Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2026-3529 | N/A | Google Analytics GA4 - Moderately critical - Cross-sit… |
Drupal |
Google Analytics GA4 |
2026-03-26T20:03:28.917Z | 2026-03-27T18:09:00.611Z |
| cve-2026-3528 | N/A | Calculation Fields - Moderately critical - Cross-site … |
Drupal |
Calculation Fields |
2026-03-26T20:03:20.863Z | 2026-03-27T18:11:29.380Z |
| cve-2026-3527 | N/A | AJAX Dashboard - Critical - Access bypass - SA-CONTRIB… |
Drupal |
AJAX Dashboard |
2026-03-26T20:03:05.935Z | 2026-03-27T18:14:54.400Z |
| cve-2026-3526 | N/A | File Access Fix (deprecated) - Moderately critical - A… |
Drupal |
File Access Fix (deprecated) |
2026-03-26T20:02:55.103Z | 2026-03-27T18:17:51.547Z |
| cve-2026-3525 | N/A | File Access Fix (deprecated) - Moderately critical - A… |
Drupal |
File Access Fix (deprecated) |
2026-03-26T20:02:25.154Z | 2026-03-27T18:48:21.916Z |
| cve-2026-2100 | 5.3 (v3.1) | P11-kit: null dereference via c_derivekey with specifi… |
Red Hat |
Red Hat Hardened Images |
2026-03-26T20:01:46.174Z | 2026-04-25T01:11:02.236Z |
| cve-2026-33537 | Lychee has SSRF bypass via incomplete IP validation in… |
LycheeOrg |
Lychee |
2026-03-26T20:01:19.377Z | 2026-03-27T19:46:28.419Z | |
| cve-2026-2239 | 2.8 (v3.1) | Gimp: gimp: application crash (dos) via crafted psd fi… |
Red Hat |
Red Hat Enterprise Linux 7 |
2026-03-26T20:00:28.595Z | 2026-04-03T20:25:04.014Z |
| cve-2026-2272 | 4.3 (v3.1) | Gimp: gimp: memory corruption due to integer overflow … |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-03-26T20:00:10.110Z | 2026-04-03T20:25:02.286Z |
| cve-2026-2271 | 3.3 (v3.1) | Gimp: gimp: denial of service via crafted psp image file |
Red Hat |
Red Hat Enterprise Linux 6 |
2026-03-26T20:00:09.397Z | 2026-04-21T15:33:40.712Z |
| cve-2026-33536 | ImageMagick has an Out-of-bounds Write via InterpretIm… |
ImageMagick |
ImageMagick |
2026-03-26T19:57:53.619Z | 2026-03-27T13:57:36.689Z | |
| cve-2026-33535 | ImageMagick has an Out-of-Bounds write of a zero byte … |
ImageMagick |
ImageMagick |
2026-03-26T19:52:30.452Z | 2026-03-27T20:02:06.512Z | |
| cve-2026-33532 | yaml is vulnerable to Stack Overflow via deeply nested… |
eemeli |
yaml |
2026-03-26T19:49:03.842Z | 2026-03-30T11:26:26.005Z | |
| cve-2026-32287 | N/A | Infinite loop in github.com/antchfx/xpath |
github.com/antchfx/xpath |
github.com/antchfx/xpath |
2026-03-26T19:40:52.142Z | 2026-03-30T14:55:05.920Z |
| cve-2026-32286 | N/A | Denial of service in github.com/jackc/pgproto3/v2 |
github.com/jackc/pgproto3/v2 |
github.com/jackc/pgproto3/v2 |
2026-03-26T19:40:51.974Z | 2026-04-02T19:08:53.981Z |
| cve-2026-32285 | N/A | Denial of service in github.com/buger/jsonparser |
github.com/buger/jsonparser |
github.com/buger/jsonparser |
2026-03-26T19:40:51.837Z | 2026-04-20T19:01:23.660Z |
| cve-2026-32284 | N/A | Denial of service in github.com/shamaton/msgpack |
github.com/shamaton/msgpack |
github.com/shamaton/msgpack |
2026-03-26T19:40:51.686Z | 2026-03-30T14:55:25.762Z |
| cve-2026-33531 | InvenTree has Path Traversal In Report Templates |
inventree |
InvenTree |
