Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-30778 |
N/A
|
Apache SkyWalking: The SkyWalking OAP /debugging/confi⦠|
Apache Software Foundation |
Apache SkyWalking |
2026-04-15T10:54:25.212Z | 2026-04-15T10:54:25.212Z |
| CVE-2026-40786 |
N/A
|
WordPress MyRewards plugin <= 5.7.3 - Broken Access Co⦠|
Long Watch Studio |
MyRewards |
2026-04-15T10:21:36.068Z | 2026-04-15T10:21:36.068Z |
| CVE-2026-40784 |
N/A
|
WordPress FluentBoards plugin <= 1.91.2 - Insecure Dir⦠|
Mahmudul Hasan Arif |
FluentBoards |
2026-04-15T10:21:35.828Z | 2026-04-15T10:21:35.828Z |
| CVE-2026-40778 |
N/A
|
WordPress Majestic Support plugin <= 1.1.2 - Broken Ac⦠|
Majestic Support |
Majestic Support |
2026-04-15T10:21:35.665Z | 2026-04-15T10:21:35.665Z |
| CVE-2026-40764 |
N/A
|
WordPress Contact Form by WPForms plugin <= 1.10.0.2 -⦠|
Syed Balkhi |
Contact Form by WPForms |
2026-04-15T10:21:35.430Z | 2026-04-15T10:21:35.430Z |
| CVE-2026-40763 |
N/A
|
WordPress Royal Elementor Addons plugin <= 1.7.1056 - ⦠|
WP Royal |
Royal Elementor Addons |
2026-04-15T10:21:35.155Z | 2026-04-15T10:21:35.155Z |
| CVE-2026-40745 |
N/A
|
WordPress Element Pack Elementor Addons plugin <= 8.4.⦠|
bdthemes |
Element Pack Elementor Addons |
2026-04-15T10:21:34.904Z | 2026-04-15T10:21:34.904Z |
| CVE-2026-40744 |
N/A
|
WordPress Beaver Builder plugin <= 2.10.1.2 - SQL Inje⦠|
Beaver Builder |
Beaver Builder |
2026-04-15T10:21:34.729Z | 2026-04-15T10:21:34.729Z |
| CVE-2026-40742 |
N/A
|
WordPress Nelio AB Testing plugin <= 8.2.8 - Sensitive⦠|
Nelio Software |
Nelio AB Testing |
2026-04-15T10:21:34.560Z | 2026-04-15T10:21:34.560Z |
| CVE-2026-40740 |
N/A
|
WordPress Tutor LMS plugin <= 3.9.7 - Broken Access Co⦠|
Themeum |
Tutor LMS |
2026-04-15T10:21:34.311Z | 2026-04-15T10:21:34.311Z |
| CVE-2026-40737 |
N/A
|
WordPress COMPE plugin <= 1.1.4 - Insecure Direct Obje⦠|
VillaTheme |
COMPE |
2026-04-15T10:21:34.150Z | 2026-04-15T10:21:34.150Z |
| CVE-2026-40734 |
N/A
|
WordPress Categories Images plugin <= 3.3.1 - Cross Si⦠|
Zahlan |
Categories Images |
2026-04-15T10:21:33.995Z | 2026-04-15T10:21:33.995Z |
| CVE-2026-40730 |
N/A
|
WordPress ThemeGrill Demo Importer plugin <= 2.0.0.6 -⦠|
ThemeGrill |
ThemeGrill Demo Importer |
2026-04-15T10:21:33.831Z | 2026-04-15T10:21:33.831Z |
| CVE-2026-40729 |
N/A
|
WordPress 3D viewer ā Embed 3D Models plugin <= 1.8.5 ⦠|
bPlugins |
3D viewer ā Embed 3D Models |
2026-04-15T10:21:33.661Z | 2026-04-15T10:21:33.661Z |
| CVE-2026-40728 |
N/A
|
WordPress Magazine Blocks plugin <= 1.8.3 - Broken Acc⦠|
BlockArt |
Magazine Blocks |
2026-04-15T10:21:33.433Z | 2026-04-15T10:21:33.433Z |
| CVE-2026-28741 |
6.8 (3.1)
|
CSRF Protection Bypass Allows Updating a User's Authen⦠|
Mattermost |
Mattermost |
2026-04-15T10:13:33.950Z | 2026-04-15T10:13:33.950Z |
| CVE-2026-33805 |
9 (4.0)
|
@fastify/reply-from vulnerable to connection header ab⦠|
@fastify/reply-from |
@fastify/reply-from |
2026-04-15T10:13:25.147Z | 2026-04-15T10:13:25.147Z |
| CVE-2026-27769 |
2.7 (3.1)
|
Connected Workspaces: Malicious remote server can mani⦠|
Mattermost |
Mattermost |
2026-04-15T10:11:07.676Z | 2026-04-15T10:11:07.676Z |
| CVE-2026-33807 |
9.1 (3.1)
|
@fastify/express vulnerable to middleware path doublin⦠|
fastify |
@fastify/express |
2026-04-15T09:52:26.838Z | 2026-04-15T09:55:50.627Z |
| CVE-2024-33618 |
7.5 (3.1)
|
Uncontrolled Resource Consumption in Bosch VMS Ce⦠|
Bosch |
BVMS |
2026-04-15T09:51:52.722Z | 2026-04-15T09:51:52.722Z |
| CVE-2026-33808 |
9.1 (4.0)
|
@fastify/express vulnerable to middleware authenticati⦠|
fastify |
@fastify/express |
2026-04-15T09:29:46.091Z | 2026-04-15T09:29:46.091Z |
| CVE-2026-3505 |
8.7 (4.0)
|
Unbounded PGP AEAD chunk size leads to pre-auth resour⦠|
Legion of the Bouncy Castle Inc. |
BC-JAVA |
2026-04-15T09:06:37.939Z | 2026-04-15T10:42:23.323Z |
| CVE-2026-5588 |
10 (4.0)
|
PKIX draft CompositeVerifier accepts empty signature s⦠|
Legion of the Bouncy Castle Inc. |
BC-JAVA |
2026-04-15T09:06:15.617Z | 2026-04-15T09:06:15.617Z |
| CVE-2026-5598 |
10 (4.0)
|
Non-constant time comparisons risk private key leakage⦠|
Legion of the Bouncy Castle Inc. |
BC-JAVA |
2026-04-15T09:05:56.277Z | 2026-04-15T09:05:56.277Z |
| CVE-2026-0636 |
5.5 (4.0)
|
LDAP Injection Vulnerability in LDAPStoreHelper.java |
Legion of the Bouncy Castle Inc. |
BC-JAVA |
2026-04-15T08:59:12.677Z | 2026-04-15T09:46:44.996Z |
| CVE-2025-14813 |
9.3 (4.0)
|
GOSTCTR implementation unable to process more than 255⦠|
Legion of the Bouncy Castle Inc. |
BC-JAVA |
2026-04-15T08:56:34.057Z | 2026-04-15T10:08:52.068Z |
| CVE-2025-52641 |
2.9 (3.1)
|
Internal Filesystem Exploration vulnerability |
HCL |
AION |
2026-04-15T08:47:33.167Z | 2026-04-15T08:48:10.623Z |
| CVE-2026-3643 |
7.2 (3.1)
|
Accessibly <= 3.0.3 - Missing Authorization to Unauthe⦠|
onthemapmarketing |
Accessibly ā WordPress Website Accessibility |
2026-04-15T08:28:17.565Z | 2026-04-15T08:28:17.565Z |
| CVE-2026-4011 |
6.4 (3.1)
|
Power Charts <= 0.1.0 - Authenticated (Contributor+) S⦠|
dgwyer |
Power Charts ā Responsive Beautiful Charts & Graphs |
2026-04-15T08:28:17.209Z | 2026-04-15T08:28:17.209Z |
| CVE-2026-3998 |
6.4 (3.1)
|
WM JqMath <= 1.3 - Authenticated (Contributor+) Stored⦠|
webmindpt |
WM JqMath |
2026-04-15T08:28:16.854Z | 2026-04-15T08:28:16.854Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40688 |
6.7 (3.1)
|
An out-of-bounds write vulnerability [CWE-787] vu⦠|
Fortinet |
FortiWeb |
2026-04-14T22:35:15.438Z | 2026-04-15T08:53:24.743Z |
| CVE-2026-39399 |
9.6 (3.1)
|
NuGet Gallery: Arbitrary Blob Overwrite via Nuspec Con⦠|
NuGet |
NuGetGallery |
2026-04-14T23:01:38.176Z | 2026-04-14T23:01:38.176Z |
| CVE-2026-39387 |
7.2 (3.1)
|
BoidCMS: Local File Inclusion (LFI) leads to Remote Co⦠|
BoidCMS |
BoidCMS |
2026-04-14T22:56:20.935Z | 2026-04-14T22:56:20.935Z |
| CVE-2026-35589 |
8 (3.1)
|
nanobot: Cross-Site WebSocket Hijacking in WhatsApp Br⦠|
HKUDS |
nanobot |
2026-04-14T22:47:32.837Z | 2026-04-14T22:47:32.837Z |
| CVE-2026-35034 |
6.5 (3.1)
|
Jellyfin: Potential Application DoS from excessively l⦠|
jellyfin |
jellyfin |
2026-04-14T22:31:44.796Z | 2026-04-14T22:31:44.796Z |
| CVE-2026-35033 |
9.3 (4.0)
|
Jellyfin: Potential SSRF + Arbitrary file read via str⦠|
jellyfin |
jellyfin |
2026-04-14T22:28:47.558Z | 2026-04-14T22:29:33.684Z |
| CVE-2026-35032 |
8.6 (4.0)
|
Jellyfin: Potential SSRF + Arbitrary file read via Liv⦠|
jellyfin |
jellyfin |
2026-04-14T22:25:35.729Z | 2026-04-14T22:25:35.729Z |
| CVE-2026-35031 |
10 (3.1)
|
Jellyfin: Potential RCE via subtitle upload path trave⦠|
jellyfin |
jellyfin |
2026-04-14T22:18:30.565Z | 2026-04-14T22:18:30.565Z |
| CVE-2026-34457 |
9.1 (3.1)
|
OAuth2 Proxy: Health Check User-Agent Matching Bypasse⦠|
oauth2-proxy |
oauth2-proxy |
2026-04-14T22:14:38.937Z | 2026-04-14T22:14:38.937Z |
| CVE-2026-34454 |
3.5 (3.1)
|
OAuth2 Proxy: Session cookie not cleared when renderin⦠|
oauth2-proxy |
oauth2-proxy |
2026-04-14T22:10:37.901Z | 2026-04-14T22:14:00.972Z |
| CVE-2026-33414 |
4 (4.0)
|
PowerShell Command Injection in Podman HyperV Machine |
containers |
podman |
2026-04-14T22:42:19.822Z | 2026-04-14T22:42:19.822Z |
| CVE-2026-33023 |
7.8 (3.1)
|
libsixel: Use-after-free in load_with_gdkpixbuf() |
saitoha |
libsixel |
2026-04-14T22:05:31.493Z | 2026-04-14T22:05:31.493Z |
| CVE-2026-33021 |
7.3 (3.1)
|
libsixel: Use-after-free in sixel_encoder_encode_bytes() |
saitoha |
libsixel |
2026-04-14T21:57:22.817Z | 2026-04-14T21:57:22.817Z |
| CVE-2026-27301 |
5.5 (3.1)
|
Adobe Framemaker | Heap-based Buffer Overflow (CWE-122) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:13.588Z | 2026-04-14T22:58:13.588Z |
| CVE-2026-27300 |
5.5 (3.1)
|
Adobe Framemaker | Access of Uninitialized Pointer (CWE-824) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:18.661Z | 2026-04-14T22:58:18.661Z |
| CVE-2026-27299 |
6.3 (3.1)
|
Adobe Framemaker | Improper Input Validation (CWE-20) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:12.664Z | 2026-04-14T22:58:12.664Z |
| CVE-2026-27298 |
7.8 (3.1)
|
Adobe Framemaker | Access of Resource Using Incompatib⦠|
Adobe |
Adobe Framemaker |
2026-04-14T22:58:16.131Z | 2026-04-15T09:13:10.357Z |
| CVE-2026-27297 |
7.8 (3.1)
|
Adobe Framemaker | Integer Underflow (Wrap or Wraparou⦠|
Adobe |
Adobe Framemaker |
2026-04-14T22:58:20.265Z | 2026-04-15T09:13:09.916Z |
| CVE-2026-27296 |
7.8 (3.1)
|
Adobe Framemaker | Integer Underflow (Wrap or Wraparou⦠|
Adobe |
Adobe Framemaker |
2026-04-14T22:58:17.850Z | 2026-04-15T09:13:10.081Z |
| CVE-2026-27295 |
7.8 (3.1)
|
Adobe Framemaker | Out-of-bounds Write (CWE-787) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:14.461Z | 2026-04-15T09:13:10.635Z |
| CVE-2026-27294 |
7.8 (3.1)
|
Adobe Framemaker | Out-of-bounds Read (CWE-125) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:15.307Z | 2026-04-15T09:13:10.507Z |
| CVE-2026-27293 |
7.8 (3.1)
|
Adobe Framemaker | Heap-based Buffer Overflow (CWE-122) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:11.812Z | 2026-04-15T09:13:10.769Z |
| CVE-2026-27292 |
7.8 (3.1)
|
Adobe Framemaker | Use After Free (CWE-416) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:10.867Z | 2026-04-15T09:13:10.924Z |
| CVE-2026-27290 |
8.6 (3.1)
|
Adobe Framemaker | Untrusted Search Path (CWE-426) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:17.003Z | 2026-04-15T09:13:10.218Z |
| CVE-2026-40291 |
8.8 (3.1)
|
Chamilo LMS has Privilege Escalation via API User Role⦠|
chamilo |
chamilo-lms |
2026-04-14T21:37:55.490Z | 2026-04-14T21:37:55.490Z |
| CVE-2026-39907 |
7 (4.0)
|
Unisys WebPerfect Image Suite 3.0 NTLMv2 Hash Leakage ⦠|
Unisys |
WebPerfect Image Suite |
2026-04-14T21:21:43.564Z | 2026-04-14T21:21:43.564Z |
| CVE-2026-39906 |
7 (4.0)
|
Unisys WebPerfect Image Suite 3.0 NTLMv2 Hash Leakage ⦠|
Unisys |
WebPerfect Image Suite |
2026-04-14T21:21:21.739Z | 2026-04-14T21:21:21.739Z |
| CVE-2026-35196 |
8.8 (3.1)
|
Chamilo LMS has OS Command Injection via export_all_ce⦠|
chamilo |
chamilo-lms |
2026-04-14T21:33:13.518Z | 2026-04-14T21:33:13.518Z |
| CVE-2026-34631 |
7.8 (3.1)
|
InCopy | Out-of-bounds Write (CWE-787) |
Adobe |
InCopy |
2026-04-14T21:14:03.822Z | 2026-04-14T21:14:03.822Z |
| CVE-2026-34619 |
7.7 (3.1)
|
ColdFusion | Improper Limitation of a Pathname to a Re⦠|
Adobe |
ColdFusion |
2026-04-14T21:53:59.589Z | 2026-04-14T21:53:59.589Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-m3qh-6w2c-jgrx |
7.2 (3.1)
|
A out-of-bounds write vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 throug⦠| 2026-04-15T00:31:36Z | 2026-04-15T00:31:36Z |
| ghsa-qhm2-fwj3-3r79 |
7.0 (4.0)
|
Unisys WebPerfect Image Suite versions 3.0.3960.22810 and 3.0.3960.22604 expose a deprecated .NET R⦠| 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-qgcm-8wwj-ghmv |
7.8 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by an out-of-bounds read vulnerability wh⦠| 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-pgfp-3xc3-mf3p |
7.8 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by an Integer Underflow (Wrap or Wraparou⦠| 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-mwv4-vh82-wfp9 |
6.3 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by an Improper Input Validation vulnerabi⦠| 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-j2hh-7j22-p596 |
7.8 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by a Heap-based Buffer Overflow vulnerabi⦠| 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-h6wr-vq3g-hh7j |
7.8 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by an Access of Resource Using Incompatib⦠| 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-9qfg-pjw2-8grg |
8.6 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by an Untrusted Search Path vulnerability⦠| 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-8v2w-q3wx-m958 |
5.5 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by an Access of Uninitialized Pointer vul⦠| 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-8jpv-7gww-9r9j |
7.0 (4.0)
|
Unisys WebPerfect Image Suite versions 3.0.3960.22810 and 3.0.3960.22604 expose an unauthenticated ⦠| 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-6hg8-2cxf-7p6v |
7.8 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by an Integer Underflow (Wrap or Wraparou⦠| 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-573h-4gmm-4r9w |
7.8 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by an out-of-bounds write vulnerability t⦠| 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-39g8-p82f-45mx |
5.5 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by a Heap-based Buffer Overflow vulnerabi⦠| 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-34mc-mx9w-h5cv |
7.8 (3.1)
|
Adobe Framemaker versions 2022.8 and earlier are affected by a Use After Free vulnerability that co⦠| 2026-04-15T00:31:35Z | 2026-04-15T00:31:35Z |
| ghsa-x69p-j55w-wfwc |
7.7 (3.1)
|
ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Limitation of a Pathnam⦠| 2026-04-15T00:31:34Z | 2026-04-15T00:31:34Z |
| ghsa-rrr4-c4r3-6q77 |
2.4 (3.1)
|
ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Uncontrolled Resource Consumptio⦠| 2026-04-15T00:31:34Z | 2026-04-15T00:31:34Z |
| ghsa-p34m-2cjp-296f |
2.4 (3.1)
|
ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Uncontrolled Resource Consumptio⦠| 2026-04-15T00:31:34Z | 2026-04-15T00:31:34Z |
| ghsa-jx8w-6mv7-8qj4 |
7.8 (3.1)
|
InCopy versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds write vulnerability that ⦠| 2026-04-15T00:31:34Z | 2026-04-15T00:31:34Z |
| ghsa-75q9-6h6m-fmrg |
8.4 (3.1)
|
ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Input Validation vulner⦠| 2026-04-15T00:31:34Z | 2026-04-15T00:31:34Z |
| ghsa-rfcg-4cq5-pfmm |
7.5 (3.1)
|
ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Input Validation vulner⦠| 2026-04-15T00:31:33Z | 2026-04-15T00:31:33Z |
| ghsa-ppfw-rp5w-2c9c |
8.6 (3.1)
|
ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Limitation of a Pathnam⦠| 2026-04-15T00:31:33Z | 2026-04-15T00:31:34Z |
| ghsa-gw2m-9w3j-j7m2 |
5.3 (3.1)
|
The Nexi XPay plugin for WordPress is vulnerable to unauthorized modification of data due to missin⦠| 2026-04-15T00:31:33Z | 2026-04-15T00:31:33Z |
| ghsa-9mp8-pgq2-4399 |
9.3 (3.1)
|
ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Input Validation vulner⦠| 2026-04-15T00:31:33Z | 2026-04-15T00:31:33Z |
| ghsa-g4vj-cjjj-v7hg |
|
Defense in Depth update for NuGet Client | 2026-04-14T23:42:30Z | 2026-04-14T23:42:30Z |
| ghsa-2x79-gwq3-vxxm |
8.7 (4.0)
|
Uncontrolled resource consumption and loop with unreachable exit condition in facil.io and downstre⦠| 2026-04-14T23:41:06Z | 2026-04-14T23:41:06Z |
| ghsa-355h-qmc2-wpwf |
7.4 (3.1)
|
Jetty has HTTP Request Smuggling via Chunked Extension Quoted-String Parsing | 2026-04-14T23:40:31Z | 2026-04-14T23:40:31Z |
| ghsa-hv4r-mvr4-25vw |
8.8 (4.0)
|
MinIO has an Unauthenticated Object Write via Query-String Credential Signature Bypass in Unsigned-⦠| 2026-04-14T23:40:05Z | 2026-04-14T23:40:05Z |
| ghsa-2hx3-vp6r-mg3f |
7.3 (4.0)
|
Kiota: Code Generation Literal Injection | 2026-04-14T23:39:41Z | 2026-04-14T23:39:41Z |
| ghsa-fj52-5g4h-gmq8 |
2.9 (4.0)
|
pyLoad's Session Not Invalidated After Permission Changes | 2026-04-14T23:39:25Z | 2026-04-14T23:39:25Z |
| ghsa-66hx-chf7-3332 |
8.8 (3.1)
|
pyLoad has Stale Session Privilege After Role/Permission Change (Privilege Revocation Bypass) | 2026-04-14T23:38:35Z | 2026-04-14T23:38:35Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2026-3 |
|
After an API token exposure from an exploited Trivy dependency, two new releases of `teln⦠| telnyx | 2026-03-27T14:53:14Z | |
| pysec-2026-2 |
|
After an API Token exposure from an exploited Trivy dependency, two new releases of `lite⦠| litellm | 2026-03-24T15:35:32Z | |
| pysec-2026-1 |
|
A PyPI user account compromised by an attacker and was able to upload a malicious version⦠| dydx-v4-client | 2026-01-28T21:09:02+00:00 | |
| pysec-2025-72 |
|
The `num2words` project was compromised via a phishing attack and two new versions were u⦠| num2words | 2025-07-31T14:34:47+00:00 | |
| pysec-2025-71 |
|
Cadwyn creates production-ready community-driven modern Stripe-like API versioning in Fas⦠| cadwyn | 2025-07-21T21:15:25+00:00 | 2025-07-23T15:24:03.825615+00:00 |
| pysec-2025-69 |
|
In Roundup before 2.5.0, XSS can occur via interaction between URLs and issue tracker tem⦠| roundup | 2025-07-13T20:15:25+00:00 | 2025-07-13T21:23:01.161315+00:00 |
| pysec-2025-65 |
|
A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0⦠| llama-index | 2025-07-07T13:15:28+00:00 | 2025-07-07T15:23:42.730681+00:00 |
| pysec-2025-61 |
|
Pillow is a Python imaging library. In versions 11.2.0 to before 11.3.0, there is a heap ⦠| pillow | 2025-07-01T19:15:27Z | 2025-07-07T14:12:46.226030Z |
| pysec-2025-51 |
|
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) v⦠| apache-airflow-providers-snowflake | 2025-06-24T08:15:24+00:00 | 2025-06-26T21:23:03.132527+00:00 |
| pysec-2025-70 |
10.0 (3.1)
|
A Server-Side Request Forgery (SSRF) vulnerability exists in the RequestsToolkit componen⦠| langchain-community | 2025-06-23T21:15:25+00:00 | 2025-07-16T21:23:40.211079+00:00 |
| pysec-2025-52 |
|
gateway_proxy_handler in MLflow before 3.1.0 lacks gateway_path validation. | mlflow | 2025-06-23T15:15:29Z | 2025-12-05T13:25:55.146081Z |
| pysec-2025-68 |
8.0 (3.1)
|
A vulnerability, which was classified as critical, has been found in Upsonic up to 0.55.6⦠| upsonic | 2025-06-19T21:15:27+00:00 | 2025-07-08T19:22:27.449399+00:00 |
| pysec-2025-67 |
9.8 (3.1)
|
A vulnerability classified as critical was found in Upsonic up to 0.55.6. This vulnerabil⦠| upsonic | 2025-06-19T21:15:27+00:00 | 2025-07-08T19:22:27.385619+00:00 |
| pysec-2025-64 |
9.8 (3.1)
|
A vulnerability classified as critical has been found in themanojdesai python-a2a up to 0⦠| python-a2a | 2025-06-17T07:15:18+00:00 | 2025-07-02T21:23:13.806273+00:00 |
| pysec-2025-47 |
|
An issue was discovered in Django 5.2 before 5.2.2, 5.1 before 5.1.10, and 4.2 before 4.2⦠| django | 2025-06-05T03:15:25+00:00 | 2025-06-05T05:23:28.296596+00:00 |
| pysec-2025-44 |
|
django-helpdesk before 1.0.0 allows Sensitive Data Exposure because of os.umask(0) in mod⦠| django-helpdesk | 2025-05-31T01:15:19+00:00 | 2025-05-31T03:09:35.357757+00:00 |
| pysec-2025-55 |
|
vLLM is an inference and serving engine for large language models (LLMs). Version 0.8.0 u⦠| vllm | 2025-05-30T19:15:30+00:00 | 2025-06-26T21:23:06.407481+00:00 |
| pysec-2025-54 |
|
vLLM is an inference and serving engine for large language models (LLMs). In versions 0.8⦠| vllm | 2025-05-30T19:15:30+00:00 | 2025-06-26T21:23:06.319321+00:00 |
| pysec-2025-50 |
|
vLLM, an inference and serving engine for large language models (LLMs), has a Regular Exp⦠| vllm | 2025-05-30T18:15:32+00:00 | 2025-06-19T03:02:28.572160+00:00 |
| pysec-2025-53 |
|
vLLM is an inference and serving engine for large language models (LLMs). Prior to versio⦠| vllm | 2025-05-29T17:15:21+00:00 | 2025-06-26T21:23:06.231251+00:00 |
| pysec-2025-43 |
|
vLLM is an inference and serving engine for large language models (LLMs). In versions sta⦠| vllm | 2025-05-29T17:15:21+00:00 | 2025-05-29T19:21:01.611587+00:00 |
| pysec-2025-46 |
5.5 (3.1)
|
A vulnerability was found in erdogant pypickle up to 1.1.5. It has been classified as cri⦠| pypickle | 2025-05-26T08:15:19+00:00 | 2025-06-03T17:36:58.579358+00:00 |
| pysec-2025-45 |
7.8 (3.1)
|
A vulnerability was found in erdogant pypickle up to 1.1.5 and classified as problematic.⦠| pypickle | 2025-05-26T07:15:26+00:00 | 2025-06-03T17:36:58.528116+00:00 |
| pysec-2025-40 |
7.5 (3.1)
|
A vulnerability in the `preprocess_string()` function of the `transformers.testing_utils`⦠| transformers | 2025-05-19T12:15:19+00:00 | 2025-05-21T19:22:10.801823+00:00 |
| pysec-2025-49 |
8.8 (3.1)
|
setuptools is a package that allows users to download, build, install, upgrade, and unins⦠| setuptools | 2025-05-17T16:15:19+00:00 | 2025-06-12T22:23:11.115559+00:00 |
| pysec-2025-39 |
|
motionEye is an online interface for the software motion, a video surveillance program wi⦠| motioneye | 2025-05-14T16:15:29+00:00 | 2025-05-14T17:22:51.050788+00:00 |
| pysec-2025-60 |
|
Exposure of Sensitive Information to an Unauthorized Actor, Insertion of Sensitive Inform⦠| apache-iotdb | 2025-05-14T11:16:28+00:00 | 2025-07-01T21:22:47.232036+00:00 |
| pysec-2025-59 |
|
Remote Code Execution with untrusted URI of UDF vulnerability in Apache IoTDB. The attack⦠| apache-iotdb | 2025-05-14T11:15:47+00:00 | 2025-07-01T21:22:47.177405+00:00 |
| pysec-2025-38 |
|
OpenStack Ironic before 29.0.1 can write unintended files to a target node disk during im⦠| ironic | 2025-05-08T17:16:01Z | 2025-05-13T04:24:03.083929Z |
| pysec-2025-37 |
|
An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2⦠| django | 2025-05-08T04:17:18+00:00 | 2025-05-08T05:23:16.210893+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2683 | Malicious code in @athena-ui-components/axios (npm) | 2026-04-15T09:40:47Z | 2026-04-15T09:40:47Z |
| mal-2026-2681 | Malicious code in @athena-ui-components/dashboard-widget (npm) | 2026-04-15T09:00:54Z | 2026-04-15T09:00:54Z |
| mal-2026-2682 | Malicious code in @athena-ui-components/deeplink (npm) | 2026-04-15T09:00:45Z | 2026-04-15T09:00:45Z |
| mal-2026-2680 | Malicious code in @veygo/component-library (npm) | 2026-04-15T03:25:57Z | 2026-04-15T03:25:57Z |
| mal-2026-2679 | Malicious code in snitz-chief-cloud-config (npm) | 2026-04-15T03:12:05Z | 2026-04-15T03:12:06Z |
| mal-2026-2678 | Malicious code in snitz-chief-cloud (npm) | 2026-04-15T03:12:05Z | 2026-04-15T03:12:05Z |
| mal-2026-2677 | Malicious code in pdf-linker (npm) | 2026-04-15T03:12:05Z | 2026-04-15T03:12:05Z |
| mal-2026-2676 | Malicious code in moscova-plural-json-parser (npm) | 2026-04-15T03:12:05Z | 2026-04-15T03:12:06Z |
| mal-2026-2674 | Malicious code in chief-proxy-out (npm) | 2026-04-15T03:12:05Z | 2026-04-15T03:12:06Z |
| mal-2026-2673 | Malicious code in chief-documentation (npm) | 2026-04-15T03:12:05Z | 2026-04-15T03:12:05Z |
| mal-2026-2675 | Malicious code in mongoose-stamps (npm) | 2026-04-15T03:07:56Z | 2026-04-15T03:07:57Z |
| mal-2026-2672 | Malicious code in ahmed_salem_ph (npm) | 2026-04-15T03:02:45Z | 2026-04-15T03:02:45Z |
| mal-2026-2671 | Malicious code in kryptex-os (PyPI) | 2026-04-14T21:55:34Z | 2026-04-14T21:55:34Z |
| mal-2026-2670 | Malicious code in 7miners (PyPI) | 2026-04-14T21:55:03Z | 2026-04-14T21:55:03Z |
| mal-2026-2669 | Malicious code in ant-mcp-proxy-for-test (PyPI) | 2026-04-14T21:19:11Z | 2026-04-14T21:19:23Z |
