Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-21403 |
6.4 (3.1)
|
On-Premises Data Gateway Information Disclosure Vulner… |
Microsoft |
On-Premises Data Gateway |
2025-01-14T18:04:13.337Z | 2026-02-26T19:09:14.864Z |
| CVE-2025-1974 |
9.8 (3.1)
|
ingress-nginx admission controller RCE escalation |
kubernetes |
ingress-nginx |
2025-03-24T23:28:48.985Z | 2026-02-26T19:09:14.726Z |
| CVE-2025-21158 |
7.8 (3.1)
|
InDesign Desktop | Integer Underflow (Wrap or Wraparou… |
Adobe |
InDesign Desktop |
2025-02-11T17:10:47.804Z | 2026-02-26T19:09:14.593Z |
| CVE-2025-21335 |
7.8 (3.1)
|
Windows Hyper-V NT Kernel Integration VSP Elevation of… |
Microsoft |
Windows 10 Version 21H2 |
2025-01-14T18:04:17.808Z | 2026-02-26T19:09:14.341Z |
| CVE-2025-21156 |
7.8 (3.1)
|
InCopy | Integer Underflow (Wrap or Wraparound) (CWE-191) |
Adobe |
InCopy |
2025-02-11T17:21:25.696Z | 2026-02-26T19:09:14.174Z |
| CVE-2025-1097 |
8.8 (3.1)
|
ingress-nginx controller - configuration injection via… |
kubernetes |
ingress-nginx |
2025-03-24T23:29:05.879Z | 2026-02-26T19:09:14.028Z |
| CVE-2025-21187 |
7.8 (3.1)
|
Microsoft Power Automate Remote Code Execution Vulnerability |
Microsoft |
Power Automate for Desktop |
2025-01-14T18:04:20.259Z | 2026-02-26T19:09:13.876Z |
| CVE-2025-21159 |
7.8 (3.1)
|
Illustrator | Use After Free (CWE-416) |
Adobe |
Illustrator |
2025-02-11T17:27:39.557Z | 2026-02-26T19:09:13.710Z |
| CVE-2025-21186 |
7.8 (3.1)
|
Microsoft Access Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-01-14T18:04:20.776Z | 2026-02-26T19:09:13.442Z |
| CVE-2025-1098 |
8.8 (3.1)
|
ingress-nginx controller - configuration injection via… |
kubernetes |
ingress-nginx |
2025-03-24T23:29:15.610Z | 2026-02-26T19:09:13.280Z |
| CVE-2025-21163 |
7.8 (3.1)
|
Illustrator | Stack-based Buffer Overflow (CWE-121) |
Adobe |
Illustrator |
2025-02-11T17:27:40.356Z | 2026-02-26T19:09:13.139Z |
| CVE-2025-21224 |
8.1 (3.1)
|
Windows Line Printer Daemon (LPD) Service Remote Code … |
Microsoft |
Windows 10 Version 21H2 |
2025-01-14T18:04:22.623Z | 2026-02-26T19:09:12.951Z |
| CVE-2025-24514 |
8.8 (3.1)
|
ingress-nginx controller - configuration injection via… |
kubernetes |
ingress-nginx |
2025-03-24T23:29:36.802Z | 2026-02-26T19:09:12.808Z |
| CVE-2025-21160 |
7.8 (3.1)
|
Illustrator | Integer Underflow (Wrap or Wraparound) (… |
Adobe |
Illustrator |
2025-02-11T17:27:41.155Z | 2026-02-26T19:09:12.642Z |
| CVE-2025-21172 |
7.5 (3.1)
|
.NET and Visual Studio Remote Code Execution Vulnerability |
Microsoft |
.NET 8.0 |
2025-01-14T18:04:38.469Z | 2026-02-26T19:09:12.470Z |
| CVE-2024-58104 |
7.3 (3.1)
|
A vulnerability in the Trend Micro Apex One Secu… |
Trend Micro, Inc. |
Trend Micro Apex One |
2025-03-25T17:37:28.783Z | 2026-02-26T19:09:12.303Z |
| CVE-2025-24410 |
8.7 (3.1)
|
Adobe Commerce | Cross-site Scripting (Stored XSS) (CWE-79) |
Adobe |
Adobe Commerce |
2025-02-11T17:37:33.017Z | 2026-02-26T19:09:12.134Z |
| CVE-2025-21361 |
7.8 (3.1)
|
Microsoft Outlook Remote Code Execution Vulnerability |
Microsoft |
Microsoft Office LTSC for Mac 2021 |
2025-01-14T18:04:43.571Z | 2026-02-26T19:09:11.962Z |
| CVE-2024-58105 |
7.3 (3.1)
|
A vulnerability in the Trend Micro Apex One Secu… |
Trend Micro, Inc. |
Trend Micro Apex One |
2025-03-25T17:37:39.464Z | 2026-02-26T19:09:11.806Z |
| CVE-2025-24412 |
8.7 (3.1)
|
Adobe Commerce | Cross-site Scripting (Stored XSS) (CWE-79) |
Adobe |
Adobe Commerce |
2025-02-11T17:37:36.216Z | 2026-02-26T19:09:11.638Z |
| CVE-2025-21372 |
7.8 (3.1)
|
Microsoft Brokering File System Elevation of Privilege… |
Microsoft |
Windows 11 Version 24H2 |
2025-01-14T18:04:44.826Z | 2026-02-26T19:09:11.485Z |
| CVE-2025-24417 |
8.7 (3.1)
|
Adobe Commerce | Cross-site Scripting (Stored XSS) (CWE-79) |
Adobe |
Adobe Commerce |
2025-02-11T17:37:39.575Z | 2026-02-26T19:09:11.348Z |
| CVE-2025-21402 |
7.8 (3.1)
|
Microsoft Office OneNote Remote Code Execution Vulnerability |
Microsoft |
Microsoft Office LTSC for Mac 2021 |
2025-01-14T18:04:46.460Z | 2026-02-26T19:09:11.196Z |
| CVE-2025-2783 |
8.3 (3.1)
|
Incorrect handle provided in unspecified circumst… |
Google |
Chrome |
2025-03-26T16:07:51.034Z | 2026-02-26T19:09:11.033Z |
| CVE-2025-24418 |
8.1 (3.1)
|
Adobe Commerce | Improper Authorization (CWE-285) |
Adobe |
Adobe Commerce |
2025-02-11T17:37:41.236Z | 2026-02-26T19:09:10.892Z |
| CVE-2025-21333 |
7.8 (3.1)
|
Windows Hyper-V NT Kernel Integration VSP Elevation of… |
Microsoft |
Windows 10 Version 21H2 |
2025-01-14T18:04:50.962Z | 2026-02-26T19:09:10.751Z |
| CVE-2025-30407 |
6.3 (3.0)
|
Local privilege escalation due to a binary hijack… |
Acronis |
Acronis Cyber Protect Cloud Agent |
2025-03-26T21:32:30.085Z | 2026-02-26T19:09:10.614Z |
| CVE-2025-24438 |
8.7 (3.1)
|
Adobe Commerce | Cross-site Scripting (Stored XSS) (CWE-79) |
Adobe |
Adobe Commerce |
2025-02-11T17:37:42.877Z | 2026-02-26T19:09:10.474Z |
| CVE-2025-21334 |
7.8 (3.1)
|
Windows Hyper-V NT Kernel Integration VSP Elevation of… |
Microsoft |
Windows 10 Version 21H2 |
2025-01-14T18:04:51.608Z | 2026-02-26T19:09:10.178Z |
| CVE-2025-20231 |
7.1 (3.1)
|
Sensitive Information Disclosure in Splunk Secure Gate… |
Splunk |
Splunk Enterprise |
2025-03-26T21:45:41.250Z | 2026-02-26T19:09:10.032Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-68211 | In the Linux kernel, the following vulnerability has been resolved: ksm: use range-walk function t… | 2025-12-16T14:15:54.023 | 2026-02-26T15:52:42.263 |
| fkie_cve-2025-40251 | In the Linux kernel, the following vulnerability has been resolved: devlink: rate: Unset parent po… | 2025-12-04T16:16:18.663 | 2026-02-26T15:52:30.673 |
| fkie_cve-2025-40164 | In the Linux kernel, the following vulnerability has been resolved: usbnet: Fix using smp_processo… | 2025-11-12T11:15:46.660 | 2026-02-26T15:52:02.207 |
| fkie_cve-2025-40149 | In the Linux kernel, the following vulnerability has been resolved: tls: Use __sk_dst_get() and ds… | 2025-11-12T11:15:44.817 | 2026-02-26T15:51:45.843 |
| fkie_cve-2025-40090 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix recursive locking i… | 2025-10-30T10:15:33.537 | 2026-02-26T15:51:30.927 |
| fkie_cve-2025-40082 | In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix slab-out-of-bound… | 2025-10-28T12:15:42.840 | 2026-02-26T15:51:15.730 |
| fkie_cve-2025-40040 | In the Linux kernel, the following vulnerability has been resolved: mm/ksm: fix flag-dropping beha… | 2025-10-28T12:15:37.967 | 2026-02-26T15:51:08.683 |
| fkie_cve-2025-40039 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix race condition in R… | 2025-10-28T12:15:37.847 | 2026-02-26T15:50:57.663 |
| fkie_cve-2025-40005 | In the Linux kernel, the following vulnerability has been resolved: spi: cadence-quadspi: Implemen… | 2025-10-20T16:15:37.127 | 2026-02-26T15:50:38.530 |
| fkie_cve-2026-27691 | iccDEV provides a set of libraries and tools for working with ICC color management profiles. In ver… | 2026-02-25T15:20:52.553 | 2026-02-26T15:50:36.843 |
