Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-33083 |
8.7 (4.0)
|
DataEase has SQL Injection in Order By Clause |
dataease |
dataease |
2026-04-16T17:52:37.255Z | 2026-04-16T19:39:25.443Z |
| CVE-2026-33082 |
8.7 (4.0)
|
DataEase: SQL Injection in v2 Dataset Export |
dataease |
dataease |
2026-04-16T17:39:37.894Z | 2026-04-16T18:41:46.111Z |
| CVE-2026-41082 |
7.3 (3.1)
|
In OCaml opam before 2.5.1, a .install field cont… |
OCaml |
opam |
2026-04-16T17:32:40.068Z | 2026-04-16T23:00:36.235Z |
| CVE-2026-27820 |
1.7 (4.0)
|
zlib: Buffer Overflow in Zlib::GzipReader ungetc via l… |
ruby |
zlib |
2026-04-16T17:27:48.944Z | 2026-04-16T18:20:21.451Z |
| CVE-2026-24749 |
5.3 (3.1)
|
Silverstripe Assets Module has a DBFile::getURL() perm… |
silverstripe |
silverstripe-assets |
2026-04-16T17:08:59.133Z | 2026-04-16T17:08:59.133Z |
| CVE-2026-2336 |
8.7 (4.0)
|
Weak webstax_auth Cookie Authentication Allows Privile… |
Microchip |
IStaX |
2026-04-16T17:02:06.352Z | 2026-04-16T17:34:39.672Z |
| CVE-2026-41080 |
2.9 (3.1)
|
libexpat before 2.7.6 uses insufficient entropy, … |
libexpat project |
libexpat |
2026-04-16T16:52:01.177Z | 2026-04-16T16:56:59.212Z |
| CVE-2025-36579 |
5.1 (3.1)
|
Dell Client Platform BIOS contains a Weak Passwor… |
Dell |
Dell Pro 14 Essential PV14250 |
2026-04-16T16:05:32.561Z | 2026-04-16T18:32:52.672Z |
| CVE-2026-5426 |
N/A
|
KnowledgeDeliver deployments before February 24, 2026 … |
Digital Knowledge |
KnowledgeDeliver |
2026-04-16T15:18:46.224Z | 2026-04-16T15:22:20.823Z |
| CVE-2026-3324 |
8.2 (3.1)
|
Authentication Bypass |
Zohocorp |
ManageEngine Log360 |
2026-04-16T14:30:55.130Z | 2026-04-16T15:21:19.911Z |
| CVE-2026-6409 |
7.1 (4.0)
|
Denial of Service (DoS) vulnerability exists in the Pr… |
Protocol Buffers |
Protobuf-php (Pecl) |
2026-04-16T14:30:51.568Z | 2026-04-16T15:24:43.164Z |
| CVE-2026-2840 |
6.4 (3.1)
|
Email Encoder – Protect Email Addresses and Phone Numb… |
onlineoptimisation |
Email Encoder – Protect Email Addresses and Phone Numbers |
2026-04-16T14:10:29.114Z | 2026-04-16T14:42:53.905Z |
| CVE-2026-33804 |
7.4 (3.1)
|
@fastify/middie vulnerable to middleware bypass via de… |
@fastify/middie |
@fastify/middie |
2026-04-16T13:56:56.176Z | 2026-04-16T14:41:48.659Z |
| CVE-2026-5785 |
8.1 (3.1)
|
SQL Injection |
Zohocorp |
ManageEngine PAM360 |
2026-04-16T13:46:28.313Z | 2026-04-17T03:55:15.059Z |
| CVE-2026-6270 |
9.1 (3.1)
|
@fastify/middie vulnerable to middleware authenticatio… |
@fastify/middie |
@fastify/middie |
2026-04-16T13:44:46.322Z | 2026-04-16T14:24:26.764Z |
| CVE-2026-31987 |
N/A
|
Apache Airflow: JWT token appearing in logs |
Apache Software Foundation |
Apache Airflow |
2026-04-16T13:31:52.336Z | 2026-04-16T18:24:29.466Z |
| CVE-2026-6410 |
5.3 (3.1)
|
@fastify/static vulnerable to path traversal in direct… |
@fastify/static |
@fastify/static |
2026-04-16T13:29:08.120Z | 2026-04-16T14:19:36.780Z |
| CVE-2026-4160 |
5.3 (3.1)
|
Fluent Forms – Customizable Contact Forms, Survey, Qui… |
techjewel |
Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder |
2026-04-16T13:27:09.207Z | 2026-04-16T14:12:35.951Z |
| CVE-2026-6414 |
5.9 (3.1)
|
@fastify/static vulnerable to route guard bypass via e… |
@fastify/static |
@fastify/static |
2026-04-16T13:09:03.526Z | 2026-04-16T13:48:52.393Z |
| CVE-2026-31843 |
10 (4.0)
9.8 (3.1)
|
The goodoneuz/pay-uz Laravel package (<= 2.2.24) … |
goodoneuz |
pay-uz |
2026-04-16T13:02:55.701Z | 2026-04-16T19:30:21.203Z |
| CVE-2025-15621 |
5.7 (4.0)
|
Sparx Enterprise Architect Client does not verify the … |
Sparx Systems Pty Ltd. |
Sparx Enterprise Architect |
2026-04-16T12:40:08.962Z | 2026-04-16T12:51:51.633Z |
| CVE-2026-3155 |
3.1 (3.1)
|
OneSignal – Web Push Notifications <= 3.8.0 - Missing … |
onesignal |
OneSignal – Web Push Notifications |
2026-04-16T11:21:22.226Z | 2026-04-16T14:00:56.681Z |
| CVE-2026-3369 |
5.4 (3.1)
|
Better Find and Replace – AI-Powered Suggestions <= 1.… |
codesolz |
Better Find and Replace – AI-Powered Suggestions |
2026-04-16T11:21:21.822Z | 2026-04-16T14:04:23.811Z |
| CVE-2026-3489 |
7.5 (3.1)
|
DirectoryPress – Business Directory And Classified Ad … |
designinvento |
DirectoryPress – Business Directory And Classified Ad Listing |
2026-04-16T11:21:21.179Z | 2026-04-16T14:05:03.740Z |
| CVE-2025-12624 |
6 (3.1)
|
Improper Token Invalidation in WSO2 Identity Server Al… |
WSO2 |
WSO2 Identity Server |
2026-04-16T10:25:19.789Z | 2026-04-16T12:30:14.886Z |
| CVE-2025-6024 |
6.1 (3.1)
|
Cross-Site Scripting via Authentication Endpoint in Mu… |
WSO2 |
WSO2 API Manager |
2026-04-16T09:48:45.244Z | 2026-04-16T12:30:22.824Z |
| CVE-2024-10242 |
6.1 (3.1)
|
Reflected Cross-Site Scripting via Authentication Endp… |
WSO2 |
WSO2 API Manager |
2026-04-16T09:45:46.115Z | 2026-04-16T12:30:30.619Z |
| CVE-2024-8010 |
3.5 (3.1)
|
XML External Entity Injection via Publisher in WSO2 AP… |
WSO2 |
WSO2 API Manager |
2026-04-16T09:39:20.130Z | 2026-04-16T12:30:36.466Z |
| CVE-2024-4867 |
5.4 (3.1)
|
Cross-Site Scripting via Developer Portal in WSO2 API … |
WSO2 |
WSO2 API Manager |
2026-04-16T09:32:40.941Z | 2026-04-16T12:30:42.568Z |
| CVE-2026-23772 |
7.3 (3.1)
|
Dell Storage Manager - Replay Manager for Microso… |
Dell |
Storage Manager |
2026-04-16T08:30:56.774Z | 2026-04-17T03:55:13.852Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-41082 |
7.3 (3.1)
|
In OCaml opam before 2.5.1, a .install field cont… |
OCaml |
opam |
2026-04-16T17:32:40.068Z | 2026-04-16T23:00:36.235Z |
| CVE-2026-33083 |
8.7 (4.0)
|
DataEase has SQL Injection in Order By Clause |
dataease |
dataease |
2026-04-16T17:52:37.255Z | 2026-04-16T19:39:25.443Z |
| CVE-2026-33082 |
8.7 (4.0)
|
DataEase: SQL Injection in v2 Dataset Export |
dataease |
dataease |
2026-04-16T17:39:37.894Z | 2026-04-16T18:41:46.111Z |
| CVE-2026-2336 |
8.7 (4.0)
|
Weak webstax_auth Cookie Authentication Allows Privile… |
Microchip |
IStaX |
2026-04-16T17:02:06.352Z | 2026-04-16T17:34:39.672Z |
| CVE-2026-27820 |
1.7 (4.0)
|
zlib: Buffer Overflow in Zlib::GzipReader ungetc via l… |
ruby |
zlib |
2026-04-16T17:27:48.944Z | 2026-04-16T18:20:21.451Z |
| CVE-2026-24749 |
5.3 (3.1)
|
Silverstripe Assets Module has a DBFile::getURL() perm… |
silverstripe |
silverstripe-assets |
2026-04-16T17:08:59.133Z | 2026-04-16T17:08:59.133Z |
| CVE-2025-43883 |
4.1 (3.1)
|
Dell PowerScale OneFS, versions prior to 9.12.0.0… |
Dell |
PowerScale OneFS |
2026-04-16T17:54:09.831Z | 2026-04-16T18:05:57.154Z |
| CVE-2026-41080 |
2.9 (3.1)
|
libexpat before 2.7.6 uses insufficient entropy, … |
libexpat project |
libexpat |
2026-04-16T16:52:01.177Z | 2026-04-16T16:56:59.212Z |
| CVE-2025-36579 |
5.1 (3.1)
|
Dell Client Platform BIOS contains a Weak Passwor… |
Dell |
Dell Pro 14 Essential PV14250 |
2026-04-16T16:05:32.561Z | 2026-04-16T18:32:52.672Z |
| CVE-2026-5426 |
N/A
|
KnowledgeDeliver deployments before February 24, 2026 … |
Digital Knowledge |
KnowledgeDeliver |
2026-04-16T15:18:46.224Z | 2026-04-16T15:22:20.823Z |
| CVE-2026-37100 |
N/A
|
An issue in the Bluetooth Low Energy (BLE) contro… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T15:10:26.326Z |
| CVE-2026-6409 |
7.1 (4.0)
|
Denial of Service (DoS) vulnerability exists in the Pr… |
Protocol Buffers |
Protobuf-php (Pecl) |
2026-04-16T14:30:51.568Z | 2026-04-16T15:24:43.164Z |
| CVE-2026-3324 |
8.2 (3.1)
|
Authentication Bypass |
Zohocorp |
ManageEngine Log360 |
2026-04-16T14:30:55.130Z | 2026-04-16T15:21:19.911Z |
| CVE-2026-37347 |
9.1 (3.1)
|
SourceCodester Payroll Management and Information… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T15:38:38.249Z |
| CVE-2026-37346 |
4.7 (3.1)
|
SourceCodester Payroll Management and Information… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T15:44:44.805Z |
| CVE-2026-37345 |
9.8 (3.1)
|
SourceCodester Vehicle Parking Area Management Sy… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T15:42:56.413Z |
| CVE-2026-37344 |
N/A
|
SourceCodester Vehicle Parking Area Management Sy… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T14:56:26.706Z |
| CVE-2026-37343 |
N/A
|
SourceCodester Vehicle Parking Area Management Sy… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T14:53:42.067Z |
| CVE-2026-37342 |
N/A
|
SourceCodester Vehicle Parking Area Management Sy… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T14:52:06.099Z |
| CVE-2026-37341 |
N/A
|
SourceCodester Vehicle Parking Area Management Sy… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T14:49:44.408Z |
| CVE-2026-37340 |
N/A
|
SourceCodester Simple Music Cloud Community Syste… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T14:40:33.498Z |
| CVE-2026-37339 |
N/A
|
SourceCodester Simple Music Cloud Community Syste… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T14:38:34.839Z |
| CVE-2026-37338 |
9.4 (3.1)
|
SourceCodester Simple Music Cloud Community Syste… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T15:49:41.995Z |
| CVE-2026-37337 |
7.3 (3.1)
|
SourceCodester Simple Music Cloud Community Syste… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T17:26:11.625Z |
| CVE-2026-37336 |
7.3 (3.1)
|
SourceCodester Simple Music Cloud Community Syste… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T17:28:46.565Z |
| CVE-2026-33804 |
7.4 (3.1)
|
@fastify/middie vulnerable to middleware bypass via de… |
@fastify/middie |
@fastify/middie |
2026-04-16T13:56:56.176Z | 2026-04-16T14:41:48.659Z |
| CVE-2026-30656 |
7.5 (3.1)
|
A NULL pointer dereference vulnerability exists i… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T17:33:52.962Z |
| CVE-2026-30459 |
7.1 (3.1)
|
An issue in the Forgot Password feature of Daylig… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T15:16:57.348Z |
| CVE-2026-2840 |
6.4 (3.1)
|
Email Encoder – Protect Email Addresses and Phone Numb… |
onlineoptimisation |
Email Encoder – Protect Email Addresses and Phone Numbers |
2026-04-16T14:10:29.114Z | 2026-04-16T14:42:53.905Z |
| CVE-2026-6410 |
5.3 (3.1)
|
@fastify/static vulnerable to path traversal in direct… |
@fastify/static |
@fastify/static |
2026-04-16T13:29:08.120Z | 2026-04-16T14:19:36.780Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-xhmj-rg95-44hv |
7.1 (3.1)
|
Flowise: SSRF Protection Bypass via Unprotected Built-in HTTP Modules in Custom Function Sandbox | 2026-04-16T21:50:12Z | 2026-04-16T21:50:12Z |
| ghsa-rh7v-6w34-w2rr |
7.1 (3.1)
|
Flowise: File Upload Validation Bypass in createAttachment | 2026-04-16T21:49:28Z | 2026-04-16T21:49:28Z |
| ghsa-cvrr-qhgw-2mm6 |
7.7 (3.1)
|
Flowise: Parameter Override Bypass Remote Command Execution | 2026-04-16T21:46:39Z | 2026-04-16T21:46:39Z |
| ghsa-4jpm-cgx2-8h37 |
7.7 (4.0)
|
Flowise: Sensitive Data Leak in public-chatbotConfig | 2026-04-16T21:44:49Z | 2026-04-16T21:44:49Z |
| ghsa-48m6-ch88-55mj |
8.1 (3.1)
|
Flowise: Improper Mass Assignment in Account Registration Enables Unauthorized Organization Association | 2026-04-16T21:44:24Z | 2026-04-16T21:44:24Z |
| ghsa-9wc7-mj3f-74xv |
9.4 (4.0)
|
Flowise: Code Injection in CSVAgent leads to Authenticated RCE | 2026-04-16T21:44:15Z | 2026-04-16T21:44:15Z |
| ghsa-f228-chmx-v6j6 |
8.3 (3.1)
|
Flowise: Remote code execution vulnerability in AirtableAgent.ts caused by lack of input verificati… | 2026-04-16T21:43:57Z | 2026-04-16T21:43:57Z |
| ghsa-fgw5-hp8f-xfhc |
5.0 (3.1)
|
Istio: SSRF via RequestAuthentication jwksUri | 2026-04-16T21:38:09Z | 2026-04-16T21:38:09Z |
| ghsa-rp42-5vxx-qpwr |
7.5 (3.1)
|
basic-ftp vulnerable to denial of service via unbounded memory consumption in Client.list() | 2026-04-16T21:37:48Z | 2026-04-16T21:37:48Z |
| ghsa-8wfp-579w-6r25 |
7.7 (3.1)
|
Kyverno apiCall automatically forwards ServiceAccount token to external endpoints (credential leak) | 2026-04-16T21:37:29Z | 2026-04-16T21:37:29Z |
| ghsa-f9g8-6ppc-pqq4 |
8.1 (3.1)
|
Kyverno: ServiceAccount token leaked to external servers via apiCall service URL | 2026-04-16T21:36:20Z | 2026-04-16T21:36:20Z |
| ghsa-cvq5-hhx3-f99p |
7.7 (3.1)
|
Kyverno: Cross-Namespace Read Bypasses RBAC Isolation (CVE-2026-22039 Incomplete Fix) | 2026-04-16T21:35:04Z | 2026-04-16T21:35:04Z |
| ghsa-2mvx-f5qm-v2ch |
8.8 (4.0)
|
Unauthenticated Information Disclosure (IDOR) via Multisite switch_to_blog in My Calendar | 2026-04-16T21:34:40Z | 2026-04-16T21:34:40Z |
| ghsa-vp6r-9m58-5xv8 |
8.1 (3.1)
|
OmniFaces: EL injection via crafted resource name in wildcard CDN mapping | 2026-04-16T21:31:14Z | 2026-04-16T21:31:14Z |
| ghsa-p7qm-4248-g65p |
7.1 (4.0)
|
Incorrect use of boot service in the AMD Platform Configuration Blob (APCB) SMM driver could allow … | 2026-04-16T21:31:13Z | 2026-04-16T21:31:13Z |
| ghsa-p7f2-6479-84wx |
6.6 (3.1)
|
Dell PowerScale OneFS, versions prior to 9.12.0.0, contains an insertion of sensitive information i… | 2026-04-16T21:31:13Z | 2026-04-16T21:31:13Z |
| ghsa-mwrh-fvw2-28c5 |
5.9 (4.0)
|
A missing lock verification in AMD Secure Processor (ASP) firmware may permit a locally authenticat… | 2026-04-16T21:31:13Z | 2026-04-16T21:31:13Z |
| ghsa-26fh-vcwc-mcgv |
8.3 (3.1)
|
Improper validation of bash commands in Snowflake Cortex Code CLI versions prior to 1.0.25 allowed … | 2026-04-16T21:31:13Z | 2026-04-16T21:31:13Z |
| ghsa-c43c-pr38-m5g2 |
5.6 (4.0)
|
Insufficient checks of the RMP on host buffer access in IOMMU may allow an attacker with privileges… | 2026-04-16T21:31:12Z | 2026-04-16T21:31:12Z |
| ghsa-4rvm-g2vh-jm4x |
4.4 (3.1)
|
Dell PowerScale OneFS, versions prior to 9.12.0.0, contains an improper resource shutdown or releas… | 2026-04-16T21:31:12Z | 2026-04-16T21:31:12Z |