| mal-2026-2668 | Malicious code in pnpm-workspaces (npm) | 2026-04-14T19:36:06Z | 2026-04-14T19:36:06Z |
| mal-2026-2667 | Malicious code in ckeditor5-minimap (npm) | 2026-04-14T19:06:02Z | 2026-04-14T19:06:02Z |
| mal-2026-2666 | Malicious code in moooo (PyPI) | 2026-04-14T15:21:49Z | 2026-04-14T15:21:49Z |
| mal-2026-2664 | Malicious code in buildenv-telemetry (PyPI) | 2026-04-14T14:28:02Z | 2026-04-14T14:28:02Z |
| mal-2026-2665 | Malicious code in hive-os-settings (PyPI) | 2026-04-14T14:27:24Z | 2026-04-14T14:27:24Z |
| mal-2026-2663 | Malicious code in tether-wrk-base (npm) | 2026-04-14T13:36:19Z | 2026-04-14T14:41:15Z |
| mal-2026-2662 | Malicious code in @automation-toolchain/f5-cloud-libs (npm) | 2026-04-14T13:05:55Z | 2026-04-14T13:40:00Z |
| mal-2026-2658 | Malicious code in tailwindcss-style-typography (npm) | 2026-04-14T12:12:36Z | 2026-04-14T12:12:37Z |
| mal-2026-2657 | Malicious code in tailwind-typ (npm) | 2026-04-14T12:01:40Z | 2026-04-14T12:01:41Z |
| mal-2026-2656 | Malicious code in tailwind-stylecss-typography (npm) | 2026-04-14T11:52:39Z | 2026-04-14T11:52:40Z |
| mal-2026-2641 | Malicious code in chai-as-refined (npm) | 2026-04-14T11:48:44Z | 2026-04-14T11:48:44Z |
| mal-2026-2659 | Malicious code in ui-utils-udhay-alerts (npm) | 2026-04-14T11:47:49Z | 2026-04-14T11:47:49Z |
| mal-2026-2644 | Malicious code in node-unpnotifyserv (npm) | 2026-04-14T11:47:49Z | 2026-04-14T11:47:50Z |
| mal-2026-2654 | Malicious code in pinstatsd (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:19Z |
| mal-2026-2653 | Malicious code in pinlogger (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:19Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| 7paa020125 | Denial of Service Vulnerabilities in System 800xA, SymphonyĀ® Plus IEC 61850 communication stack | 2026-04-13T00:30:00.000Z | 2026-04-13T00:30:00.000Z |
| 7paa017341 | PostgreSQL vulnerabilities in ABB Ability⢠Symphony® Plus Engineering | 2026-04-13T00:30:00.000Z | 2026-04-13T00:30:00.000Z |
| 7paa023732 | System 800xA affected by 3rd party component vulnerabilities | 2026-03-31T00:30:00.000Z | 2026-03-31T00:30:00.000Z |
| 4hzm000604 | ABB Ability Camera Connect Vulnerabilities in outdated 3rd party component (SQLite 3.2.4) | 2026-03-26T00:30:00.000Z | 2026-03-26T00:30:00.000Z |
| 4jno000329 | AWIN Gateways Vulnerabilities in Embedded Webserver | 2026-03-13T00:30:00.000Z | 2026-03-13T00:30:00.000Z |
| 3adr011536 | AC500 V3 Stack buffer overflow in Cryptographic Message Syntax | 2026-03-12T00:30:00.000Z | 2026-03-12T00:30:00.000Z |
| 3adr011525 | ABB Automation Builder Gateway for Windows with insecure defaults | 2026-02-24T00:30:00.000Z | 2026-02-24T00:30:00.000Z |
| 3adr011524 | AC500 V3 Multiple vulnerabilities | 2026-02-24T00:30:00.000Z | 2026-02-24T00:30:00.000Z |
| sa25p007 | B&R Automation Studio Update of SQLite version | 2026-02-18T00:30:00.000Z | 2026-02-18T00:30:00.000Z |
| sa26p001 | āāPVIā āāInsertion of Sensitive Information into Logfile | 2026-01-29T00:30:00.000Z | 2026-01-29T00:30:00.000Z |
| sa24p003 | āB&R PCs vulnerable to PixieFail attackā | 2026-01-29T00:30:00.000Z | 2026-01-29T00:30:00.000Z |
| sa25p005 | B&R Automation Runtime Improper Handling of Flooding conditions on ANSL Server | 2026-01-19T00:30:00.000Z | 2026-01-19T00:30:00.000Z |
| sa25p004 | Automation Studio Insufficient Server Certificate Validation | 2026-01-19T00:30:00.000Z | 2026-01-19T00:30:00.000Z |
| 9akk108472a1331 | ABB Ability⢠OPTIMAX® Authentication Bypass in Single-Sign On with Azure Active Directory | 2026-01-16T00:30:00.000Z | 2026-01-16T00:30:00.000Z |
| 2crt000009 | WebPro SNMP Card PowerValue Multiple Vulnerabilities | 2026-01-07T00:30:00.000Z | 2026-01-07T00:30:00.000Z |
| 4hzm000603 | ABB Ability Camera Connect Vulnerabilities in outdated 3rd party component (VLC) | 2025-11-27T00:30:00.000Z | 2025-11-28T00:30:00.000Z |
| 7paa022088 | Edgenius Management Portal Authentication Bypass | 2025-11-20T00:30:00.000Z | 2025-11-20T00:30:00.000Z |
| 2nga002813 | PCM600 SharpZip library vulnerability | 2025-11-03T00:30:00.000Z | 2025-11-03T00:30:00.000Z |
| 9akk108471a8948 | Terra AC wallbox Heap Memory Corruption Vulnerability | 2025-10-20T00:30:00.000Z | 2025-10-21T00:30:00.000Z |
| 4tz00000006007 | ALS-mini-S4/S8 IP Missing Authentication Vulnerability and its Mitigations | 2025-10-20T00:30:00.000Z | 2025-10-23T00:30:00.000Z |
| 4tz00000006008 | LVS MConfig Insecure memory handling | 2025-10-08T00:30:00.000Z | 2025-10-08T00:30:00.000Z |
| sa25p003 | B&R Automation Runtime Vulnerabilities in System Diagnostic Manager (SDM) | 2025-10-07T00:30:00.000Z | 2025-10-14T00:30:00.000Z |
| sa25p002 | B&R Automation Runtime DoS Vulnerability in System Diagnostics Manager (SDM) | 2025-10-07T00:30:00.000Z | 2025-10-07T00:30:00.000Z |
| 9akk108471a7808 | EIBPORT Reflected XSS | 2025-10-07T00:30:00.000Z | 2025-10-07T00:30:00.000Z |
| 9akk108471a8107 | Terra AC wallbox Heap Memory Corruption Vulnerability | 2025-09-16T00:30:00.000Z | 2025-11-28T08:00:00.000Z |
| 9akk108471a7121 | FLXeon Controllers Multiple vulnerabilities | 2025-09-09T00:30:00.000Z | 2025-09-18T00:30:00.000Z |
| 2nga002743 | ABB AbilityTM zenon Remote Transport Vulnerability | 2025-08-12T00:30:00.000Z | 2025-08-12T00:30:00.000Z |
| 9akk108471a4462 | ELSB/BLBA ASPECT advisory several CVEs | 2025-08-11T00:30:00.000Z | 2025-09-04T00:30:00.000Z |
| 3adr011432 | AC500 V2 Buffer overread on Modbus protocol | 2025-07-23T00:30:00.000Z | 2025-07-23T00:30:00.000Z |
| 9akk108471a4556 | Busch-WelcomeĀ® 2 wire Door opener actuator by default in compatibility mode. | 2025-07-21T00:30:00.000Z | 2025-07-21T00:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-1054 | Apache log4net: Schwachstelle ermƶglicht Manipulation von Dateien | 2026-04-12T22:00:00.000+00:00 | 2026-04-14T22:00:00.000+00:00 |
| wid-sec-w-2026-1047 | Adobe Acrobat Reader: Schwachstelle ermöglicht Offenlegung von Informationen und Codeausführung | 2026-04-09T22:00:00.000+00:00 | 2026-04-12T22:00:00.000+00:00 |
| wid-sec-w-2026-1036 | OpenCTI: Schwachstelle ermöglicht Codeausführung | 2026-04-08T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-1027 | LangChain: Schwachstelle ermƶglicht Umgehen von Sicherheitsvorkehrungen | 2026-04-08T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-1023 | libpng: Schwachstelle ermƶglicht Offenlegung von Informationen | 2026-04-08T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-1022 | Juniper Patchday April 2026: Mehrere Schwachstellen | 2026-04-08T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-1020 | Intel Prozessoren (Pentium Silver Series, Celeron J Series, und Celeron N series): Schwachstelle ermƶglicht Privilegieneskalation | 2026-04-08T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-1012 | SonicWall SMA1000 : Mehrere Schwachstellen | 2026-04-08T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-1006 | Golang Go: Mehrere Schwachstellen | 2026-04-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-1002 | Django: Mehrere Schwachstellen | 2026-04-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0997 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2026-04-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0995 | OpenSSL: Mehrere Schwachstellen | 2026-04-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0982 | OpenBSD: Schwachstelle ermƶglicht nicht spezifizierten Angriff | 2026-04-06T22:00:00.000+00:00 | 2026-04-07T22:00:00.000+00:00 |
| wid-sec-w-2026-0967 | Red Hat Enterprise Linux (fontforge): Schwachstelle ermöglicht Codeausführung | 2026-04-06T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0966 | Red Hat Enterprise Linux (crun): Schwachstelle ermƶglicht Privilegieneskalation | 2026-04-06T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0950 | Linux Kernel: Mehrere Schwachstellen | 2026-03-31T22:00:00.000+00:00 | 2026-04-14T22:00:00.000+00:00 |
| wid-sec-w-2026-0939 | cPanel cPanel/WHM (perl-YAML-Syck): Schwachstelle ermöglicht Codeausführung und DoS | 2026-03-31T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0937 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2026-03-31T22:00:00.000+00:00 | 2026-04-06T22:00:00.000+00:00 |
| wid-sec-w-2026-0909 | Tinyproxy: Schwachstelle ermƶglicht Denial of Service | 2026-03-29T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0904 | vim: Schwachstelle ermöglicht Codeausführung | 2026-03-29T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0892 | WatchGuard Firebox: Mehrere Schwachstellen | 2026-03-26T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0891 | Dovecot: Mehrere Schwachstellen | 2026-03-26T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0888 | tigervnc: Schwachstelle ermƶglicht Offenlegung von Informationen, Manipulation von Dateien, und Denial of Service | 2026-03-26T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0887 | Internet Systems Consortium Kea: Schwachstelle ermƶglicht Denial of Service | 2026-03-26T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0885 | n8n: Schwachstelle ermƶglicht SQL-Injection | 2026-03-26T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0884 | OpenClaw: Mehrere Schwachstellen | 2026-03-26T23:00:00.000+00:00 | 2026-04-12T22:00:00.000+00:00 |
| wid-sec-w-2026-0882 | GIMP: Schwachstelle ermƶglicht Denial of Service und Offenlegung von Informationen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0881 | IBM License Metric Tool: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0880 | FreeRDP: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0879 | Linux Kernel: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-04-08T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-099-02 | GPL Odorizers GPL750 | 2026-04-09T06:00:00.000000Z | 2026-04-09T06:00:00.000000Z |
| icsa-26-099-01 | Contemporary Controls BASC 20T | 2026-04-09T06:00:00.000000Z | 2026-04-09T06:00:00.000000Z |
| va-26-097-02 | IBM Maximo Application Suite Sensitive Tokens without 'Secure' Attribute | 2026-04-07T20:51:13Z | 2026-04-07T20:51:13Z |
| va-26-097-01 | Thales Sentinel LDK Runtime Stored XSS | 2026-04-07T20:50:15Z | 2026-04-07T20:50:15Z |
| icsa-26-097-01 | Mitsubishi Electric GENESIS64 and ICONICS Suite products | 2026-04-07T00:00:00.000000Z | 2026-04-07T06:00:00.000000Z |
| va-26-092-01 | Bentley Systems iTwin Platform exposed access token | 2026-04-02T17:11:43Z | 2026-04-02T17:11:43Z |
| va-26-092-02 | Zscaler Client Connector hard-coded proxy configuration domain | 2026-04-02T13:54:30Z | 2026-04-02T13:54:30Z |
| icsa-26-092-02 | Yokogawa CENTUM VP | 2026-04-02T06:00:00.000000Z | 2026-04-02T06:00:00.000000Z |
| icsa-26-090-02 | PX4 Autopilot | 2026-03-31T06:00:00.000000Z | 2026-03-31T06:00:00.000000Z |
| icsa-26-090-01 | Anritsu Remote Spectrum Monitor | 2026-03-31T06:00:00.000000Z | 2026-03-31T06:00:00.000000Z |
| icsa-26-092-01 | Siemens SICAM 8 Products | 2026-03-26T00:00:00.000000Z | 2026-04-02T06:00:00.000000Z |
| va-26-084-01 | Nanoleaf Lines unauthenticated firmware file store | 2026-03-25T00:00:00Z | 2026-04-02T00:00:00Z |
| icsma-26-083-01 | Grassroots DICOM (GDCM) | 2026-03-24T06:00:00.000000Z | 2026-03-24T06:00:00.000000Z |
| icsa-26-083-01 | Pharos Controls Mosaic Show Controller | 2026-03-24T06:00:00.000000Z | 2026-03-24T06:00:00.000000Z |
| icsa-26-078-08 | Automated Logic WebCTRL Premium Server | 2026-03-19T06:00:00.000000Z | 2026-03-19T06:00:00.000000Z |
| icsa-26-078-07 | IGL-Technologies eParking.fi | 2026-03-19T05:00:00.000000Z | 2026-03-19T05:00:00.000000Z |
| icsa-26-078-06 | CTEK Chargeportal | 2026-03-19T05:00:00.000000Z | 2026-03-19T05:00:00.000000Z |
| icsa-26-071-06 | Inductive Automation Ignition Software | 2026-03-12T06:00:00.000000Z | 2026-03-13T06:00:00.000000Z |
| icsa-26-071-01 | Trane Tracer SC, Tracer SC+, and Tracer Concierge | 2026-03-12T06:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-083-02 | Schneider Electric EcoStruxure Foxboro DCS | 2026-03-10T07:00:00.000000Z | 2026-03-24T06:00:00.000000Z |
| icsa-26-078-04 | Schneider Electric EcoStruxure PME and EPO | 2026-03-10T07:00:00.000000Z | 2026-03-19T06:00:00.000000Z |
| icsa-26-078-03 | Schneider Electric EcoStruxure Automation Expert | 2026-03-10T07:00:00.000000Z | 2026-03-19T06:00:00.000000Z |
| icsa-26-078-02 | Schneider Electric Modicon Controllers M241, M251, M258, and LMC058 | 2026-03-10T07:00:00.000000Z | 2026-03-19T06:00:00.000000Z |
| icsa-26-078-01 | Schneider Electric Modicon M241, M251, and M262 | 2026-03-10T07:00:00.000000Z | 2026-03-19T06:00:00.000000Z |
| icsa-26-076-03 | Schneider Electric EcoStruxure Data Center Expert | 2026-03-10T07:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-069-03 | Honeywell IQ4x BMS Controller | 2026-03-10T06:00:00.000000Z | 2026-03-10T06:00:00.000000Z |
| icsa-26-069-02 | Lantronix EDS3000PS and EDS5000 | 2026-03-10T06:00:00.000000Z | 2026-03-10T06:00:00.000000Z |
| icsa-26-069-01 | Apeman Cameras | 2026-03-10T06:00:00.000000Z | 2026-03-10T06:00:00.000000Z |
| icsa-26-069-04 | Ceragon Siklu MultiHaul and EtherHaul Series | 2026-03-10T05:00:00.000000Z | 2026-03-10T05:00:00.000000Z |
| icsa-26-078-05 | Mitsubishi Electric CNC Series | 2026-03-10T00:00:00.000000Z | 2026-03-19T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ssm-cli-execution-chucwunr | Cisco Smart Software Manager On-Prem Arbitrary Command Execution Vulnerability | 2026-04-01T16:00:00+00:00 | 2026-04-01T16:00:00+00:00 |
| cisco-sa-ndi-afw-rjurc5dz | Cisco Nexus Dashboard Insights Arbitrary File Write Vulnerability | 2026-04-01T16:00:00+00:00 | 2026-04-01T16:00:00+00:00 |
| cisco-sa-nd-ssrf-naen4o7r | Cisco Nexus Dashboard and Nexus Dashboard Insights Server-Side Request Forgery Vulnerability | 2026-04-01T16:00:00+00:00 | 2026-04-01T16:00:00+00:00 |
| cisco-sa-nd-cbid-5yqkoshu | Cisco Nexus Dashboard Configuration Backup REST API Unauthorized Access Vulnerability | 2026-04-01T16:00:00+00:00 | 2026-04-01T16:00:00+00:00 |
| cisco-sa-epnm-improp-auth-muwfwuu3 | Cisco Evolved Programmable Network Manager Improper Authorization Vulnerability | 2026-04-01T16:00:00+00:00 | 2026-04-01T16:00:00+00:00 |
| cisco-sa-cssm-priv-esc-xranouo8 | Cisco Smart Software Manager On-Prem Privilege Escalation Vulnerability | 2026-04-01T16:00:00+00:00 | 2026-04-01T16:00:00+00:00 |
| cisco-sa-cimc-cmd-inj-3hkn3bvt | Cisco Integrated Management Controller Command Injection and Remote Code Execution Vulnerabilities | 2026-04-01T16:00:00+00:00 | 2026-04-01T16:00:00+00:00 |
| cisco-sa-cimc-auth-bypass-agg2bxtn | Cisco Integrated Management Controller Authentication Bypass Vulnerability | 2026-04-01T16:00:00+00:00 | 2026-04-01T16:00:00+00:00 |
| cisco-sa-xe-secureboot-bypass-b6uyxysz | Cisco IOS XE Software for Cisco Catalyst and Rugged Series Switches Secure Boot Bypass Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-wlc-dos-hnx5kgom | Cisco IOS XE Wireless Controller Software for the Catalyst CW9800 Family CAPWAP Denial of Service Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-vmanage-xss-zqkhp9w9 | Cisco Catalyst SD-WAN Manager Cross-Site Scripting Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-scp-dos-duadxtcg | Cisco IOS XE Software Secure Copy Protocol Server Denial of Service Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-iox-xss-lpgkzwtj | Cisco IOx Application Hosting Environment Stored Cross-Site Scripting Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-iox-crlf-nvgktkjz | Cisco IOx Application Hosting Environment Carriage Return Line Feed Injection Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-iosxe_infodis-6j847ueb | Cisco IOS XE Software Secure Channel for Meraki Information Disclosure Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-iosxe-tls-dos-tvgldezl | Cisco IOS XE Software TLS Memory Exhaustion Denial of Service Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-iosxe-mntc-dos-lzweqcyq | Cisco IOS XE Software Denial of Service Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-04-02T19:43:54+00:00 |
| cisco-sa-iosxe-lobby-privesc-kwxbqjy | Cisco IOS XE Software Lobby Ambassador Privilege Escalation Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-ios-http-dos-sbv8xrpl | Cisco IOS Software and IOS XE Software Release 3E HTTP Server Denial of Service Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-bootp-wubhnbxa | Cisco IOS XE Software for Catalyst 9000 Series Switches DHCP Snooping Denial of Service Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-asa-ftd-ios-dos-kpepqggk | Cisco IOS, IOS XE, Secure Firewall Adaptive Security Appliance, and Secure Firewall Threat Defense Software IKEv2 Denial of Service Vulnerability | 2026-03-25T16:00:00+00:00 | 2026-03-25T16:00:00+00:00 |
| cisco-sa-xrncs-epni-int-dos-twmffusn | Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability | 2026-03-11T16:00:00+00:00 | 2026-03-11T16:00:00+00:00 |
| cisco-sa-isis-dos-kdmxpszk | Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2026-03-11T16:00:00+00:00 | 2026-03-11T16:00:00+00:00 |
| cisco-sa-iosxr-privesc-bf8d5u4w | Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities | 2026-03-11T16:00:00+00:00 | 2026-03-11T16:00:00+00:00 |
| cisco-sa-cc-xss-mrnah5jh | Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities | 2026-03-11T16:00:00+00:00 | 2026-03-11T16:00:00+00:00 |
| cisco-sa-snort3-multi-dos-xfwkwswz | Multiple Cisco Products Snort 3 Denial of Service Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-onprem-fmc-authbypass-5jpp45v2 | Cisco Secure Firewall Management Center Software Authentication Bypass Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftdfmc-dir-trav-wergjhwq | Cisco Secure Firewall Management Center and Secure Firewall Threat Defense Software Path Traversal Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-tcp-dos-rhfqnwrg | Cisco Secure Firewall Threat Defense Software TLS with Snort 3 Detection Engine Denial of Service Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-snort-bypass-rlggkzvf | Cisco Secure Firewall Threat Defense Software Snort Deep Inspection Bypass Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-33829 | Windows Snipping Tool Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33827 | Windows TCP/IP Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33826 | Windows Active Directory Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33825 | Microsoft Defender Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33824 | Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33822 | Microsoft Word Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33120 | Microsoft SQL Server Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33116 | .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33115 | Microsoft Word Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33114 | Microsoft Word Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33104 | Win32k Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33103 | Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33101 | Windows Print Spooler Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33100 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33099 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33098 | Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33096 | HTTP.sys Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33095 | Microsoft Word Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32226 | .NET Framework Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32225 | Windows Shell Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32224 | Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32223 | Windows USB Printing Stack (usbprint.sys) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32222 | Windows Win32k Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32221 | Windows Graphics Component Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32220 | UEFI Secure Boot Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32219 | Microsoft Brokering File System Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32218 | Windows Kernel Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32217 | Windows Kernel Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32216 | Windows Redirected Drive Buffering System Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32215 | Windows Kernel Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0118 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2026-04-14T19:24:22.610160Z | 2026-04-14T19:24:22.610160Z |
| ncsc-2026-0117 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-04-14T19:23:30.733725Z | 2026-04-14T19:23:30.733725Z |
| ncsc-2026-0116 | Kwetsbaarheden verholpen in Microsoft Office | 2026-04-14T19:20:56.343558Z | 2026-04-14T19:20:56.343558Z |
| ncsc-2026-0115 | Kwetsbaarheid verholpen in Microsoft Defender | 2026-04-14T19:19:48.691858Z | 2026-04-15T08:54:16.881135Z |
| ncsc-2026-0114 | Kwetsbaarheden verholpen in Microsoft Developer tools | 2026-04-14T19:18:58.666745Z | 2026-04-14T19:18:58.666745Z |
| ncsc-2026-0113 | Kwetsbaarheden verholpen in SAP-producten | 2026-04-14T12:55:40.388960Z | 2026-04-14T12:55:40.388960Z |
| ncsc-2026-0112 | Kwetsbaarheden verholpen in Siemens producten | 2026-04-14T11:37:21.682429Z | 2026-04-14T11:37:21.682429Z |
| ncsc-2026-0111 | Kwetsbaarheid verholpen in Adobe Acrobat | 2026-04-12T08:42:18.844193Z | 2026-04-13T09:38:04.129352Z |
| ncsc-2026-0110 | Kwetsbaarheid verholpen in Cisco Smart Software Manager On-Prem | 2026-04-10T14:28:58.703642Z | 2026-04-10T14:28:58.703642Z |
| ncsc-2026-0109 | Kwetsbaarheden verholpen in Synology SSL VPN Client | 2026-04-10T12:11:00.859799Z | 2026-04-10T12:11:00.859799Z |
| ncsc-2026-0108 | Kwetsbaarheid verholpen in Juniper Networks Junos OS Evolved | 2026-04-10T12:06:13.479822Z | 2026-04-10T12:06:13.479822Z |
| ncsc-2026-0107 | Kwetsbaarheid verholpen in FortiClient EMS van Fortinet | 2026-04-04T13:49:19.002116Z | 2026-04-04T13:49:19.002116Z |
| ncsc-2026-0106 | Kwetsbaarheden verholpen in Cisco Integrated Management Controller | 2026-04-03T10:34:46.145536Z | 2026-04-03T10:34:46.145536Z |
| ncsc-2026-0105 | Kwetsbaarheden verholpen in Cisco Nexus Dashboard en Nexus Dashboard Insights | 2026-04-03T08:20:48.187725Z | 2026-04-03T08:20:48.187725Z |
| ncsc-2026-0104 | Kwetsbaarheden verholpen in Cisco IOS XE Software | 2026-03-26T09:50:03.269095Z | 2026-03-26T09:50:03.269095Z |
| ncsc-2026-0103 | Kwetsbaarheden verholpen in GitLab | 2026-03-26T09:48:10.874427Z | 2026-03-26T09:48:10.874427Z |
| ncsc-2026-0102 | Kwetsbaarheden verholpen in Apple macOS | 2026-03-25T14:15:56.073353Z | 2026-03-25T14:15:56.073353Z |
| ncsc-2026-0101 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2026-03-25T14:02:07.392994Z | 2026-03-25T14:02:07.392994Z |