| fkie_cve-2026-27692 | iccDEV provides a set of libraries and tools for working with ICC color management profiles. In ver… | 2026-02-25T15:20:52.727 | 2026-02-26T15:43:56.077 |
| fkie_cve-2026-27695 | zae-limiter is a rate limiting library using the token bucket algorithm. Prior to version 0.10.1, a… | 2026-02-25T15:20:52.907 | 2026-02-26T15:38:45.277 |
| fkie_cve-2026-27468 | Mastodon is a free, open-source social network server based on ActivityPub. FASP registration requi… | 2026-02-24T18:29:33.660 | 2026-02-26T15:36:00.510 |
| fkie_cve-2026-27483 | MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 2… | 2026-02-24T15:21:38.060 | 2026-02-26T15:35:44.480 |
| fkie_cve-2026-27696 | changedetection.io is a free open source web page change detection tool. In versions prior to 0.54.… | 2026-02-25T05:17:26.940 | 2026-02-26T15:34:26.273 |
| fkie_cve-2026-21443 | OpenEMR is a free and open source electronic health records and medical practice management applica… | 2026-02-25T02:16:21.863 | 2026-02-26T15:34:11.743 |
| fkie_cve-2026-24847 | OpenEMR is a free and open source electronic health records and medical practice management applica… | 2026-02-25T02:16:22.027 | 2026-02-26T15:33:56.017 |
| fkie_cve-2026-27699 | The `basic-ftp` FTP client library for Node.js contains a path traversal vulnerability (CWE-22) in … | 2026-02-25T15:20:53.523 | 2026-02-26T15:27:45.597 |
| fkie_cve-2026-2878 | In Progress® Telerik® UI for AJAX, versions prior to 2026.1.225, an insufficient entropy vulnerabil… | 2026-02-25T15:20:54.293 | 2026-02-26T15:23:31.757 |
| fkie_cve-2026-3071 | Deserialization of untrusted data in the LanguageModel class of Flair from versions 0.4.1 to latest… | 2026-02-26T15:17:48.803 | 2026-02-26T15:17:48.803 |
| fkie_cve-2026-2780 | Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148, Firefox… | 2026-02-24T14:16:26.437 | 2026-02-26T15:17:47.160 |
| fkie_cve-2026-2244 | A vulnerability in Google Cloud Vertex AI Workbench from 7/21/2025 to 01/30/2026 allows an attacker… | 2026-02-26T15:17:45.250 | 2026-02-26T15:17:45.250 |
| fkie_cve-2026-28138 | Deserialization of Untrusted Data vulnerability in Stylemix uListing ulisting allows Object Injecti… | 2026-02-26T09:16:15.510 | 2026-02-26T15:17:43.900 |
| fkie_cve-2026-28132 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in vill… | 2026-02-26T09:16:15.217 | 2026-02-26T15:17:43.660 |
| fkie_cve-2026-28083 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-26T09:16:14.857 | 2026-02-26T15:17:43.413 |
| fkie_cve-2026-27966 | Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.8… | 2026-02-26T02:16:23.833 | 2026-02-26T15:17:42.780 |
| fkie_cve-2026-27837 | Dottie provides nested object access and manipulation in JavaScript. Versions 2.0.4 through 2.0.6 c… | 2026-02-26T01:16:24.937 | 2026-02-26T15:17:39.733 |
| fkie_cve-2026-26077 | Discourse is an open source discussion platform. Prior to versions 2025.12.2, 2026.1.1, and 2026.2.… | 2026-02-26T15:17:36.653 | 2026-02-26T15:17:36.653 |
| fkie_cve-2026-3187 | A vulnerability was identified in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this is… | 2026-02-25T15:20:55.277 | 2026-02-26T15:11:34.407 |
| fkie_cve-2025-71243 | The 'Saisies pour formulaire' (Saisies) plugin for SPIP versions 5.4.0 through 5.11.0 contains a cr… | 2026-02-19T16:27:12.303 | 2026-02-26T15:07:48.140 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-cg8j-5cr2-568q |
6.5 (3.1)
|
Moodle TeX formula editor is vulnerable to DoS through lack of execution time limits | 2026-02-21T06:30:16Z | 2026-02-25T15:50:58Z |
| ghsa-gfw7-2v73-69wg |
6.5 (3.1)
|
Apache Airflow error reporting may expose full kwargs | 2026-02-21T03:31:39Z | 2026-02-25T15:42:56Z |
| ghsa-vx9q-rhv9-3jvg |
8.2 (4.0)
|
aircompressor Snappy and LZ4 Java-based decompressor implementation can leak information from reuse… | 2025-12-12T22:12:22Z | 2026-02-25T15:32:27Z |
| ghsa-qrr9-2772-633f |
5.5 (3.1)
|
RF4CE Profile protocol dissector crash in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denia… | 2026-02-25T15:31:43Z | 2026-02-25T15:31:43Z |
| ghsa-g4x4-mr34-3pw3 |
4.7 (3.1)
|
NTS-KE protocol dissector crash in Wireshark 4.6.0 to 4.6.3 allows denial of service | 2026-02-25T15:31:43Z | 2026-02-25T15:31:43Z |
| ghsa-8p92-v8gg-gvcv |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was identified in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this is… | 2026-02-25T15:31:43Z | 2026-02-25T15:31:43Z |
| ghsa-3g96-v3mg-9xp9 |
4.7 (3.1)
|
USB HID protocol dissector memory exhaustion in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows… | 2026-02-25T15:31:43Z | 2026-02-25T15:31:43Z |
| ghsa-whqp-34xh-xmxr |
4.3 (3.1)
|
In JetBrains TeamCity before 2025.11.3 missing authorization allowed project developers to add para… | 2026-02-25T15:31:40Z | 2026-02-25T15:31:40Z |
| ghsa-px6f-q5hr-gqcp |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this vu… | 2026-02-25T15:31:40Z | 2026-02-25T15:31:40Z |
| ghsa-c7jf-2rmf-hc7w |
4.3 (3.1)
|
In JetBrains TeamCity before 2025.11.3 open redirect was possible in the React project creation flow | 2026-02-25T15:31:40Z | 2026-02-25T15:31:40Z |
| ghsa-4x44-gf2f-7mh8 |
2.3 (3.1)
|
In JetBrains TeamCity before 2025.11.3 disabling versioned settings left a credentials config on disk | 2026-02-25T15:31:40Z | 2026-02-25T15:31:40Z |
| ghsa-26wv-wm3r-6rvc |
5.3 (3.1)
5.5 (4.0)
|
A vulnerability was found in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected is an unknown f… | 2026-02-25T15:31:40Z | 2026-02-25T15:31:40Z |
| ghsa-w36g-f98m-wm99 |
2.6 (3.1)
|
A time-of-create-to-time-of-use (TOCTOU) vulnerability lets recently deleted-then-recreated data so… | 2026-02-25T15:31:39Z | 2026-02-25T15:31:39Z |
| ghsa-jqcj-pmgf-5g3q |
9.8 (3.1)
|
Missing Authentication for Critical Function vulnerability in ePati Cyber Security Technologies I… | 2026-02-25T15:31:39Z | 2026-02-25T15:31:39Z |
| ghsa-8p8j-jq9g-4f8j |
8.8 (3.1)
|
In JetBrains YouTrack before 2025.3.121962 apps were able to send requests to the app permissions e… | 2026-02-25T15:31:39Z | 2026-02-25T15:31:39Z |
| ghsa-xx53-6qqj-gr7w |
9.8 (3.1)
|
Memory safety bugs present in Firefox 147 and Thunderbird 147. Some of these bugs showed evidence o… | 2026-02-24T15:30:33Z | 2026-02-25T15:31:37Z |
| ghsa-xchm-7954-5wvg |
9.8 (3.1)
|
Use-after-free in the DOM: Window and Location component. This vulnerability affects Firefox < 148,… | 2026-02-24T15:30:32Z | 2026-02-25T15:31:37Z |
| ghsa-vxjv-c6cq-74m6 |
9.8 (3.1)
|
Mitigation bypass in the Networking: Cache component. This vulnerability affects Firefox < 148 and … | 2026-02-24T15:30:32Z | 2026-02-25T15:31:37Z |
| ghsa-vmmw-c3hw-gvm3 |
9.8 (3.1)
|
Out of bounds read and write in Tint in Google Chrome on Mac prior to 145.0.7632.116 allowed a remo… | 2026-02-24T00:31:34Z | 2026-02-25T15:31:37Z |
| ghsa-qvmx-rqmx-pvfg |
9.1 (3.1)
|
Out of bounds read in Media in Google Chrome prior to 145.0.7632.116 allowed a remote attacker to p… | 2026-02-24T00:31:34Z | 2026-02-25T15:31:37Z |