2026-03-26T19:40:50.787Z | 2026-03-27T19:47:03.887Z | |
| cve-2026-33530 | InvenTree Vulnerable to ORM Filter Injection |
inventree |
InvenTree |
2026-03-26T19:34:51.294Z | 2026-03-30T11:24:37.542Z | |
| cve-2026-33632 | ClearanceKit: opfilter policy bypass via exchangedata … |
craigjbass |
clearancekit |
2026-03-26T19:32:49.565Z | 2026-03-27T13:58:53.489Z | |
| cve-2026-2436 | 6.5 (v3.1) | Libsoup: libsoup: denial of service via use-after-free… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-26T19:31:34.270Z | 2026-04-21T16:00:28.482Z |
| cve-2026-33631 | ClearanceKit: opfilter policy bypass via non-open file… |
craigjbass |
clearancekit |
2026-03-26T19:30:30.379Z | 2026-03-30T14:55:32.151Z | |
| cve-2021-4474 | 6.9 (v4.0) 4.9 (v3.1) | Ruckus AP CLI Arbitrary File Read Allows Authenticated… |
Ruckus Wireless |
RUCKUS Access Point |
2026-03-26T19:28:25.096Z | 2026-03-26T19:57:52.098Z |
| cve-2026-33529 | Zoraxy: Authenticated Path Traversal in Config Import … |
tobychui |
zoraxy |
2026-03-26T19:26:32.646Z | 2026-03-27T19:48:28.328Z | |
| cve-2026-33528 | GoDoxy has a Path Traversal Vulnerability in its File API |
yusing |
godoxy |
2026-03-26T19:24:50.452Z | 2026-03-27T13:57:45.401Z | |
| cve-2026-33525 | Authelia: Improper Neutralization of Input During Web … |
authelia |
authelia |
2026-03-26T19:22:57.418Z | 2026-03-30T14:55:38.565Z | |
| cve-2023-7338 | 7.7 (v4.0) 7.5 (v3.1) | Ruckus Unleashed Authenticated RCE in Gateway Mode |
Ruckus Networks |
RUCKUS H350 |
2026-03-26T19:20:53.252Z | 2026-03-27T21:55:37.051Z |
| cve-2026-3121 | 6.5 (v3.1) | Keycloak: org.keycloak/keycloak-services: keycloak: pr… |
Red Hat |
Red Hat build of Keycloak 26.4 |
2026-03-26T19:13:26.086Z | 2026-04-02T16:39:35.672Z |
| cve-2026-3190 | 4.3 (v3.1) | Keycloak: keycloak: information disclosure via imprope… |
Red Hat |
Red Hat build of Keycloak 26.4 |
2026-03-26T19:12:38.438Z | 2026-04-02T16:39:39.516Z |
| cve-2026-33152 | Tandoor Recipes Vulnerable to Unrestricted Brute-Force… |
TandoorRecipes |
recipes |
2026-03-26T19:07:39.225Z | 2026-03-26T19:52:09.977Z |
| ID | Description | Updated |
|---|
| ID | Description | Updated |
|---|
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2018-avi-094 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2018-02-22T00:00:00.000000 | 2018-02-23T00:00:00.000000 |
| certfr-2018-avi-093 | Vulnérabilité dans phpMyAdmin | 2018-02-21T00:00:00.000000 | 2018-02-21T00:00:00.000000 |
| certfr-2018-avi-092 | Vulnérabilité dans Juniper AppFormix | 2018-02-21T00:00:00.000000 | 2018-02-21T00:00:00.000000 |
| certfr-2018-avi-091 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2018-02-20T00:00:00.000000 | 2018-02-20T00:00:00.000000 |
| certfr-2018-avi-090 | Vulnérabilité dans les produits Apple | 2018-02-20T00:00:00.000000 | 2018-02-20T00:00:00.000000 |
| certfr-2018-avi-089 | Multiples vulnérabilités dans SCADA les produits Schneider Electric | 2018-02-16T00:00:00.000000 | 2018-02-16T00:00:00.000000 |
| certfr-2018-avi-088 | Multiples vulnérabilités dans les produits Microsoft | 2018-02-14T00:00:00.000000 | 2018-02-14T00:00:00.000000 |