| ncsc-2026-0100 | Kwetsbaarheden verholpen in Citrix Netscaler ADC en Netscaler Gateway | 2026-03-23T13:43:30.957806Z | 2026-03-23T13:43:30.957806Z |
| ncsc-2026-0099 | Kwetsbaarheid verholpen in Oracle Identity Manager en Oracle Web Services Manager | 2026-03-20T15:56:12.716324Z | 2026-03-20T15:56:12.716324Z |
| ncsc-2026-0098 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2026-03-13T08:41:19.155490Z | 2026-03-13T08:41:19.155490Z |
| ncsc-2026-0097 | Kwetsbaarheden verholpen in Google Chrome | 2026-03-13T08:33:43.877125Z | 2026-03-13T08:33:43.877125Z |
| ncsc-2026-0096 | Kwetsbaarheden verholpen in Veeam Backup & Replication | 2026-03-12T14:54:08.200676Z | 2026-03-12T14:54:08.200676Z |
| ncsc-2026-0095 | Kwetsbaarheid verholpen in pac4j-jwt | 2026-03-12T14:45:51.156512Z | 2026-03-12T14:45:51.156512Z |
| ncsc-2026-0094 | Kwetsbaarheden verholpen in Cisco IOS XR | 2026-03-12T14:44:08.106602Z | 2026-03-12T14:44:08.106602Z |
| ncsc-2026-0093 | Kwetsbaarheden verholpen in GitLab | 2026-03-12T14:42:46.936248Z | 2026-03-12T14:42:46.936248Z |
| ncsc-2026-0092 | Kwetsbaarheden verholpen in Fortinet FortiWeb | 2026-03-12T07:46:15.529522Z | 2026-03-12T07:46:15.529522Z |
| ncsc-2026-0091 | Kwetsbaarheden verholpen in SAP-producten | 2026-03-12T07:24:16.575638Z | 2026-03-12T07:24:16.575638Z |
| ncsc-2026-0090 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2026-03-12T07:12:51.952931Z | 2026-03-12T07:12:51.952931Z |
| ncsc-2026-0089 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2026-03-12T07:03:24.148324Z | 2026-03-12T07:03:24.148324Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2026:2-01 | Stored Cross-Site Scripting (XSS) in Assets and Nodes in Guardian/CMC before 26.0.0 | 2026-04-15T11:00:00.000Z | 2026-04-15T11:00:00.000Z |
| nn-2026:1-01 | Incorrect authorization for Threat Intelligence in Guardian/CMC before 26.0.0 | 2026-04-15T11:00:00.000Z | 2026-04-15T11:00:00.000Z |
| nn-2025:18-01 | Lack of TLS certificate validation when connecting Arc to a Guardian or CMC, in Arc before v2.2.0 | 2026-03-04T11:00:00.000Z | 2026-03-04T11:00:00.000Z |
| nn-2025:17-01 | HTML injection in Sensor Map in CMC before 25.6.0 | 2026-03-04T11:00:00.000Z | 2026-03-04T11:00:00.000Z |
| nn-2025:16-01 | HTML injection in Alerted Nodes Dashboard in Guardian/CMC before 25.6.0 | 2026-03-04T11:00:00.000Z | 2026-03-04T11:00:00.000Z |
| nn-2025:15-01 | Path traversal in Import Arc data archive functionality in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:14-01 | HTML injection in Asset List in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:13-01 | Stored Cross-Site Scripting (XSS) in Reports in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:12-01 | HTML injection in in Time Machine functionality in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:11-01 | Stored Cross-Site Scripting (XSS) in Dashboards in Guardian/CMC before 25.4.0 | 2025-11-25T11:00:00.000Z | 2025-11-26T11:00:00.000Z |
| nn-2025:9-01 | Path traversal in Time Machine functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:8-01 | Authenticated SQL Injection on Alert functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:7-01 | Authenticated SQL Injection on Alert functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:6-01 | Authenticated SQL Injection on Smart Polling functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:5-01 | Incorrect authorization for CLI in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:4-01 | Client-side path traversal in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:10-01 | Authenticated SQL Injection on CLI functionality in Guardian/CMC before 25.3.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:3-01 | Incorrect authorization for traces request/download in CMC before 25.1.0 | 2025-08-26T11:00:00.000Z | 2025-08-26T11:00:00.000Z |
| nn-2025:2-01 | Privilege escalation in Guardian/CMC before 24.6.0 | 2025-06-10T11:00:00.000Z | 2025-06-10T11:00:00.000Z |
| nn-2025:1-01 | Authenticated RCE in update functionality in Guardian/CMC before 24.6.0 | 2025-06-10T11:00:00.000Z | 2025-06-10T11:00:00.000Z |
| nn-2024:2-01 | Incorrect authorization for Reports configuration in Guardian/CMC before 24.2.0 | 2024-09-11T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:16-01 | Path traversal via 'zip slip' in Arc before v1.6.0 | 2024-05-15T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2023:15-01 | Sensitive data exfiltration via unsafe permissions on Windows systems in Arc before v1.6.0 | 2024-05-15T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:14-01 | Unsafe temporary data privileges on Unix systems in Arc before v1.6.0 | 2024-05-15T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2023:13-01 | Missing authentication for local web interface in Arc before v1.6.0 | 2024-05-15T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2024:1-01 | DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:17-01 | Information disclosure via audit records for OpenAPI requests in Guardian/CMC before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:12-01 | Check Point IoT integration: WebSocket returns assets data without authentication in Guardian/CMC before 23.3.0 | 2024-01-15T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:9-01 | Authenticated SQL Injection on Query functionality in Guardian/CMC before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:11-01 | SQL Injection on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10539-1 | oci-cli-3.76.2-1.1 on GA media | 2026-04-13T00:00:00Z | 2026-04-13T00:00:00Z |
| opensuse-su-2026:10538-1 | helm-4.1.4-2.1 on GA media | 2026-04-13T00:00:00Z | 2026-04-13T00:00:00Z |
| opensuse-su-2026:10535-1 | python311-cryptography-46.0.7-1.1 on GA media | 2026-04-11T00:00:00Z | 2026-04-11T00:00:00Z |
| opensuse-su-2026:10534-1 | libopenvswitch-3_7-0-3.7.1-33.1 on GA media | 2026-04-11T00:00:00Z | 2026-04-11T00:00:00Z |
| opensuse-su-2026:10533-1 | libopenssl-3-devel-3.5.3-4.1 on GA media | 2026-04-11T00:00:00Z | 2026-04-11T00:00:00Z |
| opensuse-su-2026:10532-1 | helm3-3.20.2-1.1 on GA media | 2026-04-11T00:00:00Z | 2026-04-11T00:00:00Z |
| opensuse-su-2026:10531-1 | cockpit-360-1.1 on GA media | 2026-04-11T00:00:00Z | 2026-04-11T00:00:00Z |
| opensuse-su-2026:10530-1 | chromedriver-147.0.7727.55-1.1 on GA media | 2026-04-11T00:00:00Z | 2026-04-11T00:00:00Z |
| opensuse-su-2026:10522-1 | python315-3.15.0~a8-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10521-1 | python312-3.12.13-5.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10520-1 | python310-3.10.20-4.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10519-1 | glances-common-4.5.3-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10518-1 | python311-Flask-HTTPAuth-4.8.1-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10517-1 | python313-Django6-6.0.4-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10516-1 | python311-Django4-4.2.30-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10515-1 | libprotobuf-lite34_1_0-32bit-34.1-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10514-1 | go1.25-1.25.9-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10513-1 | fontforge-20251009-6.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10512-1 | aws-c-event-stream-devel-0.7.0-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:10511-1 | MozillaFirefox-149.0.2-1.1 on GA media | 2026-04-09T00:00:00Z | 2026-04-09T00:00:00Z |
| opensuse-su-2026:20477-1 | Security update for aws-c-event-stream | 2026-04-08T13:03:50Z | 2026-04-08T13:03:50Z |
| opensuse-su-2026:10499-1 | python311-social-auth-app-django-5.7.0-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10498-1 | libeverest-3.6.6-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10497-1 | heroic-games-launcher-2.20.1-5.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10496-1 | git-cliff-2.12.0-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10495-1 | ckermit-9.0.302-20.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10494-1 | SDL2_image-devel-2.8.10-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10493-1 | SDL3_image-devel-3.4.2-1.1 on GA media | 2026-04-05T00:00:00Z | 2026-04-05T00:00:00Z |
| opensuse-su-2026:10485-1 | python311-Flask-Cors-6.0.2-1.1 on GA media | 2026-04-03T00:00:00Z | 2026-04-03T00:00:00Z |
| opensuse-su-2026:10484-1 | k6-1.7.1-1.1 on GA media | 2026-04-03T00:00:00Z | 2026-04-03T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| oxdc-adv-2026-0001 | OX Dovecot Security Advisory OXDC-ADV-2026-0001 | 2026-03-27T00:00:00+00:00 | 2026-03-27T00:00:00+00:00 |
| oxdc-adv-2025-0001 | OX Dovecot Pro Security Advisory OXDC-ADV-2025-0001 | 2025-10-31T00:00:00+00:00 | 2025-11-27T00:00:00+00:00 |
| oxas-adv-2025-0003 | OX App Suite Security Advisory OXAS-ADV-2025-0003 | 2025-09-24T00:00:00+02:00 | 2025-11-27T00:00:00+00:00 |
| oxas-adv-2025-0002 | OX App Suite Security Advisory OXAS-ADV-2025-0002 | 2025-08-12T00:00:00+02:00 | 2025-10-31T00:00:00+00:00 |
| oxas-adv-2025-0001 | OX App Suite Security Advisory OXAS-ADV-2025-0001 | 2025-01-27T00:00:00+01:00 | 2025-04-07T00:00:00+00:00 |
| oxdc-adv-2024-0003 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0003 | 2024-09-10T00:00:00+02:00 | 2024-09-10T00:00:00+00:00 |
| oxdc-adv-2024-0002 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0002 | 2024-09-10T00:00:00+02:00 | 2024-09-10T00:00:00+00:00 |
| oxdc-adv-2024-0001 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0001 | 2024-09-02T00:00:00+02:00 | 2024-09-06T00:00:00+00:00 |
| oxas-adv-2024-0005 | OX App Suite Security Advisory OXAS-ADV-2024-0005 | 2024-07-08T00:00:00+02:00 | 2024-09-09T00:00:00+00:00 |
| oxas-adv-2024-0004 | OX App Suite Security Advisory OXAS-ADV-2024-0004 | 2024-06-13T00:00:00+02:00 | 2024-08-19T00:00:00+00:00 |
| oxas-adv-2024-0003 | OX App Suite Security Advisory OXAS-ADV-2024-0003 | 2024-04-24T00:00:00+02:00 | 2024-08-19T00:00:00+00:00 |
| oxas-adv-2024-0002 | OX App Suite Security Advisory OXAS-ADV-2024-0002 | 2024-03-06T00:00:00+01:00 | 2024-05-06T00:00:00+00:00 |
| oxas-adv-2024-0001 | OX App Suite Security Advisory OXAS-ADV-2024-0001 | 2024-02-08T00:00:00+01:00 | 2024-04-25T00:00:00+00:00 |
| oxas-adv-2023-0007 | OX App Suite Security Advisory OXAS-ADV-2023-0007 | 2023-12-11T00:00:00+01:00 | 2024-02-16T00:00:00+00:00 |
| oxas-adv-2023-0006 | OX App Suite Security Advisory OXAS-ADV-2023-0006 | 2023-09-25T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0005 | OX App Suite Security Advisory OXAS-ADV-2023-0005 | 2023-09-19T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0004 | OX App Suite Security Advisory OXAS-ADV-2023-0004 | 2023-08-01T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0003 | OX App Suite Security Advisory OXAS-ADV-2023-0003 | 2023-05-02T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0002 | OX App Suite Security Advisory OXAS-ADV-2023-0002 | 2023-03-20T00:00:00+01:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0001 | OX App Suite Security Advisory OXAS-ADV-2023-0001 | 2023-02-06T00:00:00+01:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2022-0002 | OX App Suite Security Advisory OXAS-ADV-2022-0002 | 2022-11-02T00:00:00+01:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2022-0001 | OX App Suite Security Advisory OXAS-ADV-2022-0001 | 2022-08-10T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:7992 | Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update | 2026-04-14T06:48:01+00:00 | 2026-04-14T07:29:53+00:00 |
| rhsa-2026:7942 | Red Hat Security Advisory: HawtIO 4.3.1 for Red Hat build of Apache Camel 4 Release and security update. | 2026-04-13T21:59:31+00:00 | 2026-04-14T09:46:57+00:00 |
| rhsa-2026:7915 | Red Hat Security Advisory: bind9.18 security update | 2026-04-13T19:40:30+00:00 | 2026-04-14T01:25:47+00:00 |
| rhsa-2026:7896 | Red Hat Security Advisory: nodejs:20 security update | 2026-04-13T18:36:15+00:00 | 2026-04-14T07:28:27+00:00 |
| rhsa-2026:7883 | Red Hat Security Advisory: golang security update | 2026-04-13T17:44:19+00:00 | 2026-04-14T07:29:43+00:00 |
| rhsa-2026:7876 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-04-13T16:34:14+00:00 | 2026-04-14T07:29:55+00:00 |
| rhsa-2026:7877 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-04-13T16:31:14+00:00 | 2026-04-14T07:29:51+00:00 |
| rhsa-2026:7879 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-04-13T16:26:59+00:00 | 2026-04-14T07:29:49+00:00 |
| rhsa-2026:7878 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-04-13T16:21:54+00:00 | 2026-04-14T07:29:49+00:00 |
| rhsa-2026:7854 | Red Hat Security Advisory: podman security update | 2026-04-13T12:51:03+00:00 | 2026-04-14T09:46:57+00:00 |
| rhsa-2026:7858 | Red Hat Security Advisory: firefox security update | 2026-04-13T12:47:34+00:00 | 2026-04-13T15:26:56+00:00 |
| rhsa-2026:7850 | Red Hat Security Advisory: gstreamer-plugins-base and gstreamer-plugins-good security update | 2026-04-13T11:16:58+00:00 | 2026-04-13T14:52:26+00:00 |
| rhsa-2026:7837 | Red Hat Security Advisory: firefox security update | 2026-04-13T10:58:28+00:00 | 2026-04-13T15:26:51+00:00 |
| rhsa-2026:7845 | Red Hat Security Advisory: firefox security update | 2026-04-13T10:52:23+00:00 | 2026-04-13T15:26:56+00:00 |
| rhsa-2026:7838 | Red Hat Security Advisory: firefox security update | 2026-04-13T10:37:18+00:00 | 2026-04-13T15:26:51+00:00 |
| rhsa-2026:7834 | Red Hat Security Advisory: golang security update | 2026-04-13T10:25:23+00:00 | 2026-04-14T07:29:42+00:00 |
| rhsa-2026:7843 | Red Hat Security Advisory: firefox security update | 2026-04-13T10:24:18+00:00 | 2026-04-13T15:26:55+00:00 |
| rhsa-2026:7842 | Red Hat Security Advisory: firefox security update | 2026-04-13T10:18:06+00:00 | 2026-04-13T15:26:54+00:00 |
| rhsa-2026:7841 | Red Hat Security Advisory: firefox security update | 2026-04-13T10:16:48+00:00 | 2026-04-13T15:26:54+00:00 |
| rhsa-2026:7839 | Red Hat Security Advisory: firefox security update | 2026-04-13T10:05:28+00:00 | 2026-04-13T15:26:53+00:00 |
| rhsa-2026:7840 | Red Hat Security Advisory: firefox security update | 2026-04-13T10:05:13+00:00 | 2026-04-13T15:26:53+00:00 |
| rhsa-2026:7833 | Red Hat Security Advisory: golang security update | 2026-04-13T09:59:28+00:00 | 2026-04-14T07:28:23+00:00 |
| rhsa-2026:7711 | Red Hat Security Advisory: vim security update | 2026-04-13T08:55:38+00:00 | 2026-04-13T14:52:24+00:00 |
| rhsa-2026:7679 | Red Hat Security Advisory: perl-XML-Parser security update | 2026-04-13T03:10:07+00:00 | 2026-04-13T08:42:38+00:00 |
| rhsa-2026:7670 | Red Hat Security Advisory: nodejs:24 security update | 2026-04-13T03:00:22+00:00 | 2026-04-14T07:29:43+00:00 |
| rhsa-2026:7681 | Red Hat Security Advisory: perl-XML-Parser security update | 2026-04-13T02:55:37+00:00 | 2026-04-13T08:42:36+00:00 |
| rhsa-2026:7674 | Red Hat Security Advisory: rhc security update | 2026-04-13T02:53:32+00:00 | 2026-04-14T07:29:40+00:00 |
| rhsa-2026:7668 | Red Hat Security Advisory: nghttp2 security update | 2026-04-13T02:37:51+00:00 | 2026-04-14T07:29:53+00:00 |
| rhsa-2026:7673 | Red Hat Security Advisory: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update | 2026-04-13T02:31:31+00:00 | 2026-04-13T14:52:24+00:00 |
| rhsa-2026:7682 | Red Hat Security Advisory: openexr security update | 2026-04-13T02:30:41+00:00 | 2026-04-13T08:42:34+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2026-104-03 | Use of Hard-coded Credentials vulnerability on Easergy MiCOM Px40 Series | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2026-104-02 | Third-Party vulnerability on Modicon Networking Managed Switches | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2026-104-01 | Multiple Vulnerabilities on PowerChute⢠Serial Shutdown | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2026-069-06 | Deserialization of Untrusted Data vulnerability on Multiple Products | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2026-069-05 | Use of Hard-coded Credentials vulnerability in EcoStruxure⢠IT Data Center Expert | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2026-069-04 | Improper Control of Generation of Code ('Code Injection') vulnerability on EcoStruxure⢠Automation Expert | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2026-069-03 | Deserialization of Untrusted Data vulnerability on EcoStruxure⢠Foxboro DCS | 2026-03-10T07:00:00.000Z | 2026-03-13T07:00:00.000Z |
| sevd-2026-069-02 | Improper Neutralization vulnerability in Multiple Products | 2026-03-10T07:00:00.000Z | 2026-03-31T07:00:00.000Z |
| sevd-2026-069-01 | Improper Resource Shutdown or Release vulnerability in Multiple Products | 2026-03-10T07:00:00.000Z | 2026-03-31T07:00:00.000Z |
| sevd-2026-041-02 | Multiple Vulnerabilities on EcoStruxure⢠Building Operation Workstation and EcoStruxure⢠Building Operation Webstation | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2026-041-01 | Improper Check for Unusual or Exceptional Conditions on Multiple Products | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2026-013-04 | Multiple Vulnerabilities on EcoStruxure Power Build Rapsody | 2026-01-13T08:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2026-013-03 | Multiple Vulnerabilities on Zigbee Products | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2026-013-02 | Incorrect Default Permissions Vulnerability on EcoStruxure⢠Process Expert | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2026-013-01 | Multiple Third-Party Vulnerabilities on ProLeiT Plant iT/Brewmaxx | 2026-01-13T08:00:00.000Z | 2026-03-10T07:00:00.000Z |
| sevd-2025-343-02 | EcoStruxure⢠Foxboro DCS Advisor | 2025-12-09T08:00:00.000Z | 2025-12-09T08:00:00.000Z |
| sevd-2025-343-01 | EcoStruxure⢠Foxboro DCS | 2025-12-09T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2025-315-02 | EcoStruxure⢠Machine SCADA Expert & Pro-face BLUE Open Studio | 2025-11-11T08:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-315-01 | PowerChute⢠Serial Shutdown | 2025-11-11T08:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-287-01 | EcoStruxure⢠OPC UA Server Expert and EcoStruxure⢠Modicon Communication Server | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2025-252-02 | Saitel DR & Saitel DP Remote Terminal Unit | 2025-09-09T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-252-01 | Multiple Altivar Process Drives and Communication Modules | 2025-09-09T04:00:00.000Z | 2025-12-09T08:00:00.000Z |
| sevd-2025-224-05 | Modicon M340 Controller and Communication Modules | 2025-08-12T04:00:00.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2025-224-04 | EcoStruxure⢠Building Operation Enterprise Server, EcoStruxure⢠Building Operation Enterprise Central, and EcoStruxure⢠Workstation | 2025-08-12T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-224-03 | Schneider Electric Software Update | 2025-08-12T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-224-02 | EcoStruxure⢠Power Monitoring Expert Software & EcoStruxure⢠Power Operation (EPO) and EcoStruxure⢠Power SCADA Operation (PSO) | 2025-08-12T04:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-224-01 | Saitel DR & Saitel DP Remote Terminal Unit | 2025-08-12T04:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-189-04 | EcoStruxure⢠Power Monitoring Expert (PME) and EcoStruxure⢠Power Operation (EPO) with Advanced Reporting and Dashboards | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-189-03 | EcoStruxure⢠Power Operation | 2025-07-08T04:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2025-189-02 | System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2026-0006 | Vulnerabilities affecting SICK Lector85x and SICK Lector83x | 2026-03-06T14:00:00.000Z | 2026-03-06T14:00:00.000Z |
| sca-2026-0005 | Vulnerabilities affecting SICK LMS1000 and SICK MRS1000 | 2026-02-27T14:00:00.000Z | 2026-02-27T14:00:00.000Z |
| sca-2026-0004 | Eclipse Cyclone DDS Vulnerabilities have no impact on SICK picoScan150 & SICK picoScan120 products | 2026-02-13T14:00:00.000Z | 2026-02-13T14:00:00.000Z |
| sca-2026-0003 | Vulnerability affecting SICK nanoScan3 and microScan3 | 2026-01-26T14:00:00.000Z | 2026-01-26T14:00:00.000Z |
| sca-2026-0002 | Vulnerabilities affecting SICK Incoming Goods Suite | 2026-01-15T14:00:00.000Z | 2026-01-22T19:00:00.000Z |
| sca-2026-0001 | Vulnerabilities affecting SICK TDC-X401GL | 2026-01-15T14:00:00.000Z | 2026-01-15T14:00:00.000Z |
| sca-2025-0014 | CodeMeter vulnerablity affects SICK CODE-LOC and SICK LIDAR-LOC | 2025-11-03T11:00:00.000Z | 2025-11-03T14:00:00.000Z |
| sca-2025-0013 | Vulnerabilities affecting SICK TLOC100-100 | 2025-10-27T14:00:00.000Z | 2025-11-11T14:00:00.000Z |
| sca-2025-0012 | Sudo vulnerability affects SICK SID products | 2025-10-27T11:00:00.000Z | 2025-10-27T14:00:00.000Z |
| sca-2025-0011 | Vulnerabilities affecting Endress+Hauser SSG-E210GC | 2025-10-02T13:00:00.000Z | 2025-10-02T13:00:00.000Z |
| sca-2025-0010 | Multiple vulnerabilities in SICK Enterprise Analytics and SICK Logistic Analytics Products | 2025-10-02T13:00:00.000Z | 2025-10-02T13:00:00.000Z |
| sca-2025-0009 | Vulnerabilities affecting SICK TDC-E210GC | 2025-08-01T13:00:00.000Z | 2025-08-01T13:00:00.000Z |
| sca-2025-0008 | Multiple vulnerabilities in Endress+Hauser MEAC300-FNADE4 | 2025-07-03T13:00:00.000Z | 2025-07-03T13:00:00.000Z |
| sca-2025-0007 | Multiple vulnerabilities in SICK Field Analytics and SICK Media Server | 2025-06-12T13:00:00.000Z | 2025-06-12T13:00:00.000Z |
| sca-2025-0006 | Vulnerability affecting picoScan and multiScan | 2025-04-28T13:00:00.000Z | 2025-04-28T13:00:00.000Z |
| sca-2025-0005 | Vulnerabilities in SICK Flexi Compact | 2025-04-28T10:00:00.000Z | 2025-04-28T10:00:00.000Z |
| sca-2025-0004 | Critical vulnerabilities in SICK DL100-2xxxxxxx | 2025-03-14T11:00:00.000Z | 2025-03-14T11:00:00.000Z |
| sca-2025-0003 | FreeRTOS Vulnerabilities have no impact on SICK Products | 2025-02-28T00:00:00.000Z | 2025-05-20T11:00:00.000Z |
| sca-2025-0001 | Multiple vulnerabilities in SICK MEAC300 | 2025-02-14T14:00:00.000Z | 2025-02-21T14:00:00.000Z |
| sca-2025-0002 | Vulnerability in SICK Lector8xx and SICK InspectorP8xx | 2025-02-14T10:19:00.000Z | 2025-02-14T10:19:00.000Z |
| sca-2024-0007 | Vulnerability in SICK OLM | 2024-12-31T00:00:00.000Z | 2024-12-31T00:00:00.000Z |
| sca-2024-0006 | Critical vulnerabilities in SICK InspectorP61x, InspectorP62x and TiM3xx | 2024-12-06T00:00:00.000Z | 2024-12-06T00:00:00.000Z |
| sca-2024-0005 | Vulnerability in SICK Incoming Goods Suite | 2024-11-19T00:00:00.000Z | 2024-11-19T00:00:00.000Z |
