Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-27587 |
7.7 (4.0)
|
Caddy: MatchPath %xx (escaped-path) branch skips case … |
caddyserver |
caddy |
2026-02-24T16:26:40.222Z | 2026-02-24T16:26:40.222Z |
| CVE-2026-27586 |
8.8 (4.0)
|
Caddy's mTLS client authentication silently fails open… |
caddyserver |
caddy |
2026-02-24T16:08:20.569Z | 2026-02-24T16:08:20.569Z |
| CVE-2026-27585 |
6.9 (4.0)
|
Caddy's improper sanitization of glob characters in fi… |
caddyserver |
caddy |
2026-02-24T16:06:05.030Z | 2026-02-24T16:06:05.030Z |
| CVE-2026-27571 |
5.9 (3.1)
|
nats-server websockets are vulnerable to pre-auth memory DoS |
nats-io |
nats-server |
2026-02-24T15:59:17.926Z | 2026-02-24T15:59:17.926Z |
| CVE-2025-13776 |
8.6 (4.0)
|
Hard-coded database credentials in Finka software |
TIK-SOFT |
Finka-FK |
2026-02-24T15:58:30.096Z | 2026-02-24T15:58:30.096Z |
| CVE-2025-47904 |
5.7 (4.0)
|
Unsigned upgrade package |
Microchip |
Time Provider 4100 |
2026-02-24T15:34:20.905Z | 2026-02-24T15:34:20.905Z |
| CVE-2026-27521 |
6.9 (4.0)
6.5 (3.1)
|
Binardat 10G08-0800GSM Network Switch Missing Login Ra… |
Binardat Ltd. |
10G08-0800GSM Network Switch |
2026-02-24T15:08:14.170Z | 2026-02-24T15:08:14.170Z |
| CVE-2026-27520 |
8.7 (4.0)
7.5 (3.1)
|
Binardat 10G08-0800GSM Network Switch Base64-encoded P… |
Binardat Ltd. |
10G08-0800GSM Network Switch |
2026-02-24T15:07:41.085Z | 2026-02-24T15:07:41.085Z |
| CVE-2026-27519 |
8.7 (4.0)
7.5 (3.1)
|
Binardat 10G08-0800GSM Network Switch Hard-coded RC4 E… |
Binardat Ltd. |
10G08-0800GSM Network Switch |
2026-02-24T15:07:10.410Z | 2026-02-24T15:07:10.410Z |
| CVE-2026-27518 |
5.1 (4.0)
4.3 (3.1)
|
Binardat 10G08-0800GSM Network Switch CSRF |
Binardat Ltd. |
10G08-0800GSM Network Switch |
2026-02-24T15:06:39.513Z | 2026-02-24T15:06:39.513Z |
| CVE-2026-27517 |
5.1 (4.0)
5.4 (3.1)
|
Binardat 10G08-0800GSM Network Switch XSS |
Binardat Ltd. |
10G08-0800GSM Network Switch |
2026-02-24T15:06:08.974Z | 2026-02-24T15:06:08.974Z |
| CVE-2026-27516 |
8.6 (4.0)
8.1 (3.1)
|
Binardat 10G08-0800GSM Network Switch Plaintext Passwo… |
Binardat Ltd. |
10G08-0800GSM Network Switch |
2026-02-24T15:05:12.384Z | 2026-02-24T15:05:12.384Z |
| CVE-2026-27515 |
9.3 (4.0)
9.1 (3.1)
|
Binardat 10G08-0800GSM Network Switch Predictable Sess… |
Binardat Ltd. |
10G08-0800GSM Network Switch |
2026-02-24T15:04:41.427Z | 2026-02-24T15:04:41.427Z |
| CVE-2026-27507 |
9.3 (4.0)
9.8 (3.1)
|
Binardat 10G08-0800GSM Network Switch Hard-coded Credentials |
Binardat Ltd. |
10G08-0800GSM Network Switch |
2026-02-24T15:04:16.616Z | 2026-02-24T15:04:16.616Z |
| CVE-2026-23678 |
8.7 (4.0)
8.8 (3.1)
|
Binardat 10G08-0800GSM Network Switch Traceroute CLI C… |
Binardat Ltd. |
10G08-0800GSM Network Switch |
2026-02-24T15:03:35.734Z | 2026-02-24T15:03:49.724Z |
| CVE-2026-27584 |
9.2 (4.0)
|
ActualBudget server is Missing Authentication for Simp… |
actualbudget |
actual |
2026-02-24T14:59:21.175Z | 2026-02-24T14:59:21.175Z |
| CVE-2026-0402 |
4.9 (3.1)
|
A post-authentication Out-of-bounds Read vulnerab… |
SonicWall |
SonicOS |
2026-02-24T14:58:37.608Z | 2026-02-24T15:33:50.674Z |
| CVE-2026-27732 |
8.6 (4.0)
|
AVideo has Authenticated Server-Side Request Forgery v… |
WWBN |
AVideo |
2026-02-24T14:56:55.372Z | 2026-02-24T14:56:55.372Z |
| CVE-2026-0401 |
4.9 (3.1)
|
A post-authentication NULL Pointer Dereference vu… |
SonicWall |
SonicOS |
2026-02-24T14:55:57.545Z | 2026-02-24T15:34:30.604Z |
| CVE-2026-0400 |
4.9 (3.1)
|
A post-authentication Format String vulnerability… |
SonicWall |
SonicOS |
2026-02-24T14:54:15.394Z | 2026-02-24T15:35:10.650Z |
| CVE-2026-27568 |
5.1 (4.0)
|
AVideo has Stored Cross-Site Scripting via Markdown Co… |
WWBN |
AVideo |
2026-02-24T14:53:20.826Z | 2026-02-24T14:53:20.826Z |
| CVE-2026-0399 |
4.9 (3.1)
|
Multiple post-authentication stack-based buffer o… |
SonicWall |
SonicOS |
2026-02-24T14:52:10.841Z | 2026-02-24T15:50:29.865Z |
| CVE-2026-3102 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
exiftool PNG File MacOS.pm SetMacOSTags os command injection |
n/a |
exiftool |
2026-02-24T14:32:13.272Z | 2026-02-24T14:32:13.272Z |
| CVE-2026-3101 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Intelbras TIP 635G Ping os command injection |
Intelbras |
TIP 635G |
2026-02-24T14:32:08.166Z | 2026-02-24T14:32:08.166Z |
| CVE-2026-27567 |
6.5 (3.1)
|
Payload has Server-Side Request Forgery (SSRF) in Exte… |
payloadcms |
payload |
2026-02-24T14:22:37.803Z | 2026-02-24T14:22:37.803Z |
| CVE-2025-10010 |
6.8 (3.1)
|
Integrity Validation Bypass in CryptoPro Secure Disk f… |
CPSD IT SERVICES GMBH |
CryptoPro Secure Disk for BitLocker |
2026-02-24T14:13:29.155Z | 2026-02-24T14:53:28.726Z |
| CVE-2026-27483 |
8.8 (3.1)
|
MindsDB has Path Traversal in /api/files Leading to Re… |
mindsdb |
mindsdb |
2026-02-24T14:00:05.402Z | 2026-02-24T14:00:05.402Z |
| CVE-2026-27208 |
9.2 (3.1)
|
api-gateway-deploy Affected by Exploitable Command Inj… |
bleon-ethical |
api-gateway-deploy |
2026-02-24T13:52:43.155Z | 2026-02-24T13:52:43.155Z |
| CVE-2026-2807 |
9.8 (3.1)
|
Memory safety bugs fixed in Firefox 148 and Thunderbird 148 |
Mozilla |
Firefox |
2026-02-24T13:33:34.035Z | 2026-02-26T14:44:08.263Z |
| CVE-2026-2806 |
9.1 (3.1)
|
Uninitialized memory in the Graphics: Text component |
Mozilla |
Firefox |
2026-02-24T13:33:33.407Z | 2026-02-25T21:29:33.327Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-2255-92v8-4pvj |
10.0 (3.1)
|
Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. This vuln… | 2026-02-24T15:30:31Z | 2026-02-25T18:31:32Z |
| ghsa-q2vg-xgjr-32v3 |
8.7 (4.0)
|
IEC 60870-5-104: Potential Denial of Service impact on reception of invalid U-format frame. Product… | 2026-02-24T15:30:30Z | 2026-02-24T15:30:30Z |
| ghsa-pwpc-5pp8-7qw9 |
5.3 (4.0)
|
RTU500 web interface: An unprivileged user can read user management information. The information ca… | 2026-02-24T15:30:30Z | 2026-02-24T15:30:30Z |
| ghsa-mwf2-qr4v-94h2 |
7.1 (4.0)
|
Apache Superset: Read-Only Bypass via Improper Input Validation on PostgreSQL Connections | 2026-02-24T15:30:30Z | 2026-02-26T15:29:01Z |
| ghsa-h294-8fxm-m2pj |
2.3 (4.0)
|
Apache Superset allows authenticated users to view sensitive data without explicit permissions | 2026-02-24T15:30:30Z | 2026-02-26T15:28:47Z |
| ghsa-gvxg-9hqx-f4rg |
5.3 (4.0)
|
Apache Superset allows privileged users to conduct error-based SQL Injection | 2026-02-24T15:30:30Z | 2026-02-26T15:28:27Z |
| ghsa-48m2-v2r8-h23m |
5.3 (4.0)
|
Apache Superset: Incomplete DISALLOWED_SQL_FUNCTIONS default list for ClickHouse engine | 2026-02-24T15:30:30Z | 2026-02-26T15:28:10Z |
| ghsa-3m2g-v7jf-7fxc |
7.1 (4.0)
|
Apache Superset Improper Authorization allows low-privileged users to bypass access controls | 2026-02-24T15:30:30Z | 2026-02-26T15:28:38Z |
| ghsa-266v-99c5-7x8c |
9.3 (4.0)
|
Slican NCP/IPL/IPM/IPU devices are vulnerable to PHP Function Injection. An unauthenticated remote … | 2026-02-24T15:30:30Z | 2026-02-24T15:30:30Z |
