Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-41080 |
2.9 (3.1)
|
libexpat before 2.7.6 uses insufficient entropy, … |
libexpat project |
libexpat |
2026-04-16T16:52:01.177Z | 2026-04-18T02:33:52.350Z |
| CVE-2025-36579 |
5.1 (3.1)
|
Dell Client Platform BIOS contains a Weak Passwor… |
Dell |
Dell Pro 14 Essential PV14250 |
2026-04-16T16:05:32.561Z | 2026-04-16T18:32:52.672Z |
| CVE-2026-5426 |
7.5 (3.1)
|
KnowledgeDeliver deployments before February 24, 2026 … |
Digital Knowledge |
KnowledgeDeliver |
2026-04-16T15:18:46.224Z | 2026-04-18T02:31:32.234Z |
| CVE-2026-3324 |
8.2 (3.1)
|
Authentication Bypass |
Zohocorp |
ManageEngine Log360 |
2026-04-16T14:30:55.130Z | 2026-04-16T15:21:19.911Z |
| CVE-2026-6409 |
7.1 (4.0)
|
Denial of Service (DoS) vulnerability exists in the Pr… |
Protocol Buffers |
Protobuf-php (Pecl) |
2026-04-16T14:30:51.568Z | 2026-04-16T15:24:43.164Z |
| CVE-2026-2840 |
6.4 (3.1)
|
Email Encoder – Protect Email Addresses and Phone Numb… |
onlineoptimisation |
Email Encoder – Protect Email Addresses and Phone Numbers |
2026-04-16T14:10:29.114Z | 2026-04-16T14:42:53.905Z |
| CVE-2026-33804 |
7.4 (3.1)
|
@fastify/middie vulnerable to middleware bypass via de… |
@fastify/middie |
@fastify/middie |
2026-04-16T13:56:56.176Z | 2026-04-16T14:41:48.659Z |
| CVE-2026-5785 |
8.1 (3.1)
|
SQL Injection |
Zohocorp |
ManageEngine PAM360 |
2026-04-16T13:46:28.313Z | 2026-04-17T03:55:15.059Z |
| CVE-2026-6270 |
9.1 (3.1)
|
@fastify/middie vulnerable to middleware authenticatio… |
@fastify/middie |
@fastify/middie |
2026-04-16T13:44:46.322Z | 2026-04-16T14:24:26.764Z |
| CVE-2026-31987 |
N/A
|
Apache Airflow: JWT token appearing in logs |
Apache Software Foundation |
Apache Airflow |
2026-04-16T13:31:52.336Z | 2026-04-18T02:28:44.770Z |
| CVE-2026-6410 |
5.3 (3.1)
|
@fastify/static vulnerable to path traversal in direct… |
@fastify/static |
@fastify/static |
2026-04-16T13:29:08.120Z | 2026-04-16T14:19:36.780Z |
| CVE-2026-4160 |
5.3 (3.1)
|
Fluent Forms – Customizable Contact Forms, Survey, Qui… |
techjewel |
Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder |
2026-04-16T13:27:09.207Z | 2026-04-16T14:12:35.951Z |
| CVE-2026-6414 |
5.9 (3.1)
|
@fastify/static vulnerable to route guard bypass via e… |
@fastify/static |
@fastify/static |
2026-04-16T13:09:03.526Z | 2026-04-16T13:48:52.393Z |
| CVE-2026-31843 |
10 (4.0)
9.8 (3.1)
|
The goodoneuz/pay-uz Laravel package (<= 2.2.24) … |
goodoneuz |
pay-uz |
2026-04-16T13:02:55.701Z | 2026-04-16T19:30:21.203Z |
| CVE-2025-15621 |
5.7 (4.0)
|
Sparx Enterprise Architect Client does not verify the … |
Sparx Systems Pty Ltd. |
Sparx Enterprise Architect |
2026-04-16T12:40:08.962Z | 2026-04-16T12:51:51.633Z |
| CVE-2026-3155 |
3.1 (3.1)
|
OneSignal – Web Push Notifications <= 3.8.0 - Missing … |
onesignal |
OneSignal – Web Push Notifications |
2026-04-16T11:21:22.226Z | 2026-04-16T14:00:56.681Z |
| CVE-2026-3369 |
5.4 (3.1)
|
Better Find and Replace – AI-Powered Suggestions <= 1.… |
codesolz |
Better Find and Replace – AI-Powered Suggestions |
2026-04-16T11:21:21.822Z | 2026-04-16T14:04:23.811Z |
| CVE-2026-3489 |
7.5 (3.1)
|
DirectoryPress – Business Directory And Classified Ad … |
designinvento |
DirectoryPress – Business Directory And Classified Ad Listing |
2026-04-16T11:21:21.179Z | 2026-04-16T14:05:03.740Z |
| CVE-2025-12624 |
6 (3.1)
|
Improper Token Invalidation in WSO2 Identity Server Al… |
WSO2 |
WSO2 Identity Server |
2026-04-16T10:25:19.789Z | 2026-04-16T12:30:14.886Z |
| CVE-2025-6024 |
6.1 (3.1)
|
Cross-Site Scripting via Authentication Endpoint in Mu… |
WSO2 |
WSO2 API Manager |
2026-04-16T09:48:45.244Z | 2026-04-16T12:30:22.824Z |
| CVE-2024-10242 |
6.1 (3.1)
|
Reflected Cross-Site Scripting via Authentication Endp… |
WSO2 |
WSO2 API Manager |
2026-04-16T09:45:46.115Z | 2026-04-16T12:30:30.619Z |
| CVE-2024-8010 |
3.5 (3.1)
|
XML External Entity Injection via Publisher in WSO2 AP… |
WSO2 |
WSO2 API Manager |
2026-04-16T09:39:20.130Z | 2026-04-16T12:30:36.466Z |
| CVE-2024-4867 |
5.4 (3.1)
|
Cross-Site Scripting via Developer Portal in WSO2 API … |
WSO2 |
WSO2 API Manager |
2026-04-16T09:32:40.941Z | 2026-04-16T12:30:42.568Z |
| CVE-2026-23772 |
7.3 (3.1)
|
Dell Storage Manager - Replay Manager for Microso… |
Dell |
Storage Manager |
2026-04-16T08:30:56.774Z | 2026-04-17T03:55:13.852Z |
| CVE-2024-2374 |
7.5 (3.1)
|
XML External Entity Injection in Multiple WSO2 Product… |
WSO2 |
WSO2 API Manager |
2026-04-16T08:12:58.247Z | 2026-04-16T12:30:49.250Z |
| CVE-2026-0718 |
5.3 (3.1)
|
Post Grid Gutenberg Blocks for News, Magazines, Blog W… |
wpxpo |
Post Grid Gutenberg Blocks for News, Magazines, Blog Websites – PostX |
2026-04-16T07:39:50.799Z | 2026-04-16T12:55:16.326Z |
| CVE-2025-14868 |
8.8 (3.1)
|
Career Section <= 1.6 - Cross-Site Request Forgery to … |
shahinurislam |
Career Section |
2026-04-16T07:39:49.576Z | 2026-04-16T12:52:42.034Z |
| CVE-2026-41035 |
7.4 (3.1)
|
In rsync 3.0.1 through 3.4.1, receive_xattr relie… |
Samba |
rsync |
2026-04-16T06:53:05.237Z | 2026-04-16T20:16:00.985Z |
| CVE-2026-3876 |
7.2 (3.1)
|
Prismatic <= 3.7.3 - Unauthenticated Stored Cross-Site… |
specialk |
Prismatic |
2026-04-16T06:44:53.787Z | 2026-04-16T14:13:20.711Z |
| CVE-2026-3355 |
6.1 (3.1)
|
Customer Reviews for WooCommerce <= 5.101.0 - Reflecte… |
ivole |
Customer Reviews for WooCommerce |
2026-04-16T06:44:53.276Z | 2026-04-16T14:25:11.362Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-43883 |
4.1 (3.1)
|
Dell PowerScale OneFS, versions prior to 9.12.0.0… |
Dell |
PowerScale OneFS |
2026-04-16T17:54:09.831Z | 2026-04-18T02:39:20.246Z |
| CVE-2026-41080 |
2.9 (3.1)
|
libexpat before 2.7.6 uses insufficient entropy, … |
libexpat project |
libexpat |
2026-04-16T16:52:01.177Z | 2026-04-18T02:33:52.350Z |
| CVE-2025-36579 |
5.1 (3.1)
|
Dell Client Platform BIOS contains a Weak Passwor… |
Dell |
Dell Pro 14 Essential PV14250 |
2026-04-16T16:05:32.561Z | 2026-04-16T18:32:52.672Z |
| CVE-2026-5426 |
7.5 (3.1)
|
KnowledgeDeliver deployments before February 24, 2026 … |
Digital Knowledge |
KnowledgeDeliver |
2026-04-16T15:18:46.224Z | 2026-04-18T02:31:32.234Z |
| CVE-2026-37100 |
6.5 (3.1)
|
An issue in the Bluetooth Low Energy (BLE) contro… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-18T02:26:33.302Z |
| CVE-2026-6409 |
7.1 (4.0)
|
Denial of Service (DoS) vulnerability exists in the Pr… |
Protocol Buffers |
Protobuf-php (Pecl) |
2026-04-16T14:30:51.568Z | 2026-04-16T15:24:43.164Z |
| CVE-2026-3324 |
8.2 (3.1)
|
Authentication Bypass |
Zohocorp |
ManageEngine Log360 |
2026-04-16T14:30:55.130Z | 2026-04-16T15:21:19.911Z |
| CVE-2026-37347 |
9.1 (3.1)
|
SourceCodester Payroll Management and Information… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T15:38:38.249Z |
| CVE-2026-37346 |
4.7 (3.1)
|
SourceCodester Payroll Management and Information… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T15:44:44.805Z |
| CVE-2026-37345 |
9.8 (3.1)
|
SourceCodester Vehicle Parking Area Management Sy… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T15:42:56.413Z |
| CVE-2026-37344 |
7.2 (3.1)
|
SourceCodester Vehicle Parking Area Management Sy… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-18T02:24:10.031Z |
| CVE-2026-37343 |
7.2 (3.1)
|
SourceCodester Vehicle Parking Area Management Sy… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-18T02:21:26.859Z |
| CVE-2026-37342 |
7.2 (3.1)
|
SourceCodester Vehicle Parking Area Management Sy… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-18T02:18:42.566Z |
| CVE-2026-37341 |
7.2 (3.1)
|
SourceCodester Vehicle Parking Area Management Sy… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-18T02:16:24.628Z |
| CVE-2026-37340 |
9.8 (3.1)
|
SourceCodester Simple Music Cloud Community Syste… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-18T02:14:04.538Z |
| CVE-2026-37339 |
9.8 (3.1)
|
SourceCodester Simple Music Cloud Community Syste… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-18T02:11:23.662Z |
| CVE-2026-37338 |
9.4 (3.1)
|
SourceCodester Simple Music Cloud Community Syste… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T15:49:41.995Z |
| CVE-2026-37337 |
7.3 (3.1)
|
SourceCodester Simple Music Cloud Community Syste… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T17:26:11.625Z |
| CVE-2026-37336 |
7.3 (3.1)
|
SourceCodester Simple Music Cloud Community Syste… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T17:28:46.565Z |
| CVE-2026-33804 |
7.4 (3.1)
|
@fastify/middie vulnerable to middleware bypass via de… |
@fastify/middie |
@fastify/middie |
2026-04-16T13:56:56.176Z | 2026-04-16T14:41:48.659Z |
| CVE-2026-30656 |
7.5 (3.1)
|
A NULL pointer dereference vulnerability exists i… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T17:33:52.962Z |
| CVE-2026-30459 |
7.1 (3.1)
|
An issue in the Forgot Password feature of Daylig… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T15:16:57.348Z |
| CVE-2026-2840 |
6.4 (3.1)
|
Email Encoder – Protect Email Addresses and Phone Numb… |
onlineoptimisation |
Email Encoder – Protect Email Addresses and Phone Numbers |
2026-04-16T14:10:29.114Z | 2026-04-16T14:42:53.905Z |
| CVE-2026-6410 |
5.3 (3.1)
|
@fastify/static vulnerable to path traversal in direct… |
@fastify/static |
@fastify/static |
2026-04-16T13:29:08.120Z | 2026-04-16T14:19:36.780Z |
| CVE-2026-6270 |
9.1 (3.1)
|
@fastify/middie vulnerable to middleware authenticatio… |
@fastify/middie |
@fastify/middie |
2026-04-16T13:44:46.322Z | 2026-04-16T14:24:26.764Z |
| CVE-2026-5785 |
8.1 (3.1)
|
SQL Injection |
Zohocorp |
ManageEngine PAM360 |
2026-04-16T13:46:28.313Z | 2026-04-17T03:55:15.059Z |
| CVE-2026-4160 |
5.3 (3.1)
|
Fluent Forms – Customizable Contact Forms, Survey, Qui… |
techjewel |
Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder |
2026-04-16T13:27:09.207Z | 2026-04-16T14:12:35.951Z |
| CVE-2026-31987 |
N/A
|
Apache Airflow: JWT token appearing in logs |
Apache Software Foundation |
Apache Airflow |
2026-04-16T13:31:52.336Z | 2026-04-18T02:28:44.770Z |
| CVE-2026-6414 |
5.9 (3.1)
|
@fastify/static vulnerable to route guard bypass via e… |
@fastify/static |
@fastify/static |
2026-04-16T13:09:03.526Z | 2026-04-16T13:48:52.393Z |
| CVE-2026-5968 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. | N/A | N/A | 2026-04-16T12:36:56.881Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-fgw5-hp8f-xfhc |
5.0 (3.1)
|
Istio: SSRF via RequestAuthentication jwksUri | 2026-04-16T21:38:09Z | 2026-04-16T21:38:09Z |
| ghsa-rp42-5vxx-qpwr |
7.5 (3.1)
|
basic-ftp vulnerable to denial of service via unbounded memory consumption in Client.list() | 2026-04-16T21:37:48Z | 2026-04-16T21:37:48Z |
| ghsa-8wfp-579w-6r25 |
7.7 (3.1)
|
Kyverno apiCall automatically forwards ServiceAccount token to external endpoints (credential leak) | 2026-04-16T21:37:29Z | 2026-04-16T21:37:29Z |
| ghsa-f9g8-6ppc-pqq4 |
8.1 (3.1)
|
Kyverno: ServiceAccount token leaked to external servers via apiCall service URL | 2026-04-16T21:36:20Z | 2026-04-16T21:36:20Z |
| ghsa-cvq5-hhx3-f99p |
7.7 (3.1)
|
Kyverno: Cross-Namespace Read Bypasses RBAC Isolation (CVE-2026-22039 Incomplete Fix) | 2026-04-16T21:35:04Z | 2026-04-16T21:35:04Z |
| ghsa-2mvx-f5qm-v2ch |
8.8 (4.0)
|
Unauthenticated Information Disclosure (IDOR) via Multisite switch_to_blog in My Calendar | 2026-04-16T21:34:40Z | 2026-04-16T21:34:40Z |
| ghsa-vp6r-9m58-5xv8 |
8.1 (3.1)
|
OmniFaces: EL injection via crafted resource name in wildcard CDN mapping | 2026-04-16T21:31:14Z | 2026-04-16T21:31:14Z |
| ghsa-p7qm-4248-g65p |
7.1 (4.0)
|
Incorrect use of boot service in the AMD Platform Configuration Blob (APCB) SMM driver could allow … | 2026-04-16T21:31:13Z | 2026-04-16T21:31:13Z |
| ghsa-p7f2-6479-84wx |
6.6 (3.1)
|
Dell PowerScale OneFS, versions prior to 9.12.0.0, contains an insertion of sensitive information i… | 2026-04-16T21:31:13Z | 2026-04-16T21:31:13Z |
| ghsa-mwrh-fvw2-28c5 |
5.9 (4.0)
|
A missing lock verification in AMD Secure Processor (ASP) firmware may permit a locally authenticat… | 2026-04-16T21:31:13Z | 2026-04-16T21:31:13Z |
| ghsa-26fh-vcwc-mcgv |
8.3 (3.1)
|
Improper validation of bash commands in Snowflake Cortex Code CLI versions prior to 1.0.25 allowed … | 2026-04-16T21:31:13Z | 2026-04-16T21:31:13Z |
| ghsa-c43c-pr38-m5g2 |
5.6 (4.0)
|
Insufficient checks of the RMP on host buffer access in IOMMU may allow an attacker with privileges… | 2026-04-16T21:31:12Z | 2026-04-16T21:31:12Z |
| ghsa-4rvm-g2vh-jm4x |
4.4 (3.1)
|
Dell PowerScale OneFS, versions prior to 9.12.0.0, contains an improper resource shutdown or releas… | 2026-04-16T21:31:12Z | 2026-04-16T21:31:12Z |
| ghsa-x284-j5p8-9c5p |
6.8 (4.0)
|
pypdf: Manipulated FlateDecode image dimensions can exhaust RAM | 2026-04-16T21:30:25Z | 2026-04-16T21:30:25Z |
| ghsa-4pxv-j86v-mhcw |
6.8 (4.0)
|
pypdf: Possible long runtimes for wrong size values in incremental mode | 2026-04-16T21:30:12Z | 2026-04-16T21:30:12Z |
| ghsa-7gw9-cf7v-778f |
6.8 (4.0)
|
pypdf: Manipulated FlateDecode predictor parameters can exhaust RAM | 2026-04-16T21:30:00Z | 2026-04-16T21:30:00Z |
| ghsa-qqx8-2xmm-jrv8 |
8.8 (3.1)
|
ACME Lego: Arbitrary File Write via Path Traversal in Webroot HTTP-01 Provider | 2026-04-16T21:28:55Z | 2026-04-16T21:28:55Z |
| ghsa-33qf-q99x-wpm8 |
5.6 (3.1)
|
Home Assistant Command-line Interface: Handling of user-supplied Jinja2 templates | 2026-04-16T21:28:39Z | 2026-04-16T21:28:39Z |
| ghsa-vqx2-fgx2-5wq9 |
9.1 (3.1)
|
Official Clerk JavaScript SDKs: Middleware-based route protection bypass | 2026-04-16T21:28:26Z | 2026-04-16T21:28:26Z |
| ghsa-4jjr-vmv7-wh4w |
8.1 (3.1)
|
Statamic: Unsafe method invocation via query value resolution allows data destruction | 2026-04-16T21:25:35Z | 2026-04-16T21:25:35Z |