| sca-2024-0004 | Third party vulnerabilities in SICK CDE-100 | 2024-11-07T12:00:00.000Z | 2024-11-07T12:00:00.000Z |
| sca-2024-0003 | Critical vulnerability in multiple SICK products | 2024-10-17T13:00:00.000Z | 2024-10-17T13:00:00.000Z |
| sca-2024-0002 | Vulnerability in SICK MSC800 | 2024-09-11T23:00:00.000Z | 2024-09-11T23:00:00.000Z |
| sca-2024-0001 | Vulnerability in SICK Logistics Analytics Products and SICK Field Analytics | 2024-01-29T00:00:00.000Z | 2024-01-29T00:00:00.000Z |
| sca-2023-0011 | Vulnerability in multiple SICK Flexi Soft Gateways | 2023-10-23T11:00:00.000Z | 2023-10-23T11:00:00.000Z |
| sca-2023-0010 | Vulnerabilities in SICK Application Processing Unit | 2023-10-09T11:00:00.000Z | 2023-10-09T11:00:00.000Z |
| sca-2023-0008 | Vulnerability in SICK SIM1012 | 2023-09-29T13:00:00.000Z | 2023-09-29T13:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-981622 | SSA-981622: Improper Certificate Validation Vulnerability in Siemens Analytics Toolkit | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-801704 | SSA-801704: Authentication Bypass Vulnerability in SINEC NMS | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-741509 | SSA-741509: Privilege Escalation Vulnerability in RUGGEDCOM CROSSBOW Secure Access Manager Primary Before V5.8 | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-628843 | SSA-628843: Out of Bound Read Vulnerability in TPM 2.0 | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-609469 | SSA-609469: Authorization Bypass Vulnerability in Industrial Edge Management | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-605717 | SSA-605717: Authorization Bypass Vulnerability in SINEC NMS Before V4.0 SP3 | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-225816 | SSA-225816: Memory Corruption Vulnerability in RUGGEDCOM CROSSBOW Station Access Controller Before V5.8 | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-019200 | SSA-019200: Multiple Vulnerabilities in SCALANCE W-700 IEEE 802.11n Devices Before V6.6.0 | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-246443 | SSA-246443: Multiple Vulnerabilities in SICAM 8 Products | 2026-03-26T00:00:00.000Z | 2026-03-26T00:00:00.000Z |
| ssa-975644 | SSA-975644: Multiple Vulnerabilities in Fortigate NGFW on RUGGEDCOM APE1808 Devices | 2026-03-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-903736 | SSA-903736: Multiple vulnerabilities in SICAM SIAPP SDK before V2.1.7 | 2026-03-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-485750 | SSA-485750: Multiple Vulnerabilities in SIDIS Prime Before V4.0.800 | 2026-03-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-452276 | SSA-452276: Eval Injection Vulnerability in SIMATIC S7-1500 | 2026-03-10T00:00:00.000Z | 2026-03-19T00:00:00.000Z |
| ssa-126399 | SSA-126399: Improper Access Control Vulnerability in Heliox EV Chargers | 2026-03-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-965753 | SSA-965753: Multiple File Parsing Vulnerabilities in Simcenter Femap and Nastran Before V2512 | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-625934 | SSA-625934: Improper Access Control Vulnerability in the Webhooks Implementation of Siveillance Video Management Servers | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-535115 | SSA-535115: Data Validation Vulnerability in NX Before V2512 | 2026-02-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-507364 | SSA-507364: Heap Based Buffer Overflow Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-445819 | SSA-445819: Out of Bounds Read in PS/IGES Parasolid Translator Component in Solid Edge | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-311973 | SSA-311973: Multiple Local Privilege Escalation Vulnerabilities in SINEC NMS and User Management Component (UMC) | 2026-02-10T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-035571 | SSA-035571: Cross Site Scripting Vulnerability in Polarion Before V2506 | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-089022 | SSA-089022: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.3 | 2026-01-28T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-827968 | SSA-827968: Vulnerability in Nozomi Guardian/CMC on RUGGEDCOM APE1808 Devices | 2026-01-13T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-674753 | SSA-674753: Denial-of-Service Vulnerability in ET 200 Devices | 2026-01-13T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-192617 | SSA-192617: Local Privilege Escalation Vulnerability in TeleControl Server Basic Before V3.1.2.4 | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-014678 | SSA-014678: Authorization Bypass Vulnerability in Industrial Edge Device Kit | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-001536 | SSA-001536: Authorization Bypass Vulnerability in Siemens Industrial Edge Devices | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-512988 | SSA-512988: File Parsing Vulnerability in Simcenter Femap Before V2512 | 2025-12-12T00:00:00Z | 2025-12-12T00:00:00Z |
| ssa-915282 | SSA-915282: Denial of service Vulnerability in Interniche IP-Stack based Industrial Devices | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-912274 | SSA-912274: Multiple Vulnerabilities in RUGGEDCOM ROX Before V2.17 | 2025-12-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1325-1 | Security update for clamav | 2026-04-14T13:15:45Z | 2026-04-14T13:15:45Z |
| suse-su-2026:1324-1 | Security update for clamav | 2026-04-14T13:15:31Z | 2026-04-14T13:15:31Z |
| suse-su-2026:1323-1 | Security update for libpng16 | 2026-04-14T13:11:55Z | 2026-04-14T13:11:55Z |
| suse-su-2026:1322-1 | Security update for MozillaFirefox | 2026-04-14T12:42:11Z | 2026-04-14T12:42:11Z |
| suse-su-2026:1321-1 | Security update for go1.25 | 2026-04-14T12:40:53Z | 2026-04-14T12:40:53Z |
| suse-su-2026:1320-1 | Security update for go1.26 | 2026-04-14T12:39:43Z | 2026-04-14T12:39:43Z |
| suse-su-2026:1314-1 | Security update for ignition | 2026-04-14T11:07:12Z | 2026-04-14T11:07:12Z |
| suse-su-2026:1313-1 | Security update for freerdp2 | 2026-04-14T10:47:31Z | 2026-04-14T10:47:31Z |
| suse-su-2026:1312-1 | Security update for bind | 2026-04-14T10:46:32Z | 2026-04-14T10:46:32Z |
| suse-su-2026:1311-1 | Security update for libpng16 | 2026-04-14T10:44:51Z | 2026-04-14T10:44:51Z |
| suse-su-2026:1310-1 | Security update for libssh | 2026-04-14T10:42:14Z | 2026-04-14T10:42:14Z |
| suse-su-2026:1309-1 | Security update for sudo | 2026-04-14T10:39:38Z | 2026-04-14T10:39:38Z |
| suse-su-2026:1308-1 | Security update for sudo | 2026-04-14T10:38:01Z | 2026-04-14T10:38:01Z |
| suse-su-2026:1307-1 | Security update for strongswan | 2026-04-14T10:35:42Z | 2026-04-14T10:35:42Z |
| suse-su-2026:1305-1 | Security update for the Linux Kernel (Live Patch 76 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T18:34:02Z | 2026-04-13T18:34:02Z |
| suse-su-2026:1304-1 | Security update for the Linux Kernel (Live Patch 73 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T16:04:42Z | 2026-04-13T16:04:42Z |
| suse-su-2026:1303-1 | Security update for tigervnc | 2026-04-13T16:02:59Z | 2026-04-13T16:02:59Z |
| suse-su-2026:1302-1 | Security update for tigervnc | 2026-04-13T16:02:16Z | 2026-04-13T16:02:16Z |
| suse-su-2026:1301-1 | Security update for tigervnc | 2026-04-13T16:01:23Z | 2026-04-13T16:01:23Z |
| suse-su-2026:1300-1 | Security update for GraphicsMagick | 2026-04-13T15:58:01Z | 2026-04-13T15:58:01Z |
| suse-su-2026:1299-1 | Security update for nodejs24 | 2026-04-13T15:54:45Z | 2026-04-13T15:54:45Z |
| suse-su-2026:1298-1 | Security update for the Linux Kernel (Live Patch 72 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T15:04:44Z | 2026-04-13T15:04:44Z |
| suse-su-2026:1297-1 | Security update for the Linux Kernel (Live Patch 71 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T12:42:14Z | 2026-04-13T12:42:14Z |
| suse-su-2026:1296-1 | Security update for python39 | 2026-04-13T12:32:48Z | 2026-04-13T12:32:48Z |
| suse-su-2026:1294-1 | Security update for the Linux Kernel (Live Patch 77 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T09:04:33Z | 2026-04-13T09:04:33Z |
| suse-su-2026:1293-1 | Security update for the Linux Kernel (Live Patch 75 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T08:35:44Z | 2026-04-13T08:35:44Z |
| suse-su-2026:1292-1 | Security update for python312 | 2026-04-13T08:10:43Z | 2026-04-13T08:10:43Z |
| suse-su-2026:1291-1 | Security update for openssl-1_0_0 | 2026-04-13T08:09:41Z | 2026-04-13T08:09:41Z |
| suse-su-2026:1290-1 | Security update for openssl-1_1 | 2026-04-13T08:08:54Z | 2026-04-13T08:08:54Z |
| suse-su-2026:1288-1 | Security update for the Linux Kernel (Live Patch 74 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T06:34:14Z | 2026-04-13T06:34:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:6622 | Moderate: crun security update | 2026-04-06T00:00:00Z | 2026-04-06T08:36:15Z |
| alsa-2026:6621 | Moderate: crun security update | 2026-04-06T00:00:00Z | 2026-04-06T08:42:59Z |
| alsa-2026:6572 | Moderate: kernel-rt security update | 2026-04-06T00:00:00Z | 2026-04-06T09:38:16Z |
| alsa-2026:6571 | Moderate: kernel security update | 2026-04-06T00:00:00Z | 2026-04-06T09:27:57Z |
| alsa-2026:6473 | Important: python3 security update | 2026-04-02T00:00:00Z | 2026-04-03T12:02:03Z |
| alsa-2026:6470 | Important: perl-YAML-Syck security update | 2026-04-02T00:00:00Z | 2026-04-03T12:07:59Z |
| alsa-2026:6445 | Important: libpng12 security update | 2026-04-02T00:00:00Z | 2026-04-03T12:13:28Z |
| alsa-2026:6439 | Important: libpng15 security update | 2026-04-02T00:00:00Z | 2026-04-03T12:19:53Z |
| alsa-2026:6436 | Moderate: rsync security update | 2026-04-02T00:00:00Z | 2026-04-03T12:29:15Z |
| alsa-2026:6390 | Moderate: rsync security update | 2026-04-01T00:00:00Z | 2026-04-02T09:23:33Z |
| alsa-2026:6388 | Important: grafana-pcp security update | 2026-04-01T00:00:00Z | 2026-04-03T10:02:10Z |
| alsa-2026:6383 | Important: grafana-pcp security update | 2026-04-01T00:00:00Z | 2026-04-02T09:15:46Z |
| alsa-2026:6382 | Important: grafana security update | 2026-04-01T00:00:00Z | 2026-04-02T09:12:36Z |
| alsa-2026:6344 | Important: grafana security update | 2026-04-01T00:00:00Z | 2026-04-03T09:56:37Z |
| alsa-2026:6342 | Important: thunderbird security update | 2026-04-01T00:00:00Z | 2026-04-01T11:59:47Z |
| alsa-2026:6340 | Important: freerdp security update | 2026-04-01T00:00:00Z | 2026-04-02T09:09:13Z |
| alsa-2026:6301 | Important: squid security update | 2026-03-31T00:00:00Z | 2026-04-01T09:27:45Z |
| alsa-2026:6300 | Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update | 2026-03-31T00:00:00Z | 2026-04-03T17:13:38Z |
| alsa-2026:6286 | Important: python3.11 security update | 2026-03-31T00:00:00Z | 2026-04-01T09:15:24Z |
| alsa-2026:6285 | Important: python3.12 security update | 2026-03-31T00:00:00Z | 2026-04-01T09:07:09Z |
| alsa-2026:6283 | Important: python3.12 security update | 2026-03-31T00:00:00Z | 2026-04-01T08:56:58Z |
| alsa-2026:6281 | Important: python3.11 security update | 2026-03-31T00:00:00Z | 2026-04-01T08:52:26Z |
| alsa-2026:6266 | Moderate: libxslt security update | 2026-03-31T00:00:00Z | 2026-04-01T09:19:08Z |
| alsa-2026:6259 | Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update | 2026-03-31T00:00:00Z | 2026-04-03T09:45:31Z |
| alsa-2026:6256 | Important: python3.12 security update | 2026-03-31T00:00:00Z | 2026-04-01T09:23:35Z |
| alsa-2026:6188 | Important: thunderbird security update | 2026-03-30T00:00:00Z | 2026-04-02T08:18:50Z |
| alsa-2026:6153 | Moderate: kernel security update | 2026-03-30T00:00:00Z | 2026-04-02T08:46:53Z |
| alsa-2026:6053 | Moderate: kernel security update | 2026-03-30T00:00:00Z | 2026-04-03T09:23:17Z |
| alsa-2026:6037 | Moderate: kernel security update | 2026-03-30T00:00:00Z | 2026-03-30T10:55:07Z |
| alsa-2026:6036 | Moderate: kernel-rt security update | 2026-03-30T00:00:00Z | 2026-03-30T10:51:16Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| hsec-2026-0006 | Cabal deletes project source files during configure | 2026-04-08T14:23:27Z | 2026-04-08T14:23:27Z |
| hsec-2026-0004 | Hackage package metadata stored XSS vulnerability | 2026-03-28T16:05:12Z | 2026-03-28T16:05:12Z |
| hsec-2026-0002 | Hackage CSRF vulnerability | 2026-03-28T16:04:58Z | 2026-03-28T16:04:58Z |
| hsec-2024-0004 | Hackage package and doc upload stored XSS vulnerability | 2026-01-16T11:18:20Z | 2026-01-16T11:18:20Z |
| hsec-2025-0007 | cmark-gfm: resource exhaustion due to quadratic complexity in parser | 2025-12-27T08:58:56Z | 2025-12-27T08:58:56Z |
| hsec-2025-0006 | Private key leak via inherited file descriptor | 2025-11-17T02:22:38Z | 2025-11-17T02:22:38Z |
| hsec-2025-0005 | cabal-install dependency confusion | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2025-0004 | Broken Path Sanitization in spacecookie Library | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2025-0003 | Use after free in multithreaded lzma (.xz) decoder | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2025-0002 | Double Public Key Signing Function Oracle Attack on Ed25519 | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2025-0001 | Subword division operations may produce incorrect results | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0009 | Public key confusion in third-party blocks | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0008 | Sign extension error in the PPC64le FFI | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0007 | Sign extension error in the AArch64 NCG | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0006 | fromIntegral: conversion error | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0003 | process: command injection via argument list on Windows | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0002 | out-of-bounds write when there are many bzip2 selectors | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0001 | Reflected XSS vulnerability in keter | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0015 | cabal-install uses expired key policies | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0014 | Arbitrary file write is possible when using PDF output or --extract-media with untrusted input | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0013 | git-annex plaintext storage of embedded credentials on encrypted remotes | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0012 | git-annex checksum exposure to encrypted special remotes | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0011 | git-annex GPG decryption attack via compromised remote | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0010 | git-annex private data exfiltration to compromised remote | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0009 | git-annex command injection via malicious SSH hostname | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0008 | Stored XSS in hledger-web | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0007 | readFloat: memory exhaustion with large exponent | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0006 | x509-validation does not enforce pathLenConstraint | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0005 | tls-extra: certificate validation does not check Basic Constraints | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0004 | xml-conduit unbounded entity expansion | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osec-2026-02 | ARP unbounded memory usage | 2026-02-18T10:30:00Z | 2026-02-18T10:30:00Z |
| osec-2026-01 | Buffer Over-Read in OCaml Marshal Deserialization | 2026-02-17T13:30:00Z | 2026-02-27T09:30:00Z |
| osec-2025-01 | Albatross console out of memory | 2025-08-15T00:18:22Z | 2026-01-13T12:00:00Z |
| osec-2023-01 | Time of check time of use issue in opam's cache | 2023-05-25T12:00:00Z | 2026-01-09T12:00:00Z |
| osec-2022-01 | Infinite loop in console output on xen | 2022-12-07T00:00:00Z | 2026-02-18T09:30:00Z |
| osec-2019-02 | Grant unshare vulnerability in mirage-xen | 2019-04-26T00:00:00Z | 2026-01-13T12:00:00Z |
| osec-2019-01 | Memory disclosure in mirage-net-xen | 2019-03-21T00:00:00Z | 2026-01-13T12:00:00Z |
| osec-2018-01 | An integer overflow in the `bigarray` serialization module leads to arbitrary code execution | 2018-04-06T18:29:00Z | 2025-12-16T12:00:00Z |
| osec-2017-01 | Local privilege escalation issue with ocaml binaries | 2017-06-23T15:19:47Z | 2025-12-16T12:00:00Z |
| osec-2016-02 | Memory disclosure in mirage-net-xen | 2016-05-03T00:00:00Z | 2026-01-13T12:00:00Z |
| osec-2016-01 | Buffer overflow and information leak in OCaml < 4.03.0 | 2016-04-29T00:18:22Z | 2026-01-01T12:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2026-532 | Heap-buffer-overflow in regsub | 2026-04-05T00:06:36.291055Z | 2026-04-05T00:06:36.291504Z |
| osv-2026-518 | Use-of-uninitialized-value in ne_read_block | 2026-04-03T00:21:06.950773Z | 2026-04-03T00:21:06.951035Z |
| osv-2026-514 | Heap-buffer-overflow in format_expand1 | 2026-04-03T00:09:42.155641Z | 2026-04-03T00:09:42.155954Z |
| osv-2026-512 | Heap-buffer-overflow in g_utf8_get_char | 2026-04-03T00:07:59.707776Z | 2026-04-03T00:07:59.708039Z |
| osv-2026-504 | Heap-use-after-free in ObjectStream::getObject | 2026-04-02T00:16:28.228723Z | 2026-04-02T00:16:28.229037Z |
| osv-2026-461 | UNKNOWN READ in XRef::constructObjectEntry | 2026-03-26T00:17:47.551046Z | 2026-03-26T00:17:47.551361Z |
| osv-2026-455 | UNKNOWN READ in mkv::matroska_segment_c::TrackInit | 2026-03-25T00:20:51.448743Z | 2026-03-25T00:20:51.449185Z |
| osv-2026-437 | Heap-use-after-free in tf::Executor::_invoke | 2026-03-23T00:02:28.277984Z | 2026-03-23T14:25:41.819255Z |
| osv-2026-417 | Segv on unknown address in arrow::Array::IsNull | 2026-03-18T00:18:35.139866Z | 2026-03-18T00:18:35.140154Z |
| osv-2026-371 | Heap-buffer-overflow in tinyobj::tryParseDouble | 2026-03-09T00:09:41.689616Z | 2026-03-09T00:09:41.689926Z |
| osv-2026-359 | Segv on unknown address in gpsd_vlog | 2026-03-07T00:03:40.062221Z | 2026-03-07T00:03:40.062505Z |
| osv-2026-350 | UNKNOWN READ in bfd_getl32 | 2026-03-04T00:14:56.651284Z | 2026-03-14T18:43:19.427139Z |
| osv-2026-338 | Use-of-uninitialized-value in pjsip_auth_clt_init_req | 2026-03-03T00:09:55.520965Z | 2026-03-03T00:09:55.521245Z |
| osv-2026-311 | UNKNOWN READ in strncasecmp | 2026-02-26T00:16:50.091819Z | 2026-02-26T00:16:50.092121Z |
| osv-2026-308 | Heap-buffer-overflow in vcardstructured_new_from_string | 2026-02-25T00:19:49.963815Z | 2026-02-25T00:19:49.964188Z |
| osv-2026-307 | Global-buffer-overflow in navcom_parse | 2026-02-25T00:16:23.864362Z | 2026-02-25T00:16:23.864694Z |
| osv-2026-304 | Heap-use-after-free in tf::Executor::_invoke | 2026-02-25T00:09:10.290694Z | 2026-02-25T00:09:10.291030Z |
| osv-2026-302 | Use-of-uninitialized-value in BIO_new_file | 2026-02-25T00:07:20.338981Z | 2026-02-25T00:07:20.339278Z |
| osv-2026-300 | UNKNOWN WRITE in nmeaid_to_prn | 2026-02-25T00:06:00.225480Z | 2026-02-25T00:06:00.225972Z |
| osv-2026-297 | Security exception in org.apache.poi.util.IOUtils.safelyAllocate | 2026-02-24T00:02:29.789817Z | 2026-02-24T00:02:29.790144Z |
| osv-2026-292 | UNKNOWN WRITE in <wasmtime::runtime::func::Func>::call_unchecked_raw::< | 2026-02-23T00:19:15.717984Z | 2026-02-23T00:19:15.718280Z |
| osv-2026-272 | Heap-use-after-free in vcardproperty_get_value | 2026-02-21T00:20:10.455944Z | 2026-02-21T00:20:10.456357Z |
| osv-2026-261 | Segv on unknown address in ___interceptor_strtol | 2026-02-19T00:09:21.893775Z | 2026-02-19T00:09:21.894076Z |
| osv-2026-259 | Use-of-uninitialized-value in tsip_parse_input | 2026-02-18T00:14:29.378028Z | 2026-02-18T00:14:29.378341Z |
| osv-2026-255 | UNKNOWN WRITE in nmeaid_to_prn | 2026-02-17T00:17:19.574579Z | 2026-02-17T00:17:19.574905Z |
| osv-2026-244 | Use-of-uninitialized-value in ihevcd_fmt_conv | 2026-02-15T00:03:36.246033Z | 2026-02-15T00:03:36.246568Z |
| osv-2026-242 | Use-of-uninitialized-value in ntrip_parse_url | 2026-02-14T00:17:42.945923Z | 2026-02-14T00:17:42.946299Z |
| osv-2026-240 | Use-of-uninitialized-value in packet_get1 | 2026-02-14T00:09:50.559032Z | 2026-02-14T00:09:50.559326Z |
| osv-2026-229 | Segv on unknown address in aiAnimation::~aiAnimation | 2026-02-11T00:12:18.313233Z | 2026-02-11T00:12:18.313574Z |
| osv-2026-226 | UNKNOWN WRITE in decode_xa2_00 | 2026-02-11T00:10:08.757600Z | 2026-02-11T00:10:08.757920Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0099 | Name constraints were accepted for certificates asserting a wildcard name | 2026-04-14T12:00:00Z | 2026-04-15T09:57:12Z |
| rustsec-2026-0098 | Name constraints for URI names were incorrectly accepted | 2026-04-14T12:00:00Z | 2026-04-15T07:36:20Z |
| rustsec-2026-0097 | Rand is unsound with a custom logger using `rand::rng()` | 2026-04-09T12:00:00Z | 2026-04-14T05:30:54Z |
| rustsec-2026-0096 | Miscompiled guest heap access enables sandbox escape on aarch64 Cranelift | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0095 | Wasmtime with Winch compiler backend may allow a sandbox-escaping memory access | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0094 | Improperly masked return value from `table.grow` with Winch compiler backend | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0093 | Heap OOB read in component model UTF-16 to latin1+utf16 string transcoding | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0092 | Panic when transcoding misaligned component model UTF-16 strings | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0091 | Out-of-bounds write or crash when transcoding component model strings | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0090 | Use-after-free bug after cloning `wasmtime::Linker` | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0089 | Host panic when Winch compiler executes `table.fill` | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0088 | Data leakage between pooling allocator instances | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0087 | Wasmtime segfault or unused out-of-sandbox load with `f64x2.splat` operator on Cranelift x86-64 | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0086 | Host data leakage with 64-bit tables and Winch | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0085 | Panic when lifting `flags` component value | 2026-04-09T12:00:00Z | 2026-04-09T19:59:38Z |
| rustsec-2026-0084 | `logprinter` was removed from crates.io for malicious code | 2026-04-09T12:00:00Z | 2026-04-09T11:23:07Z |
| rustsec-2026-0083 | zantetsu-trainer is unmaintained | 2026-04-07T12:00:00Z | 2026-04-08T08:55:27Z |
| rustsec-2026-0082 | zantetsu-ffi is unmaintained | 2026-04-07T12:00:00Z | 2026-04-08T08:55:27Z |