| ghsa-p9m7-fwrr-649p |
9.8 (3.1)
|
TOTOLINK X5000R v9.1.0cu_2415_B20250515 contains an argument injection vulnerability in the setDiag… | 2026-02-23T21:31:27Z | 2026-02-25T15:31:37Z |
| ghsa-jvc5-7j9r-q4m6 |
9.8 (3.1)
|
Same-origin policy bypass in the Networking: JAR component. This vulnerability affects Firefox < 14… | 2026-02-24T15:30:32Z | 2026-02-25T15:31:37Z |
| ghsa-jqhg-j5gv-hpmr |
8.8 (3.1)
|
TOTOLINK X6000R v9.4.0cu.1498_B20250826 contains an OS command injection vulnerability in the NTPSy… | 2026-02-23T21:31:27Z | 2026-02-25T15:31:37Z |
| ghsa-h79p-mfpr-8qm4 |
9.8 (3.1)
|
Use-after-free in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firef… | 2026-02-24T15:30:32Z | 2026-02-25T15:31:37Z |
| ghsa-fc3q-vg8h-qrfp |
4.3 (3.1)
|
A permission cache poisoning vulnerability in Devolutions Server allows authenticated users to bypa… | 2026-02-24T21:31:46Z | 2026-02-25T15:31:37Z |
| ghsa-f8w4-9vp9-7v2q |
9.1 (3.1)
|
Improper session management in GCOM EPON 1GE ONU version C00R371V00B01 allows attackers to execute … | 2026-02-23T21:31:27Z | 2026-02-25T15:31:37Z |
| ghsa-cgrc-pwqf-64v8 |
9.8 (3.1)
|
Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox… | 2026-02-24T15:30:32Z | 2026-02-25T15:31:37Z |
| ghsa-3fr2-qc88-c4cv |
6.5 (3.1)
|
Improper access control in multiple DVLS REST API endpoints in Devolutions Server 2025.3.14.0 and… | 2026-02-24T21:31:47Z | 2026-02-25T15:31:37Z |
| ghsa-33jq-j95r-2gpj |
5.4 (3.1)
|
Inappropriate implementation in DevTools in Google Chrome prior to 145.0.7632.116 allowed an attack… | 2026-02-24T00:31:34Z | 2026-02-25T15:31:37Z |
| ghsa-j7vj-8xmw-gvff |
8.6 (3.1)
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-02-17T12:31:07Z | 2026-02-25T15:31:36Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-79 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.841635+00:00 |
| pysec-2024-78 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.12.4.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.697678+00:00 |
| pysec-2024-77 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.3.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.616691+00:00 |
| pysec-2024-76 |
7.5 (3.1)
|
An XML External Entity (XXE) vulnerability in the ebookmeta.get_metadata function of eboo… | ebookmeta | 2024-06-07T19:15:00+00:00 | 2024-09-13T21:22:04.531357+00:00 |
| pysec-2024-75 |
6.1 (3.1)
|
Twisted is an event-based framework for internet applications, supporting Python 3.6+. Th… | twisted | 2024-07-29T16:15:00+00:00 | 2024-09-11T19:19:18.005250+00:00 |
| pysec-2024-71 |
7.5 (3.1)
|
A vulnerability in corydolphin/flask-cors up to version 4.0.1 allows the `Access-Control-… | flask-cors | 2024-08-18T19:15:00Z | 2024-09-09T07:59:30.591275Z |
| pysec-2024-74 |
9.1 (3.1)
|
MindsDB is a platform for building artificial intelligence from enterprise data. Prior to… | mindsdb | 2024-09-05T17:15:00+00:00 | 2024-09-06T15:22:53.971446+00:00 |
| pysec-2024-73 |
9.1 (3.1)
|
A vulnerability in the JSON file handling of gaizhenbiao/chuanhuchatgpt version 20240410 … | chuanhuchatgpt | 2024-07-31T01:15:00+00:00 | 2024-08-27T15:22:40.259109+00:00 |
| pysec-2024-70 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values… | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.804411+00:00 |
| pysec-2024-69 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and … | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.745844+00:00 |
| pysec-2024-68 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() an… | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.682679+00:00 |
| pysec-2024-67 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat… | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.613440+00:00 |
| pysec-2024-66 |
7.8 (3.1)
|
dbt enables data analysts and engineers to transform their data using the same practices … | dbt-core | 2024-07-16T23:15:00+00:00 | 2024-07-19T17:21:49.664320+00:00 |
| pysec-2024-65 |
|
Roundup before 2.4.0 allows XSS via JavaScript in PDF, XML, and SVG documents. | roundup | 2024-07-17T20:15:00+00:00 | 2024-07-17T23:22:05.024899+00:00 |
| pysec-2024-64 |
|
Roundup before 2.4.0 allows XSS via a SCRIPT element in an HTTP Referer header. | roundup | 2024-07-17T20:15:00+00:00 | 2024-07-17T23:22:04.987078+00:00 |
| pysec-2024-63 |
|
In Roundup before 2.4.0, classhelpers (_generic.help.html) allow XSS. | roundup | 2024-07-17T20:15:00+00:00 | 2024-07-17T23:22:04.949977+00:00 |
| pysec-2024-62 |
|
Versions of the package langchain-experimental from 0.0.15 and before 0.0.21 are vulnerab… | langchain-experimental | 2024-07-15T05:15:00+00:00 | 2024-07-15T11:19:36.686972+00:00 |
| pysec-2024-61 |
6.1 (3.1)
|
A Stored Cross-Site Scripting (XSS) vulnerability exists in gaizhenbiao/chuanhuchatgpt ve… | chuanhuchatgpt | 2024-07-11T11:15:00+00:00 | 2024-07-12T21:33:00.657381+00:00 |
| pysec-2024-60 |
7.5 (3.1)
|
A vulnerability was identified in the kjd/idna library, specifically within the `idna.enc… | idna | 2024-07-07T18:15:00+00:00 | 2024-07-11T17:21:37.216928+00:00 |
| pysec-2024-59 |
|
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. get_supported_l… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.800540+00:00 |
| pysec-2024-58 |
|
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. Derived classes… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.704786+00:00 |
| pysec-2024-57 |
|
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. The django.cont… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.604887+00:00 |
| pysec-2024-56 |
|
An issue was discovered in Django 4.2 before 4.2.14 and 5.0 before 5.0.7. urlize and urli… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.495359+00:00 |
| pysec-2024-54 |
6.5 (3.1)
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-06-24T18:15:00+00:00 | 2024-06-26T19:19:24.981233+00:00 |
| pysec-2024-53 |
|
langchain_experimental (aka LangChain Experimental) before 0.0.61 for LangChain provides … | langchain-experimental | 2024-06-16T15:15:00+00:00 | 2024-06-16T17:20:32.187558+00:00 |
| pysec-2024-52 |
|
lepture Authlib before 1.3.1 has algorithm confusion with asymmetric public keys. Unless … | authlib | 2024-06-09T19:15:00+00:00 | 2024-06-09T21:20:21.309692+00:00 |
| pysec-2024-51 |
|
A broken access control vulnerability exists in mlflow/mlflow versions before 2.10.1, whe… | mlflow | 2024-05-16T09:15:00+00:00 | 2024-05-16T11:19:52.866536+00:00 |
| pysec-2024-50 |
|
Synapse is an open-source Matrix homeserver. A remote Matrix user with malicious intent, … | matrix-synapse | 2024-04-23T18:15:00+00:00 | 2024-04-23T21:18:51.688096+00:00 |
| pysec-2023-260 |
6.1 (3.1)
|
A reflected Cross-Site Scripting (XSS) vulnerability exists in the mlflow/mlflow reposito… | mlflow | 2023-12-07T05:15:00+00:00 | 2024-04-16T15:20:55.191003+00:00 |
| pysec-2024-49 |
|
Lektor before 3.3.11 does not sanitize DB path traversal. Thus, shell commands might be e… | lektor | 2024-03-27T06:15:00+00:00 | 2024-03-27T11:18:36.506150+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33230 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.761978Z |