| ghsa-x284-j5p8-9c5p |
6.8 (4.0)
|
pypdf: Manipulated FlateDecode image dimensions can exhaust RAM | 2026-04-16T21:30:25Z | 2026-04-16T21:30:25Z |
| ghsa-4pxv-j86v-mhcw |
6.8 (4.0)
|
pypdf: Possible long runtimes for wrong size values in incremental mode | 2026-04-16T21:30:12Z | 2026-04-16T21:30:12Z |
| ghsa-7gw9-cf7v-778f |
6.8 (4.0)
|
pypdf: Manipulated FlateDecode predictor parameters can exhaust RAM | 2026-04-16T21:30:00Z | 2026-04-16T21:30:00Z |
| ghsa-qqx8-2xmm-jrv8 |
8.8 (3.1)
|
ACME Lego: Arbitrary File Write via Path Traversal in Webroot HTTP-01 Provider | 2026-04-16T21:28:55Z | 2026-04-16T21:28:55Z |
| ghsa-33qf-q99x-wpm8 |
5.6 (3.1)
|
Home Assistant Command-line Interface: Handling of user-supplied Jinja2 templates | 2026-04-16T21:28:39Z | 2026-04-16T21:28:39Z |
| ghsa-vqx2-fgx2-5wq9 |
9.1 (3.1)
|
Official Clerk JavaScript SDKs: Middleware-based route protection bypass | 2026-04-16T21:28:26Z | 2026-04-16T21:28:26Z |
| ghsa-4jjr-vmv7-wh4w |
8.1 (3.1)
|
Statamic: Unsafe method invocation via query value resolution allows data destruction | 2026-04-16T21:25:35Z | 2026-04-16T21:25:35Z |
| ghsa-xr6f-h4x7-r6qp |
8.7 (4.0)
|
WWBN AVideo: RCE cause by clonesite plugin | 2026-04-16T21:25:19Z | 2026-04-16T21:25:20Z |
| ghsa-wxw2-rwmh-vr8f |
9.8 (3.1)
|
electerm: electerm_install_script_CommandInjection Vulnerability Report | 2026-04-16T21:24:22Z | 2026-04-16T21:24:22Z |
| ghsa-9hrv-gvrv-6gf2 |
6.0 (4.0)
|
Flowise Execute Flow function has an SSRF vulnerability | 2026-04-16T21:23:17Z | 2026-04-16T21:23:18Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-184 |
7.5 (3.1)
|
A local file inclusion vulnerability exists in the JSON component of gradio-app/gradio ve… | gradio | 2024-06-06T18:15:18+00:00 | 2025-01-19T04:23:00.017053+00:00 |
| pysec-2024-165 |
7.5 (3.1)
|
The Jupyter Server provides the backend for Jupyter web applications. Jupyter Server on W… | jupyter-server | 2024-06-06T16:15:11+00:00 | 2025-01-18T19:19:04.842426+00:00 |
| pysec-2024-166 |
|
Nautobot is a Network Source of Truth and Network Automation Platform. A user with permis… | nautobot | 2024-05-28T23:15:17+00:00 | 2025-01-18T19:19:06.277166+00:00 |
| pysec-2024-258 |
|
In scrapy/scrapy, an issue was identified where the Authorization header is not removed d… | scrapy | 2024-05-20T08:15:08+00:00 | 2025-07-15T17:37:50.051730+00:00 |
| pysec-2024-244 |
7.5 (3.1)
|
A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a by… | mlflow | 2024-05-16T09:15:14+00:00 | 2025-04-08T10:23:25.092581+00:00 |
| pysec-2024-51 |
|
A broken access control vulnerability exists in mlflow/mlflow versions before 2.10.1, whe… | mlflow | 2024-05-16T09:15:00+00:00 | 2024-05-16T11:19:52.866536+00:00 |
| pysec-2024-237 |
9.4 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-05-14T16:17:12+00:00 | 2025-03-05T17:22:29.121263+00:00 |
| pysec-2024-185 |
|
Nebari through 2024.4.1 prints the temporary Keycloak root password. | nebari | 2024-05-06T00:15:10+00:00 | 2025-01-19T04:23:00.951638+00:00 |
| pysec-2024-175 |
|
WordOps through 3.20.0 has a wo/cli/plugins/stack_pref.py TOCTOU race condition because t… | wordops | 2024-05-06T00:15:10+00:00 | 2025-01-18T22:21:44.991242+00:00 |
| pysec-2024-255 |
|
Gradio before 4.20 allows credential leakage on Windows. | gradio | 2024-05-05T20:15:07+00:00 | 2025-06-17T19:21:48.983901+00:00 |
| pysec-2024-233 |
|
python-jose through 3.3.0 allows attackers to cause a denial of service (resource consump… | python-jose | 2024-04-26T00:15:09+00:00 | 2025-02-18T19:20:15.511369+00:00 |
| pysec-2024-232 |
|
python-jose through 3.3.0 has algorithm confusion with OpenSSH ECDSA keys and other key f… | python-jose | 2024-04-26T00:15:09+00:00 | 2025-02-18T19:20:15.468012+00:00 |
| pysec-2024-209 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-19T19:19:01.689044+00:00 |
| pysec-2024-163 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Prior to ve… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-14T05:22:23.036505+00:00 |
| pysec-2024-208 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.647736+00:00 |
| pysec-2024-207 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.605918+00:00 |
| pysec-2024-206 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.566553+00:00 |
| pysec-2024-246 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Starting in… | vyper | 2024-04-25T17:15:50+00:00 | 2025-05-05T19:21:20.899426+00:00 |
| pysec-2024-50 |
|
Synapse is an open-source Matrix homeserver. A remote Matrix user with malicious intent, … | matrix-synapse | 2024-04-23T18:15:00+00:00 | 2024-04-23T21:18:51.688096+00:00 |
| pysec-2024-250 |
|
Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the component torch/csr… | torch | 2024-04-19T21:15:08+00:00 | 2025-06-03T15:23:56.072490+00:00 |
| pysec-2024-252 |
|
PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in t… | torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T19:22:08.948962+00:00 |
| pysec-2024-251 |
|
Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in… | torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T03:12:59.077932+00:00 |
| pysec-2024-243 |
9.3 (3.1)
|
mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs… | mlflow | 2024-04-16T00:15:12+00:00 | 2025-04-08T10:23:25.044416+00:00 |
| pysec-2024-254 |
4.2 (3.1)
|
A session fixation vulnerability exists in the zenml-io/zenml application, where JWT toke… | zenml | 2024-04-16T00:15:11+00:00 | 2025-06-13T00:48:41.806476+00:00 |
| pysec-2024-247 |
9.9 (3.1)
|
A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically… | zenml | 2024-04-16T00:15:11+00:00 | 2025-05-12T15:23:53.861001+00:00 |
| pysec-2024-49 |
|
Lektor before 3.3.11 does not sanitize DB path traversal. Thus, shell commands might be e… | lektor | 2024-03-27T06:15:00+00:00 | 2024-03-27T11:18:36.506150+00:00 |
| pysec-2024-257 |
7.5 (3.1)
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2024-03-22T23:15:07+00:00 | 2025-06-30T15:23:50.085549+00:00 |
| pysec-2024-234 |
9.8 (3.1)
|
Jupyter Server Proxy allows users to run arbitrary external processes alongside their Jup… | jupyter-server-proxy | 2024-03-20T20:15:08+00:00 | 2025-02-21T18:23:35.992501+00:00 |
| pysec-2024-48 |
|
Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial o… | black | 2024-03-19T05:15:00+00:00 | 2024-03-19T11:18:50.379002+00:00 |
| pysec-2024-179 |
4.8 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-03-18T22:15:07+00:00 | 2025-01-19T01:52:24.377662+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2632 | Malicious code in magentaa11y (npm) | 2026-04-14T11:31:05Z | 2026-04-14T11:31:12Z |
| mal-2026-2634 | Malicious code in percy-cake-docker (npm) | 2026-04-14T11:31:04Z | 2026-04-14T11:31:05Z |
| mal-2026-2630 | Malicious code in gate-apis (PyPI) | 2026-04-14T10:23:40Z | 2026-04-14T10:23:40Z |
| mal-2026-2825 | Malicious code in centralogger (npm) | 2026-04-14T09:21:57Z | 2026-04-14T09:21:57Z |
| mal-2026-2826 | Malicious code in dom-utils-lite (npm) | 2026-04-14T09:21:35Z | 2026-04-14T09:21:35Z |
| mal-2026-2629 | Malicious code in stacks-editor (npm) | 2026-04-14T08:55:57Z | 2026-04-14T08:55:57Z |
| mal-2026-2628 | Malicious code in svchost (PyPI) | 2026-04-14T05:42:26Z | 2026-04-14T05:42:26Z |
| mal-2026-2627 | Malicious code in pckg-sv (PyPI) | 2026-04-14T05:35:20Z | 2026-04-14T05:35:20Z |
| mal-2026-2626 | Malicious code in getcardslib (npm) | 2026-04-14T00:07:56Z | 2026-04-14T00:07:56Z |
| mal-2026-2625 | Malicious code in robase-install (PyPI) | 2026-04-13T22:03:44Z | 2026-04-16T07:40:04Z |
| mal-2026-2624 | Malicious code in asciitoart (PyPI) | 2026-04-13T21:26:29Z | 2026-04-13T22:22:34Z |
| mal-2026-2623 | Malicious code in hive-setting (PyPI) | 2026-04-13T16:27:32Z | 2026-04-13T16:27:32Z |
| mal-2026-2621 | Malicious code in walmart-internal (npm) | 2026-04-13T15:33:47Z | 2026-04-13T15:33:47Z |
| mal-2026-2597 | Malicious code in @zgny/onboarding-consumer (npm) | 2026-04-13T15:25:22Z | 2026-04-13T15:25:30Z |
| mal-2026-2596 | Malicious code in @spreadjs/js-calc (npm) | 2026-04-13T15:25:22Z | 2026-04-13T15:25:30Z |
| mal-2026-2595 | Malicious code in @sports-api/api-sdk (npm) | 2026-04-13T15:25:22Z | 2026-04-16T15:42:07Z |
| mal-2026-2594 | Malicious code in @spoonflower/ui (npm) | 2026-04-13T15:25:22Z | 2026-04-13T15:25:30Z |
| mal-2026-2593 | Malicious code in @sage-active/ui (npm) | 2026-04-13T15:25:22Z | 2026-04-16T15:42:07Z |
| mal-2026-2592 | Malicious code in @relxui/react (npm) | 2026-04-13T15:25:22Z | 2026-04-13T15:25:30Z |
| mal-2026-2591 | Malicious code in @pes-ui/components (npm) | 2026-04-13T15:25:22Z | 2026-04-16T15:42:07Z |
| mal-2026-2590 | Malicious code in @op-microfrontends/config (npm) | 2026-04-13T15:25:22Z | 2026-04-16T15:42:07Z |
| mal-2026-2589 | Malicious code in @mx-shared/utils (npm) | 2026-04-13T15:25:22Z | 2026-04-13T15:25:30Z |
| mal-2026-2587 | Malicious code in @kucoin-gbiz-next/tools (npm) | 2026-04-13T15:25:22Z | 2026-04-13T15:25:30Z |
| mal-2026-2586 | Malicious code in @ids-alpha/theme (npm) | 2026-04-13T15:25:22Z | 2026-04-13T15:25:22Z |
| mal-2026-2585 | Malicious code in @hrb-web/nuxt (npm) | 2026-04-13T15:25:22Z | 2026-04-13T15:25:29Z |
| mal-2026-2581 | Malicious code in @dtc-campaign-wizard/campaign-wizard (npm) | 2026-04-13T15:25:22Z | 2026-04-13T15:25:22Z |
| mal-2026-2622 | Malicious code in wm-plugin-wm-smart-tip-dont-embed-tooltip (npm) | 2026-04-13T15:25:21Z | 2026-04-13T15:25:22Z |
| mal-2026-2584 | Malicious code in @hpcc/js-api (npm) | 2026-04-13T15:25:21Z | 2026-04-13T15:25:29Z |
| mal-2026-2583 | Malicious code in @hmm-app/api (npm) | 2026-04-13T15:25:21Z | 2026-04-13T15:25:29Z |
| mal-2026-2582 | Malicious code in @guards-lib/auth (npm) | 2026-04-13T15:25:21Z | 2026-04-16T15:42:07Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0497 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2026-02-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0495 | SonicWall SonicOS: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0494 | Red Hat Enterprise Linux (389-ds-base): Schwachstelle ermöglicht Codeausführung und potenziell Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0492 | Docker Desktop: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2026-0491 | VMware Aria Operations: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2026-0490 | OpenClaw: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-11T23:00:00.000+00:00 |
| wid-sec-w-2026-0484 | ImageMagick: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0481 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0480 | Red Hat Enterprise Linux (Python Protobuf): Schwachstelle ermöglicht Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0479 | Red Hat OpenShift Service Mesh (Kiali): Schwachstelle ermöglicht Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0472 | OpenClaw: Mehrere Schwachstellen | 2026-02-22T23:00:00.000+00:00 | 2026-04-12T22:00:00.000+00:00 |
| wid-sec-w-2026-0471 | IceWarp EPOS: Mehrere Schwachstellen | 2026-02-19T23:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2026-0469 | GIMP: Mehrere Schwachstellen ermöglichen Codeausführung | 2026-02-19T23:00:00.000+00:00 | 2026-03-09T23:00:00.000+00:00 |
| wid-sec-w-2026-0467 | IBM InfoSphere Information Server: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-02-19T23:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2026-0464 | QEMU: Schwachstelle ermöglicht Denial of Service und die Offenlegung von Informationen | 2026-02-19T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0462 | Linux Kernel: Mehrere Schwachstellen | 2026-02-18T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0454 | Keycloak: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-02-18T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0452 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2026-02-18T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0448 | Red Hat Enterprise Linux (MUNGE): Schwachstelle ermöglicht Privilegieneskalation | 2026-02-17T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2026-0446 | libssh: Mehrere Schwachstellen ermöglichen Manipulation von Dateien und DoS | 2026-02-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0443 | Apache Tomcat und Tomcat Native: Mehrere Schwachstellen | 2026-02-17T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0441 | OpenClaw: Mehrere Schwachstellen | 2026-02-17T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0437 | Dell RecoverPoint for Virtual Machines: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und potenziell Privilegieneskalation | 2026-02-17T23:00:00.000+00:00 | 2026-02-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0435 | zlib: Schwachstelle ermöglicht Denial of Service | 2026-02-17T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0427 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2026-02-16T23:00:00.000+00:00 | 2026-03-09T23:00:00.000+00:00 |
| wid-sec-w-2026-0425 | SmarterTools SmarterMail: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0424 | OpenClaw: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0423 | Gogs: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0422 | Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2026-02-15T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0421 | Linux Kernel: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-310-01 | Advantech DeviceOn/iEdge | 2025-11-06T07:00:00.000000Z | 2025-11-06T07:00:00.000000Z |