| rustsec-2026-0081 | `logtrace` was removed from crates.io for malicious code | 2026-04-05T12:00:00Z | 2026-04-05T23:52:05Z |
| rustsec-2026-0078 | Symbol confusion after hasher panic in `intaglio` interners | 2026-03-30T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2026-0065 | `tokio-signal` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0064 | `tokio-udp` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0063 | `tokio-executor` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0062 | `tokio-compat` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0061 | `tokio-fs` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0060 | `tokio-timer` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0059 | `tokio-tcp` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0058 | `tokio-io` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0057 | `tokio-reactor` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0056 | `tokio-codec` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-tomcat-2026-29146 | Apache Tomcat: EncryptInterceptor vulnerable to padding oracle attack by default | 2026-04-13T16:01:34.700Z | 2026-04-13T16:23:32.396Z |
| bit-wiremock-2023-41329 | Domain restrictions bypass via DNS Rebinding in WireMock and WireMock Studio | 2026-04-13T16:00:00.480Z | 2026-04-13T16:23:32.396Z |
| bit-wiremock-2023-41327 | Controlled SSRF through URL in the WireMock | 2026-04-13T15:59:58.176Z | 2026-04-13T16:23:32.396Z |
| bit-nifi-2024-45477 | Apache NiFi: Improper Neutralization of Input in Parameter Description | 2026-04-13T14:17:18.796Z | 2026-04-13T14:44:23.860Z |
| bit-wiremock-2023-50069 | 2026-04-13T11:50:15.583Z | 2026-04-13T12:09:46.643Z | |
| bit-tomcat-2026-34500 | Apache Tomcat: OCSP checks sometimes soft-fail with FFM even when soft-fail is disabled | 2026-04-13T10:20:02.205Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-34487 | Apache Tomcat: Cloud membership for clustering component exposed the Kubernetes bearer token | 2026-04-13T10:20:00.791Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-34483 | Apache Tomcat: Incomplete escaping of JSON access logs | 2026-04-13T10:19:58.030Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-29145 | Apache Tomcat, Apache Tomcat Native: OCSP checks sometimes soft-fail even when soft-fail is disabled | 2026-04-13T10:19:53.698Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-25854 | Apache Tomcat: Occasionally open redirect | 2026-04-13T10:19:50.972Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-24880 | Apache Tomcat: Request smuggling via invalid chunk extension | 2026-04-13T10:19:49.629Z | 2026-04-13T10:42:00.723Z |
| bit-mongodb-2026-4148 | ExpressionContext use-after-free in classic engine $lookup and $graphLookup aggregation operators | 2026-04-13T10:13:07.402Z | 2026-04-13T10:42:00.723Z |
| bit-mongodb-2026-4147 | Stack memory disclosure in filemd5 command | 2026-04-13T10:13:04.983Z | 2026-04-13T10:42:00.723Z |
| bit-minio-2026-39414 | MinIO affected a DoS via Unbounded Memory Allocation in S3 Select CSV Parsing | 2026-04-13T10:10:51.384Z | 2026-04-13T10:42:00.723Z |
| bit-gitlab-2026-4916 | Missing Authorization in GitLab | 2026-04-13T06:10:14.681Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-4332 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-04-13T06:10:11.039Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-2619 | Incorrect Authorization in GitLab | 2026-04-13T06:09:54.420Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-2104 | Authorization Bypass Through User-Controlled Key in GitLab | 2026-04-13T06:09:50.678Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-1516 | Improper Control of Generation of Code ('Code Injection') in GitLab | 2026-04-13T06:09:35.915Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-1101 | Improper Validation of Specified Quantity in Input in GitLab | 2026-04-13T06:09:20.803Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2025-9484 | Missing Authorization in GitLab | 2026-04-13T06:08:58.190Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2025-12664 | Improper Validation of Specified Quantity in Input in GitLab | 2026-04-13T06:05:51.788Z | 2026-04-13T06:11:47.324Z |
| bit-tomcat-2026-34486 | Apache Tomcat: Fix for CVE-2026-29146 allowed bypass of EncryptInterceptor | 2026-04-13T05:53:08.595Z | 2026-04-13T06:11:47.324Z |
| bit-tomcat-2026-32990 | Apache Tomcat: Fix for CVE-2025-66614 is incomplete | 2026-04-13T05:53:05.369Z | 2026-04-13T06:11:47.324Z |
| bit-tomcat-2026-29129 | Apache Tomcat: TLS cipher order is not preserved | 2026-04-13T05:53:00.617Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-33810 | Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509 | 2026-04-13T05:43:50.259Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-32289 | JsBraceDepth Context Tracking Bugs (XSS) in html/template | 2026-04-13T05:43:48.183Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-32288 | Unbounded allocation for old GNU sparse in archive/tar | 2026-04-13T05:43:46.362Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-32283 | Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection retention and DoS in crypto/tls | 2026-04-13T05:43:44.464Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-32282 | TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix | 2026-04-13T05:43:42.625Z | 2026-04-13T06:11:47.324Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-kc83705 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-15T00:53:10.163760Z | 2026-04-14T09:04:57Z |
| cleanstart-2026-mw52599 | OpenVPN version 2 | 2026-04-15T00:50:39.610141Z | 2026-04-14T06:07:21Z |
| cleanstart-2026-eo57061 | In libexpat before 2 | 2026-04-15T00:45:38.991412Z | 2026-04-14T08:58:37Z |
| cleanstart-2026-fb07695 | When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint | 2026-04-15T00:45:38.848496Z | 2026-04-14T11:38:13Z |
| cleanstart-2026-fz27876 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-15T00:44:39.850466Z | 2026-04-14T08:58:37Z |
| cleanstart-2026-fd98843 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-15T00:43:03.053896Z | 2026-04-14T08:58:37Z |
| cleanstart-2026-fa60324 | It was found that the cookie used for CSRF prevention in Keycloak was not unique to each session | 2026-04-15T00:42:39.375533Z | 2026-04-14T09:27:59Z |
| cleanstart-2026-bz28794 | Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service | 2026-04-15T00:41:09.072733Z | 2026-04-14T10:03:45Z |
| cleanstart-2026-mp87020 | If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources | 2026-04-15T00:39:08.262212Z | 2026-04-14T11:37:13Z |
| cleanstart-2026-ec57959 | protojson | 2026-04-15T00:38:38.411296Z | 2026-04-14T11:35:55Z |
| cleanstart-2026-fh63386 | When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint | 2026-04-14T00:44:12.807187Z | 2026-04-13T10:06:48Z |
| cleanstart-2026-lk73694 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-14T00:43:42.897096Z | 2026-04-13T05:21:32Z |
| cleanstart-2026-jh41080 | In libexpat before 2 | 2026-04-14T00:41:12.662437Z | 2026-04-13T11:37:38Z |
| cleanstart-2026-nj21771 | png_image_free in png | 2026-04-14T00:41:12.278705Z | 2026-04-13T10:08:55Z |
| cleanstart-2026-ka64649 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-14T00:38:03.199310Z | 2026-04-13T11:37:38Z |
| cleanstart-2026-nh62318 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-14T00:38:02.309746Z | 2026-04-13T11:37:38Z |
| cleanstart-2026-ne70100 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-12T00:36:10.440964Z | 2026-04-11T06:04:40Z |
| cleanstart-2026-mz25894 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-12T00:36:10.207025Z | 2026-04-11T06:04:40Z |
| cleanstart-2026-hu81793 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-12T00:36:09.840766Z | 2026-04-11T06:04:40Z |
| cleanstart-2026-jt73156 | protojson | 2026-04-11T00:42:17.168521Z | 2026-04-10T12:27:18Z |
| cleanstart-2026-lb69194 | In libexpat before 2 | 2026-04-11T00:39:42.680532Z | 2026-04-10T05:48:24Z |
| cleanstart-2026-ei21238 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-11T00:37:54.711613Z | 2026-04-10T10:45:58Z |
| cleanstart-2026-dm93480 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-10T01:06:00.088585Z | 2026-04-09T09:11:04Z |
| cleanstart-2026-oc72960 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-10T01:04:28.955253Z | 2026-04-09T08:54:07Z |
| cleanstart-2026-av56399 | Security fixes for ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 25.10.0-r1 | 2026-04-10T01:04:01.910374Z | 2026-04-09T08:54:48Z |
| cleanstart-2026-jm69747 | Security fixes for ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 25.10.0-r1 | 2026-04-10T01:04:01.248430Z | 2026-04-09T08:55:52Z |
| cleanstart-2026-aa51484 | Security fixes for ghsa-389x-839f-4rhx, ghsa-3p8m-j85q-pgmj, ghsa-4cx2-fc23-5wg6, ghsa-4g8c-wm8x-jfhw, ghsa-735f-pc8j-v9w8, ghsa-fghv-69vj-qj49, ghsa-prj3-ccx8-p6x4, ghsa-xq3w-v528-46rv applied in versions: 0.12.0-r16 | 2026-04-10T01:04:01.115500Z | 2026-04-09T08:58:26Z |
| cleanstart-2026-dp55969 | Security fixes for ghsa-389x-839f-4rhx, ghsa-3p8m-j85q-pgmj, ghsa-4cx2-fc23-5wg6, ghsa-4g8c-wm8x-jfhw, ghsa-735f-pc8j-v9w8, ghsa-fghv-69vj-qj49, ghsa-prj3-ccx8-p6x4, ghsa-xq3w-v528-46rv applied in versions: 0.12.0-r16 | 2026-04-10T01:04:00.139766Z | 2026-04-09T09:00:58Z |
| cleanstart-2026-ac01087 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-10T01:03:59.042951Z | 2026-04-09T09:55:12Z |
| cleanstart-2026-kl76732 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-10T01:03:58.949308Z | 2026-04-09T09:05:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2026-032 | 2026-04-08T16:09:54.000Z | 2026-04-08T16:09:54.000Z | |
| drupal-contrib-2026-031 | 2026-04-01T16:38:14.000Z | 2026-04-02T14:13:13.000Z | |
| drupal-contrib-2026-030 | 2026-03-18T16:10:00.000Z | 2026-03-18T16:10:00.000Z | |
| drupal-contrib-2026-029 | 2026-03-11T16:35:02.000Z | 2026-03-26T19:50:52.000Z | |
| drupal-contrib-2026-028 | 2026-03-11T16:33:14.000Z | 2026-03-26T19:43:59.000Z | |
| drupal-contrib-2026-027 | 2026-03-04T18:02:59.000Z | 2026-03-04T18:02:59.000Z | |
| drupal-contrib-2026-026 | 2026-03-04T18:02:14.000Z | 2026-03-04T18:02:14.000Z | |
| drupal-contrib-2026-025 | 2026-03-04T18:00:41.000Z | 2026-03-04T18:00:41.000Z | |
| drupal-contrib-2026-024 | 2026-03-04T17:59:51.000Z | 2026-03-05T14:03:05.000Z | |
| drupal-contrib-2026-023 | 2026-03-04T17:58:55.000Z | 2026-03-04T17:58:55.000Z | |
| drupal-contrib-2026-022 | 2026-03-04T17:57:58.000Z | 2026-03-04T17:57:58.000Z | |
| drupal-contrib-2026-021 | 2026-03-04T17:56:18.000Z | 2026-03-04T17:56:18.000Z | |
| drupal-contrib-2026-020 | 2026-03-04T17:54:27.000Z | 2026-03-04T17:54:27.000Z | |
| drupal-contrib-2026-019 | 2026-02-25T18:51:43.000Z | 2026-02-25T18:51:43.000Z | |
| drupal-contrib-2026-018 | 2026-02-25T18:51:26.000Z | 2026-02-25T18:51:26.000Z | |
| drupal-contrib-2026-017 | 2026-02-25T18:51:01.000Z | 2026-02-25T18:51:01.000Z | |
| drupal-contrib-2026-016 | 2026-02-25T18:49:59.000Z | 2026-02-25T19:30:03.000Z | |
| drupal-contrib-2026-015 | 2026-02-25T18:47:57.000Z | 2026-03-17T13:20:54.000Z | |
| drupal-contrib-2026-014 | 2026-02-25T18:46:10.000Z | 2026-02-25T18:46:10.000Z | |
| drupal-contrib-2026-013 | 2026-02-25T18:45:13.000Z | 2026-02-25T18:45:13.000Z | |
| drupal-contrib-2026-012 | 2026-02-25T18:44:38.000Z | 2026-02-25T18:44:38.000Z | |
| drupal-contrib-2026-011 | 2026-02-25T18:43:32.000Z | 2026-02-25T18:43:32.000Z | |
| drupal-contrib-2026-010 | 2026-02-11T16:54:18.000Z | 2026-02-25T17:17:46.000Z | |
| drupal-contrib-2026-009 | 2026-02-11T16:53:32.000Z | 2026-02-12T15:37:20.000Z | |
| drupal-contrib-2026-008 | 2026-02-04T17:23:40.000Z | 2026-02-04T17:23:40.000Z | |
| drupal-contrib-2026-007 | 2026-01-28T17:29:32.000Z | 2026-01-28T17:29:32.000Z | |
| drupal-contrib-2026-006 | 2026-01-28T17:28:31.000Z | 2026-01-28T17:28:31.000Z | |
| drupal-contrib-2026-005 | 2026-01-14T17:57:31.000Z | 2026-01-14T18:33:02.000Z | |
| drupal-contrib-2026-004 | 2026-01-14T17:56:28.000Z | 2026-01-14T17:56:28.000Z | |
| drupal-contrib-2026-003 | 2026-01-14T17:55:41.000Z | 2026-01-14T17:55:41.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-ale-004 | VulnƩrabilitƩ dans F5 BIG-IP Access Policy Manager | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-ale-003 | Note dāalerte ā Ciblage des messageries instantanĆ©es | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-ale-002 | [Mà J] Vulnérabilité dans Cisco Catalyst SD-WAN | 2026-02-25T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-ale-001 | [Mà J] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2026-01-30T00:00:00.000000 | 2026-02-03T00:00:00.000000 |
| certfr-2025-ale-014 | [Mà J] Vulnérabilité dans React Server Components | 2025-12-05T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2025-ale-013 | [Mà J] Multiples vulnérabilités dans Cisco ASA et FTD | 2025-09-25T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-ale-012 | VulnƩrabilitƩ dans Citrix NetScaler ADC et NetScaler Gateway | 2025-08-26T00:00:00.000000 | 2025-09-26T00:00:00.000000 |
| certfr-2025-ale-011 | Incidents de sƩcuritƩ dans les pare-feux SonicWall | 2025-08-05T00:00:00.000000 | 2025-08-18T00:00:00.000000 |
| certfr-2025-ale-010 | [Mà J] Multiples vulnérabilités dans Microsoft SharePoint | 2025-07-21T00:00:00.000000 | 2025-08-26T00:00:00.000000 |
| certfr-2025-ale-009 | Multiples vulnƩrabilitƩs dans Citrix NetScaler ADC et NetScaler Gateway | 2025-07-01T00:00:00.000000 | 2025-07-17T00:00:00.000000 |
| certfr-2025-ale-008 | [Mà J] Vulnérabilité dans Roundcube | 2025-06-05T00:00:00.000000 | 2025-07-21T00:00:00.000000 |
| certfr-2025-ale-007 | Multiples vulnƩrabilitƩs dans Ivanti Endpoint Manager Mobile (EPMM) | 2025-05-14T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-006 | VulnƩrabilitƩ dans les produits Fortinet | 2025-05-13T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-002 | [Mà J] Vulnérabilité dans les produits Fortinet | 2025-05-07T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| certfr-2025-ale-005 | VulnƩrabilitƩ dans SAP NetWeaver | 2025-04-28T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-004 | ActivitƩs de post-exploitation dans Fortinet FortiGate | 2025-04-11T00:00:00.000000 | 2025-08-07T00:00:00.000000 |
| certfr-2025-ale-003 | [Mà J] Vulnérabilité dans les produits Ivanti | 2025-04-04T00:00:00.000000 | 2025-04-11T00:00:00.000000 |
| certfr-2024-ale-013 | Exploitations de vulnƩrabilitƩs dans Ivanti Cloud Services Appliance (CSA) | 2025-03-31T00:00:00.000000 | 2024-10-25T00:00:00.000000 |
| certfr-2025-ale-001 | [Mà J] Vulnérabilité dans les produits Ivanti | 2025-01-09T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| certfr-2024-ale-015 | [Mà J] Multiples vulnérabilités sur l'interface d'administration des équipements Palo Alto Networks | 2024-11-15T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| certfr-2024-ale-014 | [Mà J] Multiples vulnérabilités dans Fortinet FortiManager | 2024-10-30T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| certfr-2024-ale-012 | [Mà J] Vulnérabilités affectant OpenPrinting CUPS | 2024-09-27T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-011 | VulnƩrabilitƩ dans SonicWall | 2024-09-10T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-010 | Multiples vulnƩrabilitƩs dans Roundcube | 2024-08-09T00:00:00.000000 | 2024-10-07T00:00:00.000000 |
| certfr-2024-ale-009 | VulnƩrabilitƩ dans OpenSSH | 2024-07-01T00:00:00.000000 | 2024-07-03T00:00:00.000000 |
| certfr-2024-ale-008 | [Mà J] Vulnérabilité dans les produits Check Point | 2024-05-30T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-007 | Multiples vulnƩrabilitƩs dans les produits Cisco | 2024-04-25T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-006 | [Mà J] Vulnérabilité dans Palo Alto Networks GlobalProtect | 2024-04-12T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-005 | [Mà J] Vulnérabilité dans Microsoft Outlook | 2024-02-15T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-004 | [Mà J] Vulnérabilité dans Fortinet FortiOS | 2024-02-09T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0435 | Multiples vulnƩrabilitƩs dans les produits Microsoft | 2026-04-14T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| certfr-2026-avi-0434 | Multiples vulnƩrabilitƩs dans les produits SAP | 2026-04-14T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| certfr-2026-avi-0433 | Multiples vulnƩrabilitƩs dans les produits Schneider Electric | 2026-04-14T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| certfr-2026-avi-0432 | Multiples vulnƩrabilitƩs dans les produits Siemens | 2026-04-14T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| certfr-2026-avi-0431 | Multiples vulnƩrabilitƩs dans Synology SSL VPN Client | 2026-04-14T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| certfr-2026-avi-0430 | Multiples vulnƩrabilitƩs dans Python | 2026-04-14T00:00:00.000000 | 2026-04-14T00:00:00.000000 |
| certfr-2026-avi-0429 | VulnƩrabilitƩ dans Adobe Acrobat | 2026-04-13T00:00:00.000000 | 2026-04-13T00:00:00.000000 |
| certfr-2026-avi-0428 | Multiples vulnƩrabilitƩs dans les produits Microsoft | 2026-04-13T00:00:00.000000 | 2026-04-13T00:00:00.000000 |
| certfr-2026-avi-0427 | Multiples vulnƩrabilitƩs dans Microsoft Edge | 2026-04-13T00:00:00.000000 | 2026-04-13T00:00:00.000000 |
| certfr-2026-avi-0426 | Multiples vulnƩrabilitƩs dans Python | 2026-04-13T00:00:00.000000 | 2026-04-13T00:00:00.000000 |
| certfr-2026-avi-0425 | VulnƩrabilitƩ dans Foxit PDF Services API | 2026-04-13T00:00:00.000000 | 2026-04-13T00:00:00.000000 |
| certfr-2026-avi-0424 | Multiples vulnƩrabilitƩs dans les produits IBM | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0423 | Multiples vulnƩrabilitƩs dans le noyau Linux de Red Hat | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0422 | Multiples vulnƩrabilitƩs dans le noyau Linux de SUSE | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0421 | Multiples vulnƩrabilitƩs dans le noyau Linux d'Ubuntu | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0420 | Multiples vulnƩrabilitƩs dans les produits Microsoft | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0419 | Multiples vulnƩrabilitƩs dans Mattermost Desktop App | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0418 | Multiples vulnƩrabilitƩs dans Apache Tomcat | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0417 | VulnƩrabilitƩ dans Spring Cloud Gateway | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0416 | VulnƩrabilitƩ dans les produits Juniper Networks | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0415 | Multiples vulnƩrabilitƩs dans Tenable Security Center | 2026-04-10T00:00:00.000000 | 2026-04-10T00:00:00.000000 |
| certfr-2026-avi-0414 | Multiples vulnƩrabilitƩs dans les produits Microsoft | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0413 | Multiples vulnƩrabilitƩs dans les produits Elastic | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0412 | Multiples vulnƩrabilitƩs dans les produits Palo Alto Networks | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0411 | Multiples vulnƩrabilitƩs dans Mitel MiCollab | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0410 | Multiples vulnƩrabilitƩs dans GitLab | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0409 | Multiples vulnƩrabilitƩs dans Sonicwall Secure Mobile Access | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0408 | Multiples vulnƩrabilitƩs dans les produits Juniper Networks | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0407 | Multiples vulnƩrabilitƩs dans Google Chrome | 2026-04-09T00:00:00.000000 | 2026-04-09T00:00:00.000000 |
| certfr-2026-avi-0406 | Multiples vulnƩrabilitƩs dans les produits Microsoft | 2026-04-08T00:00:00.000000 | 2026-04-08T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-010851 | Stack-based buffer overflow vulnerability in Dynabook Bluetooth ACPI Drivers | 2026-04-14T18:13+09:00 | 2026-04-14T18:13+09:00 |
| jvndb-2026-000053 | EmoCheck loads Dynamic Link Libraries insecurely | 2026-04-10T13:38+09:00 | 2026-04-10T13:38+09:00 |
| jvndb-2026-000052 | Multiple vulnerabilities in MATCHA series | 2026-04-08T16:15+09:00 | 2026-04-08T16:15+09:00 |
| jvndb-2026-000050 | Multiple vulnerabilities in Movable Type | 2026-04-08T16:15+09:00 | 2026-04-08T16:15+09:00 |
| jvndb-2026-010301 | Multiple Vulnerabilities in JP1/IT Desktop Management 2 and JP1/NETM/DM | 2026-04-08T12:11+09:00 | 2026-04-08T12:11+09:00 |
| jvndb-2026-010300 | Multiple Vulnerabilities in Hitachi Ops Center Viewpoint | 2026-04-08T12:11+09:00 | 2026-04-08T12:11+09:00 |
| jvndb-2026-010299 | Multiple Vulnerabilities in Hitachi Ops Center Common Services | 2026-04-08T12:11+09:00 | 2026-04-08T12:11+09:00 |
| jvndb-2026-000049 | Multiple vulnerabilities in NEC Aterm series (NV26-001) | 2026-04-03T15:09+09:00 | 2026-04-03T15:09+09:00 |
| jvndb-2026-009720 | Multiple vulnerabilities in FUJI Electric V-SFT (April 2026) | 2026-04-02T14:58+09:00 | 2026-04-03T15:50+09:00 |
| jvndb-2026-009412 | Security information for Hitachi Disk Array Systems | 2026-03-31T15:53+09:00 | 2026-03-31T15:53+09:00 |
| jvndb-2026-009411 | Security information for Hitachi Disk Array Systems | 2026-03-31T15:53+09:00 | 2026-03-31T15:53+09:00 |
| jvndb-2026-009410 | Security information for Hitachi Disk Array Systems | 2026-03-31T15:53+09:00 | 2026-03-31T15:53+09:00 |
| jvndb-2026-009409 | Security information for Hitachi Disk Array Systems | 2026-03-31T15:53+09:00 | 2026-03-31T15:53+09:00 |
| jvndb-2026-009408 | Security information for Hitachi Disk Array Systems | 2026-03-31T15:53+09:00 | 2026-03-31T15:53+09:00 |
| jvndb-2026-009406 | Security information for Hitachi Disk Array Systems | 2026-03-31T15:53+09:00 | 2026-03-31T15:53+09:00 |
| jvndb-2026-009147 | Vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2026-03-27T18:18+09:00 | 2026-03-27T18:18+09:00 |
| jvndb-2026-009148 | Open Redirect Vulnerability in Hitachi Ops Center Administrator | 2026-03-27T18:17+09:00 | 2026-03-27T18:17+09:00 |
| jvndb-2026-000047 | Multiple vulnerabilities in baserCMS | 2026-03-27T18:00+09:00 | 2026-03-27T18:00+09:00 |
| jvndb-2026-000045 | WordPress Plugin "OpenStreetMap" vulnerable to cross-site scripting | 2026-03-27T17:34+09:00 | 2026-03-27T17:34+09:00 |
| jvndb-2026-000046 | Multiple vulnerabilities in BUFFALO Wi-Fi routers | 2026-03-27T17:18+09:00 | 2026-03-27T17:18+09:00 |
| jvndb-2026-000044 | Multiple vulnerabilities in the installer of RATOC RAID Monitoring Manager for Windows | 2026-03-26T17:41+09:00 | 2026-03-26T17:41+09:00 |
