550037Z |
| pysec-2019-254 |
6.5 (3.1)
|
In Tautulli 2.1.9, CSRF in the /shutdown URI allows an attacker to shut down the remote m… | tautulli | 2019-12-18T18:15:00Z | 2025-01-12T05:34:20.505254Z |
| pysec-2022-43131 |
6.5 (3.1)
|
diplib v3.0.0 is vulnerable to Double Free. | diplib | 2022-11-04T17:15:00Z | 2024-12-27T22:48:17.996707Z |
| pysec-2022-43162 |
7.5 (3.1)
|
Redis v7.0 was discovered to contain a memory leak via the component streamGetEdgeID. | redis | 2022-06-23T17:15:00Z | 2024-12-23T11:33:23.546447Z |
| pysec-2019-253 |
7.4 (3.1)
|
Tahoe-LAFS 1.9.0 fails to ensure integrity which allows remote attackers to corrupt mutab… | tahoe-lafs | 2019-11-07T18:15:00Z | 2024-12-19T05:47:49.035329Z |
| pysec-2020-343 |
7.8 (3.1)
|
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when the… | blosc2 | 2020-11-27T20:15:00Z | 2024-12-12T14:22:45.450508Z |
| pysec-2024-154 |
8.6 (3.1)
8.7 (4.0)
|
Ultralytics has identified a supply chain attack affecting affecting multiple versions of… | ultralytics | 2024-12-10T19:20:27.097505+00:00 | |
| pysec-2015-42 |
|
providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.… | ipsilon | 2015-11-17T15:59:00Z | 2024-12-05T09:35:27.751929Z |
| pysec-2015-41 |
|
providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.… | ipsilon | 2015-11-17T15:59:00Z | 2024-12-05T09:35:27.711043Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33844 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.384822Z |
| gsd-2024-33728 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.380564Z |
| gsd-2024-33754 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.379823Z |
| gsd-2024-33837 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.377806Z |
| gsd-2024-33746 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.376327Z |
| gsd-2024-33691 | Cross-Site Request Forgery (CSRF) vulnerability in OptinMonster Popup Builder Team OptinM… | 2024-04-27T05:02:18.375458Z |
| gsd-2024-33828 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.373189Z |
| gsd-2024-33826 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.371945Z |
| gsd-2024-33800 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.371673Z |
| gsd-2024-33716 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.371227Z |
| gsd-2024-33751 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.370177Z |
| gsd-2024-33803 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.369211Z |
| gsd-2024-33812 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.367474Z |
| gsd-2024-33771 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.366201Z |
| gsd-2024-33762 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.364877Z |
| gsd-2024-33723 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.361754Z |
| gsd-2024-33718 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.360853Z |
| gsd-2024-33821 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.360168Z |
| gsd-2024-33846 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.353086Z |
| gsd-2024-33819 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.351158Z |
| gsd-2024-33823 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.350433Z |
| gsd-2024-33764 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.348731Z |
| gsd-2024-33798 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.346901Z |
| gsd-2024-33736 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.346507Z |
| gsd-2024-33739 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.344696Z |
| gsd-2024-33719 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.344333Z |
| gsd-2024-33802 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.336079Z |
| gsd-2024-33763 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.335356Z |
| gsd-2024-33820 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.334156Z |
| gsd-2024-33834 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.333945Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2237 | Malicious code in jsonify-builder (npm) | 2026-03-26T14:45:36Z | 2026-04-16T15:42:09Z |
| mal-2026-2226 | Malicious code in node-coremesh (npm) | 2026-03-26T00:42:51Z | 2026-04-16T15:42:09Z |
| mal-2026-2225 | Malicious code in neanderthal-validator (npm) | 2026-03-26T00:52:19Z | 2026-04-16T15:42:09Z |
| mal-2026-2200 | Malicious code in json-lucide (npm) | 2026-03-25T16:45:38Z | 2026-04-16T15:42:09Z |
| mal-2026-2188 | Malicious code in levex-refa (npm) | 2026-03-25T11:59:23Z | 2026-04-16T15:42:09Z |
| mal-2026-2161 | Malicious code in path-external (npm) | 2026-03-25T01:50:59Z | 2026-04-16T15:42:09Z |
| mal-2026-2155 | Malicious code in pino-pretty-log (npm) | 2026-03-25T00:36:47Z | 2026-04-16T15:42:09Z |
| mal-2026-1978 | Malicious code in json-specular (npm) | 2026-03-20T04:53:15Z | 2026-04-16T15:42:09Z |
| mal-2026-1977 | Malicious code in json-bundling (npm) | 2026-03-20T04:53:15Z | 2026-04-16T15:42:09Z |
| mal-2026-1962 | Malicious code in parsejson-pro (npm) | 2026-03-20T04:41:13Z | 2026-04-16T15:42:09Z |
| mal-2026-1960 | Malicious code in nodex-db (npm) | 2026-03-20T04:40:18Z | 2026-04-16T15:42:09Z |
| mal-2026-1959 | Malicious code in node-business (npm) | 2026-03-20T04:40:18Z | 2026-04-16T15:42:09Z |
| mal-2026-1935 | Malicious code in jsonify-bundler (npm) | 2026-03-20T01:29:54Z | 2026-04-16T15:42:09Z |
| mal-2026-1925 | Malicious code in jsonify-parser (npm) | 2026-03-19T15:13:48Z | 2026-04-16T15:42:09Z |
| mal-2026-1816 | Malicious code in pkgnewfefame1 (npm) | 2026-03-18T13:03:54Z | 2026-04-16T15:42:09Z |
| mal-2026-1493 | Malicious code in pino-logger-utils (npm) | 2026-03-17T04:46:23Z | 2026-04-16T15:42:09Z |
| mal-2026-1463 | Malicious code in polymarket-validator (npm) | 2026-03-16T10:13:14Z | 2026-04-16T15:42:09Z |
| mal-2026-1399 | Malicious code in pino-sdk (npm) | 2026-03-13T06:55:58Z | 2026-04-16T15:42:09Z |
| mal-2026-1398 | Malicious code in meta-internal-logger-drzak (npm) | 2026-03-13T06:47:07Z | 2026-04-16T15:42:09Z |
| mal-2026-1331 | Malicious code in llm-oracle (npm) | 2026-03-11T05:58:11Z | 2026-04-16T15:42:09Z |
| mal-2025-27318 | Malicious code in netstruct (npm) | 2025-08-14T18:52:04Z | 2026-04-16T15:42:09Z |
| mal-2025-1044 | Malicious code in minikit-monorepo (npm) | 2025-02-03T17:25:15Z | 2026-04-16T15:42:09Z |
| mal-2026-834 | Malicious code in graphflowx (npm) | 2026-02-10T15:46:43Z | 2026-04-16T15:42:08Z |
| mal-2026-692 | Malicious code in graphrix (npm) | 2026-02-03T07:44:00Z | 2026-04-16T15:42:08Z |
| mal-2026-680 | Malicious code in frontend-js-state-web (npm) | 2026-02-03T07:27:10Z | 2026-04-16T15:42:08Z |
| mal-2026-2642 | Malicious code in chatbotloader (npm) | 2026-04-14T11:47:13Z | 2026-04-16T15:42:08Z |
| mal-2026-2641 | Malicious code in chai-as-refined (npm) | 2026-04-14T11:48:44Z | 2026-04-16T15:42:08Z |
| mal-2026-2640 | Malicious code in bytefrontier-core (npm) | 2026-04-14T11:47:12Z | 2026-04-16T15:42:08Z |
| mal-2026-2639 | Malicious code in bytefrontier (npm) | 2026-04-14T11:47:12Z | 2026-04-16T15:42:08Z |
| mal-2026-2249 | Malicious code in chai-as-added (npm) | 2026-03-27T03:12:35Z | 2026-04-16T15:42:08Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0882 | GIMP: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0881 | IBM License Metric Tool: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0878 | FreeBSD Project FreeBSD OS: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0873 | docker: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0869 | SolarWinds Platform: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0865 | Keycloak: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0849 | ImageMagick: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-03-24T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0837 | Google Chrome: Mehrere Schwachstellen | 2026-03-23T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0833 | Ruby on Rails: Mehrere Schwachstellen | 2026-03-23T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0831 | systemd: Mehrere Schwachstellen | 2026-03-23T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0821 | Keycloak: Mehrere Schwachstellen | 2026-03-22T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0818 | etcd: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2026-03-22T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0816 | Apache ActiveMQ Artemis: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-22T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0787 | Keycloak: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0785 | libarchive: Schwachstelle ermöglicht Denial of Service | 2026-03-18T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0781 | Drupal Automated Logout Extension: Schwachstelle ermöglicht Manipulation von Dateien | 2026-03-18T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0775 | nghttp2: Schwachstelle ermöglicht Denial of Service | 2026-03-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0764 | Grafana Tempo: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0760 | Xen und Citrix Systems XenServer: Mehrere Schwachstellen | 2026-03-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0734 | GNU InetUtils: Mehrere Schwachstellen | 2026-03-15T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0720 | systemd: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0704 | Google Cloud Platform Envoy Proxy, Istio und Service Mesh: Mehrere Schwachstellen | 2026-03-11T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0607 | CPython: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-04T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0599 | Drupal Extensions: Mehrere Schwachstellen | 2026-03-04T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0595 | Ruby: Schwachstelle ermöglicht Denial of Service | 2026-03-04T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0556 | vim: Mehrere Schwachstellen | 2026-03-01T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0508 | Keycloak: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-02-24T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0504 | Mattermost Server und Plugins: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2026-02-24T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0446 | libssh: Mehrere Schwachstellen ermöglichen Manipulation von Dateien und DoS | 2026-02-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0419 | vim (NetBeans): Schwachstelle ermöglicht Codeausführung | 2026-02-15T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-020-02 | Schneider Electric devices using CODESYS Runtime | 2023-07-11T07:15:18.000000Z | 2026-01-20T15:49:51.778731Z |
| icsa-26-020-03 | Rockwell Automation Verve Asset Manager | 2026-01-20T07:00:00.000000Z | 2026-01-20T07:00:00.000000Z |
| va-26-015-01 | NOAA PMEL Live Access Server (LAS) command injection | 2026-01-15T19:59:37Z | 2026-01-15T19:59:37Z |
| icsa-26-015-01 | AVEVA Process Optimization | 2026-01-15T07:00:00.000000Z | 2026-01-15T07:00:00.000000Z |
| icsa-24-135-04 | Mitsubishi Electric Multiple FA Engineering Software Products (Update E) | 2024-05-14T06:00:00.000000Z | 2026-01-15T07:00:00.000000Z |
| icsa-26-015-08 | Siemens Industrial Edge Devices | 2026-01-13T00:00:00.000000Z | 2026-01-14T23:03:52.355094Z |
| icsa-26-015-02 | Festo Firmware | 2022-11-29T11:49:00.000000Z | 2026-01-14T22:46:49.184310Z |