| ghsa-xr6f-h4x7-r6qp |
8.7 (4.0)
|
WWBN AVideo: RCE cause by clonesite plugin | 2026-04-16T21:25:19Z | 2026-04-16T21:25:20Z |
| ghsa-wxw2-rwmh-vr8f |
9.8 (3.1)
|
electerm: electerm_install_script_CommandInjection Vulnerability Report | 2026-04-16T21:24:22Z | 2026-04-16T21:24:22Z |
| ghsa-9hrv-gvrv-6gf2 |
6.0 (4.0)
|
Flowise Execute Flow function has an SSRF vulnerability | 2026-04-16T21:23:17Z | 2026-04-16T21:23:18Z |
| ghsa-qqvm-66q4-vf5c |
5.3 (4.0)
|
Flowise: SSRF Protection Bypass via Direct node-fetch / axios Usage (Patch Enforcement Failure) | 2026-04-16T21:23:03Z | 2026-04-16T21:23:03Z |
| ghsa-w6v6-49gh-mc9w |
4.9 (4.0)
|
Flowise: Path Traversal in Vector Store basePath | 2026-04-16T21:22:49Z | 2026-04-16T21:22:49Z |
| ghsa-m7mq-85xj-9x33 |
5.6 (3.1)
|
Flowise: Weak Default Token Hash Secret | 2026-04-16T21:22:36Z | 2026-04-16T21:22:36Z |
| ghsa-2qqc-p94c-hxwh |
5.6 (3.1)
|
Flowise: Weak Default Express Session Secret | 2026-04-16T21:22:00Z | 2026-04-16T21:22:00Z |
| ghsa-cc4f-hjpj-g9p8 |
5.6 (3.1)
|
Flowise: Weak Default JWT Secrets | 2026-04-16T21:21:12Z | 2026-04-16T21:21:12Z |
| ghsa-6pcv-j4jx-m4vx |
5.3 (3.1)
|
Flowise: Unauthenticated Information Disclosure of OAuth Secrets (Cleartext) via GET Request | 2026-04-16T21:20:05Z | 2026-04-16T21:20:05Z |
| ghsa-gj9q-8w99-mp8j |
2.1 (4.0)
|
OpenClaw: TOCTOU read in exec script preflight | 2026-04-16T21:19:21Z | 2026-04-16T21:19:21Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-47 |
|
In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.te… | django | 2024-03-15T20:15:00+00:00 | 2024-03-15T23:20:34.975097+00:00 |
| pysec-2024-46 |
|
Apache Airflow, versions 2.8.0 through 2.8.2, has a vulnerability that allows an authenti… | apache-airflow | 2024-03-14T09:15:00+00:00 | 2024-03-14T11:19:09.515892+00:00 |
| pysec-2024-221 |
5.3 (3.1)
|
aiosmtpd is a reimplementation of the Python stdlib smtpd.py based on asyncio. aiosmtpd i… | aiosmtpd | 2024-03-12T21:15:58+00:00 | 2025-01-22T16:23:18.042465+00:00 |
| pysec-2024-44 |
|
In RPyC before 6.0.0, when a server exposes a method that calls the attribute named __arr… | rpyc | 2024-03-12T16:15:00+00:00 | 2024-03-12T19:19:21.886478+00:00 |
| pysec-2024-45 |
|
LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to contro… | langchain-core | 2024-03-04T00:15:00+00:00 | 2024-03-13T23:20:07.486731+00:00 |
| pysec-2024-43 |
|
LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to contro… | langchain | 2024-03-04T00:15:00+00:00 | 2024-03-05T10:22:15.555734+00:00 |
| pysec-2024-42 |
|
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated Ops … | apache-airflow | 2024-03-01T11:15:00+00:00 | 2024-03-01T14:20:34.498842+00:00 |
| pysec-2024-245 |
|
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated user… | apache-airflow | 2024-02-29T11:15:08+00:00 | 2025-05-01T21:22:38.598048+00:00 |
| pysec-2024-162 |
6.5 (3.1)
|
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the XMLFeedSpider … | scrapy | 2024-02-28T00:15:53+00:00 | 2025-01-14T05:22:21.870348+00:00 |
| pysec-2024-41 |
|
diffoscope before 256 allows directory traversal via an embedded filename in a GPG file. … | diffoscope | 2024-02-27T02:15:00+00:00 | 2024-02-27T07:20:27.954412+00:00 |
| pysec-2024-205 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. When using … | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-19T19:19:01.519824+00:00 |
| pysec-2024-164 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. If an exces… | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-16T21:21:41.436934+00:00 |
| pysec-2024-40 |
|
orjson.loads in orjson before 3.9.15 does not limit recursion for deeply nested JSON documents. | orjson | 2024-02-26T16:28:00+00:00 | 2024-02-26T18:22:26.039698+00:00 |
| pysec-2024-253 |
|
pretix before 2024.1.1 mishandles file validation. | pretix | 2024-02-26T16:28:00+00:00 | 2025-06-11T15:23:51.683422+00:00 |
| pysec-2024-235 |
8.1 (3.1)
|
With the following crawler configuration: ```python from bs4 import BeautifulSoup as Sou… | langchain-exa | 2024-02-26T16:27:49+00:00 | 2025-02-26T02:48:56.937312+00:00 |
| pysec-2024-39 |
|
Versions of the package fastecdsa before 2.3.2 are vulnerable to Use of Uninitialized Var… | fastecdsa | 2024-02-24T05:15:00+00:00 | 2024-02-24T07:19:09.418536+00:00 |
| pysec-2024-241 |
9.6 (3.1)
|
Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untru… | mlflow | 2024-02-23T22:15:55+00:00 | 2025-04-08T10:23:24.946136+00:00 |
| pysec-2024-240 |
9.6 (3.1)
|
Insufficient sanitization in MLflow leads to XSS when running an untrusted recipe. This … | mlflow | 2024-02-23T22:15:55+00:00 | 2025-04-08T10:23:24.900947+00:00 |
| pysec-2024-223 |
9.1 (3.1)
|
Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds … | onnx | 2024-02-23T18:15:50+00:00 | 2025-01-22T16:23:22.060512+00:00 |
| pysec-2024-222 |
7.5 (3.1)
|
Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Trav… | onnx | 2024-02-23T18:15:50+00:00 | 2025-01-22T16:23:21.994731+00:00 |
| pysec-2024-249 |
6.1 (3.1)
|
### Summary On all Label Studio versions prior to 1.11.0, data imported via file upload f… | label-studio | 2024-02-22T22:15:47+00:00 | 2025-05-19T11:22:35.312280+00:00 |
| pysec-2024-226 |
7.8 (3.1)
|
Pymatgen (Python Materials Genomics) is an open-source Python library for materials analy… | pymatgen | 2024-02-21T17:15:09+00:00 | 2025-02-06T00:34:28.734730+00:00 |
| pysec-2024-225 |
7.5 (3.1)
|
cryptography is a package designed to expose cryptographic primitives and recipes to Pyth… | cryptography | 2024-02-21T17:15:09+00:00 | 2025-02-06T00:34:24.427679+00:00 |
| pysec-2024-155 |
7.5 (3.1)
|
cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) … | cbor2 | 2024-02-19T23:15:07+00:00 | 2025-01-14T05:22:09.226388+00:00 |
| pysec-2024-107 |
5.0 (3.1)
|
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modif… | exiv2 | 2024-02-12T23:15:00+00:00 | 2024-10-23T00:00:00+00:00 |
| pysec-2024-106 |
5.0 (3.1)
|
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modif… | exiv2 | 2024-02-12T23:15:00+00:00 | 2024-10-23T00:00:00+00:00 |
| pysec-2024-104 |
5.3 (3.1)
|
A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of … | jwcrypto | 2024-02-12T14:15:00+00:00 | 2024-10-10T17:22:00.587279+00:00 |
| pysec-2024-37 |
6.5 (3.1)
|
nonebot2 is a cross-platform Python asynchronous chatbot framework written in Python. Thi… | nonebot2 | 2024-02-09T23:15:00+00:00 | 2024-02-16T16:22:37.389642+00:00 |
| pysec-2024-125 |
7.5 (3.1)
|
DIRAC is a distributed resource framework. In affected versions any user could get a toke… | dirac | 2024-02-09T00:15:00+00:00 | 2024-11-21T14:22:45.495938+00:00 |
| pysec-2024-150 |
9.8 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. Arrays can … | vyper | 2024-02-07T17:15:00+00:00 | 2024-11-21T14:23:03.024978+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2622 | Malicious code in wm-plugin-wm-smart-tip-dont-embed-tooltip (npm) | 2026-04-13T15:25:21Z | 2026-04-13T15:25:22Z |
| mal-2026-2584 | Malicious code in @hpcc/js-api (npm) | 2026-04-13T15:25:21Z | 2026-04-13T15:25:29Z |
| mal-2026-2583 | Malicious code in @hmm-app/api (npm) | 2026-04-13T15:25:21Z | 2026-04-13T15:25:29Z |
| mal-2026-2582 | Malicious code in @guards-lib/auth (npm) | 2026-04-13T15:25:21Z | 2026-04-16T15:42:07Z |
| mal-2026-2580 | Malicious code in @cash-web/no-hardcoded-font-styles (npm) | 2026-04-13T15:25:21Z | 2026-04-13T15:25:29Z |
| mal-2026-2579 | Malicious code in @bookiply/core (npm) | 2026-04-13T15:25:21Z | 2026-04-13T15:25:29Z |
| mal-2026-2578 | Malicious code in @bokehjs/core (npm) | 2026-04-13T15:25:21Z | 2026-04-13T15:25:22Z |
| mal-2026-2575 | Malicious code in @ascend-ops/web-client (npm) | 2026-04-13T15:25:21Z | 2026-04-16T15:42:07Z |
| mal-2026-2574 | Malicious code in @amplify-js/datastore (npm) | 2026-04-13T15:25:21Z | 2026-04-16T15:42:07Z |
| mal-2026-2573 | Malicious code in @aircall-ecosystem/integrations-msteams-frontend (npm) | 2026-04-13T15:25:21Z | 2026-04-13T15:25:22Z |
| mal-2026-2610 | Malicious code in twilio-video.js (npm) | 2026-04-13T15:25:20Z | 2026-04-13T15:25:20Z |
| mal-2026-2609 | Malicious code in trade-in-lib (npm) | 2026-04-13T15:25:20Z | 2026-04-13T15:25:24Z |
| mal-2026-2607 | Malicious code in stats-api-js-client (npm) | 2026-04-13T15:25:20Z | 2026-04-13T15:25:21Z |
| mal-2026-2604 | Malicious code in ih-icon (npm) | 2026-04-13T15:25:20Z | 2026-04-13T15:25:20Z |
| mal-2026-2602 | Malicious code in etsy-advocacy (npm) | 2026-04-13T15:25:20Z | 2026-04-13T15:25:21Z |
| mal-2026-2600 | Malicious code in cms-site-api-js-client (npm) | 2026-04-13T15:25:20Z | 2026-04-13T15:25:21Z |
| mal-2026-2599 | Malicious code in ccn-common-react-library (npm) | 2026-04-13T15:25:20Z | 2026-04-13T15:25:20Z |
| mal-2026-2598 | Malicious code in babel-plugin-fbtee (npm) | 2026-04-13T15:25:20Z | 2026-04-13T15:25:21Z |
| mal-2026-2608 | Malicious code in symphony-core (npm) | 2026-04-13T15:25:19Z | 2026-04-13T15:25:20Z |
| mal-2026-2606 | Malicious code in mdb-react-sortable (npm) | 2026-04-13T15:25:19Z | 2026-04-16T15:42:09Z |
| mal-2026-2605 | Malicious code in kaltura-ngx-client (npm) | 2026-04-13T15:25:19Z | 2026-04-13T15:25:24Z |
| mal-2026-2603 | Malicious code in experian-design-system-themes (npm) | 2026-04-13T15:25:19Z | 2026-04-13T15:25:20Z |
| mal-2026-2601 | Malicious code in dwaiter-company-web (npm) | 2026-04-13T15:25:19Z | 2026-04-13T15:25:20Z |
| mal-2026-2577 | Malicious code in @b2b-portal/kit (npm) | 2026-04-13T15:14:10Z | 2026-04-13T15:14:18Z |
| mal-2026-2576 | Malicious code in @b2b-portal/core (npm) | 2026-04-13T15:14:10Z | 2026-04-13T15:14:11Z |
| mal-2026-2572 | Malicious code in hiveos-setting (PyPI) | 2026-04-13T15:08:19Z | 2026-04-13T15:08:19Z |
| mal-2026-2571 | Malicious code in hiveos-settings (PyPI) | 2026-04-13T13:00:48Z | 2026-04-13T13:00:48Z |
| mal-2026-2635 | Malicious code in pubnub-element (npm) | 2026-04-13T06:14:25Z | 2026-04-17T04:45:54Z |
| mal-2026-2631 | Malicious code in babel-plugin-blocks (npm) | 2026-04-13T06:13:49Z | 2026-04-17T04:45:52Z |
| mal-2026-2636 | Malicious code in seaport-core-16 (npm) | 2026-04-13T06:13:35Z | 2026-04-17T04:45:55Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0420 | Google Chrome und Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2026-02-15T23:00:00.000+00:00 | 2026-02-17T23:00:00.000+00:00 |
| wid-sec-w-2026-0419 | vim (NetBeans): Schwachstelle ermöglicht Codeausführung | 2026-02-15T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0418 | Google Cloud Platform (Apigee): Schwachstelle ermöglicht Privilegieneskalation | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0417 | IBM Sterling Connect:Direct: Schwachstelle ermöglicht Denial of Service | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0416 | Keycloak: Schwachstelle ermöglicht Denial of Service | 2026-02-15T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0410 | HAProxy Enterprise, Community und ALOHA (QUIC): Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-12T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0409 | PostgreSQL: Mehrere Schwachstellen | 2026-02-12T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0408 | Red Hat OpenStack Services auf OpenShift (python-eventlet, keystone): Mehrere Schwachstellen | 2026-02-12T23:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0407 | OPNsense: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2026-02-12T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0406 | Nagios Enterprises Nagios XI: Mehrere Schwachstellen ermöglichen Codeausführung | 2026-02-12T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0405 | Grafana: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0403 | Apple macOS Tahoe, Sequoia und Sonoma: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-03-24T23:00:00.000+00:00 |
| wid-sec-w-2026-0402 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-03-24T23:00:00.000+00:00 |
| wid-sec-w-2026-0401 | Google Chrome: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0397 | Drupal Module (UI Icons, Quick Edit): Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2026-02-11T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0395 | BusyBox: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2026-0388 | Synacor Zimbra: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0383 | AMD Radeon: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0379 | Intel Prozessoren: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2026-0378 | IBM WebSphere Application Server: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-02-10T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0377 | Ivanti Endpoint Manager: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2026-02-10T23:00:00.000+00:00 | 2026-03-09T23:00:00.000+00:00 |
| wid-sec-w-2026-0376 | FreeBSD OS: Schwachstelle ermöglicht Denial of Service | 2026-02-10T23:00:00.000+00:00 | 2026-03-09T23:00:00.000+00:00 |
| wid-sec-w-2026-0369 | Microsoft Windows: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0367 | Microsoft DeveloperTools (Visual Studio Code und .NET): Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0362 | Red Hat Enterprise Linux (Lodash): Schwachstelle ermöglicht Denial of Service | 2026-02-10T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0361 | GIMP: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0359 | GnuTLS: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0357 | Roundcube: Mehrere Schwachstellen | 2026-02-09T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0355 | PowerDNS Recursor: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0353 | libpng: Schwachstelle ermöglicht Codeausführung | 2026-02-09T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-289-10 | Siemens HyperLynx and Industrial Edge App Publisher | 2025-10-14T00:00:00.000000Z | 2026-01-14T22:05:41.165529Z |