| jvndb-2026-000042 | Digital Photo Frame GH-WDF10A vulnerable to improper access restriction | 2026-03-26T17:41+09:00 | 2026-03-26T17:41+09:00 |
| jvndb-2026-000043 | SHARP routers missing authentication for some web APIs | 2026-03-25T18:41+09:00 | 2026-03-25T18:41+09:00 |
| jvndb-2026-000040 | Installer of OM Workspace (Windows Edition) may insecurely load Dynamic Link Libraries | 2026-03-25T18:13+09:00 | 2026-03-25T18:13+09:00 |
| jvndb-2026-000041 | SANYO DENKI SANUPS SOFTWARE registers Windows services with unquoted file paths | 2026-03-25T17:58+09:00 | 2026-03-25T17:58+09:00 |
| jvndb-2026-007973 | Multiple vulnerabilities in Xerox FreeFlow Core (XRX26-005) | 2026-03-23T14:54+09:00 | 2026-04-09T13:55+09:00 |
| jvndb-2026-007524 | Vulnerability in Hitachi Command Suite | 2026-03-17T16:42+09:00 | 2026-03-17T16:42+09:00 |
| jvndb-2026-000038 | Installer for IBM Trusteer Rapport may insecurely load Dynamic Link Libraries | 2026-03-17T14:57+09:00 | 2026-03-17T14:57+09:00 |
| jvndb-2026-000039 | Missing authorization in the OpenAI thread/message API endpoints of GROWI | 2026-03-16T17:18+09:00 | 2026-03-16T17:18+09:00 |
| jvndb-2026-000037 | OpenLiteSpeed and LSWS Enterprise vulnerable to OS command injection | 2026-03-16T17:18+09:00 | 2026-03-16T17:18+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-16036 | Linux kernelåééę¾ę¼ę“ļ¼CNVD-2026-16036ļ¼ | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16035 | FreeRDPęē»ęå”ę¼ę“ļ¼CNVD-2026-16035ļ¼ | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16034 | FreeRDPč¶ē读åę¼ę“ļ¼CNVD-2026-16034ļ¼ | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16033 | FreeRDPå ē¼å²åŗęŗ¢åŗę¼ę“ļ¼CNVD-2026-16033ļ¼ | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16032 | FreeRDPåééę¾ę¼ę“ļ¼CNVD-2026-16032ļ¼ | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16031 | OpenBaoęęé®é¢ę¼ę“ | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16137 | IBM InfoSphere Information Server代ē é®é¢ę¼ę“ļ¼CNVD-2026-16137ļ¼ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16136 | IBM Concert代ē é®é¢ę¼ę“ļ¼CNVD-2026-16136ļ¼ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16135 | IBM Concertå åÆé®é¢ę¼ę“ļ¼CNVD-2026-16135ļ¼ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16134 | IBM Concertå åÆé®é¢ę¼ę“ļ¼CNVD-2026-16134ļ¼ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16133 | IBM InfoSphere Information Serverå åÆé®é¢ę¼ę“ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16132 | IBM InfoSphere Information Serveräæ”ęÆę³é²ę¼ę“ļ¼CNVD-2026-16132ļ¼ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16131 | IBM InfoSphere Information Serveräæ”ęÆę³é²ę¼ę“ļ¼CNVD-2026-16131ļ¼ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16130 | IBM InfoSphere Information Serveräæ”ęÆę³é²ę¼ę“ļ¼CNVD-2026-16130ļ¼ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16129 | IBM InfoSphere Information Serveräæ”ęÆę³é²ę¼ę“ļ¼CNVD-2026-16129ļ¼ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16128 | IBM Concert访é®ę§å¶é误ę¼ę“ļ¼CNVD-2026-16128ļ¼ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16064 | WordPressęä»¶SMTP Maileräæ”ęÆę³é²ę¼ę“ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16058 | Apple macOSååØęŖęę¼ę“ļ¼CNVD-2026-16058ļ¼ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16040 | OpenClawč·Æå¾éåę¼ę“ļ¼CNVD-2026-16040ļ¼ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16039 | WordPressęä»¶Addon Jobsearch Chatč·Øē«čę¬ę¼ę“ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16038 | Linux kernelå åé误å¼ēØę¼ę“ļ¼CNVD-2026-16038ļ¼ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16037 | FreeBSDē¼å²åŗęŗ¢åŗę¼ę“ļ¼CNVD-2026-16037ļ¼ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-15843 | WordPressęä»¶Abandoned Cart Recovery for WooCommerceč·Øē«čę¬ę¼ę“ | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15842 | HCL TravelerååØęŖęę¼ę“ | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15841 | HCL Aftermarket DPC甬ē¼ē ę¼ę“ | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15840 | HCL Aftermarket DPCęä»¶äøä¼ ę¼ę“ | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15839 | HCL Aftermarket DPCč·Øē«čę¬ę¼ę“ | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15838 | HCL Aftermarket DPC访é®ę§å¶é误ę¼ę“ | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15837 | HCL Aftermarket DPCååØęŖęę¼ę“ļ¼CNVD-2026-15837ļ¼ | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15836 | HCL Aftermarket DPCč¾å „éŖčÆé误ę¼ę“ | 2026-03-31 | 2026-04-01 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01844 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠµŃŠ²ŠøŃŠ° Š±ŠµŠ·Š¾ŠæŠ°ŃŠ½Š¾ŃŃŠø Advanced DNS Security (ADNS) Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń PAN-OS,⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01843 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŃŠ½ŠŗŃŠøŠø loadRLE() загŃŃŠ·Ńика TGA-ŠøŠ·Š¾Š±ŃŠ°Š¶ŠµŠ½ŠøŠ¹ (PluginTARGA.cpp) Š³ŃŠ°ŃŠøŃŠµŃкой биб⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01842 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŃŠ½ŠŗŃŠøŠø ws_user_gerList() ŃŃŠµŠ½Š°ŃŠøŃ pwg.users.php ŃŠøŃŃŠµŠ¼Ń ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ ŠŗŠ¾Š½ŃŠµŠ½Ńом ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01841 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° Updater Š¾Š±Š»Š°ŃŠ½Š¾Š¹ плаŃŃŠ¾ŃŠ¼Ń ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ ŠŗŠ¾Š½ŃŠµŠ¹Š½ŠµŃами Arcane, позволŃŃ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01840 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠŠ-Š°Š³ŠµŠ½ŃŠ° OpenClaw (ŃŠ°Š½ŠµŠµ - ClawdBot или MoltBot), ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń Š¾ŃŃŃŃŃŃŠ²ŠøŠµŠ¼ ŠæŃŠ¾ā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01839 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŃŠ½ŠŗŃŠøŠø blocked_path() ŠæŠ°ŠŗŠµŃŠ° Python Š“Š»Ń ŃŠ¾Š·Š“Š°Š½ŠøŃ ŠæŃŠøŠ»Š¾Š¶ŠµŠ½ŠøŠ¹ Š“Š»Ń Š¼Š¾Š“ŠµŠ»ŠµŠ¹ Š¼Š°ŃŠøŠ½ā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01838 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š“ŃŠ°Š¹Š²ŠµŃов Š³ŃŠ°ŃŠøŃŠµŃŠŗŠøŃ ŠæŃŠ¾ŃеŃŃŠ¾Ńов NVIDIA NVS, Quadro, NVIDIA RTX, GeForce, ŃŠ²Ń⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01837 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¼ŠøŠŗŃŠ¾ŠæŃŠ¾Š³ŃŠ°Š¼Š¼Š½Š¾Š³Š¾ Š¾Š±ŠµŃŠæŠµŃŠµŠ½ŠøŃ Š³ŃŠ°ŃŠøŃŠµŃŠŗŠøŃ ŠæŃŠ¾ŃеŃŃŠ¾Ńов Imagination, позволŃŃŃŠ°Ń⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01836 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¼ŠøŠŗŃŠ¾ŠæŃŠ¾Š³ŃŠ°Š¼Š¼Š½Š¾Š³Š¾ Š¾Š±ŠµŃŠæŠµŃŠµŠ½ŠøŃ Š³ŃŠ°ŃŠøŃŠµŃŠŗŠøŃ ŠæŃŠ¾ŃеŃŃŠ¾Ńов Imagination, позволŃŃŃŠ°Ń⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01835 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š“ŃŠ°Š¹Š²ŠµŃа ESXi base Š¼ŠøŠŗŃŠ¾ŠæŃŠ¾Š³ŃŠ°Š¼Š¼Š½Š¾Š³Š¾ Š¾Š±ŠµŃŠæŠµŃŠµŠ½ŠøŃ ŃŠµŃевŃŃ ŠŗŠ¾Š½ŃŃŠ¾Š»Š»ŠµŃов Intel 80⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01834 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¼ŠøŠŗŃŠ¾ŠæŃŠ¾Š³ŃŠ°Š¼Š¼Š½Š¾Š³Š¾ Š¾Š±ŠµŃŠæŠµŃŠµŠ½ŠøŃ конŃŃŠ¾Š»Š»ŠµŃов Intel Ethernet ŃŠµŃŠøŠø E810, ŃŠ²Ńзанна⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01833 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠµŃ нологий Intel Active Management Technology (AMT) Šø Intel Standard Manageabi⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01832 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠµŃ нологий Intel Active Management Technology (AMT) Šø Intel Standard Manageabi⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01831 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠµŃ нологий Intel Active Management Technology (AMT) Šø Intel Standard Manageabi⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01830 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° File input Š±ŃŠ°ŃŠ·ŠµŃŠ° Google Chrome, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń Š¾ŃŃŃŠµŃŃŠ²Šøā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01829 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° PictureInPicture Š±ŃŠ°ŃŠ·ŠµŃŠ° Google Chrome, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń Š¾ŠŗŠ°ā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01828 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° Animation Š±ŃŠ°ŃŠ·ŠµŃŠ° Google Chrome, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń Š¾ŠŗŠ°Š·Š°ŃŃ Š²Š¾ā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01827 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŃŠ½ŠŗŃŠøŠø ŠŗŠ¾Š½ŃŠøŠ“ŠµŠ½ŃŠøŠ°Š»ŃноŃŃŠø Fenced Frames Š±ŃŠ°ŃŠ·ŠµŃŠ° Google Chrome, позволŃŃŃŠ°Ń н⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01826 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° WebGPU Š±ŃŠ°ŃŠ·ŠµŃŠ° Google Chrome, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń Š²ŃŠ·Š²Š°ŃŃ Š¾ŃŠŗŠ°Š·ā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01825 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммной плаŃŃŠ¾ŃŠ¼Ń Š½Š° базе git Š“Š»Ń ŃŠ¾Š²Š¼ŠµŃŃŠ½Š¾Š¹ ŃŠ°Š±Š¾ŃŃ Š½Š°Š“ коГом GitLab, ŃŠ²Ńз⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01824 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммной плаŃŃŠ¾ŃŠ¼Ń Š½Š° базе git Š“Š»Ń ŃŠ¾Š²Š¼ŠµŃŃŠ½Š¾Š¹ ŃŠ°Š±Š¾ŃŃ Š½Š°Š“ коГом GitLab, ŃŠ²Ńз⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01823 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŃŠ½ŠŗŃŠøŠø Š¼ŠµŠ¶ŃŠµŃевŃŃ ŃŠŗŃанов SSL-VPN Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Fortinet FortiOS, позво⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01822 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Fortinet FortiOS, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń Š½ŠµŠ“Š¾ŃŃŠ°ŃŠ¾ŃŠ½Š¾Š¹ ŠæŃŠ¾Š²ŠµŃкой ŠøŃŃŠ¾ā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01821 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŃŠ½ŠŗŃŠøŠø Š¼ŠµŠ¶ŃŠµŃевŃŃ ŃŠŗŃанов SSL-VPN Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Fortinet FortiOS, позво⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01820 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠøŠ½ŃŠµŃŃŠµŠ¹Ńа команГной ŃŃŃŠ¾ŠŗŠø Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Fortinet FortiOS, позволŃŃŃŠ°Ń ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01819 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š³ŃŠ°ŃŠøŃŠµŃкого ŠæŠ¾Š»ŃŠ·Š¾Š²Š°ŃелŃŃŠŗŠ¾Š³Š¾ ŠøŠ½ŃŠµŃŃŠµŠ¹Ńа Š¾ŠæŠµŃаŃионнŃŃ ŃŠøŃŃŠµŠ¼ Fortinet FortiOS⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01818 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммного Š¾Š±ŠµŃŠæŠµŃŠµŠ½ŠøŃ Š“Š»Ń ŃŠ°Š·ŃŠ°Š±Š¾ŃŠŗŠø 3D-моГелей Autodesk Fusion, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń ā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01817 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммного Š¾Š±ŠµŃŠæŠµŃŠµŠ½ŠøŃ Š“Š»Ń ŃŠ°Š·ŃŠ°Š±Š¾ŃŠŗŠø 3D-моГелей Autodesk Fusion, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń ā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01816 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммного Š¾Š±ŠµŃŠæŠµŃŠµŠ½ŠøŃ Š“Š»Ń ŃŠ°Š·ŃŠ°Š±Š¾ŃŠŗŠø 3D-моГелей Autodesk Fusion, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń ā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01815 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммного Š¾Š±ŠµŃŠæŠµŃŠµŠ½ŠøŃ Microsoft ACI Confidential Containers, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń Š½Šµā¦ | 16.02.2026 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200607-0396 | Multiple stack-based buffer overflows in eIQnetworks Enterprise Security Analyzer (ESA) b⦠| 2026-04-11T00:11:09.115000Z |
| var-201112-0173 | The default configuration of the HP CM8060 Color MFP with Edgeline; Color LaserJet 3xxx, ⦠| 2026-04-11T00:10:01.483000Z |
| var-201109-0089 | Multiple unspecified vulnerabilities in Cisco Unified Service Monitor before 8.6, as used⦠| 2026-04-11T00:09:36.192000Z |
| var-202603-3180 | Tenda i24V3.0si V3.0.0.5 Firmware V3.0.0.5 was discovered to contain a hardcoded password⦠| 2026-04-11T00:08:48.958000Z |
| var-201011-0225 | Multiple stack-based buffer overflows in agent.exe in Setup Manager in Cisco Intelligent ⦠| 2026-04-11T00:05:29.625000Z |
| var-201507-0645 | D-Link is an internationally renowned provider of network equipment and solutions, includ⦠| 2026-04-11T00:04:01.946000Z |
| var-201807-0341 | ABB Panel Builder 800 all versions has an improper input validation vulnerability which m⦠| 2026-04-11T00:03:30.310000Z |
| var-201103-0371 | SAP Crystal Reports Server is a complete reporting solution for creating, managing, and d⦠| 2026-04-11T00:02:24.048000Z |
| var-201702-0423 | An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft⦠| 2026-04-11T00:02:20.323000Z |
| var-201803-1810 | A Stack-based Buffer Overflow issue was discovered in Delta Electronics Delta Industrial ⦠| 2026-04-11T00:02:19.122000Z |
| var-202212-0564 | Mikrotik RouterOs before stable v7.6 was discovered to contain an out-of-bounds read in t⦠| 2026-04-11T00:02:14.203000Z |
| var-202604-0419 | A security flaw has been discovered in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-3⦠| 2026-04-11T00:02:03.907000Z |
| var-202604-0545 | A weakness has been identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, ⦠| 2026-04-11T00:02:03.860000Z |
| var-201810-0396 | Advantech WebAccess 8.3.1 and earlier has several stack-based buffer overflow vulnerabili⦠| 2026-04-11T00:00:09.308000Z |
| var-200202-0006 | Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause⦠| 2026-04-10T23:59:45.929000Z |
| var-201809-0087 | WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vul⦠| 2026-04-10T23:58:29.472000Z |
| var-202001-0832 | A Buffer Overflow vulnerability exists in the Message Server service _MsJ2EE_AddStatistic⦠| 2026-04-10T23:58:28.008000Z |
| var-202001-0833 | A Denial of Service vulnerability exists in the WRITE_C function in the msg_server.exe mo⦠| 2026-04-10T23:58:27.923000Z |
| var-201208-0222 | Multiple stack-based buffer overflows in msg_server.exe in SAP NetWeaver ABAP 7.x allow r⦠| 2026-04-10T23:58:27.850000Z |
| var-201105-0156 | Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 30⦠| 2026-04-10T23:54:41.678000Z |
| var-201402-0028 | The process_rs function in the router advertisement daemon (radvd) before 1.8.2, when Uni⦠| 2026-04-10T23:54:21.837000Z |
| var-201402-0027 | The process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows re⦠| 2026-04-10T23:54:21.783000Z |
| var-201402-0026 | Buffer overflow in the process_ra function in the router advertisement daemon (radvd) bef⦠| 2026-04-10T23:54:21.723000Z |
| var-202407-0233 | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data ⦠| 2026-04-10T23:53:35.760000Z |
| var-201806-1058 | Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices befo⦠| 2026-04-10T23:52:22.797000Z |
| var-202005-0008 | Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buf⦠| 2026-04-10T23:52:18.503000Z |
| var-202206-2050 | The affected product is vulnerable to multiple SQL injections, which may allow an unautho⦠| 2026-04-10T23:52:15.611000Z |
| var-202603-4092 | Tenda G1V3.1si V16.01.7.8 Firmware V16.01.7.8 was discovered to contain a hardcoded passw⦠| 2026-04-10T23:52:08.488000Z |
| var-201112-0297 | Multiple cross-site scripting (XSS) vulnerabilities in the Virus Scan Interface in SAP Ne⦠| 2026-04-10T23:51:14.155000Z |
| var-201904-0181 | Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow⦠| 2026-04-10T23:50:53.514000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-028 | Draeger: ICMHelper is vulnerable to a privilege escalation | 2025-08-05T10:00:00.000Z | 2026-01-06T11:00:00.000Z |
| vde-2019-012 | TECSON/GOK: Improper Authentication and Access Control on multiple devices | 2019-06-04T13:21:00.000Z | 2025-05-14T13:00:14.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-104 | Phoenix Contact: Multiple Vulnerabilities in FL SWITCH 2xxx, FL SWITCH TSN 23xx and FL SWITCH 59xx Firmware | 2026-03-18T08:00:00.000Z | 2026-03-18T08:00:00.000Z |
| vde-2025-109 | Phoenix Contact: Unbounded growth of the session cache in TCP encapsulation service in FL MGUARD 2xxx and 4xxx firmware | 2026-02-10T08:00:00.000Z | 2026-02-23T14:00:00.000Z |
| vde-2025-073 | Phoenix Contact: Security Advisory for TC ROUTER and CLOUD CLIENT Industrial mobile network routers | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| vde-2025-071 | Phoenix Contact: Multiple Vulnerabilities in FL SWITCH 2xxx Firmware | 2025-12-09T08:00:00.000Z | 2026-01-12T08:00:00.000Z |
| vde-2025-074 | Phoenix Contact: Security Advisory for CHARX SEC-3xxx charging controllers | 2025-10-14T10:00:00.000Z | 2025-10-15T10:00:00.000Z |
| vde-2025-072 | Phoenix Contact: Security Advisory for QUINT4-UPS EIP | 2025-10-14T06:00:00.000Z | 2025-10-14T06:00:00.000Z |
| vde-2025-077 | Phoenix Contact: Two vulnerabilities in the jq JSON processor utilized by FL MGUARD 110x devices | 2025-09-09T10:00:00.000Z | 2025-09-09T10:00:00.000Z |
| vde-2025-064 | Phoenix Contact: Products utilizing WIBU-SYSTEMS CodeMeter Runtime Windows Installer have a privilege escalation | 2025-09-09T07:00:00.000Z | 2025-09-09T07:00:00.000Z |
| vde-2025-063 | Phoenix Contact: Device and Update Management Windows Installer Privilege Escalation | 2025-08-12T10:00:00.000Z | 2025-08-12T10:00:00.000Z |
| vde-2025-054 | Phoenix Contact: Multiple Vulnerabilities in PLCnext Firmware | 2025-07-08T10:00:00.000Z | 2025-07-08T10:00:00.000Z |
| vde-2025-053 | Phoenix Contact: Multiple Vulnerabilities in PLCnext Firmware | 2025-07-08T10:00:00.000Z | 2025-07-08T10:00:00.000Z |
| vde-2025-019 | Phoenix Contact: Security Advisory for CHARX SEC-3xxx charging controllers | 2025-07-08T10:00:00.000Z | 2025-07-22T08:00:00.000Z |
| vde-2025-014 | Phoenix Contact: Security Advisory for CHARX SEC-3xxx charging controllers | 2025-07-08T10:00:00.000Z | 2025-07-08T10:00:00.000Z |
| vde-2025-029 | Phoenix Contact: Security Advisory for AXL F BK and IL BK bus couplers | 2025-05-13T09:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2025-005 | Phoenix Contact: Security Advisory for ESL Stick USB-A | 2025-01-14T11:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2024-070 | Phoenix Contact: Security Advisory for CHARX-SEC3xxx Charge controllers | 2025-01-14T11:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2024-073 | Phoenix Contact: Multiple Vulnerabilities in PLCnext Firmware | 2024-12-09T11:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2024-071 | Phoenix Contact: Multiple Vulnerabilities in PLCnext Firmware | 2024-12-09T11:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2024-067 | Phoenix Contact: Multiple Vulnerabilities in PLCnext Engineer | 2024-10-08T12:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2024-052 | Phoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptors. | 2024-09-10T10:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2024-051 | Phoenix Contact: Multiple mGuard devices are vulnerable to a remote code injection due to SSH | 2024-09-10T10:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2024-039 | Phoenix Contact: Multiple Vulnerabilities in mGuard devices | 2024-09-10T10:00:00.000Z | 2025-08-27T10:00:00.000Z |
| vde-2024-022 | Phoenix Contact: Security Advisory for CHARX-SEC3xxx Charge controllers | 2024-08-13T10:00:00.000Z | 2025-08-27T10:00:00.000Z |
| vde-2024-029 | Phoenix Contact: Unbounded growth of OpenSSL session cache in multiple FL MGUARD devices | 2024-06-11T06:00:00.000Z | 2024-06-11T06:00:00.000Z |
| vde-2024-019 | Phoenix Contact: Multiple vulnerabilities in the Firmware of CHARX SEC charge controllers | 2024-05-14T06:00:00.000Z | 2024-05-14T06:00:00.000Z |
| vde-2024-011 | PHOENIX CONTACT: Multiple vulnerabilities in CHARX SEC charge controllers | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| vde-2023-058 | Phoenix Contact: PLCnext Control prone to download of code without integrity check | 2023-12-12T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-057 | Phoenix Contact: Classic line industrial controllers prone to inadequate integrity check of PLC | 2023-12-12T07:00:00.000Z | 2025-06-05T13:28:12.000Z |
| vde-2023-056 | Phoenix Contact: PLCnext prone to Incorrect Permission Assignment for Critical Resource | 2023-12-12T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-055 | Phoenix Contact: Automation Worx and classic line controllers prone to Incorrect Permission Assignment for Critical Resource | 2023-12-12T07:00:00.000Z | 2023-12-12T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-085 | Welotec: Path Traversal in SmartEMS Upload Handling | 2025-09-10T07:00:00.000Z | 2025-09-22T08:00:00.000Z |
| vde-2025-076 | Welotec: Hard-coded JWT secret in egOS WebGUI | 2025-08-26T07:00:00.000Z | 2025-08-26T07:00:00.000Z |
| vde-2024-043 | Welotec: Multiple products are vulnerable to regreSSHion | 2024-08-22T06:00:00.000Z | 2024-08-22T06:00:00.000Z |
| vde-2024-023 | Welotec: Clickjacking Vulnerability in WebUI | 2024-04-23T08:00:00.000Z | 2024-04-23T08:00:00.000Z |
| vde-2024-009 | Welotec: Two vulnerabilities in TK500v1 router series | 2024-04-09T08:00:00.000Z | 2025-05-14T12:28:19.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| advisory2026-03_vde-2026-018 | CODESYS Control V3 - Externally-controlled format string in Auditlog | 2026-03-24T08:00:00.000Z | 2026-03-24T08:00:00.000Z |
| advisory2026-02_vde-2026-011 | CODESYS Control V3 - Untrusted boot application | 2026-03-24T08:00:00.000Z | 2026-03-24T08:00:00.000Z |
| advisory2026-01_vde-2026-012 | CODESYS Installer - Possible Privilege Escalation | 2026-03-10T10:00:00.000Z | 2026-03-10T10:00:00.000Z |
| advisory2025-09_vde-2025-099 | CODESYS Control - Linux/QNX SysSocket flaw | 2025-12-01T11:00:00.000Z | 2026-02-12T11:00:00.000Z |
| advisory2025-11_vde-2025-101 | CODESYS Development System - Deserialization of Untrusted Data | 2025-12-01T10:00:00.000Z | 2025-12-01T10:00:00.000Z |
| advisory2025-10_vde-2025-100 | CODESYS Control - Invalid type usage in visualization | 2025-12-01T10:00:00.000Z | 2026-02-12T11:00:00.000Z |
| advisory2025-07_vde-2025-051 | CODESYS Control V3 - Exposed PKI folder | 2025-08-04T10:00:00.000Z | 2025-09-01T10:00:00.000Z |
| advisory2025-06_vde-2025-049 | CODESYS Control V3 - Insecure default permissions | 2025-08-04T10:00:00.000Z | 2025-08-04T10:00:00.000Z |
| advisory2025-08_vde-2025-070 | CODESYS Control V3 - NULL pointer dereference | 2025-08-04T08:00:00.000Z | 2025-10-14T08:00:00.000Z |
| advisory2025-05_vde-2025-027 | CODESYS Visualization user management bypass in WebVisu | 2025-04-23T10:00:00.000Z | 2025-04-23T10:00:00.000Z |
| advisory2025-04_vde-2025-022 | CODESYS Control V3 - OPC UA Server Authentication bypass | 2025-03-18T11:00:00.000Z | 2025-06-05T13:31:01.000Z |
| advisory2025-03_vde-2025-015 | CODESYS Control V3 removable media path traversal | 2025-03-18T11:00:00.000Z | 2025-06-05T13:31:01.000Z |