| ghsa-gm37-qx7w-p258 |
5.3 (3.1)
|
ImageMagick: Possible memory leak in ASHLAR encoder | 2026-02-24T15:30:16Z | 2026-02-24T15:30:16Z |
| ghsa-jv4p-gjwq-9r2j |
5.1 (3.1)
|
ImageMagick: Out of bounds read in multiple coders read raw pixel data | 2026-02-24T15:29:46Z | 2026-02-24T15:29:47Z |
| ghsa-pqgj-2p96-rx85 |
7.5 (3.1)
|
ImageMagick: Infinite loop vulnerability when parsing a PCD file | 2026-02-24T15:29:12Z | 2026-02-24T15:29:12Z |
| ghsa-wg3g-gvx5-2pmv |
5.3 (3.1)
|
ImageMagick: Converting multi-layer nested MVG to SVG can cause DoS | 2026-02-24T15:28:17Z | 2026-02-24T15:28:17Z |
| ghsa-96pc-27rx-pr36 |
7.5 (3.1)
|
ImageMagick has Possible Heap Information Disclosure in PSD ZIP Decompression | 2026-02-24T15:27:28Z | 2026-02-24T15:27:28Z |
| ghsa-x7c5-fjpp-2mcc |
6.8 (4.0)
|
An out of bounds read vulnerability in the grpcfuse kernel module present in the Linux VM in Docker… | 2026-02-24T12:31:40Z | 2026-02-24T12:31:40Z |
| ghsa-r837-hpv7-pc2f |
8.4 (3.1)
|
Apache Airflow vulnerable to Code Injection in the web-server context via LogTemplate table | 2026-02-24T12:31:40Z | 2026-02-25T19:20:56Z |
| ghsa-8r55-rv5w-6pfm |
6.5 (3.1)
|
Apache Airflow exposes sensitive information in its log files | 2026-02-24T12:31:40Z | 2026-02-25T19:21:33Z |
| ghsa-x366-cwf7-x9gv |
9.1 (3.1)
|
A broken access control vulnerability exists in Serv-U which when exploited, gives a malicious acto… | 2026-02-24T09:31:21Z | 2026-02-24T09:31:21Z |
| ghsa-vh45-gfxf-vr42 |
9.1 (3.1)
|
An Insecure Direct Object Reference (IDOR) vulnerability exists in Serv-U, which when exploited, gi… | 2026-02-24T09:31:21Z | 2026-02-24T09:31:21Z |
| ghsa-p4xj-mrqw-g3f3 |
7.7 (3.1)
|
When the "Silent Just-In-Time Provisioning" feature is enabled for a federated identity provider (I… | 2026-02-24T09:31:21Z | 2026-02-24T09:31:21Z |
| ghsa-jjx5-vcwr-cwfq |
9.1 (3.1)
|
A type confusion vulnerability exists in Serv-U which when exploited, gives a malicious actor the a… | 2026-02-24T09:31:21Z | 2026-02-24T09:31:21Z |
| ghsa-hwvv-m8xc-26x2 |
9.4 (4.0)
|
A sandbox escape vulnerability exists in dotCMS’s Velocity scripting engine (VTools) that allows au… | 2026-02-24T09:31:21Z | 2026-02-24T09:31:21Z |
| ghsa-8cmg-xf32-xmvr |
9.1 (3.1)
|
A type confusion vulnerability exists in Serv-U which when exploited, gives a malicious actor the a… | 2026-02-24T09:31:21Z | 2026-02-24T09:31:21Z |
| ghsa-wgpr-jxrq-2m57 |
7.3 (3.1)
5.5 (4.0)
|
A security vulnerability has been detected in itsourcecode Document Management System 1.0. Affected… | 2026-02-24T06:31:30Z | 2026-02-24T06:31:30Z |
| ghsa-rx2f-c6vf-gmg2 |
6.3 (3.1)
2.1 (4.0)
|
A flaw has been found in HummerRisk up to 1.5.0. This vulnerability affects the function fixedComma… | 2026-02-24T06:31:30Z | 2026-02-24T06:31:30Z |
| ghsa-p86v-p9g7-fffw |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability has been found in HummerRisk up to 1.5.0. This issue affects the function extractTa… | 2026-02-24T06:31:30Z | 2026-02-24T06:31:30Z |
| ghsa-mcwp-v5q8-7gcp |
8.8 (3.1)
|
The Responsive Lightbox & Gallery WordPress plugin before 2.6.1 is vulnerable to an Unauthenticated… | 2026-02-24T06:31:30Z | 2026-02-24T18:31:01Z |
| ghsa-fwq6-2c4r-9g8h |
7.3 (3.1)
5.5 (4.0)
|
A weakness has been identified in itsourcecode Document Management System 1.0. This impacts an unkn… | 2026-02-24T06:31:30Z | 2026-02-24T06:31:30Z |
| ghsa-cxmx-5wwh-7p77 |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was detected in SourceCodester Modern Image Gallery App 1.0. Affected by this vulne… | 2026-02-24T06:31:30Z | 2026-02-24T06:31:31Z |
| ghsa-83rq-88jr-634x |
3.8 (3.1)
2.0 (4.0)
|
A vulnerability was determined in MuYuCMS 2.7. Affected is the function delete_dir_file of the file… | 2026-02-24T06:31:30Z | 2026-02-24T06:31:30Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-278 |
5.3 (3.1)
|
MindsDB connects artificial intelligence models to real time data. Versions prior to 23.1… | mindsdb | 2023-12-11T21:15:00Z | 2026-02-25T10:47:20.007476Z |
| pysec-2023-277 |
5.3 (3.1)
|
MindsDB connects artificial intelligence models to real time data. Versions prior to 23.1… | mindsdb | 2023-12-11T19:15:00+00:00 | 2024-11-21T14:22:54.391272+00:00 |
| pysec-2023-292 |
7.8 (3.1)
|
PyInstaller bundles a Python application and all its dependencies into a single package. … | pyinstaller | 2023-12-09T01:15:00+00:00 | 2024-11-21T14:22:59.796437+00:00 |
| pysec-2023-260 |
6.1 (3.1)
|
A reflected Cross-Site Scripting (XSS) vulnerability exists in the mlflow/mlflow reposito… | mlflow | 2023-12-07T05:15:00+00:00 | 2024-04-16T15:20:55.191003+00:00 |
| pysec-2023-291 |
7.8 (3.1)
|
PyDrive2 is a wrapper library of google-api-python-client that simplifies many common Goo… | pydrive2 | 2023-12-05T21:15:00+00:00 | 2024-11-21T14:22:59.681617+00:00 |
| pysec-2023-272 |
4.3 (3.1)
|
The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints… | jupyter-server | 2023-12-04T21:15:00+00:00 | 2024-11-21T14:22:52.227754+00:00 |
| pysec-2023-250 |
5.3 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper … | aiohttp | 2023-11-30T07:15:00+00:00 | 2024-01-29T16:22:26.409794+00:00 |
| pysec-2023-251 |
5.3 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper … | aiohttp | 2023-11-29T20:15:00+00:00 | 2024-01-29T16:22:26.513672+00:00 |
| pysec-2023-254 |
7.5 (3.1)
|
cryptography is a package designed to expose cryptographic primitives and recipes to Pyth… | cryptography | 2023-11-29T19:15:00+00:00 | 2024-02-17T07:18:27.688636+00:00 |
| pysec-2023-268 |
7.5 (3.1)
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Dolphi… | apache-dolphinscheduler | 2023-11-24T08:15:00+00:00 | 2024-11-21T14:22:40.797843+00:00 |
| pysec-2023-285 |
5.4 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-11-22T16:15:00+00:00 | 2024-11-21T14:22:55.567982+00:00 |
| pysec-2023-244 |
|
Apache Software Foundation Apache Submarine has an SQL injection vulnerability when a use… | apache-submarine | 2023-11-22T10:15:00+00:00 | 2023-11-22T11:21:52.095543+00:00 |
| pysec-2023-288 |
6.5 (3.1)
|
The Nautobot Device Onboarding plugin uses the netmiko and NAPALM libraries to simplify t… | nautobot-device-onboarding | 2023-11-21T23:15:00+00:00 | 2024-11-21T14:22:55.475794+00:00 |
| pysec-2023-302 |
7.5 (3.1)
|
An issue in /upydev/keygen.py in upydev v0.4.3 allows attackers to decrypt sensitive info… | upydev | 2023-11-20T23:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2023-240 |
|
Apache Software Foundation Apache Submarine has a bug when serializing against yaml. The … | apache-submarine | 2023-11-20T09:15:00+00:00 | 2023-11-20T11:21:41.073991+00:00 |
| pysec-2023-238 |
|
Deserialization of untrusted data in IPC and Parquet readers in PyArrow versions 0.14.0 t… | pyarrow | 2023-11-20T08:59:06.851388+00:00 | |
| pysec-2023-245 |
7.5 (3.1)
|
PyPinkSign v0.5.1 uses a non-random or static IV for Cipher Block Chaining (CBC) mode in … | pypinksign | 2023-11-16T18:15:00+00:00 | 2023-11-22T19:19:42.405614+00:00 |