| icsa-26-015-06 | Siemens SINEC Security Monitor | 2025-12-09T00:00:00.000000Z | 2026-01-14T22:35:44.907344Z |
| icsa-26-015-05 | Siemens RUGGEDCOM ROS | 2025-12-09T00:00:00.000000Z | 2026-01-14T22:35:44.058931Z |
| icsa-26-015-03 | Siemens TeleControl Server Basic | 2026-01-13T00:00:00.000000Z | 2026-01-14T22:32:36.777247Z |
| icsa-25-226-09 | Siemens RUGGEDCOM APE1808 | 2025-08-12T00:00:00.000000Z | 2026-01-14T22:05:42.880807Z |
| icsa-24-354-04 | Siemens User Management Component | 2024-12-16T00:00:00.000000Z | 2026-01-14T22:05:42.437898Z |
| icsa-25-072-09 | Siemens OPC UA | 2025-03-11T00:00:00.000000Z | 2026-01-14T22:05:42.018496Z |
| icsa-25-162-04 | Siemens SCALANCE and RUGGEDCOM | 2025-06-10T00:00:00.000000Z | 2026-01-14T22:05:41.593078Z |
| icsa-25-289-10 | Siemens HyperLynx and Industrial Edge App Publisher | 2025-10-14T00:00:00.000000Z | 2026-01-14T22:05:41.165529Z |
| icsa-24-074-05 | Siemens RUGGEDCOM APE1808 | 2024-03-12T00:00:00.000000Z | 2026-01-14T22:00:12.208787Z |
| icsa-24-193-02 | Siemens RUGGEDCOM APE 1808 | 2024-07-09T00:00:00.000000Z | 2026-01-14T22:00:11.677616Z |
| icsa-24-074-11 | Siemens RUGGEDCOM APE1808 with Fortigate NGFW Devices | 2024-03-12T00:00:00.000000Z | 2026-01-14T22:00:10.660779Z |
| icsa-24-193-11 | Siemens RUGGEDCOM APE 1808 | 2024-07-09T00:00:00.000000Z | 2026-01-14T22:00:09.701376Z |
| icsa-26-015-09 | Siemens Industrial Edge Device Kit | 2026-01-13T00:00:00.000000Z | 2026-01-14T21:54:58.722065Z |
| icsa-26-013-03 | YoSmart YoLink Smart Hub | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-26-013-02 | Rockwell Automation FactoryTalk DataMosaix Private Cloud | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-26-013-01 | Rockwell Automation 432ES-IG3 Series A | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-25-212-01 | Güralp Systems FMUS Series and MIN Series Devices (Update B) | 2025-07-31T06:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| va-26-013-01 | NSecKrnl driver terminates system processes with crafted IOCTL requests | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| icsa-25-345-03 | AzeoTech DAQFactory (Update A) | 2025-12-11T07:00:00.000000Z | 2026-01-12T07:00:00.000000Z |
| va-26-008-01 | OPEXUS eCASE | 2026-01-08T16:36:15Z | 2026-01-08T16:36:15Z |
| va-26-008-03 | Ideagen DevonWay stored XSS | 2026-01-08T00:00:00Z | 2026-01-08T00:00:00Z |
| icsa-26-008-01 | Hitachi Energy Asset Suite | 2025-12-09T00:00:00.000000Z | 2026-01-07T21:26:16.381953Z |
| va-26-008-02 | OPEXUS eComplaint and eCasePortal IDOR | 2026-01-07T16:35:11Z | 2026-01-07T16:35:11Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-wlc-file-uplpd-rhzg9ufc | Cisco IOS XE Wireless Controller Software Arbitrary File Upload Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-06-06T20:02:48+00:00 |
| cisco-sa-ise-aws-static-cred-fpmjucm7 | Cisco Identity Services Engine on Cloud Platforms Static Credential Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-05T17:26:25+00:00 |
| cisco-sa-vos-command-inject-65s2ucyy | Cisco Unified Communications Products Command Injection Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ucs-ssh-priv-esc-2mzdtdjm | Cisco Integrated Management Controller Privilege Escalation Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-uccx-multi-uhotvpgl | Cisco Unified Contact Center Express Vulnerabilities | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-uccx-editor-rce-ezyyzte8 | Cisco Unified Contact Center Express Editor Remote Code Execution Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-te-endagent-filewrt-zncdqnrj | Cisco ThousandEyes Endpoint Agent for Windows Arbitrary File Delete Vulnerabilities | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ndfc-shkv-snqjtjrp | Cisco Nexus Dashboard Fabric Controller SSH Host Key Validation Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-icm-xss-cfcqhxag | Cisco Unified Intelligent Contact Management Enterprise Cross-Site Scripting Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ccp-info-disc-zygerqpd | Cisco Customer Collaboration Platform Information Disclosure Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-meraki-mx-vpn-dos-qtrhzg2 | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Denial of Service Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:28+00:00 |
| cisco-sa-meraki-mx-vpn-dos-by-qwukqv7x | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Session Takeover and Denial of Service Vulnerability | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:27+00:00 |
| cisco-sa-webex-xss-7teqtfn8 | Cisco Webex Services Cross-Site Scripting Vulnerabilities | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-webex-cache-q4xbkqbg | Cisco Webex Meetings Services HTTP Cache Poisoning Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sna-ssti-dpulqsmz | Cisco Secure Network Analytics Manager Privilege Escalation Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sna-apiacv-4b6x5ysw | Cisco Secure Network Analytics Manager API Authorization Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-ise-restart-ss-uf986g2q | Cisco Identity Services Engine RADIUS Denial of Service Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-duo-ssp-cmd-inj-rcmyrna | Cisco Duo Self-Service Portal Command Injection Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-cuis-priv-esc-3pk96su4 | Cisco Unified Intelligence Center Privilege Escalation Vulnerabilities | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-cucm-kkhzbhr5 | Cisco Unified Communications Products Privilege Escalation Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-contcent-insuffacces-ardovhn8 | Cisco Unified Contact Center Enterprise Cloud Connect Insufficient Access Control Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sdwanarbfile-2zkhkzwj | Cisco Catalyst SD-WAN Manager Arbitrary File Creation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-14T20:04:53+00:00 |
| cisco-sa-sdwan-fileoverwrite-uc9txwh | Cisco Catalyst SD-WAN Manager Arbitrary File Overwrite Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-08T15:55:57+00:00 |
| cisco-sa-wlc-wncd-p6gvt6hl | Cisco IOS XE Software for WLC Wireless IPv6 Clients Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-webui-multi-arnhm4v6 | Cisco IOS XE Software Web-Based Management Interface Vulnerabilities | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-webui-cmdinj-gvn3oknc | Cisco IOS XE Software Web-Based Management Interface Command Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-vmanage-xss-xhn8m5jt | Cisco Catalyst SD-WAN Manager Stored Cross-Site Scripting Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-vmanage-html-inj-gxvtk6zj | Cisco Catalyst SD-WAN Manager Reflected HTML Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-twamp-kv4fhugn | Cisco IOS, IOS XE, and IOS XR Software TWAMP Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-snmpv3-qkeyvzsy | Cisco IOS and IOS XE Software SNMPv3 Configuration Restriction Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-1151 | GNU Binutils ld xmemdup.c xmemdup memory leak | 2025-02-02T00:00:00.000Z | 2026-04-14T14:37:42.000Z |
| msrc_cve-2025-1152 | GNU Binutils ld xstrdup.c xstrdup memory leak | 2025-02-02T00:00:00.000Z | 2026-04-14T14:37:34.000Z |
| msrc_cve-2026-33829 | Windows Snipping Tool Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33827 | Windows TCP/IP Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33826 | Windows Active Directory Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33825 | Microsoft Defender Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33824 | Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33822 | Microsoft Word Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33120 | Microsoft SQL Server Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33116 | .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33115 | Microsoft Word Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33114 | Microsoft Word Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33104 | Win32k Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33103 | Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33101 | Windows Print Spooler Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33100 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33099 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33098 | Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33096 | HTTP.sys Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33095 | Microsoft Word Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32226 | .NET Framework Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32225 | Windows Shell Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32224 | Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32222 | Windows Win32k Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32221 | Windows Graphics Component Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32220 | UEFI Secure Boot Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32219 | Microsoft Brokering File System Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32218 | Windows Kernel Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32217 | Windows Kernel Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32216 | Windows Redirected Drive Buffering System Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0349 | Kwetsbaarheden verholpen in Nagios XI | 2025-11-03T08:27:42.052256Z | 2025-11-03T08:27:42.052256Z |
| ncsc-2025-0348 | Kwetsbaarheden verholpen in Arista Networks producten | 2025-11-03T08:26:39.905306Z | 2025-11-03T08:26:39.905306Z |
| ncsc-2025-0347 | Kwetsbaarheden verholpen in IBM QRadar SIEM | 2025-11-03T08:17:18.981494Z | 2025-11-03T08:17:18.981494Z |
| ncsc-2025-0346 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2025-11-03T08:14:02.972842Z | 2025-11-03T08:14:02.972842Z |
| ncsc-2025-0345 | Kwetsbaarheden verholpen in Rockwell Automation FactoryTalk | 2025-10-31T09:35:00.469498Z | 2025-10-31T09:35:00.469498Z |
| ncsc-2025-0344 | Kwetsbaarheden verholpen in Rockwell Automation COMMS | 2025-10-31T09:34:05.069339Z | 2025-10-31T09:34:05.069339Z |
| ncsc-2025-0343 | Kwetsbaarheid verholpen in Mozilla Firefox | 2025-10-31T09:31:53.270725Z | 2025-10-31T09:31:53.270725Z |
| ncsc-2025-0342 | Kwetsbaarheden verholpen in GitLab Enterprise en Community Edition | 2025-10-27T08:08:17.974767Z | 2025-10-27T09:38:47.073257Z |
| ncsc-2025-0341 | Kwetsbaarheden verholpen in BIND 9 | 2025-10-24T08:19:45.232307Z | 2025-10-27T08:24:03.796638Z |
| ncsc-2025-0310 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-10-14T18:03:45.875739Z | 2025-10-24T11:09:29.790442Z |
| ncsc-2025-0340 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2025-10-23T14:13:39.969386Z | 2025-10-23T14:13:39.969386Z |
| ncsc-2025-0339 | Kwetsbaarheden verholpen in Oracle MySQL | 2025-10-23T14:11:30.111892Z | 2025-10-23T14:11:30.111892Z |
| ncsc-2025-0338 | Kwetsbaarheden verholpen in Oracle JD Edwards EnterpriseOne Tools | 2025-10-23T13:53:27.268400Z | 2025-10-23T13:53:27.268400Z |
| ncsc-2025-0337 | Kwetsbaarheden verholpen in Oracle Java | 2025-10-23T13:51:40.686406Z | 2025-10-23T13:51:40.686406Z |
| ncsc-2025-0336 | Kwetsbaarheden verholpen in Oracle Hyperion | 2025-10-23T13:49:44.344049Z | 2025-10-23T13:49:44.344049Z |