| gsd-2024-33505 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.761772Z |
| gsd-2024-33227 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.761572Z |
| gsd-2024-33092 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.761371Z |
| gsd-2024-33276 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.761165Z |
| gsd-2024-33023 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.760968Z |
| gsd-2024-33222 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.760715Z |
| gsd-2024-33422 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.760522Z |
| gsd-2024-33360 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.760329Z |
| gsd-2024-33383 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.760137Z |
| gsd-2024-33376 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.759944Z |
| gsd-2024-33273 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.759747Z |
| gsd-2024-33521 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.759531Z |
| gsd-2024-33177 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.759333Z |
| gsd-2024-33443 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.759133Z |
| gsd-2024-33059 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.758936Z |
| gsd-2024-33031 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.758739Z |
| gsd-2024-33147 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.758533Z |
| gsd-2024-33084 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.758274Z |
| gsd-2024-33365 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.758070Z |
| gsd-2024-33432 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.757872Z |
| gsd-2024-33037 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.757663Z |
| gsd-2024-33136 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.757468Z |
| gsd-2024-33386 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.757270Z |
| gsd-2024-33465 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.757068Z |
| gsd-2024-33013 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.756870Z |
| gsd-2024-33255 | Jerryscript commit cefd391 was discovered to contain an Assertion Failure via ECMA_STRING… | 2024-04-24T05:02:09.756677Z |
| gsd-2024-33275 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.756484Z |
| gsd-2024-33096 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.756284Z |
| gsd-2024-33168 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.756074Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-6583 | Malicious code in serverkeeper-verifier (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| mal-2025-3475 | Malicious code in timekeeper-verifier (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| mal-2025-3006 | Malicious code in tcloud-python-test (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| mal-2025-191905 | Malicious code in time-service-checker (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| mal-2025-191904 | Malicious code in time-server-test (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| mal-2025-191903 | Malicious code in time-server-analyzer (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| mal-2025-191902 | Malicious code in time-server-analysis (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| mal-2025-191901 | Malicious code in time-check-server-get (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| mal-2025-191900 | Malicious code in time-check-server (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| mal-2025-191887 | Malicious code in tcloud-python-sdks (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| mal-2025-191886 | Malicious code in tclients-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| mal-2025-191871 | Malicious code in snapshot-photo (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| mal-2025-2950 | Malicious code in credential-python-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-2929 | Malicious code in acloud-client (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191721 | Malicious code in enumer-iam (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191687 | Malicious code in awscloud-clients-core (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191679 | Malicious code in amzclients-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191677 | Malicious code in alicloud-client-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191676 | Malicious code in alicloud-client (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191673 | Malicious code in acloud-clients (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191672 | Malicious code in acloud-client-uses (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191671 | Malicious code in aclient-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2026-610 | Malicious code in snapshot-date (PyPI) | 2026-01-30T19:09:41Z | 2026-01-30T19:09:41Z |
| mal-2026-606 | Malicious code in userver-requires-at-least-python-3-10 (PyPI) | 2026-01-30T10:14:10Z | 2026-01-30T10:14:10Z |
| mal-2024-12348 | Malicious code in spiderai (PyPI) | 2024-10-02T09:16:00Z | 2026-01-30T00:34:33Z |
| mal-2026-604 | Malicious code in securedrop-workstation-dom0-config (PyPI) | 2026-01-29T13:50:57Z | 2026-01-29T13:50:57Z |
| mal-2026-603 | Malicious code in mcp-pdftool-plus (PyPI) | 2026-01-29T13:25:53Z | 2026-01-29T13:25:53Z |
| mal-2026-602 | Malicious code in tableasets (PyPI) | 2026-01-29T11:22:50Z | 2026-01-29T11:22:50Z |
| mal-2026-601 | Malicious code in tableautes (PyPI) | 2026-01-29T10:08:47Z | 2026-01-29T11:16:21Z |
| mal-2026-595 | Malicious code in morty-package (PyPI) | 2026-01-28T19:48:56Z | 2026-01-28T19:48:56Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-node-2023-32559 | 2024-03-06T10:59:36.367Z | 2025-11-06T13:25:46.476Z | |
| bit-node-2023-30590 | 2024-03-06T11:00:43.978Z | 2025-11-06T13:25:46.476Z | |
| bit-node-2023-30589 | 2024-03-06T11:00:53.995Z | 2025-11-06T13:25:46.476Z | |
| bit-node-2023-30588 | 2024-03-06T11:01:05.481Z | 2025-11-06T13:25:46.476Z | |
| bit-node-2023-30585 | 2024-03-06T11:01:27.978Z | 2025-11-06T13:25:46.476Z | |
| bit-node-2023-30581 | 2024-03-06T11:01:38.980Z | 2025-11-06T13:25:46.476Z | |
| bit-node-2022-3786 | X.509 Email Address Variable Length Buffer Overflow | 2024-03-06T11:02:40.764Z | 2025-11-06T13:25:46.476Z |
| bit-node-2022-3602 | X.509 Email Address 4-byte Buffer Overflow | 2024-03-06T11:02:52.601Z | 2025-11-06T13:25:46.476Z |
| bit-nifi-2024-45477 | Apache NiFi: Improper Neutralization of Input in Parameter Description | 2025-09-12T11:47:04.858Z | 2025-11-06T13:25:46.476Z |
| bit-nginx-2025-53859 | NGINX ngx_mail_smtp_module vulnerability | 2025-08-18T08:07:31.835Z | 2025-11-06T13:25:46.476Z |
| bit-nginx-2025-23419 | TLS Session Resumption Vulnerability | 2025-02-07T07:15:11.088Z | 2025-11-06T13:25:46.476Z |
| bit-nginx-2024-7347 | NGINX MP4 module vulnerability | 2024-08-16T07:27:39.450Z | 2025-11-06T13:25:46.476Z |