| icsa-25-308-05 | IDIS ICM Viewer | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-04 | Radiometrics VizAir | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-03 | Delta Electronics CNCSoft-G2 | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-02 | Survision License Plate Recognition Camera | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-01 | Fuji Electric Monitouch V-SFT-6 (Update A) | 2025-11-04T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| va-25-304-02 | Restaurant Brands International assistant platform multiple vulnerabilities | 2025-10-31T17:02:13Z | 2025-10-31T17:02:13Z |
| va-25-304-01 | ELOG multiple vulnerabilities | 2025-10-31T16:57:24Z | 2025-10-31T16:57:24Z |
| icsa-25-303-02 | Hitachi Energy TropOS | 2025-10-30T06:00:00.000000Z | 2025-10-30T06:00:00.000000Z |
| icsa-25-303-01 | International Standards Organization ISO 15118-2 (Update A) | 2025-10-30T05:00:00.000000Z | 2026-03-17T05:00:00.000000Z |
| icsma-25-301-01 | Vertikal Systems Hospital Manager Backend Services | 2025-10-28T06:00:00.000000Z | 2025-10-28T06:00:00.000000Z |
| icsma-25-296-01 | NIHON KOHDEN Central Monitor CNS-6201 | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-04 | Delta Electronics ASDA-Soft | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-03 | Veeder-Root TLS4B Automatic Tank Gauge System | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-02 | ASKI Energy ALS-Mini-S8 and ALS-Mini-S4 | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-01 | AutomationDirect Productivity Suite | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| va-25-296-01 | Frontier Airlines website publicly available email address validation | 2025-10-23T00:00:00Z | 2025-10-23T00:00:00Z |
| va-25-297-01 | IBM DOORS Next Generation multiple vulnerabilities | 2025-10-22T18:45:47Z | 2026-03-04T00:00:00Z |
| icsma-25-294-01 | Oxford Nanopore Technologies MinKNOW | 2025-10-21T06:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| icsa-25-294-06 | Raisecomm RAX701-GC Series | 2025-10-21T06:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| icsa-25-294-05 | CloudEdge Online Cameras and App | 2025-10-21T06:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| icsa-25-294-02 | Rockwell Automation Compact GuardLogix 5370 | 2025-10-21T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-294-01 | Rockwell Automation 1783-NATR | 2025-10-21T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| va-25-289-01 | OPEXUS FOIAXpress unauthenticated administrator password reset | 2025-10-16T16:43:55Z | 2025-10-16T16:43:55Z |
| icsa-25-289-04 | Rockwell Automation ArmorStart AOP | 2025-10-16T06:00:00.000000Z | 2025-10-16T06:00:00.000000Z |
| icsa-25-289-03 | Rockwell Automation FactoryTalk ViewPoint | 2025-10-16T06:00:00.000000Z | 2025-10-16T06:00:00.000000Z |
| icsa-25-289-02 | Rockwell Automation FactoryTalk Linx | 2025-10-16T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-289-01 | Rockwell Automation FactoryTalk View Machine Edition and PanelView Plus 7 | 2025-10-16T06:00:00.000000Z | 2025-10-16T06:00:00.000000Z |
| icsa-25-301-01 | Schneider Electric EcoStruxure | 2025-10-14T07:00:00.000000Z | 2025-10-14T07:00:00.000000Z |
| icsa-25-287-01 | Rockwell Automation 1715 EtherNet/IP Comms Module | 2025-10-14T06:00:00.000000Z | 2025-10-14T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ios-http-privesc-wcrd5e3 | Cisco IOS Software Industrial Ethernet Switch Device Manager Privilege Escalation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ewlc-user-del-hqxmpudj | Cisco IOS XE Wireless Controller Software Unauthorized User Deletion Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ewlc-cdp-dos-fpeks9k | Cisco IOS XE Wireless Controller Software Cisco Discovery Protocol Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-dnac-api-nbpzcjcm | Cisco Catalyst Center Unauthenticated API Access Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-03-26T16:00:00+00:00 |
| cisco-sa-catc-insec-acc-mtt8eheb | Cisco Catalyst Center Insufficient Access Control Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-catalyst-tls-pqnd5kej | Cisco Catalyst SD-WAN Manager Certificate Validation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-c2960-3560-sboot-ztqadrhq | Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches Secure Boot Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-bootstrap-kfgxygdh | Cisco IOS XE Software Bootstrap Arbitrary File Write Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-asr903-rsp3-arp-dos-wmfzdvjz | Cisco IOS XE Software for Cisco ASR 903 Aggregation Services Routers ARP Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-erlang-otp-ssh-xyzzy | Multiple Cisco Products Unauthenticated Remote Code Execution in Erlang/OTP SSH Server: April 2025 | 2025-04-22T21:45:00+00:00 | 2025-06-11T14:40:37+00:00 |
| cisco-sa-webex-app-client-rce-ufymmylc | Cisco Webex App Client-Side Remote Code Execution Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-sna-prvesc-4bqmk33z | Cisco Secure Network Analytics Privilege Escalation Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-nd-unenum-2xffh472 | Cisco Nexus Dashboard LDAP Username Enumeration Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-meraki-mx-vpn-dos-vnrpdvfb | Cisco Meraki MX and Z Series AnyConnect VPN Denial of Service Vulnerability | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-epnmpi-sxss-gsscpgy4 | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerabilities | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-ece-dos-tc6m9gz8 | Cisco Enterprise Chat and Email Denial of Service Vulnerability | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-xrike-9wygprgq | Cisco IOS XR Software Internet Key Exchange Version 2 Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-xr792-bwfvdpy | Cisco IOS XR Software Release 7.9.2 Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-sb-lkm-znerzjbz | Cisco IOS XR Software Secure Boot Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-ncs-hybridacl-crmzffkq | Cisco IOS XR Software Hybrid Access Control List Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-multicast-ermrsvq7 | Cisco IOS XR Software for ASR 9000 Series Routers Layer 3 Multicast Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-modular-acl-u5mepxmm | Cisco IOS XR Software Access Control List Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-ipv4uni-lfm3cfbu | Cisco IOS XR Software for ASR 9000 Series Routers IPv4 Unicast Packets Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-iosxr-priv-esc-gfqjxvof | Cisco IOS XR Software CLI Privilege Escalation Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-iosxr-bgp-dos-o7stephx | Cisco IOS XR Software Border Gateway Protocol Confederation Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-ios-xr-verii-bypass-hhpwqrvx | Cisco IOS XR Software Image Verification Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-tms-xss-vuln-wbtcywxg | Cisco TelePresence Management Suite Cross-Site Scripting Vulnerability | 2025-03-05T16:00:00+00:00 | 2025-03-05T16:44:57+00:00 |
| cisco-sa-secure-dll-injection-aoyzeqsg | Cisco Secure Client for Windows with Secure Firewall Posture Engine DLL Hijacking Vulnerability | 2025-03-05T16:00:00+00:00 | 2025-03-05T16:00:00+00:00 |
| cisco-sa-webex-credexp-xmn85y6 | Cisco Webex for BroadWorks Credential Exposure Vulnerability | 2025-03-04T16:00:00+00:00 | 2025-04-01T13:40:00+00:00 |
| cisco-sa-nxos-ici-dpojbwxk | Cisco Nexus 3000 and 9000 Series Switches Command Injection Vulnerability | 2025-02-26T16:00:00+00:00 | 2025-02-26T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-39855 | osslsigncode has an Integer Underflow in PE Page Hash Calculation Can Cause Out-of-Bounds Read | 2026-04-02T00:00:00.000Z | 2026-04-13T14:40:58.000Z |
| msrc_cve-2026-39853 | osslsigncode has a Stack Buffer Overflow via Unbounded Digest Copy During Signature Verification | 2026-04-02T00:00:00.000Z | 2026-04-13T14:40:53.000Z |
| msrc_cve-2026-39316 | CUPS has a use-after-free in `cupsdDeleteTemporaryPrinters` via dangling subscription pointer | 2026-04-02T00:00:00.000Z | 2026-04-11T01:01:21.000Z |
| msrc_cve-2026-39314 | CUPS has an integer underflow in `_ppdCreateFromIPP` causes root cupsd crash via negative `job-password-supported` | 2026-04-02T00:00:00.000Z | 2026-04-11T01:01:16.000Z |
| msrc_cve-2026-35611 | Addressable has a Regular Expression Denial of Service in Addressable templates | 2026-04-02T00:00:00.000Z | 2026-04-15T01:43:25.000Z |
| msrc_cve-2026-35549 | CVE-2026-35549 | 2026-04-02T00:00:00.000Z | 2026-04-04T01:02:53.000Z |
| msrc_cve-2026-35535 | CVE-2026-35535 | 2026-04-02T00:00:00.000Z | 2026-04-11T01:40:10.000Z |
| msrc_cve-2026-35469 | SpdyStream: DOS on CRI | 2026-04-02T00:00:00.000Z | 2026-04-17T01:01:59.000Z |
| msrc_cve-2026-35414 | CVE-2026-35414 | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:35.000Z |
| msrc_cve-2026-35388 | CVE-2026-35388 | 2026-04-02T00:00:00.000Z | 2026-04-11T01:39:45.000Z |
| msrc_cve-2026-35387 | CVE-2026-35387 | 2026-04-02T00:00:00.000Z | 2026-04-07T01:02:00.000Z |
| msrc_cve-2026-35386 | CVE-2026-35386 | 2026-04-02T00:00:00.000Z | 2026-04-11T01:39:56.000Z |
| msrc_cve-2026-35385 | CVE-2026-35385 | 2026-04-02T00:00:00.000Z | 2026-04-11T01:40:03.000Z |
| msrc_cve-2026-35206 | Helm Chart extraction output directory collapse via `Chart.yaml` name dot-segment | 2026-04-02T00:00:00.000Z | 2026-04-13T14:40:33.000Z |
| msrc_cve-2026-35201 | Discount has an Out-of-bounds Read in rdiscount | 2026-04-02T00:00:00.000Z | 2026-04-17T01:40:21.000Z |
| msrc_cve-2026-35199 | SymCrypt SymCryptXmssSign function - Heap overflow via 64->32-bit leaf-count truncation | 2026-04-02T00:00:00.000Z | 2026-04-17T01:02:11.000Z |
| msrc_cve-2026-35177 | Path traversal issue with zip.vim in Vim | 2026-04-02T00:00:00.000Z | 2026-04-09T01:02:39.000Z |
| msrc_cve-2026-35093 | Libinput: libinput: unauthorized code execution and information disclosure through lua bytecode plugins | 2026-04-02T00:00:00.000Z | 2026-04-15T01:42:54.000Z |
| msrc_cve-2026-34990 | OpenPrinting CUPS: Local print admin token disclosure using temporary printers | 2026-04-02T00:00:00.000Z | 2026-04-09T01:01:45.000Z |
| msrc_cve-2026-34982 | Vim modeline bypass via various options affects Vim < 9.2.0276 | 2026-04-02T00:00:00.000Z | 2026-04-09T01:02:34.000Z |
| msrc_cve-2026-34980 | OpenPrinting CUPS: Shared PostScript queue lets anonymous Print-Job requests reach `lp` code execution over the network | 2026-04-02T00:00:00.000Z | 2026-04-09T01:01:40.000Z |
| msrc_cve-2026-34979 | OpenPrinting CUPS: Heap overflow in `get_options()` | 2026-04-02T00:00:00.000Z | 2026-04-09T01:01:35.000Z |
| msrc_cve-2026-34978 | OpenPrinting CUPS: Path traversal in RSS notify-recipient-uri enables file write outside CacheDir/rss (and clobbering of job.cache) | 2026-04-02T00:00:00.000Z | 2026-04-09T01:01:30.000Z |
| msrc_cve-2026-34933 | Avahi: Reachable assertion in `transport_flags_from_domain()` via conflicting publish flags crashes avahi-daemon | 2026-04-02T00:00:00.000Z | 2026-04-14T14:44:57.000Z |
| msrc_cve-2026-34757 | LIBPNG has a yse-after-free in png_set_PLTE, png_set_tRNS and png_set_hIST leading to corrupted chunk data and potential heap information disclosure | 2026-04-02T00:00:00.000Z | 2026-04-15T01:49:16.000Z |
| msrc_cve-2026-34743 | XZ Utils: Buffer overflow in lzma_index_append() | 2026-04-02T00:00:00.000Z | 2026-04-15T01:42:40.000Z |
| msrc_cve-2026-34601 | xmldom: XML injection via unsafe CDATA serialization allows attacker-controlled markup insertion | 2026-04-02T00:00:00.000Z | 2026-04-15T01:42:18.000Z |
| msrc_cve-2026-34591 | Poetry Has Wheel Path Traversal Which Can Lead to Arbitrary File Write | 2026-04-02T00:00:00.000Z | 2026-04-07T01:02:30.000Z |
| msrc_cve-2026-34481 | Apache Log4j JSON Template Layout: Improper serialization of non-finite floating-point values in JsonTemplateLayout | 2026-04-02T00:00:00.000Z | 2026-04-15T01:05:12.000Z |
| msrc_cve-2026-34480 | Apache Log4j Core: Silent log event loss in XmlLayout due to unescaped XML 1.0 forbidden characters | 2026-04-02T00:00:00.000Z | 2026-04-15T01:05:23.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0317 | Kwetsbaarheden verholpen in Veeam Backup & Replication | 2025-10-15T06:13:55.126030Z | 2025-10-15T06:13:55.126030Z |
| ncsc-2025-0316 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2025-10-14T18:52:06.487996Z | 2025-10-14T18:52:06.487996Z |
| ncsc-2025-0315 | Kwetsbaarheden verholpen in Microsoft Office | 2025-10-14T18:38:05.692251Z | 2025-10-14T18:38:05.692251Z |
| ncsc-2025-0314 | Kwetsbaarheden verholpen in Microsoft System Center | 2025-10-14T18:27:56.075338Z | 2025-10-14T18:27:56.075338Z |
| ncsc-2025-0313 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-10-14T18:21:47.576457Z | 2025-10-14T18:21:47.576457Z |
| ncsc-2025-0312 | Kwetsbaarheden verholpen in Microsoft Exchange | 2025-10-14T18:16:12.274468Z | 2025-10-14T18:16:12.274468Z |
| ncsc-2025-0311 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-10-14T18:13:41.244373Z | 2025-10-14T18:13:41.244373Z |
| ncsc-2025-0310 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-10-14T18:03:45.875739Z | 2025-10-24T11:09:29.790442Z |
| ncsc-2025-0309 | Kwetsbaarheden verholpen in Siemens producten | 2025-10-14T11:22:10.254089Z | 2025-10-14T11:22:10.254089Z |
| ncsc-2025-0308 | Kwetsbaarheden verholpen in Juniper Networks Junos Space | 2025-10-13T08:31:03.235596Z | 2025-10-13T08:31:03.235596Z |
| ncsc-2025-0307 | Kwetsbaarheid verholpen in Oracle E-Business Suite | 2025-10-13T07:52:22.500853Z | 2025-10-13T07:52:22.500853Z |