| pysec-2023-243 |
7.4 (3.1)
|
Missing SSL certificate validation in localstack v2.3.2 allows attackers to eavesdrop on … | localstack | 2023-11-16T18:15:00Z | 2024-10-09T12:05:48.156835Z |
| pysec-2023-242 |
7.4 (3.1)
|
Missing SSL certificate validation in HTTPie v3.2.2 allows attackers to eavesdrop on comm… | httpie | 2023-11-16T18:15:00+00:00 | 2023-11-22T02:43:48.390438+00:00 |
| pysec-2023-304 |
8.8 (3.1)
|
vantage6 is a framework to manage and deploy privacy enhancing technologies like Federate… | vantage6-server | 2023-11-14T21:15:00+00:00 | 2024-11-21T14:23:02.641254+00:00 |
| pysec-2023-303 |
8.8 (3.1)
|
vantage6 is a framework to manage and deploy privacy enhancing technologies like Federate… | vantage6-node | 2023-11-14T21:15:00+00:00 | 2024-11-21T14:23:02.574095+00:00 |
| pysec-2023-247 |
6.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Affected … | aiohttp | 2023-11-14T21:15:00+00:00 | 2023-11-22T23:23:57.631856+00:00 |
| pysec-2023-246 |
7.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. The HTTP … | aiohttp | 2023-11-14T21:15:00+00:00 | 2023-11-22T23:23:57.547793+00:00 |
| pysec-2023-239 |
6.8 (3.1)
|
An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the remote end of an… | asyncssh | 2023-11-14T03:15:00+00:00 | 2023-11-20T09:25:38.326328+00:00 |
| pysec-2023-237 |
5.9 (3.1)
|
An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the extension info m… | asyncssh | 2023-11-14T03:15:00+00:00 | 2023-11-17T17:27:01.919743+00:00 |
| pysec-2023-275 |
7.5 (3.1)
|
Label Studio is an open source data labeling tool. In all current versions of Label Studi… | label-studio | 2023-11-13T21:15:00+00:00 | 2024-11-21T14:22:53.350760+00:00 |
| pysec-2023-236 |
7.5 (3.1)
|
Remarshal prior to v0.17.1 expands YAML alias nodes unlimitedly, hence Remarshal is vulne… | remarshal | 2023-11-13T03:15:00+00:00 | 2023-11-16T20:25:23.801345+00:00 |
| pysec-2023-232 |
|
We failed to apply CVE-2023-40611 in 2.7.1 and this vulnerability was marked as fixed the… | apache-airflow | 2023-11-12T14:15:00+00:00 | 2023-11-12T16:29:15.404665+00:00 |
| pysec-2023-231 |
|
Apache Airflow, versions before 2.7.3, has a vulnerability that allows an authorized user… | apache-airflow | 2023-11-12T14:15:00+00:00 | 2023-11-12T16:29:15.321733+00:00 |
| pysec-2023-241 |
9.1 (3.1)
|
Piccolo is an object-relational mapping and query builder which supports asyncio. Prior t… | piccolo | 2023-11-10T18:15:00Z | 2024-01-23T23:21:13.409656Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-692 | Malicious code in graphrix (npm) | 2026-02-03T07:44:00Z | 2026-02-06T03:05:24Z |
| mal-2026-694 | Malicious code in tarax (npm) | 2026-02-03T07:42:06Z | 2026-02-06T03:05:27Z |
| mal-2026-687 | Malicious code in @uselagoon/ui-library (npm) | 2026-02-03T07:39:16Z | 2026-02-06T03:05:22Z |
| mal-2026-681 | Malicious code in internallib_v782 (npm) | 2026-02-03T07:27:28Z | 2026-02-06T03:05:24Z |
| mal-2026-685 | Malicious code in strengthifys (npm) | 2026-02-03T07:27:10Z | 2026-02-06T03:05:26Z |
| mal-2026-684 | Malicious code in react-responsive-carousel-v4 (npm) | 2026-02-03T07:27:10Z | 2026-02-06T03:05:26Z |
| mal-2026-680 | Malicious code in frontend-js-state-web (npm) | 2026-02-03T07:27:10Z | 2026-02-06T03:05:24Z |
| mal-2026-679 | Malicious code in epic-admin-ui (npm) | 2026-02-03T07:27:10Z | 2026-02-06T03:05:23Z |
| mal-2026-683 | Malicious code in l2-contracts (npm) | 2026-02-03T07:24:02Z | 2026-02-06T03:05:24Z |
| mal-2026-682 | Malicious code in kwp-analytics (npm) | 2026-02-03T07:22:08Z | 2026-02-06T03:05:24Z |
| mal-2026-677 | Malicious code in chai-promise-tools (npm) | 2026-02-03T06:59:53Z | 2026-02-06T03:05:23Z |
| mal-2026-678 | Malicious code in cookie-parsers-env (npm) | 2026-02-03T06:59:52Z | 2026-02-06T03:05:23Z |
| mal-2026-676 | Malicious code in @ikeacnalan/icons (npm) | 2026-02-03T06:58:19Z | 2026-02-06T03:05:22Z |
| mal-2026-674 | Malicious code in freedom-baileys (npm) | 2026-02-03T05:01:34Z | 2026-02-06T03:05:24Z |
| mal-2026-673 | Malicious code in baileys-ud (npm) | 2026-02-03T05:01:34Z | 2026-02-06T03:05:22Z |
| mal-2026-675 | Malicious code in supun-baileys (npm) | 2026-02-03T05:01:33Z | 2026-02-06T03:05:26Z |
| mal-2026-672 | Malicious code in baileys-dtz (npm) | 2026-02-03T05:01:33Z | 2026-02-06T03:05:22Z |
| mal-2026-671 | Malicious code in cheerio-core (npm) | 2026-02-03T04:20:03Z | 2026-02-06T03:05:23Z |
| mal-2026-670 | Malicious code in aligned-array (npm) | 2026-02-03T04:12:07Z | 2026-02-06T03:05:22Z |
| mal-2026-668 | Malicious code in typescript-react-apollo (npm) | 2026-02-03T03:57:51Z | 2026-02-06T03:05:27Z |
| mal-2026-667 | Malicious code in typed-document-node (npm) | 2026-02-03T03:57:51Z | 2026-02-06T03:05:27Z |
| mal-2026-666 | Malicious code in transform-react-display-name (npm) | 2026-02-03T03:57:51Z | 2026-02-06T03:05:27Z |
| mal-2026-665 | Malicious code in transform-exponentiation-operator (npm) | 2026-02-03T03:57:51Z | 2026-02-06T03:05:27Z |
| mal-2026-664 | Malicious code in transform-es2015-modules-amd (npm) | 2026-02-03T03:57:51Z | 2026-02-06T03:05:27Z |
| mal-2026-663 | Malicious code in transform-async-generator-functions (npm) | 2026-02-03T03:57:51Z | 2026-02-06T03:05:27Z |
| mal-2026-661 | Malicious code in netlify-project-helper (npm) | 2026-02-03T03:54:05Z | 2026-02-06T03:05:25Z |
| mal-2026-660 | Malicious code in dns-troubleshoot-toolkit-xyz123 (npm) | 2026-02-03T03:54:05Z | 2026-02-06T03:05:23Z |
| mal-2026-669 | Malicious code in vite-ui-components (npm) | 2026-02-03T03:42:39Z | 2026-02-06T03:05:27Z |
| mal-2026-658 | Malicious code in ansi-universal-ui (npm) | 2026-02-03T03:42:39Z | 2026-02-06T03:05:22Z |
| mal-2026-659 | Malicious code in atg-atgse (npm) | 2026-02-03T03:27:31Z | 2026-02-06T03:05:22Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-golang-2025-58183 | Unbounded allocation when parsing GNU sparse map in archive/tar | 2025-11-06T12:58:07.546Z | 2025-11-06T13:25:46.476Z |
| bit-golang-2025-47912 | Insufficient validation of bracketed IPv6 hostnames in net/url | 2025-11-06T12:58:02.636Z | 2025-11-06T13:25:46.476Z |
| bit-mlflow-2025-11200 | MLflow Weak Password Requirements Authentication Bypass Vulnerability | 2025-11-06T12:53:59.130Z | 2025-11-06T13:25:46.476Z |
| bit-airflow-2025-62503 | Apache Airflow: Privilege boundary bypass in bulk APIs (create action can upsert existing Pools/Connections/Variables) | 2025-11-06T12:53:02.259Z | 2025-11-06T13:25:46.476Z |
| bit-airflow-2025-62402 | Apache Airflow: Airflow 3 API: /api/v2/dagReports executes DAG Python in API | 2025-11-06T12:52:57.926Z | 2025-11-06T13:25:46.476Z |
| bit-airflow-2025-54941 | Apache Airflow: Command injection in "example_dag_decorator" | 2025-11-06T12:52:52.554Z | 2025-11-06T13:25:46.476Z |
| bit-consul-2025-11375 | Consul's event endpoint is vulnerable to denial of service | 2025-11-06T12:49:11.554Z | 2025-11-06T13:25:46.476Z |
| bit-consul-2025-11374 | Consul's KV endpoint is vulnerable to denial of service | 2025-11-06T12:49:05.940Z | 2025-11-06T13:25:46.476Z |