| bit-mongoose-2024-53900 | 2025-10-02T14:44:18.222Z | 2025-11-06T13:25:46.476Z | |
| bit-mongodb-2025-0755 | MongoDB C Driver bson library may be susceptible to buffer overflow | 2025-09-23T08:46:21.341Z | 2025-11-06T13:25:46.476Z |
| bit-modsecurity2-2025-54571 | ModSecurity's Insufficient Return Value Handling can Lead to XSS and Source Code Disclosure | 2025-08-08T05:55:32.006Z | 2025-11-06T13:25:46.476Z |
| bit-modsecurity-2025-54571 | ModSecurity's Insufficient Return Value Handling can Lead to XSS and Source Code Disclosure | 2025-08-08T05:55:15.874Z | 2025-11-06T13:25:46.476Z |
| bit-mlflow-2025-11200 | MLflow Weak Password Requirements Authentication Bypass Vulnerability | 2025-11-06T12:53:59.130Z | 2025-11-06T13:25:46.476Z |
| bit-mariadb-2025-30722 | 2025-07-16T08:17:21.862Z | 2025-11-06T13:25:46.476Z | |
| bit-mariadb-2025-30693 | 2025-07-16T08:17:14.760Z | 2025-11-06T13:25:46.476Z | |
| bit-mariadb-2025-21490 | 2025-03-13T07:13:52.740Z | 2025-11-06T13:25:46.476Z | |
| bit-mariadb-2023-52970 | 2025-03-13T07:14:09.649Z | 2025-11-06T13:25:46.476Z | |
| bit-mariadb-2023-52969 | 2025-03-13T07:14:15.453Z | 2025-11-06T13:25:46.476Z | |
| bit-magento-2020-24408 | Stored XSS in customer address upload feature | 2024-03-06T11:07:09.974Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2025-0938 | URL parser allowed square brackets in domain names | 2025-08-11T13:53:03.173Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-9287 | Virtual environment (venv) activation scripts don't quote paths | 2025-08-11T13:53:00.985Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-8088 | Infinite loop when iterating over zip archive entry names from zipfile.Path | 2025-08-11T13:52:58.648Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-7592 | Quadratic complexity parsing cookies with backslashes | 2025-08-11T13:52:56.070Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-6923 | Email header injection due to unquoted newlines | 2025-08-11T13:52:53.987Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-6232 | Regular-expression DoS when parsing TarFile headers | 2025-08-11T13:52:51.685Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-4032 | Incorrect IPv4 and IPv6 private ranges | 2025-08-11T13:52:45.426Z | 2025-11-06T13:25:46.476Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-003119 | NETGEAR routers vulnerable to buffer overflow | 2024-04-25T11:21+09:00 | 2024-04-25T11:21+09:00 |
| jvndb-2024-000042 | Multiple vulnerabilities in RoamWiFi R10 | 2024-04-24T13:44+09:00 | 2024-04-24T13:44+09:00 |
| jvndb-2024-003008 | Sangoma Technologies CG/MG family driver cg6kwin2k.sys vulnerable to insufficient access control on its IOCTL | 2024-03-22T13:50+09:00 | 2024-04-24T11:45+09:00 |
| jvndb-2023-003028 | Phoenix Technologies Windows kernel driver vulnerable to insufficient access control on its IOCTL | 2023-08-30T10:05+09:00 | 2024-04-24T11:43+09:00 |
| jvndb-2024-003116 | Multiple vulnerabilities in OMRON Sysmac Studio/CX-One and CX-Programmer | 2024-04-24T10:13+09:00 | 2024-04-24T10:13+09:00 |
| jvndb-2024-000901 | TvRock vulnerable to cross-site request forgery | 2024-04-23T18:22+09:00 | 2024-04-23T18:22+09:00 |
| jvndb-2024-000903 | TvRock vulnerable to denial-of-service (DoS) | 2024-04-23T18:21+09:00 | 2024-04-23T18:21+09:00 |
| jvndb-2023-000119 | Ruckus Access Point contains a cross-site scripting vulnerability. | 2023-12-01T14:58+09:00 | 2024-04-23T17:51+09:00 |
| jvndb-2023-000112 | Multiple vulnerabilities in Pleasanter | 2023-11-13T15:57+09:00 | 2024-04-22T17:56+09:00 |
| jvndb-2024-003108 | Armeria-saml improperly handles SAML messages | 2024-04-22T17:28+09:00 | 2024-04-22T17:28+09:00 |
| jvndb-2023-000122 | Multiple denial-of-service (DoS) vulnerabilities in JTEKT ELECTRONICS HMI GC-A2 series | 2023-12-11T14:12+09:00 | 2024-04-22T16:55+09:00 |
| jvndb-2023-002413 | Multiple vulnerabilities in ELECOM and LOGITEC wireless LAN routers | 2023-07-12T16:15+09:00 | 2024-04-22T16:18+09:00 |
| jvndb-2023-002270 | Null pointer dereference vulnerability in multiple printers and MFPs which implement BROTHER debut web server | 2023-06-30T11:49+09:00 | 2024-04-22T16:07+09:00 |
| jvndb-2023-014491 | LINE client for iOS vulnerable to improper server certificate verification | 2024-04-22T15:27+09:00 | 2024-04-22T15:27+09:00 |
| jvndb-2023-000075 | Improper restriction of XML external entity references (XXE) in Applicant Programme | 2023-07-24T15:44+09:00 | 2024-04-22T14:20+09:00 |
| jvndb-2023-002722 | Fujitsu network devices Si-R series and SR-M series vulnerable to authentication bypass | 2023-07-27T18:12+09:00 | 2024-04-19T18:07+09:00 |
| jvndb-2023-000076 | SEIKO EPSON printer Web Config vulnerable to denial-of-service (DoS) | 2023-08-02T14:55+09:00 | 2024-04-19T17:27+09:00 |
| jvndb-2023-000062 | "WPS Office" vulnerable to OS command injection | 2023-06-12T12:57+09:00 | 2024-04-18T17:49+09:00 |
| jvndb-2023-000048 | ASUS Router RT-AX3000 vulnerable to using sensitive cookies without 'Secure' attribute | 2023-06-09T15:18+09:00 | 2024-04-18T17:44+09:00 |
| jvndb-2023-002022 | Multiple vulnerabilities in FUJI ELECTRIC FRENIC RHC Loader | 2023-06-05T15:55+09:00 | 2024-04-18T17:40+09:00 |
| jvndb-2023-002906 | Multiple vulnerabilities in Panasonic Control FPWIN Pro7 | 2023-08-22T18:02+09:00 | 2024-04-18T17:31+09:00 |
| jvndb-2023-011403 | ELECOM wireless LAN routers vulnerable to OS command injection | 2023-12-13T15:06+09:00 | 2024-04-18T17:22+09:00 |
| jvndb-2024-000041 | Multiple vulnerabilities in WordPress Plugin "Forminator" | 2024-04-18T13:53+09:00 | 2024-04-18T13:53+09:00 |
| jvndb-2023-000070 | Multiple vulnerabilities in WordPress Plugin "TS Webfonts for SAKURA" | 2023-07-20T16:05+09:00 | 2024-04-17T17:20+09:00 |
| jvndb-2022-017175 | Proscend Communications M330-W and M330-W5 vulnerable to OS command injection | 2024-04-16T14:30+09:00 | 2024-04-16T14:30+09:00 |
| jvndb-2024-000040 | Multiple vulnerabilities in BUFFALO wireless LAN routers | 2024-04-15T16:29+09:00 | 2024-04-15T16:29+09:00 |
| jvndb-2023-000074 | Fujitsu Real-time Video Transmission Gear "IP series" uses a hard-coded credentials | 2023-07-26T18:00+09:00 | 2024-04-12T18:04+09:00 |
| jvndb-2023-000073 | GBrowse vulnerable to unrestricted upload of files with dangerous types | 2023-07-21T15:02+09:00 | 2024-04-12T17:31+09:00 |
| jvndb-2023-002905 | Multiple vulnerabilities in CBC digital video recorders | 2023-08-22T17:35+09:00 | 2024-04-10T17:39+09:00 |
| jvndb-2024-000039 | Multiple vulnerabilities in a-blog cms | 2024-04-10T13:55+09:00 | 2024-04-10T13:55+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-04937 | Adobe ColdFusion访问控制不当漏洞 | 2025-12-15 | 2026-01-19 |
| cnvd-2026-04936 | Adobe ColdFusion凭据保护不足漏洞 | 2025-12-15 | 2026-01-19 |
| cnvd-2026-04917 | Refugee Food Management System SQL注入漏洞 | 2026-01-14 | 2026-01-19 |
| cnvd-2026-04912 | Tenda AC7堆栈缓冲区溢出漏洞 | 2023-09-01 | 2026-01-19 |
| cnvd-2026-04911 | Tenda O3 fromDhcpSetSer函数堆栈缓冲区溢出漏洞 | 2024-07-23 | 2026-01-19 |