| ncsc-2025-0306 | Kwetsbaarheden verholpen in GitLab | 2025-10-13T07:25:32.225768Z | 2025-10-13T07:25:32.225768Z |
| ncsc-2025-0305 | Kwetsbaarheden verholpen in Juniper Networks Junos OS | 2025-10-13T07:17:00.445318Z | 2025-10-13T07:17:00.445318Z |
| ncsc-2025-0304 | Kwetsbaarheden verholpen in Redis | 2025-10-08T11:43:37.331971Z | 2025-10-08T11:43:37.331971Z |
| ncsc-2025-0303 | Kwetsbaarheid verholpen in Oracle E-Business Suite | 2025-10-05T09:07:57.122302Z | 2025-10-08T13:03:30.836713Z |
| ncsc-2025-0302 | Kwetsbaarheid verholpen in IBM InfoSphere | 2025-09-30T08:31:27.582962Z | 2025-09-30T08:31:27.582962Z |
| ncsc-2025-0301 | Kwetsbaarheden verholpen in VMware NSX | 2025-09-30T08:29:24.969885Z | 2025-09-30T08:29:24.969885Z |
| ncsc-2025-0300 | Kwetsbaarheden verholpen in GitLab EE & CE | 2025-09-29T09:40:53.033373Z | 2025-09-29T09:40:53.033373Z |
| ncsc-2025-0299 | Kwetsbaarheden verholpen in Zenitel ICX500 en ICX510 Gateway | 2025-09-26T07:00:18.729367Z | 2025-09-26T07:00:18.729367Z |
| ncsc-2025-0298 | Kwetsbaarheden verholpen in Cisco Secure Firewall ASA en FTD | 2025-09-25T18:17:20.040958Z | 2025-09-25T18:17:20.040958Z |
| ncsc-2025-0297 | Kwetsbaarheden verholpen in Cisco IOS en Cisco IOS XE Software | 2025-09-25T09:20:07.678881Z | 2025-09-25T10:42:19.129323Z |
| ncsc-2025-0296 | Kwetsbaarheid verholpen in WatchGuard Fireware OS | 2025-09-19T13:31:26.392203Z | 2025-10-17T08:19:28.145953Z |
| ncsc-2025-0295 | Kwetsbaarheid verholpen in Fortra's GoAnywhere MFT | 2025-09-19T12:26:42.186246Z | 2025-09-19T12:26:42.186246Z |
| ncsc-2025-0294 | Kwetsbaarheden verholpen in HPE Aruba Networking EdgeConnect SD-WAN Gateways | 2025-09-18T12:02:45.239087Z | 2025-09-18T12:02:45.239087Z |
| ncsc-2025-0293 | Kwetsbaarheden verholpen in Spring Framework | 2025-09-16T13:38:44.960337Z | 2025-09-16T13:38:44.960337Z |
| ncsc-2025-0292 | Kwetsbaarheden verholpen in Ivanti producten | 2025-09-16T12:21:50.959347Z | 2025-09-16T12:21:50.959347Z |
| ncsc-2025-0291 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-09-16T11:17:27.365694Z | 2025-09-16T11:17:27.365694Z |
| ncsc-2025-0290 | Kwetsbaarheden verholpen in Apple macOS | 2025-09-16T11:16:20.572265Z | 2025-09-16T11:16:20.572265Z |
| ncsc-2025-0289 | Kwetsbaarheden verholpen in Omnissa Workspace ONE UEM | 2025-09-12T15:23:20.359090Z | 2025-09-12T15:23:20.359090Z |
| ncsc-2025-0288 | Kwetsbaarheden verholpen in GitLab CE/EE | 2025-09-12T14:49:52.285990Z | 2025-09-12T14:49:52.285990Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10298-1 | exiv2-0.28.8-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10297-1 | coredns-1.14.2-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10296-1 | chromedriver-145.0.7632.159-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10295-1 | NetworkManager-applet-strongswan-1.6.4-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:20333-1 | Security update for python-PyPDF2 | 2026-03-06T21:01:39Z | 2026-03-06T21:01:39Z |
| opensuse-su-2026:20330-1 | Security update for python-uv | 2026-03-06T14:43:28Z | 2026-03-06T14:43:28Z |
| opensuse-su-2026:20323-1 | Security update for roundcubemail | 2026-03-05T18:31:03Z | 2026-03-05T18:31:03Z |
| opensuse-su-2026:20329-1 | Security update for gstreamer-rtsp-server, gstreamer-plugins-ugly, gstreamer-plugins-rs, gstreamer-plugins-libav, gstreamer-plugins-good, gstreamer-plugins-base, gstreamer-plugins-bad, gstreamer-docs, gstreamer-devtools, gstreamer | 2026-03-05T18:13:13Z | 2026-03-05T18:13:13Z |
| opensuse-su-2026:20322-1 | Security update for python-joserfc | 2026-03-05T14:32:35Z | 2026-03-05T14:32:35Z |
| opensuse-su-2026:20327-1 | Security update for helm | 2026-03-05T14:27:21Z | 2026-03-05T14:27:21Z |
| opensuse-su-2026:20326-1 | Security update for virtiofsd | 2026-03-05T14:23:19Z | 2026-03-05T14:23:19Z |
| opensuse-ru-2026:20325-1 | Recommended update for shim | 2026-03-05T14:21:04Z | 2026-03-05T14:21:04Z |
| opensuse-su-2026:10294-1 | telemetrygen-0.147.0-1.1 on GA media | 2026-03-05T00:00:00Z | 2026-03-05T00:00:00Z |
| opensuse-su-2026:10293-1 | python311-joserfc-1.6.3-1.1 on GA media | 2026-03-05T00:00:00Z | 2026-03-05T00:00:00Z |
| opensuse-su-2026:10292-1 | python311-Django-5.2.12-1.1 on GA media | 2026-03-05T00:00:00Z | 2026-03-05T00:00:00Z |
| opensuse-su-2026:10291-1 | libsoup-2_4-1-2.74.3-18.1 on GA media | 2026-03-05T00:00:00Z | 2026-03-05T00:00:00Z |
| opensuse-su-2026:10290-1 | heroic-games-launcher-2.20.1-2.1 on GA media | 2026-03-05T00:00:00Z | 2026-03-05T00:00:00Z |
| opensuse-su-2026:10289-1 | freetype2-devel-2.14.2-1.1 on GA media | 2026-03-05T00:00:00Z | 2026-03-05T00:00:00Z |
| opensuse-su-2026:20320-1 | Security update for freerdp2 | 2026-03-04T17:52:31Z | 2026-03-04T17:52:31Z |
| opensuse-su-2026:20312-1 | Security update for libxml2, libxslt | 2026-03-04T10:51:24Z | 2026-03-04T10:51:24Z |
| opensuse-su-2026:10288-1 | libblkid-devel-2.41.3-4.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10287-1 | sdbootutil-1+git20260303.90d816d-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10286-1 | ruby4.0-rubygem-rack-2.2-2.2.22-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10285-1 | python311-pillow-heif-1.3.0-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10284-1 | python311-PyPDF2-2.11.1-5.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10283-1 | python313-Django6-6.0.3-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10282-1 | python311-Django4-4.2.29-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10281-1 | mchange-commons-0.4.0-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10280-1 | incus-6.22-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10279-1 | c3p0-0.12.0-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:6308 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update | 2026-03-31T22:34:16+00:00 | 2026-04-13T20:58:34+00:00 |
| rhsa-2026:6302 | Red Hat Security Advisory: nginx:1.24 security update | 2026-03-31T22:05:06+00:00 | 2026-04-08T14:07:09+00:00 |
| rhsa-2026:6301 | Red Hat Security Advisory: squid security update | 2026-03-31T20:09:21+00:00 | 2026-04-04T00:08:30+00:00 |
| rhsa-2026:6300 | Red Hat Security Advisory: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update | 2026-03-31T19:50:01+00:00 | 2026-04-14T06:25:51+00:00 |
| rhsa-2026:6285 | Red Hat Security Advisory: python3.12 security update | 2026-03-31T17:26:23+00:00 | 2026-04-13T00:22:05+00:00 |
| rhsa-2026:6286 | Red Hat Security Advisory: python3.11 security update | 2026-03-31T17:26:16+00:00 | 2026-04-13T00:22:05+00:00 |
| rhsa-2026:6283 | Red Hat Security Advisory: python3.12 security update | 2026-03-31T17:06:33+00:00 | 2026-04-13T00:22:05+00:00 |
| rhsa-2026:6292 | Red Hat Security Advisory: General availability of the satellite/iop-insights-engine-rhel9 container image | 2026-03-31T16:56:51+00:00 | 2026-04-12T14:09:03+00:00 |
| rhsa-2026:6291 | Red Hat Security Advisory: General availability of the satellite/iop-advisor-backend-rhel9 container image | 2026-03-31T16:56:50+00:00 | 2026-03-31T22:32:22+00:00 |
| rhsa-2026:6288 | Red Hat Security Advisory: General availability of the satellite/iop-remediations-rhel9 container image | 2026-03-31T16:45:29+00:00 | 2026-04-13T16:00:45+00:00 |
| rhsa-2026:6287 | Red Hat Security Advisory: General availability of the satellite/iop-advisor-frontend-rhel9 container image | 2026-03-31T16:45:05+00:00 | 2026-04-12T14:09:03+00:00 |
| rhsa-2026:6281 | Red Hat Security Advisory: python3.11 security update | 2026-03-31T16:39:52+00:00 | 2026-04-13T00:22:05+00:00 |
| rhsa-2026:6278 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2026-03-31T16:23:06+00:00 | 2026-04-14T07:59:34+00:00 |
| rhsa-2026:6277 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Product Security and Bug Fix Update | 2026-03-31T16:12:45+00:00 | 2026-04-14T07:59:33+00:00 |
| rhsa-2026:6268 | Red Hat Security Advisory: 389-ds:1.4 security update | 2026-03-31T15:37:55+00:00 | 2026-03-31T17:31:28+00:00 |
| rhsa-2026:6266 | Red Hat Security Advisory: libxslt security update | 2026-03-31T14:49:35+00:00 | 2026-04-09T20:37:28+00:00 |
| rhsa-2026:6259 | Red Hat Security Advisory: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update | 2026-03-31T13:11:45+00:00 | 2026-04-14T06:25:51+00:00 |
| rhsa-2026:6256 | Red Hat Security Advisory: python3.12 security update | 2026-03-31T09:59:24+00:00 | 2026-04-13T00:22:05+00:00 |
| rhsa-2026:6253 | Red Hat Security Advisory: python3.11 security update | 2026-03-31T09:11:44+00:00 | 2026-04-09T15:17:11+00:00 |
| rhsa-2026:6251 | Red Hat Security Advisory: Red Hat OpenShift API for Data Protection | 2026-03-31T07:30:54+00:00 | 2026-04-14T07:59:33+00:00 |
| rhsa-2026:6234 | Red Hat Security Advisory: nginx security update | 2026-03-31T04:54:48+00:00 | 2026-04-08T14:07:08+00:00 |
| rhsa-2026:6235 | Red Hat Security Advisory: nginx security update | 2026-03-31T04:46:48+00:00 | 2026-04-08T14:07:09+00:00 |
| rhsa-2026:6226 | Red Hat Security Advisory: Multicluster Global Hub 1.6.2 security update | 2026-03-31T02:53:32+00:00 | 2026-04-14T09:46:55+00:00 |
| rhsa-2026:6220 | Red Hat Security Advisory: 389-ds-base security update | 2026-03-31T00:30:42+00:00 | 2026-03-31T17:31:35+00:00 |
| rhsa-2026:6193 | Red Hat Security Advisory: kernel security update | 2026-03-30T16:23:36+00:00 | 2026-04-13T06:22:46+00:00 |
| rhsa-2026:6191 | Red Hat Security Advisory: container-tools:rhel8 security update | 2026-03-30T16:08:31+00:00 | 2026-04-14T07:59:32+00:00 |
| rhsa-2026:6188 | Red Hat Security Advisory: thunderbird security update | 2026-03-30T16:05:18+00:00 | 2026-04-13T15:26:48+00:00 |
| rhsa-2026:6164 | Red Hat Security Advisory: kernel security update | 2026-03-30T15:45:21+00:00 | 2026-04-08T19:37:29+00:00 |
| rhsa-2026:6192 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.27.0 Release. | 2026-03-30T15:41:48+00:00 | 2026-04-14T09:46:55+00:00 |
| rhsa-2026:6182 | Red Hat Security Advisory: nginx security update | 2026-03-30T15:03:16+00:00 | 2026-04-08T14:07:07+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2021-159-01 | IGSS (Interactive Graphical SCADA System) | 2021-06-08T00:00:00.000Z | 2021-06-08T00:00:00.000Z |
| sevd-2021-130-04 | homeLYnk (Wiser For KNX) and spaceLYnk | 2021-05-11T07:30:55.000Z | 2022-11-08T07:30:55.000Z |
| sevd-2021-130-07 | EcoStruxure Geo SCADA Expert | 2021-05-11T00:00:00.000Z | 2021-05-11T00:00:00.000Z |
| sevd-2021-130-05 | Modicon M241 & M251 Logic Controllers | 2021-05-11T00:00:00.000Z | 2021-05-11T00:00:00.000Z |
| sevd-2021-130-01 | Modicon Managed Switch | 2021-05-11T00:00:00.000Z | 2021-05-11T00:00:00.000Z |
| sevd-2021-103-01 | C-Bus Toolkit and C-Gate Server | 2021-04-13T11:17:13.000Z | 2022-11-08T11:17:13.000Z |
| sevd-2021-068-02 | PowerLogic ION7400 / PM8000 / ION9000 Power Meters | 2021-03-09T00:00:00.000Z | 2021-03-09T00:00:00.000Z |
| sevd-2021-068-01 | IGSS (Interactive Graphical SCADA System) | 2021-03-09T00:00:00.000Z | 2021-03-09T00:00:00.000Z |
| sevd-2021-040-01 | PowerLogic Power Metering Products | 2021-02-08T00:00:00.000Z | 2021-02-08T00:00:00.000Z |
| sevd-2021-012-02 | EcoStruxure Power Build - Rapsody | 2021-01-12T08:32:35.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2020-353-02 | Treck HTTP Server Vulnerability on TM3 Bus Coupler Modules (V2.0) | 2020-12-18T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2020-343-05 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and Associated Communication Modules | 2020-12-08T21:04:43.000Z | 2022-09-13T20:04:43.000Z |
| sevd-2020-343-06 | Web Server on Modicon M340, Legacy Offers Modicon Quantum Modicon Premium and associated Communication Modules | 2020-12-08T09:08:01.000Z | 2020-12-08T09:08:01.000Z |
| sevd-2020-343-07 | SNMP Service on Modicon M340 and Associated Communication Modules | 2020-12-08T05:49:51.000Z | 2022-09-13T05:49:51.000Z |
| sevd-2020-343-09 | Modicon M258 Logic Controllers and SoMachine/ SoMachine Motion Software | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-343-08 | Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-343-04 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules | 2020-12-08T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2020-343-03 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (V2.0) | 2020-12-08T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2020-343-02 | EcoStruxure Geo SCADA Expert | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-343-01 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and RemoteConnect™ | 2020-12-08T00:00:00.000Z | 2021-07-13T00:00:00.000Z |
| sevd-2020-315-07 | PLC Simulator on EcoStruxure™ Control Expert and Process Expert | 2020-11-10T15:07:11.000Z | 2023-03-14T15:07:11.000Z |
| sevd-2020-315-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-11-10T12:05:04.000Z | 2023-02-14T12:05:00.000Z |
| sevd-2020-315-06 | Easergy T300 | 2020-11-10T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-315-05 | Modicon M100/M200/M221 Programmable Logic Controller | 2020-11-10T00:00:00.000Z | 2021-01-12T00:00:00.000Z |
| sevd-2020-315-04 | EcoStruxure Building Operation (EBO) | 2020-11-10T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| sevd-2020-315-03 | Interactive Graphical SCADA System (IGSS) | 2020-11-10T00:00:00.000Z | 2021-04-15T00:00:00.000Z |
| sevd-2020-315-02 | EcoStruxure™ Operator Terminal Expert (Vijeo XD), Pro-face BLUE and WinGP runtime | 2020-11-09T00:00:00.000Z | 2021-01-11T00:00:00.000Z |