| certfr-2018-avi-087 | Multiples vulnérabilités dans Microsoft Windows | 2018-02-14T00:00:00.000000 | 2018-02-14T00:00:00.000000 |
| certfr-2018-avi-086 | Multiples vulnérabilités dans Microsoft Office | 2018-02-14T00:00:00.000000 | 2018-02-14T00:00:00.000000 |
| certfr-2018-avi-085 | Multiples vulnérabilités dans Microsoft Edge | 2018-02-14T00:00:00.000000 | 2018-02-14T00:00:00.000000 |
| certfr-2018-avi-084 | Multiples vulnérabilités dans Microsoft IE | 2018-02-14T00:00:00.000000 | 2018-02-14T00:00:00.000000 |
| certfr-2018-avi-083 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2018-02-14T00:00:00.000000 | 2018-02-14T00:00:00.000000 |
| certfr-2018-avi-082 | Multiples vulnérabilités dans Adobe Acrobat et Reader | 2018-02-14T00:00:00.000000 | 2018-02-14T00:00:00.000000 |
| certfr-2018-avi-081 | Vulnérabilité dans Google Chrome | 2018-02-14T00:00:00.000000 | 2018-02-14T00:00:00.000000 |
| certfr-2018-avi-080 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2018-02-12T00:00:00.000000 | 2018-02-12T00:00:00.000000 |
| certfr-2018-avi-079 | Multiples vulnérabilités dans le noyau Linux de RedHat | 2018-02-12T00:00:00.000000 | 2018-02-12T00:00:00.000000 |
| certfr-2018-avi-078 | Multiples vulnérabilités dans SCADA les produits Schneider Electric | 2018-02-12T00:00:00.000000 | 2018-02-12T00:00:00.000000 |
| certfr-2018-avi-077 | Multiples vulnérabilités dans les produits VMware | 2018-02-12T00:00:00.000000 | 2018-02-12T00:00:00.000000 |
| certfr-2018-avi-076 | Multiples vulnérabilités dans les produits Cisco | 2018-02-08T00:00:00.000000 | 2018-02-08T00:00:00.000000 |
| certfr-2018-avi-075 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2018-02-08T00:00:00.000000 | 2018-02-08T00:00:00.000000 |
| certfr-2018-avi-074 | Vulnérabilité dans SCADA les logiciels Schneider Electric IGSS SCADA | 2018-02-07T00:00:00.000000 | 2018-02-07T00:00:00.000000 |
| certfr-2018-avi-073 | Vulnérabilité dans SCADA CODESYS Web Server | 2018-02-07T00:00:00.000000 | 2018-02-07T00:00:00.000000 |
| certfr-2018-avi-072 | Multiples vulnérabilités dans les produits Microsoft Windows utilisant le composant Adobe Flash Player | 2018-02-07T00:00:00.000000 | 2018-02-07T00:00:00.000000 |
| certfr-2018-avi-071 | Multiples vulnérabilité dans Adobe Flash Player | 2018-02-07T00:00:00.000000 | 2018-02-07T00:00:00.000000 |
| certfr-2018-avi-070 | Vulnérabilité dans F5 BIG-IP | 2018-02-06T00:00:00.000000 | 2018-02-06T00:00:00.000000 |
| certfr-2018-avi-069 | Multiples vulnérabilités dans Google Chrome OS | 2018-02-06T00:00:00.000000 | 2018-02-06T00:00:00.000000 |
| certfr-2018-avi-068 | Vulnérabilité dans Juniper Junos OS | 2018-02-06T00:00:00.000000 | 2018-02-06T00:00:00.000000 |
| certfr-2018-avi-067 | Multiples vulnérabilités dans Google Android | 2018-02-06T00:00:00.000000 | 2018-02-06T00:00:00.000000 |
| certfr-2018-avi-066 | Multiples vulnérabilités dans PHP | 2018-02-05T00:00:00.000000 | 2018-02-05T00:00:00.000000 |
| certfr-2018-avi-065 | Multiples vulnérabilités dans Google Chrome et Chrome OS | 2018-02-02T00:00:00.000000 | 2018-02-02T00:00:00.000000 |