| ncsc-2025-0335 | Kwetsbaarheden verholpen in Oracle Analytics | 2025-10-23T13:45:06.747933Z | 2025-10-23T13:45:06.747933Z |
| ncsc-2025-0333 | Kwetsbaarheden verholpen in Oracle Financial Services | 2025-10-23T13:35:32.902231Z | 2025-10-23T13:35:32.902231Z |
| ncsc-2025-0332 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2025-10-23T13:26:49.210414Z | 2025-10-23T13:26:49.210414Z |
| ncsc-2025-0331 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2025-10-23T13:23:20.471568Z | 2025-10-23T13:23:20.471568Z |
| ncsc-2025-0330 | Kwetsbaarheden verholpen in Oracle Communications producten | 2025-10-23T13:20:15.363063Z | 2025-10-23T13:20:15.363063Z |
| ncsc-2025-0329 | Kwetsbaarheden verholpen in Oracle Commerce | 2025-10-23T07:20:51.213314Z | 2025-10-23T07:20:51.213314Z |
| ncsc-2025-0328 | Kwetsbaarheden verholpen in Oracle Database producten | 2025-10-23T07:19:57.652532Z | 2025-10-23T07:19:57.652532Z |
| ncsc-2025-0327 | Kwetsbaarheden verholpen in Zohocorp's ManageEngine | 2025-10-23T07:18:47.274781Z | 2025-10-23T07:18:47.274781Z |
| ncsc-2025-0326 | Kwetsbaarheden verholpen in Moxa’s netwerkbeveiligingsapparaten | 2025-10-20T13:03:34.436477Z | 2025-10-20T13:03:34.436477Z |
| ncsc-2025-0325 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2025-10-20T12:59:06.729067Z | 2025-10-20T12:59:06.729067Z |
| ncsc-2025-0241 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-08-06T12:11:46.234849Z | 2025-10-17T10:44:55.312550Z |
| ncsc-2025-0324 | Kwetsbaarheid verholpen in FortiOS | 2025-10-17T08:42:51.624827Z | 2025-10-17T08:42:51.624827Z |
| ncsc-2025-0296 | Kwetsbaarheid verholpen in WatchGuard Fireware OS | 2025-09-19T13:31:26.392203Z | 2025-10-17T08:19:28.145953Z |
| ncsc-2025-0323 | Kwetsbaarheden verholpen in SAP Producten | 2025-10-17T08:04:54.828451Z | 2025-10-17T08:04:54.828451Z |
| ncsc-2025-0322 | Kwetsbaarheden verholpen in Adobe Commerce | 2025-10-16T06:32:33.597617Z | 2025-10-16T06:32:33.597617Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20348-1 | Security update for python-PyPDF2 | 2026-03-11T20:15:02Z | 2026-03-11T20:15:02Z |
| opensuse-su-2026:20345-1 | Security update for python-lxml_html_clean | 2026-03-11T18:05:18Z | 2026-03-11T18:05:18Z |
| opensuse-su-2026:20342-1 | Security update for go1.26 | 2026-03-11T09:09:25Z | 2026-03-11T09:09:25Z |
| opensuse-su-2026:20341-1 | Security update for kea | 2026-03-11T08:51:21Z | 2026-03-11T08:51:21Z |
| opensuse-su-2026:20340-1 | Security update for cJSON | 2026-03-11T08:21:26Z | 2026-03-11T08:21:26Z |
| opensuse-su-2026:20339-1 | Security update for freerdp | 2026-03-10T12:34:56Z | 2026-03-10T12:34:56Z |
| opensuse-su-2026:10323-1 | traefik-3.6.10-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10322-1 | python311-lxml_html_clean-0.4.4-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10321-1 | python311-PyPDF2-2.11.1-6.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10320-1 | perl-Compress-Raw-Zlib-2.222-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10319-1 | helm3-3.20.0-2.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10318-1 | helm-4.1.1-3.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10317-1 | grype-0.109.1-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10316-1 | ghostty-1.3.0-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10315-1 | GraphicsMagick-1.3.46-2.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:20336-1 | Security update for cockpit-podman | 2026-03-09T10:47:09Z | 2026-03-09T10:47:09Z |
| opensuse-su-2026:20337-1 | Security update for ImageMagick | 2026-03-09T10:04:29Z | 2026-03-09T10:04:29Z |
| opensuse-su-2026:10314-1 | traefik2-2.11.40-1.1 on GA media | 2026-03-09T00:00:00Z | 2026-03-09T00:00:00Z |
| opensuse-su-2026:10313-1 | rclone-1.73.2-1.1 on GA media | 2026-03-09T00:00:00Z | 2026-03-09T00:00:00Z |
| opensuse-su-2026:10312-1 | python311-pymongo-4.16.0-1.1 on GA media | 2026-03-09T00:00:00Z | 2026-03-09T00:00:00Z |
| opensuse-su-2026:10311-1 | corepack24-24.13.0-4.1 on GA media | 2026-03-08T00:00:00Z | 2026-03-08T00:00:00Z |
| opensuse-su-2026:10310-1 | go1.25-1.25.8-1.1 on GA media | 2026-03-08T00:00:00Z | 2026-03-08T00:00:00Z |
| opensuse-su-2026:20332-1 | Security update for chromium | 2026-03-07T12:59:14Z | 2026-03-07T12:59:14Z |
| opensuse-su-2026:10309-1 | weblate-5.16.1-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10308-1 | virtiofsd-1.13.2-2.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10307-1 | tomcat11-11.0.18-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10306-1 | tomcat10-10.1.52-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10305-1 | tomcat-9.0.115-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10304-1 | python311-nltk-3.9.3-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10303-1 | libIex-3_4-33-3.4.6-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:3108 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.1.5 | 2026-02-23T17:24:11+00:00 | 2026-04-14T09:46:23+00:00 |
| rhsa-2026:3107 | Red Hat Security Advisory: Kiali 1.73.27 for Red Hat OpenShift Service Mesh 2.6 | 2026-02-23T17:16:07+00:00 | 2026-04-14T09:46:23+00:00 |
| rhsa-2026:3104 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.0.8 | 2026-02-23T17:13:34+00:00 | 2026-04-14T09:46:22+00:00 |
| rhsa-2026:3087 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-23T13:35:49+00:00 | 2026-04-14T09:46:22+00:00 |
| rhsa-2026:3040 | Red Hat Security Advisory: grafana-pcp security update | 2026-02-23T02:14:35+00:00 | 2026-04-14T09:46:21+00:00 |
| rhsa-2026:3035 | Red Hat Security Advisory: grafana-pcp security update | 2026-02-23T01:30:21+00:00 | 2026-04-14T09:46:21+00:00 |
| rhsa-2026:2951 | Red Hat Security Advisory: Red Hat OpenShift API for Data Protection | 2026-02-18T14:15:26+00:00 | 2026-04-14T09:46:21+00:00 |
| rhsa-2026:2927 | Red Hat Security Advisory: RHTAS 1.2.2 - Red Hat Trusted Artifact Signer Release | 2026-02-18T12:52:55+00:00 | 2026-04-14T09:46:21+00:00 |
| rhsa-2026:2681 | Red Hat Security Advisory: Red Hat Quay 3.16.2 | 2026-02-12T17:29:21+00:00 | 2026-04-14T09:46:21+00:00 |
| rhsa-2026:2926 | Red Hat Security Advisory: RHTAS 1.2.2 - Red Hat Trusted Artifact Signer Release | 2026-02-18T12:44:41+00:00 | 2026-04-14T09:46:20+00:00 |
| rhsa-2026:2922 | Red Hat Security Advisory: RHTAS 1.2.2 - Red Hat Trusted Artifact Signer Release | 2026-02-18T12:26:00+00:00 | 2026-04-14T09:46:20+00:00 |
| rhsa-2026:2921 | Red Hat Security Advisory: RHTAS 1.2.2 - Red Hat Trusted Artifact Signer Release | 2026-02-18T12:19:05+00:00 | 2026-04-14T09:46:20+00:00 |
| rhsa-2026:2920 | Red Hat Security Advisory: grafana security update | 2026-02-18T12:55:46+00:00 | 2026-04-14T09:46:20+00:00 |
| rhsa-2026:2740 | Red Hat Security Advisory: Red Hat JBoss Web Server 6.2.0 security release | 2026-02-16T18:57:53+00:00 | 2026-04-14T09:46:20+00:00 |
| rhsa-2026:2675 | Red Hat Security Advisory: Red Hat Developer Hub 1.8.3 release. | 2026-02-12T15:30:56+00:00 | 2026-04-14T09:46:20+00:00 |
| rhsa-2026:2914 | Red Hat Security Advisory: grafana security update | 2026-02-18T11:31:17+00:00 | 2026-04-14T09:46:19+00:00 |
| rhsa-2026:2769 | Red Hat Security Advisory: Red Hat Ceph Storage 7.1 security and bug fix updates | 2026-02-17T00:55:59+00:00 | 2026-04-14T09:46:19+00:00 |
| rhsa-2026:2762 | Red Hat Security Advisory: Red Hat Quay 3.10.18 | 2026-02-16T17:44:31+00:00 | 2026-04-14T09:46:18+00:00 |
| rhsa-2026:2754 | Red Hat Security Advisory: Red Hat Quay 3.9.18 | 2026-02-16T15:43:51+00:00 | 2026-04-14T09:46:17+00:00 |
| rhsa-2026:2741 | Red Hat Security Advisory: Red Hat JBoss Web Server 6.2.0 security release | 2026-02-16T18:55:18+00:00 | 2026-04-14T09:46:17+00:00 |
| rhsa-2026:2654 | Red Hat Security Advisory: Release of components for Service Telemetry Framework 1.5.7 | 2026-02-12T13:46:10+00:00 | 2026-04-14T09:46:16+00:00 |
| rhsa-2026:2572 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.14.2 security update | 2026-02-11T16:14:44+00:00 | 2026-04-14T09:46:16+00:00 |
| rhsa-2026:2571 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.9.2 security update | 2026-02-11T15:58:30+00:00 | 2026-04-14T09:46:16+00:00 |
| rhsa-2026:2456 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.26.0 Release. | 2026-02-10T17:06:01+00:00 | 2026-04-14T09:46:15+00:00 |
| rhsa-2026:2454 | Red Hat Security Advisory: DevWorkspace Operator 0.39.0 release. | 2026-02-10T15:32:22+00:00 | 2026-04-14T09:46:15+00:00 |
| rhsa-2026:2441 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-02-10T13:45:07+00:00 | 2026-04-14T09:46:15+00:00 |
| rhsa-2026:2376 | Red Hat Security Advisory: Red Hat Web Terminal Operator 1.14.0 release. | 2026-02-09T23:40:14+00:00 | 2026-04-14T09:46:15+00:00 |
| rhsa-2026:2375 | Red Hat Security Advisory: Red Hat Web Terminal Operator 1.15.0 release. | 2026-02-09T22:06:53+00:00 | 2026-04-14T09:46:14+00:00 |
| rhsa-2026:2374 | Red Hat Security Advisory: Red Hat Web Terminal Operator 1.13.0 release. | 2026-02-09T21:56:53+00:00 | 2026-04-14T09:46:14+00:00 |
| rhsa-2026:2371 | Red Hat Security Advisory: Red Hat Web Terminal Operator 1.12.1 release. | 2026-02-09T20:49:08+00:00 | 2026-04-14T09:46:14+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2022-165-06 | Schneider Electric C-Bus Home Automation Products | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-05 | EcoStruxure Power Commission | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-04 | Data Center Expert | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-03 | Conext™ Combox | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-02 | Geo SCADA Mobile | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-067-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ for x70 | 2022-03-08T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2021-012-02 | EcoStruxure Power Build - Rapsody | 2021-01-12T08:32:35.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-130-03 | Wiser Smart | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-130-02 | Saitel DP RTU | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-130-01 | PowerLogic ION Setup | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2021-313-03 | APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices | 2021-11-09T06:30:00.000Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-039-04 | spaceLYnk, Wiser For KNX, fellerLYnk | 2022-02-08T20:32:52.000Z | 2022-03-08T20:32:52.000Z |
| sevd-2022-067-03 | Ritto Wiser™ Door | 2022-03-08T10:12:35.000Z | 2022-03-08T10:12:35.000Z |
| sevd-2021-313-04 | Windows Print Spooler embedded in EcoStruxure™ Process Expert | 2021-11-09T08:45:48.000Z | 2022-03-08T08:45:48.000Z |
| sevd-2022-011-03 | Easergy P5 | 2022-01-11T11:05:25.000Z | 2022-03-02T11:05:25.000Z |
| sevd-2022-039-06 | Harmony/Magelis iPC Series HMI, Vijeo Designer and Vijeo Designer Basic | 2022-02-08T23:25:23.000Z | 2022-02-08T23:25:23.000Z |
| sevd-2022-039-03 | Easergy P40 | 2022-02-08T17:58:55.000Z | 2022-02-08T17:58:55.000Z |
| sevd-2022-039-05 | EcoStruxure Geo SCADA Expert | 2022-02-08T17:33:44.000Z | 2022-02-08T17:33:44.000Z |
| sevd-2022-039-02 | EcoStruxure EV Charging Expert | 2022-02-08T12:36:59.000Z | 2022-02-08T12:36:59.000Z |
| sevd-2022-039-01 | IGSS (Interactive Graphical SCADA System) | 2022-02-08T07:29:58.000Z | 2022-02-08T07:29:58.000Z |