| sevd-2020-287-04 | EcoStruxure™ and SmartStruxure™ Power Monitoring and SCADA Software | 2020-10-13T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-287-03 | Smartlink, PowerTag, and Wiser Series Gateways | 2020-10-13T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-287-02 | Wibu-Systems CodeMeter Vulnerabilities | 2020-10-13T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-943925 | SSA-943925: Multiple Vulnerabilities in SINEC NMS before V2.0 SP1 | 2024-02-13T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-871717 | SSA-871717: Multiple Vulnerabilities in Polarion ALM | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-806742 | SSA-806742: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-797296 | SSA-797296: XT File Parsing Vulnerability in Parasolid | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-753746 | SSA-753746: Denial of Service Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products | 2024-02-13T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-716164 | SSA-716164: Multiple Vulnerabilities in Scalance W1750D | 2024-02-13T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-665034 | SSA-665034: Vulnerability in Nozomi Guardian/CMC before 23.3.0 on RUGGEDCOM APE1808 devices | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-647068 | SSA-647068: Ripple20 in SIMATIC RTLS Gateways | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-602936 | SSA-602936: Multiple Vulnerabilities in SCALANCE SC-600 Family before V3.1 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-580228 | SSA-580228: Use of Hard-Coded Credentials Vulnerability in Location Intelligence before V4.3 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-543502 | SSA-543502: Local Privilege Escalation Vulnerability in Unicam FX | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-516818 | SSA-516818: TCP Sequence Number Validation Vulnerability in the TCP/IP Stack of CP343-1 Devices | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-108696 | SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-017796 | SSA-017796: Multiple File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-000072 | SSA-000072: Multiple File Parsing Vulnerabilities in Simcenter Femap | 2024-02-13T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-794653 | SSA-794653: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-786191 | SSA-786191: Local Privilege Escalation Vulnerability in Spectrum Power 7 | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-777015 | SSA-777015: Multiple Vulnerabilities in SIMATIC CN 4100 before V2.7 | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-702935 | SSA-702935: Redfish Server Vulnerability in maxView Storage Manager | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-589891 | SSA-589891: Multiple PAR File Parsing Vulnerabilities in Solid Edge | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-583634 | SSA-583634: Command Injection Vulnerability in the CPCI85 Firmware of SICAM A8000 Devices | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-892915 | SSA-892915: Multiple Denial of Service Vulnerabilities in the Webserver of Industrial Products | 2023-12-12T00:00:00Z | 2023-12-12T00:00:00Z |
| ssa-887801 | SSA-887801: Information Disclosure Vulnerability in SIMATIC STEP 7 (TIA Portal) | 2023-12-12T00:00:00Z | 2023-12-12T00:00:00Z |
| ssa-693975 | SSA-693975: Denial-of-Service Vulnerability in the Web Server of Industrial Products | 2023-12-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-592380 | SSA-592380: Denial of Service Vulnerability in SIMATIC S7-1500 CPUs and related products | 2023-12-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-480095 | SSA-480095: Vulnerabilities in the Web Interface of SICAM Q100 Devices before V2.60 | 2023-12-12T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-398330 | SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP >= V3.1.0 and < V3.1.5 | 2023-12-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-280603 | SSA-280603: Denial of Service Vulnerability in SINUMERIK ONE and SINUMERIK MC | 2023-12-12T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-180704 | SSA-180704: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.0 | 2023-12-12T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-118850 | SSA-118850: Denial of Service Vulnerability in the OPC UA Implementation in SINUMERIK ONE and SINUMERIK MC | 2023-12-12T00:00:00Z | 2023-12-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1218-1 | Security update for python-requests | 2026-04-08T14:39:49Z | 2026-04-08T14:39:49Z |
| suse-su-2026:21036-1 | Security update for python-requests | 2026-04-08T14:30:11Z | 2026-04-08T14:30:11Z |
| suse-su-2026:21035-1 | Security update for libtpms | 2026-04-08T14:28:41Z | 2026-04-08T14:28:41Z |
| suse-su-2026:21064-1 | Security update for libtpms | 2026-04-08T14:17:58Z | 2026-04-08T14:17:58Z |
| suse-su-2026:21063-1 | Security update for python-requests | 2026-04-08T14:11:12Z | 2026-04-08T14:11:12Z |
| suse-su-2026:1217-1 | Security update for freerdp | 2026-04-08T12:28:33Z | 2026-04-08T12:28:33Z |
| suse-su-2026:1216-1 | Security update for openssl-1_1 | 2026-04-08T12:28:22Z | 2026-04-08T12:28:22Z |
| suse-su-2026:1215-1 | Security update for openssl-3 | 2026-04-08T12:27:58Z | 2026-04-08T12:27:58Z |
| suse-su-2026:1214-1 | Security update for openssl-3 | 2026-04-08T12:27:45Z | 2026-04-08T12:27:45Z |
| suse-su-2026:1213-1 | Security update for openssl-3 | 2026-04-08T12:27:10Z | 2026-04-08T12:27:10Z |
| suse-su-2026:1051-1 | Security update for vim | 2026-04-08T11:40:57Z | 2026-04-08T11:40:57Z |
| suse-su-2026:1212-1 | Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5) | 2026-04-08T10:04:46Z | 2026-04-08T10:04:46Z |
| suse-su-2026:1209-1 | Security update for bind | 2026-04-08T07:12:41Z | 2026-04-08T07:12:41Z |
| suse-su-2026:1208-1 | Security update for ignition | 2026-04-08T07:12:23Z | 2026-04-08T07:12:23Z |
| suse-su-2026:21062-1 | Security update for expat | 2026-04-07T18:52:31Z | 2026-04-07T18:52:31Z |
| suse-su-2026:21003-1 | Security update for systemd | 2026-04-07T15:06:51Z | 2026-04-07T15:06:51Z |
| suse-su-2026:21002-1 | Security update for tar | 2026-04-07T14:59:15Z | 2026-04-07T14:59:15Z |
| suse-su-2026:1095-1 | Security update for vim | 2026-04-07T14:35:54Z | 2026-04-07T14:35:54Z |
| suse-su-2026:0910-1 | Security update for vim | 2026-04-07T14:35:08Z | 2026-04-07T14:35:08Z |
| suse-su-2026:21001-1 | Security update for libtasn1 | 2026-04-07T14:32:32Z | 2026-04-07T14:32:32Z |
| suse-su-2026:1206-1 | Security update for python | 2026-04-07T14:18:48Z | 2026-04-07T14:18:48Z |
| suse-su-2026:1203-1 | Security update for ImageMagick | 2026-04-07T12:24:55Z | 2026-04-07T12:24:55Z |
| suse-su-2026:1202-1 | Security update for ImageMagick | 2026-04-07T12:24:42Z | 2026-04-07T12:24:42Z |
| suse-su-2026:1201-1 | Security update for ImageMagick | 2026-04-07T12:24:24Z | 2026-04-07T12:24:24Z |
| suse-su-2026:21000-1 | Security update for libpng16 | 2026-04-07T11:57:32Z | 2026-04-07T11:57:32Z |
| suse-su-2026:1200-1 | Security update for ignition | 2026-04-07T11:50:19Z | 2026-04-07T11:50:19Z |
| suse-su-2026:20969-1 | Security update for polkit | 2026-04-07T11:50:03Z | 2026-04-07T11:50:03Z |
| suse-su-2026:21032-1 | Security update for polkit | 2026-04-07T11:36:08Z | 2026-04-07T11:36:08Z |
| suse-su-2026:21031-1 | Security update for expat | 2026-04-07T11:09:30Z | 2026-04-07T11:09:30Z |
| suse-su-2026:1199-1 | Security update for python-PyJWT | 2026-04-07T10:25:37Z | 2026-04-07T10:25:37Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:3338 | Important: firefox security update | 2026-02-25T00:00:00Z | 2026-03-02T12:54:29Z |
| alsa-2026:3337 | Important: podman security update | 2026-02-25T00:00:00Z | 2026-02-26T10:23:45Z |
| alsa-2026:3336 | Important: podman security update | 2026-02-25T00:00:00Z | 2026-02-26T13:31:46Z |
| alsa-2026:3334 | Important: freerdp security update | 2026-02-25T00:00:00Z | 2026-02-26T09:39:13Z |
| alsa-2026:3298 | Important: buildah security update | 2026-02-25T00:00:00Z | 2026-02-26T10:25:19Z |
| alsa-2026:3297 | Important: buildah security update | 2026-02-25T00:00:00Z | 2026-02-26T10:26:55Z |
| alsa-2026:3291 | Important: runc security update | 2026-02-25T00:00:00Z | 2026-02-26T10:27:56Z |
| alsa-2026:3275 | Moderate: kernel security update | 2026-02-25T00:00:00Z | 2026-03-02T13:07:09Z |
| alsa-2026:3208 | Moderate: 389-ds-base security update | 2026-02-24T00:00:00Z | 2026-02-26T10:30:07Z |
| alsa-2026:3189 | Moderate: 389-ds-base security update | 2026-02-24T00:00:00Z | 2026-02-26T10:31:32Z |
| alsa-2026:3188 | Important: grafana security update | 2026-02-24T00:00:00Z | 2026-02-24T17:11:47Z |
| alsa-2026:3187 | Important: grafana-pcp security update | 2026-02-24T00:00:00Z | 2026-02-24T17:14:01Z |
| alsa-2026:3110 | Important: kernel-rt security update | 2026-02-23T00:00:00Z | 2026-02-24T13:03:08Z |
| alsa-2026:3095 | Important: protobuf security update | 2026-02-23T00:00:00Z | 2026-02-24T00:13:34Z |
| alsa-2026:3094 | Important: protobuf security update | 2026-02-23T00:00:00Z | 2026-02-24T00:07:41Z |
| alsa-2026:3092 | Important: golang-github-openprinting-ipp-usb security update | 2026-02-23T00:00:00Z | 2026-02-26T10:33:21Z |
| alsa-2026:3083 | Important: kernel security update | 2026-02-23T00:00:00Z | 2026-02-24T12:59:25Z |
| alsa-2026:3068 | Important: freerdp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:34:44Z |
| alsa-2026:3067 | Important: freerdp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:36:11Z |
| alsa-2026:3066 | Moderate: kernel security update | 2026-02-23T00:00:00Z | 2026-02-26T10:43:00Z |
| alsa-2026:3042 | Moderate: openssl security update | 2026-02-23T00:00:00Z | 2026-02-23T09:07:14Z |
| alsa-2026:3040 | Important: grafana-pcp security update | 2026-02-23T00:00:00Z | 2026-03-10T20:11:50Z |
| alsa-2026:3035 | Important: grafana-pcp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:48:18Z |
| alsa-2026:3034 | Important: munge security update | 2026-02-23T00:00:00Z | 2026-02-26T10:49:31Z |
| alsa-2026:3033 | Important: munge security update | 2026-02-23T00:00:00Z | 2026-02-26T10:51:19Z |
| alsa-2026:3032 | Important: munge security update | 2026-02-23T00:00:00Z | 2026-02-23T14:44:19Z |
| alsa-2026:3031 | Important: libpng15 security update | 2026-02-23T00:00:00Z | 2026-02-26T10:52:26Z |
| alsa-2026:2920 | Important: grafana security update | 2026-02-18T00:00:00Z | 2026-02-19T10:58:19Z |
| alsa-2026:2914 | Important: grafana security update | 2026-02-18T00:00:00Z | 2026-02-19T18:04:08Z |
| alsa-2026:2821 | Moderate: kernel-rt security update | 2026-02-17T00:00:00Z | 2026-02-18T13:25:58Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-357 | Segv on unknown address in pcpp::Packet::computeCalculateFields | 2025-05-12T00:13:14.901744Z | 2025-09-10T14:24:05.862334Z |
| osv-2025-354 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.statement | 2025-05-11T00:17:30.348393Z | 2025-05-11T00:17:30.348809Z |
| osv-2025-352 | Use-of-uninitialized-value in JS_FreeRuntime | 2025-05-10T00:17:01.243609Z | 2025-05-10T00:17:01.243981Z |
| osv-2025-346 | Heap-buffer-overflow in JS_CallInternal | 2025-05-09T00:16:48.213077Z | 2025-05-09T00:16:48.213425Z |
| osv-2025-326 | Heap-use-after-free in __JS_FreeValueRT | 2025-05-05T00:17:02.285374Z | 2025-05-05T00:17:02.285666Z |
| osv-2025-324 | Index-out-of-bounds in dwg_decode_eed | 2025-05-05T00:11:42.580777Z | 2025-05-05T00:11:42.581345Z |
| osv-2025-323 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-05-04T00:19:17.568436Z | 2025-05-04T00:19:17.568755Z |
| osv-2025-321 | Use-of-uninitialized-value in JS_DefineProperty | 2025-05-04T00:16:03.249115Z | 2025-05-04T00:16:03.249427Z |
| osv-2025-312 | Heap-buffer-overflow in ZSTD_decompressMultiFrame | 2025-05-02T00:14:14.459388Z | 2026-03-27T14:26:26.446866Z |
| osv-2025-300 | Negative-size-param in recurse_update_offsets | 2025-04-26T00:15:04.274172Z | 2025-04-26T00:15:04.274471Z |
| osv-2025-298 | Heap-buffer-overflow in i18n::phonenumbers::UnicodeText::const_iterator::operator-- | 2025-04-26T00:02:46.771719Z | 2025-10-11T14:20:31.062038Z |
| osv-2025-291 | Use-of-uninitialized-value in Poco::Net::NTLMCredentials::parseChallengeMessage | 2025-04-20T00:07:34.286645Z | 2025-04-20T00:07:34.287298Z |
| osv-2025-290 | Heap-buffer-overflow in pcpp::TelnetLayer::toString | 2025-04-19T00:05:45.140280Z | 2025-09-25T14:31:44.695948Z |
| osv-2025-289 | Stack-buffer-overflow in ot::Cli::Utils::OutputLine | 2025-04-19T00:05:17.593162Z | 2025-04-19T00:05:17.593788Z |
| osv-2025-280 | Heap-buffer-overflow in Assimp::SceneCombiner::CopyScene | 2025-04-15T00:04:03.423453Z | 2026-01-25T14:19:05.873424Z |
| osv-2025-275 | UNKNOWN READ in void std::__1::vector<unsigned char, std::__1::allocator<unsigned char>>::__cons | 2025-04-14T00:02:37.519708Z | 2025-04-17T14:43:50.559313Z |
| osv-2025-271 | Use-of-uninitialized-value in luaS_new | 2025-04-11T00:04:20.869490Z | 2025-04-11T00:04:20.869967Z |
| osv-2025-267 | Stack-buffer-overflow in snap_usedef | 2025-04-08T00:17:16.034122Z | 2025-07-23T14:22:40.655455Z |
| osv-2025-266 | Heap-buffer-overflow in lj_buf_ruleb128 | 2025-04-08T00:17:06.279554Z | 2026-03-05T14:36:27.176471Z |
| osv-2025-264 | Security exception in org.joni.Parser.parseCharClass | 2025-04-08T00:00:08.174777Z | 2025-04-08T00:00:08.175341Z |
| osv-2025-262 | UNKNOWN WRITE in _lou_handlePassVariableAction | 2025-04-07T00:02:21.621602Z | 2025-09-25T14:33:42.888095Z |
| osv-2025-260 | Heap-buffer-overflow in bfd_getb16 | 2025-04-06T00:00:51.202273Z | 2025-04-06T00:00:51.202704Z |