| icsa-25-289-09 | Siemens TeleControl Server Basic | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-289-08 | Siemens SINEC NMS | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-289-07 | Siemens SIMATIC ET 200SP Communication Processors | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-289-06 | Siemens SiPass Integrated | 2025-10-14T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-289-05 | Siemens Solid Edge | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| va-25-282-01 | Newforma Project Center multiple vulnerabilities | 2025-10-09T19:50:00Z | 2025-10-09T19:50:00Z |
| icsa-25-282-03 | Rockwell Automation Stratix | 2025-10-09T06:00:00.000000Z | 2025-10-09T06:00:00.000000Z |
| icsa-25-282-02 | Rockwell Automation Lifecycle Services with Cisco | 2025-10-09T06:00:00.000000Z | 2025-10-09T06:00:00.000000Z |
| va-25-280-01 | OPEXUS FOIAXpress stored XSS | 2025-10-07T22:50:29Z | 2025-10-07T22:50:29Z |
| icsa-25-280-01 | Delta Electronics DIAScreen | 2025-10-07T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-275-01 | Raise3D Pro2 Series 3D Printers** | 2025-10-02T05:00:00.000000Z | 2025-10-02T05:00:00.000000Z |
| icsa-25-289-11 | Hitachi Energy MACH GWS | 2025-09-30T12:50:29.000000Z | 2025-09-30T12:50:29.000000Z |
| icsa-25-275-02 | Hitachi Energy MSM | 2025-09-30T09:02:31.000000Z | 2025-09-30T09:02:31.000000Z |
| icsa-25-282-01 | Hitachi Energy Asset Suite (Update A) | 2025-09-30T08:50:13.000000Z | 2025-10-28T09:50:00.000000Z |
| icsa-25-273-06 | National Instruments Circuit Design Suite | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-05 | OpenPLC_V3 | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-04 | Festo Controller CECC-S,-LK,-D Family Firmware (Update A) | 2025-09-30T06:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-273-01 | MegaSys Enterprises Telenium Online Web Application | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-07 | LG Innotek Camera Multiple Models | 2025-09-30T05:00:00.000000Z | 2025-09-30T05:00:00.000000Z |
| va-25-273-01 | Microsoft Windows inconsistent driver blocking | 2025-09-30T00:00:00Z | 2025-09-30T00:00:00Z |
| va-25-272-01 | Medical Informatics Engineering Enterprise Health multiple vulnerabilities | 2025-09-29T00:00:00Z | 2025-09-29T00:00:00Z |
| icsa-25-268-01 | Dingtian DT-R002 | 2025-09-25T06:00:00.000000Z | 2025-09-25T06:00:00.000000Z |
| icsa-25-266-04 | Viessmann Vitogate 300 | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| icsa-25-266-02 | Mitsubishi Electric MELSEC-Q Series CPU Module | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| icsa-25-266-01 | AutomationDirect CLICK PLUS | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| va-25-265-01 | Airship AI MFA bypass and default credentials vulnerabilities | 2025-09-22T14:06:13Z | 2025-09-22T14:06:13Z |
| icsa-25-261-07 | Dover Fueling Solutions ProGauge MagLink LX4 Devices | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-06 | Cognex In-Sight Explorer and In-Sight Camera Firmware | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-03 | Schneider Electric Saitel DR & Saitel DP Remote Terminal Unit | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-n3kn9k-healthdos-eoqswk4g | Cisco Nexus 3000 and 9000 Series Switches Health Monitoring Diagnostics Denial of Service Vulnerability | 2025-02-26T16:00:00+00:00 | 2025-02-26T16:00:00+00:00 |
| cisco-sa-apic-multi-vulns-9ummtg5 | Cisco Application Policy Infrastructure Controller Vulnerabilities | 2025-02-26T16:00:00+00:00 | 2025-02-26T16:00:00+00:00 |
| cisco-sa-phone-info-disc-yyxswstk | Cisco Video Phone 8875 and Desk Phone 9800 Series Information Disclosure Vulnerability | 2025-02-19T16:00:00+00:00 | 2025-02-19T16:00:00+00:00 |
| cisco-sa-esa-mailpol-bypass-5nvcjzmw | Cisco Secure Email Gateway Email Filter Bypass Vulnerability | 2025-02-19T16:00:00+00:00 | 2025-02-19T16:00:00+00:00 |
| cisco-sa-broadworks-xss-gdpgj58p | Cisco BroadWorks Application Delivery Platform Cross-Site Scripting Vulnerability | 2025-02-19T16:00:00+00:00 | 2025-02-19T16:00:00+00:00 |
| cisco-sa-swa-range-bypass-2bsehysu | Cisco Secure Web Appliance Range Request Bypass Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-snmp-dos-sdxnsucw | Cisco IOS, IOS XE, and IOS XR Software SNMP Denial of Service Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-03-12T15:22:33+00:00 |
| cisco-sa-ise-xss-42tgsdmg | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-ise-multivuls-ftw9aoxf | Cisco Identity Services Engine Insecure Java Deserialization and Authorization Bypass Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-02-10T20:23:50+00:00 |
| cisco-sa-expressway-xss-uexuzrew | Cisco Expressway Series Cross-Site Scripting Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-esa-sma-xss-wck2wcug | Cisco Secure Email and Web Manager and Secure Email Gateway Cross-Site Scripting Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-esa-sma-wsa-snmp-inf-fqpvl8sx | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance SNMP Polling Information Disclosure Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-esa-sma-wsa-multi-ykujhs34 | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-02-07T19:21:57+00:00 |
| cisco-sa-cmm-privesc-uy2vf8pc | Cisco Meeting Management REST API Privilege Escalation Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-clamav-ole2-h549rpha | ClamAV OLE2 File Format Decryption Denial of Service Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-bw-sip-dos-msysbrmt | Cisco BroadWorks SIP Denial of Service Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-xwork-xss-kccg7wwu | Cisco Crosswork Network Controller Stored Cross-Site Scripting Vulnerabilities | 2025-01-08T16:00:00+00:00 | 2025-01-08T16:00:00+00:00 |
| cisco-sa-thousandeyes-cert-pqtjuv9n | Cisco ThousandEyes Endpoint Agent for MacOS and RoomOS Certificate Validation Vulnerability | 2025-01-08T16:00:00+00:00 | 2025-01-13T22:15:18+00:00 |
| cisco-sa-cspc-xss-cdojzyh | Cisco Common Services Platform Collector Cross-Site Scripting Vulnerabilities | 2025-01-08T16:00:00+00:00 | 2025-01-08T16:00:00+00:00 |
| cisco-sa-nxos-image-sig-bypas-pqdrqvjl | Cisco NX-OS Software Image Verification Bypass Vulnerability | 2024-12-04T16:00:00+00:00 | 2025-04-07T16:43:32+00:00 |
| cisco-sa-phone-infodisc-sbyqqvbg | Cisco 7800, 8800, and 9800 Series Phones Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ndfc-sqli-cyppaxrl | Cisco Nexus Dashboard Fabric Controller SQL Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-mpp-xss-8tav2tvf | Cisco 6800, 7800, 8800, and 9800 Series Phones with Multiplatform Firmware Stored Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vulns-af544ed5 | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vuln-dbqdwry | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-auth-bypass-bbrf7mke | Cisco Identity Services Engine Authorization Bypass and Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-imp-inf-disc-cupkua5n | Cisco Unified Communications Manager IM & Presence Service Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-esa-wsa-sma-xss-zym3f49n | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-epnmpi-sxss-yyf2zkxs | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ece-dos-oqb9ufev | Cisco Enterprise Chat and Email Denial of Service Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-34479 | Apache Log4j 1 to Log4j 2 bridge: Silent log event loss in Log4j1XmlLayout due to unescaped XML 1.0 forbidden characters | 2026-04-02T00:00:00.000Z | 2026-04-15T01:05:18.000Z |
| msrc_cve-2026-34477 | Apache Log4j Core: verifyHostName attribute silently ignored in TLS configuration, allowing hostname verification bypass | 2026-04-02T00:00:00.000Z | 2026-04-13T14:41:08.000Z |
| msrc_cve-2026-34446 | ONNX: Arbitrary File Read via ExternalData Hardlink Bypass in ONNX load | 2026-04-02T00:00:00.000Z | 2026-04-09T01:02:48.000Z |
| msrc_cve-2026-34445 | ONNX: Malicious ONNX models can crash servers by exploiting unprotected object settings. | 2026-04-02T00:00:00.000Z | 2026-04-09T01:02:56.000Z |
| msrc_cve-2026-33948 | jq: Embedded-NUL Truncation in CLI JSON Input Path Causes Prefix-Only Validation of Malformed Input | 2026-04-02T00:00:00.000Z | 2026-04-17T01:01:34.000Z |
| msrc_cve-2026-33947 | jq: Unbounded Recursion in jv_setpath(), jv_getpath() and delpaths_sorted() | 2026-04-02T00:00:00.000Z | 2026-04-17T01:01:26.000Z |
| msrc_cve-2026-33810 | Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509 | 2026-04-02T00:00:00.000Z | 2026-04-14T14:47:37.000Z |
| msrc_cve-2026-33555 | CVE-2026-33555 | 2026-04-02T00:00:00.000Z | 2026-04-15T01:01:51.000Z |
| msrc_cve-2026-32316 | jq: Integer overflow in jvp_string_append() allows Heap-based Buffer Overflow | 2026-04-02T00:00:00.000Z | 2026-04-17T01:01:17.000Z |
| msrc_cve-2026-32289 | JsBraceDepth Context Tracking Bugs (XSS) in html/template | 2026-04-02T00:00:00.000Z | 2026-04-14T14:46:40.000Z |
| msrc_cve-2026-32288 | Unbounded allocation for old GNU sparse in archive/tar | 2026-04-02T00:00:00.000Z | 2026-04-15T01:46:07.000Z |
| msrc_cve-2026-32283 | Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection retention and DoS in crypto/tls | 2026-04-02T00:00:00.000Z | 2026-04-15T01:47:16.000Z |
| msrc_cve-2026-32282 | TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix | 2026-04-02T00:00:00.000Z | 2026-04-15T01:48:20.000Z |
| msrc_cve-2026-32281 | Inefficient policy validation in crypto/x509 | 2026-04-02T00:00:00.000Z | 2026-04-15T01:46:32.000Z |
| msrc_cve-2026-32280 | Unexpected work during chain building in crypto/x509 | 2026-04-02T00:00:00.000Z | 2026-04-15T01:47:43.000Z |
| msrc_cve-2026-3184 | Util-linux: util-linux: access control bypass due to improper hostname canonicalization | 2026-04-02T00:00:00.000Z | 2026-04-14T14:44:51.000Z |
| msrc_cve-2026-31790 | Incorrect Failure Handling in RSA KEM RSASVE Encapsulation | 2026-04-02T00:00:00.000Z | 2026-04-10T14:39:43.000Z |
| msrc_cve-2026-31789 | Heap Buffer Overflow in Hexadecimal Conversion | 2026-04-02T00:00:00.000Z | 2026-04-15T01:45:06.000Z |
| msrc_cve-2026-31428 | netfilter: nfnetlink_log: fix uninitialized padding leak in NFULA_PAYLOAD | 2026-04-02T00:00:00.000Z | 2026-04-14T01:02:38.000Z |
| msrc_cve-2026-31427 | netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp | 2026-04-02T00:00:00.000Z | 2026-04-14T01:02:11.000Z |
| msrc_cve-2026-31426 | ACPI: EC: clean up handlers on probe failure in acpi_ec_setup() | 2026-04-02T00:00:00.000Z | 2026-04-14T01:02:16.000Z |
| msrc_cve-2026-31424 | netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP | 2026-04-02T00:00:00.000Z | 2026-04-14T01:01:49.000Z |
| msrc_cve-2026-31423 | net/sched: sch_hfsc: fix divide-by-zero in rtsc_min() | 2026-04-02T00:00:00.000Z | 2026-04-14T01:01:43.000Z |
| msrc_cve-2026-31422 | net/sched: cls_flow: fix NULL pointer dereference on shared blocks | 2026-04-02T00:00:00.000Z | 2026-04-14T01:01:59.000Z |
| msrc_cve-2026-31421 | net/sched: cls_fw: fix NULL pointer dereference on shared blocks | 2026-04-02T00:00:00.000Z | 2026-04-14T01:02:33.000Z |
| msrc_cve-2026-31420 | bridge: mrp: reject zero test interval to avoid OOM panic | 2026-04-02T00:00:00.000Z | 2026-04-14T01:02:27.000Z |
| msrc_cve-2026-31419 | net: bonding: fix use-after-free in bond_xmit_broadcast() | 2026-04-02T00:00:00.000Z | 2026-04-14T01:02:22.000Z |
| msrc_cve-2026-31418 | netfilter: ipset: drop logically empty buckets in mtype_del | 2026-04-02T00:00:00.000Z | 2026-04-14T01:44:36.000Z |
| msrc_cve-2026-31417 | net/x25: Fix overflow when accumulating packets | 2026-04-02T00:00:00.000Z | 2026-04-14T01:01:54.000Z |
| msrc_cve-2026-31416 | netfilter: nfnetlink_log: account for netlink header size | 2026-04-02T00:00:00.000Z | 2026-04-14T01:01:38.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0287 | Kwetsbaarheden verholpen in Cisco NX-OS Software | 2025-09-11T08:18:37.706725Z | 2025-09-11T08:18:37.706725Z |
| ncsc-2025-0286 | Kwetsbaarheden verholpen in Cisco IOS XR Software | 2025-09-11T08:14:36.960621Z | 2025-09-11T08:14:36.960621Z |
| ncsc-2025-0285 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-09-10T11:01:43.415733Z | 2025-09-10T11:01:43.415733Z |
| ncsc-2025-0284 | Kwetsbaarheid verholpen in Adobe Commerce en Magento | 2025-09-10T10:49:56.787627Z | 2025-09-10T10:49:56.787627Z |
| ncsc-2025-0283 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-09-10T10:46:54.808276Z | 2025-09-10T10:46:54.808276Z |
| ncsc-2025-0282 | Kwetsbaarheid verholpen in Adobe Dreamweaver | 2025-09-10T10:38:24.553749Z | 2025-09-10T10:38:24.553749Z |
| ncsc-2025-0281 | Kwetsbaarheid verholpen in Adobe ColdFusion | 2025-09-10T10:24:09.409410Z | 2025-09-10T10:24:09.409410Z |
| ncsc-2025-0280 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2025-09-09T18:27:39.956624Z | 2025-09-09T18:27:39.956624Z |
| ncsc-2025-0279 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-09-09T18:25:53.539582Z | 2025-09-09T18:25:53.539582Z |
| ncsc-2025-0278 | Kwetsbaarheden verholpen in Microsoft Office | 2025-09-09T18:23:23.763765Z | 2025-09-09T18:23:23.763765Z |
| ncsc-2025-0277 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-09-09T18:22:30.766030Z | 2025-09-09T18:22:30.766030Z |
| ncsc-2025-0276 | Kwetsbaarheden verholpen in Schneider Electric Saitel | 2025-09-09T15:16:00.122647Z | 2025-09-09T15:16:00.122647Z |
| ncsc-2025-0275 | Kwetsbaarheden verholpen in SAP producten | 2025-09-09T11:12:22.945466Z | 2025-09-09T11:12:22.945466Z |
| ncsc-2025-0274 | Kwetsbaarheden verholpen in Siemens producten | 2025-09-09T11:06:34.785987Z | 2025-09-09T11:06:34.785987Z |
| ncsc-2025-0273 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-09-04T08:15:14.806733Z | 2025-09-04T08:15:14.806733Z |