| sevd-2022-011-07 | EcoStruxure™ Power Monitoring Expert | 2022-01-11T13:20:28.000Z | 2022-01-11T13:20:28.000Z |
| sevd-2022-011-05 | ConneXium Tofino Firewall and Loadable Security Modules | 2022-01-11T12:53:54.000Z | 2022-01-11T12:53:54.000Z |
| sevd-2022-011-04 | Easergy P3 | 2022-01-11T11:28:56.000Z | 2022-01-11T11:28:56.000Z |
| sevd-2022-011-02 | Easergy T300 | 2022-01-11T10:48:02.000Z | 2022-01-11T10:48:02.000Z |
| sevd-2022-011-01 | Ethernet and Web server on Modicon M340 controller and Communication Modules | 2022-01-11T07:53:07.000Z | 2022-01-11T07:53:07.000Z |
| sevd-2021-348-04 | APC by Schneider Electric Rack PDU | 2021-12-14T00:00:00.000Z | 2021-12-21T00:00:00.000Z |
| sevd-2021-348-02 | EVlink City / Parking / Smart Wallbox Charging Stations | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sevd-2021-348-01 | IGSS (Interactive Graphical SCADA System) | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sevd-2021-313-07 | Eurotherm GUIcon | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-313-02 | Schneider Electric Software Update | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-566905 | SSA-566905: Multiple Denial of Service Vulnerabilities in the Webserver of Industrial Products | 2023-04-11T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-427715 | SSA-427715: Stack-Based Buffer Overflow Vulnerability in Tecnomatix Plant Simulation | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-423808 | SSA-423808: Multiple NULL Pointer Dereference Vulnerabilities in Industrial Products | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-417159 | SSA-417159: Multiple Vulnerabilities in SINEMA Remote Connect Client Before V3.2 SP2 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-359713 | SSA-359713: Authorization Bypass Vulnerability in Industrial Edge Management | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-342438 | SSA-342438: Privilege Escalation Vulnerability in SINUMERIK ONE, SINUMERIK 840D and SINUMERIK 828D | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-293562 | SSA-293562: Denial of Service Vulnerabilities in PROFINET DCP Implementation of Industrial Products | 2017-05-08T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-280603 | SSA-280603: Denial of Service Vulnerability in SINUMERIK ONE and SINUMERIK MC | 2023-12-12T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-097786 | SSA-097786: Insertion of Sensitive Information into Log File Vulnerability in SINUMERIK systems | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-857368 | SSA-857368: Multiple Vulnerabilities in Omnivise T3000 | 2024-08-02T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-856475 | SSA-856475: X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-813746 | SSA-813746: BadAlloc Vulnerabilities in SCALANCE X-200, X-200IRT, and X-300 Switch Families | 2023-04-11T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-784301 | SSA-784301: Multiple Vulnerabilities in SINEC NMS Before V3.0 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-771940 | SSA-771940: X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-06-11T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-722010 | SSA-722010: Datalogics File Parsing Vulnerability in Teamcenter Visualization and JT2Go | 2024-07-09T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-720392 | SSA-720392: Multiple Vulnerabilities in Third-Party Components in Location Intelligence Before V4.4 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-716317 | SSA-716317: Multiple Vulnerability in SINEC Traffic Analyzer Before V2.0 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-659443 | SSA-659443: Local Code Execution Vulnerabilities in COMOS Before V10.5 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-640968 | SSA-640968: Untrusted Search Path Vulnerability in TIA Project-Server formerly known as TIA Multiuser Server | 2023-02-14T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-625850 | SSA-625850: Multiple WIBU Systems CodeMeter Vulnerabilities Affecting the Desigo CC Product Family and SENTRON powermanager | 2023-11-14T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-417547 | SSA-417547: Multiple Vulnerabilities in INTRALOG WMS Before V4 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-407785 | SSA-407785: Multiple X_T File Parsing Vulnerabilities in Parasolid and Teamcenter Visualization | 2023-08-08T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-357412 | SSA-357412: PRT File Parsing Vulnerability in NX Before V2406.3000 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-180704 | SSA-180704: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.0 | 2023-12-12T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-116924 | SSA-116924: Path Traversal Vulnerability in TIA Portal | 2023-04-11T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-087301 | SSA-087301: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.1 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-068047 | SSA-068047: Multiple Vulnerabilities in SCALANCE M-800 Family Before V7.2.2 | 2023-12-12T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-071402 | SSA-071402: Multiple Vulnerabilities in SICAM Products | 2024-07-22T00:00:00Z | 2024-07-22T00:00:00Z |
| ssa-998949 | SSA-998949: Hard-coded Default Encryption Key in Mendix Encryption Module V10.0.0 and V10.0.1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-928781 | SSA-928781: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 HF1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21094-1 | Security update for pcre2 | 2026-04-10T18:27:30Z | 2026-04-10T18:27:30Z |
| suse-su-2026:1259-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6) | 2026-04-10T17:35:15Z | 2026-04-10T17:35:15Z |
| suse-su-2026:1258-1 | Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T17:35:09Z | 2026-04-10T17:35:09Z |
| suse-su-2026:1257-1 | Security update for openssl-1_1 | 2026-04-10T15:06:36Z | 2026-04-10T15:06:36Z |
| suse-su-2026:1256-1 | Security update for openssl-1_0_0 | 2026-04-10T14:57:18Z | 2026-04-10T14:57:18Z |
| suse-su-2026:1255-1 | Security update for openssl-1_1 | 2026-04-10T14:56:12Z | 2026-04-10T14:56:12Z |
| suse-su-2026:1254-1 | Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T14:04:42Z | 2026-04-10T14:04:42Z |
| suse-su-2026:21121-1 | Security update for NetworkManager | 2026-04-10T12:48:36Z | 2026-04-10T12:48:36Z |
| suse-su-2026:21113-1 | Security update for NetworkManager | 2026-04-10T12:30:19Z | 2026-04-10T12:30:19Z |
| suse-su-2026:21023-1 | Security update for cockpit-podman | 2026-04-10T11:54:16Z | 2026-04-10T11:54:16Z |
| suse-su-2026:21024-1 | Security update for cockpit-machines | 2026-04-10T11:53:13Z | 2026-04-10T11:53:13Z |
| suse-su-2026:21022-1 | Security update for cockpit | 2026-04-10T11:42:11Z | 2026-04-10T11:42:11Z |
| suse-su-2026:1252-1 | Security update for tigervnc | 2026-04-10T11:36:58Z | 2026-04-10T11:36:58Z |
| suse-su-2026:1251-1 | Security update for cockpit-podman | 2026-04-10T11:36:50Z | 2026-04-10T11:36:50Z |
| suse-su-2026:1250-1 | Security update for cockpit-tukit | 2026-04-10T11:36:40Z | 2026-04-10T11:36:40Z |
| suse-su-2026:1249-1 | Security update for cockpit-machines | 2026-04-10T11:36:32Z | 2026-04-10T11:36:32Z |
| suse-su-2026:21021-1 | Security update for python-cryptography | 2026-04-10T11:26:32Z | 2026-04-10T11:26:32Z |
| suse-su-2026:1247-1 | Security update for nghttp2 | 2026-04-10T10:34:43Z | 2026-04-10T10:34:43Z |
| suse-su-2026:1248-1 | Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T09:13:03Z | 2026-04-10T09:13:03Z |
| suse-su-2026:21020-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-04-10T08:14:40Z | 2026-04-10T08:14:40Z |
| suse-su-2026:1244-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2026-04-10T08:04:54Z | 2026-04-10T08:04:54Z |
| suse-su-2026:1242-1 | Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T07:04:48Z | 2026-04-10T07:04:48Z |
| suse-su-2026:21019-1 | Security update for glibc | 2026-04-10T06:44:31Z | 2026-04-10T06:44:31Z |
| suse-su-2026:1239-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise 15 SP6) | 2026-04-09T19:04:33Z | 2026-04-09T19:04:33Z |
| suse-su-2026:1237-1 | Security update for the Linux Kernel (Live Patch 47 for SUSE Linux Enterprise 15 SP4) | 2026-04-09T17:04:59Z | 2026-04-09T17:04:59Z |
| suse-su-2026:21018-1 | Security update for ovmf | 2026-04-09T15:10:40Z | 2026-04-09T15:10:40Z |
| suse-su-2026:1236-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6) | 2026-04-09T14:22:32Z | 2026-04-09T14:22:32Z |
| suse-su-2026:21091-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21090-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21061-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:4188 | Moderate: gnutls security update | 2026-03-10T00:00:00Z | 2026-03-13T09:21:59Z |
| alsa-2026:4216 | Moderate: python3.11 security update | 2026-03-10T00:00:00Z | 2026-03-13T09:19:57Z |
| alsa-2026:4454 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:17:27Z |
| alsa-2026:4458 | Important: .NET 10.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:14:44Z |
| alsa-2026:4455 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:11:49Z |
| alsa-2026:4463 | Moderate: python3.12 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:03:59Z |
| alsa-2026:4443 | Important: .NET 9.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:01:07Z |
| alsa-2026:4442 | Moderate: vim security update | 2026-03-12T00:00:00Z | 2026-03-12T14:47:41Z |
| alsa-2026:4174 | Important: opentelemetry-collector security update | 2026-03-10T00:00:00Z | 2026-03-11T17:46:34Z |
| alsa-2026:4235 | Moderate: nginx:1.26 security update | 2026-03-10T00:00:00Z | 2026-03-11T11:13:12Z |
| alsa-2026:3966 | Moderate: kernel security update | 2026-03-09T00:00:00Z | 2026-03-11T10:10:37Z |
| alsa-2026:3730 | Important: postgresql security update | 2026-03-04T00:00:00Z | 2026-03-11T10:01:08Z |
| alsa-2026:3752 | Important: osbuild-composer security update | 2026-03-04T00:00:00Z | 2026-03-11T09:57:01Z |
| alsa-2026:3898 | Important: osbuild-composer security update | 2026-03-05T00:00:00Z | 2026-03-11T09:54:32Z |
| alsa-2026:4024 | Important: postgresql:13 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:52:09Z |
| alsa-2026:4059 | Important: postgresql:15 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:49:31Z |
| alsa-2026:4063 | Important: postgresql:16 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:46:43Z |
| alsa-2026:4162 | Moderate: mysql8.4 security update | 2026-03-10T00:00:00Z | 2026-03-11T09:43:31Z |
| alsa-2026:3939 | Moderate: nfs-utils security update | 2026-03-05T00:00:00Z | 2026-03-11T09:35:33Z |
| alsa-2026:4164 | Important: git-lfs security update | 2026-03-10T00:00:00Z | 2026-03-11T09:33:00Z |
| alsa-2026:4064 | Important: postgresql:12 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:29:57Z |
| alsa-2026:3040 | Important: grafana-pcp security update | 2026-02-23T00:00:00Z | 2026-03-10T20:11:50Z |
| alsa-2026:4165 | Moderate: python3.12 security update | 2026-03-10T00:00:00Z | 2026-03-10T20:09:00Z |
| alsa-2026:4173 | Important: gimp security update | 2026-03-10T00:00:00Z | 2026-03-10T19:59:39Z |