| osv-2025-258 | Global-buffer-overflow in parseExtraField | 2025-04-05T00:05:58.760780Z | 2025-04-05T00:05:58.761154Z |
| osv-2025-256 | Global-buffer-overflow in QByteArray::QByteArray | 2025-04-05T00:02:36.742745Z | 2025-04-05T00:02:36.743233Z |
| osv-2025-253 | Security exception in org.apache.lucene.analysis.ckb.SoraniNormalizer.normalize | 2025-04-03T00:17:24.000398Z | 2026-02-26T15:05:21.477837Z |
| osv-2025-251 | Heap-buffer-overflow in icu_78::RegexMatcher::MatchChunkAt | 2025-04-02T00:16:00.337471Z | 2025-04-02T00:16:00.337850Z |
| osv-2025-249 | Heap-use-after-free in lj_strfmt_pushvf | 2025-04-02T00:09:53.120387Z | 2025-07-23T14:23:01.826780Z |
| osv-2025-248 | Heap-buffer-overflow in cli_bm_addpatt | 2025-04-02T00:00:13.427589Z | 2025-04-02T00:00:13.428120Z |
| osv-2025-240 | Security exception in com.powsybl.commons.xml.XmlUtil.lambda$skipSubElements$0 | 2025-03-28T00:05:50.145107Z | 2025-03-30T14:32:19.516483Z |
| osv-2025-230 | Heap-buffer-overflow in wasm_loader_prepare_bytecode | 2025-03-22T00:05:22.916187Z | 2025-03-22T00:05:22.916485Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0044 | Four unique double-free vulnerabilities triggered via safe APIs | 2025-06-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0041 | matrix-sdk-crypto vulnerable to encrypted event sender spoofing by homeserver administrator | 2025-06-11T12:00:00Z | 2025-06-12T09:17:43Z |
| rustsec-2025-0138 | --allow-read / --allow-write permission bypass in `node:sqlite` | 2025-06-03T12:00:00Z | 2025-12-29T10:04:21Z |
| rustsec-2025-0062 | Heap Buffer Overflow in the DrainCol Destructor | 2025-05-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0037 | Pingora Request Smuggling and Cache Poisoning | 2025-05-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0036 | surf is unmaintained | 2025-05-17T12:00:00Z | 2025-05-17T13:43:35Z |
| rustsec-2025-0113 | soundness issue and unmaintained | 2025-05-06T12:00:00Z | 2025-11-04T06:10:22Z |
| rustsec-2025-0064 | soundness issue and unmaintained | 2025-05-06T12:00:00Z | 2025-09-11T07:03:09Z |
| rustsec-2025-0039 | Lack of sufficient checks in public API | 2025-05-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0034 | soundness issue and unmaintained | 2025-05-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0027 | Panic in mp3-metadata due to the lack of bounds checking | 2025-04-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0025 | rustc-serialize is unmaintained | 2025-04-28T12:00:00Z | 2025-04-28T13:38:14Z |
| rustsec-2025-0063 | Possible unsound public API | 2025-04-25T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0038 | Out of bounds access in public safe API | 2025-04-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0031 | Unsound public API in unmaintained crate | 2025-04-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0035 | Multiple soundness issues in `macroquad` | 2025-04-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0024 | crossbeam-channel: double free on Drop | 2025-04-08T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0023 | Broadcast channel calls clone in parallel, but does not require `Sync` | 2025-04-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0022 | Use-After-Free in `Md::fetch` and `Cipher::fetch` | 2025-04-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0021 | SHA-1 collision attacks are not detected | 2025-04-03T12:00:00Z | 2025-04-08T07:10:04Z |
| rustsec-2025-0020 | Risk of buffer overflow in `PyString::from_object` | 2025-04-01T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0033 | Public API without sufficient bounds checking | 2025-03-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0032 | Safe API can cause heap-buffer-overflow | 2025-03-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0019 | `array-init-cursor` in version 0.2.0 and below is unsound when used with types that implement `Drop` | 2025-03-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0018 | Potential out-of-bounds read with a malformed ELF file and the HashTable API. | 2025-03-26T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0017 | The `trust-dns` project has been rebranded to `hickory-dns` | 2025-03-23T12:00:00Z | 2025-03-23T07:00:21Z |
| rustsec-2025-0016 | Use after free in `Parc` and `Prc` due to missing lifetime constraints | 2025-03-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0149 | World Writable Directory in /var/log/below Allows Local Privilege Escalation | 2025-03-12T12:00:00Z | 2026-02-08T07:26:28Z |
| rustsec-2025-0156 | `tree-sitter-pkl` was removed from crates.io for malicious code | 2025-03-10T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0014 | humantime is unmaintained | 2025-03-08T12:00:00Z | 2025-03-13T00:41:50Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-discourse-2026-33428 | Discourse Allows Unauthorized Access to Deleted Posts Index via Group Membership | 2026-03-27T07:11:24.928Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33427 | Discourse Authorization Page Displays Unvalidated Redirect Domain | 2026-03-27T07:11:21.636Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33426 | Discourse users can edit or synonymize hidden tags they can't see | 2026-03-27T07:11:18.684Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33425 | Discourse has inferable private group membership or existence via exclude_groups parameter | 2026-03-27T07:11:15.979Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33424 | PM access granted through invites after access revocation | 2026-03-27T07:11:13.161Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33423 | Discourse staff can modify any user's group notification level | 2026-03-27T07:11:10.696Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33422 | Discourse exposes ip_address of flagged user | 2026-03-27T07:11:08.096Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33411 | Discourse's solved topic stream has potential stored XSS in topic title | 2026-03-27T07:11:05.061Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33410 | Discourse hardens chat DM channel creation and expansion | 2026-03-27T07:11:02.112Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33408 | Discourse has Improper Authorization in "Post Edits" Report For Moderators | 2026-03-27T07:10:59.380Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33395 | Discourse has stored click‑based XSS via Graphviz SVG javascript: links | 2026-03-27T07:10:56.479Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33394 | Discourse leaks PM post edits to moderators | 2026-03-27T07:10:53.768Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33393 | Discourse fixes loose hostname matching in spam host allowlist | 2026-03-27T07:10:50.748Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33355 | Discourse filters whisper posts from private-posts feed | 2026-03-27T07:10:48.005Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33291 | Discourse user can create Zendesk tickets even when it does not have access to topic | 2026-03-27T07:10:45.396Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33251 | Discourse has a Hidden Solved topics permission bypass | 2026-03-27T07:10:42.800Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-32114 | Discourse's unscoped status lookups leak restricted metadata | 2026-03-27T07:10:39.880Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-32099 | Discourse prevents hidden profile data leak via user onebox | 2026-03-27T07:10:36.934Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-31869 | Discourse: Composer mentions endpoint leaks hidden group membership through PM `allowed_names` check | 2026-03-27T07:10:33.910Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-31805 | Discourse has a poll authorization bypass via post_id array parameter | 2026-03-27T07:10:31.444Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-30891 | Discourse hasUnauthorized Exposure of Private User Action Types | 2026-03-27T07:10:28.864Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-30889 | Discourse has Unauthorized Post Data Exposure in discourse-user-notes | 2026-03-27T07:10:26.417Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-30888 | Discourse has moderator privilege escalation via arbitrary post_id in suspend/silence endpoint | 2026-03-27T07:10:23.855Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-29072 | Discourse missing permission check for policy creation in discourse-policy | 2026-03-27T07:10:21.008Z | 2026-03-31T21:15:21.591Z |
| bit-discourse-2026-28282 | Discourse vulnerable to group membership addition permission bypass via discourse-policy plugin | 2026-03-27T07:10:17.839Z | 2026-03-31T21:15:21.591Z |
| bit-nginx-2026-32647 | NGINX ngx_http_mp4_module vulnerability | 2026-03-27T07:10:16.616Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-28755 | NGINX ngx_stream_ssl_module vulnerability | 2026-03-27T07:10:13.976Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-28753 | NGINX ngx_mail_proxy_module vulnerability | 2026-03-27T07:10:10.953Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-27784 | NGINX ngx_http_mp4_module vulnerability | 2026-03-27T07:10:08.052Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27936 | Discourse discloses restricted post-action counts to non-privileged users | 2026-03-27T07:10:06.332Z | 2026-03-31T21:15:21.591Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ls00044 | Security fixes for CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-54410, CVE-2025-58181, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.3.2-r4, 2.3.2-r5, 2.4.4-r2, 2.5.0-r0, 2.5.0-r1 | 2026-04-01T09:38:02.432087Z | 2026-03-20T11:37:58Z |
| cleanstart-2026-hx97842 | Security fixes for CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-54410, CVE-2025-58181, CVE-2025-58190, CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.2.2-r6, 2.3.2-r4, 2.4.4-r2, 2.5.0-r0, 2.5.0-r1 | 2026-04-01T09:37:55.704076Z | 2026-03-20T11:37:58Z |
| cleanstart-2026-gu55430 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-9h8m-3fm2-qjrq, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.9.4-r0, 1.9.4-r1, 1.9.4-r2, 1.9.4-r3 | 2026-04-01T09:37:53.639715Z | 2026-03-20T04:52:14Z |
| cleanstart-2026-ms81166 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.4.4-r2, 2.4.4-r4, 2.5.0-r0, 2.5.0-r1 | 2026-04-01T09:37:27.717828Z | 2026-03-20T11:37:58Z |
| cleanstart-2026-ir69938 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.4.4-r2, 2.5.0-r0, 2.5.1-r0, 2.5.1-r1 | 2026-04-01T09:37:08.257134Z | 2026-03-20T11:37:58Z |
| cleanstart-2026-lb23787 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x, ghsa-p436-gjf2-799p applied in versions: 2.13.4-r0, 2.13.4-r1, 2.13.4-r2, 2.13.5-r0, 2.13.5-r1 | 2026-04-01T09:37:01.194631Z | 2026-03-22T07:08:40Z |
| cleanstart-2026-pe63912 | Security fixes for CVE-2021-3538, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.15.0-r0, 2.15.0-r1 | 2026-04-01T09:37:00.583811Z | 2026-03-22T07:02:21Z |
| cleanstart-2026-mt27167 | Security fixes for CVE-2021-3538, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.14.3-r0, 2.14.3-r1 | 2026-04-01T09:36:58.329684Z | 2026-03-22T07:06:00Z |
| cleanstart-2026-os42112 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x, ghsa-p436-gjf2-799p applied in versions: 2.12.4-r0, 2.12.4-r1, 2.13.4-r0, 2.13.4-r1, 2.13.4-r2 | 2026-04-01T09:36:49.810788Z | 2026-03-22T07:12:11Z |
| cleanstart-2026-ee52954 | Security fixes for CVE-2021-3538, CVE-2025-22871, CVE-2025-29923, CVE-2025-4673, CVE-2025-47907, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-hcg3-q754-cr77, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw applied in versions: 3.0.0.1-r2, 3.0.0.1-r3, 3.0.0.1-r4 | 2026-04-01T09:36:34.270182Z | 2026-03-22T07:36:37Z |
| cleanstart-2026-kw24478 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.15.0-r0, 2.15.0-r1 | 2026-04-01T09:36:08.569651Z | 2026-03-22T07:20:42Z |
| cleanstart-2026-qy63788 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.14.3-r0, 2.14.3-r1 | 2026-04-01T09:36:08.453160Z | 2026-03-22T07:24:09Z |
| cleanstart-2026-ap81168 | Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.13.4-r0, 2.13.5-r0, 2.13.5-r1 | 2026-04-01T09:35:54.838524Z | 2026-03-22T07:27:04Z |
| cleanstart-2026-jb52011 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-p77j-4mvh-x3m3 applied in versions: 1.11.1-r1, 1.11.1-r2 | 2026-04-01T09:35:29.036304Z | 2026-03-22T07:44:23Z |
| cleanstart-2026-da83816 | Security fixes for CVE-2026-33186, ghsa-p77j-4mvh-x3m3 applied in versions: 1.14.0-r0 | 2026-04-01T09:35:14.283813Z | 2026-03-22T07:39:37Z |
| cleanstart-2026-jj84567 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.6.4-r3 | 2026-04-01T09:35:06.408771Z | 2026-03-22T07:50:03Z |
| cleanstart-2026-fl27179 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.5.2-r3 | 2026-04-01T09:34:50.735567Z | 2026-03-22T07:53:14Z |
| cleanstart-2026-jk59495 | Security fixes for CVE-2025-0913, CVE-2025-4673, CVE-2025-47907, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-9h8m-3fm2-qjrq, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 3.3.2-r0, 3.4.2-r0, 3.4.2-r3, 3.4.2-r4 | 2026-04-01T09:34:49.510720Z | 2026-03-22T18:12:16Z |
| cleanstart-2026-kk98885 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-9h8m-3fm2-qjrq applied in versions: 2.18.0-r0 | 2026-04-01T09:34:13.357278Z | 2026-03-23T06:16:30Z |
| cleanstart-2026-bc17682 | Security fixes for CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.4.4-r0, 2.4.4-r1 | 2026-04-01T09:33:57.594313Z | 2026-03-23T06:28:34Z |