| ncsc-2025-0272 | Kwetsbaarheid verholpen in FreePBX | 2025-08-29T08:37:54.893549Z | 2025-08-29T08:37:54.893549Z |
| ncsc-2025-0271 | Kwetsbaarheden verholpen in Arcserve Unified Data Protection | 2025-08-28T12:56:02.228992Z | 2025-08-28T12:56:02.228992Z |
| ncsc-2025-0270 | Kwetsbaarheden verholpen in Cisco NX-OS Software | 2025-08-28T08:36:20.358948Z | 2025-08-28T08:36:20.358948Z |
| ncsc-2025-0269 | Kwetsbaarheden verholpen in IBM Cognos Command Center | 2025-08-27T13:10:59.965070Z | 2025-08-27T13:10:59.965070Z |
| ncsc-2025-0268 | Kwetsbaarheden verholpen in Citrix NetScaler ADC en Gateway | 2025-08-26T13:11:42.925280Z | 2025-08-26T17:34:30.428328Z |
| ncsc-2025-0267 | Kwetsbaarheden verholpen in Foxit Reader | 2025-08-25T11:26:17.380689Z | 2025-08-25T11:26:17.380689Z |
| ncsc-2025-0266 | Kwetsbaarheid verholpen in Apple MacOS, iOS en iPadOS | 2025-08-22T05:49:07.556948Z | 2025-08-25T12:16:10.430485Z |
| ncsc-2025-0265 | Kwetsbaarheden verholpen in Commvault | 2025-08-20T12:15:48.655099Z | 2025-08-20T12:15:48.655099Z |
| ncsc-2025-0264 | Kwetsbaarheden verholpen in Cisco Secure Firewall Software | 2025-08-15T08:52:41.012811Z | 2025-08-15T08:52:41.012811Z |
| ncsc-2025-0263 | Kwetsbaarheden verholpen in N-able N-Central | 2025-08-14T12:38:27.349283Z | 2025-08-14T12:38:27.349283Z |
| ncsc-2025-0262 | Kwetsbaarheden verholpen in Xerox FreeFlow Core | 2025-08-14T07:00:50.843871Z | 2025-08-14T07:00:50.843871Z |
| ncsc-2025-0261 | Kwetsbaarheden verholpen in Adobe InCopy | 2025-08-13T10:13:59.220398Z | 2025-08-13T10:13:59.220398Z |
| ncsc-2025-0260 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-08-13T10:12:35.130811Z | 2025-08-13T10:12:35.130811Z |
| ncsc-2025-0259 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2025-08-13T10:11:22.733287Z | 2025-08-13T10:11:22.733287Z |
| ncsc-2025-0258 | Kwetsbaarheden verholpen in Adobe InDesign | 2025-08-13T10:05:31.442414Z | 2025-08-13T10:05:31.442414Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10280-1 | incus-6.22-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10279-1 | c3p0-0.12.0-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10278-1 | ImageMagick-7.1.2.15-2.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:20308-1 | Security update for go1.24-openssl | 2026-03-03T17:46:58Z | 2026-03-03T17:46:58Z |
| opensuse-su-2026:20306-1 | Security update for expat | 2026-03-03T16:13:34Z | 2026-03-03T16:13:34Z |
| opensuse-su-2026:20305-1 | Security update for podman | 2026-03-03T16:13:34Z | 2026-03-03T16:13:34Z |
| opensuse-su-2026:20318-1 | Security update for gitea-tea | 2026-03-03T14:44:11Z | 2026-03-03T14:44:11Z |
| opensuse-su-2026:20301-1 | Security update for go1.25-openssl | 2026-03-03T09:04:46Z | 2026-03-03T09:04:46Z |
| opensuse-su-2026:20298-1 | Security update for assertj-core | 2026-03-02T16:00:38Z | 2026-03-02T16:00:38Z |
| opensuse-su-2026:20297-1 | Security update for rhino | 2026-03-02T16:00:37Z | 2026-03-02T16:00:37Z |
| opensuse-su-2026:20295-1 | Security update for cpp-httplib | 2026-03-02T10:20:20Z | 2026-03-02T10:20:20Z |
| opensuse-su-2026:10277-1 | python311-pypdf-6.7.5-1.1 on GA media | 2026-03-02T00:00:00Z | 2026-03-02T00:00:00Z |
| opensuse-su-2026:20292-1 | Security update for python-azure-core | 2026-03-01T15:59:49Z | 2026-03-01T15:59:49Z |
| opensuse-su-2026:10276-1 | libsoup-3_0-0-3.6.6-2.1 on GA media | 2026-03-01T00:00:00Z | 2026-03-01T00:00:00Z |
| opensuse-su-2026:10275-1 | gvfs-1.58.2-1.1 on GA media | 2026-03-01T00:00:00Z | 2026-03-01T00:00:00Z |
| opensuse-su-2026:20291-1 | Security update for fluidsynth | 2026-02-27T13:36:22Z | 2026-02-27T13:36:22Z |
| opensuse-su-2026:20290-1 | Security update for haproxy | 2026-02-27T13:15:21Z | 2026-02-27T13:15:21Z |
| opensuse-su-2026:20287-1 | Security update for the Linux Kernel | 2026-02-27T13:03:55Z | 2026-02-27T13:03:55Z |
| opensuse-su-2026:20288-1 | Security update for the initial kernel livepatch | 2026-02-27T11:50:22Z | 2026-02-27T11:50:22Z |
| opensuse-su-2026:20283-1 | Security update for libsoup2 | 2026-02-27T08:52:33Z | 2026-02-27T08:52:33Z |
| opensuse-su-2026:20281-1 | Security update for kubevirt | 2026-02-27T08:51:11Z | 2026-02-27T08:51:11Z |
| opensuse-su-2026:10274-1 | libwireshark19-4.6.4-1.1 on GA media | 2026-02-27T00:00:00Z | 2026-02-27T00:00:00Z |
| opensuse-su-2026:10273-1 | libudisks2-0-2.11.0-2.1 on GA media | 2026-02-27T00:00:00Z | 2026-02-27T00:00:00Z |
| opensuse-su-2026:10272-1 | libIex-3_4-33-3.4.5-1.1 on GA media | 2026-02-27T00:00:00Z | 2026-02-27T00:00:00Z |
| opensuse-su-2026:10271-1 | libjxl-devel-0.11.2-1.1 on GA media | 2026-02-27T00:00:00Z | 2026-02-27T00:00:00Z |
| opensuse-su-2026:10270-1 | gosec-2.24.0-1.1 on GA media | 2026-02-27T00:00:00Z | 2026-02-27T00:00:00Z |
| opensuse-su-2026:10269-1 | cockpit-podman-120-2.1 on GA media | 2026-02-27T00:00:00Z | 2026-02-27T00:00:00Z |
| opensuse-su-2026:10268-1 | cockpit-356-2.1 on GA media | 2026-02-27T00:00:00Z | 2026-02-27T00:00:00Z |
| opensuse-su-2026:10267-1 | ImageMagick-7.1.2.15-1.1 on GA media | 2026-02-27T00:00:00Z | 2026-02-27T00:00:00Z |
| opensuse-su-2026:20279-1 | Security update for containerized-data-importer | 2026-02-26T16:03:48Z | 2026-02-26T16:03:48Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:6184 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.19 security, enhancement & bug fix update | 2026-03-30T13:41:49+00:00 | 2026-04-14T09:46:54+00:00 |
| rhsa-2026:6174 | Red Hat Security Advisory: Red Hat Developer Hub 1.8.5 release. | 2026-03-30T12:51:47+00:00 | 2026-04-13T18:52:07+00:00 |
| rhsa-2026:6170 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.21.1 | 2026-03-30T12:14:24+00:00 | 2026-04-14T07:59:31+00:00 |
| rhsa-2026:6153 | Red Hat Security Advisory: kernel security update | 2026-03-30T11:32:45+00:00 | 2026-04-13T07:08:47+00:00 |
| rhsa-2026:6006 | Red Hat Security Advisory: opencryptoki security update | 2026-03-30T11:08:03+00:00 | 2026-03-30T17:25:24+00:00 |
| rhsa-2026:6037 | Red Hat Security Advisory: kernel security update | 2026-03-30T11:05:54+00:00 | 2026-04-13T07:08:47+00:00 |
| rhsa-2026:6005 | Red Hat Security Advisory: freerdp security update | 2026-03-30T11:03:30+00:00 | 2026-04-09T14:38:00+00:00 |
| rhsa-2026:6007 | Red Hat Security Advisory: python security update | 2026-03-30T11:02:34+00:00 | 2026-04-09T15:17:10+00:00 |
| rhsa-2026:6004 | Red Hat Security Advisory: freerdp security update | 2026-03-30T11:02:09+00:00 | 2026-04-09T14:38:01+00:00 |
| rhsa-2026:6008 | Red Hat Security Advisory: python3 security update | 2026-03-30T11:01:54+00:00 | 2026-04-09T15:17:10+00:00 |
| rhsa-2026:6011 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.17 security update | 2026-03-30T11:00:14+00:00 | 2026-04-08T13:32:27+00:00 |
| rhsa-2026:6012 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.14 security update | 2026-03-30T11:00:07+00:00 | 2026-04-08T13:32:23+00:00 |
| rhsa-2026:6036 | Red Hat Security Advisory: kernel-rt security update | 2026-03-30T10:58:10+00:00 | 2026-04-13T07:08:47+00:00 |
| rhsa-2026:6166 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.21.1 | 2026-03-30T10:40:40+00:00 | 2026-04-14T07:59:31+00:00 |
| rhsa-2026:6053 | Red Hat Security Advisory: kernel security update | 2026-03-30T10:03:59+00:00 | 2026-04-08T04:28:16+00:00 |
| rhsa-2026:6055 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.7.1 | 2026-03-30T07:07:31+00:00 | 2026-04-14T07:59:31+00:00 |
| rhsa-2026:5971 | Red Hat Security Advisory: Satellite 6.16.7 Async Update | 2026-03-26T20:30:38+00:00 | 2026-04-13T19:35:47+00:00 |
| rhsa-2026:5970 | Red Hat Security Advisory: Satellite 6.17.7 Async Update | 2026-03-26T20:28:38+00:00 | 2026-04-13T19:35:45+00:00 |
| rhsa-2026:5968 | Red Hat Security Advisory: Satellite 6.18.4 Async Update | 2026-03-26T19:47:53+00:00 | 2026-04-14T09:46:53+00:00 |
| rhsa-2026:5958 | Red Hat Security Advisory: libtiff security update | 2026-03-26T17:50:08+00:00 | 2026-04-09T20:34:29+00:00 |
| rhsa-2026:5952 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.2.3 | 2026-03-26T15:03:15+00:00 | 2026-04-14T07:59:30+00:00 |
| rhsa-2026:5950 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.1.6 | 2026-03-26T14:51:43+00:00 | 2026-04-14T07:59:30+00:00 |
| rhsa-2026:5948 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.0.9 | 2026-03-26T14:31:40+00:00 | 2026-04-14T07:59:30+00:00 |
| rhsa-2026:5944 | Red Hat Security Advisory: golang security update | 2026-03-26T14:09:22+00:00 | 2026-04-14T07:28:10+00:00 |
| rhsa-2026:5942 | Red Hat Security Advisory: golang security update | 2026-03-26T13:53:57+00:00 | 2026-04-14T07:28:14+00:00 |
| rhsa-2026:5943 | Red Hat Security Advisory: golang security update | 2026-03-26T13:47:37+00:00 | 2026-04-14T06:51:07+00:00 |
| rhsa-2026:5941 | Red Hat Security Advisory: golang security update | 2026-03-26T13:40:22+00:00 | 2026-04-14T07:28:17+00:00 |
| rhsa-2026:5939 | Red Hat Security Advisory: freerdp security update | 2026-03-26T12:23:05+00:00 | 2026-04-09T14:38:00+00:00 |
| rhsa-2026:5936 | Red Hat Security Advisory: freerdp security update | 2026-03-26T11:40:05+00:00 | 2026-04-09T14:38:03+00:00 |
| rhsa-2026:5932 | Red Hat Security Advisory: firefox security update | 2026-03-26T11:38:50+00:00 | 2026-04-13T15:26:47+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2020-287-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-10-13T00:00:00.000Z | 2025-06-10T04:00:00.000Z |
| sevd-2020-252-01 | SCADAPack x70 Remote Connect and SCADAPack x70 Security Administrator | 2020-09-08T00:00:00.000Z | 2021-02-09T00:00:00.000Z |
| sevd-2020-224-08 | Schneider Electric PACTware | 2020-08-11T00:00:00.000Z | 2020-08-13T00:00:00.000Z |
| sevd-2020-224-07 | SoMove | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-06 | Harmony® eXLhoist | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-05 | PowerChute Business Edition | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-04 | APC Easy UPS On-Line Software | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-03 | Modicon M218 Logic Controller | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-02 | spaceLYnk & Wiser for KNX (formerly homeLYnk) | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-01 | Schneider Electric Modbus Serial Driver | 2020-08-11T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-196-01 | Schneider Electric Software Update (SESU) | 2020-07-14T00:00:00.000Z | 2020-07-14T00:00:00.000Z |
| sevd-2020-175-01 | Treck TCP/IP Vulnerabilities (Ripple20) | 2020-06-23T16:00:00.000Z | 2022-08-08T13:57:08.970Z |
| sevd-2020-174-01 | APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices | 2020-06-22T00:00:00.000Z | 2021-06-30T00:00:00.000Z |
| sevd-2020-161-05 | Easergy Builder | 2020-06-09T00:00:00.000Z | 2021-05-13T00:00:00.000Z |
| sevd-2020-161-04 | Easergy T300 | 2020-06-09T00:00:00.000Z | 2021-05-13T00:00:00.000Z |
| sevd-2020-161-03 | Modicon LMC078 Logic Controller additional URGENT/11 Fix | 2020-06-09T00:00:00.000Z | 2020-06-09T00:00:00.000Z |
| sevd-2020-161-01 | Modicon M218 Logic Controller | 2020-06-09T00:00:00.000Z | 2020-06-09T00:00:00.000Z |
| sevd-2020-133-03 | U.motion Servers and Touch Panels | 2020-05-12T00:00:00.000Z | 2021-04-15T00:00:00.000Z |
| sevd-2020-133-02 | Vijeo Designer and Vijeo Designer Basic Software | 2020-05-12T00:00:00.000Z | 2020-08-14T00:00:00.000Z |
| sevd-2020-105-03 | Vijeo Designer and Vijeo Designer Basic | 2020-04-14T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-105-02 | Modicon M218/M241/M251/M258 Logic Controllers,SoMachine/SoMachine Motion, EcoStruxure™ Machine Expert | 2020-04-14T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| sevd-2020-105-01 | Modicon M100/M200/M221 controllers, SoMachine Basic and EcoStruxure Machine Expert - Basic Programming Software | 2020-04-14T00:00:00.000Z | 2020-04-14T00:00:00.000Z |
| sevd-2020-080-01 | Modicon Controllers, EcoStruxure™ Control Expert and Unity Pro Programming Software | 2020-03-20T00:00:00.000Z | 2021-05-11T00:00:00.000Z |
| sevd-2020-070-04 | Andover Continuum System | 2020-03-10T00:00:00.000Z | 2020-05-12T00:00:00.000Z |
| sevd-2020-070-03 | ZigBee Installation Toolkit | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-070-02 | Modicon Quantum Ethernet Network module and Quantum / Premium COPRO | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-070-01 | IGSS (Interactive Graphical SCADA System) | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-042-01 | ProSoft Configurator for Modicon PMEPXM0100 (H) | 2020-02-11T00:00:00.000Z | 2020-02-11T00:00:00.000Z |
| sevd-2020-014-01 | MSX Configurator | 2020-01-14T00:00:00.000Z | 2020-01-14T00:00:00.000Z |
| sevd-2019-281-02 | Modicon Controllers | 2019-09-26T12:53:28.000Z | 2024-08-13T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-077170 | SSA-077170: Multiple Vulnerabilities in SINEC INS before V1.0 SP2 Update 2 | 2023-12-12T00:00:00Z | 2023-12-12T00:00:00Z |