| advisory2025-02_vde-2025-013 | CODESYS (Edge) Gateway for Windows insecure default | 2025-03-18T11:00:00.000Z | 2025-06-05T13:31:01.000Z |
| advisory2025-01_vde-2025-001 | CODESYS Key physical side-channel vulnerability | 2025-01-21T11:00:00.000Z | 2025-06-05T13:31:01.000Z |
| advisory2024-05_vde-2024-057 | CODESYS: CODESYS web server vulnerable to DoS | 2024-09-25T21:59:00.000Z | 2025-04-03T10:00:00.000Z |
| vde-2024-046 | OSCAT: Out-of-bounds read in OSCAT Basic library | 2024-09-10T14:00:00.000Z | 2024-09-10T14:00:00.000Z |
| vde-2024-026 | CODESYS: Vulnerability can cause a DoS on CODESYS OPC UA products | 2024-06-04T08:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2024-027 | CODESYS: Vulnerability in multiple products through exposure of resource to wrong sphere | 2024-06-04T06:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2024-024 | CODESYS: Development System V2.3 affected by two vulnerabilities through corrupted project files | 2024-05-06T08:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2023-066 | CODESYS: OS Command Injection Vulnerability in multiple CODESYS Control products | 2023-12-05T14:25:00.000Z | 2023-12-05T14:25:00.000Z |
| vde-2023-035 | CODESYS: Multiple products affected by WIBU Codemeter vulnerability | 2023-12-05T07:00:00.000Z | 2023-12-05T07:00:00.000Z |
| vde-2023-025 | CODESYS: Control runtime system memory and integrity check vulnerabilities | 2023-08-03T11:18:00.000Z | 2023-08-03T11:18:00.000Z |
| vde-2023-023 | CODESYS: Missing Brute-Force protection in CODESYS Development System | 2023-08-03T11:08:00.000Z | 2023-08-03T11:08:00.000Z |
| vde-2023-022 | CODESYS: Missing integrity check in CODESYS Development System | 2023-08-03T10:52:00.000Z | 2023-08-03T10:52:00.000Z |
| vde-2023-021 | CODESYS: Vulnerability in CODESYS Development System allows execution of binaries | 2023-08-03T10:48:00.000Z | 2023-08-03T10:48:00.000Z |
| vde-2023-019 | CODESYS: Multiple Vulnerabilities in CmpApp CmpAppBP and CmpAppForce | 2023-08-03T10:42:00.000Z | 2023-08-03T10:42:00.000Z |
| vde-2023-024 | CODESYS: Vulnerability in CODESYS Development System and CODESYS Scripting | 2023-07-28T07:45:00.000Z | 2023-07-28T07:45:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-067 | Wiesemann & Theis: Motherbox 3 allows unauthenticated read-only DB access | 2025-08-10T10:00:00.000Z | 2025-08-25T10:00:00.000Z |
| vde-2025-024 | Wiesemann & Theis: Multiple products from Wiesemann & Theis support deprecated jQuery version | 2025-05-13T10:00:00.000Z | 2025-05-13T10:00:00.000Z |
| vde-2025-032 | Wiesemann & Theis: Multiple W&T Products are vulnerable to cross-site-scripting | 2025-05-06T10:00:00.000Z | 2025-05-06T10:00:00.000Z |
| vde-2025-031 | Wiesemann & Theis: Multiple products from Wiesemann & Theis support deprecated TLS protocol versions | 2025-04-28T10:00:00.000Z | 2025-04-28T10:00:00.000Z |
| vde-2024-018 | Wiesemann & Theis: Multiple products prone to unquoted search path | 2024-02-28T07:00:00.000Z | 2025-05-14T12:36:39.000Z |
| vde-2022-057 | Wiesemann & Theis multiple products prone to web interface vulnerability | 2022-12-13T07:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2022-043 | Wiesemann & Theis: Multiple Vulnerabilities in the Com-Server Family | 2022-11-07T11:43:00.000Z | 2022-11-07T12:14:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2026-030 | MB connect line: Multiple Vulnerabilities in mbCONNECT24/mymbCONNECT24 | 2026-04-02T11:00:00.000Z | 2026-04-02T11:00:00.000Z |
| vde-2026-024 | MB connect line: Multiple Vulnerabilities in mbCONNECT24/mymbCONNECT24 | 2026-03-23T12:00:00.000Z | 2026-03-23T12:00:00.000Z |
| vde-2025-065 | MB connect line: Sandbox escape in mbNET's LUA interpreter | 2025-07-31T10:00:00.000Z | 2025-07-31T10:00:00.000Z |
| vde-2025-058 | MB connect line: Multiple vulnerabilities in mbNET.mini | 2025-07-21T10:00:00.000Z | 2025-07-21T10:00:00.000Z |
| vde-2025-035 | Vulnerabilities in mbCONNECT24/mymbCONNECT24 | 2025-06-24T10:00:00.000Z | 2025-06-24T10:00:00.000Z |
| vde-2025-034 | Vulnerabilities in mbCONNECT24/mymbCONNECT24 | 2025-06-24T10:00:00.000Z | 2025-06-24T10:00:00.000Z |
| vde-2024-010 | Vulnerabilities in mbCONNECT24/mymbCONNECT24 | 2025-03-18T11:00:00.000Z | 2025-08-27T10:00:00.000Z |
| vde-2024-068 | MB connect line: Multiple Vulnerabilities in MB connect line Products | 2024-10-15T08:00:00.000Z | 2026-03-06T08:00:00.000Z |
| vde-2024-056 | MB connect line: Multiple Vulnerabilities in mbNET.mini Product | 2024-10-15T08:00:00.000Z | 2025-08-27T10:00:00.000Z |
| vde-2024-030 | MB connect line: mbNET.mini vulnerable to OS command injection | 2024-07-03T09:00:00.000Z | 2024-07-03T09:00:00.000Z |
| vde-2023-041 | MB connect line: Vulnerability allows access to non-critical information in mbCONNECT24 and mymbCONNECT24 | 2023-10-16T08:38:00.000Z | 2023-10-16T08:38:00.000Z |
| vde-2024-042 | MB connect line: Multiple products are vulnerable to regreSSHion | 2023-08-17T12:00:00.000Z | 2023-08-17T12:00:00.000Z |
| vde-2023-012 | MB connect line: Cross-site Scripting vulnerability in mbNET/mbNET.rokey | 2023-08-17T12:00:00.000Z | 2023-08-17T12:00:00.000Z |
| vde-2023-002 | MB Connect Line: Multiple vulnerabilities in mbConnect24 and mymbConnect24 | 2023-05-15T14:06:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2022-011 | MB connect line: Unauthenticated user enumeration in mbCONNECT24 and mymbCONNECT24 | 2022-09-07T12:50:00.000Z | 2022-09-07T12:50:00.000Z |
| vde-2021-030 | MB connect line: two vulnerabilities in mymbCONNECT24, mbCONNECT24 (Update A) | 2022-09-07T10:48:00.000Z | 2025-06-06T07:00:00.000Z |
| vde-2021-003 | MB connect line: Multiple vulnerabilites in mymbCONNECT24 and mbCONNECT24 (Update A) | 2022-09-07T10:46:00.000Z | 2022-09-07T10:46:00.000Z |
| vde-2021-037 | MB connect line: Remote user enumeration in mbCONNECT24/mymbCONNECT24 | 2021-10-27T10:15:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-017 | MB connect line: Privilege escalation in mbDIALUP | 2021-07-22T11:35:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-031 | MB connect line: Apache Guacamole related vulnerabilities in mbCONNECT24 | 2021-07-22T11:33:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-012 | MB connect line: multiple products partially affected by DNSpooq | 2021-04-26T08:04:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-035 | MB connect line: Multiple Vulnerabilities in mymbCONNECT24 and mbCONNECT24 <= v2.6.1 | 2020-09-18T12:30:00.000Z | 2025-05-14T12:28:19.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2026-043 | Helmholz: Multiple Vulnerabilities in myREX24V2/myREX24V2.virtual | 2026-04-13T11:00:00.000Z | 2026-04-13T11:00:00.000Z |
| vde-2026-013 | Helmholz: Use of a Broken or Risky Cryptographic Algorithm | 2026-04-07T08:00:00.000Z | 2026-04-07T08:00:00.000Z |
| vde-2026-025 | Helmholz: Multiple Vulnerabilities in myREX24V2 / myREX24V2.virtual | 2026-03-23T12:00:00.000Z | 2026-03-23T12:00:00.000Z |
| vde-2025-069 | Helmholz: Sandbox escape in REX200/250 LUA interpreter | 2025-07-31T10:00:00.000Z | 2025-07-31T10:00:00.000Z |
| vde-2025-059 | Helmholz: Multiple vulnerabilities in REX 100 | 2025-07-21T10:00:00.000Z | 2025-07-21T10:00:00.000Z |
| vde-2025-038 | Vulnerabilities in myREX24/myREX24.virtual | 2025-06-24T10:00:00.000Z | 2025-06-24T10:00:00.000Z |
| vde-2025-037 | Vulnerabilities in myREX24/myREX24.virtual | 2025-06-24T10:00:00.000Z | 2025-06-24T10:00:00.000Z |
| vde-2024-031 | Helmholz: Vulnerabilities in myREX24 V2/myREX24.virtual | 2025-03-18T11:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2024-069 | Helmholz: Multiple Vulnerabilities in Helmholz products | 2024-10-15T08:00:00.000Z | 2026-03-06T08:00:00.000Z |
| vde-2024-066 | Helmholz: Multiple Vulnerabilities in Helmholz REX100 Product | 2024-10-15T08:00:00.000Z | 2025-08-27T10:00:00.000Z |
| vde-2024-044 | Helmholz: Multiple products are vulnerable to regreSSHion | 2024-07-31T08:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2024-032 | Helmholz: REX 100 vulnerable to OS command injection | 2024-07-03T09:00:00.000Z | 2024-07-03T13:33:00.000Z |
| vde-2023-043 | Helmholz: Vulnerability allows access to non-critical information in myREX24 and myREX24.virtual | 2023-10-16T08:38:00.000Z | 2023-10-16T08:38:00.000Z |
| vde-2023-029 | Helmholz: Cross-site Scripting vulnerability in REX 200/REX 250 | 2023-08-17T12:00:00.000Z | 2023-08-17T12:00:00.000Z |
| vde-2023-008 | Helmholz: Multiple vulnerabilites in myREX24 and myREX24.virtual | 2023-05-15T12:06:00.000Z | 2023-05-15T12:06:00.000Z |
| vde-2022-017 | Helmholz: Unauthenticated user enumeration in myREX24 and myREX24.virtual | 2022-09-07T12:54:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2022-039 | Helmholz: Multiple vulnerabilites in myREX24 and myREX24.virtual | 2022-09-07T10:56:00.000Z | 2022-09-07T10:56:00.000Z |
| vde-2021-058 | Helmholz: Remote user enumeration in myREX24/myREX24-virtual | 2021-12-08T13:04:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-057 | Helmholz: Privilege Escalation in shDialup (Update A) | 2021-03-28T13:03:00.000Z | 2025-05-14T13:00:15.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fsa-202601 | Several CODESYS vulnerabilities in Festo Automation Suite | 2026-02-26T08:00:00.000Z | 2026-02-26T08:00:00.000Z |
| fsa-202406 | Several Codesys Gateway v2 vulnerabilities in Codesys provided by Festo | 2024-12-03T11:00:00.000Z | 2024-12-03T14:00:00.000Z |
| fsa-202405 | Festo: Siemens S7-1500/ET200SP CPU used in Festo Didactic products contains a memory protection bypass vulnerability | 2024-09-09T07:00:00.000Z | 2025-11-05T08:00:00.000Z |
| fsa-202402 | Several Vulnerabilities in MES PC (Windows 10) | 2024-02-27T12:00:00.000Z | 2025-12-08T07:00:00.000Z |
| fsa-202401 | Festo: Multiple products contain CoDe16 vulnerability | 2024-01-30T07:00:00.000Z | 2025-11-04T11:00:00.000Z |
| fsa-202305 | Festo: Vulnerable WIBU-SYSTEMS CodeMeter Runtime in several products | 2023-11-28T07:00:00.000Z | 2025-05-13T10:00:00.000Z |
| fsa-202303 | Festo: Vulnerable Siemens TIA-Portal in multiple Festo Didactic products | 2023-10-17T06:00:00.000Z | 2025-10-01T06:00:00.000Z |
| fsa-202304 | Festo: MSE6-C2M/D2M/E2M Incomplete User Documentation of Remote Accessible Functions | 2023-09-05T10:00:00.000Z | 2025-10-01T10:00:00.000Z |
| fsa-202301 | Festo: Cross-Site-Scripting (XSS) vulnerability in LX-Appliance | 2023-08-29T10:00:00.000Z | 2025-10-01T10:00:00.000Z |
| fsa-202302 | Festo: Several vulnerabilities in FactoryViews | 2023-07-10T10:00:00.000Z | 2026-02-02T08:00:00.000Z |
| fsa-202206 | Festo: Vulnerable WIBU-SYSTEMS CodeMeter Runtime in multiple products | 2022-12-13T11:50:00.000Z | 2025-10-01T10:50:00.000Z |
| fsa-202209 | Festo: Incomplete documentation of remote accessible functions and protocols in Festo products | 2022-11-29T11:49:00.000Z | 2025-11-03T10:00:00.000Z |
| fsa-202208 | Festo: Multiple Festo products contain an unsafe default Codesys configuration | 2022-11-29T11:41:00.000Z | 2025-10-28T11:00:00.000Z |
| fsa-202207 | Festo: CPX-CEC-C1 and CPX-CMXX, Missing Authentication for Critical Webpage Function | 2022-09-20T10:00:00.000Z | 2025-07-28T10:00:00.000Z |
| fsa-202203 | Festo: Controller CECC-S,LK,D family firmware 2.4.2.0 - multiple vulnerabilities in CODESYS V3 runtime system | 2022-07-18T10:00:00.000Z | 2025-07-10T10:00:00.000Z |
| fsa-202202 | Festo: Controller CECC-S,LK,D family <= 2.3.8.1 - multiple vulnerabilities in CODESYS V3 runtime system | 2022-07-18T10:00:00.000Z | 2025-11-03T11:00:00.000Z |
| fsa-202201 | Festo: CECC-X-M1 - command injection vulnerabilities | 2022-07-06T07:00:00.000Z | 2025-06-23T08:00:00.000Z |
| fsa-202101 | Festo: Multiple vulnerabilities in Ethernet/IP Stack of SBRD-Q/SBOC-Q/SBOI-Q | 2021-09-22T11:13:00.000Z | 2025-08-26T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-011 | PEPPERL+FUCHS: Profinet Gateway LB8122A.1.EL ā Device is affected by XSS vulnerability and information disclosure | 2025-05-26T10:00:00.000Z | 2025-08-27T10:00:00.000Z |
| vde-2025-002 | PEPPERL+FUCHS: HMI ā devices are affected by Windows RCE | 2025-02-25T11:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2024-065 | PEPPERL+FUCHS: HMI devices are affected by Insecure Platform Key | 2024-11-26T11:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2024-063 | PEPPERL+FUCHS: Multiple products are affected by regreSSHion | 2024-10-08T12:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2024-033 | PEPPERL+FUCHS: Device Master ICDM-RX/* ā Vulnerability may allow unauthenticated remote attacker information disclosure and denial of service | 2024-08-13T12:00:00.000Z | 2025-05-14T14:34:17.000Z |
| vde-2024-038 | Pepperl+Fuchs: Anonymous FTP server and Telnet access allows information disclosure and manipulation | 2024-07-10T06:00:00.000Z | 2025-08-27T10:00:00.000Z |
| vde-2024-037 | Pepperl+Fuchs: Use after free vulnerability in Smart-Ex 02 and Smart-Ex 03 | 2024-07-10T06:00:00.000Z | 2024-07-10T06:00:00.000Z |
| vde-2024-017 | Pepperl+Fuchs: ICE2- * and ICE3- * are affected by multiple vulnerabilities | 2024-04-10T06:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-021 | Pepperl+Fuchs: RSM-EX devices - Multiple Bluetooth vulnerabilities | 2022-05-16T14:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-012 | Pepperl+Fuchs: Vulnerability in multiple VisuNet devices | 2022-04-26T12:00:00.000Z | 2022-05-16T14:15:00.000Z |
| vde-2021-006 | Pepperl+Fuchs: Multiple Products - Vulnerability may allow remote attackers to cause a Denial Of Service | 2021-11-16T14:53:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2021-041 | Pepperl+Fuchs: Multiple DTM and VisuNet Software affected by log4net vulnerability | 2021-10-26T13:35:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-027 | Pepperl+Fuchs: WirelessHART-Gateway - Vulnerability may allow remote attackers to cause a Denial Of Service | 2021-10-16T12:00:00.001Z | 2025-05-14T13:00:14.000Z |
| vde-2021-028 | Pepperl+Fuchs: Multiple VDM100-Distance Ethernet-IP sensors with multiple vulnerabilities | 2021-08-16T12:01:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-034 | Pepperl+Fuchs: Security Advisory for PrintNightmare Vulnerability in multiple HMI Devices | 2021-07-30T07:55:00.000Z | 2021-07-30T07:55:00.000Z |
| vde-2021-018 | Pepperl+Fuchs: Multiple vulnerabilites in ICE1 Ethernet IO Modules | 2021-05-12T08:57:00.000Z | 2021-05-12T08:57:00.000Z |
| vde-2020-053 | Pepperl+Fuchs: Comtrol RocketLinx ICRL-M - Multiple Vulnerabilities | 2021-03-08T13:44:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-007 | Pepperl+Fuchs: Multiple Products - Vulnerability may allow remote attackers to cause a Denial Of Service | 2021-02-16T14:53:00.000Z | 2025-05-14T12:53:43.000Z |
| vde-2020-050 | Pepperl+Fuchs: Multiple Products - Vulnerability may allow remote attackers to cause a Denial Of Service | 2021-02-15T13:33:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2021-001 | Pepperl+Fuchs: Vulnerability allowing code-excution in PACTware <=5.0.5.31 | 2021-01-15T12:41:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-038 | Pepperl+Fuchs: Multiple vulnerabilites in Comtrol IO-Link Master | 2021-01-04T13:01:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-040 | Pepperl+Fuchs: Multiple Products prone to multiple vulnerabilities in Comtrol RocketLinux | 2020-10-05T12:00:00.000Z | 2020-10-05T12:00:00.000Z |
| vde-2020-034 | Pepperl+Fuchs: VMT MSS and VMT IS - Several vulnerabilities in products utilizing WIBU-SYSTEMS CodeMeter components | 2020-09-10T13:22:00.000Z | 2020-09-10T13:22:00.000Z |
| vde-2020-017 | Pepperl+Fuchs, PACTware: Two password vulnerabilities found | 2020-05-29T10:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-014 | Pepperl+Fuchs: Kr00k vulnerabilities in Broadcom Wi-Fi chipsets | 2020-03-31T13:30:00.000Z | 2025-05-14T14:34:17.000Z |
| vde-2019-011 | Pepperl+Fuchs: Remote code execution vulnerability in HMI devices | 2019-05-29T07:35:00.000Z | 2019-10-07T10:00:00.000Z |
| vde-2019-004 | Pepperl+Fuchs: ecom Mobile Devices prone to BlueBorne Attack | 2019-03-14T07:52:00.000Z | 2019-03-14T07:52:00.000Z |
| vde-2019-002 | Pepperl+Fuchs: Path traversal in WirelessHART Gateway | 2019-03-06T10:35:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2018-016 | Pepperl+Fuchs: ecom Mobile devices prone to Android privilege elevation vulnerability | 2018-10-19T10:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2018-009 | Pepperl+Fuchs: Security advisory for MELTDOWN and SPECTRE attacks in ecom mobile Devices | 2018-07-06T14:47:00.000Z | 2018-10-23T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ppsa-2026-001 | Pilz: Multiple Vulnerabilities affecting the PIT User Authentication Service | 2026-02-02T08:00:00.000Z | 2026-02-02T10:00:00.000Z |
| ppsa-2025-004 | Pilz: Vulnerability affecting PASvisu Runtime | 2025-10-20T10:00:00.000Z | 2025-10-20T10:00:00.000Z |
| ppsa-2025-003 | Pilz: Authentication Bypass in IndustrialPI Webstatus | 2025-07-01T10:00:00.000Z | 2025-07-01T10:00:00.000Z |
| ppsa-2025-002 | Pilz: Missing Authentication in Node-RED integration | 2025-07-01T10:00:00.000Z | 2025-07-01T10:00:00.000Z |
| ppsa-2025-001 | Pilz: Authentication Bypass and Cross-Site-Scripting in PiCtory | 2025-06-30T10:00:00.000Z | 2025-06-30T10:00:00.000Z |
| vde-2024-002 | Pilz: Multiple products affected by uC/HTTP vulnerability | 2024-02-06T07:00:00.000Z | 2024-02-06T07:00:00.000Z |
| vde-2023-050 | Pilz: Vulnerability in PASvisu and PMI v8xx | 2024-01-30T07:00:00.000Z | 2025-04-10T13:00:00.000Z |
| vde-2023-059 | Pilz: Electron Vulnerabilities in PASvisu and PMI v8xx | 2023-12-05T07:06:00.000Z | 2023-12-05T07:06:00.000Z |
| vde-2023-048 | Pilz: Multiple products prone to libwebp vulnerability | 2023-12-05T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-033 | Pilz: WIBU Vulnerabilitiy in multiple Products | 2023-10-12T06:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-045 | Pilz: PAS 4000 prone to ZipSlip | 2022-11-24T09:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-044 | Pilz: Multiple products affected by ZipSlip | 2022-11-24T09:00:00.000Z | 2025-06-05T13:28:13.000Z |
| vde-2022-033 | Pilz: PASvisu and PMI affected by multiple vulnerabilities | 2022-11-24T09:00:00.000Z | 2022-11-24T09:00:00.000Z |
| vde-2021-061 | Pilz: PMC programming tool 3.x.x affected by multiple vulnerabilities | 2022-04-26T10:00:00.000Z | 2022-04-26T10:00:00.000Z |
| vde-2021-055 | Pilz: PMC programming tool 2.x.x affected by multiple vulnerabilities | 2022-04-26T10:00:00.000Z | 2022-04-26T10:00:00.000Z |
| vde-2021-054 | Pilz: Multiple vulnerabilities in CODESYS V2 and V3 runtime system | 2022-04-26T10:00:00.000Z | 2022-04-26T10:00:00.000Z |
| vde-2021-009 | Pilz: Multiple products prone to Niche Ethernet Stack vulnerabilities | 2021-09-20T11:56:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-033 | Pilz: Multiple products prone to WIBU-SYSTEMS CodeMeter vulnerabilities | 2020-09-10T13:18:00.000Z | 2025-05-14T12:28:19.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2024-008 | Wago: Vulnerability in WBM through Open VPN | 2026-04-08T07:00:00.000Z | 2026-04-08T07:00:00.000Z |
| vde-2026-021 | WAGO: Multiple Vulnerabilities in WAGO VC Hub | 2026-03-30T07:00:00.000Z | 2026-03-30T07:00:00.000Z |
| vde-2026-010 | WAGO: Multiple Vulnerabilities in WAGO Solution Builder and WAGO Device Sphere | 2026-03-30T07:00:00.000Z | 2026-03-30T07:00:00.000Z |
| vde-2026-020 | WAGO: Vulnerability in managed switches | 2026-03-23T08:00:00.000Z | 2026-03-23T08:00:00.000Z |
| vde-2026-004 | WAGO: Vulnerabilities in Managed Switch | 2026-02-09T08:00:00.000Z | 2026-02-09T08:00:00.000Z |
| vde-2025-095 | WAGO: Vulnerabilities in WAGO Industrial-Managed Switches | 2025-12-10T10:00:00.000Z | 2026-01-19T08:00:00.000Z |
| vde-2025-062 | WAGO: Multiple Vulnerabilities in CODESYS components | 2025-11-03T11:00:00.000Z | 2025-11-03T11:00:00.000Z |
| vde-2025-087 | WAGO: Vulnerabilities in Device Sphere and Solution Builder | 2025-09-24T09:00:00.000Z | 2025-09-24T09:00:00.000Z |
| vde-2025-083 | WAGO: Vulnerability in hardware switch circuit | 2025-09-15T08:00:00.000Z | 2025-09-15T08:00:00.000Z |
| vde-2025-080 | WAGO: Multiple Vulnerabilities in I/O-Check Service | 2025-09-09T10:00:00.000Z | 2025-09-09T10:00:00.000Z |
| vde-2025-082 | WAGO: Critical sudo Vulnerability in Multiple Products | 2025-09-08T07:00:00.000Z | 2025-09-08T07:00:00.000Z |
| vde-2025-048 | WAGO: Escalation of Privileges in Coupler Firmware | 2025-09-08T07:00:00.000Z | 2025-09-08T07:00:00.000Z |
| vde-2025-057 | WAGO: Vulnerability in WAGO Device Sphere | 2025-06-23T10:00:00.000Z | 2025-07-07T06:15:00.000Z |
| vde-2025-040 | WAGO: Vulnerabilities in ctrlX OS app | 2025-06-16T10:00:00.000Z | 2025-06-16T10:00:00.000Z |
| vde-2025-018 | WAGO: Vulnerabilities in WAGO Device Manager | 2025-06-16T10:00:00.000Z | 2025-11-21T12:00:00.000Z |
| vde-2025-020 | WAGO: Switches affected by year 2k38 problem | 2025-06-02T06:00:00.000Z | 2025-06-02T06:00:00.000Z |
| vde-2025-007 | WAGO: Year 2038 problem | 2025-04-15T10:00:00.000Z | 2025-04-15T10:00:00.000Z |
| vde-2025-004 | Wago: Vulnerability in libwagosnmp | 2025-03-05T11:00:00.000Z | 2025-04-10T13:00:00.000Z |
| vde-2025-009 | WAGO: Vulnerabilities in CODESYS Control V3 - OPC UA Stack | 2025-02-04T11:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2025-008 | WAGO: Vulnerabilities in CODESYS Control | 2025-02-04T11:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2024-072 | WAGO: Vulnerabilities in CODESYS Control | 2024-12-03T11:00:00.000Z | 2024-12-03T11:00:00.000Z |
| vde-2024-047 | WAGO: Multiple vulnerabilities in docker configuration | 2024-11-18T11:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2024-021 | WAGO: Vulnerability in WAGO Navigator | 2024-05-21T06:00:00.000Z | 2024-05-21T06:00:00.000Z |
| vde-2023-068 | WAGO: Multiple Vulnerabilities in e!Cockpit and e!Runtime / CODESYS Runtime | 2024-05-21T06:00:00.000Z | 2024-05-21T06:00:00.000Z |
| vde-2023-039 | Wago: Multiple vulnerabilities in web-based management of multiple products | 2024-03-13T08:30:00.000Z | 2024-03-13T08:30:00.000Z |
| vde-2024-014 | WAGO: Multiple products affected by Terrapin | 2024-02-22T07:00:00.000Z | 2025-06-05T13:28:13.000Z |
| vde-2024-007 | WAGO: WIBU-SYSTEMS CodeMeter Runtime vulnerabilities in multiple products | 2024-01-22T07:00:00.000Z | 2024-01-22T07:00:00.000Z |
| vde-2023-045 | Wago: Vulnerability in Smart Designer Web-Application | 2023-12-05T07:00:00.000Z | 2023-12-05T07:00:00.000Z |
| vde-2023-044 | Wago: Vulnerabilities in IEC61850 Server / Telecontrol | 2023-12-05T07:00:00.000Z | 2023-12-05T07:00:00.000Z |