| bit-apisix-2025-62232 | Apache APISIX: basic-auth logs plaintext credentials at info level | 2025-11-06T12:47:05.456Z | 2025-11-06T13:25:46.476Z |
| bit-gitlab-2025-6601 | Business Logic Errors in GitLab | 2025-10-28T12:05:34.442Z | 2025-11-06T13:25:46.476Z |
| bit-gitlab-2025-11989 | Missing Authorization in GitLab | 2025-10-28T12:03:56.032Z | 2025-11-06T13:25:46.476Z |
| bit-gitlab-2025-11974 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-10-28T12:03:52.509Z | 2025-10-28T12:07:16.062Z |
| bit-gitlab-2025-11971 | Incorrect Authorization in GitLab | 2025-10-28T12:03:50.762Z | 2025-11-06T13:25:46.476Z |
| bit-gitlab-2025-11447 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-10-28T12:03:49.010Z | 2025-10-28T12:07:16.062Z |
| bit-gitlab-2025-10497 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-10-28T12:03:32.925Z | 2025-10-28T12:07:16.062Z |
| bit-vault-2025-12044 | Vault Vulnerable to Denial of Service Due to Rate Limit Regression | 2025-10-28T11:51:06.109Z | 2025-10-28T12:07:16.062Z |
| bit-vault-2025-11621 | Vault AWS auth method bypass due to AWS client cache | 2025-10-28T11:51:04.350Z | 2025-10-28T12:07:16.062Z |
| bit-dotnet-2025-55248 | .NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability | 2025-10-24T14:39:43.546Z | 2025-10-24T15:07:36.996Z |
| bit-dotnet-2025-55247 | .NET Elevation of Privilege Vulnerability | 2025-10-24T14:39:42.027Z | 2025-10-24T15:07:36.996Z |
| bit-mastodon-2025-62605 | Mastodon quotes control can be bypassed | 2025-10-23T08:44:09.997Z | 2026-01-08T18:07:34.629Z |
| bit-django-2025-59682 | 2025-10-23T08:40:14.229Z | 2025-11-06T13:25:46.476Z | |
| bit-minio-2025-62506 | MinIO vulnerable to privilege escalation via session policy bypass in service accounts and STS | 2025-10-21T09:34:30.739Z | 2025-10-24T15:07:36.996Z |
| bit-powershell-2025-25004 | PowerShell Elevation of Privilege Vulnerability | 2025-10-21T08:49:11.753Z | 2025-10-21T09:07:40.239Z |
| bit-envoy-2025-62504 | Envoy Lua filter use-after-free when oversized rewritten response body causes crash | 2025-10-21T08:41:18.087Z | 2025-11-06T13:25:46.476Z |
| bit-envoy-2025-62409 | Envoy allows large requests and responses to cause TCP connection pool crash | 2025-10-21T08:41:16.273Z | 2025-10-21T09:07:40.239Z |
| bit-valkey-2025-48367 | Redis DoS Vulnerability due to bad connection error handling | 2025-10-16T12:08:13.783Z | 2025-11-06T13:25:46.476Z |
| bit-valkey-2025-32023 | Redis allows out of bounds writes in hyperloglog commands leading to RCE | 2025-10-16T12:07:58.321Z | 2026-02-05T09:10:30.960Z |
| bit-redis-2025-48367 | Redis DoS Vulnerability due to bad connection error handling | 2025-10-16T12:07:00.720Z | 2025-10-16T12:31:38.153Z |
| bit-redis-2025-32023 | Redis allows out of bounds writes in hyperloglog commands leading to RCE | 2025-10-16T12:06:41.782Z | 2026-02-05T09:10:30.960Z |
| bit-keydb-2025-48367 | Redis DoS Vulnerability due to bad connection error handling | 2025-10-16T12:00:55.638Z | 2025-10-16T12:31:38.153Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2020-019 | 2020-05-13T16:44:40.000Z | 2023-08-11T17:51:24.000Z | |
| drupal-contrib-2020-018 | 2020-05-13T16:22:47.000Z | 2023-08-11T17:53:41.000Z | |
| drupal-contrib-2020-017 | 2020-05-06T17:02:39.000Z | 2023-08-11T17:54:03.000Z | |
| drupal-contrib-2020-016 | 2020-05-06T16:59:39.000Z | 2023-08-11T17:54:28.000Z | |
| drupal-contrib-2020-015 | 2020-05-06T16:55:06.000Z | 2023-08-11T17:54:54.000Z | |
| drupal-contrib-2020-014 | 2020-05-06T16:52:16.000Z | 2023-08-11T17:55:18.000Z | |
| drupal-contrib-2020-013 | 2020-05-06T16:50:39.000Z | 2023-08-11T17:55:41.000Z | |
| drupal-contrib-2020-012 | 2020-05-06T16:47:19.000Z | 2023-08-11T17:56:01.000Z | |
| drupal-contrib-2020-011 | 2020-05-06T16:43:59.000Z | 2023-08-11T17:56:25.000Z | |
| drupal-contrib-2020-010 | 2020-04-15T15:45:46.000Z | 2023-08-11T18:01:50.000Z | |
| drupal-contrib-2020-008 | 2020-03-25T18:05:38.000Z | 2023-08-11T18:00:53.000Z | |
| drupal-contrib-2020-006 | 2020-03-11T15:53:32.000Z | 2023-08-11T18:00:08.000Z | |
| drupal-contrib-2020-005 | 2020-03-04T17:06:57.000Z | 2023-08-11T17:59:40.000Z | |
| drupal-contrib-2020-004 | 2020-02-19T17:22:22.000Z | 2023-08-11T17:59:12.000Z | |
| drupal-contrib-2020-003 | 2020-02-05T16:59:21.000Z | 2023-08-11T17:58:52.000Z | |
| drupal-contrib-2020-002 | 2020-01-22T17:36:50.000Z | 2023-08-11T17:58:05.000Z | |
| drupal-contrib-2019-095 | 2019-12-11T18:59:46.000Z | 2023-08-11T18:15:27.000Z | |
| drupal-contrib-2019-094 | 2019-12-11T18:38:32.000Z | 2023-08-11T18:15:45.000Z | |
| drupal-contrib-2019-093 | 2019-12-11T18:32:17.000Z | 2023-08-11T18:16:07.000Z | |
| drupal-contrib-2019-092 | 2019-12-11T18:20:59.000Z | 2023-08-11T18:16:26.000Z | |
| drupal-contrib-2019-089 | 2019-11-13T18:10:23.000Z | 2023-08-11T18:14:07.000Z | |
| drupal-contrib-2019-088 | 2019-11-13T18:09:57.000Z | 2023-10-02T19:48:10.000Z | |
| drupal-contrib-2019-081 | 2019-11-13T18:04:58.000Z | 2023-08-11T18:22:08.000Z | |
| drupal-contrib-2019-078 | 2019-11-13T18:02:43.000Z | 2023-08-11T18:22:43.000Z | |
| drupal-contrib-2019-075 | 2019-11-06T16:10:25.000Z | 2023-08-11T18:30:06.000Z | |
| drupal-contrib-2019-074 | 2019-10-16T16:09:20.000Z | 2023-08-11T18:28:44.000Z | |
| drupal-contrib-2019-071 | 2019-10-02T16:29:46.000Z | 2023-08-11T18:27:09.000Z | |
| drupal-contrib-2019-069 | 2019-09-25T14:55:33.000Z | 2023-08-11T18:26:25.000Z | |
| drupal-contrib-2019-068 | 2019-09-25T14:43:49.000Z | 2023-08-11T18:25:53.000Z | |
| drupal-contrib-2019-067 | 2019-09-18T15:17:32.000Z | 2023-08-11T18:24:28.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-000045 | "OfferBox" App uses a hard-coded secret key | 2024-05-10T15:11+09:00 | 2024-05-10T15:11+09:00 |
| jvndb-2024-003181 | Hidden Functionality vulnerability in DT900 | 2024-05-10T13:59+09:00 | 2024-05-10T13:59+09:00 |
| jvndb-2024-000048 | Phormer vulnerable to cross-site scripting | 2024-05-10T13:48+09:00 | 2024-05-10T13:48+09:00 |
| jvndb-2024-000043 | Multiple vulnerabilities in MosP kintai kanri | 2024-05-09T14:10+09:00 | 2024-05-09T14:10+09:00 |
| jvndb-2024-000044 | WordPress Plugin "Heateor Social Login WordPress" vulnerable to cross-site scripting | 2024-05-08T13:43+09:00 | 2024-05-08T13:43+09:00 |
| jvndb-2024-003178 | Trend Micro Maximum Security vulnerable to improper link resolution (CVE-2024-32849) | 2024-05-08T10:19+09:00 | 2024-05-08T10:19+09:00 |
| jvndb-2024-003119 | NETGEAR routers vulnerable to buffer overflow | 2024-04-25T11:21+09:00 | 2024-04-25T11:21+09:00 |
| jvndb-2024-000042 | Multiple vulnerabilities in RoamWiFi R10 | 2024-04-24T13:44+09:00 | 2024-04-24T13:44+09:00 |
| jvndb-2024-003116 | Multiple vulnerabilities in OMRON Sysmac Studio/CX-One and CX-Programmer | 2024-04-24T10:13+09:00 | 2024-04-24T10:13+09:00 |
| jvndb-2024-000901 | TvRock vulnerable to cross-site request forgery | 2024-04-23T18:22+09:00 | 2024-04-23T18:22+09:00 |