| ssa-068047 | SSA-068047: Multiple Vulnerabilities in SCALANCE M-800 Family Before V7.2.2 | 2023-12-12T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-887122 | SSA-887122: X_T File Parsing Vulnerabilities in Simcenter Femap | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-699386 | SSA-699386: Multiple Vulnerabilities in SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family before V4.5 | 2023-11-14T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-625850 | SSA-625850: Multiple WIBU Systems CodeMeter Vulnerabilities Affecting the Desigo CC Product Family and SENTRON powermanager | 2023-11-14T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-617233 | SSA-617233: Urgent/11 TCP/IP Stack Vulnerabilities in SIPROTEC 4 7SJ66 Devices | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-478780 | SSA-478780: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-457702 | SSA-457702: Wi-Fi Encryption Bypass Vulnerabilities in SCALANCE W700 Product Family | 2023-11-14T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-456933 | SSA-456933: Multiple Vulnerabilities in SIMATIC PCS neo before V4.1 | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-292063 | SSA-292063: Multiple Vulnerabilities in Nozomi Guardian/CMC before 22.6.3 and 23.1.0 on RUGGEDCOM APE1808 devices | 2023-11-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-268517 | SSA-268517: Code Execution Vulnerability (libwebp CVE-2023-4863) in Mendix Studio Pro | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-197270 | SSA-197270: Information Disclosure Vulnerability in Siemens OPC UA Modeling Editor (SiOME) | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-150063 | SSA-150063: Multiple Vulnerabilities in SINEC PNI before V2.0 | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-137900 | SSA-137900: Multiple Vulnerabilities in COMOS | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-099606 | SSA-099606: Multiple Vulnerabilities in SIMATIC MV500 before V3.3.5 | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-084182 | SSA-084182: Privilege Escalation Vulnerability in Mendix Runtime | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-843070 | SSA-843070: Multiple Vulnerabilities in SCALANCE W1750D | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-829656 | SSA-829656: Stack Overflow Vulnerability in Xpedition Layout Browser | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-784849 | SSA-784849: Direct Memory Access Vulnerabilities in SIMATIC CP Devices | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-770890 | SSA-770890: Path Traversal Vulnerability in the Web Server of CPCI85 Firmware of SICAM A8000 Devices | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-647455 | SSA-647455: Multiple Vulnerabilities in Nozomi Guardian/CMC before 22.6.2 on RUGGEDCOM APE1808 devices | 2023-10-10T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-594373 | SSA-594373: Cross-Site-Scripting (XSS) Vulnerability in SINEMA Server V14 | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-524778 | SSA-524778: File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-386812 | SSA-386812: Remote Code Execution Vulnerability in Simcenter Amesim before V2021.1 | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-295483 | SSA-295483: User Enumeration Vulnerability in Mendix Forgot Password Module | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-160243 | SSA-160243: Multiple Vulnerabilities in SINEC NMS before V2.0 | 2023-10-10T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-134651 | SSA-134651: Hard Coded SSH ID in CPCI85 Firmware of SICAM A8000 Devices | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-035466 | SSA-035466: Incorrect Permission Assignment in SICAM PAS/PQS | 2023-10-10T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-646240 | SSA-646240: Sensitive Information Disclosure in SIMATIC PCS neo Administration Console | 2023-09-14T00:00:00Z | 2023-09-14T00:00:00Z |
| ssa-357182 | SSA-357182: Local Privilege Escalation Vulnerability in Spectrum Power 7 | 2023-09-14T00:00:00Z | 2023-09-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21004-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise 16) | 2026-04-09T08:48:26Z | 2026-04-09T08:48:26Z |
| suse-ru-2026:1228-1 | Recommended update for shadow | 2026-04-09T08:27:26Z | 2026-04-09T08:27:26Z |
| suse-su-2026:1225-1 | Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise 15 SP6) | 2026-04-09T01:53:43Z | 2026-04-09T01:53:43Z |
| suse-su-2026:1222-1 | Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) | 2026-04-08T20:04:54Z | 2026-04-08T20:04:54Z |
| suse-su-2026:21065-1 | Security update for openssl-3 | 2026-04-08T16:32:18Z | 2026-04-08T16:32:18Z |
| suse-su-2026:1221-1 | Security update for the Linux Kernel (Live Patch 67 for SUSE Linux Enterprise 12 SP5) | 2026-04-08T16:04:43Z | 2026-04-08T16:04:43Z |
| suse-su-2026:21037-1 | Security update for openssl-3 | 2026-04-08T15:00:50Z | 2026-04-08T15:00:50Z |
| suse-su-2026:1218-1 | Security update for python-requests | 2026-04-08T14:39:49Z | 2026-04-08T14:39:49Z |
| suse-su-2026:21036-1 | Security update for python-requests | 2026-04-08T14:30:11Z | 2026-04-08T14:30:11Z |
| suse-su-2026:21035-1 | Security update for libtpms | 2026-04-08T14:28:41Z | 2026-04-08T14:28:41Z |
| suse-su-2026:21064-1 | Security update for libtpms | 2026-04-08T14:17:58Z | 2026-04-08T14:17:58Z |
| suse-su-2026:21063-1 | Security update for python-requests | 2026-04-08T14:11:12Z | 2026-04-08T14:11:12Z |
| suse-su-2026:1217-1 | Security update for freerdp | 2026-04-08T12:28:33Z | 2026-04-08T12:28:33Z |
| suse-su-2026:1216-1 | Security update for openssl-1_1 | 2026-04-08T12:28:22Z | 2026-04-08T12:28:22Z |
| suse-su-2026:1215-1 | Security update for openssl-3 | 2026-04-08T12:27:58Z | 2026-04-08T12:27:58Z |
| suse-su-2026:1214-1 | Security update for openssl-3 | 2026-04-08T12:27:45Z | 2026-04-08T12:27:45Z |
| suse-su-2026:1213-1 | Security update for openssl-3 | 2026-04-08T12:27:10Z | 2026-04-08T12:27:10Z |
| suse-su-2026:1051-1 | Security update for vim | 2026-04-08T11:40:57Z | 2026-04-08T11:40:57Z |
| suse-su-2026:1212-1 | Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5) | 2026-04-08T10:04:46Z | 2026-04-08T10:04:46Z |
| suse-su-2026:1209-1 | Security update for bind | 2026-04-08T07:12:41Z | 2026-04-08T07:12:41Z |
| suse-su-2026:1208-1 | Security update for ignition | 2026-04-08T07:12:23Z | 2026-04-08T07:12:23Z |
| suse-su-2026:21062-1 | Security update for expat | 2026-04-07T18:52:31Z | 2026-04-07T18:52:31Z |
| suse-su-2026:21003-1 | Security update for systemd | 2026-04-07T15:06:51Z | 2026-04-07T15:06:51Z |
| suse-su-2026:21002-1 | Security update for tar | 2026-04-07T14:59:15Z | 2026-04-07T14:59:15Z |
| suse-su-2026:1095-1 | Security update for vim | 2026-04-07T14:35:54Z | 2026-04-07T14:35:54Z |
| suse-su-2026:0910-1 | Security update for vim | 2026-04-07T14:35:08Z | 2026-04-07T14:35:08Z |
| suse-su-2026:21001-1 | Security update for libtasn1 | 2026-04-07T14:32:32Z | 2026-04-07T14:32:32Z |
| suse-su-2026:1206-1 | Security update for python | 2026-04-07T14:18:48Z | 2026-04-07T14:18:48Z |
| suse-su-2026:1203-1 | Security update for ImageMagick | 2026-04-07T12:24:55Z | 2026-04-07T12:24:55Z |
| suse-su-2026:1202-1 | Security update for ImageMagick | 2026-04-07T12:24:42Z | 2026-04-07T12:24:42Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:2799 | Moderate: php security update | 2026-02-17T00:00:00Z | 2026-02-18T13:30:42Z |
| alsa-2026:2786 | Moderate: glibc security update | 2026-02-17T00:00:00Z | 2026-02-18T13:44:36Z |
| alsa-2026:2783 | Important: nodejs:20 security update | 2026-02-17T00:00:00Z | 2026-02-23T13:24:32Z |
| alsa-2026:2782 | Important: nodejs:22 security update | 2026-02-17T00:00:00Z | 2026-02-23T13:22:00Z |
| alsa-2026:2781 | Important: nodejs:24 security update | 2026-02-17T00:00:00Z | 2026-02-18T13:51:36Z |
| alsa-2026:2776 | Moderate: edk2 security update | 2026-02-17T00:00:00Z | 2026-02-18T13:48:45Z |
| alsa-2026:2722 | Moderate: kernel security update | 2026-02-16T00:00:00Z | 2026-02-23T13:18:53Z |
| alsa-2026:2721 | Moderate: kernel security update | 2026-02-16T00:00:00Z | 2026-02-23T13:34:16Z |
| alsa-2026:2720 | Moderate: kernel security update | 2026-02-16T00:00:00Z | 2026-02-23T13:27:24Z |
| alsa-2026:2719 | Important: gnupg2 security update | 2026-02-16T00:00:00Z | 2026-02-18T13:46:37Z |
| alsa-2026:2709 | Important: golang security update | 2026-02-16T00:00:00Z | 2026-02-17T10:27:57Z |
| alsa-2026:2708 | Important: go-toolset:rhel8 security update | 2026-02-16T00:00:00Z | 2026-02-16T14:22:53Z |
| alsa-2026:2707 | Important: gimp security update | 2026-02-16T00:00:00Z | 2026-02-17T10:29:58Z |
| alsa-2026:2706 | Important: golang security update | 2026-02-16T00:00:00Z | 2026-02-18T13:54:31Z |
| alsa-2026:2627 | Moderate: gcc-toolset-14-binutils security update | 2026-02-12T00:00:00Z | 2026-02-13T08:03:55Z |
| alsa-2026:2470 | Moderate: php:7.4 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:10:23Z |
| alsa-2026:2452 | Important: pcs security update | 2026-02-10T00:00:00Z | 2026-02-12T10:12:36Z |
| alsa-2026:2438 | Important: pcs security update | 2026-02-10T00:00:00Z | 2026-02-12T10:14:13Z |
| alsa-2026:2422 | Important: nodejs:20 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:15:50Z |
| alsa-2026:2421 | Important: nodejs:22 security update | 2026-02-10T00:00:00Z | 2026-02-13T10:53:31Z |
| alsa-2026:2420 | Important: nodejs:24 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:19:24Z |
| alsa-2026:2419 | Moderate: python3.12 security update | 2026-02-10T00:00:00Z | 2026-02-11T15:30:15Z |
| alsa-2026:2410 | Important: libsoup3 security update | 2026-02-10T00:00:00Z | 2026-02-11T15:26:55Z |
| alsa-2026:2389 | Important: brotli security update | 2026-02-10T00:00:00Z | 2026-02-11T11:06:48Z |
| alsa-2026:2378 | Moderate: kernel-rt security update | 2026-02-10T00:00:00Z | 2026-02-10T09:34:16Z |
| alsa-2026:2323 | Important: git-lfs security update | 2026-02-09T00:00:00Z | 2026-02-11T11:02:49Z |
| alsa-2026:2286 | Important: thunderbird security update | 2026-02-09T00:00:00Z | 2026-02-09T12:36:11Z |
| alsa-2026:2282 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-12T10:29:43Z |
| alsa-2026:2271 | Important: firefox security update | 2026-02-09T00:00:00Z | 2026-02-09T11:39:07Z |
| alsa-2026:2264 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-09T11:47:42Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-226 | UNKNOWN READ in extract_sess_version | 2025-03-21T00:19:10.852617Z | 2025-03-21T00:19:10.852969Z |
| osv-2025-219 | Heap-buffer-overflow in opj_j2k_read_tile_header | 2025-03-18T00:18:30.566980Z | 2026-02-11T14:21:43.026699Z |
| osv-2025-215 | Security exception in graphql.parser.GraphqlAntlrToLanguage.createType | 2025-03-18T00:09:36.655072Z | 2025-03-18T00:09:36.655425Z |
| osv-2025-207 | Security exception in org.apache.lucene.analysis.tokenattributes.CharTermAttributeImpl.clone | 2025-03-16T00:02:33.765869Z | 2025-06-20T17:14:14.229009Z |
| osv-2025-202 | UNKNOWN READ in _blit_xrgb32_lerp_spans | 2025-03-15T00:01:51.127135Z | 2026-03-18T14:26:56.370221Z |
| osv-2025-190 | Heap-buffer-overflow in std::__1::__function::__func<cv::PngDecoder::compose_frame | 2025-03-11T00:04:32.361664Z | 2025-03-11T00:04:32.362119Z |
| osv-2025-178 | Heap-buffer-overflow in usm_set_user_password | 2025-02-28T00:16:54.655227Z | 2025-02-28T00:16:54.655745Z |
| osv-2025-177 | Segv on unknown address in chunk_free_object | 2025-02-28T00:16:24.018716Z | 2025-02-28T00:16:24.019131Z |
| osv-2025-175 | UNKNOWN READ in insert_free | 2025-02-28T00:12:26.919208Z | 2025-02-28T00:12:26.919553Z |
| osv-2025-174 | Heap-use-after-free in gc_trace | 2025-02-28T00:12:25.140274Z | 2025-02-28T00:12:25.140618Z |
| osv-2025-173 | UNKNOWN READ in chunk_obj_alloc | 2025-02-28T00:11:40.566459Z | 2025-02-28T00:11:40.566797Z |
| osv-2025-169 | Stack-buffer-overflow in utf8_in2 | 2025-02-27T00:07:08.029075Z | 2026-03-21T14:18:54.197384Z |
| osv-2025-165 | Index-out-of-bounds in dwg_decode_eed | 2025-02-26T00:17:27.930225Z | 2025-02-26T00:17:27.930707Z |
| osv-2025-162 | Heap-buffer-overflow in snmp_in_options | 2025-02-24T00:15:40.967551Z | 2025-03-18T00:30:24.116747Z |
| osv-2025-161 | Heap-buffer-overflow in se_add_pair | 2025-02-24T00:15:33.662895Z | 2025-03-18T00:37:12.676515Z |
| osv-2025-160 | UNKNOWN WRITE in ndpi_free_flow_data | 2025-02-24T00:07:49.495615Z | 2025-02-24T00:07:49.495976Z |
| osv-2025-156 | Check failed in CheckUnwind | 2025-02-23T00:16:50.073196Z | 2025-02-23T00:16:50.073520Z |
| osv-2025-154 | UNKNOWN READ in ndpi_strdup | 2025-02-23T00:13:05.487818Z | 2025-02-23T00:13:05.488183Z |
| osv-2025-149 | UNKNOWN READ in processClientServerHello | 2025-02-23T00:00:50.236281Z | 2025-02-23T00:00:50.236700Z |
| osv-2025-148 | Heap-buffer-overflow in setup_engineID | 2025-02-23T00:00:36.951152Z | 2025-03-18T00:22:22.817245Z |
| osv-2025-147 | UNKNOWN WRITE in ndpi_free_flow_data | 2025-02-22T00:18:07.814416Z | 2025-02-22T00:18:07.814726Z |
| osv-2025-145 | Heap-buffer-overflow in ___interceptor_strncat | 2025-02-22T00:14:15.620085Z | 2025-02-22T00:14:15.620535Z |
| osv-2025-133 | Stack-buffer-overflow in se_read_conf | 2025-02-17T00:02:18.986364Z | 2025-03-18T00:27:33.917908Z |
| osv-2025-132 | Heap-use-after-free in netsnmp_hex_to_binary | 2025-02-17T00:01:01.920904Z | 2025-03-18T00:33:26.648884Z |
| osv-2025-131 | Heap-buffer-overflow in vips_foreign_save_heif_write_block | 2025-02-16T00:13:44.282887Z | 2025-03-18T00:32:21.245932Z |
| osv-2025-127 | Object-size in unpack_dsd_samples | 2025-02-15T00:16:56.314634Z | 2025-02-15T00:16:56.315060Z |
| osv-2025-124 | Use-of-uninitialized-value in get_word | 2025-02-15T00:09:23.967012Z | 2025-02-15T00:09:23.967345Z |
| osv-2025-119 | Heap-buffer-overflow in snmp_config_when | 2025-02-14T00:15:08.375253Z | 2025-03-18T00:37:43.437021Z |
| osv-2025-114 | Index-out-of-bounds in ada_fuzz_header.h | 2025-02-14T00:11:24.754671Z | 2025-02-14T00:11:24.755045Z |
| osv-2025-113 | Heap-buffer-overflow in snmp_log_options | 2025-02-14T00:01:45.812592Z | 2025-03-18T00:35:43.690001Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0009 | Some AES functions may panic when overflow checking is enabled. | 2025-03-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0010 | Versions of *ring* prior to 0.17 are unmaintained. | 2025-03-05T12:00:00Z | 2025-03-07T15:46:47Z |
| rustsec-2025-0012 | `backoff` is unmaintained. | 2025-03-04T12:00:00Z | 2025-08-06T09:33:04Z |