| cleanstart-2026-nv36169 | Security fixes for CVE-2025-61732, CVE-2025-66564, CVE-2025-68121, CVE-2026-24686, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, ghsa-fcv2-xgw5-pqxf applied in versions: 0.7.29-r1, 0.7.29-r2 | 2026-04-01T09:33:48.680625Z | 2026-03-23T06:33:00Z |
| cleanstart-2026-gq14179 | Security fixes for CVE-2025-11143, CVE-2025-53864, CVE-2025-55163, CVE-2025-58056, CVE-2025-58057, CVE-2025-67735, CVE-2025-68161, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.46.1-r3, 0.46.1-r4 | 2026-04-01T09:33:44.585498Z | 2026-03-23T06:45:45Z |
| cleanstart-2026-lp76319 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.21.2-r0, 1.21.2-r1 | 2026-04-01T09:33:36.179758Z | 2026-03-23T06:57:40Z |
| cleanstart-2026-qj92322 | Security fixes for CVE-2025-15558, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.0.2-r0, 2.0.2-r1 | 2026-04-01T09:33:14.887013Z | 2026-03-23T06:58:42Z |
| cleanstart-2026-ps51260 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.2.2-r0, 1.2.2-r1 | 2026-04-01T09:33:07.208099Z | 2026-03-23T07:02:53Z |
| cleanstart-2026-gi67088 | Security fixes for CVE-2020-8559, CVE-2020-8565, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, ghsa-33c5-9fx5-fvjm, ghsa-8cfg-vx93-jvxw applied in versions: 2.12.0-r0, 2.12.0-r1 | 2026-04-01T09:33:02.208236Z | 2026-03-23T07:05:35Z |
| cleanstart-2026-on62368 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10.0-r0, 0.10.0-r1, 0.11.0-r0, 1.13.1-r0 | 2026-04-01T09:32:49.419019Z | 2026-03-23T07:09:26Z |
| cleanstart-2026-nv78596 | Security fixes for CVE-2022-29526, CVE-2025-47907, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-4f99-4q7p-p3gh applied in versions: 0.10-r0, 0.11-r0, 0.11-r2, 0.11-r3, 0.11-r4 | 2026-04-01T09:32:41.363681Z | 2026-03-23T07:34:57Z |
| cleanstart-2026-jm96857 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.16.4-r0, 2.16.4-r1 | 2026-04-01T09:32:39.352692Z | 2026-03-23T07:04:06Z |
| cleanstart-2026-cl65461 | Security fixes for CVE-2022-29526, CVE-2025-47907, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10-r0, 0.11-r0, 0.8-r0, 0.8-r1, 0.8-r2, 0.9-r0 | 2026-04-01T09:31:56.332937Z | 2026-03-23T07:35:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2024-011 | 2024-02-28T18:14:40.000Z | 2025-02-20T19:10:16.000Z | |
| drupal-contrib-2024-010 | 2024-02-21T16:58:11.000Z | 2025-02-20T18:36:16.000Z | |
| drupal-contrib-2024-009 | 2024-02-14T19:31:10.000Z | 2025-02-20T18:37:01.000Z | |
| drupal-contrib-2024-008 | 2024-02-07T17:56:55.000Z | 2025-02-20T18:37:40.000Z | |
| drupal-contrib-2024-007 | 2024-01-31T17:22:36.000Z | 2025-02-20T18:38:01.000Z | |
| drupal-contrib-2024-006 | 2024-01-24T15:54:55.000Z | 2025-02-20T18:38:32.000Z | |
| drupal-contrib-2024-005 | 2024-01-24T15:47:36.000Z | 2025-02-20T18:38:57.000Z | |
| drupal-contrib-2024-004 | 2024-01-24T15:45:49.000Z | 2025-02-20T18:39:20.000Z | |
| drupal-contrib-2024-003 | 2024-01-24T15:42:46.000Z | 2025-02-20T18:39:54.000Z | |
| drupal-contrib-2024-002 | 2024-01-10T18:00:05.000Z | 2025-02-20T18:40:20.000Z | |
| drupal-contrib-2023-055 | 2023-12-20T17:02:51.000Z | 2023-12-20T17:53:15.000Z | |
| drupal-contrib-2023-054 | 2023-12-06T16:16:28.000Z | 2023-12-07T02:47:34.000Z | |
| drupal-contrib-2023-053 | 2023-11-29T15:27:05.000Z | 2023-11-29T18:08:04.000Z | |
| drupal-contrib-2023-052 | 2023-11-15T14:24:12.000Z | 2023-11-15T17:19:15.000Z | |
| drupal-contrib-2023-051 | 2023-11-08T15:33:12.000Z | 2023-11-08T17:10:24.000Z | |
| drupal-contrib-2023-050 | 2023-11-08T15:30:45.000Z | 2023-11-08T17:10:18.000Z | |
| drupal-contrib-2023-049 | 2023-11-01T16:56:37.000Z | 2023-11-06T14:25:23.000Z | |
| drupal-contrib-2023-048 | 2023-10-04T15:41:34.000Z | 2023-10-04T16:35:18.000Z | |
| drupal-contrib-2023-047 | 2023-09-27T16:33:34.000Z | 2023-09-28T21:17:46.000Z | |
| drupal-contrib-2023-045 | 2023-09-13T15:47:17.000Z | 2023-09-13T17:42:33.000Z | |
| drupal-contrib-2023-044 | 2023-09-06T16:33:36.000Z | 2023-09-18T14:27:44.000Z | |
| drupal-contrib-2023-043 | 2023-09-06T15:23:32.000Z | 2023-09-06T16:48:26.000Z | |
| drupal-contrib-2023-042 | 2023-08-30T16:23:18.000Z | 2023-08-30T18:51:57.000Z | |
| drupal-contrib-2023-041 | 2023-08-30T16:22:06.000Z | 2023-08-30T18:51:23.000Z | |
| drupal-contrib-2023-040 | 2023-08-23T17:24:02.000Z | 2023-08-23T18:28:12.000Z | |
| drupal-contrib-2023-039 | 2023-08-23T17:06:18.000Z | 2023-08-23T18:28:35.000Z | |
| drupal-contrib-2023-038 | 2023-08-23T17:00:14.000Z | 2023-08-23T18:47:17.000Z | |
| drupal-contrib-2023-037 | 2023-08-23T16:54:32.000Z | 2023-08-23T18:29:48.000Z | |
| drupal-contrib-2023-035 | 2023-08-23T14:54:52.000Z | 2023-08-23T18:45:59.000Z | |
| drupal-contrib-2023-034 | 2023-08-23T14:51:16.000Z | 2023-08-23T18:45:47.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2012-ale-001 | Vulnérabilité dans Cisco IronPort | 2012-02-01T00:00:00.000000 | 2013-02-05T00:00:00.000000 |
| certa-2011-ale-008 | Vulnérabilité dans Adobe Reader et Acrobat | 2011-12-07T00:00:00.000000 | 2012-01-10T00:00:00.000000 |
| certa-2011-ale-007 | Vulnérabilité dans ftpd et ProFTPD sur FreeBSD | 2011-12-02T00:00:00.000000 | 2011-12-26T00:00:00.000000 |
| certa-2011-ale-006 | Exploitation d'une vulnérabilité dans la gestion des polices TrueType sur Windows | 2011-11-04T00:00:00.000000 | 2011-12-14T00:00:00.000000 |
| certa-2011-ale-005 | Exploitation malveillante d'une fonctionnalité du protocole SSL afin de provoquer un déni de service | 2011-10-27T00:00:00.000000 | 2011-10-27T00:00:00.000000 |
| certa-2011-ale-004 | Vulnérabilités dans Apple iOS | 2011-07-05T00:00:00.000000 | 2011-07-18T00:00:00.000000 |
| certa-2011-ale-003 | Vulnérabilité dans Adobe Flash Player, Adobe Reader et Acrobat | 2011-04-12T00:00:00.000000 | 2011-06-20T00:00:00.000000 |
| certa-2011-ale-002 | Vulnérabilité dans Adobe Flash Player, Adobe Reader et Acrobat | 2011-03-15T00:00:00.000000 | 2011-03-22T00:00:00.000000 |
| certa-2011-ale-001 | Vulnérabilité dans le moteur de rendu graphique de Windows | 2011-01-05T00:00:00.000000 | 2011-02-10T00:00:00.000000 |
| certa-2010-ale-021 | Vulnérabilité dans Microsoft Internet Explorer | 2010-12-22T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2010-ale-020 | Vulnérabilité dans Adobe Reader et Acrobat | 2010-11-05T00:00:00.000000 | 2010-11-17T00:00:00.000000 |
| certa-2010-ale-019 | Vulnérabilité dans Microsoft Internet Explorer | 2010-11-03T00:00:00.000000 | 2010-12-17T00:00:00.000000 |
| certa-2010-ale-018 | Vulnérabilité dans Adobe Flash Player, Adobe Reader et Acrobat | 2010-10-28T00:00:00.000000 | 2010-11-18T00:00:00.000000 |
| certa-2010-ale-017 | Vulnérabilité dans Mozilla Firefox | 2010-10-27T00:00:00.000000 | 2010-10-28T00:00:00.000000 |
| certa-2010-ale-016 | Vulnérabilité Adobe Shockwave Player | 2010-10-22T00:00:00.000000 | 2010-10-29T00:00:00.000000 |
| certa-2010-ale-015 | Vulnérabilité dans Adobe Flash Player | 2010-09-14T00:00:00.000000 | 2010-09-21T00:00:00.000000 |
| certa-2010-ale-014 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2010-09-09T00:00:00.000000 | 2010-10-06T00:00:00.000000 |
| certa-2010-ale-013 | Vulnérabilité dans le contrôle ActiveX Apple QuickTime | 2010-08-31T00:00:00.000000 | 2010-09-17T00:00:00.000000 |
| certa-2010-ale-012 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2010-08-06T00:00:00.000000 | 2010-08-20T00:00:00.000000 |
| certa-2010-ale-011 | Vulnérabilités dans Apple iOS | 2010-08-04T00:00:00.000000 | 2010-08-12T00:00:00.000000 |
| certa-2010-ale-010 | Vulnérabilité dans le Shell de Microsoft Windows | 2010-07-19T00:00:00.000000 | 2010-08-03T00:00:00.000000 |
| certa-2010-ale-009 | Exploitation par un code malveillant d'une vulnérabilité Microsoft Windows non corrigée | 2010-07-16T00:00:00.000000 | 2010-08-03T00:00:00.000000 |
| certa-2010-ale-008 | Vulnérabilité dans le Centre d'aide et de support Windows | 2010-06-10T00:00:00.000000 | 2010-07-15T00:00:00.000000 |
| certa-2010-ale-007 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2010-06-05T00:00:00.000000 | 2010-06-30T00:00:00.000000 |
| certa-2010-ale-006 | Vulnérabilité de Safari | 2010-05-14T00:00:00.000000 | 2010-05-27T00:00:00.000000 |
| certa-2010-ale-005 | Vulnérabilité dans Java Deployment Toolkit | 2010-04-09T00:00:00.000000 | 2010-04-16T00:00:00.000000 |
| certa-2010-ale-004 | Vulnérabilité dans Microsoft Internet Explorer | 2010-03-10T00:00:00.000000 | 2010-03-31T00:00:00.000000 |
| certa-2010-ale-003 | Vulnérabilité dans Microsoft VBScript | 2010-03-02T00:00:00.000000 | 2010-04-13T00:00:00.000000 |
| certa-2010-ale-002 | Vulnérabilité dans le sous-système MS-DOS de Microsoft Windows | 2010-01-21T00:00:00.000000 | 2010-02-10T00:00:00.000000 |
| certa-2010-ale-001 | Vulnérabilité dans Microsoft Internet Explorer | 2010-01-15T00:00:00.000000 | 2010-01-22T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0246 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0245 | Vulnérabilité dans Zabbix | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0244 | Vulnérabilité dans Nextcloud Flow | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0243 | Vulnérabilité dans SPIP | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0242 | Multiples vulnérabilités dans les produits Cisco | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0241 | Vulnérabilité dans ClamAV | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0240 | Vulnérabilité dans CPython | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0239 | Multiples vulnérabilités dans Google Chrome | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0238 | Vulnérabilité dans NetApp ONTAP 9 | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0237 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0236 | Multiples vulnérabilités dans Traefik | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0235 | Multiples vulnérabilités dans HPE Aruba Networking AOS | 2026-03-04T00:00:00.000000 | 2026-03-04T00:00:00.000000 |
| certfr-2026-avi-0234 | Vulnérabilité dans Tenable Nessus Manager | 2026-03-04T00:00:00.000000 | 2026-03-04T00:00:00.000000 |
| certfr-2026-avi-0233 | Multiples vulnérabilités dans Google Pixel | 2026-03-04T00:00:00.000000 | 2026-03-04T00:00:00.000000 |
| certfr-2026-avi-0232 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-03T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0231 | Multiples vulnérabilités dans Google Android | 2026-03-03T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0230 | Multiples vulnérabilités dans Docker Desktop | 2026-03-03T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0229 | Multiples vulnérabilités dans MISP | 2026-03-02T00:00:00.000000 | 2026-03-02T00:00:00.000000 |
| certfr-2026-avi-0228 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-02T00:00:00.000000 | 2026-03-02T00:00:00.000000 |
| certfr-2026-avi-0227 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0226 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0225 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0224 | Multiples vulnérabilités dans les produits IBM | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0223 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0222 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0221 | Multiples vulnérabilités dans les produits Centreon | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0220 | Multiples vulnérabilités dans les produits Elastic | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0219 | Vulnérabilité dans Stormshield Network Security | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0218 | Multiples vulnérabilités dans les produits VMware | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0217 | Multiples vulnérabilités dans SPIP | 2026-02-26T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000040 | KCM3100 vulnerable to authentication bypass using an alternate path or channel | 2025-06-18T13:42+09:00 | 2025-06-18T13:42+09:00 |
| jvndb-2025-000039 | Multiple vulnerabilities in RICOH Streamline NX PC Client | 2025-06-13T16:09+09:00 | 2025-06-13T16:09+09:00 |
| jvndb-2025-000038 | UpdateNavi vulnerable to improper restriction of communication channel to intended endpoints | 2025-06-12T15:56+09:00 | 2025-06-12T15:56+09:00 |
| jvndb-2025-000037 | Multiple surveillance cameras provided by i-PRO Co., Ltd. vulnerable to cross-site request forgery | 2025-06-06T13:56+09:00 | 2025-06-06T13:56+09:00 |
| jvndb-2025-000036 | TimeWorks vulnerable to path traversal | 2025-06-03T15:35+09:00 | 2025-06-03T15:35+09:00 |
| jvndb-2025-000035 | Improper file access permission settings in PC Time Tracer | 2025-06-03T14:40+09:00 | 2025-06-03T14:40+09:00 |
| jvndb-2025-000034 | Multiple vulnerabilities in wivia 5 | 2025-05-30T15:57+09:00 | 2025-05-30T15:57+09:00 |
| jvndb-2025-000032 | Mailform Pro CGI generating error messages containing sensitive information | 2025-05-26T14:22+09:00 | 2025-05-26T14:22+09:00 |
| jvndb-2025-000033 | Improper pattern file validation in i-FILTER optional feature 'Anti-Virus & Sandbox' | 2025-05-23T15:36+09:00 | 2025-05-23T15:36+09:00 |
| jvndb-2025-005467 | Passback vulnerabilities in Canon Production Printers, Office/Small Office Multifunction Printers, and Laser Printers | 2025-05-22T15:03+09:00 | 2025-05-22T15:03+09:00 |
| jvndb-2025-005107 | Multiple vulnerabilities in V-SFT | 2025-05-16T14:32+09:00 | 2025-05-16T14:32+09:00 |
| jvndb-2025-005057 | Multiple vulnerabilities in I-O DATA network attached hard disk 'HDL-T Series' | 2025-05-15T18:27+09:00 | 2025-05-15T18:27+09:00 |