| cnvd-2026-04890 | Google Chrome释放后重用漏洞 | 2025-12-08 | 2026-01-19 |
| cnvd-2026-04889 | Google Chrome竞争条件漏洞 | 2025-12-08 | 2026-01-19 |
| cnvd-2026-04888 | Google Chrome错误类型转换漏洞 | 2025-12-09 | 2026-01-19 |
| cnvd-2026-04296 | 北京邦永科技有限公司PM2项目管理平台存在SQL注入漏洞(CNVD-C-2025-983218) | 2025-12-05 | 2026-01-19 |
| cnvd-2026-04266 | Kentico Xperience跨站脚本漏洞(CNVD-2026-04266) | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04265 | Kentico Xperience跨站脚本漏洞(CNVD-2026-04265) | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04264 | Kentico Xperience存在未明漏洞(CNVD-2026-04264) | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04263 | Kentico Xperience存在未明漏洞(CNVD-2026-04263) | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04262 | Kentico Xperience安全绕过漏洞 | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04261 | Kentico Xperience跨站脚本漏洞(CNVD-2026-04261) | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04247 | Kentico Xperience信息泄露漏洞(CNVD-2026-04247) | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04246 | Kentico Xperience访问控制绕过漏洞 | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04245 | Kentico Xperience信息泄露漏洞 | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04244 | Kentico Xperience拒绝服务漏洞 | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04243 | Kentico Xperience跨站脚本漏洞 | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04242 | Kentico Xperience SQL注入漏洞 | 2025-12-25 | 2026-01-19 |
| cnvd-2026-04898 | Tenda AC10U formSetQosBand函数堆栈缓冲区溢出漏洞 | 2024-03-22 | 2026-01-16 |
| cnvd-2026-04897 | Tenda AC10U formSetFirewallCfg函数堆栈缓冲区溢出漏洞 | 2024-03-22 | 2026-01-16 |
| cnvd-2026-04896 | Tenda AC10U formSetDeviceName函数栈缓冲区溢出漏洞 | 2024-03-22 | 2026-01-16 |
| cnvd-2026-04895 | Tenda AC15 saveParentControlInfo方法堆栈缓冲区溢出漏洞 | 2024-03-26 | 2026-01-16 |
| cnvd-2026-04894 | Tenda AC15 R7WebsSecurityHandler方法堆栈缓冲区溢出漏洞 | 2024-03-26 | 2026-01-16 |
| cnvd-2026-04893 | Tenda AC15 fromSetSysTime方法堆栈缓冲区溢出漏洞 | 2024-03-26 | 2026-01-16 |
| cnvd-2026-04892 | Tenda AC15 fromDhcpListClient函数堆栈缓冲区溢出漏洞 | 2024-04-17 | 2026-01-16 |
| cnvd-2026-04891 | Tenda AC15 fromWizardHandle方法堆栈缓冲区溢出漏洞 | 2024-04-22 | 2026-01-16 |
| cnvd-2026-04665 | FastAdmin SQL注入漏洞 | 2026-01-14 | 2026-01-16 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-11596 | Уязвимость универсальной системы мониторинга Zabbix, связана с неправильной нейтрализацие… | 24.09.2025 | 16.02.2026 |
| bdu:2025-11593 | Уязвимость интерпретатора языка программирования Python (CPython), связанная с неправильн… | 24.09.2025 | 16.02.2026 |
| bdu:2025-11510 | Уязвимость модуля drivers/usb/gadget/configfs.c ядра операционной системы Linux, позволяю… | 23.09.2025 | 16.02.2026 |
| bdu:2025-11506 | Уязвимость функции drm_crtc_handle_vblank() ядра операционной системы Linux, позволяющая … | 23.09.2025 | 16.02.2026 |
| bdu:2025-11504 | Уязвимость функции vcc_sendmsg() ядра операционной системы Linux, позволяющая нарушителю … | 23.09.2025 | 16.02.2026 |
| bdu:2025-11503 | Уязвимость функции qdisc_tree_reduce_backlog() ядра операционной системы Linux, позволяющ… | 23.09.2025 | 16.02.2026 |
| bdu:2025-11496 | Уязвимость DNS-сервера Unbound, связанная с неконтролируемым расходом ресурсов, позволяющ… | 23.09.2025 | 16.02.2026 |
| bdu:2025-11469 | Уязвимость функции ins_typebuf() текстового редактора Vim, позволяющая нарушителю получит… | 22.09.2025 | 16.02.2026 |
| bdu:2025-11467 | Уязвимость компонента net/sched/sch_prio.c ядра операционной системы Linux, позволяющая н… | 22.09.2025 | 16.02.2026 |
| bdu:2025-11462 | Уязвимость компонента binutils/objcopy.c программного средства разработки GNU Binutils, п… | 22.09.2025 | 16.02.2026 |
| bdu:2025-11456 | Уязвимость компонента bfd/elf.c программного средства разработки GNU Binutils, позволяюща… | 22.09.2025 | 16.02.2026 |
| bdu:2025-11415 | Уязвимость файла pdf/pdf_fmap.c компонента TTF набора программного обеспечения для обрабо… | 22.09.2025 | 16.02.2026 |
| bdu:2025-11409 | Уязвимость функции OutlineItem::open() библиотеки для рендеринга PDF-файлов Poppler, позв… | 22.09.2025 | 16.02.2026 |
| bdu:2025-11349 | Уязвимость функции kasan_find_vm_area() (mm/kasan/report.c) компонента kasan ядра операци… | 19.09.2025 | 16.02.2026 |
| bdu:2025-11348 | Уязвимость функции zd_mac_tx_to_dev() (drivers/net/wireless/zydas/zd1211rw/zd_mac.c) ядра… | 19.09.2025 | 16.02.2026 |
| bdu:2025-11343 | Уязвимость функций ieee80211_is_valid_amsdu() и ieee80211_amsdu_to_8023s() (net/wireless/… | 19.09.2025 | 16.02.2026 |
| bdu:2025-11284 | Уязвимость фкнкции fd_index() программы для запросов и управления устройствами хранения U… | 17.09.2025 | 16.02.2026 |
| bdu:2025-11256 | Уязвимость менеджера пакетов Dpkg, связанная с небезопасными временными файлами, позволяю… | 17.09.2025 | 16.02.2026 |
| bdu:2025-11249 | Уязвимость функции bson_string_append библиотеки libbson драйвера системы управления база… | 17.09.2025 | 16.02.2026 |
| bdu:2025-11228 | Уязвимость библиотеки для отображения PDF-файлов Poppler, связанная с использованием памя… | 17.09.2025 | 16.02.2026 |
| bdu:2025-11114 | Уязвимость функции nanddev_ecc_engine_cleanup() ядра операционной системы Linux, позволяю… | 15.09.2025 | 16.02.2026 |
| bdu:2025-11113 | Уязвимость модуля drivers/regulator/gpio-regulator.c ядра операционной системы Linux, поз… | 15.09.2025 | 16.02.2026 |
| bdu:2025-11083 | Уязвимость библиотеки Libarchive операционной системы Windows, позволяющая нарушителю выз… | 14.09.2025 | 16.02.2026 |
| bdu:2025-11082 | Уязвимость модуля html.parser.HTMLParser интерпретатора языка программирования Python, по… | 14.09.2025 | 16.02.2026 |
| bdu:2025-11076 | Уязвимость функции asn1_delete_structure() библиотеки безопасности транспортного уровня G… | 14.09.2025 | 16.02.2026 |
| bdu:2025-11075 | Уязвимость библиотеки безопасности транспортного уровня GnuTLS, связанная с ошибками проц… | 14.09.2025 | 16.02.2026 |
| bdu:2025-11074 | Уязвимость утилиты certtool библиотеки безопасности транспортного уровня GnuTLS, позволяю… | 14.09.2025 | 16.02.2026 |
| bdu:2025-11073 | Уязвимость функции get_name() файла interface.c пакета утилит Net-tools операционной сист… | 14.09.2025 | 16.02.2026 |
| bdu:2025-11072 | Уязвимость утилиты диагностики и мониторинга сети MTR, связанная с включением функций из … | 14.09.2025 | 16.02.2026 |
| bdu:2025-10958 | Уязвимость функции msm_devfreq_init() файла drivers/gpu/drm/msm/msm_gpu_devfreq.c ядра оп… | 11.09.2025 | 16.02.2026 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0767 | Vulnérabilité dans les produits Adobe | 2025-09-09T00:00:00.000000 | 2025-09-09T00:00:00.000000 |
| certfr-2025-avi-0765 | Multiples vulnérabilités dans les produits Siemens | 2025-09-09T00:00:00.000000 | 2025-09-09T00:00:00.000000 |
| certfr-2025-avi-0764 | Multiples vulnérabilités dans les produits SAP | 2025-09-09T00:00:00.000000 | 2025-09-09T00:00:00.000000 |
| certfr-2025-avi-0763 | Vulnérabilité dans Spring Cloud Gateway | 2025-09-09T00:00:00.000000 | 2025-09-09T00:00:00.000000 |