| alsa-2026:4110 | Important: postgresql:16 security update | 2026-03-09T00:00:00Z | 2026-03-10T19:55:53Z |
| alsa-2026:3896 | Important: postgresql:15 security update | 2026-03-05T00:00:00Z | 2026-03-10T19:52:06Z |
| alsa-2026:3753 | Important: osbuild-composer security update | 2026-03-04T00:00:00Z | 2026-03-10T19:47:08Z |
| alsa-2026:4146 | Important: python-pyasn1 security update | 2026-03-10T00:00:00Z | 2026-03-10T08:51:50Z |
| alsa-2026:3964 | Moderate: kernel-rt security update | 2026-03-09T00:00:00Z | 2026-03-10T02:07:14Z |
| alsa-2026:3963 | Moderate: kernel security update | 2026-03-09T00:00:00Z | 2026-03-10T02:04:41Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2026-150 | Null-dereference READ in wasm_runtime_invoke_native | 2026-01-27T00:02:06.850780Z | 2026-01-27T00:02:06.851098Z |
| osv-2026-144 | Use-of-uninitialized-value in initFilter | 2026-01-26T00:05:57.473672Z | 2026-01-26T00:05:57.473958Z |
| osv-2026-141 | Segv on unknown address in yuv2rgb4_X_c | 2026-01-26T00:03:47.552290Z | 2026-01-26T00:03:47.552807Z |
| osv-2025-280 | Heap-buffer-overflow in Assimp::SceneCombiner::CopyScene | 2025-04-15T00:04:03.423453Z | 2026-01-25T14:19:05.873424Z |
| osv-2025-580 | UNKNOWN READ in signed char Assimp::StreamReader<false, false>::Get<signed char> | 2025-07-29T00:16:41.422221Z | 2026-01-25T14:18:57.285875Z |
| osv-2024-1220 | UNKNOWN READ in Assimp::NDOImporter::InternReadFile | 2024-10-14T00:17:45.088625Z | 2026-01-25T14:14:41.961973Z |
| osv-2023-869 | Heap-buffer-overflow in Assimp::MD5::MD5MeshParser::MD5MeshParser | 2023-09-17T14:01:25.028324Z | 2026-01-25T14:13:45.937535Z |
| osv-2026-136 | Memcpy-param-overlap in grk::memStreamRead | 2026-01-25T00:10:48.352834Z | 2026-01-25T00:10:48.353140Z |
| osv-2026-121 | Use-of-uninitialized-value in trySubset | 2026-01-24T00:15:22.824642Z | 2026-01-24T14:24:01.498986Z |
| osv-2026-122 | Use-of-uninitialized-value in rtcm2_unpack | 2026-01-24T00:18:15.169881Z | 2026-01-24T00:18:15.170285Z |
| osv-2026-119 | Segv on unknown address in gpsd_poll | 2026-01-23T00:09:08.434854Z | 2026-01-23T00:09:08.435286Z |
| osv-2026-112 | Use-of-uninitialized-value in PrintSERPacket | 2026-01-23T00:01:50.403598Z | 2026-01-23T00:01:50.404362Z |
| osv-2026-105 | Use-of-uninitialized-value in pcpp::SSLServerHelloMessage::ServerHelloTLSFingerprint::toString | 2026-01-22T00:08:03.696405Z | 2026-01-22T00:08:03.696709Z |
| osv-2025-1061 | Security exception in org.apache.poi.hssf.record.aggregates.SharedValueManager$SharedFormulaGroup.<ini | 2026-01-18T00:03:40.245475Z | 2026-01-21T14:26:21.135983Z |
| osv-2026-98 | Heap-buffer-overflow in hostname_issubdomain | 2026-01-21T00:16:59.551255Z | 2026-01-21T00:16:59.551548Z |
| osv-2026-87 | Security exception in org.apache.poi.util.IOUtils.safelyAllocate | 2026-01-18T00:18:36.932063Z | 2026-01-20T14:24:38.539978Z |
| osv-2026-91 | Use-after-poison in compress.cc | 2026-01-20T00:09:07.159786Z | 2026-01-20T00:09:07.160128Z |
| osv-2026-86 | Security exception in java.base/java.util.Arrays.copyOfRange | 2026-01-18T00:18:18.214799Z | 2026-01-18T00:18:18.215108Z |
| osv-2026-76 | Security exception in org.htmlunit.cyberneko.HTMLTagBalancer.endElement | 2026-01-18T00:02:11.715201Z | 2026-01-18T00:02:11.715633Z |
| osv-2026-74 | Heap-buffer-overflow in ___interceptor_strtol | 2026-01-17T00:19:48.575833Z | 2026-01-17T00:19:48.576151Z |
| osv-2023-1129 | UNKNOWN READ in HeifPixelImage::overlay | 2023-11-09T13:00:44.441721Z | 2026-01-16T14:20:00.488466Z |
| osv-2020-2308 | Heap-buffer-overflow in derive_collocated_motion_vectors | 2021-02-10T00:00:17.357392Z | 2026-01-16T14:15:52.974687Z |
| osv-2026-57 | Heap-buffer-overflow in mkv::matroska_segment_c::TrackInit | 2026-01-15T00:19:47.203374Z | 2026-01-15T00:19:47.203695Z |
| osv-2026-55 | Use-of-uninitialized-value in vp9_quantize_fp_avx2 | 2026-01-15T00:19:29.465463Z | 2026-01-15T00:19:29.465794Z |
| osv-2026-54 | Heap-use-after-free in _dwarf_exec_frame_instr | 2026-01-15T00:17:17.477757Z | 2026-01-15T00:17:17.478056Z |
| osv-2026-53 | Heap-use-after-free in graph::LigatureSubstFormat1::shrink | 2026-01-15T00:16:26.117926Z | 2026-01-15T00:16:26.118291Z |
| osv-2026-49 | Heap-buffer-overflow in check_sync_pes | 2026-01-15T00:11:33.030721Z | 2026-01-15T00:11:33.030957Z |
| osv-2026-44 | UNKNOWN READ in MP4_TrackSeek | 2026-01-14T00:20:29.876694Z | 2026-01-14T00:20:29.877019Z |
| osv-2024-195 | Security exception in com.github.javaparser.ast.validator.TreeVisitorValidator.accept | 2024-03-24T00:14:24.746452Z | 2026-01-13T14:21:46.144635Z |
| osv-2024-662 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-07-18T00:06:40.832938Z | 2026-01-13T04:48:14.077313Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0129 | Missing check in ZK proof in CGGMP21 Threshold Signing Protocol | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0128 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0127 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0125 | Resource Exhaustion (Memory and Handle Leaks) on Windows and macOS | 2025-11-22T12:00:00Z | 2025-11-22T12:29:36Z |
| rustsec-2025-0124 | rand_os crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-19T20:48:42Z |
| rustsec-2025-0123 | opentelemetry-jaeger crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T12:07:07Z |
| rustsec-2025-0122 | cargo-asm crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T09:02:31Z |
| rustsec-2025-0121 | gcc crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:52:10Z |
| rustsec-2025-0119 | number_prefix crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:13:56Z |
| rustsec-2025-0118 | Unsound API access to a WebAssembly shared linear memory | 2025-11-11T12:00:00Z | 2025-11-13T16:55:40Z |
| rustsec-2025-0117 | tandem is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0116 | tandem_garble_interop is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0115 | tandem_http_server is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0114 | tandem_http_client is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0113 | soundness issue and unmaintained | 2025-05-06T12:00:00Z | 2025-11-04T06:10:22Z |
| rustsec-2025-0109 | Out-of-bounds memory access in binary_read_to_ref and binary_write_from_ref | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0108 | Uninitialized memory exposure in string reading functions | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0107 | Uninitialized memory exposure in any_as_u8_slice | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0106 | Undefined behavior in index_of_ptr with empty slices | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0105 | Uninitialized memory exposure in create_ring_buffer | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0072 | soundness issue and unmaintained | 2025-10-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0071 | Incorrect handling of embedded SVG and MathML leads to mutation XSS after removal | 2025-09-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0068 | serde_yml crate is unsound and unmaintained | 2025-09-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0067 | `libyml::string::yaml_string_extend` is unsound and unmaintained | 2025-09-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0063 | Possible unsound public API | 2025-04-25T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0062 | Heap Buffer Overflow in the DrainCol Destructor | 2025-05-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0054 | ArrayQueue::push_front is not panic-safe | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0053 | Multiple memory corruption vulnerabilities in safe APIs | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0051 | `xcb::Connection::connect_to_fd*` functions violate I/O safety | 2025-08-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0050 | IdMap::from_iter may lead to uninitialized memory being freed on drop | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-grafana-2026-27876 | RCE on Grafana via sqlExpressions | 2026-04-01T08:41:07.673Z | 2026-04-08T09:14:18.943Z |
| bit-discourse-2026-33415 | Discourse: Improper Access Control in discourse-ai Allows Unauthorized Category Content Exposure | 2026-04-07T08:44:29.473Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33300 | Discourse: Hidden group names and access metadata are exposed to moderators through the `category-chatables` endpoint | 2026-04-07T08:44:13.358Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33185 | Discourse: Group SMTP test endpoint susceptible to SSRF | 2026-04-07T08:44:07.641Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33074 | Discourse: Vulnerability in discourse-subscriptions plugin allowing users to self-grant to higher tier subscriptions | 2026-04-07T08:44:05.677Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33073 | discourse-subscriptions plugin leaking stripe API key in multisite environment | 2026-04-07T08:44:03.688Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32951 | Discourse: Authorization bypass in oneboxer via user-controlled category id | 2026-04-07T08:44:01.614Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32620 | Discourse: Missing post-level authorization allows whisper metadata disclosure | 2026-04-07T08:43:59.465Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32619 | Discourse: Insufficient topic visibility check allows unauthorized poll manipulation in private categories | 2026-04-07T08:43:57.232Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32618 | Discourse: Unauthorized channel membership inference via excluded_memberships_channel_id | 2026-04-07T08:43:55.159Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32615 | Discourse: Category group moderators can perform actions on topics in restricted categories without read access | 2026-04-07T08:43:53.093Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32607 | Discourse: Stored XSS via unescaped assignee name | 2026-04-07T08:43:50.897Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32273 | Discourse: XSS on category description update via API | 2026-04-07T08:43:48.997Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32243 | Discourse: Stored XSS in discourse-ai shared conversations onebox | 2026-04-07T08:43:46.857Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32143 | Discourse: Admin-only report can be exported by moderators | 2026-04-07T08:43:44.810Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32113 | Discourse: Open redirect via `sso_destination_url` cookie in `enter` | 2026-04-07T08:43:40.581Z | 2026-04-07T09:14:25.218Z |