| jvndb-2025-005050 | Multiple vulnerabilities in a-blog cms | 2025-05-15T18:11+09:00 | 2025-05-15T18:11+09:00 |
| jvndb-2025-000031 | Pgpool-II vulnerable to authentication bypass by primary weakness | 2025-05-15T16:14+09:00 | 2025-05-15T16:14+09:00 |
| jvndb-2025-004863 | Panasonic IR Control Hub vulnerable to Unauthorised firmware loading | 2025-05-14T11:30+09:00 | 2025-05-14T11:30+09:00 |
| jvndb-2025-000030 | Reflected cross-site scripting vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor | 2025-05-12T18:00+09:00 | 2025-07-17T10:06+09:00 |
| jvndb-2025-004671 | Multiple vulnerabilities in GL-MT2500 and GL-MT2500A | 2025-05-12T17:52+09:00 | 2025-05-12T17:52+09:00 |
| jvndb-2025-004079 | Improper access permission settings in multiple SEIKO EPSON printer drivers for Windows OS | 2025-04-30T11:46+09:00 | 2025-04-30T11:46+09:00 |
| jvndb-2025-004076 | Security Update for Trend Micro Trend Vision One (April 2025) | 2025-04-30T10:38+09:00 | 2025-04-30T10:38+09:00 |
| jvndb-2025-000029 | Multiple vulnerabilities in Quick Agent | 2025-04-25T13:49+09:00 | 2025-04-25T13:49+09:00 |
| jvndb-2025-000028 | i-PRO Configuration Tool vulnerable to use of hard-coded cryptographic key | 2025-04-24T13:50+09:00 | 2025-04-24T13:50+09:00 |
| jvndb-2025-000027 | Active! mail vulnerable to stack-based buffer overflow | 2025-04-18T16:50+09:00 | 2025-04-18T16:50+09:00 |
| jvndb-2025-003213 | TP-Link Deco BE65 Pro vulnerable to OS command injection | 2025-04-11T13:52+09:00 | 2025-04-11T13:52+09:00 |
| jvndb-2025-000026 | Multiple vulnerabilities in BizRobo! | 2025-04-10T15:36+09:00 | 2025-04-10T15:36+09:00 |
| jvndb-2025-003091 | Multiple vulnerabilities in Trend Micro Endpoint security products for enterprises (April 2025) | 2025-04-09T14:55+09:00 | 2025-04-09T14:55+09:00 |
| jvndb-2025-002990 | Multiple vulnerabilities in Inaba Denki Sangyo Wi-Fi AP UNIT 'AC-WPS-11ac series' | 2025-04-07T17:44+09:00 | 2025-04-07T17:44+09:00 |
| jvndb-2025-000025 | WinRAR vulnerable to the symbolic link based "Mark of the Web" check bypass | 2025-04-03T12:29+09:00 | 2025-04-03T12:29+09:00 |
| jvndb-2025-000022 | Multiple vulnerabilities in JTEKT ELECTRONICS CORPORATION's products | 2025-04-02T15:12+09:00 | 2025-04-02T15:12+09:00 |
| jvndb-2025-002790 | Out-of-bounds Write vulnerabilities in Canon Printer Drivers for Production Printers, Office/Small Office Multifunction Printers and Laser Printers | 2025-04-02T15:05+09:00 | 2025-04-02T15:05+09:00 |
| jvndb-2025-000023 | WordPress plugin "Welcart e-Commerce" vulnerable to untrusted data deserialization | 2025-04-01T14:20+09:00 | 2025-04-01T14:20+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-16151 | Google Chrome内存错误引用漏洞(CNVD-2026-16151) | 2026-03-23 | 2026-04-07 |
| cnvd-2026-16617 | ImageMagick缓冲区溢出漏洞(CNVD-2026-16617) | 2026-03-19 | 2026-04-09 |
| cnvd-2026-16396 | HCL AION拒绝服务漏洞 | 2026-03-19 | 2026-04-08 |
| cnvd-2026-15159 | Apache Airflow信息泄露漏洞(CNVD-2026-15159) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15158 | Apache Airflow信息泄露漏洞(CNVD-2026-15158) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15157 | Apache Airflow安全绕过漏洞(CNVD-2026-15157) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15156 | Apache Airflow信息泄露漏洞(CNVD-2026-15156) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15154 | HCL AION安全绕过漏洞 | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15153 | HCL AION存在未明漏洞(CNVD-2026-15153) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15151 | HCL AION存在未明漏洞(CNVD-2026-15151) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15150 | HCL AION存在未明漏洞(CNVD-2026-15150) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15149 | HCL AION存在未明漏洞(CNVD-2026-15149) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15148 | HCL AION存在未明漏洞(CNVD-2026-15148) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15147 | HCL AION存在未明漏洞(CNVD-2026-15147) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15146 | HCL AION SQL注入漏洞(CNVD-2026-15146) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15145 | HCL AION信息泄露漏洞(CNVD-2026-15145) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15144 | HCL AION SQL注入漏洞 | 2026-03-19 | 2026-03-23 |
| cnvd-2026-14969 | WordPress插件WpEvently信息泄露漏洞 | 2026-03-19 | 2026-03-26 |
| cnvd-2026-14968 | WordPress插件wpDiscuz信息泄露漏洞 | 2026-03-19 | 2026-03-26 |
| cnvd-2026-14686 | Belkin F9K1122堆栈缓冲区溢出漏洞(CNVD-2026-14686) | 2026-03-19 | 2026-03-24 |
| cnvd-2026-14680 | TRENDnet TEW-632BRP缓冲区溢出漏洞 | 2026-03-19 | 2026-03-24 |
| cnvd-2026-14390 | OpenClaw访问控制错误漏洞(CNVD-2026-14390) | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14389 | OpenClaw信息泄露漏洞(CNVD-2026-14389) | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14387 | WordPress插件Calculated Fields Form跨站脚本漏洞 | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14386 | WordPress插件Avada Core跨站脚本漏洞 | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14385 | WordPress插件Astra Bulk Edit跨站脚本漏洞 | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14384 | WordPress插件Active Products Tables for WooCommerce跨站脚本漏洞 | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14252 | Apache Spark反序列化漏洞 | 2026-03-19 | 2026-03-19 |
| cnvd-2026-14251 | Apache Livy输入验证错误漏洞 | 2026-03-19 | 2026-03-19 |
| cnvd-2026-14250 | Zephyr缓冲区溢出漏洞 | 2026-03-19 | 2026-03-19 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01498 | Уязвимость функции si_parse_power_table() ядра операционной системы Linux, позволяющая на… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01497 | Уязвимость плагина Rule Based Authorization Plugin поискового сервера Apache Solr, позвол… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01496 | Уязвимость функции radeon_atombios_fini() модуля drivers/gpu/drm/radeon/radeon_device.c д… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01495 | Уязвимость функции fromSetWifiGusetBasic() микропрограммного обеспечения маршрутизаторов … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01494 | Уязвимость функции type_show() ядра операционной системы Linux, позволяющая нарушителю ок… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01493 | Уязвимость функции sanity_check_curseg() ядра операционной системы Linux, позволяющая нар… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01492 | Уязвимость веб-интерфейса сервера для управления программами Fortinet FortiClient Enterpr… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01491 | Уязвимость функции fc_exch_abts_resp() ядра операционной системы Linux, позволяющая наруш… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01490 | Уязвимость функции ipc_msg_send_request() ядра операционной системы Linux, позволяющая на… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01489 | Уязвимость функции OnAssocReq() ядра операционной системы Linux, позволяющая нарушителю о… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01488 | Уязвимость функции ext4_truncate() модуля fs/ext4/inode.c файловой системы Ext4 ядра опер… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01487 | Уязвимость функции swap_inode_boot_loader() модуля fs/ext4/ioctl.c файловой системы Ext4 … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01486 | Уязвимость функции pci_device_is_present() модуля drivers/pci/pci.c драйвера устройств PC… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01485 | Уязвимость функции ath11k_dp_rx_mon_deliver() модуля drivers/net/wireless/ath/ath11k/dp_r… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01484 | Уязвимость функций raid0_run() (drivers/md/raid0.c) и raid10_run() (drivers/md/raid10.c) … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01483 | Уязвимость функции _regulator_do_enable() модуля drivers/regulator/core.c драйвера регуля… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01468 | Уязвимость библиотеки преобразования путей path-to-regexp, связанная с неэффективной вычи… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01467 | Уязвимость сервера для разработки Metro Development Server, связанная с непринятием мер п… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01466 | Уязвимость компонента Duo Workflow Service сервиса для взаимодействия с внешними LLM-пров… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01465 | Уязвимость функции lookup_ioctl() модуля drivers/md/dm-ioctl.c драйвера поддержки несколь… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01464 | Уязвимость функции __mcheck_cpu_apply_quirks() модуля arch/x86/kernel/cpu/mce/core.c подд… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01463 | Уязвимость функции nwl_dsi_bridge_mode_set() модуля drivers/gpu/drm/bridge/nwl-dsi.c драй… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01462 | Уязвимость функции status_resync() модуля drivers/md/md.c драйвера нескольких устройств (… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01461 | Уязвимость функции vb2ops_vdec_queue_setup() модуля drivers/media/platform/mediatek/vcode… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01460 | Уязвимость функции nilfs_evict_inode() модуля fs/nilfs2/inode.c файловой системы NILFS2 я… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01459 | Уязвимость функции mpi_cmp_ui() модуля lib/crypto/mpi/mpi-cmp.c ядра операционной системы… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01458 | Уязвимость функции f2fs_abort_atomic_write() модуля fs/f2fs/segment.c файловой системы F2… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01457 | Уязвимость функции nilfs_bmap_lookup_at_level() модуля fs/nilfs2/bmap.c файловой системы … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01456 | Уязвимость функции __hfs_bnode_create() модуля fs/hfs/bnode.c файловой системы ядра опера… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01455 | Уязвимость функции nilfs_prepare_segment_for_recovery() модуля fs/nilfs2/recovery.c подде… | 09.02.2026 | 09.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201310-0350 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, J… | 2026-04-10T23:12:57.761000Z |
| var-201110-0387 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2026-04-10T23:12:57.355000Z |
| var-200505-0351 | Bluetooth-enabled systems in Mac OS X 10.3.9 enables the Bluetooth file exchange service … | 2026-04-10T23:12:52.766000Z |
| var-202210-1202 | Git is an open source, scalable, distributed revision control system. Versions prior to 2… | 2026-04-10T23:12:52.458000Z |
| var-201905-0709 | Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocess… | 2026-04-10T23:12:45.383000Z |
| var-202201-0424 | A validation issue was addressed with improved input sanitization. This issue is fixed in… | 2026-04-10T23:12:13.994000Z |
| var-202002-1182 | A logic issue was addressed with improved state management. This issue is fixed in iOS 13… | 2026-04-10T23:12:13.201000Z |
| var-202204-0855 | There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, … | 2026-04-10T23:12:11.778000Z |
| var-201603-0237 | Web Server in Apple OS X Server before 5.1 supports the RC4 algorithm, which makes it eas… | 2026-04-10T23:12:10.977000Z |
| var-202011-0444 | Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker… | 2026-04-10T23:11:53.950000Z |
| var-200811-0321 | The plug-in interface in WebKit in Apple Safari before 3.2 does not prevent plug-ins from… | 2026-04-10T23:11:53.609000Z |
| var-201605-0466 | The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2,… | 2026-04-10T23:10:45.904000Z |
| var-200801-0578 | The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, w… | 2026-04-10T23:10:45.817000Z |
| var-202201-0370 | storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. Exp… | 2026-04-10T23:10:45.260000Z |
| var-202003-1787 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2026-04-10T23:10:45.172000Z |
| var-200609-0313 | Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to… | 2026-04-10T23:10:44.732000Z |
| var-201904-1352 | A type confusion issue was addressed with improved memory handling. This issue affected v… | 2026-04-10T23:10:44.429000Z |
| var-201912-0122 | A logic issue was addressed with improved state management. This issue is fixed in iOS 13… | 2026-04-10T23:10:09.514000Z |
| var-201912-0562 | A buffer overflow was addressed with improved bounds checking. This issue is fixed in mac… | 2026-04-10T23:09:56.904000Z |
| var-200603-0272 | IPSec when used with VPN networks in Mac OS X 10.4 through 10.4.5 allows remote attackers… | 2026-04-10T23:09:23.671000Z |
| var-201205-0312 | sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI… | 2026-04-10T23:08:50.423000Z |
| var-202203-0099 | If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) … | 2026-04-10T23:08:16.907000Z |
| var-201912-0627 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-04-10T23:08:16.024000Z |
| var-201711-0445 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2026-04-10T23:08:14.969000Z |
| var-201904-1433 | A memory corruption issue was addressed with improved validation. This issue affected ver… | 2026-04-10T23:08:13.742000Z |
| var-200505-0359 | Apple Terminal 1.4.4 allows attackers to execute arbitrary commands via terminal escape s… | 2026-04-10T23:08:12.467000Z |
| var-201806-1482 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2026-04-10T23:07:43.017000Z |
| var-201203-0199 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2026-04-10T23:07:41.798000Z |
| var-201710-1409 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari befo… | 2026-04-10T23:07:40.610000Z |
| var-201003-1075 | Use-after-free vulnerability in the abstract file-descriptor handling interface in the cu… | 2026-04-10T23:06:19.741000Z |