| rustsec-2025-0011 | `openpgp-card-sequoia` is unmaintained. | 2025-03-04T12:00:00Z | 2025-03-07T15:47:21Z |
| rustsec-2025-0008 | Openh264 Decoding Functions Heap Overflow Vulnerability | 2025-02-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0013 | resolve is unmaintained | 2025-02-21T12:00:00Z | 2025-03-07T15:52:15Z |
| rustsec-2025-0007 | *ring* is unmaintained | 2025-02-20T12:00:00Z | 2025-03-06T21:16:59Z |
| rustsec-2025-0015 | Denial of Service via malicious Web Push endpoint | 2025-02-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0159 | `sophosfirewall-python` was removed from crates.io for malicious code | 2025-02-15T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0155 | `rands` was removed from crates.io for malicious code | 2025-02-10T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2025-0030 | totally-safe-transmute allows transmuting any type to any other type in safe Rust | 2025-02-10T12:00:00Z | 2025-05-06T20:14:30Z |
| rustsec-2025-0029 | totally-safe introduces memory vulnerabilities in safe Rust | 2025-02-10T12:00:00Z | 2025-05-05T18:31:28Z |
| rustsec-2025-0028 | cve-rs introduces memory vulnerabilities in safe Rust | 2025-02-10T12:00:00Z | 2025-05-06T21:08:48Z |
| rustsec-2025-0006 | Hickory DNS failure to verify self-signed RRSIG for DNSKEYs | 2025-02-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0004 | ssl::select_next_proto use after free | 2025-02-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0160 | `custom-req-on-workers` was removed from crates.io for malicious code | 2025-01-30T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0158 | `jfrog_quotes` was removed from crates.io for malicious code | 2025-01-30T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0001 | gix-worktree-state nonexclusive checkout sets executable files world-writable | 2025-01-18T12:00:00Z | 2025-01-22T17:11:51Z |
| rustsec-2025-0040 | `root` appended to group listings | 2025-01-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0161 | libsecp256k1 is unmaintained | 2025-01-14T12:00:00Z | 2026-04-14T11:24:03Z |
| rustsec-2025-0026 | registry is unmaintained | 2025-01-13T12:00:00Z | 2025-04-29T08:11:21Z |
| rustsec-2025-0005 | Out of bounds write triggered by crafted coverage data | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0003 | Segmentation fault due to lack of bound check | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0002 | Segmentation fault due to lack of bound check | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0430 | Use of insecure cryptographic algorithms | 2024-12-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0431 | Unsound usages of `core::slice::from_raw_parts` | 2024-12-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0435 | Unsound usages of `Vec::from_raw_parts` | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0426 | Unsound usages of `u8` type casting | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0424 | Unsound usages of `core::slice::from_raw_parts_mut` | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0433 | Malicious plugin names, recipients, or identities can cause arbitrary binary execution | 2024-12-18T12:00:00Z | 2025-01-03T18:23:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-discourse-2026-31805 | Discourse has a poll authorization bypass via post_id array parameter | 2026-03-27T07:10:31.444Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-30891 | Discourse hasUnauthorized Exposure of Private User Action Types | 2026-03-27T07:10:28.864Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-30889 | Discourse has Unauthorized Post Data Exposure in discourse-user-notes | 2026-03-27T07:10:26.417Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-30888 | Discourse has moderator privilege escalation via arbitrary post_id in suspend/silence endpoint | 2026-03-27T07:10:23.855Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-29072 | Discourse missing permission check for policy creation in discourse-policy | 2026-03-27T07:10:21.008Z | 2026-03-31T21:15:21.591Z |
| bit-discourse-2026-28282 | Discourse vulnerable to group membership addition permission bypass via discourse-policy plugin | 2026-03-27T07:10:17.839Z | 2026-03-31T21:15:21.591Z |
| bit-nginx-2026-32647 | NGINX ngx_http_mp4_module vulnerability | 2026-03-27T07:10:16.616Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-28755 | NGINX ngx_stream_ssl_module vulnerability | 2026-03-27T07:10:13.976Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-28753 | NGINX ngx_mail_proxy_module vulnerability | 2026-03-27T07:10:10.953Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-27784 | NGINX ngx_http_mp4_module vulnerability | 2026-03-27T07:10:08.052Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27936 | Discourse discloses restricted post-action counts to non-privileged users | 2026-03-27T07:10:06.332Z | 2026-03-31T21:15:21.591Z |
| bit-nginx-2026-27654 | NGINX ngx_http_dav_module vulnerability | 2026-03-27T07:10:05.293Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27935 | Discourse leaks private topic metadata to non-authorized users | 2026-03-27T07:10:03.445Z | 2026-03-31T21:15:21.591Z |
| bit-nginx-2026-27651 | NGINX ngx_mail_auth_http_module vulnerability | 2026-03-27T07:10:02.387Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27934 | Discourse leaks private topic title and post excerpt via user action API endpoint | 2026-03-27T07:10:00.671Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27740 | Discourse has Stored XSS in AI Triage Automation | 2026-03-27T07:09:57.609Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27570 | Discourse Vulnerable to Stored XSS via Shared AI Conversation Onebox | 2026-03-27T07:09:54.665Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27491 | Discourse has a bypass of official warnings messages by non-staff users | 2026-03-27T07:09:52.198Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27454 | Discourse has check revision visibility on posts endpoint | 2026-03-27T07:09:48.954Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27166 | Discourse vulnerable to HTML injection via prohibited iframe URLs | 2026-03-27T07:09:46.264Z | 2026-03-27T07:40:55.991Z |
| bit-nats-2026-33215 | NATS is vulnerable to MQTT hijacking via Client ID | 2026-03-27T07:08:53.339Z | 2026-03-27T12:16:52.978Z |
| bit-minio-2026-33419 | MinIO: LDAP login brute-force via user enumeration and missing rate limit | 2026-03-27T07:08:02.540Z | 2026-03-27T07:40:55.991Z |
| bit-minio-2026-33322 | MinIO: JWT Algorithm Confusion in OIDC Authentication | 2026-03-27T07:07:59.802Z | 2026-03-27T07:40:55.991Z |
| bit-python-2026-4519 | webbrowser.open() allows leading dashes in URLs | 2026-03-25T08:52:23.976Z | 2026-03-25T09:15:17.567Z |
| bit-mariadb-2026-32710 | Heap-based Buffer Overflow in MariaDB | 2026-03-25T08:46:04.911Z | 2026-04-01T09:11:42.692Z |
| bit-libpython-2026-4519 | webbrowser.open() allows leading dashes in URLs | 2026-03-25T08:44:11.251Z | 2026-03-25T09:15:17.567Z |
| bit-tomcat-2023-28709 | Apache Tomcat: Fix for CVE-2023-24998 is incomplete | 2026-03-24T10:21:40.054Z | 2026-03-24T10:46:38.869Z |
| bit-tomcat-2023-28708 | Apache Tomcat: JSESSIONID Cookie missing secure attribute in some configurations | 2026-03-24T10:21:38.576Z | 2026-03-24T10:46:38.869Z |
| bit-mlflow-2025-15031 | Path Traversal Vulnerability in mlflow/mlflow | 2026-03-24T08:47:14.572Z | 2026-04-08T12:15:37.582Z |
| bit-parse-2026-33163 | Parse Server leaks protected fields via LiveQuery afterEvent trigger | 2026-03-20T11:37:51.448Z | 2026-03-20T12:05:40.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-fn44356 | Security fixes for CVE-2022-29526, CVE-2025-47907, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10-r0, 0.11-r0, 0.9-r0, 0.9-r1, 0.9-r2 | 2026-04-01T09:31:56.126620Z | 2026-03-23T07:36:06Z |
| cleanstart-2026-pv93827 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.25.4-r0, 1.25.4-r1, 1.25.4-r2 | 2026-04-01T09:31:37.416388Z | 2026-03-23T07:38:20Z |
| cleanstart-2026-dv49099 | Security fixes for CVE-2025-64756, CVE-2025-69873, CVE-2026-1525, CVE-2026-1526, CVE-2026-1527, CVE-2026-1528, CVE-2026-2229, CVE-2026-2327, CVE-2026-23745, CVE-2026-2391, CVE-2026-24842, CVE-2026-25128, CVE-2026-25547, CVE-2026-2581, CVE-2026-25896, CVE-2026-26278, CVE-2026-26960, CVE-2026-27601, CVE-2026-27903, CVE-2026-27904, CVE-2026-27942, CVE-2026-28292, CVE-2026-29786, CVE-2026-31802, CVE-2026-32141, CVE-2026-33036, ghsa-23c5-xmqv-rm74, ghsa-25h7-pfq9-p65f, ghsa-2g4f-4pwh-qvx6, ghsa-2mjp-6q6p-2qxm, ghsa-34x7-hfp2-rc4v, ghsa-37qj-frw5-hhjh, ghsa-38c4-r59v-3vqw, ghsa-3ppc-4f35-3m26, ghsa-4992-7rv2-5pvq, ghsa-5j98-mcp5-4vw2, ghsa-73rr-hh4g-fpgx, ghsa-7h2j-956f-4vf2, ghsa-7r86-cg39-jmmj, ghsa-83g3-92jg-28cx, ghsa-8gc5-j5rx-235r, ghsa-8qq5-rm4j-mr97, ghsa-8wc6-vgrq-x6cf, ghsa-9ppj-qmqm-q256, ghsa-f269-vfmq-vjvj, ghsa-fj3w-jwp8-x2g3, ghsa-jmr7-xgp7-cmfj, ghsa-m7jm-9gc2-mpf2, ghsa-phc3-fgpg-7m6h, ghsa-qffp-2rhf-9h96, ghsa-qpx9-hpmf-5gmw, ghsa-r275-fr43-pm7q, ghsa-r6q2-hw4h-h46w, ghsa-v9p9-hfj2-hcw8, ghsa-vrm6-8vpv-qv8q, ghsa-w7fw-mjwx-w883 applied in versions: 43.4.4-r0 | 2026-04-01T09:31:16.419730Z | 2026-03-23T10:49:42Z |
| cleanstart-2026-li47669 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.26.2-r0, 1.26.3-r0, 1.26.3-r1 | 2026-04-01T09:31:09.448053Z | 2026-03-23T07:38:42Z |
| cleanstart-2026-nc32267 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.24.4-r0, 1.28.1-r0, 1.28.1-r1 | 2026-04-01T09:31:06.582607Z | 2026-03-23T07:39:20Z |
| cleanstart-2026-qv50101 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-8r3f-844c-mc37 applied in versions: 1.6.0-r0 | 2026-04-01T09:30:36.985458Z | 2026-03-23T07:45:33Z |
| cleanstart-2026-gm81143 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-8r3f-844c-mc37 applied in versions: 1.7.0-r0, 1.7.0-r1 | 2026-04-01T09:30:33.612618Z | 2026-03-23T07:45:53Z |
| cleanstart-2026-ia43044 | Security fixes for CVE-2020-8908, CVE-2022-42889, CVE-2023-2976, CVE-2024-25710, CVE-2024-26308, CVE-2024-29371, CVE-2024-29857, CVE-2024-30171, CVE-2024-31573, CVE-2024-47554, CVE-2025-11143, CVE-2025-12383, CVE-2025-48734, CVE-2025-48924, CVE-2025-58057, CVE-2025-67735, CVE-2025-68161, CVE-2025-8916, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.47.0-r2, 0.47.0-r3 | 2026-04-01T09:30:15.088429Z | 2026-03-23T07:56:09Z |
| cleanstart-2026-ld14062 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.27.4-r0, 1.27.4-r1, 1.27.7-r0 | 2026-04-01T09:30:12.003312Z | 2026-03-23T07:46:39Z |
| cleanstart-2026-jw59894 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.28.4-r0 | 2026-04-01T09:30:04.839715Z | 2026-03-23T07:47:23Z |
| cleanstart-2026-pw47027 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.29.0-r0 | 2026-04-01T09:30:02.510665Z | 2026-03-23T07:47:56Z |
| cleanstart-2026-fr61696 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.17.0-r0 | 2026-04-01T09:29:33.599999Z | 2026-03-23T07:49:32Z |
| cleanstart-2026-as59691 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-31837, CVE-2026-31838, ghsa-9h8m-3fm2-qjrq applied in versions: 1.28.3-r0 | 2026-04-01T09:29:30.943219Z | 2026-03-23T07:49:41Z |
| cleanstart-2026-pi36812 | Security fixes for CVE-2026-33186, ghsa-6v2p-p943-phr9, ghsa-c6gw-w398-hv78, ghsa-f6x5-jh6r-wrfv, ghsa-hcg3-p754-cr77, ghsa-j5w8-q4qc-rx2x, ghsa-qxp5-gw88-xv66, ghsa-v778-237x-gjrc, ghsa-vvgc-356p-c3xw applied in versions: 1.15.0-r1, 1.19.0-r0 | 2026-04-01T09:29:23.569974Z | 2026-03-23T07:52:18Z |
| cleanstart-2026-dc73689 | Security fixes for CVE-2025-11143, CVE-2025-67735, CVE-2025-68161, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.48.0-r1 | 2026-04-01T09:29:13.129218Z | 2026-03-23T08:05:00Z |
| cleanstart-2026-gy92571 | Security fixes for ghsa-22h5-pq3x-2gf2, ghsa-33mh-2634-fwr2, ghsa-4cx2-fc23-5wg6, ghsa-6xw4-3v39-52mm, ghsa-72hv-8253-57qq, ghsa-72qj-48g4-5xgx, ghsa-c2f4-jgmc-q2r5, ghsa-gh9q-2xrm-x6qv, ghsa-j4pr-3wm6-xx2r, ghsa-mhwm-jh88-3gjf, ghsa-mr3q-g2mv-mr4q, ghsa-p543-xpfm-54cp, ghsa-vc5p-v9hr-52mj, ghsa-vqg5-3255-v292, ghsa-w9pc-fmgc-vxvw, ghsa-wpv5-97wm-hp9c applied in versions: 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-04-01T09:28:54.070298Z | 2026-03-23T10:27:15Z |
| cleanstart-2026-gm79879 | Security fixes for CVE-2025-11143, CVE-2025-68161, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.49.1-r0 | 2026-04-01T09:28:51.825289Z | 2026-03-23T08:12:03Z |
| cleanstart-2026-ez47382 | Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2025-66564, CVE-2026-22703, CVE-2026-22772, CVE-2026-23831, CVE-2026-23991, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2x5j-vhc8-9cwm, ghsa-59jp-pj84-45mr, ghsa-6m8w-jc87-6cr7, ghsa-jqc5-w2xx-5vq4, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-vvgc-356p-c3xw applied in versions: 1.14.4-r1, 1.14.4-r2, 1.16.3-r3, 1.16.3-r4 | 2026-04-01T09:28:49.379705Z | 2026-03-23T08:59:19Z |
| cleanstart-2026-ds86833 | Security fixes for CVE-2025-11143, CVE-2026-1605, ghsa-72hv-8253-57qq, ghsa-cphf-4846-3xx9 applied in versions: 0.50.0-r0, 0.50.1-r0 | 2026-04-01T09:28:26.952828Z | 2026-03-23T08:16:08Z |
| cleanstart-2026-nn77774 | Security fixes for CVE-2026-33186, ghsa-p77j-4mvh-x3m3 applied in versions: 2.4.0-r0 | 2026-04-01T09:28:03.910369Z | 2026-03-23T12:37:31Z |
| cleanstart-2026-cu52059 | Security fixes for CVE-2025-61728, CVE-2025-61730, CVE-2026-24051, CVE-2026-27139, CVE-2026-27142, ghsa-9h8m-3fm2-qjrq applied in versions: 3.3.0-r7, 3.5.0-r0 | 2026-04-01T09:27:57.960712Z | 2026-03-23T14:23:15Z |
| cleanstart-2026-am88528 | Security fixes for CVE-2025-15558, CVE-2025-61729, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-fv92-fjc5-jj9h, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3 applied in versions: 3.6.16-r0, 3.6.18-r0, 3.6.19-r0, 3.6.19-r1, 3.6.19-r2, 3.6.19-r3, 3.7.4-r0 | 2026-04-01T09:27:52.956018Z | 2026-03-23T14:25:49Z |