| certfr-2025-avi-0762 | Vulnérabilité dans SPIP | 2025-09-08T00:00:00.000000 | 2025-09-08T00:00:00.000000 |
| certfr-2025-avi-0761 | Multiples vulnérabilités dans Microsoft Edge | 2025-09-08T00:00:00.000000 | 2025-09-08T00:00:00.000000 |
| certfr-2025-avi-0760 | Multiples vulnérabilités dans les produits IBM | 2025-09-05T00:00:00.000000 | 2025-09-05T00:00:00.000000 |
| certfr-2025-avi-0759 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-09-05T00:00:00.000000 | 2025-09-05T00:00:00.000000 |
| certfr-2025-avi-0758 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-09-05T00:00:00.000000 | 2025-09-05T00:00:00.000000 |
| certfr-2025-avi-0757 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-09-05T00:00:00.000000 | 2025-09-05T00:00:00.000000 |
| certfr-2025-avi-0756 | Multiples vulnérabilités dans les produits VMware | 2025-09-05T00:00:00.000000 | 2025-09-05T00:00:00.000000 |
| certfr-2025-avi-0755 | Vulnérabilité dans les produits Synology | 2025-09-05T00:00:00.000000 | 2025-09-05T00:00:00.000000 |
| certfr-2025-avi-0754 | Multiples vulnérabilités dans les produits VMware | 2025-09-04T00:00:00.000000 | 2025-09-04T00:00:00.000000 |
| certfr-2025-avi-0753 | Vulnérabilité dans Shibboleth Service Provider | 2025-09-04T00:00:00.000000 | 2025-09-04T00:00:00.000000 |
| certfr-2025-avi-0752 | Multiples vulnérabilités dans Google Pixel | 2025-09-04T00:00:00.000000 | 2025-09-04T00:00:00.000000 |
| certfr-2025-avi-0751 | Multiples vulnérabilités dans les produits VMware | 2025-09-03T00:00:00.000000 | 2025-09-03T00:00:00.000000 |
| certfr-2025-avi-0750 | Multiples vulnérabilités dans Google Android | 2025-09-03T00:00:00.000000 | 2025-09-03T00:00:00.000000 |
| certfr-2025-avi-0749 | Multiples vulnérabilités dans Google Chrome | 2025-09-03T00:00:00.000000 | 2025-09-03T00:00:00.000000 |
| certfr-2025-avi-0748 | Vulnérabilité dans les produits Liferay | 2025-09-02T00:00:00.000000 | 2025-09-02T00:00:00.000000 |
| certfr-2025-avi-0747 | Multiples vulnérabilités dans les produits Qnap | 2025-09-01T00:00:00.000000 | 2025-09-01T00:00:00.000000 |
| certfr-2025-avi-0746 | Multiples vulnérabilités dans les produits IBM | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0745 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0744 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0743 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0742 | Vulnérabilité dans Microsoft Edge | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0741 | Vulnérabilité dans Wireshark | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0740 | Multiples vulnérabilités dans Tenable Security Center | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0739 | Multiples vulnérabilités dans Asterisk | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0738 | Multiples vulnérabilités dans les produits Elastic | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0737 | Multiples vulnérabilités dans les produits Cisco | 2025-08-28T00:00:00.000000 | 2025-08-28T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-1054 | Bad-cast to Assimp::LogStream from invalid vptr | 2024-09-13T00:00:21.771518Z | 2024-09-13T00:00:21.772014Z |
| osv-2023-685 | Invalid-free in reset_context | 2023-08-11T14:02:10.018940Z | 2024-09-01T14:21:29.336035Z |
| osv-2023-692 | Invalid-free in reset_context | 2023-08-13T14:00:16.114233Z | 2024-09-01T14:21:14.987075Z |
| osv-2023-405 | Heap-buffer-overflow in _lou_stringHash | 2023-05-19T14:00:18.190498Z | 2024-08-31T14:18:34.306703Z |
| osv-2024-349 | Security exception in java.base/java.lang.AbstractStringBuilder.<init> | 2024-04-30T00:03:33.576785Z | 2024-08-27T14:19:50.205074Z |
| osv-2023-1326 | Security exception in java.base/java.lang.reflect.Array.newArray | 2023-12-18T00:05:04.854273Z | 2024-08-27T14:16:42.028102Z |
| osv-2023-1221 | Security exception in jaz.Zer.reportFinding | 2023-11-26T13:02:48.995906Z | 2024-08-27T14:16:27.390478Z |
| osv-2022-871 | Security exception in java.base/java.util.Collections$UnmodifiableCollection.forEach | 2022-09-10T00:00:24.780487Z | 2024-08-27T14:15:10.826875Z |
| osv-2022-1275 | Security exception in java.desktop/java.awt.image.DataBufferInt.<init> | 2023-05-28T14:00:35.487433Z | 2024-08-27T14:11:30.518706Z |
| osv-2024-1045 | UNKNOWN READ in glslang::TInfoSinkBase::location | 2024-08-23T00:05:10.053074Z | 2024-08-23T00:05:10.053507Z |
| osv-2024-1044 | UNKNOWN READ in H5FL_reg_malloc | 2024-08-22T00:03:34.815128Z | 2024-08-22T00:03:34.815744Z |
| osv-2024-1043 | Heap-buffer-overflow in simdutf::haswell::implementation::convert_utf8_to_latin1 | 2024-08-21T00:14:12.263763Z | 2024-08-21T14:20:12.835561Z |
| osv-2024-1042 | UNKNOWN READ in chunk_free_object | 2024-08-21T00:13:34.712386Z | 2024-08-21T00:13:34.712770Z |
| osv-2024-1041 | UNKNOWN READ in chunk_free_object | 2024-08-21T00:11:49.349439Z | 2024-08-21T00:11:49.350156Z |
| osv-2024-1036 | UNKNOWN READ in chunk_free_object | 2024-08-19T00:04:37.123473Z | 2024-08-19T00:04:37.124078Z |
| osv-2024-1034 | Heap-buffer-overflow in simdutf::haswell::implementation::convert_utf8_to_utf16be | 2024-08-18T00:08:22.168066Z | 2024-08-18T14:21:16.718581Z |
| osv-2024-1029 | Stack-buffer-overflow in gf_hevc_parse_nalu_bs | 2024-08-17T00:13:24.697197Z | 2024-08-17T00:13:24.697938Z |
| osv-2024-996 | Use-of-uninitialized-value in cups_array_find | 2024-08-16T00:15:52.987192Z | 2024-08-16T00:15:52.987525Z |
| osv-2024-994 | Use-of-uninitialized-value in packet_parse | 2024-08-16T00:15:48.093497Z | 2024-08-16T00:15:48.093872Z |
| osv-2024-985 | Heap-double-free in libssh2_default_free | 2024-08-16T00:15:23.884058Z | 2024-08-16T00:15:23.884369Z |
| osv-2024-983 | UNKNOWN READ in ireclaim | 2024-08-16T00:15:21.362695Z | 2024-08-16T00:15:21.363094Z |
| osv-2024-969 | Security exception in com.github.javaparser.GeneratedJavaParser.Expression | 2024-08-16T00:14:31.527023Z | 2024-08-16T00:14:31.527538Z |
| osv-2024-965 | Stack-buffer-overflow in FLAC__stream_encoder_init_ogg_file | 2024-08-16T00:14:23.665242Z | 2024-08-16T00:14:23.665768Z |
| osv-2024-964 | Security exception in com.alibaba.fastjson2.JSONPathSegment$CycleNameSegment$MapLoop.accept | 2024-08-16T00:14:15.405443Z | 2024-08-16T00:14:15.405835Z |
| osv-2024-963 | Heap-buffer-overflow in GfxTilingPattern::scanXObjectForBlendMode | 2024-08-16T00:14:14.315705Z | 2024-08-16T00:14:14.316160Z |
| osv-2024-955 | Use-of-uninitialized-value in pcpp::IPv6Address::toString | 2024-08-16T00:13:46.718533Z | 2024-08-16T00:13:46.718830Z |
| osv-2024-951 | Index-out-of-bounds in hevc_ref_pic_lists_modification | 2024-08-16T00:13:38.322516Z | 2024-08-16T00:13:38.322849Z |
| osv-2024-939 | Security exception in org.apache.poi.util.LZWDecompresser.decompress | 2024-08-16T00:13:05.088720Z | 2024-08-16T00:13:05.089105Z |
| osv-2024-925 | Index-out-of-bounds in derive_collocated_motion_vectors | 2024-08-16T00:11:02.964872Z | 2024-08-16T00:11:02.965320Z |