| jvndb-2024-000903 | TvRock vulnerable to denial-of-service (DoS) | 2024-04-23T18:21+09:00 | 2024-04-23T18:21+09:00 |
| jvndb-2024-003108 | Armeria-saml improperly handles SAML messages | 2024-04-22T17:28+09:00 | 2024-04-22T17:28+09:00 |
| jvndb-2023-014491 | LINE client for iOS vulnerable to improper server certificate verification | 2024-04-22T15:27+09:00 | 2024-04-22T15:27+09:00 |
| jvndb-2024-000041 | Multiple vulnerabilities in WordPress Plugin "Forminator" | 2024-04-18T13:53+09:00 | 2024-04-18T13:53+09:00 |
| jvndb-2022-017175 | Proscend Communications M330-W and M330-W5 vulnerable to OS command injection | 2024-04-16T14:30+09:00 | 2024-04-16T14:30+09:00 |
| jvndb-2024-000040 | Multiple vulnerabilities in BUFFALO wireless LAN routers | 2024-04-15T16:29+09:00 | 2024-04-15T16:29+09:00 |
| jvndb-2024-000039 | Multiple vulnerabilities in a-blog cms | 2024-04-10T13:55+09:00 | 2024-04-10T13:55+09:00 |
| jvndb-2024-000038 | Multiple vulnerabilities in WordPress Plugin "Ninja Forms" | 2024-04-08T13:44+09:00 | 2024-04-08T13:44+09:00 |
| jvndb-2024-003068 | Multiple vulnerabilities in Cente middleware | 2024-04-05T15:36+09:00 | 2024-09-24T15:00+09:00 |
| jvndb-2024-000037 | Multiple vulnerabilities in NEC Aterm series | 2024-04-05T14:53+09:00 | 2024-04-05T14:53+09:00 |
| jvndb-2024-003067 | Multiple vulnerabilities in PLANEX COMMUNICATIONS wireless LAN routers | 2024-04-05T14:17+09:00 | 2024-04-05T14:17+09:00 |
| jvndb-2024-003051 | FURUNO SYSTEMS Managed Switch ACERA 9010 running in non MS mode with the initial configuration has no password | 2024-04-02T18:03+09:00 | 2024-04-02T18:03+09:00 |
| jvndb-2024-003050 | KEYENCE VT STUDIO may insecurely load Dynamic Link Libraries | 2024-04-01T14:44+09:00 | 2024-04-01T14:44+09:00 |
| jvndb-2024-003049 | Multiple vulnerabilities in KEYENCE KV STUDIO, KV REPLAY VIEWER, and VT5-WX15/WX12 | 2024-04-01T12:31+09:00 | 2024-09-25T13:51+09:00 |
| jvndb-2024-000036 | "Yahoo! JAPAN" App vulnerable to cross-site scripting | 2024-03-29T13:28+09:00 | 2024-03-29T13:28+09:00 |
| jvndb-2024-003047 | SEEnergy SVR-116 vulnerable to OS command injection | 2024-03-28T11:38+09:00 | 2024-03-28T11:38+09:00 |
| jvndb-2024-003026 | Security information for Hitachi Disk Array Systems | 2024-03-27T15:52+09:00 | 2024-03-27T15:52+09:00 |
| jvndb-2024-000035 | Multiple vulnerabilities in WordPress Plugin "Survey Maker" | 2024-03-27T14:48+09:00 | 2024-03-27T14:48+09:00 |
| jvndb-2024-000034 | SonicDICOM Media Viewer may insecurely load Dynamic Link Libraries | 2024-03-27T14:31+09:00 | 2024-03-27T14:31+09:00 |
| jvndb-2024-003025 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2024-03-27T14:26+09:00 | 2024-11-27T14:34+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-05127 | Kentico Xperience跨站脚本漏洞(CNVD-2026-05127) | 2025-12-25 | 2026-01-20 |
| cnvd-2026-05126 | Kentico Xperience富文本编辑器组件跨站脚本漏洞 | 2025-12-25 | 2026-01-20 |
| cnvd-2026-05125 | Kentico Xperience电子邮件营销模板跨站脚本漏洞 | 2025-12-25 | 2026-01-20 |
| cnvd-2026-05124 | Kentico Xperience跨站脚本漏洞(CNVD-2026-05124) | 2025-12-25 | 2026-01-20 |
| cnvd-2026-05123 | Kentico Xperience跨站脚本漏洞(CNVD-2026-05123) | 2025-12-25 | 2026-01-20 |
| cnvd-2026-05122 | Kentico Xperience跨站脚本漏洞(CNVD-2026-05122) | 2025-12-25 | 2026-01-20 |
| cnvd-2026-05121 | Kentico Xperience跨站脚本漏洞(CNVD-2026-05121) | 2025-12-25 | 2026-01-20 |
| cnvd-2026-05120 | Kentico Xperience跨站脚本漏洞(CNVD-2026-05120) | 2025-12-25 | 2026-01-20 |
| cnvd-2026-05119 | Kentico Xperience跨站脚本漏洞(CNVD-2026-05119) | 2025-12-25 | 2026-01-20 |
| cnvd-2026-05019 | TOTOLINK T10缓冲区溢出漏洞 | 2025-12-25 | 2026-01-14 |
| cnvd-2026-04266 | Kentico Xperience跨站脚本漏洞(CNVD-2026-04266) | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04265 | Kentico Xperience跨站脚本漏洞(CNVD-2026-04265) | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04264 | Kentico Xperience存在未明漏洞(CNVD-2026-04264) | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04263 | Kentico Xperience存在未明漏洞(CNVD-2026-04263) | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04262 | Kentico Xperience安全绕过漏洞 | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04261 | Kentico Xperience跨站脚本漏洞(CNVD-2026-04261) | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04247 | Kentico Xperience信息泄露漏洞(CNVD-2026-04247) | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04246 | Kentico Xperience访问控制绕过漏洞 | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04245 | Kentico Xperience信息泄露漏洞 | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04244 | Kentico Xperience拒绝服务漏洞 | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04243 | Kentico Xperience跨站脚本漏洞 | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04242 | Kentico Xperience SQL注入漏洞 | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04241 | Kentico Xperience CRLF注入漏洞 | 2025-12-25 | 2026-01-16 |
| cnvd-2026-04240 | Kentico Xperience Content-Type跨站脚本漏洞 | 2025-12-25 | 2026-01-16 |
| cnvd-2026-04238 | Apple macOS Tahoe信息泄露漏洞(CNVD-2026-04238) | 2025-12-25 | 2026-01-16 |
| cnvd-2026-04237 | Apple macOS Tahoe存在未明漏洞(CNVD-2026-04237) | 2025-12-25 | 2026-01-16 |
| cnvd-2026-04236 | Apple macOS Tahoe信息泄露漏洞(CNVD-2026-04236) | 2025-12-25 | 2026-01-16 |
| cnvd-2026-04235 | Apple macOS Tahoe信息泄露漏洞(CNVD-2026-04235) | 2025-12-25 | 2026-01-16 |
| cnvd-2026-04234 | Apple macOS Tahoe存在未明漏洞(CNVD-2026-04234) | 2025-12-25 | 2026-01-16 |
| cnvd-2026-04233 | Apple macOS Tahoe信息泄露漏洞(CNVD-2026-04233) | 2025-12-25 | 2026-01-16 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01334 | Уязвимость функции __drm_gem_fb_end_cpu_access() модуля drivers/gpu/drm/drm_gem_framebuff… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01333 | Уязвимость функции drm_gem_prime_handle_to_dmabuf() модуля drivers/gpu/drm/drm_prime.c др… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01332 | Уязвимость функции ses_enclosure_data_process() модуля drivers/scsi/ses.c драйвера устрой… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01331 | Уязвимость функции ses_enclosure_data_process() модуля drivers/scsi/ses.c драйвера устрой… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01330 | Уязвимость функции __netpoll_setup() ядра операционной системы Linux, позволяющая нарушит… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01329 | Уязвимость функции fpu_vstl() ядра операционной системы Linux, позволяющая нарушителю выз… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01328 | Уязвимость функции tuning_ctl_set() модуля sound/pci/hda/patch_ca0132.c звуковой подсисте… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01327 | Уязвимость функции flush_cache_all_local() модуля arch/parisc/include/asm/cacheflush.h по… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01326 | Уязвимость функции sddr55_write_data() модуля drivers/usb/storage/sddr55.c драйвера устро… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01325 | Уязвимость функции iommu_mmio_write() ядра операционной системы Linux, позволяющая наруши… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01324 | Уязвимость функции rxstate() ядра операционной системы Linux, позволяющая нарушителю полу… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01323 | Уязвимость функции handle_auth_session_key() модуля net/ceph/auth_x.c реализации сетевых … | 06.02.2026 | 06.02.2026 |