| cleanstart-2026-mz18595 | Security fixes for CVE-2025-61730, CVE-2025-61732, CVE-2026-27139, CVE-2026-27142 applied in versions: 3.4.0-r7 | 2026-04-01T09:27:48.953742Z | 2026-03-23T14:24:01Z |
| cleanstart-2026-hk06185 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-47914, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p84v-gxvw-73pf applied in versions: 3.7.0-r0, 3.7.3-r0, 3.7.4-r0, 3.7.6-r0, 3.7.9-r0, 3.7.9-r1, 3.7.9-r2, 4.0.2-r0 | 2026-04-01T09:27:48.241920Z | 2026-03-24T04:58:10Z |
| cleanstart-2026-ka15295 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.7.0-r0, 3.7.0.-r1 | 2026-04-01T09:27:33.488765Z | 2026-03-23T14:26:32Z |
| cleanstart-2026-ci66802 | Security fixes for CVE-2015-2104, CVE-2020-8908, CVE-2021-21295, CVE-2021-21409, CVE-2021-37136, CVE-2022-1471, CVE-2022-41881, CVE-2023-27043, CVE-2023-2976, CVE-2023-34462, CVE-2023-6378, CVE-2024-12254, CVE-2024-12718, CVE-2024-12798, CVE-2024-12801, CVE-2024-27137, CVE-2024-6232, CVE-2024-6923, CVE-2024-9287, CVE-2025-0938, CVE-2025-23015, CVE-2025-4138, CVE-2025-4330, CVE-2025-4516, CVE-2025-4517, CVE-2026-1225, ghsa-25qh-j22f-pwp8, ghsa-3mc7-4q67-w48m, ghsa-5mg8-w23w-74h3, ghsa-6v67-2wr5-gvf4, ghsa-72hv-8253-57qq, ghsa-7g45-4rm6-3mm3, ghsa-98wm-3w3q-mw94, ghsa-9w3m-gqgf-c4p9, ghsa-c4r9-r8fh-9vj2, ghsa-hhhw-99gj-p3c3, ghsa-mjmj-j48q-9wg2, ghsa-pr98-23f8-jwxv, ghsa-qqpg-mvqg-649v, ghsa-vmq6-5m68-f53m, ghsa-w37g-rhq8-7m4j applied in versions: 4.0.17-r1, 4.0.19-r2, 4.0.19-r3, 4.1.9-r0 | 2026-04-01T09:27:07.387904Z | 2026-03-24T10:05:19Z |
| cleanstart-2026-id24148 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-33186 applied in versions: 0.28.7-r1, 0.29.0-r0, 0.30.0-r0 | 2026-04-01T09:27:05.843609Z | 2026-03-24T04:58:10Z |
| cleanstart-2026-db61851 | Security fixes for CVE-2024-10005, CVE-2024-10006, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24051, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.8.11-r0, 1.8.11-r1, 1.8.11-r2, 1.8.11-r3, 1.9.4-r0 | 2026-04-01T09:26:58.691080Z | 2026-03-24T08:56:04Z |
| cleanstart-2026-km27583 | Security fixes for CVE-2015-2104, CVE-2023-27043, CVE-2024-12254, CVE-2024-12718, CVE-2024-12798, CVE-2024-12801, CVE-2024-27137, CVE-2024-6232, CVE-2024-6923, CVE-2024-9287, CVE-2025-0938, CVE-2025-23015, CVE-2025-4138, CVE-2025-4330, CVE-2025-4516, CVE-2025-4517, CVE-2025-58057, CVE-2026-1225, ghsa-25qh-j22f-pwp8, ghsa-3p8m-j85q-pgmj, ghsa-5mg8-w23w-74h3, ghsa-6v67-2wr5-gvf4, ghsa-72hv-8253-57qq, ghsa-7g45-4rm6-3mm3, ghsa-pr98-23f8-jwxv, ghsa-qqpg-mvqg-649v applied in versions: 4.0.17-r1, 4.1.9-r0, 5.0.6-r1, 5.0.6-r2 | 2026-04-01T09:26:50.907320Z | 2026-03-24T09:56:29Z |
| cleanstart-2026-jj09127 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-33186 applied in versions: 0.28.7-r1, 0.29.0-r0, 0.30.0-r0 | 2026-04-01T09:26:20.691727Z | 2026-03-24T04:58:10Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2023-033 | 2023-08-02T18:59:27.000Z | 2023-08-02T19:52:35.000Z | |
| drupal-contrib-2023-032 | 2023-07-26T19:19:38.000Z | 2023-07-26T20:00:09.000Z | |
| drupal-contrib-2023-031 | 2023-07-26T19:15:46.000Z | 2023-07-27T16:05:03.000Z | |
| drupal-contrib-2023-030 | 2023-07-12T18:19:42.000Z | 2023-07-12T18:39:39.000Z | |
| drupal-contrib-2023-029 | 2023-06-28T17:34:47.000Z | 2023-07-31T21:18:37.000Z | |
| drupal-contrib-2023-028 | 2023-06-28T17:21:37.000Z | 2023-07-31T21:17:11.000Z | |
| drupal-contrib-2023-027 | 2023-06-28T17:15:03.000Z | 2023-07-31T21:17:46.000Z | |
| drupal-contrib-2023-026 | 2023-06-28T17:11:07.000Z | 2023-08-10T13:49:56.000Z | |
| drupal-contrib-2023-025 | 2023-06-28T17:10:15.000Z | 2023-10-26T13:22:52.000Z | |
| drupal-contrib-2023-024 | 2023-06-28T17:03:36.000Z | 2023-08-10T13:40:55.000Z | |
| drupal-contrib-2023-023 | 2023-06-28T17:02:13.000Z | 2023-08-10T13:53:00.000Z | |
| drupal-contrib-2023-021 | 2023-06-21T17:03:14.000Z | 2023-08-10T13:53:57.000Z | |
| drupal-contrib-2023-020 | 2023-06-14T14:52:36.000Z | 2023-08-10T13:54:32.000Z | |
| drupal-contrib-2023-019 | 2023-05-31T13:22:44.000Z | 2023-08-10T13:56:55.000Z | |
| drupal-contrib-2023-018 | 2023-05-31T13:20:43.000Z | 2023-08-10T13:56:48.000Z | |
| drupal-contrib-2023-017 | 2023-05-31T13:18:52.000Z | 2023-08-10T13:57:22.000Z | |
| drupal-contrib-2023-016 | 2023-05-31T13:14:25.000Z | 2023-08-10T13:58:03.000Z | |
| drupal-contrib-2023-014 | 2023-05-03T15:44:12.000Z | 2023-08-10T13:58:54.000Z | |
| drupal-contrib-2023-013 | 2023-04-12T16:09:25.000Z | 2023-08-10T14:19:21.000Z | |
| drupal-contrib-2023-012 | 2023-03-29T17:44:58.000Z | 2023-08-10T14:19:50.000Z | |
| drupal-contrib-2023-011 | 2023-03-15T17:40:02.000Z | 2023-08-10T15:37:51.000Z | |
| drupal-contrib-2023-010 | 2023-03-15T17:22:57.000Z | 2023-08-10T14:20:35.000Z | |
| drupal-contrib-2023-009 | 2023-03-08T17:46:44.000Z | 2023-08-10T14:20:59.000Z | |
| drupal-contrib-2023-008 | 2023-03-01T17:38:09.000Z | 2023-08-10T14:21:21.000Z | |
| drupal-contrib-2023-007 | 2023-03-01T17:11:03.000Z | 2023-08-10T14:22:08.000Z | |
| drupal-contrib-2023-006 | 2023-03-01T15:15:08.000Z | 2023-08-10T14:22:32.000Z | |
| drupal-contrib-2023-005 | 2023-02-01T16:13:42.000Z | 2023-08-10T14:23:38.000Z | |
| drupal-contrib-2023-004 | 2023-01-18T17:49:04.000Z | 2023-08-10T14:23:53.000Z | |
| drupal-contrib-2023-003 | 2023-01-18T17:36:56.000Z | 2023-08-10T14:25:39.000Z | |
| drupal-contrib-2023-002 | 2023-01-18T17:28:05.000Z | 2023-08-10T14:25:24.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2009-ale-023 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-12-15T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2009-ale-022 | Vulnérabilité dans TANDBERG MXP | 2009-12-11T00:00:00.000000 | 2009-12-11T00:00:00.000000 |
| certa-2009-ale-021 | Vulnérabilité dans Adobe Illustrator | 2009-12-10T00:00:00.000000 | 2010-01-08T00:00:00.000000 |
| certa-2009-ale-020 | Vulnérabilité dans Internet Explorer | 2009-11-21T00:00:00.000000 | 2009-12-09T00:00:00.000000 |
| certa-2009-ale-019 | Vulnérabilité dans Windows 7 et Windows Server 2008 R2 | 2009-11-16T00:00:00.000000 | 2010-06-10T00:00:00.000000 |
| certa-2009-ale-018 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-10-09T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| certa-2009-ale-017 | Vulnérabilités dans l'implémentation TCP/IP de divers produits | 2009-09-09T00:00:00.000000 | 2013-02-19T00:00:00.000000 |
| certa-2009-ale-016 | Vulnérabilité de SMBv2 dans Microsoft Windows | 2009-09-09T00:00:00.000000 | 2009-10-13T00:00:00.000000 |
| certa-2009-ale-015 | Vulnérabilités du serveur FTP de Microsoft IIS | 2009-09-01T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| certa-2009-ale-014 | Multiples vulnérabilités du client de messagerie Mozilla Thunderbird | 2009-08-07T00:00:00.000000 | 2013-02-05T00:00:00.000000 |
| certa-2009-ale-013 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2009-07-23T00:00:00.000000 | 2009-07-31T00:00:00.000000 |
| certa-2009-ale-012 | Vulnérabilité dans Mozilla Firefox | 2009-07-15T00:00:00.000000 | 2009-07-17T00:00:00.000000 |
| certa-2009-ale-011 | Vulnérabilité dans Microsoft Office Web Components Control | 2009-07-13T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| certa-2009-ale-010 | Vulnérabilité dans le contrôle ActiveX Microsoft Video | 2009-07-07T00:00:00.000000 | 2009-07-15T00:00:00.000000 |
| certa-2009-ale-009 | Vulnérabilité dans Microsoft DirectShow | 2009-05-29T00:00:00.000000 | 2009-07-14T00:00:00.000000 |
| certa-2009-ale-008 | Vulnérabilité Java de Mac OS X | 2009-05-20T00:00:00.000000 | 2009-06-17T00:00:00.000000 |
| certa-2009-ale-007 | Vulnérabilité WebDAV sous Microsoft IIS | 2009-05-18T00:00:00.000000 | 2009-06-10T00:00:00.000000 |
| certa-2009-ale-006 | Multiples vulnérabilités dans Adobe Reader et Adobe Acrobat | 2009-04-28T00:00:00.000000 | 2009-05-13T00:00:00.000000 |
| certa-2009-ale-005 | Vulnérabilité de PowerPoint | 2009-04-03T00:00:00.000000 | 2009-05-13T00:00:00.000000 |
| certa-2009-ale-004 | Vulnérabilité dans Mozilla Firefox | 2009-03-27T00:00:00.000000 | 2009-03-30T00:00:00.000000 |
| certa-2009-ale-003 | Vulnérabilité dans Apple Mac OS X | 2009-03-24T00:00:00.000000 | 2009-06-02T00:00:00.000000 |
| certa-2009-ale-002 | Vulnérabilité dans Microsoft Excel | 2009-02-25T00:00:00.000000 | 2009-04-15T00:00:00.000000 |
| certa-2009-ale-001 | Vulnérabilité dans l'interprétation JBIG2 des produits Adobe | 2009-02-20T00:00:00.000000 | 2009-03-20T00:00:00.000000 |
| certa-2008-ale-017 | Vulnérabilité dans Microsoft SQL Server | 2008-12-12T00:00:00.000000 | 2009-02-11T00:00:00.000000 |
| certa-2008-ale-016 | Vulnérabilité dans Microsoft Internet Explorer | 2008-12-10T00:00:00.000000 | 2008-12-17T00:00:00.000000 |
| certa-2008-ale-015 | Vulnérabilité dans le convertisseur de texte de WordPad | 2008-12-10T00:00:00.000000 | 2009-04-15T00:00:00.000000 |
| certa-2008-ale-014 | Vulnérabilité dans Opera | 2008-11-20T00:00:00.000000 | 2009-01-06T00:00:00.000000 |
| certa-2008-ale-013 | Vulnérabilité du service sadmind de Sun Solaris | 2008-10-17T00:00:00.000000 | 2013-02-21T00:00:00.000000 |
| certa-2008-ale-012 | Vulnérabilité dans Microsoft Windows | 2008-10-10T00:00:00.000000 | 2009-04-15T00:00:00.000000 |
| certa-2008-ale-011 | Vulnérabilité dans Oracle BEA WebLogic Server | 2008-07-24T00:00:00.000000 | 2008-08-08T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0216 | Vulnérabilité dans PostgreSQL | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0215 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0214 | Vulnérabilité dans Juniper Networks Junos OS Evolved | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0213 | Multiples vulnérabilités dans les produits Cisco | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0212 | Multiples vulnérabilités dans les produits Centreon | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0211 | Multiples vulnérabilités dans Wireshark | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0210 | Multiples vulnérabilités dans Cisco Catalyst SD-WAN | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0209 | Multiples vulnérabilités dans les produits VMware | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0208 | Vulnérabilité dans les produits Synology | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0207 | Multiples vulnérabilités dans GitLab | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0206 | Multiples vulnérabilités dans les produits Trend Micro | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0205 | Multiples vulnérabilités dans SolarWinds Serv-U | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0204 | Multiples vulnérabilités dans les produits Mozilla | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0203 | Vulnérabilité dans Microsoft Azure Linux | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0202 | Multiples vulnérabilités dans les produits SonicWall | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0201 | Multiples vulnérabilités dans Mattermost Server | 2026-02-24T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0200 | Vulnérabilité dans Centreon open tickets | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0199 | Multiples vulnérabilités dans les produits VMware | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0198 | Multiples vulnérabilités dans Google Chrome | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0197 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-23T00:00:00.000000 | 2026-02-23T00:00:00.000000 |
| certfr-2026-avi-0196 | Multiples vulnérabilités dans les produits IBM | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0195 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0194 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0193 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0192 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0191 | Vulnérabilité dans Traefik | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0190 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0189 | Vulnérabilité dans F5 BIG-IP | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0188 | Multiples vulnérabilités dans les produits Splunk | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0187 | Multiples vulnérabilités dans Tenable Security Center | 2026-02-19T00:00:00.000000 | 2026-02-23T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-002714 | Improper symbolic link file handling in FutureNet NXR series, VXR series and WXR series routers | 2025-03-31T16:59+09:00 | 2025-04-03T15:19+09:00 |
| jvndb-2025-000024 | a-blog cms vulnerable to untrusted data deserialization | 2025-03-28T10:46+09:00 | 2025-03-28T10:46+09:00 |
| jvndb-2025-000021 | Multiple vulnerabilities in PowerCMS | 2025-03-26T18:13+09:00 | 2025-03-26T18:13+09:00 |
| jvndb-2025-002592 | Multiple vulnerabilities in CHOCO TEI WATCHER mini | 2025-03-26T13:25+09:00 | 2025-03-26T13:25+09:00 |
| jvndb-2025-000019 | Multiple vulnerabilities in AssetView | 2025-03-25T17:10+09:00 | 2025-03-25T17:10+09:00 |
| jvndb-2025-000018 | Multiple vulnerabilities in home gateway HGW-BL1500HM | 2025-03-19T15:33+09:00 | 2025-03-28T11:48+09:00 |
| jvndb-2025-000020 | +F FS010M vulnerable to OS command injection | 2025-03-18T15:01+09:00 | 2025-03-18T15:01+09:00 |
| jvndb-2025-000017 | hostapd vulnerable to improper processing of RADIUS packets | 2025-03-12T14:19+09:00 | 2025-03-12T14:19+09:00 |
| jvndb-2025-000016 | Multiple vulnerabilities in RemoteView Agent (for Windows) | 2025-03-06T14:27+09:00 | 2025-03-10T15:22+09:00 |
| jvndb-2025-001898 | Multiple vulnerabilities in FutureNet AS series (Industrial Routers) and FA series (Protocol Conversion Machine) | 2025-03-04T14:56+09:00 | 2025-03-04T14:56+09:00 |