| osv-2024-883 | Security exception in com.puppycrawl.tools.checkstyle.JavaAstVisitor.getInnerBopAst | 2024-08-16T00:06:29.139503Z | 2024-08-16T00:06:29.139893Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2020-0160 | Threshold value is ignored (all shares are n=3) | 2020-01-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0155 | `Read` on uninitialized buffer in `fill_buf()` and `read_up_to()` | 2020-12-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0154 | InputStream::read_exact : `Read` on uninitialized buffer causes UB | 2020-12-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0153 | `read` on uninitialized buffer may cause UB (bite::read::BiteReadExpandedExt::read_framed_max) | 2020-12-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0152 | ImmediateIO and TransactionalIO can cause data races | 2020-12-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0151 | Generators can cause data races if non-Send types are used in their generator functions | 2020-11-16T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0150 | RingBuffer can create multiple mutable references and cause data races | 2020-12-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0149 | Data race and memory safety issue in `Index` | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0148 | Multiple soundness issues in `Ptr` | 2020-12-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0146 | arr! macro erases lifetimes | 2020-04-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0145 | Use-after-free when cloning a partially consumed `Vec` iterator | 2020-11-02T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0143 | Queues allow non-Send types to be sent to other threads, allowing data races | 2020-12-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0142 | Send bound needed on T (for Send impl of `Bucket2`) | 2020-11-29T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0141 | MvccRwLock allows data races & aliasing violations | 2020-12-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0140 | `Shared` can cause a data race | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0139 | dces' World type can cause data races | 2020-12-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0138 | ReaderResult should be bounded by Sync | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0137 | AtomicBox<T> lacks bound on its Send and Sync traits allowing data races | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0136 | CopyCell lacks bounds on its Send trait allowing for data races | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0135 | Slock<T> allows sending non-Send types across thread boundaries | 2020-11-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0134 | `LockWeak<T>` allows to create data race to `T`. | 2020-11-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0133 | Queue<T> should have a Send bound on its Send/Sync traits | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0132 | `FixedCapacityDequeLike::clone()` can cause dropping uninitialized memory | 2020-12-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0131 | Send/Sync bound needed on T for Send/Sync impl of RcuCell<T> | 2020-11-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0130 | Bunch<T> unconditionally implements Send/Sync | 2020-11-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0129 | ShmWriter allows sending non-Send type across threads | 2020-12-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0128 | Cache<K>: Send/Sync impls needs trait bounds on `K` | 2020-11-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0127 | SyncRef's clone() and debug() allow data races | 2020-12-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0126 | SyncChannel<T> can move 'T: !Send' to other threads | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0125 | convec::ConVec<T> unconditionally implements Send/Sync | 2020-11-24T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:9156 | Moderate: golang-github-openprinting-ipp-usb security update | 2025-06-17T00:00:00Z | 2025-07-28T08:38:30Z |
| alsa-2025:9486 | Moderate: qt6-qtbase security update | 2025-06-24T00:00:00Z | 2025-07-28T08:35:47Z |
| alsa-2025:9623 | Moderate: osbuild-composer security update | 2025-06-25T00:00:00Z | 2025-07-28T08:31:22Z |
| alsa-2025:9190 | Important: ipa security update | 2025-06-17T00:00:00Z | 2025-07-28T08:29:33Z |
| alsa-2025:9307 | Moderate: freerdp security update | 2025-06-23T00:00:00Z | 2025-07-28T08:25:45Z |
| alsa-2025:9418 | Moderate: krb5 security update | 2025-06-24T00:00:00Z | 2025-07-28T08:23:55Z |
| alsa-2025:9421 | Moderate: iputils security update | 2025-06-24T00:00:00Z | 2025-07-28T08:22:41Z |
| alsa-2025:3262 | Moderate: nginx:1.24 security update | 2025-03-26T00:00:00Z | 2025-07-24T13:36:44Z |
| alsa-2025:10854 | Important: kernel security update | 2025-07-14T00:00:00Z | 2025-07-24T10:26:09Z |
| alsa-2025:11533 | Important: git security update | 2025-07-22T00:00:00Z | 2025-07-24T09:25:29Z |
| alsa-2025:11537 | Important: sudo security update | 2025-07-22T00:00:00Z | 2025-07-24T09:20:42Z |
| alsa-2025:11534 | Important: git security update | 2025-07-22T00:00:00Z | 2025-07-23T08:07:31Z |
| alsa-2025:11411 | Important: kernel security update | 2025-07-21T00:00:00Z | 2025-07-23T07:42:35Z |
| alsa-2025:11456 | Moderate: kernel-rt security update | 2025-07-21T00:00:00Z | 2025-07-23T07:31:24Z |
| alsa-2025:10848 | Important: cloud-init security update | 2025-07-14T00:00:00Z | 2025-07-22T13:36:59Z |
| alsa-2025:11463 | Moderate: fence-agents security update | 2025-07-21T00:00:00Z | 2025-07-22T13:35:00Z |
| alsa-2025:11462 | Important: git security update | 2025-07-21T00:00:00Z | 2025-07-22T10:34:40Z |
| alsa-2025:11332 | Important: tomcat9 security update | 2025-07-16T00:00:00Z | 2025-07-21T10:03:39Z |
| alsa-2025:10862 | Important: java-1.8.0-openjdk security update | 2025-07-17T00:00:00Z | 2025-07-21T09:41:01Z |
| alsa-2025:10844 | Important: cloud-init security update | 2025-07-14T00:00:00Z | 2025-07-18T06:52:34Z |
| alsa-2025:11066 | Moderate: glibc security update | 2025-07-15T00:00:00Z | 2025-07-18T06:49:51Z |
| alsa-2025:11335 | Important: tomcat security update | 2025-07-16T00:00:00Z | 2025-07-17T08:49:49Z |
| alsa-2025:10837 | Moderate: kernel security update | 2025-07-14T00:00:00Z | 2025-07-17T08:21:12Z |
| alsa-2025:11333 | Important: tomcat security update | 2025-07-16T00:00:00Z | 2025-07-17T08:17:04Z |
| alsa-2025:11327 | Moderate: glib2 security update | 2025-07-16T00:00:00Z | 2025-07-17T08:13:56Z |
| alsa-2025:11324 | Important: cloud-init security update | 2025-07-16T00:00:00Z | 2025-07-17T08:11:16Z |
| alsa-2025:10867 | Important: java-17-openjdk security update | 2025-07-15T00:00:00Z | 2025-07-16T12:47:22Z |
| alsa-2025:11140 | Moderate: glib2 security update | 2025-07-15T00:00:00Z | 2025-07-16T12:44:37Z |
| alsa-2025:11299 | Moderate: kernel-rt security update | 2025-07-16T00:00:00Z | 2025-07-16T12:42:40Z |
| alsa-2025:11298 | Moderate: kernel security update | 2025-07-16T00:00:00Z | 2025-07-16T12:39:32Z |