| bdu:2026-01322 | Уязвимость функции udp_tunnel_nic_netdevice_event() модуля net/ipv4/udp_tunnel_nic.c реал… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01321 | Уязвимость функции true_sectors_per_clst() ядра операционной системы Linux, позволяющая н… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01320 | Уязвимость функции ath11k_mac_setup_channels_rates() ядра операционной системы Linux, поз… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01319 | Уязвимость функции relocate_one_page() ядра операционной системы Linux, позволяющая наруш… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01318 | Уязвимость функции tcp_fastopen_active_disable_ofo_check() модуля net/ipv4/tcp_fastopen.c… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01317 | Уязвимость функции hci_remove_adv_monitor() ядра операционной системы Linux, позволяющая … | 06.02.2026 | 06.02.2026 |
| bdu:2026-01316 | Уязвимость функции nfs4_setup_readdir() модуля fs/nfs/nfs4proc.c поддержки клиентов NFS я… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01315 | Уязвимость функции iopt_alloc_pages() ядра операционной системы Linux, позволяющая наруши… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01314 | Уязвимость функции filter() ядра операционной системы Linux, позволяющая нарушителю оказа… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01313 | Уязвимость функции sco_sock_kill() модуля net/bluetooth/sco.c подсистемы Bluetooth ядра о… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01312 | Уязвимость функции bcsp_recv() модуля drivers/bluetooth/hci_bcsp.c драйвера устройств Blu… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01311 | Уязвимость функции virtio_gpu_cmd_transfer_to_host_2d() ядра операционной системы Linux, … | 06.02.2026 | 06.02.2026 |
| bdu:2026-01310 | Уязвимость функции snd_usbmidi_output_open() модуля sound/usb/midi.c поддержки звуковых у… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01309 | Уязвимость функции ntfs_read_mft() ядра операционной системы Linux, позволяющая нарушител… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01308 | Уязвимость функции bit_putcs() модуля drivers/video/fbdev/core/bitblit.c драйвера устройс… | 06.02.2026 | 06.02.2026 |
| bdu:2026-01307 | Уязвимость функции safexcel_probe_generic() ядра операционной системы Linux, позволяющая … | 06.02.2026 | 06.02.2026 |
| bdu:2026-01306 | Уязвимость функций hfs_find_init() и hfs_brec_find() модуля fs/hfsplus/bfind.c поддержки … | 06.02.2026 | 06.02.2026 |
| bdu:2026-01305 | Уязвимость функции map_create() ядра операционной системы Linux, позволяющая нарушителю в… | 06.02.2026 | 06.02.2026 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0992 | Multiples vulnérabilités dans Apache OpenOffice | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0991 | Multiples vulnérabilités dans les produits Mozilla | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0990 | Vulnérabilité dans Google Chrome | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0989 | Vulnérabilité dans Nagios XI | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0988 | Vulnérabilité dans Ivanti Endpoint Manager (EPM) | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0987 | Vulnérabilité dans les produits Citrix | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0986 | Vulnérabilité dans Schneider Electric EcoStruxure | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0985 | Multiples vulnérabilités dans les produits Axis | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0984 | Vulnérabilité dans Bitdefender Endpoint Security Tools pour Mac | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0983 | Vulnérabilité dans Synology BeeStation | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0982 | Multiples vulnérabilités dans les produits SAP | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0981 | Multiples vulnérabilités dans les produits Qnap | 2025-11-10T00:00:00.000000 | 2025-11-10T00:00:00.000000 |
| certfr-2025-avi-0980 | Multiples vulnérabilités dans les produits IBM | 2025-11-07T00:00:00.000000 | 2025-11-07T00:00:00.000000 |
| certfr-2025-avi-0979 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-11-07T00:00:00.000000 | 2025-11-07T00:00:00.000000 |
| certfr-2025-avi-0978 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-11-07T00:00:00.000000 | 2025-11-07T00:00:00.000000 |
| certfr-2025-avi-0977 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-11-07T00:00:00.000000 | 2025-11-07T00:00:00.000000 |
| certfr-2025-avi-0976 | Multiples vulnérabilités dans Microsoft Edge | 2025-11-07T00:00:00.000000 | 2025-11-07T00:00:00.000000 |
| certfr-2025-avi-0975 | Vulnérabilité dans Elastic Defend | 2025-11-07T00:00:00.000000 | 2025-11-07T00:00:00.000000 |
| certfr-2025-avi-0974 | Multiples vulnérabilités dans Apple iOS et iPadOS | 2025-11-06T00:00:00.000000 | 2025-11-06T00:00:00.000000 |
| certfr-2025-avi-0973 | Multiples vulnérabilités dans Google Chrome | 2025-11-06T00:00:00.000000 | 2025-11-06T00:00:00.000000 |
| certfr-2025-avi-0972 | Multiples vulnérabilités dans Suricata | 2025-11-06T00:00:00.000000 | 2025-11-06T00:00:00.000000 |
| certfr-2025-avi-0971 | Vulnérabilité dans Mattermost Server | 2025-11-06T00:00:00.000000 | 2025-11-06T00:00:00.000000 |
| certfr-2025-avi-0970 | Multiples vulnérabilités dans Synacor Zimbra Collaboration | 2025-11-06T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| certfr-2025-avi-0969 | Multiples vulnérabilités dans les produits VMware | 2025-11-06T00:00:00.000000 | 2025-11-06T00:00:00.000000 |
| certfr-2025-avi-0968 | Multiples vulnérabilités dans les produits Cisco | 2025-11-06T00:00:00.000000 | 2025-11-06T00:00:00.000000 |
| certfr-2025-avi-0967 | Multiples vulnérabilités dans les produits VMware | 2025-11-05T00:00:00.000000 | 2025-11-05T00:00:00.000000 |
| certfr-2025-avi-0966 | Multiples vulnérabilités dans les produits Microsoft | 2025-11-05T00:00:00.000000 | 2025-11-05T00:00:00.000000 |
| certfr-2025-avi-0965 | Multiples vulnérabilités dans MISP | 2025-11-05T00:00:00.000000 | 2025-11-05T00:00:00.000000 |
| certfr-2025-avi-0964 | Vulnérabilité dans Curl | 2025-11-05T00:00:00.000000 | 2025-11-05T00:00:00.000000 |
| certfr-2025-avi-0963 | Multiples vulnérabilités dans Google Android | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2001-ale-010 | Propagation du ver "Code Blue" | 2001-09-07T00:00:00.000000 | 2001-09-07T00:00:00.000000 |
| certa-2001-ale-009 | Propagation importante du virus SirCam | 2001-07-24T00:00:00.000000 | 2001-07-26T00:00:00.000000 |
| certa-2001-ale-008 | Propagation du ver « Code Red » | 2001-07-18T00:00:00.000000 | 2001-08-13T00:00:00.000000 |