| jvndb-2025-001605 | "RoboForm Password Manager" App for Android vulnerable to authentication bypass using an alternate path or channel | 2025-02-20T20:15+09:00 | 2025-02-20T20:15+09:00 |
| jvndb-2025-000014 | Multiple cross-site scripting vulnerabilities in Movable Type | 2025-02-19T16:19+09:00 | 2025-02-19T16:19+09:00 |
| jvndb-2025-000015 | RevoWorks SCVX and RevoWorks Browser vulnerable to incorrect resource transfer between spheres | 2025-02-19T14:51+09:00 | 2025-02-19T14:51+09:00 |
| jvndb-2025-001563 | Out-of-bounds write vulnerability in FUJIFILM Business Innovation Corp. MFPs | 2025-02-18T16:33+09:00 | 2025-02-18T16:33+09:00 |
| jvndb-2025-001562 | Out-of-bounds read vulnerability in OMRON CX-Programmer | 2025-02-18T16:24+09:00 | 2025-02-18T16:24+09:00 |
| jvndb-2025-001548 | Out-of-bounds read vulnerability in Cente middleware | 2025-02-17T18:22+09:00 | 2025-02-17T18:22+09:00 |
| jvndb-2025-000012 | Multiple vulnerabilities in The LuxCal Web Calendar | 2025-02-17T13:43+09:00 | 2025-02-17T13:43+09:00 |
| jvndb-2025-000013 | acmailer CGI and acmailer DB vulnerable to OS command injection | 2025-02-14T16:39+09:00 | 2025-02-14T16:39+09:00 |
| jvndb-2025-000002 | Multiple vulnerabilities in NEC Aterm series (NV25-003) | 2025-02-14T15:48+09:00 | 2025-02-14T15:48+09:00 |
| jvndb-2025-000011 | Multiple vulnerabilities in FileMegane | 2025-02-13T13:39+09:00 | 2025-02-13T13:39+09:00 |
| jvndb-2025-000010 | acmailer vulnerable to cross-site scripting | 2025-02-12T15:05+09:00 | 2025-02-12T15:05+09:00 |
| jvndb-2025-001017 | Multiple vulnerabilities in STEALTHONE D220/D340/D440 | 2025-02-06T18:27+09:00 | 2025-02-06T18:27+09:00 |
| jvndb-2025-001016 | OMRON NJ/NX series vulnerable to path traversal | 2025-02-06T18:27+09:00 | 2025-05-08T17:44+09:00 |
| jvndb-2025-001018 | Improper restriction of XML external entity reference (XXE) vulnerability in OMRON NB-Designer | 2025-02-06T18:26+09:00 | 2025-02-06T18:26+09:00 |
| jvndb-2025-000008 | Multiple vulnerabilities in Defense Platform Home Edition | 2025-02-05T14:06+09:00 | 2025-02-05T14:06+09:00 |
| jvndb-2025-000009 | WordPress Plugin "Activity Log WinterLock" vulnerable to cross-site request forgery | 2025-02-04T13:58+09:00 | 2025-02-04T13:58+09:00 |
| jvndb-2025-001244 | Clickjacking Vulnerability in JP1/ServerConductor/Deployment Manager | 2025-01-30T18:19+09:00 | 2025-01-30T18:19+09:00 |
| jvndb-2025-000007 | SXF Common Library vulnerable to improper input data handling | 2025-01-29T14:57+09:00 | 2025-01-29T14:57+09:00 |
| jvndb-2025-001238 | Multiple out-of-bounds write vulnerabilities in Canon Office/Small Office Multifunction Printers and Laser Printers | 2025-01-29T13:41+09:00 | 2025-05-27T16:06+09:00 |
| jvndb-2025-000006 | WordPress Plugin "Simple Image Sizes" vulnerable to cross-site scripting | 2025-01-28T13:44+09:00 | 2025-01-28T13:44+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14249 | Open5GS拒绝服务漏洞(CNVD-2026-14249) | 2026-03-19 | 2026-03-19 |
| cnvd-2026-17165 | SAP Business One Job Service跨站脚本漏洞 | 2026-03-17 | 2026-04-10 |
| cnvd-2026-16595 | Adobe Commerce输入验证错误漏洞(CNVD-2026-16595) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16594 | Adobe Commerce路径遍历漏洞(CNVD-2026-16594) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16593 | Adobe Commerce开放重定向漏洞 | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16592 | Adobe Commerce服务端请求伪造漏洞 | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16588 | Adobe Commerce输入验证错误漏洞(CNVD-2026-16588) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16587 | Adobe Commerce跨站脚本漏洞(CNVD-2026-16587) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16586 | Adobe Commerce跨站脚本漏洞(CNVD-2026-16586) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16585 | Adobe Commerce跨站脚本漏洞(CNVD-2026-16585) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16584 | Adobe Commerce跨站脚本漏洞(CNVD-2026-16584) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16583 | Adobe Commerce跨站脚本漏洞(CNVD-2026-16583) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16582 | Adobe Commerce跨站脚本漏洞(CNVD-2026-16582) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16581 | Adobe Commerce安全绕过漏洞(CNVD-2026-16581) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16580 | Adobe Commerce安全绕过漏洞(CNVD-2026-16580) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16579 | Adobe Commerce安全绕过漏洞(CNVD-2026-16579) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16578 | Adobe Commerce安全绕过漏洞(CNVD-2026-16578) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16577 | WordPress插件Easy Post Submission存在未明漏洞 | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16576 | WordPress插件Eagle BookingSQL注入漏洞 | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16160 | Microsoft Office代码执行漏洞(CNVD-2026-16160) | 2026-03-17 | 2026-04-07 |
| cnvd-2026-16156 | Microsoft Excel代码执行漏洞(CNVD-2026-16156) | 2026-03-17 | 2026-04-07 |
| cnvd-2026-16153 | Microsoft Excel代码执行漏洞(CNVD-2026-16153) | 2026-03-17 | 2026-04-07 |
| cnvd-2026-16152 | Microsoft Excel代码执行漏洞(CNVD-2026-16152) | 2026-03-17 | 2026-04-07 |
| cnvd-2026-15170 | Adobe Commerce授权问题漏洞(CNVD-2026-15170) | 2026-03-17 | 2026-03-27 |
| cnvd-2026-15169 | Adobe Commerce授权问题漏洞(CNVD-2026-15169) | 2026-03-17 | 2026-03-27 |
| cnvd-2026-15168 | Adobe Commerce授权问题漏洞(CNVD-2026-15168) | 2026-03-17 | 2026-03-27 |
| cnvd-2026-14602 | Fortinet FortiWeb操作系统命令注入漏洞(CNVD-2026-14602) | 2026-03-17 | 2026-03-17 |
| cnvd-2026-14601 | Fortinet FortiSandbox跨站脚本漏洞(CNVD-2026-14601) | 2026-03-17 | 2026-03-17 |
| cnvd-2026-14600 | Fortinet FortiSandbox Cloud操作系统命令注入漏洞 | 2026-03-17 | 2026-03-17 |
| cnvd-2026-14599 | Google Chrome WebView资源管理错误漏洞 | 2026-03-17 | 2026-03-18 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01454 | Уязвимость функции rcu_tasks_rude_wait_gp() модуля kernel/rcu/tasks.h ядра операционной с… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01453 | Уязвимость функции gfs2_show_options() модуля fs/gfs2/super.c файловой системы GFS2 ядра … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01452 | Уязвимость функции show_ipi_list() модуля arch/loongarch/kernel/smp.c поддержки архитекту… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01451 | Уязвимость функции ucsi_read_message_in() модуля drivers/usb/typec/ucsi/ucsi.c драйвера п… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01450 | Уязвимость определения структуры imx8mp_blk_ctrl_domain_data{} модуля drivers/pmdomain/im… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01449 | Уязвимость функции free_netvsc_device() модуля drivers/net/hyperv/netvsc.c драйвера подде… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01448 | Уязвимость функции iwl_txq_reclaim() модуля drivers/net/wireless/intel/iwlwifi/queue/tx.c… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01447 | Уязвимость функции x86_android_tablet_remove() модуля drivers/platform/x86/x86-android-ta… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01446 | Уязвимость функции __ext4_fill_super() модуля fs/ext4/super.c ядра операционной системы L… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01445 | Уязвимость функции ena_com_cdesc_rx_pkt_get() модуля drivers/net/ethernet/amazon/ena/ena_… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01444 | Уязвимость функции scrub_submit_extent_sector_read() модуля fs/btrfs/scrub.c поддержки фа… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01443 | Уязвимость функции nvmf_reg_read32() модуля drivers/nvme/host/fabrics.c драйвера поддержк… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01442 | Уязвимость функции kvm_get_mode() модуля arch/arm64/include/asm/kvm_host.h поддержки плат… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01441 | Уязвимость компонента RDMA/mlx5 ядра операционной системы Linux, позволяющая нарушителю в… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01440 | Уязвимость команды WMI_TXSTATUS_EVENTID ядра операционной системы Linux, позволяющая нару… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01439 | Уязвимость компонента smb ядра операционной системы Linux, позволяющая нарушителю оказать… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01438 | Уязвимость функции stbi__convert_format библиотек для C/C++ Libstb, позволяющая нарушител… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01437 | Уязвимость компонента kdc/do_tgs_req.c сетевого протокола аутентификации Kerberos, позвол… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01436 | Уязвимость программной платформы Node.js, связанная с неконтролируемым расходом ресурсов,… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01435 | Уязвимость функций Buffer.fill() и Buffer.alloc() программной платформы Node.js, позволяю… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01434 | Уязвимость компонентов node_http2 программной платформы Node.js, позволяющая нарушителю в… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01433 | Уязвимость сетевого протокола аутентификации Kerberos, связанная с непринятием мер по ней… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01432 | Уязвимость сетевого протокола аутентификации Kerberos, связанная с недостатком использова… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01431 | Уязвимость программной платформы для разработки и управления веб-приложениями Symfony, св… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01430 | Уязвимость функции url.parse() программной платформы Node.js, позволяющая нарушителю оказ… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01429 | Уязвимость компонентов http программной платформы Node.js, позволяющая нарушителю вызвать… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01428 | Уязвимость кодировки UCS-2 программной платформы Node.js, позволяющая нарушителю вызвать … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01427 | Уязвимость функции GetImagePixelCache компонента MagickCore/cache.c консольного графическ… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01426 | Уязвимость функции WriteTIFFImage компонента coders/tiff.c консольного графического редак… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01425 | Уязвимость функции MontageImageCommand компонента MagickWand/montage.c консольного графич… | 09.02.2026 | 09.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201806-1445 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2026-04-10T23:05:48.751000Z |
| var-201711-0474 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2026-04-10T23:05:18.525000Z |
| var-201910-1499 | The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find(… | 2026-04-10T23:05:17.242000Z |
| var-201203-0185 | Use-after-free vulnerability in Google Chrome before 18.0.1025.142 allows remote attacker… | 2026-04-10T23:05:16.710000Z |
| var-202110-1620 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-04-10T23:05:16.002000Z |
| var-201711-0472 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2026-04-10T23:05:15.178000Z |
| var-201906-1174 | Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. T… | 2026-04-10T23:05:14.847000Z |
| var-202108-1249 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed … | 2026-04-10T23:05:13.081000Z |
| var-202110-1512 | This issue was addressed with improved checks. This issue is fixed in iOS 14.8 and iPadOS… | 2026-04-10T23:04:02.900000Z |
| var-202006-1651 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 a… | 2026-04-10T23:04:02.747000Z |
| var-201006-1149 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 throug… | 2026-04-10T23:03:53.235000Z |
| var-200609-0708 | Multiple buffer overflows in the Apple Type Services (ATS) server in Mac OS X 10.4 throug… | 2026-04-10T23:03:52.979000Z |
| var-202101-0222 | A flaw was found in dnsmasq before version 2.83. When receiving a query, dnsmasq does not… | 2026-04-10T23:03:21.232000Z |
| var-202104-1571 | A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lea… | 2026-04-10T23:03:20.449000Z |
| var-201912-0633 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-04-10T23:03:15.663000Z |
| var-202012-1529 | A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion se… | 2026-04-10T23:03:15.588000Z |
| var-201904-0747 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-04-10T23:00:39.077000Z |
| var-201310-0349 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, J… | 2026-04-10T23:00:38.420000Z |
| var-201912-0646 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-04-10T23:00:01.329000Z |
| var-201912-1848 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-04-10T22:59:29.828000Z |
| var-200312-0218 | OpenSSL 0.9.6k allows remote attackers to cause a denial of service (crash via large recu… | 2026-04-10T22:58:58.869000Z |
| var-202110-1705 | The Snappy frame decoder function doesn't restrict the chunk length which may lead to exc… | 2026-04-10T22:58:57.883000Z |
| var-201711-0447 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2026-04-10T22:58:57.075000Z |
| var-200810-0394 | Unspecified vulnerability in Script Editor in Mac OS X 10.4.11 and 10.5.5 allows local us… | 2026-04-10T22:58:24.831000Z |
| var-201506-0464 | Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h i… | 2026-04-10T22:57:54.364000Z |
| var-200102-0005 | HTTP server on the WatchGuard SOHO firewall does not properly restrict access to administ… | 2026-04-10T22:57:53.341000Z |
| var-201504-0362 | The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4… | 2026-04-10T22:57:36.035000Z |
| var-201505-0417 | The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allow… | 2026-04-10T22:57:00.870000Z |
| var-201007-0949 | WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before… | 2026-04-10T22:56:59.745000Z |
| var-201912-1862 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2026-04-10T22:55:47.763000Z |