| bit-parse-2026-34784 | Parse Server: Streaming file download bypasses afterFind file trigger authorization | 2026-04-06T14:49:38.726Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34595 | Parse Server: LiveQuery protected-field guard bypass via array-like logical operator value | 2026-04-06T14:49:36.710Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34574 | Parse Server: Session field immutability bypass via falsy-value guard | 2026-04-06T14:49:34.810Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34573 | Parse Server: GraphQL complexity validator exponential fragment traversal DoS | 2026-04-06T14:49:33.069Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34532 | Parse Server: Cloud function validator bypass via prototype chain traversal | 2026-04-06T14:49:31.298Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34373 | Parse Server: GraphQL API endpoint ignores CORS origin restriction | 2026-04-06T14:49:29.676Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34363 | Parse Server: LiveQuery protected field leak via shared mutable state across concurrent subscribers | 2026-04-06T14:49:27.983Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34224 | Parse Server: MFA single-use token bypass via concurrent authData login requests | 2026-04-06T14:49:26.245Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34215 | Parse Server: Auth data exposed via verify password endpoint | 2026-04-06T14:49:24.609Z | 2026-04-06T15:13:09.641Z |
| bit-minio-2026-34204 | MinIO is Vulnerable to SSE Metadata Injection via Replication Headers | 2026-04-06T09:26:13.602Z | 2026-04-06T11:34:08.453Z |
| bit-prestashop-2026-33674 | PrestaShop: Improper Use of Validation Framework | 2026-03-30T11:49:50.984Z | 2026-04-06T08:26:41.107Z |
| bit-prestashop-2026-33673 | PrestaShop has multiple stored XSS vulnerabilities via unprotected Template variables | 2026-03-30T11:49:49.224Z | 2026-04-06T08:26:41.107Z |
| bit-node-2026-21712 | 2026-04-06T07:58:33.472Z | 2026-04-06T08:26:41.107Z | |
| bit-node-2026-21711 | 2026-04-06T07:58:30.648Z | 2026-04-06T08:26:41.107Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-dv49099 | Security fixes for CVE-2025-64756, CVE-2025-69873, CVE-2026-1525, CVE-2026-1526, CVE-2026-1527, CVE-2026-1528, CVE-2026-2229, CVE-2026-2327, CVE-2026-23745, CVE-2026-2391, CVE-2026-24842, CVE-2026-25128, CVE-2026-25547, CVE-2026-2581, CVE-2026-25896, CVE-2026-26278, CVE-2026-26960, CVE-2026-27601, CVE-2026-27903, CVE-2026-27904, CVE-2026-27942, CVE-2026-28292, CVE-2026-29786, CVE-2026-31802, CVE-2026-32141, CVE-2026-33036, ghsa-23c5-xmqv-rm74, ghsa-25h7-pfq9-p65f, ghsa-2g4f-4pwh-qvx6, ghsa-2mjp-6q6p-2qxm, ghsa-34x7-hfp2-rc4v, ghsa-37qj-frw5-hhjh, ghsa-38c4-r59v-3vqw, ghsa-3ppc-4f35-3m26, ghsa-4992-7rv2-5pvq, ghsa-5j98-mcp5-4vw2, ghsa-73rr-hh4g-fpgx, ghsa-7h2j-956f-4vf2, ghsa-7r86-cg39-jmmj, ghsa-83g3-92jg-28cx, ghsa-8gc5-j5rx-235r, ghsa-8qq5-rm4j-mr97, ghsa-8wc6-vgrq-x6cf, ghsa-9ppj-qmqm-q256, ghsa-f269-vfmq-vjvj, ghsa-fj3w-jwp8-x2g3, ghsa-jmr7-xgp7-cmfj, ghsa-m7jm-9gc2-mpf2, ghsa-phc3-fgpg-7m6h, ghsa-qffp-2rhf-9h96, ghsa-qpx9-hpmf-5gmw, ghsa-r275-fr43-pm7q, ghsa-r6q2-hw4h-h46w, ghsa-v9p9-hfj2-hcw8, ghsa-vrm6-8vpv-qv8q, ghsa-w7fw-mjwx-w883 applied in versions: 43.4.4-r0 | 2026-04-01T09:31:16.419730Z | 2026-03-23T10:49:42Z |
| cleanstart-2026-gy92571 | Security fixes for ghsa-22h5-pq3x-2gf2, ghsa-33mh-2634-fwr2, ghsa-4cx2-fc23-5wg6, ghsa-6xw4-3v39-52mm, ghsa-72hv-8253-57qq, ghsa-72qj-48g4-5xgx, ghsa-c2f4-jgmc-q2r5, ghsa-gh9q-2xrm-x6qv, ghsa-j4pr-3wm6-xx2r, ghsa-mhwm-jh88-3gjf, ghsa-mr3q-g2mv-mr4q, ghsa-p543-xpfm-54cp, ghsa-vc5p-v9hr-52mj, ghsa-vqg5-3255-v292, ghsa-w9pc-fmgc-vxvw, ghsa-wpv5-97wm-hp9c applied in versions: 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-04-01T09:28:54.070298Z | 2026-03-23T10:27:15Z |
| cleanstart-2026-ez47382 | Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2025-66564, CVE-2026-22703, CVE-2026-22772, CVE-2026-23831, CVE-2026-23991, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2x5j-vhc8-9cwm, ghsa-59jp-pj84-45mr, ghsa-6m8w-jc87-6cr7, ghsa-jqc5-w2xx-5vq4, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-vvgc-356p-c3xw applied in versions: 1.14.4-r1, 1.14.4-r2, 1.16.3-r3, 1.16.3-r4 | 2026-04-01T09:28:49.379705Z | 2026-03-23T08:59:19Z |
| cleanstart-2026-ds86833 | Security fixes for CVE-2025-11143, CVE-2026-1605, ghsa-72hv-8253-57qq, ghsa-cphf-4846-3xx9 applied in versions: 0.50.0-r0, 0.50.1-r0 | 2026-04-01T09:28:26.952828Z | 2026-03-23T08:16:08Z |
| cleanstart-2026-gm79879 | Security fixes for CVE-2025-11143, CVE-2025-68161, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.49.1-r0 | 2026-04-01T09:28:51.825289Z | 2026-03-23T08:12:03Z |
| cleanstart-2026-dc73689 | Security fixes for CVE-2025-11143, CVE-2025-67735, CVE-2025-68161, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.48.0-r1 | 2026-04-01T09:29:13.129218Z | 2026-03-23T08:05:00Z |
| cleanstart-2026-ia43044 | Security fixes for CVE-2020-8908, CVE-2022-42889, CVE-2023-2976, CVE-2024-25710, CVE-2024-26308, CVE-2024-29371, CVE-2024-29857, CVE-2024-30171, CVE-2024-31573, CVE-2024-47554, CVE-2025-11143, CVE-2025-12383, CVE-2025-48734, CVE-2025-48924, CVE-2025-58057, CVE-2025-67735, CVE-2025-68161, CVE-2025-8916, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.47.0-r2, 0.47.0-r3 | 2026-04-01T09:30:15.088429Z | 2026-03-23T07:56:09Z |
| cleanstart-2026-pi36812 | Security fixes for CVE-2026-33186, ghsa-6v2p-p943-phr9, ghsa-c6gw-w398-hv78, ghsa-f6x5-jh6r-wrfv, ghsa-hcg3-p754-cr77, ghsa-j5w8-q4qc-rx2x, ghsa-qxp5-gw88-xv66, ghsa-v778-237x-gjrc, ghsa-vvgc-356p-c3xw applied in versions: 1.15.0-r1, 1.19.0-r0 | 2026-04-01T09:29:23.569974Z | 2026-03-23T07:52:18Z |
| cleanstart-2026-as59691 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-31837, CVE-2026-31838, ghsa-9h8m-3fm2-qjrq applied in versions: 1.28.3-r0 | 2026-04-01T09:29:30.943219Z | 2026-03-23T07:49:41Z |
| cleanstart-2026-fr61696 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.17.0-r0 | 2026-04-01T09:29:33.599999Z | 2026-03-23T07:49:32Z |
| cleanstart-2026-pw47027 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.29.0-r0 | 2026-04-01T09:30:02.510665Z | 2026-03-23T07:47:56Z |
| cleanstart-2026-jw59894 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.28.4-r0 | 2026-04-01T09:30:04.839715Z | 2026-03-23T07:47:23Z |
| cleanstart-2026-ld14062 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.27.4-r0, 1.27.4-r1, 1.27.7-r0 | 2026-04-01T09:30:12.003312Z | 2026-03-23T07:46:39Z |
| cleanstart-2026-gm81143 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-8r3f-844c-mc37 applied in versions: 1.7.0-r0, 1.7.0-r1 | 2026-04-01T09:30:33.612618Z | 2026-03-23T07:45:53Z |
| cleanstart-2026-qv50101 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-8r3f-844c-mc37 applied in versions: 1.6.0-r0 | 2026-04-01T09:30:36.985458Z | 2026-03-23T07:45:33Z |
| cleanstart-2026-nc32267 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.24.4-r0, 1.28.1-r0, 1.28.1-r1 | 2026-04-01T09:31:06.582607Z | 2026-03-23T07:39:20Z |
| cleanstart-2026-li47669 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.26.2-r0, 1.26.3-r0, 1.26.3-r1 | 2026-04-01T09:31:09.448053Z | 2026-03-23T07:38:42Z |
| cleanstart-2026-pv93827 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.25.4-r0, 1.25.4-r1, 1.25.4-r2 | 2026-04-01T09:31:37.416388Z | 2026-03-23T07:38:20Z |
| cleanstart-2026-fn44356 | Security fixes for CVE-2022-29526, CVE-2025-47907, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10-r0, 0.11-r0, 0.9-r0, 0.9-r1, 0.9-r2 | 2026-04-01T09:31:56.126620Z | 2026-03-23T07:36:06Z |
| cleanstart-2026-cl65461 | Security fixes for CVE-2022-29526, CVE-2025-47907, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10-r0, 0.11-r0, 0.8-r0, 0.8-r1, 0.8-r2, 0.9-r0 | 2026-04-01T09:31:56.332937Z | 2026-03-23T07:35:18Z |
| cleanstart-2026-nv78596 | Security fixes for CVE-2022-29526, CVE-2025-47907, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-4f99-4q7p-p3gh applied in versions: 0.10-r0, 0.11-r0, 0.11-r2, 0.11-r3, 0.11-r4 | 2026-04-01T09:32:41.363681Z | 2026-03-23T07:34:57Z |
| cleanstart-2026-on62368 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10.0-r0, 0.10.0-r1, 0.11.0-r0, 1.13.1-r0 | 2026-04-01T09:32:49.419019Z | 2026-03-23T07:09:26Z |
| cleanstart-2026-gi67088 | Security fixes for CVE-2020-8559, CVE-2020-8565, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, ghsa-33c5-9fx5-fvjm, ghsa-8cfg-vx93-jvxw applied in versions: 2.12.0-r0, 2.12.0-r1 | 2026-04-01T09:33:02.208236Z | 2026-03-23T07:05:35Z |
| cleanstart-2026-jm96857 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.16.4-r0, 2.16.4-r1 | 2026-04-01T09:32:39.352692Z | 2026-03-23T07:04:06Z |
| cleanstart-2026-ps51260 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.2.2-r0, 1.2.2-r1 | 2026-04-01T09:33:07.208099Z | 2026-03-23T07:02:53Z |
| cleanstart-2026-qj92322 | Security fixes for CVE-2025-15558, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.0.2-r0, 2.0.2-r1 | 2026-04-01T09:33:14.887013Z | 2026-03-23T06:58:42Z |
| cleanstart-2026-lp76319 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.21.2-r0, 1.21.2-r1 | 2026-04-01T09:33:36.179758Z | 2026-03-23T06:57:40Z |
| cleanstart-2026-gq14179 | Security fixes for CVE-2025-11143, CVE-2025-53864, CVE-2025-55163, CVE-2025-58056, CVE-2025-58057, CVE-2025-67735, CVE-2025-68161, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.46.1-r3, 0.46.1-r4 | 2026-04-01T09:33:44.585498Z | 2026-03-23T06:45:45Z |
| cleanstart-2026-nv36169 | Security fixes for CVE-2025-61732, CVE-2025-66564, CVE-2025-68121, CVE-2026-24686, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, ghsa-fcv2-xgw5-pqxf applied in versions: 0.7.29-r1, 0.7.29-r2 | 2026-04-01T09:33:48.680625Z | 2026-03-23T06:33:00Z |
| cleanstart-2026-bc17682 | Security fixes for CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.4.4-r0, 2.4.4-r1 | 2026-04-01T09:33:57.594313Z | 2026-03-23T06:28:34Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2024-045 | 2024-10-09T15:48:10.000Z | 2025-02-20T19:26:40.000Z | |
| drupal-contrib-2024-046 | 2024-10-09T15:48:11.000Z | 2025-02-20T19:26:30.000Z | |
| drupal-contrib-2024-047 | 2024-10-09T15:54:27.000Z | 2025-02-20T19:26:17.000Z | |
| drupal-contrib-2024-048 | 2024-10-09T15:56:35.000Z | 2025-02-20T19:26:05.000Z | |
| drupal-contrib-2024-049 | 2024-10-09T16:40:07.000Z | 2025-02-20T19:25:53.000Z | |
| drupal-contrib-2024-050 | 2024-10-23T12:09:48.000Z | 2025-02-20T19:25:41.000Z | |
| drupal-contrib-2024-033 | 2024-08-28T15:32:41.000Z | 2025-02-20T19:24:02.000Z | |
| drupal-contrib-2024-034 | 2024-09-04T15:35:55.000Z | 2025-02-20T19:23:44.000Z | |
| drupal-contrib-2024-035 | 2024-09-04T15:40:44.000Z | 2025-02-20T19:23:27.000Z | |
| drupal-contrib-2024-036 | 2024-09-04T15:42:05.000Z | 2025-02-20T19:23:09.000Z | |
| drupal-contrib-2024-037 | 2024-09-04T16:15:41.000Z | 2025-02-20T19:22:50.000Z | |
| drupal-contrib-2024-038 | 2024-09-04T16:20:17.000Z | 2025-02-20T19:22:30.000Z | |
| drupal-contrib-2024-039 | 2024-09-11T16:21:22.000Z | 2025-02-20T19:22:14.000Z | |
| drupal-contrib-2024-021 | 2024-05-22T16:21:55.000Z | 2025-02-20T19:14:35.000Z | |
| drupal-contrib-2024-022 | 2024-05-29T16:44:55.000Z | 2025-02-20T19:14:10.000Z | |
| drupal-contrib-2024-023 | 2024-05-29T16:52:42.000Z | 2025-02-20T19:13:53.000Z | |
| drupal-contrib-2024-024 | 2024-05-29T16:58:59.000Z | 2025-02-20T19:13:35.000Z | |
| drupal-contrib-2024-025 | 2024-06-05T16:45:02.000Z | 2025-02-20T19:13:15.000Z | |
| drupal-contrib-2024-026 | 2024-07-31T15:59:06.000Z | 2025-02-20T19:12:56.000Z | |
| drupal-contrib-2024-027 | 2024-08-07T17:19:30.000Z | 2025-02-20T19:12:37.000Z | |
| drupal-contrib-2024-028 | 2024-08-07T17:30:20.000Z | 2025-02-20T19:12:22.000Z | |
| drupal-contrib-2024-029 | 2024-08-07T17:36:15.000Z | 2025-02-20T19:12:05.000Z | |
| drupal-contrib-2024-030 | 2024-08-21T16:23:02.000Z | 2025-02-20T19:11:48.000Z | |
| drupal-contrib-2024-011 | 2024-02-28T18:14:40.000Z | 2025-02-20T19:10:16.000Z | |