| certa-2001-ale-007 | Propagation d'un ver affectant sadmind et IIS | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| certa-2001-ale-006 | Prolifération en Europe du virus HOMEPAGE | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| certa-2001-ale-005 | Vulnérabilités dans les modems ADSL d'Alcatel | 2001-04-11T00:00:00.000000 | 2001-04-11T00:00:00.000000 |
| certa-2001-ale-004 | Vulnérabilité dans le démon snmpXdmid sous Sun Solaris | 2001-03-30T00:00:00.000000 | 2001-03-30T00:00:00.000000 |
| certa-2001-ale-003 | Prolifération du ver Li0n | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| certa-2001-ale-002 | Risque d'exploitation des ressources partagées sous Windows | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| certa-2001-ale-001 | Propagation du ver Ramen sous Linux. | 2001-01-19T00:00:00.000000 | 2001-01-19T00:00:00.000000 |
| certa-2000-ale-016 | Connexion à Wanadoo | 2000-11-30T00:00:00.000000 | 2000-11-30T00:00:00.000000 |
| certa-2000-ale-015 | Risque d'usurpation de l'identité de Sun Microsystems | 2000-10-25T00:00:00.000000 | 2000-10-25T00:00:00.000000 |
| certa-2000-ale-013 | Virus VBS Quatro-A | 2000-09-18T00:00:00.000000 | 2000-09-18T00:00:00.000000 |
| certa-2000-ale-014 | Vulnérabilité dans la bibliothèque glibc sous Unix | 2000-09-14T00:00:00.000000 | 2000-09-14T00:00:00.000000 |
| certa-2000-ale-012 | Mauvaise compatibilité des scanners de virus avec NTFS | 2000-09-08T00:00:00.000000 | 2000-09-08T00:00:00.000000 |
| certa-2000-ale-011 | Trojan Simpsons | 2000-06-29T00:00:00.000000 | 2000-06-29T00:00:00.000000 |
| certa-2000-ale-010 | Vulnérabilités dans le serveur de fichier wu-ftpd | 2000-06-26T00:00:00.000000 | 2000-06-26T00:00:00.000000 |
| certa-2000-ale-009 | Ver VBS/Stages-A, Mirc/stages-a, pIRC/Stages-A | 2000-06-20T00:00:00.000000 | 2000-06-20T00:00:00.000000 |
| certa-2000-ale-008 | The Serbian Badman Trojan (TSB) | 2000-06-13T00:00:00.000000 | 2000-06-13T00:00:00.000000 |
| certa-2000-ale-007 | Virus VBS/LoveLet-AS | 2000-06-09T00:00:00.000000 | 2000-06-09T00:00:00.000000 |
| certa-2000-ale-006 | Deni de service sous Firewall-1 | 2000-06-08T00:00:00.000000 | 2000-06-08T00:00:00.000000 |
| certa-2000-ale-005 | Virus macro V97M/Resume.A | 2000-05-29T00:00:00.000000 | 2000-05-29T00:00:00.000000 |
| certa-2000-ale-004 | Virus Macro OF97/Cybernet-A | 2000-05-26T00:00:00.000000 | 2000-05-26T00:00:00.000000 |
| certa-2000-ale-003 | « Mesures de performances » de l'Internet | 2000-05-26T00:00:00.000000 | 2000-05-26T00:00:00.000000 |
| certa-2000-ale-002 | Alerte de virus NEWLOVE | 2000-05-19T00:00:00.000000 | 2000-05-19T00:00:00.000000 |
| certa-2000-ale-001 | Alerte de virus LOVE-LETTER-FOR-YOU | 2000-05-05T00:00:00.000000 | 2000-07-05T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-1034 | Heap-buffer-overflow in simdutf::haswell::implementation::convert_utf8_to_utf16be | 2024-08-18T00:08:22.168066Z | 2024-08-18T14:21:16.718581Z |
| osv-2024-1029 | Stack-buffer-overflow in gf_hevc_parse_nalu_bs | 2024-08-17T00:13:24.697197Z | 2024-08-17T00:13:24.697938Z |
| osv-2024-1023 | Use-of-uninitialized-value in pcpp::SomeIpLayer::parseSomeIpLayer | 2024-08-16T00:17:01.984623Z | 2025-12-22T14:18:12.391769Z |
| osv-2024-1010 | UNKNOWN READ in H5SL_first | 2024-08-16T00:16:31.692553Z | 2025-08-14T14:39:40.358063Z |
| osv-2024-1009 | Heap-buffer-overflow in pcpp::Layer::shortenLayer | 2024-08-16T00:16:31.167287Z | 2025-10-21T14:37:47.186948Z |
| osv-2024-996 | Use-of-uninitialized-value in cups_array_find | 2024-08-16T00:15:52.987192Z | 2024-08-16T00:15:52.987525Z |
| osv-2024-994 | Use-of-uninitialized-value in packet_parse | 2024-08-16T00:15:48.093497Z | 2024-08-16T00:15:48.093872Z |
| osv-2024-987 | Heap-buffer-overflow in pcpp::NDPNeighborAdvertisementLayer::toString | 2024-08-16T00:15:31.057826Z | 2025-04-16T14:29:47.716122Z |
| osv-2024-985 | Heap-double-free in libssh2_default_free | 2024-08-16T00:15:23.884058Z | 2024-08-16T00:15:23.884369Z |
| osv-2024-983 | UNKNOWN READ in ireclaim | 2024-08-16T00:15:21.362695Z | 2024-08-16T00:15:21.363094Z |
| osv-2024-978 | Stack-buffer-overflow in narrow_conv_backprop | 2024-08-16T00:15:00.390591Z | 2025-01-10T05:19:36.120081Z |
| osv-2024-969 | Security exception in com.github.javaparser.GeneratedJavaParser.Expression | 2024-08-16T00:14:31.527023Z | 2024-08-16T00:14:31.527538Z |
| osv-2024-967 | Heap-buffer-overflow in pcpp::byteArrayToHexString | 2024-08-16T00:14:27.813459Z | 2025-10-22T18:24:09.671012Z |
| osv-2024-965 | Stack-buffer-overflow in FLAC__stream_encoder_init_ogg_file | 2024-08-16T00:14:23.665242Z | 2024-08-16T00:14:23.665768Z |
| osv-2024-964 | Security exception in com.alibaba.fastjson2.JSONPathSegment$CycleNameSegment$MapLoop.accept | 2024-08-16T00:14:15.405443Z | 2024-08-16T00:14:15.405835Z |
| osv-2024-963 | Heap-buffer-overflow in GfxTilingPattern::scanXObjectForBlendMode | 2024-08-16T00:14:14.315705Z | 2024-08-16T00:14:14.316160Z |
| osv-2024-957 | Heap-buffer-overflow in pcpp::computeChecksum | 2024-08-16T00:13:51.457458Z | 2025-10-22T18:24:27.257255Z |
| osv-2024-955 | Use-of-uninitialized-value in pcpp::IPv6Address::toString | 2024-08-16T00:13:46.718533Z | 2024-08-16T00:13:46.718830Z |
| osv-2024-954 | Use-of-uninitialized-value in pcpp::MplsLayer::toString | 2024-08-16T00:13:43.824630Z | 2025-12-22T14:21:33.246456Z |
| osv-2024-953 | UNKNOWN READ in pcpp::PcapNgFileReaderDevice::getNextPacket | 2024-08-16T00:13:41.933683Z | 2025-12-22T14:21:34.886075Z |
| osv-2024-951 | Index-out-of-bounds in hevc_ref_pic_lists_modification | 2024-08-16T00:13:38.322516Z | 2024-08-16T00:13:38.322849Z |
| osv-2024-947 | Heap-buffer-overflow in pcpp::SomeIpSdEntry::SomeIpSdEntry | 2024-08-16T00:13:30.824621Z | 2025-04-03T14:42:12.138019Z |
| osv-2024-939 | Security exception in org.apache.poi.util.LZWDecompresser.decompress | 2024-08-16T00:13:05.088720Z | 2024-08-16T00:13:05.089105Z |
| osv-2024-925 | Index-out-of-bounds in derive_collocated_motion_vectors | 2024-08-16T00:11:02.964872Z | 2024-08-16T00:11:02.965320Z |
| osv-2024-919 | Heap-buffer-overflow in validate_relpath | 2024-08-16T00:09:34.461792Z | 2025-03-06T14:20:56.754046Z |
| osv-2024-914 | UNKNOWN READ in boost::re_detail_500::basic_regex_formatter<std::__1::ostream_iterator<char, cha | 2024-08-16T00:08:20.277708Z | 2025-12-11T14:11:53.186916Z |
| osv-2024-883 | Security exception in com.puppycrawl.tools.checkstyle.JavaAstVisitor.getInnerBopAst | 2024-08-16T00:06:29.139503Z | 2024-08-16T00:06:29.139893Z |
| osv-2024-879 | Security exception in java.base/java.util.Arrays.copyOf | 2024-08-16T00:06:11.887593Z | 2024-08-16T00:06:11.888006Z |
| osv-2024-867 | Use-of-uninitialized-value in std::__1::ostreambuf_iterator<char, std::__1::char_traits<char>> std::__1::__pad | 2024-08-16T00:05:38.614485Z | 2025-03-19T14:29:11.494602Z |
| osv-2024-861 | UNKNOWN READ in chunk_free_object | 2024-08-16T00:05:25.024909Z | 2024-08-16T00:05:25.025249Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2023-0048 | Unsoundness in `intern` methods on `intaglio` symbol interners | 2023-07-26T12:00:00Z | 2023-07-29T17:20:00Z |