| vde-2023-037 | WAGO: Remote Code execution vulnerability in managed Switches | 2023-11-21T07:00:00.000Z | 2023-11-21T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2024-061 | ifm: Improper Access Control vulnerability | 2025-06-30T10:00:00.000Z | 2026-02-18T08:00:00.000Z |
| vde-2024-012 | ifm: Vulnerabilities in ifm AC14 firmware | 2024-07-09T07:00:00.000Z | 2026-01-15T11:00:00.000Z |
| vde-2024-028 | ifm moneo password reset can be exploited | 2024-05-06T10:00:00.000Z | 2026-01-15T11:00:00.000Z |
| vde-2022-050 | IFM: weak password recovery vulnerability in moneo appliance | 2022-12-12T11:00:00.000Z | 2026-01-06T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-092 | Beckhoff: Privilege escalation and information leak via Beckhoff Device Manager | 2026-01-27T11:00:00.000Z | 2026-01-27T11:00:00.000Z |
| vde-2025-106 | Beckhoff: XSS Vulnerability in TwinCAT 3 HMI Server | 2026-01-26T10:00:00.000Z | 2026-02-12T09:00:00.000Z |
| vde-2025-075 | Beckhoff: Deserialization of untrusted data by TwinCAT 3 Engineering | 2025-09-09T10:00:00.000Z | 2025-09-09T10:00:00.000Z |
| vde-2024-064 | Beckhoff: Local command injection via TwinCAT Package Manager | 2024-10-31T11:00:00.000Z | 2025-04-11T07:00:00.000Z |
| vde-2021-008 | Beckhoff: Stack Overflow and XXE vulnerability in various OPC UA products | 2024-10-21T08:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2024-050 | Beckhoff: Denial-of-Service vulnerability in the MDP package included in TwinCAT/BSD operating system | 2024-08-27T08:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2024-049 | Beckhoff: Denial-of-Service vulnerability in the IPC-Diagnostics package included in TwinCAT/BSD operating system | 2024-08-27T08:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2024-048 | Beckhoff: Improper neutralization of input in IPC-Diagnostics-www package included in TwinCAT/BSD operating system | 2024-08-27T08:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2024-045 | Beckhoff: Local authentication bypass in IPC-Diagnostics package included in TwinCAT/BSD operating system | 2024-08-27T08:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-067 | Beckhoff: Open redirect in TwinCAT/BSD package authelia-bhf | 2023-12-13T08:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-003 | BECKHOFF: Null Pointer Dereference vulnerability in products with OPC UA technology | 2022-03-01T12:34:00.000Z | 2025-06-05T13:28:13.000Z |
| vde-2021-051 | Beckhoff: Relative path traversal vulnerability through TwinCAT OPC UA Server | 2021-11-04T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-051 | Beckhoff: DoS-Vulnerability for TwinCAT OPC UA Server and IPC Diagnostics UA Server | 2021-04-27T08:08:00.000Z | 2021-05-11T10:00:00.000Z |
| vde-2020-037 | Beckhoff: Privilege Escalation through TwinCat System Tray (TcSysUI.exe) | 2020-11-19T13:41:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-019 | Beckhoff: EtherLeak in TwinCAT RT network driver | 2020-06-16T08:31:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-005 | Beckhoff: BK9000 couplers - Denial of service inhibits function | 2020-03-10T13:17:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2019-019 | Beckhoff: TwinCAT Denial-of-Service in Profinet driver | 2019-10-09T10:00:00.000Z | 2025-05-14T13:00:14.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2026-007 | TRUMPF: Multiple products affected by Wibu CodeMeter vulnerability | 2026-02-23T08:00:00.000Z | 2026-02-23T08:00:00.000Z |
| vde-2025-078 | TRUMPF: Remote support uses an outdated encryption algorithm | 2025-08-25T06:00:00.000Z | 2025-08-29T10:00:00.000Z |
| vde-2024-004 | TRUMPF: Multiple products affected by log4net vulnerability | 2025-04-22T10:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2024-040 | Multiple TRUMPF products prone to regreSSHion OpenSSH server vulnerabilities | 2024-06-25T10:00:00.000Z | 2025-04-10T13:00:00.000Z |
| vde-2024-034 | Multiple TRUMPF products prone to nftables server vulnerabilities | 2024-06-25T10:00:00.000Z | 2025-04-10T13:00:00.000Z |
| vde-2024-001 | TRUMPF: Multiple products contain WIBU CodeMeter vulnerabilities | 2024-01-29T07:00:00.000Z | 2024-01-29T07:00:00.000Z |
| vde-2024-006 | TRUMPF: Oseon contains vulnerable version of OpenSSL 1.1.x | 2024-01-23T07:00:00.000Z | 2024-01-23T07:00:00.000Z |
| vde-2024-005 | TRUMPF: Multiple products contain vulnerable version of 7-zip | 2024-01-23T07:00:00.000Z | 2025-06-05T13:28:12.000Z |
| vde-2024-003 | TRUMPF: Multiple products include a vulnerable version of Notepad++ | 2024-01-23T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-031 | Trumpf: Multiple Products affected by WIBU Codemeter Vulnerability | 2023-09-13T10:00:00.000Z | 2023-11-13T11:00:00.000Z |
| vde-2022-049 | TRUMPF: Multiple products prone to X.Org server vulnerabilities | 2022-11-07T11:43:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-023 | TRUMPF TruTops prone to improper access control | 2022-10-17T10:00:00.000Z | 2022-10-17T10:00:00.000Z |
| vde-2022-034 | TRUMPF: Products prone to Unified Automation vulnerabilities | 2022-08-15T10:00:00.000Z | 2022-08-15T10:00:00.000Z |
| vde-2022-016 | TRUMPF: TruTops Fab, TruTops Boost prone to vulnerability | 2022-05-02T10:00:00.000Z | 2022-05-02T10:00:00.000Z |
| vde-2021-033 | TRUMPF Laser GmbH: multiple products prone to codesys runtime vulnerabilities | 2021-08-12T13:02:00.001Z | 2021-08-12T13:02:00.001Z |
| vde-2021-011 | TRUMPF Laser GmbH: TruControl 2.14.0 to 3.14.0 affected by recent sudo vulnerability | 2021-03-22T08:59:00.000Z | 2026-02-02T14:25:00.000Z |
| vde-2020-039 | TRUMPF: Multiple products prone to WIBU CodeMeter vulnerabilities | 2020-10-27T10:28:00.000Z | 2025-05-14T12:36:39.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-043 | Lenze: PLC Designer V4 with insecure storage of sensitive information | 2025-06-25T10:00:00.000Z | 2025-06-25T10:00:00.000Z |
| vde-2025-042 | Lenze: VPN Client Privilege Escalation in combination with Lenze x500 IoT Gateway | 2025-05-27T09:00:00.000Z | 2025-05-27T09:00:00.000Z |
| vde-2024-053 | Lenze: Install Directory with insufficient permissions | 2024-09-03T08:00:00.000Z | 2025-03-13T11:30:00.000Z |
| vde-2022-030 | Lenze: Vulnerability in the OPC-UA authentification connection in the firmware | 2022-07-11T10:00:00.000Z | 2022-07-11T10:00:00.000Z |
| vde-2021-048 | Lenze: Multiple Vulnerabilities in CODESYS Control V2 communication | 2021-10-04T12:33:00.000Z | 2021-10-04T12:33:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2022-029 | Carlo Gavazzi Controls: Multiple Vulnerabilities in Controller UWP 3.0 | 2022-09-26T08:00:00.000Z | 2026-03-02T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-047 | AUMA: Incorrect delivery status of the Bluetooth configuration | 2025-06-10T10:00:00.000Z | 2025-06-10T10:00:00.000Z |
| vde-2025-026 | AUMA Riester: Buffer overflow in service telegram | 2025-05-12T10:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2023-028 | AUMA: SIMA Master Station affected by WRECK vulnerability | 2023-08-07T11:35:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2023-027 | AUMA: Reflected Cross-Site Scripting Vulnerability in SIMA Master Stations | 2023-08-07T09:35:00.000Z | 2023-08-07T09:35:00.000Z |
| vde-2022-032 | AUMA: Multiple Vulnerabilities in Automation Runtime NTP Service | 2022-08-09T08:00:00.000Z | 2022-08-09T08:00:00.000Z |
| vde-2022-024 | Auma: SIMA² Master Station Denial of Service Vulnerability on Automation Runtime Webserver | 2022-06-15T10:00:00.000Z | 2025-05-14T13:00:15.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-084 | Bender Charge Controller Vulnerability - Unsecure Communication | 2025-09-08T07:00:00.000Z | 2025-09-08T07:00:00.000Z |
| vde-2025-061 | Bender Charge Controller Vulnerability - Disclosure Of Stored Credentials When Authenticated | 2025-09-08T07:00:00.000Z | 2025-09-08T07:00:00.000Z |
| vde-2021-047 | Bender/ebee: Multiple Charge Controller Vulnerabilities | 2022-04-26T10:00:00.000Z | 2022-04-26T10:00:00.000Z |
| vde-2020-043 | Bender: COMTRAXX < 4.2.0 affected by inadquate credentials check vulnerability | 2020-10-16T06:54:00.000Z | 2020-10-16T06:54:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2026-003 | Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime | 2026-03-31T08:00:00.000Z | 2026-04-01T11:00:00.000Z |
| vde-2026-002 | Endress+Hauser: buffer overflow in glibc ld.so leading to privilege escalation | 2026-03-02T07:00:00.000Z | 2026-03-02T07:00:00.000Z |
| vde-2025-105 | Endress+Hauser: Multiple products affected by Wibu-Systems CodeMeter Vulnerability | 2025-12-08T09:00:00.000Z | 2025-12-08T09:00:00.000Z |
| vde-2025-107 | Endress+Hauser: Multiple products affected by Qualcomm vulnerabilities | 2025-12-05T11:00:00.000Z | 2026-04-02T10:00:00.000Z |
| vde-2025-068 | Endress+Hauser: Proline 10 Maintenance credentials may be exposed under certain conditions | 2025-09-02T10:00:00.000Z | 2026-02-20T09:00:00.000Z |
| vde-2025-036 | Multiple vulnerabilities in Endress+Hauser MEAC300-FNADE4 | 2025-03-06T14:00:00.000Z | 2025-03-06T14:00:00.000Z |
| vde-2024-054 | Endress+Hauser: Netilion Network Insights is affected by multiple vulnerabilities | 2024-10-21T08:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2024-041 | Endress+Hauser: Multiple products are vulnerable to code injection | 2024-09-10T08:00:00.000Z | 2024-09-10T08:00:00.000Z |
| vde-2022-019 | Endress+Hauser: Multiple products utilizing vulnerable WIBU-SYSTEMS CodeMeter components | 2022-06-02T15:11:00.000Z | 2022-06-02T15:11:00.000Z |
| vde-2022-006 | Endress+Hauser: FieldPort SFP50 Memory Corruption in Bluetooth Controller Firmware | 2022-03-24T10:48:00.000Z | 2022-03-24T10:48:00.000Z |
| vde-2021-044 | Endress+Hauser: Multiple products affected by log4net vulnerability | 2022-01-20T08:06:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-040 | Endress+Hauser: Promass 83 with EtherNet/IP affected by a stack-based buffer overflow | 2021-10-04T12:30:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-010 | Endress+Hauser: products utilizing WPA2 vulnerable to KRACK attacks | 2021-05-18T09:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-005 | Endress+Hauser: Multiple Devices affected by fdtContainer vulnerability | 2021-03-01T06:39:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-022 | Endress+Hauser: Ecograph T utilizing Webserver firmware version 2.x exposes sensitive information | 2020-11-19T14:48:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-021 | Endress+Hauser: Ecograph T utilizing Webserver firmware version 1.x suffers from improper privilege management | 2020-11-19T14:48:00.000Z | 2025-04-11T07:00:00.000Z |
| vde-2020-031 | Endress+Hauser: Multiple products prone to WIBU CodeMeter vulnerabilities | 2020-10-27T13:10:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2019-005 | Endress+Hauser: WIFI enabled products utilising WPA2 | 2019-03-19T15:34:00.000Z | 2019-03-19T15:34:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-030 | Frauscher: FDS101, FDS-SNMP101 and FDS102 for FAdC/FAdCi are Vulnerable to OS Command Injection Vulnerability | 2025-07-07T10:00:00.000Z | 2025-07-29T10:00:00.000Z |
| vde-2023-049 | Frauscher: FDS102 for FAdC/FAdCi remote code execution vulnerability | 2023-12-11T07:00:00.000Z | 2023-12-11T07:00:00.000Z |
| vde-2023-038 | Frauscher: Multiple Vulnerabilities in FDS101 | 2023-09-21T06:00:00.000Z | 2023-09-21T06:00:00.000Z |
| vde-2023-011 | Frauscher: Diagnostic System FDS001 for FAdC/FAdCi Path Traversal vulnerability | 2023-07-05T08:00:00.000Z | 2023-07-05T08:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2022-052 | Miele: Vulnerability in ease2pay cloud service used by appWash | 2022-11-21T09:00:00.000Z | 2022-11-21T09:00:00.000Z |
| vde-2022-015 | Miele: Security vulnerability in Benchmark Programming Tool | 2022-04-27T12:00:00.000Z | 2022-04-27T12:00:00.000Z |
| vde-2020-024 | Miele: Treck TCP/IP Vulnerabilities (Ripple20) affecting Communication Module XKM3000 L MED | 2020-07-08T07:29:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-010 | Miele: Multiple Vulnerabilities in XGW 3000 ZigBee Gateway | 2019-05-20T06:58:00.000Z | 2025-05-14T13:00:15.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-096 | Weidmueller: Multiple vulnerabilities in Energy Meter 750-24 and Energy Meter 750-230 | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| vde-2025-052 | Weidmueller: Security routers IE-SR-2TX are affected by multiple vulnerabilities | 2025-06-11T10:00:00.000Z | 2025-07-23T10:00:00.000Z |
| vde-2025-044 | Weidmueller: Industrial ethernet switches are affected by multiple vulnerabilities | 2025-05-27T09:00:00.000Z | 2025-08-27T10:00:00.000Z |
| vde-2025-041 | Weidmueller: ResMa is affected by a Vulnerability for ASP.NET AJAX | 2025-05-19T09:00:00.000Z | 2025-05-19T09:00:00.000Z |
| vde-2025-021 | Weidmueller: Authentication Vulnerability in PROCON-WIN 5 | 2025-03-05T09:00:00.000Z | 2025-05-14T13:26:53.000Z |
| vde-2025-023 | Weidmueller: OpenSSL vulnerability in industrial ethernet switches | 2025-03-05T08:00:00.000Z | 2025-03-05T11:00:00.000Z |
| vde-2023-032 | Weidmueller: WIBU Vulnerability in multiple Products | 2023-11-09T07:42:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-056 | Weidmueller: Multiple IoT and control products affected by JavaScript injection vulnerability | 2022-12-14T07:00:00.000Z | 2022-12-14T07:00:00.000Z |
| vde-2021-004 | Weidmueller: EtherNet/IP Fieldbus Coupler out-of-bounds write | 2022-06-21T08:00:00.000Z | 2022-06-21T08:00:00.000Z |
| vde-2022-008 | WEIDMUELLER: Multiple vulnerabilities in Modbus TCP/RTU Gateways | 2022-04-07T06:00:00.000Z | 2022-04-07T06:00:00.000Z |
| vde-2021-042 | Weidmueller: Remote I/O fieldbus couplers (IP20) affected by INFRA:HALT vulnerabilities | 2021-10-18T08:24:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-026 | Weidmueller: Multiple vulnerabilities in Industrial WLAN devices | 2021-06-23T11:04:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2021-016 | Weidmueller: Accidentally open network port in u-controls and IoT-Gateways | 2021-05-04T08:17:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-002 | Weidmueller: WI Manager affected by fdtContainer vulnerability | 2021-01-20T13:32:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-041 | Weidmueller: u-create studio < 1.20.2 affected by WIBU-SYSTEMS CodeMeter vulnerabilities | 2020-10-12T09:14:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-018 | Weidmueller: multiple vulnerabilities in various Industrial Ethernet managed switches | 2019-12-05T12:03:00.000Z | 2025-05-22T13:03:10.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-066 | SMA: Directory Traversal in Sunny Boy | 2025-08-27T08:00:00.000Z | 2025-08-27T08:00:00.000Z |
| vde-2025-050 | SMA: Sunny Portal limited disclosure of personal data of registered users to an authenticated user | 2025-08-19T10:00:00.000Z | 2025-08-19T10:00:00.000Z |
| vde-2025-010 | SMA: Sunny Portal demo system privilege escalation | 2025-05-13T11:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2025-012 | SMA: Sunny Portal Remote Code Execution | 2025-02-26T11:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2024-075 | SMA: Sunny Webbox clickjacking vulnerability | 2025-01-27T13:00:00.000Z | 2025-06-17T06:00:00.000Z |
| vde-2024-020 | SMA: Cluster Controller CSRF vulnerability | 2025-01-27T13:00:00.000Z | 2025-02-12T16:48:47.000Z |
| vde-2024-074 | SMA: SQL injection in Sunny Central UP | 2024-11-27T09:00:00.000Z | 2025-05-14T12:28:19.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2024-013 | HIMA: Multiple products affected by DoS and Port-Based-VLAN Crossing | 2024-02-13T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-059 | HIMA: unquoted path vulnerabilities in X-OPC and X-OTS | 2023-01-16T09:00:00.000Z | 2025-05-22T13:03:10.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-091 | Murrelektronik: Cleartext Transmission of Sensitive Information in IMPACT67 Pro | 2025-10-14T10:00:00.000Z | 2025-10-14T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2020-016 | SWARCO: Critical Vulnerability in CPU LS4000 | 2020-05-28T13:00:00.000Z | 2020-05-28T13:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-033 | ads-tec Industrial IT: Mosquitto MQTT Client Vulnerability in ADS-TEC IRF Products | 2025-04-14T10:00:00.000Z | 2025-04-14T10:00:00.000Z |
| vde-2024-016 | ADS-TEC Industrial IT: Docker vulnerability affects multiple products | 2024-02-19T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-009 | ads-tec: Multiple Vulnerabilities in IRF1000, IRF2000 and IRF3000 | 2023-05-08T13:37:00.000Z | 2023-05-08T13:37:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2022-061 | VARTA: Multiple devices prone to hard-coded credentials | 2023-03-15T09:00:00.000Z | 2023-03-15T09:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-060 | Sauter: Multiple vulnerabilities in SAUTER modulo 6 | 2025-10-21T10:00:00.000Z | 2025-10-27T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2025-079 | Janitza: Multiple vulnerabilities in UMG 96RM-E | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| vde-2025-094 | Janitza: Vulnerability in Modbus interface of UMG 96-PA and UMG 96-PA-MID+ | 2025-11-24T12:00:00.000Z | 2025-11-24T12:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2026-001 | METTLER TOLEDO: ASP.NET core vulnerability in LabX | 2026-03-04T07:00:00.000Z | 2026-03-04T07:00:00.000Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| GCVE-1-2026-0025 |
6.9 (4.0)
|
RansomLook - Improper Filtering of Private Location En⦠|
ransomlook |
ransomlook |
2026-04-12T15:22:00.000Z | 2026-04-12T15:27:31.523942Z |
| GCVE-1-2026-0024 |
8.8 (4.0)
|
LDAP injection in MISP ApacheAuthenticate when using a⦠|
misp |
misp |
2026-04-08T08:28:00.000Z | 2026-04-09T04:44:04.936665Z |
| GCVE-1-2026-0023 |
8.5 (4.0)
|
Stored XSS in modal item preview for long item content⦠|
ail-project |
ail-framework |
2026-04-07T06:29:00.000Z | 2026-04-08T04:22:15.084342Z |
| GCVE-1-2026-0022 |
6.4 (4.0)
|
MISP - Beta Overmind UI Stored Cross-Site Scripting in⦠|
misp |
misp |
2026-03-30T09:48:36.968649Z | 2026-03-30T09:48:36.968649Z |
| GCVE-1-2026-0021 |
10 (4.0)
|
Critical RCE Vulnerability reported in Windchill |
windchill |
FlexPLM |
2026-03-23T12:30:40.249187Z | 2026-03-23T12:30:40.249187Z |
| GCVE-1-2026-0020 |
10 (4.0)
|
Remote Code Execution Attack Against Eircom D1000 Router |
Eir |
D1000 |
2026-03-11T14:12:00.000Z | 2026-03-11T14:23:24.609831Z |
| GCVE-1-2026-0019 |
6.4 (4.0)
|
Improper URL validation in MISP dashboard button widge⦠|
misp |
misp |
2026-02-27T14:55:00.000Z | 2026-02-27T15:44:29.998063Z |
| GCVE-1-2026-0018 |
6.5 (4.0)
|
Improper access control in MISP user contact form allo⦠|
misp |
misp |
2026-02-27T13:25:32.632362Z | 2026-02-27T13:25:32.632362Z |
| GCVE-1-2026-0017 |
7.2 (4.0)
|
Improper Neutralization of Raw HTML in MISP modules Ma⦠|
misp |
misp-modules |
2026-02-27T13:10:24.641948Z | 2026-02-27T13:10:24.641948Z |
| GCVE-1-2026-0016 |
7 (4.0)
|
Server-Side Request Forgery via Event Report Import Fr⦠|
misp |
misp |
2026-02-27T10:56:32.745676Z | 2026-02-27T10:56:32.745676Z |
| GCVE-1-2026-0015 |
7.2 (4.0)
|
Threat actors use FortiCloud SSO bypass to collect LDA⦠|
fortinet |
fortios |
2026-02-09T09:09:00.000Z | 2026-02-09T09:14:59.004089Z |
| GCVE-1-2026-0014 |
7.4 (4.0)
|
Missing Authorization Check Allows Unauthorized Modifi⦠|
vulnerability-lookup |
vulnerability-lookup |
2026-02-04T19:32:14.341383Z | 2026-02-04T19:32:14.341383Z |
| GCVE-1-2026-0013 |
2.1 (4.0)
|
Flask Application Username Route Collision Allows Rese⦠|
vulnerability-lookup |
vulnerability-lookup |
2026-02-04T19:27:00.000Z | 2026-02-04T19:32:49.787763Z |
| GCVE-1-2026-0012 |
2.1 (4.0)
|
Authentication Error Message Allows Email Address Enum⦠|
vulnerability-lookup |
vulnerability-lookup |
2026-02-04T19:21:34.411344Z | 2026-02-04T19:21:34.411344Z |
| GCVE-1-2026-0011 |
8.7 (4.0)
|
Out-of-bounds memory write in the network packet ⦠|
EA Games |
Command & Conquer: Generals |
2026-01-29T14:37:00.000Z | 2026-01-29T14:39:17.728822Z |
| GCVE-1-2026-0010 |
9.3 (4.0)
|
Improper input validation in the file transfer ha⦠|
EA Games |
Command & Conquer: Generals |
2026-01-29T14:33:18.822829Z | 2026-01-29T14:33:18.822829Z |
| GCVE-1-2026-0009 |
9.3 (4.0)
|
Stack-based buffer overflow in the multiplayer ne⦠|
EA Games |
Command & Conquer: Generals |
2026-01-29T14:30:38.596928Z | 2026-01-29T14:30:38.596928Z |
| GCVE-1-2026-0008 |
10 (4.0)
|
gpg-agent stack buffer overflow in pkdecrypt using KEM |
gnupg |
gpg-agent |
2026-01-28T13:48:12.350509Z | 2026-01-28T13:48:12.350509Z |
| GCVE-1-2026-0007 |
10 (4.0)
|
GNU InetUtils Security Advisory: remote authentication⦠|
gnu |
InetUtils |
2026-01-20T20:57:00.000Z | 2026-01-26T16:32:40.831364Z |
| GCVE-1-2026-0006 |
8.5 (4.0)
|
Improper Access Control in Cerebrate AuthKey and Encry⦠|
cerebrate |
cerebrate |
2026-01-13T15:37:17.337254Z | 2026-01-13T15:37:17.337254Z |
| GCVE-1-2026-0005 |
8.5 (4.0)
|
Improper Access Control in Cerebrate Alignment Model A⦠|
cerebrate |
cerebrate |
2026-01-13T15:31:00.000Z | 2026-01-13T15:38:02.888546Z |
| GCVE-1-2026-0004 |
8.5 (4.0)
|
Authorization Bypass in Cerebrate IndividualsControlle⦠|
cerebrate |
cerebrate |
2026-01-13T15:28:00.000Z | 2026-01-13T15:38:37.744618Z |
| GCVE-1-2026-0003 |
6.3 (4.0)
|
Stored/Reflected XSS via Unsanitized Parameters in URL⦠|
misp |
misp |
2026-01-13T10:50:00.000Z | 2026-01-13T10:54:13.659223Z |
| GCVE-1-2026-0002 |
10 (4.0)
|
Heap-buffer-overflow in EXIF writer for extra IFD tags |
ffmpeg |
ffmpeg |
2026-01-02T19:50:00.000Z | 2026-01-02T20:05:27.269877Z |
| GCVE-1-2026-0001 |
N/A
|
Bundle reference to gpg.fail |
gnupg |
gnupg |
2026-01-02T10:20:00.000Z | 2026-01-02T13:31:14.359346Z |
| GCVE-1-2025-0041 |
6.4 (4.0)
|
[online services] Reflected Cross-Site Scripting (XSS)⦠|
typo3 |
typo3 |
2025-12-19T14:25:00.000Z | 2025-12-19T14:54:51.594645Z |
| GCVE-1-2025-0040 |
7.2 (4.0)
|
A cross-site scripting (XSS) vulnerability was id⦠|
misp |
misp |
2025-12-13T08:44:32.378924Z | 2025-12-13T08:44:32.378924Z |
| GCVE-1-2025-0039 |
8.5 (4.0)
|
XSS Reintroduced in MISP Dashboard World Map Widget Du⦠|
misp |
misp |
2025-12-10T14:33:52.856734Z | 2025-12-10T14:33:52.856734Z |
| GCVE-1-2025-0038 |
5 (4.0)
|
Reflected XSS in MISP Template Tag Removal and MISP Ad⦠|
misp |
misp |
2025-12-10T14:10:00.000Z | 2025-12-10T14:16:55.918270Z |
| GCVE-1-2025-0037 |
7 (4.0)
|
Reflected XSS in MISP Dashboard Widgets via Unescaped ⦠|
misp |
misp |
2025-12-10T14:01:03.200804Z | 2025-12-10T14:01:03.200804Z |