| drupal-contrib-2024-012 | 2024-02-28T18:19:01.000Z | 2025-02-20T19:09:55.000Z | |
| drupal-contrib-2024-014 | 2024-02-28T18:36:35.000Z | 2025-02-20T19:09:20.000Z | |
| drupal-contrib-2024-015 | 2024-03-06T17:06:37.000Z | 2025-02-20T19:08:51.000Z | |
| drupal-contrib-2024-016 | 2024-03-27T17:16:26.000Z | 2025-02-20T19:08:34.000Z | |
| drupal-contrib-2024-017 | 2024-04-24T13:16:40.000Z | 2025-02-20T18:44:32.000Z | |
| drupal-contrib-2024-018 | 2024-04-24T14:23:34.000Z | 2025-02-20T18:44:08.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2015-ale-002 | Vulnérabilité dans Adobe Flash Player | 2015-02-02T00:00:00.000000 | 2015-02-05T00:00:00.000000 |
| certfr-2015-ale-001 | Vulnérabilité dans Adobe Flash Player | 2015-01-22T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-011 | Vulnérabilité de l'implémentation Kerberos dans Microsoft Windows | 2014-11-18T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-010 | Vulnérabilité de l'implémentation des protocoles SSL/TLS dans Microsoft Windows | 2014-11-11T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-008 | Vulnérabilité dans Drupal | 2014-10-16T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-009 | Vulnérabilité dans Microsoft OLE | 2014-10-22T00:00:00.000000 | 2014-11-12T00:00:00.000000 |
| certfr-2014-ale-007 | Vulnérabilité dans SSLv3 | 2014-10-15T00:00:00.000000 | 2014-10-15T00:00:00.000000 |
| certfr-2014-ale-006 | Vulnérabilité dans GNU bash | 2014-09-25T00:00:00.000000 | 2014-09-30T00:00:00.000000 |
| certfr-2014-ale-003 | Vulnérabilité dans OpenSSL | 2014-04-08T00:00:00.000000 | 2014-07-30T00:00:00.000000 |
| certfr-2014-ale-005 | Vulnérabilité dans Microsoft Internet Explorer | 2014-04-28T00:00:00.000000 | 2014-05-02T00:00:00.000000 |
| certfr-2014-ale-004 | Vulnérabilité dans Apache Struts | 2014-04-25T00:00:00.000000 | 2014-04-29T00:00:00.000000 |
| certfr-2014-ale-002 | Vulnérabilité dans Microsoft Word | 2014-03-25T00:00:00.000000 | 2014-04-09T00:00:00.000000 |
| certfr-2014-ale-001 | Vulnérabilité dans Microsoft Internet Explorer | 2014-02-21T00:00:00.000000 | 2014-03-12T00:00:00.000000 |
| certa-2013-ale-008 | Vulnérabilité critique dans le noyau de Microsoft Windows | 2013-11-28T00:00:00.000000 | 2014-01-16T00:00:00.000000 |
| certa-2013-ale-007 | Vulnérabilité dans un composant graphique de Microsoft | 2013-11-06T00:00:00.000000 | 2013-12-10T00:00:00.000000 |
| certa-2013-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2013-09-18T00:00:00.000000 | 2013-10-09T00:00:00.000000 |
| certa-2005-ale-013 | Vulnérabilité dans Citrix Metaframe Presentation | 2005-10-07T00:00:00.000000 | 2013-06-06T00:00:00.000000 |
| certa-2013-ale-005 | Vulnérabilité dans le noyau Linux | 2013-05-14T00:00:00.000000 | 2013-05-24T00:00:00.000000 |
| certa-2013-ale-004 | Vulnérabilité dans Adobe ColdFusion | 2013-05-10T00:00:00.000000 | 2013-05-15T00:00:00.000000 |
| certa-2013-ale-003 | Vulnérabilité dans Microsoft Internet Explorer 8 | 2013-05-06T00:00:00.000000 | 2013-05-15T00:00:00.000000 |
| certa-2013-ale-002 | Vulnérabilités dans Adobe Reader et Acrobat | 2013-02-14T00:00:00.000000 | 2013-02-21T00:00:00.000000 |
| certa-2008-ale-013 | Vulnérabilité du service sadmind de Sun Solaris | 2008-10-17T00:00:00.000000 | 2013-02-21T00:00:00.000000 |
| certa-2009-ale-017 | Vulnérabilités dans l'implémentation TCP/IP de divers produits | 2009-09-09T00:00:00.000000 | 2013-02-19T00:00:00.000000 |
| certa-2007-ale-011 | Vulnérabilité du composant d'indexation des serveurs Microsoft IIS | 2007-06-06T00:00:00.000000 | 2013-02-19T00:00:00.000000 |
| certa-2012-ale-001 | Vulnérabilité dans Cisco IronPort | 2012-02-01T00:00:00.000000 | 2013-02-05T00:00:00.000000 |
| certa-2009-ale-014 | Multiples vulnérabilités du client de messagerie Mozilla Thunderbird | 2009-08-07T00:00:00.000000 | 2013-02-05T00:00:00.000000 |
| certa-2013-ale-001 | Vulnérabilités dans Oracle Java | 2013-01-10T00:00:00.000000 | 2013-01-15T00:00:00.000000 |
| certa-2012-ale-010 | Vulnérabilité dans Internet Explorer | 2012-12-31T00:00:00.000000 | 2013-01-15T00:00:00.000000 |
| certa-2012-ale-009 | Vulnérabilité dans les pilotes NVidia | 2012-12-26T00:00:00.000000 | 2013-01-07T00:00:00.000000 |
| certa-2012-ale-007 | Vulnérabilité dans MySQL | 2012-12-06T00:00:00.000000 | 2013-01-07T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0292 | Multiples vulnérabilités dans les produits IBM | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0291 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0290 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0289 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0288 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0287 | Multiples vulnérabilités dans les produits NetApp | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0286 | Multiples vulnérabilités dans Google Chrome | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0285 | Vulnérabilité dans Python | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0284 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0283 | Vulnérabilité dans Microsoft Edge | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0282 | Multiples vulnérabilités dans Veeam Backup & Replication | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0281 | Multiples vulnérabilités dans les produits Splunk | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0280 | Multiples vulnérabilités dans les produits Apple | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0279 | Multiples vulnérabilités dans Cisco IOS XR | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0278 | Multiples vulnérabilités dans Google Chrome | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0277 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0276 | Multiples vulnérabilités dans GitLab | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0275 | Vulnérabilité dans GLPI | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0274 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0273 | Multiples vulnérabilités dans Microsoft Azure | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0272 | Multiples vulnérabilités dans Microsoft .Net | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0271 | Multiples vulnérabilités dans Microsoft Windows | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0270 | Multiples vulnérabilités dans Microsoft Office | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0269 | Multiples vulnérabilités dans Curl | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0268 | Multiples vulnérabilités dans Traefik | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0267 | Multiples vulnérabilités dans Mozilla Firefox | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0266 | Multiples vulnérabilités dans VMware Tanzu | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0265 | Multiples vulnérabilités dans les produits Fortinet | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0264 | Multiples vulnérabilités dans les produits Adobe | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0263 | Vulnérabilité dans Ivanti Desktop and Server Management (DSM) | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000059 | Seagate Toolkit registers a Windows service with an unquoted file path | 2025-08-14T12:32+09:00 | 2025-08-19T14:40+09:00 |
| jvndb-2025-010854 | Trend Micro Endpoint security products for enterprises vulnerable to multiple OS command injection | 2025-08-07T12:25+09:00 | 2025-08-19T11:36+09:00 |
| jvndb-2025-007521 | Multiple Brother driver installers for Windows vulnerable to privilege escalation | 2025-06-27T09:37+09:00 | 2025-08-19T11:29+09:00 |
| jvndb-2025-000060 | PgManage vulnerable to injection | 2025-08-18T13:40+09:00 | 2025-08-18T13:40+09:00 |
| jvndb-2025-000058 | WordPress plugin "Advanced Custom Fields" vulnerable to HTML injection | 2025-08-08T15:29+09:00 | 2025-08-08T15:29+09:00 |
| jvndb-2025-010972 | Multiple SEIKO EPSON products use weak initial passwords | 2025-08-08T14:50+09:00 | 2025-08-08T14:50+09:00 |
| jvndb-2025-000057 | Multiple vulnerabilities in Mubit Powered BLUE 870 | 2025-08-08T14:47+09:00 | 2025-08-08T14:47+09:00 |
| jvndb-2025-000056 | Multiple vulnerabilities in Sato label printers CL4/6NX Plus and CL4/6NX-J Plus series | 2025-08-06T16:38+09:00 | 2025-08-06T16:38+09:00 |
| jvndb-2025-010603 | Out-of-bounds write vulnerability in FUJIFILM Business Innovation MFPs | 2025-08-05T11:29+09:00 | 2025-08-05T11:29+09:00 |
| jvndb-2025-010408 | Multiple vulnerabilities in PowerCMS | 2025-08-01T12:05+09:00 | 2025-08-01T12:05+09:00 |
| jvndb-2025-000055 | ZXHN-F660T and ZXHN-F660A use a common credential for all installations | 2025-07-31T15:12+09:00 | 2025-07-31T15:12+09:00 |
| jvndb-2025-000054 | Apache Jena Fuseki vulnerable to path traversal | 2025-07-30T14:17+09:00 | 2025-07-30T14:17+09:00 |
| jvndb-2025-000053 | "SwitchBot" App vulnerable to insertion of sensitive information into log file | 2025-07-29T13:44+09:00 | 2025-07-29T13:44+09:00 |
| jvndb-2025-010056 | TP-Link VIGI NVR1104H-4P and VIGI NVR2016H-16MP vulnerable to OS command injection | 2025-07-28T17:53+09:00 | 2025-07-28T17:53+09:00 |
| jvndb-2025-000052 | TP-Link Archer C1200 vulnerable to clickjacking | 2025-07-24T14:16+09:00 | 2025-07-24T14:16+09:00 |
| jvndb-2025-000051 | Real-time Bus Tracking System vulnerable to improper validation of specified quantity in input | 2025-07-23T13:54+09:00 | 2025-07-23T13:54+09:00 |
| jvndb-2025-009576 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2025-07-23T11:13+09:00 | 2025-07-23T11:13+09:00 |
| jvndb-2025-000050 | "region PAY" App for Android vulnerable to insertion of sensitive information into log file | 2025-07-22T13:33+09:00 | 2025-07-22T13:33+09:00 |
| jvndb-2025-009150 | Security updates for Trend Micro products (June 2025) | 2025-07-17T17:03+09:00 | 2025-07-17T17:03+09:00 |
| jvndb-2025-000030 | Reflected cross-site scripting vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor | 2025-05-12T18:00+09:00 | 2025-07-17T10:06+09:00 |
| jvndb-2025-000049 | ZWX-2000CSW2-HN and ZWX-2000CS2-HN vulnerable to use of hard-coded credentials | 2025-07-16T13:54+09:00 | 2025-07-16T13:54+09:00 |
| jvndb-2025-008881 | Least Privilege Violation Vulnerability in the communications functions of NJ/NX series Machine Automation Controllers | 2025-07-15T15:54+09:00 | 2025-07-15T15:54+09:00 |
| jvndb-2025-008783 | Firebox T15 contains an issue with hidden functionality | 2025-07-14T17:22+09:00 | 2025-07-14T17:22+09:00 |
| jvndb-2025-008145 | Epson Web Installer for Mac vulnerable to missing authentication for critical function | 2025-07-08T14:08+09:00 | 2025-07-08T14:08+09:00 |
| jvndb-2025-008106 | Heap-based buffer overflow vulnerability in V-SFT and TELLUS | 2025-07-07T16:26+09:00 | 2025-07-07T16:26+09:00 |
| jvndb-2025-008105 | Windows shortcut following (.LNK) vulnerability in Trend Micro Security for Windows (CVE-2025-52521) | 2025-07-07T16:04+09:00 | 2025-07-07T16:04+09:00 |
| jvndb-2025-000047 | Multiple vulnerabilities in Nimesa Backup and Recovery | 2025-07-07T15:26+09:00 | 2025-07-07T15:26+09:00 |
| jvndb-2025-007978 | Multiple vulnerabilities in Trend Micro Password Manager for Windows (CVE-2025-48443, CVE-2025-52837) | 2025-07-04T13:28+09:00 | 2025-07-04T13:28+09:00 |