| rustsec-2023-0089 | atomic-polyfill is unmaintained | 2023-07-11T12:00:00Z | 2025-04-29T08:31:10Z |
| rustsec-2023-0047 | impl `FromMdbValue` for bool is unsound | 2023-06-26T12:00:00Z | 2023-07-29T17:20:00Z |
| rustsec-2023-0045 | memoffset allows reading uninitialized memory | 2023-06-21T12:00:00Z | 2023-07-08T12:30:19Z |
| rustsec-2023-0044 | `openssl` `X509VerifyParamRef::set_host` buffer over-read | 2023-06-20T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0046 | Misaligned pointer dereference in `ChunkId::new` | 2023-06-15T12:00:00Z | 2023-07-08T12:30:19Z |
| rustsec-2023-0042 | Ouroboros is Unsound | 2023-06-11T12:00:00Z | 2023-07-08T12:30:19Z |
| rustsec-2023-0041 | Remote Attackers can cause Denial-of-Service (packet loops) with crafted DNS packets | 2023-06-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0040 | `users` crate is unmaintained | 2023-06-01T12:00:00Z | 2023-08-21T10:35:45Z |
| rustsec-2023-0039 | Out-of-bounds array access leads to panic | 2023-05-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0038 | Out-of-bounds array access leads to panic | 2023-05-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0037 | crate has been renamed to `crypto_secretbox` | 2023-05-16T12:00:00Z | 2023-05-17T03:02:51Z |
| rustsec-2023-0066 | Vulnerable to privilege escalation using ioctls TIOCSTI and TIOCLINUX | 2023-04-29T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0092 | Undefined Behavior in Rust runtime functions | 2023-04-21T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2023-0035 | Adverserial use of `make_bitflags!` macro can cause undefined behavior | 2023-04-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0034 | Resource exhaustion vulnerability in h2 may lead to Denial of Service (DoS) | 2023-04-14T12:00:00Z | 2023-04-20T19:17:55Z |
| rustsec-2023-0033 | Parsing borsh messages with ZST which are not-copy/clone is unsound | 2023-04-12T12:00:00Z | 2024-09-23T15:02:17Z |
| rustsec-2023-0050 | multipart is Unmaintained | 2023-04-11T12:00:00Z | 2023-08-18T20:38:40Z |
| rustsec-2023-0036 | tree_magic is Unmaintained | 2023-04-11T12:00:00Z | 2023-04-25T03:08:42Z |
| rustsec-2023-0031 | Initialisation failure in `Once::try_call_once` can lead to undefined behaviour for other initialisers | 2023-03-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0030 | `Versionize::deserialize` implementation for `FamStructWrapper<T>` is lacking bound checks, potentially leading to out of bounds memory accesses | 2023-03-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0029 | TLS certificate common name validation bypass | 2023-03-24T12:00:00Z | 2023-11-08T09:57:41Z |
| rustsec-2023-0027 | TLS certificate common name validation bypass | 2023-03-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0024 | `openssl` `X509Extension::new` and `X509Extension::new_nid` null pointer dereference | 2023-03-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0023 | `openssl` `SubjectAlternativeName` and `ExtendedKeyUsage::other` allow arbitrary file read | 2023-03-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0022 | `openssl` `X509NameBuilder::build` returned object is not thread safe | 2023-03-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0032 | Unsound FFI: Wrong API usage causes write past allocated area | 2023-03-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0021 | NULL pointer dereference in `stb_image` | 2023-03-19T12:00:00Z | 2023-07-15T15:07:13Z |
| rustsec-2023-0026 | Gitoxide has renamed its crates. | 2023-03-14T12:00:00Z | 2023-03-24T15:33:49Z |
| rustsec-2023-0025 | Gitoxide has renamed its crates. | 2023-03-14T12:00:00Z | 2023-03-24T15:33:49Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:19584 | Moderate: galera and mariadb security update | 2025-11-04T00:00:00Z | 2025-11-07T09:36:35Z |
| alsa-2025:19572 | Moderate: mariadb:10.5 security update | 2025-11-04T00:00:00Z | 2025-11-07T09:54:08Z |
| alsa-2025:19566 | Moderate: osbuild-composer security update | 2025-11-04T00:00:00Z | 2025-11-07T10:05:01Z |
| alsa-2025:19489 | Important: tigervnc security update | 2025-11-03T00:00:00Z | 2025-11-07T10:26:16Z |
| alsa-2025:19469 | Moderate: kernel security update | 2025-11-03T00:00:00Z | 2025-11-07T13:52:08Z |
| alsa-2025:19447 | Moderate: kernel security update | 2025-11-03T00:00:00Z | 2025-11-07T10:53:58Z |
| alsa-2025:19440 | Moderate: kernel-rt security update | 2025-11-03T00:00:00Z | 2025-11-07T11:04:50Z |
| alsa-2025:19435 | Moderate: xorg-x11-server-Xwayland security update | 2025-11-03T00:00:00Z | 2025-11-07T11:12:17Z |
| alsa-2025:19434 | Moderate: xorg-x11-server security update | 2025-11-03T00:00:00Z | 2026-01-05T21:05:53Z |
| alsa-2025:19432 | Moderate: xorg-x11-server-Xwayland security update | 2025-11-03T00:00:00Z | 2025-11-07T11:17:51Z |
| alsa-2025:19409 | Moderate: kernel security update | 2025-11-03T00:00:00Z | 2025-11-07T11:55:27Z |
| alsa-2025:19403 | Important: expat security update | 2025-11-03T00:00:00Z | 2025-11-07T12:04:59Z |
| alsa-2025:19345 | Important: redis:7 security update | 2025-10-30T00:00:00Z | 2025-11-07T12:12:46Z |
| alsa-2025:19276 | Important: libtiff security update | 2025-10-29T00:00:00Z | 2025-10-31T08:23:09Z |
| alsa-2025:19238 | Important: redis:6 security update | 2025-10-29T00:00:00Z | 2025-10-30T07:01:24Z |
| alsa-2025:19237 | Important: redis security update | 2025-10-29T00:00:00Z | 2025-10-30T07:03:54Z |
| alsa-2025:19156 | Important: libtiff security update | 2025-10-28T00:00:00Z | 2025-10-30T10:20:53Z |
| alsa-2025:19113 | Important: libtiff security update | 2025-10-27T00:00:00Z | 2025-10-28T07:58:42Z |
| alsa-2025:19107 | Important: squid:4 security update | 2025-10-27T00:00:00Z | 2025-10-28T09:25:35Z |
| alsa-2025:19103 | Moderate: kernel-rt security update | 2025-10-27T00:00:00Z | 2025-10-28T07:51:20Z |
| alsa-2025:19102 | Moderate: kernel security update | 2025-10-27T00:00:00Z | 2025-10-28T07:55:37Z |
| alsa-2025:18983 | Important: thunderbird security update | 2025-10-22T00:00:00Z | 2025-10-27T08:16:53Z |
| alsa-2025:18824 | Moderate: java-21-openjdk security update | 2025-10-22T00:00:00Z | 2025-10-30T07:10:16Z |
| alsa-2025:18821 | Moderate: java-17-openjdk security update | 2025-10-22T00:00:00Z | 2025-10-30T07:28:25Z |
| alsa-2025:18815 | Moderate: java-1.8.0-openjdk security update | 2025-10-22T00:00:00Z | 2025-10-30T11:04:43Z |
| alsa-2025:18321 | Important: thunderbird security update | 2025-10-20T00:00:00Z | 2025-10-22T10:38:17Z |
| alsa-2025:18320 | Important: thunderbird security update | 2025-10-20T00:00:00Z | 2025-10-22T10:33:35Z |
| alsa-2025:18318 | Moderate: kernel security update | 2025-10-20T00:00:00Z | 2025-10-22T10:27:59Z |
| alsa-2025:18298 | Moderate: kernel-rt security update | 2025-10-20T00:00:00Z | 2025-10-20T12:08:20Z |
| alsa-2025:18297 | Moderate: kernel security update | 2025-10-20T00:00:00Z | 2025-10-20T12:01:40Z |