| jvndb-2025-000045 | Multiple vulnerabilities in Active! mail | 2025-07-02T14:13+09:00 | 2025-07-02T14:13+09:00 |
| jvndb-2025-007754 | Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS) | 2025-07-02T11:31+09:00 | 2025-07-02T11:31+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-16064 | WordPress插件SMTP Mailer信息泄露漏洞 | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16063 | GNU BinUtils缓冲区溢出漏洞(CNVD-2026-16063) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16062 | Artifex Ghostscript pdfmark_coerce_dest函数堆栈缓冲区溢出漏洞 | 2025-09-25 | 2026-04-03 |
| cnvd-2026-16061 | Artifex Ghostscript pdf_write_cmap函数堆栈缓冲区溢出漏洞 | 2025-09-25 | 2026-04-03 |
| cnvd-2026-16060 | Artifex Ghostscript ocr_begin_page函数堆缓冲区溢出漏洞 | 2025-09-25 | 2026-04-03 |
| cnvd-2026-16059 | Apple macOS信息泄露漏洞(CNVD-2026-16059) | 2025-12-25 | 2026-04-03 |
| cnvd-2026-16058 | Apple macOS存在未明漏洞(CNVD-2026-16058) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16057 | OpenClaw路径遍历漏洞(CNVD-2026-16057) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16056 | OpenClaw安全绕过漏洞(CNVD-2026-16056) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16055 | OpenClaw安全绕过漏洞(CNVD-2026-16055) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16054 | OpenClaw命令执行漏洞(CNVD-2026-16054) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16053 | OpenClaw拒绝服务漏洞(CNVD-2026-16053) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16052 | OpenClaw访问控制错误漏洞(CNVD-2026-16052) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16051 | OpenClaw安全绕过漏洞(CNVD-2026-16051) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16050 | OpenClaw操作系统命令注入漏洞(CNVD-2026-16050) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16049 | OpenClaw存在未明漏洞(CNVD-2026-16049) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16048 | OpenClaw存在未明漏洞(CNVD-2026-16048) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16047 | OpenClaw代码执行漏洞(CNVD-2026-16047) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16046 | OpenClaw命令执行漏洞(CNVD-2026-16046) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16045 | OpenClaw安全绕过漏洞(CNVD-2026-16045) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16044 | OpenClaw操作系统命令注入漏洞(CNVD-2026-16044) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16043 | OpenClaw操作系统命令注入漏洞(CNVD-2026-16043) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16042 | OpenClaw路径遍历漏洞(CNVD-2026-16042) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16041 | OpenClaw访问控制错误漏洞(CNVD-2026-16041) | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16040 | OpenClaw路径遍历漏洞(CNVD-2026-16040) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16039 | WordPress插件Addon Jobsearch Chat跨站脚本漏洞 | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16038 | Linux kernel内存错误引用漏洞(CNVD-2026-16038) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16037 | FreeBSD缓冲区溢出漏洞(CNVD-2026-16037) | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16036 | Linux kernel双重释放漏洞(CNVD-2026-16036) | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16035 | FreeRDP拒绝服务漏洞(CNVD-2026-16035) | 2026-04-02 | 2026-04-03 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15548 | Уязвимость компонента jfs/file.c ядра операционной системы Linux, позволяющая нарушителю … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15547 | Уязвимость компонента fs/ext4/inline.c ядра операционной системы Linux, позволяющая наруш… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15546 | Уязвимость драйвера gve ядра операционной системы Linux, позволяющая нарушителю вызвать о… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15545 | Уязвимость компонента arch/parisc/kernel/syscall.S ядра операционной системы Linux, позво… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15544 | Уязвимость компонента arch/parisc/include/asm/uaccess.h ядра операционной системы Linux, … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15543 | Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | 11.12.2025 | 16.02.2026 |
| bdu:2025-15289 | Уязвимость функции atmtcp_recv_control() ядра операционной системы Linux, позволяющая нар… | 08.12.2025 | 16.02.2026 |
| bdu:2025-15261 | Уязвимость компонента hid-asus.c ядра операционной системы Linux, позволяющая нарушителю … | 05.12.2025 | 16.02.2026 |
| bdu:2025-15252 | Уязвимость функции sctp_v6_from_sk() ядра операционной системы Linux, позволяющая нарушит… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15248 | Уязвимость функции btrfs_copy_root() компонента btrfs ядра операционной системы Linux, по… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15240 | Уязвимость функции blk_stack_limits() компонента block/blk-settings.c ядра операционной с… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15238 | Уязвимость библиотеки resolv языка программирования Ruby, позволяющая нарушителю вызвать … | 05.12.2025 | 16.02.2026 |
| bdu:2025-15231 | Уязвимость функции tls_do_decryption() (net/tls/tls_sw.c) ядра операционной системы Linux… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15230 | Уязвимость функций ovl_encode_real_fh() (fs/overlayfs/copy_up.c) и show_mark_fhandle() (f… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15228 | Уязвимость системы мониторинга ИТ-инфраструктуры Zabbix, связанная с хранением пароля в н… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15227 | Уязвимость ядра операционной системы Linux, связанная с ошибками инициализации памяти, по… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15226 | Уязвимость компонента drivers/soc/qcom/mdt_loader.c ядра операционной системы Linux, позв… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15225 | Уязвимость модуля vfs_streams_xattr пакета программ сетевого взаимодействия Samba, позвол… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15224 | Уязвимость функции Item_direct_view_ref::derived_field_transformer_for_where системы упра… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15223 | Уязвимость функции pci_epf_remove_cfs() компонента drivers/pci/endpoint/pci-epf-core.c яд… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15222 | Уязвимость функции JOIN::fix_all_splittings_in_plan системы управления базами данных Mari… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15221 | Уязвимость системы управления базами данных MariaDB, связанная с неправильным порядком по… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15220 | Уязвимость функции jbd2_log_do_checkpoint() компонента fs/jbd2/checkpoint.c ядра операцио… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15218 | Уязвимость функции relocate_one_folio() модуля fs/btrfs/relocation.c поддержки файловой с… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15216 | Уязвимость функций EXPORT_SYMBOL(), destroy_cm_id() и cm_work_handler() ядра операционной… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15213 | Уязвимость функции usb_parse_ss_endpoint_companion() компонента drivers/usb/core/config.c… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15212 | Уязвимость компонента fs/btrfs/qgroup.c ядра операционной системы Linux, позволяющая нару… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15211 | Уязвимость компонента fs ядра операционной системы Linux, позволяющая нарушителю вызвать … | 05.12.2025 | 16.02.2026 |
| bdu:2025-15209 | Уязвимость компонента media/usb/usbtv/usbtv-video.c ядра операционной системы Linux, позв… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15201 | Уязвимость компонента qcom/venus/core.c ядра операционной системы Linux, позволяющая нару… | 05.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201908-1958 | The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently l… | 2026-04-10T23:16:47.566000Z |
| var-201403-0275 | sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd… | 2026-04-10T23:16:47.157000Z |
| var-201006-1162 | WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4… | 2026-04-10T23:16:45.414000Z |
| var-200605-0497 | RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly enforce RIPv2 authenticati… | 2026-04-10T23:16:45.010000Z |
| var-202203-0045 | Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) P… | 2026-04-10T23:16:41.141000Z |
| var-201603-0222 | The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denia… | 2026-04-10T23:16:40.712000Z |
| var-201108-0145 | Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before … | 2026-04-10T23:16:40.293000Z |
| var-200909-0801 | The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp modul… | 2026-04-10T23:16:40.099000Z |
| var-201806-1459 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2026-04-10T23:16:38.256000Z |
| var-200609-1424 | The Installer application in Apple Mac OS X 10.4.8 and earlier, when used by a user with … | 2026-04-10T23:16:33.184000Z |
| var-201804-1187 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2026-04-10T23:16:32.078000Z |
| var-201006-1259 | Double free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 1… | 2026-04-10T23:16:32.021000Z |
| var-202203-0034 | A carefully crafted request body can cause a read to a random memory area which could cau… | 2026-04-10T23:16:31.216000Z |
| var-201110-0394 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2026-04-10T23:15:43.060000Z |
| var-201411-0410 | cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain nam… | 2026-04-10T23:15:37.764000Z |
| var-201606-0395 | The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-depen… | 2026-04-10T23:15:26.893000Z |
| var-200810-0138 | The Hewlett-Packard Graphics Language (HPGL) filter in CUPS before 1.3.9 allows remote at… | 2026-04-10T23:15:18.511000Z |
| var-201910-1495 | The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print… | 2026-04-10T23:14:47.530000Z |
| var-200807-0061 | Safari on Apple iPhone before 2.0 and iPod touch before 2.0 misinterprets a menu button p… | 2026-04-10T23:14:47.455000Z |
| var-202205-1953 | A logic issue was addressed with improved state management. This issue is fixed in Securi… | 2026-04-10T23:14:47.340000Z |
| var-200611-0488 | Unspecified vulnerability in Apple Mac OS X 10.4.8, and possibly other versions, allows r… | 2026-04-10T23:14:42.727000Z |
| var-201804-1161 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2026-04-10T23:14:42.647000Z |
| var-201006-1160 | Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in WebKit… | 2026-04-10T23:14:06.173000Z |
| var-201302-0106 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2026-04-10T23:14:05.812000Z |
| var-201310-0355 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, a… | 2026-04-10T23:13:38.401000Z |
| var-200704-0213 | load_webdav in Apple Mac OS X 10.3.9 through 10.4.9 does not properly clean the environme… | 2026-04-10T23:13:37.222000Z |
| var-200701-0124 | The ufs_lookup function in the Mac OS X 10.4.8 and FreeBSD 6.1 kernels allows local users… | 2026-04-10T23:13:36.661000Z |
| var-200610-0022 | User interface inconsistency in Workgroup Manager in Apple Mac OS X 10.4 through 10.4.7 a… | 2026-04-10T23:13:06.498000Z |
| var-200704-0217 | The Login Window in Apple Mac OS X 10.3.9 through 10.4.9 does not properly check certain … | 2026-04-10T23:13:02.369000Z |
| var-201302-0305 | Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on … | 2026-04-10T23:13:02.295000Z |